| caliptra-api |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| checksum::tests::test_calc_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| checksum::tests::test_checksum_overflow |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
| checksum::tests::test_round_trip |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| checksum::tests::test_verify_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_populate_checksum_capabilities |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_populate_checksum_resp_header |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-api-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test::test_security_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-auth-man-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-auth-man-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-auth-manifest-app::bin/caliptra-auth-manifest-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-builder |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| elf_symbols::test::test_elf_symbols |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::cargo_invocations_from_fwid::test_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::cargo_invocations_from_fwid::test_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_build_firmware |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_build_firmware_not_registered |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_elf2rom_golden |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_elf_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_fwid_elf_filename |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_image_revision_from_str |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-builder::bin/image |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_binaries_are_identical |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
112.9s |
112.5s |
110.1s |
111.4s |
70.9s |
70.1s |
70.0s |
72.1s |
69.9s |
71.0s |
71.1s |
71.1s |
| test_image_options_imports_correctly |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| cfi_asm_test::test::test_launder |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
| caliptra-cfi-lib |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-cfi-lib::test_asm |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-cfi-lib::test_derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_rand |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_rand_stress |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_with_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_with_not_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_coverage_map_creation_data_files |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_coverage_map_creation_no_data_files_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_parse_trace_file |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-coverage::bin/caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-drivers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| array::tests::test_array_4x4_from_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array::tests::test_array_4x4_to_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array_concat::tests::test_array_concat3_result_too_large |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array_concat::tests::test_array_concat3_result_too_small |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array_concat::tests::test_array_concat3_u16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array_concat::tests::test_array_concat3_u8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bounded_address::tests::test_rom_address_validate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fuse_bank::tests::test_first_set_msbit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hand_off::tests::test_dv_nonsticky_384bit_set |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hand_off::tests::test_fht_is_valid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hand_off::tests::test_fmc_priv_key_store |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| memory_layout::mem_layout_test_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| memory_layout::mem_layout_test_estack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| memory_layout::mem_layout_test_persistent_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| memory_layout::mem_layout_test_stack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| okref::tests::test_okref_err |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| okref::tests::test_okref_ok |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| persistent::tests::test_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-drivers-test-bin |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-drivers::drivers_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_csrng |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_csrng2 |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_csrng_adaptive_proportion |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_csrng_repetition_count |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_doe_when_debug_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
| test_doe_when_debug_not_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
| test_ecc384 |
2.0s |
2.0s |
2.2s |
2.2s |
1.5s |
1.5s |
1.8s |
1.8s |
1.5s |
1.5s |
1.8s |
1.8s |
0.8s |
0.7s |
0.6s |
0.8s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
| test_ecc384_sign_validation_failure |
0.1s |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
| test_error_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_generate_doe_vectors_when_debug_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_generate_doe_vectors_when_debug_not_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_hmac384 |
1.8s |
1.8s |
2.1s |
2.1s |
1.4s |
1.4s |
2.0s |
2.0s |
1.4s |
1.4s |
2.0s |
2.0s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
| test_keyvault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_lms_24 |
0.4s |
0.4s |
0.4s |
0.4s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.5s |
0.6s |
0.5s |
0.5s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_lms_32 |
4.1s |
4.1s |
4.1s |
4.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
8.8s |
7.6s |
7.9s |
8.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
| test_mailbox_soc_to_uc |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_mailbox_txn_drop |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_mailbox_uc_to_soc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_negative_lms |
0.7s |
0.7s |
0.7s |
0.7s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
1.0s |
0.9s |
0.9s |
0.8s |
0.2s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
| test_pcrbank |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_persistent |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_sha1 |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
3.2s |
3.3s |
3.3s |
3.2s |
3.0s |
2.9s |
2.8s |
2.9s |
3.2s |
3.1s |
2.8s |
2.8s |
| test_sha256 |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
7.6s |
6.3s |
6.2s |
6.5s |
4.4s |
4.7s |
5.1s |
4.5s |
4.7s |
4.7s |
4.7s |
4.3s |
| test_sha2_512_384acc |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_sha384 |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
5.3s |
4.6s |
5.0s |
5.4s |
4.0s |
4.0s |
4.0s |
3.7s |
3.7s |
3.9s |
3.8s |
3.9s |
| test_status_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_trng_in_etrng_mode |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_trng_in_itrng_mode |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_uart |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_uc_to_soc_error_state |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-bus |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| clock::tests::test_clock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_increment_and_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_increment_too_far |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_mixup_timer_actions_on_cancel |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_schedule_too_far_in_future |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_timer_schedule_clock_searchback_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_timer_schedule_clock_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_timer_schedule_with_clock_at_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_timer_schedule_with_clock_at_12327834 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| dynamic_bus::test::test_attach_dev |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| dynamic_bus::test::test_dynamic_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| dynamic_bus::test::test_dynamic_bus_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| dynamic_bus::test::test_dynamic_bus_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mmio::tests::test_bus_mmio |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_write_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_read_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_read_write_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u16_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u16_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u16_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u32_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u32_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u32_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u8_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u8_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u8_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_write_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register_array::tests::test_bus_faults |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register_array::tests::test_bus_faults_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register_array::tests::test_read_and_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register_array::tests::test_read_and_write_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_mmap_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| testing::fake_bus::tests::test_fake_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| testing::log::tests::test |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| testing::log::tests::test_clone |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-cpu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| cpu::tests::test_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| cpu::tests::test_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| cpu::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| cpu::tests::test_pc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| cpu::tests::test_xreg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csr_file::tests::test_read_only_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csr_file::tests::test_read_write_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csr_file::tests::test_read_write_masked_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::auipc::tests::test_auipc_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::auipc::tests::test_auipc_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::jal::tests::test_jal_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::jalr::tests::test_jalr_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::jalr::tests::test_jalr_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::lui::tests::test_lui_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::lui::tests::test_lui_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::lui::tests::test_lui_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::lui::tests::test_lui_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrci |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrs |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrsi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrw |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrwi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_ebreak |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_ecall |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_unknown_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| pic::tests::test_interrupt_priority_order |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_read_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_reset |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_write_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_x0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| aes256cbc::tests::test_decrypt_1024bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| aes256cbc::tests::test_decrypt_256bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| aes256cbc::tests::test_decrypt_384bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ecc384::tests::test_gen_key_pair |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ecc384::tests::test_verify_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
| helpers::test::test_change_endianness_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::test::test_change_endianness_u64 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::test::test_change_endianness_u8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_finalize_127byte_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_finalize_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| bus::tests::test_derive_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_derive_empty_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_mask_lsbs_contiguous |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_organize_fields_by_mask |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_parse_peripheral_fields |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_parse_peripheral_fields_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_hex_literal_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_hex_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_hex_u32_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_hex_u32_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_hex_u32_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_usize |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::sort::tests::test_sorted_by_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_group_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_of_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_of_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_literal |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_literal_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_punct_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_punct_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_attribute_or_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_field_with_attributes |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_struct |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-derive::derive_bus_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_read_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_write_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-periph |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| asym_ecc384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_gen_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_gen_key_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.4s |
0.6s |
0.4s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
| asym_ecc384::tests::test_gen_key_kv_seed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.3s |
0.5s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
| asym_ecc384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_sign_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.2s |
0.2s |
0.1s |
| asym_ecc384::tests::test_sign_kv_privkey_not_allowed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::block_increment_max |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::block_increment_max_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::block_increment_non_zero_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::block_increment_zero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::massage_seed_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::massage_seed_single_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::massage_seed_two_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::massage_seed_zero_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| doe::tests::test_clear_secrets |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| doe::tests::test_deobfuscate_fe |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| doe::tests::test_deobfuscate_uds |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_sha256_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_error_if_w_is_not_valid |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_is_enabled |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_mode_disabled_by_default |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_params |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_block_read_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_hash_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_pcr_hash_extend_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha512_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_bytes_from_words_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_bytes_from_words_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_bytes_swap_word_endian |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_words_from_bytes_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_words_from_bytes_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_exact_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_key_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_small_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_tag |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| iccm::tests::test_byte_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| iccm::tests::test_locked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| iccm::tests::test_unlocked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_clear_with_debug_values |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_private_read_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_private_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_private_read_write_small |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_private_write_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_nonsticky_generic_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_pcr_lock_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_pcr_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_sticky_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_sticky_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_sticky_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_send_receive |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_send_receive_max_limit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_sm_arc_rdyforcmd_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_sm_arc_rdyfordata_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_sm_init |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_soc_to_caliptra_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| root_bus::tests::test_keyvault_init_val_in_debug_locked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_stream_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_sha_acc_check_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_idev_id_csr_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_ldev_id_cert_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_secrets_when_debug_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_secrets_when_debug_not_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_tb_services_cb |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_wdt |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| exception::tests::test_breakpoint |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_environment_call |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_illegal_instr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_illegal_register |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_instr_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_instr_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_load_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_load_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_store_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_store_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu::bin/caliptra-emu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-error |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_error_constants_uniqueness |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_try_from |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-file-header-fix::bin/caliptra-file-header-fix |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test::test_check_failures |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_check_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-file-header-fix::integration_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_check_only_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_check_only_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_fix |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_usage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-fmc::bin/caliptra-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-fmc::fmc_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_hand_off::test_hand_off |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.6s |
1.5s |
1.6s |
1.4s |
1.8s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
| test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_rtalias::test_boot_status_reporting |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.7s |
1.5s |
1.6s |
1.4s |
1.9s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
| test_rtalias::test_fht_info |
1.7s |
1.7s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.6s |
1.8s |
1.7s |
1.8s |
1.6s |
2.0s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
| test_rtalias::test_pcr_log |
2.6s |
2.6s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.6s |
2.5s |
2.6s |
2.5s |
2.1s |
2.2s |
2.1s |
2.0s |
2.0s |
1.9s |
2.0s |
1.9s |
| caliptra-gen-linker-scripts |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-hw-model |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| mmio::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::test_pretty_u64 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_failed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_passed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_peek |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_search |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_take |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_unknown_generic_load |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rv32_builder::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_apb |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_cold_reset |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| tests::test_execution |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mailbox_execute |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mailbox_execute_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mailbox_receive |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mbox |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mbox_negative |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_negative_soc_mgr_mbox_users |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_output_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_sha512_acc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_soc_mgr_exec_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_soc_mgr_mbox_api |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-hw-model-c-binding |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-hw-model-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test::test_hex_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_hex_slice |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-hw-model::bin/fpga_realtime_mbox_pauser |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-hw-model::model_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_dccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_iccm_byte_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_iccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_iccm_unaligned_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_iccm_write_locked_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_invalid_instruction_exception_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_mbox_pauser_sigbus |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| test_pcr_extend |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_uninitialized_dccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| test_uninitialized_iccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| test_uninitialized_mbox_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| test_write_to_rom |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-image-app::bin/caliptra-image-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-image-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_lms |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| tests::test_lms_sig |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| tests::test_lms_sig_h15 |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_print_lms_private_pub_key |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| caliptra-image-elf |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test::test_load_into_image |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_load_into_image_bad_address |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-image-fake-keys |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_write_lms_keys |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| caliptra-image-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-image-serde |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-image-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_image_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-image-verify |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| verifier::tests::test_fmc_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_fmc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_fmc_rt_load_address_range_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_fmc_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_incorrect_lms_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_incorrect_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_owner_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_owner_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_vendor_lms_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_vendor_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_vendor_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_vendor_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_manifest_marker |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_owner_pk_digest_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_owner_verify_preamble_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_preamble_owner_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_preamble_vendor_pubkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_preamble_vendor_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_rt_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_rt_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_rt_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_size_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_size_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_toc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_toc_fmc_rt_order |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_toc_fmc_rt_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_toc_incorrect_length |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_vendor_ecc_pk_idx_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_verify_fmc_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_verify_fmc_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-lms-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_bytes_to_words_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_bytes_to_words_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-registers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-registers-1_0 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-registers-latest |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom-test-fmc::bin/caliptra-rom-test-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom-test-rt::bin/caliptra-rom-test-rt |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom::bin/asm_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom::bin/caliptra-rom |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom::rom_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| helpers::tests::test_get_data |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_get_data_not_found |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rv32_unit_tests::test_asm |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.2s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_capabilities::test_capabilities |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
0.9s |
0.8s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_cfi::test_memcpy_not_called_before_cfi_init |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.2s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
| test_cpu_fault::test_cpu_fault |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_dice_derivations::test_cold_reset_no_rng |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
| test_dice_derivations::test_cold_reset_status_reporting |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.4s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_dice_derivations::test_cold_reset_success |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.2s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
| test_fake_rom::test_fake_rom_fw_load |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.3s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
| test_fake_rom::test_fake_rom_production_enabled |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_fake_rom::test_fake_rom_production_error |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_fake_rom::test_fake_rom_update_reset |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.4s |
0.4s |
0.4s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
| test_fake_rom::test_fake_rom_version |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_fake_rom::test_image_verify |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.2s |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.3s |
0.6s |
0.5s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
| test_fake_rom::test_skip_kats |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_fips_hooks::test_fips_hook_exit |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.2s |
1.0s |
1.1s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
| test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable |
n/a |
n/a |
n/a |
n/a |
1.0s |
0.9s |
1.0s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.3s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
| test_fmcalias_derivation::test_check_rom_cold_boot_status_reg |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.0s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.3s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
| test_fmcalias_derivation::test_fht_info |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.0s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.3s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
| test_fmcalias_derivation::test_firmware_gt_max_size |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_fmcalias_derivation::test_fuse_log |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_fmcalias_derivation::test_pcr_log |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
| test_fmcalias_derivation::test_pcr_log_across_update_reset |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
2.1s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
2.1s |
1.9s |
2.0s |
1.9s |
| test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
| test_fmcalias_derivation::test_upload_measurement_limit |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_fmcalias_derivation::test_upload_measurement_limit_plus_one |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.5s |
0.6s |
0.5s |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
| test_fmcalias_derivation::test_upload_no_measurement |
n/a |
n/a |
n/a |
n/a |
1.0s |
0.9s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
| test_fmcalias_derivation::test_upload_single_measurement |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
| test_fmcalias_derivation::test_zero_firmware_size |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.7s |
| test_idevid_derivation::test_generate_csr |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.5s |
1.5s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
| test_idevid_derivation::test_generate_csr_stress |
n/a |
n/a |
n/a |
n/a |
1541.6s |
1521.9s |
1541.4s |
1521.5s |
n/a |
n/a |
n/a |
n/a |
1038.1s |
1011.0s |
1019.6s |
986.6s |
1014.9s |
982.4s |
1017.6s |
989.3s |
1007.6s |
983.8s |
1022.9s |
990.7s |
| test_idevid_derivation::test_idev_subj_key_id_algo |
n/a |
n/a |
n/a |
n/a |
5.7s |
5.6s |
5.7s |
5.6s |
n/a |
n/a |
n/a |
n/a |
6.2s |
5.9s |
6.1s |
5.7s |
6.1s |
6.0s |
5.4s |
5.4s |
5.5s |
5.4s |
5.5s |
5.9s |
| test_image_validation::cert_test |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.5s |
1.3s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.2s |
1.3s |
1.4s |
| test_image_validation::cert_test_with_custom_dates |
n/a |
n/a |
n/a |
n/a |
1.6s |
2.2s |
1.6s |
1.5s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.6s |
1.6s |
1.6s |
1.5s |
1.7s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.6s |
| test_image_validation::cert_test_with_ueid |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.3s |
1.3s |
1.2s |
1.6s |
1.7s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.6s |
| test_image_validation::test_fmc_digest_mismatch |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.0s |
0.8s |
0.8s |
0.8s |
1.1s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
| test_image_validation::test_fmc_entry_point_unaligned |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.2s |
0.9s |
0.9s |
0.8s |
1.3s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
1.0s |
| test_image_validation::test_fmc_invalid_entry_point_after_iccm |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
0.9s |
0.8s |
1.0s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
| test_image_validation::test_fmc_invalid_entry_point_before_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.0s |
0.9s |
0.8s |
1.0s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
| test_image_validation::test_fmc_invalid_load_addr_after_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.2s |
0.9s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
| test_image_validation::test_fmc_invalid_load_addr_before_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.2s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
| test_image_validation::test_fmc_load_addr_unaligned |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
| test_image_validation::test_fmc_not_contained_in_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.9s |
1.0s |
1.1s |
1.0s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
| test_image_validation::test_fmc_rt_load_address_range_overlap |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.5s |
1.5s |
n/a |
n/a |
n/a |
n/a |
1.7s |
2.0s |
2.3s |
2.0s |
1.6s |
1.5s |
1.8s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
| test_image_validation::test_fmc_svn_greater_than_32 |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.3s |
1.7s |
1.5s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
| test_image_validation::test_fmc_svn_less_than_fuse_svn |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.4s |
1.3s |
1.0s |
0.9s |
1.1s |
0.9s |
1.2s |
0.9s |
1.0s |
1.0s |
| test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_r |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
0.9s |
1.1s |
0.8s |
0.7s |
0.7s |
0.7s |
0.9s |
0.7s |
0.8s |
0.7s |
| test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.9s |
1.0s |
0.6s |
0.7s |
0.7s |
0.7s |
0.9s |
0.7s |
0.7s |
0.7s |
| test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_x |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
1.0s |
0.8s |
0.6s |
0.7s |
0.9s |
0.6s |
0.9s |
0.7s |
0.8s |
0.7s |
| test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_y |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
1.0s |
0.5s |
0.9s |
0.8s |
0.8s |
0.7s |
| test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_r |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.9s |
0.6s |
0.9s |
0.9s |
0.9s |
0.7s |
| test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
1.1s |
0.7s |
0.9s |
0.9s |
1.1s |
0.7s |
| test_image_validation::test_header_verify_owner_lms_optional_no_sig_mismatch_check |
n/a |
n/a |
n/a |
n/a |
2.1s |
2.1s |
2.1s |
2.1s |
n/a |
n/a |
n/a |
n/a |
2.5s |
2.3s |
2.5s |
2.3s |
2.3s |
2.2s |
2.4s |
2.7s |
2.7s |
3.0s |
2.7s |
2.2s |
| test_image_validation::test_header_verify_owner_lms_sig_mismatch |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.6s |
1.6s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.7s |
1.7s |
1.8s |
1.7s |
1.6s |
1.7s |
2.2s |
2.0s |
2.2s |
2.1s |
1.6s |
| test_image_validation::test_header_verify_owner_sig_zero_fuses |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.0s |
| test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
1.1s |
0.8s |
0.9s |
0.9s |
0.7s |
| test_image_validation::test_header_verify_vendor_ecc_sig_mismatch |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.6s |
1.4s |
1.4s |
1.5s |
1.4s |
| test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
| test_image_validation::test_header_verify_vendor_lms_optional_no_sig_mismatch_check |
n/a |
n/a |
n/a |
n/a |
2.1s |
2.1s |
2.1s |
2.1s |
n/a |
n/a |
n/a |
n/a |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
| test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
| test_image_validation::test_header_verify_vendor_lms_sig_mismatch |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.5s |
1.5s |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
| test_image_validation::test_header_verify_vendor_sig_zero_ecc_pubkey |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_image_validation::test_header_verify_vendor_sig_zero_ecc_signature |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_image_validation::test_invalid_manifest_marker |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_image_validation::test_invalid_manifest_size |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_image_validation::test_max_fw_image |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.4s |
1.3s |
| test_image_validation::test_preamble_owner_pubkey_digest_mismatch |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_image_validation::test_preamble_vendor_ecc_pubkey_revocation |
n/a |
n/a |
n/a |
n/a |
2.5s |
2.5s |
2.6s |
2.5s |
n/a |
n/a |
n/a |
n/a |
3.7s |
3.2s |
3.4s |
3.3s |
3.0s |
2.9s |
3.0s |
2.9s |
3.1s |
2.9s |
3.1s |
2.9s |
| test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.5s |
1.3s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check |
n/a |
n/a |
n/a |
n/a |
30.0s |
29.7s |
30.3s |
30.0s |
n/a |
n/a |
n/a |
n/a |
36.3s |
35.1s |
35.9s |
34.8s |
36.2s |
33.2s |
34.5s |
33.5s |
34.5s |
33.4s |
34.8s |
33.2s |
| test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_image_validation::test_preamble_vendor_lms_pubkey_revocation |
n/a |
n/a |
n/a |
n/a |
17.3s |
17.2s |
17.7s |
17.5s |
n/a |
n/a |
n/a |
n/a |
21.8s |
20.7s |
22.1s |
20.6s |
20.7s |
19.6s |
20.7s |
19.7s |
20.7s |
19.6s |
20.7s |
19.8s |
| test_image_validation::test_preamble_vendor_pubkey_digest_mismatch |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_image_validation::test_preamble_zero_vendor_pubkey_digest |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_image_validation::test_runtime_digest_mismatch |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
| test_image_validation::test_runtime_entry_point_unaligned |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
| test_image_validation::test_runtime_invalid_entry_point_after_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
| test_image_validation::test_runtime_invalid_entry_point_before_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
| test_image_validation::test_runtime_invalid_load_addr_after_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
| test_image_validation::test_runtime_invalid_load_addr_before_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
| test_image_validation::test_runtime_load_addr_unaligned |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
| test_image_validation::test_runtime_not_contained_in_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
| test_image_validation::test_runtime_svn_greater_than_max |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
| test_image_validation::test_runtime_svn_less_than_fuse_svn |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_image_validation::test_toc_fmc_range_incorrect_order |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
| test_image_validation::test_toc_fmc_range_overlap |
n/a |
n/a |
n/a |
n/a |
2.2s |
2.2s |
2.2s |
2.2s |
n/a |
n/a |
n/a |
n/a |
2.4s |
2.3s |
2.5s |
2.3s |
2.3s |
2.3s |
2.4s |
2.3s |
2.3s |
2.3s |
2.4s |
2.3s |
| test_image_validation::test_toc_fmc_size_zero |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
| test_image_validation::test_toc_invalid_entry_count |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
| test_image_validation::test_toc_invalid_toc_digest |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
| test_image_validation::test_toc_rt_size_zero |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
| test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_mailbox_errors::test_mailbox_invalid_checksum |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_mailbox_errors::test_mailbox_invalid_req_size_large |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_mailbox_errors::test_mailbox_invalid_req_size_small |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_mailbox_errors::test_mailbox_invalid_req_size_zero |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_mailbox_errors::test_mailbox_reserved_pauser |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| test_mailbox_errors::test_unknown_command_is_fatal |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_panic_missing::test_panic_missing |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_rom_integrity::test_read_rom_info_from_fmc |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
| test_rom_integrity::test_rom_integrity_failure |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.2s |
0.3s |
0.2s |
0.3s |
0.2s |
0.3s |
0.2s |
0.3s |
0.3s |
0.3s |
0.2s |
| test_symbols::test_linker_symbols_match_memory_layout |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_update_reset::test_check_rom_update_reset_status_reg |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
| test_update_reset::test_fmc_is_16k |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.3s |
n/a |
n/a |
n/a |
n/a |
0.6s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.6s |
| test_update_reset::test_update_reset_boot_status |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
| test_update_reset::test_update_reset_max_fw_image |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.6s |
1.6s |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.8s |
1.9s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
| test_update_reset::test_update_reset_no_mailbox_cmd |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
| test_update_reset::test_update_reset_non_fw_load_cmd |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
| test_update_reset::test_update_reset_success |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
| test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
| test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
| test_update_reset::test_update_reset_verify_image_failure |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
| test_version::test_version |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
| test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.5s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
| test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
| test_warm_reset::test_warm_reset_during_update_reset |
n/a |
n/a |
n/a |
n/a |
2.0s |
1.9s |
2.3s |
2.3s |
n/a |
n/a |
n/a |
n/a |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
| test_warm_reset::test_warm_reset_success |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.9s |
2.6s |
2.6s |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.7s |
| test_warm_reset::test_warm_reset_version |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.9s |
2.6s |
2.6s |
n/a |
n/a |
n/a |
n/a |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
| test_wdt_activation_and_stoppage::test_rom_wdt_timeout |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
| test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| tests_get_idev_csr::test_get_csr |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
| caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| set_auth_manifest::tests::test_sort_and_duplicate_dupe |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| set_auth_manifest::tests::test_sort_and_duplicate_empty |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| set_auth_manifest::tests::test_sort_and_duplicate_sort |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-runtime::bin/caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-runtime::runtime_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.7s |
2.7s |
2.7s |
2.5s |
2.5s |
2.6s |
2.4s |
2.5s |
2.5s |
2.5s |
2.4s |
2.5s |
2.3s |
2.4s |
2.4s |
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.6s |
2.6s |
2.5s |
2.6s |
2.5s |
2.4s |
2.5s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest |
3.7s |
3.7s |
3.6s |
3.7s |
3.0s |
3.0s |
3.0s |
3.0s |
3.1s |
3.1s |
3.0s |
3.1s |
2.8s |
3.2s |
2.8s |
2.9s |
2.7s |
2.7s |
2.8s |
2.7s |
2.7s |
2.7s |
2.7s |
2.7s |
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.6s |
2.6s |
2.5s |
3.1s |
2.6s |
2.6s |
2.5s |
2.4s |
2.5s |
2.5s |
2.5s |
2.4s |
2.4s |
2.4s |
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.6s |
2.6s |
2.4s |
3.1s |
2.5s |
3.1s |
2.5s |
2.4s |
2.5s |
2.5s |
2.5s |
2.4s |
2.4s |
2.4s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization |
2.7s |
2.7s |
2.6s |
2.7s |
2.2s |
2.1s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.6s |
2.1s |
2.5s |
2.2s |
2.1s |
2.4s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.6s |
1.4s |
1.7s |
1.4s |
1.4s |
1.6s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.6s |
1.4s |
1.9s |
1.4s |
1.4s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.5s |
1.4s |
1.6s |
1.5s |
1.4s |
1.6s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash |
4.5s |
4.5s |
4.5s |
4.5s |
3.7s |
3.6s |
3.7s |
3.6s |
3.7s |
3.7s |
3.7s |
3.7s |
2.8s |
2.8s |
2.8s |
3.3s |
2.9s |
2.8s |
3.5s |
3.1s |
2.7s |
3.0s |
2.8s |
2.9s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_success |
3.1s |
3.2s |
3.1s |
3.1s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.4s |
2.3s |
2.5s |
2.8s |
2.4s |
2.3s |
2.9s |
2.5s |
2.3s |
2.4s |
2.3s |
2.4s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.7s |
1.4s |
1.4s |
1.7s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
| test_authorize_and_stash::test_authorize_and_stash_fwid_0 |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.8s |
1.9s |
1.4s |
1.7s |
1.4s |
1.4s |
| test_authorize_and_stash::test_authorize_and_stash_fwid_127 |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.7s |
1.8s |
1.4s |
1.6s |
1.4s |
1.7s |
| test_boot::test_boot |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.4s |
1.2s |
0.9s |
1.1s |
0.9s |
1.2s |
| test_boot::test_boot_tci_data |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.3s |
1.5s |
1.1s |
1.5s |
1.0s |
1.2s |
| test_boot::test_fw_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.4s |
1.7s |
1.1s |
1.4s |
1.1s |
1.3s |
| test_boot::test_measurement_in_measurement_log_added_to_dpe |
1.6s |
1.6s |
1.6s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.6s |
1.5s |
1.2s |
1.4s |
1.2s |
1.3s |
| test_boot::test_persistent_data |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.2s |
1.3s |
0.9s |
1.1s |
0.9s |
1.2s |
| test_boot::test_standard |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.3s |
1.1s |
1.5s |
1.1s |
1.2s |
| test_boot::test_stress_update |
404.3s |
411.2s |
398.4s |
405.2s |
330.1s |
329.8s |
336.0s |
336.0s |
337.7s |
344.8s |
336.0s |
340.8s |
361.7s |
349.3s |
368.4s |
357.0s |
359.5s |
352.3s |
354.9s |
349.5s |
354.4s |
344.9s |
358.6s |
344.9s |
| test_boot::test_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.3s |
2.2s |
2.2s |
2.2s |
2.2s |
2.7s |
2.1s |
2.5s |
2.1s |
2.5s |
| test_certify_key_extended::test_dmtf_other_name_extension_not_present |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.8s |
1.4s |
1.7s |
1.3s |
1.6s |
| test_certify_key_extended::test_dmtf_other_name_extension_present |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.5s |
1.2s |
1.4s |
1.2s |
1.3s |
| test_certify_key_extended::test_dmtf_other_name_validation_fail |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.3s |
1.1s |
1.4s |
1.1s |
1.4s |
| test_certs::test_all_measurement_apis |
6.0s |
6.0s |
6.1s |
6.1s |
4.7s |
4.7s |
5.7s |
5.6s |
4.8s |
4.8s |
5.7s |
5.7s |
4.6s |
4.0s |
4.3s |
4.1s |
4.3s |
4.0s |
4.0s |
3.9s |
5.1s |
4.0s |
4.2s |
4.2s |
| test_certs::test_dpe_leaf_cert |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.2s |
1.4s |
| test_certs::test_fmc_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.1s |
1.1s |
1.4s |
1.2s |
1.2s |
1.2s |
1.3s |
1.1s |
1.3s |
1.1s |
| test_certs::test_full_cert_chain |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.1s |
1.2s |
1.1s |
1.7s |
1.2s |
1.2s |
1.2s |
1.3s |
1.1s |
1.3s |
1.1s |
| test_certs::test_idev_id_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.1s |
1.1s |
1.1s |
1.4s |
1.1s |
1.2s |
1.2s |
1.5s |
1.1s |
1.4s |
1.1s |
| test_certs::test_idev_id_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_certs::test_ldev_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.1s |
1.2s |
1.1s |
1.6s |
1.3s |
1.2s |
1.2s |
1.5s |
1.1s |
1.3s |
1.1s |
| test_certs::test_rt_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.1s |
1.3s |
1.1s |
1.3s |
1.3s |
1.2s |
1.2s |
1.7s |
1.1s |
1.3s |
1.1s |
| test_certs::test_rt_cert_with_custom_dates |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.4s |
1.1s |
1.5s |
1.5s |
1.1s |
1.1s |
1.3s |
1.1s |
1.5s |
1.1s |
| test_disable::test_attestation_disabled_flag_after_update_reset |
3.3s |
3.4s |
3.3s |
3.3s |
2.7s |
2.7s |
2.7s |
2.6s |
2.7s |
2.7s |
2.7s |
2.7s |
3.2s |
2.4s |
3.2s |
2.4s |
3.3s |
2.8s |
2.4s |
2.4s |
2.6s |
2.4s |
3.1s |
2.3s |
| test_disable::test_disable_attestation_cmd |
2.5s |
2.5s |
2.5s |
2.5s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.4s |
1.7s |
1.4s |
1.8s |
1.8s |
1.4s |
1.4s |
1.6s |
1.4s |
1.6s |
1.3s |
| test_ecdsa::ecdsa_cmd_run_wycheproof |
10.3s |
10.3s |
10.3s |
10.3s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
4.7s |
4.6s |
5.8s |
4.6s |
4.8s |
5.6s |
4.7s |
4.6s |
4.6s |
4.5s |
4.9s |
4.7s |
| test_ecdsa::test_ecdsa_hw_failure |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| test_ecdsa::test_ecdsa_verify_bad_chksum |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.4s |
1.1s |
1.2s |
1.5s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
| test_ecdsa::test_ecdsa_verify_cmd |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.4s |
1.1s |
1.2s |
1.4s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_fips::test_fips_shutdown |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.5s |
1.1s |
1.2s |
1.7s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
| test_fips::test_fips_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_get_fmc_alias_csr::test_get_fmc_alias_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_get_idev_csr::test_get_csr |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_get_idev_csr::test_missing_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_info::test_capabilities |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_info::test_fw_info |
4.4s |
4.5s |
4.4s |
4.4s |
3.6s |
3.6s |
3.6s |
3.6s |
3.7s |
3.7s |
3.6s |
3.7s |
4.3s |
4.1s |
4.3s |
4.2s |
4.1s |
4.0s |
4.1s |
4.1s |
4.1s |
4.0s |
4.1s |
4.0s |
| test_info::test_idev_id_info |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_invoke_dpe::test_dpe_header_error_code |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset |
3.0s |
3.0s |
3.0s |
3.0s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
2.5s |
2.4s |
2.4s |
2.3s |
2.3s |
2.4s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.2s |
2.2s |
| test_invoke_dpe::test_export_cdi_destroyed_root_context |
3.0s |
3.0s |
3.0s |
3.0s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
2.5s |
2.4s |
2.4s |
2.3s |
2.3s |
2.4s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
| test_invoke_dpe::test_invoke_dpe_asymmetric_sign |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_invoke_dpe::test_invoke_dpe_certify_key_csr |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_invoke_dpe::test_invoke_dpe_get_profile_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_invoke_dpe::test_invoke_dpe_rotate_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_invoke_dpe::test_invoke_dpe_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_lms::test_lms_verify_cmd |
2.1s |
2.2s |
2.1s |
2.1s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
3.2s |
3.2s |
3.2s |
3.2s |
1.9s |
1.7s |
1.8s |
1.8s |
1.7s |
1.7s |
1.7s |
1.7s |
| test_lms::test_lms_verify_failure |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_lms::test_lms_verify_invalid_key_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_lms::test_lms_verify_invalid_lmots_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
| test_lms::test_lms_verify_invalid_sig_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_mailbox::test_error_cleared |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_mailbox::test_reserved_pauser |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| test_mailbox::test_unimplemented_cmds |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_change_locality |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_measurement_log_pl_context_threshold |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
| test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
| test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
| test_pauser_privilege_levels::test_pl0_unset_in_header |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
| test_pauser_privilege_levels::test_user_not_pl0 |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_pcr::test_extend_pcr_cmd_invalid_pcr_index |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pcr::test_extend_pcr_cmd_multiple_extensions |
2.0s |
2.0s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
| test_pcr::test_extend_pcr_cmd_reserved_range |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pcr::test_pcr_quote |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
| test_populate_idev::test_populate_idev_cert_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
| test_populate_idev::test_populate_idev_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.2s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range |
55.8s |
56.1s |
55.8s |
56.0s |
45.2s |
45.0s |
45.3s |
45.0s |
45.7s |
45.8s |
45.8s |
45.8s |
46.7s |
44.8s |
46.0s |
45.2s |
46.8s |
45.9s |
46.4s |
46.3s |
45.2s |
44.0s |
44.9s |
44.4s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.5s |
2.4s |
2.6s |
2.5s |
2.5s |
2.6s |
2.5s |
2.4s |
2.5s |
2.4s |
2.4s |
2.4s |
| test_revoke_exported_cdi_handle::test_export_cdi_after_revoke |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
| test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_set_auth_manifest::test_set_auth_manifest_cmd |
2.6s |
2.6s |
2.7s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.6s |
2.6s |
2.6s |
2.7s |
1.8s |
1.8s |
1.7s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
2.3s |
2.3s |
2.3s |
2.3s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
2.3s |
2.3s |
2.3s |
2.3s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len |
2.0s |
2.0s |
2.1s |
2.0s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit |
2.7s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.5s |
2.6s |
2.6s |
2.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.7s |
1.6s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
2.0s |
2.0s |
2.0s |
2.1s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry |
2.5s |
2.4s |
2.5s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
2.0s |
2.0s |
2.0s |
2.1s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_fw_info_digest |
2.6s |
2.6s |
2.7s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.8s |
2.6s |
2.7s |
2.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
2.0s |
2.1s |
2.1s |
2.1s |
1.6s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig |
2.4s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig |
2.6s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.2s |
2.3s |
2.3s |
2.3s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig |
2.6s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.3s |
2.3s |
2.4s |
2.3s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig |
2.3s |
2.3s |
2.3s |
2.3s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig |
2.4s |
2.4s |
2.5s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
2.1s |
2.0s |
2.1s |
2.0s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.1s |
2.2s |
2.1s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| test_sign_with_export_ecdsa::test_sign_with_disabled_attestation |
2.8s |
2.8s |
2.8s |
2.8s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset |
3.6s |
3.6s |
3.6s |
3.6s |
2.9s |
2.9s |
2.9s |
2.8s |
2.9s |
2.9s |
2.9s |
2.9s |
2.5s |
2.5s |
2.6s |
2.5s |
2.6s |
2.5s |
2.5s |
2.5s |
2.5s |
2.4s |
2.5s |
2.4s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent |
3.6s |
3.6s |
3.6s |
3.6s |
2.9s |
2.9s |
2.9s |
2.8s |
2.9s |
2.9s |
2.9s |
2.9s |
2.5s |
2.5s |
2.6s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.4s |
2.5s |
2.5s |
| test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.2s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_sign_with_export_ecdsa::test_sign_with_exported_never_derived |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.3s |
1.3s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.4s |
1.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
| test_stash_measurement::test_pcr31_extended_upon_stash_measurement |
4.3s |
4.3s |
4.3s |
4.3s |
3.5s |
3.5s |
3.5s |
3.5s |
3.6s |
3.6s |
3.5s |
3.6s |
4.1s |
4.0s |
4.2s |
4.3s |
4.1s |
4.0s |
4.0s |
3.9s |
4.0s |
3.9s |
4.0s |
3.9s |
| test_stash_measurement::test_stash_measurement |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
| test_tagging::test_duplicate_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_get_tagged_tci_on_non_existent_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_tagging_a_tagged_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_tagging_default_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.2s |
1.5s |
1.2s |
1.1s |
1.5s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_tagging_destroyed_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.5s |
1.2s |
1.1s |
1.4s |
1.6s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_tagging_inactive_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.3s |
1.3s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_tagging_retired_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
| test_update_reset::test_context_has_tag_validation |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.5s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
| test_update_reset::test_context_tags_validation |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.1s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.1s |
2.3s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
| test_update_reset::test_dpe_validation_deformed_structure |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.2s |
2.2s |
2.2s |
2.3s |
2.2s |
2.2s |
2.1s |
2.2s |
2.1s |
2.1s |
2.1s |
| test_update_reset::test_dpe_validation_illegal_state |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
| test_update_reset::test_dpe_validation_used_context_threshold_exceeded |
2.8s |
2.9s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
| test_update_reset::test_pcr_reset_counter_persistence |
3.5s |
3.6s |
3.5s |
3.5s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
3.1s |
3.0s |
3.2s |
3.0s |
3.1s |
3.0s |
3.0s |
3.0s |
3.0s |
2.9s |
3.0s |
2.9s |
| test_update_reset::test_rt_journey_pcr_updated_in_dpe |
2.7s |
2.7s |
2.6s |
2.7s |
2.2s |
2.1s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
| test_update_reset::test_tags_persistence |
3.5s |
3.6s |
3.5s |
3.5s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
3.1s |
3.0s |
3.1s |
3.0s |
3.0s |
3.0s |
3.0s |
3.0s |
3.0s |
2.9s |
3.0s |
2.9s |
| test_warm_reset::test_mbox_busy_during_warm_reset |
2.3s |
2.3s |
2.7s |
2.7s |
1.9s |
1.8s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
| test_warm_reset::test_mbox_idle_during_warm_reset |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
| test_warm_reset::test_rt_journey_pcr_validation |
2.5s |
2.5s |
2.9s |
2.9s |
2.0s |
2.0s |
2.7s |
2.7s |
2.0s |
2.0s |
2.7s |
2.7s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
| caliptra-size-history::bin/caliptra-size-history |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| git::tests::test_commit_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| bits::tests::test_from_str |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bits::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| lexer::test::test_foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| scope::tests::test_scope_def |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| scope::tests::test_stuff |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| scope::tests::test_type_instantiation |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| string_arena::test::foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-systemrdl::bin/parse |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| crypto::test_derive_ecdsa_key |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_derive_ecdsa_keypair |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_hmac384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_hmac384_drbg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_hmac384_drbg_keygen |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_hmac384_kdf |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_is_valid_privkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_pubkey_ecdsa_der |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_cert_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_derive_fmc_alias_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_derive_pcr0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_doe_output |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_idevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_issuer_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_key_id |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_ldevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| redact::test_redact |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| unwrap_single::test_none |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| unwrap_single::test_single |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| unwrap_single::test_two |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| x509::test_get_cert_extension |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| x509::test_replace_sig |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| x509::test_tcb_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-test-harness |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-test-harness-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-test::caliptra_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| build_test::test_hw_1_0_bin_identical |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.4s |
0.3s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
| fake_collateral_boot_test::fake_boot_test |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
| jtag_test::gdb_test |
6.5s |
6.4s |
6.5s |
6.4s |
6.1s |
6.0s |
6.0s |
6.0s |
6.0s |
6.0s |
5.9s |
5.9s |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| smoke_test::retrieve_csr_test |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.5s |
0.4s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
0.4s |
| smoke_test::smoke_test |
3.3s |
3.2s |
3.3s |
3.2s |
2.4s |
2.4s |
2.4s |
2.4s |
2.5s |
2.5s |
2.5s |
2.4s |
3.1s |
3.1s |
3.0s |
3.2s |
2.5s |
2.5s |
2.4s |
2.5s |
2.6s |
2.4s |
2.4s |
2.5s |
| smoke_test::test_fmc_wdt_timeout |
2.8s |
2.8s |
2.8s |
2.9s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.3s |
2.2s |
2.2s |
2.2s |
2.2s |
2.4s |
2.0s |
2.1s |
2.2s |
| smoke_test::test_golden_idevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| smoke_test::test_golden_ldevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| smoke_test::test_rt_wdt_timeout |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
2.6s |
2.5s |
2.6s |
3.0s |
2.6s |
2.6s |
2.6s |
2.5s |
3.1s |
2.4s |
2.5s |
2.6s |
| test_code_coverage::test_emu_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
8.6s |
6.8s |
8.0s |
7.6s |
7.9s |
7.6s |
8.0s |
7.0s |
8.9s |
7.2s |
7.6s |
7.2s |
| warm_reset::warm_reset_basic |
2.4s |
2.3s |
2.7s |
2.7s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
2.2s |
1.6s |
1.7s |
2.0s |
1.7s |
2.2s |
1.7s |
1.6s |
2.1s |
1.6s |
1.6s |
1.5s |
| warm_reset::warm_reset_during_fw_load |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.9s |
0.7s |
0.7s |
1.0s |
0.7s |
0.9s |
0.7s |
0.7s |
0.9s |
0.6s |
0.7s |
0.6s |
| caliptra-test::fips_test_suite |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| fw_load::corrupted_fw_load_version |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
1.2s |
1.0s |
1.0s |
1.0s |
1.2s |
1.5s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
| fw_load::fw_load_bad_owner_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.1s |
0.9s |
1.3s |
0.9s |
1.3s |
1.1s |
1.3s |
1.1s |
0.8s |
1.1s |
0.9s |
1.2s |
| fw_load::fw_load_bad_owner_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.8s |
1.1s |
0.8s |
1.4s |
0.9s |
1.2s |
1.1s |
0.9s |
1.0s |
0.9s |
1.0s |
| fw_load::fw_load_bad_vendor_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
1.1s |
0.8s |
1.0s |
0.8s |
1.1s |
0.9s |
0.8s |
1.0s |
1.1s |
1.0s |
| fw_load::fw_load_bad_vendor_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.1s |
0.8s |
0.9s |
0.9s |
1.1s |
0.9s |
0.8s |
1.0s |
1.1s |
1.0s |
| fw_load::fw_load_blank_pub_key_hashes |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
1.0s |
0.7s |
0.9s |
0.7s |
0.6s |
0.7s |
0.8s |
0.7s |
| fw_load::fw_load_blank_pub_keys |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
1.1s |
0.8s |
1.3s |
0.9s |
1.1s |
0.9s |
0.8s |
1.1s |
0.8s |
1.1s |
| fw_load::fw_load_error_fmc_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
2.2s |
1.8s |
2.1s |
1.8s |
1.7s |
2.3s |
1.7s |
2.1s |
| fw_load::fw_load_error_fmc_digest_mismatch |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
2.0s |
2.0s |
2.0s |
1.9s |
2.3s |
1.9s |
2.3s |
2.0s |
2.0s |
2.0s |
1.9s |
2.3s |
1.9s |
2.1s |
| fw_load::fw_load_error_fmc_entry_point_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
2.0s |
2.4s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
1.9s |
2.1s |
2.0s |
2.1s |
| fw_load::fw_load_error_fmc_entry_point_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.1s |
1.9s |
1.9s |
2.0s |
1.9s |
| fw_load::fw_load_error_fmc_load_addr_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
1.9s |
1.9s |
2.0s |
1.9s |
| fw_load::fw_load_error_fmc_load_addr_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.0s |
1.9s |
2.0s |
1.9s |
| fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.1s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.5s |
1.8s |
1.9s |
2.0s |
| fw_load::fw_load_error_fmc_runtime_incorrect_order |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.3s |
1.8s |
1.9s |
1.9s |
| fw_load::fw_load_error_fmc_runtime_load_addr_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
2.0s |
2.5s |
1.9s |
1.9s |
1.9s |
| fw_load::fw_load_error_fmc_runtime_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
1.9s |
2.1s |
1.9s |
2.0s |
2.0s |
2.4s |
1.8s |
1.9s |
1.9s |
| fw_load::fw_load_error_fmc_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
| fw_load::fw_load_error_fmc_svn_greater_than_max_supported |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
| fw_load::fw_load_error_fmc_svn_less_than_fuse |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_header_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.6s |
| fw_load::fw_load_error_image_len_more_than_bundle_size |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
2.0s |
2.1s |
1.9s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
| fw_load::fw_load_error_manifest_marker_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.7s |
1.9s |
1.8s |
| fw_load::fw_load_error_manifest_size_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.8s |
1.7s |
| fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.8s |
1.8s |
1.8s |
| fw_load::fw_load_error_owner_ecc_signature_invalid |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.8s |
1.8s |
| fw_load::fw_load_error_owner_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
1.7s |
1.8s |
1.8s |
| fw_load::fw_load_error_owner_ecc_verify_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.8s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.6s |
| fw_load::fw_load_error_owner_lms_signature_invalid |
2.2s |
2.2s |
2.3s |
2.2s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
1.7s |
2.0s |
2.0s |
3.0s |
2.3s |
2.4s |
2.4s |
2.1s |
2.0s |
2.1s |
2.1s |
2.0s |
1.9s |
1.9s |
1.9s |
| fw_load::fw_load_error_owner_lms_verify_failure |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.8s |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.7s |
1.8s |
1.8s |
| fw_load::fw_load_error_owner_pub_key_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.8s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.7s |
1.9s |
1.8s |
1.7s |
1.7s |
1.6s |
1.7s |
| fw_load::fw_load_error_owner_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.9s |
1.6s |
1.8s |
1.7s |
1.8s |
1.7s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
1.9s |
| fw_load::fw_load_error_runtime_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.9s |
1.9s |
1.9s |
1.8s |
1.7s |
1.8s |
2.1s |
| fw_load::fw_load_error_runtime_digest_mismatch |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
2.0s |
1.8s |
1.8s |
2.0s |
2.0s |
2.7s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.0s |
2.1s |
2.6s |
| fw_load::fw_load_error_runtime_entry_point_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
2.1s |
2.5s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.3s |
| fw_load::fw_load_error_runtime_entry_point_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
2.1s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.4s |
| fw_load::fw_load_error_runtime_load_addr_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.9s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
2.1s |
2.2s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| fw_load::fw_load_error_runtime_load_addr_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
2.1s |
2.2s |
2.2s |
2.3s |
2.3s |
2.3s |
2.2s |
2.4s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.1s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_runtime_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.5s |
2.1s |
1.9s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_runtime_svn_greater_than_max_supported |
2.1s |
2.1s |
2.1s |
2.1s |
1.8s |
1.7s |
2.0s |
2.0s |
1.8s |
1.8s |
2.0s |
2.0s |
2.2s |
2.1s |
2.2s |
2.7s |
2.3s |
2.2s |
2.3s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
| fw_load::fw_load_error_runtime_svn_less_than_fuse |
2.1s |
2.1s |
2.1s |
2.1s |
1.8s |
1.7s |
2.0s |
2.0s |
1.8s |
1.8s |
2.0s |
2.0s |
2.2s |
2.2s |
2.2s |
2.7s |
2.3s |
2.2s |
2.3s |
2.2s |
2.1s |
2.1s |
2.2s |
2.1s |
| fw_load::fw_load_error_toc_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.8s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.8s |
1.9s |
1.8s |
1.7s |
1.6s |
1.7s |
1.7s |
| fw_load::fw_load_error_toc_digest_mismatch |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.2s |
2.0s |
1.9s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_toc_entry_count_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_toc_entry_range_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
| fw_load::fw_load_error_update_reset_fmc_digest_mismatch |
3.2s |
3.2s |
3.2s |
3.2s |
2.7s |
2.6s |
2.8s |
2.8s |
2.7s |
2.7s |
2.8s |
2.8s |
3.3s |
3.2s |
3.3s |
3.2s |
3.1s |
3.1s |
3.2s |
3.1s |
3.1s |
3.0s |
3.1s |
3.0s |
| fw_load::fw_load_error_update_reset_owner_digest_failure |
3.0s |
3.0s |
3.0s |
3.0s |
2.4s |
2.4s |
2.7s |
2.7s |
2.5s |
2.5s |
2.7s |
2.7s |
3.0s |
3.0s |
3.1s |
3.0s |
2.9s |
2.8s |
2.9s |
2.9s |
2.9s |
2.8s |
2.9s |
2.8s |
| fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch |
3.1s |
3.1s |
3.1s |
3.1s |
2.5s |
2.5s |
2.8s |
2.8s |
2.6s |
2.6s |
2.8s |
2.8s |
3.1s |
3.0s |
3.2s |
3.1s |
3.1s |
3.0s |
3.0s |
3.0s |
3.1s |
3.0s |
3.0s |
2.9s |
| fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch |
3.5s |
3.4s |
3.4s |
3.4s |
2.6s |
2.6s |
2.8s |
2.8s |
2.6s |
2.6s |
2.8s |
2.8s |
3.9s |
3.8s |
4.1s |
3.9s |
3.1s |
3.0s |
3.1s |
3.2s |
3.1s |
3.0s |
3.1s |
3.0s |
| fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch |
2.0s |
2.0s |
2.2s |
2.2s |
1.7s |
1.7s |
2.1s |
2.1s |
1.8s |
1.7s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
2.4s |
1.9s |
1.8s |
| fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
2.1s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_ecc_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
2.2s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_ecc_signature_invalid |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
2.1s |
1.8s |
1.8s |
| fw_load::fw_load_error_vendor_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
1.8s |
1.8s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_ecc_verify_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.8s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.7s |
| fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch |
2.2s |
2.1s |
2.2s |
2.2s |
1.8s |
1.7s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.2s |
2.1s |
2.2s |
2.1s |
2.1s |
2.0s |
2.0s |
2.1s |
1.9s |
1.9s |
1.9s |
1.9s |
| fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
1.8s |
1.7s |
1.8s |
1.8s |
| fw_load::fw_load_error_vendor_lms_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.7s |
1.8s |
1.8s |
| fw_load::fw_load_error_vendor_lms_signature_invalid |
2.1s |
2.0s |
2.1s |
2.1s |
1.7s |
1.6s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
2.2s |
2.1s |
2.2s |
2.1s |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_vendor_lms_verify_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.8s |
1.9s |
1.8s |
1.7s |
1.7s |
1.7s |
1.6s |
| fw_load::fw_load_error_vendor_pub_key_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.8s |
2.1s |
1.8s |
1.7s |
1.6s |
1.7s |
1.6s |
| fw_load::fw_load_error_vendor_pub_key_digest_invalid |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
2.3s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
| fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
2.2s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.8s |
1.7s |
1.7s |
1.6s |
1.8s |
1.6s |
1.8s |
1.7s |
1.6s |
1.6s |
1.7s |
1.6s |
| jtag_locked::jtag_locked |
2.9s |
2.8s |
3.0s |
2.9s |
2.6s |
2.6s |
2.8s |
2.8s |
2.7s |
2.6s |
2.8s |
2.8s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| security_parameters::attempt_ssp_access_fw_load |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.9s |
0.9s |
0.8s |
0.8s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.2s |
1.0s |
1.0s |
1.1s |
1.0s |
| security_parameters::attempt_ssp_access_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
| security_parameters::attempt_ssp_access_rt |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
| security_parameters::zeroize_check_inaccessible |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
| self_tests::fw_load_halt_check_no_output |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| self_tests::integrity_check_failure_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.4s |
0.4s |
0.4s |
0.4s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
0.5s |
0.5s |
| self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
2.4s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
| self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.4s |
2.2s |
2.4s |
2.3s |
2.3s |
2.3s |
2.4s |
2.3s |
2.2s |
2.2s |
2.2s |
2.1s |
| self_tests::kat_ecc384_signature_generate_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_ecc384_signature_generate_failure_rt |
2.7s |
2.8s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.4s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.2s |
2.1s |
2.1s |
2.1s |
| self_tests::kat_ecc384_signature_verify_failure_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.2s |
1.3s |
| self_tests::kat_ecc384_signature_verify_failure_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.3s |
2.3s |
2.4s |
2.9s |
2.4s |
2.3s |
2.2s |
2.2s |
2.3s |
2.1s |
| self_tests::kat_halt_check_no_output |
n/a |
n/a |
n/a |
n/a |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
n/a |
n/a |
n/a |
n/a |
10.1s |
10.2s |
9.4s |
10.2s |
9.4s |
9.3s |
9.9s |
10.0s |
| self_tests::kat_hmac384_failure_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.8s |
1.4s |
1.6s |
1.2s |
1.3s |
1.3s |
1.3s |
| self_tests::kat_hmac384_failure_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.4s |
2.5s |
2.3s |
2.3s |
3.0s |
2.5s |
2.3s |
3.0s |
2.2s |
2.2s |
2.3s |
2.2s |
| self_tests::kat_hmac384_tag_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.8s |
1.4s |
1.5s |
1.9s |
1.2s |
1.3s |
1.3s |
| self_tests::kat_hmac384_tag_mismatch_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.6s |
2.3s |
2.3s |
2.3s |
2.5s |
2.3s |
2.4s |
2.2s |
2.2s |
2.9s |
2.3s |
| self_tests::kat_lms_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.9s |
1.3s |
1.3s |
1.7s |
1.6s |
| self_tests::kat_lms_digest_mismatch_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.6s |
2.5s |
2.6s |
2.5s |
2.4s |
2.3s |
2.4s |
2.8s |
2.3s |
2.2s |
2.6s |
2.3s |
| self_tests::kat_sha1_digest_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_sha1_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
2.4s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha1_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_sha1_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha256_digest_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| self_tests::kat_sha256_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.4s |
2.3s |
2.1s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha256_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| self_tests::kat_sha256_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.7s |
2.2s |
2.3s |
2.3s |
2.4s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha2_512_384acc_digest_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.4s |
1.4s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
| self_tests::kat_sha2_512_384acc_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.6s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
2.2s |
2.3s |
2.1s |
2.1s |
| self_tests::kat_sha2_512_384acc_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.3s |
1.3s |
1.2s |
1.5s |
1.2s |
1.2s |
| self_tests::kat_sha2_512_384acc_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.1s |
2.5s |
2.3s |
2.3s |
2.3s |
2.4s |
2.3s |
2.2s |
2.3s |
2.1s |
2.1s |
| self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.4s |
1.4s |
1.4s |
1.2s |
1.4s |
1.2s |
1.2s |
| self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.1s |
2.5s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.1s |
2.1s |
2.2s |
2.2s |
| self_tests::kat_sha384_digest_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.3s |
1.3s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_sha384_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.3s |
2.8s |
2.3s |
2.3s |
2.4s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha384_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_sha384_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.3s |
2.7s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| services::check_version_rom |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.4s |
| services::check_version_rt |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
| services::execute_all_services_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
| services::execute_all_services_rt |
3.2s |
3.2s |
3.2s |
3.2s |
2.5s |
2.5s |
2.5s |
2.5s |
2.6s |
2.6s |
2.5s |
2.5s |
2.4s |
2.4s |
2.5s |
2.4s |
2.4s |
2.3s |
2.5s |
2.4s |
2.3s |
2.3s |
2.4s |
2.4s |
| services::fips_self_test_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
| services::fips_self_test_rt |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.8s |
1.8s |
1.8s |
1.7s |
1.8s |
1.7s |
| services::version_info_update |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
| services::zeroize_halt_check_no_output |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
| caliptra-verilated |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_tracing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-x509 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| fmc_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fmc_alias_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fmc_alias_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fmc_alias_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| idevid_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| idevid_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ldevid_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ldevid_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rt_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-zeros::bin/caliptra-zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-zeros::test_zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_zeros |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.7s |
0.6s |
0.6s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
| caliptra_common |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra_registers_generator::bin/caliptra_registers_generator |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| compliance-test::bin/compliance-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| exec::tests::test_exec_process_not_found |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exec::tests::test_exec_process_returned_nonzero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exec::tests::test_exec_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_create_dir_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_create_dir_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_read_and_write_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_read_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_tempdir_delete_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_tempdir_deleted |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_tempfile |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_tempfile_drop_on_panic |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_write_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_check_reference_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ureg |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_of_arrays |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_of_arrays_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_truncate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_truncate_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ureg-codegen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| camel_ident_tests::test_camel_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| generate_enums_test::test_generate_enums |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| snake_ident_tests::test_snake_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ureg-schema |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| registerfield_tests::test_mask |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| validate::compute_reg_type_name_tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ureg-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| vector_gen::bin/vector_gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 112.93s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 112.47s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 110.10s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 111.42s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 70.92s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 70.08s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 70.02s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 72.06s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 69.85s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 70.96s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 71.13s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 71.12s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.09s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,530 writing to cptra_bootfsm_go
19,980 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,879 UART: csrng::test_entropy_src_seed...[ok]
439,121 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
19,950 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
435,041 UART: csrng::test_entropy_src_seed...[ok]
439,261 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
19,859 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,875 UART: csrng::test_entropy_src_seed...[ok]
438,955 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
19,749 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,613 UART: csrng::test_entropy_src_seed...[ok]
438,844 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
19,900 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,575 UART: csrng::test_entropy_src_seed...[ok]
438,864 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,441 writing to cptra_bootfsm_go
19,840 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,767 UART: csrng::test_entropy_src_seed...[ok]
439,012 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
16,856 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
16,857 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
16,551 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
16,757 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,017 writing to cptra_bootfsm_go
17,535 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
16,647 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
16,055 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
15,787 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
16,047 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
16,084 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
15,934 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
15,907 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
16,005 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
16,008 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,526 writing to cptra_bootfsm_go
16,175 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
15,960 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
16,155 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
16,026 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
15,852 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
16,005 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
15,930 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
16,071 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
15,910 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
16,004 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
16,184 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
15,986 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
15,711 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
15,754 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
15,917 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
15,997 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
15,923 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
15,804 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
15,960 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
16,112 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
15,922 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
15,796 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
15,969 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
15,960 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
15,999 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
15,728 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
16,132 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
16,094 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
15,738 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
15,887 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
15,873 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
15,938 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
15,860 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
15,651 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
16,000 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
16,115 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
15,872 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
15,859 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
16,549 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
15,957 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
16,095 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
15,945 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
16,061 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
16,228 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
16,120 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
15,766 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,468 writing to cptra_bootfsm_go
16,443 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
15,988 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
16,211 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
15,905 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
17,118 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
16,185 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
15,982 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
16,025 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
15,907 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
16,015 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
16,111 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
15,895 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
15,889 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
15,904 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
15,773 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
15,883 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
16,009 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
16,196 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
16,157 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
16,011 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
15,863 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
15,828 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
15,898 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
16,109 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
16,175 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
16,032 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
16,095 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
15,733 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
15,948 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
15,866 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
15,924 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
16,273 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
16,164 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
15,976 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
15,898 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
15,877 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
21,812 UART: doe::test_decrypt...[ok]
13,261,015 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
21,787 UART: doe::test_decrypt...[ok]
13,266,174 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
21,972 UART: doe::test_decrypt...[ok]
13,458,953 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
22,101 UART: doe::test_decrypt...[ok]
13,458,092 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
21,742 UART: doe::test_decrypt...[ok]
9,943,691 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
21,863 UART: doe::test_decrypt...[ok]
9,937,768 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,616 writing to cptra_bootfsm_go
22,315 UART: doe::test_decrypt...[ok]
10,195,517 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
21,905 UART: doe::test_decrypt...[ok]
10,200,822 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
21,698 UART: doe::test_decrypt...[ok]
9,943,722 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
21,750 UART: doe::test_decrypt...[ok]
9,942,537 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
22,194 UART: doe::test_decrypt...[ok]
10,199,381 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
21,887 UART: doe::test_decrypt...[ok]
10,196,199 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,561 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,697 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,581 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,205 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,863 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,661 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
48,007 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,757 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,323 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,205 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
48,153 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,735 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
22,197 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
22,345 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
22,569 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,758 writing to cptra_bootfsm_go
26,129 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
22,091 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
22,121 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
22,542 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
22,294 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
22,111 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
22,160 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,446 writing to cptra_bootfsm_go
22,838 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,322 writing to cptra_bootfsm_go
33,580 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
29,425 UART: ecc384::test_kat...[ok]
3,329,016 UART: ecc384::test_gen_key_pair...[ok]
6,616,188 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,898,597 UART: ecc384::test_sign...[ok]
12,196,882 UART: ecc384::test_verify...[ok]
15,794,716 UART: ecc384::test_verify_r...[ok]
19,374,197 UART: ecc384::test_verify_failure...[ok]
22,958,978 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,834,493 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
40,004,138 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,600 writing to cptra_bootfsm_go
31,204 UART: ecc384::test_kat...[ok]
3,331,817 UART: ecc384::test_gen_key_pair...[ok]
6,616,333 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,898,520 UART: ecc384::test_sign...[ok]
12,195,923 UART: ecc384::test_verify...[ok]
15,790,266 UART: ecc384::test_verify_r...[ok]
19,370,250 UART: ecc384::test_verify_failure...[ok]
22,954,353 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,829,363 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
40,000,415 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,911 writing to cptra_bootfsm_go
31,604 UART: ecc384::test_kat...[ok]
3,701,463 UART: ecc384::test_gen_key_pair...[ok]
6,960,282 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,213,771 UART: ecc384::test_sign...[ok]
12,500,910 UART: ecc384::test_verify...[ok]
16,082,947 UART: ecc384::test_verify_r...[ok]
23,848,023 UART: ecc384::test_verify_failure...[ok]
27,427,755 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,260,984 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,350,086 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
29,879 UART: ecc384::test_kat...[ok]
3,699,635 UART: ecc384::test_gen_key_pair...[ok]
6,959,102 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,217,719 UART: ecc384::test_sign...[ok]
12,503,301 UART: ecc384::test_verify...[ok]
16,084,488 UART: ecc384::test_verify_r...[ok]
23,840,364 UART: ecc384::test_verify_failure...[ok]
27,419,570 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,254,788 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,340,694 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
29,778 UART: ecc384::test_kat...[ok]
2,497,631 UART: ecc384::test_gen_key_pair...[ok]
4,952,962 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,404,793 UART: ecc384::test_sign...[ok]
9,126,960 UART: ecc384::test_verify...[ok]
11,822,053 UART: ecc384::test_verify_r...[ok]
14,506,758 UART: ecc384::test_verify_failure...[ok]
17,196,560 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,337,493 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,936,661 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
29,551 UART: ecc384::test_kat...[ok]
2,498,561 UART: ecc384::test_gen_key_pair...[ok]
4,953,178 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,405,196 UART: ecc384::test_sign...[ok]
9,125,723 UART: ecc384::test_verify...[ok]
11,821,549 UART: ecc384::test_verify_r...[ok]
14,505,604 UART: ecc384::test_verify_failure...[ok]
17,195,911 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,335,807 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,933,456 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,089 writing to cptra_bootfsm_go
31,670 UART: ecc384::test_kat...[ok]
2,880,790 UART: ecc384::test_gen_key_pair...[ok]
5,325,003 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,764,538 UART: ecc384::test_sign...[ok]
9,477,008 UART: ecc384::test_verify...[ok]
12,154,093 UART: ecc384::test_verify_r...[ok]
14,832,662 UART: ecc384::test_verify_failure...[ok]
22,940,594 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,060,512 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,607,551 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
29,924 UART: ecc384::test_kat...[ok]
2,881,716 UART: ecc384::test_gen_key_pair...[ok]
5,326,793 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,767,456 UART: ecc384::test_sign...[ok]
9,479,488 UART: ecc384::test_verify...[ok]
12,158,093 UART: ecc384::test_verify_r...[ok]
14,835,201 UART: ecc384::test_verify_failure...[ok]
22,937,491 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,051,579 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,605,454 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,793 writing to cptra_bootfsm_go
30,366 UART: ecc384::test_kat...[ok]
2,494,814 UART: ecc384::test_gen_key_pair...[ok]
4,954,080 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,404,979 UART: ecc384::test_sign...[ok]
9,130,968 UART: ecc384::test_verify...[ok]
11,824,038 UART: ecc384::test_verify_r...[ok]
14,507,656 UART: ecc384::test_verify_failure...[ok]
17,197,549 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,341,948 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,936,130 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
29,753 UART: ecc384::test_kat...[ok]
2,496,870 UART: ecc384::test_gen_key_pair...[ok]
4,951,106 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,403,830 UART: ecc384::test_sign...[ok]
9,125,050 UART: ecc384::test_verify...[ok]
11,819,741 UART: ecc384::test_verify_r...[ok]
14,503,575 UART: ecc384::test_verify_failure...[ok]
17,195,294 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,338,686 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,928,487 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
29,946 UART: ecc384::test_kat...[ok]
2,884,270 UART: ecc384::test_gen_key_pair...[ok]
5,326,452 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,768,329 UART: ecc384::test_sign...[ok]
9,481,303 UART: ecc384::test_verify...[ok]
12,159,735 UART: ecc384::test_verify_r...[ok]
14,834,593 UART: ecc384::test_verify_failure...[ok]
22,934,606 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,049,486 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,607,083 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
29,782 UART: ecc384::test_kat...[ok]
2,881,100 UART: ecc384::test_gen_key_pair...[ok]
5,323,766 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,766,146 UART: ecc384::test_sign...[ok]
9,477,766 UART: ecc384::test_verify...[ok]
12,158,151 UART: ecc384::test_verify_r...[ok]
14,836,439 UART: ecc384::test_verify_failure...[ok]
22,936,240 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,053,199 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,608,418 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,131 UART: ecc384::test_gen_key_pair...[ok]
25,107 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,263 UART: ecc384::test_sign...[ok]
41,885 UART: ecc384::test_verify...[ok]
50,863 UART: ecc384::test_verify_r...[ok]
59,552 UART: ecc384::test_verify_failure...[ok]
68,672 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,308 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,739 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,587 UART: ecc384::test_gen_key_pair...[ok]
25,531 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,105 UART: ecc384::test_sign...[ok]
42,567 UART: ecc384::test_verify...[ok]
51,843 UART: ecc384::test_verify_r...[ok]
60,062 UART: ecc384::test_verify_failure...[ok]
69,248 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,706 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,505 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,339 UART: ecc384::test_gen_key_pair...[ok]
25,299 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,843 UART: ecc384::test_sign...[ok]
42,843 UART: ecc384::test_verify...[ok]
51,985 UART: ecc384::test_verify_r...[ok]
60,480 UART: ecc384::test_verify_failure...[ok]
69,264 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,672 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,767 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,087 UART: ecc384::test_gen_key_pair...[ok]
26,379 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,721 UART: ecc384::test_sign...[ok]
43,509 UART: ecc384::test_verify...[ok]
52,751 UART: ecc384::test_verify_r...[ok]
61,608 UART: ecc384::test_verify_failure...[ok]
70,690 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,064 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,905 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,521 UART: ecc384::test_gen_key_pair...[ok]
25,579 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,667 UART: ecc384::test_sign...[ok]
42,493 UART: ecc384::test_verify...[ok]
51,485 UART: ecc384::test_verify_r...[ok]
59,672 UART: ecc384::test_verify_failure...[ok]
68,556 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,056 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,251 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,263 UART: ecc384::test_gen_key_pair...[ok]
24,725 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,285 UART: ecc384::test_sign...[ok]
41,823 UART: ecc384::test_verify...[ok]
50,945 UART: ecc384::test_verify_r...[ok]
59,972 UART: ecc384::test_verify_failure...[ok]
68,748 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
86,864 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,191 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,719 UART: ecc384::test_gen_key_pair...[ok]
25,807 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,135 UART: ecc384::test_sign...[ok]
43,325 UART: ecc384::test_verify...[ok]
52,877 UART: ecc384::test_verify_r...[ok]
61,812 UART: ecc384::test_verify_failure...[ok]
70,538 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,684 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,993 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,743 UART: ecc384::test_gen_key_pair...[ok]
26,169 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,691 UART: ecc384::test_sign...[ok]
43,389 UART: ecc384::test_verify...[ok]
52,529 UART: ecc384::test_verify_r...[ok]
61,060 UART: ecc384::test_verify_failure...[ok]
69,712 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,286 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,071 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,593 UART: ecc384::test_gen_key_pair...[ok]
25,759 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,937 UART: ecc384::test_sign...[ok]
42,781 UART: ecc384::test_verify...[ok]
51,781 UART: ecc384::test_verify_r...[ok]
60,382 UART: ecc384::test_verify_failure...[ok]
68,716 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,184 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,769 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,701 UART: ecc384::test_gen_key_pair...[ok]
25,669 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,701 UART: ecc384::test_sign...[ok]
42,661 UART: ecc384::test_verify...[ok]
52,097 UART: ecc384::test_verify_r...[ok]
60,854 UART: ecc384::test_verify_failure...[ok]
69,664 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,990 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,607 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,917 UART: ecc384::test_gen_key_pair...[ok]
26,479 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,889 UART: ecc384::test_sign...[ok]
43,887 UART: ecc384::test_verify...[ok]
53,289 UART: ecc384::test_verify_r...[ok]
61,934 UART: ecc384::test_verify_failure...[ok]
71,018 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,680 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,675 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,817 UART: ecc384::test_gen_key_pair...[ok]
25,963 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,255 UART: ecc384::test_sign...[ok]
42,739 UART: ecc384::test_verify...[ok]
51,491 UART: ecc384::test_verify_r...[ok]
60,018 UART: ecc384::test_verify_failure...[ok]
69,270 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,662 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,429 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
19,296 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
19,440 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
19,516 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
19,844 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
19,377 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
19,263 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
19,794 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
19,726 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
19,437 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
19,503 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
19,969 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
19,615 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
13,618 UART: error_reporter::test_report_fw_error...[ok]
16,588 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,729 writing to cptra_bootfsm_go
14,508 UART: error_reporter::test_report_fw_error...[ok]
17,509 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
14,074 UART: error_reporter::test_report_fw_error...[ok]
17,064 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
13,831 UART: error_reporter::test_report_fw_error...[ok]
16,907 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,837 writing to cptra_bootfsm_go
13,512 UART: error_reporter::test_report_fw_error...[ok]
16,473 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
13,754 UART: error_reporter::test_report_fw_error...[ok]
16,781 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
14,134 UART: error_reporter::test_report_fw_error...[ok]
17,072 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
13,814 UART: error_reporter::test_report_fw_error...[ok]
16,790 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
13,671 UART: error_reporter::test_report_fw_error...[ok]
16,628 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,828 writing to cptra_bootfsm_go
13,616 UART: error_reporter::test_report_fw_error...[ok]
16,560 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
14,080 UART: error_reporter::test_report_fw_error...[ok]
17,054 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
14,134 UART: error_reporter::test_report_fw_error...[ok]
17,112 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
30,681 UART: hmac384::test_kat...[ok]
71,797 UART: hmac384::test_hmac0...[ok]
88,511 UART: hmac384::test_hmac1...[ok]
110,062 UART: hmac384::test_hmac2...[ok]
6,697,674 UART: hmac384::test_hmac3...[ok]
13,269,403 UART: hmac384::test_hmac4...[ok]
19,860,374 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,427,130 UART: hmac384::test_hmac5...[ok]
29,797,243 UART: hmac384::test_kdf0...[ok]
33,124,428 UART: hmac384::test_kdf1...[ok]
36,450,385 UART: hmac384::test_kdf2...[ok]
36,478,996 UART: hmac384::test_hmac_multi_block...[ok]
36,497,204 UART: hmac384::test_hmac_exact_single_block...[ok]
36,519,234 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
30,952 UART: hmac384::test_kat...[ok]
70,120 UART: hmac384::test_hmac0...[ok]
88,005 UART: hmac384::test_hmac1...[ok]
109,287 UART: hmac384::test_hmac2...[ok]
6,700,259 UART: hmac384::test_hmac3...[ok]
13,289,578 UART: hmac384::test_hmac4...[ok]
19,879,978 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,471,933 UART: hmac384::test_hmac5...[ok]
29,839,722 UART: hmac384::test_kdf0...[ok]
33,165,379 UART: hmac384::test_kdf1...[ok]
36,493,991 UART: hmac384::test_kdf2...[ok]
36,522,922 UART: hmac384::test_hmac_multi_block...[ok]
36,539,460 UART: hmac384::test_hmac_exact_single_block...[ok]
36,562,113 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
31,017 UART: hmac384::test_kat...[ok]
455,861 UART: hmac384::test_hmac0...[ok]
654,057 UART: hmac384::test_hmac1...[ok]
857,960 UART: hmac384::test_hmac2...[ok]
7,560,500 UART: hmac384::test_hmac3...[ok]
14,071,181 UART: hmac384::test_hmac4...[ok]
20,580,896 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,094,349 UART: hmac384::test_hmac5...[ok]
30,373,874 UART: hmac384::test_kdf0...[ok]
33,640,698 UART: hmac384::test_kdf1...[ok]
36,909,019 UART: hmac384::test_kdf2...[ok]
36,924,060 UART: hmac384::test_hmac_multi_block...[ok]
40,321,649 UART: hmac384::test_hmac_exact_single_block...[ok]
40,526,250 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
31,033 UART: hmac384::test_kat...[ok]
455,673 UART: hmac384::test_hmac0...[ok]
652,830 UART: hmac384::test_hmac1...[ok]
857,630 UART: hmac384::test_hmac2...[ok]
7,561,965 UART: hmac384::test_hmac3...[ok]
14,069,066 UART: hmac384::test_hmac4...[ok]
20,579,015 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,091,738 UART: hmac384::test_hmac5...[ok]
30,367,372 UART: hmac384::test_kdf0...[ok]
33,637,499 UART: hmac384::test_kdf1...[ok]
36,907,656 UART: hmac384::test_kdf2...[ok]
36,923,876 UART: hmac384::test_hmac_multi_block...[ok]
40,336,242 UART: hmac384::test_hmac_exact_single_block...[ok]
40,541,481 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
30,864 UART: hmac384::test_kat...[ok]
70,456 UART: hmac384::test_hmac0...[ok]
87,846 UART: hmac384::test_hmac1...[ok]
107,907 UART: hmac384::test_hmac2...[ok]
5,033,134 UART: hmac384::test_hmac3...[ok]
9,959,892 UART: hmac384::test_hmac4...[ok]
14,885,190 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,813,722 UART: hmac384::test_hmac5...[ok]
22,351,887 UART: hmac384::test_kdf0...[ok]
24,849,314 UART: hmac384::test_kdf1...[ok]
27,344,954 UART: hmac384::test_kdf2...[ok]
27,372,484 UART: hmac384::test_hmac_multi_block...[ok]
27,390,248 UART: hmac384::test_hmac_exact_single_block...[ok]
27,410,537 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,180 writing to cptra_bootfsm_go
31,956 UART: hmac384::test_kat...[ok]
72,000 UART: hmac384::test_hmac0...[ok]
88,631 UART: hmac384::test_hmac1...[ok]
109,526 UART: hmac384::test_hmac2...[ok]
5,037,625 UART: hmac384::test_hmac3...[ok]
9,964,325 UART: hmac384::test_hmac4...[ok]
14,891,100 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,816,577 UART: hmac384::test_hmac5...[ok]
22,355,111 UART: hmac384::test_kdf0...[ok]
24,849,907 UART: hmac384::test_kdf1...[ok]
27,346,329 UART: hmac384::test_kdf2...[ok]
27,375,482 UART: hmac384::test_hmac_multi_block...[ok]
27,392,089 UART: hmac384::test_hmac_exact_single_block...[ok]
27,414,880 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
31,052 UART: hmac384::test_kat...[ok]
455,636 UART: hmac384::test_hmac0...[ok]
653,451 UART: hmac384::test_hmac1...[ok]
858,546 UART: hmac384::test_hmac2...[ok]
5,929,778 UART: hmac384::test_hmac3...[ok]
10,809,227 UART: hmac384::test_hmac4...[ok]
15,682,891 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,564,670 UART: hmac384::test_hmac5...[ok]
23,027,216 UART: hmac384::test_kdf0...[ok]
25,482,241 UART: hmac384::test_kdf1...[ok]
27,935,214 UART: hmac384::test_kdf2...[ok]
27,951,036 UART: hmac384::test_hmac_multi_block...[ok]
27,963,499 UART: hmac384::test_hmac_exact_single_block...[ok]
27,977,251 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
30,909 UART: hmac384::test_kat...[ok]
456,793 UART: hmac384::test_hmac0...[ok]
653,013 UART: hmac384::test_hmac1...[ok]
857,290 UART: hmac384::test_hmac2...[ok]
5,928,834 UART: hmac384::test_hmac3...[ok]
10,806,304 UART: hmac384::test_hmac4...[ok]
15,686,601 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,568,942 UART: hmac384::test_hmac5...[ok]
23,032,049 UART: hmac384::test_kdf0...[ok]
25,491,529 UART: hmac384::test_kdf1...[ok]
27,945,541 UART: hmac384::test_kdf2...[ok]
27,959,505 UART: hmac384::test_hmac_multi_block...[ok]
27,971,203 UART: hmac384::test_hmac_exact_single_block...[ok]
27,982,673 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
30,680 UART: hmac384::test_kat...[ok]
71,607 UART: hmac384::test_hmac0...[ok]
87,816 UART: hmac384::test_hmac1...[ok]
108,308 UART: hmac384::test_hmac2...[ok]
5,036,596 UART: hmac384::test_hmac3...[ok]
9,960,280 UART: hmac384::test_hmac4...[ok]
14,889,082 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,819,328 UART: hmac384::test_hmac5...[ok]
22,355,584 UART: hmac384::test_kdf0...[ok]
24,850,327 UART: hmac384::test_kdf1...[ok]
27,347,331 UART: hmac384::test_kdf2...[ok]
27,374,589 UART: hmac384::test_hmac_multi_block...[ok]
27,392,859 UART: hmac384::test_hmac_exact_single_block...[ok]
27,413,992 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
30,639 UART: hmac384::test_kat...[ok]
70,524 UART: hmac384::test_hmac0...[ok]
87,368 UART: hmac384::test_hmac1...[ok]
108,550 UART: hmac384::test_hmac2...[ok]
5,014,314 UART: hmac384::test_hmac3...[ok]
9,943,507 UART: hmac384::test_hmac4...[ok]
14,871,270 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,797,563 UART: hmac384::test_hmac5...[ok]
22,333,882 UART: hmac384::test_kdf0...[ok]
24,830,836 UART: hmac384::test_kdf1...[ok]
27,326,172 UART: hmac384::test_kdf2...[ok]
27,354,162 UART: hmac384::test_hmac_multi_block...[ok]
27,371,668 UART: hmac384::test_hmac_exact_single_block...[ok]
27,394,537 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
31,016 UART: hmac384::test_kat...[ok]
455,576 UART: hmac384::test_hmac0...[ok]
652,529 UART: hmac384::test_hmac1...[ok]
858,243 UART: hmac384::test_hmac2...[ok]
5,926,439 UART: hmac384::test_hmac3...[ok]
10,803,917 UART: hmac384::test_hmac4...[ok]
15,682,028 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,562,846 UART: hmac384::test_hmac5...[ok]
23,022,896 UART: hmac384::test_kdf0...[ok]
25,478,838 UART: hmac384::test_kdf1...[ok]
27,931,946 UART: hmac384::test_kdf2...[ok]
27,948,260 UART: hmac384::test_hmac_multi_block...[ok]
27,960,027 UART: hmac384::test_hmac_exact_single_block...[ok]
27,972,922 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
30,960 UART: hmac384::test_kat...[ok]
456,353 UART: hmac384::test_hmac0...[ok]
653,061 UART: hmac384::test_hmac1...[ok]
857,855 UART: hmac384::test_hmac2...[ok]
5,929,451 UART: hmac384::test_hmac3...[ok]
10,807,658 UART: hmac384::test_hmac4...[ok]
15,687,369 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,569,044 UART: hmac384::test_hmac5...[ok]
23,033,012 UART: hmac384::test_kdf0...[ok]
25,487,832 UART: hmac384::test_kdf1...[ok]
27,943,562 UART: hmac384::test_kdf2...[ok]
27,959,317 UART: hmac384::test_hmac_multi_block...[ok]
27,971,574 UART: hmac384::test_hmac_exact_single_block...[ok]
27,983,051 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,595 UART: hmac384::test_hmac0...[ok]
13,589 UART: hmac384::test_hmac1...[ok]
17,587 UART: hmac384::test_hmac2...[ok]
37,225 UART: hmac384::test_hmac3...[ok]
57,096 UART: hmac384::test_hmac4...[ok]
77,140 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,488 UART: hmac384::test_hmac5...[ok]
120,192 UART: hmac384::test_kdf0...[ok]
136,978 UART: hmac384::test_kdf1...[ok]
152,476 UART: hmac384::test_kdf2...[ok]
158,164 UART: hmac384::test_hmac_multi_block...[ok]
163,930 UART: hmac384::test_hmac_exact_single_block...[ok]
169,843 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,625 UART: hmac384::test_hmac0...[ok]
13,665 UART: hmac384::test_hmac1...[ok]
17,641 UART: hmac384::test_hmac2...[ok]
37,227 UART: hmac384::test_hmac3...[ok]
56,404 UART: hmac384::test_hmac4...[ok]
76,946 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,906 UART: hmac384::test_hmac5...[ok]
120,024 UART: hmac384::test_kdf0...[ok]
136,966 UART: hmac384::test_kdf1...[ok]
152,970 UART: hmac384::test_kdf2...[ok]
158,562 UART: hmac384::test_hmac_multi_block...[ok]
164,298 UART: hmac384::test_hmac_exact_single_block...[ok]
170,163 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,073 UART: hmac384::test_hmac0...[ok]
14,201 UART: hmac384::test_hmac1...[ok]
18,259 UART: hmac384::test_hmac2...[ok]
38,407 UART: hmac384::test_hmac3...[ok]
58,832 UART: hmac384::test_hmac4...[ok]
79,228 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,636 UART: hmac384::test_hmac5...[ok]
123,482 UART: hmac384::test_kdf0...[ok]
139,980 UART: hmac384::test_kdf1...[ok]
155,952 UART: hmac384::test_kdf2...[ok]
161,872 UART: hmac384::test_hmac_multi_block...[ok]
167,702 UART: hmac384::test_hmac_exact_single_block...[ok]
173,755 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,971 UART: hmac384::test_hmac0...[ok]
14,103 UART: hmac384::test_hmac1...[ok]
18,143 UART: hmac384::test_hmac2...[ok]
38,247 UART: hmac384::test_hmac3...[ok]
58,310 UART: hmac384::test_hmac4...[ok]
78,284 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,272 UART: hmac384::test_hmac5...[ok]
122,448 UART: hmac384::test_kdf0...[ok]
139,334 UART: hmac384::test_kdf1...[ok]
155,232 UART: hmac384::test_kdf2...[ok]
160,964 UART: hmac384::test_hmac_multi_block...[ok]
166,840 UART: hmac384::test_hmac_exact_single_block...[ok]
172,977 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,562 UART: hmac384::test_hmac0...[ok]
13,893 UART: hmac384::test_hmac1...[ok]
18,002 UART: hmac384::test_hmac2...[ok]
38,343 UART: hmac384::test_hmac3...[ok]
58,033 UART: hmac384::test_hmac4...[ok]
78,262 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,153 UART: hmac384::test_hmac5...[ok]
122,481 UART: hmac384::test_kdf0...[ok]
139,245 UART: hmac384::test_kdf1...[ok]
154,945 UART: hmac384::test_kdf2...[ok]
160,784 UART: hmac384::test_hmac_multi_block...[ok]
166,675 UART: hmac384::test_hmac_exact_single_block...[ok]
172,833 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,836 UART: hmac384::test_hmac0...[ok]
14,003 UART: hmac384::test_hmac1...[ok]
18,054 UART: hmac384::test_hmac2...[ok]
37,973 UART: hmac384::test_hmac3...[ok]
57,475 UART: hmac384::test_hmac4...[ok]
77,402 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,339 UART: hmac384::test_hmac5...[ok]
121,383 UART: hmac384::test_kdf0...[ok]
138,447 UART: hmac384::test_kdf1...[ok]
154,091 UART: hmac384::test_kdf2...[ok]
159,602 UART: hmac384::test_hmac_multi_block...[ok]
165,553 UART: hmac384::test_hmac_exact_single_block...[ok]
171,641 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,034 UART: hmac384::test_hmac0...[ok]
14,235 UART: hmac384::test_hmac1...[ok]
18,726 UART: hmac384::test_hmac2...[ok]
39,827 UART: hmac384::test_hmac3...[ok]
59,945 UART: hmac384::test_hmac4...[ok]
80,078 UART: hmac384::test_hmac_kv_multiblock...[ok]
104,299 UART: hmac384::test_hmac5...[ok]
124,421 UART: hmac384::test_kdf0...[ok]
141,251 UART: hmac384::test_kdf1...[ok]
157,625 UART: hmac384::test_kdf2...[ok]
163,520 UART: hmac384::test_hmac_multi_block...[ok]
169,485 UART: hmac384::test_hmac_exact_single_block...[ok]
175,827 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,078 UART: hmac384::test_hmac0...[ok]
14,381 UART: hmac384::test_hmac1...[ok]
18,794 UART: hmac384::test_hmac2...[ok]
38,901 UART: hmac384::test_hmac3...[ok]
58,997 UART: hmac384::test_hmac4...[ok]
79,274 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,535 UART: hmac384::test_hmac5...[ok]
124,389 UART: hmac384::test_kdf0...[ok]
141,527 UART: hmac384::test_kdf1...[ok]
157,419 UART: hmac384::test_kdf2...[ok]
163,224 UART: hmac384::test_hmac_multi_block...[ok]
169,365 UART: hmac384::test_hmac_exact_single_block...[ok]
175,637 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,752 UART: hmac384::test_hmac0...[ok]
13,825 UART: hmac384::test_hmac1...[ok]
18,208 UART: hmac384::test_hmac2...[ok]
37,925 UART: hmac384::test_hmac3...[ok]
58,137 UART: hmac384::test_hmac4...[ok]
78,008 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,805 UART: hmac384::test_hmac5...[ok]
121,519 UART: hmac384::test_kdf0...[ok]
138,319 UART: hmac384::test_kdf1...[ok]
154,111 UART: hmac384::test_kdf2...[ok]
159,830 UART: hmac384::test_hmac_multi_block...[ok]
165,727 UART: hmac384::test_hmac_exact_single_block...[ok]
171,739 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,776 UART: hmac384::test_hmac0...[ok]
13,913 UART: hmac384::test_hmac1...[ok]
18,226 UART: hmac384::test_hmac2...[ok]
37,505 UART: hmac384::test_hmac3...[ok]
57,345 UART: hmac384::test_hmac4...[ok]
77,154 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,263 UART: hmac384::test_hmac5...[ok]
121,189 UART: hmac384::test_kdf0...[ok]
137,783 UART: hmac384::test_kdf1...[ok]
153,033 UART: hmac384::test_kdf2...[ok]
158,660 UART: hmac384::test_hmac_multi_block...[ok]
164,599 UART: hmac384::test_hmac_exact_single_block...[ok]
170,773 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,916 UART: hmac384::test_hmac0...[ok]
14,129 UART: hmac384::test_hmac1...[ok]
18,410 UART: hmac384::test_hmac2...[ok]
38,583 UART: hmac384::test_hmac3...[ok]
59,517 UART: hmac384::test_hmac4...[ok]
78,982 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,003 UART: hmac384::test_hmac5...[ok]
123,671 UART: hmac384::test_kdf0...[ok]
140,949 UART: hmac384::test_kdf1...[ok]
157,039 UART: hmac384::test_kdf2...[ok]
163,012 UART: hmac384::test_hmac_multi_block...[ok]
169,119 UART: hmac384::test_hmac_exact_single_block...[ok]
175,499 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,994 UART: hmac384::test_hmac0...[ok]
14,111 UART: hmac384::test_hmac1...[ok]
18,510 UART: hmac384::test_hmac2...[ok]
38,479 UART: hmac384::test_hmac3...[ok]
59,017 UART: hmac384::test_hmac4...[ok]
80,118 UART: hmac384::test_hmac_kv_multiblock...[ok]
104,641 UART: hmac384::test_hmac5...[ok]
124,843 UART: hmac384::test_kdf0...[ok]
142,175 UART: hmac384::test_kdf1...[ok]
157,885 UART: hmac384::test_kdf2...[ok]
163,522 UART: hmac384::test_hmac_multi_block...[ok]
169,663 UART: hmac384::test_hmac_exact_single_block...[ok]
175,957 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,010 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
15,060 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,624 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,577 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
23,836 UART: test_lms_24::test_coefficient...[ok]
26,580 UART: test_lms_24::test_get_lms_parameters...[ok]
29,639 UART: test_lms_24::test_hash_message_24...[ok]
42,456 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
24,051 UART: test_lms_24::test_coefficient...[ok]
26,796 UART: test_lms_24::test_get_lms_parameters...[ok]
29,844 UART: test_lms_24::test_hash_message_24...[ok]
42,661 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
24,098 UART: test_lms_24::test_coefficient...[ok]
26,849 UART: test_lms_24::test_get_lms_parameters...[ok]
29,903 UART: test_lms_24::test_hash_message_24...[ok]
42,758 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,632 writing to cptra_bootfsm_go
24,523 UART: test_lms_24::test_coefficient...[ok]
27,285 UART: test_lms_24::test_get_lms_parameters...[ok]
30,318 UART: test_lms_24::test_hash_message_24...[ok]
43,123 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
24,010 UART: test_lms_24::test_coefficient...[ok]
26,755 UART: test_lms_24::test_get_lms_parameters...[ok]
29,830 UART: test_lms_24::test_hash_message_24...[ok]
42,636 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
23,778 UART: test_lms_24::test_coefficient...[ok]
26,538 UART: test_lms_24::test_get_lms_parameters...[ok]
29,543 UART: test_lms_24::test_hash_message_24...[ok]
42,421 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
24,093 UART: test_lms_24::test_coefficient...[ok]
26,840 UART: test_lms_24::test_get_lms_parameters...[ok]
29,855 UART: test_lms_24::test_hash_message_24...[ok]
42,697 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
24,217 UART: test_lms_24::test_coefficient...[ok]
26,917 UART: test_lms_24::test_get_lms_parameters...[ok]
30,830 UART: test_lms_24::test_hash_message_24...[ok]
42,808 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,472 writing to cptra_bootfsm_go
24,358 UART: test_lms_24::test_coefficient...[ok]
27,107 UART: test_lms_24::test_get_lms_parameters...[ok]
30,180 UART: test_lms_24::test_hash_message_24...[ok]
42,992 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
23,950 UART: test_lms_24::test_coefficient...[ok]
26,690 UART: test_lms_24::test_get_lms_parameters...[ok]
29,743 UART: test_lms_24::test_hash_message_24...[ok]
42,565 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
24,257 UART: test_lms_24::test_coefficient...[ok]
26,998 UART: test_lms_24::test_get_lms_parameters...[ok]
30,055 UART: test_lms_24::test_hash_message_24...[ok]
42,921 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
24,132 UART: test_lms_24::test_coefficient...[ok]
26,927 UART: test_lms_24::test_get_lms_parameters...[ok]
29,957 UART: test_lms_24::test_hash_message_24...[ok]
42,804 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
24,150 UART: test_lms_32::test_hash_message_32...[ok]
43,001 UART: test_lms_32::test_ots_32...[ok]
20,102,025 UART: test_lms_32::test_lms_lower_32...[ok]
60,344,179 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
23,762 UART: test_lms_32::test_hash_message_32...[ok]
42,673 UART: test_lms_32::test_ots_32...[ok]
20,101,601 UART: test_lms_32::test_lms_lower_32...[ok]
60,343,909 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
24,100 UART: test_lms_32::test_hash_message_32...[ok]
42,970 UART: test_lms_32::test_ots_32...[ok]
20,101,980 UART: test_lms_32::test_lms_lower_32...[ok]
60,343,995 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
24,224 UART: test_lms_32::test_hash_message_32...[ok]
43,172 UART: test_lms_32::test_ots_32...[ok]
20,102,039 UART: test_lms_32::test_lms_lower_32...[ok]
60,344,170 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
23,914 UART: test_lms_32::test_hash_message_32...[ok]
42,799 UART: test_lms_32::test_ots_32...[ok]
642,587 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,428 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
23,965 UART: test_lms_32::test_hash_message_32...[ok]
42,811 UART: test_lms_32::test_ots_32...[ok]
642,614 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,463 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
24,225 UART: test_lms_32::test_hash_message_32...[ok]
43,112 UART: test_lms_32::test_ots_32...[ok]
642,920 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,735 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
24,104 UART: test_lms_32::test_hash_message_32...[ok]
42,998 UART: test_lms_32::test_ots_32...[ok]
642,816 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,635 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
23,881 UART: test_lms_32::test_hash_message_32...[ok]
42,770 UART: test_lms_32::test_ots_32...[ok]
642,544 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,446 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
23,912 UART: test_lms_32::test_hash_message_32...[ok]
42,794 UART: test_lms_32::test_ots_32...[ok]
642,588 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,411 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
23,963 UART: test_lms_32::test_hash_message_32...[ok]
42,890 UART: test_lms_32::test_ots_32...[ok]
642,709 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,498 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
24,078 UART: test_lms_32::test_hash_message_32...[ok]
42,981 UART: test_lms_32::test_ots_32...[ok]
642,743 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,583 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
10,926,373 UART: test_lms_32::test_lms_lower_32...[ok]
32,804,432 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 8.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
10,926,373 UART: test_lms_32::test_lms_lower_32...[ok]
32,804,432 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 7.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
10,926,373 UART: test_lms_32::test_lms_lower_32...[ok]
32,804,432 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 7.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
10,926,373 UART: test_lms_32::test_lms_lower_32...[ok]
32,804,432 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 8.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,456 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,650 UART: cmd: 0x50000000
19,436 UART: dlen: 8
20,499 >>> mbox cmd response: success
20,935 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,810 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,514 UART: cmd: 0x50000000
29,404 UART: dlen: 7
30,468 >>> mbox cmd response: success
30,944 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,905 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,592 UART: cmd: 0x50000000
39,478 UART: dlen: 0
40,479 >>> mbox cmd response: success
40,900 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,195 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,915 UART: cmd: 0x50000001
49,804 UART: dlen: 5
50,860 >>> mbox cmd response: success
51,336 UART: buf: [01, 23, 45, 67, 89]
55,926 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,621 UART: cmd: 0x50000001
58,510 UART: dlen: 6
59,561 >>> mbox cmd response: success
60,033 UART: buf: [01, 23, 45, 67, 89]
64,676 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,383 UART: cmd: 0x50000001
68,255 UART: dlen: 9
68,763 >>> mbox cmd response: success
68,977 UART: buf: [01, 23, 45, 67, 89]
73,402 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,115 UART: cmd: 0x60000000
76,026 UART: dlen: 16
77,521 UART: buf: [67452301, efcdab89]
81,075 UART: buf: [33221100, 77665544]
84,197 >>> mbox cmd response: success
84,463 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,164 UART: cmd: 0x60000000
87,053 UART: dlen: 13
88,545 UART: buf: [67452301, efcdab89]
92,049 UART: buf: [33221100, 00000044]
95,432 >>> mbox cmd response: success
95,700 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,395 UART: cmd: 0x60000000
98,276 UART: dlen: 12
99,752 UART: buf: [67452301, efcdab89]
103,249 UART: buf: [33221100, 00000000]
106,640 >>> mbox cmd response: success
106,928 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,604 UART: cmd: 0x60000000
109,484 UART: dlen: 0
110,532 >>> mbox cmd response: success
110,796 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,475 UART: cmd: 0x70000000
113,069 >>> mbox cmd response: success
113,333 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,018 UART: cmd: 0x60000000
115,897 UART: dlen: 5
117,383 UART: buf: [04050607, 00000003]
120,875 >>> mbox cmd response: success
121,138 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,817 UART: cmd: 0x80000000
123,409 >>> mbox cmd response: failed
123,713 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,419 UART: cmd: 0x60000000
126,313 UART: dlen: 5
127,753 UART: buf: [04050607, 00000003]
131,245 >>> mbox cmd response: success
131,506 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,187 UART: cmd: 0x90000000
134,068 UART: dlen: 8
135,509 UART: buf: [08070605]
137,594 >>> mbox cmd response: success
137,854 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,524 UART: cmd: 0xa0000000
140,084 >>> mbox cmd response data (4 bytes)
140,484 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,180 UART: cmd: 0xb0000000
143,057 UART: dlen: 6
144,549 UART: buf: [0c0d0e0f, 00000a0b]
148,160 >>> mbox cmd response data (2 bytes)
148,553 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,239 UART: cmd: 0xc0000000
150,917 >>> mbox cmd response data (9 bytes)
151,312 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,993 UART: cmd: 0xd0000000
153,556 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,453 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,597 UART: cmd: 0x50000000
19,438 UART: dlen: 8
20,464 >>> mbox cmd response: success
20,954 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,823 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,524 UART: cmd: 0x50000000
29,370 UART: dlen: 7
30,489 >>> mbox cmd response: success
30,965 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,923 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,611 UART: cmd: 0x50000000
39,491 UART: dlen: 0
40,491 >>> mbox cmd response: success
40,963 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,240 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,937 UART: cmd: 0x50000001
49,819 UART: dlen: 5
50,867 >>> mbox cmd response: success
51,360 UART: buf: [01, 23, 45, 67, 89]
55,946 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,377 UART: cmd: 0x50000001
58,524 UART: dlen: 6
59,601 >>> mbox cmd response: success
60,079 UART: buf: [01, 23, 45, 67, 89]
64,674 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,374 UART: cmd: 0x50000001
67,260 UART: dlen: 9
68,314 >>> mbox cmd response: success
68,786 UART: buf: [01, 23, 45, 67, 89]
73,377 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,085 UART: cmd: 0x60000000
75,971 UART: dlen: 16
77,452 UART: buf: [67452301, efcdab89]
80,999 UART: buf: [33221100, 77665544]
84,170 >>> mbox cmd response: success
84,435 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,134 UART: cmd: 0x60000000
87,020 UART: dlen: 13
88,509 UART: buf: [67452301, efcdab89]
92,010 UART: buf: [33221100, 00000044]
95,386 >>> mbox cmd response: success
95,654 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,344 UART: cmd: 0x60000000
98,224 UART: dlen: 12
99,704 UART: buf: [67452301, efcdab89]
103,201 UART: buf: [33221100, 00000000]
106,572 >>> mbox cmd response: success
106,830 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,500 UART: cmd: 0x60000000
109,378 UART: dlen: 0
110,445 >>> mbox cmd response: success
110,705 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,384 UART: cmd: 0x70000000
112,981 >>> mbox cmd response: success
113,239 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,922 UART: cmd: 0x60000000
115,800 UART: dlen: 5
117,290 UART: buf: [04050607, 00000003]
120,820 >>> mbox cmd response: success
121,079 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,759 UART: cmd: 0x80000000
123,351 >>> mbox cmd response: failed
123,654 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,333 UART: cmd: 0x60000000
126,208 UART: dlen: 5
127,698 UART: buf: [04050607, 00000003]
131,196 >>> mbox cmd response: success
131,455 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,138 UART: cmd: 0x90000000
134,031 UART: dlen: 8
135,472 UART: buf: [08070605]
137,593 >>> mbox cmd response: success
137,868 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,545 UART: cmd: 0xa0000000
140,105 >>> mbox cmd response data (4 bytes)
140,508 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,201 UART: cmd: 0xb0000000
143,083 UART: dlen: 6
144,573 UART: buf: [0c0d0e0f, 00000a0b]
148,175 >>> mbox cmd response data (2 bytes)
148,550 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,230 UART: cmd: 0xc0000000
150,913 >>> mbox cmd response data (9 bytes)
151,305 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,987 UART: cmd: 0xd0000000
153,545 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,612 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,743 UART: cmd: 0x50000000
19,571 UART: dlen: 8
20,625 >>> mbox cmd response: success
21,071 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,991 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,732 UART: cmd: 0x50000000
29,582 UART: dlen: 7
30,653 >>> mbox cmd response: success
31,141 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,246 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,969 UART: cmd: 0x50000000
39,847 UART: dlen: 0
40,813 >>> mbox cmd response: success
41,301 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,584 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,290 UART: cmd: 0x50000001
50,181 UART: dlen: 5
51,232 >>> mbox cmd response: success
51,710 UART: buf: [01, 23, 45, 67, 89]
56,299 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,000 UART: cmd: 0x50000001
58,890 UART: dlen: 6
59,940 >>> mbox cmd response: success
60,417 UART: buf: [01, 23, 45, 67, 89]
65,014 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,746 UART: cmd: 0x50000001
67,637 UART: dlen: 9
68,688 >>> mbox cmd response: success
69,163 UART: buf: [01, 23, 45, 67, 89]
73,741 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,452 UART: cmd: 0x60000000
76,337 UART: dlen: 16
79,130 UART: buf: [67452301, efcdab89]
81,414 UART: buf: [33221100, 77665544]
84,547 >>> mbox cmd response: success
84,822 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,528 UART: cmd: 0x60000000
87,416 UART: dlen: 13
88,903 UART: buf: [67452301, efcdab89]
92,405 UART: buf: [33221100, 00000044]
95,784 >>> mbox cmd response: success
96,073 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,775 UART: cmd: 0x60000000
98,658 UART: dlen: 12
100,139 UART: buf: [67452301, efcdab89]
103,631 UART: buf: [33221100, 00000000]
107,003 >>> mbox cmd response: success
107,275 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,953 UART: cmd: 0x60000000
109,833 UART: dlen: 0
110,878 >>> mbox cmd response: success
111,141 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,820 UART: cmd: 0x70000000
113,415 >>> mbox cmd response: success
113,676 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,366 UART: cmd: 0x60000000
116,251 UART: dlen: 5
117,758 UART: buf: [04050607, 00000003]
121,239 >>> mbox cmd response: success
121,505 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,189 UART: cmd: 0x80000000
123,730 >>> mbox cmd response: failed
124,039 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,734 UART: cmd: 0x60000000
126,618 UART: dlen: 5
128,106 UART: buf: [04050607, 00000003]
131,588 >>> mbox cmd response: success
131,851 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,540 UART: cmd: 0x90000000
134,422 UART: dlen: 8
135,866 UART: buf: [08070605]
137,948 >>> mbox cmd response: success
138,213 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,913 UART: cmd: 0xa0000000
140,476 >>> mbox cmd response data (4 bytes)
140,872 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,567 UART: cmd: 0xb0000000
143,444 UART: dlen: 6
144,932 UART: buf: [0c0d0e0f, 00000a0b]
148,501 >>> mbox cmd response data (2 bytes)
148,878 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,564 UART: cmd: 0xc0000000
151,237 >>> mbox cmd response data (9 bytes)
151,631 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,316 UART: cmd: 0xd0000000
153,875 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,547 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,691 UART: cmd: 0x50000000
19,510 UART: dlen: 8
20,575 >>> mbox cmd response: success
21,014 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,608 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
28,344 UART: cmd: 0x50000000
30,236 UART: dlen: 7
31,279 >>> mbox cmd response: success
31,764 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,819 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,546 UART: cmd: 0x50000000
40,414 UART: dlen: 0
41,442 >>> mbox cmd response: success
41,877 UART: buf: [00000000, 00000000, 00000000, 00000000]
48,181 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,886 UART: cmd: 0x50000001
50,774 UART: dlen: 5
51,829 >>> mbox cmd response: success
52,305 UART: buf: [01, 23, 45, 67, 89]
56,948 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,664 UART: cmd: 0x50000001
59,560 UART: dlen: 6
60,616 >>> mbox cmd response: success
61,094 UART: buf: [01, 23, 45, 67, 89]
65,699 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
66,434 UART: cmd: 0x50000001
68,326 UART: dlen: 9
69,381 >>> mbox cmd response: success
69,859 UART: buf: [01, 23, 45, 67, 89]
74,452 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
75,165 UART: cmd: 0x60000000
77,052 UART: dlen: 16
78,542 UART: buf: [67452301, efcdab89]
82,096 UART: buf: [33221100, 77665544]
85,260 >>> mbox cmd response: success
85,533 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
86,238 UART: cmd: 0x60000000
88,182 UART: dlen: 13
89,608 UART: buf: [67452301, efcdab89]
93,160 UART: buf: [33221100, 00000044]
96,546 >>> mbox cmd response: success
96,841 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
97,544 UART: cmd: 0x60000000
99,437 UART: dlen: 12
100,923 UART: buf: [67452301, efcdab89]
104,412 UART: buf: [33221100, 00000000]
107,835 >>> mbox cmd response: success
108,122 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,814 UART: cmd: 0x60000000
110,710 UART: dlen: 0
111,771 >>> mbox cmd response: success
112,041 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,734 UART: cmd: 0x70000000
114,335 >>> mbox cmd response: success
114,601 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
115,291 UART: cmd: 0x60000000
117,174 UART: dlen: 5
118,687 UART: buf: [04050607, 00000003]
122,185 >>> mbox cmd response: success
122,454 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
123,140 UART: cmd: 0x80000000
124,736 >>> mbox cmd response: failed
125,045 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,736 UART: cmd: 0x60000000
127,623 UART: dlen: 5
129,069 UART: buf: [04050607, 00000003]
132,565 >>> mbox cmd response: success
132,827 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
133,513 UART: cmd: 0x90000000
135,400 UART: dlen: 8
136,842 UART: buf: [08070605]
138,937 >>> mbox cmd response: success
139,203 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,904 UART: cmd: 0xa0000000
141,471 >>> mbox cmd response data (4 bytes)
141,879 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
142,578 UART: cmd: 0xb0000000
144,469 UART: dlen: 6
145,953 UART: buf: [0c0d0e0f, 00000a0b]
149,524 >>> mbox cmd response data (2 bytes)
149,900 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
150,586 UART: cmd: 0xc0000000
152,257 >>> mbox cmd response data (9 bytes)
152,654 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
153,341 UART: cmd: 0xd0000000
154,909 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,432 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,576 UART: cmd: 0x50000000
19,440 UART: dlen: 8
20,458 >>> mbox cmd response: success
20,895 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,778 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,478 UART: cmd: 0x50000000
29,368 UART: dlen: 7
30,430 >>> mbox cmd response: success
30,902 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,855 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,543 UART: cmd: 0x50000000
39,426 UART: dlen: 0
40,421 >>> mbox cmd response: success
40,894 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,185 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,884 UART: cmd: 0x50000001
49,769 UART: dlen: 5
50,818 >>> mbox cmd response: success
51,290 UART: buf: [01, 23, 45, 67, 89]
55,917 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,615 UART: cmd: 0x50000001
58,497 UART: dlen: 6
59,548 >>> mbox cmd response: success
60,022 UART: buf: [01, 23, 45, 67, 89]
64,682 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,396 UART: cmd: 0x50000001
67,286 UART: dlen: 9
68,344 >>> mbox cmd response: success
68,819 UART: buf: [01, 23, 45, 67, 89]
73,407 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,134 UART: cmd: 0x60000000
76,020 UART: dlen: 16
77,502 UART: buf: [67452301, efcdab89]
81,049 UART: buf: [33221100, 77665544]
84,215 >>> mbox cmd response: success
84,480 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,177 UART: cmd: 0x60000000
87,113 UART: dlen: 13
88,588 UART: buf: [67452301, efcdab89]
92,077 UART: buf: [33221100, 00000044]
95,458 >>> mbox cmd response: success
95,720 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,410 UART: cmd: 0x60000000
98,290 UART: dlen: 12
99,772 UART: buf: [67452301, efcdab89]
103,282 UART: buf: [33221100, 00000000]
106,679 >>> mbox cmd response: success
106,944 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,618 UART: cmd: 0x60000000
109,500 UART: dlen: 0
110,549 >>> mbox cmd response: success
110,807 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,482 UART: cmd: 0x70000000
113,075 >>> mbox cmd response: success
113,336 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,016 UART: cmd: 0x60000000
115,895 UART: dlen: 5
117,380 UART: buf: [04050607, 00000003]
120,866 >>> mbox cmd response: success
121,126 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,802 UART: cmd: 0x80000000
123,399 >>> mbox cmd response: failed
123,719 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,401 UART: cmd: 0x60000000
126,278 UART: dlen: 5
127,769 UART: buf: [04050607, 00000003]
131,252 >>> mbox cmd response: success
131,510 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,188 UART: cmd: 0x90000000
134,064 UART: dlen: 8
135,505 UART: buf: [08070605]
137,585 >>> mbox cmd response: success
137,844 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,515 UART: cmd: 0xa0000000
140,122 >>> mbox cmd response data (4 bytes)
140,521 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,251 UART: cmd: 0xb0000000
143,117 UART: dlen: 6
144,577 UART: buf: [0c0d0e0f, 00000a0b]
148,137 >>> mbox cmd response data (2 bytes)
148,515 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,201 UART: cmd: 0xc0000000
150,869 >>> mbox cmd response data (9 bytes)
151,259 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,938 UART: cmd: 0xd0000000
153,497 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,333 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,471 UART: cmd: 0x50000000
19,333 UART: dlen: 8
20,346 >>> mbox cmd response: success
20,838 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,669 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,372 UART: cmd: 0x50000000
29,258 UART: dlen: 7
30,317 >>> mbox cmd response: success
30,789 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,798 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,493 UART: cmd: 0x50000000
39,373 UART: dlen: 0
40,371 >>> mbox cmd response: success
40,794 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,118 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,837 UART: cmd: 0x50000001
49,730 UART: dlen: 5
50,786 >>> mbox cmd response: success
51,258 UART: buf: [01, 23, 45, 67, 89]
55,928 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,641 UART: cmd: 0x50000001
58,535 UART: dlen: 6
59,597 >>> mbox cmd response: success
60,070 UART: buf: [01, 23, 45, 67, 89]
64,655 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,357 UART: cmd: 0x50000001
67,240 UART: dlen: 9
68,292 >>> mbox cmd response: success
68,768 UART: buf: [01, 23, 45, 67, 89]
73,390 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,098 UART: cmd: 0x60000000
76,001 UART: dlen: 16
77,485 UART: buf: [67452301, efcdab89]
81,031 UART: buf: [33221100, 77665544]
84,187 >>> mbox cmd response: success
84,446 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,140 UART: cmd: 0x60000000
87,078 UART: dlen: 13
88,557 UART: buf: [67452301, efcdab89]
92,058 UART: buf: [33221100, 00000044]
95,435 >>> mbox cmd response: success
95,700 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,392 UART: cmd: 0x60000000
98,272 UART: dlen: 12
99,751 UART: buf: [67452301, efcdab89]
103,298 UART: buf: [33221100, 00000000]
106,667 >>> mbox cmd response: success
106,951 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,628 UART: cmd: 0x60000000
109,507 UART: dlen: 0
110,556 >>> mbox cmd response: success
110,816 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,496 UART: cmd: 0x70000000
113,087 >>> mbox cmd response: success
113,348 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,028 UART: cmd: 0x60000000
115,908 UART: dlen: 5
117,396 UART: buf: [04050607, 00000003]
120,876 >>> mbox cmd response: success
121,135 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,813 UART: cmd: 0x80000000
123,409 >>> mbox cmd response: failed
123,717 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,421 UART: cmd: 0x60000000
126,305 UART: dlen: 5
127,748 UART: buf: [04050607, 00000003]
131,280 >>> mbox cmd response: success
131,538 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,216 UART: cmd: 0x90000000
134,123 UART: dlen: 8
135,577 UART: buf: [08070605]
137,611 >>> mbox cmd response: success
137,873 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,548 UART: cmd: 0xa0000000
140,107 >>> mbox cmd response data (4 bytes)
140,499 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,193 UART: cmd: 0xb0000000
143,075 UART: dlen: 6
144,562 UART: buf: [0c0d0e0f, 00000a0b]
148,140 >>> mbox cmd response data (2 bytes)
148,518 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,207 UART: cmd: 0xc0000000
150,878 >>> mbox cmd response data (9 bytes)
151,271 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,951 UART: cmd: 0xd0000000
153,519 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,648 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,820 UART: cmd: 0x50000000
19,637 UART: dlen: 8
20,690 >>> mbox cmd response: success
21,147 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,042 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,794 UART: cmd: 0x50000000
29,668 UART: dlen: 7
30,759 >>> mbox cmd response: success
31,203 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,260 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,971 UART: cmd: 0x50000000
39,868 UART: dlen: 0
40,831 >>> mbox cmd response: success
41,308 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,552 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,250 UART: cmd: 0x50000001
50,137 UART: dlen: 5
51,192 >>> mbox cmd response: success
51,664 UART: buf: [01, 23, 45, 67, 89]
56,256 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
58,158 UART: cmd: 0x50000001
60,047 UART: dlen: 6
61,066 >>> mbox cmd response: success
61,594 UART: buf: [01, 23, 45, 67, 89]
66,186 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
66,892 UART: cmd: 0x50000001
68,777 UART: dlen: 9
69,831 >>> mbox cmd response: success
70,306 UART: buf: [01, 23, 45, 67, 89]
74,884 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
75,590 UART: cmd: 0x60000000
77,474 UART: dlen: 16
78,956 UART: buf: [67452301, efcdab89]
82,517 UART: buf: [33221100, 77665544]
85,678 >>> mbox cmd response: success
85,937 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
86,635 UART: cmd: 0x60000000
88,537 UART: dlen: 13
90,021 UART: buf: [67452301, efcdab89]
93,518 UART: buf: [33221100, 00000044]
96,896 >>> mbox cmd response: success
97,163 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
97,854 UART: cmd: 0x60000000
99,734 UART: dlen: 12
101,218 UART: buf: [67452301, efcdab89]
104,722 UART: buf: [33221100, 00000000]
108,099 >>> mbox cmd response: success
108,361 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
109,074 UART: cmd: 0x60000000
110,960 UART: dlen: 0
112,010 >>> mbox cmd response: success
112,273 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,948 UART: cmd: 0x70000000
114,506 >>> mbox cmd response: success
114,767 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
115,450 UART: cmd: 0x60000000
117,331 UART: dlen: 5
118,818 UART: buf: [04050607, 00000003]
122,306 >>> mbox cmd response: success
122,563 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
123,243 UART: cmd: 0x80000000
124,830 >>> mbox cmd response: failed
125,130 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,812 UART: cmd: 0x60000000
127,691 UART: dlen: 5
129,184 UART: buf: [04050607, 00000003]
132,669 >>> mbox cmd response: success
132,927 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
133,620 UART: cmd: 0x90000000
135,526 UART: dlen: 8
136,963 UART: buf: [08070605]
139,013 >>> mbox cmd response: success
139,284 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,959 UART: cmd: 0xa0000000
141,527 >>> mbox cmd response data (4 bytes)
141,925 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
142,617 UART: cmd: 0xb0000000
144,506 UART: dlen: 6
145,994 UART: buf: [0c0d0e0f, 00000a0b]
149,552 >>> mbox cmd response data (2 bytes)
149,921 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
150,605 UART: cmd: 0xc0000000
152,276 >>> mbox cmd response data (9 bytes)
152,663 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
153,343 UART: cmd: 0xd0000000
154,926 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
3,626 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,769 UART: cmd: 0x50000000
20,865 UART: dlen: 8
21,406 UART: buf: [ 21,717 >>> mbox cmd response: success
67452301, efcdab89, 00000000, 00000000]
27,055 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,791 UART: cmd: 0x50000000
29,669 UART: dlen: 7
30,718 >>> mbox cmd response: success
31,202 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,278 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,996 UART: cmd: 0x50000000
39,872 UART: dlen: 0
40,849 >>> mbox cmd response: success
41,328 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,640 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,338 UART: cmd: 0x50000001
50,214 UART: dlen: 5
51,318 >>> mbox cmd response: success
51,740 UART: buf: [01, 23, 45, 67, 89]
56,363 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,060 UART: cmd: 0x50000001
58,942 UART: dlen: 6
60,007 >>> mbox cmd response: success
60,487 UART: buf: [01, 23, 45, 67, 89]
65,079 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,782 UART: cmd: 0x50000001
67,662 UART: dlen: 9
68,711 >>> mbox cmd response: success
69,185 UART: buf: [01, 23, 45, 67, 89]
73,815 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,520 UART: cmd: 0x60000000
76,401 UART: dlen: 16
77,879 UART: buf: [67452301, efcdab89]
81,429 UART: buf: [33221100, 77665544]
84,588 >>> mbox cmd response: success
84,851 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,547 UART: cmd: 0x60000000
87,479 UART: dlen: 13
88,922 UART: buf: [67452301, efcdab89]
92,466 UART: buf: [33221100, 00000044]
95,835 >>> mbox cmd response: success
96,099 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,792 UART: cmd: 0x60000000
98,671 UART: dlen: 12
100,139 UART: buf: [67452301, efcdab89]
103,649 UART: buf: [33221100, 00000000]
107,028 >>> mbox cmd response: success
107,292 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,964 UART: cmd: 0x60000000
109,846 UART: dlen: 0
110,890 >>> mbox cmd response: success
111,153 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,829 UART: cmd: 0x70000000
113,422 >>> mbox cmd response: success
113,705 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,389 UART: cmd: 0x60000000
116,266 UART: dlen: 5
117,753 UART: buf: [04050607, 00000003]
121,230 >>> mbox cmd response: success
121,486 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,162 UART: cmd: 0x80000000
123,755 >>> mbox cmd response: failed
124,057 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,745 UART: cmd: 0x60000000
126,622 UART: dlen: 5
128,115 UART: buf: [04050607, 00000003]
131,591 >>> mbox cmd response: success
131,849 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,532 UART: cmd: 0x90000000
134,410 UART: dlen: 8
135,872 UART: buf: [08070605]
137,960 >>> mbox cmd response: success
138,220 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,907 UART: cmd: 0xa0000000
140,462 >>> mbox cmd response data (4 bytes)
140,860 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,549 UART: cmd: 0xb0000000
143,426 UART: dlen: 6
144,909 UART: buf: [0c0d0e0f, 00000a0b]
148,473 >>> mbox cmd response data (2 bytes)
148,842 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,528 UART: cmd: 0xc0000000
151,198 >>> mbox cmd response data (9 bytes)
151,587 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,269 UART: cmd: 0xd0000000
153,831 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,390 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,576 UART: cmd: 0x50000000
19,396 UART: dlen: 8
20,430 >>> mbox cmd response: success
20,865 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,739 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,443 UART: cmd: 0x50000000
29,333 UART: dlen: 7
30,402 >>> mbox cmd response: success
30,878 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,828 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,518 UART: cmd: 0x50000000
39,401 UART: dlen: 0
40,397 >>> mbox cmd response: success
40,869 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,140 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,838 UART: cmd: 0x50000001
49,725 UART: dlen: 5
50,782 >>> mbox cmd response: success
51,255 UART: buf: [01, 23, 45, 67, 89]
55,959 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,674 UART: cmd: 0x50000001
58,581 UART: dlen: 6
59,592 >>> mbox cmd response: success
60,085 UART: buf: [01, 23, 45, 67, 89]
64,677 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,382 UART: cmd: 0x50000001
67,271 UART: dlen: 9
68,318 >>> mbox cmd response: success
68,788 UART: buf: [01, 23, 45, 67, 89]
73,379 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,086 UART: cmd: 0x60000000
75,968 UART: dlen: 16
77,448 UART: buf: [67452301, efcdab89]
81,047 UART: buf: [33221100, 77665544]
84,149 >>> mbox cmd response: success
84,411 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,106 UART: cmd: 0x60000000
87,039 UART: dlen: 13
88,521 UART: buf: [67452301, efcdab89]
91,975 UART: buf: [33221100, 00000044]
95,365 >>> mbox cmd response: success
95,627 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,315 UART: cmd: 0x60000000
98,192 UART: dlen: 12
99,674 UART: buf: [67452301, efcdab89]
103,176 UART: buf: [33221100, 00000000]
106,550 >>> mbox cmd response: success
106,810 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,507 UART: cmd: 0x60000000
109,387 UART: dlen: 0
110,436 >>> mbox cmd response: success
110,696 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,373 UART: cmd: 0x70000000
112,965 >>> mbox cmd response: success
113,221 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,923 UART: cmd: 0x60000000
115,801 UART: dlen: 5
117,292 UART: buf: [04050607, 00000003]
120,776 >>> mbox cmd response: success
121,035 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,716 UART: cmd: 0x80000000
123,304 >>> mbox cmd response: failed
123,607 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,288 UART: cmd: 0x60000000
126,167 UART: dlen: 5
127,608 UART: buf: [04050607, 00000003]
131,096 >>> mbox cmd response: success
131,359 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,039 UART: cmd: 0x90000000
133,922 UART: dlen: 8
135,397 UART: buf: [08070605]
137,468 >>> mbox cmd response: success
137,739 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,415 UART: cmd: 0xa0000000
139,979 >>> mbox cmd response data (4 bytes)
140,376 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,070 UART: cmd: 0xb0000000
142,956 UART: dlen: 6
144,438 UART: buf: [0c0d0e0f, 00000a0b]
147,993 >>> mbox cmd response data (2 bytes)
148,370 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,057 UART: cmd: 0xc0000000
150,723 >>> mbox cmd response data (9 bytes)
151,117 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,800 UART: cmd: 0xd0000000
153,355 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,248 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,423 UART: cmd: 0x50000000
19,215 UART: dlen: 8
20,280 >>> mbox cmd response: success
20,716 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,602 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,303 UART: cmd: 0x50000000
29,193 UART: dlen: 7
30,254 >>> mbox cmd response: success
30,727 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,670 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,358 UART: cmd: 0x50000000
39,237 UART: dlen: 0
40,235 >>> mbox cmd response: success
40,660 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,480 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,224 UART: cmd: 0x50000001
50,126 UART: dlen: 5
51,189 >>> mbox cmd response: success
51,661 UART: buf: [01, 23, 45, 67, 89]
56,244 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,940 UART: cmd: 0x50000001
58,821 UART: dlen: 6
59,877 >>> mbox cmd response: success
60,349 UART: buf: [01, 23, 45, 67, 89]
64,979 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,681 UART: cmd: 0x50000001
67,557 UART: dlen: 9
68,605 >>> mbox cmd response: success
69,076 UART: buf: [01, 23, 45, 67, 89]
73,702 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,408 UART: cmd: 0x60000000
76,311 UART: dlen: 16
77,793 UART: buf: [67452301, efcdab89]
81,336 UART: buf: [33221100, 77665544]
84,494 >>> mbox cmd response: success
84,756 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,453 UART: cmd: 0x60000000
87,346 UART: dlen: 13
88,827 UART: buf: [67452301, efcdab89]
92,325 UART: buf: [33221100, 00000044]
95,704 >>> mbox cmd response: success
95,968 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,659 UART: cmd: 0x60000000
98,541 UART: dlen: 12
100,021 UART: buf: [67452301, efcdab89]
103,517 UART: buf: [33221100, 00000000]
106,894 >>> mbox cmd response: success
107,172 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,848 UART: cmd: 0x60000000
109,726 UART: dlen: 0
110,775 >>> mbox cmd response: success
111,035 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,712 UART: cmd: 0x70000000
113,304 >>> mbox cmd response: success
113,561 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,244 UART: cmd: 0x60000000
116,118 UART: dlen: 5
117,603 UART: buf: [04050607, 00000003]
121,093 >>> mbox cmd response: success
121,355 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,031 UART: cmd: 0x80000000
123,625 >>> mbox cmd response: failed
123,931 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,630 UART: cmd: 0x60000000
126,485 UART: dlen: 5
127,951 UART: buf: [04050607, 00000003]
131,450 >>> mbox cmd response: success
131,717 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,432 UART: cmd: 0x90000000
134,314 UART: dlen: 8
135,759 UART: buf: [08070605]
137,849 >>> mbox cmd response: success
138,108 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,800 UART: cmd: 0xa0000000
140,363 >>> mbox cmd response data (4 bytes)
140,768 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,458 UART: cmd: 0xb0000000
143,340 UART: dlen: 6
144,824 UART: buf: [0c0d0e0f, 00000a0b]
148,406 >>> mbox cmd response data (2 bytes)
148,777 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,456 UART: cmd: 0xc0000000
151,128 >>> mbox cmd response data (9 bytes)
151,518 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,197 UART: cmd: 0xd0000000
153,752 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
3,704 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,872 UART: cmd: 0x50000000
19,677 UART: dlen: 8
20,716 >>> mbox cmd response: success
21,209 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,320 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
28,116 UART: cmd: 0x50000000
29,933 UART: dlen: 7
31,027 >>> mbox cmd response: success
31,504 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,561 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,267 UART: cmd: 0x50000000
40,187 UART: dlen: 0
41,119 >>> mbox cmd response: success
41,599 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,882 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,580 UART: cmd: 0x50000001
50,468 UART: dlen: 5
51,521 >>> mbox cmd response: success
51,992 UART: buf: [01, 23, 45, 67, 89]
56,590 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,307 UART: cmd: 0x50000001
59,198 UART: dlen: 6
60,253 >>> mbox cmd response: success
60,723 UART: buf: [01, 23, 45, 67, 89]
65,313 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
66,017 UART: cmd: 0x50000001
67,914 UART: dlen: 9
68,964 >>> mbox cmd response: success
69,435 UART: buf: [01, 23, 45, 67, 89]
74,027 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,737 UART: cmd: 0x60000000
76,623 UART: dlen: 16
78,098 UART: buf: [67452301, efcdab89]
81,649 UART: buf: [33221100, 77665544]
84,800 >>> mbox cmd response: success
85,058 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,777 UART: cmd: 0x60000000
87,669 UART: dlen: 13
89,152 UART: buf: [67452301, efcdab89]
92,655 UART: buf: [33221100, 00000044]
96,040 >>> mbox cmd response: success
96,303 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,993 UART: cmd: 0x60000000
98,876 UART: dlen: 12
100,351 UART: buf: [67452301, efcdab89]
103,850 UART: buf: [33221100, 00000000]
107,261 >>> mbox cmd response: success
107,533 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,209 UART: cmd: 0x60000000
110,096 UART: dlen: 0
111,153 >>> mbox cmd response: success
111,411 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,135 UART: cmd: 0x70000000
113,677 >>> mbox cmd response: success
113,934 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,620 UART: cmd: 0x60000000
116,500 UART: dlen: 5
117,987 UART: buf: [04050607, 00000003]
121,480 >>> mbox cmd response: success
121,740 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,432 UART: cmd: 0x80000000
124,021 >>> mbox cmd response: failed
124,332 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,018 UART: cmd: 0x60000000
126,905 UART: dlen: 5
128,343 UART: buf: [04050607, 00000003]
131,837 >>> mbox cmd response: success
132,093 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,815 UART: cmd: 0x90000000
134,702 UART: dlen: 8
136,146 UART: buf: [08070605]
138,238 >>> mbox cmd response: success
138,496 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,171 UART: cmd: 0xa0000000
140,732 >>> mbox cmd response data (4 bytes)
141,127 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,819 UART: cmd: 0xb0000000
143,709 UART: dlen: 6
145,192 UART: buf: [0c0d0e0f, 00000a0b]
148,760 >>> mbox cmd response data (2 bytes)
149,131 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,813 UART: cmd: 0xc0000000
151,489 >>> mbox cmd response data (9 bytes)
151,876 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,575 UART: cmd: 0xd0000000
154,144 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,663 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,805 UART: cmd: 0x50000000
19,666 UART: dlen: 8
20,708 >>> mbox cmd response: success
21,149 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,061 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,777 UART: cmd: 0x50000000
29,652 UART: dlen: 7
30,726 >>> mbox cmd response: success
31,177 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,194 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,902 UART: cmd: 0x50000000
39,806 UART: dlen: 0
40,758 >>> mbox cmd response: success
41,239 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,515 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,211 UART: cmd: 0x50000001
50,107 UART: dlen: 5
51,174 >>> mbox cmd response: success
51,645 UART: buf: [01, 23, 45, 67, 89]
56,228 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,924 UART: cmd: 0x50000001
58,815 UART: dlen: 6
59,865 >>> mbox cmd response: success
60,336 UART: buf: [01, 23, 45, 67, 89]
65,182 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,906 UART: cmd: 0x50000001
67,809 UART: dlen: 9
68,871 >>> mbox cmd response: success
69,343 UART: buf: [01, 23, 45, 67, 89]
73,938 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,646 UART: cmd: 0x60000000
76,533 UART: dlen: 16
78,013 UART: buf: [67452301, efcdab89]
81,568 UART: buf: [33221100, 77665544]
84,720 >>> mbox cmd response: success
84,984 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,726 UART: cmd: 0x60000000
87,616 UART: dlen: 13
89,097 UART: buf: [67452301, efcdab89]
92,602 UART: buf: [33221100, 00000044]
95,996 >>> mbox cmd response: success
96,264 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,959 UART: cmd: 0x60000000
98,846 UART: dlen: 12
100,325 UART: buf: [67452301, efcdab89]
103,818 UART: buf: [33221100, 00000000]
107,193 >>> mbox cmd response: success
107,453 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,136 UART: cmd: 0x60000000
110,018 UART: dlen: 0
111,066 >>> mbox cmd response: success
111,328 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,012 UART: cmd: 0x70000000
113,555 >>> mbox cmd response: success
113,811 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,498 UART: cmd: 0x60000000
116,399 UART: dlen: 5
117,885 UART: buf: [04050607, 00000003]
121,373 >>> mbox cmd response: success
121,635 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,330 UART: cmd: 0x80000000
123,873 >>> mbox cmd response: failed
124,183 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,865 UART: cmd: 0x60000000
126,747 UART: dlen: 5
128,188 UART: buf: [04050607, 00000003]
131,679 >>> mbox cmd response: success
131,935 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,621 UART: cmd: 0x90000000
134,500 UART: dlen: 8
135,937 UART: buf: [08070605]
138,026 >>> mbox cmd response: success
138,308 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,985 UART: cmd: 0xa0000000
140,541 >>> mbox cmd response data (4 bytes)
140,935 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,623 UART: cmd: 0xb0000000
143,702 UART: dlen: 6
145,009 UART: buf: [0c0d0e0f, 00000a0b]
148,539 >>> mbox cmd response data (2 bytes)
148,918 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,601 UART: cmd: 0xc0000000
151,270 >>> mbox cmd response data (9 bytes)
151,660 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,338 UART: cmd: 0xd0000000
153,903 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,823 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,842 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,821 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
22,553 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
22,332 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
22,696 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
22,780 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
22,447 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
22,398 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
23,056 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
22,839 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
22,433 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
22,354 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
22,727 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
22,682 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
11,749 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,036 UART: pcrbank::test_erase_all_pcrs...[ok]
21,149 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,832 writing to cptra_bootfsm_go
11,657 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,928 UART: pcrbank::test_erase_all_pcrs...[ok]
21,081 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
12,103 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,412 UART: pcrbank::test_erase_all_pcrs...[ok]
22,492 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
12,126 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,415 UART: pcrbank::test_erase_all_pcrs...[ok]
21,597 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
11,621 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,977 UART: pcrbank::test_erase_all_pcrs...[ok]
21,142 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
12,032 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,375 UART: pcrbank::test_erase_all_pcrs...[ok]
21,523 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
11,987 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,266 UART: pcrbank::test_erase_all_pcrs...[ok]
21,422 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
12,051 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,406 UART: pcrbank::test_erase_all_pcrs...[ok]
21,543 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
11,824 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,177 UART: pcrbank::test_erase_all_pcrs...[ok]
21,325 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
11,792 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,094 UART: pcrbank::test_erase_all_pcrs...[ok]
21,239 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
12,034 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,367 UART: pcrbank::test_erase_all_pcrs...[ok]
21,462 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
11,849 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,220 UART: pcrbank::test_erase_all_pcrs...[ok]
21,352 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
11,724 UART: persistent::test_persistent_data_layout...[ok]
15,323 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
11,359 UART: persistent::test_persistent_data_layout...[ok]
14,884 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
11,686 UART: persistent::test_persistent_data_layout...[ok]
15,249 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
11,837 UART: persistent::test_persistent_data_layout...[ok]
15,464 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
11,488 UART: persistent::test_persistent_data_layout...[ok]
15,012 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,721 writing to cptra_bootfsm_go
12,185 UART: persistent::test_persistent_data_layout...[ok]
15,735 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
11,700 UART: persistent::test_persistent_data_layout...[ok]
15,300 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
11,550 UART: persistent::test_persistent_data_layout...[ok]
15,141 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
11,454 UART: persistent::test_persistent_data_layout...[ok]
15,044 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
11,370 UART: persistent::test_persistent_data_layout...[ok]
14,907 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
11,642 UART: persistent::test_persistent_data_layout...[ok]
15,193 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
11,894 UART: persistent::test_persistent_data_layout...[ok]
15,533 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
22,645 UART: sha1::test_kat...[ok]
35,445 UART: sha1::test_digest0...[ok]
49,945 UART: sha1::test_digest1...[ok]
63,221 UART: sha1::test_digest2...[ok]
86,394 UART: sha1::test_digest3...[ok]
108,291 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
22,232 UART: sha1::test_kat...[ok]
35,395 UART: sha1::test_digest0...[ok]
49,058 UART: sha1::test_digest1...[ok]
63,652 UART: sha1::test_digest2...[ok]
85,788 UART: sha1::test_digest3...[ok]
107,354 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
22,685 UART: sha1::test_kat...[ok]
36,136 UART: sha1::test_digest0...[ok]
49,927 UART: sha1::test_digest1...[ok]
63,669 UART: sha1::test_digest2...[ok]
87,287 UART: sha1::test_digest3...[ok]
108,772 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
22,637 UART: sha1::test_kat...[ok]
36,302 UART: sha1::test_digest0...[ok]
48,981 UART: sha1::test_digest1...[ok]
62,981 UART: sha1::test_digest2...[ok]
85,447 UART: sha1::test_digest3...[ok]
108,238 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
22,338 UART: sha1::test_kat...[ok]
35,508 UART: sha1::test_digest0...[ok]
48,735 UART: sha1::test_digest1...[ok]
63,452 UART: sha1::test_digest2...[ok]
85,332 UART: sha1::test_digest3...[ok]
107,808 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
22,644 UART: sha1::test_kat...[ok]
35,366 UART: sha1::test_digest0...[ok]
48,157 UART: sha1::test_digest1...[ok]
63,057 UART: sha1::test_digest2...[ok]
85,494 UART: sha1::test_digest3...[ok]
106,119 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
22,649 UART: sha1::test_kat...[ok]
36,293 UART: sha1::test_digest0...[ok]
49,309 UART: sha1::test_digest1...[ok]
64,457 UART: sha1::test_digest2...[ok]
87,136 UART: sha1::test_digest3...[ok]
109,096 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
22,818 UART: sha1::test_kat...[ok]
36,467 UART: sha1::test_digest0...[ok]
49,726 UART: sha1::test_digest1...[ok]
64,425 UART: sha1::test_digest2...[ok]
87,349 UART: sha1::test_digest3...[ok]
110,842 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
22,322 UART: sha1::test_kat...[ok]
36,919 UART: sha1::test_digest0...[ok]
50,194 UART: sha1::test_digest1...[ok]
63,444 UART: sha1::test_digest2...[ok]
85,780 UART: sha1::test_digest3...[ok]
108,318 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
22,358 UART: sha1::test_kat...[ok]
35,955 UART: sha1::test_digest0...[ok]
49,290 UART: sha1::test_digest1...[ok]
62,832 UART: sha1::test_digest2...[ok]
84,229 UART: sha1::test_digest3...[ok]
106,312 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
22,764 UART: sha1::test_kat...[ok]
36,410 UART: sha1::test_digest0...[ok]
49,616 UART: sha1::test_digest1...[ok]
63,639 UART: sha1::test_digest2...[ok]
84,968 UART: sha1::test_digest3...[ok]
106,213 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
22,565 UART: sha1::test_kat...[ok]
35,389 UART: sha1::test_digest0...[ok]
49,011 UART: sha1::test_digest1...[ok]
62,899 UART: sha1::test_digest2...[ok]
84,651 UART: sha1::test_digest3...[ok]
106,440 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
21,961 UART: sha256::test_kat...[ok]
26,383 UART: sha256::test_digest0...[ok]
30,821 UART: sha256::test_digest1...[ok]
35,254 UART: sha256::test_digest2...[ok]
40,760 UART: sha256::test_digest3...[ok]
46,160 UART: sha256::test_op0...[ok]
50,725 UART: sha256::test_op1...[ok]
55,277 UART: sha256::test_op2...[ok]
60,432 UART: sha256::test_op3...[ok]
69,285 UART: sha256::test_op4...[ok]
81,062 UART: sha256::test_op5...[ok]
64,968,817 UART: sha256::test_op6...[ok]
64,991,185 UART: sha256::test_op7...[ok]
65,007,191 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
22,118 UART: sha256::test_kat...[ok]
26,533 UART: sha256::test_digest0...[ok]
30,976 UART: sha256::test_digest1...[ok]
35,411 UART: sha256::test_digest2...[ok]
40,874 UART: sha256::test_digest3...[ok]
46,329 UART: sha256::test_op0...[ok]
50,853 UART: sha256::test_op1...[ok]
55,416 UART: sha256::test_op2...[ok]
60,591 UART: sha256::test_op3...[ok]
69,423 UART: sha256::test_op4...[ok]
81,253 UART: sha256::test_op5...[ok]
64,968,887 UART: sha256::test_op6...[ok]
64,991,402 UART: sha256::test_op7...[ok]
65,007,376 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
22,407 UART: sha256::test_kat...[ok]
26,811 UART: sha256::test_digest0...[ok]
31,283 UART: sha256::test_digest1...[ok]
35,748 UART: sha256::test_digest2...[ok]
41,205 UART: sha256::test_digest3...[ok]
46,616 UART: sha256::test_op0...[ok]
51,181 UART: sha256::test_op1...[ok]
55,718 UART: sha256::test_op2...[ok]
60,898 UART: sha256::test_op3...[ok]
69,734 UART: sha256::test_op4...[ok]
81,543 UART: sha256::test_op5...[ok]
64,969,045 UART: sha256::test_op6...[ok]
64,991,690 UART: sha256::test_op7...[ok]
65,007,637 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,468 writing to cptra_bootfsm_go
22,642 UART: sha256::test_kat...[ok]
27,069 UART: sha256::test_digest0...[ok]
31,515 UART: sha256::test_digest1...[ok]
35,961 UART: sha256::test_digest2...[ok]
41,411 UART: sha256::test_digest3...[ok]
46,848 UART: sha256::test_op0...[ok]
51,391 UART: sha256::test_op1...[ok]
55,950 UART: sha256::test_op2...[ok]
61,152 UART: sha256::test_op3...[ok]
69,985 UART: sha256::test_op4...[ok]
81,766 UART: sha256::test_op5...[ok]
64,969,430 UART: sha256::test_op6...[ok]
64,991,883 UART: sha256::test_op7...[ok]
65,007,899 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
21,972 UART: sha256::test_kat...[ok]
26,369 UART: sha256::test_digest0...[ok]
30,817 UART: sha256::test_digest1...[ok]
35,257 UART: sha256::test_digest2...[ok]
40,720 UART: sha256::test_digest3...[ok]
46,155 UART: sha256::test_op0...[ok]
50,711 UART: sha256::test_op1...[ok]
55,269 UART: sha256::test_op2...[ok]
60,419 UART: sha256::test_op3...[ok]
69,259 UART: sha256::test_op4...[ok]
81,064 UART: sha256::test_op5...[ok]
64,968,866 UART: sha256::test_op6...[ok]
64,991,223 UART: sha256::test_op7...[ok]
65,007,177 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
22,017 UART: sha256::test_kat...[ok]
26,457 UART: sha256::test_digest0...[ok]
30,890 UART: sha256::test_digest1...[ok]
35,323 UART: sha256::test_digest2...[ok]
40,784 UART: sha256::test_digest3...[ok]
46,213 UART: sha256::test_op0...[ok]
50,767 UART: sha256::test_op1...[ok]
55,320 UART: sha256::test_op2...[ok]
60,494 UART: sha256::test_op3...[ok]
69,336 UART: sha256::test_op4...[ok]
81,160 UART: sha256::test_op5...[ok]
64,968,823 UART: sha256::test_op6...[ok]
64,991,300 UART: sha256::test_op7...[ok]
65,007,307 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
22,381 UART: sha256::test_kat...[ok]
26,790 UART: sha256::test_digest0...[ok]
31,239 UART: sha256::test_digest1...[ok]
35,706 UART: sha256::test_digest2...[ok]
41,145 UART: sha256::test_digest3...[ok]
46,614 UART: sha256::test_op0...[ok]
51,144 UART: sha256::test_op1...[ok]
55,672 UART: sha256::test_op2...[ok]
60,874 UART: sha256::test_op3...[ok]
69,688 UART: sha256::test_op4...[ok]
81,492 UART: sha256::test_op5...[ok]
64,969,426 UART: sha256::test_op6...[ok]
64,991,627 UART: sha256::test_op7...[ok]
65,007,650 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
22,162 UART: sha256::test_kat...[ok]
26,559 UART: sha256::test_digest0...[ok]
30,998 UART: sha256::test_digest1...[ok]
35,418 UART: sha256::test_digest2...[ok]
40,946 UART: sha256::test_digest3...[ok]
46,342 UART: sha256::test_op0...[ok]
50,874 UART: sha256::test_op1...[ok]
55,427 UART: sha256::test_op2...[ok]
60,606 UART: sha256::test_op3...[ok]
69,438 UART: sha256::test_op4...[ok]
81,243 UART: sha256::test_op5...[ok]
64,968,901 UART: sha256::test_op6...[ok]
64,991,355 UART: sha256::test_op7...[ok]
65,007,381 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
21,854 UART: sha256::test_kat...[ok]
26,290 UART: sha256::test_digest0...[ok]
30,762 UART: sha256::test_digest1...[ok]
35,177 UART: sha256::test_digest2...[ok]
40,644 UART: sha256::test_digest3...[ok]
46,068 UART: sha256::test_op0...[ok]
50,630 UART: sha256::test_op1...[ok]
55,183 UART: sha256::test_op2...[ok]
60,332 UART: sha256::test_op3...[ok]
69,170 UART: sha256::test_op4...[ok]
80,995 UART: sha256::test_op5...[ok]
64,968,822 UART: sha256::test_op6...[ok]
64,991,144 UART: sha256::test_op7...[ok]
65,007,106 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
22,137 UART: sha256::test_kat...[ok]
26,585 UART: sha256::test_digest0...[ok]
30,994 UART: sha256::test_digest1...[ok]
35,437 UART: sha256::test_digest2...[ok]
40,902 UART: sha256::test_digest3...[ok]
46,336 UART: sha256::test_op0...[ok]
50,891 UART: sha256::test_op1...[ok]
55,445 UART: sha256::test_op2...[ok]
60,597 UART: sha256::test_op3...[ok]
69,463 UART: sha256::test_op4...[ok]
81,254 UART: sha256::test_op5...[ok]
64,969,005 UART: sha256::test_op6...[ok]
64,991,366 UART: sha256::test_op7...[ok]
65,007,398 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
22,144 UART: sha256::test_kat...[ok]
26,556 UART: sha256::test_digest0...[ok]
31,013 UART: sha256::test_digest1...[ok]
35,474 UART: sha256::test_digest2...[ok]
40,954 UART: sha256::test_digest3...[ok]
46,341 UART: sha256::test_op0...[ok]
50,907 UART: sha256::test_op1...[ok]
55,478 UART: sha256::test_op2...[ok]
60,636 UART: sha256::test_op3...[ok]
69,448 UART: sha256::test_op4...[ok]
81,267 UART: sha256::test_op5...[ok]
64,968,974 UART: sha256::test_op6...[ok]
64,991,386 UART: sha256::test_op7...[ok]
65,007,430 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
22,300 UART: sha256::test_kat...[ok]
26,743 UART: sha256::test_digest0...[ok]
31,171 UART: sha256::test_digest1...[ok]
35,617 UART: sha256::test_digest2...[ok]
41,053 UART: sha256::test_digest3...[ok]
46,478 UART: sha256::test_op0...[ok]
51,029 UART: sha256::test_op1...[ok]
55,593 UART: sha256::test_op2...[ok]
60,746 UART: sha256::test_op3...[ok]
69,605 UART: sha256::test_op4...[ok]
81,414 UART: sha256::test_op5...[ok]
64,969,073 UART: sha256::test_op6...[ok]
64,991,526 UART: sha256::test_op7...[ok]
65,007,565 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 7.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 6.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 6.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 6.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
21,632 UART: sha2_512_384acc::test_kat...[ok]
26,329 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,514 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,286 UART: sha2_512_384acc::test_digest0...[ok]
1,071,583 UART: sha2_512_384acc::test_digest1...[ok]
1,079,532 UART: sha2_512_384acc::test_digest2...[ok]
1,087,574 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
21,338 UART: sha2_512_384acc::test_kat...[ok]
26,028 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,319 UART: sha2_512_384acc::test_digest_offset...[ok]
1,063,958 UART: sha2_512_384acc::test_digest0...[ok]
1,071,262 UART: sha2_512_384acc::test_digest1...[ok]
1,079,230 UART: sha2_512_384acc::test_digest2...[ok]
1,087,277 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
22,088 UART: sha2_512_384acc::test_kat...[ok]
26,809 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,956 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,773 UART: sha2_512_384acc::test_digest0...[ok]
1,072,047 UART: sha2_512_384acc::test_digest1...[ok]
1,079,960 UART: sha2_512_384acc::test_digest2...[ok]
1,088,010 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
21,827 UART: sha2_512_384acc::test_kat...[ok]
26,543 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,725 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,507 UART: sha2_512_384acc::test_digest0...[ok]
1,071,803 UART: sha2_512_384acc::test_digest1...[ok]
1,079,717 UART: sha2_512_384acc::test_digest2...[ok]
1,087,762 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
21,355 UART: sha2_512_384acc::test_kat...[ok]
26,083 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,242 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,018 UART: sha2_512_384acc::test_digest0...[ok]
1,071,318 UART: sha2_512_384acc::test_digest1...[ok]
1,079,296 UART: sha2_512_384acc::test_digest2...[ok]
1,087,270 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
21,439 UART: sha2_512_384acc::test_kat...[ok]
26,150 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,314 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,078 UART: sha2_512_384acc::test_digest0...[ok]
1,071,373 UART: sha2_512_384acc::test_digest1...[ok]
1,079,323 UART: sha2_512_384acc::test_digest2...[ok]
1,087,373 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
21,881 UART: sha2_512_384acc::test_kat...[ok]
26,642 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,781 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,583 UART: sha2_512_384acc::test_digest0...[ok]
1,071,857 UART: sha2_512_384acc::test_digest1...[ok]
1,079,760 UART: sha2_512_384acc::test_digest2...[ok]
1,087,824 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
21,559 UART: sha2_512_384acc::test_kat...[ok]
26,315 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,422 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,264 UART: sha2_512_384acc::test_digest0...[ok]
1,071,552 UART: sha2_512_384acc::test_digest1...[ok]
1,079,465 UART: sha2_512_384acc::test_digest2...[ok]
1,087,507 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
21,322 UART: sha2_512_384acc::test_kat...[ok]
26,074 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,214 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,019 UART: sha2_512_384acc::test_digest0...[ok]
1,071,257 UART: sha2_512_384acc::test_digest1...[ok]
1,079,219 UART: sha2_512_384acc::test_digest2...[ok]
1,087,267 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
21,425 UART: sha2_512_384acc::test_kat...[ok]
26,175 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,320 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,138 UART: sha2_512_384acc::test_digest0...[ok]
1,071,404 UART: sha2_512_384acc::test_digest1...[ok]
1,079,360 UART: sha2_512_384acc::test_digest2...[ok]
1,087,386 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
21,906 UART: sha2_512_384acc::test_kat...[ok]
26,656 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,814 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,591 UART: sha2_512_384acc::test_digest0...[ok]
1,071,900 UART: sha2_512_384acc::test_digest1...[ok]
1,079,816 UART: sha2_512_384acc::test_digest2...[ok]
1,087,863 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
21,800 UART: sha2_512_384acc::test_kat...[ok]
26,387 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,480 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,278 UART: sha2_512_384acc::test_digest0...[ok]
1,071,587 UART: sha2_512_384acc::test_digest1...[ok]
1,079,504 UART: sha2_512_384acc::test_digest2...[ok]
1,087,551 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
24,724 UART: sha384::test_kat...[ok]
32,652 UART: sha384::test_digest0...[ok]
41,102 UART: sha384::test_digest1...[ok]
48,193 UART: sha384::test_digest2...[ok]
57,197 UART: sha384::test_digest3...[ok]
67,182 UART: sha384::test_op0...[ok]
74,077 UART: sha384::test_op1...[ok]
80,997 UART: sha384::test_op2...[ok]
88,779 UART: sha384::test_op3...[ok]
99,591 UART: sha384::test_op4...[ok]
115,644 UART: sha384::test_op5...[ok]
69,343,286 UART: sha384::test_op6...[ok]
69,374,147 UART: sha384::test_op7...[ok]
69,404,796 UART: sha384::test_op8...[ok]
69,434,199 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,452,531 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,468,149 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,483,862 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
24,435 UART: sha384::test_kat...[ok]
33,873 UART: sha384::test_digest0...[ok]
42,402 UART: sha384::test_digest1...[ok]
50,374 UART: sha384::test_digest2...[ok]
60,626 UART: sha384::test_digest3...[ok]
71,005 UART: sha384::test_op0...[ok]
77,884 UART: sha384::test_op1...[ok]
84,777 UART: sha384::test_op2...[ok]
92,562 UART: sha384::test_op3...[ok]
103,390 UART: sha384::test_op4...[ok]
119,394 UART: sha384::test_op5...[ok]
69,347,004 UART: sha384::test_op6...[ok]
69,377,925 UART: sha384::test_op7...[ok]
69,408,546 UART: sha384::test_op8...[ok]
69,437,969 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,321 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,471,953 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,684 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
24,769 UART: sha384::test_kat...[ok]
33,648 UART: sha384::test_digest0...[ok]
42,167 UART: sha384::test_digest1...[ok]
51,449 UART: sha384::test_digest2...[ok]
59,812 UART: sha384::test_digest3...[ok]
69,567 UART: sha384::test_op0...[ok]
76,443 UART: sha384::test_op1...[ok]
83,340 UART: sha384::test_op2...[ok]
91,110 UART: sha384::test_op3...[ok]
101,927 UART: sha384::test_op4...[ok]
117,951 UART: sha384::test_op5...[ok]
69,345,612 UART: sha384::test_op6...[ok]
69,376,453 UART: sha384::test_op7...[ok]
69,407,138 UART: sha384::test_op8...[ok]
69,436,530 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,907 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,555 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,166 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
24,776 UART: sha384::test_kat...[ok]
33,301 UART: sha384::test_digest0...[ok]
40,860 UART: sha384::test_digest1...[ok]
49,742 UART: sha384::test_digest2...[ok]
58,325 UART: sha384::test_digest3...[ok]
68,992 UART: sha384::test_op0...[ok]
75,896 UART: sha384::test_op1...[ok]
82,791 UART: sha384::test_op2...[ok]
90,593 UART: sha384::test_op3...[ok]
101,443 UART: sha384::test_op4...[ok]
117,437 UART: sha384::test_op5...[ok]
69,344,997 UART: sha384::test_op6...[ok]
69,375,914 UART: sha384::test_op7...[ok]
69,406,581 UART: sha384::test_op8...[ok]
69,435,984 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,377 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,469,964 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,485,659 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
24,275 UART: sha384::test_kat...[ok]
32,676 UART: sha384::test_digest0...[ok]
40,778 UART: sha384::test_digest1...[ok]
48,870 UART: sha384::test_digest2...[ok]
57,983 UART: sha384::test_digest3...[ok]
69,441 UART: sha384::test_op0...[ok]
76,358 UART: sha384::test_op1...[ok]
83,259 UART: sha384::test_op2...[ok]
91,025 UART: sha384::test_op3...[ok]
101,861 UART: sha384::test_op4...[ok]
117,859 UART: sha384::test_op5...[ok]
69,345,581 UART: sha384::test_op6...[ok]
69,376,368 UART: sha384::test_op7...[ok]
69,407,044 UART: sha384::test_op8...[ok]
69,436,445 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,780 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,413 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,107 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
24,453 UART: sha384::test_kat...[ok]
32,133 UART: sha384::test_digest0...[ok]
40,327 UART: sha384::test_digest1...[ok]
48,765 UART: sha384::test_digest2...[ok]
58,278 UART: sha384::test_digest3...[ok]
69,754 UART: sha384::test_op0...[ok]
76,615 UART: sha384::test_op1...[ok]
83,516 UART: sha384::test_op2...[ok]
91,300 UART: sha384::test_op3...[ok]
102,131 UART: sha384::test_op4...[ok]
118,197 UART: sha384::test_op5...[ok]
69,345,820 UART: sha384::test_op6...[ok]
69,376,688 UART: sha384::test_op7...[ok]
69,407,336 UART: sha384::test_op8...[ok]
69,436,735 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,067 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,696 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,407 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
24,893 UART: sha384::test_kat...[ok]
32,387 UART: sha384::test_digest0...[ok]
40,611 UART: sha384::test_digest1...[ok]
49,763 UART: sha384::test_digest2...[ok]
59,157 UART: sha384::test_digest3...[ok]
71,109 UART: sha384::test_op0...[ok]
78,009 UART: sha384::test_op1...[ok]
84,870 UART: sha384::test_op2...[ok]
92,660 UART: sha384::test_op3...[ok]
103,490 UART: sha384::test_op4...[ok]
119,510 UART: sha384::test_op5...[ok]
69,347,052 UART: sha384::test_op6...[ok]
69,378,031 UART: sha384::test_op7...[ok]
69,408,646 UART: sha384::test_op8...[ok]
69,438,125 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,458 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,098 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,716 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
24,941 UART: sha384::test_kat...[ok]
32,580 UART: sha384::test_digest0...[ok]
42,197 UART: sha384::test_digest1...[ok]
50,836 UART: sha384::test_digest2...[ok]
60,568 UART: sha384::test_digest3...[ok]
72,584 UART: sha384::test_op0...[ok]
79,479 UART: sha384::test_op1...[ok]
86,394 UART: sha384::test_op2...[ok]
94,186 UART: sha384::test_op3...[ok]
105,011 UART: sha384::test_op4...[ok]
121,017 UART: sha384::test_op5...[ok]
69,348,730 UART: sha384::test_op6...[ok]
69,379,538 UART: sha384::test_op7...[ok]
69,410,210 UART: sha384::test_op8...[ok]
69,439,647 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,457,920 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,581 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,489,237 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
24,665 UART: sha384::test_kat...[ok]
32,348 UART: sha384::test_digest0...[ok]
41,632 UART: sha384::test_digest1...[ok]
50,679 UART: sha384::test_digest2...[ok]
59,520 UART: sha384::test_digest3...[ok]
71,478 UART: sha384::test_op0...[ok]
78,369 UART: sha384::test_op1...[ok]
85,242 UART: sha384::test_op2...[ok]
93,032 UART: sha384::test_op3...[ok]
103,848 UART: sha384::test_op4...[ok]
119,852 UART: sha384::test_op5...[ok]
69,347,434 UART: sha384::test_op6...[ok]
69,378,373 UART: sha384::test_op7...[ok]
69,409,030 UART: sha384::test_op8...[ok]
69,438,431 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,791 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,455 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,085 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
24,430 UART: sha384::test_kat...[ok]
31,926 UART: sha384::test_digest0...[ok]
42,087 UART: sha384::test_digest1...[ok]
50,132 UART: sha384::test_digest2...[ok]
58,313 UART: sha384::test_digest3...[ok]
69,793 UART: sha384::test_op0...[ok]
76,696 UART: sha384::test_op1...[ok]
83,657 UART: sha384::test_op2...[ok]
91,395 UART: sha384::test_op3...[ok]
102,256 UART: sha384::test_op4...[ok]
118,249 UART: sha384::test_op5...[ok]
69,345,758 UART: sha384::test_op6...[ok]
69,376,785 UART: sha384::test_op7...[ok]
69,407,407 UART: sha384::test_op8...[ok]
69,436,821 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,172 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,786 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,494 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
24,763 UART: sha384::test_kat...[ok]
33,400 UART: sha384::test_digest0...[ok]
42,730 UART: sha384::test_digest1...[ok]
51,484 UART: sha384::test_digest2...[ok]
59,442 UART: sha384::test_digest3...[ok]
69,591 UART: sha384::test_op0...[ok]
76,465 UART: sha384::test_op1...[ok]
83,358 UART: sha384::test_op2...[ok]
91,145 UART: sha384::test_op3...[ok]
101,947 UART: sha384::test_op4...[ok]
118,033 UART: sha384::test_op5...[ok]
69,345,504 UART: sha384::test_op6...[ok]
69,376,495 UART: sha384::test_op7...[ok]
69,407,178 UART: sha384::test_op8...[ok]
69,436,563 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,897 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,557 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,206 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
24,876 UART: sha384::test_kat...[ok]
32,796 UART: sha384::test_digest0...[ok]
42,112 UART: sha384::test_digest1...[ok]
50,767 UART: sha384::test_digest2...[ok]
59,638 UART: sha384::test_digest3...[ok]
70,202 UART: sha384::test_op0...[ok]
77,104 UART: sha384::test_op1...[ok]
84,010 UART: sha384::test_op2...[ok]
91,801 UART: sha384::test_op3...[ok]
102,632 UART: sha384::test_op4...[ok]
118,634 UART: sha384::test_op5...[ok]
69,346,219 UART: sha384::test_op6...[ok]
69,377,190 UART: sha384::test_op7...[ok]
69,407,782 UART: sha384::test_op8...[ok]
69,437,205 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,546 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,471,182 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,902 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
14,003 UART: status_reporter::test_report_boot_status...[ok]
17,800 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,891 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
13,862 UART: status_reporter::test_report_boot_status...[ok]
17,689 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,796 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,475 writing to cptra_bootfsm_go
14,296 UART: status_reporter::test_report_boot_status...[ok]
18,153 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,163 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
14,178 UART: status_reporter::test_report_boot_status...[ok]
17,985 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,073 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
13,840 UART: status_reporter::test_report_boot_status...[ok]
17,700 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,739 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
13,837 UART: status_reporter::test_report_boot_status...[ok]
17,645 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,697 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
14,001 UART: status_reporter::test_report_boot_status...[ok]
18,860 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,895 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
14,097 UART: status_reporter::test_report_boot_status...[ok]
17,892 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,009 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
13,685 UART: status_reporter::test_report_boot_status...[ok]
17,568 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,611 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
13,740 UART: status_reporter::test_report_boot_status...[ok]
17,613 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,649 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
14,174 UART: status_reporter::test_report_boot_status...[ok]
17,979 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,069 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,907 writing to cptra_bootfsm_go
16,004 UART: status_reporter::test_report_boot_status...[ok]
19,835 UART: status_reporter::test_report_idevid_csr_ready...[ok]
23,924 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
3,492 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,406 >>> mbox cmd response data (48 bytes)
18,052 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,827 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
4,100 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,903 >>> mbox cmd response data (48 bytes)
18,550 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,375 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,364 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,802 >>> mbox cmd response data (48 bytes)
18,468 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
40,445 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,386 writing to cptra_bootfsm_go
4,718 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,706 >>> mbox cmd response data (48 bytes)
18,393 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,109 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,824 writing to cptra_bootfsm_go
3,228 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,726 >>> mbox cmd response data (48 bytes)
18,459 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,187 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,297 writing to cptra_bootfsm_go
4,806 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,604 >>> mbox cmd response data (48 bytes)
18,264 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,035 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,541 writing to cptra_bootfsm_go
3,883 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,093 >>> mbox cmd response data (48 bytes)
424,832 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,013 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,777 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,213 >>> mbox cmd response data (48 bytes)
424,950 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,124 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,747 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,153 >>> mbox cmd response data (48 bytes)
424,935 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,117 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,608 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,796 >>> mbox cmd response data (48 bytes)
424,549 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,725 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,561 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,979 >>> mbox cmd response data (48 bytes)
424,744 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,915 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,556 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,977 >>> mbox cmd response data (48 bytes)
424,743 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,939 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,503 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,620 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,790 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,727 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,459 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,581 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
4,280 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
3,639 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,477 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,475 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,787 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,691 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f1070000ed0`,
right: `0x7f1070000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f5c08000ed0`,
right: `0x7f5c08000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f1c08000ed0`,
right: `0x7f1c08000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f3870000ed0`,
right: `0x7f3870000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f49a4000ed0`,
right: `0x7f49a4000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f8030000ed0`,
right: `0x7f8030000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f25bc000ed0`,
right: `0x7f25bc000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fdb44000ed0`,
right: `0x7fdb44000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fbbd8000ed0`,
right: `0x7fbbd8000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f274c000ed0`,
right: `0x7f274c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f6c38000ed0`,
right: `0x7f6c38000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f0d00000ed0`,
right: `0x7f0d00000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.39s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.62s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.37s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.37s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.32s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.42s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.33s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.51s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.40s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.22s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.20s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.17s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.17s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.25s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.06s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,118 UART:
192,468 UART: Running Caliptra ROM ...
193,665 UART:
193,811 UART: [state] CFI Enabled
265,338 UART: [state] LifecycleState = Unprovisioned
267,325 UART: [state] DebugLocked = No
270,067 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,651 UART: [kat] SHA2-256
445,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,918 UART: [kat] ++
456,447 UART: [kat] sha1
466,186 UART: [kat] SHA2-256
468,926 UART: [kat] SHA2-384
474,968 UART: [kat] SHA2-512-ACC
477,343 UART: [kat] ECC-384
2,765,636 UART: [kat] HMAC-384Kdf
2,778,725 UART: [kat] LMS
3,969,056 UART: [kat] --
3,973,851 UART: [cold-reset] ++
3,976,006 UART: [fht] Storing FHT @ 0x50003400
3,987,414 UART: [idev] ++
3,988,127 UART: [idev] CDI.KEYID = 6
3,989,108 UART: [idev] SUBJECT.KEYID = 7
3,990,210 UART: [idev] UDS.KEYID = 0
3,991,292 ready_for_fw is high
3,991,503 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,035,728 UART: [idev] Erasing UDS.KEYID = 0
7,325,473 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,213 UART: [idev] --
7,352,044 UART: [ldev] ++
7,352,624 UART: [ldev] CDI.KEYID = 6
7,353,563 UART: [ldev] SUBJECT.KEYID = 5
7,354,771 UART: [ldev] AUTHORITY.KEYID = 7
7,356,054 UART: [ldev] FE.KEYID = 1
7,402,534 UART: [ldev] Erasing FE.KEYID = 1
10,733,115 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,512 UART: [ldev] --
13,093,497 UART: [fwproc] Waiting for Commands...
13,096,402 UART: [fwproc] Received command 0x46574c44
13,098,585 UART: [fwproc] Received Image of size 34948 bytes
16,185,463 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,256,235 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,329,411 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,366,004 >>> mbox cmd response: success
16,370,664 UART: [afmc] ++
16,371,275 UART: [afmc] CDI.KEYID = 6
16,372,239 UART: [afmc] SUBJECT.KEYID = 7
16,373,495 UART: [afmc] AUTHORITY.KEYID = 5
19,724,244 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,026,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,029,085 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,043,516 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,058,242 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,072,700 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,094,437 UART: [afmc] --
22,098,783 UART: [cold-reset] --
22,101,428 UART: [state] Locking Datavault
22,108,939 UART: [state] Locking PCR0, PCR1 and PCR31
22,110,723 UART: [state] Locking ICCM
22,113,140 UART: [exit] Launching FMC @ 0x40000130
22,121,572 UART:
22,121,813 UART: Running Caliptra FMC ...
22,122,942 UART:
22,123,103 UART: [state] CFI Enabled
22,185,024 UART: [fht] FMC Alias Private Key: 7
24,526,019 UART: [art] Extend RT PCRs Done
24,527,295 UART: [art] Lock RT PCRs Done
24,528,614 UART: [art] Populate DV Done
24,533,946 UART: [fht] FMC Alias Private Key: 7
24,535,603 UART: [art] Derive CDI
24,536,453 UART: [art] Store in slot 0x4
24,593,633 UART: [art] Derive Key Pair
24,594,706 UART: [art] Store priv key in slot 0x5
27,887,343 UART: [art] Derive Key Pair - Done
27,900,486 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,189,809 UART: [art] Erasing AUTHORITY.KEYID = 7
30,191,420 UART: [art] PUB.X = F558E507967DCB0CCE0676F949E4DD2063646F2C3343BABC88B703E8A76BFECB4CFC8A0B1B082B00694D2B79564A136B
30,198,588 UART: [art] PUB.Y = 22FB5F6344C51488F00060D7B45B3BB678DD366F439CFFB5AC949CE274B04400A8BF669B8A1ED053B439A64B42F443FF
30,205,753 UART: [art] SIG.R = 686D1BD4260028DCB7BD4D8B02FE8686B7384C94152A5250189AE8C76444F114990E8F520F9D56F8FC2B85DAAAA654CB
30,213,200 UART: [art] SIG.S = F3315C968DB7DA02CD73F61F0D5084F0A9B78DC80DFEF608F4FC49A926A8C1441C724B6469120D2BBA705CDBCBA574E3
31,517,690 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
3,806,070 ready_for_fw is high
3,806,480 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,265,554 >>> mbox cmd response: success
21,966,753 UART:
21,967,146 UART: Running Caliptra FMC ...
21,968,389 UART:
21,968,554 UART: [state] CFI Enabled
22,032,957 UART: [fht] FMC Alias Private Key: 7
24,394,898 UART: [art] Extend RT PCRs Done
24,396,169 UART: [art] Lock RT PCRs Done
24,397,702 UART: [art] Populate DV Done
24,402,950 UART: [fht] FMC Alias Private Key: 7
24,404,616 UART: [art] Derive CDI
24,405,469 UART: [art] Store in slot 0x4
24,462,383 UART: [art] Derive Key Pair
24,463,432 UART: [art] Store priv key in slot 0x5
27,755,797 UART: [art] Derive Key Pair - Done
27,768,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,057,086 UART: [art] Erasing AUTHORITY.KEYID = 7
30,058,676 UART: [art] PUB.X = 380CB7A801FDA3A03746B538733F5DF722632084BD8EAE59CC7FFA620F8942AB2A565BC86CBAFF8C1F858A36AB32AE7E
30,065,862 UART: [art] PUB.Y = 0D8132EE7388425EBCCC164491B6FFCB7AC11D50648D11F8E7887AB1C798F17413B6D4710E522C830F0F9B2460EAEA9B
30,073,142 UART: [art] SIG.R = D77F9944320920F8EF3DC7123B9C95DD1EF0242CD72EBC3575A98C3B046343EC1F11EAF46A1F88AA478CBB9EDE060483
30,080,579 UART: [art] SIG.S = BA2DED9C9C3F8585806EFD8E9EC0A364CB0FB6C3D84A8286D0DC013E5A6F8F9D24BC6F5E55587D559E7682ACEACFAE36
31,384,765 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,573 UART:
192,923 UART: Running Caliptra ROM ...
194,110 UART:
603,892 UART: [state] CFI Enabled
615,363 UART: [state] LifecycleState = Unprovisioned
617,316 UART: [state] DebugLocked = No
620,262 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,758 UART: [kat] SHA2-256
795,487 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,059 UART: [kat] ++
806,594 UART: [kat] sha1
817,612 UART: [kat] SHA2-256
820,343 UART: [kat] SHA2-384
825,967 UART: [kat] SHA2-512-ACC
828,335 UART: [kat] ECC-384
3,111,752 UART: [kat] HMAC-384Kdf
3,124,688 UART: [kat] LMS
4,314,810 UART: [kat] --
4,318,518 UART: [cold-reset] ++
4,321,008 UART: [fht] Storing FHT @ 0x50003400
4,332,338 UART: [idev] ++
4,332,904 UART: [idev] CDI.KEYID = 6
4,333,849 UART: [idev] SUBJECT.KEYID = 7
4,335,084 UART: [idev] UDS.KEYID = 0
4,336,034 ready_for_fw is high
4,336,223 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,380,234 UART: [idev] Erasing UDS.KEYID = 0
7,620,593 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,587 UART: [idev] --
7,646,579 UART: [ldev] ++
7,647,145 UART: [ldev] CDI.KEYID = 6
7,648,106 UART: [ldev] SUBJECT.KEYID = 5
7,649,309 UART: [ldev] AUTHORITY.KEYID = 7
7,650,584 UART: [ldev] FE.KEYID = 1
7,661,382 UART: [ldev] Erasing FE.KEYID = 1
10,949,107 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,350 UART: [ldev] --
13,308,424 UART: [fwproc] Waiting for Commands...
13,310,620 UART: [fwproc] Received command 0x46574c44
13,312,796 UART: [fwproc] Received Image of size 34948 bytes
16,394,411 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,470,245 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,543,416 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,579,331 >>> mbox cmd response: success
16,584,347 UART: [afmc] ++
16,584,953 UART: [afmc] CDI.KEYID = 6
16,585,958 UART: [afmc] SUBJECT.KEYID = 7
16,587,229 UART: [afmc] AUTHORITY.KEYID = 5
19,903,352 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,197,548 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,199,853 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,214,265 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,228,971 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,243,417 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,266,079 UART: [afmc] --
22,270,616 UART: [cold-reset] --
22,276,859 UART: [state] Locking Datavault
22,281,796 UART: [state] Locking PCR0, PCR1 and PCR31
22,283,541 UART: [state] Locking ICCM
22,284,837 UART: [exit] Launching FMC @ 0x40000130
22,293,194 UART:
22,293,434 UART: Running Caliptra FMC ...
22,294,569 UART:
22,294,724 UART: [state] CFI Enabled
22,302,645 UART: [fht] FMC Alias Private Key: 7
24,643,330 UART: [art] Extend RT PCRs Done
24,644,588 UART: [art] Lock RT PCRs Done
24,646,608 UART: [art] Populate DV Done
24,651,784 UART: [fht] FMC Alias Private Key: 7
24,653,442 UART: [art] Derive CDI
24,654,208 UART: [art] Store in slot 0x4
24,697,132 UART: [art] Derive Key Pair
24,698,193 UART: [art] Store priv key in slot 0x5
27,940,720 UART: [art] Derive Key Pair - Done
27,953,786 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,233,951 UART: [art] Erasing AUTHORITY.KEYID = 7
30,235,521 UART: [art] PUB.X = 0CBFC4AAE9305BF438CDF03BD89481C7B597FE8D7F3028BD5763649DEB0E17B3A7A49D0CF346ED2FDC6FEAA3B214AD42
30,242,754 UART: [art] PUB.Y = DD1DF68A5731F5189E442B720F4DFAE4A04FC3C14699042F5114252C2840055A8A1892A95F624075B239202925974E15
30,250,005 UART: [art] SIG.R = 48B796C58D6C77F7D6710034425EDE2D8F9AE7BE903C59C5B740E8D032F9057D28122E7E470A70D433D00988D695D758
30,257,339 UART: [art] SIG.S = EC5A2BFF86BCFAE79CB17C2947727CCDF956B17407C7117F55A0E410FC198DFC3AECC41AE36F93D0FC16CAB7DCE8DF8A
31,562,026 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
4,131,165 ready_for_fw is high
4,131,596 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,468,897 >>> mbox cmd response: success
22,111,166 UART:
22,111,972 UART: Running Caliptra FMC ...
22,113,133 UART:
22,113,286 UART: [state] CFI Enabled
22,120,634 UART: [fht] FMC Alias Private Key: 7
24,460,206 UART: [art] Extend RT PCRs Done
24,462,173 UART: [art] Lock RT PCRs Done
24,463,256 UART: [art] Populate DV Done
24,468,575 UART: [fht] FMC Alias Private Key: 7
24,470,241 UART: [art] Derive CDI
24,471,031 UART: [art] Store in slot 0x4
24,513,838 UART: [art] Derive Key Pair
24,515,353 UART: [art] Store priv key in slot 0x5
27,756,613 UART: [art] Derive Key Pair - Done
27,769,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,049,277 UART: [art] Erasing AUTHORITY.KEYID = 7
30,050,856 UART: [art] PUB.X = 51F3442ACE99110B92F6EB5ACC536F042A204DD4DEE7DAD2BDB32340D9F72FEB72CE50F975D3C53C987FD97BB7662D34
30,058,072 UART: [art] PUB.Y = D22B21258CF56A8553AFF354738A4AF7C0703F76EE654640C45631DA857F01D86D24B3993C79532832D57FC3E987F316
30,065,347 UART: [art] SIG.R = 97572242AB0331F4983587FA250AD60FC7696AD737979822F324723A12BECEF0AD50D7AE7E1B27F5D003CF632B9B26B1
30,072,681 UART: [art] SIG.S = AC5144DF19DDFCD9911E030F76D0246A4423B2FF19F23F921B28E864D492E2441A96DEA29C9D99680CDB12AC57C0CCBE
31,377,123 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,157 UART:
192,524 UART: Running Caliptra ROM ...
193,661 UART:
193,807 UART: [state] CFI Enabled
259,753 UART: [state] LifecycleState = Unprovisioned
261,779 UART: [state] DebugLocked = No
264,436 UART: [state] WD Timer not started. Device not locked for debugging
267,839 UART: [kat] SHA2-256
447,493 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,208 UART: [kat] ++
458,726 UART: [kat] sha1
469,966 UART: [kat] SHA2-256
472,637 UART: [kat] SHA2-384
478,698 UART: [kat] SHA2-512-ACC
481,068 UART: [kat] ECC-384
2,948,420 UART: [kat] HMAC-384Kdf
2,970,127 UART: [kat] LMS
3,446,606 UART: [kat] --
3,452,303 UART: [cold-reset] ++
3,454,300 UART: [fht] FHT @ 0x50003400
3,464,421 UART: [idev] ++
3,464,985 UART: [idev] CDI.KEYID = 6
3,466,022 UART: [idev] SUBJECT.KEYID = 7
3,467,203 UART: [idev] UDS.KEYID = 0
3,468,128 ready_for_fw is high
3,468,313 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,512,594 UART: [idev] Erasing UDS.KEYID = 0
5,983,443 UART: [idev] Sha1 KeyId Algorithm
6,006,787 UART: [idev] --
6,012,767 UART: [ldev] ++
6,013,353 UART: [ldev] CDI.KEYID = 6
6,014,271 UART: [ldev] SUBJECT.KEYID = 5
6,015,435 UART: [ldev] AUTHORITY.KEYID = 7
6,016,726 UART: [ldev] FE.KEYID = 1
6,057,181 UART: [ldev] Erasing FE.KEYID = 1
8,569,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,046 UART: [ldev] --
10,375,688 UART: [fwproc] Wait for Commands...
10,377,618 UART: [fwproc] Recv command 0x46574c44
10,379,622 UART: [fwproc] Recv'd Img size: 34948 bytes
12,836,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,912,619 UART: [fwproc] Load FMC at address 0x40000000 len 20044
12,985,683 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,022,015 >>> mbox cmd response: success
13,026,449 UART: [afmc] ++
13,027,074 UART: [afmc] CDI.KEYID = 6
13,028,040 UART: [afmc] SUBJECT.KEYID = 7
13,029,187 UART: [afmc] AUTHORITY.KEYID = 5
15,574,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,318,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,321,043 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,336,875 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,352,878 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,368,468 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,393,700 UART: [afmc] --
17,397,229 UART: [cold-reset] --
17,400,292 UART: [state] Locking Datavault
17,406,410 UART: [state] Locking PCR0, PCR1 and PCR31
17,408,193 UART: [state] Locking ICCM
17,410,678 UART: [exit] Launching FMC @ 0x40000130
17,419,088 UART:
17,419,343 UART: Running Caliptra FMC ...
17,420,486 UART:
17,420,644 UART: [state] CFI Enabled
17,476,178 UART: [fht] FMC Alias Private Key: 7
19,241,868 UART: [art] Extend RT PCRs Done
19,243,131 UART: [art] Lock RT PCRs Done
19,244,834 UART: [art] Populate DV Done
19,250,299 UART: [fht] FMC Alias Private Key: 7
19,251,890 UART: [art] Derive CDI
19,252,743 UART: [art] Store in slot 0x4
19,308,852 UART: [art] Derive Key Pair
19,309,945 UART: [art] Store priv key in slot 0x5
21,772,698 UART: [art] Derive Key Pair - Done
21,785,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,499,523 UART: [art] Erasing AUTHORITY.KEYID = 7
23,501,077 UART: [art] PUB.X = 3FFA7201B7A6E2060CF737907FF2154116F15C6D188ED87E015D57AA30BC658400C8A05C7580B78DD459C936198AF114
23,508,315 UART: [art] PUB.Y = 25446662849AE0A7F1CE48633FE7B6008506F8358C3450AA0E863F2D4DA173D650C3F2F04CDEE217E00646E472F27C9A
23,515,486 UART: [art] SIG.R = 2E92FA9CC7948C96A8E3BF291B46AF26E5612CD6F0D74DF2C72B1E64558AE1305A77FDC4AFBED6681081490CC82B1D42
23,522,948 UART: [art] SIG.S = 3EE7C72DB7A955DE8AED696AC72D07D1B95FFDEB2E495B4832937DD2FFBE6CEE7D154280137BD9DEC9426A4F342C0627
24,501,896 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,462,148 ready_for_fw is high
3,463,103 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
12,891,586 >>> mbox cmd response: success
17,174,993 UART:
17,175,370 UART: Running Caliptra FMC ...
17,176,663 UART:
17,176,832 UART: [state] CFI Enabled
17,240,127 UART: [fht] FMC Alias Private Key: 7
19,007,129 UART: [art] Extend RT PCRs Done
19,008,426 UART: [art] Lock RT PCRs Done
19,009,869 UART: [art] Populate DV Done
19,015,348 UART: [fht] FMC Alias Private Key: 7
19,016,895 UART: [art] Derive CDI
19,017,672 UART: [art] Store in slot 0x4
19,073,949 UART: [art] Derive Key Pair
19,075,042 UART: [art] Store priv key in slot 0x5
21,537,935 UART: [art] Derive Key Pair - Done
21,550,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,263,721 UART: [art] Erasing AUTHORITY.KEYID = 7
23,265,288 UART: [art] PUB.X = AFD094C09AADA854ED588223F9D9F154DAE616E63BD0A5C098F5DBC9F77090B365852681B8FC02A77DF4C344325EF64C
23,272,567 UART: [art] PUB.Y = 94AD44D56021C37EDACA64D4AA3FE5F2FCC4B9A575EC5BD8730178D56F5EDF3481967D611D81E5D7E1C548B850961008
23,279,838 UART: [art] SIG.R = 55CA40513A05E0C1CEDE588E56BAB310C84FFDB7D428F8DF3D8D7B82C4AB6CDD6FC124FCDD83008A7E27222E5DE62771
23,287,287 UART: [art] SIG.S = AFCFA3258C7E5ACC44A1F5AD515911D8A53FE14E7705D3C07B8510951207A2FF1C3687A71A8F86A0B9502A290218DCEF
24,266,108 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,523 UART:
192,876 UART: Running Caliptra ROM ...
194,059 UART:
603,818 UART: [state] CFI Enabled
618,416 UART: [state] LifecycleState = Unprovisioned
620,391 UART: [state] DebugLocked = No
622,636 UART: [state] WD Timer not started. Device not locked for debugging
626,678 UART: [kat] SHA2-256
806,346 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,126 UART: [kat] ++
817,745 UART: [kat] sha1
828,342 UART: [kat] SHA2-256
830,994 UART: [kat] SHA2-384
836,842 UART: [kat] SHA2-512-ACC
839,206 UART: [kat] ECC-384
3,280,605 UART: [kat] HMAC-384Kdf
3,293,900 UART: [kat] LMS
3,770,368 UART: [kat] --
3,776,166 UART: [cold-reset] ++
3,778,374 UART: [fht] FHT @ 0x50003400
3,789,634 UART: [idev] ++
3,790,199 UART: [idev] CDI.KEYID = 6
3,791,153 UART: [idev] SUBJECT.KEYID = 7
3,792,395 UART: [idev] UDS.KEYID = 0
3,793,289 ready_for_fw is high
3,793,507 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,837,779 UART: [idev] Erasing UDS.KEYID = 0
6,274,203 UART: [idev] Sha1 KeyId Algorithm
6,297,105 UART: [idev] --
6,300,698 UART: [ldev] ++
6,301,274 UART: [ldev] CDI.KEYID = 6
6,302,252 UART: [ldev] SUBJECT.KEYID = 5
6,303,409 UART: [ldev] AUTHORITY.KEYID = 7
6,304,695 UART: [ldev] FE.KEYID = 1
6,316,042 UART: [ldev] Erasing FE.KEYID = 1
8,794,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,684 UART: [ldev] --
10,588,241 UART: [fwproc] Wait for Commands...
10,590,467 UART: [fwproc] Recv command 0x46574c44
10,592,510 UART: [fwproc] Recv'd Img size: 34948 bytes
13,055,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,133,370 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,206,422 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,241,722 >>> mbox cmd response: success
13,246,441 UART: [afmc] ++
13,247,332 UART: [afmc] CDI.KEYID = 6
13,248,311 UART: [afmc] SUBJECT.KEYID = 7
13,249,454 UART: [afmc] AUTHORITY.KEYID = 5
15,752,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,477,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,479,301 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,495,139 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,511,155 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,526,743 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,552,002 UART: [afmc] --
17,556,079 UART: [cold-reset] --
17,560,723 UART: [state] Locking Datavault
17,566,358 UART: [state] Locking PCR0, PCR1 and PCR31
17,568,162 UART: [state] Locking ICCM
17,570,286 UART: [exit] Launching FMC @ 0x40000130
17,578,728 UART:
17,578,974 UART: Running Caliptra FMC ...
17,580,113 UART:
17,580,273 UART: [state] CFI Enabled
17,588,283 UART: [fht] FMC Alias Private Key: 7
19,353,915 UART: [art] Extend RT PCRs Done
19,355,176 UART: [art] Lock RT PCRs Done
19,356,917 UART: [art] Populate DV Done
19,362,439 UART: [fht] FMC Alias Private Key: 7
19,364,101 UART: [art] Derive CDI
19,364,982 UART: [art] Store in slot 0x4
19,407,255 UART: [art] Derive Key Pair
19,408,337 UART: [art] Store priv key in slot 0x5
21,835,100 UART: [art] Derive Key Pair - Done
21,848,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,555,036 UART: [art] Erasing AUTHORITY.KEYID = 7
23,556,597 UART: [art] PUB.X = 13C9449D8D7A2F22F1B946AACBADF664018F524316AADF7F76E6E78152B61641DBAB163B79C21F13DD3B744B91CC8243
23,563,838 UART: [art] PUB.Y = E0790EB74D842A70C0CFE82FCA32CBE44EF60F9E6ADA439DD7DF906ED25A48EE1575294935CDF17AA269FF433787B07B
23,571,120 UART: [art] SIG.R = A17C5ED3701FC14164D94627051F10457F9FE10C21AD659682D10FCBB4D7C1653F389FD88E9A2D736FD6ED4C69FC2CB8
23,578,592 UART: [art] SIG.S = 81C65090E119E58693FCB1F5E473842FF308F366A33894B89D5312D5BB04207F91E12DA691A0A3B14EF1D65BBE8C58EC
24,557,713 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,774,207 ready_for_fw is high
3,774,651 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,100,720 >>> mbox cmd response: success
17,346,912 UART:
17,347,285 UART: Running Caliptra FMC ...
17,348,478 UART:
17,348,641 UART: [state] CFI Enabled
17,356,557 UART: [fht] FMC Alias Private Key: 7
19,122,431 UART: [art] Extend RT PCRs Done
19,123,702 UART: [art] Lock RT PCRs Done
19,125,139 UART: [art] Populate DV Done
19,130,588 UART: [fht] FMC Alias Private Key: 7
19,132,205 UART: [art] Derive CDI
19,132,983 UART: [art] Store in slot 0x4
19,175,540 UART: [art] Derive Key Pair
19,176,598 UART: [art] Store priv key in slot 0x5
21,603,546 UART: [art] Derive Key Pair - Done
21,616,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,323,054 UART: [art] Erasing AUTHORITY.KEYID = 7
23,324,627 UART: [art] PUB.X = 79A53E8E1742D1FDC59EF930F5754F2CB5C6E0AB3D525F7261BAC136F367AEFC50E0C0EC1AB53682A1CAE6F802DFC967
23,331,822 UART: [art] PUB.Y = E563C354D731197D8B6B23F309EDB209A2D661D2CF6DCDB1162840B4BAF19B323015CBEE77E0E7BD0ED4C8DFC76043C3
23,339,093 UART: [art] SIG.R = E1ED63C9048702E46E6FBF122893DDF42A30241D0009739E0E123983AF1F18596F665CFC9C95165A23508E0DB2ADE16C
23,346,536 UART: [art] SIG.S = 602E22067C05C6C158810AE8E20C7EFBDADC78A1842A6E4B0A3E18EFF3830F0FAB6055D4D5B92B94C0FE5505F73BF8DA
24,325,275 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,012 UART:
192,368 UART: Running Caliptra ROM ...
193,470 UART:
193,610 UART: [state] CFI Enabled
266,694 UART: [state] LifecycleState = Unprovisioned
269,090 UART: [state] DebugLocked = No
270,324 UART: [state] WD Timer not started. Device not locked for debugging
274,093 UART: [kat] SHA2-256
463,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,525 UART: [kat] ++
474,970 UART: [kat] sha1
486,480 UART: [kat] SHA2-256
489,484 UART: [kat] SHA2-384
495,185 UART: [kat] SHA2-512-ACC
497,762 UART: [kat] ECC-384
2,947,792 UART: [kat] HMAC-384Kdf
2,971,901 UART: [kat] LMS
3,503,692 UART: [kat] --
3,508,345 UART: [cold-reset] ++
3,510,414 UART: [fht] FHT @ 0x50003400
3,522,880 UART: [idev] ++
3,523,592 UART: [idev] CDI.KEYID = 6
3,524,621 UART: [idev] SUBJECT.KEYID = 7
3,525,743 UART: [idev] UDS.KEYID = 0
3,526,682 ready_for_fw is high
3,526,890 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,571,270 UART: [idev] Erasing UDS.KEYID = 0
6,028,759 UART: [idev] Sha1 KeyId Algorithm
6,050,633 UART: [idev] --
6,054,711 UART: [ldev] ++
6,055,409 UART: [ldev] CDI.KEYID = 6
6,056,291 UART: [ldev] SUBJECT.KEYID = 5
6,057,507 UART: [ldev] AUTHORITY.KEYID = 7
6,058,740 UART: [ldev] FE.KEYID = 1
6,099,175 UART: [ldev] Erasing FE.KEYID = 1
8,604,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,653 UART: [ldev] --
10,412,509 UART: [fwproc] Wait for Commands...
10,415,141 UART: [fwproc] Recv command 0x46574c44
10,417,455 UART: [fwproc] Recv'd Img size: 34948 bytes
12,886,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,964,222 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,087,850 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,146,379 >>> mbox cmd response: success
13,151,160 UART: [afmc] ++
13,151,880 UART: [afmc] CDI.KEYID = 6
13,153,006 UART: [afmc] SUBJECT.KEYID = 7
13,154,518 UART: [afmc] AUTHORITY.KEYID = 5
15,697,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,422,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,424,778 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,439,916 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,455,056 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,469,965 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,493,688 UART: [afmc] --
17,498,101 UART: [cold-reset] --
17,502,646 UART: [state] Locking Datavault
17,508,290 UART: [state] Locking PCR0, PCR1 and PCR31
17,510,496 UART: [state] Locking ICCM
17,513,138 UART: [exit] Launching FMC @ 0x40000130
17,521,809 UART:
17,522,049 UART: Running Caliptra FMC ...
17,523,196 UART:
17,523,356 UART: [state] CFI Enabled
17,580,601 UART: [fht] FMC Alias Private Key: 7
19,347,054 UART: [art] Extend RT PCRs Done
19,348,326 UART: [art] Lock RT PCRs Done
19,349,886 UART: [art] Populate DV Done
19,355,273 UART: [fht] FMC Alias Private Key: 7
19,356,944 UART: [art] Derive CDI
19,357,711 UART: [art] Store in slot 0x4
19,413,578 UART: [art] Derive Key Pair
19,414,665 UART: [art] Store priv key in slot 0x5
21,876,834 UART: [art] Derive Key Pair - Done
21,889,966 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,603,825 UART: [art] Erasing AUTHORITY.KEYID = 7
23,605,389 UART: [art] PUB.X = BBBA41E6AD366DC47A0E2FAA441CE673B304BBE303DE167AEFB019930B10B05147BA1B478E0C560ECF8259FE8B9E5091
23,612,633 UART: [art] PUB.Y = 97B95CA87CE6AC9F582CEE7965AEFD0BF78A5EA76C36F3D2E7D64605D878E05255639B603246779F966406F8E694D52F
23,619,871 UART: [art] SIG.R = 6DE358EF0CCD41CEA53794E3AC069482293B94F956BEADC15A62D74B776360F7BCCB1103C825A58536FFD25CB8CDFC25
23,627,313 UART: [art] SIG.S = BC0E92F315FC8739F8784991161DD186592775019F9D5016FC4B2A6A2141C6129D41DF496AADA4D1ECD282BD3B383C25
24,605,699 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,439,420 ready_for_fw is high
3,439,966 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,027,681 >>> mbox cmd response: success
17,322,990 UART:
17,323,863 UART: Running Caliptra FMC ...
17,325,070 UART:
17,325,231 UART: [state] CFI Enabled
17,392,315 UART: [fht] FMC Alias Private Key: 7
19,159,426 UART: [art] Extend RT PCRs Done
19,160,678 UART: [art] Lock RT PCRs Done
19,162,431 UART: [art] Populate DV Done
19,167,903 UART: [fht] FMC Alias Private Key: 7
19,169,454 UART: [art] Derive CDI
19,170,259 UART: [art] Store in slot 0x4
19,225,112 UART: [art] Derive Key Pair
19,226,162 UART: [art] Store priv key in slot 0x5
21,688,978 UART: [art] Derive Key Pair - Done
21,701,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,425,412 UART: [art] Erasing AUTHORITY.KEYID = 7
23,427,000 UART: [art] PUB.X = ED4C93114A193A9EAD84DAE07EE8A8440102E4D8D303B25112759A1254DC841B05C22F510C40714C918D248C7989BA48
23,434,127 UART: [art] PUB.Y = D50DC041D92EFCAF54BE46F0ED8E7BD77F05AE42F3ECCD540C0E6BC88982F85BB84BB7FBA5FC196112B6D3BDF197F855
23,441,384 UART: [art] SIG.R = C466E64D88F2B15CB7F12A8F685C6DEF61E381A93A68C2A7D88C3E0B6DA8F3949C3768799EB3AE4581CA4134DD3CFC63
23,448,814 UART: [art] SIG.S = 54A818CE7F57CE0C00733198D0FE2BA3784B564935EB7AD1A6620DBD329D783D4BE8B9169F560917D9336A22CAD64725
24,427,261 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,564 UART:
192,915 UART: Running Caliptra ROM ...
194,108 UART:
603,555 UART: [state] CFI Enabled
615,791 UART: [state] LifecycleState = Unprovisioned
618,171 UART: [state] DebugLocked = No
619,562 UART: [state] WD Timer not started. Device not locked for debugging
623,942 UART: [kat] SHA2-256
813,825 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,602 UART: [kat] ++
825,203 UART: [kat] sha1
836,936 UART: [kat] SHA2-256
839,936 UART: [kat] SHA2-384
845,849 UART: [kat] SHA2-512-ACC
848,382 UART: [kat] ECC-384
3,289,110 UART: [kat] HMAC-384Kdf
3,300,636 UART: [kat] LMS
3,832,419 UART: [kat] --
3,836,828 UART: [cold-reset] ++
3,839,250 UART: [fht] FHT @ 0x50003400
3,851,356 UART: [idev] ++
3,852,056 UART: [idev] CDI.KEYID = 6
3,853,011 UART: [idev] SUBJECT.KEYID = 7
3,854,186 UART: [idev] UDS.KEYID = 0
3,855,078 ready_for_fw is high
3,855,270 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,899,283 UART: [idev] Erasing UDS.KEYID = 0
6,330,964 UART: [idev] Sha1 KeyId Algorithm
6,354,460 UART: [idev] --
6,359,641 UART: [ldev] ++
6,360,337 UART: [ldev] CDI.KEYID = 6
6,361,216 UART: [ldev] SUBJECT.KEYID = 5
6,362,430 UART: [ldev] AUTHORITY.KEYID = 7
6,363,606 UART: [ldev] FE.KEYID = 1
6,374,216 UART: [ldev] Erasing FE.KEYID = 1
8,852,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,489 UART: [ldev] --
10,643,198 UART: [fwproc] Wait for Commands...
10,646,263 UART: [fwproc] Recv command 0x46574c44
10,648,569 UART: [fwproc] Recv'd Img size: 34948 bytes
13,121,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,201,705 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,325,325 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,383,707 >>> mbox cmd response: success
13,387,741 UART: [afmc] ++
13,388,354 UART: [afmc] CDI.KEYID = 6
13,389,589 UART: [afmc] SUBJECT.KEYID = 7
13,390,995 UART: [afmc] AUTHORITY.KEYID = 5
15,895,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,616,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,618,994 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,634,087 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,649,240 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,664,178 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,687,948 UART: [afmc] --
17,690,841 UART: [cold-reset] --
17,696,155 UART: [state] Locking Datavault
17,702,078 UART: [state] Locking PCR0, PCR1 and PCR31
17,704,215 UART: [state] Locking ICCM
17,707,066 UART: [exit] Launching FMC @ 0x40000130
17,715,744 UART:
17,715,986 UART: Running Caliptra FMC ...
17,717,127 UART:
17,717,287 UART: [state] CFI Enabled
17,725,029 UART: [fht] FMC Alias Private Key: 7
19,491,014 UART: [art] Extend RT PCRs Done
19,492,253 UART: [art] Lock RT PCRs Done
19,493,788 UART: [art] Populate DV Done
19,499,235 UART: [fht] FMC Alias Private Key: 7
19,500,903 UART: [art] Derive CDI
19,501,670 UART: [art] Store in slot 0x4
19,544,540 UART: [art] Derive Key Pair
19,545,600 UART: [art] Store priv key in slot 0x5
21,972,226 UART: [art] Derive Key Pair - Done
21,985,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,691,621 UART: [art] Erasing AUTHORITY.KEYID = 7
23,693,164 UART: [art] PUB.X = 50D98FA700CC81A0FD7027E6361102CF2F80E4A4A1419B747628A76681CCC184316EA4DE1C3A4268FEE4CF40231E474C
23,700,416 UART: [art] PUB.Y = 5BAD880BC8F8E78F9CD61947955B136B26EB3F3E110A2072549A4BE4E777E9B70BF901438F5DC42206FCE0593FFC6BED
23,707,670 UART: [art] SIG.R = D2046EE5A9AAEB05FCA42A578E37BC6ACEFD999CFE7F76E45DF60EC3835F46E26972A2726B66F6656FAC63064F929ABE
23,715,044 UART: [art] SIG.S = D29EC2AD26FC94C9FEED142119139530323609BEE000E69EC78235343ACF1F845DD9DA90F5AABD25BED840F839BAAB56
24,693,778 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
3,759,315 ready_for_fw is high
3,759,784 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,253,189 >>> mbox cmd response: success
17,505,560 UART:
17,505,938 UART: Running Caliptra FMC ...
17,507,109 UART:
17,507,261 UART: [state] CFI Enabled
17,515,249 UART: [fht] FMC Alias Private Key: 7
19,280,628 UART: [art] Extend RT PCRs Done
19,281,895 UART: [art] Lock RT PCRs Done
19,283,560 UART: [art] Populate DV Done
19,288,814 UART: [fht] FMC Alias Private Key: 7
19,290,345 UART: [art] Derive CDI
19,291,117 UART: [art] Store in slot 0x4
19,333,997 UART: [art] Derive Key Pair
19,335,082 UART: [art] Store priv key in slot 0x5
21,761,650 UART: [art] Derive Key Pair - Done
21,774,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,481,146 UART: [art] Erasing AUTHORITY.KEYID = 7
23,482,714 UART: [art] PUB.X = 5E5D74EB515160C18048407C153F612FB874E74F0A904F76536F5A93F7E1ABAA02D128FB1FD9559EE0DA58AFA3B94988
23,489,921 UART: [art] PUB.Y = 2ECBB40E1D3C37930656B2DF914EEFF6249C832060BDE833B9A756106D2C53DC3A9D2DA56E7D03F322699E27A1EADFA7
23,497,181 UART: [art] SIG.R = EC518D8DE0A6FE1EF70F2BE502C46199BC6F3533047557A90C84B8500D69FFB07FE0F5E498B81DBAEEC88775DAD9D3F0
23,504,614 UART: [art] SIG.S = 6DB721ED0C893B2D20AB7A55C3D71F945D56309BFB2F51A5AC7B09B3514C1224FBB2ABD3677AE8683068E80CE0BCDF2E
24,483,187 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,823 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,359 UART: [kat] SHA2-256
882,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,405 UART: [kat] ++
886,557 UART: [kat] sha1
890,795 UART: [kat] SHA2-256
892,733 UART: [kat] SHA2-384
895,572 UART: [kat] SHA2-512-ACC
897,473 UART: [kat] ECC-384
903,004 UART: [kat] HMAC-384Kdf
907,532 UART: [kat] LMS
1,475,728 UART: [kat] --
1,476,697 UART: [cold-reset] ++
1,477,135 UART: [fht] Storing FHT @ 0x50003400
1,480,018 UART: [idev] ++
1,480,186 UART: [idev] CDI.KEYID = 6
1,480,546 UART: [idev] SUBJECT.KEYID = 7
1,480,970 UART: [idev] UDS.KEYID = 0
1,481,315 ready_for_fw is high
1,481,315 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,489,096 UART: [idev] Erasing UDS.KEYID = 0
1,506,396 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,102 UART: [idev] --
1,516,201 UART: [ldev] ++
1,516,369 UART: [ldev] CDI.KEYID = 6
1,516,732 UART: [ldev] SUBJECT.KEYID = 5
1,517,158 UART: [ldev] AUTHORITY.KEYID = 7
1,517,621 UART: [ldev] FE.KEYID = 1
1,522,809 UART: [ldev] Erasing FE.KEYID = 1
1,548,262 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,248 UART: [ldev] --
1,587,637 UART: [fwproc] Waiting for Commands...
1,588,308 UART: [fwproc] Received command 0x46574c44
1,589,099 UART: [fwproc] Received Image of size 34948 bytes
1,975,061 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,002,475 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,033,693 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,048,462 >>> mbox cmd response: success
2,049,706 UART: [afmc] ++
2,049,874 UART: [afmc] CDI.KEYID = 6
2,050,236 UART: [afmc] SUBJECT.KEYID = 7
2,050,661 UART: [afmc] AUTHORITY.KEYID = 5
2,085,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,101,778 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,102,558 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,108,267 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,114,150 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,119,833 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,127,803 UART: [afmc] --
2,128,765 UART: [cold-reset] --
2,129,585 UART: [state] Locking Datavault
2,130,632 UART: [state] Locking PCR0, PCR1 and PCR31
2,131,236 UART: [state] Locking ICCM
2,131,788 UART: [exit] Launching FMC @ 0x40000130
2,137,118 UART:
2,137,134 UART: Running Caliptra FMC ...
2,137,542 UART:
2,137,596 UART: [state] CFI Enabled
2,147,962 UART: [fht] FMC Alias Private Key: 7
2,266,928 UART: [art] Extend RT PCRs Done
2,267,356 UART: [art] Lock RT PCRs Done
2,269,032 UART: [art] Populate DV Done
2,277,277 UART: [fht] FMC Alias Private Key: 7
2,278,333 UART: [art] Derive CDI
2,278,613 UART: [art] Store in slot 0x4
2,364,517 UART: [art] Derive Key Pair
2,364,877 UART: [art] Store priv key in slot 0x5
2,378,058 UART: [art] Derive Key Pair - Done
2,392,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,408,032 UART: [art] Erasing AUTHORITY.KEYID = 7
2,408,797 UART: [art] PUB.X = 5B062DA888A7BC90ECF53ECB2C7E0CC1AABCF91809DAD042AAC4688E8975F6746FB6925F12A610C51B1A91880E1B8CAA
2,415,575 UART: [art] PUB.Y = AFE9BC91FF31DF15F1A0B8356F5E67E0458D557416C0DDD9A1A88B60BBEE046F365B3A3CEC66728B7943832D601DBD68
2,422,536 UART: [art] SIG.R = 990F7017710A7387A7C53642B40265E6127711CA9110EC278038DAEF842047C99B0AA2CE14ACBF34E0F7B386A6F92C85
2,429,292 UART: [art] SIG.S = 8A244B0577433512EF165D0C794919DE7DC4F4A76849BE3C4DC3820FB82E3816AD3FF707F1FCDDBEC34599010911D806
2,452,818 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,635 ready_for_fw is high
1,362,635 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,899,574 >>> mbox cmd response: success
1,961,221 UART:
1,961,237 UART: Running Caliptra FMC ...
1,961,645 UART:
1,961,699 UART: [state] CFI Enabled
1,972,095 UART: [fht] FMC Alias Private Key: 7
2,091,113 UART: [art] Extend RT PCRs Done
2,091,541 UART: [art] Lock RT PCRs Done
2,093,383 UART: [art] Populate DV Done
2,101,560 UART: [fht] FMC Alias Private Key: 7
2,102,696 UART: [art] Derive CDI
2,102,976 UART: [art] Store in slot 0x4
2,188,620 UART: [art] Derive Key Pair
2,188,980 UART: [art] Store priv key in slot 0x5
2,201,927 UART: [art] Derive Key Pair - Done
2,216,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,232,651 UART: [art] Erasing AUTHORITY.KEYID = 7
2,233,416 UART: [art] PUB.X = 5889A3DA9A928519A1DA5A9AD46A48D0623FC4309AE6799E22F42938AD80940BFEF0DE82032A1587855C7A426A8AE15E
2,240,184 UART: [art] PUB.Y = 31D298FE0A646A012ED2BD5A3308D399614427902F74FFA69F5F8DD9925F8C3CFFCD749B0979EC7E47E8C41E1110A310
2,247,128 UART: [art] SIG.R = C462B2047270D38297233F1E9AF56A805999D4DA5621EC9BDCF41E6A01D5488D2B16100E2BD48C4011F7C2DA4DE1DEA5
2,253,897 UART: [art] SIG.S = 25583FEB1DEE681987D4A93A8F31BAF1B375D3319323C4C7B98ECA4FF764D9CBE4C6C394DE5DC91353A0157CE768F507
2,277,425 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,246 UART: [kat] SHA2-256
882,177 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,292 UART: [kat] ++
886,444 UART: [kat] sha1
890,610 UART: [kat] SHA2-256
892,548 UART: [kat] SHA2-384
895,229 UART: [kat] SHA2-512-ACC
897,130 UART: [kat] ECC-384
902,983 UART: [kat] HMAC-384Kdf
907,595 UART: [kat] LMS
1,475,791 UART: [kat] --
1,476,508 UART: [cold-reset] ++
1,476,914 UART: [fht] Storing FHT @ 0x50003400
1,479,889 UART: [idev] ++
1,480,057 UART: [idev] CDI.KEYID = 6
1,480,417 UART: [idev] SUBJECT.KEYID = 7
1,480,841 UART: [idev] UDS.KEYID = 0
1,481,186 ready_for_fw is high
1,481,186 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,488,863 UART: [idev] Erasing UDS.KEYID = 0
1,505,645 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,273 UART: [idev] --
1,515,316 UART: [ldev] ++
1,515,484 UART: [ldev] CDI.KEYID = 6
1,515,847 UART: [ldev] SUBJECT.KEYID = 5
1,516,273 UART: [ldev] AUTHORITY.KEYID = 7
1,516,736 UART: [ldev] FE.KEYID = 1
1,522,144 UART: [ldev] Erasing FE.KEYID = 1
1,547,181 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,159 UART: [ldev] --
1,586,440 UART: [fwproc] Waiting for Commands...
1,587,095 UART: [fwproc] Received command 0x46574c44
1,587,886 UART: [fwproc] Received Image of size 34948 bytes
1,974,792 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,002,412 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,033,630 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,048,563 >>> mbox cmd response: success
2,049,735 UART: [afmc] ++
2,049,903 UART: [afmc] CDI.KEYID = 6
2,050,265 UART: [afmc] SUBJECT.KEYID = 7
2,050,690 UART: [afmc] AUTHORITY.KEYID = 5
2,086,081 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,102,297 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,103,077 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,108,786 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,114,669 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,120,352 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,128,048 UART: [afmc] --
2,129,026 UART: [cold-reset] --
2,129,852 UART: [state] Locking Datavault
2,131,091 UART: [state] Locking PCR0, PCR1 and PCR31
2,131,695 UART: [state] Locking ICCM
2,132,243 UART: [exit] Launching FMC @ 0x40000130
2,137,573 UART:
2,137,589 UART: Running Caliptra FMC ...
2,137,997 UART:
2,138,140 UART: [state] CFI Enabled
2,148,494 UART: [fht] FMC Alias Private Key: 7
2,267,672 UART: [art] Extend RT PCRs Done
2,268,100 UART: [art] Lock RT PCRs Done
2,269,714 UART: [art] Populate DV Done
2,277,949 UART: [fht] FMC Alias Private Key: 7
2,279,129 UART: [art] Derive CDI
2,279,409 UART: [art] Store in slot 0x4
2,364,837 UART: [art] Derive Key Pair
2,365,197 UART: [art] Store priv key in slot 0x5
2,378,664 UART: [art] Derive Key Pair - Done
2,393,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,408,710 UART: [art] Erasing AUTHORITY.KEYID = 7
2,409,475 UART: [art] PUB.X = 87F484ECF4D4F04946EA1BD23B20C821BAD4E823F1126CEDAA639E5656C17E8B49F4BE38408EA2952B5A57408571EEE6
2,416,255 UART: [art] PUB.Y = C487ED36CB5D0925FD90D54D9FB1BC5E5FACFDB6A46E272CDCD8804946CF5CF5F9BDE8684AC3B7C464787F5CFEAB31A1
2,423,232 UART: [art] SIG.R = 3DF058990AFC880AEB2679D795AC5E57C07C7B64C4FB4B32D07B0884E38EB896C29684015006E74586614AEBEAB3519B
2,429,991 UART: [art] SIG.S = 23B8BF8518AFACEB15C33C715425E3B9719B1449A8B99E22C890C1B4951B2239B1137EF713B12C8B7CE483BFFA64250C
2,453,249 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,322 ready_for_fw is high
1,363,322 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,898,991 >>> mbox cmd response: success
1,960,792 UART:
1,960,808 UART: Running Caliptra FMC ...
1,961,216 UART:
1,961,359 UART: [state] CFI Enabled
1,971,877 UART: [fht] FMC Alias Private Key: 7
2,090,935 UART: [art] Extend RT PCRs Done
2,091,363 UART: [art] Lock RT PCRs Done
2,092,633 UART: [art] Populate DV Done
2,100,886 UART: [fht] FMC Alias Private Key: 7
2,101,962 UART: [art] Derive CDI
2,102,242 UART: [art] Store in slot 0x4
2,188,342 UART: [art] Derive Key Pair
2,188,702 UART: [art] Store priv key in slot 0x5
2,201,799 UART: [art] Derive Key Pair - Done
2,216,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,232,044 UART: [art] Erasing AUTHORITY.KEYID = 7
2,232,809 UART: [art] PUB.X = BF118C0C563421F89B8C9FFBC5092408901E061EB05140784F7CA85746DDDABFC3671885608D647EE67EAE25233E443F
2,239,569 UART: [art] PUB.Y = 4CC1FC19C5DD6F81633B54A97F332C73B4ED2CA14EA3CC17A8A4B4E94125204965C64F4CC8D9ADD1C2A0668C83C5DDF8
2,246,537 UART: [art] SIG.R = EA5411CB7CF218AAE1DCE3DF98B5A13AAE26AFE496F1EB93E2480D8BC112F2C3BE85FB7C1A901A74F689BB30576B405C
2,253,328 UART: [art] SIG.S = 78D4652F211E48FA6F4F9ABF5A76738F7E71B16FACE0765E1FEADAC1DE20B50D7A3282979AB6411FBADC8FC970B6CECE
2,277,930 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,642 UART: [kat] SHA2-256
901,582 UART: [kat] SHA2-384
904,321 UART: [kat] SHA2-512-ACC
906,222 UART: [kat] ECC-384
915,561 UART: [kat] HMAC-384Kdf
920,243 UART: [kat] LMS
1,168,555 UART: [kat] --
1,169,512 UART: [cold-reset] ++
1,170,054 UART: [fht] FHT @ 0x50003400
1,172,782 UART: [idev] ++
1,172,950 UART: [idev] CDI.KEYID = 6
1,173,311 UART: [idev] SUBJECT.KEYID = 7
1,173,736 UART: [idev] UDS.KEYID = 0
1,174,082 ready_for_fw is high
1,174,082 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,181,753 UART: [idev] Erasing UDS.KEYID = 0
1,198,565 UART: [idev] Sha1 KeyId Algorithm
1,207,461 UART: [idev] --
1,208,570 UART: [ldev] ++
1,208,738 UART: [ldev] CDI.KEYID = 6
1,209,102 UART: [ldev] SUBJECT.KEYID = 5
1,209,529 UART: [ldev] AUTHORITY.KEYID = 7
1,209,992 UART: [ldev] FE.KEYID = 1
1,215,124 UART: [ldev] Erasing FE.KEYID = 1
1,240,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,800 UART: [ldev] --
1,280,087 UART: [fwproc] Wait for Commands...
1,280,686 UART: [fwproc] Recv command 0x46574c44
1,281,419 UART: [fwproc] Recv'd Img size: 34948 bytes
1,668,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,695,615 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,726,790 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,741,769 >>> mbox cmd response: success
1,742,967 UART: [afmc] ++
1,743,135 UART: [afmc] CDI.KEYID = 6
1,743,498 UART: [afmc] SUBJECT.KEYID = 7
1,743,924 UART: [afmc] AUTHORITY.KEYID = 5
1,779,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,795,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,796,343 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,802,053 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,807,934 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,813,635 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,821,358 UART: [afmc] --
1,822,349 UART: [cold-reset] --
1,822,973 UART: [state] Locking Datavault
1,824,274 UART: [state] Locking PCR0, PCR1 and PCR31
1,824,878 UART: [state] Locking ICCM
1,825,372 UART: [exit] Launching FMC @ 0x40000130
1,830,702 UART:
1,830,718 UART: Running Caliptra FMC ...
1,831,126 UART:
1,831,180 UART: [state] CFI Enabled
1,841,804 UART: [fht] FMC Alias Private Key: 7
1,960,346 UART: [art] Extend RT PCRs Done
1,960,774 UART: [art] Lock RT PCRs Done
1,962,156 UART: [art] Populate DV Done
1,970,563 UART: [fht] FMC Alias Private Key: 7
1,971,737 UART: [art] Derive CDI
1,972,017 UART: [art] Store in slot 0x4
2,057,630 UART: [art] Derive Key Pair
2,057,990 UART: [art] Store priv key in slot 0x5
2,071,038 UART: [art] Derive Key Pair - Done
2,085,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,101,639 UART: [art] Erasing AUTHORITY.KEYID = 7
2,102,404 UART: [art] PUB.X = FAD1BD801E6823926508DA51A9BA7D9AF43C4C05B587999285EDE5BBD44E15C988D94B630DD76E4CCDC5500F5C723062
2,109,172 UART: [art] PUB.Y = F9A0F6759BA354CEF89AFCFB72EF41C7DFE5FDAFDEBF28D238BB224D56928A4D9C219D5C9B7E1A732E4D7783AC6DA6F4
2,116,152 UART: [art] SIG.R = 474DC9EFECBA0E3B48D8FF011CB1630AD1F9A6E96B5ADA07CB35975625717BBD455DFA72B55177806C8AD5CC3D0FBFFE
2,122,933 UART: [art] SIG.S = 7DD95DE4E01D9AD3C3C5D1C14829918CC39FADF7D74491725C3A45E59ECD5678600593EF9D3836052B9009731EAB751B
2,146,637 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,604 ready_for_fw is high
1,059,604 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,596,352 >>> mbox cmd response: success
1,658,081 UART:
1,658,097 UART: Running Caliptra FMC ...
1,658,505 UART:
1,658,559 UART: [state] CFI Enabled
1,669,437 UART: [fht] FMC Alias Private Key: 7
1,788,429 UART: [art] Extend RT PCRs Done
1,788,857 UART: [art] Lock RT PCRs Done
1,790,217 UART: [art] Populate DV Done
1,798,284 UART: [fht] FMC Alias Private Key: 7
1,799,242 UART: [art] Derive CDI
1,799,522 UART: [art] Store in slot 0x4
1,885,225 UART: [art] Derive Key Pair
1,885,585 UART: [art] Store priv key in slot 0x5
1,898,421 UART: [art] Derive Key Pair - Done
1,913,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,928,917 UART: [art] Erasing AUTHORITY.KEYID = 7
1,929,682 UART: [art] PUB.X = 48A381A5FA46DC861595EE8E9E5789726CD4BBBF630F3B695E2BFE14C56C267A11428399A3E448B23F0BB2C0CF2C9A4C
1,936,458 UART: [art] PUB.Y = 4F734E09CFFE8BB0432958310613D3CFD6E4CC8F6595B667C2B7FFBAFDF2BBCB0E4E150BA5CC809323038BE73F4948A2
1,943,411 UART: [art] SIG.R = 84E12C5F882AFD489236F649BDACF1FA0B40CCB56807AE0B2BC1C6DC0CA6FCDA54E55DD620E2072C0B47304FAF49D8F0
1,950,187 UART: [art] SIG.S = 9A6145A535D0A53A84F23A6509F48AAB9F00C23AA515D57860B5908F206BB20326F38D7751183B1CE924BB2CFD3A66B3
1,973,866 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,007 UART: [state] LifecycleState = Unprovisioned
85,662 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,739 UART: [kat] SHA2-256
901,679 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
916,440 UART: [kat] HMAC-384Kdf
920,888 UART: [kat] LMS
1,169,200 UART: [kat] --
1,170,161 UART: [cold-reset] ++
1,170,567 UART: [fht] FHT @ 0x50003400
1,173,143 UART: [idev] ++
1,173,311 UART: [idev] CDI.KEYID = 6
1,173,672 UART: [idev] SUBJECT.KEYID = 7
1,174,097 UART: [idev] UDS.KEYID = 0
1,174,443 ready_for_fw is high
1,174,443 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,182,042 UART: [idev] Erasing UDS.KEYID = 0
1,199,052 UART: [idev] Sha1 KeyId Algorithm
1,207,912 UART: [idev] --
1,208,799 UART: [ldev] ++
1,208,967 UART: [ldev] CDI.KEYID = 6
1,209,331 UART: [ldev] SUBJECT.KEYID = 5
1,209,758 UART: [ldev] AUTHORITY.KEYID = 7
1,210,221 UART: [ldev] FE.KEYID = 1
1,215,387 UART: [ldev] Erasing FE.KEYID = 1
1,241,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,759 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,603 UART: [fwproc] Recv command 0x46574c44
1,282,336 UART: [fwproc] Recv'd Img size: 34948 bytes
1,669,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,696,102 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,727,277 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,742,222 >>> mbox cmd response: success
1,743,462 UART: [afmc] ++
1,743,630 UART: [afmc] CDI.KEYID = 6
1,743,993 UART: [afmc] SUBJECT.KEYID = 7
1,744,419 UART: [afmc] AUTHORITY.KEYID = 5
1,779,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,796,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,796,882 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,802,592 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,808,473 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,814,174 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,821,871 UART: [afmc] --
1,822,740 UART: [cold-reset] --
1,823,470 UART: [state] Locking Datavault
1,824,597 UART: [state] Locking PCR0, PCR1 and PCR31
1,825,201 UART: [state] Locking ICCM
1,825,691 UART: [exit] Launching FMC @ 0x40000130
1,831,021 UART:
1,831,037 UART: Running Caliptra FMC ...
1,831,445 UART:
1,831,588 UART: [state] CFI Enabled
1,842,104 UART: [fht] FMC Alias Private Key: 7
1,961,664 UART: [art] Extend RT PCRs Done
1,962,092 UART: [art] Lock RT PCRs Done
1,963,538 UART: [art] Populate DV Done
1,971,833 UART: [fht] FMC Alias Private Key: 7
1,972,875 UART: [art] Derive CDI
1,973,155 UART: [art] Store in slot 0x4
2,058,952 UART: [art] Derive Key Pair
2,059,312 UART: [art] Store priv key in slot 0x5
2,072,202 UART: [art] Derive Key Pair - Done
2,087,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,102,541 UART: [art] Erasing AUTHORITY.KEYID = 7
2,103,306 UART: [art] PUB.X = 142103D2F7DAEB130B798B754B5515EC150D659EFDC8FBD293619CD8651700CEC8B9629CAE9738DF526379ACE70AE29E
2,110,052 UART: [art] PUB.Y = CC75BB568B731A289D6E0627E80B779AED151D26500BFA1E854C5E82484D4E6DFFFBA9BCF7271DB57DBFF65F1A7AC3E1
2,117,015 UART: [art] SIG.R = 1AEFBBC5868C8C4BE7D511A81E1117AEB8F8095B36799258310D5B978ED3FF2E7638679BA76CED06F020EA27DA42C3D7
2,123,788 UART: [art] SIG.S = 0DCACBC16311B00FA8873AA1C85121490450ABBE05DA80AB898949FB280133FAA09BDEEF230290C82A1F2F0F04AC39B0
2,147,513 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,377 ready_for_fw is high
1,059,377 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,596,245 >>> mbox cmd response: success
1,658,418 UART:
1,658,434 UART: Running Caliptra FMC ...
1,658,842 UART:
1,658,985 UART: [state] CFI Enabled
1,669,349 UART: [fht] FMC Alias Private Key: 7
1,788,443 UART: [art] Extend RT PCRs Done
1,788,871 UART: [art] Lock RT PCRs Done
1,790,295 UART: [art] Populate DV Done
1,798,692 UART: [fht] FMC Alias Private Key: 7
1,799,804 UART: [art] Derive CDI
1,800,084 UART: [art] Store in slot 0x4
1,885,625 UART: [art] Derive Key Pair
1,885,985 UART: [art] Store priv key in slot 0x5
1,899,293 UART: [art] Derive Key Pair - Done
1,914,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,929,594 UART: [art] Erasing AUTHORITY.KEYID = 7
1,930,359 UART: [art] PUB.X = EB99A0F95A943EC306D29A1B755775652446DEE26DC6D70C2B6085C1A0FB49A3FB6FEF6731EA8C46A2B618F532D26D12
1,937,133 UART: [art] PUB.Y = CD4B1A5BB2E06AB9312BF35AE4371B6C28BE1CDE4BB5456E510512CC2540FBC709A5FC24D26930B366AD17B7093294CB
1,944,088 UART: [art] SIG.R = DEC919446D7746D27C246490BC38ED1776C09537FA10A93E8C26DA6D1A0DAFCCEB31A93B4FD388F49BFB0C0ED3C88BF7
1,950,869 UART: [art] SIG.S = 4AE29F32FA74D7E0FD11BB9CE346E570D203332F789727A193AB1D2E9CDB22629D026C9CFAA6561BE9B9A68988C205C5
1,974,361 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
892,972 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,097 UART: [kat] ++
897,249 UART: [kat] sha1
901,535 UART: [kat] SHA2-256
903,475 UART: [kat] SHA2-384
906,092 UART: [kat] SHA2-512-ACC
907,993 UART: [kat] ECC-384
917,392 UART: [kat] HMAC-384Kdf
921,992 UART: [kat] LMS
1,170,320 UART: [kat] --
1,171,285 UART: [cold-reset] ++
1,171,665 UART: [fht] FHT @ 0x50003400
1,174,358 UART: [idev] ++
1,174,526 UART: [idev] CDI.KEYID = 6
1,174,886 UART: [idev] SUBJECT.KEYID = 7
1,175,310 UART: [idev] UDS.KEYID = 0
1,175,655 ready_for_fw is high
1,175,655 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,183,766 UART: [idev] Erasing UDS.KEYID = 0
1,200,473 UART: [idev] Sha1 KeyId Algorithm
1,208,849 UART: [idev] --
1,209,933 UART: [ldev] ++
1,210,101 UART: [ldev] CDI.KEYID = 6
1,210,464 UART: [ldev] SUBJECT.KEYID = 5
1,210,890 UART: [ldev] AUTHORITY.KEYID = 7
1,211,353 UART: [ldev] FE.KEYID = 1
1,216,631 UART: [ldev] Erasing FE.KEYID = 1
1,242,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,131 UART: [ldev] --
1,281,570 UART: [fwproc] Wait for Commands...
1,282,342 UART: [fwproc] Recv command 0x46574c44
1,283,070 UART: [fwproc] Recv'd Img size: 34948 bytes
1,670,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,696,744 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,727,914 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,742,749 >>> mbox cmd response: success
1,743,831 UART: [afmc] ++
1,743,999 UART: [afmc] CDI.KEYID = 6
1,744,361 UART: [afmc] SUBJECT.KEYID = 7
1,744,786 UART: [afmc] AUTHORITY.KEYID = 5
1,780,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,796,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,797,270 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,802,979 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,808,862 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,814,563 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,822,573 UART: [afmc] --
1,823,603 UART: [cold-reset] --
1,824,483 UART: [state] Locking Datavault
1,825,590 UART: [state] Locking PCR0, PCR1 and PCR31
1,826,194 UART: [state] Locking ICCM
1,826,644 UART: [exit] Launching FMC @ 0x40000130
1,831,974 UART:
1,831,990 UART: Running Caliptra FMC ...
1,832,398 UART:
1,832,452 UART: [state] CFI Enabled
1,843,206 UART: [fht] FMC Alias Private Key: 7
1,962,282 UART: [art] Extend RT PCRs Done
1,962,710 UART: [art] Lock RT PCRs Done
1,964,316 UART: [art] Populate DV Done
1,972,751 UART: [fht] FMC Alias Private Key: 7
1,973,755 UART: [art] Derive CDI
1,974,035 UART: [art] Store in slot 0x4
2,059,810 UART: [art] Derive Key Pair
2,060,170 UART: [art] Store priv key in slot 0x5
2,073,570 UART: [art] Derive Key Pair - Done
2,088,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,103,501 UART: [art] Erasing AUTHORITY.KEYID = 7
2,104,266 UART: [art] PUB.X = 33E8588C206EEE427CFD20CF45314EF37EC5AEEF020A1D3EDCE8A5C8B3B19C373F6F7AE2249141813E759C8C67C0FCC5
2,111,048 UART: [art] PUB.Y = 93FA5D2A477ED5A80B0CBBE77EF4330F580B7CA62ACCA60D3D6E6F9A529C54C58903CC437BC98FAC26AB964B21954306
2,117,993 UART: [art] SIG.R = AD4E7DD162F92D60866B6137EFFD0B4972F2BA3D6BAE26052431BD3F1A691C30F6C75718768FD667018B91913CB7ECFE
2,124,764 UART: [art] SIG.S = ED22DC8E361FFDFB62FF30D66AFB10F57BFFB29E80A019C6C4DDC35D95156492DC1AFFD5E0557B86A94714E628A0DBEE
2,147,725 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,513 ready_for_fw is high
1,060,513 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,596,804 >>> mbox cmd response: success
1,659,553 UART:
1,659,569 UART: Running Caliptra FMC ...
1,659,977 UART:
1,660,031 UART: [state] CFI Enabled
1,670,429 UART: [fht] FMC Alias Private Key: 7
1,789,177 UART: [art] Extend RT PCRs Done
1,789,605 UART: [art] Lock RT PCRs Done
1,791,349 UART: [art] Populate DV Done
1,799,618 UART: [fht] FMC Alias Private Key: 7
1,800,632 UART: [art] Derive CDI
1,800,912 UART: [art] Store in slot 0x4
1,886,957 UART: [art] Derive Key Pair
1,887,317 UART: [art] Store priv key in slot 0x5
1,900,611 UART: [art] Derive Key Pair - Done
1,915,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,931,146 UART: [art] Erasing AUTHORITY.KEYID = 7
1,931,911 UART: [art] PUB.X = AB91C2BC40A3E2AAFEFBAD37F34D3C759FA4631B6998B5A03444F0E3B36FBBC78C5EA20167C49531FC19E19933C7F105
1,938,691 UART: [art] PUB.Y = BE5AE1CDAA32ABA978670BC0EC0493CC8DBD00F3E4244F22B9B5375555C45AF7FD3433F7107833E8737D387EACFAF8B0
1,945,631 UART: [art] SIG.R = 0CD6567C3435B1A76DA4A25DA8D99BEA9B8ECB09367652F15BC40C1B5B5F6651BB266195E2E85604F5BE6B4409CBF34A
1,952,398 UART: [art] SIG.S = B9B3AC336D72C5F2E09375B6F14DA107FE616831F14AF06D1354CD620EFAD76D4F29E0AB01E1D762D46874216C9B5838
1,975,822 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
893,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,732 UART: [kat] ++
897,884 UART: [kat] sha1
902,132 UART: [kat] SHA2-256
904,072 UART: [kat] SHA2-384
906,951 UART: [kat] SHA2-512-ACC
908,852 UART: [kat] ECC-384
918,571 UART: [kat] HMAC-384Kdf
923,127 UART: [kat] LMS
1,171,455 UART: [kat] --
1,172,370 UART: [cold-reset] ++
1,172,888 UART: [fht] FHT @ 0x50003400
1,175,549 UART: [idev] ++
1,175,717 UART: [idev] CDI.KEYID = 6
1,176,077 UART: [idev] SUBJECT.KEYID = 7
1,176,501 UART: [idev] UDS.KEYID = 0
1,176,846 ready_for_fw is high
1,176,846 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,184,191 UART: [idev] Erasing UDS.KEYID = 0
1,201,730 UART: [idev] Sha1 KeyId Algorithm
1,210,304 UART: [idev] --
1,211,350 UART: [ldev] ++
1,211,518 UART: [ldev] CDI.KEYID = 6
1,211,881 UART: [ldev] SUBJECT.KEYID = 5
1,212,307 UART: [ldev] AUTHORITY.KEYID = 7
1,212,770 UART: [ldev] FE.KEYID = 1
1,218,040 UART: [ldev] Erasing FE.KEYID = 1
1,245,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,872 UART: [ldev] --
1,284,199 UART: [fwproc] Wait for Commands...
1,284,855 UART: [fwproc] Recv command 0x46574c44
1,285,583 UART: [fwproc] Recv'd Img size: 34948 bytes
1,671,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,407 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,730,577 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,745,516 >>> mbox cmd response: success
1,746,724 UART: [afmc] ++
1,746,892 UART: [afmc] CDI.KEYID = 6
1,747,254 UART: [afmc] SUBJECT.KEYID = 7
1,747,679 UART: [afmc] AUTHORITY.KEYID = 5
1,782,856 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,799,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,800,047 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,756 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,811,639 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,817,340 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,825,128 UART: [afmc] --
1,826,164 UART: [cold-reset] --
1,826,936 UART: [state] Locking Datavault
1,828,159 UART: [state] Locking PCR0, PCR1 and PCR31
1,828,763 UART: [state] Locking ICCM
1,829,237 UART: [exit] Launching FMC @ 0x40000130
1,834,567 UART:
1,834,583 UART: Running Caliptra FMC ...
1,834,991 UART:
1,835,134 UART: [state] CFI Enabled
1,845,696 UART: [fht] FMC Alias Private Key: 7
1,964,864 UART: [art] Extend RT PCRs Done
1,965,292 UART: [art] Lock RT PCRs Done
1,966,800 UART: [art] Populate DV Done
1,975,115 UART: [fht] FMC Alias Private Key: 7
1,976,103 UART: [art] Derive CDI
1,976,383 UART: [art] Store in slot 0x4
2,061,890 UART: [art] Derive Key Pair
2,062,250 UART: [art] Store priv key in slot 0x5
2,075,292 UART: [art] Derive Key Pair - Done
2,090,065 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,105,620 UART: [art] Erasing AUTHORITY.KEYID = 7
2,106,385 UART: [art] PUB.X = 4053EA2416FA1625E219BB8D21915FA32AC3950AA91408E30D1941CF251334B6452D1A587A563BEC18F1ED316EEA03E2
2,113,145 UART: [art] PUB.Y = 597EDAD07B65E69B241ADEFAD2CE4A6FF33A2C49D77CA841690159ED4128A0FA4CD8C9D23A2D2706879216461ABC2AAD
2,120,107 UART: [art] SIG.R = EE2ABEB1937578CE9AE64D16EAA21BCBCCFD573194F78FAD34D55A9D3B2152A4C4FA820D36748B63DDD53E28017A228D
2,126,891 UART: [art] SIG.S = 452574C5550AEEB180FF9A6363F61831BCFD0D7E3512F9C8134FBC2C0069D8A2ADDA7FBB07C54BFDD0E7E34D5FF324E2
2,150,603 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,708 ready_for_fw is high
1,060,708 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,595,939 >>> mbox cmd response: success
1,658,098 UART:
1,658,114 UART: Running Caliptra FMC ...
1,658,522 UART:
1,658,665 UART: [state] CFI Enabled
1,669,281 UART: [fht] FMC Alias Private Key: 7
1,787,889 UART: [art] Extend RT PCRs Done
1,788,317 UART: [art] Lock RT PCRs Done
1,790,255 UART: [art] Populate DV Done
1,798,628 UART: [fht] FMC Alias Private Key: 7
1,799,622 UART: [art] Derive CDI
1,799,902 UART: [art] Store in slot 0x4
1,885,547 UART: [art] Derive Key Pair
1,885,907 UART: [art] Store priv key in slot 0x5
1,898,887 UART: [art] Derive Key Pair - Done
1,913,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,929,143 UART: [art] Erasing AUTHORITY.KEYID = 7
1,929,908 UART: [art] PUB.X = 41AB13568C836C07F70308C1FDADE408254DBCABDA9C37DBA59AA97F714DB2569C4512D993A307A67B3E697CBAA72C0C
1,936,676 UART: [art] PUB.Y = FA9F653DFAFBDF790C1A371719164C95453CA87E85A607D8920B46F869B4C0265B647C9F846059EFBA0E37E4B99CF85C
1,943,622 UART: [art] SIG.R = 82C06D7487C5945251C99769266FB4732CB9F5629439A9B1B339B21287C4C1737DC72F33C283E1D0841E749916DEDC90
1,950,382 UART: [art] SIG.S = 429217F915DDF8002EF83115B83BA0DD40CE9CC9C85797A9FE17EE0F6DB6DA10E1BD12E018C889BFDD51D34A676E0086
1,974,066 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.48s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,024 UART:
192,383 UART: Running Caliptra ROM ...
193,512 UART:
193,655 UART: [state] CFI Enabled
266,665 UART: [state] LifecycleState = Unprovisioned
268,642 UART: [state] DebugLocked = No
270,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,321 UART: [kat] SHA2-256
445,009 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,511 UART: [kat] ++
455,985 UART: [kat] sha1
466,219 UART: [kat] SHA2-256
468,938 UART: [kat] SHA2-384
474,493 UART: [kat] SHA2-512-ACC
476,852 UART: [kat] ECC-384
2,769,962 UART: [kat] HMAC-384Kdf
2,801,661 UART: [kat] LMS
3,991,908 UART: [kat] --
3,995,752 UART: [cold-reset] ++
3,997,896 UART: [fht] Storing FHT @ 0x50003400
4,009,650 UART: [idev] ++
4,010,215 UART: [idev] CDI.KEYID = 6
4,011,168 UART: [idev] SUBJECT.KEYID = 7
4,012,409 UART: [idev] UDS.KEYID = 0
4,013,455 ready_for_fw is high
4,013,685 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,058,043 UART: [idev] Erasing UDS.KEYID = 0
7,346,247 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,056 UART: [idev] --
7,372,318 UART: [ldev] ++
7,372,934 UART: [ldev] CDI.KEYID = 6
7,373,894 UART: [ldev] SUBJECT.KEYID = 5
7,375,099 UART: [ldev] AUTHORITY.KEYID = 7
7,376,326 UART: [ldev] FE.KEYID = 1
7,423,914 UART: [ldev] Erasing FE.KEYID = 1
10,756,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,240 UART: [ldev] --
13,119,032 UART: [fwproc] Waiting for Commands...
13,120,747 UART: [fwproc] Received command 0x46574c44
13,122,921 UART: [fwproc] Received Image of size 34948 bytes
16,205,906 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,281,185 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,354,384 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,390,965 >>> mbox cmd response: success
16,395,332 UART: [afmc] ++
16,395,920 UART: [afmc] CDI.KEYID = 6
16,396,825 UART: [afmc] SUBJECT.KEYID = 7
16,398,092 UART: [afmc] AUTHORITY.KEYID = 5
19,765,917 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,068,099 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,070,363 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,084,792 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,099,526 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,113,949 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,135,944 UART: [afmc] --
22,140,678 UART: [cold-reset] --
22,143,351 UART: [state] Locking Datavault
22,149,457 UART: [state] Locking PCR0, PCR1 and PCR31
22,151,207 UART: [state] Locking ICCM
22,152,355 UART: [exit] Launching FMC @ 0x40000130
22,160,752 UART:
22,160,984 UART: Running Caliptra FMC ...
22,162,081 UART:
22,162,233 UART: [state] CFI Enabled
22,230,897 UART: [fht] FMC Alias Private Key: 7
24,571,367 UART: [art] Extend RT PCRs Done
24,572,585 UART: [art] Lock RT PCRs Done
24,574,238 UART: [art] Populate DV Done
24,579,758 UART: [fht] FMC Alias Private Key: 7
24,581,364 UART: [art] Derive CDI
24,582,183 UART: [art] Store in slot 0x4
24,639,377 UART: [art] Derive Key Pair
24,640,417 UART: [art] Store priv key in slot 0x5
27,933,280 UART: [art] Derive Key Pair - Done
27,946,406 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,234,064 UART: [art] Erasing AUTHORITY.KEYID = 7
30,235,582 UART: [art] PUB.X = 278DD912EA886B05BABF6302BB34F74B484026A31614C41D0221E659CECA65586C0ACDF2A5CCA01A74B1923EAE7CF0FB
30,242,831 UART: [art] PUB.Y = F4F277669FFD264047D31EB8E651BDC2FE8D3FEA65C1159C33AB48C5EA95C2C85BEE4E4A6329690593CDB99316BA60BA
30,250,114 UART: [art] SIG.R = 2B1B94962440490378038D14F5C5EDA6B3E925194B2532F2785F7BC54D8502C57B63B7DEFBA6F03103ABE01885AAE7D6
30,257,501 UART: [art] SIG.S = A42A3FDFAA90B0643AF4E627F67C6421C717F14C1634526AAC411A51EC9CCF2F9F9D40DE03FB5BE9D6727329847046A1
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,807,734 ready_for_fw is high
3,808,178 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,286,864 >>> mbox cmd response: success
21,985,374 UART:
21,985,796 UART: Running Caliptra FMC ...
21,986,978 UART:
21,987,132 UART: [state] CFI Enabled
22,047,612 UART: [fht] FMC Alias Private Key: 7
24,388,390 UART: [art] Extend RT PCRs Done
24,389,617 UART: [art] Lock RT PCRs Done
24,391,296 UART: [art] Populate DV Done
24,396,554 UART: [fht] FMC Alias Private Key: 7
24,398,259 UART: [art] Derive CDI
24,399,073 UART: [art] Store in slot 0x4
24,457,457 UART: [art] Derive Key Pair
24,458,488 UART: [art] Store priv key in slot 0x5
27,751,394 UART: [art] Derive Key Pair - Done
27,764,685 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,052,669 UART: [art] Erasing AUTHORITY.KEYID = 7
30,054,202 UART: [art] PUB.X = 7457F0857510EF5BEAF48A554C1370A1023EA0B26C4AB2932C0E37444A4E72E4E291FED6FFB7A19A00C4B3871EC4F039
30,061,410 UART: [art] PUB.Y = 394F46F85EDEA6519E51867B89FB177F38F17AF6A93F611E9976EBFE8B8BF8FB1864E15191A6692C0B3B56ACB488E5EB
30,068,701 UART: [art] SIG.R = EB21BF9EB4EE4E3B1570C43C16784519AF884941CF2544F98364D2E5FDB419184584FA6ECEC226D8567D1EA4CD43EB2D
30,076,102 UART: [art] SIG.S = 3DF80690EE83596E8D8E5C3D55913CA86DD10F33D10463A1E5C6DB24233A9B10155E1569C5B33E69F6AA50DD292831BD
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,314 UART:
192,678 UART: Running Caliptra ROM ...
193,762 UART:
603,638 UART: [state] CFI Enabled
619,277 UART: [state] LifecycleState = Unprovisioned
621,216 UART: [state] DebugLocked = No
623,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,716 UART: [kat] SHA2-256
798,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,000 UART: [kat] ++
809,447 UART: [kat] sha1
820,399 UART: [kat] SHA2-256
823,107 UART: [kat] SHA2-384
828,390 UART: [kat] SHA2-512-ACC
830,751 UART: [kat] ECC-384
3,114,436 UART: [kat] HMAC-384Kdf
3,126,527 UART: [kat] LMS
4,316,616 UART: [kat] --
4,321,409 UART: [cold-reset] ++
4,323,342 UART: [fht] Storing FHT @ 0x50003400
4,334,245 UART: [idev] ++
4,334,810 UART: [idev] CDI.KEYID = 6
4,335,788 UART: [idev] SUBJECT.KEYID = 7
4,337,026 UART: [idev] UDS.KEYID = 0
4,338,203 ready_for_fw is high
4,338,399 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,382,417 UART: [idev] Erasing UDS.KEYID = 0
7,620,631 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,794 UART: [idev] --
7,645,524 UART: [ldev] ++
7,646,089 UART: [ldev] CDI.KEYID = 6
7,647,052 UART: [ldev] SUBJECT.KEYID = 5
7,648,261 UART: [ldev] AUTHORITY.KEYID = 7
7,649,485 UART: [ldev] FE.KEYID = 1
7,660,121 UART: [ldev] Erasing FE.KEYID = 1
10,946,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,837 UART: [ldev] --
13,305,029 UART: [fwproc] Waiting for Commands...
13,308,264 UART: [fwproc] Received command 0x46574c44
13,310,504 UART: [fwproc] Received Image of size 34948 bytes
16,397,837 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,470,748 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,543,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,580,206 >>> mbox cmd response: success
16,584,647 UART: [afmc] ++
16,585,286 UART: [afmc] CDI.KEYID = 6
16,586,188 UART: [afmc] SUBJECT.KEYID = 7
16,587,452 UART: [afmc] AUTHORITY.KEYID = 5
19,898,547 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,192,196 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,194,496 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,208,913 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,223,611 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,238,026 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,259,842 UART: [afmc] --
22,262,932 UART: [cold-reset] --
22,267,031 UART: [state] Locking Datavault
22,271,523 UART: [state] Locking PCR0, PCR1 and PCR31
22,273,267 UART: [state] Locking ICCM
22,275,084 UART: [exit] Launching FMC @ 0x40000130
22,283,475 UART:
22,283,706 UART: Running Caliptra FMC ...
22,284,799 UART:
22,284,955 UART: [state] CFI Enabled
22,293,292 UART: [fht] FMC Alias Private Key: 7
24,632,885 UART: [art] Extend RT PCRs Done
24,634,106 UART: [art] Lock RT PCRs Done
24,635,835 UART: [art] Populate DV Done
24,641,229 UART: [fht] FMC Alias Private Key: 7
24,642,818 UART: [art] Derive CDI
24,643,624 UART: [art] Store in slot 0x4
24,686,363 UART: [art] Derive Key Pair
24,687,417 UART: [art] Store priv key in slot 0x5
27,929,592 UART: [art] Derive Key Pair - Done
27,942,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,223,068 UART: [art] Erasing AUTHORITY.KEYID = 7
30,224,588 UART: [art] PUB.X = ED2272FEE827BCED107B68EA88DBEC3CF9C2A17C1EB723C65B692F01CABA33BCD8867353DAA8E030F1865BB47618EC0E
30,231,842 UART: [art] PUB.Y = B94521B0D15B8AD75C751B4CE8E1AEE5AF83AD960E7BB3625094E17C73497A1883A2C142C874F12E923CED6618E27C9B
30,239,130 UART: [art] SIG.R = 901733657240ED611C9BA4ED919A54AF049086DAC26E4560A57514C311208630E74E8EB4CD64DC0DA39A6E7FF04B2202
30,246,526 UART: [art] SIG.S = 93F575000803479B686C056A68018AFD1C63C4D49AF41F4884361C5526D8E80369ECC0CD015E170D7B768A135FB8287E
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
4,126,293 ready_for_fw is high
4,126,864 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,464,498 >>> mbox cmd response: success
22,102,370 UART:
22,102,807 UART: Running Caliptra FMC ...
22,103,981 UART:
22,104,124 UART: [state] CFI Enabled
22,111,888 UART: [fht] FMC Alias Private Key: 7
24,451,744 UART: [art] Extend RT PCRs Done
24,452,984 UART: [art] Lock RT PCRs Done
24,454,717 UART: [art] Populate DV Done
24,459,907 UART: [fht] FMC Alias Private Key: 7
24,461,392 UART: [art] Derive CDI
24,462,152 UART: [art] Store in slot 0x4
24,504,948 UART: [art] Derive Key Pair
24,505,960 UART: [art] Store priv key in slot 0x5
27,748,452 UART: [art] Derive Key Pair - Done
27,761,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,041,888 UART: [art] Erasing AUTHORITY.KEYID = 7
30,043,412 UART: [art] PUB.X = DF28567F02F2968CF7D038822687F2BDAEB641F4D8537B816E47AFC24455FA8CDA7A4E590B90FFF061BE9D6B24DE6E27
30,050,707 UART: [art] PUB.Y = B01181A108B747688DFA2A6199601D9F27F52A9BA00EF88FDFC3C8325D72C84B41AA08C891BF0712F1961B1541AD3A43
30,057,927 UART: [art] SIG.R = FE1D61BDACC93E080EC11E7138AC032076F34DBA651F210093EDDBF68A7DA4D1DB10F8EB27E7F04A5B25659735B81216
30,065,398 UART: [art] SIG.S = 3EF2F4D4412986BD2DDF3FC9C662D6D7776E0092AA87DE7CD642DE7EF9BCED86475798C9932A94BDA5BE16F3032D4FCF
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,066 UART:
192,448 UART: Running Caliptra ROM ...
193,637 UART:
193,789 UART: [state] CFI Enabled
263,669 UART: [state] LifecycleState = Unprovisioned
265,657 UART: [state] DebugLocked = No
267,333 UART: [state] WD Timer not started. Device not locked for debugging
271,368 UART: [kat] SHA2-256
450,976 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,759 UART: [kat] ++
462,239 UART: [kat] sha1
474,074 UART: [kat] SHA2-256
476,741 UART: [kat] SHA2-384
482,592 UART: [kat] SHA2-512-ACC
485,003 UART: [kat] ECC-384
2,949,708 UART: [kat] HMAC-384Kdf
2,972,892 UART: [kat] LMS
3,449,359 UART: [kat] --
3,453,420 UART: [cold-reset] ++
3,454,356 UART: [fht] FHT @ 0x50003400
3,465,535 UART: [idev] ++
3,466,096 UART: [idev] CDI.KEYID = 6
3,467,131 UART: [idev] SUBJECT.KEYID = 7
3,468,305 UART: [idev] UDS.KEYID = 0
3,469,228 ready_for_fw is high
3,469,413 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,513,507 UART: [idev] Erasing UDS.KEYID = 0
5,986,463 UART: [idev] Sha1 KeyId Algorithm
6,010,010 UART: [idev] --
6,014,312 UART: [ldev] ++
6,014,894 UART: [ldev] CDI.KEYID = 6
6,015,826 UART: [ldev] SUBJECT.KEYID = 5
6,016,993 UART: [ldev] AUTHORITY.KEYID = 7
6,018,278 UART: [ldev] FE.KEYID = 1
6,058,843 UART: [ldev] Erasing FE.KEYID = 1
8,562,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,335 UART: [ldev] --
10,376,033 UART: [fwproc] Wait for Commands...
10,378,883 UART: [fwproc] Recv command 0x46574c44
10,380,865 UART: [fwproc] Recv'd Img size: 34948 bytes
12,839,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,917,851 UART: [fwproc] Load FMC at address 0x40000000 len 20044
12,990,859 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,027,148 >>> mbox cmd response: success
13,031,159 UART: [afmc] ++
13,031,749 UART: [afmc] CDI.KEYID = 6
13,032,774 UART: [afmc] SUBJECT.KEYID = 7
13,033,938 UART: [afmc] AUTHORITY.KEYID = 5
15,576,075 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,316,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,318,622 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,334,443 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,350,466 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,366,084 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,389,981 UART: [afmc] --
17,392,879 UART: [cold-reset] --
17,396,199 UART: [state] Locking Datavault
17,402,037 UART: [state] Locking PCR0, PCR1 and PCR31
17,403,793 UART: [state] Locking ICCM
17,405,475 UART: [exit] Launching FMC @ 0x40000130
17,413,876 UART:
17,414,114 UART: Running Caliptra FMC ...
17,415,216 UART:
17,415,370 UART: [state] CFI Enabled
17,474,628 UART: [fht] FMC Alias Private Key: 7
19,241,153 UART: [art] Extend RT PCRs Done
19,242,359 UART: [art] Lock RT PCRs Done
19,243,896 UART: [art] Populate DV Done
19,249,402 UART: [fht] FMC Alias Private Key: 7
19,250,940 UART: [art] Derive CDI
19,251,756 UART: [art] Store in slot 0x4
19,307,474 UART: [art] Derive Key Pair
19,308,513 UART: [art] Store priv key in slot 0x5
21,771,464 UART: [art] Derive Key Pair - Done
21,784,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,496,735 UART: [art] Erasing AUTHORITY.KEYID = 7
23,498,230 UART: [art] PUB.X = D9CB649C8E67CC8991184BFDF4EB721537F8FCBBB1D0F056BAF7F4B745616BED5BD9D0D2A65B081E93414EC7261C4C9A
23,505,503 UART: [art] PUB.Y = 322E635E0E57A7F053406DA43C713BB839B43EB476AD3230F814680583EB5D636FE9F02D4CDA60E1EDAB695F17A59806
23,512,758 UART: [art] SIG.R = F600A605F6C57E32A988515D33A49415AE187A753AAABB8F5623371B8EB748C823ED21590C48D02E515DFC4E6E8D60BD
23,520,123 UART: [art] SIG.S = 0E8B009F334F6370A3C4D615A215046E3C78E1A0B1EEEDBA32785490205C340C585A45695A35C2A6468288A500BE362C
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,463,068 ready_for_fw is high
3,463,554 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
12,882,553 >>> mbox cmd response: success
17,171,894 UART:
17,172,284 UART: Running Caliptra FMC ...
17,173,561 UART:
17,173,733 UART: [state] CFI Enabled
17,240,316 UART: [fht] FMC Alias Private Key: 7
19,006,299 UART: [art] Extend RT PCRs Done
19,007,529 UART: [art] Lock RT PCRs Done
19,008,724 UART: [art] Populate DV Done
19,013,988 UART: [fht] FMC Alias Private Key: 7
19,015,490 UART: [art] Derive CDI
19,016,236 UART: [art] Store in slot 0x4
19,073,160 UART: [art] Derive Key Pair
19,074,201 UART: [art] Store priv key in slot 0x5
21,537,167 UART: [art] Derive Key Pair - Done
21,550,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,263,429 UART: [art] Erasing AUTHORITY.KEYID = 7
23,264,940 UART: [art] PUB.X = 26EEB656469D8EB8F1CAD2A8B8A9A1801AA6179E409D0D3F3C32D88AC5A2DA81581189E8AFD42E4641687D1B1987054A
23,272,196 UART: [art] PUB.Y = 6B4E020BD3D853837884EA73C197557CCA2F2847EB22AB3E0D16C8EDC4E4E7BDE096A01826020E7D4A89A4120BA0CF21
23,279,451 UART: [art] SIG.R = 6ED837249109E7FF1778287693B4320C04735FBB82B9D85E5BCDD8D2F43109BFCEA238769D40E2F361B438765EA6CAA1
23,286,805 UART: [art] SIG.S = BED11A1F55EAEA8AE1D137549575DD13F5805FB6BC3A8A647C3B26DC0A27A9280AB383FA68F9BA9E9D1A8DE1E410DC87
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,416 UART:
192,795 UART: Running Caliptra ROM ...
193,928 UART:
603,379 UART: [state] CFI Enabled
613,618 UART: [state] LifecycleState = Unprovisioned
615,557 UART: [state] DebugLocked = No
618,136 UART: [state] WD Timer not started. Device not locked for debugging
622,104 UART: [kat] SHA2-256
801,745 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,554 UART: [kat] ++
813,000 UART: [kat] sha1
824,020 UART: [kat] SHA2-256
826,744 UART: [kat] SHA2-384
831,099 UART: [kat] SHA2-512-ACC
833,466 UART: [kat] ECC-384
3,274,352 UART: [kat] HMAC-384Kdf
3,287,653 UART: [kat] LMS
3,764,180 UART: [kat] --
3,768,670 UART: [cold-reset] ++
3,770,138 UART: [fht] FHT @ 0x50003400
3,780,075 UART: [idev] ++
3,780,647 UART: [idev] CDI.KEYID = 6
3,781,594 UART: [idev] SUBJECT.KEYID = 7
3,782,838 UART: [idev] UDS.KEYID = 0
3,783,886 ready_for_fw is high
3,784,076 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,828,080 UART: [idev] Erasing UDS.KEYID = 0
6,258,954 UART: [idev] Sha1 KeyId Algorithm
6,282,700 UART: [idev] --
6,286,907 UART: [ldev] ++
6,287,476 UART: [ldev] CDI.KEYID = 6
6,288,400 UART: [ldev] SUBJECT.KEYID = 5
6,289,613 UART: [ldev] AUTHORITY.KEYID = 7
6,290,841 UART: [ldev] FE.KEYID = 1
6,300,756 UART: [ldev] Erasing FE.KEYID = 1
8,780,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,568,968 UART: [ldev] --
10,575,025 UART: [fwproc] Wait for Commands...
10,577,619 UART: [fwproc] Recv command 0x46574c44
10,579,607 UART: [fwproc] Recv'd Img size: 34948 bytes
13,040,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,121,888 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,194,943 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,229,931 >>> mbox cmd response: success
13,234,076 UART: [afmc] ++
13,234,676 UART: [afmc] CDI.KEYID = 6
13,235,583 UART: [afmc] SUBJECT.KEYID = 7
13,236,801 UART: [afmc] AUTHORITY.KEYID = 5
15,737,847 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,459,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,462,019 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,477,838 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,493,913 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,509,497 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,534,514 UART: [afmc] --
17,539,083 UART: [cold-reset] --
17,544,151 UART: [state] Locking Datavault
17,549,089 UART: [state] Locking PCR0, PCR1 and PCR31
17,550,855 UART: [state] Locking ICCM
17,551,944 UART: [exit] Launching FMC @ 0x40000130
17,560,402 UART:
17,560,639 UART: Running Caliptra FMC ...
17,561,738 UART:
17,561,899 UART: [state] CFI Enabled
17,569,836 UART: [fht] FMC Alias Private Key: 7
19,336,300 UART: [art] Extend RT PCRs Done
19,337,499 UART: [art] Lock RT PCRs Done
19,339,036 UART: [art] Populate DV Done
19,344,597 UART: [fht] FMC Alias Private Key: 7
19,346,295 UART: [art] Derive CDI
19,347,032 UART: [art] Store in slot 0x4
19,389,667 UART: [art] Derive Key Pair
19,390,705 UART: [art] Store priv key in slot 0x5
21,818,165 UART: [art] Derive Key Pair - Done
21,831,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,537,417 UART: [art] Erasing AUTHORITY.KEYID = 7
23,538,914 UART: [art] PUB.X = 4145E06E05D73C59FE30F1EED6E364C5D24B505B81EA512D25BC661F477249C4C8F834051D6CCC650A867C5EFD750E29
23,546,188 UART: [art] PUB.Y = 77CACCBF08D0770CD54028DE911F0E8FE2A76AA1EFE5026AD71916E88D11D5B0DBB33C3507B2B9D887F7B33172617AB6
23,553,450 UART: [art] SIG.R = 8D80462F38AB2B746D00DC8C280221EA1D44CA4C0D8A6D32831178D701DA0B0EE305C38091FF4A7AFF99B3EA757CBC80
23,560,824 UART: [art] SIG.S = FF0B0EFF8DCE6E29AEBF11307C8D2580284A78EF9D6254D69CCC81A5CA05E38A2178B7AB5B8D2866DB21EEB2951E6D7D
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
3,780,700 ready_for_fw is high
3,781,136 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,113,996 >>> mbox cmd response: success
17,363,704 UART:
17,364,084 UART: Running Caliptra FMC ...
17,365,354 UART:
17,365,516 UART: [state] CFI Enabled
17,373,222 UART: [fht] FMC Alias Private Key: 7
19,138,941 UART: [art] Extend RT PCRs Done
19,140,168 UART: [art] Lock RT PCRs Done
19,141,798 UART: [art] Populate DV Done
19,147,359 UART: [fht] FMC Alias Private Key: 7
19,148,982 UART: [art] Derive CDI
19,149,754 UART: [art] Store in slot 0x4
19,192,851 UART: [art] Derive Key Pair
19,193,892 UART: [art] Store priv key in slot 0x5
21,620,522 UART: [art] Derive Key Pair - Done
21,633,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,340,081 UART: [art] Erasing AUTHORITY.KEYID = 7
23,341,599 UART: [art] PUB.X = C17AD104304D7ECEEF4E0402557063CC47B1B5D3E90706237CA1119CE3441711DE918B8D0F59714DC0A7D02CCB539A2A
23,348,866 UART: [art] PUB.Y = 474ECE70773BAC66A42D1B317DA5F89C63482CF06405E77C348D88CCB0470D7757B1C54F0BA9B8314CFA65D7811E0ADB
23,356,116 UART: [art] SIG.R = 880B562713F68803FA0C320169E8E0AA9625DC960504F2972A0A90386B7E399364AB57C5FBB51E85D0A179CF2E51A099
23,363,544 UART: [art] SIG.S = ABED406A13B4F26B72BAC7C345900CDB09ABD0FEAE4FB2CC43BDE4024BA4459425F8E85511492F2132118AB0A15487F3
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
192,085 UART:
192,439 UART: Running Caliptra ROM ...
193,608 UART:
193,760 UART: [state] CFI Enabled
263,235 UART: [state] LifecycleState = Unprovisioned
265,647 UART: [state] DebugLocked = No
267,042 UART: [state] WD Timer not started. Device not locked for debugging
271,226 UART: [kat] SHA2-256
461,093 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,885 UART: [kat] ++
472,360 UART: [kat] sha1
482,416 UART: [kat] SHA2-256
485,403 UART: [kat] SHA2-384
490,266 UART: [kat] SHA2-512-ACC
492,847 UART: [kat] ECC-384
2,946,679 UART: [kat] HMAC-384Kdf
2,971,876 UART: [kat] LMS
3,503,703 UART: [kat] --
3,507,048 UART: [cold-reset] ++
3,508,842 UART: [fht] FHT @ 0x50003400
3,520,850 UART: [idev] ++
3,521,597 UART: [idev] CDI.KEYID = 6
3,522,516 UART: [idev] SUBJECT.KEYID = 7
3,523,693 UART: [idev] UDS.KEYID = 0
3,524,609 ready_for_fw is high
3,524,811 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,569,016 UART: [idev] Erasing UDS.KEYID = 0
6,028,267 UART: [idev] Sha1 KeyId Algorithm
6,052,308 UART: [idev] --
6,057,654 UART: [ldev] ++
6,058,335 UART: [ldev] CDI.KEYID = 6
6,059,243 UART: [ldev] SUBJECT.KEYID = 5
6,060,459 UART: [ldev] AUTHORITY.KEYID = 7
6,061,639 UART: [ldev] FE.KEYID = 1
6,099,926 UART: [ldev] Erasing FE.KEYID = 1
8,604,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,358 UART: [ldev] --
10,412,631 UART: [fwproc] Wait for Commands...
10,415,376 UART: [fwproc] Recv command 0x46574c44
10,417,701 UART: [fwproc] Recv'd Img size: 34948 bytes
12,885,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,964,160 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,087,810 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,145,937 >>> mbox cmd response: success
13,150,809 UART: [afmc] ++
13,151,402 UART: [afmc] CDI.KEYID = 6
13,152,647 UART: [afmc] SUBJECT.KEYID = 7
13,154,083 UART: [afmc] AUTHORITY.KEYID = 5
15,697,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,419,629 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,421,596 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,436,656 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,451,800 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,466,747 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,490,252 UART: [afmc] --
17,493,976 UART: [cold-reset] --
17,498,004 UART: [state] Locking Datavault
17,502,939 UART: [state] Locking PCR0, PCR1 and PCR31
17,505,081 UART: [state] Locking ICCM
17,506,538 UART: [exit] Launching FMC @ 0x40000130
17,515,216 UART:
17,515,460 UART: Running Caliptra FMC ...
17,516,484 UART:
17,516,629 UART: [state] CFI Enabled
17,577,463 UART: [fht] FMC Alias Private Key: 7
19,344,024 UART: [art] Extend RT PCRs Done
19,345,245 UART: [art] Lock RT PCRs Done
19,346,944 UART: [art] Populate DV Done
19,352,453 UART: [fht] FMC Alias Private Key: 7
19,353,994 UART: [art] Derive CDI
19,354,754 UART: [art] Store in slot 0x4
19,410,503 UART: [art] Derive Key Pair
19,411,547 UART: [art] Store priv key in slot 0x5
21,874,440 UART: [art] Derive Key Pair - Done
21,887,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,600,729 UART: [art] Erasing AUTHORITY.KEYID = 7
23,602,234 UART: [art] PUB.X = 82368CAD1DC12803E8B6A07A0841002D9B9C0C53CA34FC025A5DCA7991C94A51C2CDD679CA84290ADD44A271DB9530E8
23,609,472 UART: [art] PUB.Y = FF50B2CE1DDFEE7B1BD382C1977FEE482C1B1BF8C3175E48D734B3EC393A86FD648A46A479D091F387278F9AF63461E7
23,616,753 UART: [art] SIG.R = 5FF1FC2B172C5615A4863050927CFB9470A83A627309D4F915476EE79F4997832E9EB1144B3D1ECA328D0270974D2D54
23,624,080 UART: [art] SIG.S = 8538B7B1D0D07CA03DF1DDFB10C7291656872F46EA5F3F5BFC0058D57FA2A98F6E742E1D46644E1281891E68F09FAFD4
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,438,307 ready_for_fw is high
3,438,684 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,053,399 >>> mbox cmd response: success
17,342,250 UART:
17,342,637 UART: Running Caliptra FMC ...
17,343,895 UART:
17,344,068 UART: [state] CFI Enabled
17,409,076 UART: [fht] FMC Alias Private Key: 7
19,196,121 UART: [art] Extend RT PCRs Done
19,197,364 UART: [art] Lock RT PCRs Done
19,198,942 UART: [art] Populate DV Done
19,204,133 UART: [fht] FMC Alias Private Key: 7
19,205,797 UART: [art] Derive CDI
19,206,619 UART: [art] Store in slot 0x4
19,262,241 UART: [art] Derive Key Pair
19,263,236 UART: [art] Store priv key in slot 0x5
21,726,198 UART: [art] Derive Key Pair - Done
21,739,151 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,451,324 UART: [art] Erasing AUTHORITY.KEYID = 7
23,452,831 UART: [art] PUB.X = B521653FF911AD6415E5E4BA78864716A931AAC5A1F6FBC3AD4AB229A88ADB841DA61E3255E52C7D500D1269165939E3
23,460,121 UART: [art] PUB.Y = DD3680E6997801FC7272DE1A6DCE4B03A8B31806005EEAC7A258175E6B8F70FE277FC1E639287CAB46BA1CFD3EBEA6BE
23,467,332 UART: [art] SIG.R = 9E2498BBF0CA06999CCAEA2B165565C33420FE24486BD86BCD0E441F8CE4D439428AA32771B13E384D21BEEFE0814637
23,474,755 UART: [art] SIG.S = 194BF6E83D864EF03A46FE53DD88A40DED0D1169EB8A320F6FF65B787C6A627B436212C39E7E5C56236FB34670A129CC
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,560 UART:
192,915 UART: Running Caliptra ROM ...
194,115 UART:
603,611 UART: [state] CFI Enabled
618,831 UART: [state] LifecycleState = Unprovisioned
621,200 UART: [state] DebugLocked = No
623,992 UART: [state] WD Timer not started. Device not locked for debugging
628,654 UART: [kat] SHA2-256
818,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,319 UART: [kat] ++
829,840 UART: [kat] sha1
842,197 UART: [kat] SHA2-256
845,206 UART: [kat] SHA2-384
851,119 UART: [kat] SHA2-512-ACC
853,693 UART: [kat] ECC-384
3,296,250 UART: [kat] HMAC-384Kdf
3,309,681 UART: [kat] LMS
3,841,485 UART: [kat] --
3,844,771 UART: [cold-reset] ++
3,846,130 UART: [fht] FHT @ 0x50003400
3,858,024 UART: [idev] ++
3,858,737 UART: [idev] CDI.KEYID = 6
3,859,644 UART: [idev] SUBJECT.KEYID = 7
3,860,885 UART: [idev] UDS.KEYID = 0
3,861,807 ready_for_fw is high
3,861,996 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,906,020 UART: [idev] Erasing UDS.KEYID = 0
6,340,778 UART: [idev] Sha1 KeyId Algorithm
6,362,061 UART: [idev] --
6,366,596 UART: [ldev] ++
6,367,325 UART: [ldev] CDI.KEYID = 6
6,368,248 UART: [ldev] SUBJECT.KEYID = 5
6,369,407 UART: [ldev] AUTHORITY.KEYID = 7
6,370,635 UART: [ldev] FE.KEYID = 1
6,382,409 UART: [ldev] Erasing FE.KEYID = 1
8,856,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,906 UART: [ldev] --
10,648,772 UART: [fwproc] Wait for Commands...
10,650,598 UART: [fwproc] Recv command 0x46574c44
10,652,903 UART: [fwproc] Recv'd Img size: 34948 bytes
13,117,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,198,385 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,321,977 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,381,461 >>> mbox cmd response: success
13,384,806 UART: [afmc] ++
13,385,451 UART: [afmc] CDI.KEYID = 6
13,386,638 UART: [afmc] SUBJECT.KEYID = 7
13,388,075 UART: [afmc] AUTHORITY.KEYID = 5
15,890,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,612,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,614,519 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,629,634 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,644,781 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,659,673 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,682,915 UART: [afmc] --
17,686,784 UART: [cold-reset] --
17,690,916 UART: [state] Locking Datavault
17,698,002 UART: [state] Locking PCR0, PCR1 and PCR31
17,700,142 UART: [state] Locking ICCM
17,702,395 UART: [exit] Launching FMC @ 0x40000130
17,711,068 UART:
17,711,300 UART: Running Caliptra FMC ...
17,712,320 UART:
17,712,466 UART: [state] CFI Enabled
17,720,617 UART: [fht] FMC Alias Private Key: 7
19,486,988 UART: [art] Extend RT PCRs Done
19,488,179 UART: [art] Lock RT PCRs Done
19,489,990 UART: [art] Populate DV Done
19,495,279 UART: [fht] FMC Alias Private Key: 7
19,496,983 UART: [art] Derive CDI
19,497,715 UART: [art] Store in slot 0x4
19,540,343 UART: [art] Derive Key Pair
19,541,405 UART: [art] Store priv key in slot 0x5
21,968,341 UART: [art] Derive Key Pair - Done
21,981,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,687,830 UART: [art] Erasing AUTHORITY.KEYID = 7
23,689,339 UART: [art] PUB.X = 81D88482C89085E88799B019326EB88572D0A07331C185D4122679B6054DF1F045D27F10E14A37B681462828756364D8
23,696,546 UART: [art] PUB.Y = 4D6BCCFDA0C424B777BC7F4BA8545C072C460CE93F057E7B39DC573C60D528B293A458C2FA24351134DA575012B90FDC
23,703,843 UART: [art] SIG.R = 549CBFFACD56E267B4D0253BAD926F23E1828AA2FEE35929B4E250301ADC0F87EDB95C1AF4EA785FF2A0098E6E585624
23,711,251 UART: [art] SIG.S = F2014A970379CE3E257517E870BBB0173E3F0CAC05EE4B5C4BA993B093CE8E609B7629BD3AA894F3DE70FB238A361FCA
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,757,727 ready_for_fw is high
3,758,316 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,248,651 >>> mbox cmd response: success
17,498,580 UART:
17,498,964 UART: Running Caliptra FMC ...
17,500,233 UART:
17,500,419 UART: [state] CFI Enabled
17,508,363 UART: [fht] FMC Alias Private Key: 7
19,274,194 UART: [art] Extend RT PCRs Done
19,275,426 UART: [art] Lock RT PCRs Done
19,277,077 UART: [art] Populate DV Done
19,282,490 UART: [fht] FMC Alias Private Key: 7
19,284,190 UART: [art] Derive CDI
19,284,924 UART: [art] Store in slot 0x4
19,327,668 UART: [art] Derive Key Pair
19,328,730 UART: [art] Store priv key in slot 0x5
21,755,614 UART: [art] Derive Key Pair - Done
21,768,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,475,044 UART: [art] Erasing AUTHORITY.KEYID = 7
23,476,556 UART: [art] PUB.X = F111C32E74B3E1B5286A26AD5B2B5F38DD6ED284DF8DD0E3A8777F6FBE1311A768B8357A682A6DB408233FBDDAC6088A
23,483,815 UART: [art] PUB.Y = 3ACB873D9D3C19933E744868B331B7D64955A112122FFF7F7210A7AB682E27A92BCD7F0E4CBF075CC6E99FA04A2520D7
23,491,106 UART: [art] SIG.R = 5B87AD785B2B85CD9DC26787EA4D92B75D3300E47B8E23E33221C41862DE29100C6291EAAA0DA99E90F0702EB5831349
23,498,446 UART: [art] SIG.S = F153D5DEB1A1BB0DBCFE48FF0784CDFA98104543C64363BF00F91C4441C60BCD40E81685CE8C02D9AA26542FE5663AD1
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,957 UART: [kat] SHA2-256
881,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,003 UART: [kat] ++
886,155 UART: [kat] sha1
890,363 UART: [kat] SHA2-256
892,301 UART: [kat] SHA2-384
895,148 UART: [kat] SHA2-512-ACC
897,049 UART: [kat] ECC-384
902,600 UART: [kat] HMAC-384Kdf
907,190 UART: [kat] LMS
1,475,386 UART: [kat] --
1,476,379 UART: [cold-reset] ++
1,476,745 UART: [fht] Storing FHT @ 0x50003400
1,479,528 UART: [idev] ++
1,479,696 UART: [idev] CDI.KEYID = 6
1,480,056 UART: [idev] SUBJECT.KEYID = 7
1,480,480 UART: [idev] UDS.KEYID = 0
1,480,825 ready_for_fw is high
1,480,825 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,488,658 UART: [idev] Erasing UDS.KEYID = 0
1,504,858 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,540 UART: [idev] --
1,514,387 UART: [ldev] ++
1,514,555 UART: [ldev] CDI.KEYID = 6
1,514,918 UART: [ldev] SUBJECT.KEYID = 5
1,515,344 UART: [ldev] AUTHORITY.KEYID = 7
1,515,807 UART: [ldev] FE.KEYID = 1
1,521,211 UART: [ldev] Erasing FE.KEYID = 1
1,546,146 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,178 UART: [ldev] --
1,585,509 UART: [fwproc] Waiting for Commands...
1,586,238 UART: [fwproc] Received command 0x46574c44
1,587,029 UART: [fwproc] Received Image of size 34948 bytes
1,974,727 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,001,777 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,032,995 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,047,998 >>> mbox cmd response: success
2,049,022 UART: [afmc] ++
2,049,190 UART: [afmc] CDI.KEYID = 6
2,049,552 UART: [afmc] SUBJECT.KEYID = 7
2,049,977 UART: [afmc] AUTHORITY.KEYID = 5
2,084,668 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,100,864 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,101,644 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,107,353 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,113,236 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,118,919 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,126,815 UART: [afmc] --
2,127,767 UART: [cold-reset] --
2,128,589 UART: [state] Locking Datavault
2,129,588 UART: [state] Locking PCR0, PCR1 and PCR31
2,130,192 UART: [state] Locking ICCM
2,130,688 UART: [exit] Launching FMC @ 0x40000130
2,136,018 UART:
2,136,034 UART: Running Caliptra FMC ...
2,136,442 UART:
2,136,496 UART: [state] CFI Enabled
2,147,160 UART: [fht] FMC Alias Private Key: 7
2,265,786 UART: [art] Extend RT PCRs Done
2,266,214 UART: [art] Lock RT PCRs Done
2,267,640 UART: [art] Populate DV Done
2,275,959 UART: [fht] FMC Alias Private Key: 7
2,277,105 UART: [art] Derive CDI
2,277,385 UART: [art] Store in slot 0x4
2,363,089 UART: [art] Derive Key Pair
2,363,449 UART: [art] Store priv key in slot 0x5
2,376,338 UART: [art] Derive Key Pair - Done
2,390,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,406,164 UART: [art] Erasing AUTHORITY.KEYID = 7
2,406,929 UART: [art] PUB.X = 7B19D2F84FB4555DAD929236D3D9289EB76958E1E480493E0021E99CC67CA7BEDDFCAB136582E828511B89E560684DB5
2,413,681 UART: [art] PUB.Y = 470870BD04BB97BD7D5A861449BA4FA19E4B654C212BAE43BA4BC23DA23A947F83471954CD36EAAC085D70C050E04B5D
2,420,634 UART: [art] SIG.R = D686B9C629FB10FEC7303168EC135C9079FD9D7A6AE40316DD8752F315EADAFAEC4B2DB268B3DBA7928EA0291EC28F26
2,427,419 UART: [art] SIG.S = D9FAE95D7CB6E5DC37F1FDB5780EE2ADD942261001B14BC13075DC6181F60E23231F44E6F931000C620A779C54F7C123
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,453 ready_for_fw is high
1,363,453 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,898,694 >>> mbox cmd response: success
1,960,447 UART:
1,960,463 UART: Running Caliptra FMC ...
1,960,871 UART:
1,960,925 UART: [state] CFI Enabled
1,971,133 UART: [fht] FMC Alias Private Key: 7
2,090,901 UART: [art] Extend RT PCRs Done
2,091,329 UART: [art] Lock RT PCRs Done
2,092,957 UART: [art] Populate DV Done
2,101,346 UART: [fht] FMC Alias Private Key: 7
2,102,422 UART: [art] Derive CDI
2,102,702 UART: [art] Store in slot 0x4
2,188,358 UART: [art] Derive Key Pair
2,188,718 UART: [art] Store priv key in slot 0x5
2,202,049 UART: [art] Derive Key Pair - Done
2,216,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,231,933 UART: [art] Erasing AUTHORITY.KEYID = 7
2,232,698 UART: [art] PUB.X = 71E675A242F0711E4CCFD49105CC4E4832FD7B6B9F67B58DCE02ED161DA5E15C3A6DEF0D1013D0EE06EC8DC4E8537FAF
2,239,478 UART: [art] PUB.Y = 14503243D7BE27FF8E459292F02BACA406C91260F86EF0D12E8E0C7986718F35539A0B0CB7A14FEEBF3EFD69ADE02FB9
2,246,430 UART: [art] SIG.R = B0A156D29D4B5523480C7C936D1B0B7A29A5D17DCED9898A8E01B51567F0F8EB84CF5D7C8CBE6FCA10C0B8A69F6EAAE2
2,253,213 UART: [art] SIG.S = B4024B8D5F6DD1338A3DEC2BB38CA501C3D7B5BB844D3A3BC4B4B69305976BC3ED30A7982FF3288CCCD12E8D88B4DF05
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,332 UART: [kat] SHA2-256
882,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,378 UART: [kat] ++
886,530 UART: [kat] sha1
890,680 UART: [kat] SHA2-256
892,618 UART: [kat] SHA2-384
895,337 UART: [kat] SHA2-512-ACC
897,238 UART: [kat] ECC-384
903,057 UART: [kat] HMAC-384Kdf
907,695 UART: [kat] LMS
1,475,891 UART: [kat] --
1,476,648 UART: [cold-reset] ++
1,477,006 UART: [fht] Storing FHT @ 0x50003400
1,479,705 UART: [idev] ++
1,479,873 UART: [idev] CDI.KEYID = 6
1,480,233 UART: [idev] SUBJECT.KEYID = 7
1,480,657 UART: [idev] UDS.KEYID = 0
1,481,002 ready_for_fw is high
1,481,002 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,489,039 UART: [idev] Erasing UDS.KEYID = 0
1,505,417 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,869 UART: [idev] --
1,514,922 UART: [ldev] ++
1,515,090 UART: [ldev] CDI.KEYID = 6
1,515,453 UART: [ldev] SUBJECT.KEYID = 5
1,515,879 UART: [ldev] AUTHORITY.KEYID = 7
1,516,342 UART: [ldev] FE.KEYID = 1
1,521,646 UART: [ldev] Erasing FE.KEYID = 1
1,546,739 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,319 UART: [ldev] --
1,585,762 UART: [fwproc] Waiting for Commands...
1,586,503 UART: [fwproc] Received command 0x46574c44
1,587,294 UART: [fwproc] Received Image of size 34948 bytes
1,975,266 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,002,112 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,033,330 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,048,291 >>> mbox cmd response: success
2,049,345 UART: [afmc] ++
2,049,513 UART: [afmc] CDI.KEYID = 6
2,049,875 UART: [afmc] SUBJECT.KEYID = 7
2,050,300 UART: [afmc] AUTHORITY.KEYID = 5
2,085,395 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,101,983 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,102,763 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,108,472 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,114,355 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,120,038 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,127,834 UART: [afmc] --
2,128,728 UART: [cold-reset] --
2,129,316 UART: [state] Locking Datavault
2,130,481 UART: [state] Locking PCR0, PCR1 and PCR31
2,131,085 UART: [state] Locking ICCM
2,131,753 UART: [exit] Launching FMC @ 0x40000130
2,137,083 UART:
2,137,099 UART: Running Caliptra FMC ...
2,137,507 UART:
2,137,650 UART: [state] CFI Enabled
2,148,100 UART: [fht] FMC Alias Private Key: 7
2,266,970 UART: [art] Extend RT PCRs Done
2,267,398 UART: [art] Lock RT PCRs Done
2,268,978 UART: [art] Populate DV Done
2,277,065 UART: [fht] FMC Alias Private Key: 7
2,278,231 UART: [art] Derive CDI
2,278,511 UART: [art] Store in slot 0x4
2,363,639 UART: [art] Derive Key Pair
2,363,999 UART: [art] Store priv key in slot 0x5
2,376,942 UART: [art] Derive Key Pair - Done
2,391,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,407,677 UART: [art] Erasing AUTHORITY.KEYID = 7
2,408,442 UART: [art] PUB.X = A979C14ABF46C8B55835875A26AD9BB50A6E2BAA3642A711EF13C3F8850E12B602CF896C4F53C9B726298629AF23E822
2,415,207 UART: [art] PUB.Y = D20ECC2BA258B59773ECD1ED4C579C937286BD84D5EC668DBA1BB6816EBC1ED5825007121F015A65CCCA5DAC5F5D260B
2,422,165 UART: [art] SIG.R = 621B4FAD3FB6B32AC9D900F5B24B3BEF79D64ACF78CFEEFD9BE04CA14A5C243681A00729AD9F5FE2B51929EF5A46A506
2,428,931 UART: [art] SIG.S = 1781FC5CE20F911BE205044D1424E195308AD5E4F3F434C00990F9AD6AC77912ED24603D9E0D73EADB5F200230B03312
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,884 ready_for_fw is high
1,362,884 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,898,777 >>> mbox cmd response: success
1,960,022 UART:
1,960,038 UART: Running Caliptra FMC ...
1,960,446 UART:
1,960,589 UART: [state] CFI Enabled
1,970,959 UART: [fht] FMC Alias Private Key: 7
2,089,725 UART: [art] Extend RT PCRs Done
2,090,153 UART: [art] Lock RT PCRs Done
2,091,549 UART: [art] Populate DV Done
2,099,836 UART: [fht] FMC Alias Private Key: 7
2,100,876 UART: [art] Derive CDI
2,101,156 UART: [art] Store in slot 0x4
2,186,882 UART: [art] Derive Key Pair
2,187,242 UART: [art] Store priv key in slot 0x5
2,200,417 UART: [art] Derive Key Pair - Done
2,215,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,229,842 UART: [art] Erasing AUTHORITY.KEYID = 7
2,230,607 UART: [art] PUB.X = 0FB0DFA154EB19BCDADCB8047129627DB222F704A3E0EE5D6B9E902E85404972302052EBAD399A62D2BAF5217E7E5B71
2,237,380 UART: [art] PUB.Y = 0D7BD1710979E7F79F682598708EB86A4383BF4B8FD2F10CDB60C4957BC78AA96D3ABD89B54FB54E0327944D817C4383
2,244,322 UART: [art] SIG.R = A2767DD6B8B1423FF853AB5CA7E5F692F71B9102279FC5CA6268AF7EAC1C93B926B1B50519B8D2CBE2D6E9D52F0CA54D
2,251,101 UART: [art] SIG.S = 44E1766535A0AC7ACF10624B3C510D696D2524B67F0F47E4250813E4B51E0C1727F9C5052FB50F29D5D064AC6BED2E53
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,278 UART: [kat] SHA2-256
890,828 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,932 UART: [kat] ++
895,084 UART: [kat] sha1
899,364 UART: [kat] SHA2-256
901,304 UART: [kat] SHA2-384
903,899 UART: [kat] SHA2-512-ACC
905,800 UART: [kat] ECC-384
915,461 UART: [kat] HMAC-384Kdf
920,157 UART: [kat] LMS
1,168,469 UART: [kat] --
1,169,418 UART: [cold-reset] ++
1,169,806 UART: [fht] FHT @ 0x50003400
1,172,406 UART: [idev] ++
1,172,574 UART: [idev] CDI.KEYID = 6
1,172,935 UART: [idev] SUBJECT.KEYID = 7
1,173,360 UART: [idev] UDS.KEYID = 0
1,173,706 ready_for_fw is high
1,173,706 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,181,387 UART: [idev] Erasing UDS.KEYID = 0
1,198,293 UART: [idev] Sha1 KeyId Algorithm
1,207,201 UART: [idev] --
1,208,258 UART: [ldev] ++
1,208,426 UART: [ldev] CDI.KEYID = 6
1,208,790 UART: [ldev] SUBJECT.KEYID = 5
1,209,217 UART: [ldev] AUTHORITY.KEYID = 7
1,209,680 UART: [ldev] FE.KEYID = 1
1,214,900 UART: [ldev] Erasing FE.KEYID = 1
1,241,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,568 UART: [ldev] --
1,280,869 UART: [fwproc] Wait for Commands...
1,281,484 UART: [fwproc] Recv command 0x46574c44
1,282,217 UART: [fwproc] Recv'd Img size: 34948 bytes
1,669,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,697,931 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,729,106 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,743,969 >>> mbox cmd response: success
1,745,053 UART: [afmc] ++
1,745,221 UART: [afmc] CDI.KEYID = 6
1,745,584 UART: [afmc] SUBJECT.KEYID = 7
1,746,010 UART: [afmc] AUTHORITY.KEYID = 5
1,781,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,798,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,798,837 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,804,547 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,810,428 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,816,129 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,823,674 UART: [afmc] --
1,824,495 UART: [cold-reset] --
1,825,295 UART: [state] Locking Datavault
1,826,294 UART: [state] Locking PCR0, PCR1 and PCR31
1,826,898 UART: [state] Locking ICCM
1,827,358 UART: [exit] Launching FMC @ 0x40000130
1,832,688 UART:
1,832,704 UART: Running Caliptra FMC ...
1,833,112 UART:
1,833,166 UART: [state] CFI Enabled
1,844,254 UART: [fht] FMC Alias Private Key: 7
1,963,006 UART: [art] Extend RT PCRs Done
1,963,434 UART: [art] Lock RT PCRs Done
1,965,080 UART: [art] Populate DV Done
1,973,301 UART: [fht] FMC Alias Private Key: 7
1,974,329 UART: [art] Derive CDI
1,974,609 UART: [art] Store in slot 0x4
2,060,696 UART: [art] Derive Key Pair
2,061,056 UART: [art] Store priv key in slot 0x5
2,074,672 UART: [art] Derive Key Pair - Done
2,089,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,104,885 UART: [art] Erasing AUTHORITY.KEYID = 7
2,105,650 UART: [art] PUB.X = 25D829B276E3A9D2F1BDE1AE4F37B35DCA3FC0092856015FE00C214BB643A8B7F4F3FCBC5ACC6034079BEE5072DD9026
2,112,424 UART: [art] PUB.Y = 576002E49F92C7A18CCD976581F5FD341A0EF170061544CE8AA9BBA6437F4E9B9C48F75335A8D3D2EC90783E7533D001
2,119,364 UART: [art] SIG.R = 5E0501FB6DD857BA8CEB47864BAE44B0B96398888DB8323A4E7D684E325684F902CEAC5E368090B2AFA94E61E34A1CC1
2,126,135 UART: [art] SIG.S = D8B0E293F79287844CCEFEF0614D1B9E6783CDF841AA01F295D3833C98BDC4D09E4CDD2D021ECDA189A6AC6D37F85E64
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,560 ready_for_fw is high
1,059,560 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,595,736 >>> mbox cmd response: success
1,657,989 UART:
1,658,005 UART: Running Caliptra FMC ...
1,658,413 UART:
1,658,467 UART: [state] CFI Enabled
1,669,299 UART: [fht] FMC Alias Private Key: 7
1,788,361 UART: [art] Extend RT PCRs Done
1,788,789 UART: [art] Lock RT PCRs Done
1,789,897 UART: [art] Populate DV Done
1,798,216 UART: [fht] FMC Alias Private Key: 7
1,799,334 UART: [art] Derive CDI
1,799,614 UART: [art] Store in slot 0x4
1,884,941 UART: [art] Derive Key Pair
1,885,301 UART: [art] Store priv key in slot 0x5
1,898,641 UART: [art] Derive Key Pair - Done
1,913,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,929,385 UART: [art] Erasing AUTHORITY.KEYID = 7
1,930,150 UART: [art] PUB.X = 2995C33CC7EA3B5D3D43FB898AD0236F41C3564102EAE2050A9175FCFED930171A15675E6B8401F7F552131377428EDD
1,936,908 UART: [art] PUB.Y = 1DAFB1A2030B6517CAB1F357BA3183634D7961301431FFBB599D3433B65C5517F7FF57EF1123CC8ACB36C7F2E2A4C9F5
1,943,862 UART: [art] SIG.R = E452A4CBC3441F5BB74989D49FC76E2FF0C67ED3A3FADA1422128F0453F043FE2E9CA36B49BCA9A2A8CC22A7C2C04E7E
1,950,651 UART: [art] SIG.S = DA4A43B418ABFDD6E58EBC2EE797A4CC0C4740E559DC4D05F86EA1FEF7CD636A6A40F068E69BE5D21F993D1F3BCF34F4
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
891,631 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,735 UART: [kat] ++
895,887 UART: [kat] sha1
900,019 UART: [kat] SHA2-256
901,959 UART: [kat] SHA2-384
904,666 UART: [kat] SHA2-512-ACC
906,567 UART: [kat] ECC-384
916,400 UART: [kat] HMAC-384Kdf
921,056 UART: [kat] LMS
1,169,368 UART: [kat] --
1,170,489 UART: [cold-reset] ++
1,170,977 UART: [fht] FHT @ 0x50003400
1,173,645 UART: [idev] ++
1,173,813 UART: [idev] CDI.KEYID = 6
1,174,174 UART: [idev] SUBJECT.KEYID = 7
1,174,599 UART: [idev] UDS.KEYID = 0
1,174,945 ready_for_fw is high
1,174,945 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,182,890 UART: [idev] Erasing UDS.KEYID = 0
1,199,886 UART: [idev] Sha1 KeyId Algorithm
1,208,638 UART: [idev] --
1,209,753 UART: [ldev] ++
1,209,921 UART: [ldev] CDI.KEYID = 6
1,210,285 UART: [ldev] SUBJECT.KEYID = 5
1,210,712 UART: [ldev] AUTHORITY.KEYID = 7
1,211,175 UART: [ldev] FE.KEYID = 1
1,216,679 UART: [ldev] Erasing FE.KEYID = 1
1,243,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,311 UART: [ldev] --
1,282,712 UART: [fwproc] Wait for Commands...
1,283,411 UART: [fwproc] Recv command 0x46574c44
1,284,144 UART: [fwproc] Recv'd Img size: 34948 bytes
1,670,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,697,220 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,728,395 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,743,358 >>> mbox cmd response: success
1,744,464 UART: [afmc] ++
1,744,632 UART: [afmc] CDI.KEYID = 6
1,744,995 UART: [afmc] SUBJECT.KEYID = 7
1,745,421 UART: [afmc] AUTHORITY.KEYID = 5
1,780,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,796,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,797,664 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,803,374 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,809,255 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,814,956 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,822,669 UART: [afmc] --
1,823,546 UART: [cold-reset] --
1,824,492 UART: [state] Locking Datavault
1,825,587 UART: [state] Locking PCR0, PCR1 and PCR31
1,826,191 UART: [state] Locking ICCM
1,826,717 UART: [exit] Launching FMC @ 0x40000130
1,832,047 UART:
1,832,063 UART: Running Caliptra FMC ...
1,832,471 UART:
1,832,614 UART: [state] CFI Enabled
1,843,338 UART: [fht] FMC Alias Private Key: 7
1,962,112 UART: [art] Extend RT PCRs Done
1,962,540 UART: [art] Lock RT PCRs Done
1,963,936 UART: [art] Populate DV Done
1,972,273 UART: [fht] FMC Alias Private Key: 7
1,973,331 UART: [art] Derive CDI
1,973,611 UART: [art] Store in slot 0x4
2,059,330 UART: [art] Derive Key Pair
2,059,690 UART: [art] Store priv key in slot 0x5
2,073,234 UART: [art] Derive Key Pair - Done
2,087,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,103,186 UART: [art] Erasing AUTHORITY.KEYID = 7
2,103,951 UART: [art] PUB.X = 4E3DD1053AE96F33EA177599CBB0F1B99B5ACAA0E4BC723E89373B8E4A12B503B093E697B06CCA355B40FAE90BE8156C
2,110,728 UART: [art] PUB.Y = BB18537EB60302D0CF26EF35B91DE51AA35FB28C8FAC99743DF6383291B29BC02D42C67EA2D71D53995AEB40BD2F283E
2,117,686 UART: [art] SIG.R = EC6274A0E6DE3B8CCA3080AC41CF0468C6369A0C2C4114E7DAF79BE2FC9A759205E44C68FE27506F926731121FEB36AF
2,124,459 UART: [art] SIG.S = A90432164AFBA9B2A342FAD200544FD0730FFD0C3DFC5F1DA4D81D5A20245ED6B0157E60066515CAF780CA6B5303E7B2
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,973 ready_for_fw is high
1,058,973 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,594,185 >>> mbox cmd response: success
1,656,076 UART:
1,656,092 UART: Running Caliptra FMC ...
1,656,500 UART:
1,656,643 UART: [state] CFI Enabled
1,667,437 UART: [fht] FMC Alias Private Key: 7
1,787,115 UART: [art] Extend RT PCRs Done
1,787,543 UART: [art] Lock RT PCRs Done
1,789,241 UART: [art] Populate DV Done
1,797,436 UART: [fht] FMC Alias Private Key: 7
1,798,604 UART: [art] Derive CDI
1,798,884 UART: [art] Store in slot 0x4
1,884,643 UART: [art] Derive Key Pair
1,885,003 UART: [art] Store priv key in slot 0x5
1,897,953 UART: [art] Derive Key Pair - Done
1,912,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,928,073 UART: [art] Erasing AUTHORITY.KEYID = 7
1,928,838 UART: [art] PUB.X = 740000DC495926AAFE8D619131C744A9316DE42DDC99B7BD36237F2ECF0DC71B99BB4A842863016ACA934AFE7C83BFFD
1,935,572 UART: [art] PUB.Y = 1EAAC3BADADF82DBF6C821D4B16BD6B120D45FB8CF44E7C804CF5C002FA686854B18E44E1EAA0DEDC35EF3EBB4E12256
1,942,526 UART: [art] SIG.R = 2605A07AB1A6B920CD030A7AB6BBEDA83CAA15AC9788599A73C2491A0F2C88DB07B84DB72F423907DAD01AED40DCBF64
1,949,298 UART: [art] SIG.S = 48778767AE34EA4CEBCEE33E21275BAA78CB6AEE5D4F153F42854140FB9691577DA25FEA8977A3A90616F76869C9AB2E
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
893,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,761 UART: [kat] ++
897,913 UART: [kat] sha1
902,311 UART: [kat] SHA2-256
904,251 UART: [kat] SHA2-384
906,828 UART: [kat] SHA2-512-ACC
908,729 UART: [kat] ECC-384
918,220 UART: [kat] HMAC-384Kdf
922,804 UART: [kat] LMS
1,171,132 UART: [kat] --
1,172,123 UART: [cold-reset] ++
1,172,475 UART: [fht] FHT @ 0x50003400
1,175,100 UART: [idev] ++
1,175,268 UART: [idev] CDI.KEYID = 6
1,175,628 UART: [idev] SUBJECT.KEYID = 7
1,176,052 UART: [idev] UDS.KEYID = 0
1,176,397 ready_for_fw is high
1,176,397 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,184,408 UART: [idev] Erasing UDS.KEYID = 0
1,201,245 UART: [idev] Sha1 KeyId Algorithm
1,209,789 UART: [idev] --
1,210,831 UART: [ldev] ++
1,210,999 UART: [ldev] CDI.KEYID = 6
1,211,362 UART: [ldev] SUBJECT.KEYID = 5
1,211,788 UART: [ldev] AUTHORITY.KEYID = 7
1,212,251 UART: [ldev] FE.KEYID = 1
1,217,139 UART: [ldev] Erasing FE.KEYID = 1
1,244,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,041 UART: [ldev] --
1,283,400 UART: [fwproc] Wait for Commands...
1,284,006 UART: [fwproc] Recv command 0x46574c44
1,284,734 UART: [fwproc] Recv'd Img size: 34948 bytes
1,671,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,280 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,730,450 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,745,253 >>> mbox cmd response: success
1,746,265 UART: [afmc] ++
1,746,433 UART: [afmc] CDI.KEYID = 6
1,746,795 UART: [afmc] SUBJECT.KEYID = 7
1,747,220 UART: [afmc] AUTHORITY.KEYID = 5
1,782,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,799,082 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,799,830 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,539 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,811,422 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,817,123 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,824,947 UART: [afmc] --
1,825,847 UART: [cold-reset] --
1,826,829 UART: [state] Locking Datavault
1,827,796 UART: [state] Locking PCR0, PCR1 and PCR31
1,828,400 UART: [state] Locking ICCM
1,829,016 UART: [exit] Launching FMC @ 0x40000130
1,834,346 UART:
1,834,362 UART: Running Caliptra FMC ...
1,834,770 UART:
1,834,824 UART: [state] CFI Enabled
1,845,512 UART: [fht] FMC Alias Private Key: 7
1,965,064 UART: [art] Extend RT PCRs Done
1,965,492 UART: [art] Lock RT PCRs Done
1,966,932 UART: [art] Populate DV Done
1,975,235 UART: [fht] FMC Alias Private Key: 7
1,976,215 UART: [art] Derive CDI
1,976,495 UART: [art] Store in slot 0x4
2,062,360 UART: [art] Derive Key Pair
2,062,720 UART: [art] Store priv key in slot 0x5
2,076,090 UART: [art] Derive Key Pair - Done
2,090,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,106,204 UART: [art] Erasing AUTHORITY.KEYID = 7
2,106,969 UART: [art] PUB.X = 126B7D0EDF80BCD58D32966D128D139A52D6D22FDC1B560164AAADDCAAD17C98164F98609D09FB822C5C72AF8C18534F
2,113,744 UART: [art] PUB.Y = F32AA0F91A3F3947CC9340A9A8C9D24413DF73D49A6E00B4D1A04658EC8FB640BEF3A8045E8E8C58E395494165AA29BB
2,120,679 UART: [art] SIG.R = C06C125BB8F8F43A1039C5F6053D1932E5A15553DBA482CD0CB64A120AA79739393215CC19C1FFEF366C8F2AABC930A0
2,127,450 UART: [art] SIG.S = 33317DD34A177D58F76029C955976AE737141025566A4051FE247D8E0879FD0E5BAE01996A54C863400436E9E1B82775
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,821 ready_for_fw is high
1,060,821 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,598,058 >>> mbox cmd response: success
1,660,681 UART:
1,660,697 UART: Running Caliptra FMC ...
1,661,105 UART:
1,661,159 UART: [state] CFI Enabled
1,671,607 UART: [fht] FMC Alias Private Key: 7
1,790,639 UART: [art] Extend RT PCRs Done
1,791,067 UART: [art] Lock RT PCRs Done
1,792,603 UART: [art] Populate DV Done
1,800,804 UART: [fht] FMC Alias Private Key: 7
1,801,854 UART: [art] Derive CDI
1,802,134 UART: [art] Store in slot 0x4
1,887,847 UART: [art] Derive Key Pair
1,888,207 UART: [art] Store priv key in slot 0x5
1,901,189 UART: [art] Derive Key Pair - Done
1,916,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,931,368 UART: [art] Erasing AUTHORITY.KEYID = 7
1,932,133 UART: [art] PUB.X = 11A836F355FBF5CE3C9B689083BDF7B4DB1FC6522C4925FF90BBE0A9BAF52210EDF5017FF709DD617C5D7D407AF7B4A3
1,938,917 UART: [art] PUB.Y = D677EF29750ECEDB5130CDAFB424EDC2AB6EA845CBF9BEA87AE65B35AD620620396CA468109688F6EF59F25F16A68008
1,945,874 UART: [art] SIG.R = F6791C6B5502A74B4A56A13E7F94893952BBB8A8C0A501611B47AEA0C12A2AB9CD77F365DD12E34792B71CAB6A93DC0C
1,952,647 UART: [art] SIG.S = 793135C27E7C7B0200B0DD5349F1BB0F295C66822A3131BC28966A0A05B4845DAB607C5DFFB3FBD18DAA0198FE15D71D
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,741 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
893,723 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,848 UART: [kat] ++
898,000 UART: [kat] sha1
902,188 UART: [kat] SHA2-256
904,128 UART: [kat] SHA2-384
906,977 UART: [kat] SHA2-512-ACC
908,878 UART: [kat] ECC-384
918,945 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,173,196 UART: [cold-reset] ++
1,173,770 UART: [fht] FHT @ 0x50003400
1,176,425 UART: [idev] ++
1,176,593 UART: [idev] CDI.KEYID = 6
1,176,953 UART: [idev] SUBJECT.KEYID = 7
1,177,377 UART: [idev] UDS.KEYID = 0
1,177,722 ready_for_fw is high
1,177,722 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,185,459 UART: [idev] Erasing UDS.KEYID = 0
1,202,812 UART: [idev] Sha1 KeyId Algorithm
1,211,348 UART: [idev] --
1,212,294 UART: [ldev] ++
1,212,462 UART: [ldev] CDI.KEYID = 6
1,212,825 UART: [ldev] SUBJECT.KEYID = 5
1,213,251 UART: [ldev] AUTHORITY.KEYID = 7
1,213,714 UART: [ldev] FE.KEYID = 1
1,218,700 UART: [ldev] Erasing FE.KEYID = 1
1,244,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,226 UART: [ldev] --
1,283,643 UART: [fwproc] Wait for Commands...
1,284,225 UART: [fwproc] Recv command 0x46574c44
1,284,953 UART: [fwproc] Recv'd Img size: 34948 bytes
1,672,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,607 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,730,777 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,745,632 >>> mbox cmd response: success
1,746,800 UART: [afmc] ++
1,746,968 UART: [afmc] CDI.KEYID = 6
1,747,330 UART: [afmc] SUBJECT.KEYID = 7
1,747,755 UART: [afmc] AUTHORITY.KEYID = 5
1,782,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,799,381 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,800,129 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,838 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,811,721 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,817,422 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,825,222 UART: [afmc] --
1,826,122 UART: [cold-reset] --
1,827,144 UART: [state] Locking Datavault
1,827,941 UART: [state] Locking PCR0, PCR1 and PCR31
1,828,545 UART: [state] Locking ICCM
1,829,017 UART: [exit] Launching FMC @ 0x40000130
1,834,347 UART:
1,834,363 UART: Running Caliptra FMC ...
1,834,771 UART:
1,834,914 UART: [state] CFI Enabled
1,845,880 UART: [fht] FMC Alias Private Key: 7
1,964,576 UART: [art] Extend RT PCRs Done
1,965,004 UART: [art] Lock RT PCRs Done
1,966,692 UART: [art] Populate DV Done
1,974,807 UART: [fht] FMC Alias Private Key: 7
1,975,763 UART: [art] Derive CDI
1,976,043 UART: [art] Store in slot 0x4
2,062,098 UART: [art] Derive Key Pair
2,062,458 UART: [art] Store priv key in slot 0x5
2,075,904 UART: [art] Derive Key Pair - Done
2,090,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,106,499 UART: [art] Erasing AUTHORITY.KEYID = 7
2,107,264 UART: [art] PUB.X = 7DE29CB6EBA8380A7B662590E4CC753ABF652F19358BD304626EC43EB60B4E19628E7B1D9778C43FF1DC2C35DCE124D3
2,114,037 UART: [art] PUB.Y = 40AFCA8A4402BF67ACE9F5601C681E9E634139F595F5BDD188BC9D6F0D16E5C3624F42B1EC8660195173B4052666398C
2,120,980 UART: [art] SIG.R = E1F4F63A8E6F52DAF4AA9C58B7BAB0A46215BC7B4DE1E6C30B1A768C3F857603BBB3F3F127C665194D4EA4612D1D3615
2,127,760 UART: [art] SIG.S = 5A9D5E8B385E660F1DC8E3542B500D2A72E840DA9F03438C818E42DE12D381B538249F17ED31915F0446645C59D60E4B
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,790 ready_for_fw is high
1,060,790 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,598,483 >>> mbox cmd response: success
1,660,012 UART:
1,660,028 UART: Running Caliptra FMC ...
1,660,436 UART:
1,660,579 UART: [state] CFI Enabled
1,671,321 UART: [fht] FMC Alias Private Key: 7
1,791,097 UART: [art] Extend RT PCRs Done
1,791,525 UART: [art] Lock RT PCRs Done
1,793,335 UART: [art] Populate DV Done
1,801,646 UART: [fht] FMC Alias Private Key: 7
1,802,616 UART: [art] Derive CDI
1,802,896 UART: [art] Store in slot 0x4
1,888,705 UART: [art] Derive Key Pair
1,889,065 UART: [art] Store priv key in slot 0x5
1,902,641 UART: [art] Derive Key Pair - Done
1,917,415 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,932,990 UART: [art] Erasing AUTHORITY.KEYID = 7
1,933,755 UART: [art] PUB.X = BE829CDAB63C23F798A476AE941A6DC6B7C95B2F7A94E1D96CDC14CB9ED01E435142DD2C8392D7585F1B3E1FC8187FAF
1,940,545 UART: [art] PUB.Y = 3DC92660B25A9C13619016E0D1F5CAC9C817844ABC103B61FD2D920E19C95AE1CEE89174DCE1388F79D15863AA9E8C04
1,947,497 UART: [art] SIG.R = F613F81CC3C2A9052120F50B4F537AD4AB5744D39D32977EFF5CDADE3E0FF18415651FC41B1BAA4D2AF8795CFB72FDA2
1,954,278 UART: [art] SIG.S = B9536865C1EA72C223D031DBD8E96C7088E47A63357BEA56823C141228E3C1D40258D7D6895B2E4428D15A0DFFB484E9
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
191,984 UART:
192,354 UART: Running Caliptra ROM ...
193,495 UART:
193,641 UART: [state] CFI Enabled
261,605 UART: [state] LifecycleState = Unprovisioned
263,515 UART: [state] DebugLocked = No
265,118 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,127 UART: [kat] SHA2-256
438,821 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,322 UART: [kat] ++
449,792 UART: [kat] sha1
461,759 UART: [kat] SHA2-256
464,443 UART: [kat] SHA2-384
469,794 UART: [kat] SHA2-512-ACC
472,164 UART: [kat] ECC-384
2,765,987 UART: [kat] HMAC-384Kdf
2,797,840 UART: [kat] LMS
3,988,160 UART: [kat] --
3,992,151 UART: [cold-reset] ++
3,994,660 UART: [fht] Storing FHT @ 0x50003400
4,004,998 UART: [idev] ++
4,005,564 UART: [idev] CDI.KEYID = 6
4,006,479 UART: [idev] SUBJECT.KEYID = 7
4,007,723 UART: [idev] UDS.KEYID = 0
4,008,791 ready_for_fw is high
4,009,003 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,109,177 UART: [idev] Erasing UDS.KEYID = 0
7,344,483 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,801 UART: [idev] --
7,369,888 UART: [ldev] ++
7,370,453 UART: [ldev] CDI.KEYID = 6
7,371,410 UART: [ldev] SUBJECT.KEYID = 5
7,372,619 UART: [ldev] AUTHORITY.KEYID = 7
7,373,844 UART: [ldev] FE.KEYID = 1
7,421,462 UART: [ldev] Erasing FE.KEYID = 1
10,751,728 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,125 UART: [ldev] --
13,112,748 UART: [fwproc] Waiting for Commands...
13,115,118 UART: [fwproc] Received command 0x46574c44
13,117,299 UART: [fwproc] Received Image of size 79496 bytes
16,747,057 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,820,745 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,893,863 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
17,086,396 >>> mbox cmd response: success
17,086,811 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,090,656 UART: [afmc] ++
17,091,250 UART: [afmc] CDI.KEYID = 6
17,092,129 UART: [afmc] SUBJECT.KEYID = 7
17,093,398 UART: [afmc] AUTHORITY.KEYID = 5
20,452,101 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,752,592 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,754,847 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,769,296 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,784,031 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,798,424 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,819,250 UART: [afmc] --
22,822,681 UART: [cold-reset] --
22,826,867 UART: [state] Locking Datavault
22,832,921 UART: [state] Locking PCR0, PCR1 and PCR31
22,834,671 UART: [state] Locking ICCM
22,836,273 UART: [exit] Launching FMC @ 0x40000130
22,844,666 UART:
22,844,921 UART: Running Caliptra FMC ...
22,846,022 UART:
22,846,175 UART: [state] CFI Enabled
22,911,855 UART: [fht] FMC Alias Private Key: 7
25,252,540 UART: [art] Extend RT PCRs Done
25,253,763 UART: [art] Lock RT PCRs Done
25,255,437 UART: [art] Populate DV Done
25,260,856 UART: [fht] FMC Alias Private Key: 7
25,262,323 UART: [art] Derive CDI
25,263,060 UART: [art] Store in slot 0x4
25,320,832 UART: [art] Derive Key Pair
25,321,828 UART: [art] Store priv key in slot 0x5
28,614,683 UART: [art] Derive Key Pair - Done
28,627,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,916,784 UART: [art] Erasing AUTHORITY.KEYID = 7
30,918,301 UART: [art] PUB.X = D61AC02C375A32513BCE49FCD06D9E57B09E9F466834CF98619A19C5C289CDA1DDCCEB4615E067A54B1C9CF3AE1E27F2
30,925,585 UART: [art] PUB.Y = D561C5C12104DFA654538ABA54624A302387BB3FCFBFA70E154CD38FB979FA956E979EB33D7EC9D151C1ADDEC0F24BB0
30,932,887 UART: [art] SIG.R = 2893F361EC741F8E0F542B7C7A8A07D8CD79F8E0E6A5DB6C26BD86859F3587B3C3BBA3991083C9A4AEB1119197FC3DFC
30,940,365 UART: [art] SIG.S = CBFB5E189A068C72FCDDEE9095C759E48BF2A03588C43B5E4ACD47511DEDF7AAA59B4C1AD8A9D8C05F3EF966E4028FFB
32,245,573 UART: mock_rt_interact::rt_entry...FMC Tester
32,378,365 UART: [rt] Runtime listening for mailbox commands...
32,382,623 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,784,492 ready_for_fw is high
3,785,042 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
17,146,169 >>> mbox cmd response: success
17,146,740 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,837,137 UART:
22,837,529 UART: Running Caliptra FMC ...
22,838,916 UART:
22,839,082 UART: [state] CFI Enabled
22,906,889 UART: [fht] FMC Alias Private Key: 7
25,246,912 UART: [art] Extend RT PCRs Done
25,248,146 UART: [art] Lock RT PCRs Done
25,249,716 UART: [art] Populate DV Done
25,255,232 UART: [fht] FMC Alias Private Key: 7
25,256,716 UART: [art] Derive CDI
25,257,472 UART: [art] Store in slot 0x4
25,314,272 UART: [art] Derive Key Pair
25,315,304 UART: [art] Store priv key in slot 0x5
28,607,826 UART: [art] Derive Key Pair - Done
28,621,098 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,907,458 UART: [art] Erasing AUTHORITY.KEYID = 7
30,908,984 UART: [art] PUB.X = 3E6698BE17C869F9B51CF719E9810D4C04555E5E67D83499149A2774341CED0197D7B3F68A937853E7A788A2BEA76879
30,916,181 UART: [art] PUB.Y = 10B27F83824B863E3C65B0D2240123C4577B3988B56DB0C7A511EE46204194443A9528AC1BD840430010AB40F4669A8E
30,923,381 UART: [art] SIG.R = 3CCD22B7E56C59E8A286F0429F9F23F7D7756A628779FE799871474330898357C2C52CFCA086191BF19A1C561D85A474
30,930,781 UART: [art] SIG.S = D299093A6D49A44EDE6A3C69D1A441E6C9835EFA4F870A9C7E5138BEF11D0638846C9616108E5F70110280218D5B2629
32,235,478 UART: mock_rt_interact::rt_entry...FMC Tester
32,368,131 UART: [rt] Runtime listening for mailbox commands...
32,372,411 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,458 UART:
192,836 UART: Running Caliptra ROM ...
193,956 UART:
603,542 UART: [state] CFI Enabled
618,174 UART: [state] LifecycleState = Unprovisioned
620,067 UART: [state] DebugLocked = No
621,950 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,026 UART: [kat] SHA2-256
796,769 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,334 UART: [kat] ++
807,859 UART: [kat] sha1
818,891 UART: [kat] SHA2-256
821,602 UART: [kat] SHA2-384
827,452 UART: [kat] SHA2-512-ACC
829,812 UART: [kat] ECC-384
3,113,595 UART: [kat] HMAC-384Kdf
3,125,545 UART: [kat] LMS
4,315,716 UART: [kat] --
4,321,645 UART: [cold-reset] ++
4,324,002 UART: [fht] Storing FHT @ 0x50003400
4,334,770 UART: [idev] ++
4,335,327 UART: [idev] CDI.KEYID = 6
4,336,350 UART: [idev] SUBJECT.KEYID = 7
4,337,517 UART: [idev] UDS.KEYID = 0
4,338,700 ready_for_fw is high
4,338,927 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,438,889 UART: [idev] Erasing UDS.KEYID = 0
7,627,642 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,007 UART: [idev] --
7,654,437 UART: [ldev] ++
7,655,000 UART: [ldev] CDI.KEYID = 6
7,655,938 UART: [ldev] SUBJECT.KEYID = 5
7,657,199 UART: [ldev] AUTHORITY.KEYID = 7
7,658,392 UART: [ldev] FE.KEYID = 1
7,667,001 UART: [ldev] Erasing FE.KEYID = 1
10,953,282 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,205 UART: [ldev] --
13,312,876 UART: [fwproc] Waiting for Commands...
13,314,915 UART: [fwproc] Received command 0x46574c44
13,317,090 UART: [fwproc] Received Image of size 79496 bytes
16,940,354 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,019,812 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,092,978 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
17,284,487 >>> mbox cmd response: success
17,284,937 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,289,159 UART: [afmc] ++
17,289,794 UART: [afmc] CDI.KEYID = 6
17,290,857 UART: [afmc] SUBJECT.KEYID = 7
17,291,956 UART: [afmc] AUTHORITY.KEYID = 5
20,608,031 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,899,730 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,902,043 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,916,418 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,931,154 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,945,560 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,967,138 UART: [afmc] --
22,970,799 UART: [cold-reset] --
22,975,359 UART: [state] Locking Datavault
22,980,687 UART: [state] Locking PCR0, PCR1 and PCR31
22,982,425 UART: [state] Locking ICCM
22,984,791 UART: [exit] Launching FMC @ 0x40000130
22,993,185 UART:
22,993,414 UART: Running Caliptra FMC ...
22,994,510 UART:
22,994,662 UART: [state] CFI Enabled
23,002,539 UART: [fht] FMC Alias Private Key: 7
25,342,774 UART: [art] Extend RT PCRs Done
25,343,994 UART: [art] Lock RT PCRs Done
25,345,424 UART: [art] Populate DV Done
25,350,778 UART: [fht] FMC Alias Private Key: 7
25,352,317 UART: [art] Derive CDI
25,353,052 UART: [art] Store in slot 0x4
25,395,826 UART: [art] Derive Key Pair
25,396,860 UART: [art] Store priv key in slot 0x5
28,638,887 UART: [art] Derive Key Pair - Done
28,651,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,932,167 UART: [art] Erasing AUTHORITY.KEYID = 7
30,933,677 UART: [art] PUB.X = A8CEF0962ACD03EE4D05BF223D00F38C8C1276654437AA1A33936298B92EC425A75F3F84D6AE81B47330D53CC0068586
30,940,886 UART: [art] PUB.Y = 1C5C71C4D2F2B6B07D74BA0F6F965ECC23ED2C4BA07BE2A7B6E778E5F5C5D21B421FF4AAE55FE4921094A56B38C1F6EE
30,948,194 UART: [art] SIG.R = F1D1EC792EA8CDBC15882F98CF16BAEABFC55A799DFA6E496D44EDF38F5A7BFEBA7E378053C5EB8D1C500495B5D4104D
30,955,605 UART: [art] SIG.S = 17F1F6785F4806CDE7E94208200EA65E5E3941584A718B6ADF1D98B78B777B1095C84CD393D332EADF14D0BD96B77D13
32,260,524 UART: mock_rt_interact::rt_entry...FMC Tester
32,393,252 UART: [rt] Runtime listening for mailbox commands...
32,397,494 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
4,129,645 ready_for_fw is high
4,130,063 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
17,351,486 >>> mbox cmd response: success
17,352,155 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,991,816 UART:
22,992,209 UART: Running Caliptra FMC ...
22,993,417 UART:
22,993,570 UART: [state] CFI Enabled
23,001,538 UART: [fht] FMC Alias Private Key: 7
25,341,468 UART: [art] Extend RT PCRs Done
25,342,693 UART: [art] Lock RT PCRs Done
25,344,394 UART: [art] Populate DV Done
25,349,818 UART: [fht] FMC Alias Private Key: 7
25,351,370 UART: [art] Derive CDI
25,352,186 UART: [art] Store in slot 0x4
25,395,114 UART: [art] Derive Key Pair
25,396,153 UART: [art] Store priv key in slot 0x5
28,638,593 UART: [art] Derive Key Pair - Done
28,651,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,932,123 UART: [art] Erasing AUTHORITY.KEYID = 7
30,933,629 UART: [art] PUB.X = 378FBF111639E243E0E332BC60DFC4C83AE04B6AE2847C14CF6F14761D3ABDF16A6F50E0542F8ED6A5174943A3EF6607
30,940,937 UART: [art] PUB.Y = 93F498A9BC9374BE344B5DD106885A17B931DD8BD44D79009F78FF230B61719C48E155F954737291F9BF665CC4DD351E
30,948,130 UART: [art] SIG.R = D78115470D032C9DA75EA249654D12A45D41248D822886A7ABBB4CADAD984C62D895F1EFBBAF106B99D94DA9634F0CB5
30,955,526 UART: [art] SIG.S = 0A9C651E77224F00782F3B8FFCAF50CC3CA65228CA9D41275679BC30EEDF7091EBBC097658A61666C50C1BF8EC3B4320
32,260,321 UART: mock_rt_interact::rt_entry...FMC Tester
32,392,889 UART: [rt] Runtime listening for mailbox commands...
32,397,160 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,772 UART:
193,192 UART: Running Caliptra ROM ...
194,322 UART:
194,470 UART: [state] CFI Enabled
255,237 UART: [state] LifecycleState = Unprovisioned
257,160 UART: [state] DebugLocked = No
259,888 UART: [state] WD Timer not started. Device not locked for debugging
264,562 UART: [kat] SHA2-256
444,180 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
454,959 UART: [kat] ++
455,525 UART: [kat] sha1
467,282 UART: [kat] SHA2-256
469,998 UART: [kat] SHA2-384
475,148 UART: [kat] SHA2-512-ACC
477,587 UART: [kat] ECC-384
2,936,004 UART: [kat] HMAC-384Kdf
2,959,050 UART: [kat] LMS
3,435,545 UART: [kat] --
3,441,601 UART: [cold-reset] ++
3,443,318 UART: [fht] FHT @ 0x50003400
3,453,231 UART: [idev] ++
3,453,789 UART: [idev] CDI.KEYID = 6
3,454,741 UART: [idev] SUBJECT.KEYID = 7
3,455,984 UART: [idev] UDS.KEYID = 0
3,456,952 ready_for_fw is high
3,457,141 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,557,315 UART: [idev] Erasing UDS.KEYID = 0
5,974,001 UART: [idev] Sha1 KeyId Algorithm
5,998,527 UART: [idev] --
6,002,494 UART: [ldev] ++
6,003,080 UART: [ldev] CDI.KEYID = 6
6,003,969 UART: [ldev] SUBJECT.KEYID = 5
6,005,259 UART: [ldev] AUTHORITY.KEYID = 7
6,006,503 UART: [ldev] FE.KEYID = 1
6,046,448 UART: [ldev] Erasing FE.KEYID = 1
8,550,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,289,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,305,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,321,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,337,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,359,711 UART: [ldev] --
10,365,834 UART: [fwproc] Wait for Commands...
10,368,473 UART: [fwproc] Recv command 0x46574c44
10,370,509 UART: [fwproc] Recv'd Img size: 79496 bytes
13,373,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,452,931 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,525,965 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,718,226 >>> mbox cmd response: success
13,718,653 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,723,032 UART: [afmc] ++
13,723,616 UART: [afmc] CDI.KEYID = 6
13,724,540 UART: [afmc] SUBJECT.KEYID = 7
13,725,756 UART: [afmc] AUTHORITY.KEYID = 5
16,265,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,011,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,013,525 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,029,306 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,045,404 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,060,953 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,085,815 UART: [afmc] --
18,090,185 UART: [cold-reset] --
18,092,595 UART: [state] Locking Datavault
18,097,090 UART: [state] Locking PCR0, PCR1 and PCR31
18,098,789 UART: [state] Locking ICCM
18,100,359 UART: [exit] Launching FMC @ 0x40000130
18,108,768 UART:
18,109,005 UART: Running Caliptra FMC ...
18,110,112 UART:
18,110,269 UART: [state] CFI Enabled
18,165,688 UART: [fht] FMC Alias Private Key: 7
19,931,905 UART: [art] Extend RT PCRs Done
19,933,121 UART: [art] Lock RT PCRs Done
19,934,821 UART: [art] Populate DV Done
19,940,119 UART: [fht] FMC Alias Private Key: 7
19,941,818 UART: [art] Derive CDI
19,942,549 UART: [art] Store in slot 0x4
19,998,189 UART: [art] Derive Key Pair
19,999,237 UART: [art] Store priv key in slot 0x5
22,461,458 UART: [art] Derive Key Pair - Done
22,474,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,186,674 UART: [art] Erasing AUTHORITY.KEYID = 7
24,188,189 UART: [art] PUB.X = 7E66F3E51FE73746014BB3567A2E51EE897065EAAA537260D8605A667D1D5E7AABA756C493DDDFC6DD6640F02CA4EB70
24,195,445 UART: [art] PUB.Y = A7A0FEC378F4DAD68AAA2F6C7FE66C165DF0584D7B974994B86AACF201F824E266E8C7FE87B7C15151D9AEE2FAA09D12
24,202,741 UART: [art] SIG.R = D76EF8D3956DC47C1A0542C42BFFE5FC6F5BF4DA6EFE2C9EA25EF9D16386B613D8A8B964D7086B1FACE4258C0B2FB33B
24,210,139 UART: [art] SIG.S = 45E456A5EE814E26BA5547FE097559C685BBEF1EF9077BD8EC7FE4A2437CB2925F696DE147E33C208572814AF9EF7B1C
25,188,128 UART: mock_rt_interact::rt_entry...FMC Tester
25,319,927 UART: [rt] Runtime listening for mailbox commands...
25,324,218 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,462,707 ready_for_fw is high
3,463,138 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,577,412 >>> mbox cmd response: success
13,577,960 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,854,400 UART:
17,854,780 UART: Running Caliptra FMC ...
17,856,041 UART:
17,856,209 UART: [state] CFI Enabled
17,920,854 UART: [fht] FMC Alias Private Key: 7
19,687,221 UART: [art] Extend RT PCRs Done
19,688,442 UART: [art] Lock RT PCRs Done
19,690,148 UART: [art] Populate DV Done
19,695,587 UART: [fht] FMC Alias Private Key: 7
19,697,141 UART: [art] Derive CDI
19,697,965 UART: [art] Store in slot 0x4
19,754,122 UART: [art] Derive Key Pair
19,755,164 UART: [art] Store priv key in slot 0x5
22,217,839 UART: [art] Derive Key Pair - Done
22,230,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,943,726 UART: [art] Erasing AUTHORITY.KEYID = 7
23,945,242 UART: [art] PUB.X = BB6444024BC9F5027B6E4E45B4B8F3D82A288F96F16F529197F95FC71459A6441CE43D840FB3F14A75274A5351A111B3
23,952,474 UART: [art] PUB.Y = 2DEABEFE0BC6377C0090F92862C4108BB8024A21FD4BC8718B26FC88A2E8ACE4E4DCACA7B3B24989C29F07B441E422FD
23,959,753 UART: [art] SIG.R = 488422E9476EF2696B11CB20B3ADFE2AEDCB28EF612E8ADFEA7715732AB78CF047FFA14362ED3C3211052E52E73813C6
23,967,141 UART: [art] SIG.S = 75C2FBD137933769BAD619E27A166E211BB24A4E18C6F2C2B442803BC88EBA21248B33BA9689811EA46B4AE6D2DCF8D6
24,944,808 UART: mock_rt_interact::rt_entry...FMC Tester
25,076,402 UART: [rt] Runtime listening for mailbox commands...
25,080,645 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,310 UART:
192,663 UART: Running Caliptra ROM ...
193,781 UART:
603,582 UART: [state] CFI Enabled
618,231 UART: [state] LifecycleState = Unprovisioned
620,172 UART: [state] DebugLocked = No
623,049 UART: [state] WD Timer not started. Device not locked for debugging
626,455 UART: [kat] SHA2-256
806,091 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,879 UART: [kat] ++
817,323 UART: [kat] sha1
827,268 UART: [kat] SHA2-256
829,985 UART: [kat] SHA2-384
835,475 UART: [kat] SHA2-512-ACC
837,861 UART: [kat] ECC-384
3,279,001 UART: [kat] HMAC-384Kdf
3,290,315 UART: [kat] LMS
3,766,782 UART: [kat] --
3,771,227 UART: [cold-reset] ++
3,772,306 UART: [fht] FHT @ 0x50003400
3,783,773 UART: [idev] ++
3,784,397 UART: [idev] CDI.KEYID = 6
3,785,272 UART: [idev] SUBJECT.KEYID = 7
3,786,583 UART: [idev] UDS.KEYID = 0
3,787,478 ready_for_fw is high
3,787,673 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,887,706 UART: [idev] Erasing UDS.KEYID = 0
6,263,436 UART: [idev] Sha1 KeyId Algorithm
6,287,832 UART: [idev] --
6,293,041 UART: [ldev] ++
6,293,645 UART: [ldev] CDI.KEYID = 6
6,294,557 UART: [ldev] SUBJECT.KEYID = 5
6,295,714 UART: [ldev] AUTHORITY.KEYID = 7
6,296,998 UART: [ldev] FE.KEYID = 1
6,305,258 UART: [ldev] Erasing FE.KEYID = 1
8,784,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,557 UART: [ldev] --
10,579,601 UART: [fwproc] Wait for Commands...
10,581,690 UART: [fwproc] Recv command 0x46574c44
10,583,672 UART: [fwproc] Recv'd Img size: 79496 bytes
13,580,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,657,386 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,730,412 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,921,998 >>> mbox cmd response: success
13,922,409 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,926,944 UART: [afmc] ++
13,927,536 UART: [afmc] CDI.KEYID = 6
13,928,497 UART: [afmc] SUBJECT.KEYID = 7
13,929,707 UART: [afmc] AUTHORITY.KEYID = 5
16,432,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,154,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,157,056 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,172,841 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,188,932 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,204,529 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,230,158 UART: [afmc] --
18,234,617 UART: [cold-reset] --
18,240,098 UART: [state] Locking Datavault
18,245,471 UART: [state] Locking PCR0, PCR1 and PCR31
18,247,179 UART: [state] Locking ICCM
18,248,626 UART: [exit] Launching FMC @ 0x40000130
18,257,021 UART:
18,257,262 UART: Running Caliptra FMC ...
18,258,360 UART:
18,258,514 UART: [state] CFI Enabled
18,266,638 UART: [fht] FMC Alias Private Key: 7
20,031,531 UART: [art] Extend RT PCRs Done
20,032,739 UART: [art] Lock RT PCRs Done
20,034,334 UART: [art] Populate DV Done
20,039,694 UART: [fht] FMC Alias Private Key: 7
20,041,325 UART: [art] Derive CDI
20,042,080 UART: [art] Store in slot 0x4
20,085,029 UART: [art] Derive Key Pair
20,086,127 UART: [art] Store priv key in slot 0x5
22,512,723 UART: [art] Derive Key Pair - Done
22,525,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,231,533 UART: [art] Erasing AUTHORITY.KEYID = 7
24,233,013 UART: [art] PUB.X = C73D48422998D53BE068771747E0A398E35C9D992F30BFC030962A5CADB962FB10F22B8E8243EC5B9574C0979A8A7ECB
24,240,313 UART: [art] PUB.Y = 587BD585237CD5AF47BB71601B8D7FF53A531DC9670F29A56C23116B1ABF4E0FB816108FF96DF598BFC02804C7BDCB77
24,247,555 UART: [art] SIG.R = CB8BE04976D720620A034BC196B6E801AA86463010C7D7148739AA5844EFDC2B552420801085EE079E64E39EB9EADF75
24,254,957 UART: [art] SIG.S = 8E975F1F20D2A2079D656A0F09FB6B2C873E09844FD8FFDB37315F85FE29DC19A76C999A8072FAAFC0BE64DF51D0D8BD
25,233,181 UART: mock_rt_interact::rt_entry...FMC Tester
25,363,780 UART: [rt] Runtime listening for mailbox commands...
25,368,068 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,782,090 ready_for_fw is high
3,782,666 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,817,837 >>> mbox cmd response: success
13,818,356 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,064,505 UART:
18,064,882 UART: Running Caliptra FMC ...
18,066,150 UART:
18,066,314 UART: [state] CFI Enabled
18,074,296 UART: [fht] FMC Alias Private Key: 7
19,840,368 UART: [art] Extend RT PCRs Done
19,841,585 UART: [art] Lock RT PCRs Done
19,843,290 UART: [art] Populate DV Done
19,848,703 UART: [fht] FMC Alias Private Key: 7
19,850,191 UART: [art] Derive CDI
19,850,926 UART: [art] Store in slot 0x4
19,893,464 UART: [art] Derive Key Pair
19,894,505 UART: [art] Store priv key in slot 0x5
22,321,827 UART: [art] Derive Key Pair - Done
22,334,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,041,263 UART: [art] Erasing AUTHORITY.KEYID = 7
24,042,768 UART: [art] PUB.X = A69911F6C0406E290A20F80003AF8F66480F6E4626BA3A473C8C377F8BB5248543A52B87CF3D34709329BDF182EFB154
24,050,006 UART: [art] PUB.Y = 0A35926696BDCD10A900E6776DB29040359551C34DF82E1FFA40624A35C6953F9250C85C676951503E7DFCCEF740DC96
24,057,241 UART: [art] SIG.R = 5930F063B2E12ADE121BAE37AFD3B74B228570A3349870AEEFA231CAEC1FD4615859366CD783044F808B1C0E52E396AA
24,064,593 UART: [art] SIG.S = B7F58046590EFDFDE8EFAEE4FAA67249953E833D294B195269DDA7819AB2A99BD7F98A9A2896E3C61CAA02AE70111D06
25,043,370 UART: mock_rt_interact::rt_entry...FMC Tester
25,174,929 UART: [rt] Runtime listening for mailbox commands...
25,179,165 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,160 UART:
192,511 UART: Running Caliptra ROM ...
193,682 UART:
193,834 UART: [state] CFI Enabled
267,029 UART: [state] LifecycleState = Unprovisioned
269,373 UART: [state] DebugLocked = No
271,621 UART: [state] WD Timer not started. Device not locked for debugging
275,792 UART: [kat] SHA2-256
465,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,475 UART: [kat] ++
476,920 UART: [kat] sha1
489,088 UART: [kat] SHA2-256
492,137 UART: [kat] SHA2-384
499,342 UART: [kat] SHA2-512-ACC
501,924 UART: [kat] ECC-384
2,949,654 UART: [kat] HMAC-384Kdf
2,973,218 UART: [kat] LMS
3,504,994 UART: [kat] --
3,511,260 UART: [cold-reset] ++
3,513,692 UART: [fht] FHT @ 0x50003400
3,525,039 UART: [idev] ++
3,525,719 UART: [idev] CDI.KEYID = 6
3,526,632 UART: [idev] SUBJECT.KEYID = 7
3,527,805 UART: [idev] UDS.KEYID = 0
3,528,723 ready_for_fw is high
3,528,912 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,629,010 UART: [idev] Erasing UDS.KEYID = 0
6,057,231 UART: [idev] Sha1 KeyId Algorithm
6,079,759 UART: [idev] --
6,085,473 UART: [ldev] ++
6,086,159 UART: [ldev] CDI.KEYID = 6
6,087,074 UART: [ldev] SUBJECT.KEYID = 5
6,088,261 UART: [ldev] AUTHORITY.KEYID = 7
6,089,446 UART: [ldev] FE.KEYID = 1
6,124,878 UART: [ldev] Erasing FE.KEYID = 1
8,628,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,367,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,382,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,398,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,413,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,434,145 UART: [ldev] --
10,439,140 UART: [fwproc] Wait for Commands...
10,441,773 UART: [fwproc] Recv command 0x46574c44
10,444,079 UART: [fwproc] Recv'd Img size: 79496 bytes
13,464,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,541,110 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,664,709 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,990,856 >>> mbox cmd response: success
13,991,314 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,995,120 UART: [afmc] ++
13,995,815 UART: [afmc] CDI.KEYID = 6
13,996,972 UART: [afmc] SUBJECT.KEYID = 7
13,998,509 UART: [afmc] AUTHORITY.KEYID = 5
16,532,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,270,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,272,082 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,287,161 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,302,352 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,317,250 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,341,635 UART: [afmc] --
18,344,597 UART: [cold-reset] --
18,347,812 UART: [state] Locking Datavault
18,351,390 UART: [state] Locking PCR0, PCR1 and PCR31
18,353,581 UART: [state] Locking ICCM
18,355,615 UART: [exit] Launching FMC @ 0x40000130
18,364,232 UART:
18,364,464 UART: Running Caliptra FMC ...
18,365,499 UART:
18,365,645 UART: [state] CFI Enabled
18,427,996 UART: [fht] FMC Alias Private Key: 7
20,215,159 UART: [art] Extend RT PCRs Done
20,216,376 UART: [art] Lock RT PCRs Done
20,218,239 UART: [art] Populate DV Done
20,223,651 UART: [fht] FMC Alias Private Key: 7
20,225,293 UART: [art] Derive CDI
20,226,108 UART: [art] Store in slot 0x4
20,281,664 UART: [art] Derive Key Pair
20,282,704 UART: [art] Store priv key in slot 0x5
22,745,697 UART: [art] Derive Key Pair - Done
22,758,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,471,790 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,270 UART: [art] PUB.X = 292BD22C0B6312E2B2D8EC308C9B0ACBE6C741E6F1F8308A140AA7C84AB843F3D65EB515F4003C3B1887AFD3F92A1EA1
24,480,562 UART: [art] PUB.Y = 4C7CCD6344CE30D807EA4E2B2CE53834BAB9BD65AE08311790DBD5935927FEC7474106DFD5BEB374D788B36BDB0E166F
24,487,857 UART: [art] SIG.R = 437AD25CE832496D55196016DA22ADC477FED101C85EA3B155398C062CEB6640F01E602ABBC203A464022CB1D0775AC1
24,495,214 UART: [art] SIG.S = CE418392AD35BC98EAC549172CFD6350CAF1E9D6372973323EC3C07AF2AD2087EE3A4B2818B99C701B74FB938D2FA01E
25,473,819 UART: mock_rt_interact::rt_entry...FMC Tester
25,604,902 UART: [rt] Runtime listening for mailbox commands...
25,609,197 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,438,278 ready_for_fw is high
3,438,668 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,991,245 >>> mbox cmd response: success
13,991,712 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,276,113 UART:
18,276,476 UART: Running Caliptra FMC ...
18,277,720 UART:
18,277,886 UART: [state] CFI Enabled
18,346,918 UART: [fht] FMC Alias Private Key: 7
20,113,106 UART: [art] Extend RT PCRs Done
20,114,337 UART: [art] Lock RT PCRs Done
20,116,042 UART: [art] Populate DV Done
20,121,708 UART: [fht] FMC Alias Private Key: 7
20,123,303 UART: [art] Derive CDI
20,124,117 UART: [art] Store in slot 0x4
20,180,546 UART: [art] Derive Key Pair
20,181,584 UART: [art] Store priv key in slot 0x5
22,644,323 UART: [art] Derive Key Pair - Done
22,657,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,371,143 UART: [art] Erasing AUTHORITY.KEYID = 7
24,372,645 UART: [art] PUB.X = 29370E7F7C53B0310A4975D43AF3A3E1CF5744113BB166880339AE566BCDC842038FEF0A97A9192FE035C5DE8B7B592B
24,379,896 UART: [art] PUB.Y = D4ABEE3430618A863416931AD24F437643AF70C0FDD071DFCD34123230FEFB5B84CD79961AF8EA7BD0A46E4C98204E9E
24,387,156 UART: [art] SIG.R = C929AC720FADF64C7162B1979135F2655F63E35677980A1EDBC138D8F5C06D0FD72536932AF106593BE267541AC08C55
24,394,608 UART: [art] SIG.S = 5E680B2A531B66DA16067ACB5EB416097EB3A659A9A0BD768B74BAF474C4AEDBD03B7F4D1CC565900BAEB000A123AEFE
25,372,387 UART: mock_rt_interact::rt_entry...FMC Tester
25,503,648 UART: [rt] Runtime listening for mailbox commands...
25,507,942 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
192,420 UART:
192,800 UART: Running Caliptra ROM ...
193,944 UART:
603,787 UART: [state] CFI Enabled
615,028 UART: [state] LifecycleState = Unprovisioned
617,400 UART: [state] DebugLocked = No
619,080 UART: [state] WD Timer not started. Device not locked for debugging
623,613 UART: [kat] SHA2-256
813,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,287 UART: [kat] ++
824,804 UART: [kat] sha1
836,661 UART: [kat] SHA2-256
839,666 UART: [kat] SHA2-384
846,146 UART: [kat] SHA2-512-ACC
848,723 UART: [kat] ECC-384
3,291,978 UART: [kat] HMAC-384Kdf
3,305,029 UART: [kat] LMS
3,836,843 UART: [kat] --
3,841,850 UART: [cold-reset] ++
3,843,639 UART: [fht] FHT @ 0x50003400
3,855,678 UART: [idev] ++
3,856,388 UART: [idev] CDI.KEYID = 6
3,857,444 UART: [idev] SUBJECT.KEYID = 7
3,858,544 UART: [idev] UDS.KEYID = 0
3,859,466 ready_for_fw is high
3,859,680 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,959,649 UART: [idev] Erasing UDS.KEYID = 0
6,336,609 UART: [idev] Sha1 KeyId Algorithm
6,358,226 UART: [idev] --
6,363,567 UART: [ldev] ++
6,364,241 UART: [ldev] CDI.KEYID = 6
6,365,144 UART: [ldev] SUBJECT.KEYID = 5
6,366,353 UART: [ldev] AUTHORITY.KEYID = 7
6,367,534 UART: [ldev] FE.KEYID = 1
6,379,091 UART: [ldev] Erasing FE.KEYID = 1
8,860,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,201 UART: [ldev] --
10,648,094 UART: [fwproc] Wait for Commands...
10,650,673 UART: [fwproc] Recv command 0x46574c44
10,652,924 UART: [fwproc] Recv'd Img size: 79496 bytes
13,676,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,746,808 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,870,398 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
14,196,366 >>> mbox cmd response: success
14,196,787 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,200,677 UART: [afmc] ++
14,201,422 UART: [afmc] CDI.KEYID = 6
14,202,605 UART: [afmc] SUBJECT.KEYID = 7
14,204,094 UART: [afmc] AUTHORITY.KEYID = 5
16,704,579 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,424,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,426,483 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,441,572 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,456,745 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,471,586 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,495,786 UART: [afmc] --
18,498,964 UART: [cold-reset] --
18,504,234 UART: [state] Locking Datavault
18,509,216 UART: [state] Locking PCR0, PCR1 and PCR31
18,511,352 UART: [state] Locking ICCM
18,514,426 UART: [exit] Launching FMC @ 0x40000130
18,523,109 UART:
18,523,341 UART: Running Caliptra FMC ...
18,524,363 UART:
18,524,507 UART: [state] CFI Enabled
18,532,819 UART: [fht] FMC Alias Private Key: 7
20,299,285 UART: [art] Extend RT PCRs Done
20,300,502 UART: [art] Lock RT PCRs Done
20,302,423 UART: [art] Populate DV Done
20,307,887 UART: [fht] FMC Alias Private Key: 7
20,309,528 UART: [art] Derive CDI
20,310,340 UART: [art] Store in slot 0x4
20,353,106 UART: [art] Derive Key Pair
20,354,145 UART: [art] Store priv key in slot 0x5
22,781,088 UART: [art] Derive Key Pair - Done
22,794,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,500,714 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,208 UART: [art] PUB.X = 3BDA389207F59EDB2D48326891ABFC18F7E2EA44936D74B9125759327EB1A64EB96E700DFB0D666E3BD19A83B1A220F8
24,509,448 UART: [art] PUB.Y = BB8AC39E9EC8738CDD7FB83850D55489C5FEC35B7CDA4747CF0188D535C578F60CF6D2404491B2982DC24933FC578B40
24,516,751 UART: [art] SIG.R = E0F3A45E6334F554426B67A2B7441DE8909FBDCE89A81C6A1316670647BB2C047031817150086E0561B4267F06BB98FD
24,524,101 UART: [art] SIG.S = 9555AA0FF76E27C2BD206EA1EBDA129AB4BDBF90E765E9F86A10B0F2D68B7C9A76DF15A4D847338DDE7C6E29C89394F0
25,502,517 UART: mock_rt_interact::rt_entry...FMC Tester
25,634,047 UART: [rt] Runtime listening for mailbox commands...
25,638,338 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
3,758,197 ready_for_fw is high
3,758,789 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
14,212,534 >>> mbox cmd response: success
14,213,289 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,459,631 UART:
18,460,001 UART: Running Caliptra FMC ...
18,461,207 UART:
18,461,359 UART: [state] CFI Enabled
18,469,583 UART: [fht] FMC Alias Private Key: 7
20,235,847 UART: [art] Extend RT PCRs Done
20,237,071 UART: [art] Lock RT PCRs Done
20,238,831 UART: [art] Populate DV Done
20,244,145 UART: [fht] FMC Alias Private Key: 7
20,245,846 UART: [art] Derive CDI
20,246,659 UART: [art] Store in slot 0x4
20,289,689 UART: [art] Derive Key Pair
20,290,720 UART: [art] Store priv key in slot 0x5
22,717,194 UART: [art] Derive Key Pair - Done
22,730,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,436,789 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,290 UART: [art] PUB.X = 01ED9BFF93B400B06E18C33ABAEDD894DE6D71291BDB86DD14B233AC31457D772DB608B2CEB9154EC254AB61986754DF
24,445,573 UART: [art] PUB.Y = 83EF287BF9D30A032ABC58089FBF5AAFDFC1C74F7E3FABA3FC239BC84A5F4D5348CABB85EE9BCFD41C9DD01ED6B1F3A9
24,452,849 UART: [art] SIG.R = 5CCF0F82E43169242354FFB375E7DB9CD30CAFC9E294BCFC55C423F80731DB11F7022B2D8BA2EC1A9B87B978AE5D44BF
24,460,266 UART: [art] SIG.S = 79D8FEF3A3038CDB44480BC911128F6B91B25704E9DD6CD9189DC98935AF64B0455C872355A0FC4E0EBCE81C3FE2D080
25,438,387 UART: mock_rt_interact::rt_entry...FMC Tester
25,569,855 UART: [rt] Runtime listening for mailbox commands...
25,574,139 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,489 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,995 UART: [kat] SHA2-256
881,926 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,041 UART: [kat] ++
886,193 UART: [kat] sha1
890,457 UART: [kat] SHA2-256
892,395 UART: [kat] SHA2-384
895,100 UART: [kat] SHA2-512-ACC
897,001 UART: [kat] ECC-384
902,466 UART: [kat] HMAC-384Kdf
907,000 UART: [kat] LMS
1,475,196 UART: [kat] --
1,476,281 UART: [cold-reset] ++
1,476,767 UART: [fht] Storing FHT @ 0x50003400
1,479,670 UART: [idev] ++
1,479,838 UART: [idev] CDI.KEYID = 6
1,480,198 UART: [idev] SUBJECT.KEYID = 7
1,480,622 UART: [idev] UDS.KEYID = 0
1,480,967 ready_for_fw is high
1,480,967 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,488,752 UART: [idev] Erasing UDS.KEYID = 0
1,505,340 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,788 UART: [idev] --
1,514,965 UART: [ldev] ++
1,515,133 UART: [ldev] CDI.KEYID = 6
1,515,496 UART: [ldev] SUBJECT.KEYID = 5
1,515,922 UART: [ldev] AUTHORITY.KEYID = 7
1,516,385 UART: [ldev] FE.KEYID = 1
1,521,631 UART: [ldev] Erasing FE.KEYID = 1
1,547,112 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,322 UART: [ldev] --
1,586,717 UART: [fwproc] Waiting for Commands...
1,587,426 UART: [fwproc] Received command 0x46574c44
1,588,217 UART: [fwproc] Received Image of size 79496 bytes
2,486,566 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,513,998 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,545,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
2,626,927 >>> mbox cmd response: success
2,626,927 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,627,997 UART: [afmc] ++
2,628,165 UART: [afmc] CDI.KEYID = 6
2,628,527 UART: [afmc] SUBJECT.KEYID = 7
2,628,952 UART: [afmc] AUTHORITY.KEYID = 5
2,663,483 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,679,801 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,680,581 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,686,290 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,692,173 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,697,856 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,705,742 UART: [afmc] --
2,706,764 UART: [cold-reset] --
2,707,764 UART: [state] Locking Datavault
2,708,843 UART: [state] Locking PCR0, PCR1 and PCR31
2,709,447 UART: [state] Locking ICCM
2,709,869 UART: [exit] Launching FMC @ 0x40000130
2,715,199 UART:
2,715,215 UART: Running Caliptra FMC ...
2,715,623 UART:
2,715,677 UART: [state] CFI Enabled
2,726,461 UART: [fht] FMC Alias Private Key: 7
2,845,533 UART: [art] Extend RT PCRs Done
2,845,961 UART: [art] Lock RT PCRs Done
2,847,521 UART: [art] Populate DV Done
2,855,614 UART: [fht] FMC Alias Private Key: 7
2,856,614 UART: [art] Derive CDI
2,856,894 UART: [art] Store in slot 0x4
2,942,342 UART: [art] Derive Key Pair
2,942,702 UART: [art] Store priv key in slot 0x5
2,956,053 UART: [art] Derive Key Pair - Done
2,970,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,985,587 UART: [art] Erasing AUTHORITY.KEYID = 7
2,986,352 UART: [art] PUB.X = E37D44F01809B4710B60321E8732D25AB8804AB67A4488FBD81FA7DEAF3B450E8D0A673D705CC5334B3E9FBDB350EAA9
2,993,122 UART: [art] PUB.Y = 3519B916704EFA23622C3EE789525098CDE53F37D0CD9C9292390CE74F51510AA1AB2B4CCF2A37D9D334792219E0A6BB
3,000,070 UART: [art] SIG.R = 705E5D8545CBAD04EFD24A91AEBFA44852BCEF1014581D4535E981D85C456678E1317EEF7909DC9B0A7D2969E143FC26
3,006,839 UART: [art] SIG.S = F927596EFE69AB9ACA942963B9B270250DF985C0CC5FAB0D8835A87C762481A1268C04DDA491B38490A14E1B4BAFA630
3,030,856 UART: mock_rt_interact::rt_entry...FMC Tester
3,150,025 UART: [rt] Runtime listening for mailbox commands...
3,153,415 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,549 ready_for_fw is high
1,362,549 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,476,427 >>> mbox cmd response: success
2,476,427 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,537,956 UART:
2,537,972 UART: Running Caliptra FMC ...
2,538,380 UART:
2,538,434 UART: [state] CFI Enabled
2,549,114 UART: [fht] FMC Alias Private Key: 7
2,668,626 UART: [art] Extend RT PCRs Done
2,669,054 UART: [art] Lock RT PCRs Done
2,670,584 UART: [art] Populate DV Done
2,678,713 UART: [fht] FMC Alias Private Key: 7
2,679,775 UART: [art] Derive CDI
2,680,055 UART: [art] Store in slot 0x4
2,765,909 UART: [art] Derive Key Pair
2,766,269 UART: [art] Store priv key in slot 0x5
2,779,184 UART: [art] Derive Key Pair - Done
2,793,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,809,095 UART: [art] Erasing AUTHORITY.KEYID = 7
2,809,860 UART: [art] PUB.X = 4B7058C72798A734E9256177F9E0041244AA966F3C083372F13C58C2809EA0719FF71C3E14E7D7B9680C30340D96B717
2,816,606 UART: [art] PUB.Y = B37F067FB04AA35BD432BD6C0C7730F1EFACC9ACD55FABCF8C24182EB3D1E2F020E63DD21E2C7D6895FC46D6D774A66C
2,823,576 UART: [art] SIG.R = FE023C79BFB216A344A299178B0E4846467C0E31CCC5C4D2729FD7BD227951496812BA0FCBB4B4358AC099B727BC1CF7
2,830,342 UART: [art] SIG.S = 9E848F8C762107A04668B3D05BCF39118686A9E00B9EB8762820025443ABC37F3FFC4F1ABA13B73A02265CCC71F51986
2,854,158 UART: mock_rt_interact::rt_entry...FMC Tester
2,974,584 UART: [rt] Runtime listening for mailbox commands...
2,977,974 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,340 UART: [kat] SHA2-256
882,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,386 UART: [kat] ++
886,538 UART: [kat] sha1
890,580 UART: [kat] SHA2-256
892,518 UART: [kat] SHA2-384
895,179 UART: [kat] SHA2-512-ACC
897,080 UART: [kat] ECC-384
902,577 UART: [kat] HMAC-384Kdf
907,197 UART: [kat] LMS
1,475,393 UART: [kat] --
1,476,218 UART: [cold-reset] ++
1,476,736 UART: [fht] Storing FHT @ 0x50003400
1,479,557 UART: [idev] ++
1,479,725 UART: [idev] CDI.KEYID = 6
1,480,085 UART: [idev] SUBJECT.KEYID = 7
1,480,509 UART: [idev] UDS.KEYID = 0
1,480,854 ready_for_fw is high
1,480,854 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,488,737 UART: [idev] Erasing UDS.KEYID = 0
1,505,387 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,011 UART: [idev] --
1,515,252 UART: [ldev] ++
1,515,420 UART: [ldev] CDI.KEYID = 6
1,515,783 UART: [ldev] SUBJECT.KEYID = 5
1,516,209 UART: [ldev] AUTHORITY.KEYID = 7
1,516,672 UART: [ldev] FE.KEYID = 1
1,521,758 UART: [ldev] Erasing FE.KEYID = 1
1,546,567 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,595 UART: [ldev] --
1,585,884 UART: [fwproc] Waiting for Commands...
1,586,643 UART: [fwproc] Received command 0x46574c44
1,587,434 UART: [fwproc] Received Image of size 79496 bytes
2,484,693 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,511,839 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,543,057 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
2,624,800 >>> mbox cmd response: success
2,624,800 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,625,876 UART: [afmc] ++
2,626,044 UART: [afmc] CDI.KEYID = 6
2,626,406 UART: [afmc] SUBJECT.KEYID = 7
2,626,831 UART: [afmc] AUTHORITY.KEYID = 5
2,661,652 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,678,310 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,679,090 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,684,799 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,690,682 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,696,365 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,704,189 UART: [afmc] --
2,705,253 UART: [cold-reset] --
2,706,089 UART: [state] Locking Datavault
2,707,334 UART: [state] Locking PCR0, PCR1 and PCR31
2,707,938 UART: [state] Locking ICCM
2,708,558 UART: [exit] Launching FMC @ 0x40000130
2,713,888 UART:
2,713,904 UART: Running Caliptra FMC ...
2,714,312 UART:
2,714,455 UART: [state] CFI Enabled
2,725,089 UART: [fht] FMC Alias Private Key: 7
2,843,659 UART: [art] Extend RT PCRs Done
2,844,087 UART: [art] Lock RT PCRs Done
2,845,679 UART: [art] Populate DV Done
2,854,246 UART: [fht] FMC Alias Private Key: 7
2,855,230 UART: [art] Derive CDI
2,855,510 UART: [art] Store in slot 0x4
2,941,724 UART: [art] Derive Key Pair
2,942,084 UART: [art] Store priv key in slot 0x5
2,955,733 UART: [art] Derive Key Pair - Done
2,970,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,985,898 UART: [art] Erasing AUTHORITY.KEYID = 7
2,986,663 UART: [art] PUB.X = 06266676121F596148EE91A00547B8EDC5BA5281F754886A65A44A31822E00E5D7863CD952FAB021A490AC3C0ABE64F1
2,993,400 UART: [art] PUB.Y = 21FB0A425E3B8F91DC1F89B5CB99DA5CBDE4F87BB0667150BE2FE3BF14427C00217E5180430A3A9FB6324B57432EE58B
3,000,334 UART: [art] SIG.R = 61A5DFB7D3019F9673DA06CF21E6433FCBABA90F5E63AB5126130DA6BC32913A5A2D665995E52FD5C1766D53042E355D
3,007,097 UART: [art] SIG.S = 40697F718CBA3E8EA9C0DCEAED94A5EF1E17BC50298A98C30F2D19F2C2658C0322AE080B5CF927BDE9315A27872C6439
3,030,581 UART: mock_rt_interact::rt_entry...FMC Tester
3,150,217 UART: [rt] Runtime listening for mailbox commands...
3,153,607 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,680 ready_for_fw is high
1,362,680 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,475,924 >>> mbox cmd response: success
2,475,924 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,537,043 UART:
2,537,059 UART: Running Caliptra FMC ...
2,537,467 UART:
2,537,610 UART: [state] CFI Enabled
2,548,242 UART: [fht] FMC Alias Private Key: 7
2,666,454 UART: [art] Extend RT PCRs Done
2,666,882 UART: [art] Lock RT PCRs Done
2,668,614 UART: [art] Populate DV Done
2,676,529 UART: [fht] FMC Alias Private Key: 7
2,677,627 UART: [art] Derive CDI
2,677,907 UART: [art] Store in slot 0x4
2,763,615 UART: [art] Derive Key Pair
2,763,975 UART: [art] Store priv key in slot 0x5
2,776,990 UART: [art] Derive Key Pair - Done
2,791,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,807,642 UART: [art] Erasing AUTHORITY.KEYID = 7
2,808,407 UART: [art] PUB.X = 5486DA6B29F1F7B2D36242194431CEC68B73A12B2F48934649925FFD32E3A67AB4413CBE83E10598A8A516FF230AC2AE
2,815,175 UART: [art] PUB.Y = 78CF6484C7423682BFCE20837E1C63F6900613AAC5212BF58C147B7DB55D9F5D320FC5B7ACC73A43D9B6AF9690C8B9E8
2,822,129 UART: [art] SIG.R = 1CAC34CFE190D25CCB50FBF417A2FF09C3350D54137D5BD9D0E45BC88FAED2480752F3F99CBF15B6F1043358DFC050DD
2,828,907 UART: [art] SIG.S = 75BC96FCCACA026FD28882D69F65A51EA7A7B62751508CEC9DA59A5C3AEFA9388826CC52BA192477DED9E1B8C8209254
2,852,730 UART: mock_rt_interact::rt_entry...FMC Tester
2,973,128 UART: [rt] Runtime listening for mailbox commands...
2,976,518 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,626 UART: [state] LifecycleState = Unprovisioned
85,281 UART: [state] DebugLocked = No
85,805 UART: [state] WD Timer not started. Device not locked for debugging
87,012 UART: [kat] SHA2-256
890,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,666 UART: [kat] ++
894,818 UART: [kat] sha1
899,056 UART: [kat] SHA2-256
900,996 UART: [kat] SHA2-384
903,611 UART: [kat] SHA2-512-ACC
905,512 UART: [kat] ECC-384
915,339 UART: [kat] HMAC-384Kdf
919,995 UART: [kat] LMS
1,168,307 UART: [kat] --
1,169,472 UART: [cold-reset] ++
1,169,856 UART: [fht] FHT @ 0x50003400
1,172,570 UART: [idev] ++
1,172,738 UART: [idev] CDI.KEYID = 6
1,173,099 UART: [idev] SUBJECT.KEYID = 7
1,173,524 UART: [idev] UDS.KEYID = 0
1,173,870 ready_for_fw is high
1,173,870 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,181,443 UART: [idev] Erasing UDS.KEYID = 0
1,198,645 UART: [idev] Sha1 KeyId Algorithm
1,207,449 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,215,048 UART: [ldev] Erasing FE.KEYID = 1
1,240,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,958 UART: [ldev] --
1,280,269 UART: [fwproc] Wait for Commands...
1,280,974 UART: [fwproc] Recv command 0x46574c44
1,281,707 UART: [fwproc] Recv'd Img size: 79496 bytes
2,178,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,206,296 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,237,471 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,319,270 >>> mbox cmd response: success
2,319,270 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,320,332 UART: [afmc] ++
2,320,500 UART: [afmc] CDI.KEYID = 6
2,320,863 UART: [afmc] SUBJECT.KEYID = 7
2,321,289 UART: [afmc] AUTHORITY.KEYID = 5
2,355,958 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,372,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,373,206 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,378,916 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,384,797 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,390,498 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,398,103 UART: [afmc] --
2,399,034 UART: [cold-reset] --
2,399,870 UART: [state] Locking Datavault
2,400,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,401,487 UART: [state] Locking ICCM
2,402,119 UART: [exit] Launching FMC @ 0x40000130
2,407,449 UART:
2,407,465 UART: Running Caliptra FMC ...
2,407,873 UART:
2,407,927 UART: [state] CFI Enabled
2,418,523 UART: [fht] FMC Alias Private Key: 7
2,536,761 UART: [art] Extend RT PCRs Done
2,537,189 UART: [art] Lock RT PCRs Done
2,538,647 UART: [art] Populate DV Done
2,546,938 UART: [fht] FMC Alias Private Key: 7
2,547,882 UART: [art] Derive CDI
2,548,162 UART: [art] Store in slot 0x4
2,633,773 UART: [art] Derive Key Pair
2,634,133 UART: [art] Store priv key in slot 0x5
2,647,177 UART: [art] Derive Key Pair - Done
2,661,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,677,305 UART: [art] Erasing AUTHORITY.KEYID = 7
2,678,070 UART: [art] PUB.X = 310A2FD571BA0DB7679A6193187E6FECAFC257EEC989690C951E2D79ED85633F8F9D0997086A8568C83E6A10EE456737
2,684,827 UART: [art] PUB.Y = 8294BC2706E943EEE3369207DDF8758B7CF9D6273E40A52FE993B98D13EBDD739B80D9FDFC76C415755E7BC588C064DF
2,691,781 UART: [art] SIG.R = AA01EE5970F7857F34595F1AB2D851B1BE908A53F013C4CAC5E933D7527A3EF685DD1AB3F718637C6E63552CA59645A8
2,698,554 UART: [art] SIG.S = 125254CCA47946F736D6611925ECCF587DD6623AF3CB8DE49CE9671B97959CBFAA3A847A03F605623378A9897325ADC8
2,722,158 UART: mock_rt_interact::rt_entry...FMC Tester
2,841,048 UART: [rt] Runtime listening for mailbox commands...
2,844,438 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,600 ready_for_fw is high
1,058,600 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,172,421 >>> mbox cmd response: success
2,172,421 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,235,324 UART:
2,235,340 UART: Running Caliptra FMC ...
2,235,748 UART:
2,235,802 UART: [state] CFI Enabled
2,246,406 UART: [fht] FMC Alias Private Key: 7
2,365,450 UART: [art] Extend RT PCRs Done
2,365,878 UART: [art] Lock RT PCRs Done
2,367,372 UART: [art] Populate DV Done
2,375,403 UART: [fht] FMC Alias Private Key: 7
2,376,493 UART: [art] Derive CDI
2,376,773 UART: [art] Store in slot 0x4
2,462,838 UART: [art] Derive Key Pair
2,463,198 UART: [art] Store priv key in slot 0x5
2,476,154 UART: [art] Derive Key Pair - Done
2,490,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,506,104 UART: [art] Erasing AUTHORITY.KEYID = 7
2,506,869 UART: [art] PUB.X = 32596666C3E6AA3955368AD0894246036375D4BB75EADE1E0367406478BC9A0F01CCE960EF655803C0DD4E03AD0441E8
2,513,616 UART: [art] PUB.Y = 1D3CD3588B996EDCC70B0C841CFFCB500151ECBF3B94C1B98D39BFB274204198A6F035C4D0914CEE825DB132C276F2A7
2,520,571 UART: [art] SIG.R = 3D3ED88EE7468D86DCBB7EB0B884204FD79D5F223972A90D050AC7AA42A38F6E3FFC6D12F46B34C9AD1FEA45A4A97C75
2,527,352 UART: [art] SIG.S = 43E606973F8FA7D5379278626580C02C4A542A4F5F58DA60F2C39443EAE1977EF08837B55E6D43443028308BEFB3D043
2,551,165 UART: mock_rt_interact::rt_entry...FMC Tester
2,670,528 UART: [rt] Runtime listening for mailbox commands...
2,673,918 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,945 UART: [state] LifecycleState = Unprovisioned
85,600 UART: [state] DebugLocked = No
86,104 UART: [state] WD Timer not started. Device not locked for debugging
87,247 UART: [kat] SHA2-256
890,797 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,901 UART: [kat] ++
895,053 UART: [kat] sha1
899,227 UART: [kat] SHA2-256
901,167 UART: [kat] SHA2-384
904,054 UART: [kat] SHA2-512-ACC
905,955 UART: [kat] ECC-384
915,504 UART: [kat] HMAC-384Kdf
920,108 UART: [kat] LMS
1,168,420 UART: [kat] --
1,169,139 UART: [cold-reset] ++
1,169,527 UART: [fht] FHT @ 0x50003400
1,172,079 UART: [idev] ++
1,172,247 UART: [idev] CDI.KEYID = 6
1,172,608 UART: [idev] SUBJECT.KEYID = 7
1,173,033 UART: [idev] UDS.KEYID = 0
1,173,379 ready_for_fw is high
1,173,379 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,181,028 UART: [idev] Erasing UDS.KEYID = 0
1,198,134 UART: [idev] Sha1 KeyId Algorithm
1,206,948 UART: [idev] --
1,208,115 UART: [ldev] ++
1,208,283 UART: [ldev] CDI.KEYID = 6
1,208,647 UART: [ldev] SUBJECT.KEYID = 5
1,209,074 UART: [ldev] AUTHORITY.KEYID = 7
1,209,537 UART: [ldev] FE.KEYID = 1
1,215,097 UART: [ldev] Erasing FE.KEYID = 1
1,241,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,811 UART: [ldev] --
1,281,072 UART: [fwproc] Wait for Commands...
1,281,865 UART: [fwproc] Recv command 0x46574c44
1,282,598 UART: [fwproc] Recv'd Img size: 79496 bytes
2,180,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,208,239 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,239,414 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,321,099 >>> mbox cmd response: success
2,321,099 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,322,309 UART: [afmc] ++
2,322,477 UART: [afmc] CDI.KEYID = 6
2,322,840 UART: [afmc] SUBJECT.KEYID = 7
2,323,266 UART: [afmc] AUTHORITY.KEYID = 5
2,359,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,375,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,376,143 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,381,853 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,387,734 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,393,435 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,401,056 UART: [afmc] --
2,401,937 UART: [cold-reset] --
2,402,831 UART: [state] Locking Datavault
2,404,166 UART: [state] Locking PCR0, PCR1 and PCR31
2,404,770 UART: [state] Locking ICCM
2,405,444 UART: [exit] Launching FMC @ 0x40000130
2,410,774 UART:
2,410,790 UART: Running Caliptra FMC ...
2,411,198 UART:
2,411,341 UART: [state] CFI Enabled
2,421,879 UART: [fht] FMC Alias Private Key: 7
2,541,107 UART: [art] Extend RT PCRs Done
2,541,535 UART: [art] Lock RT PCRs Done
2,543,143 UART: [art] Populate DV Done
2,551,180 UART: [fht] FMC Alias Private Key: 7
2,552,286 UART: [art] Derive CDI
2,552,566 UART: [art] Store in slot 0x4
2,638,381 UART: [art] Derive Key Pair
2,638,741 UART: [art] Store priv key in slot 0x5
2,652,889 UART: [art] Derive Key Pair - Done
2,667,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,682,970 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,735 UART: [art] PUB.X = 4A66ECD8BD61C7861B9EEA3AD81B6315A5BCBA02EB99F3671C4979F571E983904505B5CAD29160B91608BE4B8045FC82
2,690,504 UART: [art] PUB.Y = 4EF1CE949CB36ADAC36D1CB0CE5EEA8A0B64173C258BFA916F9454AF8262370E9F963F37C4E0B092A77BC252ACC1E986
2,697,466 UART: [art] SIG.R = 1C5927F50ABC9600B81C2D3A3754C5CFC854D6A4C1A861209692285186B8294C8E1EB5FDFF92762D95D5F300C14D3905
2,704,186 UART: [art] SIG.S = 3ACC78E0A456E68366B097D067B3D076A863A34686AFEDDB91432E08B3DF1D5B03A82D46FC5BBA50C6364E6A47F65AD5
2,728,262 UART: mock_rt_interact::rt_entry...FMC Tester
2,847,307 UART: [rt] Runtime listening for mailbox commands...
2,850,697 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,663 ready_for_fw is high
1,059,663 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,175,684 >>> mbox cmd response: success
2,175,684 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,237,217 UART:
2,237,233 UART: Running Caliptra FMC ...
2,237,641 UART:
2,237,784 UART: [state] CFI Enabled
2,248,320 UART: [fht] FMC Alias Private Key: 7
2,366,628 UART: [art] Extend RT PCRs Done
2,367,056 UART: [art] Lock RT PCRs Done
2,368,872 UART: [art] Populate DV Done
2,377,073 UART: [fht] FMC Alias Private Key: 7
2,378,105 UART: [art] Derive CDI
2,378,385 UART: [art] Store in slot 0x4
2,464,100 UART: [art] Derive Key Pair
2,464,460 UART: [art] Store priv key in slot 0x5
2,478,008 UART: [art] Derive Key Pair - Done
2,493,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,508,667 UART: [art] Erasing AUTHORITY.KEYID = 7
2,509,432 UART: [art] PUB.X = 8D18DB116952D670F9B47810531BEAF399D9B2CF7C92B25A1DF06B244A1B22CB18749E0A4F42BAAF882E6B2973C60180
2,516,202 UART: [art] PUB.Y = B2226DBF593E4B8357639E2D195FBB560176F66E65F7AAE73689870F14FEC9F949D4AA388B8841393F995D8A9CFA6ACC
2,523,154 UART: [art] SIG.R = 002D97C453FC78FF3846934AD3313E6B502CBFC4B3249BC427CA6CB2D2746FEF46D2F3959B4BD1F03B716A1B1EDD79A1
2,529,916 UART: [art] SIG.S = EA03820462701129E0F720BD75C9CDDDC8DA8FDBAC9BA991B5D17ED359F12E09A91A42918BDE539ED9D69F84F54C4265
2,553,557 UART: mock_rt_interact::rt_entry...FMC Tester
2,671,803 UART: [rt] Runtime listening for mailbox commands...
2,675,193 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
893,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,341 UART: [kat] ++
897,493 UART: [kat] sha1
901,527 UART: [kat] SHA2-256
903,467 UART: [kat] SHA2-384
906,352 UART: [kat] SHA2-512-ACC
908,253 UART: [kat] ECC-384
917,964 UART: [kat] HMAC-384Kdf
922,394 UART: [kat] LMS
1,170,722 UART: [kat] --
1,171,733 UART: [cold-reset] ++
1,172,261 UART: [fht] FHT @ 0x50003400
1,174,976 UART: [idev] ++
1,175,144 UART: [idev] CDI.KEYID = 6
1,175,504 UART: [idev] SUBJECT.KEYID = 7
1,175,928 UART: [idev] UDS.KEYID = 0
1,176,273 ready_for_fw is high
1,176,273 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,184,184 UART: [idev] Erasing UDS.KEYID = 0
1,201,141 UART: [idev] Sha1 KeyId Algorithm
1,209,585 UART: [idev] --
1,210,561 UART: [ldev] ++
1,210,729 UART: [ldev] CDI.KEYID = 6
1,211,092 UART: [ldev] SUBJECT.KEYID = 5
1,211,518 UART: [ldev] AUTHORITY.KEYID = 7
1,211,981 UART: [ldev] FE.KEYID = 1
1,217,223 UART: [ldev] Erasing FE.KEYID = 1
1,243,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,027 UART: [ldev] --
1,282,436 UART: [fwproc] Wait for Commands...
1,283,054 UART: [fwproc] Recv command 0x46574c44
1,283,782 UART: [fwproc] Recv'd Img size: 79496 bytes
2,181,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,208,962 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,240,132 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,321,735 >>> mbox cmd response: success
2,321,735 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,322,787 UART: [afmc] ++
2,322,955 UART: [afmc] CDI.KEYID = 6
2,323,317 UART: [afmc] SUBJECT.KEYID = 7
2,323,742 UART: [afmc] AUTHORITY.KEYID = 5
2,359,457 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,376,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,376,756 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,382,465 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,388,348 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,394,049 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,401,771 UART: [afmc] --
2,402,695 UART: [cold-reset] --
2,403,293 UART: [state] Locking Datavault
2,404,274 UART: [state] Locking PCR0, PCR1 and PCR31
2,404,878 UART: [state] Locking ICCM
2,405,304 UART: [exit] Launching FMC @ 0x40000130
2,410,634 UART:
2,410,650 UART: Running Caliptra FMC ...
2,411,058 UART:
2,411,112 UART: [state] CFI Enabled
2,421,532 UART: [fht] FMC Alias Private Key: 7
2,540,072 UART: [art] Extend RT PCRs Done
2,540,500 UART: [art] Lock RT PCRs Done
2,542,120 UART: [art] Populate DV Done
2,550,539 UART: [fht] FMC Alias Private Key: 7
2,551,695 UART: [art] Derive CDI
2,551,975 UART: [art] Store in slot 0x4
2,638,132 UART: [art] Derive Key Pair
2,638,492 UART: [art] Store priv key in slot 0x5
2,651,944 UART: [art] Derive Key Pair - Done
2,666,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,682,618 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,383 UART: [art] PUB.X = ECD5E7151148F2FC66BA608DCF43DDA92B54995E4322231EAE3D6CA81394D634A44ACF0E49670A558A7BABF515CC774B
2,690,161 UART: [art] PUB.Y = 76B33C87505472BA44A2A0F4155A421069B5B2E24AAD14218BF7B65955F289B6B8D40CF358AD662FD459A530B2D7564A
2,697,108 UART: [art] SIG.R = B21D3F20007DF5CC50DE004BAA823DDD57CEAA0B1A9ABFB5D1217DF0F5DD238F79F1114F4B0F3B51F536D2E5530C1533
2,703,845 UART: [art] SIG.S = 089B37B504D5FFD884D0ACE29575B2B28819F138210D681AC6AC2CDFC1E68B5991E20719FD41E68E74F667DE7FD2DEEF
2,726,941 UART: mock_rt_interact::rt_entry...FMC Tester
2,845,635 UART: [rt] Runtime listening for mailbox commands...
2,849,025 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,125 ready_for_fw is high
1,060,125 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,172,591 >>> mbox cmd response: success
2,172,591 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,234,240 UART:
2,234,256 UART: Running Caliptra FMC ...
2,234,664 UART:
2,234,718 UART: [state] CFI Enabled
2,244,986 UART: [fht] FMC Alias Private Key: 7
2,363,514 UART: [art] Extend RT PCRs Done
2,363,942 UART: [art] Lock RT PCRs Done
2,365,378 UART: [art] Populate DV Done
2,373,445 UART: [fht] FMC Alias Private Key: 7
2,374,597 UART: [art] Derive CDI
2,374,877 UART: [art] Store in slot 0x4
2,460,860 UART: [art] Derive Key Pair
2,461,220 UART: [art] Store priv key in slot 0x5
2,473,858 UART: [art] Derive Key Pair - Done
2,488,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,504,047 UART: [art] Erasing AUTHORITY.KEYID = 7
2,504,812 UART: [art] PUB.X = A12361172F7F786D17FD41F23CAACFC73722D12C8481AB2C1EE505578DDAA6F8CD63ECE31BC7AFA6C81AAB653C0ED2B6
2,511,600 UART: [art] PUB.Y = 7F3A22FDD8D57113707C3C782648737AB0E1E37AAD1F18874AEEFFC90B9A67AEED7BAD65C7813A992DB48D7C1169512B
2,518,561 UART: [art] SIG.R = 46358DE89024C4C434BEACF4547557D67884E617A2132B40ECC804C528A69E474BF78055A9F943B907D263E6936B2F15
2,525,319 UART: [art] SIG.S = C837CC6CF4D8CCDF73609759FCCE46A14337D1790B881BB34176C1B92A1BC89E08292DF9C85EA2ADCD15E9A08A09C130
2,549,114 UART: mock_rt_interact::rt_entry...FMC Tester
2,668,218 UART: [rt] Runtime listening for mailbox commands...
2,671,608 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
87,106 UART: [state] WD Timer not started. Device not locked for debugging
88,351 UART: [kat] SHA2-256
894,001 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,126 UART: [kat] ++
898,278 UART: [kat] sha1
902,566 UART: [kat] SHA2-256
904,506 UART: [kat] SHA2-384
907,299 UART: [kat] SHA2-512-ACC
909,200 UART: [kat] ECC-384
918,469 UART: [kat] HMAC-384Kdf
923,183 UART: [kat] LMS
1,171,511 UART: [kat] --
1,172,038 UART: [cold-reset] ++
1,172,428 UART: [fht] FHT @ 0x50003400
1,175,283 UART: [idev] ++
1,175,451 UART: [idev] CDI.KEYID = 6
1,175,811 UART: [idev] SUBJECT.KEYID = 7
1,176,235 UART: [idev] UDS.KEYID = 0
1,176,580 ready_for_fw is high
1,176,580 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,184,357 UART: [idev] Erasing UDS.KEYID = 0
1,201,558 UART: [idev] Sha1 KeyId Algorithm
1,209,944 UART: [idev] --
1,211,138 UART: [ldev] ++
1,211,306 UART: [ldev] CDI.KEYID = 6
1,211,669 UART: [ldev] SUBJECT.KEYID = 5
1,212,095 UART: [ldev] AUTHORITY.KEYID = 7
1,212,558 UART: [ldev] FE.KEYID = 1
1,217,660 UART: [ldev] Erasing FE.KEYID = 1
1,243,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,614 UART: [ldev] --
1,282,917 UART: [fwproc] Wait for Commands...
1,283,637 UART: [fwproc] Recv command 0x46574c44
1,284,365 UART: [fwproc] Recv'd Img size: 79496 bytes
2,181,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,208,022 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,239,192 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,320,829 >>> mbox cmd response: success
2,320,829 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,322,031 UART: [afmc] ++
2,322,199 UART: [afmc] CDI.KEYID = 6
2,322,561 UART: [afmc] SUBJECT.KEYID = 7
2,322,986 UART: [afmc] AUTHORITY.KEYID = 5
2,358,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,374,546 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,375,294 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,381,003 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,386,886 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,392,587 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,400,569 UART: [afmc] --
2,401,537 UART: [cold-reset] --
2,402,287 UART: [state] Locking Datavault
2,403,580 UART: [state] Locking PCR0, PCR1 and PCR31
2,404,184 UART: [state] Locking ICCM
2,404,820 UART: [exit] Launching FMC @ 0x40000130
2,410,150 UART:
2,410,166 UART: Running Caliptra FMC ...
2,410,574 UART:
2,410,717 UART: [state] CFI Enabled
2,421,279 UART: [fht] FMC Alias Private Key: 7
2,539,835 UART: [art] Extend RT PCRs Done
2,540,263 UART: [art] Lock RT PCRs Done
2,541,909 UART: [art] Populate DV Done
2,550,224 UART: [fht] FMC Alias Private Key: 7
2,551,264 UART: [art] Derive CDI
2,551,544 UART: [art] Store in slot 0x4
2,637,239 UART: [art] Derive Key Pair
2,637,599 UART: [art] Store priv key in slot 0x5
2,650,869 UART: [art] Derive Key Pair - Done
2,665,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,680,897 UART: [art] Erasing AUTHORITY.KEYID = 7
2,681,662 UART: [art] PUB.X = 078DC33E80753395458F10D6C203555B8ED0DC1E50A1B7662B9C62961EBA5727BA3EDE33B27BAE8F862B6A6AFE73A073
2,688,434 UART: [art] PUB.Y = E2D69969CF0EF5BFBF14D6B549D00EC40A898E70E296397A0F3D0BA157B6AB5604F06096FB394349B09072117E60C459
2,695,368 UART: [art] SIG.R = 0C9016338155BFC9EF76C5CE2FC7CA61FB583CA9B76FFB4A9B6523C99C1C393FDCEB4832F20577EE5BE3E290D8178DA5
2,702,150 UART: [art] SIG.S = 373AD6A26D2B48ADC6D76E17DD78DC92D7B599F2664B543A681C80335AA0848751013F369FDE446392E78AB2E7F1FE5F
2,725,949 UART: mock_rt_interact::rt_entry...FMC Tester
2,844,840 UART: [rt] Runtime listening for mailbox commands...
2,848,230 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,472 ready_for_fw is high
1,059,472 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,172,590 >>> mbox cmd response: success
2,172,590 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,235,325 UART:
2,235,341 UART: Running Caliptra FMC ...
2,235,749 UART:
2,235,892 UART: [state] CFI Enabled
2,246,730 UART: [fht] FMC Alias Private Key: 7
2,365,854 UART: [art] Extend RT PCRs Done
2,366,282 UART: [art] Lock RT PCRs Done
2,367,842 UART: [art] Populate DV Done
2,376,095 UART: [fht] FMC Alias Private Key: 7
2,377,275 UART: [art] Derive CDI
2,377,555 UART: [art] Store in slot 0x4
2,462,928 UART: [art] Derive Key Pair
2,463,288 UART: [art] Store priv key in slot 0x5
2,476,492 UART: [art] Derive Key Pair - Done
2,491,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,506,623 UART: [art] Erasing AUTHORITY.KEYID = 7
2,507,388 UART: [art] PUB.X = F9C32A201D66836B19AFC346B6B36A675188EF49B3D97D800293466B385F4B557B5824C8ECBA2D484DC1971B1C0DB38F
2,514,156 UART: [art] PUB.Y = 58939F6D0D106D9394CEEB9944B240720650C57D831D19EB19F1659D412A13A383CD19DCA6A5262BB6FB3567C36BB4BB
2,521,104 UART: [art] SIG.R = D8E88716A6B874F2FE2DB8EE0ED1D5C4A13B2078A1A42EBF081872FED5911AB46B7DFF46FADF21F5444503645B058FCB
2,527,880 UART: [art] SIG.S = 7AF557B530B94EA8E176FA3E393BD8BC78428EC00C9E4868F335F1A887CC6659CDEAF5C720302D298BC316FED92BC5DA
2,551,631 UART: mock_rt_interact::rt_entry...FMC Tester
2,670,857 UART: [rt] Runtime listening for mailbox commands...
2,674,247 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,027 UART:
192,397 UART: Running Caliptra ROM ...
193,486 UART:
193,625 UART: [state] CFI Enabled
264,113 UART: [state] LifecycleState = Unprovisioned
266,046 UART: [state] DebugLocked = No
268,979 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,076 UART: [kat] SHA2-256
442,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,321 UART: [kat] ++
453,787 UART: [kat] sha1
464,657 UART: [kat] SHA2-256
467,382 UART: [kat] SHA2-384
472,587 UART: [kat] SHA2-512-ACC
474,951 UART: [kat] ECC-384
2,768,382 UART: [kat] HMAC-384Kdf
2,799,658 UART: [kat] LMS
3,989,910 UART: [kat] --
3,991,707 UART: [cold-reset] ++
3,993,493 UART: [fht] Storing FHT @ 0x50003400
4,005,249 UART: [idev] ++
4,005,824 UART: [idev] CDI.KEYID = 6
4,006,862 UART: [idev] SUBJECT.KEYID = 7
4,008,037 UART: [idev] UDS.KEYID = 0
4,009,071 ready_for_fw is high
4,009,275 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,109,406 UART: [idev] Erasing UDS.KEYID = 0
7,344,594 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,045 UART: [idev] --
7,371,469 UART: [ldev] ++
7,372,031 UART: [ldev] CDI.KEYID = 6
7,372,964 UART: [ldev] SUBJECT.KEYID = 5
7,374,222 UART: [ldev] AUTHORITY.KEYID = 7
7,375,410 UART: [ldev] FE.KEYID = 1
7,420,454 UART: [ldev] Erasing FE.KEYID = 1
10,752,989 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,996 UART: [ldev] --
13,113,877 UART: [fwproc] Waiting for Commands...
13,117,119 UART: [fwproc] Received command 0x46574c44
13,119,301 UART: [fwproc] Received Image of size 79496 bytes
16,747,767 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,823,162 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,896,339 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
17,087,452 >>> mbox cmd response: success
17,087,942 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,091,841 UART: [afmc] ++
17,092,421 UART: [afmc] CDI.KEYID = 6
17,093,333 UART: [afmc] SUBJECT.KEYID = 7
17,094,603 UART: [afmc] AUTHORITY.KEYID = 5
20,449,353 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,748,521 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,750,826 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,765,241 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,779,994 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,794,383 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,814,985 UART: [afmc] --
22,818,151 UART: [cold-reset] --
22,822,707 UART: [state] Locking Datavault
22,827,841 UART: [state] Locking PCR0, PCR1 and PCR31
22,829,588 UART: [state] Locking ICCM
22,830,870 UART: [exit] Launching FMC @ 0x40000130
22,839,259 UART:
22,839,499 UART: Running Caliptra FMC ...
22,840,519 UART:
22,840,659 UART: [state] CFI Enabled
22,909,459 UART: [fht] FMC Alias Private Key: 7
25,249,460 UART: [art] Extend RT PCRs Done
25,250,683 UART: [art] Lock RT PCRs Done
25,252,065 UART: [art] Populate DV Done
25,257,528 UART: [fht] FMC Alias Private Key: 7
25,259,192 UART: [art] Derive CDI
25,260,004 UART: [art] Store in slot 0x4
25,318,642 UART: [art] Derive Key Pair
25,319,672 UART: [art] Store priv key in slot 0x5
28,612,821 UART: [art] Derive Key Pair - Done
28,625,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,915,534 UART: [art] Erasing AUTHORITY.KEYID = 7
30,917,038 UART: [art] PUB.X = F557870527BD7BFCA9BFC005C84B06A5885DF87855B6DCB73C622A118735E93215C046A517161278BE835DCE13A702A0
30,924,346 UART: [art] PUB.Y = 2788BE5A66B11499D539A4100953205BE08A29FDEA0DE079CCDB0FAF490E7768F8EBDDFD2DA12B58575C453D06E399FA
30,931,522 UART: [art] SIG.R = 28119A97DC5DFDE1F6E5DA3EE09F213DA8C185C6F301C7BD0C8405A9916E6A20737D35206E198144E1155B4312AEBCF4
30,938,932 UART: [art] SIG.S = 3AB842355F57D36D61BD94A1CCF574567C7AA04E1664D66477E059D082F0231A14EDCFD74D88B65450EB000E7FDA4E3E
32,243,617 UART: mock_rt_interact::rt_entry...FMC Tester
32,375,857 UART: [rt] Runtime listening for mailbox commands...
32,380,091 >>> mbox cmd response data (2048 bytes)
32,390,062 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,391,774 >>> mbox cmd response data (336 bytes)
32,395,641 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,411,446 >>> mbox cmd response data (1536 bytes)
34,477,998 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
34,578,926 UART:
34,579,299 UART: Running Caliptra ROM ...
34,580,344 UART:
34,580,493 UART: [state] CFI Enabled
34,647,848 UART: [state] LifecycleState = Unprovisioned
34,649,774 UART: [state] DebugLocked = No
34,652,374 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,657,741 UART: [kat] SHA2-256
34,827,449 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,837,927 UART: [kat] ++
34,838,382 UART: [kat] sha1
34,848,616 UART: [kat] SHA2-256
34,851,305 UART: [kat] SHA2-384
34,858,426 UART: [kat] SHA2-512-ACC
34,860,771 UART: [kat] ECC-384
37,151,215 UART: [kat] HMAC-384Kdf
37,184,393 UART: [kat] LMS
38,374,745 UART: [kat] --
38,379,999 UART: [update-reset] ++
42,101,781 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,105,831 UART: [update-reset] Loading Runtime at address 0x40005000 len 53568
42,366,871 >>> mbox cmd response: success
42,368,087 UART: [update-reset] Copying MAN_2 To MAN_1
42,390,482 UART: [update-reset Success] --
42,395,143 UART: [state] Locking Datavault
42,398,463 UART: [state] Locking PCR0, PCR1 and PCR31
42,400,221 UART: [state] Locking ICCM
42,402,814 UART: [exit] Launching FMC @ 0x40000130
42,411,209 UART:
42,411,439 UART: Running Caliptra FMC ...
42,412,535 UART:
42,412,702 UART: [state] CFI Enabled
42,505,983 UART: [art] Extend RT PCRs Done
42,507,155 UART: [art] Lock RT PCRs Done
42,508,718 UART: [art] Populate DV Done
42,514,616 UART: [fht] FMC Alias Private Key: 7
42,516,079 UART: [art] Derive CDI
42,516,846 UART: [art] Store in slot 0x4
42,575,541 UART: [art] Derive Key Pair
42,576,537 UART: [art] Store priv key in slot 0x5
45,869,360 UART: [art] Derive Key Pair - Done
45,882,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,169,355 UART: [art] Erasing AUTHORITY.KEYID = 7
48,170,859 UART: [art] PUB.X = A4CF9F92A1AECF2970ED97C081C43FE46A6BB28E5C65B7A706C4645BAA1B58305C83AA05AE96B8A87E429E81143DD584
48,178,158 UART: [art] PUB.Y = CA33C9EFDF9C37C7663EB7F029BBBCA37C99A1C46BF72C1BED53F4972116D7BA50BC25AF76AC67768B4CF9F1AE48F2A3
48,185,444 UART: [art] SIG.R = EB104D669564500A5A94CD78C5EF1B8A350A42D8CE43734446767B5EFD2AE9FAF2949968F50FC70525F67685D79B707F
48,192,840 UART: [art] SIG.S = D2BA0D45E95E214EBA18724A4C58BE1A1D51D79E97F667FC19BEAAB2E1051776D7D447DD88882D24523D053E8B9F8D34
49,496,594 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,497,872 UART: mock_rt_interact::rt_entry...FMC Tester
49,871,171 UART: [rt] Runtime listening for mailbox commands...
49,874,156 >>> mbox cmd response data (336 bytes)
49,878,244 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,894,061 >>> mbox cmd response data (1536 bytes)
49,901,386 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,901,775 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,781,736 ready_for_fw is high
3,782,141 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
17,140,667 >>> mbox cmd response: success
17,141,417 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,841,696 UART:
22,842,099 UART: Running Caliptra FMC ...
22,843,265 UART:
22,843,412 UART: [state] CFI Enabled
22,912,373 UART: [fht] FMC Alias Private Key: 7
25,253,019 UART: [art] Extend RT PCRs Done
25,254,239 UART: [art] Lock RT PCRs Done
25,255,666 UART: [art] Populate DV Done
25,261,270 UART: [fht] FMC Alias Private Key: 7
25,262,971 UART: [art] Derive CDI
25,263,703 UART: [art] Store in slot 0x4
25,321,308 UART: [art] Derive Key Pair
25,322,305 UART: [art] Store priv key in slot 0x5
28,615,208 UART: [art] Derive Key Pair - Done
28,628,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,916,999 UART: [art] Erasing AUTHORITY.KEYID = 7
30,918,518 UART: [art] PUB.X = 7E1F1FB1B38275A5CFB07466C137DA9A1594D711A5C75C08C42FC88E3A4CD2CC5C90C905C652237C77064A9CC862646B
30,925,762 UART: [art] PUB.Y = A4649647D5FD52C01423772E4DF000F91A8FED2285541713CB2806DA66F9AFB298D58825CA0A08F654B3C7FF7E25F7D3
30,933,023 UART: [art] SIG.R = 5DBD4FD54CB878E31485B198071C4661786F7A4B03BFBADC8DFC848F34085CFF2343AFCAC2604AF8BAF5154367A70FAC
30,940,428 UART: [art] SIG.S = 3353B21975C4B82CB409D9B10400C5D5F67F240F863C51CE1B636A2EC2FEB2F3BDF14456CCD1FB50D597F679890131CE
32,245,311 UART: mock_rt_interact::rt_entry...FMC Tester
32,378,288 UART: [rt] Runtime listening for mailbox commands...
32,382,537 >>> mbox cmd response data (2048 bytes)
32,392,238 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,393,916 >>> mbox cmd response data (336 bytes)
32,397,685 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,413,491 >>> mbox cmd response data (1536 bytes)
34,481,804 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
42,468,939 >>> mbox cmd response: success
42,504,217 UART:
42,504,514 UART: Running Caliptra FMC ...
42,505,543 UART:
42,505,698 UART: [state] CFI Enabled
42,591,633 UART: [art] Extend RT PCRs Done
42,592,828 UART: [art] Lock RT PCRs Done
42,594,305 UART: [art] Populate DV Done
42,599,944 UART: [fht] FMC Alias Private Key: 7
42,601,648 UART: [art] Derive CDI
42,602,463 UART: [art] Store in slot 0x4
42,660,973 UART: [art] Derive Key Pair
42,662,016 UART: [art] Store priv key in slot 0x5
45,954,788 UART: [art] Derive Key Pair - Done
45,967,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,267,194 UART: [art] Erasing AUTHORITY.KEYID = 7
48,268,725 UART: [art] PUB.X = 4C116F0C19DE8DAED1E73FD57E132F1C30EC6116BD4435476DA6F5596E263CDB56EE903298410D74BA532957B7996304
48,275,935 UART: [art] PUB.Y = 444AA5C4FFD7E65F18A9549534912EAC6583E6EEE36696C6A0BABA9766F051D9368CB44D741B0B4CF960A1250BD53264
48,283,228 UART: [art] SIG.R = C53242D864223CDD5FFD28AFB5EFE3AC2A99903DDAE346174FFE9540A37A5D3CDBC69F15F6164079F5DBDA19B4E15A13
48,290,783 UART: [art] SIG.S = C84C0970B0B8490E2E5B9FEBFDB7446743755B7BB03FA8307C4D2DEABB50496A2B1F53D2836E5F695D5773304BA443F5
49,594,231 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,595,193 UART: mock_rt_interact::rt_entry...FMC Tester
49,966,904 UART: [rt] Runtime listening for mailbox commands...
49,969,896 >>> mbox cmd response data (336 bytes)
49,974,640 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,990,484 >>> mbox cmd response data (1536 bytes)
49,997,794 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,998,197 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,309 UART:
192,674 UART: Running Caliptra ROM ...
193,753 UART:
603,424 UART: [state] CFI Enabled
616,849 UART: [state] LifecycleState = Unprovisioned
618,798 UART: [state] DebugLocked = No
620,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,516 UART: [kat] SHA2-256
795,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,811 UART: [kat] ++
806,252 UART: [kat] sha1
816,147 UART: [kat] SHA2-256
818,865 UART: [kat] SHA2-384
824,282 UART: [kat] SHA2-512-ACC
826,647 UART: [kat] ECC-384
3,111,154 UART: [kat] HMAC-384Kdf
3,123,819 UART: [kat] LMS
4,313,903 UART: [kat] --
4,318,836 UART: [cold-reset] ++
4,319,835 UART: [fht] Storing FHT @ 0x50003400
4,331,515 UART: [idev] ++
4,332,071 UART: [idev] CDI.KEYID = 6
4,333,020 UART: [idev] SUBJECT.KEYID = 7
4,334,256 UART: [idev] UDS.KEYID = 0
4,335,220 ready_for_fw is high
4,335,409 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,435,303 UART: [idev] Erasing UDS.KEYID = 0
7,622,473 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,039 UART: [idev] --
7,647,742 UART: [ldev] ++
7,648,313 UART: [ldev] CDI.KEYID = 6
7,649,274 UART: [ldev] SUBJECT.KEYID = 5
7,650,481 UART: [ldev] AUTHORITY.KEYID = 7
7,651,759 UART: [ldev] FE.KEYID = 1
7,664,230 UART: [ldev] Erasing FE.KEYID = 1
10,956,203 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,009 UART: [ldev] --
13,315,053 UART: [fwproc] Waiting for Commands...
13,317,628 UART: [fwproc] Received command 0x46574c44
13,319,874 UART: [fwproc] Received Image of size 79496 bytes
16,940,140 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,015,767 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,088,933 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
17,281,416 >>> mbox cmd response: success
17,281,838 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,285,917 UART: [afmc] ++
17,286,551 UART: [afmc] CDI.KEYID = 6
17,287,428 UART: [afmc] SUBJECT.KEYID = 7
17,288,689 UART: [afmc] AUTHORITY.KEYID = 5
20,605,241 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,899,953 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,902,206 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,916,634 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,931,360 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,945,767 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,967,577 UART: [afmc] --
22,971,317 UART: [cold-reset] --
22,977,232 UART: [state] Locking Datavault
22,982,738 UART: [state] Locking PCR0, PCR1 and PCR31
22,984,480 UART: [state] Locking ICCM
22,985,570 UART: [exit] Launching FMC @ 0x40000130
22,993,955 UART:
22,994,182 UART: Running Caliptra FMC ...
22,995,202 UART:
22,995,344 UART: [state] CFI Enabled
23,003,710 UART: [fht] FMC Alias Private Key: 7
25,343,665 UART: [art] Extend RT PCRs Done
25,344,885 UART: [art] Lock RT PCRs Done
25,346,694 UART: [art] Populate DV Done
25,352,042 UART: [fht] FMC Alias Private Key: 7
25,353,627 UART: [art] Derive CDI
25,354,369 UART: [art] Store in slot 0x4
25,396,791 UART: [art] Derive Key Pair
25,397,785 UART: [art] Store priv key in slot 0x5
28,639,830 UART: [art] Derive Key Pair - Done
28,652,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,932,877 UART: [art] Erasing AUTHORITY.KEYID = 7
30,934,379 UART: [art] PUB.X = AE340DE9381FBE0FDE639B1C4F63E33B2C34DB1E9ED7AE199B3F577168252184B863D7E04D8A15B8A7D5B6B44385CFC8
30,941,634 UART: [art] PUB.Y = 95805AF5C808580B3B9E46F8DFA0F3C81571D166EF3C45F460A0F3732B16916913B485B78E0DD7655179DD327D2E0E37
30,948,896 UART: [art] SIG.R = 01C753034ADBF8A9C37C84997480EE1222C496E4ED79524EEE7D779E3D2C56D42A0CEA86660D957BD268C82527E79E2D
30,956,253 UART: [art] SIG.S = 34D8A2B8C00B828EDB8686FE4D5168B5A81B558F34CDE9F26F6B0ACC9DFBF69E435485A405EA080269A4E579DF4021C6
32,260,075 UART: mock_rt_interact::rt_entry...FMC Tester
32,392,981 UART: [rt] Runtime listening for mailbox commands...
32,397,217 >>> mbox cmd response data (2048 bytes)
32,407,118 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,408,868 >>> mbox cmd response data (336 bytes)
32,412,658 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,428,481 >>> mbox cmd response data (1536 bytes)
34,497,783 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
34,598,677 UART:
34,599,027 UART: Running Caliptra ROM ...
34,600,105 UART:
34,600,321 UART: [state] CFI Enabled
34,616,334 UART: [state] LifecycleState = Unprovisioned
34,618,300 UART: [state] DebugLocked = No
34,620,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,625,590 UART: [kat] SHA2-256
34,795,322 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,805,848 UART: [kat] ++
34,806,320 UART: [kat] sha1
34,817,739 UART: [kat] SHA2-256
34,820,429 UART: [kat] SHA2-384
34,825,549 UART: [kat] SHA2-512-ACC
34,827,892 UART: [kat] ECC-384
37,109,649 UART: [kat] HMAC-384Kdf
37,121,446 UART: [kat] LMS
38,311,518 UART: [kat] --
38,317,014 UART: [update-reset] ++
42,029,013 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,032,187 UART: [update-reset] Loading Runtime at address 0x40005000 len 53568
42,293,308 >>> mbox cmd response: success
42,295,218 UART: [update-reset] Copying MAN_2 To MAN_1
42,317,656 UART: [update-reset Success] --
42,322,258 UART: [state] Locking Datavault
42,324,262 UART: [state] Locking PCR0, PCR1 and PCR31
42,326,026 UART: [state] Locking ICCM
42,328,311 UART: [exit] Launching FMC @ 0x40000130
42,336,701 UART:
42,336,930 UART: Running Caliptra FMC ...
42,337,948 UART:
42,338,090 UART: [state] CFI Enabled
42,382,817 UART: [art] Extend RT PCRs Done
42,384,031 UART: [art] Lock RT PCRs Done
42,385,488 UART: [art] Populate DV Done
42,390,790 UART: [fht] FMC Alias Private Key: 7
42,392,487 UART: [art] Derive CDI
42,393,295 UART: [art] Store in slot 0x4
42,435,860 UART: [art] Derive Key Pair
42,436,861 UART: [art] Store priv key in slot 0x5
45,678,898 UART: [art] Derive Key Pair - Done
45,691,845 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,971,882 UART: [art] Erasing AUTHORITY.KEYID = 7
47,973,384 UART: [art] PUB.X = 9EE279A17196CB5B6FE35D1BC54740696654FAECD1FD0F0D8056A00832413530367A9C95F9508C1386F488C084F0E40F
47,980,638 UART: [art] PUB.Y = 8DFDE7875CF35FB4D30E02676AE3B9F306B1E0FCFC2BB48BCE7C49BD0C949C06487B85C72A2811291F1D98CBEF4EF134
47,987,937 UART: [art] SIG.R = BDF684E3CDA1BF5E4B8D9830AFF8E40456EC14D297E5041B2CA886C9862ADA0DDFC93CFA3F691EC337889242712F14C1
47,995,331 UART: [art] SIG.S = 6F47A3FF34CB4ADB5C134B440C5FC00DF567804FD92C55C02C52DFFD0FBF41E313278DB2BA1EE8CC5D30FF63228A8C90
49,299,203 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,300,066 UART: mock_rt_interact::rt_entry...FMC Tester
49,673,273 UART: [rt] Runtime listening for mailbox commands...
49,676,217 >>> mbox cmd response data (336 bytes)
49,679,926 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,695,726 >>> mbox cmd response data (1536 bytes)
49,703,026 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,703,417 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,132,132 ready_for_fw is high
4,132,767 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
17,374,423 >>> mbox cmd response: success
17,375,035 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
23,019,300 UART:
23,019,692 UART: Running Caliptra FMC ...
23,020,860 UART:
23,021,012 UART: [state] CFI Enabled
23,028,848 UART: [fht] FMC Alias Private Key: 7
25,369,519 UART: [art] Extend RT PCRs Done
25,370,790 UART: [art] Lock RT PCRs Done
25,372,438 UART: [art] Populate DV Done
25,377,764 UART: [fht] FMC Alias Private Key: 7
25,379,406 UART: [art] Derive CDI
25,380,135 UART: [art] Store in slot 0x4
25,422,893 UART: [art] Derive Key Pair
25,423,932 UART: [art] Store priv key in slot 0x5
28,665,561 UART: [art] Derive Key Pair - Done
28,678,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,959,000 UART: [art] Erasing AUTHORITY.KEYID = 7
30,961,082 UART: [art] PUB.X = 858AE93EC667A5034EA81C73D6D4A48A8F0F11F73BFAB7E3F814FABA788E905A708D896F8EBB1CAF33BAB71F20507396
30,967,847 UART: [art] PUB.Y = 970EEF79C4EE01FF8E1DAC8C15151F3A4806E0493F33E25AFF60A43FAB22290010829F3AAC9C5E30F61520918ECE2F2D
30,975,066 UART: [art] SIG.R = 26DD756759F9F3620B7B33759E0CEEB512CE4CDD217498B9A290650A003FCBB881ED07F512DA5E74C447D8F3407B9322
30,982,454 UART: [art] SIG.S = FB6FBFDAD4E9C601B34146826643084929F9AA4D95F737DEA5A1886D0C4F3D891DE4EF0241323931A67BCA6275F9D8C1
32,287,411 UART: mock_rt_interact::rt_entry...FMC Tester
32,420,996 UART: [rt] Runtime listening for mailbox commands...
32,425,239 >>> mbox cmd response data (2048 bytes)
32,434,972 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,436,664 >>> mbox cmd response data (336 bytes)
32,440,543 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,456,375 >>> mbox cmd response data (1536 bytes)
34,527,711 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
42,432,840 >>> mbox cmd response: success
42,466,659 UART:
42,466,988 UART: Running Caliptra FMC ...
42,468,058 UART:
42,468,217 UART: [state] CFI Enabled
42,512,777 UART: [art] Extend RT PCRs Done
42,513,925 UART: [art] Lock RT PCRs Done
42,515,481 UART: [art] Populate DV Done
42,520,941 UART: [fht] FMC Alias Private Key: 7
42,522,424 UART: [art] Derive CDI
42,523,179 UART: [art] Store in slot 0x4
42,565,975 UART: [art] Derive Key Pair
42,567,033 UART: [art] Store priv key in slot 0x5
45,808,656 UART: [art] Derive Key Pair - Done
45,821,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,102,468 UART: [art] Erasing AUTHORITY.KEYID = 7
48,103,990 UART: [art] PUB.X = 604D048E9FE1CBBF460F78B9E5BA3EC594C257017C83A4CAB66FDD23BBE5583E0C39C0DA55D1233E45BC98833F2E8D39
48,111,274 UART: [art] PUB.Y = 02E849ECEC155A0084AE1475E5708E78353C38362DF03623E6CEB81895F30B8855C84A0B165EE15155584DBA830E6957
48,118,527 UART: [art] SIG.R = 0D060A2935D0A1A5D7D1F81DFD4A008F2F0CE12AE4740480BBA3248735B928C8E8994198CC6C4ADA09278C60168A9E18
48,125,840 UART: [art] SIG.S = ED97335765C885CC80AC165C5AFE9DA2B7C2BF90AEAC3EC5290CA71BD10DA2F8FCDBC85CBFCD4549E6FF5B03335726B2
49,429,705 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,430,849 UART: mock_rt_interact::rt_entry...FMC Tester
49,804,424 UART: [rt] Runtime listening for mailbox commands...
49,807,403 >>> mbox cmd response data (336 bytes)
49,811,630 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,827,454 >>> mbox cmd response data (1536 bytes)
49,834,759 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,835,149 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,062 UART:
192,479 UART: Running Caliptra ROM ...
193,851 UART:
194,007 UART: [state] CFI Enabled
266,283 UART: [state] LifecycleState = Unprovisioned
268,196 UART: [state] DebugLocked = No
270,374 UART: [state] WD Timer not started. Device not locked for debugging
274,206 UART: [kat] SHA2-256
453,898 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,620 UART: [kat] ++
465,231 UART: [kat] sha1
477,321 UART: [kat] SHA2-256
479,971 UART: [kat] SHA2-384
485,885 UART: [kat] SHA2-512-ACC
488,271 UART: [kat] ECC-384
2,949,711 UART: [kat] HMAC-384Kdf
2,972,455 UART: [kat] LMS
3,448,938 UART: [kat] --
3,452,850 UART: [cold-reset] ++
3,455,426 UART: [fht] FHT @ 0x50003400
3,466,726 UART: [idev] ++
3,467,330 UART: [idev] CDI.KEYID = 6
3,468,211 UART: [idev] SUBJECT.KEYID = 7
3,469,458 UART: [idev] UDS.KEYID = 0
3,470,477 ready_for_fw is high
3,470,676 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,570,862 UART: [idev] Erasing UDS.KEYID = 0
5,981,303 UART: [idev] Sha1 KeyId Algorithm
6,004,325 UART: [idev] --
6,008,116 UART: [ldev] ++
6,008,709 UART: [ldev] CDI.KEYID = 6
6,009,626 UART: [ldev] SUBJECT.KEYID = 5
6,010,846 UART: [ldev] AUTHORITY.KEYID = 7
6,012,081 UART: [ldev] FE.KEYID = 1
6,050,746 UART: [ldev] Erasing FE.KEYID = 1
8,558,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,292,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,307,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,323,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,339,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,361,217 UART: [ldev] --
10,366,984 UART: [fwproc] Wait for Commands...
10,369,510 UART: [fwproc] Recv command 0x46574c44
10,371,549 UART: [fwproc] Recv'd Img size: 79496 bytes
13,375,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,458,389 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,531,454 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,722,803 >>> mbox cmd response: success
13,723,205 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,727,084 UART: [afmc] ++
13,727,661 UART: [afmc] CDI.KEYID = 6
13,728,596 UART: [afmc] SUBJECT.KEYID = 7
13,729,806 UART: [afmc] AUTHORITY.KEYID = 5
16,269,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,992,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,994,839 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,010,671 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,026,705 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,042,286 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,068,152 UART: [afmc] --
18,071,750 UART: [cold-reset] --
18,076,152 UART: [state] Locking Datavault
18,081,055 UART: [state] Locking PCR0, PCR1 and PCR31
18,082,818 UART: [state] Locking ICCM
18,085,236 UART: [exit] Launching FMC @ 0x40000130
18,093,686 UART:
18,093,924 UART: Running Caliptra FMC ...
18,095,030 UART:
18,095,189 UART: [state] CFI Enabled
18,151,419 UART: [fht] FMC Alias Private Key: 7
19,918,315 UART: [art] Extend RT PCRs Done
19,919,537 UART: [art] Lock RT PCRs Done
19,920,807 UART: [art] Populate DV Done
19,926,278 UART: [fht] FMC Alias Private Key: 7
19,927,814 UART: [art] Derive CDI
19,928,542 UART: [art] Store in slot 0x4
19,984,320 UART: [art] Derive Key Pair
19,985,356 UART: [art] Store priv key in slot 0x5
22,448,278 UART: [art] Derive Key Pair - Done
22,461,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,174,429 UART: [art] Erasing AUTHORITY.KEYID = 7
24,175,935 UART: [art] PUB.X = 1C082C7F8185A6ACA88AAFBCB29E7C7D94F8F5D69300ED618DBDC8BECAAA71D43A66BBFDBC5F2650BFCB94751C31EDF1
24,183,230 UART: [art] PUB.Y = 763DA08BAE6B397A1F688E496350A47795B4D9BADBE7C9D346D06D005AA623B920E4F412FF206B21B0E175E848892165
24,190,424 UART: [art] SIG.R = BE15D9B55FA5D95D1CA19FA3511777DA5D09684A4E1DAC815D49D37749087AB522C09D5929797B9D2ABD8ECCD5EAD324
24,197,834 UART: [art] SIG.S = 60ACCC689080162A11C3E84BDA88F422947A4214C435ED591C64DD1A83A1EE3FDC05794E00B25F51FAB7AB98C7AE0567
25,176,250 UART: mock_rt_interact::rt_entry...FMC Tester
25,307,141 UART: [rt] Runtime listening for mailbox commands...
25,311,427 >>> mbox cmd response data (2048 bytes)
25,321,349 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,323,043 >>> mbox cmd response data (336 bytes)
25,326,876 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,342,683 >>> mbox cmd response data (1536 bytes)
27,408,355 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
27,509,230 UART:
27,509,624 UART: Running Caliptra ROM ...
27,510,675 UART:
27,510,826 UART: [state] CFI Enabled
27,583,495 UART: [state] LifecycleState = Unprovisioned
27,585,437 UART: [state] DebugLocked = No
27,586,739 UART: [state] WD Timer not started. Device not locked for debugging
27,591,226 UART: [kat] SHA2-256
27,770,909 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,781,671 UART: [kat] ++
27,782,148 UART: [kat] sha1
27,793,243 UART: [kat] SHA2-256
27,795,941 UART: [kat] SHA2-384
27,802,382 UART: [kat] SHA2-512-ACC
27,804,741 UART: [kat] ECC-384
30,269,982 UART: [kat] HMAC-384Kdf
30,292,857 UART: [kat] LMS
30,769,331 UART: [kat] --
30,773,990 UART: [update-reset] ++
33,786,324 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,790,522 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
34,051,470 >>> mbox cmd response: success
34,052,684 UART: [update-reset] Copying MAN_2 To MAN_1
34,089,822 UART: [update-reset Success] --
34,095,033 UART: [state] Locking Datavault
34,097,379 UART: [state] Locking PCR0, PCR1 and PCR31
34,099,143 UART: [state] Locking ICCM
34,101,977 UART: [exit] Launching FMC @ 0x40000130
34,110,358 UART:
34,110,627 UART: Running Caliptra FMC ...
34,111,650 UART:
34,111,792 UART: [state] CFI Enabled
34,209,309 UART: [art] Extend RT PCRs Done
34,210,491 UART: [art] Lock RT PCRs Done
34,211,933 UART: [art] Populate DV Done
34,217,402 UART: [fht] FMC Alias Private Key: 7
34,219,099 UART: [art] Derive CDI
34,219,919 UART: [art] Store in slot 0x4
34,278,364 UART: [art] Derive Key Pair
34,279,404 UART: [art] Store priv key in slot 0x5
36,742,024 UART: [art] Derive Key Pair - Done
36,755,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,467,077 UART: [art] Erasing AUTHORITY.KEYID = 7
38,468,589 UART: [art] PUB.X = 00C31B79E60262D3DDCAD441B5734E5F83FD68B365941D222A477952F4113A6C9F0AD27800968502B0DDB3F9CA1716B3
38,475,809 UART: [art] PUB.Y = 07E46FA33C37A080F0C7796C77203D677D56FF3AF2F1B8714A230C35391FC3314D8777BB06E3EDCF3EA5838EC768431E
38,483,091 UART: [art] SIG.R = E5A094E2EFE0F52FEA931C218137A88374A4FF571792B0B8A6331CFFC04E638B9035765CE16B0A4755B4E771DF90CEED
38,490,461 UART: [art] SIG.S = 8115024ECDE2E73C3A3DEC56FAC0E04C3AA17F8E08E6592DA11B7BB53708A067A879DAB36F953BC2BDB42A53564E2A54
39,467,522 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,468,711 UART: mock_rt_interact::rt_entry...FMC Tester
39,837,808 UART: [rt] Runtime listening for mailbox commands...
39,840,803 >>> mbox cmd response data (336 bytes)
39,844,565 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,860,375 >>> mbox cmd response data (1536 bytes)
39,867,875 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,868,310 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
3,462,247 ready_for_fw is high
3,462,850 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,641,373 >>> mbox cmd response: success
13,642,007 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,938,121 UART:
17,938,524 UART: Running Caliptra FMC ...
17,939,699 UART:
17,939,853 UART: [state] CFI Enabled
18,007,321 UART: [fht] FMC Alias Private Key: 7
19,773,798 UART: [art] Extend RT PCRs Done
19,775,021 UART: [art] Lock RT PCRs Done
19,776,730 UART: [art] Populate DV Done
19,781,924 UART: [fht] FMC Alias Private Key: 7
19,783,576 UART: [art] Derive CDI
19,784,312 UART: [art] Store in slot 0x4
19,839,589 UART: [art] Derive Key Pair
19,840,625 UART: [art] Store priv key in slot 0x5
22,303,561 UART: [art] Derive Key Pair - Done
22,316,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,028,770 UART: [art] Erasing AUTHORITY.KEYID = 7
24,030,276 UART: [art] PUB.X = C2BC5AE7ADFFD97B5B1C08D21D71F668F630CD9842AFF9C3C6A1B4ADD27A965FFF34FF43E5BF462F99A9B541108FC134
24,037,579 UART: [art] PUB.Y = 80A11F33942E95A9B717024CDDF958196FEE65F4AE0F947DFADD4BB6206A6B98D71F9C0403CC2BF8E158F7F0F51C8932
24,044,866 UART: [art] SIG.R = 0109B05DAAB471AD7BD5B928D78286EAC3D30DB6EC08DDB0645D20837398122580318904EC95972824BCF2A05A94A14F
24,052,257 UART: [art] SIG.S = 3553C65E2F65FE8C3156155B180BF0B3A1ACA3893B8CF12EB4780C28E0367F1B4DF8435A1957C7AFE757A15ACC157099
25,030,795 UART: mock_rt_interact::rt_entry...FMC Tester
25,163,548 UART: [rt] Runtime listening for mailbox commands...
25,167,839 >>> mbox cmd response data (2048 bytes)
25,177,523 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,179,186 >>> mbox cmd response data (336 bytes)
25,182,961 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,198,791 >>> mbox cmd response data (1536 bytes)
27,265,232 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
33,903,744 >>> mbox cmd response: success
33,940,713 UART:
33,941,038 UART: Running Caliptra FMC ...
33,942,089 UART:
33,942,244 UART: [state] CFI Enabled
34,038,369 UART: [art] Extend RT PCRs Done
34,039,560 UART: [art] Lock RT PCRs Done
34,040,724 UART: [art] Populate DV Done
34,046,167 UART: [fht] FMC Alias Private Key: 7
34,047,822 UART: [art] Derive CDI
34,048,560 UART: [art] Store in slot 0x4
34,107,389 UART: [art] Derive Key Pair
34,108,428 UART: [art] Store priv key in slot 0x5
36,571,004 UART: [art] Derive Key Pair - Done
36,583,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,297,604 UART: [art] Erasing AUTHORITY.KEYID = 7
38,299,123 UART: [art] PUB.X = 33D12C223BACA216D45F116BEF83DD1AB438DD378616097D95D7996A6413A77209D8D71689B6B4CB31CBDE447C5FED1E
38,306,401 UART: [art] PUB.Y = 5942FC80EC4CD4B0E9C65C618F425E6B152A3BB148F366FB58BA92D655EE18034C7E30AD5C218EC7F4E6C80A4620FAA1
38,313,703 UART: [art] SIG.R = D54463329AEC068D57807575EC5A38919F68E6CE094702A3215A01E79DEC6AD085180A5EEA5E2AFD0DE96B3D26D08738
38,321,067 UART: [art] SIG.S = 50D5AB567DA716B55D58CD5259228B5A1201B6729C82828E90EAEF6B3DB2B6C38E15F0BDDE9CCEA965C9C29A196DD8FC
39,298,174 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,299,178 UART: mock_rt_interact::rt_entry...FMC Tester
39,666,923 UART: [rt] Runtime listening for mailbox commands...
39,669,874 >>> mbox cmd response data (336 bytes)
39,673,586 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,689,397 >>> mbox cmd response data (1536 bytes)
39,696,700 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,697,107 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,352 UART:
192,714 UART: Running Caliptra ROM ...
194,075 UART:
603,566 UART: [state] CFI Enabled
620,342 UART: [state] LifecycleState = Unprovisioned
622,299 UART: [state] DebugLocked = No
624,481 UART: [state] WD Timer not started. Device not locked for debugging
628,512 UART: [kat] SHA2-256
808,154 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,948 UART: [kat] ++
819,400 UART: [kat] sha1
829,564 UART: [kat] SHA2-256
832,292 UART: [kat] SHA2-384
837,483 UART: [kat] SHA2-512-ACC
839,819 UART: [kat] ECC-384
3,280,416 UART: [kat] HMAC-384Kdf
3,293,503 UART: [kat] LMS
3,770,015 UART: [kat] --
3,774,271 UART: [cold-reset] ++
3,775,854 UART: [fht] FHT @ 0x50003400
3,787,828 UART: [idev] ++
3,788,407 UART: [idev] CDI.KEYID = 6
3,789,317 UART: [idev] SUBJECT.KEYID = 7
3,790,565 UART: [idev] UDS.KEYID = 0
3,791,611 ready_for_fw is high
3,791,835 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,891,947 UART: [idev] Erasing UDS.KEYID = 0
6,271,578 UART: [idev] Sha1 KeyId Algorithm
6,295,355 UART: [idev] --
6,300,781 UART: [ldev] ++
6,301,361 UART: [ldev] CDI.KEYID = 6
6,302,268 UART: [ldev] SUBJECT.KEYID = 5
6,303,483 UART: [ldev] AUTHORITY.KEYID = 7
6,304,713 UART: [ldev] FE.KEYID = 1
6,315,566 UART: [ldev] Erasing FE.KEYID = 1
8,790,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,181 UART: [ldev] --
10,582,738 UART: [fwproc] Wait for Commands...
10,585,913 UART: [fwproc] Recv command 0x46574c44
10,587,948 UART: [fwproc] Recv'd Img size: 79496 bytes
13,586,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,667,906 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,740,968 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,932,180 >>> mbox cmd response: success
13,932,589 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,936,645 UART: [afmc] ++
13,937,234 UART: [afmc] CDI.KEYID = 6
13,938,198 UART: [afmc] SUBJECT.KEYID = 7
13,939,408 UART: [afmc] AUTHORITY.KEYID = 5
16,442,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,166,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,168,451 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,184,229 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,200,321 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,215,881 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,241,127 UART: [afmc] --
18,244,996 UART: [cold-reset] --
18,248,012 UART: [state] Locking Datavault
18,253,316 UART: [state] Locking PCR0, PCR1 and PCR31
18,255,065 UART: [state] Locking ICCM
18,257,000 UART: [exit] Launching FMC @ 0x40000130
18,265,399 UART:
18,265,633 UART: Running Caliptra FMC ...
18,266,733 UART:
18,266,889 UART: [state] CFI Enabled
18,275,108 UART: [fht] FMC Alias Private Key: 7
20,041,070 UART: [art] Extend RT PCRs Done
20,042,322 UART: [art] Lock RT PCRs Done
20,043,800 UART: [art] Populate DV Done
20,049,482 UART: [fht] FMC Alias Private Key: 7
20,051,018 UART: [art] Derive CDI
20,051,836 UART: [art] Store in slot 0x4
20,094,486 UART: [art] Derive Key Pair
20,095,612 UART: [art] Store priv key in slot 0x5
22,522,644 UART: [art] Derive Key Pair - Done
22,535,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,241,529 UART: [art] Erasing AUTHORITY.KEYID = 7
24,243,012 UART: [art] PUB.X = B18832EE917E93B5B2E77A4B0649364008B87ACAC25BE3C5318D0E1477F821F3CF2C46EA1D2BF68D5C445F8B6C6860C4
24,250,311 UART: [art] PUB.Y = CC66B644F90ECF25AC75F506D72849AFBCC0D128949EB4E74BD5BC757D20CC1BCAE310EA2A3F559B4D33C5AB4816E596
24,257,601 UART: [art] SIG.R = CF6D9F8E16CF365D370200217B4AC321E3BF3CCAF3A51FADEB0DDE2D30D4CCACEAA1B7A61C955CCDFC971A562ADAFD7F
24,265,003 UART: [art] SIG.S = 7AF4E78CB74FE4DC9BB4824E756C12B16275F5BCD378811505252BFEBEBC882ACAE0E2102C8F7185BF7BC4E6A361840A
25,243,899 UART: mock_rt_interact::rt_entry...FMC Tester
25,376,603 UART: [rt] Runtime listening for mailbox commands...
25,380,885 >>> mbox cmd response data (2048 bytes)
25,390,916 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,392,664 >>> mbox cmd response data (336 bytes)
25,396,739 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,412,557 >>> mbox cmd response data (1536 bytes)
27,476,359 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
27,577,190 UART:
27,577,557 UART: Running Caliptra ROM ...
27,578,691 UART:
27,578,860 UART: [state] CFI Enabled
27,593,668 UART: [state] LifecycleState = Unprovisioned
27,595,558 UART: [state] DebugLocked = No
27,597,370 UART: [state] WD Timer not started. Device not locked for debugging
27,601,640 UART: [kat] SHA2-256
27,781,327 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,792,127 UART: [kat] ++
27,792,579 UART: [kat] sha1
27,803,792 UART: [kat] SHA2-256
27,806,492 UART: [kat] SHA2-384
27,811,786 UART: [kat] SHA2-512-ACC
27,814,186 UART: [kat] ECC-384
30,253,821 UART: [kat] HMAC-384Kdf
30,266,222 UART: [kat] LMS
30,742,700 UART: [kat] --
30,746,697 UART: [update-reset] ++
33,761,617 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,765,971 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
34,026,886 >>> mbox cmd response: success
34,027,504 UART: [update-reset] Copying MAN_2 To MAN_1
34,064,654 UART: [update-reset Success] --
34,069,308 UART: [state] Locking Datavault
34,072,740 UART: [state] Locking PCR0, PCR1 and PCR31
34,074,443 UART: [state] Locking ICCM
34,076,516 UART: [exit] Launching FMC @ 0x40000130
34,084,877 UART:
34,085,118 UART: Running Caliptra FMC ...
34,086,143 UART:
34,086,290 UART: [state] CFI Enabled
34,130,689 UART: [art] Extend RT PCRs Done
34,131,874 UART: [art] Lock RT PCRs Done
34,133,509 UART: [art] Populate DV Done
34,138,806 UART: [fht] FMC Alias Private Key: 7
34,140,501 UART: [art] Derive CDI
34,141,234 UART: [art] Store in slot 0x4
34,183,716 UART: [art] Derive Key Pair
34,184,711 UART: [art] Store priv key in slot 0x5
36,611,321 UART: [art] Derive Key Pair - Done
36,624,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,330,228 UART: [art] Erasing AUTHORITY.KEYID = 7
38,331,746 UART: [art] PUB.X = 0DE0DD580729F82151762DCFEC445C5B92758DD8C9A6C6AFE571F0FBEC32B7CF69C416159F70C03FB3AE945B426DA0E7
38,339,051 UART: [art] PUB.Y = DF2ED44986E8F1FD426A7A0B94FDA02A76EF6A5548F6646ADA6383B4814DD6F42C0AE06161842AE86618D311435B1FE9
38,346,277 UART: [art] SIG.R = AA962EC84BB4A196036E449AF4CD78BD32BC9B912C1CCFBE91E192880EBAA439DBD36B447A8B2BBFB97F0FA038A1E779
38,353,798 UART: [art] SIG.S = CF7DC423E79DAC0037AD7E21824F2C0BD8CDB0DABEFF81205B18D2EFF8B1452D94FA5519D2EC3EA545E5834D0A4F97AD
39,331,000 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,331,985 UART: mock_rt_interact::rt_entry...FMC Tester
39,704,712 UART: [rt] Runtime listening for mailbox commands...
39,707,698 >>> mbox cmd response data (336 bytes)
39,711,547 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,727,385 >>> mbox cmd response data (1536 bytes)
39,734,739 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,735,160 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,778,483 ready_for_fw is high
3,778,866 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,821,901 >>> mbox cmd response: success
13,822,531 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,073,063 UART:
18,073,442 UART: Running Caliptra FMC ...
18,074,617 UART:
18,074,770 UART: [state] CFI Enabled
18,082,598 UART: [fht] FMC Alias Private Key: 7
19,848,642 UART: [art] Extend RT PCRs Done
19,849,862 UART: [art] Lock RT PCRs Done
19,851,406 UART: [art] Populate DV Done
19,856,767 UART: [fht] FMC Alias Private Key: 7
19,858,357 UART: [art] Derive CDI
19,859,101 UART: [art] Store in slot 0x4
19,901,747 UART: [art] Derive Key Pair
19,902,743 UART: [art] Store priv key in slot 0x5
22,329,224 UART: [art] Derive Key Pair - Done
22,342,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,048,242 UART: [art] Erasing AUTHORITY.KEYID = 7
24,049,748 UART: [art] PUB.X = 3C77A795AF1BA7858C6D4D2A9A67FEC214DF4161CBBC1EDBC19970A85B1B4F7C386134456788E3CACD416CDD3B039097
24,056,992 UART: [art] PUB.Y = A5E7D5BE836E39EDA7F25CA1C52A838B3BE6CC65217D5B4F2E9E679F6EA800D4A239B9D9200F7822F2BB6675E6A6D26A
24,064,277 UART: [art] SIG.R = C05D85F8F3C04FC0F06DD15917A63A00183534C6FA68C2E9A0DF2827B9A05A5A3D610666168820688D15B28048E4FA0F
24,071,592 UART: [art] SIG.S = E7B35922F2BFC6A64FD3BFB57D68F1CDB3F21D3C46147F831FE701E04801BE4D9A452F816AB5B8F48B990A4CCDC6B2D5
25,050,485 UART: mock_rt_interact::rt_entry...FMC Tester
25,182,419 UART: [rt] Runtime listening for mailbox commands...
25,186,701 >>> mbox cmd response data (2048 bytes)
25,196,889 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,198,596 >>> mbox cmd response data (336 bytes)
25,202,403 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,218,216 >>> mbox cmd response data (1536 bytes)
27,279,874 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
33,824,260 >>> mbox cmd response: success
33,859,121 UART:
33,859,447 UART: Running Caliptra FMC ...
33,860,491 UART:
33,860,642 UART: [state] CFI Enabled
33,904,833 UART: [art] Extend RT PCRs Done
33,905,990 UART: [art] Lock RT PCRs Done
33,907,192 UART: [art] Populate DV Done
33,912,616 UART: [fht] FMC Alias Private Key: 7
33,914,272 UART: [art] Derive CDI
33,915,006 UART: [art] Store in slot 0x4
33,957,437 UART: [art] Derive Key Pair
33,958,459 UART: [art] Store priv key in slot 0x5
36,385,618 UART: [art] Derive Key Pair - Done
36,398,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,104,507 UART: [art] Erasing AUTHORITY.KEYID = 7
38,106,016 UART: [art] PUB.X = BB4F34AB5622C2546D5209EDC8C8255594B61DEC575836F2FCADECABA11215C787CCB3EFCD3C098DF471E5DDB63F4F05
38,113,335 UART: [art] PUB.Y = 60FB4B552EE205B0BAE073386A28B763B4D29A9CA18ACE46A9633AD61119F1FDCD197433DF3733F41DACFD89F6C0A7CD
38,120,584 UART: [art] SIG.R = 2636492300CE1E65BC724E7E5F85758DAB370A3430D483D8C44E0D3EC00C861CD14E6C0D6C053F2E222C3F1069FE3F31
38,127,990 UART: [art] SIG.S = 280F6FB13E2CF3124B7B769BEF28EFF2844731065D40544AE29C2A4C4F0F08828D403FE67918434ABE67558325187A76
39,105,255 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,106,267 UART: mock_rt_interact::rt_entry...FMC Tester
39,483,256 UART: [rt] Runtime listening for mailbox commands...
39,486,188 >>> mbox cmd response data (336 bytes)
39,490,142 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,505,950 >>> mbox cmd response data (1536 bytes)
39,513,250 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,513,648 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
191,910 UART:
192,277 UART: Running Caliptra ROM ...
193,373 UART:
193,521 UART: [state] CFI Enabled
265,126 UART: [state] LifecycleState = Unprovisioned
267,525 UART: [state] DebugLocked = No
270,109 UART: [state] WD Timer not started. Device not locked for debugging
273,928 UART: [kat] SHA2-256
463,796 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,593 UART: [kat] ++
475,066 UART: [kat] sha1
486,583 UART: [kat] SHA2-256
489,583 UART: [kat] SHA2-384
495,069 UART: [kat] SHA2-512-ACC
497,648 UART: [kat] ECC-384
2,950,819 UART: [kat] HMAC-384Kdf
2,971,805 UART: [kat] LMS
3,503,536 UART: [kat] --
3,508,807 UART: [cold-reset] ++
3,509,951 UART: [fht] FHT @ 0x50003400
3,521,017 UART: [idev] ++
3,521,723 UART: [idev] CDI.KEYID = 6
3,522,670 UART: [idev] SUBJECT.KEYID = 7
3,523,913 UART: [idev] UDS.KEYID = 0
3,524,829 ready_for_fw is high
3,525,015 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,625,119 UART: [idev] Erasing UDS.KEYID = 0
6,028,830 UART: [idev] Sha1 KeyId Algorithm
6,051,031 UART: [idev] --
6,056,787 UART: [ldev] ++
6,057,477 UART: [ldev] CDI.KEYID = 6
6,058,387 UART: [ldev] SUBJECT.KEYID = 5
6,059,545 UART: [ldev] AUTHORITY.KEYID = 7
6,060,780 UART: [ldev] FE.KEYID = 1
6,099,784 UART: [ldev] Erasing FE.KEYID = 1
8,612,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,112 UART: [ldev] --
10,414,761 UART: [fwproc] Wait for Commands...
10,417,015 UART: [fwproc] Recv command 0x46574c44
10,419,326 UART: [fwproc] Recv'd Img size: 79496 bytes
13,439,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,518,925 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,642,540 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,968,146 >>> mbox cmd response: success
13,968,546 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,972,544 UART: [afmc] ++
13,973,241 UART: [afmc] CDI.KEYID = 6
13,974,424 UART: [afmc] SUBJECT.KEYID = 7
13,975,912 UART: [afmc] AUTHORITY.KEYID = 5
16,508,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,230,851 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,232,765 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,247,893 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,263,001 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,277,948 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,301,807 UART: [afmc] --
18,305,887 UART: [cold-reset] --
18,309,426 UART: [state] Locking Datavault
18,314,893 UART: [state] Locking PCR0, PCR1 and PCR31
18,317,041 UART: [state] Locking ICCM
18,319,057 UART: [exit] Launching FMC @ 0x40000130
18,327,725 UART:
18,327,957 UART: Running Caliptra FMC ...
18,328,981 UART:
18,329,127 UART: [state] CFI Enabled
18,389,428 UART: [fht] FMC Alias Private Key: 7
20,155,991 UART: [art] Extend RT PCRs Done
20,157,208 UART: [art] Lock RT PCRs Done
20,158,997 UART: [art] Populate DV Done
20,164,682 UART: [fht] FMC Alias Private Key: 7
20,166,327 UART: [art] Derive CDI
20,167,140 UART: [art] Store in slot 0x4
20,222,370 UART: [art] Derive Key Pair
20,223,411 UART: [art] Store priv key in slot 0x5
22,686,026 UART: [art] Derive Key Pair - Done
22,699,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,412,362 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,866 UART: [art] PUB.X = E76F43D1EBB0E90EADBFCD4622CDF56AB4E1EA66D634318260DA732F6BEBFC6024665AEB9182AA0448FBDF66DDFD8BAF
24,421,181 UART: [art] PUB.Y = 55252A8060C806D6FA128D21B38C052450DC99AC29F7584A7AE8F6F753FD3A60F98729177941F4AE03E2E1011E28FC6F
24,428,461 UART: [art] SIG.R = 4360765AF33F38863A142D4D4D05E6AA7F301B9642761E120EF4D8FF2F388B0F32A613AB6B979E26E92602B3EFA7E30C
24,435,883 UART: [art] SIG.S = 74ADCF351CE3B6DD404DE74AFEBCADFED4FB21B3EE54A35D833B44BB97B380AB1A60E3D266169673629CEA39AF32A79E
25,414,730 UART: mock_rt_interact::rt_entry...FMC Tester
25,546,559 UART: [rt] Runtime listening for mailbox commands...
25,550,848 >>> mbox cmd response data (2048 bytes)
25,561,118 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,562,852 >>> mbox cmd response data (336 bytes)
25,566,851 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,582,652 >>> mbox cmd response data (1536 bytes)
27,649,838 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
27,750,755 UART:
27,751,116 UART: Running Caliptra ROM ...
27,752,173 UART:
27,752,322 UART: [state] CFI Enabled
27,825,515 UART: [state] LifecycleState = Unprovisioned
27,827,618 UART: [state] DebugLocked = No
27,828,922 UART: [state] WD Timer not started. Device not locked for debugging
27,832,745 UART: [kat] SHA2-256
28,022,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,033,364 UART: [kat] ++
28,033,823 UART: [kat] sha1
28,046,600 UART: [kat] SHA2-256
28,049,617 UART: [kat] SHA2-384
28,054,916 UART: [kat] SHA2-512-ACC
28,057,487 UART: [kat] ECC-384
30,507,867 UART: [kat] HMAC-384Kdf
30,530,844 UART: [kat] LMS
31,062,418 UART: [kat] --
31,064,559 UART: [update-reset] ++
34,089,065 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,091,637 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
34,487,046 >>> mbox cmd response: success
34,487,815 UART: [update-reset] Copying MAN_2 To MAN_1
34,525,411 UART: [update-reset Success] --
34,529,571 UART: [state] Locking Datavault
34,533,376 UART: [state] Locking PCR0, PCR1 and PCR31
34,535,519 UART: [state] Locking ICCM
34,537,617 UART: [exit] Launching FMC @ 0x40000130
34,546,289 UART:
34,546,533 UART: Running Caliptra FMC ...
34,547,632 UART:
34,547,788 UART: [state] CFI Enabled
34,649,582 UART: [art] Extend RT PCRs Done
34,650,766 UART: [art] Lock RT PCRs Done
34,652,060 UART: [art] Populate DV Done
34,657,310 UART: [fht] FMC Alias Private Key: 7
34,659,009 UART: [art] Derive CDI
34,659,830 UART: [art] Store in slot 0x4
34,718,813 UART: [art] Derive Key Pair
34,719,874 UART: [art] Store priv key in slot 0x5
37,182,647 UART: [art] Derive Key Pair - Done
37,195,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,908,890 UART: [art] Erasing AUTHORITY.KEYID = 7
38,910,401 UART: [art] PUB.X = 60903317D0DB449252A183D257590C3F75E2037FAE4AC28D66D7BFFFDCCCD2FC8E84428B4CBF4E2429395B12E2D13F5A
38,917,674 UART: [art] PUB.Y = A7EC83F2D7FB5540A695028A90F3843F14FE674E1A1F3F47904823377131404AD75DCAF9BCAF16E7A67514D3649C323F
38,924,910 UART: [art] SIG.R = 9F5E2A3A5D419E87173FCF45AD1119A40094467E717AA3D86D910736082727E7A9F465D5F4DA86F7B40186818ADB3FA9
38,932,298 UART: [art] SIG.S = 37A13DF4EBC5D8E28394224196341EEF46A8F556BBCDE35B1417C4F24EDDD06613D70FBF138E9AA462B69496F2D26CB3
39,909,570 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,910,644 UART: mock_rt_interact::rt_entry...FMC Tester
40,285,637 UART: [rt] Runtime listening for mailbox commands...
40,288,566 >>> mbox cmd response data (336 bytes)
40,292,357 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,308,162 >>> mbox cmd response data (1536 bytes)
40,315,468 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,315,882 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
3,438,303 ready_for_fw is high
3,439,130 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
14,003,252 >>> mbox cmd response: success
14,003,835 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,297,036 UART:
18,297,406 UART: Running Caliptra FMC ...
18,298,666 UART:
18,298,837 UART: [state] CFI Enabled
18,367,978 UART: [fht] FMC Alias Private Key: 7
20,134,132 UART: [art] Extend RT PCRs Done
20,135,844 UART: [art] Lock RT PCRs Done
20,137,129 UART: [art] Populate DV Done
20,142,678 UART: [fht] FMC Alias Private Key: 7
20,144,278 UART: [art] Derive CDI
20,145,104 UART: [art] Store in slot 0x4
20,201,852 UART: [art] Derive Key Pair
20,202,849 UART: [art] Store priv key in slot 0x5
22,665,944 UART: [art] Derive Key Pair - Done
22,678,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,391,123 UART: [art] Erasing AUTHORITY.KEYID = 7
24,392,665 UART: [art] PUB.X = 31F0E46D95ACFB2BDFF3BF83A0D8AC52CD14DB3F1DD031AD8382A5823F750B6A181EA29504C013C2EFB90F44B2EFEBC3
24,399,935 UART: [art] PUB.Y = B6E8A20A2CB86C46B3D92FC91A065B9568CCB096B66FDA6E5D496F6EB6874AA34E44E1B01F5FA4B27C4B24DF6472D7A9
24,407,200 UART: [art] SIG.R = 08BEC9696F8C12442C948128602998AD7DABD37EBD3F5D8ABD874CB0A0440278EFDC9239BAADBA0A041082131E963358
24,414,601 UART: [art] SIG.S = EEC43138FE95E2608C33E77FA87037C4DE58568207F5D662DDF3F6253BFBBF672067A097E1933BA10D746A4C501D5D96
25,393,202 UART: mock_rt_interact::rt_entry...FMC Tester
25,525,320 UART: [rt] Runtime listening for mailbox commands...
25,529,615 >>> mbox cmd response data (2048 bytes)
25,539,358 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,541,051 >>> mbox cmd response data (336 bytes)
25,545,079 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,560,891 >>> mbox cmd response data (1536 bytes)
27,624,770 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
34,632,986 >>> mbox cmd response: success
34,668,781 UART:
34,669,078 UART: Running Caliptra FMC ...
34,670,202 UART:
34,670,369 UART: [state] CFI Enabled
34,764,395 UART: [art] Extend RT PCRs Done
34,765,604 UART: [art] Lock RT PCRs Done
34,766,796 UART: [art] Populate DV Done
34,772,317 UART: [fht] FMC Alias Private Key: 7
34,773,824 UART: [art] Derive CDI
34,774,760 UART: [art] Store in slot 0x4
34,833,590 UART: [art] Derive Key Pair
34,834,591 UART: [art] Store priv key in slot 0x5
37,297,449 UART: [art] Derive Key Pair - Done
37,309,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,023,410 UART: [art] Erasing AUTHORITY.KEYID = 7
39,024,951 UART: [art] PUB.X = BFED4E118FBED6C99109A89F5B6D4C06D2CDA039A892C9CE4BB9DC3043F73DCA274C6730E0732C6ECBBA52985657F526
39,032,183 UART: [art] PUB.Y = FE7452868FB09C4F64719033185A9932B0CCD321669A96CDE2216C55811AD0D949551EAF1FCF6886FE7020F41224D9BF
39,039,454 UART: [art] SIG.R = D0100D3D7E49C3592DA116A02777A7128EC74D182CE6DE0DD4F78F664F2C0D3D7AAE2FF40F72B7D60BBE6C4EC92F64A1
39,046,837 UART: [art] SIG.S = FD1E0C58C33E3CE0F50DFE99B56C07928529FA6323182CCDE8ECE47BECC3E96CA1944B31800CA2B6F3DB38D08BEAB51C
40,023,885 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
40,024,930 UART: mock_rt_interact::rt_entry...FMC Tester
40,396,419 UART: [rt] Runtime listening for mailbox commands...
40,399,411 >>> mbox cmd response data (336 bytes)
40,403,465 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,419,262 >>> mbox cmd response data (1536 bytes)
40,426,575 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,426,976 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
192,510 UART:
192,859 UART: Running Caliptra ROM ...
193,948 UART:
603,688 UART: [state] CFI Enabled
618,729 UART: [state] LifecycleState = Unprovisioned
621,909 UART: [state] DebugLocked = No
623,736 UART: [state] WD Timer not started. Device not locked for debugging
628,271 UART: [kat] SHA2-256
818,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,971 UART: [kat] ++
829,452 UART: [kat] sha1
841,389 UART: [kat] SHA2-256
844,466 UART: [kat] SHA2-384
849,689 UART: [kat] SHA2-512-ACC
852,340 UART: [kat] ECC-384
3,294,316 UART: [kat] HMAC-384Kdf
3,307,327 UART: [kat] LMS
3,839,120 UART: [kat] --
3,844,088 UART: [cold-reset] ++
3,846,165 UART: [fht] FHT @ 0x50003400
3,858,138 UART: [idev] ++
3,858,853 UART: [idev] CDI.KEYID = 6
3,859,886 UART: [idev] SUBJECT.KEYID = 7
3,860,988 UART: [idev] UDS.KEYID = 0
3,861,916 ready_for_fw is high
3,862,130 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,962,099 UART: [idev] Erasing UDS.KEYID = 0
6,335,619 UART: [idev] Sha1 KeyId Algorithm
6,358,514 UART: [idev] --
6,362,363 UART: [ldev] ++
6,363,095 UART: [ldev] CDI.KEYID = 6
6,363,982 UART: [ldev] SUBJECT.KEYID = 5
6,365,190 UART: [ldev] AUTHORITY.KEYID = 7
6,366,363 UART: [ldev] FE.KEYID = 1
6,375,868 UART: [ldev] Erasing FE.KEYID = 1
8,853,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,804 UART: [ldev] --
10,643,757 UART: [fwproc] Wait for Commands...
10,646,444 UART: [fwproc] Recv command 0x46574c44
10,648,746 UART: [fwproc] Recv'd Img size: 79496 bytes
13,669,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,744,940 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,868,587 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
14,193,852 >>> mbox cmd response: success
14,194,273 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,198,066 UART: [afmc] ++
14,198,760 UART: [afmc] CDI.KEYID = 6
14,200,001 UART: [afmc] SUBJECT.KEYID = 7
14,201,441 UART: [afmc] AUTHORITY.KEYID = 5
16,703,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,425,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,427,601 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,442,678 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,457,824 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,472,780 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,496,426 UART: [afmc] --
18,500,187 UART: [cold-reset] --
18,503,312 UART: [state] Locking Datavault
18,510,125 UART: [state] Locking PCR0, PCR1 and PCR31
18,512,325 UART: [state] Locking ICCM
18,514,042 UART: [exit] Launching FMC @ 0x40000130
18,522,719 UART:
18,522,950 UART: Running Caliptra FMC ...
18,524,052 UART:
18,524,214 UART: [state] CFI Enabled
18,532,375 UART: [fht] FMC Alias Private Key: 7
20,298,714 UART: [art] Extend RT PCRs Done
20,299,929 UART: [art] Lock RT PCRs Done
20,301,666 UART: [art] Populate DV Done
20,306,875 UART: [fht] FMC Alias Private Key: 7
20,308,494 UART: [art] Derive CDI
20,309,229 UART: [art] Store in slot 0x4
20,352,277 UART: [art] Derive Key Pair
20,353,283 UART: [art] Store priv key in slot 0x5
22,779,993 UART: [art] Derive Key Pair - Done
22,793,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,498,832 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,330 UART: [art] PUB.X = 5367D88318731BBAD5B24EA83DCD86E1A6A9B2B6EFD266B52B793C6EB4796BCFF42E8A1CCD1F1ADFCD0D877ADF8F9494
24,507,593 UART: [art] PUB.Y = 7E8F92954352554F87C2414DDBA59507C52EC5DDBA4127D23C9EA4D19255AB4A0DFA5881DC335ED12A9E8D1BC1ED3298
24,514,880 UART: [art] SIG.R = FD87B737D873565EFD0071D136B423A6BEA772695BB1AE06DE2B435202004551AFFAF0D88E1FF2A4313DC9C98424A01C
24,522,227 UART: [art] SIG.S = 779E1BCF50363C82DAE2F7D2A5627702531C7E4EAF5E68A6EAE5ACD2A398BEE346E66E8E4AAB284EB9EB5BED5B6A97D1
25,500,869 UART: mock_rt_interact::rt_entry...FMC Tester
25,632,629 UART: [rt] Runtime listening for mailbox commands...
25,636,906 >>> mbox cmd response data (2048 bytes)
25,646,806 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,648,506 >>> mbox cmd response data (336 bytes)
25,652,339 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,668,171 >>> mbox cmd response data (1536 bytes)
27,729,756 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
27,830,789 UART:
27,831,153 UART: Running Caliptra ROM ...
27,832,292 UART:
27,832,455 UART: [state] CFI Enabled
27,847,002 UART: [state] LifecycleState = Unprovisioned
27,848,844 UART: [state] DebugLocked = No
27,850,338 UART: [state] WD Timer not started. Device not locked for debugging
27,855,590 UART: [kat] SHA2-256
28,045,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,056,244 UART: [kat] ++
28,056,706 UART: [kat] sha1
28,067,905 UART: [kat] SHA2-256
28,070,878 UART: [kat] SHA2-384
28,075,747 UART: [kat] SHA2-512-ACC
28,078,316 UART: [kat] ECC-384
30,521,073 UART: [kat] HMAC-384Kdf
30,535,322 UART: [kat] LMS
31,066,926 UART: [kat] --
31,069,737 UART: [update-reset] ++
34,097,896 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,100,586 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
34,496,044 >>> mbox cmd response: success
34,496,547 UART: [update-reset] Copying MAN_2 To MAN_1
34,534,122 UART: [update-reset Success] --
34,537,821 UART: [state] Locking Datavault
34,541,412 UART: [state] Locking PCR0, PCR1 and PCR31
34,543,589 UART: [state] Locking ICCM
34,544,886 UART: [exit] Launching FMC @ 0x40000130
34,553,536 UART:
34,553,782 UART: Running Caliptra FMC ...
34,554,882 UART:
34,555,038 UART: [state] CFI Enabled
34,598,733 UART: [art] Extend RT PCRs Done
34,599,872 UART: [art] Lock RT PCRs Done
34,601,481 UART: [art] Populate DV Done
34,606,888 UART: [fht] FMC Alias Private Key: 7
34,608,477 UART: [art] Derive CDI
34,609,286 UART: [art] Store in slot 0x4
34,651,882 UART: [art] Derive Key Pair
34,652,920 UART: [art] Store priv key in slot 0x5
37,079,485 UART: [art] Derive Key Pair - Done
37,092,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,799,183 UART: [art] Erasing AUTHORITY.KEYID = 7
38,800,677 UART: [art] PUB.X = FE095563F157D0986C7D93E1636159572A64C0AC879FA1C992A823F1F8A8403BB50B87005B5A7251653766EFE19882D2
38,807,946 UART: [art] PUB.Y = 23C5D2C1309F7FF1CD26F91281AEF53A018A0467109C6264A28BE62399D9DF5F1FDE2B34A073388BAF5A7C47676F50AF
38,815,189 UART: [art] SIG.R = 1B87B7CE943BFA2A228E08250E0D1F835C15EB2324F34295FBD1BDECC090634791B596DA40AE1291755B6DBB60FB371D
38,822,586 UART: [art] SIG.S = 5FEA4259A4CA2E19F24766120F10E7E1D5BCFD6EEB3958ED3A0F84327355F1C3C4A586BE7F0AE4B772E011709BA95957
39,799,944 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,801,248 UART: mock_rt_interact::rt_entry...FMC Tester
40,177,059 UART: [rt] Runtime listening for mailbox commands...
40,179,985 >>> mbox cmd response data (336 bytes)
40,183,751 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,199,552 >>> mbox cmd response data (1536 bytes)
40,206,862 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,207,254 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,758,202 ready_for_fw is high
3,758,637 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
14,204,358 >>> mbox cmd response: success
14,205,018 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,453,914 UART:
18,454,293 UART: Running Caliptra FMC ...
18,455,570 UART:
18,455,733 UART: [state] CFI Enabled
18,463,342 UART: [fht] FMC Alias Private Key: 7
20,229,553 UART: [art] Extend RT PCRs Done
20,230,759 UART: [art] Lock RT PCRs Done
20,232,597 UART: [art] Populate DV Done
20,238,015 UART: [fht] FMC Alias Private Key: 7
20,239,716 UART: [art] Derive CDI
20,240,526 UART: [art] Store in slot 0x4
20,283,229 UART: [art] Derive Key Pair
20,284,265 UART: [art] Store priv key in slot 0x5
22,710,698 UART: [art] Derive Key Pair - Done
22,723,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,429,987 UART: [art] Erasing AUTHORITY.KEYID = 7
24,431,640 UART: [art] PUB.X = 69F617A9B5DE04C6E3F21C4162C3779D1F0A96858FC1C6B6A3101F6F43CA8EE6B0FC8326F76ACD8ACE7961FAE65DB32A
24,438,785 UART: [art] PUB.Y = 665BCB31AD2B1BAF3F1C307CF1BDD9DB7B9CAABE054B663430A16E09718FDE109CDFAEED43FCC467BFC4DE1487D36D57
24,446,097 UART: [art] SIG.R = B707DAC1DE74C97E8751ED0FF3BFBDB39DE18E7626728AAF2208F1AB43D6B1E927D12FF3A4E5FE0C1CC5FA50E47D309F
24,453,510 UART: [art] SIG.S = 2FB926B1C5DDDBBD011788566DE3F2CF0CAA29B1876264CCC5EA9B0BD8A278B68A90BD4E5D7F4DE151435F26D1705148
25,431,835 UART: mock_rt_interact::rt_entry...FMC Tester
25,564,776 UART: [rt] Runtime listening for mailbox commands...
25,569,053 >>> mbox cmd response data (2048 bytes)
25,578,756 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,580,469 >>> mbox cmd response data (336 bytes)
25,584,361 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,600,161 >>> mbox cmd response data (1536 bytes)
27,668,746 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
34,610,135 >>> mbox cmd response: success
34,642,614 UART:
34,642,912 UART: Running Caliptra FMC ...
34,644,028 UART:
34,644,199 UART: [state] CFI Enabled
34,688,394 UART: [art] Extend RT PCRs Done
34,689,583 UART: [art] Lock RT PCRs Done
34,690,938 UART: [art] Populate DV Done
34,696,509 UART: [fht] FMC Alias Private Key: 7
34,698,211 UART: [art] Derive CDI
34,699,027 UART: [art] Store in slot 0x4
34,741,637 UART: [art] Derive Key Pair
34,742,636 UART: [art] Store priv key in slot 0x5
37,169,115 UART: [art] Derive Key Pair - Done
37,181,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,888,085 UART: [art] Erasing AUTHORITY.KEYID = 7
38,889,622 UART: [art] PUB.X = 40539003970CC5BB4A513C2BAFB34F36E80DA3A47C0236582A0EC24614F26B81AC63E9A8746FC794C1D9428DA50FC58F
38,896,819 UART: [art] PUB.Y = 37600684424185C83DBE34B1B34F55B0950F5C27A835FFE3E6AE64511D6042963BC9C136B36DE3B4FB0B81E603A50E80
38,904,106 UART: [art] SIG.R = 618D99B973DA1EBE485638AC1547AA9F83A5C80543F942CC13415404F05950B4C7CF5EEA8C8C280602FA6DF3C3378C48
38,911,530 UART: [art] SIG.S = BE553A4BD9D09BB71A985451BF0FC48D8A02BBE028A37AF2C80C90964EC5ECF2E9896DEF266CC2FAA9FE541116B9C58B
39,888,507 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,889,416 UART: mock_rt_interact::rt_entry...FMC Tester
40,260,655 UART: [rt] Runtime listening for mailbox commands...
40,263,633 >>> mbox cmd response data (336 bytes)
40,267,375 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,283,201 >>> mbox cmd response data (1536 bytes)
40,290,538 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,290,937 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,149 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,697 UART: [kat] SHA2-256
881,628 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,743 UART: [kat] ++
885,895 UART: [kat] sha1
889,983 UART: [kat] SHA2-256
891,921 UART: [kat] SHA2-384
894,786 UART: [kat] SHA2-512-ACC
896,687 UART: [kat] ECC-384
902,556 UART: [kat] HMAC-384Kdf
907,160 UART: [kat] LMS
1,475,356 UART: [kat] --
1,476,041 UART: [cold-reset] ++
1,476,421 UART: [fht] Storing FHT @ 0x50003400
1,479,014 UART: [idev] ++
1,479,182 UART: [idev] CDI.KEYID = 6
1,479,542 UART: [idev] SUBJECT.KEYID = 7
1,479,966 UART: [idev] UDS.KEYID = 0
1,480,311 ready_for_fw is high
1,480,311 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,488,058 UART: [idev] Erasing UDS.KEYID = 0
1,504,476 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,976 UART: [idev] --
1,514,019 UART: [ldev] ++
1,514,187 UART: [ldev] CDI.KEYID = 6
1,514,550 UART: [ldev] SUBJECT.KEYID = 5
1,514,976 UART: [ldev] AUTHORITY.KEYID = 7
1,515,439 UART: [ldev] FE.KEYID = 1
1,520,785 UART: [ldev] Erasing FE.KEYID = 1
1,546,154 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,162 UART: [ldev] --
1,585,629 UART: [fwproc] Waiting for Commands...
1,586,402 UART: [fwproc] Received command 0x46574c44
1,587,193 UART: [fwproc] Received Image of size 79496 bytes
2,484,654 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,511,468 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,542,686 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
2,624,421 >>> mbox cmd response: success
2,624,421 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,625,651 UART: [afmc] ++
2,625,819 UART: [afmc] CDI.KEYID = 6
2,626,181 UART: [afmc] SUBJECT.KEYID = 7
2,626,606 UART: [afmc] AUTHORITY.KEYID = 5
2,661,145 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,677,141 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,677,921 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,683,630 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,689,513 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,695,196 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,703,168 UART: [afmc] --
2,704,124 UART: [cold-reset] --
2,704,906 UART: [state] Locking Datavault
2,705,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,706,491 UART: [state] Locking ICCM
2,707,147 UART: [exit] Launching FMC @ 0x40000130
2,712,477 UART:
2,712,493 UART: Running Caliptra FMC ...
2,712,901 UART:
2,712,955 UART: [state] CFI Enabled
2,723,477 UART: [fht] FMC Alias Private Key: 7
2,842,463 UART: [art] Extend RT PCRs Done
2,842,891 UART: [art] Lock RT PCRs Done
2,844,471 UART: [art] Populate DV Done
2,852,658 UART: [fht] FMC Alias Private Key: 7
2,853,678 UART: [art] Derive CDI
2,853,958 UART: [art] Store in slot 0x4
2,939,462 UART: [art] Derive Key Pair
2,939,822 UART: [art] Store priv key in slot 0x5
2,952,789 UART: [art] Derive Key Pair - Done
2,967,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,983,086 UART: [art] Erasing AUTHORITY.KEYID = 7
2,983,851 UART: [art] PUB.X = F5BBD752103A984CFFEBDDBF245689878CAA391DBC56C103FE0ADB014CC85307229F8FC5C39A864F705A6C0DA58B5AD5
2,990,626 UART: [art] PUB.Y = 5E5F58E38F59F0816B6D03A8899CA55F5044C9FE40C6FC4D498F41F732300B5C8C4808F2290BAAF8A4DF17EC13AB2014
2,997,572 UART: [art] SIG.R = 0294D249A7FDC769DC08B88DDE26C9F5AA6F58FCB0B8C1CC252511813C56595740389AB04A06A538961D5860A7F198A1
3,004,335 UART: [art] SIG.S = A1EDF5553A69A6851B437F49349894A803E0FD072C5B11DAB9038603735D1167B6A9F80A9D1741017ECD1257C9EFE1A8
3,028,101 UART: mock_rt_interact::rt_entry...FMC Tester
3,146,840 UART: [rt] Runtime listening for mailbox commands...
3,150,230 >>> mbox cmd response data (2048 bytes)
3,150,231 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,151,463 >>> mbox cmd response data (336 bytes)
3,151,464 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,164,055 >>> mbox cmd response data (1536 bytes)
3,164,056 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,164,162 UART:
3,164,178 UART: Running Caliptra ROM ...
3,164,586 UART:
3,164,640 UART: [state] CFI Enabled
3,167,060 UART: [state] LifecycleState = Unprovisioned
3,167,715 UART: [state] DebugLocked = No
3,168,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,169,960 UART: [kat] SHA2-256
3,963,891 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,968,006 UART: [kat] ++
3,968,158 UART: [kat] sha1
3,972,342 UART: [kat] SHA2-256
3,974,280 UART: [kat] SHA2-384
3,976,979 UART: [kat] SHA2-512-ACC
3,978,879 UART: [kat] ECC-384
3,984,660 UART: [kat] HMAC-384Kdf
3,989,240 UART: [kat] LMS
4,557,436 UART: [kat] --
4,558,321 UART: [update-reset] ++
5,492,542 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,493,678 UART: [update-reset] Loading Runtime at address 0x40005000 len 53568
5,590,367 >>> mbox cmd response: success
5,590,724 UART: [update-reset] Copying MAN_2 To MAN_1
5,598,738 UART: [update-reset Success] --
5,599,667 UART: [state] Locking Datavault
5,600,477 UART: [state] Locking PCR0, PCR1 and PCR31
5,601,081 UART: [state] Locking ICCM
5,601,653 UART: [exit] Launching FMC @ 0x40000130
5,606,983 UART:
5,606,999 UART: Running Caliptra FMC ...
5,607,407 UART:
5,607,461 UART: [state] CFI Enabled
5,696,312 UART: [art] Extend RT PCRs Done
5,696,740 UART: [art] Lock RT PCRs Done
5,698,081 UART: [art] Populate DV Done
5,706,420 UART: [fht] FMC Alias Private Key: 7
5,707,428 UART: [art] Derive CDI
5,707,708 UART: [art] Store in slot 0x4
5,793,364 UART: [art] Derive Key Pair
5,793,724 UART: [art] Store priv key in slot 0x5
5,806,637 UART: [art] Derive Key Pair - Done
5,821,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,836,938 UART: [art] Erasing AUTHORITY.KEYID = 7
5,837,703 UART: [art] PUB.X = AC585D8B00F264E221632DD20CE0FE91AB5BCAC6A53E33F1C934FCCB659D186686B8AA5DD8EA4E3BBEFA71389E3E7CF6
5,844,474 UART: [art] PUB.Y = DEA612C1E8270F5D1E0F1067ED75F5A8E8766B6BE1ED7AD16DC2C80B4860402784BA8E3A94CE3F5A633101A15A9D9F60
5,851,424 UART: [art] SIG.R = B20D5F4FFF002AA03F73447C603E17B7C590123665CDE205FC6AE5E5740A606BD632CA3B8C254B7ED3FF91BA404D51EF
5,858,177 UART: [art] SIG.S = 3CA85F10A4458BAA9FC1DCFAE14BC1FCBC25F9985E131FA7EA7A80FE5F0427899B406F5456E7E614F74661A4BCFA5E6B
5,881,061 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,882,084 UART: mock_rt_interact::rt_entry...FMC Tester
6,245,811 UART: [rt] Runtime listening for mailbox commands...
6,247,846 >>> mbox cmd response data (336 bytes)
6,247,847 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,260,438 >>> mbox cmd response data (1536 bytes)
6,260,439 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,260,456 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,947 ready_for_fw is high
1,361,947 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,473,851 >>> mbox cmd response: success
2,473,851 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,534,616 UART:
2,534,632 UART: Running Caliptra FMC ...
2,535,040 UART:
2,535,094 UART: [state] CFI Enabled
2,545,570 UART: [fht] FMC Alias Private Key: 7
2,665,062 UART: [art] Extend RT PCRs Done
2,665,490 UART: [art] Lock RT PCRs Done
2,667,210 UART: [art] Populate DV Done
2,675,669 UART: [fht] FMC Alias Private Key: 7
2,676,793 UART: [art] Derive CDI
2,677,073 UART: [art] Store in slot 0x4
2,762,453 UART: [art] Derive Key Pair
2,762,813 UART: [art] Store priv key in slot 0x5
2,775,560 UART: [art] Derive Key Pair - Done
2,790,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,805,610 UART: [art] Erasing AUTHORITY.KEYID = 7
2,806,375 UART: [art] PUB.X = AAED6E4CA5C34171520933DFF89A54557007889EDDB63E438A01BECAB00D8CFC6837AC2E9659C0072020221632A0193F
2,813,134 UART: [art] PUB.Y = 76AB956999A5A57ABB24C632880158753860D68CF773E6C436DD745B1ECF5629AF42839AEC9F34A37E92075D7A63B6AD
2,820,080 UART: [art] SIG.R = EF222AC113539D353FA05BDC3F09B5D4DEC5FE087D710BB92E487F1773AD0D170FDEA70FACD4F7EB5B841111C9B578B0
2,826,852 UART: [art] SIG.S = D14E13E3AEC20D157343D58DA8DAB6FFB71017B018D1EFA26365261F19722BF85A0F4088F843B6A155ADE278BC8AB2AE
2,851,216 UART: mock_rt_interact::rt_entry...FMC Tester
2,971,304 UART: [rt] Runtime listening for mailbox commands...
2,974,694 >>> mbox cmd response data (2048 bytes)
2,974,695 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,975,927 >>> mbox cmd response data (336 bytes)
2,975,928 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,988,519 >>> mbox cmd response data (1536 bytes)
2,988,520 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
5,296,845 >>> mbox cmd response: success
5,309,939 UART:
5,309,955 UART: Running Caliptra FMC ...
5,310,363 UART:
5,310,417 UART: [state] CFI Enabled
5,399,644 UART: [art] Extend RT PCRs Done
5,400,072 UART: [art] Lock RT PCRs Done
5,401,473 UART: [art] Populate DV Done
5,409,806 UART: [fht] FMC Alias Private Key: 7
5,410,966 UART: [art] Derive CDI
5,411,246 UART: [art] Store in slot 0x4
5,496,748 UART: [art] Derive Key Pair
5,497,108 UART: [art] Store priv key in slot 0x5
5,510,449 UART: [art] Derive Key Pair - Done
5,525,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,540,636 UART: [art] Erasing AUTHORITY.KEYID = 7
5,541,401 UART: [art] PUB.X = 8FA3CE2AFC0FE3EECBD9F1901D4D9AE86648749682D1E491BF0217F61027109AB1CDFA722131EF5EDCE1C0C23BF8FF20
5,548,187 UART: [art] PUB.Y = 4000C876115CF8C1EB54619B6AB66E73FD421D41FA5EE005E045B02B45DB32F38578EDB6F7D848133DFF5D615EBB1134
5,555,120 UART: [art] SIG.R = 3142569CB11F750998488C764C3DCD17A0363EA02D3DEC1F3BFE3BE2630971DCEE138729EC4F8151A52D5FF0356FD2B0
5,561,892 UART: [art] SIG.S = 20DDAC35D905E3C3957DA13E2BD672834B99FC5E38A4C78A19B47094D4F198E57766A863047244BD25279A7F3B320EE8
5,584,590 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,585,607 UART: mock_rt_interact::rt_entry...FMC Tester
5,954,029 UART: [rt] Runtime listening for mailbox commands...
5,956,064 >>> mbox cmd response data (336 bytes)
5,956,065 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,968,656 >>> mbox cmd response data (1536 bytes)
5,968,657 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,968,674 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,500 UART: [kat] SHA2-256
882,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,546 UART: [kat] ++
886,698 UART: [kat] sha1
890,986 UART: [kat] SHA2-256
892,924 UART: [kat] SHA2-384
895,621 UART: [kat] SHA2-512-ACC
897,522 UART: [kat] ECC-384
902,813 UART: [kat] HMAC-384Kdf
907,315 UART: [kat] LMS
1,475,511 UART: [kat] --
1,476,502 UART: [cold-reset] ++
1,476,898 UART: [fht] Storing FHT @ 0x50003400
1,479,671 UART: [idev] ++
1,479,839 UART: [idev] CDI.KEYID = 6
1,480,199 UART: [idev] SUBJECT.KEYID = 7
1,480,623 UART: [idev] UDS.KEYID = 0
1,480,968 ready_for_fw is high
1,480,968 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,488,413 UART: [idev] Erasing UDS.KEYID = 0
1,505,317 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,887 UART: [idev] --
1,514,902 UART: [ldev] ++
1,515,070 UART: [ldev] CDI.KEYID = 6
1,515,433 UART: [ldev] SUBJECT.KEYID = 5
1,515,859 UART: [ldev] AUTHORITY.KEYID = 7
1,516,322 UART: [ldev] FE.KEYID = 1
1,521,760 UART: [ldev] Erasing FE.KEYID = 1
1,547,553 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,913 UART: [ldev] --
1,587,268 UART: [fwproc] Waiting for Commands...
1,588,123 UART: [fwproc] Received command 0x46574c44
1,588,914 UART: [fwproc] Received Image of size 79496 bytes
2,486,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,513,901 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,545,119 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
2,626,868 >>> mbox cmd response: success
2,626,868 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,627,886 UART: [afmc] ++
2,628,054 UART: [afmc] CDI.KEYID = 6
2,628,416 UART: [afmc] SUBJECT.KEYID = 7
2,628,841 UART: [afmc] AUTHORITY.KEYID = 5
2,664,500 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,680,582 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,681,362 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,687,071 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,692,954 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,698,637 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,706,637 UART: [afmc] --
2,707,761 UART: [cold-reset] --
2,708,531 UART: [state] Locking Datavault
2,710,012 UART: [state] Locking PCR0, PCR1 and PCR31
2,710,616 UART: [state] Locking ICCM
2,711,254 UART: [exit] Launching FMC @ 0x40000130
2,716,584 UART:
2,716,600 UART: Running Caliptra FMC ...
2,717,008 UART:
2,717,151 UART: [state] CFI Enabled
2,727,895 UART: [fht] FMC Alias Private Key: 7
2,846,865 UART: [art] Extend RT PCRs Done
2,847,293 UART: [art] Lock RT PCRs Done
2,848,473 UART: [art] Populate DV Done
2,856,818 UART: [fht] FMC Alias Private Key: 7
2,857,820 UART: [art] Derive CDI
2,858,100 UART: [art] Store in slot 0x4
2,943,804 UART: [art] Derive Key Pair
2,944,164 UART: [art] Store priv key in slot 0x5
2,957,545 UART: [art] Derive Key Pair - Done
2,972,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,987,764 UART: [art] Erasing AUTHORITY.KEYID = 7
2,988,529 UART: [art] PUB.X = 306A3CB657C998B78422DBE6C071056ADFE03D13236916C4607F37D7B9D357AE502B2886511065E5EC864AF091E6896F
2,995,292 UART: [art] PUB.Y = B40D1DE0A50C2AF34F62D099DE766BB2EE9FD8D8EF1259D0744B642AE735281914874929A3BC47B212B60EB9689711FD
3,002,239 UART: [art] SIG.R = 1F1DA14249ECEB63D00058C3D45CAB8104BA81B7A66A27B1AC374C9C0B9D89965BCACA9DDB47303DB506CE09A76D6629
3,008,991 UART: [art] SIG.S = 5EA3FD04B74DAD23464F469B4CFB145DB7F5447C1ECA4BADDFFBDC3E0D9EB2BA3EC9913BC3262D23CC373A76D99EC039
3,032,607 UART: mock_rt_interact::rt_entry...FMC Tester
3,152,599 UART: [rt] Runtime listening for mailbox commands...
3,155,989 >>> mbox cmd response data (2048 bytes)
3,155,990 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,157,222 >>> mbox cmd response data (336 bytes)
3,157,223 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,169,814 >>> mbox cmd response data (1536 bytes)
3,169,815 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,169,921 UART:
3,169,937 UART: Running Caliptra ROM ...
3,170,345 UART:
3,170,486 UART: [state] CFI Enabled
3,173,082 UART: [state] LifecycleState = Unprovisioned
3,173,737 UART: [state] DebugLocked = No
3,174,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,175,926 UART: [kat] SHA2-256
3,969,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,973,972 UART: [kat] ++
3,974,124 UART: [kat] sha1
3,978,244 UART: [kat] SHA2-256
3,980,182 UART: [kat] SHA2-384
3,982,981 UART: [kat] SHA2-512-ACC
3,984,881 UART: [kat] ECC-384
3,990,634 UART: [kat] HMAC-384Kdf
3,995,066 UART: [kat] LMS
4,563,262 UART: [kat] --
4,564,175 UART: [update-reset] ++
5,497,938 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,499,162 UART: [update-reset] Loading Runtime at address 0x40005000 len 53568
5,595,851 >>> mbox cmd response: success
5,596,112 UART: [update-reset] Copying MAN_2 To MAN_1
5,604,126 UART: [update-reset Success] --
5,605,051 UART: [state] Locking Datavault
5,605,631 UART: [state] Locking PCR0, PCR1 and PCR31
5,606,235 UART: [state] Locking ICCM
5,606,867 UART: [exit] Launching FMC @ 0x40000130
5,612,197 UART:
5,612,213 UART: Running Caliptra FMC ...
5,612,621 UART:
5,612,764 UART: [state] CFI Enabled
5,701,961 UART: [art] Extend RT PCRs Done
5,702,389 UART: [art] Lock RT PCRs Done
5,703,602 UART: [art] Populate DV Done
5,711,995 UART: [fht] FMC Alias Private Key: 7
5,713,171 UART: [art] Derive CDI
5,713,451 UART: [art] Store in slot 0x4
5,798,863 UART: [art] Derive Key Pair
5,799,223 UART: [art] Store priv key in slot 0x5
5,812,374 UART: [art] Derive Key Pair - Done
5,827,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,842,979 UART: [art] Erasing AUTHORITY.KEYID = 7
5,843,744 UART: [art] PUB.X = 4A9CEDEAB744112EADFCACBE2EE94DDEF8567BF1F42F82014B3DD2A83F586FE530498BB0958A0CB5A2ACC13BF08B0905
5,850,530 UART: [art] PUB.Y = AB65724542016B152F68EB786D0CF25F25F6FBB7B674DF46FD376D06DC3E6F90FBCAC48A7D6FD3D234494DA3FFD0BFAA
5,857,495 UART: [art] SIG.R = 09542F55E54BC88380DA85C17A6E0BCE209E439DCB9B70E42AC5B38141EB83C48765B130F11EDBE25C0167BC2015B4C3
5,864,264 UART: [art] SIG.S = A4BF947AE534211A51BC0E02AE489D618182A4413E89C02CF874A47FAA84187805C946B02C5397CB2CABCDED4DBC08C6
5,886,267 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,887,404 UART: mock_rt_interact::rt_entry...FMC Tester
6,248,963 UART: [rt] Runtime listening for mailbox commands...
6,250,998 >>> mbox cmd response data (336 bytes)
6,250,999 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,263,590 >>> mbox cmd response data (1536 bytes)
6,263,591 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,263,608 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,392 ready_for_fw is high
1,363,392 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,475,794 >>> mbox cmd response: success
2,475,794 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,537,297 UART:
2,537,313 UART: Running Caliptra FMC ...
2,537,721 UART:
2,537,864 UART: [state] CFI Enabled
2,548,344 UART: [fht] FMC Alias Private Key: 7
2,667,558 UART: [art] Extend RT PCRs Done
2,667,986 UART: [art] Lock RT PCRs Done
2,669,634 UART: [art] Populate DV Done
2,677,751 UART: [fht] FMC Alias Private Key: 7
2,678,825 UART: [art] Derive CDI
2,679,105 UART: [art] Store in slot 0x4
2,764,965 UART: [art] Derive Key Pair
2,765,325 UART: [art] Store priv key in slot 0x5
2,778,364 UART: [art] Derive Key Pair - Done
2,793,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,809,006 UART: [art] Erasing AUTHORITY.KEYID = 7
2,809,771 UART: [art] PUB.X = 0E998F207B13738778392628BBE2A052ABDAF6D4354439B4458BFC5711C8B185AD3138BCA12AD72EBDC767E361F2E7F1
2,816,544 UART: [art] PUB.Y = 5DB48177B123AC5D0016004478E6DFBA8CB22842881DED6052CA0EF39C96024FB02CCE9F200FFF97E2E4FD7927847B40
2,823,449 UART: [art] SIG.R = 588417DFA21E332D239A6D410EC6A4D232E450A058C5975DF0080D10EB4EA3566BE778DD11EAAB715FD201A7B7891AB3
2,830,215 UART: [art] SIG.S = 828D00478344C9BA9708808D6CAA1DAF1457B31CB051BFF85958D2535B04F80046028A6EB0E39105EC962D73337591E9
2,854,187 UART: mock_rt_interact::rt_entry...FMC Tester
2,974,880 UART: [rt] Runtime listening for mailbox commands...
2,978,270 >>> mbox cmd response data (2048 bytes)
2,978,271 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,979,503 >>> mbox cmd response data (336 bytes)
2,979,504 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,992,095 >>> mbox cmd response data (1536 bytes)
2,992,096 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
5,300,144 >>> mbox cmd response: success
5,313,172 UART:
5,313,188 UART: Running Caliptra FMC ...
5,313,596 UART:
5,313,739 UART: [state] CFI Enabled
5,402,638 UART: [art] Extend RT PCRs Done
5,403,066 UART: [art] Lock RT PCRs Done
5,404,465 UART: [art] Populate DV Done
5,412,778 UART: [fht] FMC Alias Private Key: 7
5,413,932 UART: [art] Derive CDI
5,414,212 UART: [art] Store in slot 0x4
5,500,178 UART: [art] Derive Key Pair
5,500,538 UART: [art] Store priv key in slot 0x5
5,513,787 UART: [art] Derive Key Pair - Done
5,528,546 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,544,071 UART: [art] Erasing AUTHORITY.KEYID = 7
5,544,836 UART: [art] PUB.X = E473C6607FD5429F9172E1BB67EE90E201904A7013829E1798C8BE3A7EB399412C7A0111731524F02D4BB0F18C9995D3
5,551,594 UART: [art] PUB.Y = AC136CC090FAFB8FC8E9C583190130528684E2C2AA30F83E03220C1AFCA88990B7423FC0C9B24299BDEB0C971214223D
5,558,538 UART: [art] SIG.R = 75DA74A7F6785FE8221C6C976578C4D9808FAAC111317562FA25B2B7CE6C17367DB8CEEC4AFC7074C6F77DF008B28DCC
5,565,319 UART: [art] SIG.S = AAB8A5406B59D3D6C96B7BE6E7BF7D7D0F3FC03A17AF266DF512B7DCB5DCCB7C55ABB5BC1A675AB73F4692E7A2AABE57
5,588,349 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,589,414 UART: mock_rt_interact::rt_entry...FMC Tester
5,956,147 UART: [rt] Runtime listening for mailbox commands...
5,958,182 >>> mbox cmd response data (336 bytes)
5,958,183 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,970,774 >>> mbox cmd response data (1536 bytes)
5,970,775 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,970,792 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,529 UART: [kat] SHA2-512-ACC
906,430 UART: [kat] ECC-384
916,147 UART: [kat] HMAC-384Kdf
920,817 UART: [kat] LMS
1,169,129 UART: [kat] --
1,170,412 UART: [cold-reset] ++
1,170,760 UART: [fht] FHT @ 0x50003400
1,173,534 UART: [idev] ++
1,173,702 UART: [idev] CDI.KEYID = 6
1,174,063 UART: [idev] SUBJECT.KEYID = 7
1,174,488 UART: [idev] UDS.KEYID = 0
1,174,834 ready_for_fw is high
1,174,834 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,182,677 UART: [idev] Erasing UDS.KEYID = 0
1,199,981 UART: [idev] Sha1 KeyId Algorithm
1,208,915 UART: [idev] --
1,210,046 UART: [ldev] ++
1,210,214 UART: [ldev] CDI.KEYID = 6
1,210,578 UART: [ldev] SUBJECT.KEYID = 5
1,211,005 UART: [ldev] AUTHORITY.KEYID = 7
1,211,468 UART: [ldev] FE.KEYID = 1
1,216,822 UART: [ldev] Erasing FE.KEYID = 1
1,242,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,596 UART: [ldev] --
1,282,051 UART: [fwproc] Wait for Commands...
1,282,676 UART: [fwproc] Recv command 0x46574c44
1,283,409 UART: [fwproc] Recv'd Img size: 79496 bytes
2,179,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,206,802 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,237,977 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,319,672 >>> mbox cmd response: success
2,319,672 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,320,848 UART: [afmc] ++
2,321,016 UART: [afmc] CDI.KEYID = 6
2,321,379 UART: [afmc] SUBJECT.KEYID = 7
2,321,805 UART: [afmc] AUTHORITY.KEYID = 5
2,357,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,373,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,374,646 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,380,356 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,386,237 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,391,938 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,399,731 UART: [afmc] --
2,400,620 UART: [cold-reset] --
2,401,448 UART: [state] Locking Datavault
2,402,281 UART: [state] Locking PCR0, PCR1 and PCR31
2,402,885 UART: [state] Locking ICCM
2,403,307 UART: [exit] Launching FMC @ 0x40000130
2,408,637 UART:
2,408,653 UART: Running Caliptra FMC ...
2,409,061 UART:
2,409,115 UART: [state] CFI Enabled
2,419,525 UART: [fht] FMC Alias Private Key: 7
2,538,745 UART: [art] Extend RT PCRs Done
2,539,173 UART: [art] Lock RT PCRs Done
2,540,667 UART: [art] Populate DV Done
2,548,876 UART: [fht] FMC Alias Private Key: 7
2,549,924 UART: [art] Derive CDI
2,550,204 UART: [art] Store in slot 0x4
2,636,053 UART: [art] Derive Key Pair
2,636,413 UART: [art] Store priv key in slot 0x5
2,649,693 UART: [art] Derive Key Pair - Done
2,664,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,679,774 UART: [art] Erasing AUTHORITY.KEYID = 7
2,680,539 UART: [art] PUB.X = 7F40BB6C2AD61E6EA4F011ED81334A872A017606040E5206B98EF36F6D1206E7809FC150DC33D655EF0AC73912E252E6
2,687,290 UART: [art] PUB.Y = 9BC9A35C9CCF94EA08344F174E458CA164349248E54CA2DCAA7CD21A097E1E51526632224CF9DDB07D621D6830B61CEA
2,694,244 UART: [art] SIG.R = 4630384ACDE43BF94C3BB2A329B968B016646682E1FA725885C8AC4DA017D8A54AABA5746510DC96B6FFE44DC7E66584
2,701,022 UART: [art] SIG.S = FF2620A82337F2961A4E0133E7DAB105C9258FAB361A3C4A4C29B997BA176B8C3545FB6EAF33CECAE2443C4AB5B7EEDA
2,724,860 UART: mock_rt_interact::rt_entry...FMC Tester
2,844,062 UART: [rt] Runtime listening for mailbox commands...
2,847,452 >>> mbox cmd response data (2048 bytes)
2,847,453 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,848,685 >>> mbox cmd response data (336 bytes)
2,848,686 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,861,277 >>> mbox cmd response data (1536 bytes)
2,861,278 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,861,381 UART:
2,861,397 UART: Running Caliptra ROM ...
2,861,805 UART:
2,861,860 UART: [state] CFI Enabled
2,864,722 UART: [state] LifecycleState = Unprovisioned
2,865,377 UART: [state] DebugLocked = No
2,865,865 UART: [state] WD Timer not started. Device not locked for debugging
2,867,001 UART: [kat] SHA2-256
3,670,551 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,674,655 UART: [kat] ++
3,674,807 UART: [kat] sha1
3,679,175 UART: [kat] SHA2-256
3,681,115 UART: [kat] SHA2-384
3,683,914 UART: [kat] SHA2-512-ACC
3,685,814 UART: [kat] ECC-384
3,695,595 UART: [kat] HMAC-384Kdf
3,700,239 UART: [kat] LMS
3,948,551 UART: [kat] --
3,949,283 UART: [update-reset] ++
4,860,637 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,861,828 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
4,958,465 >>> mbox cmd response: success
4,958,816 UART: [update-reset] Copying MAN_2 To MAN_1
4,966,830 UART: [update-reset Success] --
4,968,017 UART: [state] Locking Datavault
4,968,781 UART: [state] Locking PCR0, PCR1 and PCR31
4,969,385 UART: [state] Locking ICCM
4,969,917 UART: [exit] Launching FMC @ 0x40000130
4,975,247 UART:
4,975,263 UART: Running Caliptra FMC ...
4,975,671 UART:
4,975,725 UART: [state] CFI Enabled
5,064,780 UART: [art] Extend RT PCRs Done
5,065,208 UART: [art] Lock RT PCRs Done
5,066,213 UART: [art] Populate DV Done
5,074,300 UART: [fht] FMC Alias Private Key: 7
5,075,400 UART: [art] Derive CDI
5,075,680 UART: [art] Store in slot 0x4
5,161,481 UART: [art] Derive Key Pair
5,161,841 UART: [art] Store priv key in slot 0x5
5,174,857 UART: [art] Derive Key Pair - Done
5,189,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,205,339 UART: [art] Erasing AUTHORITY.KEYID = 7
5,206,104 UART: [art] PUB.X = 3C5C66EFF2B480C9B4A8CD4B60E12B129617F49C7AF6F0AAFD7C0E46C2170DEE25246066010524659C9853E08001F6C7
5,212,863 UART: [art] PUB.Y = F6A7D16D4EF818AC787A694BDEA6E989370ED5C9C9D1A8A2D31336001A86FC3A8AAC213D8D00A87B388503503C6DC950
5,219,773 UART: [art] SIG.R = 58B366791CC5310F99FC42C47144BB31FAA640F8583808A833E32E142B0CE46D4CF8E7BED558B4428DE32F7FA48E1B71
5,226,540 UART: [art] SIG.S = F682B0E7B60A08EEDECA26533288D017491C84500A0AAE3F3E75D1428AFE1EAD365BA316D138FE7235E0F181A664A188
5,249,303 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,250,558 UART: mock_rt_interact::rt_entry...FMC Tester
5,613,388 UART: [rt] Runtime listening for mailbox commands...
5,615,423 >>> mbox cmd response data (336 bytes)
5,615,424 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,628,015 >>> mbox cmd response data (1536 bytes)
5,628,016 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,628,033 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,796 ready_for_fw is high
1,059,796 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,173,825 >>> mbox cmd response: success
2,173,825 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,236,628 UART:
2,236,644 UART: Running Caliptra FMC ...
2,237,052 UART:
2,237,106 UART: [state] CFI Enabled
2,247,480 UART: [fht] FMC Alias Private Key: 7
2,366,570 UART: [art] Extend RT PCRs Done
2,366,998 UART: [art] Lock RT PCRs Done
2,368,472 UART: [art] Populate DV Done
2,376,967 UART: [fht] FMC Alias Private Key: 7
2,378,081 UART: [art] Derive CDI
2,378,361 UART: [art] Store in slot 0x4
2,463,750 UART: [art] Derive Key Pair
2,464,110 UART: [art] Store priv key in slot 0x5
2,477,086 UART: [art] Derive Key Pair - Done
2,491,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,507,170 UART: [art] Erasing AUTHORITY.KEYID = 7
2,507,935 UART: [art] PUB.X = DD527F17E3AC0FF44ECDFE4DB4C874B6D4868226D0F210E13A638ED5DC674D10056B66433DA8F744A9983683FAF194BA
2,514,711 UART: [art] PUB.Y = 4752493729D4631CD81E533E86AC2430263F0488AEE2834B371412142D885C4123EA7C326ACE980C16B4F03A6523DF6D
2,521,647 UART: [art] SIG.R = 966CA1F1E2E097345A31D26EF608DDE438A9CE69509E028DD1EA7E0B6787922BC705ADFE3D06D2762D687DB6A1CA332A
2,528,414 UART: [art] SIG.S = 0377B42A40B81F82778D9405420CFD781F4F8D55F56D2EB9E4EB8740848334D222A2C9E1921640A4900508902B20B7A0
2,552,545 UART: mock_rt_interact::rt_entry...FMC Tester
2,671,527 UART: [rt] Runtime listening for mailbox commands...
2,674,917 >>> mbox cmd response data (2048 bytes)
2,674,918 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,676,150 >>> mbox cmd response data (336 bytes)
2,676,151 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,688,742 >>> mbox cmd response data (1536 bytes)
2,688,743 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,671,550 >>> mbox cmd response: success
4,684,797 UART:
4,684,813 UART: Running Caliptra FMC ...
4,685,221 UART:
4,685,275 UART: [state] CFI Enabled
4,774,708 UART: [art] Extend RT PCRs Done
4,775,136 UART: [art] Lock RT PCRs Done
4,776,449 UART: [art] Populate DV Done
4,784,380 UART: [fht] FMC Alias Private Key: 7
4,785,466 UART: [art] Derive CDI
4,785,746 UART: [art] Store in slot 0x4
4,871,785 UART: [art] Derive Key Pair
4,872,145 UART: [art] Store priv key in slot 0x5
4,885,609 UART: [art] Derive Key Pair - Done
4,900,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,915,864 UART: [art] Erasing AUTHORITY.KEYID = 7
4,916,629 UART: [art] PUB.X = DFE7BCA3FEACF7F91755D722AD3BE5F5411DA92EF0DF52D6010B6E5DDE78D807E28DD39D5A0CE53765DACB5787AC56C7
4,923,415 UART: [art] PUB.Y = A2FE9C5AEE65B4F70F4CEB7DBD846C0BB5E3A1622F0D1403AE90CF104A481C67FDBCB371E78356C9B9F79F1C35716B3B
4,930,375 UART: [art] SIG.R = 4A63ACF6F26B0833250369D3AC3CF1079CC49666A47E89DD3027D9DE188E5005225FD69BFE7F0F743A20640F9ACB06E7
4,937,130 UART: [art] SIG.S = 8E91FCBCB8732786A935BA8B65808E9EEFCB4FCF5E85B3ECDCDC215038B989A9C195A94C8DA35114A46F1328D23487A7
4,959,745 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,960,790 UART: mock_rt_interact::rt_entry...FMC Tester
5,324,078 UART: [rt] Runtime listening for mailbox commands...
5,326,113 >>> mbox cmd response data (336 bytes)
5,326,114 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,338,705 >>> mbox cmd response data (1536 bytes)
5,338,706 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,338,723 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,671 UART: [kat] ++
895,823 UART: [kat] sha1
900,183 UART: [kat] SHA2-256
902,123 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
916,414 UART: [kat] HMAC-384Kdf
921,184 UART: [kat] LMS
1,169,496 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,689 UART: [fht] FHT @ 0x50003400
1,173,431 UART: [idev] ++
1,173,599 UART: [idev] CDI.KEYID = 6
1,173,960 UART: [idev] SUBJECT.KEYID = 7
1,174,385 UART: [idev] UDS.KEYID = 0
1,174,731 ready_for_fw is high
1,174,731 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,182,080 UART: [idev] Erasing UDS.KEYID = 0
1,199,932 UART: [idev] Sha1 KeyId Algorithm
1,208,706 UART: [idev] --
1,209,881 UART: [ldev] ++
1,210,049 UART: [ldev] CDI.KEYID = 6
1,210,413 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,242,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,895 UART: [ldev] --
1,282,180 UART: [fwproc] Wait for Commands...
1,282,841 UART: [fwproc] Recv command 0x46574c44
1,283,574 UART: [fwproc] Recv'd Img size: 79496 bytes
2,180,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,208,327 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,239,502 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,321,237 >>> mbox cmd response: success
2,321,237 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,322,313 UART: [afmc] ++
2,322,481 UART: [afmc] CDI.KEYID = 6
2,322,844 UART: [afmc] SUBJECT.KEYID = 7
2,323,270 UART: [afmc] AUTHORITY.KEYID = 5
2,358,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,375,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,376,031 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,381,741 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,387,622 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,393,323 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,401,134 UART: [afmc] --
2,402,027 UART: [cold-reset] --
2,402,979 UART: [state] Locking Datavault
2,403,834 UART: [state] Locking PCR0, PCR1 and PCR31
2,404,438 UART: [state] Locking ICCM
2,404,954 UART: [exit] Launching FMC @ 0x40000130
2,410,284 UART:
2,410,300 UART: Running Caliptra FMC ...
2,410,708 UART:
2,410,851 UART: [state] CFI Enabled
2,421,571 UART: [fht] FMC Alias Private Key: 7
2,540,883 UART: [art] Extend RT PCRs Done
2,541,311 UART: [art] Lock RT PCRs Done
2,542,839 UART: [art] Populate DV Done
2,551,140 UART: [fht] FMC Alias Private Key: 7
2,552,244 UART: [art] Derive CDI
2,552,524 UART: [art] Store in slot 0x4
2,638,303 UART: [art] Derive Key Pair
2,638,663 UART: [art] Store priv key in slot 0x5
2,652,047 UART: [art] Derive Key Pair - Done
2,666,610 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,681,921 UART: [art] Erasing AUTHORITY.KEYID = 7
2,682,686 UART: [art] PUB.X = 16578BBEE8B3E3A193941A246541FAB563A662FBF4E11B881891DC1FB389651E8CCAD36F9AF0EA6F9BF39E0F9D4A8144
2,689,467 UART: [art] PUB.Y = DDE507114D3CA6B2942FEDD7A1C9F727FF68804ABBB740F1E96F5FBD9BD6CD302EDB4CAB834DA3EA553200A79EC24BA7
2,696,420 UART: [art] SIG.R = B6DC67490ADDBB936C6260D2F40F5DAD1DBD2A5861F96BE837714B27D1B747CA0F61660B77BE9B48011993528326C731
2,703,179 UART: [art] SIG.S = F7E736A870A2E5717096224D4965AC935F39708CE13308B56FEEAF7E1D7C329252AA637DDD64223DAF8A311B6BF57BEA
2,727,000 UART: mock_rt_interact::rt_entry...FMC Tester
2,846,241 UART: [rt] Runtime listening for mailbox commands...
2,849,631 >>> mbox cmd response data (2048 bytes)
2,849,632 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,850,864 >>> mbox cmd response data (336 bytes)
2,850,865 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,863,456 >>> mbox cmd response data (1536 bytes)
2,863,457 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,863,560 UART:
2,863,576 UART: Running Caliptra ROM ...
2,863,984 UART:
2,864,126 UART: [state] CFI Enabled
2,867,036 UART: [state] LifecycleState = Unprovisioned
2,867,691 UART: [state] DebugLocked = No
2,868,221 UART: [state] WD Timer not started. Device not locked for debugging
2,869,457 UART: [kat] SHA2-256
3,673,007 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,677,111 UART: [kat] ++
3,677,263 UART: [kat] sha1
3,681,407 UART: [kat] SHA2-256
3,683,347 UART: [kat] SHA2-384
3,686,044 UART: [kat] SHA2-512-ACC
3,687,944 UART: [kat] ECC-384
3,697,771 UART: [kat] HMAC-384Kdf
3,702,627 UART: [kat] LMS
3,950,939 UART: [kat] --
3,951,909 UART: [update-reset] ++
4,864,581 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,865,588 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
4,962,225 >>> mbox cmd response: success
4,962,498 UART: [update-reset] Copying MAN_2 To MAN_1
4,970,512 UART: [update-reset Success] --
4,971,333 UART: [state] Locking Datavault
4,972,177 UART: [state] Locking PCR0, PCR1 and PCR31
4,972,781 UART: [state] Locking ICCM
4,973,201 UART: [exit] Launching FMC @ 0x40000130
4,978,531 UART:
4,978,547 UART: Running Caliptra FMC ...
4,978,955 UART:
4,979,098 UART: [state] CFI Enabled
5,068,157 UART: [art] Extend RT PCRs Done
5,068,585 UART: [art] Lock RT PCRs Done
5,069,722 UART: [art] Populate DV Done
5,078,101 UART: [fht] FMC Alias Private Key: 7
5,079,251 UART: [art] Derive CDI
5,079,531 UART: [art] Store in slot 0x4
5,165,778 UART: [art] Derive Key Pair
5,166,138 UART: [art] Store priv key in slot 0x5
5,180,006 UART: [art] Derive Key Pair - Done
5,195,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,210,775 UART: [art] Erasing AUTHORITY.KEYID = 7
5,211,540 UART: [art] PUB.X = 3F78C0D930124FC76702C5DE7073B936D4EE7052B207358019313327EE5E3FBE5A6C8622ECACDD924CA2754AFB8FC545
5,218,310 UART: [art] PUB.Y = 1C8F7762C18164A9F58005B50BC4519D8285CD161FAEBFCF9E42632742522453142BF6F6757BD93A9F340DBD8AE49715
5,225,251 UART: [art] SIG.R = C5952819C14E8C00BB54EEBCEE814FFD96B1DA72CECDF86301441E6CD11FA453E3C0F912C4ED3207B330587264196BB3
5,232,005 UART: [art] SIG.S = CD2B0B676682761388BAC84B55F4CB67A160058E134D9B70FCEF30D090F6C64C9C4974C4405CFC051BD01AF5AFA09C8A
5,254,857 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,256,066 UART: mock_rt_interact::rt_entry...FMC Tester
5,622,191 UART: [rt] Runtime listening for mailbox commands...
5,624,226 >>> mbox cmd response data (336 bytes)
5,624,227 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,636,818 >>> mbox cmd response data (1536 bytes)
5,636,819 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,636,836 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,567 ready_for_fw is high
1,059,567 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,172,216 >>> mbox cmd response: success
2,172,216 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,234,669 UART:
2,234,685 UART: Running Caliptra FMC ...
2,235,093 UART:
2,235,236 UART: [state] CFI Enabled
2,245,836 UART: [fht] FMC Alias Private Key: 7
2,364,806 UART: [art] Extend RT PCRs Done
2,365,234 UART: [art] Lock RT PCRs Done
2,366,958 UART: [art] Populate DV Done
2,375,217 UART: [fht] FMC Alias Private Key: 7
2,376,151 UART: [art] Derive CDI
2,376,431 UART: [art] Store in slot 0x4
2,462,238 UART: [art] Derive Key Pair
2,462,598 UART: [art] Store priv key in slot 0x5
2,475,786 UART: [art] Derive Key Pair - Done
2,490,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,506,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,507,159 UART: [art] PUB.X = D05B7DF80869E761220482E269060BC9C4FC5626CE789D4FDE57FEC0701198C754D2028047608CA8AD83C2398D7EEEC0
2,513,916 UART: [art] PUB.Y = 6D761345E376A7067664AD6A1D3EF97E8978278B761DFAC3F808B27E08AB523B5EB920AF477501FC0D22C8F39D5C003D
2,520,833 UART: [art] SIG.R = 04FD9A498782E57C5E4E027512DB2B709300D4BBE00A8930404390C9820BD3F2611D6738E2F66FDA8234A334709E0111
2,527,558 UART: [art] SIG.S = CC69597EE0E690FA5B77B5D01C10445BA59A89B6552ACFFB85CD22A83A20E3FC0EF73B18BD07D25BBA18F03F9CBFD7C6
2,551,384 UART: mock_rt_interact::rt_entry...FMC Tester
2,670,268 UART: [rt] Runtime listening for mailbox commands...
2,673,658 >>> mbox cmd response data (2048 bytes)
2,673,659 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,674,891 >>> mbox cmd response data (336 bytes)
2,674,892 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,687,483 >>> mbox cmd response data (1536 bytes)
2,687,484 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,669,984 >>> mbox cmd response: success
4,683,225 UART:
4,683,241 UART: Running Caliptra FMC ...
4,683,649 UART:
4,683,792 UART: [state] CFI Enabled
4,772,825 UART: [art] Extend RT PCRs Done
4,773,253 UART: [art] Lock RT PCRs Done
4,774,688 UART: [art] Populate DV Done
4,782,895 UART: [fht] FMC Alias Private Key: 7
4,783,999 UART: [art] Derive CDI
4,784,279 UART: [art] Store in slot 0x4
4,869,798 UART: [art] Derive Key Pair
4,870,158 UART: [art] Store priv key in slot 0x5
4,883,480 UART: [art] Derive Key Pair - Done
4,898,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,914,346 UART: [art] Erasing AUTHORITY.KEYID = 7
4,915,111 UART: [art] PUB.X = AC74205F8B5C4402AE406DCF0CC42A4693B7C4A4835A442D1E5796845EBF8F34F6CE938A6889C9BD7DA4F56AC61FDCBE
4,921,893 UART: [art] PUB.Y = F76AD69F264A96629F5E5FB905B4CD123EA6E22E4ED5B2E760A967C074D8954DF836B4201BC718755497CA32060789C6
4,928,834 UART: [art] SIG.R = 4AF7905CB3EFD4FF833C19DD6659A89511B87D28E68E1A759D3BC57F264026F9F6CCD48F7B495FB12C39EF04A15A92ED
4,935,615 UART: [art] SIG.S = 9490962B1E60DD5751FC9EE7FF37EB7DA5341ADD52A3CE6FD992AA22511D93DEFBC059CC64D419780F5219C0205CA96D
4,958,457 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,959,500 UART: mock_rt_interact::rt_entry...FMC Tester
5,324,916 UART: [rt] Runtime listening for mailbox commands...
5,326,951 >>> mbox cmd response data (336 bytes)
5,326,952 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,339,543 >>> mbox cmd response data (1536 bytes)
5,339,544 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,339,561 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,717 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
893,662 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,787 UART: [kat] ++
897,939 UART: [kat] sha1
902,133 UART: [kat] SHA2-256
904,073 UART: [kat] SHA2-384
906,950 UART: [kat] SHA2-512-ACC
908,851 UART: [kat] ECC-384
918,562 UART: [kat] HMAC-384Kdf
923,170 UART: [kat] LMS
1,171,498 UART: [kat] --
1,172,297 UART: [cold-reset] ++
1,172,763 UART: [fht] FHT @ 0x50003400
1,175,550 UART: [idev] ++
1,175,718 UART: [idev] CDI.KEYID = 6
1,176,078 UART: [idev] SUBJECT.KEYID = 7
1,176,502 UART: [idev] UDS.KEYID = 0
1,176,847 ready_for_fw is high
1,176,847 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,184,594 UART: [idev] Erasing UDS.KEYID = 0
1,201,377 UART: [idev] Sha1 KeyId Algorithm
1,209,955 UART: [idev] --
1,210,881 UART: [ldev] ++
1,211,049 UART: [ldev] CDI.KEYID = 6
1,211,412 UART: [ldev] SUBJECT.KEYID = 5
1,211,838 UART: [ldev] AUTHORITY.KEYID = 7
1,212,301 UART: [ldev] FE.KEYID = 1
1,217,621 UART: [ldev] Erasing FE.KEYID = 1
1,243,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,605 UART: [ldev] --
1,283,096 UART: [fwproc] Wait for Commands...
1,283,680 UART: [fwproc] Recv command 0x46574c44
1,284,408 UART: [fwproc] Recv'd Img size: 79496 bytes
2,182,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,210,159 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,241,329 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,323,050 >>> mbox cmd response: success
2,323,050 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,324,062 UART: [afmc] ++
2,324,230 UART: [afmc] CDI.KEYID = 6
2,324,592 UART: [afmc] SUBJECT.KEYID = 7
2,325,017 UART: [afmc] AUTHORITY.KEYID = 5
2,359,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,375,427 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,376,175 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,381,884 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,387,767 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,393,468 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,401,368 UART: [afmc] --
2,402,416 UART: [cold-reset] --
2,403,092 UART: [state] Locking Datavault
2,404,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,405,139 UART: [state] Locking ICCM
2,405,665 UART: [exit] Launching FMC @ 0x40000130
2,410,995 UART:
2,411,011 UART: Running Caliptra FMC ...
2,411,419 UART:
2,411,473 UART: [state] CFI Enabled
2,421,945 UART: [fht] FMC Alias Private Key: 7
2,540,927 UART: [art] Extend RT PCRs Done
2,541,355 UART: [art] Lock RT PCRs Done
2,542,837 UART: [art] Populate DV Done
2,551,032 UART: [fht] FMC Alias Private Key: 7
2,552,142 UART: [art] Derive CDI
2,552,422 UART: [art] Store in slot 0x4
2,638,051 UART: [art] Derive Key Pair
2,638,411 UART: [art] Store priv key in slot 0x5
2,651,517 UART: [art] Derive Key Pair - Done
2,666,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,681,609 UART: [art] Erasing AUTHORITY.KEYID = 7
2,682,374 UART: [art] PUB.X = 4FF141A6A09D046926EF5031AF80CD9BAA1E6EF97A7E34C8E40F415CECB99DBEFB279754BC173F809108E379D208D9C7
2,689,146 UART: [art] PUB.Y = ED02DF7BE6DD9B4050DA955DEE232F3243E32E9C7A53E6C673D421D1B8CA984CB430FA96753B7A46F6D64C59A2D55FBF
2,696,111 UART: [art] SIG.R = DAE3CD95A2C64B67C189B368BEA5DE6098BABA6A4EE781739D4F514DAEF9F425AA318A685860E8B5B12F4C2470CEA641
2,702,899 UART: [art] SIG.S = 6D693112550FFCE76584DFC3AFA3786DD4E589C817020A9077DD9244C2CEB6BCD3648BE7A434E8FEA6DF79888A4E04EA
2,725,993 UART: mock_rt_interact::rt_entry...FMC Tester
2,844,603 UART: [rt] Runtime listening for mailbox commands...
2,847,993 >>> mbox cmd response data (2048 bytes)
2,847,994 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,849,226 >>> mbox cmd response data (336 bytes)
2,849,227 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,861,818 >>> mbox cmd response data (1536 bytes)
2,861,819 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,861,922 UART:
2,861,938 UART: Running Caliptra ROM ...
2,862,346 UART:
2,862,401 UART: [state] CFI Enabled
2,865,113 UART: [state] LifecycleState = Unprovisioned
2,865,768 UART: [state] DebugLocked = No
2,866,418 UART: [state] WD Timer not started. Device not locked for debugging
2,867,580 UART: [kat] SHA2-256
3,673,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,677,355 UART: [kat] ++
3,677,507 UART: [kat] sha1
3,681,941 UART: [kat] SHA2-256
3,683,881 UART: [kat] SHA2-384
3,686,578 UART: [kat] SHA2-512-ACC
3,688,478 UART: [kat] ECC-384
3,698,215 UART: [kat] HMAC-384Kdf
3,702,833 UART: [kat] LMS
3,951,161 UART: [kat] --
3,951,951 UART: [update-reset] ++
4,864,954 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,865,937 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
4,962,574 >>> mbox cmd response: success
4,962,731 UART: [update-reset] Copying MAN_2 To MAN_1
4,970,745 UART: [update-reset Success] --
4,971,778 UART: [state] Locking Datavault
4,972,648 UART: [state] Locking PCR0, PCR1 and PCR31
4,973,252 UART: [state] Locking ICCM
4,973,862 UART: [exit] Launching FMC @ 0x40000130
4,979,192 UART:
4,979,208 UART: Running Caliptra FMC ...
4,979,616 UART:
4,979,670 UART: [state] CFI Enabled
5,068,563 UART: [art] Extend RT PCRs Done
5,068,991 UART: [art] Lock RT PCRs Done
5,070,160 UART: [art] Populate DV Done
5,078,367 UART: [fht] FMC Alias Private Key: 7
5,079,367 UART: [art] Derive CDI
5,079,647 UART: [art] Store in slot 0x4
5,165,334 UART: [art] Derive Key Pair
5,165,694 UART: [art] Store priv key in slot 0x5
5,179,142 UART: [art] Derive Key Pair - Done
5,194,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,209,984 UART: [art] Erasing AUTHORITY.KEYID = 7
5,210,749 UART: [art] PUB.X = EAD900F3605DC67D0FAB4078C3C83D3FC84CD195CDCBE5F265B9808ACAE218D845B1C8062331300A4E07A0BC182E6B0C
5,217,498 UART: [art] PUB.Y = 46B4D8B4DEFEF1E88A326D185BA7480411F6B00CC01E0F9D3B3961AEC899C06A47C694139D2360DEED683AA93805BD3E
5,224,448 UART: [art] SIG.R = 7AAAC2F172820FC16A3DF8BE31F8CA6056316CC645C7FD2A845A58C0CE61638240044BC074F62A7A3517B51C9AB6A602
5,231,217 UART: [art] SIG.S = 311483B2C76BB5CF46003D5FC2698ECF981F9D9D46C72EE1A522AD772A3999935180EDA9AF0BAFDB08E5D0A9848B352A
5,253,972 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,254,963 UART: mock_rt_interact::rt_entry...FMC Tester
5,615,858 UART: [rt] Runtime listening for mailbox commands...
5,617,893 >>> mbox cmd response data (336 bytes)
5,617,894 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,630,485 >>> mbox cmd response data (1536 bytes)
5,630,486 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,630,503 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,733 ready_for_fw is high
1,060,733 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,173,619 >>> mbox cmd response: success
2,173,619 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,235,564 UART:
2,235,580 UART: Running Caliptra FMC ...
2,235,988 UART:
2,236,042 UART: [state] CFI Enabled
2,246,294 UART: [fht] FMC Alias Private Key: 7
2,365,014 UART: [art] Extend RT PCRs Done
2,365,442 UART: [art] Lock RT PCRs Done
2,367,346 UART: [art] Populate DV Done
2,375,509 UART: [fht] FMC Alias Private Key: 7
2,376,529 UART: [art] Derive CDI
2,376,809 UART: [art] Store in slot 0x4
2,462,722 UART: [art] Derive Key Pair
2,463,082 UART: [art] Store priv key in slot 0x5
2,475,952 UART: [art] Derive Key Pair - Done
2,490,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,506,370 UART: [art] Erasing AUTHORITY.KEYID = 7
2,507,135 UART: [art] PUB.X = F07F68BD503E7205F7BD02822BCF752612B3EB10AECD8F318E6B86F7ADF8D1B1CD3427EBA19D5F5E5C6C9066E028B891
2,513,915 UART: [art] PUB.Y = 6424361BE55CE9F999EF438C63FFDC950846F1F979EF3BFCCFC949368AF6E8086C13DE595D3E9622B73FA9597B3D3F08
2,520,866 UART: [art] SIG.R = 978A86AC16E10D631765FA02C9B93F207A074ABBC8EDD77054D691EBE7085A846FBDDA88A02DDD0B70B0585467F10222
2,527,626 UART: [art] SIG.S = 7965F044715FFF4746CCE260746E486620B4A2F4EF691F913E9E7684B77A127C2EE41B05673A8A9A474CB4E1CE2C3081
2,551,549 UART: mock_rt_interact::rt_entry...FMC Tester
2,670,845 UART: [rt] Runtime listening for mailbox commands...
2,674,235 >>> mbox cmd response data (2048 bytes)
2,674,236 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,675,468 >>> mbox cmd response data (336 bytes)
2,675,469 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,688,060 >>> mbox cmd response data (1536 bytes)
2,688,061 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,670,759 >>> mbox cmd response: success
4,683,990 UART:
4,684,006 UART: Running Caliptra FMC ...
4,684,414 UART:
4,684,468 UART: [state] CFI Enabled
4,773,937 UART: [art] Extend RT PCRs Done
4,774,365 UART: [art] Lock RT PCRs Done
4,775,850 UART: [art] Populate DV Done
4,784,031 UART: [fht] FMC Alias Private Key: 7
4,785,093 UART: [art] Derive CDI
4,785,373 UART: [art] Store in slot 0x4
4,871,014 UART: [art] Derive Key Pair
4,871,374 UART: [art] Store priv key in slot 0x5
4,884,150 UART: [art] Derive Key Pair - Done
4,898,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,913,978 UART: [art] Erasing AUTHORITY.KEYID = 7
4,914,743 UART: [art] PUB.X = C2D670611037B981DC9770728B24643BDF533763121CE751F92B3B293C882876591A25210218588B3CA283E44AB94DA7
4,921,496 UART: [art] PUB.Y = 1A9A6830F3DE0B7B07F3F7EA8D2989CDA515350D09A036DDF2084B355F3DD05D1FE44B1E1635ED1DF2DDDD9D386B79EC
4,928,451 UART: [art] SIG.R = C01DAD83747CA4C1DE97541BDFE6BE9B5FC0366D69B28F2246D8256B8DBBA95204811F2C9B9D236EDA9C4E888FDC64D5
4,935,236 UART: [art] SIG.S = 85C28327E4C7A00F02BE2076284910D16C4AB956E32D238662EAF637D4292A411106ED4E897B3AAD505D61E4BED72347
4,957,698 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,958,599 UART: mock_rt_interact::rt_entry...FMC Tester
5,324,878 UART: [rt] Runtime listening for mailbox commands...
5,326,913 >>> mbox cmd response data (336 bytes)
5,326,914 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,339,505 >>> mbox cmd response data (1536 bytes)
5,339,506 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,339,523 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,003 UART: [state] LifecycleState = Unprovisioned
85,658 UART: [state] DebugLocked = No
86,150 UART: [state] WD Timer not started. Device not locked for debugging
87,449 UART: [kat] SHA2-256
893,099 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,224 UART: [kat] ++
897,376 UART: [kat] sha1
901,718 UART: [kat] SHA2-256
903,658 UART: [kat] SHA2-384
906,217 UART: [kat] SHA2-512-ACC
908,118 UART: [kat] ECC-384
917,671 UART: [kat] HMAC-384Kdf
922,327 UART: [kat] LMS
1,170,655 UART: [kat] --
1,171,538 UART: [cold-reset] ++
1,171,954 UART: [fht] FHT @ 0x50003400
1,174,817 UART: [idev] ++
1,174,985 UART: [idev] CDI.KEYID = 6
1,175,345 UART: [idev] SUBJECT.KEYID = 7
1,175,769 UART: [idev] UDS.KEYID = 0
1,176,114 ready_for_fw is high
1,176,114 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,183,993 UART: [idev] Erasing UDS.KEYID = 0
1,201,316 UART: [idev] Sha1 KeyId Algorithm
1,209,736 UART: [idev] --
1,210,918 UART: [ldev] ++
1,211,086 UART: [ldev] CDI.KEYID = 6
1,211,449 UART: [ldev] SUBJECT.KEYID = 5
1,211,875 UART: [ldev] AUTHORITY.KEYID = 7
1,212,338 UART: [ldev] FE.KEYID = 1
1,217,570 UART: [ldev] Erasing FE.KEYID = 1
1,244,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,618 UART: [ldev] --
1,283,921 UART: [fwproc] Wait for Commands...
1,284,633 UART: [fwproc] Recv command 0x46574c44
1,285,361 UART: [fwproc] Recv'd Img size: 79496 bytes
2,183,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,211,018 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,242,188 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,323,899 >>> mbox cmd response: success
2,323,899 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,325,149 UART: [afmc] ++
2,325,317 UART: [afmc] CDI.KEYID = 6
2,325,679 UART: [afmc] SUBJECT.KEYID = 7
2,326,104 UART: [afmc] AUTHORITY.KEYID = 5
2,361,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,378,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,379,568 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,385,277 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,391,160 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,396,861 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,404,775 UART: [afmc] --
2,405,895 UART: [cold-reset] --
2,406,677 UART: [state] Locking Datavault
2,407,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,408,282 UART: [state] Locking ICCM
2,408,832 UART: [exit] Launching FMC @ 0x40000130
2,414,162 UART:
2,414,178 UART: Running Caliptra FMC ...
2,414,586 UART:
2,414,729 UART: [state] CFI Enabled
2,425,421 UART: [fht] FMC Alias Private Key: 7
2,544,687 UART: [art] Extend RT PCRs Done
2,545,115 UART: [art] Lock RT PCRs Done
2,546,849 UART: [art] Populate DV Done
2,555,182 UART: [fht] FMC Alias Private Key: 7
2,556,136 UART: [art] Derive CDI
2,556,416 UART: [art] Store in slot 0x4
2,642,451 UART: [art] Derive Key Pair
2,642,811 UART: [art] Store priv key in slot 0x5
2,655,949 UART: [art] Derive Key Pair - Done
2,670,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,686,224 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,989 UART: [art] PUB.X = E0BA7BA010788D7BA789F3ED57A3949884E4FFC0B477D6BBEBE49F105BB1ECD9AD895A4711CDE712D8116AE178C2B7F4
2,693,779 UART: [art] PUB.Y = 7FB5F39504B12C9510EE06F16A45663258FA594F6389FE56993B27194BC27EF95EB54F052814CD8F6A3BCF9744022702
2,700,710 UART: [art] SIG.R = 21F189ABC126A036300977543B67F2298CBD76703C96F60C407C37E4B7158DC38C2C4FFD952A6D5130F8D0C59AD9E560
2,707,474 UART: [art] SIG.S = F81C2609959F8E03F8FF9B7DB80D8C9E46DC4A359F4C7A9E71F9B57E3EEDC400C5B92D9C70A6B83182EB2B0C198E59B6
2,731,380 UART: mock_rt_interact::rt_entry...FMC Tester
2,850,462 UART: [rt] Runtime listening for mailbox commands...
2,853,852 >>> mbox cmd response data (2048 bytes)
2,853,853 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,855,085 >>> mbox cmd response data (336 bytes)
2,855,086 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,867,677 >>> mbox cmd response data (1536 bytes)
2,867,678 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,867,781 UART:
2,867,797 UART: Running Caliptra ROM ...
2,868,205 UART:
2,868,347 UART: [state] CFI Enabled
2,871,229 UART: [state] LifecycleState = Unprovisioned
2,871,884 UART: [state] DebugLocked = No
2,872,410 UART: [state] WD Timer not started. Device not locked for debugging
2,873,728 UART: [kat] SHA2-256
3,679,378 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,683,503 UART: [kat] ++
3,683,655 UART: [kat] sha1
3,688,089 UART: [kat] SHA2-256
3,690,029 UART: [kat] SHA2-384
3,692,854 UART: [kat] SHA2-512-ACC
3,694,754 UART: [kat] ECC-384
3,704,495 UART: [kat] HMAC-384Kdf
3,709,295 UART: [kat] LMS
3,957,623 UART: [kat] --
3,958,617 UART: [update-reset] ++
4,871,418 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,872,437 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
4,969,074 >>> mbox cmd response: success
4,969,231 UART: [update-reset] Copying MAN_2 To MAN_1
4,977,245 UART: [update-reset Success] --
4,978,080 UART: [state] Locking Datavault
4,978,896 UART: [state] Locking PCR0, PCR1 and PCR31
4,979,500 UART: [state] Locking ICCM
4,980,118 UART: [exit] Launching FMC @ 0x40000130
4,985,448 UART:
4,985,464 UART: Running Caliptra FMC ...
4,985,872 UART:
4,986,015 UART: [state] CFI Enabled
5,075,150 UART: [art] Extend RT PCRs Done
5,075,578 UART: [art] Lock RT PCRs Done
5,076,875 UART: [art] Populate DV Done
5,085,050 UART: [fht] FMC Alias Private Key: 7
5,086,200 UART: [art] Derive CDI
5,086,480 UART: [art] Store in slot 0x4
5,172,175 UART: [art] Derive Key Pair
5,172,535 UART: [art] Store priv key in slot 0x5
5,185,993 UART: [art] Derive Key Pair - Done
5,200,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,216,055 UART: [art] Erasing AUTHORITY.KEYID = 7
5,216,820 UART: [art] PUB.X = A1756FD78B5471B38305A565DA96219D92CAD6DF926298FAA110990E919B1C1C14DDED3CD755B3361778CD684CE8206A
5,223,588 UART: [art] PUB.Y = 8A2B5DFFC9B6A395F221D5709CE25733475913C2A73835EA42DC31F1161ACB72E8D5D99A64D7E8E2696622B9BEEF0505
5,230,538 UART: [art] SIG.R = 085AC5F2C5D454F68F5E6C7CA58FA567E70F794860AE6B35950E828E12B9259E3A91D1281224957049C83BC548BC79F8
5,237,297 UART: [art] SIG.S = AC3F0E21AF4EF7AED1BDE1A7F198AF4DC2AC0FEB478EDC2722B55D3DC55586729272F3CD983B01DA3A5BBAC44BF7E047
5,259,901 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,260,826 UART: mock_rt_interact::rt_entry...FMC Tester
5,627,038 UART: [rt] Runtime listening for mailbox commands...
5,629,073 >>> mbox cmd response data (336 bytes)
5,629,074 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,641,665 >>> mbox cmd response data (1536 bytes)
5,641,666 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,641,683 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,862 ready_for_fw is high
1,060,862 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,173,972 >>> mbox cmd response: success
2,173,972 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,236,605 UART:
2,236,621 UART: Running Caliptra FMC ...
2,237,029 UART:
2,237,172 UART: [state] CFI Enabled
2,247,736 UART: [fht] FMC Alias Private Key: 7
2,367,292 UART: [art] Extend RT PCRs Done
2,367,720 UART: [art] Lock RT PCRs Done
2,369,266 UART: [art] Populate DV Done
2,377,663 UART: [fht] FMC Alias Private Key: 7
2,378,687 UART: [art] Derive CDI
2,378,967 UART: [art] Store in slot 0x4
2,465,048 UART: [art] Derive Key Pair
2,465,408 UART: [art] Store priv key in slot 0x5
2,478,470 UART: [art] Derive Key Pair - Done
2,493,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,508,678 UART: [art] Erasing AUTHORITY.KEYID = 7
2,509,443 UART: [art] PUB.X = 0F2B35FF631A3BC0C46BEB43A5E118015EC83E21C400EF94CF6E6A75ACDC7993D2DEE18040C232DFEF40EC6C76189405
2,516,198 UART: [art] PUB.Y = E595C72E6B29BBA1B63DB63FD1EE0DEC423940074A01119DAAF0254905ADE011510D9D218220D1BBD98DE5D9ED1ABE3E
2,523,151 UART: [art] SIG.R = AD49A9B08E0D568059D25C3A1B7D701857A88A8967C36AA97349E9D81EE17539CF65E32970382AC8EC9613E080E77894
2,529,914 UART: [art] SIG.S = A727A163AA18378BBF1558244962BA4062B1367C945F8D11E00D4D6184615E56A100AF0D703900336EF492FCE9A0EEB8
2,553,208 UART: mock_rt_interact::rt_entry...FMC Tester
2,671,565 UART: [rt] Runtime listening for mailbox commands...
2,674,955 >>> mbox cmd response data (2048 bytes)
2,674,956 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,676,188 >>> mbox cmd response data (336 bytes)
2,676,189 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,688,780 >>> mbox cmd response data (1536 bytes)
2,688,781 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,672,704 >>> mbox cmd response: success
4,685,989 UART:
4,686,005 UART: Running Caliptra FMC ...
4,686,413 UART:
4,686,556 UART: [state] CFI Enabled
4,775,629 UART: [art] Extend RT PCRs Done
4,776,057 UART: [art] Lock RT PCRs Done
4,777,398 UART: [art] Populate DV Done
4,785,875 UART: [fht] FMC Alias Private Key: 7
4,786,949 UART: [art] Derive CDI
4,787,229 UART: [art] Store in slot 0x4
4,873,254 UART: [art] Derive Key Pair
4,873,614 UART: [art] Store priv key in slot 0x5
4,886,648 UART: [art] Derive Key Pair - Done
4,901,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,917,218 UART: [art] Erasing AUTHORITY.KEYID = 7
4,917,983 UART: [art] PUB.X = 28A9B1D422862860E27947C55B1921A06422D7E36ED982CA786175E71154B266E76C17FF86BB8CFA71649E089C0576EF
4,924,741 UART: [art] PUB.Y = F385FC15A126E36DBCD31316C1757A23C56C1E9E5055FBEBE6C9FDF62311003B3304B314E27475771D2A1F95325017C5
4,931,666 UART: [art] SIG.R = 96B8F4E23E0D460E81B8CC6D3231129E46C9BDF9408A0F076B2FDBAD83F8A7336FA953A8AE0B37D86105AE75683DC484
4,938,428 UART: [art] SIG.S = 17D2D6BB1C7D369032C1493E2A0F43BB22114D11F32001AB3D703B27AAB64490E28621B0E771138A4D97AC8B014B1C12
4,961,356 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,962,229 UART: mock_rt_interact::rt_entry...FMC Tester
5,325,907 UART: [rt] Runtime listening for mailbox commands...
5,327,942 >>> mbox cmd response data (336 bytes)
5,327,943 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,340,534 >>> mbox cmd response data (1536 bytes)
5,340,535 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,340,552 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.91s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,819 writing to cptra_bootfsm_go
3,126 UART: hii* TESTCASE PASSED
Initializing fuses
871 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,832 writing to cptra_bootfsm_go
3,135 UART: hii* TESTCASE PASSED
Initializing fuses
866 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,820 writing to cptra_bootfsm_go
3,222 UART: hii* TESTCASE PASSED
Initializing fuses
869 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,742 writing to cptra_bootfsm_go
3,036 UART: hii* TESTCASE PASSED
Initializing fuses
870 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,287 UART: hii* TESTCASE PASSED
Initializing fuses
867 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,242 UART: hii* TESTCASE PASSED
Initializing fuses
917 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
3,147 UART: hii* TESTCASE PASSED
Initializing fuses
866 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,810 writing to cptra_bootfsm_go
3,105 UART: hii* TESTCASE PASSED
Initializing fuses
868 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
3,175 UART: hii* TESTCASE PASSED
Initializing fuses
891 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,294 UART: hii* TESTCASE PASSED
Initializing fuses
901 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,803 writing to cptra_bootfsm_go
3,097 UART: hii* TESTCASE PASSED
Initializing fuses
871 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,683 writing to cptra_bootfsm_go
3,103 UART: hii* TESTCASE PASSED
Initializing fuses
865 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
3,146 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,842 writing to cptra_bootfsm_go
3,152 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,542 writing to cptra_bootfsm_go
4,032 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,188 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,227 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,230 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,778 writing to cptra_bootfsm_go
3,070 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,822 writing to cptra_bootfsm_go
3,241 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
3,175 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
3,151 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,828 writing to cptra_bootfsm_go
3,236 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
3,160 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,835 writing to cptra_bootfsm_go
3,189 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,031 >>> mbox cmd response data (14 bytes)
35,595 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,254 >>> mbox cmd response data (12 bytes)
36,607 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,969 >>> mbox cmd response data (7 bytes)
37,253 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,554 >>> mbox cmd response data (7 bytes)
37,830 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,173 >>> mbox cmd response data (0 bytes)
38,406 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,678 >>> mbox cmd response: success
38,865 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,200 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,242 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,099 >>> mbox cmd response data (14 bytes)
35,616 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,274 >>> mbox cmd response data (12 bytes)
36,584 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,994 >>> mbox cmd response data (7 bytes)
37,276 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,574 >>> mbox cmd response data (7 bytes)
37,857 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,209 >>> mbox cmd response data (0 bytes)
38,461 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,734 >>> mbox cmd response: success
38,915 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,252 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,545 writing to cptra_bootfsm_go
3,905 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,734 >>> mbox cmd response data (14 bytes)
36,319 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,979 >>> mbox cmd response data (12 bytes)
37,302 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,664 >>> mbox cmd response data (7 bytes)
37,955 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,258 >>> mbox cmd response data (7 bytes)
38,547 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,908 >>> mbox cmd response data (0 bytes)
39,154 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,423 >>> mbox cmd response: success
39,618 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,970 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,563 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,417 >>> mbox cmd response data (14 bytes)
36,121 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,837 >>> mbox cmd response data (12 bytes)
37,166 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,527 >>> mbox cmd response data (7 bytes)
37,821 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,124 >>> mbox cmd response data (7 bytes)
38,420 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,765 >>> mbox cmd response data (0 bytes)
39,010 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,300 >>> mbox cmd response: success
39,494 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,788 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,166 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,012 >>> mbox cmd response data (14 bytes)
35,588 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,258 >>> mbox cmd response data (12 bytes)
36,574 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,931 >>> mbox cmd response data (7 bytes)
37,217 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,518 >>> mbox cmd response data (7 bytes)
37,800 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,149 >>> mbox cmd response data (0 bytes)
38,388 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,662 >>> mbox cmd response: success
38,851 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,193 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,184 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,036 >>> mbox cmd response data (14 bytes)
35,597 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,315 >>> mbox cmd response data (12 bytes)
36,671 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,034 >>> mbox cmd response data (7 bytes)
37,324 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,653 >>> mbox cmd response data (7 bytes)
37,940 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,291 >>> mbox cmd response data (0 bytes)
38,531 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,805 >>> mbox cmd response: success
38,993 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,337 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,569 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,419 >>> mbox cmd response data (14 bytes)
36,034 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,749 >>> mbox cmd response data (12 bytes)
37,068 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,438 >>> mbox cmd response data (7 bytes)
37,728 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,108 >>> mbox cmd response data (7 bytes)
38,408 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,765 >>> mbox cmd response data (0 bytes)
39,005 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,291 >>> mbox cmd response: success
39,513 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,859 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,600 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,456 >>> mbox cmd response data (14 bytes)
36,105 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,771 >>> mbox cmd response data (12 bytes)
37,093 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,462 >>> mbox cmd response data (7 bytes)
37,756 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,063 >>> mbox cmd response data (7 bytes)
38,358 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,738 >>> mbox cmd response data (0 bytes)
38,983 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,260 >>> mbox cmd response: success
39,454 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,792 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,363 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,228 >>> mbox cmd response data (14 bytes)
35,740 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,393 >>> mbox cmd response data (12 bytes)
36,708 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,060 >>> mbox cmd response data (7 bytes)
37,352 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,650 >>> mbox cmd response data (7 bytes)
37,939 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,289 >>> mbox cmd response data (0 bytes)
38,525 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,851 >>> mbox cmd response: success
39,060 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,403 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,400 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,225 >>> mbox cmd response data (14 bytes)
35,724 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,379 >>> mbox cmd response data (12 bytes)
36,694 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,045 >>> mbox cmd response data (7 bytes)
37,337 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,641 >>> mbox cmd response data (7 bytes)
37,923 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,268 >>> mbox cmd response data (0 bytes)
38,507 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,777 >>> mbox cmd response: success
38,971 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,330 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
3,621 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,475 >>> mbox cmd response data (14 bytes)
36,033 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,757 >>> mbox cmd response data (12 bytes)
37,087 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,473 >>> mbox cmd response data (7 bytes)
37,769 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,068 >>> mbox cmd response data (7 bytes)
38,400 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,752 >>> mbox cmd response data (0 bytes)
38,994 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,273 >>> mbox cmd response: success
39,458 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,798 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,504 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,375 >>> mbox cmd response data (14 bytes)
35,990 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,669 >>> mbox cmd response data (12 bytes)
36,990 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,345 >>> mbox cmd response data (7 bytes)
37,633 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,939 >>> mbox cmd response data (7 bytes)
38,227 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,590 >>> mbox cmd response data (0 bytes)
38,835 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,109 >>> mbox cmd response: success
39,298 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,667 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
3,240 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,791 >>> mbox cmd response: success
35,380 UART: |dcfeffff48692121| 37,313 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,837 >>> mbox cmd response: success
|dcfeffff48692121| 40,036 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,492 >>> mbox cmd response: success
|dcfeffff48692121| 42,728 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,190 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
3,277 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,823 >>> mbox cmd response: success
35,402 UART: |dcfeffff48692121| 37,275 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,798 >>> mbox cmd response: success
|dcfeffff48692121| 39,995 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,443 >>> mbox cmd response: success
|dcfeffff48692121| 42,679 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,123 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
5,073 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
36,605 >>> mbox cmd response: success
37,159 UART: |dcfeffff48692121| 39,169 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
39,768 >>> mbox cmd response: success
|dcfeffff48692121| 42,028 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,571 >>> mbox cmd response: success
|dcfeffff48692121| 44,821 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
45,332 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,598 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,147 >>> mbox cmd response: success
35,660 UART: |dcfeffff48692121| 37,633 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,198 >>> mbox cmd response: success
|dcfeffff48692121| 40,440 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,013 >>> mbox cmd response: success
|dcfeffff48692121| 43,258 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,757 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
3,252 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,803 >>> mbox cmd response: success
35,325 UART: |dcfeffff48692121| 37,202 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,722 >>> mbox cmd response: success
| 39,983 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
dcfeffff48692121| 41,108 >>> mbox cmd response: success
|dcfeffff48692121| 43,355 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,819 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,319 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,862 >>> mbox cmd response: success
35,385 UART: |dcfeffff48692121| 37,334 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,863 >>> mbox cmd response: success
|dcfeffff48692121| 40,059 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,517 >>> mbox cmd response: success
|dcfeffff48692121| 42,741 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,188 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
3,565 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,085 >>> mbox cmd response: success
35,759 UART: |dcfeffff48692121| 37,719 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,331 >>> mbox cmd response: success
|dcfeffff48692121| 40,548 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,066 >>> mbox cmd response: success
|dcfeffff48692121| 43,310 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,821 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,515 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,027 >>> mbox cmd response: success
35,663 UART: |dcfeffff48692121| 37,640 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,240 >>> mbox cmd response: success
|dcfeffff48692121| 40,500 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,014 >>> mbox cmd response: success
|dcfeffff48692121| 43,301 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,823 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,265 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,797 >>> mbox cmd response: success
35,321 UART: |dcfeffff48692121| 37,251 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,768 >>> mbox cmd response: success
|dcfeffff48692121| 39,963 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,414 >>> mbox cmd response: success
|dcfeffff48692121| 42,645 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,094 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,437 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,985 >>> mbox cmd response: success
35,506 UART: |dcfeffff48692121| 37,384 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,900 >>> mbox cmd response: success
|dcfeffff48692121| 40,120 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,564 >>> mbox cmd response: success
|dcfeffff48692121| 42,804 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,243 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
3,587 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,140 >>> mbox cmd response: success
35,694 UART: |dcfeffff48692121| 37,700 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,303 >>> mbox cmd response: success
|dcfeffff48692121| 40,533 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,093 >>> mbox cmd response: success
|dcfeffff48692121| 43,359 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,928 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
3,600 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,116 >>> mbox cmd response: success
35,635 UART: |dcfeffff48692121| 37,647 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,227 >>> mbox cmd response: success
|dcfeffff48692121| 41,078 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,585 >>> mbox cmd response: success
|dcfeffff48692121| 43,829 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,250 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
3,159 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
3,185 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
3,182 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,223 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,186 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
3,173 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,806 writing to cptra_bootfsm_go
3,223 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,282 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,395 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,846 writing to cptra_bootfsm_go
3,139 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,813 writing to cptra_bootfsm_go
3,208 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
3,266 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,479 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,863 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,595 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,987 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
3,677 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,040 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,783 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,098 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,384 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,737 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
3,457 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,852 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,741 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,087 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,719 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,075 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,441 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,819 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,253 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,648 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
3,572 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,910 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,871 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,177 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
3,245 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,757 >>> mbox cmd response: success
35,246 UART: |dcfeffff48692121| 37,169 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,697 >>> mbox cmd response: success
|dcfeffff48692121| 39,889 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,398 >>> mbox cmd response: success
|dcfeffff48692121| 42,645 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,095 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
3,244 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,768 >>> mbox cmd response: success
35,384 UART: |dcfeffff48692121| 37,260 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,794 >>> mbox cmd response: success
|dcfeffff48692121| 39,990 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,445 >>> mbox cmd response: success
|dcfeffff48692121| 42,681 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,180 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,647 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
36,043 >>> mbox cmd response: success
36,792 UART: |dcfeffff48692121| 38,720 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
39,300 >>> mbox cmd response: success
|dcfeffff48692121| 41,533 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,001 >>> mbox cmd response: success
|dcfeffff48692121| 44,264 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,839 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
3,517 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,033 >>> mbox cmd response: success
35,651 UART: |dcfeffff48692121| 37,681 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,280 >>> mbox cmd response: success
|dcfeffff48692121| 40,541 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,063 >>> mbox cmd response: success
|dcfeffff48692121| 43,296 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,820 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,393 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,937 >>> mbox cmd response: success
35,468 UART: |dcfeffff48692121| 37,412 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,936 >>> mbox cmd response: success
|dcfeffff48692121| 40,130 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,579 >>> mbox cmd response: success
|dcfeffff48692121| 42,812 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,261 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,221 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,741 >>> mbox cmd response: success
35,310 UART: |dcfeffff48692121| 37,206 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,730 >>> mbox cmd response: success
|dcfeffff48692121| 39,926 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,375 >>> mbox cmd response: success
|dcfeffff48692121| 42,612 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,140 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,603 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,135 >>> mbox cmd response: success
35,746 UART: |dcfeffff48692121| 37,741 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,328 >>> mbox cmd response: success
|dcfeffff48692121| 40,593 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,136 >>> mbox cmd response: success
|dcfeffff48692121| 43,389 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,953 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,572 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,076 >>> mbox cmd response: success
35,776 UART: |dcfeffff48692121| 37,706 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,304 >>> mbox cmd response: success
|dcfeffff48692121| 40,519 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,036 >>> mbox cmd response: success
|dcfeffff48692121| 43,327 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,860 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,211 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,730 >>> mbox cmd response: success
35,312 UART: |dcfeffff48692121| 37,251 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,790 >>> mbox cmd response: success
|dcfeffff48692121| 39,984 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,487 >>> mbox cmd response: success
|dcfeffff48692121| 42,767 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,271 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,371 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,898 >>> mbox cmd response: success
35,423 UART: |dcfeffff48692121| 37,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,858 >>> mbox cmd response: success
|dcfeffff48692121| 40,052 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,509 >>> mbox cmd response: success
|dcfeffff48692121| 42,768 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,216 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,648 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,176 >>> mbox cmd response: success
35,808 UART: |dcfeffff48692121| 37,818 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,421 >>> mbox cmd response: success
|dcfeffff48692121| 40,633 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,224 >>> mbox cmd response: success
|dcfeffff48692121| 43,472 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,004 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
3,415 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,955 >>> mbox cmd response: success
35,554 UART: |dcfeffff48692121| 37,555 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,154 >>> mbox cmd response: success
|dcfeffff48692121| 40,357 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,887 >>> mbox cmd response: success
|dcfeffff48692121| 43,197 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,761 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,459 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,852 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,777 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,824 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,774 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,800 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,837 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,831 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,826 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,765 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,820 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,801 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,806 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,770 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,781 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,787 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,777 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.07s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.09s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.14s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.08s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.09s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
1,302,075 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
1,302,207 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
1,302,381 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
1,302,371 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,904 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,222 UART:
192,604 UART: Running Caliptra ROM ...
193,785 UART:
193,942 UART: [state] CFI Enabled
261,123 UART: [state] LifecycleState = Unprovisioned
263,087 UART: [state] DebugLocked = No
264,909 UART: [state] WD Timer not started. Device not locked for debugging
268,581 UART: [kat] SHA2-256
448,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,008 UART: [kat] ++
459,553 UART: [kat] sha1
469,425 UART: [kat] SHA2-256
471,934 UART: [kat] SHA2-384
478,783 UART: [kat] SHA2-512-ACC
481,134 UART: [kat] ECC-384
2,926,555 UART: [kat] HMAC-384Kdf
2,950,504 UART: [kat] LMS
3,426,996 UART: [kat] --
3,430,602 UART: [cold-reset] ++
3,432,890 UART: [fht] FHT @ 0x50003400
3,444,261 UART: [idev] ++
3,444,839 UART: [idev] CDI.KEYID = 6
3,445,781 UART: [idev] SUBJECT.KEYID = 7
3,447,000 UART: [idev] UDS.KEYID = 0
3,480,677 UART: [idev] Erasing UDS.KEYID = 0
5,961,962 UART: [idev] Sha1 KeyId Algorithm
5,985,735 UART: [idev] --
5,991,027 UART: [ldev] ++
5,991,640 UART: [ldev] CDI.KEYID = 6
5,992,559 UART: [ldev] SUBJECT.KEYID = 5
5,993,780 UART: [ldev] AUTHORITY.KEYID = 7
5,995,022 UART: [ldev] FE.KEYID = 1
6,037,002 UART: [ldev] Erasing FE.KEYID = 1
8,541,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,959 UART: [ldev] --
10,353,930 UART: [fwproc] Wait for Commands...
10,356,246 UART: [fwproc] Recv command 0x43415053
10,358,947 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,856 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,265,955 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,548 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,491 UART:
192,878 UART: Running Caliptra ROM ...
194,060 UART:
603,800 UART: [state] CFI Enabled
616,549 UART: [state] LifecycleState = Unprovisioned
618,495 UART: [state] DebugLocked = No
619,786 UART: [state] WD Timer not started. Device not locked for debugging
623,882 UART: [kat] SHA2-256
803,506 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,293 UART: [kat] ++
814,805 UART: [kat] sha1
825,216 UART: [kat] SHA2-256
827,880 UART: [kat] SHA2-384
832,993 UART: [kat] SHA2-512-ACC
835,389 UART: [kat] ECC-384
3,279,382 UART: [kat] HMAC-384Kdf
3,292,263 UART: [kat] LMS
3,768,798 UART: [kat] --
3,775,540 UART: [cold-reset] ++
3,777,580 UART: [fht] FHT @ 0x50003400
3,789,508 UART: [idev] ++
3,790,087 UART: [idev] CDI.KEYID = 6
3,791,106 UART: [idev] SUBJECT.KEYID = 7
3,792,316 UART: [idev] UDS.KEYID = 0
3,810,391 UART: [idev] Erasing UDS.KEYID = 0
6,270,555 UART: [idev] Sha1 KeyId Algorithm
6,293,332 UART: [idev] --
6,298,047 UART: [ldev] ++
6,298,627 UART: [ldev] CDI.KEYID = 6
6,299,508 UART: [ldev] SUBJECT.KEYID = 5
6,300,714 UART: [ldev] AUTHORITY.KEYID = 7
6,301,995 UART: [ldev] FE.KEYID = 1
6,312,939 UART: [ldev] Erasing FE.KEYID = 1
8,789,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,046 UART: [ldev] --
10,585,646 UART: [fwproc] Wait for Commands...
10,588,512 UART: [fwproc] Recv command 0x43415053
10,591,262 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
4,345 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,500,356 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,288 UART: [kat] ++
895,440 UART: [kat] sha1
899,662 UART: [kat] SHA2-256
901,602 UART: [kat] SHA2-384
904,321 UART: [kat] SHA2-512-ACC
906,222 UART: [kat] ECC-384
916,149 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,170,102 UART: [cold-reset] ++
1,170,594 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,182,163 UART: [idev] Erasing UDS.KEYID = 0
1,199,041 UART: [idev] Sha1 KeyId Algorithm
1,207,847 UART: [idev] --
1,208,824 UART: [ldev] ++
1,208,992 UART: [ldev] CDI.KEYID = 6
1,209,356 UART: [ldev] SUBJECT.KEYID = 5
1,209,783 UART: [ldev] AUTHORITY.KEYID = 7
1,210,246 UART: [ldev] FE.KEYID = 1
1,215,540 UART: [ldev] Erasing FE.KEYID = 1
1,242,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,824 UART: [ldev] --
1,281,203 UART: [fwproc] Wait for Commands...
1,281,998 UART: [fwproc] Recv command 0x43415053
1,282,991 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,138,441 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,609 UART: [kat] ++
895,761 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,698 UART: [kat] SHA2-512-ACC
906,599 UART: [kat] ECC-384
916,604 UART: [kat] HMAC-384Kdf
921,240 UART: [kat] LMS
1,169,552 UART: [kat] --
1,170,459 UART: [cold-reset] ++
1,170,941 UART: [fht] FHT @ 0x50003400
1,173,729 UART: [idev] ++
1,173,897 UART: [idev] CDI.KEYID = 6
1,174,258 UART: [idev] SUBJECT.KEYID = 7
1,174,683 UART: [idev] UDS.KEYID = 0
1,182,636 UART: [idev] Erasing UDS.KEYID = 0
1,199,028 UART: [idev] Sha1 KeyId Algorithm
1,207,830 UART: [idev] --
1,208,893 UART: [ldev] ++
1,209,061 UART: [ldev] CDI.KEYID = 6
1,209,425 UART: [ldev] SUBJECT.KEYID = 5
1,209,852 UART: [ldev] AUTHORITY.KEYID = 7
1,210,315 UART: [ldev] FE.KEYID = 1
1,215,701 UART: [ldev] Erasing FE.KEYID = 1
1,241,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,297 UART: [ldev] --
1,280,630 UART: [fwproc] Wait for Commands...
1,281,311 UART: [fwproc] Recv command 0x43415053
1,282,304 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,140,392 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,136 UART: [kat] ++
895,288 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
915,633 UART: [kat] HMAC-384Kdf
920,193 UART: [kat] LMS
1,168,505 UART: [kat] --
1,169,594 UART: [cold-reset] ++
1,170,138 UART: [fht] FHT @ 0x50003400
1,172,742 UART: [idev] ++
1,172,910 UART: [idev] CDI.KEYID = 6
1,173,271 UART: [idev] SUBJECT.KEYID = 7
1,173,696 UART: [idev] UDS.KEYID = 0
1,181,635 UART: [idev] Erasing UDS.KEYID = 0
1,198,287 UART: [idev] Sha1 KeyId Algorithm
1,207,097 UART: [idev] --
1,208,006 UART: [ldev] ++
1,208,174 UART: [ldev] CDI.KEYID = 6
1,208,538 UART: [ldev] SUBJECT.KEYID = 5
1,208,965 UART: [ldev] AUTHORITY.KEYID = 7
1,209,428 UART: [ldev] FE.KEYID = 1
1,214,738 UART: [ldev] Erasing FE.KEYID = 1
1,240,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,184 UART: [ldev] --
1,280,543 UART: [fwproc] Wait for Commands...
1,281,350 UART: [fwproc] Recv command 0x43415053
1,282,343 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,138,753 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
916,160 UART: [kat] HMAC-384Kdf
920,654 UART: [kat] LMS
1,168,966 UART: [kat] --
1,169,909 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,173,081 UART: [idev] ++
1,173,249 UART: [idev] CDI.KEYID = 6
1,173,610 UART: [idev] SUBJECT.KEYID = 7
1,174,035 UART: [idev] UDS.KEYID = 0
1,181,858 UART: [idev] Erasing UDS.KEYID = 0
1,199,168 UART: [idev] Sha1 KeyId Algorithm
1,207,890 UART: [idev] --
1,208,897 UART: [ldev] ++
1,209,065 UART: [ldev] CDI.KEYID = 6
1,209,429 UART: [ldev] SUBJECT.KEYID = 5
1,209,856 UART: [ldev] AUTHORITY.KEYID = 7
1,210,319 UART: [ldev] FE.KEYID = 1
1,215,383 UART: [ldev] Erasing FE.KEYID = 1
1,241,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,319 UART: [ldev] --
1,280,696 UART: [fwproc] Wait for Commands...
1,281,487 UART: [fwproc] Recv command 0x43415053
1,282,480 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,140,118 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,448 UART: [state] LifecycleState = Unprovisioned
86,103 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,514 UART: [kat] ++
895,666 UART: [kat] sha1
899,962 UART: [kat] SHA2-256
901,902 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,077 UART: [kat] HMAC-384Kdf
920,809 UART: [kat] LMS
1,169,121 UART: [kat] --
1,170,102 UART: [cold-reset] ++
1,170,446 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,199,465 UART: [idev] Sha1 KeyId Algorithm
1,208,335 UART: [idev] --
1,209,370 UART: [ldev] ++
1,209,538 UART: [ldev] CDI.KEYID = 6
1,209,902 UART: [ldev] SUBJECT.KEYID = 5
1,210,329 UART: [ldev] AUTHORITY.KEYID = 7
1,210,792 UART: [ldev] FE.KEYID = 1
1,215,676 UART: [ldev] Erasing FE.KEYID = 1
1,242,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,520 UART: [ldev] --
1,281,943 UART: [fwproc] Wait for Commands...
1,282,676 UART: [fwproc] Recv command 0x43415053
1,283,669 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,138,779 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,096 UART: [kat] HMAC-384Kdf
920,724 UART: [kat] LMS
1,169,036 UART: [kat] --
1,169,929 UART: [cold-reset] ++
1,170,455 UART: [fht] FHT @ 0x50003400
1,172,987 UART: [idev] ++
1,173,155 UART: [idev] CDI.KEYID = 6
1,173,516 UART: [idev] SUBJECT.KEYID = 7
1,173,941 UART: [idev] UDS.KEYID = 0
1,182,158 UART: [idev] Erasing UDS.KEYID = 0
1,199,302 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,345 UART: [ldev] ++
1,209,513 UART: [ldev] CDI.KEYID = 6
1,209,877 UART: [ldev] SUBJECT.KEYID = 5
1,210,304 UART: [ldev] AUTHORITY.KEYID = 7
1,210,767 UART: [ldev] FE.KEYID = 1
1,215,895 UART: [ldev] Erasing FE.KEYID = 1
1,242,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,209 UART: [ldev] --
1,281,490 UART: [fwproc] Wait for Commands...
1,282,211 UART: [fwproc] Recv command 0x43415053
1,283,204 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,139,894 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.12s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.12s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.29s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.31s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.31s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.20s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "060bfd8cc31b31c79565e0a5991fa848bedfced949354d7cb1ac89faee917bd1253a832c44b659fac5341bac1efc4dde",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,510 writing to cptra_bootfsm_go
192,798 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
198,000 UART: ROM Fatal Error: 0x01050002test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8b29576619d2f498a2f723b8db14744c7f64f76a76ea9540d13f03be9ab86fd00e5625e6b3f6a99f3d9e67cbc30e6f64",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "060bfd8cc31b31c79565e0a5991fa848bedfced949354d7cb1ac89faee917bd1253a832c44b659fac5341bac1efc4dde",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,467 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,653 UART: ROM Fatal Error: 0x01050002test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8b29576619d2f498a2f723b8db14744c7f64f76a76ea9540d13f03be9ab86fd00e5625e6b3f6a99f3d9e67cbc30e6f64",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.15s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.14s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.16s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,146 UART:
192,514 UART: Running Caliptra ROM ...
193,661 UART:
193,818 UART: [state] CFI Enabled
209,537 UART: [state] LifecycleState = Unprovisioned
211,456 UART: [state] DebugLocked = No
213,572 UART: [state] WD Timer not started. Device not locked for debugging
218,239 UART: [kat] SHA2-256
397,943 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
408,688 UART: [kat] ++
409,334 UART: [kat] sha1
420,104 UART: [kat] SHA2-256
422,840 UART: [kat] SHA2-384
429,475 UART: [kat] SHA2-512-ACC
431,848 UART: [kat] ECC-384
2,873,824 UART: [kat] HMAC-384Kdf
2,885,905 UART: [kat] LMS
3,362,349 UART: [kat] --
3,368,159 UART: [cold-reset] ++
3,369,677 UART: [fht] FHT @ 0x50003400
3,380,590 UART: [idev] ++
3,381,171 UART: [idev] CDI.KEYID = 6
3,382,212 UART: [idev] SUBJECT.KEYID = 7
3,383,396 UART: [idev] UDS.KEYID = 0
3,384,338 ready_for_fw is high
3,384,575 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,522,808 UART: [idev] Erasing UDS.KEYID = 0
5,862,827 UART: [idev] Sha1 KeyId Algorithm
5,886,516 UART: [idev] --
5,891,074 UART: [ldev] ++
5,891,667 UART: [ldev] CDI.KEYID = 6
5,892,562 UART: [ldev] SUBJECT.KEYID = 5
5,893,777 UART: [ldev] AUTHORITY.KEYID = 7
5,895,016 UART: [ldev] FE.KEYID = 1
5,907,943 UART: [ldev] Erasing FE.KEYID = 1
8,387,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,108,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,124,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,140,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,156,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,177,812 UART: [ldev] --
10,183,243 UART: [fwproc] Wait for Commands...
10,186,046 UART: [fwproc] Recv command 0x46574c44
10,188,058 UART: [fwproc] Recv'd Img size: 109820 bytes
13,564,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,648,949 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,691,412 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,019,983 >>> mbox cmd response: success
14,023,269 UART: [afmc] ++
14,023,867 UART: [afmc] CDI.KEYID = 6
14,024,784 UART: [afmc] SUBJECT.KEYID = 7
14,026,011 UART: [afmc] AUTHORITY.KEYID = 5
16,530,496 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,254,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,256,350 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,272,070 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,288,080 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,303,786 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,327,950 UART: [afmc] --
18,331,116 UART: [cold-reset] --
18,335,619 UART: [state] Locking Datavault
18,341,541 UART: [state] Locking PCR0, PCR1 and PCR31
18,343,269 UART: [state] Locking ICCM
18,345,138 UART: [exit] Launching FMC @ 0x40000000
18,353,509 UART:
18,353,772 UART: Running Caliptra FMC ...
18,354,922 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,372,387 ready_for_fw is high
3,372,931 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
13,908,230 >>> mbox cmd response: success
18,159,044 UART:
18,159,434 UART: Running Caliptra FMC ...
18,160,701 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,388 UART:
192,757 UART: Running Caliptra ROM ...
193,879 UART:
194,029 UART: [state] CFI Enabled
209,796 UART: [state] LifecycleState = Unprovisioned
211,725 UART: [state] DebugLocked = No
213,824 UART: [state] WD Timer not started. Device not locked for debugging
218,558 UART: [kat] SHA2-256
398,187 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
408,935 UART: [kat] ++
409,411 UART: [kat] sha1
420,379 UART: [kat] SHA2-256
423,069 UART: [kat] SHA2-384
429,715 UART: [kat] SHA2-512-ACC
432,154 UART: [kat] ECC-384
2,874,148 UART: [kat] HMAC-384Kdf
2,886,176 UART: [kat] LMS
3,362,630 UART: [kat] --
3,368,417 UART: [cold-reset] ++
3,369,994 UART: [fht] FHT @ 0x50003400
3,380,917 UART: [idev] ++
3,381,517 UART: [idev] CDI.KEYID = 6
3,382,427 UART: [idev] SUBJECT.KEYID = 7
3,383,671 UART: [idev] UDS.KEYID = 0
3,384,588 ready_for_fw is high
3,384,773 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,522,569 UART: [idev] Erasing UDS.KEYID = 0
5,863,117 UART: [idev] Sha1 KeyId Algorithm
5,886,771 UART: [idev] --
5,891,353 UART: [ldev] ++
5,891,919 UART: [ldev] CDI.KEYID = 6
5,892,880 UART: [ldev] SUBJECT.KEYID = 5
5,894,031 UART: [ldev] AUTHORITY.KEYID = 7
5,895,318 UART: [ldev] FE.KEYID = 1
5,908,246 UART: [ldev] Erasing FE.KEYID = 1
8,387,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,109,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,125,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,140,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,156,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,178,094 UART: [ldev] --
10,183,485 UART: [fwproc] Wait for Commands...
10,186,328 UART: [fwproc] Recv command 0x46574c44
10,188,326 UART: [fwproc] Recv'd Img size: 109820 bytes
13,564,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,649,224 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,691,677 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,020,273 >>> mbox cmd response: success
14,023,508 UART: [afmc] ++
14,024,099 UART: [afmc] CDI.KEYID = 6
14,025,145 UART: [afmc] SUBJECT.KEYID = 7
14,026,253 UART: [afmc] AUTHORITY.KEYID = 5
16,530,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,254,455 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,256,633 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,272,374 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,288,347 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,304,043 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,328,255 UART: [afmc] --
18,331,405 UART: [cold-reset] --
18,335,905 UART: [state] Locking Datavault
18,341,783 UART: [state] Locking PCR0, PCR1 and PCR31
18,343,577 UART: [state] Locking ICCM
18,345,392 UART: [exit] Launching FMC @ 0x40000000
18,353,764 UART:
18,354,021 UART: Running Caliptra FMC ...
18,355,191 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,372,713 ready_for_fw is high
3,373,125 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
13,908,598 >>> mbox cmd response: success
18,159,414 UART:
18,159,821 UART: Running Caliptra FMC ...
18,160,993 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
191,987 UART:
192,378 UART: Running Caliptra ROM ...
193,483 UART:
193,631 UART: [state] CFI Enabled
267,986 UART: [state] LifecycleState = Unprovisioned
269,948 UART: [state] DebugLocked = No
271,629 UART: [state] WD Timer not started. Device not locked for debugging
276,170 UART: [kat] SHA2-256
455,822 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,582 UART: [kat] ++
467,036 UART: [kat] sha1
477,135 UART: [kat] SHA2-256
479,829 UART: [kat] SHA2-384
485,076 UART: [kat] SHA2-512-ACC
487,426 UART: [kat] ECC-384
2,947,615 UART: [kat] HMAC-384Kdf
2,972,997 UART: [kat] LMS
3,449,509 UART: [kat] --
3,455,012 UART: [cold-reset] ++
3,457,105 UART: [fht] FHT @ 0x50003400
3,468,365 UART: [idev] ++
3,468,936 UART: [idev] CDI.KEYID = 6
3,469,960 UART: [idev] SUBJECT.KEYID = 7
3,471,136 UART: [idev] UDS.KEYID = 0
3,502,314 UART: [idev] Erasing UDS.KEYID = 0
5,987,068 UART: [idev] Sha1 KeyId Algorithm
6,011,250 UART: [idev] --
6,016,741 UART: [ldev] ++
6,017,385 UART: [ldev] CDI.KEYID = 6
6,018,308 UART: [ldev] SUBJECT.KEYID = 5
6,019,424 UART: [ldev] AUTHORITY.KEYID = 7
6,020,729 UART: [ldev] FE.KEYID = 1
6,057,744 UART: [ldev] Erasing FE.KEYID = 1
8,564,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,327 UART: [ldev] --
10,519,689 UART: [fwproc] Wait for Commands...
10,521,258 UART: [fwproc] Recv command 0x46574c44
10,523,273 UART: [fwproc] Recv'd Img size: 118548 bytes
14,011,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,087,036 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,160,074 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,491,864 UART: [afmc] ++
14,492,485 UART: [afmc] CDI.KEYID = 6
14,493,407 UART: [afmc] SUBJECT.KEYID = 7
14,494,634 UART: [afmc] AUTHORITY.KEYID = 5
17,022,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,745,588 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,747,813 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,763,580 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,779,650 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,795,231 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,818,800 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,493 UART:
192,860 UART: Running Caliptra ROM ...
194,519 UART:
603,736 UART: [state] CFI Enabled
616,798 UART: [state] LifecycleState = Unprovisioned
618,693 UART: [state] DebugLocked = No
620,906 UART: [state] WD Timer not started. Device not locked for debugging
624,252 UART: [kat] SHA2-256
803,939 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,673 UART: [kat] ++
815,261 UART: [kat] sha1
826,304 UART: [kat] SHA2-256
828,977 UART: [kat] SHA2-384
833,875 UART: [kat] SHA2-512-ACC
836,252 UART: [kat] ECC-384
3,280,466 UART: [kat] HMAC-384Kdf
3,291,791 UART: [kat] LMS
3,768,273 UART: [kat] --
3,773,950 UART: [cold-reset] ++
3,774,904 UART: [fht] FHT @ 0x50003400
3,786,637 UART: [idev] ++
3,787,204 UART: [idev] CDI.KEYID = 6
3,788,222 UART: [idev] SUBJECT.KEYID = 7
3,789,452 UART: [idev] UDS.KEYID = 0
3,806,900 UART: [idev] Erasing UDS.KEYID = 0
6,271,228 UART: [idev] Sha1 KeyId Algorithm
6,294,894 UART: [idev] --
6,298,748 UART: [ldev] ++
6,299,345 UART: [ldev] CDI.KEYID = 6
6,300,416 UART: [ldev] SUBJECT.KEYID = 5
6,301,535 UART: [ldev] AUTHORITY.KEYID = 7
6,302,704 UART: [ldev] FE.KEYID = 1
6,312,344 UART: [ldev] Erasing FE.KEYID = 1
8,792,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,094 UART: [ldev] --
10,736,185 UART: [fwproc] Wait for Commands...
10,737,756 UART: [fwproc] Recv command 0x46574c44
10,739,399 UART: [fwproc] Recv'd Img size: 118548 bytes
14,224,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,299,586 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,372,609 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,704,346 UART: [afmc] ++
14,704,959 UART: [afmc] CDI.KEYID = 6
14,705,846 UART: [afmc] SUBJECT.KEYID = 7
14,707,114 UART: [afmc] AUTHORITY.KEYID = 5
17,212,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,932,704 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,934,890 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,950,717 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,966,788 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,358 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,271 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,744 UART: [state] LifecycleState = Unprovisioned
85,399 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
890,908 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,012 UART: [kat] ++
895,164 UART: [kat] sha1
899,260 UART: [kat] SHA2-256
901,200 UART: [kat] SHA2-384
904,045 UART: [kat] SHA2-512-ACC
905,946 UART: [kat] ECC-384
915,237 UART: [kat] HMAC-384Kdf
919,913 UART: [kat] LMS
1,168,225 UART: [kat] --
1,169,064 UART: [cold-reset] ++
1,169,472 UART: [fht] FHT @ 0x50003400
1,172,282 UART: [idev] ++
1,172,450 UART: [idev] CDI.KEYID = 6
1,172,811 UART: [idev] SUBJECT.KEYID = 7
1,173,236 UART: [idev] UDS.KEYID = 0
1,181,233 UART: [idev] Erasing UDS.KEYID = 0
1,198,669 UART: [idev] Sha1 KeyId Algorithm
1,207,593 UART: [idev] --
1,208,680 UART: [ldev] ++
1,208,848 UART: [ldev] CDI.KEYID = 6
1,209,212 UART: [ldev] SUBJECT.KEYID = 5
1,209,639 UART: [ldev] AUTHORITY.KEYID = 7
1,210,102 UART: [ldev] FE.KEYID = 1
1,215,262 UART: [ldev] Erasing FE.KEYID = 1
1,241,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,104 UART: [ldev] --
1,280,395 UART: [fwproc] Wait for Commands...
1,281,034 UART: [fwproc] Recv command 0x46574c44
1,281,767 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,727 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,902 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,225 UART: [afmc] ++
2,826,393 UART: [afmc] CDI.KEYID = 6
2,826,756 UART: [afmc] SUBJECT.KEYID = 7
2,827,182 UART: [afmc] AUTHORITY.KEYID = 5
2,862,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,601 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,311 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,192 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,893 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,666 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
900,087 UART: [kat] SHA2-256
902,027 UART: [kat] SHA2-384
904,686 UART: [kat] SHA2-512-ACC
906,587 UART: [kat] ECC-384
916,268 UART: [kat] HMAC-384Kdf
920,936 UART: [kat] LMS
1,169,248 UART: [kat] --
1,170,001 UART: [cold-reset] ++
1,170,527 UART: [fht] FHT @ 0x50003400
1,173,147 UART: [idev] ++
1,173,315 UART: [idev] CDI.KEYID = 6
1,173,676 UART: [idev] SUBJECT.KEYID = 7
1,174,101 UART: [idev] UDS.KEYID = 0
1,182,316 UART: [idev] Erasing UDS.KEYID = 0
1,198,832 UART: [idev] Sha1 KeyId Algorithm
1,207,622 UART: [idev] --
1,208,673 UART: [ldev] ++
1,208,841 UART: [ldev] CDI.KEYID = 6
1,209,205 UART: [ldev] SUBJECT.KEYID = 5
1,209,632 UART: [ldev] AUTHORITY.KEYID = 7
1,210,095 UART: [ldev] FE.KEYID = 1
1,215,453 UART: [ldev] Erasing FE.KEYID = 1
1,241,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,473 UART: [ldev] --
1,280,918 UART: [fwproc] Wait for Commands...
1,281,607 UART: [fwproc] Recv command 0x46574c44
1,282,340 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,684 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,859 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,334 UART: [afmc] ++
2,824,502 UART: [afmc] CDI.KEYID = 6
2,824,865 UART: [afmc] SUBJECT.KEYID = 7
2,825,291 UART: [afmc] AUTHORITY.KEYID = 5
2,861,028 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,826 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,536 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,417 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,118 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,987 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,702 UART: [state] LifecycleState = Unprovisioned
86,357 UART: [state] DebugLocked = No
87,017 UART: [state] WD Timer not started. Device not locked for debugging
88,138 UART: [kat] SHA2-256
891,688 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,792 UART: [kat] ++
895,944 UART: [kat] sha1
900,168 UART: [kat] SHA2-256
902,108 UART: [kat] SHA2-384
904,951 UART: [kat] SHA2-512-ACC
906,852 UART: [kat] ECC-384
916,451 UART: [kat] HMAC-384Kdf
921,249 UART: [kat] LMS
1,169,561 UART: [kat] --
1,170,440 UART: [cold-reset] ++
1,170,778 UART: [fht] FHT @ 0x50003400
1,173,596 UART: [idev] ++
1,173,764 UART: [idev] CDI.KEYID = 6
1,174,125 UART: [idev] SUBJECT.KEYID = 7
1,174,550 UART: [idev] UDS.KEYID = 0
1,182,051 UART: [idev] Erasing UDS.KEYID = 0
1,199,349 UART: [idev] Sha1 KeyId Algorithm
1,208,143 UART: [idev] --
1,209,132 UART: [ldev] ++
1,209,300 UART: [ldev] CDI.KEYID = 6
1,209,664 UART: [ldev] SUBJECT.KEYID = 5
1,210,091 UART: [ldev] AUTHORITY.KEYID = 7
1,210,554 UART: [ldev] FE.KEYID = 1
1,215,858 UART: [ldev] Erasing FE.KEYID = 1
1,242,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,492 UART: [ldev] --
1,281,783 UART: [fwproc] Wait for Commands...
1,282,396 UART: [fwproc] Recv command 0x46574c44
1,283,129 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,217 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,392 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,953 UART: [afmc] ++
2,828,121 UART: [afmc] CDI.KEYID = 6
2,828,484 UART: [afmc] SUBJECT.KEYID = 7
2,828,910 UART: [afmc] AUTHORITY.KEYID = 5
2,864,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,919 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,629 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,510 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,211 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,162 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,615 UART: [kat] ++
895,767 UART: [kat] sha1
900,007 UART: [kat] SHA2-256
901,947 UART: [kat] SHA2-384
904,770 UART: [kat] SHA2-512-ACC
906,671 UART: [kat] ECC-384
915,784 UART: [kat] HMAC-384Kdf
920,562 UART: [kat] LMS
1,168,874 UART: [kat] --
1,169,731 UART: [cold-reset] ++
1,170,307 UART: [fht] FHT @ 0x50003400
1,172,851 UART: [idev] ++
1,173,019 UART: [idev] CDI.KEYID = 6
1,173,380 UART: [idev] SUBJECT.KEYID = 7
1,173,805 UART: [idev] UDS.KEYID = 0
1,181,848 UART: [idev] Erasing UDS.KEYID = 0
1,198,948 UART: [idev] Sha1 KeyId Algorithm
1,207,786 UART: [idev] --
1,209,009 UART: [ldev] ++
1,209,177 UART: [ldev] CDI.KEYID = 6
1,209,541 UART: [ldev] SUBJECT.KEYID = 5
1,209,968 UART: [ldev] AUTHORITY.KEYID = 7
1,210,431 UART: [ldev] FE.KEYID = 1
1,215,799 UART: [ldev] Erasing FE.KEYID = 1
1,242,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,363 UART: [ldev] --
1,281,772 UART: [fwproc] Wait for Commands...
1,282,479 UART: [fwproc] Recv command 0x46574c44
1,283,212 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,800 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,975 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,606 UART: [afmc] ++
2,829,774 UART: [afmc] CDI.KEYID = 6
2,830,137 UART: [afmc] SUBJECT.KEYID = 7
2,830,563 UART: [afmc] AUTHORITY.KEYID = 5
2,865,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,326 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,036 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,917 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,618 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,439 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,660 UART: [state] LifecycleState = Unprovisioned
85,315 UART: [state] DebugLocked = No
85,987 UART: [state] WD Timer not started. Device not locked for debugging
87,202 UART: [kat] SHA2-256
890,752 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,856 UART: [kat] ++
895,008 UART: [kat] sha1
899,324 UART: [kat] SHA2-256
901,264 UART: [kat] SHA2-384
903,977 UART: [kat] SHA2-512-ACC
905,878 UART: [kat] ECC-384
915,393 UART: [kat] HMAC-384Kdf
919,809 UART: [kat] LMS
1,168,121 UART: [kat] --
1,168,934 UART: [cold-reset] ++
1,169,264 UART: [fht] FHT @ 0x50003400
1,171,790 UART: [idev] ++
1,171,958 UART: [idev] CDI.KEYID = 6
1,172,319 UART: [idev] SUBJECT.KEYID = 7
1,172,744 UART: [idev] UDS.KEYID = 0
1,180,547 UART: [idev] Erasing UDS.KEYID = 0
1,197,521 UART: [idev] Sha1 KeyId Algorithm
1,206,461 UART: [idev] --
1,207,360 UART: [ldev] ++
1,207,528 UART: [ldev] CDI.KEYID = 6
1,207,892 UART: [ldev] SUBJECT.KEYID = 5
1,208,319 UART: [ldev] AUTHORITY.KEYID = 7
1,208,782 UART: [ldev] FE.KEYID = 1
1,214,020 UART: [ldev] Erasing FE.KEYID = 1
1,239,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,864 UART: [ldev] --
1,279,153 UART: [fwproc] Wait for Commands...
1,279,906 UART: [fwproc] Recv command 0x46574c44
1,280,639 UART: [fwproc] Recv'd Img size: 118548 bytes
2,623,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,650,611 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,681,786 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,081 UART: [afmc] ++
2,823,249 UART: [afmc] CDI.KEYID = 6
2,823,612 UART: [afmc] SUBJECT.KEYID = 7
2,824,038 UART: [afmc] AUTHORITY.KEYID = 5
2,859,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,875,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,876,735 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,882,445 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,888,326 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,894,027 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,901,860 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [kat] SHA2-256
891,365 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,469 UART: [kat] ++
895,621 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,722 UART: [kat] SHA2-512-ACC
906,623 UART: [kat] ECC-384
916,336 UART: [kat] HMAC-384Kdf
920,842 UART: [kat] LMS
1,169,154 UART: [kat] --
1,170,149 UART: [cold-reset] ++
1,170,557 UART: [fht] FHT @ 0x50003400
1,173,317 UART: [idev] ++
1,173,485 UART: [idev] CDI.KEYID = 6
1,173,846 UART: [idev] SUBJECT.KEYID = 7
1,174,271 UART: [idev] UDS.KEYID = 0
1,182,344 UART: [idev] Erasing UDS.KEYID = 0
1,199,832 UART: [idev] Sha1 KeyId Algorithm
1,208,664 UART: [idev] --
1,209,597 UART: [ldev] ++
1,209,765 UART: [ldev] CDI.KEYID = 6
1,210,129 UART: [ldev] SUBJECT.KEYID = 5
1,210,556 UART: [ldev] AUTHORITY.KEYID = 7
1,211,019 UART: [ldev] FE.KEYID = 1
1,216,711 UART: [ldev] Erasing FE.KEYID = 1
1,242,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,771 UART: [ldev] --
1,282,042 UART: [fwproc] Wait for Commands...
1,282,773 UART: [fwproc] Recv command 0x46574c44
1,283,506 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,724 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,899 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,488 UART: [afmc] ++
2,828,656 UART: [afmc] CDI.KEYID = 6
2,829,019 UART: [afmc] SUBJECT.KEYID = 7
2,829,445 UART: [afmc] AUTHORITY.KEYID = 5
2,865,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,021 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,770 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,480 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,361 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,062 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,931 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,190 UART:
192,555 UART: Running Caliptra ROM ...
193,761 UART:
193,917 UART: [state] CFI Enabled
262,726 UART: [state] LifecycleState = Unprovisioned
264,720 UART: [state] DebugLocked = No
267,037 UART: [state] WD Timer not started. Device not locked for debugging
271,369 UART: [kat] SHA2-256
451,037 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,783 UART: [kat] ++
462,311 UART: [kat] sha1
472,908 UART: [kat] SHA2-256
475,563 UART: [kat] SHA2-384
481,132 UART: [kat] SHA2-512-ACC
483,509 UART: [kat] ECC-384
2,946,854 UART: [kat] HMAC-384Kdf
2,970,056 UART: [kat] LMS
3,446,553 UART: [kat] --
3,453,048 UART: [cold-reset] ++
3,454,635 UART: [fht] FHT @ 0x50003400
3,465,903 UART: [idev] ++
3,466,483 UART: [idev] CDI.KEYID = 6
3,467,407 UART: [idev] SUBJECT.KEYID = 7
3,468,660 UART: [idev] UDS.KEYID = 0
3,469,651 ready_for_fw is high
3,469,894 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,608,138 UART: [idev] Erasing UDS.KEYID = 0
5,988,422 UART: [idev] Sha1 KeyId Algorithm
6,011,812 UART: [idev] --
6,017,113 UART: [ldev] ++
6,017,697 UART: [ldev] CDI.KEYID = 6
6,018,617 UART: [ldev] SUBJECT.KEYID = 5
6,019,840 UART: [ldev] AUTHORITY.KEYID = 7
6,021,078 UART: [ldev] FE.KEYID = 1
6,057,500 UART: [ldev] Erasing FE.KEYID = 1
8,563,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,634 UART: [ldev] --
10,378,749 UART: [fwproc] Wait for Commands...
10,381,615 UART: [fwproc] Recv command 0x46574c44
10,383,611 UART: [fwproc] Recv'd Img size: 109820 bytes
13,753,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,829,760 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,872,229 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,199,790 >>> mbox cmd response: success
14,204,598 UART: [afmc] ++
14,205,194 UART: [afmc] CDI.KEYID = 6
14,206,168 UART: [afmc] SUBJECT.KEYID = 7
14,207,386 UART: [afmc] AUTHORITY.KEYID = 5
16,747,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,468,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,471,011 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,486,841 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,502,808 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,518,500 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,544,129 UART: [afmc] --
18,547,339 UART: [cold-reset] --
18,552,742 UART: [state] Locking Datavault
18,558,527 UART: [state] Locking PCR0, PCR1 and PCR31
18,560,304 UART: [state] Locking ICCM
18,562,412 UART: [exit] Launching FMC @ 0x40000000
18,570,787 UART:
18,571,039 UART: Running Caliptra FMC ...
18,572,189 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,460,355 ready_for_fw is high
3,460,760 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,074,705 >>> mbox cmd response: success
18,363,778 UART:
18,364,155 UART: Running Caliptra FMC ...
18,365,325 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,261 UART:
192,619 UART: Running Caliptra ROM ...
193,708 UART:
603,455 UART: [state] CFI Enabled
617,605 UART: [state] LifecycleState = Unprovisioned
619,546 UART: [state] DebugLocked = No
622,335 UART: [state] WD Timer not started. Device not locked for debugging
625,423 UART: [kat] SHA2-256
805,061 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,859 UART: [kat] ++
816,305 UART: [kat] sha1
828,235 UART: [kat] SHA2-256
830,885 UART: [kat] SHA2-384
838,315 UART: [kat] SHA2-512-ACC
840,683 UART: [kat] ECC-384
3,281,243 UART: [kat] HMAC-384Kdf
3,294,032 UART: [kat] LMS
3,770,510 UART: [kat] --
3,775,139 UART: [cold-reset] ++
3,776,141 UART: [fht] FHT @ 0x50003400
3,787,048 UART: [idev] ++
3,787,614 UART: [idev] CDI.KEYID = 6
3,788,639 UART: [idev] SUBJECT.KEYID = 7
3,789,808 UART: [idev] UDS.KEYID = 0
3,790,852 ready_for_fw is high
3,791,038 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,928,985 UART: [idev] Erasing UDS.KEYID = 0
6,265,946 UART: [idev] Sha1 KeyId Algorithm
6,289,479 UART: [idev] --
6,294,708 UART: [ldev] ++
6,295,289 UART: [ldev] CDI.KEYID = 6
6,296,169 UART: [ldev] SUBJECT.KEYID = 5
6,297,428 UART: [ldev] AUTHORITY.KEYID = 7
6,298,659 UART: [ldev] FE.KEYID = 1
6,309,547 UART: [ldev] Erasing FE.KEYID = 1
8,788,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,350 UART: [ldev] --
10,580,238 UART: [fwproc] Wait for Commands...
10,583,304 UART: [fwproc] Recv command 0x46574c44
10,585,285 UART: [fwproc] Recv'd Img size: 109820 bytes
13,958,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,040,941 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,083,377 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,411,873 >>> mbox cmd response: success
14,415,264 UART: [afmc] ++
14,415,908 UART: [afmc] CDI.KEYID = 6
14,416,817 UART: [afmc] SUBJECT.KEYID = 7
14,418,029 UART: [afmc] AUTHORITY.KEYID = 5
16,924,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,647,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,649,854 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,665,677 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,681,632 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,697,296 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,722,741 UART: [afmc] --
18,727,444 UART: [cold-reset] --
18,731,119 UART: [state] Locking Datavault
18,736,263 UART: [state] Locking PCR0, PCR1 and PCR31
18,737,984 UART: [state] Locking ICCM
18,739,591 UART: [exit] Launching FMC @ 0x40000000
18,747,953 UART:
18,748,198 UART: Running Caliptra FMC ...
18,749,336 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
3,776,750 ready_for_fw is high
3,777,342 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,305,622 >>> mbox cmd response: success
18,554,141 UART:
18,554,533 UART: Running Caliptra FMC ...
18,555,813 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,330 UART: [kat] ++
895,482 UART: [kat] sha1
899,638 UART: [kat] SHA2-256
901,578 UART: [kat] SHA2-384
904,549 UART: [kat] SHA2-512-ACC
906,450 UART: [kat] ECC-384
916,351 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,174,648 ready_for_fw is high
1,174,648 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,003 UART: [idev] Erasing UDS.KEYID = 0
1,199,237 UART: [idev] Sha1 KeyId Algorithm
1,208,041 UART: [idev] --
1,209,078 UART: [ldev] ++
1,209,246 UART: [ldev] CDI.KEYID = 6
1,209,610 UART: [ldev] SUBJECT.KEYID = 5
1,210,037 UART: [ldev] AUTHORITY.KEYID = 7
1,210,500 UART: [ldev] FE.KEYID = 1
1,215,508 UART: [ldev] Erasing FE.KEYID = 1
1,242,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,966 UART: [ldev] --
1,281,181 UART: [fwproc] Wait for Commands...
1,281,984 UART: [fwproc] Recv command 0x46574c44
1,282,717 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,053 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,136 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,327 >>> mbox cmd response: success
2,713,525 UART: [afmc] ++
2,713,693 UART: [afmc] CDI.KEYID = 6
2,714,056 UART: [afmc] SUBJECT.KEYID = 7
2,714,482 UART: [afmc] AUTHORITY.KEYID = 5
2,749,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,779 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,528 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,248 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,141 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,834 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,727 UART: [afmc] --
2,792,580 UART: [cold-reset] --
2,793,584 UART: [state] Locking Datavault
2,794,873 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,477 UART: [state] Locking ICCM
2,795,969 UART: [exit] Launching FMC @ 0x40000000
2,801,266 UART:
2,801,282 UART: Running Caliptra FMC ...
2,801,690 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,788 ready_for_fw is high
1,058,788 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,778 >>> mbox cmd response: success
2,627,155 UART:
2,627,171 UART: Running Caliptra FMC ...
2,627,579 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,127 UART: [kat] SHA2-256
902,067 UART: [kat] SHA2-384
904,862 UART: [kat] SHA2-512-ACC
906,763 UART: [kat] ECC-384
916,546 UART: [kat] HMAC-384Kdf
921,382 UART: [kat] LMS
1,169,694 UART: [kat] --
1,170,581 UART: [cold-reset] ++
1,171,021 UART: [fht] FHT @ 0x50003400
1,173,731 UART: [idev] ++
1,173,899 UART: [idev] CDI.KEYID = 6
1,174,260 UART: [idev] SUBJECT.KEYID = 7
1,174,685 UART: [idev] UDS.KEYID = 0
1,175,031 ready_for_fw is high
1,175,031 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,202 UART: [idev] Erasing UDS.KEYID = 0
1,199,798 UART: [idev] Sha1 KeyId Algorithm
1,208,662 UART: [idev] --
1,209,625 UART: [ldev] ++
1,209,793 UART: [ldev] CDI.KEYID = 6
1,210,157 UART: [ldev] SUBJECT.KEYID = 5
1,210,584 UART: [ldev] AUTHORITY.KEYID = 7
1,211,047 UART: [ldev] FE.KEYID = 1
1,216,323 UART: [ldev] Erasing FE.KEYID = 1
1,242,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,765 UART: [ldev] --
1,282,040 UART: [fwproc] Wait for Commands...
1,282,647 UART: [fwproc] Recv command 0x46574c44
1,283,380 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,982 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,065 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,314 >>> mbox cmd response: success
2,714,546 UART: [afmc] ++
2,714,714 UART: [afmc] CDI.KEYID = 6
2,715,077 UART: [afmc] SUBJECT.KEYID = 7
2,715,503 UART: [afmc] AUTHORITY.KEYID = 5
2,751,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,083 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,803 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,696 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,389 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,254 UART: [afmc] --
2,794,171 UART: [cold-reset] --
2,794,937 UART: [state] Locking Datavault
2,795,928 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,532 UART: [state] Locking ICCM
2,797,166 UART: [exit] Launching FMC @ 0x40000000
2,802,463 UART:
2,802,479 UART: Running Caliptra FMC ...
2,802,887 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,093 ready_for_fw is high
1,060,093 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,665 >>> mbox cmd response: success
2,630,462 UART:
2,630,478 UART: Running Caliptra FMC ...
2,630,886 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,741 UART: [kat] LMS
1,169,053 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,514 UART: [fht] FHT @ 0x50003400
1,173,216 UART: [idev] ++
1,173,384 UART: [idev] CDI.KEYID = 6
1,173,745 UART: [idev] SUBJECT.KEYID = 7
1,174,170 UART: [idev] UDS.KEYID = 0
1,174,516 ready_for_fw is high
1,174,516 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,983 UART: [idev] Erasing UDS.KEYID = 0
1,199,037 UART: [idev] Sha1 KeyId Algorithm
1,207,943 UART: [idev] --
1,209,022 UART: [ldev] ++
1,209,190 UART: [ldev] CDI.KEYID = 6
1,209,554 UART: [ldev] SUBJECT.KEYID = 5
1,209,981 UART: [ldev] AUTHORITY.KEYID = 7
1,210,444 UART: [ldev] FE.KEYID = 1
1,215,730 UART: [ldev] Erasing FE.KEYID = 1
1,241,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,512 UART: [ldev] --
1,280,769 UART: [fwproc] Wait for Commands...
1,281,514 UART: [fwproc] Recv command 0x46574c44
1,282,247 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,209 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,292 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,605 >>> mbox cmd response: success
2,714,619 UART: [afmc] ++
2,714,787 UART: [afmc] CDI.KEYID = 6
2,715,150 UART: [afmc] SUBJECT.KEYID = 7
2,715,576 UART: [afmc] AUTHORITY.KEYID = 5
2,750,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,870 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,590 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,483 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,176 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,045 UART: [afmc] --
2,793,862 UART: [cold-reset] --
2,794,652 UART: [state] Locking Datavault
2,795,819 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,423 UART: [state] Locking ICCM
2,796,847 UART: [exit] Launching FMC @ 0x40000000
2,802,144 UART:
2,802,160 UART: Running Caliptra FMC ...
2,802,568 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,760 ready_for_fw is high
1,058,760 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,476 >>> mbox cmd response: success
2,626,523 UART:
2,626,539 UART: Running Caliptra FMC ...
2,626,947 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,665 UART: [kat] ++
895,817 UART: [kat] sha1
900,085 UART: [kat] SHA2-256
902,025 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
916,650 UART: [kat] HMAC-384Kdf
921,244 UART: [kat] LMS
1,169,556 UART: [kat] --
1,170,323 UART: [cold-reset] ++
1,170,901 UART: [fht] FHT @ 0x50003400
1,173,671 UART: [idev] ++
1,173,839 UART: [idev] CDI.KEYID = 6
1,174,200 UART: [idev] SUBJECT.KEYID = 7
1,174,625 UART: [idev] UDS.KEYID = 0
1,174,971 ready_for_fw is high
1,174,971 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,204 UART: [idev] Erasing UDS.KEYID = 0
1,200,420 UART: [idev] Sha1 KeyId Algorithm
1,209,272 UART: [idev] --
1,210,443 UART: [ldev] ++
1,210,611 UART: [ldev] CDI.KEYID = 6
1,210,975 UART: [ldev] SUBJECT.KEYID = 5
1,211,402 UART: [ldev] AUTHORITY.KEYID = 7
1,211,865 UART: [ldev] FE.KEYID = 1
1,216,799 UART: [ldev] Erasing FE.KEYID = 1
1,243,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,293 UART: [ldev] --
1,282,666 UART: [fwproc] Wait for Commands...
1,283,257 UART: [fwproc] Recv command 0x46574c44
1,283,990 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,944 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,027 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,346 >>> mbox cmd response: success
2,714,392 UART: [afmc] ++
2,714,560 UART: [afmc] CDI.KEYID = 6
2,714,923 UART: [afmc] SUBJECT.KEYID = 7
2,715,349 UART: [afmc] AUTHORITY.KEYID = 5
2,750,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,993 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,713 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,606 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,299 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,900 UART: [afmc] --
2,793,771 UART: [cold-reset] --
2,794,407 UART: [state] Locking Datavault
2,795,584 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,188 UART: [state] Locking ICCM
2,796,644 UART: [exit] Launching FMC @ 0x40000000
2,801,941 UART:
2,801,957 UART: Running Caliptra FMC ...
2,802,365 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,175 ready_for_fw is high
1,060,175 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,783 >>> mbox cmd response: success
2,631,448 UART:
2,631,464 UART: Running Caliptra FMC ...
2,631,872 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,778 UART: [state] LifecycleState = Unprovisioned
85,433 UART: [state] DebugLocked = No
86,151 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
891,040 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,144 UART: [kat] ++
895,296 UART: [kat] sha1
899,540 UART: [kat] SHA2-256
901,480 UART: [kat] SHA2-384
904,227 UART: [kat] SHA2-512-ACC
906,128 UART: [kat] ECC-384
915,997 UART: [kat] HMAC-384Kdf
920,649 UART: [kat] LMS
1,168,961 UART: [kat] --
1,169,874 UART: [cold-reset] ++
1,170,204 UART: [fht] FHT @ 0x50003400
1,172,914 UART: [idev] ++
1,173,082 UART: [idev] CDI.KEYID = 6
1,173,443 UART: [idev] SUBJECT.KEYID = 7
1,173,868 UART: [idev] UDS.KEYID = 0
1,174,214 ready_for_fw is high
1,174,214 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,733 UART: [idev] Erasing UDS.KEYID = 0
1,198,499 UART: [idev] Sha1 KeyId Algorithm
1,207,171 UART: [idev] --
1,208,218 UART: [ldev] ++
1,208,386 UART: [ldev] CDI.KEYID = 6
1,208,750 UART: [ldev] SUBJECT.KEYID = 5
1,209,177 UART: [ldev] AUTHORITY.KEYID = 7
1,209,640 UART: [ldev] FE.KEYID = 1
1,214,948 UART: [ldev] Erasing FE.KEYID = 1
1,240,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,258 UART: [ldev] --
1,280,627 UART: [fwproc] Wait for Commands...
1,281,258 UART: [fwproc] Recv command 0x46574c44
1,281,991 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,793 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,876 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,057 >>> mbox cmd response: success
2,714,075 UART: [afmc] ++
2,714,243 UART: [afmc] CDI.KEYID = 6
2,714,606 UART: [afmc] SUBJECT.KEYID = 7
2,715,032 UART: [afmc] AUTHORITY.KEYID = 5
2,750,600 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,922 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,642 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,535 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,228 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,131 UART: [afmc] --
2,794,150 UART: [cold-reset] --
2,794,812 UART: [state] Locking Datavault
2,795,939 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,543 UART: [state] Locking ICCM
2,797,181 UART: [exit] Launching FMC @ 0x40000000
2,802,478 UART:
2,802,494 UART: Running Caliptra FMC ...
2,802,902 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,522 ready_for_fw is high
1,058,522 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,460 >>> mbox cmd response: success
2,628,065 UART:
2,628,081 UART: Running Caliptra FMC ...
2,628,489 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,463 UART: [kat] ++
895,615 UART: [kat] sha1
899,927 UART: [kat] SHA2-256
901,867 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
915,840 UART: [kat] HMAC-384Kdf
920,542 UART: [kat] LMS
1,168,854 UART: [kat] --
1,169,545 UART: [cold-reset] ++
1,170,053 UART: [fht] FHT @ 0x50003400
1,172,731 UART: [idev] ++
1,172,899 UART: [idev] CDI.KEYID = 6
1,173,260 UART: [idev] SUBJECT.KEYID = 7
1,173,685 UART: [idev] UDS.KEYID = 0
1,174,031 ready_for_fw is high
1,174,031 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,658 UART: [idev] Erasing UDS.KEYID = 0
1,198,564 UART: [idev] Sha1 KeyId Algorithm
1,207,424 UART: [idev] --
1,208,443 UART: [ldev] ++
1,208,611 UART: [ldev] CDI.KEYID = 6
1,208,975 UART: [ldev] SUBJECT.KEYID = 5
1,209,402 UART: [ldev] AUTHORITY.KEYID = 7
1,209,865 UART: [ldev] FE.KEYID = 1
1,214,923 UART: [ldev] Erasing FE.KEYID = 1
1,241,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,345 UART: [ldev] --
1,280,574 UART: [fwproc] Wait for Commands...
1,281,195 UART: [fwproc] Recv command 0x46574c44
1,281,928 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,374 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,457 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,624 >>> mbox cmd response: success
2,712,732 UART: [afmc] ++
2,712,900 UART: [afmc] CDI.KEYID = 6
2,713,263 UART: [afmc] SUBJECT.KEYID = 7
2,713,689 UART: [afmc] AUTHORITY.KEYID = 5
2,749,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,731 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,451 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,344 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,037 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,702 UART: [afmc] --
2,792,653 UART: [cold-reset] --
2,793,359 UART: [state] Locking Datavault
2,794,526 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,130 UART: [state] Locking ICCM
2,795,586 UART: [exit] Launching FMC @ 0x40000000
2,800,883 UART:
2,800,899 UART: Running Caliptra FMC ...
2,801,307 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,035 ready_for_fw is high
1,059,035 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,609 >>> mbox cmd response: success
2,628,626 UART:
2,628,642 UART: Running Caliptra FMC ...
2,629,050 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
2,228,179 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,373,416 UART:
2,373,824 UART: Running Caliptra ROM ...
2,375,008 UART:
2,375,191 UART: [state] CFI Enabled
2,376,160 UART: [state] LifecycleState = Unprovisioned
2,377,813 UART: [state] DebugLocked = No
2,378,952 UART: [state] WD Timer not started. Device not locked for debugging
2,381,431 UART: [fake-rom-cold-reset] ++
2,382,544 UART: [fht] FHT @ 0x50003400
2,383,580 UART: [fwproc] Wait for Commands...
2,384,872 UART: [fwproc] Recv command 0x46574c44
2,386,306 UART: [fwproc] Recv'd Img size: 114888 bytes
3,881,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,953,321 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,054,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,614,057 >>> mbox cmd response: success
4,619,885 UART: [fake-rom-cold-reset] --
4,621,754 UART: [state] Locking Datavault
4,628,301 UART: [state] Locking PCR0, PCR1 and PCR31
4,629,915 UART: [state] Locking ICCM
4,632,519 UART: [exit] Launching FMC @ 0x40000000
4,640,697 UART:
4,640,982 UART: Running Caliptra FMC ...
4,642,055 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
2,220,744 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,366,108 UART:
2,366,530 UART: Running Caliptra ROM ...
2,367,620 UART:
2,367,783 UART: [state] CFI Enabled
2,368,757 UART: [state] LifecycleState = Unprovisioned
2,370,420 UART: [state] DebugLocked = No
2,371,453 UART: [state] WD Timer not started. Device not locked for debugging
2,373,923 UART: [fake-rom-cold-reset] ++
2,374,955 UART: [fht] FHT @ 0x50003400
2,375,905 UART: [fwproc] Wait for Commands...
2,377,188 UART: [fwproc] Recv command 0x46574c44
2,378,541 UART: [fwproc] Recv'd Img size: 114888 bytes
3,878,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,951,400 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,052,550 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,612,803 >>> mbox cmd response: success
4,618,671 UART: [fake-rom-cold-reset] --
4,622,934 UART: [state] Locking Datavault
4,627,370 UART: [state] Locking PCR0, PCR1 and PCR31
4,628,975 UART: [state] Locking ICCM
4,631,277 UART: [exit] Launching FMC @ 0x40000000
4,639,632 UART:
4,639,890 UART: Running Caliptra FMC ...
4,641,031 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
2,238,211 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,383,700 UART:
2,384,309 UART: Running Caliptra ROM ...
2,385,487 UART:
2,385,660 UART: [state] CFI Enabled
2,386,615 UART: [state] LifecycleState = Unprovisioned
2,388,273 UART: [state] DebugLocked = No
2,389,382 UART: [state] WD Timer not started. Device not locked for debugging
2,391,853 UART: [fake-rom-cold-reset] ++
2,392,957 UART: [fht] FHT @ 0x50003400
2,393,986 UART: [fwproc] Wait for Commands...
2,395,291 UART: [fwproc] Recv command 0x46574c44
2,396,716 UART: [fwproc] Recv'd Img size: 114888 bytes
3,898,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,963,552 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,064,688 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,625,393 >>> mbox cmd response: success
4,631,195 UART: [fake-rom-cold-reset] --
4,633,638 UART: [state] Locking Datavault
4,638,754 UART: [state] Locking PCR0, PCR1 and PCR31
4,640,358 UART: [state] Locking ICCM
4,641,843 UART: [exit] Launching FMC @ 0x40000000
4,650,223 UART:
4,650,484 UART: Running Caliptra FMC ...
4,651,623 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,450 writing to cptra_bootfsm_go
2,234,949 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,379,961 UART:
2,380,341 UART: Running Caliptra ROM ...
2,381,533 UART:
2,381,701 UART: [state] CFI Enabled
2,382,666 UART: [state] LifecycleState = Unprovisioned
2,384,324 UART: [state] DebugLocked = No
2,385,429 UART: [state] WD Timer not started. Device not locked for debugging
2,387,898 UART: [fake-rom-cold-reset] ++
2,389,003 UART: [fht] FHT @ 0x50003400
2,390,226 UART: [fwproc] Wait for Commands...
2,391,525 UART: [fwproc] Recv command 0x46574c44
2,392,958 UART: [fwproc] Recv'd Img size: 114888 bytes
3,887,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,962,203 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,063,342 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,623,168 >>> mbox cmd response: success
4,628,991 UART: [fake-rom-cold-reset] --
4,633,766 UART: [state] Locking Datavault
4,640,381 UART: [state] Locking PCR0, PCR1 and PCR31
4,641,993 UART: [state] Locking ICCM
4,644,468 UART: [exit] Launching FMC @ 0x40000000
4,652,809 UART:
4,653,058 UART: Running Caliptra FMC ...
4,654,119 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,472 UART: [state] LifecycleState = Unprovisioned
85,131 UART: [state] DebugLocked = No
85,616 UART: [state] WD Timer not started. Device not locked for debugging
86,910 UART: [fake-rom-cold-reset] ++
87,838 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,022 UART: [fht] FHT @ 0x50003400
91,249 UART: [fwproc] Wait for Commands...
91,924 UART: [fwproc] Recv command 0x46574c44
92,652 UART: [fwproc] Recv'd Img size: 114888 bytes
1,391,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,998 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,680 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,876 >>> mbox cmd response: success
1,586,034 UART: [fake-rom-cold-reset] --
1,586,914 UART: [state] Locking Datavault
1,588,209 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,813 UART: [state] Locking ICCM
1,589,339 UART: [exit] Launching FMC @ 0x40000000
1,594,636 UART:
1,594,652 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
88,134 UART: [fake-rom-cold-reset] ++
89,062 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,362 UART: [fht] FHT @ 0x50003400
92,771 UART: [fwproc] Wait for Commands...
93,602 UART: [fwproc] Recv command 0x46574c44
94,330 UART: [fwproc] Recv'd Img size: 114888 bytes
1,394,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,444 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,446,126 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,332 >>> mbox cmd response: success
1,587,490 UART: [fake-rom-cold-reset] --
1,588,254 UART: [state] Locking Datavault
1,589,717 UART: [state] Locking PCR0, PCR1 and PCR31
1,590,321 UART: [state] Locking ICCM
1,590,887 UART: [exit] Launching FMC @ 0x40000000
1,596,184 UART:
1,596,200 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [fake-rom-cold-reset] ++
88,975 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,099 UART: [fht] FHT @ 0x50003400
92,400 UART: [fwproc] Wait for Commands...
93,079 UART: [fwproc] Recv command 0x46574c44
93,807 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,105 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,787 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,171 >>> mbox cmd response: success
1,587,329 UART: [fake-rom-cold-reset] --
1,588,085 UART: [state] Locking Datavault
1,589,384 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,988 UART: [state] Locking ICCM
1,590,512 UART: [exit] Launching FMC @ 0x40000000
1,595,809 UART:
1,595,825 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [fake-rom-cold-reset] ++
88,725 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,807 UART: [fht] FHT @ 0x50003400
92,124 UART: [fwproc] Wait for Commands...
92,787 UART: [fwproc] Recv command 0x46574c44
93,515 UART: [fwproc] Recv'd Img size: 114888 bytes
1,391,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,417,765 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,443,447 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,583,679 >>> mbox cmd response: success
1,584,837 UART: [fake-rom-cold-reset] --
1,585,629 UART: [state] Locking Datavault
1,586,752 UART: [state] Locking PCR0, PCR1 and PCR31
1,587,356 UART: [state] Locking ICCM
1,587,840 UART: [exit] Launching FMC @ 0x40000000
1,593,137 UART:
1,593,153 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
88,120 UART: [fake-rom-cold-reset] ++
89,048 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,352 UART: [fht] FHT @ 0x50003400
92,691 UART: [fwproc] Wait for Commands...
93,448 UART: [fwproc] Recv command 0x46574c44
94,176 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,666 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,348 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,582 >>> mbox cmd response: success
1,586,740 UART: [fake-rom-cold-reset] --
1,587,652 UART: [state] Locking Datavault
1,588,881 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,485 UART: [state] Locking ICCM
1,589,957 UART: [exit] Launching FMC @ 0x40000000
1,595,254 UART:
1,595,270 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [fake-rom-cold-reset] ++
88,872 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,958 UART: [fht] FHT @ 0x50003400
92,289 UART: [fwproc] Wait for Commands...
92,932 UART: [fwproc] Recv command 0x46574c44
93,660 UART: [fwproc] Recv'd Img size: 114888 bytes
1,391,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,404 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,086 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,292 >>> mbox cmd response: success
1,586,450 UART: [fake-rom-cold-reset] --
1,587,138 UART: [state] Locking Datavault
1,588,399 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,003 UART: [state] Locking ICCM
1,589,527 UART: [exit] Launching FMC @ 0x40000000
1,594,824 UART:
1,594,840 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [fake-rom-cold-reset] ++
88,871 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,997 UART: [fht] FHT @ 0x50003400
92,326 UART: [fwproc] Wait for Commands...
93,161 UART: [fwproc] Recv command 0x46574c44
93,889 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,163 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,845 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,201 >>> mbox cmd response: success
1,586,359 UART: [fake-rom-cold-reset] --
1,587,213 UART: [state] Locking Datavault
1,588,380 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,984 UART: [state] Locking ICCM
1,589,552 UART: [exit] Launching FMC @ 0x40000000
1,594,849 UART:
1,594,865 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [fake-rom-cold-reset] ++
88,771 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,929 UART: [fht] FHT @ 0x50003400
92,176 UART: [fwproc] Wait for Commands...
92,795 UART: [fwproc] Recv command 0x46574c44
93,523 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,381 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,063 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,235 >>> mbox cmd response: success
1,586,393 UART: [fake-rom-cold-reset] --
1,587,441 UART: [state] Locking Datavault
1,588,598 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,202 UART: [state] Locking ICCM
1,589,870 UART: [exit] Launching FMC @ 0x40000000
1,595,167 UART:
1,595,183 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,200 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [fake-rom-cold-reset] ++
88,392 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,578 UART: [fht] FHT @ 0x50003400
92,039 UART: [fwproc] Wait for Commands...
92,664 UART: [fwproc] Recv command 0x46574c44
93,392 UART: [fwproc] Recv'd Img size: 114888 bytes
1,391,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,288 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,443,970 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,352 >>> mbox cmd response: success
1,585,510 UART: [fake-rom-cold-reset] --
1,586,356 UART: [state] Locking Datavault
1,587,705 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,309 UART: [state] Locking ICCM
1,588,873 UART: [exit] Launching FMC @ 0x40000000
1,594,170 UART:
1,594,186 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [fake-rom-cold-reset] ++
88,784 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,050 UART: [fht] FHT @ 0x50003400
92,347 UART: [fwproc] Wait for Commands...
93,134 UART: [fwproc] Recv command 0x46574c44
93,862 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,542 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,224 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,526 >>> mbox cmd response: success
1,586,684 UART: [fake-rom-cold-reset] --
1,587,570 UART: [state] Locking Datavault
1,589,015 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,619 UART: [state] Locking ICCM
1,590,289 UART: [exit] Launching FMC @ 0x40000000
1,595,586 UART:
1,595,602 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,901 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [fake-rom-cold-reset] ++
89,061 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,329 UART: [fht] FHT @ 0x50003400
92,694 UART: [fwproc] Wait for Commands...
93,461 UART: [fwproc] Recv command 0x46574c44
94,189 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,133 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,815 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,049 >>> mbox cmd response: success
1,586,207 UART: [fake-rom-cold-reset] --
1,586,847 UART: [state] Locking Datavault
1,587,986 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,590 UART: [state] Locking ICCM
1,589,046 UART: [exit] Launching FMC @ 0x40000000
1,594,343 UART:
1,594,359 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,783 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [fake-rom-cold-reset] ++
89,017 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,285 UART: [fht] FHT @ 0x50003400
92,558 UART: [fwproc] Wait for Commands...
93,217 UART: [fwproc] Recv command 0x46574c44
93,945 UART: [fwproc] Recv'd Img size: 114888 bytes
1,391,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,417,653 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,443,335 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,583,657 >>> mbox cmd response: success
1,584,815 UART: [fake-rom-cold-reset] --
1,585,523 UART: [state] Locking Datavault
1,586,630 UART: [state] Locking PCR0, PCR1 and PCR31
1,587,234 UART: [state] Locking ICCM
1,587,876 UART: [exit] Launching FMC @ 0x40000000
1,593,173 UART:
1,593,189 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
192,104 UART:
192,496 UART: Running Caliptra ROM ...
193,694 UART:
193,854 UART: [state] CFI Enabled
266,306 UART: [state] LifecycleState = Production
268,054 UART: [state] DebugLocked = No
270,144 UART: [state] WD Timer not started. Device not locked for debugging
274,657 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,220 UART:
192,571 UART: Running Caliptra ROM ...
193,779 UART:
193,939 UART: [state] CFI Enabled
263,095 UART: [state] LifecycleState = Production
264,712 UART: [state] DebugLocked = No
266,529 UART: [state] WD Timer not started. Device not locked for debugging
271,034 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,439 UART:
192,804 UART: Running Caliptra ROM ...
194,105 UART:
603,354 UART: [state] CFI Enabled
615,183 UART: [state] LifecycleState = Production
616,820 UART: [state] DebugLocked = No
619,157 UART: [state] WD Timer not started. Device not locked for debugging
623,219 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,426 UART:
192,803 UART: Running Caliptra ROM ...
193,941 UART:
603,455 UART: [state] CFI Enabled
615,005 UART: [state] LifecycleState = Production
616,594 UART: [state] DebugLocked = No
619,094 UART: [state] WD Timer not started. Device not locked for debugging
623,645 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,560 UART: [state] LifecycleState = Production
86,175 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Production
85,733 UART: [state] DebugLocked = No
86,296 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Production
85,856 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
88,084 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Production
85,776 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Production
85,833 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Production
85,633 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,607 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Production
86,112 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
88,072 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Production
86,314 UART: [state] DebugLocked = No
86,965 UART: [state] WD Timer not started. Device not locked for debugging
88,436 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Production
85,585 UART: [state] DebugLocked = No
86,138 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Production
85,681 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Production
86,062 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
88,258 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Production
86,344 UART: [state] DebugLocked = No
86,873 UART: [state] WD Timer not started. Device not locked for debugging
88,270 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,029 UART:
192,436 UART: Running Caliptra ROM ...
193,641 UART:
193,798 UART: [state] CFI Enabled
263,732 UART: [state] LifecycleState = Production
265,375 UART: Fake ROM in Prod lifecycle disabled
266,887 UART: ROM Fatal Error: 0x0105000Btest test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
192,207 UART:
192,570 UART: Running Caliptra ROM ...
193,752 UART:
193,930 UART: [state] CFI Enabled
264,965 UART: [state] LifecycleState = Production
266,625 UART: Fake ROM in Prod lifecycle disabled
268,126 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,458 UART:
192,846 UART: Running Caliptra ROM ...
194,028 UART:
603,644 UART: [state] CFI Enabled
619,395 UART: [state] LifecycleState = Production
621,038 UART: Fake ROM in Prod lifecycle disabled
622,539 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,491 UART:
192,854 UART: Running Caliptra ROM ...
194,059 UART:
603,722 UART: [state] CFI Enabled
616,907 UART: [state] LifecycleState = Production
618,545 UART: Fake ROM in Prod lifecycle disabled
620,039 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,550 UART: [state] LifecycleState = Production
86,158 UART: Fake ROM in Prod lifecycle disabled
86,752 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Production
85,974 UART: Fake ROM in Prod lifecycle disabled
86,568 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,903 UART: [state] LifecycleState = Production
85,511 UART: Fake ROM in Prod lifecycle disabled
86,105 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Production
86,189 UART: Fake ROM in Prod lifecycle disabled
86,783 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Production
85,526 UART: Fake ROM in Prod lifecycle disabled
86,120 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Production
85,884 UART: Fake ROM in Prod lifecycle disabled
86,478 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Production
86,065 UART: Fake ROM in Prod lifecycle disabled
86,659 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Production
85,807 UART: Fake ROM in Prod lifecycle disabled
86,401 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Production
85,934 UART: Fake ROM in Prod lifecycle disabled
86,528 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Production
85,390 UART: Fake ROM in Prod lifecycle disabled
85,984 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Production
85,971 UART: Fake ROM in Prod lifecycle disabled
86,565 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,979 UART: [state] LifecycleState = Production
86,587 UART: Fake ROM in Prod lifecycle disabled
87,181 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
2,226,202 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,371,509 UART:
2,371,929 UART: Running Caliptra ROM ...
2,373,023 UART:
2,373,190 UART: [state] CFI Enabled
2,374,164 UART: [state] LifecycleState = Unprovisioned
2,375,832 UART: [state] DebugLocked = No
2,376,869 UART: [state] WD Timer not started. Device not locked for debugging
2,379,347 UART: [fake-rom-cold-reset] ++
2,380,379 UART: [fht] FHT @ 0x50003400
2,381,366 UART: [fwproc] Wait for Commands...
2,382,652 UART: [fwproc] Recv command 0x46574c44
2,384,006 UART: [fwproc] Recv'd Img size: 114888 bytes
3,888,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,958,985 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,060,099 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,619,621 >>> mbox cmd response: success
4,625,496 UART: [fake-rom-cold-reset] --
4,627,618 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
4,772,009 UART: [state] Locking Datavault
4,773,244 UART: [state] Locking PCR0, PCR1 and PCR31
4,774,797 UART: [state] Locking ICCM
4,775,714 UART: [exit] Launching FMC @ 0x40000000
4,777,154 UART:
4,777,322 UART: Running Caliptra FMC ...
4,778,428 UART:
4,778,596 UART: [fmc] Received command: 0x46574C44
4,780,061 UART:
4,780,228 UART: Running Caliptra ROM ...
4,781,330 UART:
4,781,495 UART: [state] CFI Enabled
4,843,906 UART: [state] LifecycleState = Unprovisioned
4,845,652 UART: [state] DebugLocked = No
4,848,097 UART: [state] WD Timer not started. Device not locked for debugging
4,854,712 UART: [update-reset] ++
6,386,762 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,390,260 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,007,301 UART: [update-reset] Copying MAN_2 To MAN_1
7,029,466 UART: [update-reset Success] --
7,030,800 >>> mbox cmd response: success
7,031,030 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
7,033,370 UART: [state] Locking Datavault
7,037,159 UART: [state] Locking PCR0, PCR1 and PCR31
7,038,714 UART: [state] Locking ICCM
7,041,042 UART: [exit] Launching FMC @ 0x40000000
7,049,408 UART:
7,049,661 UART: Running Caliptra FMC ...
7,050,789 UART:
7,050,959 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
7,052,609 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
2,220,913 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,366,119 UART:
2,366,529 UART: Running Caliptra ROM ...
2,367,692 UART:
2,367,872 UART: [state] CFI Enabled
2,368,835 UART: [state] LifecycleState = Unprovisioned
2,370,493 UART: [state] DebugLocked = No
2,371,630 UART: [state] WD Timer not started. Device not locked for debugging
2,374,111 UART: [fake-rom-cold-reset] ++
2,375,228 UART: [fht] FHT @ 0x50003400
2,376,266 UART: [fwproc] Wait for Commands...
2,377,557 UART: [fwproc] Recv command 0x46574c44
2,378,993 UART: [fwproc] Recv'd Img size: 114888 bytes
3,883,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,954,350 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,055,531 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,615,207 >>> mbox cmd response: success
4,621,056 UART: [fake-rom-cold-reset] --
4,623,534 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
4,768,566 UART: [state] Locking Datavault
4,769,828 UART: [state] Locking PCR0, PCR1 and PCR31
4,771,394 UART: [state] Locking ICCM
4,772,333 UART: [exit] Launching FMC @ 0x40000000
4,773,766 UART:
4,773,939 UART: Running Caliptra FMC ...
4,775,045 UART:
4,775,214 UART: [fmc] Received command: 0x46574C44
4,776,682 UART:
4,776,844 UART: Running Caliptra ROM ...
4,777,945 UART:
4,778,108 UART: [state] CFI Enabled
4,828,432 UART: [state] LifecycleState = Unprovisioned
4,830,200 UART: [state] DebugLocked = No
4,831,557 UART: [state] WD Timer not started. Device not locked for debugging
4,836,869 UART: [update-reset] ++
6,378,430 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,381,667 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,999,074 UART: [update-reset] Copying MAN_2 To MAN_1
7,021,305 UART: [update-reset Success] --
7,022,597 >>> mbox cmd response: success
7,022,834 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
7,023,650 UART: [state] Locking Datavault
7,027,030 UART: [state] Locking PCR0, PCR1 and PCR31
7,028,578 UART: [state] Locking ICCM
7,029,706 UART: [exit] Launching FMC @ 0x40000000
7,038,058 UART:
7,038,309 UART: Running Caliptra FMC ...
7,039,421 UART:
7,039,591 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
7,041,260 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.36s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
2,234,064 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,379,297 UART:
2,379,740 UART: Running Caliptra ROM ...
2,380,824 UART:
2,380,982 UART: [state] CFI Enabled
2,381,883 UART: [state] LifecycleState = Unprovisioned
2,383,540 UART: [state] DebugLocked = No
2,384,658 UART: [state] WD Timer not started. Device not locked for debugging
2,387,129 UART: [fake-rom-cold-reset] ++
2,388,238 UART: [fht] FHT @ 0x50003400
2,389,270 UART: [fwproc] Wait for Commands...
2,390,554 UART: [fwproc] Recv command 0x46574c44
2,391,980 UART: [fwproc] Recv'd Img size: 114888 bytes
3,892,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,961,949 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,063,052 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,622,346 >>> mbox cmd response: success
4,628,163 UART: [fake-rom-cold-reset] --
4,630,395 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
4,774,512 UART: [state] Locking Datavault
4,775,743 UART: [state] Locking PCR0, PCR1 and PCR31
4,777,209 UART: [state] Locking ICCM
4,778,111 UART: [exit] Launching FMC @ 0x40000000
4,779,756 UART:
4,779,930 UART: Running Caliptra FMC ...
4,781,038 UART:
4,781,199 UART: [fmc] Received command: 0x46574C44
4,782,659 UART:
4,782,814 UART: Running Caliptra ROM ...
4,783,907 UART:
4,784,083 UART: [state] CFI Enabled
4,790,569 UART: [state] LifecycleState = Unprovisioned
4,792,284 UART: [state] DebugLocked = No
4,794,138 UART: [state] WD Timer not started. Device not locked for debugging
4,800,894 UART: [update-reset] ++
6,333,035 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,336,104 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,953,677 UART: [update-reset] Copying MAN_2 To MAN_1
6,975,882 UART: [update-reset Success] --
6,977,168 >>> mbox cmd response: success
6,977,388 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,980,779 UART: [state] Locking Datavault
6,983,165 UART: [state] Locking PCR0, PCR1 and PCR31
6,984,704 UART: [state] Locking ICCM
6,985,582 UART: [exit] Launching FMC @ 0x40000000
6,993,973 UART:
6,994,223 UART: Running Caliptra FMC ...
6,995,248 UART:
6,995,395 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,997,028 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,232,765 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,378,224 UART:
2,378,636 UART: Running Caliptra ROM ...
2,380,099 UART:
2,380,282 UART: [state] CFI Enabled
2,381,145 UART: [state] LifecycleState = Unprovisioned
2,382,806 UART: [state] DebugLocked = No
2,383,920 UART: [state] WD Timer not started. Device not locked for debugging
2,386,401 UART: [fake-rom-cold-reset] ++
2,387,510 UART: [fht] FHT @ 0x50003400
2,388,537 UART: [fwproc] Wait for Commands...
2,389,839 UART: [fwproc] Recv command 0x46574c44
2,391,267 UART: [fwproc] Recv'd Img size: 114888 bytes
3,892,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,961,924 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,063,081 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,622,691 >>> mbox cmd response: success
4,628,585 UART: [fake-rom-cold-reset] --
4,630,682 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
4,774,894 UART: [state] Locking Datavault
4,776,112 UART: [state] Locking PCR0, PCR1 and PCR31
4,777,659 UART: [state] Locking ICCM
4,778,574 UART: [exit] Launching FMC @ 0x40000000
4,780,202 UART:
4,780,366 UART: Running Caliptra FMC ...
4,781,467 UART:
4,781,624 UART: [fmc] Received command: 0x46574C44
4,783,103 UART:
4,783,257 UART: Running Caliptra ROM ...
4,784,355 UART:
4,784,510 UART: [state] CFI Enabled
4,792,501 UART: [state] LifecycleState = Unprovisioned
4,794,217 UART: [state] DebugLocked = No
4,795,966 UART: [state] WD Timer not started. Device not locked for debugging
4,799,593 UART: [update-reset] ++
6,330,316 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,334,369 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,951,070 UART: [update-reset] Copying MAN_2 To MAN_1
6,973,245 UART: [update-reset Success] --
6,974,594 >>> mbox cmd response: success
6,974,818 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,977,668 UART: [state] Locking Datavault
6,981,567 UART: [state] Locking PCR0, PCR1 and PCR31
6,983,123 UART: [state] Locking ICCM
6,984,419 UART: [exit] Launching FMC @ 0x40000000
6,992,815 UART:
6,993,053 UART: Running Caliptra FMC ...
6,994,164 UART:
6,994,322 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,995,961 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [fake-rom-cold-reset] ++
88,790 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,996 UART: [fht] FHT @ 0x50003400
92,303 UART: [fwproc] Wait for Commands...
93,114 UART: [fwproc] Recv command 0x46574c44
93,842 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,584 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,266 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,644 >>> mbox cmd response: success
1,586,802 UART: [fake-rom-cold-reset] --
1,587,197 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,606 UART: [state] Locking Datavault
1,588,861 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,465 UART: [state] Locking ICCM
1,590,055 UART: [exit] Launching FMC @ 0x40000000
1,595,352 UART:
1,595,368 UART: Running Caliptra FMC ...
1,595,776 UART:
1,595,917 UART: [fmc] Received command: 0x46574C44
1,596,741 UART:
1,596,757 UART: Running Caliptra ROM ...
1,597,165 UART:
1,597,220 UART: [state] CFI Enabled
1,599,614 UART: [state] LifecycleState = Unprovisioned
1,600,273 UART: [state] DebugLocked = No
1,600,996 UART: [state] WD Timer not started. Device not locked for debugging
1,602,682 UART: [update-reset] ++
2,916,317 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,917,423 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,070,142 UART: [update-reset] Copying MAN_2 To MAN_1
3,078,156 UART: [update-reset Success] --
3,078,565 >>> mbox cmd response: success
3,078,565 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,079,136 UART: [state] Locking Datavault
3,080,016 UART: [state] Locking PCR0, PCR1 and PCR31
3,080,620 UART: [state] Locking ICCM
3,081,286 UART: [exit] Launching FMC @ 0x40000000
3,086,583 UART:
3,086,599 UART: Running Caliptra FMC ...
3,087,007 UART:
3,087,148 UART: [fmc] Received command: 0x1000000C
3,087,883 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,280 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [fake-rom-cold-reset] ++
88,806 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,018 UART: [fht] FHT @ 0x50003400
92,395 UART: [fwproc] Wait for Commands...
93,160 UART: [fwproc] Recv command 0x46574c44
93,888 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,054 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,736 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,896 >>> mbox cmd response: success
1,587,054 UART: [fake-rom-cold-reset] --
1,587,449 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,798 UART: [state] Locking Datavault
1,588,877 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,481 UART: [state] Locking ICCM
1,589,935 UART: [exit] Launching FMC @ 0x40000000
1,595,232 UART:
1,595,248 UART: Running Caliptra FMC ...
1,595,656 UART:
1,595,797 UART: [fmc] Received command: 0x46574C44
1,596,621 UART:
1,596,637 UART: Running Caliptra ROM ...
1,597,045 UART:
1,597,100 UART: [state] CFI Enabled
1,599,554 UART: [state] LifecycleState = Unprovisioned
1,600,213 UART: [state] DebugLocked = No
1,600,872 UART: [state] WD Timer not started. Device not locked for debugging
1,602,308 UART: [update-reset] ++
2,915,121 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,916,289 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,069,102 UART: [update-reset] Copying MAN_2 To MAN_1
3,077,116 UART: [update-reset Success] --
3,077,525 >>> mbox cmd response: success
3,077,525 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,078,258 UART: [state] Locking Datavault
3,079,042 UART: [state] Locking PCR0, PCR1 and PCR31
3,079,646 UART: [state] Locking ICCM
3,080,220 UART: [exit] Launching FMC @ 0x40000000
3,085,517 UART:
3,085,533 UART: Running Caliptra FMC ...
3,085,941 UART:
3,086,082 UART: [fmc] Received command: 0x1000000C
3,086,817 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
87,069 UART: [state] WD Timer not started. Device not locked for debugging
88,397 UART: [fake-rom-cold-reset] ++
89,325 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,497 UART: [fht] FHT @ 0x50003400
92,866 UART: [fwproc] Wait for Commands...
93,483 UART: [fwproc] Recv command 0x46574c44
94,211 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,815 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,446,497 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,653 >>> mbox cmd response: success
1,587,811 UART: [fake-rom-cold-reset] --
1,588,206 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,588,569 UART: [state] Locking Datavault
1,589,782 UART: [state] Locking PCR0, PCR1 and PCR31
1,590,386 UART: [state] Locking ICCM
1,590,896 UART: [exit] Launching FMC @ 0x40000000
1,596,193 UART:
1,596,209 UART: Running Caliptra FMC ...
1,596,617 UART:
1,596,758 UART: [fmc] Received command: 0x46574C44
1,597,582 UART:
1,597,598 UART: Running Caliptra ROM ...
1,598,006 UART:
1,598,148 UART: [state] CFI Enabled
1,600,910 UART: [state] LifecycleState = Unprovisioned
1,601,569 UART: [state] DebugLocked = No
1,602,062 UART: [state] WD Timer not started. Device not locked for debugging
1,603,608 UART: [update-reset] ++
2,915,961 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,917,049 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,069,734 UART: [update-reset] Copying MAN_2 To MAN_1
3,077,748 UART: [update-reset Success] --
3,078,157 >>> mbox cmd response: success
3,078,157 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,078,528 UART: [state] Locking Datavault
3,079,292 UART: [state] Locking PCR0, PCR1 and PCR31
3,079,896 UART: [state] Locking ICCM
3,080,430 UART: [exit] Launching FMC @ 0x40000000
3,085,727 UART:
3,085,743 UART: Running Caliptra FMC ...
3,086,151 UART:
3,086,292 UART: [fmc] Received command: 0x1000000C
3,087,027 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [fake-rom-cold-reset] ++
89,051 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,173 UART: [fht] FHT @ 0x50003400
92,630 UART: [fwproc] Wait for Commands...
93,329 UART: [fwproc] Recv command 0x46574c44
94,057 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,575 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,446,257 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,423 >>> mbox cmd response: success
1,587,581 UART: [fake-rom-cold-reset] --
1,587,976 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,588,471 UART: [state] Locking Datavault
1,589,966 UART: [state] Locking PCR0, PCR1 and PCR31
1,590,570 UART: [state] Locking ICCM
1,591,054 UART: [exit] Launching FMC @ 0x40000000
1,596,351 UART:
1,596,367 UART: Running Caliptra FMC ...
1,596,775 UART:
1,596,916 UART: [fmc] Received command: 0x46574C44
1,597,740 UART:
1,597,756 UART: Running Caliptra ROM ...
1,598,164 UART:
1,598,306 UART: [state] CFI Enabled
1,601,328 UART: [state] LifecycleState = Unprovisioned
1,601,987 UART: [state] DebugLocked = No
1,602,700 UART: [state] WD Timer not started. Device not locked for debugging
1,604,368 UART: [update-reset] ++
2,917,165 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,918,267 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,071,090 UART: [update-reset] Copying MAN_2 To MAN_1
3,079,104 UART: [update-reset Success] --
3,079,513 >>> mbox cmd response: success
3,079,513 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,080,056 UART: [state] Locking Datavault
3,080,816 UART: [state] Locking PCR0, PCR1 and PCR31
3,081,420 UART: [state] Locking ICCM
3,082,044 UART: [exit] Launching FMC @ 0x40000000
3,087,341 UART:
3,087,357 UART: Running Caliptra FMC ...
3,087,765 UART:
3,087,906 UART: [fmc] Received command: 0x1000000C
3,088,641 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [fake-rom-cold-reset] ++
88,690 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,948 UART: [fht] FHT @ 0x50003400
92,237 UART: [fwproc] Wait for Commands...
92,936 UART: [fwproc] Recv command 0x46574c44
93,664 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,518 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,200 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,568 >>> mbox cmd response: success
1,585,726 UART: [fake-rom-cold-reset] --
1,586,121 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,586,550 UART: [state] Locking Datavault
1,587,653 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,257 UART: [state] Locking ICCM
1,588,823 UART: [exit] Launching FMC @ 0x40000000
1,594,120 UART:
1,594,136 UART: Running Caliptra FMC ...
1,594,544 UART:
1,594,685 UART: [fmc] Received command: 0x46574C44
1,595,509 UART:
1,595,525 UART: Running Caliptra ROM ...
1,595,933 UART:
1,595,988 UART: [state] CFI Enabled
1,598,532 UART: [state] LifecycleState = Unprovisioned
1,599,191 UART: [state] DebugLocked = No
1,599,820 UART: [state] WD Timer not started. Device not locked for debugging
1,601,468 UART: [update-reset] ++
2,914,009 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,914,977 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,067,708 UART: [update-reset] Copying MAN_2 To MAN_1
3,075,722 UART: [update-reset Success] --
3,076,131 >>> mbox cmd response: success
3,076,131 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,076,646 UART: [state] Locking Datavault
3,077,394 UART: [state] Locking PCR0, PCR1 and PCR31
3,077,998 UART: [state] Locking ICCM
3,078,448 UART: [exit] Launching FMC @ 0x40000000
3,083,745 UART:
3,083,761 UART: Running Caliptra FMC ...
3,084,169 UART:
3,084,310 UART: [fmc] Received command: 0x1000000C
3,085,045 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,270 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [fake-rom-cold-reset] ++
88,656 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,968 UART: [fht] FHT @ 0x50003400
92,353 UART: [fwproc] Wait for Commands...
93,086 UART: [fwproc] Recv command 0x46574c44
93,814 UART: [fwproc] Recv'd Img size: 114888 bytes
1,391,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,417,624 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,443,306 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,583,662 >>> mbox cmd response: success
1,584,820 UART: [fake-rom-cold-reset] --
1,585,215 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,585,652 UART: [state] Locking Datavault
1,586,605 UART: [state] Locking PCR0, PCR1 and PCR31
1,587,209 UART: [state] Locking ICCM
1,587,709 UART: [exit] Launching FMC @ 0x40000000
1,593,006 UART:
1,593,022 UART: Running Caliptra FMC ...
1,593,430 UART:
1,593,571 UART: [fmc] Received command: 0x46574C44
1,594,395 UART:
1,594,411 UART: Running Caliptra ROM ...
1,594,819 UART:
1,594,874 UART: [state] CFI Enabled
1,597,724 UART: [state] LifecycleState = Unprovisioned
1,598,383 UART: [state] DebugLocked = No
1,599,048 UART: [state] WD Timer not started. Device not locked for debugging
1,600,624 UART: [update-reset] ++
2,914,707 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,915,829 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,068,624 UART: [update-reset] Copying MAN_2 To MAN_1
3,076,638 UART: [update-reset Success] --
3,077,047 >>> mbox cmd response: success
3,077,047 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,077,352 UART: [state] Locking Datavault
3,078,210 UART: [state] Locking PCR0, PCR1 and PCR31
3,078,814 UART: [state] Locking ICCM
3,079,418 UART: [exit] Launching FMC @ 0x40000000
3,084,715 UART:
3,084,731 UART: Running Caliptra FMC ...
3,085,139 UART:
3,085,280 UART: [fmc] Received command: 0x1000000C
3,086,015 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [fake-rom-cold-reset] ++
88,907 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,097 UART: [fht] FHT @ 0x50003400
92,310 UART: [fwproc] Wait for Commands...
93,141 UART: [fwproc] Recv command 0x46574c44
93,869 UART: [fwproc] Recv'd Img size: 114888 bytes
1,391,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,153 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,443,835 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,081 >>> mbox cmd response: success
1,585,239 UART: [fake-rom-cold-reset] --
1,585,634 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,586,049 UART: [state] Locking Datavault
1,587,152 UART: [state] Locking PCR0, PCR1 and PCR31
1,587,756 UART: [state] Locking ICCM
1,588,340 UART: [exit] Launching FMC @ 0x40000000
1,593,637 UART:
1,593,653 UART: Running Caliptra FMC ...
1,594,061 UART:
1,594,202 UART: [fmc] Received command: 0x46574C44
1,595,026 UART:
1,595,042 UART: Running Caliptra ROM ...
1,595,450 UART:
1,595,592 UART: [state] CFI Enabled
1,598,496 UART: [state] LifecycleState = Unprovisioned
1,599,155 UART: [state] DebugLocked = No
1,599,796 UART: [state] WD Timer not started. Device not locked for debugging
1,601,392 UART: [update-reset] ++
2,914,025 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,915,069 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,067,856 UART: [update-reset] Copying MAN_2 To MAN_1
3,075,870 UART: [update-reset Success] --
3,076,279 >>> mbox cmd response: success
3,076,279 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,077,006 UART: [state] Locking Datavault
3,077,738 UART: [state] Locking PCR0, PCR1 and PCR31
3,078,342 UART: [state] Locking ICCM
3,078,810 UART: [exit] Launching FMC @ 0x40000000
3,084,107 UART:
3,084,123 UART: Running Caliptra FMC ...
3,084,531 UART:
3,084,672 UART: [fmc] Received command: 0x1000000C
3,085,407 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [fake-rom-cold-reset] ++
89,119 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,327 UART: [fht] FHT @ 0x50003400
92,602 UART: [fwproc] Wait for Commands...
93,429 UART: [fwproc] Recv command 0x46574c44
94,157 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,137 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,819 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,139 >>> mbox cmd response: success
1,587,297 UART: [fake-rom-cold-reset] --
1,587,692 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,588,249 UART: [state] Locking Datavault
1,589,332 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,936 UART: [state] Locking ICCM
1,590,468 UART: [exit] Launching FMC @ 0x40000000
1,595,765 UART:
1,595,781 UART: Running Caliptra FMC ...
1,596,189 UART:
1,596,330 UART: [fmc] Received command: 0x46574C44
1,597,154 UART:
1,597,170 UART: Running Caliptra ROM ...
1,597,578 UART:
1,597,720 UART: [state] CFI Enabled
1,600,678 UART: [state] LifecycleState = Unprovisioned
1,601,337 UART: [state] DebugLocked = No
1,601,896 UART: [state] WD Timer not started. Device not locked for debugging
1,603,470 UART: [update-reset] ++
2,916,359 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,917,323 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,070,102 UART: [update-reset] Copying MAN_2 To MAN_1
3,078,116 UART: [update-reset Success] --
3,078,525 >>> mbox cmd response: success
3,078,525 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,079,166 UART: [state] Locking Datavault
3,079,892 UART: [state] Locking PCR0, PCR1 and PCR31
3,080,496 UART: [state] Locking ICCM
3,081,122 UART: [exit] Launching FMC @ 0x40000000
3,086,419 UART:
3,086,435 UART: Running Caliptra FMC ...
3,086,843 UART:
3,086,984 UART: [fmc] Received command: 0x1000000C
3,087,719 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
88,020 UART: [fake-rom-cold-reset] ++
88,948 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,064 UART: [fht] FHT @ 0x50003400
92,297 UART: [fwproc] Wait for Commands...
92,900 UART: [fwproc] Recv command 0x46574c44
93,628 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,174 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,443,856 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,168 >>> mbox cmd response: success
1,585,326 UART: [fake-rom-cold-reset] --
1,585,721 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,586,306 UART: [state] Locking Datavault
1,587,277 UART: [state] Locking PCR0, PCR1 and PCR31
1,587,881 UART: [state] Locking ICCM
1,588,529 UART: [exit] Launching FMC @ 0x40000000
1,593,826 UART:
1,593,842 UART: Running Caliptra FMC ...
1,594,250 UART:
1,594,391 UART: [fmc] Received command: 0x46574C44
1,595,215 UART:
1,595,231 UART: Running Caliptra ROM ...
1,595,639 UART:
1,595,694 UART: [state] CFI Enabled
1,598,456 UART: [state] LifecycleState = Unprovisioned
1,599,115 UART: [state] DebugLocked = No
1,599,618 UART: [state] WD Timer not started. Device not locked for debugging
1,601,252 UART: [update-reset] ++
2,914,957 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,916,029 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,068,850 UART: [update-reset] Copying MAN_2 To MAN_1
3,076,864 UART: [update-reset Success] --
3,077,273 >>> mbox cmd response: success
3,077,273 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,077,650 UART: [state] Locking Datavault
3,078,594 UART: [state] Locking PCR0, PCR1 and PCR31
3,079,198 UART: [state] Locking ICCM
3,079,790 UART: [exit] Launching FMC @ 0x40000000
3,085,087 UART:
3,085,103 UART: Running Caliptra FMC ...
3,085,511 UART:
3,085,652 UART: [fmc] Received command: 0x1000000C
3,086,387 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
88,152 UART: [fake-rom-cold-reset] ++
89,080 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,278 UART: [fht] FHT @ 0x50003400
92,553 UART: [fwproc] Wait for Commands...
93,262 UART: [fwproc] Recv command 0x46574c44
93,990 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,732 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,414 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,572 >>> mbox cmd response: success
1,586,730 UART: [fake-rom-cold-reset] --
1,587,125 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,460 UART: [state] Locking Datavault
1,588,631 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,235 UART: [state] Locking ICCM
1,589,841 UART: [exit] Launching FMC @ 0x40000000
1,595,138 UART:
1,595,154 UART: Running Caliptra FMC ...
1,595,562 UART:
1,595,703 UART: [fmc] Received command: 0x46574C44
1,596,527 UART:
1,596,543 UART: Running Caliptra ROM ...
1,596,951 UART:
1,597,006 UART: [state] CFI Enabled
1,599,844 UART: [state] LifecycleState = Unprovisioned
1,600,503 UART: [state] DebugLocked = No
1,601,062 UART: [state] WD Timer not started. Device not locked for debugging
1,602,850 UART: [update-reset] ++
2,914,923 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,916,115 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,068,802 UART: [update-reset] Copying MAN_2 To MAN_1
3,076,816 UART: [update-reset Success] --
3,077,225 >>> mbox cmd response: success
3,077,225 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,077,990 UART: [state] Locking Datavault
3,078,758 UART: [state] Locking PCR0, PCR1 and PCR31
3,079,362 UART: [state] Locking ICCM
3,079,842 UART: [exit] Launching FMC @ 0x40000000
3,085,139 UART:
3,085,155 UART: Running Caliptra FMC ...
3,085,563 UART:
3,085,704 UART: [fmc] Received command: 0x1000000C
3,086,439 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,773 UART: [state] WD Timer not started. Device not locked for debugging
88,331 UART: [fake-rom-cold-reset] ++
89,259 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,505 UART: [fht] FHT @ 0x50003400
92,738 UART: [fwproc] Wait for Commands...
93,561 UART: [fwproc] Recv command 0x46574c44
94,289 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,045 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,727 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,097 >>> mbox cmd response: success
1,587,255 UART: [fake-rom-cold-reset] --
1,587,650 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,588,237 UART: [state] Locking Datavault
1,589,308 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,912 UART: [state] Locking ICCM
1,590,394 UART: [exit] Launching FMC @ 0x40000000
1,595,691 UART:
1,595,707 UART: Running Caliptra FMC ...
1,596,115 UART:
1,596,256 UART: [fmc] Received command: 0x46574C44
1,597,080 UART:
1,597,096 UART: Running Caliptra ROM ...
1,597,504 UART:
1,597,646 UART: [state] CFI Enabled
1,600,608 UART: [state] LifecycleState = Unprovisioned
1,601,267 UART: [state] DebugLocked = No
1,601,854 UART: [state] WD Timer not started. Device not locked for debugging
1,603,668 UART: [update-reset] ++
2,916,009 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,917,153 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,069,934 UART: [update-reset] Copying MAN_2 To MAN_1
3,077,948 UART: [update-reset Success] --
3,078,357 >>> mbox cmd response: success
3,078,357 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,078,842 UART: [state] Locking Datavault
3,079,738 UART: [state] Locking PCR0, PCR1 and PCR31
3,080,342 UART: [state] Locking ICCM
3,080,996 UART: [exit] Launching FMC @ 0x40000000
3,086,293 UART:
3,086,309 UART: Running Caliptra FMC ...
3,086,717 UART:
3,086,858 UART: [fmc] Received command: 0x1000000C
3,087,593 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,819 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [fake-rom-cold-reset] ++
89,047 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,211 UART: [fht] FHT @ 0x50003400
92,644 UART: [fwproc] Wait for Commands...
93,297 UART: [fwproc] Recv command 0x46574c44
94,025 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,157 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,839 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,999 >>> mbox cmd response: success
1,587,157 UART: [fake-rom-cold-reset] --
1,587,552 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,588,107 UART: [state] Locking Datavault
1,589,252 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,856 UART: [state] Locking ICCM
1,590,352 UART: [exit] Launching FMC @ 0x40000000
1,595,649 UART:
1,595,665 UART: Running Caliptra FMC ...
1,596,073 UART:
1,596,214 UART: [fmc] Received command: 0x46574C44
1,597,038 UART:
1,597,054 UART: Running Caliptra ROM ...
1,597,462 UART:
1,597,604 UART: [state] CFI Enabled
1,600,006 UART: [state] LifecycleState = Unprovisioned
1,600,665 UART: [state] DebugLocked = No
1,601,386 UART: [state] WD Timer not started. Device not locked for debugging
1,603,088 UART: [update-reset] ++
2,917,079 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,918,291 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,071,100 UART: [update-reset] Copying MAN_2 To MAN_1
3,079,114 UART: [update-reset Success] --
3,079,523 >>> mbox cmd response: success
3,079,523 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,079,992 UART: [state] Locking Datavault
3,080,920 UART: [state] Locking PCR0, PCR1 and PCR31
3,081,524 UART: [state] Locking ICCM
3,082,126 UART: [exit] Launching FMC @ 0x40000000
3,087,423 UART:
3,087,439 UART: Running Caliptra FMC ...
3,087,847 UART:
3,087,988 UART: [fmc] Received command: 0x1000000C
3,088,723 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,002 UART:
192,366 UART: Running Caliptra ROM ...
193,554 UART:
193,708 UART: [state] CFI Enabled
262,627 UART: [state] LifecycleState = Unprovisioned
264,354 UART: [state] DebugLocked = No
266,466 UART: [state] WD Timer not started. Device not locked for debugging
271,076 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
192,179 UART:
192,531 UART: Running Caliptra ROM ...
193,708 UART:
193,865 UART: [state] CFI Enabled
262,297 UART: [state] LifecycleState = Unprovisioned
264,020 UART: [state] DebugLocked = No
266,378 UART: [state] WD Timer not started. Device not locked for debugging
270,727 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
192,466 UART:
192,853 UART: Running Caliptra ROM ...
194,051 UART:
603,582 UART: [state] CFI Enabled
619,431 UART: [state] LifecycleState = Unprovisioned
621,172 UART: [state] DebugLocked = No
622,553 UART: [state] WD Timer not started. Device not locked for debugging
626,195 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
192,449 UART:
192,826 UART: Running Caliptra ROM ...
194,024 UART:
603,501 UART: [state] CFI Enabled
614,746 UART: [state] LifecycleState = Unprovisioned
616,434 UART: [state] DebugLocked = No
618,665 UART: [state] WD Timer not started. Device not locked for debugging
623,773 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
88,096 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,853 UART: [state] LifecycleState = Unprovisioned
86,512 UART: [state] DebugLocked = No
87,045 UART: [state] WD Timer not started. Device not locked for debugging
88,531 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
88,140 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,931 UART: [state] LifecycleState = Unprovisioned
85,590 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,479 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
86,162 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,268 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,941 UART: [state] LifecycleState = Unprovisioned
86,600 UART: [state] DebugLocked = No
87,101 UART: [state] WD Timer not started. Device not locked for debugging
88,641 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,889 UART: [state] WD Timer not started. Device not locked for debugging
88,485 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
2,222,711 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,367,926 UART:
2,368,337 UART: Running Caliptra ROM ...
2,369,522 UART:
2,369,700 UART: [state] CFI Enabled
2,370,675 UART: [state] LifecycleState = Unprovisioned
2,372,337 UART: [state] DebugLocked = No
2,373,476 UART: [state] WD Timer not started. Device not locked for debugging
2,375,964 UART: [fake-rom-cold-reset] ++
2,377,044 UART: [fht] FHT @ 0x50003400
2,378,004 UART: [fwproc] Wait for Commands...
2,379,302 UART: [fwproc] Recv command 0x46574c44
2,380,740 UART: [fwproc] Recv'd Img size: 114888 bytes
3,445,374 UART: ROM Fatal Error: 0x000B000C
3,448,405 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,229,003 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,374,289 UART:
2,374,724 UART: Running Caliptra ROM ...
2,375,900 UART:
2,376,085 UART: [state] CFI Enabled
2,377,053 UART: [state] LifecycleState = Unprovisioned
2,378,718 UART: [state] DebugLocked = No
2,379,834 UART: [state] WD Timer not started. Device not locked for debugging
2,382,335 UART: [fake-rom-cold-reset] ++
2,383,448 UART: [fht] FHT @ 0x50003400
2,384,485 UART: [fwproc] Wait for Commands...
2,385,775 UART: [fwproc] Recv command 0x46574c44
2,387,202 UART: [fwproc] Recv'd Img size: 114888 bytes
3,454,655 UART: ROM Fatal Error: 0x000B000C
3,457,683 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,236,025 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,381,311 UART:
2,381,795 UART: Running Caliptra ROM ...
2,382,872 UART:
2,383,030 UART: [state] CFI Enabled
2,383,999 UART: [state] LifecycleState = Unprovisioned
2,385,663 UART: [state] DebugLocked = No
2,386,818 UART: [state] WD Timer not started. Device not locked for debugging
2,389,311 UART: [fake-rom-cold-reset] ++
2,390,581 UART: [fht] FHT @ 0x50003400
2,391,542 UART: [fwproc] Wait for Commands...
2,392,845 UART: [fwproc] Recv command 0x46574c44
2,394,284 UART: [fwproc] Recv'd Img size: 114888 bytes
3,457,042 UART: ROM Fatal Error: 0x000B000C
3,460,111 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
2,228,490 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,373,509 UART:
2,373,892 UART: Running Caliptra ROM ...
2,375,063 UART:
2,375,239 UART: [state] CFI Enabled
2,376,195 UART: [state] LifecycleState = Unprovisioned
2,377,847 UART: [state] DebugLocked = No
2,379,313 UART: [state] WD Timer not started. Device not locked for debugging
2,381,729 UART: [fake-rom-cold-reset] ++
2,382,840 UART: [fht] FHT @ 0x50003400
2,383,821 UART: [fwproc] Wait for Commands...
2,385,116 UART: [fwproc] Recv command 0x46574c44
2,386,459 UART: [fwproc] Recv'd Img size: 114888 bytes
3,454,268 UART: ROM Fatal Error: 0x000B000C
3,457,294 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,220 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [fake-rom-cold-reset] ++
88,916 UART: [fht] FHT @ 0x50003400
92,185 UART: [fwproc] Wait for Commands...
92,788 UART: [fwproc] Recv command 0x46574c44
93,516 UART: [fwproc] Recv'd Img size: 114888 bytes
129,941 UART: ROM Fatal Error: 0x000B000C
131,110 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,686 UART: [state] LifecycleState = Unprovisioned
85,345 UART: [state] DebugLocked = No
85,958 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [fake-rom-cold-reset] ++
88,382 UART: [fht] FHT @ 0x50003400
91,711 UART: [fwproc] Wait for Commands...
92,490 UART: [fwproc] Recv command 0x46574c44
93,218 UART: [fwproc] Recv'd Img size: 114888 bytes
129,997 UART: ROM Fatal Error: 0x000B000C
131,166 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
86,989 UART: [state] WD Timer not started. Device not locked for debugging
88,443 UART: [fake-rom-cold-reset] ++
89,463 UART: [fht] FHT @ 0x50003400
92,806 UART: [fwproc] Wait for Commands...
93,629 UART: [fwproc] Recv command 0x46574c44
94,357 UART: [fwproc] Recv'd Img size: 114888 bytes
132,191 UART: ROM Fatal Error: 0x000B000C
133,360 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,829 UART: [state] WD Timer not started. Device not locked for debugging
88,233 UART: [fake-rom-cold-reset] ++
89,315 UART: [fht] FHT @ 0x50003400
92,666 UART: [fwproc] Wait for Commands...
93,397 UART: [fwproc] Recv command 0x46574c44
94,125 UART: [fwproc] Recv'd Img size: 114888 bytes
132,454 UART: ROM Fatal Error: 0x000B000C
133,623 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,340 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [fake-rom-cold-reset] ++
88,760 UART: [fht] FHT @ 0x50003400
92,003 UART: [fwproc] Wait for Commands...
92,838 UART: [fwproc] Recv command 0x46574c44
93,566 UART: [fwproc] Recv'd Img size: 114888 bytes
130,581 UART: ROM Fatal Error: 0x000B000C
131,750 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [fake-rom-cold-reset] ++
89,066 UART: [fht] FHT @ 0x50003400
92,351 UART: [fwproc] Wait for Commands...
92,968 UART: [fwproc] Recv command 0x46574c44
93,696 UART: [fwproc] Recv'd Img size: 114888 bytes
131,237 UART: ROM Fatal Error: 0x000B000C
132,406 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [fake-rom-cold-reset] ++
88,915 UART: [fht] FHT @ 0x50003400
92,206 UART: [fwproc] Wait for Commands...
92,819 UART: [fwproc] Recv command 0x46574c44
93,547 UART: [fwproc] Recv'd Img size: 114888 bytes
130,140 UART: ROM Fatal Error: 0x000B000C
131,309 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
86,955 UART: [state] WD Timer not started. Device not locked for debugging
88,563 UART: [fake-rom-cold-reset] ++
89,685 UART: [fht] FHT @ 0x50003400
93,132 UART: [fwproc] Wait for Commands...
93,921 UART: [fwproc] Recv command 0x46574c44
94,649 UART: [fwproc] Recv'd Img size: 114888 bytes
131,834 UART: ROM Fatal Error: 0x000B000C
133,003 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,020 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [fake-rom-cold-reset] ++
88,532 UART: [fht] FHT @ 0x50003400
91,787 UART: [fwproc] Wait for Commands...
92,460 UART: [fwproc] Recv command 0x46574c44
93,188 UART: [fwproc] Recv'd Img size: 114888 bytes
130,497 UART: ROM Fatal Error: 0x000B000C
131,666 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,458 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [fake-rom-cold-reset] ++
89,108 UART: [fht] FHT @ 0x50003400
92,571 UART: [fwproc] Wait for Commands...
93,308 UART: [fwproc] Recv command 0x46574c44
94,036 UART: [fwproc] Recv'd Img size: 114888 bytes
130,621 UART: ROM Fatal Error: 0x000B000C
131,790 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [fake-rom-cold-reset] ++
89,219 UART: [fht] FHT @ 0x50003400
92,536 UART: [fwproc] Wait for Commands...
93,173 UART: [fwproc] Recv command 0x46574c44
93,901 UART: [fwproc] Recv'd Img size: 114888 bytes
131,580 UART: ROM Fatal Error: 0x000B000C
132,749 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [fake-rom-cold-reset] ++
89,131 UART: [fht] FHT @ 0x50003400
92,500 UART: [fwproc] Wait for Commands...
93,217 UART: [fwproc] Recv command 0x46574c44
93,945 UART: [fwproc] Recv'd Img size: 114888 bytes
130,850 UART: ROM Fatal Error: 0x000B000C
132,019 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
192,176 UART:
192,526 UART: Running Caliptra ROM ...
193,713 UART:
193,870 UART: [state] CFI Enabled
264,876 UART: [state] LifecycleState = Unprovisioned
266,656 UART: [state] DebugLocked = No
268,256 UART: [state] WD Timer not started. Device not locked for debugging
273,248 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,063 UART:
192,439 UART: Running Caliptra ROM ...
193,560 UART:
193,708 UART: [state] CFI Enabled
262,746 UART: [state] LifecycleState = Unprovisioned
264,500 UART: [state] DebugLocked = No
267,016 UART: [state] WD Timer not started. Device not locked for debugging
272,231 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,511 UART:
192,906 UART: Running Caliptra ROM ...
194,101 UART:
603,640 UART: [state] CFI Enabled
619,932 UART: [state] LifecycleState = Unprovisioned
621,656 UART: [state] DebugLocked = No
623,575 UART: [state] WD Timer not started. Device not locked for debugging
627,987 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,448 UART:
192,818 UART: Running Caliptra ROM ...
193,998 UART:
603,425 UART: [state] CFI Enabled
618,962 UART: [state] LifecycleState = Unprovisioned
620,706 UART: [state] DebugLocked = No
622,207 UART: [state] WD Timer not started. Device not locked for debugging
625,618 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
88,106 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,100 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,464 UART: [state] DebugLocked = No
87,057 UART: [state] WD Timer not started. Device not locked for debugging
88,397 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,632 UART: [state] LifecycleState = Unprovisioned
85,291 UART: [state] DebugLocked = No
85,992 UART: [state] WD Timer not started. Device not locked for debugging
87,222 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
88,086 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
87,103 UART: [state] WD Timer not started. Device not locked for debugging
88,569 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,865 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,024 UART: [state] WD Timer not started. Device not locked for debugging
87,240 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,144 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
3,443,437 ready_for_fw is high
3,443,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,278,157 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,444,187 ready_for_fw is high
3,444,567 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,272,414 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,777,485 ready_for_fw is high
3,777,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,500,938 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,777,540 ready_for_fw is high
3,778,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,486,853 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,869 ready_for_fw is high
1,080,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,216 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,863 ready_for_fw is high
1,080,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,068 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,156 ready_for_fw is high
1,081,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,135 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,580 ready_for_fw is high
1,081,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,299 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,319 ready_for_fw is high
1,080,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,188 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,791 ready_for_fw is high
1,080,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,746 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,448 ready_for_fw is high
1,082,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,537 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,156 ready_for_fw is high
1,081,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,173 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,285 ready_for_fw is high
1,080,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,266 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,029 ready_for_fw is high
1,081,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,410 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,768 ready_for_fw is high
1,081,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,637 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,770 ready_for_fw is high
1,080,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,223 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,586 writing to cptra_bootfsm_go
2,229,538 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,368,424 UART:
2,368,831 UART: Running Caliptra ROM ...
2,370,008 UART:
2,370,190 UART: [state] CFI Enabled
2,371,155 UART: [state] LifecycleState = Unprovisioned
2,372,819 UART: [state] DebugLocked = No
2,373,935 UART: [state] WD Timer not started. Device not locked for debugging
2,376,413 UART: [kat] SHA2-256
2,377,089 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,380,126 UART: [kat] ++
2,380,589 UART: [kat] sha1
2,381,113 UART: [kat] SHA2-256
2,381,859 UART: [kat] SHA2-384
2,382,534 UART: [kat] SHA2-512-ACC
2,383,374 UART: [kat] ECC-384
2,949,806 UART: [kat] HMAC-384Kdf
2,972,690 UART: [kat] LMS
3,449,165 UART: [kat] --
3,453,589 UART: [cold-reset] ++
3,455,469 UART: [fht] FHT @ 0x50003400
3,467,857 UART: [idev] ++
3,468,425 UART: [idev] CDI.KEYID = 6
3,469,444 UART: [idev] SUBJECT.KEYID = 7
3,470,660 UART: [idev] UDS.KEYID = 0
3,502,629 UART: [idev] Erasing UDS.KEYID = 0
5,990,991 UART: [idev] Sha1 KeyId Algorithm
6,015,038 UART: [idev] --
6,020,692 UART: [ldev] ++
6,021,274 UART: [ldev] CDI.KEYID = 6
6,022,166 UART: [ldev] SUBJECT.KEYID = 5
6,023,441 UART: [ldev] AUTHORITY.KEYID = 7
6,024,678 UART: [ldev] FE.KEYID = 1
6,058,718 UART: [ldev] Erasing FE.KEYID = 1
8,565,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,498 UART: [ldev] --
10,374,195 UART: [fwproc] Wait for Commands...
10,376,298 UART: [fwproc] Recv command 0x46574c44
10,378,371 UART: [fwproc] Recv'd Img size: 109820 bytes
13,751,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,824,048 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,866,518 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,195,613 >>> mbox cmd response: success
14,200,067 UART: [afmc] ++
14,200,656 UART: [afmc] CDI.KEYID = 6
14,201,602 UART: [afmc] SUBJECT.KEYID = 7
14,202,817 UART: [afmc] AUTHORITY.KEYID = 5
16,744,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,468,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,470,796 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,486,592 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,502,569 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,518,214 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,543,006 UART: [afmc] --
18,547,336 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,547,703 UART: [cold-reset] --
18,552,195 UART: [state] Locking Datavault
18,558,312 UART: [state] Locking PCR0, PCR1 and PCR31
18,560,074 UART: [state] Locking ICCM
18,562,565 UART: [exit] Launching FMC @ 0x40000000
18,570,958 UART:
18,571,213 UART: Running Caliptra FMC ...
18,572,320 UART:
18,572,484 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,574,063 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
2,221,499 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,108,609 >>> mbox cmd response: success
18,385,324 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,398,802 UART:
18,399,159 UART: Running Caliptra FMC ...
18,400,270 UART:
18,400,430 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,402,213 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
2,230,844 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,369,633 UART:
2,370,048 UART: Running Caliptra ROM ...
2,371,151 UART:
2,371,304 UART: [state] CFI Enabled
2,372,223 UART: [state] LifecycleState = Unprovisioned
2,373,880 UART: [state] DebugLocked = No
2,374,909 UART: [state] WD Timer not started. Device not locked for debugging
2,377,377 UART: [kat] SHA2-256
2,378,040 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,381,281 UART: [kat] ++
2,381,742 UART: [kat] sha1
2,382,252 UART: [kat] SHA2-256
2,382,907 UART: [kat] SHA2-384
2,383,558 UART: [kat] SHA2-512-ACC
2,384,391 UART: [kat] ECC-384
3,282,221 UART: [kat] HMAC-384Kdf
3,294,461 UART: [kat] LMS
3,771,015 UART: [kat] --
3,774,414 UART: [cold-reset] ++
3,775,320 UART: [fht] FHT @ 0x50003400
3,787,296 UART: [idev] ++
3,787,916 UART: [idev] CDI.KEYID = 6
3,788,822 UART: [idev] SUBJECT.KEYID = 7
3,790,089 UART: [idev] UDS.KEYID = 0
3,806,924 UART: [idev] Erasing UDS.KEYID = 0
6,269,091 UART: [idev] Sha1 KeyId Algorithm
6,291,557 UART: [idev] --
6,296,681 UART: [ldev] ++
6,297,248 UART: [ldev] CDI.KEYID = 6
6,298,163 UART: [ldev] SUBJECT.KEYID = 5
6,299,411 UART: [ldev] AUTHORITY.KEYID = 7
6,300,660 UART: [ldev] FE.KEYID = 1
6,312,039 UART: [ldev] Erasing FE.KEYID = 1
8,788,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,947 UART: [ldev] --
10,579,913 UART: [fwproc] Wait for Commands...
10,582,333 UART: [fwproc] Recv command 0x46574c44
10,584,372 UART: [fwproc] Recv'd Img size: 109820 bytes
13,952,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,038,043 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,080,510 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,408,499 >>> mbox cmd response: success
14,413,344 UART: [afmc] ++
14,413,932 UART: [afmc] CDI.KEYID = 6
14,414,899 UART: [afmc] SUBJECT.KEYID = 7
14,416,060 UART: [afmc] AUTHORITY.KEYID = 5
16,919,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,642,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,644,555 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,660,375 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,676,399 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,692,042 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,717,532 UART: [afmc] --
18,721,571 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,721,941 UART: [cold-reset] --
18,724,642 UART: [state] Locking Datavault
18,729,727 UART: [state] Locking PCR0, PCR1 and PCR31
18,731,477 UART: [state] Locking ICCM
18,732,947 UART: [exit] Launching FMC @ 0x40000000
18,741,329 UART:
18,741,562 UART: Running Caliptra FMC ...
18,742,581 UART:
18,742,718 UART: [fmc] Received command: 0x10000005
18,744,198 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
2,234,368 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,295,888 >>> mbox cmd response: success
18,528,775 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,541,430 UART:
18,541,814 UART: Running Caliptra FMC ...
18,542,919 UART:
18,543,068 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,544,823 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [kat] SHA2-256
891,384 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
899,842 UART: [kat] SHA2-256
901,782 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
915,663 UART: [kat] HMAC-384Kdf
920,163 UART: [kat] LMS
1,168,475 UART: [kat] --
1,169,516 UART: [cold-reset] ++
1,170,032 UART: [fht] FHT @ 0x50003400
1,172,526 UART: [idev] ++
1,172,694 UART: [idev] CDI.KEYID = 6
1,173,055 UART: [idev] SUBJECT.KEYID = 7
1,173,480 UART: [idev] UDS.KEYID = 0
1,181,255 UART: [idev] Erasing UDS.KEYID = 0
1,197,805 UART: [idev] Sha1 KeyId Algorithm
1,206,661 UART: [idev] --
1,207,702 UART: [ldev] ++
1,207,870 UART: [ldev] CDI.KEYID = 6
1,208,234 UART: [ldev] SUBJECT.KEYID = 5
1,208,661 UART: [ldev] AUTHORITY.KEYID = 7
1,209,124 UART: [ldev] FE.KEYID = 1
1,214,298 UART: [ldev] Erasing FE.KEYID = 1
1,241,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,130 UART: [ldev] --
1,280,561 UART: [fwproc] Wait for Commands...
1,281,210 UART: [fwproc] Recv command 0x46574c44
1,281,943 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,805 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,888 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,261 >>> mbox cmd response: success
2,713,403 UART: [afmc] ++
2,713,571 UART: [afmc] CDI.KEYID = 6
2,713,934 UART: [afmc] SUBJECT.KEYID = 7
2,714,360 UART: [afmc] AUTHORITY.KEYID = 5
2,749,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,696 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,416 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,309 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,002 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,841 UART: [afmc] --
2,792,676 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,792,698 UART: [cold-reset] --
2,793,738 UART: [state] Locking Datavault
2,795,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,611 UART: [state] Locking ICCM
2,796,159 UART: [exit] Launching FMC @ 0x40000000
2,801,456 UART:
2,801,472 UART: Running Caliptra FMC ...
2,801,880 UART:
2,802,018 UART: [fmc] Received command: 0x10000005
2,803,119 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,830 >>> mbox cmd response: success
2,620,162 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,625,887 UART:
2,625,903 UART: Running Caliptra FMC ...
2,626,311 UART:
2,626,449 UART: [fmc] Received command: 0x10000005
2,627,550 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,845 UART: [kat] ++
895,997 UART: [kat] sha1
900,173 UART: [kat] SHA2-256
902,113 UART: [kat] SHA2-384
904,868 UART: [kat] SHA2-512-ACC
906,769 UART: [kat] ECC-384
916,794 UART: [kat] HMAC-384Kdf
921,518 UART: [kat] LMS
1,169,830 UART: [kat] --
1,170,793 UART: [cold-reset] ++
1,171,165 UART: [fht] FHT @ 0x50003400
1,173,815 UART: [idev] ++
1,173,983 UART: [idev] CDI.KEYID = 6
1,174,344 UART: [idev] SUBJECT.KEYID = 7
1,174,769 UART: [idev] UDS.KEYID = 0
1,182,428 UART: [idev] Erasing UDS.KEYID = 0
1,199,992 UART: [idev] Sha1 KeyId Algorithm
1,208,964 UART: [idev] --
1,209,923 UART: [ldev] ++
1,210,091 UART: [ldev] CDI.KEYID = 6
1,210,455 UART: [ldev] SUBJECT.KEYID = 5
1,210,882 UART: [ldev] AUTHORITY.KEYID = 7
1,211,345 UART: [ldev] FE.KEYID = 1
1,216,421 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,637 UART: [ldev] --
1,281,894 UART: [fwproc] Wait for Commands...
1,282,533 UART: [fwproc] Recv command 0x46574c44
1,283,266 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,086 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,169 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,548 >>> mbox cmd response: success
2,715,624 UART: [afmc] ++
2,715,792 UART: [afmc] CDI.KEYID = 6
2,716,155 UART: [afmc] SUBJECT.KEYID = 7
2,716,581 UART: [afmc] AUTHORITY.KEYID = 5
2,752,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,435 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,155 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,048 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,741 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,316 UART: [afmc] --
2,795,137 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,795,159 UART: [cold-reset] --
2,795,915 UART: [state] Locking Datavault
2,797,214 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,818 UART: [state] Locking ICCM
2,798,482 UART: [exit] Launching FMC @ 0x40000000
2,803,779 UART:
2,803,795 UART: Running Caliptra FMC ...
2,804,203 UART:
2,804,341 UART: [fmc] Received command: 0x10000005
2,805,442 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,945 >>> mbox cmd response: success
2,622,879 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,628,920 UART:
2,628,936 UART: Running Caliptra FMC ...
2,629,344 UART:
2,629,482 UART: [fmc] Received command: 0x10000005
2,630,583 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,666 UART: [kat] SHA2-256
901,606 UART: [kat] SHA2-384
904,449 UART: [kat] SHA2-512-ACC
906,350 UART: [kat] ECC-384
915,703 UART: [kat] HMAC-384Kdf
920,213 UART: [kat] LMS
1,168,525 UART: [kat] --
1,169,230 UART: [cold-reset] ++
1,169,584 UART: [fht] FHT @ 0x50003400
1,172,296 UART: [idev] ++
1,172,464 UART: [idev] CDI.KEYID = 6
1,172,825 UART: [idev] SUBJECT.KEYID = 7
1,173,250 UART: [idev] UDS.KEYID = 0
1,181,035 UART: [idev] Erasing UDS.KEYID = 0
1,197,977 UART: [idev] Sha1 KeyId Algorithm
1,206,811 UART: [idev] --
1,207,870 UART: [ldev] ++
1,208,038 UART: [ldev] CDI.KEYID = 6
1,208,402 UART: [ldev] SUBJECT.KEYID = 5
1,208,829 UART: [ldev] AUTHORITY.KEYID = 7
1,209,292 UART: [ldev] FE.KEYID = 1
1,214,496 UART: [ldev] Erasing FE.KEYID = 1
1,240,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,896 UART: [ldev] --
1,280,275 UART: [fwproc] Wait for Commands...
1,281,066 UART: [fwproc] Recv command 0x46574c44
1,281,799 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,961 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,044 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,345 >>> mbox cmd response: success
2,712,579 UART: [afmc] ++
2,712,747 UART: [afmc] CDI.KEYID = 6
2,713,110 UART: [afmc] SUBJECT.KEYID = 7
2,713,536 UART: [afmc] AUTHORITY.KEYID = 5
2,748,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,764,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,765,606 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,326 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,219 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,782,912 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,790,891 UART: [afmc] --
2,791,760 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,791,782 UART: [cold-reset] --
2,792,608 UART: [state] Locking Datavault
2,793,853 UART: [state] Locking PCR0, PCR1 and PCR31
2,794,457 UART: [state] Locking ICCM
2,795,079 UART: [exit] Launching FMC @ 0x40000000
2,800,376 UART:
2,800,392 UART: Running Caliptra FMC ...
2,800,800 UART:
2,800,938 UART: [fmc] Received command: 0x10000005
2,802,039 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,464 >>> mbox cmd response: success
2,622,918 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,629,275 UART:
2,629,291 UART: Running Caliptra FMC ...
2,629,699 UART:
2,629,837 UART: [fmc] Received command: 0x10000005
2,630,938 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,505 UART: [kat] ++
895,657 UART: [kat] sha1
899,947 UART: [kat] SHA2-256
901,887 UART: [kat] SHA2-384
904,766 UART: [kat] SHA2-512-ACC
906,667 UART: [kat] ECC-384
916,364 UART: [kat] HMAC-384Kdf
921,030 UART: [kat] LMS
1,169,342 UART: [kat] --
1,170,125 UART: [cold-reset] ++
1,170,483 UART: [fht] FHT @ 0x50003400
1,172,999 UART: [idev] ++
1,173,167 UART: [idev] CDI.KEYID = 6
1,173,528 UART: [idev] SUBJECT.KEYID = 7
1,173,953 UART: [idev] UDS.KEYID = 0
1,181,762 UART: [idev] Erasing UDS.KEYID = 0
1,198,702 UART: [idev] Sha1 KeyId Algorithm
1,207,524 UART: [idev] --
1,208,637 UART: [ldev] ++
1,208,805 UART: [ldev] CDI.KEYID = 6
1,209,169 UART: [ldev] SUBJECT.KEYID = 5
1,209,596 UART: [ldev] AUTHORITY.KEYID = 7
1,210,059 UART: [ldev] FE.KEYID = 1
1,215,569 UART: [ldev] Erasing FE.KEYID = 1
1,241,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,665 UART: [ldev] --
1,281,022 UART: [fwproc] Wait for Commands...
1,281,691 UART: [fwproc] Recv command 0x46574c44
1,282,424 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,700 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,783 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,946 >>> mbox cmd response: success
2,714,046 UART: [afmc] ++
2,714,214 UART: [afmc] CDI.KEYID = 6
2,714,577 UART: [afmc] SUBJECT.KEYID = 7
2,715,003 UART: [afmc] AUTHORITY.KEYID = 5
2,750,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,009 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,729 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,622 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,315 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,174 UART: [afmc] --
2,794,189 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,794,211 UART: [cold-reset] --
2,794,921 UART: [state] Locking Datavault
2,795,812 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,416 UART: [state] Locking ICCM
2,796,910 UART: [exit] Launching FMC @ 0x40000000
2,802,207 UART:
2,802,223 UART: Running Caliptra FMC ...
2,802,631 UART:
2,802,769 UART: [fmc] Received command: 0x10000005
2,803,870 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,371 >>> mbox cmd response: success
2,619,935 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,625,930 UART:
2,625,946 UART: Running Caliptra FMC ...
2,626,354 UART:
2,626,492 UART: [fmc] Received command: 0x10000005
2,627,593 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,260 UART: [kat] ++
895,412 UART: [kat] sha1
899,726 UART: [kat] SHA2-256
901,666 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
915,775 UART: [kat] HMAC-384Kdf
920,419 UART: [kat] LMS
1,168,731 UART: [kat] --
1,169,522 UART: [cold-reset] ++
1,169,918 UART: [fht] FHT @ 0x50003400
1,172,462 UART: [idev] ++
1,172,630 UART: [idev] CDI.KEYID = 6
1,172,991 UART: [idev] SUBJECT.KEYID = 7
1,173,416 UART: [idev] UDS.KEYID = 0
1,181,241 UART: [idev] Erasing UDS.KEYID = 0
1,198,251 UART: [idev] Sha1 KeyId Algorithm
1,207,053 UART: [idev] --
1,208,066 UART: [ldev] ++
1,208,234 UART: [ldev] CDI.KEYID = 6
1,208,598 UART: [ldev] SUBJECT.KEYID = 5
1,209,025 UART: [ldev] AUTHORITY.KEYID = 7
1,209,488 UART: [ldev] FE.KEYID = 1
1,214,532 UART: [ldev] Erasing FE.KEYID = 1
1,240,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,060 UART: [ldev] --
1,279,451 UART: [fwproc] Wait for Commands...
1,280,056 UART: [fwproc] Recv command 0x46574c44
1,280,789 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,103 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,186 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,489 >>> mbox cmd response: success
2,712,675 UART: [afmc] ++
2,712,843 UART: [afmc] CDI.KEYID = 6
2,713,206 UART: [afmc] SUBJECT.KEYID = 7
2,713,632 UART: [afmc] AUTHORITY.KEYID = 5
2,749,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,675 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,424 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,144 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,037 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,730 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,731 UART: [afmc] --
2,792,558 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,792,580 UART: [cold-reset] --
2,793,542 UART: [state] Locking Datavault
2,794,693 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,297 UART: [state] Locking ICCM
2,795,791 UART: [exit] Launching FMC @ 0x40000000
2,801,088 UART:
2,801,104 UART: Running Caliptra FMC ...
2,801,512 UART:
2,801,650 UART: [fmc] Received command: 0x10000005
2,802,751 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,563,882 >>> mbox cmd response: success
2,619,902 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,625,905 UART:
2,625,921 UART: Running Caliptra FMC ...
2,626,329 UART:
2,626,467 UART: [fmc] Received command: 0x10000005
2,627,568 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,297 UART: [kat] ++
895,449 UART: [kat] sha1
899,655 UART: [kat] SHA2-256
901,595 UART: [kat] SHA2-384
904,164 UART: [kat] SHA2-512-ACC
906,065 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,456 UART: [kat] LMS
1,168,768 UART: [kat] --
1,169,237 UART: [cold-reset] ++
1,169,691 UART: [fht] FHT @ 0x50003400
1,172,471 UART: [idev] ++
1,172,639 UART: [idev] CDI.KEYID = 6
1,173,000 UART: [idev] SUBJECT.KEYID = 7
1,173,425 UART: [idev] UDS.KEYID = 0
1,181,298 UART: [idev] Erasing UDS.KEYID = 0
1,198,626 UART: [idev] Sha1 KeyId Algorithm
1,207,412 UART: [idev] --
1,208,369 UART: [ldev] ++
1,208,537 UART: [ldev] CDI.KEYID = 6
1,208,901 UART: [ldev] SUBJECT.KEYID = 5
1,209,328 UART: [ldev] AUTHORITY.KEYID = 7
1,209,791 UART: [ldev] FE.KEYID = 1
1,215,133 UART: [ldev] Erasing FE.KEYID = 1
1,241,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,025 UART: [ldev] --
1,280,394 UART: [fwproc] Wait for Commands...
1,281,071 UART: [fwproc] Recv command 0x46574c44
1,281,804 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,610 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,693 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,952 >>> mbox cmd response: success
2,714,164 UART: [afmc] ++
2,714,332 UART: [afmc] CDI.KEYID = 6
2,714,695 UART: [afmc] SUBJECT.KEYID = 7
2,715,121 UART: [afmc] AUTHORITY.KEYID = 5
2,750,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,949 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,669 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,562 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,255 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,858 UART: [afmc] --
2,793,739 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,793,761 UART: [cold-reset] --
2,794,533 UART: [state] Locking Datavault
2,795,834 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,438 UART: [state] Locking ICCM
2,796,938 UART: [exit] Launching FMC @ 0x40000000
2,802,235 UART:
2,802,251 UART: Running Caliptra FMC ...
2,802,659 UART:
2,802,797 UART: [fmc] Received command: 0x10000005
2,803,898 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,173 >>> mbox cmd response: success
2,622,591 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,628,976 UART:
2,628,992 UART: Running Caliptra FMC ...
2,629,400 UART:
2,629,538 UART: [fmc] Received command: 0x10000005
2,630,639 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
2,228,351 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,367,524 UART:
2,367,919 UART: Running Caliptra ROM ...
2,369,005 UART:
2,369,171 UART: [state] CFI Enabled
2,370,150 UART: [state] LifecycleState = Unprovisioned
2,371,817 UART: [state] DebugLocked = No
2,372,871 UART: [state] WD Timer not started. Device not locked for debugging
2,375,355 UART: [kat] SHA2-256
2,376,028 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,379,052 UART: [kat] ++
2,379,506 UART: [kat] sha1
2,380,023 UART: [kat] SHA2-256
2,380,690 UART: [kat] SHA2-384
2,381,356 UART: [kat] SHA2-512-ACC
2,382,207 UART: [kat] ECC-384
2,945,887 UART: [kat] HMAC-384Kdf
2,970,371 UART: [kat] LMS
3,446,844 UART: [kat] --
3,450,539 UART: [cold-reset] ++
3,452,804 UART: [fht] FHT @ 0x50003400
3,464,593 UART: [idev] ++
3,465,212 UART: [idev] CDI.KEYID = 6
3,466,118 UART: [idev] SUBJECT.KEYID = 7
3,467,387 UART: [idev] UDS.KEYID = 0
3,500,388 UART: [idev] Erasing UDS.KEYID = 0
5,985,577 UART: [idev] Sha1 KeyId Algorithm
6,009,047 UART: [idev] --
6,013,164 UART: [ldev] ++
6,013,744 UART: [ldev] CDI.KEYID = 6
6,014,663 UART: [ldev] SUBJECT.KEYID = 5
6,015,887 UART: [ldev] AUTHORITY.KEYID = 7
6,017,126 UART: [ldev] FE.KEYID = 1
6,057,554 UART: [ldev] Erasing FE.KEYID = 1
8,565,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,629 UART: [ldev] --
10,373,623 UART: [fwproc] Wait for Commands...
10,375,195 UART: [fwproc] Recv command 0x46574c44
10,377,190 UART: [fwproc] Recv'd Img size: 109820 bytes
13,756,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,841,038 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,883,482 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,212,363 >>> mbox cmd response: success
14,217,229 UART: [afmc] ++
14,217,824 UART: [afmc] CDI.KEYID = 6
14,218,745 UART: [afmc] SUBJECT.KEYID = 7
14,219,965 UART: [afmc] AUTHORITY.KEYID = 5
16,740,864 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,467,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,470,110 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,485,940 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,501,928 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,517,606 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,540,538 UART: [afmc] --
18,544,034 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,544,413 UART: [cold-reset] --
18,547,343 UART: [state] Locking Datavault
18,552,324 UART: [state] Locking PCR0, PCR1 and PCR31
18,554,033 UART: [state] Locking ICCM
18,555,865 UART: [exit] Launching FMC @ 0x40000000
18,564,209 UART:
18,564,446 UART: Running Caliptra FMC ...
18,565,552 UART:
18,565,719 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,567,300 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,218,697 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,076,623 >>> mbox cmd response: success
18,360,773 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,379,250 UART:
18,379,612 UART: Running Caliptra FMC ...
18,380,793 UART:
18,380,968 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,382,750 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
2,229,778 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,368,708 UART:
2,369,113 UART: Running Caliptra ROM ...
2,370,284 UART:
2,370,476 UART: [state] CFI Enabled
2,371,388 UART: [state] LifecycleState = Unprovisioned
2,373,041 UART: [state] DebugLocked = No
2,374,071 UART: [state] WD Timer not started. Device not locked for debugging
2,376,538 UART: [kat] SHA2-256
2,377,198 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,380,204 UART: [kat] ++
2,380,653 UART: [kat] sha1
2,381,189 UART: [kat] SHA2-256
2,381,845 UART: [kat] SHA2-384
2,382,495 UART: [kat] SHA2-512-ACC
2,383,290 UART: [kat] ECC-384
3,276,259 UART: [kat] HMAC-384Kdf
3,287,412 UART: [kat] LMS
3,763,900 UART: [kat] --
3,767,661 UART: [cold-reset] ++
3,770,176 UART: [fht] FHT @ 0x50003400
3,781,701 UART: [idev] ++
3,782,264 UART: [idev] CDI.KEYID = 6
3,783,274 UART: [idev] SUBJECT.KEYID = 7
3,784,434 UART: [idev] UDS.KEYID = 0
3,800,573 UART: [idev] Erasing UDS.KEYID = 0
6,256,953 UART: [idev] Sha1 KeyId Algorithm
6,280,188 UART: [idev] --
6,283,904 UART: [ldev] ++
6,284,526 UART: [ldev] CDI.KEYID = 6
6,285,430 UART: [ldev] SUBJECT.KEYID = 5
6,286,637 UART: [ldev] AUTHORITY.KEYID = 7
6,287,866 UART: [ldev] FE.KEYID = 1
6,297,700 UART: [ldev] Erasing FE.KEYID = 1
8,773,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,490,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,506,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,522,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,538,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,560,283 UART: [ldev] --
10,564,896 UART: [fwproc] Wait for Commands...
10,567,521 UART: [fwproc] Recv command 0x46574c44
10,569,547 UART: [fwproc] Recv'd Img size: 109820 bytes
13,941,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,026,754 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,069,214 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,397,496 >>> mbox cmd response: success
14,401,633 UART: [afmc] ++
14,402,224 UART: [afmc] CDI.KEYID = 6
14,403,191 UART: [afmc] SUBJECT.KEYID = 7
14,404,402 UART: [afmc] AUTHORITY.KEYID = 5
16,908,277 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,631,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,633,604 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,649,448 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,665,429 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,681,070 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,705,972 UART: [afmc] --
18,709,901 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,710,271 UART: [cold-reset] --
18,714,162 UART: [state] Locking Datavault
18,719,186 UART: [state] Locking PCR0, PCR1 and PCR31
18,720,937 UART: [state] Locking ICCM
18,723,436 UART: [exit] Launching FMC @ 0x40000000
18,731,778 UART:
18,732,056 UART: Running Caliptra FMC ...
18,733,170 UART:
18,733,331 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,734,924 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
2,236,364 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,300,777 >>> mbox cmd response: success
18,530,017 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,544,681 UART:
18,545,010 UART: Running Caliptra FMC ...
18,546,182 UART:
18,546,354 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,548,106 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
891,098 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,202 UART: [kat] ++
895,354 UART: [kat] sha1
899,560 UART: [kat] SHA2-256
901,500 UART: [kat] SHA2-384
904,287 UART: [kat] SHA2-512-ACC
906,188 UART: [kat] ECC-384
915,573 UART: [kat] HMAC-384Kdf
920,143 UART: [kat] LMS
1,168,455 UART: [kat] --
1,169,568 UART: [cold-reset] ++
1,169,956 UART: [fht] FHT @ 0x50003400
1,172,846 UART: [idev] ++
1,173,014 UART: [idev] CDI.KEYID = 6
1,173,375 UART: [idev] SUBJECT.KEYID = 7
1,173,800 UART: [idev] UDS.KEYID = 0
1,181,831 UART: [idev] Erasing UDS.KEYID = 0
1,198,705 UART: [idev] Sha1 KeyId Algorithm
1,207,647 UART: [idev] --
1,208,604 UART: [ldev] ++
1,208,772 UART: [ldev] CDI.KEYID = 6
1,209,136 UART: [ldev] SUBJECT.KEYID = 5
1,209,563 UART: [ldev] AUTHORITY.KEYID = 7
1,210,026 UART: [ldev] FE.KEYID = 1
1,214,904 UART: [ldev] Erasing FE.KEYID = 1
1,240,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,378 UART: [ldev] --
1,279,611 UART: [fwproc] Wait for Commands...
1,280,316 UART: [fwproc] Recv command 0x46574c44
1,281,049 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,517 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,600 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,710,817 >>> mbox cmd response: success
2,711,957 UART: [afmc] ++
2,712,125 UART: [afmc] CDI.KEYID = 6
2,712,488 UART: [afmc] SUBJECT.KEYID = 7
2,712,914 UART: [afmc] AUTHORITY.KEYID = 5
2,747,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,763,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,764,514 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,770,234 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,776,127 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,781,820 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,789,711 UART: [afmc] --
2,790,568 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,790,590 UART: [cold-reset] --
2,791,290 UART: [state] Locking Datavault
2,792,345 UART: [state] Locking PCR0, PCR1 and PCR31
2,792,949 UART: [state] Locking ICCM
2,793,443 UART: [exit] Launching FMC @ 0x40000000
2,798,740 UART:
2,798,756 UART: Running Caliptra FMC ...
2,799,164 UART:
2,799,302 UART: [fmc] Received command: 0x10000005
2,800,403 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,480 >>> mbox cmd response: success
2,622,662 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,628,505 UART:
2,628,521 UART: Running Caliptra FMC ...
2,628,929 UART:
2,629,067 UART: [fmc] Received command: 0x10000005
2,630,168 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,549 UART: [kat] ++
895,701 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,758 UART: [kat] SHA2-512-ACC
906,659 UART: [kat] ECC-384
916,330 UART: [kat] HMAC-384Kdf
920,832 UART: [kat] LMS
1,169,144 UART: [kat] --
1,169,803 UART: [cold-reset] ++
1,170,315 UART: [fht] FHT @ 0x50003400
1,173,039 UART: [idev] ++
1,173,207 UART: [idev] CDI.KEYID = 6
1,173,568 UART: [idev] SUBJECT.KEYID = 7
1,173,993 UART: [idev] UDS.KEYID = 0
1,181,988 UART: [idev] Erasing UDS.KEYID = 0
1,198,560 UART: [idev] Sha1 KeyId Algorithm
1,207,424 UART: [idev] --
1,208,535 UART: [ldev] ++
1,208,703 UART: [ldev] CDI.KEYID = 6
1,209,067 UART: [ldev] SUBJECT.KEYID = 5
1,209,494 UART: [ldev] AUTHORITY.KEYID = 7
1,209,957 UART: [ldev] FE.KEYID = 1
1,215,225 UART: [ldev] Erasing FE.KEYID = 1
1,241,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,555 UART: [ldev] --
1,280,894 UART: [fwproc] Wait for Commands...
1,281,629 UART: [fwproc] Recv command 0x46574c44
1,282,362 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,286 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,369 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,744 >>> mbox cmd response: success
2,713,814 UART: [afmc] ++
2,713,982 UART: [afmc] CDI.KEYID = 6
2,714,345 UART: [afmc] SUBJECT.KEYID = 7
2,714,771 UART: [afmc] AUTHORITY.KEYID = 5
2,750,015 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,212 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,961 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,681 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,574 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,267 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,850 UART: [afmc] --
2,792,677 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,792,699 UART: [cold-reset] --
2,793,745 UART: [state] Locking Datavault
2,795,044 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,648 UART: [state] Locking ICCM
2,796,312 UART: [exit] Launching FMC @ 0x40000000
2,801,609 UART:
2,801,625 UART: Running Caliptra FMC ...
2,802,033 UART:
2,802,171 UART: [fmc] Received command: 0x10000005
2,803,272 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,545 >>> mbox cmd response: success
2,620,379 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,626,486 UART:
2,626,502 UART: Running Caliptra FMC ...
2,626,910 UART:
2,627,048 UART: [fmc] Received command: 0x10000005
2,628,149 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
891,044 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,148 UART: [kat] ++
895,300 UART: [kat] sha1
899,500 UART: [kat] SHA2-256
901,440 UART: [kat] SHA2-384
904,205 UART: [kat] SHA2-512-ACC
906,106 UART: [kat] ECC-384
915,739 UART: [kat] HMAC-384Kdf
920,187 UART: [kat] LMS
1,168,499 UART: [kat] --
1,169,338 UART: [cold-reset] ++
1,169,742 UART: [fht] FHT @ 0x50003400
1,172,592 UART: [idev] ++
1,172,760 UART: [idev] CDI.KEYID = 6
1,173,121 UART: [idev] SUBJECT.KEYID = 7
1,173,546 UART: [idev] UDS.KEYID = 0
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,198,451 UART: [idev] Sha1 KeyId Algorithm
1,207,277 UART: [idev] --
1,208,396 UART: [ldev] ++
1,208,564 UART: [ldev] CDI.KEYID = 6
1,208,928 UART: [ldev] SUBJECT.KEYID = 5
1,209,355 UART: [ldev] AUTHORITY.KEYID = 7
1,209,818 UART: [ldev] FE.KEYID = 1
1,214,730 UART: [ldev] Erasing FE.KEYID = 1
1,240,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,866 UART: [ldev] --
1,280,289 UART: [fwproc] Wait for Commands...
1,281,002 UART: [fwproc] Recv command 0x46574c44
1,281,735 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,737 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,820 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,053 >>> mbox cmd response: success
2,713,107 UART: [afmc] ++
2,713,275 UART: [afmc] CDI.KEYID = 6
2,713,638 UART: [afmc] SUBJECT.KEYID = 7
2,714,064 UART: [afmc] AUTHORITY.KEYID = 5
2,749,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,746 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,466 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,359 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,052 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,925 UART: [afmc] --
2,792,944 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,792,966 UART: [cold-reset] --
2,793,750 UART: [state] Locking Datavault
2,795,259 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,863 UART: [state] Locking ICCM
2,796,421 UART: [exit] Launching FMC @ 0x40000000
2,801,718 UART:
2,801,734 UART: Running Caliptra FMC ...
2,802,142 UART:
2,802,280 UART: [fmc] Received command: 0x10000005
2,803,381 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,160 >>> mbox cmd response: success
2,620,378 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,626,311 UART:
2,626,327 UART: Running Caliptra FMC ...
2,626,735 UART:
2,626,873 UART: [fmc] Received command: 0x10000005
2,627,974 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
87,036 UART: [state] WD Timer not started. Device not locked for debugging
88,351 UART: [kat] SHA2-256
891,901 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,005 UART: [kat] ++
896,157 UART: [kat] sha1
900,375 UART: [kat] SHA2-256
902,315 UART: [kat] SHA2-384
905,028 UART: [kat] SHA2-512-ACC
906,929 UART: [kat] ECC-384
916,674 UART: [kat] HMAC-384Kdf
921,172 UART: [kat] LMS
1,169,484 UART: [kat] --
1,170,561 UART: [cold-reset] ++
1,170,889 UART: [fht] FHT @ 0x50003400
1,173,463 UART: [idev] ++
1,173,631 UART: [idev] CDI.KEYID = 6
1,173,992 UART: [idev] SUBJECT.KEYID = 7
1,174,417 UART: [idev] UDS.KEYID = 0
1,182,404 UART: [idev] Erasing UDS.KEYID = 0
1,199,532 UART: [idev] Sha1 KeyId Algorithm
1,208,574 UART: [idev] --
1,209,751 UART: [ldev] ++
1,209,919 UART: [ldev] CDI.KEYID = 6
1,210,283 UART: [ldev] SUBJECT.KEYID = 5
1,210,710 UART: [ldev] AUTHORITY.KEYID = 7
1,211,173 UART: [ldev] FE.KEYID = 1
1,216,551 UART: [ldev] Erasing FE.KEYID = 1
1,243,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,215 UART: [ldev] --
1,282,420 UART: [fwproc] Wait for Commands...
1,283,233 UART: [fwproc] Recv command 0x46574c44
1,283,966 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,288 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,371 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,704 >>> mbox cmd response: success
2,715,806 UART: [afmc] ++
2,715,974 UART: [afmc] CDI.KEYID = 6
2,716,337 UART: [afmc] SUBJECT.KEYID = 7
2,716,763 UART: [afmc] AUTHORITY.KEYID = 5
2,752,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,275 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,995 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,888 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,581 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,418 UART: [afmc] --
2,795,315 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,795,337 UART: [cold-reset] --
2,795,991 UART: [state] Locking Datavault
2,797,064 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,668 UART: [state] Locking ICCM
2,798,224 UART: [exit] Launching FMC @ 0x40000000
2,803,521 UART:
2,803,537 UART: Running Caliptra FMC ...
2,803,945 UART:
2,804,083 UART: [fmc] Received command: 0x10000005
2,805,184 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,687 >>> mbox cmd response: success
2,623,177 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,629,350 UART:
2,629,366 UART: Running Caliptra FMC ...
2,629,774 UART:
2,629,912 UART: [fmc] Received command: 0x10000005
2,631,013 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
891,346 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,450 UART: [kat] ++
895,602 UART: [kat] sha1
899,644 UART: [kat] SHA2-256
901,584 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,769 UART: [kat] LMS
1,169,081 UART: [kat] --
1,170,114 UART: [cold-reset] ++
1,170,532 UART: [fht] FHT @ 0x50003400
1,173,336 UART: [idev] ++
1,173,504 UART: [idev] CDI.KEYID = 6
1,173,865 UART: [idev] SUBJECT.KEYID = 7
1,174,290 UART: [idev] UDS.KEYID = 0
1,182,279 UART: [idev] Erasing UDS.KEYID = 0
1,198,781 UART: [idev] Sha1 KeyId Algorithm
1,207,503 UART: [idev] --
1,208,684 UART: [ldev] ++
1,208,852 UART: [ldev] CDI.KEYID = 6
1,209,216 UART: [ldev] SUBJECT.KEYID = 5
1,209,643 UART: [ldev] AUTHORITY.KEYID = 7
1,210,106 UART: [ldev] FE.KEYID = 1
1,215,146 UART: [ldev] Erasing FE.KEYID = 1
1,242,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,630 UART: [ldev] --
1,282,049 UART: [fwproc] Wait for Commands...
1,282,760 UART: [fwproc] Recv command 0x46574c44
1,283,493 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,867 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,950 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,173 >>> mbox cmd response: success
2,713,333 UART: [afmc] ++
2,713,501 UART: [afmc] CDI.KEYID = 6
2,713,864 UART: [afmc] SUBJECT.KEYID = 7
2,714,290 UART: [afmc] AUTHORITY.KEYID = 5
2,749,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,099 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,848 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,568 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,461 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,154 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,991 UART: [afmc] --
2,792,844 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,792,866 UART: [cold-reset] --
2,793,740 UART: [state] Locking Datavault
2,795,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,657 UART: [state] Locking ICCM
2,796,141 UART: [exit] Launching FMC @ 0x40000000
2,801,438 UART:
2,801,454 UART: Running Caliptra FMC ...
2,801,862 UART:
2,802,000 UART: [fmc] Received command: 0x10000005
2,803,101 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,563,498 >>> mbox cmd response: success
2,618,790 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,625,043 UART:
2,625,059 UART: Running Caliptra FMC ...
2,625,467 UART:
2,625,605 UART: [fmc] Received command: 0x10000005
2,626,706 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,094 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,169,663 UART: [cold-reset] ++
1,170,049 UART: [fht] FHT @ 0x50003400
1,172,683 UART: [idev] ++
1,172,851 UART: [idev] CDI.KEYID = 6
1,173,212 UART: [idev] SUBJECT.KEYID = 7
1,173,637 UART: [idev] UDS.KEYID = 0
1,182,338 UART: [idev] Erasing UDS.KEYID = 0
1,199,730 UART: [idev] Sha1 KeyId Algorithm
1,208,532 UART: [idev] --
1,209,621 UART: [ldev] ++
1,209,789 UART: [ldev] CDI.KEYID = 6
1,210,153 UART: [ldev] SUBJECT.KEYID = 5
1,210,580 UART: [ldev] AUTHORITY.KEYID = 7
1,211,043 UART: [ldev] FE.KEYID = 1
1,216,289 UART: [ldev] Erasing FE.KEYID = 1
1,242,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,279 UART: [ldev] --
1,281,616 UART: [fwproc] Wait for Commands...
1,282,315 UART: [fwproc] Recv command 0x46574c44
1,283,048 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,828 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,911 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,278 >>> mbox cmd response: success
2,716,344 UART: [afmc] ++
2,716,512 UART: [afmc] CDI.KEYID = 6
2,716,875 UART: [afmc] SUBJECT.KEYID = 7
2,717,301 UART: [afmc] AUTHORITY.KEYID = 5
2,753,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,172 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,921 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,641 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,534 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,227 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,946 UART: [afmc] --
2,796,947 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,796,969 UART: [cold-reset] --
2,797,861 UART: [state] Locking Datavault
2,798,830 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,434 UART: [state] Locking ICCM
2,799,866 UART: [exit] Launching FMC @ 0x40000000
2,805,163 UART:
2,805,179 UART: Running Caliptra FMC ...
2,805,587 UART:
2,805,725 UART: [fmc] Received command: 0x10000005
2,806,826 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,285 >>> mbox cmd response: success
2,624,099 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,630,400 UART:
2,630,416 UART: Running Caliptra FMC ...
2,630,824 UART:
2,630,962 UART: [fmc] Received command: 0x10000005
2,632,063 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
2,260,589 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,399,706 UART:
2,400,103 UART: Running Caliptra ROM ...
2,401,276 UART:
2,401,454 UART: [state] CFI Enabled
2,402,380 UART: [state] LifecycleState = Unprovisioned
2,404,039 UART: [state] DebugLocked = No
2,405,158 UART: [state] WD Timer not started. Device not locked for debugging
2,407,645 UART: [kat] SHA2-256
2,408,319 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,411,335 UART: [kat] ++
2,411,794 UART: [kat] sha1
2,412,340 UART: [kat] SHA2-256
2,413,086 UART: [kat] SHA2-384
2,413,766 UART: [kat] SHA2-512-ACC
2,414,600 UART: [kat] ECC-384
2,960,142 UART: [kat] HMAC-384Kdf
2,983,771 UART: [kat] LMS
3,460,231 UART: [kat] --
3,464,922 UART: [cold-reset] ++
3,466,743 UART: [fht] FHT @ 0x50003400
3,478,702 UART: [idev] ++
3,479,288 UART: [idev] CDI.KEYID = 6
3,480,271 UART: [idev] SUBJECT.KEYID = 7
3,481,493 UART: [idev] UDS.KEYID = 0
3,505,905 UART: [idev] Erasing UDS.KEYID = 0
5,993,319 UART: [idev] Sha1 KeyId Algorithm
6,017,537 UART: [idev] --
6,021,484 UART: [ldev] ++
6,022,074 UART: [ldev] CDI.KEYID = 6
6,023,001 UART: [ldev] SUBJECT.KEYID = 5
6,024,176 UART: [ldev] AUTHORITY.KEYID = 7
6,025,471 UART: [ldev] FE.KEYID = 1
6,058,277 UART: [ldev] Erasing FE.KEYID = 1
8,568,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,470 UART: [ldev] --
10,373,846 UART: [fwproc] Wait for Commands...
10,376,167 UART: [fwproc] Recv command 0x46574c44
10,378,157 UART: [fwproc] Recv'd Img size: 109820 bytes
13,753,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,839,104 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,881,419 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,209,648 >>> mbox cmd response: success
14,213,949 UART: [afmc] ++
14,214,550 UART: [afmc] CDI.KEYID = 6
14,215,521 UART: [afmc] SUBJECT.KEYID = 7
14,216,688 UART: [afmc] AUTHORITY.KEYID = 5
16,743,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,466,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,468,312 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,484,151 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,500,137 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,515,779 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,541,882 UART: [afmc] --
18,546,411 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,546,786 UART: [cold-reset] --
18,550,087 UART: [state] Locking Datavault
18,555,728 UART: [state] Locking PCR0, PCR1 and PCR31
18,557,497 UART: [state] Locking ICCM
18,558,787 UART: [exit] Launching FMC @ 0x40000000
18,567,144 UART:
18,567,396 UART: Running Caliptra FMC ...
18,568,503 UART:
18,568,671 UART: [fmc] Received command: 0x10000003
18,578,246 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
2,219,424 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,107,548 >>> mbox cmd response: success
18,371,298 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,387,435 UART:
18,387,818 UART: Running Caliptra FMC ...
18,388,942 UART:
18,389,116 UART: [fmc] Received command: 0x10000003
18,398,543 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,232,131 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,371,114 UART:
2,371,544 UART: Running Caliptra ROM ...
2,372,711 UART:
2,372,887 UART: [state] CFI Enabled
2,373,844 UART: [state] LifecycleState = Unprovisioned
2,375,511 UART: [state] DebugLocked = No
2,376,538 UART: [state] WD Timer not started. Device not locked for debugging
2,379,004 UART: [kat] SHA2-256
2,379,675 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,382,703 UART: [kat] ++
2,383,154 UART: [kat] sha1
2,383,661 UART: [kat] SHA2-256
2,384,314 UART: [kat] SHA2-384
2,384,967 UART: [kat] SHA2-512-ACC
2,385,790 UART: [kat] ECC-384
3,274,847 UART: [kat] HMAC-384Kdf
3,287,605 UART: [kat] LMS
3,764,117 UART: [kat] --
3,768,963 UART: [cold-reset] ++
3,770,832 UART: [fht] FHT @ 0x50003400
3,783,479 UART: [idev] ++
3,784,107 UART: [idev] CDI.KEYID = 6
3,784,987 UART: [idev] SUBJECT.KEYID = 7
3,786,250 UART: [idev] UDS.KEYID = 0
3,803,711 UART: [idev] Erasing UDS.KEYID = 0
6,266,211 UART: [idev] Sha1 KeyId Algorithm
6,290,085 UART: [idev] --
6,293,792 UART: [ldev] ++
6,294,423 UART: [ldev] CDI.KEYID = 6
6,295,303 UART: [ldev] SUBJECT.KEYID = 5
6,296,516 UART: [ldev] AUTHORITY.KEYID = 7
6,297,802 UART: [ldev] FE.KEYID = 1
6,308,715 UART: [ldev] Erasing FE.KEYID = 1
8,793,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,982 UART: [ldev] --
10,587,404 UART: [fwproc] Wait for Commands...
10,589,445 UART: [fwproc] Recv command 0x46574c44
10,591,451 UART: [fwproc] Recv'd Img size: 109820 bytes
13,966,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,045,759 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,088,227 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,416,222 >>> mbox cmd response: success
14,420,616 UART: [afmc] ++
14,421,210 UART: [afmc] CDI.KEYID = 6
14,422,149 UART: [afmc] SUBJECT.KEYID = 7
14,423,355 UART: [afmc] AUTHORITY.KEYID = 5
16,921,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,645,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,647,621 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,663,431 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,679,395 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,695,103 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,719,061 UART: [afmc] --
18,722,201 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,722,577 UART: [cold-reset] --
18,725,546 UART: [state] Locking Datavault
18,732,299 UART: [state] Locking PCR0, PCR1 and PCR31
18,734,047 UART: [state] Locking ICCM
18,735,303 UART: [exit] Launching FMC @ 0x40000000
18,743,634 UART:
18,743,868 UART: Running Caliptra FMC ...
18,744,965 UART:
18,745,117 UART: [fmc] Received command: 0x10000003
18,754,732 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
2,229,021 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,299,251 >>> mbox cmd response: success
18,535,185 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,549,315 UART:
18,549,641 UART: Running Caliptra FMC ...
18,550,815 UART:
18,550,977 UART: [fmc] Received command: 0x10000003
18,560,432 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
891,100 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,204 UART: [kat] ++
895,356 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
916,111 UART: [kat] HMAC-384Kdf
920,639 UART: [kat] LMS
1,168,951 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,712 UART: [fht] FHT @ 0x50003400
1,173,296 UART: [idev] ++
1,173,464 UART: [idev] CDI.KEYID = 6
1,173,825 UART: [idev] SUBJECT.KEYID = 7
1,174,250 UART: [idev] UDS.KEYID = 0
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,200,033 UART: [idev] Sha1 KeyId Algorithm
1,208,699 UART: [idev] --
1,209,800 UART: [ldev] ++
1,209,968 UART: [ldev] CDI.KEYID = 6
1,210,332 UART: [ldev] SUBJECT.KEYID = 5
1,210,759 UART: [ldev] AUTHORITY.KEYID = 7
1,211,222 UART: [ldev] FE.KEYID = 1
1,216,362 UART: [ldev] Erasing FE.KEYID = 1
1,242,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,478 UART: [ldev] --
1,281,925 UART: [fwproc] Wait for Commands...
1,282,684 UART: [fwproc] Recv command 0x46574c44
1,283,417 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,715 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,798 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,969 >>> mbox cmd response: success
2,714,121 UART: [afmc] ++
2,714,289 UART: [afmc] CDI.KEYID = 6
2,714,652 UART: [afmc] SUBJECT.KEYID = 7
2,715,078 UART: [afmc] AUTHORITY.KEYID = 5
2,750,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,840 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,560 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,453 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,146 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,825 UART: [afmc] --
2,793,842 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,793,864 UART: [cold-reset] --
2,794,676 UART: [state] Locking Datavault
2,795,545 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,149 UART: [state] Locking ICCM
2,796,799 UART: [exit] Launching FMC @ 0x40000000
2,802,096 UART:
2,802,112 UART: Running Caliptra FMC ...
2,802,520 UART:
2,802,658 UART: [fmc] Received command: 0x10000003
2,812,134 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,144 >>> mbox cmd response: success
2,620,814 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,627,285 UART:
2,627,301 UART: Running Caliptra FMC ...
2,627,709 UART:
2,627,847 UART: [fmc] Received command: 0x10000003
2,637,323 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
900,029 UART: [kat] SHA2-256
901,969 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
916,636 UART: [kat] HMAC-384Kdf
921,396 UART: [kat] LMS
1,169,708 UART: [kat] --
1,170,629 UART: [cold-reset] ++
1,170,977 UART: [fht] FHT @ 0x50003400
1,173,467 UART: [idev] ++
1,173,635 UART: [idev] CDI.KEYID = 6
1,173,996 UART: [idev] SUBJECT.KEYID = 7
1,174,421 UART: [idev] UDS.KEYID = 0
1,182,352 UART: [idev] Erasing UDS.KEYID = 0
1,199,626 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,551 UART: [ldev] ++
1,209,719 UART: [ldev] CDI.KEYID = 6
1,210,083 UART: [ldev] SUBJECT.KEYID = 5
1,210,510 UART: [ldev] AUTHORITY.KEYID = 7
1,210,973 UART: [ldev] FE.KEYID = 1
1,216,163 UART: [ldev] Erasing FE.KEYID = 1
1,242,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,899 UART: [ldev] --
1,282,298 UART: [fwproc] Wait for Commands...
1,283,113 UART: [fwproc] Recv command 0x46574c44
1,283,846 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,598 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,681 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,044 >>> mbox cmd response: success
2,715,186 UART: [afmc] ++
2,715,354 UART: [afmc] CDI.KEYID = 6
2,715,717 UART: [afmc] SUBJECT.KEYID = 7
2,716,143 UART: [afmc] AUTHORITY.KEYID = 5
2,752,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,755 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,475 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,368 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,061 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,890 UART: [afmc] --
2,795,769 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,795,791 UART: [cold-reset] --
2,796,585 UART: [state] Locking Datavault
2,797,570 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,174 UART: [state] Locking ICCM
2,798,784 UART: [exit] Launching FMC @ 0x40000000
2,804,081 UART:
2,804,097 UART: Running Caliptra FMC ...
2,804,505 UART:
2,804,643 UART: [fmc] Received command: 0x10000003
2,814,119 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,229 >>> mbox cmd response: success
2,622,955 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,629,298 UART:
2,629,314 UART: Running Caliptra FMC ...
2,629,722 UART:
2,629,860 UART: [fmc] Received command: 0x10000003
2,639,336 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,122 UART: [kat] SHA2-256
890,672 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,776 UART: [kat] ++
894,928 UART: [kat] sha1
899,192 UART: [kat] SHA2-256
901,132 UART: [kat] SHA2-384
903,663 UART: [kat] SHA2-512-ACC
905,564 UART: [kat] ECC-384
915,261 UART: [kat] HMAC-384Kdf
919,975 UART: [kat] LMS
1,168,287 UART: [kat] --
1,169,342 UART: [cold-reset] ++
1,169,744 UART: [fht] FHT @ 0x50003400
1,172,180 UART: [idev] ++
1,172,348 UART: [idev] CDI.KEYID = 6
1,172,709 UART: [idev] SUBJECT.KEYID = 7
1,173,134 UART: [idev] UDS.KEYID = 0
1,181,057 UART: [idev] Erasing UDS.KEYID = 0
1,197,663 UART: [idev] Sha1 KeyId Algorithm
1,206,619 UART: [idev] --
1,207,810 UART: [ldev] ++
1,207,978 UART: [ldev] CDI.KEYID = 6
1,208,342 UART: [ldev] SUBJECT.KEYID = 5
1,208,769 UART: [ldev] AUTHORITY.KEYID = 7
1,209,232 UART: [ldev] FE.KEYID = 1
1,214,520 UART: [ldev] Erasing FE.KEYID = 1
1,240,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,352 UART: [ldev] --
1,279,807 UART: [fwproc] Wait for Commands...
1,280,482 UART: [fwproc] Recv command 0x46574c44
1,281,215 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,793 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,876 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,067 >>> mbox cmd response: success
2,712,307 UART: [afmc] ++
2,712,475 UART: [afmc] CDI.KEYID = 6
2,712,838 UART: [afmc] SUBJECT.KEYID = 7
2,713,264 UART: [afmc] AUTHORITY.KEYID = 5
2,748,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,764,731 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,765,480 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,200 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,093 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,782,786 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,790,535 UART: [afmc] --
2,791,358 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,791,380 UART: [cold-reset] --
2,792,140 UART: [state] Locking Datavault
2,793,399 UART: [state] Locking PCR0, PCR1 and PCR31
2,794,003 UART: [state] Locking ICCM
2,794,493 UART: [exit] Launching FMC @ 0x40000000
2,799,790 UART:
2,799,806 UART: Running Caliptra FMC ...
2,800,214 UART:
2,800,352 UART: [fmc] Received command: 0x10000003
2,809,828 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,702 >>> mbox cmd response: success
2,621,426 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,627,507 UART:
2,627,523 UART: Running Caliptra FMC ...
2,627,931 UART:
2,628,069 UART: [fmc] Received command: 0x10000003
2,637,545 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,471 UART: [kat] ++
895,623 UART: [kat] sha1
899,741 UART: [kat] SHA2-256
901,681 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
916,568 UART: [kat] HMAC-384Kdf
921,098 UART: [kat] LMS
1,169,410 UART: [kat] --
1,170,431 UART: [cold-reset] ++
1,170,905 UART: [fht] FHT @ 0x50003400
1,173,739 UART: [idev] ++
1,173,907 UART: [idev] CDI.KEYID = 6
1,174,268 UART: [idev] SUBJECT.KEYID = 7
1,174,693 UART: [idev] UDS.KEYID = 0
1,183,158 UART: [idev] Erasing UDS.KEYID = 0
1,200,334 UART: [idev] Sha1 KeyId Algorithm
1,209,244 UART: [idev] --
1,210,277 UART: [ldev] ++
1,210,445 UART: [ldev] CDI.KEYID = 6
1,210,809 UART: [ldev] SUBJECT.KEYID = 5
1,211,236 UART: [ldev] AUTHORITY.KEYID = 7
1,211,699 UART: [ldev] FE.KEYID = 1
1,216,803 UART: [ldev] Erasing FE.KEYID = 1
1,243,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,723 UART: [ldev] --
1,283,022 UART: [fwproc] Wait for Commands...
1,283,619 UART: [fwproc] Recv command 0x46574c44
1,284,352 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,600 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,683 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,992 >>> mbox cmd response: success
2,716,206 UART: [afmc] ++
2,716,374 UART: [afmc] CDI.KEYID = 6
2,716,737 UART: [afmc] SUBJECT.KEYID = 7
2,717,163 UART: [afmc] AUTHORITY.KEYID = 5
2,752,497 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,503 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,223 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,116 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,809 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,450 UART: [afmc] --
2,795,269 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,795,291 UART: [cold-reset] --
2,796,213 UART: [state] Locking Datavault
2,797,196 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,800 UART: [state] Locking ICCM
2,798,286 UART: [exit] Launching FMC @ 0x40000000
2,803,583 UART:
2,803,599 UART: Running Caliptra FMC ...
2,804,007 UART:
2,804,145 UART: [fmc] Received command: 0x10000003
2,813,621 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,609 >>> mbox cmd response: success
2,621,359 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,627,442 UART:
2,627,458 UART: Running Caliptra FMC ...
2,627,866 UART:
2,628,004 UART: [fmc] Received command: 0x10000003
2,637,480 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
891,240 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,682 UART: [kat] SHA2-256
901,622 UART: [kat] SHA2-384
904,401 UART: [kat] SHA2-512-ACC
906,302 UART: [kat] ECC-384
916,395 UART: [kat] HMAC-384Kdf
921,167 UART: [kat] LMS
1,169,479 UART: [kat] --
1,170,426 UART: [cold-reset] ++
1,170,854 UART: [fht] FHT @ 0x50003400
1,173,526 UART: [idev] ++
1,173,694 UART: [idev] CDI.KEYID = 6
1,174,055 UART: [idev] SUBJECT.KEYID = 7
1,174,480 UART: [idev] UDS.KEYID = 0
1,182,315 UART: [idev] Erasing UDS.KEYID = 0
1,199,067 UART: [idev] Sha1 KeyId Algorithm
1,207,855 UART: [idev] --
1,208,964 UART: [ldev] ++
1,209,132 UART: [ldev] CDI.KEYID = 6
1,209,496 UART: [ldev] SUBJECT.KEYID = 5
1,209,923 UART: [ldev] AUTHORITY.KEYID = 7
1,210,386 UART: [ldev] FE.KEYID = 1
1,215,514 UART: [ldev] Erasing FE.KEYID = 1
1,241,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,236 UART: [ldev] --
1,280,675 UART: [fwproc] Wait for Commands...
1,281,404 UART: [fwproc] Recv command 0x46574c44
1,282,137 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,355 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,438 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,773 >>> mbox cmd response: success
2,713,877 UART: [afmc] ++
2,714,045 UART: [afmc] CDI.KEYID = 6
2,714,408 UART: [afmc] SUBJECT.KEYID = 7
2,714,834 UART: [afmc] AUTHORITY.KEYID = 5
2,750,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,882 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,602 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,495 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,188 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,835 UART: [afmc] --
2,793,666 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,793,688 UART: [cold-reset] --
2,794,616 UART: [state] Locking Datavault
2,795,903 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,507 UART: [state] Locking ICCM
2,797,153 UART: [exit] Launching FMC @ 0x40000000
2,802,450 UART:
2,802,466 UART: Running Caliptra FMC ...
2,802,874 UART:
2,803,012 UART: [fmc] Received command: 0x10000003
2,812,488 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,266 >>> mbox cmd response: success
2,623,354 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,629,473 UART:
2,629,489 UART: Running Caliptra FMC ...
2,629,897 UART:
2,630,035 UART: [fmc] Received command: 0x10000003
2,639,511 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
891,719 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,823 UART: [kat] ++
895,975 UART: [kat] sha1
900,191 UART: [kat] SHA2-256
902,131 UART: [kat] SHA2-384
905,028 UART: [kat] SHA2-512-ACC
906,929 UART: [kat] ECC-384
916,770 UART: [kat] HMAC-384Kdf
921,426 UART: [kat] LMS
1,169,738 UART: [kat] --
1,170,927 UART: [cold-reset] ++
1,171,415 UART: [fht] FHT @ 0x50003400
1,174,097 UART: [idev] ++
1,174,265 UART: [idev] CDI.KEYID = 6
1,174,626 UART: [idev] SUBJECT.KEYID = 7
1,175,051 UART: [idev] UDS.KEYID = 0
1,183,024 UART: [idev] Erasing UDS.KEYID = 0
1,200,582 UART: [idev] Sha1 KeyId Algorithm
1,209,450 UART: [idev] --
1,210,401 UART: [ldev] ++
1,210,569 UART: [ldev] CDI.KEYID = 6
1,210,933 UART: [ldev] SUBJECT.KEYID = 5
1,211,360 UART: [ldev] AUTHORITY.KEYID = 7
1,211,823 UART: [ldev] FE.KEYID = 1
1,217,251 UART: [ldev] Erasing FE.KEYID = 1
1,243,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,317 UART: [ldev] --
1,282,566 UART: [fwproc] Wait for Commands...
1,283,317 UART: [fwproc] Recv command 0x46574c44
1,284,050 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,156 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,239 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,446 >>> mbox cmd response: success
2,715,516 UART: [afmc] ++
2,715,684 UART: [afmc] CDI.KEYID = 6
2,716,047 UART: [afmc] SUBJECT.KEYID = 7
2,716,473 UART: [afmc] AUTHORITY.KEYID = 5
2,751,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,335 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,055 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,948 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,641 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,318 UART: [afmc] --
2,795,155 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,795,177 UART: [cold-reset] --
2,796,031 UART: [state] Locking Datavault
2,797,304 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,908 UART: [state] Locking ICCM
2,798,576 UART: [exit] Launching FMC @ 0x40000000
2,803,873 UART:
2,803,889 UART: Running Caliptra FMC ...
2,804,297 UART:
2,804,435 UART: [fmc] Received command: 0x10000003
2,813,911 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,191 >>> mbox cmd response: success
2,622,953 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,629,154 UART:
2,629,170 UART: Running Caliptra FMC ...
2,629,578 UART:
2,629,716 UART: [fmc] Received command: 0x10000003
2,639,192 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,253 UART:
192,622 UART: Running Caliptra ROM ...
193,805 UART:
193,960 UART: [state] CFI Enabled
262,943 UART: [state] LifecycleState = Unprovisioned
264,903 UART: [state] DebugLocked = No
267,697 UART: [state] WD Timer not started. Device not locked for debugging
272,405 UART: [kat] SHA2-256
452,036 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,841 UART: [kat] ++
463,323 UART: [kat] sha1
475,685 UART: [kat] SHA2-256
478,403 UART: [kat] SHA2-384
484,657 UART: [kat] SHA2-512-ACC
487,001 UART: [kat] ECC-384
2,950,450 UART: [kat] HMAC-384Kdf
2,973,174 UART: [kat] LMS
3,449,690 UART: [kat] --
3,452,872 UART: [cold-reset] ++
3,455,080 UART: [fht] FHT @ 0x50003400
3,466,820 UART: [idev] ++
3,467,389 UART: [idev] CDI.KEYID = 6
3,468,411 UART: [idev] SUBJECT.KEYID = 7
3,469,573 UART: [idev] UDS.KEYID = 0
3,501,977 UART: [idev] Erasing UDS.KEYID = 0
5,986,221 UART: [idev] Sha1 KeyId Algorithm
6,009,588 UART: [idev] --
6,013,640 UART: [ldev] ++
6,014,234 UART: [ldev] CDI.KEYID = 6
6,015,127 UART: [ldev] SUBJECT.KEYID = 5
6,016,353 UART: [ldev] AUTHORITY.KEYID = 7
6,017,592 UART: [ldev] FE.KEYID = 1
6,059,004 UART: [ldev] Erasing FE.KEYID = 1
8,569,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,149 UART: [ldev] --
10,374,715 UART: [fwproc] Wait for Commands...
10,377,648 UART: [fwproc] Recv command 0x46574c44
10,379,665 UART: Invalid Img size: 131073 bytes
10,382,170 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,636 UART:
193,010 UART: Running Caliptra ROM ...
194,092 UART:
603,613 UART: [state] CFI Enabled
617,938 UART: [state] LifecycleState = Unprovisioned
619,851 UART: [state] DebugLocked = No
621,879 UART: [state] WD Timer not started. Device not locked for debugging
626,199 UART: [kat] SHA2-256
805,815 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,609 UART: [kat] ++
817,218 UART: [kat] sha1
829,072 UART: [kat] SHA2-256
831,758 UART: [kat] SHA2-384
838,057 UART: [kat] SHA2-512-ACC
840,454 UART: [kat] ECC-384
3,281,320 UART: [kat] HMAC-384Kdf
3,292,638 UART: [kat] LMS
3,769,169 UART: [kat] --
3,773,155 UART: [cold-reset] ++
3,774,435 UART: [fht] FHT @ 0x50003400
3,785,204 UART: [idev] ++
3,785,826 UART: [idev] CDI.KEYID = 6
3,786,734 UART: [idev] SUBJECT.KEYID = 7
3,788,005 UART: [idev] UDS.KEYID = 0
3,805,116 UART: [idev] Erasing UDS.KEYID = 0
6,265,102 UART: [idev] Sha1 KeyId Algorithm
6,289,828 UART: [idev] --
6,295,549 UART: [ldev] ++
6,296,122 UART: [ldev] CDI.KEYID = 6
6,297,029 UART: [ldev] SUBJECT.KEYID = 5
6,298,247 UART: [ldev] AUTHORITY.KEYID = 7
6,299,481 UART: [ldev] FE.KEYID = 1
6,311,961 UART: [ldev] Erasing FE.KEYID = 1
8,789,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,588 UART: [ldev] --
10,584,314 UART: [fwproc] Wait for Commands...
10,587,443 UART: [fwproc] Recv command 0x46574c44
10,589,434 UART: Invalid Img size: 131073 bytes
10,594,608 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,505 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,538 UART: [kat] SHA2-256
901,478 UART: [kat] SHA2-384
904,237 UART: [kat] SHA2-512-ACC
906,138 UART: [kat] ECC-384
915,551 UART: [kat] HMAC-384Kdf
920,217 UART: [kat] LMS
1,168,529 UART: [kat] --
1,169,348 UART: [cold-reset] ++
1,169,738 UART: [fht] FHT @ 0x50003400
1,172,520 UART: [idev] ++
1,172,688 UART: [idev] CDI.KEYID = 6
1,173,049 UART: [idev] SUBJECT.KEYID = 7
1,173,474 UART: [idev] UDS.KEYID = 0
1,181,495 UART: [idev] Erasing UDS.KEYID = 0
1,198,551 UART: [idev] Sha1 KeyId Algorithm
1,207,403 UART: [idev] --
1,208,532 UART: [ldev] ++
1,208,700 UART: [ldev] CDI.KEYID = 6
1,209,064 UART: [ldev] SUBJECT.KEYID = 5
1,209,491 UART: [ldev] AUTHORITY.KEYID = 7
1,209,954 UART: [ldev] FE.KEYID = 1
1,214,906 UART: [ldev] Erasing FE.KEYID = 1
1,241,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,338 UART: [ldev] --
1,280,787 UART: [fwproc] Wait for Commands...
1,281,562 UART: [fwproc] Recv command 0x46574c44
1,282,296 UART: Invalid Img size: 131073 bytes
1,283,342 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,673 UART: [kat] ++
895,825 UART: [kat] sha1
900,141 UART: [kat] SHA2-256
902,081 UART: [kat] SHA2-384
905,044 UART: [kat] SHA2-512-ACC
906,945 UART: [kat] ECC-384
916,674 UART: [kat] HMAC-384Kdf
921,390 UART: [kat] LMS
1,169,702 UART: [kat] --
1,170,807 UART: [cold-reset] ++
1,171,149 UART: [fht] FHT @ 0x50003400
1,174,015 UART: [idev] ++
1,174,183 UART: [idev] CDI.KEYID = 6
1,174,544 UART: [idev] SUBJECT.KEYID = 7
1,174,969 UART: [idev] UDS.KEYID = 0
1,183,116 UART: [idev] Erasing UDS.KEYID = 0
1,200,454 UART: [idev] Sha1 KeyId Algorithm
1,209,374 UART: [idev] --
1,210,329 UART: [ldev] ++
1,210,497 UART: [ldev] CDI.KEYID = 6
1,210,861 UART: [ldev] SUBJECT.KEYID = 5
1,211,288 UART: [ldev] AUTHORITY.KEYID = 7
1,211,751 UART: [ldev] FE.KEYID = 1
1,216,939 UART: [ldev] Erasing FE.KEYID = 1
1,243,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,581 UART: [ldev] --
1,282,910 UART: [fwproc] Wait for Commands...
1,283,615 UART: [fwproc] Recv command 0x46574c44
1,284,349 UART: Invalid Img size: 131073 bytes
1,285,263 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
890,992 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,096 UART: [kat] ++
895,248 UART: [kat] sha1
899,588 UART: [kat] SHA2-256
901,528 UART: [kat] SHA2-384
904,151 UART: [kat] SHA2-512-ACC
906,052 UART: [kat] ECC-384
915,797 UART: [kat] HMAC-384Kdf
920,435 UART: [kat] LMS
1,168,747 UART: [kat] --
1,169,548 UART: [cold-reset] ++
1,170,004 UART: [fht] FHT @ 0x50003400
1,172,616 UART: [idev] ++
1,172,784 UART: [idev] CDI.KEYID = 6
1,173,145 UART: [idev] SUBJECT.KEYID = 7
1,173,570 UART: [idev] UDS.KEYID = 0
1,181,803 UART: [idev] Erasing UDS.KEYID = 0
1,198,729 UART: [idev] Sha1 KeyId Algorithm
1,207,411 UART: [idev] --
1,208,538 UART: [ldev] ++
1,208,706 UART: [ldev] CDI.KEYID = 6
1,209,070 UART: [ldev] SUBJECT.KEYID = 5
1,209,497 UART: [ldev] AUTHORITY.KEYID = 7
1,209,960 UART: [ldev] FE.KEYID = 1
1,215,028 UART: [ldev] Erasing FE.KEYID = 1
1,241,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,630 UART: [ldev] --
1,280,993 UART: [fwproc] Wait for Commands...
1,281,676 UART: [fwproc] Recv command 0x46574c44
1,282,410 UART: Invalid Img size: 131073 bytes
1,283,436 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
891,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,414 UART: [kat] SHA2-512-ACC
906,315 UART: [kat] ECC-384
916,148 UART: [kat] HMAC-384Kdf
920,724 UART: [kat] LMS
1,169,036 UART: [kat] --
1,169,875 UART: [cold-reset] ++
1,170,407 UART: [fht] FHT @ 0x50003400
1,172,903 UART: [idev] ++
1,173,071 UART: [idev] CDI.KEYID = 6
1,173,432 UART: [idev] SUBJECT.KEYID = 7
1,173,857 UART: [idev] UDS.KEYID = 0
1,182,326 UART: [idev] Erasing UDS.KEYID = 0
1,199,648 UART: [idev] Sha1 KeyId Algorithm
1,208,556 UART: [idev] --
1,209,501 UART: [ldev] ++
1,209,669 UART: [ldev] CDI.KEYID = 6
1,210,033 UART: [ldev] SUBJECT.KEYID = 5
1,210,460 UART: [ldev] AUTHORITY.KEYID = 7
1,210,923 UART: [ldev] FE.KEYID = 1
1,216,211 UART: [ldev] Erasing FE.KEYID = 1
1,242,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,985 UART: [ldev] --
1,282,420 UART: [fwproc] Wait for Commands...
1,283,125 UART: [fwproc] Recv command 0x46574c44
1,283,859 UART: Invalid Img size: 131073 bytes
1,284,827 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
915,841 UART: [kat] HMAC-384Kdf
920,367 UART: [kat] LMS
1,168,679 UART: [kat] --
1,169,370 UART: [cold-reset] ++
1,169,734 UART: [fht] FHT @ 0x50003400
1,172,412 UART: [idev] ++
1,172,580 UART: [idev] CDI.KEYID = 6
1,172,941 UART: [idev] SUBJECT.KEYID = 7
1,173,366 UART: [idev] UDS.KEYID = 0
1,181,277 UART: [idev] Erasing UDS.KEYID = 0
1,197,883 UART: [idev] Sha1 KeyId Algorithm
1,206,675 UART: [idev] --
1,207,624 UART: [ldev] ++
1,207,792 UART: [ldev] CDI.KEYID = 6
1,208,156 UART: [ldev] SUBJECT.KEYID = 5
1,208,583 UART: [ldev] AUTHORITY.KEYID = 7
1,209,046 UART: [ldev] FE.KEYID = 1
1,214,136 UART: [ldev] Erasing FE.KEYID = 1
1,240,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,880 UART: [ldev] --
1,280,121 UART: [fwproc] Wait for Commands...
1,280,826 UART: [fwproc] Recv command 0x46574c44
1,281,560 UART: Invalid Img size: 131073 bytes
1,282,620 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [kat] SHA2-256
891,785 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,889 UART: [kat] ++
896,041 UART: [kat] sha1
900,399 UART: [kat] SHA2-256
902,339 UART: [kat] SHA2-384
905,156 UART: [kat] SHA2-512-ACC
907,057 UART: [kat] ECC-384
916,744 UART: [kat] HMAC-384Kdf
921,526 UART: [kat] LMS
1,169,838 UART: [kat] --
1,170,653 UART: [cold-reset] ++
1,171,167 UART: [fht] FHT @ 0x50003400
1,174,013 UART: [idev] ++
1,174,181 UART: [idev] CDI.KEYID = 6
1,174,542 UART: [idev] SUBJECT.KEYID = 7
1,174,967 UART: [idev] UDS.KEYID = 0
1,183,202 UART: [idev] Erasing UDS.KEYID = 0
1,200,916 UART: [idev] Sha1 KeyId Algorithm
1,210,008 UART: [idev] --
1,210,923 UART: [ldev] ++
1,211,091 UART: [ldev] CDI.KEYID = 6
1,211,455 UART: [ldev] SUBJECT.KEYID = 5
1,211,882 UART: [ldev] AUTHORITY.KEYID = 7
1,212,345 UART: [ldev] FE.KEYID = 1
1,217,433 UART: [ldev] Erasing FE.KEYID = 1
1,243,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,381 UART: [ldev] --
1,282,712 UART: [fwproc] Wait for Commands...
1,283,339 UART: [fwproc] Recv command 0x46574c44
1,284,073 UART: Invalid Img size: 131073 bytes
1,284,921 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,228,582 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,367,782 UART:
2,368,176 UART: Running Caliptra ROM ...
2,369,262 UART:
2,369,810 UART: [state] CFI Enabled
2,370,850 UART: [state] LifecycleState = Unprovisioned
2,372,446 UART: [state] DebugLocked = No
2,373,503 UART: [state] WD Timer not started. Device not locked for debugging
2,375,980 UART: [kat] SHA2-256
2,376,654 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,379,678 UART: [kat] ++
2,380,141 UART: [kat] sha1
2,380,660 UART: [kat] SHA2-256
2,381,325 UART: [kat] SHA2-384
2,381,991 UART: [kat] SHA2-512-ACC
2,382,828 UART: [kat] ECC-384
2,950,755 UART: [kat] HMAC-384Kdf
2,972,967 UART: [kat] LMS
3,449,454 UART: [kat] --
3,455,558 UART: [cold-reset] ++
3,457,444 UART: [fht] FHT @ 0x50003400
3,469,777 UART: [idev] ++
3,470,354 UART: [idev] CDI.KEYID = 6
3,471,394 UART: [idev] SUBJECT.KEYID = 7
3,472,555 UART: [idev] UDS.KEYID = 0
3,503,103 UART: [idev] Erasing UDS.KEYID = 0
5,989,253 UART: [idev] Sha1 KeyId Algorithm
6,013,456 UART: [idev] --
6,018,380 UART: [ldev] ++
6,018,956 UART: [ldev] CDI.KEYID = 6
6,019,928 UART: [ldev] SUBJECT.KEYID = 5
6,021,093 UART: [ldev] AUTHORITY.KEYID = 7
6,022,335 UART: [ldev] FE.KEYID = 1
6,060,442 UART: [ldev] Erasing FE.KEYID = 1
8,568,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,080 UART: [ldev] --
10,378,991 UART: [fwproc] Wait for Commands...
10,381,700 UART: [fwproc] Recv command 0x46574c44
10,383,750 UART: [fwproc] Recv'd Img size: 109820 bytes
14,816,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,898,405 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,940,864 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,269,685 >>> mbox cmd response: success
15,273,735 UART: [afmc] ++
15,274,327 UART: [afmc] CDI.KEYID = 6
15,275,353 UART: [afmc] SUBJECT.KEYID = 7
15,276,516 UART: [afmc] AUTHORITY.KEYID = 5
17,817,617 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,557,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,559,636 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,575,310 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,591,354 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,606,994 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,632,343 UART: [afmc] --
19,635,519 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,635,891 UART: [cold-reset] --
19,639,951 UART: [state] Locking Datavault
19,646,074 UART: [state] Locking PCR0, PCR1 and PCR31
19,647,835 UART: [state] Locking ICCM
19,649,892 UART: [exit] Launching FMC @ 0x40000000
19,658,285 UART:
19,658,533 UART: Running Caliptra FMC ...
19,659,645 UART:
19,659,814 UART: [fmc] Received command: 0x10000002
19,661,674 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,237,911 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
15,267,661 >>> mbox cmd response: success
19,544,234 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,557,504 UART:
19,557,845 UART: Running Caliptra FMC ...
19,559,034 UART:
19,559,213 UART: [fmc] Received command: 0x10000002
19,560,946 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
2,231,568 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,370,835 UART:
2,371,258 UART: Running Caliptra ROM ...
2,372,351 UART:
2,372,502 UART: [state] CFI Enabled
2,373,472 UART: [state] LifecycleState = Unprovisioned
2,375,126 UART: [state] DebugLocked = No
2,376,150 UART: [state] WD Timer not started. Device not locked for debugging
2,378,610 UART: [kat] SHA2-256
2,379,272 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,382,279 UART: [kat] ++
2,382,725 UART: [kat] sha1
2,383,231 UART: [kat] SHA2-256
2,383,886 UART: [kat] SHA2-384
2,384,557 UART: [kat] SHA2-512-ACC
2,385,365 UART: [kat] ECC-384
3,280,941 UART: [kat] HMAC-384Kdf
3,293,667 UART: [kat] LMS
3,770,198 UART: [kat] --
3,773,714 UART: [cold-reset] ++
3,775,700 UART: [fht] FHT @ 0x50003400
3,787,761 UART: [idev] ++
3,788,328 UART: [idev] CDI.KEYID = 6
3,789,339 UART: [idev] SUBJECT.KEYID = 7
3,790,497 UART: [idev] UDS.KEYID = 0
3,807,818 UART: [idev] Erasing UDS.KEYID = 0
6,268,040 UART: [idev] Sha1 KeyId Algorithm
6,291,430 UART: [idev] --
6,295,645 UART: [ldev] ++
6,296,268 UART: [ldev] CDI.KEYID = 6
6,297,209 UART: [ldev] SUBJECT.KEYID = 5
6,298,370 UART: [ldev] AUTHORITY.KEYID = 7
6,299,603 UART: [ldev] FE.KEYID = 1
6,310,898 UART: [ldev] Erasing FE.KEYID = 1
8,788,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,566 UART: [ldev] --
10,583,955 UART: [fwproc] Wait for Commands...
10,586,376 UART: [fwproc] Recv command 0x46574c44
10,588,359 UART: [fwproc] Recv'd Img size: 109820 bytes
15,016,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,098,467 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,140,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,469,290 >>> mbox cmd response: success
15,472,946 UART: [afmc] ++
15,473,532 UART: [afmc] CDI.KEYID = 6
15,474,659 UART: [afmc] SUBJECT.KEYID = 7
15,475,761 UART: [afmc] AUTHORITY.KEYID = 5
17,974,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,695,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,697,652 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,713,352 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,729,422 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,745,046 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,769,098 UART: [afmc] --
19,772,094 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,772,469 UART: [cold-reset] --
19,777,281 UART: [state] Locking Datavault
19,783,115 UART: [state] Locking PCR0, PCR1 and PCR31
19,784,897 UART: [state] Locking ICCM
19,786,291 UART: [exit] Launching FMC @ 0x40000000
19,794,684 UART:
19,794,916 UART: Running Caliptra FMC ...
19,795,944 UART:
19,796,087 UART: [fmc] Received command: 0x10000002
19,798,088 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
2,235,399 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
15,453,749 >>> mbox cmd response: success
19,687,053 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,701,900 UART:
19,702,233 UART: Running Caliptra FMC ...
19,703,322 UART:
19,703,469 UART: [fmc] Received command: 0x10000002
19,705,325 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,132 UART: [kat] ++
895,284 UART: [kat] sha1
899,526 UART: [kat] SHA2-256
901,466 UART: [kat] SHA2-384
904,123 UART: [kat] SHA2-512-ACC
906,024 UART: [kat] ECC-384
915,959 UART: [kat] HMAC-384Kdf
920,549 UART: [kat] LMS
1,168,861 UART: [kat] --
1,169,940 UART: [cold-reset] ++
1,170,300 UART: [fht] FHT @ 0x50003400
1,172,802 UART: [idev] ++
1,172,970 UART: [idev] CDI.KEYID = 6
1,173,331 UART: [idev] SUBJECT.KEYID = 7
1,173,756 UART: [idev] UDS.KEYID = 0
1,181,721 UART: [idev] Erasing UDS.KEYID = 0
1,198,857 UART: [idev] Sha1 KeyId Algorithm
1,207,937 UART: [idev] --
1,208,952 UART: [ldev] ++
1,209,120 UART: [ldev] CDI.KEYID = 6
1,209,484 UART: [ldev] SUBJECT.KEYID = 5
1,209,911 UART: [ldev] AUTHORITY.KEYID = 7
1,210,374 UART: [ldev] FE.KEYID = 1
1,215,508 UART: [ldev] Erasing FE.KEYID = 1
1,241,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,746 UART: [ldev] --
1,281,195 UART: [fwproc] Wait for Commands...
1,281,844 UART: [fwproc] Recv command 0x46574c44
1,282,577 UART: [fwproc] Recv'd Img size: 109820 bytes
3,066,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,093,996 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,112,079 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,252,400 >>> mbox cmd response: success
3,253,470 UART: [afmc] ++
3,253,638 UART: [afmc] CDI.KEYID = 6
3,254,001 UART: [afmc] SUBJECT.KEYID = 7
3,254,427 UART: [afmc] AUTHORITY.KEYID = 5
3,289,597 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,305,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,306,559 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,312,236 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,318,129 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,323,839 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,331,521 UART: [afmc] --
3,332,328 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,332,350 UART: [cold-reset] --
3,333,010 UART: [state] Locking Datavault
3,334,271 UART: [state] Locking PCR0, PCR1 and PCR31
3,334,875 UART: [state] Locking ICCM
3,335,303 UART: [exit] Launching FMC @ 0x40000000
3,340,600 UART:
3,340,616 UART: Running Caliptra FMC ...
3,341,024 UART:
3,341,162 UART: [fmc] Received command: 0x10000002
3,342,906 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,099,210 >>> mbox cmd response: success
3,154,700 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,160,759 UART:
3,160,775 UART: Running Caliptra FMC ...
3,161,183 UART:
3,161,321 UART: [fmc] Received command: 0x10000002
3,163,065 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
891,727 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,831 UART: [kat] ++
895,983 UART: [kat] sha1
900,089 UART: [kat] SHA2-256
902,029 UART: [kat] SHA2-384
904,732 UART: [kat] SHA2-512-ACC
906,633 UART: [kat] ECC-384
916,218 UART: [kat] HMAC-384Kdf
920,958 UART: [kat] LMS
1,169,270 UART: [kat] --
1,170,227 UART: [cold-reset] ++
1,170,711 UART: [fht] FHT @ 0x50003400
1,173,377 UART: [idev] ++
1,173,545 UART: [idev] CDI.KEYID = 6
1,173,906 UART: [idev] SUBJECT.KEYID = 7
1,174,331 UART: [idev] UDS.KEYID = 0
1,182,130 UART: [idev] Erasing UDS.KEYID = 0
1,199,372 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,209,161 UART: [ldev] ++
1,209,329 UART: [ldev] CDI.KEYID = 6
1,209,693 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,215,695 UART: [ldev] Erasing FE.KEYID = 1
1,242,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,175 UART: [ldev] --
1,281,490 UART: [fwproc] Wait for Commands...
1,282,233 UART: [fwproc] Recv command 0x46574c44
1,282,966 UART: [fwproc] Recv'd Img size: 109820 bytes
3,074,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,101,996 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,120,079 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,260,376 >>> mbox cmd response: success
3,261,486 UART: [afmc] ++
3,261,654 UART: [afmc] CDI.KEYID = 6
3,262,017 UART: [afmc] SUBJECT.KEYID = 7
3,262,443 UART: [afmc] AUTHORITY.KEYID = 5
3,298,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,314,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,315,737 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,321,414 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,327,307 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,333,017 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,340,593 UART: [afmc] --
3,341,404 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,341,426 UART: [cold-reset] --
3,342,310 UART: [state] Locking Datavault
3,343,627 UART: [state] Locking PCR0, PCR1 and PCR31
3,344,231 UART: [state] Locking ICCM
3,344,841 UART: [exit] Launching FMC @ 0x40000000
3,350,138 UART:
3,350,154 UART: Running Caliptra FMC ...
3,350,562 UART:
3,350,700 UART: [fmc] Received command: 0x10000002
3,352,444 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,101,465 >>> mbox cmd response: success
3,157,227 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,163,052 UART:
3,163,068 UART: Running Caliptra FMC ...
3,163,476 UART:
3,163,614 UART: [fmc] Received command: 0x10000002
3,165,358 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
891,456 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,560 UART: [kat] ++
895,712 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,659 UART: [kat] SHA2-512-ACC
906,560 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,169,542 UART: [cold-reset] ++
1,169,900 UART: [fht] FHT @ 0x50003400
1,172,682 UART: [idev] ++
1,172,850 UART: [idev] CDI.KEYID = 6
1,173,211 UART: [idev] SUBJECT.KEYID = 7
1,173,636 UART: [idev] UDS.KEYID = 0
1,182,013 UART: [idev] Erasing UDS.KEYID = 0
1,198,921 UART: [idev] Sha1 KeyId Algorithm
1,207,901 UART: [idev] --
1,209,016 UART: [ldev] ++
1,209,184 UART: [ldev] CDI.KEYID = 6
1,209,548 UART: [ldev] SUBJECT.KEYID = 5
1,209,975 UART: [ldev] AUTHORITY.KEYID = 7
1,210,438 UART: [ldev] FE.KEYID = 1
1,215,488 UART: [ldev] Erasing FE.KEYID = 1
1,242,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,088 UART: [ldev] --
1,281,519 UART: [fwproc] Wait for Commands...
1,282,272 UART: [fwproc] Recv command 0x46574c44
1,283,005 UART: [fwproc] Recv'd Img size: 109820 bytes
3,072,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,100,350 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,118,433 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,258,808 >>> mbox cmd response: success
3,259,988 UART: [afmc] ++
3,260,156 UART: [afmc] CDI.KEYID = 6
3,260,519 UART: [afmc] SUBJECT.KEYID = 7
3,260,945 UART: [afmc] AUTHORITY.KEYID = 5
3,295,889 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,312,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,313,183 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,318,860 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,324,753 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,330,463 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,338,477 UART: [afmc] --
3,339,432 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,339,454 UART: [cold-reset] --
3,340,310 UART: [state] Locking Datavault
3,341,389 UART: [state] Locking PCR0, PCR1 and PCR31
3,341,993 UART: [state] Locking ICCM
3,342,621 UART: [exit] Launching FMC @ 0x40000000
3,347,918 UART:
3,347,934 UART: Running Caliptra FMC ...
3,348,342 UART:
3,348,480 UART: [fmc] Received command: 0x10000002
3,350,224 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,118,060 >>> mbox cmd response: success
3,174,072 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,180,175 UART:
3,180,191 UART: Running Caliptra FMC ...
3,180,599 UART:
3,180,737 UART: [fmc] Received command: 0x10000002
3,182,481 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
891,701 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,805 UART: [kat] ++
895,957 UART: [kat] sha1
900,079 UART: [kat] SHA2-256
902,019 UART: [kat] SHA2-384
904,714 UART: [kat] SHA2-512-ACC
906,615 UART: [kat] ECC-384
916,296 UART: [kat] HMAC-384Kdf
920,982 UART: [kat] LMS
1,169,294 UART: [kat] --
1,170,289 UART: [cold-reset] ++
1,170,849 UART: [fht] FHT @ 0x50003400
1,173,509 UART: [idev] ++
1,173,677 UART: [idev] CDI.KEYID = 6
1,174,038 UART: [idev] SUBJECT.KEYID = 7
1,174,463 UART: [idev] UDS.KEYID = 0
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,199,832 UART: [idev] Sha1 KeyId Algorithm
1,208,712 UART: [idev] --
1,209,893 UART: [ldev] ++
1,210,061 UART: [ldev] CDI.KEYID = 6
1,210,425 UART: [ldev] SUBJECT.KEYID = 5
1,210,852 UART: [ldev] AUTHORITY.KEYID = 7
1,211,315 UART: [ldev] FE.KEYID = 1
1,216,793 UART: [ldev] Erasing FE.KEYID = 1
1,242,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,367 UART: [ldev] --
1,282,694 UART: [fwproc] Wait for Commands...
1,283,355 UART: [fwproc] Recv command 0x46574c44
1,284,088 UART: [fwproc] Recv'd Img size: 109820 bytes
3,078,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,106,093 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,124,176 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,264,477 >>> mbox cmd response: success
3,265,695 UART: [afmc] ++
3,265,863 UART: [afmc] CDI.KEYID = 6
3,266,226 UART: [afmc] SUBJECT.KEYID = 7
3,266,652 UART: [afmc] AUTHORITY.KEYID = 5
3,302,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,319,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,319,926 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,325,603 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,331,496 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,337,206 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,344,852 UART: [afmc] --
3,345,683 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,345,705 UART: [cold-reset] --
3,346,481 UART: [state] Locking Datavault
3,347,806 UART: [state] Locking PCR0, PCR1 and PCR31
3,348,410 UART: [state] Locking ICCM
3,349,030 UART: [exit] Launching FMC @ 0x40000000
3,354,327 UART:
3,354,343 UART: Running Caliptra FMC ...
3,354,751 UART:
3,354,889 UART: [fmc] Received command: 0x10000002
3,356,633 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,110,096 >>> mbox cmd response: success
3,165,722 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,171,855 UART:
3,171,871 UART: Running Caliptra FMC ...
3,172,279 UART:
3,172,417 UART: [fmc] Received command: 0x10000002
3,174,161 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
890,942 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,046 UART: [kat] ++
895,198 UART: [kat] sha1
899,428 UART: [kat] SHA2-256
901,368 UART: [kat] SHA2-384
904,129 UART: [kat] SHA2-512-ACC
906,030 UART: [kat] ECC-384
915,589 UART: [kat] HMAC-384Kdf
920,253 UART: [kat] LMS
1,168,565 UART: [kat] --
1,169,310 UART: [cold-reset] ++
1,169,778 UART: [fht] FHT @ 0x50003400
1,172,472 UART: [idev] ++
1,172,640 UART: [idev] CDI.KEYID = 6
1,173,001 UART: [idev] SUBJECT.KEYID = 7
1,173,426 UART: [idev] UDS.KEYID = 0
1,181,301 UART: [idev] Erasing UDS.KEYID = 0
1,198,475 UART: [idev] Sha1 KeyId Algorithm
1,207,415 UART: [idev] --
1,208,308 UART: [ldev] ++
1,208,476 UART: [ldev] CDI.KEYID = 6
1,208,840 UART: [ldev] SUBJECT.KEYID = 5
1,209,267 UART: [ldev] AUTHORITY.KEYID = 7
1,209,730 UART: [ldev] FE.KEYID = 1
1,214,818 UART: [ldev] Erasing FE.KEYID = 1
1,241,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,192 UART: [ldev] --
1,280,483 UART: [fwproc] Wait for Commands...
1,281,218 UART: [fwproc] Recv command 0x46574c44
1,281,951 UART: [fwproc] Recv'd Img size: 109820 bytes
3,069,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,096,064 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,114,147 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,254,326 >>> mbox cmd response: success
3,255,438 UART: [afmc] ++
3,255,606 UART: [afmc] CDI.KEYID = 6
3,255,969 UART: [afmc] SUBJECT.KEYID = 7
3,256,395 UART: [afmc] AUTHORITY.KEYID = 5
3,292,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,308,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,309,403 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,315,080 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,320,973 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,326,683 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,334,439 UART: [afmc] --
3,335,262 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,335,284 UART: [cold-reset] --
3,336,262 UART: [state] Locking Datavault
3,337,149 UART: [state] Locking PCR0, PCR1 and PCR31
3,337,753 UART: [state] Locking ICCM
3,338,223 UART: [exit] Launching FMC @ 0x40000000
3,343,520 UART:
3,343,536 UART: Running Caliptra FMC ...
3,343,944 UART:
3,344,082 UART: [fmc] Received command: 0x10000002
3,345,826 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,112,460 >>> mbox cmd response: success
3,168,160 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,174,425 UART:
3,174,441 UART: Running Caliptra FMC ...
3,174,849 UART:
3,174,987 UART: [fmc] Received command: 0x10000002
3,176,731 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
916,066 UART: [kat] HMAC-384Kdf
920,474 UART: [kat] LMS
1,168,786 UART: [kat] --
1,169,681 UART: [cold-reset] ++
1,170,145 UART: [fht] FHT @ 0x50003400
1,172,829 UART: [idev] ++
1,172,997 UART: [idev] CDI.KEYID = 6
1,173,358 UART: [idev] SUBJECT.KEYID = 7
1,173,783 UART: [idev] UDS.KEYID = 0
1,181,552 UART: [idev] Erasing UDS.KEYID = 0
1,198,834 UART: [idev] Sha1 KeyId Algorithm
1,207,882 UART: [idev] --
1,208,799 UART: [ldev] ++
1,208,967 UART: [ldev] CDI.KEYID = 6
1,209,331 UART: [ldev] SUBJECT.KEYID = 5
1,209,758 UART: [ldev] AUTHORITY.KEYID = 7
1,210,221 UART: [ldev] FE.KEYID = 1
1,215,621 UART: [ldev] Erasing FE.KEYID = 1
1,241,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,289 UART: [ldev] --
1,280,714 UART: [fwproc] Wait for Commands...
1,281,483 UART: [fwproc] Recv command 0x46574c44
1,282,216 UART: [fwproc] Recv'd Img size: 109820 bytes
3,067,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,095,964 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,114,047 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,254,234 >>> mbox cmd response: success
3,255,412 UART: [afmc] ++
3,255,580 UART: [afmc] CDI.KEYID = 6
3,255,943 UART: [afmc] SUBJECT.KEYID = 7
3,256,369 UART: [afmc] AUTHORITY.KEYID = 5
3,292,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,309,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,309,895 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,315,572 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,321,465 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,327,175 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,334,915 UART: [afmc] --
3,335,838 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,335,860 UART: [cold-reset] --
3,336,642 UART: [state] Locking Datavault
3,337,627 UART: [state] Locking PCR0, PCR1 and PCR31
3,338,231 UART: [state] Locking ICCM
3,338,751 UART: [exit] Launching FMC @ 0x40000000
3,344,048 UART:
3,344,064 UART: Running Caliptra FMC ...
3,344,472 UART:
3,344,610 UART: [fmc] Received command: 0x10000002
3,346,354 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,110,586 >>> mbox cmd response: success
3,166,712 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,172,385 UART:
3,172,401 UART: Running Caliptra FMC ...
3,172,809 UART:
3,172,947 UART: [fmc] Received command: 0x10000002
3,174,691 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
2,081,421 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,227,089 UART:
2,227,494 UART: Running Caliptra ROM ...
2,228,682 UART:
2,228,864 UART: [state] CFI Enabled
2,229,829 UART: [state] LifecycleState = Unprovisioned
2,231,507 UART: [state] DebugLocked = No
2,232,630 UART: [state] WD Timer not started. Device not locked for debugging
2,235,119 UART: [kat] SHA2-256
2,235,800 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,238,822 UART: [kat] ++
2,239,283 UART: [kat] sha1
2,239,846 UART: [kat] SHA2-256
2,240,551 UART: [kat] SHA2-384
2,241,220 UART: [kat] SHA2-512-ACC
2,242,055 UART: [kat] ECC-384
2,926,053 UART: [kat] HMAC-384Kdf
2,952,523 UART: [kat] LMS
3,429,041 UART: [kat] --
3,436,054 UART: [cold-reset] ++
3,437,775 UART: [fht] FHT @ 0x50003400
3,448,758 UART: [idev] ++
3,449,336 UART: [idev] CDI.KEYID = 6
3,450,360 UART: [idev] SUBJECT.KEYID = 7
3,451,520 UART: [idev] UDS.KEYID = 0
3,481,600 UART: [idev] Erasing UDS.KEYID = 0
5,964,732 UART: [idev] Sha1 KeyId Algorithm
5,987,895 UART: [idev] --
5,992,570 UART: [ldev] ++
5,993,151 UART: [ldev] CDI.KEYID = 6
5,994,047 UART: [ldev] SUBJECT.KEYID = 5
5,995,282 UART: [ldev] AUTHORITY.KEYID = 7
5,996,447 UART: [ldev] FE.KEYID = 1
6,037,018 UART: [ldev] Erasing FE.KEYID = 1
8,543,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,726 UART: [ldev] --
10,353,891 UART: [fwproc] Wait for Commands...
10,356,428 UART: [fwproc] Recv command 0x46574c44
10,358,478 UART: [fwproc] Recv'd Img size: 114888 bytes
14,849,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,932,485 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,992,693 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,320,214 >>> mbox cmd response: success
15,324,076 UART: [afmc] ++
15,324,675 UART: [afmc] CDI.KEYID = 6
15,325,721 UART: [afmc] SUBJECT.KEYID = 7
15,326,833 UART: [afmc] AUTHORITY.KEYID = 5
17,850,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,577,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,579,697 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,595,472 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,611,440 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,627,027 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,652,321 UART: [afmc] --
19,656,830 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,657,222 UART: [cold-reset] --
19,661,129 UART: [state] Locking Datavault
19,667,516 UART: [state] Locking PCR0, PCR1 and PCR31
19,669,225 UART: [state] Locking ICCM
19,671,599 UART: [exit] Launching FMC @ 0x40000000
19,680,006 UART:
19,680,282 UART: Running Caliptra FMC ...
19,681,395 UART:
19,681,561 UART: [fmc] Received command: 0x10000000
19,683,978 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
2,078,185 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,330,295 >>> mbox cmd response: success
19,605,764 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,621,439 UART:
19,621,777 UART: Running Caliptra FMC ...
19,622,992 UART:
19,623,166 UART: [fmc] Received command: 0x10000000
19,625,382 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
2,076,686 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,221,986 UART:
2,222,427 UART: Running Caliptra ROM ...
2,223,613 UART:
2,223,791 UART: [state] CFI Enabled
2,224,747 UART: [state] LifecycleState = Unprovisioned
2,226,404 UART: [state] DebugLocked = No
2,227,430 UART: [state] WD Timer not started. Device not locked for debugging
2,229,896 UART: [kat] SHA2-256
2,230,563 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,233,562 UART: [kat] ++
2,234,012 UART: [kat] sha1
2,234,524 UART: [kat] SHA2-256
2,235,260 UART: [kat] SHA2-384
2,235,924 UART: [kat] SHA2-512-ACC
2,236,800 UART: [kat] ECC-384
3,282,221 UART: [kat] HMAC-384Kdf
3,294,254 UART: [kat] LMS
3,770,789 UART: [kat] --
3,776,289 UART: [cold-reset] ++
3,778,918 UART: [fht] FHT @ 0x50003400
3,789,294 UART: [idev] ++
3,789,907 UART: [idev] CDI.KEYID = 6
3,790,844 UART: [idev] SUBJECT.KEYID = 7
3,792,104 UART: [idev] UDS.KEYID = 0
3,809,296 UART: [idev] Erasing UDS.KEYID = 0
6,269,826 UART: [idev] Sha1 KeyId Algorithm
6,291,883 UART: [idev] --
6,296,503 UART: [ldev] ++
6,297,079 UART: [ldev] CDI.KEYID = 6
6,297,991 UART: [ldev] SUBJECT.KEYID = 5
6,299,202 UART: [ldev] AUTHORITY.KEYID = 7
6,300,481 UART: [ldev] FE.KEYID = 1
6,310,960 UART: [ldev] Erasing FE.KEYID = 1
8,790,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,733 UART: [ldev] --
10,582,749 UART: [fwproc] Wait for Commands...
10,585,380 UART: [fwproc] Recv command 0x46574c44
10,587,366 UART: [fwproc] Recv'd Img size: 114888 bytes
15,086,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,172,477 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,232,696 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,560,966 >>> mbox cmd response: success
15,565,402 UART: [afmc] ++
15,565,993 UART: [afmc] CDI.KEYID = 6
15,566,876 UART: [afmc] SUBJECT.KEYID = 7
15,568,157 UART: [afmc] AUTHORITY.KEYID = 5
18,071,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,794,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,797,175 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,813,001 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,828,933 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,844,571 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,870,074 UART: [afmc] --
19,874,006 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,874,379 UART: [cold-reset] --
19,878,322 UART: [state] Locking Datavault
19,882,644 UART: [state] Locking PCR0, PCR1 and PCR31
19,884,423 UART: [state] Locking ICCM
19,886,896 UART: [exit] Launching FMC @ 0x40000000
19,895,288 UART:
19,895,524 UART: Running Caliptra FMC ...
19,896,641 UART:
19,896,804 UART: [fmc] Received command: 0x10000000
19,899,237 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
2,075,674 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,532,503 >>> mbox cmd response: success
19,768,691 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,783,446 UART:
19,783,789 UART: Running Caliptra FMC ...
19,784,899 UART:
19,785,045 UART: [fmc] Received command: 0x10000000
19,787,462 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,019 UART: [state] WD Timer not started. Device not locked for debugging
87,134 UART: [kat] SHA2-256
890,684 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,788 UART: [kat] ++
894,940 UART: [kat] sha1
899,158 UART: [kat] SHA2-256
901,098 UART: [kat] SHA2-384
903,817 UART: [kat] SHA2-512-ACC
905,718 UART: [kat] ECC-384
915,643 UART: [kat] HMAC-384Kdf
920,221 UART: [kat] LMS
1,168,533 UART: [kat] --
1,169,518 UART: [cold-reset] ++
1,170,042 UART: [fht] FHT @ 0x50003400
1,172,604 UART: [idev] ++
1,172,772 UART: [idev] CDI.KEYID = 6
1,173,133 UART: [idev] SUBJECT.KEYID = 7
1,173,558 UART: [idev] UDS.KEYID = 0
1,181,599 UART: [idev] Erasing UDS.KEYID = 0
1,198,529 UART: [idev] Sha1 KeyId Algorithm
1,207,371 UART: [idev] --
1,208,352 UART: [ldev] ++
1,208,520 UART: [ldev] CDI.KEYID = 6
1,208,884 UART: [ldev] SUBJECT.KEYID = 5
1,209,311 UART: [ldev] AUTHORITY.KEYID = 7
1,209,774 UART: [ldev] FE.KEYID = 1
1,215,216 UART: [ldev] Erasing FE.KEYID = 1
1,240,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,066 UART: [ldev] --
1,280,281 UART: [fwproc] Wait for Commands...
1,280,862 UART: [fwproc] Recv command 0x46574c44
1,281,595 UART: [fwproc] Recv'd Img size: 114888 bytes
3,130,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,158,579 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,184,264 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,324,517 >>> mbox cmd response: success
3,325,647 UART: [afmc] ++
3,325,815 UART: [afmc] CDI.KEYID = 6
3,326,178 UART: [afmc] SUBJECT.KEYID = 7
3,326,604 UART: [afmc] AUTHORITY.KEYID = 5
3,362,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,701 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,385,395 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,391,295 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,397,004 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,404,798 UART: [afmc] --
3,405,827 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,405,849 UART: [cold-reset] --
3,406,583 UART: [state] Locking Datavault
3,407,828 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,432 UART: [state] Locking ICCM
3,409,030 UART: [exit] Launching FMC @ 0x40000000
3,414,327 UART:
3,414,343 UART: Running Caliptra FMC ...
3,414,751 UART:
3,414,981 UART: [fmc] Received command: 0x10000000
3,417,150 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,170,099 >>> mbox cmd response: success
3,226,214 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,232,245 UART:
3,232,261 UART: Running Caliptra FMC ...
3,232,669 UART:
3,232,899 UART: [fmc] Received command: 0x10000000
3,235,068 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
891,571 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,675 UART: [kat] ++
895,827 UART: [kat] sha1
900,123 UART: [kat] SHA2-256
902,063 UART: [kat] SHA2-384
904,604 UART: [kat] SHA2-512-ACC
906,505 UART: [kat] ECC-384
916,136 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,170,153 UART: [cold-reset] ++
1,170,595 UART: [fht] FHT @ 0x50003400
1,173,455 UART: [idev] ++
1,173,623 UART: [idev] CDI.KEYID = 6
1,173,984 UART: [idev] SUBJECT.KEYID = 7
1,174,409 UART: [idev] UDS.KEYID = 0
1,182,550 UART: [idev] Erasing UDS.KEYID = 0
1,199,784 UART: [idev] Sha1 KeyId Algorithm
1,208,610 UART: [idev] --
1,209,687 UART: [ldev] ++
1,209,855 UART: [ldev] CDI.KEYID = 6
1,210,219 UART: [ldev] SUBJECT.KEYID = 5
1,210,646 UART: [ldev] AUTHORITY.KEYID = 7
1,211,109 UART: [ldev] FE.KEYID = 1
1,216,407 UART: [ldev] Erasing FE.KEYID = 1
1,242,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,819 UART: [ldev] --
1,282,130 UART: [fwproc] Wait for Commands...
1,282,767 UART: [fwproc] Recv command 0x46574c44
1,283,500 UART: [fwproc] Recv'd Img size: 114888 bytes
3,125,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,154,071 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,179,756 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,319,941 >>> mbox cmd response: success
3,320,973 UART: [afmc] ++
3,321,141 UART: [afmc] CDI.KEYID = 6
3,321,504 UART: [afmc] SUBJECT.KEYID = 7
3,321,930 UART: [afmc] AUTHORITY.KEYID = 5
3,357,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,080 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,829 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,380,523 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,386,423 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,392,132 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,399,780 UART: [afmc] --
3,400,627 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,400,649 UART: [cold-reset] --
3,401,253 UART: [state] Locking Datavault
3,402,496 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,100 UART: [state] Locking ICCM
3,403,568 UART: [exit] Launching FMC @ 0x40000000
3,408,865 UART:
3,408,881 UART: Running Caliptra FMC ...
3,409,289 UART:
3,409,519 UART: [fmc] Received command: 0x10000000
3,411,688 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,172,891 >>> mbox cmd response: success
3,229,092 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,235,283 UART:
3,235,299 UART: Running Caliptra FMC ...
3,235,707 UART:
3,235,937 UART: [fmc] Received command: 0x10000000
3,238,106 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,154 UART: [kat] ++
895,306 UART: [kat] sha1
899,442 UART: [kat] SHA2-256
901,382 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
915,759 UART: [kat] HMAC-384Kdf
920,411 UART: [kat] LMS
1,168,723 UART: [kat] --
1,169,698 UART: [cold-reset] ++
1,170,162 UART: [fht] FHT @ 0x50003400
1,172,744 UART: [idev] ++
1,172,912 UART: [idev] CDI.KEYID = 6
1,173,273 UART: [idev] SUBJECT.KEYID = 7
1,173,698 UART: [idev] UDS.KEYID = 0
1,181,733 UART: [idev] Erasing UDS.KEYID = 0
1,198,561 UART: [idev] Sha1 KeyId Algorithm
1,207,551 UART: [idev] --
1,208,456 UART: [ldev] ++
1,208,624 UART: [ldev] CDI.KEYID = 6
1,208,988 UART: [ldev] SUBJECT.KEYID = 5
1,209,415 UART: [ldev] AUTHORITY.KEYID = 7
1,209,878 UART: [ldev] FE.KEYID = 1
1,214,964 UART: [ldev] Erasing FE.KEYID = 1
1,240,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,568 UART: [ldev] --
1,279,841 UART: [fwproc] Wait for Commands...
1,280,516 UART: [fwproc] Recv command 0x46574c44
1,281,249 UART: [fwproc] Recv'd Img size: 114888 bytes
3,133,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,161,132 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,186,817 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,326,994 >>> mbox cmd response: success
3,328,108 UART: [afmc] ++
3,328,276 UART: [afmc] CDI.KEYID = 6
3,328,639 UART: [afmc] SUBJECT.KEYID = 7
3,329,065 UART: [afmc] AUTHORITY.KEYID = 5
3,364,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,994 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,387,688 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,393,588 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,399,297 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,407,069 UART: [afmc] --
3,407,896 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,407,918 UART: [cold-reset] --
3,408,904 UART: [state] Locking Datavault
3,409,877 UART: [state] Locking PCR0, PCR1 and PCR31
3,410,481 UART: [state] Locking ICCM
3,411,019 UART: [exit] Launching FMC @ 0x40000000
3,416,316 UART:
3,416,332 UART: Running Caliptra FMC ...
3,416,740 UART:
3,416,970 UART: [fmc] Received command: 0x10000000
3,419,139 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,168,290 >>> mbox cmd response: success
3,223,407 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,229,622 UART:
3,229,638 UART: Running Caliptra FMC ...
3,230,046 UART:
3,230,276 UART: [fmc] Received command: 0x10000000
3,232,445 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,897 UART: [state] LifecycleState = Unprovisioned
85,552 UART: [state] DebugLocked = No
86,084 UART: [state] WD Timer not started. Device not locked for debugging
87,413 UART: [kat] SHA2-256
890,963 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,067 UART: [kat] ++
895,219 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,268 UART: [kat] SHA2-512-ACC
906,169 UART: [kat] ECC-384
915,680 UART: [kat] HMAC-384Kdf
920,222 UART: [kat] LMS
1,168,534 UART: [kat] --
1,169,443 UART: [cold-reset] ++
1,169,989 UART: [fht] FHT @ 0x50003400
1,172,501 UART: [idev] ++
1,172,669 UART: [idev] CDI.KEYID = 6
1,173,030 UART: [idev] SUBJECT.KEYID = 7
1,173,455 UART: [idev] UDS.KEYID = 0
1,181,444 UART: [idev] Erasing UDS.KEYID = 0
1,198,414 UART: [idev] Sha1 KeyId Algorithm
1,207,274 UART: [idev] --
1,208,365 UART: [ldev] ++
1,208,533 UART: [ldev] CDI.KEYID = 6
1,208,897 UART: [ldev] SUBJECT.KEYID = 5
1,209,324 UART: [ldev] AUTHORITY.KEYID = 7
1,209,787 UART: [ldev] FE.KEYID = 1
1,215,173 UART: [ldev] Erasing FE.KEYID = 1
1,241,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,123 UART: [ldev] --
1,280,480 UART: [fwproc] Wait for Commands...
1,281,243 UART: [fwproc] Recv command 0x46574c44
1,281,976 UART: [fwproc] Recv'd Img size: 114888 bytes
3,122,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,150,712 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,176,397 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,316,638 >>> mbox cmd response: success
3,317,748 UART: [afmc] ++
3,317,916 UART: [afmc] CDI.KEYID = 6
3,318,279 UART: [afmc] SUBJECT.KEYID = 7
3,318,705 UART: [afmc] AUTHORITY.KEYID = 5
3,354,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,666 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,377,360 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,383,260 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,388,969 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,396,539 UART: [afmc] --
3,397,342 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,397,364 UART: [cold-reset] --
3,398,436 UART: [state] Locking Datavault
3,399,561 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,165 UART: [state] Locking ICCM
3,400,697 UART: [exit] Launching FMC @ 0x40000000
3,405,994 UART:
3,406,010 UART: Running Caliptra FMC ...
3,406,418 UART:
3,406,648 UART: [fmc] Received command: 0x10000000
3,408,817 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,169,473 >>> mbox cmd response: success
3,225,262 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,231,321 UART:
3,231,337 UART: Running Caliptra FMC ...
3,231,745 UART:
3,231,975 UART: [fmc] Received command: 0x10000000
3,234,144 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,826 UART: [kat] SHA2-256
891,376 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,551 UART: [kat] LMS
1,168,863 UART: [kat] --
1,169,710 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,172,894 UART: [idev] ++
1,173,062 UART: [idev] CDI.KEYID = 6
1,173,423 UART: [idev] SUBJECT.KEYID = 7
1,173,848 UART: [idev] UDS.KEYID = 0
1,181,613 UART: [idev] Erasing UDS.KEYID = 0
1,198,591 UART: [idev] Sha1 KeyId Algorithm
1,207,449 UART: [idev] --
1,208,330 UART: [ldev] ++
1,208,498 UART: [ldev] CDI.KEYID = 6
1,208,862 UART: [ldev] SUBJECT.KEYID = 5
1,209,289 UART: [ldev] AUTHORITY.KEYID = 7
1,209,752 UART: [ldev] FE.KEYID = 1
1,215,090 UART: [ldev] Erasing FE.KEYID = 1
1,241,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,408 UART: [ldev] --
1,280,639 UART: [fwproc] Wait for Commands...
1,281,214 UART: [fwproc] Recv command 0x46574c44
1,281,947 UART: [fwproc] Recv'd Img size: 114888 bytes
3,129,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,157,536 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,183,221 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,323,536 >>> mbox cmd response: success
3,324,586 UART: [afmc] ++
3,324,754 UART: [afmc] CDI.KEYID = 6
3,325,117 UART: [afmc] SUBJECT.KEYID = 7
3,325,543 UART: [afmc] AUTHORITY.KEYID = 5
3,360,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,537 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,286 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,383,980 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,389,880 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,395,589 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,403,363 UART: [afmc] --
3,404,284 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,404,306 UART: [cold-reset] --
3,405,228 UART: [state] Locking Datavault
3,406,227 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,831 UART: [state] Locking ICCM
3,407,403 UART: [exit] Launching FMC @ 0x40000000
3,412,700 UART:
3,412,716 UART: Running Caliptra FMC ...
3,413,124 UART:
3,413,354 UART: [fmc] Received command: 0x10000000
3,415,523 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,183,059 >>> mbox cmd response: success
3,238,694 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,244,903 UART:
3,244,919 UART: Running Caliptra FMC ...
3,245,327 UART:
3,245,557 UART: [fmc] Received command: 0x10000000
3,247,726 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
891,513 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
900,045 UART: [kat] SHA2-256
901,985 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
916,664 UART: [kat] HMAC-384Kdf
921,218 UART: [kat] LMS
1,169,530 UART: [kat] --
1,170,291 UART: [cold-reset] ++
1,170,629 UART: [fht] FHT @ 0x50003400
1,173,255 UART: [idev] ++
1,173,423 UART: [idev] CDI.KEYID = 6
1,173,784 UART: [idev] SUBJECT.KEYID = 7
1,174,209 UART: [idev] UDS.KEYID = 0
1,182,350 UART: [idev] Erasing UDS.KEYID = 0
1,199,498 UART: [idev] Sha1 KeyId Algorithm
1,208,582 UART: [idev] --
1,209,577 UART: [ldev] ++
1,209,745 UART: [ldev] CDI.KEYID = 6
1,210,109 UART: [ldev] SUBJECT.KEYID = 5
1,210,536 UART: [ldev] AUTHORITY.KEYID = 7
1,210,999 UART: [ldev] FE.KEYID = 1
1,216,133 UART: [ldev] Erasing FE.KEYID = 1
1,242,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,735 UART: [ldev] --
1,282,148 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,570 UART: [fwproc] Recv'd Img size: 114888 bytes
3,135,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,163,615 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,189,300 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,329,603 >>> mbox cmd response: success
3,330,719 UART: [afmc] ++
3,330,887 UART: [afmc] CDI.KEYID = 6
3,331,250 UART: [afmc] SUBJECT.KEYID = 7
3,331,676 UART: [afmc] AUTHORITY.KEYID = 5
3,367,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,383,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,627 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,390,321 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,396,221 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,401,930 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,409,812 UART: [afmc] --
3,410,837 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,410,859 UART: [cold-reset] --
3,411,643 UART: [state] Locking Datavault
3,412,654 UART: [state] Locking PCR0, PCR1 and PCR31
3,413,258 UART: [state] Locking ICCM
3,413,912 UART: [exit] Launching FMC @ 0x40000000
3,419,209 UART:
3,419,225 UART: Running Caliptra FMC ...
3,419,633 UART:
3,419,863 UART: [fmc] Received command: 0x10000000
3,422,032 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,164,327 >>> mbox cmd response: success
3,219,894 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,226,323 UART:
3,226,339 UART: Running Caliptra FMC ...
3,226,747 UART:
3,226,977 UART: [fmc] Received command: 0x10000000
3,229,146 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
2,066,143 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,211,685 UART:
2,212,116 UART: Running Caliptra ROM ...
2,213,223 UART:
2,213,388 UART: [state] CFI Enabled
2,214,358 UART: [state] LifecycleState = Unprovisioned
2,216,033 UART: [state] DebugLocked = No
2,217,101 UART: [state] WD Timer not started. Device not locked for debugging
2,219,583 UART: [kat] SHA2-256
2,220,258 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,223,271 UART: [kat] ++
2,223,727 UART: [kat] sha1
2,224,247 UART: [kat] SHA2-256
2,224,913 UART: [kat] SHA2-384
2,225,580 UART: [kat] SHA2-512-ACC
2,226,433 UART: [kat] ECC-384
2,929,138 UART: [kat] HMAC-384Kdf
2,950,989 UART: [kat] LMS
3,427,463 UART: [kat] --
3,431,078 UART: [cold-reset] ++
3,432,266 UART: [fht] FHT @ 0x50003400
3,444,439 UART: [idev] ++
3,445,013 UART: [idev] CDI.KEYID = 6
3,445,956 UART: [idev] SUBJECT.KEYID = 7
3,447,180 UART: [idev] UDS.KEYID = 0
3,482,123 UART: [idev] Erasing UDS.KEYID = 0
5,966,942 UART: [idev] Sha1 KeyId Algorithm
5,990,014 UART: [idev] --
5,993,691 UART: [ldev] ++
5,994,264 UART: [ldev] CDI.KEYID = 6
5,995,208 UART: [ldev] SUBJECT.KEYID = 5
5,996,424 UART: [ldev] AUTHORITY.KEYID = 7
5,997,662 UART: [ldev] FE.KEYID = 1
6,036,657 UART: [ldev] Erasing FE.KEYID = 1
8,547,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,297,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,313,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,351,119 UART: [ldev] --
10,355,990 UART: [fwproc] Wait for Commands...
10,358,558 UART: [fwproc] Recv command 0x46574c44
10,360,570 UART: [fwproc] Recv'd Img size: 114888 bytes
13,800,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,874,538 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,934,723 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,263,588 >>> mbox cmd response: success
14,267,957 UART: [afmc] ++
14,268,552 UART: [afmc] CDI.KEYID = 6
14,269,445 UART: [afmc] SUBJECT.KEYID = 7
14,270,662 UART: [afmc] AUTHORITY.KEYID = 5
16,811,088 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,480 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,572,253 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,588,241 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,603,945 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,628,050 UART: [afmc] --
18,631,997 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,632,383 UART: [cold-reset] --
18,635,693 UART: [state] Locking Datavault
18,639,972 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,674 UART: [state] Locking ICCM
18,644,345 UART: [exit] Launching FMC @ 0x40000000
18,652,754 UART:
18,652,992 UART: Running Caliptra FMC ...
18,654,019 UART:
18,654,175 UART: [fmc] Received command: 0x10000000
18,656,701 >>> mbox cmd response data (224 bytes)
18,658,199 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,658,531 UART: [fmc] Received command: 0x10000006
18,679,784 >>> mbox cmd response data (1536 bytes)
18,690,611 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,835,111 UART: [fmc] Received command: 0x46574C44
18,836,667 UART:
18,836,844 UART: Running Caliptra ROM ...
18,837,962 UART:
18,838,145 UART: [state] CFI Enabled
18,909,993 UART: [state] LifecycleState = Unprovisioned
18,911,894 UART: [state] DebugLocked = No
18,914,353 UART: [state] WD Timer not started. Device not locked for debugging
18,918,183 UART: [kat] SHA2-256
19,097,855 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,108,669 UART: [kat] ++
19,109,140 UART: [kat] sha1
19,118,522 UART: [kat] SHA2-256
19,121,213 UART: [kat] SHA2-384
19,127,776 UART: [kat] SHA2-512-ACC
19,130,142 UART: [kat] ECC-384
21,591,329 UART: [kat] HMAC-384Kdf
21,613,014 UART: [kat] LMS
22,089,474 UART: [kat] --
22,092,545 UART: [update-reset] ++
25,544,002 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,548,317 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,933,099 >>> mbox cmd response: success
25,934,935 UART: [update-reset] Copying MAN_2 To MAN_1
25,972,080 UART: [update-reset Success] --
25,973,448 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,974,600 UART: [state] Locking Datavault
25,978,190 UART: [state] Locking PCR0, PCR1 and PCR31
25,979,949 UART: [state] Locking ICCM
25,981,891 UART: [exit] Launching FMC @ 0x40000000
25,990,262 UART:
25,990,509 UART: Running Caliptra FMC ...
25,991,620 UART:
25,991,787 UART: [fmc] Received command: 0x10000000
25,994,227 >>> mbox cmd response data (224 bytes)
25,995,678 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,996,093 UART: [fmc] Received command: 0x10000006
26,017,341 >>> mbox cmd response data (1536 bytes)
26,025,684 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,026,141 UART: [fmc] Received command: 0x10000007
26,027,693 >>> mbox cmd response data (4 bytes)
26,028,028 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,028,351 UART: [fmc] Received command: 0x10000006
26,049,572 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
2,069,925 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,169,445 >>> mbox cmd response: success
18,433,974 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,447,996 UART:
18,448,337 UART: Running Caliptra FMC ...
18,449,559 UART:
18,449,751 UART: [fmc] Received command: 0x10000000
18,451,963 >>> mbox cmd response data (224 bytes)
18,453,397 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,453,821 UART: [fmc] Received command: 0x10000006
18,475,057 >>> mbox cmd response data (1536 bytes)
18,485,687 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,630,226 UART: [fmc] Received command: 0x46574C44
25,739,394 >>> mbox cmd response: success
25,761,290 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,775,445 UART:
25,775,704 UART: Running Caliptra FMC ...
25,777,300 UART:
25,777,478 UART: [fmc] Received command: 0x10000000
25,779,343 >>> mbox cmd response data (224 bytes)
25,780,699 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,781,026 UART: [fmc] Received command: 0x10000006
25,802,284 >>> mbox cmd response data (1536 bytes)
25,810,585 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,811,052 UART: [fmc] Received command: 0x10000007
25,812,566 >>> mbox cmd response data (4 bytes)
25,812,878 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,813,296 UART: [fmc] Received command: 0x10000006
25,834,495 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
2,075,942 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,221,268 UART:
2,221,677 UART: Running Caliptra ROM ...
2,222,864 UART:
2,223,030 UART: [state] CFI Enabled
2,223,988 UART: [state] LifecycleState = Unprovisioned
2,225,645 UART: [state] DebugLocked = No
2,226,750 UART: [state] WD Timer not started. Device not locked for debugging
2,229,242 UART: [kat] SHA2-256
2,229,914 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,232,919 UART: [kat] ++
2,233,375 UART: [kat] sha1
2,233,882 UART: [kat] SHA2-256
2,234,619 UART: [kat] SHA2-384
2,235,284 UART: [kat] SHA2-512-ACC
2,236,128 UART: [kat] ECC-384
3,278,910 UART: [kat] HMAC-384Kdf
3,290,875 UART: [kat] LMS
3,767,403 UART: [kat] --
3,772,341 UART: [cold-reset] ++
3,773,625 UART: [fht] FHT @ 0x50003400
3,785,246 UART: [idev] ++
3,785,806 UART: [idev] CDI.KEYID = 6
3,786,765 UART: [idev] SUBJECT.KEYID = 7
3,787,997 UART: [idev] UDS.KEYID = 0
3,802,783 UART: [idev] Erasing UDS.KEYID = 0
6,257,152 UART: [idev] Sha1 KeyId Algorithm
6,281,828 UART: [idev] --
6,287,703 UART: [ldev] ++
6,288,327 UART: [ldev] CDI.KEYID = 6
6,289,432 UART: [ldev] SUBJECT.KEYID = 5
6,290,562 UART: [ldev] AUTHORITY.KEYID = 7
6,291,742 UART: [ldev] FE.KEYID = 1
6,303,249 UART: [ldev] Erasing FE.KEYID = 1
8,778,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,498,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,514,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,530,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,546,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,567,541 UART: [ldev] --
10,572,230 UART: [fwproc] Wait for Commands...
10,574,162 UART: [fwproc] Recv command 0x46574c44
10,576,146 UART: [fwproc] Recv'd Img size: 114888 bytes
14,016,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,097,146 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,157,366 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,484,967 >>> mbox cmd response: success
14,489,019 UART: [afmc] ++
14,489,608 UART: [afmc] CDI.KEYID = 6
14,490,625 UART: [afmc] SUBJECT.KEYID = 7
14,491,781 UART: [afmc] AUTHORITY.KEYID = 5
16,999,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,926 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,738,685 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,754,700 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,770,344 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,793,852 UART: [afmc] --
18,797,725 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,798,086 UART: [cold-reset] --
18,800,841 UART: [state] Locking Datavault
18,806,185 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,928 UART: [state] Locking ICCM
18,810,042 UART: [exit] Launching FMC @ 0x40000000
18,818,375 UART:
18,818,605 UART: Running Caliptra FMC ...
18,819,623 UART:
18,819,765 UART: [fmc] Received command: 0x10000000
18,822,358 >>> mbox cmd response data (224 bytes)
18,823,744 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,824,164 UART: [fmc] Received command: 0x10000006
18,845,428 >>> mbox cmd response data (1536 bytes)
18,856,563 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
19,000,905 UART: [fmc] Received command: 0x46574C44
19,002,439 UART:
19,002,608 UART: Running Caliptra ROM ...
19,003,624 UART:
19,004,037 UART: [state] CFI Enabled
19,018,318 UART: [state] LifecycleState = Unprovisioned
19,020,244 UART: [state] DebugLocked = No
19,022,247 UART: [state] WD Timer not started. Device not locked for debugging
19,026,359 UART: [kat] SHA2-256
19,206,031 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,216,845 UART: [kat] ++
19,217,295 UART: [kat] sha1
19,227,849 UART: [kat] SHA2-256
19,230,537 UART: [kat] SHA2-384
19,237,819 UART: [kat] SHA2-512-ACC
19,240,185 UART: [kat] ECC-384
21,681,680 UART: [kat] HMAC-384Kdf
21,693,486 UART: [kat] LMS
22,169,960 UART: [kat] --
22,173,911 UART: [update-reset] ++
25,627,053 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,631,134 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
26,015,979 >>> mbox cmd response: success
26,016,675 UART: [update-reset] Copying MAN_2 To MAN_1
26,053,759 UART: [update-reset Success] --
26,055,114 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
26,058,092 UART: [state] Locking Datavault
26,061,571 UART: [state] Locking PCR0, PCR1 and PCR31
26,063,275 UART: [state] Locking ICCM
26,065,908 UART: [exit] Launching FMC @ 0x40000000
26,074,296 UART:
26,074,549 UART: Running Caliptra FMC ...
26,075,655 UART:
26,075,816 UART: [fmc] Received command: 0x10000000
26,078,247 >>> mbox cmd response data (224 bytes)
26,079,662 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,080,075 UART: [fmc] Received command: 0x10000006
26,101,321 >>> mbox cmd response data (1536 bytes)
26,109,636 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,110,081 UART: [fmc] Received command: 0x10000007
26,111,624 >>> mbox cmd response data (4 bytes)
26,111,931 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,112,241 UART: [fmc] Received command: 0x10000006
26,133,456 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,074,896 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,405,942 >>> mbox cmd response: success
18,644,842 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,660,215 UART:
18,660,600 UART: Running Caliptra FMC ...
18,661,732 UART:
18,661,877 UART: [fmc] Received command: 0x10000000
18,664,192 >>> mbox cmd response data (224 bytes)
18,665,617 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,666,036 UART: [fmc] Received command: 0x10000006
18,687,290 >>> mbox cmd response data (1536 bytes)
18,697,622 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,842,899 UART: [fmc] Received command: 0x46574C44
25,870,562 >>> mbox cmd response: success
25,893,158 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,905,365 UART:
25,905,620 UART: Running Caliptra FMC ...
25,906,730 UART:
25,906,891 UART: [fmc] Received command: 0x10000000
25,909,321 >>> mbox cmd response data (224 bytes)
25,910,744 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,911,153 UART: [fmc] Received command: 0x10000006
25,932,414 >>> mbox cmd response data (1536 bytes)
25,940,699 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,941,150 UART: [fmc] Received command: 0x10000007
25,942,734 >>> mbox cmd response data (4 bytes)
25,943,047 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,943,359 UART: [fmc] Received command: 0x10000006
25,964,600 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,526 UART: [state] LifecycleState = Unprovisioned
86,181 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
891,520 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
900,018 UART: [kat] SHA2-256
901,958 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,181 UART: [kat] HMAC-384Kdf
920,561 UART: [kat] LMS
1,168,873 UART: [kat] --
1,169,598 UART: [cold-reset] ++
1,170,130 UART: [fht] FHT @ 0x50003400
1,172,740 UART: [idev] ++
1,172,908 UART: [idev] CDI.KEYID = 6
1,173,269 UART: [idev] SUBJECT.KEYID = 7
1,173,694 UART: [idev] UDS.KEYID = 0
1,181,337 UART: [idev] Erasing UDS.KEYID = 0
1,197,613 UART: [idev] Sha1 KeyId Algorithm
1,206,347 UART: [idev] --
1,207,570 UART: [ldev] ++
1,207,738 UART: [ldev] CDI.KEYID = 6
1,208,102 UART: [ldev] SUBJECT.KEYID = 5
1,208,529 UART: [ldev] AUTHORITY.KEYID = 7
1,208,992 UART: [ldev] FE.KEYID = 1
1,214,126 UART: [ldev] Erasing FE.KEYID = 1
1,240,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,684 UART: [ldev] --
1,279,899 UART: [fwproc] Wait for Commands...
1,280,664 UART: [fwproc] Recv command 0x46574c44
1,281,397 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,087 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,772 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,971 >>> mbox cmd response: success
2,779,205 UART: [afmc] ++
2,779,373 UART: [afmc] CDI.KEYID = 6
2,779,736 UART: [afmc] SUBJECT.KEYID = 7
2,780,162 UART: [afmc] AUTHORITY.KEYID = 5
2,815,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,778 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,838,498 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,844,390 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,850,084 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,858,045 UART: [afmc] --
2,859,070 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,092 UART: [cold-reset] --
2,859,978 UART: [state] Locking Datavault
2,861,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,827 UART: [state] Locking ICCM
2,862,293 UART: [exit] Launching FMC @ 0x40000000
2,867,590 UART:
2,867,606 UART: Running Caliptra FMC ...
2,868,014 UART:
2,868,244 UART: [fmc] Received command: 0x10000000
2,870,413 >>> mbox cmd response data (224 bytes)
2,870,414 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,870,443 UART: [fmc] Received command: 0x10000006
2,888,460 >>> mbox cmd response data (1536 bytes)
2,888,461 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,888,489 UART: [fmc] Received command: 0x46574C44
2,889,315 UART:
2,889,331 UART: Running Caliptra ROM ...
2,889,739 UART:
2,889,794 UART: [state] CFI Enabled
2,892,668 UART: [state] LifecycleState = Unprovisioned
2,893,323 UART: [state] DebugLocked = No
2,893,869 UART: [state] WD Timer not started. Device not locked for debugging
2,895,163 UART: [kat] SHA2-256
3,698,713 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,702,817 UART: [kat] ++
3,702,969 UART: [kat] sha1
3,707,167 UART: [kat] SHA2-256
3,709,107 UART: [kat] SHA2-384
3,711,944 UART: [kat] SHA2-512-ACC
3,713,844 UART: [kat] ECC-384
3,723,603 UART: [kat] HMAC-384Kdf
3,728,255 UART: [kat] LMS
3,976,567 UART: [kat] --
3,977,397 UART: [update-reset] ++
5,295,308 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,296,387 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,448,857 >>> mbox cmd response: success
5,448,964 UART: [update-reset] Copying MAN_2 To MAN_1
5,456,978 UART: [update-reset Success] --
5,457,387 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,458,077 UART: [state] Locking Datavault
5,458,765 UART: [state] Locking PCR0, PCR1 and PCR31
5,459,369 UART: [state] Locking ICCM
5,459,791 UART: [exit] Launching FMC @ 0x40000000
5,465,088 UART:
5,465,104 UART: Running Caliptra FMC ...
5,465,512 UART:
5,465,734 UART: [fmc] Received command: 0x10000000
5,467,903 >>> mbox cmd response data (224 bytes)
5,467,904 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,467,933 UART: [fmc] Received command: 0x10000006
5,485,950 >>> mbox cmd response data (1536 bytes)
5,485,951 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,485,979 UART: [fmc] Received command: 0x10000007
5,486,771 >>> mbox cmd response data (4 bytes)
5,486,772 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,486,800 UART: [fmc] Received command: 0x10000006
5,504,817 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,542 >>> mbox cmd response: success
2,686,112 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,692,269 UART:
2,692,285 UART: Running Caliptra FMC ...
2,692,693 UART:
2,692,923 UART: [fmc] Received command: 0x10000000
2,695,092 >>> mbox cmd response data (224 bytes)
2,695,093 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,695,122 UART: [fmc] Received command: 0x10000006
2,713,139 >>> mbox cmd response data (1536 bytes)
2,713,140 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,713,168 UART: [fmc] Received command: 0x46574C44
5,157,444 >>> mbox cmd response: success
5,165,058 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,170,576 UART:
5,170,592 UART: Running Caliptra FMC ...
5,171,000 UART:
5,171,222 UART: [fmc] Received command: 0x10000000
5,173,391 >>> mbox cmd response data (224 bytes)
5,173,392 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,173,421 UART: [fmc] Received command: 0x10000006
5,191,438 >>> mbox cmd response data (1536 bytes)
5,191,439 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,191,467 UART: [fmc] Received command: 0x10000007
5,192,259 >>> mbox cmd response data (4 bytes)
5,192,260 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,192,288 UART: [fmc] Received command: 0x10000006
5,210,305 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,599 UART: [kat] SHA2-256
891,149 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,862 UART: [kat] LMS
1,169,174 UART: [kat] --
1,170,163 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,345 UART: [idev] ++
1,173,513 UART: [idev] CDI.KEYID = 6
1,173,874 UART: [idev] SUBJECT.KEYID = 7
1,174,299 UART: [idev] UDS.KEYID = 0
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,052 UART: [idev] Sha1 KeyId Algorithm
1,207,814 UART: [idev] --
1,209,083 UART: [ldev] ++
1,209,251 UART: [ldev] CDI.KEYID = 6
1,209,615 UART: [ldev] SUBJECT.KEYID = 5
1,210,042 UART: [ldev] AUTHORITY.KEYID = 7
1,210,505 UART: [ldev] FE.KEYID = 1
1,215,835 UART: [ldev] Erasing FE.KEYID = 1
1,242,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,037 UART: [ldev] --
1,281,490 UART: [fwproc] Wait for Commands...
1,282,071 UART: [fwproc] Recv command 0x46574c44
1,282,804 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,814 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,499 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,750 >>> mbox cmd response: success
2,780,000 UART: [afmc] ++
2,780,168 UART: [afmc] CDI.KEYID = 6
2,780,531 UART: [afmc] SUBJECT.KEYID = 7
2,780,957 UART: [afmc] AUTHORITY.KEYID = 5
2,816,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,915 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,839,635 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,845,527 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,851,221 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,859,046 UART: [afmc] --
2,859,967 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,989 UART: [cold-reset] --
2,860,937 UART: [state] Locking Datavault
2,861,946 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,550 UART: [state] Locking ICCM
2,863,200 UART: [exit] Launching FMC @ 0x40000000
2,868,497 UART:
2,868,513 UART: Running Caliptra FMC ...
2,868,921 UART:
2,869,151 UART: [fmc] Received command: 0x10000000
2,871,320 >>> mbox cmd response data (224 bytes)
2,871,321 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,871,350 UART: [fmc] Received command: 0x10000006
2,889,367 >>> mbox cmd response data (1536 bytes)
2,889,368 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,889,396 UART: [fmc] Received command: 0x46574C44
2,890,222 UART:
2,890,238 UART: Running Caliptra ROM ...
2,890,646 UART:
2,890,788 UART: [state] CFI Enabled
2,893,582 UART: [state] LifecycleState = Unprovisioned
2,894,237 UART: [state] DebugLocked = No
2,894,725 UART: [state] WD Timer not started. Device not locked for debugging
2,895,901 UART: [kat] SHA2-256
3,699,451 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,703,555 UART: [kat] ++
3,703,707 UART: [kat] sha1
3,707,865 UART: [kat] SHA2-256
3,709,805 UART: [kat] SHA2-384
3,712,518 UART: [kat] SHA2-512-ACC
3,714,418 UART: [kat] ECC-384
3,724,017 UART: [kat] HMAC-384Kdf
3,728,575 UART: [kat] LMS
3,976,887 UART: [kat] --
3,977,563 UART: [update-reset] ++
5,295,134 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,296,299 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,448,769 >>> mbox cmd response: success
5,449,072 UART: [update-reset] Copying MAN_2 To MAN_1
5,457,086 UART: [update-reset Success] --
5,457,495 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,458,245 UART: [state] Locking Datavault
5,459,101 UART: [state] Locking PCR0, PCR1 and PCR31
5,459,705 UART: [state] Locking ICCM
5,460,361 UART: [exit] Launching FMC @ 0x40000000
5,465,658 UART:
5,465,674 UART: Running Caliptra FMC ...
5,466,082 UART:
5,466,304 UART: [fmc] Received command: 0x10000000
5,468,473 >>> mbox cmd response data (224 bytes)
5,468,474 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,468,503 UART: [fmc] Received command: 0x10000006
5,486,520 >>> mbox cmd response data (1536 bytes)
5,486,521 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,486,549 UART: [fmc] Received command: 0x10000007
5,487,341 >>> mbox cmd response data (4 bytes)
5,487,342 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,487,370 UART: [fmc] Received command: 0x10000006
5,505,387 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,207 >>> mbox cmd response: success
2,689,061 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,695,320 UART:
2,695,336 UART: Running Caliptra FMC ...
2,695,744 UART:
2,695,974 UART: [fmc] Received command: 0x10000000
2,698,143 >>> mbox cmd response data (224 bytes)
2,698,144 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,698,173 UART: [fmc] Received command: 0x10000006
2,716,190 >>> mbox cmd response data (1536 bytes)
2,716,191 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,716,219 UART: [fmc] Received command: 0x46574C44
5,160,550 >>> mbox cmd response: success
5,168,198 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,173,870 UART:
5,173,886 UART: Running Caliptra FMC ...
5,174,294 UART:
5,174,516 UART: [fmc] Received command: 0x10000000
5,176,685 >>> mbox cmd response data (224 bytes)
5,176,686 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,176,715 UART: [fmc] Received command: 0x10000006
5,194,732 >>> mbox cmd response data (1536 bytes)
5,194,733 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,194,761 UART: [fmc] Received command: 0x10000007
5,195,553 >>> mbox cmd response data (4 bytes)
5,195,554 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,195,582 UART: [fmc] Received command: 0x10000006
5,213,599 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,160 UART: [kat] ++
895,312 UART: [kat] sha1
899,456 UART: [kat] SHA2-256
901,396 UART: [kat] SHA2-384
904,205 UART: [kat] SHA2-512-ACC
906,106 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,455 UART: [kat] LMS
1,168,767 UART: [kat] --
1,169,334 UART: [cold-reset] ++
1,169,876 UART: [fht] FHT @ 0x50003400
1,172,452 UART: [idev] ++
1,172,620 UART: [idev] CDI.KEYID = 6
1,172,981 UART: [idev] SUBJECT.KEYID = 7
1,173,406 UART: [idev] UDS.KEYID = 0
1,181,187 UART: [idev] Erasing UDS.KEYID = 0
1,197,799 UART: [idev] Sha1 KeyId Algorithm
1,206,659 UART: [idev] --
1,207,886 UART: [ldev] ++
1,208,054 UART: [ldev] CDI.KEYID = 6
1,208,418 UART: [ldev] SUBJECT.KEYID = 5
1,208,845 UART: [ldev] AUTHORITY.KEYID = 7
1,209,308 UART: [ldev] FE.KEYID = 1
1,214,418 UART: [ldev] Erasing FE.KEYID = 1
1,240,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,158 UART: [ldev] --
1,279,435 UART: [fwproc] Wait for Commands...
1,280,060 UART: [fwproc] Recv command 0x46574c44
1,280,793 UART: [fwproc] Recv'd Img size: 114888 bytes
2,583,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,610,635 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,320 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,475 >>> mbox cmd response: success
2,777,675 UART: [afmc] ++
2,777,843 UART: [afmc] CDI.KEYID = 6
2,778,206 UART: [afmc] SUBJECT.KEYID = 7
2,778,632 UART: [afmc] AUTHORITY.KEYID = 5
2,814,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,902 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,837,622 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,843,514 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,849,208 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,856,987 UART: [afmc] --
2,857,924 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,857,946 UART: [cold-reset] --
2,858,724 UART: [state] Locking Datavault
2,859,875 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,479 UART: [state] Locking ICCM
2,861,077 UART: [exit] Launching FMC @ 0x40000000
2,866,374 UART:
2,866,390 UART: Running Caliptra FMC ...
2,866,798 UART:
2,867,028 UART: [fmc] Received command: 0x10000000
2,869,197 >>> mbox cmd response data (224 bytes)
2,869,198 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,869,227 UART: [fmc] Received command: 0x10000006
2,887,244 >>> mbox cmd response data (1536 bytes)
2,887,245 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,887,273 UART: [fmc] Received command: 0x46574C44
2,888,099 UART:
2,888,115 UART: Running Caliptra ROM ...
2,888,523 UART:
2,888,578 UART: [state] CFI Enabled
2,890,944 UART: [state] LifecycleState = Unprovisioned
2,891,599 UART: [state] DebugLocked = No
2,892,117 UART: [state] WD Timer not started. Device not locked for debugging
2,893,263 UART: [kat] SHA2-256
3,696,813 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,700,917 UART: [kat] ++
3,701,069 UART: [kat] sha1
3,705,275 UART: [kat] SHA2-256
3,707,215 UART: [kat] SHA2-384
3,709,994 UART: [kat] SHA2-512-ACC
3,711,894 UART: [kat] ECC-384
3,721,885 UART: [kat] HMAC-384Kdf
3,726,293 UART: [kat] LMS
3,974,605 UART: [kat] --
3,975,547 UART: [update-reset] ++
5,292,916 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,294,011 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,446,481 >>> mbox cmd response: success
5,446,836 UART: [update-reset] Copying MAN_2 To MAN_1
5,454,850 UART: [update-reset Success] --
5,455,259 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,455,767 UART: [state] Locking Datavault
5,456,495 UART: [state] Locking PCR0, PCR1 and PCR31
5,457,099 UART: [state] Locking ICCM
5,457,671 UART: [exit] Launching FMC @ 0x40000000
5,462,968 UART:
5,462,984 UART: Running Caliptra FMC ...
5,463,392 UART:
5,463,614 UART: [fmc] Received command: 0x10000000
5,465,783 >>> mbox cmd response data (224 bytes)
5,465,784 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,465,813 UART: [fmc] Received command: 0x10000006
5,483,830 >>> mbox cmd response data (1536 bytes)
5,483,831 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,483,859 UART: [fmc] Received command: 0x10000007
5,484,651 >>> mbox cmd response data (4 bytes)
5,484,652 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,484,680 UART: [fmc] Received command: 0x10000006
5,502,697 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,532 >>> mbox cmd response: success
2,686,030 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,692,309 UART:
2,692,325 UART: Running Caliptra FMC ...
2,692,733 UART:
2,692,963 UART: [fmc] Received command: 0x10000000
2,695,132 >>> mbox cmd response data (224 bytes)
2,695,133 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,695,162 UART: [fmc] Received command: 0x10000006
2,713,179 >>> mbox cmd response data (1536 bytes)
2,713,180 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,713,208 UART: [fmc] Received command: 0x46574C44
5,156,850 >>> mbox cmd response: success
5,164,550 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,170,128 UART:
5,170,144 UART: Running Caliptra FMC ...
5,170,552 UART:
5,170,774 UART: [fmc] Received command: 0x10000000
5,172,943 >>> mbox cmd response data (224 bytes)
5,172,944 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,172,973 UART: [fmc] Received command: 0x10000006
5,190,990 >>> mbox cmd response data (1536 bytes)
5,190,991 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,191,019 UART: [fmc] Received command: 0x10000007
5,191,811 >>> mbox cmd response data (4 bytes)
5,191,812 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,191,840 UART: [fmc] Received command: 0x10000006
5,209,857 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,234 UART: [kat] SHA2-512-ACC
906,135 UART: [kat] ECC-384
915,824 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,619 UART: [cold-reset] ++
1,170,047 UART: [fht] FHT @ 0x50003400
1,172,719 UART: [idev] ++
1,172,887 UART: [idev] CDI.KEYID = 6
1,173,248 UART: [idev] SUBJECT.KEYID = 7
1,173,673 UART: [idev] UDS.KEYID = 0
1,182,016 UART: [idev] Erasing UDS.KEYID = 0
1,198,938 UART: [idev] Sha1 KeyId Algorithm
1,207,748 UART: [idev] --
1,208,759 UART: [ldev] ++
1,208,927 UART: [ldev] CDI.KEYID = 6
1,209,291 UART: [ldev] SUBJECT.KEYID = 5
1,209,718 UART: [ldev] AUTHORITY.KEYID = 7
1,210,181 UART: [ldev] FE.KEYID = 1
1,215,283 UART: [ldev] Erasing FE.KEYID = 1
1,242,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,093 UART: [ldev] --
1,281,436 UART: [fwproc] Wait for Commands...
1,282,245 UART: [fwproc] Recv command 0x46574c44
1,282,978 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,614,672 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,357 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,642 >>> mbox cmd response: success
2,781,888 UART: [afmc] ++
2,782,056 UART: [afmc] CDI.KEYID = 6
2,782,419 UART: [afmc] SUBJECT.KEYID = 7
2,782,845 UART: [afmc] AUTHORITY.KEYID = 5
2,818,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,439 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,841,159 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,847,051 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,852,745 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,860,564 UART: [afmc] --
2,861,409 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,861,431 UART: [cold-reset] --
2,862,407 UART: [state] Locking Datavault
2,863,602 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,206 UART: [state] Locking ICCM
2,864,852 UART: [exit] Launching FMC @ 0x40000000
2,870,149 UART:
2,870,165 UART: Running Caliptra FMC ...
2,870,573 UART:
2,870,803 UART: [fmc] Received command: 0x10000000
2,872,972 >>> mbox cmd response data (224 bytes)
2,872,973 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,873,002 UART: [fmc] Received command: 0x10000006
2,891,019 >>> mbox cmd response data (1536 bytes)
2,891,020 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,891,048 UART: [fmc] Received command: 0x46574C44
2,891,874 UART:
2,891,890 UART: Running Caliptra ROM ...
2,892,298 UART:
2,892,440 UART: [state] CFI Enabled
2,895,048 UART: [state] LifecycleState = Unprovisioned
2,895,703 UART: [state] DebugLocked = No
2,896,199 UART: [state] WD Timer not started. Device not locked for debugging
2,897,311 UART: [kat] SHA2-256
3,700,861 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,704,965 UART: [kat] ++
3,705,117 UART: [kat] sha1
3,709,167 UART: [kat] SHA2-256
3,711,107 UART: [kat] SHA2-384
3,713,808 UART: [kat] SHA2-512-ACC
3,715,708 UART: [kat] ECC-384
3,725,239 UART: [kat] HMAC-384Kdf
3,730,019 UART: [kat] LMS
3,978,331 UART: [kat] --
3,979,167 UART: [update-reset] ++
5,296,668 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,297,705 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,450,175 >>> mbox cmd response: success
5,450,504 UART: [update-reset] Copying MAN_2 To MAN_1
5,458,518 UART: [update-reset Success] --
5,458,927 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,459,733 UART: [state] Locking Datavault
5,460,643 UART: [state] Locking PCR0, PCR1 and PCR31
5,461,247 UART: [state] Locking ICCM
5,461,877 UART: [exit] Launching FMC @ 0x40000000
5,467,174 UART:
5,467,190 UART: Running Caliptra FMC ...
5,467,598 UART:
5,467,820 UART: [fmc] Received command: 0x10000000
5,469,989 >>> mbox cmd response data (224 bytes)
5,469,990 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,470,019 UART: [fmc] Received command: 0x10000006
5,488,036 >>> mbox cmd response data (1536 bytes)
5,488,037 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,488,065 UART: [fmc] Received command: 0x10000007
5,488,857 >>> mbox cmd response data (4 bytes)
5,488,858 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,488,886 UART: [fmc] Received command: 0x10000006
5,506,903 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,381 >>> mbox cmd response: success
2,688,545 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,694,828 UART:
2,694,844 UART: Running Caliptra FMC ...
2,695,252 UART:
2,695,482 UART: [fmc] Received command: 0x10000000
2,697,651 >>> mbox cmd response data (224 bytes)
2,697,652 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,697,681 UART: [fmc] Received command: 0x10000006
2,715,698 >>> mbox cmd response data (1536 bytes)
2,715,699 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,715,727 UART: [fmc] Received command: 0x46574C44
5,160,778 >>> mbox cmd response: success
5,168,340 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,173,910 UART:
5,173,926 UART: Running Caliptra FMC ...
5,174,334 UART:
5,174,556 UART: [fmc] Received command: 0x10000000
5,176,725 >>> mbox cmd response data (224 bytes)
5,176,726 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,176,755 UART: [fmc] Received command: 0x10000006
5,194,772 >>> mbox cmd response data (1536 bytes)
5,194,773 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,194,801 UART: [fmc] Received command: 0x10000007
5,195,593 >>> mbox cmd response data (4 bytes)
5,195,594 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,195,622 UART: [fmc] Received command: 0x10000006
5,213,639 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,568 UART: [kat] SHA2-256
901,508 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
916,499 UART: [kat] HMAC-384Kdf
921,089 UART: [kat] LMS
1,169,401 UART: [kat] --
1,170,422 UART: [cold-reset] ++
1,170,770 UART: [fht] FHT @ 0x50003400
1,173,440 UART: [idev] ++
1,173,608 UART: [idev] CDI.KEYID = 6
1,173,969 UART: [idev] SUBJECT.KEYID = 7
1,174,394 UART: [idev] UDS.KEYID = 0
1,182,463 UART: [idev] Erasing UDS.KEYID = 0
1,199,305 UART: [idev] Sha1 KeyId Algorithm
1,208,217 UART: [idev] --
1,209,216 UART: [ldev] ++
1,209,384 UART: [ldev] CDI.KEYID = 6
1,209,748 UART: [ldev] SUBJECT.KEYID = 5
1,210,175 UART: [ldev] AUTHORITY.KEYID = 7
1,210,638 UART: [ldev] FE.KEYID = 1
1,215,890 UART: [ldev] Erasing FE.KEYID = 1
1,241,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,430 UART: [ldev] --
1,280,691 UART: [fwproc] Wait for Commands...
1,281,404 UART: [fwproc] Recv command 0x46574c44
1,282,137 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,610,887 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,572 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,789 >>> mbox cmd response: success
2,777,911 UART: [afmc] ++
2,778,079 UART: [afmc] CDI.KEYID = 6
2,778,442 UART: [afmc] SUBJECT.KEYID = 7
2,778,868 UART: [afmc] AUTHORITY.KEYID = 5
2,813,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,878 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,836,598 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,842,490 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,848,184 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,855,995 UART: [afmc] --
2,856,840 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,856,862 UART: [cold-reset] --
2,857,732 UART: [state] Locking Datavault
2,859,029 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,633 UART: [state] Locking ICCM
2,860,269 UART: [exit] Launching FMC @ 0x40000000
2,865,566 UART:
2,865,582 UART: Running Caliptra FMC ...
2,865,990 UART:
2,866,220 UART: [fmc] Received command: 0x10000000
2,868,389 >>> mbox cmd response data (224 bytes)
2,868,390 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,868,419 UART: [fmc] Received command: 0x10000006
2,886,436 >>> mbox cmd response data (1536 bytes)
2,886,437 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,886,465 UART: [fmc] Received command: 0x46574C44
2,887,291 UART:
2,887,307 UART: Running Caliptra ROM ...
2,887,715 UART:
2,887,770 UART: [state] CFI Enabled
2,890,164 UART: [state] LifecycleState = Unprovisioned
2,890,819 UART: [state] DebugLocked = No
2,891,529 UART: [state] WD Timer not started. Device not locked for debugging
2,892,795 UART: [kat] SHA2-256
3,696,345 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,700,449 UART: [kat] ++
3,700,601 UART: [kat] sha1
3,704,747 UART: [kat] SHA2-256
3,706,687 UART: [kat] SHA2-384
3,709,424 UART: [kat] SHA2-512-ACC
3,711,324 UART: [kat] ECC-384
3,720,885 UART: [kat] HMAC-384Kdf
3,725,467 UART: [kat] LMS
3,973,779 UART: [kat] --
3,974,511 UART: [update-reset] ++
5,292,442 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,293,629 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,446,099 >>> mbox cmd response: success
5,446,426 UART: [update-reset] Copying MAN_2 To MAN_1
5,454,440 UART: [update-reset Success] --
5,454,849 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,455,435 UART: [state] Locking Datavault
5,456,167 UART: [state] Locking PCR0, PCR1 and PCR31
5,456,771 UART: [state] Locking ICCM
5,457,303 UART: [exit] Launching FMC @ 0x40000000
5,462,600 UART:
5,462,616 UART: Running Caliptra FMC ...
5,463,024 UART:
5,463,246 UART: [fmc] Received command: 0x10000000
5,465,415 >>> mbox cmd response data (224 bytes)
5,465,416 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,465,445 UART: [fmc] Received command: 0x10000006
5,483,462 >>> mbox cmd response data (1536 bytes)
5,483,463 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,483,491 UART: [fmc] Received command: 0x10000007
5,484,283 >>> mbox cmd response data (4 bytes)
5,484,284 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,484,312 UART: [fmc] Received command: 0x10000006
5,502,329 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,594 >>> mbox cmd response: success
2,686,124 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,692,473 UART:
2,692,489 UART: Running Caliptra FMC ...
2,692,897 UART:
2,693,127 UART: [fmc] Received command: 0x10000000
2,695,296 >>> mbox cmd response data (224 bytes)
2,695,297 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,695,326 UART: [fmc] Received command: 0x10000006
2,713,343 >>> mbox cmd response data (1536 bytes)
2,713,344 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,713,372 UART: [fmc] Received command: 0x46574C44
5,156,360 >>> mbox cmd response: success
5,164,046 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,169,914 UART:
5,169,930 UART: Running Caliptra FMC ...
5,170,338 UART:
5,170,560 UART: [fmc] Received command: 0x10000000
5,172,729 >>> mbox cmd response data (224 bytes)
5,172,730 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,172,759 UART: [fmc] Received command: 0x10000006
5,190,776 >>> mbox cmd response data (1536 bytes)
5,190,777 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,190,805 UART: [fmc] Received command: 0x10000007
5,191,597 >>> mbox cmd response data (4 bytes)
5,191,598 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,191,626 UART: [fmc] Received command: 0x10000006
5,209,643 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,849 UART: [kat] ++
896,001 UART: [kat] sha1
900,153 UART: [kat] SHA2-256
902,093 UART: [kat] SHA2-384
904,950 UART: [kat] SHA2-512-ACC
906,851 UART: [kat] ECC-384
916,360 UART: [kat] HMAC-384Kdf
920,836 UART: [kat] LMS
1,169,148 UART: [kat] --
1,170,355 UART: [cold-reset] ++
1,170,697 UART: [fht] FHT @ 0x50003400
1,173,325 UART: [idev] ++
1,173,493 UART: [idev] CDI.KEYID = 6
1,173,854 UART: [idev] SUBJECT.KEYID = 7
1,174,279 UART: [idev] UDS.KEYID = 0
1,182,480 UART: [idev] Erasing UDS.KEYID = 0
1,199,554 UART: [idev] Sha1 KeyId Algorithm
1,208,542 UART: [idev] --
1,209,455 UART: [ldev] ++
1,209,623 UART: [ldev] CDI.KEYID = 6
1,209,987 UART: [ldev] SUBJECT.KEYID = 5
1,210,414 UART: [ldev] AUTHORITY.KEYID = 7
1,210,877 UART: [ldev] FE.KEYID = 1
1,216,357 UART: [ldev] Erasing FE.KEYID = 1
1,243,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,319 UART: [ldev] --
1,282,600 UART: [fwproc] Wait for Commands...
1,283,399 UART: [fwproc] Recv command 0x46574c44
1,284,132 UART: [fwproc] Recv'd Img size: 114888 bytes
2,588,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,616,152 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,837 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,782,132 >>> mbox cmd response: success
2,783,270 UART: [afmc] ++
2,783,438 UART: [afmc] CDI.KEYID = 6
2,783,801 UART: [afmc] SUBJECT.KEYID = 7
2,784,227 UART: [afmc] AUTHORITY.KEYID = 5
2,819,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,691 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,842,411 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,848,303 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,853,997 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,861,736 UART: [afmc] --
2,862,737 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,862,759 UART: [cold-reset] --
2,863,389 UART: [state] Locking Datavault
2,864,496 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,100 UART: [state] Locking ICCM
2,865,618 UART: [exit] Launching FMC @ 0x40000000
2,870,915 UART:
2,870,931 UART: Running Caliptra FMC ...
2,871,339 UART:
2,871,569 UART: [fmc] Received command: 0x10000000
2,873,738 >>> mbox cmd response data (224 bytes)
2,873,739 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,873,768 UART: [fmc] Received command: 0x10000006
2,891,785 >>> mbox cmd response data (1536 bytes)
2,891,786 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,891,814 UART: [fmc] Received command: 0x46574C44
2,892,640 UART:
2,892,656 UART: Running Caliptra ROM ...
2,893,064 UART:
2,893,206 UART: [state] CFI Enabled
2,895,938 UART: [state] LifecycleState = Unprovisioned
2,896,593 UART: [state] DebugLocked = No
2,897,235 UART: [state] WD Timer not started. Device not locked for debugging
2,898,485 UART: [kat] SHA2-256
3,702,035 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,706,139 UART: [kat] ++
3,706,291 UART: [kat] sha1
3,710,621 UART: [kat] SHA2-256
3,712,561 UART: [kat] SHA2-384
3,715,136 UART: [kat] SHA2-512-ACC
3,717,036 UART: [kat] ECC-384
3,726,647 UART: [kat] HMAC-384Kdf
3,731,083 UART: [kat] LMS
3,979,395 UART: [kat] --
3,980,189 UART: [update-reset] ++
5,297,002 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,298,149 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,450,619 >>> mbox cmd response: success
5,450,932 UART: [update-reset] Copying MAN_2 To MAN_1
5,458,946 UART: [update-reset Success] --
5,459,355 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,459,935 UART: [state] Locking Datavault
5,460,679 UART: [state] Locking PCR0, PCR1 and PCR31
5,461,283 UART: [state] Locking ICCM
5,461,793 UART: [exit] Launching FMC @ 0x40000000
5,467,090 UART:
5,467,106 UART: Running Caliptra FMC ...
5,467,514 UART:
5,467,736 UART: [fmc] Received command: 0x10000000
5,469,905 >>> mbox cmd response data (224 bytes)
5,469,906 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,469,935 UART: [fmc] Received command: 0x10000006
5,487,952 >>> mbox cmd response data (1536 bytes)
5,487,953 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,487,981 UART: [fmc] Received command: 0x10000007
5,488,773 >>> mbox cmd response data (4 bytes)
5,488,774 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,488,802 UART: [fmc] Received command: 0x10000006
5,506,819 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,409 >>> mbox cmd response: success
2,686,609 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,692,462 UART:
2,692,478 UART: Running Caliptra FMC ...
2,692,886 UART:
2,693,116 UART: [fmc] Received command: 0x10000000
2,695,285 >>> mbox cmd response data (224 bytes)
2,695,286 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,695,315 UART: [fmc] Received command: 0x10000006
2,713,332 >>> mbox cmd response data (1536 bytes)
2,713,333 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,713,361 UART: [fmc] Received command: 0x46574C44
5,157,190 >>> mbox cmd response: success
5,164,686 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,170,426 UART:
5,170,442 UART: Running Caliptra FMC ...
5,170,850 UART:
5,171,072 UART: [fmc] Received command: 0x10000000
5,173,241 >>> mbox cmd response data (224 bytes)
5,173,242 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,173,271 UART: [fmc] Received command: 0x10000006
5,191,288 >>> mbox cmd response data (1536 bytes)
5,191,289 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,191,317 UART: [fmc] Received command: 0x10000007
5,192,109 >>> mbox cmd response data (4 bytes)
5,192,110 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,192,138 UART: [fmc] Received command: 0x10000006
5,210,155 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,063,259 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,208,919 UART:
2,209,355 UART: Running Caliptra ROM ...
2,210,455 UART:
2,210,619 UART: [state] CFI Enabled
2,211,538 UART: [state] LifecycleState = Unprovisioned
2,213,213 UART: [state] DebugLocked = No
2,214,248 UART: [state] WD Timer not started. Device not locked for debugging
2,216,729 UART: [kat] SHA2-256
2,217,402 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,220,417 UART: [kat] ++
2,220,875 UART: [kat] sha1
2,221,394 UART: [kat] SHA2-256
2,222,059 UART: [kat] SHA2-384
2,222,803 UART: [kat] SHA2-512-ACC
2,223,634 UART: [kat] ECC-384
2,950,646 UART: [kat] HMAC-384Kdf
2,973,136 UART: [kat] LMS
3,449,622 UART: [kat] --
3,456,310 UART: [cold-reset] ++
3,457,814 UART: [fht] FHT @ 0x50003400
3,468,908 UART: [idev] ++
3,469,478 UART: [idev] CDI.KEYID = 6
3,470,497 UART: [idev] SUBJECT.KEYID = 7
3,471,721 UART: [idev] UDS.KEYID = 0
3,503,383 UART: [idev] Erasing UDS.KEYID = 0
5,989,184 UART: [idev] Sha1 KeyId Algorithm
6,013,769 UART: [idev] --
6,018,583 UART: [ldev] ++
6,019,161 UART: [ldev] CDI.KEYID = 6
6,020,052 UART: [ldev] SUBJECT.KEYID = 5
6,021,304 UART: [ldev] AUTHORITY.KEYID = 7
6,022,547 UART: [ldev] FE.KEYID = 1
6,057,714 UART: [ldev] Erasing FE.KEYID = 1
8,567,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,868 UART: [ldev] --
10,373,361 UART: [fwproc] Wait for Commands...
10,376,168 UART: [fwproc] Recv command 0x46574c44
10,378,160 UART: [fwproc] Recv'd Img size: 114888 bytes
13,815,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,898,349 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,958,522 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,286,653 >>> mbox cmd response: success
14,289,932 UART: [afmc] ++
14,290,533 UART: [afmc] CDI.KEYID = 6
14,291,422 UART: [afmc] SUBJECT.KEYID = 7
14,292,643 UART: [afmc] AUTHORITY.KEYID = 5
16,829,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,565 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,571,382 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,587,343 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,602,860 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,628,571 UART: [afmc] --
18,632,287 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,632,659 UART: [cold-reset] --
18,638,176 UART: [state] Locking Datavault
18,645,962 UART: [state] Locking PCR0, PCR1 and PCR31
18,647,723 UART: [state] Locking ICCM
18,650,114 UART: [exit] Launching FMC @ 0x40000000
18,658,466 UART:
18,658,713 UART: Running Caliptra FMC ...
18,659,819 UART:
18,659,983 UART: [fmc] Received command: 0x10000000
18,662,424 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
2,063,933 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,138,173 >>> mbox cmd response: success
18,413,442 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,427,093 UART:
18,427,455 UART: Running Caliptra FMC ...
18,428,581 UART:
18,428,742 UART: [fmc] Received command: 0x10000000
18,431,083 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
2,069,263 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,214,638 UART:
2,215,048 UART: Running Caliptra ROM ...
2,216,231 UART:
2,216,406 UART: [state] CFI Enabled
2,217,362 UART: [state] LifecycleState = Unprovisioned
2,219,014 UART: [state] DebugLocked = No
2,220,127 UART: [state] WD Timer not started. Device not locked for debugging
2,222,599 UART: [kat] SHA2-256
2,223,268 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,226,279 UART: [kat] ++
2,226,755 UART: [kat] sha1
2,227,268 UART: [kat] SHA2-256
2,228,011 UART: [kat] SHA2-384
2,228,681 UART: [kat] SHA2-512-ACC
2,229,513 UART: [kat] ECC-384
3,279,453 UART: [kat] HMAC-384Kdf
3,292,073 UART: [kat] LMS
3,768,608 UART: [kat] --
3,773,843 UART: [cold-reset] ++
3,776,041 UART: [fht] FHT @ 0x50003400
3,786,803 UART: [idev] ++
3,787,429 UART: [idev] CDI.KEYID = 6
3,788,332 UART: [idev] SUBJECT.KEYID = 7
3,789,594 UART: [idev] UDS.KEYID = 0
3,806,969 UART: [idev] Erasing UDS.KEYID = 0
6,266,135 UART: [idev] Sha1 KeyId Algorithm
6,290,402 UART: [idev] --
6,295,075 UART: [ldev] ++
6,295,653 UART: [ldev] CDI.KEYID = 6
6,296,560 UART: [ldev] SUBJECT.KEYID = 5
6,297,772 UART: [ldev] AUTHORITY.KEYID = 7
6,299,055 UART: [ldev] FE.KEYID = 1
6,310,023 UART: [ldev] Erasing FE.KEYID = 1
8,788,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,817 UART: [ldev] --
10,579,436 UART: [fwproc] Wait for Commands...
10,582,558 UART: [fwproc] Recv command 0x46574c44
10,584,543 UART: [fwproc] Recv'd Img size: 114888 bytes
14,027,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,106,064 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,166,282 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,494,166 >>> mbox cmd response: success
14,497,406 UART: [afmc] ++
14,497,991 UART: [afmc] CDI.KEYID = 6
14,498,959 UART: [afmc] SUBJECT.KEYID = 7
14,500,169 UART: [afmc] AUTHORITY.KEYID = 5
16,999,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,603 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,739,408 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,755,376 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,770,927 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,796,795 UART: [afmc] --
18,799,918 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,800,302 UART: [cold-reset] --
18,803,976 UART: [state] Locking Datavault
18,807,058 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,810 UART: [state] Locking ICCM
18,811,280 UART: [exit] Launching FMC @ 0x40000000
18,819,614 UART:
18,819,859 UART: Running Caliptra FMC ...
18,820,960 UART:
18,821,118 UART: [fmc] Received command: 0x10000000
18,823,601 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
2,067,780 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,386,160 >>> mbox cmd response: success
18,621,784 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,640,507 UART:
18,640,841 UART: Running Caliptra FMC ...
18,642,030 UART:
18,642,201 UART: [fmc] Received command: 0x10000000
18,644,457 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,694 UART: [state] LifecycleState = Unprovisioned
85,349 UART: [state] DebugLocked = No
86,065 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
890,838 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,942 UART: [kat] ++
895,094 UART: [kat] sha1
899,298 UART: [kat] SHA2-256
901,238 UART: [kat] SHA2-384
904,041 UART: [kat] SHA2-512-ACC
905,942 UART: [kat] ECC-384
915,731 UART: [kat] HMAC-384Kdf
920,307 UART: [kat] LMS
1,168,619 UART: [kat] --
1,169,346 UART: [cold-reset] ++
1,169,796 UART: [fht] FHT @ 0x50003400
1,172,504 UART: [idev] ++
1,172,672 UART: [idev] CDI.KEYID = 6
1,173,033 UART: [idev] SUBJECT.KEYID = 7
1,173,458 UART: [idev] UDS.KEYID = 0
1,181,435 UART: [idev] Erasing UDS.KEYID = 0
1,198,653 UART: [idev] Sha1 KeyId Algorithm
1,207,405 UART: [idev] --
1,208,490 UART: [ldev] ++
1,208,658 UART: [ldev] CDI.KEYID = 6
1,209,022 UART: [ldev] SUBJECT.KEYID = 5
1,209,449 UART: [ldev] AUTHORITY.KEYID = 7
1,209,912 UART: [ldev] FE.KEYID = 1
1,215,418 UART: [ldev] Erasing FE.KEYID = 1
1,241,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,282 UART: [ldev] --
1,280,539 UART: [fwproc] Wait for Commands...
1,281,274 UART: [fwproc] Recv command 0x46574c44
1,282,007 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,743 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,428 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,663 >>> mbox cmd response: success
2,779,897 UART: [afmc] ++
2,780,065 UART: [afmc] CDI.KEYID = 6
2,780,428 UART: [afmc] SUBJECT.KEYID = 7
2,780,854 UART: [afmc] AUTHORITY.KEYID = 5
2,816,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,437 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,840,143 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,846,030 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,851,749 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,859,667 UART: [afmc] --
2,860,560 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,860,582 UART: [cold-reset] --
2,861,414 UART: [state] Locking Datavault
2,862,915 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,519 UART: [state] Locking ICCM
2,863,997 UART: [exit] Launching FMC @ 0x40000000
2,869,294 UART:
2,869,310 UART: Running Caliptra FMC ...
2,869,718 UART:
2,869,948 UART: [fmc] Received command: 0x10000000
2,872,117 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,244 >>> mbox cmd response: success
2,686,905 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,693,100 UART:
2,693,116 UART: Running Caliptra FMC ...
2,693,524 UART:
2,693,754 UART: [fmc] Received command: 0x10000000
2,695,923 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,053 UART: [state] LifecycleState = Unprovisioned
86,708 UART: [state] DebugLocked = No
87,366 UART: [state] WD Timer not started. Device not locked for debugging
88,615 UART: [kat] SHA2-256
892,165 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,269 UART: [kat] ++
896,421 UART: [kat] sha1
900,711 UART: [kat] SHA2-256
902,651 UART: [kat] SHA2-384
905,452 UART: [kat] SHA2-512-ACC
907,353 UART: [kat] ECC-384
917,606 UART: [kat] HMAC-384Kdf
922,174 UART: [kat] LMS
1,170,486 UART: [kat] --
1,171,545 UART: [cold-reset] ++
1,172,037 UART: [fht] FHT @ 0x50003400
1,174,773 UART: [idev] ++
1,174,941 UART: [idev] CDI.KEYID = 6
1,175,302 UART: [idev] SUBJECT.KEYID = 7
1,175,727 UART: [idev] UDS.KEYID = 0
1,183,576 UART: [idev] Erasing UDS.KEYID = 0
1,200,506 UART: [idev] Sha1 KeyId Algorithm
1,209,468 UART: [idev] --
1,210,323 UART: [ldev] ++
1,210,491 UART: [ldev] CDI.KEYID = 6
1,210,855 UART: [ldev] SUBJECT.KEYID = 5
1,211,282 UART: [ldev] AUTHORITY.KEYID = 7
1,211,745 UART: [ldev] FE.KEYID = 1
1,216,947 UART: [ldev] Erasing FE.KEYID = 1
1,243,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,525 UART: [ldev] --
1,282,820 UART: [fwproc] Wait for Commands...
1,283,587 UART: [fwproc] Recv command 0x46574c44
1,284,320 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,614,560 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,245 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,500 >>> mbox cmd response: success
2,781,714 UART: [afmc] ++
2,781,882 UART: [afmc] CDI.KEYID = 6
2,782,245 UART: [afmc] SUBJECT.KEYID = 7
2,782,671 UART: [afmc] AUTHORITY.KEYID = 5
2,818,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,243 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,992 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,841,698 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,847,585 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,853,304 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,861,092 UART: [afmc] --
2,862,121 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,862,143 UART: [cold-reset] --
2,863,221 UART: [state] Locking Datavault
2,864,154 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,758 UART: [state] Locking ICCM
2,865,318 UART: [exit] Launching FMC @ 0x40000000
2,870,615 UART:
2,870,631 UART: Running Caliptra FMC ...
2,871,039 UART:
2,871,269 UART: [fmc] Received command: 0x10000000
2,873,438 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,629,523 >>> mbox cmd response: success
2,685,510 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,691,537 UART:
2,691,553 UART: Running Caliptra FMC ...
2,691,961 UART:
2,692,191 UART: [fmc] Received command: 0x10000000
2,694,360 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,356 UART: [kat] ++
895,508 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
915,949 UART: [kat] HMAC-384Kdf
920,491 UART: [kat] LMS
1,168,803 UART: [kat] --
1,169,900 UART: [cold-reset] ++
1,170,322 UART: [fht] FHT @ 0x50003400
1,172,876 UART: [idev] ++
1,173,044 UART: [idev] CDI.KEYID = 6
1,173,405 UART: [idev] SUBJECT.KEYID = 7
1,173,830 UART: [idev] UDS.KEYID = 0
1,181,443 UART: [idev] Erasing UDS.KEYID = 0
1,198,783 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,886 UART: [ldev] ++
1,209,054 UART: [ldev] CDI.KEYID = 6
1,209,418 UART: [ldev] SUBJECT.KEYID = 5
1,209,845 UART: [ldev] AUTHORITY.KEYID = 7
1,210,308 UART: [ldev] FE.KEYID = 1
1,215,412 UART: [ldev] Erasing FE.KEYID = 1
1,241,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,346 UART: [ldev] --
1,280,717 UART: [fwproc] Wait for Commands...
1,281,496 UART: [fwproc] Recv command 0x46574c44
1,282,229 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,613,855 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,540 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,699 >>> mbox cmd response: success
2,780,917 UART: [afmc] ++
2,781,085 UART: [afmc] CDI.KEYID = 6
2,781,448 UART: [afmc] SUBJECT.KEYID = 7
2,781,874 UART: [afmc] AUTHORITY.KEYID = 5
2,816,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,595 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,839,301 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,845,188 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,850,907 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,858,821 UART: [afmc] --
2,859,750 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,772 UART: [cold-reset] --
2,860,722 UART: [state] Locking Datavault
2,861,949 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,553 UART: [state] Locking ICCM
2,863,005 UART: [exit] Launching FMC @ 0x40000000
2,868,302 UART:
2,868,318 UART: Running Caliptra FMC ...
2,868,726 UART:
2,868,956 UART: [fmc] Received command: 0x10000000
2,871,125 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,528 >>> mbox cmd response: success
2,686,147 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,692,196 UART:
2,692,212 UART: Running Caliptra FMC ...
2,692,620 UART:
2,692,850 UART: [fmc] Received command: 0x10000000
2,695,019 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,033 UART: [kat] SHA2-256
891,583 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,687 UART: [kat] ++
895,839 UART: [kat] sha1
900,103 UART: [kat] SHA2-256
902,043 UART: [kat] SHA2-384
904,786 UART: [kat] SHA2-512-ACC
906,687 UART: [kat] ECC-384
916,412 UART: [kat] HMAC-384Kdf
921,060 UART: [kat] LMS
1,169,372 UART: [kat] --
1,170,293 UART: [cold-reset] ++
1,170,789 UART: [fht] FHT @ 0x50003400
1,173,529 UART: [idev] ++
1,173,697 UART: [idev] CDI.KEYID = 6
1,174,058 UART: [idev] SUBJECT.KEYID = 7
1,174,483 UART: [idev] UDS.KEYID = 0
1,182,498 UART: [idev] Erasing UDS.KEYID = 0
1,199,784 UART: [idev] Sha1 KeyId Algorithm
1,208,636 UART: [idev] --
1,209,511 UART: [ldev] ++
1,209,679 UART: [ldev] CDI.KEYID = 6
1,210,043 UART: [ldev] SUBJECT.KEYID = 5
1,210,470 UART: [ldev] AUTHORITY.KEYID = 7
1,210,933 UART: [ldev] FE.KEYID = 1
1,216,103 UART: [ldev] Erasing FE.KEYID = 1
1,242,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,499 UART: [ldev] --
1,281,842 UART: [fwproc] Wait for Commands...
1,282,417 UART: [fwproc] Recv command 0x46574c44
1,283,150 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,614,318 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,003 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,218 >>> mbox cmd response: success
2,781,240 UART: [afmc] ++
2,781,408 UART: [afmc] CDI.KEYID = 6
2,781,771 UART: [afmc] SUBJECT.KEYID = 7
2,782,197 UART: [afmc] AUTHORITY.KEYID = 5
2,817,414 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,128 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,840,834 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,846,721 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,852,440 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,860,138 UART: [afmc] --
2,861,127 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,861,149 UART: [cold-reset] --
2,861,865 UART: [state] Locking Datavault
2,862,956 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,560 UART: [state] Locking ICCM
2,864,032 UART: [exit] Launching FMC @ 0x40000000
2,869,329 UART:
2,869,345 UART: Running Caliptra FMC ...
2,869,753 UART:
2,869,983 UART: [fmc] Received command: 0x10000000
2,872,152 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,127 >>> mbox cmd response: success
2,686,896 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,692,859 UART:
2,692,875 UART: Running Caliptra FMC ...
2,693,283 UART:
2,693,513 UART: [fmc] Received command: 0x10000000
2,695,682 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
891,048 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,152 UART: [kat] ++
895,304 UART: [kat] sha1
899,734 UART: [kat] SHA2-256
901,674 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
915,707 UART: [kat] HMAC-384Kdf
920,297 UART: [kat] LMS
1,168,609 UART: [kat] --
1,169,518 UART: [cold-reset] ++
1,170,018 UART: [fht] FHT @ 0x50003400
1,172,656 UART: [idev] ++
1,172,824 UART: [idev] CDI.KEYID = 6
1,173,185 UART: [idev] SUBJECT.KEYID = 7
1,173,610 UART: [idev] UDS.KEYID = 0
1,181,589 UART: [idev] Erasing UDS.KEYID = 0
1,198,597 UART: [idev] Sha1 KeyId Algorithm
1,207,501 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,215,058 UART: [ldev] Erasing FE.KEYID = 1
1,241,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,078 UART: [ldev] --
1,280,487 UART: [fwproc] Wait for Commands...
1,281,198 UART: [fwproc] Recv command 0x46574c44
1,281,931 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,225 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,910 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,209 >>> mbox cmd response: success
2,779,459 UART: [afmc] ++
2,779,627 UART: [afmc] CDI.KEYID = 6
2,779,990 UART: [afmc] SUBJECT.KEYID = 7
2,780,416 UART: [afmc] AUTHORITY.KEYID = 5
2,816,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,851 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,839,557 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,845,444 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,851,163 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,858,919 UART: [afmc] --
2,859,884 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,906 UART: [cold-reset] --
2,860,694 UART: [state] Locking Datavault
2,861,951 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,555 UART: [state] Locking ICCM
2,863,197 UART: [exit] Launching FMC @ 0x40000000
2,868,494 UART:
2,868,510 UART: Running Caliptra FMC ...
2,868,918 UART:
2,869,148 UART: [fmc] Received command: 0x10000000
2,871,317 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,472 >>> mbox cmd response: success
2,687,301 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,693,182 UART:
2,693,198 UART: Running Caliptra FMC ...
2,693,606 UART:
2,693,836 UART: [fmc] Received command: 0x10000000
2,696,005 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,915 UART: [state] LifecycleState = Unprovisioned
85,570 UART: [state] DebugLocked = No
86,252 UART: [state] WD Timer not started. Device not locked for debugging
87,475 UART: [kat] SHA2-256
891,025 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,278 UART: [kat] SHA2-512-ACC
906,179 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,708 UART: [kat] LMS
1,169,020 UART: [kat] --
1,170,011 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,181,564 UART: [idev] Erasing UDS.KEYID = 0
1,198,994 UART: [idev] Sha1 KeyId Algorithm
1,207,868 UART: [idev] --
1,208,755 UART: [ldev] ++
1,208,923 UART: [ldev] CDI.KEYID = 6
1,209,287 UART: [ldev] SUBJECT.KEYID = 5
1,209,714 UART: [ldev] AUTHORITY.KEYID = 7
1,210,177 UART: [ldev] FE.KEYID = 1
1,215,283 UART: [ldev] Erasing FE.KEYID = 1
1,241,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,213 UART: [ldev] --
1,280,558 UART: [fwproc] Wait for Commands...
1,281,165 UART: [fwproc] Recv command 0x46574c44
1,281,898 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,611,206 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,891 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,270 >>> mbox cmd response: success
2,778,392 UART: [afmc] ++
2,778,560 UART: [afmc] CDI.KEYID = 6
2,778,923 UART: [afmc] SUBJECT.KEYID = 7
2,779,349 UART: [afmc] AUTHORITY.KEYID = 5
2,814,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,072 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,836,778 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,842,665 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,848,384 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,856,256 UART: [afmc] --
2,857,065 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,857,087 UART: [cold-reset] --
2,858,225 UART: [state] Locking Datavault
2,859,514 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,118 UART: [state] Locking ICCM
2,860,642 UART: [exit] Launching FMC @ 0x40000000
2,865,939 UART:
2,865,955 UART: Running Caliptra FMC ...
2,866,363 UART:
2,866,593 UART: [fmc] Received command: 0x10000000
2,868,762 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,203 >>> mbox cmd response: success
2,688,404 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,694,677 UART:
2,694,693 UART: Running Caliptra FMC ...
2,695,101 UART:
2,695,331 UART: [fmc] Received command: 0x10000000
2,697,500 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
2,071,050 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,216,678 UART:
2,217,088 UART: Running Caliptra ROM ...
2,218,193 UART:
2,218,356 UART: [state] CFI Enabled
2,219,226 UART: [state] LifecycleState = Unprovisioned
2,220,895 UART: [state] DebugLocked = No
2,222,037 UART: [state] WD Timer not started. Device not locked for debugging
2,224,538 UART: [kat] SHA2-256
2,225,218 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,228,234 UART: [kat] ++
2,228,692 UART: [kat] sha1
2,229,216 UART: [kat] SHA2-256
2,229,963 UART: [kat] SHA2-384
2,230,638 UART: [kat] SHA2-512-ACC
2,231,493 UART: [kat] ECC-384
2,949,899 UART: [kat] HMAC-384Kdf
2,970,494 UART: [kat] LMS
3,446,946 UART: [kat] --
3,452,693 UART: [cold-reset] ++
3,454,259 UART: [fht] FHT @ 0x50003400
3,464,915 UART: [idev] ++
3,465,489 UART: [idev] CDI.KEYID = 6
3,466,455 UART: [idev] SUBJECT.KEYID = 7
3,467,673 UART: [idev] UDS.KEYID = 0
3,501,888 UART: [idev] Erasing UDS.KEYID = 0
5,985,998 UART: [idev] Sha1 KeyId Algorithm
6,008,145 UART: [idev] --
6,013,096 UART: [ldev] ++
6,013,683 UART: [ldev] CDI.KEYID = 6
6,014,601 UART: [ldev] SUBJECT.KEYID = 5
6,015,821 UART: [ldev] AUTHORITY.KEYID = 7
6,017,056 UART: [ldev] FE.KEYID = 1
6,057,369 UART: [ldev] Erasing FE.KEYID = 1
8,564,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,409 UART: [ldev] --
10,373,844 UART: [fwproc] Wait for Commands...
10,375,406 UART: [fwproc] Recv command 0x46574c44
10,377,404 UART: [fwproc] Recv'd Img size: 114888 bytes
14,878,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,961,247 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,021,485 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,350,448 >>> mbox cmd response: success
15,354,554 UART: [afmc] ++
15,355,160 UART: [afmc] CDI.KEYID = 6
15,356,285 UART: [afmc] SUBJECT.KEYID = 7
15,357,413 UART: [afmc] AUTHORITY.KEYID = 5
17,896,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,619,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,622,141 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,638,124 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,654,055 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,669,589 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,692,656 UART: [afmc] --
19,697,033 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,697,413 UART: [cold-reset] --
19,701,312 UART: [state] Locking Datavault
19,708,732 UART: [state] Locking PCR0, PCR1 and PCR31
19,710,491 UART: [state] Locking ICCM
19,712,969 UART: [exit] Launching FMC @ 0x40000000
19,721,321 UART:
19,721,565 UART: Running Caliptra FMC ...
19,722,670 UART:
19,722,835 UART: [fmc] Received command: 0x10000000
19,725,305 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,064,512 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,324,944 >>> mbox cmd response: success
19,605,810 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,622,034 UART:
19,622,373 UART: Running Caliptra FMC ...
19,623,589 UART:
19,623,794 UART: [fmc] Received command: 0x10000000
19,626,016 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,073,364 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,218,694 UART:
2,219,196 UART: Running Caliptra ROM ...
2,220,300 UART:
2,220,453 UART: [state] CFI Enabled
2,221,371 UART: [state] LifecycleState = Unprovisioned
2,223,026 UART: [state] DebugLocked = No
2,224,057 UART: [state] WD Timer not started. Device not locked for debugging
2,226,535 UART: [kat] SHA2-256
2,227,196 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,230,199 UART: [kat] ++
2,230,651 UART: [kat] sha1
2,231,161 UART: [kat] SHA2-256
2,231,896 UART: [kat] SHA2-384
2,232,560 UART: [kat] SHA2-512-ACC
2,233,383 UART: [kat] ECC-384
3,277,803 UART: [kat] HMAC-384Kdf
3,289,347 UART: [kat] LMS
3,765,837 UART: [kat] --
3,769,345 UART: [cold-reset] ++
3,771,914 UART: [fht] FHT @ 0x50003400
3,783,356 UART: [idev] ++
3,783,934 UART: [idev] CDI.KEYID = 6
3,784,869 UART: [idev] SUBJECT.KEYID = 7
3,786,133 UART: [idev] UDS.KEYID = 0
3,801,540 UART: [idev] Erasing UDS.KEYID = 0
6,262,154 UART: [idev] Sha1 KeyId Algorithm
6,286,997 UART: [idev] --
6,292,827 UART: [ldev] ++
6,293,391 UART: [ldev] CDI.KEYID = 6
6,294,270 UART: [ldev] SUBJECT.KEYID = 5
6,295,533 UART: [ldev] AUTHORITY.KEYID = 7
6,296,761 UART: [ldev] FE.KEYID = 1
6,310,700 UART: [ldev] Erasing FE.KEYID = 1
8,787,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,419 UART: [ldev] --
10,580,238 UART: [fwproc] Wait for Commands...
10,583,312 UART: [fwproc] Recv command 0x46574c44
10,585,354 UART: [fwproc] Recv'd Img size: 114888 bytes
15,052,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,140,212 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,200,439 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,529,282 >>> mbox cmd response: success
15,533,983 UART: [afmc] ++
15,534,586 UART: [afmc] CDI.KEYID = 6
15,535,494 UART: [afmc] SUBJECT.KEYID = 7
15,536,720 UART: [afmc] AUTHORITY.KEYID = 5
18,040,984 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,763,371 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,765,551 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,781,548 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,797,465 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,812,992 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,836,329 UART: [afmc] --
19,840,306 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,840,674 UART: [cold-reset] --
19,844,075 UART: [state] Locking Datavault
19,851,390 UART: [state] Locking PCR0, PCR1 and PCR31
19,853,019 UART: [state] Locking ICCM
19,855,232 UART: [exit] Launching FMC @ 0x40000000
19,863,623 UART:
19,863,867 UART: Running Caliptra FMC ...
19,864,987 UART:
19,865,143 UART: [fmc] Received command: 0x10000000
19,867,603 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,034 writing to cptra_bootfsm_go
2,071,836 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,523,305 >>> mbox cmd response: success
19,760,021 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,776,107 UART:
19,776,477 UART: Running Caliptra FMC ...
19,777,688 UART:
19,777,858 UART: [fmc] Received command: 0x10000000
19,780,116 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,600 UART: [state] LifecycleState = Unprovisioned
85,255 UART: [state] DebugLocked = No
85,761 UART: [state] WD Timer not started. Device not locked for debugging
86,928 UART: [kat] SHA2-256
890,478 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,582 UART: [kat] ++
894,734 UART: [kat] sha1
899,004 UART: [kat] SHA2-256
900,944 UART: [kat] SHA2-384
903,683 UART: [kat] SHA2-512-ACC
905,584 UART: [kat] ECC-384
915,259 UART: [kat] HMAC-384Kdf
919,923 UART: [kat] LMS
1,168,235 UART: [kat] --
1,169,406 UART: [cold-reset] ++
1,169,904 UART: [fht] FHT @ 0x50003400
1,172,622 UART: [idev] ++
1,172,790 UART: [idev] CDI.KEYID = 6
1,173,151 UART: [idev] SUBJECT.KEYID = 7
1,173,576 UART: [idev] UDS.KEYID = 0
1,181,501 UART: [idev] Erasing UDS.KEYID = 0
1,198,169 UART: [idev] Sha1 KeyId Algorithm
1,207,069 UART: [idev] --
1,207,974 UART: [ldev] ++
1,208,142 UART: [ldev] CDI.KEYID = 6
1,208,506 UART: [ldev] SUBJECT.KEYID = 5
1,208,933 UART: [ldev] AUTHORITY.KEYID = 7
1,209,396 UART: [ldev] FE.KEYID = 1
1,214,418 UART: [ldev] Erasing FE.KEYID = 1
1,240,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,596 UART: [ldev] --
1,279,825 UART: [fwproc] Wait for Commands...
1,280,576 UART: [fwproc] Recv command 0x46574c44
1,281,309 UART: [fwproc] Recv'd Img size: 114888 bytes
3,115,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,143,338 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,169,023 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,309,212 >>> mbox cmd response: success
3,310,400 UART: [afmc] ++
3,310,568 UART: [afmc] CDI.KEYID = 6
3,310,931 UART: [afmc] SUBJECT.KEYID = 7
3,311,357 UART: [afmc] AUTHORITY.KEYID = 5
3,346,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,810 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,369,513 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,375,395 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,381,101 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,389,019 UART: [afmc] --
3,389,834 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,389,856 UART: [cold-reset] --
3,390,706 UART: [state] Locking Datavault
3,391,755 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,359 UART: [state] Locking ICCM
3,392,813 UART: [exit] Launching FMC @ 0x40000000
3,398,110 UART:
3,398,126 UART: Running Caliptra FMC ...
3,398,534 UART:
3,398,764 UART: [fmc] Received command: 0x10000000
3,400,933 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,174,965 >>> mbox cmd response: success
3,230,722 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,236,983 UART:
3,236,999 UART: Running Caliptra FMC ...
3,237,407 UART:
3,237,637 UART: [fmc] Received command: 0x10000000
3,239,806 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
891,543 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,670 UART: [kat] SHA2-512-ACC
906,571 UART: [kat] ECC-384
916,510 UART: [kat] HMAC-384Kdf
921,186 UART: [kat] LMS
1,169,498 UART: [kat] --
1,170,439 UART: [cold-reset] ++
1,170,791 UART: [fht] FHT @ 0x50003400
1,173,421 UART: [idev] ++
1,173,589 UART: [idev] CDI.KEYID = 6
1,173,950 UART: [idev] SUBJECT.KEYID = 7
1,174,375 UART: [idev] UDS.KEYID = 0
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,238 UART: [idev] Sha1 KeyId Algorithm
1,208,218 UART: [idev] --
1,209,319 UART: [ldev] ++
1,209,487 UART: [ldev] CDI.KEYID = 6
1,209,851 UART: [ldev] SUBJECT.KEYID = 5
1,210,278 UART: [ldev] AUTHORITY.KEYID = 7
1,210,741 UART: [ldev] FE.KEYID = 1
1,215,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,103 UART: [ldev] --
1,281,422 UART: [fwproc] Wait for Commands...
1,282,119 UART: [fwproc] Recv command 0x46574c44
1,282,852 UART: [fwproc] Recv'd Img size: 114888 bytes
3,132,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,160,749 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,186,434 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,326,657 >>> mbox cmd response: success
3,327,709 UART: [afmc] ++
3,327,877 UART: [afmc] CDI.KEYID = 6
3,328,240 UART: [afmc] SUBJECT.KEYID = 7
3,328,666 UART: [afmc] AUTHORITY.KEYID = 5
3,364,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,683 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,387,386 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,393,268 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,398,974 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,406,646 UART: [afmc] --
3,407,567 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,407,589 UART: [cold-reset] --
3,408,601 UART: [state] Locking Datavault
3,409,736 UART: [state] Locking PCR0, PCR1 and PCR31
3,410,340 UART: [state] Locking ICCM
3,411,014 UART: [exit] Launching FMC @ 0x40000000
3,416,311 UART:
3,416,327 UART: Running Caliptra FMC ...
3,416,735 UART:
3,416,965 UART: [fmc] Received command: 0x10000000
3,419,134 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,168,793 >>> mbox cmd response: success
3,224,176 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,230,337 UART:
3,230,353 UART: Running Caliptra FMC ...
3,230,761 UART:
3,230,991 UART: [fmc] Received command: 0x10000000
3,233,160 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,580 UART: [kat] SHA2-256
901,520 UART: [kat] SHA2-384
904,193 UART: [kat] SHA2-512-ACC
906,094 UART: [kat] ECC-384
916,361 UART: [kat] HMAC-384Kdf
920,855 UART: [kat] LMS
1,169,167 UART: [kat] --
1,170,042 UART: [cold-reset] ++
1,170,536 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,182,549 UART: [idev] Erasing UDS.KEYID = 0
1,199,657 UART: [idev] Sha1 KeyId Algorithm
1,208,457 UART: [idev] --
1,209,542 UART: [ldev] ++
1,209,710 UART: [ldev] CDI.KEYID = 6
1,210,074 UART: [ldev] SUBJECT.KEYID = 5
1,210,501 UART: [ldev] AUTHORITY.KEYID = 7
1,210,964 UART: [ldev] FE.KEYID = 1
1,215,936 UART: [ldev] Erasing FE.KEYID = 1
1,242,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,298 UART: [ldev] --
1,281,683 UART: [fwproc] Wait for Commands...
1,282,382 UART: [fwproc] Recv command 0x46574c44
1,283,115 UART: [fwproc] Recv'd Img size: 114888 bytes
3,120,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,148,781 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,174,466 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,314,865 >>> mbox cmd response: success
3,315,917 UART: [afmc] ++
3,316,085 UART: [afmc] CDI.KEYID = 6
3,316,448 UART: [afmc] SUBJECT.KEYID = 7
3,316,874 UART: [afmc] AUTHORITY.KEYID = 5
3,351,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,181 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,374,884 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,380,766 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,386,472 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,394,178 UART: [afmc] --
3,395,075 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,395,097 UART: [cold-reset] --
3,395,735 UART: [state] Locking Datavault
3,396,968 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,572 UART: [state] Locking ICCM
3,398,140 UART: [exit] Launching FMC @ 0x40000000
3,403,437 UART:
3,403,453 UART: Running Caliptra FMC ...
3,403,861 UART:
3,404,091 UART: [fmc] Received command: 0x10000000
3,406,260 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,187,130 >>> mbox cmd response: success
3,243,513 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,249,540 UART:
3,249,556 UART: Running Caliptra FMC ...
3,249,964 UART:
3,250,194 UART: [fmc] Received command: 0x10000000
3,252,363 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,801 UART: [kat] ++
895,953 UART: [kat] sha1
900,259 UART: [kat] SHA2-256
902,199 UART: [kat] SHA2-384
904,802 UART: [kat] SHA2-512-ACC
906,703 UART: [kat] ECC-384
916,752 UART: [kat] HMAC-384Kdf
921,346 UART: [kat] LMS
1,169,658 UART: [kat] --
1,170,699 UART: [cold-reset] ++
1,171,031 UART: [fht] FHT @ 0x50003400
1,173,651 UART: [idev] ++
1,173,819 UART: [idev] CDI.KEYID = 6
1,174,180 UART: [idev] SUBJECT.KEYID = 7
1,174,605 UART: [idev] UDS.KEYID = 0
1,182,478 UART: [idev] Erasing UDS.KEYID = 0
1,199,592 UART: [idev] Sha1 KeyId Algorithm
1,208,534 UART: [idev] --
1,209,527 UART: [ldev] ++
1,209,695 UART: [ldev] CDI.KEYID = 6
1,210,059 UART: [ldev] SUBJECT.KEYID = 5
1,210,486 UART: [ldev] AUTHORITY.KEYID = 7
1,210,949 UART: [ldev] FE.KEYID = 1
1,216,491 UART: [ldev] Erasing FE.KEYID = 1
1,243,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,349 UART: [ldev] --
1,282,578 UART: [fwproc] Wait for Commands...
1,283,233 UART: [fwproc] Recv command 0x46574c44
1,283,966 UART: [fwproc] Recv'd Img size: 114888 bytes
3,133,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,162,329 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,188,014 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,328,305 >>> mbox cmd response: success
3,329,491 UART: [afmc] ++
3,329,659 UART: [afmc] CDI.KEYID = 6
3,330,022 UART: [afmc] SUBJECT.KEYID = 7
3,330,448 UART: [afmc] AUTHORITY.KEYID = 5
3,366,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,382,714 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,383,463 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,389,166 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,395,048 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,400,754 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,408,416 UART: [afmc] --
3,409,209 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,409,231 UART: [cold-reset] --
3,410,119 UART: [state] Locking Datavault
3,411,600 UART: [state] Locking PCR0, PCR1 and PCR31
3,412,204 UART: [state] Locking ICCM
3,412,862 UART: [exit] Launching FMC @ 0x40000000
3,418,159 UART:
3,418,175 UART: Running Caliptra FMC ...
3,418,583 UART:
3,418,813 UART: [fmc] Received command: 0x10000000
3,420,982 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,174,460 >>> mbox cmd response: success
3,230,097 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,236,620 UART:
3,236,636 UART: Running Caliptra FMC ...
3,237,044 UART:
3,237,274 UART: [fmc] Received command: 0x10000000
3,239,443 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,376 UART: [kat] ++
895,528 UART: [kat] sha1
899,938 UART: [kat] SHA2-256
901,878 UART: [kat] SHA2-384
904,613 UART: [kat] SHA2-512-ACC
906,514 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,683 UART: [kat] LMS
1,168,995 UART: [kat] --
1,169,596 UART: [cold-reset] ++
1,169,996 UART: [fht] FHT @ 0x50003400
1,172,712 UART: [idev] ++
1,172,880 UART: [idev] CDI.KEYID = 6
1,173,241 UART: [idev] SUBJECT.KEYID = 7
1,173,666 UART: [idev] UDS.KEYID = 0
1,181,755 UART: [idev] Erasing UDS.KEYID = 0
1,199,101 UART: [idev] Sha1 KeyId Algorithm
1,208,039 UART: [idev] --
1,209,280 UART: [ldev] ++
1,209,448 UART: [ldev] CDI.KEYID = 6
1,209,812 UART: [ldev] SUBJECT.KEYID = 5
1,210,239 UART: [ldev] AUTHORITY.KEYID = 7
1,210,702 UART: [ldev] FE.KEYID = 1
1,216,144 UART: [ldev] Erasing FE.KEYID = 1
1,242,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,444 UART: [ldev] --
1,281,881 UART: [fwproc] Wait for Commands...
1,282,528 UART: [fwproc] Recv command 0x46574c44
1,283,261 UART: [fwproc] Recv'd Img size: 114888 bytes
3,132,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,160,734 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,186,419 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,326,612 >>> mbox cmd response: success
3,327,734 UART: [afmc] ++
3,327,902 UART: [afmc] CDI.KEYID = 6
3,328,265 UART: [afmc] SUBJECT.KEYID = 7
3,328,691 UART: [afmc] AUTHORITY.KEYID = 5
3,364,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,246 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,386,949 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,392,831 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,398,537 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,406,307 UART: [afmc] --
3,407,224 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,407,246 UART: [cold-reset] --
3,407,986 UART: [state] Locking Datavault
3,409,203 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,807 UART: [state] Locking ICCM
3,410,297 UART: [exit] Launching FMC @ 0x40000000
3,415,594 UART:
3,415,610 UART: Running Caliptra FMC ...
3,416,018 UART:
3,416,248 UART: [fmc] Received command: 0x10000000
3,418,417 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,172,496 >>> mbox cmd response: success
3,228,529 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,234,738 UART:
3,234,754 UART: Running Caliptra FMC ...
3,235,162 UART:
3,235,392 UART: [fmc] Received command: 0x10000000
3,237,561 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Unprovisioned
85,670 UART: [state] DebugLocked = No
86,262 UART: [state] WD Timer not started. Device not locked for debugging
87,437 UART: [kat] SHA2-256
890,987 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,539 UART: [kat] SHA2-256
901,479 UART: [kat] SHA2-384
904,240 UART: [kat] SHA2-512-ACC
906,141 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,287 UART: [fht] FHT @ 0x50003400
1,172,857 UART: [idev] ++
1,173,025 UART: [idev] CDI.KEYID = 6
1,173,386 UART: [idev] SUBJECT.KEYID = 7
1,173,811 UART: [idev] UDS.KEYID = 0
1,181,768 UART: [idev] Erasing UDS.KEYID = 0
1,198,786 UART: [idev] Sha1 KeyId Algorithm
1,207,702 UART: [idev] --
1,208,631 UART: [ldev] ++
1,208,799 UART: [ldev] CDI.KEYID = 6
1,209,163 UART: [ldev] SUBJECT.KEYID = 5
1,209,590 UART: [ldev] AUTHORITY.KEYID = 7
1,210,053 UART: [ldev] FE.KEYID = 1
1,215,167 UART: [ldev] Erasing FE.KEYID = 1
1,241,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,753 UART: [ldev] --
1,281,162 UART: [fwproc] Wait for Commands...
1,281,801 UART: [fwproc] Recv command 0x46574c44
1,282,534 UART: [fwproc] Recv'd Img size: 114888 bytes
3,127,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,155,615 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,181,300 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,321,497 >>> mbox cmd response: success
3,322,611 UART: [afmc] ++
3,322,779 UART: [afmc] CDI.KEYID = 6
3,323,142 UART: [afmc] SUBJECT.KEYID = 7
3,323,568 UART: [afmc] AUTHORITY.KEYID = 5
3,358,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,169 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,381,872 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,387,754 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,393,460 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,401,150 UART: [afmc] --
3,401,979 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,402,001 UART: [cold-reset] --
3,402,981 UART: [state] Locking Datavault
3,404,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,820 UART: [state] Locking ICCM
3,405,410 UART: [exit] Launching FMC @ 0x40000000
3,410,707 UART:
3,410,723 UART: Running Caliptra FMC ...
3,411,131 UART:
3,411,361 UART: [fmc] Received command: 0x10000000
3,413,530 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,171,587 >>> mbox cmd response: success
3,227,420 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,233,657 UART:
3,233,673 UART: Running Caliptra FMC ...
3,234,081 UART:
3,234,311 UART: [fmc] Received command: 0x10000000
3,236,480 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,224,302 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,225,632 UART:
2,225,885 UART: Running Caliptra ROM ...
2,226,970 UART:
2,227,129 UART: [state] CFI Enabled
2,228,003 UART: [state] LifecycleState = Unprovisioned
2,229,690 UART: [state] DebugLocked = No
2,230,816 UART: [state] WD Timer not started. Device not locked for debugging
2,233,547 UART: [kat] SHA2-256
2,234,235 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,237,262 UART: [kat] ++
2,237,728 UART: [kat] sha1
2,238,303 UART: [kat] SHA2-256
2,238,977 UART: [kat] SHA2-384
2,239,670 UART: [kat] SHA2-512-ACC
2,240,483 UART: [kat] ECC-384
2,947,854 UART: [kat] HMAC-384Kdf
2,970,280 UART: [kat] LMS
3,446,735 UART: [kat] --
3,451,266 UART: [cold-reset] ++
3,452,882 UART: [fht] FHT @ 0x50003400
3,464,459 UART: [idev] ++
3,465,029 UART: [idev] CDI.KEYID = 6
3,466,000 UART: [idev] SUBJECT.KEYID = 7
3,467,224 UART: [idev] UDS.KEYID = 0
3,499,188 UART: [idev] Erasing UDS.KEYID = 0
5,985,748 UART: [idev] Sha1 KeyId Algorithm
6,008,804 UART: [idev] --
6,012,417 UART: [ldev] ++
6,013,003 UART: [ldev] CDI.KEYID = 6
6,013,928 UART: [ldev] SUBJECT.KEYID = 5
6,015,187 UART: [ldev] AUTHORITY.KEYID = 7
6,016,302 UART: [ldev] FE.KEYID = 1
6,056,527 UART: [ldev] Erasing FE.KEYID = 1
8,564,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,839 UART: [ldev] --
10,374,131 UART: [fwproc] Wait for Commands...
10,375,694 UART: [fwproc] Recv command 0x4d454153
10,384,937 >>> mbox cmd response data (12 bytes)
10,385,540 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,386,417 UART: [fwproc] Recv command 0x4d454153
10,395,682 >>> mbox cmd response data (12 bytes)
10,396,156 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,397,277 UART: [fwproc] Recv command 0x4d454153
10,406,479 >>> mbox cmd response data (12 bytes)
10,406,905 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,408,987 UART: [fwproc] Recv command 0x4d454153
10,418,177 >>> mbox cmd response data (12 bytes)
10,418,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,419,712 UART: [fwproc] Recv command 0x4d454153
10,428,898 >>> mbox cmd response data (12 bytes)
10,429,312 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,430,638 UART: [fwproc] Recv command 0x4d454153
10,439,771 >>> mbox cmd response data (12 bytes)
10,440,197 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,441,145 UART: [fwproc] Recv command 0x4d454153
10,450,298 >>> mbox cmd response data (12 bytes)
10,450,719 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,452,693 UART: [fwproc] Recv command 0x4d454153
10,461,825 >>> mbox cmd response data (12 bytes)
10,463,556 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
10,608,458 UART: [fwproc] Recv command 0x46574c44
10,610,526 UART: [fwproc] Recv'd Img size: 114888 bytes
14,044,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,122,279 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,182,503 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,511,460 >>> mbox cmd response: success
14,516,043 UART: [afmc] ++
14,516,649 UART: [afmc] CDI.KEYID = 6
14,517,634 UART: [afmc] SUBJECT.KEYID = 7
14,518,796 UART: [afmc] AUTHORITY.KEYID = 5
17,067,761 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,810,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,812,678 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,828,451 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,844,566 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,860,043 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,884,301 UART: [afmc] --
18,888,238 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,888,642 UART: [cold-reset] --
18,892,714 UART: [state] Locking Datavault
18,897,967 UART: [state] Locking PCR0, PCR1 and PCR31
18,899,728 UART: [state] Locking ICCM
18,902,075 UART: [exit] Launching FMC @ 0x40000000
18,910,478 UART:
18,910,725 UART: Running Caliptra FMC ...
18,911,833 UART:
18,911,998 UART: [fmc] Received command: 0x1000000A
18,918,509 >>> mbox cmd response data (928 bytes)
18,923,735 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,924,178 UART: [fmc] Received command: 0x10000009
18,925,988 >>> mbox cmd response data (48 bytes)
18,928,182 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,928,655 UART: [fmc] Received command: 0x10000003
18,938,586 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
2,216,932 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,250,827 >>> mbox cmd response data (12 bytes)
10,251,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,259,611 >>> mbox cmd response data (12 bytes)
10,260,098 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,267,378 >>> mbox cmd response data (12 bytes)
10,267,810 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,275,834 >>> mbox cmd response data (12 bytes)
10,276,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,284,231 >>> mbox cmd response data (12 bytes)
10,284,645 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,292,285 >>> mbox cmd response data (12 bytes)
10,292,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,300,803 >>> mbox cmd response data (12 bytes)
10,301,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,309,239 >>> mbox cmd response data (12 bytes)
10,310,988 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,359,347 >>> mbox cmd response: success
18,624,530 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,641,268 UART:
18,641,594 UART: Running Caliptra FMC ...
18,642,753 UART:
18,642,920 UART: [fmc] Received command: 0x1000000A
18,649,369 >>> mbox cmd response data (928 bytes)
18,655,074 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,655,552 UART: [fmc] Received command: 0x10000009
18,657,364 >>> mbox cmd response data (48 bytes)
18,659,516 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,660,001 UART: [fmc] Received command: 0x10000003
18,669,958 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
2,230,312 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,231,652 UART:
2,231,900 UART: Running Caliptra ROM ...
2,232,959 UART:
2,233,105 UART: [state] CFI Enabled
2,233,987 UART: [state] LifecycleState = Unprovisioned
2,235,557 UART: [state] DebugLocked = No
2,236,690 UART: [state] WD Timer not started. Device not locked for debugging
2,239,174 UART: [kat] SHA2-256
2,239,845 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,242,849 UART: [kat] ++
2,243,348 UART: [kat] sha1
2,243,863 UART: [kat] SHA2-256
2,244,516 UART: [kat] SHA2-384
2,245,167 UART: [kat] SHA2-512-ACC
2,245,996 UART: [kat] ECC-384
3,280,945 UART: [kat] HMAC-384Kdf
3,292,644 UART: [kat] LMS
3,769,132 UART: [kat] --
3,773,987 UART: [cold-reset] ++
3,776,294 UART: [fht] FHT @ 0x50003400
3,788,039 UART: [idev] ++
3,788,646 UART: [idev] CDI.KEYID = 6
3,789,531 UART: [idev] SUBJECT.KEYID = 7
3,790,802 UART: [idev] UDS.KEYID = 0
3,807,131 UART: [idev] Erasing UDS.KEYID = 0
6,267,906 UART: [idev] Sha1 KeyId Algorithm
6,291,686 UART: [idev] --
6,295,731 UART: [ldev] ++
6,296,299 UART: [ldev] CDI.KEYID = 6
6,297,232 UART: [ldev] SUBJECT.KEYID = 5
6,298,441 UART: [ldev] AUTHORITY.KEYID = 7
6,299,726 UART: [ldev] FE.KEYID = 1
6,311,987 UART: [ldev] Erasing FE.KEYID = 1
8,791,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,925 UART: [ldev] --
10,585,958 UART: [fwproc] Wait for Commands...
10,588,177 UART: [fwproc] Recv command 0x4d454153
10,597,408 >>> mbox cmd response data (12 bytes)
10,598,010 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,598,542 UART: [fwproc] Recv command 0x4d454153
10,607,778 >>> mbox cmd response data (12 bytes)
10,608,210 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,609,132 UART: [fwproc] Recv command 0x4d454153
10,618,369 >>> mbox cmd response data (12 bytes)
10,618,789 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,619,998 UART: [fwproc] Recv command 0x4d454153
10,629,127 >>> mbox cmd response data (12 bytes)
10,629,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,630,456 UART: [fwproc] Recv command 0x4d454153
10,639,581 >>> mbox cmd response data (12 bytes)
10,639,998 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,641,421 UART: [fwproc] Recv command 0x4d454153
10,650,595 >>> mbox cmd response data (12 bytes)
10,651,018 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,652,875 UART: [fwproc] Recv command 0x4d454153
10,662,018 >>> mbox cmd response data (12 bytes)
10,662,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,663,202 UART: [fwproc] Recv command 0x4d454153
10,672,329 >>> mbox cmd response data (12 bytes)
10,674,114 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
10,819,228 UART: [fwproc] Recv command 0x46574c44
10,821,326 UART: [fwproc] Recv'd Img size: 114888 bytes
14,260,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,343,066 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,403,264 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,731,991 >>> mbox cmd response: success
14,736,231 UART: [afmc] ++
14,736,821 UART: [afmc] CDI.KEYID = 6
14,737,703 UART: [afmc] SUBJECT.KEYID = 7
14,738,967 UART: [afmc] AUTHORITY.KEYID = 5
17,246,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,969,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,971,267 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,987,046 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
19,003,124 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,018,660 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,044,066 UART: [afmc] --
19,048,532 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
19,048,883 UART: [cold-reset] --
19,051,484 UART: [state] Locking Datavault
19,056,370 UART: [state] Locking PCR0, PCR1 and PCR31
19,058,132 UART: [state] Locking ICCM
19,059,469 UART: [exit] Launching FMC @ 0x40000000
19,067,857 UART:
19,068,103 UART: Running Caliptra FMC ...
19,069,209 UART:
19,069,366 UART: [fmc] Received command: 0x1000000A
19,075,851 >>> mbox cmd response data (928 bytes)
19,081,038 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
19,081,484 UART: [fmc] Received command: 0x10000009
19,083,294 >>> mbox cmd response data (48 bytes)
19,085,533 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
19,085,992 UART: [fmc] Received command: 0x10000003
19,095,963 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
2,224,748 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,495,052 >>> mbox cmd response data (12 bytes)
10,496,026 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,503,178 >>> mbox cmd response data (12 bytes)
10,503,630 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,511,234 >>> mbox cmd response data (12 bytes)
10,511,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,518,911 >>> mbox cmd response data (12 bytes)
10,519,326 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,527,553 >>> mbox cmd response data (12 bytes)
10,527,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,535,333 >>> mbox cmd response data (12 bytes)
10,535,744 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,542,783 >>> mbox cmd response data (12 bytes)
10,543,214 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,551,285 >>> mbox cmd response data (12 bytes)
10,553,157 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,593,729 >>> mbox cmd response: success
18,832,033 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,846,024 UART:
18,846,347 UART: Running Caliptra FMC ...
18,847,416 UART:
18,847,562 UART: [fmc] Received command: 0x1000000A
18,854,111 >>> mbox cmd response data (928 bytes)
18,859,291 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,859,723 UART: [fmc] Received command: 0x10000009
18,861,534 >>> mbox cmd response data (48 bytes)
18,863,715 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,864,177 UART: [fmc] Received command: 0x10000003
18,874,137 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,580 UART: [state] LifecycleState = Unprovisioned
85,235 UART: [state] DebugLocked = No
85,785 UART: [state] WD Timer not started. Device not locked for debugging
86,972 UART: [kat] SHA2-256
890,522 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,626 UART: [kat] ++
894,778 UART: [kat] sha1
899,018 UART: [kat] SHA2-256
900,958 UART: [kat] SHA2-384
903,747 UART: [kat] SHA2-512-ACC
905,648 UART: [kat] ECC-384
915,211 UART: [kat] HMAC-384Kdf
919,573 UART: [kat] LMS
1,167,885 UART: [kat] --
1,168,890 UART: [cold-reset] ++
1,169,464 UART: [fht] FHT @ 0x50003400
1,172,136 UART: [idev] ++
1,172,304 UART: [idev] CDI.KEYID = 6
1,172,665 UART: [idev] SUBJECT.KEYID = 7
1,173,090 UART: [idev] UDS.KEYID = 0
1,181,273 UART: [idev] Erasing UDS.KEYID = 0
1,198,335 UART: [idev] Sha1 KeyId Algorithm
1,207,159 UART: [idev] --
1,208,244 UART: [ldev] ++
1,208,412 UART: [ldev] CDI.KEYID = 6
1,208,776 UART: [ldev] SUBJECT.KEYID = 5
1,209,203 UART: [ldev] AUTHORITY.KEYID = 7
1,209,666 UART: [ldev] FE.KEYID = 1
1,214,966 UART: [ldev] Erasing FE.KEYID = 1
1,241,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,728 UART: [ldev] --
1,279,975 UART: [fwproc] Wait for Commands...
1,280,570 UART: [fwproc] Recv command 0x4d454153
1,284,593 >>> mbox cmd response data (12 bytes)
1,284,594 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,284,837 UART: [fwproc] Recv command 0x4d454153
1,288,860 >>> mbox cmd response data (12 bytes)
1,288,861 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,140 UART: [fwproc] Recv command 0x4d454153
1,293,163 >>> mbox cmd response data (12 bytes)
1,293,164 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,391 UART: [fwproc] Recv command 0x4d454153
1,297,414 >>> mbox cmd response data (12 bytes)
1,297,415 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,638 UART: [fwproc] Recv command 0x4d454153
1,301,661 >>> mbox cmd response data (12 bytes)
1,301,662 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,871 UART: [fwproc] Recv command 0x4d454153
1,305,894 >>> mbox cmd response data (12 bytes)
1,305,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,060 UART: [fwproc] Recv command 0x4d454153
1,310,083 >>> mbox cmd response data (12 bytes)
1,310,084 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,355 UART: [fwproc] Recv command 0x4d454153
1,314,378 >>> mbox cmd response data (12 bytes)
1,314,379 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,314,638 UART: [fwproc] Recv command 0x46574c44
1,315,371 UART: [fwproc] Recv'd Img size: 114888 bytes
2,618,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,644 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,672,329 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,812,666 >>> mbox cmd response: success
2,813,720 UART: [afmc] ++
2,813,888 UART: [afmc] CDI.KEYID = 6
2,814,251 UART: [afmc] SUBJECT.KEYID = 7
2,814,677 UART: [afmc] AUTHORITY.KEYID = 5
2,850,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,867,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,868,034 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,873,730 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,879,629 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,885,322 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,893,112 UART: [afmc] --
2,894,103 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,894,125 UART: [cold-reset] --
2,894,859 UART: [state] Locking Datavault
2,896,354 UART: [state] Locking PCR0, PCR1 and PCR31
2,896,958 UART: [state] Locking ICCM
2,897,530 UART: [exit] Launching FMC @ 0x40000000
2,902,827 UART:
2,902,843 UART: Running Caliptra FMC ...
2,903,251 UART:
2,903,481 UART: [fmc] Received command: 0x1000000A
2,909,712 >>> mbox cmd response data (928 bytes)
2,909,713 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,909,742 UART: [fmc] Received command: 0x10000009
2,910,940 >>> mbox cmd response data (48 bytes)
2,910,941 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,910,970 UART: [fmc] Received command: 0x10000003
2,920,426 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,712 >>> mbox cmd response data (12 bytes)
1,142,713 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,141 >>> mbox cmd response data (12 bytes)
1,146,142 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,510 >>> mbox cmd response data (12 bytes)
1,149,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,949 >>> mbox cmd response data (12 bytes)
1,152,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,316 >>> mbox cmd response data (12 bytes)
1,156,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,909 >>> mbox cmd response data (12 bytes)
1,159,910 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,336 >>> mbox cmd response data (12 bytes)
1,163,337 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,166,831 >>> mbox cmd response data (12 bytes)
1,166,832 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,658,837 >>> mbox cmd response: success
2,715,252 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,721,221 UART:
2,721,237 UART: Running Caliptra FMC ...
2,721,645 UART:
2,721,875 UART: [fmc] Received command: 0x1000000A
2,728,106 >>> mbox cmd response data (928 bytes)
2,728,107 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,728,136 UART: [fmc] Received command: 0x10000009
2,729,334 >>> mbox cmd response data (48 bytes)
2,729,335 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,729,364 UART: [fmc] Received command: 0x10000003
2,738,820 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,547 UART: [kat] ++
895,699 UART: [kat] sha1
899,961 UART: [kat] SHA2-256
901,901 UART: [kat] SHA2-384
904,602 UART: [kat] SHA2-512-ACC
906,503 UART: [kat] ECC-384
916,426 UART: [kat] HMAC-384Kdf
920,938 UART: [kat] LMS
1,169,250 UART: [kat] --
1,170,303 UART: [cold-reset] ++
1,170,879 UART: [fht] FHT @ 0x50003400
1,173,497 UART: [idev] ++
1,173,665 UART: [idev] CDI.KEYID = 6
1,174,026 UART: [idev] SUBJECT.KEYID = 7
1,174,451 UART: [idev] UDS.KEYID = 0
1,182,200 UART: [idev] Erasing UDS.KEYID = 0
1,199,466 UART: [idev] Sha1 KeyId Algorithm
1,208,250 UART: [idev] --
1,209,251 UART: [ldev] ++
1,209,419 UART: [ldev] CDI.KEYID = 6
1,209,783 UART: [ldev] SUBJECT.KEYID = 5
1,210,210 UART: [ldev] AUTHORITY.KEYID = 7
1,210,673 UART: [ldev] FE.KEYID = 1
1,215,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,213 UART: [ldev] --
1,281,646 UART: [fwproc] Wait for Commands...
1,282,235 UART: [fwproc] Recv command 0x4d454153
1,286,258 >>> mbox cmd response data (12 bytes)
1,286,259 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,518 UART: [fwproc] Recv command 0x4d454153
1,290,541 >>> mbox cmd response data (12 bytes)
1,290,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,755 UART: [fwproc] Recv command 0x4d454153
1,294,778 >>> mbox cmd response data (12 bytes)
1,294,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,934 UART: [fwproc] Recv command 0x4d454153
1,298,957 >>> mbox cmd response data (12 bytes)
1,298,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,247 UART: [fwproc] Recv command 0x4d454153
1,303,270 >>> mbox cmd response data (12 bytes)
1,303,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,522 UART: [fwproc] Recv command 0x4d454153
1,307,545 >>> mbox cmd response data (12 bytes)
1,307,546 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,669 UART: [fwproc] Recv command 0x4d454153
1,311,692 >>> mbox cmd response data (12 bytes)
1,311,693 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,942 UART: [fwproc] Recv command 0x4d454153
1,315,965 >>> mbox cmd response data (12 bytes)
1,315,966 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,316,165 UART: [fwproc] Recv command 0x46574c44
1,316,898 UART: [fwproc] Recv'd Img size: 114888 bytes
2,620,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,673 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,672,358 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,812,667 >>> mbox cmd response: success
2,813,861 UART: [afmc] ++
2,814,029 UART: [afmc] CDI.KEYID = 6
2,814,392 UART: [afmc] SUBJECT.KEYID = 7
2,814,818 UART: [afmc] AUTHORITY.KEYID = 5
2,850,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,866,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,867,385 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,873,081 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,878,980 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,884,673 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,892,329 UART: [afmc] --
2,893,348 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,893,370 UART: [cold-reset] --
2,894,356 UART: [state] Locking Datavault
2,895,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,896,159 UART: [state] Locking ICCM
2,896,751 UART: [exit] Launching FMC @ 0x40000000
2,902,048 UART:
2,902,064 UART: Running Caliptra FMC ...
2,902,472 UART:
2,902,702 UART: [fmc] Received command: 0x1000000A
2,908,933 >>> mbox cmd response data (928 bytes)
2,908,934 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,908,963 UART: [fmc] Received command: 0x10000009
2,910,161 >>> mbox cmd response data (48 bytes)
2,910,162 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,910,191 UART: [fmc] Received command: 0x10000003
2,919,647 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,355 >>> mbox cmd response data (12 bytes)
1,143,356 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,894 >>> mbox cmd response data (12 bytes)
1,146,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,483 >>> mbox cmd response data (12 bytes)
1,150,484 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,082 >>> mbox cmd response data (12 bytes)
1,154,083 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,453 >>> mbox cmd response data (12 bytes)
1,157,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,848 >>> mbox cmd response data (12 bytes)
1,160,849 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,331 >>> mbox cmd response data (12 bytes)
1,164,332 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,768 >>> mbox cmd response data (12 bytes)
1,167,769 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,660,418 >>> mbox cmd response: success
2,717,117 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,723,496 UART:
2,723,512 UART: Running Caliptra FMC ...
2,723,920 UART:
2,724,150 UART: [fmc] Received command: 0x1000000A
2,730,381 >>> mbox cmd response data (928 bytes)
2,730,382 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,730,411 UART: [fmc] Received command: 0x10000009
2,731,609 >>> mbox cmd response data (48 bytes)
2,731,610 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,731,639 UART: [fmc] Received command: 0x10000003
2,741,095 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
891,416 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,520 UART: [kat] ++
895,672 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,651 UART: [kat] LMS
1,168,963 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,608 UART: [fht] FHT @ 0x50003400
1,173,194 UART: [idev] ++
1,173,362 UART: [idev] CDI.KEYID = 6
1,173,723 UART: [idev] SUBJECT.KEYID = 7
1,174,148 UART: [idev] UDS.KEYID = 0
1,182,055 UART: [idev] Erasing UDS.KEYID = 0
1,199,325 UART: [idev] Sha1 KeyId Algorithm
1,208,265 UART: [idev] --
1,209,308 UART: [ldev] ++
1,209,476 UART: [ldev] CDI.KEYID = 6
1,209,840 UART: [ldev] SUBJECT.KEYID = 5
1,210,267 UART: [ldev] AUTHORITY.KEYID = 7
1,210,730 UART: [ldev] FE.KEYID = 1
1,215,940 UART: [ldev] Erasing FE.KEYID = 1
1,242,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,118 UART: [ldev] --
1,281,459 UART: [fwproc] Wait for Commands...
1,282,088 UART: [fwproc] Recv command 0x4d454153
1,286,111 >>> mbox cmd response data (12 bytes)
1,286,112 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,299 UART: [fwproc] Recv command 0x4d454153
1,290,322 >>> mbox cmd response data (12 bytes)
1,290,323 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,600 UART: [fwproc] Recv command 0x4d454153
1,294,623 >>> mbox cmd response data (12 bytes)
1,294,624 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,749 UART: [fwproc] Recv command 0x4d454153
1,298,772 >>> mbox cmd response data (12 bytes)
1,298,773 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,944 UART: [fwproc] Recv command 0x4d454153
1,302,967 >>> mbox cmd response data (12 bytes)
1,302,968 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,181 UART: [fwproc] Recv command 0x4d454153
1,307,204 >>> mbox cmd response data (12 bytes)
1,307,205 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,322 UART: [fwproc] Recv command 0x4d454153
1,311,345 >>> mbox cmd response data (12 bytes)
1,311,346 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,601 UART: [fwproc] Recv command 0x4d454153
1,315,624 >>> mbox cmd response data (12 bytes)
1,315,625 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,315,852 UART: [fwproc] Recv command 0x46574c44
1,316,585 UART: [fwproc] Recv'd Img size: 114888 bytes
2,620,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,778 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,672,463 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,812,854 >>> mbox cmd response: success
2,813,886 UART: [afmc] ++
2,814,054 UART: [afmc] CDI.KEYID = 6
2,814,417 UART: [afmc] SUBJECT.KEYID = 7
2,814,843 UART: [afmc] AUTHORITY.KEYID = 5
2,849,546 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,866,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,866,760 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,872,456 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,878,355 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,884,048 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,891,794 UART: [afmc] --
2,892,823 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,892,845 UART: [cold-reset] --
2,893,831 UART: [state] Locking Datavault
2,895,060 UART: [state] Locking PCR0, PCR1 and PCR31
2,895,664 UART: [state] Locking ICCM
2,896,252 UART: [exit] Launching FMC @ 0x40000000
2,901,549 UART:
2,901,565 UART: Running Caliptra FMC ...
2,901,973 UART:
2,902,203 UART: [fmc] Received command: 0x1000000A
2,908,434 >>> mbox cmd response data (928 bytes)
2,908,435 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,908,464 UART: [fmc] Received command: 0x10000009
2,909,662 >>> mbox cmd response data (48 bytes)
2,909,663 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,909,692 UART: [fmc] Received command: 0x10000003
2,919,148 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,496 >>> mbox cmd response data (12 bytes)
1,141,497 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,863 >>> mbox cmd response data (12 bytes)
1,144,864 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,360 >>> mbox cmd response data (12 bytes)
1,148,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,935 >>> mbox cmd response data (12 bytes)
1,151,936 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,502 >>> mbox cmd response data (12 bytes)
1,155,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,887 >>> mbox cmd response data (12 bytes)
1,158,888 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,258 >>> mbox cmd response data (12 bytes)
1,162,259 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,773 >>> mbox cmd response data (12 bytes)
1,165,774 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,659,391 >>> mbox cmd response: success
2,715,370 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,721,553 UART:
2,721,569 UART: Running Caliptra FMC ...
2,721,977 UART:
2,722,207 UART: [fmc] Received command: 0x1000000A
2,728,438 >>> mbox cmd response data (928 bytes)
2,728,439 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,728,468 UART: [fmc] Received command: 0x10000009
2,729,666 >>> mbox cmd response data (48 bytes)
2,729,667 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,729,696 UART: [fmc] Received command: 0x10000003
2,739,152 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
87,034 UART: [state] WD Timer not started. Device not locked for debugging
88,349 UART: [kat] SHA2-256
891,899 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,003 UART: [kat] ++
896,155 UART: [kat] sha1
900,419 UART: [kat] SHA2-256
902,359 UART: [kat] SHA2-384
905,036 UART: [kat] SHA2-512-ACC
906,937 UART: [kat] ECC-384
916,450 UART: [kat] HMAC-384Kdf
920,912 UART: [kat] LMS
1,169,224 UART: [kat] --
1,169,965 UART: [cold-reset] ++
1,170,307 UART: [fht] FHT @ 0x50003400
1,172,991 UART: [idev] ++
1,173,159 UART: [idev] CDI.KEYID = 6
1,173,520 UART: [idev] SUBJECT.KEYID = 7
1,173,945 UART: [idev] UDS.KEYID = 0
1,181,778 UART: [idev] Erasing UDS.KEYID = 0
1,198,974 UART: [idev] Sha1 KeyId Algorithm
1,207,704 UART: [idev] --
1,208,763 UART: [ldev] ++
1,208,931 UART: [ldev] CDI.KEYID = 6
1,209,295 UART: [ldev] SUBJECT.KEYID = 5
1,209,722 UART: [ldev] AUTHORITY.KEYID = 7
1,210,185 UART: [ldev] FE.KEYID = 1
1,215,199 UART: [ldev] Erasing FE.KEYID = 1
1,241,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,273 UART: [ldev] --
1,280,506 UART: [fwproc] Wait for Commands...
1,281,285 UART: [fwproc] Recv command 0x4d454153
1,285,308 >>> mbox cmd response data (12 bytes)
1,285,309 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,494 UART: [fwproc] Recv command 0x4d454153
1,289,517 >>> mbox cmd response data (12 bytes)
1,289,518 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,719 UART: [fwproc] Recv command 0x4d454153
1,293,742 >>> mbox cmd response data (12 bytes)
1,293,743 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,008 UART: [fwproc] Recv command 0x4d454153
1,298,031 >>> mbox cmd response data (12 bytes)
1,298,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,229 UART: [fwproc] Recv command 0x4d454153
1,302,252 >>> mbox cmd response data (12 bytes)
1,302,253 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,344 UART: [fwproc] Recv command 0x4d454153
1,306,367 >>> mbox cmd response data (12 bytes)
1,306,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,501 UART: [fwproc] Recv command 0x4d454153
1,310,524 >>> mbox cmd response data (12 bytes)
1,310,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,796 UART: [fwproc] Recv command 0x4d454153
1,314,819 >>> mbox cmd response data (12 bytes)
1,314,820 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,315,069 UART: [fwproc] Recv command 0x46574c44
1,315,802 UART: [fwproc] Recv'd Img size: 114888 bytes
2,619,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,075 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,671,760 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,811,975 >>> mbox cmd response: success
2,813,135 UART: [afmc] ++
2,813,303 UART: [afmc] CDI.KEYID = 6
2,813,666 UART: [afmc] SUBJECT.KEYID = 7
2,814,092 UART: [afmc] AUTHORITY.KEYID = 5
2,849,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,866,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,866,823 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,872,519 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,878,418 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,884,111 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,891,921 UART: [afmc] --
2,892,808 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,892,830 UART: [cold-reset] --
2,893,748 UART: [state] Locking Datavault
2,895,069 UART: [state] Locking PCR0, PCR1 and PCR31
2,895,673 UART: [state] Locking ICCM
2,896,323 UART: [exit] Launching FMC @ 0x40000000
2,901,620 UART:
2,901,636 UART: Running Caliptra FMC ...
2,902,044 UART:
2,902,274 UART: [fmc] Received command: 0x1000000A
2,908,505 >>> mbox cmd response data (928 bytes)
2,908,506 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,908,535 UART: [fmc] Received command: 0x10000009
2,909,733 >>> mbox cmd response data (48 bytes)
2,909,734 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,909,763 UART: [fmc] Received command: 0x10000003
2,919,219 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,615 >>> mbox cmd response data (12 bytes)
1,143,616 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,068 >>> mbox cmd response data (12 bytes)
1,147,069 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,453 >>> mbox cmd response data (12 bytes)
1,150,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,946 >>> mbox cmd response data (12 bytes)
1,153,947 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,539 >>> mbox cmd response data (12 bytes)
1,157,540 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,934 >>> mbox cmd response data (12 bytes)
1,160,935 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,457 >>> mbox cmd response data (12 bytes)
1,164,458 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,960 >>> mbox cmd response data (12 bytes)
1,167,961 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,660,758 >>> mbox cmd response: success
2,717,425 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,723,618 UART:
2,723,634 UART: Running Caliptra FMC ...
2,724,042 UART:
2,724,272 UART: [fmc] Received command: 0x1000000A
2,730,503 >>> mbox cmd response data (928 bytes)
2,730,504 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,730,533 UART: [fmc] Received command: 0x10000009
2,731,731 >>> mbox cmd response data (48 bytes)
2,731,732 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,731,761 UART: [fmc] Received command: 0x10000003
2,741,217 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,792 UART: [kat] SHA2-256
901,732 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
921,031 UART: [kat] LMS
1,169,343 UART: [kat] --
1,170,028 UART: [cold-reset] ++
1,170,444 UART: [fht] FHT @ 0x50003400
1,173,198 UART: [idev] ++
1,173,366 UART: [idev] CDI.KEYID = 6
1,173,727 UART: [idev] SUBJECT.KEYID = 7
1,174,152 UART: [idev] UDS.KEYID = 0
1,182,021 UART: [idev] Erasing UDS.KEYID = 0
1,198,725 UART: [idev] Sha1 KeyId Algorithm
1,207,439 UART: [idev] --
1,208,678 UART: [ldev] ++
1,208,846 UART: [ldev] CDI.KEYID = 6
1,209,210 UART: [ldev] SUBJECT.KEYID = 5
1,209,637 UART: [ldev] AUTHORITY.KEYID = 7
1,210,100 UART: [ldev] FE.KEYID = 1
1,215,192 UART: [ldev] Erasing FE.KEYID = 1
1,241,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,208 UART: [ldev] --
1,280,413 UART: [fwproc] Wait for Commands...
1,281,040 UART: [fwproc] Recv command 0x4d454153
1,285,063 >>> mbox cmd response data (12 bytes)
1,285,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,169 UART: [fwproc] Recv command 0x4d454153
1,289,192 >>> mbox cmd response data (12 bytes)
1,289,193 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,330 UART: [fwproc] Recv command 0x4d454153
1,293,353 >>> mbox cmd response data (12 bytes)
1,293,354 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,415 UART: [fwproc] Recv command 0x4d454153
1,297,438 >>> mbox cmd response data (12 bytes)
1,297,439 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,580 UART: [fwproc] Recv command 0x4d454153
1,301,603 >>> mbox cmd response data (12 bytes)
1,301,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,831 UART: [fwproc] Recv command 0x4d454153
1,305,854 >>> mbox cmd response data (12 bytes)
1,305,855 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,110 UART: [fwproc] Recv command 0x4d454153
1,310,133 >>> mbox cmd response data (12 bytes)
1,310,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,403 UART: [fwproc] Recv command 0x4d454153
1,314,426 >>> mbox cmd response data (12 bytes)
1,314,427 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,314,630 UART: [fwproc] Recv command 0x46574c44
1,315,363 UART: [fwproc] Recv'd Img size: 114888 bytes
2,617,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,645,912 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,671,597 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,811,944 >>> mbox cmd response: success
2,813,066 UART: [afmc] ++
2,813,234 UART: [afmc] CDI.KEYID = 6
2,813,597 UART: [afmc] SUBJECT.KEYID = 7
2,814,023 UART: [afmc] AUTHORITY.KEYID = 5
2,849,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,866,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,867,300 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,872,996 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,878,895 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,884,588 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,892,466 UART: [afmc] --
2,893,419 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,893,441 UART: [cold-reset] --
2,894,371 UART: [state] Locking Datavault
2,895,292 UART: [state] Locking PCR0, PCR1 and PCR31
2,895,896 UART: [state] Locking ICCM
2,896,344 UART: [exit] Launching FMC @ 0x40000000
2,901,641 UART:
2,901,657 UART: Running Caliptra FMC ...
2,902,065 UART:
2,902,295 UART: [fmc] Received command: 0x1000000A
2,908,526 >>> mbox cmd response data (928 bytes)
2,908,527 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,908,556 UART: [fmc] Received command: 0x10000009
2,909,754 >>> mbox cmd response data (48 bytes)
2,909,755 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,909,784 UART: [fmc] Received command: 0x10000003
2,919,240 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,992 >>> mbox cmd response data (12 bytes)
1,142,993 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,575 >>> mbox cmd response data (12 bytes)
1,146,576 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,944 >>> mbox cmd response data (12 bytes)
1,149,945 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,457 >>> mbox cmd response data (12 bytes)
1,153,458 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,016 >>> mbox cmd response data (12 bytes)
1,157,017 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,413 >>> mbox cmd response data (12 bytes)
1,160,414 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,004 >>> mbox cmd response data (12 bytes)
1,164,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,537 >>> mbox cmd response data (12 bytes)
1,167,538 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,660,691 >>> mbox cmd response: success
2,716,790 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,722,921 UART:
2,722,937 UART: Running Caliptra FMC ...
2,723,345 UART:
2,723,575 UART: [fmc] Received command: 0x1000000A
2,729,806 >>> mbox cmd response data (928 bytes)
2,729,807 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,729,836 UART: [fmc] Received command: 0x10000009
2,731,034 >>> mbox cmd response data (48 bytes)
2,731,035 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,731,064 UART: [fmc] Received command: 0x10000003
2,740,520 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
86,948 UART: [state] WD Timer not started. Device not locked for debugging
88,281 UART: [kat] SHA2-256
891,831 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,935 UART: [kat] ++
896,087 UART: [kat] sha1
900,169 UART: [kat] SHA2-256
902,109 UART: [kat] SHA2-384
904,986 UART: [kat] SHA2-512-ACC
906,887 UART: [kat] ECC-384
916,688 UART: [kat] HMAC-384Kdf
921,354 UART: [kat] LMS
1,169,666 UART: [kat] --
1,170,537 UART: [cold-reset] ++
1,171,057 UART: [fht] FHT @ 0x50003400
1,173,729 UART: [idev] ++
1,173,897 UART: [idev] CDI.KEYID = 6
1,174,258 UART: [idev] SUBJECT.KEYID = 7
1,174,683 UART: [idev] UDS.KEYID = 0
1,182,730 UART: [idev] Erasing UDS.KEYID = 0
1,199,720 UART: [idev] Sha1 KeyId Algorithm
1,208,642 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,415 UART: [ldev] SUBJECT.KEYID = 5
1,210,842 UART: [ldev] AUTHORITY.KEYID = 7
1,211,305 UART: [ldev] FE.KEYID = 1
1,216,537 UART: [ldev] Erasing FE.KEYID = 1
1,243,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,437 UART: [ldev] --
1,282,668 UART: [fwproc] Wait for Commands...
1,283,253 UART: [fwproc] Recv command 0x4d454153
1,287,276 >>> mbox cmd response data (12 bytes)
1,287,277 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,496 UART: [fwproc] Recv command 0x4d454153
1,291,519 >>> mbox cmd response data (12 bytes)
1,291,520 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,755 UART: [fwproc] Recv command 0x4d454153
1,295,778 >>> mbox cmd response data (12 bytes)
1,295,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,056 UART: [fwproc] Recv command 0x4d454153
1,300,079 >>> mbox cmd response data (12 bytes)
1,300,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,155 UART: [fwproc] Recv command 0x4d454153
1,304,178 >>> mbox cmd response data (12 bytes)
1,304,179 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,248 UART: [fwproc] Recv command 0x4d454153
1,308,271 >>> mbox cmd response data (12 bytes)
1,308,272 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,385 UART: [fwproc] Recv command 0x4d454153
1,312,408 >>> mbox cmd response data (12 bytes)
1,312,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,528 UART: [fwproc] Recv command 0x4d454153
1,316,551 >>> mbox cmd response data (12 bytes)
1,316,552 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,316,709 UART: [fwproc] Recv command 0x46574c44
1,317,442 UART: [fwproc] Recv'd Img size: 114888 bytes
2,620,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,401 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,674,086 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,814,477 >>> mbox cmd response: success
2,815,569 UART: [afmc] ++
2,815,737 UART: [afmc] CDI.KEYID = 6
2,816,100 UART: [afmc] SUBJECT.KEYID = 7
2,816,526 UART: [afmc] AUTHORITY.KEYID = 5
2,852,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,868,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,869,025 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,874,721 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,880,620 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,886,313 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,894,231 UART: [afmc] --
2,895,038 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,895,060 UART: [cold-reset] --
2,895,704 UART: [state] Locking Datavault
2,896,731 UART: [state] Locking PCR0, PCR1 and PCR31
2,897,335 UART: [state] Locking ICCM
2,897,985 UART: [exit] Launching FMC @ 0x40000000
2,903,282 UART:
2,903,298 UART: Running Caliptra FMC ...
2,903,706 UART:
2,903,936 UART: [fmc] Received command: 0x1000000A
2,910,167 >>> mbox cmd response data (928 bytes)
2,910,168 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,910,197 UART: [fmc] Received command: 0x10000009
2,911,395 >>> mbox cmd response data (48 bytes)
2,911,396 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,911,425 UART: [fmc] Received command: 0x10000003
2,920,881 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,065 >>> mbox cmd response data (12 bytes)
1,144,066 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,598 >>> mbox cmd response data (12 bytes)
1,147,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,033 >>> mbox cmd response data (12 bytes)
1,151,034 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,432 >>> mbox cmd response data (12 bytes)
1,154,433 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,007 >>> mbox cmd response data (12 bytes)
1,158,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,620 >>> mbox cmd response data (12 bytes)
1,161,621 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,145 >>> mbox cmd response data (12 bytes)
1,165,146 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,168,708 >>> mbox cmd response data (12 bytes)
1,168,709 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,661,570 >>> mbox cmd response: success
2,717,581 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,723,328 UART:
2,723,344 UART: Running Caliptra FMC ...
2,723,752 UART:
2,723,982 UART: [fmc] Received command: 0x1000000A
2,730,213 >>> mbox cmd response data (928 bytes)
2,730,214 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,730,243 UART: [fmc] Received command: 0x10000009
2,731,441 >>> mbox cmd response data (48 bytes)
2,731,442 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,731,471 UART: [fmc] Received command: 0x10000003
2,740,927 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,372 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,140 UART:
192,507 UART: Running Caliptra ROM ...
193,715 UART:
193,872 UART: [state] CFI Enabled
261,112 UART: [state] LifecycleState = Unprovisioned
263,052 UART: [state] DebugLocked = No
265,310 UART: [state] WD Timer not started. Device not locked for debugging
268,580 UART: [kat] SHA2-256
448,206 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,014 UART: [kat] ++
459,504 UART: [kat] sha1
471,579 UART: [kat] SHA2-256
474,284 UART: [kat] SHA2-384
480,374 UART: [kat] SHA2-512-ACC
482,726 UART: [kat] ECC-384
2,947,417 UART: [kat] HMAC-384Kdf
2,970,468 UART: [kat] LMS
3,446,946 UART: [kat] --
3,450,692 UART: [cold-reset] ++
3,451,989 UART: [fht] FHT @ 0x50003400
3,464,592 UART: [idev] ++
3,465,224 UART: [idev] CDI.KEYID = 6
3,466,142 UART: [idev] SUBJECT.KEYID = 7
3,467,360 UART: [idev] UDS.KEYID = 0
3,501,647 UART: [idev] Erasing UDS.KEYID = 0
5,989,557 UART: [idev] Sha1 KeyId Algorithm
6,013,389 UART: [idev] --
6,018,904 UART: [ldev] ++
6,019,506 UART: [ldev] CDI.KEYID = 6
6,020,396 UART: [ldev] SUBJECT.KEYID = 5
6,021,615 UART: [ldev] AUTHORITY.KEYID = 7
6,022,856 UART: [ldev] FE.KEYID = 1
6,057,469 UART: [ldev] Erasing FE.KEYID = 1
8,565,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,272 UART: [ldev] --
10,374,529 UART: [fwproc] Wait for Commands...
10,377,443 UART: [fwproc] Recv command 0x4d454153
10,386,682 >>> mbox cmd response data (12 bytes)
10,387,314 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,388,339 UART: [fwproc] Recv command 0x4d454153
10,397,555 >>> mbox cmd response data (12 bytes)
10,397,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,399,145 UART: [fwproc] Recv command 0x4d454153
10,408,344 >>> mbox cmd response data (12 bytes)
10,408,759 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,409,385 UART: [fwproc] Recv command 0x4d454153
10,418,521 >>> mbox cmd response data (12 bytes)
10,418,934 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,419,933 UART: [fwproc] Recv command 0x4d454153
10,429,076 >>> mbox cmd response data (12 bytes)
10,429,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,431,246 UART: [fwproc] Recv command 0x4d454153
10,440,435 >>> mbox cmd response data (12 bytes)
10,441,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,442,308 UART: [fwproc] Recv command 0x4d454153
10,451,458 >>> mbox cmd response data (12 bytes)
10,451,901 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,453,279 UART: [fwproc] Recv command 0x4d454153
10,462,412 >>> mbox cmd response data (12 bytes)
10,462,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,464,370 UART: [fwproc] Recv command 0x4d454153
10,466,367 UART: [fwproc] Max # of measurements received.
10,468,310 >>> mbox cmd response: failed
10,469,934 UART: ROM Fatal Error: 0x01020008test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,323 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,295,803 >>> mbox cmd response data (12 bytes)
10,296,825 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,304,062 >>> mbox cmd response data (12 bytes)
10,304,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,312,222 >>> mbox cmd response data (12 bytes)
10,312,650 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,320,075 >>> mbox cmd response data (12 bytes)
10,320,497 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,327,757 >>> mbox cmd response data (12 bytes)
10,328,167 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,336,026 >>> mbox cmd response data (12 bytes)
10,336,448 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,344,280 >>> mbox cmd response data (12 bytes)
10,344,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,351,972 >>> mbox cmd response data (12 bytes)
10,352,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,353,494 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,505 UART:
192,864 UART: Running Caliptra ROM ...
194,049 UART:
603,716 UART: [state] CFI Enabled
614,713 UART: [state] LifecycleState = Unprovisioned
616,616 UART: [state] DebugLocked = No
618,414 UART: [state] WD Timer not started. Device not locked for debugging
622,971 UART: [kat] SHA2-256
802,626 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,410 UART: [kat] ++
813,941 UART: [kat] sha1
826,272 UART: [kat] SHA2-256
828,945 UART: [kat] SHA2-384
834,587 UART: [kat] SHA2-512-ACC
836,916 UART: [kat] ECC-384
3,278,556 UART: [kat] HMAC-384Kdf
3,289,423 UART: [kat] LMS
3,765,947 UART: [kat] --
3,772,396 UART: [cold-reset] ++
3,774,818 UART: [fht] FHT @ 0x50003400
3,785,256 UART: [idev] ++
3,785,822 UART: [idev] CDI.KEYID = 6
3,786,782 UART: [idev] SUBJECT.KEYID = 7
3,788,065 UART: [idev] UDS.KEYID = 0
3,805,772 UART: [idev] Erasing UDS.KEYID = 0
6,268,250 UART: [idev] Sha1 KeyId Algorithm
6,290,998 UART: [idev] --
6,296,613 UART: [ldev] ++
6,297,183 UART: [ldev] CDI.KEYID = 6
6,298,091 UART: [ldev] SUBJECT.KEYID = 5
6,299,309 UART: [ldev] AUTHORITY.KEYID = 7
6,300,537 UART: [ldev] FE.KEYID = 1
6,311,613 UART: [ldev] Erasing FE.KEYID = 1
8,793,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,353 UART: [ldev] --
10,585,133 UART: [fwproc] Wait for Commands...
10,587,229 UART: [fwproc] Recv command 0x4d454153
10,596,462 >>> mbox cmd response data (12 bytes)
10,597,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,597,886 UART: [fwproc] Recv command 0x4d454153
10,607,068 >>> mbox cmd response data (12 bytes)
10,607,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,608,483 UART: [fwproc] Recv command 0x4d454153
10,617,724 >>> mbox cmd response data (12 bytes)
10,618,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,618,696 UART: [fwproc] Recv command 0x4d454153
10,627,823 >>> mbox cmd response data (12 bytes)
10,628,227 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,630,353 UART: [fwproc] Recv command 0x4d454153
10,639,551 >>> mbox cmd response data (12 bytes)
10,640,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,641,080 UART: [fwproc] Recv command 0x4d454153
10,650,217 >>> mbox cmd response data (12 bytes)
10,650,625 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,651,402 UART: [fwproc] Recv command 0x4d454153
10,660,529 >>> mbox cmd response data (12 bytes)
10,660,948 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,661,993 UART: [fwproc] Recv command 0x4d454153
10,671,119 >>> mbox cmd response data (12 bytes)
10,671,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,673,006 UART: [fwproc] Recv command 0x4d454153
10,675,003 UART: [fwproc] Max # of measurements received.
10,676,943 >>> mbox cmd response: failed
10,678,342 UART: ROM Fatal Error: 0x01020008test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,492,125 >>> mbox cmd response data (12 bytes)
10,493,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,500,506 >>> mbox cmd response data (12 bytes)
10,500,947 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,508,102 >>> mbox cmd response data (12 bytes)
10,508,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,515,884 >>> mbox cmd response data (12 bytes)
10,516,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,524,523 >>> mbox cmd response data (12 bytes)
10,524,949 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,532,373 >>> mbox cmd response data (12 bytes)
10,532,773 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,540,896 >>> mbox cmd response data (12 bytes)
10,541,312 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,548,463 >>> mbox cmd response data (12 bytes)
10,548,870 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,550,165 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,402 UART: [kat] SHA2-256
901,342 UART: [kat] SHA2-384
904,173 UART: [kat] SHA2-512-ACC
906,074 UART: [kat] ECC-384
915,365 UART: [kat] HMAC-384Kdf
919,999 UART: [kat] LMS
1,168,311 UART: [kat] --
1,169,336 UART: [cold-reset] ++
1,169,868 UART: [fht] FHT @ 0x50003400
1,172,340 UART: [idev] ++
1,172,508 UART: [idev] CDI.KEYID = 6
1,172,869 UART: [idev] SUBJECT.KEYID = 7
1,173,294 UART: [idev] UDS.KEYID = 0
1,181,217 UART: [idev] Erasing UDS.KEYID = 0
1,198,659 UART: [idev] Sha1 KeyId Algorithm
1,207,555 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,215,350 UART: [ldev] Erasing FE.KEYID = 1
1,241,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,644 UART: [ldev] --
1,281,065 UART: [fwproc] Wait for Commands...
1,281,764 UART: [fwproc] Recv command 0x4d454153
1,285,787 >>> mbox cmd response data (12 bytes)
1,285,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,053 UART: [fwproc] Recv command 0x4d454153
1,290,076 >>> mbox cmd response data (12 bytes)
1,290,077 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,216 UART: [fwproc] Recv command 0x4d454153
1,294,239 >>> mbox cmd response data (12 bytes)
1,294,240 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,323 UART: [fwproc] Recv command 0x4d454153
1,298,346 >>> mbox cmd response data (12 bytes)
1,298,347 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,466 UART: [fwproc] Recv command 0x4d454153
1,302,489 >>> mbox cmd response data (12 bytes)
1,302,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,773 UART: [fwproc] Recv command 0x4d454153
1,306,796 >>> mbox cmd response data (12 bytes)
1,306,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,950 UART: [fwproc] Recv command 0x4d454153
1,310,973 >>> mbox cmd response data (12 bytes)
1,310,974 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,251 UART: [fwproc] Recv command 0x4d454153
1,315,274 >>> mbox cmd response data (12 bytes)
1,315,275 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,578 UART: [fwproc] Recv command 0x4d454153
1,316,318 UART: [fwproc] Max # of measurements received.
1,316,963 >>> mbox cmd response: failed
1,317,435 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,212 >>> mbox cmd response data (12 bytes)
1,143,213 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,703 >>> mbox cmd response data (12 bytes)
1,146,704 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,158 >>> mbox cmd response data (12 bytes)
1,150,159 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,709 >>> mbox cmd response data (12 bytes)
1,153,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,082 >>> mbox cmd response data (12 bytes)
1,157,083 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,569 >>> mbox cmd response data (12 bytes)
1,160,570 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,956 >>> mbox cmd response data (12 bytes)
1,163,957 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,419 >>> mbox cmd response data (12 bytes)
1,167,420 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,656 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
891,707 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,811 UART: [kat] ++
895,963 UART: [kat] sha1
900,235 UART: [kat] SHA2-256
902,175 UART: [kat] SHA2-384
904,892 UART: [kat] SHA2-512-ACC
906,793 UART: [kat] ECC-384
916,734 UART: [kat] HMAC-384Kdf
921,308 UART: [kat] LMS
1,169,620 UART: [kat] --
1,170,285 UART: [cold-reset] ++
1,170,623 UART: [fht] FHT @ 0x50003400
1,173,269 UART: [idev] ++
1,173,437 UART: [idev] CDI.KEYID = 6
1,173,798 UART: [idev] SUBJECT.KEYID = 7
1,174,223 UART: [idev] UDS.KEYID = 0
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,200,076 UART: [idev] Sha1 KeyId Algorithm
1,208,964 UART: [idev] --
1,209,891 UART: [ldev] ++
1,210,059 UART: [ldev] CDI.KEYID = 6
1,210,423 UART: [ldev] SUBJECT.KEYID = 5
1,210,850 UART: [ldev] AUTHORITY.KEYID = 7
1,211,313 UART: [ldev] FE.KEYID = 1
1,216,571 UART: [ldev] Erasing FE.KEYID = 1
1,243,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,749 UART: [ldev] --
1,282,202 UART: [fwproc] Wait for Commands...
1,282,833 UART: [fwproc] Recv command 0x4d454153
1,286,856 >>> mbox cmd response data (12 bytes)
1,286,857 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,124 UART: [fwproc] Recv command 0x4d454153
1,291,147 >>> mbox cmd response data (12 bytes)
1,291,148 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,325 UART: [fwproc] Recv command 0x4d454153
1,295,348 >>> mbox cmd response data (12 bytes)
1,295,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,544 UART: [fwproc] Recv command 0x4d454153
1,299,567 >>> mbox cmd response data (12 bytes)
1,299,568 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,843 UART: [fwproc] Recv command 0x4d454153
1,303,866 >>> mbox cmd response data (12 bytes)
1,303,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,132 UART: [fwproc] Recv command 0x4d454153
1,308,155 >>> mbox cmd response data (12 bytes)
1,308,156 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,397 UART: [fwproc] Recv command 0x4d454153
1,312,420 >>> mbox cmd response data (12 bytes)
1,312,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,662 UART: [fwproc] Recv command 0x4d454153
1,316,685 >>> mbox cmd response data (12 bytes)
1,316,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,903 UART: [fwproc] Recv command 0x4d454153
1,317,643 UART: [fwproc] Max # of measurements received.
1,318,288 >>> mbox cmd response: failed
1,318,656 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,801 >>> mbox cmd response data (12 bytes)
1,142,802 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,380 >>> mbox cmd response data (12 bytes)
1,146,381 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,813 >>> mbox cmd response data (12 bytes)
1,149,814 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,408 >>> mbox cmd response data (12 bytes)
1,153,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,875 >>> mbox cmd response data (12 bytes)
1,156,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,322 >>> mbox cmd response data (12 bytes)
1,160,323 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,723 >>> mbox cmd response data (12 bytes)
1,163,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,298 >>> mbox cmd response data (12 bytes)
1,167,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,615 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
891,206 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,310 UART: [kat] ++
895,462 UART: [kat] sha1
899,588 UART: [kat] SHA2-256
901,528 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,649 UART: [kat] LMS
1,168,961 UART: [kat] --
1,169,878 UART: [cold-reset] ++
1,170,212 UART: [fht] FHT @ 0x50003400
1,172,904 UART: [idev] ++
1,173,072 UART: [idev] CDI.KEYID = 6
1,173,433 UART: [idev] SUBJECT.KEYID = 7
1,173,858 UART: [idev] UDS.KEYID = 0
1,181,713 UART: [idev] Erasing UDS.KEYID = 0
1,198,503 UART: [idev] Sha1 KeyId Algorithm
1,207,489 UART: [idev] --
1,208,706 UART: [ldev] ++
1,208,874 UART: [ldev] CDI.KEYID = 6
1,209,238 UART: [ldev] SUBJECT.KEYID = 5
1,209,665 UART: [ldev] AUTHORITY.KEYID = 7
1,210,128 UART: [ldev] FE.KEYID = 1
1,215,346 UART: [ldev] Erasing FE.KEYID = 1
1,242,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,402 UART: [ldev] --
1,281,705 UART: [fwproc] Wait for Commands...
1,282,340 UART: [fwproc] Recv command 0x4d454153
1,286,363 >>> mbox cmd response data (12 bytes)
1,286,364 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,445 UART: [fwproc] Recv command 0x4d454153
1,290,468 >>> mbox cmd response data (12 bytes)
1,290,469 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,722 UART: [fwproc] Recv command 0x4d454153
1,294,745 >>> mbox cmd response data (12 bytes)
1,294,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,817 UART: [fwproc] Recv command 0x4d454153
1,298,840 >>> mbox cmd response data (12 bytes)
1,298,841 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,118 UART: [fwproc] Recv command 0x4d454153
1,303,141 >>> mbox cmd response data (12 bytes)
1,303,142 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,335 UART: [fwproc] Recv command 0x4d454153
1,307,358 >>> mbox cmd response data (12 bytes)
1,307,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,614 UART: [fwproc] Recv command 0x4d454153
1,311,637 >>> mbox cmd response data (12 bytes)
1,311,638 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,855 UART: [fwproc] Recv command 0x4d454153
1,315,878 >>> mbox cmd response data (12 bytes)
1,315,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,968 UART: [fwproc] Recv command 0x4d454153
1,316,708 UART: [fwproc] Max # of measurements received.
1,317,353 >>> mbox cmd response: failed
1,317,705 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,774 >>> mbox cmd response data (12 bytes)
1,140,775 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,199 >>> mbox cmd response data (12 bytes)
1,144,200 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,634 >>> mbox cmd response data (12 bytes)
1,147,635 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,103 >>> mbox cmd response data (12 bytes)
1,151,104 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,484 >>> mbox cmd response data (12 bytes)
1,154,485 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,061 >>> mbox cmd response data (12 bytes)
1,158,062 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,546 >>> mbox cmd response data (12 bytes)
1,161,547 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,151 >>> mbox cmd response data (12 bytes)
1,165,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,330 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,447 UART: [kat] ++
895,599 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,670 UART: [kat] SHA2-512-ACC
906,571 UART: [kat] ECC-384
916,762 UART: [kat] HMAC-384Kdf
921,220 UART: [kat] LMS
1,169,532 UART: [kat] --
1,170,275 UART: [cold-reset] ++
1,170,813 UART: [fht] FHT @ 0x50003400
1,173,259 UART: [idev] ++
1,173,427 UART: [idev] CDI.KEYID = 6
1,173,788 UART: [idev] SUBJECT.KEYID = 7
1,174,213 UART: [idev] UDS.KEYID = 0
1,182,146 UART: [idev] Erasing UDS.KEYID = 0
1,199,064 UART: [idev] Sha1 KeyId Algorithm
1,207,760 UART: [idev] --
1,208,813 UART: [ldev] ++
1,208,981 UART: [ldev] CDI.KEYID = 6
1,209,345 UART: [ldev] SUBJECT.KEYID = 5
1,209,772 UART: [ldev] AUTHORITY.KEYID = 7
1,210,235 UART: [ldev] FE.KEYID = 1
1,215,679 UART: [ldev] Erasing FE.KEYID = 1
1,242,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,725 UART: [ldev] --
1,282,014 UART: [fwproc] Wait for Commands...
1,282,819 UART: [fwproc] Recv command 0x4d454153
1,286,842 >>> mbox cmd response data (12 bytes)
1,286,843 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,058 UART: [fwproc] Recv command 0x4d454153
1,291,081 >>> mbox cmd response data (12 bytes)
1,291,082 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,169 UART: [fwproc] Recv command 0x4d454153
1,295,192 >>> mbox cmd response data (12 bytes)
1,295,193 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,366 UART: [fwproc] Recv command 0x4d454153
1,299,389 >>> mbox cmd response data (12 bytes)
1,299,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,533 UART: [fwproc] Recv command 0x4d454153
1,303,556 >>> mbox cmd response data (12 bytes)
1,303,557 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,742 UART: [fwproc] Recv command 0x4d454153
1,307,765 >>> mbox cmd response data (12 bytes)
1,307,766 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,049 UART: [fwproc] Recv command 0x4d454153
1,312,072 >>> mbox cmd response data (12 bytes)
1,312,073 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,304 UART: [fwproc] Recv command 0x4d454153
1,316,327 >>> mbox cmd response data (12 bytes)
1,316,328 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,615 UART: [fwproc] Recv command 0x4d454153
1,317,355 UART: [fwproc] Max # of measurements received.
1,318,000 >>> mbox cmd response: failed
1,318,370 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,309 >>> mbox cmd response data (12 bytes)
1,143,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,712 >>> mbox cmd response data (12 bytes)
1,146,713 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,319 >>> mbox cmd response data (12 bytes)
1,150,320 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,846 >>> mbox cmd response data (12 bytes)
1,153,847 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,343 >>> mbox cmd response data (12 bytes)
1,157,344 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,762 >>> mbox cmd response data (12 bytes)
1,160,763 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,211 >>> mbox cmd response data (12 bytes)
1,164,212 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,658 >>> mbox cmd response data (12 bytes)
1,167,659 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,871 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [kat] SHA2-256
891,554 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
900,136 UART: [kat] SHA2-256
902,076 UART: [kat] SHA2-384
904,633 UART: [kat] SHA2-512-ACC
906,534 UART: [kat] ECC-384
915,997 UART: [kat] HMAC-384Kdf
920,643 UART: [kat] LMS
1,168,955 UART: [kat] --
1,169,896 UART: [cold-reset] ++
1,170,434 UART: [fht] FHT @ 0x50003400
1,173,164 UART: [idev] ++
1,173,332 UART: [idev] CDI.KEYID = 6
1,173,693 UART: [idev] SUBJECT.KEYID = 7
1,174,118 UART: [idev] UDS.KEYID = 0
1,181,771 UART: [idev] Erasing UDS.KEYID = 0
1,198,711 UART: [idev] Sha1 KeyId Algorithm
1,207,387 UART: [idev] --
1,208,478 UART: [ldev] ++
1,208,646 UART: [ldev] CDI.KEYID = 6
1,209,010 UART: [ldev] SUBJECT.KEYID = 5
1,209,437 UART: [ldev] AUTHORITY.KEYID = 7
1,209,900 UART: [ldev] FE.KEYID = 1
1,215,018 UART: [ldev] Erasing FE.KEYID = 1
1,240,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,552 UART: [ldev] --
1,279,867 UART: [fwproc] Wait for Commands...
1,280,506 UART: [fwproc] Recv command 0x4d454153
1,284,529 >>> mbox cmd response data (12 bytes)
1,284,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,284,711 UART: [fwproc] Recv command 0x4d454153
1,288,734 >>> mbox cmd response data (12 bytes)
1,288,735 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,288,984 UART: [fwproc] Recv command 0x4d454153
1,293,007 >>> mbox cmd response data (12 bytes)
1,293,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,317 UART: [fwproc] Recv command 0x4d454153
1,297,340 >>> mbox cmd response data (12 bytes)
1,297,341 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,492 UART: [fwproc] Recv command 0x4d454153
1,301,515 >>> mbox cmd response data (12 bytes)
1,301,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,599 UART: [fwproc] Recv command 0x4d454153
1,305,622 >>> mbox cmd response data (12 bytes)
1,305,623 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,305,722 UART: [fwproc] Recv command 0x4d454153
1,309,745 >>> mbox cmd response data (12 bytes)
1,309,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,309,815 UART: [fwproc] Recv command 0x4d454153
1,313,838 >>> mbox cmd response data (12 bytes)
1,313,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,314,034 UART: [fwproc] Recv command 0x4d454153
1,314,774 UART: [fwproc] Max # of measurements received.
1,315,419 >>> mbox cmd response: failed
1,315,695 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,614 >>> mbox cmd response data (12 bytes)
1,141,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,981 >>> mbox cmd response data (12 bytes)
1,144,982 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,390 >>> mbox cmd response data (12 bytes)
1,148,391 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,921 >>> mbox cmd response data (12 bytes)
1,151,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,360 >>> mbox cmd response data (12 bytes)
1,155,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,897 >>> mbox cmd response data (12 bytes)
1,158,898 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,380 >>> mbox cmd response data (12 bytes)
1,162,381 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,915 >>> mbox cmd response data (12 bytes)
1,165,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,166,212 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,663 UART: [kat] ++
895,815 UART: [kat] sha1
900,217 UART: [kat] SHA2-256
902,157 UART: [kat] SHA2-384
904,792 UART: [kat] SHA2-512-ACC
906,693 UART: [kat] ECC-384
916,906 UART: [kat] HMAC-384Kdf
921,560 UART: [kat] LMS
1,169,872 UART: [kat] --
1,170,863 UART: [cold-reset] ++
1,171,373 UART: [fht] FHT @ 0x50003400
1,173,887 UART: [idev] ++
1,174,055 UART: [idev] CDI.KEYID = 6
1,174,416 UART: [idev] SUBJECT.KEYID = 7
1,174,841 UART: [idev] UDS.KEYID = 0
1,182,804 UART: [idev] Erasing UDS.KEYID = 0
1,199,654 UART: [idev] Sha1 KeyId Algorithm
1,208,644 UART: [idev] --
1,209,697 UART: [ldev] ++
1,209,865 UART: [ldev] CDI.KEYID = 6
1,210,229 UART: [ldev] SUBJECT.KEYID = 5
1,210,656 UART: [ldev] AUTHORITY.KEYID = 7
1,211,119 UART: [ldev] FE.KEYID = 1
1,216,669 UART: [ldev] Erasing FE.KEYID = 1
1,243,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,417 UART: [ldev] --
1,282,624 UART: [fwproc] Wait for Commands...
1,283,201 UART: [fwproc] Recv command 0x4d454153
1,287,224 >>> mbox cmd response data (12 bytes)
1,287,225 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,492 UART: [fwproc] Recv command 0x4d454153
1,291,515 >>> mbox cmd response data (12 bytes)
1,291,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,777 UART: [fwproc] Recv command 0x4d454153
1,295,800 >>> mbox cmd response data (12 bytes)
1,295,801 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,036 UART: [fwproc] Recv command 0x4d454153
1,300,059 >>> mbox cmd response data (12 bytes)
1,300,060 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,265 UART: [fwproc] Recv command 0x4d454153
1,304,288 >>> mbox cmd response data (12 bytes)
1,304,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,378 UART: [fwproc] Recv command 0x4d454153
1,308,401 >>> mbox cmd response data (12 bytes)
1,308,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,491 UART: [fwproc] Recv command 0x4d454153
1,312,514 >>> mbox cmd response data (12 bytes)
1,312,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,792 UART: [fwproc] Recv command 0x4d454153
1,316,815 >>> mbox cmd response data (12 bytes)
1,316,816 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,317,103 UART: [fwproc] Recv command 0x4d454153
1,317,843 UART: [fwproc] Max # of measurements received.
1,318,488 >>> mbox cmd response: failed
1,318,960 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,083 >>> mbox cmd response data (12 bytes)
1,144,084 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,700 >>> mbox cmd response data (12 bytes)
1,147,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,105 >>> mbox cmd response data (12 bytes)
1,151,106 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,558 >>> mbox cmd response data (12 bytes)
1,154,559 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,943 >>> mbox cmd response data (12 bytes)
1,157,944 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,434 >>> mbox cmd response data (12 bytes)
1,161,435 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,973 >>> mbox cmd response data (12 bytes)
1,164,974 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,168,518 >>> mbox cmd response data (12 bytes)
1,168,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,168,805 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,228,823 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,374,193 UART:
2,374,607 UART: Running Caliptra ROM ...
2,375,781 UART:
2,375,963 UART: [state] CFI Enabled
2,376,937 UART: [state] LifecycleState = Unprovisioned
2,378,610 UART: [state] DebugLocked = No
2,379,724 UART: [state] WD Timer not started. Device not locked for debugging
2,382,205 UART: [kat] SHA2-256
2,382,883 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,385,912 UART: [kat] ++
2,386,372 UART: [kat] sha1
2,386,892 UART: [kat] SHA2-256
2,387,639 UART: [kat] SHA2-384
2,388,312 UART: [kat] SHA2-512-ACC
2,389,157 UART: [kat] ECC-384
2,945,737 UART: [kat] HMAC-384Kdf
2,969,729 UART: [kat] LMS
3,446,231 UART: [kat] --
3,451,140 UART: [cold-reset] ++
3,453,554 UART: [fht] FHT @ 0x50003400
3,465,344 UART: [idev] ++
3,465,955 UART: [idev] CDI.KEYID = 6
3,466,853 UART: [idev] SUBJECT.KEYID = 7
3,468,127 UART: [idev] UDS.KEYID = 0
3,500,079 UART: [idev] Erasing UDS.KEYID = 0
5,985,263 UART: [idev] Sha1 KeyId Algorithm
6,009,705 UART: [idev] --
6,015,060 UART: [ldev] ++
6,015,635 UART: [ldev] CDI.KEYID = 6
6,016,579 UART: [ldev] SUBJECT.KEYID = 5
6,017,798 UART: [ldev] AUTHORITY.KEYID = 7
6,019,608 UART: [ldev] FE.KEYID = 1
6,056,618 UART: [ldev] Erasing FE.KEYID = 1
8,564,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,633 UART: [ldev] --
10,371,179 UART: [fwproc] Wait for Commands...
10,373,386 UART: [fwproc] Recv command 0x46574c44
10,375,399 UART: [fwproc] Recv'd Img size: 114888 bytes
13,814,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,039 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,954,278 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,282,031 >>> mbox cmd response: success
14,285,792 UART: [afmc] ++
14,286,385 UART: [afmc] CDI.KEYID = 6
14,287,411 UART: [afmc] SUBJECT.KEYID = 7
14,288,573 UART: [afmc] AUTHORITY.KEYID = 5
16,828,090 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,668 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,591,471 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,607,556 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,623,087 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,646,671 UART: [afmc] --
18,650,792 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,651,171 UART: [cold-reset] --
18,655,015 UART: [state] Locking Datavault
18,659,534 UART: [state] Locking PCR0, PCR1 and PCR31
18,661,334 UART: [state] Locking ICCM
18,663,607 UART: [exit] Launching FMC @ 0x40000000
18,671,960 UART:
18,672,204 UART: Running Caliptra FMC ...
18,673,313 UART:
18,673,478 UART: [fmc] Received command: 0x10000009
18,674,999 >>> mbox cmd response data (48 bytes)
18,675,587 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,675,927 UART: [fmc] Received command: 0x1000000A
18,677,465 >>> mbox cmd response data (0 bytes)
18,677,737 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,678,051 UART: [fmc] Received command: 0x10000003
18,687,983 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
2,221,615 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,204,967 >>> mbox cmd response: success
18,476,183 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,490,312 UART:
18,490,650 UART: Running Caliptra FMC ...
18,491,843 UART:
18,492,015 UART: [fmc] Received command: 0x10000009
18,493,641 >>> mbox cmd response data (48 bytes)
18,494,242 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,494,566 UART: [fmc] Received command: 0x1000000A
18,496,154 >>> mbox cmd response data (0 bytes)
18,496,422 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,496,755 UART: [fmc] Received command: 0x10000003
18,506,718 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
2,226,918 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,372,220 UART:
2,372,641 UART: Running Caliptra ROM ...
2,373,727 UART:
2,373,879 UART: [state] CFI Enabled
2,374,842 UART: [state] LifecycleState = Unprovisioned
2,376,517 UART: [state] DebugLocked = No
2,377,549 UART: [state] WD Timer not started. Device not locked for debugging
2,380,016 UART: [kat] SHA2-256
2,380,684 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,383,711 UART: [kat] ++
2,384,161 UART: [kat] sha1
2,384,668 UART: [kat] SHA2-256
2,385,322 UART: [kat] SHA2-384
2,385,977 UART: [kat] SHA2-512-ACC
2,386,863 UART: [kat] ECC-384
3,277,564 UART: [kat] HMAC-384Kdf
3,290,522 UART: [kat] LMS
3,767,028 UART: [kat] --
3,772,775 UART: [cold-reset] ++
3,774,388 UART: [fht] FHT @ 0x50003400
3,784,985 UART: [idev] ++
3,785,768 UART: [idev] CDI.KEYID = 6
3,786,694 UART: [idev] SUBJECT.KEYID = 7
3,787,799 UART: [idev] UDS.KEYID = 0
3,805,875 UART: [idev] Erasing UDS.KEYID = 0
6,265,769 UART: [idev] Sha1 KeyId Algorithm
6,289,527 UART: [idev] --
6,295,194 UART: [ldev] ++
6,295,764 UART: [ldev] CDI.KEYID = 6
6,296,723 UART: [ldev] SUBJECT.KEYID = 5
6,297,876 UART: [ldev] AUTHORITY.KEYID = 7
6,299,157 UART: [ldev] FE.KEYID = 1
6,309,420 UART: [ldev] Erasing FE.KEYID = 1
8,789,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,302 UART: [ldev] --
10,583,969 UART: [fwproc] Wait for Commands...
10,586,727 UART: [fwproc] Recv command 0x46574c44
10,588,822 UART: [fwproc] Recv'd Img size: 114888 bytes
14,030,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,282 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,169,514 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,497,973 >>> mbox cmd response: success
14,501,280 UART: [afmc] ++
14,501,867 UART: [afmc] CDI.KEYID = 6
14,502,832 UART: [afmc] SUBJECT.KEYID = 7
14,504,045 UART: [afmc] AUTHORITY.KEYID = 5
17,006,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,223 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,408 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,745,170 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,761,298 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,776,788 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,800,511 UART: [afmc] --
18,804,077 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,804,452 UART: [cold-reset] --
18,807,752 UART: [state] Locking Datavault
18,814,020 UART: [state] Locking PCR0, PCR1 and PCR31
18,815,773 UART: [state] Locking ICCM
18,818,191 UART: [exit] Launching FMC @ 0x40000000
18,826,582 UART:
18,826,858 UART: Running Caliptra FMC ...
18,827,966 UART:
18,828,123 UART: [fmc] Received command: 0x10000009
18,829,635 >>> mbox cmd response data (48 bytes)
18,830,232 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,830,574 UART: [fmc] Received command: 0x1000000A
18,832,101 >>> mbox cmd response data (0 bytes)
18,832,365 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,832,666 UART: [fmc] Received command: 0x10000003
18,842,640 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,231,816 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,385,240 >>> mbox cmd response: success
18,617,202 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,633,929 UART:
18,634,293 UART: Running Caliptra FMC ...
18,635,490 UART:
18,635,653 UART: [fmc] Received command: 0x10000009
18,637,273 >>> mbox cmd response data (48 bytes)
18,637,860 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,638,177 UART: [fmc] Received command: 0x1000000A
18,639,753 >>> mbox cmd response data (0 bytes)
18,640,017 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,640,324 UART: [fmc] Received command: 0x10000003
18,650,265 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
890,988 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,092 UART: [kat] ++
895,244 UART: [kat] sha1
899,580 UART: [kat] SHA2-256
901,520 UART: [kat] SHA2-384
904,191 UART: [kat] SHA2-512-ACC
906,092 UART: [kat] ECC-384
915,301 UART: [kat] HMAC-384Kdf
919,927 UART: [kat] LMS
1,168,239 UART: [kat] --
1,169,226 UART: [cold-reset] ++
1,169,744 UART: [fht] FHT @ 0x50003400
1,172,174 UART: [idev] ++
1,172,342 UART: [idev] CDI.KEYID = 6
1,172,703 UART: [idev] SUBJECT.KEYID = 7
1,173,128 UART: [idev] UDS.KEYID = 0
1,180,785 UART: [idev] Erasing UDS.KEYID = 0
1,198,037 UART: [idev] Sha1 KeyId Algorithm
1,206,925 UART: [idev] --
1,207,874 UART: [ldev] ++
1,208,042 UART: [ldev] CDI.KEYID = 6
1,208,406 UART: [ldev] SUBJECT.KEYID = 5
1,208,833 UART: [ldev] AUTHORITY.KEYID = 7
1,209,296 UART: [ldev] FE.KEYID = 1
1,214,798 UART: [ldev] Erasing FE.KEYID = 1
1,240,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,462 UART: [ldev] --
1,279,705 UART: [fwproc] Wait for Commands...
1,280,294 UART: [fwproc] Recv command 0x46574c44
1,281,027 UART: [fwproc] Recv'd Img size: 114888 bytes
2,583,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,842 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,527 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,800 >>> mbox cmd response: success
2,778,842 UART: [afmc] ++
2,779,010 UART: [afmc] CDI.KEYID = 6
2,779,373 UART: [afmc] SUBJECT.KEYID = 7
2,779,799 UART: [afmc] AUTHORITY.KEYID = 5
2,815,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,968 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,664 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,563 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,256 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,100 UART: [afmc] --
2,858,135 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,858,157 UART: [cold-reset] --
2,859,057 UART: [state] Locking Datavault
2,859,992 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,596 UART: [state] Locking ICCM
2,861,100 UART: [exit] Launching FMC @ 0x40000000
2,866,397 UART:
2,866,413 UART: Running Caliptra FMC ...
2,866,821 UART:
2,867,051 UART: [fmc] Received command: 0x10000009
2,868,249 >>> mbox cmd response data (48 bytes)
2,868,250 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,868,279 UART: [fmc] Received command: 0x1000000A
2,869,019 >>> mbox cmd response data (0 bytes)
2,869,020 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,869,049 UART: [fmc] Received command: 0x10000003
2,878,505 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,205 >>> mbox cmd response: success
2,687,888 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,694,131 UART:
2,694,147 UART: Running Caliptra FMC ...
2,694,555 UART:
2,694,785 UART: [fmc] Received command: 0x10000009
2,695,983 >>> mbox cmd response data (48 bytes)
2,695,984 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,696,013 UART: [fmc] Received command: 0x1000000A
2,696,753 >>> mbox cmd response data (0 bytes)
2,696,754 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,696,783 UART: [fmc] Received command: 0x10000003
2,706,239 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,671 UART: [kat] ++
895,823 UART: [kat] sha1
900,111 UART: [kat] SHA2-256
902,051 UART: [kat] SHA2-384
904,956 UART: [kat] SHA2-512-ACC
906,857 UART: [kat] ECC-384
916,698 UART: [kat] HMAC-384Kdf
921,370 UART: [kat] LMS
1,169,682 UART: [kat] --
1,170,761 UART: [cold-reset] ++
1,171,105 UART: [fht] FHT @ 0x50003400
1,174,005 UART: [idev] ++
1,174,173 UART: [idev] CDI.KEYID = 6
1,174,534 UART: [idev] SUBJECT.KEYID = 7
1,174,959 UART: [idev] UDS.KEYID = 0
1,183,056 UART: [idev] Erasing UDS.KEYID = 0
1,200,578 UART: [idev] Sha1 KeyId Algorithm
1,209,516 UART: [idev] --
1,210,383 UART: [ldev] ++
1,210,551 UART: [ldev] CDI.KEYID = 6
1,210,915 UART: [ldev] SUBJECT.KEYID = 5
1,211,342 UART: [ldev] AUTHORITY.KEYID = 7
1,211,805 UART: [ldev] FE.KEYID = 1
1,217,193 UART: [ldev] Erasing FE.KEYID = 1
1,243,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,511 UART: [ldev] --
1,282,866 UART: [fwproc] Wait for Commands...
1,283,575 UART: [fwproc] Recv command 0x46574c44
1,284,308 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,985 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,670 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,071 >>> mbox cmd response: success
2,781,225 UART: [afmc] ++
2,781,393 UART: [afmc] CDI.KEYID = 6
2,781,756 UART: [afmc] SUBJECT.KEYID = 7
2,782,182 UART: [afmc] AUTHORITY.KEYID = 5
2,817,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,919 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,615 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,514 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,207 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,949 UART: [afmc] --
2,860,828 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,860,850 UART: [cold-reset] --
2,861,512 UART: [state] Locking Datavault
2,862,381 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,985 UART: [state] Locking ICCM
2,863,635 UART: [exit] Launching FMC @ 0x40000000
2,868,932 UART:
2,868,948 UART: Running Caliptra FMC ...
2,869,356 UART:
2,869,586 UART: [fmc] Received command: 0x10000009
2,870,784 >>> mbox cmd response data (48 bytes)
2,870,785 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,870,814 UART: [fmc] Received command: 0x1000000A
2,871,554 >>> mbox cmd response data (0 bytes)
2,871,555 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,871,584 UART: [fmc] Received command: 0x10000003
2,881,040 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,364 >>> mbox cmd response: success
2,687,981 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,694,218 UART:
2,694,234 UART: Running Caliptra FMC ...
2,694,642 UART:
2,694,872 UART: [fmc] Received command: 0x10000009
2,696,070 >>> mbox cmd response data (48 bytes)
2,696,071 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,696,100 UART: [fmc] Received command: 0x1000000A
2,696,840 >>> mbox cmd response data (0 bytes)
2,696,841 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,696,870 UART: [fmc] Received command: 0x10000003
2,706,326 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,106 UART: [kat] ++
895,258 UART: [kat] sha1
899,520 UART: [kat] SHA2-256
901,460 UART: [kat] SHA2-384
904,389 UART: [kat] SHA2-512-ACC
906,290 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,541 UART: [kat] LMS
1,168,853 UART: [kat] --
1,169,794 UART: [cold-reset] ++
1,170,308 UART: [fht] FHT @ 0x50003400
1,173,106 UART: [idev] ++
1,173,274 UART: [idev] CDI.KEYID = 6
1,173,635 UART: [idev] SUBJECT.KEYID = 7
1,174,060 UART: [idev] UDS.KEYID = 0
1,181,633 UART: [idev] Erasing UDS.KEYID = 0
1,198,307 UART: [idev] Sha1 KeyId Algorithm
1,207,255 UART: [idev] --
1,208,470 UART: [ldev] ++
1,208,638 UART: [ldev] CDI.KEYID = 6
1,209,002 UART: [ldev] SUBJECT.KEYID = 5
1,209,429 UART: [ldev] AUTHORITY.KEYID = 7
1,209,892 UART: [ldev] FE.KEYID = 1
1,215,070 UART: [ldev] Erasing FE.KEYID = 1
1,241,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,296 UART: [ldev] --
1,280,741 UART: [fwproc] Wait for Commands...
1,281,522 UART: [fwproc] Recv command 0x46574c44
1,282,255 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,940 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,625 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,944 >>> mbox cmd response: success
2,781,022 UART: [afmc] ++
2,781,190 UART: [afmc] CDI.KEYID = 6
2,781,553 UART: [afmc] SUBJECT.KEYID = 7
2,781,979 UART: [afmc] AUTHORITY.KEYID = 5
2,817,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,514 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,210 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,109 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,802 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,576 UART: [afmc] --
2,860,455 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,860,477 UART: [cold-reset] --
2,861,297 UART: [state] Locking Datavault
2,862,352 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,956 UART: [state] Locking ICCM
2,863,498 UART: [exit] Launching FMC @ 0x40000000
2,868,795 UART:
2,868,811 UART: Running Caliptra FMC ...
2,869,219 UART:
2,869,449 UART: [fmc] Received command: 0x10000009
2,870,647 >>> mbox cmd response data (48 bytes)
2,870,648 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,870,677 UART: [fmc] Received command: 0x1000000A
2,871,417 >>> mbox cmd response data (0 bytes)
2,871,418 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,871,447 UART: [fmc] Received command: 0x10000003
2,880,903 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,629,401 >>> mbox cmd response: success
2,685,312 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,691,003 UART:
2,691,019 UART: Running Caliptra FMC ...
2,691,427 UART:
2,691,657 UART: [fmc] Received command: 0x10000009
2,692,855 >>> mbox cmd response data (48 bytes)
2,692,856 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,692,885 UART: [fmc] Received command: 0x1000000A
2,693,625 >>> mbox cmd response data (0 bytes)
2,693,626 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,693,655 UART: [fmc] Received command: 0x10000003
2,703,111 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
891,591 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,695 UART: [kat] ++
895,847 UART: [kat] sha1
900,131 UART: [kat] SHA2-256
902,071 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,620 UART: [kat] HMAC-384Kdf
921,358 UART: [kat] LMS
1,169,670 UART: [kat] --
1,170,549 UART: [cold-reset] ++
1,170,963 UART: [fht] FHT @ 0x50003400
1,173,839 UART: [idev] ++
1,174,007 UART: [idev] CDI.KEYID = 6
1,174,368 UART: [idev] SUBJECT.KEYID = 7
1,174,793 UART: [idev] UDS.KEYID = 0
1,182,682 UART: [idev] Erasing UDS.KEYID = 0
1,199,474 UART: [idev] Sha1 KeyId Algorithm
1,208,290 UART: [idev] --
1,209,149 UART: [ldev] ++
1,209,317 UART: [ldev] CDI.KEYID = 6
1,209,681 UART: [ldev] SUBJECT.KEYID = 5
1,210,108 UART: [ldev] AUTHORITY.KEYID = 7
1,210,571 UART: [ldev] FE.KEYID = 1
1,215,923 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,821 UART: [ldev] --
1,281,040 UART: [fwproc] Wait for Commands...
1,281,843 UART: [fwproc] Recv command 0x46574c44
1,282,576 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,875 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,560 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,893 >>> mbox cmd response: success
2,779,119 UART: [afmc] ++
2,779,287 UART: [afmc] CDI.KEYID = 6
2,779,650 UART: [afmc] SUBJECT.KEYID = 7
2,780,076 UART: [afmc] AUTHORITY.KEYID = 5
2,815,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,133 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,829 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,728 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,421 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,199 UART: [afmc] --
2,858,048 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,858,070 UART: [cold-reset] --
2,858,980 UART: [state] Locking Datavault
2,860,133 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,737 UART: [state] Locking ICCM
2,861,235 UART: [exit] Launching FMC @ 0x40000000
2,866,532 UART:
2,866,548 UART: Running Caliptra FMC ...
2,866,956 UART:
2,867,186 UART: [fmc] Received command: 0x10000009
2,868,384 >>> mbox cmd response data (48 bytes)
2,868,385 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,868,414 UART: [fmc] Received command: 0x1000000A
2,869,154 >>> mbox cmd response data (0 bytes)
2,869,155 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,869,184 UART: [fmc] Received command: 0x10000003
2,878,640 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,784 >>> mbox cmd response: success
2,690,359 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,696,474 UART:
2,696,490 UART: Running Caliptra FMC ...
2,696,898 UART:
2,697,128 UART: [fmc] Received command: 0x10000009
2,698,326 >>> mbox cmd response data (48 bytes)
2,698,327 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,698,356 UART: [fmc] Received command: 0x1000000A
2,699,096 >>> mbox cmd response data (0 bytes)
2,699,097 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,699,126 UART: [fmc] Received command: 0x10000003
2,708,582 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,518 UART: [state] LifecycleState = Unprovisioned
86,173 UART: [state] DebugLocked = No
86,827 UART: [state] WD Timer not started. Device not locked for debugging
88,138 UART: [kat] SHA2-256
891,688 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,792 UART: [kat] ++
895,944 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,305 UART: [kat] HMAC-384Kdf
921,017 UART: [kat] LMS
1,169,329 UART: [kat] --
1,170,322 UART: [cold-reset] ++
1,170,694 UART: [fht] FHT @ 0x50003400
1,173,234 UART: [idev] ++
1,173,402 UART: [idev] CDI.KEYID = 6
1,173,763 UART: [idev] SUBJECT.KEYID = 7
1,174,188 UART: [idev] UDS.KEYID = 0
1,182,035 UART: [idev] Erasing UDS.KEYID = 0
1,198,965 UART: [idev] Sha1 KeyId Algorithm
1,207,913 UART: [idev] --
1,208,994 UART: [ldev] ++
1,209,162 UART: [ldev] CDI.KEYID = 6
1,209,526 UART: [ldev] SUBJECT.KEYID = 5
1,209,953 UART: [ldev] AUTHORITY.KEYID = 7
1,210,416 UART: [ldev] FE.KEYID = 1
1,215,762 UART: [ldev] Erasing FE.KEYID = 1
1,241,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,342 UART: [ldev] --
1,280,741 UART: [fwproc] Wait for Commands...
1,281,402 UART: [fwproc] Recv command 0x46574c44
1,282,135 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,582 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,267 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,636 >>> mbox cmd response: success
2,778,764 UART: [afmc] ++
2,778,932 UART: [afmc] CDI.KEYID = 6
2,779,295 UART: [afmc] SUBJECT.KEYID = 7
2,779,721 UART: [afmc] AUTHORITY.KEYID = 5
2,815,376 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,621 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,370 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,066 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,965 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,658 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,462 UART: [afmc] --
2,858,255 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,858,277 UART: [cold-reset] --
2,859,165 UART: [state] Locking Datavault
2,860,402 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,006 UART: [state] Locking ICCM
2,861,440 UART: [exit] Launching FMC @ 0x40000000
2,866,737 UART:
2,866,753 UART: Running Caliptra FMC ...
2,867,161 UART:
2,867,391 UART: [fmc] Received command: 0x10000009
2,868,589 >>> mbox cmd response data (48 bytes)
2,868,590 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,868,619 UART: [fmc] Received command: 0x1000000A
2,869,359 >>> mbox cmd response data (0 bytes)
2,869,360 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,869,389 UART: [fmc] Received command: 0x10000003
2,878,845 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,973 >>> mbox cmd response: success
2,689,002 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,694,909 UART:
2,694,925 UART: Running Caliptra FMC ...
2,695,333 UART:
2,695,563 UART: [fmc] Received command: 0x10000009
2,696,761 >>> mbox cmd response data (48 bytes)
2,696,762 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,696,791 UART: [fmc] Received command: 0x1000000A
2,697,531 >>> mbox cmd response data (0 bytes)
2,697,532 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,697,561 UART: [fmc] Received command: 0x10000003
2,707,017 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,703 UART: [kat] SHA2-256
901,643 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
915,850 UART: [kat] HMAC-384Kdf
920,542 UART: [kat] LMS
1,168,854 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,170,147 UART: [fht] FHT @ 0x50003400
1,172,741 UART: [idev] ++
1,172,909 UART: [idev] CDI.KEYID = 6
1,173,270 UART: [idev] SUBJECT.KEYID = 7
1,173,695 UART: [idev] UDS.KEYID = 0
1,181,382 UART: [idev] Erasing UDS.KEYID = 0
1,198,396 UART: [idev] Sha1 KeyId Algorithm
1,207,216 UART: [idev] --
1,208,079 UART: [ldev] ++
1,208,247 UART: [ldev] CDI.KEYID = 6
1,208,611 UART: [ldev] SUBJECT.KEYID = 5
1,209,038 UART: [ldev] AUTHORITY.KEYID = 7
1,209,501 UART: [ldev] FE.KEYID = 1
1,214,903 UART: [ldev] Erasing FE.KEYID = 1
1,240,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,595 UART: [ldev] --
1,280,040 UART: [fwproc] Wait for Commands...
1,280,619 UART: [fwproc] Recv command 0x46574c44
1,281,352 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,069 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,754 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,919 >>> mbox cmd response: success
2,778,023 UART: [afmc] ++
2,778,191 UART: [afmc] CDI.KEYID = 6
2,778,554 UART: [afmc] SUBJECT.KEYID = 7
2,778,980 UART: [afmc] AUTHORITY.KEYID = 5
2,815,057 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,923 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,619 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,518 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,211 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,013 UART: [afmc] --
2,857,886 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,857,908 UART: [cold-reset] --
2,858,914 UART: [state] Locking Datavault
2,860,139 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,743 UART: [state] Locking ICCM
2,861,207 UART: [exit] Launching FMC @ 0x40000000
2,866,504 UART:
2,866,520 UART: Running Caliptra FMC ...
2,866,928 UART:
2,867,158 UART: [fmc] Received command: 0x10000009
2,868,356 >>> mbox cmd response data (48 bytes)
2,868,357 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,868,386 UART: [fmc] Received command: 0x1000000A
2,869,126 >>> mbox cmd response data (0 bytes)
2,869,127 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,869,156 UART: [fmc] Received command: 0x10000003
2,878,612 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,324 >>> mbox cmd response: success
2,687,479 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,693,508 UART:
2,693,524 UART: Running Caliptra FMC ...
2,693,932 UART:
2,694,162 UART: [fmc] Received command: 0x10000009
2,695,360 >>> mbox cmd response data (48 bytes)
2,695,361 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,695,390 UART: [fmc] Received command: 0x1000000A
2,696,130 >>> mbox cmd response data (0 bytes)
2,696,131 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,696,160 UART: [fmc] Received command: 0x10000003
2,705,616 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
2,229,786 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,231,116 UART:
2,231,373 UART: Running Caliptra ROM ...
2,232,452 UART:
2,232,614 UART: [state] CFI Enabled
2,233,491 UART: [state] LifecycleState = Unprovisioned
2,235,174 UART: [state] DebugLocked = No
2,236,299 UART: [state] WD Timer not started. Device not locked for debugging
2,238,780 UART: [kat] SHA2-256
2,239,455 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,242,472 UART: [kat] ++
2,242,937 UART: [kat] sha1
2,243,502 UART: [kat] SHA2-256
2,244,168 UART: [kat] SHA2-384
2,244,857 UART: [kat] SHA2-512-ACC
2,245,697 UART: [kat] ECC-384
2,924,554 UART: [kat] HMAC-384Kdf
2,949,215 UART: [kat] LMS
3,425,719 UART: [kat] --
3,428,796 UART: [cold-reset] ++
3,431,054 UART: [fht] FHT @ 0x50003400
3,442,688 UART: [idev] ++
3,443,263 UART: [idev] CDI.KEYID = 6
3,444,282 UART: [idev] SUBJECT.KEYID = 7
3,445,450 UART: [idev] UDS.KEYID = 0
3,478,773 UART: [idev] Erasing UDS.KEYID = 0
5,962,844 UART: [idev] Sha1 KeyId Algorithm
5,986,939 UART: [idev] --
5,991,805 UART: [ldev] ++
5,992,379 UART: [ldev] CDI.KEYID = 6
5,993,371 UART: [ldev] SUBJECT.KEYID = 5
5,994,539 UART: [ldev] AUTHORITY.KEYID = 7
5,995,779 UART: [ldev] FE.KEYID = 1
6,035,007 UART: [ldev] Erasing FE.KEYID = 1
8,538,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,344,912 UART: [ldev] --
10,350,816 UART: [fwproc] Wait for Commands...
10,353,637 UART: [fwproc] Recv command 0x4d454153
10,362,882 >>> mbox cmd response data (12 bytes)
10,364,788 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
10,509,397 UART: [fwproc] Recv command 0x46574c44
10,511,454 UART: [fwproc] Recv'd Img size: 114888 bytes
13,949,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,026,911 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,087,098 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,414,729 >>> mbox cmd response: success
14,418,011 UART: [afmc] ++
14,418,619 UART: [afmc] CDI.KEYID = 6
14,419,774 UART: [afmc] SUBJECT.KEYID = 7
14,420,908 UART: [afmc] AUTHORITY.KEYID = 5
16,958,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,701,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,703,549 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,719,315 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,735,385 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,750,944 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,774,808 UART: [afmc] --
18,778,520 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,778,905 UART: [cold-reset] --
18,781,244 UART: [state] Locking Datavault
18,786,821 UART: [state] Locking PCR0, PCR1 and PCR31
18,788,528 UART: [state] Locking ICCM
18,790,820 UART: [exit] Launching FMC @ 0x40000000
18,799,171 UART:
18,799,418 UART: Running Caliptra FMC ...
18,800,450 UART:
18,800,606 UART: [fmc] Received command: 0x1000000A
18,802,400 >>> mbox cmd response data (116 bytes)
18,803,942 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,804,281 UART: [fmc] Received command: 0x10000009
18,806,101 >>> mbox cmd response data (48 bytes)
18,807,656 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,808,017 UART: [fmc] Received command: 0x10000003
18,817,959 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,220,350 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,269,765 >>> mbox cmd response data (12 bytes)
10,272,089 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,312,121 >>> mbox cmd response: success
18,582,437 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,595,349 UART:
18,595,669 UART: Running Caliptra FMC ...
18,596,740 UART:
18,596,898 UART: [fmc] Received command: 0x1000000A
18,598,543 >>> mbox cmd response data (116 bytes)
18,599,980 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,600,324 UART: [fmc] Received command: 0x10000009
18,602,095 >>> mbox cmd response data (48 bytes)
18,603,601 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,603,961 UART: [fmc] Received command: 0x10000003
18,613,937 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
2,238,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,240,029 UART:
2,240,286 UART: Running Caliptra ROM ...
2,241,349 UART:
2,241,503 UART: [state] CFI Enabled
2,242,416 UART: [state] LifecycleState = Unprovisioned
2,244,098 UART: [state] DebugLocked = No
2,245,150 UART: [state] WD Timer not started. Device not locked for debugging
2,247,634 UART: [kat] SHA2-256
2,248,300 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,251,307 UART: [kat] ++
2,251,754 UART: [kat] sha1
2,252,262 UART: [kat] SHA2-256
2,252,915 UART: [kat] SHA2-384
2,253,568 UART: [kat] SHA2-512-ACC
2,254,366 UART: [kat] ECC-384
3,275,531 UART: [kat] HMAC-384Kdf
3,286,962 UART: [kat] LMS
3,763,447 UART: [kat] --
3,768,792 UART: [cold-reset] ++
3,771,262 UART: [fht] FHT @ 0x50003400
3,782,392 UART: [idev] ++
3,782,998 UART: [idev] CDI.KEYID = 6
3,783,904 UART: [idev] SUBJECT.KEYID = 7
3,785,126 UART: [idev] UDS.KEYID = 0
3,801,460 UART: [idev] Erasing UDS.KEYID = 0
6,261,962 UART: [idev] Sha1 KeyId Algorithm
6,285,566 UART: [idev] --
6,291,349 UART: [ldev] ++
6,291,957 UART: [ldev] CDI.KEYID = 6
6,292,837 UART: [ldev] SUBJECT.KEYID = 5
6,294,045 UART: [ldev] AUTHORITY.KEYID = 7
6,295,338 UART: [ldev] FE.KEYID = 1
6,306,390 UART: [ldev] Erasing FE.KEYID = 1
8,783,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,771 UART: [ldev] --
10,577,414 UART: [fwproc] Wait for Commands...
10,579,408 UART: [fwproc] Recv command 0x4d454153
10,588,651 >>> mbox cmd response data (12 bytes)
10,590,548 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
10,735,514 UART: [fwproc] Recv command 0x46574c44
10,737,593 UART: [fwproc] Recv'd Img size: 114888 bytes
14,179,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,256,379 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,316,595 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,645,636 >>> mbox cmd response: success
14,650,661 UART: [afmc] ++
14,651,245 UART: [afmc] CDI.KEYID = 6
14,652,218 UART: [afmc] SUBJECT.KEYID = 7
14,653,374 UART: [afmc] AUTHORITY.KEYID = 5
17,153,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,155 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,891,980 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,908,033 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,923,519 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,948,965 UART: [afmc] --
18,951,978 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,952,345 UART: [cold-reset] --
18,956,235 UART: [state] Locking Datavault
18,962,615 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,374 UART: [state] Locking ICCM
18,966,278 UART: [exit] Launching FMC @ 0x40000000
18,974,612 UART:
18,974,844 UART: Running Caliptra FMC ...
18,975,864 UART:
18,976,006 UART: [fmc] Received command: 0x1000000A
18,978,329 >>> mbox cmd response data (116 bytes)
18,979,882 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,980,335 UART: [fmc] Received command: 0x10000009
18,982,107 >>> mbox cmd response data (48 bytes)
18,983,647 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,984,101 UART: [fmc] Received command: 0x10000003
18,994,037 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
2,230,935 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,503,133 >>> mbox cmd response data (12 bytes)
10,505,608 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,542,339 >>> mbox cmd response: success
18,774,669 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,790,943 UART:
18,791,255 UART: Running Caliptra FMC ...
18,792,340 UART:
18,792,487 UART: [fmc] Received command: 0x1000000A
18,794,178 >>> mbox cmd response data (116 bytes)
18,795,607 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,795,945 UART: [fmc] Received command: 0x10000009
18,797,749 >>> mbox cmd response data (48 bytes)
18,799,257 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,799,601 UART: [fmc] Received command: 0x10000003
18,809,561 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
891,346 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,450 UART: [kat] ++
895,602 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,271 UART: [kat] SHA2-512-ACC
906,172 UART: [kat] ECC-384
915,715 UART: [kat] HMAC-384Kdf
920,353 UART: [kat] LMS
1,168,665 UART: [kat] --
1,169,486 UART: [cold-reset] ++
1,170,026 UART: [fht] FHT @ 0x50003400
1,172,500 UART: [idev] ++
1,172,668 UART: [idev] CDI.KEYID = 6
1,173,029 UART: [idev] SUBJECT.KEYID = 7
1,173,454 UART: [idev] UDS.KEYID = 0
1,181,213 UART: [idev] Erasing UDS.KEYID = 0
1,198,289 UART: [idev] Sha1 KeyId Algorithm
1,207,329 UART: [idev] --
1,208,464 UART: [ldev] ++
1,208,632 UART: [ldev] CDI.KEYID = 6
1,208,996 UART: [ldev] SUBJECT.KEYID = 5
1,209,423 UART: [ldev] AUTHORITY.KEYID = 7
1,209,886 UART: [ldev] FE.KEYID = 1
1,214,932 UART: [ldev] Erasing FE.KEYID = 1
1,240,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,462 UART: [ldev] --
1,279,739 UART: [fwproc] Wait for Commands...
1,280,358 UART: [fwproc] Recv command 0x4d454153
1,284,381 >>> mbox cmd response data (12 bytes)
1,284,382 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,284,557 UART: [fwproc] Recv command 0x46574c44
1,285,290 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,783 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,468 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,645 >>> mbox cmd response: success
2,781,863 UART: [afmc] ++
2,782,031 UART: [afmc] CDI.KEYID = 6
2,782,394 UART: [afmc] SUBJECT.KEYID = 7
2,782,820 UART: [afmc] AUTHORITY.KEYID = 5
2,817,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,267 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,963 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,862 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,555 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,137 UART: [afmc] --
2,860,926 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,860,948 UART: [cold-reset] --
2,861,560 UART: [state] Locking Datavault
2,862,761 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,365 UART: [state] Locking ICCM
2,863,857 UART: [exit] Launching FMC @ 0x40000000
2,869,154 UART:
2,869,170 UART: Running Caliptra FMC ...
2,869,578 UART:
2,869,808 UART: [fmc] Received command: 0x1000000A
2,871,237 >>> mbox cmd response data (116 bytes)
2,871,238 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,871,267 UART: [fmc] Received command: 0x10000009
2,872,465 >>> mbox cmd response data (48 bytes)
2,872,466 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,495 UART: [fmc] Received command: 0x10000003
2,881,951 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,598 >>> mbox cmd response data (12 bytes)
1,142,599 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,635,320 >>> mbox cmd response: success
2,690,593 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,696,592 UART:
2,696,608 UART: Running Caliptra FMC ...
2,697,016 UART:
2,697,246 UART: [fmc] Received command: 0x1000000A
2,698,675 >>> mbox cmd response data (116 bytes)
2,698,676 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,698,705 UART: [fmc] Received command: 0x10000009
2,699,903 >>> mbox cmd response data (48 bytes)
2,699,904 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,699,933 UART: [fmc] Received command: 0x10000003
2,709,389 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,711 UART: [kat] ++
895,863 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,808 UART: [kat] SHA2-512-ACC
906,709 UART: [kat] ECC-384
916,532 UART: [kat] HMAC-384Kdf
921,342 UART: [kat] LMS
1,169,654 UART: [kat] --
1,170,559 UART: [cold-reset] ++
1,171,035 UART: [fht] FHT @ 0x50003400
1,173,601 UART: [idev] ++
1,173,769 UART: [idev] CDI.KEYID = 6
1,174,130 UART: [idev] SUBJECT.KEYID = 7
1,174,555 UART: [idev] UDS.KEYID = 0
1,182,656 UART: [idev] Erasing UDS.KEYID = 0
1,200,090 UART: [idev] Sha1 KeyId Algorithm
1,208,942 UART: [idev] --
1,209,859 UART: [ldev] ++
1,210,027 UART: [ldev] CDI.KEYID = 6
1,210,391 UART: [ldev] SUBJECT.KEYID = 5
1,210,818 UART: [ldev] AUTHORITY.KEYID = 7
1,211,281 UART: [ldev] FE.KEYID = 1
1,216,551 UART: [ldev] Erasing FE.KEYID = 1
1,242,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,565 UART: [ldev] --
1,281,824 UART: [fwproc] Wait for Commands...
1,282,607 UART: [fwproc] Recv command 0x4d454153
1,286,630 >>> mbox cmd response data (12 bytes)
1,286,631 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,286,866 UART: [fwproc] Recv command 0x46574c44
1,287,599 UART: [fwproc] Recv'd Img size: 114888 bytes
2,590,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,342 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,644,027 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,784,220 >>> mbox cmd response: success
2,785,434 UART: [afmc] ++
2,785,602 UART: [afmc] CDI.KEYID = 6
2,785,965 UART: [afmc] SUBJECT.KEYID = 7
2,786,391 UART: [afmc] AUTHORITY.KEYID = 5
2,822,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,416 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,845,112 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,851,011 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,856,704 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,864,292 UART: [afmc] --
2,865,263 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,865,285 UART: [cold-reset] --
2,865,883 UART: [state] Locking Datavault
2,867,168 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,772 UART: [state] Locking ICCM
2,868,348 UART: [exit] Launching FMC @ 0x40000000
2,873,645 UART:
2,873,661 UART: Running Caliptra FMC ...
2,874,069 UART:
2,874,299 UART: [fmc] Received command: 0x1000000A
2,875,728 >>> mbox cmd response data (116 bytes)
2,875,729 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,875,758 UART: [fmc] Received command: 0x10000009
2,876,956 >>> mbox cmd response data (48 bytes)
2,876,957 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,876,986 UART: [fmc] Received command: 0x10000003
2,886,442 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,723 >>> mbox cmd response data (12 bytes)
1,142,724 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,635,775 >>> mbox cmd response: success
2,691,980 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,698,083 UART:
2,698,099 UART: Running Caliptra FMC ...
2,698,507 UART:
2,698,737 UART: [fmc] Received command: 0x1000000A
2,700,166 >>> mbox cmd response data (116 bytes)
2,700,167 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,700,196 UART: [fmc] Received command: 0x10000009
2,701,394 >>> mbox cmd response data (48 bytes)
2,701,395 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,701,424 UART: [fmc] Received command: 0x10000003
2,710,880 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,586 UART: [state] LifecycleState = Unprovisioned
86,241 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
88,096 UART: [kat] SHA2-256
891,646 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,750 UART: [kat] ++
895,902 UART: [kat] sha1
900,160 UART: [kat] SHA2-256
902,100 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,505 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,482 UART: [cold-reset] ++
1,170,814 UART: [fht] FHT @ 0x50003400
1,173,552 UART: [idev] ++
1,173,720 UART: [idev] CDI.KEYID = 6
1,174,081 UART: [idev] SUBJECT.KEYID = 7
1,174,506 UART: [idev] UDS.KEYID = 0
1,182,483 UART: [idev] Erasing UDS.KEYID = 0
1,199,099 UART: [idev] Sha1 KeyId Algorithm
1,208,025 UART: [idev] --
1,209,278 UART: [ldev] ++
1,209,446 UART: [ldev] CDI.KEYID = 6
1,209,810 UART: [ldev] SUBJECT.KEYID = 5
1,210,237 UART: [ldev] AUTHORITY.KEYID = 7
1,210,700 UART: [ldev] FE.KEYID = 1
1,216,000 UART: [ldev] Erasing FE.KEYID = 1
1,242,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,818 UART: [ldev] --
1,281,127 UART: [fwproc] Wait for Commands...
1,281,860 UART: [fwproc] Recv command 0x4d454153
1,285,883 >>> mbox cmd response data (12 bytes)
1,285,884 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,285,987 UART: [fwproc] Recv command 0x46574c44
1,286,720 UART: [fwproc] Recv'd Img size: 114888 bytes
2,590,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,829 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,643,514 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,783,915 >>> mbox cmd response: success
2,785,119 UART: [afmc] ++
2,785,287 UART: [afmc] CDI.KEYID = 6
2,785,650 UART: [afmc] SUBJECT.KEYID = 7
2,786,076 UART: [afmc] AUTHORITY.KEYID = 5
2,821,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,507 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,844,203 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,850,102 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,855,795 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,863,609 UART: [afmc] --
2,864,466 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,864,488 UART: [cold-reset] --
2,865,356 UART: [state] Locking Datavault
2,866,495 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,099 UART: [state] Locking ICCM
2,867,697 UART: [exit] Launching FMC @ 0x40000000
2,872,994 UART:
2,873,010 UART: Running Caliptra FMC ...
2,873,418 UART:
2,873,648 UART: [fmc] Received command: 0x1000000A
2,875,077 >>> mbox cmd response data (116 bytes)
2,875,078 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,875,107 UART: [fmc] Received command: 0x10000009
2,876,305 >>> mbox cmd response data (48 bytes)
2,876,306 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,876,335 UART: [fmc] Received command: 0x10000003
2,885,791 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,226 >>> mbox cmd response data (12 bytes)
1,142,227 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,635,950 >>> mbox cmd response: success
2,691,373 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,697,480 UART:
2,697,496 UART: Running Caliptra FMC ...
2,697,904 UART:
2,698,134 UART: [fmc] Received command: 0x1000000A
2,699,563 >>> mbox cmd response data (116 bytes)
2,699,564 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,699,593 UART: [fmc] Received command: 0x10000009
2,700,791 >>> mbox cmd response data (48 bytes)
2,700,792 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,700,821 UART: [fmc] Received command: 0x10000003
2,710,277 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
891,385 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,492 UART: [kat] SHA2-512-ACC
906,393 UART: [kat] ECC-384
916,330 UART: [kat] HMAC-384Kdf
921,066 UART: [kat] LMS
1,169,378 UART: [kat] --
1,170,225 UART: [cold-reset] ++
1,170,749 UART: [fht] FHT @ 0x50003400
1,173,433 UART: [idev] ++
1,173,601 UART: [idev] CDI.KEYID = 6
1,173,962 UART: [idev] SUBJECT.KEYID = 7
1,174,387 UART: [idev] UDS.KEYID = 0
1,182,106 UART: [idev] Erasing UDS.KEYID = 0
1,198,616 UART: [idev] Sha1 KeyId Algorithm
1,207,310 UART: [idev] --
1,208,317 UART: [ldev] ++
1,208,485 UART: [ldev] CDI.KEYID = 6
1,208,849 UART: [ldev] SUBJECT.KEYID = 5
1,209,276 UART: [ldev] AUTHORITY.KEYID = 7
1,209,739 UART: [ldev] FE.KEYID = 1
1,215,021 UART: [ldev] Erasing FE.KEYID = 1
1,240,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,807 UART: [ldev] --
1,280,194 UART: [fwproc] Wait for Commands...
1,280,909 UART: [fwproc] Recv command 0x4d454153
1,284,932 >>> mbox cmd response data (12 bytes)
1,284,933 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,285,076 UART: [fwproc] Recv command 0x46574c44
1,285,809 UART: [fwproc] Recv'd Img size: 114888 bytes
2,589,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,006 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,642,691 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,782,924 >>> mbox cmd response: success
2,784,080 UART: [afmc] ++
2,784,248 UART: [afmc] CDI.KEYID = 6
2,784,611 UART: [afmc] SUBJECT.KEYID = 7
2,785,037 UART: [afmc] AUTHORITY.KEYID = 5
2,820,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,137 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,886 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,843,582 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,849,481 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,855,174 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,862,934 UART: [afmc] --
2,863,915 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,863,937 UART: [cold-reset] --
2,864,575 UART: [state] Locking Datavault
2,865,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,542 UART: [state] Locking ICCM
2,867,174 UART: [exit] Launching FMC @ 0x40000000
2,872,471 UART:
2,872,487 UART: Running Caliptra FMC ...
2,872,895 UART:
2,873,125 UART: [fmc] Received command: 0x1000000A
2,874,554 >>> mbox cmd response data (116 bytes)
2,874,555 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,874,584 UART: [fmc] Received command: 0x10000009
2,875,782 >>> mbox cmd response data (48 bytes)
2,875,783 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,875,812 UART: [fmc] Received command: 0x10000003
2,885,268 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,407 >>> mbox cmd response data (12 bytes)
1,142,408 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,635,509 >>> mbox cmd response: success
2,691,196 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,697,347 UART:
2,697,363 UART: Running Caliptra FMC ...
2,697,771 UART:
2,698,001 UART: [fmc] Received command: 0x1000000A
2,699,430 >>> mbox cmd response data (116 bytes)
2,699,431 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,699,460 UART: [fmc] Received command: 0x10000009
2,700,658 >>> mbox cmd response data (48 bytes)
2,700,659 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,700,688 UART: [fmc] Received command: 0x10000003
2,710,144 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,862 UART: [kat] SHA2-256
901,802 UART: [kat] SHA2-384
904,495 UART: [kat] SHA2-512-ACC
906,396 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
920,741 UART: [kat] LMS
1,169,053 UART: [kat] --
1,169,948 UART: [cold-reset] ++
1,170,322 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,182,197 UART: [idev] Erasing UDS.KEYID = 0
1,199,153 UART: [idev] Sha1 KeyId Algorithm
1,207,941 UART: [idev] --
1,209,034 UART: [ldev] ++
1,209,202 UART: [ldev] CDI.KEYID = 6
1,209,566 UART: [ldev] SUBJECT.KEYID = 5
1,209,993 UART: [ldev] AUTHORITY.KEYID = 7
1,210,456 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,672 UART: [ldev] --
1,280,971 UART: [fwproc] Wait for Commands...
1,281,546 UART: [fwproc] Recv command 0x4d454153
1,285,569 >>> mbox cmd response data (12 bytes)
1,285,570 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,285,649 UART: [fwproc] Recv command 0x46574c44
1,286,382 UART: [fwproc] Recv'd Img size: 114888 bytes
2,588,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,831 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,516 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,781,751 >>> mbox cmd response: success
2,783,015 UART: [afmc] ++
2,783,183 UART: [afmc] CDI.KEYID = 6
2,783,546 UART: [afmc] SUBJECT.KEYID = 7
2,783,972 UART: [afmc] AUTHORITY.KEYID = 5
2,819,579 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,563 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,842,259 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,848,158 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,853,851 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,861,677 UART: [afmc] --
2,862,522 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,862,544 UART: [cold-reset] --
2,863,190 UART: [state] Locking Datavault
2,864,439 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,043 UART: [state] Locking ICCM
2,865,505 UART: [exit] Launching FMC @ 0x40000000
2,870,802 UART:
2,870,818 UART: Running Caliptra FMC ...
2,871,226 UART:
2,871,456 UART: [fmc] Received command: 0x1000000A
2,872,885 >>> mbox cmd response data (116 bytes)
2,872,886 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,872,915 UART: [fmc] Received command: 0x10000009
2,874,113 >>> mbox cmd response data (48 bytes)
2,874,114 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,874,143 UART: [fmc] Received command: 0x10000003
2,883,599 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,094 >>> mbox cmd response data (12 bytes)
1,142,095 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,635,110 >>> mbox cmd response: success
2,690,577 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,696,942 UART:
2,696,958 UART: Running Caliptra FMC ...
2,697,366 UART:
2,697,596 UART: [fmc] Received command: 0x1000000A
2,699,025 >>> mbox cmd response data (116 bytes)
2,699,026 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,699,055 UART: [fmc] Received command: 0x10000009
2,700,253 >>> mbox cmd response data (48 bytes)
2,700,254 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,700,283 UART: [fmc] Received command: 0x10000003
2,709,739 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,899 UART: [state] LifecycleState = Unprovisioned
86,554 UART: [state] DebugLocked = No
87,066 UART: [state] WD Timer not started. Device not locked for debugging
88,341 UART: [kat] SHA2-256
891,891 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,995 UART: [kat] ++
896,147 UART: [kat] sha1
900,403 UART: [kat] SHA2-256
902,343 UART: [kat] SHA2-384
904,990 UART: [kat] SHA2-512-ACC
906,891 UART: [kat] ECC-384
916,788 UART: [kat] HMAC-384Kdf
921,368 UART: [kat] LMS
1,169,680 UART: [kat] --
1,170,503 UART: [cold-reset] ++
1,171,073 UART: [fht] FHT @ 0x50003400
1,173,731 UART: [idev] ++
1,173,899 UART: [idev] CDI.KEYID = 6
1,174,260 UART: [idev] SUBJECT.KEYID = 7
1,174,685 UART: [idev] UDS.KEYID = 0
1,182,502 UART: [idev] Erasing UDS.KEYID = 0
1,199,858 UART: [idev] Sha1 KeyId Algorithm
1,208,546 UART: [idev] --
1,209,635 UART: [ldev] ++
1,209,803 UART: [ldev] CDI.KEYID = 6
1,210,167 UART: [ldev] SUBJECT.KEYID = 5
1,210,594 UART: [ldev] AUTHORITY.KEYID = 7
1,211,057 UART: [ldev] FE.KEYID = 1
1,216,683 UART: [ldev] Erasing FE.KEYID = 1
1,242,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,689 UART: [ldev] --
1,282,096 UART: [fwproc] Wait for Commands...
1,282,757 UART: [fwproc] Recv command 0x4d454153
1,286,780 >>> mbox cmd response data (12 bytes)
1,286,781 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,286,864 UART: [fwproc] Recv command 0x46574c44
1,287,597 UART: [fwproc] Recv'd Img size: 114888 bytes
2,590,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,148 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,642,833 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,783,112 >>> mbox cmd response: success
2,784,148 UART: [afmc] ++
2,784,316 UART: [afmc] CDI.KEYID = 6
2,784,679 UART: [afmc] SUBJECT.KEYID = 7
2,785,105 UART: [afmc] AUTHORITY.KEYID = 5
2,820,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,876 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,843,572 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,849,471 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,855,164 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,862,924 UART: [afmc] --
2,863,943 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,863,965 UART: [cold-reset] --
2,864,743 UART: [state] Locking Datavault
2,866,150 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,754 UART: [state] Locking ICCM
2,867,336 UART: [exit] Launching FMC @ 0x40000000
2,872,633 UART:
2,872,649 UART: Running Caliptra FMC ...
2,873,057 UART:
2,873,287 UART: [fmc] Received command: 0x1000000A
2,874,716 >>> mbox cmd response data (116 bytes)
2,874,717 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,874,746 UART: [fmc] Received command: 0x10000009
2,875,944 >>> mbox cmd response data (48 bytes)
2,875,945 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,875,974 UART: [fmc] Received command: 0x10000003
2,885,430 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,609 >>> mbox cmd response data (12 bytes)
1,143,610 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,638,103 >>> mbox cmd response: success
2,694,606 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,700,599 UART:
2,700,615 UART: Running Caliptra FMC ...
2,701,023 UART:
2,701,253 UART: [fmc] Received command: 0x1000000A
2,702,682 >>> mbox cmd response data (116 bytes)
2,702,683 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,702,712 UART: [fmc] Received command: 0x10000009
2,703,910 >>> mbox cmd response data (48 bytes)
2,703,911 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,703,940 UART: [fmc] Received command: 0x10000003
2,713,396 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,490 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,115 UART:
192,475 UART: Running Caliptra ROM ...
193,666 UART:
193,827 UART: [state] CFI Enabled
263,118 UART: [state] LifecycleState = Unprovisioned
265,062 UART: [state] DebugLocked = No
266,502 UART: [state] WD Timer not started. Device not locked for debugging
271,005 UART: [kat] SHA2-256
450,638 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,460 UART: [kat] ++
461,999 UART: [kat] sha1
472,346 UART: [kat] SHA2-256
475,037 UART: [kat] SHA2-384
480,604 UART: [kat] SHA2-512-ACC
482,955 UART: [kat] ECC-384
2,926,047 UART: [kat] HMAC-384Kdf
2,949,780 UART: [kat] LMS
3,426,301 UART: [kat] --
3,430,406 UART: [cold-reset] ++
3,432,034 UART: [fht] FHT @ 0x50003400
3,442,359 UART: [idev] ++
3,442,951 UART: [idev] CDI.KEYID = 6
3,443,881 UART: [idev] SUBJECT.KEYID = 7
3,445,104 UART: [idev] UDS.KEYID = 0
3,481,936 UART: [idev] Erasing UDS.KEYID = 0
5,964,836 UART: [idev] Sha1 KeyId Algorithm
5,988,222 UART: [idev] --
5,993,643 UART: [ldev] ++
5,994,265 UART: [ldev] CDI.KEYID = 6
5,995,159 UART: [ldev] SUBJECT.KEYID = 5
5,996,325 UART: [ldev] AUTHORITY.KEYID = 7
5,997,622 UART: [ldev] FE.KEYID = 1
6,037,501 UART: [ldev] Erasing FE.KEYID = 1
8,544,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,418 UART: [ldev] --
10,351,991 UART: [fwproc] Wait for Commands...
10,355,175 UART: [fwproc] Recv command 0x46574c44
10,357,250 UART: Invalid Img size: 0 bytes
10,361,103 UART: ROM Fatal Error: 0x01020002
10,364,310 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,443 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,270,844 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
4,050 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,277 UART:
192,647 UART: Running Caliptra ROM ...
193,828 UART:
603,504 UART: [state] CFI Enabled
616,106 UART: [state] LifecycleState = Unprovisioned
618,031 UART: [state] DebugLocked = No
619,844 UART: [state] WD Timer not started. Device not locked for debugging
623,246 UART: [kat] SHA2-256
802,915 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,677 UART: [kat] ++
814,151 UART: [kat] sha1
824,590 UART: [kat] SHA2-256
827,269 UART: [kat] SHA2-384
833,130 UART: [kat] SHA2-512-ACC
835,518 UART: [kat] ECC-384
3,276,467 UART: [kat] HMAC-384Kdf
3,288,206 UART: [kat] LMS
3,764,713 UART: [kat] --
3,767,189 UART: [cold-reset] ++
3,769,656 UART: [fht] FHT @ 0x50003400
3,781,706 UART: [idev] ++
3,782,288 UART: [idev] CDI.KEYID = 6
3,783,171 UART: [idev] SUBJECT.KEYID = 7
3,784,436 UART: [idev] UDS.KEYID = 0
3,800,241 UART: [idev] Erasing UDS.KEYID = 0
6,260,761 UART: [idev] Sha1 KeyId Algorithm
6,284,748 UART: [idev] --
6,289,201 UART: [ldev] ++
6,289,775 UART: [ldev] CDI.KEYID = 6
6,290,708 UART: [ldev] SUBJECT.KEYID = 5
6,291,915 UART: [ldev] AUTHORITY.KEYID = 7
6,293,143 UART: [ldev] FE.KEYID = 1
6,305,061 UART: [ldev] Erasing FE.KEYID = 1
8,784,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,815 UART: [ldev] --
10,582,615 UART: [fwproc] Wait for Commands...
10,585,137 UART: [fwproc] Recv command 0x46574c44
10,587,121 UART: Invalid Img size: 0 bytes
10,591,442 UART: ROM Fatal Error: 0x01020002
10,594,635 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
5,082 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,491,995 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,548 UART: [kat] SHA2-256
901,488 UART: [kat] SHA2-384
904,325 UART: [kat] SHA2-512-ACC
906,226 UART: [kat] ECC-384
915,905 UART: [kat] HMAC-384Kdf
920,465 UART: [kat] LMS
1,168,777 UART: [kat] --
1,169,556 UART: [cold-reset] ++
1,170,046 UART: [fht] FHT @ 0x50003400
1,172,864 UART: [idev] ++
1,173,032 UART: [idev] CDI.KEYID = 6
1,173,393 UART: [idev] SUBJECT.KEYID = 7
1,173,818 UART: [idev] UDS.KEYID = 0
1,181,487 UART: [idev] Erasing UDS.KEYID = 0
1,198,051 UART: [idev] Sha1 KeyId Algorithm
1,207,031 UART: [idev] --
1,207,948 UART: [ldev] ++
1,208,116 UART: [ldev] CDI.KEYID = 6
1,208,480 UART: [ldev] SUBJECT.KEYID = 5
1,208,907 UART: [ldev] AUTHORITY.KEYID = 7
1,209,370 UART: [ldev] FE.KEYID = 1
1,214,500 UART: [ldev] Erasing FE.KEYID = 1
1,240,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,576 UART: [ldev] --
1,279,913 UART: [fwproc] Wait for Commands...
1,280,620 UART: [fwproc] Recv command 0x46574c44
1,281,349 UART: Invalid Img size: 0 bytes
1,282,095 UART: ROM Fatal Error: 0x01020002
1,283,254 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,142,403 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,657 UART: [kat] SHA2-256
891,207 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,306 UART: [kat] SHA2-512-ACC
906,207 UART: [kat] ECC-384
915,652 UART: [kat] HMAC-384Kdf
920,356 UART: [kat] LMS
1,168,668 UART: [kat] --
1,169,477 UART: [cold-reset] ++
1,169,909 UART: [fht] FHT @ 0x50003400
1,172,631 UART: [idev] ++
1,172,799 UART: [idev] CDI.KEYID = 6
1,173,160 UART: [idev] SUBJECT.KEYID = 7
1,173,585 UART: [idev] UDS.KEYID = 0
1,181,922 UART: [idev] Erasing UDS.KEYID = 0
1,199,102 UART: [idev] Sha1 KeyId Algorithm
1,208,040 UART: [idev] --
1,208,987 UART: [ldev] ++
1,209,155 UART: [ldev] CDI.KEYID = 6
1,209,519 UART: [ldev] SUBJECT.KEYID = 5
1,209,946 UART: [ldev] AUTHORITY.KEYID = 7
1,210,409 UART: [ldev] FE.KEYID = 1
1,215,939 UART: [ldev] Erasing FE.KEYID = 1
1,242,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,083 UART: [ldev] --
1,281,390 UART: [fwproc] Wait for Commands...
1,282,051 UART: [fwproc] Recv command 0x46574c44
1,282,780 UART: Invalid Img size: 0 bytes
1,283,568 UART: ROM Fatal Error: 0x01020002
1,284,727 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,141,208 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,656 UART: [state] LifecycleState = Unprovisioned
85,311 UART: [state] DebugLocked = No
85,841 UART: [state] WD Timer not started. Device not locked for debugging
87,172 UART: [kat] SHA2-256
890,722 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,826 UART: [kat] ++
894,978 UART: [kat] sha1
899,176 UART: [kat] SHA2-256
901,116 UART: [kat] SHA2-384
903,915 UART: [kat] SHA2-512-ACC
905,816 UART: [kat] ECC-384
915,855 UART: [kat] HMAC-384Kdf
920,495 UART: [kat] LMS
1,168,807 UART: [kat] --
1,169,734 UART: [cold-reset] ++
1,170,264 UART: [fht] FHT @ 0x50003400
1,173,134 UART: [idev] ++
1,173,302 UART: [idev] CDI.KEYID = 6
1,173,663 UART: [idev] SUBJECT.KEYID = 7
1,174,088 UART: [idev] UDS.KEYID = 0
1,182,131 UART: [idev] Erasing UDS.KEYID = 0
1,199,059 UART: [idev] Sha1 KeyId Algorithm
1,208,109 UART: [idev] --
1,209,060 UART: [ldev] ++
1,209,228 UART: [ldev] CDI.KEYID = 6
1,209,592 UART: [ldev] SUBJECT.KEYID = 5
1,210,019 UART: [ldev] AUTHORITY.KEYID = 7
1,210,482 UART: [ldev] FE.KEYID = 1
1,215,376 UART: [ldev] Erasing FE.KEYID = 1
1,241,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,234 UART: [ldev] --
1,280,591 UART: [fwproc] Wait for Commands...
1,281,222 UART: [fwproc] Recv command 0x46574c44
1,281,951 UART: Invalid Img size: 0 bytes
1,282,989 UART: ROM Fatal Error: 0x01020002
1,284,148 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,917 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,777 UART: [kat] ++
895,929 UART: [kat] sha1
900,163 UART: [kat] SHA2-256
902,103 UART: [kat] SHA2-384
904,992 UART: [kat] SHA2-512-ACC
906,893 UART: [kat] ECC-384
916,504 UART: [kat] HMAC-384Kdf
921,124 UART: [kat] LMS
1,169,436 UART: [kat] --
1,170,281 UART: [cold-reset] ++
1,170,653 UART: [fht] FHT @ 0x50003400
1,173,431 UART: [idev] ++
1,173,599 UART: [idev] CDI.KEYID = 6
1,173,960 UART: [idev] SUBJECT.KEYID = 7
1,174,385 UART: [idev] UDS.KEYID = 0
1,182,706 UART: [idev] Erasing UDS.KEYID = 0
1,199,804 UART: [idev] Sha1 KeyId Algorithm
1,208,650 UART: [idev] --
1,209,489 UART: [ldev] ++
1,209,657 UART: [ldev] CDI.KEYID = 6
1,210,021 UART: [ldev] SUBJECT.KEYID = 5
1,210,448 UART: [ldev] AUTHORITY.KEYID = 7
1,210,911 UART: [ldev] FE.KEYID = 1
1,216,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,617 UART: [ldev] --
1,281,888 UART: [fwproc] Wait for Commands...
1,282,691 UART: [fwproc] Recv command 0x46574c44
1,283,420 UART: Invalid Img size: 0 bytes
1,284,110 UART: ROM Fatal Error: 0x01020002
1,285,269 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,141,722 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
891,036 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,140 UART: [kat] ++
895,292 UART: [kat] sha1
899,294 UART: [kat] SHA2-256
901,234 UART: [kat] SHA2-384
903,983 UART: [kat] SHA2-512-ACC
905,884 UART: [kat] ECC-384
915,841 UART: [kat] HMAC-384Kdf
920,333 UART: [kat] LMS
1,168,645 UART: [kat] --
1,169,514 UART: [cold-reset] ++
1,169,894 UART: [fht] FHT @ 0x50003400
1,172,664 UART: [idev] ++
1,172,832 UART: [idev] CDI.KEYID = 6
1,173,193 UART: [idev] SUBJECT.KEYID = 7
1,173,618 UART: [idev] UDS.KEYID = 0
1,181,655 UART: [idev] Erasing UDS.KEYID = 0
1,198,287 UART: [idev] Sha1 KeyId Algorithm
1,206,965 UART: [idev] --
1,208,024 UART: [ldev] ++
1,208,192 UART: [ldev] CDI.KEYID = 6
1,208,556 UART: [ldev] SUBJECT.KEYID = 5
1,208,983 UART: [ldev] AUTHORITY.KEYID = 7
1,209,446 UART: [ldev] FE.KEYID = 1
1,214,476 UART: [ldev] Erasing FE.KEYID = 1
1,240,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,764 UART: [ldev] --
1,280,133 UART: [fwproc] Wait for Commands...
1,280,922 UART: [fwproc] Recv command 0x46574c44
1,281,651 UART: Invalid Img size: 0 bytes
1,282,291 UART: ROM Fatal Error: 0x01020002
1,283,450 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,455 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [kat] SHA2-256
891,191 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,697 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,173,003 UART: [idev] ++
1,173,171 UART: [idev] CDI.KEYID = 6
1,173,532 UART: [idev] SUBJECT.KEYID = 7
1,173,957 UART: [idev] UDS.KEYID = 0
1,181,784 UART: [idev] Erasing UDS.KEYID = 0
1,199,476 UART: [idev] Sha1 KeyId Algorithm
1,208,282 UART: [idev] --
1,209,255 UART: [ldev] ++
1,209,423 UART: [ldev] CDI.KEYID = 6
1,209,787 UART: [ldev] SUBJECT.KEYID = 5
1,210,214 UART: [ldev] AUTHORITY.KEYID = 7
1,210,677 UART: [ldev] FE.KEYID = 1
1,215,837 UART: [ldev] Erasing FE.KEYID = 1
1,241,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,015 UART: [ldev] --
1,281,252 UART: [fwproc] Wait for Commands...
1,281,843 UART: [fwproc] Recv command 0x46574c44
1,282,572 UART: Invalid Img size: 0 bytes
1,283,384 UART: ROM Fatal Error: 0x01020002
1,284,543 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,141,036 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,249 writing to cptra_bootfsm_go
193,436 UART:
193,804 UART: Running Caliptra ROM ...
194,988 UART:
195,142 UART: [state] CFI Enabled
264,329 UART: [state] LifecycleState = Unprovisioned
266,281 UART: [state] DebugLocked = No
267,665 UART: [state] WD Timer not started. Device not locked for debugging
270,749 UART: [kat] SHA2-256
450,416 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,169 UART: [kat] ++
461,781 UART: [kat] sha1
471,703 UART: [kat] SHA2-256
474,399 UART: [kat] SHA2-384
479,570 UART: [kat] SHA2-512-ACC
481,925 UART: [kat] ECC-384
2,925,923 UART: [kat] HMAC-384Kdf
2,951,365 UART: [kat] LMS
3,427,882 UART: [kat] --
3,430,975 UART: [cold-reset] ++
3,433,239 UART: [fht] FHT @ 0x50003400
3,444,273 UART: [idev] ++
3,444,876 UART: [idev] CDI.KEYID = 6
3,445,825 UART: [idev] SUBJECT.KEYID = 7
3,447,042 UART: [idev] UDS.KEYID = 0
3,481,156 UART: [idev] Erasing UDS.KEYID = 0
5,963,602 UART: [idev] Sha1 KeyId Algorithm
5,990,160 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,720,022 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,735,887 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,751,848 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,767,496 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,793,485 UART: [idev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
7,950,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,099,559 UART: [idev] --
8,100,211 UART: [ldev] ++
8,100,715 UART: [ldev] CDI.KEYID = 6
8,101,603 UART: [ldev] SUBJECT.KEYID = 5
8,102,657 UART: [ldev] AUTHORITY.KEYID = 7
8,103,754 UART: [ldev] FE.KEYID = 1
8,104,629 UART: [ldev] Erasing FE.KEYID = 1
10,508,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,242,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,258,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,274,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,289,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,311,134 UART: [ldev] --
12,316,674 UART: [fwproc] Wait for Commands...
12,319,640 UART: [fwproc] Recv command 0x46574c44
12,321,815 UART: [fwproc] Recv'd Img size: 118548 bytes
15,800,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,879,049 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,952,077 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,280,202 >>> mbox cmd response: success
16,283,748 UART: [afmc] ++
16,284,350 UART: [afmc] CDI.KEYID = 6
16,285,292 UART: [afmc] SUBJECT.KEYID = 7
16,286,455 UART: [afmc] AUTHORITY.KEYID = 5
18,819,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,558,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,560,913 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,576,757 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,592,792 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,608,381 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,634,065 UART: [afmc] --
20,637,179 UART: [cold-reset] --
20,640,776 UART: [state] Locking Datavault
20,647,627 UART: [state] Locking PCR0, PCR1 and PCR31
20,649,355 UART: [state] Locking ICCM
20,651,108 UART: [exit] Launching FMC @ 0x40000130
20,659,508 UART:
20,659,752 UART: Running Caliptra FMC ...
20,660,858 UART:
20,661,021 UART: [state] CFI Enabled
20,716,305 UART: [fht] FMC Alias Private Key: 7
22,483,069 UART: [art] Extend RT PCRs Done
22,484,311 UART: [art] Lock RT PCRs Done
22,486,075 UART: [art] Populate DV Done
22,491,604 UART: [fht] FMC Alias Private Key: 7
22,493,100 UART: [art] Derive CDI
22,493,876 UART: [art] Store in slot 0x4
22,550,332 UART: [art] Derive Key Pair
22,551,330 UART: [art] Store priv key in slot 0x5
25,014,396 UART: [art] Derive Key Pair - Done
25,027,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,740,056 UART: [art] Erasing AUTHORITY.KEYID = 7
26,741,565 UART: [art] PUB.X = 7CC0878D79803F7F1A71DF5FA336C4D17F03F7E1C73C42C2745EB3F36C6F9C4574858D6935FDBB380F87F9707EF321AA
26,748,855 UART: [art] PUB.Y = AE679F841ACA355FA7720442835FD48D7E254961F0FAA6085E028096016DFAD7C0E894FBF9BC3F359C0D528DB7A0A676
26,756,135 UART: [art] SIG.R = D1CBCC9A46B8C53CF3B05F3D1B3DB38B6D8C41D8979EC6B7523488048ED79662BFE15C2FE8A3787CD18ECAEEF669C9AF
26,763,506 UART: [art] SIG.S = 3ABF9ADE70366AE892C05BA8C77D61DF8BCC2FC059FD0258BD3C09E05B9968DE782B1423640EF02078FBF9387A0A7CAA
27,742,259 UART: Caliptra RT
27,742,989 UART: [state] CFI Enabled
27,923,676 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
7,747,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,969,236 >>> mbox cmd response: success
20,266,795 UART:
20,267,189 UART: Running Caliptra FMC ...
20,268,294 UART:
20,268,459 UART: [state] CFI Enabled
20,335,650 UART: [fht] FMC Alias Private Key: 7
22,101,251 UART: [art] Extend RT PCRs Done
22,102,473 UART: [art] Lock RT PCRs Done
22,104,182 UART: [art] Populate DV Done
22,109,519 UART: [fht] FMC Alias Private Key: 7
22,111,235 UART: [art] Derive CDI
22,112,055 UART: [art] Store in slot 0x4
22,168,888 UART: [art] Derive Key Pair
22,169,929 UART: [art] Store priv key in slot 0x5
24,633,013 UART: [art] Derive Key Pair - Done
24,645,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,358,764 UART: [art] Erasing AUTHORITY.KEYID = 7
26,360,271 UART: [art] PUB.X = 4D0EB10A49858D44EEE1F1C907173F5ADC3760496D68791C05D36BAC7D72CC7A7C80678FD9C34470E62E27DDB857437C
26,367,480 UART: [art] PUB.Y = BD867EFEE4472BC03FE7964902B4C2313A6410B418D3BE34F86DCE73586F9EB586E0C8522A37D477B6CA4FF0E968E46F
26,374,731 UART: [art] SIG.R = 3771BE696AC11B004659BD6FDFD0D0486F86C978B9B0B9FA84B8A2AF223155DECB6007D62800BE2D4C31B2C73ED36646
26,382,151 UART: [art] SIG.S = DBC5EF86B3E400432F41231BF9F9B156B99C2373469D8F7080C6D35D7B640C19895F0908740971516FB3608DCB1ED1D9
27,361,712 UART: Caliptra RT
27,362,422 UART: [state] CFI Enabled
27,543,571 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
192,603 UART:
192,974 UART: Running Caliptra ROM ...
194,065 UART:
603,974 UART: [state] CFI Enabled
617,310 UART: [state] LifecycleState = Unprovisioned
619,212 UART: [state] DebugLocked = No
621,381 UART: [state] WD Timer not started. Device not locked for debugging
625,625 UART: [kat] SHA2-256
805,307 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,085 UART: [kat] ++
816,533 UART: [kat] sha1
828,970 UART: [kat] SHA2-256
831,656 UART: [kat] SHA2-384
837,090 UART: [kat] SHA2-512-ACC
839,428 UART: [kat] ECC-384
3,283,835 UART: [kat] HMAC-384Kdf
3,296,336 UART: [kat] LMS
3,772,866 UART: [kat] --
3,778,208 UART: [cold-reset] ++
3,779,863 UART: [fht] FHT @ 0x50003400
3,792,082 UART: [idev] ++
3,792,649 UART: [idev] CDI.KEYID = 6
3,793,660 UART: [idev] SUBJECT.KEYID = 7
3,794,877 UART: [idev] UDS.KEYID = 0
3,811,280 UART: [idev] Erasing UDS.KEYID = 0
6,274,531 UART: [idev] Sha1 KeyId Algorithm
6,299,049 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,017,597 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,033,482 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,049,468 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,065,088 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,091,119 UART: [idev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
8,248,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,397,180 UART: [idev] --
8,397,832 UART: [ldev] ++
8,398,327 UART: [ldev] CDI.KEYID = 6
8,399,221 UART: [ldev] SUBJECT.KEYID = 5
8,400,281 UART: [ldev] AUTHORITY.KEYID = 7
8,401,363 UART: [ldev] FE.KEYID = 1
8,402,259 UART: [ldev] Erasing FE.KEYID = 1
10,744,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,462,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,478,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,494,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,510,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,530,149 UART: [ldev] --
12,534,817 UART: [fwproc] Wait for Commands...
12,537,365 UART: [fwproc] Recv command 0x46574c44
12,539,348 UART: [fwproc] Recv'd Img size: 118548 bytes
16,025,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,102,425 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,175,432 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,503,149 >>> mbox cmd response: success
16,507,916 UART: [afmc] ++
16,508,501 UART: [afmc] CDI.KEYID = 6
16,509,520 UART: [afmc] SUBJECT.KEYID = 7
16,510,676 UART: [afmc] AUTHORITY.KEYID = 5
19,014,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,735,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,737,703 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,753,466 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,769,545 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,785,162 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,808,874 UART: [afmc] --
20,812,149 UART: [cold-reset] --
20,816,764 UART: [state] Locking Datavault
20,823,843 UART: [state] Locking PCR0, PCR1 and PCR31
20,825,595 UART: [state] Locking ICCM
20,827,686 UART: [exit] Launching FMC @ 0x40000130
20,836,087 UART:
20,836,327 UART: Running Caliptra FMC ...
20,837,434 UART:
20,837,595 UART: [state] CFI Enabled
20,845,538 UART: [fht] FMC Alias Private Key: 7
22,611,775 UART: [art] Extend RT PCRs Done
22,612,999 UART: [art] Lock RT PCRs Done
22,614,679 UART: [art] Populate DV Done
22,620,138 UART: [fht] FMC Alias Private Key: 7
22,621,653 UART: [art] Derive CDI
22,622,419 UART: [art] Store in slot 0x4
22,665,439 UART: [art] Derive Key Pair
22,666,441 UART: [art] Store priv key in slot 0x5
25,094,015 UART: [art] Derive Key Pair - Done
25,107,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,813,321 UART: [art] Erasing AUTHORITY.KEYID = 7
26,814,826 UART: [art] PUB.X = 0CB333347F878AE2FEE2BD760832AB14A6ED3BA777D03FA59ACB6037741B612F1BA51C65B494E2BF4B8FCC92B8BBF893
26,822,112 UART: [art] PUB.Y = 928D7450F7749819DEF703AE930C6A95C45927BE2EA60D4BEFE584454D5CF08A7ECF1C575FD88F64FCEE2EAE0C42E4AA
26,829,389 UART: [art] SIG.R = 3534F082EC0A701D5AD1D5F0A8270BCE0C92E6CD0003E16192DBBBDFD6BB59AA0A2488F4D6A150005D7E9FAAE05415FC
26,836,753 UART: [art] SIG.S = F57E53F51BFADBA50297BE1AEF442E6C04935CC151E9467539653B0648BC676CA87E0D7D635626F335CE700B7D65C9AA
27,815,573 UART: Caliptra RT
27,816,552 UART: [state] CFI Enabled
27,948,397 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
8,018,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,195,054 >>> mbox cmd response: success
20,445,030 UART:
20,445,422 UART: Running Caliptra FMC ...
20,446,546 UART:
20,446,708 UART: [state] CFI Enabled
20,454,475 UART: [fht] FMC Alias Private Key: 7
22,220,230 UART: [art] Extend RT PCRs Done
22,221,451 UART: [art] Lock RT PCRs Done
22,223,399 UART: [art] Populate DV Done
22,228,775 UART: [fht] FMC Alias Private Key: 7
22,230,463 UART: [art] Derive CDI
22,231,232 UART: [art] Store in slot 0x4
22,274,205 UART: [art] Derive Key Pair
22,275,207 UART: [art] Store priv key in slot 0x5
24,701,720 UART: [art] Derive Key Pair - Done
24,715,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,421,518 UART: [art] Erasing AUTHORITY.KEYID = 7
26,423,028 UART: [art] PUB.X = 6648BAEEC2DBB04F570A90806F0315176DDD30A0DF0AB2A0B38D75E1C915E4B7638478743F000CC3E41270B66BC9B92C
26,430,233 UART: [art] PUB.Y = E934AA1606C8F1B5F743A1472C23595B5D236741C87A5CD3E37FDB3CA8D1668B3F1BD92484C64CF7C87E92A97E08A8D6
26,437,513 UART: [art] SIG.R = 487419E04928BDF54EA33AF30DECDBF2E1675EC706EA3450E732211EF12A8AE9C48BBA55BAB2C5D1DD3A8800ACBEE7A7
26,444,913 UART: [art] SIG.S = 846174452E06E155A4A3DCCDB3FAFDD1357A2738EDC41754E50CBF63FE9DE0ABC280DAE1913B95569C44974C251B461A
27,424,137 UART: Caliptra RT
27,424,850 UART: [state] CFI Enabled
27,558,624 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,482 UART: [kat] SHA2-256
901,422 UART: [kat] SHA2-384
904,113 UART: [kat] SHA2-512-ACC
906,014 UART: [kat] ECC-384
915,559 UART: [kat] HMAC-384Kdf
920,011 UART: [kat] LMS
1,168,323 UART: [kat] --
1,169,180 UART: [cold-reset] ++
1,169,738 UART: [fht] FHT @ 0x50003400
1,172,432 UART: [idev] ++
1,172,600 UART: [idev] CDI.KEYID = 6
1,172,961 UART: [idev] SUBJECT.KEYID = 7
1,173,386 UART: [idev] UDS.KEYID = 0
1,181,675 UART: [idev] Erasing UDS.KEYID = 0
1,198,307 UART: [idev] Sha1 KeyId Algorithm
1,208,123 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,627 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,335 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,220 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,926 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,355 UART: [idev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
1,298,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,733 UART: [idev] --
1,299,602 UART: [ldev] ++
1,299,770 UART: [ldev] CDI.KEYID = 6
1,300,134 UART: [ldev] SUBJECT.KEYID = 5
1,300,561 UART: [ldev] AUTHORITY.KEYID = 7
1,301,024 UART: [ldev] FE.KEYID = 1
1,306,056 UART: [ldev] Erasing FE.KEYID = 1
1,331,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,350,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,356,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,362,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,369,600 UART: [ldev] --
1,371,055 UART: [fwproc] Wait for Commands...
1,371,876 UART: [fwproc] Recv command 0x46574c44
1,372,609 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,191 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,366 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,916,765 >>> mbox cmd response: success
2,917,985 UART: [afmc] ++
2,918,153 UART: [afmc] CDI.KEYID = 6
2,918,516 UART: [afmc] SUBJECT.KEYID = 7
2,918,942 UART: [afmc] AUTHORITY.KEYID = 5
2,954,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,746 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,495 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,977,205 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,983,086 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,787 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,596 UART: [afmc] --
2,997,491 UART: [cold-reset] --
2,998,665 UART: [state] Locking Datavault
2,999,574 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,178 UART: [state] Locking ICCM
3,000,660 UART: [exit] Launching FMC @ 0x40000130
3,005,990 UART:
3,006,006 UART: Running Caliptra FMC ...
3,006,414 UART:
3,006,468 UART: [state] CFI Enabled
3,017,176 UART: [fht] FMC Alias Private Key: 7
3,135,778 UART: [art] Extend RT PCRs Done
3,136,206 UART: [art] Lock RT PCRs Done
3,138,192 UART: [art] Populate DV Done
3,146,573 UART: [fht] FMC Alias Private Key: 7
3,147,639 UART: [art] Derive CDI
3,147,919 UART: [art] Store in slot 0x4
3,233,685 UART: [art] Derive Key Pair
3,234,045 UART: [art] Store priv key in slot 0x5
3,247,298 UART: [art] Derive Key Pair - Done
3,261,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,276,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,735 UART: [art] PUB.X = 9BA5B352D0ABC34B75FC14BAAB03959B1DC4BDA1DB1449ECBE20104FC64DEC45455631F75322615569E20A4D477C60D7
3,284,511 UART: [art] PUB.Y = 3D6754D25AFC9930F968FBE7E9587B128546FF98801851FBAC675DF54C4C34D4959472F80055AA2794C5CD3553435D66
3,291,435 UART: [art] SIG.R = 13F0B54979F87BC34F2D5239B0C18E72753728B7CD9F0FD7A114D169FD3385113DA9A7D7E6D4F46E88FAF4B81EB6B0AE
3,298,214 UART: [art] SIG.S = AC2FBB9697FB66F183C1774CCE3FE0CF078F0228D798FBA3CE36C1AD8A1A9B5D8477059D4364DAB4B1C0D0AE301E31AB
3,322,149 UART: Caliptra RT
3,322,400 UART: [state] CFI Enabled
3,441,811 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,704 >>> mbox cmd response: success
2,758,801 UART:
2,758,817 UART: Running Caliptra FMC ...
2,759,225 UART:
2,759,279 UART: [state] CFI Enabled
2,769,913 UART: [fht] FMC Alias Private Key: 7
2,889,145 UART: [art] Extend RT PCRs Done
2,889,573 UART: [art] Lock RT PCRs Done
2,891,243 UART: [art] Populate DV Done
2,899,326 UART: [fht] FMC Alias Private Key: 7
2,900,342 UART: [art] Derive CDI
2,900,622 UART: [art] Store in slot 0x4
2,986,140 UART: [art] Derive Key Pair
2,986,500 UART: [art] Store priv key in slot 0x5
2,999,909 UART: [art] Derive Key Pair - Done
3,014,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,533 UART: [art] PUB.X = 538048D7BE564A048F33455D16FDA6AE0B195BA88B0793EB53255129DF5E3A22998D03144AC5A37981A8627531893D8C
3,037,285 UART: [art] PUB.Y = A35B9887A7E8111D01E17EDC6734938843918A2FBCFF64BD40A86BF8140A007F01C446CE05ACD9E133596264AD924D89
3,044,203 UART: [art] SIG.R = 6CE0068E01049E32F64A54314287DA9730DDE91742E376301E45681013C2CB23BB5B11876AD020E508A7349EA2AF0597
3,050,950 UART: [art] SIG.S = 321727A6CDDDE345A54C2B4CC5ED6F9B5A79AC822B40AF65FD8D45586F04722F5D5FAEB1AFCD9E5C688F0C26F06EC6BC
3,074,988 UART: Caliptra RT
3,075,239 UART: [state] CFI Enabled
3,195,787 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,639 UART: [kat] SHA2-256
901,579 UART: [kat] SHA2-384
904,468 UART: [kat] SHA2-512-ACC
906,369 UART: [kat] ECC-384
915,788 UART: [kat] HMAC-384Kdf
920,432 UART: [kat] LMS
1,168,744 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,157 UART: [fht] FHT @ 0x50003400
1,172,651 UART: [idev] ++
1,172,819 UART: [idev] CDI.KEYID = 6
1,173,180 UART: [idev] SUBJECT.KEYID = 7
1,173,605 UART: [idev] UDS.KEYID = 0
1,181,446 UART: [idev] Erasing UDS.KEYID = 0
1,198,814 UART: [idev] Sha1 KeyId Algorithm
1,208,478 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,334 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,042 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,927 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,633 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,062 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,440 UART: [idev] --
1,300,569 UART: [ldev] ++
1,300,737 UART: [ldev] CDI.KEYID = 6
1,301,101 UART: [ldev] SUBJECT.KEYID = 5
1,301,528 UART: [ldev] AUTHORITY.KEYID = 7
1,301,991 UART: [ldev] FE.KEYID = 1
1,307,223 UART: [ldev] Erasing FE.KEYID = 1
1,333,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,889 UART: [ldev] --
1,373,248 UART: [fwproc] Wait for Commands...
1,373,935 UART: [fwproc] Recv command 0x46574c44
1,374,668 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,388 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,563 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,860 >>> mbox cmd response: success
2,919,086 UART: [afmc] ++
2,919,254 UART: [afmc] CDI.KEYID = 6
2,919,617 UART: [afmc] SUBJECT.KEYID = 7
2,920,043 UART: [afmc] AUTHORITY.KEYID = 5
2,956,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,334 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,979,044 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,925 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,626 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,371 UART: [afmc] --
2,999,350 UART: [cold-reset] --
3,000,240 UART: [state] Locking Datavault
3,001,447 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,051 UART: [state] Locking ICCM
3,002,553 UART: [exit] Launching FMC @ 0x40000130
3,007,883 UART:
3,007,899 UART: Running Caliptra FMC ...
3,008,307 UART:
3,008,450 UART: [state] CFI Enabled
3,019,482 UART: [fht] FMC Alias Private Key: 7
3,138,288 UART: [art] Extend RT PCRs Done
3,138,716 UART: [art] Lock RT PCRs Done
3,140,290 UART: [art] Populate DV Done
3,148,737 UART: [fht] FMC Alias Private Key: 7
3,149,905 UART: [art] Derive CDI
3,150,185 UART: [art] Store in slot 0x4
3,235,805 UART: [art] Derive Key Pair
3,236,165 UART: [art] Store priv key in slot 0x5
3,249,454 UART: [art] Derive Key Pair - Done
3,264,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,279,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,280,420 UART: [art] PUB.X = B5010A636B83C85B206D248E14069E5E6455BE235EEBA584B89AC8D285DB40AACBA5AE055EDD6AE9ACBA39346F7E2478
3,287,194 UART: [art] PUB.Y = DA7D689F941D023A0A6ABCB688C3506A5459627F225358796EF6C01985F1DDA9767BB04092F711A78B37B4A235B51A55
3,294,136 UART: [art] SIG.R = 8177910201B2CB7E4EF394B6CA2C9C203171C2A2EEF3E0B1122AD3DED21CF86B9890A8A382D575376EFB97062919A440
3,300,901 UART: [art] SIG.S = 2FC938F9EF86F7A1A9EE9052C45FF50CDE674BA3589B814E1EDC1EC8A7A4DA142FB3D78EC8B73187A78B653D44029682
3,324,379 UART: Caliptra RT
3,324,722 UART: [state] CFI Enabled
3,444,001 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,865 >>> mbox cmd response: success
2,760,276 UART:
2,760,292 UART: Running Caliptra FMC ...
2,760,700 UART:
2,760,843 UART: [state] CFI Enabled
2,771,417 UART: [fht] FMC Alias Private Key: 7
2,890,653 UART: [art] Extend RT PCRs Done
2,891,081 UART: [art] Lock RT PCRs Done
2,892,495 UART: [art] Populate DV Done
2,900,958 UART: [fht] FMC Alias Private Key: 7
2,902,132 UART: [art] Derive CDI
2,902,412 UART: [art] Store in slot 0x4
2,988,174 UART: [art] Derive Key Pair
2,988,534 UART: [art] Store priv key in slot 0x5
3,002,311 UART: [art] Derive Key Pair - Done
3,017,142 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,542 UART: [art] PUB.X = 90D43A85DEDF78F51E20E33B7E4DAB30E1FF8A9DD6B49A17886040B573C7D38951B84805A5EBDE2B3C177FC0ACB83629
3,040,323 UART: [art] PUB.Y = 418FBF33402526EDF9D4DBBBE7EBF5D9D82B09328B6A32991DD653F919B5F9EAFBE70076DAC78753046E8890532C30FB
3,047,257 UART: [art] SIG.R = A580025EEDB2C01837A16B928693843008BD1E6EE9182A671228445D2B676424310A5B0428C13ECC1D76E3AE59F60673
3,054,004 UART: [art] SIG.S = 3CFE8104553161F85AE4FD0245A81C5427A142444DF36900D0BA4B01B92C68E7A8B4D8076F34940A5686897DF7CD9EBD
3,077,925 UART: Caliptra RT
3,078,268 UART: [state] CFI Enabled
3,198,511 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
86,769 UART: [state] WD Timer not started. Device not locked for debugging
88,126 UART: [kat] SHA2-256
891,676 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,780 UART: [kat] ++
895,932 UART: [kat] sha1
900,096 UART: [kat] SHA2-256
902,036 UART: [kat] SHA2-384
904,907 UART: [kat] SHA2-512-ACC
906,808 UART: [kat] ECC-384
916,583 UART: [kat] HMAC-384Kdf
921,227 UART: [kat] LMS
1,169,539 UART: [kat] --
1,170,490 UART: [cold-reset] ++
1,170,916 UART: [fht] FHT @ 0x50003400
1,173,638 UART: [idev] ++
1,173,806 UART: [idev] CDI.KEYID = 6
1,174,167 UART: [idev] SUBJECT.KEYID = 7
1,174,592 UART: [idev] UDS.KEYID = 0
1,182,295 UART: [idev] Erasing UDS.KEYID = 0
1,199,737 UART: [idev] Sha1 KeyId Algorithm
1,209,571 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,039 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,747 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,632 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,338 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,767 UART: [idev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
1,299,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,145 UART: [idev] --
1,301,092 UART: [ldev] ++
1,301,260 UART: [ldev] CDI.KEYID = 6
1,301,624 UART: [ldev] SUBJECT.KEYID = 5
1,302,051 UART: [ldev] AUTHORITY.KEYID = 7
1,302,514 UART: [ldev] FE.KEYID = 1
1,307,778 UART: [ldev] Erasing FE.KEYID = 1
1,333,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,522 UART: [ldev] --
1,372,799 UART: [fwproc] Wait for Commands...
1,373,440 UART: [fwproc] Recv command 0x46574c44
1,374,173 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,479 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,654 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,916,853 >>> mbox cmd response: success
2,917,973 UART: [afmc] ++
2,918,141 UART: [afmc] CDI.KEYID = 6
2,918,504 UART: [afmc] SUBJECT.KEYID = 7
2,918,930 UART: [afmc] AUTHORITY.KEYID = 5
2,954,033 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,093 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,803 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,684 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,385 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,270 UART: [afmc] --
2,997,123 UART: [cold-reset] --
2,997,849 UART: [state] Locking Datavault
2,998,956 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,560 UART: [state] Locking ICCM
3,000,036 UART: [exit] Launching FMC @ 0x40000130
3,005,366 UART:
3,005,382 UART: Running Caliptra FMC ...
3,005,790 UART:
3,005,844 UART: [state] CFI Enabled
3,016,540 UART: [fht] FMC Alias Private Key: 7
3,135,774 UART: [art] Extend RT PCRs Done
3,136,202 UART: [art] Lock RT PCRs Done
3,137,676 UART: [art] Populate DV Done
3,146,027 UART: [fht] FMC Alias Private Key: 7
3,147,061 UART: [art] Derive CDI
3,147,341 UART: [art] Store in slot 0x4
3,232,816 UART: [art] Derive Key Pair
3,233,176 UART: [art] Store priv key in slot 0x5
3,246,670 UART: [art] Derive Key Pair - Done
3,261,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,277,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,278,046 UART: [art] PUB.X = A5EBF75B71E60754CB564F738A1D1C18E3BDAA69D80F38F1D5A46B6A853C4FE82C7D546004137D46A28F0F1A68FFC074
3,284,816 UART: [art] PUB.Y = 4514888879CA23BF1553C11116D9F5C336A44A60DA24D2A0495024544FC87B80F1BF6FCDF5531EBFEEC7D53737C630B9
3,291,770 UART: [art] SIG.R = A38E9A215C330C3E1B42143D5F46B3E8F1CEDE9365CF338F2C168C8AD06C01574FC4EA54BDDA21F5B88789A68DFC31D7
3,298,550 UART: [art] SIG.S = 215BF6FBE325C625CD481BB62A6B47D18800DC64907F9A3EC5913289BA4727CA7493EBF7833C0E76EE60495DDA3A9C51
3,322,787 UART: Caliptra RT
3,323,038 UART: [state] CFI Enabled
3,442,159 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,388 >>> mbox cmd response: success
2,758,049 UART:
2,758,065 UART: Running Caliptra FMC ...
2,758,473 UART:
2,758,527 UART: [state] CFI Enabled
2,769,053 UART: [fht] FMC Alias Private Key: 7
2,888,563 UART: [art] Extend RT PCRs Done
2,888,991 UART: [art] Lock RT PCRs Done
2,890,537 UART: [art] Populate DV Done
2,898,582 UART: [fht] FMC Alias Private Key: 7
2,899,694 UART: [art] Derive CDI
2,899,974 UART: [art] Store in slot 0x4
2,985,753 UART: [art] Derive Key Pair
2,986,113 UART: [art] Store priv key in slot 0x5
2,999,325 UART: [art] Derive Key Pair - Done
3,014,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,290 UART: [art] PUB.X = 4425813292A674610FCEDAAEB3EE4B0971B23F2C985088AB0FC61A985FD2E89F1CC3A7AAD87BA06ECDF3242E659B52D1
3,037,067 UART: [art] PUB.Y = 14EB217EA2942444D849D787A64F84525E583C7256969C98D32968C5523DD4BD145E20A74F4EE9AC0AC087281C278984
3,044,006 UART: [art] SIG.R = 80097B9C3D2304F6C85B96B59BCFB3EF779845791C3A9A3728604E6D8A5611CE6EFDB22CE243596ACF7E9572C11A8BF4
3,050,778 UART: [art] SIG.S = 5D3C7586535068DFA7F97EE54D09718CEA400FF52AF6ED755ADD5AA7F525F3D8A23B5DF87889B13EA77D5A29E7426596
3,074,608 UART: Caliptra RT
3,074,859 UART: [state] CFI Enabled
3,194,112 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
915,900 UART: [kat] HMAC-384Kdf
920,678 UART: [kat] LMS
1,168,990 UART: [kat] --
1,169,983 UART: [cold-reset] ++
1,170,373 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,182,118 UART: [idev] Erasing UDS.KEYID = 0
1,198,916 UART: [idev] Sha1 KeyId Algorithm
1,208,656 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,368 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,076 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,961 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,667 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,096 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,474 UART: [idev] --
1,300,591 UART: [ldev] ++
1,300,759 UART: [ldev] CDI.KEYID = 6
1,301,123 UART: [ldev] SUBJECT.KEYID = 5
1,301,550 UART: [ldev] AUTHORITY.KEYID = 7
1,302,013 UART: [ldev] FE.KEYID = 1
1,307,353 UART: [ldev] Erasing FE.KEYID = 1
1,333,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,571 UART: [ldev] --
1,372,786 UART: [fwproc] Wait for Commands...
1,373,399 UART: [fwproc] Recv command 0x46574c44
1,374,132 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,166 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,341 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,728 >>> mbox cmd response: success
2,918,780 UART: [afmc] ++
2,918,948 UART: [afmc] CDI.KEYID = 6
2,919,311 UART: [afmc] SUBJECT.KEYID = 7
2,919,737 UART: [afmc] AUTHORITY.KEYID = 5
2,955,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,972,784 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,494 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,375 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,076 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,765 UART: [afmc] --
2,998,692 UART: [cold-reset] --
2,999,442 UART: [state] Locking Datavault
3,000,537 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,141 UART: [state] Locking ICCM
3,001,683 UART: [exit] Launching FMC @ 0x40000130
3,007,013 UART:
3,007,029 UART: Running Caliptra FMC ...
3,007,437 UART:
3,007,580 UART: [state] CFI Enabled
3,018,152 UART: [fht] FMC Alias Private Key: 7
3,136,660 UART: [art] Extend RT PCRs Done
3,137,088 UART: [art] Lock RT PCRs Done
3,138,476 UART: [art] Populate DV Done
3,146,847 UART: [fht] FMC Alias Private Key: 7
3,147,853 UART: [art] Derive CDI
3,148,133 UART: [art] Store in slot 0x4
3,234,044 UART: [art] Derive Key Pair
3,234,404 UART: [art] Store priv key in slot 0x5
3,247,482 UART: [art] Derive Key Pair - Done
3,262,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,277,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,278,666 UART: [art] PUB.X = D0E19FD6B653EB042A6926574042EA352536C23989331B6EF738F2598278703AA4A714A8C0BC80B324D0C8450F1DCBF8
3,285,428 UART: [art] PUB.Y = C84538690328923C1C06070305CDF1F1DC4A420438761A9BB0FEBBEE0641B3769658CF571F07174F68B1107D54976321
3,292,344 UART: [art] SIG.R = A796A26B543FCF31C6718309F1B48ADF248C4992720B9049A771F803ACFE327CE3BBAD735A91EEF2E5BC43FDCBF7FAEC
3,299,127 UART: [art] SIG.S = F8D2F1FDCC6E39C561D5D97ADAF5177C103BB04DE64349A33BE819B07C53C4C182F52847DCDD0B5F45ECE6D04B9E4F4B
3,323,588 UART: Caliptra RT
3,323,931 UART: [state] CFI Enabled
3,444,229 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,697 >>> mbox cmd response: success
2,758,214 UART:
2,758,230 UART: Running Caliptra FMC ...
2,758,638 UART:
2,758,781 UART: [state] CFI Enabled
2,769,525 UART: [fht] FMC Alias Private Key: 7
2,889,205 UART: [art] Extend RT PCRs Done
2,889,633 UART: [art] Lock RT PCRs Done
2,891,059 UART: [art] Populate DV Done
2,898,974 UART: [fht] FMC Alias Private Key: 7
2,900,096 UART: [art] Derive CDI
2,900,376 UART: [art] Store in slot 0x4
2,986,489 UART: [art] Derive Key Pair
2,986,849 UART: [art] Store priv key in slot 0x5
3,000,517 UART: [art] Derive Key Pair - Done
3,015,364 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,802 UART: [art] PUB.X = 673BC334A13DD9B75B4430308E3BE6D63122BFCA936BC6C1020C44524518068AD7DFE102D0F700A18A66DAC7D1B3D8CE
3,038,548 UART: [art] PUB.Y = 74FA00F6D953F5AF4765EADE9B28D2CCE3670F5CFB499F1B952E541EF05B2A58D57CAB4CDBEC4C1E6228BD5D20E31494
3,045,495 UART: [art] SIG.R = B4C6E5737755F46489DFB65CFE61C92B9F26C56F4D244798E6DA2FCB8AF7E6FB77A9B3B5098D8EC0EFB41245A481E3E6
3,052,278 UART: [art] SIG.S = C4FDBA366CF6A81FC2F94E1214936875D4702D0C5440B9A4D0A084AEF9672D3FE67B11D0BAE8C0F53B442C0C1C45B5E3
3,076,270 UART: Caliptra RT
3,076,613 UART: [state] CFI Enabled
3,196,217 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,548 UART: [kat] SHA2-256
901,488 UART: [kat] SHA2-384
904,091 UART: [kat] SHA2-512-ACC
905,992 UART: [kat] ECC-384
915,875 UART: [kat] HMAC-384Kdf
920,421 UART: [kat] LMS
1,168,733 UART: [kat] --
1,169,714 UART: [cold-reset] ++
1,170,066 UART: [fht] FHT @ 0x50003400
1,172,600 UART: [idev] ++
1,172,768 UART: [idev] CDI.KEYID = 6
1,173,129 UART: [idev] SUBJECT.KEYID = 7
1,173,554 UART: [idev] UDS.KEYID = 0
1,181,395 UART: [idev] Erasing UDS.KEYID = 0
1,198,101 UART: [idev] Sha1 KeyId Algorithm
1,207,683 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,647 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,355 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,240 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,946 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,375 UART: [idev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
1,298,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,753 UART: [idev] --
1,299,954 UART: [ldev] ++
1,300,122 UART: [ldev] CDI.KEYID = 6
1,300,486 UART: [ldev] SUBJECT.KEYID = 5
1,300,913 UART: [ldev] AUTHORITY.KEYID = 7
1,301,376 UART: [ldev] FE.KEYID = 1
1,306,574 UART: [ldev] Erasing FE.KEYID = 1
1,333,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,312 UART: [ldev] --
1,372,659 UART: [fwproc] Wait for Commands...
1,373,472 UART: [fwproc] Recv command 0x46574c44
1,374,205 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,747,857 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,779,032 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,919,365 >>> mbox cmd response: success
2,920,463 UART: [afmc] ++
2,920,631 UART: [afmc] CDI.KEYID = 6
2,920,994 UART: [afmc] SUBJECT.KEYID = 7
2,921,420 UART: [afmc] AUTHORITY.KEYID = 5
2,957,139 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,973,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,974,611 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,980,321 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,986,202 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,991,903 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,999,830 UART: [afmc] --
3,000,889 UART: [cold-reset] --
3,001,903 UART: [state] Locking Datavault
3,002,916 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,520 UART: [state] Locking ICCM
3,004,002 UART: [exit] Launching FMC @ 0x40000130
3,009,332 UART:
3,009,348 UART: Running Caliptra FMC ...
3,009,756 UART:
3,009,810 UART: [state] CFI Enabled
3,020,416 UART: [fht] FMC Alias Private Key: 7
3,139,372 UART: [art] Extend RT PCRs Done
3,139,800 UART: [art] Lock RT PCRs Done
3,141,248 UART: [art] Populate DV Done
3,149,267 UART: [fht] FMC Alias Private Key: 7
3,150,441 UART: [art] Derive CDI
3,150,721 UART: [art] Store in slot 0x4
3,235,898 UART: [art] Derive Key Pair
3,236,258 UART: [art] Store priv key in slot 0x5
3,249,908 UART: [art] Derive Key Pair - Done
3,264,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,280,342 UART: [art] Erasing AUTHORITY.KEYID = 7
3,281,107 UART: [art] PUB.X = 3BC097AD6020162AD05933F90C4AFAE4132948BB0857936F4EFA3D081A05FBA58E9894039C14B3482083E36D01B0FA28
3,287,859 UART: [art] PUB.Y = 5811FEDB1083FB90977BE8D792750F2096FC09EBB1893E3B3B0F7EE8D0B8E1A2EE8CB1CFEBB3B4C552C3A5025C7DACED
3,294,823 UART: [art] SIG.R = EE8C3B768BFD01BFBCE42D02BE7FE2FB769E2B06A48554C620715DA3F2366B824D0B8BC44F39DBAB528F172CC84BD191
3,301,601 UART: [art] SIG.S = 81E2B1AD24FB527A261B7AE2A6C96979D7C37010173EAF87A744D9202E8555424DA017DCC44E1DF43A4AA2549DDECC4A
3,325,361 UART: Caliptra RT
3,325,612 UART: [state] CFI Enabled
3,445,222 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,062 >>> mbox cmd response: success
2,757,801 UART:
2,757,817 UART: Running Caliptra FMC ...
2,758,225 UART:
2,758,279 UART: [state] CFI Enabled
2,768,589 UART: [fht] FMC Alias Private Key: 7
2,887,677 UART: [art] Extend RT PCRs Done
2,888,105 UART: [art] Lock RT PCRs Done
2,889,749 UART: [art] Populate DV Done
2,897,798 UART: [fht] FMC Alias Private Key: 7
2,898,768 UART: [art] Derive CDI
2,899,048 UART: [art] Store in slot 0x4
2,984,383 UART: [art] Derive Key Pair
2,984,743 UART: [art] Store priv key in slot 0x5
2,997,771 UART: [art] Derive Key Pair - Done
3,012,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,821 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,586 UART: [art] PUB.X = 39021DF10B8B61B5DE240179BE7A3B8D83C98D6B6837A13FB79D2F3120B010E1495C4937618507355B1F270F819E7833
3,035,333 UART: [art] PUB.Y = 4CD092375B4E8FC6DF9FD3CFE5B89B3F235316FC043FFEA50A95165FDD1AD20A9AEADF516230F0959295DC8D74FE1009
3,042,289 UART: [art] SIG.R = 4F61BCE0EF5403005B875F88903F671375CD6F884B1280E110194F4BB9D3A580BC3F35D6134CEA9F4289A6FF494E72DB
3,049,038 UART: [art] SIG.S = 41655FAC01DBA75393021F51AE70C3A4D258A2AC8A4637E733A1084B76923A77658E0852F65B33BCF0A8F9844BA18015
3,072,426 UART: Caliptra RT
3,072,677 UART: [state] CFI Enabled
3,191,957 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,290 UART: [state] WD Timer not started. Device not locked for debugging
87,425 UART: [kat] SHA2-256
890,975 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,079 UART: [kat] ++
895,231 UART: [kat] sha1
899,443 UART: [kat] SHA2-256
901,383 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
916,430 UART: [kat] HMAC-384Kdf
921,098 UART: [kat] LMS
1,169,410 UART: [kat] --
1,170,385 UART: [cold-reset] ++
1,170,745 UART: [fht] FHT @ 0x50003400
1,173,323 UART: [idev] ++
1,173,491 UART: [idev] CDI.KEYID = 6
1,173,852 UART: [idev] SUBJECT.KEYID = 7
1,174,277 UART: [idev] UDS.KEYID = 0
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,556 UART: [idev] Sha1 KeyId Algorithm
1,209,334 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,392 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,100 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,985 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,691 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,120 UART: [idev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
1,300,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,498 UART: [idev] --
1,301,647 UART: [ldev] ++
1,301,815 UART: [ldev] CDI.KEYID = 6
1,302,179 UART: [ldev] SUBJECT.KEYID = 5
1,302,606 UART: [ldev] AUTHORITY.KEYID = 7
1,303,069 UART: [ldev] FE.KEYID = 1
1,308,335 UART: [ldev] Erasing FE.KEYID = 1
1,334,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,683 UART: [ldev] --
1,373,950 UART: [fwproc] Wait for Commands...
1,374,613 UART: [fwproc] Recv command 0x46574c44
1,375,346 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,367 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,747,082 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,778,257 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,918,416 >>> mbox cmd response: success
2,919,614 UART: [afmc] ++
2,919,782 UART: [afmc] CDI.KEYID = 6
2,920,145 UART: [afmc] SUBJECT.KEYID = 7
2,920,571 UART: [afmc] AUTHORITY.KEYID = 5
2,956,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,704 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,979,414 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,985,295 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,996 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,647 UART: [afmc] --
2,999,664 UART: [cold-reset] --
3,000,588 UART: [state] Locking Datavault
3,001,567 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,171 UART: [state] Locking ICCM
3,002,679 UART: [exit] Launching FMC @ 0x40000130
3,008,009 UART:
3,008,025 UART: Running Caliptra FMC ...
3,008,433 UART:
3,008,576 UART: [state] CFI Enabled
3,019,008 UART: [fht] FMC Alias Private Key: 7
3,136,950 UART: [art] Extend RT PCRs Done
3,137,378 UART: [art] Lock RT PCRs Done
3,138,884 UART: [art] Populate DV Done
3,147,219 UART: [fht] FMC Alias Private Key: 7
3,148,293 UART: [art] Derive CDI
3,148,573 UART: [art] Store in slot 0x4
3,234,252 UART: [art] Derive Key Pair
3,234,612 UART: [art] Store priv key in slot 0x5
3,247,488 UART: [art] Derive Key Pair - Done
3,262,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,277,624 UART: [art] Erasing AUTHORITY.KEYID = 7
3,278,389 UART: [art] PUB.X = 73290DBC449730E8CBA97B7F876C414CAEE2ED8F09653259DB119FF2EB2E93E14C6D6E55D45A7888A74059C4A844D5F0
3,285,161 UART: [art] PUB.Y = 582132AC71FFD6EA2D1A4B6FB4EA5C0932C333D76EB7C8F283AAF5020726561ED2EE0A642428BA65AD662B467A376952
3,292,107 UART: [art] SIG.R = AF7C5F2E8BE076B9856CE4B6792F486603B930606CBB557A3DEA79C0A5FD61CFBDE0764F81785E60D652EC8D20DE3616
3,298,886 UART: [art] SIG.S = 91F325506B8B408D802AA00495A75D1EA46836B0CFB595C9CFC4F7991D0EF300D4FE96FBA283C1F860BBF2D75DD7F06B
3,323,082 UART: Caliptra RT
3,323,425 UART: [state] CFI Enabled
3,443,529 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,461 >>> mbox cmd response: success
2,760,414 UART:
2,760,430 UART: Running Caliptra FMC ...
2,760,838 UART:
2,760,981 UART: [state] CFI Enabled
2,771,271 UART: [fht] FMC Alias Private Key: 7
2,890,031 UART: [art] Extend RT PCRs Done
2,890,459 UART: [art] Lock RT PCRs Done
2,892,077 UART: [art] Populate DV Done
2,900,354 UART: [fht] FMC Alias Private Key: 7
2,901,374 UART: [art] Derive CDI
2,901,654 UART: [art] Store in slot 0x4
2,987,687 UART: [art] Derive Key Pair
2,988,047 UART: [art] Store priv key in slot 0x5
3,001,731 UART: [art] Derive Key Pair - Done
3,016,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,697 UART: [art] PUB.X = 5B3825BA536CFB525D2C1117FA4ABBACCB9A61D2212AE9529166BAB186E5F209C78ED084414F29968A321CE32DE1B523
3,039,474 UART: [art] PUB.Y = A533877C681D255016F38B4929777FF9034BFCC84B8A43433D694183C170D8266A89E181DFD42DB4E214ED8BDB2B6754
3,046,419 UART: [art] SIG.R = D62CAF28A699125FA9A06999B1A27278EE57B05879D94F0E02EE181D4B2D5B138C7E78ABBF693603E2E4FFEBF7228C8A
3,053,192 UART: [art] SIG.S = 4CCC8F67F3DD0359B9D4A51ED79320F97EECB2AAD0964663E9622251E073279FEA9496226EB4CB1B5F650E4D7EF27FBA
3,077,282 UART: Caliptra RT
3,077,625 UART: [state] CFI Enabled
3,197,700 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
Truncated 7229978 bytes from beginning
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
7,970,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,119,751 UART: [idev] --
8,120,400 UART: [ldev] ++
8,120,911 UART: [ldev] CDI.KEYID = 6
8,121,818 UART: [ldev] SUBJECT.KEYID = 5
8,122,843 UART: [ldev] AUTHORITY.KEYID = 7
8,124,026 UART: [ldev] FE.KEYID = 1
8,124,953 UART: [ldev] Erasing FE.KEYID = 1
10,526,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,261,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,277,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,292,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,308,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,330,239 UART: [ldev] --
12,334,819 UART: [fwproc] Wait for Commands...
12,337,194 UART: [fwproc] Recv command 0x46574c44
12,339,243 UART: [fwproc] Recv'd Img size: 118548 bytes
15,829,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,907,764 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,980,784 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,308,315 >>> mbox cmd response: success
16,313,085 UART: [afmc] ++
16,313,680 UART: [afmc] CDI.KEYID = 6
16,314,706 UART: [afmc] SUBJECT.KEYID = 7
16,315,972 UART: [afmc] AUTHORITY.KEYID = 5
18,855,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,581,496 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,583,674 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,599,497 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,615,568 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,631,149 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,655,420 UART: [afmc] --
20,659,728 UART: [cold-reset] --
20,664,510 UART: [state] Locking Datavault
20,671,552 UART: [state] Locking PCR0, PCR1 and PCR31
20,673,306 UART: [state] Locking ICCM
20,675,318 UART: [exit] Launching FMC @ 0x40000130
20,683,718 UART:
20,683,953 UART: Running Caliptra FMC ...
20,685,058 UART:
20,685,238 UART: [state] CFI Enabled
20,738,634 UART: [fht] FMC Alias Private Key: 7
22,504,658 UART: [art] Extend RT PCRs Done
22,505,872 UART: [art] Lock RT PCRs Done
22,507,370 UART: [art] Populate DV Done
22,512,575 UART: [fht] FMC Alias Private Key: 7
22,514,165 UART: [art] Derive CDI
22,514,907 UART: [art] Store in slot 0x4
22,571,783 UART: [art] Derive Key Pair
22,572,823 UART: [art] Store priv key in slot 0x5
25,035,556 UART: [art] Derive Key Pair - Done
25,048,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,761,658 UART: [art] Erasing AUTHORITY.KEYID = 7
26,763,148 UART: [art] PUB.X = 694341A5EEFEAAAFD23CDDBFDC7659F13EA5353A0D3927D14382A5CD74C9A3A27CD7A5766E3598EC12B5B87919B7DC7B
26,770,473 UART: [art] PUB.Y = C323CB7A02907ADADE2017B1777A1B1EF0683DAB24CE782017903E72BE0DDBDDE5A8449F1F50C48A69F58E85E2DDFB58
26,777,752 UART: [art] SIG.R = D2C05815124B4858D23C45BFC9AC25D6399275A8B17F964483A89B00D38ABAEA2D5DCBB90BF7680CB284EC313730E0C4
26,785,109 UART: [art] SIG.S = 45E70F0C737D65CE670BFCE935CC0FA3B729162ECB083B2BF2F208D9917454D4D872C11A57BB544C47CCB1088FB9893B
27,763,894 UART: Caliptra RT
27,764,607 UART: [state] CFI Enabled
27,946,276 UART: [rt] RT listening for mailbox commands...
28,097,366 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,127,567 UART: [rt]cmd =0x4c444556, len=4
28,138,685 >>> mbox cmd response data (687 bytes)
28,284,291 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,314,479 UART: [rt]cmd =0x43455246, len=4
28,327,092 >>> mbox cmd response data (888 bytes)
28,469,089 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,498,994 UART: [rt]cmd =0x43455252, len=4
28,510,347 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,059 UART:
192,439 UART: Running Caliptra ROM ...
193,556 UART:
193,704 UART: [state] CFI Enabled
261,055 UART: [state] LifecycleState = Unprovisioned
263,028 UART: [state] DebugLocked = No
265,903 UART: [state] WD Timer not started. Device not locked for debugging
270,536 UART: [kat] SHA2-256
450,157 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,966 UART: [kat] ++
461,422 UART: [kat] sha1
473,759 UART: [kat] SHA2-256
476,416 UART: [kat] SHA2-384
481,102 UART: [kat] SHA2-512-ACC
483,442 UART: [kat] ECC-384
2,949,307 UART: [kat] HMAC-384Kdf
2,969,265 UART: [kat] LMS
3,445,766 UART: [kat] --
3,450,027 UART: [cold-reset] ++
3,452,615 UART: [fht] FHT @ 0x50003400
3,463,268 UART: [idev] ++
3,463,894 UART: [idev] CDI.KEYID = 6
3,464,812 UART: [idev] SUBJECT.KEYID = 7
3,466,086 UART: [idev] UDS.KEYID = 0
3,500,656 UART: [idev] Erasing UDS.KEYID = 0
5,983,993 UART: [idev] Sha1 KeyId Algorithm
6,008,191 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,740,620 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,756,488 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,772,450 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,788,058 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,814,119 UART: [idev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
7,969,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,118,705 UART: [idev] --
8,119,335 UART: [ldev] ++
8,119,837 UART: [ldev] CDI.KEYID = 6
8,120,723 UART: [ldev] SUBJECT.KEYID = 5
8,121,749 UART: [ldev] AUTHORITY.KEYID = 7
8,122,948 UART: [ldev] FE.KEYID = 1
8,123,868 UART: [ldev] Erasing FE.KEYID = 1
10,527,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,258,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,274,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,290,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,305,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,328,766 UART: [ldev] --
12,333,981 UART: [fwproc] Wait for Commands...
12,336,139 UART: [fwproc] Recv command 0x46574c44
12,338,189 UART: [fwproc] Recv'd Img size: 118548 bytes
15,820,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,899,873 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,972,939 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,301,000 >>> mbox cmd response: success
16,304,383 UART: [afmc] ++
16,304,976 UART: [afmc] CDI.KEYID = 6
16,305,892 UART: [afmc] SUBJECT.KEYID = 7
16,307,111 UART: [afmc] AUTHORITY.KEYID = 5
18,837,033 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,579,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,581,669 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,597,509 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,613,563 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,629,109 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,652,740 UART: [afmc] --
20,656,767 UART: [cold-reset] --
20,660,359 UART: [state] Locking Datavault
20,665,502 UART: [state] Locking PCR0, PCR1 and PCR31
20,667,263 UART: [state] Locking ICCM
20,669,470 UART: [exit] Launching FMC @ 0x40000130
20,677,921 UART:
20,678,162 UART: Running Caliptra FMC ...
20,679,264 UART:
20,679,428 UART: [state] CFI Enabled
20,735,437 UART: [fht] FMC Alias Private Key: 7
22,502,113 UART: [art] Extend RT PCRs Done
22,503,333 UART: [art] Lock RT PCRs Done
22,504,899 UART: [art] Populate DV Done
22,510,482 UART: [fht] FMC Alias Private Key: 7
22,512,191 UART: [art] Derive CDI
22,513,007 UART: [art] Store in slot 0x4
22,568,549 UART: [art] Derive Key Pair
22,569,591 UART: [art] Store priv key in slot 0x5
25,032,319 UART: [art] Derive Key Pair - Done
25,045,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,757,690 UART: [art] Erasing AUTHORITY.KEYID = 7
26,759,200 UART: [art] PUB.X = 54D6D8D9F0903AFD7792058CDFAC7ED99B7DF0C0A3781351E561163DE432B404BAD2F9D06D57067DF29C34213E16BBF4
26,766,520 UART: [art] PUB.Y = B20E6F26EBE5605D8C25DE9F95AD323421A17F772CDE9BFEF91EBAE4B5111928ADC7FBAD4E2E92E310BD956AB6AB5551
26,773,786 UART: [art] SIG.R = 10B3931466002C58B5EFF55188D590C502B2C8C0DFAF6103873FE42E162F608925809CEDA8E167D6EAE493910C550816
26,781,109 UART: [art] SIG.S = 1B4293981725514BE8604E2D9CE1D8D86EDD739D2C6CADCB0310643EACFE3A2EDAC3E2BD120352663D95DE94743AD481
27,760,009 UART: Caliptra RT
27,760,722 UART: [state] CFI Enabled
27,940,369 UART: [rt] RT listening for mailbox commands...
28,090,750 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,120,705 UART: [rt]cmd =0x4c444556, len=4
28,131,857 >>> mbox cmd response data (687 bytes)
28,277,217 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,307,002 UART: [rt]cmd =0x43455246, len=4
28,319,429 >>> mbox cmd response data (888 bytes)
28,461,979 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,492,132 UART: [rt]cmd =0x43455252, len=4
28,503,518 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1541.60s
Truncated 2433978 bytes from beginning
ng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
7,742,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,990,235 >>> mbox cmd response: success
20,286,564 UART:
20,286,945 UART: Running Caliptra FMC ...
20,288,074 UART:
20,288,235 UART: [state] CFI Enabled
20,351,970 UART: [fht] FMC Alias Private Key: 7
22,118,647 UART: [art] Extend RT PCRs Done
22,119,876 UART: [art] Lock RT PCRs Done
22,121,674 UART: [art] Populate DV Done
22,127,309 UART: [fht] FMC Alias Private Key: 7
22,129,079 UART: [art] Derive CDI
22,129,907 UART: [art] Store in slot 0x4
22,185,024 UART: [art] Derive Key Pair
22,186,035 UART: [art] Store priv key in slot 0x5
24,648,884 UART: [art] Derive Key Pair - Done
24,661,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,374,496 UART: [art] Erasing AUTHORITY.KEYID = 7
26,376,001 UART: [art] PUB.X = 85B817889FE0C9A0363C4A0883E2F17FA063D9C8478823609AF858E0A7DC023BDFE9B86D89ABE775438BE659C9056250
26,383,274 UART: [art] PUB.Y = 023970BA09947593E7E7366DDE6FF37164E2CE900667357149B363CC2518377F9C3C26F23220AE1B72057439E12FA754
26,390,449 UART: [art] SIG.R = 51DC98264F6A912B46FD11EE771C59FD5A4BD315C9ED2008969BBC67D40C480D0BD5A4BF3746DC74637684610DF33D47
26,397,854 UART: [art] SIG.S = 6EA071DAC0A42D80ED9FE3393611B6AC391CA8814BF725DCA7957713F304602607135CFA2BA8CD8AE3FAB7B248D6511C
27,377,172 UART: Caliptra RT
27,377,873 UART: [state] CFI Enabled
27,558,214 UART: [rt] RT listening for mailbox commands...
27,708,487 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,738,486 UART: [rt]cmd =0x4c444556, len=4
27,749,610 >>> mbox cmd response data (687 bytes)
27,894,810 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,924,960 UART: [rt]cmd =0x43455246, len=4
27,937,629 >>> mbox cmd response data (888 bytes)
28,080,498 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,110,435 UART: [rt]cmd =0x43455252, len=4
28,121,965 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
7,743,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,968,611 >>> mbox cmd response: success
20,265,442 UART:
20,265,824 UART: Running Caliptra FMC ...
20,267,032 UART:
20,267,214 UART: [state] CFI Enabled
20,330,067 UART: [fht] FMC Alias Private Key: 7
22,096,264 UART: [art] Extend RT PCRs Done
22,097,474 UART: [art] Lock RT PCRs Done
22,098,855 UART: [art] Populate DV Done
22,104,267 UART: [fht] FMC Alias Private Key: 7
22,105,973 UART: [art] Derive CDI
22,106,789 UART: [art] Store in slot 0x4
22,162,910 UART: [art] Derive Key Pair
22,163,981 UART: [art] Store priv key in slot 0x5
24,626,389 UART: [art] Derive Key Pair - Done
24,639,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,352,345 UART: [art] Erasing AUTHORITY.KEYID = 7
26,353,849 UART: [art] PUB.X = F56EDF7FF0224E4F561152DE037B4DE9DF3BE15BAB2EEE9FB18CA60C1B6C14BEE4810B8EC278B7ADC743E498CC8EB0F1
26,361,169 UART: [art] PUB.Y = 4314D6E765FBAA913E84E688DB201E6CA879203E2972D934B9135DBDDA48C722BFA0F2F40FB59BD02BCAC04B20000FDB
26,368,400 UART: [art] SIG.R = EA91FFFBD0DFAE84017F6F3706F88A3A20000A3851E48D0BA95E6F67255DC41E66B93ECCF5F3A387693B680C9C6F8821
26,375,805 UART: [art] SIG.S = 20CD1F9A143D1AD197CF221C5DCDAC6736A51BD74AE002D72D967E36170E4B67F5682D6A6AF39C757D558A16A8111E24
27,354,315 UART: Caliptra RT
27,355,007 UART: [state] CFI Enabled
27,535,781 UART: [rt] RT listening for mailbox commands...
27,685,628 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,715,649 UART: [rt]cmd =0x4c444556, len=4
27,726,879 >>> mbox cmd response data (687 bytes)
27,872,601 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,902,658 UART: [rt]cmd =0x43455246, len=4
27,915,211 >>> mbox cmd response data (888 bytes)
28,058,354 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,088,229 UART: [rt]cmd =0x43455252, len=4
28,099,678 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
7,745,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,993,573 >>> mbox cmd response: success
20,284,554 UART:
20,285,020 UART: Running Caliptra FMC ...
20,286,153 UART:
20,286,344 UART: [state] CFI Enabled
20,354,039 UART: [fht] FMC Alias Private Key: 7
22,120,657 UART: [art] Extend RT PCRs Done
22,121,883 UART: [art] Lock RT PCRs Done
22,123,489 UART: [art] Populate DV Done
22,128,895 UART: [fht] FMC Alias Private Key: 7
22,130,492 UART: [art] Derive CDI
22,131,312 UART: [art] Store in slot 0x4
22,187,291 UART: [art] Derive Key Pair
22,188,335 UART: [art] Store priv key in slot 0x5
24,651,100 UART: [art] Derive Key Pair - Done
24,663,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,375,791 UART: [art] Erasing AUTHORITY.KEYID = 7
26,377,301 UART: [art] PUB.X = 411DC1DA1E45D88D4B14539DE21A72A595361B952F6953D352C53F96726C543E604B203B029506EA98F63AAFC04221C8
26,384,586 UART: [art] PUB.Y = 77C0C09D046D3DD04CE660918C344405DF423202B033ED9ED1B386B3CC6110A6C95D2E5D695F52F90ACD32FC658D9949
26,391,790 UART: [art] SIG.R = C8C722995887D0B8334788B7AFF529DC6838F1C2AA4A1FF7C93A973BA5FCF189D5AACFEE0C475C0DDFC572ECBFB30C1E
26,399,220 UART: [art] SIG.S = 26C2CE6997ACD5D8B8AE380941FD1F10AB210D16047D0CC9698C22DA9A6F32B6B659444926F0D8C9D905137A11E0086C
27,377,673 UART: Caliptra RT
27,378,395 UART: [state] CFI Enabled
27,558,692 UART: [rt] RT listening for mailbox commands...
27,708,506 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,738,476 UART: [rt]cmd =0x4c444556, len=4
27,749,477 >>> mbox cmd response data (687 bytes)
27,894,025 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,924,257 UART: [rt]cmd =0x43455246, len=4
27,936,947 >>> mbox cmd response data (888 bytes)
28,079,089 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,109,068 UART: [rt]cmd =0x43455252, len=4
28,120,392 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
7,744,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,990,119 >>> mbox cmd response: success
20,286,084 UART:
20,286,465 UART: Running Caliptra FMC ...
20,287,655 UART:
20,287,834 UART: [state] CFI Enabled
20,351,877 UART: [fht] FMC Alias Private Key: 7
22,117,691 UART: [art] Extend RT PCRs Done
22,118,907 UART: [art] Lock RT PCRs Done
22,120,863 UART: [art] Populate DV Done
22,126,440 UART: [fht] FMC Alias Private Key: 7
22,128,152 UART: [art] Derive CDI
22,128,895 UART: [art] Store in slot 0x4
22,184,472 UART: [art] Derive Key Pair
22,185,477 UART: [art] Store priv key in slot 0x5
24,648,150 UART: [art] Derive Key Pair - Done
24,661,037 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,373,974 UART: [art] Erasing AUTHORITY.KEYID = 7
26,375,495 UART: [art] PUB.X = C71EFED35BFCFF369F5001B4D0553545EB1121FC57CC085C4829C4FC4D237D54B586E168049758BF419EA8FD5F98F24F
26,382,756 UART: [art] PUB.Y = 51A6A77FE6CF240BB382391A411165A4B86B8AA07C431D87EF0B063793D9F9DF3561C1BD7B71F820B33D5ED939228B14
26,390,016 UART: [art] SIG.R = 717CC6EA9FF3675F3F1E297DA839FD6F17DCF1640D4B86130C40349FFD1FFAE19526BC691E9EB217EC5796D95FD333BA
26,397,427 UART: [art] SIG.S = 23A30E88FEECBC7575BA9E0F7D91C89CA11CA9B635435F30EA9D5F43B9A63DE7B2355F4301D7427BAB9C3F4A63805E9D
27,377,103 UART: Caliptra RT
27,377,806 UART: [state] CFI Enabled
27,556,494 UART: [rt] RT listening for mailbox commands...
27,706,339 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,736,755 UART: [rt]cmd =0x4c444556, len=4
27,748,108 >>> mbox cmd response data (687 bytes)
27,894,797 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,924,644 UART: [rt]cmd =0x43455246, len=4
27,937,361 >>> mbox cmd response data (888 bytes)
28,080,062 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,109,910 UART: [rt]cmd =0x43455252, len=4
28,121,315 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
7,746,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,988,529 >>> mbox cmd response: success
20,282,091 UART:
20,282,476 UART: Running Caliptra FMC ...
20,283,675 UART:
20,283,852 UART: [state] CFI Enabled
20,352,447 UART: [fht] FMC Alias Private Key: 7
22,118,536 UART: [art] Extend RT PCRs Done
22,119,764 UART: [art] Lock RT PCRs Done
22,121,664 UART: [art] Populate DV Done
22,127,295 UART: [fht] FMC Alias Private Key: 7
22,128,947 UART: [art] Derive CDI
22,129,771 UART: [art] Store in slot 0x4
22,185,060 UART: [art] Derive Key Pair
22,186,114 UART: [art] Store priv key in slot 0x5
24,648,792 UART: [art] Derive Key Pair - Done
24,661,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,375,010 UART: [art] Erasing AUTHORITY.KEYID = 7
26,376,501 UART: [art] PUB.X = 42AE952CDA1C52E67C8426F4BEF794AB727B8E215C8E6AD6303241C744494997A2E79B7EBEE4207161A121CBA0118820
26,383,753 UART: [art] PUB.Y = 9FF961E155C607B197048EF602969BF8C7F6CFBDD29EBF26DC638D0218D5A55297A43C5AD8668BE6A6B9A4F8475C4D3D
26,391,006 UART: [art] SIG.R = 0F33F7B8EBCCD1F291DE7B60D6781CA9E615708939842F901C4F5862CC5D877E064E33F8C654B058E40D5BEF5FC46174
26,398,435 UART: [art] SIG.S = 98A7A24EEA545043A397FD8760AA4393165E0D706F1D4394BB7C339FA4B32CA2F031C0C0873E440F21A58CDDFB260920
27,377,596 UART: Caliptra RT
27,378,314 UART: [state] CFI Enabled
27,558,179 UART: [rt] RT listening for mailbox commands...
27,707,744 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,737,862 UART: [rt]cmd =0x4c444556, len=4
27,748,953 >>> mbox cmd response data (687 bytes)
27,893,910 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,923,865 UART: [rt]cmd =0x43455246, len=4
27,936,349 >>> mbox cmd response data (888 bytes)
28,078,753 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,108,521 UART: [rt]cmd =0x43455252, len=4
28,119,953 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1521.84s
Truncated 7229978 bytes from beginning
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
8,239,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,388,030 UART: [idev] --
8,388,674 UART: [ldev] ++
8,389,176 UART: [ldev] CDI.KEYID = 6
8,390,053 UART: [ldev] SUBJECT.KEYID = 5
8,391,160 UART: [ldev] AUTHORITY.KEYID = 7
8,392,248 UART: [ldev] FE.KEYID = 1
8,393,171 UART: [ldev] Erasing FE.KEYID = 1
10,733,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,455,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,471,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,487,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,502,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,525,331 UART: [ldev] --
12,530,114 UART: [fwproc] Wait for Commands...
12,531,943 UART: [fwproc] Recv command 0x46574c44
12,533,933 UART: [fwproc] Recv'd Img size: 118548 bytes
16,016,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,096,296 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,169,324 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,498,119 >>> mbox cmd response: success
16,502,760 UART: [afmc] ++
16,503,345 UART: [afmc] CDI.KEYID = 6
16,504,281 UART: [afmc] SUBJECT.KEYID = 7
16,505,544 UART: [afmc] AUTHORITY.KEYID = 5
19,007,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,730,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,732,975 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,748,803 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,764,830 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,780,413 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,805,662 UART: [afmc] --
20,808,651 UART: [cold-reset] --
20,811,700 UART: [state] Locking Datavault
20,817,485 UART: [state] Locking PCR0, PCR1 and PCR31
20,819,227 UART: [state] Locking ICCM
20,820,948 UART: [exit] Launching FMC @ 0x40000130
20,829,359 UART:
20,829,598 UART: Running Caliptra FMC ...
20,830,697 UART:
20,830,854 UART: [state] CFI Enabled
20,838,842 UART: [fht] FMC Alias Private Key: 7
22,605,138 UART: [art] Extend RT PCRs Done
22,606,350 UART: [art] Lock RT PCRs Done
22,607,990 UART: [art] Populate DV Done
22,613,290 UART: [fht] FMC Alias Private Key: 7
22,614,932 UART: [art] Derive CDI
22,615,666 UART: [art] Store in slot 0x4
22,658,196 UART: [art] Derive Key Pair
22,659,229 UART: [art] Store priv key in slot 0x5
25,086,748 UART: [art] Derive Key Pair - Done
25,099,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,806,793 UART: [art] Erasing AUTHORITY.KEYID = 7
26,808,317 UART: [art] PUB.X = 2A7297122DAB1B8E9E7BE900AC21141440483FA5833C042DBD97EC95ADFF16755518C801EBD8A7BA2A915256AB093C68
26,815,574 UART: [art] PUB.Y = 1A51D174043DAE269D197928C7CDF2575BFDA972CBBF11F14D356027AB9F161F38E32A6A219A175010BBD24EBB314E03
26,822,793 UART: [art] SIG.R = 846C2CE03ABF277CFA2DBEC2D3004C45C46C832AE9FE7315CAF11CF13256F6E832092339048169AD90C8C96C6211E52B
26,830,166 UART: [art] SIG.S = 6C53EA8890DB5B9557C668C6907E133F38CAC16DF3C2ADC1A9B9310C00A7E58B3219A084D6E9847A151AF3AAEB19BD91
27,809,331 UART: Caliptra RT
27,810,021 UART: [state] CFI Enabled
27,941,619 UART: [rt] RT listening for mailbox commands...
28,091,939 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,121,837 UART: [rt]cmd =0x4c444556, len=4
28,133,193 >>> mbox cmd response data (687 bytes)
28,278,306 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,308,173 UART: [rt]cmd =0x43455246, len=4
28,320,788 >>> mbox cmd response data (888 bytes)
28,464,443 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,494,509 UART: [rt]cmd =0x43455252, len=4
28,505,955 >>> mbox cmd response data (783 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,593 UART:
192,951 UART: Running Caliptra ROM ...
194,125 UART:
603,866 UART: [state] CFI Enabled
616,376 UART: [state] LifecycleState = Unprovisioned
618,322 UART: [state] DebugLocked = No
619,588 UART: [state] WD Timer not started. Device not locked for debugging
622,616 UART: [kat] SHA2-256
802,282 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,074 UART: [kat] ++
813,553 UART: [kat] sha1
825,157 UART: [kat] SHA2-256
827,845 UART: [kat] SHA2-384
835,228 UART: [kat] SHA2-512-ACC
837,636 UART: [kat] ECC-384
3,279,824 UART: [kat] HMAC-384Kdf
3,292,492 UART: [kat] LMS
3,769,020 UART: [kat] --
3,772,956 UART: [cold-reset] ++
3,773,911 UART: [fht] FHT @ 0x50003400
3,785,045 UART: [idev] ++
3,785,618 UART: [idev] CDI.KEYID = 6
3,786,691 UART: [idev] SUBJECT.KEYID = 7
3,787,793 UART: [idev] UDS.KEYID = 0
3,805,383 UART: [idev] Erasing UDS.KEYID = 0
6,268,856 UART: [idev] Sha1 KeyId Algorithm
6,294,089 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,009,786 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,025,619 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,041,606 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,057,270 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,083,313 UART: [idev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
8,238,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,387,627 UART: [idev] --
8,388,263 UART: [ldev] ++
8,388,759 UART: [ldev] CDI.KEYID = 6
8,389,631 UART: [ldev] SUBJECT.KEYID = 5
8,390,732 UART: [ldev] AUTHORITY.KEYID = 7
8,391,909 UART: [ldev] FE.KEYID = 1
8,392,834 UART: [ldev] Erasing FE.KEYID = 1
10,733,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,456,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,471,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,487,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,503,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,523,917 UART: [ldev] --
12,528,932 UART: [fwproc] Wait for Commands...
12,531,891 UART: [fwproc] Recv command 0x46574c44
12,533,875 UART: [fwproc] Recv'd Img size: 118548 bytes
16,014,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,092,668 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,165,686 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,493,341 >>> mbox cmd response: success
16,498,299 UART: [afmc] ++
16,498,889 UART: [afmc] CDI.KEYID = 6
16,499,911 UART: [afmc] SUBJECT.KEYID = 7
16,501,068 UART: [afmc] AUTHORITY.KEYID = 5
19,003,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,726,238 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,728,418 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,744,229 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,760,302 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,775,907 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,801,091 UART: [afmc] --
20,803,937 UART: [cold-reset] --
20,809,303 UART: [state] Locking Datavault
20,815,901 UART: [state] Locking PCR0, PCR1 and PCR31
20,817,653 UART: [state] Locking ICCM
20,820,205 UART: [exit] Launching FMC @ 0x40000130
20,828,591 UART:
20,828,827 UART: Running Caliptra FMC ...
20,829,849 UART:
20,829,992 UART: [state] CFI Enabled
20,838,097 UART: [fht] FMC Alias Private Key: 7
22,604,231 UART: [art] Extend RT PCRs Done
22,605,447 UART: [art] Lock RT PCRs Done
22,607,047 UART: [art] Populate DV Done
22,612,564 UART: [fht] FMC Alias Private Key: 7
22,614,076 UART: [art] Derive CDI
22,614,899 UART: [art] Store in slot 0x4
22,657,858 UART: [art] Derive Key Pair
22,658,894 UART: [art] Store priv key in slot 0x5
25,085,565 UART: [art] Derive Key Pair - Done
25,098,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,805,291 UART: [art] Erasing AUTHORITY.KEYID = 7
26,806,801 UART: [art] PUB.X = BC9210637B7F3751E269BBECA22853D508355FEA70B92C2AB9125C4BF3AB72D2FB4429E4E10DB6B2DC8CDAAA1BA64D7B
26,814,075 UART: [art] PUB.Y = 574D6E7A9BF08A63DA0608E8B61956FF827EB398691567B1877A74006F693F34EDD4F787F288B9573A4A8AE640775780
26,821,325 UART: [art] SIG.R = 47998B0D1B3E8EF11E4F6892C3B17A77DDFBA73A9C1D17AE70D857DCDAC22EC2892C5939D4197B57B91C40C63227AF13
26,828,695 UART: [art] SIG.S = 6AB6D0B55CDCF3EE64BAF09C79EDFE994299BEEF766228D438D0DCD92043E4730035849CE67960DB3A8FFCDBEB5AC077
27,807,735 UART: Caliptra RT
27,808,425 UART: [state] CFI Enabled
27,941,423 UART: [rt] RT listening for mailbox commands...
28,092,087 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,122,275 UART: [rt]cmd =0x4c444556, len=4
28,133,228 >>> mbox cmd response data (687 bytes)
28,278,426 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,308,271 UART: [rt]cmd =0x43455246, len=4
28,320,796 >>> mbox cmd response data (888 bytes)
28,462,501 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,492,314 UART: [rt]cmd =0x43455252, len=4
28,503,633 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1541.39s
Truncated 2433978 bytes from beginning
ng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
8,017,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,185,658 >>> mbox cmd response: success
20,436,704 UART:
20,437,089 UART: Running Caliptra FMC ...
20,438,221 UART:
20,438,378 UART: [state] CFI Enabled
20,445,935 UART: [fht] FMC Alias Private Key: 7
22,212,789 UART: [art] Extend RT PCRs Done
22,214,021 UART: [art] Lock RT PCRs Done
22,215,777 UART: [art] Populate DV Done
22,221,022 UART: [fht] FMC Alias Private Key: 7
22,222,618 UART: [art] Derive CDI
22,223,433 UART: [art] Store in slot 0x4
22,265,921 UART: [art] Derive Key Pair
22,266,960 UART: [art] Store priv key in slot 0x5
24,693,984 UART: [art] Derive Key Pair - Done
24,707,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,413,290 UART: [art] Erasing AUTHORITY.KEYID = 7
26,414,802 UART: [art] PUB.X = A9C79F732D26276BFF91ACC3B71B662C539C79A43475742804703504CF8C1A044333DAB6A1CA4BCD0B7C1AD114ED6723
26,422,058 UART: [art] PUB.Y = 4B5AEDD09550FF8A07501B5FDE52E27FC9A42B50D999661691F2FF50C00F5F1FEDA5042D22F54934EB433BCADCEF5973
26,429,350 UART: [art] SIG.R = 3216FC5895A41A5669B490A00FCAC96DE84207C6D58FAE30B33B0A86F4719F34CFC6F4D34654BD8BCCDD29808000F94B
26,436,760 UART: [art] SIG.S = 89D0D1737686AED217946ED4E5D5DDED6FBD7863EC6CF8056B80ADBE49D56F30E9C95D5EA03BCE7B4A370F3EBE0BA861
27,416,160 UART: Caliptra RT
27,416,853 UART: [state] CFI Enabled
27,549,315 UART: [rt] RT listening for mailbox commands...
27,699,170 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,729,536 UART: [rt]cmd =0x4c444556, len=4
27,740,705 >>> mbox cmd response data (687 bytes)
27,885,838 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,915,717 UART: [rt]cmd =0x43455246, len=4
27,928,436 >>> mbox cmd response data (888 bytes)
28,070,639 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,100,662 UART: [rt]cmd =0x43455252, len=4
28,112,063 >>> mbox cmd response data (783 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
8,010,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,186,159 >>> mbox cmd response: success
20,436,592 UART:
20,436,979 UART: Running Caliptra FMC ...
20,438,186 UART:
20,438,375 UART: [state] CFI Enabled
20,446,697 UART: [fht] FMC Alias Private Key: 7
22,213,126 UART: [art] Extend RT PCRs Done
22,214,324 UART: [art] Lock RT PCRs Done
22,215,999 UART: [art] Populate DV Done
22,221,613 UART: [fht] FMC Alias Private Key: 7
22,223,163 UART: [art] Derive CDI
22,223,908 UART: [art] Store in slot 0x4
22,267,037 UART: [art] Derive Key Pair
22,268,034 UART: [art] Store priv key in slot 0x5
24,694,757 UART: [art] Derive Key Pair - Done
24,707,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,414,176 UART: [art] Erasing AUTHORITY.KEYID = 7
26,415,685 UART: [art] PUB.X = 6EDE35BA13AC22E1901D67601B3598C6F831451F202D368234AEEDFA211BD90B50C871FCFCC212E53A47AE00516E7226
26,422,886 UART: [art] PUB.Y = D0ADEDB5B7E47605370F7C35024F23A725DBE76719CDCB458F125EB6DB9C74AFC140267B630B0531B42772303308470E
26,430,177 UART: [art] SIG.R = 8A923CA6075FD9C3D4D16BBAEE1C8EED93C3F8583768D27127011E9FAC3D0C4CEFA5A4064FE595975FA2113F7501A1B8
26,437,538 UART: [art] SIG.S = 881A3662A4C0332FBB2F0CADD898165B0D56C8BC242BAF5E85F2C0C97E3E2284FC1F8E4F299A674684E1331071B3F3C4
27,416,032 UART: Caliptra RT
27,416,752 UART: [state] CFI Enabled
27,549,604 UART: [rt] RT listening for mailbox commands...
27,699,096 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,729,179 UART: [rt]cmd =0x4c444556, len=4
27,740,271 >>> mbox cmd response data (687 bytes)
27,884,906 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,914,937 UART: [rt]cmd =0x43455246, len=4
27,927,627 >>> mbox cmd response data (888 bytes)
28,069,352 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,099,176 UART: [rt]cmd =0x43455252, len=4
28,110,606 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
8,017,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,192,667 >>> mbox cmd response: success
20,439,628 UART:
20,440,028 UART: Running Caliptra FMC ...
20,441,157 UART:
20,441,315 UART: [state] CFI Enabled
20,449,462 UART: [fht] FMC Alias Private Key: 7
22,215,709 UART: [art] Extend RT PCRs Done
22,216,934 UART: [art] Lock RT PCRs Done
22,218,743 UART: [art] Populate DV Done
22,223,982 UART: [fht] FMC Alias Private Key: 7
22,225,521 UART: [art] Derive CDI
22,226,249 UART: [art] Store in slot 0x4
22,269,330 UART: [art] Derive Key Pair
22,270,369 UART: [art] Store priv key in slot 0x5
24,697,180 UART: [art] Derive Key Pair - Done
24,710,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,416,512 UART: [art] Erasing AUTHORITY.KEYID = 7
26,418,020 UART: [art] PUB.X = 77D0688B8C9F6E6895583D467B54B2C35C41F713B50D9505610DBD7384B2484A4308F1960DFC9CE70FB5D04A317B6B00
26,425,305 UART: [art] PUB.Y = BF3D28F848F30FCD2072438AF9923A837155E48A809A19446E9447E4287896DE51C1F1AC1609866C671014ABF91A4E88
26,432,490 UART: [art] SIG.R = 2F038C5106C00B7F3ACEB977FFF3E18C15CB79FEC774DF6DCBEF5086BA02A9D38CE87ACE8E55C3B5FBB10E6E0DFA4112
26,439,895 UART: [art] SIG.S = AD077AAC9AD770D5AF9F7F7F128C55F277DDF4D59BF5A60F28DC841AE18F32AD92AEC08E2C4F253C773920B5D0EACDF1
27,418,848 UART: Caliptra RT
27,419,560 UART: [state] CFI Enabled
27,552,673 UART: [rt] RT listening for mailbox commands...
27,701,482 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,731,720 UART: [rt]cmd =0x4c444556, len=4
27,742,941 >>> mbox cmd response data (687 bytes)
27,887,473 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,917,399 UART: [rt]cmd =0x43455246, len=4
27,929,943 >>> mbox cmd response data (888 bytes)
28,072,055 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,101,889 UART: [rt]cmd =0x43455252, len=4
28,113,342 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
8,018,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,192,881 >>> mbox cmd response: success
20,448,840 UART:
20,449,222 UART: Running Caliptra FMC ...
20,450,435 UART:
20,450,603 UART: [state] CFI Enabled
20,458,594 UART: [fht] FMC Alias Private Key: 7
22,224,930 UART: [art] Extend RT PCRs Done
22,226,155 UART: [art] Lock RT PCRs Done
22,227,876 UART: [art] Populate DV Done
22,233,586 UART: [fht] FMC Alias Private Key: 7
22,235,184 UART: [art] Derive CDI
22,235,997 UART: [art] Store in slot 0x4
22,278,558 UART: [art] Derive Key Pair
22,279,562 UART: [art] Store priv key in slot 0x5
24,705,918 UART: [art] Derive Key Pair - Done
24,719,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,425,601 UART: [art] Erasing AUTHORITY.KEYID = 7
26,427,118 UART: [art] PUB.X = E44FE1C104D7884E845790410BA51889019C311C59F1B0203AA6B1054A597B6D903C99CBB63894139EE799D4BB84E3F2
26,434,320 UART: [art] PUB.Y = 98D2F54D707B34D198CA09E7453229B51B6F844F760C7226EB0CE701D3D4FBD33A7DB04DAA99CD6EE9F39E88FD394810
26,441,629 UART: [art] SIG.R = 6BD5393875BFD3AA7564CE7DA6E513968AB958A9A7CD9D045217312ADB6573FD2C171BB89D34160C6A875BABF9ABB89C
26,449,030 UART: [art] SIG.S = 61884C46920582322FF7F363027E6BF060236EB756158466E1343F028B7AB3D6E5723F0776D5187F77C43C383467B528
27,427,495 UART: Caliptra RT
27,428,207 UART: [state] CFI Enabled
27,561,308 UART: [rt] RT listening for mailbox commands...
27,711,094 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,741,119 UART: [rt]cmd =0x4c444556, len=4
27,752,377 >>> mbox cmd response data (687 bytes)
27,897,416 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,927,183 UART: [rt]cmd =0x43455246, len=4
27,939,724 >>> mbox cmd response data (888 bytes)
28,081,960 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,111,848 UART: [rt]cmd =0x43455252, len=4
28,122,995 >>> mbox cmd response data (782 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
8,020,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,198,555 >>> mbox cmd response: success
20,450,064 UART:
20,450,445 UART: Running Caliptra FMC ...
20,451,586 UART:
20,451,747 UART: [state] CFI Enabled
20,459,584 UART: [fht] FMC Alias Private Key: 7
22,225,947 UART: [art] Extend RT PCRs Done
22,227,178 UART: [art] Lock RT PCRs Done
22,228,720 UART: [art] Populate DV Done
22,233,975 UART: [fht] FMC Alias Private Key: 7
22,235,688 UART: [art] Derive CDI
22,236,504 UART: [art] Store in slot 0x4
22,279,537 UART: [art] Derive Key Pair
22,280,579 UART: [art] Store priv key in slot 0x5
24,707,024 UART: [art] Derive Key Pair - Done
24,719,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,425,901 UART: [art] Erasing AUTHORITY.KEYID = 7
26,427,381 UART: [art] PUB.X = 141014F8FBF14D5C174215309AF14A07E3149D7AA071272FFAD0ACFC64B0D480EDDA1617D36C3699774A2CC148488559
26,434,690 UART: [art] PUB.Y = 03C1036C14140BF97156C467A21533551E1CC82174932C280EAEC1ECBCB2DBD08FB01FC9F6CA0BED0D6A65F1E1393630
26,441,941 UART: [art] SIG.R = C23083251C23EFC37DFFBC17162F61EB4B41F4E803BEBE2EABFEA4DFACD2269CF438C239714F03072105BE3C4AECA5F5
26,449,343 UART: [art] SIG.S = 14D3512544C356773B10BE4489D5F583FB20EE36D25210C1DAF45757F12C48A1658616523DB12AC7BAE2136689FC6E10
27,427,563 UART: Caliptra RT
27,428,279 UART: [state] CFI Enabled
27,561,565 UART: [rt] RT listening for mailbox commands...
27,712,594 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,742,880 UART: [rt]cmd =0x4c444556, len=4
27,754,174 >>> mbox cmd response data (687 bytes)
27,905,557 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,935,766 UART: [rt]cmd =0x43455246, len=4
27,948,322 >>> mbox cmd response data (888 bytes)
28,091,355 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,121,162 UART: [rt]cmd =0x43455252, len=4
28,132,563 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1521.44s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,300,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,595 UART: [idev] --
1,301,508 UART: [ldev] ++
1,301,676 UART: [ldev] CDI.KEYID = 6
1,302,040 UART: [ldev] SUBJECT.KEYID = 5
1,302,467 UART: [ldev] AUTHORITY.KEYID = 7
1,302,930 UART: [ldev] FE.KEYID = 1
1,308,410 UART: [ldev] Erasing FE.KEYID = 1
1,334,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,852 UART: [ldev] --
1,374,053 UART: [fwproc] Wait for Commands...
1,374,762 UART: [fwproc] Recv command 0x46574c44
1,375,495 UART: [fwproc] Recv'd Img size: 118548 bytes
2,720,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,748,012 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,779,187 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,919,350 >>> mbox cmd response: success
2,920,536 UART: [afmc] ++
2,920,704 UART: [afmc] CDI.KEYID = 6
2,921,067 UART: [afmc] SUBJECT.KEYID = 7
2,921,493 UART: [afmc] AUTHORITY.KEYID = 5
2,957,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,973,611 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,974,360 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,980,070 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,985,951 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,991,652 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,999,309 UART: [afmc] --
3,000,198 UART: [cold-reset] --
3,000,960 UART: [state] Locking Datavault
3,002,337 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,941 UART: [state] Locking ICCM
3,003,509 UART: [exit] Launching FMC @ 0x40000130
3,008,839 UART:
3,008,855 UART: Running Caliptra FMC ...
3,009,263 UART:
3,009,317 UART: [state] CFI Enabled
3,019,671 UART: [fht] FMC Alias Private Key: 7
3,139,213 UART: [art] Extend RT PCRs Done
3,139,641 UART: [art] Lock RT PCRs Done
3,141,093 UART: [art] Populate DV Done
3,149,670 UART: [fht] FMC Alias Private Key: 7
3,150,800 UART: [art] Derive CDI
3,151,080 UART: [art] Store in slot 0x4
3,236,450 UART: [art] Derive Key Pair
3,236,810 UART: [art] Store priv key in slot 0x5
3,249,657 UART: [art] Derive Key Pair - Done
3,263,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,279,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,879 UART: [art] PUB.X = 63AB9E98D34ED230A1457F42E53F278608D4110A72A1C9A62C4FBB8E06BC13BEADFED03FC9E05F5841EC1892D02FE970
3,286,654 UART: [art] PUB.Y = 894C9D4F5BBCE07E048EAE3457195EDFA380FC9DE1218840CF74A85629D8DC9FBC6D48988E29EB38592E050F3E4614E2
3,293,605 UART: [art] SIG.R = 0A984306C982EAC12EE0B46119596ACF5422670408A660D6DC9F7BF69546AD145BA2DB44DE49DE15B97BAAD013438325
3,300,367 UART: [art] SIG.S = 4251D4EC9E61783D4B41E9A65647477F487F5F7577DBC8DCF4FFDE4549C3BDD1C492ABF7BA6109FA2E1F4A5279DCB7DD
3,324,014 UART: Caliptra RT
3,324,265 UART: [state] CFI Enabled
3,444,459 UART: [rt] RT listening for mailbox commands...
3,445,129 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,925 UART: [rt]cmd =0x4c444556, len=4
3,485,473 >>> mbox cmd response data (687 bytes)
3,485,474 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,103 UART: [rt]cmd =0x43455246, len=4
3,527,052 >>> mbox cmd response data (888 bytes)
3,527,053 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,556,208 UART: [rt]cmd =0x43455252, len=4
3,566,993 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
890,932 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,036 UART: [kat] ++
895,188 UART: [kat] sha1
899,464 UART: [kat] SHA2-256
901,404 UART: [kat] SHA2-384
904,291 UART: [kat] SHA2-512-ACC
906,192 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,769 UART: [kat] LMS
1,169,081 UART: [kat] --
1,170,092 UART: [cold-reset] ++
1,170,440 UART: [fht] FHT @ 0x50003400
1,173,200 UART: [idev] ++
1,173,368 UART: [idev] CDI.KEYID = 6
1,173,729 UART: [idev] SUBJECT.KEYID = 7
1,174,154 UART: [idev] UDS.KEYID = 0
1,182,531 UART: [idev] Erasing UDS.KEYID = 0
1,199,171 UART: [idev] Sha1 KeyId Algorithm
1,208,661 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,573 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,281 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,166 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,872 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,301 UART: [idev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
1,299,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,679 UART: [idev] --
1,300,674 UART: [ldev] ++
1,300,842 UART: [ldev] CDI.KEYID = 6
1,301,206 UART: [ldev] SUBJECT.KEYID = 5
1,301,633 UART: [ldev] AUTHORITY.KEYID = 7
1,302,096 UART: [ldev] FE.KEYID = 1
1,307,132 UART: [ldev] Erasing FE.KEYID = 1
1,334,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,178 UART: [ldev] --
1,373,475 UART: [fwproc] Wait for Commands...
1,374,150 UART: [fwproc] Recv command 0x46574c44
1,374,883 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,747,261 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,778,436 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,918,833 >>> mbox cmd response: success
2,920,003 UART: [afmc] ++
2,920,171 UART: [afmc] CDI.KEYID = 6
2,920,534 UART: [afmc] SUBJECT.KEYID = 7
2,920,960 UART: [afmc] AUTHORITY.KEYID = 5
2,956,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,554 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,303 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,979,013 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,894 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,595 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,338 UART: [afmc] --
2,999,171 UART: [cold-reset] --
3,000,061 UART: [state] Locking Datavault
3,001,368 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,972 UART: [state] Locking ICCM
3,002,580 UART: [exit] Launching FMC @ 0x40000130
3,007,910 UART:
3,007,926 UART: Running Caliptra FMC ...
3,008,334 UART:
3,008,388 UART: [state] CFI Enabled
3,019,180 UART: [fht] FMC Alias Private Key: 7
3,137,548 UART: [art] Extend RT PCRs Done
3,137,976 UART: [art] Lock RT PCRs Done
3,139,550 UART: [art] Populate DV Done
3,147,705 UART: [fht] FMC Alias Private Key: 7
3,148,721 UART: [art] Derive CDI
3,149,001 UART: [art] Store in slot 0x4
3,234,521 UART: [art] Derive Key Pair
3,234,881 UART: [art] Store priv key in slot 0x5
3,248,378 UART: [art] Derive Key Pair - Done
3,263,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,279,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,280,086 UART: [art] PUB.X = BFB37BE9062A72E5D0F2B2AD8888B84D583237E98E8CE2AA37899F6BC6CC6C59984DB6694B5F7F95E4F46247E1808B30
3,286,861 UART: [art] PUB.Y = 4DCA069C110ACE4C87F3745E12629DFFE3365C7CD9DC783CFF3FF7C562ABA9500CA9C6804B23501DC427461E74108F64
3,293,812 UART: [art] SIG.R = 90B155B5C6ED5176126B3971ECDE427A57AE6510C1B2E511CA5EBDB99C5B325CB688E73C237644A85304372F8840386A
3,300,579 UART: [art] SIG.S = 5E8245196A758B227C8A7F2449A5B5D9DDE906B8B99A4A702B7B798CAEA67E191AFC19F5EC4C872E5D2AE54E636B0E79
3,324,439 UART: Caliptra RT
3,324,690 UART: [state] CFI Enabled
3,445,613 UART: [rt] RT listening for mailbox commands...
3,446,283 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,261 UART: [rt]cmd =0x4c444556, len=4
3,486,575 >>> mbox cmd response data (687 bytes)
3,486,576 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,045 UART: [rt]cmd =0x43455246, len=4
3,527,898 >>> mbox cmd response data (888 bytes)
3,527,899 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,378 UART: [rt]cmd =0x43455252, len=4
3,568,265 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1038.08s
Truncated 2533978 bytes from beginning
2,757,527 UART: Running Caliptra FMC ...
2,757,935 UART:
2,757,989 UART: [state] CFI Enabled
2,768,383 UART: [fht] FMC Alias Private Key: 7
2,887,197 UART: [art] Extend RT PCRs Done
2,887,625 UART: [art] Lock RT PCRs Done
2,889,083 UART: [art] Populate DV Done
2,897,552 UART: [fht] FMC Alias Private Key: 7
2,898,544 UART: [art] Derive CDI
2,898,824 UART: [art] Store in slot 0x4
2,984,278 UART: [art] Derive Key Pair
2,984,638 UART: [art] Store priv key in slot 0x5
2,997,587 UART: [art] Derive Key Pair - Done
3,012,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,157 UART: [art] PUB.X = 577988DEE5B1FB99E9CB66FC6039E6A1A3F2AE25CA5B79590A0A10700D51673A1CB291052AB26EE27442A5B4BE59BE58
3,035,925 UART: [art] PUB.Y = 80A4AA765147D65BE40C023096C328624D5665CB0EC1817782FADFEF63438150020541B4D34993CE30A9E2308139C9DE
3,042,854 UART: [art] SIG.R = A66E1A9550CD28C5C2EBE22B32E3342403B80FB17DB5FD39687D54DA1B4DCF6B249962E37B0693029E5CDDDA56236B1B
3,049,624 UART: [art] SIG.S = 2DCBB46B3301657566694E59BDC0C139EFC9B640619601D988CFD43794E09FD802D92222FE133BB0353B6E2CA02686B3
3,073,641 UART: Caliptra RT
3,073,892 UART: [state] CFI Enabled
3,193,891 UART: [rt] RT listening for mailbox commands...
3,194,561 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,985 UART: [rt]cmd =0x4c444556, len=4
3,234,593 >>> mbox cmd response data (687 bytes)
3,234,594 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,847 UART: [rt]cmd =0x43455246, len=4
3,275,796 >>> mbox cmd response data (888 bytes)
3,275,797 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,260 UART: [rt]cmd =0x43455252, len=4
3,315,925 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,660 >>> mbox cmd response: success
2,758,055 UART:
2,758,071 UART: Running Caliptra FMC ...
2,758,479 UART:
2,758,533 UART: [state] CFI Enabled
2,768,823 UART: [fht] FMC Alias Private Key: 7
2,887,607 UART: [art] Extend RT PCRs Done
2,888,035 UART: [art] Lock RT PCRs Done
2,889,579 UART: [art] Populate DV Done
2,897,958 UART: [fht] FMC Alias Private Key: 7
2,899,122 UART: [art] Derive CDI
2,899,402 UART: [art] Store in slot 0x4
2,985,242 UART: [art] Derive Key Pair
2,985,602 UART: [art] Store priv key in slot 0x5
2,998,937 UART: [art] Derive Key Pair - Done
3,013,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,343 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,108 UART: [art] PUB.X = D7D693613ECD5085F805EBFF18B8E1D28BF9247BB2FABCAD8D98DB21A486C13AB6D2820A824800D98FD4BA96900F8E05
3,036,860 UART: [art] PUB.Y = 5B53BD0F99E97F56E497DC1FFF86338A467703AD940860B313339B5A77088601F69EA8631E47BB8AB65340EEF6075E42
3,043,790 UART: [art] SIG.R = B6E785D2D429C49F7A0F5F8B014F288FCFDFA16BE4E5F99906DAD8CDC1A32BB10658489FFFC6F889BA88877889B1CCB2
3,050,568 UART: [art] SIG.S = 40D9AB5C81064CCCD68104FB381997859D65638D839BDE7ABE12858DEEAAE7D99503EA7FE3F18D8AB256E811DB0D6752
3,074,210 UART: Caliptra RT
3,074,461 UART: [state] CFI Enabled
3,194,512 UART: [rt] RT listening for mailbox commands...
3,195,182 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,878 UART: [rt]cmd =0x4c444556, len=4
3,235,146 >>> mbox cmd response data (687 bytes)
3,235,147 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,688 UART: [rt]cmd =0x43455246, len=4
3,276,631 >>> mbox cmd response data (888 bytes)
3,276,632 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,105 UART: [rt]cmd =0x43455252, len=4
3,317,112 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,202 >>> mbox cmd response: success
2,757,951 UART:
2,757,967 UART: Running Caliptra FMC ...
2,758,375 UART:
2,758,429 UART: [state] CFI Enabled
2,769,143 UART: [fht] FMC Alias Private Key: 7
2,887,793 UART: [art] Extend RT PCRs Done
2,888,221 UART: [art] Lock RT PCRs Done
2,889,417 UART: [art] Populate DV Done
2,897,510 UART: [fht] FMC Alias Private Key: 7
2,898,466 UART: [art] Derive CDI
2,898,746 UART: [art] Store in slot 0x4
2,984,172 UART: [art] Derive Key Pair
2,984,532 UART: [art] Store priv key in slot 0x5
2,997,681 UART: [art] Derive Key Pair - Done
3,012,429 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,357 UART: [art] PUB.X = 547415B7B60DA48EBBBA6C12D3E279FB0ABED61C0A5E70BA6655C89CB9B6AC86BEC8DB4ECBCD70801F762033E2019A11
3,035,137 UART: [art] PUB.Y = BB6E2CEB02C3932AC77B5B10DE225ECA569B8DB6C04B69F990E619B8E85F3E84B38ED75B67932B69F36E7D27512801B7
3,042,091 UART: [art] SIG.R = 532BFD040908F0201321B2DD500D322F84B490AD240985BFBB4F93F2C55A3F13BC26FF4D8E374C969C753AE5CE810025
3,048,828 UART: [art] SIG.S = 37BF20AE1665751A28245B8AF26D0599F2E825E261A34F1EEA05CCE132F80B60C5A0B126DDE5E62F40137073393F620A
3,072,632 UART: Caliptra RT
3,072,883 UART: [state] CFI Enabled
3,191,689 UART: [rt] RT listening for mailbox commands...
3,192,359 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,135 UART: [rt]cmd =0x4c444556, len=4
3,232,547 >>> mbox cmd response data (687 bytes)
3,232,548 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,262,021 UART: [rt]cmd =0x43455246, len=4
3,273,944 >>> mbox cmd response data (888 bytes)
3,273,945 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,090 UART: [rt]cmd =0x43455252, len=4
3,313,871 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,654 >>> mbox cmd response: success
2,759,643 UART:
2,759,659 UART: Running Caliptra FMC ...
2,760,067 UART:
2,760,121 UART: [state] CFI Enabled
2,770,409 UART: [fht] FMC Alias Private Key: 7
2,889,663 UART: [art] Extend RT PCRs Done
2,890,091 UART: [art] Lock RT PCRs Done
2,891,567 UART: [art] Populate DV Done
2,899,820 UART: [fht] FMC Alias Private Key: 7
2,900,926 UART: [art] Derive CDI
2,901,206 UART: [art] Store in slot 0x4
2,986,446 UART: [art] Derive Key Pair
2,986,806 UART: [art] Store priv key in slot 0x5
3,000,147 UART: [art] Derive Key Pair - Done
3,014,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,653 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,418 UART: [art] PUB.X = 46FFC06B0DC32E23AD0BE56D1A476E1582915931FBCF39F3F7264E6D4F916C4BD171E4CC60A8C098389AA391B5A179A2
3,038,192 UART: [art] PUB.Y = C9D54B15554B92896DE6A84DB047FB3806EC5896D5FCD9527994469EC0D6340FFFCDCC1C655B51078BE146E2A3B9A4AA
3,045,145 UART: [art] SIG.R = 3094A09A4203871FFA69E41795096D943C8ADDEA4F0B2707ABAC44CC74D2EBBE2D3D6C2EAAFCCA9AF8EDA9FFE2C07790
3,051,931 UART: [art] SIG.S = BDB83269C6FBF98185D487810C5C698B9D330BA948F388504D460172A3FA98B246BE26D130BA108CDA45374882A43F9D
3,075,704 UART: Caliptra RT
3,075,955 UART: [state] CFI Enabled
3,195,318 UART: [rt] RT listening for mailbox commands...
3,195,988 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,826 UART: [rt]cmd =0x4c444556, len=4
3,236,254 >>> mbox cmd response data (687 bytes)
3,236,255 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,740 UART: [rt]cmd =0x43455246, len=4
3,277,873 >>> mbox cmd response data (888 bytes)
3,277,874 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,193 UART: [rt]cmd =0x43455252, len=4
3,318,018 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,695,350 >>> mbox cmd response: success
2,756,921 UART:
2,756,937 UART: Running Caliptra FMC ...
2,757,345 UART:
2,757,399 UART: [state] CFI Enabled
2,768,159 UART: [fht] FMC Alias Private Key: 7
2,886,751 UART: [art] Extend RT PCRs Done
2,887,179 UART: [art] Lock RT PCRs Done
2,888,731 UART: [art] Populate DV Done
2,897,060 UART: [fht] FMC Alias Private Key: 7
2,898,204 UART: [art] Derive CDI
2,898,484 UART: [art] Store in slot 0x4
2,983,936 UART: [art] Derive Key Pair
2,984,296 UART: [art] Store priv key in slot 0x5
2,997,875 UART: [art] Derive Key Pair - Done
3,012,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,704 UART: [art] PUB.X = 4CDB412F09146C17E0FE9A9782B79A733C1010D82774F65E8D1212B871B36BAAE938524CE8D16570BD7C711BBD3B64CE
3,035,477 UART: [art] PUB.Y = 77F72FFCBB428D42E94EB96DE12E782861028F20CDFC7473EB8E346611ABEB70173F8C861476C59087588857760A8C0A
3,042,418 UART: [art] SIG.R = 8EE848134302E4EBAB4511A73D7008C6F204E9B31531818FDF4C9632B0C9C1C902ECED9C2CC967B77D5FBB2578D3CFC8
3,049,188 UART: [art] SIG.S = 679401ED3C0089702A7E2797F1CAD2BBA960E9F85CB27E0F5D9414B2152D7BE5F21BD7F861C646F4A387A7D6B86E7351
3,073,064 UART: Caliptra RT
3,073,315 UART: [state] CFI Enabled
3,194,110 UART: [rt] RT listening for mailbox commands...
3,194,780 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,762 UART: [rt]cmd =0x4c444556, len=4
3,235,158 >>> mbox cmd response data (687 bytes)
3,235,159 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,464 UART: [rt]cmd =0x43455246, len=4
3,276,547 >>> mbox cmd response data (888 bytes)
3,276,548 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,837 UART: [rt]cmd =0x43455252, len=4
3,316,594 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1010.97s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,592 UART: [idev] --
1,300,659 UART: [ldev] ++
1,300,827 UART: [ldev] CDI.KEYID = 6
1,301,191 UART: [ldev] SUBJECT.KEYID = 5
1,301,618 UART: [ldev] AUTHORITY.KEYID = 7
1,302,081 UART: [ldev] FE.KEYID = 1
1,307,255 UART: [ldev] Erasing FE.KEYID = 1
1,333,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,369 UART: [ldev] --
1,372,802 UART: [fwproc] Wait for Commands...
1,373,475 UART: [fwproc] Recv command 0x46574c44
1,374,208 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,826 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,001 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,386 >>> mbox cmd response: success
2,918,620 UART: [afmc] ++
2,918,788 UART: [afmc] CDI.KEYID = 6
2,919,151 UART: [afmc] SUBJECT.KEYID = 7
2,919,577 UART: [afmc] AUTHORITY.KEYID = 5
2,954,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,398 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,977,108 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,989 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,690 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,441 UART: [afmc] --
2,997,322 UART: [cold-reset] --
2,998,430 UART: [state] Locking Datavault
2,999,801 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,405 UART: [state] Locking ICCM
3,001,067 UART: [exit] Launching FMC @ 0x40000130
3,006,397 UART:
3,006,413 UART: Running Caliptra FMC ...
3,006,821 UART:
3,006,964 UART: [state] CFI Enabled
3,017,860 UART: [fht] FMC Alias Private Key: 7
3,136,796 UART: [art] Extend RT PCRs Done
3,137,224 UART: [art] Lock RT PCRs Done
3,138,690 UART: [art] Populate DV Done
3,147,315 UART: [fht] FMC Alias Private Key: 7
3,148,431 UART: [art] Derive CDI
3,148,711 UART: [art] Store in slot 0x4
3,234,355 UART: [art] Derive Key Pair
3,234,715 UART: [art] Store priv key in slot 0x5
3,248,006 UART: [art] Derive Key Pair - Done
3,262,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,277,438 UART: [art] Erasing AUTHORITY.KEYID = 7
3,278,203 UART: [art] PUB.X = 8DBB27FD86B5A72532B2160272ECAFD0ADD7F4FAB8BC339DF42D104A83EAF480B3914CA2EA5C6EB0D0B2EE1DBEC66294
3,284,998 UART: [art] PUB.Y = E260981E212C9D5E37D8EB9948512FA62441DC33D5D3A900866F29E7352E379C88797C13CF5BFC6CC9063115893690C8
3,291,917 UART: [art] SIG.R = B83E556A1C01FF45863E045AA0F99DA938D61E590F6B2C8A9E99758C1023CD9B46176AFA0EBEC3EF04DF7BB311F0A1D9
3,298,688 UART: [art] SIG.S = EC0D003BC77142B76921F59DF7E2F3FC6BCBAFEAAE6593F2739978603D1DFC0E1BAAA2251FCF5781BC0E5736401FDCF7
3,322,839 UART: Caliptra RT
3,323,182 UART: [state] CFI Enabled
3,443,408 UART: [rt] RT listening for mailbox commands...
3,444,078 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,918 UART: [rt]cmd =0x4c444556, len=4
3,484,284 >>> mbox cmd response data (687 bytes)
3,484,285 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,840 UART: [rt]cmd =0x43455246, len=4
3,525,707 >>> mbox cmd response data (888 bytes)
3,525,708 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,555,283 UART: [rt]cmd =0x43455252, len=4
3,565,967 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [kat] SHA2-256
891,311 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,492 UART: [kat] SHA2-512-ACC
906,393 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,818 UART: [kat] LMS
1,169,130 UART: [kat] --
1,170,043 UART: [cold-reset] ++
1,170,623 UART: [fht] FHT @ 0x50003400
1,173,315 UART: [idev] ++
1,173,483 UART: [idev] CDI.KEYID = 6
1,173,844 UART: [idev] SUBJECT.KEYID = 7
1,174,269 UART: [idev] UDS.KEYID = 0
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,199,754 UART: [idev] Sha1 KeyId Algorithm
1,209,470 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,020 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,728 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,613 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,319 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,748 UART: [idev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
1,299,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,126 UART: [idev] --
1,301,283 UART: [ldev] ++
1,301,451 UART: [ldev] CDI.KEYID = 6
1,301,815 UART: [ldev] SUBJECT.KEYID = 5
1,302,242 UART: [ldev] AUTHORITY.KEYID = 7
1,302,705 UART: [ldev] FE.KEYID = 1
1,307,881 UART: [ldev] Erasing FE.KEYID = 1
1,334,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,155 UART: [ldev] --
1,373,448 UART: [fwproc] Wait for Commands...
1,374,155 UART: [fwproc] Recv command 0x46574c44
1,374,888 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,950 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,778,125 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,918,498 >>> mbox cmd response: success
2,919,740 UART: [afmc] ++
2,919,908 UART: [afmc] CDI.KEYID = 6
2,920,271 UART: [afmc] SUBJECT.KEYID = 7
2,920,697 UART: [afmc] AUTHORITY.KEYID = 5
2,956,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,238 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,948 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,829 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,530 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,251 UART: [afmc] --
2,999,164 UART: [cold-reset] --
2,999,914 UART: [state] Locking Datavault
3,001,475 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,079 UART: [state] Locking ICCM
3,002,587 UART: [exit] Launching FMC @ 0x40000130
3,007,917 UART:
3,007,933 UART: Running Caliptra FMC ...
3,008,341 UART:
3,008,484 UART: [state] CFI Enabled
3,019,038 UART: [fht] FMC Alias Private Key: 7
3,138,392 UART: [art] Extend RT PCRs Done
3,138,820 UART: [art] Lock RT PCRs Done
3,140,574 UART: [art] Populate DV Done
3,148,803 UART: [fht] FMC Alias Private Key: 7
3,149,827 UART: [art] Derive CDI
3,150,107 UART: [art] Store in slot 0x4
3,235,697 UART: [art] Derive Key Pair
3,236,057 UART: [art] Store priv key in slot 0x5
3,248,958 UART: [art] Derive Key Pair - Done
3,263,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,279,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,964 UART: [art] PUB.X = 83216C40F840695D170115C564811137E8A252377822B2B8B2FCF91AF64D0F5F6AB15C9FBA771993049BC686F2145E80
3,286,717 UART: [art] PUB.Y = 44C10824F8E48781A267B5B6E8F029370DDE87B0384C2E1BCD62AD8049B00B637DAD936B8DC7FF1F8374BC0362DE862C
3,293,663 UART: [art] SIG.R = 7B8F128A0A6231B26FFC52E1A14A718245B3034848A2E4CECE200056EB88194307BD9B3834B876CC50AD444ECEF8AE53
3,300,408 UART: [art] SIG.S = E7147FA38A7B11B8520F29E024274E9049788C15A92BAB38C6CAD7EA919B269BE5165DA041E6ACBE6965C2313242A004
3,324,226 UART: Caliptra RT
3,324,569 UART: [state] CFI Enabled
3,443,386 UART: [rt] RT listening for mailbox commands...
3,444,056 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,850 UART: [rt]cmd =0x4c444556, len=4
3,484,366 >>> mbox cmd response data (687 bytes)
3,484,367 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,734 UART: [rt]cmd =0x43455246, len=4
3,525,903 >>> mbox cmd response data (888 bytes)
3,525,904 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,555,145 UART: [rt]cmd =0x43455252, len=4
3,566,108 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1019.61s
Truncated 2533977 bytes from beginning
2,761,394 UART: Running Caliptra FMC ...
2,761,802 UART:
2,761,945 UART: [state] CFI Enabled
2,772,557 UART: [fht] FMC Alias Private Key: 7
2,891,301 UART: [art] Extend RT PCRs Done
2,891,729 UART: [art] Lock RT PCRs Done
2,893,175 UART: [art] Populate DV Done
2,901,428 UART: [fht] FMC Alias Private Key: 7
2,902,606 UART: [art] Derive CDI
2,902,886 UART: [art] Store in slot 0x4
2,988,526 UART: [art] Derive Key Pair
2,988,886 UART: [art] Store priv key in slot 0x5
3,002,123 UART: [art] Derive Key Pair - Done
3,017,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,839 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,604 UART: [art] PUB.X = F6A9F83FCD19481E60F02921398DA50B18525F26491575AA0B1342BFC03742E8BC30BBBD73947061FE9CE1D9F098EA88
3,040,372 UART: [art] PUB.Y = E99B6D954C99F7067A1ECFC27591252C0228507FC85755C9175C89EBDF1CA5F649F97AEB5AEC0C6161BBE2FF59D3BB47
3,047,327 UART: [art] SIG.R = BC0463C306F6D576946A6626DF94597E360DB55555B6E55F6518A2A0F54C72C087070CF04AB5798AD744D25746A97963
3,054,074 UART: [art] SIG.S = F6DA3057114343C76D2C237D2E68AF41AF7B9CF7628D559D84DFCDE57F27FEE861833DD0E65E330EF04541DCB90514CD
3,077,628 UART: Caliptra RT
3,077,971 UART: [state] CFI Enabled
3,197,249 UART: [rt] RT listening for mailbox commands...
3,197,919 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,489 UART: [rt]cmd =0x4c444556, len=4
3,237,821 >>> mbox cmd response data (687 bytes)
3,237,822 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,115 UART: [rt]cmd =0x43455246, len=4
3,279,262 >>> mbox cmd response data (888 bytes)
3,279,263 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,818 UART: [rt]cmd =0x43455252, len=4
3,319,636 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,345 >>> mbox cmd response: success
2,760,268 UART:
2,760,284 UART: Running Caliptra FMC ...
2,760,692 UART:
2,760,835 UART: [state] CFI Enabled
2,771,547 UART: [fht] FMC Alias Private Key: 7
2,890,723 UART: [art] Extend RT PCRs Done
2,891,151 UART: [art] Lock RT PCRs Done
2,892,911 UART: [art] Populate DV Done
2,901,282 UART: [fht] FMC Alias Private Key: 7
2,902,356 UART: [art] Derive CDI
2,902,636 UART: [art] Store in slot 0x4
2,988,552 UART: [art] Derive Key Pair
2,988,912 UART: [art] Store priv key in slot 0x5
3,001,599 UART: [art] Derive Key Pair - Done
3,016,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,292 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,057 UART: [art] PUB.X = 3D0D250E827FDB89A025CF928EF90F26E1EC1E125A801B57946071DF38A9E8F6FB390C3E87417F2078525A0437D30BA1
3,038,811 UART: [art] PUB.Y = 38D6709B17435AC94B179FD3319D2EA589C761EF192E4CA469A9768247118910796369DC97484567C048FFC61343CAC1
3,045,751 UART: [art] SIG.R = 4C5C716FAFEACE022FA18B521CDE2842BF16295AD01D28927F0BE48A27E9CFF94D8960448DB904E34596D5FDB1BFF1DB
3,052,532 UART: [art] SIG.S = 59F6B2AAA8EEEAE7CA4810BC8C7779E95D77C366DC383B5DAF12323FAC75F7B4EC590DCAADCB72FBE7F9492223AF5F65
3,076,133 UART: Caliptra RT
3,076,476 UART: [state] CFI Enabled
3,195,262 UART: [rt] RT listening for mailbox commands...
3,195,932 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,718 UART: [rt]cmd =0x4c444556, len=4
3,236,222 >>> mbox cmd response data (687 bytes)
3,236,223 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,610 UART: [rt]cmd =0x43455246, len=4
3,277,617 >>> mbox cmd response data (888 bytes)
3,277,618 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,893 UART: [rt]cmd =0x43455252, len=4
3,317,696 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,441 >>> mbox cmd response: success
2,759,028 UART:
2,759,044 UART: Running Caliptra FMC ...
2,759,452 UART:
2,759,595 UART: [state] CFI Enabled
2,770,421 UART: [fht] FMC Alias Private Key: 7
2,889,539 UART: [art] Extend RT PCRs Done
2,889,967 UART: [art] Lock RT PCRs Done
2,891,271 UART: [art] Populate DV Done
2,899,458 UART: [fht] FMC Alias Private Key: 7
2,900,530 UART: [art] Derive CDI
2,900,810 UART: [art] Store in slot 0x4
2,986,566 UART: [art] Derive Key Pair
2,986,926 UART: [art] Store priv key in slot 0x5
3,000,487 UART: [art] Derive Key Pair - Done
3,015,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,773 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,538 UART: [art] PUB.X = 779186827BD79E2B43835EBBEF2E97CD5CD6598E7420E5BC39028BFE2E4360A10349CEBB90E6ABD0CD08CE891D06CB65
3,038,310 UART: [art] PUB.Y = 49CC0CC3E67305A49BFB7D9AAC687EFB81CEA3BA905376EE4383E310F76C6CE4AAA1E114ADAE60D94953C4D472F7955A
3,045,274 UART: [art] SIG.R = CDDB3E577B6080E3E597A4F8D9BC592E246AFE476FDC95D2FAB3CB24616A4BD8D3FE68D486B0291C287B8CBE53596521
3,052,060 UART: [art] SIG.S = E161E1AC7DE1A189232B47DCA90B9BBE8EE85049894521346924797238218EAF3C6E90E9B8A717E8AF60A7011D31C4C3
3,075,976 UART: Caliptra RT
3,076,319 UART: [state] CFI Enabled
3,195,611 UART: [rt] RT listening for mailbox commands...
3,196,281 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,077 UART: [rt]cmd =0x4c444556, len=4
3,236,589 >>> mbox cmd response data (687 bytes)
3,236,590 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,883 UART: [rt]cmd =0x43455246, len=4
3,277,916 >>> mbox cmd response data (888 bytes)
3,277,917 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,260 UART: [rt]cmd =0x43455252, len=4
3,318,052 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,112,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,699,587 >>> mbox cmd response: success
2,761,780 UART:
2,761,796 UART: Running Caliptra FMC ...
2,762,204 UART:
2,762,347 UART: [state] CFI Enabled
2,772,729 UART: [fht] FMC Alias Private Key: 7
2,891,519 UART: [art] Extend RT PCRs Done
2,891,947 UART: [art] Lock RT PCRs Done
2,893,499 UART: [art] Populate DV Done
2,901,906 UART: [fht] FMC Alias Private Key: 7
2,902,880 UART: [art] Derive CDI
2,903,160 UART: [art] Store in slot 0x4
2,989,230 UART: [art] Derive Key Pair
2,989,590 UART: [art] Store priv key in slot 0x5
3,002,727 UART: [art] Derive Key Pair - Done
3,017,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,033,310 UART: [art] Erasing AUTHORITY.KEYID = 7
3,034,075 UART: [art] PUB.X = 6346619484D78611CA9266448D71A85E69D7EC5B0796733D8450F2E5E293D21797655B9E98DB8EDB6AFD5C7A6D3FFBEE
3,040,846 UART: [art] PUB.Y = 9402728B73947EA58445146D82FB5C930A655B5026698F26477DA35651409AD9495E874EA608EB64E141AC271C3B7649
3,047,773 UART: [art] SIG.R = CCDCFF547525FEA61710DE085640B4AFB0F8CC0164DEDF62F77B609FEC7BFFD1C9492C6E387295BE190A0371E1269836
3,054,545 UART: [art] SIG.S = 4A90BD4773BDCAE18051E974B0617F21DA529293B6B999890AB2ABB0AF6701CFB032D7D86E4A5E35CBC0D23FB2AE75D0
3,078,555 UART: Caliptra RT
3,078,898 UART: [state] CFI Enabled
3,198,687 UART: [rt] RT listening for mailbox commands...
3,199,357 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,229,375 UART: [rt]cmd =0x4c444556, len=4
3,239,697 >>> mbox cmd response data (687 bytes)
3,239,698 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,941 UART: [rt]cmd =0x43455246, len=4
3,280,942 >>> mbox cmd response data (888 bytes)
3,280,943 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,310,224 UART: [rt]cmd =0x43455252, len=4
3,321,117 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,325 >>> mbox cmd response: success
2,760,542 UART:
2,760,558 UART: Running Caliptra FMC ...
2,760,966 UART:
2,761,109 UART: [state] CFI Enabled
2,771,745 UART: [fht] FMC Alias Private Key: 7
2,890,717 UART: [art] Extend RT PCRs Done
2,891,145 UART: [art] Lock RT PCRs Done
2,892,357 UART: [art] Populate DV Done
2,900,650 UART: [fht] FMC Alias Private Key: 7
2,901,752 UART: [art] Derive CDI
2,902,032 UART: [art] Store in slot 0x4
2,987,948 UART: [art] Derive Key Pair
2,988,308 UART: [art] Store priv key in slot 0x5
3,001,765 UART: [art] Derive Key Pair - Done
3,016,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,561 UART: [art] PUB.X = 68BB1CF947A32686F94B5512D444CA3103D9E0D30B2E1750C8C26CD51D565E955774C3C5BE0506D3A663239A232B3A62
3,039,317 UART: [art] PUB.Y = 321B67BA5010F8804C4205C7DE71485AE7EC0A80C2FF49C5A38AFF735460C5048322A93B6ED0DB81E267EAF2F4F9CEF1
3,046,270 UART: [art] SIG.R = E038745A4BC6BC2DD5237ACF4CB3CB81470D3462272B7B01BE256028800673C7DEDDC057D7CAB113C5FE41E421AA7475
3,053,041 UART: [art] SIG.S = 105D1C69FE46623FE42B71579794363EC0F47A1C29F2657223E338023FB06B151124EEB554345CD2FD97753F8AFDCBDA
3,076,964 UART: Caliptra RT
3,077,307 UART: [state] CFI Enabled
3,196,402 UART: [rt] RT listening for mailbox commands...
3,197,072 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,976 UART: [rt]cmd =0x4c444556, len=4
3,237,330 >>> mbox cmd response data (687 bytes)
3,237,331 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,548 UART: [rt]cmd =0x43455246, len=4
3,278,605 >>> mbox cmd response data (888 bytes)
3,278,606 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,075 UART: [rt]cmd =0x43455252, len=4
3,318,708 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 986.63s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,525 UART: [idev] --
1,300,690 UART: [ldev] ++
1,300,858 UART: [ldev] CDI.KEYID = 6
1,301,222 UART: [ldev] SUBJECT.KEYID = 5
1,301,649 UART: [ldev] AUTHORITY.KEYID = 7
1,302,112 UART: [ldev] FE.KEYID = 1
1,307,382 UART: [ldev] Erasing FE.KEYID = 1
1,333,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,520 UART: [ldev] --
1,372,747 UART: [fwproc] Wait for Commands...
1,373,338 UART: [fwproc] Recv command 0x46574c44
1,374,071 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,744,147 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,775,322 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,915,523 >>> mbox cmd response: success
2,916,699 UART: [afmc] ++
2,916,867 UART: [afmc] CDI.KEYID = 6
2,917,230 UART: [afmc] SUBJECT.KEYID = 7
2,917,656 UART: [afmc] AUTHORITY.KEYID = 5
2,953,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,969,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,970,565 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,275 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,156 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,987,857 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,995,696 UART: [afmc] --
2,996,753 UART: [cold-reset] --
2,997,593 UART: [state] Locking Datavault
2,998,772 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,376 UART: [state] Locking ICCM
2,999,976 UART: [exit] Launching FMC @ 0x40000130
3,005,306 UART:
3,005,322 UART: Running Caliptra FMC ...
3,005,730 UART:
3,005,784 UART: [state] CFI Enabled
3,016,214 UART: [fht] FMC Alias Private Key: 7
3,135,368 UART: [art] Extend RT PCRs Done
3,135,796 UART: [art] Lock RT PCRs Done
3,137,462 UART: [art] Populate DV Done
3,145,841 UART: [fht] FMC Alias Private Key: 7
3,146,807 UART: [art] Derive CDI
3,147,087 UART: [art] Store in slot 0x4
3,232,404 UART: [art] Derive Key Pair
3,232,764 UART: [art] Store priv key in slot 0x5
3,245,896 UART: [art] Derive Key Pair - Done
3,260,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,276,060 UART: [art] Erasing AUTHORITY.KEYID = 7
3,276,825 UART: [art] PUB.X = DB2A409D9E9D4D9A74199D91EAF8F9DC0B11D7E77B3ACBD01D7146AFA22861B9E0740AEF38CDDA4900221555289A93DD
3,283,583 UART: [art] PUB.Y = 5A617FDEAE04F69A95EC388AFD2F81F6F4849195C14D00A0C1054F6FAC3F8BEB411118F0B9F1C17ABED68DFB80434139
3,290,521 UART: [art] SIG.R = 0F278194CA7A795CBC5020B3D7684765D9875A3A5FFDFA7D46970D872F22778AC0697C95648145448B08CC14952BF22B
3,297,278 UART: [art] SIG.S = 5B51DA2FF1006CA1E4B8568F7270C88BB1FD82D5C5E97CFDA887C9DF53DF6CBE51AFD524875029A894B4095C448ED43B
3,321,225 UART: Caliptra RT
3,321,476 UART: [state] CFI Enabled
3,440,828 UART: [rt] RT listening for mailbox commands...
3,441,498 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,344 UART: [rt]cmd =0x4c444556, len=4
3,481,810 >>> mbox cmd response data (687 bytes)
3,481,811 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,224 UART: [rt]cmd =0x43455246, len=4
3,523,409 >>> mbox cmd response data (888 bytes)
3,523,410 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,951 UART: [rt]cmd =0x43455252, len=4
3,563,804 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,518 UART: [state] LifecycleState = Unprovisioned
85,173 UART: [state] DebugLocked = No
85,691 UART: [state] WD Timer not started. Device not locked for debugging
86,846 UART: [kat] SHA2-256
890,396 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,500 UART: [kat] ++
894,652 UART: [kat] sha1
898,732 UART: [kat] SHA2-256
900,672 UART: [kat] SHA2-384
903,437 UART: [kat] SHA2-512-ACC
905,338 UART: [kat] ECC-384
914,803 UART: [kat] HMAC-384Kdf
919,187 UART: [kat] LMS
1,167,499 UART: [kat] --
1,168,300 UART: [cold-reset] ++
1,168,794 UART: [fht] FHT @ 0x50003400
1,171,274 UART: [idev] ++
1,171,442 UART: [idev] CDI.KEYID = 6
1,171,803 UART: [idev] SUBJECT.KEYID = 7
1,172,228 UART: [idev] UDS.KEYID = 0
1,179,937 UART: [idev] Erasing UDS.KEYID = 0
1,196,643 UART: [idev] Sha1 KeyId Algorithm
1,206,523 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,217,297 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,223,005 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,228,890 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,234,596 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,243,025 UART: [idev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
1,297,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,297,403 UART: [idev] --
1,298,280 UART: [ldev] ++
1,298,448 UART: [ldev] CDI.KEYID = 6
1,298,812 UART: [ldev] SUBJECT.KEYID = 5
1,299,239 UART: [ldev] AUTHORITY.KEYID = 7
1,299,702 UART: [ldev] FE.KEYID = 1
1,304,860 UART: [ldev] Erasing FE.KEYID = 1
1,330,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,344,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,350,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,356,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,361,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,369,090 UART: [ldev] --
1,370,493 UART: [fwproc] Wait for Commands...
1,371,106 UART: [fwproc] Recv command 0x46574c44
1,371,839 UART: [fwproc] Recv'd Img size: 118548 bytes
2,715,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,742,541 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,773,716 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,913,963 >>> mbox cmd response: success
2,915,151 UART: [afmc] ++
2,915,319 UART: [afmc] CDI.KEYID = 6
2,915,682 UART: [afmc] SUBJECT.KEYID = 7
2,916,108 UART: [afmc] AUTHORITY.KEYID = 5
2,951,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,967,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,968,539 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,974,249 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,980,130 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,985,831 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,993,452 UART: [afmc] --
2,994,327 UART: [cold-reset] --
2,994,933 UART: [state] Locking Datavault
2,995,992 UART: [state] Locking PCR0, PCR1 and PCR31
2,996,596 UART: [state] Locking ICCM
2,997,216 UART: [exit] Launching FMC @ 0x40000130
3,002,546 UART:
3,002,562 UART: Running Caliptra FMC ...
3,002,970 UART:
3,003,024 UART: [state] CFI Enabled
3,013,080 UART: [fht] FMC Alias Private Key: 7
3,131,172 UART: [art] Extend RT PCRs Done
3,131,600 UART: [art] Lock RT PCRs Done
3,133,246 UART: [art] Populate DV Done
3,141,453 UART: [fht] FMC Alias Private Key: 7
3,142,537 UART: [art] Derive CDI
3,142,817 UART: [art] Store in slot 0x4
3,228,938 UART: [art] Derive Key Pair
3,229,298 UART: [art] Store priv key in slot 0x5
3,242,320 UART: [art] Derive Key Pair - Done
3,256,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,272,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,273,000 UART: [art] PUB.X = 624289D2A5B549403591A6A724BD8C93EFDA1ED13A434C9E2C1F1FA81EC9D08ECD87EE611E2B7ECFBE785C4BF999ED8B
3,279,792 UART: [art] PUB.Y = FA4C6C325ABC2CE3E83026D6C4ABC43729213C7EC13479775F696F294DD9B9DB4AC9AC0D1AF79E044125ABD909D0E259
3,286,747 UART: [art] SIG.R = BC9D61189D37A8DE608BD7CB3401AF468FF79228AF279D9AB02C7E50E2D0D29772BEC17EA08A25635B91AA9FD0BF25D1
3,293,530 UART: [art] SIG.S = 39F8C0C4A9B6EBB461545A7B5F2E1A00781311D8BCA514F5FE28C9E94724EBA40D6518A73BB5953C0B2B2CF6CAAA7BDC
3,317,382 UART: Caliptra RT
3,317,633 UART: [state] CFI Enabled
3,437,896 UART: [rt] RT listening for mailbox commands...
3,438,566 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,468,368 UART: [rt]cmd =0x4c444556, len=4
3,478,836 >>> mbox cmd response data (687 bytes)
3,478,837 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,196 UART: [rt]cmd =0x43455246, len=4
3,520,269 >>> mbox cmd response data (888 bytes)
3,520,270 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,663 UART: [rt]cmd =0x43455252, len=4
3,560,332 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1014.93s
Truncated 2533977 bytes from beginning
2,757,527 UART: Running Caliptra FMC ...
2,757,935 UART:
2,757,989 UART: [state] CFI Enabled
2,768,333 UART: [fht] FMC Alias Private Key: 7
2,887,051 UART: [art] Extend RT PCRs Done
2,887,479 UART: [art] Lock RT PCRs Done
2,889,185 UART: [art] Populate DV Done
2,897,250 UART: [fht] FMC Alias Private Key: 7
2,898,302 UART: [art] Derive CDI
2,898,582 UART: [art] Store in slot 0x4
2,984,217 UART: [art] Derive Key Pair
2,984,577 UART: [art] Store priv key in slot 0x5
2,997,337 UART: [art] Derive Key Pair - Done
3,012,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,767 UART: [art] PUB.X = 56722E5BD1192CF4B68FA39D7A335183C1F743BFAA99F85A0FF7A89D474C1B648D45C5103D0ADEE0AE420A63C4B621BD
3,035,542 UART: [art] PUB.Y = 51A32D8A8672A4A4F705A43CC52DA22BB611D243FF5028A60447AF64344167BC982A73DFB7197002B29166B81948B7B9
3,042,479 UART: [art] SIG.R = E9A7B3E97D69F157B4BDC208B755BEB06AED714138B87E8641C8F7A0CF839DC8228A83AF2DF110C318923277D399612E
3,049,252 UART: [art] SIG.S = AF9B9EA895FFC6D9364073DB2BE7DA7A419179BD7789AEF4CDFBBBA349D0B6749D60BEB7184528EE7A386C58A0563309
3,072,959 UART: Caliptra RT
3,073,210 UART: [state] CFI Enabled
3,191,990 UART: [rt] RT listening for mailbox commands...
3,192,660 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,556 UART: [rt]cmd =0x4c444556, len=4
3,232,978 >>> mbox cmd response data (687 bytes)
3,232,979 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,262,312 UART: [rt]cmd =0x43455246, len=4
3,274,581 >>> mbox cmd response data (888 bytes)
3,274,582 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,007 UART: [rt]cmd =0x43455252, len=4
3,314,821 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,300 >>> mbox cmd response: success
2,757,483 UART:
2,757,499 UART: Running Caliptra FMC ...
2,757,907 UART:
2,757,961 UART: [state] CFI Enabled
2,768,831 UART: [fht] FMC Alias Private Key: 7
2,888,117 UART: [art] Extend RT PCRs Done
2,888,545 UART: [art] Lock RT PCRs Done
2,890,307 UART: [art] Populate DV Done
2,898,574 UART: [fht] FMC Alias Private Key: 7
2,899,698 UART: [art] Derive CDI
2,899,978 UART: [art] Store in slot 0x4
2,985,745 UART: [art] Derive Key Pair
2,986,105 UART: [art] Store priv key in slot 0x5
2,999,299 UART: [art] Derive Key Pair - Done
3,014,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,297 UART: [art] PUB.X = 46DC45BA623E2D103458A805743EA0356021D5A2C33983270866A2B06466BC663B4B3EB4D50D6290CC3ABB41C960F945
3,037,054 UART: [art] PUB.Y = 56F382363DFF2C03FD7DF7C2E3C0F723B061311334205B0A27973AC4049465074FA530CA0F0851FECFCA6C396A986E09
3,043,985 UART: [art] SIG.R = 68B892ED5C244F4AFF80397E8BC9F6ED58224771298FC2BF2100B5400146332E0AECB3DB580042DBD5BAD5538E34B32E
3,050,713 UART: [art] SIG.S = C989E714C82D4D77DB72DE8DD4718F9E94B799785B5332C784001566AAC44F4BA146C87819C8B906D74FDC85E23BC554
3,074,300 UART: Caliptra RT
3,074,551 UART: [state] CFI Enabled
3,194,884 UART: [rt] RT listening for mailbox commands...
3,195,554 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,388 UART: [rt]cmd =0x4c444556, len=4
3,235,858 >>> mbox cmd response data (687 bytes)
3,235,859 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,254 UART: [rt]cmd =0x43455246, len=4
3,277,529 >>> mbox cmd response data (888 bytes)
3,277,530 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,861 UART: [rt]cmd =0x43455252, len=4
3,317,654 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,896 >>> mbox cmd response: success
2,760,729 UART:
2,760,745 UART: Running Caliptra FMC ...
2,761,153 UART:
2,761,207 UART: [state] CFI Enabled
2,771,799 UART: [fht] FMC Alias Private Key: 7
2,891,185 UART: [art] Extend RT PCRs Done
2,891,613 UART: [art] Lock RT PCRs Done
2,893,221 UART: [art] Populate DV Done
2,901,326 UART: [fht] FMC Alias Private Key: 7
2,902,396 UART: [art] Derive CDI
2,902,676 UART: [art] Store in slot 0x4
2,988,289 UART: [art] Derive Key Pair
2,988,649 UART: [art] Store priv key in slot 0x5
3,001,541 UART: [art] Derive Key Pair - Done
3,015,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,459 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,224 UART: [art] PUB.X = 38B5B32441FB65A55D751586CA0B2093F74E22BB85102E625C90572372497BF4B365D13C39234D1F11AB9D8C3F8FD259
3,038,987 UART: [art] PUB.Y = 24D098C6A9189710E39ABDD2EC7B90AD1063731F7C6BF479DE356191F915BEF676344C58B45AF4B3CAD49918E75F61DD
3,045,945 UART: [art] SIG.R = 502EC6C1D4C1796F4883B70048AC672485228DC8A11248599FB45BDDFED5F3F431C40B861D6F83D6E85BFC0CBAEE5383
3,052,697 UART: [art] SIG.S = 93528B33F26D1E6F0B62AC67E50A8B30ADA218C0149E2128393851DD9DD5622718909B8F317E16B8454E3A1C85956020
3,076,259 UART: Caliptra RT
3,076,510 UART: [state] CFI Enabled
3,196,097 UART: [rt] RT listening for mailbox commands...
3,196,767 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,751 UART: [rt]cmd =0x4c444556, len=4
3,236,979 >>> mbox cmd response data (687 bytes)
3,236,980 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,325 UART: [rt]cmd =0x43455246, len=4
3,278,558 >>> mbox cmd response data (888 bytes)
3,278,559 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,906 UART: [rt]cmd =0x43455252, len=4
3,318,759 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,106 >>> mbox cmd response: success
2,758,381 UART:
2,758,397 UART: Running Caliptra FMC ...
2,758,805 UART:
2,758,859 UART: [state] CFI Enabled
2,769,379 UART: [fht] FMC Alias Private Key: 7
2,888,563 UART: [art] Extend RT PCRs Done
2,888,991 UART: [art] Lock RT PCRs Done
2,890,465 UART: [art] Populate DV Done
2,898,878 UART: [fht] FMC Alias Private Key: 7
2,900,008 UART: [art] Derive CDI
2,900,288 UART: [art] Store in slot 0x4
2,985,553 UART: [art] Derive Key Pair
2,985,913 UART: [art] Store priv key in slot 0x5
2,998,975 UART: [art] Derive Key Pair - Done
3,014,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,461 UART: [art] PUB.X = A069C0FDDF43053CD968EA483C09F6134D7AFCF39A6B24043A0D45F68875BBDA729A039623D94E89A02BC3282B49E550
3,037,222 UART: [art] PUB.Y = 6C1F5A9463974CADDDC69A531A1014820BF7E7E442F76D4F3F743C7CD1548ECF6138636B71EEB8CC272078240E3AB142
3,044,172 UART: [art] SIG.R = 0651C834FF4E6DD40604D0ED7F10003CE457A030DE93EFD0E61ED544F7C39B5D00204C16BD726DADF94AB87E4D37F214
3,050,901 UART: [art] SIG.S = FBF701EC4AB588185B501C650463E408DA864C6EFE1E4620DA3ADC9118B685B49ADA15579771A18C54C40E7B3496C35B
3,075,253 UART: Caliptra RT
3,075,504 UART: [state] CFI Enabled
3,194,683 UART: [rt] RT listening for mailbox commands...
3,195,353 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,199 UART: [rt]cmd =0x4c444556, len=4
3,235,517 >>> mbox cmd response data (687 bytes)
3,235,518 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,855 UART: [rt]cmd =0x43455246, len=4
3,277,106 >>> mbox cmd response data (888 bytes)
3,277,107 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,428 UART: [rt]cmd =0x43455252, len=4
3,317,243 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,780 >>> mbox cmd response: success
2,761,783 UART:
2,761,799 UART: Running Caliptra FMC ...
2,762,207 UART:
2,762,261 UART: [state] CFI Enabled
2,772,383 UART: [fht] FMC Alias Private Key: 7
2,891,323 UART: [art] Extend RT PCRs Done
2,891,751 UART: [art] Lock RT PCRs Done
2,893,305 UART: [art] Populate DV Done
2,901,462 UART: [fht] FMC Alias Private Key: 7
2,902,430 UART: [art] Derive CDI
2,902,710 UART: [art] Store in slot 0x4
2,988,475 UART: [art] Derive Key Pair
2,988,835 UART: [art] Store priv key in slot 0x5
3,002,021 UART: [art] Derive Key Pair - Done
3,017,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,793 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,558 UART: [art] PUB.X = 01ACE15C4BB8FCF903D1D5D46996E9C93D1897DF9176D33B8BB72AF53BECE28D67520F303DFBEDBA0FD43124B9721775
3,040,332 UART: [art] PUB.Y = 4D355E872563B07719E288E7ACEB67E74B5F50030133BEC45109BCE96CCDCA10F122B0EC1D91521046A740265103E3D8
3,047,270 UART: [art] SIG.R = 301ADE69B8103A7F59286FE46E76814D0C84203288E9B56990B85D7518668D813F45F7C3E0AF4A68A0B54355457EAD79
3,054,031 UART: [art] SIG.S = A29122775D997A334FC82FEEC8079E7838FFDDDE9C2AA02B8E3B19EB018240E57A2A02D50C733588F817808271414A8A
3,077,951 UART: Caliptra RT
3,078,202 UART: [state] CFI Enabled
3,197,363 UART: [rt] RT listening for mailbox commands...
3,198,033 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,931 UART: [rt]cmd =0x4c444556, len=4
3,238,169 >>> mbox cmd response data (687 bytes)
3,238,170 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,665 UART: [rt]cmd =0x43455246, len=4
3,279,770 >>> mbox cmd response data (888 bytes)
3,279,771 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,038 UART: [rt]cmd =0x43455252, len=4
3,319,939 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 982.35s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,822 UART: [idev] --
1,300,897 UART: [ldev] ++
1,301,065 UART: [ldev] CDI.KEYID = 6
1,301,429 UART: [ldev] SUBJECT.KEYID = 5
1,301,856 UART: [ldev] AUTHORITY.KEYID = 7
1,302,319 UART: [ldev] FE.KEYID = 1
1,307,715 UART: [ldev] Erasing FE.KEYID = 1
1,334,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,997 UART: [ldev] --
1,373,412 UART: [fwproc] Wait for Commands...
1,374,197 UART: [fwproc] Recv command 0x46574c44
1,374,930 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,708 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,883 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,918,232 >>> mbox cmd response: success
2,919,450 UART: [afmc] ++
2,919,618 UART: [afmc] CDI.KEYID = 6
2,919,981 UART: [afmc] SUBJECT.KEYID = 7
2,920,407 UART: [afmc] AUTHORITY.KEYID = 5
2,955,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,972,588 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,298 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,179 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,880 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,551 UART: [afmc] --
2,998,458 UART: [cold-reset] --
2,999,064 UART: [state] Locking Datavault
3,000,275 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,879 UART: [state] Locking ICCM
3,001,381 UART: [exit] Launching FMC @ 0x40000130
3,006,711 UART:
3,006,727 UART: Running Caliptra FMC ...
3,007,135 UART:
3,007,278 UART: [state] CFI Enabled
3,018,186 UART: [fht] FMC Alias Private Key: 7
3,137,288 UART: [art] Extend RT PCRs Done
3,137,716 UART: [art] Lock RT PCRs Done
3,139,520 UART: [art] Populate DV Done
3,147,775 UART: [fht] FMC Alias Private Key: 7
3,148,805 UART: [art] Derive CDI
3,149,085 UART: [art] Store in slot 0x4
3,234,828 UART: [art] Derive Key Pair
3,235,188 UART: [art] Store priv key in slot 0x5
3,248,062 UART: [art] Derive Key Pair - Done
3,262,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,278,797 UART: [art] PUB.X = AD7FAB60B87B6EDBF71E996E90731C523FEF869ED90C8F8E1193CF51979B399484830D0423320F0244B1C85B9AD05D61
3,285,556 UART: [art] PUB.Y = C138CEE99A5642D02A35FE4047F9D8E8CF1F41F3373494598307639072017B2F032E071C47479BCD22C3E70CF3E14FBF
3,292,491 UART: [art] SIG.R = 816CE1579B9606230E5B6FC22D6C139FC6EC7D553912B8947EFEE45324D45864E76277B3E3212188978FE48BD47F3FAC
3,299,255 UART: [art] SIG.S = A5813F7BBC2A7ADA44E780CF45D429BE5773E0A69D140B3388875CEC346A3E28F4C543D89AF9BBEB29EA764937165A9C
3,323,166 UART: Caliptra RT
3,323,509 UART: [state] CFI Enabled
3,443,333 UART: [rt] RT listening for mailbox commands...
3,444,003 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,123 UART: [rt]cmd =0x4c444556, len=4
3,484,463 >>> mbox cmd response data (687 bytes)
3,484,464 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,551 UART: [rt]cmd =0x43455246, len=4
3,525,542 >>> mbox cmd response data (888 bytes)
3,525,543 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,886 UART: [rt]cmd =0x43455252, len=4
3,565,468 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,318 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
891,229 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,574 UART: [kat] SHA2-512-ACC
906,475 UART: [kat] ECC-384
916,170 UART: [kat] HMAC-384Kdf
920,756 UART: [kat] LMS
1,169,068 UART: [kat] --
1,170,009 UART: [cold-reset] ++
1,170,381 UART: [fht] FHT @ 0x50003400
1,173,279 UART: [idev] ++
1,173,447 UART: [idev] CDI.KEYID = 6
1,173,808 UART: [idev] SUBJECT.KEYID = 7
1,174,233 UART: [idev] UDS.KEYID = 0
1,182,446 UART: [idev] Erasing UDS.KEYID = 0
1,199,414 UART: [idev] Sha1 KeyId Algorithm
1,209,028 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,572 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,280 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,165 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,871 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,300 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,678 UART: [idev] --
1,300,633 UART: [ldev] ++
1,300,801 UART: [ldev] CDI.KEYID = 6
1,301,165 UART: [ldev] SUBJECT.KEYID = 5
1,301,592 UART: [ldev] AUTHORITY.KEYID = 7
1,302,055 UART: [ldev] FE.KEYID = 1
1,307,515 UART: [ldev] Erasing FE.KEYID = 1
1,334,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,831 UART: [ldev] --
1,373,080 UART: [fwproc] Wait for Commands...
1,373,833 UART: [fwproc] Recv command 0x46574c44
1,374,566 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,744,612 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,775,787 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,915,982 >>> mbox cmd response: success
2,917,194 UART: [afmc] ++
2,917,362 UART: [afmc] CDI.KEYID = 6
2,917,725 UART: [afmc] SUBJECT.KEYID = 7
2,918,151 UART: [afmc] AUTHORITY.KEYID = 5
2,953,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,268 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,978 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,859 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,560 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,219 UART: [afmc] --
2,997,210 UART: [cold-reset] --
2,998,022 UART: [state] Locking Datavault
2,998,949 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,553 UART: [state] Locking ICCM
3,000,093 UART: [exit] Launching FMC @ 0x40000130
3,005,423 UART:
3,005,439 UART: Running Caliptra FMC ...
3,005,847 UART:
3,005,990 UART: [state] CFI Enabled
3,016,546 UART: [fht] FMC Alias Private Key: 7
3,135,824 UART: [art] Extend RT PCRs Done
3,136,252 UART: [art] Lock RT PCRs Done
3,137,704 UART: [art] Populate DV Done
3,145,751 UART: [fht] FMC Alias Private Key: 7
3,146,735 UART: [art] Derive CDI
3,147,015 UART: [art] Store in slot 0x4
3,232,862 UART: [art] Derive Key Pair
3,233,222 UART: [art] Store priv key in slot 0x5
3,246,600 UART: [art] Derive Key Pair - Done
3,261,151 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,276,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,351 UART: [art] PUB.X = 7057581222BEEC52AC060E621BC6CF3118B956D5BCB1A05FE544F7AF73084544634D09196722D5718C42701C9A7DD135
3,284,105 UART: [art] PUB.Y = C7620B19E8BA5B74919CCD23FBD7AB470D98ED33DC7C5FBF3C7339F8BD80D57D1E0FDCA7F127B01E6E8E2FA1998674D9
3,291,068 UART: [art] SIG.R = BD9CE41CB6391BBF7512378B66F3A06B18236054F219EAF45304B09CE4E3E7F339C12271D42E0012028B6816EB39AEFF
3,297,814 UART: [art] SIG.S = D8FF4D611283A1D282548996096DA2FA185F7FC06F92ED076098D03EC27F61DCE0DEB2A4D306B3BC48EA80DBE0DA538B
3,322,053 UART: Caliptra RT
3,322,396 UART: [state] CFI Enabled
3,442,252 UART: [rt] RT listening for mailbox commands...
3,442,922 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,508 UART: [rt]cmd =0x4c444556, len=4
3,482,876 >>> mbox cmd response data (687 bytes)
3,482,877 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,162 UART: [rt]cmd =0x43455246, len=4
3,524,179 >>> mbox cmd response data (888 bytes)
3,524,180 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,511 UART: [rt]cmd =0x43455252, len=4
3,564,373 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1017.59s
Truncated 2533977 bytes from beginning
2,759,784 UART: Running Caliptra FMC ...
2,760,192 UART:
2,760,335 UART: [state] CFI Enabled
2,771,195 UART: [fht] FMC Alias Private Key: 7
2,890,139 UART: [art] Extend RT PCRs Done
2,890,567 UART: [art] Lock RT PCRs Done
2,891,939 UART: [art] Populate DV Done
2,900,036 UART: [fht] FMC Alias Private Key: 7
2,901,170 UART: [art] Derive CDI
2,901,450 UART: [art] Store in slot 0x4
2,987,159 UART: [art] Derive Key Pair
2,987,519 UART: [art] Store priv key in slot 0x5
3,001,327 UART: [art] Derive Key Pair - Done
3,015,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,505 UART: [art] PUB.X = 78E65A606A987E5822D781D0582C26924C113B06F7FFD71997D4AFCC88159B994069BA9125F9C6A176588130D31A2B14
3,039,264 UART: [art] PUB.Y = D88D03B29B2344E0ED757B70A7698332332D9F74EE37EC52016C64311CE2BFD6744C5B374F844664628DE88CA24E49ED
3,046,208 UART: [art] SIG.R = 188B19890D75FECB88590A1F69A5E207B08EAA55AC8B418ABF5E48A65ECAED22A6B35B67699F9114D083AE50367383E3
3,052,977 UART: [art] SIG.S = CA0AEA9B265A906493F77E6BDBB088ECEAF16EF8E401745A2A108A93C02FBF5338946103E4646C2D78B4D6B1821D81B5
3,076,526 UART: Caliptra RT
3,076,869 UART: [state] CFI Enabled
3,196,676 UART: [rt] RT listening for mailbox commands...
3,197,346 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,250 UART: [rt]cmd =0x4c444556, len=4
3,237,716 >>> mbox cmd response data (687 bytes)
3,237,717 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,002 UART: [rt]cmd =0x43455246, len=4
3,279,085 >>> mbox cmd response data (888 bytes)
3,279,086 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,337 UART: [rt]cmd =0x43455252, len=4
3,319,204 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,301 >>> mbox cmd response: success
2,759,924 UART:
2,759,940 UART: Running Caliptra FMC ...
2,760,348 UART:
2,760,491 UART: [state] CFI Enabled
2,771,025 UART: [fht] FMC Alias Private Key: 7
2,889,915 UART: [art] Extend RT PCRs Done
2,890,343 UART: [art] Lock RT PCRs Done
2,892,009 UART: [art] Populate DV Done
2,900,338 UART: [fht] FMC Alias Private Key: 7
2,901,478 UART: [art] Derive CDI
2,901,758 UART: [art] Store in slot 0x4
2,987,827 UART: [art] Derive Key Pair
2,988,187 UART: [art] Store priv key in slot 0x5
3,001,723 UART: [art] Derive Key Pair - Done
3,016,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,005 UART: [art] PUB.X = 632429059C5316ACF6DACC06D676D48457C17BE80B0DE4C0530B8B16ED6AEFE3743649CDB4645E21F627B3BC2D50745C
3,039,768 UART: [art] PUB.Y = 4F56F3A620381E7435F139BCF293DC1323F31122B7622C2ADB2BA9A570FAF60157D0E469910C7E42C1A7DCD38A994B73
3,046,716 UART: [art] SIG.R = 882AD73DBF5DC35B6602EFDA9843C3F3CFD2268C7BFCA158A74456BD5473347472DC2E3287EB715B79E2210A37CB2526
3,053,488 UART: [art] SIG.S = 721CDF89AE283380702291EA3A81C82B8D874BA0C7DF87EDF974D79AE8B5D7F6163DA1213ED1A959A73C49C299A1C78F
3,077,760 UART: Caliptra RT
3,078,103 UART: [state] CFI Enabled
3,197,466 UART: [rt] RT listening for mailbox commands...
3,198,136 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,228,190 UART: [rt]cmd =0x4c444556, len=4
3,238,792 >>> mbox cmd response data (687 bytes)
3,238,793 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,238 UART: [rt]cmd =0x43455246, len=4
3,280,189 >>> mbox cmd response data (888 bytes)
3,280,190 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,391 UART: [rt]cmd =0x43455252, len=4
3,320,304 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,959 >>> mbox cmd response: success
2,761,074 UART:
2,761,090 UART: Running Caliptra FMC ...
2,761,498 UART:
2,761,641 UART: [state] CFI Enabled
2,772,771 UART: [fht] FMC Alias Private Key: 7
2,891,377 UART: [art] Extend RT PCRs Done
2,891,805 UART: [art] Lock RT PCRs Done
2,893,225 UART: [art] Populate DV Done
2,901,536 UART: [fht] FMC Alias Private Key: 7
2,902,638 UART: [art] Derive CDI
2,902,918 UART: [art] Store in slot 0x4
2,988,421 UART: [art] Derive Key Pair
2,988,781 UART: [art] Store priv key in slot 0x5
3,001,867 UART: [art] Derive Key Pair - Done
3,016,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,359 UART: [art] PUB.X = 23C1FA58B9AFEB97F0604E823D66898CED4012C3FD3D172E58193BBD6EDDA4AAD4CA2579330C35C9637386E6846A9BF9
3,040,138 UART: [art] PUB.Y = 759A360C9617AB62F81C60F4B0E61AB2BA5C517230DD32EC1CA2714A16077FD7D860DD718DC9CB900C2F2AFC1B012B6A
3,047,090 UART: [art] SIG.R = 3757C24B573927EE15DB5B7A6C1404263CEF06186431F2FEB2D12B0870797AC2DB0034663FFA30E88849EDBA36F11035
3,053,829 UART: [art] SIG.S = 40C3D4B7326A25C81CC5C1132587C5F342AD19BC9BA5D52EF83656380D3A8CB241BA2F60AF6250B767F53CEE6AB918F7
3,078,130 UART: Caliptra RT
3,078,473 UART: [state] CFI Enabled
3,198,169 UART: [rt] RT listening for mailbox commands...
3,198,839 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,228,785 UART: [rt]cmd =0x4c444556, len=4
3,239,313 >>> mbox cmd response data (687 bytes)
3,239,314 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,811 UART: [rt]cmd =0x43455246, len=4
3,280,834 >>> mbox cmd response data (888 bytes)
3,280,835 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,310,312 UART: [rt]cmd =0x43455252, len=4
3,321,181 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,807 >>> mbox cmd response: success
2,760,398 UART:
2,760,414 UART: Running Caliptra FMC ...
2,760,822 UART:
2,760,965 UART: [state] CFI Enabled
2,771,653 UART: [fht] FMC Alias Private Key: 7
2,890,613 UART: [art] Extend RT PCRs Done
2,891,041 UART: [art] Lock RT PCRs Done
2,892,961 UART: [art] Populate DV Done
2,901,142 UART: [fht] FMC Alias Private Key: 7
2,902,088 UART: [art] Derive CDI
2,902,368 UART: [art] Store in slot 0x4
2,988,037 UART: [art] Derive Key Pair
2,988,397 UART: [art] Store priv key in slot 0x5
3,001,039 UART: [art] Derive Key Pair - Done
3,015,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,310 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,075 UART: [art] PUB.X = 1EAF8F3BF0237B82E75B102B7446C63ECE9613B106A42939E61278EF1CF9CACA882AD0736BF9357F462207515994C048
3,038,839 UART: [art] PUB.Y = 357451F6D7BDD7A188690B1B82BA85CEE38D6AFA5995783B55D015BFF55CCC02E5D98E9E4845435F26F95E9325F74D1C
3,045,791 UART: [art] SIG.R = C88952417ADDC3E6887220495211B903B55307DB33FAA82A0A617491C3593489C73E8CB19963C005D0BFEB2A0906FF98
3,052,539 UART: [art] SIG.S = 79BDC93BFC36D79CC40887EBF56C231AEBB08BDA419F226461F9761B5B709C23A42877566296C35380367DBDBA1073D8
3,076,194 UART: Caliptra RT
3,076,537 UART: [state] CFI Enabled
3,197,094 UART: [rt] RT listening for mailbox commands...
3,197,764 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,590 UART: [rt]cmd =0x4c444556, len=4
3,238,136 >>> mbox cmd response data (687 bytes)
3,238,137 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,444 UART: [rt]cmd =0x43455246, len=4
3,279,411 >>> mbox cmd response data (888 bytes)
3,279,412 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,527 UART: [rt]cmd =0x43455252, len=4
3,319,362 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,699,833 >>> mbox cmd response: success
2,762,238 UART:
2,762,254 UART: Running Caliptra FMC ...
2,762,662 UART:
2,762,805 UART: [state] CFI Enabled
2,773,593 UART: [fht] FMC Alias Private Key: 7
2,892,471 UART: [art] Extend RT PCRs Done
2,892,899 UART: [art] Lock RT PCRs Done
2,894,477 UART: [art] Populate DV Done
2,902,744 UART: [fht] FMC Alias Private Key: 7
2,903,828 UART: [art] Derive CDI
2,904,108 UART: [art] Store in slot 0x4
2,990,065 UART: [art] Derive Key Pair
2,990,425 UART: [art] Store priv key in slot 0x5
3,004,273 UART: [art] Derive Key Pair - Done
3,018,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,034,405 UART: [art] Erasing AUTHORITY.KEYID = 7
3,035,170 UART: [art] PUB.X = 2965D96D5F36754B12C3487228CEDFCD234DF5264C43F739495B9A0A0ACEBC9E63D1A5AC74017E75C2325ABAF6A85AEA
3,041,945 UART: [art] PUB.Y = 36B63AA5B7C17B2B9A62A93BBA3031DCF7E1B0EDCF4CD16407A85F6599C46817114C8423A9B148D455454564156BBE0B
3,048,895 UART: [art] SIG.R = 87AC1A29F7F970887AE8B58335032BAE4E60C3053704259E9511298E7A0F56E480F564DBF9A869A89178AF2BE0FEAEF1
3,055,657 UART: [art] SIG.S = 3DE5DDFB9C6E009A334C27C0526D29EF05A84B84A59CE2FFF2B67262CFCEA9F5A704996533145A4F7EEF945F838B3093
3,080,197 UART: Caliptra RT
3,080,540 UART: [state] CFI Enabled
3,200,543 UART: [rt] RT listening for mailbox commands...
3,201,213 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,231,261 UART: [rt]cmd =0x4c444556, len=4
3,241,665 >>> mbox cmd response data (687 bytes)
3,241,666 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,270,917 UART: [rt]cmd =0x43455246, len=4
3,282,818 >>> mbox cmd response data (888 bytes)
3,282,819 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,312,068 UART: [rt]cmd =0x43455252, len=4
3,322,827 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 989.26s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,025 UART: [idev] --
1,301,042 UART: [ldev] ++
1,301,210 UART: [ldev] CDI.KEYID = 6
1,301,574 UART: [ldev] SUBJECT.KEYID = 5
1,302,001 UART: [ldev] AUTHORITY.KEYID = 7
1,302,464 UART: [ldev] FE.KEYID = 1
1,307,544 UART: [ldev] Erasing FE.KEYID = 1
1,333,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,094 UART: [ldev] --
1,372,437 UART: [fwproc] Wait for Commands...
1,373,012 UART: [fwproc] Recv command 0x46574c44
1,373,745 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,219 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,394 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,751 >>> mbox cmd response: success
2,918,893 UART: [afmc] ++
2,919,061 UART: [afmc] CDI.KEYID = 6
2,919,424 UART: [afmc] SUBJECT.KEYID = 7
2,919,850 UART: [afmc] AUTHORITY.KEYID = 5
2,955,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,972,651 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,361 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,242 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,943 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,668 UART: [afmc] --
2,998,693 UART: [cold-reset] --
2,999,573 UART: [state] Locking Datavault
3,000,714 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,318 UART: [state] Locking ICCM
3,001,770 UART: [exit] Launching FMC @ 0x40000130
3,007,100 UART:
3,007,116 UART: Running Caliptra FMC ...
3,007,524 UART:
3,007,578 UART: [state] CFI Enabled
3,018,134 UART: [fht] FMC Alias Private Key: 7
3,136,916 UART: [art] Extend RT PCRs Done
3,137,344 UART: [art] Lock RT PCRs Done
3,138,936 UART: [art] Populate DV Done
3,147,111 UART: [fht] FMC Alias Private Key: 7
3,148,199 UART: [art] Derive CDI
3,148,479 UART: [art] Store in slot 0x4
3,234,180 UART: [art] Derive Key Pair
3,234,540 UART: [art] Store priv key in slot 0x5
3,247,956 UART: [art] Derive Key Pair - Done
3,262,936 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,374 UART: [art] PUB.X = 54798D471953AFB48E27C10BE3231B03708A17D6579414B95FC35531D65D8131EE01DBFCDAB5BA6BD939E9F7B3BED72C
3,286,145 UART: [art] PUB.Y = 6E1FF1BD76C15E0971EF78B259E55565FA3E24F666D059D94409A0D0176D6BF92DD8C85C95F642C24C88E3459F5B6AA6
3,293,095 UART: [art] SIG.R = 41D36FC942B3E0BB72EF2CFF6F07FC4C27B89B539DD68F82CE6BBC280ABDBABE490CCA97AB5A2926C41F2AAF3677212B
3,299,884 UART: [art] SIG.S = B084F056B6B85B1FE1908638F770F057E9C33CDC76753649C0A3A929A77059621DA99C8E70D7E5688C9ED2C2521FF567
3,323,492 UART: Caliptra RT
3,323,743 UART: [state] CFI Enabled
3,443,986 UART: [rt] RT listening for mailbox commands...
3,444,656 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,406 UART: [rt]cmd =0x4c444556, len=4
3,484,938 >>> mbox cmd response data (687 bytes)
3,484,939 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,098 UART: [rt]cmd =0x43455246, len=4
3,526,197 >>> mbox cmd response data (888 bytes)
3,526,198 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,555,443 UART: [rt]cmd =0x43455252, len=4
3,566,318 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,538 UART: [kat] SHA2-256
901,478 UART: [kat] SHA2-384
904,207 UART: [kat] SHA2-512-ACC
906,108 UART: [kat] ECC-384
915,221 UART: [kat] HMAC-384Kdf
919,783 UART: [kat] LMS
1,168,095 UART: [kat] --
1,169,092 UART: [cold-reset] ++
1,169,520 UART: [fht] FHT @ 0x50003400
1,172,232 UART: [idev] ++
1,172,400 UART: [idev] CDI.KEYID = 6
1,172,761 UART: [idev] SUBJECT.KEYID = 7
1,173,186 UART: [idev] UDS.KEYID = 0
1,181,103 UART: [idev] Erasing UDS.KEYID = 0
1,197,939 UART: [idev] Sha1 KeyId Algorithm
1,207,739 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,803 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,511 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,396 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,102 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,531 UART: [idev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
1,298,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,909 UART: [idev] --
1,300,004 UART: [ldev] ++
1,300,172 UART: [ldev] CDI.KEYID = 6
1,300,536 UART: [ldev] SUBJECT.KEYID = 5
1,300,963 UART: [ldev] AUTHORITY.KEYID = 7
1,301,426 UART: [ldev] FE.KEYID = 1
1,306,142 UART: [ldev] Erasing FE.KEYID = 1
1,332,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,286 UART: [ldev] --
1,371,659 UART: [fwproc] Wait for Commands...
1,372,270 UART: [fwproc] Recv command 0x46574c44
1,373,003 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,744,839 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,014 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,916,211 >>> mbox cmd response: success
2,917,373 UART: [afmc] ++
2,917,541 UART: [afmc] CDI.KEYID = 6
2,917,904 UART: [afmc] SUBJECT.KEYID = 7
2,918,330 UART: [afmc] AUTHORITY.KEYID = 5
2,953,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,079 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,789 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,670 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,371 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,170 UART: [afmc] --
2,997,059 UART: [cold-reset] --
2,997,737 UART: [state] Locking Datavault
2,998,926 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,530 UART: [state] Locking ICCM
3,000,048 UART: [exit] Launching FMC @ 0x40000130
3,005,378 UART:
3,005,394 UART: Running Caliptra FMC ...
3,005,802 UART:
3,005,856 UART: [state] CFI Enabled
3,016,778 UART: [fht] FMC Alias Private Key: 7
3,135,450 UART: [art] Extend RT PCRs Done
3,135,878 UART: [art] Lock RT PCRs Done
3,137,498 UART: [art] Populate DV Done
3,145,829 UART: [fht] FMC Alias Private Key: 7
3,146,941 UART: [art] Derive CDI
3,147,221 UART: [art] Store in slot 0x4
3,232,508 UART: [art] Derive Key Pair
3,232,868 UART: [art] Store priv key in slot 0x5
3,246,180 UART: [art] Derive Key Pair - Done
3,261,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,276,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,296 UART: [art] PUB.X = E29B073781E30DE4059BA62A83EE37839A96B970BA0B841DF7EDAB15D25388DD987B79674D5F5723D50065DE2FF78E1F
3,284,038 UART: [art] PUB.Y = 3E7D70AC1038AAA576780B0038C19D1030A4467BB5161DA689511AF1B19EEF230E2E0F0EF838A4D4EB0046C46BB7C54F
3,290,940 UART: [art] SIG.R = E1796AF971083E65B29ECDEB0999AF282931379E7F7170F78D111FE964754FEE157FF1C2558E5628160C2B39ABF22809
3,297,696 UART: [art] SIG.S = 94649050C9426E146634328562BC200A1B65C5BE4992FF2F32993056D0107264C29FE9591A8193E506C1FDCBFFACA8BF
3,321,746 UART: Caliptra RT
3,321,997 UART: [state] CFI Enabled
3,442,003 UART: [rt] RT listening for mailbox commands...
3,442,673 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,661 UART: [rt]cmd =0x4c444556, len=4
3,482,993 >>> mbox cmd response data (687 bytes)
3,482,994 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,199 UART: [rt]cmd =0x43455246, len=4
3,524,336 >>> mbox cmd response data (888 bytes)
3,524,337 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,496 UART: [rt]cmd =0x43455252, len=4
3,564,274 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1007.63s
Truncated 2533977 bytes from beginning
2,757,931 UART: Running Caliptra FMC ...
2,758,339 UART:
2,758,393 UART: [state] CFI Enabled
2,768,449 UART: [fht] FMC Alias Private Key: 7
2,886,971 UART: [art] Extend RT PCRs Done
2,887,399 UART: [art] Lock RT PCRs Done
2,889,053 UART: [art] Populate DV Done
2,897,284 UART: [fht] FMC Alias Private Key: 7
2,898,398 UART: [art] Derive CDI
2,898,678 UART: [art] Store in slot 0x4
2,984,367 UART: [art] Derive Key Pair
2,984,727 UART: [art] Store priv key in slot 0x5
2,997,725 UART: [art] Derive Key Pair - Done
3,012,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,145 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,910 UART: [art] PUB.X = D3DE5898A3DAE4CF0F63D1E14DD4C9ED031D1AA39017384DD4C840933FB10C2773B256E6B5E6936DB121C365CDDD0C15
3,035,682 UART: [art] PUB.Y = 0770DA53EC2D8E623C8C5A35F8B4C144FD5CD2765DD33861FC75B9A54DFFE1F3588BA8CF90EFD1D79EA28B5AC06D1710
3,042,649 UART: [art] SIG.R = FC4112F614B0F69EADEC24036D8E3BE3A1944780E32014B1E2FF85688A57752ECFF38292C33681D461BA8DEB28541615
3,049,418 UART: [art] SIG.S = C456EEBF76C177C4EBAC3E76E18F3F1588EAB02433B35E373AFA9652878961B7BF6EA75EB708F2A9DBF4CC3A9AA3F4BE
3,073,125 UART: Caliptra RT
3,073,376 UART: [state] CFI Enabled
3,191,784 UART: [rt] RT listening for mailbox commands...
3,192,454 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,118 UART: [rt]cmd =0x4c444556, len=4
3,232,524 >>> mbox cmd response data (687 bytes)
3,232,525 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,261,738 UART: [rt]cmd =0x43455246, len=4
3,273,639 >>> mbox cmd response data (888 bytes)
3,273,640 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,779 UART: [rt]cmd =0x43455252, len=4
3,313,793 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,712 >>> mbox cmd response: success
2,759,819 UART:
2,759,835 UART: Running Caliptra FMC ...
2,760,243 UART:
2,760,297 UART: [state] CFI Enabled
2,770,891 UART: [fht] FMC Alias Private Key: 7
2,889,507 UART: [art] Extend RT PCRs Done
2,889,935 UART: [art] Lock RT PCRs Done
2,891,275 UART: [art] Populate DV Done
2,899,708 UART: [fht] FMC Alias Private Key: 7
2,900,766 UART: [art] Derive CDI
2,901,046 UART: [art] Store in slot 0x4
2,986,753 UART: [art] Derive Key Pair
2,987,113 UART: [art] Store priv key in slot 0x5
3,000,653 UART: [art] Derive Key Pair - Done
3,015,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,580 UART: [art] PUB.X = D0ECBF231FDF67E5F44BAA426347CD845A8109941FACA6F5295978B91B26DDC76C1E55328A828DF74E8B5CFE966AECCD
3,038,367 UART: [art] PUB.Y = 87CB04C94D6295AD908E9147CC54C6ED511E18D9241EA6FDA647B8FCF8AC473B8260E9FDE408F9AE6EA44E9F87518EA1
3,045,327 UART: [art] SIG.R = E1683C6891D783CABEC0737FCE273E2242F663036FA627C2F658B5894796BF20D21C7D78E2FA49ABD6BC30C81ADE8038
3,052,102 UART: [art] SIG.S = 922C3ADBE9EA6E9F7FAF8DDB419D400B6BD54C3E3D81A53E731ADE86DE280BC2C6600C8BDCBBE784A600A0593B4260C5
3,075,885 UART: Caliptra RT
3,076,136 UART: [state] CFI Enabled
3,195,874 UART: [rt] RT listening for mailbox commands...
3,196,544 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,426 UART: [rt]cmd =0x4c444556, len=4
3,236,944 >>> mbox cmd response data (687 bytes)
3,236,945 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,176 UART: [rt]cmd =0x43455246, len=4
3,278,027 >>> mbox cmd response data (888 bytes)
3,278,028 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,363 UART: [rt]cmd =0x43455252, len=4
3,317,999 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,650 >>> mbox cmd response: success
2,758,359 UART:
2,758,375 UART: Running Caliptra FMC ...
2,758,783 UART:
2,758,837 UART: [state] CFI Enabled
2,769,141 UART: [fht] FMC Alias Private Key: 7
2,887,651 UART: [art] Extend RT PCRs Done
2,888,079 UART: [art] Lock RT PCRs Done
2,889,805 UART: [art] Populate DV Done
2,897,834 UART: [fht] FMC Alias Private Key: 7
2,898,824 UART: [art] Derive CDI
2,899,104 UART: [art] Store in slot 0x4
2,984,877 UART: [art] Derive Key Pair
2,985,237 UART: [art] Store priv key in slot 0x5
2,998,325 UART: [art] Derive Key Pair - Done
3,013,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,832 UART: [art] PUB.X = 2561ED5270BFDA48B113C3412DF0678F8988405186CF9F0EC20A3D1645CC919A9BF21085CF7A07D9A3193935D9C283D5
3,035,593 UART: [art] PUB.Y = 30D7556AE24CEFDC24709B75711A90A58ADE9E9D3C55C6FB1897DDBE35084C03835CE26D349CB665BE8DAA4C865EA111
3,042,551 UART: [art] SIG.R = 38E01FD9F00A75B3433F97601C6413DDBB10972896108F5682B3FC29E7D1669FC5DCF1E61F6F7A84F9793C47DF9CB6B1
3,049,324 UART: [art] SIG.S = 2566A6FB295C97E8E71DA75E11130AF4B597EF6106F5290A0C825E31ECF96AF0C7AA93331E03D96EC860157F8D2A672B
3,073,201 UART: Caliptra RT
3,073,452 UART: [state] CFI Enabled
3,192,908 UART: [rt] RT listening for mailbox commands...
3,193,578 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,422 UART: [rt]cmd =0x4c444556, len=4
3,233,964 >>> mbox cmd response data (687 bytes)
3,233,965 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,324 UART: [rt]cmd =0x43455246, len=4
3,275,257 >>> mbox cmd response data (888 bytes)
3,275,258 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,465 UART: [rt]cmd =0x43455252, len=4
3,315,402 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,830 >>> mbox cmd response: success
2,759,543 UART:
2,759,559 UART: Running Caliptra FMC ...
2,759,967 UART:
2,760,021 UART: [state] CFI Enabled
2,770,717 UART: [fht] FMC Alias Private Key: 7
2,889,561 UART: [art] Extend RT PCRs Done
2,889,989 UART: [art] Lock RT PCRs Done
2,891,713 UART: [art] Populate DV Done
2,899,702 UART: [fht] FMC Alias Private Key: 7
2,900,664 UART: [art] Derive CDI
2,900,944 UART: [art] Store in slot 0x4
2,987,241 UART: [art] Derive Key Pair
2,987,601 UART: [art] Store priv key in slot 0x5
3,000,927 UART: [art] Derive Key Pair - Done
3,015,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,717 UART: [art] PUB.X = FC2171F8B784929B33F13243C45030FD5F9B5990449AE76BC4DF9173F43D9EA7B211DEC24D0D52D530AF10B1179E94B3
3,038,488 UART: [art] PUB.Y = 2F15F42AE88CE2562B08502DF29AC9AC2D6248E8DD5D64BD3E15E544C504B3F11B38B95A2A1CBD05E90C35E6BCE4A22B
3,045,444 UART: [art] SIG.R = 38A0ABC56E9C85E1CF1BFC2A511382656959055D43B96103A7672F106FCA118782865876F4FF4F3998608B91A6683296
3,052,198 UART: [art] SIG.S = 2CE37F3CFD4E1D188B45DF8109D837A57AF611D18D31C243CE7B4F2442B302A6C55C18AB689393D3F474FFC7C4B15F8C
3,075,816 UART: Caliptra RT
3,076,067 UART: [state] CFI Enabled
3,195,589 UART: [rt] RT listening for mailbox commands...
3,196,259 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,313 UART: [rt]cmd =0x4c444556, len=4
3,236,687 >>> mbox cmd response data (687 bytes)
3,236,688 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,967 UART: [rt]cmd =0x43455246, len=4
3,277,994 >>> mbox cmd response data (888 bytes)
3,277,995 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,466 UART: [rt]cmd =0x43455252, len=4
3,318,325 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,695,300 >>> mbox cmd response: success
2,756,885 UART:
2,756,901 UART: Running Caliptra FMC ...
2,757,309 UART:
2,757,363 UART: [state] CFI Enabled
2,767,925 UART: [fht] FMC Alias Private Key: 7
2,887,453 UART: [art] Extend RT PCRs Done
2,887,881 UART: [art] Lock RT PCRs Done
2,889,657 UART: [art] Populate DV Done
2,897,990 UART: [fht] FMC Alias Private Key: 7
2,898,936 UART: [art] Derive CDI
2,899,216 UART: [art] Store in slot 0x4
2,985,213 UART: [art] Derive Key Pair
2,985,573 UART: [art] Store priv key in slot 0x5
2,998,937 UART: [art] Derive Key Pair - Done
3,013,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,315 UART: [art] PUB.X = 296DA299C61D2FFD651EFA738CE5B7FA1836D5685D925BD44D350C44EC99539FF7D7F95464316253FD0BD1D77A67450F
3,037,082 UART: [art] PUB.Y = 8DAE3DB7A541989B75E9580FBA298DA986AF728306EB040F1D1D5A979D83AD9346FCBEB744CB0BCF43F68581913192AB
3,044,029 UART: [art] SIG.R = 7587BBEA19F43BDA24478BF2DBECDDB0BA07C4DDDBEADC4BC6879B9767B87457C6C537E9A1228FF25408F66753DE559F
3,050,815 UART: [art] SIG.S = 32485636172025AE2CD6748FC777F2A4A9CC61C740C5754FD5A4B3BC6A2E135B5AB2CAF6420A371766EBF29B0D2F7703
3,074,634 UART: Caliptra RT
3,074,885 UART: [state] CFI Enabled
3,194,707 UART: [rt] RT listening for mailbox commands...
3,195,377 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,281 UART: [rt]cmd =0x4c444556, len=4
3,235,499 >>> mbox cmd response data (687 bytes)
3,235,500 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,701 UART: [rt]cmd =0x43455246, len=4
3,276,738 >>> mbox cmd response data (888 bytes)
3,276,739 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,064 UART: [rt]cmd =0x43455252, len=4
3,316,945 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 983.84s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,220 UART: [idev] --
1,300,273 UART: [ldev] ++
1,300,441 UART: [ldev] CDI.KEYID = 6
1,300,805 UART: [ldev] SUBJECT.KEYID = 5
1,301,232 UART: [ldev] AUTHORITY.KEYID = 7
1,301,695 UART: [ldev] FE.KEYID = 1
1,307,075 UART: [ldev] Erasing FE.KEYID = 1
1,333,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,047 UART: [ldev] --
1,373,414 UART: [fwproc] Wait for Commands...
1,374,031 UART: [fwproc] Recv command 0x46574c44
1,374,764 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,868 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,778,043 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,918,310 >>> mbox cmd response: success
2,919,542 UART: [afmc] ++
2,919,710 UART: [afmc] CDI.KEYID = 6
2,920,073 UART: [afmc] SUBJECT.KEYID = 7
2,920,499 UART: [afmc] AUTHORITY.KEYID = 5
2,956,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,036 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,746 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,627 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,328 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,081 UART: [afmc] --
2,999,064 UART: [cold-reset] --
3,000,088 UART: [state] Locking Datavault
3,001,233 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,837 UART: [state] Locking ICCM
3,002,259 UART: [exit] Launching FMC @ 0x40000130
3,007,589 UART:
3,007,605 UART: Running Caliptra FMC ...
3,008,013 UART:
3,008,156 UART: [state] CFI Enabled
3,018,840 UART: [fht] FMC Alias Private Key: 7
3,137,480 UART: [art] Extend RT PCRs Done
3,137,908 UART: [art] Lock RT PCRs Done
3,139,412 UART: [art] Populate DV Done
3,147,927 UART: [fht] FMC Alias Private Key: 7
3,148,963 UART: [art] Derive CDI
3,149,243 UART: [art] Store in slot 0x4
3,235,146 UART: [art] Derive Key Pair
3,235,506 UART: [art] Store priv key in slot 0x5
3,248,868 UART: [art] Derive Key Pair - Done
3,264,022 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,279,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,280,300 UART: [art] PUB.X = 465FE25F72C0D10A1FE86B5FFD2C03EA7F8AFEB64AFED8D48A6B815917735F02B2143B6C54BA51925F7A8DAA9381A25B
3,287,079 UART: [art] PUB.Y = 5B11731DDA4824D4F3B9C4813ACF28BAF33A827ACFC03F1E32E50B7EAA5AB433C6FFFFE6B3FF1A0956C945E7E8986129
3,294,043 UART: [art] SIG.R = CD463C71DB8D0049BC11E590D8B9EC2B7A635FAC18B2AB8FB86D7CD190CD745E8952CE14A8BB3476946C90FBD80DA753
3,300,806 UART: [art] SIG.S = 122D6F6D7456B12CD79BCF32B88D72E638FB45B7A85F606594CFC94DAB3A71388020B2148D9967F65D03C01842E839B2
3,324,375 UART: Caliptra RT
3,324,718 UART: [state] CFI Enabled
3,443,959 UART: [rt] RT listening for mailbox commands...
3,444,629 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,431 UART: [rt]cmd =0x4c444556, len=4
3,484,939 >>> mbox cmd response data (687 bytes)
3,484,940 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,305 UART: [rt]cmd =0x43455246, len=4
3,526,234 >>> mbox cmd response data (888 bytes)
3,526,235 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,555,906 UART: [rt]cmd =0x43455252, len=4
3,566,615 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,729 UART: [kat] ++
895,881 UART: [kat] sha1
900,201 UART: [kat] SHA2-256
902,141 UART: [kat] SHA2-384
904,910 UART: [kat] SHA2-512-ACC
906,811 UART: [kat] ECC-384
916,426 UART: [kat] HMAC-384Kdf
921,182 UART: [kat] LMS
1,169,494 UART: [kat] --
1,170,381 UART: [cold-reset] ++
1,170,827 UART: [fht] FHT @ 0x50003400
1,173,551 UART: [idev] ++
1,173,719 UART: [idev] CDI.KEYID = 6
1,174,080 UART: [idev] SUBJECT.KEYID = 7
1,174,505 UART: [idev] UDS.KEYID = 0
1,182,510 UART: [idev] Erasing UDS.KEYID = 0
1,200,172 UART: [idev] Sha1 KeyId Algorithm
1,209,960 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,816 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,524 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,409 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,115 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,544 UART: [idev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
1,300,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,922 UART: [idev] --
1,301,959 UART: [ldev] ++
1,302,127 UART: [ldev] CDI.KEYID = 6
1,302,491 UART: [ldev] SUBJECT.KEYID = 5
1,302,918 UART: [ldev] AUTHORITY.KEYID = 7
1,303,381 UART: [ldev] FE.KEYID = 1
1,308,873 UART: [ldev] Erasing FE.KEYID = 1
1,335,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,141 UART: [ldev] --
1,374,344 UART: [fwproc] Wait for Commands...
1,375,073 UART: [fwproc] Recv command 0x46574c44
1,375,806 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,368 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,543 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,950 >>> mbox cmd response: success
2,918,998 UART: [afmc] ++
2,919,166 UART: [afmc] CDI.KEYID = 6
2,919,529 UART: [afmc] SUBJECT.KEYID = 7
2,919,955 UART: [afmc] AUTHORITY.KEYID = 5
2,955,962 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,092 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,802 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,683 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,384 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,191 UART: [afmc] --
2,999,220 UART: [cold-reset] --
2,999,972 UART: [state] Locking Datavault
3,001,181 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,785 UART: [state] Locking ICCM
3,002,333 UART: [exit] Launching FMC @ 0x40000130
3,007,663 UART:
3,007,679 UART: Running Caliptra FMC ...
3,008,087 UART:
3,008,230 UART: [state] CFI Enabled
3,018,838 UART: [fht] FMC Alias Private Key: 7
3,137,992 UART: [art] Extend RT PCRs Done
3,138,420 UART: [art] Lock RT PCRs Done
3,139,834 UART: [art] Populate DV Done
3,148,071 UART: [fht] FMC Alias Private Key: 7
3,149,053 UART: [art] Derive CDI
3,149,333 UART: [art] Store in slot 0x4
3,235,122 UART: [art] Derive Key Pair
3,235,482 UART: [art] Store priv key in slot 0x5
3,248,726 UART: [art] Derive Key Pair - Done
3,263,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,279,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,280,179 UART: [art] PUB.X = 86B22DDF8F91E44D7383ED4477A38EB932D818721685A3AEAAE2777CD7DBC64ECB60404B78EFEE0E0B6A3BF6E6BC9046
3,286,961 UART: [art] PUB.Y = 25B9D44DFC6BA5DF1DBABDD59F0256362B6CCBBBB54A7EDF1CF5BD74EDD0CD8FE56BCCBC98B7B0E24C45544E023D4344
3,293,941 UART: [art] SIG.R = 0D23AFAA8A8EE835F9D113F031F86173915874C0ACBB41B699599FC13FA2403BC331DA7F5F49A3AB849A8AB0A4EF224A
3,300,722 UART: [art] SIG.S = E336CEF96BE4ACD1EF94E80F4AA3153B03761A3D14A81CC3251A637D51974C3C15F51A2B95B7D4AFD49E1EC74DFACB81
3,324,036 UART: Caliptra RT
3,324,379 UART: [state] CFI Enabled
3,444,790 UART: [rt] RT listening for mailbox commands...
3,445,460 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,174 UART: [rt]cmd =0x4c444556, len=4
3,485,718 >>> mbox cmd response data (687 bytes)
3,485,719 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,982 UART: [rt]cmd =0x43455246, len=4
3,527,191 >>> mbox cmd response data (888 bytes)
3,527,192 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,556,599 UART: [rt]cmd =0x43455252, len=4
3,567,450 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1022.88s
Truncated 2533977 bytes from beginning
2,761,534 UART: Running Caliptra FMC ...
2,761,942 UART:
2,762,085 UART: [state] CFI Enabled
2,772,623 UART: [fht] FMC Alias Private Key: 7
2,891,891 UART: [art] Extend RT PCRs Done
2,892,319 UART: [art] Lock RT PCRs Done
2,893,871 UART: [art] Populate DV Done
2,901,736 UART: [fht] FMC Alias Private Key: 7
2,902,870 UART: [art] Derive CDI
2,903,150 UART: [art] Store in slot 0x4
2,988,601 UART: [art] Derive Key Pair
2,988,961 UART: [art] Store priv key in slot 0x5
3,001,789 UART: [art] Derive Key Pair - Done
3,016,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,987 UART: [art] PUB.X = 38A3CEBFE7082A7AB624D7641029F8ED16878CBFA687C76997AE65DFDA2DF08D8548933F2863170D89CB4831B133356E
3,039,755 UART: [art] PUB.Y = 94C8C0E711C7443D1F88EE798FEED3C208A60B4271E87CC423A0B727D63860FBBF5A76F206025E62C1EFD104203EA3F1
3,046,698 UART: [art] SIG.R = E662B8E92684994D119AFC7C581457B975B8CCBCF062EEE5EA19B95277C7CCEAD3E043120FC1F9A535D967C800C22DD9
3,053,455 UART: [art] SIG.S = 7097B3CAF0A0141D060D123EBD9864843F1D8BACD909BB0B0F6BDF5CB826E65DC6F12916C58B8009F28FF7E427FCBBF4
3,076,937 UART: Caliptra RT
3,077,280 UART: [state] CFI Enabled
3,197,441 UART: [rt] RT listening for mailbox commands...
3,198,111 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,799 UART: [rt]cmd =0x4c444556, len=4
3,238,335 >>> mbox cmd response data (687 bytes)
3,238,336 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,375 UART: [rt]cmd =0x43455246, len=4
3,279,434 >>> mbox cmd response data (888 bytes)
3,279,435 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,720 UART: [rt]cmd =0x43455252, len=4
3,319,473 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,189 >>> mbox cmd response: success
2,760,236 UART:
2,760,252 UART: Running Caliptra FMC ...
2,760,660 UART:
2,760,803 UART: [state] CFI Enabled
2,771,743 UART: [fht] FMC Alias Private Key: 7
2,890,467 UART: [art] Extend RT PCRs Done
2,890,895 UART: [art] Lock RT PCRs Done
2,892,569 UART: [art] Populate DV Done
2,900,756 UART: [fht] FMC Alias Private Key: 7
2,901,756 UART: [art] Derive CDI
2,902,036 UART: [art] Store in slot 0x4
2,988,165 UART: [art] Derive Key Pair
2,988,525 UART: [art] Store priv key in slot 0x5
3,002,253 UART: [art] Derive Key Pair - Done
3,016,864 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,343 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,108 UART: [art] PUB.X = BBA8ABB1EE71AFBCA40D59C4200DFECC4F1C12EEA3FFF0970EC1C0328D7699ADAA5BB88BF4D6660DEC90BFFF82AA3F24
3,039,906 UART: [art] PUB.Y = C6000262F3CEF939ED941D716563428C60B172671326542A7EFBF4C023F278AE9FFDA2B31241E726E820048A827C341B
3,046,824 UART: [art] SIG.R = 8F8A5C5F5B1A33B2DDD457A0D833A93FFBD78B135F5C966D088B385564B4EBA4533CA30CF979C9906ED7D853A6A86571
3,053,598 UART: [art] SIG.S = CCA5DC0A5C643A602D65709DBDB9AE586EF436ECBE120C1CF96F09F4B8C2332AB1296ECB730090E8ED83B46655719D16
3,077,083 UART: Caliptra RT
3,077,426 UART: [state] CFI Enabled
3,197,590 UART: [rt] RT listening for mailbox commands...
3,198,260 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,652 UART: [rt]cmd =0x4c444556, len=4
3,237,952 >>> mbox cmd response data (687 bytes)
3,237,953 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,218 UART: [rt]cmd =0x43455246, len=4
3,279,265 >>> mbox cmd response data (888 bytes)
3,279,266 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,621 UART: [rt]cmd =0x43455252, len=4
3,319,607 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,327 >>> mbox cmd response: success
2,759,544 UART:
2,759,560 UART: Running Caliptra FMC ...
2,759,968 UART:
2,760,111 UART: [state] CFI Enabled
2,770,611 UART: [fht] FMC Alias Private Key: 7
2,889,407 UART: [art] Extend RT PCRs Done
2,889,835 UART: [art] Lock RT PCRs Done
2,891,705 UART: [art] Populate DV Done
2,899,842 UART: [fht] FMC Alias Private Key: 7
2,900,958 UART: [art] Derive CDI
2,901,238 UART: [art] Store in slot 0x4
2,987,561 UART: [art] Derive Key Pair
2,987,921 UART: [art] Store priv key in slot 0x5
3,000,825 UART: [art] Derive Key Pair - Done
3,015,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,312 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,077 UART: [art] PUB.X = 972720FACEFF0171B27858A418074166E530687CD85AB77A4DF2FF79B9A2EEA58481BD7C14B84BE2803A04092C96BCA9
3,038,841 UART: [art] PUB.Y = D7062498A6F84066445865EB8A2DCCF02ACD5A8F8314A275375BA4BC9CEF57AEDCC86E4F71790A8CA67037DCEDD6C9FD
3,045,805 UART: [art] SIG.R = F39D326B88455F977F749CF90C5C368D3167291AC1EC80457771DF3D318D064D293DD10EF846A002E97DEF6919613219
3,052,557 UART: [art] SIG.S = D700B9D0E8B0CA4161E3CD864361DCFC9A2F6ADBDAA661321F2F5FAAC27B5F7DE66039908D8969910976684656C4749F
3,076,116 UART: Caliptra RT
3,076,459 UART: [state] CFI Enabled
3,196,785 UART: [rt] RT listening for mailbox commands...
3,197,455 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,363 UART: [rt]cmd =0x4c444556, len=4
3,237,843 >>> mbox cmd response data (687 bytes)
3,237,844 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,003 UART: [rt]cmd =0x43455246, len=4
3,279,096 >>> mbox cmd response data (888 bytes)
3,279,097 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,476 UART: [rt]cmd =0x43455252, len=4
3,319,050 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,989 >>> mbox cmd response: success
2,759,226 UART:
2,759,242 UART: Running Caliptra FMC ...
2,759,650 UART:
2,759,793 UART: [state] CFI Enabled
2,770,333 UART: [fht] FMC Alias Private Key: 7
2,890,153 UART: [art] Extend RT PCRs Done
2,890,581 UART: [art] Lock RT PCRs Done
2,892,041 UART: [art] Populate DV Done
2,900,438 UART: [fht] FMC Alias Private Key: 7
2,901,564 UART: [art] Derive CDI
2,901,844 UART: [art] Store in slot 0x4
2,987,759 UART: [art] Derive Key Pair
2,988,119 UART: [art] Store priv key in slot 0x5
3,000,877 UART: [art] Derive Key Pair - Done
3,015,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,670 UART: [art] PUB.X = 95B8DDEC80E0DAC09455A0F03F3A78ACAC2E3DF87ADAB59F621D0465C8096A82238202EBEAC1CD1BE9F4578B69BD63D7
3,038,453 UART: [art] PUB.Y = EC9D1B45EB343A3F8AA173B070A9AA403D30C037F54C7B43A04F5E9872EC8E86660DD3CE3882B4A7FF621EA9D846974D
3,045,412 UART: [art] SIG.R = C7048E03A24EA85DDAC3E255E59B0E2B32D642307FD54077CF5535BF4E646D799225F4F603508154CC6E86CEC53C659A
3,052,174 UART: [art] SIG.S = 951551E9DBC9DD5B029F62021D5865BC5B9A52193F8504E91078ADC7DFDB276124A464E3C3AF9C5AB3D02403F4E7AB6B
3,076,486 UART: Caliptra RT
3,076,829 UART: [state] CFI Enabled
3,196,761 UART: [rt] RT listening for mailbox commands...
3,197,431 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,239 UART: [rt]cmd =0x4c444556, len=4
3,237,699 >>> mbox cmd response data (687 bytes)
3,237,700 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,097 UART: [rt]cmd =0x43455246, len=4
3,279,204 >>> mbox cmd response data (888 bytes)
3,279,205 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,598 UART: [rt]cmd =0x43455252, len=4
3,319,454 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,112,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,485 >>> mbox cmd response: success
2,760,902 UART:
2,760,918 UART: Running Caliptra FMC ...
2,761,326 UART:
2,761,469 UART: [state] CFI Enabled
2,772,115 UART: [fht] FMC Alias Private Key: 7
2,890,611 UART: [art] Extend RT PCRs Done
2,891,039 UART: [art] Lock RT PCRs Done
2,892,549 UART: [art] Populate DV Done
2,900,906 UART: [fht] FMC Alias Private Key: 7
2,901,902 UART: [art] Derive CDI
2,902,182 UART: [art] Store in slot 0x4
2,988,379 UART: [art] Derive Key Pair
2,988,739 UART: [art] Store priv key in slot 0x5
3,002,107 UART: [art] Derive Key Pair - Done
3,016,766 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,504 UART: [art] PUB.X = BC7B0DF13016D79F5A5C1319FCD429CF5B11F008013F1B9AD8077509F0D7DE9E27D745116F9AEB0F87A9060B54A8138E
3,040,258 UART: [art] PUB.Y = 2D296057AC3C667B3A4F6C2798178D0B994E70DEAF6F49300F7A4129186DAE1E6E8DEB2FB696F3DFBB799B4192921AD8
3,047,212 UART: [art] SIG.R = 71AD6A80E64EC063318BBCA2ECDDFC328DD996D30A37B4E038F90FF0573116C52F281934B9600B6FC6893785A6CEAAF8
3,053,985 UART: [art] SIG.S = 63E11322D85E99C9B2D2F2CA6979F42442AA47B06989C0585BC0CCA2426A3D27548C7421D431613F913A571C91633236
3,078,031 UART: Caliptra RT
3,078,374 UART: [state] CFI Enabled
3,197,458 UART: [rt] RT listening for mailbox commands...
3,198,128 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,228,200 UART: [rt]cmd =0x4c444556, len=4
3,238,520 >>> mbox cmd response data (687 bytes)
3,238,521 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,944 UART: [rt]cmd =0x43455246, len=4
3,280,009 >>> mbox cmd response data (888 bytes)
3,280,010 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,387 UART: [rt]cmd =0x43455252, len=4
3,320,224 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 990.69s
Truncated 8936 bytes from beginning
B261CF7E12D9247331B63FAD81EB38285EAB96F
18,685,521 UART: [afmc] --
18,689,706 UART: [cold-reset] --
18,694,647 UART: [state] Locking Datavault
18,699,254 UART: [state] Locking PCR0, PCR1 and PCR31
18,701,009 UART: [state] Locking ICCM
18,702,252 UART: [exit] Launching FMC @ 0x40000130
18,710,657 UART:
18,710,934 UART: Running Caliptra FMC ...
18,711,969 UART:
18,712,146 UART: [state] CFI Enabled
18,769,717 UART: [fht] FMC Alias Private Key: 7
20,535,508 UART: [art] Extend RT PCRs Done
20,537,157 UART: [art] Lock RT PCRs Done
20,538,274 UART: [art] Populate DV Done
20,543,766 UART: [fht] FMC Alias Private Key: 7
20,545,360 UART: [art] Derive CDI
20,546,105 UART: [art] Store in slot 0x4
20,602,889 UART: [art] Derive Key Pair
20,603,938 UART: [art] Store priv key in slot 0x5
23,066,524 UART: [art] Derive Key Pair - Done
23,079,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,792,464 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,975 UART: [art] PUB.X = 3876E10031CFEFDDDF379F05182F42BF51EF37241327426D79CB298B5924CF9143BCF565BE92981C516041E0DD784301
24,801,201 UART: [art] PUB.Y = 896C48D9AB97408B503EFA046554246143BA43FFB930FBE3D576FAFB144950E65BC37783E3BD8FA55A684C6E5A123843
24,808,460 UART: [art] SIG.R = A3C7AB45C2ED9A096E4AA89DC499820C046D9D769C30C6B525AD9B479370BAB908435E54159356C1F569E5BB8706DC8F
24,815,864 UART: [art] SIG.S = 634235E7F8CC5B639A1639808E2BE4A8E8BCA8B2020C234C84493B9BF894B6A48AA1F98779ED8D6E95AB1B760C23F0C3
25,794,686 UART: Caliptra RT
25,795,376 UART: [state] CFI Enabled
25,976,557 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
4,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,019 UART:
192,403 UART: Running Caliptra ROM ...
193,492 UART:
193,646 UART: [state] CFI Enabled
262,332 UART: [state] LifecycleState = Unprovisioned
264,294 UART: [state] DebugLocked = No
265,762 UART: [state] WD Timer not started. Device not locked for debugging
269,283 UART: [kat] SHA2-256
448,935 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,723 UART: [kat] ++
460,170 UART: [kat] sha1
471,071 UART: [kat] SHA2-256
473,768 UART: [kat] SHA2-384
478,830 UART: [kat] SHA2-512-ACC
481,172 UART: [kat] ECC-384
2,924,920 UART: [kat] HMAC-384Kdf
2,950,776 UART: [kat] LMS
3,427,226 UART: [kat] --
3,432,893 UART: [cold-reset] ++
3,434,347 UART: [fht] FHT @ 0x50003400
3,446,570 UART: [idev] ++
3,447,195 UART: [idev] CDI.KEYID = 6
3,448,111 UART: [idev] SUBJECT.KEYID = 7
3,449,345 UART: [idev] UDS.KEYID = 0
3,479,865 UART: [idev] Erasing UDS.KEYID = 0
5,964,714 UART: [idev] Sha384 KeyId Algorithm
5,974,344 UART: [idev] --
5,979,120 UART: [ldev] ++
5,979,696 UART: [ldev] CDI.KEYID = 6
5,980,612 UART: [ldev] SUBJECT.KEYID = 5
5,981,833 UART: [ldev] AUTHORITY.KEYID = 7
5,982,999 UART: [ldev] FE.KEYID = 1
6,013,944 UART: [ldev] Erasing FE.KEYID = 1
8,521,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,254,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,270,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,286,449 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,302,113 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,324,034 UART: [ldev] --
10,328,670 UART: [fwproc] Wait for Commands...
10,331,746 UART: [fwproc] Recv command 0x46574c44
10,333,750 UART: [fwproc] Recv'd Img size: 118548 bytes
13,828,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,909,809 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,982,832 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,310,621 >>> mbox cmd response: success
14,314,623 UART: [afmc] ++
14,315,217 UART: [afmc] CDI.KEYID = 6
14,316,133 UART: [afmc] SUBJECT.KEYID = 7
14,317,353 UART: [afmc] AUTHORITY.KEYID = 5
16,848,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,572,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,574,465 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,590,223 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,606,302 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,621,886 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,646,903 UART: [afmc] --
18,651,152 UART: [cold-reset] --
18,653,600 UART: [state] Locking Datavault
18,660,781 UART: [state] Locking PCR0, PCR1 and PCR31
18,662,546 UART: [state] Locking ICCM
18,665,134 UART: [exit] Launching FMC @ 0x40000130
18,673,588 UART:
18,673,827 UART: Running Caliptra FMC ...
18,674,930 UART:
18,675,101 UART: [state] CFI Enabled
18,731,350 UART: [fht] FMC Alias Private Key: 7
20,497,602 UART: [art] Extend RT PCRs Done
20,498,808 UART: [art] Lock RT PCRs Done
20,500,385 UART: [art] Populate DV Done
20,505,587 UART: [fht] FMC Alias Private Key: 7
20,507,292 UART: [art] Derive CDI
20,508,116 UART: [art] Store in slot 0x4
20,565,060 UART: [art] Derive Key Pair
20,566,069 UART: [art] Store priv key in slot 0x5
23,029,321 UART: [art] Derive Key Pair - Done
23,042,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,754,868 UART: [art] Erasing AUTHORITY.KEYID = 7
24,756,373 UART: [art] PUB.X = 0C937E58A82870E258D1628DC1B253B0CF3E225267552D4A39C92F807651ED434A5AA39A23FB7D7008D5ADF3C179A046
24,763,653 UART: [art] PUB.Y = F41FBD16DB354F0CFF2A4C2548905002157D4F7BC2267F4C2396C8D393C441DF864617D1E6DFD0D9E61EF7025A38797C
24,770,877 UART: [art] SIG.R = 49F83506CFFDC69DC4AF9A0AAD731F2EA32DBC942EF82B5F132C728380C11404EA8B7F79BEB54719CAB9821667057E34
24,778,303 UART: [art] SIG.S = 1CAA85BFE471E820787025361FF29FF403D7740C9BBDF009835B25A71F5E480C2DA62268A53512ABEA4CCA997388FA31
25,756,953 UART: Caliptra RT
25,757,659 UART: [state] CFI Enabled
25,937,635 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
5,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,131 UART:
192,487 UART: Running Caliptra ROM ...
193,657 UART:
193,816 UART: [state] CFI Enabled
262,918 UART: [state] LifecycleState = Unprovisioned
264,848 UART: [state] DebugLocked = No
266,129 UART: [state] WD Timer not started. Device not locked for debugging
270,724 UART: [kat] SHA2-256
450,329 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,123 UART: [kat] ++
461,621 UART: [kat] sha1
471,312 UART: [kat] SHA2-256
474,004 UART: [kat] SHA2-384
480,695 UART: [kat] SHA2-512-ACC
483,035 UART: [kat] ECC-384
2,927,542 UART: [kat] HMAC-384Kdf
2,949,998 UART: [kat] LMS
3,426,470 UART: [kat] --
3,431,813 UART: [cold-reset] ++
3,433,372 UART: [fht] FHT @ 0x50003400
3,445,162 UART: [idev] ++
3,445,737 UART: [idev] CDI.KEYID = 6
3,446,710 UART: [idev] SUBJECT.KEYID = 7
3,447,927 UART: [idev] UDS.KEYID = 0
3,479,105 UART: [idev] Erasing UDS.KEYID = 0
5,966,800 UART: [idev] Fuse KeyId
5,971,312 UART: [idev] --
5,975,248 UART: [ldev] ++
5,975,822 UART: [ldev] CDI.KEYID = 6
5,976,792 UART: [ldev] SUBJECT.KEYID = 5
5,977,957 UART: [ldev] AUTHORITY.KEYID = 7
5,979,255 UART: [ldev] FE.KEYID = 1
6,015,221 UART: [ldev] Erasing FE.KEYID = 1
8,519,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,258,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,274,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,289,947 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,305,408 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,326,836 UART: [ldev] --
10,332,327 UART: [fwproc] Wait for Commands...
10,334,508 UART: [fwproc] Recv command 0x46574c44
10,336,504 UART: [fwproc] Recv'd Img size: 118548 bytes
13,814,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,801 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,963,783 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,291,398 >>> mbox cmd response: success
14,294,689 UART: [afmc] ++
14,295,287 UART: [afmc] CDI.KEYID = 6
14,296,205 UART: [afmc] SUBJECT.KEYID = 7
14,297,423 UART: [afmc] AUTHORITY.KEYID = 5
16,832,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,868 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,572,685 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,588,731 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,604,319 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,629,442 UART: [afmc] --
18,634,084 UART: [cold-reset] --
18,638,065 UART: [state] Locking Datavault
18,644,297 UART: [state] Locking PCR0, PCR1 and PCR31
18,646,006 UART: [state] Locking ICCM
18,647,198 UART: [exit] Launching FMC @ 0x40000130
18,655,599 UART:
18,655,842 UART: Running Caliptra FMC ...
18,656,948 UART:
18,657,115 UART: [state] CFI Enabled
18,711,381 UART: [fht] FMC Alias Private Key: 7
20,478,039 UART: [art] Extend RT PCRs Done
20,479,268 UART: [art] Lock RT PCRs Done
20,480,786 UART: [art] Populate DV Done
20,486,147 UART: [fht] FMC Alias Private Key: 7
20,487,690 UART: [art] Derive CDI
20,488,529 UART: [art] Store in slot 0x4
20,544,880 UART: [art] Derive Key Pair
20,545,917 UART: [art] Store priv key in slot 0x5
23,008,551 UART: [art] Derive Key Pair - Done
23,021,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,734,679 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,191 UART: [art] PUB.X = 020B591EF47BE688B0B7BC8D784DBFBCBA80522FBF2FF81A3C6F12BFE4C0CF681C28B302D0C0EB4C8DCA1B3A2683E447
24,743,529 UART: [art] PUB.Y = 3B502FC0BEA72C8D69B1074C943E403FBB733ECB01AF665F005D2B5C9ED82E1BCCC0F703ABD1D4AD2113B7E5FBD94CDA
24,750,802 UART: [art] SIG.R = 2CA6DF8F8AD07A68C8D34D34C733B578FC18AF542E4984A50BAD0B0A3EB66BCA84B0174223C2C089BC6BE3C511482F6D
24,758,182 UART: [art] SIG.S = 8217867F76F539F49F5D396E1D2AC6805D66DBA61E35E1A3BE5EAA0387275DFFF6AD821188944DBD154DBAE2EF461E36
25,737,039 UART: Caliptra RT
25,737,730 UART: [state] CFI Enabled
25,918,630 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 5.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
5,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,231,321 >>> mbox cmd response: success
18,531,991 UART:
18,532,426 UART: Running Caliptra FMC ...
18,533,535 UART:
18,533,701 UART: [state] CFI Enabled
18,597,002 UART: [fht] FMC Alias Private Key: 7
20,363,486 UART: [art] Extend RT PCRs Done
20,364,714 UART: [art] Lock RT PCRs Done
20,366,533 UART: [art] Populate DV Done
20,371,953 UART: [fht] FMC Alias Private Key: 7
20,373,606 UART: [art] Derive CDI
20,374,428 UART: [art] Store in slot 0x4
20,429,718 UART: [art] Derive Key Pair
20,430,791 UART: [art] Store priv key in slot 0x5
22,894,047 UART: [art] Derive Key Pair - Done
22,907,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,620,295 UART: [art] Erasing AUTHORITY.KEYID = 7
24,621,815 UART: [art] PUB.X = 8C54221C98C470872BF501A9681133BA31560DD6092AC2D33F104A8A408BB0B1E7471366BE1AA2B5BB17FD41DB2241CE
24,629,077 UART: [art] PUB.Y = AFFEFA37088E02CC821DED516301A2FA9531ADD302B6CA4C561933F62B8AEF1E88DF75C8385FA946D622AD0F766A13AD
24,636,327 UART: [art] SIG.R = 33AEE64CE96D8D699F585EE0C3B9BBAF0C0D2A4FF9966D7F3071C14E5024E8CDB345605A5B160829921DD94CEE30C3F7
24,643,740 UART: [art] SIG.S = 6D132A406CDA32B81C117F475A293EFF2D907CD4C4F970D3F6ECEF127BF25D1A35C4645355D716D6396BFF822DA0AD79
25,623,418 UART: Caliptra RT
25,624,145 UART: [state] CFI Enabled
25,805,698 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
4,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,200,049 >>> mbox cmd response: success
18,489,672 UART:
18,490,115 UART: Running Caliptra FMC ...
18,491,288 UART:
18,491,451 UART: [state] CFI Enabled
18,557,799 UART: [fht] FMC Alias Private Key: 7
20,324,178 UART: [art] Extend RT PCRs Done
20,325,400 UART: [art] Lock RT PCRs Done
20,327,141 UART: [art] Populate DV Done
20,332,672 UART: [fht] FMC Alias Private Key: 7
20,334,275 UART: [art] Derive CDI
20,335,092 UART: [art] Store in slot 0x4
20,390,957 UART: [art] Derive Key Pair
20,392,008 UART: [art] Store priv key in slot 0x5
22,855,201 UART: [art] Derive Key Pair - Done
22,868,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,580,610 UART: [art] Erasing AUTHORITY.KEYID = 7
24,582,132 UART: [art] PUB.X = 253B891BC0C428DF1C5FFDF1E04246D767082CB5F5E6526C1F3240164A50CA37FA27E9C03F49CD9BD888F51BDC7BB7A9
24,589,409 UART: [art] PUB.Y = BC206602AD27CE09F71BABECC0058503AE4408EA8BF62F09E9DFA8A3454634221C5B5323B34DB9CFC898BFFF13A8B561
24,596,687 UART: [art] SIG.R = 788309ED65B9B9A2C76E87CB70CEB13109E9725A0333877840DA684D9B9B1E6952BE71E312D74102C6CE7E5C622EB1BA
24,604,095 UART: [art] SIG.S = 2B7834160E199FA12B7AA2A12D344E78A370BA9AE86F391C6E487905DF0D1A2413A652D424F549D19B7445B37CBB538B
25,582,996 UART: Caliptra RT
25,583,709 UART: [state] CFI Enabled
25,764,622 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
5,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,217,449 >>> mbox cmd response: success
18,511,632 UART:
18,512,027 UART: Running Caliptra FMC ...
18,513,156 UART:
18,513,312 UART: [state] CFI Enabled
18,582,377 UART: [fht] FMC Alias Private Key: 7
20,347,874 UART: [art] Extend RT PCRs Done
20,349,079 UART: [art] Lock RT PCRs Done
20,350,578 UART: [art] Populate DV Done
20,356,154 UART: [fht] FMC Alias Private Key: 7
20,357,859 UART: [art] Derive CDI
20,358,598 UART: [art] Store in slot 0x4
20,414,633 UART: [art] Derive Key Pair
20,415,677 UART: [art] Store priv key in slot 0x5
22,878,443 UART: [art] Derive Key Pair - Done
22,891,120 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,312 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,814 UART: [art] PUB.X = 3C0130877A3F81F35C5AC31B8066274A0DDF7911797616940475439961D6D0DB6752CAF5DC824181169E465DA4FAAB9B
24,612,037 UART: [art] PUB.Y = 9D8933CE5E70EBF1DDC53B2F63E934D0CE4A289E29134AAE93C1100545A02913BEF0D8DD817E897715375D3FAC41615F
24,619,327 UART: [art] SIG.R = BD138279FB52BB6BC0873713099BF4DAA87FAE3FB2B8DA3B85B913BCE0464A38BD52C94B4BFAD9678CE0B7DB22B0A48C
24,626,738 UART: [art] SIG.S = 0DE60A599263B19DA4D4419231781EDB5D2416B8216A70AF4AC1465C94ECB46444B57414F6EEFC5B26A86CDEBCE3C4FA
25,605,783 UART: Caliptra RT
25,606,496 UART: [state] CFI Enabled
25,787,112 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
4,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,222,809 >>> mbox cmd response: success
18,512,551 UART:
18,512,937 UART: Running Caliptra FMC ...
18,514,156 UART:
18,514,336 UART: [state] CFI Enabled
18,580,864 UART: [fht] FMC Alias Private Key: 7
20,346,881 UART: [art] Extend RT PCRs Done
20,348,108 UART: [art] Lock RT PCRs Done
20,350,172 UART: [art] Populate DV Done
20,355,393 UART: [fht] FMC Alias Private Key: 7
20,357,043 UART: [art] Derive CDI
20,357,870 UART: [art] Store in slot 0x4
20,413,620 UART: [art] Derive Key Pair
20,414,623 UART: [art] Store priv key in slot 0x5
22,877,616 UART: [art] Derive Key Pair - Done
22,890,674 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,384 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,890 UART: [art] PUB.X = EFC6E0C900C4F327399E8530EDD67394583421D2ECDBCF378BEEC88ADD1044AA90EB5D6990201067A375DBE27E9FA720
24,612,162 UART: [art] PUB.Y = 5A80CC96D1FFF59C90E24F05199751B96F318055A1A8531BE9F302E9BA4F5FFCC062F348785C94558073EE5F9F43030B
24,619,394 UART: [art] SIG.R = 6EED1F17E1311A1C8150346DC828FA2A7D583A2C25EF7ECF4683537F227C7E584376A6E7087B0DF6CFEF72ECFFED395A
24,626,804 UART: [art] SIG.S = 354F6753C753B28B3F7A670CBD600C9F10AE60A1DBAFDE0CFF6EA19D5957E2B3BE229D9FF1CCE27F58F4B97BAAA42947
25,606,335 UART: Caliptra RT
25,607,058 UART: [state] CFI Enabled
25,786,399 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 5.60s
Truncated 8936 bytes from beginning
B261CF7E12D9247331B63FAD81EB38285EAB96F
18,848,066 UART: [afmc] --
18,851,034 UART: [cold-reset] --
18,856,466 UART: [state] Locking Datavault
18,861,982 UART: [state] Locking PCR0, PCR1 and PCR31
18,863,737 UART: [state] Locking ICCM
18,865,402 UART: [exit] Launching FMC @ 0x40000130
18,873,848 UART:
18,874,082 UART: Running Caliptra FMC ...
18,875,186 UART:
18,875,345 UART: [state] CFI Enabled
18,882,848 UART: [fht] FMC Alias Private Key: 7
20,649,483 UART: [art] Extend RT PCRs Done
20,650,704 UART: [art] Lock RT PCRs Done
20,652,247 UART: [art] Populate DV Done
20,657,673 UART: [fht] FMC Alias Private Key: 7
20,659,259 UART: [art] Derive CDI
20,660,000 UART: [art] Store in slot 0x4
20,702,592 UART: [art] Derive Key Pair
20,703,632 UART: [art] Store priv key in slot 0x5
23,130,977 UART: [art] Derive Key Pair - Done
23,143,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,850,226 UART: [art] Erasing AUTHORITY.KEYID = 7
24,851,731 UART: [art] PUB.X = FC2D9D7AE7A8DE7CACD9E9F8DAFD99F7943D758F50ACC827CE856BCDED5D5306CF1A7B4F315ADED100256D066AFD0081
24,859,006 UART: [art] PUB.Y = 23E44014B9E52364AE3BF5E27E911C5991A0C83FF6D231611748085060E11877FBFEB97C75FC4530861B9E0D61503412
24,866,219 UART: [art] SIG.R = 4E961518A06752AB4FAE10D6DC6C0BB62C162F2BBB70A89F16AD4F6C9EBF31A88AF188885E50EDFD98657E89AA6DC9CA
24,873,638 UART: [art] SIG.S = 1F03F4B6EC009389DDB25A04D763389112F949D081051996F38DB6DF72B55D133B67AB6A21791716B0E6B105928D402B
25,852,626 UART: Caliptra RT
25,853,315 UART: [state] CFI Enabled
25,986,264 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
5,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,403 UART:
192,774 UART: Running Caliptra ROM ...
194,063 UART:
603,375 UART: [state] CFI Enabled
620,395 UART: [state] LifecycleState = Unprovisioned
622,335 UART: [state] DebugLocked = No
624,090 UART: [state] WD Timer not started. Device not locked for debugging
628,129 UART: [kat] SHA2-256
807,802 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,552 UART: [kat] ++
819,133 UART: [kat] sha1
831,320 UART: [kat] SHA2-256
834,009 UART: [kat] SHA2-384
840,868 UART: [kat] SHA2-512-ACC
843,263 UART: [kat] ECC-384
3,283,265 UART: [kat] HMAC-384Kdf
3,294,272 UART: [kat] LMS
3,770,798 UART: [kat] --
3,776,846 UART: [cold-reset] ++
3,779,099 UART: [fht] FHT @ 0x50003400
3,790,933 UART: [idev] ++
3,791,541 UART: [idev] CDI.KEYID = 6
3,792,422 UART: [idev] SUBJECT.KEYID = 7
3,793,688 UART: [idev] UDS.KEYID = 0
3,811,230 UART: [idev] Erasing UDS.KEYID = 0
6,270,404 UART: [idev] Sha384 KeyId Algorithm
6,279,889 UART: [idev] --
6,285,495 UART: [ldev] ++
6,286,059 UART: [ldev] CDI.KEYID = 6
6,286,943 UART: [ldev] SUBJECT.KEYID = 5
6,288,209 UART: [ldev] AUTHORITY.KEYID = 7
6,289,386 UART: [ldev] FE.KEYID = 1
6,300,690 UART: [ldev] Erasing FE.KEYID = 1
8,778,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,497,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,512,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,528,766 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,544,386 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,566,004 UART: [ldev] --
10,570,732 UART: [fwproc] Wait for Commands...
10,573,959 UART: [fwproc] Recv command 0x46574c44
10,575,940 UART: [fwproc] Recv'd Img size: 118548 bytes
14,061,292 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,473 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,494 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,545,321 >>> mbox cmd response: success
14,549,006 UART: [afmc] ++
14,549,598 UART: [afmc] CDI.KEYID = 6
14,550,559 UART: [afmc] SUBJECT.KEYID = 7
14,551,769 UART: [afmc] AUTHORITY.KEYID = 5
17,055,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,473 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,290 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,364 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,826,988 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,290 UART: [afmc] --
18,854,453 UART: [cold-reset] --
18,859,717 UART: [state] Locking Datavault
18,865,176 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,931 UART: [state] Locking ICCM
18,869,352 UART: [exit] Launching FMC @ 0x40000130
18,877,748 UART:
18,877,980 UART: Running Caliptra FMC ...
18,879,100 UART:
18,879,264 UART: [state] CFI Enabled
18,887,200 UART: [fht] FMC Alias Private Key: 7
20,653,314 UART: [art] Extend RT PCRs Done
20,654,513 UART: [art] Lock RT PCRs Done
20,656,237 UART: [art] Populate DV Done
20,661,535 UART: [fht] FMC Alias Private Key: 7
20,663,234 UART: [art] Derive CDI
20,664,044 UART: [art] Store in slot 0x4
20,706,544 UART: [art] Derive Key Pair
20,707,612 UART: [art] Store priv key in slot 0x5
23,134,364 UART: [art] Derive Key Pair - Done
23,147,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,890 UART: [art] Erasing AUTHORITY.KEYID = 7
24,855,681 UART: [art] PUB.X = 348C57B1B998788DAA9409E9F27C10A6910AFEF55E96EEF9571DE5971E8234C54D0F1D22B79C2C1FEE68C1298815AF0F
24,862,760 UART: [art] PUB.Y = AFCE8C9D667AF2FDA4A0C9D25DE1D0161B1CDDDDBB2082A475F7211B538E8C5079789B5E7133B7317F6557F76C18E493
24,869,951 UART: [art] SIG.R = BB81024858E436DFA9B09847CB07851ECD5C10779285496EBE4CCF83AD826D13516135DFF24CB2A9FEDCA996913A0019
24,877,317 UART: [art] SIG.S = 85F3B819CFFBA0E9D8FF55BF5253637AB4626E025D66A656D61CA02A4F848CBA877CFD4117925B3FA79A640898C190C7
25,855,526 UART: Caliptra RT
25,856,239 UART: [state] CFI Enabled
25,988,703 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
5,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,529 UART:
192,906 UART: Running Caliptra ROM ...
194,023 UART:
603,828 UART: [state] CFI Enabled
617,763 UART: [state] LifecycleState = Unprovisioned
619,663 UART: [state] DebugLocked = No
621,419 UART: [state] WD Timer not started. Device not locked for debugging
624,979 UART: [kat] SHA2-256
804,600 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,399 UART: [kat] ++
815,842 UART: [kat] sha1
826,062 UART: [kat] SHA2-256
829,003 UART: [kat] SHA2-384
835,068 UART: [kat] SHA2-512-ACC
837,423 UART: [kat] ECC-384
3,281,791 UART: [kat] HMAC-384Kdf
3,295,644 UART: [kat] LMS
3,772,167 UART: [kat] --
3,776,206 UART: [cold-reset] ++
3,777,808 UART: [fht] FHT @ 0x50003400
3,789,004 UART: [idev] ++
3,789,612 UART: [idev] CDI.KEYID = 6
3,790,499 UART: [idev] SUBJECT.KEYID = 7
3,791,763 UART: [idev] UDS.KEYID = 0
3,810,036 UART: [idev] Erasing UDS.KEYID = 0
6,271,363 UART: [idev] Fuse KeyId
6,275,921 UART: [idev] --
6,281,627 UART: [ldev] ++
6,282,242 UART: [ldev] CDI.KEYID = 6
6,283,142 UART: [ldev] SUBJECT.KEYID = 5
6,284,352 UART: [ldev] AUTHORITY.KEYID = 7
6,285,638 UART: [ldev] FE.KEYID = 1
6,297,390 UART: [ldev] Erasing FE.KEYID = 1
8,775,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,494,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,509,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,525,869 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,541,300 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,561,396 UART: [ldev] --
10,567,733 UART: [fwproc] Wait for Commands...
10,569,450 UART: [fwproc] Recv command 0x46574c44
10,571,434 UART: [fwproc] Recv'd Img size: 118548 bytes
14,060,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,074 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,085 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,543,048 >>> mbox cmd response: success
14,547,249 UART: [afmc] ++
14,547,830 UART: [afmc] CDI.KEYID = 6
14,548,845 UART: [afmc] SUBJECT.KEYID = 7
14,549,927 UART: [afmc] AUTHORITY.KEYID = 5
17,054,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,775,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,777,586 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,793,404 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,809,476 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,825,045 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,848,926 UART: [afmc] --
18,852,748 UART: [cold-reset] --
18,857,526 UART: [state] Locking Datavault
18,863,145 UART: [state] Locking PCR0, PCR1 and PCR31
18,864,894 UART: [state] Locking ICCM
18,867,088 UART: [exit] Launching FMC @ 0x40000130
18,875,483 UART:
18,875,725 UART: Running Caliptra FMC ...
18,876,823 UART:
18,876,979 UART: [state] CFI Enabled
18,885,074 UART: [fht] FMC Alias Private Key: 7
20,651,389 UART: [art] Extend RT PCRs Done
20,652,607 UART: [art] Lock RT PCRs Done
20,654,202 UART: [art] Populate DV Done
20,659,822 UART: [fht] FMC Alias Private Key: 7
20,661,354 UART: [art] Derive CDI
20,662,083 UART: [art] Store in slot 0x4
20,704,297 UART: [art] Derive Key Pair
20,705,336 UART: [art] Store priv key in slot 0x5
23,131,987 UART: [art] Derive Key Pair - Done
23,144,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,850,816 UART: [art] Erasing AUTHORITY.KEYID = 7
24,852,341 UART: [art] PUB.X = A996D24688DFFD147C933FD745764BF7E530AC2F2675E11DD041E91363F7E385E8FD22075D4132797CC4ACAB64431ECE
24,859,627 UART: [art] PUB.Y = F6C7E2FC8F1736E6C28518AC56D3AA9786E82C8F3D6E8EA58E4B04E01568830F126A2A6A459B99E1E4B7E8BA68F0274D
24,866,884 UART: [art] SIG.R = 240C5C6A6A274ED194348136256EF3CC5F8E2D79D20A7D8EFA493E9527847F6751B06192FA6BCC0527014D0D55A42B6E
24,874,264 UART: [art] SIG.S = 7BADC3E642A1265EE944BB1E2C5B200FBBB20B93195AE29609D2DF1C1EF72B4A019DF541FB5947FE73B77CDFECD04A03
25,852,861 UART: Caliptra RT
25,853,567 UART: [state] CFI Enabled
25,985,889 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 5.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
5,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,960 >>> mbox cmd response: success
18,688,677 UART:
18,689,097 UART: Running Caliptra FMC ...
18,690,239 UART:
18,690,392 UART: [state] CFI Enabled
18,698,167 UART: [fht] FMC Alias Private Key: 7
20,465,488 UART: [art] Extend RT PCRs Done
20,466,710 UART: [art] Lock RT PCRs Done
20,468,519 UART: [art] Populate DV Done
20,473,933 UART: [fht] FMC Alias Private Key: 7
20,475,526 UART: [art] Derive CDI
20,476,338 UART: [art] Store in slot 0x4
20,518,776 UART: [art] Derive Key Pair
20,519,775 UART: [art] Store priv key in slot 0x5
22,946,344 UART: [art] Derive Key Pair - Done
22,959,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,688 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,187 UART: [art] PUB.X = 26B086676B80676B47ABC2BA449543E581F3EA9897CCC4E604E9E187DBA366F56E35DABEF90D7313ACDF8F3572A93C41
24,674,452 UART: [art] PUB.Y = B24A697D5DD61EBCAFBA0E0F7CD6FE3B7F3DCB787BF3F9F18C00E97C2453D1F206C28472EEF746653E28986CB6A57CC4
24,681,725 UART: [art] SIG.R = 7431CA366DDA5321E1797C422A038FB79C3B5BC0B69C64DF7D8F9C7A32093C5494A42F967AE737D525EE46BB215010F2
24,689,088 UART: [art] SIG.S = 00EDFC83C7A08E412DAA0940AD407225218ABEF76804B5994664A57D3F8B072DB47908C6B33B59CB5F89A62C43427AE9
25,668,271 UART: Caliptra RT
25,668,987 UART: [state] CFI Enabled
25,801,781 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
6,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,019 >>> mbox cmd response: success
18,687,273 UART:
18,687,664 UART: Running Caliptra FMC ...
18,688,900 UART:
18,689,070 UART: [state] CFI Enabled
18,696,566 UART: [fht] FMC Alias Private Key: 7
20,462,378 UART: [art] Extend RT PCRs Done
20,463,605 UART: [art] Lock RT PCRs Done
20,465,234 UART: [art] Populate DV Done
20,470,580 UART: [fht] FMC Alias Private Key: 7
20,472,222 UART: [art] Derive CDI
20,473,054 UART: [art] Store in slot 0x4
20,515,766 UART: [art] Derive Key Pair
20,516,813 UART: [art] Store priv key in slot 0x5
22,943,295 UART: [art] Derive Key Pair - Done
22,956,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,662,453 UART: [art] Erasing AUTHORITY.KEYID = 7
24,663,958 UART: [art] PUB.X = 5A7E36A9CCAEDCD4BA1D21C23D205E73F60C8DF63D170BE98055F0F380E1B7DAA32F7FCFE32D2473B065FB5B76666DEE
24,671,273 UART: [art] PUB.Y = 1BCCC015C95DD53EA4FCBE722E2B570342698A01040E44AB954C7DBBEB856C926B04807C821012FB7D1D1D5A8B78A46F
24,678,544 UART: [art] SIG.R = C8B9D5FEE80252809E47C0BC92802472562CAD1C2CEE93FDCC82B93CD5600654B1978E18B86CEA48BCA73CF8C32CC953
24,685,940 UART: [art] SIG.S = 7097674E074FBBA94A979E86CFAFF6B9F15A20AB45F620A9C6FCC92F0DD3BBAB7DA2C33AB8AB7C55232DAD84E04D1E5F
25,665,129 UART: Caliptra RT
25,665,819 UART: [state] CFI Enabled
25,798,764 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
5,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,318 >>> mbox cmd response: success
18,698,939 UART:
18,699,364 UART: Running Caliptra FMC ...
18,700,612 UART:
18,700,779 UART: [state] CFI Enabled
18,708,321 UART: [fht] FMC Alias Private Key: 7
20,474,734 UART: [art] Extend RT PCRs Done
20,475,936 UART: [art] Lock RT PCRs Done
20,477,776 UART: [art] Populate DV Done
20,483,224 UART: [fht] FMC Alias Private Key: 7
20,484,706 UART: [art] Derive CDI
20,485,468 UART: [art] Store in slot 0x4
20,528,006 UART: [art] Derive Key Pair
20,529,007 UART: [art] Store priv key in slot 0x5
22,956,089 UART: [art] Derive Key Pair - Done
22,969,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,068 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,568 UART: [art] PUB.X = 2F86C980001D1F1963C7ED6C54274E8E3B64842078B7258C179C97E4C0D14B4A5F2AB2FEDE47C7CABA91F4211050DC55
24,683,849 UART: [art] PUB.Y = 31C71C252736B9C1D7D5C1A034D735B772990BF2370E6D5CC200DF4D45E52AF65E78364B8557586D68F615F0FA946509
24,691,057 UART: [art] SIG.R = 63A647B084AC069F3BF64E47C27EBF084F0546819780300D6F4DB53CB55DA076EC9B878B43B63628264E848CFA3D3505
24,698,500 UART: [art] SIG.S = 5C503CFE660B57A8797BCB6C1E381707D445BB82DA4184D832443C4E3255B54EA5732CACAB4254633C6994F0444488A4
25,676,959 UART: Caliptra RT
25,677,661 UART: [state] CFI Enabled
25,810,221 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
5,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,396 >>> mbox cmd response: success
18,687,856 UART:
18,688,243 UART: Running Caliptra FMC ...
18,689,516 UART:
18,689,702 UART: [state] CFI Enabled
18,697,906 UART: [fht] FMC Alias Private Key: 7
20,463,668 UART: [art] Extend RT PCRs Done
20,464,894 UART: [art] Lock RT PCRs Done
20,466,812 UART: [art] Populate DV Done
20,472,059 UART: [fht] FMC Alias Private Key: 7
20,473,716 UART: [art] Derive CDI
20,474,453 UART: [art] Store in slot 0x4
20,517,440 UART: [art] Derive Key Pair
20,518,484 UART: [art] Store priv key in slot 0x5
22,945,637 UART: [art] Derive Key Pair - Done
22,958,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,664,667 UART: [art] Erasing AUTHORITY.KEYID = 7
24,666,174 UART: [art] PUB.X = 809B63F3FA86C8AD780F28DC0BAF9C93159C0DE13E82D4437CF1BFE1D5F5D3190BF6DCEAB241FE81FD8E80BC68C559A6
24,673,481 UART: [art] PUB.Y = 927B2FCC6E300D869927018610AB4596CAB2DB2EF17F7D7CDEC065281B89FD284ED69D0E14479137EC88F19C0164251A
24,680,743 UART: [art] SIG.R = AFB8227857A298A41940433548BF42E224C7DBECCA93CF7E3C75C768EEF62F89C701953A9E53790CE2FDB204DCE0F273
24,688,096 UART: [art] SIG.S = 6187057A061D55BC23B10DE0CBBB3E506D13CB1EEE38FFDE5654A11B6A06DF4DAA3F1C4C00B8F46CCB5D9BCF571B3D1A
25,666,929 UART: Caliptra RT
25,667,632 UART: [state] CFI Enabled
25,800,121 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 5.60s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,893,365 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,901,274 UART: [afmc] --
2,902,137 UART: [cold-reset] --
2,903,015 UART: [state] Locking Datavault
2,904,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,904,738 UART: [state] Locking ICCM
2,905,202 UART: [exit] Launching FMC @ 0x40000130
2,910,532 UART:
2,910,548 UART: Running Caliptra FMC ...
2,910,956 UART:
2,911,010 UART: [state] CFI Enabled
2,921,376 UART: [fht] FMC Alias Private Key: 7
3,040,094 UART: [art] Extend RT PCRs Done
3,040,522 UART: [art] Lock RT PCRs Done
3,042,030 UART: [art] Populate DV Done
3,050,261 UART: [fht] FMC Alias Private Key: 7
3,051,239 UART: [art] Derive CDI
3,051,519 UART: [art] Store in slot 0x4
3,137,105 UART: [art] Derive Key Pair
3,137,465 UART: [art] Store priv key in slot 0x5
3,151,322 UART: [art] Derive Key Pair - Done
3,166,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,182,844 UART: [art] PUB.X = 4FAE20F460D12D1A84B977967939C8BA0D14A2745FCF67A6A3FE3960FEF40B789B2CE07C095D69F3D710AF694E16166F
3,189,613 UART: [art] PUB.Y = 2B99A5940D3C7AB76CD7D83A9E3DA99AEB3CBD05605350299947BB8BC56FAB83E7CF8E5E96FEE61E83C4539F264302E6
3,196,568 UART: [art] SIG.R = 3E50D1EBF5A1BA7CE7E940EE685E0A717B47627528C873E8A2BBABFAC13AC2D172AA1F566E0D2FCBF8DBCFEEB5ABB2AD
3,203,370 UART: [art] SIG.S = 5789D63AA7EC48886A23B3361A309B12B493CBFDBE8DED964D89DC825336AE0A61058BFC09E40F10D4A882B739F4AC46
3,226,988 UART: Caliptra RT
3,227,239 UART: [state] CFI Enabled
3,347,232 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
891,108 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,212 UART: [kat] ++
895,364 UART: [kat] sha1
899,436 UART: [kat] SHA2-256
901,376 UART: [kat] SHA2-384
904,111 UART: [kat] SHA2-512-ACC
906,012 UART: [kat] ECC-384
915,807 UART: [kat] HMAC-384Kdf
920,499 UART: [kat] LMS
1,168,811 UART: [kat] --
1,169,730 UART: [cold-reset] ++
1,170,226 UART: [fht] FHT @ 0x50003400
1,173,042 UART: [idev] ++
1,173,210 UART: [idev] CDI.KEYID = 6
1,173,571 UART: [idev] SUBJECT.KEYID = 7
1,173,996 UART: [idev] UDS.KEYID = 0
1,181,657 UART: [idev] Erasing UDS.KEYID = 0
1,197,970 UART: [idev] Sha384 KeyId Algorithm
1,201,819 UART: [idev] --
1,202,684 UART: [ldev] ++
1,202,852 UART: [ldev] CDI.KEYID = 6
1,203,216 UART: [ldev] SUBJECT.KEYID = 5
1,203,643 UART: [ldev] AUTHORITY.KEYID = 7
1,204,106 UART: [ldev] FE.KEYID = 1
1,209,242 UART: [ldev] Erasing FE.KEYID = 1
1,235,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,250 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,265,972 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,273,042 UART: [ldev] --
1,274,431 UART: [fwproc] Wait for Commands...
1,275,152 UART: [fwproc] Recv command 0x46574c44
1,275,885 UART: [fwproc] Recv'd Img size: 118548 bytes
2,619,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,678,080 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,818,285 >>> mbox cmd response: success
2,819,485 UART: [afmc] ++
2,819,653 UART: [afmc] CDI.KEYID = 6
2,820,016 UART: [afmc] SUBJECT.KEYID = 7
2,820,442 UART: [afmc] AUTHORITY.KEYID = 5
2,855,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,872,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,872,805 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,878,515 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,884,396 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,890,097 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,897,870 UART: [afmc] --
2,898,887 UART: [cold-reset] --
2,899,933 UART: [state] Locking Datavault
2,901,366 UART: [state] Locking PCR0, PCR1 and PCR31
2,901,970 UART: [state] Locking ICCM
2,902,556 UART: [exit] Launching FMC @ 0x40000130
2,907,886 UART:
2,907,902 UART: Running Caliptra FMC ...
2,908,310 UART:
2,908,364 UART: [state] CFI Enabled
2,919,054 UART: [fht] FMC Alias Private Key: 7
3,037,828 UART: [art] Extend RT PCRs Done
3,038,256 UART: [art] Lock RT PCRs Done
3,039,804 UART: [art] Populate DV Done
3,048,195 UART: [fht] FMC Alias Private Key: 7
3,049,151 UART: [art] Derive CDI
3,049,431 UART: [art] Store in slot 0x4
3,135,401 UART: [art] Derive Key Pair
3,135,761 UART: [art] Store priv key in slot 0x5
3,149,224 UART: [art] Derive Key Pair - Done
3,164,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,180,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,180,886 UART: [art] PUB.X = CB258413D1A7587BA5FC24C79FF744B777082AA9F2667E8FB878F54BC96BD6BAC2D6A590C8269DE6AFC5636493AAB38C
3,187,667 UART: [art] PUB.Y = 8538E951C99D346641902984562C1054E94570E44B0EBA545E84101B84D27F89118B6C9A9D5DF0F41F179C187E515EB9
3,194,604 UART: [art] SIG.R = E5A57ECCC16EDECB5E2C9388E74C6167298C8AAE07F701741FBFFCFB186991FC5E9949A0DA646F5000B9A36CD50217CD
3,201,361 UART: [art] SIG.S = 74019C8D650EA3D93054967EC17518AC1BD882F7BCF6E81C8C4CBCE6B334467DF654DD3629AF1EF125111A099BC78703
3,224,825 UART: Caliptra RT
3,225,076 UART: [state] CFI Enabled
3,345,686 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,780 UART: [state] LifecycleState = Unprovisioned
86,435 UART: [state] DebugLocked = No
87,087 UART: [state] WD Timer not started. Device not locked for debugging
88,356 UART: [kat] SHA2-256
891,906 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,010 UART: [kat] ++
896,162 UART: [kat] sha1
900,448 UART: [kat] SHA2-256
902,388 UART: [kat] SHA2-384
905,049 UART: [kat] SHA2-512-ACC
906,950 UART: [kat] ECC-384
916,563 UART: [kat] HMAC-384Kdf
920,979 UART: [kat] LMS
1,169,291 UART: [kat] --
1,170,422 UART: [cold-reset] ++
1,170,808 UART: [fht] FHT @ 0x50003400
1,173,546 UART: [idev] ++
1,173,714 UART: [idev] CDI.KEYID = 6
1,174,075 UART: [idev] SUBJECT.KEYID = 7
1,174,500 UART: [idev] UDS.KEYID = 0
1,182,673 UART: [idev] Erasing UDS.KEYID = 0
1,199,338 UART: [idev] Fuse KeyId
1,200,560 UART: [idev] --
1,201,499 UART: [ldev] ++
1,201,667 UART: [ldev] CDI.KEYID = 6
1,202,031 UART: [ldev] SUBJECT.KEYID = 5
1,202,458 UART: [ldev] AUTHORITY.KEYID = 7
1,202,921 UART: [ldev] FE.KEYID = 1
1,207,945 UART: [ldev] Erasing FE.KEYID = 1
1,235,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,089 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,771 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,770 UART: [ldev] --
1,274,179 UART: [fwproc] Wait for Commands...
1,274,904 UART: [fwproc] Recv command 0x46574c44
1,275,637 UART: [fwproc] Recv'd Img size: 118548 bytes
2,620,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,647,467 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,678,642 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,818,871 >>> mbox cmd response: success
2,819,887 UART: [afmc] ++
2,820,055 UART: [afmc] CDI.KEYID = 6
2,820,418 UART: [afmc] SUBJECT.KEYID = 7
2,820,844 UART: [afmc] AUTHORITY.KEYID = 5
2,856,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,872,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,873,551 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,879,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,885,142 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,890,843 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,898,538 UART: [afmc] --
2,899,543 UART: [cold-reset] --
2,900,361 UART: [state] Locking Datavault
2,901,706 UART: [state] Locking PCR0, PCR1 and PCR31
2,902,310 UART: [state] Locking ICCM
2,902,736 UART: [exit] Launching FMC @ 0x40000130
2,908,066 UART:
2,908,082 UART: Running Caliptra FMC ...
2,908,490 UART:
2,908,544 UART: [state] CFI Enabled
2,919,190 UART: [fht] FMC Alias Private Key: 7
3,038,442 UART: [art] Extend RT PCRs Done
3,038,870 UART: [art] Lock RT PCRs Done
3,040,558 UART: [art] Populate DV Done
3,048,777 UART: [fht] FMC Alias Private Key: 7
3,049,915 UART: [art] Derive CDI
3,050,195 UART: [art] Store in slot 0x4
3,136,027 UART: [art] Derive Key Pair
3,136,387 UART: [art] Store priv key in slot 0x5
3,150,066 UART: [art] Derive Key Pair - Done
3,164,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,180,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,180,942 UART: [art] PUB.X = 9F5BA0883A7FA252C7EE036E079B828AC4D1DBB268657E6F3940DB1A6CC521F64636A559F15E5D385C5713D3E2030CE3
3,187,706 UART: [art] PUB.Y = D5A9E42F6F4BA8FA7996356BEE6656267EB6C29A012875CAF4CEA58E9AC793FC46B2850219EB243CE1BA732E4D0EB70A
3,194,660 UART: [art] SIG.R = 0B270845373D7D24C9F2CFF32F342ABB98B88E93A47D4960D7EFC983E9EDF3786B591D6D069466AFAB5EFD33CE647E9C
3,201,435 UART: [art] SIG.S = 095716890ED2CDFFE2EAED111DF859758639BB4C52F2A70CB09980ED24E40DBEDDBB686743786CED46D4710571575A5E
3,225,274 UART: Caliptra RT
3,225,525 UART: [state] CFI Enabled
3,345,023 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 6.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,552 >>> mbox cmd response: success
2,741,483 UART:
2,741,499 UART: Running Caliptra FMC ...
2,741,907 UART:
2,741,961 UART: [state] CFI Enabled
2,752,269 UART: [fht] FMC Alias Private Key: 7
2,870,897 UART: [art] Extend RT PCRs Done
2,871,325 UART: [art] Lock RT PCRs Done
2,872,721 UART: [art] Populate DV Done
2,881,022 UART: [fht] FMC Alias Private Key: 7
2,882,090 UART: [art] Derive CDI
2,882,370 UART: [art] Store in slot 0x4
2,968,132 UART: [art] Derive Key Pair
2,968,492 UART: [art] Store priv key in slot 0x5
2,981,759 UART: [art] Derive Key Pair - Done
2,996,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,301 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,066 UART: [art] PUB.X = ABF120608D981298C841147FD11B5156DBEF3E26F8ACC5A2FE741E4151C5884AD05E11A8DEDCE3A19C064090EBD449D7
3,019,845 UART: [art] PUB.Y = 307373B8C24D12159EE61BDCF1A9D73321F40D55CF4EB083C094AF458DD361BB6B41D72C6854C711CEBE05E72520F97F
3,026,797 UART: [art] SIG.R = 597C43FA1134B241662B682CA27A8CE875E530E029BAFEBB91EF5B9AABF11BAA8F073DCE55135C97FB5AA84BE04A8B37
3,033,584 UART: [art] SIG.S = 35D17998DDFED9CC6EEE653B3E2ADABE18C395D145D0879CECBE7B93F051FDA0E4541BA05774DC1920A44D7C15D49D8F
3,057,964 UART: Caliptra RT
3,058,215 UART: [state] CFI Enabled
3,177,179 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,348 >>> mbox cmd response: success
2,736,435 UART:
2,736,451 UART: Running Caliptra FMC ...
2,736,859 UART:
2,736,913 UART: [state] CFI Enabled
2,747,117 UART: [fht] FMC Alias Private Key: 7
2,865,947 UART: [art] Extend RT PCRs Done
2,866,375 UART: [art] Lock RT PCRs Done
2,868,049 UART: [art] Populate DV Done
2,876,594 UART: [fht] FMC Alias Private Key: 7
2,877,620 UART: [art] Derive CDI
2,877,900 UART: [art] Store in slot 0x4
2,963,328 UART: [art] Derive Key Pair
2,963,688 UART: [art] Store priv key in slot 0x5
2,977,513 UART: [art] Derive Key Pair - Done
2,992,171 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,500 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,265 UART: [art] PUB.X = B2C8D673BE5E1A7693CDEA870B9333E2F085A2ECEC72A2AA536EA2ADEE1E6672D18C637E50E34B01C0DB317ACAAC3810
3,015,051 UART: [art] PUB.Y = A689DCCA53B6789B5E334AF1934C92D187D4319750D3454EADC97DFC2F388B903BBFF12D4E93465A092B27EF61589737
3,022,002 UART: [art] SIG.R = 8F89DD284450A4701CB2A7C169CD7E06E4E81C6B8B9C6E68B8A20C9B83307E76AC336EA475B70F862198315EF3776603
3,028,760 UART: [art] SIG.S = D923F4A2E160A7F1A15AE469DE36125287FD1F17BF00526AE2CD14F6FABE9270FF9BAE307D55ED5CBC85DDD158F6C6EB
3,052,934 UART: Caliptra RT
3,053,185 UART: [state] CFI Enabled
3,173,403 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,812 >>> mbox cmd response: success
2,735,101 UART:
2,735,117 UART: Running Caliptra FMC ...
2,735,525 UART:
2,735,579 UART: [state] CFI Enabled
2,746,165 UART: [fht] FMC Alias Private Key: 7
2,865,595 UART: [art] Extend RT PCRs Done
2,866,023 UART: [art] Lock RT PCRs Done
2,867,421 UART: [art] Populate DV Done
2,875,206 UART: [fht] FMC Alias Private Key: 7
2,876,164 UART: [art] Derive CDI
2,876,444 UART: [art] Store in slot 0x4
2,962,254 UART: [art] Derive Key Pair
2,962,614 UART: [art] Store priv key in slot 0x5
2,975,569 UART: [art] Derive Key Pair - Done
2,990,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,006,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,006,872 UART: [art] PUB.X = 28243DED68333A016B7A86739BEF7DC4C925FA3ACE01048DB8F60B76D9914857F92C945E09487BA58307B022ABD727D2
3,013,626 UART: [art] PUB.Y = 5C2424119AA8D8CAF8248BC75498894539D1932B217EF9B68EA4B8827F1C1AD58369B5D25A89E1CAC674300C9DE9E0DA
3,020,579 UART: [art] SIG.R = CFD75880FFC2F245D2FB93EE5DD4E8C173534BD1487E582BA95A792A155BDEA34F17A8BC014A57689640F46D694846B8
3,027,354 UART: [art] SIG.S = 4CA5245F86B8DEABC516CB801CD57B0D9AD2176C05FAB0E48C15B16402CD9033FF90F2D08273E9FFE9AE2E8286BED0C5
3,050,867 UART: Caliptra RT
3,051,118 UART: [state] CFI Enabled
3,171,590 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,669,695 >>> mbox cmd response: success
2,731,396 UART:
2,731,412 UART: Running Caliptra FMC ...
2,731,820 UART:
2,731,874 UART: [state] CFI Enabled
2,742,608 UART: [fht] FMC Alias Private Key: 7
2,860,984 UART: [art] Extend RT PCRs Done
2,861,412 UART: [art] Lock RT PCRs Done
2,863,082 UART: [art] Populate DV Done
2,871,115 UART: [fht] FMC Alias Private Key: 7
2,872,141 UART: [art] Derive CDI
2,872,421 UART: [art] Store in slot 0x4
2,958,005 UART: [art] Derive Key Pair
2,958,365 UART: [art] Store priv key in slot 0x5
2,971,478 UART: [art] Derive Key Pair - Done
2,985,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,001,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,002,445 UART: [art] PUB.X = BC78377D6D64671078E73E435B58909CDD95469F03E072CF9180B8749A9B6451270B350A2FCD17028F06A6C21BC733A3
3,009,194 UART: [art] PUB.Y = A51413F6615A6540A5502DD630CABA4AF9CC07E2ABA0E64C158536D640F1EDEC3361A13281EAADD25EC56CEB2496E347
3,016,155 UART: [art] SIG.R = D58817F44A49855F757EAC0EDE2D1E0ACDF9A0B322C08DFF756ED6B7EBCCB05F4DC16AB257A42E7205ADB8A7B03556D1
3,022,940 UART: [art] SIG.S = A25F872383032364764D6EBF20AE5A933C16EA90291ED0ACDD661BFB05D05D8AFE65C987C9715B1D5D9271AE72EA5A40
3,047,718 UART: Caliptra RT
3,047,969 UART: [state] CFI Enabled
3,167,287 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.87s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,895,606 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,533 UART: [afmc] --
2,904,532 UART: [cold-reset] --
2,905,276 UART: [state] Locking Datavault
2,906,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,299 UART: [state] Locking ICCM
2,907,969 UART: [exit] Launching FMC @ 0x40000130
2,913,299 UART:
2,913,315 UART: Running Caliptra FMC ...
2,913,723 UART:
2,913,866 UART: [state] CFI Enabled
2,924,604 UART: [fht] FMC Alias Private Key: 7
3,044,016 UART: [art] Extend RT PCRs Done
3,044,444 UART: [art] Lock RT PCRs Done
3,046,288 UART: [art] Populate DV Done
3,054,389 UART: [fht] FMC Alias Private Key: 7
3,055,503 UART: [art] Derive CDI
3,055,783 UART: [art] Store in slot 0x4
3,141,527 UART: [art] Derive Key Pair
3,141,887 UART: [art] Store priv key in slot 0x5
3,154,936 UART: [art] Derive Key Pair - Done
3,169,818 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,166 UART: [art] PUB.X = E3DCE91ADDFCD86540E045B81F642AF63644C857D5FCAFC4195AAA1715D360127711F4A8A38917772313A31797163AD9
3,192,938 UART: [art] PUB.Y = 2A19D91B9659A10AB756F2EDE5D4662B71F684C890976C50F0C89BB4A9E36EB30F8C16C0941D95194104D8621778D418
3,199,875 UART: [art] SIG.R = BEE8011D441C1161650C220253AB68F8CA49CEC6B75C383C71F289E65BC3C1AA3EDF7B52A2519CCA000114963D5D3DC7
3,206,621 UART: [art] SIG.S = B70E793A5E8634C47FCD67D89CBCDEC93244E78553E2EC35929B0D01C5211D11547801301F65935F9562F9AF21BA35F5
3,230,369 UART: Caliptra RT
3,230,712 UART: [state] CFI Enabled
3,350,322 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
891,423 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,527 UART: [kat] ++
895,679 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,624 UART: [kat] SHA2-512-ACC
906,525 UART: [kat] ECC-384
916,618 UART: [kat] HMAC-384Kdf
921,174 UART: [kat] LMS
1,169,486 UART: [kat] --
1,170,245 UART: [cold-reset] ++
1,170,709 UART: [fht] FHT @ 0x50003400
1,173,575 UART: [idev] ++
1,173,743 UART: [idev] CDI.KEYID = 6
1,174,104 UART: [idev] SUBJECT.KEYID = 7
1,174,529 UART: [idev] UDS.KEYID = 0
1,182,502 UART: [idev] Erasing UDS.KEYID = 0
1,200,185 UART: [idev] Sha384 KeyId Algorithm
1,203,936 UART: [idev] --
1,205,121 UART: [ldev] ++
1,205,289 UART: [ldev] CDI.KEYID = 6
1,205,653 UART: [ldev] SUBJECT.KEYID = 5
1,206,080 UART: [ldev] AUTHORITY.KEYID = 7
1,206,543 UART: [ldev] FE.KEYID = 1
1,211,873 UART: [ldev] Erasing FE.KEYID = 1
1,238,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,257,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,263,557 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,269,279 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,276,267 UART: [ldev] --
1,277,630 UART: [fwproc] Wait for Commands...
1,278,219 UART: [fwproc] Recv command 0x46574c44
1,278,952 UART: [fwproc] Recv'd Img size: 118548 bytes
2,623,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,650,676 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,681,851 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,822,258 >>> mbox cmd response: success
2,823,454 UART: [afmc] ++
2,823,622 UART: [afmc] CDI.KEYID = 6
2,823,985 UART: [afmc] SUBJECT.KEYID = 7
2,824,411 UART: [afmc] AUTHORITY.KEYID = 5
2,859,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,875,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,876,672 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,882,382 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,888,263 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,893,964 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,901,719 UART: [afmc] --
2,902,690 UART: [cold-reset] --
2,903,378 UART: [state] Locking Datavault
2,904,533 UART: [state] Locking PCR0, PCR1 and PCR31
2,905,137 UART: [state] Locking ICCM
2,905,673 UART: [exit] Launching FMC @ 0x40000130
2,911,003 UART:
2,911,019 UART: Running Caliptra FMC ...
2,911,427 UART:
2,911,570 UART: [state] CFI Enabled
2,922,368 UART: [fht] FMC Alias Private Key: 7
3,041,694 UART: [art] Extend RT PCRs Done
3,042,122 UART: [art] Lock RT PCRs Done
3,043,672 UART: [art] Populate DV Done
3,051,901 UART: [fht] FMC Alias Private Key: 7
3,052,959 UART: [art] Derive CDI
3,053,239 UART: [art] Store in slot 0x4
3,139,015 UART: [art] Derive Key Pair
3,139,375 UART: [art] Store priv key in slot 0x5
3,152,716 UART: [art] Derive Key Pair - Done
3,167,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,464 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,229 UART: [art] PUB.X = 65A4E7227F5FA7F938F76DAEAA8EC87134FC07A7DA1BF4F39E2B3A60F661BA1EDC46B43567ED89B534D6150EDF73CC42
3,190,013 UART: [art] PUB.Y = E81B36163B1534729AD5B414B697F1C0C991BF793711A17C78BBFF1C1522FA0DF2114F3CB8768FE16F65FAB3AD5D18EF
3,196,972 UART: [art] SIG.R = 84011576FF528BAD87D825792014A613CAC6C49CF4F7565A79B51CFD334466524C8F497CAB0EC586D6BA52FBFC814BC7
3,203,744 UART: [art] SIG.S = 98580AB8CC70262862062C9E223944DBF37A40AD9CA3173D24D0063282438A97E614CEBA2DED39160806968B587E45ED
3,227,129 UART: Caliptra RT
3,227,472 UART: [state] CFI Enabled
3,349,044 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,347 UART: [kat] SHA2-256
891,897 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,001 UART: [kat] ++
896,153 UART: [kat] sha1
900,375 UART: [kat] SHA2-256
902,315 UART: [kat] SHA2-384
904,942 UART: [kat] SHA2-512-ACC
906,843 UART: [kat] ECC-384
916,490 UART: [kat] HMAC-384Kdf
921,124 UART: [kat] LMS
1,169,436 UART: [kat] --
1,170,241 UART: [cold-reset] ++
1,170,701 UART: [fht] FHT @ 0x50003400
1,173,323 UART: [idev] ++
1,173,491 UART: [idev] CDI.KEYID = 6
1,173,852 UART: [idev] SUBJECT.KEYID = 7
1,174,277 UART: [idev] UDS.KEYID = 0
1,182,468 UART: [idev] Erasing UDS.KEYID = 0
1,200,055 UART: [idev] Fuse KeyId
1,201,277 UART: [idev] --
1,202,400 UART: [ldev] ++
1,202,568 UART: [ldev] CDI.KEYID = 6
1,202,932 UART: [ldev] SUBJECT.KEYID = 5
1,203,359 UART: [ldev] AUTHORITY.KEYID = 7
1,203,822 UART: [ldev] FE.KEYID = 1
1,209,384 UART: [ldev] Erasing FE.KEYID = 1
1,236,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,566 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,267,248 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,274,319 UART: [ldev] --
1,275,666 UART: [fwproc] Wait for Commands...
1,276,439 UART: [fwproc] Recv command 0x46574c44
1,277,172 UART: [fwproc] Recv'd Img size: 118548 bytes
2,621,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,149 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,679,324 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,819,509 >>> mbox cmd response: success
2,820,607 UART: [afmc] ++
2,820,775 UART: [afmc] CDI.KEYID = 6
2,821,138 UART: [afmc] SUBJECT.KEYID = 7
2,821,564 UART: [afmc] AUTHORITY.KEYID = 5
2,856,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,873,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,873,813 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,879,523 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,885,404 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,891,105 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,898,970 UART: [afmc] --
2,899,943 UART: [cold-reset] --
2,900,749 UART: [state] Locking Datavault
2,901,854 UART: [state] Locking PCR0, PCR1 and PCR31
2,902,458 UART: [state] Locking ICCM
2,903,026 UART: [exit] Launching FMC @ 0x40000130
2,908,356 UART:
2,908,372 UART: Running Caliptra FMC ...
2,908,780 UART:
2,908,923 UART: [state] CFI Enabled
2,919,483 UART: [fht] FMC Alias Private Key: 7
3,038,705 UART: [art] Extend RT PCRs Done
3,039,133 UART: [art] Lock RT PCRs Done
3,040,513 UART: [art] Populate DV Done
3,048,914 UART: [fht] FMC Alias Private Key: 7
3,049,942 UART: [art] Derive CDI
3,050,222 UART: [art] Store in slot 0x4
3,136,140 UART: [art] Derive Key Pair
3,136,500 UART: [art] Store priv key in slot 0x5
3,149,769 UART: [art] Derive Key Pair - Done
3,164,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,179,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,180,714 UART: [art] PUB.X = 31AA196A36246B6302CBEB9F2E6BA2D8055668374466EED104402D2F62A60BFF8DFEEAA859B0F344DE61E36C046C3807
3,187,474 UART: [art] PUB.Y = 8B91F70FD4D53C17EB908D71FE467150A8C39DFC0E916CD5EBAB79CBED6201CB7C822AB63D9284B58E36A5F8D164AD24
3,194,433 UART: [art] SIG.R = F46CC940E3214A112216581A8FC30CDD90CD242BF0BDF579FDDE844AC82D54168BB9AC9A9B675BF93D10BD02292EC12E
3,201,213 UART: [art] SIG.S = DF3C413DF48425E654B92DFB8EF67BC6ED482464D9D5B4FF89C5C8F3ECDC08E43B587A57FC96669397C5E0302645DDB7
3,225,380 UART: Caliptra RT
3,225,723 UART: [state] CFI Enabled
3,344,663 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 6.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,755 >>> mbox cmd response: success
2,742,174 UART:
2,742,190 UART: Running Caliptra FMC ...
2,742,598 UART:
2,742,741 UART: [state] CFI Enabled
2,753,463 UART: [fht] FMC Alias Private Key: 7
2,873,209 UART: [art] Extend RT PCRs Done
2,873,637 UART: [art] Lock RT PCRs Done
2,875,117 UART: [art] Populate DV Done
2,883,330 UART: [fht] FMC Alias Private Key: 7
2,884,382 UART: [art] Derive CDI
2,884,662 UART: [art] Store in slot 0x4
2,970,188 UART: [art] Derive Key Pair
2,970,548 UART: [art] Store priv key in slot 0x5
2,984,167 UART: [art] Derive Key Pair - Done
2,999,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,869 UART: [art] PUB.X = 8E119CAF3CEEAA73F18599BC7B0816B6A663B7E988C5287A3C9BBD7F714BDDE38E0083289C35B1827B2B5559FA855AF9
3,022,626 UART: [art] PUB.Y = A071806CB25C07F123C05844358901981360D7BD1244C29C909BA03F355413393CE189400C5B4F7B14C40C7566A80C98
3,029,547 UART: [art] SIG.R = 69504C4693B075CBF326538B720263581228E5750B34BA7B0ECA5C6D7742B1BCB67A38DC8630BF5FB54F88C92ED2C13C
3,036,312 UART: [art] SIG.S = A9B19C79DA529EA4C47EB3377E852C6CA9B8BAA52E641B12E4E8234D072062CDF16B6BE0C55AA4B6574DBC7B0F852613
3,059,938 UART: Caliptra RT
3,060,281 UART: [state] CFI Enabled
3,179,990 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,747 >>> mbox cmd response: success
2,737,362 UART:
2,737,378 UART: Running Caliptra FMC ...
2,737,786 UART:
2,737,929 UART: [state] CFI Enabled
2,748,567 UART: [fht] FMC Alias Private Key: 7
2,867,543 UART: [art] Extend RT PCRs Done
2,867,971 UART: [art] Lock RT PCRs Done
2,869,209 UART: [art] Populate DV Done
2,877,434 UART: [fht] FMC Alias Private Key: 7
2,878,496 UART: [art] Derive CDI
2,878,776 UART: [art] Store in slot 0x4
2,964,284 UART: [art] Derive Key Pair
2,964,644 UART: [art] Store priv key in slot 0x5
2,978,047 UART: [art] Derive Key Pair - Done
2,992,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,900 UART: [art] PUB.X = B7EEDDE80A1F68E3E3B1F6D8923EA43383DBA4003091D6E32D1421D27AE95C196EE58692CC3FC80424B7815AF8A1860D
3,015,649 UART: [art] PUB.Y = 9AE3794A4C832F56420950F9ED76C8912DB47749BBD7187B27039010CEFD1A9C8C5AA49908E21A4082B45C18A8018935
3,022,583 UART: [art] SIG.R = 1366F789C232A6DD310CA3CB4790C9EA0FC208F9C683E934599041C448D4E6DCCBDB0293E43133302FE24575B61B73E9
3,029,343 UART: [art] SIG.S = BBF5CF4285F663D91B4B66983F83DB32A03B5CF3B8F0BE53CC90067DC42FBC9A4446A5D07A06BBFA8CFDE94AD9725FF8
3,052,833 UART: Caliptra RT
3,053,176 UART: [state] CFI Enabled
3,172,832 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,225 >>> mbox cmd response: success
2,736,064 UART:
2,736,080 UART: Running Caliptra FMC ...
2,736,488 UART:
2,736,631 UART: [state] CFI Enabled
2,747,327 UART: [fht] FMC Alias Private Key: 7
2,866,051 UART: [art] Extend RT PCRs Done
2,866,479 UART: [art] Lock RT PCRs Done
2,867,837 UART: [art] Populate DV Done
2,875,790 UART: [fht] FMC Alias Private Key: 7
2,876,848 UART: [art] Derive CDI
2,877,128 UART: [art] Store in slot 0x4
2,963,110 UART: [art] Derive Key Pair
2,963,470 UART: [art] Store priv key in slot 0x5
2,975,917 UART: [art] Derive Key Pair - Done
2,990,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,006,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,238 UART: [art] PUB.X = 11BBD9D035E8065E24B044A0D8D8B4F4654EB24B308E6D0D72AAEB62CD46A07659A74D4ED53BBB941997B8A169BF4394
3,014,012 UART: [art] PUB.Y = 9540288A78F727E015B1BF56A927FC3CF84E50D1AA78EBD85A407D7CB9E144AD5B8DFF3E78E49AD02E6D6B02DC5CF37E
3,020,979 UART: [art] SIG.R = 8329C75A58FACD07FB336E1CF90616045EEA190D19860AB567C15693D5DB1D244A40E1DB5C66837B6B3E8D2BEF1C1C96
3,027,744 UART: [art] SIG.S = ED34E0EF3B1C9B7026C630C358A318D55C8FF4B7DAA8646B5B098C6AA50D3B810F8715A6FA8EAE12F0166D8BCF9AED59
3,051,175 UART: Caliptra RT
3,051,518 UART: [state] CFI Enabled
3,172,206 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,671,328 >>> mbox cmd response: success
2,733,699 UART:
2,733,715 UART: Running Caliptra FMC ...
2,734,123 UART:
2,734,266 UART: [state] CFI Enabled
2,745,188 UART: [fht] FMC Alias Private Key: 7
2,863,794 UART: [art] Extend RT PCRs Done
2,864,222 UART: [art] Lock RT PCRs Done
2,865,942 UART: [art] Populate DV Done
2,874,291 UART: [fht] FMC Alias Private Key: 7
2,875,445 UART: [art] Derive CDI
2,875,725 UART: [art] Store in slot 0x4
2,961,427 UART: [art] Derive Key Pair
2,961,787 UART: [art] Store priv key in slot 0x5
2,974,866 UART: [art] Derive Key Pair - Done
2,989,429 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,004,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,005,019 UART: [art] PUB.X = CF36E3ADD45E87A7869DB740869F09F2EC3984057882F7457B5DE10DFA6BC6D5CAF87B4B316B7A86755DD035DA4BA7FC
3,011,796 UART: [art] PUB.Y = A0DF75E06A9ED47B440B9FA7A2F7FAE48D83ACCDCA5BEAC4CDA90A289453FD24CF9779B3D499D0F2606B4840D9725C40
3,018,762 UART: [art] SIG.R = 3BAD47401893A587895B29D8EC12EAD208A81FE3536892D2AAA5DB80660B4B4EF5DF39B53F9A06AA06B623CF0CCD4B41
3,025,531 UART: [art] SIG.S = 81FA04240B39F5653BC69268A10B86E9C6A1515C733FCEBFB17F6E5D8C16CC4937093B55E01AB0919C5C02DCA3EC0931
3,049,851 UART: Caliptra RT
3,050,194 UART: [state] CFI Enabled
3,170,817 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.70s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,893,815 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,901,728 UART: [afmc] --
2,902,601 UART: [cold-reset] --
2,903,357 UART: [state] Locking Datavault
2,904,656 UART: [state] Locking PCR0, PCR1 and PCR31
2,905,260 UART: [state] Locking ICCM
2,905,772 UART: [exit] Launching FMC @ 0x40000130
2,911,102 UART:
2,911,118 UART: Running Caliptra FMC ...
2,911,526 UART:
2,911,580 UART: [state] CFI Enabled
2,922,104 UART: [fht] FMC Alias Private Key: 7
3,041,648 UART: [art] Extend RT PCRs Done
3,042,076 UART: [art] Lock RT PCRs Done
3,043,308 UART: [art] Populate DV Done
3,051,543 UART: [fht] FMC Alias Private Key: 7
3,052,665 UART: [art] Derive CDI
3,052,945 UART: [art] Store in slot 0x4
3,138,860 UART: [art] Derive Key Pair
3,139,220 UART: [art] Store priv key in slot 0x5
3,152,110 UART: [art] Derive Key Pair - Done
3,167,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,663 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,428 UART: [art] PUB.X = 9AA2F059728D7D0213886CC531B7DBD44DBC6E9F7F69191C9CDD21D1B3E24DD0EAA85B7EF18B847C053F82DE0873623E
3,190,203 UART: [art] PUB.Y = 392C33D0CAA22FAC52C5B5B0486D34F197F96BEA486E86688D5409E03994017ED90219D2DD5498FE37C0AADF60CE8DD8
3,197,154 UART: [art] SIG.R = 9C598A5380395B8CE7719693AA624D5DF9EE8DBE85C33CD0F1D28472F7CC3BAA11AB1C7CFAF566715B37EC85E339288A
3,203,938 UART: [art] SIG.S = D2E9309AE086C55D88C95A7471E57D8FF76926A28283C03B7D47AEBA3C67366CE49C2494DD616F36DB24E286A4B0C985
3,227,896 UART: Caliptra RT
3,228,147 UART: [state] CFI Enabled
3,348,163 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
916,237 UART: [kat] HMAC-384Kdf
920,665 UART: [kat] LMS
1,168,977 UART: [kat] --
1,169,998 UART: [cold-reset] ++
1,170,386 UART: [fht] FHT @ 0x50003400
1,172,984 UART: [idev] ++
1,173,152 UART: [idev] CDI.KEYID = 6
1,173,513 UART: [idev] SUBJECT.KEYID = 7
1,173,938 UART: [idev] UDS.KEYID = 0
1,182,063 UART: [idev] Erasing UDS.KEYID = 0
1,198,874 UART: [idev] Sha384 KeyId Algorithm
1,202,529 UART: [idev] --
1,203,560 UART: [ldev] ++
1,203,728 UART: [ldev] CDI.KEYID = 6
1,204,092 UART: [ldev] SUBJECT.KEYID = 5
1,204,519 UART: [ldev] AUTHORITY.KEYID = 7
1,204,982 UART: [ldev] FE.KEYID = 1
1,210,224 UART: [ldev] Erasing FE.KEYID = 1
1,236,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,942 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,664 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,778 UART: [ldev] --
1,276,165 UART: [fwproc] Wait for Commands...
1,276,844 UART: [fwproc] Recv command 0x46574c44
1,277,577 UART: [fwproc] Recv'd Img size: 118548 bytes
2,622,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,965 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,680,140 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,820,349 >>> mbox cmd response: success
2,821,581 UART: [afmc] ++
2,821,749 UART: [afmc] CDI.KEYID = 6
2,822,112 UART: [afmc] SUBJECT.KEYID = 7
2,822,538 UART: [afmc] AUTHORITY.KEYID = 5
2,857,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,874,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,875,381 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,881,091 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,886,972 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,892,673 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,900,598 UART: [afmc] --
2,901,653 UART: [cold-reset] --
2,902,601 UART: [state] Locking Datavault
2,903,838 UART: [state] Locking PCR0, PCR1 and PCR31
2,904,442 UART: [state] Locking ICCM
2,904,920 UART: [exit] Launching FMC @ 0x40000130
2,910,250 UART:
2,910,266 UART: Running Caliptra FMC ...
2,910,674 UART:
2,910,728 UART: [state] CFI Enabled
2,921,378 UART: [fht] FMC Alias Private Key: 7
3,039,948 UART: [art] Extend RT PCRs Done
3,040,376 UART: [art] Lock RT PCRs Done
3,041,936 UART: [art] Populate DV Done
3,050,093 UART: [fht] FMC Alias Private Key: 7
3,051,099 UART: [art] Derive CDI
3,051,379 UART: [art] Store in slot 0x4
3,136,810 UART: [art] Derive Key Pair
3,137,170 UART: [art] Store priv key in slot 0x5
3,150,408 UART: [art] Derive Key Pair - Done
3,164,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,180,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,181,150 UART: [art] PUB.X = 6712D02DA90B03EEC2CD5E126A91747100B858D55A9266E229D82D8B1F0D5EDC8079B3D1199849F26DD5C2668B06973A
3,187,886 UART: [art] PUB.Y = 94CFB990B6DCFD58C6F07E3061A3CE9BB6727BCF23FF9F3833E5CF3DDCA973EDB62BD38D04B5BF6A7719B49713FC7E88
3,194,857 UART: [art] SIG.R = 2D17AD4C5213DD267B91CA102CB7E1CA2348F2F66487859901370E8FC758FD6C00A59FA421FB97F28B460D1C8EC55934
3,201,600 UART: [art] SIG.S = AA5C37EB2B9F5ED8490BA6B4E687AFAFE27FD60E43445E5B0B6114F474F9717837527310450BF43B348D16F72A393899
3,225,750 UART: Caliptra RT
3,226,001 UART: [state] CFI Enabled
3,346,783 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,389 UART: [kat] SHA2-512-ACC
906,290 UART: [kat] ECC-384
915,913 UART: [kat] HMAC-384Kdf
920,717 UART: [kat] LMS
1,169,029 UART: [kat] --
1,169,840 UART: [cold-reset] ++
1,170,380 UART: [fht] FHT @ 0x50003400
1,173,034 UART: [idev] ++
1,173,202 UART: [idev] CDI.KEYID = 6
1,173,563 UART: [idev] SUBJECT.KEYID = 7
1,173,988 UART: [idev] UDS.KEYID = 0
1,181,519 UART: [idev] Erasing UDS.KEYID = 0
1,198,500 UART: [idev] Fuse KeyId
1,199,722 UART: [idev] --
1,200,979 UART: [ldev] ++
1,201,147 UART: [ldev] CDI.KEYID = 6
1,201,511 UART: [ldev] SUBJECT.KEYID = 5
1,201,938 UART: [ldev] AUTHORITY.KEYID = 7
1,202,401 UART: [ldev] FE.KEYID = 1
1,207,847 UART: [ldev] Erasing FE.KEYID = 1
1,234,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,503 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,185 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,324 UART: [ldev] --
1,273,697 UART: [fwproc] Wait for Commands...
1,274,380 UART: [fwproc] Recv command 0x46574c44
1,275,113 UART: [fwproc] Recv'd Img size: 118548 bytes
2,619,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,689 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,677,864 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,818,253 >>> mbox cmd response: success
2,819,465 UART: [afmc] ++
2,819,633 UART: [afmc] CDI.KEYID = 6
2,819,996 UART: [afmc] SUBJECT.KEYID = 7
2,820,422 UART: [afmc] AUTHORITY.KEYID = 5
2,855,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,872,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,873,195 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,878,905 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,884,786 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,890,487 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,898,262 UART: [afmc] --
2,899,193 UART: [cold-reset] --
2,900,117 UART: [state] Locking Datavault
2,901,298 UART: [state] Locking PCR0, PCR1 and PCR31
2,901,902 UART: [state] Locking ICCM
2,902,550 UART: [exit] Launching FMC @ 0x40000130
2,907,880 UART:
2,907,896 UART: Running Caliptra FMC ...
2,908,304 UART:
2,908,358 UART: [state] CFI Enabled
2,918,766 UART: [fht] FMC Alias Private Key: 7
3,037,790 UART: [art] Extend RT PCRs Done
3,038,218 UART: [art] Lock RT PCRs Done
3,039,902 UART: [art] Populate DV Done
3,048,119 UART: [fht] FMC Alias Private Key: 7
3,049,151 UART: [art] Derive CDI
3,049,431 UART: [art] Store in slot 0x4
3,135,302 UART: [art] Derive Key Pair
3,135,662 UART: [art] Store priv key in slot 0x5
3,148,864 UART: [art] Derive Key Pair - Done
3,163,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,179,140 UART: [art] Erasing AUTHORITY.KEYID = 7
3,179,905 UART: [art] PUB.X = B1C9C0DB6CA99F10589DD14D6ECE6B75865F660896A244F96C3BC4844E1531B13E886AF8BF7373FA59B0CDC57BD8B348
3,186,684 UART: [art] PUB.Y = EF21CACCDBC4A97178E520C0AD481D7C831CB625E86A16934D23FCD966CAC89DABB280993F45118C88BD0996AEA3BB3A
3,193,651 UART: [art] SIG.R = 5CE7B8439192CCF1A95532A34EA325132DD4D179615DE23BA9BE4ADD65DF9457203346578BAF556B21214F9B7089F211
3,200,421 UART: [art] SIG.S = 4457CE2F5C8B646E3E74298A9B004F856239BDEFAD7DF7B8B6C836C221160E30289FFD1B1596DFE9344DFC392DA85347
3,223,864 UART: Caliptra RT
3,224,115 UART: [state] CFI Enabled
3,343,779 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 6.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,850 >>> mbox cmd response: success
2,740,229 UART:
2,740,245 UART: Running Caliptra FMC ...
2,740,653 UART:
2,740,707 UART: [state] CFI Enabled
2,751,343 UART: [fht] FMC Alias Private Key: 7
2,870,517 UART: [art] Extend RT PCRs Done
2,870,945 UART: [art] Lock RT PCRs Done
2,872,373 UART: [art] Populate DV Done
2,880,736 UART: [fht] FMC Alias Private Key: 7
2,881,848 UART: [art] Derive CDI
2,882,128 UART: [art] Store in slot 0x4
2,968,223 UART: [art] Derive Key Pair
2,968,583 UART: [art] Store priv key in slot 0x5
2,981,875 UART: [art] Derive Key Pair - Done
2,996,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,625 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,390 UART: [art] PUB.X = B3A378BDDB26CD5522A8305749CDDA21E6B0C0EC675F4E5DF423CD96CEFF65AB2E34E7C3082C6F66FE214989C1F832CF
3,019,177 UART: [art] PUB.Y = C901C39B449F134C8FBEE5D890B65E19085BD5F0C4BB2F9EBD970294C3F6E4D728B8028A226B8468BBCD45FEF6B77DEC
3,026,133 UART: [art] SIG.R = 4EB489E555F6ECE13E5407405C61AD0A12F5AD15FDB1B3977D27D3B946791CBF27C345B75F79D1057425797BFEF42CF5
3,032,902 UART: [art] SIG.S = C6CCF98860FFF3F567FF8E42951311003D977757B74F4F75F6D43178EB9DEC8B8A69590852697A063FB0630400DE2DC3
3,055,993 UART: Caliptra RT
3,056,244 UART: [state] CFI Enabled
3,176,929 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,980 >>> mbox cmd response: success
2,734,775 UART:
2,734,791 UART: Running Caliptra FMC ...
2,735,199 UART:
2,735,253 UART: [state] CFI Enabled
2,745,835 UART: [fht] FMC Alias Private Key: 7
2,865,079 UART: [art] Extend RT PCRs Done
2,865,507 UART: [art] Lock RT PCRs Done
2,867,079 UART: [art] Populate DV Done
2,875,316 UART: [fht] FMC Alias Private Key: 7
2,876,376 UART: [art] Derive CDI
2,876,656 UART: [art] Store in slot 0x4
2,962,465 UART: [art] Derive Key Pair
2,962,825 UART: [art] Store priv key in slot 0x5
2,975,749 UART: [art] Derive Key Pair - Done
2,990,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,005,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,006,710 UART: [art] PUB.X = B0C2CB7888B5B1319D9624D107B521CCFACC6ADDAD87B1F12B329F3D11675F52CBB79A71495F72DD3912FF9EAC7D4B38
3,013,495 UART: [art] PUB.Y = 4061BC4C81BD5C9F86557266888DF23C52A2CCE2D690AB3241AFF07D3BE0DB88C3BB8445A00783F1CD2814AC001E6EAF
3,020,434 UART: [art] SIG.R = 3A13A9DAE3FFF9A5BB37944654AEED8E04FFE683C52FA1A42E3A6A7380A06C3940A6561BF2D10701A7EC6E79BA9DDEB9
3,027,217 UART: [art] SIG.S = 921D56267E367C4D5D7A4F5B553B3CC74E9B5D338DA77B7B8FFD60C37B5CB69260D9550EC26133ED6B6F955D3670DCC1
3,050,864 UART: Caliptra RT
3,051,115 UART: [state] CFI Enabled
3,170,839 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,078 >>> mbox cmd response: success
2,734,383 UART:
2,734,399 UART: Running Caliptra FMC ...
2,734,807 UART:
2,734,861 UART: [state] CFI Enabled
2,745,477 UART: [fht] FMC Alias Private Key: 7
2,864,073 UART: [art] Extend RT PCRs Done
2,864,501 UART: [art] Lock RT PCRs Done
2,865,741 UART: [art] Populate DV Done
2,873,850 UART: [fht] FMC Alias Private Key: 7
2,875,028 UART: [art] Derive CDI
2,875,308 UART: [art] Store in slot 0x4
2,960,873 UART: [art] Derive Key Pair
2,961,233 UART: [art] Store priv key in slot 0x5
2,974,965 UART: [art] Derive Key Pair - Done
2,990,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,005,302 UART: [art] Erasing AUTHORITY.KEYID = 7
3,006,067 UART: [art] PUB.X = 8C2CD814E6F5AB041EE0EE2626ECA51A1775678EE3C0ED58F5518114743033ACA7C8CA6EECC0927B02678FC226E108A8
3,012,838 UART: [art] PUB.Y = B7A1ECC894BE8C1E8F53C8ECE05F6BB6FEA3D9D67EBCE9B0FC055B2B7B42E4A860E79CEE65B87581DBBD5B3F0675870A
3,019,809 UART: [art] SIG.R = 2F85D375A5517D79C5F6009E4D8EE19A52AC1D1EDC70E178A195BA9FAC021CA9BAB87DA0A6B61BC343107C70394748B5
3,026,566 UART: [art] SIG.S = 9210D31A26161B4733DB24EEE7556EFB342FBAFB164E256D4615D8193A34A3591A200E7034FD7BCA7B81527C96C23312
3,050,335 UART: Caliptra RT
3,050,586 UART: [state] CFI Enabled
3,170,994 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,671,641 >>> mbox cmd response: success
2,734,000 UART:
2,734,016 UART: Running Caliptra FMC ...
2,734,424 UART:
2,734,478 UART: [state] CFI Enabled
2,744,868 UART: [fht] FMC Alias Private Key: 7
2,863,392 UART: [art] Extend RT PCRs Done
2,863,820 UART: [art] Lock RT PCRs Done
2,865,346 UART: [art] Populate DV Done
2,873,567 UART: [fht] FMC Alias Private Key: 7
2,874,497 UART: [art] Derive CDI
2,874,777 UART: [art] Store in slot 0x4
2,960,476 UART: [art] Derive Key Pair
2,960,836 UART: [art] Store priv key in slot 0x5
2,973,980 UART: [art] Derive Key Pair - Done
2,988,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,004,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,004,941 UART: [art] PUB.X = 0AF843889B9BE76388123ED08CDB009DD9AA52B073BDE1527A31C15B143AEB410B7ACAA1E9E1B659DA40417B3D9EF635
3,011,697 UART: [art] PUB.Y = 1D37DB5A3035A9BFB575BB0378BC262BD4DBACFA86D63186BEBE11D6086F974A55C66981D18F2AD0F442E881C3307E6F
3,018,655 UART: [art] SIG.R = C8127F14A0150C76A7AA0B3933B5F03D98CFA2B04880CE3FBC02B18DAE8EB3CE9D3530F076C88983298FAA3EDCCD41B5
3,025,434 UART: [art] SIG.S = 49808F3CA4526CA8D5A445B486269B6177DEC6966CA3475C933F7E6AB7CADEB8165EC13623E305685F2CC64693D37831
3,048,835 UART: Caliptra RT
3,049,086 UART: [state] CFI Enabled
3,169,461 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.98s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,893,064 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,900,821 UART: [afmc] --
2,901,742 UART: [cold-reset] --
2,902,694 UART: [state] Locking Datavault
2,903,999 UART: [state] Locking PCR0, PCR1 and PCR31
2,904,603 UART: [state] Locking ICCM
2,905,253 UART: [exit] Launching FMC @ 0x40000130
2,910,583 UART:
2,910,599 UART: Running Caliptra FMC ...
2,911,007 UART:
2,911,150 UART: [state] CFI Enabled
2,921,572 UART: [fht] FMC Alias Private Key: 7
3,041,368 UART: [art] Extend RT PCRs Done
3,041,796 UART: [art] Lock RT PCRs Done
3,043,466 UART: [art] Populate DV Done
3,051,929 UART: [fht] FMC Alias Private Key: 7
3,053,075 UART: [art] Derive CDI
3,053,355 UART: [art] Store in slot 0x4
3,139,196 UART: [art] Derive Key Pair
3,139,556 UART: [art] Store priv key in slot 0x5
3,153,104 UART: [art] Derive Key Pair - Done
3,167,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,973 UART: [art] PUB.X = D0A5160E6574D7FB76403D08A604E280F7CA7489C7ED935BE938AC6CA3D0C64D63AF995E48EEBC45B61B6F535789C586
3,190,742 UART: [art] PUB.Y = 45A896F88C68B2CF3ECB3481BE65A8D6AAD9404CC79915E8ED91562D49844B0C1184012F72D45737176CEC6DA9E173B0
3,197,690 UART: [art] SIG.R = 14B21A27DFE17346E22FD13C8F18A70E78A2EBCF416D37F4B425816754C30E179284935F2B95613C6D48C572714FBF94
3,204,452 UART: [art] SIG.S = 8CCE6133A16F8570CA3F4BDB8187B24F951E1741B018630229D77213BA67A67E9749CB09F729FDC8A0B637FD289E4C44
3,228,220 UART: Caliptra RT
3,228,563 UART: [state] CFI Enabled
3,348,519 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,603 UART: [kat] SHA2-256
891,153 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,257 UART: [kat] ++
895,409 UART: [kat] sha1
899,651 UART: [kat] SHA2-256
901,591 UART: [kat] SHA2-384
904,220 UART: [kat] SHA2-512-ACC
906,121 UART: [kat] ECC-384
915,964 UART: [kat] HMAC-384Kdf
920,552 UART: [kat] LMS
1,168,864 UART: [kat] --
1,169,773 UART: [cold-reset] ++
1,170,125 UART: [fht] FHT @ 0x50003400
1,172,853 UART: [idev] ++
1,173,021 UART: [idev] CDI.KEYID = 6
1,173,382 UART: [idev] SUBJECT.KEYID = 7
1,173,807 UART: [idev] UDS.KEYID = 0
1,182,008 UART: [idev] Erasing UDS.KEYID = 0
1,198,615 UART: [idev] Sha384 KeyId Algorithm
1,202,462 UART: [idev] --
1,203,693 UART: [ldev] ++
1,203,861 UART: [ldev] CDI.KEYID = 6
1,204,225 UART: [ldev] SUBJECT.KEYID = 5
1,204,652 UART: [ldev] AUTHORITY.KEYID = 7
1,205,115 UART: [ldev] FE.KEYID = 1
1,210,353 UART: [ldev] Erasing FE.KEYID = 1
1,236,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,251 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,973 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,073 UART: [ldev] --
1,275,294 UART: [fwproc] Wait for Commands...
1,276,117 UART: [fwproc] Recv command 0x46574c44
1,276,850 UART: [fwproc] Recv'd Img size: 118548 bytes
2,621,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,649,274 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,680,449 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,820,804 >>> mbox cmd response: success
2,821,986 UART: [afmc] ++
2,822,154 UART: [afmc] CDI.KEYID = 6
2,822,517 UART: [afmc] SUBJECT.KEYID = 7
2,822,943 UART: [afmc] AUTHORITY.KEYID = 5
2,858,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,874,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,875,690 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,881,400 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,887,281 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,892,982 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,900,751 UART: [afmc] --
2,901,752 UART: [cold-reset] --
2,902,452 UART: [state] Locking Datavault
2,903,677 UART: [state] Locking PCR0, PCR1 and PCR31
2,904,281 UART: [state] Locking ICCM
2,904,703 UART: [exit] Launching FMC @ 0x40000130
2,910,033 UART:
2,910,049 UART: Running Caliptra FMC ...
2,910,457 UART:
2,910,600 UART: [state] CFI Enabled
2,921,150 UART: [fht] FMC Alias Private Key: 7
3,039,892 UART: [art] Extend RT PCRs Done
3,040,320 UART: [art] Lock RT PCRs Done
3,041,848 UART: [art] Populate DV Done
3,050,233 UART: [fht] FMC Alias Private Key: 7
3,051,227 UART: [art] Derive CDI
3,051,507 UART: [art] Store in slot 0x4
3,137,416 UART: [art] Derive Key Pair
3,137,776 UART: [art] Store priv key in slot 0x5
3,151,228 UART: [art] Derive Key Pair - Done
3,165,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,181,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,182,739 UART: [art] PUB.X = 5931BDA63EAA4B3CD7B06670AD4D8582ABA53527B535966B45EE0BCCA361EDF69855E317F42CF64C85067DFFF5365182
3,189,513 UART: [art] PUB.Y = A4B98F45F021EE929F2F23C933E88CA24AB148B6A5476CB1C9EB30B0471ACE3BF3A1DE1836A1107DCA7B53F4C9B9CC73
3,196,481 UART: [art] SIG.R = 4067FCF192D68E1959BD11A7EFA25C21F30E9053205C0B4FF3532BC1DD605D9AD667F615B3BCCCA22E3C8D4B8DF1E8EF
3,203,265 UART: [art] SIG.S = 550ED19B3EE7CE6F21E466AE1DA42644C982F85E885A6BDE311B209C1636C9C35B3308816DF018DDB484BFDB56FBD324
3,227,557 UART: Caliptra RT
3,227,900 UART: [state] CFI Enabled
3,348,273 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
891,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,814 UART: [kat] LMS
1,169,126 UART: [kat] --
1,170,043 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,173,163 UART: [idev] ++
1,173,331 UART: [idev] CDI.KEYID = 6
1,173,692 UART: [idev] SUBJECT.KEYID = 7
1,174,117 UART: [idev] UDS.KEYID = 0
1,181,988 UART: [idev] Erasing UDS.KEYID = 0
1,199,243 UART: [idev] Fuse KeyId
1,200,465 UART: [idev] --
1,201,542 UART: [ldev] ++
1,201,710 UART: [ldev] CDI.KEYID = 6
1,202,074 UART: [ldev] SUBJECT.KEYID = 5
1,202,501 UART: [ldev] AUTHORITY.KEYID = 7
1,202,964 UART: [ldev] FE.KEYID = 1
1,208,004 UART: [ldev] Erasing FE.KEYID = 1
1,234,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,384 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,066 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,069 UART: [ldev] --
1,273,388 UART: [fwproc] Wait for Commands...
1,273,977 UART: [fwproc] Recv command 0x46574c44
1,274,710 UART: [fwproc] Recv'd Img size: 118548 bytes
2,620,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,647,068 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,678,243 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,818,512 >>> mbox cmd response: success
2,819,618 UART: [afmc] ++
2,819,786 UART: [afmc] CDI.KEYID = 6
2,820,149 UART: [afmc] SUBJECT.KEYID = 7
2,820,575 UART: [afmc] AUTHORITY.KEYID = 5
2,856,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,873,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,873,842 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,879,552 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,885,433 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,891,134 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,898,853 UART: [afmc] --
2,899,898 UART: [cold-reset] --
2,900,686 UART: [state] Locking Datavault
2,901,877 UART: [state] Locking PCR0, PCR1 and PCR31
2,902,481 UART: [state] Locking ICCM
2,902,919 UART: [exit] Launching FMC @ 0x40000130
2,908,249 UART:
2,908,265 UART: Running Caliptra FMC ...
2,908,673 UART:
2,908,816 UART: [state] CFI Enabled
2,919,168 UART: [fht] FMC Alias Private Key: 7
3,037,802 UART: [art] Extend RT PCRs Done
3,038,230 UART: [art] Lock RT PCRs Done
3,039,862 UART: [art] Populate DV Done
3,047,939 UART: [fht] FMC Alias Private Key: 7
3,049,021 UART: [art] Derive CDI
3,049,301 UART: [art] Store in slot 0x4
3,134,648 UART: [art] Derive Key Pair
3,135,008 UART: [art] Store priv key in slot 0x5
3,148,028 UART: [art] Derive Key Pair - Done
3,163,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,178,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,179,054 UART: [art] PUB.X = 34230925596DB53D899FB40C43FBA7F4F9F3BFE9862FE2D3C065FE79F5035BDFBAC15CEE44559BA20058F66A56BB1438
3,185,805 UART: [art] PUB.Y = C431C22A4E338F06C5D90B5ED19E54571D59C2CD0DF3D03948F45880429A066ADF0BA4AC8009B7ADC1C7108FA94B23EC
3,192,749 UART: [art] SIG.R = 977ABB0AE2ABF23E00D1CE24F65C3D0C90C562A3FEDE540A16FFDE391B21DAE2DEDBCB2A06D19CD795B3923A5FB2B52F
3,199,517 UART: [art] SIG.S = 7C3527141A0E216131FEB8AA671A053E02DFBDDF6D749027B52BCDBBEF8C7B2451750E22F12DD5C7F2EB48DDB4F1C44F
3,223,023 UART: Caliptra RT
3,223,366 UART: [state] CFI Enabled
3,342,117 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,473 >>> mbox cmd response: success
2,740,396 UART:
2,740,412 UART: Running Caliptra FMC ...
2,740,820 UART:
2,740,963 UART: [state] CFI Enabled
2,751,821 UART: [fht] FMC Alias Private Key: 7
2,870,523 UART: [art] Extend RT PCRs Done
2,870,951 UART: [art] Lock RT PCRs Done
2,872,481 UART: [art] Populate DV Done
2,880,740 UART: [fht] FMC Alias Private Key: 7
2,881,750 UART: [art] Derive CDI
2,882,030 UART: [art] Store in slot 0x4
2,967,737 UART: [art] Derive Key Pair
2,968,097 UART: [art] Store priv key in slot 0x5
2,981,285 UART: [art] Derive Key Pair - Done
2,996,378 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,543 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,308 UART: [art] PUB.X = 3F7689AC18AD91FD9FDDC8E8565C0D951E3C4C061C84BFA6B8A84EF049C9549215371B052C47B4C37275FFD284950BC3
3,019,074 UART: [art] PUB.Y = D1F2BB33AFD12E8F924CD97702012984C8F01AD7A3E9E93385978066AC50D7D21632605D53E7C62F594FA1051BCFE922
3,026,017 UART: [art] SIG.R = 9C98B5E90474C4130655C20D80B1D761B227C9F94DAA3B143076F3521BB150DE14C0516CCFD020F898C2AD37DE9693CF
3,032,782 UART: [art] SIG.S = C58F59DC00E2572E1CD419E582C99EF5FF0F428646E93FF775FD4A904494716F22B04FD0CABEB0594CBD8056E0149E21
3,056,465 UART: Caliptra RT
3,056,808 UART: [state] CFI Enabled
3,175,788 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,995 >>> mbox cmd response: success
2,737,446 UART:
2,737,462 UART: Running Caliptra FMC ...
2,737,870 UART:
2,738,013 UART: [state] CFI Enabled
2,748,287 UART: [fht] FMC Alias Private Key: 7
2,867,191 UART: [art] Extend RT PCRs Done
2,867,619 UART: [art] Lock RT PCRs Done
2,868,979 UART: [art] Populate DV Done
2,877,234 UART: [fht] FMC Alias Private Key: 7
2,878,312 UART: [art] Derive CDI
2,878,592 UART: [art] Store in slot 0x4
2,964,045 UART: [art] Derive Key Pair
2,964,405 UART: [art] Store priv key in slot 0x5
2,977,961 UART: [art] Derive Key Pair - Done
2,992,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,183 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,948 UART: [art] PUB.X = BB5679CE0467B1C207CEE80F584EBEB589BB2C27243E32C6CB9B254DC253B3312CED025A11778575653FC978E139F596
3,015,710 UART: [art] PUB.Y = D5C620CD04C531418A2448D244A457F07138CF098D3A8BAF7F67FD582C3EF00F414FAA2D9F855E089493E80AE72F47C6
3,022,651 UART: [art] SIG.R = CCAFA1EAB4CE31629AB81B7B3B1B28BADA190B3C9CE36F53B6F1B774433513A7E23FC68B049BD951A839E9240E34D8CE
3,029,432 UART: [art] SIG.S = 0FF5DBF79286FD7E1C52284C3F87EB116378283216EBD34563BAE5015F80A3D657AD25E2BF28EF8763717A1448B8A43B
3,053,136 UART: Caliptra RT
3,053,479 UART: [state] CFI Enabled
3,172,801 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,491 >>> mbox cmd response: success
2,738,602 UART:
2,738,618 UART: Running Caliptra FMC ...
2,739,026 UART:
2,739,169 UART: [state] CFI Enabled
2,749,881 UART: [fht] FMC Alias Private Key: 7
2,868,341 UART: [art] Extend RT PCRs Done
2,868,769 UART: [art] Lock RT PCRs Done
2,870,573 UART: [art] Populate DV Done
2,878,862 UART: [fht] FMC Alias Private Key: 7
2,879,900 UART: [art] Derive CDI
2,880,180 UART: [art] Store in slot 0x4
2,965,785 UART: [art] Derive Key Pair
2,966,145 UART: [art] Store priv key in slot 0x5
2,979,317 UART: [art] Derive Key Pair - Done
2,994,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,468 UART: [art] PUB.X = 703EB5BF1F425D6B2C5CF622D06DCDE84DEA60DF5B6E80906181018B89F8F1C4969CA1BB804A427478C07378E3DC75BA
3,017,247 UART: [art] PUB.Y = 1D7E7BA19CE9842CB3A76340F31C29E232342BED0C29D32B9312FEF3632FA84DE303D426CDD45411B270BE73B7DA36B4
3,024,201 UART: [art] SIG.R = 8F0DC386EFD0C3BD4D928F20915D6095E7CF3D84F91442C065828E8C11BFC67BE50D34EE7F4350C78302CCCA59D11CDB
3,030,976 UART: [art] SIG.S = E1B294B1301DFF7AE174E4E75BDEC0F547EFDE08C25B1DE85B6E6C61C40A75A9DF1C41B000CA3C3940B42F7DFA51ED1B
3,054,580 UART: Caliptra RT
3,054,923 UART: [state] CFI Enabled
3,174,615 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,666 >>> mbox cmd response: success
2,735,011 UART:
2,735,027 UART: Running Caliptra FMC ...
2,735,435 UART:
2,735,578 UART: [state] CFI Enabled
2,746,004 UART: [fht] FMC Alias Private Key: 7
2,864,644 UART: [art] Extend RT PCRs Done
2,865,072 UART: [art] Lock RT PCRs Done
2,866,582 UART: [art] Populate DV Done
2,874,717 UART: [fht] FMC Alias Private Key: 7
2,875,847 UART: [art] Derive CDI
2,876,127 UART: [art] Store in slot 0x4
2,961,788 UART: [art] Derive Key Pair
2,962,148 UART: [art] Store priv key in slot 0x5
2,975,250 UART: [art] Derive Key Pair - Done
2,989,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,005,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,006,339 UART: [art] PUB.X = C1A6D57F276A88C324A3FA99E95E90CDE1DFB6C0A8D2FE9F01766FED57967BFCACA27A6A86CA8FB429973670B2152DD5
3,013,126 UART: [art] PUB.Y = 7F9E78C1D3ABC4B100D71B421B358413087623E4A254CA474A3ADCDCA3894837EDBD418ECE2B69E6A40E36F37C1831F5
3,020,058 UART: [art] SIG.R = 34F4811B78DD858D3102FF8A2B560705342CCCAA900A45AC9203EF1EE98C7C63ABAEF011F86F0C1B94A4D1927D2E4EA4
3,026,824 UART: [art] SIG.S = ACD75D68626246380BA2EDFB73CB5E4C6227C04C5115B5332CE3B848D2B60B2D7D8920FA86E122E03422CDE98D6462AB
3,050,378 UART: Caliptra RT
3,050,721 UART: [state] CFI Enabled
3,170,124 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.38s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,893,269 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,900,902 UART: [afmc] --
2,901,845 UART: [cold-reset] --
2,902,615 UART: [state] Locking Datavault
2,903,736 UART: [state] Locking PCR0, PCR1 and PCR31
2,904,340 UART: [state] Locking ICCM
2,904,922 UART: [exit] Launching FMC @ 0x40000130
2,910,252 UART:
2,910,268 UART: Running Caliptra FMC ...
2,910,676 UART:
2,910,730 UART: [state] CFI Enabled
2,921,412 UART: [fht] FMC Alias Private Key: 7
3,040,696 UART: [art] Extend RT PCRs Done
3,041,124 UART: [art] Lock RT PCRs Done
3,042,724 UART: [art] Populate DV Done
3,050,835 UART: [fht] FMC Alias Private Key: 7
3,052,017 UART: [art] Derive CDI
3,052,297 UART: [art] Store in slot 0x4
3,138,092 UART: [art] Derive Key Pair
3,138,452 UART: [art] Store priv key in slot 0x5
3,151,320 UART: [art] Derive Key Pair - Done
3,165,936 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,181,155 UART: [art] Erasing AUTHORITY.KEYID = 7
3,181,920 UART: [art] PUB.X = 7108A0595362BDBE4136A06835F8E8B48C3ED28BDC1E08225BDA2DDD80488FD6F38AE6631E35AACF03C417339EF34DF1
3,188,693 UART: [art] PUB.Y = 562BF16853EFD245BE6B37AA49D2CA76D26D2F038B294DCE0311BA20A5473C505D8766A603EA83CFA8B4BB291A22B8E2
3,195,646 UART: [art] SIG.R = 2011B1E6565CD61350C176477EDB3EB2800FFB0653A82494635AA2E794EB5F8678F88964217550124C01945712796B69
3,202,391 UART: [art] SIG.S = 309765B77E245A141D94CEBF2DEE69F00082E605013514ADD0140D6C15295DA38667FD62401A248D5F238186916D6A23
3,225,502 UART: Caliptra RT
3,225,753 UART: [state] CFI Enabled
3,345,166 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
85,969 UART: [state] WD Timer not started. Device not locked for debugging
87,308 UART: [kat] SHA2-256
890,858 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,962 UART: [kat] ++
895,114 UART: [kat] sha1
899,416 UART: [kat] SHA2-256
901,356 UART: [kat] SHA2-384
904,191 UART: [kat] SHA2-512-ACC
906,092 UART: [kat] ECC-384
915,517 UART: [kat] HMAC-384Kdf
920,243 UART: [kat] LMS
1,168,555 UART: [kat] --
1,169,574 UART: [cold-reset] ++
1,169,962 UART: [fht] FHT @ 0x50003400
1,172,474 UART: [idev] ++
1,172,642 UART: [idev] CDI.KEYID = 6
1,173,003 UART: [idev] SUBJECT.KEYID = 7
1,173,428 UART: [idev] UDS.KEYID = 0
1,181,277 UART: [idev] Erasing UDS.KEYID = 0
1,198,172 UART: [idev] Sha384 KeyId Algorithm
1,201,851 UART: [idev] --
1,202,800 UART: [ldev] ++
1,202,968 UART: [ldev] CDI.KEYID = 6
1,203,332 UART: [ldev] SUBJECT.KEYID = 5
1,203,759 UART: [ldev] AUTHORITY.KEYID = 7
1,204,222 UART: [ldev] FE.KEYID = 1
1,209,182 UART: [ldev] Erasing FE.KEYID = 1
1,235,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,448 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,170 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,273,184 UART: [ldev] --
1,274,575 UART: [fwproc] Wait for Commands...
1,275,372 UART: [fwproc] Recv command 0x46574c44
1,276,105 UART: [fwproc] Recv'd Img size: 118548 bytes
2,619,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,771 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,677,946 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,818,341 >>> mbox cmd response: success
2,819,445 UART: [afmc] ++
2,819,613 UART: [afmc] CDI.KEYID = 6
2,819,976 UART: [afmc] SUBJECT.KEYID = 7
2,820,402 UART: [afmc] AUTHORITY.KEYID = 5
2,855,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,872,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,873,143 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,878,853 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,884,734 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,890,435 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,898,210 UART: [afmc] --
2,899,231 UART: [cold-reset] --
2,899,905 UART: [state] Locking Datavault
2,901,200 UART: [state] Locking PCR0, PCR1 and PCR31
2,901,804 UART: [state] Locking ICCM
2,902,286 UART: [exit] Launching FMC @ 0x40000130
2,907,616 UART:
2,907,632 UART: Running Caliptra FMC ...
2,908,040 UART:
2,908,094 UART: [state] CFI Enabled
2,918,686 UART: [fht] FMC Alias Private Key: 7
3,037,214 UART: [art] Extend RT PCRs Done
3,037,642 UART: [art] Lock RT PCRs Done
3,039,110 UART: [art] Populate DV Done
3,047,393 UART: [fht] FMC Alias Private Key: 7
3,048,559 UART: [art] Derive CDI
3,048,839 UART: [art] Store in slot 0x4
3,134,822 UART: [art] Derive Key Pair
3,135,182 UART: [art] Store priv key in slot 0x5
3,148,688 UART: [art] Derive Key Pair - Done
3,163,309 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,178,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,179,227 UART: [art] PUB.X = 875E991BE6E2FE762EBFE5BA35DD176EDF317BC2B0C333FA88D22F658B12D1BA2D30B2D9A22F5FE26D6498C2D8FC8F4F
3,186,021 UART: [art] PUB.Y = 676B64FF09C4B185E4E8B45A1CD7E2F351346A025B99CFA82303C7583D9A358FF2751126DF97CF9722BAA84C59DAA378
3,192,968 UART: [art] SIG.R = 04F871078ECBBB24FE26EC39571DCB8C2E72D8CFE953A2AA6CE7368F1B6972C8EEEB424D0B07F7C2FD4FDCF29A215ED3
3,199,752 UART: [art] SIG.S = F3C9D4ED7ED0EB82B7AB47198A483AC8A0678FC8BD0B373B9FB10B715BE6014514E73FF0FE9DB531AB4D37AF56AA0F0C
3,223,723 UART: Caliptra RT
3,223,974 UART: [state] CFI Enabled
3,344,330 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,831 UART: [state] WD Timer not started. Device not locked for debugging
88,126 UART: [kat] SHA2-256
891,676 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,780 UART: [kat] ++
895,932 UART: [kat] sha1
900,058 UART: [kat] SHA2-256
901,998 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,567 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,412 UART: [cold-reset] ++
1,170,870 UART: [fht] FHT @ 0x50003400
1,173,600 UART: [idev] ++
1,173,768 UART: [idev] CDI.KEYID = 6
1,174,129 UART: [idev] SUBJECT.KEYID = 7
1,174,554 UART: [idev] UDS.KEYID = 0
1,182,699 UART: [idev] Erasing UDS.KEYID = 0
1,199,808 UART: [idev] Fuse KeyId
1,201,030 UART: [idev] --
1,201,983 UART: [ldev] ++
1,202,151 UART: [ldev] CDI.KEYID = 6
1,202,515 UART: [ldev] SUBJECT.KEYID = 5
1,202,942 UART: [ldev] AUTHORITY.KEYID = 7
1,203,405 UART: [ldev] FE.KEYID = 1
1,208,599 UART: [ldev] Erasing FE.KEYID = 1
1,234,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,389 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,071 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,078 UART: [ldev] --
1,273,473 UART: [fwproc] Wait for Commands...
1,274,178 UART: [fwproc] Recv command 0x46574c44
1,274,911 UART: [fwproc] Recv'd Img size: 118548 bytes
2,619,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,537 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,677,712 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,817,909 >>> mbox cmd response: success
2,819,089 UART: [afmc] ++
2,819,257 UART: [afmc] CDI.KEYID = 6
2,819,620 UART: [afmc] SUBJECT.KEYID = 7
2,820,046 UART: [afmc] AUTHORITY.KEYID = 5
2,855,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,871,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,872,189 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,877,899 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,883,780 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,889,481 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,897,184 UART: [afmc] --
2,898,225 UART: [cold-reset] --
2,899,007 UART: [state] Locking Datavault
2,900,152 UART: [state] Locking PCR0, PCR1 and PCR31
2,900,756 UART: [state] Locking ICCM
2,901,252 UART: [exit] Launching FMC @ 0x40000130
2,906,582 UART:
2,906,598 UART: Running Caliptra FMC ...
2,907,006 UART:
2,907,060 UART: [state] CFI Enabled
2,917,528 UART: [fht] FMC Alias Private Key: 7
3,035,940 UART: [art] Extend RT PCRs Done
3,036,368 UART: [art] Lock RT PCRs Done
3,037,914 UART: [art] Populate DV Done
3,046,121 UART: [fht] FMC Alias Private Key: 7
3,047,229 UART: [art] Derive CDI
3,047,509 UART: [art] Store in slot 0x4
3,133,378 UART: [art] Derive Key Pair
3,133,738 UART: [art] Store priv key in slot 0x5
3,147,386 UART: [art] Derive Key Pair - Done
3,162,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,177,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,178,615 UART: [art] PUB.X = 64CB2B6FC641605EC9B807C141C11428C727B8A0CD161CA4712FAFAE15152E8E5DBA02E4092F9356790827915DE57BC9
3,185,377 UART: [art] PUB.Y = 0043DF7E185DB33DAFE5F31FBE0E21C5DFE9BE1ACD744C6B837A72A19925AF2D74AD5763BE7BB3D29676A3A46B1AC808
3,192,321 UART: [art] SIG.R = 98D27DD54E7D927AB0EED30AEB933C0D66478E65B80F3291EEDE5393BE53D5B88C10AD02FBE2174B3AD24D00DF7BF62B
3,199,077 UART: [art] SIG.S = D015AF7BCAF9E2B3AB13D3A9D43C81083C8A3440ABBC0B933C682451F82C18762E6D752E70C21C764239AEAB4B9442C7
3,222,217 UART: Caliptra RT
3,222,468 UART: [state] CFI Enabled
3,342,442 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,672 >>> mbox cmd response: success
2,738,383 UART:
2,738,399 UART: Running Caliptra FMC ...
2,738,807 UART:
2,738,861 UART: [state] CFI Enabled
2,749,621 UART: [fht] FMC Alias Private Key: 7
2,868,763 UART: [art] Extend RT PCRs Done
2,869,191 UART: [art] Lock RT PCRs Done
2,870,951 UART: [art] Populate DV Done
2,879,108 UART: [fht] FMC Alias Private Key: 7
2,880,228 UART: [art] Derive CDI
2,880,508 UART: [art] Store in slot 0x4
2,965,795 UART: [art] Derive Key Pair
2,966,155 UART: [art] Store priv key in slot 0x5
2,979,567 UART: [art] Derive Key Pair - Done
2,994,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,442 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,207 UART: [art] PUB.X = A780FD2423589553F4DC223973E6C66E19210BC5D0681F1928205400C20E74C445274CE01AC392BD5F94AF4DE0951C1D
3,016,945 UART: [art] PUB.Y = ADB89CCB7B471E131C91A69528267777A62E5B873CD8A3FA3FB59F6681303110FDCF8DBD5FE7FD4F1D2FAB811E3D98E3
3,023,913 UART: [art] SIG.R = A1A003DE59B6A1ECAE8C6FF6070EDDCD1C1FF66B195FC39B0D8533BCDC6F03435EBC53C088F4D88C998923E5B6B0934F
3,030,690 UART: [art] SIG.S = 401BC451A8E39165626338B700A5B45DF2EEF9439686CC0E8061C4FF3EF07E16434A49F20FE87CAB4354012AB0256AC1
3,054,075 UART: Caliptra RT
3,054,326 UART: [state] CFI Enabled
3,173,599 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,904 >>> mbox cmd response: success
2,736,489 UART:
2,736,505 UART: Running Caliptra FMC ...
2,736,913 UART:
2,736,967 UART: [state] CFI Enabled
2,747,561 UART: [fht] FMC Alias Private Key: 7
2,866,871 UART: [art] Extend RT PCRs Done
2,867,299 UART: [art] Lock RT PCRs Done
2,869,041 UART: [art] Populate DV Done
2,877,266 UART: [fht] FMC Alias Private Key: 7
2,878,204 UART: [art] Derive CDI
2,878,484 UART: [art] Store in slot 0x4
2,963,853 UART: [art] Derive Key Pair
2,964,213 UART: [art] Store priv key in slot 0x5
2,977,479 UART: [art] Derive Key Pair - Done
2,991,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,869 UART: [art] PUB.X = 0F0AFAB417FE498252877116FC53F541996BDBE7A44AC0079C1395D4E30C77797D2B2339C5A6D965941BFFFE58E50ABD
3,014,632 UART: [art] PUB.Y = 7B7AA26CBBC0D5F3208345E9089E0D92B431E8664FF1FE5A206BF0F3EA495F2BCFE836B2488A51427E363965CB0F69F9
3,021,583 UART: [art] SIG.R = 3D2B066342FA562A995B1750A65D5DEEDE1FDB824C6D4DFED94044D6675D27DC2780849A5B1DCC41FA9FEA1FF07E08ED
3,028,367 UART: [art] SIG.S = 7C48339210C07F75784CF0136945BF3A76CD2F4F09B76161012A4647390FB9D116233930A740DD8841D0E90A4217C6E3
3,052,019 UART: Caliptra RT
3,052,270 UART: [state] CFI Enabled
3,172,603 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,770 >>> mbox cmd response: success
2,735,343 UART:
2,735,359 UART: Running Caliptra FMC ...
2,735,767 UART:
2,735,821 UART: [state] CFI Enabled
2,746,373 UART: [fht] FMC Alias Private Key: 7
2,865,011 UART: [art] Extend RT PCRs Done
2,865,439 UART: [art] Lock RT PCRs Done
2,867,003 UART: [art] Populate DV Done
2,875,428 UART: [fht] FMC Alias Private Key: 7
2,876,508 UART: [art] Derive CDI
2,876,788 UART: [art] Store in slot 0x4
2,962,809 UART: [art] Derive Key Pair
2,963,169 UART: [art] Store priv key in slot 0x5
2,976,487 UART: [art] Derive Key Pair - Done
2,991,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,006,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,490 UART: [art] PUB.X = 234B966AF736BB96DB0D16D9268569E38DA088A302ADC9346A9B627C29E80A7AAC4CE3CFE9FE62906D281DEBBC850217
3,014,260 UART: [art] PUB.Y = AF549706A0C527BBE5B34DF755DACC1B09C31E2089470526376E652DA6411DEEF8208759F85BD7817772B5845538D8E7
3,021,199 UART: [art] SIG.R = 524882DA8B0D1873DC12F2A6313873B4C7948C9EA1968D09BEA2ABB0FFF184C857A0056FA41BF599AFF28AA259ACA23A
3,027,974 UART: [art] SIG.S = EBC70CD073D8DB7BF85A00149C65E44FDC6A89FF3038069201C255522190037AFF5F008615FF8D9912216B06E0517FD5
3,052,277 UART: Caliptra RT
3,052,528 UART: [state] CFI Enabled
3,172,670 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,671,673 >>> mbox cmd response: success
2,733,330 UART:
2,733,346 UART: Running Caliptra FMC ...
2,733,754 UART:
2,733,808 UART: [state] CFI Enabled
2,744,432 UART: [fht] FMC Alias Private Key: 7
2,863,098 UART: [art] Extend RT PCRs Done
2,863,526 UART: [art] Lock RT PCRs Done
2,865,306 UART: [art] Populate DV Done
2,873,883 UART: [fht] FMC Alias Private Key: 7
2,874,959 UART: [art] Derive CDI
2,875,239 UART: [art] Store in slot 0x4
2,960,882 UART: [art] Derive Key Pair
2,961,242 UART: [art] Store priv key in slot 0x5
2,974,084 UART: [art] Derive Key Pair - Done
2,988,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,004,421 UART: [art] Erasing AUTHORITY.KEYID = 7
3,005,186 UART: [art] PUB.X = F5914625D1DB33F35A2A31943FF25A27F81740F4B73D8DD3BC6F71F2B2961B23D08EB66DCA59FFD98757AE68C3229695
3,011,962 UART: [art] PUB.Y = B96A107CF66F0CC6ABAA7D64E116CA79BDB56D060C80E6940993B13F73B61247583D96C40A204C1CF4EB65E5B6047795
3,018,900 UART: [art] SIG.R = 1342C36514CB49BE25B62A03E41C7C1D21D476C5B2E2A6D02628265CE382B9ADBC2ED929B2CC2866DFE3640D72B6FF8D
3,025,676 UART: [art] SIG.S = FE74E495570EB4704E8CE5E0565E4DBA6788F2709B2E7B6CD0212DE44C04BC98BC7A550EF4D85B11ACB79A6B799071DB
3,049,975 UART: Caliptra RT
3,050,226 UART: [state] CFI Enabled
3,168,631 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.35s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,893,252 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,901,055 UART: [afmc] --
2,901,888 UART: [cold-reset] --
2,902,608 UART: [state] Locking Datavault
2,903,835 UART: [state] Locking PCR0, PCR1 and PCR31
2,904,439 UART: [state] Locking ICCM
2,904,937 UART: [exit] Launching FMC @ 0x40000130
2,910,267 UART:
2,910,283 UART: Running Caliptra FMC ...
2,910,691 UART:
2,910,834 UART: [state] CFI Enabled
2,921,426 UART: [fht] FMC Alias Private Key: 7
3,040,788 UART: [art] Extend RT PCRs Done
3,041,216 UART: [art] Lock RT PCRs Done
3,042,816 UART: [art] Populate DV Done
3,050,937 UART: [fht] FMC Alias Private Key: 7
3,051,983 UART: [art] Derive CDI
3,052,263 UART: [art] Store in slot 0x4
3,138,274 UART: [art] Derive Key Pair
3,138,634 UART: [art] Store priv key in slot 0x5
3,152,252 UART: [art] Derive Key Pair - Done
3,166,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,374 UART: [art] PUB.X = 8F9CB2106E60B2AFD197778B4D7967694F5BD4CA5D8E316729C18C98600CA99A910FD2259F3C4E1CA0CFDCEF652658DE
3,190,150 UART: [art] PUB.Y = 1952B231CC3B211F860A0A67D5E1CAD61A1CFBA642E18BBFB9C683D071B0A63273450EF1B21D52DA3116AC303BD5F617
3,197,103 UART: [art] SIG.R = 6193C13A0CD4B071935ECF34F678A27465076DE599F9FD154761FEC1361E673911B6996EDDBFAED517D8CF1E8BE33A0D
3,203,874 UART: [art] SIG.S = B38F7A4FA032A1B19445E61A09FC1249D4AD1E383AD0E776510B0677C8C01C25049E28DF420B4C9482BC64958E4E964D
3,227,559 UART: Caliptra RT
3,227,902 UART: [state] CFI Enabled
3,347,470 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
891,123 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,227 UART: [kat] ++
895,379 UART: [kat] sha1
899,559 UART: [kat] SHA2-256
901,499 UART: [kat] SHA2-384
904,264 UART: [kat] SHA2-512-ACC
906,165 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,169,993 UART: [cold-reset] ++
1,170,465 UART: [fht] FHT @ 0x50003400
1,173,167 UART: [idev] ++
1,173,335 UART: [idev] CDI.KEYID = 6
1,173,696 UART: [idev] SUBJECT.KEYID = 7
1,174,121 UART: [idev] UDS.KEYID = 0
1,181,962 UART: [idev] Erasing UDS.KEYID = 0
1,198,963 UART: [idev] Sha384 KeyId Algorithm
1,202,908 UART: [idev] --
1,203,881 UART: [ldev] ++
1,204,049 UART: [ldev] CDI.KEYID = 6
1,204,413 UART: [ldev] SUBJECT.KEYID = 5
1,204,840 UART: [ldev] AUTHORITY.KEYID = 7
1,205,303 UART: [ldev] FE.KEYID = 1
1,210,645 UART: [ldev] Erasing FE.KEYID = 1
1,237,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,262,133 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,855 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,769 UART: [ldev] --
1,276,088 UART: [fwproc] Wait for Commands...
1,276,823 UART: [fwproc] Recv command 0x46574c44
1,277,556 UART: [fwproc] Recv'd Img size: 118548 bytes
2,620,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,522 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,679,697 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,819,934 >>> mbox cmd response: success
2,820,948 UART: [afmc] ++
2,821,116 UART: [afmc] CDI.KEYID = 6
2,821,479 UART: [afmc] SUBJECT.KEYID = 7
2,821,905 UART: [afmc] AUTHORITY.KEYID = 5
2,858,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,874,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,875,656 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,881,366 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,887,247 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,892,948 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,900,743 UART: [afmc] --
2,901,652 UART: [cold-reset] --
2,902,456 UART: [state] Locking Datavault
2,903,509 UART: [state] Locking PCR0, PCR1 and PCR31
2,904,113 UART: [state] Locking ICCM
2,904,769 UART: [exit] Launching FMC @ 0x40000130
2,910,099 UART:
2,910,115 UART: Running Caliptra FMC ...
2,910,523 UART:
2,910,666 UART: [state] CFI Enabled
2,921,338 UART: [fht] FMC Alias Private Key: 7
3,040,596 UART: [art] Extend RT PCRs Done
3,041,024 UART: [art] Lock RT PCRs Done
3,042,430 UART: [art] Populate DV Done
3,050,685 UART: [fht] FMC Alias Private Key: 7
3,051,819 UART: [art] Derive CDI
3,052,099 UART: [art] Store in slot 0x4
3,138,280 UART: [art] Derive Key Pair
3,138,640 UART: [art] Store priv key in slot 0x5
3,152,150 UART: [art] Derive Key Pair - Done
3,166,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,030 UART: [art] PUB.X = 9FEA5941FFC3C25A62D07553C6BC3BC29F76E317583A265A570A35DA453042FFF5EE3E38611A30905422B39A0BBD5A15
3,189,800 UART: [art] PUB.Y = 19D4A4EFAEF4CABEA05BC7625282BDD5AC51F67243B898B2753F543BF59DB933DED836577E6975A1699D9DCD274CE673
3,196,764 UART: [art] SIG.R = 7514A97D545AEA2E0137D5AEA665E6A4B48E8CDD680CD14115AEA95BEA3FE93B2C9C66F2CC6255C571C6F30CDB2C3EC3
3,203,547 UART: [art] SIG.S = 44EE73A363BEB851687F8637467F64A612D32C070CD67F7288A5E441BE5DAC1E6A85F4EA9B5A07D60E35130E71EAC46C
3,227,194 UART: Caliptra RT
3,227,537 UART: [state] CFI Enabled
3,348,194 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,977 UART: [state] LifecycleState = Unprovisioned
86,632 UART: [state] DebugLocked = No
87,178 UART: [state] WD Timer not started. Device not locked for debugging
88,447 UART: [kat] SHA2-256
891,997 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,101 UART: [kat] ++
896,253 UART: [kat] sha1
900,725 UART: [kat] SHA2-256
902,665 UART: [kat] SHA2-384
905,290 UART: [kat] SHA2-512-ACC
907,191 UART: [kat] ECC-384
917,074 UART: [kat] HMAC-384Kdf
921,770 UART: [kat] LMS
1,170,082 UART: [kat] --
1,170,835 UART: [cold-reset] ++
1,171,267 UART: [fht] FHT @ 0x50003400
1,173,733 UART: [idev] ++
1,173,901 UART: [idev] CDI.KEYID = 6
1,174,262 UART: [idev] SUBJECT.KEYID = 7
1,174,687 UART: [idev] UDS.KEYID = 0
1,182,822 UART: [idev] Erasing UDS.KEYID = 0
1,199,481 UART: [idev] Fuse KeyId
1,200,703 UART: [idev] --
1,201,764 UART: [ldev] ++
1,201,932 UART: [ldev] CDI.KEYID = 6
1,202,296 UART: [ldev] SUBJECT.KEYID = 5
1,202,723 UART: [ldev] AUTHORITY.KEYID = 7
1,203,186 UART: [ldev] FE.KEYID = 1
1,208,468 UART: [ldev] Erasing FE.KEYID = 1
1,234,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,716 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,398 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,465 UART: [ldev] --
1,273,672 UART: [fwproc] Wait for Commands...
1,274,451 UART: [fwproc] Recv command 0x46574c44
1,275,184 UART: [fwproc] Recv'd Img size: 118548 bytes
2,620,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,647,972 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,679,147 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,819,360 >>> mbox cmd response: success
2,820,586 UART: [afmc] ++
2,820,754 UART: [afmc] CDI.KEYID = 6
2,821,117 UART: [afmc] SUBJECT.KEYID = 7
2,821,543 UART: [afmc] AUTHORITY.KEYID = 5
2,856,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,872,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,873,674 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,879,384 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,885,265 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,890,966 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,898,629 UART: [afmc] --
2,899,564 UART: [cold-reset] --
2,900,494 UART: [state] Locking Datavault
2,901,369 UART: [state] Locking PCR0, PCR1 and PCR31
2,901,973 UART: [state] Locking ICCM
2,902,525 UART: [exit] Launching FMC @ 0x40000130
2,907,855 UART:
2,907,871 UART: Running Caliptra FMC ...
2,908,279 UART:
2,908,422 UART: [state] CFI Enabled
2,919,250 UART: [fht] FMC Alias Private Key: 7
3,038,348 UART: [art] Extend RT PCRs Done
3,038,776 UART: [art] Lock RT PCRs Done
3,040,216 UART: [art] Populate DV Done
3,048,299 UART: [fht] FMC Alias Private Key: 7
3,049,465 UART: [art] Derive CDI
3,049,745 UART: [art] Store in slot 0x4
3,135,576 UART: [art] Derive Key Pair
3,135,936 UART: [art] Store priv key in slot 0x5
3,149,316 UART: [art] Derive Key Pair - Done
3,164,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,179,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,180,034 UART: [art] PUB.X = F64E52B68C50AEC19DA48A70AA95A3C71977F5D4082A296314459EBC714CDC57A74E941162D6486A97F0B427684C8AC9
3,186,803 UART: [art] PUB.Y = FDA88B1FCABA06FF57FC9771789F53A5B9EED5812E722C249271D6CE086B0A8FDA84C9A8163D414BB112C6CC160FCFE7
3,193,761 UART: [art] SIG.R = 6CEA5E7774F1ABB77A024AEE3BAAD510E533CA991410701C0529A6B0E4CD8C93668591B428DC0C077E4FEB167F256423
3,200,527 UART: [art] SIG.S = 8AEDA8704F05804E998FF3EF31333B027DE589B598336FA2ECBEE3C5B25BA64973DEB0CD3BE1D1FDBB32E6A03F459526
3,224,211 UART: Caliptra RT
3,224,554 UART: [state] CFI Enabled
3,344,293 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,153 >>> mbox cmd response: success
2,742,024 UART:
2,742,040 UART: Running Caliptra FMC ...
2,742,448 UART:
2,742,591 UART: [state] CFI Enabled
2,753,177 UART: [fht] FMC Alias Private Key: 7
2,871,873 UART: [art] Extend RT PCRs Done
2,872,301 UART: [art] Lock RT PCRs Done
2,873,707 UART: [art] Populate DV Done
2,881,754 UART: [fht] FMC Alias Private Key: 7
2,882,724 UART: [art] Derive CDI
2,883,004 UART: [art] Store in slot 0x4
2,968,993 UART: [art] Derive Key Pair
2,969,353 UART: [art] Store priv key in slot 0x5
2,982,651 UART: [art] Derive Key Pair - Done
2,997,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,029 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,794 UART: [art] PUB.X = A59F56B13C2FEA893DB73DCCABC24019BE20EE3CD5B357CA368B0DF89753E58F2919C9441C584C14247086F6F4CAEF3C
3,020,577 UART: [art] PUB.Y = 1371C9A5226858A4D0B5D38CD394E9E0E38A4FD2AEAC3A0DC3ED1E4B972E5BD6DA738693D162A211E4452AA76CE02F0F
3,027,537 UART: [art] SIG.R = 442386214AB99F43DCDD9BF62B4B709AD95376F4FF2FEA263D41A243E631D2464D28B481EBE9877AF43552B4CB278F68
3,034,313 UART: [art] SIG.S = 1A4244C910F47A4B0565A4A334AFE744353700158DB8E5A6778EDD3D1387121581FBA7FF454C41F5663D572EE3BF6239
3,058,084 UART: Caliptra RT
3,058,427 UART: [state] CFI Enabled
3,178,219 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,673,203 >>> mbox cmd response: success
2,735,458 UART:
2,735,474 UART: Running Caliptra FMC ...
2,735,882 UART:
2,736,025 UART: [state] CFI Enabled
2,746,755 UART: [fht] FMC Alias Private Key: 7
2,865,805 UART: [art] Extend RT PCRs Done
2,866,233 UART: [art] Lock RT PCRs Done
2,867,709 UART: [art] Populate DV Done
2,876,020 UART: [fht] FMC Alias Private Key: 7
2,877,016 UART: [art] Derive CDI
2,877,296 UART: [art] Store in slot 0x4
2,962,663 UART: [art] Derive Key Pair
2,963,023 UART: [art] Store priv key in slot 0x5
2,976,541 UART: [art] Derive Key Pair - Done
2,990,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,006,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,455 UART: [art] PUB.X = 66643680104102EE99A6F17037A9FFCC56A04F2DAAB79166FAADBDB4713A17433B914336DD11E44C46A7E1B8A0429210
3,014,224 UART: [art] PUB.Y = 10DFB67C4FA7547B0AE0325200A4878C02B53C7EF7A78554B98EEEC6EA510EF899EAD276177E840FB459CF227D8DF7E9
3,021,152 UART: [art] SIG.R = 9056A8BB1E0A4F1ED07CC3D2E3EEDE641B59EAFC4409E52607C31D55AF58BD0B87F337488F08D4DF0E8A21F9643153F2
3,027,918 UART: [art] SIG.S = 0E33ED68FBD08B4ED002A18E5BCA75D029ACE2CDB101928ACFB2CEADF5B38636774CA624E150B995A26CC06E8AFDABB3
3,052,083 UART: Caliptra RT
3,052,426 UART: [state] CFI Enabled
3,173,018 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,673,011 >>> mbox cmd response: success
2,735,426 UART:
2,735,442 UART: Running Caliptra FMC ...
2,735,850 UART:
2,735,993 UART: [state] CFI Enabled
2,746,875 UART: [fht] FMC Alias Private Key: 7
2,865,827 UART: [art] Extend RT PCRs Done
2,866,255 UART: [art] Lock RT PCRs Done
2,867,725 UART: [art] Populate DV Done
2,876,132 UART: [fht] FMC Alias Private Key: 7
2,877,106 UART: [art] Derive CDI
2,877,386 UART: [art] Store in slot 0x4
2,963,363 UART: [art] Derive Key Pair
2,963,723 UART: [art] Store priv key in slot 0x5
2,977,557 UART: [art] Derive Key Pair - Done
2,992,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,618 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,383 UART: [art] PUB.X = C78C8BAE3F61D4709F499E3E383AC054B2BF5C929F1B835B251D2BEF0C459B5DDFCDB26E77573C037DA9A331C277CF03
3,015,160 UART: [art] PUB.Y = C77CDC1D7A81507B6C6E581F6C1232BF80575A4BB7D99D6CB5F9B59962FFDDC06E9D5B24377C0345201333CCC53475E3
3,022,115 UART: [art] SIG.R = ABAA2F3424B5D83B5D21622E44BACE82769FF20314C7F659A13E5C0264A9402D7AE789FB5389B873FFBF7F47C0FD7C07
3,028,888 UART: [art] SIG.S = 242A8F0CE288C48014A3EA3D0C76456787A34C05D4AFE67758954A79D887FF575F6F751485BD6E869B6A5F1910EBA1E6
3,052,731 UART: Caliptra RT
3,053,074 UART: [state] CFI Enabled
3,172,984 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,671,714 >>> mbox cmd response: success
2,733,601 UART:
2,733,617 UART: Running Caliptra FMC ...
2,734,025 UART:
2,734,168 UART: [state] CFI Enabled
2,744,998 UART: [fht] FMC Alias Private Key: 7
2,863,870 UART: [art] Extend RT PCRs Done
2,864,298 UART: [art] Lock RT PCRs Done
2,865,942 UART: [art] Populate DV Done
2,874,271 UART: [fht] FMC Alias Private Key: 7
2,875,313 UART: [art] Derive CDI
2,875,593 UART: [art] Store in slot 0x4
2,961,028 UART: [art] Derive Key Pair
2,961,388 UART: [art] Store priv key in slot 0x5
2,974,838 UART: [art] Derive Key Pair - Done
2,989,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,004,823 UART: [art] Erasing AUTHORITY.KEYID = 7
3,005,588 UART: [art] PUB.X = 259ABCFC176C893A97E54E1D27C9601BF9BAA7403AE2D7C3D5BB8F6338172DF0D3C12219B37C6FE8AAF8D84C600428D6
3,012,369 UART: [art] PUB.Y = D2552EAF1900229EE42F0ECF7D4A9BB8F2AD7C2BEDD7AF96977A8335C6BC808791DE75508181A7B88CA643F73AB787B4
3,019,308 UART: [art] SIG.R = FFEEDC3A1942738E42C34A4DD5C56108D58D47A94EF4A5D69F073D555430B0DA613F5C3082745510CEE5B3779BE4A21D
3,026,080 UART: [art] SIG.S = 3A78D20782377BBBAD9BF25C4A4C94C9B43B55C667BF7AE9FEF7532D34933E78AC874EC140026164CEFF4944E3BE7689
3,049,624 UART: Caliptra RT
3,049,967 UART: [state] CFI Enabled
3,169,764 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.94s
Truncated 7920 bytes from beginning
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
* TESTCASE PASSED
20,785,154 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 12:00:07 2025 GMT
Not After : Dec 26 12:00:07 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c4:cc:ac:d7:6f:b5:12:f3:06:58:1d:ac:91:df:
ca:c0:c5:ca:25:9c:02:7b:f8:47:ab:64:6b:04:53:
c2:51:59:09:f4:f6:75:10:23:3b:25:7c:bc:16:fe:
b9:fc:d2:bc:46:08:77:88:ed:d0:f5:1b:64:0b:d0:
46:a2:e1:1c:45:01:f0:e3:1d:83:11:19:9f:e2:10:
a4:e3:95:af:65:f8:4d:82:fd:d7:6b:9b:98:03:77:
58:70:14:ec:b9:45:b0:b1:34:2c:3b:43:35:9f:8c:
f4:d7:e4:b8:45:cd:2c:e8:eb:e1:f1:47:26:f3:53:
37:0e:4d:50:97:f4:6a:0d:00:4b:5a:14:67:8f:0c:
75:ec:f3:88:24:bc:64:05:06:0d:c3:14:36:8b:80:
89:b5:b1:25:18:ef:b6:01:93:66:70:b9:cd:9e:b3:
0f:74:6d:6b:2c:12:c8:0f:f7:66:1f:5f:3c:ab:9b:
19:18:00:bc:a4:62:af:e6:aa:5a:55:54:ec:73:c6:
71:f4:ca:50:9f:be:e0:8a:7f:6d:46:9f:ae:24:88:
24:17:44:3c:c2:62:3e:90:39:e7:44:be:fc:64:f7:
fd:73:49:bb:b2:61:3d:ee:7a:17:65:2f:98:d3:6e:
53:8b:d0:c2:e4:6b:11:fe:48:14:db:62:5b:5d:8b:
74:33
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7d:8c:50:32:3e:c0:8a:26:fd:28:6f:b3:73:9f:9e:04:69:e7:
06:57:ad:58:0f:40:87:fd:ad:22:dd:e0:b6:3a:ba:51:36:e2:
df:89:df:bc:54:e5:c0:79:52:77:6f:8a:9a:3b:d0:80:6f:b0:
8e:b8:37:1b:8d:1c:64:52:a9:af:cd:57:93:8e:f8:88:20:8c:
61:b4:10:a8:8b:08:f4:59:aa:01:24:b5:77:8b:9d:e4:ae:c0:
f9:94:a6:83:6f:71:27:a8:c8:ba:5c:ad:ac:27:19:70:a3:82:
a5:7f:a5:c5:bd:da:2a:91:ff:91:c6:1d:3f:90:a9:8c:1d:dc:
fd:b8:a9:6a:78:66:0e:a3:f6:87:dd:f5:5a:74:d7:7a:53:54:
b9:b1:d0:c3:3a:5c:6b:9c:08:57:78:fe:6b:22:83:16:f6:10:
26:64:7e:15:48:f6:47:f7:13:00:b9:09:d2:b5:d7:c6:4c:5c:
81:64:7a:77:0e:ee:05:36:7f:69:ff:0b:4f:c8:63:68:84:7b:
fa:80:2f:00:a7:f4:60:79:a2:12:83:88:c5:5c:7c:a1:a5:22:
f4:9f:e5:2e:06:a6:c3:d5:07:42:ba:79:f8:a4:87:fe:88:cb:
88:bd:dc:0b:20:87:59:91:0d:c9:20:ea:d3:d1:a4:2c:bc:57:
e3:ba:ea:e0
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 12:00:07 2025 GMT
Not After : Nov 27 12:00:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
30:f6:c6:0f:18:a3:27:bd:59:6d:1e:99:5d:4d:ad:44:93:f4:
3f:28:2b:0f:82:78:10:05:ee:6a:fc:bf:5c:f7:8e:aa:59:bd:
28:b0:35:3b:b7:94:7d:68:f4:e7:60:55:9c:6a:98:35:ce:c2:
f8:e0:d3:93:f3:e5:86:7f:98:eb:e4:46:99:88:3d:eb:c7:f6:
72:e9:b3:92:cb:00:fb:d2:aa:79:2c:96:8c:79:c3:39:d8:49:
41:36:53:84:ec:86:5e:8d:d1:17:e5:e4:e6:67:63:9f:b6:6d:
9e:7c:a1:20:b9:e7:70:80:22:12:e4:6e:e9:e8:e6:38:41:ac:
dd:df:39:12:a3:b6:89:94:a3:d5:15:f6:b7:0c:a7:f6:1b:d9:
88:f7:41:fb:1a:b7:84:30:c1:ae:61:55:c1:a9:f1:8b:58:14:
fc:7b:cf:2a:7d:ef:05:e1:2f:ff:fb:e9:e4:0d:05:c9:12:5b:
1c:ec:e6:c4:d1:19:8f:e6:01:1b:50:75:98:5d:1f:50:2a:21:
10:ef:65:dc:47:e6:84:63:19:48:f3:8d:6f:a9:97:d2:83:a1:
24:e7:b0:8c:6b:22:51:14:75:67:32:8c:7d:56:90:d9:d2:32:
f3:9a:bc:fa:6b:a4:6b:46:6c:d0:56:a0:ca:36:29:48:b8:5d:
2b:3d:ab:da
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.36s
Truncated 3124 bytes from beginning
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mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:52:50 2025 GMT
Not After : Dec 26 10:52:50 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ec:f8:68:9d:14:7b:35:55:0c:4d:1c:df:22:03:
30:0e:a1:04:03:29:ac:95:79:d5:ec:fc:5d:d0:86:
a6:80:2d:44:3e:25:6e:42:e0:69:33:a5:51:ae:3d:
7a:af:80:1f:fe:03:97:ef:62:4b:b3:d0:5c:f5:92:
01:84:95:11:e2:2e:3a:76:f0:f3:f2:b2:b7:2f:67:
60:b3:26:76:30:1c:37:25:ec:72:e7:20:5a:a2:83:
b7:b3:30:71:48:7e:59:89:4e:11:c1:68:7a:89:7f:
26:6e:6b:07:e6:7e:5a:eb:c0:08:aa:87:8e:21:a7:
c6:67:6a:35:10:d3:85:8f:9a:8c:2c:5f:00:b4:29:
67:1d:5e:7c:6d:03:1d:ce:69:59:df:de:3e:f2:48:
e1:f6:8a:3b:fc:fa:57:52:72:d4:19:ca:78:2f:aa:
4b:87:34:34:6f:4e:44:41:b3:e2:9f:91:4c:78:36:
fa:0b:aa:2a:be:db:e9:57:9a:1c:05:39:c1:44:fd:
9e:4d:39:b1:6d:87:43:da:98:96:56:d6:d0:85:36:
eb:65:1c:a6:da:41:f6:b4:97:0f:3e:d8:2b:fa:b0:
7a:15:68:d5:69:51:de:18:4b:cb:09:e3:f7:49:35:
b4:d9:68:00:d8:97:45:d3:5e:7a:7a:c6:0e:32:87:
1a:79
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
61:c4:43:02:ee:af:f5:96:5f:9f:e3:4a:d3:ec:56:96:1a:de:
b0:c4:83:ab:1f:38:e6:ca:8a:b9:69:65:2e:2b:31:6c:0c:19:
0d:11:d4:c6:f7:58:f9:e8:bf:5b:7c:d7:20:5d:91:4c:b5:fc:
90:0a:e3:6b:c0:7c:ac:53:49:1e:a5:ed:e1:65:87:4a:27:b5:
cf:49:e4:51:15:fb:fb:45:b6:22:5c:86:c4:30:a9:c1:e6:fe:
d7:23:ac:a7:17:a4:5c:df:1f:1b:8a:3e:ea:f6:32:a1:bf:ff:
65:dd:f6:ed:35:46:2e:e0:95:0f:85:76:54:00:6c:f8:16:e5:
12:de:97:85:c3:09:d4:fe:bb:94:d1:17:96:2e:20:30:02:44:
8a:c6:c2:79:4e:86:d0:ce:79:7d:31:22:f4:16:f7:07:8e:18:
8a:94:0b:b5:8e:28:28:cc:ed:32:35:b5:2b:c8:da:16:b0:76:
c9:d0:a2:ff:c5:51:a8:42:e5:84:f3:af:e9:4d:4b:76:24:89:
e6:9c:ed:f5:d3:70:3f:35:55:04:7e:91:09:83:26:75:a8:95:
ca:df:13:88:38:98:7c:08:a0:5b:44:dd:2f:57:53:ae:70:11:
24:53:b3:6a:5a:72:53:82:d4:d4:ab:75:c1:ba:c3:f4:40:c0:
d6:84:fb:07
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:52:51 2025 GMT
Not After : Nov 27 10:52:51 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6c:a6:11:8f:4d:e0:e3:b7:40:7a:3e:e5:35:45:e1:c4:ab:73:
64:7b:4e:5b:d1:73:5c:5a:c2:6f:09:e0:99:c1:28:34:c4:a0:
f8:03:10:1c:c1:35:50:31:d5:6b:62:97:34:96:81:9e:2a:11:
0f:0c:0e:b1:8f:f3:5a:5c:bd:4d:cb:ae:bf:e7:2c:ea:49:54:
f3:25:c5:5f:fe:c7:16:b2:24:bd:48:52:d5:ea:32:d6:21:5c:
81:21:a9:ba:6d:58:59:41:b1:a7:de:8f:a7:77:6a:4a:36:23:
7e:a4:81:b9:c1:6f:f3:68:a3:1c:c6:79:cb:e3:76:1e:cf:ed:
b1:8a:e8:c0:95:75:fd:ea:ee:39:c4:86:eb:7f:13:07:0d:76:
16:1f:6d:4d:bc:a4:b4:6d:35:c3:1f:25:d6:d6:e6:79:73:f9:
e2:f9:c6:17:05:c9:0b:4c:59:92:fd:83:65:37:8f:05:67:58:
97:d8:88:38:fd:41:90:34:9e:13:7f:bc:d5:9a:3f:9c:88:5f:
29:05:9d:a4:b4:7d:47:2d:ee:ba:d2:e5:db:50:33:5e:2c:73:
f4:ab:40:58:36:39:0f:22:b9:79:ec:1f:7c:3a:ba:dd:57:d2:
58:76:32:29:7a:9b:0c:0f:e4:a3:57:97:7a:01:bd:e8:e7:e0:
e4:41:f8:b5
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.48s
Truncated 7920 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
20,946,093 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 11:14:35 2025 GMT
Not After : Dec 26 11:14:35 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c7:da:63:52:bb:4d:5c:52:c9:6c:20:2d:06:e1:
57:ec:38:8b:ff:0d:26:14:24:d6:5c:18:a1:97:ff:
c9:ef:10:85:ad:31:ed:a4:3a:75:21:13:85:0a:67:
26:ac:e0:c9:c3:01:f9:14:f6:2c:5d:32:79:53:c0:
f6:cb:9c:92:45:e6:84:77:4e:e1:3b:c0:ea:7f:88:
bf:9f:05:19:f6:72:ac:cd:95:e3:0c:c4:84:32:98:
ce:1c:5b:2e:e0:a4:af:27:dd:73:a1:65:4f:0f:a8:
74:cd:36:ba:f1:15:51:d4:2b:8c:ce:b9:12:a9:81:
db:e0:45:63:90:d0:f5:0b:bc:09:1b:f0:a4:0e:c7:
49:a8:3d:6a:8a:f2:f8:03:93:bd:b6:0c:4c:4f:e4:
4b:37:3a:dd:d3:20:ca:21:09:d8:6b:b2:33:ff:2f:
d2:ba:2f:1d:96:e4:0a:ab:13:39:86:5c:78:18:9a:
38:09:92:de:cb:c1:3e:eb:f3:36:be:13:76:89:5f:
9d:52:35:24:e4:3d:a3:2d:7f:50:5d:1f:f5:b9:d1:
98:a7:42:c3:1c:83:84:cd:fd:69:cc:80:e0:ce:27:
65:de:ad:fa:aa:7a:e1:04:6b:57:3a:62:1b:a1:9b:
06:ee:9c:a2:3c:c6:c0:f1:7d:14:de:a7:ad:15:fe:
cb:ab
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c3:f2:35:64:b8:42:27:49:03:c5:6b:35:6f:42:d0:04:00:a7:
44:28:7f:c3:37:fe:f4:35:b2:de:86:64:7d:b6:93:21:c7:ba:
25:34:f8:c9:2d:a5:9b:10:6b:43:f3:ec:d9:fd:34:38:94:ce:
93:cd:bd:a4:55:24:45:92:16:77:20:73:d0:6d:9f:aa:a4:aa:
b4:5f:a3:ba:f7:43:e1:99:90:e3:b3:b4:aa:e9:f2:42:a1:71:
5d:a6:d8:b6:49:6c:ba:4c:f4:95:21:e3:09:67:72:a1:a2:34:
2b:98:1a:bd:91:af:24:29:f5:67:1a:ee:17:50:1c:49:1d:35:
d9:b0:ac:26:f7:1b:71:d8:74:60:9c:94:7a:bc:55:be:33:af:
43:5b:b5:cd:a4:26:16:b9:a7:ad:10:a4:c0:ae:96:46:cf:6a:
29:2f:c1:88:ef:6c:bf:94:20:5a:0a:94:c9:25:3f:76:60:e2:
59:0f:a4:62:67:69:61:9d:63:34:f4:3a:47:85:71:7e:00:0d:
56:75:3e:3a:6f:74:cb:f2:ab:94:aa:d0:d6:86:47:4a:bc:27:
87:73:00:ad:c6:eb:b9:f1:9b:e2:45:10:36:91:33:d7:de:7b:
3a:90:67:d4:8d:3e:a1:ad:5f:ba:3d:a8:d7:a5:fe:10:b8:cf:
7d:5a:47:46
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 11:14:35 2025 GMT
Not After : Nov 27 11:14:35 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
16:c0:3f:14:a9:5a:58:8b:75:3b:c7:8b:d2:ae:ac:7e:a2:8a:
6e:0d:7f:c4:9a:7a:90:1f:91:78:e3:c7:3e:d6:35:13:a5:2d:
cd:c4:76:22:02:a0:4d:bc:24:1b:ef:ba:d3:66:cf:7c:cb:b9:
4e:1e:bf:03:e6:ca:87:0a:5e:78:97:41:ac:dc:ca:9e:03:b9:
ac:7f:9c:97:29:49:32:f4:39:02:11:d2:cb:c0:28:03:91:b8:
bd:16:60:b6:95:83:dd:a9:97:7b:4d:32:06:57:c4:c7:9d:b7:
63:ea:f8:42:4e:aa:a8:c6:e1:12:5c:44:80:b3:2f:92:0a:74:
e0:0e:2a:f8:52:6c:4c:e1:e0:c5:12:0c:b0:f5:bc:da:fd:38:
f1:f3:74:ee:17:b3:44:ba:9c:f2:bd:7f:32:a7:ed:73:00:bd:
6f:11:f7:8d:10:3b:ee:b4:34:4b:03:10:55:f1:fb:d9:bc:8d:
47:8b:07:99:f7:89:7d:fe:33:24:2e:41:57:31:f3:5b:db:dc:
97:05:61:8b:4b:60:36:5a:49:91:65:50:4c:ed:86:c2:97:ec:
f3:7e:88:9e:19:5c:08:52:6f:94:0e:23:c0:9f:84:87:b3:d7:
53:ec:3e:8b:2c:b7:eb:4c:52:f1:51:07:67:64:2b:2b:3c:c9:
40:90:1e:07
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.33s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,567,115 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 11:33:26 2025 GMT
Not After : Dec 26 11:33:26 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c1:d7:8f:5d:26:e1:ed:ff:c0:3e:e6:35:a2:09:
75:21:4d:4a:3d:73:fe:72:89:de:ff:42:3c:8e:e3:
ba:50:63:7a:bd:96:87:5f:64:01:cb:7a:00:9a:50:
e1:9a:8a:b9:6b:c0:c2:e8:b5:62:a8:2e:6c:e0:2d:
ef:c3:e0:96:78:74:69:df:bd:ed:10:3c:e4:c7:ec:
27:2d:62:70:1c:e9:71:ef:af:5d:ec:d9:3e:e9:c7:
29:65:d8:9d:78:1c:6c:b5:c7:8a:aa:b2:7d:e4:7b:
06:37:16:3d:7f:23:eb:14:da:e9:67:e0:73:a6:ed:
e8:5f:20:95:5d:62:29:5a:b8:e8:0f:06:d3:c0:66:
49:d6:51:5d:08:50:95:3e:db:fe:19:4c:c1:4d:f8:
1f:69:cc:28:b1:38:7d:34:f0:dd:e9:a6:d1:90:45:
60:70:42:78:5d:59:11:5a:db:25:77:d3:19:10:17:
47:cf:69:51:da:e2:4f:e1:f0:e6:ab:d7:50:21:ad:
7d:5c:0d:f0:61:d5:45:f3:a5:9b:95:f2:e2:fb:4e:
29:ec:1c:16:52:7e:a8:1d:d3:0e:0c:4a:d1:46:59:
b9:36:c2:c7:76:fd:18:6e:ff:ee:06:a2:73:58:49:
f8:76:35:5f:36:41:ae:db:38:9c:55:f1:57:e3:06:
58:fd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2a:01:c3:93:5c:72:ad:c0:e0:2b:01:29:65:e6:2c:5d:30:e5:
67:19:1e:83:d9:13:13:49:02:75:a9:dd:88:f0:e1:18:af:03:
20:06:4b:e3:6d:34:b3:78:23:e6:fc:9a:ed:18:e1:43:8f:43:
b7:21:7f:fa:f0:6e:ac:7b:59:ac:5c:ac:60:04:ee:0d:80:8e:
9f:28:40:cf:25:39:d5:7e:1a:da:2b:ae:8b:56:dc:56:de:86:
b2:a6:a5:8c:e9:74:a9:b3:7e:d6:94:d5:1a:d7:97:e9:9e:32:
9c:08:0a:39:4a:5e:9a:56:05:ef:5d:2a:5f:2d:5c:30:4d:9e:
3c:0e:37:cc:14:5a:e2:59:88:86:56:2b:cb:66:c3:5e:14:aa:
85:3f:7d:43:fa:2c:7e:e9:a0:59:50:89:94:87:f9:5f:1e:3b:
f8:46:5d:10:6c:5e:4e:3a:6a:ec:ab:99:62:dd:1d:1d:1c:49:
b0:31:11:f1:8f:82:eb:00:26:2a:ae:e2:b3:87:10:7b:d7:e8:
1f:96:94:2d:46:5e:da:c8:d0:f1:6e:af:a8:01:5c:b3:89:78:
10:36:e4:34:d4:9c:01:8c:86:82:8d:d2:80:57:21:93:9c:f7:
27:cb:2d:e7:78:1a:c4:1d:83:70:3b:0c:9b:00:8c:54:b0:fb:
b9:3f:40:25
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 11:33:26 2025 GMT
Not After : Nov 27 11:33:26 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
87:50:20:c9:44:cf:06:64:fe:c1:c4:40:f8:e3:c2:bb:68:fb:
b1:e7:15:57:94:99:84:3e:fe:f7:aa:ff:c0:1c:74:4e:02:85:
96:53:ef:ca:84:c4:15:a4:41:c9:ed:36:45:02:8f:a4:f3:df:
b8:27:af:1e:bb:9d:d9:8d:98:e5:79:d9:38:00:77:51:02:40:
16:b9:30:1b:83:2c:b1:1f:cf:58:fc:83:1c:8d:b8:f2:8d:13:
82:f1:e5:1e:69:c6:f7:31:91:f3:ac:8f:55:5a:2f:88:c5:43:
9a:44:ac:d8:4c:01:e4:3f:83:94:04:d1:8f:55:d0:8c:dd:ce:
31:fc:f5:c3:8e:11:4f:3d:e4:da:2c:c8:a9:a8:e7:52:97:9e:
dc:97:33:b8:77:4e:7c:86:0a:72:d5:e0:be:52:2d:19:b9:b1:
16:12:07:79:a2:7a:e9:bf:bd:80:1f:7a:14:10:45:31:71:17:
5c:da:67:29:d6:a2:79:7f:fe:4f:0c:c8:d3:b5:d3:77:df:00:
09:bf:71:eb:87:1e:57:28:4e:c3:90:28:96:3e:15:4b:04:a4:
19:2e:26:b8:5a:4e:ab:34:57:e1:ea:58:c0:9e:cb:13:47:3b:
9a:ac:84:96:15:5f:2b:71:e9:ff:7e:1b:a3:91:33:4c:ac:6b:
75:93:d7:b0
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.67s
Truncated 7855 bytes from beginning
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
3,142,942 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:13 2025 GMT
Not After : Dec 26 10:26:13 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b2:d5:7b:a5:ab:a1:41:57:3f:64:44:d6:c9:cb:
48:78:d0:e9:e5:ec:56:c2:29:fd:c5:f0:da:ad:9f:
33:a8:5a:1f:ca:c3:8d:84:64:26:29:ba:a7:c8:76:
95:ae:38:39:f5:7c:0b:ad:e7:21:27:6e:79:02:8a:
ae:d6:23:96:74:75:7d:65:fe:d7:bf:c7:94:07:2a:
e7:8e:bc:9c:52:09:26:bf:84:c3:2a:36:03:98:92:
c1:8f:fb:78:db:e6:b0:a5:03:9f:eb:4b:2b:8e:f1:
7c:02:9a:2d:17:ee:83:4f:28:4c:39:57:36:28:d9:
e1:01:77:ab:0e:14:cb:ca:25:cb:ab:b4:c1:0c:d1:
08:d5:e3:2e:10:8e:4c:61:20:c8:05:81:ac:02:c4:
0c:cd:b1:90:7d:c6:dd:49:8e:1b:bd:c6:87:75:ac:
69:49:78:9f:15:8c:b9:62:b2:b7:34:0c:e3:f0:2b:
c3:c3:8d:24:d1:cb:13:55:8c:e1:88:43:6c:82:6e:
91:04:db:64:ab:3e:85:b2:89:39:07:7f:b6:f2:ca:
b0:41:1a:ab:26:f1:dd:24:b1:82:9a:e6:d8:45:a3:
c9:8c:76:6b:2b:4a:b9:93:8f:92:9f:03:e3:e9:3a:
5d:68:e2:24:27:6b:87:5d:ee:d9:f0:2e:5f:ce:7e:
f3:b3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
01:7c:58:a7:6d:c5:4e:d0:f9:96:b9:c9:50:2d:44:1e:a0:fe:
15:ec:d4:46:41:ee:e2:e1:42:b8:59:45:00:bf:57:b4:96:e8:
56:76:e1:bb:a1:62:92:0d:25:84:a6:90:d0:5a:a3:9e:a5:88:
67:1b:60:d6:44:f7:e5:03:ca:e9:50:11:2f:ce:5c:66:68:2e:
79:46:58:a9:19:7c:e2:81:a0:19:0f:2b:bb:72:2e:3d:f6:c7:
ac:00:f4:9a:ce:76:7e:59:5a:92:8a:84:69:d4:24:87:68:2e:
3e:f7:b5:71:48:21:66:6e:b9:27:b4:db:29:db:6e:d3:e9:15:
68:7e:23:14:b4:29:d8:d0:db:e1:19:92:e0:4a:80:09:f6:ba:
c0:e1:25:bb:92:97:84:33:6a:85:79:86:ea:c1:b1:dc:fb:1f:
0b:e4:78:b3:1c:a0:22:cd:e5:66:b6:4d:8f:62:f3:55:52:04:
76:f7:ee:d3:5f:bb:6b:fc:f4:f0:dd:e4:32:0c:99:5f:99:17:
89:0e:e5:a6:10:70:9d:75:25:b1:d8:83:31:94:3f:4a:e9:12:
70:f8:0e:04:5e:4d:bf:44:d3:1f:f6:1e:24:8c:a4:3b:63:d8:
73:4f:ec:c9:d3:2a:e6:0f:9d:a3:23:60:80:12:a4:1e:cb:45:
65:a6:61:0f
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:13 2025 GMT
Not After : Nov 27 10:26:13 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
75:13:8d:a8:2a:5b:02:16:5e:9e:d4:4c:67:13:71:85:5e:0b:
02:2e:72:d0:2f:c4:f5:4f:72:61:50:5d:89:7f:8d:1c:05:ba:
f0:3b:37:7f:9d:e1:b0:51:c1:80:6b:c8:75:e9:ed:b6:b8:b2:
47:95:03:e5:4d:85:9a:a3:c0:30:2b:15:88:b4:84:7f:ac:8e:
4f:a3:b3:33:40:ae:a3:b4:7e:98:bf:d3:db:86:b0:76:45:cb:
d8:fd:f5:56:3e:89:53:fe:61:0b:19:48:b1:56:32:e1:48:fa:
fd:27:ec:51:08:70:ee:66:31:8b:73:51:d9:b0:98:70:f4:78:
5f:01:7e:61:12:27:86:b1:8f:fd:9c:29:00:a4:7a:53:e4:68:
39:16:d8:5f:e7:f8:29:4e:96:61:98:3b:ef:22:4a:b9:34:df:
a4:64:18:fa:c3:60:30:ad:7a:95:57:93:32:a3:92:f8:a2:65:
68:18:ad:b5:52:c1:16:ef:29:42:1e:99:e4:a0:c2:90:4d:69:
f2:82:62:c8:c2:e7:51:3e:be:e1:c3:76:df:7f:bd:33:e6:d8:
b6:ab:89:60:a0:5a:da:e7:01:4e:e2:7c:5a:7a:fb:59:bd:27:
61:49:f5:ca:d9:fe:1a:0b:e0:73:c9:eb:17:d0:ed:76:f6:d5:
bb:ee:08:5d
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
Truncated 3059 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,895,177 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:10 2025 GMT
Not After : Dec 26 10:26:10 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a7:a4:5e:40:41:da:b7:80:6d:63:4a:51:12:d8:
12:04:af:07:29:86:d8:88:29:61:f1:3d:d6:40:ae:
57:22:fd:0e:e4:b5:89:cb:42:a8:b1:cd:12:84:eb:
c7:e0:a3:e9:a1:e3:ad:57:3b:c6:3e:29:f8:a7:64:
7f:92:24:2e:31:5c:fa:e6:ac:83:b4:3a:3b:0b:f5:
cc:74:d0:a2:dd:6b:8e:1f:8d:00:f0:18:85:6c:d6:
62:a6:99:81:12:15:df:e3:e9:60:be:ea:88:f4:18:
e9:aa:a1:35:8c:3d:5a:62:60:f7:da:cf:66:5f:e7:
0a:ad:f0:08:63:35:80:21:b3:be:d8:99:69:e0:35:
56:e8:28:c5:f5:18:4a:98:e2:43:53:e1:08:7a:4a:
38:68:f4:73:a6:74:4a:f0:85:66:d3:d4:6c:9d:58:
b4:e5:f9:59:53:f9:29:65:45:c3:73:bb:83:76:e2:
89:aa:f3:3a:9e:78:a1:64:ad:47:66:a6:2f:6b:ea:
1f:57:c0:8a:70:a6:a5:28:c3:6b:bd:66:46:94:a8:
51:ff:c7:24:be:3a:f7:d9:62:cd:d4:7e:3b:5f:49:
89:97:74:5b:e3:01:ee:c2:45:3e:6c:d0:2c:00:c5:
0f:38:81:42:9a:11:fe:14:48:67:2b:ea:db:31:fe:
a8:dd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5c:8c:67:10:86:b3:3c:30:46:71:c4:d1:fc:69:c0:be:08:01:
72:b5:74:24:85:aa:0c:8b:4c:d0:11:24:42:9d:6f:42:d5:7f:
e3:28:70:df:fe:51:cf:cd:2a:2f:24:2f:ee:9b:1d:66:ab:24:
88:9d:f0:cf:3c:ed:b2:d5:ed:74:2d:b7:86:12:3a:11:e1:fd:
18:8b:05:63:fe:f2:62:f5:2a:d7:71:76:01:97:c4:cb:ba:e0:
0c:22:23:3f:19:e0:03:0c:35:16:34:66:d2:d0:70:5f:62:a2:
bf:3d:08:42:83:70:b6:6b:a1:dd:cc:6a:9c:bf:0e:c9:f1:dc:
fb:96:41:63:8a:cf:3c:fc:5f:6d:72:9c:7b:46:d9:1a:ff:93:
b6:b1:4c:4b:bf:19:8c:e3:9d:57:95:f9:c8:d2:b0:86:d2:ba:
6c:6e:1d:e6:c7:9b:e2:53:f6:62:0c:26:b0:29:fb:4c:f5:08:
99:b5:f4:bd:b6:91:dd:e9:d9:73:50:ab:0a:64:16:9d:38:78:
0c:d8:28:b3:c4:a7:87:25:66:25:de:a3:00:8a:55:c0:9d:25:
ec:5a:df:83:16:41:87:74:cb:8b:21:67:c2:d9:0b:37:0c:c1:
0c:de:a2:d8:4d:d5:21:47:b5:7a:af:08:c0:cd:e7:3a:bc:54:
50:56:d3:60
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:10 2025 GMT
Not After : Nov 27 10:26:10 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
46:49:5f:01:77:ca:67:2a:cb:8e:a9:90:9d:88:a8:36:9b:3d:
a2:f7:58:6a:c2:08:51:20:20:09:e3:f2:6d:06:ec:4d:4f:9c:
00:7a:ee:bc:41:5f:03:8d:bc:12:86:3b:5c:a6:d0:85:eb:7b:
5d:6a:dd:46:2f:5b:74:d6:08:eb:8f:5e:51:cd:64:47:87:f2:
57:ec:88:43:dd:e1:80:fa:06:a8:f4:9a:fc:ce:e2:8b:39:d8:
8c:1d:d2:94:3e:d0:d2:37:ed:7f:61:da:99:2b:db:6f:0a:88:
a2:17:3e:bd:6f:0c:02:7d:3f:3b:5a:e2:c3:c9:82:43:6c:c7:
08:f1:9f:db:f5:aa:40:2b:e0:e0:a4:d2:1c:53:91:a5:4d:ed:
94:25:ea:2f:60:ee:1a:22:05:bf:69:25:e5:53:c5:71:95:2a:
96:03:a1:3e:dc:ad:dc:af:80:69:7d:02:e8:57:c8:10:92:1d:
d3:2f:02:64:85:07:84:2b:ce:40:41:5a:d6:b3:09:47:f7:5f:
f0:fd:0c:5d:48:84:9d:b1:89:f1:85:b8:6d:66:2a:1f:6d:31:
5d:8a:64:06:36:6c:20:a0:99:6f:34:d6:b4:ba:7d:cc:f0:ed:
6e:ca:de:ba:3b:13:30:37:00:3d:e0:1d:fd:df:bd:ff:e7:f4:
07:13:10:47
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
Truncated 7855 bytes from beginning
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
3,144,289 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:16 2025 GMT
Not After : Dec 26 10:26:16 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d1:ef:e1:fb:f4:db:4e:e4:0a:1d:3e:05:ba:42:
fa:8e:ee:96:c9:d8:24:8e:eb:6e:29:dc:b8:f8:69:
5d:54:4f:d9:e1:b0:0a:20:db:6f:f5:6d:b0:3e:87:
7b:74:4e:f6:fa:21:76:af:73:1f:f6:a3:70:03:e5:
d4:c1:7c:d3:05:36:3e:91:c6:c5:9c:c5:0a:49:55:
bf:77:5b:72:b4:23:b0:fe:26:f3:3a:44:3d:1e:3f:
d5:16:4f:c3:14:e5:60:53:c7:8e:88:54:c4:af:90:
e6:2a:32:29:40:40:9d:c1:4a:5e:41:3a:b6:16:44:
bb:fa:3a:82:07:b6:38:24:bf:77:96:68:7d:fd:ef:
50:fe:28:f6:07:40:06:8e:94:ce:a5:c9:f2:57:0b:
cb:e2:7d:16:29:86:8b:92:5d:b5:20:20:fe:d6:70:
86:d6:c8:bb:04:56:07:71:28:e8:98:da:0b:f4:e5:
9a:72:d1:e9:46:71:1f:fb:fd:4d:79:8a:ba:6d:3f:
94:ff:53:67:9f:ed:9d:6c:56:46:e4:25:b1:ed:1a:
2b:0c:75:57:1a:0e:e5:b6:dc:c2:12:1d:eb:12:0c:
14:cf:4a:3f:17:ab:7f:0a:53:ba:4b:63:fe:e2:57:
1c:62:4a:a5:72:71:50:da:4b:f4:09:21:10:6d:6c:
a8:75
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6f:6c:64:ec:7c:e3:b7:58:c5:fc:5c:12:42:ce:93:13:c1:ba:
23:59:17:3f:39:7f:cc:bb:91:2f:61:d4:c8:1a:ec:f4:4a:ad:
67:b0:22:f7:03:35:d8:ac:8d:61:e5:27:7f:fc:1b:16:fb:ab:
9e:47:46:e4:8d:ae:d0:2a:29:24:51:4a:c7:9a:85:c3:f9:04:
a7:dc:f8:a3:78:cf:f1:91:ad:23:da:b6:b1:cf:1a:90:bf:66:
d7:80:1a:a3:04:45:ef:d3:17:71:7b:52:45:99:c8:0a:16:d5:
1a:6d:45:09:05:0c:d6:55:e0:39:a6:e1:3b:6a:d1:38:b8:a4:
c6:4f:4e:f3:7e:86:6e:01:60:62:e3:41:cf:7d:48:04:65:c5:
44:7f:e5:ea:f2:6b:1d:60:01:71:13:d8:f0:d3:14:58:27:5a:
db:c7:f4:21:66:35:25:94:3c:e7:08:48:f3:fe:fa:58:be:c2:
7f:92:e8:48:dd:57:44:7c:51:ea:ef:4e:b1:17:2f:de:7f:c7:
50:01:9e:ab:45:d2:a4:b3:08:bb:33:1f:88:66:a6:a9:55:73:
4e:1f:80:87:4c:b4:b1:17:4b:a3:ee:56:af:62:fe:94:fd:0c:
94:05:c8:9d:a2:21:31:a1:96:3c:f8:b4:7b:d3:2a:45:c7:14:
f7:94:67:63
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:16 2025 GMT
Not After : Nov 27 10:26:16 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a6:bb:a6:a3:0f:92:88:0e:7e:7e:c1:f5:f8:b8:3a:19:b5:2d:
ba:27:76:2b:6f:53:ad:05:54:6b:38:20:7a:2c:7a:8d:55:e1:
8e:71:d0:06:30:92:57:29:95:dc:fe:6d:6a:3a:c1:aa:4d:f5:
62:15:b1:72:2b:06:41:76:2b:9f:bb:d9:05:97:11:45:1a:f2:
f2:bd:83:0d:c0:a9:ec:f2:fb:8d:a9:43:af:b6:ec:1b:ff:aa:
6b:05:78:86:75:a4:c1:3e:7e:8e:b1:19:c1:b4:e2:fb:db:e2:
f4:22:19:7d:d8:8c:4d:85:c6:da:17:e9:8d:d1:0b:00:4f:4b:
4f:11:91:e5:04:36:3a:6b:b5:a9:44:cd:64:a1:43:1e:a0:e5:
5c:88:5d:c8:b9:e0:90:c0:0c:b9:22:36:8a:da:31:96:4d:20:
fe:6a:92:a2:5f:28:d1:3c:bd:c2:e9:87:ab:cd:18:17:66:57:
2f:00:13:8a:b4:d3:83:92:7a:25:57:e0:91:b7:aa:99:5e:cc:
5e:d9:cf:8c:16:77:8c:a9:00:f6:64:b3:fe:b3:88:d1:83:5d:
16:ac:bc:7d:ed:fa:85:0e:3f:e7:51:dc:1a:0c:5b:af:15:eb:
c0:69:09:63:87:d5:f2:be:49:7d:a4:21:fe:6a:0b:73:c3:e9:
44:16:61:1d
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
Truncated 3059 bytes from beginning
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
2,895,694 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:10 2025 GMT
Not After : Dec 26 10:26:10 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b3:dd:e7:d0:e8:5e:15:07:d2:d0:54:ff:dd:09:
5f:44:62:0c:0f:68:0e:6f:e6:06:7a:53:48:c6:9a:
a7:0c:16:51:8d:8d:e4:b2:ef:f8:06:59:54:25:76:
59:5c:1d:d8:e1:47:54:35:d6:1f:63:39:d9:e8:b0:
77:bc:6b:82:51:2e:8b:ba:73:27:7c:c3:de:ea:30:
17:1f:1f:b0:93:75:47:bd:b3:ca:80:b8:2a:fd:0d:
9c:7a:15:b5:09:37:e9:bc:d6:08:6e:89:15:a9:dc:
27:82:47:0a:17:c2:a5:8d:94:07:0d:21:75:a0:0a:
44:fd:3c:cd:c5:c6:b3:2d:a9:24:97:3d:6b:6c:4a:
af:8d:0a:85:c4:b4:ca:2e:0c:86:5f:43:bd:68:76:
e8:b7:4c:94:78:f8:0d:4e:53:63:66:54:9f:8a:80:
86:94:60:62:0a:eb:75:a2:e7:1b:15:6d:e1:7a:4a:
cb:e0:3a:60:e2:3b:fe:eb:d6:18:c8:c5:32:ec:2e:
6f:83:a6:87:bb:e9:6a:86:86:5c:60:a1:1b:73:41:
61:02:ae:b1:01:42:1a:37:4f:97:36:1e:a0:e9:b9:
fb:80:5d:c5:41:c8:ab:a6:f3:81:f1:5c:25:0b:b4:
8a:e9:ce:56:e5:62:56:57:d3:6c:92:45:9e:5d:07:
dd:5b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
04:77:81:5f:76:51:2a:24:42:b1:42:81:95:7e:5e:0a:8e:b2:
d2:5f:47:85:65:ab:49:a3:5a:0f:7b:8c:db:d0:d6:68:e9:99:
42:b2:38:a1:e0:aa:6b:1c:94:69:33:2d:08:f4:0d:d6:b6:c8:
1f:86:38:81:00:fb:42:6f:b0:18:f0:09:90:bc:41:c1:a2:8a:
68:e6:87:4d:64:87:51:35:d0:db:55:1e:f5:80:3d:89:2e:34:
7b:0f:78:4e:e6:fa:05:8d:26:b2:21:4c:c8:60:0e:4b:97:16:
58:c3:29:80:e5:04:4f:6c:9c:07:63:5e:f7:f8:f3:78:46:84:
de:a8:3a:22:49:48:f6:d7:51:fa:aa:9b:cc:46:15:2f:83:c1:
55:4c:41:21:74:03:b0:f0:98:49:28:f7:0b:87:99:13:ab:e9:
59:24:32:83:44:7a:96:92:bd:b1:c6:cf:da:81:70:a4:7a:07:
72:75:fe:1a:77:cd:01:91:01:58:05:2b:31:51:5b:3d:ae:da:
76:bd:16:9c:97:69:7e:a3:96:85:53:b5:4c:07:2c:31:c5:4c:
db:7d:7b:ea:45:a5:0c:85:0f:31:52:b6:ee:a0:d4:3e:1c:da:
08:df:76:7e:44:80:92:62:8b:8e:9b:e0:07:aa:81:a6:46:d3:
d1:12:90:c0
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:10 2025 GMT
Not After : Nov 27 10:26:10 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
03:f7:4f:26:7f:06:6a:e1:6a:96:f4:cf:b7:58:7e:b6:98:8b:
0f:a3:23:a1:cf:f1:ba:be:f9:93:0c:11:c7:8b:62:e1:17:2c:
b2:8d:ce:dd:67:c2:d9:93:ed:31:a5:07:e3:4e:e4:cb:4e:42:
6c:c8:f7:b8:31:b3:84:46:28:d0:80:14:41:78:b7:90:b5:77:
5a:ee:24:eb:7a:57:b3:a7:34:15:24:a4:8f:70:34:4c:04:cb:
c4:e2:9b:55:fa:89:45:70:64:3b:e0:d4:9b:52:a7:58:d2:d2:
a2:41:1d:2a:43:15:ac:32:32:02:2e:5a:a6:04:f6:fa:7b:88:
76:60:9b:db:f0:3a:81:f3:c5:90:b8:4a:48:8e:2d:60:48:7d:
c8:9a:69:62:d3:31:71:06:a7:cf:c9:fb:12:92:a4:8b:d6:13:
10:30:54:89:34:af:fd:39:fd:5f:8e:10:7e:63:dc:42:37:de:
aa:d1:91:9b:49:67:34:dc:29:e1:c9:48:94:b8:19:40:cb:2c:
95:62:ee:ab:04:b6:9b:7c:94:11:0c:53:9f:60:56:d4:83:10:
a1:95:44:6f:a1:e9:06:16:5c:30:78:a9:a9:77:42:8c:fa:2e:
fa:8a:57:46:7d:39:42:12:67:b6:59:4c:63:b6:87:5f:ff:4a:
64:c5:bd:b5
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
Truncated 7855 bytes from beginning
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
3,143,920 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:08 2025 GMT
Not After : Dec 26 10:26:08 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d5:46:0f:95:da:73:9a:43:b7:27:66:d7:69:5a:
76:ff:1d:ea:44:22:aa:61:14:b1:bb:09:ea:7e:f4:
84:37:56:51:77:f9:23:09:d1:d4:34:f3:33:9c:5a:
d2:6f:96:79:f0:d7:fd:74:0b:0f:48:5e:8d:e4:29:
91:11:69:db:3d:13:a4:6c:81:21:45:34:8c:b9:13:
9e:ea:c1:6d:ec:34:02:b4:d1:bf:cf:df:fb:71:f1:
38:15:95:ce:f8:cb:52:35:6f:15:08:61:d2:81:ba:
f7:8e:bf:b2:06:26:6c:e4:10:f0:03:02:a7:2b:7a:
82:f8:24:ab:c5:5b:62:13:54:77:79:c5:12:b4:42:
01:79:5b:17:13:4a:93:2c:7a:31:d4:ef:59:53:c8:
93:6f:7a:cc:52:45:e5:cf:9c:64:6d:dc:12:33:04:
7f:4a:b5:9f:e9:b8:b9:86:68:0e:bc:88:a1:3c:6c:
eb:3c:93:58:db:65:9e:a9:fb:58:2b:47:11:ad:93:
38:e0:4a:c8:96:90:86:eb:0f:39:fc:c5:8f:1e:00:
8f:52:82:5d:a9:99:e0:da:ac:eb:dd:b8:d2:04:bc:
9a:6f:47:5f:81:5f:4c:c4:4c:96:dc:3a:6d:b9:15:
ca:4d:85:09:2b:af:77:3d:45:91:bd:c0:5b:9d:3c:
a4:67
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6d:fc:c6:a3:67:e7:ea:bf:c7:80:e6:3e:b3:8a:5a:bd:e2:a3:
d3:c0:cc:2f:ea:71:d8:47:42:5b:42:9f:50:5d:f8:b6:a6:4c:
1a:fe:2a:cf:c6:7d:e8:48:22:36:7d:b4:a0:2d:8f:6e:14:b4:
05:f8:4a:13:34:d7:4f:90:0b:3d:d9:5a:83:a2:c2:6e:7e:e5:
41:7c:aa:1c:41:95:65:06:a3:23:54:32:38:f9:c6:19:1e:bf:
8e:d1:df:ef:c2:a8:1d:fa:de:8c:92:39:67:d7:1c:a7:6a:ac:
48:ab:e1:ab:bf:1c:73:ee:7a:bf:31:68:40:02:fa:ce:58:aa:
85:3f:49:cd:c9:8a:3c:ea:ce:3e:26:66:41:e8:ac:3e:ab:42:
15:77:78:83:70:86:ed:5e:c7:49:5c:21:50:82:c4:30:db:9d:
08:29:a2:38:49:d7:3a:60:35:4c:e1:c8:8d:3d:8c:8b:cb:32:
08:6a:64:c4:56:17:b9:a0:e6:8d:71:9d:42:0b:6d:96:d5:6f:
db:c2:9c:c4:7a:19:66:cc:a0:e6:c8:67:b9:02:af:bd:3f:8e:
df:6c:e7:9c:03:2d:d5:e1:29:26:f2:e2:ea:ad:84:50:75:60:
50:29:ef:46:89:9b:a0:41:c2:46:79:0b:c2:f8:2e:f7:88:62:
a9:8b:41:ea
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:08 2025 GMT
Not After : Nov 27 10:26:08 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
bc:33:04:fd:d8:3c:0a:6e:e5:0b:ab:9b:a5:56:b7:86:32:51:
d4:d3:50:39:09:cf:37:2a:56:84:e2:c4:04:1b:04:78:d5:75:
0c:ca:a6:6a:56:dd:20:3d:be:cd:e2:8c:24:36:2c:a6:26:af:
bf:26:a3:3d:0e:77:e7:56:89:e0:60:23:b2:18:d2:b7:1b:81:
f4:1c:7c:64:13:47:91:68:c2:df:45:1b:14:ae:af:06:68:4d:
e7:17:d4:7f:16:d8:bc:a6:08:c5:f0:55:7d:dd:96:68:e3:11:
6c:e6:cb:53:f0:dd:e5:25:57:bb:e6:b3:1a:a0:6a:cc:1e:f0:
0e:fd:66:de:26:1b:76:e1:c0:c9:21:d0:95:82:0e:73:54:cf:
ac:75:51:98:39:d2:4f:2b:51:fc:f1:cf:76:2b:94:86:c0:ae:
97:25:85:e2:78:71:1d:d9:5f:ca:df:d9:b7:a7:be:e9:51:13:
d8:db:0d:55:5d:ad:55:56:02:58:6e:da:d5:d5:39:3f:5e:aa:
b5:96:06:6a:21:93:a5:c5:86:6a:d2:21:58:82:cd:ea:d6:69:
34:ca:bd:98:c3:36:9b:50:29:f4:63:6b:da:84:5a:ed:16:c4:
e0:67:aa:d7:8d:2c:86:41:82:37:d7:66:2e:88:9e:c5:bd:22:
4c:98:a6:4c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.25s
Truncated 3059 bytes from beginning
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
2,898,767 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:25:59 2025 GMT
Not After : Dec 26 10:25:59 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ba:cf:24:1f:25:aa:48:b9:01:8b:90:11:68:61:
11:b1:aa:ad:5f:74:e0:68:12:8d:f5:1c:5a:67:35:
62:4a:03:76:2c:34:66:47:67:91:73:2a:ec:a1:7f:
a5:c1:b9:cb:1c:c7:60:86:8f:72:5b:43:f0:43:84:
aa:7f:f5:1a:fe:b1:21:5f:74:84:03:c1:38:11:99:
32:29:93:a7:9d:60:85:7e:a9:b8:d1:39:46:54:ab:
ea:64:d0:7b:74:d9:5f:8b:0b:48:2e:d0:a4:e6:47:
6f:04:ff:8d:07:1b:95:45:35:2f:f9:0a:38:4f:cd:
1d:9d:0c:da:89:10:3c:44:76:32:ea:56:70:b3:9e:
b2:66:34:f2:7a:a0:8a:22:62:20:ac:c5:d3:5b:89:
b7:6e:8f:8d:1e:61:97:75:48:a7:dc:fe:0f:39:a5:
9b:27:1a:71:e3:79:40:32:93:b0:3c:0a:73:48:72:
ba:15:af:99:0b:cb:3b:f1:d2:13:c7:ca:af:35:85:
05:bf:54:5f:45:4e:11:c1:4b:14:08:72:c1:a5:64:
14:a6:3b:81:3d:b5:cd:53:1f:0c:66:03:f8:07:2f:
73:39:0d:06:10:1a:6a:2f:aa:52:26:10:99:83:cf:
cf:d8:19:a6:d3:26:2e:26:13:4a:df:54:64:cc:9b:
97:eb
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2a:fe:e5:28:39:8f:f9:1f:9c:fe:69:02:42:1b:04:ea:46:0b:
fb:3f:e3:82:ca:b3:a4:92:00:54:c7:30:5c:5e:14:cf:e2:b0:
39:da:16:7c:64:d4:a4:cf:2b:c8:ef:25:e3:a0:2e:13:9a:ad:
f8:53:16:91:91:46:22:ee:fb:50:47:90:b2:fa:19:70:36:fb:
ac:f7:ba:6c:3d:9d:33:f1:fe:2d:e2:04:9f:53:05:80:f2:9e:
df:8f:d5:ef:ee:9a:94:25:72:f7:77:a1:89:05:db:61:f7:61:
4f:58:12:09:8a:db:c5:2c:06:4e:ef:04:64:6f:4b:85:e8:92:
00:ee:54:0a:4a:e3:97:7a:92:64:c4:c4:86:49:bb:c3:70:29:
93:f3:07:91:04:20:62:ea:e5:79:6c:d4:6a:10:7d:5a:92:0f:
2f:58:fa:87:99:21:8c:9f:87:a2:dd:fb:fd:eb:a8:7f:ed:32:
98:bb:f8:9d:d8:6d:3a:79:43:68:5a:1d:34:67:a7:ed:2e:38:
2b:ba:b7:3c:22:7e:79:37:ee:6f:ce:fe:e3:8f:eb:8c:ad:ce:
29:a7:45:3e:2e:c3:9b:6f:36:72:3f:db:72:02:3c:34:5a:22:
a8:01:79:f2:67:f3:9a:bc:1f:47:75:c4:79:d3:c4:7c:fc:ff:
99:0b:a5:73
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:25:59 2025 GMT
Not After : Nov 27 10:25:59 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7e:b5:03:b3:a8:87:48:9c:f0:71:85:de:3e:2e:0a:ed:4b:6e:
66:f2:a3:82:11:a3:84:91:ae:ca:bf:b6:42:36:d2:12:fe:75:
f1:af:be:9d:f5:6c:02:96:bc:7d:1e:80:fa:8e:b2:b7:cc:89:
dd:cb:d9:49:9a:b9:8d:ca:8d:61:56:bc:23:9c:23:0a:a7:68:
4c:01:25:a6:62:11:25:cf:76:3a:f4:88:b5:ad:d5:a5:e6:5f:
81:9e:a9:42:46:a9:60:9e:d1:2f:84:28:4e:7e:7a:24:5e:4c:
c2:1a:ca:c9:c5:17:c4:f5:04:fa:3d:e0:6d:66:66:f7:58:ea:
1c:b7:4c:31:62:70:d6:a3:dd:61:0a:06:8f:8f:f9:c6:df:89:
53:32:a0:06:d1:4d:f3:64:c9:46:08:8a:5f:c4:38:7b:98:c8:
6e:bf:c8:34:d8:58:6f:4c:fa:46:79:e3:70:25:1d:f1:93:2e:
50:06:98:e2:9c:d8:d8:1a:ad:e5:a3:a6:73:1f:c2:e1:b0:41:
1e:74:59:e6:54:82:2a:4a:4e:d2:23:2d:dd:19:cf:ab:fc:b7:
e3:bd:84:17:da:b8:c5:94:76:cc:0e:34:ed:5c:ca:d0:a2:81:
b7:cc:5f:49:e9:80:f1:32:a4:5f:ea:00:aa:68:f7:a9:e8:af:
3e:45:b5:dd
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
Truncated 7855 bytes from beginning
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
3,144,779 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:05 2025 GMT
Not After : Dec 26 10:26:05 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c9:12:55:58:34:94:e5:79:bb:7a:b3:81:b5:44:
f4:e1:45:5f:fc:50:0e:2e:de:46:11:73:37:1e:c4:
40:e7:8a:43:7a:bc:6b:0b:ef:af:de:30:9b:0f:33:
01:07:10:85:9d:91:8a:84:4b:51:6a:2e:10:c3:e5:
82:51:b0:bc:af:d6:86:63:69:44:f3:4a:9a:d7:d0:
68:c6:5a:50:5c:fa:3b:84:2a:85:4d:c7:bb:e8:5b:
06:70:cb:cb:2f:77:03:95:22:d2:a8:42:42:e0:68:
46:2a:a6:c9:b7:b7:d0:d1:5c:09:01:92:70:31:04:
3d:c4:5d:e2:13:cf:63:1d:b5:08:f1:6f:19:10:68:
8a:3e:a8:84:e7:ae:bb:87:d6:a7:42:8d:bb:34:19:
a5:69:3e:0b:ea:a0:2f:92:05:a4:48:d9:8f:ce:c0:
25:6a:ff:63:f2:e1:53:11:96:27:ee:4e:d5:cc:d3:
93:35:99:d9:1d:46:e5:ca:d6:e7:4c:92:77:c3:1e:
9c:a7:aa:66:f2:4f:13:d5:a9:fb:b9:70:6b:a3:d5:
ae:d3:0f:61:37:b0:c4:b3:2c:fc:14:db:b3:7d:ef:
dd:7d:b1:d8:0f:99:52:90:d8:65:1c:01:5a:8c:43:
62:6d:c4:e5:ed:81:87:e0:57:92:1b:18:c6:71:3e:
d7:d7
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
46:ab:21:7d:0d:70:9d:90:cc:70:54:03:23:24:21:9f:8a:cc:
ec:27:12:04:ad:19:28:14:c5:51:68:37:9e:c2:21:74:de:9a:
cf:08:0f:f9:02:3d:aa:17:23:1d:05:36:7c:5e:b0:d8:bb:54:
c7:96:b9:c4:51:cd:95:fc:8b:f1:04:0c:28:3a:cd:de:dd:cd:
eb:b5:1c:a1:ce:16:1e:ee:ef:b8:41:33:a1:dc:2a:11:bd:3b:
2c:66:7f:46:64:9a:0b:66:28:3f:b3:3b:73:46:fc:2c:6e:64:
2e:0e:a8:a1:6a:84:7e:f3:ad:0e:50:c9:3c:09:e2:87:63:ae:
92:f6:fa:5b:ca:96:cc:eb:4b:f9:62:f1:51:05:a2:1d:1f:55:
f1:2e:6d:2e:e3:19:f9:4b:77:e2:b5:b8:8a:98:ad:ec:54:81:
72:da:ff:e3:db:35:49:7c:0a:9f:eb:5a:1b:f4:13:d5:2d:49:
8a:78:fd:4c:0f:88:36:37:ef:27:21:7e:1a:87:88:53:1e:9a:
80:99:89:ac:e7:29:23:e2:6b:aa:dd:5b:c4:08:fe:4c:b9:23:
56:e3:7f:d7:23:90:43:1d:c4:05:c2:90:81:8a:70:9c:d2:5d:
2c:9a:e8:1a:62:03:40:82:a9:66:3f:9a:5f:20:6e:3d:90:fa:
fd:27:45:d4
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:05 2025 GMT
Not After : Nov 27 10:26:05 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
39:a8:c9:ed:75:63:92:08:9c:0f:77:d8:a4:8a:32:bd:42:54:
0e:96:22:ff:c0:09:a3:49:c5:da:cd:d4:eb:e5:1e:82:e0:ac:
b4:1d:18:db:e5:48:19:44:dd:13:26:9f:6a:f5:9a:6e:ea:7f:
7c:ff:9a:31:32:0e:6b:24:61:d3:ef:ae:bf:e2:ba:bc:a2:dd:
8c:ae:2c:8b:ef:27:d6:5e:2a:68:c8:2a:08:81:c1:f1:25:85:
dc:fc:39:ff:4c:bd:d5:a6:d0:91:04:b9:08:e1:23:5c:11:0e:
3e:a3:ff:08:1c:23:05:c9:9e:58:b2:15:38:4f:63:93:5e:62:
ad:08:25:ff:64:15:53:7a:ca:31:b0:3c:4d:bd:4f:5d:aa:0d:
fd:bf:4e:30:15:57:4a:5b:d8:e6:0f:40:26:b3:49:fd:7a:a4:
f3:85:f3:39:68:eb:87:17:a3:05:6d:98:c5:c0:3d:f9:26:a6:
50:8e:f5:94:26:04:42:e3:9e:45:ff:79:7c:46:32:e4:5b:84:
0d:21:8a:1a:f7:30:cb:39:db:86:7b:f9:ad:88:5e:3c:cf:1b:
e4:a4:f5:f1:7b:f5:ff:a9:95:72:10:9e:5e:0d:bf:bf:c1:bc:
87:51:d7:9a:a2:b6:df:14:b3:b2:60:79:df:2f:ee:b0:9e:b2:
bf:b2:3d:1b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
Truncated 3059 bytes from beginning
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
2,897,000 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:12 2025 GMT
Not After : Dec 26 10:26:12 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b9:ad:16:d7:20:6e:a7:da:d6:72:07:4e:d8:33:
23:ce:5f:dd:78:57:16:c4:51:df:66:a4:6e:bc:99:
2d:77:fc:0d:c0:a6:73:1f:e7:a6:8f:f1:8f:71:0b:
74:bf:74:7d:ea:11:d7:f3:a2:95:3f:b3:7a:fd:b2:
a6:d7:7c:99:f7:b6:d1:b5:17:e6:c0:7a:ea:4a:e8:
a4:2f:55:03:38:cf:d8:87:4c:dd:9a:74:12:9b:85:
69:73:bb:d2:c2:b8:5b:8e:04:99:dd:01:73:e4:d3:
45:3e:a3:02:4e:e1:3f:f9:e4:d3:ba:7f:47:4c:66:
4b:ac:5a:6d:e8:6b:56:6d:6a:88:af:f1:90:30:20:
d2:b1:d9:e2:fc:be:e8:a7:c1:aa:b9:cd:2f:d8:2e:
7b:d1:cf:e8:86:3e:21:71:ea:6c:23:84:a6:70:bf:
97:c4:6f:36:18:fb:ba:55:57:4f:43:c1:7b:82:93:
ee:0f:1e:fe:b6:2e:de:cf:8b:c4:13:98:ec:be:90:
e4:17:65:70:fd:af:33:7c:ec:fc:5c:08:14:e1:d1:
d9:98:4b:d1:6c:7f:70:d5:9f:96:58:c2:83:36:3d:
74:55:85:b7:cc:fe:8f:78:15:ee:52:91:4c:60:e5:
52:04:07:d2:4d:ff:6f:89:d1:7a:32:52:3a:a1:af:
de:9f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7a:d4:3e:09:43:51:7f:ef:d1:53:c8:8d:a3:46:3f:72:43:5a:
d1:10:67:be:fd:1d:95:a7:5b:60:f8:58:32:df:7b:b7:34:77:
a9:0a:e5:11:d3:8e:70:31:0d:d5:ec:5c:08:e9:c1:e2:4b:a8:
3a:56:87:8f:02:ab:a7:b7:c5:02:b1:76:c8:49:b1:a1:5f:7c:
d9:3d:e5:c0:4f:b1:6e:2c:d2:bd:7b:bb:a9:94:cf:cc:fa:3d:
4a:f2:a7:14:bd:05:75:a5:08:54:77:4a:70:4e:de:8c:ce:4e:
04:a0:1a:00:d7:7d:2b:08:6a:41:2f:86:8e:c9:4b:6a:96:db:
ec:70:7a:72:69:05:ea:40:b9:3e:df:88:2b:1d:26:b0:f1:b8:
34:89:97:3f:3f:df:b4:bc:5b:f5:4a:89:04:5d:5f:66:50:fb:
78:87:b9:4c:53:e0:c8:1c:3b:fc:2a:cd:29:a1:9b:26:4b:2a:
6e:09:ff:45:eb:58:ff:2b:8c:23:96:b1:fc:55:23:69:f4:ed:
64:48:6d:b0:6a:64:f6:c9:16:cf:92:7c:de:f1:43:4a:68:cb:
95:75:f9:64:41:0e:f2:e0:2e:16:d7:f5:dd:fd:95:88:e5:12:
9d:2c:e2:28:3a:f6:bf:96:94:3e:fd:d8:d6:f6:43:f8:88:97:
22:59:5a:be
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:12 2025 GMT
Not After : Nov 27 10:26:12 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b6:29:10:19:ad:3a:eb:ab:e1:94:2f:2b:79:73:1f:e0:ac:10:
06:b7:a9:f6:ec:42:f8:88:c9:7c:67:2c:85:8b:02:c9:36:fd:
5c:81:13:61:d7:df:9c:e9:ce:f7:65:2f:9f:bb:7f:60:4d:7e:
4c:e0:56:b1:4d:08:4f:cd:b7:87:5a:de:c0:8e:79:b1:ce:27:
be:67:52:b5:53:2f:52:0e:ac:00:a2:ab:03:86:4f:02:2b:ad:
f6:8d:25:f1:64:54:67:3e:76:2e:75:a2:86:66:74:30:fe:9e:
8e:57:db:a9:ee:07:63:b0:91:ed:65:2e:5d:76:eb:6c:10:57:
94:97:d4:1a:7e:ea:ec:75:0e:19:34:00:ec:85:2b:79:ac:a2:
ec:b4:de:35:3a:f7:19:44:e1:d8:ec:a5:1f:7b:a2:22:f4:3b:
61:8e:ca:a5:d7:a3:4d:41:8a:70:cf:90:8b:7c:5d:04:ac:0a:
25:3c:0d:f5:98:9e:03:00:7e:7c:86:bd:78:17:91:d1:aa:7a:
a5:41:73:e8:27:c6:c1:28:d1:f7:3a:66:53:36:33:c3:3f:28:
d2:3a:74:10:78:db:f7:8d:bb:aa:c0:5c:17:9e:de:19:df:4b:
e2:14:34:b4:4b:07:ca:5a:54:34:64:04:06:0b:31:f3:6c:ed:
32:73:b3:7f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
Truncated 7855 bytes from beginning
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
3,144,196 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:04 2025 GMT
Not After : Dec 26 10:26:04 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d3:cf:75:8a:19:72:2b:37:55:80:c5:05:17:a9:
cf:00:86:24:c9:7e:32:a4:c2:ed:71:3e:39:b9:e3:
68:d1:9c:d5:37:04:3c:75:bb:23:b2:64:a7:fa:ec:
53:22:31:c6:7f:fc:50:af:01:ff:cd:1f:fd:9b:e6:
2e:44:b5:7f:cd:0d:b1:95:47:7b:bb:56:de:b0:26:
f4:9d:59:d2:20:4e:14:f6:3c:ca:bb:ed:ce:52:95:
0c:97:5b:0e:62:6a:f5:f0:2c:bc:c8:fc:cb:3a:9d:
38:4d:8e:8f:55:07:93:2d:9c:e7:76:44:17:b1:cb:
8a:69:c8:cd:b2:50:c1:d8:33:f9:99:e7:88:83:b7:
e9:a8:1a:7a:2c:88:70:7a:c9:4d:5d:16:72:59:36:
ab:1d:6a:50:d4:3b:e1:43:e3:5e:f6:40:c3:82:fb:
ad:dd:3a:19:27:4d:b8:53:2b:2d:4c:3d:c0:20:a1:
9e:c4:92:d9:6c:58:3e:76:e3:68:b9:1d:ab:5f:1b:
5e:48:cb:1b:1c:6c:ea:29:4c:19:b0:9b:d2:d5:f7:
20:7e:80:ed:ee:12:fc:20:d7:ff:28:f0:33:c2:9b:
8b:8c:06:35:cf:ab:78:db:7e:8b:c5:74:35:34:65:
33:2e:73:60:46:fe:74:e5:46:eb:48:68:7e:cf:c4:
fd:2d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
81:50:b6:72:7e:a6:89:68:44:60:50:82:a9:94:f1:47:47:f5:
cd:20:2a:64:a3:25:6f:27:90:ca:12:55:8a:80:c5:70:21:33:
52:9d:e2:27:1a:60:5c:14:d8:b9:7a:ec:f5:96:bf:4b:d3:66:
b8:42:0b:71:cf:32:7a:15:11:49:50:35:b2:b7:6c:34:d1:7f:
53:09:34:a2:d5:25:4a:e6:89:4c:3d:ea:23:c6:7b:5a:77:de:
59:90:92:36:ef:dc:97:07:1c:c3:d5:e5:ce:75:0f:dd:3e:7b:
ea:d9:5f:8b:50:36:4b:3a:1f:78:19:85:19:74:c5:bf:ec:06:
ae:21:03:ba:5b:a0:b6:4b:d5:7f:06:a8:28:04:ae:0a:24:93:
6b:f6:21:b6:cf:f7:ce:dd:63:86:cf:a8:76:37:30:cd:e9:40:
bc:b7:42:b8:b4:dc:f3:ae:cb:58:61:cf:9c:1b:c8:f0:cd:23:
aa:f7:f9:08:53:c7:b6:43:1f:45:87:69:c0:60:98:9a:72:87:
24:e8:4d:c0:9c:e5:11:11:f7:6d:a5:5e:69:e4:ee:c9:0b:cb:
51:87:7a:b5:d1:78:6c:53:3c:0c:47:fa:3a:6c:c4:56:89:8b:
fd:81:68:33:6f:40:85:1b:ba:3b:42:60:1c:e0:05:9f:5a:ec:
c6:51:da:88
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:04 2025 GMT
Not After : Nov 27 10:26:04 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2d:14:de:c3:40:3d:e1:95:40:2b:7b:e5:ad:f4:02:73:e3:17:
2a:77:0d:06:23:0f:d0:a1:7c:c9:fb:ce:0c:06:4f:2d:b9:1d:
69:f8:ce:ba:89:99:14:33:ee:62:ab:50:af:2b:04:81:a9:34:
95:b5:0f:7a:a1:3e:d7:6e:32:4a:85:a0:23:68:fc:51:03:a8:
db:de:44:89:9c:a3:62:6f:49:55:dd:5d:66:03:46:64:33:b9:
5c:8c:55:54:0c:6d:7d:89:8e:f0:27:a3:f3:2f:26:f2:a4:42:
31:f8:34:28:05:52:11:b1:df:8c:68:78:89:57:cb:d5:7b:bd:
27:7b:47:09:e1:b7:c3:2c:e9:c3:6c:fc:8f:85:b5:9a:9f:8c:
e9:e9:4f:40:63:69:03:d9:85:54:08:c5:3b:2e:72:1e:93:d6:
23:4d:c9:e7:90:c6:d2:3b:80:84:ba:12:d5:92:65:de:17:00:
38:a6:f1:98:d3:1b:c3:43:55:76:05:1e:d3:5a:ce:58:f1:55:
db:c8:14:c4:fe:02:ea:fe:c1:42:54:60:78:e2:57:fc:68:65:
9a:51:69:46:51:20:6f:bb:b9:4b:d6:a0:62:70:7f:01:e2:51:
46:3c:b0:b7:63:0e:d1:28:6f:96:69:ca:b4:1d:7c:6d:f9:65:
6c:64:60:20
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
Truncated 3059 bytes from beginning
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
2,897,219 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:10 2025 GMT
Not After : Dec 26 10:26:10 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b9:b1:d2:f8:9a:49:34:aa:01:8f:69:de:79:cc:
80:c5:50:44:16:7a:ba:58:d0:cb:f3:09:78:c9:c9:
2e:1f:55:bc:59:a5:61:ec:90:96:d3:68:f7:3a:e0:
03:11:b7:b4:7a:3b:99:07:93:f2:cd:02:c9:75:19:
5b:b7:8c:06:c7:b2:1e:56:ee:9b:ea:ee:1c:ce:1d:
86:77:ae:1b:68:22:fc:9c:05:b7:38:b1:5f:3c:95:
d4:cd:d4:64:a2:2c:c5:d5:0b:f3:83:08:39:34:f6:
7e:c3:28:15:5f:18:27:0a:18:db:8b:da:09:2a:5c:
15:05:37:9e:5c:48:3d:39:73:9a:47:0a:6a:16:b9:
36:0e:18:7c:41:ff:cd:b0:d5:7c:b4:b0:33:51:1c:
09:f6:0f:01:cc:56:95:36:42:42:6e:fe:0f:96:4b:
d6:fc:ed:d5:c2:52:bb:83:bf:1a:2b:44:b0:a3:03:
e8:3a:22:76:40:d9:1a:4a:7b:59:8b:23:08:32:06:
bc:61:cc:f1:b0:98:fb:cf:41:09:06:72:6d:e1:02:
6c:91:f6:c6:83:b8:0a:aa:75:75:96:1e:ee:bc:97:
73:21:2e:85:46:b0:a2:23:e6:bb:c2:a8:2a:e8:f9:
69:25:8c:ff:1d:96:0a:e8:8f:be:a0:1d:62:84:55:
aa:13
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a8:ec:f6:58:68:a9:3a:bd:aa:03:1d:28:71:d8:f1:7e:06:7d:
ff:2c:9c:20:1b:56:d4:30:96:aa:70:02:f9:64:56:78:11:7d:
d8:c8:3a:12:14:55:32:35:f5:2e:8c:6b:8a:50:f3:ca:ce:47:
80:82:6c:02:da:1f:71:88:dc:c9:85:a9:6f:93:c7:fa:49:b7:
05:d7:0e:97:49:b4:7f:1b:c3:d8:ba:89:df:06:e4:65:84:4c:
63:f6:11:97:38:bb:d5:1d:e9:f7:ef:ef:2b:1c:f4:84:c8:17:
7a:25:10:88:59:02:00:4b:f2:3c:ba:5f:2b:2d:3f:4a:3e:f4:
6e:3f:8d:7e:da:6e:50:77:99:a9:c1:38:60:e7:c4:39:dd:32:
25:80:d6:66:59:27:74:3f:a8:8b:28:fe:21:23:19:55:47:68:
86:63:d9:e6:ea:52:c9:64:19:04:55:02:54:c2:df:31:f4:a8:
46:60:ba:d3:79:76:9e:b2:4a:ac:0d:ac:98:f8:73:a4:ba:fe:
44:42:d9:0f:34:ba:69:a8:cd:ea:29:f5:3f:7f:f3:1e:b7:d9:
b3:3e:03:78:2f:8b:27:eb:5d:6d:bd:22:23:36:09:02:dd:0d:
97:1e:84:5e:3f:b5:94:c3:63:a9:5c:b5:c5:d9:c4:17:b3:b9:
4b:36:e1:ce
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:10 2025 GMT
Not After : Nov 27 10:26:10 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
78:e4:c2:c2:51:df:45:1a:6b:7c:69:75:e2:bc:3a:93:00:bf:
71:91:37:62:58:a6:ef:6f:88:ba:16:f6:c1:4c:9c:0b:bb:16:
4f:e5:52:82:6d:63:28:15:cc:de:fb:40:c0:e9:dd:9c:8d:94:
ea:54:22:53:ea:87:19:71:17:1a:f9:12:85:0c:f4:33:6c:73:
d1:a7:fc:e2:fd:31:57:d4:ad:30:ca:00:5b:22:75:a0:d5:8c:
5c:c6:62:ae:79:94:e2:1d:4e:6c:bc:7d:08:f5:03:95:56:8f:
dd:f5:7a:6c:b1:9f:66:27:45:c6:3f:8e:b4:7f:43:63:28:3a:
33:2f:59:60:c1:96:a7:b8:83:e2:9b:63:30:55:8c:8c:f6:62:
26:6d:a1:a8:04:d5:bc:53:f9:56:87:0b:5c:7e:a5:86:12:ff:
84:9e:12:5d:a3:22:85:8a:9e:48:0f:f9:65:d1:1c:b0:61:b8:
5d:05:60:4d:7d:0a:f6:1e:25:37:0b:54:19:28:3d:f9:e2:07:
41:ec:6f:f0:53:ed:9a:90:b0:07:7f:ce:a8:e8:ee:cd:dd:60:
e6:9a:15:45:16:a8:0b:ea:45:1c:ff:cc:52:e4:4a:b1:b9:39:
2d:6d:e6:4e:3a:21:1c:ac:60:87:69:7f:52:de:66:c5:df:23:
38:63:f9:9e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
Truncated 7855 bytes from beginning
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
3,143,065 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:12 2025 GMT
Not After : Dec 26 10:26:12 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b2:4f:ff:4f:49:11:e7:c4:36:67:d4:1f:c7:9f:
e8:00:0a:6a:15:9e:58:8d:07:e2:b6:d2:70:ab:fa:
19:e6:f0:2c:49:bf:07:10:6b:8b:74:5e:95:7c:29:
56:6c:50:20:18:03:46:da:68:87:26:47:a3:fb:62:
b4:a6:50:a9:c4:d3:9f:16:c1:ba:e3:25:2e:3c:f8:
ce:b2:b7:5c:4b:92:8c:89:eb:00:87:d0:84:8f:76:
40:7b:77:f1:bd:f7:45:b6:b6:5d:49:a7:f0:6c:71:
83:ed:7c:dd:3d:c8:59:a1:f2:6f:d7:31:62:0a:86:
3f:29:2c:1e:ff:a8:3a:bc:f1:ea:82:39:24:e1:fb:
fa:72:5e:2c:71:96:a2:fa:30:06:81:af:d7:07:c2:
77:3e:64:35:a1:91:98:89:f3:60:2a:ed:b7:c5:b8:
dc:76:4b:57:23:54:c6:88:1d:bb:cb:99:35:f7:6b:
8c:18:c6:0f:5f:6f:83:47:79:b3:e0:dc:6f:ed:10:
4e:0e:27:f2:f7:5a:18:e1:71:96:b0:75:1c:be:4f:
9f:e5:48:06:54:af:de:79:58:12:8f:35:59:68:77:
6b:f0:f4:b4:1d:3b:71:ab:4b:a5:e4:3f:47:ec:49:
aa:24:b7:21:04:2e:dc:de:70:15:2c:dc:d7:b9:47:
40:97
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5b:11:df:f3:c2:61:30:c7:90:16:90:94:60:ff:23:ba:9a:a0:
57:98:a2:a0:62:ca:51:5c:fd:4a:23:b6:0a:b8:d7:ed:6e:2c:
f4:85:71:be:ff:20:40:53:9a:0e:48:e1:ad:42:12:5a:15:ab:
02:2a:c0:1f:29:6c:a4:13:d9:f8:89:a7:a4:15:a0:6c:48:d4:
05:8d:48:8b:33:10:a0:36:70:4c:01:be:7c:e7:a3:94:84:d7:
d3:7e:36:4f:6a:21:ff:fb:4b:3d:bf:0b:8e:8d:36:fb:5b:d4:
c8:f8:70:b3:1c:2a:c2:99:bc:87:52:b0:1c:56:d4:9d:cc:0f:
19:c7:77:6b:62:d4:c2:92:0e:0e:f1:54:e1:db:a1:66:d1:d6:
01:33:af:82:09:8b:c3:d1:6a:df:42:20:e7:c2:98:95:8e:46:
34:a1:85:d5:21:a6:0c:77:6b:01:89:49:d0:9e:ea:0c:a6:84:
a9:f3:3b:01:19:37:88:5b:53:d6:2c:56:ba:c1:80:dd:b6:f9:
9a:db:63:1b:d4:75:a6:e9:0b:99:7e:59:19:85:26:7f:27:cb:
3c:69:68:ff:f7:4f:3e:9a:97:d4:7e:f1:b8:17:d8:0d:10:17:
28:96:61:f7:f1:5a:59:70:3c:ce:a9:02:ce:a8:ba:79:4b:0b:
af:55:ea:6e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:12 2025 GMT
Not After : Nov 27 10:26:12 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
14:54:7b:1f:31:bf:2f:94:c9:1a:c7:c1:c6:c7:e5:72:63:39:
2a:1c:24:19:41:3e:dc:4b:35:36:37:49:62:1f:7a:25:7a:c3:
1a:bb:9a:2b:9c:61:0e:67:e1:4d:bb:44:fa:a1:57:b4:ba:45:
8c:bd:0f:70:fb:8a:47:1c:20:e7:7f:a3:1f:25:b4:aa:ba:93:
e9:1d:61:0e:f1:c0:47:c3:69:3c:89:fc:38:05:55:88:92:b9:
b9:a3:02:95:d6:07:1b:8d:76:6b:df:3c:33:45:8b:9b:dc:c3:
7c:6b:e8:41:a8:1a:c0:ac:71:f6:7b:31:d8:83:96:9e:6b:80:
1e:f6:a6:18:78:a1:9e:bc:18:5b:c9:33:d1:e9:bd:d2:9d:c2:
cb:b9:61:8d:c2:92:e1:e2:20:56:08:84:06:71:00:e1:ed:77:
c3:a5:ca:62:3f:73:86:04:05:0e:25:09:0e:d5:49:e0:cf:88:
73:bc:ec:4e:0f:f7:23:b1:60:05:33:9b:e7:42:36:77:3e:5b:
4e:12:54:1b:36:77:f5:cb:c0:1e:c1:ad:a5:1f:4a:08:c8:53:
13:bd:a4:33:96:6a:37:07:e0:85:11:8d:f2:a8:80:d1:85:05:
65:8b:23:43:cc:be:0a:b8:dc:a6:b9:96:64:71:ad:16:48:9f:
99:c8:ad:30
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
Truncated 3059 bytes from beginning
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
2,898,424 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:06 2025 GMT
Not After : Dec 26 10:26:06 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b2:30:2e:5d:d6:7b:50:5e:dd:d1:cc:d0:75:0f:
9c:55:1c:33:84:35:7d:d9:b0:ed:d2:73:db:5c:6a:
34:2b:3d:1d:d8:4d:23:53:01:7b:67:59:ef:b1:a4:
ec:e8:17:25:eb:99:a6:38:df:87:59:23:4e:01:87:
d3:3f:3c:c4:9f:29:fa:d4:04:ba:e4:aa:54:8b:7f:
c3:26:74:03:8a:51:a5:b6:0c:a4:8d:34:28:8f:9a:
e1:d3:30:e7:7d:ab:a0:ea:e1:89:2e:90:71:e5:67:
8a:ef:0c:f7:a9:f1:f4:6f:65:b9:26:70:42:b6:3d:
37:47:45:d3:98:0d:87:97:be:dd:63:a9:1f:78:c7:
c3:08:5f:b0:66:35:a8:c1:7e:61:76:fe:07:78:09:
d5:71:11:96:00:94:b4:d4:23:3b:93:f1:7c:2d:41:
05:5a:02:b4:b9:0a:59:a8:e1:88:95:13:61:1d:01:
b7:47:68:17:cc:7d:da:62:fb:e1:7a:ee:21:38:16:
05:8b:87:d2:ab:b1:2a:b1:7e:18:fc:80:7c:fc:87:
88:1a:58:ee:ea:63:9a:23:e9:e1:f8:96:73:1a:7a:
fb:86:ea:56:7e:2b:7e:76:dd:af:ce:c1:6c:cb:4f:
19:4c:d8:3b:13:a6:9e:ee:bb:83:d7:a2:0c:c6:69:
17:49
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
10:0c:0f:ef:c0:17:f7:3e:3e:54:3a:6e:5d:31:48:2a:d9:3c:
41:b9:20:99:33:68:0f:91:20:1b:a5:36:e9:2e:8b:5a:af:48:
ef:13:da:33:ed:8d:8c:1e:7f:51:41:ae:ea:b3:02:ac:ab:85:
76:2d:5d:21:97:b4:a2:6c:8c:f4:ae:cb:e8:6b:f2:46:e7:e0:
f7:12:c0:65:fb:ba:e9:8d:22:4f:47:54:5b:cf:10:7d:29:1d:
29:93:ab:44:61:51:85:68:8b:73:43:5b:21:35:bf:67:d2:6d:
fe:89:7f:95:90:e2:37:ec:80:bb:5d:0e:7f:eb:66:41:a3:9a:
66:91:70:a8:0f:d3:1a:de:82:a3:7a:29:0a:7b:e7:2e:fa:ce:
13:7c:7d:f2:30:20:07:6b:fb:36:e0:fa:e6:39:7a:c9:7d:77:
43:d4:69:01:cd:78:a7:3d:f7:41:b7:0a:e7:da:d3:a0:3f:57:
74:e9:9b:46:f6:cd:e1:08:9b:cf:d6:53:4a:07:84:a0:f6:e8:
e0:45:d3:0c:a2:1e:55:ce:a2:3c:ed:71:c2:9a:7f:10:e1:90:
d1:ec:2c:6a:79:f2:bd:57:3a:08:3b:f6:7b:b5:4d:18:7d:95:
9b:09:d3:73:41:b6:36:36:5e:3e:fc:21:d9:b7:ef:aa:8a:9a:
fc:94:e0:c2
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:06 2025 GMT
Not After : Nov 27 10:26:06 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
91:6a:3e:b3:a9:11:ff:63:3e:87:28:14:57:fd:89:66:16:de:
6b:cb:44:f2:73:d6:95:9f:3a:9f:18:91:25:00:5c:43:9c:53:
9c:62:67:d7:c9:a4:05:7e:e0:4a:d4:13:a0:6c:84:25:a5:c3:
a2:ab:bf:23:56:17:b0:80:62:ab:51:33:fc:55:4e:e0:a6:a1:
b7:b2:28:03:a7:7b:39:d7:b0:02:de:41:2b:96:b2:7e:26:48:
e1:64:e1:5a:ae:01:1d:34:83:2a:3f:94:a8:d4:09:2a:d6:e3:
c5:5d:7a:34:19:f9:cb:3c:24:90:0a:19:fc:82:d5:5a:1a:32:
02:8d:44:7c:86:c6:fd:01:78:82:28:64:c0:39:21:25:80:1b:
52:e3:62:40:87:24:05:00:81:83:75:f1:10:9a:26:b4:56:54:
53:ed:5a:7c:fd:7e:56:0e:9f:37:b8:98:26:4f:ba:01:c3:f2:
81:78:7d:81:0d:3b:17:33:7b:c2:33:fa:61:92:5a:5e:7e:e7:
d6:95:73:b9:87:75:2c:5d:d5:91:08:e1:77:91:bb:eb:07:72:
2b:56:3c:f5:a9:1e:ab:c0:f9:9b:1f:08:10:5a:19:2a:97:6a:
f5:04:f2:ba:b1:e3:4a:2b:8e:1d:b2:b6:56:f7:1f:9b:5e:9f:
d5:68:17:7b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
Truncated 7943 bytes from beginning
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
* TESTCASE PASSED
20,786,991 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 12:00:08 2025 GMT
Not After : Dec 26 12:00:08 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9b:b7:87:b2:1a:71:59:1a:53:07:c7:66:72:0b:
14:43:30:8c:62:66:7b:50:37:0f:4a:c0:35:e2:0e:
d2:7e:37:14:79:56:74:b9:e8:5a:0e:c2:1f:16:89:
51:65:5d:57:c7:e6:44:a2:a6:36:f8:e7:88:51:55:
0f:7f:2d:81:a7:b0:ba:5c:20:d1:18:c7:67:28:26:
38:a2:c0:72:3e:05:1b:40:1f:2d:ed:c3:3b:e0:65:
ed:fa:0f:73:48:f6:f2:cd:89:f0:f9:18:23:27:19:
1f:17:ab:5a:a7:e4:3e:88:72:e0:75:28:7b:70:c5:
c4:9f:f5:f6:b0:f5:23:d2:01:54:82:c4:04:e4:ec:
88:0c:85:1f:fa:26:69:84:90:94:59:67:8b:ac:20:
79:40:08:cc:4e:cd:44:db:73:32:25:66:42:d0:f7:
eb:59:30:0f:d0:19:c0:90:ce:fa:75:e7:91:bf:af:
1d:0d:ce:35:d8:4c:33:75:ec:a7:66:c6:89:f6:fe:
6d:3c:c1:63:34:10:49:65:dd:83:ae:fc:26:7a:4b:
50:ec:7a:2e:ce:fd:31:2e:d9:88:a9:bb:ff:93:b6:
e8:1f:82:13:ba:97:48:10:14:35:05:63:43:1b:bb:
7b:d3:ea:89:65:f5:9b:16:f1:50:fc:98:25:59:fd:
17:1d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
48:a0:9f:ec:9e:3e:0d:ce:e0:70:83:e0:6b:e3:5d:bc:ac:a3:
14:86:13:3c:62:96:24:f7:d7:e2:62:00:b3:42:d3:19:ad:c1:
62:f5:3b:50:5a:d8:cc:f7:92:36:dd:2d:98:61:9d:fa:e5:df:
76:1c:3f:a9:91:8d:14:f8:3c:92:9d:90:7e:76:22:75:7c:a4:
e2:e8:52:9d:00:86:cf:3a:da:bc:66:c8:b4:af:de:d6:d8:16:
1f:b7:34:7f:3a:5b:ea:12:7c:84:e7:11:39:93:ed:fe:88:7a:
0d:e8:2d:c1:51:26:bc:ba:f5:09:2b:9a:88:f6:77:68:59:68:
e0:f0:26:23:9f:d8:ce:28:bd:cd:dd:01:e1:69:57:96:00:07:
4f:d7:c3:65:28:f4:15:32:02:f1:29:9d:c9:c9:94:25:07:63:
be:3b:d3:d6:fb:a1:73:f4:9a:d5:80:87:15:32:d3:e1:62:79:
c6:79:8c:1f:94:e4:4d:f3:56:e6:ed:53:32:10:48:4f:f8:c0:
db:2b:d4:05:a9:f0:27:a7:b5:d2:92:6c:03:05:97:0d:e9:ed:
03:b6:eb:b6:7e:bb:df:53:32:80:77:aa:fa:b0:19:3b:97:60:
f1:67:b0:a9:5a:f0:57:1b:1a:64:2a:29:0f:33:3c:13:a6:ad:
58:3f:a4:54
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 12:00:09 2025 GMT
Not After : Nov 27 12:00:09 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
71:5d:b2:72:60:60:c8:3f:b6:62:d2:4f:16:26:9e:2a:ca:df:
ba:48:95:b7:5e:6b:c3:fb:74:68:99:94:9b:ab:a0:b2:8c:fd:
47:e6:7b:e1:c7:0e:0f:44:de:1b:75:9d:46:cc:6b:8d:b0:d2:
e2:a9:c7:85:32:84:a2:1c:75:42:d5:ac:9d:65:bb:3d:5a:b0:
03:63:a2:f4:99:b6:e3:53:a2:6a:25:c1:91:a1:d4:ae:27:ad:
ef:dd:df:ac:94:00:96:e5:9a:10:c5:f2:4a:26:12:89:aa:7a:
da:f8:da:a6:31:20:7a:61:82:df:6b:75:06:8c:12:db:79:fc:
e5:20:59:da:52:1f:3e:62:c5:2c:a4:a6:b0:23:43:1d:fe:39:
a0:8f:b5:be:9d:4c:4e:83:02:8b:ac:51:84:24:58:97:48:e6:
61:66:95:c1:69:d0:c7:a7:43:cb:7c:88:30:56:28:36:af:72:
2c:82:8d:a6:6b:93:f0:1e:cf:37:92:6b:7b:1b:48:81:a9:ff:
b1:d3:e3:97:7d:6c:a8:e2:46:1a:2d:16:0f:bf:e5:47:e7:9d:
f3:1c:a9:10:19:6a:7d:4e:9d:22:af:35:5e:97:ba:f9:4d:95:
a8:38:ed:fa:00:38:af:8e:9e:e6:09:f7:04:ad:fd:b7:ad:a2:
e1:25:4c:50
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.58s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,373,114 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:52:52 2025 GMT
Not After : Dec 26 10:52:52 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ac:38:90:d8:99:8c:c1:85:a8:2d:95:4b:ac:18:
2f:65:e2:3a:6c:4b:d9:75:97:8d:8b:70:0d:60:aa:
a8:9a:b0:7f:fb:03:23:22:eb:13:c3:6d:69:5b:e2:
34:a8:03:78:bc:6a:2c:84:93:4c:fd:32:a8:67:31:
44:09:fa:f1:fd:54:db:25:7b:e7:bc:11:33:24:f4:
f7:3f:62:e2:07:33:5a:90:61:35:d9:3c:de:1c:c1:
66:16:46:44:08:e7:36:ed:20:30:a6:4c:a9:cd:70:
a4:41:5d:32:9b:fb:29:ed:69:10:aa:16:09:fa:8e:
26:1c:8d:5a:a0:81:44:86:eb:d1:b0:a1:de:3f:64:
66:51:12:b5:b9:de:5c:bc:73:ce:37:18:7a:ac:fb:
11:14:bb:7e:23:79:74:1e:56:5d:45:b5:1d:ec:0a:
44:87:88:61:c5:b9:9b:ed:01:6e:e6:34:d0:a0:ec:
2e:61:b0:4a:b4:c6:0b:58:62:f0:30:97:57:fe:2d:
07:21:24:03:77:fe:98:2f:03:d3:1f:9c:a4:45:d6:
f4:df:95:55:ea:0c:f1:32:41:cc:dd:d1:de:21:d7:
0c:82:59:0f:ca:51:c5:59:13:4f:f1:21:0c:f7:56:
0d:07:5f:7c:6c:be:a2:6e:37:79:ae:f4:05:76:82:
14:a9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
61:5e:10:21:0a:7b:af:7a:03:11:41:38:b1:a7:84:84:a1:7a:
7b:b0:21:57:95:bc:7d:d0:63:ec:6d:13:3e:4a:bc:48:e7:14:
f6:c0:a4:ce:26:68:53:b8:0c:98:a1:ca:e1:dc:32:e5:42:a0:
d8:b7:25:b2:3b:65:46:f4:da:87:8f:d2:17:a5:54:50:ef:f5:
6b:f5:c5:f3:b7:12:c8:af:a6:0f:bd:c2:8c:59:71:63:88:35:
c3:34:bb:aa:f2:7e:2a:0f:5f:85:a4:3c:52:b5:45:a7:8d:ed:
ff:23:95:85:11:69:9f:17:4e:09:23:8c:22:55:01:c3:ad:15:
fc:6a:02:11:7a:a9:9c:40:ef:25:19:8f:ae:17:26:d0:ae:f7:
ea:46:e6:32:d1:98:9f:21:a6:e8:5f:42:75:6c:40:75:5a:ab:
8a:40:bd:58:de:37:23:7f:c8:2a:78:a9:6f:bd:3a:17:89:f9:
39:69:ce:23:09:08:e7:d3:64:e7:89:3d:5b:b1:47:eb:9e:2e:
2c:de:13:b4:5b:85:3b:a9:b4:80:93:bf:6e:eb:70:89:04:4e:
27:e0:4f:d2:f7:16:23:69:19:28:25:68:ae:93:3c:da:d9:75:
d3:20:99:46:df:20:f5:df:91:b4:ad:40:e4:61:b5:df:fc:95:
7f:aa:54:60
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:52:53 2025 GMT
Not After : Nov 27 10:52:53 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a3:37:02:7e:dd:9d:72:35:73:2e:54:0a:99:63:6f:e3:04:2b:
32:c8:68:e6:7a:b2:86:88:35:a2:b4:79:2d:a0:f7:ea:f9:b0:
26:dc:c8:c4:ed:e9:5d:19:0c:5d:3d:48:ea:8b:c7:30:db:1b:
92:74:46:5d:fa:e7:28:53:8c:ec:47:87:7d:34:77:4c:49:a9:
05:42:56:16:e6:69:75:d3:3f:ef:17:df:3f:05:72:55:e9:9d:
72:5f:34:d7:28:7f:04:51:08:06:08:86:43:24:07:84:b7:5a:
06:34:98:54:0f:1d:15:24:8e:a1:99:30:18:e9:ae:e7:7a:4a:
15:c2:56:31:18:7e:d5:8a:3e:a4:50:af:4e:4b:11:d4:11:92:
0d:89:53:2f:96:63:8e:e7:de:f5:d0:83:b6:b4:1c:79:4d:3c:
e6:0d:13:da:60:d5:e7:48:ac:c7:42:7f:bf:23:dd:03:9f:67:
77:57:71:0c:5c:59:fd:5a:9a:3a:92:17:fd:99:7d:8c:0c:30:
7d:51:81:18:e4:ba:fa:18:f9:67:9e:13:8c:ec:2e:eb:7d:30:
97:2c:45:93:eb:e8:ff:70:de:7a:67:2e:9a:37:f0:4a:1f:92:
b0:a7:9b:cf:fb:8f:b9:17:56:2d:31:87:2a:52:02:61:97:51:
80:87:24:77
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.15s
Truncated 7943 bytes from beginning
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
* TESTCASE PASSED
20,946,403 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 11:14:36 2025 GMT
Not After : Dec 26 11:14:36 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:98:c5:24:a6:a4:fe:6e:a9:ea:23:ee:cb:2e:1e:
b7:fe:5f:c1:68:f2:6d:f6:45:4e:22:ad:80:39:f3:
79:f0:64:29:bb:94:bf:40:0a:f8:e2:ea:61:26:2e:
bb:f4:82:67:7e:f5:fd:b5:95:f5:e3:9c:3b:ef:4d:
80:65:8c:ba:54:e5:7c:72:a9:a2:e4:3f:ae:54:e4:
e2:84:62:80:4a:55:fb:e1:ec:82:67:6b:68:8b:83:
89:78:8a:73:fd:d0:99:ae:a1:f1:58:a2:f3:d2:d4:
ae:13:9e:0c:7e:f5:fd:75:9d:9d:91:7f:10:2f:80:
9d:ca:7d:7b:62:fe:61:ad:ee:90:3a:05:4b:f1:21:
f8:71:3a:43:b0:37:7a:28:fd:e9:67:a1:c1:02:ca:
0c:80:03:9f:bb:15:33:69:09:09:ec:64:77:55:7f:
95:01:64:08:5f:ed:21:88:11:9b:4a:42:b1:1c:7f:
a9:6a:8d:b9:e9:d5:0a:9a:1f:83:07:ae:0a:ed:b8:
1e:12:77:01:d1:20:d0:87:36:ec:d6:b5:ca:15:75:
6d:49:f1:57:8c:38:93:fe:c8:0e:25:f5:4e:90:be:
42:af:35:4d:ad:97:0d:29:7d:cc:f1:88:81:38:eb:
f3:28:ee:1d:bd:a7:fb:ac:b8:32:a6:84:65:30:87:
18:a5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
51:b4:4c:81:e7:03:b7:6a:7f:fa:f5:9f:a8:06:0c:47:3f:6f:
aa:3a:b5:a4:88:43:ff:19:10:f0:d4:4a:ae:4d:35:20:12:ea:
0d:4b:44:8e:9e:66:0c:74:ff:1f:94:74:75:3b:06:5a:04:e8:
33:22:81:3e:65:06:c7:32:bc:c5:89:05:d3:18:5a:c7:c9:4b:
eb:05:b0:1d:42:ce:2c:ce:be:1c:43:99:ab:6b:b7:a6:78:00:
24:33:95:18:ec:62:f0:51:3b:8d:be:7e:d7:10:48:f4:43:46:
d4:22:90:42:6d:f4:fa:b2:6f:e7:e4:a3:db:6e:c9:58:9d:64:
dd:a7:a8:20:17:bf:b6:b9:4d:a8:18:d5:c0:2e:b5:d0:a0:42:
b0:6b:4f:2b:12:aa:d4:8c:2d:37:f3:e0:af:2c:77:65:d0:5f:
26:21:81:95:48:a3:b3:a3:25:d0:8c:d5:a7:15:a8:63:12:d8:
33:3b:96:71:83:2a:4e:a1:31:1b:3f:3b:ef:ee:c5:45:e1:7b:
04:03:5c:82:2c:d1:77:c9:75:70:07:1c:61:0a:1c:76:56:a6:
6a:b2:c3:63:da:85:d3:77:73:b7:df:5f:36:43:e2:61:ac:7b:
59:2f:00:71:2a:22:86:0d:0a:eb:9c:cf:e7:45:4c:e8:d8:a8:
c6:4d:bf:96
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 11:14:37 2025 GMT
Not After : Nov 27 11:14:37 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
90:bc:a8:9a:d9:b2:e5:60:f3:23:da:52:18:7b:07:3f:26:2e:
44:ae:17:2f:db:df:6f:cc:60:a9:24:5e:b4:4b:00:09:37:76:
f5:91:bd:27:94:60:25:43:7d:b8:f6:4b:5c:5c:39:eb:da:46:
39:0f:8c:52:06:a3:0e:a7:ea:04:6f:09:6b:8e:31:b1:09:78:
16:3e:4e:09:ed:26:c8:7a:c8:ab:ee:1d:37:6e:0b:81:c8:5d:
9e:26:7f:38:68:07:3b:ca:77:5a:25:8b:73:ea:81:91:b3:a3:
34:9a:a3:df:6a:d8:7c:29:d2:8e:a5:1d:2b:14:5a:e6:59:34:
bf:ba:c9:91:2c:43:93:0c:ad:1f:18:dd:9e:8f:ff:bc:44:30:
12:f2:ef:4d:5b:cd:f1:ea:0a:5d:28:19:e9:59:9a:85:05:3a:
2b:7a:94:74:81:b7:e2:f9:f8:54:1f:a9:e8:aa:b9:49:25:ec:
b7:91:c8:5c:12:3b:be:0c:e8:87:74:97:89:41:fd:7d:f4:8e:
84:7f:4c:e7:d5:c8:35:fb:c2:50:cb:0e:1b:ea:79:41:96:39:
89:8e:89:37:a9:8b:5c:f3:9e:86:f7:9e:79:07:94:62:ae:1d:
b5:38:93:2f:6c:8e:e4:51:2b:71:c6:ab:a3:b1:ae:3a:70:27:
d4:78:8f:6a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.63s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,556,852 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 11:33:27 2025 GMT
Not After : Dec 26 11:33:27 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c3:60:e0:08:3b:87:d3:ac:62:2e:77:77:7d:46:
94:ac:3c:c7:e4:0c:03:5c:91:7a:43:8c:93:c6:31:
5b:e3:4c:3f:20:c9:70:88:11:5c:3d:f7:13:f6:64:
cf:fa:db:b4:fd:0a:31:bb:82:23:5a:ff:a8:2d:b3:
c8:cc:60:01:67:32:70:a1:a6:8a:b1:07:0b:dc:e0:
b3:6c:d1:89:2c:a6:d3:fe:d3:75:ab:10:24:0a:f5:
45:4b:20:80:5e:b8:98:61:3f:8c:29:df:75:b5:39:
bb:cd:cc:81:69:3a:74:09:54:fd:44:20:bf:24:59:
da:49:cc:3c:05:4a:ea:e0:82:93:7a:ae:f2:16:6f:
3c:b1:03:13:01:b3:99:9e:37:35:e5:08:4d:0e:97:
e2:fb:a3:bc:79:38:ee:5c:5a:15:29:f2:0e:a1:3c:
c1:64:6f:ad:48:be:12:62:07:2d:d0:f9:31:58:ba:
59:0e:1b:89:5a:5e:3a:85:6d:4c:a8:82:af:3e:cd:
d1:9c:81:10:9f:62:7e:9f:fe:97:b5:91:ee:39:d1:
9a:b3:9b:07:ea:cd:d8:63:dc:c0:89:42:55:ea:ec:
3f:ca:3b:f6:32:00:70:ee:71:76:ec:fe:fe:e7:b6:
a1:b1:8e:f1:ec:6a:53:7a:63:6e:a6:41:05:11:d8:
ad:81
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ad:e8:90:87:64:36:67:44:c9:5e:0f:af:36:4a:65:85:f0:6d:
7a:c3:81:a1:19:6b:f3:4e:24:09:1d:eb:28:2c:a6:3f:93:cd:
9d:c9:0d:d4:4f:c5:0c:10:43:8b:1b:73:86:b3:43:55:08:45:
54:5e:46:1d:1c:92:27:c7:45:66:38:2e:16:3f:11:c9:3f:c1:
6d:3b:4c:30:b2:61:c8:e9:7b:24:97:26:bd:a3:5b:9e:47:db:
3c:a1:26:8d:8a:7e:2d:25:b9:d9:1c:72:b9:ee:c6:78:23:21:
ab:2b:c1:6c:af:23:60:14:49:4c:2d:1d:9d:7d:65:ea:eb:08:
86:72:80:97:01:51:b3:26:dc:31:d3:a1:7b:a9:1f:af:3f:d1:
99:f2:49:06:11:5c:d7:e3:56:70:e6:ea:76:fd:0f:00:7a:2f:
31:f6:51:61:5c:63:20:3f:53:02:2c:c3:10:ac:67:1a:73:53:
c7:39:d6:d3:b4:b3:aa:9e:c0:c5:c6:9c:e8:bd:e6:67:cd:1b:
d7:8d:4a:8e:cf:f7:3a:76:75:b4:a0:d3:9d:97:a3:7c:4a:28:
63:62:55:a5:98:be:02:67:7e:dd:76:2a:dd:2d:f3:43:82:1e:
99:45:40:bf:51:14:a2:33:5a:01:be:f5:50:b2:ce:52:e9:bc:
ca:e0:23:a3
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 11:33:28 2025 GMT
Not After : Nov 27 11:33:28 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c0:8f:8e:57:1c:84:a8:5c:b0:34:31:3f:8c:20:bf:2f:30:76:
ce:ae:0a:5b:12:b2:2f:41:41:42:39:af:da:20:be:f8:42:9a:
8a:aa:78:d3:7b:00:22:c5:8c:c7:8a:b4:40:68:e2:52:5a:a0:
78:83:e3:f9:29:ae:71:f2:7d:8b:48:9d:99:f2:18:5d:d0:84:
4a:8c:c8:95:04:ef:22:c9:cf:56:17:dd:b8:60:95:10:da:b3:
b4:90:a9:71:67:aa:0e:76:25:0e:18:96:43:50:c7:8b:84:2d:
a9:db:54:ad:2c:ea:d2:5f:fd:68:d0:8b:45:e5:72:18:59:66:
9f:f6:3b:3c:56:a8:f3:96:85:d1:9a:71:a4:b1:05:e3:3f:7c:
99:11:dd:3e:32:41:2a:8f:f0:cd:e0:c1:b5:49:e8:7a:75:1e:
e8:31:8c:fc:63:c3:01:3e:1e:07:30:8f:ca:bb:68:6b:83:dd:
11:8b:c9:c5:14:1a:eb:59:04:bb:ec:41:75:77:6f:4b:15:4b:
c2:b2:fc:85:99:8d:c1:7e:de:1d:9b:9b:50:24:7b:e8:c6:28:
14:20:13:c1:b2:e3:b7:08:8a:ec:dd:93:78:d1:37:3b:77:07:
32:40:a7:de:d7:b8:dd:a7:10:5a:4f:79:5a:72:44:f2:8c:e4:
e3:21:e4:27
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.44s
Truncated 7878 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
3,139,854 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:15 2025 GMT
Not After : Dec 26 10:26:15 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:aa:40:ea:63:bd:6b:3e:aa:6b:ca:b0:e5:9f:29:
23:13:2f:43:e8:f1:50:69:fa:4e:c8:aa:e3:7f:5a:
2a:f1:bf:3f:04:ef:e7:d8:ca:26:23:bd:21:4c:28:
46:b2:f9:bc:ad:4b:f0:1c:72:21:61:90:6c:cd:81:
b2:85:d4:73:98:17:49:12:35:f4:ff:89:76:52:ec:
33:ab:3a:d7:f5:23:6a:ec:7b:8f:bf:61:9c:7c:6a:
83:ea:5c:ee:e2:87:7e:c2:58:57:78:a9:d2:12:15:
bc:ce:94:e2:2e:e6:cc:03:42:28:53:70:ac:18:03:
2d:60:d4:51:16:1d:0b:bf:a4:f8:19:ac:7f:4f:45:
73:84:ad:b5:43:b5:23:9a:ce:49:96:4e:ca:d9:a9:
73:3d:4c:ab:af:95:37:81:37:7e:27:38:26:b4:e7:
af:a0:67:e3:ab:c2:3b:e0:47:54:5f:ed:58:95:ed:
c5:95:96:6b:11:68:b3:32:4f:26:27:b4:85:1f:95:
80:ee:24:af:8b:9e:f9:df:76:a7:85:ce:73:a7:a1:
50:c9:6a:02:71:4a:7f:8c:ca:43:41:d5:8b:f1:b3:
e6:c4:de:7a:55:a0:56:0d:da:70:b4:80:75:50:78:
cb:c2:bc:e5:28:76:2b:e9:87:1d:a4:ab:0f:da:98:
46:af
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
92:89:ae:9a:23:02:fb:2d:98:b7:5d:93:3b:7e:ba:9e:c7:54:
6e:ef:ec:03:f0:d6:d7:42:89:83:77:f8:b3:c0:9a:61:29:59:
dc:8a:7e:01:01:65:8a:d7:51:99:71:4e:30:1b:f0:e7:48:04:
8d:67:ca:99:7c:f2:e4:e3:ee:e1:83:7a:8e:f9:cf:f6:b4:65:
c6:69:93:ae:78:32:39:c5:19:f4:62:fd:9b:5e:b5:4b:18:2a:
fa:7f:69:f0:a5:eb:70:10:c7:53:7c:89:d2:e4:c2:f0:d7:6b:
fd:2b:fa:b3:5c:d5:ee:3a:c1:83:b8:5d:78:11:82:3d:8b:70:
67:a5:d2:d3:1d:c9:96:fa:fd:fc:31:d2:ac:41:4c:45:d6:e3:
3e:d2:eb:c9:76:fa:63:23:18:93:11:78:7d:d1:9f:0a:ed:bd:
1e:3a:d8:1b:8e:0f:a1:f0:19:9c:49:da:54:c4:aa:cc:25:81:
02:b0:6e:eb:57:fb:e9:ab:dd:f9:78:91:06:7d:ae:f5:d6:25:
77:ad:23:4e:25:98:bc:aa:ba:ff:bb:a8:64:98:b0:39:53:bd:
62:86:0c:5c:ad:a7:cd:0a:c3:68:cb:79:d7:48:6e:69:5c:52:
70:89:d8:0e:fc:cd:3e:d4:a2:3b:ca:31:32:f7:70:84:47:72:
89:7f:4e:f1
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:15 2025 GMT
Not After : Nov 27 10:26:15 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
69:78:2a:df:65:c6:c7:10:f7:10:02:a5:b6:ef:f9:7a:5f:c3:
ec:6d:67:00:2f:f7:38:c5:d2:85:c5:c9:df:9e:04:b9:43:f1:
04:b2:a1:c8:94:91:46:3c:e5:f6:c2:7c:67:ab:49:6b:85:b9:
2f:36:e8:28:ea:08:db:ef:1b:2c:3c:d3:00:a3:50:0b:d6:f2:
e3:90:2f:de:8d:c0:05:bd:d4:96:9f:95:91:2a:96:9c:e6:ab:
b1:22:c9:6c:1c:bb:66:ea:8e:f4:3d:6b:02:4f:2b:97:0a:6b:
54:84:0f:a2:db:21:c2:70:7a:b3:a9:9f:14:ce:f9:58:05:93:
16:e6:48:c7:1d:5b:31:51:45:dd:a6:a8:f0:2c:76:70:a2:10:
5f:bc:79:69:71:ad:28:00:e6:3c:8d:78:25:0f:a6:e7:fc:0c:
6a:56:77:11:bc:e6:5b:c5:a1:74:3a:27:d0:fc:d0:cd:b5:7c:
87:34:41:41:67:f1:f8:5a:f4:08:08:b3:24:26:7b:5e:47:af:
40:ba:60:55:ad:51:bc:87:d4:65:01:fe:9a:f5:d1:4d:a0:5c:
96:f0:3e:a0:ea:30:6f:40:18:9a:04:b7:d2:b6:18:1f:7d:6c:
8b:3a:25:18:86:f0:6a:4c:2a:ab:91:af:e4:89:2b:0a:dc:79:
f0:2c:75:f7
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
Truncated 3082 bytes from beginning
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
2,895,688 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:11 2025 GMT
Not After : Dec 26 10:26:11 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c1:fc:62:9c:9b:7e:ed:07:06:c9:14:5c:80:4d:
7b:7f:d2:43:ce:eb:37:06:b0:3d:e6:df:45:d5:20:
54:02:82:64:aa:64:1f:2a:9a:44:d3:03:2d:2e:53:
ad:ff:7f:66:3a:03:95:c0:bb:f4:4a:c5:fc:81:09:
6f:72:a4:b3:3a:d5:95:c4:0e:0d:63:02:42:7e:7b:
9b:c4:a8:0c:d4:32:88:f8:fa:2a:6d:a4:6c:84:e8:
96:bd:88:d5:8a:34:5c:c4:5a:76:9d:98:12:e3:f0:
72:7d:dc:2d:89:c2:bf:43:48:1e:48:0b:a9:fe:8b:
13:07:f5:d4:37:c5:bf:4e:57:7b:59:f0:da:d8:91:
7a:d6:53:86:e7:bb:b4:4e:b6:4e:27:56:11:40:6a:
3c:47:1c:d0:d1:de:9b:1a:d3:69:a6:47:a3:a0:92:
46:e6:14:6c:2d:dd:05:31:a1:0b:20:63:dd:cf:86:
36:f1:e7:ad:2b:ec:9b:d8:3a:15:82:70:b7:0d:ed:
51:84:f7:3b:20:42:80:0a:bd:f3:b4:d3:f8:e0:f4:
fb:0f:65:98:1b:2a:0e:7d:68:e0:50:c1:80:2f:34:
4e:d1:8b:eb:1c:d3:c3:27:c9:f2:b5:99:f3:71:5e:
f6:c3:d4:f7:c5:19:7b:bf:47:5c:4b:01:c9:64:c8:
52:4b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
17:49:3d:8c:0e:d3:c3:da:af:d5:b6:38:c2:24:74:c5:6a:4a:
35:57:f0:2a:a7:b5:f6:a4:37:51:c4:61:ae:8c:8c:28:71:cc:
79:12:0a:be:22:8d:7b:6a:5c:22:a7:94:f2:b9:2f:24:d0:5e:
c5:58:d9:5e:b0:23:e5:00:eb:6b:23:40:01:09:b5:33:bf:27:
03:4d:e3:d7:b9:c5:aa:25:43:3d:e4:81:3a:ae:3a:42:0b:2b:
d0:c6:6b:65:69:f7:a4:15:e2:25:2d:4e:95:2b:c7:7c:fb:5a:
e3:e4:be:ac:1e:32:81:ae:04:ef:47:24:ed:cf:c0:3b:44:10:
80:da:8f:e2:42:66:4b:e3:46:b3:50:74:f8:a9:ed:ec:26:60:
13:bf:98:3b:9a:b0:e8:bc:b1:d3:f4:df:e4:c5:be:2f:c9:7c:
e5:43:f5:18:02:62:70:72:76:2d:f4:99:88:57:97:39:ff:3f:
d5:4c:cf:0e:e8:a4:ab:49:44:8c:27:d6:27:41:35:de:65:78:
7c:18:67:70:a3:e0:cb:6a:22:80:9f:27:81:7f:88:73:67:0f:
e5:59:94:37:27:35:6a:ae:49:f1:f0:24:1b:00:a2:17:6b:ae:
d5:ff:ab:ce:7b:4c:a2:3e:ef:b4:af:ca:8d:52:b2:bc:b9:43:
c2:d5:33:8a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:12 2025 GMT
Not After : Nov 27 10:26:12 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0d:d7:ef:eb:9f:0a:49:13:0f:05:b4:73:42:00:ec:76:e2:87:
5e:67:8c:93:66:0f:34:c1:21:2c:eb:24:3a:12:6d:fc:05:24:
c8:b9:9d:25:e9:a7:dc:ce:fd:94:b4:e0:aa:48:b7:38:75:b6:
95:f6:6f:84:e6:30:a4:51:bf:f7:90:3b:97:31:3a:98:c1:13:
4f:a4:6b:35:75:6c:0c:1d:a0:07:29:7d:38:fc:50:c0:30:b7:
fd:a0:fb:62:8a:d8:ce:60:f2:81:92:d6:48:b1:da:bf:67:87:
89:6b:89:e9:46:e1:8a:cb:e5:62:27:ff:a7:93:04:fc:6e:ef:
e3:0e:ed:53:cc:a0:ae:25:a7:d2:1f:b2:49:2e:6a:24:a0:48:
da:dc:70:12:33:cb:56:b8:f3:cd:52:1a:93:3f:4a:b5:c0:81:
c3:28:54:bf:6a:2c:e1:fd:58:a3:4c:86:29:29:68:21:8c:a1:
d8:28:3d:18:18:bc:f1:5c:aa:ea:8e:9c:4a:3b:83:9f:4b:93:
af:17:ee:cc:06:b0:70:83:4e:38:8f:7a:4f:f4:a4:de:98:86:
76:84:72:e5:3f:ad:6f:95:15:cb:c1:2e:48:37:c6:4c:0b:71:
d8:ad:f8:8b:2c:b9:3e:04:b5:ba:a6:9e:b0:1c:5d:9c:fb:72:
cc:7a:7f:f8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
Truncated 7878 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
3,146,218 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:18 2025 GMT
Not After : Dec 26 10:26:18 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9d:99:17:33:1f:43:b2:d9:da:6e:95:5a:74:ac:
49:d4:7e:ac:8b:23:42:c4:22:41:99:b7:12:75:f9:
25:64:0a:c5:22:d5:a0:d2:09:6a:88:e1:e9:fc:ec:
63:42:fc:46:55:1a:16:a2:94:fc:f6:ee:8e:a4:e2:
52:3e:74:9c:ec:0c:fa:1b:16:67:ea:af:7a:4a:e4:
35:ee:5b:6b:4d:5b:eb:4f:c1:87:6b:a4:8c:19:30:
74:23:ca:ba:ac:a2:a2:ab:8f:7e:89:69:c4:99:bd:
53:4c:bf:bd:d3:3c:e5:4c:de:84:98:1f:73:b6:27:
a6:4a:5e:d5:8f:b5:80:d7:15:aa:ee:b5:ff:a5:d3:
ad:49:43:01:5f:cf:9a:e4:ce:e8:81:9b:c8:a1:cd:
14:93:20:e7:d0:db:e1:7a:a1:ff:2d:71:a0:05:ca:
b6:34:bc:d3:c6:2f:05:20:35:17:e3:36:84:d3:0f:
03:d3:44:34:40:2f:d5:6e:31:ad:c1:6b:38:94:3d:
01:1b:d8:05:48:b6:53:fc:44:05:a3:b9:76:4e:bb:
6b:37:01:bd:a5:2b:0f:a8:13:3f:e7:a5:81:bd:39:
6c:1e:f3:62:a4:9a:37:5f:71:77:51:2e:1c:09:b5:
8b:2c:4e:4e:aa:68:e3:6c:20:10:50:09:51:ad:eb:
6b:d9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7f:f3:2f:88:ce:d8:f3:45:88:1a:95:6b:f5:b2:9a:f9:63:27:
dd:a5:66:66:ba:d4:dc:fb:80:d6:c9:25:f1:9d:9a:11:69:a0:
45:b6:a9:94:76:28:1d:02:98:87:85:bc:c9:3f:d7:b0:88:da:
3a:0a:a4:ee:f6:58:79:6b:b7:ca:d4:59:01:22:d5:62:9a:69:
09:86:8a:4f:3d:3e:e5:a6:82:66:dd:f2:44:66:d9:55:31:ee:
2d:68:85:0b:f4:fe:42:e6:f5:ed:0b:bb:6d:32:0d:69:96:fb:
ad:fa:b4:7d:26:4c:85:32:50:2d:07:7f:1e:84:04:91:28:c1:
bf:69:b2:bd:4f:5b:1c:aa:4d:cf:30:d9:aa:37:1e:5a:97:55:
57:68:03:50:76:8e:e2:b2:b4:39:f2:c3:ba:9f:d8:c1:f2:d9:
1c:63:33:d6:18:42:ef:45:fa:13:2c:bf:76:45:ab:81:0f:6a:
1f:f6:ca:98:7e:ba:26:ac:56:b6:19:ff:a4:16:35:f1:52:f3:
10:78:11:22:f4:b7:d9:bf:44:cc:59:68:55:ef:dc:a0:b5:5c:
49:a2:b6:b6:a8:2d:42:0b:48:ad:c0:f6:87:86:38:b3:23:36:
1e:6e:d8:b6:57:a9:d8:99:10:ab:d0:27:5d:11:35:77:24:44:
d6:7a:62:60
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:18 2025 GMT
Not After : Nov 27 10:26:18 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7e:53:a9:dd:31:d5:5b:7e:c6:5f:24:68:8c:9a:62:ff:27:0e:
80:c2:f3:c5:3e:63:7d:83:67:66:1d:9b:3d:36:37:92:f7:bb:
00:68:16:a4:81:36:39:56:f0:a3:15:95:98:8c:d8:8f:f9:38:
68:7f:79:20:4b:d3:d1:ac:2f:fb:ec:cd:77:ce:db:b2:a3:58:
3e:f6:be:57:d7:c6:3e:2d:0e:8d:5f:f9:c3:da:a2:13:a6:63:
16:37:4e:7a:24:38:8a:84:68:5e:cd:05:d3:ec:09:f5:56:9e:
bd:0c:34:18:c5:b3:de:5d:ab:3e:26:45:e8:a0:34:55:94:9e:
0b:8f:68:92:9e:f4:31:db:59:7d:4b:67:2e:09:8e:4d:a0:27:
94:06:3f:9c:16:d2:d7:ff:0f:8f:27:7e:31:ff:c8:36:52:2f:
d3:14:48:b8:c5:54:7b:79:e1:b1:76:fc:88:32:ae:2b:79:75:
7b:8b:09:f9:2c:31:10:3d:b6:19:25:2c:c4:f9:65:e7:06:bc:
46:d9:3c:a1:2a:1d:4c:c8:60:d5:92:7b:da:ec:67:b9:08:cd:
3b:e9:3b:71:40:81:9c:b4:3a:d7:02:6f:6b:f5:76:ed:4f:1c:
ea:13:f9:ed:b4:c0:31:5a:f4:13:bf:d1:c0:97:83:fb:9b:ff:
a6:f5:b0:75
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
Truncated 3082 bytes from beginning
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
2,896,519 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:11 2025 GMT
Not After : Dec 26 10:26:11 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bb:72:35:0f:8a:7d:12:7b:d7:ce:d5:d1:96:71:
59:40:4e:b1:0b:3d:24:c2:93:59:8c:b1:b4:4b:1d:
f9:75:75:ec:01:f0:04:22:51:b4:4e:bf:62:da:c0:
d4:17:3c:fc:d3:30:bd:65:1a:9b:46:ff:35:cd:cd:
f9:b6:8e:55:d9:5e:73:9a:f7:a2:87:c2:ab:b6:b6:
19:a1:2c:64:1a:90:ff:c2:6f:c5:af:fb:13:ee:e3:
b5:fe:79:38:c8:77:43:4d:4c:15:ff:5c:d4:fb:4f:
c2:f4:51:ca:ab:42:7d:49:50:31:76:d8:85:9c:c8:
ed:3f:d5:0e:95:c4:b2:c9:31:f6:3f:b3:82:4b:a8:
cd:df:bc:45:4d:ce:12:53:f4:37:ab:09:f2:17:56:
82:50:4a:3c:da:b6:46:66:4d:62:ea:56:1a:8e:fb:
8f:c6:8f:f4:f7:4a:b0:20:e0:fd:82:f0:9b:ec:98:
aa:5a:d1:76:37:28:fe:aa:ef:4e:ba:07:f9:36:89:
9a:ee:99:83:08:e8:2c:01:19:c1:3f:cd:bc:28:ea:
af:7d:f9:45:41:ed:82:55:4a:7a:0d:3e:36:12:c0:
d1:36:df:d1:28:4e:f9:6a:07:b5:29:b0:f5:10:19:
40:c9:61:28:4a:a8:dd:fe:07:95:cd:64:a0:3a:f4:
bc:cb
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7c:6c:a3:86:1d:87:fd:8d:9f:ed:e6:33:ef:9f:c5:e9:a1:6a:
aa:f2:f7:23:2c:b0:c3:d1:f4:3b:3a:8f:2a:f2:9e:d4:68:d6:
05:ed:78:b9:d2:1d:fa:85:eb:c4:5c:b7:1f:e5:a1:d9:ff:3f:
d6:d5:74:0b:6e:a9:3a:32:fb:f4:9f:de:01:c6:06:04:a4:62:
ae:4d:b7:0d:30:7f:6c:fc:ec:a1:e2:04:88:e7:4f:d6:36:ea:
64:2f:97:61:e6:b0:d5:d8:58:b4:f4:d1:0a:7e:9c:64:09:6e:
5f:fb:ba:a0:5d:81:dc:1d:76:fd:f9:ee:10:41:82:4f:21:81:
98:c9:6f:17:77:e1:b9:04:25:b7:30:8c:33:a4:8f:49:bf:f4:
73:7a:4e:83:dd:2a:c9:4d:87:6e:1f:8f:c0:4c:80:5c:c1:f4:
75:e5:3c:b5:fb:e5:13:7d:4b:07:8c:b3:d3:55:14:0d:fb:d6:
73:c2:07:9e:e9:b8:40:b1:c1:a9:10:f5:d8:0d:1f:e7:a4:2e:
22:c3:0f:0d:c0:5e:0a:67:52:15:1d:a2:19:1f:89:61:89:8c:
d4:13:a4:08:f7:f3:30:ad:31:7c:9d:40:4d:83:f1:1a:50:03:
4f:db:20:78:62:48:94:cb:75:81:04:5c:2c:fe:62:55:08:6a:
ff:64:6b:ac
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:11 2025 GMT
Not After : Nov 27 10:26:11 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
38:27:89:dd:fd:40:59:02:ec:8d:86:9f:a7:85:5b:29:f2:38:
c8:bf:8a:58:e8:1d:2b:94:98:1e:41:b9:87:fa:ba:d6:b3:ff:
f9:56:7a:0e:31:6a:3c:73:32:6f:22:bb:ed:b4:77:34:83:a9:
17:eb:4a:c3:3d:e1:4a:9c:16:4e:06:cf:aa:7f:a9:a7:7f:52:
19:30:46:f8:3d:aa:a5:dc:8c:53:52:0c:a5:70:2f:6c:55:f1:
1d:f1:69:fb:b1:3c:dc:4c:34:60:b0:89:4b:c2:de:91:6a:7e:
e6:f8:8f:12:0e:7a:60:22:6b:05:8c:cf:f0:76:ce:08:c0:fb:
b7:61:ae:bd:70:03:87:42:a9:bf:e5:3c:7a:00:a3:b2:bc:a5:
d9:60:13:db:66:e4:91:2e:2e:bf:b4:ca:f2:ab:3a:0a:5d:d0:
91:72:44:54:3f:ee:8d:2f:3a:40:a9:83:a4:8d:d7:a8:a4:50:
15:ff:f8:f6:a5:c8:44:00:06:d7:79:b9:ad:79:a4:45:19:23:
c8:ff:db:93:34:56:56:50:27:66:0c:4d:13:5a:6b:33:95:4c:
89:10:8f:fb:73:ca:90:e7:53:42:02:1a:c0:b4:6a:5d:0a:f2:
a5:f0:8d:a6:75:a4:20:19:c6:fd:cd:14:60:b9:f8:55:59:8a:
22:d7:8c:e7
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.61s
Truncated 7878 bytes from beginning
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
3,144,508 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:10 2025 GMT
Not After : Dec 26 10:26:10 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a2:a7:f5:0a:7a:b5:34:66:b0:c5:8e:67:90:a6:
46:ec:50:4e:0f:0d:f2:5c:4f:ac:61:82:c4:f5:66:
e5:36:8b:10:75:25:9e:3f:1b:41:d8:da:55:36:2c:
0e:08:59:e4:74:f0:7e:b3:31:5d:71:d1:a2:d5:e9:
b0:3b:e6:81:58:d4:65:a8:a6:62:3e:cc:3c:23:18:
52:00:18:23:bd:89:cd:20:c5:64:77:3c:46:87:60:
82:4c:09:a0:3b:82:8d:ad:12:88:cd:70:c0:8d:67:
99:c2:2c:5a:cb:a7:49:44:6e:9f:63:bd:60:e8:d6:
9f:03:23:b8:95:e7:7b:47:d8:b2:e1:73:df:9a:27:
32:fe:d3:47:1a:e8:04:49:18:d0:2a:15:92:db:a6:
39:d8:ce:80:18:35:19:4e:44:82:5c:56:d5:b1:44:
00:cf:51:82:17:1b:51:83:81:c5:96:a4:e1:53:49:
3a:d6:95:3c:bd:90:9a:da:57:ac:a9:55:38:ad:3d:
da:c9:14:c2:85:37:4f:fe:2d:0d:b6:94:b0:7e:92:
48:29:06:08:f2:76:a6:cd:ff:1e:5c:dc:dc:5e:d1:
a3:9e:d2:fe:6b:d7:fc:de:37:8b:78:73:a0:1a:f9:
d3:6c:da:f7:f6:2f:2a:15:1d:e7:a0:d0:99:5c:33:
ef:27
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
08:e9:5b:1c:bc:b0:8c:23:17:2f:5c:e4:ca:d7:86:7e:76:91:
17:5a:24:18:62:48:1f:07:c0:f0:4d:0b:9f:98:57:90:be:b1:
04:e0:e6:41:38:67:6b:89:ab:dd:6a:01:56:13:53:57:c2:6b:
50:5a:58:55:07:64:f5:24:d0:ac:d8:bc:d5:38:07:d4:0c:be:
97:af:84:b6:f2:94:da:56:f1:ba:9c:2d:97:23:d1:4e:93:78:
fa:1c:f9:47:58:93:a9:90:70:50:17:d8:6c:cc:56:4d:9b:69:
47:4f:22:f8:8d:f4:8a:be:57:8b:fe:89:93:e7:95:cb:cd:44:
12:93:7b:a3:28:b7:ec:d4:44:dc:7e:5b:e4:ae:89:ce:76:a5:
bc:2c:c6:8a:f3:02:11:7a:f8:00:23:e0:d0:1b:fd:3b:7f:f0:
d6:82:c6:93:f1:26:61:a5:18:8a:24:c8:55:ff:de:80:97:3f:
e7:f3:d0:a4:53:e9:ed:26:8a:de:e0:55:75:01:06:1f:b8:ad:
e8:ed:fa:2d:a3:6f:82:0a:c5:49:fc:ee:0c:db:b7:56:45:36:
d9:8e:10:03:da:9c:5a:f0:b9:81:4f:91:d8:07:72:bb:c0:64:
86:0f:e9:b1:a9:62:ef:5b:2b:52:ed:31:15:27:62:98:f0:cd:
5d:6c:52:78
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:10 2025 GMT
Not After : Nov 27 10:26:10 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
23:6a:f7:4d:37:4d:3c:6e:28:46:a5:84:65:ac:25:a8:b9:b5:
f1:31:50:7b:48:6d:00:f6:59:a6:8d:cc:16:85:5f:e6:7c:6a:
c0:8b:57:0a:cc:aa:c1:b2:ba:13:09:c6:f6:f3:58:19:98:10:
fc:c7:6e:af:68:69:1e:5e:2c:de:9b:06:87:ca:8f:c0:02:f4:
b9:84:ff:b8:1e:41:ea:c9:cd:8e:72:75:7a:37:ac:bd:88:67:
f8:c9:09:1b:59:66:bd:77:eb:08:56:2f:74:37:7b:7f:38:d6:
e6:72:b7:2f:97:54:f3:0f:12:a6:3b:ef:1e:fd:2d:55:0d:28:
27:cb:41:0c:9b:fb:63:a0:20:92:ed:ee:92:58:bf:f1:c9:57:
ce:35:86:43:7e:91:49:a1:df:83:84:7a:01:dd:fc:ce:c9:a9:
d6:1a:4f:7b:23:22:31:87:d9:e4:4a:db:94:e9:b3:54:33:b1:
96:da:08:10:65:f0:a8:a7:6d:45:91:dc:a8:33:37:b2:d7:11:
a7:fc:36:1d:2d:e0:2c:d6:91:e6:20:0e:bb:54:db:86:54:cf:
2a:dc:88:85:e2:e4:fd:5c:52:72:d2:e2:ad:75:bc:4d:f0:c0:
06:56:99:5a:9c:b6:ac:f1:63:6b:de:e8:94:1c:4d:55:52:97:
5a:da:a7:75
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
Truncated 3082 bytes from beginning
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
2,895,264 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:01 2025 GMT
Not After : Dec 26 10:26:01 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a2:b6:ee:f7:5e:80:26:d8:19:b6:dd:ae:3f:58:
5f:c9:ce:ef:5f:70:8a:b0:5e:fd:17:ed:54:3d:b0:
05:6d:c1:59:15:24:e4:ad:53:0c:ee:ba:94:ea:36:
b8:3d:0a:6a:11:fc:96:2a:99:26:ae:dd:66:48:35:
6b:c5:8b:0c:e6:44:16:94:4d:76:22:f2:96:e8:3c:
20:7a:1d:10:46:4c:cb:ea:2d:fe:3c:04:29:d5:79:
b3:d3:0f:40:1f:40:fb:07:64:08:06:4d:20:0c:c0:
37:ea:0b:e2:6f:2b:60:be:37:7e:f5:0e:b8:bc:c7:
d3:8b:1c:36:17:44:38:9f:fd:96:80:b9:26:9c:2f:
f5:b2:66:de:28:2a:f7:14:0e:98:1c:ed:e7:85:8b:
5f:c9:d3:0c:0e:f7:50:a7:07:89:80:f9:fa:eb:ef:
27:14:26:cf:7e:af:b5:ad:88:ce:4c:d9:3e:3f:36:
1a:df:39:93:b7:c5:9e:ba:77:19:83:b3:9d:c9:83:
97:e6:f5:00:b2:b6:db:7e:c8:2e:3d:c0:bb:df:a0:
02:4a:17:6a:3e:7d:6a:ca:7d:78:87:6a:6d:32:fc:
95:f4:81:73:62:64:f7:ba:e0:56:5e:64:04:79:bb:
ee:93:8e:40:59:c7:67:46:f2:6f:53:87:6b:12:06:
ed:ed
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
88:55:54:96:36:55:ed:ff:51:05:7f:8e:66:4d:c3:83:93:c1:
ea:6b:b8:76:fb:af:82:da:4d:23:93:a2:46:a8:2a:36:47:a0:
ee:07:97:05:03:16:c6:d1:96:e4:8c:ab:4f:5b:6e:12:b1:4d:
2e:e2:e1:f5:ff:c7:d9:5b:6f:f8:3c:37:04:39:30:0e:d6:a4:
3f:37:75:f4:df:00:07:d5:05:f4:08:23:00:09:d0:55:82:f7:
2f:6b:2a:2d:04:7a:d9:48:eb:33:c0:9c:ba:34:f5:75:1c:94:
27:48:ef:df:be:6d:ba:b8:a7:81:51:9b:ee:8b:9e:17:28:84:
e1:3c:9c:1f:de:90:22:27:76:a6:50:91:0b:2d:a2:02:53:c6:
83:8c:f9:b5:be:bb:0e:43:25:54:c8:65:17:bb:7c:be:a5:55:
c7:5f:f8:dd:00:8b:92:23:8b:6a:9b:52:26:9f:cc:04:0f:4f:
bd:79:97:64:ea:d7:64:8e:18:5b:61:d2:c0:04:69:91:92:ae:
be:e6:61:08:13:4b:ff:a7:cc:ce:64:46:dd:d6:1d:22:3d:c6:
d6:70:a7:1e:c4:3a:d3:36:74:b6:c4:b8:91:a2:8e:84:78:26:
15:96:5e:29:c5:a9:08:5f:4f:7c:d3:55:96:bc:e8:86:07:f8:
da:79:b5:70
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:01 2025 GMT
Not After : Nov 27 10:26:01 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
19:2e:7a:be:c5:54:e5:61:5a:33:99:9f:1a:d4:be:30:45:5a:
a1:83:3b:53:0b:ef:1d:4e:c2:b1:73:cd:fe:ed:08:46:f6:7c:
d6:b3:df:b5:f4:69:8e:30:ac:d4:7a:b1:e3:f8:95:45:70:43:
76:4e:40:fc:d1:66:82:d8:51:98:7c:20:e7:9d:99:98:13:7d:
0b:3a:a3:cb:db:6b:d7:3b:ea:4a:a8:67:40:36:d6:d3:4c:84:
95:e4:fe:ae:33:e1:9a:0b:2e:6c:39:a6:18:01:55:90:84:60:
54:1a:9f:1b:0d:7a:51:a1:a5:1e:56:4f:df:66:30:e5:7d:17:
f8:2b:9c:d6:41:b9:24:1b:b3:e1:f9:b9:c2:fb:60:d5:2a:c0:
af:b2:19:81:97:1d:40:65:0c:37:a8:aa:6d:17:5e:d2:05:d9:
67:e5:5f:e3:e4:b0:d9:15:6a:b1:95:4e:50:60:05:9c:bd:12:
a1:4a:a5:d2:3f:3c:d1:66:91:c1:24:57:51:57:d9:27:e5:fb:
a2:ba:a1:57:bf:a0:83:c7:39:7e:c1:6e:2d:40:55:31:1c:71:
ac:5b:0b:fd:d2:e4:27:29:b4:2a:b9:f5:c3:59:46:77:9d:23:
d6:50:4d:94:30:ce:46:d8:fa:17:bf:63:5d:b0:5a:a5:cf:20:
93:9e:3d:c3
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.65s
Truncated 7878 bytes from beginning
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
3,144,051 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:07 2025 GMT
Not After : Dec 26 10:26:07 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a7:5e:83:38:3b:b3:4b:b3:43:dc:17:27:43:1c:
f9:ca:e2:ea:5b:8c:96:43:32:31:71:ef:da:17:e5:
ef:35:76:1b:95:80:32:37:90:7e:10:96:54:66:42:
d9:8a:69:fa:d9:06:c9:2e:5e:a3:ef:68:1f:2c:db:
ae:18:97:04:46:47:38:b3:b6:33:60:10:2f:95:09:
ef:84:9d:76:d6:f6:07:93:29:95:33:07:e6:6b:d2:
86:39:1f:b7:68:df:b7:bf:eb:45:d4:02:19:c3:23:
9a:6e:18:53:d2:b9:33:30:e5:fe:f7:9e:d7:aa:32:
43:54:74:d5:85:e6:c5:41:85:39:1a:f6:83:ce:43:
60:a4:6b:01:57:8e:ec:9c:1e:2f:a9:37:7f:2a:d3:
86:b0:d1:ea:d9:8c:1e:57:c8:6f:df:2b:4c:76:93:
23:fa:52:6e:d3:10:61:42:03:e2:f0:66:41:06:e8:
d1:0a:8b:78:d8:a6:a3:cf:32:d3:18:a3:16:ab:d9:
e0:4f:83:70:4c:74:b6:08:32:14:cc:86:b7:8e:cc:
f2:65:46:9f:6b:23:84:45:8e:3a:dc:2c:9a:7f:04:
ce:0c:15:c1:28:44:53:0d:4b:e9:96:1a:a6:48:13:
8b:10:a9:91:df:6e:45:1f:31:5f:cc:fe:14:e9:f9:
88:9d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
19:14:a3:51:c2:54:14:01:fc:1a:25:00:01:9e:c8:50:53:9e:
1a:4d:2f:77:bb:bf:09:64:4e:eb:6c:5b:ef:6d:7d:99:b1:38:
76:b0:90:7a:93:70:a0:06:08:a4:af:8c:67:14:44:06:9c:72:
46:ca:96:a4:13:b6:4a:3b:2b:70:6c:ae:a7:12:e3:22:6a:7b:
32:1d:4b:74:1a:99:b5:31:2b:c8:2d:e8:5c:ee:5e:31:77:a9:
87:f0:11:ad:c1:c4:ce:85:80:69:d9:32:a9:3d:ca:13:90:d8:
e7:19:7c:c2:02:03:df:d5:a4:89:84:ba:ed:61:a8:e8:f0:76:
5e:38:b1:fa:d2:b9:1b:de:7e:f2:97:cc:d1:99:1e:ee:8c:c7:
43:7c:26:65:d3:74:f5:8d:d4:c9:3b:ba:e8:5a:9e:ec:50:dd:
0c:54:dd:da:8a:c3:64:cf:74:24:dc:8c:9e:23:b5:77:bb:df:
70:1d:e8:64:5f:5f:2e:cb:42:42:dc:ed:b3:2f:93:c1:d3:28:
89:b5:87:5b:90:31:b0:70:03:de:5f:1e:20:ff:ca:89:d5:77:
86:78:45:da:37:96:87:79:03:31:bc:73:5d:d4:f9:41:cb:40:
91:25:91:89:28:77:dd:3a:83:ba:3c:1b:83:41:24:02:c9:d1:
ff:ed:a9:45
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:07 2025 GMT
Not After : Nov 27 10:26:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
23:c2:62:b7:20:22:d3:b6:2f:4f:93:cc:25:bd:b0:0f:c6:77:
03:1b:78:2b:28:ec:4f:b2:16:2f:57:11:47:3b:59:aa:ca:42:
1d:fd:c6:f6:62:a3:f0:25:76:c6:a3:eb:10:91:0f:4f:fc:47:
1e:22:01:a4:72:e7:a9:0b:32:f4:4b:1a:cf:11:b3:09:86:33:
8a:23:ab:23:48:d6:45:2b:7c:01:cb:1f:c8:ae:c9:cb:9d:71:
ba:f0:fb:12:7f:ec:fc:7b:76:7c:21:82:94:1e:ad:b1:63:3a:
2e:1b:04:73:62:6f:54:27:49:b2:42:42:ec:01:aa:8d:43:9d:
ae:6e:85:ef:09:f2:d7:81:d4:0b:0d:7c:e1:32:d6:7e:6c:ad:
e8:16:32:50:46:71:0d:a7:51:ed:bb:f7:ff:e1:2e:6c:9a:5f:
df:2a:38:85:f6:bd:d7:be:8e:f0:6b:42:5b:9a:ad:5e:90:be:
0b:0c:01:ba:12:6a:7d:6e:72:82:45:a5:99:3c:36:67:1e:99:
ef:25:2c:85:5a:76:86:67:a8:e0:50:7d:6e:89:6b:d6:c1:30:
0e:9f:13:ee:3b:b0:76:17:47:53:72:1f:56:e8:f5:da:40:91:
20:e3:9a:04:a1:44:ea:0c:58:94:11:9d:01:6e:e6:e9:9f:df:
08:53:47:7f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
Truncated 3082 bytes from beginning
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
2,898,383 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:13 2025 GMT
Not After : Dec 26 10:26:13 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b3:d5:1e:e9:8b:4a:7a:3b:bd:83:3f:45:f9:ed:
b1:d9:d6:39:50:ef:5c:53:a4:18:d5:d8:90:6b:04:
e3:02:92:2d:e7:bf:b5:3f:db:64:55:02:0d:f7:03:
03:16:f5:ff:52:25:ac:63:7e:88:1a:62:a8:e5:b1:
48:7f:34:81:c8:e7:53:ce:6b:27:d3:cd:23:43:ac:
32:57:e3:04:d1:81:d9:85:2c:8a:19:b7:61:26:fe:
98:fa:e3:f1:ae:fe:8d:58:0d:a1:ac:e9:15:3b:59:
e3:7c:c8:57:32:91:de:1e:e6:ef:54:4c:93:8e:37:
72:de:d0:e0:ce:12:d8:09:62:81:65:8a:a8:ca:64:
bf:07:3e:e9:71:2b:64:82:fe:9c:13:5f:68:22:56:
2e:fd:5a:dd:96:d0:95:4e:86:05:c1:cf:d6:28:b4:
7f:70:dc:9f:d9:da:8f:b5:00:d3:90:a4:04:b4:d5:
cb:53:85:d7:ad:59:15:5f:2d:f6:73:8a:ac:32:c9:
72:e4:ec:1e:a4:af:27:29:e7:56:9a:2c:01:7e:1c:
c1:62:e1:37:00:3c:a0:9a:55:a8:f4:06:04:60:7b:
d6:9e:db:9b:56:0e:7e:52:6e:93:e7:c0:21:ae:3c:
86:6b:62:32:81:4a:2c:d0:01:1f:56:f2:0d:f5:97:
ef:c9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
56:62:7e:83:3a:17:e1:1b:d7:ed:c2:86:d0:f4:c4:66:0a:36:
7a:09:2c:12:4c:e0:c5:92:94:59:0d:db:13:d6:a5:b4:55:0d:
ae:97:be:39:2f:cf:33:54:b1:0c:7d:37:88:5a:8a:91:91:c7:
30:88:f8:c6:05:00:ae:f1:79:92:18:95:d9:14:40:31:59:e4:
48:2a:70:21:82:f6:a1:cd:58:1e:13:f5:86:51:a5:b2:0c:83:
81:e6:c1:f7:fb:f4:24:33:99:f1:2c:33:82:7f:27:cb:c7:4b:
b5:7a:c8:12:7e:43:30:e3:09:fd:69:39:84:bc:31:13:a5:8c:
22:06:57:f8:9f:29:39:e0:ab:ef:8d:53:ad:44:41:64:93:67:
24:43:da:c0:c3:aa:e3:ca:ca:91:a4:a8:0d:00:ca:df:88:f8:
4c:13:c7:23:b3:f4:a9:0b:63:7d:24:e7:56:7f:c1:41:7a:d2:
09:8f:23:30:45:94:ce:bd:9f:b5:40:20:ee:a7:eb:87:62:91:
08:73:18:6b:eb:d4:d3:6e:bb:8c:13:f8:f1:6d:4a:ba:aa:0c:
37:e1:01:cd:71:bc:77:f9:fb:b6:cd:c3:f2:e1:de:28:a5:ff:
43:4c:66:d3:88:4d:2c:cb:6c:d5:36:3c:a5:f8:70:cc:94:c4:
17:4a:4a:2b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:13 2025 GMT
Not After : Nov 27 10:26:13 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0f:3e:c6:11:89:34:c4:14:1c:2f:d1:ad:7d:c2:a2:1b:49:82:
15:8a:26:08:67:64:47:b1:78:6b:8f:15:e2:8a:44:eb:d2:c1:
f0:5a:f3:c9:04:aa:3b:c5:12:8d:e4:71:e5:5c:c2:ee:3f:99:
a3:98:ff:63:97:54:ad:8c:41:23:9e:df:95:ee:a5:f7:0a:5e:
76:a5:8c:3c:71:28:79:3e:50:29:73:c3:92:1c:ff:6f:98:16:
8e:59:20:9f:fb:fb:70:7e:7d:d7:3b:22:79:62:39:64:14:ba:
6c:0a:ad:91:dc:01:62:39:24:92:20:80:64:84:60:71:13:90:
fb:b4:80:8f:72:18:ac:7d:4d:1b:b7:a1:65:23:df:5d:f1:7e:
94:36:f4:9c:13:21:5b:ff:83:91:f5:cf:c6:f5:78:f6:fb:0e:
1f:bd:e0:95:12:e0:9c:53:b3:49:66:8a:c4:d9:90:5e:33:e6:
38:98:45:f7:f8:e8:9d:e7:08:44:45:b9:ca:f6:b5:2b:7e:3a:
0b:27:d4:65:cc:64:68:6d:4b:4f:24:49:7d:94:c5:65:5d:b6:
c3:8f:49:9d:37:f4:2c:56:35:38:8e:87:e8:0b:bf:e2:91:a8:
91:9f:54:2c:01:f3:b4:3c:e1:2a:f6:8a:55:22:9d:57:89:81:
a0:93:e8:c9
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
Truncated 7878 bytes from beginning
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
3,142,206 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:06 2025 GMT
Not After : Dec 26 10:26:06 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9a:b5:2c:a4:c3:f3:34:d0:13:5b:f9:b5:68:73:
71:4d:4a:1d:c6:35:da:ef:f4:56:07:b7:45:a5:8f:
3a:73:31:2f:25:5f:d6:b5:41:c9:8e:10:81:8d:b4:
f8:61:69:ab:ea:7e:e3:a8:b3:a0:5d:d4:e4:0f:87:
51:7b:a1:16:f4:9f:84:78:62:bc:1a:15:5a:72:99:
89:ee:19:f7:e7:54:c3:19:04:96:a2:cc:f4:d5:1e:
55:04:13:ee:5c:db:16:61:63:02:72:be:34:ef:ec:
f9:3b:9e:3b:36:38:e4:6d:9e:12:2a:c5:9d:eb:0c:
f2:eb:f5:48:aa:93:39:a8:45:74:a3:36:3b:f3:2f:
3b:73:73:8b:60:ca:f9:6c:b2:32:82:71:9f:bd:98:
87:28:43:a5:19:e8:1c:6a:b1:07:66:db:f7:bc:29:
78:5b:fd:31:93:bf:af:59:30:6e:67:87:03:9d:8c:
2f:b5:8a:f5:39:e4:62:5d:1b:5d:4a:ce:e4:79:80:
a8:30:9a:eb:bc:7e:4c:f7:d8:80:fd:89:30:cd:c3:
38:d1:fc:28:61:4a:9b:6b:2d:68:11:a8:29:21:40:
35:20:a8:ab:64:8c:ed:4f:ff:b9:17:4c:f7:d7:07:
0a:c1:69:b7:01:0a:2a:22:8f:9e:04:48:85:32:6c:
04:b5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2e:40:72:07:25:d3:c8:43:ca:c5:a8:8c:84:de:e3:67:55:1e:
b5:ff:46:9c:95:5c:b7:d1:71:df:81:1b:0f:d3:e4:40:8d:55:
1f:7f:5a:ee:cb:e7:58:c5:aa:72:8e:98:a2:43:a0:a7:d1:bd:
29:b8:08:8e:8e:7f:74:10:e8:0f:be:c3:63:41:51:c9:5d:6a:
e9:84:ae:3f:5c:5e:64:f0:ad:64:45:65:60:8a:bd:ae:5a:ba:
f0:f5:84:07:86:ed:99:bd:3e:fe:8b:16:78:61:e5:0f:ed:08:
bf:dd:58:33:b3:64:76:40:1e:2f:f3:5b:23:56:8e:8c:c5:e1:
4f:6e:2c:29:f0:48:6e:18:26:83:0b:e7:18:f8:c3:20:47:4d:
27:02:27:cf:86:29:a8:fd:ce:af:2c:53:19:2b:bc:28:0b:03:
2f:3a:e3:e9:56:b6:c4:5d:53:ce:d5:c3:b2:6a:a5:db:d9:b8:
7b:53:02:90:c8:40:41:2e:2a:bb:6b:e9:22:62:d0:5c:21:64:
51:20:0f:51:ab:86:b9:a5:bc:44:b6:6b:b8:db:61:d5:0d:7f:
5c:0e:7f:34:54:71:15:66:52:07:99:f8:7b:6c:63:87:ae:11:
d5:ae:f4:69:f2:16:15:62:6a:84:fb:37:46:b0:58:32:fe:31:
c9:33:ea:49
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:06 2025 GMT
Not After : Nov 27 10:26:06 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2a:4f:e4:1f:3f:c6:91:24:45:bb:f4:cb:ea:95:ca:7a:7d:44:
49:77:30:e6:59:14:4a:48:0d:60:50:c1:2e:6d:40:f6:c0:36:
6b:e6:44:1a:2e:aa:ad:fa:d6:66:d0:b7:56:87:29:fb:67:cd:
f6:25:6b:93:80:03:df:28:13:02:87:1c:62:20:08:32:0f:b2:
c6:5f:6c:12:19:29:7d:32:ba:22:aa:00:b4:02:f8:ae:90:43:
3f:2f:d0:99:79:df:87:50:79:8a:b2:dc:ba:1d:e9:b8:79:b5:
d5:7b:1d:62:4b:fc:7b:55:2c:8c:32:14:7a:3e:41:2b:47:1d:
03:0c:43:f5:94:c6:c7:47:b7:67:f8:ad:d7:bc:4b:14:1d:25:
2e:20:50:f6:3d:97:f2:d7:b2:f4:40:e6:1d:50:8f:63:da:b9:
03:ab:1e:db:94:b2:85:11:f8:66:2c:7d:bd:36:68:2b:1c:94:
9e:38:7e:b7:40:c4:c9:f8:d5:3b:c3:6f:88:40:72:06:dd:1a:
3d:21:f3:22:17:9c:ea:dc:a0:77:78:ee:33:dc:d5:2b:61:fe:
e1:d4:e0:54:a6:6e:c9:5b:a3:8d:2a:99:d5:c8:76:74:e0:d8:
58:68:90:20:b8:22:ed:40:42:2c:36:92:21:c0:7c:38:85:30:
39:84:26:0a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
Truncated 3082 bytes from beginning
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
2,892,698 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:11 2025 GMT
Not After : Dec 26 10:26:11 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bb:c7:b5:b5:9d:d3:d0:f4:b3:dd:ac:14:a2:20:
ec:ec:f3:8c:82:bf:10:10:0d:09:a7:22:46:87:9a:
3a:a7:3f:dc:90:0c:48:05:a3:21:cc:65:3d:74:d9:
db:07:f5:ab:ff:97:d5:c1:e9:a5:62:bb:e9:d1:30:
43:9e:69:0a:20:0f:86:0c:43:22:44:11:c1:45:62:
d8:73:79:c6:30:f4:b8:fc:fb:53:ae:f7:90:dd:f9:
22:c1:6e:25:f1:25:59:61:57:fa:ac:ae:0f:ee:4b:
fc:23:02:d6:88:38:d4:e5:d1:af:d1:9c:41:fe:fe:
2d:33:37:f7:39:1f:47:76:5f:05:0f:1c:f4:a8:85:
89:e9:39:46:4e:aa:e2:db:0c:b3:28:78:b2:5d:85:
8c:3c:60:7c:27:d9:65:f1:48:16:82:cf:0d:70:87:
10:1c:dc:0d:d1:41:67:6f:58:7c:65:c9:5d:9e:da:
20:97:b7:96:6c:13:e0:b6:b3:34:a1:a8:44:5a:1c:
ed:97:c2:9c:3e:23:c7:e3:e9:15:1b:7f:40:c3:d2:
69:ce:73:ed:7d:c5:ee:35:8c:a2:8c:bd:1b:b3:a1:
8e:41:2b:97:53:6b:3b:f1:b8:9f:ac:35:e6:2d:0f:
73:25:34:cc:ff:4b:29:e8:ca:6f:35:0b:61:b1:06:
25:75
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b5:b3:13:13:43:68:0b:7f:da:38:d7:18:32:38:34:b6:e4:a2:
e1:94:4a:5b:01:fc:7a:78:0d:b5:64:53:0b:ff:3d:b2:76:2e:
dd:03:0f:43:19:30:0b:d8:15:31:20:dd:13:8e:29:79:5f:c5:
1b:ab:89:7b:9f:b9:96:f7:88:e3:0d:82:32:7b:50:f2:13:b1:
92:4f:2b:d0:d9:79:57:4a:f5:6c:b4:1a:d3:42:43:db:f3:bb:
f5:e5:dc:e7:b8:55:ac:12:93:16:75:ba:b1:df:4d:2f:49:34:
bf:72:d0:e1:71:f8:02:87:e7:84:45:ee:c7:0a:7d:d1:ee:ff:
65:12:c2:28:bb:00:6b:24:52:c7:29:9a:15:aa:14:a4:f8:d2:
27:4a:9d:5f:85:f1:32:56:e4:cd:b7:b5:5d:b7:9c:8a:36:1f:
8e:69:01:1c:9a:12:76:80:7a:2a:ad:e6:ea:11:bc:15:0b:b1:
10:c4:4c:0a:df:41:34:6f:5d:61:91:af:2f:a6:e5:c1:41:e2:
98:ee:9f:54:21:48:da:db:ca:f8:48:62:6c:1e:11:95:35:dd:
70:1c:34:4d:bb:b0:d5:9e:80:1e:01:f7:7e:26:34:02:b1:9f:
3d:4c:e2:d0:cb:35:91:ff:b6:6c:93:42:82:f4:3f:2d:34:e8:
6f:4f:3f:5b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:11 2025 GMT
Not After : Nov 27 10:26:11 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b6:f4:5c:3a:01:18:e2:b7:60:a1:9f:cf:8f:2d:70:15:cd:b5:
18:72:ae:cd:9c:d1:2e:43:2d:b5:d2:cc:61:27:6a:bc:07:0d:
e0:06:a3:4d:4a:40:c6:fc:e0:7e:d4:96:85:6e:bb:00:69:1a:
0c:fc:ca:7f:30:47:be:41:80:50:89:96:71:94:f0:c0:25:cf:
7c:d3:99:47:de:2b:99:59:b5:e4:e4:2a:d2:bf:c1:48:d4:c9:
d0:84:b9:e1:4d:2c:26:1f:41:2a:02:c3:40:e1:a1:ab:e1:5b:
14:2a:aa:db:7c:25:2a:4b:ba:f3:64:9c:ad:51:6e:17:d2:1b:
b9:63:72:1a:fc:0c:68:ea:08:3e:52:46:b1:a3:6b:4b:c7:ff:
a5:1e:7d:cd:b5:47:aa:25:92:5a:59:6d:30:76:56:cb:9b:1e:
b9:38:cc:a8:81:65:ed:5e:5f:47:d9:ac:cd:93:ef:ce:93:ad:
b3:3d:8d:d7:10:4d:27:7c:f6:70:8d:ed:8f:00:69:1b:25:c6:
0b:83:42:9c:82:8d:f1:84:63:70:0d:9d:9e:a5:6f:01:1b:f6:
cc:bc:be:83:50:3a:7a:b7:cc:71:37:34:31:fe:a7:6d:34:e7:
86:0b:4a:1f:30:1e:eb:62:61:4c:d2:55:af:f0:ad:c0:97:a5:
a9:6c:aa:b2
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
Truncated 7878 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
3,141,697 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:13 2025 GMT
Not After : Dec 26 10:26:13 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ba:fb:e2:3c:c7:b8:d1:8f:b4:00:83:64:27:b4:
a4:41:74:9a:00:d6:7a:4e:9b:b7:e5:65:bb:eb:78:
99:19:1e:10:9d:10:f4:ae:92:20:31:05:04:fc:3a:
3f:b1:ac:8e:f3:a9:62:94:63:58:29:97:46:59:fa:
68:ca:b2:56:52:92:96:90:47:60:bf:39:bd:09:7f:
1c:b4:e8:d5:3c:fe:64:52:76:7b:d3:7e:0a:ba:4d:
80:42:1a:06:da:4c:0f:6e:8f:8a:f3:12:95:85:e6:
72:44:a1:3f:0e:63:aa:84:52:92:91:1c:4f:ae:ea:
65:69:31:a3:3b:27:81:ba:1d:12:80:05:6a:e7:25:
db:60:47:fc:7e:ea:83:39:b1:f4:9c:cf:f2:c9:fa:
89:fb:d8:4e:34:39:5b:37:86:d2:00:22:62:27:91:
29:42:b7:75:d4:b2:c0:97:8b:7d:b9:bd:0b:c3:45:
06:62:72:30:3d:cf:2e:44:d1:ff:94:9b:05:95:0b:
01:19:77:9e:f8:98:68:45:e8:fd:1d:19:88:b9:7e:
1f:a5:93:db:9f:40:16:ea:83:6b:b3:ea:14:12:d2:
88:a6:50:69:62:0b:9a:15:b5:4a:df:01:0d:90:18:
16:2e:ca:e4:ad:91:66:c5:e7:32:02:ba:64:25:6a:
d6:69
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
34:34:84:8a:f3:eb:c3:c0:05:d2:40:7f:05:e7:3a:5a:13:98:
3c:b5:d8:e4:60:24:07:33:16:ff:90:82:27:fa:30:4d:71:3a:
92:06:8e:f3:c0:80:b7:db:81:ce:f1:d6:bc:a5:33:4f:38:4e:
f0:72:f8:66:2a:dd:de:51:d9:9d:39:4c:d4:1a:af:26:a9:44:
bd:67:b4:b1:fe:e5:54:bf:f1:e1:01:c0:df:3b:8b:b9:bb:fb:
b4:34:8d:6f:3f:18:d7:1f:9f:34:52:89:f8:99:82:de:7e:57:
0c:3e:d3:57:90:e0:12:4d:47:aa:de:d2:cf:d4:3b:63:69:d5:
38:77:80:0b:45:dd:33:a8:ed:67:16:5f:48:41:3c:e8:9a:fe:
d8:f0:cb:f9:82:be:12:8e:aa:94:98:b5:e5:bc:b6:19:26:9f:
92:f8:88:0b:60:34:96:16:28:07:f3:b3:b3:b4:47:0b:ab:5a:
df:0f:cb:a9:52:e6:48:84:cf:35:6a:a6:8a:9d:1b:9a:75:65:
28:5f:52:66:0d:96:89:07:20:b1:a3:fb:bf:58:27:ab:ab:18:
d5:50:f1:f3:04:84:63:75:28:05:9e:1f:cd:6a:69:be:77:af:
27:0a:07:86:37:5a:27:55:85:76:1f:30:e8:7d:3b:82:ee:65:
c5:a9:05:39
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:13 2025 GMT
Not After : Nov 27 10:26:13 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
14:d6:0e:1b:68:b8:43:e6:79:c3:9e:25:5f:29:ca:85:e9:fe:
db:15:1d:8c:51:f5:fa:e7:de:f2:d2:1b:63:d8:37:53:21:cf:
6a:99:0c:80:4b:98:48:a3:be:d4:20:fe:3d:89:e3:a0:20:64:
ea:bc:91:60:ee:8b:da:dc:b8:51:b4:34:dc:f9:30:1e:c0:a1:
30:22:73:fa:7a:af:71:0b:2b:fa:37:91:ec:9d:c1:0f:78:4f:
a6:9a:8f:b6:4b:cb:82:6e:10:b7:bb:84:74:a7:f9:66:f4:d4:
e7:f0:6b:0d:e9:b4:a4:e7:5c:64:bc:52:57:fc:47:4f:23:47:
53:ff:00:ab:9b:aa:36:f6:c9:f4:1e:24:51:90:f7:b2:94:08:
66:d7:fb:6d:52:5a:94:80:0e:91:1f:ba:ef:71:50:90:55:21:
2d:2f:c4:1f:e4:9e:69:b0:2e:2e:ae:74:3e:98:93:2d:77:6b:
f0:dc:be:2b:f0:be:7b:7e:a3:e1:2f:de:ba:b1:f2:cf:3d:e3:
f7:9e:78:99:fb:10:27:d2:dc:ed:05:3e:b1:61:39:76:61:31:
11:9e:de:c3:1f:86:c0:00:64:1c:a1:71:0b:44:32:fa:8b:fe:
62:a8:d2:59:47:4a:36:92:66:68:60:43:7e:27:44:7f:4e:ca:
6c:c5:82:ae
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
Truncated 3082 bytes from beginning
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
2,896,065 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:07 2025 GMT
Not After : Dec 26 10:26:07 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b5:46:48:36:52:0f:8a:d8:66:c9:9e:3e:2d:b3:
20:6a:4b:19:26:07:98:63:44:c2:12:ed:9a:99:09:
96:b8:2c:04:63:c7:7d:df:7b:0f:ab:f8:c3:79:c1:
3e:ac:da:6f:3f:94:17:ac:4d:6a:6f:09:fa:ac:50:
8e:93:b0:8a:6c:92:f6:d1:9b:d9:92:34:8a:56:f8:
ea:8b:25:ae:f5:68:cc:a4:12:fc:ba:af:6c:05:8a:
e2:37:19:c5:3b:10:36:f4:56:35:e4:24:bd:61:b7:
1c:5f:6c:cd:40:89:a5:12:57:d2:9a:b0:70:ee:44:
71:9d:19:ed:38:f1:2f:4d:86:cf:46:f0:81:0a:f5:
d9:ee:1b:25:ec:53:bc:fc:ad:af:b5:32:fb:7f:e9:
7c:dd:71:cd:0f:34:26:9e:ca:0c:cd:c6:40:ab:eb:
d7:38:2d:2c:0d:16:c0:58:a9:c6:bc:78:7b:a8:6b:
17:23:74:76:de:31:c8:d5:3f:f8:82:1c:9f:32:24:
eb:0c:3c:7b:42:a8:b9:f0:d0:5b:0f:4f:b7:64:74:
e6:6f:96:73:e4:80:02:65:3c:eb:86:f8:3d:66:33:
da:ca:1b:af:53:94:07:b5:9d:7e:27:3b:71:d6:a5:
1d:cd:78:4a:6b:5f:34:d5:7d:83:6a:e2:35:ec:97:
d6:21
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
20:67:79:4d:f7:61:35:cd:63:11:f7:34:5a:1f:92:c5:a0:49:
80:99:0d:d7:f1:f6:7b:8a:b9:84:f7:86:51:00:c5:1e:fb:91:
06:78:ed:bd:29:3d:54:df:ad:c0:f9:2b:d0:7b:7d:5c:2a:8b:
47:df:22:2d:89:ef:fe:d4:7d:71:b3:f5:04:d2:fc:3c:df:69:
22:5c:aa:3e:f0:16:9e:cb:4c:04:06:0e:08:0c:10:cb:51:e8:
64:88:da:e5:a4:2a:d0:cc:36:d8:47:91:55:c3:f5:a6:3b:21:
22:b3:b3:f3:68:df:87:e2:87:9b:9b:9f:36:54:aa:05:3a:5f:
8d:3a:9e:6f:b0:96:c7:c1:8f:b3:f2:1b:90:87:56:80:5c:5b:
6b:b1:df:e5:68:73:54:dc:97:d2:06:91:27:3a:64:29:c5:1a:
21:03:bb:1d:6f:4f:9a:6f:89:f0:b3:b2:37:10:82:7d:8f:9a:
dd:45:3f:18:98:90:c8:77:fe:e4:5e:aa:14:08:05:bd:a0:9a:
7e:d6:53:ab:af:0f:71:ce:be:8e:e6:94:5c:b6:c6:b7:37:03:
e5:66:d4:5d:17:fd:81:4c:86:2b:f1:27:74:2b:4a:00:7c:03:
90:ef:54:39:5e:54:9c:6d:da:47:62:ec:97:8f:4c:89:67:ac:
2f:0a:51:cf
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 26 10:26:07 2025 GMT
Not After : Nov 27 10:26:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
86:53:7b:be:f3:8e:f0:3d:79:a9:7f:cc:25:11:e4:53:d8:1e:
3a:9b:32:e0:68:39:7e:38:ff:85:14:93:02:be:f7:18:e1:ea:
b4:85:c2:61:74:12:a3:b0:d8:49:a1:9c:29:28:24:12:07:ab:
29:45:af:8a:8b:29:fa:39:65:1a:21:f2:8a:b2:66:89:39:86:
a6:dc:bb:d7:b9:fb:68:15:91:8e:86:6e:ca:72:cf:3b:38:c3:
ff:57:79:4f:2c:46:97:35:df:9d:6c:d1:f5:e8:6d:db:42:16:
b0:67:c1:70:ab:64:37:01:96:50:a8:08:ac:1c:be:a9:e3:7b:
1f:fe:61:67:0e:3e:86:eb:24:84:31:01:40:4c:0c:33:f7:cd:
9f:bd:fc:da:10:ee:fd:9f:40:04:51:c3:af:6d:ca:8c:26:41:
f3:23:ac:5c:a9:5e:a4:8d:6b:09:c5:d0:89:4c:29:b1:ed:bb:
59:f4:f4:c8:52:41:7f:31:67:62:47:be:38:31:1b:d1:c8:19:
8a:8c:45:49:b8:8d:ad:f8:06:44:2e:09:93:5a:58:90:48:09:
be:b0:0d:d7:56:4e:32:e9:81:c8:26:3a:3c:25:30:a3:b7:c2:
f1:01:65:d3:d4:72:a3:a1:2d:8b:c3:c4:7d:0f:c7:37:04:1f:
c3:75:b2:90
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
2,231,916 UART:
2,232,819 UART: Running Caliptra ROM ...
2,233,949 UART:
2,234,114 UART: [state] CFI Enabled
2,234,989 UART: [state] LifecycleState = Unprovisioned
2,236,668 UART: [state] DebugLocked = No
2,237,792 UART: [state] WD Timer not started. Device not locked for debugging
2,240,273 UART: [kat] SHA2-256
2,240,946 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,243,960 UART: [kat] ++
2,244,438 UART: [kat] sha1
2,244,964 UART: [kat] SHA2-256
2,245,628 UART: [kat] SHA2-384
2,246,293 UART: [kat] SHA2-512-ACC
2,247,144 UART: [kat] ECC-384
2,948,627 UART: [kat] HMAC-384Kdf
2,969,715 UART: [kat] LMS
3,446,247 UART: [kat] --
3,449,921 UART: [cold-reset] ++
3,452,234 UART: [fht] FHT @ 0x50003400
3,463,431 UART: [idev] ++
3,464,000 UART: [idev] CDI.KEYID = 6
3,464,945 UART: [idev] SUBJECT.KEYID = 7
3,466,220 UART: [idev] UDS.KEYID = 0
3,502,031 UART: [idev] Erasing UDS.KEYID = 0
5,986,741 UART: [idev] Sha1 KeyId Algorithm
6,012,045 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,741,395 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,757,250 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,773,267 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
7,788,882 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,814,901 UART: [idev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
7,971,771 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
8,110,001 UART: [idev] --
8,110,799 UART: [ldev] ++
8,111,304 UART: [ldev] CDI.KEYID = 6
8,112,186 UART: [ldev] SUBJECT.KEYID = 5
8,113,293 UART: [ldev] AUTHORITY.KEYID = 7
8,114,478 UART: [ldev] FE.KEYID = 1
8,115,401 UART: [ldev] Erasing FE.KEYID = 1
10,528,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,262,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,278,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,294,464 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,309,938 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,331,735 UART: [ldev] --
12,337,380 UART: [fwproc] Wait for Commands...
12,340,353 UART: [fwproc] Recv command 0x46574c44
12,342,347 UART: [fwproc] Recv'd Img size: 109820 bytes
15,717,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,799,351 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,841,809 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,170,374 >>> mbox cmd response: success
16,170,753 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,174,500 UART: [afmc] ++
16,175,092 UART: [afmc] CDI.KEYID = 6
16,176,039 UART: [afmc] SUBJECT.KEYID = 7
16,177,261 UART: [afmc] AUTHORITY.KEYID = 5
18,709,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,450,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,452,690 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,468,512 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,484,486 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,500,078 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,525,451 UART: [afmc] --
20,528,413 UART: [cold-reset] --
20,532,712 UART: [state] Locking Datavault
20,538,235 UART: [state] Locking PCR0, PCR1 and PCR31
20,540,002 UART: [state] Locking ICCM
20,541,354 UART: [exit] Launching FMC @ 0x40000000
20,549,705 UART:
20,549,946 UART: Running Caliptra FMC ...
20,551,053 UART:
20,551,222 UART: [fmc] Received command: 0x10000001
20,552,703 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,572,362 UART: [fmc] LDEVID cert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
20,665,110 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,685,801 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,806,807 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
7,746,339 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
15,860,066 >>> mbox cmd response: success
15,860,700 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,179,939 UART:
20,180,333 UART: Running Caliptra FMC ...
20,181,528 UART:
20,181,699 UART: [fmc] Received command: 0x10000001
20,183,260 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,202,615 UART: [fmc] LDEVID cert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
20,295,450 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,316,151 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,437,382 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,074 writing to cptra_bootfsm_go
2,241,228 UART:
2,242,375 UART: Running Caliptra ROM ...
2,243,510 UART:
2,243,671 UART: [state] CFI Enabled
2,244,538 UART: [state] LifecycleState = Unprovisioned
2,246,101 UART: [state] DebugLocked = No
2,247,236 UART: [state] WD Timer not started. Device not locked for debugging
2,249,632 UART: [kat] SHA2-256
2,250,292 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,253,297 UART: [kat] ++
2,253,750 UART: [kat] sha1
2,254,257 UART: [kat] SHA2-256
2,254,910 UART: [kat] SHA2-384
2,255,561 UART: [kat] SHA2-512-ACC
2,256,553 UART: [kat] ECC-384
3,282,264 UART: [kat] HMAC-384Kdf
3,293,725 UART: [kat] LMS
3,770,248 UART: [kat] --
3,773,609 UART: [cold-reset] ++
3,775,002 UART: [fht] FHT @ 0x50003400
3,787,822 UART: [idev] ++
3,788,442 UART: [idev] CDI.KEYID = 6
3,789,454 UART: [idev] SUBJECT.KEYID = 7
3,790,608 UART: [idev] UDS.KEYID = 0
3,805,662 UART: [idev] Erasing UDS.KEYID = 0
6,262,545 UART: [idev] Sha1 KeyId Algorithm
6,288,631 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,005,802 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,021,669 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,037,654 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
8,053,290 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
8,079,330 UART: [idev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
8,236,486 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
8,375,039 UART: [idev] --
8,375,724 UART: [ldev] ++
8,376,224 UART: [ldev] CDI.KEYID = 6
8,377,115 UART: [ldev] SUBJECT.KEYID = 5
8,378,130 UART: [ldev] AUTHORITY.KEYID = 7
8,379,213 UART: [ldev] FE.KEYID = 1
8,380,113 UART: [ldev] Erasing FE.KEYID = 1
10,726,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,446,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,462,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,478,257 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,493,799 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,516,226 UART: [ldev] --
12,522,352 UART: [fwproc] Wait for Commands...
12,524,238 UART: [fwproc] Recv command 0x46574c44
12,526,226 UART: [fwproc] Recv'd Img size: 109820 bytes
15,898,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,649 UART: [fwproc] Load FMC at address 0x40000000 len 11316
16,027,144 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,355,335 >>> mbox cmd response: success
16,355,704 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,359,166 UART: [afmc] ++
16,359,808 UART: [afmc] CDI.KEYID = 6
16,360,719 UART: [afmc] SUBJECT.KEYID = 7
16,361,931 UART: [afmc] AUTHORITY.KEYID = 5
18,866,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,591,155 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,593,379 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,609,157 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,625,145 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,640,703 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,665,000 UART: [afmc] --
20,668,337 UART: [cold-reset] --
20,673,889 UART: [state] Locking Datavault
20,679,842 UART: [state] Locking PCR0, PCR1 and PCR31
20,681,544 UART: [state] Locking ICCM
20,683,039 UART: [exit] Launching FMC @ 0x40000000
20,691,378 UART:
20,691,609 UART: Running Caliptra FMC ...
20,692,703 UART:
20,692,864 UART: [fmc] Received command: 0x10000001
20,694,319 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,714,058 UART: [fmc] LDEVID cert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
20,806,851 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,827,527 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,948,560 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
8,016,905 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
16,053,720 >>> mbox cmd response: success
16,054,257 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,304,082 UART:
20,304,477 UART: Running Caliptra FMC ...
20,305,568 UART:
20,305,719 UART: [fmc] Received command: 0x10000001
20,307,263 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,326,743 UART: [fmc] LDEVID cert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
20,419,594 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,440,321 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
20,561,582 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,023 UART: [state] WD Timer not started. Device not locked for debugging
87,152 UART: [kat] SHA2-256
890,702 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,806 UART: [kat] ++
894,958 UART: [kat] sha1
899,102 UART: [kat] SHA2-256
901,042 UART: [kat] SHA2-384
904,005 UART: [kat] SHA2-512-ACC
905,906 UART: [kat] ECC-384
915,549 UART: [kat] HMAC-384Kdf
920,301 UART: [kat] LMS
1,168,613 UART: [kat] --
1,169,330 UART: [cold-reset] ++
1,169,822 UART: [fht] FHT @ 0x50003400
1,172,536 UART: [idev] ++
1,172,704 UART: [idev] CDI.KEYID = 6
1,173,065 UART: [idev] SUBJECT.KEYID = 7
1,173,490 UART: [idev] UDS.KEYID = 0
1,181,247 UART: [idev] Erasing UDS.KEYID = 0
1,197,295 UART: [idev] Sha1 KeyId Algorithm
1,206,929 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,217,387 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,223,095 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,228,980 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,234,696 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,243,161 UART: [idev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
1,297,663 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,297,832 UART: [idev] --
1,298,833 UART: [ldev] ++
1,299,001 UART: [ldev] CDI.KEYID = 6
1,299,365 UART: [ldev] SUBJECT.KEYID = 5
1,299,792 UART: [ldev] AUTHORITY.KEYID = 7
1,300,255 UART: [ldev] FE.KEYID = 1
1,305,559 UART: [ldev] Erasing FE.KEYID = 1
1,332,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,257 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,362,981 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,370,100 UART: [ldev] --
1,371,551 UART: [fwproc] Wait for Commands...
1,372,250 UART: [fwproc] Recv command 0x46574c44
1,372,983 UART: [fwproc] Recv'd Img size: 109820 bytes
2,617,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,645,257 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,663,340 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,803,693 >>> mbox cmd response: success
2,803,693 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,804,725 UART: [afmc] ++
2,804,893 UART: [afmc] CDI.KEYID = 6
2,805,256 UART: [afmc] SUBJECT.KEYID = 7
2,805,682 UART: [afmc] AUTHORITY.KEYID = 5
2,841,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,857,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,858,686 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,864,406 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,870,299 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,876,004 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,883,761 UART: [afmc] --
2,884,574 UART: [cold-reset] --
2,885,492 UART: [state] Locking Datavault
2,886,919 UART: [state] Locking PCR0, PCR1 and PCR31
2,887,523 UART: [state] Locking ICCM
2,888,161 UART: [exit] Launching FMC @ 0x40000000
2,893,458 UART:
2,893,474 UART: Running Caliptra FMC ...
2,893,882 UART:
2,894,020 UART: [fmc] Received command: 0x10000001
2,895,113 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,913,973 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
3,004,950 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,024,541 UART: [fmc] FMCALIAS cert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
3,143,076 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,655 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,584,438 >>> mbox cmd response: success
2,584,438 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,646,045 UART:
2,646,061 UART: Running Caliptra FMC ...
2,646,469 UART:
2,646,607 UART: [fmc] Received command: 0x10000001
2,647,700 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,666,560 UART: [fmc] LDEVID cert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
2,757,537 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,128 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,895,663 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,743 UART: [state] LifecycleState = Unprovisioned
85,398 UART: [state] DebugLocked = No
85,996 UART: [state] WD Timer not started. Device not locked for debugging
87,355 UART: [kat] SHA2-256
890,905 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,009 UART: [kat] ++
895,161 UART: [kat] sha1
899,339 UART: [kat] SHA2-256
901,279 UART: [kat] SHA2-384
904,010 UART: [kat] SHA2-512-ACC
905,911 UART: [kat] ECC-384
916,122 UART: [kat] HMAC-384Kdf
920,930 UART: [kat] LMS
1,169,242 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,172,877 UART: [idev] ++
1,173,045 UART: [idev] CDI.KEYID = 6
1,173,406 UART: [idev] SUBJECT.KEYID = 7
1,173,831 UART: [idev] UDS.KEYID = 0
1,182,084 UART: [idev] Erasing UDS.KEYID = 0
1,199,104 UART: [idev] Sha1 KeyId Algorithm
1,208,702 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,358 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,066 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,951 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,667 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,132 UART: [idev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
1,299,634 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,299,803 UART: [idev] --
1,300,892 UART: [ldev] ++
1,301,060 UART: [ldev] CDI.KEYID = 6
1,301,424 UART: [ldev] SUBJECT.KEYID = 5
1,301,851 UART: [ldev] AUTHORITY.KEYID = 7
1,302,314 UART: [ldev] FE.KEYID = 1
1,307,490 UART: [ldev] Erasing FE.KEYID = 1
1,334,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,368 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,092 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,965 UART: [ldev] --
1,373,336 UART: [fwproc] Wait for Commands...
1,374,143 UART: [fwproc] Recv command 0x46574c44
1,374,876 UART: [fwproc] Recv'd Img size: 109820 bytes
2,619,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,856 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,664,939 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,805,246 >>> mbox cmd response: success
2,805,246 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,806,488 UART: [afmc] ++
2,806,656 UART: [afmc] CDI.KEYID = 6
2,807,019 UART: [afmc] SUBJECT.KEYID = 7
2,807,445 UART: [afmc] AUTHORITY.KEYID = 5
2,842,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,858,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,859,545 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,865,265 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,871,158 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,876,863 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,884,764 UART: [afmc] --
2,885,759 UART: [cold-reset] --
2,886,753 UART: [state] Locking Datavault
2,887,966 UART: [state] Locking PCR0, PCR1 and PCR31
2,888,570 UART: [state] Locking ICCM
2,889,080 UART: [exit] Launching FMC @ 0x40000000
2,894,377 UART:
2,894,393 UART: Running Caliptra FMC ...
2,894,801 UART:
2,894,939 UART: [fmc] Received command: 0x10000001
2,896,032 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,914,892 UART: [fmc] LDEVID cert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
3,005,869 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,025,460 UART: [fmc] FMCALIAS cert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
3,143,995 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,118 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,583,645 >>> mbox cmd response: success
2,583,645 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,646,094 UART:
2,646,110 UART: Running Caliptra FMC ...
2,646,518 UART:
2,646,656 UART: [fmc] Received command: 0x10000001
2,647,749 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,666,609 UART: [fmc] LDEVID cert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
2,757,586 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,177 UART: [fmc] FMCALIAS cert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
2,895,712 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
891,536 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
900,060 UART: [kat] SHA2-256
902,000 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
921,031 UART: [kat] LMS
1,169,343 UART: [kat] --
1,170,244 UART: [cold-reset] ++
1,170,770 UART: [fht] FHT @ 0x50003400
1,173,532 UART: [idev] ++
1,173,700 UART: [idev] CDI.KEYID = 6
1,174,061 UART: [idev] SUBJECT.KEYID = 7
1,174,486 UART: [idev] UDS.KEYID = 0
1,182,531 UART: [idev] Erasing UDS.KEYID = 0
1,199,201 UART: [idev] Sha1 KeyId Algorithm
1,208,997 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,487 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,195 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,080 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,796 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,261 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,299,763 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,299,932 UART: [idev] --
1,300,895 UART: [ldev] ++
1,301,063 UART: [ldev] CDI.KEYID = 6
1,301,427 UART: [ldev] SUBJECT.KEYID = 5
1,301,854 UART: [ldev] AUTHORITY.KEYID = 7
1,302,317 UART: [ldev] FE.KEYID = 1
1,307,821 UART: [ldev] Erasing FE.KEYID = 1
1,334,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,251 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,975 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,902 UART: [ldev] --
1,373,329 UART: [fwproc] Wait for Commands...
1,374,122 UART: [fwproc] Recv command 0x46574c44
1,374,855 UART: [fwproc] Recv'd Img size: 109820 bytes
2,619,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,647,029 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,665,112 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,805,449 >>> mbox cmd response: success
2,805,449 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,806,707 UART: [afmc] ++
2,806,875 UART: [afmc] CDI.KEYID = 6
2,807,238 UART: [afmc] SUBJECT.KEYID = 7
2,807,664 UART: [afmc] AUTHORITY.KEYID = 5
2,843,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,859,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,860,448 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,866,168 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,872,061 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,877,766 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,885,717 UART: [afmc] --
2,886,606 UART: [cold-reset] --
2,887,466 UART: [state] Locking Datavault
2,889,057 UART: [state] Locking PCR0, PCR1 and PCR31
2,889,661 UART: [state] Locking ICCM
2,890,265 UART: [exit] Launching FMC @ 0x40000000
2,895,562 UART:
2,895,578 UART: Running Caliptra FMC ...
2,895,986 UART:
2,896,124 UART: [fmc] Received command: 0x10000001
2,897,217 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,916,077 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
3,007,054 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,026,645 UART: [fmc] FMCALIAS cert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
3,145,180 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,361 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,583,920 >>> mbox cmd response: success
2,583,920 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,644,807 UART:
2,644,823 UART: Running Caliptra FMC ...
2,645,231 UART:
2,645,369 UART: [fmc] Received command: 0x10000001
2,646,462 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,665,322 UART: [fmc] LDEVID cert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
2,756,299 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,775,890 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,894,425 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,492 UART: [kat] SHA2-512-ACC
906,393 UART: [kat] ECC-384
915,934 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,763 UART: [cold-reset] ++
1,170,183 UART: [fht] FHT @ 0x50003400
1,172,859 UART: [idev] ++
1,173,027 UART: [idev] CDI.KEYID = 6
1,173,388 UART: [idev] SUBJECT.KEYID = 7
1,173,813 UART: [idev] UDS.KEYID = 0
1,182,032 UART: [idev] Erasing UDS.KEYID = 0
1,199,052 UART: [idev] Sha1 KeyId Algorithm
1,208,530 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,904 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,612 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,497 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,213 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,244,678 UART: [idev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
1,299,180 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,299,349 UART: [idev] --
1,300,304 UART: [ldev] ++
1,300,472 UART: [ldev] CDI.KEYID = 6
1,300,836 UART: [ldev] SUBJECT.KEYID = 5
1,301,263 UART: [ldev] AUTHORITY.KEYID = 7
1,301,726 UART: [ldev] FE.KEYID = 1
1,306,968 UART: [ldev] Erasing FE.KEYID = 1
1,333,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,792 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,516 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,511 UART: [ldev] --
1,372,834 UART: [fwproc] Wait for Commands...
1,373,487 UART: [fwproc] Recv command 0x46574c44
1,374,220 UART: [fwproc] Recv'd Img size: 109820 bytes
2,619,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,954 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,665,037 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,805,328 >>> mbox cmd response: success
2,805,328 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,806,584 UART: [afmc] ++
2,806,752 UART: [afmc] CDI.KEYID = 6
2,807,115 UART: [afmc] SUBJECT.KEYID = 7
2,807,541 UART: [afmc] AUTHORITY.KEYID = 5
2,843,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,859,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,860,341 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,866,061 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,871,954 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,877,659 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,885,594 UART: [afmc] --
2,886,511 UART: [cold-reset] --
2,887,305 UART: [state] Locking Datavault
2,888,256 UART: [state] Locking PCR0, PCR1 and PCR31
2,888,860 UART: [state] Locking ICCM
2,889,300 UART: [exit] Launching FMC @ 0x40000000
2,894,597 UART:
2,894,613 UART: Running Caliptra FMC ...
2,895,021 UART:
2,895,159 UART: [fmc] Received command: 0x10000001
2,896,252 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,915,112 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
3,006,089 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,025,680 UART: [fmc] FMCALIAS cert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
3,144,215 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,112,732 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,586,528 >>> mbox cmd response: success
2,586,528 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,648,849 UART:
2,648,865 UART: Running Caliptra FMC ...
2,649,273 UART:
2,649,411 UART: [fmc] Received command: 0x10000001
2,650,504 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,669,364 UART: [fmc] LDEVID cert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
2,760,341 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,932 UART: [fmc] FMCALIAS cert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
2,898,467 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
890,954 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,058 UART: [kat] ++
895,210 UART: [kat] sha1
899,300 UART: [kat] SHA2-256
901,240 UART: [kat] SHA2-384
903,957 UART: [kat] SHA2-512-ACC
905,858 UART: [kat] ECC-384
915,923 UART: [kat] HMAC-384Kdf
920,723 UART: [kat] LMS
1,169,035 UART: [kat] --
1,169,728 UART: [cold-reset] ++
1,170,086 UART: [fht] FHT @ 0x50003400
1,172,898 UART: [idev] ++
1,173,066 UART: [idev] CDI.KEYID = 6
1,173,427 UART: [idev] SUBJECT.KEYID = 7
1,173,852 UART: [idev] UDS.KEYID = 0
1,181,879 UART: [idev] Erasing UDS.KEYID = 0
1,198,889 UART: [idev] Sha1 KeyId Algorithm
1,208,733 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,443 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,151 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,036 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,752 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,217 UART: [idev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
1,299,719 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,299,888 UART: [idev] --
1,301,117 UART: [ldev] ++
1,301,285 UART: [ldev] CDI.KEYID = 6
1,301,649 UART: [ldev] SUBJECT.KEYID = 5
1,302,076 UART: [ldev] AUTHORITY.KEYID = 7
1,302,539 UART: [ldev] FE.KEYID = 1
1,307,727 UART: [ldev] Erasing FE.KEYID = 1
1,334,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,969 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,693 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,788 UART: [ldev] --
1,373,227 UART: [fwproc] Wait for Commands...
1,373,950 UART: [fwproc] Recv command 0x46574c44
1,374,683 UART: [fwproc] Recv'd Img size: 109820 bytes
2,619,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,417 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,664,500 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,804,895 >>> mbox cmd response: success
2,804,895 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,806,161 UART: [afmc] ++
2,806,329 UART: [afmc] CDI.KEYID = 6
2,806,692 UART: [afmc] SUBJECT.KEYID = 7
2,807,118 UART: [afmc] AUTHORITY.KEYID = 5
2,842,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,858,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,859,486 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,865,206 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,871,099 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,876,804 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,884,523 UART: [afmc] --
2,885,520 UART: [cold-reset] --
2,886,156 UART: [state] Locking Datavault
2,887,111 UART: [state] Locking PCR0, PCR1 and PCR31
2,887,715 UART: [state] Locking ICCM
2,888,219 UART: [exit] Launching FMC @ 0x40000000
2,893,516 UART:
2,893,532 UART: Running Caliptra FMC ...
2,893,940 UART:
2,894,078 UART: [fmc] Received command: 0x10000001
2,895,171 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,914,031 UART: [fmc] LDEVID cert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
3,005,008 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,024,599 UART: [fmc] FMCALIAS cert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
3,143,134 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,091 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,583,896 >>> mbox cmd response: success
2,583,896 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,645,727 UART:
2,645,743 UART: Running Caliptra FMC ...
2,646,151 UART:
2,646,289 UART: [fmc] Received command: 0x10000001
2,647,382 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,666,242 UART: [fmc] LDEVID cert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
2,757,219 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,776,810 UART: [fmc] FMCALIAS cert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
2,895,345 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,731 UART: [kat] ++
895,883 UART: [kat] sha1
900,165 UART: [kat] SHA2-256
902,105 UART: [kat] SHA2-384
904,894 UART: [kat] SHA2-512-ACC
906,795 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,850 UART: [kat] LMS
1,169,162 UART: [kat] --
1,170,061 UART: [cold-reset] ++
1,170,551 UART: [fht] FHT @ 0x50003400
1,173,317 UART: [idev] ++
1,173,485 UART: [idev] CDI.KEYID = 6
1,173,846 UART: [idev] SUBJECT.KEYID = 7
1,174,271 UART: [idev] UDS.KEYID = 0
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,199,912 UART: [idev] Sha1 KeyId Algorithm
1,209,752 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,432 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,140 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,025 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,741 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,206 UART: [idev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
1,300,708 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,300,877 UART: [idev] --
1,301,938 UART: [ldev] ++
1,302,106 UART: [ldev] CDI.KEYID = 6
1,302,470 UART: [ldev] SUBJECT.KEYID = 5
1,302,897 UART: [ldev] AUTHORITY.KEYID = 7
1,303,360 UART: [ldev] FE.KEYID = 1
1,308,812 UART: [ldev] Erasing FE.KEYID = 1
1,334,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,630 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,354 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,417 UART: [ldev] --
1,373,760 UART: [fwproc] Wait for Commands...
1,374,487 UART: [fwproc] Recv command 0x46574c44
1,375,220 UART: [fwproc] Recv'd Img size: 109820 bytes
2,619,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,768 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,664,851 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,805,180 >>> mbox cmd response: success
2,805,180 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,806,376 UART: [afmc] ++
2,806,544 UART: [afmc] CDI.KEYID = 6
2,806,907 UART: [afmc] SUBJECT.KEYID = 7
2,807,333 UART: [afmc] AUTHORITY.KEYID = 5
2,842,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,859,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,859,859 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,865,579 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,871,472 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,877,177 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,884,936 UART: [afmc] --
2,885,985 UART: [cold-reset] --
2,886,683 UART: [state] Locking Datavault
2,887,734 UART: [state] Locking PCR0, PCR1 and PCR31
2,888,338 UART: [state] Locking ICCM
2,888,864 UART: [exit] Launching FMC @ 0x40000000
2,894,161 UART:
2,894,177 UART: Running Caliptra FMC ...
2,894,585 UART:
2,894,723 UART: [fmc] Received command: 0x10000001
2,895,816 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,914,676 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
3,005,653 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,025,244 UART: [fmc] FMCALIAS cert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
3,143,779 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,094 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,581,599 >>> mbox cmd response: success
2,581,599 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,643,972 UART:
2,643,988 UART: Running Caliptra FMC ...
2,644,396 UART:
2,644,534 UART: [fmc] Received command: 0x10000001
2,645,627 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,664,487 UART: [fmc] LDEVID cert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
2,755,464 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,775,055 UART: [fmc] FMCALIAS cert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
2,893,590 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
5,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,088 UART:
192,504 UART: Running Caliptra ROM ...
193,654 UART:
193,812 UART: [state] CFI Enabled
266,161 UART: [state] LifecycleState = Unprovisioned
268,137 UART: [state] DebugLocked = No
270,555 UART: [state] WD Timer not started. Device not locked for debugging
273,647 UART: [kat] SHA2-256
453,289 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,076 UART: [kat] ++
464,615 UART: [kat] sha1
475,828 UART: [kat] SHA2-256
478,509 UART: [kat] SHA2-384
484,108 UART: [kat] SHA2-512-ACC
486,461 UART: [kat] ECC-384
2,948,048 UART: [kat] HMAC-384Kdf
2,971,842 UART: [kat] LMS
3,448,339 UART: [kat] --
3,451,309 UART: [cold-reset] ++
3,452,433 UART: [fht] FHT @ 0x50003400
3,464,260 UART: [idev] ++
3,464,892 UART: [idev] CDI.KEYID = 6
3,465,785 UART: [idev] SUBJECT.KEYID = 7
3,467,013 UART: [idev] UDS.KEYID = 0
3,502,227 UART: [idev] Erasing UDS.KEYID = 0
5,987,219 UART: [idev] Sha1 KeyId Algorithm
6,009,433 UART: [idev] --
6,014,196 UART: [ldev] ++
6,014,773 UART: [ldev] CDI.KEYID = 6
6,015,662 UART: [ldev] SUBJECT.KEYID = 5
6,016,888 UART: [ldev] AUTHORITY.KEYID = 7
6,018,131 UART: [ldev] FE.KEYID = 1
6,056,962 UART: [ldev] Erasing FE.KEYID = 1
8,561,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,156 UART: [ldev] --
10,374,427 UART: [fwproc] Wait for Commands...
10,377,172 UART: [fwproc] Recv command 0x46574c44
10,379,161 UART: [fwproc] Recv'd Img size: 118548 bytes
12,706,387 UART: ROM Fatal Error: 0x000B0014
12,709,625 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
5,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,555,267 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
17,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,366 UART:
192,742 UART: Running Caliptra ROM ...
193,904 UART:
603,446 UART: [state] CFI Enabled
618,677 UART: [state] LifecycleState = Unprovisioned
620,626 UART: [state] DebugLocked = No
622,219 UART: [state] WD Timer not started. Device not locked for debugging
626,874 UART: [kat] SHA2-256
806,538 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,315 UART: [kat] ++
817,846 UART: [kat] sha1
829,450 UART: [kat] SHA2-256
832,125 UART: [kat] SHA2-384
838,314 UART: [kat] SHA2-512-ACC
840,713 UART: [kat] ECC-384
3,283,266 UART: [kat] HMAC-384Kdf
3,296,095 UART: [kat] LMS
3,772,633 UART: [kat] --
3,777,648 UART: [cold-reset] ++
3,778,874 UART: [fht] FHT @ 0x50003400
3,789,365 UART: [idev] ++
3,789,928 UART: [idev] CDI.KEYID = 6
3,790,889 UART: [idev] SUBJECT.KEYID = 7
3,792,159 UART: [idev] UDS.KEYID = 0
3,808,725 UART: [idev] Erasing UDS.KEYID = 0
6,264,744 UART: [idev] Sha1 KeyId Algorithm
6,288,966 UART: [idev] --
6,294,058 UART: [ldev] ++
6,294,632 UART: [ldev] CDI.KEYID = 6
6,295,592 UART: [ldev] SUBJECT.KEYID = 5
6,296,805 UART: [ldev] AUTHORITY.KEYID = 7
6,298,037 UART: [ldev] FE.KEYID = 1
6,307,495 UART: [ldev] Erasing FE.KEYID = 1
8,790,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,206 UART: [ldev] --
10,588,134 UART: [fwproc] Wait for Commands...
10,591,428 UART: [fwproc] Recv command 0x46574c44
10,593,411 UART: [fwproc] Recv'd Img size: 118548 bytes
12,915,510 UART: ROM Fatal Error: 0x000B0014
12,918,758 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
6,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,800,371 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,298 UART: [kat] ++
895,450 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,339 UART: [kat] SHA2-512-ACC
906,240 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,895 UART: [kat] LMS
1,169,207 UART: [kat] --
1,170,146 UART: [cold-reset] ++
1,170,472 UART: [fht] FHT @ 0x50003400
1,172,956 UART: [idev] ++
1,173,124 UART: [idev] CDI.KEYID = 6
1,173,485 UART: [idev] SUBJECT.KEYID = 7
1,173,910 UART: [idev] UDS.KEYID = 0
1,182,377 UART: [idev] Erasing UDS.KEYID = 0
1,199,555 UART: [idev] Sha1 KeyId Algorithm
1,208,595 UART: [idev] --
1,209,548 UART: [ldev] ++
1,209,716 UART: [ldev] CDI.KEYID = 6
1,210,080 UART: [ldev] SUBJECT.KEYID = 5
1,210,507 UART: [ldev] AUTHORITY.KEYID = 7
1,210,970 UART: [ldev] FE.KEYID = 1
1,215,992 UART: [ldev] Erasing FE.KEYID = 1
1,241,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,360 UART: [ldev] --
1,280,723 UART: [fwproc] Wait for Commands...
1,281,452 UART: [fwproc] Recv command 0x46574c44
1,282,185 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,390 UART: ROM Fatal Error: 0x000B0014
1,562,547 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,398 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
87,048 UART: [state] WD Timer not started. Device not locked for debugging
88,375 UART: [kat] SHA2-256
891,925 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,029 UART: [kat] ++
896,181 UART: [kat] sha1
900,277 UART: [kat] SHA2-256
902,217 UART: [kat] SHA2-384
904,850 UART: [kat] SHA2-512-ACC
906,751 UART: [kat] ECC-384
916,614 UART: [kat] HMAC-384Kdf
921,418 UART: [kat] LMS
1,169,730 UART: [kat] --
1,170,493 UART: [cold-reset] ++
1,171,061 UART: [fht] FHT @ 0x50003400
1,173,661 UART: [idev] ++
1,173,829 UART: [idev] CDI.KEYID = 6
1,174,190 UART: [idev] SUBJECT.KEYID = 7
1,174,615 UART: [idev] UDS.KEYID = 0
1,182,820 UART: [idev] Erasing UDS.KEYID = 0
1,199,826 UART: [idev] Sha1 KeyId Algorithm
1,208,766 UART: [idev] --
1,209,677 UART: [ldev] ++
1,209,845 UART: [ldev] CDI.KEYID = 6
1,210,209 UART: [ldev] SUBJECT.KEYID = 5
1,210,636 UART: [ldev] AUTHORITY.KEYID = 7
1,211,099 UART: [ldev] FE.KEYID = 1
1,216,781 UART: [ldev] Erasing FE.KEYID = 1
1,242,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,277 UART: [ldev] --
1,281,722 UART: [fwproc] Wait for Commands...
1,282,349 UART: [fwproc] Recv command 0x46574c44
1,283,082 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,119 UART: ROM Fatal Error: 0x000B0014
1,563,276 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,467 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,142 UART: [kat] ++
895,294 UART: [kat] sha1
899,450 UART: [kat] SHA2-256
901,390 UART: [kat] SHA2-384
904,211 UART: [kat] SHA2-512-ACC
906,112 UART: [kat] ECC-384
915,665 UART: [kat] HMAC-384Kdf
920,299 UART: [kat] LMS
1,168,611 UART: [kat] --
1,169,482 UART: [cold-reset] ++
1,169,996 UART: [fht] FHT @ 0x50003400
1,172,532 UART: [idev] ++
1,172,700 UART: [idev] CDI.KEYID = 6
1,173,061 UART: [idev] SUBJECT.KEYID = 7
1,173,486 UART: [idev] UDS.KEYID = 0
1,181,485 UART: [idev] Erasing UDS.KEYID = 0
1,198,615 UART: [idev] Sha1 KeyId Algorithm
1,207,661 UART: [idev] --
1,208,780 UART: [ldev] ++
1,208,948 UART: [ldev] CDI.KEYID = 6
1,209,312 UART: [ldev] SUBJECT.KEYID = 5
1,209,739 UART: [ldev] AUTHORITY.KEYID = 7
1,210,202 UART: [ldev] FE.KEYID = 1
1,215,310 UART: [ldev] Erasing FE.KEYID = 1
1,241,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,974 UART: [ldev] --
1,281,359 UART: [fwproc] Wait for Commands...
1,282,138 UART: [fwproc] Recv command 0x46574c44
1,282,871 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,136 UART: ROM Fatal Error: 0x000B0014
1,563,293 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,415,980 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
891,523 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,627 UART: [kat] ++
895,779 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,786 UART: [kat] SHA2-512-ACC
906,687 UART: [kat] ECC-384
916,326 UART: [kat] HMAC-384Kdf
921,054 UART: [kat] LMS
1,169,366 UART: [kat] --
1,170,239 UART: [cold-reset] ++
1,170,681 UART: [fht] FHT @ 0x50003400
1,173,347 UART: [idev] ++
1,173,515 UART: [idev] CDI.KEYID = 6
1,173,876 UART: [idev] SUBJECT.KEYID = 7
1,174,301 UART: [idev] UDS.KEYID = 0
1,182,346 UART: [idev] Erasing UDS.KEYID = 0
1,199,624 UART: [idev] Sha1 KeyId Algorithm
1,208,444 UART: [idev] --
1,209,437 UART: [ldev] ++
1,209,605 UART: [ldev] CDI.KEYID = 6
1,209,969 UART: [ldev] SUBJECT.KEYID = 5
1,210,396 UART: [ldev] AUTHORITY.KEYID = 7
1,210,859 UART: [ldev] FE.KEYID = 1
1,216,269 UART: [ldev] Erasing FE.KEYID = 1
1,242,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,351 UART: [ldev] --
1,281,622 UART: [fwproc] Wait for Commands...
1,282,409 UART: [fwproc] Recv command 0x46574c44
1,283,142 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,883 UART: ROM Fatal Error: 0x000B0014
1,563,040 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,781 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,047 UART: [state] WD Timer not started. Device not locked for debugging
87,228 UART: [kat] SHA2-256
890,778 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,882 UART: [kat] ++
895,034 UART: [kat] sha1
899,074 UART: [kat] SHA2-256
901,014 UART: [kat] SHA2-384
903,813 UART: [kat] SHA2-512-ACC
905,714 UART: [kat] ECC-384
915,617 UART: [kat] HMAC-384Kdf
920,223 UART: [kat] LMS
1,168,535 UART: [kat] --
1,169,204 UART: [cold-reset] ++
1,169,770 UART: [fht] FHT @ 0x50003400
1,172,452 UART: [idev] ++
1,172,620 UART: [idev] CDI.KEYID = 6
1,172,981 UART: [idev] SUBJECT.KEYID = 7
1,173,406 UART: [idev] UDS.KEYID = 0
1,181,255 UART: [idev] Erasing UDS.KEYID = 0
1,198,171 UART: [idev] Sha1 KeyId Algorithm
1,207,235 UART: [idev] --
1,208,222 UART: [ldev] ++
1,208,390 UART: [ldev] CDI.KEYID = 6
1,208,754 UART: [ldev] SUBJECT.KEYID = 5
1,209,181 UART: [ldev] AUTHORITY.KEYID = 7
1,209,644 UART: [ldev] FE.KEYID = 1
1,214,740 UART: [ldev] Erasing FE.KEYID = 1
1,240,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,032 UART: [ldev] --
1,279,487 UART: [fwproc] Wait for Commands...
1,280,214 UART: [fwproc] Recv command 0x46574c44
1,280,947 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,634 UART: ROM Fatal Error: 0x000B0014
1,561,791 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,424 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,899 UART: [state] LifecycleState = Unprovisioned
85,554 UART: [state] DebugLocked = No
86,238 UART: [state] WD Timer not started. Device not locked for debugging
87,419 UART: [kat] SHA2-256
890,969 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,073 UART: [kat] ++
895,225 UART: [kat] sha1
899,631 UART: [kat] SHA2-256
901,571 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
915,538 UART: [kat] HMAC-384Kdf
920,250 UART: [kat] LMS
1,168,562 UART: [kat] --
1,169,349 UART: [cold-reset] ++
1,169,771 UART: [fht] FHT @ 0x50003400
1,172,233 UART: [idev] ++
1,172,401 UART: [idev] CDI.KEYID = 6
1,172,762 UART: [idev] SUBJECT.KEYID = 7
1,173,187 UART: [idev] UDS.KEYID = 0
1,181,334 UART: [idev] Erasing UDS.KEYID = 0
1,198,620 UART: [idev] Sha1 KeyId Algorithm
1,207,538 UART: [idev] --
1,208,833 UART: [ldev] ++
1,209,001 UART: [ldev] CDI.KEYID = 6
1,209,365 UART: [ldev] SUBJECT.KEYID = 5
1,209,792 UART: [ldev] AUTHORITY.KEYID = 7
1,210,255 UART: [ldev] FE.KEYID = 1
1,215,619 UART: [ldev] Erasing FE.KEYID = 1
1,241,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,939 UART: [ldev] --
1,281,180 UART: [fwproc] Wait for Commands...
1,281,909 UART: [fwproc] Recv command 0x46574c44
1,282,642 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,927 UART: ROM Fatal Error: 0x000B0014
1,563,084 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,415 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,299 UART:
192,686 UART: Running Caliptra ROM ...
193,920 UART:
194,082 UART: [state] CFI Enabled
264,147 UART: [state] LifecycleState = Unprovisioned
266,140 UART: [state] DebugLocked = No
267,310 UART: [state] WD Timer not started. Device not locked for debugging
271,687 UART: [kat] SHA2-256
451,350 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,112 UART: [kat] ++
462,595 UART: [kat] sha1
474,858 UART: [kat] SHA2-256
477,559 UART: [kat] SHA2-384
484,619 UART: [kat] SHA2-512-ACC
486,959 UART: [kat] ECC-384
2,945,778 UART: [kat] HMAC-384Kdf
2,970,378 UART: [kat] LMS
3,446,843 UART: [kat] --
3,451,225 UART: [cold-reset] ++
3,453,543 UART: [fht] FHT @ 0x50003400
3,465,284 UART: [idev] ++
3,465,860 UART: [idev] CDI.KEYID = 6
3,466,835 UART: [idev] SUBJECT.KEYID = 7
3,468,055 UART: [idev] UDS.KEYID = 0
3,499,163 UART: [idev] Erasing UDS.KEYID = 0
5,985,209 UART: [idev] Sha1 KeyId Algorithm
6,008,606 UART: [idev] --
6,013,980 UART: [ldev] ++
6,014,562 UART: [ldev] CDI.KEYID = 6
6,015,483 UART: [ldev] SUBJECT.KEYID = 5
6,016,705 UART: [ldev] AUTHORITY.KEYID = 7
6,017,946 UART: [ldev] FE.KEYID = 1
6,055,723 UART: [ldev] Erasing FE.KEYID = 1
8,562,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,301 UART: [ldev] --
10,372,441 UART: [fwproc] Wait for Commands...
10,374,550 UART: [fwproc] Recv command 0x46574c44
10,376,543 UART: [fwproc] Recv'd Img size: 118548 bytes
12,701,176 UART: ROM Fatal Error: 0x000B0024
12,704,389 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,576,937 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
3,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,393 UART:
192,774 UART: Running Caliptra ROM ...
193,976 UART:
603,462 UART: [state] CFI Enabled
616,933 UART: [state] LifecycleState = Unprovisioned
618,891 UART: [state] DebugLocked = No
621,706 UART: [state] WD Timer not started. Device not locked for debugging
625,334 UART: [kat] SHA2-256
804,980 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,779 UART: [kat] ++
816,259 UART: [kat] sha1
827,509 UART: [kat] SHA2-256
830,189 UART: [kat] SHA2-384
836,536 UART: [kat] SHA2-512-ACC
838,875 UART: [kat] ECC-384
3,281,459 UART: [kat] HMAC-384Kdf
3,294,329 UART: [kat] LMS
3,770,879 UART: [kat] --
3,776,484 UART: [cold-reset] ++
3,778,789 UART: [fht] FHT @ 0x50003400
3,790,571 UART: [idev] ++
3,791,141 UART: [idev] CDI.KEYID = 6
3,792,124 UART: [idev] SUBJECT.KEYID = 7
3,793,338 UART: [idev] UDS.KEYID = 0
3,808,337 UART: [idev] Erasing UDS.KEYID = 0
6,270,010 UART: [idev] Sha1 KeyId Algorithm
6,295,273 UART: [idev] --
6,300,397 UART: [ldev] ++
6,300,964 UART: [ldev] CDI.KEYID = 6
6,301,845 UART: [ldev] SUBJECT.KEYID = 5
6,303,107 UART: [ldev] AUTHORITY.KEYID = 7
6,304,336 UART: [ldev] FE.KEYID = 1
6,315,223 UART: [ldev] Erasing FE.KEYID = 1
8,791,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,050 UART: [ldev] --
10,583,793 UART: [fwproc] Wait for Commands...
10,587,081 UART: [fwproc] Recv command 0x46574c44
10,589,071 UART: [fwproc] Recv'd Img size: 118548 bytes
12,913,584 UART: ROM Fatal Error: 0x000B0024
12,916,819 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,792,565 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [kat] SHA2-256
891,498 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
915,819 UART: [kat] HMAC-384Kdf
920,427 UART: [kat] LMS
1,168,739 UART: [kat] --
1,169,728 UART: [cold-reset] ++
1,170,280 UART: [fht] FHT @ 0x50003400
1,172,962 UART: [idev] ++
1,173,130 UART: [idev] CDI.KEYID = 6
1,173,491 UART: [idev] SUBJECT.KEYID = 7
1,173,916 UART: [idev] UDS.KEYID = 0
1,181,721 UART: [idev] Erasing UDS.KEYID = 0
1,199,121 UART: [idev] Sha1 KeyId Algorithm
1,207,895 UART: [idev] --
1,208,822 UART: [ldev] ++
1,208,990 UART: [ldev] CDI.KEYID = 6
1,209,354 UART: [ldev] SUBJECT.KEYID = 5
1,209,781 UART: [ldev] AUTHORITY.KEYID = 7
1,210,244 UART: [ldev] FE.KEYID = 1
1,215,574 UART: [ldev] Erasing FE.KEYID = 1
1,242,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,866 UART: [ldev] --
1,281,153 UART: [fwproc] Wait for Commands...
1,281,914 UART: [fwproc] Recv command 0x46574c44
1,282,647 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,104 UART: ROM Fatal Error: 0x000B0024
1,563,261 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,210 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,801 UART: [kat] ++
895,953 UART: [kat] sha1
900,105 UART: [kat] SHA2-256
902,045 UART: [kat] SHA2-384
904,830 UART: [kat] SHA2-512-ACC
906,731 UART: [kat] ECC-384
916,214 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,169,967 UART: [cold-reset] ++
1,170,325 UART: [fht] FHT @ 0x50003400
1,172,909 UART: [idev] ++
1,173,077 UART: [idev] CDI.KEYID = 6
1,173,438 UART: [idev] SUBJECT.KEYID = 7
1,173,863 UART: [idev] UDS.KEYID = 0
1,181,934 UART: [idev] Erasing UDS.KEYID = 0
1,199,046 UART: [idev] Sha1 KeyId Algorithm
1,208,044 UART: [idev] --
1,209,093 UART: [ldev] ++
1,209,261 UART: [ldev] CDI.KEYID = 6
1,209,625 UART: [ldev] SUBJECT.KEYID = 5
1,210,052 UART: [ldev] AUTHORITY.KEYID = 7
1,210,515 UART: [ldev] FE.KEYID = 1
1,215,993 UART: [ldev] Erasing FE.KEYID = 1
1,242,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,557 UART: [ldev] --
1,282,004 UART: [fwproc] Wait for Commands...
1,282,827 UART: [fwproc] Recv command 0x46574c44
1,283,560 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,909 UART: ROM Fatal Error: 0x000B0024
1,564,066 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,127 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,780 UART: [kat] SHA2-256
901,720 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
916,035 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,169,866 UART: [cold-reset] ++
1,170,350 UART: [fht] FHT @ 0x50003400
1,172,980 UART: [idev] ++
1,173,148 UART: [idev] CDI.KEYID = 6
1,173,509 UART: [idev] SUBJECT.KEYID = 7
1,173,934 UART: [idev] UDS.KEYID = 0
1,181,963 UART: [idev] Erasing UDS.KEYID = 0
1,199,363 UART: [idev] Sha1 KeyId Algorithm
1,208,207 UART: [idev] --
1,209,134 UART: [ldev] ++
1,209,302 UART: [ldev] CDI.KEYID = 6
1,209,666 UART: [ldev] SUBJECT.KEYID = 5
1,210,093 UART: [ldev] AUTHORITY.KEYID = 7
1,210,556 UART: [ldev] FE.KEYID = 1
1,215,614 UART: [ldev] Erasing FE.KEYID = 1
1,241,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,856 UART: [ldev] --
1,281,071 UART: [fwproc] Wait for Commands...
1,281,722 UART: [fwproc] Recv command 0x46574c44
1,282,455 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,488 UART: ROM Fatal Error: 0x000B0024
1,562,645 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,012 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
900,025 UART: [kat] SHA2-256
901,965 UART: [kat] SHA2-384
904,718 UART: [kat] SHA2-512-ACC
906,619 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,708 UART: [kat] LMS
1,169,020 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,865 UART: [idev] ++
1,173,033 UART: [idev] CDI.KEYID = 6
1,173,394 UART: [idev] SUBJECT.KEYID = 7
1,173,819 UART: [idev] UDS.KEYID = 0
1,181,514 UART: [idev] Erasing UDS.KEYID = 0
1,197,924 UART: [idev] Sha1 KeyId Algorithm
1,206,816 UART: [idev] --
1,207,671 UART: [ldev] ++
1,207,839 UART: [ldev] CDI.KEYID = 6
1,208,203 UART: [ldev] SUBJECT.KEYID = 5
1,208,630 UART: [ldev] AUTHORITY.KEYID = 7
1,209,093 UART: [ldev] FE.KEYID = 1
1,213,973 UART: [ldev] Erasing FE.KEYID = 1
1,240,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,471 UART: [ldev] --
1,279,824 UART: [fwproc] Wait for Commands...
1,280,447 UART: [fwproc] Recv command 0x46574c44
1,281,180 UART: [fwproc] Recv'd Img size: 118548 bytes
1,559,635 UART: ROM Fatal Error: 0x000B0024
1,560,792 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,763 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
891,042 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,146 UART: [kat] ++
895,298 UART: [kat] sha1
899,350 UART: [kat] SHA2-256
901,290 UART: [kat] SHA2-384
904,105 UART: [kat] SHA2-512-ACC
906,006 UART: [kat] ECC-384
915,889 UART: [kat] HMAC-384Kdf
920,573 UART: [kat] LMS
1,168,885 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,310 UART: [fht] FHT @ 0x50003400
1,172,948 UART: [idev] ++
1,173,116 UART: [idev] CDI.KEYID = 6
1,173,477 UART: [idev] SUBJECT.KEYID = 7
1,173,902 UART: [idev] UDS.KEYID = 0
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,263 UART: [idev] Sha1 KeyId Algorithm
1,207,179 UART: [idev] --
1,208,268 UART: [ldev] ++
1,208,436 UART: [ldev] CDI.KEYID = 6
1,208,800 UART: [ldev] SUBJECT.KEYID = 5
1,209,227 UART: [ldev] AUTHORITY.KEYID = 7
1,209,690 UART: [ldev] FE.KEYID = 1
1,215,162 UART: [ldev] Erasing FE.KEYID = 1
1,241,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,180 UART: [ldev] --
1,280,395 UART: [fwproc] Wait for Commands...
1,281,008 UART: [fwproc] Recv command 0x46574c44
1,281,741 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,572 UART: ROM Fatal Error: 0x000B0024
1,561,729 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,326 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,575 UART: [kat] SHA2-256
891,125 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,229 UART: [kat] ++
895,381 UART: [kat] sha1
899,799 UART: [kat] SHA2-256
901,739 UART: [kat] SHA2-384
904,718 UART: [kat] SHA2-512-ACC
906,619 UART: [kat] ECC-384
916,706 UART: [kat] HMAC-384Kdf
921,326 UART: [kat] LMS
1,169,638 UART: [kat] --
1,170,423 UART: [cold-reset] ++
1,170,951 UART: [fht] FHT @ 0x50003400
1,173,681 UART: [idev] ++
1,173,849 UART: [idev] CDI.KEYID = 6
1,174,210 UART: [idev] SUBJECT.KEYID = 7
1,174,635 UART: [idev] UDS.KEYID = 0
1,183,112 UART: [idev] Erasing UDS.KEYID = 0
1,199,892 UART: [idev] Sha1 KeyId Algorithm
1,208,856 UART: [idev] --
1,209,901 UART: [ldev] ++
1,210,069 UART: [ldev] CDI.KEYID = 6
1,210,433 UART: [ldev] SUBJECT.KEYID = 5
1,210,860 UART: [ldev] AUTHORITY.KEYID = 7
1,211,323 UART: [ldev] FE.KEYID = 1
1,216,605 UART: [ldev] Erasing FE.KEYID = 1
1,243,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,331 UART: [ldev] --
1,282,734 UART: [fwproc] Wait for Commands...
1,283,475 UART: [fwproc] Recv command 0x46574c44
1,284,208 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,685 UART: ROM Fatal Error: 0x000B0024
1,564,842 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,081 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,131 UART:
192,504 UART: Running Caliptra ROM ...
193,736 UART:
193,895 UART: [state] CFI Enabled
267,711 UART: [state] LifecycleState = Unprovisioned
269,597 UART: [state] DebugLocked = No
271,412 UART: [state] WD Timer not started. Device not locked for debugging
276,078 UART: [kat] SHA2-256
455,734 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,558 UART: [kat] ++
467,044 UART: [kat] sha1
478,425 UART: [kat] SHA2-256
481,135 UART: [kat] SHA2-384
486,261 UART: [kat] SHA2-512-ACC
488,665 UART: [kat] ECC-384
2,949,590 UART: [kat] HMAC-384Kdf
2,973,193 UART: [kat] LMS
3,449,656 UART: [kat] --
3,452,633 UART: [cold-reset] ++
3,454,740 UART: [fht] FHT @ 0x50003400
3,465,888 UART: [idev] ++
3,466,466 UART: [idev] CDI.KEYID = 6
3,467,442 UART: [idev] SUBJECT.KEYID = 7
3,468,662 UART: [idev] UDS.KEYID = 0
3,505,016 UART: [idev] Erasing UDS.KEYID = 0
5,990,071 UART: [idev] Sha1 KeyId Algorithm
6,015,171 UART: [idev] --
6,020,906 UART: [ldev] ++
6,021,508 UART: [ldev] CDI.KEYID = 6
6,022,429 UART: [ldev] SUBJECT.KEYID = 5
6,023,599 UART: [ldev] AUTHORITY.KEYID = 7
6,024,900 UART: [ldev] FE.KEYID = 1
6,059,975 UART: [ldev] Erasing FE.KEYID = 1
8,569,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,546 UART: [ldev] --
10,375,993 UART: [fwproc] Wait for Commands...
10,377,936 UART: [fwproc] Recv command 0x46574c44
10,379,931 UART: [fwproc] Recv'd Img size: 118548 bytes
12,702,928 UART: ROM Fatal Error: 0x000B0023
12,706,155 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,591,399 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,233 writing to cptra_bootfsm_go
4,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
193,345 UART:
193,740 UART: Running Caliptra ROM ...
194,960 UART:
604,496 UART: [state] CFI Enabled
617,520 UART: [state] LifecycleState = Unprovisioned
619,464 UART: [state] DebugLocked = No
621,677 UART: [state] WD Timer not started. Device not locked for debugging
625,816 UART: [kat] SHA2-256
805,454 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,224 UART: [kat] ++
816,668 UART: [kat] sha1
828,660 UART: [kat] SHA2-256
831,358 UART: [kat] SHA2-384
836,795 UART: [kat] SHA2-512-ACC
839,182 UART: [kat] ECC-384
3,280,574 UART: [kat] HMAC-384Kdf
3,294,109 UART: [kat] LMS
3,770,654 UART: [kat] --
3,776,667 UART: [cold-reset] ++
3,778,555 UART: [fht] FHT @ 0x50003400
3,790,607 UART: [idev] ++
3,791,168 UART: [idev] CDI.KEYID = 6
3,792,134 UART: [idev] SUBJECT.KEYID = 7
3,793,398 UART: [idev] UDS.KEYID = 0
3,811,533 UART: [idev] Erasing UDS.KEYID = 0
6,274,686 UART: [idev] Sha1 KeyId Algorithm
6,299,640 UART: [idev] --
6,303,688 UART: [ldev] ++
6,304,274 UART: [ldev] CDI.KEYID = 6
6,305,179 UART: [ldev] SUBJECT.KEYID = 5
6,306,387 UART: [ldev] AUTHORITY.KEYID = 7
6,307,615 UART: [ldev] FE.KEYID = 1
6,319,120 UART: [ldev] Erasing FE.KEYID = 1
8,796,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,355 UART: [ldev] --
10,589,994 UART: [fwproc] Wait for Commands...
10,593,168 UART: [fwproc] Recv command 0x46574c44
10,595,148 UART: [fwproc] Recv'd Img size: 118548 bytes
12,913,960 UART: ROM Fatal Error: 0x000B0023
12,917,191 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,792,880 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
891,154 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,258 UART: [kat] ++
895,410 UART: [kat] sha1
899,564 UART: [kat] SHA2-256
901,504 UART: [kat] SHA2-384
904,153 UART: [kat] SHA2-512-ACC
906,054 UART: [kat] ECC-384
915,651 UART: [kat] HMAC-384Kdf
920,391 UART: [kat] LMS
1,168,703 UART: [kat] --
1,169,776 UART: [cold-reset] ++
1,170,192 UART: [fht] FHT @ 0x50003400
1,172,856 UART: [idev] ++
1,173,024 UART: [idev] CDI.KEYID = 6
1,173,385 UART: [idev] SUBJECT.KEYID = 7
1,173,810 UART: [idev] UDS.KEYID = 0
1,181,797 UART: [idev] Erasing UDS.KEYID = 0
1,198,633 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,648 UART: [ldev] ++
1,208,816 UART: [ldev] CDI.KEYID = 6
1,209,180 UART: [ldev] SUBJECT.KEYID = 5
1,209,607 UART: [ldev] AUTHORITY.KEYID = 7
1,210,070 UART: [ldev] FE.KEYID = 1
1,215,374 UART: [ldev] Erasing FE.KEYID = 1
1,242,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,542 UART: [ldev] --
1,281,971 UART: [fwproc] Wait for Commands...
1,282,786 UART: [fwproc] Recv command 0x46574c44
1,283,519 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,327 UART: ROM Fatal Error: 0x000B0023
1,564,484 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,927 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
900,079 UART: [kat] SHA2-256
902,019 UART: [kat] SHA2-384
904,836 UART: [kat] SHA2-512-ACC
906,737 UART: [kat] ECC-384
916,258 UART: [kat] HMAC-384Kdf
920,868 UART: [kat] LMS
1,169,180 UART: [kat] --
1,170,271 UART: [cold-reset] ++
1,170,797 UART: [fht] FHT @ 0x50003400
1,173,505 UART: [idev] ++
1,173,673 UART: [idev] CDI.KEYID = 6
1,174,034 UART: [idev] SUBJECT.KEYID = 7
1,174,459 UART: [idev] UDS.KEYID = 0
1,182,330 UART: [idev] Erasing UDS.KEYID = 0
1,199,066 UART: [idev] Sha1 KeyId Algorithm
1,207,812 UART: [idev] --
1,209,029 UART: [ldev] ++
1,209,197 UART: [ldev] CDI.KEYID = 6
1,209,561 UART: [ldev] SUBJECT.KEYID = 5
1,209,988 UART: [ldev] AUTHORITY.KEYID = 7
1,210,451 UART: [ldev] FE.KEYID = 1
1,215,627 UART: [ldev] Erasing FE.KEYID = 1
1,241,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,739 UART: [ldev] --
1,280,106 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,710 UART: ROM Fatal Error: 0x000B0023
1,561,867 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,924 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,516 UART: [kat] SHA2-256
901,456 UART: [kat] SHA2-384
904,311 UART: [kat] SHA2-512-ACC
906,212 UART: [kat] ECC-384
916,001 UART: [kat] HMAC-384Kdf
920,609 UART: [kat] LMS
1,168,921 UART: [kat] --
1,169,988 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,270 UART: [idev] ++
1,173,438 UART: [idev] CDI.KEYID = 6
1,173,799 UART: [idev] SUBJECT.KEYID = 7
1,174,224 UART: [idev] UDS.KEYID = 0
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,963 UART: [idev] Sha1 KeyId Algorithm
1,207,681 UART: [idev] --
1,208,698 UART: [ldev] ++
1,208,866 UART: [ldev] CDI.KEYID = 6
1,209,230 UART: [ldev] SUBJECT.KEYID = 5
1,209,657 UART: [ldev] AUTHORITY.KEYID = 7
1,210,120 UART: [ldev] FE.KEYID = 1
1,215,376 UART: [ldev] Erasing FE.KEYID = 1
1,241,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,456 UART: [ldev] --
1,280,861 UART: [fwproc] Wait for Commands...
1,281,590 UART: [fwproc] Recv command 0x46574c44
1,282,323 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,139 UART: ROM Fatal Error: 0x000B0023
1,562,296 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,727 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,995 UART: [state] LifecycleState = Unprovisioned
85,650 UART: [state] DebugLocked = No
86,316 UART: [state] WD Timer not started. Device not locked for debugging
87,455 UART: [kat] SHA2-256
891,005 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,109 UART: [kat] ++
895,261 UART: [kat] sha1
899,547 UART: [kat] SHA2-256
901,487 UART: [kat] SHA2-384
904,220 UART: [kat] SHA2-512-ACC
906,121 UART: [kat] ECC-384
916,242 UART: [kat] HMAC-384Kdf
920,840 UART: [kat] LMS
1,169,152 UART: [kat] --
1,169,801 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,172,861 UART: [idev] ++
1,173,029 UART: [idev] CDI.KEYID = 6
1,173,390 UART: [idev] SUBJECT.KEYID = 7
1,173,815 UART: [idev] UDS.KEYID = 0
1,181,976 UART: [idev] Erasing UDS.KEYID = 0
1,199,294 UART: [idev] Sha1 KeyId Algorithm
1,208,174 UART: [idev] --
1,209,145 UART: [ldev] ++
1,209,313 UART: [ldev] CDI.KEYID = 6
1,209,677 UART: [ldev] SUBJECT.KEYID = 5
1,210,104 UART: [ldev] AUTHORITY.KEYID = 7
1,210,567 UART: [ldev] FE.KEYID = 1
1,216,045 UART: [ldev] Erasing FE.KEYID = 1
1,242,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,351 UART: [ldev] --
1,281,744 UART: [fwproc] Wait for Commands...
1,282,545 UART: [fwproc] Recv command 0x46574c44
1,283,278 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,040 UART: ROM Fatal Error: 0x000B0023
1,564,197 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,482 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,560 UART: [state] LifecycleState = Unprovisioned
86,215 UART: [state] DebugLocked = No
86,821 UART: [state] WD Timer not started. Device not locked for debugging
88,076 UART: [kat] SHA2-256
891,626 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,730 UART: [kat] ++
895,882 UART: [kat] sha1
900,124 UART: [kat] SHA2-256
902,064 UART: [kat] SHA2-384
904,843 UART: [kat] SHA2-512-ACC
906,744 UART: [kat] ECC-384
916,877 UART: [kat] HMAC-384Kdf
921,327 UART: [kat] LMS
1,169,639 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,170,888 UART: [fht] FHT @ 0x50003400
1,173,494 UART: [idev] ++
1,173,662 UART: [idev] CDI.KEYID = 6
1,174,023 UART: [idev] SUBJECT.KEYID = 7
1,174,448 UART: [idev] UDS.KEYID = 0
1,182,421 UART: [idev] Erasing UDS.KEYID = 0
1,199,747 UART: [idev] Sha1 KeyId Algorithm
1,208,571 UART: [idev] --
1,209,618 UART: [ldev] ++
1,209,786 UART: [ldev] CDI.KEYID = 6
1,210,150 UART: [ldev] SUBJECT.KEYID = 5
1,210,577 UART: [ldev] AUTHORITY.KEYID = 7
1,211,040 UART: [ldev] FE.KEYID = 1
1,216,254 UART: [ldev] Erasing FE.KEYID = 1
1,242,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,924 UART: [ldev] --
1,281,161 UART: [fwproc] Wait for Commands...
1,281,806 UART: [fwproc] Recv command 0x46574c44
1,282,539 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,159 UART: ROM Fatal Error: 0x000B0023
1,562,316 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,899 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,549 UART: [kat] SHA2-256
891,099 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,467 UART: [kat] SHA2-256
901,407 UART: [kat] SHA2-384
904,212 UART: [kat] SHA2-512-ACC
906,113 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,756 UART: [kat] LMS
1,169,068 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,295 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,181,916 UART: [idev] Erasing UDS.KEYID = 0
1,198,948 UART: [idev] Sha1 KeyId Algorithm
1,207,742 UART: [idev] --
1,208,667 UART: [ldev] ++
1,208,835 UART: [ldev] CDI.KEYID = 6
1,209,199 UART: [ldev] SUBJECT.KEYID = 5
1,209,626 UART: [ldev] AUTHORITY.KEYID = 7
1,210,089 UART: [ldev] FE.KEYID = 1
1,215,303 UART: [ldev] Erasing FE.KEYID = 1
1,241,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,087 UART: [ldev] --
1,280,308 UART: [fwproc] Wait for Commands...
1,280,937 UART: [fwproc] Recv command 0x46574c44
1,281,670 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,436 UART: ROM Fatal Error: 0x000B0023
1,561,593 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,976 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
2,033,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,183,466 UART:
2,183,859 UART: Running Caliptra ROM ...
2,184,964 UART:
2,185,130 UART: [state] CFI Enabled
2,186,104 UART: [state] LifecycleState = Unprovisioned
2,187,776 UART: [state] DebugLocked = No
2,188,894 UART: [state] WD Timer not started. Device not locked for debugging
2,191,383 UART: [kat] SHA2-256
2,192,056 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,195,081 UART: [kat] ++
2,195,541 UART: [kat] sha1
2,196,064 UART: [kat] SHA2-256
2,196,812 UART: [kat] SHA2-384
2,197,487 UART: [kat] SHA2-512-ACC
2,198,376 UART: [kat] ECC-384
2,947,236 UART: [kat] HMAC-384Kdf
2,970,175 UART: [kat] LMS
3,446,670 UART: [kat] --
3,451,002 UART: [cold-reset] ++
3,453,110 UART: [fht] FHT @ 0x50003400
3,464,956 UART: [idev] ++
3,465,525 UART: [idev] CDI.KEYID = 6
3,466,546 UART: [idev] SUBJECT.KEYID = 7
3,467,770 UART: [idev] UDS.KEYID = 0
3,499,577 UART: [idev] Erasing UDS.KEYID = 0
5,985,796 UART: [idev] Sha1 KeyId Algorithm
6,010,211 UART: [idev] --
6,015,005 UART: [ldev] ++
6,015,596 UART: [ldev] CDI.KEYID = 6
6,016,515 UART: [ldev] SUBJECT.KEYID = 5
6,017,684 UART: [ldev] AUTHORITY.KEYID = 7
6,018,982 UART: [ldev] FE.KEYID = 1
6,056,657 UART: [ldev] Erasing FE.KEYID = 1
8,565,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,966 UART: [ldev] --
10,374,442 UART: [fwproc] Wait for Commands...
10,377,747 UART: [fwproc] Recv command 0x46574c44
10,379,745 UART: [fwproc] Recv'd Img size: 118548 bytes
12,704,917 UART: ROM Fatal Error: 0x000B0023
12,708,154 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,028,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,580,016 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,036,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,185,998 UART:
2,186,394 UART: Running Caliptra ROM ...
2,187,564 UART:
2,187,740 UART: [state] CFI Enabled
2,188,696 UART: [state] LifecycleState = Unprovisioned
2,190,345 UART: [state] DebugLocked = No
2,191,452 UART: [state] WD Timer not started. Device not locked for debugging
2,194,103 UART: [kat] SHA2-256
2,194,782 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,197,808 UART: [kat] ++
2,198,261 UART: [kat] sha1
2,198,771 UART: [kat] SHA2-256
2,199,510 UART: [kat] SHA2-384
2,200,177 UART: [kat] SHA2-512-ACC
2,201,056 UART: [kat] ECC-384
3,282,681 UART: [kat] HMAC-384Kdf
3,296,338 UART: [kat] LMS
3,772,831 UART: [kat] --
3,777,037 UART: [cold-reset] ++
3,778,262 UART: [fht] FHT @ 0x50003400
3,790,747 UART: [idev] ++
3,791,308 UART: [idev] CDI.KEYID = 6
3,792,268 UART: [idev] SUBJECT.KEYID = 7
3,793,478 UART: [idev] UDS.KEYID = 0
3,811,621 UART: [idev] Erasing UDS.KEYID = 0
6,273,076 UART: [idev] Sha1 KeyId Algorithm
6,297,400 UART: [idev] --
6,302,145 UART: [ldev] ++
6,302,769 UART: [ldev] CDI.KEYID = 6
6,303,673 UART: [ldev] SUBJECT.KEYID = 5
6,304,881 UART: [ldev] AUTHORITY.KEYID = 7
6,306,130 UART: [ldev] FE.KEYID = 1
6,318,234 UART: [ldev] Erasing FE.KEYID = 1
8,796,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,009 UART: [ldev] --
10,590,112 UART: [fwproc] Wait for Commands...
10,593,238 UART: [fwproc] Recv command 0x46574c44
10,595,289 UART: [fwproc] Recv'd Img size: 118548 bytes
12,924,127 UART: ROM Fatal Error: 0x000B0023
12,927,374 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
2,027,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,800,790 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,306 UART: [kat] ++
895,458 UART: [kat] sha1
899,850 UART: [kat] SHA2-256
901,790 UART: [kat] SHA2-384
904,441 UART: [kat] SHA2-512-ACC
906,342 UART: [kat] ECC-384
915,869 UART: [kat] HMAC-384Kdf
920,525 UART: [kat] LMS
1,168,837 UART: [kat] --
1,169,998 UART: [cold-reset] ++
1,170,354 UART: [fht] FHT @ 0x50003400
1,172,860 UART: [idev] ++
1,173,028 UART: [idev] CDI.KEYID = 6
1,173,389 UART: [idev] SUBJECT.KEYID = 7
1,173,814 UART: [idev] UDS.KEYID = 0
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,198,589 UART: [idev] Sha1 KeyId Algorithm
1,207,417 UART: [idev] --
1,208,698 UART: [ldev] ++
1,208,866 UART: [ldev] CDI.KEYID = 6
1,209,230 UART: [ldev] SUBJECT.KEYID = 5
1,209,657 UART: [ldev] AUTHORITY.KEYID = 7
1,210,120 UART: [ldev] FE.KEYID = 1
1,215,472 UART: [ldev] Erasing FE.KEYID = 1
1,241,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,898 UART: [ldev] --
1,281,245 UART: [fwproc] Wait for Commands...
1,281,978 UART: [fwproc] Recv command 0x46574c44
1,282,711 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,759 UART: ROM Fatal Error: 0x000B0023
1,563,916 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,041 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
899,969 UART: [kat] SHA2-256
901,909 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
916,042 UART: [kat] HMAC-384Kdf
920,628 UART: [kat] LMS
1,168,940 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,311 UART: [fht] FHT @ 0x50003400
1,172,967 UART: [idev] ++
1,173,135 UART: [idev] CDI.KEYID = 6
1,173,496 UART: [idev] SUBJECT.KEYID = 7
1,173,921 UART: [idev] UDS.KEYID = 0
1,182,062 UART: [idev] Erasing UDS.KEYID = 0
1,199,414 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,043 UART: [ldev] ++
1,209,211 UART: [ldev] CDI.KEYID = 6
1,209,575 UART: [ldev] SUBJECT.KEYID = 5
1,210,002 UART: [ldev] AUTHORITY.KEYID = 7
1,210,465 UART: [ldev] FE.KEYID = 1
1,215,889 UART: [ldev] Erasing FE.KEYID = 1
1,242,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,365 UART: [ldev] --
1,281,654 UART: [fwproc] Wait for Commands...
1,282,303 UART: [fwproc] Recv command 0x46574c44
1,283,036 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,742 UART: ROM Fatal Error: 0x000B0023
1,563,899 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,904 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Unprovisioned
86,151 UART: [state] DebugLocked = No
86,777 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
891,576 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
900,086 UART: [kat] SHA2-256
902,026 UART: [kat] SHA2-384
904,913 UART: [kat] SHA2-512-ACC
906,814 UART: [kat] ECC-384
916,391 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,169,954 UART: [cold-reset] ++
1,170,362 UART: [fht] FHT @ 0x50003400
1,172,842 UART: [idev] ++
1,173,010 UART: [idev] CDI.KEYID = 6
1,173,371 UART: [idev] SUBJECT.KEYID = 7
1,173,796 UART: [idev] UDS.KEYID = 0
1,181,655 UART: [idev] Erasing UDS.KEYID = 0
1,199,133 UART: [idev] Sha1 KeyId Algorithm
1,208,207 UART: [idev] --
1,209,214 UART: [ldev] ++
1,209,382 UART: [ldev] CDI.KEYID = 6
1,209,746 UART: [ldev] SUBJECT.KEYID = 5
1,210,173 UART: [ldev] AUTHORITY.KEYID = 7
1,210,636 UART: [ldev] FE.KEYID = 1
1,215,964 UART: [ldev] Erasing FE.KEYID = 1
1,242,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,508 UART: [ldev] --
1,281,723 UART: [fwproc] Wait for Commands...
1,282,420 UART: [fwproc] Recv command 0x46574c44
1,283,153 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,859 UART: ROM Fatal Error: 0x000B0023
1,563,016 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,823 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,900 UART: [kat] LMS
1,169,212 UART: [kat] --
1,170,289 UART: [cold-reset] ++
1,170,667 UART: [fht] FHT @ 0x50003400
1,173,259 UART: [idev] ++
1,173,427 UART: [idev] CDI.KEYID = 6
1,173,788 UART: [idev] SUBJECT.KEYID = 7
1,174,213 UART: [idev] UDS.KEYID = 0
1,182,464 UART: [idev] Erasing UDS.KEYID = 0
1,199,742 UART: [idev] Sha1 KeyId Algorithm
1,208,658 UART: [idev] --
1,209,535 UART: [ldev] ++
1,209,703 UART: [ldev] CDI.KEYID = 6
1,210,067 UART: [ldev] SUBJECT.KEYID = 5
1,210,494 UART: [ldev] AUTHORITY.KEYID = 7
1,210,957 UART: [ldev] FE.KEYID = 1
1,216,161 UART: [ldev] Erasing FE.KEYID = 1
1,242,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,193 UART: [ldev] --
1,281,624 UART: [fwproc] Wait for Commands...
1,282,367 UART: [fwproc] Recv command 0x46574c44
1,283,100 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,608 UART: ROM Fatal Error: 0x000B0023
1,563,765 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,462 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
891,058 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,162 UART: [kat] ++
895,314 UART: [kat] sha1
899,556 UART: [kat] SHA2-256
901,496 UART: [kat] SHA2-384
904,241 UART: [kat] SHA2-512-ACC
906,142 UART: [kat] ECC-384
916,073 UART: [kat] HMAC-384Kdf
920,551 UART: [kat] LMS
1,168,863 UART: [kat] --
1,169,762 UART: [cold-reset] ++
1,170,298 UART: [fht] FHT @ 0x50003400
1,172,960 UART: [idev] ++
1,173,128 UART: [idev] CDI.KEYID = 6
1,173,489 UART: [idev] SUBJECT.KEYID = 7
1,173,914 UART: [idev] UDS.KEYID = 0
1,181,619 UART: [idev] Erasing UDS.KEYID = 0
1,198,741 UART: [idev] Sha1 KeyId Algorithm
1,207,463 UART: [idev] --
1,208,514 UART: [ldev] ++
1,208,682 UART: [ldev] CDI.KEYID = 6
1,209,046 UART: [ldev] SUBJECT.KEYID = 5
1,209,473 UART: [ldev] AUTHORITY.KEYID = 7
1,209,936 UART: [ldev] FE.KEYID = 1
1,215,360 UART: [ldev] Erasing FE.KEYID = 1
1,241,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,862 UART: [ldev] --
1,281,115 UART: [fwproc] Wait for Commands...
1,281,742 UART: [fwproc] Recv command 0x46574c44
1,282,475 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,821 UART: ROM Fatal Error: 0x000B0023
1,562,978 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,047 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,027 UART: [state] LifecycleState = Unprovisioned
85,682 UART: [state] DebugLocked = No
86,180 UART: [state] WD Timer not started. Device not locked for debugging
87,427 UART: [kat] SHA2-256
890,977 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,081 UART: [kat] ++
895,233 UART: [kat] sha1
899,371 UART: [kat] SHA2-256
901,311 UART: [kat] SHA2-384
903,878 UART: [kat] SHA2-512-ACC
905,779 UART: [kat] ECC-384
915,416 UART: [kat] HMAC-384Kdf
920,044 UART: [kat] LMS
1,168,356 UART: [kat] --
1,169,313 UART: [cold-reset] ++
1,169,793 UART: [fht] FHT @ 0x50003400
1,172,273 UART: [idev] ++
1,172,441 UART: [idev] CDI.KEYID = 6
1,172,802 UART: [idev] SUBJECT.KEYID = 7
1,173,227 UART: [idev] UDS.KEYID = 0
1,181,466 UART: [idev] Erasing UDS.KEYID = 0
1,198,160 UART: [idev] Sha1 KeyId Algorithm
1,207,016 UART: [idev] --
1,208,101 UART: [ldev] ++
1,208,269 UART: [ldev] CDI.KEYID = 6
1,208,633 UART: [ldev] SUBJECT.KEYID = 5
1,209,060 UART: [ldev] AUTHORITY.KEYID = 7
1,209,523 UART: [ldev] FE.KEYID = 1
1,215,013 UART: [ldev] Erasing FE.KEYID = 1
1,240,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,659 UART: [ldev] --
1,279,960 UART: [fwproc] Wait for Commands...
1,280,713 UART: [fwproc] Recv command 0x46574c44
1,281,446 UART: [fwproc] Recv'd Img size: 118548 bytes
1,559,732 UART: ROM Fatal Error: 0x000B0023
1,560,889 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,072 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
2,027,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,727 UART:
2,178,128 UART: Running Caliptra ROM ...
2,179,219 UART:
2,179,386 UART: [state] CFI Enabled
2,180,364 UART: [state] LifecycleState = Unprovisioned
2,182,029 UART: [state] DebugLocked = No
2,183,071 UART: [state] WD Timer not started. Device not locked for debugging
2,185,562 UART: [kat] SHA2-256
2,186,255 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,277 UART: [kat] ++
2,189,735 UART: [kat] sha1
2,190,473 UART: [kat] SHA2-256
2,191,158 UART: [kat] SHA2-384
2,191,855 UART: [kat] SHA2-512-ACC
2,192,668 UART: [kat] ECC-384
2,947,998 UART: [kat] HMAC-384Kdf
2,971,401 UART: [kat] LMS
3,447,859 UART: [kat] --
3,453,015 UART: [cold-reset] ++
3,455,448 UART: [fht] FHT @ 0x50003400
3,467,184 UART: [idev] ++
3,467,759 UART: [idev] CDI.KEYID = 6
3,468,699 UART: [idev] SUBJECT.KEYID = 7
3,470,154 UART: [idev] UDS.KEYID = 0
3,500,981 UART: [idev] Erasing UDS.KEYID = 0
5,987,112 UART: [idev] Sha1 KeyId Algorithm
6,011,066 UART: [idev] --
6,015,724 UART: [ldev] ++
6,016,302 UART: [ldev] CDI.KEYID = 6
6,017,192 UART: [ldev] SUBJECT.KEYID = 5
6,018,408 UART: [ldev] AUTHORITY.KEYID = 7
6,019,652 UART: [ldev] FE.KEYID = 1
6,056,737 UART: [ldev] Erasing FE.KEYID = 1
8,560,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,775 UART: [ldev] --
10,372,546 UART: [fwproc] Wait for Commands...
10,374,785 UART: [fwproc] Recv command 0x46574c44
10,376,787 UART: [fwproc] Recv'd Img size: 118548 bytes
12,703,517 UART: ROM Fatal Error: 0x000B0021
12,706,753 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
2,032,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,599,751 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
2,038,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,188,039 UART:
2,188,435 UART: Running Caliptra ROM ...
2,189,534 UART:
2,189,686 UART: [state] CFI Enabled
2,190,653 UART: [state] LifecycleState = Unprovisioned
2,192,323 UART: [state] DebugLocked = No
2,193,349 UART: [state] WD Timer not started. Device not locked for debugging
2,195,821 UART: [kat] SHA2-256
2,196,485 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,199,505 UART: [kat] ++
2,199,955 UART: [kat] sha1
2,200,462 UART: [kat] SHA2-256
2,201,116 UART: [kat] SHA2-384
2,201,770 UART: [kat] SHA2-512-ACC
2,202,654 UART: [kat] ECC-384
3,285,487 UART: [kat] HMAC-384Kdf
3,297,293 UART: [kat] LMS
3,773,818 UART: [kat] --
3,779,418 UART: [cold-reset] ++
3,780,812 UART: [fht] FHT @ 0x50003400
3,792,332 UART: [idev] ++
3,792,901 UART: [idev] CDI.KEYID = 6
3,793,834 UART: [idev] SUBJECT.KEYID = 7
3,795,101 UART: [idev] UDS.KEYID = 0
3,812,731 UART: [idev] Erasing UDS.KEYID = 0
6,273,750 UART: [idev] Sha1 KeyId Algorithm
6,296,997 UART: [idev] --
6,301,877 UART: [ldev] ++
6,302,449 UART: [ldev] CDI.KEYID = 6
6,303,360 UART: [ldev] SUBJECT.KEYID = 5
6,304,573 UART: [ldev] AUTHORITY.KEYID = 7
6,305,802 UART: [ldev] FE.KEYID = 1
6,317,584 UART: [ldev] Erasing FE.KEYID = 1
8,796,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,273 UART: [ldev] --
10,588,426 UART: [fwproc] Wait for Commands...
10,591,397 UART: [fwproc] Recv command 0x46574c44
10,593,390 UART: [fwproc] Recv'd Img size: 118548 bytes
12,917,326 UART: ROM Fatal Error: 0x000B0021
12,920,559 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
2,031,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,802,245 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,520 UART: [state] LifecycleState = Unprovisioned
85,175 UART: [state] DebugLocked = No
85,717 UART: [state] WD Timer not started. Device not locked for debugging
86,856 UART: [kat] SHA2-256
890,406 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,510 UART: [kat] ++
894,662 UART: [kat] sha1
898,834 UART: [kat] SHA2-256
900,774 UART: [kat] SHA2-384
903,531 UART: [kat] SHA2-512-ACC
905,432 UART: [kat] ECC-384
915,323 UART: [kat] HMAC-384Kdf
920,005 UART: [kat] LMS
1,168,317 UART: [kat] --
1,169,132 UART: [cold-reset] ++
1,169,524 UART: [fht] FHT @ 0x50003400
1,172,210 UART: [idev] ++
1,172,378 UART: [idev] CDI.KEYID = 6
1,172,739 UART: [idev] SUBJECT.KEYID = 7
1,173,164 UART: [idev] UDS.KEYID = 0
1,181,621 UART: [idev] Erasing UDS.KEYID = 0
1,198,417 UART: [idev] Sha1 KeyId Algorithm
1,207,251 UART: [idev] --
1,208,254 UART: [ldev] ++
1,208,422 UART: [ldev] CDI.KEYID = 6
1,208,786 UART: [ldev] SUBJECT.KEYID = 5
1,209,213 UART: [ldev] AUTHORITY.KEYID = 7
1,209,676 UART: [ldev] FE.KEYID = 1
1,215,014 UART: [ldev] Erasing FE.KEYID = 1
1,241,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,470 UART: [ldev] --
1,280,835 UART: [fwproc] Wait for Commands...
1,281,574 UART: [fwproc] Recv command 0x46574c44
1,282,307 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,248 UART: ROM Fatal Error: 0x000B0021
1,562,405 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,720 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,246 UART: [state] WD Timer not started. Device not locked for debugging
87,577 UART: [kat] SHA2-256
891,127 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,765 UART: [kat] SHA2-256
901,705 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
920,916 UART: [kat] LMS
1,169,228 UART: [kat] --
1,170,133 UART: [cold-reset] ++
1,170,473 UART: [fht] FHT @ 0x50003400
1,173,163 UART: [idev] ++
1,173,331 UART: [idev] CDI.KEYID = 6
1,173,692 UART: [idev] SUBJECT.KEYID = 7
1,174,117 UART: [idev] UDS.KEYID = 0
1,181,826 UART: [idev] Erasing UDS.KEYID = 0
1,199,310 UART: [idev] Sha1 KeyId Algorithm
1,208,076 UART: [idev] --
1,209,017 UART: [ldev] ++
1,209,185 UART: [ldev] CDI.KEYID = 6
1,209,549 UART: [ldev] SUBJECT.KEYID = 5
1,209,976 UART: [ldev] AUTHORITY.KEYID = 7
1,210,439 UART: [ldev] FE.KEYID = 1
1,215,501 UART: [ldev] Erasing FE.KEYID = 1
1,241,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,085 UART: [ldev] --
1,280,492 UART: [fwproc] Wait for Commands...
1,281,135 UART: [fwproc] Recv command 0x46574c44
1,281,868 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,471 UART: ROM Fatal Error: 0x000B0021
1,562,628 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,795 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,171 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,978 UART: [kat] ++
895,130 UART: [kat] sha1
899,426 UART: [kat] SHA2-256
901,366 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
915,805 UART: [kat] HMAC-384Kdf
920,549 UART: [kat] LMS
1,168,861 UART: [kat] --
1,169,522 UART: [cold-reset] ++
1,169,886 UART: [fht] FHT @ 0x50003400
1,172,608 UART: [idev] ++
1,172,776 UART: [idev] CDI.KEYID = 6
1,173,137 UART: [idev] SUBJECT.KEYID = 7
1,173,562 UART: [idev] UDS.KEYID = 0
1,181,709 UART: [idev] Erasing UDS.KEYID = 0
1,198,657 UART: [idev] Sha1 KeyId Algorithm
1,207,677 UART: [idev] --
1,208,736 UART: [ldev] ++
1,208,904 UART: [ldev] CDI.KEYID = 6
1,209,268 UART: [ldev] SUBJECT.KEYID = 5
1,209,695 UART: [ldev] AUTHORITY.KEYID = 7
1,210,158 UART: [ldev] FE.KEYID = 1
1,215,180 UART: [ldev] Erasing FE.KEYID = 1
1,242,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,950 UART: [ldev] --
1,281,353 UART: [fwproc] Wait for Commands...
1,282,012 UART: [fwproc] Recv command 0x46574c44
1,282,745 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,512 UART: ROM Fatal Error: 0x000B0021
1,563,669 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,784 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,393 UART: [kat] ++
895,545 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,526 UART: [kat] HMAC-384Kdf
921,168 UART: [kat] LMS
1,169,480 UART: [kat] --
1,170,405 UART: [cold-reset] ++
1,170,923 UART: [fht] FHT @ 0x50003400
1,173,587 UART: [idev] ++
1,173,755 UART: [idev] CDI.KEYID = 6
1,174,116 UART: [idev] SUBJECT.KEYID = 7
1,174,541 UART: [idev] UDS.KEYID = 0
1,182,764 UART: [idev] Erasing UDS.KEYID = 0
1,200,220 UART: [idev] Sha1 KeyId Algorithm
1,209,180 UART: [idev] --
1,210,189 UART: [ldev] ++
1,210,357 UART: [ldev] CDI.KEYID = 6
1,210,721 UART: [ldev] SUBJECT.KEYID = 5
1,211,148 UART: [ldev] AUTHORITY.KEYID = 7
1,211,611 UART: [ldev] FE.KEYID = 1
1,216,899 UART: [ldev] Erasing FE.KEYID = 1
1,242,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,939 UART: [ldev] --
1,282,174 UART: [fwproc] Wait for Commands...
1,282,845 UART: [fwproc] Recv command 0x46574c44
1,283,578 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,001 UART: ROM Fatal Error: 0x000B0021
1,563,158 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,317 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,566 UART: [state] LifecycleState = Unprovisioned
86,221 UART: [state] DebugLocked = No
86,899 UART: [state] WD Timer not started. Device not locked for debugging
88,094 UART: [kat] SHA2-256
891,644 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,748 UART: [kat] ++
895,900 UART: [kat] sha1
900,082 UART: [kat] SHA2-256
902,022 UART: [kat] SHA2-384
904,659 UART: [kat] SHA2-512-ACC
906,560 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,721 UART: [kat] LMS
1,169,033 UART: [kat] --
1,170,054 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,172,938 UART: [idev] ++
1,173,106 UART: [idev] CDI.KEYID = 6
1,173,467 UART: [idev] SUBJECT.KEYID = 7
1,173,892 UART: [idev] UDS.KEYID = 0
1,181,443 UART: [idev] Erasing UDS.KEYID = 0
1,198,581 UART: [idev] Sha1 KeyId Algorithm
1,207,687 UART: [idev] --
1,208,704 UART: [ldev] ++
1,208,872 UART: [ldev] CDI.KEYID = 6
1,209,236 UART: [ldev] SUBJECT.KEYID = 5
1,209,663 UART: [ldev] AUTHORITY.KEYID = 7
1,210,126 UART: [ldev] FE.KEYID = 1
1,215,214 UART: [ldev] Erasing FE.KEYID = 1
1,242,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,056 UART: [ldev] --
1,281,385 UART: [fwproc] Wait for Commands...
1,282,188 UART: [fwproc] Recv command 0x46574c44
1,282,921 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,438 UART: ROM Fatal Error: 0x000B0021
1,563,595 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,558 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,977 UART: [state] LifecycleState = Unprovisioned
85,632 UART: [state] DebugLocked = No
86,248 UART: [state] WD Timer not started. Device not locked for debugging
87,483 UART: [kat] SHA2-256
891,033 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,137 UART: [kat] ++
895,289 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,108 UART: [kat] SHA2-512-ACC
906,009 UART: [kat] ECC-384
916,074 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,397 UART: [fht] FHT @ 0x50003400
1,173,163 UART: [idev] ++
1,173,331 UART: [idev] CDI.KEYID = 6
1,173,692 UART: [idev] SUBJECT.KEYID = 7
1,174,117 UART: [idev] UDS.KEYID = 0
1,182,368 UART: [idev] Erasing UDS.KEYID = 0
1,199,360 UART: [idev] Sha1 KeyId Algorithm
1,208,436 UART: [idev] --
1,209,435 UART: [ldev] ++
1,209,603 UART: [ldev] CDI.KEYID = 6
1,209,967 UART: [ldev] SUBJECT.KEYID = 5
1,210,394 UART: [ldev] AUTHORITY.KEYID = 7
1,210,857 UART: [ldev] FE.KEYID = 1
1,216,187 UART: [ldev] Erasing FE.KEYID = 1
1,242,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,733 UART: [ldev] --
1,281,950 UART: [fwproc] Wait for Commands...
1,282,587 UART: [fwproc] Recv command 0x46574c44
1,283,320 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,221 UART: ROM Fatal Error: 0x000B0021
1,564,378 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,953 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,032,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,601 UART:
2,182,986 UART: Running Caliptra ROM ...
2,184,164 UART:
2,184,366 UART: [state] CFI Enabled
2,185,340 UART: [state] LifecycleState = Unprovisioned
2,187,009 UART: [state] DebugLocked = No
2,188,131 UART: [state] WD Timer not started. Device not locked for debugging
2,190,615 UART: [kat] SHA2-256
2,191,290 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,309 UART: [kat] ++
2,194,767 UART: [kat] sha1
2,195,289 UART: [kat] SHA2-256
2,196,035 UART: [kat] SHA2-384
2,196,711 UART: [kat] SHA2-512-ACC
2,197,568 UART: [kat] ECC-384
2,948,444 UART: [kat] HMAC-384Kdf
2,971,275 UART: [kat] LMS
3,447,762 UART: [kat] --
3,452,185 UART: [cold-reset] ++
3,453,223 UART: [fht] FHT @ 0x50003400
3,465,339 UART: [idev] ++
3,465,910 UART: [idev] CDI.KEYID = 6
3,466,935 UART: [idev] SUBJECT.KEYID = 7
3,468,115 UART: [idev] UDS.KEYID = 0
3,502,358 UART: [idev] Erasing UDS.KEYID = 0
5,988,041 UART: [idev] Sha1 KeyId Algorithm
6,013,178 UART: [idev] --
6,018,048 UART: [ldev] ++
6,018,632 UART: [ldev] CDI.KEYID = 6
6,019,658 UART: [ldev] SUBJECT.KEYID = 5
6,020,775 UART: [ldev] AUTHORITY.KEYID = 7
6,022,017 UART: [ldev] FE.KEYID = 1
6,056,616 UART: [ldev] Erasing FE.KEYID = 1
8,565,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,424 UART: [ldev] --
10,373,614 UART: [fwproc] Wait for Commands...
10,375,618 UART: [fwproc] Recv command 0x46574c44
10,377,620 UART: [fwproc] Recv'd Img size: 118548 bytes
12,708,681 UART: ROM Fatal Error: 0x000B0021
12,711,921 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,034,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,618,046 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
2,028,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,343 UART:
2,178,760 UART: Running Caliptra ROM ...
2,179,928 UART:
2,180,097 UART: [state] CFI Enabled
2,181,052 UART: [state] LifecycleState = Unprovisioned
2,182,702 UART: [state] DebugLocked = No
2,183,812 UART: [state] WD Timer not started. Device not locked for debugging
2,186,281 UART: [kat] SHA2-256
2,186,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,974 UART: [kat] ++
2,190,428 UART: [kat] sha1
2,190,936 UART: [kat] SHA2-256
2,191,672 UART: [kat] SHA2-384
2,192,334 UART: [kat] SHA2-512-ACC
2,193,218 UART: [kat] ECC-384
3,277,892 UART: [kat] HMAC-384Kdf
3,291,261 UART: [kat] LMS
3,767,765 UART: [kat] --
3,771,925 UART: [cold-reset] ++
3,773,910 UART: [fht] FHT @ 0x50003400
3,785,100 UART: [idev] ++
3,785,659 UART: [idev] CDI.KEYID = 6
3,786,590 UART: [idev] SUBJECT.KEYID = 7
3,787,856 UART: [idev] UDS.KEYID = 0
3,801,159 UART: [idev] Erasing UDS.KEYID = 0
6,258,627 UART: [idev] Sha1 KeyId Algorithm
6,282,567 UART: [idev] --
6,287,535 UART: [ldev] ++
6,288,162 UART: [ldev] CDI.KEYID = 6
6,289,081 UART: [ldev] SUBJECT.KEYID = 5
6,290,241 UART: [ldev] AUTHORITY.KEYID = 7
6,291,524 UART: [ldev] FE.KEYID = 1
6,303,301 UART: [ldev] Erasing FE.KEYID = 1
8,780,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,580 UART: [ldev] --
10,576,804 UART: [fwproc] Wait for Commands...
10,579,934 UART: [fwproc] Recv command 0x46574c44
10,581,947 UART: [fwproc] Recv'd Img size: 118548 bytes
12,907,569 UART: ROM Fatal Error: 0x000B0021
12,910,803 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
2,027,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,803,794 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,256 UART: [kat] ++
895,408 UART: [kat] sha1
899,654 UART: [kat] SHA2-256
901,594 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
915,835 UART: [kat] HMAC-384Kdf
920,549 UART: [kat] LMS
1,168,861 UART: [kat] --
1,169,838 UART: [cold-reset] ++
1,170,194 UART: [fht] FHT @ 0x50003400
1,172,984 UART: [idev] ++
1,173,152 UART: [idev] CDI.KEYID = 6
1,173,513 UART: [idev] SUBJECT.KEYID = 7
1,173,938 UART: [idev] UDS.KEYID = 0
1,182,007 UART: [idev] Erasing UDS.KEYID = 0
1,199,169 UART: [idev] Sha1 KeyId Algorithm
1,208,055 UART: [idev] --
1,209,098 UART: [ldev] ++
1,209,266 UART: [ldev] CDI.KEYID = 6
1,209,630 UART: [ldev] SUBJECT.KEYID = 5
1,210,057 UART: [ldev] AUTHORITY.KEYID = 7
1,210,520 UART: [ldev] FE.KEYID = 1
1,215,606 UART: [ldev] Erasing FE.KEYID = 1
1,241,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,614 UART: [ldev] --
1,280,979 UART: [fwproc] Wait for Commands...
1,281,588 UART: [fwproc] Recv command 0x46574c44
1,282,321 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,488 UART: ROM Fatal Error: 0x000B0021
1,562,645 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,714 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,875 UART: [state] LifecycleState = Unprovisioned
86,530 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,381 UART: [kat] SHA2-256
891,931 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,035 UART: [kat] ++
896,187 UART: [kat] sha1
900,521 UART: [kat] SHA2-256
902,461 UART: [kat] SHA2-384
905,460 UART: [kat] SHA2-512-ACC
907,361 UART: [kat] ECC-384
916,954 UART: [kat] HMAC-384Kdf
921,552 UART: [kat] LMS
1,169,864 UART: [kat] --
1,170,727 UART: [cold-reset] ++
1,171,055 UART: [fht] FHT @ 0x50003400
1,173,525 UART: [idev] ++
1,173,693 UART: [idev] CDI.KEYID = 6
1,174,054 UART: [idev] SUBJECT.KEYID = 7
1,174,479 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,199,216 UART: [idev] Sha1 KeyId Algorithm
1,208,036 UART: [idev] --
1,208,995 UART: [ldev] ++
1,209,163 UART: [ldev] CDI.KEYID = 6
1,209,527 UART: [ldev] SUBJECT.KEYID = 5
1,209,954 UART: [ldev] AUTHORITY.KEYID = 7
1,210,417 UART: [ldev] FE.KEYID = 1
1,215,475 UART: [ldev] Erasing FE.KEYID = 1
1,242,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,023 UART: [ldev] --
1,281,462 UART: [fwproc] Wait for Commands...
1,282,115 UART: [fwproc] Recv command 0x46574c44
1,282,848 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,871 UART: ROM Fatal Error: 0x000B0021
1,564,028 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,179 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
890,978 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,082 UART: [kat] ++
895,234 UART: [kat] sha1
899,446 UART: [kat] SHA2-256
901,386 UART: [kat] SHA2-384
904,285 UART: [kat] SHA2-512-ACC
906,186 UART: [kat] ECC-384
915,967 UART: [kat] HMAC-384Kdf
920,523 UART: [kat] LMS
1,168,835 UART: [kat] --
1,169,788 UART: [cold-reset] ++
1,170,160 UART: [fht] FHT @ 0x50003400
1,172,752 UART: [idev] ++
1,172,920 UART: [idev] CDI.KEYID = 6
1,173,281 UART: [idev] SUBJECT.KEYID = 7
1,173,706 UART: [idev] UDS.KEYID = 0
1,181,629 UART: [idev] Erasing UDS.KEYID = 0
1,198,361 UART: [idev] Sha1 KeyId Algorithm
1,207,303 UART: [idev] --
1,208,522 UART: [ldev] ++
1,208,690 UART: [ldev] CDI.KEYID = 6
1,209,054 UART: [ldev] SUBJECT.KEYID = 5
1,209,481 UART: [ldev] AUTHORITY.KEYID = 7
1,209,944 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,796 UART: [ldev] --
1,281,013 UART: [fwproc] Wait for Commands...
1,281,610 UART: [fwproc] Recv command 0x46574c44
1,282,343 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,052 UART: ROM Fatal Error: 0x000B0021
1,562,209 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,302 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,339 UART: [kat] ++
895,491 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
916,104 UART: [kat] HMAC-384Kdf
920,708 UART: [kat] LMS
1,169,020 UART: [kat] --
1,170,107 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,181,636 UART: [idev] Erasing UDS.KEYID = 0
1,198,930 UART: [idev] Sha1 KeyId Algorithm
1,207,826 UART: [idev] --
1,208,997 UART: [ldev] ++
1,209,165 UART: [ldev] CDI.KEYID = 6
1,209,529 UART: [ldev] SUBJECT.KEYID = 5
1,209,956 UART: [ldev] AUTHORITY.KEYID = 7
1,210,419 UART: [ldev] FE.KEYID = 1
1,215,735 UART: [ldev] Erasing FE.KEYID = 1
1,241,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,427 UART: [ldev] --
1,280,746 UART: [fwproc] Wait for Commands...
1,281,557 UART: [fwproc] Recv command 0x46574c44
1,282,290 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,037 UART: ROM Fatal Error: 0x000B0021
1,562,194 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,737 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,080 UART: [kat] ++
895,232 UART: [kat] sha1
899,420 UART: [kat] SHA2-256
901,360 UART: [kat] SHA2-384
904,101 UART: [kat] SHA2-512-ACC
906,002 UART: [kat] ECC-384
915,523 UART: [kat] HMAC-384Kdf
920,173 UART: [kat] LMS
1,168,485 UART: [kat] --
1,168,984 UART: [cold-reset] ++
1,169,314 UART: [fht] FHT @ 0x50003400
1,171,896 UART: [idev] ++
1,172,064 UART: [idev] CDI.KEYID = 6
1,172,425 UART: [idev] SUBJECT.KEYID = 7
1,172,850 UART: [idev] UDS.KEYID = 0
1,180,863 UART: [idev] Erasing UDS.KEYID = 0
1,197,375 UART: [idev] Sha1 KeyId Algorithm
1,206,429 UART: [idev] --
1,207,278 UART: [ldev] ++
1,207,446 UART: [ldev] CDI.KEYID = 6
1,207,810 UART: [ldev] SUBJECT.KEYID = 5
1,208,237 UART: [ldev] AUTHORITY.KEYID = 7
1,208,700 UART: [ldev] FE.KEYID = 1
1,213,816 UART: [ldev] Erasing FE.KEYID = 1
1,240,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,432 UART: [ldev] --
1,279,793 UART: [fwproc] Wait for Commands...
1,280,378 UART: [fwproc] Recv command 0x46574c44
1,281,111 UART: [fwproc] Recv'd Img size: 118548 bytes
1,559,638 UART: ROM Fatal Error: 0x000B0021
1,560,795 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,104 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,609 UART: [kat] ++
895,761 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,652 UART: [kat] SHA2-512-ACC
906,553 UART: [kat] ECC-384
916,294 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,169,837 UART: [cold-reset] ++
1,170,217 UART: [fht] FHT @ 0x50003400
1,172,825 UART: [idev] ++
1,172,993 UART: [idev] CDI.KEYID = 6
1,173,354 UART: [idev] SUBJECT.KEYID = 7
1,173,779 UART: [idev] UDS.KEYID = 0
1,181,790 UART: [idev] Erasing UDS.KEYID = 0
1,198,406 UART: [idev] Sha1 KeyId Algorithm
1,207,226 UART: [idev] --
1,208,145 UART: [ldev] ++
1,208,313 UART: [ldev] CDI.KEYID = 6
1,208,677 UART: [ldev] SUBJECT.KEYID = 5
1,209,104 UART: [ldev] AUTHORITY.KEYID = 7
1,209,567 UART: [ldev] FE.KEYID = 1
1,215,033 UART: [ldev] Erasing FE.KEYID = 1
1,241,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,797 UART: [ldev] --
1,281,004 UART: [fwproc] Wait for Commands...
1,281,583 UART: [fwproc] Recv command 0x46574c44
1,282,316 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,473 UART: ROM Fatal Error: 0x000B0021
1,562,630 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,391 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
2,033,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,183,695 UART:
2,184,085 UART: Running Caliptra ROM ...
2,185,266 UART:
2,185,453 UART: [state] CFI Enabled
2,186,427 UART: [state] LifecycleState = Unprovisioned
2,188,088 UART: [state] DebugLocked = No
2,189,131 UART: [state] WD Timer not started. Device not locked for debugging
2,191,853 UART: [kat] SHA2-256
2,192,547 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,195,578 UART: [kat] ++
2,196,034 UART: [kat] sha1
2,196,554 UART: [kat] SHA2-256
2,197,221 UART: [kat] SHA2-384
2,197,883 UART: [kat] SHA2-512-ACC
2,198,739 UART: [kat] ECC-384
2,928,665 UART: [kat] HMAC-384Kdf
2,950,411 UART: [kat] LMS
3,426,926 UART: [kat] --
3,432,220 UART: [cold-reset] ++
3,434,587 UART: [fht] FHT @ 0x50003400
3,445,786 UART: [idev] ++
3,446,408 UART: [idev] CDI.KEYID = 6
3,447,327 UART: [idev] SUBJECT.KEYID = 7
3,448,602 UART: [idev] UDS.KEYID = 0
3,481,041 UART: [idev] Erasing UDS.KEYID = 0
5,964,638 UART: [idev] Sha1 KeyId Algorithm
5,988,734 UART: [idev] --
5,992,513 UART: [ldev] ++
5,993,080 UART: [ldev] CDI.KEYID = 6
5,994,024 UART: [ldev] SUBJECT.KEYID = 5
5,995,264 UART: [ldev] AUTHORITY.KEYID = 7
5,996,505 UART: [ldev] FE.KEYID = 1
6,035,449 UART: [ldev] Erasing FE.KEYID = 1
8,544,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,933 UART: [ldev] --
10,352,918 UART: [fwproc] Wait for Commands...
10,356,143 UART: [fwproc] Recv command 0x46574c44
10,358,146 UART: [fwproc] Recv'd Img size: 118548 bytes
12,685,474 UART: ROM Fatal Error: 0x000B0022
12,688,714 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
2,026,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,620,365 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
2,027,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,176,789 UART:
2,177,197 UART: Running Caliptra ROM ...
2,178,283 UART:
2,178,434 UART: [state] CFI Enabled
2,179,400 UART: [state] LifecycleState = Unprovisioned
2,181,052 UART: [state] DebugLocked = No
2,182,083 UART: [state] WD Timer not started. Device not locked for debugging
2,184,553 UART: [kat] SHA2-256
2,185,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,223 UART: [kat] ++
2,188,671 UART: [kat] sha1
2,189,177 UART: [kat] SHA2-256
2,189,832 UART: [kat] SHA2-384
2,190,483 UART: [kat] SHA2-512-ACC
2,191,280 UART: [kat] ECC-384
3,284,574 UART: [kat] HMAC-384Kdf
3,297,421 UART: [kat] LMS
3,773,901 UART: [kat] --
3,779,349 UART: [cold-reset] ++
3,780,957 UART: [fht] FHT @ 0x50003400
3,793,232 UART: [idev] ++
3,793,962 UART: [idev] CDI.KEYID = 6
3,794,902 UART: [idev] SUBJECT.KEYID = 7
3,796,015 UART: [idev] UDS.KEYID = 0
3,811,888 UART: [idev] Erasing UDS.KEYID = 0
6,278,983 UART: [idev] Sha1 KeyId Algorithm
6,302,660 UART: [idev] --
6,307,411 UART: [ldev] ++
6,307,980 UART: [ldev] CDI.KEYID = 6
6,308,862 UART: [ldev] SUBJECT.KEYID = 5
6,310,123 UART: [ldev] AUTHORITY.KEYID = 7
6,311,354 UART: [ldev] FE.KEYID = 1
6,322,346 UART: [ldev] Erasing FE.KEYID = 1
8,801,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,522,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,538,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,554,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,569,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,591,994 UART: [ldev] --
10,597,494 UART: [fwproc] Wait for Commands...
10,599,119 UART: [fwproc] Recv command 0x46574c44
10,601,132 UART: [fwproc] Recv'd Img size: 118548 bytes
12,919,771 UART: ROM Fatal Error: 0x000B0022
12,923,056 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
2,028,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,792,305 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,706 UART: [kat] SHA2-256
901,646 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,651 UART: [kat] LMS
1,168,963 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,128 UART: [fht] FHT @ 0x50003400
1,172,732 UART: [idev] ++
1,172,900 UART: [idev] CDI.KEYID = 6
1,173,261 UART: [idev] SUBJECT.KEYID = 7
1,173,686 UART: [idev] UDS.KEYID = 0
1,181,581 UART: [idev] Erasing UDS.KEYID = 0
1,198,507 UART: [idev] Sha1 KeyId Algorithm
1,207,319 UART: [idev] --
1,208,368 UART: [ldev] ++
1,208,536 UART: [ldev] CDI.KEYID = 6
1,208,900 UART: [ldev] SUBJECT.KEYID = 5
1,209,327 UART: [ldev] AUTHORITY.KEYID = 7
1,209,790 UART: [ldev] FE.KEYID = 1
1,214,948 UART: [ldev] Erasing FE.KEYID = 1
1,241,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,182 UART: [ldev] --
1,280,447 UART: [fwproc] Wait for Commands...
1,281,234 UART: [fwproc] Recv command 0x46574c44
1,281,967 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,858 UART: ROM Fatal Error: 0x000B0022
1,562,015 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,415,954 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
891,291 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,999 UART: [kat] SHA2-256
901,939 UART: [kat] SHA2-384
904,782 UART: [kat] SHA2-512-ACC
906,683 UART: [kat] ECC-384
916,182 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,169,925 UART: [cold-reset] ++
1,170,315 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,182,710 UART: [idev] Erasing UDS.KEYID = 0
1,200,492 UART: [idev] Sha1 KeyId Algorithm
1,209,594 UART: [idev] --
1,210,757 UART: [ldev] ++
1,210,925 UART: [ldev] CDI.KEYID = 6
1,211,289 UART: [ldev] SUBJECT.KEYID = 5
1,211,716 UART: [ldev] AUTHORITY.KEYID = 7
1,212,179 UART: [ldev] FE.KEYID = 1
1,217,381 UART: [ldev] Erasing FE.KEYID = 1
1,243,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,507 UART: [ldev] --
1,282,774 UART: [fwproc] Wait for Commands...
1,283,363 UART: [fwproc] Recv command 0x46574c44
1,284,096 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,611 UART: ROM Fatal Error: 0x000B0022
1,563,768 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,597 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,078 UART: [kat] ++
895,230 UART: [kat] sha1
899,614 UART: [kat] SHA2-256
901,554 UART: [kat] SHA2-384
904,163 UART: [kat] SHA2-512-ACC
906,064 UART: [kat] ECC-384
915,907 UART: [kat] HMAC-384Kdf
920,561 UART: [kat] LMS
1,168,873 UART: [kat] --
1,169,890 UART: [cold-reset] ++
1,170,306 UART: [fht] FHT @ 0x50003400
1,172,764 UART: [idev] ++
1,172,932 UART: [idev] CDI.KEYID = 6
1,173,293 UART: [idev] SUBJECT.KEYID = 7
1,173,718 UART: [idev] UDS.KEYID = 0
1,181,551 UART: [idev] Erasing UDS.KEYID = 0
1,198,347 UART: [idev] Sha1 KeyId Algorithm
1,207,057 UART: [idev] --
1,208,178 UART: [ldev] ++
1,208,346 UART: [ldev] CDI.KEYID = 6
1,208,710 UART: [ldev] SUBJECT.KEYID = 5
1,209,137 UART: [ldev] AUTHORITY.KEYID = 7
1,209,600 UART: [ldev] FE.KEYID = 1
1,214,726 UART: [ldev] Erasing FE.KEYID = 1
1,240,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,674 UART: [ldev] --
1,279,935 UART: [fwproc] Wait for Commands...
1,280,504 UART: [fwproc] Recv command 0x46574c44
1,281,237 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,240 UART: ROM Fatal Error: 0x000B0022
1,562,397 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,414,746 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,582 UART: [kat] SHA2-512-ACC
906,483 UART: [kat] ECC-384
916,100 UART: [kat] HMAC-384Kdf
920,870 UART: [kat] LMS
1,169,182 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,461 UART: [fht] FHT @ 0x50003400
1,173,057 UART: [idev] ++
1,173,225 UART: [idev] CDI.KEYID = 6
1,173,586 UART: [idev] SUBJECT.KEYID = 7
1,174,011 UART: [idev] UDS.KEYID = 0
1,182,258 UART: [idev] Erasing UDS.KEYID = 0
1,199,728 UART: [idev] Sha1 KeyId Algorithm
1,208,640 UART: [idev] --
1,209,607 UART: [ldev] ++
1,209,775 UART: [ldev] CDI.KEYID = 6
1,210,139 UART: [ldev] SUBJECT.KEYID = 5
1,210,566 UART: [ldev] AUTHORITY.KEYID = 7
1,211,029 UART: [ldev] FE.KEYID = 1
1,216,117 UART: [ldev] Erasing FE.KEYID = 1
1,242,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,593 UART: [ldev] --
1,281,048 UART: [fwproc] Wait for Commands...
1,281,699 UART: [fwproc] Recv command 0x46574c44
1,282,432 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,781 UART: ROM Fatal Error: 0x000B0022
1,561,938 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,481 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
890,988 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,092 UART: [kat] ++
895,244 UART: [kat] sha1
899,578 UART: [kat] SHA2-256
901,518 UART: [kat] SHA2-384
904,307 UART: [kat] SHA2-512-ACC
906,208 UART: [kat] ECC-384
916,485 UART: [kat] HMAC-384Kdf
921,145 UART: [kat] LMS
1,169,457 UART: [kat] --
1,170,310 UART: [cold-reset] ++
1,170,658 UART: [fht] FHT @ 0x50003400
1,173,354 UART: [idev] ++
1,173,522 UART: [idev] CDI.KEYID = 6
1,173,883 UART: [idev] SUBJECT.KEYID = 7
1,174,308 UART: [idev] UDS.KEYID = 0
1,182,187 UART: [idev] Erasing UDS.KEYID = 0
1,199,471 UART: [idev] Sha1 KeyId Algorithm
1,208,443 UART: [idev] --
1,209,552 UART: [ldev] ++
1,209,720 UART: [ldev] CDI.KEYID = 6
1,210,084 UART: [ldev] SUBJECT.KEYID = 5
1,210,511 UART: [ldev] AUTHORITY.KEYID = 7
1,210,974 UART: [ldev] FE.KEYID = 1
1,215,892 UART: [ldev] Erasing FE.KEYID = 1
1,242,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,438 UART: [ldev] --
1,281,685 UART: [fwproc] Wait for Commands...
1,282,504 UART: [fwproc] Recv command 0x46574c44
1,283,237 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,236 UART: ROM Fatal Error: 0x000B0022
1,563,393 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,374 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
891,513 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
900,137 UART: [kat] SHA2-256
902,077 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,696 UART: [kat] HMAC-384Kdf
921,206 UART: [kat] LMS
1,169,518 UART: [kat] --
1,170,457 UART: [cold-reset] ++
1,170,979 UART: [fht] FHT @ 0x50003400
1,173,759 UART: [idev] ++
1,173,927 UART: [idev] CDI.KEYID = 6
1,174,288 UART: [idev] SUBJECT.KEYID = 7
1,174,713 UART: [idev] UDS.KEYID = 0
1,182,350 UART: [idev] Erasing UDS.KEYID = 0
1,199,688 UART: [idev] Sha1 KeyId Algorithm
1,208,810 UART: [idev] --
1,209,997 UART: [ldev] ++
1,210,165 UART: [ldev] CDI.KEYID = 6
1,210,529 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,813 UART: [ldev] Erasing FE.KEYID = 1
1,242,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,121 UART: [ldev] --
1,282,496 UART: [fwproc] Wait for Commands...
1,283,239 UART: [fwproc] Recv command 0x46574c44
1,283,972 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,729 UART: ROM Fatal Error: 0x000B0022
1,564,886 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,421,257 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
2,034,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,184,103 UART:
2,184,494 UART: Running Caliptra ROM ...
2,185,669 UART:
2,185,853 UART: [state] CFI Enabled
2,186,826 UART: [state] LifecycleState = Unprovisioned
2,188,491 UART: [state] DebugLocked = No
2,189,607 UART: [state] WD Timer not started. Device not locked for debugging
2,192,090 UART: [kat] SHA2-256
2,192,769 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,195,785 UART: [kat] ++
2,196,244 UART: [kat] sha1
2,196,844 UART: [kat] SHA2-256
2,197,516 UART: [kat] SHA2-384
2,198,184 UART: [kat] SHA2-512-ACC
2,198,992 UART: [kat] ECC-384
2,946,453 UART: [kat] HMAC-384Kdf
2,973,136 UART: [kat] LMS
3,449,647 UART: [kat] --
3,454,830 UART: [cold-reset] ++
3,456,122 UART: [fht] FHT @ 0x50003400
3,467,492 UART: [idev] ++
3,468,063 UART: [idev] CDI.KEYID = 6
3,469,087 UART: [idev] SUBJECT.KEYID = 7
3,470,260 UART: [idev] UDS.KEYID = 0
3,502,362 UART: [idev] Erasing UDS.KEYID = 0
5,987,999 UART: [idev] Sha1 KeyId Algorithm
6,011,274 UART: [idev] --
6,015,768 UART: [ldev] ++
6,016,350 UART: [ldev] CDI.KEYID = 6
6,017,421 UART: [ldev] SUBJECT.KEYID = 5
6,018,540 UART: [ldev] AUTHORITY.KEYID = 7
6,019,724 UART: [ldev] FE.KEYID = 1
6,058,431 UART: [ldev] Erasing FE.KEYID = 1
8,562,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,715 UART: [ldev] --
10,375,866 UART: [fwproc] Wait for Commands...
10,378,410 UART: [fwproc] Recv command 0x46574c44
10,380,410 UART: [fwproc] Recv'd Img size: 118548 bytes
12,705,269 UART: ROM Fatal Error: 0x000B0021
12,708,519 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
2,031,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,607,211 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,038,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,188,328 UART:
2,188,706 UART: Running Caliptra ROM ...
2,189,867 UART:
2,190,060 UART: [state] CFI Enabled
2,191,022 UART: [state] LifecycleState = Unprovisioned
2,192,677 UART: [state] DebugLocked = No
2,193,786 UART: [state] WD Timer not started. Device not locked for debugging
2,196,259 UART: [kat] SHA2-256
2,196,928 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,199,994 UART: [kat] ++
2,200,449 UART: [kat] sha1
2,200,956 UART: [kat] SHA2-256
2,201,611 UART: [kat] SHA2-384
2,202,261 UART: [kat] SHA2-512-ACC
2,203,054 UART: [kat] ECC-384
3,277,967 UART: [kat] HMAC-384Kdf
3,290,639 UART: [kat] LMS
3,767,153 UART: [kat] --
3,771,255 UART: [cold-reset] ++
3,773,095 UART: [fht] FHT @ 0x50003400
3,784,457 UART: [idev] ++
3,785,021 UART: [idev] CDI.KEYID = 6
3,786,000 UART: [idev] SUBJECT.KEYID = 7
3,787,223 UART: [idev] UDS.KEYID = 0
3,805,573 UART: [idev] Erasing UDS.KEYID = 0
6,263,987 UART: [idev] Sha1 KeyId Algorithm
6,287,372 UART: [idev] --
6,292,770 UART: [ldev] ++
6,293,342 UART: [ldev] CDI.KEYID = 6
6,294,247 UART: [ldev] SUBJECT.KEYID = 5
6,295,457 UART: [ldev] AUTHORITY.KEYID = 7
6,296,687 UART: [ldev] FE.KEYID = 1
6,306,044 UART: [ldev] Erasing FE.KEYID = 1
8,787,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,812 UART: [ldev] --
10,578,077 UART: [fwproc] Wait for Commands...
10,581,258 UART: [fwproc] Recv command 0x46574c44
10,583,246 UART: [fwproc] Recv'd Img size: 118548 bytes
12,904,000 UART: ROM Fatal Error: 0x000B0021
12,907,209 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
2,034,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,794,824 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,717 UART: [state] WD Timer not started. Device not locked for debugging
87,966 UART: [kat] SHA2-256
891,516 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
899,850 UART: [kat] SHA2-256
901,790 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
916,379 UART: [kat] HMAC-384Kdf
921,033 UART: [kat] LMS
1,169,345 UART: [kat] --
1,170,342 UART: [cold-reset] ++
1,170,898 UART: [fht] FHT @ 0x50003400
1,173,654 UART: [idev] ++
1,173,822 UART: [idev] CDI.KEYID = 6
1,174,183 UART: [idev] SUBJECT.KEYID = 7
1,174,608 UART: [idev] UDS.KEYID = 0
1,182,529 UART: [idev] Erasing UDS.KEYID = 0
1,198,999 UART: [idev] Sha1 KeyId Algorithm
1,207,847 UART: [idev] --
1,208,928 UART: [ldev] ++
1,209,096 UART: [ldev] CDI.KEYID = 6
1,209,460 UART: [ldev] SUBJECT.KEYID = 5
1,209,887 UART: [ldev] AUTHORITY.KEYID = 7
1,210,350 UART: [ldev] FE.KEYID = 1
1,215,550 UART: [ldev] Erasing FE.KEYID = 1
1,241,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,312 UART: [ldev] --
1,280,525 UART: [fwproc] Wait for Commands...
1,281,174 UART: [fwproc] Recv command 0x46574c44
1,281,907 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,540 UART: ROM Fatal Error: 0x000B0021
1,562,697 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,862 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,386 UART: [kat] SHA2-512-ACC
906,287 UART: [kat] ECC-384
916,384 UART: [kat] HMAC-384Kdf
920,878 UART: [kat] LMS
1,169,190 UART: [kat] --
1,169,727 UART: [cold-reset] ++
1,170,243 UART: [fht] FHT @ 0x50003400
1,172,859 UART: [idev] ++
1,173,027 UART: [idev] CDI.KEYID = 6
1,173,388 UART: [idev] SUBJECT.KEYID = 7
1,173,813 UART: [idev] UDS.KEYID = 0
1,182,010 UART: [idev] Erasing UDS.KEYID = 0
1,199,488 UART: [idev] Sha1 KeyId Algorithm
1,208,430 UART: [idev] --
1,209,441 UART: [ldev] ++
1,209,609 UART: [ldev] CDI.KEYID = 6
1,209,973 UART: [ldev] SUBJECT.KEYID = 5
1,210,400 UART: [ldev] AUTHORITY.KEYID = 7
1,210,863 UART: [ldev] FE.KEYID = 1
1,216,363 UART: [ldev] Erasing FE.KEYID = 1
1,242,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,855 UART: [ldev] --
1,282,080 UART: [fwproc] Wait for Commands...
1,282,667 UART: [fwproc] Recv command 0x46574c44
1,283,400 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,045 UART: ROM Fatal Error: 0x000B0021
1,564,202 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,071 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
891,402 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,506 UART: [kat] ++
895,658 UART: [kat] sha1
899,944 UART: [kat] SHA2-256
901,884 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,227 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,169,666 UART: [cold-reset] ++
1,170,102 UART: [fht] FHT @ 0x50003400
1,172,738 UART: [idev] ++
1,172,906 UART: [idev] CDI.KEYID = 6
1,173,267 UART: [idev] SUBJECT.KEYID = 7
1,173,692 UART: [idev] UDS.KEYID = 0
1,181,517 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,573 UART: [idev] --
1,208,564 UART: [ldev] ++
1,208,732 UART: [ldev] CDI.KEYID = 6
1,209,096 UART: [ldev] SUBJECT.KEYID = 5
1,209,523 UART: [ldev] AUTHORITY.KEYID = 7
1,209,986 UART: [ldev] FE.KEYID = 1
1,215,062 UART: [ldev] Erasing FE.KEYID = 1
1,241,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,000 UART: [ldev] --
1,280,427 UART: [fwproc] Wait for Commands...
1,281,048 UART: [fwproc] Recv command 0x46574c44
1,281,781 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,058 UART: ROM Fatal Error: 0x000B0021
1,562,215 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,608 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,611 UART: [kat] ++
895,763 UART: [kat] sha1
900,051 UART: [kat] SHA2-256
901,991 UART: [kat] SHA2-384
904,738 UART: [kat] SHA2-512-ACC
906,639 UART: [kat] ECC-384
916,642 UART: [kat] HMAC-384Kdf
921,108 UART: [kat] LMS
1,169,420 UART: [kat] --
1,170,273 UART: [cold-reset] ++
1,170,765 UART: [fht] FHT @ 0x50003400
1,173,331 UART: [idev] ++
1,173,499 UART: [idev] CDI.KEYID = 6
1,173,860 UART: [idev] SUBJECT.KEYID = 7
1,174,285 UART: [idev] UDS.KEYID = 0
1,182,556 UART: [idev] Erasing UDS.KEYID = 0
1,199,880 UART: [idev] Sha1 KeyId Algorithm
1,208,714 UART: [idev] --
1,209,599 UART: [ldev] ++
1,209,767 UART: [ldev] CDI.KEYID = 6
1,210,131 UART: [ldev] SUBJECT.KEYID = 5
1,210,558 UART: [ldev] AUTHORITY.KEYID = 7
1,211,021 UART: [ldev] FE.KEYID = 1
1,216,095 UART: [ldev] Erasing FE.KEYID = 1
1,243,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,707 UART: [ldev] --
1,282,110 UART: [fwproc] Wait for Commands...
1,282,685 UART: [fwproc] Recv command 0x46574c44
1,283,418 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,437 UART: ROM Fatal Error: 0x000B0021
1,563,594 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,673 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
890,982 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,086 UART: [kat] ++
895,238 UART: [kat] sha1
899,482 UART: [kat] SHA2-256
901,422 UART: [kat] SHA2-384
904,077 UART: [kat] SHA2-512-ACC
905,978 UART: [kat] ECC-384
915,561 UART: [kat] HMAC-384Kdf
920,307 UART: [kat] LMS
1,168,619 UART: [kat] --
1,169,526 UART: [cold-reset] ++
1,169,970 UART: [fht] FHT @ 0x50003400
1,172,758 UART: [idev] ++
1,172,926 UART: [idev] CDI.KEYID = 6
1,173,287 UART: [idev] SUBJECT.KEYID = 7
1,173,712 UART: [idev] UDS.KEYID = 0
1,181,667 UART: [idev] Erasing UDS.KEYID = 0
1,199,303 UART: [idev] Sha1 KeyId Algorithm
1,208,019 UART: [idev] --
1,209,024 UART: [ldev] ++
1,209,192 UART: [ldev] CDI.KEYID = 6
1,209,556 UART: [ldev] SUBJECT.KEYID = 5
1,209,983 UART: [ldev] AUTHORITY.KEYID = 7
1,210,446 UART: [ldev] FE.KEYID = 1
1,215,726 UART: [ldev] Erasing FE.KEYID = 1
1,241,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,550 UART: [ldev] --
1,280,953 UART: [fwproc] Wait for Commands...
1,281,704 UART: [fwproc] Recv command 0x46574c44
1,282,437 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,610 UART: ROM Fatal Error: 0x000B0021
1,562,767 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,080 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,599 UART: [kat] ++
895,751 UART: [kat] sha1
899,947 UART: [kat] SHA2-256
901,887 UART: [kat] SHA2-384
904,624 UART: [kat] SHA2-512-ACC
906,525 UART: [kat] ECC-384
916,014 UART: [kat] HMAC-384Kdf
920,582 UART: [kat] LMS
1,168,894 UART: [kat] --
1,169,795 UART: [cold-reset] ++
1,170,233 UART: [fht] FHT @ 0x50003400
1,172,905 UART: [idev] ++
1,173,073 UART: [idev] CDI.KEYID = 6
1,173,434 UART: [idev] SUBJECT.KEYID = 7
1,173,859 UART: [idev] UDS.KEYID = 0
1,181,558 UART: [idev] Erasing UDS.KEYID = 0
1,198,948 UART: [idev] Sha1 KeyId Algorithm
1,207,804 UART: [idev] --
1,208,973 UART: [ldev] ++
1,209,141 UART: [ldev] CDI.KEYID = 6
1,209,505 UART: [ldev] SUBJECT.KEYID = 5
1,209,932 UART: [ldev] AUTHORITY.KEYID = 7
1,210,395 UART: [ldev] FE.KEYID = 1
1,215,587 UART: [ldev] Erasing FE.KEYID = 1
1,242,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,875 UART: [ldev] --
1,282,118 UART: [fwproc] Wait for Commands...
1,282,819 UART: [fwproc] Recv command 0x46574c44
1,283,552 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,129 UART: ROM Fatal Error: 0x000B0021
1,564,286 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,477 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,027,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,086 UART:
2,177,477 UART: Running Caliptra ROM ...
2,178,674 UART:
2,178,858 UART: [state] CFI Enabled
2,179,834 UART: [state] LifecycleState = Unprovisioned
2,181,492 UART: [state] DebugLocked = No
2,182,608 UART: [state] WD Timer not started. Device not locked for debugging
2,185,087 UART: [kat] SHA2-256
2,185,768 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,780 UART: [kat] ++
2,189,239 UART: [kat] sha1
2,189,763 UART: [kat] SHA2-256
2,190,509 UART: [kat] SHA2-384
2,191,183 UART: [kat] SHA2-512-ACC
2,192,035 UART: [kat] ECC-384
2,951,422 UART: [kat] HMAC-384Kdf
2,972,835 UART: [kat] LMS
3,449,356 UART: [kat] --
3,453,859 UART: [cold-reset] ++
3,454,853 UART: [fht] FHT @ 0x50003400
3,467,507 UART: [idev] ++
3,468,087 UART: [idev] CDI.KEYID = 6
3,469,111 UART: [idev] SUBJECT.KEYID = 7
3,470,274 UART: [idev] UDS.KEYID = 0
3,504,564 UART: [idev] Erasing UDS.KEYID = 0
5,989,872 UART: [idev] Sha1 KeyId Algorithm
6,013,153 UART: [idev] --
6,018,397 UART: [ldev] ++
6,018,971 UART: [ldev] CDI.KEYID = 6
6,019,889 UART: [ldev] SUBJECT.KEYID = 5
6,021,109 UART: [ldev] AUTHORITY.KEYID = 7
6,022,347 UART: [ldev] FE.KEYID = 1
6,059,368 UART: [ldev] Erasing FE.KEYID = 1
8,565,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,895 UART: [ldev] --
10,374,625 UART: [fwproc] Wait for Commands...
10,376,294 UART: [fwproc] Recv command 0x46574c44
10,378,337 UART: [fwproc] Recv'd Img size: 118548 bytes
12,444,587 UART: ROM Fatal Error: 0x000B0034
12,447,814 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
2,038,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,187,880 UART:
2,188,257 UART: Running Caliptra ROM ...
2,189,340 UART:
2,189,504 UART: [state] CFI Enabled
2,190,509 UART: [state] LifecycleState = Unprovisioned
2,192,074 UART: [state] DebugLocked = No
2,193,106 UART: [state] WD Timer not started. Device not locked for debugging
2,195,572 UART: [kat] SHA2-256
2,196,244 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,199,258 UART: [kat] ++
2,199,719 UART: [kat] sha1
2,200,240 UART: [kat] SHA2-256
2,200,906 UART: [kat] SHA2-384
2,201,593 UART: [kat] SHA2-512-ACC
2,202,489 UART: [kat] ECC-384
2,945,212 UART: [kat] HMAC-384Kdf
2,970,530 UART: [kat] LMS
3,447,053 UART: [kat] --
3,449,594 UART: [cold-reset] ++
3,450,885 UART: [fht] FHT @ 0x50003400
3,461,634 UART: [idev] ++
3,462,241 UART: [idev] CDI.KEYID = 6
3,463,132 UART: [idev] SUBJECT.KEYID = 7
3,464,407 UART: [idev] UDS.KEYID = 0
3,499,537 UART: [idev] Erasing UDS.KEYID = 0
5,985,075 UART: [idev] Sha1 KeyId Algorithm
6,010,084 UART: [idev] --
6,015,599 UART: [ldev] ++
6,016,181 UART: [ldev] CDI.KEYID = 6
6,017,141 UART: [ldev] SUBJECT.KEYID = 5
6,018,313 UART: [ldev] AUTHORITY.KEYID = 7
6,019,704 UART: [ldev] FE.KEYID = 1
6,055,481 UART: [ldev] Erasing FE.KEYID = 1
8,565,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,746 UART: [ldev] --
10,373,855 UART: [fwproc] Wait for Commands...
10,376,878 UART: [fwproc] Recv command 0x46574c44
10,378,871 UART: [fwproc] Recv'd Img size: 118548 bytes
12,444,455 UART: ROM Fatal Error: 0x000B0034
12,447,735 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
2,028,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,295,751 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,027,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,319,337 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,028,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,938 UART:
2,178,330 UART: Running Caliptra ROM ...
2,179,526 UART:
2,179,698 UART: [state] CFI Enabled
2,180,659 UART: [state] LifecycleState = Unprovisioned
2,182,310 UART: [state] DebugLocked = No
2,183,597 UART: [state] WD Timer not started. Device not locked for debugging
2,186,095 UART: [kat] SHA2-256
2,186,767 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,784 UART: [kat] ++
2,190,234 UART: [kat] sha1
2,190,741 UART: [kat] SHA2-256
2,191,482 UART: [kat] SHA2-384
2,192,146 UART: [kat] SHA2-512-ACC
2,193,026 UART: [kat] ECC-384
3,285,194 UART: [kat] HMAC-384Kdf
3,297,518 UART: [kat] LMS
3,774,003 UART: [kat] --
3,777,850 UART: [cold-reset] ++
3,780,122 UART: [fht] FHT @ 0x50003400
3,791,719 UART: [idev] ++
3,792,339 UART: [idev] CDI.KEYID = 6
3,793,231 UART: [idev] SUBJECT.KEYID = 7
3,794,410 UART: [idev] UDS.KEYID = 0
3,812,244 UART: [idev] Erasing UDS.KEYID = 0
6,275,825 UART: [idev] Sha1 KeyId Algorithm
6,299,172 UART: [idev] --
6,305,004 UART: [ldev] ++
6,305,638 UART: [ldev] CDI.KEYID = 6
6,306,515 UART: [ldev] SUBJECT.KEYID = 5
6,307,675 UART: [ldev] AUTHORITY.KEYID = 7
6,309,013 UART: [ldev] FE.KEYID = 1
6,319,067 UART: [ldev] Erasing FE.KEYID = 1
8,803,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,522,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,538,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,554,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,570,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,590,966 UART: [ldev] --
10,596,676 UART: [fwproc] Wait for Commands...
10,598,286 UART: [fwproc] Recv command 0x46574c44
10,600,276 UART: [fwproc] Recv'd Img size: 118548 bytes
12,672,983 UART: ROM Fatal Error: 0x000B0034
12,676,210 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,027,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,176,283 UART:
2,176,682 UART: Running Caliptra ROM ...
2,177,767 UART:
2,177,915 UART: [state] CFI Enabled
2,178,888 UART: [state] LifecycleState = Unprovisioned
2,180,533 UART: [state] DebugLocked = No
2,181,556 UART: [state] WD Timer not started. Device not locked for debugging
2,184,015 UART: [kat] SHA2-256
2,184,686 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,187,700 UART: [kat] ++
2,188,150 UART: [kat] sha1
2,188,659 UART: [kat] SHA2-256
2,189,313 UART: [kat] SHA2-384
2,189,988 UART: [kat] SHA2-512-ACC
2,190,787 UART: [kat] ECC-384
3,277,996 UART: [kat] HMAC-384Kdf
3,291,149 UART: [kat] LMS
3,767,652 UART: [kat] --
3,773,022 UART: [cold-reset] ++
3,773,939 UART: [fht] FHT @ 0x50003400
3,784,024 UART: [idev] ++
3,784,593 UART: [idev] CDI.KEYID = 6
3,785,608 UART: [idev] SUBJECT.KEYID = 7
3,786,769 UART: [idev] UDS.KEYID = 0
3,801,398 UART: [idev] Erasing UDS.KEYID = 0
6,263,627 UART: [idev] Sha1 KeyId Algorithm
6,286,267 UART: [idev] --
6,291,614 UART: [ldev] ++
6,292,236 UART: [ldev] CDI.KEYID = 6
6,293,165 UART: [ldev] SUBJECT.KEYID = 5
6,294,326 UART: [ldev] AUTHORITY.KEYID = 7
6,295,610 UART: [ldev] FE.KEYID = 1
6,306,415 UART: [ldev] Erasing FE.KEYID = 1
8,783,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,991 UART: [ldev] --
10,583,426 UART: [fwproc] Wait for Commands...
10,586,005 UART: [fwproc] Recv command 0x46574c44
10,587,998 UART: [fwproc] Recv'd Img size: 118548 bytes
12,660,398 UART: ROM Fatal Error: 0x000B0034
12,663,627 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
2,029,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,527,903 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
2,027,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,540,744 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,760 UART: [state] LifecycleState = Unprovisioned
85,415 UART: [state] DebugLocked = No
85,977 UART: [state] WD Timer not started. Device not locked for debugging
87,178 UART: [kat] SHA2-256
890,728 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,832 UART: [kat] ++
894,984 UART: [kat] sha1
899,208 UART: [kat] SHA2-256
901,148 UART: [kat] SHA2-384
904,027 UART: [kat] SHA2-512-ACC
905,928 UART: [kat] ECC-384
915,719 UART: [kat] HMAC-384Kdf
920,339 UART: [kat] LMS
1,168,651 UART: [kat] --
1,169,580 UART: [cold-reset] ++
1,169,916 UART: [fht] FHT @ 0x50003400
1,172,500 UART: [idev] ++
1,172,668 UART: [idev] CDI.KEYID = 6
1,173,029 UART: [idev] SUBJECT.KEYID = 7
1,173,454 UART: [idev] UDS.KEYID = 0
1,181,395 UART: [idev] Erasing UDS.KEYID = 0
1,198,853 UART: [idev] Sha1 KeyId Algorithm
1,207,617 UART: [idev] --
1,208,634 UART: [ldev] ++
1,208,802 UART: [ldev] CDI.KEYID = 6
1,209,166 UART: [ldev] SUBJECT.KEYID = 5
1,209,593 UART: [ldev] AUTHORITY.KEYID = 7
1,210,056 UART: [ldev] FE.KEYID = 1
1,215,434 UART: [ldev] Erasing FE.KEYID = 1
1,241,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,004 UART: [ldev] --
1,281,287 UART: [fwproc] Wait for Commands...
1,282,040 UART: [fwproc] Recv command 0x46574c44
1,282,773 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,372 UART: ROM Fatal Error: 0x000B0034
1,331,529 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
891,380 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,873 UART: [kat] HMAC-384Kdf
921,493 UART: [kat] LMS
1,169,805 UART: [kat] --
1,170,568 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,554 UART: [idev] ++
1,173,722 UART: [idev] CDI.KEYID = 6
1,174,083 UART: [idev] SUBJECT.KEYID = 7
1,174,508 UART: [idev] UDS.KEYID = 0
1,182,609 UART: [idev] Erasing UDS.KEYID = 0
1,199,445 UART: [idev] Sha1 KeyId Algorithm
1,208,299 UART: [idev] --
1,209,484 UART: [ldev] ++
1,209,652 UART: [ldev] CDI.KEYID = 6
1,210,016 UART: [ldev] SUBJECT.KEYID = 5
1,210,443 UART: [ldev] AUTHORITY.KEYID = 7
1,210,906 UART: [ldev] FE.KEYID = 1
1,216,162 UART: [ldev] Erasing FE.KEYID = 1
1,243,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,456 UART: [ldev] --
1,281,861 UART: [fwproc] Wait for Commands...
1,282,656 UART: [fwproc] Recv command 0x46574c44
1,283,389 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,390 UART: ROM Fatal Error: 0x000B0034
1,331,547 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,222 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,918 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,869 UART: [state] LifecycleState = Unprovisioned
86,524 UART: [state] DebugLocked = No
87,230 UART: [state] WD Timer not started. Device not locked for debugging
88,561 UART: [kat] SHA2-256
892,111 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,215 UART: [kat] ++
896,367 UART: [kat] sha1
900,619 UART: [kat] SHA2-256
902,559 UART: [kat] SHA2-384
905,290 UART: [kat] SHA2-512-ACC
907,191 UART: [kat] ECC-384
916,976 UART: [kat] HMAC-384Kdf
921,700 UART: [kat] LMS
1,170,012 UART: [kat] --
1,170,791 UART: [cold-reset] ++
1,171,213 UART: [fht] FHT @ 0x50003400
1,173,901 UART: [idev] ++
1,174,069 UART: [idev] CDI.KEYID = 6
1,174,430 UART: [idev] SUBJECT.KEYID = 7
1,174,855 UART: [idev] UDS.KEYID = 0
1,182,980 UART: [idev] Erasing UDS.KEYID = 0
1,199,926 UART: [idev] Sha1 KeyId Algorithm
1,208,630 UART: [idev] --
1,209,707 UART: [ldev] ++
1,209,875 UART: [ldev] CDI.KEYID = 6
1,210,239 UART: [ldev] SUBJECT.KEYID = 5
1,210,666 UART: [ldev] AUTHORITY.KEYID = 7
1,211,129 UART: [ldev] FE.KEYID = 1
1,216,117 UART: [ldev] Erasing FE.KEYID = 1
1,242,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,503 UART: [ldev] --
1,281,898 UART: [fwproc] Wait for Commands...
1,282,671 UART: [fwproc] Recv command 0x46574c44
1,283,404 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,199 UART: ROM Fatal Error: 0x000B0034
1,332,356 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,501 UART: [kat] ++
895,653 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
916,586 UART: [kat] HMAC-384Kdf
921,190 UART: [kat] LMS
1,169,502 UART: [kat] --
1,170,595 UART: [cold-reset] ++
1,170,941 UART: [fht] FHT @ 0x50003400
1,173,585 UART: [idev] ++
1,173,753 UART: [idev] CDI.KEYID = 6
1,174,114 UART: [idev] SUBJECT.KEYID = 7
1,174,539 UART: [idev] UDS.KEYID = 0
1,182,180 UART: [idev] Erasing UDS.KEYID = 0
1,199,058 UART: [idev] Sha1 KeyId Algorithm
1,207,930 UART: [idev] --
1,208,987 UART: [ldev] ++
1,209,155 UART: [ldev] CDI.KEYID = 6
1,209,519 UART: [ldev] SUBJECT.KEYID = 5
1,209,946 UART: [ldev] AUTHORITY.KEYID = 7
1,210,409 UART: [ldev] FE.KEYID = 1
1,215,555 UART: [ldev] Erasing FE.KEYID = 1
1,241,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,299 UART: [ldev] --
1,280,726 UART: [fwproc] Wait for Commands...
1,281,527 UART: [fwproc] Recv command 0x46574c44
1,282,260 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,043 UART: ROM Fatal Error: 0x000B0034
1,331,200 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,519 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,943 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
891,362 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,513 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,170,182 UART: [cold-reset] ++
1,170,570 UART: [fht] FHT @ 0x50003400
1,173,132 UART: [idev] ++
1,173,300 UART: [idev] CDI.KEYID = 6
1,173,661 UART: [idev] SUBJECT.KEYID = 7
1,174,086 UART: [idev] UDS.KEYID = 0
1,182,547 UART: [idev] Erasing UDS.KEYID = 0
1,199,899 UART: [idev] Sha1 KeyId Algorithm
1,208,725 UART: [idev] --
1,209,738 UART: [ldev] ++
1,209,906 UART: [ldev] CDI.KEYID = 6
1,210,270 UART: [ldev] SUBJECT.KEYID = 5
1,210,697 UART: [ldev] AUTHORITY.KEYID = 7
1,211,160 UART: [ldev] FE.KEYID = 1
1,216,364 UART: [ldev] Erasing FE.KEYID = 1
1,243,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,482 UART: [ldev] --
1,282,931 UART: [fwproc] Wait for Commands...
1,283,636 UART: [fwproc] Recv command 0x46574c44
1,284,369 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,118 UART: ROM Fatal Error: 0x000B0034
1,332,275 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,430 UART: [kat] ++
895,582 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
915,897 UART: [kat] HMAC-384Kdf
920,549 UART: [kat] LMS
1,168,861 UART: [kat] --
1,169,796 UART: [cold-reset] ++
1,170,358 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,182,257 UART: [idev] Erasing UDS.KEYID = 0
1,198,919 UART: [idev] Sha1 KeyId Algorithm
1,207,955 UART: [idev] --
1,208,940 UART: [ldev] ++
1,209,108 UART: [ldev] CDI.KEYID = 6
1,209,472 UART: [ldev] SUBJECT.KEYID = 5
1,209,899 UART: [ldev] AUTHORITY.KEYID = 7
1,210,362 UART: [ldev] FE.KEYID = 1
1,215,560 UART: [ldev] Erasing FE.KEYID = 1
1,241,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,932 UART: [ldev] --
1,280,321 UART: [fwproc] Wait for Commands...
1,281,048 UART: [fwproc] Recv command 0x46574c44
1,281,781 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,970 UART: ROM Fatal Error: 0x000B0034
1,330,127 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,082 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,572 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,475 UART: [kat] ++
895,627 UART: [kat] sha1
899,789 UART: [kat] SHA2-256
901,729 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
916,268 UART: [kat] HMAC-384Kdf
920,718 UART: [kat] LMS
1,169,030 UART: [kat] --
1,169,895 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,172,929 UART: [idev] ++
1,173,097 UART: [idev] CDI.KEYID = 6
1,173,458 UART: [idev] SUBJECT.KEYID = 7
1,173,883 UART: [idev] UDS.KEYID = 0
1,182,108 UART: [idev] Erasing UDS.KEYID = 0
1,199,722 UART: [idev] Sha1 KeyId Algorithm
1,208,712 UART: [idev] --
1,209,697 UART: [ldev] ++
1,209,865 UART: [ldev] CDI.KEYID = 6
1,210,229 UART: [ldev] SUBJECT.KEYID = 5
1,210,656 UART: [ldev] AUTHORITY.KEYID = 7
1,211,119 UART: [ldev] FE.KEYID = 1
1,216,589 UART: [ldev] Erasing FE.KEYID = 1
1,242,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,575 UART: [ldev] --
1,281,970 UART: [fwproc] Wait for Commands...
1,282,775 UART: [fwproc] Recv command 0x46574c44
1,283,508 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,225 UART: ROM Fatal Error: 0x000B0034
1,331,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
891,571 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,675 UART: [kat] ++
895,827 UART: [kat] sha1
900,063 UART: [kat] SHA2-256
902,003 UART: [kat] SHA2-384
904,654 UART: [kat] SHA2-512-ACC
906,555 UART: [kat] ECC-384
916,248 UART: [kat] HMAC-384Kdf
921,084 UART: [kat] LMS
1,169,396 UART: [kat] --
1,170,365 UART: [cold-reset] ++
1,170,925 UART: [fht] FHT @ 0x50003400
1,173,699 UART: [idev] ++
1,173,867 UART: [idev] CDI.KEYID = 6
1,174,228 UART: [idev] SUBJECT.KEYID = 7
1,174,653 UART: [idev] UDS.KEYID = 0
1,182,568 UART: [idev] Erasing UDS.KEYID = 0
1,199,274 UART: [idev] Sha1 KeyId Algorithm
1,208,202 UART: [idev] --
1,209,235 UART: [ldev] ++
1,209,403 UART: [ldev] CDI.KEYID = 6
1,209,767 UART: [ldev] SUBJECT.KEYID = 5
1,210,194 UART: [ldev] AUTHORITY.KEYID = 7
1,210,657 UART: [ldev] FE.KEYID = 1
1,216,135 UART: [ldev] Erasing FE.KEYID = 1
1,242,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,405 UART: [ldev] --
1,281,676 UART: [fwproc] Wait for Commands...
1,282,419 UART: [fwproc] Recv command 0x46574c44
1,283,152 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,317 UART: ROM Fatal Error: 0x000B0034
1,331,474 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,335 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,016 UART: [kat] ++
895,168 UART: [kat] sha1
899,222 UART: [kat] SHA2-256
901,162 UART: [kat] SHA2-384
904,043 UART: [kat] SHA2-512-ACC
905,944 UART: [kat] ECC-384
915,603 UART: [kat] HMAC-384Kdf
920,387 UART: [kat] LMS
1,168,699 UART: [kat] --
1,169,782 UART: [cold-reset] ++
1,170,140 UART: [fht] FHT @ 0x50003400
1,172,816 UART: [idev] ++
1,172,984 UART: [idev] CDI.KEYID = 6
1,173,345 UART: [idev] SUBJECT.KEYID = 7
1,173,770 UART: [idev] UDS.KEYID = 0
1,181,949 UART: [idev] Erasing UDS.KEYID = 0
1,199,253 UART: [idev] Sha1 KeyId Algorithm
1,208,063 UART: [idev] --
1,209,110 UART: [ldev] ++
1,209,278 UART: [ldev] CDI.KEYID = 6
1,209,642 UART: [ldev] SUBJECT.KEYID = 5
1,210,069 UART: [ldev] AUTHORITY.KEYID = 7
1,210,532 UART: [ldev] FE.KEYID = 1
1,215,802 UART: [ldev] Erasing FE.KEYID = 1
1,241,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,598 UART: [ldev] --
1,280,927 UART: [fwproc] Wait for Commands...
1,281,684 UART: [fwproc] Recv command 0x46574c44
1,282,417 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,886 UART: ROM Fatal Error: 0x000B0034
1,330,043 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,558 UART: [kat] SHA2-256
901,498 UART: [kat] SHA2-384
904,355 UART: [kat] SHA2-512-ACC
906,256 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,563 UART: [kat] LMS
1,168,875 UART: [kat] --
1,169,650 UART: [cold-reset] ++
1,170,118 UART: [fht] FHT @ 0x50003400
1,172,588 UART: [idev] ++
1,172,756 UART: [idev] CDI.KEYID = 6
1,173,117 UART: [idev] SUBJECT.KEYID = 7
1,173,542 UART: [idev] UDS.KEYID = 0
1,181,149 UART: [idev] Erasing UDS.KEYID = 0
1,197,973 UART: [idev] Sha1 KeyId Algorithm
1,206,789 UART: [idev] --
1,207,752 UART: [ldev] ++
1,207,920 UART: [ldev] CDI.KEYID = 6
1,208,284 UART: [ldev] SUBJECT.KEYID = 5
1,208,711 UART: [ldev] AUTHORITY.KEYID = 7
1,209,174 UART: [ldev] FE.KEYID = 1
1,214,170 UART: [ldev] Erasing FE.KEYID = 1
1,240,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,686 UART: [ldev] --
1,279,125 UART: [fwproc] Wait for Commands...
1,279,898 UART: [fwproc] Recv command 0x46574c44
1,280,631 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,248 UART: ROM Fatal Error: 0x000B0034
1,329,405 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,326 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,885 UART: [kat] SHA2-256
901,825 UART: [kat] SHA2-384
904,486 UART: [kat] SHA2-512-ACC
906,387 UART: [kat] ECC-384
916,340 UART: [kat] HMAC-384Kdf
921,156 UART: [kat] LMS
1,169,468 UART: [kat] --
1,170,455 UART: [cold-reset] ++
1,171,025 UART: [fht] FHT @ 0x50003400
1,173,669 UART: [idev] ++
1,173,837 UART: [idev] CDI.KEYID = 6
1,174,198 UART: [idev] SUBJECT.KEYID = 7
1,174,623 UART: [idev] UDS.KEYID = 0
1,182,242 UART: [idev] Erasing UDS.KEYID = 0
1,199,012 UART: [idev] Sha1 KeyId Algorithm
1,207,852 UART: [idev] --
1,209,021 UART: [ldev] ++
1,209,189 UART: [ldev] CDI.KEYID = 6
1,209,553 UART: [ldev] SUBJECT.KEYID = 5
1,209,980 UART: [ldev] AUTHORITY.KEYID = 7
1,210,443 UART: [ldev] FE.KEYID = 1
1,215,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,957 UART: [ldev] --
1,281,402 UART: [fwproc] Wait for Commands...
1,282,145 UART: [fwproc] Recv command 0x46574c44
1,282,878 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,017 UART: ROM Fatal Error: 0x000B0034
1,331,174 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
87,062 UART: [state] WD Timer not started. Device not locked for debugging
88,271 UART: [kat] SHA2-256
891,821 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,925 UART: [kat] ++
896,077 UART: [kat] sha1
900,265 UART: [kat] SHA2-256
902,205 UART: [kat] SHA2-384
904,786 UART: [kat] SHA2-512-ACC
906,687 UART: [kat] ECC-384
916,828 UART: [kat] HMAC-384Kdf
921,380 UART: [kat] LMS
1,169,692 UART: [kat] --
1,170,913 UART: [cold-reset] ++
1,171,459 UART: [fht] FHT @ 0x50003400
1,174,007 UART: [idev] ++
1,174,175 UART: [idev] CDI.KEYID = 6
1,174,536 UART: [idev] SUBJECT.KEYID = 7
1,174,961 UART: [idev] UDS.KEYID = 0
1,182,724 UART: [idev] Erasing UDS.KEYID = 0
1,199,870 UART: [idev] Sha1 KeyId Algorithm
1,208,626 UART: [idev] --
1,209,797 UART: [ldev] ++
1,209,965 UART: [ldev] CDI.KEYID = 6
1,210,329 UART: [ldev] SUBJECT.KEYID = 5
1,210,756 UART: [ldev] AUTHORITY.KEYID = 7
1,211,219 UART: [ldev] FE.KEYID = 1
1,216,345 UART: [ldev] Erasing FE.KEYID = 1
1,243,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,967 UART: [ldev] --
1,282,256 UART: [fwproc] Wait for Commands...
1,283,017 UART: [fwproc] Recv command 0x46574c44
1,283,750 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,317 UART: ROM Fatal Error: 0x000B0034
1,332,474 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,727 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,175 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
5,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,152 UART:
192,528 UART: Running Caliptra ROM ...
193,707 UART:
193,882 UART: [state] CFI Enabled
264,378 UART: [state] LifecycleState = Manufacturing
266,328 UART: [state] DebugLocked = No
268,310 UART: [state] WD Timer not started. Device not locked for debugging
272,792 UART: [kat] SHA2-256
452,471 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,256 UART: [kat] ++
463,735 UART: [kat] sha1
475,972 UART: [kat] SHA2-256
478,692 UART: [kat] SHA2-384
483,272 UART: [kat] SHA2-512-ACC
485,669 UART: [kat] ECC-384
2,949,657 UART: [kat] HMAC-384Kdf
2,973,413 UART: [kat] LMS
3,449,924 UART: [kat] --
3,453,388 UART: [cold-reset] ++
3,454,457 UART: [fht] FHT @ 0x50003400
3,465,739 UART: [idev] ++
3,466,304 UART: [idev] CDI.KEYID = 6
3,467,247 UART: [idev] SUBJECT.KEYID = 7
3,468,475 UART: [idev] UDS.KEYID = 0
3,504,503 UART: [idev] Erasing UDS.KEYID = 0
5,991,148 UART: [idev] Sha1 KeyId Algorithm
6,015,355 UART: [idev] --
6,018,774 UART: [ldev] ++
6,019,377 UART: [ldev] CDI.KEYID = 6
6,020,297 UART: [ldev] SUBJECT.KEYID = 5
6,021,464 UART: [ldev] AUTHORITY.KEYID = 7
6,022,759 UART: [ldev] FE.KEYID = 1
6,059,682 UART: [ldev] Erasing FE.KEYID = 1
8,565,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,252 UART: [ldev] --
10,375,877 UART: [fwproc] Wait for Commands...
10,378,501 UART: [fwproc] Recv command 0x46574c44
10,380,513 UART: [fwproc] Recv'd Img size: 118548 bytes
12,735,237 UART: ROM Fatal Error: 0x000B0025
12,738,472 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
5,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,605,725 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
6,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,515 UART:
192,884 UART: Running Caliptra ROM ...
194,057 UART:
603,704 UART: [state] CFI Enabled
619,489 UART: [state] LifecycleState = Manufacturing
621,469 UART: [state] DebugLocked = No
623,444 UART: [state] WD Timer not started. Device not locked for debugging
627,533 UART: [kat] SHA2-256
807,179 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,957 UART: [kat] ++
818,489 UART: [kat] sha1
830,119 UART: [kat] SHA2-256
832,792 UART: [kat] SHA2-384
839,407 UART: [kat] SHA2-512-ACC
841,761 UART: [kat] ECC-384
3,284,216 UART: [kat] HMAC-384Kdf
3,298,203 UART: [kat] LMS
3,774,676 UART: [kat] --
3,778,124 UART: [cold-reset] ++
3,779,778 UART: [fht] FHT @ 0x50003400
3,791,398 UART: [idev] ++
3,791,960 UART: [idev] CDI.KEYID = 6
3,792,972 UART: [idev] SUBJECT.KEYID = 7
3,794,180 UART: [idev] UDS.KEYID = 0
3,810,097 UART: [idev] Erasing UDS.KEYID = 0
6,273,176 UART: [idev] Sha1 KeyId Algorithm
6,296,562 UART: [idev] --
6,301,036 UART: [ldev] ++
6,301,651 UART: [ldev] CDI.KEYID = 6
6,302,545 UART: [ldev] SUBJECT.KEYID = 5
6,303,767 UART: [ldev] AUTHORITY.KEYID = 7
6,304,996 UART: [ldev] FE.KEYID = 1
6,316,200 UART: [ldev] Erasing FE.KEYID = 1
8,794,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,091 UART: [ldev] --
10,589,192 UART: [fwproc] Wait for Commands...
10,592,255 UART: [fwproc] Recv command 0x46574c44
10,594,295 UART: [fwproc] Recv'd Img size: 118548 bytes
12,945,789 UART: ROM Fatal Error: 0x000B0025
12,949,020 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
6,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,837,580 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Manufacturing
85,861 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
891,424 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,528 UART: [kat] ++
895,680 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
915,979 UART: [kat] HMAC-384Kdf
920,633 UART: [kat] LMS
1,168,945 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,236 UART: [fht] FHT @ 0x50003400
1,173,082 UART: [idev] ++
1,173,250 UART: [idev] CDI.KEYID = 6
1,173,611 UART: [idev] SUBJECT.KEYID = 7
1,174,036 UART: [idev] UDS.KEYID = 0
1,182,193 UART: [idev] Erasing UDS.KEYID = 0
1,199,515 UART: [idev] Sha1 KeyId Algorithm
1,208,323 UART: [idev] --
1,209,398 UART: [ldev] ++
1,209,566 UART: [ldev] CDI.KEYID = 6
1,209,930 UART: [ldev] SUBJECT.KEYID = 5
1,210,357 UART: [ldev] AUTHORITY.KEYID = 7
1,210,820 UART: [ldev] FE.KEYID = 1
1,216,020 UART: [ldev] Erasing FE.KEYID = 1
1,242,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,118 UART: [ldev] --
1,282,335 UART: [fwproc] Wait for Commands...
1,282,908 UART: [fwproc] Recv command 0x46574c44
1,283,641 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,122 UART: ROM Fatal Error: 0x000B0025
1,588,279 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,762 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Manufacturing
86,456 UART: [state] DebugLocked = No
87,126 UART: [state] WD Timer not started. Device not locked for debugging
88,257 UART: [kat] SHA2-256
891,807 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,911 UART: [kat] ++
896,063 UART: [kat] sha1
900,123 UART: [kat] SHA2-256
902,063 UART: [kat] SHA2-384
904,828 UART: [kat] SHA2-512-ACC
906,729 UART: [kat] ECC-384
916,394 UART: [kat] HMAC-384Kdf
921,130 UART: [kat] LMS
1,169,442 UART: [kat] --
1,170,151 UART: [cold-reset] ++
1,170,485 UART: [fht] FHT @ 0x50003400
1,173,153 UART: [idev] ++
1,173,321 UART: [idev] CDI.KEYID = 6
1,173,682 UART: [idev] SUBJECT.KEYID = 7
1,174,107 UART: [idev] UDS.KEYID = 0
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,774 UART: [idev] Sha1 KeyId Algorithm
1,208,468 UART: [idev] --
1,209,641 UART: [ldev] ++
1,209,809 UART: [ldev] CDI.KEYID = 6
1,210,173 UART: [ldev] SUBJECT.KEYID = 5
1,210,600 UART: [ldev] AUTHORITY.KEYID = 7
1,211,063 UART: [ldev] FE.KEYID = 1
1,216,315 UART: [ldev] Erasing FE.KEYID = 1
1,243,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,312 UART: [fwproc] Wait for Commands...
1,282,913 UART: [fwproc] Recv command 0x46574c44
1,283,646 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,705 UART: ROM Fatal Error: 0x000B0025
1,588,862 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,446,035 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Manufacturing
85,519 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
890,904 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,008 UART: [kat] ++
895,160 UART: [kat] sha1
899,324 UART: [kat] SHA2-256
901,264 UART: [kat] SHA2-384
903,933 UART: [kat] SHA2-512-ACC
905,834 UART: [kat] ECC-384
915,229 UART: [kat] HMAC-384Kdf
919,769 UART: [kat] LMS
1,168,081 UART: [kat] --
1,168,888 UART: [cold-reset] ++
1,169,360 UART: [fht] FHT @ 0x50003400
1,171,972 UART: [idev] ++
1,172,140 UART: [idev] CDI.KEYID = 6
1,172,501 UART: [idev] SUBJECT.KEYID = 7
1,172,926 UART: [idev] UDS.KEYID = 0
1,181,191 UART: [idev] Erasing UDS.KEYID = 0
1,198,737 UART: [idev] Sha1 KeyId Algorithm
1,207,801 UART: [idev] --
1,208,956 UART: [ldev] ++
1,209,124 UART: [ldev] CDI.KEYID = 6
1,209,488 UART: [ldev] SUBJECT.KEYID = 5
1,209,915 UART: [ldev] AUTHORITY.KEYID = 7
1,210,378 UART: [ldev] FE.KEYID = 1
1,215,436 UART: [ldev] Erasing FE.KEYID = 1
1,241,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,022 UART: [ldev] --
1,280,357 UART: [fwproc] Wait for Commands...
1,281,010 UART: [fwproc] Recv command 0x46574c44
1,281,743 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,120 UART: ROM Fatal Error: 0x000B0025
1,587,277 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,170 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Manufacturing
86,062 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
891,509 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,613 UART: [kat] ++
895,765 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,738 UART: [kat] SHA2-512-ACC
906,639 UART: [kat] ECC-384
916,572 UART: [kat] HMAC-384Kdf
921,206 UART: [kat] LMS
1,169,518 UART: [kat] --
1,170,403 UART: [cold-reset] ++
1,170,751 UART: [fht] FHT @ 0x50003400
1,173,303 UART: [idev] ++
1,173,471 UART: [idev] CDI.KEYID = 6
1,173,832 UART: [idev] SUBJECT.KEYID = 7
1,174,257 UART: [idev] UDS.KEYID = 0
1,182,344 UART: [idev] Erasing UDS.KEYID = 0
1,199,876 UART: [idev] Sha1 KeyId Algorithm
1,208,856 UART: [idev] --
1,209,805 UART: [ldev] ++
1,209,973 UART: [ldev] CDI.KEYID = 6
1,210,337 UART: [ldev] SUBJECT.KEYID = 5
1,210,764 UART: [ldev] AUTHORITY.KEYID = 7
1,211,227 UART: [ldev] FE.KEYID = 1
1,216,261 UART: [ldev] Erasing FE.KEYID = 1
1,243,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,147 UART: [ldev] --
1,282,404 UART: [fwproc] Wait for Commands...
1,283,071 UART: [fwproc] Recv command 0x46574c44
1,283,804 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,341 UART: ROM Fatal Error: 0x000B0025
1,588,498 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,129 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Manufacturing
85,961 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,296 UART: [kat] ++
895,448 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,341 UART: [kat] HMAC-384Kdf
920,871 UART: [kat] LMS
1,169,183 UART: [kat] --
1,170,114 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,298 UART: [idev] ++
1,173,466 UART: [idev] CDI.KEYID = 6
1,173,827 UART: [idev] SUBJECT.KEYID = 7
1,174,252 UART: [idev] UDS.KEYID = 0
1,181,897 UART: [idev] Erasing UDS.KEYID = 0
1,198,519 UART: [idev] Sha1 KeyId Algorithm
1,207,461 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,215,072 UART: [ldev] Erasing FE.KEYID = 1
1,241,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,704 UART: [ldev] --
1,280,119 UART: [fwproc] Wait for Commands...
1,280,886 UART: [fwproc] Recv command 0x46574c44
1,281,619 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,180 UART: ROM Fatal Error: 0x000B0025
1,587,337 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,348 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Manufacturing
86,028 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,334 UART: [kat] SHA2-512-ACC
906,235 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,750 UART: [kat] LMS
1,169,062 UART: [kat] --
1,170,011 UART: [cold-reset] ++
1,170,347 UART: [fht] FHT @ 0x50003400
1,173,107 UART: [idev] ++
1,173,275 UART: [idev] CDI.KEYID = 6
1,173,636 UART: [idev] SUBJECT.KEYID = 7
1,174,061 UART: [idev] UDS.KEYID = 0
1,182,090 UART: [idev] Erasing UDS.KEYID = 0
1,199,458 UART: [idev] Sha1 KeyId Algorithm
1,208,492 UART: [idev] --
1,209,499 UART: [ldev] ++
1,209,667 UART: [ldev] CDI.KEYID = 6
1,210,031 UART: [ldev] SUBJECT.KEYID = 5
1,210,458 UART: [ldev] AUTHORITY.KEYID = 7
1,210,921 UART: [ldev] FE.KEYID = 1
1,215,837 UART: [ldev] Erasing FE.KEYID = 1
1,242,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,179 UART: [ldev] --
1,281,392 UART: [fwproc] Wait for Commands...
1,281,995 UART: [fwproc] Recv command 0x46574c44
1,282,728 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,929 UART: ROM Fatal Error: 0x000B0025
1,588,086 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,513 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
5,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,041 UART:
192,428 UART: Running Caliptra ROM ...
193,603 UART:
193,757 UART: [state] CFI Enabled
264,393 UART: [state] LifecycleState = Manufacturing
266,386 UART: [state] DebugLocked = No
269,018 UART: [state] WD Timer not started. Device not locked for debugging
273,557 UART: [kat] SHA2-256
453,204 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,997 UART: [kat] ++
464,534 UART: [kat] sha1
475,588 UART: [kat] SHA2-256
478,286 UART: [kat] SHA2-384
483,779 UART: [kat] SHA2-512-ACC
486,141 UART: [kat] ECC-384
2,948,973 UART: [kat] HMAC-384Kdf
2,973,038 UART: [kat] LMS
3,449,497 UART: [kat] --
3,452,255 UART: [cold-reset] ++
3,454,620 UART: [fht] FHT @ 0x50003400
3,466,899 UART: [idev] ++
3,467,473 UART: [idev] CDI.KEYID = 6
3,468,413 UART: [idev] SUBJECT.KEYID = 7
3,469,679 UART: [idev] UDS.KEYID = 0
3,505,047 UART: [idev] Erasing UDS.KEYID = 0
5,991,487 UART: [idev] Sha1 KeyId Algorithm
6,014,506 UART: [idev] --
6,019,483 UART: [ldev] ++
6,020,054 UART: [ldev] CDI.KEYID = 6
6,020,952 UART: [ldev] SUBJECT.KEYID = 5
6,022,195 UART: [ldev] AUTHORITY.KEYID = 7
6,023,446 UART: [ldev] FE.KEYID = 1
6,060,607 UART: [ldev] Erasing FE.KEYID = 1
8,563,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,631 UART: [ldev] --
10,375,511 UART: [fwproc] Wait for Commands...
10,378,056 UART: [fwproc] Recv command 0x46574c44
10,380,054 UART: [fwproc] Recv'd Img size: 118548 bytes
12,735,511 UART: ROM Fatal Error: 0x000B0027
12,738,742 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
5,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,567,967 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,964 writing to cptra_bootfsm_go
8,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
194,178 UART:
194,573 UART: Running Caliptra ROM ...
195,754 UART:
605,497 UART: [state] CFI Enabled
619,715 UART: [state] LifecycleState = Manufacturing
621,675 UART: [state] DebugLocked = No
624,401 UART: [state] WD Timer not started. Device not locked for debugging
628,928 UART: [kat] SHA2-256
808,567 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,380 UART: [kat] ++
819,913 UART: [kat] sha1
830,687 UART: [kat] SHA2-256
833,409 UART: [kat] SHA2-384
839,756 UART: [kat] SHA2-512-ACC
842,153 UART: [kat] ECC-384
3,283,974 UART: [kat] HMAC-384Kdf
3,296,694 UART: [kat] LMS
3,773,210 UART: [kat] --
3,776,410 UART: [cold-reset] ++
3,778,825 UART: [fht] FHT @ 0x50003400
3,790,336 UART: [idev] ++
3,790,898 UART: [idev] CDI.KEYID = 6
3,791,874 UART: [idev] SUBJECT.KEYID = 7
3,793,080 UART: [idev] UDS.KEYID = 0
3,810,301 UART: [idev] Erasing UDS.KEYID = 0
6,272,453 UART: [idev] Sha1 KeyId Algorithm
6,295,423 UART: [idev] --
6,300,658 UART: [ldev] ++
6,301,226 UART: [ldev] CDI.KEYID = 6
6,302,134 UART: [ldev] SUBJECT.KEYID = 5
6,303,347 UART: [ldev] AUTHORITY.KEYID = 7
6,304,577 UART: [ldev] FE.KEYID = 1
6,315,273 UART: [ldev] Erasing FE.KEYID = 1
8,793,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,088 UART: [ldev] --
10,587,901 UART: [fwproc] Wait for Commands...
10,590,319 UART: [fwproc] Recv command 0x46574c44
10,592,303 UART: [fwproc] Recv'd Img size: 118548 bytes
12,945,717 UART: ROM Fatal Error: 0x000B0027
12,948,949 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
6,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,835,865 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Manufacturing
85,569 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,272 UART: [kat] SHA2-256
890,822 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,926 UART: [kat] ++
895,078 UART: [kat] sha1
899,264 UART: [kat] SHA2-256
901,204 UART: [kat] SHA2-384
904,063 UART: [kat] SHA2-512-ACC
905,964 UART: [kat] ECC-384
915,323 UART: [kat] HMAC-384Kdf
919,985 UART: [kat] LMS
1,168,297 UART: [kat] --
1,169,104 UART: [cold-reset] ++
1,169,600 UART: [fht] FHT @ 0x50003400
1,172,308 UART: [idev] ++
1,172,476 UART: [idev] CDI.KEYID = 6
1,172,837 UART: [idev] SUBJECT.KEYID = 7
1,173,262 UART: [idev] UDS.KEYID = 0
1,181,275 UART: [idev] Erasing UDS.KEYID = 0
1,198,353 UART: [idev] Sha1 KeyId Algorithm
1,207,123 UART: [idev] --
1,208,332 UART: [ldev] ++
1,208,500 UART: [ldev] CDI.KEYID = 6
1,208,864 UART: [ldev] SUBJECT.KEYID = 5
1,209,291 UART: [ldev] AUTHORITY.KEYID = 7
1,209,754 UART: [ldev] FE.KEYID = 1
1,214,980 UART: [ldev] Erasing FE.KEYID = 1
1,241,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,194 UART: [ldev] --
1,280,485 UART: [fwproc] Wait for Commands...
1,281,120 UART: [fwproc] Recv command 0x46574c44
1,281,853 UART: [fwproc] Recv'd Img size: 118548 bytes
1,585,408 UART: ROM Fatal Error: 0x000B0027
1,586,565 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,018 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,985 UART: [state] LifecycleState = Manufacturing
85,640 UART: [state] DebugLocked = No
86,156 UART: [state] WD Timer not started. Device not locked for debugging
87,357 UART: [kat] SHA2-256
890,907 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,011 UART: [kat] ++
895,163 UART: [kat] sha1
899,175 UART: [kat] SHA2-256
901,115 UART: [kat] SHA2-384
904,062 UART: [kat] SHA2-512-ACC
905,963 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,416 UART: [kat] LMS
1,168,728 UART: [kat] --
1,169,701 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,172,889 UART: [idev] ++
1,173,057 UART: [idev] CDI.KEYID = 6
1,173,418 UART: [idev] SUBJECT.KEYID = 7
1,173,843 UART: [idev] UDS.KEYID = 0
1,182,072 UART: [idev] Erasing UDS.KEYID = 0
1,198,908 UART: [idev] Sha1 KeyId Algorithm
1,207,768 UART: [idev] --
1,208,785 UART: [ldev] ++
1,208,953 UART: [ldev] CDI.KEYID = 6
1,209,317 UART: [ldev] SUBJECT.KEYID = 5
1,209,744 UART: [ldev] AUTHORITY.KEYID = 7
1,210,207 UART: [ldev] FE.KEYID = 1
1,215,517 UART: [ldev] Erasing FE.KEYID = 1
1,242,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,707 UART: [ldev] --
1,281,046 UART: [fwproc] Wait for Commands...
1,281,719 UART: [fwproc] Recv command 0x46574c44
1,282,452 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,825 UART: ROM Fatal Error: 0x000B0027
1,587,982 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,883 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Manufacturing
85,809 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
891,006 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,110 UART: [kat] ++
895,262 UART: [kat] sha1
899,612 UART: [kat] SHA2-256
901,552 UART: [kat] SHA2-384
904,225 UART: [kat] SHA2-512-ACC
906,126 UART: [kat] ECC-384
915,869 UART: [kat] HMAC-384Kdf
920,353 UART: [kat] LMS
1,168,665 UART: [kat] --
1,169,908 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,936 UART: [idev] ++
1,173,104 UART: [idev] CDI.KEYID = 6
1,173,465 UART: [idev] SUBJECT.KEYID = 7
1,173,890 UART: [idev] UDS.KEYID = 0
1,181,757 UART: [idev] Erasing UDS.KEYID = 0
1,198,899 UART: [idev] Sha1 KeyId Algorithm
1,207,819 UART: [idev] --
1,208,766 UART: [ldev] ++
1,208,934 UART: [ldev] CDI.KEYID = 6
1,209,298 UART: [ldev] SUBJECT.KEYID = 5
1,209,725 UART: [ldev] AUTHORITY.KEYID = 7
1,210,188 UART: [ldev] FE.KEYID = 1
1,215,376 UART: [ldev] Erasing FE.KEYID = 1
1,241,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,928 UART: [ldev] --
1,281,331 UART: [fwproc] Wait for Commands...
1,282,100 UART: [fwproc] Recv command 0x46574c44
1,282,833 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,714 UART: ROM Fatal Error: 0x000B0027
1,587,871 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,268 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Manufacturing
85,954 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
915,620 UART: [kat] HMAC-384Kdf
920,196 UART: [kat] LMS
1,168,508 UART: [kat] --
1,169,205 UART: [cold-reset] ++
1,169,737 UART: [fht] FHT @ 0x50003400
1,172,407 UART: [idev] ++
1,172,575 UART: [idev] CDI.KEYID = 6
1,172,936 UART: [idev] SUBJECT.KEYID = 7
1,173,361 UART: [idev] UDS.KEYID = 0
1,181,618 UART: [idev] Erasing UDS.KEYID = 0
1,198,394 UART: [idev] Sha1 KeyId Algorithm
1,207,262 UART: [idev] --
1,208,189 UART: [ldev] ++
1,208,357 UART: [ldev] CDI.KEYID = 6
1,208,721 UART: [ldev] SUBJECT.KEYID = 5
1,209,148 UART: [ldev] AUTHORITY.KEYID = 7
1,209,611 UART: [ldev] FE.KEYID = 1
1,214,723 UART: [ldev] Erasing FE.KEYID = 1
1,240,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,827 UART: [ldev] --
1,280,062 UART: [fwproc] Wait for Commands...
1,280,631 UART: [fwproc] Recv command 0x46574c44
1,281,364 UART: [fwproc] Recv'd Img size: 118548 bytes
1,585,799 UART: ROM Fatal Error: 0x000B0027
1,586,956 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,557 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Manufacturing
85,811 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,296 UART: [kat] ++
895,448 UART: [kat] sha1
899,620 UART: [kat] SHA2-256
901,560 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
916,123 UART: [kat] HMAC-384Kdf
920,709 UART: [kat] LMS
1,169,021 UART: [kat] --
1,169,870 UART: [cold-reset] ++
1,170,318 UART: [fht] FHT @ 0x50003400
1,172,858 UART: [idev] ++
1,173,026 UART: [idev] CDI.KEYID = 6
1,173,387 UART: [idev] SUBJECT.KEYID = 7
1,173,812 UART: [idev] UDS.KEYID = 0
1,181,823 UART: [idev] Erasing UDS.KEYID = 0
1,199,043 UART: [idev] Sha1 KeyId Algorithm
1,208,017 UART: [idev] --
1,209,156 UART: [ldev] ++
1,209,324 UART: [ldev] CDI.KEYID = 6
1,209,688 UART: [ldev] SUBJECT.KEYID = 5
1,210,115 UART: [ldev] AUTHORITY.KEYID = 7
1,210,578 UART: [ldev] FE.KEYID = 1
1,215,850 UART: [ldev] Erasing FE.KEYID = 1
1,242,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,352 UART: [ldev] --
1,281,577 UART: [fwproc] Wait for Commands...
1,282,196 UART: [fwproc] Recv command 0x46574c44
1,282,929 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,550 UART: ROM Fatal Error: 0x000B0027
1,588,707 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,506 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Manufacturing
86,324 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,731 UART: [kat] ++
895,883 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,750 UART: [kat] SHA2-512-ACC
906,651 UART: [kat] ECC-384
916,592 UART: [kat] HMAC-384Kdf
921,102 UART: [kat] LMS
1,169,414 UART: [kat] --
1,170,369 UART: [cold-reset] ++
1,170,759 UART: [fht] FHT @ 0x50003400
1,173,341 UART: [idev] ++
1,173,509 UART: [idev] CDI.KEYID = 6
1,173,870 UART: [idev] SUBJECT.KEYID = 7
1,174,295 UART: [idev] UDS.KEYID = 0
1,182,484 UART: [idev] Erasing UDS.KEYID = 0
1,199,972 UART: [idev] Sha1 KeyId Algorithm
1,208,670 UART: [idev] --
1,209,943 UART: [ldev] ++
1,210,111 UART: [ldev] CDI.KEYID = 6
1,210,475 UART: [ldev] SUBJECT.KEYID = 5
1,210,902 UART: [ldev] AUTHORITY.KEYID = 7
1,211,365 UART: [ldev] FE.KEYID = 1
1,216,881 UART: [ldev] Erasing FE.KEYID = 1
1,243,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,259 UART: [ldev] --
1,282,598 UART: [fwproc] Wait for Commands...
1,283,359 UART: [fwproc] Recv command 0x46574c44
1,284,092 UART: [fwproc] Recv'd Img size: 118548 bytes
1,588,131 UART: ROM Fatal Error: 0x000B0027
1,589,288 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,739 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
2,028,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,508 UART:
2,178,906 UART: Running Caliptra ROM ...
2,179,987 UART:
2,180,150 UART: [state] CFI Enabled
2,181,038 UART: [state] LifecycleState = Unprovisioned
2,182,717 UART: [state] DebugLocked = No
2,183,755 UART: [state] WD Timer not started. Device not locked for debugging
2,186,221 UART: [kat] SHA2-256
2,186,896 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,893 UART: [kat] ++
2,190,347 UART: [kat] sha1
2,190,868 UART: [kat] SHA2-256
2,191,533 UART: [kat] SHA2-384
2,192,196 UART: [kat] SHA2-512-ACC
2,193,009 UART: [kat] ECC-384
2,945,343 UART: [kat] HMAC-384Kdf
2,967,731 UART: [kat] LMS
3,444,201 UART: [kat] --
3,446,841 UART: [cold-reset] ++
3,448,619 UART: [fht] FHT @ 0x50003400
3,459,929 UART: [idev] ++
3,460,519 UART: [idev] CDI.KEYID = 6
3,461,541 UART: [idev] SUBJECT.KEYID = 7
3,462,714 UART: [idev] UDS.KEYID = 0
3,497,993 UART: [idev] Erasing UDS.KEYID = 0
5,985,741 UART: [idev] Sha1 KeyId Algorithm
6,008,763 UART: [idev] --
6,012,659 UART: [ldev] ++
6,013,233 UART: [ldev] CDI.KEYID = 6
6,014,124 UART: [ldev] SUBJECT.KEYID = 5
6,015,341 UART: [ldev] AUTHORITY.KEYID = 7
6,016,585 UART: [ldev] FE.KEYID = 1
6,053,655 UART: [ldev] Erasing FE.KEYID = 1
8,561,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,050 UART: [ldev] --
10,370,814 UART: [fwproc] Wait for Commands...
10,372,869 UART: [fwproc] Recv command 0x46574c44
10,374,867 UART: [fwproc] Recv'd Img size: 118548 bytes
11,455,469 UART: ROM Fatal Error: 0x000B000D
11,458,703 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
2,028,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,350,813 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,028,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,488 UART:
2,178,883 UART: Running Caliptra ROM ...
2,179,964 UART:
2,180,115 UART: [state] CFI Enabled
2,181,085 UART: [state] LifecycleState = Unprovisioned
2,182,724 UART: [state] DebugLocked = No
2,183,744 UART: [state] WD Timer not started. Device not locked for debugging
2,186,203 UART: [kat] SHA2-256
2,186,872 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,861 UART: [kat] ++
2,190,330 UART: [kat] sha1
2,190,926 UART: [kat] SHA2-256
2,191,592 UART: [kat] SHA2-384
2,192,247 UART: [kat] SHA2-512-ACC
2,193,079 UART: [kat] ECC-384
3,278,926 UART: [kat] HMAC-384Kdf
3,290,993 UART: [kat] LMS
3,767,534 UART: [kat] --
3,772,368 UART: [cold-reset] ++
3,773,894 UART: [fht] FHT @ 0x50003400
3,784,825 UART: [idev] ++
3,785,393 UART: [idev] CDI.KEYID = 6
3,786,328 UART: [idev] SUBJECT.KEYID = 7
3,787,589 UART: [idev] UDS.KEYID = 0
3,804,512 UART: [idev] Erasing UDS.KEYID = 0
6,265,929 UART: [idev] Sha1 KeyId Algorithm
6,289,507 UART: [idev] --
6,294,207 UART: [ldev] ++
6,294,777 UART: [ldev] CDI.KEYID = 6
6,295,789 UART: [ldev] SUBJECT.KEYID = 5
6,296,946 UART: [ldev] AUTHORITY.KEYID = 7
6,298,171 UART: [ldev] FE.KEYID = 1
6,310,976 UART: [ldev] Erasing FE.KEYID = 1
8,788,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,306 UART: [ldev] --
10,583,790 UART: [fwproc] Wait for Commands...
10,586,106 UART: [fwproc] Recv command 0x46574c44
10,588,095 UART: [fwproc] Recv'd Img size: 118548 bytes
11,669,443 UART: ROM Fatal Error: 0x000B000D
11,672,651 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
2,026,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,568,272 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,071 UART: [state] WD Timer not started. Device not locked for debugging
87,192 UART: [kat] SHA2-256
890,742 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,846 UART: [kat] ++
894,998 UART: [kat] sha1
899,322 UART: [kat] SHA2-256
901,262 UART: [kat] SHA2-384
903,863 UART: [kat] SHA2-512-ACC
905,764 UART: [kat] ECC-384
915,215 UART: [kat] HMAC-384Kdf
919,789 UART: [kat] LMS
1,168,101 UART: [kat] --
1,168,994 UART: [cold-reset] ++
1,169,390 UART: [fht] FHT @ 0x50003400
1,171,924 UART: [idev] ++
1,172,092 UART: [idev] CDI.KEYID = 6
1,172,453 UART: [idev] SUBJECT.KEYID = 7
1,172,878 UART: [idev] UDS.KEYID = 0
1,181,187 UART: [idev] Erasing UDS.KEYID = 0
1,197,923 UART: [idev] Sha1 KeyId Algorithm
1,206,861 UART: [idev] --
1,207,918 UART: [ldev] ++
1,208,086 UART: [ldev] CDI.KEYID = 6
1,208,450 UART: [ldev] SUBJECT.KEYID = 5
1,208,877 UART: [ldev] AUTHORITY.KEYID = 7
1,209,340 UART: [ldev] FE.KEYID = 1
1,214,516 UART: [ldev] Erasing FE.KEYID = 1
1,240,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,452 UART: [ldev] --
1,279,703 UART: [fwproc] Wait for Commands...
1,280,440 UART: [fwproc] Recv command 0x46574c44
1,281,173 UART: [fwproc] Recv'd Img size: 118548 bytes
1,319,743 UART: ROM Fatal Error: 0x000B000D
1,320,902 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,174,871 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,593 UART: [kat] ++
895,745 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,582 UART: [kat] SHA2-512-ACC
906,483 UART: [kat] ECC-384
916,106 UART: [kat] HMAC-384Kdf
920,724 UART: [kat] LMS
1,169,036 UART: [kat] --
1,169,881 UART: [cold-reset] ++
1,170,461 UART: [fht] FHT @ 0x50003400
1,173,125 UART: [idev] ++
1,173,293 UART: [idev] CDI.KEYID = 6
1,173,654 UART: [idev] SUBJECT.KEYID = 7
1,174,079 UART: [idev] UDS.KEYID = 0
1,182,032 UART: [idev] Erasing UDS.KEYID = 0
1,198,174 UART: [idev] Sha1 KeyId Algorithm
1,207,260 UART: [idev] --
1,208,461 UART: [ldev] ++
1,208,629 UART: [ldev] CDI.KEYID = 6
1,208,993 UART: [ldev] SUBJECT.KEYID = 5
1,209,420 UART: [ldev] AUTHORITY.KEYID = 7
1,209,883 UART: [ldev] FE.KEYID = 1
1,215,201 UART: [ldev] Erasing FE.KEYID = 1
1,241,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,745 UART: [ldev] --
1,281,082 UART: [fwproc] Wait for Commands...
1,281,735 UART: [fwproc] Recv command 0x46574c44
1,282,468 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,764 UART: ROM Fatal Error: 0x000B000D
1,321,923 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,466 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,404 UART: [kat] ++
895,556 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
915,835 UART: [kat] HMAC-384Kdf
920,219 UART: [kat] LMS
1,168,531 UART: [kat] --
1,169,568 UART: [cold-reset] ++
1,170,088 UART: [fht] FHT @ 0x50003400
1,172,662 UART: [idev] ++
1,172,830 UART: [idev] CDI.KEYID = 6
1,173,191 UART: [idev] SUBJECT.KEYID = 7
1,173,616 UART: [idev] UDS.KEYID = 0
1,181,421 UART: [idev] Erasing UDS.KEYID = 0
1,198,023 UART: [idev] Sha1 KeyId Algorithm
1,206,803 UART: [idev] --
1,207,864 UART: [ldev] ++
1,208,032 UART: [ldev] CDI.KEYID = 6
1,208,396 UART: [ldev] SUBJECT.KEYID = 5
1,208,823 UART: [ldev] AUTHORITY.KEYID = 7
1,209,286 UART: [ldev] FE.KEYID = 1
1,214,542 UART: [ldev] Erasing FE.KEYID = 1
1,240,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,678 UART: [ldev] --
1,279,967 UART: [fwproc] Wait for Commands...
1,280,554 UART: [fwproc] Recv command 0x46574c44
1,281,287 UART: [fwproc] Recv'd Img size: 118548 bytes
1,319,339 UART: ROM Fatal Error: 0x000B000D
1,320,498 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,505 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,833 UART: [kat] ++
895,985 UART: [kat] sha1
900,191 UART: [kat] SHA2-256
902,131 UART: [kat] SHA2-384
905,020 UART: [kat] SHA2-512-ACC
906,921 UART: [kat] ECC-384
916,838 UART: [kat] HMAC-384Kdf
921,596 UART: [kat] LMS
1,169,908 UART: [kat] --
1,170,893 UART: [cold-reset] ++
1,171,357 UART: [fht] FHT @ 0x50003400
1,174,013 UART: [idev] ++
1,174,181 UART: [idev] CDI.KEYID = 6
1,174,542 UART: [idev] SUBJECT.KEYID = 7
1,174,967 UART: [idev] UDS.KEYID = 0
1,183,128 UART: [idev] Erasing UDS.KEYID = 0
1,199,656 UART: [idev] Sha1 KeyId Algorithm
1,208,490 UART: [idev] --
1,209,579 UART: [ldev] ++
1,209,747 UART: [ldev] CDI.KEYID = 6
1,210,111 UART: [ldev] SUBJECT.KEYID = 5
1,210,538 UART: [ldev] AUTHORITY.KEYID = 7
1,211,001 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,242,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,831 UART: [ldev] --
1,282,080 UART: [fwproc] Wait for Commands...
1,282,767 UART: [fwproc] Recv command 0x46574c44
1,283,500 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,868 UART: ROM Fatal Error: 0x000B000D
1,322,027 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,274 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,922 UART: [kat] SHA2-256
901,862 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
915,567 UART: [kat] HMAC-384Kdf
920,133 UART: [kat] LMS
1,168,445 UART: [kat] --
1,169,518 UART: [cold-reset] ++
1,170,068 UART: [fht] FHT @ 0x50003400
1,172,790 UART: [idev] ++
1,172,958 UART: [idev] CDI.KEYID = 6
1,173,319 UART: [idev] SUBJECT.KEYID = 7
1,173,744 UART: [idev] UDS.KEYID = 0
1,181,421 UART: [idev] Erasing UDS.KEYID = 0
1,198,115 UART: [idev] Sha1 KeyId Algorithm
1,206,897 UART: [idev] --
1,208,124 UART: [ldev] ++
1,208,292 UART: [ldev] CDI.KEYID = 6
1,208,656 UART: [ldev] SUBJECT.KEYID = 5
1,209,083 UART: [ldev] AUTHORITY.KEYID = 7
1,209,546 UART: [ldev] FE.KEYID = 1
1,214,856 UART: [ldev] Erasing FE.KEYID = 1
1,241,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,880 UART: [ldev] --
1,281,321 UART: [fwproc] Wait for Commands...
1,281,942 UART: [fwproc] Recv command 0x46574c44
1,282,675 UART: [fwproc] Recv'd Img size: 118548 bytes
1,319,871 UART: ROM Fatal Error: 0x000B000D
1,321,030 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,175,887 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,913 UART: [kat] SHA2-256
901,853 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,214 UART: [kat] HMAC-384Kdf
920,890 UART: [kat] LMS
1,169,202 UART: [kat] --
1,170,323 UART: [cold-reset] ++
1,170,819 UART: [fht] FHT @ 0x50003400
1,173,511 UART: [idev] ++
1,173,679 UART: [idev] CDI.KEYID = 6
1,174,040 UART: [idev] SUBJECT.KEYID = 7
1,174,465 UART: [idev] UDS.KEYID = 0
1,182,186 UART: [idev] Erasing UDS.KEYID = 0
1,198,540 UART: [idev] Sha1 KeyId Algorithm
1,207,492 UART: [idev] --
1,208,613 UART: [ldev] ++
1,208,781 UART: [ldev] CDI.KEYID = 6
1,209,145 UART: [ldev] SUBJECT.KEYID = 5
1,209,572 UART: [ldev] AUTHORITY.KEYID = 7
1,210,035 UART: [ldev] FE.KEYID = 1
1,215,011 UART: [ldev] Erasing FE.KEYID = 1
1,241,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,557 UART: [ldev] --
1,280,958 UART: [fwproc] Wait for Commands...
1,281,551 UART: [fwproc] Recv command 0x46574c44
1,282,284 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,334 UART: ROM Fatal Error: 0x000B000D
1,321,493 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,176,440 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,027,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,325 UART:
2,177,725 UART: Running Caliptra ROM ...
2,178,900 UART:
2,179,077 UART: [state] CFI Enabled
2,180,059 UART: [state] LifecycleState = Unprovisioned
2,181,705 UART: [state] DebugLocked = No
2,182,818 UART: [state] WD Timer not started. Device not locked for debugging
2,185,282 UART: [kat] SHA2-256
2,185,958 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,957 UART: [kat] ++
2,189,413 UART: [kat] sha1
2,189,953 UART: [kat] SHA2-256
2,190,620 UART: [kat] SHA2-384
2,191,310 UART: [kat] SHA2-512-ACC
2,192,153 UART: [kat] ECC-384
2,949,001 UART: [kat] HMAC-384Kdf
2,971,974 UART: [kat] LMS
3,448,520 UART: [kat] --
3,455,131 UART: [cold-reset] ++
3,455,985 UART: [fht] FHT @ 0x50003400
3,466,812 UART: [idev] ++
3,467,395 UART: [idev] CDI.KEYID = 6
3,468,337 UART: [idev] SUBJECT.KEYID = 7
3,469,557 UART: [idev] UDS.KEYID = 0
3,502,265 UART: [idev] Erasing UDS.KEYID = 0
5,987,212 UART: [idev] Sha1 KeyId Algorithm
6,010,176 UART: [idev] --
6,015,604 UART: [ldev] ++
6,016,188 UART: [ldev] CDI.KEYID = 6
6,017,101 UART: [ldev] SUBJECT.KEYID = 5
6,018,324 UART: [ldev] AUTHORITY.KEYID = 7
6,019,568 UART: [ldev] FE.KEYID = 1
6,057,536 UART: [ldev] Erasing FE.KEYID = 1
8,565,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,889 UART: [ldev] --
10,376,753 UART: [fwproc] Wait for Commands...
10,379,665 UART: [fwproc] Recv command 0x46574c44
10,381,655 UART: [fwproc] Recv'd Img size: 118548 bytes
13,858,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,933 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,962 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,109 >>> mbox cmd response: success
14,345,893 UART: [afmc] ++
14,346,494 UART: [afmc] CDI.KEYID = 6
14,347,417 UART: [afmc] SUBJECT.KEYID = 7
14,348,637 UART: [afmc] AUTHORITY.KEYID = 5
16,875,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,771 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,615,588 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,666 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,647,252 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,671,402 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
2,026,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,387 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,030,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,179,859 UART:
2,180,255 UART: Running Caliptra ROM ...
2,181,337 UART:
2,181,487 UART: [state] CFI Enabled
2,182,458 UART: [state] LifecycleState = Unprovisioned
2,184,109 UART: [state] DebugLocked = No
2,185,135 UART: [state] WD Timer not started. Device not locked for debugging
2,187,585 UART: [kat] SHA2-256
2,188,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,191,235 UART: [kat] ++
2,191,677 UART: [kat] sha1
2,192,182 UART: [kat] SHA2-256
2,192,857 UART: [kat] SHA2-384
2,193,515 UART: [kat] SHA2-512-ACC
2,194,509 UART: [kat] ECC-384
3,281,731 UART: [kat] HMAC-384Kdf
3,293,749 UART: [kat] LMS
3,770,272 UART: [kat] --
3,775,828 UART: [cold-reset] ++
3,777,699 UART: [fht] FHT @ 0x50003400
3,787,976 UART: [idev] ++
3,788,537 UART: [idev] CDI.KEYID = 6
3,789,548 UART: [idev] SUBJECT.KEYID = 7
3,790,762 UART: [idev] UDS.KEYID = 0
3,807,772 UART: [idev] Erasing UDS.KEYID = 0
6,267,746 UART: [idev] Sha1 KeyId Algorithm
6,291,554 UART: [idev] --
6,295,925 UART: [ldev] ++
6,296,566 UART: [ldev] CDI.KEYID = 6
6,297,449 UART: [ldev] SUBJECT.KEYID = 5
6,298,664 UART: [ldev] AUTHORITY.KEYID = 7
6,299,846 UART: [ldev] FE.KEYID = 1
6,308,917 UART: [ldev] Erasing FE.KEYID = 1
8,783,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,179 UART: [ldev] --
10,576,125 UART: [fwproc] Wait for Commands...
10,578,543 UART: [fwproc] Recv command 0x46574c44
10,580,522 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,880 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,910 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,309 >>> mbox cmd response: success
14,553,265 UART: [afmc] ++
14,553,850 UART: [afmc] CDI.KEYID = 6
14,554,787 UART: [afmc] SUBJECT.KEYID = 7
14,555,994 UART: [afmc] AUTHORITY.KEYID = 5
17,058,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,571 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,415 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,446 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,833,027 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,406 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
2,027,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,300 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,615 UART: [kat] SHA2-512-ACC
906,516 UART: [kat] ECC-384
915,831 UART: [kat] HMAC-384Kdf
920,475 UART: [kat] LMS
1,168,787 UART: [kat] --
1,169,806 UART: [cold-reset] ++
1,170,250 UART: [fht] FHT @ 0x50003400
1,172,922 UART: [idev] ++
1,173,090 UART: [idev] CDI.KEYID = 6
1,173,451 UART: [idev] SUBJECT.KEYID = 7
1,173,876 UART: [idev] UDS.KEYID = 0
1,182,317 UART: [idev] Erasing UDS.KEYID = 0
1,199,083 UART: [idev] Sha1 KeyId Algorithm
1,207,745 UART: [idev] --
1,208,778 UART: [ldev] ++
1,208,946 UART: [ldev] CDI.KEYID = 6
1,209,310 UART: [ldev] SUBJECT.KEYID = 5
1,209,737 UART: [ldev] AUTHORITY.KEYID = 7
1,210,200 UART: [ldev] FE.KEYID = 1
1,215,718 UART: [ldev] Erasing FE.KEYID = 1
1,241,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,038 UART: [ldev] --
1,280,395 UART: [fwproc] Wait for Commands...
1,281,022 UART: [fwproc] Recv command 0x46574c44
1,281,755 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,877 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,052 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,421 >>> mbox cmd response: success
2,825,455 UART: [afmc] ++
2,825,623 UART: [afmc] CDI.KEYID = 6
2,825,986 UART: [afmc] SUBJECT.KEYID = 7
2,826,412 UART: [afmc] AUTHORITY.KEYID = 5
2,862,593 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,595 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,305 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,186 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,887 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,652 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,180 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,672 UART: [kat] SHA2-512-ACC
906,573 UART: [kat] ECC-384
916,260 UART: [kat] HMAC-384Kdf
920,844 UART: [kat] LMS
1,169,156 UART: [kat] --
1,170,303 UART: [cold-reset] ++
1,170,731 UART: [fht] FHT @ 0x50003400
1,173,515 UART: [idev] ++
1,173,683 UART: [idev] CDI.KEYID = 6
1,174,044 UART: [idev] SUBJECT.KEYID = 7
1,174,469 UART: [idev] UDS.KEYID = 0
1,182,828 UART: [idev] Erasing UDS.KEYID = 0
1,200,264 UART: [idev] Sha1 KeyId Algorithm
1,209,152 UART: [idev] --
1,210,325 UART: [ldev] ++
1,210,493 UART: [ldev] CDI.KEYID = 6
1,210,857 UART: [ldev] SUBJECT.KEYID = 5
1,211,284 UART: [ldev] AUTHORITY.KEYID = 7
1,211,747 UART: [ldev] FE.KEYID = 1
1,217,199 UART: [ldev] Erasing FE.KEYID = 1
1,243,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,159 UART: [ldev] --
1,282,410 UART: [fwproc] Wait for Commands...
1,283,013 UART: [fwproc] Recv command 0x46574c44
1,283,746 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,466 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,641 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,894 >>> mbox cmd response: success
2,829,052 UART: [afmc] ++
2,829,220 UART: [afmc] CDI.KEYID = 6
2,829,583 UART: [afmc] SUBJECT.KEYID = 7
2,830,009 UART: [afmc] AUTHORITY.KEYID = 5
2,865,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,894 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,604 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,485 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,186 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,859 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,621 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
891,036 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,140 UART: [kat] ++
895,292 UART: [kat] sha1
899,544 UART: [kat] SHA2-256
901,484 UART: [kat] SHA2-384
904,079 UART: [kat] SHA2-512-ACC
905,980 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,783 UART: [kat] LMS
1,169,095 UART: [kat] --
1,170,290 UART: [cold-reset] ++
1,170,680 UART: [fht] FHT @ 0x50003400
1,173,220 UART: [idev] ++
1,173,388 UART: [idev] CDI.KEYID = 6
1,173,749 UART: [idev] SUBJECT.KEYID = 7
1,174,174 UART: [idev] UDS.KEYID = 0
1,182,199 UART: [idev] Erasing UDS.KEYID = 0
1,198,783 UART: [idev] Sha1 KeyId Algorithm
1,207,569 UART: [idev] --
1,208,760 UART: [ldev] ++
1,208,928 UART: [ldev] CDI.KEYID = 6
1,209,292 UART: [ldev] SUBJECT.KEYID = 5
1,209,719 UART: [ldev] AUTHORITY.KEYID = 7
1,210,182 UART: [ldev] FE.KEYID = 1
1,215,336 UART: [ldev] Erasing FE.KEYID = 1
1,241,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,330 UART: [ldev] --
1,280,615 UART: [fwproc] Wait for Commands...
1,281,356 UART: [fwproc] Recv command 0x46574c44
1,282,089 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,570 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,313 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,488 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,647 >>> mbox cmd response: success
2,826,853 UART: [afmc] ++
2,827,021 UART: [afmc] CDI.KEYID = 6
2,827,384 UART: [afmc] SUBJECT.KEYID = 7
2,827,810 UART: [afmc] AUTHORITY.KEYID = 5
2,863,869 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,546 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,295 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,005 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,886 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,587 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,256 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,042 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,335 UART: [kat] ++
895,487 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,706 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,759 UART: [cold-reset] ++
1,170,125 UART: [fht] FHT @ 0x50003400
1,172,815 UART: [idev] ++
1,172,983 UART: [idev] CDI.KEYID = 6
1,173,344 UART: [idev] SUBJECT.KEYID = 7
1,173,769 UART: [idev] UDS.KEYID = 0
1,181,714 UART: [idev] Erasing UDS.KEYID = 0
1,198,714 UART: [idev] Sha1 KeyId Algorithm
1,207,576 UART: [idev] --
1,208,717 UART: [ldev] ++
1,208,885 UART: [ldev] CDI.KEYID = 6
1,209,249 UART: [ldev] SUBJECT.KEYID = 5
1,209,676 UART: [ldev] AUTHORITY.KEYID = 7
1,210,139 UART: [ldev] FE.KEYID = 1
1,215,577 UART: [ldev] Erasing FE.KEYID = 1
1,242,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,563 UART: [ldev] --
1,281,994 UART: [fwproc] Wait for Commands...
1,282,749 UART: [fwproc] Recv command 0x46574c44
1,283,482 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,304 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,479 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,712 >>> mbox cmd response: success
2,827,806 UART: [afmc] ++
2,827,974 UART: [afmc] CDI.KEYID = 6
2,828,337 UART: [afmc] SUBJECT.KEYID = 7
2,828,763 UART: [afmc] AUTHORITY.KEYID = 5
2,864,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,118 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,828 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,709 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,410 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,181 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,227 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
85,973 UART: [state] WD Timer not started. Device not locked for debugging
87,290 UART: [kat] SHA2-256
890,840 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,944 UART: [kat] ++
895,096 UART: [kat] sha1
899,204 UART: [kat] SHA2-256
901,144 UART: [kat] SHA2-384
903,777 UART: [kat] SHA2-512-ACC
905,678 UART: [kat] ECC-384
915,231 UART: [kat] HMAC-384Kdf
920,001 UART: [kat] LMS
1,168,313 UART: [kat] --
1,169,366 UART: [cold-reset] ++
1,169,908 UART: [fht] FHT @ 0x50003400
1,172,442 UART: [idev] ++
1,172,610 UART: [idev] CDI.KEYID = 6
1,172,971 UART: [idev] SUBJECT.KEYID = 7
1,173,396 UART: [idev] UDS.KEYID = 0
1,181,297 UART: [idev] Erasing UDS.KEYID = 0
1,198,259 UART: [idev] Sha1 KeyId Algorithm
1,207,217 UART: [idev] --
1,208,056 UART: [ldev] ++
1,208,224 UART: [ldev] CDI.KEYID = 6
1,208,588 UART: [ldev] SUBJECT.KEYID = 5
1,209,015 UART: [ldev] AUTHORITY.KEYID = 7
1,209,478 UART: [ldev] FE.KEYID = 1
1,214,572 UART: [ldev] Erasing FE.KEYID = 1
1,240,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,596 UART: [ldev] --
1,279,899 UART: [fwproc] Wait for Commands...
1,280,486 UART: [fwproc] Recv command 0x46574c44
1,281,219 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,409 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,584 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,983 >>> mbox cmd response: success
2,826,165 UART: [afmc] ++
2,826,333 UART: [afmc] CDI.KEYID = 6
2,826,696 UART: [afmc] SUBJECT.KEYID = 7
2,827,122 UART: [afmc] AUTHORITY.KEYID = 5
2,862,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,679 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,389 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,270 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,971 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,730 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,076 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
916,180 UART: [kat] HMAC-384Kdf
920,862 UART: [kat] LMS
1,169,174 UART: [kat] --
1,170,007 UART: [cold-reset] ++
1,170,437 UART: [fht] FHT @ 0x50003400
1,173,161 UART: [idev] ++
1,173,329 UART: [idev] CDI.KEYID = 6
1,173,690 UART: [idev] SUBJECT.KEYID = 7
1,174,115 UART: [idev] UDS.KEYID = 0
1,181,774 UART: [idev] Erasing UDS.KEYID = 0
1,198,796 UART: [idev] Sha1 KeyId Algorithm
1,207,752 UART: [idev] --
1,208,577 UART: [ldev] ++
1,208,745 UART: [ldev] CDI.KEYID = 6
1,209,109 UART: [ldev] SUBJECT.KEYID = 5
1,209,536 UART: [ldev] AUTHORITY.KEYID = 7
1,209,999 UART: [ldev] FE.KEYID = 1
1,215,419 UART: [ldev] Erasing FE.KEYID = 1
1,241,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,709 UART: [ldev] --
1,280,994 UART: [fwproc] Wait for Commands...
1,281,661 UART: [fwproc] Recv command 0x46574c44
1,282,394 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,796 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,971 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,216 >>> mbox cmd response: success
2,826,262 UART: [afmc] ++
2,826,430 UART: [afmc] CDI.KEYID = 6
2,826,793 UART: [afmc] SUBJECT.KEYID = 7
2,827,219 UART: [afmc] AUTHORITY.KEYID = 5
2,862,754 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,310 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,020 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,901 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,602 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,293 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,173 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
2,026,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,176,277 UART:
2,176,677 UART: Running Caliptra ROM ...
2,177,809 UART:
2,177,977 UART: [state] CFI Enabled
2,178,949 UART: [state] LifecycleState = Unprovisioned
2,180,598 UART: [state] DebugLocked = No
2,181,713 UART: [state] WD Timer not started. Device not locked for debugging
2,184,176 UART: [kat] SHA2-256
2,184,852 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,187,875 UART: [kat] ++
2,188,333 UART: [kat] sha1
2,188,852 UART: [kat] SHA2-256
2,189,521 UART: [kat] SHA2-384
2,190,186 UART: [kat] SHA2-512-ACC
2,190,993 UART: [kat] ECC-384
2,944,501 UART: [kat] HMAC-384Kdf
2,968,266 UART: [kat] LMS
3,444,765 UART: [kat] --
3,449,385 UART: [cold-reset] ++
3,451,549 UART: [fht] FHT @ 0x50003400
3,461,886 UART: [idev] ++
3,462,467 UART: [idev] CDI.KEYID = 6
3,463,488 UART: [idev] SUBJECT.KEYID = 7
3,464,651 UART: [idev] UDS.KEYID = 0
3,498,089 UART: [idev] Erasing UDS.KEYID = 0
5,984,233 UART: [idev] Sha1 KeyId Algorithm
6,008,270 UART: [idev] --
6,013,573 UART: [ldev] ++
6,014,148 UART: [ldev] CDI.KEYID = 6
6,015,171 UART: [ldev] SUBJECT.KEYID = 5
6,016,284 UART: [ldev] AUTHORITY.KEYID = 7
6,017,581 UART: [ldev] FE.KEYID = 1
6,054,273 UART: [ldev] Erasing FE.KEYID = 1
8,564,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,363 UART: [ldev] --
10,371,964 UART: [fwproc] Wait for Commands...
10,375,189 UART: [fwproc] Recv command 0x46574c44
10,377,232 UART: [fwproc] Recv'd Img size: 118548 bytes
11,981,530 UART: ROM Fatal Error: 0x000B0030
11,984,770 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,026,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,902,350 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
2,029,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,179,136 UART:
2,179,556 UART: Running Caliptra ROM ...
2,180,645 UART:
2,180,796 UART: [state] CFI Enabled
2,181,768 UART: [state] LifecycleState = Unprovisioned
2,183,403 UART: [state] DebugLocked = No
2,184,429 UART: [state] WD Timer not started. Device not locked for debugging
2,186,879 UART: [kat] SHA2-256
2,187,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,190,524 UART: [kat] ++
2,190,967 UART: [kat] sha1
2,191,474 UART: [kat] SHA2-256
2,192,126 UART: [kat] SHA2-384
2,192,777 UART: [kat] SHA2-512-ACC
2,193,602 UART: [kat] ECC-384
3,273,612 UART: [kat] HMAC-384Kdf
3,285,827 UART: [kat] LMS
3,762,374 UART: [kat] --
3,767,465 UART: [cold-reset] ++
3,768,524 UART: [fht] FHT @ 0x50003400
3,780,483 UART: [idev] ++
3,781,062 UART: [idev] CDI.KEYID = 6
3,782,040 UART: [idev] SUBJECT.KEYID = 7
3,783,261 UART: [idev] UDS.KEYID = 0
3,802,921 UART: [idev] Erasing UDS.KEYID = 0
6,261,514 UART: [idev] Sha1 KeyId Algorithm
6,285,987 UART: [idev] --
6,292,570 UART: [ldev] ++
6,293,212 UART: [ldev] CDI.KEYID = 6
6,294,102 UART: [ldev] SUBJECT.KEYID = 5
6,295,230 UART: [ldev] AUTHORITY.KEYID = 7
6,296,574 UART: [ldev] FE.KEYID = 1
6,306,063 UART: [ldev] Erasing FE.KEYID = 1
8,784,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,368 UART: [ldev] --
10,578,468 UART: [fwproc] Wait for Commands...
10,580,831 UART: [fwproc] Recv command 0x46574c44
10,582,814 UART: [fwproc] Recv'd Img size: 118548 bytes
12,207,895 UART: ROM Fatal Error: 0x000B0030
12,211,169 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,035,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,114,969 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,610 UART: [state] LifecycleState = Unprovisioned
86,265 UART: [state] DebugLocked = No
86,961 UART: [state] WD Timer not started. Device not locked for debugging
88,300 UART: [kat] SHA2-256
891,850 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,954 UART: [kat] ++
896,106 UART: [kat] sha1
900,280 UART: [kat] SHA2-256
902,220 UART: [kat] SHA2-384
904,957 UART: [kat] SHA2-512-ACC
906,858 UART: [kat] ECC-384
916,899 UART: [kat] HMAC-384Kdf
921,527 UART: [kat] LMS
1,169,839 UART: [kat] --
1,170,808 UART: [cold-reset] ++
1,171,200 UART: [fht] FHT @ 0x50003400
1,173,966 UART: [idev] ++
1,174,134 UART: [idev] CDI.KEYID = 6
1,174,495 UART: [idev] SUBJECT.KEYID = 7
1,174,920 UART: [idev] UDS.KEYID = 0
1,182,849 UART: [idev] Erasing UDS.KEYID = 0
1,200,017 UART: [idev] Sha1 KeyId Algorithm
1,209,003 UART: [idev] --
1,210,012 UART: [ldev] ++
1,210,180 UART: [ldev] CDI.KEYID = 6
1,210,544 UART: [ldev] SUBJECT.KEYID = 5
1,210,971 UART: [ldev] AUTHORITY.KEYID = 7
1,211,434 UART: [ldev] FE.KEYID = 1
1,216,744 UART: [ldev] Erasing FE.KEYID = 1
1,243,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,878 UART: [ldev] --
1,282,293 UART: [fwproc] Wait for Commands...
1,282,874 UART: [fwproc] Recv command 0x46574c44
1,283,607 UART: [fwproc] Recv'd Img size: 118548 bytes
1,598,781 UART: ROM Fatal Error: 0x000B0030
1,599,938 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,445,507 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
899,959 UART: [kat] SHA2-256
901,899 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
916,142 UART: [kat] HMAC-384Kdf
920,958 UART: [kat] LMS
1,169,270 UART: [kat] --
1,170,319 UART: [cold-reset] ++
1,170,695 UART: [fht] FHT @ 0x50003400
1,173,445 UART: [idev] ++
1,173,613 UART: [idev] CDI.KEYID = 6
1,173,974 UART: [idev] SUBJECT.KEYID = 7
1,174,399 UART: [idev] UDS.KEYID = 0
1,182,374 UART: [idev] Erasing UDS.KEYID = 0
1,199,320 UART: [idev] Sha1 KeyId Algorithm
1,208,326 UART: [idev] --
1,209,461 UART: [ldev] ++
1,209,629 UART: [ldev] CDI.KEYID = 6
1,209,993 UART: [ldev] SUBJECT.KEYID = 5
1,210,420 UART: [ldev] AUTHORITY.KEYID = 7
1,210,883 UART: [ldev] FE.KEYID = 1
1,216,203 UART: [ldev] Erasing FE.KEYID = 1
1,242,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,933 UART: [ldev] --
1,281,192 UART: [fwproc] Wait for Commands...
1,281,899 UART: [fwproc] Recv command 0x46574c44
1,282,632 UART: [fwproc] Recv'd Img size: 118548 bytes
1,596,719 UART: ROM Fatal Error: 0x000B0030
1,597,876 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,454,610 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,264 UART: [kat] SHA2-256
890,814 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,918 UART: [kat] ++
895,070 UART: [kat] sha1
899,296 UART: [kat] SHA2-256
901,236 UART: [kat] SHA2-384
903,857 UART: [kat] SHA2-512-ACC
905,758 UART: [kat] ECC-384
915,767 UART: [kat] HMAC-384Kdf
920,343 UART: [kat] LMS
1,168,655 UART: [kat] --
1,169,226 UART: [cold-reset] ++
1,169,552 UART: [fht] FHT @ 0x50003400
1,172,278 UART: [idev] ++
1,172,446 UART: [idev] CDI.KEYID = 6
1,172,807 UART: [idev] SUBJECT.KEYID = 7
1,173,232 UART: [idev] UDS.KEYID = 0
1,181,339 UART: [idev] Erasing UDS.KEYID = 0
1,197,893 UART: [idev] Sha1 KeyId Algorithm
1,206,699 UART: [idev] --
1,207,666 UART: [ldev] ++
1,207,834 UART: [ldev] CDI.KEYID = 6
1,208,198 UART: [ldev] SUBJECT.KEYID = 5
1,208,625 UART: [ldev] AUTHORITY.KEYID = 7
1,209,088 UART: [ldev] FE.KEYID = 1
1,214,576 UART: [ldev] Erasing FE.KEYID = 1
1,241,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,546 UART: [ldev] --
1,280,875 UART: [fwproc] Wait for Commands...
1,281,540 UART: [fwproc] Recv command 0x46574c44
1,282,273 UART: [fwproc] Recv'd Img size: 118548 bytes
1,585,610 UART: ROM Fatal Error: 0x000B0030
1,586,767 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,445,708 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,466 UART: [kat] SHA2-512-ACC
906,367 UART: [kat] ECC-384
916,402 UART: [kat] HMAC-384Kdf
920,968 UART: [kat] LMS
1,169,280 UART: [kat] --
1,170,309 UART: [cold-reset] ++
1,170,783 UART: [fht] FHT @ 0x50003400
1,173,593 UART: [idev] ++
1,173,761 UART: [idev] CDI.KEYID = 6
1,174,122 UART: [idev] SUBJECT.KEYID = 7
1,174,547 UART: [idev] UDS.KEYID = 0
1,182,562 UART: [idev] Erasing UDS.KEYID = 0
1,199,704 UART: [idev] Sha1 KeyId Algorithm
1,208,638 UART: [idev] --
1,209,549 UART: [ldev] ++
1,209,717 UART: [ldev] CDI.KEYID = 6
1,210,081 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,275 UART: [ldev] Erasing FE.KEYID = 1
1,242,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,697 UART: [ldev] --
1,282,140 UART: [fwproc] Wait for Commands...
1,282,815 UART: [fwproc] Recv command 0x46574c44
1,283,548 UART: [fwproc] Recv'd Img size: 118548 bytes
1,597,307 UART: ROM Fatal Error: 0x000B0030
1,598,464 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,450,668 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
915,883 UART: [kat] HMAC-384Kdf
920,407 UART: [kat] LMS
1,168,719 UART: [kat] --
1,169,788 UART: [cold-reset] ++
1,170,174 UART: [fht] FHT @ 0x50003400
1,172,848 UART: [idev] ++
1,173,016 UART: [idev] CDI.KEYID = 6
1,173,377 UART: [idev] SUBJECT.KEYID = 7
1,173,802 UART: [idev] UDS.KEYID = 0
1,181,635 UART: [idev] Erasing UDS.KEYID = 0
1,198,163 UART: [idev] Sha1 KeyId Algorithm
1,207,017 UART: [idev] --
1,208,052 UART: [ldev] ++
1,208,220 UART: [ldev] CDI.KEYID = 6
1,208,584 UART: [ldev] SUBJECT.KEYID = 5
1,209,011 UART: [ldev] AUTHORITY.KEYID = 7
1,209,474 UART: [ldev] FE.KEYID = 1
1,214,916 UART: [ldev] Erasing FE.KEYID = 1
1,241,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,398 UART: [ldev] --
1,280,785 UART: [fwproc] Wait for Commands...
1,281,496 UART: [fwproc] Recv command 0x46574c44
1,282,229 UART: [fwproc] Recv'd Img size: 118548 bytes
1,591,542 UART: ROM Fatal Error: 0x000B0030
1,592,699 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,397 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
916,230 UART: [kat] HMAC-384Kdf
920,888 UART: [kat] LMS
1,169,200 UART: [kat] --
1,170,219 UART: [cold-reset] ++
1,170,759 UART: [fht] FHT @ 0x50003400
1,173,393 UART: [idev] ++
1,173,561 UART: [idev] CDI.KEYID = 6
1,173,922 UART: [idev] SUBJECT.KEYID = 7
1,174,347 UART: [idev] UDS.KEYID = 0
1,182,684 UART: [idev] Erasing UDS.KEYID = 0
1,199,466 UART: [idev] Sha1 KeyId Algorithm
1,208,320 UART: [idev] --
1,209,301 UART: [ldev] ++
1,209,469 UART: [ldev] CDI.KEYID = 6
1,209,833 UART: [ldev] SUBJECT.KEYID = 5
1,210,260 UART: [ldev] AUTHORITY.KEYID = 7
1,210,723 UART: [ldev] FE.KEYID = 1
1,216,141 UART: [ldev] Erasing FE.KEYID = 1
1,242,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,539 UART: [ldev] --
1,281,886 UART: [fwproc] Wait for Commands...
1,282,649 UART: [fwproc] Recv command 0x46574c44
1,283,382 UART: [fwproc] Recv'd Img size: 118548 bytes
1,594,788 UART: ROM Fatal Error: 0x000B0030
1,595,945 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,448,777 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
5,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,296 UART:
192,672 UART: Running Caliptra ROM ...
193,839 UART:
194,000 UART: [state] CFI Enabled
263,794 UART: [state] LifecycleState = Unprovisioned
265,745 UART: [state] DebugLocked = No
267,943 UART: [state] WD Timer not started. Device not locked for debugging
272,387 UART: [kat] SHA2-256
452,022 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,832 UART: [kat] ++
463,329 UART: [kat] sha1
473,254 UART: [kat] SHA2-256
475,977 UART: [kat] SHA2-384
482,727 UART: [kat] SHA2-512-ACC
485,076 UART: [kat] ECC-384
2,949,073 UART: [kat] HMAC-384Kdf
2,972,228 UART: [kat] LMS
3,448,700 UART: [kat] --
3,452,966 UART: [cold-reset] ++
3,454,045 UART: [fht] FHT @ 0x50003400
3,467,031 UART: [idev] ++
3,467,680 UART: [idev] CDI.KEYID = 6
3,468,649 UART: [idev] SUBJECT.KEYID = 7
3,469,810 UART: [idev] UDS.KEYID = 0
3,502,212 UART: [idev] Erasing UDS.KEYID = 0
5,988,746 UART: [idev] Sha1 KeyId Algorithm
6,012,096 UART: [idev] --
6,017,128 UART: [ldev] ++
6,017,757 UART: [ldev] CDI.KEYID = 6
6,018,677 UART: [ldev] SUBJECT.KEYID = 5
6,019,849 UART: [ldev] AUTHORITY.KEYID = 7
6,021,144 UART: [ldev] FE.KEYID = 1
6,057,343 UART: [ldev] Erasing FE.KEYID = 1
8,562,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,760 UART: [ldev] --
10,375,408 UART: [fwproc] Wait for Commands...
10,378,270 UART: [fwproc] Recv command 0x46574c44
10,380,257 UART: [fwproc] Recv'd Img size: 118548 bytes
10,449,280 UART: ROM Fatal Error: 0x000B0001
10,452,530 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
5,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,325,888 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
6,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,348 UART:
192,756 UART: Running Caliptra ROM ...
193,827 UART:
603,370 UART: [state] CFI Enabled
618,598 UART: [state] LifecycleState = Unprovisioned
620,551 UART: [state] DebugLocked = No
622,758 UART: [state] WD Timer not started. Device not locked for debugging
627,176 UART: [kat] SHA2-256
806,792 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,620 UART: [kat] ++
818,088 UART: [kat] sha1
830,263 UART: [kat] SHA2-256
832,956 UART: [kat] SHA2-384
838,394 UART: [kat] SHA2-512-ACC
840,755 UART: [kat] ECC-384
3,284,007 UART: [kat] HMAC-384Kdf
3,296,512 UART: [kat] LMS
3,772,998 UART: [kat] --
3,777,899 UART: [cold-reset] ++
3,779,002 UART: [fht] FHT @ 0x50003400
3,790,885 UART: [idev] ++
3,791,452 UART: [idev] CDI.KEYID = 6
3,792,387 UART: [idev] SUBJECT.KEYID = 7
3,793,656 UART: [idev] UDS.KEYID = 0
3,809,711 UART: [idev] Erasing UDS.KEYID = 0
6,269,596 UART: [idev] Sha1 KeyId Algorithm
6,293,037 UART: [idev] --
6,298,159 UART: [ldev] ++
6,298,726 UART: [ldev] CDI.KEYID = 6
6,299,656 UART: [ldev] SUBJECT.KEYID = 5
6,300,883 UART: [ldev] AUTHORITY.KEYID = 7
6,302,117 UART: [ldev] FE.KEYID = 1
6,313,659 UART: [ldev] Erasing FE.KEYID = 1
8,794,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,137 UART: [ldev] --
10,585,275 UART: [fwproc] Wait for Commands...
10,587,319 UART: [fwproc] Recv command 0x46574c44
10,589,356 UART: [fwproc] Recv'd Img size: 118548 bytes
10,661,147 UART: ROM Fatal Error: 0x000B0001
10,664,394 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
6,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,541,018 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,608 UART: [state] LifecycleState = Unprovisioned
86,263 UART: [state] DebugLocked = No
86,837 UART: [state] WD Timer not started. Device not locked for debugging
87,966 UART: [kat] SHA2-256
891,516 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,791 UART: [kat] SHA2-512-ACC
906,692 UART: [kat] ECC-384
916,199 UART: [kat] HMAC-384Kdf
920,855 UART: [kat] LMS
1,169,167 UART: [kat] --
1,170,158 UART: [cold-reset] ++
1,170,622 UART: [fht] FHT @ 0x50003400
1,173,280 UART: [idev] ++
1,173,448 UART: [idev] CDI.KEYID = 6
1,173,809 UART: [idev] SUBJECT.KEYID = 7
1,174,234 UART: [idev] UDS.KEYID = 0
1,182,403 UART: [idev] Erasing UDS.KEYID = 0
1,199,391 UART: [idev] Sha1 KeyId Algorithm
1,208,309 UART: [idev] --
1,209,412 UART: [ldev] ++
1,209,580 UART: [ldev] CDI.KEYID = 6
1,209,944 UART: [ldev] SUBJECT.KEYID = 5
1,210,371 UART: [ldev] AUTHORITY.KEYID = 7
1,210,834 UART: [ldev] FE.KEYID = 1
1,215,938 UART: [ldev] Erasing FE.KEYID = 1
1,242,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,988 UART: [ldev] --
1,281,339 UART: [fwproc] Wait for Commands...
1,281,936 UART: [fwproc] Recv command 0x46574c44
1,282,669 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,855 UART: ROM Fatal Error: 0x000B0001
1,303,012 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,435 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,837 UART: [state] LifecycleState = Unprovisioned
86,492 UART: [state] DebugLocked = No
87,150 UART: [state] WD Timer not started. Device not locked for debugging
88,275 UART: [kat] SHA2-256
891,825 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,929 UART: [kat] ++
896,081 UART: [kat] sha1
900,335 UART: [kat] SHA2-256
902,275 UART: [kat] SHA2-384
905,188 UART: [kat] SHA2-512-ACC
907,089 UART: [kat] ECC-384
917,084 UART: [kat] HMAC-384Kdf
921,786 UART: [kat] LMS
1,170,098 UART: [kat] --
1,170,965 UART: [cold-reset] ++
1,171,389 UART: [fht] FHT @ 0x50003400
1,174,241 UART: [idev] ++
1,174,409 UART: [idev] CDI.KEYID = 6
1,174,770 UART: [idev] SUBJECT.KEYID = 7
1,175,195 UART: [idev] UDS.KEYID = 0
1,183,308 UART: [idev] Erasing UDS.KEYID = 0
1,200,106 UART: [idev] Sha1 KeyId Algorithm
1,208,862 UART: [idev] --
1,210,015 UART: [ldev] ++
1,210,183 UART: [ldev] CDI.KEYID = 6
1,210,547 UART: [ldev] SUBJECT.KEYID = 5
1,210,974 UART: [ldev] AUTHORITY.KEYID = 7
1,211,437 UART: [ldev] FE.KEYID = 1
1,216,503 UART: [ldev] Erasing FE.KEYID = 1
1,243,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,293 UART: [ldev] --
1,282,494 UART: [fwproc] Wait for Commands...
1,283,259 UART: [fwproc] Recv command 0x46574c44
1,283,992 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,748 UART: ROM Fatal Error: 0x000B0001
1,303,905 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,628 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,616 UART: [kat] SHA2-256
901,556 UART: [kat] SHA2-384
904,231 UART: [kat] SHA2-512-ACC
906,132 UART: [kat] ECC-384
915,613 UART: [kat] HMAC-384Kdf
920,201 UART: [kat] LMS
1,168,513 UART: [kat] --
1,169,450 UART: [cold-reset] ++
1,169,816 UART: [fht] FHT @ 0x50003400
1,172,546 UART: [idev] ++
1,172,714 UART: [idev] CDI.KEYID = 6
1,173,075 UART: [idev] SUBJECT.KEYID = 7
1,173,500 UART: [idev] UDS.KEYID = 0
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,583 UART: [idev] Sha1 KeyId Algorithm
1,207,519 UART: [idev] --
1,208,482 UART: [ldev] ++
1,208,650 UART: [ldev] CDI.KEYID = 6
1,209,014 UART: [ldev] SUBJECT.KEYID = 5
1,209,441 UART: [ldev] AUTHORITY.KEYID = 7
1,209,904 UART: [ldev] FE.KEYID = 1
1,215,076 UART: [ldev] Erasing FE.KEYID = 1
1,241,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,152 UART: [ldev] --
1,280,487 UART: [fwproc] Wait for Commands...
1,281,248 UART: [fwproc] Recv command 0x46574c44
1,281,981 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,229 UART: ROM Fatal Error: 0x000B0001
1,302,386 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,156,807 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,227 UART: [state] LifecycleState = Unprovisioned
86,882 UART: [state] DebugLocked = No
87,464 UART: [state] WD Timer not started. Device not locked for debugging
88,579 UART: [kat] SHA2-256
892,129 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,233 UART: [kat] ++
896,385 UART: [kat] sha1
900,627 UART: [kat] SHA2-256
902,567 UART: [kat] SHA2-384
905,212 UART: [kat] SHA2-512-ACC
907,113 UART: [kat] ECC-384
916,962 UART: [kat] HMAC-384Kdf
921,742 UART: [kat] LMS
1,170,054 UART: [kat] --
1,171,011 UART: [cold-reset] ++
1,171,441 UART: [fht] FHT @ 0x50003400
1,174,125 UART: [idev] ++
1,174,293 UART: [idev] CDI.KEYID = 6
1,174,654 UART: [idev] SUBJECT.KEYID = 7
1,175,079 UART: [idev] UDS.KEYID = 0
1,183,272 UART: [idev] Erasing UDS.KEYID = 0
1,199,984 UART: [idev] Sha1 KeyId Algorithm
1,208,820 UART: [idev] --
1,209,747 UART: [ldev] ++
1,209,915 UART: [ldev] CDI.KEYID = 6
1,210,279 UART: [ldev] SUBJECT.KEYID = 5
1,210,706 UART: [ldev] AUTHORITY.KEYID = 7
1,211,169 UART: [ldev] FE.KEYID = 1
1,216,481 UART: [ldev] Erasing FE.KEYID = 1
1,242,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,703 UART: [ldev] --
1,282,008 UART: [fwproc] Wait for Commands...
1,282,811 UART: [fwproc] Recv command 0x46574c44
1,283,544 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,950 UART: ROM Fatal Error: 0x000B0001
1,304,107 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,496 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
891,346 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,450 UART: [kat] ++
895,602 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
920,893 UART: [kat] LMS
1,169,205 UART: [kat] --
1,170,272 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,420 UART: [idev] ++
1,173,588 UART: [idev] CDI.KEYID = 6
1,173,949 UART: [idev] SUBJECT.KEYID = 7
1,174,374 UART: [idev] UDS.KEYID = 0
1,182,413 UART: [idev] Erasing UDS.KEYID = 0
1,198,767 UART: [idev] Sha1 KeyId Algorithm
1,207,673 UART: [idev] --
1,208,588 UART: [ldev] ++
1,208,756 UART: [ldev] CDI.KEYID = 6
1,209,120 UART: [ldev] SUBJECT.KEYID = 5
1,209,547 UART: [ldev] AUTHORITY.KEYID = 7
1,210,010 UART: [ldev] FE.KEYID = 1
1,215,028 UART: [ldev] Erasing FE.KEYID = 1
1,241,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,182 UART: [ldev] --
1,280,499 UART: [fwproc] Wait for Commands...
1,281,238 UART: [fwproc] Recv command 0x46574c44
1,281,971 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,169 UART: ROM Fatal Error: 0x000B0001
1,302,326 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,156,813 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,547 UART: [kat] ++
895,699 UART: [kat] sha1
900,061 UART: [kat] SHA2-256
902,001 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
916,040 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,507 UART: [cold-reset] ++
1,169,969 UART: [fht] FHT @ 0x50003400
1,172,531 UART: [idev] ++
1,172,699 UART: [idev] CDI.KEYID = 6
1,173,060 UART: [idev] SUBJECT.KEYID = 7
1,173,485 UART: [idev] UDS.KEYID = 0
1,181,692 UART: [idev] Erasing UDS.KEYID = 0
1,199,198 UART: [idev] Sha1 KeyId Algorithm
1,207,868 UART: [idev] --
1,209,023 UART: [ldev] ++
1,209,191 UART: [ldev] CDI.KEYID = 6
1,209,555 UART: [ldev] SUBJECT.KEYID = 5
1,209,982 UART: [ldev] AUTHORITY.KEYID = 7
1,210,445 UART: [ldev] FE.KEYID = 1
1,215,609 UART: [ldev] Erasing FE.KEYID = 1
1,242,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,965 UART: [ldev] --
1,281,340 UART: [fwproc] Wait for Commands...
1,282,017 UART: [fwproc] Recv command 0x46574c44
1,282,750 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,912 UART: ROM Fatal Error: 0x000B0001
1,303,069 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,340 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
5,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,193 UART:
192,581 UART: Running Caliptra ROM ...
193,748 UART:
193,908 UART: [state] CFI Enabled
266,337 UART: [state] LifecycleState = Unprovisioned
268,321 UART: [state] DebugLocked = No
269,543 UART: [state] WD Timer not started. Device not locked for debugging
273,716 UART: [kat] SHA2-256
453,334 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,152 UART: [kat] ++
464,639 UART: [kat] sha1
475,099 UART: [kat] SHA2-256
477,786 UART: [kat] SHA2-384
482,803 UART: [kat] SHA2-512-ACC
485,147 UART: [kat] ECC-384
2,949,696 UART: [kat] HMAC-384Kdf
2,972,538 UART: [kat] LMS
3,449,036 UART: [kat] --
3,452,408 UART: [cold-reset] ++
3,454,464 UART: [fht] FHT @ 0x50003400
3,465,076 UART: [idev] ++
3,465,648 UART: [idev] CDI.KEYID = 6
3,466,668 UART: [idev] SUBJECT.KEYID = 7
3,467,892 UART: [idev] UDS.KEYID = 0
3,501,542 UART: [idev] Erasing UDS.KEYID = 0
5,989,070 UART: [idev] Sha1 KeyId Algorithm
6,012,866 UART: [idev] --
6,016,047 UART: [ldev] ++
6,016,636 UART: [ldev] CDI.KEYID = 6
6,017,587 UART: [ldev] SUBJECT.KEYID = 5
6,018,808 UART: [ldev] AUTHORITY.KEYID = 7
6,020,047 UART: [ldev] FE.KEYID = 1
6,057,422 UART: [ldev] Erasing FE.KEYID = 1
8,565,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,047 UART: [ldev] --
10,372,890 UART: [fwproc] Wait for Commands...
10,375,922 UART: [fwproc] Recv command 0x46574c44
10,377,916 UART: [fwproc] Recv'd Img size: 118548 bytes
10,447,854 UART: ROM Fatal Error: 0x000B0002
10,451,053 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
5,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,299,280 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
6,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,479 UART:
192,847 UART: Running Caliptra ROM ...
194,007 UART:
603,466 UART: [state] CFI Enabled
617,682 UART: [state] LifecycleState = Unprovisioned
619,632 UART: [state] DebugLocked = No
621,008 UART: [state] WD Timer not started. Device not locked for debugging
624,647 UART: [kat] SHA2-256
804,268 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,049 UART: [kat] ++
815,528 UART: [kat] sha1
826,478 UART: [kat] SHA2-256
829,165 UART: [kat] SHA2-384
835,630 UART: [kat] SHA2-512-ACC
837,973 UART: [kat] ECC-384
3,281,221 UART: [kat] HMAC-384Kdf
3,294,044 UART: [kat] LMS
3,770,528 UART: [kat] --
3,774,083 UART: [cold-reset] ++
3,775,580 UART: [fht] FHT @ 0x50003400
3,787,203 UART: [idev] ++
3,787,761 UART: [idev] CDI.KEYID = 6
3,788,777 UART: [idev] SUBJECT.KEYID = 7
3,789,987 UART: [idev] UDS.KEYID = 0
3,807,578 UART: [idev] Erasing UDS.KEYID = 0
6,270,085 UART: [idev] Sha1 KeyId Algorithm
6,293,012 UART: [idev] --
6,298,059 UART: [ldev] ++
6,298,634 UART: [ldev] CDI.KEYID = 6
6,299,545 UART: [ldev] SUBJECT.KEYID = 5
6,300,759 UART: [ldev] AUTHORITY.KEYID = 7
6,302,044 UART: [ldev] FE.KEYID = 1
6,312,558 UART: [ldev] Erasing FE.KEYID = 1
8,784,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,419 UART: [ldev] --
10,578,553 UART: [fwproc] Wait for Commands...
10,581,184 UART: [fwproc] Recv command 0x46574c44
10,583,167 UART: [fwproc] Recv'd Img size: 118548 bytes
10,654,602 UART: ROM Fatal Error: 0x000B0002
10,657,864 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
6,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,541,240 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
916,267 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,326 UART: [fht] FHT @ 0x50003400
1,172,952 UART: [idev] ++
1,173,120 UART: [idev] CDI.KEYID = 6
1,173,481 UART: [idev] SUBJECT.KEYID = 7
1,173,906 UART: [idev] UDS.KEYID = 0
1,182,273 UART: [idev] Erasing UDS.KEYID = 0
1,198,835 UART: [idev] Sha1 KeyId Algorithm
1,207,799 UART: [idev] --
1,208,868 UART: [ldev] ++
1,209,036 UART: [ldev] CDI.KEYID = 6
1,209,400 UART: [ldev] SUBJECT.KEYID = 5
1,209,827 UART: [ldev] AUTHORITY.KEYID = 7
1,210,290 UART: [ldev] FE.KEYID = 1
1,215,372 UART: [ldev] Erasing FE.KEYID = 1
1,241,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,006 UART: [ldev] --
1,281,377 UART: [fwproc] Wait for Commands...
1,281,954 UART: [fwproc] Recv command 0x46574c44
1,282,687 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,760 UART: ROM Fatal Error: 0x000B0002
1,302,917 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,090 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,959 UART: [kat] SHA2-256
901,899 UART: [kat] SHA2-384
904,746 UART: [kat] SHA2-512-ACC
906,647 UART: [kat] ECC-384
916,686 UART: [kat] HMAC-384Kdf
921,450 UART: [kat] LMS
1,169,762 UART: [kat] --
1,170,579 UART: [cold-reset] ++
1,171,067 UART: [fht] FHT @ 0x50003400
1,173,681 UART: [idev] ++
1,173,849 UART: [idev] CDI.KEYID = 6
1,174,210 UART: [idev] SUBJECT.KEYID = 7
1,174,635 UART: [idev] UDS.KEYID = 0
1,182,712 UART: [idev] Erasing UDS.KEYID = 0
1,199,542 UART: [idev] Sha1 KeyId Algorithm
1,208,384 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,215,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,257 UART: [ldev] --
1,281,546 UART: [fwproc] Wait for Commands...
1,282,355 UART: [fwproc] Recv command 0x46574c44
1,283,088 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,105 UART: ROM Fatal Error: 0x000B0002
1,303,262 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,449 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,634 UART: [state] LifecycleState = Unprovisioned
86,289 UART: [state] DebugLocked = No
86,877 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,813 UART: [kat] SHA2-512-ACC
906,714 UART: [kat] ECC-384
916,577 UART: [kat] HMAC-384Kdf
921,299 UART: [kat] LMS
1,169,611 UART: [kat] --
1,170,460 UART: [cold-reset] ++
1,170,862 UART: [fht] FHT @ 0x50003400
1,173,300 UART: [idev] ++
1,173,468 UART: [idev] CDI.KEYID = 6
1,173,829 UART: [idev] SUBJECT.KEYID = 7
1,174,254 UART: [idev] UDS.KEYID = 0
1,182,445 UART: [idev] Erasing UDS.KEYID = 0
1,199,623 UART: [idev] Sha1 KeyId Algorithm
1,208,315 UART: [idev] --
1,209,234 UART: [ldev] ++
1,209,402 UART: [ldev] CDI.KEYID = 6
1,209,766 UART: [ldev] SUBJECT.KEYID = 5
1,210,193 UART: [ldev] AUTHORITY.KEYID = 7
1,210,656 UART: [ldev] FE.KEYID = 1
1,215,756 UART: [ldev] Erasing FE.KEYID = 1
1,242,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,172 UART: [ldev] --
1,281,517 UART: [fwproc] Wait for Commands...
1,282,240 UART: [fwproc] Recv command 0x46574c44
1,282,973 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,332 UART: ROM Fatal Error: 0x000B0002
1,303,489 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,756 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
891,761 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,865 UART: [kat] ++
896,017 UART: [kat] sha1
900,341 UART: [kat] SHA2-256
902,281 UART: [kat] SHA2-384
905,212 UART: [kat] SHA2-512-ACC
907,113 UART: [kat] ECC-384
917,158 UART: [kat] HMAC-384Kdf
921,838 UART: [kat] LMS
1,170,150 UART: [kat] --
1,171,083 UART: [cold-reset] ++
1,171,629 UART: [fht] FHT @ 0x50003400
1,174,473 UART: [idev] ++
1,174,641 UART: [idev] CDI.KEYID = 6
1,175,002 UART: [idev] SUBJECT.KEYID = 7
1,175,427 UART: [idev] UDS.KEYID = 0
1,183,610 UART: [idev] Erasing UDS.KEYID = 0
1,201,068 UART: [idev] Sha1 KeyId Algorithm
1,209,824 UART: [idev] --
1,210,821 UART: [ldev] ++
1,210,989 UART: [ldev] CDI.KEYID = 6
1,211,353 UART: [ldev] SUBJECT.KEYID = 5
1,211,780 UART: [ldev] AUTHORITY.KEYID = 7
1,212,243 UART: [ldev] FE.KEYID = 1
1,217,455 UART: [ldev] Erasing FE.KEYID = 1
1,244,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,161 UART: [ldev] --
1,283,514 UART: [fwproc] Wait for Commands...
1,284,195 UART: [fwproc] Recv command 0x46574c44
1,284,928 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,491 UART: ROM Fatal Error: 0x000B0002
1,305,648 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,513 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,664 UART: [state] LifecycleState = Unprovisioned
85,319 UART: [state] DebugLocked = No
86,019 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,032 UART: [kat] ++
895,184 UART: [kat] sha1
899,666 UART: [kat] SHA2-256
901,606 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,317 UART: [kat] HMAC-384Kdf
920,795 UART: [kat] LMS
1,169,107 UART: [kat] --
1,169,762 UART: [cold-reset] ++
1,170,282 UART: [fht] FHT @ 0x50003400
1,173,020 UART: [idev] ++
1,173,188 UART: [idev] CDI.KEYID = 6
1,173,549 UART: [idev] SUBJECT.KEYID = 7
1,173,974 UART: [idev] UDS.KEYID = 0
1,181,879 UART: [idev] Erasing UDS.KEYID = 0
1,199,177 UART: [idev] Sha1 KeyId Algorithm
1,208,089 UART: [idev] --
1,209,182 UART: [ldev] ++
1,209,350 UART: [ldev] CDI.KEYID = 6
1,209,714 UART: [ldev] SUBJECT.KEYID = 5
1,210,141 UART: [ldev] AUTHORITY.KEYID = 7
1,210,604 UART: [ldev] FE.KEYID = 1
1,215,988 UART: [ldev] Erasing FE.KEYID = 1
1,241,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,606 UART: [ldev] --
1,280,869 UART: [fwproc] Wait for Commands...
1,281,618 UART: [fwproc] Recv command 0x46574c44
1,282,351 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,244 UART: ROM Fatal Error: 0x000B0002
1,302,401 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,452 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,989 UART: [state] LifecycleState = Unprovisioned
85,644 UART: [state] DebugLocked = No
86,334 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,831 UART: [kat] SHA2-256
901,771 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
916,314 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,169,887 UART: [cold-reset] ++
1,170,237 UART: [fht] FHT @ 0x50003400
1,172,845 UART: [idev] ++
1,173,013 UART: [idev] CDI.KEYID = 6
1,173,374 UART: [idev] SUBJECT.KEYID = 7
1,173,799 UART: [idev] UDS.KEYID = 0
1,181,602 UART: [idev] Erasing UDS.KEYID = 0
1,198,380 UART: [idev] Sha1 KeyId Algorithm
1,207,306 UART: [idev] --
1,208,141 UART: [ldev] ++
1,208,309 UART: [ldev] CDI.KEYID = 6
1,208,673 UART: [ldev] SUBJECT.KEYID = 5
1,209,100 UART: [ldev] AUTHORITY.KEYID = 7
1,209,563 UART: [ldev] FE.KEYID = 1
1,215,027 UART: [ldev] Erasing FE.KEYID = 1
1,240,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,269 UART: [ldev] --
1,279,538 UART: [fwproc] Wait for Commands...
1,280,343 UART: [fwproc] Recv command 0x46574c44
1,281,076 UART: [fwproc] Recv'd Img size: 118548 bytes
1,300,461 UART: ROM Fatal Error: 0x000B0002
1,301,618 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,565 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
2,223,559 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,389,680 UART:
2,390,126 UART: Running Caliptra ROM ...
2,391,301 UART:
2,391,482 UART: [state] CFI Enabled
2,392,443 UART: [state] LifecycleState = Unprovisioned
2,394,101 UART: [state] DebugLocked = No
2,395,213 UART: [state] WD Timer not started. Device not locked for debugging
2,397,688 UART: [kat] SHA2-256
2,398,364 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,401,372 UART: [kat] ++
2,401,852 UART: [kat] sha1
2,402,458 UART: [kat] SHA2-256
2,403,132 UART: [kat] SHA2-384
2,403,797 UART: [kat] SHA2-512-ACC
2,404,685 UART: [kat] ECC-384
2,926,846 UART: [kat] HMAC-384Kdf
2,950,340 UART: [kat] LMS
3,426,835 UART: [kat] --
3,432,334 UART: [cold-reset] ++
3,434,056 UART: [fht] FHT @ 0x50003400
3,445,962 UART: [idev] ++
3,446,535 UART: [idev] CDI.KEYID = 6
3,447,514 UART: [idev] SUBJECT.KEYID = 7
3,448,735 UART: [idev] UDS.KEYID = 0
3,478,603 UART: [idev] Erasing UDS.KEYID = 0
5,962,839 UART: [idev] Sha1 KeyId Algorithm
5,985,974 UART: [idev] --
5,991,303 UART: [ldev] ++
5,991,887 UART: [ldev] CDI.KEYID = 6
5,992,810 UART: [ldev] SUBJECT.KEYID = 5
5,993,973 UART: [ldev] AUTHORITY.KEYID = 7
5,995,265 UART: [ldev] FE.KEYID = 1
6,035,624 UART: [ldev] Erasing FE.KEYID = 1
8,544,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,913 UART: [ldev] --
10,352,050 UART: [fwproc] Wait for Commands...
10,354,213 UART: [fwproc] Recv command 0x46574c44
10,356,208 UART: [fwproc] Recv'd Img size: 131072 bytes
13,995,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,080,945 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,141,131 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,526,308 >>> mbox cmd response: success
14,529,803 UART: [afmc] ++
14,530,396 UART: [afmc] CDI.KEYID = 6
14,531,342 UART: [afmc] SUBJECT.KEYID = 7
14,532,560 UART: [afmc] AUTHORITY.KEYID = 5
17,067,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,810,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,812,471 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,828,302 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,844,327 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,859,857 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,884,688 UART: [afmc] --
18,890,179 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,047,461 UART: [cold-reset] --
19,048,324 UART: [state] Locking Datavault
19,049,403 UART: [state] Locking PCR0, PCR1 and PCR31
19,050,945 UART: [state] Locking ICCM
19,051,836 UART: [exit] Launching FMC @ 0x40000000
19,053,189 UART:
19,053,346 UART: Running Caliptra FMC ...
19,054,448 UART:
19,054,614 UART: [fmc] Received command: 0x1000000E
19,831,856 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
2,237,408 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,424,327 >>> mbox cmd response: success
18,689,830 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,847,189 UART:
18,847,571 UART: Running Caliptra FMC ...
18,848,791 UART:
18,848,968 UART: [fmc] Received command: 0x1000000E
19,631,578 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
2,234,025 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,399,794 UART:
2,400,228 UART: Running Caliptra ROM ...
2,401,407 UART:
2,401,581 UART: [state] CFI Enabled
2,402,537 UART: [state] LifecycleState = Unprovisioned
2,404,191 UART: [state] DebugLocked = No
2,405,302 UART: [state] WD Timer not started. Device not locked for debugging
2,407,769 UART: [kat] SHA2-256
2,408,440 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,411,441 UART: [kat] ++
2,411,892 UART: [kat] sha1
2,412,400 UART: [kat] SHA2-256
2,413,136 UART: [kat] SHA2-384
2,413,799 UART: [kat] SHA2-512-ACC
2,414,679 UART: [kat] ECC-384
3,281,769 UART: [kat] HMAC-384Kdf
3,295,331 UART: [kat] LMS
3,771,843 UART: [kat] --
3,778,488 UART: [cold-reset] ++
3,780,422 UART: [fht] FHT @ 0x50003400
3,790,546 UART: [idev] ++
3,791,177 UART: [idev] CDI.KEYID = 6
3,792,100 UART: [idev] SUBJECT.KEYID = 7
3,793,371 UART: [idev] UDS.KEYID = 0
3,810,529 UART: [idev] Erasing UDS.KEYID = 0
6,272,340 UART: [idev] Sha1 KeyId Algorithm
6,295,682 UART: [idev] --
6,301,404 UART: [ldev] ++
6,301,970 UART: [ldev] CDI.KEYID = 6
6,302,876 UART: [ldev] SUBJECT.KEYID = 5
6,304,082 UART: [ldev] AUTHORITY.KEYID = 7
6,305,369 UART: [ldev] FE.KEYID = 1
6,317,254 UART: [ldev] Erasing FE.KEYID = 1
8,792,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,211 UART: [ldev] --
10,584,149 UART: [fwproc] Wait for Commands...
10,586,676 UART: [fwproc] Recv command 0x46574c44
10,588,870 UART: [fwproc] Recv'd Img size: 131072 bytes
14,232,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,309,640 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,369,863 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,755,291 >>> mbox cmd response: success
14,759,953 UART: [afmc] ++
14,760,596 UART: [afmc] CDI.KEYID = 6
14,761,480 UART: [afmc] SUBJECT.KEYID = 7
14,762,763 UART: [afmc] AUTHORITY.KEYID = 5
17,269,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,989,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,991,976 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
19,007,790 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
19,023,863 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,039,338 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,064,787 UART: [afmc] --
19,070,943 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,228,085 UART: [cold-reset] --
19,229,082 UART: [state] Locking Datavault
19,230,161 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,693 UART: [state] Locking ICCM
19,232,568 UART: [exit] Launching FMC @ 0x40000000
19,233,904 UART:
19,234,046 UART: Running Caliptra FMC ...
19,235,164 UART:
19,235,315 UART: [fmc] Received command: 0x1000000E
20,012,524 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
2,235,473 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,650,249 >>> mbox cmd response: success
18,888,399 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,045,759 UART:
19,046,149 UART: Running Caliptra FMC ...
19,047,299 UART:
19,047,464 UART: [fmc] Received command: 0x1000000E
19,830,165 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
891,362 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,345 UART: [kat] HMAC-384Kdf
920,911 UART: [kat] LMS
1,169,223 UART: [kat] --
1,170,348 UART: [cold-reset] ++
1,170,826 UART: [fht] FHT @ 0x50003400
1,173,468 UART: [idev] ++
1,173,636 UART: [idev] CDI.KEYID = 6
1,173,997 UART: [idev] SUBJECT.KEYID = 7
1,174,422 UART: [idev] UDS.KEYID = 0
1,182,919 UART: [idev] Erasing UDS.KEYID = 0
1,199,969 UART: [idev] Sha1 KeyId Algorithm
1,208,925 UART: [idev] --
1,209,876 UART: [ldev] ++
1,210,044 UART: [ldev] CDI.KEYID = 6
1,210,408 UART: [ldev] SUBJECT.KEYID = 5
1,210,835 UART: [ldev] AUTHORITY.KEYID = 7
1,211,298 UART: [ldev] FE.KEYID = 1
1,216,748 UART: [ldev] Erasing FE.KEYID = 1
1,242,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,484 UART: [ldev] --
1,281,719 UART: [fwproc] Wait for Commands...
1,282,408 UART: [fwproc] Recv command 0x46574c44
1,283,141 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,029 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,714 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,197 >>> mbox cmd response: success
2,991,223 UART: [afmc] ++
2,991,391 UART: [afmc] CDI.KEYID = 6
2,991,754 UART: [afmc] SUBJECT.KEYID = 7
2,992,180 UART: [afmc] AUTHORITY.KEYID = 5
3,027,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,815 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,511 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,410 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,103 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,981 UART: [afmc] --
3,070,836 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,858 UART: [cold-reset] --
3,071,426 UART: [state] Locking Datavault
3,072,641 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,245 UART: [state] Locking ICCM
3,073,669 UART: [exit] Launching FMC @ 0x40000000
3,078,966 UART:
3,078,982 UART: Running Caliptra FMC ...
3,079,390 UART:
3,079,620 UART: [fmc] Received command: 0x1000000E
3,424,674 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,843,620 >>> mbox cmd response: success
2,899,451 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,905,694 UART:
2,905,710 UART: Running Caliptra FMC ...
2,906,118 UART:
2,906,348 UART: [fmc] Received command: 0x1000000E
3,251,402 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
900,145 UART: [kat] SHA2-256
902,085 UART: [kat] SHA2-384
904,924 UART: [kat] SHA2-512-ACC
906,825 UART: [kat] ECC-384
916,842 UART: [kat] HMAC-384Kdf
921,414 UART: [kat] LMS
1,169,726 UART: [kat] --
1,170,467 UART: [cold-reset] ++
1,170,873 UART: [fht] FHT @ 0x50003400
1,173,663 UART: [idev] ++
1,173,831 UART: [idev] CDI.KEYID = 6
1,174,192 UART: [idev] SUBJECT.KEYID = 7
1,174,617 UART: [idev] UDS.KEYID = 0
1,182,696 UART: [idev] Erasing UDS.KEYID = 0
1,199,550 UART: [idev] Sha1 KeyId Algorithm
1,208,490 UART: [idev] --
1,209,633 UART: [ldev] ++
1,209,801 UART: [ldev] CDI.KEYID = 6
1,210,165 UART: [ldev] SUBJECT.KEYID = 5
1,210,592 UART: [ldev] AUTHORITY.KEYID = 7
1,211,055 UART: [ldev] FE.KEYID = 1
1,216,435 UART: [ldev] Erasing FE.KEYID = 1
1,243,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,177 UART: [ldev] --
1,282,502 UART: [fwproc] Wait for Commands...
1,283,115 UART: [fwproc] Recv command 0x46574c44
1,283,848 UART: [fwproc] Recv'd Img size: 131072 bytes
2,773,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,226 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,911 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,380 >>> mbox cmd response: success
2,991,618 UART: [afmc] ++
2,991,786 UART: [afmc] CDI.KEYID = 6
2,992,149 UART: [afmc] SUBJECT.KEYID = 7
2,992,575 UART: [afmc] AUTHORITY.KEYID = 5
3,027,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,878 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,574 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,473 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,166 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,090 UART: [afmc] --
3,070,967 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,989 UART: [cold-reset] --
3,071,759 UART: [state] Locking Datavault
3,072,964 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,568 UART: [state] Locking ICCM
3,074,128 UART: [exit] Launching FMC @ 0x40000000
3,079,425 UART:
3,079,441 UART: Running Caliptra FMC ...
3,079,849 UART:
3,080,079 UART: [fmc] Received command: 0x1000000E
3,425,133 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,842,985 >>> mbox cmd response: success
2,898,474 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,904,811 UART:
2,904,827 UART: Running Caliptra FMC ...
2,905,235 UART:
2,905,465 UART: [fmc] Received command: 0x1000000E
3,250,519 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,552 UART: [state] LifecycleState = Unprovisioned
86,207 UART: [state] DebugLocked = No
86,767 UART: [state] WD Timer not started. Device not locked for debugging
88,036 UART: [kat] SHA2-256
891,586 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,690 UART: [kat] ++
895,842 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
916,421 UART: [kat] HMAC-384Kdf
921,069 UART: [kat] LMS
1,169,381 UART: [kat] --
1,170,158 UART: [cold-reset] ++
1,170,716 UART: [fht] FHT @ 0x50003400
1,173,472 UART: [idev] ++
1,173,640 UART: [idev] CDI.KEYID = 6
1,174,001 UART: [idev] SUBJECT.KEYID = 7
1,174,426 UART: [idev] UDS.KEYID = 0
1,182,409 UART: [idev] Erasing UDS.KEYID = 0
1,199,045 UART: [idev] Sha1 KeyId Algorithm
1,208,053 UART: [idev] --
1,209,076 UART: [ldev] ++
1,209,244 UART: [ldev] CDI.KEYID = 6
1,209,608 UART: [ldev] SUBJECT.KEYID = 5
1,210,035 UART: [ldev] AUTHORITY.KEYID = 7
1,210,498 UART: [ldev] FE.KEYID = 1
1,215,560 UART: [ldev] Erasing FE.KEYID = 1
1,241,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,712 UART: [ldev] --
1,281,155 UART: [fwproc] Wait for Commands...
1,281,780 UART: [fwproc] Recv command 0x46574c44
1,282,513 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,797,799 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,823,484 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,163 >>> mbox cmd response: success
2,989,205 UART: [afmc] ++
2,989,373 UART: [afmc] CDI.KEYID = 6
2,989,736 UART: [afmc] SUBJECT.KEYID = 7
2,990,162 UART: [afmc] AUTHORITY.KEYID = 5
3,025,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,041,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,042,543 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,048,239 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,138 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,059,831 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,067,539 UART: [afmc] --
3,068,564 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,068,586 UART: [cold-reset] --
3,069,334 UART: [state] Locking Datavault
3,070,563 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,167 UART: [state] Locking ICCM
3,071,665 UART: [exit] Launching FMC @ 0x40000000
3,076,962 UART:
3,076,978 UART: Running Caliptra FMC ...
3,077,386 UART:
3,077,616 UART: [fmc] Received command: 0x1000000E
3,422,670 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,842,418 >>> mbox cmd response: success
2,898,289 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,904,492 UART:
2,904,508 UART: Running Caliptra FMC ...
2,904,916 UART:
2,905,146 UART: [fmc] Received command: 0x1000000E
3,250,200 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,553 UART: [kat] ++
895,705 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,672 UART: [kat] SHA2-512-ACC
906,573 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,170,055 UART: [cold-reset] ++
1,170,497 UART: [fht] FHT @ 0x50003400
1,173,181 UART: [idev] ++
1,173,349 UART: [idev] CDI.KEYID = 6
1,173,710 UART: [idev] SUBJECT.KEYID = 7
1,174,135 UART: [idev] UDS.KEYID = 0
1,182,028 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha1 KeyId Algorithm
1,208,352 UART: [idev] --
1,209,241 UART: [ldev] ++
1,209,409 UART: [ldev] CDI.KEYID = 6
1,209,773 UART: [ldev] SUBJECT.KEYID = 5
1,210,200 UART: [ldev] AUTHORITY.KEYID = 7
1,210,663 UART: [ldev] FE.KEYID = 1
1,215,809 UART: [ldev] Erasing FE.KEYID = 1
1,242,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,299 UART: [ldev] --
1,281,582 UART: [fwproc] Wait for Commands...
1,282,177 UART: [fwproc] Recv command 0x46574c44
1,282,910 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,540 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,225 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,724 >>> mbox cmd response: success
2,990,980 UART: [afmc] ++
2,991,148 UART: [afmc] CDI.KEYID = 6
2,991,511 UART: [afmc] SUBJECT.KEYID = 7
2,991,937 UART: [afmc] AUTHORITY.KEYID = 5
3,027,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,486 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,182 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,057,081 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,774 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,664 UART: [afmc] --
3,071,487 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,509 UART: [cold-reset] --
3,072,267 UART: [state] Locking Datavault
3,073,356 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,960 UART: [state] Locking ICCM
3,074,460 UART: [exit] Launching FMC @ 0x40000000
3,079,757 UART:
3,079,773 UART: Running Caliptra FMC ...
3,080,181 UART:
3,080,411 UART: [fmc] Received command: 0x1000000E
3,425,465 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,843,127 >>> mbox cmd response: success
2,899,154 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,905,243 UART:
2,905,259 UART: Running Caliptra FMC ...
2,905,667 UART:
2,905,897 UART: [fmc] Received command: 0x1000000E
3,250,951 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,320 UART: [kat] ++
895,472 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
916,061 UART: [kat] HMAC-384Kdf
920,761 UART: [kat] LMS
1,169,073 UART: [kat] --
1,169,848 UART: [cold-reset] ++
1,170,198 UART: [fht] FHT @ 0x50003400
1,172,916 UART: [idev] ++
1,173,084 UART: [idev] CDI.KEYID = 6
1,173,445 UART: [idev] SUBJECT.KEYID = 7
1,173,870 UART: [idev] UDS.KEYID = 0
1,181,841 UART: [idev] Erasing UDS.KEYID = 0
1,198,973 UART: [idev] Sha1 KeyId Algorithm
1,207,853 UART: [idev] --
1,208,832 UART: [ldev] ++
1,209,000 UART: [ldev] CDI.KEYID = 6
1,209,364 UART: [ldev] SUBJECT.KEYID = 5
1,209,791 UART: [ldev] AUTHORITY.KEYID = 7
1,210,254 UART: [ldev] FE.KEYID = 1
1,215,642 UART: [ldev] Erasing FE.KEYID = 1
1,241,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,210 UART: [ldev] --
1,281,629 UART: [fwproc] Wait for Commands...
1,282,444 UART: [fwproc] Recv command 0x46574c44
1,283,177 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,291 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,976 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,481 >>> mbox cmd response: success
2,991,695 UART: [afmc] ++
2,991,863 UART: [afmc] CDI.KEYID = 6
2,992,226 UART: [afmc] SUBJECT.KEYID = 7
2,992,652 UART: [afmc] AUTHORITY.KEYID = 5
3,028,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,521 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,217 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,057,116 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,809 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,701 UART: [afmc] --
3,071,496 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,518 UART: [cold-reset] --
3,072,206 UART: [state] Locking Datavault
3,073,397 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,001 UART: [state] Locking ICCM
3,074,521 UART: [exit] Launching FMC @ 0x40000000
3,079,818 UART:
3,079,834 UART: Running Caliptra FMC ...
3,080,242 UART:
3,080,472 UART: [fmc] Received command: 0x1000000E
3,425,526 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,843,392 >>> mbox cmd response: success
2,898,755 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,904,882 UART:
2,904,898 UART: Running Caliptra FMC ...
2,905,306 UART:
2,905,536 UART: [fmc] Received command: 0x1000000E
3,250,590 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,599 UART: [kat] ++
895,751 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
916,218 UART: [kat] HMAC-384Kdf
920,834 UART: [kat] LMS
1,169,146 UART: [kat] --
1,170,135 UART: [cold-reset] ++
1,170,609 UART: [fht] FHT @ 0x50003400
1,173,257 UART: [idev] ++
1,173,425 UART: [idev] CDI.KEYID = 6
1,173,786 UART: [idev] SUBJECT.KEYID = 7
1,174,211 UART: [idev] UDS.KEYID = 0
1,182,346 UART: [idev] Erasing UDS.KEYID = 0
1,199,526 UART: [idev] Sha1 KeyId Algorithm
1,208,494 UART: [idev] --
1,209,497 UART: [ldev] ++
1,209,665 UART: [ldev] CDI.KEYID = 6
1,210,029 UART: [ldev] SUBJECT.KEYID = 5
1,210,456 UART: [ldev] AUTHORITY.KEYID = 7
1,210,919 UART: [ldev] FE.KEYID = 1
1,216,145 UART: [ldev] Erasing FE.KEYID = 1
1,242,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,799 UART: [ldev] --
1,282,128 UART: [fwproc] Wait for Commands...
1,282,709 UART: [fwproc] Recv command 0x46574c44
1,283,442 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,318 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,003 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,682 >>> mbox cmd response: success
2,990,806 UART: [afmc] ++
2,990,974 UART: [afmc] CDI.KEYID = 6
2,991,337 UART: [afmc] SUBJECT.KEYID = 7
2,991,763 UART: [afmc] AUTHORITY.KEYID = 5
3,027,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,043,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,748 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,444 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,343 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,036 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,914 UART: [afmc] --
3,070,869 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,891 UART: [cold-reset] --
3,071,903 UART: [state] Locking Datavault
3,073,110 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,714 UART: [state] Locking ICCM
3,074,216 UART: [exit] Launching FMC @ 0x40000000
3,079,513 UART:
3,079,529 UART: Running Caliptra FMC ...
3,079,937 UART:
3,080,167 UART: [fmc] Received command: 0x1000000E
3,425,221 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,841,525 >>> mbox cmd response: success
2,897,284 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,903,685 UART:
2,903,701 UART: Running Caliptra FMC ...
2,904,109 UART:
2,904,339 UART: [fmc] Received command: 0x1000000E
3,249,393 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
5,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
191,988 UART:
192,370 UART: Running Caliptra ROM ...
193,506 UART:
193,659 UART: [state] CFI Enabled
264,635 UART: [state] LifecycleState = Unprovisioned
266,580 UART: [state] DebugLocked = No
268,342 UART: [state] WD Timer not started. Device not locked for debugging
271,917 UART: [kat] SHA2-256
451,548 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,347 UART: [kat] ++
462,829 UART: [kat] sha1
473,448 UART: [kat] SHA2-256
476,142 UART: [kat] SHA2-384
481,960 UART: [kat] SHA2-512-ACC
484,352 UART: [kat] ECC-384
2,948,966 UART: [kat] HMAC-384Kdf
2,973,336 UART: [kat] LMS
3,449,820 UART: [kat] --
3,454,623 UART: [cold-reset] ++
3,455,853 UART: [fht] FHT @ 0x50003400
3,466,457 UART: [idev] ++
3,467,022 UART: [idev] CDI.KEYID = 6
3,468,045 UART: [idev] SUBJECT.KEYID = 7
3,469,212 UART: [idev] UDS.KEYID = 0
3,503,561 UART: [idev] Erasing UDS.KEYID = 0
5,991,172 UART: [idev] Sha1 KeyId Algorithm
6,015,044 UART: [idev] --
6,019,471 UART: [ldev] ++
6,020,040 UART: [ldev] CDI.KEYID = 6
6,021,064 UART: [ldev] SUBJECT.KEYID = 5
6,022,180 UART: [ldev] AUTHORITY.KEYID = 7
6,023,421 UART: [ldev] FE.KEYID = 1
6,058,520 UART: [ldev] Erasing FE.KEYID = 1
8,565,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,894 UART: [ldev] --
10,376,498 UART: [fwproc] Wait for Commands...
10,378,391 UART: [fwproc] Recv command 0x46574c44
10,380,386 UART: [fwproc] Recv'd Img size: 118548 bytes
10,463,666 UART: ROM Fatal Error: 0x000B0007
10,466,916 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
5,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,332,824 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
6,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,245 UART:
192,620 UART: Running Caliptra ROM ...
193,808 UART:
603,489 UART: [state] CFI Enabled
615,106 UART: [state] LifecycleState = Unprovisioned
617,060 UART: [state] DebugLocked = No
618,925 UART: [state] WD Timer not started. Device not locked for debugging
621,944 UART: [kat] SHA2-256
801,622 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,365 UART: [kat] ++
812,894 UART: [kat] sha1
824,470 UART: [kat] SHA2-256
827,150 UART: [kat] SHA2-384
832,636 UART: [kat] SHA2-512-ACC
835,031 UART: [kat] ECC-384
3,277,609 UART: [kat] HMAC-384Kdf
3,290,645 UART: [kat] LMS
3,767,137 UART: [kat] --
3,772,171 UART: [cold-reset] ++
3,773,350 UART: [fht] FHT @ 0x50003400
3,786,272 UART: [idev] ++
3,786,838 UART: [idev] CDI.KEYID = 6
3,787,798 UART: [idev] SUBJECT.KEYID = 7
3,789,009 UART: [idev] UDS.KEYID = 0
3,807,144 UART: [idev] Erasing UDS.KEYID = 0
6,265,858 UART: [idev] Sha1 KeyId Algorithm
6,289,351 UART: [idev] --
6,294,156 UART: [ldev] ++
6,294,725 UART: [ldev] CDI.KEYID = 6
6,295,685 UART: [ldev] SUBJECT.KEYID = 5
6,296,891 UART: [ldev] AUTHORITY.KEYID = 7
6,298,118 UART: [ldev] FE.KEYID = 1
6,309,817 UART: [ldev] Erasing FE.KEYID = 1
8,790,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,057 UART: [ldev] --
10,585,750 UART: [fwproc] Wait for Commands...
10,587,523 UART: [fwproc] Recv command 0x46574c44
10,589,565 UART: [fwproc] Recv'd Img size: 118548 bytes
10,668,536 UART: ROM Fatal Error: 0x000B0007
10,671,775 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
6,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,562,420 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
915,567 UART: [kat] HMAC-384Kdf
920,119 UART: [kat] LMS
1,168,431 UART: [kat] --
1,169,378 UART: [cold-reset] ++
1,169,958 UART: [fht] FHT @ 0x50003400
1,172,786 UART: [idev] ++
1,172,954 UART: [idev] CDI.KEYID = 6
1,173,315 UART: [idev] SUBJECT.KEYID = 7
1,173,740 UART: [idev] UDS.KEYID = 0
1,181,585 UART: [idev] Erasing UDS.KEYID = 0
1,197,861 UART: [idev] Sha1 KeyId Algorithm
1,206,741 UART: [idev] --
1,207,570 UART: [ldev] ++
1,207,738 UART: [ldev] CDI.KEYID = 6
1,208,102 UART: [ldev] SUBJECT.KEYID = 5
1,208,529 UART: [ldev] AUTHORITY.KEYID = 7
1,208,992 UART: [ldev] FE.KEYID = 1
1,214,260 UART: [ldev] Erasing FE.KEYID = 1
1,240,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,940 UART: [ldev] --
1,279,305 UART: [fwproc] Wait for Commands...
1,280,092 UART: [fwproc] Recv command 0x46574c44
1,280,825 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,801 UART: ROM Fatal Error: 0x000B0007
1,305,958 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,161,863 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,722 UART: [kat] SHA2-512-ACC
906,623 UART: [kat] ECC-384
916,678 UART: [kat] HMAC-384Kdf
921,362 UART: [kat] LMS
1,169,674 UART: [kat] --
1,170,587 UART: [cold-reset] ++
1,170,985 UART: [fht] FHT @ 0x50003400
1,173,661 UART: [idev] ++
1,173,829 UART: [idev] CDI.KEYID = 6
1,174,190 UART: [idev] SUBJECT.KEYID = 7
1,174,615 UART: [idev] UDS.KEYID = 0
1,182,876 UART: [idev] Erasing UDS.KEYID = 0
1,199,650 UART: [idev] Sha1 KeyId Algorithm
1,208,394 UART: [idev] --
1,209,343 UART: [ldev] ++
1,209,511 UART: [ldev] CDI.KEYID = 6
1,209,875 UART: [ldev] SUBJECT.KEYID = 5
1,210,302 UART: [ldev] AUTHORITY.KEYID = 7
1,210,765 UART: [ldev] FE.KEYID = 1
1,215,803 UART: [ldev] Erasing FE.KEYID = 1
1,242,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,587 UART: [ldev] --
1,281,992 UART: [fwproc] Wait for Commands...
1,282,733 UART: [fwproc] Recv command 0x46574c44
1,283,466 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,374 UART: ROM Fatal Error: 0x000B0007
1,308,531 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,916 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Unprovisioned
86,151 UART: [state] DebugLocked = No
86,705 UART: [state] WD Timer not started. Device not locked for debugging
87,942 UART: [kat] SHA2-256
891,492 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
900,134 UART: [kat] SHA2-256
902,074 UART: [kat] SHA2-384
904,739 UART: [kat] SHA2-512-ACC
906,640 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,275 UART: [kat] LMS
1,169,587 UART: [kat] --
1,170,462 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,540 UART: [idev] ++
1,173,708 UART: [idev] CDI.KEYID = 6
1,174,069 UART: [idev] SUBJECT.KEYID = 7
1,174,494 UART: [idev] UDS.KEYID = 0
1,182,567 UART: [idev] Erasing UDS.KEYID = 0
1,199,305 UART: [idev] Sha1 KeyId Algorithm
1,208,329 UART: [idev] --
1,209,376 UART: [ldev] ++
1,209,544 UART: [ldev] CDI.KEYID = 6
1,209,908 UART: [ldev] SUBJECT.KEYID = 5
1,210,335 UART: [ldev] AUTHORITY.KEYID = 7
1,210,798 UART: [ldev] FE.KEYID = 1
1,215,548 UART: [ldev] Erasing FE.KEYID = 1
1,241,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,536 UART: [ldev] --
1,280,891 UART: [fwproc] Wait for Commands...
1,281,660 UART: [fwproc] Recv command 0x46574c44
1,282,393 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,725 UART: ROM Fatal Error: 0x000B0007
1,307,882 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,113 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
891,605 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,709 UART: [kat] ++
895,861 UART: [kat] sha1
900,049 UART: [kat] SHA2-256
901,989 UART: [kat] SHA2-384
904,726 UART: [kat] SHA2-512-ACC
906,627 UART: [kat] ECC-384
916,782 UART: [kat] HMAC-384Kdf
921,580 UART: [kat] LMS
1,169,892 UART: [kat] --
1,170,643 UART: [cold-reset] ++
1,171,213 UART: [fht] FHT @ 0x50003400
1,173,801 UART: [idev] ++
1,173,969 UART: [idev] CDI.KEYID = 6
1,174,330 UART: [idev] SUBJECT.KEYID = 7
1,174,755 UART: [idev] UDS.KEYID = 0
1,182,774 UART: [idev] Erasing UDS.KEYID = 0
1,199,724 UART: [idev] Sha1 KeyId Algorithm
1,208,586 UART: [idev] --
1,209,665 UART: [ldev] ++
1,209,833 UART: [ldev] CDI.KEYID = 6
1,210,197 UART: [ldev] SUBJECT.KEYID = 5
1,210,624 UART: [ldev] AUTHORITY.KEYID = 7
1,211,087 UART: [ldev] FE.KEYID = 1
1,216,443 UART: [ldev] Erasing FE.KEYID = 1
1,243,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,519 UART: [ldev] --
1,282,846 UART: [fwproc] Wait for Commands...
1,283,523 UART: [fwproc] Recv command 0x46574c44
1,284,256 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,354 UART: ROM Fatal Error: 0x000B0007
1,309,511 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,950 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,590 UART: [state] LifecycleState = Unprovisioned
85,245 UART: [state] DebugLocked = No
85,895 UART: [state] WD Timer not started. Device not locked for debugging
87,122 UART: [kat] SHA2-256
890,672 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,776 UART: [kat] ++
894,928 UART: [kat] sha1
899,154 UART: [kat] SHA2-256
901,094 UART: [kat] SHA2-384
903,789 UART: [kat] SHA2-512-ACC
905,690 UART: [kat] ECC-384
915,595 UART: [kat] HMAC-384Kdf
920,279 UART: [kat] LMS
1,168,591 UART: [kat] --
1,169,538 UART: [cold-reset] ++
1,170,068 UART: [fht] FHT @ 0x50003400
1,172,530 UART: [idev] ++
1,172,698 UART: [idev] CDI.KEYID = 6
1,173,059 UART: [idev] SUBJECT.KEYID = 7
1,173,484 UART: [idev] UDS.KEYID = 0
1,181,227 UART: [idev] Erasing UDS.KEYID = 0
1,198,507 UART: [idev] Sha1 KeyId Algorithm
1,207,535 UART: [idev] --
1,208,608 UART: [ldev] ++
1,208,776 UART: [ldev] CDI.KEYID = 6
1,209,140 UART: [ldev] SUBJECT.KEYID = 5
1,209,567 UART: [ldev] AUTHORITY.KEYID = 7
1,210,030 UART: [ldev] FE.KEYID = 1
1,214,874 UART: [ldev] Erasing FE.KEYID = 1
1,240,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,472 UART: [ldev] --
1,279,803 UART: [fwproc] Wait for Commands...
1,280,616 UART: [fwproc] Recv command 0x46574c44
1,281,349 UART: [fwproc] Recv'd Img size: 118548 bytes
1,305,403 UART: ROM Fatal Error: 0x000B0007
1,306,560 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,355 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,488 UART: [state] DebugLocked = No
87,020 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
891,813 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,917 UART: [kat] ++
896,069 UART: [kat] sha1
900,271 UART: [kat] SHA2-256
902,211 UART: [kat] SHA2-384
904,906 UART: [kat] SHA2-512-ACC
906,807 UART: [kat] ECC-384
916,282 UART: [kat] HMAC-384Kdf
920,922 UART: [kat] LMS
1,169,234 UART: [kat] --
1,170,217 UART: [cold-reset] ++
1,170,543 UART: [fht] FHT @ 0x50003400
1,173,175 UART: [idev] ++
1,173,343 UART: [idev] CDI.KEYID = 6
1,173,704 UART: [idev] SUBJECT.KEYID = 7
1,174,129 UART: [idev] UDS.KEYID = 0
1,182,122 UART: [idev] Erasing UDS.KEYID = 0
1,200,068 UART: [idev] Sha1 KeyId Algorithm
1,209,062 UART: [idev] --
1,210,291 UART: [ldev] ++
1,210,459 UART: [ldev] CDI.KEYID = 6
1,210,823 UART: [ldev] SUBJECT.KEYID = 5
1,211,250 UART: [ldev] AUTHORITY.KEYID = 7
1,211,713 UART: [ldev] FE.KEYID = 1
1,216,815 UART: [ldev] Erasing FE.KEYID = 1
1,242,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,585 UART: [ldev] --
1,282,010 UART: [fwproc] Wait for Commands...
1,282,773 UART: [fwproc] Recv command 0x46574c44
1,283,506 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,540 UART: ROM Fatal Error: 0x000B0007
1,308,697 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,800 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
5,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,138 UART:
192,521 UART: Running Caliptra ROM ...
193,638 UART:
193,792 UART: [state] CFI Enabled
263,015 UART: [state] LifecycleState = Unprovisioned
264,977 UART: [state] DebugLocked = No
267,556 UART: [state] WD Timer not started. Device not locked for debugging
270,784 UART: [kat] SHA2-256
450,416 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,229 UART: [kat] ++
461,690 UART: [kat] sha1
473,871 UART: [kat] SHA2-256
476,569 UART: [kat] SHA2-384
482,123 UART: [kat] SHA2-512-ACC
484,464 UART: [kat] ECC-384
2,949,285 UART: [kat] HMAC-384Kdf
2,972,813 UART: [kat] LMS
3,449,305 UART: [kat] --
3,454,853 UART: [cold-reset] ++
3,456,412 UART: [fht] FHT @ 0x50003400
3,467,881 UART: [idev] ++
3,468,448 UART: [idev] CDI.KEYID = 6
3,469,463 UART: [idev] SUBJECT.KEYID = 7
3,470,644 UART: [idev] UDS.KEYID = 0
3,502,232 UART: [idev] Erasing UDS.KEYID = 0
5,987,835 UART: [idev] Sha1 KeyId Algorithm
6,012,375 UART: [idev] --
6,018,054 UART: [ldev] ++
6,018,634 UART: [ldev] CDI.KEYID = 6
6,019,524 UART: [ldev] SUBJECT.KEYID = 5
6,020,743 UART: [ldev] AUTHORITY.KEYID = 7
6,021,987 UART: [ldev] FE.KEYID = 1
6,058,383 UART: [ldev] Erasing FE.KEYID = 1
8,565,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,422 UART: [ldev] --
10,373,494 UART: [fwproc] Wait for Commands...
10,376,732 UART: [fwproc] Recv command 0x46574c44
10,378,776 UART: [fwproc] Recv'd Img size: 118548 bytes
10,466,819 UART: ROM Fatal Error: 0x000B0008
10,470,073 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
5,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,336,479 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
6,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,337 UART:
192,721 UART: Running Caliptra ROM ...
194,009 UART:
603,638 UART: [state] CFI Enabled
618,175 UART: [state] LifecycleState = Unprovisioned
620,125 UART: [state] DebugLocked = No
622,226 UART: [state] WD Timer not started. Device not locked for debugging
626,922 UART: [kat] SHA2-256
806,542 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,362 UART: [kat] ++
817,806 UART: [kat] sha1
828,981 UART: [kat] SHA2-256
831,686 UART: [kat] SHA2-384
836,874 UART: [kat] SHA2-512-ACC
839,207 UART: [kat] ECC-384
3,277,337 UART: [kat] HMAC-384Kdf
3,288,760 UART: [kat] LMS
3,765,294 UART: [kat] --
3,770,305 UART: [cold-reset] ++
3,771,430 UART: [fht] FHT @ 0x50003400
3,783,837 UART: [idev] ++
3,784,447 UART: [idev] CDI.KEYID = 6
3,785,386 UART: [idev] SUBJECT.KEYID = 7
3,786,594 UART: [idev] UDS.KEYID = 0
3,805,186 UART: [idev] Erasing UDS.KEYID = 0
6,264,153 UART: [idev] Sha1 KeyId Algorithm
6,289,472 UART: [idev] --
6,295,010 UART: [ldev] ++
6,295,609 UART: [ldev] CDI.KEYID = 6
6,296,496 UART: [ldev] SUBJECT.KEYID = 5
6,297,706 UART: [ldev] AUTHORITY.KEYID = 7
6,298,992 UART: [ldev] FE.KEYID = 1
6,310,407 UART: [ldev] Erasing FE.KEYID = 1
8,793,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,171 UART: [ldev] --
10,588,383 UART: [fwproc] Wait for Commands...
10,590,367 UART: [fwproc] Recv command 0x46574c44
10,592,406 UART: [fwproc] Recv'd Img size: 118548 bytes
10,681,771 UART: ROM Fatal Error: 0x000B0008
10,685,022 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
6,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,556,972 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,640 UART: [state] LifecycleState = Unprovisioned
86,295 UART: [state] DebugLocked = No
86,855 UART: [state] WD Timer not started. Device not locked for debugging
88,066 UART: [kat] SHA2-256
891,616 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,720 UART: [kat] ++
895,872 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,689 UART: [kat] SHA2-512-ACC
906,590 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,624 UART: [fht] FHT @ 0x50003400
1,173,302 UART: [idev] ++
1,173,470 UART: [idev] CDI.KEYID = 6
1,173,831 UART: [idev] SUBJECT.KEYID = 7
1,174,256 UART: [idev] UDS.KEYID = 0
1,182,207 UART: [idev] Erasing UDS.KEYID = 0
1,199,477 UART: [idev] Sha1 KeyId Algorithm
1,208,307 UART: [idev] --
1,209,158 UART: [ldev] ++
1,209,326 UART: [ldev] CDI.KEYID = 6
1,209,690 UART: [ldev] SUBJECT.KEYID = 5
1,210,117 UART: [ldev] AUTHORITY.KEYID = 7
1,210,580 UART: [ldev] FE.KEYID = 1
1,215,736 UART: [ldev] Erasing FE.KEYID = 1
1,242,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,022 UART: [ldev] --
1,281,431 UART: [fwproc] Wait for Commands...
1,282,118 UART: [fwproc] Recv command 0x46574c44
1,282,851 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,278 UART: ROM Fatal Error: 0x000B0008
1,308,435 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,800 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,821 UART: [kat] ++
895,973 UART: [kat] sha1
900,301 UART: [kat] SHA2-256
902,241 UART: [kat] SHA2-384
905,038 UART: [kat] SHA2-512-ACC
906,939 UART: [kat] ECC-384
916,574 UART: [kat] HMAC-384Kdf
921,150 UART: [kat] LMS
1,169,462 UART: [kat] --
1,170,135 UART: [cold-reset] ++
1,170,613 UART: [fht] FHT @ 0x50003400
1,173,107 UART: [idev] ++
1,173,275 UART: [idev] CDI.KEYID = 6
1,173,636 UART: [idev] SUBJECT.KEYID = 7
1,174,061 UART: [idev] UDS.KEYID = 0
1,182,316 UART: [idev] Erasing UDS.KEYID = 0
1,199,286 UART: [idev] Sha1 KeyId Algorithm
1,208,142 UART: [idev] --
1,209,165 UART: [ldev] ++
1,209,333 UART: [ldev] CDI.KEYID = 6
1,209,697 UART: [ldev] SUBJECT.KEYID = 5
1,210,124 UART: [ldev] AUTHORITY.KEYID = 7
1,210,587 UART: [ldev] FE.KEYID = 1
1,215,837 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,353 UART: [ldev] --
1,281,760 UART: [fwproc] Wait for Commands...
1,282,337 UART: [fwproc] Recv command 0x46574c44
1,283,070 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,987 UART: ROM Fatal Error: 0x000B0008
1,309,144 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,721 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,226 UART: [kat] ++
895,378 UART: [kat] sha1
899,472 UART: [kat] SHA2-256
901,412 UART: [kat] SHA2-384
903,999 UART: [kat] SHA2-512-ACC
905,900 UART: [kat] ECC-384
915,757 UART: [kat] HMAC-384Kdf
920,211 UART: [kat] LMS
1,168,523 UART: [kat] --
1,169,638 UART: [cold-reset] ++
1,170,036 UART: [fht] FHT @ 0x50003400
1,172,512 UART: [idev] ++
1,172,680 UART: [idev] CDI.KEYID = 6
1,173,041 UART: [idev] SUBJECT.KEYID = 7
1,173,466 UART: [idev] UDS.KEYID = 0
1,181,425 UART: [idev] Erasing UDS.KEYID = 0
1,198,453 UART: [idev] Sha1 KeyId Algorithm
1,207,513 UART: [idev] --
1,208,472 UART: [ldev] ++
1,208,640 UART: [ldev] CDI.KEYID = 6
1,209,004 UART: [ldev] SUBJECT.KEYID = 5
1,209,431 UART: [ldev] AUTHORITY.KEYID = 7
1,209,894 UART: [ldev] FE.KEYID = 1
1,215,290 UART: [ldev] Erasing FE.KEYID = 1
1,241,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,228 UART: [ldev] --
1,280,513 UART: [fwproc] Wait for Commands...
1,281,270 UART: [fwproc] Recv command 0x46574c44
1,282,003 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,452 UART: ROM Fatal Error: 0x000B0008
1,307,609 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,072 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,520 UART: [state] DebugLocked = No
87,172 UART: [state] WD Timer not started. Device not locked for debugging
88,395 UART: [kat] SHA2-256
891,945 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,049 UART: [kat] ++
896,201 UART: [kat] sha1
900,459 UART: [kat] SHA2-256
902,399 UART: [kat] SHA2-384
905,178 UART: [kat] SHA2-512-ACC
907,079 UART: [kat] ECC-384
916,610 UART: [kat] HMAC-384Kdf
921,444 UART: [kat] LMS
1,169,756 UART: [kat] --
1,170,733 UART: [cold-reset] ++
1,171,103 UART: [fht] FHT @ 0x50003400
1,173,965 UART: [idev] ++
1,174,133 UART: [idev] CDI.KEYID = 6
1,174,494 UART: [idev] SUBJECT.KEYID = 7
1,174,919 UART: [idev] UDS.KEYID = 0
1,182,816 UART: [idev] Erasing UDS.KEYID = 0
1,200,042 UART: [idev] Sha1 KeyId Algorithm
1,208,962 UART: [idev] --
1,209,939 UART: [ldev] ++
1,210,107 UART: [ldev] CDI.KEYID = 6
1,210,471 UART: [ldev] SUBJECT.KEYID = 5
1,210,898 UART: [ldev] AUTHORITY.KEYID = 7
1,211,361 UART: [ldev] FE.KEYID = 1
1,216,581 UART: [ldev] Erasing FE.KEYID = 1
1,242,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,281 UART: [ldev] --
1,281,536 UART: [fwproc] Wait for Commands...
1,282,317 UART: [fwproc] Recv command 0x46574c44
1,283,050 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,293 UART: ROM Fatal Error: 0x000B0008
1,309,450 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,789 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,076 UART: [kat] ++
895,228 UART: [kat] sha1
899,580 UART: [kat] SHA2-256
901,520 UART: [kat] SHA2-384
904,353 UART: [kat] SHA2-512-ACC
906,254 UART: [kat] ECC-384
916,027 UART: [kat] HMAC-384Kdf
920,531 UART: [kat] LMS
1,168,843 UART: [kat] --
1,169,832 UART: [cold-reset] ++
1,170,346 UART: [fht] FHT @ 0x50003400
1,173,058 UART: [idev] ++
1,173,226 UART: [idev] CDI.KEYID = 6
1,173,587 UART: [idev] SUBJECT.KEYID = 7
1,174,012 UART: [idev] UDS.KEYID = 0
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,199,357 UART: [idev] Sha1 KeyId Algorithm
1,208,145 UART: [idev] --
1,209,114 UART: [ldev] ++
1,209,282 UART: [ldev] CDI.KEYID = 6
1,209,646 UART: [ldev] SUBJECT.KEYID = 5
1,210,073 UART: [ldev] AUTHORITY.KEYID = 7
1,210,536 UART: [ldev] FE.KEYID = 1
1,216,088 UART: [ldev] Erasing FE.KEYID = 1
1,242,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,780 UART: [ldev] --
1,282,063 UART: [fwproc] Wait for Commands...
1,282,816 UART: [fwproc] Recv command 0x46574c44
1,283,549 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,368 UART: ROM Fatal Error: 0x000B0008
1,309,525 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,538 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,867 UART: [state] LifecycleState = Unprovisioned
86,522 UART: [state] DebugLocked = No
87,158 UART: [state] WD Timer not started. Device not locked for debugging
88,485 UART: [kat] SHA2-256
892,035 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,139 UART: [kat] ++
896,291 UART: [kat] sha1
900,603 UART: [kat] SHA2-256
902,543 UART: [kat] SHA2-384
905,276 UART: [kat] SHA2-512-ACC
907,177 UART: [kat] ECC-384
916,800 UART: [kat] HMAC-384Kdf
921,526 UART: [kat] LMS
1,169,838 UART: [kat] --
1,170,593 UART: [cold-reset] ++
1,170,947 UART: [fht] FHT @ 0x50003400
1,173,627 UART: [idev] ++
1,173,795 UART: [idev] CDI.KEYID = 6
1,174,156 UART: [idev] SUBJECT.KEYID = 7
1,174,581 UART: [idev] UDS.KEYID = 0
1,182,588 UART: [idev] Erasing UDS.KEYID = 0
1,199,758 UART: [idev] Sha1 KeyId Algorithm
1,208,634 UART: [idev] --
1,209,557 UART: [ldev] ++
1,209,725 UART: [ldev] CDI.KEYID = 6
1,210,089 UART: [ldev] SUBJECT.KEYID = 5
1,210,516 UART: [ldev] AUTHORITY.KEYID = 7
1,210,979 UART: [ldev] FE.KEYID = 1
1,216,309 UART: [ldev] Erasing FE.KEYID = 1
1,242,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,361 UART: [ldev] --
1,281,758 UART: [fwproc] Wait for Commands...
1,282,387 UART: [fwproc] Recv command 0x46574c44
1,283,120 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,843 UART: ROM Fatal Error: 0x000B0008
1,309,000 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,765 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
2,227,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,377,938 UART:
2,378,358 UART: Running Caliptra ROM ...
2,379,474 UART:
2,379,641 UART: [state] CFI Enabled
2,380,613 UART: [state] LifecycleState = Unprovisioned
2,382,273 UART: [state] DebugLocked = No
2,383,386 UART: [state] WD Timer not started. Device not locked for debugging
2,385,865 UART: [kat] SHA2-256
2,386,540 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,389,553 UART: [kat] ++
2,390,010 UART: [kat] sha1
2,390,535 UART: [kat] SHA2-256
2,391,279 UART: [kat] SHA2-384
2,391,972 UART: [kat] SHA2-512-ACC
2,392,811 UART: [kat] ECC-384
2,948,574 UART: [kat] HMAC-384Kdf
2,971,015 UART: [kat] LMS
3,447,463 UART: [kat] --
3,452,102 UART: [cold-reset] ++
3,453,120 UART: [fht] FHT @ 0x50003400
3,465,237 UART: [idev] ++
3,465,866 UART: [idev] CDI.KEYID = 6
3,466,780 UART: [idev] SUBJECT.KEYID = 7
3,468,053 UART: [idev] UDS.KEYID = 0
3,500,842 UART: [idev] Erasing UDS.KEYID = 0
5,984,853 UART: [idev] Sha1 KeyId Algorithm
6,007,989 UART: [idev] --
6,013,400 UART: [ldev] ++
6,013,980 UART: [ldev] CDI.KEYID = 6
6,014,971 UART: [ldev] SUBJECT.KEYID = 5
6,016,138 UART: [ldev] AUTHORITY.KEYID = 7
6,017,378 UART: [ldev] FE.KEYID = 1
6,057,384 UART: [ldev] Erasing FE.KEYID = 1
8,561,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,298 UART: [ldev] --
10,373,553 UART: [fwproc] Wait for Commands...
10,376,833 UART: [fwproc] Recv command 0x46574c44
10,378,838 UART: [fwproc] Recv'd Img size: 118548 bytes
10,468,161 UART: ROM Fatal Error: 0x000B0009
10,471,404 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
2,064,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,213,979 UART:
2,214,362 UART: Running Caliptra ROM ...
2,215,535 UART:
2,215,726 UART: [state] CFI Enabled
2,216,690 UART: [state] LifecycleState = Unprovisioned
2,218,356 UART: [state] DebugLocked = No
2,219,495 UART: [state] WD Timer not started. Device not locked for debugging
2,221,973 UART: [kat] SHA2-256
2,222,648 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,225,846 UART: [kat] ++
2,226,320 UART: [kat] sha1
2,226,843 UART: [kat] SHA2-256
2,227,591 UART: [kat] SHA2-384
2,228,266 UART: [kat] SHA2-512-ACC
2,229,112 UART: [kat] ECC-384
2,946,867 UART: [kat] HMAC-384Kdf
2,971,380 UART: [kat] LMS
3,447,904 UART: [kat] --
3,452,011 UART: [cold-reset] ++
3,453,948 UART: [fht] FHT @ 0x50003400
3,464,073 UART: [idev] ++
3,464,645 UART: [idev] CDI.KEYID = 6
3,465,686 UART: [idev] SUBJECT.KEYID = 7
3,466,856 UART: [idev] UDS.KEYID = 0
3,501,200 UART: [idev] Erasing UDS.KEYID = 0
5,984,792 UART: [idev] Sha1 KeyId Algorithm
6,009,108 UART: [idev] --
6,014,360 UART: [ldev] ++
6,014,942 UART: [ldev] CDI.KEYID = 6
6,015,837 UART: [ldev] SUBJECT.KEYID = 5
6,017,059 UART: [ldev] AUTHORITY.KEYID = 7
6,018,309 UART: [ldev] FE.KEYID = 1
6,058,399 UART: [ldev] Erasing FE.KEYID = 1
8,568,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,495 UART: [ldev] --
10,373,739 UART: [fwproc] Wait for Commands...
10,376,757 UART: [fwproc] Recv command 0x46574c44
10,378,748 UART: [fwproc] Recv'd Img size: 118548 bytes
10,465,101 UART: ROM Fatal Error: 0x000B0009
10,468,324 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
2,072,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,222,180 UART:
2,222,592 UART: Running Caliptra ROM ...
2,223,698 UART:
2,223,864 UART: [state] CFI Enabled
2,224,851 UART: [state] LifecycleState = Unprovisioned
2,226,507 UART: [state] DebugLocked = No
2,227,545 UART: [state] WD Timer not started. Device not locked for debugging
2,230,014 UART: [kat] SHA2-256
2,230,690 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,233,698 UART: [kat] ++
2,234,152 UART: [kat] sha1
2,234,670 UART: [kat] SHA2-256
2,235,335 UART: [kat] SHA2-384
2,236,001 UART: [kat] SHA2-512-ACC
2,236,820 UART: [kat] ECC-384
2,947,611 UART: [kat] HMAC-384Kdf
2,971,580 UART: [kat] LMS
3,448,035 UART: [kat] --
3,452,652 UART: [cold-reset] ++
3,454,653 UART: [fht] FHT @ 0x50003400
3,465,803 UART: [idev] ++
3,466,410 UART: [idev] CDI.KEYID = 6
3,467,342 UART: [idev] SUBJECT.KEYID = 7
3,468,566 UART: [idev] UDS.KEYID = 0
3,500,594 UART: [idev] Erasing UDS.KEYID = 0
5,985,463 UART: [idev] Sha1 KeyId Algorithm
6,008,373 UART: [idev] --
6,014,375 UART: [ldev] ++
6,014,952 UART: [ldev] CDI.KEYID = 6
6,015,870 UART: [ldev] SUBJECT.KEYID = 5
6,017,094 UART: [ldev] AUTHORITY.KEYID = 7
6,018,335 UART: [ldev] FE.KEYID = 1
6,055,602 UART: [ldev] Erasing FE.KEYID = 1
8,566,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,434 UART: [ldev] --
10,374,923 UART: [fwproc] Wait for Commands...
10,377,302 UART: [fwproc] Recv command 0x46574c44
10,379,293 UART: [fwproc] Recv'd Img size: 118548 bytes
10,466,831 UART: ROM Fatal Error: 0x000B0009
10,470,083 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,788 writing to cptra_bootfsm_go
2,059,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,209,552 UART:
2,210,012 UART: Running Caliptra ROM ...
2,211,103 UART:
2,211,276 UART: [state] CFI Enabled
2,212,252 UART: [state] LifecycleState = Unprovisioned
2,213,923 UART: [state] DebugLocked = No
2,214,962 UART: [state] WD Timer not started. Device not locked for debugging
2,217,436 UART: [kat] SHA2-256
2,218,113 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,221,112 UART: [kat] ++
2,221,565 UART: [kat] sha1
2,222,088 UART: [kat] SHA2-256
2,222,757 UART: [kat] SHA2-384
2,223,528 UART: [kat] SHA2-512-ACC
2,224,394 UART: [kat] ECC-384
2,947,967 UART: [kat] HMAC-384Kdf
2,970,876 UART: [kat] LMS
3,447,343 UART: [kat] --
3,452,377 UART: [cold-reset] ++
3,454,639 UART: [fht] FHT @ 0x50003400
3,464,594 UART: [idev] ++
3,465,173 UART: [idev] CDI.KEYID = 6
3,466,193 UART: [idev] SUBJECT.KEYID = 7
3,467,358 UART: [idev] UDS.KEYID = 0
3,501,385 UART: [idev] Erasing UDS.KEYID = 0
5,984,939 UART: [idev] Sha1 KeyId Algorithm
6,010,173 UART: [idev] --
6,014,988 UART: [ldev] ++
6,015,569 UART: [ldev] CDI.KEYID = 6
6,016,505 UART: [ldev] SUBJECT.KEYID = 5
6,017,677 UART: [ldev] AUTHORITY.KEYID = 7
6,018,913 UART: [ldev] FE.KEYID = 1
6,057,069 UART: [ldev] Erasing FE.KEYID = 1
8,565,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,307 UART: [ldev] --
10,372,371 UART: [fwproc] Wait for Commands...
10,375,240 UART: [fwproc] Recv command 0x46574c44
10,377,235 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,935,750 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,789 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,153 >>> mbox cmd response: success
14,341,120 UART: [afmc] ++
14,341,713 UART: [afmc] CDI.KEYID = 6
14,342,599 UART: [afmc] SUBJECT.KEYID = 7
14,343,769 UART: [afmc] AUTHORITY.KEYID = 5
16,872,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,614,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,616,308 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,632,183 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,648,203 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,663,834 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,687,671 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,233,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,317,257 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
2,065,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,331,208 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,818 writing to cptra_bootfsm_go
2,065,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,335,523 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
2,076,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,209,588 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
2,237,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,387,781 UART:
2,388,202 UART: Running Caliptra ROM ...
2,389,376 UART:
2,389,544 UART: [state] CFI Enabled
2,390,501 UART: [state] LifecycleState = Unprovisioned
2,392,159 UART: [state] DebugLocked = No
2,393,287 UART: [state] WD Timer not started. Device not locked for debugging
2,395,759 UART: [kat] SHA2-256
2,396,429 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,399,431 UART: [kat] ++
2,399,880 UART: [kat] sha1
2,400,387 UART: [kat] SHA2-256
2,401,123 UART: [kat] SHA2-384
2,401,787 UART: [kat] SHA2-512-ACC
2,402,621 UART: [kat] ECC-384
3,282,463 UART: [kat] HMAC-384Kdf
3,293,662 UART: [kat] LMS
3,770,200 UART: [kat] --
3,775,799 UART: [cold-reset] ++
3,777,853 UART: [fht] FHT @ 0x50003400
3,788,452 UART: [idev] ++
3,789,017 UART: [idev] CDI.KEYID = 6
3,790,037 UART: [idev] SUBJECT.KEYID = 7
3,791,196 UART: [idev] UDS.KEYID = 0
3,808,431 UART: [idev] Erasing UDS.KEYID = 0
6,268,801 UART: [idev] Sha1 KeyId Algorithm
6,293,953 UART: [idev] --
6,299,569 UART: [ldev] ++
6,300,153 UART: [ldev] CDI.KEYID = 6
6,301,036 UART: [ldev] SUBJECT.KEYID = 5
6,302,302 UART: [ldev] AUTHORITY.KEYID = 7
6,303,534 UART: [ldev] FE.KEYID = 1
6,314,640 UART: [ldev] Erasing FE.KEYID = 1
8,788,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,765 UART: [ldev] --
10,582,651 UART: [fwproc] Wait for Commands...
10,585,066 UART: [fwproc] Recv command 0x46574c44
10,587,109 UART: [fwproc] Recv'd Img size: 118548 bytes
10,673,781 UART: ROM Fatal Error: 0x000B0009
10,677,029 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
2,070,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,220,077 UART:
2,220,483 UART: Running Caliptra ROM ...
2,221,560 UART:
2,221,716 UART: [state] CFI Enabled
2,222,582 UART: [state] LifecycleState = Unprovisioned
2,224,241 UART: [state] DebugLocked = No
2,225,358 UART: [state] WD Timer not started. Device not locked for debugging
2,227,836 UART: [kat] SHA2-256
2,228,503 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,231,503 UART: [kat] ++
2,231,976 UART: [kat] sha1
2,232,489 UART: [kat] SHA2-256
2,233,140 UART: [kat] SHA2-384
2,233,792 UART: [kat] SHA2-512-ACC
2,234,589 UART: [kat] ECC-384
3,281,366 UART: [kat] HMAC-384Kdf
3,294,820 UART: [kat] LMS
3,771,340 UART: [kat] --
3,777,052 UART: [cold-reset] ++
3,778,549 UART: [fht] FHT @ 0x50003400
3,789,522 UART: [idev] ++
3,790,274 UART: [idev] CDI.KEYID = 6
3,791,159 UART: [idev] SUBJECT.KEYID = 7
3,792,255 UART: [idev] UDS.KEYID = 0
3,809,621 UART: [idev] Erasing UDS.KEYID = 0
6,266,495 UART: [idev] Sha1 KeyId Algorithm
6,289,808 UART: [idev] --
6,294,861 UART: [ldev] ++
6,295,447 UART: [ldev] CDI.KEYID = 6
6,296,409 UART: [ldev] SUBJECT.KEYID = 5
6,297,565 UART: [ldev] AUTHORITY.KEYID = 7
6,298,853 UART: [ldev] FE.KEYID = 1
6,308,194 UART: [ldev] Erasing FE.KEYID = 1
8,785,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,155 UART: [ldev] --
10,583,236 UART: [fwproc] Wait for Commands...
10,585,168 UART: [fwproc] Recv command 0x46574c44
10,587,207 UART: [fwproc] Recv'd Img size: 118548 bytes
10,675,755 UART: ROM Fatal Error: 0x000B0009
10,678,951 >>> mbox cmd response: failed
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
2,075,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,225,061 UART:
2,225,484 UART: Running Caliptra ROM ...
2,226,565 UART:
2,226,714 UART: [state] CFI Enabled
2,227,627 UART: [state] LifecycleState = Unprovisioned
2,229,274 UART: [state] DebugLocked = No
2,230,322 UART: [state] WD Timer not started. Device not locked for debugging
2,232,790 UART: [kat] SHA2-256
2,233,456 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,236,463 UART: [kat] ++
2,236,910 UART: [kat] sha1
2,237,418 UART: [kat] SHA2-256
2,238,069 UART: [kat] SHA2-384
2,238,723 UART: [kat] SHA2-512-ACC
2,239,518 UART: [kat] ECC-384
3,276,567 UART: [kat] HMAC-384Kdf
3,288,789 UART: [kat] LMS
3,765,261 UART: [kat] --
3,769,874 UART: [cold-reset] ++
3,772,342 UART: [fht] FHT @ 0x50003400
3,783,319 UART: [idev] ++
3,783,931 UART: [idev] CDI.KEYID = 6
3,784,862 UART: [idev] SUBJECT.KEYID = 7
3,786,077 UART: [idev] UDS.KEYID = 0
3,803,837 UART: [idev] Erasing UDS.KEYID = 0
6,264,674 UART: [idev] Sha1 KeyId Algorithm
6,288,444 UART: [idev] --
6,293,253 UART: [ldev] ++
6,293,821 UART: [ldev] CDI.KEYID = 6
6,294,836 UART: [ldev] SUBJECT.KEYID = 5
6,295,994 UART: [ldev] AUTHORITY.KEYID = 7
6,297,220 UART: [ldev] FE.KEYID = 1
6,308,404 UART: [ldev] Erasing FE.KEYID = 1
8,787,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,210 UART: [ldev] --
10,580,521 UART: [fwproc] Wait for Commands...
10,582,948 UART: [fwproc] Recv command 0x46574c44
10,584,989 UART: [fwproc] Recv'd Img size: 118548 bytes
10,675,208 UART: ROM Fatal Error: 0x000B0009
10,678,414 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,806 writing to cptra_bootfsm_go
2,063,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,213,558 UART:
2,213,984 UART: Running Caliptra ROM ...
2,215,073 UART:
2,215,227 UART: [state] CFI Enabled
2,216,188 UART: [state] LifecycleState = Unprovisioned
2,217,843 UART: [state] DebugLocked = No
2,218,869 UART: [state] WD Timer not started. Device not locked for debugging
2,221,336 UART: [kat] SHA2-256
2,221,996 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,224,986 UART: [kat] ++
2,225,430 UART: [kat] sha1
2,225,938 UART: [kat] SHA2-256
2,226,590 UART: [kat] SHA2-384
2,227,245 UART: [kat] SHA2-512-ACC
2,228,041 UART: [kat] ECC-384
3,281,130 UART: [kat] HMAC-384Kdf
3,293,794 UART: [kat] LMS
3,770,322 UART: [kat] --
3,774,911 UART: [cold-reset] ++
3,776,624 UART: [fht] FHT @ 0x50003400
3,788,460 UART: [idev] ++
3,789,085 UART: [idev] CDI.KEYID = 6
3,790,010 UART: [idev] SUBJECT.KEYID = 7
3,791,225 UART: [idev] UDS.KEYID = 0
3,810,063 UART: [idev] Erasing UDS.KEYID = 0
6,274,666 UART: [idev] Sha1 KeyId Algorithm
6,299,465 UART: [idev] --
6,303,238 UART: [ldev] ++
6,303,809 UART: [ldev] CDI.KEYID = 6
6,304,690 UART: [ldev] SUBJECT.KEYID = 5
6,305,899 UART: [ldev] AUTHORITY.KEYID = 7
6,307,181 UART: [ldev] FE.KEYID = 1
6,319,118 UART: [ldev] Erasing FE.KEYID = 1
8,802,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,588,104 UART: [ldev] --
10,593,155 UART: [fwproc] Wait for Commands...
10,595,359 UART: [fwproc] Recv command 0x46574c44
10,597,408 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,158,337 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,366 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,343 >>> mbox cmd response: success
14,562,644 UART: [afmc] ++
14,563,256 UART: [afmc] CDI.KEYID = 6
14,564,225 UART: [afmc] SUBJECT.KEYID = 7
14,565,460 UART: [afmc] AUTHORITY.KEYID = 5
17,070,596 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,796,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,798,207 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,814,100 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,830,134 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,845,722 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,869,762 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
2,232,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,561,539 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
2,081,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,567,550 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,068,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,567,491 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
2,071,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,432,979 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
891,380 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,363 UART: [kat] HMAC-384Kdf
920,991 UART: [kat] LMS
1,169,303 UART: [kat] --
1,169,900 UART: [cold-reset] ++
1,170,462 UART: [fht] FHT @ 0x50003400
1,173,052 UART: [idev] ++
1,173,220 UART: [idev] CDI.KEYID = 6
1,173,581 UART: [idev] SUBJECT.KEYID = 7
1,174,006 UART: [idev] UDS.KEYID = 0
1,182,147 UART: [idev] Erasing UDS.KEYID = 0
1,198,491 UART: [idev] Sha1 KeyId Algorithm
1,207,353 UART: [idev] --
1,208,454 UART: [ldev] ++
1,208,622 UART: [ldev] CDI.KEYID = 6
1,208,986 UART: [ldev] SUBJECT.KEYID = 5
1,209,413 UART: [ldev] AUTHORITY.KEYID = 7
1,209,876 UART: [ldev] FE.KEYID = 1
1,215,046 UART: [ldev] Erasing FE.KEYID = 1
1,241,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,498 UART: [ldev] --
1,280,803 UART: [fwproc] Wait for Commands...
1,281,392 UART: [fwproc] Recv command 0x46574c44
1,282,125 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,412 UART: ROM Fatal Error: 0x000B0009
1,308,569 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
891,568 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,672 UART: [kat] ++
895,824 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
916,001 UART: [kat] HMAC-384Kdf
920,615 UART: [kat] LMS
1,168,927 UART: [kat] --
1,169,594 UART: [cold-reset] ++
1,170,068 UART: [fht] FHT @ 0x50003400
1,172,802 UART: [idev] ++
1,172,970 UART: [idev] CDI.KEYID = 6
1,173,331 UART: [idev] SUBJECT.KEYID = 7
1,173,756 UART: [idev] UDS.KEYID = 0
1,181,559 UART: [idev] Erasing UDS.KEYID = 0
1,199,087 UART: [idev] Sha1 KeyId Algorithm
1,207,823 UART: [idev] --
1,208,898 UART: [ldev] ++
1,209,066 UART: [ldev] CDI.KEYID = 6
1,209,430 UART: [ldev] SUBJECT.KEYID = 5
1,209,857 UART: [ldev] AUTHORITY.KEYID = 7
1,210,320 UART: [ldev] FE.KEYID = 1
1,215,482 UART: [ldev] Erasing FE.KEYID = 1
1,242,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,372 UART: [ldev] --
1,280,699 UART: [fwproc] Wait for Commands...
1,281,414 UART: [fwproc] Recv command 0x46574c44
1,282,147 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,190 UART: ROM Fatal Error: 0x000B0009
1,308,347 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,787 UART: [state] WD Timer not started. Device not locked for debugging
88,102 UART: [kat] SHA2-256
891,652 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,756 UART: [kat] ++
895,908 UART: [kat] sha1
900,038 UART: [kat] SHA2-256
901,978 UART: [kat] SHA2-384
904,801 UART: [kat] SHA2-512-ACC
906,702 UART: [kat] ECC-384
916,499 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,168 UART: [cold-reset] ++
1,170,586 UART: [fht] FHT @ 0x50003400
1,173,214 UART: [idev] ++
1,173,382 UART: [idev] CDI.KEYID = 6
1,173,743 UART: [idev] SUBJECT.KEYID = 7
1,174,168 UART: [idev] UDS.KEYID = 0
1,182,083 UART: [idev] Erasing UDS.KEYID = 0
1,198,801 UART: [idev] Sha1 KeyId Algorithm
1,207,751 UART: [idev] --
1,208,774 UART: [ldev] ++
1,208,942 UART: [ldev] CDI.KEYID = 6
1,209,306 UART: [ldev] SUBJECT.KEYID = 5
1,209,733 UART: [ldev] AUTHORITY.KEYID = 7
1,210,196 UART: [ldev] FE.KEYID = 1
1,215,466 UART: [ldev] Erasing FE.KEYID = 1
1,241,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,308 UART: [ldev] --
1,281,613 UART: [fwproc] Wait for Commands...
1,282,188 UART: [fwproc] Recv command 0x46574c44
1,282,921 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,840 UART: ROM Fatal Error: 0x000B0009
1,308,997 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,440 UART: [kat] ++
895,592 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,185 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,169,926 UART: [cold-reset] ++
1,170,440 UART: [fht] FHT @ 0x50003400
1,173,084 UART: [idev] ++
1,173,252 UART: [idev] CDI.KEYID = 6
1,173,613 UART: [idev] SUBJECT.KEYID = 7
1,174,038 UART: [idev] UDS.KEYID = 0
1,182,069 UART: [idev] Erasing UDS.KEYID = 0
1,199,061 UART: [idev] Sha1 KeyId Algorithm
1,208,047 UART: [idev] --
1,209,104 UART: [ldev] ++
1,209,272 UART: [ldev] CDI.KEYID = 6
1,209,636 UART: [ldev] SUBJECT.KEYID = 5
1,210,063 UART: [ldev] AUTHORITY.KEYID = 7
1,210,526 UART: [ldev] FE.KEYID = 1
1,215,674 UART: [ldev] Erasing FE.KEYID = 1
1,242,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,864 UART: [ldev] --
1,281,221 UART: [fwproc] Wait for Commands...
1,282,020 UART: [fwproc] Recv command 0x46574c44
1,282,753 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,290 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,465 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,692 >>> mbox cmd response: success
2,826,866 UART: [afmc] ++
2,827,034 UART: [afmc] CDI.KEYID = 6
2,827,397 UART: [afmc] SUBJECT.KEYID = 7
2,827,823 UART: [afmc] AUTHORITY.KEYID = 5
2,863,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,079 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,791 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,674 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,387 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,191 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,514 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,623 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,961 UART: [state] LifecycleState = Unprovisioned
85,616 UART: [state] DebugLocked = No
86,252 UART: [state] WD Timer not started. Device not locked for debugging
87,411 UART: [kat] SHA2-256
890,961 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,065 UART: [kat] ++
895,217 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,120 UART: [kat] SHA2-512-ACC
906,021 UART: [kat] ECC-384
915,418 UART: [kat] HMAC-384Kdf
920,012 UART: [kat] LMS
1,168,324 UART: [kat] --
1,169,179 UART: [cold-reset] ++
1,169,695 UART: [fht] FHT @ 0x50003400
1,172,187 UART: [idev] ++
1,172,355 UART: [idev] CDI.KEYID = 6
1,172,716 UART: [idev] SUBJECT.KEYID = 7
1,173,141 UART: [idev] UDS.KEYID = 0
1,181,602 UART: [idev] Erasing UDS.KEYID = 0
1,198,352 UART: [idev] Sha1 KeyId Algorithm
1,207,210 UART: [idev] --
1,208,427 UART: [ldev] ++
1,208,595 UART: [ldev] CDI.KEYID = 6
1,208,959 UART: [ldev] SUBJECT.KEYID = 5
1,209,386 UART: [ldev] AUTHORITY.KEYID = 7
1,209,849 UART: [ldev] FE.KEYID = 1
1,215,161 UART: [ldev] Erasing FE.KEYID = 1
1,241,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,395 UART: [ldev] --
1,280,814 UART: [fwproc] Wait for Commands...
1,281,439 UART: [fwproc] Recv command 0x46574c44
1,282,172 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,909 UART: ROM Fatal Error: 0x000B0009
1,308,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,395 UART: [kat] SHA2-256
891,945 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,049 UART: [kat] ++
896,201 UART: [kat] sha1
900,393 UART: [kat] SHA2-256
902,333 UART: [kat] SHA2-384
904,978 UART: [kat] SHA2-512-ACC
906,879 UART: [kat] ECC-384
916,366 UART: [kat] HMAC-384Kdf
920,994 UART: [kat] LMS
1,169,306 UART: [kat] --
1,170,509 UART: [cold-reset] ++
1,170,925 UART: [fht] FHT @ 0x50003400
1,173,537 UART: [idev] ++
1,173,705 UART: [idev] CDI.KEYID = 6
1,174,066 UART: [idev] SUBJECT.KEYID = 7
1,174,491 UART: [idev] UDS.KEYID = 0
1,182,350 UART: [idev] Erasing UDS.KEYID = 0
1,198,950 UART: [idev] Sha1 KeyId Algorithm
1,207,906 UART: [idev] --
1,208,845 UART: [ldev] ++
1,209,013 UART: [ldev] CDI.KEYID = 6
1,209,377 UART: [ldev] SUBJECT.KEYID = 5
1,209,804 UART: [ldev] AUTHORITY.KEYID = 7
1,210,267 UART: [ldev] FE.KEYID = 1
1,215,471 UART: [ldev] Erasing FE.KEYID = 1
1,241,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,743 UART: [ldev] --
1,281,152 UART: [fwproc] Wait for Commands...
1,281,899 UART: [fwproc] Recv command 0x46574c44
1,282,632 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,579 UART: ROM Fatal Error: 0x000B0009
1,308,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Unprovisioned
85,734 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,509 UART: [kat] SHA2-256
891,059 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,163 UART: [kat] ++
895,315 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
915,902 UART: [kat] HMAC-384Kdf
920,608 UART: [kat] LMS
1,168,920 UART: [kat] --
1,169,757 UART: [cold-reset] ++
1,170,259 UART: [fht] FHT @ 0x50003400
1,173,113 UART: [idev] ++
1,173,281 UART: [idev] CDI.KEYID = 6
1,173,642 UART: [idev] SUBJECT.KEYID = 7
1,174,067 UART: [idev] UDS.KEYID = 0
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,199,838 UART: [idev] Sha1 KeyId Algorithm
1,208,658 UART: [idev] --
1,209,645 UART: [ldev] ++
1,209,813 UART: [ldev] CDI.KEYID = 6
1,210,177 UART: [ldev] SUBJECT.KEYID = 5
1,210,604 UART: [ldev] AUTHORITY.KEYID = 7
1,211,067 UART: [ldev] FE.KEYID = 1
1,216,545 UART: [ldev] Erasing FE.KEYID = 1
1,243,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,397 UART: [ldev] --
1,282,776 UART: [fwproc] Wait for Commands...
1,283,477 UART: [fwproc] Recv command 0x46574c44
1,284,210 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,531 UART: ROM Fatal Error: 0x000B0009
1,310,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
891,411 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,622 UART: [kat] HMAC-384Kdf
921,166 UART: [kat] LMS
1,169,478 UART: [kat] --
1,170,307 UART: [cold-reset] ++
1,170,667 UART: [fht] FHT @ 0x50003400
1,173,403 UART: [idev] ++
1,173,571 UART: [idev] CDI.KEYID = 6
1,173,932 UART: [idev] SUBJECT.KEYID = 7
1,174,357 UART: [idev] UDS.KEYID = 0
1,182,538 UART: [idev] Erasing UDS.KEYID = 0
1,199,136 UART: [idev] Sha1 KeyId Algorithm
1,208,028 UART: [idev] --
1,209,063 UART: [ldev] ++
1,209,231 UART: [ldev] CDI.KEYID = 6
1,209,595 UART: [ldev] SUBJECT.KEYID = 5
1,210,022 UART: [ldev] AUTHORITY.KEYID = 7
1,210,485 UART: [ldev] FE.KEYID = 1
1,215,907 UART: [ldev] Erasing FE.KEYID = 1
1,242,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,833 UART: [ldev] --
1,282,036 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,570 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,901 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,076 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,469 >>> mbox cmd response: success
2,827,559 UART: [afmc] ++
2,827,727 UART: [afmc] CDI.KEYID = 6
2,828,090 UART: [afmc] SUBJECT.KEYID = 7
2,828,516 UART: [afmc] AUTHORITY.KEYID = 5
2,864,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,139 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,888 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,600 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,483 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,196 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,918 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,263 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,247 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,810 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,731 UART: [kat] LMS
1,169,043 UART: [kat] --
1,169,602 UART: [cold-reset] ++
1,170,066 UART: [fht] FHT @ 0x50003400
1,172,626 UART: [idev] ++
1,172,794 UART: [idev] CDI.KEYID = 6
1,173,155 UART: [idev] SUBJECT.KEYID = 7
1,173,580 UART: [idev] UDS.KEYID = 0
1,181,953 UART: [idev] Erasing UDS.KEYID = 0
1,199,009 UART: [idev] Sha1 KeyId Algorithm
1,207,915 UART: [idev] --
1,209,156 UART: [ldev] ++
1,209,324 UART: [ldev] CDI.KEYID = 6
1,209,688 UART: [ldev] SUBJECT.KEYID = 5
1,210,115 UART: [ldev] AUTHORITY.KEYID = 7
1,210,578 UART: [ldev] FE.KEYID = 1
1,215,666 UART: [ldev] Erasing FE.KEYID = 1
1,241,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,632 UART: [ldev] --
1,281,081 UART: [fwproc] Wait for Commands...
1,281,748 UART: [fwproc] Recv command 0x46574c44
1,282,481 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,432 UART: ROM Fatal Error: 0x000B0009
1,308,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,646 UART: [state] LifecycleState = Unprovisioned
86,301 UART: [state] DebugLocked = No
87,005 UART: [state] WD Timer not started. Device not locked for debugging
88,304 UART: [kat] SHA2-256
891,854 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,958 UART: [kat] ++
896,110 UART: [kat] sha1
900,280 UART: [kat] SHA2-256
902,220 UART: [kat] SHA2-384
905,015 UART: [kat] SHA2-512-ACC
906,916 UART: [kat] ECC-384
916,623 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,170,246 UART: [cold-reset] ++
1,170,654 UART: [fht] FHT @ 0x50003400
1,173,266 UART: [idev] ++
1,173,434 UART: [idev] CDI.KEYID = 6
1,173,795 UART: [idev] SUBJECT.KEYID = 7
1,174,220 UART: [idev] UDS.KEYID = 0
1,182,091 UART: [idev] Erasing UDS.KEYID = 0
1,199,585 UART: [idev] Sha1 KeyId Algorithm
1,208,419 UART: [idev] --
1,209,440 UART: [ldev] ++
1,209,608 UART: [ldev] CDI.KEYID = 6
1,209,972 UART: [ldev] SUBJECT.KEYID = 5
1,210,399 UART: [ldev] AUTHORITY.KEYID = 7
1,210,862 UART: [ldev] FE.KEYID = 1
1,216,390 UART: [ldev] Erasing FE.KEYID = 1
1,242,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,800 UART: [ldev] --
1,282,085 UART: [fwproc] Wait for Commands...
1,282,780 UART: [fwproc] Recv command 0x46574c44
1,283,513 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,068 UART: ROM Fatal Error: 0x000B0009
1,310,225 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
891,048 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,152 UART: [kat] ++
895,304 UART: [kat] sha1
899,688 UART: [kat] SHA2-256
901,628 UART: [kat] SHA2-384
904,297 UART: [kat] SHA2-512-ACC
906,198 UART: [kat] ECC-384
915,935 UART: [kat] HMAC-384Kdf
920,655 UART: [kat] LMS
1,168,967 UART: [kat] --
1,169,910 UART: [cold-reset] ++
1,170,432 UART: [fht] FHT @ 0x50003400
1,173,046 UART: [idev] ++
1,173,214 UART: [idev] CDI.KEYID = 6
1,173,575 UART: [idev] SUBJECT.KEYID = 7
1,174,000 UART: [idev] UDS.KEYID = 0
1,182,177 UART: [idev] Erasing UDS.KEYID = 0
1,199,725 UART: [idev] Sha1 KeyId Algorithm
1,208,367 UART: [idev] --
1,209,222 UART: [ldev] ++
1,209,390 UART: [ldev] CDI.KEYID = 6
1,209,754 UART: [ldev] SUBJECT.KEYID = 5
1,210,181 UART: [ldev] AUTHORITY.KEYID = 7
1,210,644 UART: [ldev] FE.KEYID = 1
1,215,852 UART: [ldev] Erasing FE.KEYID = 1
1,242,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,294 UART: [ldev] --
1,281,533 UART: [fwproc] Wait for Commands...
1,282,154 UART: [fwproc] Recv command 0x46574c44
1,282,887 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,228 UART: ROM Fatal Error: 0x000B0009
1,309,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,628 UART: [state] LifecycleState = Unprovisioned
85,283 UART: [state] DebugLocked = No
85,915 UART: [state] WD Timer not started. Device not locked for debugging
87,134 UART: [kat] SHA2-256
890,684 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,788 UART: [kat] ++
894,940 UART: [kat] sha1
899,318 UART: [kat] SHA2-256
901,258 UART: [kat] SHA2-384
904,165 UART: [kat] SHA2-512-ACC
906,066 UART: [kat] ECC-384
915,939 UART: [kat] HMAC-384Kdf
920,393 UART: [kat] LMS
1,168,705 UART: [kat] --
1,169,616 UART: [cold-reset] ++
1,170,036 UART: [fht] FHT @ 0x50003400
1,172,598 UART: [idev] ++
1,172,766 UART: [idev] CDI.KEYID = 6
1,173,127 UART: [idev] SUBJECT.KEYID = 7
1,173,552 UART: [idev] UDS.KEYID = 0
1,181,573 UART: [idev] Erasing UDS.KEYID = 0
1,198,621 UART: [idev] Sha1 KeyId Algorithm
1,207,513 UART: [idev] --
1,208,468 UART: [ldev] ++
1,208,636 UART: [ldev] CDI.KEYID = 6
1,209,000 UART: [ldev] SUBJECT.KEYID = 5
1,209,427 UART: [ldev] AUTHORITY.KEYID = 7
1,209,890 UART: [ldev] FE.KEYID = 1
1,215,338 UART: [ldev] Erasing FE.KEYID = 1
1,241,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,686 UART: [ldev] --
1,281,123 UART: [fwproc] Wait for Commands...
1,281,862 UART: [fwproc] Recv command 0x46574c44
1,282,595 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,954 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,129 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,504 >>> mbox cmd response: success
2,826,592 UART: [afmc] ++
2,826,760 UART: [afmc] CDI.KEYID = 6
2,827,123 UART: [afmc] SUBJECT.KEYID = 7
2,827,549 UART: [afmc] AUTHORITY.KEYID = 5
2,862,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,071 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,783 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,666 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,379 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,141 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,482 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,797 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
891,423 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,527 UART: [kat] ++
895,679 UART: [kat] sha1
899,991 UART: [kat] SHA2-256
901,931 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,282 UART: [kat] HMAC-384Kdf
920,850 UART: [kat] LMS
1,169,162 UART: [kat] --
1,169,765 UART: [cold-reset] ++
1,170,115 UART: [fht] FHT @ 0x50003400
1,172,769 UART: [idev] ++
1,172,937 UART: [idev] CDI.KEYID = 6
1,173,298 UART: [idev] SUBJECT.KEYID = 7
1,173,723 UART: [idev] UDS.KEYID = 0
1,181,340 UART: [idev] Erasing UDS.KEYID = 0
1,198,310 UART: [idev] Sha1 KeyId Algorithm
1,207,124 UART: [idev] --
1,208,289 UART: [ldev] ++
1,208,457 UART: [ldev] CDI.KEYID = 6
1,208,821 UART: [ldev] SUBJECT.KEYID = 5
1,209,248 UART: [ldev] AUTHORITY.KEYID = 7
1,209,711 UART: [ldev] FE.KEYID = 1
1,214,975 UART: [ldev] Erasing FE.KEYID = 1
1,241,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,399 UART: [ldev] --
1,280,766 UART: [fwproc] Wait for Commands...
1,281,557 UART: [fwproc] Recv command 0x46574c44
1,282,290 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,749 UART: ROM Fatal Error: 0x000B0009
1,308,906 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,529 UART: [kat] ++
895,681 UART: [kat] sha1
899,825 UART: [kat] SHA2-256
901,765 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
915,944 UART: [kat] HMAC-384Kdf
920,562 UART: [kat] LMS
1,168,874 UART: [kat] --
1,169,543 UART: [cold-reset] ++
1,170,009 UART: [fht] FHT @ 0x50003400
1,172,769 UART: [idev] ++
1,172,937 UART: [idev] CDI.KEYID = 6
1,173,298 UART: [idev] SUBJECT.KEYID = 7
1,173,723 UART: [idev] UDS.KEYID = 0
1,182,174 UART: [idev] Erasing UDS.KEYID = 0
1,199,232 UART: [idev] Sha1 KeyId Algorithm
1,208,204 UART: [idev] --
1,209,225 UART: [ldev] ++
1,209,393 UART: [ldev] CDI.KEYID = 6
1,209,757 UART: [ldev] SUBJECT.KEYID = 5
1,210,184 UART: [ldev] AUTHORITY.KEYID = 7
1,210,647 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,241,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,001 UART: [ldev] --
1,281,438 UART: [fwproc] Wait for Commands...
1,282,225 UART: [fwproc] Recv command 0x46574c44
1,282,958 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,001 UART: ROM Fatal Error: 0x000B0009
1,309,158 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,188 UART: [kat] SHA2-512-ACC
906,089 UART: [kat] ECC-384
916,144 UART: [kat] HMAC-384Kdf
920,634 UART: [kat] LMS
1,168,946 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,245 UART: [fht] FHT @ 0x50003400
1,172,971 UART: [idev] ++
1,173,139 UART: [idev] CDI.KEYID = 6
1,173,500 UART: [idev] SUBJECT.KEYID = 7
1,173,925 UART: [idev] UDS.KEYID = 0
1,181,838 UART: [idev] Erasing UDS.KEYID = 0
1,198,584 UART: [idev] Sha1 KeyId Algorithm
1,207,670 UART: [idev] --
1,208,711 UART: [ldev] ++
1,208,879 UART: [ldev] CDI.KEYID = 6
1,209,243 UART: [ldev] SUBJECT.KEYID = 5
1,209,670 UART: [ldev] AUTHORITY.KEYID = 7
1,210,133 UART: [ldev] FE.KEYID = 1
1,215,353 UART: [ldev] Erasing FE.KEYID = 1
1,241,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,807 UART: [ldev] --
1,280,190 UART: [fwproc] Wait for Commands...
1,280,851 UART: [fwproc] Recv command 0x46574c44
1,281,584 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,795 UART: ROM Fatal Error: 0x000B0009
1,307,952 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,286 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,689 UART: [kat] SHA2-256
901,629 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,338 UART: [kat] LMS
1,168,650 UART: [kat] --
1,169,413 UART: [cold-reset] ++
1,169,973 UART: [fht] FHT @ 0x50003400
1,172,639 UART: [idev] ++
1,172,807 UART: [idev] CDI.KEYID = 6
1,173,168 UART: [idev] SUBJECT.KEYID = 7
1,173,593 UART: [idev] UDS.KEYID = 0
1,181,562 UART: [idev] Erasing UDS.KEYID = 0
1,198,548 UART: [idev] Sha1 KeyId Algorithm
1,207,504 UART: [idev] --
1,208,743 UART: [ldev] ++
1,208,911 UART: [ldev] CDI.KEYID = 6
1,209,275 UART: [ldev] SUBJECT.KEYID = 5
1,209,702 UART: [ldev] AUTHORITY.KEYID = 7
1,210,165 UART: [ldev] FE.KEYID = 1
1,215,453 UART: [ldev] Erasing FE.KEYID = 1
1,241,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,601 UART: [ldev] --
1,281,034 UART: [fwproc] Wait for Commands...
1,281,657 UART: [fwproc] Recv command 0x46574c44
1,282,390 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,289 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,464 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,763 >>> mbox cmd response: success
2,826,831 UART: [afmc] ++
2,826,999 UART: [afmc] CDI.KEYID = 6
2,827,362 UART: [afmc] SUBJECT.KEYID = 7
2,827,788 UART: [afmc] AUTHORITY.KEYID = 5
2,863,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,908 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,620 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,503 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,216 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,828 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,445 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,719 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,562 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,505 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,298 UART: [kat] ++
895,450 UART: [kat] sha1
899,758 UART: [kat] SHA2-256
901,698 UART: [kat] SHA2-384
904,339 UART: [kat] SHA2-512-ACC
906,240 UART: [kat] ECC-384
915,921 UART: [kat] HMAC-384Kdf
920,465 UART: [kat] LMS
1,168,777 UART: [kat] --
1,169,498 UART: [cold-reset] ++
1,169,848 UART: [fht] FHT @ 0x50003400
1,172,484 UART: [idev] ++
1,172,652 UART: [idev] CDI.KEYID = 6
1,173,013 UART: [idev] SUBJECT.KEYID = 7
1,173,438 UART: [idev] UDS.KEYID = 0
1,181,425 UART: [idev] Erasing UDS.KEYID = 0
1,198,137 UART: [idev] Sha1 KeyId Algorithm
1,206,833 UART: [idev] --
1,207,830 UART: [ldev] ++
1,207,998 UART: [ldev] CDI.KEYID = 6
1,208,362 UART: [ldev] SUBJECT.KEYID = 5
1,208,789 UART: [ldev] AUTHORITY.KEYID = 7
1,209,252 UART: [ldev] FE.KEYID = 1
1,214,518 UART: [ldev] Erasing FE.KEYID = 1
1,240,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,878 UART: [ldev] --
1,280,115 UART: [fwproc] Wait for Commands...
1,280,866 UART: [fwproc] Recv command 0x46574c44
1,281,599 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,644 UART: ROM Fatal Error: 0x000B0009
1,307,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,760 UART: [state] LifecycleState = Unprovisioned
85,415 UART: [state] DebugLocked = No
85,959 UART: [state] WD Timer not started. Device not locked for debugging
87,124 UART: [kat] SHA2-256
890,674 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,778 UART: [kat] ++
894,930 UART: [kat] sha1
899,132 UART: [kat] SHA2-256
901,072 UART: [kat] SHA2-384
903,795 UART: [kat] SHA2-512-ACC
905,696 UART: [kat] ECC-384
915,483 UART: [kat] HMAC-384Kdf
920,127 UART: [kat] LMS
1,168,439 UART: [kat] --
1,169,414 UART: [cold-reset] ++
1,169,970 UART: [fht] FHT @ 0x50003400
1,172,470 UART: [idev] ++
1,172,638 UART: [idev] CDI.KEYID = 6
1,172,999 UART: [idev] SUBJECT.KEYID = 7
1,173,424 UART: [idev] UDS.KEYID = 0
1,181,149 UART: [idev] Erasing UDS.KEYID = 0
1,198,505 UART: [idev] Sha1 KeyId Algorithm
1,207,247 UART: [idev] --
1,208,434 UART: [ldev] ++
1,208,602 UART: [ldev] CDI.KEYID = 6
1,208,966 UART: [ldev] SUBJECT.KEYID = 5
1,209,393 UART: [ldev] AUTHORITY.KEYID = 7
1,209,856 UART: [ldev] FE.KEYID = 1
1,215,066 UART: [ldev] Erasing FE.KEYID = 1
1,242,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,128 UART: [ldev] --
1,281,527 UART: [fwproc] Wait for Commands...
1,282,320 UART: [fwproc] Recv command 0x46574c44
1,283,053 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,870 UART: ROM Fatal Error: 0x000B0009
1,309,027 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,230 UART: [kat] ++
895,382 UART: [kat] sha1
899,614 UART: [kat] SHA2-256
901,554 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
916,025 UART: [kat] HMAC-384Kdf
920,709 UART: [kat] LMS
1,169,021 UART: [kat] --
1,169,846 UART: [cold-reset] ++
1,170,340 UART: [fht] FHT @ 0x50003400
1,173,114 UART: [idev] ++
1,173,282 UART: [idev] CDI.KEYID = 6
1,173,643 UART: [idev] SUBJECT.KEYID = 7
1,174,068 UART: [idev] UDS.KEYID = 0
1,181,993 UART: [idev] Erasing UDS.KEYID = 0
1,198,801 UART: [idev] Sha1 KeyId Algorithm
1,207,731 UART: [idev] --
1,208,610 UART: [ldev] ++
1,208,778 UART: [ldev] CDI.KEYID = 6
1,209,142 UART: [ldev] SUBJECT.KEYID = 5
1,209,569 UART: [ldev] AUTHORITY.KEYID = 7
1,210,032 UART: [ldev] FE.KEYID = 1
1,214,920 UART: [ldev] Erasing FE.KEYID = 1
1,242,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,636 UART: [ldev] --
1,281,083 UART: [fwproc] Wait for Commands...
1,281,766 UART: [fwproc] Recv command 0x46574c44
1,282,499 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,998 UART: ROM Fatal Error: 0x000B0009
1,309,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,290 UART: [kat] ++
895,442 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,227 UART: [kat] SHA2-512-ACC
906,128 UART: [kat] ECC-384
915,891 UART: [kat] HMAC-384Kdf
920,563 UART: [kat] LMS
1,168,875 UART: [kat] --
1,169,898 UART: [cold-reset] ++
1,170,400 UART: [fht] FHT @ 0x50003400
1,173,176 UART: [idev] ++
1,173,344 UART: [idev] CDI.KEYID = 6
1,173,705 UART: [idev] SUBJECT.KEYID = 7
1,174,130 UART: [idev] UDS.KEYID = 0
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,198,701 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,456 UART: [ldev] ++
1,208,624 UART: [ldev] CDI.KEYID = 6
1,208,988 UART: [ldev] SUBJECT.KEYID = 5
1,209,415 UART: [ldev] AUTHORITY.KEYID = 7
1,209,878 UART: [ldev] FE.KEYID = 1
1,214,928 UART: [ldev] Erasing FE.KEYID = 1
1,240,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,766 UART: [ldev] --
1,280,081 UART: [fwproc] Wait for Commands...
1,280,740 UART: [fwproc] Recv command 0x46574c44
1,281,473 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,576 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,751 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,116 >>> mbox cmd response: success
2,826,268 UART: [afmc] ++
2,826,436 UART: [afmc] CDI.KEYID = 6
2,826,799 UART: [afmc] SUBJECT.KEYID = 7
2,827,225 UART: [afmc] AUTHORITY.KEYID = 5
2,862,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,293 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,005 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,888 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,601 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,519 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,970 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,176 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,904 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,915 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,979 UART: [state] LifecycleState = Unprovisioned
86,634 UART: [state] DebugLocked = No
87,298 UART: [state] WD Timer not started. Device not locked for debugging
88,551 UART: [kat] SHA2-256
892,101 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,205 UART: [kat] ++
896,357 UART: [kat] sha1
900,625 UART: [kat] SHA2-256
902,565 UART: [kat] SHA2-384
905,380 UART: [kat] SHA2-512-ACC
907,281 UART: [kat] ECC-384
917,232 UART: [kat] HMAC-384Kdf
922,052 UART: [kat] LMS
1,170,364 UART: [kat] --
1,171,013 UART: [cold-reset] ++
1,171,365 UART: [fht] FHT @ 0x50003400
1,173,927 UART: [idev] ++
1,174,095 UART: [idev] CDI.KEYID = 6
1,174,456 UART: [idev] SUBJECT.KEYID = 7
1,174,881 UART: [idev] UDS.KEYID = 0
1,182,740 UART: [idev] Erasing UDS.KEYID = 0
1,199,244 UART: [idev] Sha1 KeyId Algorithm
1,208,136 UART: [idev] --
1,209,231 UART: [ldev] ++
1,209,399 UART: [ldev] CDI.KEYID = 6
1,209,763 UART: [ldev] SUBJECT.KEYID = 5
1,210,190 UART: [ldev] AUTHORITY.KEYID = 7
1,210,653 UART: [ldev] FE.KEYID = 1
1,215,887 UART: [ldev] Erasing FE.KEYID = 1
1,242,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,779 UART: [ldev] --
1,282,058 UART: [fwproc] Wait for Commands...
1,282,803 UART: [fwproc] Recv command 0x46574c44
1,283,536 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,105 UART: ROM Fatal Error: 0x000B0009
1,310,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,651 UART: [kat] ++
895,803 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,092 UART: [kat] HMAC-384Kdf
920,906 UART: [kat] LMS
1,169,218 UART: [kat] --
1,170,125 UART: [cold-reset] ++
1,170,669 UART: [fht] FHT @ 0x50003400
1,173,323 UART: [idev] ++
1,173,491 UART: [idev] CDI.KEYID = 6
1,173,852 UART: [idev] SUBJECT.KEYID = 7
1,174,277 UART: [idev] UDS.KEYID = 0
1,182,692 UART: [idev] Erasing UDS.KEYID = 0
1,199,758 UART: [idev] Sha1 KeyId Algorithm
1,208,724 UART: [idev] --
1,209,733 UART: [ldev] ++
1,209,901 UART: [ldev] CDI.KEYID = 6
1,210,265 UART: [ldev] SUBJECT.KEYID = 5
1,210,692 UART: [ldev] AUTHORITY.KEYID = 7
1,211,155 UART: [ldev] FE.KEYID = 1
1,216,525 UART: [ldev] Erasing FE.KEYID = 1
1,243,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,531 UART: [ldev] --
1,282,870 UART: [fwproc] Wait for Commands...
1,283,509 UART: [fwproc] Recv command 0x46574c44
1,284,242 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,691 UART: ROM Fatal Error: 0x000B0009
1,310,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,815 UART: [kat] SHA2-256
901,755 UART: [kat] SHA2-384
904,628 UART: [kat] SHA2-512-ACC
906,529 UART: [kat] ECC-384
916,182 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,172,761 UART: [idev] ++
1,172,929 UART: [idev] CDI.KEYID = 6
1,173,290 UART: [idev] SUBJECT.KEYID = 7
1,173,715 UART: [idev] UDS.KEYID = 0
1,181,644 UART: [idev] Erasing UDS.KEYID = 0
1,198,952 UART: [idev] Sha1 KeyId Algorithm
1,207,942 UART: [idev] --
1,209,059 UART: [ldev] ++
1,209,227 UART: [ldev] CDI.KEYID = 6
1,209,591 UART: [ldev] SUBJECT.KEYID = 5
1,210,018 UART: [ldev] AUTHORITY.KEYID = 7
1,210,481 UART: [ldev] FE.KEYID = 1
1,215,953 UART: [ldev] Erasing FE.KEYID = 1
1,242,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,619 UART: [ldev] --
1,282,020 UART: [fwproc] Wait for Commands...
1,282,743 UART: [fwproc] Recv command 0x46574c44
1,283,476 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,789 UART: ROM Fatal Error: 0x000B0009
1,309,946 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,572 UART: [kat] SHA2-512-ACC
906,473 UART: [kat] ECC-384
915,998 UART: [kat] HMAC-384Kdf
920,514 UART: [kat] LMS
1,168,826 UART: [kat] --
1,169,687 UART: [cold-reset] ++
1,170,159 UART: [fht] FHT @ 0x50003400
1,172,615 UART: [idev] ++
1,172,783 UART: [idev] CDI.KEYID = 6
1,173,144 UART: [idev] SUBJECT.KEYID = 7
1,173,569 UART: [idev] UDS.KEYID = 0
1,181,536 UART: [idev] Erasing UDS.KEYID = 0
1,198,764 UART: [idev] Sha1 KeyId Algorithm
1,207,708 UART: [idev] --
1,208,537 UART: [ldev] ++
1,208,705 UART: [ldev] CDI.KEYID = 6
1,209,069 UART: [ldev] SUBJECT.KEYID = 5
1,209,496 UART: [ldev] AUTHORITY.KEYID = 7
1,209,959 UART: [ldev] FE.KEYID = 1
1,215,039 UART: [ldev] Erasing FE.KEYID = 1
1,241,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,405 UART: [ldev] --
1,280,740 UART: [fwproc] Wait for Commands...
1,281,481 UART: [fwproc] Recv command 0x46574c44
1,282,214 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,779 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,954 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,319 >>> mbox cmd response: success
2,826,365 UART: [afmc] ++
2,826,533 UART: [afmc] CDI.KEYID = 6
2,826,896 UART: [afmc] SUBJECT.KEYID = 7
2,827,322 UART: [afmc] AUTHORITY.KEYID = 5
2,863,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,806 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,518 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,401 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,114 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,892 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,309 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,891 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,846 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
5,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,145 UART:
192,540 UART: Running Caliptra ROM ...
193,723 UART:
193,882 UART: [state] CFI Enabled
262,923 UART: [state] LifecycleState = Unprovisioned
264,866 UART: [state] DebugLocked = No
266,468 UART: [state] WD Timer not started. Device not locked for debugging
270,579 UART: [kat] SHA2-256
450,242 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,011 UART: [kat] ++
461,512 UART: [kat] sha1
472,509 UART: [kat] SHA2-256
475,180 UART: [kat] SHA2-384
481,113 UART: [kat] SHA2-512-ACC
483,457 UART: [kat] ECC-384
2,944,903 UART: [kat] HMAC-384Kdf
2,970,216 UART: [kat] LMS
3,446,717 UART: [kat] --
3,453,360 UART: [cold-reset] ++
3,454,979 UART: [fht] FHT @ 0x50003400
3,466,236 UART: [idev] ++
3,466,807 UART: [idev] CDI.KEYID = 6
3,467,828 UART: [idev] SUBJECT.KEYID = 7
3,468,988 UART: [idev] UDS.KEYID = 0
3,500,123 UART: [idev] Erasing UDS.KEYID = 0
5,982,893 UART: [idev] Sha1 KeyId Algorithm
6,006,401 UART: [idev] --
6,011,065 UART: [ldev] ++
6,011,652 UART: [ldev] CDI.KEYID = 6
6,012,581 UART: [ldev] SUBJECT.KEYID = 5
6,013,756 UART: [ldev] AUTHORITY.KEYID = 7
6,015,001 UART: [ldev] FE.KEYID = 1
6,056,176 UART: [ldev] Erasing FE.KEYID = 1
8,563,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,575 UART: [ldev] --
10,375,901 UART: [fwproc] Wait for Commands...
10,379,137 UART: [fwproc] Recv command 0x46574c44
10,381,130 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,351 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,386 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,977 >>> mbox cmd response: success
14,349,752 UART: [afmc] ++
14,350,344 UART: [afmc] CDI.KEYID = 6
14,351,259 UART: [afmc] SUBJECT.KEYID = 7
14,352,502 UART: [afmc] AUTHORITY.KEYID = 5
16,895,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,422 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,192 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,267 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,799 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,565 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
5,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,195,655 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
7,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,459 UART:
192,849 UART: Running Caliptra ROM ...
193,962 UART:
603,561 UART: [state] CFI Enabled
617,788 UART: [state] LifecycleState = Unprovisioned
619,732 UART: [state] DebugLocked = No
621,134 UART: [state] WD Timer not started. Device not locked for debugging
625,277 UART: [kat] SHA2-256
804,944 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,688 UART: [kat] ++
816,189 UART: [kat] sha1
828,677 UART: [kat] SHA2-256
831,348 UART: [kat] SHA2-384
837,210 UART: [kat] SHA2-512-ACC
839,596 UART: [kat] ECC-384
3,279,426 UART: [kat] HMAC-384Kdf
3,290,629 UART: [kat] LMS
3,767,101 UART: [kat] --
3,771,356 UART: [cold-reset] ++
3,772,577 UART: [fht] FHT @ 0x50003400
3,783,338 UART: [idev] ++
3,783,898 UART: [idev] CDI.KEYID = 6
3,784,860 UART: [idev] SUBJECT.KEYID = 7
3,786,133 UART: [idev] UDS.KEYID = 0
3,800,772 UART: [idev] Erasing UDS.KEYID = 0
6,260,844 UART: [idev] Sha1 KeyId Algorithm
6,284,466 UART: [idev] --
6,288,242 UART: [ldev] ++
6,288,812 UART: [ldev] CDI.KEYID = 6
6,289,773 UART: [ldev] SUBJECT.KEYID = 5
6,290,987 UART: [ldev] AUTHORITY.KEYID = 7
6,292,220 UART: [ldev] FE.KEYID = 1
6,304,108 UART: [ldev] Erasing FE.KEYID = 1
8,783,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,568,898 UART: [ldev] --
10,573,569 UART: [fwproc] Wait for Commands...
10,575,194 UART: [fwproc] Recv command 0x46574c44
10,577,179 UART: [fwproc] Recv'd Img size: 118548 bytes
14,059,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,136,048 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,209,057 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,536,666 >>> mbox cmd response: success
14,540,581 UART: [afmc] ++
14,541,163 UART: [afmc] CDI.KEYID = 6
14,542,123 UART: [afmc] SUBJECT.KEYID = 7
14,543,331 UART: [afmc] AUTHORITY.KEYID = 5
17,045,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,766,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,768,949 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,784,764 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,800,814 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,816,401 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,840,949 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
7,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,750 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,280 UART: [kat] ++
895,432 UART: [kat] sha1
899,578 UART: [kat] SHA2-256
901,518 UART: [kat] SHA2-384
904,325 UART: [kat] SHA2-512-ACC
906,226 UART: [kat] ECC-384
915,975 UART: [kat] HMAC-384Kdf
920,605 UART: [kat] LMS
1,168,917 UART: [kat] --
1,169,668 UART: [cold-reset] ++
1,170,100 UART: [fht] FHT @ 0x50003400
1,172,714 UART: [idev] ++
1,172,882 UART: [idev] CDI.KEYID = 6
1,173,243 UART: [idev] SUBJECT.KEYID = 7
1,173,668 UART: [idev] UDS.KEYID = 0
1,181,873 UART: [idev] Erasing UDS.KEYID = 0
1,199,023 UART: [idev] Sha1 KeyId Algorithm
1,207,901 UART: [idev] --
1,208,778 UART: [ldev] ++
1,208,946 UART: [ldev] CDI.KEYID = 6
1,209,310 UART: [ldev] SUBJECT.KEYID = 5
1,209,737 UART: [ldev] AUTHORITY.KEYID = 7
1,210,200 UART: [ldev] FE.KEYID = 1
1,215,266 UART: [ldev] Erasing FE.KEYID = 1
1,240,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,158 UART: [ldev] --
1,279,441 UART: [fwproc] Wait for Commands...
1,280,264 UART: [fwproc] Recv command 0x46574c44
1,280,997 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,983 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,158 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,539 >>> mbox cmd response: success
2,825,775 UART: [afmc] ++
2,825,943 UART: [afmc] CDI.KEYID = 6
2,826,306 UART: [afmc] SUBJECT.KEYID = 7
2,826,732 UART: [afmc] AUTHORITY.KEYID = 5
2,862,221 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,766 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,515 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,225 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,106 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,807 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,618 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,250 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,739 UART: [kat] SHA2-256
901,679 UART: [kat] SHA2-384
904,324 UART: [kat] SHA2-512-ACC
906,225 UART: [kat] ECC-384
916,086 UART: [kat] HMAC-384Kdf
920,880 UART: [kat] LMS
1,169,192 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,605 UART: [fht] FHT @ 0x50003400
1,173,235 UART: [idev] ++
1,173,403 UART: [idev] CDI.KEYID = 6
1,173,764 UART: [idev] SUBJECT.KEYID = 7
1,174,189 UART: [idev] UDS.KEYID = 0
1,182,446 UART: [idev] Erasing UDS.KEYID = 0
1,199,738 UART: [idev] Sha1 KeyId Algorithm
1,208,582 UART: [idev] --
1,209,635 UART: [ldev] ++
1,209,803 UART: [ldev] CDI.KEYID = 6
1,210,167 UART: [ldev] SUBJECT.KEYID = 5
1,210,594 UART: [ldev] AUTHORITY.KEYID = 7
1,211,057 UART: [ldev] FE.KEYID = 1
1,216,457 UART: [ldev] Erasing FE.KEYID = 1
1,243,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,746 UART: [fwproc] Wait for Commands...
1,282,451 UART: [fwproc] Recv command 0x46574c44
1,283,184 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,608 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,783 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,124 >>> mbox cmd response: success
2,828,320 UART: [afmc] ++
2,828,488 UART: [afmc] CDI.KEYID = 6
2,828,851 UART: [afmc] SUBJECT.KEYID = 7
2,829,277 UART: [afmc] AUTHORITY.KEYID = 5
2,864,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,481 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,230 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,940 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,821 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,522 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,487 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,909 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,385 UART: [kat] SHA2-512-ACC
906,286 UART: [kat] ECC-384
915,891 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,169,814 UART: [cold-reset] ++
1,170,208 UART: [fht] FHT @ 0x50003400
1,172,788 UART: [idev] ++
1,172,956 UART: [idev] CDI.KEYID = 6
1,173,317 UART: [idev] SUBJECT.KEYID = 7
1,173,742 UART: [idev] UDS.KEYID = 0
1,181,695 UART: [idev] Erasing UDS.KEYID = 0
1,198,531 UART: [idev] Sha1 KeyId Algorithm
1,207,385 UART: [idev] --
1,208,492 UART: [ldev] ++
1,208,660 UART: [ldev] CDI.KEYID = 6
1,209,024 UART: [ldev] SUBJECT.KEYID = 5
1,209,451 UART: [ldev] AUTHORITY.KEYID = 7
1,209,914 UART: [ldev] FE.KEYID = 1
1,214,880 UART: [ldev] Erasing FE.KEYID = 1
1,241,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,128 UART: [ldev] --
1,280,335 UART: [fwproc] Wait for Commands...
1,281,068 UART: [fwproc] Recv command 0x46574c44
1,281,801 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,593 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,768 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,983 >>> mbox cmd response: success
2,826,003 UART: [afmc] ++
2,826,171 UART: [afmc] CDI.KEYID = 6
2,826,534 UART: [afmc] SUBJECT.KEYID = 7
2,826,960 UART: [afmc] AUTHORITY.KEYID = 5
2,862,221 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,425 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,135 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,016 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,717 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,586 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,038 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
899,971 UART: [kat] SHA2-256
901,911 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
916,542 UART: [kat] HMAC-384Kdf
921,152 UART: [kat] LMS
1,169,464 UART: [kat] --
1,170,301 UART: [cold-reset] ++
1,170,725 UART: [fht] FHT @ 0x50003400
1,173,393 UART: [idev] ++
1,173,561 UART: [idev] CDI.KEYID = 6
1,173,922 UART: [idev] SUBJECT.KEYID = 7
1,174,347 UART: [idev] UDS.KEYID = 0
1,182,212 UART: [idev] Erasing UDS.KEYID = 0
1,199,082 UART: [idev] Sha1 KeyId Algorithm
1,208,070 UART: [idev] --
1,209,233 UART: [ldev] ++
1,209,401 UART: [ldev] CDI.KEYID = 6
1,209,765 UART: [ldev] SUBJECT.KEYID = 5
1,210,192 UART: [ldev] AUTHORITY.KEYID = 7
1,210,655 UART: [ldev] FE.KEYID = 1
1,216,125 UART: [ldev] Erasing FE.KEYID = 1
1,242,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,483 UART: [ldev] --
1,281,804 UART: [fwproc] Wait for Commands...
1,282,549 UART: [fwproc] Recv command 0x46574c44
1,283,282 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,942 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,117 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,522 >>> mbox cmd response: success
2,826,690 UART: [afmc] ++
2,826,858 UART: [afmc] CDI.KEYID = 6
2,827,221 UART: [afmc] SUBJECT.KEYID = 7
2,827,647 UART: [afmc] AUTHORITY.KEYID = 5
2,863,278 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,726 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,436 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,317 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,018 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,825 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,415 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,538 UART: [kat] SHA2-256
901,478 UART: [kat] SHA2-384
904,207 UART: [kat] SHA2-512-ACC
906,108 UART: [kat] ECC-384
915,703 UART: [kat] HMAC-384Kdf
920,355 UART: [kat] LMS
1,168,667 UART: [kat] --
1,169,408 UART: [cold-reset] ++
1,169,828 UART: [fht] FHT @ 0x50003400
1,172,490 UART: [idev] ++
1,172,658 UART: [idev] CDI.KEYID = 6
1,173,019 UART: [idev] SUBJECT.KEYID = 7
1,173,444 UART: [idev] UDS.KEYID = 0
1,181,677 UART: [idev] Erasing UDS.KEYID = 0
1,198,223 UART: [idev] Sha1 KeyId Algorithm
1,207,149 UART: [idev] --
1,208,288 UART: [ldev] ++
1,208,456 UART: [ldev] CDI.KEYID = 6
1,208,820 UART: [ldev] SUBJECT.KEYID = 5
1,209,247 UART: [ldev] AUTHORITY.KEYID = 7
1,209,710 UART: [ldev] FE.KEYID = 1
1,214,800 UART: [ldev] Erasing FE.KEYID = 1
1,241,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,904 UART: [ldev] --
1,280,175 UART: [fwproc] Wait for Commands...
1,280,814 UART: [fwproc] Recv command 0x46574c44
1,281,547 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,144 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,319 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,586 >>> mbox cmd response: success
2,826,730 UART: [afmc] ++
2,826,898 UART: [afmc] CDI.KEYID = 6
2,827,261 UART: [afmc] SUBJECT.KEYID = 7
2,827,687 UART: [afmc] AUTHORITY.KEYID = 5
2,862,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,004 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,714 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,595 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,296 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,245 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,868 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,157 UART: [state] LifecycleState = Unprovisioned
86,812 UART: [state] DebugLocked = No
87,296 UART: [state] WD Timer not started. Device not locked for debugging
88,501 UART: [kat] SHA2-256
892,051 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,155 UART: [kat] ++
896,307 UART: [kat] sha1
900,595 UART: [kat] SHA2-256
902,535 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
917,182 UART: [kat] HMAC-384Kdf
921,752 UART: [kat] LMS
1,170,064 UART: [kat] --
1,170,771 UART: [cold-reset] ++
1,171,247 UART: [fht] FHT @ 0x50003400
1,174,029 UART: [idev] ++
1,174,197 UART: [idev] CDI.KEYID = 6
1,174,558 UART: [idev] SUBJECT.KEYID = 7
1,174,983 UART: [idev] UDS.KEYID = 0
1,183,240 UART: [idev] Erasing UDS.KEYID = 0
1,200,290 UART: [idev] Sha1 KeyId Algorithm
1,209,152 UART: [idev] --
1,210,213 UART: [ldev] ++
1,210,381 UART: [ldev] CDI.KEYID = 6
1,210,745 UART: [ldev] SUBJECT.KEYID = 5
1,211,172 UART: [ldev] AUTHORITY.KEYID = 7
1,211,635 UART: [ldev] FE.KEYID = 1
1,217,029 UART: [ldev] Erasing FE.KEYID = 1
1,243,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,729 UART: [ldev] --
1,283,084 UART: [fwproc] Wait for Commands...
1,283,883 UART: [fwproc] Recv command 0x46574c44
1,284,616 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,666 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,841 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,030 >>> mbox cmd response: success
2,828,276 UART: [afmc] ++
2,828,444 UART: [afmc] CDI.KEYID = 6
2,828,807 UART: [afmc] SUBJECT.KEYID = 7
2,829,233 UART: [afmc] AUTHORITY.KEYID = 5
2,864,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,408 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,118 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,999 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,700 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,611 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,079 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
Truncated 107056 bytes from beginning
002,463 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,331,452 >>> mbox cmd response: success
14,335,271 UART: [afmc] ++
14,335,886 UART: [afmc] CDI.KEYID = 6
14,336,806 UART: [afmc] SUBJECT.KEYID = 7
14,338,022 UART: [afmc] AUTHORITY.KEYID = 5
16,868,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,180 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,613,056 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,629,060 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,644,718 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,668,666 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
2,063,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,213,539 UART:
2,213,933 UART: Running Caliptra ROM ...
2,215,103 UART:
2,215,284 UART: [state] CFI Enabled
2,216,264 UART: [state] LifecycleState = Unprovisioned
2,217,912 UART: [state] DebugLocked = No
2,219,027 UART: [state] WD Timer not started. Device not locked for debugging
2,221,523 UART: [kat] SHA2-256
2,222,200 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,225,217 UART: [kat] ++
2,225,676 UART: [kat] sha1
2,226,198 UART: [kat] SHA2-256
2,226,860 UART: [kat] SHA2-384
2,227,524 UART: [kat] SHA2-512-ACC
2,228,397 UART: [kat] ECC-384
2,942,437 UART: [kat] HMAC-384Kdf
2,967,349 UART: [kat] LMS
3,443,853 UART: [kat] --
3,448,473 UART: [cold-reset] ++
3,450,915 UART: [fht] FHT @ 0x50003400
3,463,695 UART: [idev] ++
3,464,268 UART: [idev] CDI.KEYID = 6
3,465,287 UART: [idev] SUBJECT.KEYID = 7
3,466,452 UART: [idev] UDS.KEYID = 0
3,496,368 UART: [idev] Erasing UDS.KEYID = 0
5,982,610 UART: [idev] Sha1 KeyId Algorithm
6,007,192 UART: [idev] --
6,012,771 UART: [ldev] ++
6,013,409 UART: [ldev] CDI.KEYID = 6
6,014,333 UART: [ldev] SUBJECT.KEYID = 5
6,015,522 UART: [ldev] AUTHORITY.KEYID = 7
6,016,761 UART: [ldev] FE.KEYID = 1
6,052,758 UART: [ldev] Erasing FE.KEYID = 1
8,562,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,293,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,309,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,325,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,341,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,362,600 UART: [ldev] --
10,368,145 UART: [fwproc] Wait for Commands...
10,370,343 UART: [fwproc] Recv command 0x46574c44
10,372,346 UART: [fwproc] Recv'd Img size: 118548 bytes
13,854,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,938,707 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,011,731 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,202 >>> mbox cmd response: success
14,343,866 UART: [afmc] ++
14,344,460 UART: [afmc] CDI.KEYID = 6
14,345,377 UART: [afmc] SUBJECT.KEYID = 7
14,346,598 UART: [afmc] AUTHORITY.KEYID = 5
16,878,617 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,338 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,637,211 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,653,229 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,668,817 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,692,004 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,810 writing to cptra_bootfsm_go
2,069,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,219,068 UART:
2,219,483 UART: Running Caliptra ROM ...
2,220,671 UART:
2,220,854 UART: [state] CFI Enabled
2,221,819 UART: [state] LifecycleState = Unprovisioned
2,223,481 UART: [state] DebugLocked = No
2,224,604 UART: [state] WD Timer not started. Device not locked for debugging
2,227,082 UART: [kat] SHA2-256
2,227,758 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,230,776 UART: [kat] ++
2,231,234 UART: [kat] sha1
2,231,755 UART: [kat] SHA2-256
2,232,419 UART: [kat] SHA2-384
2,233,294 UART: [kat] SHA2-512-ACC
2,234,116 UART: [kat] ECC-384
2,946,253 UART: [kat] HMAC-384Kdf
2,967,807 UART: [kat] LMS
3,444,273 UART: [kat] --
3,450,391 UART: [cold-reset] ++
3,451,443 UART: [fht] FHT @ 0x50003400
3,462,002 UART: [idev] ++
3,462,588 UART: [idev] CDI.KEYID = 6
3,463,562 UART: [idev] SUBJECT.KEYID = 7
3,464,781 UART: [idev] UDS.KEYID = 0
3,498,688 UART: [idev] Erasing UDS.KEYID = 0
5,981,710 UART: [idev] Sha1 KeyId Algorithm
6,005,326 UART: [idev] --
6,009,659 UART: [ldev] ++
6,010,273 UART: [ldev] CDI.KEYID = 6
6,011,189 UART: [ldev] SUBJECT.KEYID = 5
6,012,284 UART: [ldev] AUTHORITY.KEYID = 7
6,013,638 UART: [ldev] FE.KEYID = 1
6,053,117 UART: [ldev] Erasing FE.KEYID = 1
8,560,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,126 UART: [ldev] --
10,372,265 UART: [fwproc] Wait for Commands...
10,375,389 UART: [fwproc] Recv command 0x46574c44
10,377,378 UART: [fwproc] Recv'd Img size: 118548 bytes
13,847,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,929,691 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,002,678 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,331,731 >>> mbox cmd response: success
14,334,995 UART: [afmc] ++
14,335,585 UART: [afmc] CDI.KEYID = 6
14,336,538 UART: [afmc] SUBJECT.KEYID = 7
14,337,761 UART: [afmc] AUTHORITY.KEYID = 5
16,869,016 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,591,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,594,035 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,609,858 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,625,883 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,641,519 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,666,079 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
2,065,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,215,510 UART:
2,215,898 UART: Running Caliptra ROM ...
2,216,999 UART:
2,217,164 UART: [state] CFI Enabled
2,218,131 UART: [state] LifecycleState = Unprovisioned
2,219,794 UART: [state] DebugLocked = No
2,220,830 UART: [state] WD Timer not started. Device not locked for debugging
2,223,301 UART: [kat] SHA2-256
2,223,970 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,226,979 UART: [kat] ++
2,227,437 UART: [kat] sha1
2,227,956 UART: [kat] SHA2-256
2,228,639 UART: [kat] SHA2-384
2,229,305 UART: [kat] SHA2-512-ACC
2,230,151 UART: [kat] ECC-384
2,942,917 UART: [kat] HMAC-384Kdf
2,967,228 UART: [kat] LMS
3,443,735 UART: [kat] --
3,447,752 UART: [cold-reset] ++
3,450,180 UART: [fht] FHT @ 0x50003400
3,462,294 UART: [idev] ++
3,462,922 UART: [idev] CDI.KEYID = 6
3,463,811 UART: [idev] SUBJECT.KEYID = 7
3,465,082 UART: [idev] UDS.KEYID = 0
3,496,550 UART: [idev] Erasing UDS.KEYID = 0
5,982,108 UART: [idev] Sha1 KeyId Algorithm
6,006,522 UART: [idev] --
6,011,632 UART: [ldev] ++
6,012,235 UART: [ldev] CDI.KEYID = 6
6,013,127 UART: [ldev] SUBJECT.KEYID = 5
6,014,345 UART: [ldev] AUTHORITY.KEYID = 7
6,015,588 UART: [ldev] FE.KEYID = 1
6,051,832 UART: [ldev] Erasing FE.KEYID = 1
8,560,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,310,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,326,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,342,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,363,464 UART: [ldev] --
10,368,240 UART: [fwproc] Wait for Commands...
10,370,612 UART: [fwproc] Recv command 0x46574c44
10,372,606 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,946,550 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,596 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,348,639 >>> mbox cmd response: success
14,352,763 UART: [afmc] ++
14,353,357 UART: [afmc] CDI.KEYID = 6
14,354,334 UART: [afmc] SUBJECT.KEYID = 7
14,355,500 UART: [afmc] AUTHORITY.KEYID = 5
16,891,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,634,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,636,543 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,652,445 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,668,429 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,684,015 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,708,017 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 30.00s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
2,065,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,313 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,061,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,196,228 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,065,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,234,931 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
2,060,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,343 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
2,065,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,200,203 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
2,063,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,401 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
2,065,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,825 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
2,062,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,260,862 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,617 writing to cptra_bootfsm_go
2,065,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,198,149 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
2,060,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,217,943 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
2,064,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,238,167 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,054,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,184,275 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
2,066,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,233,977 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
2,060,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,218,275 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
2,059,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,212,882 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
2,065,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,246,034 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
2,066,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,206 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
2,070,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,227,891 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
2,059,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,223,928 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 29.71s
Truncated 107056 bytes from beginning
220,052 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,626 >>> mbox cmd response: success
14,552,437 UART: [afmc] ++
14,553,021 UART: [afmc] CDI.KEYID = 6
14,553,965 UART: [afmc] SUBJECT.KEYID = 7
14,555,172 UART: [afmc] AUTHORITY.KEYID = 5
17,055,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,860 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,795,726 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,811,746 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,827,380 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,850,957 UART: [afmc] --
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
2,062,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,212,329 UART:
2,212,756 UART: Running Caliptra ROM ...
2,213,840 UART:
2,213,989 UART: [state] CFI Enabled
2,214,962 UART: [state] LifecycleState = Unprovisioned
2,216,613 UART: [state] DebugLocked = No
2,217,660 UART: [state] WD Timer not started. Device not locked for debugging
2,220,136 UART: [kat] SHA2-256
2,220,800 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,223,809 UART: [kat] ++
2,224,258 UART: [kat] sha1
2,224,765 UART: [kat] SHA2-256
2,225,420 UART: [kat] SHA2-384
2,226,072 UART: [kat] SHA2-512-ACC
2,227,068 UART: [kat] ECC-384
3,279,730 UART: [kat] HMAC-384Kdf
3,293,283 UART: [kat] LMS
3,769,803 UART: [kat] --
3,774,113 UART: [cold-reset] ++
3,776,472 UART: [fht] FHT @ 0x50003400
3,786,414 UART: [idev] ++
3,787,076 UART: [idev] CDI.KEYID = 6
3,787,983 UART: [idev] SUBJECT.KEYID = 7
3,789,202 UART: [idev] UDS.KEYID = 0
3,806,990 UART: [idev] Erasing UDS.KEYID = 0
6,264,346 UART: [idev] Sha1 KeyId Algorithm
6,288,177 UART: [idev] --
6,292,005 UART: [ldev] ++
6,292,578 UART: [ldev] CDI.KEYID = 6
6,293,455 UART: [ldev] SUBJECT.KEYID = 5
6,294,661 UART: [ldev] AUTHORITY.KEYID = 7
6,295,950 UART: [ldev] FE.KEYID = 1
6,306,566 UART: [ldev] Erasing FE.KEYID = 1
8,781,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,792 UART: [ldev] --
10,575,058 UART: [fwproc] Wait for Commands...
10,577,106 UART: [fwproc] Recv command 0x46574c44
10,579,300 UART: [fwproc] Recv'd Img size: 118548 bytes
14,063,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,145,910 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,960 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,834 >>> mbox cmd response: success
14,552,237 UART: [afmc] ++
14,552,815 UART: [afmc] CDI.KEYID = 6
14,553,751 UART: [afmc] SUBJECT.KEYID = 7
14,554,961 UART: [afmc] AUTHORITY.KEYID = 5
17,058,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,040 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,798,914 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,814,942 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,830,566 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,856,133 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
2,060,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,209,700 UART:
2,210,100 UART: Running Caliptra ROM ...
2,211,189 UART:
2,211,342 UART: [state] CFI Enabled
2,212,195 UART: [state] LifecycleState = Unprovisioned
2,213,866 UART: [state] DebugLocked = No
2,214,895 UART: [state] WD Timer not started. Device not locked for debugging
2,217,365 UART: [kat] SHA2-256
2,218,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,221,031 UART: [kat] ++
2,221,698 UART: [kat] sha1
2,222,221 UART: [kat] SHA2-256
2,222,877 UART: [kat] SHA2-384
2,223,564 UART: [kat] SHA2-512-ACC
2,224,366 UART: [kat] ECC-384
3,280,442 UART: [kat] HMAC-384Kdf
3,292,329 UART: [kat] LMS
3,768,851 UART: [kat] --
3,773,483 UART: [cold-reset] ++
3,775,080 UART: [fht] FHT @ 0x50003400
3,786,003 UART: [idev] ++
3,786,591 UART: [idev] CDI.KEYID = 6
3,787,527 UART: [idev] SUBJECT.KEYID = 7
3,788,792 UART: [idev] UDS.KEYID = 0
3,805,867 UART: [idev] Erasing UDS.KEYID = 0
6,269,800 UART: [idev] Sha1 KeyId Algorithm
6,293,298 UART: [idev] --
6,298,372 UART: [ldev] ++
6,298,944 UART: [ldev] CDI.KEYID = 6
6,299,825 UART: [ldev] SUBJECT.KEYID = 5
6,301,087 UART: [ldev] AUTHORITY.KEYID = 7
6,302,463 UART: [ldev] FE.KEYID = 1
6,313,497 UART: [ldev] Erasing FE.KEYID = 1
8,792,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,048 UART: [ldev] --
10,584,612 UART: [fwproc] Wait for Commands...
10,586,815 UART: [fwproc] Recv command 0x46574c44
10,588,855 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,142,924 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,939 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,543,854 >>> mbox cmd response: success
14,547,299 UART: [afmc] ++
14,547,892 UART: [afmc] CDI.KEYID = 6
14,548,854 UART: [afmc] SUBJECT.KEYID = 7
14,550,065 UART: [afmc] AUTHORITY.KEYID = 5
17,057,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,936 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,796,851 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,812,825 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,828,464 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,852,938 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
2,066,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,216,309 UART:
2,216,714 UART: Running Caliptra ROM ...
2,217,888 UART:
2,218,084 UART: [state] CFI Enabled
2,219,063 UART: [state] LifecycleState = Unprovisioned
2,220,727 UART: [state] DebugLocked = No
2,221,830 UART: [state] WD Timer not started. Device not locked for debugging
2,224,300 UART: [kat] SHA2-256
2,224,966 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,227,993 UART: [kat] ++
2,228,447 UART: [kat] sha1
2,228,957 UART: [kat] SHA2-256
2,229,694 UART: [kat] SHA2-384
2,230,361 UART: [kat] SHA2-512-ACC
2,231,189 UART: [kat] ECC-384
3,280,380 UART: [kat] HMAC-384Kdf
3,293,067 UART: [kat] LMS
3,769,575 UART: [kat] --
3,773,417 UART: [cold-reset] ++
3,774,482 UART: [fht] FHT @ 0x50003400
3,786,774 UART: [idev] ++
3,787,415 UART: [idev] CDI.KEYID = 6
3,788,330 UART: [idev] SUBJECT.KEYID = 7
3,789,545 UART: [idev] UDS.KEYID = 0
3,809,947 UART: [idev] Erasing UDS.KEYID = 0
6,270,272 UART: [idev] Sha1 KeyId Algorithm
6,293,723 UART: [idev] --
6,298,140 UART: [ldev] ++
6,298,710 UART: [ldev] CDI.KEYID = 6
6,299,614 UART: [ldev] SUBJECT.KEYID = 5
6,300,824 UART: [ldev] AUTHORITY.KEYID = 7
6,302,056 UART: [ldev] FE.KEYID = 1
6,315,291 UART: [ldev] Erasing FE.KEYID = 1
8,795,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,598 UART: [ldev] --
10,591,420 UART: [fwproc] Wait for Commands...
10,594,120 UART: [fwproc] Recv command 0x46574c44
10,596,171 UART: [fwproc] Recv'd Img size: 118548 bytes
14,083,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,161,685 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,234,716 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,563,629 >>> mbox cmd response: success
14,567,179 UART: [afmc] ++
14,567,762 UART: [afmc] CDI.KEYID = 6
14,568,705 UART: [afmc] SUBJECT.KEYID = 7
14,569,911 UART: [afmc] AUTHORITY.KEYID = 5
17,068,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,790 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,806,677 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,822,697 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,838,383 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,862,598 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 30.29s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
2,060,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,439,683 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
2,061,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,509 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
2,058,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,836 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
2,058,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,058 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
2,062,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,574 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,060,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,146 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,063,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,263 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,061,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,433,656 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,061,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,428,802 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
2,060,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,877 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
2,063,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,079 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
2,059,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,576 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
2,057,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,889 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
2,058,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,434,067 >>> mbox cmd response: success
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,058,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,752 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
2,063,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,432,549 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,839 writing to cptra_bootfsm_go
2,063,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,048 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
2,063,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,691 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,062,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,728 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 29.99s
Truncated 104976 bytes from beginning
4
1,282,845 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,270 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,445 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,846 >>> mbox cmd response: success
2,826,012 UART: [afmc] ++
2,826,180 UART: [afmc] CDI.KEYID = 6
2,826,543 UART: [afmc] SUBJECT.KEYID = 7
2,826,969 UART: [afmc] AUTHORITY.KEYID = 5
2,862,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,805 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,517 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,400 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,113 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,867 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,252 UART: [kat] ++
895,404 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,465 UART: [kat] SHA2-512-ACC
906,366 UART: [kat] ECC-384
915,935 UART: [kat] HMAC-384Kdf
920,365 UART: [kat] LMS
1,168,677 UART: [kat] --
1,169,616 UART: [cold-reset] ++
1,170,162 UART: [fht] FHT @ 0x50003400
1,172,640 UART: [idev] ++
1,172,808 UART: [idev] CDI.KEYID = 6
1,173,169 UART: [idev] SUBJECT.KEYID = 7
1,173,594 UART: [idev] UDS.KEYID = 0
1,181,299 UART: [idev] Erasing UDS.KEYID = 0
1,198,485 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,442 UART: [ldev] ++
1,208,610 UART: [ldev] CDI.KEYID = 6
1,208,974 UART: [ldev] SUBJECT.KEYID = 5
1,209,401 UART: [ldev] AUTHORITY.KEYID = 7
1,209,864 UART: [ldev] FE.KEYID = 1
1,214,948 UART: [ldev] Erasing FE.KEYID = 1
1,241,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,588 UART: [ldev] --
1,280,921 UART: [fwproc] Wait for Commands...
1,281,686 UART: [fwproc] Recv command 0x46574c44
1,282,419 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,018 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,193 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,362 >>> mbox cmd response: success
2,826,532 UART: [afmc] ++
2,826,700 UART: [afmc] CDI.KEYID = 6
2,827,063 UART: [afmc] SUBJECT.KEYID = 7
2,827,489 UART: [afmc] AUTHORITY.KEYID = 5
2,863,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,765 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,477 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,360 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,073 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,815 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,497 UART: [kat] LMS
1,168,809 UART: [kat] --
1,169,472 UART: [cold-reset] ++
1,170,006 UART: [fht] FHT @ 0x50003400
1,172,766 UART: [idev] ++
1,172,934 UART: [idev] CDI.KEYID = 6
1,173,295 UART: [idev] SUBJECT.KEYID = 7
1,173,720 UART: [idev] UDS.KEYID = 0
1,181,391 UART: [idev] Erasing UDS.KEYID = 0
1,198,593 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,486 UART: [ldev] ++
1,208,654 UART: [ldev] CDI.KEYID = 6
1,209,018 UART: [ldev] SUBJECT.KEYID = 5
1,209,445 UART: [ldev] AUTHORITY.KEYID = 7
1,209,908 UART: [ldev] FE.KEYID = 1
1,215,372 UART: [ldev] Erasing FE.KEYID = 1
1,241,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,536 UART: [ldev] --
1,280,811 UART: [fwproc] Wait for Commands...
1,281,572 UART: [fwproc] Recv command 0x46574c44
1,282,305 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,652,984 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,159 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,482 >>> mbox cmd response: success
2,825,576 UART: [afmc] ++
2,825,744 UART: [afmc] CDI.KEYID = 6
2,826,107 UART: [afmc] SUBJECT.KEYID = 7
2,826,533 UART: [afmc] AUTHORITY.KEYID = 5
2,861,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,312 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,061 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,773 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,656 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,369 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,089 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,134 UART: [kat] ++
895,286 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,237 UART: [kat] SHA2-512-ACC
906,138 UART: [kat] ECC-384
915,645 UART: [kat] HMAC-384Kdf
920,347 UART: [kat] LMS
1,168,659 UART: [kat] --
1,169,520 UART: [cold-reset] ++
1,169,852 UART: [fht] FHT @ 0x50003400
1,172,526 UART: [idev] ++
1,172,694 UART: [idev] CDI.KEYID = 6
1,173,055 UART: [idev] SUBJECT.KEYID = 7
1,173,480 UART: [idev] UDS.KEYID = 0
1,181,467 UART: [idev] Erasing UDS.KEYID = 0
1,198,983 UART: [idev] Sha1 KeyId Algorithm
1,207,689 UART: [idev] --
1,208,886 UART: [ldev] ++
1,209,054 UART: [ldev] CDI.KEYID = 6
1,209,418 UART: [ldev] SUBJECT.KEYID = 5
1,209,845 UART: [ldev] AUTHORITY.KEYID = 7
1,210,308 UART: [ldev] FE.KEYID = 1
1,215,658 UART: [ldev] Erasing FE.KEYID = 1
1,241,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,530 UART: [ldev] --
1,280,919 UART: [fwproc] Wait for Commands...
1,281,620 UART: [fwproc] Recv command 0x46574c44
1,282,353 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,756 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,931 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,146 >>> mbox cmd response: success
2,827,166 UART: [afmc] ++
2,827,334 UART: [afmc] CDI.KEYID = 6
2,827,697 UART: [afmc] SUBJECT.KEYID = 7
2,828,123 UART: [afmc] AUTHORITY.KEYID = 5
2,863,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,953 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,665 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,548 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,261 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,127 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 36.25s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,199 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,225 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,559 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,342 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,839 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,165 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,441 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,775 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,711 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,981 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,349 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,133 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,529 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,883 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,047 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,179 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,845 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,841 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,701 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,077 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,075 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 35.10s
Truncated 104976 bytes from beginning
4
1,283,460 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,607 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,782 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,003 >>> mbox cmd response: success
2,827,083 UART: [afmc] ++
2,827,251 UART: [afmc] CDI.KEYID = 6
2,827,614 UART: [afmc] SUBJECT.KEYID = 7
2,828,040 UART: [afmc] AUTHORITY.KEYID = 5
2,864,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,647 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,396 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,108 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,991 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,704 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,496 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
87,078 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
891,811 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,915 UART: [kat] ++
896,067 UART: [kat] sha1
900,359 UART: [kat] SHA2-256
902,299 UART: [kat] SHA2-384
904,996 UART: [kat] SHA2-512-ACC
906,897 UART: [kat] ECC-384
916,734 UART: [kat] HMAC-384Kdf
921,374 UART: [kat] LMS
1,169,686 UART: [kat] --
1,170,597 UART: [cold-reset] ++
1,171,131 UART: [fht] FHT @ 0x50003400
1,173,719 UART: [idev] ++
1,173,887 UART: [idev] CDI.KEYID = 6
1,174,248 UART: [idev] SUBJECT.KEYID = 7
1,174,673 UART: [idev] UDS.KEYID = 0
1,183,052 UART: [idev] Erasing UDS.KEYID = 0
1,199,590 UART: [idev] Sha1 KeyId Algorithm
1,208,500 UART: [idev] --
1,209,579 UART: [ldev] ++
1,209,747 UART: [ldev] CDI.KEYID = 6
1,210,111 UART: [ldev] SUBJECT.KEYID = 5
1,210,538 UART: [ldev] AUTHORITY.KEYID = 7
1,211,001 UART: [ldev] FE.KEYID = 1
1,216,337 UART: [ldev] Erasing FE.KEYID = 1
1,242,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,863 UART: [ldev] --
1,282,308 UART: [fwproc] Wait for Commands...
1,283,049 UART: [fwproc] Recv command 0x46574c44
1,283,782 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,671 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,846 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,039 >>> mbox cmd response: success
2,828,149 UART: [afmc] ++
2,828,317 UART: [afmc] CDI.KEYID = 6
2,828,680 UART: [afmc] SUBJECT.KEYID = 7
2,829,106 UART: [afmc] AUTHORITY.KEYID = 5
2,865,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,595 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,344 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,888,056 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,939 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,652 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,907,404 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
899,983 UART: [kat] SHA2-256
901,923 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
916,776 UART: [kat] HMAC-384Kdf
921,560 UART: [kat] LMS
1,169,872 UART: [kat] --
1,170,813 UART: [cold-reset] ++
1,171,227 UART: [fht] FHT @ 0x50003400
1,173,883 UART: [idev] ++
1,174,051 UART: [idev] CDI.KEYID = 6
1,174,412 UART: [idev] SUBJECT.KEYID = 7
1,174,837 UART: [idev] UDS.KEYID = 0
1,182,998 UART: [idev] Erasing UDS.KEYID = 0
1,200,258 UART: [idev] Sha1 KeyId Algorithm
1,208,920 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,531 UART: [ldev] SUBJECT.KEYID = 5
1,210,958 UART: [ldev] AUTHORITY.KEYID = 7
1,211,421 UART: [ldev] FE.KEYID = 1
1,216,825 UART: [ldev] Erasing FE.KEYID = 1
1,243,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,081 UART: [ldev] --
1,282,496 UART: [fwproc] Wait for Commands...
1,283,109 UART: [fwproc] Recv command 0x46574c44
1,283,842 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,731 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,906 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,069 >>> mbox cmd response: success
2,828,317 UART: [afmc] ++
2,828,485 UART: [afmc] CDI.KEYID = 6
2,828,848 UART: [afmc] SUBJECT.KEYID = 7
2,829,274 UART: [afmc] AUTHORITY.KEYID = 5
2,864,982 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,314 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,888,026 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,909 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,622 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,907,344 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
899,837 UART: [kat] SHA2-256
901,777 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,482 UART: [kat] HMAC-384Kdf
920,992 UART: [kat] LMS
1,169,304 UART: [kat] --
1,170,361 UART: [cold-reset] ++
1,170,747 UART: [fht] FHT @ 0x50003400
1,173,363 UART: [idev] ++
1,173,531 UART: [idev] CDI.KEYID = 6
1,173,892 UART: [idev] SUBJECT.KEYID = 7
1,174,317 UART: [idev] UDS.KEYID = 0
1,182,420 UART: [idev] Erasing UDS.KEYID = 0
1,199,564 UART: [idev] Sha1 KeyId Algorithm
1,208,340 UART: [idev] --
1,209,545 UART: [ldev] ++
1,209,713 UART: [ldev] CDI.KEYID = 6
1,210,077 UART: [ldev] SUBJECT.KEYID = 5
1,210,504 UART: [ldev] AUTHORITY.KEYID = 7
1,210,967 UART: [ldev] FE.KEYID = 1
1,216,279 UART: [ldev] Erasing FE.KEYID = 1
1,243,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,007 UART: [ldev] --
1,282,384 UART: [fwproc] Wait for Commands...
1,283,183 UART: [fwproc] Recv command 0x46574c44
1,283,916 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,015 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,190 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,591 >>> mbox cmd response: success
2,826,623 UART: [afmc] ++
2,826,791 UART: [afmc] CDI.KEYID = 6
2,827,154 UART: [afmc] SUBJECT.KEYID = 7
2,827,580 UART: [afmc] AUTHORITY.KEYID = 5
2,863,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,807 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,556 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,268 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,151 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,864 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,590 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 35.88s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,274 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,894 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,706 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,342 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,802 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,736 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,418 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,200 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,776 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,724 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,348 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,538 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,698 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,874 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,824 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,588 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,654 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,882 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,972 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,128 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,566 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.75s
Truncated 104976 bytes from beginning
4
1,281,855 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,904 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,079 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,316 >>> mbox cmd response: success
2,826,484 UART: [afmc] ++
2,826,652 UART: [afmc] CDI.KEYID = 6
2,827,015 UART: [afmc] SUBJECT.KEYID = 7
2,827,441 UART: [afmc] AUTHORITY.KEYID = 5
2,863,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,267 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,979 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,862 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,575 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,139 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,731 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
891,418 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,113 UART: [kat] HMAC-384Kdf
920,789 UART: [kat] LMS
1,169,101 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,150 UART: [idev] ++
1,173,318 UART: [idev] CDI.KEYID = 6
1,173,679 UART: [idev] SUBJECT.KEYID = 7
1,174,104 UART: [idev] UDS.KEYID = 0
1,182,359 UART: [idev] Erasing UDS.KEYID = 0
1,199,519 UART: [idev] Sha1 KeyId Algorithm
1,208,397 UART: [idev] --
1,209,448 UART: [ldev] ++
1,209,616 UART: [ldev] CDI.KEYID = 6
1,209,980 UART: [ldev] SUBJECT.KEYID = 5
1,210,407 UART: [ldev] AUTHORITY.KEYID = 7
1,210,870 UART: [ldev] FE.KEYID = 1
1,216,016 UART: [ldev] Erasing FE.KEYID = 1
1,242,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,372 UART: [ldev] --
1,281,769 UART: [fwproc] Wait for Commands...
1,282,382 UART: [fwproc] Recv command 0x46574c44
1,283,115 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,938 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,113 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,510 >>> mbox cmd response: success
2,826,752 UART: [afmc] ++
2,826,920 UART: [afmc] CDI.KEYID = 6
2,827,283 UART: [afmc] SUBJECT.KEYID = 7
2,827,709 UART: [afmc] AUTHORITY.KEYID = 5
2,863,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,283 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,995 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,878 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,591 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,247 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
891,438 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,905 UART: [kat] HMAC-384Kdf
921,499 UART: [kat] LMS
1,169,811 UART: [kat] --
1,170,808 UART: [cold-reset] ++
1,171,342 UART: [fht] FHT @ 0x50003400
1,174,098 UART: [idev] ++
1,174,266 UART: [idev] CDI.KEYID = 6
1,174,627 UART: [idev] SUBJECT.KEYID = 7
1,175,052 UART: [idev] UDS.KEYID = 0
1,182,963 UART: [idev] Erasing UDS.KEYID = 0
1,199,891 UART: [idev] Sha1 KeyId Algorithm
1,208,845 UART: [idev] --
1,210,068 UART: [ldev] ++
1,210,236 UART: [ldev] CDI.KEYID = 6
1,210,600 UART: [ldev] SUBJECT.KEYID = 5
1,211,027 UART: [ldev] AUTHORITY.KEYID = 7
1,211,490 UART: [ldev] FE.KEYID = 1
1,216,488 UART: [ldev] Erasing FE.KEYID = 1
1,242,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,036 UART: [ldev] --
1,282,349 UART: [fwproc] Wait for Commands...
1,283,110 UART: [fwproc] Recv command 0x46574c44
1,283,843 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,756 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,931 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,240 >>> mbox cmd response: success
2,827,486 UART: [afmc] ++
2,827,654 UART: [afmc] CDI.KEYID = 6
2,828,017 UART: [afmc] SUBJECT.KEYID = 7
2,828,443 UART: [afmc] AUTHORITY.KEYID = 5
2,863,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,503 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,215 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,098 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,811 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,471 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,288 UART: [kat] ++
895,440 UART: [kat] sha1
899,662 UART: [kat] SHA2-256
901,602 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
915,811 UART: [kat] HMAC-384Kdf
920,265 UART: [kat] LMS
1,168,577 UART: [kat] --
1,169,612 UART: [cold-reset] ++
1,170,148 UART: [fht] FHT @ 0x50003400
1,172,720 UART: [idev] ++
1,172,888 UART: [idev] CDI.KEYID = 6
1,173,249 UART: [idev] SUBJECT.KEYID = 7
1,173,674 UART: [idev] UDS.KEYID = 0
1,181,735 UART: [idev] Erasing UDS.KEYID = 0
1,198,579 UART: [idev] Sha1 KeyId Algorithm
1,207,387 UART: [idev] --
1,208,316 UART: [ldev] ++
1,208,484 UART: [ldev] CDI.KEYID = 6
1,208,848 UART: [ldev] SUBJECT.KEYID = 5
1,209,275 UART: [ldev] AUTHORITY.KEYID = 7
1,209,738 UART: [ldev] FE.KEYID = 1
1,214,954 UART: [ldev] Erasing FE.KEYID = 1
1,241,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,054 UART: [ldev] --
1,280,455 UART: [fwproc] Wait for Commands...
1,281,078 UART: [fwproc] Recv command 0x46574c44
1,281,811 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,652,098 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,273 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,500 >>> mbox cmd response: success
2,824,662 UART: [afmc] ++
2,824,830 UART: [afmc] CDI.KEYID = 6
2,825,193 UART: [afmc] SUBJECT.KEYID = 7
2,825,619 UART: [afmc] AUTHORITY.KEYID = 5
2,861,341 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,363 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,075 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,889,958 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,895,671 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,903,405 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 36.18s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,569 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,775 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,625 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,381 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,447 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,103 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,367 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,127 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,753 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,859 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,211 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,419 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,723 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,245 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,549 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,882 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,779 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,571 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,309 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,447 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,489 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 33.19s
Truncated 104976 bytes from beginning
4
1,283,794 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,089 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,264 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,459 >>> mbox cmd response: success
2,827,477 UART: [afmc] ++
2,827,645 UART: [afmc] CDI.KEYID = 6
2,828,008 UART: [afmc] SUBJECT.KEYID = 7
2,828,434 UART: [afmc] AUTHORITY.KEYID = 5
2,863,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,236 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,948 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,831 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,544 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,242 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,897 UART: [state] LifecycleState = Unprovisioned
86,552 UART: [state] DebugLocked = No
87,196 UART: [state] WD Timer not started. Device not locked for debugging
88,335 UART: [kat] SHA2-256
891,885 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,989 UART: [kat] ++
896,141 UART: [kat] sha1
900,519 UART: [kat] SHA2-256
902,459 UART: [kat] SHA2-384
905,136 UART: [kat] SHA2-512-ACC
907,037 UART: [kat] ECC-384
917,148 UART: [kat] HMAC-384Kdf
921,806 UART: [kat] LMS
1,170,118 UART: [kat] --
1,170,883 UART: [cold-reset] ++
1,171,271 UART: [fht] FHT @ 0x50003400
1,173,887 UART: [idev] ++
1,174,055 UART: [idev] CDI.KEYID = 6
1,174,416 UART: [idev] SUBJECT.KEYID = 7
1,174,841 UART: [idev] UDS.KEYID = 0
1,182,754 UART: [idev] Erasing UDS.KEYID = 0
1,199,848 UART: [idev] Sha1 KeyId Algorithm
1,208,716 UART: [idev] --
1,209,785 UART: [ldev] ++
1,209,953 UART: [ldev] CDI.KEYID = 6
1,210,317 UART: [ldev] SUBJECT.KEYID = 5
1,210,744 UART: [ldev] AUTHORITY.KEYID = 7
1,211,207 UART: [ldev] FE.KEYID = 1
1,216,223 UART: [ldev] Erasing FE.KEYID = 1
1,242,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,893 UART: [ldev] --
1,282,196 UART: [fwproc] Wait for Commands...
1,282,955 UART: [fwproc] Recv command 0x46574c44
1,283,688 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,255 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,695 >>> mbox cmd response: success
2,826,781 UART: [afmc] ++
2,826,949 UART: [afmc] CDI.KEYID = 6
2,827,312 UART: [afmc] SUBJECT.KEYID = 7
2,827,738 UART: [afmc] AUTHORITY.KEYID = 5
2,863,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,898 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,610 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,493 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,206 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,034 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,559 UART: [kat] SHA2-256
891,109 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
904,154 UART: [kat] SHA2-512-ACC
906,055 UART: [kat] ECC-384
915,736 UART: [kat] HMAC-384Kdf
920,460 UART: [kat] LMS
1,168,772 UART: [kat] --
1,169,625 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,181,954 UART: [idev] Erasing UDS.KEYID = 0
1,199,544 UART: [idev] Sha1 KeyId Algorithm
1,208,584 UART: [idev] --
1,209,507 UART: [ldev] ++
1,209,675 UART: [ldev] CDI.KEYID = 6
1,210,039 UART: [ldev] SUBJECT.KEYID = 5
1,210,466 UART: [ldev] AUTHORITY.KEYID = 7
1,210,929 UART: [ldev] FE.KEYID = 1
1,216,305 UART: [ldev] Erasing FE.KEYID = 1
1,242,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,117 UART: [ldev] --
1,282,370 UART: [fwproc] Wait for Commands...
1,283,071 UART: [fwproc] Recv command 0x46574c44
1,283,804 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,917 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,092 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,467 >>> mbox cmd response: success
2,828,537 UART: [afmc] ++
2,828,705 UART: [afmc] CDI.KEYID = 6
2,829,068 UART: [afmc] SUBJECT.KEYID = 7
2,829,494 UART: [afmc] AUTHORITY.KEYID = 5
2,865,144 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,302 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,888,014 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,897 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,610 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,907,438 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
891,413 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,517 UART: [kat] ++
895,669 UART: [kat] sha1
899,925 UART: [kat] SHA2-256
901,865 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
916,574 UART: [kat] HMAC-384Kdf
921,330 UART: [kat] LMS
1,169,642 UART: [kat] --
1,170,671 UART: [cold-reset] ++
1,171,061 UART: [fht] FHT @ 0x50003400
1,173,807 UART: [idev] ++
1,173,975 UART: [idev] CDI.KEYID = 6
1,174,336 UART: [idev] SUBJECT.KEYID = 7
1,174,761 UART: [idev] UDS.KEYID = 0
1,183,014 UART: [idev] Erasing UDS.KEYID = 0
1,200,262 UART: [idev] Sha1 KeyId Algorithm
1,209,194 UART: [idev] --
1,210,231 UART: [ldev] ++
1,210,399 UART: [ldev] CDI.KEYID = 6
1,210,763 UART: [ldev] SUBJECT.KEYID = 5
1,211,190 UART: [ldev] AUTHORITY.KEYID = 7
1,211,653 UART: [ldev] FE.KEYID = 1
1,216,803 UART: [ldev] Erasing FE.KEYID = 1
1,242,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,900 UART: [fwproc] Wait for Commands...
1,282,495 UART: [fwproc] Recv command 0x46574c44
1,283,228 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,541 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,716 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,911 >>> mbox cmd response: success
2,827,105 UART: [afmc] ++
2,827,273 UART: [afmc] CDI.KEYID = 6
2,827,636 UART: [afmc] SUBJECT.KEYID = 7
2,828,062 UART: [afmc] AUTHORITY.KEYID = 5
2,863,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,543 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,292 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,004 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,887 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,600 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,242 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.50s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,780 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,396 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,880 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,244 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,928 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,058 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,694 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,244 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,334 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,958 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,326 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,718 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,796 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,290 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,034 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,440 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,792 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,546 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,992 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,688 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,310 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 33.50s
Truncated 104976 bytes from beginning
4
1,282,533 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,610 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,785 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,190 >>> mbox cmd response: success
2,826,406 UART: [afmc] ++
2,826,574 UART: [afmc] CDI.KEYID = 6
2,826,937 UART: [afmc] SUBJECT.KEYID = 7
2,827,363 UART: [afmc] AUTHORITY.KEYID = 5
2,863,575 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,681 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,393 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,276 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,989 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,709 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,348 UART: [kat] ++
895,500 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
916,031 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,312 UART: [fht] FHT @ 0x50003400
1,172,966 UART: [idev] ++
1,173,134 UART: [idev] CDI.KEYID = 6
1,173,495 UART: [idev] SUBJECT.KEYID = 7
1,173,920 UART: [idev] UDS.KEYID = 0
1,182,101 UART: [idev] Erasing UDS.KEYID = 0
1,198,565 UART: [idev] Sha1 KeyId Algorithm
1,207,271 UART: [idev] --
1,208,434 UART: [ldev] ++
1,208,602 UART: [ldev] CDI.KEYID = 6
1,208,966 UART: [ldev] SUBJECT.KEYID = 5
1,209,393 UART: [ldev] AUTHORITY.KEYID = 7
1,209,856 UART: [ldev] FE.KEYID = 1
1,215,218 UART: [ldev] Erasing FE.KEYID = 1
1,241,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,378 UART: [ldev] --
1,280,691 UART: [fwproc] Wait for Commands...
1,281,318 UART: [fwproc] Recv command 0x46574c44
1,282,051 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,402 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,577 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,810 >>> mbox cmd response: success
2,827,894 UART: [afmc] ++
2,828,062 UART: [afmc] CDI.KEYID = 6
2,828,425 UART: [afmc] SUBJECT.KEYID = 7
2,828,851 UART: [afmc] AUTHORITY.KEYID = 5
2,864,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,645 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,357 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,240 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,953 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,665 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
891,304 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,491 UART: [kat] SHA2-512-ACC
906,392 UART: [kat] ECC-384
915,871 UART: [kat] HMAC-384Kdf
920,537 UART: [kat] LMS
1,168,849 UART: [kat] --
1,169,920 UART: [cold-reset] ++
1,170,340 UART: [fht] FHT @ 0x50003400
1,173,168 UART: [idev] ++
1,173,336 UART: [idev] CDI.KEYID = 6
1,173,697 UART: [idev] SUBJECT.KEYID = 7
1,174,122 UART: [idev] UDS.KEYID = 0
1,181,901 UART: [idev] Erasing UDS.KEYID = 0
1,198,969 UART: [idev] Sha1 KeyId Algorithm
1,207,913 UART: [idev] --
1,209,148 UART: [ldev] ++
1,209,316 UART: [ldev] CDI.KEYID = 6
1,209,680 UART: [ldev] SUBJECT.KEYID = 5
1,210,107 UART: [ldev] AUTHORITY.KEYID = 7
1,210,570 UART: [ldev] FE.KEYID = 1
1,215,452 UART: [ldev] Erasing FE.KEYID = 1
1,242,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,720 UART: [ldev] --
1,281,007 UART: [fwproc] Wait for Commands...
1,281,676 UART: [fwproc] Recv command 0x46574c44
1,282,409 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,660 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,835 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,154 >>> mbox cmd response: success
2,826,366 UART: [afmc] ++
2,826,534 UART: [afmc] CDI.KEYID = 6
2,826,897 UART: [afmc] SUBJECT.KEYID = 7
2,827,323 UART: [afmc] AUTHORITY.KEYID = 5
2,862,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,954 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,703 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,415 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,298 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,011 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,927 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,920 UART: [kat] SHA2-256
901,860 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,053 UART: [kat] HMAC-384Kdf
920,677 UART: [kat] LMS
1,168,989 UART: [kat] --
1,170,000 UART: [cold-reset] ++
1,170,506 UART: [fht] FHT @ 0x50003400
1,173,076 UART: [idev] ++
1,173,244 UART: [idev] CDI.KEYID = 6
1,173,605 UART: [idev] SUBJECT.KEYID = 7
1,174,030 UART: [idev] UDS.KEYID = 0
1,181,973 UART: [idev] Erasing UDS.KEYID = 0
1,199,333 UART: [idev] Sha1 KeyId Algorithm
1,208,121 UART: [idev] --
1,209,392 UART: [ldev] ++
1,209,560 UART: [ldev] CDI.KEYID = 6
1,209,924 UART: [ldev] SUBJECT.KEYID = 5
1,210,351 UART: [ldev] AUTHORITY.KEYID = 7
1,210,814 UART: [ldev] FE.KEYID = 1
1,215,984 UART: [ldev] Erasing FE.KEYID = 1
1,242,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,124 UART: [ldev] --
1,281,387 UART: [fwproc] Wait for Commands...
1,282,148 UART: [fwproc] Recv command 0x46574c44
1,282,881 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,966 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,141 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,424 >>> mbox cmd response: success
2,827,450 UART: [afmc] ++
2,827,618 UART: [afmc] CDI.KEYID = 6
2,827,981 UART: [afmc] SUBJECT.KEYID = 7
2,828,407 UART: [afmc] AUTHORITY.KEYID = 5
2,863,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,451 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,163 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,046 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,759 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,523 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.48s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,673 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,607 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,933 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,149 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,939 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,459 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,577 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,261 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,301 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,533 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,687 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,907 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,149 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,381 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,251 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,153 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,139 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,359 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,479 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,507 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,089 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 33.37s
Truncated 104976 bytes from beginning
4
1,282,550 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,652,031 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,206 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,489 >>> mbox cmd response: success
2,824,603 UART: [afmc] ++
2,824,771 UART: [afmc] CDI.KEYID = 6
2,825,134 UART: [afmc] SUBJECT.KEYID = 7
2,825,560 UART: [afmc] AUTHORITY.KEYID = 5
2,861,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,298 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,010 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,889,893 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,895,606 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,903,282 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
891,229 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,714 UART: [kat] SHA2-512-ACC
906,615 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,804 UART: [kat] LMS
1,169,116 UART: [kat] --
1,170,265 UART: [cold-reset] ++
1,170,843 UART: [fht] FHT @ 0x50003400
1,173,633 UART: [idev] ++
1,173,801 UART: [idev] CDI.KEYID = 6
1,174,162 UART: [idev] SUBJECT.KEYID = 7
1,174,587 UART: [idev] UDS.KEYID = 0
1,182,556 UART: [idev] Erasing UDS.KEYID = 0
1,199,588 UART: [idev] Sha1 KeyId Algorithm
1,208,486 UART: [idev] --
1,209,733 UART: [ldev] ++
1,209,901 UART: [ldev] CDI.KEYID = 6
1,210,265 UART: [ldev] SUBJECT.KEYID = 5
1,210,692 UART: [ldev] AUTHORITY.KEYID = 7
1,211,155 UART: [ldev] FE.KEYID = 1
1,216,463 UART: [ldev] Erasing FE.KEYID = 1
1,242,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,119 UART: [ldev] --
1,282,334 UART: [fwproc] Wait for Commands...
1,282,945 UART: [fwproc] Recv command 0x46574c44
1,283,678 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,656,049 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,224 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,571 >>> mbox cmd response: success
2,828,837 UART: [afmc] ++
2,829,005 UART: [afmc] CDI.KEYID = 6
2,829,368 UART: [afmc] SUBJECT.KEYID = 7
2,829,794 UART: [afmc] AUTHORITY.KEYID = 5
2,865,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,860 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,888,572 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,894,455 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,900,168 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,907,856 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,931 UART: [state] LifecycleState = Unprovisioned
85,586 UART: [state] DebugLocked = No
86,306 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
891,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,623 UART: [kat] SHA2-256
901,563 UART: [kat] SHA2-384
904,296 UART: [kat] SHA2-512-ACC
906,197 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,173,007 UART: [idev] ++
1,173,175 UART: [idev] CDI.KEYID = 6
1,173,536 UART: [idev] SUBJECT.KEYID = 7
1,173,961 UART: [idev] UDS.KEYID = 0
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,492 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,617 UART: [ldev] ++
1,209,785 UART: [ldev] CDI.KEYID = 6
1,210,149 UART: [ldev] SUBJECT.KEYID = 5
1,210,576 UART: [ldev] AUTHORITY.KEYID = 7
1,211,039 UART: [ldev] FE.KEYID = 1
1,216,123 UART: [ldev] Erasing FE.KEYID = 1
1,242,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,373 UART: [ldev] --
1,281,698 UART: [fwproc] Wait for Commands...
1,282,501 UART: [fwproc] Recv command 0x46574c44
1,283,234 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,999 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,174 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,385 >>> mbox cmd response: success
2,828,399 UART: [afmc] ++
2,828,567 UART: [afmc] CDI.KEYID = 6
2,828,930 UART: [afmc] SUBJECT.KEYID = 7
2,829,356 UART: [afmc] AUTHORITY.KEYID = 5
2,865,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,706 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,888,418 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,894,301 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,900,014 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,907,858 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,655 UART: [kat] ++
895,807 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,628 UART: [kat] HMAC-384Kdf
921,180 UART: [kat] LMS
1,169,492 UART: [kat] --
1,170,561 UART: [cold-reset] ++
1,170,913 UART: [fht] FHT @ 0x50003400
1,173,465 UART: [idev] ++
1,173,633 UART: [idev] CDI.KEYID = 6
1,173,994 UART: [idev] SUBJECT.KEYID = 7
1,174,419 UART: [idev] UDS.KEYID = 0
1,182,600 UART: [idev] Erasing UDS.KEYID = 0
1,199,664 UART: [idev] Sha1 KeyId Algorithm
1,208,740 UART: [idev] --
1,209,719 UART: [ldev] ++
1,209,887 UART: [ldev] CDI.KEYID = 6
1,210,251 UART: [ldev] SUBJECT.KEYID = 5
1,210,678 UART: [ldev] AUTHORITY.KEYID = 7
1,211,141 UART: [ldev] FE.KEYID = 1
1,216,361 UART: [ldev] Erasing FE.KEYID = 1
1,243,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,737 UART: [ldev] --
1,282,126 UART: [fwproc] Wait for Commands...
1,282,925 UART: [fwproc] Recv command 0x46574c44
1,283,658 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,027 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,202 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,367 >>> mbox cmd response: success
2,827,505 UART: [afmc] ++
2,827,673 UART: [afmc] CDI.KEYID = 6
2,828,036 UART: [afmc] SUBJECT.KEYID = 7
2,828,462 UART: [afmc] AUTHORITY.KEYID = 5
2,863,384 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,918 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,630 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,513 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,226 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,964 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.75s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,860 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,650 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,458 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,608 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,646 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,308 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,058 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,638 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,206 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,132 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,036 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,178 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,060 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,872 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,938 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,262 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,114 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,522 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,486 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,638 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,652 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 33.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,652 writing to cptra_bootfsm_go
6,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,862 UART:
193,229 UART: Running Caliptra ROM ...
194,394 UART:
194,554 UART: [state] CFI Enabled
262,379 UART: [state] LifecycleState = Unprovisioned
264,301 UART: [state] DebugLocked = No
266,279 UART: [state] WD Timer not started. Device not locked for debugging
269,321 UART: [kat] SHA2-256
448,989 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,767 UART: [kat] ++
460,255 UART: [kat] sha1
470,436 UART: [kat] SHA2-256
473,176 UART: [kat] SHA2-384
478,611 UART: [kat] SHA2-512-ACC
481,013 UART: [kat] ECC-384
2,944,372 UART: [kat] HMAC-384Kdf
2,968,944 UART: [kat] LMS
3,445,464 UART: [kat] --
3,448,588 UART: [cold-reset] ++
3,449,769 UART: [fht] FHT @ 0x50003400
3,461,005 UART: [idev] ++
3,461,580 UART: [idev] CDI.KEYID = 6
3,462,524 UART: [idev] SUBJECT.KEYID = 7
3,463,813 UART: [idev] UDS.KEYID = 0
3,498,459 UART: [idev] Erasing UDS.KEYID = 0
5,981,555 UART: [idev] Sha1 KeyId Algorithm
6,005,477 UART: [idev] --
6,010,698 UART: [ldev] ++
6,011,281 UART: [ldev] CDI.KEYID = 6
6,012,212 UART: [ldev] SUBJECT.KEYID = 5
6,013,374 UART: [ldev] AUTHORITY.KEYID = 7
6,014,615 UART: [ldev] FE.KEYID = 1
6,054,115 UART: [ldev] Erasing FE.KEYID = 1
8,559,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,037 UART: [ldev] --
10,372,975 UART: [fwproc] Wait for Commands...
10,375,956 UART: [fwproc] Recv command 0x46574c44
10,377,949 UART: [fwproc] Recv'd Img size: 118548 bytes
10,468,412 UART: ROM Fatal Error: 0x000B0032
10,471,664 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
5,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,344,350 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
6,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,436 UART:
192,822 UART: Running Caliptra ROM ...
193,986 UART:
603,735 UART: [state] CFI Enabled
617,146 UART: [state] LifecycleState = Unprovisioned
619,099 UART: [state] DebugLocked = No
620,533 UART: [state] WD Timer not started. Device not locked for debugging
625,061 UART: [kat] SHA2-256
804,698 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,469 UART: [kat] ++
816,063 UART: [kat] sha1
826,419 UART: [kat] SHA2-256
829,093 UART: [kat] SHA2-384
834,961 UART: [kat] SHA2-512-ACC
837,352 UART: [kat] ECC-384
3,279,064 UART: [kat] HMAC-384Kdf
3,290,660 UART: [kat] LMS
3,767,251 UART: [kat] --
3,772,264 UART: [cold-reset] ++
3,773,758 UART: [fht] FHT @ 0x50003400
3,784,303 UART: [idev] ++
3,784,870 UART: [idev] CDI.KEYID = 6
3,785,810 UART: [idev] SUBJECT.KEYID = 7
3,787,069 UART: [idev] UDS.KEYID = 0
3,802,584 UART: [idev] Erasing UDS.KEYID = 0
6,264,238 UART: [idev] Sha1 KeyId Algorithm
6,288,602 UART: [idev] --
6,294,105 UART: [ldev] ++
6,294,668 UART: [ldev] CDI.KEYID = 6
6,295,574 UART: [ldev] SUBJECT.KEYID = 5
6,296,783 UART: [ldev] AUTHORITY.KEYID = 7
6,298,068 UART: [ldev] FE.KEYID = 1
6,308,280 UART: [ldev] Erasing FE.KEYID = 1
8,781,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,280 UART: [ldev] --
10,576,854 UART: [fwproc] Wait for Commands...
10,580,044 UART: [fwproc] Recv command 0x46574c44
10,582,106 UART: [fwproc] Recv'd Img size: 118548 bytes
10,675,307 UART: ROM Fatal Error: 0x000B0032
10,678,498 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
6,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,555,721 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,228 UART: [kat] ++
895,380 UART: [kat] sha1
899,656 UART: [kat] SHA2-256
901,596 UART: [kat] SHA2-384
904,373 UART: [kat] SHA2-512-ACC
906,274 UART: [kat] ECC-384
915,735 UART: [kat] HMAC-384Kdf
920,415 UART: [kat] LMS
1,168,727 UART: [kat] --
1,169,850 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,172,778 UART: [idev] ++
1,172,946 UART: [idev] CDI.KEYID = 6
1,173,307 UART: [idev] SUBJECT.KEYID = 7
1,173,732 UART: [idev] UDS.KEYID = 0
1,181,923 UART: [idev] Erasing UDS.KEYID = 0
1,199,197 UART: [idev] Sha1 KeyId Algorithm
1,208,041 UART: [idev] --
1,209,132 UART: [ldev] ++
1,209,300 UART: [ldev] CDI.KEYID = 6
1,209,664 UART: [ldev] SUBJECT.KEYID = 5
1,210,091 UART: [ldev] AUTHORITY.KEYID = 7
1,210,554 UART: [ldev] FE.KEYID = 1
1,215,744 UART: [ldev] Erasing FE.KEYID = 1
1,242,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,932 UART: [ldev] --
1,281,281 UART: [fwproc] Wait for Commands...
1,282,016 UART: [fwproc] Recv command 0x46574c44
1,282,749 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,322 UART: ROM Fatal Error: 0x000B0032
1,309,479 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,784 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
891,545 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,649 UART: [kat] ++
895,801 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,960 UART: [kat] SHA2-512-ACC
906,861 UART: [kat] ECC-384
916,880 UART: [kat] HMAC-384Kdf
921,634 UART: [kat] LMS
1,169,946 UART: [kat] --
1,170,689 UART: [cold-reset] ++
1,171,221 UART: [fht] FHT @ 0x50003400
1,173,977 UART: [idev] ++
1,174,145 UART: [idev] CDI.KEYID = 6
1,174,506 UART: [idev] SUBJECT.KEYID = 7
1,174,931 UART: [idev] UDS.KEYID = 0
1,183,092 UART: [idev] Erasing UDS.KEYID = 0
1,199,958 UART: [idev] Sha1 KeyId Algorithm
1,208,796 UART: [idev] --
1,209,939 UART: [ldev] ++
1,210,107 UART: [ldev] CDI.KEYID = 6
1,210,471 UART: [ldev] SUBJECT.KEYID = 5
1,210,898 UART: [ldev] AUTHORITY.KEYID = 7
1,211,361 UART: [ldev] FE.KEYID = 1
1,216,573 UART: [ldev] Erasing FE.KEYID = 1
1,242,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,355 UART: [ldev] --
1,281,688 UART: [fwproc] Wait for Commands...
1,282,443 UART: [fwproc] Recv command 0x46574c44
1,283,176 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,575 UART: ROM Fatal Error: 0x000B0032
1,309,732 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,517 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,178 UART: [kat] ++
895,330 UART: [kat] sha1
899,516 UART: [kat] SHA2-256
901,456 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
915,813 UART: [kat] HMAC-384Kdf
920,381 UART: [kat] LMS
1,168,693 UART: [kat] --
1,169,586 UART: [cold-reset] ++
1,170,018 UART: [fht] FHT @ 0x50003400
1,172,790 UART: [idev] ++
1,172,958 UART: [idev] CDI.KEYID = 6
1,173,319 UART: [idev] SUBJECT.KEYID = 7
1,173,744 UART: [idev] UDS.KEYID = 0
1,181,969 UART: [idev] Erasing UDS.KEYID = 0
1,198,271 UART: [idev] Sha1 KeyId Algorithm
1,207,119 UART: [idev] --
1,208,222 UART: [ldev] ++
1,208,390 UART: [ldev] CDI.KEYID = 6
1,208,754 UART: [ldev] SUBJECT.KEYID = 5
1,209,181 UART: [ldev] AUTHORITY.KEYID = 7
1,209,644 UART: [ldev] FE.KEYID = 1
1,214,778 UART: [ldev] Erasing FE.KEYID = 1
1,241,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,394 UART: [ldev] --
1,280,661 UART: [fwproc] Wait for Commands...
1,281,276 UART: [fwproc] Recv command 0x46574c44
1,282,009 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,970 UART: ROM Fatal Error: 0x000B0032
1,309,127 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,194 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,995 UART: [state] LifecycleState = Unprovisioned
85,650 UART: [state] DebugLocked = No
86,328 UART: [state] WD Timer not started. Device not locked for debugging
87,567 UART: [kat] SHA2-256
891,117 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,527 UART: [kat] SHA2-256
901,467 UART: [kat] SHA2-384
904,150 UART: [kat] SHA2-512-ACC
906,051 UART: [kat] ECC-384
915,744 UART: [kat] HMAC-384Kdf
920,286 UART: [kat] LMS
1,168,598 UART: [kat] --
1,169,811 UART: [cold-reset] ++
1,170,363 UART: [fht] FHT @ 0x50003400
1,173,045 UART: [idev] ++
1,173,213 UART: [idev] CDI.KEYID = 6
1,173,574 UART: [idev] SUBJECT.KEYID = 7
1,173,999 UART: [idev] UDS.KEYID = 0
1,182,308 UART: [idev] Erasing UDS.KEYID = 0
1,199,582 UART: [idev] Sha1 KeyId Algorithm
1,208,404 UART: [idev] --
1,209,567 UART: [ldev] ++
1,209,735 UART: [ldev] CDI.KEYID = 6
1,210,099 UART: [ldev] SUBJECT.KEYID = 5
1,210,526 UART: [ldev] AUTHORITY.KEYID = 7
1,210,989 UART: [ldev] FE.KEYID = 1
1,216,225 UART: [ldev] Erasing FE.KEYID = 1
1,242,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,307 UART: [ldev] --
1,281,738 UART: [fwproc] Wait for Commands...
1,282,389 UART: [fwproc] Recv command 0x46574c44
1,283,122 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,859 UART: ROM Fatal Error: 0x000B0032
1,310,016 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,443 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
891,058 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,162 UART: [kat] ++
895,314 UART: [kat] sha1
899,556 UART: [kat] SHA2-256
901,496 UART: [kat] SHA2-384
904,027 UART: [kat] SHA2-512-ACC
905,928 UART: [kat] ECC-384
915,663 UART: [kat] HMAC-384Kdf
920,285 UART: [kat] LMS
1,168,597 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,206 UART: [fht] FHT @ 0x50003400
1,172,828 UART: [idev] ++
1,172,996 UART: [idev] CDI.KEYID = 6
1,173,357 UART: [idev] SUBJECT.KEYID = 7
1,173,782 UART: [idev] UDS.KEYID = 0
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,198,741 UART: [idev] Sha1 KeyId Algorithm
1,207,473 UART: [idev] --
1,208,392 UART: [ldev] ++
1,208,560 UART: [ldev] CDI.KEYID = 6
1,208,924 UART: [ldev] SUBJECT.KEYID = 5
1,209,351 UART: [ldev] AUTHORITY.KEYID = 7
1,209,814 UART: [ldev] FE.KEYID = 1
1,215,138 UART: [ldev] Erasing FE.KEYID = 1
1,241,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,470 UART: [ldev] --
1,280,857 UART: [fwproc] Wait for Commands...
1,281,524 UART: [fwproc] Recv command 0x46574c44
1,282,257 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,696 UART: ROM Fatal Error: 0x000B0032
1,309,853 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,614 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
891,701 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,805 UART: [kat] ++
895,957 UART: [kat] sha1
900,195 UART: [kat] SHA2-256
902,135 UART: [kat] SHA2-384
904,696 UART: [kat] SHA2-512-ACC
906,597 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,766 UART: [kat] LMS
1,169,078 UART: [kat] --
1,169,825 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,172,945 UART: [idev] ++
1,173,113 UART: [idev] CDI.KEYID = 6
1,173,474 UART: [idev] SUBJECT.KEYID = 7
1,173,899 UART: [idev] UDS.KEYID = 0
1,181,812 UART: [idev] Erasing UDS.KEYID = 0
1,198,478 UART: [idev] Sha1 KeyId Algorithm
1,207,474 UART: [idev] --
1,208,645 UART: [ldev] ++
1,208,813 UART: [ldev] CDI.KEYID = 6
1,209,177 UART: [ldev] SUBJECT.KEYID = 5
1,209,604 UART: [ldev] AUTHORITY.KEYID = 7
1,210,067 UART: [ldev] FE.KEYID = 1
1,215,477 UART: [ldev] Erasing FE.KEYID = 1
1,242,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,035 UART: [ldev] --
1,281,304 UART: [fwproc] Wait for Commands...
1,282,053 UART: [fwproc] Recv command 0x46574c44
1,282,786 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,151 UART: ROM Fatal Error: 0x000B0032
1,310,308 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,223 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
Truncated 76844 bytes from beginning
0,379,285 UART: [fwproc] Recv'd Img size: 118548 bytes
10,470,532 UART: ROM Fatal Error: 0x00B0003A
10,473,782 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
2,068,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,218,265 UART:
2,218,675 UART: Running Caliptra ROM ...
2,219,756 UART:
2,219,924 UART: [state] CFI Enabled
2,221,018 UART: [state] LifecycleState = Unprovisioned
2,222,698 UART: [state] DebugLocked = No
2,223,730 UART: [state] WD Timer not started. Device not locked for debugging
2,226,204 UART: [kat] SHA2-256
2,226,872 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,229,887 UART: [kat] ++
2,230,346 UART: [kat] sha1
2,230,863 UART: [kat] SHA2-256
2,231,527 UART: [kat] SHA2-384
2,232,191 UART: [kat] SHA2-512-ACC
2,233,038 UART: [kat] ECC-384
2,946,229 UART: [kat] HMAC-384Kdf
2,969,921 UART: [kat] LMS
3,446,420 UART: [kat] --
3,450,374 UART: [cold-reset] ++
3,451,279 UART: [fht] FHT @ 0x50003400
3,461,757 UART: [idev] ++
3,462,319 UART: [idev] CDI.KEYID = 6
3,463,266 UART: [idev] SUBJECT.KEYID = 7
3,464,539 UART: [idev] UDS.KEYID = 0
3,501,450 UART: [idev] Erasing UDS.KEYID = 0
5,985,514 UART: [idev] Sha1 KeyId Algorithm
6,009,543 UART: [idev] --
6,014,766 UART: [ldev] ++
6,015,353 UART: [ldev] CDI.KEYID = 6
6,016,271 UART: [ldev] SUBJECT.KEYID = 5
6,017,491 UART: [ldev] AUTHORITY.KEYID = 7
6,018,729 UART: [ldev] FE.KEYID = 1
6,058,987 UART: [ldev] Erasing FE.KEYID = 1
8,564,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,093 UART: [ldev] --
10,372,645 UART: [fwproc] Wait for Commands...
10,374,969 UART: [fwproc] Recv command 0x46574c44
10,376,957 UART: [fwproc] Recv'd Img size: 118548 bytes
10,473,508 UART: ROM Fatal Error: 0x00B0003A
10,476,857 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,814 writing to cptra_bootfsm_go
2,071,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,221,667 UART:
2,222,073 UART: Running Caliptra ROM ...
2,223,255 UART:
2,223,438 UART: [state] CFI Enabled
2,224,401 UART: [state] LifecycleState = Unprovisioned
2,226,045 UART: [state] DebugLocked = No
2,227,158 UART: [state] WD Timer not started. Device not locked for debugging
2,229,649 UART: [kat] SHA2-256
2,230,322 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,233,335 UART: [kat] ++
2,233,792 UART: [kat] sha1
2,234,364 UART: [kat] SHA2-256
2,235,091 UART: [kat] SHA2-384
2,235,783 UART: [kat] SHA2-512-ACC
2,236,620 UART: [kat] ECC-384
2,948,421 UART: [kat] HMAC-384Kdf
2,971,660 UART: [kat] LMS
3,448,146 UART: [kat] --
3,453,200 UART: [cold-reset] ++
3,455,758 UART: [fht] FHT @ 0x50003400
3,467,119 UART: [idev] ++
3,467,686 UART: [idev] CDI.KEYID = 6
3,468,656 UART: [idev] SUBJECT.KEYID = 7
3,469,875 UART: [idev] UDS.KEYID = 0
3,502,491 UART: [idev] Erasing UDS.KEYID = 0
5,986,801 UART: [idev] Sha1 KeyId Algorithm
6,010,574 UART: [idev] --
6,014,953 UART: [ldev] ++
6,015,563 UART: [ldev] CDI.KEYID = 6
6,016,509 UART: [ldev] SUBJECT.KEYID = 5
6,017,685 UART: [ldev] AUTHORITY.KEYID = 7
6,018,928 UART: [ldev] FE.KEYID = 1
6,057,891 UART: [ldev] Erasing FE.KEYID = 1
8,566,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,917 UART: [ldev] --
10,378,109 UART: [fwproc] Wait for Commands...
10,380,700 UART: [fwproc] Recv command 0x46574c44
10,382,748 UART: [fwproc] Recv'd Img size: 118548 bytes
10,471,670 UART: ROM Fatal Error: 0x00B0003A
10,474,909 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
2,072,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,221,826 UART:
2,222,220 UART: Running Caliptra ROM ...
2,223,394 UART:
2,223,578 UART: [state] CFI Enabled
2,224,538 UART: [state] LifecycleState = Unprovisioned
2,226,204 UART: [state] DebugLocked = No
2,227,322 UART: [state] WD Timer not started. Device not locked for debugging
2,229,797 UART: [kat] SHA2-256
2,230,476 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,233,504 UART: [kat] ++
2,233,964 UART: [kat] sha1
2,234,489 UART: [kat] SHA2-256
2,235,150 UART: [kat] SHA2-384
2,235,813 UART: [kat] SHA2-512-ACC
2,236,662 UART: [kat] ECC-384
2,950,579 UART: [kat] HMAC-384Kdf
2,973,859 UART: [kat] LMS
3,450,372 UART: [kat] --
3,457,610 UART: [cold-reset] ++
3,459,007 UART: [fht] FHT @ 0x50003400
3,469,504 UART: [idev] ++
3,470,108 UART: [idev] CDI.KEYID = 6
3,471,034 UART: [idev] SUBJECT.KEYID = 7
3,472,259 UART: [idev] UDS.KEYID = 0
3,503,374 UART: [idev] Erasing UDS.KEYID = 0
5,986,075 UART: [idev] Sha1 KeyId Algorithm
6,008,939 UART: [idev] --
6,012,616 UART: [ldev] ++
6,013,193 UART: [ldev] CDI.KEYID = 6
6,014,111 UART: [ldev] SUBJECT.KEYID = 5
6,015,330 UART: [ldev] AUTHORITY.KEYID = 7
6,016,568 UART: [ldev] FE.KEYID = 1
6,058,294 UART: [ldev] Erasing FE.KEYID = 1
8,566,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,119 UART: [ldev] --
10,374,123 UART: [fwproc] Wait for Commands...
10,376,341 UART: [fwproc] Recv command 0x46574c44
10,378,409 UART: [fwproc] Recv'd Img size: 118548 bytes
10,471,147 UART: ROM Fatal Error: 0x00B0003A
10,474,404 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
2,068,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,217,963 UART:
2,218,349 UART: Running Caliptra ROM ...
2,219,534 UART:
2,219,710 UART: [state] CFI Enabled
2,220,673 UART: [state] LifecycleState = Unprovisioned
2,222,349 UART: [state] DebugLocked = No
2,223,463 UART: [state] WD Timer not started. Device not locked for debugging
2,225,940 UART: [kat] SHA2-256
2,226,615 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,229,628 UART: [kat] ++
2,230,089 UART: [kat] sha1
2,230,669 UART: [kat] SHA2-256
2,231,335 UART: [kat] SHA2-384
2,232,090 UART: [kat] SHA2-512-ACC
2,232,959 UART: [kat] ECC-384
2,947,947 UART: [kat] HMAC-384Kdf
2,969,716 UART: [kat] LMS
3,446,237 UART: [kat] --
3,451,899 UART: [cold-reset] ++
3,453,835 UART: [fht] FHT @ 0x50003400
3,466,917 UART: [idev] ++
3,467,501 UART: [idev] CDI.KEYID = 6
3,468,446 UART: [idev] SUBJECT.KEYID = 7
3,469,719 UART: [idev] UDS.KEYID = 0
3,500,743 UART: [idev] Erasing UDS.KEYID = 0
5,985,028 UART: [idev] Sha1 KeyId Algorithm
6,009,453 UART: [idev] --
6,014,214 UART: [ldev] ++
6,014,787 UART: [ldev] CDI.KEYID = 6
6,015,676 UART: [ldev] SUBJECT.KEYID = 5
6,016,950 UART: [ldev] AUTHORITY.KEYID = 7
6,018,190 UART: [ldev] FE.KEYID = 1
6,055,178 UART: [ldev] Erasing FE.KEYID = 1
8,561,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,172 UART: [ldev] --
10,374,526 UART: [fwproc] Wait for Commands...
10,377,016 UART: [fwproc] Recv command 0x46574c44
10,379,019 UART: [fwproc] Recv'd Img size: 118548 bytes
14,907,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,995,959 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,068,983 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,398,127 >>> mbox cmd response: success
15,402,287 UART: [afmc] ++
15,402,875 UART: [afmc] CDI.KEYID = 6
15,403,900 UART: [afmc] SUBJECT.KEYID = 7
15,405,127 UART: [afmc] AUTHORITY.KEYID = 5
17,939,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,683,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,685,953 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
19,701,632 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
19,717,655 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
19,733,275 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
19,757,538 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 17.33s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,069,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,393,890 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
2,060,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,387,206 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
2,066,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,359,912 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,832 writing to cptra_bootfsm_go
2,067,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,364,379 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,075,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,363,921 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
2,072,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,341,552 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,068,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,364,997 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
2,060,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,358,447 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,065,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,321,448 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,059,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,364,851 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
2,067,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,345,228 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
2,070,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,336,218 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
2,062,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,337,536 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,839 writing to cptra_bootfsm_go
2,073,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,369,347 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
2,083,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,362,133 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
2,068,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,333,822 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,582 writing to cptra_bootfsm_go
2,065,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,371,361 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
2,068,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,364,924 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
2,069,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,349,539 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 17.14s
Truncated 76844 bytes from beginning
0,587,241 UART: [fwproc] Recv'd Img size: 118548 bytes
10,681,411 UART: ROM Fatal Error: 0x00B0003A
10,684,601 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,067,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,217,189 UART:
2,217,592 UART: Running Caliptra ROM ...
2,218,760 UART:
2,218,951 UART: [state] CFI Enabled
2,219,912 UART: [state] LifecycleState = Unprovisioned
2,221,567 UART: [state] DebugLocked = No
2,222,679 UART: [state] WD Timer not started. Device not locked for debugging
2,225,170 UART: [kat] SHA2-256
2,225,840 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,228,855 UART: [kat] ++
2,229,307 UART: [kat] sha1
2,229,818 UART: [kat] SHA2-256
2,230,556 UART: [kat] SHA2-384
2,231,220 UART: [kat] SHA2-512-ACC
2,232,100 UART: [kat] ECC-384
3,282,864 UART: [kat] HMAC-384Kdf
3,296,728 UART: [kat] LMS
3,773,259 UART: [kat] --
3,778,055 UART: [cold-reset] ++
3,779,342 UART: [fht] FHT @ 0x50003400
3,790,858 UART: [idev] ++
3,791,459 UART: [idev] CDI.KEYID = 6
3,792,370 UART: [idev] SUBJECT.KEYID = 7
3,793,656 UART: [idev] UDS.KEYID = 0
3,810,764 UART: [idev] Erasing UDS.KEYID = 0
6,273,535 UART: [idev] Sha1 KeyId Algorithm
6,296,398 UART: [idev] --
6,301,635 UART: [ldev] ++
6,302,200 UART: [ldev] CDI.KEYID = 6
6,303,127 UART: [ldev] SUBJECT.KEYID = 5
6,304,274 UART: [ldev] AUTHORITY.KEYID = 7
6,305,617 UART: [ldev] FE.KEYID = 1
6,319,415 UART: [ldev] Erasing FE.KEYID = 1
8,794,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,322 UART: [ldev] --
10,587,276 UART: [fwproc] Wait for Commands...
10,589,267 UART: [fwproc] Recv command 0x46574c44
10,591,398 UART: [fwproc] Recv'd Img size: 118548 bytes
10,680,608 UART: ROM Fatal Error: 0x00B0003A
10,683,800 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,068,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,218,619 UART:
2,219,029 UART: Running Caliptra ROM ...
2,220,201 UART:
2,220,398 UART: [state] CFI Enabled
2,221,365 UART: [state] LifecycleState = Unprovisioned
2,223,024 UART: [state] DebugLocked = No
2,224,136 UART: [state] WD Timer not started. Device not locked for debugging
2,226,606 UART: [kat] SHA2-256
2,227,273 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,230,295 UART: [kat] ++
2,230,749 UART: [kat] sha1
2,231,263 UART: [kat] SHA2-256
2,231,942 UART: [kat] SHA2-384
2,232,621 UART: [kat] SHA2-512-ACC
2,233,459 UART: [kat] ECC-384
3,278,555 UART: [kat] HMAC-384Kdf
3,290,199 UART: [kat] LMS
3,766,675 UART: [kat] --
3,771,149 UART: [cold-reset] ++
3,773,527 UART: [fht] FHT @ 0x50003400
3,784,719 UART: [idev] ++
3,785,294 UART: [idev] CDI.KEYID = 6
3,786,256 UART: [idev] SUBJECT.KEYID = 7
3,787,516 UART: [idev] UDS.KEYID = 0
3,804,781 UART: [idev] Erasing UDS.KEYID = 0
6,264,404 UART: [idev] Sha1 KeyId Algorithm
6,286,661 UART: [idev] --
6,292,867 UART: [ldev] ++
6,293,434 UART: [ldev] CDI.KEYID = 6
6,294,339 UART: [ldev] SUBJECT.KEYID = 5
6,295,545 UART: [ldev] AUTHORITY.KEYID = 7
6,296,824 UART: [ldev] FE.KEYID = 1
6,307,142 UART: [ldev] Erasing FE.KEYID = 1
8,786,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,861 UART: [ldev] --
10,580,050 UART: [fwproc] Wait for Commands...
10,581,992 UART: [fwproc] Recv command 0x46574c44
10,583,979 UART: [fwproc] Recv'd Img size: 118548 bytes
10,675,952 UART: ROM Fatal Error: 0x00B0003A
10,679,140 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,067,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,217,439 UART:
2,217,830 UART: Running Caliptra ROM ...
2,218,920 UART:
2,219,074 UART: [state] CFI Enabled
2,220,038 UART: [state] LifecycleState = Unprovisioned
2,221,700 UART: [state] DebugLocked = No
2,222,727 UART: [state] WD Timer not started. Device not locked for debugging
2,225,418 UART: [kat] SHA2-256
2,226,092 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,229,101 UART: [kat] ++
2,229,546 UART: [kat] sha1
2,230,050 UART: [kat] SHA2-256
2,230,704 UART: [kat] SHA2-384
2,231,451 UART: [kat] SHA2-512-ACC
2,232,263 UART: [kat] ECC-384
3,279,543 UART: [kat] HMAC-384Kdf
3,291,191 UART: [kat] LMS
3,767,687 UART: [kat] --
3,771,895 UART: [cold-reset] ++
3,773,124 UART: [fht] FHT @ 0x50003400
3,784,313 UART: [idev] ++
3,784,875 UART: [idev] CDI.KEYID = 6
3,785,886 UART: [idev] SUBJECT.KEYID = 7
3,787,102 UART: [idev] UDS.KEYID = 0
3,804,586 UART: [idev] Erasing UDS.KEYID = 0
6,267,070 UART: [idev] Sha1 KeyId Algorithm
6,290,034 UART: [idev] --
6,295,111 UART: [ldev] ++
6,295,731 UART: [ldev] CDI.KEYID = 6
6,296,637 UART: [ldev] SUBJECT.KEYID = 5
6,297,848 UART: [ldev] AUTHORITY.KEYID = 7
6,299,097 UART: [ldev] FE.KEYID = 1
6,310,830 UART: [ldev] Erasing FE.KEYID = 1
8,789,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,968 UART: [ldev] --
10,586,044 UART: [fwproc] Wait for Commands...
10,588,634 UART: [fwproc] Recv command 0x46574c44
10,590,623 UART: [fwproc] Recv'd Img size: 118548 bytes
10,682,860 UART: ROM Fatal Error: 0x00B0003A
10,686,050 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
2,069,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,219,518 UART:
2,219,911 UART: Running Caliptra ROM ...
2,221,092 UART:
2,221,272 UART: [state] CFI Enabled
2,222,223 UART: [state] LifecycleState = Unprovisioned
2,223,874 UART: [state] DebugLocked = No
2,224,980 UART: [state] WD Timer not started. Device not locked for debugging
2,227,453 UART: [kat] SHA2-256
2,228,123 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,231,139 UART: [kat] ++
2,231,589 UART: [kat] sha1
2,232,165 UART: [kat] SHA2-256
2,232,822 UART: [kat] SHA2-384
2,233,473 UART: [kat] SHA2-512-ACC
2,234,302 UART: [kat] ECC-384
3,283,958 UART: [kat] HMAC-384Kdf
3,294,986 UART: [kat] LMS
3,771,491 UART: [kat] --
3,775,478 UART: [cold-reset] ++
3,776,702 UART: [fht] FHT @ 0x50003400
3,787,887 UART: [idev] ++
3,788,506 UART: [idev] CDI.KEYID = 6
3,789,653 UART: [idev] SUBJECT.KEYID = 7
3,790,776 UART: [idev] UDS.KEYID = 0
3,806,860 UART: [idev] Erasing UDS.KEYID = 0
6,267,985 UART: [idev] Sha1 KeyId Algorithm
6,292,411 UART: [idev] --
6,297,791 UART: [ldev] ++
6,298,423 UART: [ldev] CDI.KEYID = 6
6,299,331 UART: [ldev] SUBJECT.KEYID = 5
6,300,544 UART: [ldev] AUTHORITY.KEYID = 7
6,301,774 UART: [ldev] FE.KEYID = 1
6,312,253 UART: [ldev] Erasing FE.KEYID = 1
8,795,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,213 UART: [ldev] --
10,591,290 UART: [fwproc] Wait for Commands...
10,593,853 UART: [fwproc] Recv command 0x46574c44
10,595,846 UART: [fwproc] Recv'd Img size: 118548 bytes
15,103,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,189,116 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,262,094 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,589,909 >>> mbox cmd response: success
15,593,584 UART: [afmc] ++
15,594,168 UART: [afmc] CDI.KEYID = 6
15,595,137 UART: [afmc] SUBJECT.KEYID = 7
15,596,350 UART: [afmc] AUTHORITY.KEYID = 5
18,094,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,813,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,816,126 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
19,831,831 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
19,847,854 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
19,863,435 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
19,887,688 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 17.66s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
2,067,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,569,958 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,064,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,563,208 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,062,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,577,799 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,740 writing to cptra_bootfsm_go
2,066,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,576,790 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
2,063,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,572,507 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
2,063,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,569,398 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,067,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,568,188 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
2,067,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,562,052 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
2,069,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,574,145 >>> mbox cmd response: failed
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,068,690 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,563,138 >>> mbox cmd response: failed
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,064,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,570,074 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
2,064,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,581,008 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
2,072,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,560,362 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
2,062,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,568,385 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
2,065,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,558,802 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
2,071,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,569,107 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
2,080,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,563,758 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
2,063,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,582,663 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
2,064,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,560,647 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 17.47s
Truncated 74764 bytes from beginning
1,271,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,974 UART: [ldev] --
1,280,343 UART: [fwproc] Wait for Commands...
1,281,036 UART: [fwproc] Recv command 0x46574c44
1,281,769 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,996 UART: ROM Fatal Error: 0x00B0003A
1,308,157 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,109 UART: [state] WD Timer not started. Device not locked for debugging
87,242 UART: [kat] SHA2-256
890,792 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,896 UART: [kat] ++
895,048 UART: [kat] sha1
899,384 UART: [kat] SHA2-256
901,324 UART: [kat] SHA2-384
904,241 UART: [kat] SHA2-512-ACC
906,142 UART: [kat] ECC-384
915,477 UART: [kat] HMAC-384Kdf
920,081 UART: [kat] LMS
1,168,393 UART: [kat] --
1,169,264 UART: [cold-reset] ++
1,169,646 UART: [fht] FHT @ 0x50003400
1,172,376 UART: [idev] ++
1,172,544 UART: [idev] CDI.KEYID = 6
1,172,905 UART: [idev] SUBJECT.KEYID = 7
1,173,330 UART: [idev] UDS.KEYID = 0
1,181,193 UART: [idev] Erasing UDS.KEYID = 0
1,197,995 UART: [idev] Sha1 KeyId Algorithm
1,206,961 UART: [idev] --
1,208,008 UART: [ldev] ++
1,208,176 UART: [ldev] CDI.KEYID = 6
1,208,540 UART: [ldev] SUBJECT.KEYID = 5
1,208,967 UART: [ldev] AUTHORITY.KEYID = 7
1,209,430 UART: [ldev] FE.KEYID = 1
1,214,374 UART: [ldev] Erasing FE.KEYID = 1
1,240,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,718 UART: [ldev] --
1,280,063 UART: [fwproc] Wait for Commands...
1,280,778 UART: [fwproc] Recv command 0x46574c44
1,281,511 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,546 UART: ROM Fatal Error: 0x00B0003A
1,308,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
891,374 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,579 UART: [kat] SHA2-512-ACC
906,480 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,845 UART: [kat] LMS
1,169,157 UART: [kat] --
1,170,058 UART: [cold-reset] ++
1,170,484 UART: [fht] FHT @ 0x50003400
1,173,172 UART: [idev] ++
1,173,340 UART: [idev] CDI.KEYID = 6
1,173,701 UART: [idev] SUBJECT.KEYID = 7
1,174,126 UART: [idev] UDS.KEYID = 0
1,182,113 UART: [idev] Erasing UDS.KEYID = 0
1,199,737 UART: [idev] Sha1 KeyId Algorithm
1,208,703 UART: [idev] --
1,209,898 UART: [ldev] ++
1,210,066 UART: [ldev] CDI.KEYID = 6
1,210,430 UART: [ldev] SUBJECT.KEYID = 5
1,210,857 UART: [ldev] AUTHORITY.KEYID = 7
1,211,320 UART: [ldev] FE.KEYID = 1
1,216,364 UART: [ldev] Erasing FE.KEYID = 1
1,242,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,266 UART: [ldev] --
1,281,701 UART: [fwproc] Wait for Commands...
1,282,370 UART: [fwproc] Recv command 0x46574c44
1,283,103 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,568 UART: ROM Fatal Error: 0x00B0003A
1,309,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,178 UART: [kat] ++
895,330 UART: [kat] sha1
899,398 UART: [kat] SHA2-256
901,338 UART: [kat] SHA2-384
904,209 UART: [kat] SHA2-512-ACC
906,110 UART: [kat] ECC-384
915,729 UART: [kat] HMAC-384Kdf
920,483 UART: [kat] LMS
1,168,795 UART: [kat] --
1,169,624 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,172,998 UART: [idev] ++
1,173,166 UART: [idev] CDI.KEYID = 6
1,173,527 UART: [idev] SUBJECT.KEYID = 7
1,173,952 UART: [idev] UDS.KEYID = 0
1,181,797 UART: [idev] Erasing UDS.KEYID = 0
1,198,919 UART: [idev] Sha1 KeyId Algorithm
1,207,657 UART: [idev] --
1,208,678 UART: [ldev] ++
1,208,846 UART: [ldev] CDI.KEYID = 6
1,209,210 UART: [ldev] SUBJECT.KEYID = 5
1,209,637 UART: [ldev] AUTHORITY.KEYID = 7
1,210,100 UART: [ldev] FE.KEYID = 1
1,215,402 UART: [ldev] Erasing FE.KEYID = 1
1,242,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,614 UART: [ldev] --
1,281,937 UART: [fwproc] Wait for Commands...
1,282,620 UART: [fwproc] Recv command 0x46574c44
1,283,353 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,030 UART: ROM Fatal Error: 0x00B0003A
1,310,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
891,374 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,143 UART: [kat] HMAC-384Kdf
920,849 UART: [kat] LMS
1,169,161 UART: [kat] --
1,169,998 UART: [cold-reset] ++
1,170,438 UART: [fht] FHT @ 0x50003400
1,173,024 UART: [idev] ++
1,173,192 UART: [idev] CDI.KEYID = 6
1,173,553 UART: [idev] SUBJECT.KEYID = 7
1,173,978 UART: [idev] UDS.KEYID = 0
1,181,577 UART: [idev] Erasing UDS.KEYID = 0
1,198,611 UART: [idev] Sha1 KeyId Algorithm
1,207,435 UART: [idev] --
1,208,340 UART: [ldev] ++
1,208,508 UART: [ldev] CDI.KEYID = 6
1,208,872 UART: [ldev] SUBJECT.KEYID = 5
1,209,299 UART: [ldev] AUTHORITY.KEYID = 7
1,209,762 UART: [ldev] FE.KEYID = 1
1,214,798 UART: [ldev] Erasing FE.KEYID = 1
1,240,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,678 UART: [ldev] --
1,280,125 UART: [fwproc] Wait for Commands...
1,280,914 UART: [fwproc] Recv command 0x46574c44
1,281,647 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,206,676 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,851 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,222 >>> mbox cmd response: success
3,379,438 UART: [afmc] ++
3,379,606 UART: [afmc] CDI.KEYID = 6
3,379,969 UART: [afmc] SUBJECT.KEYID = 7
3,380,395 UART: [afmc] AUTHORITY.KEYID = 5
3,415,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,276 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,437,994 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,443,884 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,449,566 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,457,392 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 21.79s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,152 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,992 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,862 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,360 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,658 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,932 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,744 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,704 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,004 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,866 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,231,211 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.67s
Truncated 74764 bytes from beginning
1,273,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,182 UART: [fwproc] Wait for Commands...
1,282,813 UART: [fwproc] Recv command 0x46574c44
1,283,546 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,609 UART: ROM Fatal Error: 0x00B0003A
1,310,770 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
891,663 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,767 UART: [kat] ++
895,919 UART: [kat] sha1
900,025 UART: [kat] SHA2-256
901,965 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
916,306 UART: [kat] HMAC-384Kdf
920,986 UART: [kat] LMS
1,169,298 UART: [kat] --
1,170,273 UART: [cold-reset] ++
1,170,639 UART: [fht] FHT @ 0x50003400
1,173,343 UART: [idev] ++
1,173,511 UART: [idev] CDI.KEYID = 6
1,173,872 UART: [idev] SUBJECT.KEYID = 7
1,174,297 UART: [idev] UDS.KEYID = 0
1,182,200 UART: [idev] Erasing UDS.KEYID = 0
1,199,088 UART: [idev] Sha1 KeyId Algorithm
1,207,806 UART: [idev] --
1,208,897 UART: [ldev] ++
1,209,065 UART: [ldev] CDI.KEYID = 6
1,209,429 UART: [ldev] SUBJECT.KEYID = 5
1,209,856 UART: [ldev] AUTHORITY.KEYID = 7
1,210,319 UART: [ldev] FE.KEYID = 1
1,215,463 UART: [ldev] Erasing FE.KEYID = 1
1,241,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,561 UART: [ldev] --
1,280,766 UART: [fwproc] Wait for Commands...
1,281,399 UART: [fwproc] Recv command 0x46574c44
1,282,132 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,015 UART: ROM Fatal Error: 0x00B0003A
1,309,176 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,843 UART: [state] LifecycleState = Unprovisioned
85,498 UART: [state] DebugLocked = No
85,990 UART: [state] WD Timer not started. Device not locked for debugging
87,109 UART: [kat] SHA2-256
890,659 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,763 UART: [kat] ++
894,915 UART: [kat] sha1
899,089 UART: [kat] SHA2-256
901,029 UART: [kat] SHA2-384
903,950 UART: [kat] SHA2-512-ACC
905,851 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
1,182,128 UART: [idev] Erasing UDS.KEYID = 0
1,199,038 UART: [idev] Sha1 KeyId Algorithm
1,207,760 UART: [idev] --
1,208,635 UART: [ldev] ++
1,208,803 UART: [ldev] CDI.KEYID = 6
1,209,167 UART: [ldev] SUBJECT.KEYID = 5
1,209,594 UART: [ldev] AUTHORITY.KEYID = 7
1,210,057 UART: [ldev] FE.KEYID = 1
1,215,279 UART: [ldev] Erasing FE.KEYID = 1
1,242,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,961 UART: [ldev] --
1,281,212 UART: [fwproc] Wait for Commands...
1,281,807 UART: [fwproc] Recv command 0x46574c44
1,282,540 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,585 UART: ROM Fatal Error: 0x00B0003A
1,309,746 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,901 UART: [state] LifecycleState = Unprovisioned
85,556 UART: [state] DebugLocked = No
86,060 UART: [state] WD Timer not started. Device not locked for debugging
87,315 UART: [kat] SHA2-256
890,865 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,969 UART: [kat] ++
895,121 UART: [kat] sha1
899,233 UART: [kat] SHA2-256
901,173 UART: [kat] SHA2-384
903,970 UART: [kat] SHA2-512-ACC
905,871 UART: [kat] ECC-384
915,666 UART: [kat] HMAC-384Kdf
920,410 UART: [kat] LMS
1,168,722 UART: [kat] --
1,169,707 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,607 UART: [idev] ++
1,172,775 UART: [idev] CDI.KEYID = 6
1,173,136 UART: [idev] SUBJECT.KEYID = 7
1,173,561 UART: [idev] UDS.KEYID = 0
1,181,574 UART: [idev] Erasing UDS.KEYID = 0
1,198,526 UART: [idev] Sha1 KeyId Algorithm
1,207,456 UART: [idev] --
1,208,351 UART: [ldev] ++
1,208,519 UART: [ldev] CDI.KEYID = 6
1,208,883 UART: [ldev] SUBJECT.KEYID = 5
1,209,310 UART: [ldev] AUTHORITY.KEYID = 7
1,209,773 UART: [ldev] FE.KEYID = 1
1,215,149 UART: [ldev] Erasing FE.KEYID = 1
1,242,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,051 UART: [ldev] --
1,281,446 UART: [fwproc] Wait for Commands...
1,282,097 UART: [fwproc] Recv command 0x46574c44
1,282,830 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,367 UART: ROM Fatal Error: 0x00B0003A
1,309,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
900,149 UART: [kat] SHA2-256
902,089 UART: [kat] SHA2-384
904,930 UART: [kat] SHA2-512-ACC
906,831 UART: [kat] ECC-384
916,874 UART: [kat] HMAC-384Kdf
921,442 UART: [kat] LMS
1,169,754 UART: [kat] --
1,170,701 UART: [cold-reset] ++
1,171,179 UART: [fht] FHT @ 0x50003400
1,173,899 UART: [idev] ++
1,174,067 UART: [idev] CDI.KEYID = 6
1,174,428 UART: [idev] SUBJECT.KEYID = 7
1,174,853 UART: [idev] UDS.KEYID = 0
1,183,004 UART: [idev] Erasing UDS.KEYID = 0
1,200,542 UART: [idev] Sha1 KeyId Algorithm
1,209,380 UART: [idev] --
1,210,577 UART: [ldev] ++
1,210,745 UART: [ldev] CDI.KEYID = 6
1,211,109 UART: [ldev] SUBJECT.KEYID = 5
1,211,536 UART: [ldev] AUTHORITY.KEYID = 7
1,211,999 UART: [ldev] FE.KEYID = 1
1,217,335 UART: [ldev] Erasing FE.KEYID = 1
1,244,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,937 UART: [ldev] --
1,284,342 UART: [fwproc] Wait for Commands...
1,284,941 UART: [fwproc] Recv command 0x46574c44
1,285,674 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,206,592 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,767 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,108 >>> mbox cmd response: success
3,379,232 UART: [afmc] ++
3,379,400 UART: [afmc] CDI.KEYID = 6
3,379,763 UART: [afmc] SUBJECT.KEYID = 7
3,380,189 UART: [afmc] AUTHORITY.KEYID = 5
3,416,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,843 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,592 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,439,310 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,445,200 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,450,882 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,458,850 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 22.09s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,037 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,817 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,019 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,531 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,167,403 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,113 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,023 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,737 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,167,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,475 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,803 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,527 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,021 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,214,553 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.57s
Truncated 74764 bytes from beginning
1,271,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,056 UART: [ldev] --
1,280,395 UART: [fwproc] Wait for Commands...
1,281,176 UART: [fwproc] Recv command 0x46574c44
1,281,909 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,640 UART: ROM Fatal Error: 0x00B0003A
1,308,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,760 UART: [state] LifecycleState = Unprovisioned
85,415 UART: [state] DebugLocked = No
85,983 UART: [state] WD Timer not started. Device not locked for debugging
87,216 UART: [kat] SHA2-256
890,766 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,870 UART: [kat] ++
895,022 UART: [kat] sha1
899,262 UART: [kat] SHA2-256
901,202 UART: [kat] SHA2-384
903,899 UART: [kat] SHA2-512-ACC
905,800 UART: [kat] ECC-384
915,931 UART: [kat] HMAC-384Kdf
920,517 UART: [kat] LMS
1,168,829 UART: [kat] --
1,169,670 UART: [cold-reset] ++
1,170,036 UART: [fht] FHT @ 0x50003400
1,172,716 UART: [idev] ++
1,172,884 UART: [idev] CDI.KEYID = 6
1,173,245 UART: [idev] SUBJECT.KEYID = 7
1,173,670 UART: [idev] UDS.KEYID = 0
1,181,271 UART: [idev] Erasing UDS.KEYID = 0
1,198,125 UART: [idev] Sha1 KeyId Algorithm
1,206,835 UART: [idev] --
1,207,862 UART: [ldev] ++
1,208,030 UART: [ldev] CDI.KEYID = 6
1,208,394 UART: [ldev] SUBJECT.KEYID = 5
1,208,821 UART: [ldev] AUTHORITY.KEYID = 7
1,209,284 UART: [ldev] FE.KEYID = 1
1,214,524 UART: [ldev] Erasing FE.KEYID = 1
1,241,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,992 UART: [ldev] --
1,280,369 UART: [fwproc] Wait for Commands...
1,281,080 UART: [fwproc] Recv command 0x46574c44
1,281,813 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,896 UART: ROM Fatal Error: 0x00B0003A
1,309,057 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,140 UART: [kat] SHA2-256
890,690 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,794 UART: [kat] ++
894,946 UART: [kat] sha1
899,296 UART: [kat] SHA2-256
901,236 UART: [kat] SHA2-384
903,967 UART: [kat] SHA2-512-ACC
905,868 UART: [kat] ECC-384
915,509 UART: [kat] HMAC-384Kdf
919,973 UART: [kat] LMS
1,168,285 UART: [kat] --
1,168,896 UART: [cold-reset] ++
1,169,302 UART: [fht] FHT @ 0x50003400
1,171,854 UART: [idev] ++
1,172,022 UART: [idev] CDI.KEYID = 6
1,172,383 UART: [idev] SUBJECT.KEYID = 7
1,172,808 UART: [idev] UDS.KEYID = 0
1,180,839 UART: [idev] Erasing UDS.KEYID = 0
1,197,303 UART: [idev] Sha1 KeyId Algorithm
1,206,239 UART: [idev] --
1,207,402 UART: [ldev] ++
1,207,570 UART: [ldev] CDI.KEYID = 6
1,207,934 UART: [ldev] SUBJECT.KEYID = 5
1,208,361 UART: [ldev] AUTHORITY.KEYID = 7
1,208,824 UART: [ldev] FE.KEYID = 1
1,214,138 UART: [ldev] Erasing FE.KEYID = 1
1,240,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,234 UART: [ldev] --
1,279,435 UART: [fwproc] Wait for Commands...
1,280,138 UART: [fwproc] Recv command 0x46574c44
1,280,871 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,960 UART: ROM Fatal Error: 0x00B0003A
1,308,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,640 UART: [kat] SHA2-256
901,580 UART: [kat] SHA2-384
904,315 UART: [kat] SHA2-512-ACC
906,216 UART: [kat] ECC-384
916,253 UART: [kat] HMAC-384Kdf
920,727 UART: [kat] LMS
1,169,039 UART: [kat] --
1,169,920 UART: [cold-reset] ++
1,170,262 UART: [fht] FHT @ 0x50003400
1,172,950 UART: [idev] ++
1,173,118 UART: [idev] CDI.KEYID = 6
1,173,479 UART: [idev] SUBJECT.KEYID = 7
1,173,904 UART: [idev] UDS.KEYID = 0
1,181,807 UART: [idev] Erasing UDS.KEYID = 0
1,199,121 UART: [idev] Sha1 KeyId Algorithm
1,207,903 UART: [idev] --
1,209,030 UART: [ldev] ++
1,209,198 UART: [ldev] CDI.KEYID = 6
1,209,562 UART: [ldev] SUBJECT.KEYID = 5
1,209,989 UART: [ldev] AUTHORITY.KEYID = 7
1,210,452 UART: [ldev] FE.KEYID = 1
1,215,688 UART: [ldev] Erasing FE.KEYID = 1
1,242,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,082 UART: [ldev] --
1,281,403 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,705 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,652 UART: ROM Fatal Error: 0x00B0003A
1,309,813 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
891,364 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,468 UART: [kat] ++
895,620 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,581 UART: [kat] SHA2-512-ACC
906,482 UART: [kat] ECC-384
916,125 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,792 UART: [cold-reset] ++
1,170,332 UART: [fht] FHT @ 0x50003400
1,173,152 UART: [idev] ++
1,173,320 UART: [idev] CDI.KEYID = 6
1,173,681 UART: [idev] SUBJECT.KEYID = 7
1,174,106 UART: [idev] UDS.KEYID = 0
1,182,033 UART: [idev] Erasing UDS.KEYID = 0
1,199,215 UART: [idev] Sha1 KeyId Algorithm
1,207,991 UART: [idev] --
1,209,162 UART: [ldev] ++
1,209,330 UART: [ldev] CDI.KEYID = 6
1,209,694 UART: [ldev] SUBJECT.KEYID = 5
1,210,121 UART: [ldev] AUTHORITY.KEYID = 7
1,210,584 UART: [ldev] FE.KEYID = 1
1,215,560 UART: [ldev] Erasing FE.KEYID = 1
1,241,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,522 UART: [ldev] --
1,280,915 UART: [fwproc] Wait for Commands...
1,281,622 UART: [fwproc] Recv command 0x46574c44
1,282,355 UART: [fwproc] Recv'd Img size: 118548 bytes
3,165,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,193,451 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,224,626 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,364,889 >>> mbox cmd response: success
3,365,941 UART: [afmc] ++
3,366,109 UART: [afmc] CDI.KEYID = 6
3,366,472 UART: [afmc] SUBJECT.KEYID = 7
3,366,898 UART: [afmc] AUTHORITY.KEYID = 5
3,402,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,419,254 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,420,003 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,425,721 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,431,611 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,437,293 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,444,965 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.65s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,482 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,486 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,658 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,540 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,418 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,370 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,682 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,164 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,110 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,770 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,452 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,190 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,218 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,248 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,231,489 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 19.58s
Truncated 74764 bytes from beginning
1,272,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,825 UART: [ldev] --
1,281,052 UART: [fwproc] Wait for Commands...
1,281,855 UART: [fwproc] Recv command 0x46574c44
1,282,588 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,539 UART: ROM Fatal Error: 0x00B0003A
1,309,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,501 UART: [kat] ++
895,653 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,332 UART: [kat] SHA2-512-ACC
906,233 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,882 UART: [kat] LMS
1,169,194 UART: [kat] --
1,170,125 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,255 UART: [idev] ++
1,173,423 UART: [idev] CDI.KEYID = 6
1,173,784 UART: [idev] SUBJECT.KEYID = 7
1,174,209 UART: [idev] UDS.KEYID = 0
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,332 UART: [idev] --
1,209,491 UART: [ldev] ++
1,209,659 UART: [ldev] CDI.KEYID = 6
1,210,023 UART: [ldev] SUBJECT.KEYID = 5
1,210,450 UART: [ldev] AUTHORITY.KEYID = 7
1,210,913 UART: [ldev] FE.KEYID = 1
1,216,503 UART: [ldev] Erasing FE.KEYID = 1
1,242,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,913 UART: [ldev] --
1,281,296 UART: [fwproc] Wait for Commands...
1,281,915 UART: [fwproc] Recv command 0x46574c44
1,282,648 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,495 UART: ROM Fatal Error: 0x00B0003A
1,309,656 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,862 UART: [kat] SHA2-512-ACC
906,763 UART: [kat] ECC-384
916,354 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,397 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,181,732 UART: [idev] Erasing UDS.KEYID = 0
1,198,830 UART: [idev] Sha1 KeyId Algorithm
1,207,704 UART: [idev] --
1,208,861 UART: [ldev] ++
1,209,029 UART: [ldev] CDI.KEYID = 6
1,209,393 UART: [ldev] SUBJECT.KEYID = 5
1,209,820 UART: [ldev] AUTHORITY.KEYID = 7
1,210,283 UART: [ldev] FE.KEYID = 1
1,215,613 UART: [ldev] Erasing FE.KEYID = 1
1,242,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,295 UART: [ldev] --
1,281,690 UART: [fwproc] Wait for Commands...
1,282,443 UART: [fwproc] Recv command 0x46574c44
1,283,176 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,041 UART: ROM Fatal Error: 0x00B0003A
1,310,202 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
891,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,413 UART: [kat] ++
895,565 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,638 UART: [kat] SHA2-512-ACC
906,539 UART: [kat] ECC-384
916,670 UART: [kat] HMAC-384Kdf
921,282 UART: [kat] LMS
1,169,594 UART: [kat] --
1,170,421 UART: [cold-reset] ++
1,170,937 UART: [fht] FHT @ 0x50003400
1,173,463 UART: [idev] ++
1,173,631 UART: [idev] CDI.KEYID = 6
1,173,992 UART: [idev] SUBJECT.KEYID = 7
1,174,417 UART: [idev] UDS.KEYID = 0
1,182,946 UART: [idev] Erasing UDS.KEYID = 0
1,199,772 UART: [idev] Sha1 KeyId Algorithm
1,208,522 UART: [idev] --
1,209,519 UART: [ldev] ++
1,209,687 UART: [ldev] CDI.KEYID = 6
1,210,051 UART: [ldev] SUBJECT.KEYID = 5
1,210,478 UART: [ldev] AUTHORITY.KEYID = 7
1,210,941 UART: [ldev] FE.KEYID = 1
1,216,039 UART: [ldev] Erasing FE.KEYID = 1
1,242,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,307 UART: [ldev] --
1,281,528 UART: [fwproc] Wait for Commands...
1,282,337 UART: [fwproc] Recv command 0x46574c44
1,283,070 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,119 UART: ROM Fatal Error: 0x00B0003A
1,310,280 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
891,631 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,735 UART: [kat] ++
895,887 UART: [kat] sha1
899,983 UART: [kat] SHA2-256
901,923 UART: [kat] SHA2-384
904,646 UART: [kat] SHA2-512-ACC
906,547 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
921,022 UART: [kat] LMS
1,169,334 UART: [kat] --
1,170,239 UART: [cold-reset] ++
1,170,809 UART: [fht] FHT @ 0x50003400
1,173,327 UART: [idev] ++
1,173,495 UART: [idev] CDI.KEYID = 6
1,173,856 UART: [idev] SUBJECT.KEYID = 7
1,174,281 UART: [idev] UDS.KEYID = 0
1,182,334 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,686 UART: [idev] --
1,209,709 UART: [ldev] ++
1,209,877 UART: [ldev] CDI.KEYID = 6
1,210,241 UART: [ldev] SUBJECT.KEYID = 5
1,210,668 UART: [ldev] AUTHORITY.KEYID = 7
1,211,131 UART: [ldev] FE.KEYID = 1
1,216,257 UART: [ldev] Erasing FE.KEYID = 1
1,242,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,895 UART: [ldev] --
1,282,280 UART: [fwproc] Wait for Commands...
1,282,935 UART: [fwproc] Recv command 0x46574c44
1,283,668 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,203,389 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,564 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,919 >>> mbox cmd response: success
3,376,001 UART: [afmc] ++
3,376,169 UART: [afmc] CDI.KEYID = 6
3,376,532 UART: [afmc] SUBJECT.KEYID = 7
3,376,958 UART: [afmc] AUTHORITY.KEYID = 5
3,412,673 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,797 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,435,515 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,441,405 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,447,087 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,454,729 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.71s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,773 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,289 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,355 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,803 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,033 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,167,671 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,451 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,865 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,383 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,205 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,293 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,099 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,855 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,157 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,215,495 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 19.66s
Truncated 74764 bytes from beginning
1,272,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,202 UART: [ldev] --
1,280,483 UART: [fwproc] Wait for Commands...
1,281,246 UART: [fwproc] Recv command 0x46574c44
1,281,979 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,596 UART: ROM Fatal Error: 0x00B0003A
1,308,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,903 UART: [state] WD Timer not started. Device not locked for debugging
88,058 UART: [kat] SHA2-256
891,608 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,712 UART: [kat] ++
895,864 UART: [kat] sha1
899,940 UART: [kat] SHA2-256
901,880 UART: [kat] SHA2-384
904,813 UART: [kat] SHA2-512-ACC
906,714 UART: [kat] ECC-384
916,129 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,169,842 UART: [cold-reset] ++
1,170,198 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,181,627 UART: [idev] Erasing UDS.KEYID = 0
1,198,523 UART: [idev] Sha1 KeyId Algorithm
1,207,533 UART: [idev] --
1,208,504 UART: [ldev] ++
1,208,672 UART: [ldev] CDI.KEYID = 6
1,209,036 UART: [ldev] SUBJECT.KEYID = 5
1,209,463 UART: [ldev] AUTHORITY.KEYID = 7
1,209,926 UART: [ldev] FE.KEYID = 1
1,215,470 UART: [ldev] Erasing FE.KEYID = 1
1,241,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,130 UART: [ldev] --
1,280,363 UART: [fwproc] Wait for Commands...
1,281,042 UART: [fwproc] Recv command 0x46574c44
1,281,775 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,048 UART: ROM Fatal Error: 0x00B0003A
1,308,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,728 UART: [state] LifecycleState = Unprovisioned
85,383 UART: [state] DebugLocked = No
85,877 UART: [state] WD Timer not started. Device not locked for debugging
87,148 UART: [kat] SHA2-256
890,698 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,802 UART: [kat] ++
894,954 UART: [kat] sha1
899,344 UART: [kat] SHA2-256
901,284 UART: [kat] SHA2-384
903,871 UART: [kat] SHA2-512-ACC
905,772 UART: [kat] ECC-384
915,161 UART: [kat] HMAC-384Kdf
919,855 UART: [kat] LMS
1,168,167 UART: [kat] --
1,169,264 UART: [cold-reset] ++
1,169,720 UART: [fht] FHT @ 0x50003400
1,172,150 UART: [idev] ++
1,172,318 UART: [idev] CDI.KEYID = 6
1,172,679 UART: [idev] SUBJECT.KEYID = 7
1,173,104 UART: [idev] UDS.KEYID = 0
1,181,455 UART: [idev] Erasing UDS.KEYID = 0
1,198,921 UART: [idev] Sha1 KeyId Algorithm
1,207,857 UART: [idev] --
1,209,082 UART: [ldev] ++
1,209,250 UART: [ldev] CDI.KEYID = 6
1,209,614 UART: [ldev] SUBJECT.KEYID = 5
1,210,041 UART: [ldev] AUTHORITY.KEYID = 7
1,210,504 UART: [ldev] FE.KEYID = 1
1,215,506 UART: [ldev] Erasing FE.KEYID = 1
1,241,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,416 UART: [ldev] --
1,280,743 UART: [fwproc] Wait for Commands...
1,281,386 UART: [fwproc] Recv command 0x46574c44
1,282,119 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,008 UART: ROM Fatal Error: 0x00B0003A
1,309,169 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,774 UART: [state] LifecycleState = Unprovisioned
85,429 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,352 UART: [kat] SHA2-256
890,902 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,006 UART: [kat] ++
895,158 UART: [kat] sha1
899,492 UART: [kat] SHA2-256
901,432 UART: [kat] SHA2-384
904,213 UART: [kat] SHA2-512-ACC
906,114 UART: [kat] ECC-384
915,853 UART: [kat] HMAC-384Kdf
920,565 UART: [kat] LMS
1,168,877 UART: [kat] --
1,169,692 UART: [cold-reset] ++
1,170,252 UART: [fht] FHT @ 0x50003400
1,172,940 UART: [idev] ++
1,173,108 UART: [idev] CDI.KEYID = 6
1,173,469 UART: [idev] SUBJECT.KEYID = 7
1,173,894 UART: [idev] UDS.KEYID = 0
1,181,959 UART: [idev] Erasing UDS.KEYID = 0
1,199,209 UART: [idev] Sha1 KeyId Algorithm
1,208,063 UART: [idev] --
1,209,046 UART: [ldev] ++
1,209,214 UART: [ldev] CDI.KEYID = 6
1,209,578 UART: [ldev] SUBJECT.KEYID = 5
1,210,005 UART: [ldev] AUTHORITY.KEYID = 7
1,210,468 UART: [ldev] FE.KEYID = 1
1,215,430 UART: [ldev] Erasing FE.KEYID = 1
1,241,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,692 UART: [ldev] --
1,281,053 UART: [fwproc] Wait for Commands...
1,281,806 UART: [fwproc] Recv command 0x46574c44
1,282,539 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,240 UART: ROM Fatal Error: 0x00B0003A
1,309,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
88,042 UART: [kat] SHA2-256
891,592 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
905,009 UART: [kat] SHA2-512-ACC
906,910 UART: [kat] ECC-384
916,815 UART: [kat] HMAC-384Kdf
921,309 UART: [kat] LMS
1,169,621 UART: [kat] --
1,170,690 UART: [cold-reset] ++
1,171,198 UART: [fht] FHT @ 0x50003400
1,173,810 UART: [idev] ++
1,173,978 UART: [idev] CDI.KEYID = 6
1,174,339 UART: [idev] SUBJECT.KEYID = 7
1,174,764 UART: [idev] UDS.KEYID = 0
1,182,637 UART: [idev] Erasing UDS.KEYID = 0
1,199,357 UART: [idev] Sha1 KeyId Algorithm
1,208,197 UART: [idev] --
1,209,266 UART: [ldev] ++
1,209,434 UART: [ldev] CDI.KEYID = 6
1,209,798 UART: [ldev] SUBJECT.KEYID = 5
1,210,225 UART: [ldev] AUTHORITY.KEYID = 7
1,210,688 UART: [ldev] FE.KEYID = 1
1,215,746 UART: [ldev] Erasing FE.KEYID = 1
1,241,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,646 UART: [ldev] --
1,280,885 UART: [fwproc] Wait for Commands...
1,281,666 UART: [fwproc] Recv command 0x46574c44
1,282,399 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,198,847 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,022 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,381 >>> mbox cmd response: success
3,371,643 UART: [afmc] ++
3,371,811 UART: [afmc] CDI.KEYID = 6
3,372,174 UART: [afmc] SUBJECT.KEYID = 7
3,372,600 UART: [afmc] AUTHORITY.KEYID = 5
3,408,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,856 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,605 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,431,323 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,437,213 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,442,895 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,450,529 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.71s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,310 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,758 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,492 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,482 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,724 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,092 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,818 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,168 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,404 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,206,387 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 19.60s
Truncated 74764 bytes from beginning
1,272,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,437 UART: [ldev] --
1,280,852 UART: [fwproc] Wait for Commands...
1,281,479 UART: [fwproc] Recv command 0x46574c44
1,282,212 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,027 UART: ROM Fatal Error: 0x00B0003A
1,309,188 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
891,291 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,781 UART: [kat] SHA2-256
901,721 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
916,130 UART: [kat] HMAC-384Kdf
920,756 UART: [kat] LMS
1,169,068 UART: [kat] --
1,170,089 UART: [cold-reset] ++
1,170,503 UART: [fht] FHT @ 0x50003400
1,173,171 UART: [idev] ++
1,173,339 UART: [idev] CDI.KEYID = 6
1,173,700 UART: [idev] SUBJECT.KEYID = 7
1,174,125 UART: [idev] UDS.KEYID = 0
1,182,190 UART: [idev] Erasing UDS.KEYID = 0
1,199,004 UART: [idev] Sha1 KeyId Algorithm
1,207,742 UART: [idev] --
1,208,727 UART: [ldev] ++
1,208,895 UART: [ldev] CDI.KEYID = 6
1,209,259 UART: [ldev] SUBJECT.KEYID = 5
1,209,686 UART: [ldev] AUTHORITY.KEYID = 7
1,210,149 UART: [ldev] FE.KEYID = 1
1,215,413 UART: [ldev] Erasing FE.KEYID = 1
1,241,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,229 UART: [ldev] --
1,280,450 UART: [fwproc] Wait for Commands...
1,281,043 UART: [fwproc] Recv command 0x46574c44
1,281,776 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,905 UART: ROM Fatal Error: 0x00B0003A
1,308,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,240 UART: [state] WD Timer not started. Device not locked for debugging
87,557 UART: [kat] SHA2-256
891,107 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,611 UART: [kat] SHA2-256
901,551 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
916,172 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,169,967 UART: [cold-reset] ++
1,170,429 UART: [fht] FHT @ 0x50003400
1,173,107 UART: [idev] ++
1,173,275 UART: [idev] CDI.KEYID = 6
1,173,636 UART: [idev] SUBJECT.KEYID = 7
1,174,061 UART: [idev] UDS.KEYID = 0
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,476 UART: [idev] Sha1 KeyId Algorithm
1,208,256 UART: [idev] --
1,209,313 UART: [ldev] ++
1,209,481 UART: [ldev] CDI.KEYID = 6
1,209,845 UART: [ldev] SUBJECT.KEYID = 5
1,210,272 UART: [ldev] AUTHORITY.KEYID = 7
1,210,735 UART: [ldev] FE.KEYID = 1
1,216,305 UART: [ldev] Erasing FE.KEYID = 1
1,242,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,041 UART: [ldev] --
1,281,488 UART: [fwproc] Wait for Commands...
1,282,113 UART: [fwproc] Recv command 0x46574c44
1,282,846 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,855 UART: ROM Fatal Error: 0x00B0003A
1,310,016 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,168 UART: [state] WD Timer not started. Device not locked for debugging
88,461 UART: [kat] SHA2-256
892,011 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,115 UART: [kat] ++
896,267 UART: [kat] sha1
900,645 UART: [kat] SHA2-256
902,585 UART: [kat] SHA2-384
905,362 UART: [kat] SHA2-512-ACC
907,263 UART: [kat] ECC-384
917,076 UART: [kat] HMAC-384Kdf
921,692 UART: [kat] LMS
1,170,004 UART: [kat] --
1,170,903 UART: [cold-reset] ++
1,171,251 UART: [fht] FHT @ 0x50003400
1,173,903 UART: [idev] ++
1,174,071 UART: [idev] CDI.KEYID = 6
1,174,432 UART: [idev] SUBJECT.KEYID = 7
1,174,857 UART: [idev] UDS.KEYID = 0
1,183,154 UART: [idev] Erasing UDS.KEYID = 0
1,200,550 UART: [idev] Sha1 KeyId Algorithm
1,209,566 UART: [idev] --
1,210,561 UART: [ldev] ++
1,210,729 UART: [ldev] CDI.KEYID = 6
1,211,093 UART: [ldev] SUBJECT.KEYID = 5
1,211,520 UART: [ldev] AUTHORITY.KEYID = 7
1,211,983 UART: [ldev] FE.KEYID = 1
1,217,547 UART: [ldev] Erasing FE.KEYID = 1
1,243,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,583 UART: [ldev] --
1,282,820 UART: [fwproc] Wait for Commands...
1,283,553 UART: [fwproc] Recv command 0x46574c44
1,284,286 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,993 UART: ROM Fatal Error: 0x00B0003A
1,311,154 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Unprovisioned
86,412 UART: [state] DebugLocked = No
87,016 UART: [state] WD Timer not started. Device not locked for debugging
88,285 UART: [kat] SHA2-256
891,835 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,939 UART: [kat] ++
896,091 UART: [kat] sha1
900,321 UART: [kat] SHA2-256
902,261 UART: [kat] SHA2-384
905,022 UART: [kat] SHA2-512-ACC
906,923 UART: [kat] ECC-384
916,676 UART: [kat] HMAC-384Kdf
921,116 UART: [kat] LMS
1,169,428 UART: [kat] --
1,170,509 UART: [cold-reset] ++
1,170,893 UART: [fht] FHT @ 0x50003400
1,173,689 UART: [idev] ++
1,173,857 UART: [idev] CDI.KEYID = 6
1,174,218 UART: [idev] SUBJECT.KEYID = 7
1,174,643 UART: [idev] UDS.KEYID = 0
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,160 UART: [idev] Sha1 KeyId Algorithm
1,209,078 UART: [idev] --
1,210,085 UART: [ldev] ++
1,210,253 UART: [ldev] CDI.KEYID = 6
1,210,617 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,741 UART: [ldev] Erasing FE.KEYID = 1
1,243,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,735 UART: [ldev] --
1,283,168 UART: [fwproc] Wait for Commands...
1,283,975 UART: [fwproc] Recv command 0x46574c44
1,284,708 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,197,759 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,934 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,273 >>> mbox cmd response: success
3,370,361 UART: [afmc] ++
3,370,529 UART: [afmc] CDI.KEYID = 6
3,370,892 UART: [afmc] SUBJECT.KEYID = 7
3,371,318 UART: [afmc] AUTHORITY.KEYID = 5
3,406,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,917 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,429,635 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,435,525 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,441,207 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,448,795 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.73s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,951 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,815 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,995 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,585 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,189 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,519 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,225 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,167,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,914 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 19.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
5,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,061 UART:
192,452 UART: Running Caliptra ROM ...
193,536 UART:
193,684 UART: [state] CFI Enabled
260,971 UART: [state] LifecycleState = Manufacturing
262,941 UART: [state] DebugLocked = No
265,781 UART: [state] WD Timer not started. Device not locked for debugging
270,413 UART: [kat] SHA2-256
450,067 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,838 UART: [kat] ++
461,324 UART: [kat] sha1
473,072 UART: [kat] SHA2-256
475,767 UART: [kat] SHA2-384
482,235 UART: [kat] SHA2-512-ACC
484,585 UART: [kat] ECC-384
2,945,671 UART: [kat] HMAC-384Kdf
2,966,768 UART: [kat] LMS
3,443,271 UART: [kat] --
3,447,376 UART: [cold-reset] ++
3,449,154 UART: [fht] FHT @ 0x50003400
3,459,761 UART: [idev] ++
3,460,353 UART: [idev] CDI.KEYID = 6
3,461,267 UART: [idev] SUBJECT.KEYID = 7
3,462,546 UART: [idev] UDS.KEYID = 0
3,497,863 UART: [idev] Erasing UDS.KEYID = 0
5,979,662 UART: [idev] Sha1 KeyId Algorithm
6,002,862 UART: [idev] --
6,006,867 UART: [ldev] ++
6,007,521 UART: [ldev] CDI.KEYID = 6
6,008,420 UART: [ldev] SUBJECT.KEYID = 5
6,009,588 UART: [ldev] AUTHORITY.KEYID = 7
6,010,832 UART: [ldev] FE.KEYID = 1
6,053,635 UART: [ldev] Erasing FE.KEYID = 1
8,560,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,292,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,308,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,324,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,339,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,362,739 UART: [ldev] --
10,367,919 UART: [fwproc] Wait for Commands...
10,371,105 UART: [fwproc] Recv command 0x46574c44
10,373,093 UART: [fwproc] Recv'd Img size: 118548 bytes
10,478,538 UART: ROM Fatal Error: 0x000B0005
10,481,787 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
5,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,375,692 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
6,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,356 UART:
192,741 UART: Running Caliptra ROM ...
194,060 UART:
603,709 UART: [state] CFI Enabled
615,292 UART: [state] LifecycleState = Manufacturing
617,254 UART: [state] DebugLocked = No
620,238 UART: [state] WD Timer not started. Device not locked for debugging
623,851 UART: [kat] SHA2-256
803,509 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,294 UART: [kat] ++
814,737 UART: [kat] sha1
825,878 UART: [kat] SHA2-256
828,615 UART: [kat] SHA2-384
834,591 UART: [kat] SHA2-512-ACC
836,912 UART: [kat] ECC-384
3,281,002 UART: [kat] HMAC-384Kdf
3,293,332 UART: [kat] LMS
3,769,839 UART: [kat] --
3,774,630 UART: [cold-reset] ++
3,775,477 UART: [fht] FHT @ 0x50003400
3,786,018 UART: [idev] ++
3,786,647 UART: [idev] CDI.KEYID = 6
3,787,574 UART: [idev] SUBJECT.KEYID = 7
3,788,731 UART: [idev] UDS.KEYID = 0
3,805,996 UART: [idev] Erasing UDS.KEYID = 0
6,268,809 UART: [idev] Sha1 KeyId Algorithm
6,293,452 UART: [idev] --
6,299,303 UART: [ldev] ++
6,299,891 UART: [ldev] CDI.KEYID = 6
6,300,801 UART: [ldev] SUBJECT.KEYID = 5
6,302,013 UART: [ldev] AUTHORITY.KEYID = 7
6,303,244 UART: [ldev] FE.KEYID = 1
6,314,334 UART: [ldev] Erasing FE.KEYID = 1
8,791,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,472 UART: [ldev] --
10,586,954 UART: [fwproc] Wait for Commands...
10,589,157 UART: [fwproc] Recv command 0x46574c44
10,591,139 UART: [fwproc] Recv'd Img size: 118548 bytes
10,695,208 UART: ROM Fatal Error: 0x000B0005
10,698,453 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
6,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,576,032 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,538 UART: [state] LifecycleState = Manufacturing
86,193 UART: [state] DebugLocked = No
86,741 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [kat] SHA2-256
891,596 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,700 UART: [kat] ++
895,852 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,779 UART: [kat] SHA2-512-ACC
906,680 UART: [kat] ECC-384
915,997 UART: [kat] HMAC-384Kdf
920,627 UART: [kat] LMS
1,168,939 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,590 UART: [fht] FHT @ 0x50003400
1,173,190 UART: [idev] ++
1,173,358 UART: [idev] CDI.KEYID = 6
1,173,719 UART: [idev] SUBJECT.KEYID = 7
1,174,144 UART: [idev] UDS.KEYID = 0
1,182,241 UART: [idev] Erasing UDS.KEYID = 0
1,199,153 UART: [idev] Sha1 KeyId Algorithm
1,207,825 UART: [idev] --
1,209,066 UART: [ldev] ++
1,209,234 UART: [ldev] CDI.KEYID = 6
1,209,598 UART: [ldev] SUBJECT.KEYID = 5
1,210,025 UART: [ldev] AUTHORITY.KEYID = 7
1,210,488 UART: [ldev] FE.KEYID = 1
1,215,796 UART: [ldev] Erasing FE.KEYID = 1
1,242,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,158 UART: [ldev] --
1,281,393 UART: [fwproc] Wait for Commands...
1,282,138 UART: [fwproc] Recv command 0x46574c44
1,282,871 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,215 UART: ROM Fatal Error: 0x000B0005
1,328,372 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,021 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Manufacturing
86,184 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,635 UART: [kat] ++
895,787 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,654 UART: [kat] SHA2-512-ACC
906,555 UART: [kat] ECC-384
916,624 UART: [kat] HMAC-384Kdf
921,108 UART: [kat] LMS
1,169,420 UART: [kat] --
1,170,461 UART: [cold-reset] ++
1,170,885 UART: [fht] FHT @ 0x50003400
1,173,413 UART: [idev] ++
1,173,581 UART: [idev] CDI.KEYID = 6
1,173,942 UART: [idev] SUBJECT.KEYID = 7
1,174,367 UART: [idev] UDS.KEYID = 0
1,182,494 UART: [idev] Erasing UDS.KEYID = 0
1,199,888 UART: [idev] Sha1 KeyId Algorithm
1,208,708 UART: [idev] --
1,209,641 UART: [ldev] ++
1,209,809 UART: [ldev] CDI.KEYID = 6
1,210,173 UART: [ldev] SUBJECT.KEYID = 5
1,210,600 UART: [ldev] AUTHORITY.KEYID = 7
1,211,063 UART: [ldev] FE.KEYID = 1
1,216,389 UART: [ldev] Erasing FE.KEYID = 1
1,242,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,237 UART: [ldev] --
1,281,502 UART: [fwproc] Wait for Commands...
1,282,185 UART: [fwproc] Recv command 0x46574c44
1,282,918 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,684 UART: ROM Fatal Error: 0x000B0005
1,328,841 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,548 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Manufacturing
85,779 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,479 UART: [kat] SHA2-512-ACC
906,380 UART: [kat] ECC-384
915,957 UART: [kat] HMAC-384Kdf
920,531 UART: [kat] LMS
1,168,843 UART: [kat] --
1,169,794 UART: [cold-reset] ++
1,170,304 UART: [fht] FHT @ 0x50003400
1,172,978 UART: [idev] ++
1,173,146 UART: [idev] CDI.KEYID = 6
1,173,507 UART: [idev] SUBJECT.KEYID = 7
1,173,932 UART: [idev] UDS.KEYID = 0
1,181,665 UART: [idev] Erasing UDS.KEYID = 0
1,198,233 UART: [idev] Sha1 KeyId Algorithm
1,207,177 UART: [idev] --
1,208,086 UART: [ldev] ++
1,208,254 UART: [ldev] CDI.KEYID = 6
1,208,618 UART: [ldev] SUBJECT.KEYID = 5
1,209,045 UART: [ldev] AUTHORITY.KEYID = 7
1,209,508 UART: [ldev] FE.KEYID = 1
1,214,910 UART: [ldev] Erasing FE.KEYID = 1
1,240,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,690 UART: [ldev] --
1,280,117 UART: [fwproc] Wait for Commands...
1,280,826 UART: [fwproc] Recv command 0x46574c44
1,281,559 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,195 UART: ROM Fatal Error: 0x000B0005
1,327,352 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,825 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Manufacturing
86,082 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,593 UART: [kat] ++
895,745 UART: [kat] sha1
900,087 UART: [kat] SHA2-256
902,027 UART: [kat] SHA2-384
904,770 UART: [kat] SHA2-512-ACC
906,671 UART: [kat] ECC-384
916,250 UART: [kat] HMAC-384Kdf
920,896 UART: [kat] LMS
1,169,208 UART: [kat] --
1,170,101 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,227 UART: [idev] ++
1,173,395 UART: [idev] CDI.KEYID = 6
1,173,756 UART: [idev] SUBJECT.KEYID = 7
1,174,181 UART: [idev] UDS.KEYID = 0
1,182,010 UART: [idev] Erasing UDS.KEYID = 0
1,199,182 UART: [idev] Sha1 KeyId Algorithm
1,208,114 UART: [idev] --
1,209,187 UART: [ldev] ++
1,209,355 UART: [ldev] CDI.KEYID = 6
1,209,719 UART: [ldev] SUBJECT.KEYID = 5
1,210,146 UART: [ldev] AUTHORITY.KEYID = 7
1,210,609 UART: [ldev] FE.KEYID = 1
1,215,819 UART: [ldev] Erasing FE.KEYID = 1
1,241,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,817 UART: [ldev] --
1,281,204 UART: [fwproc] Wait for Commands...
1,281,997 UART: [fwproc] Recv command 0x46574c44
1,282,730 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,046 UART: ROM Fatal Error: 0x000B0005
1,328,203 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,996 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Manufacturing
86,131 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
891,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
904,911 UART: [kat] SHA2-512-ACC
906,812 UART: [kat] ECC-384
916,553 UART: [kat] HMAC-384Kdf
921,193 UART: [kat] LMS
1,169,505 UART: [kat] --
1,170,438 UART: [cold-reset] ++
1,170,928 UART: [fht] FHT @ 0x50003400
1,173,440 UART: [idev] ++
1,173,608 UART: [idev] CDI.KEYID = 6
1,173,969 UART: [idev] SUBJECT.KEYID = 7
1,174,394 UART: [idev] UDS.KEYID = 0
1,182,537 UART: [idev] Erasing UDS.KEYID = 0
1,199,851 UART: [idev] Sha1 KeyId Algorithm
1,208,619 UART: [idev] --
1,209,574 UART: [ldev] ++
1,209,742 UART: [ldev] CDI.KEYID = 6
1,210,106 UART: [ldev] SUBJECT.KEYID = 5
1,210,533 UART: [ldev] AUTHORITY.KEYID = 7
1,210,996 UART: [ldev] FE.KEYID = 1
1,216,226 UART: [ldev] Erasing FE.KEYID = 1
1,242,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,756 UART: [ldev] --
1,281,065 UART: [fwproc] Wait for Commands...
1,281,824 UART: [fwproc] Recv command 0x46574c44
1,282,557 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,795 UART: ROM Fatal Error: 0x000B0005
1,327,952 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,567 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,011 UART: [state] LifecycleState = Manufacturing
85,666 UART: [state] DebugLocked = No
86,240 UART: [state] WD Timer not started. Device not locked for debugging
87,415 UART: [kat] SHA2-256
890,965 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,069 UART: [kat] ++
895,221 UART: [kat] sha1
899,439 UART: [kat] SHA2-256
901,379 UART: [kat] SHA2-384
904,164 UART: [kat] SHA2-512-ACC
906,065 UART: [kat] ECC-384
916,034 UART: [kat] HMAC-384Kdf
920,732 UART: [kat] LMS
1,169,044 UART: [kat] --
1,170,001 UART: [cold-reset] ++
1,170,513 UART: [fht] FHT @ 0x50003400
1,173,141 UART: [idev] ++
1,173,309 UART: [idev] CDI.KEYID = 6
1,173,670 UART: [idev] SUBJECT.KEYID = 7
1,174,095 UART: [idev] UDS.KEYID = 0
1,182,302 UART: [idev] Erasing UDS.KEYID = 0
1,199,892 UART: [idev] Sha1 KeyId Algorithm
1,208,794 UART: [idev] --
1,209,899 UART: [ldev] ++
1,210,067 UART: [ldev] CDI.KEYID = 6
1,210,431 UART: [ldev] SUBJECT.KEYID = 5
1,210,858 UART: [ldev] AUTHORITY.KEYID = 7
1,211,321 UART: [ldev] FE.KEYID = 1
1,216,661 UART: [ldev] Erasing FE.KEYID = 1
1,242,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,823 UART: [ldev] --
1,282,092 UART: [fwproc] Wait for Commands...
1,282,733 UART: [fwproc] Recv command 0x46574c44
1,283,466 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,898 UART: ROM Fatal Error: 0x000B0005
1,329,055 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,202 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
5,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
191,987 UART:
192,375 UART: Running Caliptra ROM ...
193,549 UART:
193,710 UART: [state] CFI Enabled
265,196 UART: [state] LifecycleState = Manufacturing
267,233 UART: [state] DebugLocked = No
269,506 UART: [state] WD Timer not started. Device not locked for debugging
274,167 UART: [kat] SHA2-256
453,810 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,574 UART: [kat] ++
465,107 UART: [kat] sha1
476,269 UART: [kat] SHA2-256
478,953 UART: [kat] SHA2-384
486,334 UART: [kat] SHA2-512-ACC
488,688 UART: [kat] ECC-384
2,949,325 UART: [kat] HMAC-384Kdf
2,972,001 UART: [kat] LMS
3,448,450 UART: [kat] --
3,452,498 UART: [cold-reset] ++
3,454,002 UART: [fht] FHT @ 0x50003400
3,465,314 UART: [idev] ++
3,466,072 UART: [idev] CDI.KEYID = 6
3,467,024 UART: [idev] SUBJECT.KEYID = 7
3,468,139 UART: [idev] UDS.KEYID = 0
3,501,518 UART: [idev] Erasing UDS.KEYID = 0
5,989,315 UART: [idev] Sha1 KeyId Algorithm
6,013,522 UART: [idev] --
6,018,819 UART: [ldev] ++
6,019,400 UART: [ldev] CDI.KEYID = 6
6,020,293 UART: [ldev] SUBJECT.KEYID = 5
6,021,513 UART: [ldev] AUTHORITY.KEYID = 7
6,022,757 UART: [ldev] FE.KEYID = 1
6,058,811 UART: [ldev] Erasing FE.KEYID = 1
8,568,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,046 UART: [ldev] --
10,373,700 UART: [fwproc] Wait for Commands...
10,376,287 UART: [fwproc] Recv command 0x46574c44
10,378,335 UART: [fwproc] Recv'd Img size: 118548 bytes
10,453,434 UART: ROM Fatal Error: 0x000B0003
10,456,681 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
5,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,305,196 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
6,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,404 UART:
192,785 UART: Running Caliptra ROM ...
193,885 UART:
603,403 UART: [state] CFI Enabled
614,660 UART: [state] LifecycleState = Manufacturing
616,559 UART: [state] DebugLocked = No
619,558 UART: [state] WD Timer not started. Device not locked for debugging
623,330 UART: [kat] SHA2-256
802,970 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,722 UART: [kat] ++
814,220 UART: [kat] sha1
825,143 UART: [kat] SHA2-256
827,818 UART: [kat] SHA2-384
833,849 UART: [kat] SHA2-512-ACC
836,202 UART: [kat] ECC-384
3,278,366 UART: [kat] HMAC-384Kdf
3,289,848 UART: [kat] LMS
3,766,384 UART: [kat] --
3,771,938 UART: [cold-reset] ++
3,772,892 UART: [fht] FHT @ 0x50003400
3,784,514 UART: [idev] ++
3,785,079 UART: [idev] CDI.KEYID = 6
3,786,046 UART: [idev] SUBJECT.KEYID = 7
3,787,263 UART: [idev] UDS.KEYID = 0
3,802,913 UART: [idev] Erasing UDS.KEYID = 0
6,261,671 UART: [idev] Sha1 KeyId Algorithm
6,285,328 UART: [idev] --
6,289,943 UART: [ldev] ++
6,290,511 UART: [ldev] CDI.KEYID = 6
6,291,450 UART: [ldev] SUBJECT.KEYID = 5
6,292,680 UART: [ldev] AUTHORITY.KEYID = 7
6,293,913 UART: [ldev] FE.KEYID = 1
6,304,859 UART: [ldev] Erasing FE.KEYID = 1
8,782,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,457 UART: [ldev] --
10,575,067 UART: [fwproc] Wait for Commands...
10,577,431 UART: [fwproc] Recv command 0x46574c44
10,579,466 UART: [fwproc] Recv'd Img size: 118548 bytes
10,652,933 UART: ROM Fatal Error: 0x000B0003
10,656,181 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
6,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,547,835 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Manufacturing
85,601 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,018 UART: [kat] ++
895,170 UART: [kat] sha1
899,408 UART: [kat] SHA2-256
901,348 UART: [kat] SHA2-384
904,181 UART: [kat] SHA2-512-ACC
906,082 UART: [kat] ECC-384
915,783 UART: [kat] HMAC-384Kdf
920,397 UART: [kat] LMS
1,168,709 UART: [kat] --
1,169,638 UART: [cold-reset] ++
1,170,024 UART: [fht] FHT @ 0x50003400
1,172,606 UART: [idev] ++
1,172,774 UART: [idev] CDI.KEYID = 6
1,173,135 UART: [idev] SUBJECT.KEYID = 7
1,173,560 UART: [idev] UDS.KEYID = 0
1,181,617 UART: [idev] Erasing UDS.KEYID = 0
1,198,473 UART: [idev] Sha1 KeyId Algorithm
1,207,345 UART: [idev] --
1,208,438 UART: [ldev] ++
1,208,606 UART: [ldev] CDI.KEYID = 6
1,208,970 UART: [ldev] SUBJECT.KEYID = 5
1,209,397 UART: [ldev] AUTHORITY.KEYID = 7
1,209,860 UART: [ldev] FE.KEYID = 1
1,215,106 UART: [ldev] Erasing FE.KEYID = 1
1,241,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,426 UART: [ldev] --
1,281,663 UART: [fwproc] Wait for Commands...
1,282,280 UART: [fwproc] Recv command 0x46574c44
1,283,013 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,469 UART: ROM Fatal Error: 0x000B0003
1,304,626 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,235 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Manufacturing
86,362 UART: [state] DebugLocked = No
87,034 UART: [state] WD Timer not started. Device not locked for debugging
88,297 UART: [kat] SHA2-256
891,847 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,951 UART: [kat] ++
896,103 UART: [kat] sha1
900,217 UART: [kat] SHA2-256
902,157 UART: [kat] SHA2-384
904,978 UART: [kat] SHA2-512-ACC
906,879 UART: [kat] ECC-384
916,576 UART: [kat] HMAC-384Kdf
921,112 UART: [kat] LMS
1,169,424 UART: [kat] --
1,170,309 UART: [cold-reset] ++
1,170,711 UART: [fht] FHT @ 0x50003400
1,173,371 UART: [idev] ++
1,173,539 UART: [idev] CDI.KEYID = 6
1,173,900 UART: [idev] SUBJECT.KEYID = 7
1,174,325 UART: [idev] UDS.KEYID = 0
1,182,242 UART: [idev] Erasing UDS.KEYID = 0
1,198,908 UART: [idev] Sha1 KeyId Algorithm
1,207,912 UART: [idev] --
1,208,807 UART: [ldev] ++
1,208,975 UART: [ldev] CDI.KEYID = 6
1,209,339 UART: [ldev] SUBJECT.KEYID = 5
1,209,766 UART: [ldev] AUTHORITY.KEYID = 7
1,210,229 UART: [ldev] FE.KEYID = 1
1,215,337 UART: [ldev] Erasing FE.KEYID = 1
1,241,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,767 UART: [ldev] --
1,281,108 UART: [fwproc] Wait for Commands...
1,281,887 UART: [fwproc] Recv command 0x46574c44
1,282,620 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,804 UART: ROM Fatal Error: 0x000B0003
1,303,961 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,100 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Manufacturing
85,877 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,025 UART: [kat] LMS
1,169,337 UART: [kat] --
1,170,116 UART: [cold-reset] ++
1,170,486 UART: [fht] FHT @ 0x50003400
1,173,248 UART: [idev] ++
1,173,416 UART: [idev] CDI.KEYID = 6
1,173,777 UART: [idev] SUBJECT.KEYID = 7
1,174,202 UART: [idev] UDS.KEYID = 0
1,181,899 UART: [idev] Erasing UDS.KEYID = 0
1,198,585 UART: [idev] Sha1 KeyId Algorithm
1,207,545 UART: [idev] --
1,208,496 UART: [ldev] ++
1,208,664 UART: [ldev] CDI.KEYID = 6
1,209,028 UART: [ldev] SUBJECT.KEYID = 5
1,209,455 UART: [ldev] AUTHORITY.KEYID = 7
1,209,918 UART: [ldev] FE.KEYID = 1
1,215,062 UART: [ldev] Erasing FE.KEYID = 1
1,240,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,728 UART: [ldev] --
1,279,931 UART: [fwproc] Wait for Commands...
1,280,596 UART: [fwproc] Recv command 0x46574c44
1,281,329 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,801 UART: ROM Fatal Error: 0x000B0003
1,302,958 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,365 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Manufacturing
86,166 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
891,687 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,791 UART: [kat] ++
895,943 UART: [kat] sha1
900,047 UART: [kat] SHA2-256
901,987 UART: [kat] SHA2-384
904,714 UART: [kat] SHA2-512-ACC
906,615 UART: [kat] ECC-384
916,628 UART: [kat] HMAC-384Kdf
921,066 UART: [kat] LMS
1,169,378 UART: [kat] --
1,170,223 UART: [cold-reset] ++
1,170,667 UART: [fht] FHT @ 0x50003400
1,173,435 UART: [idev] ++
1,173,603 UART: [idev] CDI.KEYID = 6
1,173,964 UART: [idev] SUBJECT.KEYID = 7
1,174,389 UART: [idev] UDS.KEYID = 0
1,182,374 UART: [idev] Erasing UDS.KEYID = 0
1,199,622 UART: [idev] Sha1 KeyId Algorithm
1,208,500 UART: [idev] --
1,209,673 UART: [ldev] ++
1,209,841 UART: [ldev] CDI.KEYID = 6
1,210,205 UART: [ldev] SUBJECT.KEYID = 5
1,210,632 UART: [ldev] AUTHORITY.KEYID = 7
1,211,095 UART: [ldev] FE.KEYID = 1
1,216,631 UART: [ldev] Erasing FE.KEYID = 1
1,242,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,429 UART: [ldev] --
1,281,804 UART: [fwproc] Wait for Commands...
1,282,467 UART: [fwproc] Recv command 0x46574c44
1,283,200 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,670 UART: ROM Fatal Error: 0x000B0003
1,304,827 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,180 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Manufacturing
85,611 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,116 UART: [kat] ++
895,268 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,329 UART: [kat] SHA2-512-ACC
906,230 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,585 UART: [kat] LMS
1,168,897 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,376 UART: [fht] FHT @ 0x50003400
1,173,098 UART: [idev] ++
1,173,266 UART: [idev] CDI.KEYID = 6
1,173,627 UART: [idev] SUBJECT.KEYID = 7
1,174,052 UART: [idev] UDS.KEYID = 0
1,182,191 UART: [idev] Erasing UDS.KEYID = 0
1,199,747 UART: [idev] Sha1 KeyId Algorithm
1,208,595 UART: [idev] --
1,209,606 UART: [ldev] ++
1,209,774 UART: [ldev] CDI.KEYID = 6
1,210,138 UART: [ldev] SUBJECT.KEYID = 5
1,210,565 UART: [ldev] AUTHORITY.KEYID = 7
1,211,028 UART: [ldev] FE.KEYID = 1
1,216,042 UART: [ldev] Erasing FE.KEYID = 1
1,242,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,142 UART: [ldev] --
1,281,495 UART: [fwproc] Wait for Commands...
1,282,082 UART: [fwproc] Recv command 0x46574c44
1,282,815 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,535 UART: ROM Fatal Error: 0x000B0003
1,304,692 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,449 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Manufacturing
86,322 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,707 UART: [kat] ++
895,859 UART: [kat] sha1
900,103 UART: [kat] SHA2-256
902,043 UART: [kat] SHA2-384
904,808 UART: [kat] SHA2-512-ACC
906,709 UART: [kat] ECC-384
916,540 UART: [kat] HMAC-384Kdf
921,166 UART: [kat] LMS
1,169,478 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,429 UART: [fht] FHT @ 0x50003400
1,172,987 UART: [idev] ++
1,173,155 UART: [idev] CDI.KEYID = 6
1,173,516 UART: [idev] SUBJECT.KEYID = 7
1,173,941 UART: [idev] UDS.KEYID = 0
1,181,718 UART: [idev] Erasing UDS.KEYID = 0
1,199,036 UART: [idev] Sha1 KeyId Algorithm
1,207,910 UART: [idev] --
1,209,077 UART: [ldev] ++
1,209,245 UART: [ldev] CDI.KEYID = 6
1,209,609 UART: [ldev] SUBJECT.KEYID = 5
1,210,036 UART: [ldev] AUTHORITY.KEYID = 7
1,210,499 UART: [ldev] FE.KEYID = 1
1,215,723 UART: [ldev] Erasing FE.KEYID = 1
1,242,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,177 UART: [ldev] --
1,281,410 UART: [fwproc] Wait for Commands...
1,282,221 UART: [fwproc] Recv command 0x46574c44
1,282,954 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,864 UART: ROM Fatal Error: 0x000B0003
1,305,021 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,966 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
5,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,043 UART:
192,457 UART: Running Caliptra ROM ...
193,555 UART:
193,703 UART: [state] CFI Enabled
262,982 UART: [state] LifecycleState = Unprovisioned
264,890 UART: [state] DebugLocked = No
266,567 UART: [state] WD Timer not started. Device not locked for debugging
270,730 UART: [kat] SHA2-256
450,386 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,198 UART: [kat] ++
461,661 UART: [kat] sha1
472,922 UART: [kat] SHA2-256
475,628 UART: [kat] SHA2-384
481,394 UART: [kat] SHA2-512-ACC
483,744 UART: [kat] ECC-384
2,950,309 UART: [kat] HMAC-384Kdf
2,970,456 UART: [kat] LMS
3,446,980 UART: [kat] --
3,452,617 UART: [cold-reset] ++
3,454,770 UART: [fht] FHT @ 0x50003400
3,466,779 UART: [idev] ++
3,467,348 UART: [idev] CDI.KEYID = 6
3,468,289 UART: [idev] SUBJECT.KEYID = 7
3,469,563 UART: [idev] UDS.KEYID = 0
3,500,436 UART: [idev] Erasing UDS.KEYID = 0
5,986,531 UART: [idev] Sha1 KeyId Algorithm
6,009,594 UART: [idev] --
6,013,326 UART: [ldev] ++
6,013,921 UART: [ldev] CDI.KEYID = 6
6,014,815 UART: [ldev] SUBJECT.KEYID = 5
6,016,035 UART: [ldev] AUTHORITY.KEYID = 7
6,017,277 UART: [ldev] FE.KEYID = 1
6,056,930 UART: [ldev] Erasing FE.KEYID = 1
8,562,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,829 UART: [ldev] --
10,370,544 UART: [fwproc] Wait for Commands...
10,372,484 UART: [fwproc] Recv command 0x46574c44
10,374,479 UART: [fwproc] Recv'd Img size: 118548 bytes
13,853,994 UART: ROM Fatal Error: 0x000B0016
13,857,233 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
5,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,729,857 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
6,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,402 UART:
192,784 UART: Running Caliptra ROM ...
193,857 UART:
603,655 UART: [state] CFI Enabled
619,372 UART: [state] LifecycleState = Unprovisioned
621,257 UART: [state] DebugLocked = No
623,248 UART: [state] WD Timer not started. Device not locked for debugging
626,755 UART: [kat] SHA2-256
806,358 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,166 UART: [kat] ++
817,634 UART: [kat] sha1
827,642 UART: [kat] SHA2-256
830,321 UART: [kat] SHA2-384
835,543 UART: [kat] SHA2-512-ACC
837,945 UART: [kat] ECC-384
3,279,869 UART: [kat] HMAC-384Kdf
3,292,775 UART: [kat] LMS
3,769,286 UART: [kat] --
3,772,361 UART: [cold-reset] ++
3,773,974 UART: [fht] FHT @ 0x50003400
3,784,253 UART: [idev] ++
3,784,868 UART: [idev] CDI.KEYID = 6
3,785,831 UART: [idev] SUBJECT.KEYID = 7
3,787,040 UART: [idev] UDS.KEYID = 0
3,804,365 UART: [idev] Erasing UDS.KEYID = 0
6,266,705 UART: [idev] Sha1 KeyId Algorithm
6,291,035 UART: [idev] --
6,296,167 UART: [ldev] ++
6,296,733 UART: [ldev] CDI.KEYID = 6
6,297,693 UART: [ldev] SUBJECT.KEYID = 5
6,298,902 UART: [ldev] AUTHORITY.KEYID = 7
6,300,132 UART: [ldev] FE.KEYID = 1
6,311,418 UART: [ldev] Erasing FE.KEYID = 1
8,790,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,998 UART: [ldev] --
10,583,611 UART: [fwproc] Wait for Commands...
10,585,222 UART: [fwproc] Recv command 0x46574c44
10,587,267 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,907 UART: ROM Fatal Error: 0x000B0016
14,071,195 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
6,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,989,212 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,224 UART: [kat] ++
895,376 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,415 UART: [kat] SHA2-512-ACC
906,316 UART: [kat] ECC-384
916,133 UART: [kat] HMAC-384Kdf
920,807 UART: [kat] LMS
1,169,119 UART: [kat] --
1,170,274 UART: [cold-reset] ++
1,170,774 UART: [fht] FHT @ 0x50003400
1,173,274 UART: [idev] ++
1,173,442 UART: [idev] CDI.KEYID = 6
1,173,803 UART: [idev] SUBJECT.KEYID = 7
1,174,228 UART: [idev] UDS.KEYID = 0
1,182,403 UART: [idev] Erasing UDS.KEYID = 0
1,198,897 UART: [idev] Sha1 KeyId Algorithm
1,207,893 UART: [idev] --
1,208,894 UART: [ldev] ++
1,209,062 UART: [ldev] CDI.KEYID = 6
1,209,426 UART: [ldev] SUBJECT.KEYID = 5
1,209,853 UART: [ldev] AUTHORITY.KEYID = 7
1,210,316 UART: [ldev] FE.KEYID = 1
1,215,132 UART: [ldev] Erasing FE.KEYID = 1
1,241,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,764 UART: [ldev] --
1,281,053 UART: [fwproc] Wait for Commands...
1,281,662 UART: [fwproc] Recv command 0x46574c44
1,282,395 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,358 UART: ROM Fatal Error: 0x000B0016
2,627,515 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,648 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,045 UART: [state] LifecycleState = Unprovisioned
85,700 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,711 UART: [kat] SHA2-256
891,261 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,365 UART: [kat] ++
895,517 UART: [kat] sha1
899,607 UART: [kat] SHA2-256
901,547 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
915,818 UART: [kat] HMAC-384Kdf
920,458 UART: [kat] LMS
1,168,770 UART: [kat] --
1,169,691 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,172,809 UART: [idev] ++
1,172,977 UART: [idev] CDI.KEYID = 6
1,173,338 UART: [idev] SUBJECT.KEYID = 7
1,173,763 UART: [idev] UDS.KEYID = 0
1,181,982 UART: [idev] Erasing UDS.KEYID = 0
1,199,084 UART: [idev] Sha1 KeyId Algorithm
1,208,010 UART: [idev] --
1,209,023 UART: [ldev] ++
1,209,191 UART: [ldev] CDI.KEYID = 6
1,209,555 UART: [ldev] SUBJECT.KEYID = 5
1,209,982 UART: [ldev] AUTHORITY.KEYID = 7
1,210,445 UART: [ldev] FE.KEYID = 1
1,215,573 UART: [ldev] Erasing FE.KEYID = 1
1,241,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,037 UART: [ldev] --
1,280,450 UART: [fwproc] Wait for Commands...
1,281,235 UART: [fwproc] Recv command 0x46574c44
1,281,968 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,881 UART: ROM Fatal Error: 0x000B0016
2,626,038 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,475 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,741 UART: [state] WD Timer not started. Device not locked for debugging
87,966 UART: [kat] SHA2-256
891,516 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,491 UART: [kat] SHA2-512-ACC
906,392 UART: [kat] ECC-384
915,803 UART: [kat] HMAC-384Kdf
920,359 UART: [kat] LMS
1,168,671 UART: [kat] --
1,169,552 UART: [cold-reset] ++
1,170,006 UART: [fht] FHT @ 0x50003400
1,172,852 UART: [idev] ++
1,173,020 UART: [idev] CDI.KEYID = 6
1,173,381 UART: [idev] SUBJECT.KEYID = 7
1,173,806 UART: [idev] UDS.KEYID = 0
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,199,285 UART: [idev] Sha1 KeyId Algorithm
1,208,051 UART: [idev] --
1,209,166 UART: [ldev] ++
1,209,334 UART: [ldev] CDI.KEYID = 6
1,209,698 UART: [ldev] SUBJECT.KEYID = 5
1,210,125 UART: [ldev] AUTHORITY.KEYID = 7
1,210,588 UART: [ldev] FE.KEYID = 1
1,215,514 UART: [ldev] Erasing FE.KEYID = 1
1,241,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,618 UART: [ldev] --
1,280,881 UART: [fwproc] Wait for Commands...
1,281,582 UART: [fwproc] Recv command 0x46574c44
1,282,315 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,262 UART: ROM Fatal Error: 0x000B0016
2,627,419 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,230 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,927 UART: [state] LifecycleState = Unprovisioned
86,582 UART: [state] DebugLocked = No
87,302 UART: [state] WD Timer not started. Device not locked for debugging
88,551 UART: [kat] SHA2-256
892,101 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,205 UART: [kat] ++
896,357 UART: [kat] sha1
900,507 UART: [kat] SHA2-256
902,447 UART: [kat] SHA2-384
905,266 UART: [kat] SHA2-512-ACC
907,167 UART: [kat] ECC-384
917,558 UART: [kat] HMAC-384Kdf
922,202 UART: [kat] LMS
1,170,514 UART: [kat] --
1,171,365 UART: [cold-reset] ++
1,171,777 UART: [fht] FHT @ 0x50003400
1,174,375 UART: [idev] ++
1,174,543 UART: [idev] CDI.KEYID = 6
1,174,904 UART: [idev] SUBJECT.KEYID = 7
1,175,329 UART: [idev] UDS.KEYID = 0
1,183,366 UART: [idev] Erasing UDS.KEYID = 0
1,200,430 UART: [idev] Sha1 KeyId Algorithm
1,209,328 UART: [idev] --
1,210,455 UART: [ldev] ++
1,210,623 UART: [ldev] CDI.KEYID = 6
1,210,987 UART: [ldev] SUBJECT.KEYID = 5
1,211,414 UART: [ldev] AUTHORITY.KEYID = 7
1,211,877 UART: [ldev] FE.KEYID = 1
1,217,089 UART: [ldev] Erasing FE.KEYID = 1
1,243,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,013 UART: [ldev] --
1,283,466 UART: [fwproc] Wait for Commands...
1,284,187 UART: [fwproc] Recv command 0x46574c44
1,284,920 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,989 UART: ROM Fatal Error: 0x000B0016
2,629,146 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,573 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,857 UART: [state] WD Timer not started. Device not locked for debugging
88,020 UART: [kat] SHA2-256
891,570 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,674 UART: [kat] ++
895,826 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,593 UART: [kat] HMAC-384Kdf
920,987 UART: [kat] LMS
1,169,299 UART: [kat] --
1,169,968 UART: [cold-reset] ++
1,170,446 UART: [fht] FHT @ 0x50003400
1,173,272 UART: [idev] ++
1,173,440 UART: [idev] CDI.KEYID = 6
1,173,801 UART: [idev] SUBJECT.KEYID = 7
1,174,226 UART: [idev] UDS.KEYID = 0
1,182,179 UART: [idev] Erasing UDS.KEYID = 0
1,198,657 UART: [idev] Sha1 KeyId Algorithm
1,207,445 UART: [idev] --
1,208,592 UART: [ldev] ++
1,208,760 UART: [ldev] CDI.KEYID = 6
1,209,124 UART: [ldev] SUBJECT.KEYID = 5
1,209,551 UART: [ldev] AUTHORITY.KEYID = 7
1,210,014 UART: [ldev] FE.KEYID = 1
1,215,288 UART: [ldev] Erasing FE.KEYID = 1
1,241,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,368 UART: [ldev] --
1,280,683 UART: [fwproc] Wait for Commands...
1,281,334 UART: [fwproc] Recv command 0x46574c44
1,282,067 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,040 UART: ROM Fatal Error: 0x000B0016
2,627,197 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,046 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,241 UART: [kat] SHA2-256
902,181 UART: [kat] SHA2-384
904,842 UART: [kat] SHA2-512-ACC
906,743 UART: [kat] ECC-384
916,590 UART: [kat] HMAC-384Kdf
921,366 UART: [kat] LMS
1,169,678 UART: [kat] --
1,170,747 UART: [cold-reset] ++
1,171,153 UART: [fht] FHT @ 0x50003400
1,173,705 UART: [idev] ++
1,173,873 UART: [idev] CDI.KEYID = 6
1,174,234 UART: [idev] SUBJECT.KEYID = 7
1,174,659 UART: [idev] UDS.KEYID = 0
1,182,702 UART: [idev] Erasing UDS.KEYID = 0
1,199,886 UART: [idev] Sha1 KeyId Algorithm
1,208,910 UART: [idev] --
1,209,797 UART: [ldev] ++
1,209,965 UART: [ldev] CDI.KEYID = 6
1,210,329 UART: [ldev] SUBJECT.KEYID = 5
1,210,756 UART: [ldev] AUTHORITY.KEYID = 7
1,211,219 UART: [ldev] FE.KEYID = 1
1,216,241 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,249 UART: [ldev] --
1,281,660 UART: [fwproc] Wait for Commands...
1,282,329 UART: [fwproc] Recv command 0x46574c44
1,283,062 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,903 UART: ROM Fatal Error: 0x000B0016
2,627,060 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,081 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
2,032,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,679 UART:
2,183,071 UART: Running Caliptra ROM ...
2,184,168 UART:
2,184,330 UART: [state] CFI Enabled
2,185,267 UART: [state] LifecycleState = Unprovisioned
2,186,923 UART: [state] DebugLocked = No
2,187,958 UART: [state] WD Timer not started. Device not locked for debugging
2,190,440 UART: [kat] SHA2-256
2,191,135 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,157 UART: [kat] ++
2,194,617 UART: [kat] sha1
2,195,134 UART: [kat] SHA2-256
2,195,799 UART: [kat] SHA2-384
2,196,461 UART: [kat] SHA2-512-ACC
2,197,295 UART: [kat] ECC-384
2,947,645 UART: [kat] HMAC-384Kdf
2,971,856 UART: [kat] LMS
3,448,355 UART: [kat] --
3,453,102 UART: [cold-reset] ++
3,454,499 UART: [fht] FHT @ 0x50003400
3,466,332 UART: [idev] ++
3,466,932 UART: [idev] CDI.KEYID = 6
3,468,013 UART: [idev] SUBJECT.KEYID = 7
3,469,127 UART: [idev] UDS.KEYID = 0
3,502,313 UART: [idev] Erasing UDS.KEYID = 0
5,987,927 UART: [idev] Sha1 KeyId Algorithm
6,011,876 UART: [idev] --
6,015,885 UART: [ldev] ++
6,016,462 UART: [ldev] CDI.KEYID = 6
6,017,379 UART: [ldev] SUBJECT.KEYID = 5
6,018,605 UART: [ldev] AUTHORITY.KEYID = 7
6,020,008 UART: [ldev] FE.KEYID = 1
6,057,366 UART: [ldev] Erasing FE.KEYID = 1
8,564,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,349 UART: [ldev] --
10,374,193 UART: [fwproc] Wait for Commands...
10,377,136 UART: [fwproc] Recv command 0x46574c44
10,379,140 UART: [fwproc] Recv'd Img size: 118548 bytes
13,858,355 UART: ROM Fatal Error: 0x000B002B
13,861,587 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
2,029,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,770,341 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,030,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,180,408 UART:
2,180,814 UART: Running Caliptra ROM ...
2,181,979 UART:
2,182,146 UART: [state] CFI Enabled
2,183,110 UART: [state] LifecycleState = Unprovisioned
2,184,768 UART: [state] DebugLocked = No
2,185,876 UART: [state] WD Timer not started. Device not locked for debugging
2,188,370 UART: [kat] SHA2-256
2,189,040 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,192,054 UART: [kat] ++
2,192,508 UART: [kat] sha1
2,193,019 UART: [kat] SHA2-256
2,193,758 UART: [kat] SHA2-384
2,194,423 UART: [kat] SHA2-512-ACC
2,195,268 UART: [kat] ECC-384
3,276,574 UART: [kat] HMAC-384Kdf
3,288,568 UART: [kat] LMS
3,765,044 UART: [kat] --
3,769,742 UART: [cold-reset] ++
3,771,403 UART: [fht] FHT @ 0x50003400
3,783,997 UART: [idev] ++
3,784,557 UART: [idev] CDI.KEYID = 6
3,785,571 UART: [idev] SUBJECT.KEYID = 7
3,786,800 UART: [idev] UDS.KEYID = 0
3,803,853 UART: [idev] Erasing UDS.KEYID = 0
6,260,855 UART: [idev] Sha1 KeyId Algorithm
6,286,083 UART: [idev] --
6,291,532 UART: [ldev] ++
6,292,107 UART: [ldev] CDI.KEYID = 6
6,292,990 UART: [ldev] SUBJECT.KEYID = 5
6,294,195 UART: [ldev] AUTHORITY.KEYID = 7
6,295,484 UART: [ldev] FE.KEYID = 1
6,307,000 UART: [ldev] Erasing FE.KEYID = 1
8,789,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,706 UART: [ldev] --
10,581,010 UART: [fwproc] Wait for Commands...
10,582,795 UART: [fwproc] Recv command 0x46574c44
10,584,788 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,906 UART: ROM Fatal Error: 0x000B002B
14,077,139 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
2,028,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,984,988 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,787 UART: [kat] LMS
1,169,099 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,638 UART: [fht] FHT @ 0x50003400
1,173,518 UART: [idev] ++
1,173,686 UART: [idev] CDI.KEYID = 6
1,174,047 UART: [idev] SUBJECT.KEYID = 7
1,174,472 UART: [idev] UDS.KEYID = 0
1,182,367 UART: [idev] Erasing UDS.KEYID = 0
1,199,229 UART: [idev] Sha1 KeyId Algorithm
1,208,143 UART: [idev] --
1,209,334 UART: [ldev] ++
1,209,502 UART: [ldev] CDI.KEYID = 6
1,209,866 UART: [ldev] SUBJECT.KEYID = 5
1,210,293 UART: [ldev] AUTHORITY.KEYID = 7
1,210,756 UART: [ldev] FE.KEYID = 1
1,216,046 UART: [ldev] Erasing FE.KEYID = 1
1,242,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,022 UART: [ldev] --
1,281,315 UART: [fwproc] Wait for Commands...
1,281,982 UART: [fwproc] Recv command 0x46574c44
1,282,715 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,187 UART: ROM Fatal Error: 0x000B002B
2,627,346 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,123 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
915,842 UART: [kat] HMAC-384Kdf
920,384 UART: [kat] LMS
1,168,696 UART: [kat] --
1,169,545 UART: [cold-reset] ++
1,169,979 UART: [fht] FHT @ 0x50003400
1,172,549 UART: [idev] ++
1,172,717 UART: [idev] CDI.KEYID = 6
1,173,078 UART: [idev] SUBJECT.KEYID = 7
1,173,503 UART: [idev] UDS.KEYID = 0
1,181,196 UART: [idev] Erasing UDS.KEYID = 0
1,198,510 UART: [idev] Sha1 KeyId Algorithm
1,207,470 UART: [idev] --
1,208,551 UART: [ldev] ++
1,208,719 UART: [ldev] CDI.KEYID = 6
1,209,083 UART: [ldev] SUBJECT.KEYID = 5
1,209,510 UART: [ldev] AUTHORITY.KEYID = 7
1,209,973 UART: [ldev] FE.KEYID = 1
1,215,183 UART: [ldev] Erasing FE.KEYID = 1
1,241,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,775 UART: [ldev] --
1,281,006 UART: [fwproc] Wait for Commands...
1,281,777 UART: [fwproc] Recv command 0x46574c44
1,282,510 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,054 UART: ROM Fatal Error: 0x000B002B
2,627,213 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,628 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
86,039 UART: [state] WD Timer not started. Device not locked for debugging
87,184 UART: [kat] SHA2-256
890,734 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,838 UART: [kat] ++
894,990 UART: [kat] sha1
899,270 UART: [kat] SHA2-256
901,210 UART: [kat] SHA2-384
903,907 UART: [kat] SHA2-512-ACC
905,808 UART: [kat] ECC-384
915,373 UART: [kat] HMAC-384Kdf
920,033 UART: [kat] LMS
1,168,345 UART: [kat] --
1,169,400 UART: [cold-reset] ++
1,169,934 UART: [fht] FHT @ 0x50003400
1,172,640 UART: [idev] ++
1,172,808 UART: [idev] CDI.KEYID = 6
1,173,169 UART: [idev] SUBJECT.KEYID = 7
1,173,594 UART: [idev] UDS.KEYID = 0
1,181,299 UART: [idev] Erasing UDS.KEYID = 0
1,198,325 UART: [idev] Sha1 KeyId Algorithm
1,207,105 UART: [idev] --
1,208,192 UART: [ldev] ++
1,208,360 UART: [ldev] CDI.KEYID = 6
1,208,724 UART: [ldev] SUBJECT.KEYID = 5
1,209,151 UART: [ldev] AUTHORITY.KEYID = 7
1,209,614 UART: [ldev] FE.KEYID = 1
1,214,604 UART: [ldev] Erasing FE.KEYID = 1
1,241,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,058 UART: [ldev] --
1,280,343 UART: [fwproc] Wait for Commands...
1,280,966 UART: [fwproc] Recv command 0x46574c44
1,281,699 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,611 UART: ROM Fatal Error: 0x000B002B
2,625,770 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,003 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
900,047 UART: [kat] SHA2-256
901,987 UART: [kat] SHA2-384
904,842 UART: [kat] SHA2-512-ACC
906,743 UART: [kat] ECC-384
916,610 UART: [kat] HMAC-384Kdf
921,288 UART: [kat] LMS
1,169,600 UART: [kat] --
1,170,325 UART: [cold-reset] ++
1,170,709 UART: [fht] FHT @ 0x50003400
1,173,359 UART: [idev] ++
1,173,527 UART: [idev] CDI.KEYID = 6
1,173,888 UART: [idev] SUBJECT.KEYID = 7
1,174,313 UART: [idev] UDS.KEYID = 0
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,199,640 UART: [idev] Sha1 KeyId Algorithm
1,208,632 UART: [idev] --
1,209,785 UART: [ldev] ++
1,209,953 UART: [ldev] CDI.KEYID = 6
1,210,317 UART: [ldev] SUBJECT.KEYID = 5
1,210,744 UART: [ldev] AUTHORITY.KEYID = 7
1,211,207 UART: [ldev] FE.KEYID = 1
1,216,339 UART: [ldev] Erasing FE.KEYID = 1
1,243,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,369 UART: [ldev] --
1,282,676 UART: [fwproc] Wait for Commands...
1,283,451 UART: [fwproc] Recv command 0x46574c44
1,284,184 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,020 UART: ROM Fatal Error: 0x000B002B
2,628,179 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,176 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,184 UART: [kat] ++
895,336 UART: [kat] sha1
899,534 UART: [kat] SHA2-256
901,474 UART: [kat] SHA2-384
904,079 UART: [kat] SHA2-512-ACC
905,980 UART: [kat] ECC-384
915,473 UART: [kat] HMAC-384Kdf
919,963 UART: [kat] LMS
1,168,275 UART: [kat] --
1,169,276 UART: [cold-reset] ++
1,169,800 UART: [fht] FHT @ 0x50003400
1,172,246 UART: [idev] ++
1,172,414 UART: [idev] CDI.KEYID = 6
1,172,775 UART: [idev] SUBJECT.KEYID = 7
1,173,200 UART: [idev] UDS.KEYID = 0
1,181,245 UART: [idev] Erasing UDS.KEYID = 0
1,197,887 UART: [idev] Sha1 KeyId Algorithm
1,206,717 UART: [idev] --
1,207,600 UART: [ldev] ++
1,207,768 UART: [ldev] CDI.KEYID = 6
1,208,132 UART: [ldev] SUBJECT.KEYID = 5
1,208,559 UART: [ldev] AUTHORITY.KEYID = 7
1,209,022 UART: [ldev] FE.KEYID = 1
1,213,978 UART: [ldev] Erasing FE.KEYID = 1
1,240,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,114 UART: [ldev] --
1,279,543 UART: [fwproc] Wait for Commands...
1,280,326 UART: [fwproc] Recv command 0x46574c44
1,281,059 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,285 UART: ROM Fatal Error: 0x000B002B
2,625,444 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,461 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
891,351 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,455 UART: [kat] ++
895,607 UART: [kat] sha1
899,721 UART: [kat] SHA2-256
901,661 UART: [kat] SHA2-384
904,632 UART: [kat] SHA2-512-ACC
906,533 UART: [kat] ECC-384
916,372 UART: [kat] HMAC-384Kdf
920,908 UART: [kat] LMS
1,169,220 UART: [kat] --
1,170,093 UART: [cold-reset] ++
1,170,487 UART: [fht] FHT @ 0x50003400
1,173,173 UART: [idev] ++
1,173,341 UART: [idev] CDI.KEYID = 6
1,173,702 UART: [idev] SUBJECT.KEYID = 7
1,174,127 UART: [idev] UDS.KEYID = 0
1,182,210 UART: [idev] Erasing UDS.KEYID = 0
1,199,584 UART: [idev] Sha1 KeyId Algorithm
1,208,506 UART: [idev] --
1,209,533 UART: [ldev] ++
1,209,701 UART: [ldev] CDI.KEYID = 6
1,210,065 UART: [ldev] SUBJECT.KEYID = 5
1,210,492 UART: [ldev] AUTHORITY.KEYID = 7
1,210,955 UART: [ldev] FE.KEYID = 1
1,216,525 UART: [ldev] Erasing FE.KEYID = 1
1,243,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,775 UART: [ldev] --
1,283,210 UART: [fwproc] Wait for Commands...
1,283,813 UART: [fwproc] Recv command 0x46574c44
1,284,546 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,374 UART: ROM Fatal Error: 0x000B002B
2,629,533 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,174 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,033,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,183,091 UART:
2,183,496 UART: Running Caliptra ROM ...
2,184,689 UART:
2,184,872 UART: [state] CFI Enabled
2,185,851 UART: [state] LifecycleState = Unprovisioned
2,187,530 UART: [state] DebugLocked = No
2,188,571 UART: [state] WD Timer not started. Device not locked for debugging
2,191,051 UART: [kat] SHA2-256
2,191,728 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,738 UART: [kat] ++
2,195,197 UART: [kat] sha1
2,195,718 UART: [kat] SHA2-256
2,196,381 UART: [kat] SHA2-384
2,197,044 UART: [kat] SHA2-512-ACC
2,197,857 UART: [kat] ECC-384
2,946,844 UART: [kat] HMAC-384Kdf
2,971,548 UART: [kat] LMS
3,448,060 UART: [kat] --
3,452,564 UART: [cold-reset] ++
3,454,018 UART: [fht] FHT @ 0x50003400
3,465,597 UART: [idev] ++
3,466,173 UART: [idev] CDI.KEYID = 6
3,467,196 UART: [idev] SUBJECT.KEYID = 7
3,468,361 UART: [idev] UDS.KEYID = 0
3,501,924 UART: [idev] Erasing UDS.KEYID = 0
5,986,197 UART: [idev] Sha1 KeyId Algorithm
6,010,102 UART: [idev] --
6,014,543 UART: [ldev] ++
6,015,124 UART: [ldev] CDI.KEYID = 6
6,016,014 UART: [ldev] SUBJECT.KEYID = 5
6,017,242 UART: [ldev] AUTHORITY.KEYID = 7
6,018,483 UART: [ldev] FE.KEYID = 1
6,058,498 UART: [ldev] Erasing FE.KEYID = 1
8,565,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,359 UART: [ldev] --
10,374,250 UART: [fwproc] Wait for Commands...
10,376,682 UART: [fwproc] Recv command 0x46574c44
10,378,674 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,786 UART: ROM Fatal Error: 0x000B002A
13,863,040 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,040,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,775,730 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
2,030,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,180,742 UART:
2,181,139 UART: Running Caliptra ROM ...
2,182,307 UART:
2,182,493 UART: [state] CFI Enabled
2,183,445 UART: [state] LifecycleState = Unprovisioned
2,185,093 UART: [state] DebugLocked = No
2,186,208 UART: [state] WD Timer not started. Device not locked for debugging
2,188,679 UART: [kat] SHA2-256
2,189,347 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,192,353 UART: [kat] ++
2,192,804 UART: [kat] sha1
2,193,402 UART: [kat] SHA2-256
2,194,068 UART: [kat] SHA2-384
2,194,746 UART: [kat] SHA2-512-ACC
2,195,632 UART: [kat] ECC-384
3,281,097 UART: [kat] HMAC-384Kdf
3,294,132 UART: [kat] LMS
3,770,652 UART: [kat] --
3,774,693 UART: [cold-reset] ++
3,776,514 UART: [fht] FHT @ 0x50003400
3,787,329 UART: [idev] ++
3,787,902 UART: [idev] CDI.KEYID = 6
3,788,879 UART: [idev] SUBJECT.KEYID = 7
3,790,092 UART: [idev] UDS.KEYID = 0
3,806,877 UART: [idev] Erasing UDS.KEYID = 0
6,270,184 UART: [idev] Sha1 KeyId Algorithm
6,294,019 UART: [idev] --
6,298,988 UART: [ldev] ++
6,299,556 UART: [ldev] CDI.KEYID = 6
6,300,519 UART: [ldev] SUBJECT.KEYID = 5
6,301,737 UART: [ldev] AUTHORITY.KEYID = 7
6,302,968 UART: [ldev] FE.KEYID = 1
6,314,205 UART: [ldev] Erasing FE.KEYID = 1
8,791,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,168 UART: [ldev] --
10,585,011 UART: [fwproc] Wait for Commands...
10,587,165 UART: [fwproc] Recv command 0x46574c44
10,589,157 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,780 UART: ROM Fatal Error: 0x000B002A
14,073,010 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
2,027,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,964,081 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,799 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
891,542 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,646 UART: [kat] ++
895,798 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,751 UART: [kat] SHA2-512-ACC
906,652 UART: [kat] ECC-384
915,871 UART: [kat] HMAC-384Kdf
920,427 UART: [kat] LMS
1,168,739 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,044 UART: [fht] FHT @ 0x50003400
1,172,810 UART: [idev] ++
1,172,978 UART: [idev] CDI.KEYID = 6
1,173,339 UART: [idev] SUBJECT.KEYID = 7
1,173,764 UART: [idev] UDS.KEYID = 0
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,199,049 UART: [idev] Sha1 KeyId Algorithm
1,207,767 UART: [idev] --
1,208,988 UART: [ldev] ++
1,209,156 UART: [ldev] CDI.KEYID = 6
1,209,520 UART: [ldev] SUBJECT.KEYID = 5
1,209,947 UART: [ldev] AUTHORITY.KEYID = 7
1,210,410 UART: [ldev] FE.KEYID = 1
1,215,616 UART: [ldev] Erasing FE.KEYID = 1
1,241,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,894 UART: [ldev] --
1,281,145 UART: [fwproc] Wait for Commands...
1,281,832 UART: [fwproc] Recv command 0x46574c44
1,282,565 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,749 UART: ROM Fatal Error: 0x000B002A
2,627,908 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,133 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,713 UART: [kat] ++
895,865 UART: [kat] sha1
900,167 UART: [kat] SHA2-256
902,107 UART: [kat] SHA2-384
904,722 UART: [kat] SHA2-512-ACC
906,623 UART: [kat] ECC-384
916,322 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,170,109 UART: [cold-reset] ++
1,170,663 UART: [fht] FHT @ 0x50003400
1,173,117 UART: [idev] ++
1,173,285 UART: [idev] CDI.KEYID = 6
1,173,646 UART: [idev] SUBJECT.KEYID = 7
1,174,071 UART: [idev] UDS.KEYID = 0
1,182,198 UART: [idev] Erasing UDS.KEYID = 0
1,199,270 UART: [idev] Sha1 KeyId Algorithm
1,208,008 UART: [idev] --
1,208,979 UART: [ldev] ++
1,209,147 UART: [ldev] CDI.KEYID = 6
1,209,511 UART: [ldev] SUBJECT.KEYID = 5
1,209,938 UART: [ldev] AUTHORITY.KEYID = 7
1,210,401 UART: [ldev] FE.KEYID = 1
1,215,549 UART: [ldev] Erasing FE.KEYID = 1
1,242,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,035 UART: [ldev] --
1,281,466 UART: [fwproc] Wait for Commands...
1,282,143 UART: [fwproc] Recv command 0x46574c44
1,282,876 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,366 UART: ROM Fatal Error: 0x000B002A
2,626,525 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,070 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,689 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
891,512 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,616 UART: [kat] ++
895,768 UART: [kat] sha1
899,894 UART: [kat] SHA2-256
901,834 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
916,561 UART: [kat] HMAC-384Kdf
921,243 UART: [kat] LMS
1,169,555 UART: [kat] --
1,170,294 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,226 UART: [idev] ++
1,173,394 UART: [idev] CDI.KEYID = 6
1,173,755 UART: [idev] SUBJECT.KEYID = 7
1,174,180 UART: [idev] UDS.KEYID = 0
1,181,951 UART: [idev] Erasing UDS.KEYID = 0
1,198,951 UART: [idev] Sha1 KeyId Algorithm
1,207,791 UART: [idev] --
1,208,738 UART: [ldev] ++
1,208,906 UART: [ldev] CDI.KEYID = 6
1,209,270 UART: [ldev] SUBJECT.KEYID = 5
1,209,697 UART: [ldev] AUTHORITY.KEYID = 7
1,210,160 UART: [ldev] FE.KEYID = 1
1,215,336 UART: [ldev] Erasing FE.KEYID = 1
1,242,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,618 UART: [ldev] --
1,280,863 UART: [fwproc] Wait for Commands...
1,281,682 UART: [fwproc] Recv command 0x46574c44
1,282,415 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,815 UART: ROM Fatal Error: 0x000B002A
2,626,974 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,337 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,571 UART: [kat] ++
895,723 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,752 UART: [kat] SHA2-512-ACC
906,653 UART: [kat] ECC-384
916,388 UART: [kat] HMAC-384Kdf
921,002 UART: [kat] LMS
1,169,314 UART: [kat] --
1,170,309 UART: [cold-reset] ++
1,170,763 UART: [fht] FHT @ 0x50003400
1,173,273 UART: [idev] ++
1,173,441 UART: [idev] CDI.KEYID = 6
1,173,802 UART: [idev] SUBJECT.KEYID = 7
1,174,227 UART: [idev] UDS.KEYID = 0
1,182,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,766 UART: [idev] Sha1 KeyId Algorithm
1,208,602 UART: [idev] --
1,209,771 UART: [ldev] ++
1,209,939 UART: [ldev] CDI.KEYID = 6
1,210,303 UART: [ldev] SUBJECT.KEYID = 5
1,210,730 UART: [ldev] AUTHORITY.KEYID = 7
1,211,193 UART: [ldev] FE.KEYID = 1
1,216,575 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,747 UART: [ldev] --
1,281,994 UART: [fwproc] Wait for Commands...
1,282,647 UART: [fwproc] Recv command 0x46574c44
1,283,380 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,578 UART: ROM Fatal Error: 0x000B002A
2,628,737 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,270 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,551 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,240 UART: [cold-reset] ++
1,170,612 UART: [fht] FHT @ 0x50003400
1,173,166 UART: [idev] ++
1,173,334 UART: [idev] CDI.KEYID = 6
1,173,695 UART: [idev] SUBJECT.KEYID = 7
1,174,120 UART: [idev] UDS.KEYID = 0
1,181,849 UART: [idev] Erasing UDS.KEYID = 0
1,198,787 UART: [idev] Sha1 KeyId Algorithm
1,207,659 UART: [idev] --
1,208,720 UART: [ldev] ++
1,208,888 UART: [ldev] CDI.KEYID = 6
1,209,252 UART: [ldev] SUBJECT.KEYID = 5
1,209,679 UART: [ldev] AUTHORITY.KEYID = 7
1,210,142 UART: [ldev] FE.KEYID = 1
1,215,296 UART: [ldev] Erasing FE.KEYID = 1
1,241,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,594 UART: [ldev] --
1,280,901 UART: [fwproc] Wait for Commands...
1,281,476 UART: [fwproc] Recv command 0x46574c44
1,282,209 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,781 UART: ROM Fatal Error: 0x000B002A
2,626,940 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,693 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,509 UART: [kat] SHA2-256
891,059 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,163 UART: [kat] ++
895,315 UART: [kat] sha1
899,321 UART: [kat] SHA2-256
901,261 UART: [kat] SHA2-384
904,028 UART: [kat] SHA2-512-ACC
905,929 UART: [kat] ECC-384
915,474 UART: [kat] HMAC-384Kdf
920,232 UART: [kat] LMS
1,168,544 UART: [kat] --
1,169,717 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,172,829 UART: [idev] ++
1,172,997 UART: [idev] CDI.KEYID = 6
1,173,358 UART: [idev] SUBJECT.KEYID = 7
1,173,783 UART: [idev] UDS.KEYID = 0
1,181,886 UART: [idev] Erasing UDS.KEYID = 0
1,198,414 UART: [idev] Sha1 KeyId Algorithm
1,207,186 UART: [idev] --
1,208,311 UART: [ldev] ++
1,208,479 UART: [ldev] CDI.KEYID = 6
1,208,843 UART: [ldev] SUBJECT.KEYID = 5
1,209,270 UART: [ldev] AUTHORITY.KEYID = 7
1,209,733 UART: [ldev] FE.KEYID = 1
1,215,149 UART: [ldev] Erasing FE.KEYID = 1
1,241,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,061 UART: [ldev] --
1,280,280 UART: [fwproc] Wait for Commands...
1,281,007 UART: [fwproc] Recv command 0x46574c44
1,281,740 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,456 UART: ROM Fatal Error: 0x000B002A
2,625,615 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,472 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
2,031,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,181,803 UART:
2,182,204 UART: Running Caliptra ROM ...
2,183,292 UART:
2,183,454 UART: [state] CFI Enabled
2,184,427 UART: [state] LifecycleState = Unprovisioned
2,186,093 UART: [state] DebugLocked = No
2,187,133 UART: [state] WD Timer not started. Device not locked for debugging
2,189,607 UART: [kat] SHA2-256
2,190,278 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,193,292 UART: [kat] ++
2,193,747 UART: [kat] sha1
2,194,270 UART: [kat] SHA2-256
2,194,935 UART: [kat] SHA2-384
2,195,601 UART: [kat] SHA2-512-ACC
2,196,452 UART: [kat] ECC-384
2,948,302 UART: [kat] HMAC-384Kdf
2,972,968 UART: [kat] LMS
3,449,452 UART: [kat] --
3,453,658 UART: [cold-reset] ++
3,455,862 UART: [fht] FHT @ 0x50003400
3,468,517 UART: [idev] ++
3,469,129 UART: [idev] CDI.KEYID = 6
3,470,049 UART: [idev] SUBJECT.KEYID = 7
3,471,272 UART: [idev] UDS.KEYID = 0
3,502,540 UART: [idev] Erasing UDS.KEYID = 0
5,989,014 UART: [idev] Sha1 KeyId Algorithm
6,011,976 UART: [idev] --
6,016,676 UART: [ldev] ++
6,017,250 UART: [ldev] CDI.KEYID = 6
6,018,136 UART: [ldev] SUBJECT.KEYID = 5
6,019,351 UART: [ldev] AUTHORITY.KEYID = 7
6,020,644 UART: [ldev] FE.KEYID = 1
6,058,188 UART: [ldev] Erasing FE.KEYID = 1
8,563,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,037 UART: [ldev] --
10,373,313 UART: [fwproc] Wait for Commands...
10,376,283 UART: [fwproc] Recv command 0x46574c44
10,378,279 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,916 UART: ROM Fatal Error: 0x000B002A
13,870,158 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,038,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,755,742 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
2,036,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,186,395 UART:
2,186,787 UART: Running Caliptra ROM ...
2,187,865 UART:
2,188,017 UART: [state] CFI Enabled
2,188,981 UART: [state] LifecycleState = Unprovisioned
2,190,630 UART: [state] DebugLocked = No
2,191,740 UART: [state] WD Timer not started. Device not locked for debugging
2,194,212 UART: [kat] SHA2-256
2,194,881 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,197,891 UART: [kat] ++
2,198,363 UART: [kat] sha1
2,198,877 UART: [kat] SHA2-256
2,199,616 UART: [kat] SHA2-384
2,200,282 UART: [kat] SHA2-512-ACC
2,201,083 UART: [kat] ECC-384
3,279,505 UART: [kat] HMAC-384Kdf
3,291,957 UART: [kat] LMS
3,768,440 UART: [kat] --
3,773,779 UART: [cold-reset] ++
3,775,277 UART: [fht] FHT @ 0x50003400
3,787,341 UART: [idev] ++
3,787,908 UART: [idev] CDI.KEYID = 6
3,788,920 UART: [idev] SUBJECT.KEYID = 7
3,790,075 UART: [idev] UDS.KEYID = 0
3,806,487 UART: [idev] Erasing UDS.KEYID = 0
6,264,838 UART: [idev] Sha1 KeyId Algorithm
6,289,051 UART: [idev] --
6,293,131 UART: [ldev] ++
6,293,708 UART: [ldev] CDI.KEYID = 6
6,294,617 UART: [ldev] SUBJECT.KEYID = 5
6,295,828 UART: [ldev] AUTHORITY.KEYID = 7
6,297,059 UART: [ldev] FE.KEYID = 1
6,307,222 UART: [ldev] Erasing FE.KEYID = 1
8,785,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,956 UART: [ldev] --
10,577,273 UART: [fwproc] Wait for Commands...
10,579,048 UART: [fwproc] Recv command 0x46574c44
10,581,046 UART: [fwproc] Recv'd Img size: 118548 bytes
14,058,553 UART: ROM Fatal Error: 0x000B002A
14,061,798 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,042,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,976,730 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,385 UART: [kat] SHA2-512-ACC
906,286 UART: [kat] ECC-384
915,847 UART: [kat] HMAC-384Kdf
920,373 UART: [kat] LMS
1,168,685 UART: [kat] --
1,169,590 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,580 UART: [idev] ++
1,172,748 UART: [idev] CDI.KEYID = 6
1,173,109 UART: [idev] SUBJECT.KEYID = 7
1,173,534 UART: [idev] UDS.KEYID = 0
1,181,433 UART: [idev] Erasing UDS.KEYID = 0
1,197,817 UART: [idev] Sha1 KeyId Algorithm
1,206,577 UART: [idev] --
1,207,422 UART: [ldev] ++
1,207,590 UART: [ldev] CDI.KEYID = 6
1,207,954 UART: [ldev] SUBJECT.KEYID = 5
1,208,381 UART: [ldev] AUTHORITY.KEYID = 7
1,208,844 UART: [ldev] FE.KEYID = 1
1,214,094 UART: [ldev] Erasing FE.KEYID = 1
1,241,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,864 UART: [ldev] --
1,280,083 UART: [fwproc] Wait for Commands...
1,280,814 UART: [fwproc] Recv command 0x46574c44
1,281,547 UART: [fwproc] Recv'd Img size: 118548 bytes
2,623,999 UART: ROM Fatal Error: 0x000B002A
2,625,158 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,787 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,657 UART: [kat] ++
895,809 UART: [kat] sha1
900,067 UART: [kat] SHA2-256
902,007 UART: [kat] SHA2-384
904,824 UART: [kat] SHA2-512-ACC
906,725 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,032 UART: [kat] LMS
1,169,344 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,543 UART: [fht] FHT @ 0x50003400
1,173,223 UART: [idev] ++
1,173,391 UART: [idev] CDI.KEYID = 6
1,173,752 UART: [idev] SUBJECT.KEYID = 7
1,174,177 UART: [idev] UDS.KEYID = 0
1,182,498 UART: [idev] Erasing UDS.KEYID = 0
1,200,320 UART: [idev] Sha1 KeyId Algorithm
1,209,092 UART: [idev] --
1,210,067 UART: [ldev] ++
1,210,235 UART: [ldev] CDI.KEYID = 6
1,210,599 UART: [ldev] SUBJECT.KEYID = 5
1,211,026 UART: [ldev] AUTHORITY.KEYID = 7
1,211,489 UART: [ldev] FE.KEYID = 1
1,216,769 UART: [ldev] Erasing FE.KEYID = 1
1,243,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,153 UART: [ldev] --
1,282,542 UART: [fwproc] Wait for Commands...
1,283,195 UART: [fwproc] Recv command 0x46574c44
1,283,928 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,248 UART: ROM Fatal Error: 0x000B002A
2,628,407 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,884 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,194 UART: [kat] ++
895,346 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,427 UART: [kat] SHA2-512-ACC
906,328 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,723 UART: [kat] LMS
1,169,035 UART: [kat] --
1,170,044 UART: [cold-reset] ++
1,170,520 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,199,323 UART: [idev] Sha1 KeyId Algorithm
1,208,291 UART: [idev] --
1,209,366 UART: [ldev] ++
1,209,534 UART: [ldev] CDI.KEYID = 6
1,209,898 UART: [ldev] SUBJECT.KEYID = 5
1,210,325 UART: [ldev] AUTHORITY.KEYID = 7
1,210,788 UART: [ldev] FE.KEYID = 1
1,215,976 UART: [ldev] Erasing FE.KEYID = 1
1,242,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,502 UART: [ldev] --
1,280,875 UART: [fwproc] Wait for Commands...
1,281,544 UART: [fwproc] Recv command 0x46574c44
1,282,277 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,699 UART: ROM Fatal Error: 0x000B002A
2,627,858 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,119 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,873 UART: [state] LifecycleState = Unprovisioned
86,528 UART: [state] DebugLocked = No
87,208 UART: [state] WD Timer not started. Device not locked for debugging
88,479 UART: [kat] SHA2-256
892,029 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,133 UART: [kat] ++
896,285 UART: [kat] sha1
900,467 UART: [kat] SHA2-256
902,407 UART: [kat] SHA2-384
905,164 UART: [kat] SHA2-512-ACC
907,065 UART: [kat] ECC-384
916,746 UART: [kat] HMAC-384Kdf
921,526 UART: [kat] LMS
1,169,838 UART: [kat] --
1,170,921 UART: [cold-reset] ++
1,171,277 UART: [fht] FHT @ 0x50003400
1,174,091 UART: [idev] ++
1,174,259 UART: [idev] CDI.KEYID = 6
1,174,620 UART: [idev] SUBJECT.KEYID = 7
1,175,045 UART: [idev] UDS.KEYID = 0
1,182,968 UART: [idev] Erasing UDS.KEYID = 0
1,199,844 UART: [idev] Sha1 KeyId Algorithm
1,208,818 UART: [idev] --
1,209,753 UART: [ldev] ++
1,209,921 UART: [ldev] CDI.KEYID = 6
1,210,285 UART: [ldev] SUBJECT.KEYID = 5
1,210,712 UART: [ldev] AUTHORITY.KEYID = 7
1,211,175 UART: [ldev] FE.KEYID = 1
1,216,559 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,391 UART: [ldev] --
1,281,846 UART: [fwproc] Wait for Commands...
1,282,463 UART: [fwproc] Recv command 0x46574c44
1,283,196 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,404 UART: ROM Fatal Error: 0x000B002A
2,627,563 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,542 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,745 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
891,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
899,930 UART: [kat] SHA2-256
901,870 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
915,957 UART: [kat] HMAC-384Kdf
920,313 UART: [kat] LMS
1,168,625 UART: [kat] --
1,169,808 UART: [cold-reset] ++
1,170,278 UART: [fht] FHT @ 0x50003400
1,172,840 UART: [idev] ++
1,173,008 UART: [idev] CDI.KEYID = 6
1,173,369 UART: [idev] SUBJECT.KEYID = 7
1,173,794 UART: [idev] UDS.KEYID = 0
1,181,635 UART: [idev] Erasing UDS.KEYID = 0
1,197,991 UART: [idev] Sha1 KeyId Algorithm
1,207,007 UART: [idev] --
1,208,196 UART: [ldev] ++
1,208,364 UART: [ldev] CDI.KEYID = 6
1,208,728 UART: [ldev] SUBJECT.KEYID = 5
1,209,155 UART: [ldev] AUTHORITY.KEYID = 7
1,209,618 UART: [ldev] FE.KEYID = 1
1,215,008 UART: [ldev] Erasing FE.KEYID = 1
1,241,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,896 UART: [ldev] --
1,280,261 UART: [fwproc] Wait for Commands...
1,281,032 UART: [fwproc] Recv command 0x46574c44
1,281,765 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,449 UART: ROM Fatal Error: 0x000B002A
2,625,608 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,031 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,817 UART: [kat] ++
895,969 UART: [kat] sha1
900,313 UART: [kat] SHA2-256
902,253 UART: [kat] SHA2-384
905,064 UART: [kat] SHA2-512-ACC
906,965 UART: [kat] ECC-384
916,588 UART: [kat] HMAC-384Kdf
921,068 UART: [kat] LMS
1,169,380 UART: [kat] --
1,170,133 UART: [cold-reset] ++
1,170,463 UART: [fht] FHT @ 0x50003400
1,173,237 UART: [idev] ++
1,173,405 UART: [idev] CDI.KEYID = 6
1,173,766 UART: [idev] SUBJECT.KEYID = 7
1,174,191 UART: [idev] UDS.KEYID = 0
1,182,668 UART: [idev] Erasing UDS.KEYID = 0
1,199,678 UART: [idev] Sha1 KeyId Algorithm
1,208,610 UART: [idev] --
1,209,805 UART: [ldev] ++
1,209,973 UART: [ldev] CDI.KEYID = 6
1,210,337 UART: [ldev] SUBJECT.KEYID = 5
1,210,764 UART: [ldev] AUTHORITY.KEYID = 7
1,211,227 UART: [ldev] FE.KEYID = 1
1,216,485 UART: [ldev] Erasing FE.KEYID = 1
1,242,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,213 UART: [ldev] --
1,281,460 UART: [fwproc] Wait for Commands...
1,282,043 UART: [fwproc] Recv command 0x46574c44
1,282,776 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,918 UART: ROM Fatal Error: 0x000B002A
2,627,077 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,214 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
2,037,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,187,252 UART:
2,187,659 UART: Running Caliptra ROM ...
2,188,788 UART:
2,188,963 UART: [state] CFI Enabled
2,189,874 UART: [state] LifecycleState = Unprovisioned
2,191,560 UART: [state] DebugLocked = No
2,192,726 UART: [state] WD Timer not started. Device not locked for debugging
2,195,229 UART: [kat] SHA2-256
2,195,913 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,198,936 UART: [kat] ++
2,199,893 UART: [kat] sha1
2,200,419 UART: [kat] SHA2-256
2,201,230 UART: [kat] SHA2-384
2,201,916 UART: [kat] SHA2-512-ACC
2,202,847 UART: [kat] ECC-384
2,945,661 UART: [kat] HMAC-384Kdf
2,959,301 UART: [kat] LMS
3,435,785 UART: [kat] --
3,439,507 UART: [cold-reset] ++
3,441,929 UART: [fht] FHT @ 0x50003400
3,451,939 UART: [idev] ++
3,452,563 UART: [idev] CDI.KEYID = 6
3,453,480 UART: [idev] SUBJECT.KEYID = 7
3,454,757 UART: [idev] UDS.KEYID = 0
3,491,801 UART: [idev] Erasing UDS.KEYID = 0
5,975,266 UART: [idev] Sha1 KeyId Algorithm
5,998,972 UART: [idev] --
6,003,057 UART: [ldev] ++
6,003,674 UART: [ldev] CDI.KEYID = 6
6,004,570 UART: [ldev] SUBJECT.KEYID = 5
6,005,793 UART: [ldev] AUTHORITY.KEYID = 7
6,007,035 UART: [ldev] FE.KEYID = 1
6,045,170 UART: [ldev] Erasing FE.KEYID = 1
8,553,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,289,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,305,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,320,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,336,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,358,456 UART: [ldev] --
10,363,133 UART: [fwproc] Wait for Commands...
10,365,076 UART: [fwproc] Recv command 0x46574c44
10,367,080 UART: [fwproc] Recv'd Img size: 118548 bytes
13,846,335 UART: ROM Fatal Error: 0x000B0028
13,849,577 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
2,030,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,773,225 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,038,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,188,496 UART:
2,188,894 UART: Running Caliptra ROM ...
2,189,978 UART:
2,190,128 UART: [state] CFI Enabled
2,191,098 UART: [state] LifecycleState = Unprovisioned
2,192,761 UART: [state] DebugLocked = No
2,193,871 UART: [state] WD Timer not started. Device not locked for debugging
2,196,347 UART: [kat] SHA2-256
2,197,017 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,200,035 UART: [kat] ++
2,200,488 UART: [kat] sha1
2,200,996 UART: [kat] SHA2-256
2,201,647 UART: [kat] SHA2-384
2,202,299 UART: [kat] SHA2-512-ACC
2,203,115 UART: [kat] ECC-384
3,277,227 UART: [kat] HMAC-384Kdf
3,289,125 UART: [kat] LMS
3,765,591 UART: [kat] --
3,770,032 UART: [cold-reset] ++
3,772,620 UART: [fht] FHT @ 0x50003400
3,784,519 UART: [idev] ++
3,785,079 UART: [idev] CDI.KEYID = 6
3,786,057 UART: [idev] SUBJECT.KEYID = 7
3,787,269 UART: [idev] UDS.KEYID = 0
3,805,506 UART: [idev] Erasing UDS.KEYID = 0
6,268,865 UART: [idev] Sha1 KeyId Algorithm
6,293,279 UART: [idev] --
6,298,750 UART: [ldev] ++
6,299,320 UART: [ldev] CDI.KEYID = 6
6,300,204 UART: [ldev] SUBJECT.KEYID = 5
6,301,487 UART: [ldev] AUTHORITY.KEYID = 7
6,302,717 UART: [ldev] FE.KEYID = 1
6,312,906 UART: [ldev] Erasing FE.KEYID = 1
8,791,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,970 UART: [ldev] --
10,585,720 UART: [fwproc] Wait for Commands...
10,588,744 UART: [fwproc] Recv command 0x46574c44
10,590,737 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,176 UART: ROM Fatal Error: 0x000B0028
14,075,379 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
2,042,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,964,883 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,566 UART: [state] LifecycleState = Unprovisioned
86,221 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [kat] SHA2-256
891,490 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
900,082 UART: [kat] SHA2-256
902,022 UART: [kat] SHA2-384
904,735 UART: [kat] SHA2-512-ACC
906,636 UART: [kat] ECC-384
915,969 UART: [kat] HMAC-384Kdf
920,649 UART: [kat] LMS
1,168,961 UART: [kat] --
1,169,742 UART: [cold-reset] ++
1,170,192 UART: [fht] FHT @ 0x50003400
1,172,838 UART: [idev] ++
1,173,006 UART: [idev] CDI.KEYID = 6
1,173,367 UART: [idev] SUBJECT.KEYID = 7
1,173,792 UART: [idev] UDS.KEYID = 0
1,181,465 UART: [idev] Erasing UDS.KEYID = 0
1,198,221 UART: [idev] Sha1 KeyId Algorithm
1,207,097 UART: [idev] --
1,208,162 UART: [ldev] ++
1,208,330 UART: [ldev] CDI.KEYID = 6
1,208,694 UART: [ldev] SUBJECT.KEYID = 5
1,209,121 UART: [ldev] AUTHORITY.KEYID = 7
1,209,584 UART: [ldev] FE.KEYID = 1
1,214,620 UART: [ldev] Erasing FE.KEYID = 1
1,241,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,282 UART: [ldev] --
1,280,527 UART: [fwproc] Wait for Commands...
1,281,282 UART: [fwproc] Recv command 0x46574c44
1,282,015 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,536 UART: ROM Fatal Error: 0x000B0028
2,626,693 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,928 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,973 UART: [state] LifecycleState = Unprovisioned
85,628 UART: [state] DebugLocked = No
86,132 UART: [state] WD Timer not started. Device not locked for debugging
87,431 UART: [kat] SHA2-256
890,981 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,085 UART: [kat] ++
895,237 UART: [kat] sha1
899,585 UART: [kat] SHA2-256
901,525 UART: [kat] SHA2-384
904,308 UART: [kat] SHA2-512-ACC
906,209 UART: [kat] ECC-384
916,438 UART: [kat] HMAC-384Kdf
921,122 UART: [kat] LMS
1,169,434 UART: [kat] --
1,170,271 UART: [cold-reset] ++
1,170,695 UART: [fht] FHT @ 0x50003400
1,173,509 UART: [idev] ++
1,173,677 UART: [idev] CDI.KEYID = 6
1,174,038 UART: [idev] SUBJECT.KEYID = 7
1,174,463 UART: [idev] UDS.KEYID = 0
1,182,488 UART: [idev] Erasing UDS.KEYID = 0
1,199,894 UART: [idev] Sha1 KeyId Algorithm
1,208,740 UART: [idev] --
1,209,725 UART: [ldev] ++
1,209,893 UART: [ldev] CDI.KEYID = 6
1,210,257 UART: [ldev] SUBJECT.KEYID = 5
1,210,684 UART: [ldev] AUTHORITY.KEYID = 7
1,211,147 UART: [ldev] FE.KEYID = 1
1,216,475 UART: [ldev] Erasing FE.KEYID = 1
1,242,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,249 UART: [ldev] --
1,281,476 UART: [fwproc] Wait for Commands...
1,282,189 UART: [fwproc] Recv command 0x46574c44
1,282,922 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,405 UART: ROM Fatal Error: 0x000B0028
2,627,562 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,881 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
916,499 UART: [kat] HMAC-384Kdf
921,097 UART: [kat] LMS
1,169,409 UART: [kat] --
1,170,142 UART: [cold-reset] ++
1,170,520 UART: [fht] FHT @ 0x50003400
1,173,060 UART: [idev] ++
1,173,228 UART: [idev] CDI.KEYID = 6
1,173,589 UART: [idev] SUBJECT.KEYID = 7
1,174,014 UART: [idev] UDS.KEYID = 0
1,182,107 UART: [idev] Erasing UDS.KEYID = 0
1,199,009 UART: [idev] Sha1 KeyId Algorithm
1,207,953 UART: [idev] --
1,209,006 UART: [ldev] ++
1,209,174 UART: [ldev] CDI.KEYID = 6
1,209,538 UART: [ldev] SUBJECT.KEYID = 5
1,209,965 UART: [ldev] AUTHORITY.KEYID = 7
1,210,428 UART: [ldev] FE.KEYID = 1
1,215,686 UART: [ldev] Erasing FE.KEYID = 1
1,242,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,762 UART: [ldev] --
1,281,025 UART: [fwproc] Wait for Commands...
1,281,686 UART: [fwproc] Recv command 0x46574c44
1,282,419 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,080 UART: ROM Fatal Error: 0x000B0028
2,626,237 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,212 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
891,619 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,723 UART: [kat] ++
895,875 UART: [kat] sha1
900,081 UART: [kat] SHA2-256
902,021 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
916,674 UART: [kat] HMAC-384Kdf
921,178 UART: [kat] LMS
1,169,490 UART: [kat] --
1,170,347 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,455 UART: [idev] ++
1,173,623 UART: [idev] CDI.KEYID = 6
1,173,984 UART: [idev] SUBJECT.KEYID = 7
1,174,409 UART: [idev] UDS.KEYID = 0
1,182,778 UART: [idev] Erasing UDS.KEYID = 0
1,199,946 UART: [idev] Sha1 KeyId Algorithm
1,208,694 UART: [idev] --
1,209,809 UART: [ldev] ++
1,209,977 UART: [ldev] CDI.KEYID = 6
1,210,341 UART: [ldev] SUBJECT.KEYID = 5
1,210,768 UART: [ldev] AUTHORITY.KEYID = 7
1,211,231 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,242,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,811 UART: [ldev] --
1,282,188 UART: [fwproc] Wait for Commands...
1,282,867 UART: [fwproc] Recv command 0x46574c44
1,283,600 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,461 UART: ROM Fatal Error: 0x000B0028
2,627,618 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,236 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,644 UART: [cold-reset] ++
1,171,088 UART: [fht] FHT @ 0x50003400
1,173,738 UART: [idev] ++
1,173,906 UART: [idev] CDI.KEYID = 6
1,174,267 UART: [idev] SUBJECT.KEYID = 7
1,174,692 UART: [idev] UDS.KEYID = 0
1,182,565 UART: [idev] Erasing UDS.KEYID = 0
1,199,147 UART: [idev] Sha1 KeyId Algorithm
1,207,927 UART: [idev] --
1,208,906 UART: [ldev] ++
1,209,074 UART: [ldev] CDI.KEYID = 6
1,209,438 UART: [ldev] SUBJECT.KEYID = 5
1,209,865 UART: [ldev] AUTHORITY.KEYID = 7
1,210,328 UART: [ldev] FE.KEYID = 1
1,215,552 UART: [ldev] Erasing FE.KEYID = 1
1,241,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,382 UART: [ldev] --
1,280,739 UART: [fwproc] Wait for Commands...
1,281,452 UART: [fwproc] Recv command 0x46574c44
1,282,185 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,512 UART: ROM Fatal Error: 0x000B0028
2,626,669 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,440 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
891,453 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
900,031 UART: [kat] SHA2-256
901,971 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
916,374 UART: [kat] HMAC-384Kdf
920,890 UART: [kat] LMS
1,169,202 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,173,175 UART: [idev] ++
1,173,343 UART: [idev] CDI.KEYID = 6
1,173,704 UART: [idev] SUBJECT.KEYID = 7
1,174,129 UART: [idev] UDS.KEYID = 0
1,182,012 UART: [idev] Erasing UDS.KEYID = 0
1,199,588 UART: [idev] Sha1 KeyId Algorithm
1,208,594 UART: [idev] --
1,209,647 UART: [ldev] ++
1,209,815 UART: [ldev] CDI.KEYID = 6
1,210,179 UART: [ldev] SUBJECT.KEYID = 5
1,210,606 UART: [ldev] AUTHORITY.KEYID = 7
1,211,069 UART: [ldev] FE.KEYID = 1
1,216,411 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,147 UART: [ldev] --
1,282,590 UART: [fwproc] Wait for Commands...
1,283,269 UART: [fwproc] Recv command 0x46574c44
1,284,002 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,827 UART: ROM Fatal Error: 0x000B0028
2,628,984 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,517 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,035,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,185,513 UART:
2,185,924 UART: Running Caliptra ROM ...
2,187,100 UART:
2,187,289 UART: [state] CFI Enabled
2,188,255 UART: [state] LifecycleState = Unprovisioned
2,189,921 UART: [state] DebugLocked = No
2,190,994 UART: [state] WD Timer not started. Device not locked for debugging
2,193,498 UART: [kat] SHA2-256
2,194,178 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,197,201 UART: [kat] ++
2,197,884 UART: [kat] sha1
2,198,416 UART: [kat] SHA2-256
2,199,295 UART: [kat] SHA2-384
2,199,972 UART: [kat] SHA2-512-ACC
2,200,787 UART: [kat] ECC-384
2,948,152 UART: [kat] HMAC-384Kdf
2,970,475 UART: [kat] LMS
3,446,988 UART: [kat] --
3,452,711 UART: [cold-reset] ++
3,454,485 UART: [fht] FHT @ 0x50003400
3,466,278 UART: [idev] ++
3,466,851 UART: [idev] CDI.KEYID = 6
3,467,876 UART: [idev] SUBJECT.KEYID = 7
3,469,058 UART: [idev] UDS.KEYID = 0
3,500,384 UART: [idev] Erasing UDS.KEYID = 0
5,985,055 UART: [idev] Sha1 KeyId Algorithm
6,008,874 UART: [idev] --
6,014,224 UART: [ldev] ++
6,014,800 UART: [ldev] CDI.KEYID = 6
6,015,718 UART: [ldev] SUBJECT.KEYID = 5
6,016,938 UART: [ldev] AUTHORITY.KEYID = 7
6,018,180 UART: [ldev] FE.KEYID = 1
6,057,256 UART: [ldev] Erasing FE.KEYID = 1
8,561,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,249 UART: [ldev] --
10,370,169 UART: [fwproc] Wait for Commands...
10,373,423 UART: [fwproc] Recv command 0x46574c44
10,375,418 UART: [fwproc] Recv'd Img size: 118548 bytes
13,849,706 UART: ROM Fatal Error: 0x000B0028
13,852,945 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
2,030,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,770,560 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
2,042,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,191,784 UART:
2,192,180 UART: Running Caliptra ROM ...
2,193,268 UART:
2,193,417 UART: [state] CFI Enabled
2,194,380 UART: [state] LifecycleState = Unprovisioned
2,196,031 UART: [state] DebugLocked = No
2,197,063 UART: [state] WD Timer not started. Device not locked for debugging
2,199,769 UART: [kat] SHA2-256
2,200,441 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,203,448 UART: [kat] ++
2,203,894 UART: [kat] sha1
2,204,402 UART: [kat] SHA2-256
2,205,056 UART: [kat] SHA2-384
2,205,711 UART: [kat] SHA2-512-ACC
2,206,536 UART: [kat] ECC-384
3,279,093 UART: [kat] HMAC-384Kdf
3,292,034 UART: [kat] LMS
3,768,578 UART: [kat] --
3,773,077 UART: [cold-reset] ++
3,775,071 UART: [fht] FHT @ 0x50003400
3,786,540 UART: [idev] ++
3,787,104 UART: [idev] CDI.KEYID = 6
3,788,035 UART: [idev] SUBJECT.KEYID = 7
3,789,298 UART: [idev] UDS.KEYID = 0
3,804,594 UART: [idev] Erasing UDS.KEYID = 0
6,266,990 UART: [idev] Sha1 KeyId Algorithm
6,291,107 UART: [idev] --
6,295,832 UART: [ldev] ++
6,296,463 UART: [ldev] CDI.KEYID = 6
6,297,348 UART: [ldev] SUBJECT.KEYID = 5
6,298,556 UART: [ldev] AUTHORITY.KEYID = 7
6,299,861 UART: [ldev] FE.KEYID = 1
6,310,101 UART: [ldev] Erasing FE.KEYID = 1
8,786,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,209 UART: [ldev] --
10,576,931 UART: [fwproc] Wait for Commands...
10,578,493 UART: [fwproc] Recv command 0x46574c44
10,580,483 UART: [fwproc] Recv'd Img size: 118548 bytes
14,062,969 UART: ROM Fatal Error: 0x000B0028
14,066,206 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
2,032,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,974,101 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [kat] SHA2-256
891,490 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
899,794 UART: [kat] SHA2-256
901,734 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
916,077 UART: [kat] HMAC-384Kdf
920,741 UART: [kat] LMS
1,169,053 UART: [kat] --
1,169,822 UART: [cold-reset] ++
1,170,216 UART: [fht] FHT @ 0x50003400
1,172,988 UART: [idev] ++
1,173,156 UART: [idev] CDI.KEYID = 6
1,173,517 UART: [idev] SUBJECT.KEYID = 7
1,173,942 UART: [idev] UDS.KEYID = 0
1,181,883 UART: [idev] Erasing UDS.KEYID = 0
1,198,599 UART: [idev] Sha1 KeyId Algorithm
1,207,601 UART: [idev] --
1,208,518 UART: [ldev] ++
1,208,686 UART: [ldev] CDI.KEYID = 6
1,209,050 UART: [ldev] SUBJECT.KEYID = 5
1,209,477 UART: [ldev] AUTHORITY.KEYID = 7
1,209,940 UART: [ldev] FE.KEYID = 1
1,214,858 UART: [ldev] Erasing FE.KEYID = 1
1,241,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,780 UART: [ldev] --
1,280,103 UART: [fwproc] Wait for Commands...
1,280,770 UART: [fwproc] Recv command 0x46574c44
1,281,503 UART: [fwproc] Recv'd Img size: 118548 bytes
2,622,908 UART: ROM Fatal Error: 0x000B0028
2,624,065 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,320 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
87,146 UART: [state] WD Timer not started. Device not locked for debugging
88,331 UART: [kat] SHA2-256
891,881 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,985 UART: [kat] ++
896,137 UART: [kat] sha1
900,237 UART: [kat] SHA2-256
902,177 UART: [kat] SHA2-384
904,978 UART: [kat] SHA2-512-ACC
906,879 UART: [kat] ECC-384
916,892 UART: [kat] HMAC-384Kdf
921,570 UART: [kat] LMS
1,169,882 UART: [kat] --
1,170,849 UART: [cold-reset] ++
1,171,279 UART: [fht] FHT @ 0x50003400
1,173,937 UART: [idev] ++
1,174,105 UART: [idev] CDI.KEYID = 6
1,174,466 UART: [idev] SUBJECT.KEYID = 7
1,174,891 UART: [idev] UDS.KEYID = 0
1,182,664 UART: [idev] Erasing UDS.KEYID = 0
1,199,886 UART: [idev] Sha1 KeyId Algorithm
1,208,926 UART: [idev] --
1,209,969 UART: [ldev] ++
1,210,137 UART: [ldev] CDI.KEYID = 6
1,210,501 UART: [ldev] SUBJECT.KEYID = 5
1,210,928 UART: [ldev] AUTHORITY.KEYID = 7
1,211,391 UART: [ldev] FE.KEYID = 1
1,216,771 UART: [ldev] Erasing FE.KEYID = 1
1,243,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,945 UART: [ldev] --
1,282,172 UART: [fwproc] Wait for Commands...
1,282,995 UART: [fwproc] Recv command 0x46574c44
1,283,728 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,223 UART: ROM Fatal Error: 0x000B0028
2,627,380 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,729 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,136 UART: [kat] ++
895,288 UART: [kat] sha1
899,602 UART: [kat] SHA2-256
901,542 UART: [kat] SHA2-384
904,295 UART: [kat] SHA2-512-ACC
906,196 UART: [kat] ECC-384
915,671 UART: [kat] HMAC-384Kdf
920,151 UART: [kat] LMS
1,168,463 UART: [kat] --
1,169,450 UART: [cold-reset] ++
1,169,884 UART: [fht] FHT @ 0x50003400
1,172,474 UART: [idev] ++
1,172,642 UART: [idev] CDI.KEYID = 6
1,173,003 UART: [idev] SUBJECT.KEYID = 7
1,173,428 UART: [idev] UDS.KEYID = 0
1,181,633 UART: [idev] Erasing UDS.KEYID = 0
1,198,671 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,482 UART: [ldev] ++
1,208,650 UART: [ldev] CDI.KEYID = 6
1,209,014 UART: [ldev] SUBJECT.KEYID = 5
1,209,441 UART: [ldev] AUTHORITY.KEYID = 7
1,209,904 UART: [ldev] FE.KEYID = 1
1,215,070 UART: [ldev] Erasing FE.KEYID = 1
1,241,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,162 UART: [ldev] --
1,280,603 UART: [fwproc] Wait for Commands...
1,281,286 UART: [fwproc] Recv command 0x46574c44
1,282,019 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,906 UART: ROM Fatal Error: 0x000B0028
2,627,063 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,156 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,797 UART: [state] LifecycleState = Unprovisioned
86,452 UART: [state] DebugLocked = No
87,046 UART: [state] WD Timer not started. Device not locked for debugging
88,305 UART: [kat] SHA2-256
891,855 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,959 UART: [kat] ++
896,111 UART: [kat] sha1
900,267 UART: [kat] SHA2-256
902,207 UART: [kat] SHA2-384
905,100 UART: [kat] SHA2-512-ACC
907,001 UART: [kat] ECC-384
916,726 UART: [kat] HMAC-384Kdf
921,216 UART: [kat] LMS
1,169,528 UART: [kat] --
1,170,607 UART: [cold-reset] ++
1,171,157 UART: [fht] FHT @ 0x50003400
1,173,649 UART: [idev] ++
1,173,817 UART: [idev] CDI.KEYID = 6
1,174,178 UART: [idev] SUBJECT.KEYID = 7
1,174,603 UART: [idev] UDS.KEYID = 0
1,182,058 UART: [idev] Erasing UDS.KEYID = 0
1,198,888 UART: [idev] Sha1 KeyId Algorithm
1,207,660 UART: [idev] --
1,208,727 UART: [ldev] ++
1,208,895 UART: [ldev] CDI.KEYID = 6
1,209,259 UART: [ldev] SUBJECT.KEYID = 5
1,209,686 UART: [ldev] AUTHORITY.KEYID = 7
1,210,149 UART: [ldev] FE.KEYID = 1
1,215,611 UART: [ldev] Erasing FE.KEYID = 1
1,241,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,335 UART: [ldev] --
1,280,778 UART: [fwproc] Wait for Commands...
1,281,419 UART: [fwproc] Recv command 0x46574c44
1,282,152 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,719 UART: ROM Fatal Error: 0x000B0028
2,625,876 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,467 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
891,034 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,138 UART: [kat] ++
895,290 UART: [kat] sha1
899,564 UART: [kat] SHA2-256
901,504 UART: [kat] SHA2-384
904,157 UART: [kat] SHA2-512-ACC
906,058 UART: [kat] ECC-384
916,125 UART: [kat] HMAC-384Kdf
920,779 UART: [kat] LMS
1,169,091 UART: [kat] --
1,169,788 UART: [cold-reset] ++
1,170,332 UART: [fht] FHT @ 0x50003400
1,173,030 UART: [idev] ++
1,173,198 UART: [idev] CDI.KEYID = 6
1,173,559 UART: [idev] SUBJECT.KEYID = 7
1,173,984 UART: [idev] UDS.KEYID = 0
1,181,333 UART: [idev] Erasing UDS.KEYID = 0
1,198,719 UART: [idev] Sha1 KeyId Algorithm
1,207,717 UART: [idev] --
1,208,626 UART: [ldev] ++
1,208,794 UART: [ldev] CDI.KEYID = 6
1,209,158 UART: [ldev] SUBJECT.KEYID = 5
1,209,585 UART: [ldev] AUTHORITY.KEYID = 7
1,210,048 UART: [ldev] FE.KEYID = 1
1,215,122 UART: [ldev] Erasing FE.KEYID = 1
1,240,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,436 UART: [ldev] --
1,279,727 UART: [fwproc] Wait for Commands...
1,280,504 UART: [fwproc] Recv command 0x46574c44
1,281,237 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,094 UART: ROM Fatal Error: 0x000B0028
2,627,251 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,562 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,801 UART: [kat] ++
895,953 UART: [kat] sha1
900,231 UART: [kat] SHA2-256
902,171 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
917,060 UART: [kat] HMAC-384Kdf
921,674 UART: [kat] LMS
1,169,986 UART: [kat] --
1,171,121 UART: [cold-reset] ++
1,171,617 UART: [fht] FHT @ 0x50003400
1,174,249 UART: [idev] ++
1,174,417 UART: [idev] CDI.KEYID = 6
1,174,778 UART: [idev] SUBJECT.KEYID = 7
1,175,203 UART: [idev] UDS.KEYID = 0
1,183,196 UART: [idev] Erasing UDS.KEYID = 0
1,200,260 UART: [idev] Sha1 KeyId Algorithm
1,209,120 UART: [idev] --
1,210,279 UART: [ldev] ++
1,210,447 UART: [ldev] CDI.KEYID = 6
1,210,811 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,861 UART: [ldev] Erasing FE.KEYID = 1
1,242,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,359 UART: [ldev] --
1,282,566 UART: [fwproc] Wait for Commands...
1,283,301 UART: [fwproc] Recv command 0x46574c44
1,284,034 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,857 UART: ROM Fatal Error: 0x000B0028
2,630,014 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,367 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
2,034,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,183,958 UART:
2,184,382 UART: Running Caliptra ROM ...
2,185,471 UART:
2,185,636 UART: [state] CFI Enabled
2,186,616 UART: [state] LifecycleState = Unprovisioned
2,188,276 UART: [state] DebugLocked = No
2,189,392 UART: [state] WD Timer not started. Device not locked for debugging
2,191,877 UART: [kat] SHA2-256
2,192,557 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,195,594 UART: [kat] ++
2,196,056 UART: [kat] sha1
2,196,583 UART: [kat] SHA2-256
2,197,289 UART: [kat] SHA2-384
2,197,956 UART: [kat] SHA2-512-ACC
2,198,765 UART: [kat] ECC-384
2,947,608 UART: [kat] HMAC-384Kdf
2,969,407 UART: [kat] LMS
3,445,947 UART: [kat] --
3,450,057 UART: [cold-reset] ++
3,452,762 UART: [fht] FHT @ 0x50003400
3,464,835 UART: [idev] ++
3,465,411 UART: [idev] CDI.KEYID = 6
3,466,380 UART: [idev] SUBJECT.KEYID = 7
3,467,604 UART: [idev] UDS.KEYID = 0
3,499,847 UART: [idev] Erasing UDS.KEYID = 0
5,987,112 UART: [idev] Sha1 KeyId Algorithm
6,011,269 UART: [idev] --
6,016,922 UART: [ldev] ++
6,017,514 UART: [ldev] CDI.KEYID = 6
6,018,437 UART: [ldev] SUBJECT.KEYID = 5
6,019,661 UART: [ldev] AUTHORITY.KEYID = 7
6,020,903 UART: [ldev] FE.KEYID = 1
6,055,489 UART: [ldev] Erasing FE.KEYID = 1
8,559,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,254 UART: [ldev] --
10,370,202 UART: [fwproc] Wait for Commands...
10,371,985 UART: [fwproc] Recv command 0x46574c44
10,373,991 UART: [fwproc] Recv'd Img size: 118548 bytes
13,856,382 UART: ROM Fatal Error: 0x000B0029
13,859,583 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
2,032,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,750,133 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,033,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,183,322 UART:
2,183,715 UART: Running Caliptra ROM ...
2,184,823 UART:
2,184,980 UART: [state] CFI Enabled
2,185,864 UART: [state] LifecycleState = Unprovisioned
2,187,511 UART: [state] DebugLocked = No
2,188,621 UART: [state] WD Timer not started. Device not locked for debugging
2,191,091 UART: [kat] SHA2-256
2,191,786 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,798 UART: [kat] ++
2,195,250 UART: [kat] sha1
2,195,759 UART: [kat] SHA2-256
2,196,499 UART: [kat] SHA2-384
2,197,164 UART: [kat] SHA2-512-ACC
2,197,984 UART: [kat] ECC-384
3,281,587 UART: [kat] HMAC-384Kdf
3,293,070 UART: [kat] LMS
3,769,579 UART: [kat] --
3,773,296 UART: [cold-reset] ++
3,775,120 UART: [fht] FHT @ 0x50003400
3,786,256 UART: [idev] ++
3,786,818 UART: [idev] CDI.KEYID = 6
3,787,778 UART: [idev] SUBJECT.KEYID = 7
3,789,043 UART: [idev] UDS.KEYID = 0
3,805,934 UART: [idev] Erasing UDS.KEYID = 0
6,265,426 UART: [idev] Sha1 KeyId Algorithm
6,290,580 UART: [idev] --
6,295,412 UART: [ldev] ++
6,296,038 UART: [ldev] CDI.KEYID = 6
6,296,951 UART: [ldev] SUBJECT.KEYID = 5
6,298,160 UART: [ldev] AUTHORITY.KEYID = 7
6,299,387 UART: [ldev] FE.KEYID = 1
6,309,974 UART: [ldev] Erasing FE.KEYID = 1
8,788,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,912 UART: [ldev] --
10,584,821 UART: [fwproc] Wait for Commands...
10,587,695 UART: [fwproc] Recv command 0x46574c44
10,589,691 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,280 UART: ROM Fatal Error: 0x000B0029
14,074,521 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,040,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,973,316 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Unprovisioned
85,437 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,298 UART: [kat] SHA2-256
890,848 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,952 UART: [kat] ++
895,104 UART: [kat] sha1
899,214 UART: [kat] SHA2-256
901,154 UART: [kat] SHA2-384
903,821 UART: [kat] SHA2-512-ACC
905,722 UART: [kat] ECC-384
915,189 UART: [kat] HMAC-384Kdf
919,759 UART: [kat] LMS
1,168,071 UART: [kat] --
1,169,082 UART: [cold-reset] ++
1,169,546 UART: [fht] FHT @ 0x50003400
1,172,336 UART: [idev] ++
1,172,504 UART: [idev] CDI.KEYID = 6
1,172,865 UART: [idev] SUBJECT.KEYID = 7
1,173,290 UART: [idev] UDS.KEYID = 0
1,180,971 UART: [idev] Erasing UDS.KEYID = 0
1,197,731 UART: [idev] Sha1 KeyId Algorithm
1,206,793 UART: [idev] --
1,207,798 UART: [ldev] ++
1,207,966 UART: [ldev] CDI.KEYID = 6
1,208,330 UART: [ldev] SUBJECT.KEYID = 5
1,208,757 UART: [ldev] AUTHORITY.KEYID = 7
1,209,220 UART: [ldev] FE.KEYID = 1
1,214,244 UART: [ldev] Erasing FE.KEYID = 1
1,241,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,062 UART: [ldev] --
1,280,517 UART: [fwproc] Wait for Commands...
1,281,158 UART: [fwproc] Recv command 0x46574c44
1,281,891 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,026 UART: ROM Fatal Error: 0x000B0029
2,626,183 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,529 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,471 UART: [kat] ++
895,623 UART: [kat] sha1
899,945 UART: [kat] SHA2-256
901,885 UART: [kat] SHA2-384
904,658 UART: [kat] SHA2-512-ACC
906,559 UART: [kat] ECC-384
916,486 UART: [kat] HMAC-384Kdf
921,044 UART: [kat] LMS
1,169,356 UART: [kat] --
1,170,143 UART: [cold-reset] ++
1,170,481 UART: [fht] FHT @ 0x50003400
1,173,273 UART: [idev] ++
1,173,441 UART: [idev] CDI.KEYID = 6
1,173,802 UART: [idev] SUBJECT.KEYID = 7
1,174,227 UART: [idev] UDS.KEYID = 0
1,182,028 UART: [idev] Erasing UDS.KEYID = 0
1,199,204 UART: [idev] Sha1 KeyId Algorithm
1,208,260 UART: [idev] --
1,209,291 UART: [ldev] ++
1,209,459 UART: [ldev] CDI.KEYID = 6
1,209,823 UART: [ldev] SUBJECT.KEYID = 5
1,210,250 UART: [ldev] AUTHORITY.KEYID = 7
1,210,713 UART: [ldev] FE.KEYID = 1
1,215,743 UART: [ldev] Erasing FE.KEYID = 1
1,242,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,281,892 UART: [fwproc] Wait for Commands...
1,282,601 UART: [fwproc] Recv command 0x46574c44
1,283,334 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,945 UART: ROM Fatal Error: 0x000B0029
2,628,102 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,119 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,686 UART: [state] LifecycleState = Unprovisioned
85,341 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,042 UART: [kat] ++
895,194 UART: [kat] sha1
899,486 UART: [kat] SHA2-256
901,426 UART: [kat] SHA2-384
904,165 UART: [kat] SHA2-512-ACC
906,066 UART: [kat] ECC-384
915,775 UART: [kat] HMAC-384Kdf
920,263 UART: [kat] LMS
1,168,575 UART: [kat] --
1,169,710 UART: [cold-reset] ++
1,170,198 UART: [fht] FHT @ 0x50003400
1,172,998 UART: [idev] ++
1,173,166 UART: [idev] CDI.KEYID = 6
1,173,527 UART: [idev] SUBJECT.KEYID = 7
1,173,952 UART: [idev] UDS.KEYID = 0
1,181,841 UART: [idev] Erasing UDS.KEYID = 0
1,199,159 UART: [idev] Sha1 KeyId Algorithm
1,208,157 UART: [idev] --
1,209,202 UART: [ldev] ++
1,209,370 UART: [ldev] CDI.KEYID = 6
1,209,734 UART: [ldev] SUBJECT.KEYID = 5
1,210,161 UART: [ldev] AUTHORITY.KEYID = 7
1,210,624 UART: [ldev] FE.KEYID = 1
1,215,516 UART: [ldev] Erasing FE.KEYID = 1
1,242,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,124 UART: [ldev] --
1,281,381 UART: [fwproc] Wait for Commands...
1,282,020 UART: [fwproc] Recv command 0x46574c44
1,282,753 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,832 UART: ROM Fatal Error: 0x000B0029
2,627,989 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,680 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
899,959 UART: [kat] SHA2-256
901,899 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,770 UART: [kat] LMS
1,169,082 UART: [kat] --
1,169,893 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,173,197 UART: [idev] ++
1,173,365 UART: [idev] CDI.KEYID = 6
1,173,726 UART: [idev] SUBJECT.KEYID = 7
1,174,151 UART: [idev] UDS.KEYID = 0
1,182,206 UART: [idev] Erasing UDS.KEYID = 0
1,199,588 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,463 UART: [ldev] ++
1,209,631 UART: [ldev] CDI.KEYID = 6
1,209,995 UART: [ldev] SUBJECT.KEYID = 5
1,210,422 UART: [ldev] AUTHORITY.KEYID = 7
1,210,885 UART: [ldev] FE.KEYID = 1
1,215,967 UART: [ldev] Erasing FE.KEYID = 1
1,243,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,827 UART: [ldev] --
1,282,122 UART: [fwproc] Wait for Commands...
1,282,825 UART: [fwproc] Recv command 0x46574c44
1,283,558 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,747 UART: ROM Fatal Error: 0x000B0029
2,627,904 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,545 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,330 UART: [kat] SHA2-256
901,270 UART: [kat] SHA2-384
904,067 UART: [kat] SHA2-512-ACC
905,968 UART: [kat] ECC-384
915,755 UART: [kat] HMAC-384Kdf
920,225 UART: [kat] LMS
1,168,537 UART: [kat] --
1,169,400 UART: [cold-reset] ++
1,169,856 UART: [fht] FHT @ 0x50003400
1,172,590 UART: [idev] ++
1,172,758 UART: [idev] CDI.KEYID = 6
1,173,119 UART: [idev] SUBJECT.KEYID = 7
1,173,544 UART: [idev] UDS.KEYID = 0
1,181,723 UART: [idev] Erasing UDS.KEYID = 0
1,198,733 UART: [idev] Sha1 KeyId Algorithm
1,207,469 UART: [idev] --
1,208,742 UART: [ldev] ++
1,208,910 UART: [ldev] CDI.KEYID = 6
1,209,274 UART: [ldev] SUBJECT.KEYID = 5
1,209,701 UART: [ldev] AUTHORITY.KEYID = 7
1,210,164 UART: [ldev] FE.KEYID = 1
1,214,970 UART: [ldev] Erasing FE.KEYID = 1
1,241,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,980 UART: [ldev] --
1,280,331 UART: [fwproc] Wait for Commands...
1,281,044 UART: [fwproc] Recv command 0x46574c44
1,281,777 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,014 UART: ROM Fatal Error: 0x000B0029
2,627,171 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,485,268 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,509 UART: [kat] ++
895,661 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,764 UART: [kat] SHA2-512-ACC
906,665 UART: [kat] ECC-384
916,382 UART: [kat] HMAC-384Kdf
920,850 UART: [kat] LMS
1,169,162 UART: [kat] --
1,170,035 UART: [cold-reset] ++
1,170,393 UART: [fht] FHT @ 0x50003400
1,173,227 UART: [idev] ++
1,173,395 UART: [idev] CDI.KEYID = 6
1,173,756 UART: [idev] SUBJECT.KEYID = 7
1,174,181 UART: [idev] UDS.KEYID = 0
1,181,884 UART: [idev] Erasing UDS.KEYID = 0
1,199,238 UART: [idev] Sha1 KeyId Algorithm
1,208,112 UART: [idev] --
1,209,095 UART: [ldev] ++
1,209,263 UART: [ldev] CDI.KEYID = 6
1,209,627 UART: [ldev] SUBJECT.KEYID = 5
1,210,054 UART: [ldev] AUTHORITY.KEYID = 7
1,210,517 UART: [ldev] FE.KEYID = 1
1,215,887 UART: [ldev] Erasing FE.KEYID = 1
1,242,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,867 UART: [ldev] --
1,281,250 UART: [fwproc] Wait for Commands...
1,281,871 UART: [fwproc] Recv command 0x46574c44
1,282,604 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,337 UART: ROM Fatal Error: 0x000B0029
2,626,494 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,033 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
2,035,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,185,630 UART:
2,186,022 UART: Running Caliptra ROM ...
2,187,194 UART:
2,187,378 UART: [state] CFI Enabled
2,188,346 UART: [state] LifecycleState = Unprovisioned
2,190,008 UART: [state] DebugLocked = No
2,191,128 UART: [state] WD Timer not started. Device not locked for debugging
2,193,609 UART: [kat] SHA2-256
2,194,313 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,197,337 UART: [kat] ++
2,197,797 UART: [kat] sha1
2,198,317 UART: [kat] SHA2-256
2,198,985 UART: [kat] SHA2-384
2,199,651 UART: [kat] SHA2-512-ACC
2,200,623 UART: [kat] ECC-384
2,948,122 UART: [kat] HMAC-384Kdf
2,972,470 UART: [kat] LMS
3,448,968 UART: [kat] --
3,453,285 UART: [cold-reset] ++
3,454,303 UART: [fht] FHT @ 0x50003400
3,465,397 UART: [idev] ++
3,465,973 UART: [idev] CDI.KEYID = 6
3,466,900 UART: [idev] SUBJECT.KEYID = 7
3,468,118 UART: [idev] UDS.KEYID = 0
3,501,729 UART: [idev] Erasing UDS.KEYID = 0
5,990,287 UART: [idev] Sha1 KeyId Algorithm
6,013,688 UART: [idev] --
6,018,449 UART: [ldev] ++
6,019,027 UART: [ldev] CDI.KEYID = 6
6,020,056 UART: [ldev] SUBJECT.KEYID = 5
6,021,166 UART: [ldev] AUTHORITY.KEYID = 7
6,022,404 UART: [ldev] FE.KEYID = 1
6,058,835 UART: [ldev] Erasing FE.KEYID = 1
8,561,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,896 UART: [ldev] --
10,376,154 UART: [fwproc] Wait for Commands...
10,378,876 UART: [fwproc] Recv command 0x46574c44
10,380,876 UART: [fwproc] Recv'd Img size: 118548 bytes
13,855,850 UART: ROM Fatal Error: 0x000B0028
13,859,108 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
2,033,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,744,082 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
2,035,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,185,197 UART:
2,185,582 UART: Running Caliptra ROM ...
2,186,659 UART:
2,186,811 UART: [state] CFI Enabled
2,187,782 UART: [state] LifecycleState = Unprovisioned
2,189,351 UART: [state] DebugLocked = No
2,190,477 UART: [state] WD Timer not started. Device not locked for debugging
2,192,951 UART: [kat] SHA2-256
2,193,613 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,196,643 UART: [kat] ++
2,197,091 UART: [kat] sha1
2,197,598 UART: [kat] SHA2-256
2,198,252 UART: [kat] SHA2-384
2,198,910 UART: [kat] SHA2-512-ACC
2,199,789 UART: [kat] ECC-384
3,282,047 UART: [kat] HMAC-384Kdf
3,295,031 UART: [kat] LMS
3,771,350 UART: [kat] --
3,775,876 UART: [cold-reset] ++
3,776,968 UART: [fht] FHT @ 0x50003400
3,788,355 UART: [idev] ++
3,788,920 UART: [idev] CDI.KEYID = 6
3,789,851 UART: [idev] SUBJECT.KEYID = 7
3,791,115 UART: [idev] UDS.KEYID = 0
3,809,219 UART: [idev] Erasing UDS.KEYID = 0
6,271,385 UART: [idev] Sha1 KeyId Algorithm
6,295,389 UART: [idev] --
6,301,816 UART: [ldev] ++
6,302,386 UART: [ldev] CDI.KEYID = 6
6,303,267 UART: [ldev] SUBJECT.KEYID = 5
6,304,475 UART: [ldev] AUTHORITY.KEYID = 7
6,305,761 UART: [ldev] FE.KEYID = 1
6,315,732 UART: [ldev] Erasing FE.KEYID = 1
8,794,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,136 UART: [ldev] --
10,586,326 UART: [fwproc] Wait for Commands...
10,589,395 UART: [fwproc] Recv command 0x46574c44
10,591,402 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,984 UART: ROM Fatal Error: 0x000B0028
14,081,229 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
2,035,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,985,436 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,294 UART: [kat] ++
895,446 UART: [kat] sha1
899,492 UART: [kat] SHA2-256
901,432 UART: [kat] SHA2-384
904,065 UART: [kat] SHA2-512-ACC
905,966 UART: [kat] ECC-384
915,835 UART: [kat] HMAC-384Kdf
920,497 UART: [kat] LMS
1,168,809 UART: [kat] --
1,169,910 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,173,192 UART: [idev] ++
1,173,360 UART: [idev] CDI.KEYID = 6
1,173,721 UART: [idev] SUBJECT.KEYID = 7
1,174,146 UART: [idev] UDS.KEYID = 0
1,182,021 UART: [idev] Erasing UDS.KEYID = 0
1,199,347 UART: [idev] Sha1 KeyId Algorithm
1,208,041 UART: [idev] --
1,208,968 UART: [ldev] ++
1,209,136 UART: [ldev] CDI.KEYID = 6
1,209,500 UART: [ldev] SUBJECT.KEYID = 5
1,209,927 UART: [ldev] AUTHORITY.KEYID = 7
1,210,390 UART: [ldev] FE.KEYID = 1
1,215,738 UART: [ldev] Erasing FE.KEYID = 1
1,241,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,876 UART: [ldev] --
1,281,193 UART: [fwproc] Wait for Commands...
1,281,960 UART: [fwproc] Recv command 0x46574c44
1,282,693 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,310 UART: ROM Fatal Error: 0x000B0028
2,627,467 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,766 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
900,113 UART: [kat] SHA2-256
902,053 UART: [kat] SHA2-384
904,856 UART: [kat] SHA2-512-ACC
906,757 UART: [kat] ECC-384
916,654 UART: [kat] HMAC-384Kdf
921,398 UART: [kat] LMS
1,169,710 UART: [kat] --
1,170,425 UART: [cold-reset] ++
1,170,769 UART: [fht] FHT @ 0x50003400
1,173,539 UART: [idev] ++
1,173,707 UART: [idev] CDI.KEYID = 6
1,174,068 UART: [idev] SUBJECT.KEYID = 7
1,174,493 UART: [idev] UDS.KEYID = 0
1,182,314 UART: [idev] Erasing UDS.KEYID = 0
1,199,784 UART: [idev] Sha1 KeyId Algorithm
1,208,700 UART: [idev] --
1,209,749 UART: [ldev] ++
1,209,917 UART: [ldev] CDI.KEYID = 6
1,210,281 UART: [ldev] SUBJECT.KEYID = 5
1,210,708 UART: [ldev] AUTHORITY.KEYID = 7
1,211,171 UART: [ldev] FE.KEYID = 1
1,216,517 UART: [ldev] Erasing FE.KEYID = 1
1,243,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,845 UART: [ldev] --
1,282,200 UART: [fwproc] Wait for Commands...
1,282,911 UART: [fwproc] Recv command 0x46574c44
1,283,644 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,515 UART: ROM Fatal Error: 0x000B0028
2,627,672 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,593 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,410 UART: [kat] ++
895,562 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,471 UART: [kat] SHA2-512-ACC
906,372 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,635 UART: [kat] LMS
1,168,947 UART: [kat] --
1,169,664 UART: [cold-reset] ++
1,170,100 UART: [fht] FHT @ 0x50003400
1,172,724 UART: [idev] ++
1,172,892 UART: [idev] CDI.KEYID = 6
1,173,253 UART: [idev] SUBJECT.KEYID = 7
1,173,678 UART: [idev] UDS.KEYID = 0
1,182,055 UART: [idev] Erasing UDS.KEYID = 0
1,199,123 UART: [idev] Sha1 KeyId Algorithm
1,208,079 UART: [idev] --
1,209,138 UART: [ldev] ++
1,209,306 UART: [ldev] CDI.KEYID = 6
1,209,670 UART: [ldev] SUBJECT.KEYID = 5
1,210,097 UART: [ldev] AUTHORITY.KEYID = 7
1,210,560 UART: [ldev] FE.KEYID = 1
1,215,828 UART: [ldev] Erasing FE.KEYID = 1
1,242,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,280 UART: [ldev] --
1,281,603 UART: [fwproc] Wait for Commands...
1,282,178 UART: [fwproc] Recv command 0x46574c44
1,282,911 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,208 UART: ROM Fatal Error: 0x000B0028
2,627,365 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,412 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,763 UART: [kat] ++
895,915 UART: [kat] sha1
900,181 UART: [kat] SHA2-256
902,121 UART: [kat] SHA2-384
904,784 UART: [kat] SHA2-512-ACC
906,685 UART: [kat] ECC-384
916,382 UART: [kat] HMAC-384Kdf
921,124 UART: [kat] LMS
1,169,436 UART: [kat] --
1,170,283 UART: [cold-reset] ++
1,170,631 UART: [fht] FHT @ 0x50003400
1,173,461 UART: [idev] ++
1,173,629 UART: [idev] CDI.KEYID = 6
1,173,990 UART: [idev] SUBJECT.KEYID = 7
1,174,415 UART: [idev] UDS.KEYID = 0
1,182,030 UART: [idev] Erasing UDS.KEYID = 0
1,199,248 UART: [idev] Sha1 KeyId Algorithm
1,208,138 UART: [idev] --
1,209,125 UART: [ldev] ++
1,209,293 UART: [ldev] CDI.KEYID = 6
1,209,657 UART: [ldev] SUBJECT.KEYID = 5
1,210,084 UART: [ldev] AUTHORITY.KEYID = 7
1,210,547 UART: [ldev] FE.KEYID = 1
1,215,943 UART: [ldev] Erasing FE.KEYID = 1
1,241,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,689 UART: [ldev] --
1,280,910 UART: [fwproc] Wait for Commands...
1,281,725 UART: [fwproc] Recv command 0x46574c44
1,282,458 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,384 UART: ROM Fatal Error: 0x000B0028
2,626,541 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,733 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,230 UART: [kat] ++
895,382 UART: [kat] sha1
899,550 UART: [kat] SHA2-256
901,490 UART: [kat] SHA2-384
904,275 UART: [kat] SHA2-512-ACC
906,176 UART: [kat] ECC-384
915,205 UART: [kat] HMAC-384Kdf
919,607 UART: [kat] LMS
1,167,919 UART: [kat] --
1,168,830 UART: [cold-reset] ++
1,169,226 UART: [fht] FHT @ 0x50003400
1,171,972 UART: [idev] ++
1,172,140 UART: [idev] CDI.KEYID = 6
1,172,501 UART: [idev] SUBJECT.KEYID = 7
1,172,926 UART: [idev] UDS.KEYID = 0
1,181,189 UART: [idev] Erasing UDS.KEYID = 0
1,198,193 UART: [idev] Sha1 KeyId Algorithm
1,207,023 UART: [idev] --
1,207,916 UART: [ldev] ++
1,208,084 UART: [ldev] CDI.KEYID = 6
1,208,448 UART: [ldev] SUBJECT.KEYID = 5
1,208,875 UART: [ldev] AUTHORITY.KEYID = 7
1,209,338 UART: [ldev] FE.KEYID = 1
1,214,790 UART: [ldev] Erasing FE.KEYID = 1
1,240,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,474 UART: [ldev] --
1,279,913 UART: [fwproc] Wait for Commands...
1,280,590 UART: [fwproc] Recv command 0x46574c44
1,281,323 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,732 UART: ROM Fatal Error: 0x000B0028
2,625,889 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,250 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,797 UART: [kat] ++
895,949 UART: [kat] sha1
900,181 UART: [kat] SHA2-256
902,121 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
916,576 UART: [kat] HMAC-384Kdf
921,136 UART: [kat] LMS
1,169,448 UART: [kat] --
1,170,315 UART: [cold-reset] ++
1,170,819 UART: [fht] FHT @ 0x50003400
1,173,539 UART: [idev] ++
1,173,707 UART: [idev] CDI.KEYID = 6
1,174,068 UART: [idev] SUBJECT.KEYID = 7
1,174,493 UART: [idev] UDS.KEYID = 0
1,182,574 UART: [idev] Erasing UDS.KEYID = 0
1,199,896 UART: [idev] Sha1 KeyId Algorithm
1,208,884 UART: [idev] --
1,209,717 UART: [ldev] ++
1,209,885 UART: [ldev] CDI.KEYID = 6
1,210,249 UART: [ldev] SUBJECT.KEYID = 5
1,210,676 UART: [ldev] AUTHORITY.KEYID = 7
1,211,139 UART: [ldev] FE.KEYID = 1
1,216,595 UART: [ldev] Erasing FE.KEYID = 1
1,242,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,621 UART: [ldev] --
1,281,990 UART: [fwproc] Wait for Commands...
1,282,629 UART: [fwproc] Recv command 0x46574c44
1,283,362 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,093 UART: ROM Fatal Error: 0x000B0028
2,628,250 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,221 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
5,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,067 UART:
192,467 UART: Running Caliptra ROM ...
193,623 UART:
193,776 UART: [state] CFI Enabled
263,901 UART: [state] LifecycleState = Manufacturing
265,844 UART: [state] DebugLocked = No
267,661 UART: [state] WD Timer not started. Device not locked for debugging
272,357 UART: [kat] SHA2-256
452,046 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,796 UART: [kat] ++
463,329 UART: [kat] sha1
475,079 UART: [kat] SHA2-256
477,784 UART: [kat] SHA2-384
482,913 UART: [kat] SHA2-512-ACC
485,308 UART: [kat] ECC-384
2,929,386 UART: [kat] HMAC-384Kdf
2,951,994 UART: [kat] LMS
3,428,458 UART: [kat] --
3,433,104 UART: [cold-reset] ++
3,434,551 UART: [fht] FHT @ 0x50003400
3,447,051 UART: [idev] ++
3,447,630 UART: [idev] CDI.KEYID = 6
3,448,545 UART: [idev] SUBJECT.KEYID = 7
3,449,820 UART: [idev] UDS.KEYID = 0
3,481,415 UART: [idev] Erasing UDS.KEYID = 0
5,964,234 UART: [idev] Sha1 KeyId Algorithm
5,988,308 UART: [idev] --
5,994,336 UART: [ldev] ++
5,994,914 UART: [ldev] CDI.KEYID = 6
5,995,831 UART: [ldev] SUBJECT.KEYID = 5
5,997,050 UART: [ldev] AUTHORITY.KEYID = 7
5,998,310 UART: [ldev] FE.KEYID = 1
6,037,271 UART: [ldev] Erasing FE.KEYID = 1
8,543,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,489 UART: [ldev] --
10,352,980 UART: [fwproc] Wait for Commands...
10,355,945 UART: [fwproc] Recv command 0x46574c44
10,357,940 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,430 UART: ROM Fatal Error: 0x000B002C
13,871,735 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
5,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,781,575 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
6,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,312 UART:
192,971 UART: Running Caliptra ROM ...
194,065 UART:
603,614 UART: [state] CFI Enabled
619,022 UART: [state] LifecycleState = Manufacturing
620,921 UART: [state] DebugLocked = No
622,541 UART: [state] WD Timer not started. Device not locked for debugging
626,949 UART: [kat] SHA2-256
806,588 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,405 UART: [kat] ++
817,855 UART: [kat] sha1
827,970 UART: [kat] SHA2-256
830,646 UART: [kat] SHA2-384
837,869 UART: [kat] SHA2-512-ACC
840,241 UART: [kat] ECC-384
3,283,018 UART: [kat] HMAC-384Kdf
3,294,458 UART: [kat] LMS
3,770,945 UART: [kat] --
3,775,264 UART: [cold-reset] ++
3,777,322 UART: [fht] FHT @ 0x50003400
3,789,110 UART: [idev] ++
3,789,678 UART: [idev] CDI.KEYID = 6
3,790,650 UART: [idev] SUBJECT.KEYID = 7
3,791,866 UART: [idev] UDS.KEYID = 0
3,807,089 UART: [idev] Erasing UDS.KEYID = 0
6,266,034 UART: [idev] Sha1 KeyId Algorithm
6,289,148 UART: [idev] --
6,294,471 UART: [ldev] ++
6,295,048 UART: [ldev] CDI.KEYID = 6
6,295,958 UART: [ldev] SUBJECT.KEYID = 5
6,297,172 UART: [ldev] AUTHORITY.KEYID = 7
6,298,403 UART: [ldev] FE.KEYID = 1
6,309,347 UART: [ldev] Erasing FE.KEYID = 1
8,786,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,991 UART: [ldev] --
10,583,145 UART: [fwproc] Wait for Commands...
10,585,894 UART: [fwproc] Recv command 0x46574c44
10,587,934 UART: [fwproc] Recv'd Img size: 118548 bytes
14,097,491 UART: ROM Fatal Error: 0x000B002C
14,100,734 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
6,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,019,490 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Manufacturing
85,657 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
890,994 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,098 UART: [kat] ++
895,250 UART: [kat] sha1
899,322 UART: [kat] SHA2-256
901,262 UART: [kat] SHA2-384
904,119 UART: [kat] SHA2-512-ACC
906,020 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,857 UART: [kat] LMS
1,169,169 UART: [kat] --
1,169,950 UART: [cold-reset] ++
1,170,294 UART: [fht] FHT @ 0x50003400
1,172,766 UART: [idev] ++
1,172,934 UART: [idev] CDI.KEYID = 6
1,173,295 UART: [idev] SUBJECT.KEYID = 7
1,173,720 UART: [idev] UDS.KEYID = 0
1,181,175 UART: [idev] Erasing UDS.KEYID = 0
1,197,223 UART: [idev] Sha1 KeyId Algorithm
1,206,131 UART: [idev] --
1,207,210 UART: [ldev] ++
1,207,378 UART: [ldev] CDI.KEYID = 6
1,207,742 UART: [ldev] SUBJECT.KEYID = 5
1,208,169 UART: [ldev] AUTHORITY.KEYID = 7
1,208,632 UART: [ldev] FE.KEYID = 1
1,213,694 UART: [ldev] Erasing FE.KEYID = 1
1,239,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,758 UART: [ldev] --
1,279,203 UART: [fwproc] Wait for Commands...
1,279,810 UART: [fwproc] Recv command 0x46574c44
1,280,543 UART: [fwproc] Recv'd Img size: 118548 bytes
2,648,695 UART: ROM Fatal Error: 0x000B002C
2,649,854 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,505,705 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Manufacturing
86,308 UART: [state] DebugLocked = No
87,010 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,783 UART: [kat] ++
895,935 UART: [kat] sha1
900,171 UART: [kat] SHA2-256
902,111 UART: [kat] SHA2-384
904,716 UART: [kat] SHA2-512-ACC
906,617 UART: [kat] ECC-384
916,492 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,170,395 UART: [cold-reset] ++
1,170,801 UART: [fht] FHT @ 0x50003400
1,173,297 UART: [idev] ++
1,173,465 UART: [idev] CDI.KEYID = 6
1,173,826 UART: [idev] SUBJECT.KEYID = 7
1,174,251 UART: [idev] UDS.KEYID = 0
1,182,458 UART: [idev] Erasing UDS.KEYID = 0
1,199,234 UART: [idev] Sha1 KeyId Algorithm
1,208,196 UART: [idev] --
1,209,055 UART: [ldev] ++
1,209,223 UART: [ldev] CDI.KEYID = 6
1,209,587 UART: [ldev] SUBJECT.KEYID = 5
1,210,014 UART: [ldev] AUTHORITY.KEYID = 7
1,210,477 UART: [ldev] FE.KEYID = 1
1,215,563 UART: [ldev] Erasing FE.KEYID = 1
1,241,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,741 UART: [ldev] --
1,281,144 UART: [fwproc] Wait for Commands...
1,281,833 UART: [fwproc] Recv command 0x46574c44
1,282,566 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,912 UART: ROM Fatal Error: 0x000B002C
2,652,071 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,506,996 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Manufacturing
85,979 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,324 UART: [kat] ++
895,476 UART: [kat] sha1
899,542 UART: [kat] SHA2-256
901,482 UART: [kat] SHA2-384
904,167 UART: [kat] SHA2-512-ACC
906,068 UART: [kat] ECC-384
915,763 UART: [kat] HMAC-384Kdf
920,155 UART: [kat] LMS
1,168,467 UART: [kat] --
1,169,460 UART: [cold-reset] ++
1,170,028 UART: [fht] FHT @ 0x50003400
1,172,742 UART: [idev] ++
1,172,910 UART: [idev] CDI.KEYID = 6
1,173,271 UART: [idev] SUBJECT.KEYID = 7
1,173,696 UART: [idev] UDS.KEYID = 0
1,181,513 UART: [idev] Erasing UDS.KEYID = 0
1,198,921 UART: [idev] Sha1 KeyId Algorithm
1,207,817 UART: [idev] --
1,208,842 UART: [ldev] ++
1,209,010 UART: [ldev] CDI.KEYID = 6
1,209,374 UART: [ldev] SUBJECT.KEYID = 5
1,209,801 UART: [ldev] AUTHORITY.KEYID = 7
1,210,264 UART: [ldev] FE.KEYID = 1
1,215,358 UART: [ldev] Erasing FE.KEYID = 1
1,241,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,082 UART: [ldev] --
1,280,481 UART: [fwproc] Wait for Commands...
1,281,226 UART: [fwproc] Recv command 0x46574c44
1,281,959 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,779 UART: ROM Fatal Error: 0x000B002C
2,651,938 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,313 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Manufacturing
85,952 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [kat] SHA2-256
891,147 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,251 UART: [kat] ++
895,403 UART: [kat] sha1
899,407 UART: [kat] SHA2-256
901,347 UART: [kat] SHA2-384
903,876 UART: [kat] SHA2-512-ACC
905,777 UART: [kat] ECC-384
915,144 UART: [kat] HMAC-384Kdf
919,682 UART: [kat] LMS
1,167,994 UART: [kat] --
1,168,725 UART: [cold-reset] ++
1,169,175 UART: [fht] FHT @ 0x50003400
1,171,855 UART: [idev] ++
1,172,023 UART: [idev] CDI.KEYID = 6
1,172,384 UART: [idev] SUBJECT.KEYID = 7
1,172,809 UART: [idev] UDS.KEYID = 0
1,180,660 UART: [idev] Erasing UDS.KEYID = 0
1,197,792 UART: [idev] Sha1 KeyId Algorithm
1,206,636 UART: [idev] --
1,207,589 UART: [ldev] ++
1,207,757 UART: [ldev] CDI.KEYID = 6
1,208,121 UART: [ldev] SUBJECT.KEYID = 5
1,208,548 UART: [ldev] AUTHORITY.KEYID = 7
1,209,011 UART: [ldev] FE.KEYID = 1
1,214,559 UART: [ldev] Erasing FE.KEYID = 1
1,241,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,407 UART: [ldev] --
1,280,632 UART: [fwproc] Wait for Commands...
1,281,433 UART: [fwproc] Recv command 0x46574c44
1,282,166 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,474 UART: ROM Fatal Error: 0x000B002C
2,651,633 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,506,986 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Manufacturing
85,421 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,254 UART: [kat] SHA2-256
890,804 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,908 UART: [kat] ++
895,060 UART: [kat] sha1
899,372 UART: [kat] SHA2-256
901,312 UART: [kat] SHA2-384
904,121 UART: [kat] SHA2-512-ACC
906,022 UART: [kat] ECC-384
915,809 UART: [kat] HMAC-384Kdf
920,339 UART: [kat] LMS
1,168,651 UART: [kat] --
1,169,342 UART: [cold-reset] ++
1,169,878 UART: [fht] FHT @ 0x50003400
1,172,582 UART: [idev] ++
1,172,750 UART: [idev] CDI.KEYID = 6
1,173,111 UART: [idev] SUBJECT.KEYID = 7
1,173,536 UART: [idev] UDS.KEYID = 0
1,181,337 UART: [idev] Erasing UDS.KEYID = 0
1,198,235 UART: [idev] Sha1 KeyId Algorithm
1,207,057 UART: [idev] --
1,207,946 UART: [ldev] ++
1,208,114 UART: [ldev] CDI.KEYID = 6
1,208,478 UART: [ldev] SUBJECT.KEYID = 5
1,208,905 UART: [ldev] AUTHORITY.KEYID = 7
1,209,368 UART: [ldev] FE.KEYID = 1
1,214,614 UART: [ldev] Erasing FE.KEYID = 1
1,240,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,674 UART: [ldev] --
1,279,877 UART: [fwproc] Wait for Commands...
1,280,538 UART: [fwproc] Recv command 0x46574c44
1,281,271 UART: [fwproc] Recv'd Img size: 118548 bytes
2,649,387 UART: ROM Fatal Error: 0x000B002C
2,650,546 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,506,487 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Manufacturing
85,854 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,376 UART: [kat] SHA2-512-ACC
906,277 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,417 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,181,798 UART: [idev] Erasing UDS.KEYID = 0
1,199,598 UART: [idev] Sha1 KeyId Algorithm
1,208,408 UART: [idev] --
1,209,379 UART: [ldev] ++
1,209,547 UART: [ldev] CDI.KEYID = 6
1,209,911 UART: [ldev] SUBJECT.KEYID = 5
1,210,338 UART: [ldev] AUTHORITY.KEYID = 7
1,210,801 UART: [ldev] FE.KEYID = 1
1,215,837 UART: [ldev] Erasing FE.KEYID = 1
1,242,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,383 UART: [ldev] --
1,281,608 UART: [fwproc] Wait for Commands...
1,282,367 UART: [fwproc] Recv command 0x46574c44
1,283,100 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,310 UART: ROM Fatal Error: 0x000B002C
2,653,469 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,392 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
5,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,137 UART:
192,565 UART: Running Caliptra ROM ...
193,671 UART:
193,820 UART: [state] CFI Enabled
264,162 UART: [state] LifecycleState = Manufacturing
266,090 UART: [state] DebugLocked = No
268,910 UART: [state] WD Timer not started. Device not locked for debugging
273,073 UART: [kat] SHA2-256
452,701 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,501 UART: [kat] ++
464,040 UART: [kat] sha1
474,353 UART: [kat] SHA2-256
477,092 UART: [kat] SHA2-384
483,183 UART: [kat] SHA2-512-ACC
485,578 UART: [kat] ECC-384
2,947,461 UART: [kat] HMAC-384Kdf
2,971,152 UART: [kat] LMS
3,447,656 UART: [kat] --
3,450,091 UART: [cold-reset] ++
3,451,058 UART: [fht] FHT @ 0x50003400
3,461,614 UART: [idev] ++
3,462,383 UART: [idev] CDI.KEYID = 6
3,463,313 UART: [idev] SUBJECT.KEYID = 7
3,464,421 UART: [idev] UDS.KEYID = 0
3,480,513 UART: [idev] Erasing UDS.KEYID = 0
5,966,178 UART: [idev] Sha1 KeyId Algorithm
5,991,407 UART: [idev] --
5,996,340 UART: [ldev] ++
5,996,911 UART: [ldev] CDI.KEYID = 6
5,997,795 UART: [ldev] SUBJECT.KEYID = 5
5,999,061 UART: [ldev] AUTHORITY.KEYID = 7
6,000,297 UART: [ldev] FE.KEYID = 1
6,035,214 UART: [ldev] Erasing FE.KEYID = 1
8,541,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,730 UART: [ldev] --
10,351,249 UART: [fwproc] Wait for Commands...
10,354,438 UART: [fwproc] Recv command 0x46574c44
10,356,428 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,843 UART: ROM Fatal Error: 0x000B002E
13,869,102 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
5,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,775,745 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
6,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,476 UART:
192,909 UART: Running Caliptra ROM ...
194,032 UART:
603,737 UART: [state] CFI Enabled
618,843 UART: [state] LifecycleState = Manufacturing
620,807 UART: [state] DebugLocked = No
623,367 UART: [state] WD Timer not started. Device not locked for debugging
628,057 UART: [kat] SHA2-256
807,741 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,492 UART: [kat] ++
819,077 UART: [kat] sha1
830,776 UART: [kat] SHA2-256
833,488 UART: [kat] SHA2-384
838,875 UART: [kat] SHA2-512-ACC
841,272 UART: [kat] ECC-384
3,282,235 UART: [kat] HMAC-384Kdf
3,294,796 UART: [kat] LMS
3,771,279 UART: [kat] --
3,776,026 UART: [cold-reset] ++
3,778,232 UART: [fht] FHT @ 0x50003400
3,789,691 UART: [idev] ++
3,790,293 UART: [idev] CDI.KEYID = 6
3,791,210 UART: [idev] SUBJECT.KEYID = 7
3,792,421 UART: [idev] UDS.KEYID = 0
3,808,554 UART: [idev] Erasing UDS.KEYID = 0
6,270,279 UART: [idev] Sha1 KeyId Algorithm
6,294,492 UART: [idev] --
6,298,049 UART: [ldev] ++
6,298,672 UART: [ldev] CDI.KEYID = 6
6,299,578 UART: [ldev] SUBJECT.KEYID = 5
6,300,787 UART: [ldev] AUTHORITY.KEYID = 7
6,302,035 UART: [ldev] FE.KEYID = 1
6,312,736 UART: [ldev] Erasing FE.KEYID = 1
8,793,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,309 UART: [ldev] --
10,589,236 UART: [fwproc] Wait for Commands...
10,592,313 UART: [fwproc] Recv command 0x46574c44
10,594,357 UART: [fwproc] Recv'd Img size: 118548 bytes
14,105,934 UART: ROM Fatal Error: 0x000B002E
14,109,233 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
6,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,002,998 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Manufacturing
85,833 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
891,372 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
916,049 UART: [kat] HMAC-384Kdf
920,589 UART: [kat] LMS
1,168,901 UART: [kat] --
1,169,844 UART: [cold-reset] ++
1,170,406 UART: [fht] FHT @ 0x50003400
1,173,048 UART: [idev] ++
1,173,216 UART: [idev] CDI.KEYID = 6
1,173,577 UART: [idev] SUBJECT.KEYID = 7
1,174,002 UART: [idev] UDS.KEYID = 0
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,637 UART: [idev] Sha1 KeyId Algorithm
1,207,649 UART: [idev] --
1,208,680 UART: [ldev] ++
1,208,848 UART: [ldev] CDI.KEYID = 6
1,209,212 UART: [ldev] SUBJECT.KEYID = 5
1,209,639 UART: [ldev] AUTHORITY.KEYID = 7
1,210,102 UART: [ldev] FE.KEYID = 1
1,215,018 UART: [ldev] Erasing FE.KEYID = 1
1,241,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,976 UART: [ldev] --
1,280,383 UART: [fwproc] Wait for Commands...
1,281,150 UART: [fwproc] Recv command 0x46574c44
1,281,883 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,321 UART: ROM Fatal Error: 0x000B002E
2,652,480 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,505,399 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Manufacturing
86,074 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,733 UART: [kat] ++
895,885 UART: [kat] sha1
900,167 UART: [kat] SHA2-256
902,107 UART: [kat] SHA2-384
904,936 UART: [kat] SHA2-512-ACC
906,837 UART: [kat] ECC-384
916,296 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,121 UART: [cold-reset] ++
1,170,687 UART: [fht] FHT @ 0x50003400
1,173,415 UART: [idev] ++
1,173,583 UART: [idev] CDI.KEYID = 6
1,173,944 UART: [idev] SUBJECT.KEYID = 7
1,174,369 UART: [idev] UDS.KEYID = 0
1,182,182 UART: [idev] Erasing UDS.KEYID = 0
1,199,170 UART: [idev] Sha1 KeyId Algorithm
1,208,116 UART: [idev] --
1,209,257 UART: [ldev] ++
1,209,425 UART: [ldev] CDI.KEYID = 6
1,209,789 UART: [ldev] SUBJECT.KEYID = 5
1,210,216 UART: [ldev] AUTHORITY.KEYID = 7
1,210,679 UART: [ldev] FE.KEYID = 1
1,215,923 UART: [ldev] Erasing FE.KEYID = 1
1,242,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,105 UART: [ldev] --
1,281,332 UART: [fwproc] Wait for Commands...
1,282,113 UART: [fwproc] Recv command 0x46574c44
1,282,846 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,892 UART: ROM Fatal Error: 0x000B002E
2,653,051 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,278 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Manufacturing
85,959 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
891,494 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
900,096 UART: [kat] SHA2-256
902,036 UART: [kat] SHA2-384
904,871 UART: [kat] SHA2-512-ACC
906,772 UART: [kat] ECC-384
916,381 UART: [kat] HMAC-384Kdf
920,955 UART: [kat] LMS
1,169,267 UART: [kat] --
1,170,216 UART: [cold-reset] ++
1,170,600 UART: [fht] FHT @ 0x50003400
1,173,230 UART: [idev] ++
1,173,398 UART: [idev] CDI.KEYID = 6
1,173,759 UART: [idev] SUBJECT.KEYID = 7
1,174,184 UART: [idev] UDS.KEYID = 0
1,182,403 UART: [idev] Erasing UDS.KEYID = 0
1,198,925 UART: [idev] Sha1 KeyId Algorithm
1,207,659 UART: [idev] --
1,208,686 UART: [ldev] ++
1,208,854 UART: [ldev] CDI.KEYID = 6
1,209,218 UART: [ldev] SUBJECT.KEYID = 5
1,209,645 UART: [ldev] AUTHORITY.KEYID = 7
1,210,108 UART: [ldev] FE.KEYID = 1
1,215,224 UART: [ldev] Erasing FE.KEYID = 1
1,241,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,642 UART: [ldev] --
1,280,001 UART: [fwproc] Wait for Commands...
1,280,666 UART: [fwproc] Recv command 0x46574c44
1,281,399 UART: [fwproc] Recv'd Img size: 118548 bytes
2,649,585 UART: ROM Fatal Error: 0x000B002E
2,650,744 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,506,287 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Manufacturing
86,110 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
900,141 UART: [kat] SHA2-256
902,081 UART: [kat] SHA2-384
904,974 UART: [kat] SHA2-512-ACC
906,875 UART: [kat] ECC-384
916,756 UART: [kat] HMAC-384Kdf
921,412 UART: [kat] LMS
1,169,724 UART: [kat] --
1,170,607 UART: [cold-reset] ++
1,170,935 UART: [fht] FHT @ 0x50003400
1,173,685 UART: [idev] ++
1,173,853 UART: [idev] CDI.KEYID = 6
1,174,214 UART: [idev] SUBJECT.KEYID = 7
1,174,639 UART: [idev] UDS.KEYID = 0
1,182,850 UART: [idev] Erasing UDS.KEYID = 0
1,200,020 UART: [idev] Sha1 KeyId Algorithm
1,208,954 UART: [idev] --
1,210,017 UART: [ldev] ++
1,210,185 UART: [ldev] CDI.KEYID = 6
1,210,549 UART: [ldev] SUBJECT.KEYID = 5
1,210,976 UART: [ldev] AUTHORITY.KEYID = 7
1,211,439 UART: [ldev] FE.KEYID = 1
1,216,553 UART: [ldev] Erasing FE.KEYID = 1
1,243,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,403 UART: [ldev] --
1,282,730 UART: [fwproc] Wait for Commands...
1,283,331 UART: [fwproc] Recv command 0x46574c44
1,284,064 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,116 UART: ROM Fatal Error: 0x000B002E
2,653,275 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,490 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Manufacturing
85,765 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,102 UART: [kat] ++
895,254 UART: [kat] sha1
899,672 UART: [kat] SHA2-256
901,612 UART: [kat] SHA2-384
904,329 UART: [kat] SHA2-512-ACC
906,230 UART: [kat] ECC-384
915,663 UART: [kat] HMAC-384Kdf
920,043 UART: [kat] LMS
1,168,355 UART: [kat] --
1,169,508 UART: [cold-reset] ++
1,170,064 UART: [fht] FHT @ 0x50003400
1,172,732 UART: [idev] ++
1,172,900 UART: [idev] CDI.KEYID = 6
1,173,261 UART: [idev] SUBJECT.KEYID = 7
1,173,686 UART: [idev] UDS.KEYID = 0
1,181,541 UART: [idev] Erasing UDS.KEYID = 0
1,198,389 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,578 UART: [ldev] ++
1,208,746 UART: [ldev] CDI.KEYID = 6
1,209,110 UART: [ldev] SUBJECT.KEYID = 5
1,209,537 UART: [ldev] AUTHORITY.KEYID = 7
1,210,000 UART: [ldev] FE.KEYID = 1
1,215,530 UART: [ldev] Erasing FE.KEYID = 1
1,241,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,214 UART: [ldev] --
1,281,637 UART: [fwproc] Wait for Commands...
1,282,416 UART: [fwproc] Recv command 0x46574c44
1,283,149 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,677 UART: ROM Fatal Error: 0x000B002E
2,651,836 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,506,639 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Manufacturing
86,214 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
891,601 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,705 UART: [kat] ++
895,857 UART: [kat] sha1
900,053 UART: [kat] SHA2-256
901,993 UART: [kat] SHA2-384
904,694 UART: [kat] SHA2-512-ACC
906,595 UART: [kat] ECC-384
916,454 UART: [kat] HMAC-384Kdf
921,070 UART: [kat] LMS
1,169,382 UART: [kat] --
1,170,193 UART: [cold-reset] ++
1,170,645 UART: [fht] FHT @ 0x50003400
1,173,271 UART: [idev] ++
1,173,439 UART: [idev] CDI.KEYID = 6
1,173,800 UART: [idev] SUBJECT.KEYID = 7
1,174,225 UART: [idev] UDS.KEYID = 0
1,182,452 UART: [idev] Erasing UDS.KEYID = 0
1,199,614 UART: [idev] Sha1 KeyId Algorithm
1,208,388 UART: [idev] --
1,209,367 UART: [ldev] ++
1,209,535 UART: [ldev] CDI.KEYID = 6
1,209,899 UART: [ldev] SUBJECT.KEYID = 5
1,210,326 UART: [ldev] AUTHORITY.KEYID = 7
1,210,789 UART: [ldev] FE.KEYID = 1
1,216,217 UART: [ldev] Erasing FE.KEYID = 1
1,242,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,133 UART: [ldev] --
1,281,496 UART: [fwproc] Wait for Commands...
1,282,141 UART: [fwproc] Recv command 0x46574c44
1,282,874 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,202 UART: ROM Fatal Error: 0x000B002E
2,652,361 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,509,066 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
2,026,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,176,182 UART:
2,176,575 UART: Running Caliptra ROM ...
2,177,749 UART:
2,177,951 UART: [state] CFI Enabled
2,178,932 UART: [state] LifecycleState = Unprovisioned
2,180,591 UART: [state] DebugLocked = No
2,181,707 UART: [state] WD Timer not started. Device not locked for debugging
2,184,188 UART: [kat] SHA2-256
2,184,861 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,187,882 UART: [kat] ++
2,188,345 UART: [kat] sha1
2,188,868 UART: [kat] SHA2-256
2,189,738 UART: [kat] SHA2-384
2,190,416 UART: [kat] SHA2-512-ACC
2,191,266 UART: [kat] ECC-384
2,946,566 UART: [kat] HMAC-384Kdf
2,969,877 UART: [kat] LMS
3,446,382 UART: [kat] --
3,453,079 UART: [cold-reset] ++
3,455,421 UART: [fht] FHT @ 0x50003400
3,467,005 UART: [idev] ++
3,467,581 UART: [idev] CDI.KEYID = 6
3,468,604 UART: [idev] SUBJECT.KEYID = 7
3,469,774 UART: [idev] UDS.KEYID = 0
3,500,123 UART: [idev] Erasing UDS.KEYID = 0
5,999,935 UART: [idev] Sha1 KeyId Algorithm
6,022,032 UART: [idev] --
6,026,743 UART: [ldev] ++
6,027,319 UART: [ldev] CDI.KEYID = 6
6,028,237 UART: [ldev] SUBJECT.KEYID = 5
6,029,456 UART: [ldev] AUTHORITY.KEYID = 7
6,030,699 UART: [ldev] FE.KEYID = 1
6,068,802 UART: [ldev] Erasing FE.KEYID = 1
8,578,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,311,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,327,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,343,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,359,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,381,055 UART: [ldev] --
10,386,062 UART: [fwproc] Wait for Commands...
10,389,332 UART: [fwproc] Recv command 0x46574c44
10,391,343 UART: [fwproc] Recv'd Img size: 118548 bytes
12,459,025 UART: ROM Fatal Error: 0x000B0018
12,462,249 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,028,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,324,883 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,027,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,526 UART:
2,177,935 UART: Running Caliptra ROM ...
2,179,103 UART:
2,179,277 UART: [state] CFI Enabled
2,180,225 UART: [state] LifecycleState = Unprovisioned
2,181,872 UART: [state] DebugLocked = No
2,182,983 UART: [state] WD Timer not started. Device not locked for debugging
2,185,453 UART: [kat] SHA2-256
2,186,122 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,139 UART: [kat] ++
2,189,637 UART: [kat] sha1
2,190,147 UART: [kat] SHA2-256
2,190,800 UART: [kat] SHA2-384
2,191,472 UART: [kat] SHA2-512-ACC
2,192,314 UART: [kat] ECC-384
3,278,964 UART: [kat] HMAC-384Kdf
3,291,630 UART: [kat] LMS
3,768,164 UART: [kat] --
3,771,722 UART: [cold-reset] ++
3,772,893 UART: [fht] FHT @ 0x50003400
3,783,360 UART: [idev] ++
3,783,923 UART: [idev] CDI.KEYID = 6
3,784,888 UART: [idev] SUBJECT.KEYID = 7
3,786,155 UART: [idev] UDS.KEYID = 0
3,802,937 UART: [idev] Erasing UDS.KEYID = 0
6,264,188 UART: [idev] Sha1 KeyId Algorithm
6,288,076 UART: [idev] --
6,293,427 UART: [ldev] ++
6,293,998 UART: [ldev] CDI.KEYID = 6
6,294,979 UART: [ldev] SUBJECT.KEYID = 5
6,296,137 UART: [ldev] AUTHORITY.KEYID = 7
6,297,366 UART: [ldev] FE.KEYID = 1
6,309,876 UART: [ldev] Erasing FE.KEYID = 1
8,786,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,595 UART: [ldev] --
10,582,459 UART: [fwproc] Wait for Commands...
10,584,773 UART: [fwproc] Recv command 0x46574c44
10,586,765 UART: [fwproc] Recv'd Img size: 118548 bytes
12,658,333 UART: ROM Fatal Error: 0x000B0018
12,661,632 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
2,028,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,534,048 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,340 UART: [kat] ++
895,492 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,383 UART: [kat] SHA2-512-ACC
906,284 UART: [kat] ECC-384
915,551 UART: [kat] HMAC-384Kdf
920,139 UART: [kat] LMS
1,168,451 UART: [kat] --
1,169,272 UART: [cold-reset] ++
1,169,792 UART: [fht] FHT @ 0x50003400
1,172,558 UART: [idev] ++
1,172,726 UART: [idev] CDI.KEYID = 6
1,173,087 UART: [idev] SUBJECT.KEYID = 7
1,173,512 UART: [idev] UDS.KEYID = 0
1,181,309 UART: [idev] Erasing UDS.KEYID = 0
1,198,083 UART: [idev] Sha1 KeyId Algorithm
1,207,173 UART: [idev] --
1,208,376 UART: [ldev] ++
1,208,544 UART: [ldev] CDI.KEYID = 6
1,208,908 UART: [ldev] SUBJECT.KEYID = 5
1,209,335 UART: [ldev] AUTHORITY.KEYID = 7
1,209,798 UART: [ldev] FE.KEYID = 1
1,214,822 UART: [ldev] Erasing FE.KEYID = 1
1,241,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,434 UART: [ldev] --
1,280,639 UART: [fwproc] Wait for Commands...
1,281,360 UART: [fwproc] Recv command 0x46574c44
1,282,093 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,402 UART: ROM Fatal Error: 0x000B0018
1,329,559 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,966 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,651 UART: [kat] ++
895,803 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,808 UART: [kat] SHA2-512-ACC
906,709 UART: [kat] ECC-384
916,276 UART: [kat] HMAC-384Kdf
920,892 UART: [kat] LMS
1,169,204 UART: [kat] --
1,170,153 UART: [cold-reset] ++
1,170,549 UART: [fht] FHT @ 0x50003400
1,173,299 UART: [idev] ++
1,173,467 UART: [idev] CDI.KEYID = 6
1,173,828 UART: [idev] SUBJECT.KEYID = 7
1,174,253 UART: [idev] UDS.KEYID = 0
1,181,980 UART: [idev] Erasing UDS.KEYID = 0
1,199,168 UART: [idev] Sha1 KeyId Algorithm
1,207,984 UART: [idev] --
1,208,845 UART: [ldev] ++
1,209,013 UART: [ldev] CDI.KEYID = 6
1,209,377 UART: [ldev] SUBJECT.KEYID = 5
1,209,804 UART: [ldev] AUTHORITY.KEYID = 7
1,210,267 UART: [ldev] FE.KEYID = 1
1,215,495 UART: [ldev] Erasing FE.KEYID = 1
1,241,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,915 UART: [ldev] --
1,281,156 UART: [fwproc] Wait for Commands...
1,281,955 UART: [fwproc] Recv command 0x46574c44
1,282,688 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,407 UART: ROM Fatal Error: 0x000B0018
1,329,564 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,415 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,445 UART: [kat] SHA2-512-ACC
906,346 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,741 UART: [kat] LMS
1,169,053 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,230 UART: [idev] ++
1,173,398 UART: [idev] CDI.KEYID = 6
1,173,759 UART: [idev] SUBJECT.KEYID = 7
1,174,184 UART: [idev] UDS.KEYID = 0
1,182,557 UART: [idev] Erasing UDS.KEYID = 0
1,199,789 UART: [idev] Sha1 KeyId Algorithm
1,208,589 UART: [idev] --
1,209,622 UART: [ldev] ++
1,209,790 UART: [ldev] CDI.KEYID = 6
1,210,154 UART: [ldev] SUBJECT.KEYID = 5
1,210,581 UART: [ldev] AUTHORITY.KEYID = 7
1,211,044 UART: [ldev] FE.KEYID = 1
1,216,016 UART: [ldev] Erasing FE.KEYID = 1
1,242,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,086 UART: [ldev] --
1,281,293 UART: [fwproc] Wait for Commands...
1,281,938 UART: [fwproc] Recv command 0x46574c44
1,282,671 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,832 UART: ROM Fatal Error: 0x000B0018
1,330,989 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,442 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
891,811 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,915 UART: [kat] ++
896,067 UART: [kat] sha1
900,281 UART: [kat] SHA2-256
902,221 UART: [kat] SHA2-384
904,916 UART: [kat] SHA2-512-ACC
906,817 UART: [kat] ECC-384
916,500 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,170,469 UART: [cold-reset] ++
1,170,899 UART: [fht] FHT @ 0x50003400
1,173,527 UART: [idev] ++
1,173,695 UART: [idev] CDI.KEYID = 6
1,174,056 UART: [idev] SUBJECT.KEYID = 7
1,174,481 UART: [idev] UDS.KEYID = 0
1,182,140 UART: [idev] Erasing UDS.KEYID = 0
1,199,070 UART: [idev] Sha1 KeyId Algorithm
1,207,874 UART: [idev] --
1,208,845 UART: [ldev] ++
1,209,013 UART: [ldev] CDI.KEYID = 6
1,209,377 UART: [ldev] SUBJECT.KEYID = 5
1,209,804 UART: [ldev] AUTHORITY.KEYID = 7
1,210,267 UART: [ldev] FE.KEYID = 1
1,215,521 UART: [ldev] Erasing FE.KEYID = 1
1,242,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,573 UART: [ldev] --
1,280,816 UART: [fwproc] Wait for Commands...
1,281,433 UART: [fwproc] Recv command 0x46574c44
1,282,166 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,955 UART: ROM Fatal Error: 0x000B0018
1,331,112 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,619 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,226 UART: [kat] ++
895,378 UART: [kat] sha1
899,636 UART: [kat] SHA2-256
901,576 UART: [kat] SHA2-384
904,365 UART: [kat] SHA2-512-ACC
906,266 UART: [kat] ECC-384
916,017 UART: [kat] HMAC-384Kdf
920,553 UART: [kat] LMS
1,168,865 UART: [kat] --
1,169,822 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,172,868 UART: [idev] ++
1,173,036 UART: [idev] CDI.KEYID = 6
1,173,397 UART: [idev] SUBJECT.KEYID = 7
1,173,822 UART: [idev] UDS.KEYID = 0
1,181,503 UART: [idev] Erasing UDS.KEYID = 0
1,198,281 UART: [idev] Sha1 KeyId Algorithm
1,207,193 UART: [idev] --
1,208,274 UART: [ldev] ++
1,208,442 UART: [ldev] CDI.KEYID = 6
1,208,806 UART: [ldev] SUBJECT.KEYID = 5
1,209,233 UART: [ldev] AUTHORITY.KEYID = 7
1,209,696 UART: [ldev] FE.KEYID = 1
1,215,338 UART: [ldev] Erasing FE.KEYID = 1
1,241,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,737 UART: [fwproc] Wait for Commands...
1,281,452 UART: [fwproc] Recv command 0x46574c44
1,282,185 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,382 UART: ROM Fatal Error: 0x000B0018
1,329,539 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,192 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,685 UART: [kat] ++
895,837 UART: [kat] sha1
900,099 UART: [kat] SHA2-256
902,039 UART: [kat] SHA2-384
904,846 UART: [kat] SHA2-512-ACC
906,747 UART: [kat] ECC-384
916,528 UART: [kat] HMAC-384Kdf
921,148 UART: [kat] LMS
1,169,460 UART: [kat] --
1,170,469 UART: [cold-reset] ++
1,170,909 UART: [fht] FHT @ 0x50003400
1,173,435 UART: [idev] ++
1,173,603 UART: [idev] CDI.KEYID = 6
1,173,964 UART: [idev] SUBJECT.KEYID = 7
1,174,389 UART: [idev] UDS.KEYID = 0
1,182,628 UART: [idev] Erasing UDS.KEYID = 0
1,199,902 UART: [idev] Sha1 KeyId Algorithm
1,209,014 UART: [idev] --
1,210,109 UART: [ldev] ++
1,210,277 UART: [ldev] CDI.KEYID = 6
1,210,641 UART: [ldev] SUBJECT.KEYID = 5
1,211,068 UART: [ldev] AUTHORITY.KEYID = 7
1,211,531 UART: [ldev] FE.KEYID = 1
1,216,893 UART: [ldev] Erasing FE.KEYID = 1
1,242,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,649 UART: [ldev] --
1,281,926 UART: [fwproc] Wait for Commands...
1,282,537 UART: [fwproc] Recv command 0x46574c44
1,283,270 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,225 UART: ROM Fatal Error: 0x000B0018
1,331,382 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,891 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
2,026,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,175,868 UART:
2,176,255 UART: Running Caliptra ROM ...
2,177,428 UART:
2,177,601 UART: [state] CFI Enabled
2,178,575 UART: [state] LifecycleState = Unprovisioned
2,180,229 UART: [state] DebugLocked = No
2,181,345 UART: [state] WD Timer not started. Device not locked for debugging
2,183,826 UART: [kat] SHA2-256
2,184,506 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,187,529 UART: [kat] ++
2,187,990 UART: [kat] sha1
2,188,510 UART: [kat] SHA2-256
2,189,256 UART: [kat] SHA2-384
2,189,952 UART: [kat] SHA2-512-ACC
2,190,768 UART: [kat] ECC-384
2,948,965 UART: [kat] HMAC-384Kdf
2,972,482 UART: [kat] LMS
3,448,968 UART: [kat] --
3,453,011 UART: [cold-reset] ++
3,455,651 UART: [fht] FHT @ 0x50003400
3,468,361 UART: [idev] ++
3,468,938 UART: [idev] CDI.KEYID = 6
3,469,954 UART: [idev] SUBJECT.KEYID = 7
3,471,116 UART: [idev] UDS.KEYID = 0
3,502,130 UART: [idev] Erasing UDS.KEYID = 0
5,985,432 UART: [idev] Sha1 KeyId Algorithm
6,009,368 UART: [idev] --
6,015,120 UART: [ldev] ++
6,015,703 UART: [ldev] CDI.KEYID = 6
6,016,666 UART: [ldev] SUBJECT.KEYID = 5
6,017,834 UART: [ldev] AUTHORITY.KEYID = 7
6,019,131 UART: [ldev] FE.KEYID = 1
6,058,064 UART: [ldev] Erasing FE.KEYID = 1
8,565,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,070 UART: [ldev] --
10,373,883 UART: [fwproc] Wait for Commands...
10,376,848 UART: [fwproc] Recv command 0x46574c44
10,378,843 UART: [fwproc] Recv'd Img size: 118548 bytes
12,446,798 UART: ROM Fatal Error: 0x000B0017
12,450,087 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
2,034,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,183,716 UART:
2,184,095 UART: Running Caliptra ROM ...
2,185,265 UART:
2,185,447 UART: [state] CFI Enabled
2,186,420 UART: [state] LifecycleState = Unprovisioned
2,188,309 UART: [state] DebugLocked = No
2,189,436 UART: [state] WD Timer not started. Device not locked for debugging
2,191,935 UART: [kat] SHA2-256
2,192,640 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,195,661 UART: [kat] ++
2,196,121 UART: [kat] sha1
2,196,643 UART: [kat] SHA2-256
2,197,389 UART: [kat] SHA2-384
2,198,064 UART: [kat] SHA2-512-ACC
2,198,907 UART: [kat] ECC-384
2,949,239 UART: [kat] HMAC-384Kdf
2,971,685 UART: [kat] LMS
3,448,166 UART: [kat] --
3,452,787 UART: [cold-reset] ++
3,455,272 UART: [fht] FHT @ 0x50003400
3,465,880 UART: [idev] ++
3,466,504 UART: [idev] CDI.KEYID = 6
3,467,580 UART: [idev] SUBJECT.KEYID = 7
3,468,712 UART: [idev] UDS.KEYID = 0
3,501,409 UART: [idev] Erasing UDS.KEYID = 0
5,986,535 UART: [idev] Sha1 KeyId Algorithm
6,010,590 UART: [idev] --
6,014,869 UART: [ldev] ++
6,015,451 UART: [ldev] CDI.KEYID = 6
6,016,477 UART: [ldev] SUBJECT.KEYID = 5
6,017,591 UART: [ldev] AUTHORITY.KEYID = 7
6,018,832 UART: [ldev] FE.KEYID = 1
6,056,874 UART: [ldev] Erasing FE.KEYID = 1
8,566,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,534 UART: [ldev] --
10,371,463 UART: [fwproc] Wait for Commands...
10,373,377 UART: [fwproc] Recv command 0x46574c44
10,375,433 UART: [fwproc] Recv'd Img size: 118548 bytes
12,453,409 UART: ROM Fatal Error: 0x000B0017
12,456,682 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
2,032,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,304 UART:
2,182,688 UART: Running Caliptra ROM ...
2,183,852 UART:
2,184,031 UART: [state] CFI Enabled
2,185,036 UART: [state] LifecycleState = Unprovisioned
2,186,691 UART: [state] DebugLocked = No
2,187,806 UART: [state] WD Timer not started. Device not locked for debugging
2,190,275 UART: [kat] SHA2-256
2,190,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,193,967 UART: [kat] ++
2,194,427 UART: [kat] sha1
2,194,950 UART: [kat] SHA2-256
2,195,614 UART: [kat] SHA2-384
2,196,280 UART: [kat] SHA2-512-ACC
2,197,116 UART: [kat] ECC-384
2,945,758 UART: [kat] HMAC-384Kdf
2,970,575 UART: [kat] LMS
3,447,086 UART: [kat] --
3,452,338 UART: [cold-reset] ++
3,453,901 UART: [fht] FHT @ 0x50003400
3,465,546 UART: [idev] ++
3,466,124 UART: [idev] CDI.KEYID = 6
3,467,037 UART: [idev] SUBJECT.KEYID = 7
3,468,311 UART: [idev] UDS.KEYID = 0
3,502,168 UART: [idev] Erasing UDS.KEYID = 0
5,987,446 UART: [idev] Sha1 KeyId Algorithm
6,011,761 UART: [idev] --
6,017,224 UART: [ldev] ++
6,017,799 UART: [ldev] CDI.KEYID = 6
6,018,715 UART: [ldev] SUBJECT.KEYID = 5
6,019,936 UART: [ldev] AUTHORITY.KEYID = 7
6,021,172 UART: [ldev] FE.KEYID = 1
6,057,821 UART: [ldev] Erasing FE.KEYID = 1
8,563,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,274 UART: [ldev] --
10,373,905 UART: [fwproc] Wait for Commands...
10,375,579 UART: [fwproc] Recv command 0x46574c44
10,377,571 UART: [fwproc] Recv'd Img size: 118548 bytes
12,440,869 UART: ROM Fatal Error: 0x000B0017
12,444,106 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
2,027,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,316,904 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
2,033,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,334,822 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
2,027,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,313,927 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,031,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,181,210 UART:
2,181,614 UART: Running Caliptra ROM ...
2,182,805 UART:
2,182,980 UART: [state] CFI Enabled
2,183,953 UART: [state] LifecycleState = Unprovisioned
2,185,618 UART: [state] DebugLocked = No
2,186,726 UART: [state] WD Timer not started. Device not locked for debugging
2,189,204 UART: [kat] SHA2-256
2,189,869 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,192,882 UART: [kat] ++
2,193,376 UART: [kat] sha1
2,193,884 UART: [kat] SHA2-256
2,194,625 UART: [kat] SHA2-384
2,195,293 UART: [kat] SHA2-512-ACC
2,196,170 UART: [kat] ECC-384
3,275,662 UART: [kat] HMAC-384Kdf
3,288,497 UART: [kat] LMS
3,765,037 UART: [kat] --
3,768,426 UART: [cold-reset] ++
3,769,983 UART: [fht] FHT @ 0x50003400
3,780,687 UART: [idev] ++
3,781,300 UART: [idev] CDI.KEYID = 6
3,782,232 UART: [idev] SUBJECT.KEYID = 7
3,783,493 UART: [idev] UDS.KEYID = 0
3,801,870 UART: [idev] Erasing UDS.KEYID = 0
6,262,340 UART: [idev] Sha1 KeyId Algorithm
6,286,221 UART: [idev] --
6,292,512 UART: [ldev] ++
6,293,087 UART: [ldev] CDI.KEYID = 6
6,294,055 UART: [ldev] SUBJECT.KEYID = 5
6,295,211 UART: [ldev] AUTHORITY.KEYID = 7
6,296,491 UART: [ldev] FE.KEYID = 1
6,309,021 UART: [ldev] Erasing FE.KEYID = 1
8,788,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,723 UART: [ldev] --
10,583,789 UART: [fwproc] Wait for Commands...
10,586,903 UART: [fwproc] Recv command 0x46574c44
10,588,883 UART: [fwproc] Recv'd Img size: 118548 bytes
12,659,399 UART: ROM Fatal Error: 0x000B0017
12,662,688 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
2,040,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,190,370 UART:
2,190,764 UART: Running Caliptra ROM ...
2,191,877 UART:
2,192,036 UART: [state] CFI Enabled
2,193,012 UART: [state] LifecycleState = Unprovisioned
2,194,663 UART: [state] DebugLocked = No
2,195,768 UART: [state] WD Timer not started. Device not locked for debugging
2,198,236 UART: [kat] SHA2-256
2,198,903 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,201,902 UART: [kat] ++
2,202,352 UART: [kat] sha1
2,202,863 UART: [kat] SHA2-256
2,203,603 UART: [kat] SHA2-384
2,204,286 UART: [kat] SHA2-512-ACC
2,205,109 UART: [kat] ECC-384
3,282,726 UART: [kat] HMAC-384Kdf
3,296,127 UART: [kat] LMS
3,772,644 UART: [kat] --
3,777,088 UART: [cold-reset] ++
3,778,215 UART: [fht] FHT @ 0x50003400
3,789,942 UART: [idev] ++
3,790,549 UART: [idev] CDI.KEYID = 6
3,791,464 UART: [idev] SUBJECT.KEYID = 7
3,792,734 UART: [idev] UDS.KEYID = 0
3,807,654 UART: [idev] Erasing UDS.KEYID = 0
6,267,802 UART: [idev] Sha1 KeyId Algorithm
6,293,028 UART: [idev] --
6,297,992 UART: [ldev] ++
6,298,556 UART: [ldev] CDI.KEYID = 6
6,299,455 UART: [ldev] SUBJECT.KEYID = 5
6,300,666 UART: [ldev] AUTHORITY.KEYID = 7
6,301,949 UART: [ldev] FE.KEYID = 1
6,313,318 UART: [ldev] Erasing FE.KEYID = 1
8,793,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,267 UART: [ldev] --
10,590,028 UART: [fwproc] Wait for Commands...
10,593,303 UART: [fwproc] Recv command 0x46574c44
10,595,293 UART: [fwproc] Recv'd Img size: 118548 bytes
12,671,391 UART: ROM Fatal Error: 0x000B0017
12,674,675 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
2,032,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,181,751 UART:
2,182,132 UART: Running Caliptra ROM ...
2,183,300 UART:
2,183,476 UART: [state] CFI Enabled
2,184,438 UART: [state] LifecycleState = Unprovisioned
2,186,077 UART: [state] DebugLocked = No
2,187,189 UART: [state] WD Timer not started. Device not locked for debugging
2,189,668 UART: [kat] SHA2-256
2,190,337 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,193,361 UART: [kat] ++
2,193,814 UART: [kat] sha1
2,194,361 UART: [kat] SHA2-256
2,195,016 UART: [kat] SHA2-384
2,195,672 UART: [kat] SHA2-512-ACC
2,196,509 UART: [kat] ECC-384
3,279,907 UART: [kat] HMAC-384Kdf
3,291,442 UART: [kat] LMS
3,767,929 UART: [kat] --
3,772,720 UART: [cold-reset] ++
3,775,132 UART: [fht] FHT @ 0x50003400
3,785,249 UART: [idev] ++
3,785,812 UART: [idev] CDI.KEYID = 6
3,786,826 UART: [idev] SUBJECT.KEYID = 7
3,787,981 UART: [idev] UDS.KEYID = 0
3,803,194 UART: [idev] Erasing UDS.KEYID = 0
6,265,235 UART: [idev] Sha1 KeyId Algorithm
6,288,194 UART: [idev] --
6,293,911 UART: [ldev] ++
6,294,482 UART: [ldev] CDI.KEYID = 6
6,295,366 UART: [ldev] SUBJECT.KEYID = 5
6,296,577 UART: [ldev] AUTHORITY.KEYID = 7
6,297,868 UART: [ldev] FE.KEYID = 1
6,309,676 UART: [ldev] Erasing FE.KEYID = 1
8,785,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,096 UART: [ldev] --
10,580,145 UART: [fwproc] Wait for Commands...
10,582,833 UART: [fwproc] Recv command 0x46574c44
10,584,834 UART: [fwproc] Recv'd Img size: 118548 bytes
12,656,564 UART: ROM Fatal Error: 0x000B0017
12,659,797 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,028,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,534,350 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
2,026,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,538,392 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
2,039,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,535,709 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,656 UART: [state] LifecycleState = Unprovisioned
85,311 UART: [state] DebugLocked = No
85,879 UART: [state] WD Timer not started. Device not locked for debugging
87,156 UART: [kat] SHA2-256
890,706 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,810 UART: [kat] ++
894,962 UART: [kat] sha1
899,100 UART: [kat] SHA2-256
901,040 UART: [kat] SHA2-384
903,589 UART: [kat] SHA2-512-ACC
905,490 UART: [kat] ECC-384
915,017 UART: [kat] HMAC-384Kdf
919,439 UART: [kat] LMS
1,167,751 UART: [kat] --
1,168,766 UART: [cold-reset] ++
1,169,130 UART: [fht] FHT @ 0x50003400
1,171,742 UART: [idev] ++
1,171,910 UART: [idev] CDI.KEYID = 6
1,172,271 UART: [idev] SUBJECT.KEYID = 7
1,172,696 UART: [idev] UDS.KEYID = 0
1,180,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,343 UART: [idev] Sha1 KeyId Algorithm
1,207,007 UART: [idev] --
1,208,162 UART: [ldev] ++
1,208,330 UART: [ldev] CDI.KEYID = 6
1,208,694 UART: [ldev] SUBJECT.KEYID = 5
1,209,121 UART: [ldev] AUTHORITY.KEYID = 7
1,209,584 UART: [ldev] FE.KEYID = 1
1,214,652 UART: [ldev] Erasing FE.KEYID = 1
1,241,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,840 UART: [ldev] --
1,280,243 UART: [fwproc] Wait for Commands...
1,280,820 UART: [fwproc] Recv command 0x46574c44
1,281,553 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,830 UART: ROM Fatal Error: 0x000B0017
1,328,987 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,131 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [kat] SHA2-256
891,498 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
900,110 UART: [kat] SHA2-256
902,050 UART: [kat] SHA2-384
904,869 UART: [kat] SHA2-512-ACC
906,770 UART: [kat] ECC-384
916,607 UART: [kat] HMAC-384Kdf
921,273 UART: [kat] LMS
1,169,585 UART: [kat] --
1,170,510 UART: [cold-reset] ++
1,171,010 UART: [fht] FHT @ 0x50003400
1,173,698 UART: [idev] ++
1,173,866 UART: [idev] CDI.KEYID = 6
1,174,227 UART: [idev] SUBJECT.KEYID = 7
1,174,652 UART: [idev] UDS.KEYID = 0
1,182,359 UART: [idev] Erasing UDS.KEYID = 0
1,199,105 UART: [idev] Sha1 KeyId Algorithm
1,207,981 UART: [idev] --
1,208,910 UART: [ldev] ++
1,209,078 UART: [ldev] CDI.KEYID = 6
1,209,442 UART: [ldev] SUBJECT.KEYID = 5
1,209,869 UART: [ldev] AUTHORITY.KEYID = 7
1,210,332 UART: [ldev] FE.KEYID = 1
1,215,552 UART: [ldev] Erasing FE.KEYID = 1
1,241,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,388 UART: [ldev] --
1,280,835 UART: [fwproc] Wait for Commands...
1,281,504 UART: [fwproc] Recv command 0x46574c44
1,282,237 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,354 UART: ROM Fatal Error: 0x000B0017
1,330,511 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,812 UART: [kat] SHA2-256
901,752 UART: [kat] SHA2-384
904,641 UART: [kat] SHA2-512-ACC
906,542 UART: [kat] ECC-384
916,127 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,348 UART: [fht] FHT @ 0x50003400
1,172,996 UART: [idev] ++
1,173,164 UART: [idev] CDI.KEYID = 6
1,173,525 UART: [idev] SUBJECT.KEYID = 7
1,173,950 UART: [idev] UDS.KEYID = 0
1,181,867 UART: [idev] Erasing UDS.KEYID = 0
1,199,005 UART: [idev] Sha1 KeyId Algorithm
1,207,983 UART: [idev] --
1,208,998 UART: [ldev] ++
1,209,166 UART: [ldev] CDI.KEYID = 6
1,209,530 UART: [ldev] SUBJECT.KEYID = 5
1,209,957 UART: [ldev] AUTHORITY.KEYID = 7
1,210,420 UART: [ldev] FE.KEYID = 1
1,215,714 UART: [ldev] Erasing FE.KEYID = 1
1,242,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,396 UART: [ldev] --
1,281,847 UART: [fwproc] Wait for Commands...
1,282,558 UART: [fwproc] Recv command 0x46574c44
1,283,291 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,564 UART: ROM Fatal Error: 0x000B0017
1,331,721 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,732 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,702 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,651 UART: [kat] ++
895,803 UART: [kat] sha1
899,905 UART: [kat] SHA2-256
901,845 UART: [kat] SHA2-384
904,672 UART: [kat] SHA2-512-ACC
906,573 UART: [kat] ECC-384
916,122 UART: [kat] HMAC-384Kdf
920,638 UART: [kat] LMS
1,168,950 UART: [kat] --
1,169,855 UART: [cold-reset] ++
1,170,351 UART: [fht] FHT @ 0x50003400
1,173,057 UART: [idev] ++
1,173,225 UART: [idev] CDI.KEYID = 6
1,173,586 UART: [idev] SUBJECT.KEYID = 7
1,174,011 UART: [idev] UDS.KEYID = 0
1,181,830 UART: [idev] Erasing UDS.KEYID = 0
1,199,158 UART: [idev] Sha1 KeyId Algorithm
1,207,970 UART: [idev] --
1,209,151 UART: [ldev] ++
1,209,319 UART: [ldev] CDI.KEYID = 6
1,209,683 UART: [ldev] SUBJECT.KEYID = 5
1,210,110 UART: [ldev] AUTHORITY.KEYID = 7
1,210,573 UART: [ldev] FE.KEYID = 1
1,215,799 UART: [ldev] Erasing FE.KEYID = 1
1,242,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,455 UART: [ldev] --
1,281,780 UART: [fwproc] Wait for Commands...
1,282,599 UART: [fwproc] Recv command 0x46574c44
1,283,332 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,105 UART: ROM Fatal Error: 0x000B0017
1,332,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,757 UART: [kat] SHA2-256
901,697 UART: [kat] SHA2-384
904,294 UART: [kat] SHA2-512-ACC
906,195 UART: [kat] ECC-384
915,478 UART: [kat] HMAC-384Kdf
920,100 UART: [kat] LMS
1,168,412 UART: [kat] --
1,169,319 UART: [cold-reset] ++
1,169,867 UART: [fht] FHT @ 0x50003400
1,172,569 UART: [idev] ++
1,172,737 UART: [idev] CDI.KEYID = 6
1,173,098 UART: [idev] SUBJECT.KEYID = 7
1,173,523 UART: [idev] UDS.KEYID = 0
1,181,554 UART: [idev] Erasing UDS.KEYID = 0
1,198,636 UART: [idev] Sha1 KeyId Algorithm
1,207,688 UART: [idev] --
1,208,815 UART: [ldev] ++
1,208,983 UART: [ldev] CDI.KEYID = 6
1,209,347 UART: [ldev] SUBJECT.KEYID = 5
1,209,774 UART: [ldev] AUTHORITY.KEYID = 7
1,210,237 UART: [ldev] FE.KEYID = 1
1,215,497 UART: [ldev] Erasing FE.KEYID = 1
1,241,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,509 UART: [ldev] --
1,280,844 UART: [fwproc] Wait for Commands...
1,281,437 UART: [fwproc] Recv command 0x46574c44
1,282,170 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,291 UART: ROM Fatal Error: 0x000B0017
1,330,448 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
899,977 UART: [kat] SHA2-256
901,917 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
916,510 UART: [kat] HMAC-384Kdf
921,184 UART: [kat] LMS
1,169,496 UART: [kat] --
1,170,369 UART: [cold-reset] ++
1,170,715 UART: [fht] FHT @ 0x50003400
1,173,265 UART: [idev] ++
1,173,433 UART: [idev] CDI.KEYID = 6
1,173,794 UART: [idev] SUBJECT.KEYID = 7
1,174,219 UART: [idev] UDS.KEYID = 0
1,182,526 UART: [idev] Erasing UDS.KEYID = 0
1,199,920 UART: [idev] Sha1 KeyId Algorithm
1,208,734 UART: [idev] --
1,209,789 UART: [ldev] ++
1,209,957 UART: [ldev] CDI.KEYID = 6
1,210,321 UART: [ldev] SUBJECT.KEYID = 5
1,210,748 UART: [ldev] AUTHORITY.KEYID = 7
1,211,211 UART: [ldev] FE.KEYID = 1
1,216,427 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,869 UART: [ldev] --
1,282,272 UART: [fwproc] Wait for Commands...
1,282,861 UART: [fwproc] Recv command 0x46574c44
1,283,594 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,351 UART: ROM Fatal Error: 0x000B0017
1,332,508 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,667 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,615 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,407 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,178 UART: [kat] ++
895,330 UART: [kat] sha1
899,628 UART: [kat] SHA2-256
901,568 UART: [kat] SHA2-384
904,309 UART: [kat] SHA2-512-ACC
906,210 UART: [kat] ECC-384
916,311 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,376 UART: [fht] FHT @ 0x50003400
1,172,972 UART: [idev] ++
1,173,140 UART: [idev] CDI.KEYID = 6
1,173,501 UART: [idev] SUBJECT.KEYID = 7
1,173,926 UART: [idev] UDS.KEYID = 0
1,182,131 UART: [idev] Erasing UDS.KEYID = 0
1,198,519 UART: [idev] Sha1 KeyId Algorithm
1,207,413 UART: [idev] --
1,208,594 UART: [ldev] ++
1,208,762 UART: [ldev] CDI.KEYID = 6
1,209,126 UART: [ldev] SUBJECT.KEYID = 5
1,209,553 UART: [ldev] AUTHORITY.KEYID = 7
1,210,016 UART: [ldev] FE.KEYID = 1
1,215,370 UART: [ldev] Erasing FE.KEYID = 1
1,241,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,442 UART: [ldev] --
1,280,653 UART: [fwproc] Wait for Commands...
1,281,414 UART: [fwproc] Recv command 0x46574c44
1,282,147 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,336 UART: ROM Fatal Error: 0x000B0017
1,330,493 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,348 UART: [kat] ++
895,500 UART: [kat] sha1
899,554 UART: [kat] SHA2-256
901,494 UART: [kat] SHA2-384
904,217 UART: [kat] SHA2-512-ACC
906,118 UART: [kat] ECC-384
915,865 UART: [kat] HMAC-384Kdf
920,487 UART: [kat] LMS
1,168,799 UART: [kat] --
1,169,588 UART: [cold-reset] ++
1,170,042 UART: [fht] FHT @ 0x50003400
1,172,732 UART: [idev] ++
1,172,900 UART: [idev] CDI.KEYID = 6
1,173,261 UART: [idev] SUBJECT.KEYID = 7
1,173,686 UART: [idev] UDS.KEYID = 0
1,181,465 UART: [idev] Erasing UDS.KEYID = 0
1,198,791 UART: [idev] Sha1 KeyId Algorithm
1,207,779 UART: [idev] --
1,208,604 UART: [ldev] ++
1,208,772 UART: [ldev] CDI.KEYID = 6
1,209,136 UART: [ldev] SUBJECT.KEYID = 5
1,209,563 UART: [ldev] AUTHORITY.KEYID = 7
1,210,026 UART: [ldev] FE.KEYID = 1
1,215,212 UART: [ldev] Erasing FE.KEYID = 1
1,241,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,456 UART: [ldev] --
1,280,759 UART: [fwproc] Wait for Commands...
1,281,522 UART: [fwproc] Recv command 0x46574c44
1,282,255 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,010 UART: ROM Fatal Error: 0x000B0017
1,330,167 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,380 UART: [kat] ++
895,532 UART: [kat] sha1
899,818 UART: [kat] SHA2-256
901,758 UART: [kat] SHA2-384
904,271 UART: [kat] SHA2-512-ACC
906,172 UART: [kat] ECC-384
915,859 UART: [kat] HMAC-384Kdf
920,363 UART: [kat] LMS
1,168,675 UART: [kat] --
1,169,486 UART: [cold-reset] ++
1,169,904 UART: [fht] FHT @ 0x50003400
1,172,704 UART: [idev] ++
1,172,872 UART: [idev] CDI.KEYID = 6
1,173,233 UART: [idev] SUBJECT.KEYID = 7
1,173,658 UART: [idev] UDS.KEYID = 0
1,181,347 UART: [idev] Erasing UDS.KEYID = 0
1,198,425 UART: [idev] Sha1 KeyId Algorithm
1,207,405 UART: [idev] --
1,208,578 UART: [ldev] ++
1,208,746 UART: [ldev] CDI.KEYID = 6
1,209,110 UART: [ldev] SUBJECT.KEYID = 5
1,209,537 UART: [ldev] AUTHORITY.KEYID = 7
1,210,000 UART: [ldev] FE.KEYID = 1
1,215,178 UART: [ldev] Erasing FE.KEYID = 1
1,241,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,738 UART: [ldev] --
1,281,095 UART: [fwproc] Wait for Commands...
1,281,876 UART: [fwproc] Recv command 0x46574c44
1,282,609 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,306 UART: ROM Fatal Error: 0x000B0017
1,331,463 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,392 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,309 UART: [kat] SHA2-256
891,859 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,963 UART: [kat] ++
896,115 UART: [kat] sha1
900,203 UART: [kat] SHA2-256
902,143 UART: [kat] SHA2-384
904,928 UART: [kat] SHA2-512-ACC
906,829 UART: [kat] ECC-384
916,878 UART: [kat] HMAC-384Kdf
921,526 UART: [kat] LMS
1,169,838 UART: [kat] --
1,170,657 UART: [cold-reset] ++
1,171,211 UART: [fht] FHT @ 0x50003400
1,173,847 UART: [idev] ++
1,174,015 UART: [idev] CDI.KEYID = 6
1,174,376 UART: [idev] SUBJECT.KEYID = 7
1,174,801 UART: [idev] UDS.KEYID = 0
1,182,452 UART: [idev] Erasing UDS.KEYID = 0
1,200,000 UART: [idev] Sha1 KeyId Algorithm
1,208,808 UART: [idev] --
1,209,743 UART: [ldev] ++
1,209,911 UART: [ldev] CDI.KEYID = 6
1,210,275 UART: [ldev] SUBJECT.KEYID = 5
1,210,702 UART: [ldev] AUTHORITY.KEYID = 7
1,211,165 UART: [ldev] FE.KEYID = 1
1,216,337 UART: [ldev] Erasing FE.KEYID = 1
1,243,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,665 UART: [ldev] --
1,281,930 UART: [fwproc] Wait for Commands...
1,282,605 UART: [fwproc] Recv command 0x46574c44
1,283,338 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,217 UART: ROM Fatal Error: 0x000B0017
1,331,374 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,901 UART: [state] LifecycleState = Unprovisioned
85,556 UART: [state] DebugLocked = No
86,070 UART: [state] WD Timer not started. Device not locked for debugging
87,211 UART: [kat] SHA2-256
890,761 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,865 UART: [kat] ++
895,017 UART: [kat] sha1
899,341 UART: [kat] SHA2-256
901,281 UART: [kat] SHA2-384
903,952 UART: [kat] SHA2-512-ACC
905,853 UART: [kat] ECC-384
915,480 UART: [kat] HMAC-384Kdf
920,054 UART: [kat] LMS
1,168,366 UART: [kat] --
1,169,353 UART: [cold-reset] ++
1,169,869 UART: [fht] FHT @ 0x50003400
1,172,599 UART: [idev] ++
1,172,767 UART: [idev] CDI.KEYID = 6
1,173,128 UART: [idev] SUBJECT.KEYID = 7
1,173,553 UART: [idev] UDS.KEYID = 0
1,181,334 UART: [idev] Erasing UDS.KEYID = 0
1,198,340 UART: [idev] Sha1 KeyId Algorithm
1,207,300 UART: [idev] --
1,208,171 UART: [ldev] ++
1,208,339 UART: [ldev] CDI.KEYID = 6
1,208,703 UART: [ldev] SUBJECT.KEYID = 5
1,209,130 UART: [ldev] AUTHORITY.KEYID = 7
1,209,593 UART: [ldev] FE.KEYID = 1
1,214,795 UART: [ldev] Erasing FE.KEYID = 1
1,240,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,583 UART: [ldev] --
1,279,878 UART: [fwproc] Wait for Commands...
1,280,543 UART: [fwproc] Recv command 0x46574c44
1,281,276 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,881 UART: ROM Fatal Error: 0x000B0017
1,330,038 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,249 UART: [kat] SHA2-256
891,799 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,903 UART: [kat] ++
896,055 UART: [kat] sha1
900,287 UART: [kat] SHA2-256
902,227 UART: [kat] SHA2-384
905,116 UART: [kat] SHA2-512-ACC
907,017 UART: [kat] ECC-384
916,778 UART: [kat] HMAC-384Kdf
921,270 UART: [kat] LMS
1,169,582 UART: [kat] --
1,170,661 UART: [cold-reset] ++
1,171,073 UART: [fht] FHT @ 0x50003400
1,173,639 UART: [idev] ++
1,173,807 UART: [idev] CDI.KEYID = 6
1,174,168 UART: [idev] SUBJECT.KEYID = 7
1,174,593 UART: [idev] UDS.KEYID = 0
1,182,586 UART: [idev] Erasing UDS.KEYID = 0
1,199,550 UART: [idev] Sha1 KeyId Algorithm
1,208,442 UART: [idev] --
1,209,571 UART: [ldev] ++
1,209,739 UART: [ldev] CDI.KEYID = 6
1,210,103 UART: [ldev] SUBJECT.KEYID = 5
1,210,530 UART: [ldev] AUTHORITY.KEYID = 7
1,210,993 UART: [ldev] FE.KEYID = 1
1,216,177 UART: [ldev] Erasing FE.KEYID = 1
1,242,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,513 UART: [ldev] --
1,281,946 UART: [fwproc] Wait for Commands...
1,282,699 UART: [fwproc] Recv command 0x46574c44
1,283,432 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,059 UART: ROM Fatal Error: 0x000B0017
1,331,216 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,387 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,141 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,280 UART: [kat] SHA2-256
890,830 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,934 UART: [kat] ++
895,086 UART: [kat] sha1
899,284 UART: [kat] SHA2-256
901,224 UART: [kat] SHA2-384
904,053 UART: [kat] SHA2-512-ACC
905,954 UART: [kat] ECC-384
915,757 UART: [kat] HMAC-384Kdf
920,441 UART: [kat] LMS
1,168,753 UART: [kat] --
1,169,664 UART: [cold-reset] ++
1,170,004 UART: [fht] FHT @ 0x50003400
1,172,758 UART: [idev] ++
1,172,926 UART: [idev] CDI.KEYID = 6
1,173,287 UART: [idev] SUBJECT.KEYID = 7
1,173,712 UART: [idev] UDS.KEYID = 0
1,181,325 UART: [idev] Erasing UDS.KEYID = 0
1,197,709 UART: [idev] Sha1 KeyId Algorithm
1,206,689 UART: [idev] --
1,207,778 UART: [ldev] ++
1,207,946 UART: [ldev] CDI.KEYID = 6
1,208,310 UART: [ldev] SUBJECT.KEYID = 5
1,208,737 UART: [ldev] AUTHORITY.KEYID = 7
1,209,200 UART: [ldev] FE.KEYID = 1
1,214,690 UART: [ldev] Erasing FE.KEYID = 1
1,240,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,702 UART: [ldev] --
1,280,065 UART: [fwproc] Wait for Commands...
1,280,640 UART: [fwproc] Recv command 0x46574c44
1,281,373 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,622 UART: ROM Fatal Error: 0x000B0017
1,329,779 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,870 UART: [state] LifecycleState = Unprovisioned
86,525 UART: [state] DebugLocked = No
87,013 UART: [state] WD Timer not started. Device not locked for debugging
88,296 UART: [kat] SHA2-256
891,846 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,950 UART: [kat] ++
896,102 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,887 UART: [kat] SHA2-512-ACC
906,788 UART: [kat] ECC-384
916,645 UART: [kat] HMAC-384Kdf
921,229 UART: [kat] LMS
1,169,541 UART: [kat] --
1,170,394 UART: [cold-reset] ++
1,170,890 UART: [fht] FHT @ 0x50003400
1,173,522 UART: [idev] ++
1,173,690 UART: [idev] CDI.KEYID = 6
1,174,051 UART: [idev] SUBJECT.KEYID = 7
1,174,476 UART: [idev] UDS.KEYID = 0
1,182,163 UART: [idev] Erasing UDS.KEYID = 0
1,199,483 UART: [idev] Sha1 KeyId Algorithm
1,208,331 UART: [idev] --
1,209,410 UART: [ldev] ++
1,209,578 UART: [ldev] CDI.KEYID = 6
1,209,942 UART: [ldev] SUBJECT.KEYID = 5
1,210,369 UART: [ldev] AUTHORITY.KEYID = 7
1,210,832 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,242,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,602 UART: [ldev] --
1,282,035 UART: [fwproc] Wait for Commands...
1,282,716 UART: [fwproc] Recv command 0x46574c44
1,283,449 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,850 UART: ROM Fatal Error: 0x000B0017
1,331,007 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,128 UART: [kat] ++
895,280 UART: [kat] sha1
899,452 UART: [kat] SHA2-256
901,392 UART: [kat] SHA2-384
903,979 UART: [kat] SHA2-512-ACC
905,880 UART: [kat] ECC-384
915,807 UART: [kat] HMAC-384Kdf
920,433 UART: [kat] LMS
1,168,745 UART: [kat] --
1,169,738 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,766 UART: [idev] ++
1,172,934 UART: [idev] CDI.KEYID = 6
1,173,295 UART: [idev] SUBJECT.KEYID = 7
1,173,720 UART: [idev] UDS.KEYID = 0
1,181,935 UART: [idev] Erasing UDS.KEYID = 0
1,198,889 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,215,326 UART: [ldev] Erasing FE.KEYID = 1
1,241,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,316 UART: [ldev] --
1,280,599 UART: [fwproc] Wait for Commands...
1,281,216 UART: [fwproc] Recv command 0x46574c44
1,281,949 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,204 UART: ROM Fatal Error: 0x000B0017
1,330,361 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,036 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,778 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,548 UART: [kat] LMS
1,168,860 UART: [kat] --
1,169,575 UART: [cold-reset] ++
1,170,021 UART: [fht] FHT @ 0x50003400
1,172,631 UART: [idev] ++
1,172,799 UART: [idev] CDI.KEYID = 6
1,173,160 UART: [idev] SUBJECT.KEYID = 7
1,173,585 UART: [idev] UDS.KEYID = 0
1,181,768 UART: [idev] Erasing UDS.KEYID = 0
1,199,136 UART: [idev] Sha1 KeyId Algorithm
1,207,876 UART: [idev] --
1,208,771 UART: [ldev] ++
1,208,939 UART: [ldev] CDI.KEYID = 6
1,209,303 UART: [ldev] SUBJECT.KEYID = 5
1,209,730 UART: [ldev] AUTHORITY.KEYID = 7
1,210,193 UART: [ldev] FE.KEYID = 1
1,215,211 UART: [ldev] Erasing FE.KEYID = 1
1,241,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,471 UART: [ldev] --
1,280,724 UART: [fwproc] Wait for Commands...
1,281,355 UART: [fwproc] Recv command 0x46574c44
1,282,088 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,099 UART: ROM Fatal Error: 0x000B0017
1,330,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,947 UART: [kat] SHA2-256
901,887 UART: [kat] SHA2-384
904,712 UART: [kat] SHA2-512-ACC
906,613 UART: [kat] ECC-384
916,392 UART: [kat] HMAC-384Kdf
920,884 UART: [kat] LMS
1,169,196 UART: [kat] --
1,170,143 UART: [cold-reset] ++
1,170,619 UART: [fht] FHT @ 0x50003400
1,173,381 UART: [idev] ++
1,173,549 UART: [idev] CDI.KEYID = 6
1,173,910 UART: [idev] SUBJECT.KEYID = 7
1,174,335 UART: [idev] UDS.KEYID = 0
1,182,266 UART: [idev] Erasing UDS.KEYID = 0
1,199,590 UART: [idev] Sha1 KeyId Algorithm
1,208,460 UART: [idev] --
1,209,655 UART: [ldev] ++
1,209,823 UART: [ldev] CDI.KEYID = 6
1,210,187 UART: [ldev] SUBJECT.KEYID = 5
1,210,614 UART: [ldev] AUTHORITY.KEYID = 7
1,211,077 UART: [ldev] FE.KEYID = 1
1,216,327 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,545 UART: [ldev] --
1,281,994 UART: [fwproc] Wait for Commands...
1,282,599 UART: [fwproc] Recv command 0x46574c44
1,283,332 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,043 UART: ROM Fatal Error: 0x000B0017
1,331,200 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,657 UART: [kat] ++
895,809 UART: [kat] sha1
900,029 UART: [kat] SHA2-256
901,969 UART: [kat] SHA2-384
904,710 UART: [kat] SHA2-512-ACC
906,611 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
920,964 UART: [kat] LMS
1,169,276 UART: [kat] --
1,170,291 UART: [cold-reset] ++
1,170,815 UART: [fht] FHT @ 0x50003400
1,173,323 UART: [idev] ++
1,173,491 UART: [idev] CDI.KEYID = 6
1,173,852 UART: [idev] SUBJECT.KEYID = 7
1,174,277 UART: [idev] UDS.KEYID = 0
1,182,514 UART: [idev] Erasing UDS.KEYID = 0
1,199,722 UART: [idev] Sha1 KeyId Algorithm
1,208,684 UART: [idev] --
1,209,587 UART: [ldev] ++
1,209,755 UART: [ldev] CDI.KEYID = 6
1,210,119 UART: [ldev] SUBJECT.KEYID = 5
1,210,546 UART: [ldev] AUTHORITY.KEYID = 7
1,211,009 UART: [ldev] FE.KEYID = 1
1,216,267 UART: [ldev] Erasing FE.KEYID = 1
1,242,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,659 UART: [ldev] --
1,282,078 UART: [fwproc] Wait for Commands...
1,282,791 UART: [fwproc] Recv command 0x46574c44
1,283,524 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,281 UART: ROM Fatal Error: 0x000B0017
1,331,438 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,805 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
2,033,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,689 UART:
2,183,074 UART: Running Caliptra ROM ...
2,184,287 UART:
2,184,471 UART: [state] CFI Enabled
2,185,452 UART: [state] LifecycleState = Unprovisioned
2,187,112 UART: [state] DebugLocked = No
2,188,226 UART: [state] WD Timer not started. Device not locked for debugging
2,190,708 UART: [kat] SHA2-256
2,191,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,403 UART: [kat] ++
2,194,863 UART: [kat] sha1
2,195,386 UART: [kat] SHA2-256
2,196,133 UART: [kat] SHA2-384
2,196,804 UART: [kat] SHA2-512-ACC
2,197,692 UART: [kat] ECC-384
2,948,912 UART: [kat] HMAC-384Kdf
2,973,570 UART: [kat] LMS
3,450,065 UART: [kat] --
3,452,622 UART: [cold-reset] ++
3,453,859 UART: [fht] FHT @ 0x50003400
3,465,272 UART: [idev] ++
3,465,839 UART: [idev] CDI.KEYID = 6
3,466,858 UART: [idev] SUBJECT.KEYID = 7
3,468,023 UART: [idev] UDS.KEYID = 0
3,502,525 UART: [idev] Erasing UDS.KEYID = 0
5,988,976 UART: [idev] Sha1 KeyId Algorithm
6,011,993 UART: [idev] --
6,017,023 UART: [ldev] ++
6,017,603 UART: [ldev] CDI.KEYID = 6
6,018,523 UART: [ldev] SUBJECT.KEYID = 5
6,019,688 UART: [ldev] AUTHORITY.KEYID = 7
6,020,983 UART: [ldev] FE.KEYID = 1
6,060,594 UART: [ldev] Erasing FE.KEYID = 1
8,565,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,613 UART: [ldev] --
10,375,869 UART: [fwproc] Wait for Commands...
10,377,972 UART: [fwproc] Recv command 0x46574c44
10,379,979 UART: [fwproc] Recv'd Img size: 118548 bytes
12,451,409 UART: ROM Fatal Error: 0x000B003B
12,454,641 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
2,041,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,315,514 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
2,034,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,184,034 UART:
2,184,464 UART: Running Caliptra ROM ...
2,185,629 UART:
2,185,803 UART: [state] CFI Enabled
2,186,756 UART: [state] LifecycleState = Unprovisioned
2,188,402 UART: [state] DebugLocked = No
2,189,514 UART: [state] WD Timer not started. Device not locked for debugging
2,191,982 UART: [kat] SHA2-256
2,192,645 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,195,650 UART: [kat] ++
2,196,100 UART: [kat] sha1
2,196,608 UART: [kat] SHA2-256
2,197,262 UART: [kat] SHA2-384
2,197,914 UART: [kat] SHA2-512-ACC
2,198,803 UART: [kat] ECC-384
3,279,410 UART: [kat] HMAC-384Kdf
3,291,576 UART: [kat] LMS
3,768,120 UART: [kat] --
3,773,731 UART: [cold-reset] ++
3,774,964 UART: [fht] FHT @ 0x50003400
3,786,595 UART: [idev] ++
3,787,162 UART: [idev] CDI.KEYID = 6
3,788,093 UART: [idev] SUBJECT.KEYID = 7
3,789,359 UART: [idev] UDS.KEYID = 0
3,804,818 UART: [idev] Erasing UDS.KEYID = 0
6,264,047 UART: [idev] Sha1 KeyId Algorithm
6,287,543 UART: [idev] --
6,292,262 UART: [ldev] ++
6,292,832 UART: [ldev] CDI.KEYID = 6
6,293,803 UART: [ldev] SUBJECT.KEYID = 5
6,294,957 UART: [ldev] AUTHORITY.KEYID = 7
6,296,240 UART: [ldev] FE.KEYID = 1
6,304,881 UART: [ldev] Erasing FE.KEYID = 1
8,783,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,652 UART: [ldev] --
10,577,022 UART: [fwproc] Wait for Commands...
10,579,132 UART: [fwproc] Recv command 0x46574c44
10,581,176 UART: [fwproc] Recv'd Img size: 118548 bytes
12,649,373 UART: ROM Fatal Error: 0x000B003B
12,652,654 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
2,034,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,545,073 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,286 UART: [kat] ++
895,438 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
915,897 UART: [kat] HMAC-384Kdf
920,479 UART: [kat] LMS
1,168,791 UART: [kat] --
1,169,634 UART: [cold-reset] ++
1,170,018 UART: [fht] FHT @ 0x50003400
1,172,688 UART: [idev] ++
1,172,856 UART: [idev] CDI.KEYID = 6
1,173,217 UART: [idev] SUBJECT.KEYID = 7
1,173,642 UART: [idev] UDS.KEYID = 0
1,181,703 UART: [idev] Erasing UDS.KEYID = 0
1,199,133 UART: [idev] Sha1 KeyId Algorithm
1,207,875 UART: [idev] --
1,208,924 UART: [ldev] ++
1,209,092 UART: [ldev] CDI.KEYID = 6
1,209,456 UART: [ldev] SUBJECT.KEYID = 5
1,209,883 UART: [ldev] AUTHORITY.KEYID = 7
1,210,346 UART: [ldev] FE.KEYID = 1
1,215,394 UART: [ldev] Erasing FE.KEYID = 1
1,242,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,192 UART: [ldev] --
1,281,533 UART: [fwproc] Wait for Commands...
1,282,218 UART: [fwproc] Recv command 0x46574c44
1,282,951 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,154 UART: ROM Fatal Error: 0x000B003B
1,330,313 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,510 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
916,092 UART: [kat] HMAC-384Kdf
920,802 UART: [kat] LMS
1,169,114 UART: [kat] --
1,170,057 UART: [cold-reset] ++
1,170,637 UART: [fht] FHT @ 0x50003400
1,173,221 UART: [idev] ++
1,173,389 UART: [idev] CDI.KEYID = 6
1,173,750 UART: [idev] SUBJECT.KEYID = 7
1,174,175 UART: [idev] UDS.KEYID = 0
1,181,956 UART: [idev] Erasing UDS.KEYID = 0
1,199,356 UART: [idev] Sha1 KeyId Algorithm
1,208,130 UART: [idev] --
1,209,093 UART: [ldev] ++
1,209,261 UART: [ldev] CDI.KEYID = 6
1,209,625 UART: [ldev] SUBJECT.KEYID = 5
1,210,052 UART: [ldev] AUTHORITY.KEYID = 7
1,210,515 UART: [ldev] FE.KEYID = 1
1,215,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,201 UART: [ldev] --
1,281,570 UART: [fwproc] Wait for Commands...
1,282,223 UART: [fwproc] Recv command 0x46574c44
1,282,956 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,427 UART: ROM Fatal Error: 0x000B003B
1,330,586 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,283 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,708 UART: [state] LifecycleState = Unprovisioned
86,363 UART: [state] DebugLocked = No
86,901 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
891,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,685 UART: [kat] SHA2-512-ACC
906,586 UART: [kat] ECC-384
916,351 UART: [kat] HMAC-384Kdf
920,905 UART: [kat] LMS
1,169,217 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,464 UART: [fht] FHT @ 0x50003400
1,173,272 UART: [idev] ++
1,173,440 UART: [idev] CDI.KEYID = 6
1,173,801 UART: [idev] SUBJECT.KEYID = 7
1,174,226 UART: [idev] UDS.KEYID = 0
1,182,377 UART: [idev] Erasing UDS.KEYID = 0
1,199,275 UART: [idev] Sha1 KeyId Algorithm
1,208,133 UART: [idev] --
1,209,274 UART: [ldev] ++
1,209,442 UART: [ldev] CDI.KEYID = 6
1,209,806 UART: [ldev] SUBJECT.KEYID = 5
1,210,233 UART: [ldev] AUTHORITY.KEYID = 7
1,210,696 UART: [ldev] FE.KEYID = 1
1,215,844 UART: [ldev] Erasing FE.KEYID = 1
1,242,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,046 UART: [ldev] --
1,281,411 UART: [fwproc] Wait for Commands...
1,282,132 UART: [fwproc] Recv command 0x46574c44
1,282,865 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,204 UART: ROM Fatal Error: 0x000B003B
1,331,363 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,372 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,787 UART: [state] LifecycleState = Unprovisioned
86,442 UART: [state] DebugLocked = No
87,166 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [kat] SHA2-256
891,871 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,975 UART: [kat] ++
896,127 UART: [kat] sha1
900,339 UART: [kat] SHA2-256
902,279 UART: [kat] SHA2-384
905,048 UART: [kat] SHA2-512-ACC
906,949 UART: [kat] ECC-384
916,332 UART: [kat] HMAC-384Kdf
921,072 UART: [kat] LMS
1,169,384 UART: [kat] --
1,170,289 UART: [cold-reset] ++
1,170,659 UART: [fht] FHT @ 0x50003400
1,173,363 UART: [idev] ++
1,173,531 UART: [idev] CDI.KEYID = 6
1,173,892 UART: [idev] SUBJECT.KEYID = 7
1,174,317 UART: [idev] UDS.KEYID = 0
1,182,456 UART: [idev] Erasing UDS.KEYID = 0
1,199,522 UART: [idev] Sha1 KeyId Algorithm
1,208,478 UART: [idev] --
1,209,425 UART: [ldev] ++
1,209,593 UART: [ldev] CDI.KEYID = 6
1,209,957 UART: [ldev] SUBJECT.KEYID = 5
1,210,384 UART: [ldev] AUTHORITY.KEYID = 7
1,210,847 UART: [ldev] FE.KEYID = 1
1,216,183 UART: [ldev] Erasing FE.KEYID = 1
1,242,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,415 UART: [ldev] --
1,281,692 UART: [fwproc] Wait for Commands...
1,282,375 UART: [fwproc] Recv command 0x46574c44
1,283,108 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,423 UART: ROM Fatal Error: 0x000B003B
1,332,582 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,083 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,160 UART: [kat] ++
895,312 UART: [kat] sha1
899,642 UART: [kat] SHA2-256
901,582 UART: [kat] SHA2-384
904,411 UART: [kat] SHA2-512-ACC
906,312 UART: [kat] ECC-384
915,767 UART: [kat] HMAC-384Kdf
920,153 UART: [kat] LMS
1,168,465 UART: [kat] --
1,169,472 UART: [cold-reset] ++
1,169,880 UART: [fht] FHT @ 0x50003400
1,172,694 UART: [idev] ++
1,172,862 UART: [idev] CDI.KEYID = 6
1,173,223 UART: [idev] SUBJECT.KEYID = 7
1,173,648 UART: [idev] UDS.KEYID = 0
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,197,801 UART: [idev] Sha1 KeyId Algorithm
1,206,543 UART: [idev] --
1,207,554 UART: [ldev] ++
1,207,722 UART: [ldev] CDI.KEYID = 6
1,208,086 UART: [ldev] SUBJECT.KEYID = 5
1,208,513 UART: [ldev] AUTHORITY.KEYID = 7
1,208,976 UART: [ldev] FE.KEYID = 1
1,214,402 UART: [ldev] Erasing FE.KEYID = 1
1,240,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,004 UART: [ldev] --
1,279,297 UART: [fwproc] Wait for Commands...
1,279,902 UART: [fwproc] Recv command 0x46574c44
1,280,635 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,698 UART: ROM Fatal Error: 0x000B003B
1,328,857 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,712 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,731 UART: [kat] ++
895,883 UART: [kat] sha1
900,155 UART: [kat] SHA2-256
902,095 UART: [kat] SHA2-384
904,840 UART: [kat] SHA2-512-ACC
906,741 UART: [kat] ECC-384
916,698 UART: [kat] HMAC-384Kdf
921,382 UART: [kat] LMS
1,169,694 UART: [kat] --
1,170,535 UART: [cold-reset] ++
1,170,981 UART: [fht] FHT @ 0x50003400
1,173,841 UART: [idev] ++
1,174,009 UART: [idev] CDI.KEYID = 6
1,174,370 UART: [idev] SUBJECT.KEYID = 7
1,174,795 UART: [idev] UDS.KEYID = 0
1,182,690 UART: [idev] Erasing UDS.KEYID = 0
1,199,082 UART: [idev] Sha1 KeyId Algorithm
1,208,062 UART: [idev] --
1,209,177 UART: [ldev] ++
1,209,345 UART: [ldev] CDI.KEYID = 6
1,209,709 UART: [ldev] SUBJECT.KEYID = 5
1,210,136 UART: [ldev] AUTHORITY.KEYID = 7
1,210,599 UART: [ldev] FE.KEYID = 1
1,215,963 UART: [ldev] Erasing FE.KEYID = 1
1,242,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,589 UART: [ldev] --
1,281,790 UART: [fwproc] Wait for Commands...
1,282,611 UART: [fwproc] Recv command 0x46574c44
1,283,344 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,605 UART: ROM Fatal Error: 0x000B003B
1,331,764 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,765 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
2,032,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,076 UART:
2,182,464 UART: Running Caliptra ROM ...
2,183,641 UART:
2,183,824 UART: [state] CFI Enabled
2,184,803 UART: [state] LifecycleState = Unprovisioned
2,186,444 UART: [state] DebugLocked = No
2,187,557 UART: [state] WD Timer not started. Device not locked for debugging
2,190,023 UART: [kat] SHA2-256
2,190,699 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,193,715 UART: [kat] ++
2,194,174 UART: [kat] sha1
2,194,693 UART: [kat] SHA2-256
2,195,438 UART: [kat] SHA2-384
2,196,117 UART: [kat] SHA2-512-ACC
2,197,008 UART: [kat] ECC-384
2,925,287 UART: [kat] HMAC-384Kdf
2,949,664 UART: [kat] LMS
3,426,166 UART: [kat] --
3,430,182 UART: [cold-reset] ++
3,432,338 UART: [fht] FHT @ 0x50003400
3,442,579 UART: [idev] ++
3,443,189 UART: [idev] CDI.KEYID = 6
3,444,120 UART: [idev] SUBJECT.KEYID = 7
3,445,342 UART: [idev] UDS.KEYID = 0
3,479,688 UART: [idev] Erasing UDS.KEYID = 0
5,967,190 UART: [idev] Sha1 KeyId Algorithm
5,992,204 UART: [idev] --
5,995,663 UART: [ldev] ++
5,996,234 UART: [ldev] CDI.KEYID = 6
5,997,179 UART: [ldev] SUBJECT.KEYID = 5
5,998,396 UART: [ldev] AUTHORITY.KEYID = 7
5,999,761 UART: [ldev] FE.KEYID = 1
6,036,753 UART: [ldev] Erasing FE.KEYID = 1
8,545,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,406 UART: [ldev] --
10,350,970 UART: [fwproc] Wait for Commands...
10,352,694 UART: [fwproc] Recv command 0x46574c44
10,354,714 UART: [fwproc] Recv'd Img size: 118548 bytes
12,416,811 UART: ROM Fatal Error: 0x000B0010
12,420,099 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
2,025,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,322,836 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
2,028,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,066 UART:
2,178,484 UART: Running Caliptra ROM ...
2,179,556 UART:
2,179,703 UART: [state] CFI Enabled
2,180,678 UART: [state] LifecycleState = Unprovisioned
2,182,312 UART: [state] DebugLocked = No
2,183,332 UART: [state] WD Timer not started. Device not locked for debugging
2,186,010 UART: [kat] SHA2-256
2,186,686 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,702 UART: [kat] ++
2,190,195 UART: [kat] sha1
2,190,703 UART: [kat] SHA2-256
2,191,436 UART: [kat] SHA2-384
2,192,098 UART: [kat] SHA2-512-ACC
2,192,927 UART: [kat] ECC-384
3,281,671 UART: [kat] HMAC-384Kdf
3,295,669 UART: [kat] LMS
3,772,152 UART: [kat] --
3,777,240 UART: [cold-reset] ++
3,779,770 UART: [fht] FHT @ 0x50003400
3,792,311 UART: [idev] ++
3,792,916 UART: [idev] CDI.KEYID = 6
3,793,859 UART: [idev] SUBJECT.KEYID = 7
3,795,128 UART: [idev] UDS.KEYID = 0
3,814,043 UART: [idev] Erasing UDS.KEYID = 0
6,277,020 UART: [idev] Sha1 KeyId Algorithm
6,301,727 UART: [idev] --
6,307,664 UART: [ldev] ++
6,308,290 UART: [ldev] CDI.KEYID = 6
6,309,200 UART: [ldev] SUBJECT.KEYID = 5
6,310,410 UART: [ldev] AUTHORITY.KEYID = 7
6,311,639 UART: [ldev] FE.KEYID = 1
6,321,362 UART: [ldev] Erasing FE.KEYID = 1
8,801,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,520,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,536,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,567,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,590,680 UART: [ldev] --
10,596,571 UART: [fwproc] Wait for Commands...
10,599,378 UART: [fwproc] Recv command 0x46574c44
10,601,389 UART: [fwproc] Recv'd Img size: 118548 bytes
12,658,334 UART: ROM Fatal Error: 0x000B0010
12,661,618 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,034,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,528,125 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,638 UART: [state] LifecycleState = Unprovisioned
85,293 UART: [state] DebugLocked = No
85,877 UART: [state] WD Timer not started. Device not locked for debugging
87,164 UART: [kat] SHA2-256
890,714 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,818 UART: [kat] ++
894,970 UART: [kat] sha1
899,230 UART: [kat] SHA2-256
901,170 UART: [kat] SHA2-384
903,873 UART: [kat] SHA2-512-ACC
905,774 UART: [kat] ECC-384
915,733 UART: [kat] HMAC-384Kdf
920,509 UART: [kat] LMS
1,168,821 UART: [kat] --
1,169,600 UART: [cold-reset] ++
1,170,028 UART: [fht] FHT @ 0x50003400
1,172,674 UART: [idev] ++
1,172,842 UART: [idev] CDI.KEYID = 6
1,173,203 UART: [idev] SUBJECT.KEYID = 7
1,173,628 UART: [idev] UDS.KEYID = 0
1,181,365 UART: [idev] Erasing UDS.KEYID = 0
1,198,173 UART: [idev] Sha1 KeyId Algorithm
1,207,097 UART: [idev] --
1,208,266 UART: [ldev] ++
1,208,434 UART: [ldev] CDI.KEYID = 6
1,208,798 UART: [ldev] SUBJECT.KEYID = 5
1,209,225 UART: [ldev] AUTHORITY.KEYID = 7
1,209,688 UART: [ldev] FE.KEYID = 1
1,214,930 UART: [ldev] Erasing FE.KEYID = 1
1,241,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,066 UART: [ldev] --
1,280,425 UART: [fwproc] Wait for Commands...
1,281,068 UART: [fwproc] Recv command 0x46574c44
1,281,801 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,239 UART: ROM Fatal Error: 0x000B0010
1,325,396 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,769 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,346 UART: [kat] SHA2-512-ACC
906,247 UART: [kat] ECC-384
915,874 UART: [kat] HMAC-384Kdf
920,454 UART: [kat] LMS
1,168,766 UART: [kat] --
1,169,901 UART: [cold-reset] ++
1,170,345 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,181,932 UART: [idev] Erasing UDS.KEYID = 0
1,199,428 UART: [idev] Sha1 KeyId Algorithm
1,208,394 UART: [idev] --
1,209,305 UART: [ldev] ++
1,209,473 UART: [ldev] CDI.KEYID = 6
1,209,837 UART: [ldev] SUBJECT.KEYID = 5
1,210,264 UART: [ldev] AUTHORITY.KEYID = 7
1,210,727 UART: [ldev] FE.KEYID = 1
1,215,645 UART: [ldev] Erasing FE.KEYID = 1
1,241,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,151 UART: [ldev] --
1,280,404 UART: [fwproc] Wait for Commands...
1,281,211 UART: [fwproc] Recv command 0x46574c44
1,281,944 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,370 UART: ROM Fatal Error: 0x000B0010
1,325,527 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,248 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,244 UART: [kat] ++
895,396 UART: [kat] sha1
899,656 UART: [kat] SHA2-256
901,596 UART: [kat] SHA2-384
904,261 UART: [kat] SHA2-512-ACC
906,162 UART: [kat] ECC-384
915,885 UART: [kat] HMAC-384Kdf
920,571 UART: [kat] LMS
1,168,883 UART: [kat] --
1,169,778 UART: [cold-reset] ++
1,170,302 UART: [fht] FHT @ 0x50003400
1,172,892 UART: [idev] ++
1,173,060 UART: [idev] CDI.KEYID = 6
1,173,421 UART: [idev] SUBJECT.KEYID = 7
1,173,846 UART: [idev] UDS.KEYID = 0
1,181,633 UART: [idev] Erasing UDS.KEYID = 0
1,198,269 UART: [idev] Sha1 KeyId Algorithm
1,207,185 UART: [idev] --
1,208,220 UART: [ldev] ++
1,208,388 UART: [ldev] CDI.KEYID = 6
1,208,752 UART: [ldev] SUBJECT.KEYID = 5
1,209,179 UART: [ldev] AUTHORITY.KEYID = 7
1,209,642 UART: [ldev] FE.KEYID = 1
1,214,806 UART: [ldev] Erasing FE.KEYID = 1
1,241,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,286 UART: [ldev] --
1,280,615 UART: [fwproc] Wait for Commands...
1,281,210 UART: [fwproc] Recv command 0x46574c44
1,281,943 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,005 UART: ROM Fatal Error: 0x000B0010
1,326,162 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,203 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
87,056 UART: [state] WD Timer not started. Device not locked for debugging
88,361 UART: [kat] SHA2-256
891,911 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,015 UART: [kat] ++
896,167 UART: [kat] sha1
900,351 UART: [kat] SHA2-256
902,291 UART: [kat] SHA2-384
904,936 UART: [kat] SHA2-512-ACC
906,837 UART: [kat] ECC-384
916,404 UART: [kat] HMAC-384Kdf
921,146 UART: [kat] LMS
1,169,458 UART: [kat] --
1,170,353 UART: [cold-reset] ++
1,170,715 UART: [fht] FHT @ 0x50003400
1,173,303 UART: [idev] ++
1,173,471 UART: [idev] CDI.KEYID = 6
1,173,832 UART: [idev] SUBJECT.KEYID = 7
1,174,257 UART: [idev] UDS.KEYID = 0
1,182,628 UART: [idev] Erasing UDS.KEYID = 0
1,199,618 UART: [idev] Sha1 KeyId Algorithm
1,208,404 UART: [idev] --
1,209,641 UART: [ldev] ++
1,209,809 UART: [ldev] CDI.KEYID = 6
1,210,173 UART: [ldev] SUBJECT.KEYID = 5
1,210,600 UART: [ldev] AUTHORITY.KEYID = 7
1,211,063 UART: [ldev] FE.KEYID = 1
1,216,183 UART: [ldev] Erasing FE.KEYID = 1
1,242,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,293 UART: [ldev] --
1,281,640 UART: [fwproc] Wait for Commands...
1,282,449 UART: [fwproc] Recv command 0x46574c44
1,283,182 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,396 UART: ROM Fatal Error: 0x000B0010
1,326,553 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,558 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,367 UART: [kat] SHA2-512-ACC
906,268 UART: [kat] ECC-384
915,585 UART: [kat] HMAC-384Kdf
920,173 UART: [kat] LMS
1,168,485 UART: [kat] --
1,169,332 UART: [cold-reset] ++
1,169,838 UART: [fht] FHT @ 0x50003400
1,172,384 UART: [idev] ++
1,172,552 UART: [idev] CDI.KEYID = 6
1,172,913 UART: [idev] SUBJECT.KEYID = 7
1,173,338 UART: [idev] UDS.KEYID = 0
1,181,617 UART: [idev] Erasing UDS.KEYID = 0
1,198,689 UART: [idev] Sha1 KeyId Algorithm
1,207,435 UART: [idev] --
1,208,328 UART: [ldev] ++
1,208,496 UART: [ldev] CDI.KEYID = 6
1,208,860 UART: [ldev] SUBJECT.KEYID = 5
1,209,287 UART: [ldev] AUTHORITY.KEYID = 7
1,209,750 UART: [ldev] FE.KEYID = 1
1,215,230 UART: [ldev] Erasing FE.KEYID = 1
1,241,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,404 UART: [ldev] --
1,280,725 UART: [fwproc] Wait for Commands...
1,281,328 UART: [fwproc] Recv command 0x46574c44
1,282,061 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,215 UART: ROM Fatal Error: 0x000B0010
1,325,372 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,995 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,595 UART: [kat] SHA2-256
891,145 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,412 UART: [kat] SHA2-512-ACC
906,313 UART: [kat] ECC-384
916,208 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,539 UART: [fht] FHT @ 0x50003400
1,173,097 UART: [idev] ++
1,173,265 UART: [idev] CDI.KEYID = 6
1,173,626 UART: [idev] SUBJECT.KEYID = 7
1,174,051 UART: [idev] UDS.KEYID = 0
1,182,372 UART: [idev] Erasing UDS.KEYID = 0
1,199,516 UART: [idev] Sha1 KeyId Algorithm
1,208,546 UART: [idev] --
1,209,563 UART: [ldev] ++
1,209,731 UART: [ldev] CDI.KEYID = 6
1,210,095 UART: [ldev] SUBJECT.KEYID = 5
1,210,522 UART: [ldev] AUTHORITY.KEYID = 7
1,210,985 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,445 UART: [ldev] --
1,281,826 UART: [fwproc] Wait for Commands...
1,282,465 UART: [fwproc] Recv command 0x46574c44
1,283,198 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,732 UART: ROM Fatal Error: 0x000B0010
1,326,889 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,130 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
2,030,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,180,143 UART:
2,180,541 UART: Running Caliptra ROM ...
2,181,625 UART:
2,181,785 UART: [state] CFI Enabled
2,182,762 UART: [state] LifecycleState = Unprovisioned
2,184,403 UART: [state] DebugLocked = No
2,185,433 UART: [state] WD Timer not started. Device not locked for debugging
2,187,886 UART: [kat] SHA2-256
2,188,559 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,191,575 UART: [kat] ++
2,192,071 UART: [kat] sha1
2,192,597 UART: [kat] SHA2-256
2,193,342 UART: [kat] SHA2-384
2,194,017 UART: [kat] SHA2-512-ACC
2,194,873 UART: [kat] ECC-384
2,948,523 UART: [kat] HMAC-384Kdf
2,973,401 UART: [kat] LMS
3,449,891 UART: [kat] --
3,454,313 UART: [cold-reset] ++
3,455,764 UART: [fht] FHT @ 0x50003400
3,465,665 UART: [idev] ++
3,466,239 UART: [idev] CDI.KEYID = 6
3,467,176 UART: [idev] SUBJECT.KEYID = 7
3,468,447 UART: [idev] UDS.KEYID = 0
3,502,960 UART: [idev] Erasing UDS.KEYID = 0
5,987,255 UART: [idev] Sha1 KeyId Algorithm
6,011,407 UART: [idev] --
6,016,274 UART: [ldev] ++
6,016,852 UART: [ldev] CDI.KEYID = 6
6,017,772 UART: [ldev] SUBJECT.KEYID = 5
6,018,991 UART: [ldev] AUTHORITY.KEYID = 7
6,020,233 UART: [ldev] FE.KEYID = 1
6,058,385 UART: [ldev] Erasing FE.KEYID = 1
8,566,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,063 UART: [ldev] --
10,375,801 UART: [fwproc] Wait for Commands...
10,378,336 UART: [fwproc] Recv command 0x46574c44
10,380,354 UART: [fwproc] Recv'd Img size: 118548 bytes
12,450,861 UART: ROM Fatal Error: 0x000B0012
12,454,083 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,028,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,328,106 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,030,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,180,398 UART:
2,180,782 UART: Running Caliptra ROM ...
2,181,858 UART:
2,182,008 UART: [state] CFI Enabled
2,182,982 UART: [state] LifecycleState = Unprovisioned
2,184,616 UART: [state] DebugLocked = No
2,185,641 UART: [state] WD Timer not started. Device not locked for debugging
2,188,093 UART: [kat] SHA2-256
2,188,758 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,191,747 UART: [kat] ++
2,192,192 UART: [kat] sha1
2,192,698 UART: [kat] SHA2-256
2,193,374 UART: [kat] SHA2-384
2,194,028 UART: [kat] SHA2-512-ACC
2,194,854 UART: [kat] ECC-384
3,278,437 UART: [kat] HMAC-384Kdf
3,291,048 UART: [kat] LMS
3,767,556 UART: [kat] --
3,772,193 UART: [cold-reset] ++
3,774,279 UART: [fht] FHT @ 0x50003400
3,785,849 UART: [idev] ++
3,786,408 UART: [idev] CDI.KEYID = 6
3,787,344 UART: [idev] SUBJECT.KEYID = 7
3,788,611 UART: [idev] UDS.KEYID = 0
3,806,669 UART: [idev] Erasing UDS.KEYID = 0
6,270,237 UART: [idev] Sha1 KeyId Algorithm
6,294,216 UART: [idev] --
6,299,453 UART: [ldev] ++
6,300,098 UART: [ldev] CDI.KEYID = 6
6,301,063 UART: [ldev] SUBJECT.KEYID = 5
6,302,165 UART: [ldev] AUTHORITY.KEYID = 7
6,303,452 UART: [ldev] FE.KEYID = 1
6,313,989 UART: [ldev] Erasing FE.KEYID = 1
8,793,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,241 UART: [ldev] --
10,583,179 UART: [fwproc] Wait for Commands...
10,586,090 UART: [fwproc] Recv command 0x46574c44
10,588,085 UART: [fwproc] Recv'd Img size: 118548 bytes
12,660,459 UART: ROM Fatal Error: 0x000B0012
12,663,693 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
2,032,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,535,373 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
890,838 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,942 UART: [kat] ++
895,094 UART: [kat] sha1
899,322 UART: [kat] SHA2-256
901,262 UART: [kat] SHA2-384
904,051 UART: [kat] SHA2-512-ACC
905,952 UART: [kat] ECC-384
915,379 UART: [kat] HMAC-384Kdf
920,023 UART: [kat] LMS
1,168,335 UART: [kat] --
1,169,230 UART: [cold-reset] ++
1,169,808 UART: [fht] FHT @ 0x50003400
1,172,298 UART: [idev] ++
1,172,466 UART: [idev] CDI.KEYID = 6
1,172,827 UART: [idev] SUBJECT.KEYID = 7
1,173,252 UART: [idev] UDS.KEYID = 0
1,181,115 UART: [idev] Erasing UDS.KEYID = 0
1,198,785 UART: [idev] Sha1 KeyId Algorithm
1,207,865 UART: [idev] --
1,208,820 UART: [ldev] ++
1,208,988 UART: [ldev] CDI.KEYID = 6
1,209,352 UART: [ldev] SUBJECT.KEYID = 5
1,209,779 UART: [ldev] AUTHORITY.KEYID = 7
1,210,242 UART: [ldev] FE.KEYID = 1
1,215,394 UART: [ldev] Erasing FE.KEYID = 1
1,241,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,212 UART: [ldev] --
1,280,565 UART: [fwproc] Wait for Commands...
1,281,348 UART: [fwproc] Recv command 0x46574c44
1,282,081 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,243 UART: ROM Fatal Error: 0x000B0012
1,330,400 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,939 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,611 UART: [kat] SHA2-256
891,161 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,265 UART: [kat] ++
895,417 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,936 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,181,438 UART: [idev] Erasing UDS.KEYID = 0
1,198,396 UART: [idev] Sha1 KeyId Algorithm
1,207,306 UART: [idev] --
1,208,223 UART: [ldev] ++
1,208,391 UART: [ldev] CDI.KEYID = 6
1,208,755 UART: [ldev] SUBJECT.KEYID = 5
1,209,182 UART: [ldev] AUTHORITY.KEYID = 7
1,209,645 UART: [ldev] FE.KEYID = 1
1,214,693 UART: [ldev] Erasing FE.KEYID = 1
1,240,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,415 UART: [ldev] --
1,279,622 UART: [fwproc] Wait for Commands...
1,280,417 UART: [fwproc] Recv command 0x46574c44
1,281,150 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,252 UART: ROM Fatal Error: 0x000B0012
1,329,409 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,076 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,514 UART: [kat] SHA2-256
901,454 UART: [kat] SHA2-384
904,143 UART: [kat] SHA2-512-ACC
906,044 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,703 UART: [kat] LMS
1,169,015 UART: [kat] --
1,169,702 UART: [cold-reset] ++
1,170,190 UART: [fht] FHT @ 0x50003400
1,172,862 UART: [idev] ++
1,173,030 UART: [idev] CDI.KEYID = 6
1,173,391 UART: [idev] SUBJECT.KEYID = 7
1,173,816 UART: [idev] UDS.KEYID = 0
1,181,901 UART: [idev] Erasing UDS.KEYID = 0
1,199,019 UART: [idev] Sha1 KeyId Algorithm
1,207,991 UART: [idev] --
1,208,990 UART: [ldev] ++
1,209,158 UART: [ldev] CDI.KEYID = 6
1,209,522 UART: [ldev] SUBJECT.KEYID = 5
1,209,949 UART: [ldev] AUTHORITY.KEYID = 7
1,210,412 UART: [ldev] FE.KEYID = 1
1,215,674 UART: [ldev] Erasing FE.KEYID = 1
1,241,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,882 UART: [ldev] --
1,281,299 UART: [fwproc] Wait for Commands...
1,281,906 UART: [fwproc] Recv command 0x46574c44
1,282,639 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,519 UART: ROM Fatal Error: 0x000B0012
1,330,676 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,019 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,170,061 UART: [cold-reset] ++
1,170,413 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,181,822 UART: [idev] Erasing UDS.KEYID = 0
1,198,452 UART: [idev] Sha1 KeyId Algorithm
1,207,440 UART: [idev] --
1,208,361 UART: [ldev] ++
1,208,529 UART: [ldev] CDI.KEYID = 6
1,208,893 UART: [ldev] SUBJECT.KEYID = 5
1,209,320 UART: [ldev] AUTHORITY.KEYID = 7
1,209,783 UART: [ldev] FE.KEYID = 1
1,215,219 UART: [ldev] Erasing FE.KEYID = 1
1,241,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,499 UART: [ldev] --
1,280,832 UART: [fwproc] Wait for Commands...
1,281,553 UART: [fwproc] Recv command 0x46574c44
1,282,286 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,484 UART: ROM Fatal Error: 0x000B0012
1,329,641 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,564 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,711 UART: [kat] SHA2-512-ACC
906,612 UART: [kat] ECC-384
916,219 UART: [kat] HMAC-384Kdf
920,925 UART: [kat] LMS
1,169,237 UART: [kat] --
1,170,096 UART: [cold-reset] ++
1,170,562 UART: [fht] FHT @ 0x50003400
1,173,194 UART: [idev] ++
1,173,362 UART: [idev] CDI.KEYID = 6
1,173,723 UART: [idev] SUBJECT.KEYID = 7
1,174,148 UART: [idev] UDS.KEYID = 0
1,182,137 UART: [idev] Erasing UDS.KEYID = 0
1,198,847 UART: [idev] Sha1 KeyId Algorithm
1,207,739 UART: [idev] --
1,208,876 UART: [ldev] ++
1,209,044 UART: [ldev] CDI.KEYID = 6
1,209,408 UART: [ldev] SUBJECT.KEYID = 5
1,209,835 UART: [ldev] AUTHORITY.KEYID = 7
1,210,298 UART: [ldev] FE.KEYID = 1
1,215,372 UART: [ldev] Erasing FE.KEYID = 1
1,241,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,214 UART: [ldev] --
1,280,641 UART: [fwproc] Wait for Commands...
1,281,320 UART: [fwproc] Recv command 0x46574c44
1,282,053 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,809 UART: ROM Fatal Error: 0x000B0012
1,329,966 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,031 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,801 UART: [kat] ++
895,953 UART: [kat] sha1
900,407 UART: [kat] SHA2-256
902,347 UART: [kat] SHA2-384
905,120 UART: [kat] SHA2-512-ACC
907,021 UART: [kat] ECC-384
916,916 UART: [kat] HMAC-384Kdf
921,560 UART: [kat] LMS
1,169,872 UART: [kat] --
1,170,599 UART: [cold-reset] ++
1,171,011 UART: [fht] FHT @ 0x50003400
1,173,803 UART: [idev] ++
1,173,971 UART: [idev] CDI.KEYID = 6
1,174,332 UART: [idev] SUBJECT.KEYID = 7
1,174,757 UART: [idev] UDS.KEYID = 0
1,182,846 UART: [idev] Erasing UDS.KEYID = 0
1,199,786 UART: [idev] Sha1 KeyId Algorithm
1,208,598 UART: [idev] --
1,209,613 UART: [ldev] ++
1,209,781 UART: [ldev] CDI.KEYID = 6
1,210,145 UART: [ldev] SUBJECT.KEYID = 5
1,210,572 UART: [ldev] AUTHORITY.KEYID = 7
1,211,035 UART: [ldev] FE.KEYID = 1
1,216,245 UART: [ldev] Erasing FE.KEYID = 1
1,242,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,605 UART: [ldev] --
1,281,872 UART: [fwproc] Wait for Commands...
1,282,547 UART: [fwproc] Recv command 0x46574c44
1,283,280 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,494 UART: ROM Fatal Error: 0x000B0012
1,331,651 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,120 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
2,040,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,190,324 UART:
2,190,730 UART: Running Caliptra ROM ...
2,191,908 UART:
2,192,090 UART: [state] CFI Enabled
2,193,069 UART: [state] LifecycleState = Unprovisioned
2,194,742 UART: [state] DebugLocked = No
2,195,856 UART: [state] WD Timer not started. Device not locked for debugging
2,198,343 UART: [kat] SHA2-256
2,199,021 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,202,041 UART: [kat] ++
2,202,524 UART: [kat] sha1
2,203,080 UART: [kat] SHA2-256
2,203,752 UART: [kat] SHA2-384
2,204,415 UART: [kat] SHA2-512-ACC
2,205,249 UART: [kat] ECC-384
2,945,589 UART: [kat] HMAC-384Kdf
2,970,578 UART: [kat] LMS
3,447,057 UART: [kat] --
3,452,131 UART: [cold-reset] ++
3,453,801 UART: [fht] FHT @ 0x50003400
3,464,032 UART: [idev] ++
3,464,609 UART: [idev] CDI.KEYID = 6
3,465,633 UART: [idev] SUBJECT.KEYID = 7
3,466,797 UART: [idev] UDS.KEYID = 0
3,500,713 UART: [idev] Erasing UDS.KEYID = 0
5,982,228 UART: [idev] Sha1 KeyId Algorithm
6,005,718 UART: [idev] --
6,010,215 UART: [ldev] ++
6,010,798 UART: [ldev] CDI.KEYID = 6
6,011,692 UART: [ldev] SUBJECT.KEYID = 5
6,012,917 UART: [ldev] AUTHORITY.KEYID = 7
6,014,217 UART: [ldev] FE.KEYID = 1
6,055,540 UART: [ldev] Erasing FE.KEYID = 1
8,564,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,609 UART: [ldev] --
10,374,648 UART: [fwproc] Wait for Commands...
10,376,254 UART: [fwproc] Recv command 0x46574c44
10,378,265 UART: [fwproc] Recv'd Img size: 118548 bytes
12,448,514 UART: ROM Fatal Error: 0x000B003C
12,451,761 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
2,033,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,308,219 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,038,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,188,513 UART:
2,188,900 UART: Running Caliptra ROM ...
2,190,066 UART:
2,190,240 UART: [state] CFI Enabled
2,191,190 UART: [state] LifecycleState = Unprovisioned
2,192,846 UART: [state] DebugLocked = No
2,193,952 UART: [state] WD Timer not started. Device not locked for debugging
2,196,424 UART: [kat] SHA2-256
2,197,094 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,200,106 UART: [kat] ++
2,200,557 UART: [kat] sha1
2,201,100 UART: [kat] SHA2-256
2,201,757 UART: [kat] SHA2-384
2,202,409 UART: [kat] SHA2-512-ACC
2,203,428 UART: [kat] ECC-384
3,280,494 UART: [kat] HMAC-384Kdf
3,293,517 UART: [kat] LMS
3,769,983 UART: [kat] --
3,775,191 UART: [cold-reset] ++
3,776,638 UART: [fht] FHT @ 0x50003400
3,787,990 UART: [idev] ++
3,788,600 UART: [idev] CDI.KEYID = 6
3,789,518 UART: [idev] SUBJECT.KEYID = 7
3,790,732 UART: [idev] UDS.KEYID = 0
3,806,813 UART: [idev] Erasing UDS.KEYID = 0
6,268,676 UART: [idev] Sha1 KeyId Algorithm
6,293,044 UART: [idev] --
6,298,284 UART: [ldev] ++
6,298,851 UART: [ldev] CDI.KEYID = 6
6,299,733 UART: [ldev] SUBJECT.KEYID = 5
6,301,016 UART: [ldev] AUTHORITY.KEYID = 7
6,302,250 UART: [ldev] FE.KEYID = 1
6,312,653 UART: [ldev] Erasing FE.KEYID = 1
8,790,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,293 UART: [ldev] --
10,585,512 UART: [fwproc] Wait for Commands...
10,588,464 UART: [fwproc] Recv command 0x46574c44
10,590,458 UART: [fwproc] Recv'd Img size: 118548 bytes
12,661,910 UART: ROM Fatal Error: 0x000B003C
12,665,172 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
2,038,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,537,666 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,844 UART: [kat] SHA2-256
901,784 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
916,111 UART: [kat] HMAC-384Kdf
920,455 UART: [kat] LMS
1,168,767 UART: [kat] --
1,169,580 UART: [cold-reset] ++
1,169,966 UART: [fht] FHT @ 0x50003400
1,172,698 UART: [idev] ++
1,172,866 UART: [idev] CDI.KEYID = 6
1,173,227 UART: [idev] SUBJECT.KEYID = 7
1,173,652 UART: [idev] UDS.KEYID = 0
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,199,321 UART: [idev] Sha1 KeyId Algorithm
1,208,165 UART: [idev] --
1,209,130 UART: [ldev] ++
1,209,298 UART: [ldev] CDI.KEYID = 6
1,209,662 UART: [ldev] SUBJECT.KEYID = 5
1,210,089 UART: [ldev] AUTHORITY.KEYID = 7
1,210,552 UART: [ldev] FE.KEYID = 1
1,215,902 UART: [ldev] Erasing FE.KEYID = 1
1,241,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,500 UART: [ldev] --
1,280,733 UART: [fwproc] Wait for Commands...
1,281,372 UART: [fwproc] Recv command 0x46574c44
1,282,105 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,783 UART: ROM Fatal Error: 0x000B003C
1,330,942 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,661 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
900,117 UART: [kat] SHA2-256
902,057 UART: [kat] SHA2-384
904,902 UART: [kat] SHA2-512-ACC
906,803 UART: [kat] ECC-384
916,582 UART: [kat] HMAC-384Kdf
921,384 UART: [kat] LMS
1,169,696 UART: [kat] --
1,170,659 UART: [cold-reset] ++
1,171,207 UART: [fht] FHT @ 0x50003400
1,174,025 UART: [idev] ++
1,174,193 UART: [idev] CDI.KEYID = 6
1,174,554 UART: [idev] SUBJECT.KEYID = 7
1,174,979 UART: [idev] UDS.KEYID = 0
1,182,722 UART: [idev] Erasing UDS.KEYID = 0
1,199,766 UART: [idev] Sha1 KeyId Algorithm
1,208,760 UART: [idev] --
1,210,025 UART: [ldev] ++
1,210,193 UART: [ldev] CDI.KEYID = 6
1,210,557 UART: [ldev] SUBJECT.KEYID = 5
1,210,984 UART: [ldev] AUTHORITY.KEYID = 7
1,211,447 UART: [ldev] FE.KEYID = 1
1,216,511 UART: [ldev] Erasing FE.KEYID = 1
1,242,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,045 UART: [ldev] --
1,282,296 UART: [fwproc] Wait for Commands...
1,282,875 UART: [fwproc] Recv command 0x46574c44
1,283,608 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,016 UART: ROM Fatal Error: 0x000B003C
1,331,175 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,556 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,608 UART: [state] LifecycleState = Unprovisioned
85,263 UART: [state] DebugLocked = No
85,869 UART: [state] WD Timer not started. Device not locked for debugging
87,172 UART: [kat] SHA2-256
890,722 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,826 UART: [kat] ++
894,978 UART: [kat] sha1
899,192 UART: [kat] SHA2-256
901,132 UART: [kat] SHA2-384
904,073 UART: [kat] SHA2-512-ACC
905,974 UART: [kat] ECC-384
915,243 UART: [kat] HMAC-384Kdf
919,827 UART: [kat] LMS
1,168,139 UART: [kat] --
1,169,024 UART: [cold-reset] ++
1,169,374 UART: [fht] FHT @ 0x50003400
1,172,064 UART: [idev] ++
1,172,232 UART: [idev] CDI.KEYID = 6
1,172,593 UART: [idev] SUBJECT.KEYID = 7
1,173,018 UART: [idev] UDS.KEYID = 0
1,180,919 UART: [idev] Erasing UDS.KEYID = 0
1,197,399 UART: [idev] Sha1 KeyId Algorithm
1,206,223 UART: [idev] --
1,207,138 UART: [ldev] ++
1,207,306 UART: [ldev] CDI.KEYID = 6
1,207,670 UART: [ldev] SUBJECT.KEYID = 5
1,208,097 UART: [ldev] AUTHORITY.KEYID = 7
1,208,560 UART: [ldev] FE.KEYID = 1
1,213,688 UART: [ldev] Erasing FE.KEYID = 1
1,240,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,584 UART: [ldev] --
1,278,987 UART: [fwproc] Wait for Commands...
1,279,640 UART: [fwproc] Recv command 0x46574c44
1,280,373 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,797 UART: ROM Fatal Error: 0x000B003C
1,327,956 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,667 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,891 UART: [kat] SHA2-256
901,831 UART: [kat] SHA2-384
904,788 UART: [kat] SHA2-512-ACC
906,689 UART: [kat] ECC-384
916,196 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,170,055 UART: [cold-reset] ++
1,170,421 UART: [fht] FHT @ 0x50003400
1,172,843 UART: [idev] ++
1,173,011 UART: [idev] CDI.KEYID = 6
1,173,372 UART: [idev] SUBJECT.KEYID = 7
1,173,797 UART: [idev] UDS.KEYID = 0
1,181,948 UART: [idev] Erasing UDS.KEYID = 0
1,199,350 UART: [idev] Sha1 KeyId Algorithm
1,208,270 UART: [idev] --
1,209,239 UART: [ldev] ++
1,209,407 UART: [ldev] CDI.KEYID = 6
1,209,771 UART: [ldev] SUBJECT.KEYID = 5
1,210,198 UART: [ldev] AUTHORITY.KEYID = 7
1,210,661 UART: [ldev] FE.KEYID = 1
1,216,165 UART: [ldev] Erasing FE.KEYID = 1
1,242,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,991 UART: [ldev] --
1,282,424 UART: [fwproc] Wait for Commands...
1,283,247 UART: [fwproc] Recv command 0x46574c44
1,283,980 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,816 UART: ROM Fatal Error: 0x000B003C
1,331,975 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,294 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,606 UART: [state] LifecycleState = Unprovisioned
86,261 UART: [state] DebugLocked = No
86,759 UART: [state] WD Timer not started. Device not locked for debugging
88,028 UART: [kat] SHA2-256
891,578 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
900,166 UART: [kat] SHA2-256
902,106 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,357 UART: [kat] HMAC-384Kdf
920,969 UART: [kat] LMS
1,169,281 UART: [kat] --
1,169,994 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,173,016 UART: [idev] ++
1,173,184 UART: [idev] CDI.KEYID = 6
1,173,545 UART: [idev] SUBJECT.KEYID = 7
1,173,970 UART: [idev] UDS.KEYID = 0
1,181,829 UART: [idev] Erasing UDS.KEYID = 0
1,198,457 UART: [idev] Sha1 KeyId Algorithm
1,207,351 UART: [idev] --
1,208,370 UART: [ldev] ++
1,208,538 UART: [ldev] CDI.KEYID = 6
1,208,902 UART: [ldev] SUBJECT.KEYID = 5
1,209,329 UART: [ldev] AUTHORITY.KEYID = 7
1,209,792 UART: [ldev] FE.KEYID = 1
1,214,884 UART: [ldev] Erasing FE.KEYID = 1
1,241,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,004 UART: [ldev] --
1,280,369 UART: [fwproc] Wait for Commands...
1,281,078 UART: [fwproc] Recv command 0x46574c44
1,281,811 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,941 UART: ROM Fatal Error: 0x000B003C
1,330,100 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,041 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,839 UART: [kat] ++
895,991 UART: [kat] sha1
900,147 UART: [kat] SHA2-256
902,087 UART: [kat] SHA2-384
904,906 UART: [kat] SHA2-512-ACC
906,807 UART: [kat] ECC-384
916,418 UART: [kat] HMAC-384Kdf
921,004 UART: [kat] LMS
1,169,316 UART: [kat] --
1,170,353 UART: [cold-reset] ++
1,170,757 UART: [fht] FHT @ 0x50003400
1,173,353 UART: [idev] ++
1,173,521 UART: [idev] CDI.KEYID = 6
1,173,882 UART: [idev] SUBJECT.KEYID = 7
1,174,307 UART: [idev] UDS.KEYID = 0
1,182,022 UART: [idev] Erasing UDS.KEYID = 0
1,198,864 UART: [idev] Sha1 KeyId Algorithm
1,207,546 UART: [idev] --
1,208,653 UART: [ldev] ++
1,208,821 UART: [ldev] CDI.KEYID = 6
1,209,185 UART: [ldev] SUBJECT.KEYID = 5
1,209,612 UART: [ldev] AUTHORITY.KEYID = 7
1,210,075 UART: [ldev] FE.KEYID = 1
1,215,201 UART: [ldev] Erasing FE.KEYID = 1
1,241,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,235 UART: [ldev] --
1,280,590 UART: [fwproc] Wait for Commands...
1,281,325 UART: [fwproc] Recv command 0x46574c44
1,282,058 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,420 UART: ROM Fatal Error: 0x000B003C
1,330,579 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,074 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,452 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,078 UART:
192,444 UART: Running Caliptra ROM ...
193,630 UART:
193,788 UART: [state] CFI Enabled
267,124 UART: [state] LifecycleState = Unprovisioned
269,079 UART: [state] DebugLocked = No
270,896 UART: [state] WD Timer not started. Device not locked for debugging
274,387 UART: [kat] SHA2-256
454,069 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,818 UART: [kat] ++
465,414 UART: [kat] sha1
477,021 UART: [kat] SHA2-256
479,756 UART: [kat] SHA2-384
485,474 UART: [kat] SHA2-512-ACC
487,872 UART: [kat] ECC-384
2,950,511 UART: [kat] HMAC-384Kdf
2,973,250 UART: [kat] LMS
3,449,763 UART: [kat] --
3,453,320 UART: [cold-reset] ++
3,454,776 UART: [fht] FHT @ 0x50003400
3,466,357 UART: [idev] ++
3,466,925 UART: [idev] CDI.KEYID = 6
3,467,945 UART: [idev] SUBJECT.KEYID = 7
3,469,166 UART: [idev] UDS.KEYID = 0
3,503,723 UART: [idev] Erasing UDS.KEYID = 0
5,989,706 UART: [idev] Sha1 KeyId Algorithm
6,012,631 UART: [idev] --
6,017,474 UART: [ldev] ++
6,018,065 UART: [ldev] CDI.KEYID = 6
6,018,962 UART: [ldev] SUBJECT.KEYID = 5
6,020,188 UART: [ldev] AUTHORITY.KEYID = 7
6,021,432 UART: [ldev] FE.KEYID = 1
6,059,227 UART: [ldev] Erasing FE.KEYID = 1
8,565,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,117 UART: [ldev] --
10,374,734 UART: [fwproc] Wait for Commands...
10,376,898 UART: [fwproc] Recv command 0x46574c44
10,378,886 UART: Invalid Img size: 0 bytes
10,383,089 UART: ROM Fatal Error: 0x01020002
10,386,350 >>> mbox cmd response: failed
10,388,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,537,866 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,453 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,269,418 >>> mbox cmd response: failed
10,272,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,421,093 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
4,417 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,587 UART:
192,958 UART: Running Caliptra ROM ...
194,134 UART:
603,589 UART: [state] CFI Enabled
618,071 UART: [state] LifecycleState = Unprovisioned
620,043 UART: [state] DebugLocked = No
621,662 UART: [state] WD Timer not started. Device not locked for debugging
625,646 UART: [kat] SHA2-256
805,306 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,082 UART: [kat] ++
816,525 UART: [kat] sha1
827,960 UART: [kat] SHA2-256
830,644 UART: [kat] SHA2-384
836,188 UART: [kat] SHA2-512-ACC
838,579 UART: [kat] ECC-384
3,279,682 UART: [kat] HMAC-384Kdf
3,291,812 UART: [kat] LMS
3,768,322 UART: [kat] --
3,771,682 UART: [cold-reset] ++
3,772,962 UART: [fht] FHT @ 0x50003400
3,783,723 UART: [idev] ++
3,784,291 UART: [idev] CDI.KEYID = 6
3,785,224 UART: [idev] SUBJECT.KEYID = 7
3,786,490 UART: [idev] UDS.KEYID = 0
3,801,647 UART: [idev] Erasing UDS.KEYID = 0
6,264,729 UART: [idev] Sha1 KeyId Algorithm
6,287,995 UART: [idev] --
6,292,039 UART: [ldev] ++
6,292,670 UART: [ldev] CDI.KEYID = 6
6,293,583 UART: [ldev] SUBJECT.KEYID = 5
6,294,795 UART: [ldev] AUTHORITY.KEYID = 7
6,296,026 UART: [ldev] FE.KEYID = 1
6,305,496 UART: [ldev] Erasing FE.KEYID = 1
8,784,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,251 UART: [ldev] --
10,576,740 UART: [fwproc] Wait for Commands...
10,578,537 UART: [fwproc] Recv command 0x46574c44
10,580,524 UART: Invalid Img size: 0 bytes
10,585,443 UART: ROM Fatal Error: 0x01020002
10,588,638 >>> mbox cmd response: failed
10,591,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,740,355 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
4,176 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,497,849 >>> mbox cmd response: failed
10,500,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,649,409 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,302 UART: [kat] ++
895,454 UART: [kat] sha1
899,734 UART: [kat] SHA2-256
901,674 UART: [kat] SHA2-384
904,555 UART: [kat] SHA2-512-ACC
906,456 UART: [kat] ECC-384
916,255 UART: [kat] HMAC-384Kdf
920,643 UART: [kat] LMS
1,168,955 UART: [kat] --
1,169,630 UART: [cold-reset] ++
1,170,004 UART: [fht] FHT @ 0x50003400
1,172,596 UART: [idev] ++
1,172,764 UART: [idev] CDI.KEYID = 6
1,173,125 UART: [idev] SUBJECT.KEYID = 7
1,173,550 UART: [idev] UDS.KEYID = 0
1,181,613 UART: [idev] Erasing UDS.KEYID = 0
1,198,951 UART: [idev] Sha1 KeyId Algorithm
1,207,771 UART: [idev] --
1,208,734 UART: [ldev] ++
1,208,902 UART: [ldev] CDI.KEYID = 6
1,209,266 UART: [ldev] SUBJECT.KEYID = 5
1,209,693 UART: [ldev] AUTHORITY.KEYID = 7
1,210,156 UART: [ldev] FE.KEYID = 1
1,215,166 UART: [ldev] Erasing FE.KEYID = 1
1,241,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,518 UART: [ldev] --
1,280,729 UART: [fwproc] Wait for Commands...
1,281,530 UART: [fwproc] Recv command 0x46574c44
1,282,259 UART: Invalid Img size: 0 bytes
1,283,185 UART: ROM Fatal Error: 0x01020002
1,284,344 >>> mbox cmd response: failed
1,284,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,350 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,455 >>> mbox cmd response: failed
1,139,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,139,461 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
915,652 UART: [kat] HMAC-384Kdf
920,198 UART: [kat] LMS
1,168,510 UART: [kat] --
1,169,521 UART: [cold-reset] ++
1,169,847 UART: [fht] FHT @ 0x50003400
1,172,577 UART: [idev] ++
1,172,745 UART: [idev] CDI.KEYID = 6
1,173,106 UART: [idev] SUBJECT.KEYID = 7
1,173,531 UART: [idev] UDS.KEYID = 0
1,181,688 UART: [idev] Erasing UDS.KEYID = 0
1,199,180 UART: [idev] Sha1 KeyId Algorithm
1,208,166 UART: [idev] --
1,209,105 UART: [ldev] ++
1,209,273 UART: [ldev] CDI.KEYID = 6
1,209,637 UART: [ldev] SUBJECT.KEYID = 5
1,210,064 UART: [ldev] AUTHORITY.KEYID = 7
1,210,527 UART: [ldev] FE.KEYID = 1
1,215,557 UART: [ldev] Erasing FE.KEYID = 1
1,241,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,701 UART: [ldev] --
1,281,022 UART: [fwproc] Wait for Commands...
1,281,691 UART: [fwproc] Recv command 0x46574c44
1,282,420 UART: Invalid Img size: 0 bytes
1,283,302 UART: ROM Fatal Error: 0x01020002
1,284,461 >>> mbox cmd response: failed
1,284,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,467 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,140,440 >>> mbox cmd response: failed
1,140,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,140,446 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
891,480 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,584 UART: [kat] ++
895,736 UART: [kat] sha1
900,108 UART: [kat] SHA2-256
902,048 UART: [kat] SHA2-384
904,633 UART: [kat] SHA2-512-ACC
906,534 UART: [kat] ECC-384
916,105 UART: [kat] HMAC-384Kdf
920,685 UART: [kat] LMS
1,168,997 UART: [kat] --
1,169,808 UART: [cold-reset] ++
1,170,154 UART: [fht] FHT @ 0x50003400
1,172,764 UART: [idev] ++
1,172,932 UART: [idev] CDI.KEYID = 6
1,173,293 UART: [idev] SUBJECT.KEYID = 7
1,173,718 UART: [idev] UDS.KEYID = 0
1,181,487 UART: [idev] Erasing UDS.KEYID = 0
1,198,293 UART: [idev] Sha1 KeyId Algorithm
1,207,235 UART: [idev] --
1,208,378 UART: [ldev] ++
1,208,546 UART: [ldev] CDI.KEYID = 6
1,208,910 UART: [ldev] SUBJECT.KEYID = 5
1,209,337 UART: [ldev] AUTHORITY.KEYID = 7
1,209,800 UART: [ldev] FE.KEYID = 1
1,215,020 UART: [ldev] Erasing FE.KEYID = 1
1,241,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,520 UART: [ldev] --
1,280,741 UART: [fwproc] Wait for Commands...
1,281,482 UART: [fwproc] Recv command 0x46574c44
1,282,211 UART: Invalid Img size: 0 bytes
1,283,275 UART: ROM Fatal Error: 0x01020002
1,284,434 >>> mbox cmd response: failed
1,284,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,440 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,919 >>> mbox cmd response: failed
1,139,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,139,925 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
891,057 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,741 UART: [kat] SHA2-256
901,681 UART: [kat] SHA2-384
904,412 UART: [kat] SHA2-512-ACC
906,313 UART: [kat] ECC-384
915,824 UART: [kat] HMAC-384Kdf
920,534 UART: [kat] LMS
1,168,846 UART: [kat] --
1,169,589 UART: [cold-reset] ++
1,169,985 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,181,464 UART: [idev] Erasing UDS.KEYID = 0
1,199,188 UART: [idev] Sha1 KeyId Algorithm
1,208,134 UART: [idev] --
1,209,197 UART: [ldev] ++
1,209,365 UART: [ldev] CDI.KEYID = 6
1,209,729 UART: [ldev] SUBJECT.KEYID = 5
1,210,156 UART: [ldev] AUTHORITY.KEYID = 7
1,210,619 UART: [ldev] FE.KEYID = 1
1,215,967 UART: [ldev] Erasing FE.KEYID = 1
1,242,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,761 UART: [ldev] --
1,281,066 UART: [fwproc] Wait for Commands...
1,281,787 UART: [fwproc] Recv command 0x46574c44
1,282,516 UART: Invalid Img size: 0 bytes
1,283,536 UART: ROM Fatal Error: 0x01020002
1,284,695 >>> mbox cmd response: failed
1,284,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,701 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,712 >>> mbox cmd response: failed
1,139,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,139,718 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,332 UART: [kat] ++
895,484 UART: [kat] sha1
899,524 UART: [kat] SHA2-256
901,464 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
915,811 UART: [kat] HMAC-384Kdf
920,509 UART: [kat] LMS
1,168,821 UART: [kat] --
1,169,902 UART: [cold-reset] ++
1,170,444 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,198,909 UART: [idev] Sha1 KeyId Algorithm
1,207,811 UART: [idev] --
1,208,850 UART: [ldev] ++
1,209,018 UART: [ldev] CDI.KEYID = 6
1,209,382 UART: [ldev] SUBJECT.KEYID = 5
1,209,809 UART: [ldev] AUTHORITY.KEYID = 7
1,210,272 UART: [ldev] FE.KEYID = 1
1,215,636 UART: [ldev] Erasing FE.KEYID = 1
1,242,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,786 UART: [ldev] --
1,281,135 UART: [fwproc] Wait for Commands...
1,281,906 UART: [fwproc] Recv command 0x46574c44
1,282,635 UART: Invalid Img size: 0 bytes
1,283,439 UART: ROM Fatal Error: 0x01020002
1,284,598 >>> mbox cmd response: failed
1,284,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,604 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,140,015 >>> mbox cmd response: failed
1,140,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,140,021 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,741 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
891,701 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,805 UART: [kat] ++
895,957 UART: [kat] sha1
900,233 UART: [kat] SHA2-256
902,173 UART: [kat] SHA2-384
904,918 UART: [kat] SHA2-512-ACC
906,819 UART: [kat] ECC-384
916,610 UART: [kat] HMAC-384Kdf
921,322 UART: [kat] LMS
1,169,634 UART: [kat] --
1,170,381 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,375 UART: [idev] ++
1,173,543 UART: [idev] CDI.KEYID = 6
1,173,904 UART: [idev] SUBJECT.KEYID = 7
1,174,329 UART: [idev] UDS.KEYID = 0
1,182,428 UART: [idev] Erasing UDS.KEYID = 0
1,199,666 UART: [idev] Sha1 KeyId Algorithm
1,208,488 UART: [idev] --
1,209,659 UART: [ldev] ++
1,209,827 UART: [ldev] CDI.KEYID = 6
1,210,191 UART: [ldev] SUBJECT.KEYID = 5
1,210,618 UART: [ldev] AUTHORITY.KEYID = 7
1,211,081 UART: [ldev] FE.KEYID = 1
1,216,035 UART: [ldev] Erasing FE.KEYID = 1
1,241,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,417 UART: [ldev] --
1,280,776 UART: [fwproc] Wait for Commands...
1,281,539 UART: [fwproc] Recv command 0x46574c44
1,282,268 UART: Invalid Img size: 0 bytes
1,283,188 UART: ROM Fatal Error: 0x01020002
1,284,347 >>> mbox cmd response: failed
1,284,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,353 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,140,152 >>> mbox cmd response: failed
1,140,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,140,158 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,601 writing to cptra_bootfsm_go
4,540 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,841 UART:
193,204 UART: Running Caliptra ROM ...
194,308 UART:
194,457 UART: [state] CFI Enabled
261,882 UART: [state] LifecycleState = Unprovisioned
263,834 UART: [state] DebugLocked = No
265,083 UART: [state] WD Timer not started. Device not locked for debugging
269,054 UART: [kat] SHA2-256
448,738 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,527 UART: [kat] ++
459,978 UART: [kat] sha1
470,591 UART: [kat] SHA2-256
473,283 UART: [kat] SHA2-384
479,055 UART: [kat] SHA2-512-ACC
481,458 UART: [kat] ECC-384
2,926,974 UART: [kat] HMAC-384Kdf
2,950,013 UART: [kat] LMS
3,426,495 UART: [kat] --
3,429,919 UART: [cold-reset] ++
3,431,704 UART: [fht] FHT @ 0x50003400
3,444,749 UART: [idev] ++
3,445,361 UART: [idev] CDI.KEYID = 6
3,446,393 UART: [idev] SUBJECT.KEYID = 7
3,447,584 UART: [idev] UDS.KEYID = 0
3,480,692 UART: [idev] Erasing UDS.KEYID = 0
5,964,428 UART: [idev] Sha1 KeyId Algorithm
5,988,214 UART: [idev] --
5,991,839 UART: [ldev] ++
5,992,420 UART: [ldev] CDI.KEYID = 6
5,993,310 UART: [ldev] SUBJECT.KEYID = 5
5,994,528 UART: [ldev] AUTHORITY.KEYID = 7
5,995,819 UART: [ldev] FE.KEYID = 1
6,036,594 UART: [ldev] Erasing FE.KEYID = 1
8,544,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,431 UART: [ldev] --
10,355,532 UART: [fwproc] Wait for Commands...
10,357,263 UART: [fwproc] Recv command 0x4d454153
10,363,697 UART: ROM Fatal Error: 0x01020005
10,366,905 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,293,470 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
4,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,426 UART:
192,795 UART: Running Caliptra ROM ...
193,883 UART:
603,488 UART: [state] CFI Enabled
616,772 UART: [state] LifecycleState = Unprovisioned
618,670 UART: [state] DebugLocked = No
621,146 UART: [state] WD Timer not started. Device not locked for debugging
625,870 UART: [kat] SHA2-256
805,495 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,301 UART: [kat] ++
816,743 UART: [kat] sha1
828,098 UART: [kat] SHA2-256
830,782 UART: [kat] SHA2-384
837,567 UART: [kat] SHA2-512-ACC
839,914 UART: [kat] ECC-384
3,283,985 UART: [kat] HMAC-384Kdf
3,297,163 UART: [kat] LMS
3,773,635 UART: [kat] --
3,779,046 UART: [cold-reset] ++
3,780,822 UART: [fht] FHT @ 0x50003400
3,792,282 UART: [idev] ++
3,792,839 UART: [idev] CDI.KEYID = 6
3,793,775 UART: [idev] SUBJECT.KEYID = 7
3,795,034 UART: [idev] UDS.KEYID = 0
3,810,029 UART: [idev] Erasing UDS.KEYID = 0
6,270,313 UART: [idev] Sha1 KeyId Algorithm
6,295,321 UART: [idev] --
6,300,587 UART: [ldev] ++
6,301,161 UART: [ldev] CDI.KEYID = 6
6,302,137 UART: [ldev] SUBJECT.KEYID = 5
6,303,296 UART: [ldev] AUTHORITY.KEYID = 7
6,304,579 UART: [ldev] FE.KEYID = 1
6,316,191 UART: [ldev] Erasing FE.KEYID = 1
8,793,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,960 UART: [ldev] --
10,591,012 UART: [fwproc] Wait for Commands...
10,593,602 UART: [fwproc] Recv command 0x4d454153
10,599,832 UART: ROM Fatal Error: 0x01020005
10,603,016 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
4,344 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,491,644 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,054 UART: [kat] ++
895,206 UART: [kat] sha1
899,480 UART: [kat] SHA2-256
901,420 UART: [kat] SHA2-384
904,115 UART: [kat] SHA2-512-ACC
906,016 UART: [kat] ECC-384
915,445 UART: [kat] HMAC-384Kdf
920,083 UART: [kat] LMS
1,168,395 UART: [kat] --
1,169,262 UART: [cold-reset] ++
1,169,648 UART: [fht] FHT @ 0x50003400
1,172,364 UART: [idev] ++
1,172,532 UART: [idev] CDI.KEYID = 6
1,172,893 UART: [idev] SUBJECT.KEYID = 7
1,173,318 UART: [idev] UDS.KEYID = 0
1,181,187 UART: [idev] Erasing UDS.KEYID = 0
1,198,179 UART: [idev] Sha1 KeyId Algorithm
1,207,247 UART: [idev] --
1,208,116 UART: [ldev] ++
1,208,284 UART: [ldev] CDI.KEYID = 6
1,208,648 UART: [ldev] SUBJECT.KEYID = 5
1,209,075 UART: [ldev] AUTHORITY.KEYID = 7
1,209,538 UART: [ldev] FE.KEYID = 1
1,214,696 UART: [ldev] Erasing FE.KEYID = 1
1,241,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,510 UART: [ldev] --
1,280,817 UART: [fwproc] Wait for Commands...
1,281,620 UART: [fwproc] Recv command 0x4d454153
1,283,540 UART: ROM Fatal Error: 0x01020005
1,284,699 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,755 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,426 UART: [kat] SHA2-512-ACC
906,327 UART: [kat] ECC-384
916,384 UART: [kat] HMAC-384Kdf
920,894 UART: [kat] LMS
1,169,206 UART: [kat] --
1,170,031 UART: [cold-reset] ++
1,170,501 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,181,596 UART: [idev] Erasing UDS.KEYID = 0
1,198,910 UART: [idev] Sha1 KeyId Algorithm
1,207,822 UART: [idev] --
1,208,915 UART: [ldev] ++
1,209,083 UART: [ldev] CDI.KEYID = 6
1,209,447 UART: [ldev] SUBJECT.KEYID = 5
1,209,874 UART: [ldev] AUTHORITY.KEYID = 7
1,210,337 UART: [ldev] FE.KEYID = 1
1,215,679 UART: [ldev] Erasing FE.KEYID = 1
1,241,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,811 UART: [ldev] --
1,281,206 UART: [fwproc] Wait for Commands...
1,281,885 UART: [fwproc] Recv command 0x4d454153
1,283,975 UART: ROM Fatal Error: 0x01020005
1,285,134 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,804 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,802 UART: [state] LifecycleState = Unprovisioned
85,457 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,048 UART: [kat] ++
895,200 UART: [kat] sha1
899,302 UART: [kat] SHA2-256
901,242 UART: [kat] SHA2-384
904,029 UART: [kat] SHA2-512-ACC
905,930 UART: [kat] ECC-384
915,793 UART: [kat] HMAC-384Kdf
920,201 UART: [kat] LMS
1,168,513 UART: [kat] --
1,169,422 UART: [cold-reset] ++
1,169,916 UART: [fht] FHT @ 0x50003400
1,172,640 UART: [idev] ++
1,172,808 UART: [idev] CDI.KEYID = 6
1,173,169 UART: [idev] SUBJECT.KEYID = 7
1,173,594 UART: [idev] UDS.KEYID = 0
1,181,831 UART: [idev] Erasing UDS.KEYID = 0
1,198,783 UART: [idev] Sha1 KeyId Algorithm
1,207,745 UART: [idev] --
1,208,698 UART: [ldev] ++
1,208,866 UART: [ldev] CDI.KEYID = 6
1,209,230 UART: [ldev] SUBJECT.KEYID = 5
1,209,657 UART: [ldev] AUTHORITY.KEYID = 7
1,210,120 UART: [ldev] FE.KEYID = 1
1,215,394 UART: [ldev] Erasing FE.KEYID = 1
1,241,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,820 UART: [ldev] --
1,280,147 UART: [fwproc] Wait for Commands...
1,280,874 UART: [fwproc] Recv command 0x4d454153
1,283,078 UART: ROM Fatal Error: 0x01020005
1,284,237 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,987 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
891,669 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,773 UART: [kat] ++
895,925 UART: [kat] sha1
900,011 UART: [kat] SHA2-256
901,951 UART: [kat] SHA2-384
904,836 UART: [kat] SHA2-512-ACC
906,737 UART: [kat] ECC-384
916,744 UART: [kat] HMAC-384Kdf
921,432 UART: [kat] LMS
1,169,744 UART: [kat] --
1,170,617 UART: [cold-reset] ++
1,170,973 UART: [fht] FHT @ 0x50003400
1,173,761 UART: [idev] ++
1,173,929 UART: [idev] CDI.KEYID = 6
1,174,290 UART: [idev] SUBJECT.KEYID = 7
1,174,715 UART: [idev] UDS.KEYID = 0
1,182,652 UART: [idev] Erasing UDS.KEYID = 0
1,199,642 UART: [idev] Sha1 KeyId Algorithm
1,208,494 UART: [idev] --
1,209,459 UART: [ldev] ++
1,209,627 UART: [ldev] CDI.KEYID = 6
1,209,991 UART: [ldev] SUBJECT.KEYID = 5
1,210,418 UART: [ldev] AUTHORITY.KEYID = 7
1,210,881 UART: [ldev] FE.KEYID = 1
1,216,115 UART: [ldev] Erasing FE.KEYID = 1
1,242,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,060 UART: [fwproc] Wait for Commands...
1,282,835 UART: [fwproc] Recv command 0x4d454153
1,284,905 UART: ROM Fatal Error: 0x01020005
1,286,064 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,532 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,308 UART: [kat] ++
895,460 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,175 UART: [kat] SHA2-512-ACC
906,076 UART: [kat] ECC-384
915,923 UART: [kat] HMAC-384Kdf
920,505 UART: [kat] LMS
1,168,817 UART: [kat] --
1,169,600 UART: [cold-reset] ++
1,170,172 UART: [fht] FHT @ 0x50003400
1,172,960 UART: [idev] ++
1,173,128 UART: [idev] CDI.KEYID = 6
1,173,489 UART: [idev] SUBJECT.KEYID = 7
1,173,914 UART: [idev] UDS.KEYID = 0
1,182,025 UART: [idev] Erasing UDS.KEYID = 0
1,199,401 UART: [idev] Sha1 KeyId Algorithm
1,208,413 UART: [idev] --
1,209,462 UART: [ldev] ++
1,209,630 UART: [ldev] CDI.KEYID = 6
1,209,994 UART: [ldev] SUBJECT.KEYID = 5
1,210,421 UART: [ldev] AUTHORITY.KEYID = 7
1,210,884 UART: [ldev] FE.KEYID = 1
1,215,876 UART: [ldev] Erasing FE.KEYID = 1
1,242,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,946 UART: [ldev] --
1,281,305 UART: [fwproc] Wait for Commands...
1,281,894 UART: [fwproc] Recv command 0x4d454153
1,283,994 UART: ROM Fatal Error: 0x01020005
1,285,153 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,471 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,134 UART: [state] WD Timer not started. Device not locked for debugging
88,383 UART: [kat] SHA2-256
891,933 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,037 UART: [kat] ++
896,189 UART: [kat] sha1
900,277 UART: [kat] SHA2-256
902,217 UART: [kat] SHA2-384
905,006 UART: [kat] SHA2-512-ACC
906,907 UART: [kat] ECC-384
916,652 UART: [kat] HMAC-384Kdf
921,244 UART: [kat] LMS
1,169,556 UART: [kat] --
1,170,285 UART: [cold-reset] ++
1,170,693 UART: [fht] FHT @ 0x50003400
1,173,285 UART: [idev] ++
1,173,453 UART: [idev] CDI.KEYID = 6
1,173,814 UART: [idev] SUBJECT.KEYID = 7
1,174,239 UART: [idev] UDS.KEYID = 0
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,102 UART: [idev] Sha1 KeyId Algorithm
1,208,040 UART: [idev] --
1,208,951 UART: [ldev] ++
1,209,119 UART: [ldev] CDI.KEYID = 6
1,209,483 UART: [ldev] SUBJECT.KEYID = 5
1,209,910 UART: [ldev] AUTHORITY.KEYID = 7
1,210,373 UART: [ldev] FE.KEYID = 1
1,215,275 UART: [ldev] Erasing FE.KEYID = 1
1,241,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,821 UART: [ldev] --
1,281,186 UART: [fwproc] Wait for Commands...
1,281,979 UART: [fwproc] Recv command 0x4d454153
1,283,977 UART: ROM Fatal Error: 0x01020005
1,285,136 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,360 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,414 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,056 UART:
192,430 UART: Running Caliptra ROM ...
193,617 UART:
193,791 UART: [state] CFI Enabled
264,947 UART: [state] LifecycleState = Unprovisioned
266,917 UART: [state] DebugLocked = No
269,438 UART: [state] WD Timer not started. Device not locked for debugging
273,227 UART: [kat] SHA2-256
452,874 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,644 UART: [kat] ++
464,149 UART: [kat] sha1
475,039 UART: [kat] SHA2-256
477,728 UART: [kat] SHA2-384
484,467 UART: [kat] SHA2-512-ACC
486,808 UART: [kat] ECC-384
2,949,167 UART: [kat] HMAC-384Kdf
2,971,281 UART: [kat] LMS
3,447,744 UART: [kat] --
3,450,265 UART: [cold-reset] ++
3,452,216 UART: [fht] FHT @ 0x50003400
3,465,108 UART: [idev] ++
3,465,717 UART: [idev] CDI.KEYID = 6
3,466,610 UART: [idev] SUBJECT.KEYID = 7
3,467,902 UART: [idev] UDS.KEYID = 0
3,500,525 UART: [idev] Erasing UDS.KEYID = 0
5,987,660 UART: [idev] Sha1 KeyId Algorithm
6,011,475 UART: [idev] --
6,016,998 UART: [ldev] ++
6,017,579 UART: [ldev] CDI.KEYID = 6
6,018,473 UART: [ldev] SUBJECT.KEYID = 5
6,019,693 UART: [ldev] AUTHORITY.KEYID = 7
6,020,934 UART: [ldev] FE.KEYID = 1
6,057,659 UART: [ldev] Erasing FE.KEYID = 1
8,564,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,086 UART: [ldev] --
10,373,793 UART: [fwproc] Wait for Commands...
10,375,691 UART: [fwproc] Recv command 0x43415053
10,378,983 UART: ROM Fatal Error: 0x01020006
10,382,155 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,478 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,306,930 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
4,370 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,541 UART:
192,900 UART: Running Caliptra ROM ...
194,070 UART:
603,575 UART: [state] CFI Enabled
618,047 UART: [state] LifecycleState = Unprovisioned
619,950 UART: [state] DebugLocked = No
621,812 UART: [state] WD Timer not started. Device not locked for debugging
626,131 UART: [kat] SHA2-256
805,752 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,538 UART: [kat] ++
817,024 UART: [kat] sha1
828,170 UART: [kat] SHA2-256
830,846 UART: [kat] SHA2-384
837,037 UART: [kat] SHA2-512-ACC
839,392 UART: [kat] ECC-384
3,282,769 UART: [kat] HMAC-384Kdf
3,294,958 UART: [kat] LMS
3,771,414 UART: [kat] --
3,775,831 UART: [cold-reset] ++
3,777,937 UART: [fht] FHT @ 0x50003400
3,789,337 UART: [idev] ++
3,789,896 UART: [idev] CDI.KEYID = 6
3,790,829 UART: [idev] SUBJECT.KEYID = 7
3,792,093 UART: [idev] UDS.KEYID = 0
3,809,715 UART: [idev] Erasing UDS.KEYID = 0
6,268,502 UART: [idev] Sha1 KeyId Algorithm
6,292,444 UART: [idev] --
6,297,844 UART: [ldev] ++
6,298,407 UART: [ldev] CDI.KEYID = 6
6,299,339 UART: [ldev] SUBJECT.KEYID = 5
6,300,544 UART: [ldev] AUTHORITY.KEYID = 7
6,301,826 UART: [ldev] FE.KEYID = 1
6,311,451 UART: [ldev] Erasing FE.KEYID = 1
8,794,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,019 UART: [ldev] --
10,586,282 UART: [fwproc] Wait for Commands...
10,589,182 UART: [fwproc] Recv command 0x43415053
10,593,271 UART: ROM Fatal Error: 0x01020006
10,596,458 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
4,225 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,488,383 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
915,773 UART: [kat] HMAC-384Kdf
920,465 UART: [kat] LMS
1,168,777 UART: [kat] --
1,169,852 UART: [cold-reset] ++
1,170,426 UART: [fht] FHT @ 0x50003400
1,173,064 UART: [idev] ++
1,173,232 UART: [idev] CDI.KEYID = 6
1,173,593 UART: [idev] SUBJECT.KEYID = 7
1,174,018 UART: [idev] UDS.KEYID = 0
1,182,131 UART: [idev] Erasing UDS.KEYID = 0
1,199,247 UART: [idev] Sha1 KeyId Algorithm
1,208,103 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,215,634 UART: [ldev] Erasing FE.KEYID = 1
1,242,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,054 UART: [ldev] --
1,281,351 UART: [fwproc] Wait for Commands...
1,282,106 UART: [fwproc] Recv command 0x43415053
1,283,106 UART: ROM Fatal Error: 0x01020006
1,284,265 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,141,497 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,223 UART: [kat] ++
895,375 UART: [kat] sha1
899,567 UART: [kat] SHA2-256
901,507 UART: [kat] SHA2-384
904,198 UART: [kat] SHA2-512-ACC
906,099 UART: [kat] ECC-384
915,812 UART: [kat] HMAC-384Kdf
920,286 UART: [kat] LMS
1,168,598 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,170,139 UART: [fht] FHT @ 0x50003400
1,172,751 UART: [idev] ++
1,172,919 UART: [idev] CDI.KEYID = 6
1,173,280 UART: [idev] SUBJECT.KEYID = 7
1,173,705 UART: [idev] UDS.KEYID = 0
1,182,056 UART: [idev] Erasing UDS.KEYID = 0
1,198,794 UART: [idev] Sha1 KeyId Algorithm
1,207,582 UART: [idev] --
1,208,609 UART: [ldev] ++
1,208,777 UART: [ldev] CDI.KEYID = 6
1,209,141 UART: [ldev] SUBJECT.KEYID = 5
1,209,568 UART: [ldev] AUTHORITY.KEYID = 7
1,210,031 UART: [ldev] FE.KEYID = 1
1,215,437 UART: [ldev] Erasing FE.KEYID = 1
1,242,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,779 UART: [ldev] --
1,282,044 UART: [fwproc] Wait for Commands...
1,282,773 UART: [fwproc] Recv command 0x43415053
1,283,861 UART: ROM Fatal Error: 0x01020006
1,285,020 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,140,764 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,548 UART: [state] LifecycleState = Unprovisioned
85,203 UART: [state] DebugLocked = No
85,915 UART: [state] WD Timer not started. Device not locked for debugging
87,034 UART: [kat] SHA2-256
890,584 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,688 UART: [kat] ++
894,840 UART: [kat] sha1
899,182 UART: [kat] SHA2-256
901,122 UART: [kat] SHA2-384
903,727 UART: [kat] SHA2-512-ACC
905,628 UART: [kat] ECC-384
915,211 UART: [kat] HMAC-384Kdf
919,617 UART: [kat] LMS
1,167,929 UART: [kat] --
1,168,736 UART: [cold-reset] ++
1,169,120 UART: [fht] FHT @ 0x50003400
1,171,692 UART: [idev] ++
1,171,860 UART: [idev] CDI.KEYID = 6
1,172,221 UART: [idev] SUBJECT.KEYID = 7
1,172,646 UART: [idev] UDS.KEYID = 0
1,180,543 UART: [idev] Erasing UDS.KEYID = 0
1,197,571 UART: [idev] Sha1 KeyId Algorithm
1,206,343 UART: [idev] --
1,207,198 UART: [ldev] ++
1,207,366 UART: [ldev] CDI.KEYID = 6
1,207,730 UART: [ldev] SUBJECT.KEYID = 5
1,208,157 UART: [ldev] AUTHORITY.KEYID = 7
1,208,620 UART: [ldev] FE.KEYID = 1
1,213,620 UART: [ldev] Erasing FE.KEYID = 1
1,239,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,470 UART: [ldev] --
1,278,695 UART: [fwproc] Wait for Commands...
1,279,326 UART: [fwproc] Recv command 0x43415053
1,280,264 UART: ROM Fatal Error: 0x01020006
1,281,423 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,139,777 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,869 UART: [state] LifecycleState = Unprovisioned
85,524 UART: [state] DebugLocked = No
86,106 UART: [state] WD Timer not started. Device not locked for debugging
87,257 UART: [kat] SHA2-256
890,807 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,911 UART: [kat] ++
895,063 UART: [kat] sha1
899,291 UART: [kat] SHA2-256
901,231 UART: [kat] SHA2-384
903,766 UART: [kat] SHA2-512-ACC
905,667 UART: [kat] ECC-384
915,730 UART: [kat] HMAC-384Kdf
920,500 UART: [kat] LMS
1,168,812 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,095 UART: [fht] FHT @ 0x50003400
1,172,761 UART: [idev] ++
1,172,929 UART: [idev] CDI.KEYID = 6
1,173,290 UART: [idev] SUBJECT.KEYID = 7
1,173,715 UART: [idev] UDS.KEYID = 0
1,181,694 UART: [idev] Erasing UDS.KEYID = 0
1,198,708 UART: [idev] Sha1 KeyId Algorithm
1,207,528 UART: [idev] --
1,208,557 UART: [ldev] ++
1,208,725 UART: [ldev] CDI.KEYID = 6
1,209,089 UART: [ldev] SUBJECT.KEYID = 5
1,209,516 UART: [ldev] AUTHORITY.KEYID = 7
1,209,979 UART: [ldev] FE.KEYID = 1
1,215,463 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,391 UART: [ldev] --
1,281,688 UART: [fwproc] Wait for Commands...
1,282,321 UART: [fwproc] Recv command 0x43415053
1,283,331 UART: ROM Fatal Error: 0x01020006
1,284,490 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,139,944 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [kat] SHA2-256
891,046 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,150 UART: [kat] ++
895,302 UART: [kat] sha1
899,656 UART: [kat] SHA2-256
901,596 UART: [kat] SHA2-384
904,225 UART: [kat] SHA2-512-ACC
906,126 UART: [kat] ECC-384
915,983 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,734 UART: [cold-reset] ++
1,170,124 UART: [fht] FHT @ 0x50003400
1,172,852 UART: [idev] ++
1,173,020 UART: [idev] CDI.KEYID = 6
1,173,381 UART: [idev] SUBJECT.KEYID = 7
1,173,806 UART: [idev] UDS.KEYID = 0
1,182,245 UART: [idev] Erasing UDS.KEYID = 0
1,199,313 UART: [idev] Sha1 KeyId Algorithm
1,208,217 UART: [idev] --
1,209,292 UART: [ldev] ++
1,209,460 UART: [ldev] CDI.KEYID = 6
1,209,824 UART: [ldev] SUBJECT.KEYID = 5
1,210,251 UART: [ldev] AUTHORITY.KEYID = 7
1,210,714 UART: [ldev] FE.KEYID = 1
1,215,926 UART: [ldev] Erasing FE.KEYID = 1
1,242,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,914 UART: [ldev] --
1,281,319 UART: [fwproc] Wait for Commands...
1,281,906 UART: [fwproc] Recv command 0x43415053
1,283,126 UART: ROM Fatal Error: 0x01020006
1,284,285 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,140,445 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,399 UART: [kat] ++
895,551 UART: [kat] sha1
899,981 UART: [kat] SHA2-256
901,921 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
915,980 UART: [kat] HMAC-384Kdf
920,596 UART: [kat] LMS
1,168,908 UART: [kat] --
1,169,939 UART: [cold-reset] ++
1,170,415 UART: [fht] FHT @ 0x50003400
1,173,041 UART: [idev] ++
1,173,209 UART: [idev] CDI.KEYID = 6
1,173,570 UART: [idev] SUBJECT.KEYID = 7
1,173,995 UART: [idev] UDS.KEYID = 0
1,182,108 UART: [idev] Erasing UDS.KEYID = 0
1,199,030 UART: [idev] Sha1 KeyId Algorithm
1,207,796 UART: [idev] --
1,208,879 UART: [ldev] ++
1,209,047 UART: [ldev] CDI.KEYID = 6
1,209,411 UART: [ldev] SUBJECT.KEYID = 5
1,209,838 UART: [ldev] AUTHORITY.KEYID = 7
1,210,301 UART: [ldev] FE.KEYID = 1
1,215,529 UART: [ldev] Erasing FE.KEYID = 1
1,241,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,905 UART: [ldev] --
1,281,180 UART: [fwproc] Wait for Commands...
1,281,975 UART: [fwproc] Recv command 0x43415053
1,283,339 UART: ROM Fatal Error: 0x01020006
1,284,498 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,140,626 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,473 writing to cptra_bootfsm_go
4,084 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,673 UART:
193,051 UART: Running Caliptra ROM ...
194,257 UART:
194,415 UART: [state] CFI Enabled
264,861 UART: [state] LifecycleState = Unprovisioned
266,830 UART: [state] DebugLocked = No
268,710 UART: [state] WD Timer not started. Device not locked for debugging
273,097 UART: [kat] SHA2-256
452,746 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,486 UART: [kat] ++
464,000 UART: [kat] sha1
475,266 UART: [kat] SHA2-256
477,953 UART: [kat] SHA2-384
482,694 UART: [kat] SHA2-512-ACC
485,088 UART: [kat] ECC-384
2,948,425 UART: [kat] HMAC-384Kdf
2,971,091 UART: [kat] LMS
3,447,586 UART: [kat] --
3,452,442 UART: [cold-reset] ++
3,453,630 UART: [fht] FHT @ 0x50003400
3,464,890 UART: [idev] ++
3,465,515 UART: [idev] CDI.KEYID = 6
3,466,434 UART: [idev] SUBJECT.KEYID = 7
3,467,708 UART: [idev] UDS.KEYID = 0
3,502,162 UART: [idev] Erasing UDS.KEYID = 0
5,988,397 UART: [idev] Sha1 KeyId Algorithm
6,010,605 UART: [idev] --
6,015,635 UART: [ldev] ++
6,016,217 UART: [ldev] CDI.KEYID = 6
6,017,243 UART: [ldev] SUBJECT.KEYID = 5
6,018,359 UART: [ldev] AUTHORITY.KEYID = 7
6,019,603 UART: [ldev] FE.KEYID = 1
6,057,657 UART: [ldev] Erasing FE.KEYID = 1
8,563,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,929 UART: [ldev] --
10,374,564 UART: [fwproc] Wait for Commands...
10,376,841 UART: [fwproc] Recv command 0x4d454153
10,380,156 UART: ROM Fatal Error: 0x01020006
10,383,363 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,426 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,247,000 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,989 writing to cptra_bootfsm_go
5,094 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
193,217 UART:
193,599 UART: Running Caliptra ROM ...
194,681 UART:
604,515 UART: [state] CFI Enabled
617,758 UART: [state] LifecycleState = Unprovisioned
619,666 UART: [state] DebugLocked = No
621,497 UART: [state] WD Timer not started. Device not locked for debugging
625,154 UART: [kat] SHA2-256
804,844 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,586 UART: [kat] ++
816,121 UART: [kat] sha1
828,343 UART: [kat] SHA2-256
831,026 UART: [kat] SHA2-384
836,737 UART: [kat] SHA2-512-ACC
839,072 UART: [kat] ECC-384
3,282,522 UART: [kat] HMAC-384Kdf
3,294,970 UART: [kat] LMS
3,771,462 UART: [kat] --
3,776,987 UART: [cold-reset] ++
3,779,185 UART: [fht] FHT @ 0x50003400
3,790,425 UART: [idev] ++
3,790,992 UART: [idev] CDI.KEYID = 6
3,791,926 UART: [idev] SUBJECT.KEYID = 7
3,793,192 UART: [idev] UDS.KEYID = 0
3,809,913 UART: [idev] Erasing UDS.KEYID = 0
6,270,376 UART: [idev] Sha1 KeyId Algorithm
6,294,936 UART: [idev] --
6,300,060 UART: [ldev] ++
6,300,633 UART: [ldev] CDI.KEYID = 6
6,301,599 UART: [ldev] SUBJECT.KEYID = 5
6,302,753 UART: [ldev] AUTHORITY.KEYID = 7
6,304,037 UART: [ldev] FE.KEYID = 1
6,314,846 UART: [ldev] Erasing FE.KEYID = 1
8,795,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,277 UART: [ldev] --
10,588,337 UART: [fwproc] Wait for Commands...
10,590,991 UART: [fwproc] Recv command 0x4d454153
10,595,680 UART: ROM Fatal Error: 0x01020006
10,598,934 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
4,328 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,491,150 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,544 UART: [state] LifecycleState = Unprovisioned
85,199 UART: [state] DebugLocked = No
85,725 UART: [state] WD Timer not started. Device not locked for debugging
86,962 UART: [kat] SHA2-256
890,512 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,616 UART: [kat] ++
894,768 UART: [kat] sha1
899,054 UART: [kat] SHA2-256
900,994 UART: [kat] SHA2-384
903,707 UART: [kat] SHA2-512-ACC
905,608 UART: [kat] ECC-384
915,337 UART: [kat] HMAC-384Kdf
920,117 UART: [kat] LMS
1,168,429 UART: [kat] --
1,169,320 UART: [cold-reset] ++
1,169,808 UART: [fht] FHT @ 0x50003400
1,172,636 UART: [idev] ++
1,172,804 UART: [idev] CDI.KEYID = 6
1,173,165 UART: [idev] SUBJECT.KEYID = 7
1,173,590 UART: [idev] UDS.KEYID = 0
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,198,799 UART: [idev] Sha1 KeyId Algorithm
1,207,713 UART: [idev] --
1,208,918 UART: [ldev] ++
1,209,086 UART: [ldev] CDI.KEYID = 6
1,209,450 UART: [ldev] SUBJECT.KEYID = 5
1,209,877 UART: [ldev] AUTHORITY.KEYID = 7
1,210,340 UART: [ldev] FE.KEYID = 1
1,215,672 UART: [ldev] Erasing FE.KEYID = 1
1,241,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,452 UART: [ldev] --
1,280,847 UART: [fwproc] Wait for Commands...
1,281,492 UART: [fwproc] Recv command 0x4d454153
1,282,787 UART: ROM Fatal Error: 0x01020006
1,283,946 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,138,974 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,529 UART: [kat] ++
895,681 UART: [kat] sha1
899,885 UART: [kat] SHA2-256
901,825 UART: [kat] SHA2-384
904,630 UART: [kat] SHA2-512-ACC
906,531 UART: [kat] ECC-384
916,272 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,169,707 UART: [cold-reset] ++
1,170,171 UART: [fht] FHT @ 0x50003400
1,172,613 UART: [idev] ++
1,172,781 UART: [idev] CDI.KEYID = 6
1,173,142 UART: [idev] SUBJECT.KEYID = 7
1,173,567 UART: [idev] UDS.KEYID = 0
1,181,620 UART: [idev] Erasing UDS.KEYID = 0
1,198,376 UART: [idev] Sha1 KeyId Algorithm
1,207,364 UART: [idev] --
1,208,611 UART: [ldev] ++
1,208,779 UART: [ldev] CDI.KEYID = 6
1,209,143 UART: [ldev] SUBJECT.KEYID = 5
1,209,570 UART: [ldev] AUTHORITY.KEYID = 7
1,210,033 UART: [ldev] FE.KEYID = 1
1,215,419 UART: [ldev] Erasing FE.KEYID = 1
1,241,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,111 UART: [ldev] --
1,281,352 UART: [fwproc] Wait for Commands...
1,282,117 UART: [fwproc] Recv command 0x4d454153
1,283,290 UART: ROM Fatal Error: 0x01020006
1,284,449 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,142,565 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
899,960 UART: [kat] SHA2-256
901,900 UART: [kat] SHA2-384
904,695 UART: [kat] SHA2-512-ACC
906,596 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
920,891 UART: [kat] LMS
1,169,203 UART: [kat] --
1,170,140 UART: [cold-reset] ++
1,170,596 UART: [fht] FHT @ 0x50003400
1,173,326 UART: [idev] ++
1,173,494 UART: [idev] CDI.KEYID = 6
1,173,855 UART: [idev] SUBJECT.KEYID = 7
1,174,280 UART: [idev] UDS.KEYID = 0
1,182,279 UART: [idev] Erasing UDS.KEYID = 0
1,199,471 UART: [idev] Sha1 KeyId Algorithm
1,208,241 UART: [idev] --
1,209,368 UART: [ldev] ++
1,209,536 UART: [ldev] CDI.KEYID = 6
1,209,900 UART: [ldev] SUBJECT.KEYID = 5
1,210,327 UART: [ldev] AUTHORITY.KEYID = 7
1,210,790 UART: [ldev] FE.KEYID = 1
1,215,742 UART: [ldev] Erasing FE.KEYID = 1
1,242,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,028 UART: [ldev] --
1,281,465 UART: [fwproc] Wait for Commands...
1,282,190 UART: [fwproc] Recv command 0x4d454153
1,283,551 UART: ROM Fatal Error: 0x01020006
1,284,710 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,140,226 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,927 UART: [state] LifecycleState = Unprovisioned
85,582 UART: [state] DebugLocked = No
86,228 UART: [state] WD Timer not started. Device not locked for debugging
87,505 UART: [kat] SHA2-256
891,055 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,491 UART: [kat] SHA2-256
901,431 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,569 UART: [cold-reset] ++
1,169,981 UART: [fht] FHT @ 0x50003400
1,172,579 UART: [idev] ++
1,172,747 UART: [idev] CDI.KEYID = 6
1,173,108 UART: [idev] SUBJECT.KEYID = 7
1,173,533 UART: [idev] UDS.KEYID = 0
1,181,550 UART: [idev] Erasing UDS.KEYID = 0
1,199,122 UART: [idev] Sha1 KeyId Algorithm
1,208,168 UART: [idev] --
1,209,049 UART: [ldev] ++
1,209,217 UART: [ldev] CDI.KEYID = 6
1,209,581 UART: [ldev] SUBJECT.KEYID = 5
1,210,008 UART: [ldev] AUTHORITY.KEYID = 7
1,210,471 UART: [ldev] FE.KEYID = 1
1,215,767 UART: [ldev] Erasing FE.KEYID = 1
1,241,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,735 UART: [ldev] --
1,281,164 UART: [fwproc] Wait for Commands...
1,281,983 UART: [fwproc] Recv command 0x4d454153
1,283,406 UART: ROM Fatal Error: 0x01020006
1,284,565 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,141,337 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,479 UART: [kat] SHA2-512-ACC
906,380 UART: [kat] ECC-384
916,131 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,169,752 UART: [cold-reset] ++
1,170,206 UART: [fht] FHT @ 0x50003400
1,172,818 UART: [idev] ++
1,172,986 UART: [idev] CDI.KEYID = 6
1,173,347 UART: [idev] SUBJECT.KEYID = 7
1,173,772 UART: [idev] UDS.KEYID = 0
1,181,759 UART: [idev] Erasing UDS.KEYID = 0
1,198,335 UART: [idev] Sha1 KeyId Algorithm
1,207,297 UART: [idev] --
1,208,492 UART: [ldev] ++
1,208,660 UART: [ldev] CDI.KEYID = 6
1,209,024 UART: [ldev] SUBJECT.KEYID = 5
1,209,451 UART: [ldev] AUTHORITY.KEYID = 7
1,209,914 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,241,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,684 UART: [ldev] --
1,281,069 UART: [fwproc] Wait for Commands...
1,281,840 UART: [fwproc] Recv command 0x4d454153
1,283,143 UART: ROM Fatal Error: 0x01020006
1,284,302 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,140,006 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,831 UART: [state] LifecycleState = Unprovisioned
85,486 UART: [state] DebugLocked = No
86,078 UART: [state] WD Timer not started. Device not locked for debugging
87,267 UART: [kat] SHA2-256
890,817 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,921 UART: [kat] ++
895,073 UART: [kat] sha1
899,173 UART: [kat] SHA2-256
901,113 UART: [kat] SHA2-384
903,930 UART: [kat] SHA2-512-ACC
905,831 UART: [kat] ECC-384
915,694 UART: [kat] HMAC-384Kdf
920,146 UART: [kat] LMS
1,168,458 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,169,987 UART: [fht] FHT @ 0x50003400
1,172,635 UART: [idev] ++
1,172,803 UART: [idev] CDI.KEYID = 6
1,173,164 UART: [idev] SUBJECT.KEYID = 7
1,173,589 UART: [idev] UDS.KEYID = 0
1,181,974 UART: [idev] Erasing UDS.KEYID = 0
1,198,870 UART: [idev] Sha1 KeyId Algorithm
1,207,736 UART: [idev] --
1,208,923 UART: [ldev] ++
1,209,091 UART: [ldev] CDI.KEYID = 6
1,209,455 UART: [ldev] SUBJECT.KEYID = 5
1,209,882 UART: [ldev] AUTHORITY.KEYID = 7
1,210,345 UART: [ldev] FE.KEYID = 1
1,215,425 UART: [ldev] Erasing FE.KEYID = 1
1,241,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,303 UART: [ldev] --
1,280,520 UART: [fwproc] Wait for Commands...
1,281,303 UART: [fwproc] Recv command 0x4d454153
1,282,436 UART: ROM Fatal Error: 0x01020006
1,283,595 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,141,967 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,480 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,113 UART:
192,488 UART: Running Caliptra ROM ...
193,606 UART:
193,754 UART: [state] CFI Enabled
265,106 UART: [state] LifecycleState = Unprovisioned
267,072 UART: [state] DebugLocked = No
269,922 UART: [state] WD Timer not started. Device not locked for debugging
273,389 UART: [kat] SHA2-256
453,034 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,837 UART: [kat] ++
464,321 UART: [kat] sha1
475,691 UART: [kat] SHA2-256
478,430 UART: [kat] SHA2-384
483,709 UART: [kat] SHA2-512-ACC
486,052 UART: [kat] ECC-384
2,950,474 UART: [kat] HMAC-384Kdf
2,972,439 UART: [kat] LMS
3,448,939 UART: [kat] --
3,452,576 UART: [cold-reset] ++
3,454,844 UART: [fht] FHT @ 0x50003400
3,466,097 UART: [idev] ++
3,466,677 UART: [idev] CDI.KEYID = 6
3,467,568 UART: [idev] SUBJECT.KEYID = 7
3,468,843 UART: [idev] UDS.KEYID = 0
3,502,109 UART: [idev] Erasing UDS.KEYID = 0
5,986,969 UART: [idev] Sha1 KeyId Algorithm
6,010,091 UART: [idev] --
6,015,289 UART: [ldev] ++
6,015,863 UART: [ldev] CDI.KEYID = 6
6,016,752 UART: [ldev] SUBJECT.KEYID = 5
6,017,975 UART: [ldev] AUTHORITY.KEYID = 7
6,019,295 UART: [ldev] FE.KEYID = 1
6,058,076 UART: [ldev] Erasing FE.KEYID = 1
8,570,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,557 UART: [ldev] --
10,376,160 UART: [fwproc] Wait for Commands...
10,379,023 UART: [fwproc] Recv command 0x43415053
10,382,590 UART: ROM Fatal Error: 0x01020006
10,385,797 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,475 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,304,807 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
4,238 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,458 UART:
192,822 UART: Running Caliptra ROM ...
193,936 UART:
603,646 UART: [state] CFI Enabled
618,178 UART: [state] LifecycleState = Unprovisioned
620,145 UART: [state] DebugLocked = No
622,354 UART: [state] WD Timer not started. Device not locked for debugging
625,982 UART: [kat] SHA2-256
805,635 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,448 UART: [kat] ++
816,897 UART: [kat] sha1
827,045 UART: [kat] SHA2-256
829,721 UART: [kat] SHA2-384
834,951 UART: [kat] SHA2-512-ACC
837,284 UART: [kat] ECC-384
3,280,462 UART: [kat] HMAC-384Kdf
3,292,696 UART: [kat] LMS
3,769,227 UART: [kat] --
3,773,807 UART: [cold-reset] ++
3,776,057 UART: [fht] FHT @ 0x50003400
3,786,759 UART: [idev] ++
3,787,363 UART: [idev] CDI.KEYID = 6
3,788,302 UART: [idev] SUBJECT.KEYID = 7
3,789,535 UART: [idev] UDS.KEYID = 0
3,806,968 UART: [idev] Erasing UDS.KEYID = 0
6,267,198 UART: [idev] Sha1 KeyId Algorithm
6,291,778 UART: [idev] --
6,296,906 UART: [ldev] ++
6,297,528 UART: [ldev] CDI.KEYID = 6
6,298,448 UART: [ldev] SUBJECT.KEYID = 5
6,299,606 UART: [ldev] AUTHORITY.KEYID = 7
6,300,894 UART: [ldev] FE.KEYID = 1
6,311,590 UART: [ldev] Erasing FE.KEYID = 1
8,790,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,054 UART: [ldev] --
10,584,839 UART: [fwproc] Wait for Commands...
10,587,330 UART: [fwproc] Recv command 0x43415053
10,590,347 UART: ROM Fatal Error: 0x01020006
10,593,549 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
4,134 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,486,355 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,124 UART: [kat] ++
895,276 UART: [kat] sha1
899,692 UART: [kat] SHA2-256
901,632 UART: [kat] SHA2-384
904,329 UART: [kat] SHA2-512-ACC
906,230 UART: [kat] ECC-384
915,965 UART: [kat] HMAC-384Kdf
920,597 UART: [kat] LMS
1,168,909 UART: [kat] --
1,169,756 UART: [cold-reset] ++
1,170,238 UART: [fht] FHT @ 0x50003400
1,172,840 UART: [idev] ++
1,173,008 UART: [idev] CDI.KEYID = 6
1,173,369 UART: [idev] SUBJECT.KEYID = 7
1,173,794 UART: [idev] UDS.KEYID = 0
1,181,921 UART: [idev] Erasing UDS.KEYID = 0
1,198,613 UART: [idev] Sha1 KeyId Algorithm
1,207,717 UART: [idev] --
1,208,660 UART: [ldev] ++
1,208,828 UART: [ldev] CDI.KEYID = 6
1,209,192 UART: [ldev] SUBJECT.KEYID = 5
1,209,619 UART: [ldev] AUTHORITY.KEYID = 7
1,210,082 UART: [ldev] FE.KEYID = 1
1,215,752 UART: [ldev] Erasing FE.KEYID = 1
1,241,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,096 UART: [ldev] --
1,281,497 UART: [fwproc] Wait for Commands...
1,282,318 UART: [fwproc] Recv command 0x43415053
1,283,480 UART: ROM Fatal Error: 0x01020006
1,284,639 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,139,167 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,547 UART: [kat] ++
895,699 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,624 UART: [kat] SHA2-512-ACC
906,525 UART: [kat] ECC-384
916,508 UART: [kat] HMAC-384Kdf
921,168 UART: [kat] LMS
1,169,480 UART: [kat] --
1,170,209 UART: [cold-reset] ++
1,170,565 UART: [fht] FHT @ 0x50003400
1,173,097 UART: [idev] ++
1,173,265 UART: [idev] CDI.KEYID = 6
1,173,626 UART: [idev] SUBJECT.KEYID = 7
1,174,051 UART: [idev] UDS.KEYID = 0
1,182,160 UART: [idev] Erasing UDS.KEYID = 0
1,199,226 UART: [idev] Sha1 KeyId Algorithm
1,208,092 UART: [idev] --
1,209,299 UART: [ldev] ++
1,209,467 UART: [ldev] CDI.KEYID = 6
1,209,831 UART: [ldev] SUBJECT.KEYID = 5
1,210,258 UART: [ldev] AUTHORITY.KEYID = 7
1,210,721 UART: [ldev] FE.KEYID = 1
1,215,747 UART: [ldev] Erasing FE.KEYID = 1
1,242,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,101 UART: [ldev] --
1,281,322 UART: [fwproc] Wait for Commands...
1,282,075 UART: [fwproc] Recv command 0x43415053
1,283,329 UART: ROM Fatal Error: 0x01020006
1,284,488 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,141,022 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,230 UART: [kat] ++
895,382 UART: [kat] sha1
899,510 UART: [kat] SHA2-256
901,450 UART: [kat] SHA2-384
904,167 UART: [kat] SHA2-512-ACC
906,068 UART: [kat] ECC-384
915,535 UART: [kat] HMAC-384Kdf
919,937 UART: [kat] LMS
1,168,249 UART: [kat] --
1,169,148 UART: [cold-reset] ++
1,169,536 UART: [fht] FHT @ 0x50003400
1,172,224 UART: [idev] ++
1,172,392 UART: [idev] CDI.KEYID = 6
1,172,753 UART: [idev] SUBJECT.KEYID = 7
1,173,178 UART: [idev] UDS.KEYID = 0
1,180,839 UART: [idev] Erasing UDS.KEYID = 0
1,197,983 UART: [idev] Sha1 KeyId Algorithm
1,206,867 UART: [idev] --
1,207,890 UART: [ldev] ++
1,208,058 UART: [ldev] CDI.KEYID = 6
1,208,422 UART: [ldev] SUBJECT.KEYID = 5
1,208,849 UART: [ldev] AUTHORITY.KEYID = 7
1,209,312 UART: [ldev] FE.KEYID = 1
1,214,680 UART: [ldev] Erasing FE.KEYID = 1
1,240,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,372 UART: [ldev] --
1,279,647 UART: [fwproc] Wait for Commands...
1,280,248 UART: [fwproc] Recv command 0x43415053
1,281,326 UART: ROM Fatal Error: 0x01020006
1,282,485 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,138,875 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,440 UART: [kat] SHA2-512-ACC
906,341 UART: [kat] ECC-384
916,082 UART: [kat] HMAC-384Kdf
920,540 UART: [kat] LMS
1,168,852 UART: [kat] --
1,169,869 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,173,019 UART: [idev] ++
1,173,187 UART: [idev] CDI.KEYID = 6
1,173,548 UART: [idev] SUBJECT.KEYID = 7
1,173,973 UART: [idev] UDS.KEYID = 0
1,181,916 UART: [idev] Erasing UDS.KEYID = 0
1,198,936 UART: [idev] Sha1 KeyId Algorithm
1,207,782 UART: [idev] --
1,209,069 UART: [ldev] ++
1,209,237 UART: [ldev] CDI.KEYID = 6
1,209,601 UART: [ldev] SUBJECT.KEYID = 5
1,210,028 UART: [ldev] AUTHORITY.KEYID = 7
1,210,491 UART: [ldev] FE.KEYID = 1
1,215,653 UART: [ldev] Erasing FE.KEYID = 1
1,242,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,623 UART: [ldev] --
1,281,862 UART: [fwproc] Wait for Commands...
1,282,457 UART: [fwproc] Recv command 0x43415053
1,283,699 UART: ROM Fatal Error: 0x01020006
1,284,858 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,140,060 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,622 UART: [state] LifecycleState = Unprovisioned
85,277 UART: [state] DebugLocked = No
85,831 UART: [state] WD Timer not started. Device not locked for debugging
87,060 UART: [kat] SHA2-256
890,610 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,714 UART: [kat] ++
894,866 UART: [kat] sha1
899,084 UART: [kat] SHA2-256
901,024 UART: [kat] SHA2-384
903,809 UART: [kat] SHA2-512-ACC
905,710 UART: [kat] ECC-384
915,663 UART: [kat] HMAC-384Kdf
920,225 UART: [kat] LMS
1,168,537 UART: [kat] --
1,169,554 UART: [cold-reset] ++
1,169,920 UART: [fht] FHT @ 0x50003400
1,172,568 UART: [idev] ++
1,172,736 UART: [idev] CDI.KEYID = 6
1,173,097 UART: [idev] SUBJECT.KEYID = 7
1,173,522 UART: [idev] UDS.KEYID = 0
1,181,435 UART: [idev] Erasing UDS.KEYID = 0
1,198,221 UART: [idev] Sha1 KeyId Algorithm
1,207,099 UART: [idev] --
1,208,258 UART: [ldev] ++
1,208,426 UART: [ldev] CDI.KEYID = 6
1,208,790 UART: [ldev] SUBJECT.KEYID = 5
1,209,217 UART: [ldev] AUTHORITY.KEYID = 7
1,209,680 UART: [ldev] FE.KEYID = 1
1,214,708 UART: [ldev] Erasing FE.KEYID = 1
1,241,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,910 UART: [ldev] --
1,280,185 UART: [fwproc] Wait for Commands...
1,280,912 UART: [fwproc] Recv command 0x43415053
1,282,198 UART: ROM Fatal Error: 0x01020006
1,283,357 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,140,261 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
916,526 UART: [kat] HMAC-384Kdf
921,232 UART: [kat] LMS
1,169,544 UART: [kat] --
1,170,313 UART: [cold-reset] ++
1,170,821 UART: [fht] FHT @ 0x50003400
1,173,429 UART: [idev] ++
1,173,597 UART: [idev] CDI.KEYID = 6
1,173,958 UART: [idev] SUBJECT.KEYID = 7
1,174,383 UART: [idev] UDS.KEYID = 0
1,182,184 UART: [idev] Erasing UDS.KEYID = 0
1,199,560 UART: [idev] Sha1 KeyId Algorithm
1,208,452 UART: [idev] --
1,209,393 UART: [ldev] ++
1,209,561 UART: [ldev] CDI.KEYID = 6
1,209,925 UART: [ldev] SUBJECT.KEYID = 5
1,210,352 UART: [ldev] AUTHORITY.KEYID = 7
1,210,815 UART: [ldev] FE.KEYID = 1
1,215,895 UART: [ldev] Erasing FE.KEYID = 1
1,242,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,523 UART: [ldev] --
1,281,816 UART: [fwproc] Wait for Commands...
1,282,425 UART: [fwproc] Recv command 0x43415053
1,283,493 UART: ROM Fatal Error: 0x01020006
1,284,652 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,140,818 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,421 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,053 UART:
192,433 UART: Running Caliptra ROM ...
193,614 UART:
193,772 UART: [state] CFI Enabled
263,774 UART: [state] LifecycleState = Unprovisioned
265,723 UART: [state] DebugLocked = No
267,588 UART: [state] WD Timer not started. Device not locked for debugging
271,275 UART: [kat] SHA2-256
450,947 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,760 UART: [kat] ++
462,299 UART: [kat] sha1
473,295 UART: [kat] SHA2-256
475,975 UART: [kat] SHA2-384
482,659 UART: [kat] SHA2-512-ACC
485,026 UART: [kat] ECC-384
2,948,629 UART: [kat] HMAC-384Kdf
2,971,889 UART: [kat] LMS
3,448,391 UART: [kat] --
3,452,517 UART: [cold-reset] ++
3,453,972 UART: [fht] FHT @ 0x50003400
3,466,358 UART: [idev] ++
3,466,936 UART: [idev] CDI.KEYID = 6
3,467,958 UART: [idev] SUBJECT.KEYID = 7
3,469,122 UART: [idev] UDS.KEYID = 0
3,501,748 UART: [idev] Erasing UDS.KEYID = 0
5,988,601 UART: [idev] Sha1 KeyId Algorithm
6,011,957 UART: [idev] --
6,016,285 UART: [ldev] ++
6,016,865 UART: [ldev] CDI.KEYID = 6
6,017,937 UART: [ldev] SUBJECT.KEYID = 5
6,019,073 UART: [ldev] AUTHORITY.KEYID = 7
6,020,258 UART: [ldev] FE.KEYID = 1
6,058,321 UART: [ldev] Erasing FE.KEYID = 1
8,563,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,576 UART: [ldev] --
10,374,184 UART: [fwproc] Wait for Commands...
10,378,880 UART: ROM Fatal Error: 0x01020009
10,382,092 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,355 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,265,313 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,439 writing to cptra_bootfsm_go
4,397 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,596 UART:
192,965 UART: Running Caliptra ROM ...
194,051 UART:
603,828 UART: [state] CFI Enabled
619,683 UART: [state] LifecycleState = Unprovisioned
621,651 UART: [state] DebugLocked = No
624,300 UART: [state] WD Timer not started. Device not locked for debugging
628,515 UART: [kat] SHA2-256
808,164 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,916 UART: [kat] ++
819,413 UART: [kat] sha1
829,904 UART: [kat] SHA2-256
832,643 UART: [kat] SHA2-384
839,588 UART: [kat] SHA2-512-ACC
841,923 UART: [kat] ECC-384
3,282,857 UART: [kat] HMAC-384Kdf
3,294,773 UART: [kat] LMS
3,771,290 UART: [kat] --
3,776,409 UART: [cold-reset] ++
3,777,671 UART: [fht] FHT @ 0x50003400
3,789,651 UART: [idev] ++
3,790,216 UART: [idev] CDI.KEYID = 6
3,791,149 UART: [idev] SUBJECT.KEYID = 7
3,792,415 UART: [idev] UDS.KEYID = 0
3,808,232 UART: [idev] Erasing UDS.KEYID = 0
6,269,302 UART: [idev] Sha1 KeyId Algorithm
6,293,069 UART: [idev] --
6,297,208 UART: [ldev] ++
6,297,790 UART: [ldev] CDI.KEYID = 6
6,298,670 UART: [ldev] SUBJECT.KEYID = 5
6,299,944 UART: [ldev] AUTHORITY.KEYID = 7
6,301,175 UART: [ldev] FE.KEYID = 1
6,312,011 UART: [ldev] Erasing FE.KEYID = 1
8,788,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,112 UART: [ldev] --
10,582,968 UART: [fwproc] Wait for Commands...
10,587,866 UART: ROM Fatal Error: 0x01020009
10,591,080 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
4,262 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,495,454 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,453 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,066 UART:
192,446 UART: Running Caliptra ROM ...
193,631 UART:
193,788 UART: [state] CFI Enabled
264,845 UART: [state] LifecycleState = Unprovisioned
266,821 UART: [state] DebugLocked = No
268,483 UART: [state] WD Timer not started. Device not locked for debugging
272,051 UART: [kat] SHA2-256
451,708 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,459 UART: [kat] ++
463,019 UART: [kat] sha1
472,507 UART: [kat] SHA2-256
475,195 UART: [kat] SHA2-384
481,287 UART: [kat] SHA2-512-ACC
483,681 UART: [kat] ECC-384
2,950,410 UART: [kat] HMAC-384Kdf
2,971,705 UART: [kat] LMS
3,448,210 UART: [kat] --
3,454,142 UART: [cold-reset] ++
3,455,109 UART: [fht] FHT @ 0x50003400
3,464,934 UART: [idev] ++
3,465,501 UART: [idev] CDI.KEYID = 6
3,466,443 UART: [idev] SUBJECT.KEYID = 7
3,467,658 UART: [idev] UDS.KEYID = 0
3,500,742 UART: [idev] Erasing UDS.KEYID = 0
5,989,155 UART: [idev] Sha1 KeyId Algorithm
6,011,646 UART: [idev] --
6,016,234 UART: [ldev] ++
6,016,805 UART: [ldev] CDI.KEYID = 6
6,017,753 UART: [ldev] SUBJECT.KEYID = 5
6,018,971 UART: [ldev] AUTHORITY.KEYID = 7
6,020,207 UART: [ldev] FE.KEYID = 1
6,056,287 UART: [ldev] Erasing FE.KEYID = 1
8,564,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,509 UART: [ldev] --
10,374,707 UART: [fwproc] Wait for Commands...
10,377,579 UART: [fwproc] Recv command 0xabcd1234
10,379,630 UART: [fwproc] Invalid command received
10,381,783 UART: ROM Fatal Error: 0x01020004
10,384,989 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,412 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,271,363 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,568 writing to cptra_bootfsm_go
5,501 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
193,695 UART:
194,069 UART: Running Caliptra ROM ...
195,244 UART:
604,676 UART: [state] CFI Enabled
621,521 UART: [state] LifecycleState = Unprovisioned
623,478 UART: [state] DebugLocked = No
625,283 UART: [state] WD Timer not started. Device not locked for debugging
630,031 UART: [kat] SHA2-256
809,653 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,439 UART: [kat] ++
820,912 UART: [kat] sha1
832,666 UART: [kat] SHA2-256
835,353 UART: [kat] SHA2-384
841,327 UART: [kat] SHA2-512-ACC
843,719 UART: [kat] ECC-384
3,285,529 UART: [kat] HMAC-384Kdf
3,297,435 UART: [kat] LMS
3,773,926 UART: [kat] --
3,778,941 UART: [cold-reset] ++
3,781,571 UART: [fht] FHT @ 0x50003400
3,792,817 UART: [idev] ++
3,793,378 UART: [idev] CDI.KEYID = 6
3,794,310 UART: [idev] SUBJECT.KEYID = 7
3,795,573 UART: [idev] UDS.KEYID = 0
3,813,516 UART: [idev] Erasing UDS.KEYID = 0
6,273,691 UART: [idev] Sha1 KeyId Algorithm
6,297,219 UART: [idev] --
6,302,905 UART: [ldev] ++
6,303,479 UART: [ldev] CDI.KEYID = 6
6,304,397 UART: [ldev] SUBJECT.KEYID = 5
6,305,608 UART: [ldev] AUTHORITY.KEYID = 7
6,306,839 UART: [ldev] FE.KEYID = 1
6,318,072 UART: [ldev] Erasing FE.KEYID = 1
8,796,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,852 UART: [ldev] --
10,590,198 UART: [fwproc] Wait for Commands...
10,592,558 UART: [fwproc] Recv command 0xabcd1234
10,594,650 UART: [fwproc] Invalid command received
10,597,509 UART: ROM Fatal Error: 0x01020004
10,600,719 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
4,231 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,496,016 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,208 UART: [kat] ++
895,360 UART: [kat] sha1
899,604 UART: [kat] SHA2-256
901,544 UART: [kat] SHA2-384
904,159 UART: [kat] SHA2-512-ACC
906,060 UART: [kat] ECC-384
915,505 UART: [kat] HMAC-384Kdf
920,105 UART: [kat] LMS
1,168,417 UART: [kat] --
1,169,388 UART: [cold-reset] ++
1,169,938 UART: [fht] FHT @ 0x50003400
1,172,554 UART: [idev] ++
1,172,722 UART: [idev] CDI.KEYID = 6
1,173,083 UART: [idev] SUBJECT.KEYID = 7
1,173,508 UART: [idev] UDS.KEYID = 0
1,181,537 UART: [idev] Erasing UDS.KEYID = 0
1,198,675 UART: [idev] Sha1 KeyId Algorithm
1,207,423 UART: [idev] --
1,208,712 UART: [ldev] ++
1,208,880 UART: [ldev] CDI.KEYID = 6
1,209,244 UART: [ldev] SUBJECT.KEYID = 5
1,209,671 UART: [ldev] AUTHORITY.KEYID = 7
1,210,134 UART: [ldev] FE.KEYID = 1
1,215,110 UART: [ldev] Erasing FE.KEYID = 1
1,240,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,180 UART: [ldev] --
1,279,627 UART: [fwproc] Wait for Commands...
1,280,420 UART: [fwproc] Recv command 0xabcd1234
1,281,162 UART: [fwproc] Invalid command received
1,282,023 UART: ROM Fatal Error: 0x01020004
1,283,182 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,138,774 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,895 UART: [state] LifecycleState = Unprovisioned
86,550 UART: [state] DebugLocked = No
87,284 UART: [state] WD Timer not started. Device not locked for debugging
88,591 UART: [kat] SHA2-256
892,141 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,245 UART: [kat] ++
896,397 UART: [kat] sha1
900,575 UART: [kat] SHA2-256
902,515 UART: [kat] SHA2-384
905,452 UART: [kat] SHA2-512-ACC
907,353 UART: [kat] ECC-384
917,152 UART: [kat] HMAC-384Kdf
921,640 UART: [kat] LMS
1,169,952 UART: [kat] --
1,171,033 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,174,187 UART: [idev] ++
1,174,355 UART: [idev] CDI.KEYID = 6
1,174,716 UART: [idev] SUBJECT.KEYID = 7
1,175,141 UART: [idev] UDS.KEYID = 0
1,182,964 UART: [idev] Erasing UDS.KEYID = 0
1,200,130 UART: [idev] Sha1 KeyId Algorithm
1,209,078 UART: [idev] --
1,210,159 UART: [ldev] ++
1,210,327 UART: [ldev] CDI.KEYID = 6
1,210,691 UART: [ldev] SUBJECT.KEYID = 5
1,211,118 UART: [ldev] AUTHORITY.KEYID = 7
1,211,581 UART: [ldev] FE.KEYID = 1
1,216,837 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,907 UART: [ldev] --
1,282,252 UART: [fwproc] Wait for Commands...
1,282,995 UART: [fwproc] Recv command 0xabcd1234
1,283,737 UART: [fwproc] Invalid command received
1,284,914 UART: ROM Fatal Error: 0x01020004
1,286,073 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,140,831 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
891,304 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,726 UART: [kat] SHA2-256
901,666 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
915,507 UART: [kat] HMAC-384Kdf
920,135 UART: [kat] LMS
1,168,447 UART: [kat] --
1,169,350 UART: [cold-reset] ++
1,169,860 UART: [fht] FHT @ 0x50003400
1,172,504 UART: [idev] ++
1,172,672 UART: [idev] CDI.KEYID = 6
1,173,033 UART: [idev] SUBJECT.KEYID = 7
1,173,458 UART: [idev] UDS.KEYID = 0
1,181,287 UART: [idev] Erasing UDS.KEYID = 0
1,198,427 UART: [idev] Sha1 KeyId Algorithm
1,207,255 UART: [idev] --
1,208,360 UART: [ldev] ++
1,208,528 UART: [ldev] CDI.KEYID = 6
1,208,892 UART: [ldev] SUBJECT.KEYID = 5
1,209,319 UART: [ldev] AUTHORITY.KEYID = 7
1,209,782 UART: [ldev] FE.KEYID = 1
1,215,186 UART: [ldev] Erasing FE.KEYID = 1
1,241,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,420 UART: [ldev] --
1,280,711 UART: [fwproc] Wait for Commands...
1,281,446 UART: [fwproc] Recv command 0xabcd1234
1,282,188 UART: [fwproc] Invalid command received
1,283,181 UART: ROM Fatal Error: 0x01020004
1,284,340 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,138,862 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,541 UART: [kat] ++
895,693 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
916,204 UART: [kat] HMAC-384Kdf
920,952 UART: [kat] LMS
1,169,264 UART: [kat] --
1,169,999 UART: [cold-reset] ++
1,170,577 UART: [fht] FHT @ 0x50003400
1,173,229 UART: [idev] ++
1,173,397 UART: [idev] CDI.KEYID = 6
1,173,758 UART: [idev] SUBJECT.KEYID = 7
1,174,183 UART: [idev] UDS.KEYID = 0
1,181,930 UART: [idev] Erasing UDS.KEYID = 0
1,198,864 UART: [idev] Sha1 KeyId Algorithm
1,207,514 UART: [idev] --
1,208,445 UART: [ldev] ++
1,208,613 UART: [ldev] CDI.KEYID = 6
1,208,977 UART: [ldev] SUBJECT.KEYID = 5
1,209,404 UART: [ldev] AUTHORITY.KEYID = 7
1,209,867 UART: [ldev] FE.KEYID = 1
1,215,127 UART: [ldev] Erasing FE.KEYID = 1
1,241,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,111 UART: [ldev] --
1,280,422 UART: [fwproc] Wait for Commands...
1,281,235 UART: [fwproc] Recv command 0xabcd1234
1,281,977 UART: [fwproc] Invalid command received
1,282,906 UART: ROM Fatal Error: 0x01020004
1,284,065 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,139,759 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,266 UART: [kat] ++
895,418 UART: [kat] sha1
899,674 UART: [kat] SHA2-256
901,614 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
915,589 UART: [kat] HMAC-384Kdf
920,103 UART: [kat] LMS
1,168,415 UART: [kat] --
1,169,434 UART: [cold-reset] ++
1,169,890 UART: [fht] FHT @ 0x50003400
1,172,480 UART: [idev] ++
1,172,648 UART: [idev] CDI.KEYID = 6
1,173,009 UART: [idev] SUBJECT.KEYID = 7
1,173,434 UART: [idev] UDS.KEYID = 0
1,181,307 UART: [idev] Erasing UDS.KEYID = 0
1,198,207 UART: [idev] Sha1 KeyId Algorithm
1,207,045 UART: [idev] --
1,208,152 UART: [ldev] ++
1,208,320 UART: [ldev] CDI.KEYID = 6
1,208,684 UART: [ldev] SUBJECT.KEYID = 5
1,209,111 UART: [ldev] AUTHORITY.KEYID = 7
1,209,574 UART: [ldev] FE.KEYID = 1
1,214,724 UART: [ldev] Erasing FE.KEYID = 1
1,240,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,276 UART: [ldev] --
1,279,683 UART: [fwproc] Wait for Commands...
1,280,390 UART: [fwproc] Recv command 0xabcd1234
1,281,132 UART: [fwproc] Invalid command received
1,282,081 UART: ROM Fatal Error: 0x01020004
1,283,240 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,139,778 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,560 UART: [kat] LMS
1,168,872 UART: [kat] --
1,169,581 UART: [cold-reset] ++
1,170,109 UART: [fht] FHT @ 0x50003400
1,172,665 UART: [idev] ++
1,172,833 UART: [idev] CDI.KEYID = 6
1,173,194 UART: [idev] SUBJECT.KEYID = 7
1,173,619 UART: [idev] UDS.KEYID = 0
1,181,580 UART: [idev] Erasing UDS.KEYID = 0
1,199,118 UART: [idev] Sha1 KeyId Algorithm
1,207,810 UART: [idev] --
1,208,877 UART: [ldev] ++
1,209,045 UART: [ldev] CDI.KEYID = 6
1,209,409 UART: [ldev] SUBJECT.KEYID = 5
1,209,836 UART: [ldev] AUTHORITY.KEYID = 7
1,210,299 UART: [ldev] FE.KEYID = 1
1,215,565 UART: [ldev] Erasing FE.KEYID = 1
1,242,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,691 UART: [ldev] --
1,281,036 UART: [fwproc] Wait for Commands...
1,281,677 UART: [fwproc] Recv command 0xabcd1234
1,282,419 UART: [fwproc] Invalid command received
1,283,358 UART: ROM Fatal Error: 0x01020004
1,284,517 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,140,871 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
191,932 UART:
192,290 UART: Running Caliptra ROM ...
193,394 UART:
193,541 UART: [state] CFI Enabled
268,023 UART: [state] LifecycleState = Unprovisioned
269,987 UART: [state] DebugLocked = No
272,723 UART: [state] WD Timer not started. Device not locked for debugging
275,983 UART: [kat] SHA2-256
455,590 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,394 UART: [kat] ++
466,847 UART: [kat] sha1
477,157 UART: [kat] SHA2-256
479,820 UART: [kat] SHA2-384
486,598 UART: [kat] SHA2-512-ACC
488,902 UART: [kat] ECC-384
2,949,356 UART: [kat] HMAC-384Kdf
2,971,912 UART: [kat] LMS
3,448,379 UART: [kat] --
3,451,528 UART: [cold-reset] ++
3,452,469 UART: [fht] FHT @ 0x50003400
3,462,508 UART: [idev] ++
3,463,110 UART: [idev] CDI.KEYID = 6
3,464,003 UART: [idev] SUBJECT.KEYID = 7
3,465,259 UART: [idev] UDS.KEYID = 0
3,466,166 ready_for_fw is high
3,466,363 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,604,387 UART: [idev] Erasing UDS.KEYID = 0
5,987,742 UART: [idev] Sha1 KeyId Algorithm
6,011,353 UART: [idev] --
6,015,029 UART: [ldev] ++
6,015,666 UART: [ldev] CDI.KEYID = 6
6,016,564 UART: [ldev] SUBJECT.KEYID = 5
6,017,788 UART: [ldev] AUTHORITY.KEYID = 7
6,019,031 UART: [ldev] FE.KEYID = 1
6,059,151 UART: [ldev] Erasing FE.KEYID = 1
8,567,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,798 UART: [ldev] --
10,374,905 UART: [fwproc] Wait for Commands...
10,378,189 UART: [fwproc] Recv command 0x46574c44
10,380,173 UART: [fwproc] Recv'd Img size: 109820 bytes
13,757,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,834,578 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,877,077 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,205,296 >>> mbox cmd response: success
14,205,677 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,209,507 UART: [afmc] ++
14,210,118 UART: [afmc] CDI.KEYID = 6
14,211,012 UART: [afmc] SUBJECT.KEYID = 7
14,212,294 UART: [afmc] AUTHORITY.KEYID = 5
16,751,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,492,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,494,689 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,510,516 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,526,485 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,542,126 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,566,656 UART: [afmc] --
18,570,526 UART: [cold-reset] --
18,574,987 UART: [state] Locking Datavault
18,581,736 UART: [state] Locking PCR0, PCR1 and PCR31
18,583,451 UART: [state] Locking ICCM
18,586,283 UART: [exit] Launching FMC @ 0x40000000
18,594,629 UART:
18,594,866 UART: Running Caliptra FMC ...
18,595,896 UART:
18,596,048 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,597,720 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,460,240 ready_for_fw is high
3,460,635 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,085,548 >>> mbox cmd response: success
14,086,001 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,363,218 UART:
18,363,597 UART: Running Caliptra FMC ...
18,364,837 UART:
18,365,018 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,366,719 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,396 UART:
192,753 UART: Running Caliptra ROM ...
193,842 UART:
603,620 UART: [state] CFI Enabled
614,451 UART: [state] LifecycleState = Unprovisioned
616,397 UART: [state] DebugLocked = No
619,274 UART: [state] WD Timer not started. Device not locked for debugging
623,506 UART: [kat] SHA2-256
803,173 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,970 UART: [kat] ++
814,446 UART: [kat] sha1
825,599 UART: [kat] SHA2-256
828,255 UART: [kat] SHA2-384
835,239 UART: [kat] SHA2-512-ACC
837,604 UART: [kat] ECC-384
3,279,320 UART: [kat] HMAC-384Kdf
3,291,640 UART: [kat] LMS
3,768,178 UART: [kat] --
3,771,746 UART: [cold-reset] ++
3,774,033 UART: [fht] FHT @ 0x50003400
3,785,389 UART: [idev] ++
3,785,965 UART: [idev] CDI.KEYID = 6
3,786,997 UART: [idev] SUBJECT.KEYID = 7
3,788,171 UART: [idev] UDS.KEYID = 0
3,789,095 ready_for_fw is high
3,789,296 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,927,254 UART: [idev] Erasing UDS.KEYID = 0
6,266,517 UART: [idev] Sha1 KeyId Algorithm
6,290,770 UART: [idev] --
6,295,735 UART: [ldev] ++
6,296,361 UART: [ldev] CDI.KEYID = 6
6,297,268 UART: [ldev] SUBJECT.KEYID = 5
6,298,477 UART: [ldev] AUTHORITY.KEYID = 7
6,299,712 UART: [ldev] FE.KEYID = 1
6,312,904 UART: [ldev] Erasing FE.KEYID = 1
8,797,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,558 UART: [ldev] --
10,590,820 UART: [fwproc] Wait for Commands...
10,593,832 UART: [fwproc] Recv command 0x46574c44
10,595,872 UART: [fwproc] Recv'd Img size: 109820 bytes
13,972,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,049,791 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,092,297 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,419,673 >>> mbox cmd response: success
14,420,585 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,424,130 UART: [afmc] ++
14,424,728 UART: [afmc] CDI.KEYID = 6
14,425,660 UART: [afmc] SUBJECT.KEYID = 7
14,426,892 UART: [afmc] AUTHORITY.KEYID = 5
16,927,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,652,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,654,328 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,670,123 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,686,115 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,701,786 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,727,261 UART: [afmc] --
18,731,892 UART: [cold-reset] --
18,735,918 UART: [state] Locking Datavault
18,740,948 UART: [state] Locking PCR0, PCR1 and PCR31
18,742,700 UART: [state] Locking ICCM
18,745,063 UART: [exit] Launching FMC @ 0x40000000
18,753,460 UART:
18,753,699 UART: Running Caliptra FMC ...
18,754,804 UART:
18,754,987 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,756,646 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
3,777,342 ready_for_fw is high
3,777,770 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,300,943 >>> mbox cmd response: success
14,302,323 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,554,572 UART:
18,554,965 UART: Running Caliptra FMC ...
18,556,121 UART:
18,556,270 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,557,967 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
890,838 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,942 UART: [kat] ++
895,094 UART: [kat] sha1
899,340 UART: [kat] SHA2-256
901,280 UART: [kat] SHA2-384
904,059 UART: [kat] SHA2-512-ACC
905,960 UART: [kat] ECC-384
915,841 UART: [kat] HMAC-384Kdf
920,527 UART: [kat] LMS
1,168,839 UART: [kat] --
1,169,664 UART: [cold-reset] ++
1,170,080 UART: [fht] FHT @ 0x50003400
1,172,800 UART: [idev] ++
1,172,968 UART: [idev] CDI.KEYID = 6
1,173,329 UART: [idev] SUBJECT.KEYID = 7
1,173,754 UART: [idev] UDS.KEYID = 0
1,174,100 ready_for_fw is high
1,174,100 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,198,299 UART: [idev] Sha1 KeyId Algorithm
1,207,135 UART: [idev] --
1,208,232 UART: [ldev] ++
1,208,400 UART: [ldev] CDI.KEYID = 6
1,208,764 UART: [ldev] SUBJECT.KEYID = 5
1,209,191 UART: [ldev] AUTHORITY.KEYID = 7
1,209,654 UART: [ldev] FE.KEYID = 1
1,214,770 UART: [ldev] Erasing FE.KEYID = 1
1,240,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,568 UART: [ldev] --
1,279,883 UART: [fwproc] Wait for Commands...
1,280,496 UART: [fwproc] Recv command 0x46574c44
1,281,229 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,487 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,570 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,710,793 >>> mbox cmd response: success
2,710,793 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,712,015 UART: [afmc] ++
2,712,183 UART: [afmc] CDI.KEYID = 6
2,712,546 UART: [afmc] SUBJECT.KEYID = 7
2,712,972 UART: [afmc] AUTHORITY.KEYID = 5
2,748,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,764,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,765,580 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,300 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,193 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,782,886 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,790,599 UART: [afmc] --
2,791,586 UART: [cold-reset] --
2,792,408 UART: [state] Locking Datavault
2,793,363 UART: [state] Locking PCR0, PCR1 and PCR31
2,793,967 UART: [state] Locking ICCM
2,794,631 UART: [exit] Launching FMC @ 0x40000000
2,799,928 UART:
2,799,944 UART: Running Caliptra FMC ...
2,800,352 UART:
2,800,490 UART: [fmc] Received command: 0x10000008
2,801,522 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,266 ready_for_fw is high
1,059,266 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,156 >>> mbox cmd response: success
2,566,156 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,628,623 UART:
2,628,639 UART: Running Caliptra FMC ...
2,629,047 UART:
2,629,185 UART: [fmc] Received command: 0x10000008
2,630,217 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,116 UART: [state] WD Timer not started. Device not locked for debugging
88,305 UART: [kat] SHA2-256
891,855 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,959 UART: [kat] ++
896,111 UART: [kat] sha1
900,375 UART: [kat] SHA2-256
902,315 UART: [kat] SHA2-384
905,158 UART: [kat] SHA2-512-ACC
907,059 UART: [kat] ECC-384
917,032 UART: [kat] HMAC-384Kdf
921,462 UART: [kat] LMS
1,169,774 UART: [kat] --
1,170,771 UART: [cold-reset] ++
1,171,349 UART: [fht] FHT @ 0x50003400
1,173,993 UART: [idev] ++
1,174,161 UART: [idev] CDI.KEYID = 6
1,174,522 UART: [idev] SUBJECT.KEYID = 7
1,174,947 UART: [idev] UDS.KEYID = 0
1,175,293 ready_for_fw is high
1,175,293 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,284 UART: [idev] Erasing UDS.KEYID = 0
1,200,206 UART: [idev] Sha1 KeyId Algorithm
1,209,196 UART: [idev] --
1,210,311 UART: [ldev] ++
1,210,479 UART: [ldev] CDI.KEYID = 6
1,210,843 UART: [ldev] SUBJECT.KEYID = 5
1,211,270 UART: [ldev] AUTHORITY.KEYID = 7
1,211,733 UART: [ldev] FE.KEYID = 1
1,217,201 UART: [ldev] Erasing FE.KEYID = 1
1,243,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,157 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,277 UART: [fwproc] Recv command 0x46574c44
1,284,010 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,846 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,929 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,102 >>> mbox cmd response: success
2,713,102 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,714,214 UART: [afmc] ++
2,714,382 UART: [afmc] CDI.KEYID = 6
2,714,745 UART: [afmc] SUBJECT.KEYID = 7
2,715,171 UART: [afmc] AUTHORITY.KEYID = 5
2,750,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,915 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,635 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,528 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,221 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,938 UART: [afmc] --
2,793,825 UART: [cold-reset] --
2,794,591 UART: [state] Locking Datavault
2,795,606 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,210 UART: [state] Locking ICCM
2,796,746 UART: [exit] Launching FMC @ 0x40000000
2,802,043 UART:
2,802,059 UART: Running Caliptra FMC ...
2,802,467 UART:
2,802,605 UART: [fmc] Received command: 0x10000008
2,803,637 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,565 ready_for_fw is high
1,059,565 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,981 >>> mbox cmd response: success
2,565,981 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,628,378 UART:
2,628,394 UART: Running Caliptra FMC ...
2,628,802 UART:
2,628,940 UART: [fmc] Received command: 0x10000008
2,629,972 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,592 UART: [state] LifecycleState = Unprovisioned
86,247 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
88,014 UART: [kat] SHA2-256
891,564 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
900,194 UART: [kat] SHA2-256
902,134 UART: [kat] SHA2-384
904,909 UART: [kat] SHA2-512-ACC
906,810 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,037 UART: [kat] LMS
1,169,349 UART: [kat] --
1,170,262 UART: [cold-reset] ++
1,170,712 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,174,590 ready_for_fw is high
1,174,590 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,351 UART: [idev] Erasing UDS.KEYID = 0
1,199,239 UART: [idev] Sha1 KeyId Algorithm
1,207,891 UART: [idev] --
1,208,740 UART: [ldev] ++
1,208,908 UART: [ldev] CDI.KEYID = 6
1,209,272 UART: [ldev] SUBJECT.KEYID = 5
1,209,699 UART: [ldev] AUTHORITY.KEYID = 7
1,210,162 UART: [ldev] FE.KEYID = 1
1,215,396 UART: [ldev] Erasing FE.KEYID = 1
1,241,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,558 UART: [ldev] --
1,280,829 UART: [fwproc] Wait for Commands...
1,281,530 UART: [fwproc] Recv command 0x46574c44
1,282,263 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,325 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,408 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,813 >>> mbox cmd response: success
2,712,813 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,714,069 UART: [afmc] ++
2,714,237 UART: [afmc] CDI.KEYID = 6
2,714,600 UART: [afmc] SUBJECT.KEYID = 7
2,715,026 UART: [afmc] AUTHORITY.KEYID = 5
2,750,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,795 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,544 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,264 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,157 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,850 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,647 UART: [afmc] --
2,793,654 UART: [cold-reset] --
2,794,560 UART: [state] Locking Datavault
2,795,619 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,223 UART: [state] Locking ICCM
2,796,643 UART: [exit] Launching FMC @ 0x40000000
2,801,940 UART:
2,801,956 UART: Running Caliptra FMC ...
2,802,364 UART:
2,802,502 UART: [fmc] Received command: 0x10000008
2,803,534 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,466 ready_for_fw is high
1,059,466 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,000 >>> mbox cmd response: success
2,565,000 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,627,017 UART:
2,627,033 UART: Running Caliptra FMC ...
2,627,441 UART:
2,627,579 UART: [fmc] Received command: 0x10000008
2,628,611 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,747 UART: [kat] ++
895,899 UART: [kat] sha1
900,089 UART: [kat] SHA2-256
902,029 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,246 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,170,265 UART: [cold-reset] ++
1,170,703 UART: [fht] FHT @ 0x50003400
1,173,305 UART: [idev] ++
1,173,473 UART: [idev] CDI.KEYID = 6
1,173,834 UART: [idev] SUBJECT.KEYID = 7
1,174,259 UART: [idev] UDS.KEYID = 0
1,174,605 ready_for_fw is high
1,174,605 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,110 UART: [idev] Sha1 KeyId Algorithm
1,207,936 UART: [idev] --
1,209,173 UART: [ldev] ++
1,209,341 UART: [ldev] CDI.KEYID = 6
1,209,705 UART: [ldev] SUBJECT.KEYID = 5
1,210,132 UART: [ldev] AUTHORITY.KEYID = 7
1,210,595 UART: [ldev] FE.KEYID = 1
1,215,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,045 UART: [ldev] --
1,281,302 UART: [fwproc] Wait for Commands...
1,281,993 UART: [fwproc] Recv command 0x46574c44
1,282,726 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,142 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,225 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,466 >>> mbox cmd response: success
2,712,466 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,713,656 UART: [afmc] ++
2,713,824 UART: [afmc] CDI.KEYID = 6
2,714,187 UART: [afmc] SUBJECT.KEYID = 7
2,714,613 UART: [afmc] AUTHORITY.KEYID = 5
2,750,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,042 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,791 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,511 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,404 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,097 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,996 UART: [afmc] --
2,793,833 UART: [cold-reset] --
2,794,839 UART: [state] Locking Datavault
2,796,068 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,672 UART: [state] Locking ICCM
2,797,264 UART: [exit] Launching FMC @ 0x40000000
2,802,561 UART:
2,802,577 UART: Running Caliptra FMC ...
2,802,985 UART:
2,803,123 UART: [fmc] Received command: 0x10000008
2,804,155 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,161 ready_for_fw is high
1,060,161 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,297 >>> mbox cmd response: success
2,566,297 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,627,604 UART:
2,627,620 UART: Running Caliptra FMC ...
2,628,028 UART:
2,628,166 UART: [fmc] Received command: 0x10000008
2,629,198 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,324 UART: [kat] ++
895,476 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,359 UART: [kat] SHA2-512-ACC
906,260 UART: [kat] ECC-384
915,839 UART: [kat] HMAC-384Kdf
920,471 UART: [kat] LMS
1,168,783 UART: [kat] --
1,169,630 UART: [cold-reset] ++
1,170,146 UART: [fht] FHT @ 0x50003400
1,172,826 UART: [idev] ++
1,172,994 UART: [idev] CDI.KEYID = 6
1,173,355 UART: [idev] SUBJECT.KEYID = 7
1,173,780 UART: [idev] UDS.KEYID = 0
1,174,126 ready_for_fw is high
1,174,126 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,677 UART: [idev] Erasing UDS.KEYID = 0
1,199,111 UART: [idev] Sha1 KeyId Algorithm
1,208,039 UART: [idev] --
1,208,882 UART: [ldev] ++
1,209,050 UART: [ldev] CDI.KEYID = 6
1,209,414 UART: [ldev] SUBJECT.KEYID = 5
1,209,841 UART: [ldev] AUTHORITY.KEYID = 7
1,210,304 UART: [ldev] FE.KEYID = 1
1,215,298 UART: [ldev] Erasing FE.KEYID = 1
1,241,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,798 UART: [ldev] --
1,281,089 UART: [fwproc] Wait for Commands...
1,281,772 UART: [fwproc] Recv command 0x46574c44
1,282,505 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,135 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,218 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,607 >>> mbox cmd response: success
2,713,607 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,714,705 UART: [afmc] ++
2,714,873 UART: [afmc] CDI.KEYID = 6
2,715,236 UART: [afmc] SUBJECT.KEYID = 7
2,715,662 UART: [afmc] AUTHORITY.KEYID = 5
2,750,798 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,071 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,820 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,540 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,433 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,126 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,893 UART: [afmc] --
2,793,830 UART: [cold-reset] --
2,794,524 UART: [state] Locking Datavault
2,795,469 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,073 UART: [state] Locking ICCM
2,796,673 UART: [exit] Launching FMC @ 0x40000000
2,801,970 UART:
2,801,986 UART: Running Caliptra FMC ...
2,802,394 UART:
2,802,532 UART: [fmc] Received command: 0x10000008
2,803,564 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,368 ready_for_fw is high
1,059,368 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,398 >>> mbox cmd response: success
2,564,398 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,626,165 UART:
2,626,181 UART: Running Caliptra FMC ...
2,626,589 UART:
2,626,727 UART: [fmc] Received command: 0x10000008
2,627,759 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [kat] SHA2-256
891,689 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,793 UART: [kat] ++
895,945 UART: [kat] sha1
900,353 UART: [kat] SHA2-256
902,293 UART: [kat] SHA2-384
905,146 UART: [kat] SHA2-512-ACC
907,047 UART: [kat] ECC-384
916,612 UART: [kat] HMAC-384Kdf
921,206 UART: [kat] LMS
1,169,518 UART: [kat] --
1,170,451 UART: [cold-reset] ++
1,170,997 UART: [fht] FHT @ 0x50003400
1,173,739 UART: [idev] ++
1,173,907 UART: [idev] CDI.KEYID = 6
1,174,268 UART: [idev] SUBJECT.KEYID = 7
1,174,693 UART: [idev] UDS.KEYID = 0
1,175,039 ready_for_fw is high
1,175,039 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,364 UART: [idev] Erasing UDS.KEYID = 0
1,199,718 UART: [idev] Sha1 KeyId Algorithm
1,208,460 UART: [idev] --
1,209,451 UART: [ldev] ++
1,209,619 UART: [ldev] CDI.KEYID = 6
1,209,983 UART: [ldev] SUBJECT.KEYID = 5
1,210,410 UART: [ldev] AUTHORITY.KEYID = 7
1,210,873 UART: [ldev] FE.KEYID = 1
1,216,131 UART: [ldev] Erasing FE.KEYID = 1
1,242,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,559 UART: [ldev] --
1,281,814 UART: [fwproc] Wait for Commands...
1,282,621 UART: [fwproc] Recv command 0x46574c44
1,283,354 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,888 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,971 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,154 >>> mbox cmd response: success
2,713,154 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,714,320 UART: [afmc] ++
2,714,488 UART: [afmc] CDI.KEYID = 6
2,714,851 UART: [afmc] SUBJECT.KEYID = 7
2,715,277 UART: [afmc] AUTHORITY.KEYID = 5
2,750,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,907 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,627 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,520 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,213 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,060 UART: [afmc] --
2,794,079 UART: [cold-reset] --
2,794,725 UART: [state] Locking Datavault
2,795,906 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,510 UART: [state] Locking ICCM
2,797,156 UART: [exit] Launching FMC @ 0x40000000
2,802,453 UART:
2,802,469 UART: Running Caliptra FMC ...
2,802,877 UART:
2,803,015 UART: [fmc] Received command: 0x10000008
2,804,047 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,609 ready_for_fw is high
1,059,609 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,885 >>> mbox cmd response: success
2,565,885 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,627,676 UART:
2,627,692 UART: Running Caliptra FMC ...
2,628,100 UART:
2,628,238 UART: [fmc] Received command: 0x10000008
2,629,270 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
192,056 UART:
192,434 UART: Running Caliptra ROM ...
193,741 UART:
193,901 UART: [state] CFI Enabled
264,473 UART: [state] LifecycleState = Unprovisioned
266,385 UART: [state] DebugLocked = No
269,332 UART: [state] WD Timer not started. Device not locked for debugging
272,775 UART: [kat] SHA2-256
452,419 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,845 UART: ROM integrity test failed
464,140 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 42432
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6d0e53e94a8701dc749ad5199cef945d895de7af15e8717a4c273aee640ce2b94ede4ecaadcb390a4ef6a92ae1cd149c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,842 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
192,358 UART:
192,741 UART: Running Caliptra ROM ...
193,868 UART:
603,650 UART: [state] CFI Enabled
618,243 UART: [state] LifecycleState = Unprovisioned
620,168 UART: [state] DebugLocked = No
623,113 UART: [state] WD Timer not started. Device not locked for debugging
627,548 UART: [kat] SHA2-256
807,231 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,621 UART: ROM integrity test failed
818,911 UART: ROM Fatal Error: 0x90080001test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 42432
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6d0e53e94a8701dc749ad5199cef945d895de7af15e8717a4c273aee640ce2b94ede4ecaadcb390a4ef6a92ae1cd149c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,096 UART: ROM integrity test failed
895,543 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.28s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,810 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,513 UART: ROM integrity test failed
895,960 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.27s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.23s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,096 UART: ROM integrity test failed
895,543 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.23s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,293 UART: ROM integrity test failed
895,740 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.28s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.23s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,226 UART: ROM integrity test failed
895,673 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.27s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.25s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
891,665 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,611 UART: ROM integrity test failed
896,058 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.23s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,182 UART:
192,525 UART: Running Caliptra ROM ...
193,713 UART:
193,879 UART: [state] CFI Enabled
266,539 UART: [state] LifecycleState = Unprovisioned
268,467 UART: [state] DebugLocked = No
269,936 UART: [state] WD Timer not started. Device not locked for debugging
273,474 UART: [kat] SHA2-256
453,083 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,908 UART: [kat] ++
464,401 UART: [kat] sha1
476,400 UART: [kat] SHA2-256
479,112 UART: [kat] SHA2-384
485,972 UART: [kat] SHA2-512-ACC
488,352 UART: [kat] ECC-384
2,952,325 UART: [kat] HMAC-384Kdf
2,972,815 UART: [kat] LMS
3,449,327 UART: [kat] --
3,453,466 UART: [cold-reset] ++
3,455,329 UART: [fht] FHT @ 0x50003400
3,466,802 UART: [idev] ++
3,467,377 UART: [idev] CDI.KEYID = 6
3,468,262 UART: [idev] SUBJECT.KEYID = 7
3,469,583 UART: [idev] UDS.KEYID = 0
3,470,507 ready_for_fw is high
3,470,695 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,615,190 UART: [idev] Erasing UDS.KEYID = 0
5,990,445 UART: [idev] Sha1 KeyId Algorithm
6,014,315 UART: [idev] --
6,019,483 UART: [ldev] ++
6,020,071 UART: [ldev] CDI.KEYID = 6
6,020,999 UART: [ldev] SUBJECT.KEYID = 5
6,022,170 UART: [ldev] AUTHORITY.KEYID = 7
6,023,471 UART: [ldev] FE.KEYID = 1
6,058,541 UART: [ldev] Erasing FE.KEYID = 1
8,568,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,945 UART: [ldev] --
10,377,325 UART: [fwproc] Wait for Commands...
10,380,394 UART: [fwproc] Recv command 0x46574c44
10,382,432 UART: [fwproc] Recv'd Img size: 114888 bytes
13,818,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,570 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,950,784 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,279,585 >>> mbox cmd response: success
14,283,730 UART: [afmc] ++
14,284,331 UART: [afmc] CDI.KEYID = 6
14,285,252 UART: [afmc] SUBJECT.KEYID = 7
14,286,475 UART: [afmc] AUTHORITY.KEYID = 5
16,833,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,574,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,576,652 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,592,423 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,608,527 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,624,005 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,647,188 UART: [afmc] --
18,651,493 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,796,544 UART: [cold-reset] --
18,797,407 UART: [state] Locking Datavault
18,798,568 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,111 UART: [state] Locking ICCM
18,801,021 UART: [exit] Launching FMC @ 0x40000000
18,802,452 UART:
18,802,619 UART: Running Caliptra FMC ...
18,803,717 UART:
18,803,883 UART: [fmc] Received command: 0x46574C44
18,805,346 UART:
18,805,506 UART: Running Caliptra ROM ...
18,806,606 UART:
18,806,784 UART: [state] CFI Enabled
18,864,802 UART: [state] LifecycleState = Unprovisioned
18,866,698 UART: [state] DebugLocked = No
18,868,025 UART: [state] WD Timer not started. Device not locked for debugging
18,871,290 UART: [kat] SHA2-256
19,050,941 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,061,739 UART: [kat] ++
19,062,204 UART: [kat] sha1
19,074,232 UART: [kat] SHA2-256
19,076,931 UART: [kat] SHA2-384
19,082,487 UART: [kat] SHA2-512-ACC
19,084,834 UART: [kat] ECC-384
21,547,408 UART: [kat] HMAC-384Kdf
21,571,365 UART: [kat] LMS
22,047,808 UART: [kat] --
22,052,396 UART: [update-reset] ++
25,501,698 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,505,142 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,889,952 >>> mbox cmd response: success
25,891,963 UART: [update-reset] Copying MAN_2 To MAN_1
25,929,091 UART: [update-reset Success] --
25,930,454 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,932,524 UART: [state] Locking Datavault
25,935,026 UART: [state] Locking PCR0, PCR1 and PCR31
25,936,736 UART: [state] Locking ICCM
25,939,194 UART: [exit] Launching FMC @ 0x40000000
25,947,538 UART:
25,947,784 UART: Running Caliptra FMC ...
25,948,812 UART:
25,948,967 UART: [fmc] Received command: 0x1000000D
25,950,543 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,458,999 ready_for_fw is high
3,459,397 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,179,426 >>> mbox cmd response: success
18,453,551 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,598,660 UART:
18,599,055 UART: Running Caliptra FMC ...
18,600,271 UART:
18,600,455 UART: [fmc] Received command: 0x46574C44
25,698,737 >>> mbox cmd response: success
25,721,253 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,735,073 UART:
25,735,331 UART: Running Caliptra FMC ...
25,736,425 UART:
25,736,585 UART: [fmc] Received command: 0x1000000D
25,738,117 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,422 UART:
192,791 UART: Running Caliptra ROM ...
193,919 UART:
603,640 UART: [state] CFI Enabled
618,024 UART: [state] LifecycleState = Unprovisioned
619,905 UART: [state] DebugLocked = No
622,357 UART: [state] WD Timer not started. Device not locked for debugging
626,099 UART: [kat] SHA2-256
805,769 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,564 UART: [kat] ++
817,038 UART: [kat] sha1
829,027 UART: [kat] SHA2-256
831,736 UART: [kat] SHA2-384
836,526 UART: [kat] SHA2-512-ACC
838,894 UART: [kat] ECC-384
3,282,412 UART: [kat] HMAC-384Kdf
3,296,144 UART: [kat] LMS
3,772,602 UART: [kat] --
3,778,728 UART: [cold-reset] ++
3,779,732 UART: [fht] FHT @ 0x50003400
3,791,096 UART: [idev] ++
3,791,702 UART: [idev] CDI.KEYID = 6
3,792,588 UART: [idev] SUBJECT.KEYID = 7
3,793,898 UART: [idev] UDS.KEYID = 0
3,794,792 ready_for_fw is high
3,794,975 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,939,474 UART: [idev] Erasing UDS.KEYID = 0
6,271,618 UART: [idev] Sha1 KeyId Algorithm
6,295,328 UART: [idev] --
6,300,343 UART: [ldev] ++
6,300,910 UART: [ldev] CDI.KEYID = 6
6,301,926 UART: [ldev] SUBJECT.KEYID = 5
6,303,031 UART: [ldev] AUTHORITY.KEYID = 7
6,304,318 UART: [ldev] FE.KEYID = 1
6,317,065 UART: [ldev] Erasing FE.KEYID = 1
8,798,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,090 UART: [ldev] --
10,595,262 UART: [fwproc] Wait for Commands...
10,598,493 UART: [fwproc] Recv command 0x46574c44
10,600,472 UART: [fwproc] Recv'd Img size: 114888 bytes
14,043,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,129,275 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,189,459 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,517,753 >>> mbox cmd response: success
14,521,686 UART: [afmc] ++
14,522,299 UART: [afmc] CDI.KEYID = 6
14,523,184 UART: [afmc] SUBJECT.KEYID = 7
14,524,451 UART: [afmc] AUTHORITY.KEYID = 5
17,025,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,747,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,750,002 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,765,772 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,781,845 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,797,370 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,820,925 UART: [afmc] --
18,826,974 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,971,568 UART: [cold-reset] --
18,972,418 UART: [state] Locking Datavault
18,973,485 UART: [state] Locking PCR0, PCR1 and PCR31
18,975,019 UART: [state] Locking ICCM
18,975,898 UART: [exit] Launching FMC @ 0x40000000
18,977,236 UART:
18,977,379 UART: Running Caliptra FMC ...
18,978,476 UART:
18,978,646 UART: [fmc] Received command: 0x46574C44
18,980,018 UART:
18,980,164 UART: Running Caliptra ROM ...
18,981,256 UART:
18,981,409 UART: [state] CFI Enabled
18,990,060 UART: [state] LifecycleState = Unprovisioned
18,991,994 UART: [state] DebugLocked = No
18,993,183 UART: [state] WD Timer not started. Device not locked for debugging
18,997,935 UART: [kat] SHA2-256
19,177,602 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,188,417 UART: [kat] ++
19,188,876 UART: [kat] sha1
19,201,160 UART: [kat] SHA2-256
19,203,844 UART: [kat] SHA2-384
19,210,366 UART: [kat] SHA2-512-ACC
19,212,772 UART: [kat] ECC-384
21,655,504 UART: [kat] HMAC-384Kdf
21,667,795 UART: [kat] LMS
22,144,272 UART: [kat] --
22,149,118 UART: [update-reset] ++
25,594,726 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,598,261 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,983,056 >>> mbox cmd response: success
25,985,062 UART: [update-reset] Copying MAN_2 To MAN_1
26,022,199 UART: [update-reset Success] --
26,023,519 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
26,028,337 UART: [state] Locking Datavault
26,030,176 UART: [state] Locking PCR0, PCR1 and PCR31
26,031,888 UART: [state] Locking ICCM
26,034,608 UART: [exit] Launching FMC @ 0x40000000
26,043,009 UART:
26,043,255 UART: Running Caliptra FMC ...
26,044,378 UART:
26,044,537 UART: [fmc] Received command: 0x1000000D
26,046,052 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
3,780,125 ready_for_fw is high
3,780,508 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,386,580 >>> mbox cmd response: success
18,624,234 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,769,050 UART:
18,769,426 UART: Running Caliptra FMC ...
18,770,552 UART:
18,770,701 UART: [fmc] Received command: 0x46574C44
25,789,688 >>> mbox cmd response: success
25,812,132 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,826,332 UART:
25,826,587 UART: Running Caliptra FMC ...
25,827,695 UART:
25,827,845 UART: [fmc] Received command: 0x1000000D
25,829,368 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
891,416 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,520 UART: [kat] ++
895,672 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
915,907 UART: [kat] HMAC-384Kdf
920,583 UART: [kat] LMS
1,168,895 UART: [kat] --
1,169,778 UART: [cold-reset] ++
1,170,202 UART: [fht] FHT @ 0x50003400
1,172,886 UART: [idev] ++
1,173,054 UART: [idev] CDI.KEYID = 6
1,173,415 UART: [idev] SUBJECT.KEYID = 7
1,173,840 UART: [idev] UDS.KEYID = 0
1,174,186 ready_for_fw is high
1,174,186 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,249 UART: [idev] Erasing UDS.KEYID = 0
1,199,271 UART: [idev] Sha1 KeyId Algorithm
1,208,277 UART: [idev] --
1,209,460 UART: [ldev] ++
1,209,628 UART: [ldev] CDI.KEYID = 6
1,209,992 UART: [ldev] SUBJECT.KEYID = 5
1,210,419 UART: [ldev] AUTHORITY.KEYID = 7
1,210,882 UART: [ldev] FE.KEYID = 1
1,216,136 UART: [ldev] Erasing FE.KEYID = 1
1,242,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,228 UART: [ldev] --
1,281,655 UART: [fwproc] Wait for Commands...
1,282,268 UART: [fwproc] Recv command 0x46574c44
1,283,001 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,504 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,189 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,590 >>> mbox cmd response: success
2,780,718 UART: [afmc] ++
2,780,886 UART: [afmc] CDI.KEYID = 6
2,781,249 UART: [afmc] SUBJECT.KEYID = 7
2,781,675 UART: [afmc] AUTHORITY.KEYID = 5
2,816,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,510 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,206 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,105 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,798 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,528 UART: [afmc] --
2,859,333 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,859,355 UART: [cold-reset] --
2,860,129 UART: [state] Locking Datavault
2,861,198 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,802 UART: [state] Locking ICCM
2,862,398 UART: [exit] Launching FMC @ 0x40000000
2,867,695 UART:
2,867,711 UART: Running Caliptra FMC ...
2,868,119 UART:
2,868,349 UART: [fmc] Received command: 0x46574C44
2,869,175 UART:
2,869,191 UART: Running Caliptra ROM ...
2,869,599 UART:
2,869,654 UART: [state] CFI Enabled
2,871,924 UART: [state] LifecycleState = Unprovisioned
2,872,579 UART: [state] DebugLocked = No
2,873,073 UART: [state] WD Timer not started. Device not locked for debugging
2,874,263 UART: [kat] SHA2-256
3,677,813 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,917 UART: [kat] ++
3,682,069 UART: [kat] sha1
3,686,229 UART: [kat] SHA2-256
3,688,169 UART: [kat] SHA2-384
3,690,966 UART: [kat] SHA2-512-ACC
3,692,866 UART: [kat] ECC-384
3,702,457 UART: [kat] HMAC-384Kdf
3,706,913 UART: [kat] LMS
3,955,225 UART: [kat] --
3,956,171 UART: [update-reset] ++
5,274,119 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,098 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,568 >>> mbox cmd response: success
5,427,767 UART: [update-reset] Copying MAN_2 To MAN_1
5,435,781 UART: [update-reset Success] --
5,436,190 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,436,532 UART: [state] Locking Datavault
5,437,348 UART: [state] Locking PCR0, PCR1 and PCR31
5,437,952 UART: [state] Locking ICCM
5,438,604 UART: [exit] Launching FMC @ 0x40000000
5,443,901 UART:
5,443,917 UART: Running Caliptra FMC ...
5,444,325 UART:
5,444,547 UART: [fmc] Received command: 0x1000000D
5,445,639 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,094 ready_for_fw is high
1,058,094 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,807 >>> mbox cmd response: success
2,687,940 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,694,021 UART:
2,694,037 UART: Running Caliptra FMC ...
2,694,445 UART:
2,694,675 UART: [fmc] Received command: 0x46574C44
5,140,400 >>> mbox cmd response: success
5,148,140 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,153,700 UART:
5,153,716 UART: Running Caliptra FMC ...
5,154,124 UART:
5,154,346 UART: [fmc] Received command: 0x1000000D
5,155,438 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,335 UART: [kat] ++
895,487 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,244 UART: [kat] HMAC-384Kdf
920,818 UART: [kat] LMS
1,169,130 UART: [kat] --
1,170,153 UART: [cold-reset] ++
1,170,637 UART: [fht] FHT @ 0x50003400
1,173,435 UART: [idev] ++
1,173,603 UART: [idev] CDI.KEYID = 6
1,173,964 UART: [idev] SUBJECT.KEYID = 7
1,174,389 UART: [idev] UDS.KEYID = 0
1,174,735 ready_for_fw is high
1,174,735 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,199,338 UART: [idev] Sha1 KeyId Algorithm
1,208,044 UART: [idev] --
1,209,245 UART: [ldev] ++
1,209,413 UART: [ldev] CDI.KEYID = 6
1,209,777 UART: [ldev] SUBJECT.KEYID = 5
1,210,204 UART: [ldev] AUTHORITY.KEYID = 7
1,210,667 UART: [ldev] FE.KEYID = 1
1,216,039 UART: [ldev] Erasing FE.KEYID = 1
1,242,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,555 UART: [ldev] --
1,281,932 UART: [fwproc] Wait for Commands...
1,282,683 UART: [fwproc] Recv command 0x46574c44
1,283,416 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,167 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,852 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,041 >>> mbox cmd response: success
2,780,069 UART: [afmc] ++
2,780,237 UART: [afmc] CDI.KEYID = 6
2,780,600 UART: [afmc] SUBJECT.KEYID = 7
2,781,026 UART: [afmc] AUTHORITY.KEYID = 5
2,816,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,697 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,393 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,292 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,985 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,967 UART: [afmc] --
2,859,860 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,859,882 UART: [cold-reset] --
2,860,766 UART: [state] Locking Datavault
2,861,737 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,341 UART: [state] Locking ICCM
2,862,877 UART: [exit] Launching FMC @ 0x40000000
2,868,174 UART:
2,868,190 UART: Running Caliptra FMC ...
2,868,598 UART:
2,868,828 UART: [fmc] Received command: 0x46574C44
2,869,654 UART:
2,869,670 UART: Running Caliptra ROM ...
2,870,078 UART:
2,870,220 UART: [state] CFI Enabled
2,872,950 UART: [state] LifecycleState = Unprovisioned
2,873,605 UART: [state] DebugLocked = No
2,874,109 UART: [state] WD Timer not started. Device not locked for debugging
2,875,401 UART: [kat] SHA2-256
3,678,951 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,055 UART: [kat] ++
3,683,207 UART: [kat] sha1
3,687,225 UART: [kat] SHA2-256
3,689,165 UART: [kat] SHA2-384
3,691,940 UART: [kat] SHA2-512-ACC
3,693,840 UART: [kat] ECC-384
3,703,579 UART: [kat] HMAC-384Kdf
3,708,129 UART: [kat] LMS
3,956,441 UART: [kat] --
3,957,269 UART: [update-reset] ++
5,275,157 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,314 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,428,784 >>> mbox cmd response: success
5,429,135 UART: [update-reset] Copying MAN_2 To MAN_1
5,437,149 UART: [update-reset Success] --
5,437,558 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,437,870 UART: [state] Locking Datavault
5,438,756 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,360 UART: [state] Locking ICCM
5,439,980 UART: [exit] Launching FMC @ 0x40000000
5,445,277 UART:
5,445,293 UART: Running Caliptra FMC ...
5,445,701 UART:
5,445,923 UART: [fmc] Received command: 0x1000000D
5,447,015 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,741 ready_for_fw is high
1,059,741 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,635,116 >>> mbox cmd response: success
2,691,591 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,697,794 UART:
2,697,810 UART: Running Caliptra FMC ...
2,698,218 UART:
2,698,448 UART: [fmc] Received command: 0x46574C44
5,143,516 >>> mbox cmd response: success
5,151,234 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,156,824 UART:
5,156,840 UART: Running Caliptra FMC ...
5,157,248 UART:
5,157,470 UART: [fmc] Received command: 0x1000000D
5,158,562 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,716 UART: [kat] SHA2-256
901,656 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
916,383 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,170,420 UART: [cold-reset] ++
1,170,922 UART: [fht] FHT @ 0x50003400
1,173,364 UART: [idev] ++
1,173,532 UART: [idev] CDI.KEYID = 6
1,173,893 UART: [idev] SUBJECT.KEYID = 7
1,174,318 UART: [idev] UDS.KEYID = 0
1,174,664 ready_for_fw is high
1,174,664 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,217 UART: [idev] Erasing UDS.KEYID = 0
1,199,227 UART: [idev] Sha1 KeyId Algorithm
1,208,075 UART: [idev] --
1,209,156 UART: [ldev] ++
1,209,324 UART: [ldev] CDI.KEYID = 6
1,209,688 UART: [ldev] SUBJECT.KEYID = 5
1,210,115 UART: [ldev] AUTHORITY.KEYID = 7
1,210,578 UART: [ldev] FE.KEYID = 1
1,215,668 UART: [ldev] Erasing FE.KEYID = 1
1,242,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,270 UART: [ldev] --
1,281,691 UART: [fwproc] Wait for Commands...
1,282,482 UART: [fwproc] Recv command 0x46574c44
1,283,215 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,810 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,495 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,672 >>> mbox cmd response: success
2,779,838 UART: [afmc] ++
2,780,006 UART: [afmc] CDI.KEYID = 6
2,780,369 UART: [afmc] SUBJECT.KEYID = 7
2,780,795 UART: [afmc] AUTHORITY.KEYID = 5
2,815,876 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,052 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,748 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,647 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,340 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,204 UART: [afmc] --
2,859,195 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,859,217 UART: [cold-reset] --
2,860,159 UART: [state] Locking Datavault
2,861,286 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,890 UART: [state] Locking ICCM
2,862,476 UART: [exit] Launching FMC @ 0x40000000
2,867,773 UART:
2,867,789 UART: Running Caliptra FMC ...
2,868,197 UART:
2,868,427 UART: [fmc] Received command: 0x46574C44
2,869,253 UART:
2,869,269 UART: Running Caliptra ROM ...
2,869,677 UART:
2,869,732 UART: [state] CFI Enabled
2,872,152 UART: [state] LifecycleState = Unprovisioned
2,872,807 UART: [state] DebugLocked = No
2,873,501 UART: [state] WD Timer not started. Device not locked for debugging
2,874,771 UART: [kat] SHA2-256
3,678,321 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,425 UART: [kat] ++
3,682,577 UART: [kat] sha1
3,686,897 UART: [kat] SHA2-256
3,688,837 UART: [kat] SHA2-384
3,691,384 UART: [kat] SHA2-512-ACC
3,693,284 UART: [kat] ECC-384
3,703,245 UART: [kat] HMAC-384Kdf
3,707,727 UART: [kat] LMS
3,956,039 UART: [kat] --
3,956,933 UART: [update-reset] ++
5,273,959 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,112 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,582 >>> mbox cmd response: success
5,427,775 UART: [update-reset] Copying MAN_2 To MAN_1
5,435,789 UART: [update-reset Success] --
5,436,198 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,436,888 UART: [state] Locking Datavault
5,437,616 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,220 UART: [state] Locking ICCM
5,438,816 UART: [exit] Launching FMC @ 0x40000000
5,444,113 UART:
5,444,129 UART: Running Caliptra FMC ...
5,444,537 UART:
5,444,759 UART: [fmc] Received command: 0x1000000D
5,445,851 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,070 ready_for_fw is high
1,060,070 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,634,013 >>> mbox cmd response: success
2,689,976 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,696,295 UART:
2,696,311 UART: Running Caliptra FMC ...
2,696,719 UART:
2,696,949 UART: [fmc] Received command: 0x46574C44
5,141,726 >>> mbox cmd response: success
5,149,372 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,155,226 UART:
5,155,242 UART: Running Caliptra FMC ...
5,155,650 UART:
5,155,872 UART: [fmc] Received command: 0x1000000D
5,156,964 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,422 UART: [kat] SHA2-512-ACC
906,323 UART: [kat] ECC-384
916,318 UART: [kat] HMAC-384Kdf
921,148 UART: [kat] LMS
1,169,460 UART: [kat] --
1,170,201 UART: [cold-reset] ++
1,170,749 UART: [fht] FHT @ 0x50003400
1,173,343 UART: [idev] ++
1,173,511 UART: [idev] CDI.KEYID = 6
1,173,872 UART: [idev] SUBJECT.KEYID = 7
1,174,297 UART: [idev] UDS.KEYID = 0
1,174,643 ready_for_fw is high
1,174,643 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,422 UART: [idev] Erasing UDS.KEYID = 0
1,200,050 UART: [idev] Sha1 KeyId Algorithm
1,208,994 UART: [idev] --
1,209,907 UART: [ldev] ++
1,210,075 UART: [ldev] CDI.KEYID = 6
1,210,439 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,585 UART: [ldev] --
1,281,990 UART: [fwproc] Wait for Commands...
1,282,601 UART: [fwproc] Recv command 0x46574c44
1,283,334 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,963 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,648 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,817 >>> mbox cmd response: success
2,780,855 UART: [afmc] ++
2,781,023 UART: [afmc] CDI.KEYID = 6
2,781,386 UART: [afmc] SUBJECT.KEYID = 7
2,781,812 UART: [afmc] AUTHORITY.KEYID = 5
2,816,589 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,533 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,229 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,128 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,821 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,691 UART: [afmc] --
2,859,558 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,859,580 UART: [cold-reset] --
2,860,230 UART: [state] Locking Datavault
2,861,309 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,913 UART: [state] Locking ICCM
2,862,363 UART: [exit] Launching FMC @ 0x40000000
2,867,660 UART:
2,867,676 UART: Running Caliptra FMC ...
2,868,084 UART:
2,868,314 UART: [fmc] Received command: 0x46574C44
2,869,140 UART:
2,869,156 UART: Running Caliptra ROM ...
2,869,564 UART:
2,869,706 UART: [state] CFI Enabled
2,872,156 UART: [state] LifecycleState = Unprovisioned
2,872,811 UART: [state] DebugLocked = No
2,873,493 UART: [state] WD Timer not started. Device not locked for debugging
2,874,847 UART: [kat] SHA2-256
3,678,397 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,501 UART: [kat] ++
3,682,653 UART: [kat] sha1
3,686,677 UART: [kat] SHA2-256
3,688,617 UART: [kat] SHA2-384
3,691,562 UART: [kat] SHA2-512-ACC
3,693,462 UART: [kat] ECC-384
3,703,273 UART: [kat] HMAC-384Kdf
3,707,895 UART: [kat] LMS
3,956,207 UART: [kat] --
3,957,245 UART: [update-reset] ++
5,274,691 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,898 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,428,368 >>> mbox cmd response: success
5,428,527 UART: [update-reset] Copying MAN_2 To MAN_1
5,436,541 UART: [update-reset Success] --
5,436,950 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,437,634 UART: [state] Locking Datavault
5,438,506 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,110 UART: [state] Locking ICCM
5,439,774 UART: [exit] Launching FMC @ 0x40000000
5,445,071 UART:
5,445,087 UART: Running Caliptra FMC ...
5,445,495 UART:
5,445,717 UART: [fmc] Received command: 0x1000000D
5,446,809 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,567 ready_for_fw is high
1,059,567 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,188 >>> mbox cmd response: success
2,689,699 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,695,878 UART:
2,695,894 UART: Running Caliptra FMC ...
2,696,302 UART:
2,696,532 UART: [fmc] Received command: 0x46574C44
5,141,144 >>> mbox cmd response: success
5,148,722 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,154,496 UART:
5,154,512 UART: Running Caliptra FMC ...
5,154,920 UART:
5,155,142 UART: [fmc] Received command: 0x1000000D
5,156,234 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,995 UART: [kat] SHA2-512-ACC
906,896 UART: [kat] ECC-384
916,521 UART: [kat] HMAC-384Kdf
921,023 UART: [kat] LMS
1,169,335 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,928 UART: [fht] FHT @ 0x50003400
1,173,714 UART: [idev] ++
1,173,882 UART: [idev] CDI.KEYID = 6
1,174,243 UART: [idev] SUBJECT.KEYID = 7
1,174,668 UART: [idev] UDS.KEYID = 0
1,175,014 ready_for_fw is high
1,175,014 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,101 UART: [idev] Erasing UDS.KEYID = 0
1,198,827 UART: [idev] Sha1 KeyId Algorithm
1,207,617 UART: [idev] --
1,208,742 UART: [ldev] ++
1,208,910 UART: [ldev] CDI.KEYID = 6
1,209,274 UART: [ldev] SUBJECT.KEYID = 5
1,209,701 UART: [ldev] AUTHORITY.KEYID = 7
1,210,164 UART: [ldev] FE.KEYID = 1
1,215,102 UART: [ldev] Erasing FE.KEYID = 1
1,241,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,038 UART: [ldev] --
1,280,417 UART: [fwproc] Wait for Commands...
1,280,994 UART: [fwproc] Recv command 0x46574c44
1,281,727 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,030 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,715 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,980 >>> mbox cmd response: success
2,778,994 UART: [afmc] ++
2,779,162 UART: [afmc] CDI.KEYID = 6
2,779,525 UART: [afmc] SUBJECT.KEYID = 7
2,779,951 UART: [afmc] AUTHORITY.KEYID = 5
2,815,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,328 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,024 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,923 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,616 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,274 UART: [afmc] --
2,858,281 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,858,303 UART: [cold-reset] --
2,859,285 UART: [state] Locking Datavault
2,860,648 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,252 UART: [state] Locking ICCM
2,861,880 UART: [exit] Launching FMC @ 0x40000000
2,867,177 UART:
2,867,193 UART: Running Caliptra FMC ...
2,867,601 UART:
2,867,831 UART: [fmc] Received command: 0x46574C44
2,868,657 UART:
2,868,673 UART: Running Caliptra ROM ...
2,869,081 UART:
2,869,136 UART: [state] CFI Enabled
2,872,170 UART: [state] LifecycleState = Unprovisioned
2,872,825 UART: [state] DebugLocked = No
2,873,377 UART: [state] WD Timer not started. Device not locked for debugging
2,874,623 UART: [kat] SHA2-256
3,678,173 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,277 UART: [kat] ++
3,682,429 UART: [kat] sha1
3,686,799 UART: [kat] SHA2-256
3,688,739 UART: [kat] SHA2-384
3,691,466 UART: [kat] SHA2-512-ACC
3,693,366 UART: [kat] ECC-384
3,703,095 UART: [kat] HMAC-384Kdf
3,707,645 UART: [kat] LMS
3,955,957 UART: [kat] --
3,956,883 UART: [update-reset] ++
5,273,657 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,274,630 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,100 >>> mbox cmd response: success
5,427,241 UART: [update-reset] Copying MAN_2 To MAN_1
5,435,255 UART: [update-reset Success] --
5,435,664 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,436,188 UART: [state] Locking Datavault
5,436,932 UART: [state] Locking PCR0, PCR1 and PCR31
5,437,536 UART: [state] Locking ICCM
5,438,144 UART: [exit] Launching FMC @ 0x40000000
5,443,441 UART:
5,443,457 UART: Running Caliptra FMC ...
5,443,865 UART:
5,444,087 UART: [fmc] Received command: 0x1000000D
5,445,179 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,126 ready_for_fw is high
1,059,126 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,715 >>> mbox cmd response: success
2,688,752 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,694,763 UART:
2,694,779 UART: Running Caliptra FMC ...
2,695,187 UART:
2,695,417 UART: [fmc] Received command: 0x46574C44
5,141,554 >>> mbox cmd response: success
5,149,242 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,154,984 UART:
5,155,000 UART: Running Caliptra FMC ...
5,155,408 UART:
5,155,630 UART: [fmc] Received command: 0x1000000D
5,156,722 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,718 UART: [kat] SHA2-512-ACC
906,619 UART: [kat] ECC-384
916,488 UART: [kat] HMAC-384Kdf
921,172 UART: [kat] LMS
1,169,484 UART: [kat] --
1,170,309 UART: [cold-reset] ++
1,170,681 UART: [fht] FHT @ 0x50003400
1,173,445 UART: [idev] ++
1,173,613 UART: [idev] CDI.KEYID = 6
1,173,974 UART: [idev] SUBJECT.KEYID = 7
1,174,399 UART: [idev] UDS.KEYID = 0
1,174,745 ready_for_fw is high
1,174,745 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,199,130 UART: [idev] Sha1 KeyId Algorithm
1,207,932 UART: [idev] --
1,209,063 UART: [ldev] ++
1,209,231 UART: [ldev] CDI.KEYID = 6
1,209,595 UART: [ldev] SUBJECT.KEYID = 5
1,210,022 UART: [ldev] AUTHORITY.KEYID = 7
1,210,485 UART: [ldev] FE.KEYID = 1
1,216,077 UART: [ldev] Erasing FE.KEYID = 1
1,242,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,321 UART: [ldev] --
1,281,648 UART: [fwproc] Wait for Commands...
1,282,241 UART: [fwproc] Recv command 0x46574c44
1,282,974 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,897 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,582 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,981 >>> mbox cmd response: success
2,781,243 UART: [afmc] ++
2,781,411 UART: [afmc] CDI.KEYID = 6
2,781,774 UART: [afmc] SUBJECT.KEYID = 7
2,782,200 UART: [afmc] AUTHORITY.KEYID = 5
2,817,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,173 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,869 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,768 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,461 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,423 UART: [afmc] --
2,861,276 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,861,298 UART: [cold-reset] --
2,862,222 UART: [state] Locking Datavault
2,863,221 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,825 UART: [state] Locking ICCM
2,864,257 UART: [exit] Launching FMC @ 0x40000000
2,869,554 UART:
2,869,570 UART: Running Caliptra FMC ...
2,869,978 UART:
2,870,208 UART: [fmc] Received command: 0x46574C44
2,871,034 UART:
2,871,050 UART: Running Caliptra ROM ...
2,871,458 UART:
2,871,600 UART: [state] CFI Enabled
2,874,186 UART: [state] LifecycleState = Unprovisioned
2,874,841 UART: [state] DebugLocked = No
2,875,441 UART: [state] WD Timer not started. Device not locked for debugging
2,876,783 UART: [kat] SHA2-256
3,680,333 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,437 UART: [kat] ++
3,684,589 UART: [kat] sha1
3,688,917 UART: [kat] SHA2-256
3,690,857 UART: [kat] SHA2-384
3,693,604 UART: [kat] SHA2-512-ACC
3,695,504 UART: [kat] ECC-384
3,705,255 UART: [kat] HMAC-384Kdf
3,710,077 UART: [kat] LMS
3,958,389 UART: [kat] --
3,959,269 UART: [update-reset] ++
5,277,167 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,278,332 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,430,802 >>> mbox cmd response: success
5,430,923 UART: [update-reset] Copying MAN_2 To MAN_1
5,438,937 UART: [update-reset Success] --
5,439,346 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,439,988 UART: [state] Locking Datavault
5,440,816 UART: [state] Locking PCR0, PCR1 and PCR31
5,441,420 UART: [state] Locking ICCM
5,441,958 UART: [exit] Launching FMC @ 0x40000000
5,447,255 UART:
5,447,271 UART: Running Caliptra FMC ...
5,447,679 UART:
5,447,901 UART: [fmc] Received command: 0x1000000D
5,448,993 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,335 ready_for_fw is high
1,059,335 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,516 >>> mbox cmd response: success
2,689,833 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,696,230 UART:
2,696,246 UART: Running Caliptra FMC ...
2,696,654 UART:
2,696,884 UART: [fmc] Received command: 0x46574C44
5,142,780 >>> mbox cmd response: success
5,150,450 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,155,920 UART:
5,155,936 UART: Running Caliptra FMC ...
5,156,344 UART:
5,156,566 UART: [fmc] Received command: 0x1000000D
5,157,658 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.55s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.56s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.55s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,840 writing to cptra_bootfsm_go
191,902 UART:
192,280 UART: Running Caliptra ROM ...
193,401 UART:
193,553 UART: [state] CFI Enabled
264,204 UART: [state] LifecycleState = Unprovisioned
266,141 UART: [state] DebugLocked = No
268,306 UART: [state] WD Timer not started. Device not locked for debugging
272,904 UART: [kat] SHA2-256
452,567 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,308 UART: [kat] ++
463,760 UART: [kat] sha1
474,002 UART: [kat] SHA2-256
476,742 UART: [kat] SHA2-384
481,406 UART: [kat] SHA2-512-ACC
483,779 UART: [kat] ECC-384
2,946,470 UART: [kat] HMAC-384Kdf
2,970,853 UART: [kat] LMS
3,447,319 UART: [kat] --
3,449,399 UART: [cold-reset] ++
3,450,840 UART: [fht] FHT @ 0x50003400
3,462,338 UART: [idev] ++
3,462,945 UART: [idev] CDI.KEYID = 6
3,463,864 UART: [idev] SUBJECT.KEYID = 7
3,465,115 UART: [idev] UDS.KEYID = 0
3,466,043 ready_for_fw is high
3,466,239 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,610,582 UART: [idev] Erasing UDS.KEYID = 0
5,986,565 UART: [idev] Sha1 KeyId Algorithm
6,010,339 UART: [idev] --
6,014,901 UART: [ldev] ++
6,015,482 UART: [ldev] CDI.KEYID = 6
6,016,397 UART: [ldev] SUBJECT.KEYID = 5
6,017,564 UART: [ldev] AUTHORITY.KEYID = 7
6,018,859 UART: [ldev] FE.KEYID = 1
6,057,112 UART: [ldev] Erasing FE.KEYID = 1
8,565,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,185 UART: [ldev] --
10,374,267 UART: [fwproc] Wait for Commands...
10,375,823 UART: [fwproc] Recv command 0x46574c44
10,377,812 UART: [fwproc] Recv'd Img size: 114888 bytes
13,820,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,654 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,958,867 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,287,685 >>> mbox cmd response: success
14,291,470 UART: [afmc] ++
14,292,061 UART: [afmc] CDI.KEYID = 6
14,293,038 UART: [afmc] SUBJECT.KEYID = 7
14,294,259 UART: [afmc] AUTHORITY.KEYID = 5
16,842,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,583,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,585,856 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,601,614 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,617,687 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,633,170 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,658,996 UART: [afmc] --
18,663,417 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,808,222 UART: [cold-reset] --
18,809,101 UART: [state] Locking Datavault
18,810,178 UART: [state] Locking PCR0, PCR1 and PCR31
18,811,722 UART: [state] Locking ICCM
18,812,611 UART: [exit] Launching FMC @ 0x40000000
18,813,961 UART:
18,814,117 UART: Running Caliptra FMC ...
18,815,219 UART:
18,815,377 UART: [fmc] Received command: 0x46574C44
18,816,764 UART:
18,816,912 UART: Running Caliptra ROM ...
18,818,014 UART:
18,818,178 UART: [state] CFI Enabled
18,874,209 UART: [state] LifecycleState = Unprovisioned
18,876,140 UART: [state] DebugLocked = No
18,878,636 UART: [state] WD Timer not started. Device not locked for debugging
18,882,812 UART: [kat] SHA2-256
19,062,489 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,073,258 UART: [kat] ++
19,073,731 UART: [kat] sha1
19,084,945 UART: [kat] SHA2-256
19,087,642 UART: [kat] SHA2-384
19,093,745 UART: [kat] SHA2-512-ACC
19,096,095 UART: [kat] ECC-384
21,559,830 UART: [kat] HMAC-384Kdf
21,582,166 UART: [kat] LMS
22,058,602 UART: [kat] --
22,062,595 UART: [update-reset] ++
25,507,982 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,512,176 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,897,684 UART: [update-reset] Copying MAN_2 To MAN_1
25,934,797 UART: [update-reset Success] --
25,936,134 >>> mbox cmd response: success
25,936,382 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,940,755 UART: [state] Locking Datavault
25,943,938 UART: [state] Locking PCR0, PCR1 and PCR31
25,945,659 UART: [state] Locking ICCM
25,948,330 UART: [exit] Launching FMC @ 0x40000000
25,956,671 UART:
25,956,909 UART: Running Caliptra FMC ...
25,958,012 UART:
25,958,177 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,959,810 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,459,620 ready_for_fw is high
3,460,209 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,177,037 >>> mbox cmd response: success
18,453,473 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,598,499 UART:
18,598,874 UART: Running Caliptra FMC ...
18,600,085 UART:
18,600,267 UART: [fmc] Received command: 0x46574C44
25,729,161 >>> mbox cmd response: success
25,729,546 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,739,560 UART:
25,739,861 UART: Running Caliptra FMC ...
25,740,975 UART:
25,741,135 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,742,792 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,311 UART:
192,671 UART: Running Caliptra ROM ...
193,773 UART:
603,713 UART: [state] CFI Enabled
616,551 UART: [state] LifecycleState = Unprovisioned
618,459 UART: [state] DebugLocked = No
620,348 UART: [state] WD Timer not started. Device not locked for debugging
625,015 UART: [kat] SHA2-256
804,645 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,445 UART: [kat] ++
815,996 UART: [kat] sha1
826,236 UART: [kat] SHA2-256
828,956 UART: [kat] SHA2-384
835,366 UART: [kat] SHA2-512-ACC
837,731 UART: [kat] ECC-384
3,278,029 UART: [kat] HMAC-384Kdf
3,289,339 UART: [kat] LMS
3,765,854 UART: [kat] --
3,771,905 UART: [cold-reset] ++
3,773,552 UART: [fht] FHT @ 0x50003400
3,785,451 UART: [idev] ++
3,786,021 UART: [idev] CDI.KEYID = 6
3,787,056 UART: [idev] SUBJECT.KEYID = 7
3,788,230 UART: [idev] UDS.KEYID = 0
3,789,153 ready_for_fw is high
3,789,334 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,933,593 UART: [idev] Erasing UDS.KEYID = 0
6,266,490 UART: [idev] Sha1 KeyId Algorithm
6,288,715 UART: [idev] --
6,294,141 UART: [ldev] ++
6,294,721 UART: [ldev] CDI.KEYID = 6
6,295,635 UART: [ldev] SUBJECT.KEYID = 5
6,296,848 UART: [ldev] AUTHORITY.KEYID = 7
6,298,081 UART: [ldev] FE.KEYID = 1
6,307,973 UART: [ldev] Erasing FE.KEYID = 1
8,786,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,681 UART: [ldev] --
10,580,617 UART: [fwproc] Wait for Commands...
10,583,869 UART: [fwproc] Recv command 0x46574c44
10,585,859 UART: [fwproc] Recv'd Img size: 114888 bytes
14,019,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,307 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,159,517 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,487,261 >>> mbox cmd response: success
14,491,331 UART: [afmc] ++
14,491,993 UART: [afmc] CDI.KEYID = 6
14,492,880 UART: [afmc] SUBJECT.KEYID = 7
14,494,092 UART: [afmc] AUTHORITY.KEYID = 5
17,002,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,794 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,741,562 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,757,688 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,773,198 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,796,854 UART: [afmc] --
18,801,265 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,946,375 UART: [cold-reset] --
18,947,239 UART: [state] Locking Datavault
18,948,308 UART: [state] Locking PCR0, PCR1 and PCR31
18,949,843 UART: [state] Locking ICCM
18,950,719 UART: [exit] Launching FMC @ 0x40000000
18,952,055 UART:
18,952,203 UART: Running Caliptra FMC ...
18,953,299 UART:
18,953,447 UART: [fmc] Received command: 0x46574C44
18,954,815 UART:
18,954,952 UART: Running Caliptra ROM ...
18,955,995 UART:
18,956,136 UART: [state] CFI Enabled
18,964,930 UART: [state] LifecycleState = Unprovisioned
18,966,830 UART: [state] DebugLocked = No
18,968,940 UART: [state] WD Timer not started. Device not locked for debugging
18,972,294 UART: [kat] SHA2-256
19,151,964 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,162,756 UART: [kat] ++
19,163,206 UART: [kat] sha1
19,173,007 UART: [kat] SHA2-256
19,175,735 UART: [kat] SHA2-384
19,181,246 UART: [kat] SHA2-512-ACC
19,183,645 UART: [kat] ECC-384
21,625,894 UART: [kat] HMAC-384Kdf
21,637,684 UART: [kat] LMS
22,114,156 UART: [kat] --
22,120,353 UART: [update-reset] ++
25,569,948 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,572,940 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,958,774 UART: [update-reset] Copying MAN_2 To MAN_1
25,995,877 UART: [update-reset Success] --
25,997,237 >>> mbox cmd response: success
25,997,457 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,999,329 UART: [state] Locking Datavault
26,003,823 UART: [state] Locking PCR0, PCR1 and PCR31
26,005,527 UART: [state] Locking ICCM
26,006,736 UART: [exit] Launching FMC @ 0x40000000
26,015,128 UART:
26,015,374 UART: Running Caliptra FMC ...
26,016,479 UART:
26,016,633 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
26,018,265 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,780,233 ready_for_fw is high
3,780,668 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,396,146 >>> mbox cmd response: success
18,631,391 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,776,153 UART:
18,776,527 UART: Running Caliptra FMC ...
18,777,646 UART:
18,777,796 UART: [fmc] Received command: 0x46574C44
25,805,711 >>> mbox cmd response: success
25,806,108 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,820,866 UART:
25,821,126 UART: Running Caliptra FMC ...
25,822,301 UART:
25,822,459 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,824,137 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,886 UART: [kat] SHA2-256
901,826 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,049 UART: [kat] HMAC-384Kdf
920,529 UART: [kat] LMS
1,168,841 UART: [kat] --
1,169,532 UART: [cold-reset] ++
1,169,888 UART: [fht] FHT @ 0x50003400
1,172,598 UART: [idev] ++
1,172,766 UART: [idev] CDI.KEYID = 6
1,173,127 UART: [idev] SUBJECT.KEYID = 7
1,173,552 UART: [idev] UDS.KEYID = 0
1,173,898 ready_for_fw is high
1,173,898 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,013 UART: [idev] Erasing UDS.KEYID = 0
1,199,097 UART: [idev] Sha1 KeyId Algorithm
1,207,905 UART: [idev] --
1,209,094 UART: [ldev] ++
1,209,262 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,053 UART: [ldev] AUTHORITY.KEYID = 7
1,210,516 UART: [ldev] FE.KEYID = 1
1,215,640 UART: [ldev] Erasing FE.KEYID = 1
1,241,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,338 UART: [ldev] --
1,280,777 UART: [fwproc] Wait for Commands...
1,281,482 UART: [fwproc] Recv command 0x46574c44
1,282,215 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,534 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,219 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,390 >>> mbox cmd response: success
2,779,562 UART: [afmc] ++
2,779,730 UART: [afmc] CDI.KEYID = 6
2,780,093 UART: [afmc] SUBJECT.KEYID = 7
2,780,519 UART: [afmc] AUTHORITY.KEYID = 5
2,815,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,938 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,634 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,533 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,226 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,128 UART: [afmc] --
2,859,071 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,859,093 UART: [cold-reset] --
2,859,927 UART: [state] Locking Datavault
2,861,078 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,682 UART: [state] Locking ICCM
2,862,206 UART: [exit] Launching FMC @ 0x40000000
2,867,503 UART:
2,867,519 UART: Running Caliptra FMC ...
2,867,927 UART:
2,868,157 UART: [fmc] Received command: 0x46574C44
2,868,983 UART:
2,868,999 UART: Running Caliptra ROM ...
2,869,407 UART:
2,869,462 UART: [state] CFI Enabled
2,871,792 UART: [state] LifecycleState = Unprovisioned
2,872,447 UART: [state] DebugLocked = No
2,873,137 UART: [state] WD Timer not started. Device not locked for debugging
2,874,319 UART: [kat] SHA2-256
3,677,869 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,973 UART: [kat] ++
3,682,125 UART: [kat] sha1
3,686,243 UART: [kat] SHA2-256
3,688,183 UART: [kat] SHA2-384
3,691,052 UART: [kat] SHA2-512-ACC
3,692,952 UART: [kat] ECC-384
3,702,775 UART: [kat] HMAC-384Kdf
3,707,273 UART: [kat] LMS
3,955,585 UART: [kat] --
3,956,273 UART: [update-reset] ++
5,273,753 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,274,840 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,467 UART: [update-reset] Copying MAN_2 To MAN_1
5,435,481 UART: [update-reset Success] --
5,435,890 >>> mbox cmd response: success
5,435,890 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,436,698 UART: [state] Locking Datavault
5,437,612 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,216 UART: [state] Locking ICCM
5,438,806 UART: [exit] Launching FMC @ 0x40000000
5,444,103 UART:
5,444,119 UART: Running Caliptra FMC ...
5,444,527 UART:
5,444,749 UART: [fmc] Received command: 0x1000000C
5,445,484 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,380 ready_for_fw is high
1,059,380 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,625 >>> mbox cmd response: success
2,689,778 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,696,439 UART:
2,696,455 UART: Running Caliptra FMC ...
2,696,863 UART:
2,697,093 UART: [fmc] Received command: 0x46574C44
5,148,836 >>> mbox cmd response: success
5,148,836 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,154,630 UART:
5,154,646 UART: Running Caliptra FMC ...
5,155,054 UART:
5,155,276 UART: [fmc] Received command: 0x1000000C
5,156,011 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,169,905 UART: [cold-reset] ++
1,170,377 UART: [fht] FHT @ 0x50003400
1,173,225 UART: [idev] ++
1,173,393 UART: [idev] CDI.KEYID = 6
1,173,754 UART: [idev] SUBJECT.KEYID = 7
1,174,179 UART: [idev] UDS.KEYID = 0
1,174,525 ready_for_fw is high
1,174,525 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,372 UART: [idev] Erasing UDS.KEYID = 0
1,199,246 UART: [idev] Sha1 KeyId Algorithm
1,208,122 UART: [idev] --
1,209,215 UART: [ldev] ++
1,209,383 UART: [ldev] CDI.KEYID = 6
1,209,747 UART: [ldev] SUBJECT.KEYID = 5
1,210,174 UART: [ldev] AUTHORITY.KEYID = 7
1,210,637 UART: [ldev] FE.KEYID = 1
1,216,237 UART: [ldev] Erasing FE.KEYID = 1
1,242,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,857 UART: [ldev] --
1,282,126 UART: [fwproc] Wait for Commands...
1,282,895 UART: [fwproc] Recv command 0x46574c44
1,283,628 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,989 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,674 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,023 >>> mbox cmd response: success
2,780,283 UART: [afmc] ++
2,780,451 UART: [afmc] CDI.KEYID = 6
2,780,814 UART: [afmc] SUBJECT.KEYID = 7
2,781,240 UART: [afmc] AUTHORITY.KEYID = 5
2,816,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,735 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,431 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,330 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,023 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,685 UART: [afmc] --
2,859,494 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,859,516 UART: [cold-reset] --
2,860,550 UART: [state] Locking Datavault
2,861,783 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,387 UART: [state] Locking ICCM
2,862,821 UART: [exit] Launching FMC @ 0x40000000
2,868,118 UART:
2,868,134 UART: Running Caliptra FMC ...
2,868,542 UART:
2,868,772 UART: [fmc] Received command: 0x46574C44
2,869,598 UART:
2,869,614 UART: Running Caliptra ROM ...
2,870,022 UART:
2,870,164 UART: [state] CFI Enabled
2,873,280 UART: [state] LifecycleState = Unprovisioned
2,873,935 UART: [state] DebugLocked = No
2,874,647 UART: [state] WD Timer not started. Device not locked for debugging
2,875,915 UART: [kat] SHA2-256
3,679,465 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,569 UART: [kat] ++
3,683,721 UART: [kat] sha1
3,688,101 UART: [kat] SHA2-256
3,690,041 UART: [kat] SHA2-384
3,692,664 UART: [kat] SHA2-512-ACC
3,694,564 UART: [kat] ECC-384
3,704,359 UART: [kat] HMAC-384Kdf
3,709,061 UART: [kat] LMS
3,957,373 UART: [kat] --
3,957,971 UART: [update-reset] ++
5,275,043 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,200 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,428,847 UART: [update-reset] Copying MAN_2 To MAN_1
5,436,861 UART: [update-reset Success] --
5,437,270 >>> mbox cmd response: success
5,437,270 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,437,896 UART: [state] Locking Datavault
5,438,664 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,268 UART: [state] Locking ICCM
5,439,912 UART: [exit] Launching FMC @ 0x40000000
5,445,209 UART:
5,445,225 UART: Running Caliptra FMC ...
5,445,633 UART:
5,445,855 UART: [fmc] Received command: 0x1000000C
5,446,590 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,339 ready_for_fw is high
1,059,339 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,570 >>> mbox cmd response: success
2,686,355 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,692,486 UART:
2,692,502 UART: Running Caliptra FMC ...
2,692,910 UART:
2,693,140 UART: [fmc] Received command: 0x46574C44
5,146,234 >>> mbox cmd response: success
5,146,234 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,152,498 UART:
5,152,514 UART: Running Caliptra FMC ...
5,152,922 UART:
5,153,144 UART: [fmc] Received command: 0x1000000C
5,153,879 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
891,382 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,047 UART: [kat] HMAC-384Kdf
920,765 UART: [kat] LMS
1,169,077 UART: [kat] --
1,169,950 UART: [cold-reset] ++
1,170,380 UART: [fht] FHT @ 0x50003400
1,173,204 UART: [idev] ++
1,173,372 UART: [idev] CDI.KEYID = 6
1,173,733 UART: [idev] SUBJECT.KEYID = 7
1,174,158 UART: [idev] UDS.KEYID = 0
1,174,504 ready_for_fw is high
1,174,504 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,157 UART: [idev] Erasing UDS.KEYID = 0
1,198,785 UART: [idev] Sha1 KeyId Algorithm
1,207,579 UART: [idev] --
1,208,502 UART: [ldev] ++
1,208,670 UART: [ldev] CDI.KEYID = 6
1,209,034 UART: [ldev] SUBJECT.KEYID = 5
1,209,461 UART: [ldev] AUTHORITY.KEYID = 7
1,209,924 UART: [ldev] FE.KEYID = 1
1,215,414 UART: [ldev] Erasing FE.KEYID = 1
1,241,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,420 UART: [ldev] --
1,280,803 UART: [fwproc] Wait for Commands...
1,281,420 UART: [fwproc] Recv command 0x46574c44
1,282,153 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,322 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,007 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,212 >>> mbox cmd response: success
2,780,324 UART: [afmc] ++
2,780,492 UART: [afmc] CDI.KEYID = 6
2,780,855 UART: [afmc] SUBJECT.KEYID = 7
2,781,281 UART: [afmc] AUTHORITY.KEYID = 5
2,817,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,603 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,352 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,048 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,947 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,640 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,508 UART: [afmc] --
2,860,305 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,327 UART: [cold-reset] --
2,860,967 UART: [state] Locking Datavault
2,862,282 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,886 UART: [state] Locking ICCM
2,863,552 UART: [exit] Launching FMC @ 0x40000000
2,868,849 UART:
2,868,865 UART: Running Caliptra FMC ...
2,869,273 UART:
2,869,503 UART: [fmc] Received command: 0x46574C44
2,870,329 UART:
2,870,345 UART: Running Caliptra ROM ...
2,870,753 UART:
2,870,808 UART: [state] CFI Enabled
2,873,242 UART: [state] LifecycleState = Unprovisioned
2,873,897 UART: [state] DebugLocked = No
2,874,443 UART: [state] WD Timer not started. Device not locked for debugging
2,875,735 UART: [kat] SHA2-256
3,679,285 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,389 UART: [kat] ++
3,683,541 UART: [kat] sha1
3,687,589 UART: [kat] SHA2-256
3,689,529 UART: [kat] SHA2-384
3,692,218 UART: [kat] SHA2-512-ACC
3,694,118 UART: [kat] ECC-384
3,703,821 UART: [kat] HMAC-384Kdf
3,708,629 UART: [kat] LMS
3,956,941 UART: [kat] --
3,957,689 UART: [update-reset] ++
5,275,813 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,918 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,429,683 UART: [update-reset] Copying MAN_2 To MAN_1
5,437,697 UART: [update-reset Success] --
5,438,106 >>> mbox cmd response: success
5,438,106 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,438,770 UART: [state] Locking Datavault
5,439,530 UART: [state] Locking PCR0, PCR1 and PCR31
5,440,134 UART: [state] Locking ICCM
5,440,648 UART: [exit] Launching FMC @ 0x40000000
5,445,945 UART:
5,445,961 UART: Running Caliptra FMC ...
5,446,369 UART:
5,446,591 UART: [fmc] Received command: 0x1000000C
5,447,326 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,016 ready_for_fw is high
1,059,016 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,391 >>> mbox cmd response: success
2,688,032 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,815 UART:
2,693,831 UART: Running Caliptra FMC ...
2,694,239 UART:
2,694,469 UART: [fmc] Received command: 0x46574C44
5,146,280 >>> mbox cmd response: success
5,146,280 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,151,710 UART:
5,151,726 UART: Running Caliptra FMC ...
5,152,134 UART:
5,152,356 UART: [fmc] Received command: 0x1000000C
5,153,091 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,997 UART: [state] LifecycleState = Unprovisioned
85,652 UART: [state] DebugLocked = No
86,230 UART: [state] WD Timer not started. Device not locked for debugging
87,441 UART: [kat] SHA2-256
890,991 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,463 UART: [kat] SHA2-256
901,403 UART: [kat] SHA2-384
904,152 UART: [kat] SHA2-512-ACC
906,053 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,190 UART: [kat] LMS
1,168,502 UART: [kat] --
1,169,427 UART: [cold-reset] ++
1,169,785 UART: [fht] FHT @ 0x50003400
1,172,345 UART: [idev] ++
1,172,513 UART: [idev] CDI.KEYID = 6
1,172,874 UART: [idev] SUBJECT.KEYID = 7
1,173,299 UART: [idev] UDS.KEYID = 0
1,173,645 ready_for_fw is high
1,173,645 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,180,964 UART: [idev] Erasing UDS.KEYID = 0
1,197,684 UART: [idev] Sha1 KeyId Algorithm
1,206,412 UART: [idev] --
1,207,487 UART: [ldev] ++
1,207,655 UART: [ldev] CDI.KEYID = 6
1,208,019 UART: [ldev] SUBJECT.KEYID = 5
1,208,446 UART: [ldev] AUTHORITY.KEYID = 7
1,208,909 UART: [ldev] FE.KEYID = 1
1,213,993 UART: [ldev] Erasing FE.KEYID = 1
1,240,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,751 UART: [ldev] --
1,280,136 UART: [fwproc] Wait for Commands...
1,280,739 UART: [fwproc] Recv command 0x46574c44
1,281,472 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,663 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,348 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,595 >>> mbox cmd response: success
2,779,661 UART: [afmc] ++
2,779,829 UART: [afmc] CDI.KEYID = 6
2,780,192 UART: [afmc] SUBJECT.KEYID = 7
2,780,618 UART: [afmc] AUTHORITY.KEYID = 5
2,815,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,913 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,609 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,508 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,201 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,957 UART: [afmc] --
2,858,792 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,858,814 UART: [cold-reset] --
2,859,630 UART: [state] Locking Datavault
2,861,021 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,625 UART: [state] Locking ICCM
2,862,053 UART: [exit] Launching FMC @ 0x40000000
2,867,350 UART:
2,867,366 UART: Running Caliptra FMC ...
2,867,774 UART:
2,868,004 UART: [fmc] Received command: 0x46574C44
2,868,830 UART:
2,868,846 UART: Running Caliptra ROM ...
2,869,254 UART:
2,869,396 UART: [state] CFI Enabled
2,871,466 UART: [state] LifecycleState = Unprovisioned
2,872,121 UART: [state] DebugLocked = No
2,872,727 UART: [state] WD Timer not started. Device not locked for debugging
2,874,029 UART: [kat] SHA2-256
3,677,579 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,683 UART: [kat] ++
3,681,835 UART: [kat] sha1
3,685,921 UART: [kat] SHA2-256
3,687,861 UART: [kat] SHA2-384
3,690,710 UART: [kat] SHA2-512-ACC
3,692,610 UART: [kat] ECC-384
3,701,923 UART: [kat] HMAC-384Kdf
3,706,711 UART: [kat] LMS
3,955,023 UART: [kat] --
3,955,867 UART: [update-reset] ++
5,274,109 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,176 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,805 UART: [update-reset] Copying MAN_2 To MAN_1
5,435,819 UART: [update-reset Success] --
5,436,228 >>> mbox cmd response: success
5,436,228 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,436,902 UART: [state] Locking Datavault
5,437,762 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,366 UART: [state] Locking ICCM
5,438,786 UART: [exit] Launching FMC @ 0x40000000
5,444,083 UART:
5,444,099 UART: Running Caliptra FMC ...
5,444,507 UART:
5,444,729 UART: [fmc] Received command: 0x1000000C
5,445,464 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,531 ready_for_fw is high
1,059,531 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,822 >>> mbox cmd response: success
2,688,581 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,695,102 UART:
2,695,118 UART: Running Caliptra FMC ...
2,695,526 UART:
2,695,756 UART: [fmc] Received command: 0x46574C44
5,148,912 >>> mbox cmd response: success
5,148,912 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,154,674 UART:
5,154,690 UART: Running Caliptra FMC ...
5,155,098 UART:
5,155,320 UART: [fmc] Received command: 0x1000000C
5,156,055 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,801 UART: [state] WD Timer not started. Device not locked for debugging
88,160 UART: [kat] SHA2-256
891,710 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,814 UART: [kat] ++
895,966 UART: [kat] sha1
900,322 UART: [kat] SHA2-256
902,262 UART: [kat] SHA2-384
905,119 UART: [kat] SHA2-512-ACC
907,020 UART: [kat] ECC-384
916,835 UART: [kat] HMAC-384Kdf
921,325 UART: [kat] LMS
1,169,637 UART: [kat] --
1,170,472 UART: [cold-reset] ++
1,170,852 UART: [fht] FHT @ 0x50003400
1,173,350 UART: [idev] ++
1,173,518 UART: [idev] CDI.KEYID = 6
1,173,879 UART: [idev] SUBJECT.KEYID = 7
1,174,304 UART: [idev] UDS.KEYID = 0
1,174,650 ready_for_fw is high
1,174,650 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,377 UART: [idev] Erasing UDS.KEYID = 0
1,199,277 UART: [idev] Sha1 KeyId Algorithm
1,208,163 UART: [idev] --
1,209,274 UART: [ldev] ++
1,209,442 UART: [ldev] CDI.KEYID = 6
1,209,806 UART: [ldev] SUBJECT.KEYID = 5
1,210,233 UART: [ldev] AUTHORITY.KEYID = 7
1,210,696 UART: [ldev] FE.KEYID = 1
1,216,208 UART: [ldev] Erasing FE.KEYID = 1
1,242,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,128 UART: [ldev] --
1,282,351 UART: [fwproc] Wait for Commands...
1,283,052 UART: [fwproc] Recv command 0x46574c44
1,283,785 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,502 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,187 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,420 >>> mbox cmd response: success
2,781,560 UART: [afmc] ++
2,781,728 UART: [afmc] CDI.KEYID = 6
2,782,091 UART: [afmc] SUBJECT.KEYID = 7
2,782,517 UART: [afmc] AUTHORITY.KEYID = 5
2,818,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,190 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,886 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,785 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,478 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,232 UART: [afmc] --
2,861,201 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,861,223 UART: [cold-reset] --
2,862,123 UART: [state] Locking Datavault
2,863,224 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,828 UART: [state] Locking ICCM
2,864,502 UART: [exit] Launching FMC @ 0x40000000
2,869,799 UART:
2,869,815 UART: Running Caliptra FMC ...
2,870,223 UART:
2,870,453 UART: [fmc] Received command: 0x46574C44
2,871,279 UART:
2,871,295 UART: Running Caliptra ROM ...
2,871,703 UART:
2,871,758 UART: [state] CFI Enabled
2,874,178 UART: [state] LifecycleState = Unprovisioned
2,874,833 UART: [state] DebugLocked = No
2,875,497 UART: [state] WD Timer not started. Device not locked for debugging
2,876,767 UART: [kat] SHA2-256
3,680,317 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,421 UART: [kat] ++
3,684,573 UART: [kat] sha1
3,688,881 UART: [kat] SHA2-256
3,690,821 UART: [kat] SHA2-384
3,693,530 UART: [kat] SHA2-512-ACC
3,695,430 UART: [kat] ECC-384
3,705,007 UART: [kat] HMAC-384Kdf
3,709,647 UART: [kat] LMS
3,957,959 UART: [kat] --
3,958,873 UART: [update-reset] ++
5,276,861 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,277,888 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,430,615 UART: [update-reset] Copying MAN_2 To MAN_1
5,438,629 UART: [update-reset Success] --
5,439,038 >>> mbox cmd response: success
5,439,038 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,439,624 UART: [state] Locking Datavault
5,440,312 UART: [state] Locking PCR0, PCR1 and PCR31
5,440,916 UART: [state] Locking ICCM
5,441,496 UART: [exit] Launching FMC @ 0x40000000
5,446,793 UART:
5,446,809 UART: Running Caliptra FMC ...
5,447,217 UART:
5,447,439 UART: [fmc] Received command: 0x1000000C
5,448,174 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,312 ready_for_fw is high
1,059,312 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,735 >>> mbox cmd response: success
2,686,942 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,692,869 UART:
2,692,885 UART: Running Caliptra FMC ...
2,693,293 UART:
2,693,523 UART: [fmc] Received command: 0x46574C44
5,146,484 >>> mbox cmd response: success
5,146,484 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,152,462 UART:
5,152,478 UART: Running Caliptra FMC ...
5,152,886 UART:
5,153,108 UART: [fmc] Received command: 0x1000000C
5,153,843 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,308 UART: [kat] SHA2-512-ACC
906,209 UART: [kat] ECC-384
916,128 UART: [kat] HMAC-384Kdf
920,728 UART: [kat] LMS
1,169,040 UART: [kat] --
1,170,165 UART: [cold-reset] ++
1,170,697 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,174,511 ready_for_fw is high
1,174,511 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,080 UART: [idev] Erasing UDS.KEYID = 0
1,199,118 UART: [idev] Sha1 KeyId Algorithm
1,207,996 UART: [idev] --
1,209,207 UART: [ldev] ++
1,209,375 UART: [ldev] CDI.KEYID = 6
1,209,739 UART: [ldev] SUBJECT.KEYID = 5
1,210,166 UART: [ldev] AUTHORITY.KEYID = 7
1,210,629 UART: [ldev] FE.KEYID = 1
1,215,969 UART: [ldev] Erasing FE.KEYID = 1
1,242,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,415 UART: [ldev] --
1,281,712 UART: [fwproc] Wait for Commands...
1,282,535 UART: [fwproc] Recv command 0x46574c44
1,283,268 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,863 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,548 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,835 >>> mbox cmd response: success
2,781,003 UART: [afmc] ++
2,781,171 UART: [afmc] CDI.KEYID = 6
2,781,534 UART: [afmc] SUBJECT.KEYID = 7
2,781,960 UART: [afmc] AUTHORITY.KEYID = 5
2,817,561 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,537 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,233 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,132 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,825 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,581 UART: [afmc] --
2,860,398 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,420 UART: [cold-reset] --
2,861,400 UART: [state] Locking Datavault
2,862,459 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,063 UART: [state] Locking ICCM
2,863,713 UART: [exit] Launching FMC @ 0x40000000
2,869,010 UART:
2,869,026 UART: Running Caliptra FMC ...
2,869,434 UART:
2,869,664 UART: [fmc] Received command: 0x46574C44
2,870,490 UART:
2,870,506 UART: Running Caliptra ROM ...
2,870,914 UART:
2,871,056 UART: [state] CFI Enabled
2,873,990 UART: [state] LifecycleState = Unprovisioned
2,874,645 UART: [state] DebugLocked = No
2,875,255 UART: [state] WD Timer not started. Device not locked for debugging
2,876,381 UART: [kat] SHA2-256
3,679,931 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,035 UART: [kat] ++
3,684,187 UART: [kat] sha1
3,688,441 UART: [kat] SHA2-256
3,690,381 UART: [kat] SHA2-384
3,693,218 UART: [kat] SHA2-512-ACC
3,695,118 UART: [kat] ECC-384
3,704,933 UART: [kat] HMAC-384Kdf
3,709,455 UART: [kat] LMS
3,957,767 UART: [kat] --
3,958,593 UART: [update-reset] ++
5,277,877 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,278,988 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,431,647 UART: [update-reset] Copying MAN_2 To MAN_1
5,439,661 UART: [update-reset Success] --
5,440,070 >>> mbox cmd response: success
5,440,070 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,440,664 UART: [state] Locking Datavault
5,441,474 UART: [state] Locking PCR0, PCR1 and PCR31
5,442,078 UART: [state] Locking ICCM
5,442,700 UART: [exit] Launching FMC @ 0x40000000
5,447,997 UART:
5,448,013 UART: Running Caliptra FMC ...
5,448,421 UART:
5,448,643 UART: [fmc] Received command: 0x1000000C
5,449,378 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,719 ready_for_fw is high
1,059,719 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,635,244 >>> mbox cmd response: success
2,691,005 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,697,244 UART:
2,697,260 UART: Running Caliptra FMC ...
2,697,668 UART:
2,697,898 UART: [fmc] Received command: 0x46574C44
5,151,518 >>> mbox cmd response: success
5,151,518 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,157,172 UART:
5,157,188 UART: Running Caliptra FMC ...
5,157,596 UART:
5,157,818 UART: [fmc] Received command: 0x1000000C
5,158,553 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,015 UART:
192,366 UART: Running Caliptra ROM ...
193,563 UART:
193,760 UART: [state] CFI Enabled
262,868 UART: [state] LifecycleState = Unprovisioned
264,868 UART: [state] DebugLocked = No
267,190 UART: [state] WD Timer not started. Device not locked for debugging
270,373 UART: [kat] SHA2-256
450,017 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,846 UART: [kat] ++
461,388 UART: [kat] sha1
472,554 UART: [kat] SHA2-256
475,282 UART: [kat] SHA2-384
481,365 UART: [kat] SHA2-512-ACC
483,739 UART: [kat] ECC-384
2,946,409 UART: [kat] HMAC-384Kdf
2,970,318 UART: [kat] LMS
3,446,804 UART: [kat] --
3,452,362 UART: [cold-reset] ++
3,453,753 UART: [fht] FHT @ 0x50003400
3,464,386 UART: [idev] ++
3,465,028 UART: [idev] CDI.KEYID = 6
3,465,951 UART: [idev] SUBJECT.KEYID = 7
3,467,202 UART: [idev] UDS.KEYID = 0
3,468,137 ready_for_fw is high
3,468,346 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,612,902 UART: [idev] Erasing UDS.KEYID = 0
5,986,047 UART: [idev] Sha1 KeyId Algorithm
6,008,899 UART: [idev] --
6,014,140 UART: [ldev] ++
6,014,719 UART: [ldev] CDI.KEYID = 6
6,015,641 UART: [ldev] SUBJECT.KEYID = 5
6,016,862 UART: [ldev] AUTHORITY.KEYID = 7
6,018,099 UART: [ldev] FE.KEYID = 1
6,058,459 UART: [ldev] Erasing FE.KEYID = 1
8,564,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,899 UART: [ldev] --
10,375,060 UART: [fwproc] Wait for Commands...
10,376,950 UART: [fwproc] Recv command 0x46574c44
10,378,940 UART: [fwproc] Recv'd Img size: 114888 bytes
13,817,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,696 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,954,911 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,282,966 >>> mbox cmd response: success
14,287,365 UART: [afmc] ++
14,287,962 UART: [afmc] CDI.KEYID = 6
14,288,880 UART: [afmc] SUBJECT.KEYID = 7
14,290,112 UART: [afmc] AUTHORITY.KEYID = 5
16,833,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,574,080 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,576,278 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,592,097 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,608,177 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,623,648 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,647,870 UART: [afmc] --
20,716,501 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,882,205 UART: [cold-reset] --
20,883,181 UART: [state] Locking Datavault
20,884,359 UART: [state] Locking PCR0, PCR1 and PCR31
20,885,906 UART: [state] Locking ICCM
20,886,827 UART: [exit] Launching FMC @ 0x40000000
20,888,261 UART:
20,888,438 UART: Running Caliptra FMC ...
20,889,545 UART:
20,889,716 UART: [fmc] Received command: 0x46574C44
20,891,099 UART:
20,891,257 UART: Running Caliptra ROM ...
20,892,362 UART:
20,892,522 UART: [state] CFI Enabled
20,955,794 UART: [state] LifecycleState = Unprovisioned
20,957,724 UART: [state] DebugLocked = No
20,960,577 UART: [state] WD Timer not started. Device not locked for debugging
20,963,739 UART: [kat] SHA2-256
21,143,369 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
21,154,165 UART: [kat] ++
21,154,657 UART: [kat] sha1
21,165,873 UART: [kat] SHA2-256
21,168,569 UART: [kat] SHA2-384
21,174,428 UART: [kat] SHA2-512-ACC
21,176,798 UART: [kat] ECC-384
23,642,413 UART: [kat] HMAC-384Kdf
23,662,430 UART: [kat] LMS
24,138,874 UART: [kat] --
24,142,958 UART: [update-reset] ++
27,792,496 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,796,739 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,238,221 >>> mbox cmd response: success
28,240,034 UART: [update-reset] Copying MAN_2 To MAN_1
28,277,169 UART: [update-reset Success] --
28,284,035 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,441,417 UART: [state] Locking Datavault
28,442,643 UART: [state] Locking PCR0, PCR1 and PCR31
28,444,198 UART: [state] Locking ICCM
28,445,269 UART: [exit] Launching FMC @ 0x40000000
28,446,704 UART:
28,446,874 UART: Running Caliptra FMC ...
28,447,973 UART:
28,448,143 UART: [fmc] Received command: 0x1000000E
29,225,850 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,460,375 ready_for_fw is high
3,460,884 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,170,221 >>> mbox cmd response: success
20,492,983 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,658,790 UART:
20,659,211 UART: Running Caliptra FMC ...
20,660,386 UART:
20,660,564 UART: [fmc] Received command: 0x46574C44
28,021,258 >>> mbox cmd response: success
28,049,448 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,206,851 UART:
28,207,189 UART: Running Caliptra FMC ...
28,208,400 UART:
28,208,578 UART: [fmc] Received command: 0x1000000E
28,991,294 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
192,241 UART:
192,612 UART: Running Caliptra ROM ...
193,739 UART:
603,294 UART: [state] CFI Enabled
613,895 UART: [state] LifecycleState = Unprovisioned
615,838 UART: [state] DebugLocked = No
617,789 UART: [state] WD Timer not started. Device not locked for debugging
621,735 UART: [kat] SHA2-256
801,406 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,193 UART: [kat] ++
812,668 UART: [kat] sha1
823,613 UART: [kat] SHA2-256
826,346 UART: [kat] SHA2-384
832,405 UART: [kat] SHA2-512-ACC
834,769 UART: [kat] ECC-384
3,278,763 UART: [kat] HMAC-384Kdf
3,290,543 UART: [kat] LMS
3,766,652 UART: [kat] --
3,773,570 UART: [cold-reset] ++
3,775,336 UART: [fht] FHT @ 0x50003400
3,785,313 UART: [idev] ++
3,785,967 UART: [idev] CDI.KEYID = 6
3,786,849 UART: [idev] SUBJECT.KEYID = 7
3,788,090 UART: [idev] UDS.KEYID = 0
3,789,086 ready_for_fw is high
3,789,271 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,933,578 UART: [idev] Erasing UDS.KEYID = 0
6,260,987 UART: [idev] Sha1 KeyId Algorithm
6,283,939 UART: [idev] --
6,287,876 UART: [ldev] ++
6,288,443 UART: [ldev] CDI.KEYID = 6
6,289,330 UART: [ldev] SUBJECT.KEYID = 5
6,290,589 UART: [ldev] AUTHORITY.KEYID = 7
6,291,822 UART: [ldev] FE.KEYID = 1
6,302,574 UART: [ldev] Erasing FE.KEYID = 1
8,778,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,714 UART: [ldev] --
10,576,295 UART: [fwproc] Wait for Commands...
10,577,904 UART: [fwproc] Recv command 0x46574c44
10,579,897 UART: [fwproc] Recv'd Img size: 114888 bytes
14,014,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,892 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,153,112 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,481,437 >>> mbox cmd response: success
14,485,624 UART: [afmc] ++
14,486,227 UART: [afmc] CDI.KEYID = 6
14,487,168 UART: [afmc] SUBJECT.KEYID = 7
14,488,397 UART: [afmc] AUTHORITY.KEYID = 5
16,990,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,905 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,728,675 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,744,773 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,760,262 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,784,363 UART: [afmc] --
20,849,404 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
21,014,990 UART: [cold-reset] --
21,015,981 UART: [state] Locking Datavault
21,017,064 UART: [state] Locking PCR0, PCR1 and PCR31
21,018,611 UART: [state] Locking ICCM
21,019,491 UART: [exit] Launching FMC @ 0x40000000
21,020,829 UART:
21,020,971 UART: Running Caliptra FMC ...
21,022,069 UART:
21,022,229 UART: [fmc] Received command: 0x46574C44
21,023,681 UART:
21,023,836 UART: Running Caliptra ROM ...
21,024,930 UART:
21,025,086 UART: [state] CFI Enabled
21,032,054 UART: [state] LifecycleState = Unprovisioned
21,033,931 UART: [state] DebugLocked = No
21,036,706 UART: [state] WD Timer not started. Device not locked for debugging
21,039,903 UART: [kat] SHA2-256
21,219,631 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
21,230,407 UART: [kat] ++
21,230,945 UART: [kat] sha1
21,242,047 UART: [kat] SHA2-256
21,244,783 UART: [kat] SHA2-384
21,250,177 UART: [kat] SHA2-512-ACC
21,252,522 UART: [kat] ECC-384
23,696,437 UART: [kat] HMAC-384Kdf
23,708,731 UART: [kat] LMS
24,185,186 UART: [kat] --
24,190,164 UART: [update-reset] ++
27,837,447 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,841,522 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,283,029 >>> mbox cmd response: success
28,283,999 UART: [update-reset] Copying MAN_2 To MAN_1
28,321,132 UART: [update-reset Success] --
28,328,368 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,485,729 UART: [state] Locking Datavault
28,486,947 UART: [state] Locking PCR0, PCR1 and PCR31
28,488,409 UART: [state] Locking ICCM
28,489,278 UART: [exit] Launching FMC @ 0x40000000
28,490,940 UART:
28,491,116 UART: Running Caliptra FMC ...
28,492,220 UART:
28,492,375 UART: [fmc] Received command: 0x1000000E
29,270,134 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,782,146 ready_for_fw is high
3,782,758 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,391,074 >>> mbox cmd response: success
20,693,885 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,859,651 UART:
20,860,064 UART: Running Caliptra FMC ...
20,861,145 UART:
20,861,292 UART: [fmc] Received command: 0x46574C44
28,132,784 >>> mbox cmd response: success
28,159,960 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,317,367 UART:
28,317,699 UART: Running Caliptra FMC ...
28,318,916 UART:
28,319,082 UART: [fmc] Received command: 0x1000000E
29,101,781 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,230 UART: [kat] ++
895,382 UART: [kat] sha1
899,532 UART: [kat] SHA2-256
901,472 UART: [kat] SHA2-384
904,113 UART: [kat] SHA2-512-ACC
906,014 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,419 UART: [kat] LMS
1,168,731 UART: [kat] --
1,169,468 UART: [cold-reset] ++
1,169,866 UART: [fht] FHT @ 0x50003400
1,172,700 UART: [idev] ++
1,172,868 UART: [idev] CDI.KEYID = 6
1,173,229 UART: [idev] SUBJECT.KEYID = 7
1,173,654 UART: [idev] UDS.KEYID = 0
1,174,000 ready_for_fw is high
1,174,000 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,711 UART: [idev] Erasing UDS.KEYID = 0
1,198,707 UART: [idev] Sha1 KeyId Algorithm
1,207,597 UART: [idev] --
1,208,726 UART: [ldev] ++
1,208,894 UART: [ldev] CDI.KEYID = 6
1,209,258 UART: [ldev] SUBJECT.KEYID = 5
1,209,685 UART: [ldev] AUTHORITY.KEYID = 7
1,210,148 UART: [ldev] FE.KEYID = 1
1,215,364 UART: [ldev] Erasing FE.KEYID = 1
1,241,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,698 UART: [ldev] --
1,281,007 UART: [fwproc] Wait for Commands...
1,281,578 UART: [fwproc] Recv command 0x46574c44
1,282,311 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,800 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,485 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,728 >>> mbox cmd response: success
2,779,926 UART: [afmc] ++
2,780,094 UART: [afmc] CDI.KEYID = 6
2,780,457 UART: [afmc] SUBJECT.KEYID = 7
2,780,883 UART: [afmc] AUTHORITY.KEYID = 5
2,816,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,420 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,116 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,015 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,708 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,482 UART: [afmc] --
2,859,279 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,859,301 UART: [cold-reset] --
2,860,401 UART: [state] Locking Datavault
2,861,550 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,154 UART: [state] Locking ICCM
2,862,766 UART: [exit] Launching FMC @ 0x40000000
2,868,063 UART:
2,868,079 UART: Running Caliptra FMC ...
2,868,487 UART:
2,868,717 UART: [fmc] Received command: 0x46574C44
2,869,543 UART:
2,869,559 UART: Running Caliptra ROM ...
2,869,967 UART:
2,870,022 UART: [state] CFI Enabled
2,873,020 UART: [state] LifecycleState = Unprovisioned
2,873,675 UART: [state] DebugLocked = No
2,874,277 UART: [state] WD Timer not started. Device not locked for debugging
2,875,605 UART: [kat] SHA2-256
3,679,155 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,259 UART: [kat] ++
3,683,411 UART: [kat] sha1
3,687,681 UART: [kat] SHA2-256
3,689,621 UART: [kat] SHA2-384
3,692,428 UART: [kat] SHA2-512-ACC
3,694,328 UART: [kat] ECC-384
3,703,863 UART: [kat] HMAC-384Kdf
3,708,509 UART: [kat] LMS
3,956,821 UART: [kat] --
3,957,813 UART: [update-reset] ++
5,461,728 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,462,703 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,639,477 >>> mbox cmd response: success
5,639,806 UART: [update-reset] Copying MAN_2 To MAN_1
5,647,820 UART: [update-reset Success] --
5,648,229 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,648,815 UART: [state] Locking Datavault
5,649,533 UART: [state] Locking PCR0, PCR1 and PCR31
5,650,137 UART: [state] Locking ICCM
5,650,757 UART: [exit] Launching FMC @ 0x40000000
5,656,054 UART:
5,656,070 UART: Running Caliptra FMC ...
5,656,478 UART:
5,656,700 UART: [fmc] Received command: 0x1000000E
6,001,754 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,224 ready_for_fw is high
1,059,224 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,511 >>> mbox cmd response: success
2,686,748 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,693,093 UART:
2,693,109 UART: Running Caliptra FMC ...
2,693,517 UART:
2,693,747 UART: [fmc] Received command: 0x46574C44
5,349,403 >>> mbox cmd response: success
5,357,023 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,362,355 UART:
5,362,371 UART: Running Caliptra FMC ...
5,362,779 UART:
5,363,001 UART: [fmc] Received command: 0x1000000E
5,708,055 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Unprovisioned
85,766 UART: [state] DebugLocked = No
86,344 UART: [state] WD Timer not started. Device not locked for debugging
87,475 UART: [kat] SHA2-256
891,025 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
916,026 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,169,795 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,174,263 ready_for_fw is high
1,174,263 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,982 UART: [idev] Erasing UDS.KEYID = 0
1,199,066 UART: [idev] Sha1 KeyId Algorithm
1,207,886 UART: [idev] --
1,208,965 UART: [ldev] ++
1,209,133 UART: [ldev] CDI.KEYID = 6
1,209,497 UART: [ldev] SUBJECT.KEYID = 5
1,209,924 UART: [ldev] AUTHORITY.KEYID = 7
1,210,387 UART: [ldev] FE.KEYID = 1
1,215,723 UART: [ldev] Erasing FE.KEYID = 1
1,242,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,889 UART: [ldev] --
1,281,268 UART: [fwproc] Wait for Commands...
1,282,061 UART: [fwproc] Recv command 0x46574c44
1,282,794 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,757 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,442 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,753 >>> mbox cmd response: success
2,780,789 UART: [afmc] ++
2,780,957 UART: [afmc] CDI.KEYID = 6
2,781,320 UART: [afmc] SUBJECT.KEYID = 7
2,781,746 UART: [afmc] AUTHORITY.KEYID = 5
2,816,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,876 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,625 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,321 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,220 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,913 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,569 UART: [afmc] --
2,859,448 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,859,470 UART: [cold-reset] --
2,860,360 UART: [state] Locking Datavault
2,861,469 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,073 UART: [state] Locking ICCM
2,862,525 UART: [exit] Launching FMC @ 0x40000000
2,867,822 UART:
2,867,838 UART: Running Caliptra FMC ...
2,868,246 UART:
2,868,476 UART: [fmc] Received command: 0x46574C44
2,869,302 UART:
2,869,318 UART: Running Caliptra ROM ...
2,869,726 UART:
2,869,868 UART: [state] CFI Enabled
2,872,382 UART: [state] LifecycleState = Unprovisioned
2,873,037 UART: [state] DebugLocked = No
2,873,711 UART: [state] WD Timer not started. Device not locked for debugging
2,874,975 UART: [kat] SHA2-256
3,678,525 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,629 UART: [kat] ++
3,682,781 UART: [kat] sha1
3,686,957 UART: [kat] SHA2-256
3,688,897 UART: [kat] SHA2-384
3,691,398 UART: [kat] SHA2-512-ACC
3,693,298 UART: [kat] ECC-384
3,703,315 UART: [kat] HMAC-384Kdf
3,708,053 UART: [kat] LMS
3,956,365 UART: [kat] --
3,957,473 UART: [update-reset] ++
5,460,314 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,461,289 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,638,063 >>> mbox cmd response: success
5,638,374 UART: [update-reset] Copying MAN_2 To MAN_1
5,646,388 UART: [update-reset Success] --
5,646,797 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,647,423 UART: [state] Locking Datavault
5,648,225 UART: [state] Locking PCR0, PCR1 and PCR31
5,648,829 UART: [state] Locking ICCM
5,649,321 UART: [exit] Launching FMC @ 0x40000000
5,654,618 UART:
5,654,634 UART: Running Caliptra FMC ...
5,655,042 UART:
5,655,264 UART: [fmc] Received command: 0x1000000E
6,000,318 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,107 ready_for_fw is high
1,060,107 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,634,094 >>> mbox cmd response: success
2,690,279 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,696,626 UART:
2,696,642 UART: Running Caliptra FMC ...
2,697,050 UART:
2,697,280 UART: [fmc] Received command: 0x46574C44
5,352,179 >>> mbox cmd response: success
5,359,699 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,365,559 UART:
5,365,575 UART: Running Caliptra FMC ...
5,365,983 UART:
5,366,205 UART: [fmc] Received command: 0x1000000E
5,711,259 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,950 UART: [kat] ++
895,102 UART: [kat] sha1
899,240 UART: [kat] SHA2-256
901,180 UART: [kat] SHA2-384
903,959 UART: [kat] SHA2-512-ACC
905,860 UART: [kat] ECC-384
915,747 UART: [kat] HMAC-384Kdf
920,385 UART: [kat] LMS
1,168,697 UART: [kat] --
1,169,648 UART: [cold-reset] ++
1,170,210 UART: [fht] FHT @ 0x50003400
1,172,864 UART: [idev] ++
1,173,032 UART: [idev] CDI.KEYID = 6
1,173,393 UART: [idev] SUBJECT.KEYID = 7
1,173,818 UART: [idev] UDS.KEYID = 0
1,174,164 ready_for_fw is high
1,174,164 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,629 UART: [idev] Erasing UDS.KEYID = 0
1,198,813 UART: [idev] Sha1 KeyId Algorithm
1,207,711 UART: [idev] --
1,208,736 UART: [ldev] ++
1,208,904 UART: [ldev] CDI.KEYID = 6
1,209,268 UART: [ldev] SUBJECT.KEYID = 5
1,209,695 UART: [ldev] AUTHORITY.KEYID = 7
1,210,158 UART: [ldev] FE.KEYID = 1
1,215,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,996 UART: [ldev] --
1,280,401 UART: [fwproc] Wait for Commands...
1,281,218 UART: [fwproc] Recv command 0x46574c44
1,281,951 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,890 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,575 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,744 >>> mbox cmd response: success
2,778,968 UART: [afmc] ++
2,779,136 UART: [afmc] CDI.KEYID = 6
2,779,499 UART: [afmc] SUBJECT.KEYID = 7
2,779,925 UART: [afmc] AUTHORITY.KEYID = 5
2,815,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,459 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,208 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,904 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,803 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,496 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,112 UART: [afmc] --
2,858,037 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,858,059 UART: [cold-reset] --
2,858,895 UART: [state] Locking Datavault
2,859,878 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,482 UART: [state] Locking ICCM
2,861,154 UART: [exit] Launching FMC @ 0x40000000
2,866,451 UART:
2,866,467 UART: Running Caliptra FMC ...
2,866,875 UART:
2,867,105 UART: [fmc] Received command: 0x46574C44
2,867,931 UART:
2,867,947 UART: Running Caliptra ROM ...
2,868,355 UART:
2,868,410 UART: [state] CFI Enabled
2,870,966 UART: [state] LifecycleState = Unprovisioned
2,871,621 UART: [state] DebugLocked = No
2,872,273 UART: [state] WD Timer not started. Device not locked for debugging
2,873,431 UART: [kat] SHA2-256
3,676,981 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,085 UART: [kat] ++
3,681,237 UART: [kat] sha1
3,685,485 UART: [kat] SHA2-256
3,687,425 UART: [kat] SHA2-384
3,690,104 UART: [kat] SHA2-512-ACC
3,692,004 UART: [kat] ECC-384
3,701,639 UART: [kat] HMAC-384Kdf
3,706,105 UART: [kat] LMS
3,954,417 UART: [kat] --
3,955,481 UART: [update-reset] ++
5,459,488 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,460,581 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,637,355 >>> mbox cmd response: success
5,637,462 UART: [update-reset] Copying MAN_2 To MAN_1
5,645,476 UART: [update-reset Success] --
5,645,885 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,646,173 UART: [state] Locking Datavault
5,646,847 UART: [state] Locking PCR0, PCR1 and PCR31
5,647,451 UART: [state] Locking ICCM
5,647,879 UART: [exit] Launching FMC @ 0x40000000
5,653,176 UART:
5,653,192 UART: Running Caliptra FMC ...
5,653,600 UART:
5,653,822 UART: [fmc] Received command: 0x1000000E
5,998,876 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,980 ready_for_fw is high
1,058,980 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,191 >>> mbox cmd response: success
2,688,372 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,694,489 UART:
2,694,505 UART: Running Caliptra FMC ...
2,694,913 UART:
2,695,143 UART: [fmc] Received command: 0x46574C44
5,350,139 >>> mbox cmd response: success
5,357,855 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,363,459 UART:
5,363,475 UART: Running Caliptra FMC ...
5,363,883 UART:
5,364,105 UART: [fmc] Received command: 0x1000000E
5,709,159 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,839 UART: [state] LifecycleState = Unprovisioned
86,494 UART: [state] DebugLocked = No
87,170 UART: [state] WD Timer not started. Device not locked for debugging
88,331 UART: [kat] SHA2-256
891,881 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,985 UART: [kat] ++
896,137 UART: [kat] sha1
900,471 UART: [kat] SHA2-256
902,411 UART: [kat] SHA2-384
905,300 UART: [kat] SHA2-512-ACC
907,201 UART: [kat] ECC-384
916,926 UART: [kat] HMAC-384Kdf
921,448 UART: [kat] LMS
1,169,760 UART: [kat] --
1,170,951 UART: [cold-reset] ++
1,171,411 UART: [fht] FHT @ 0x50003400
1,174,021 UART: [idev] ++
1,174,189 UART: [idev] CDI.KEYID = 6
1,174,550 UART: [idev] SUBJECT.KEYID = 7
1,174,975 UART: [idev] UDS.KEYID = 0
1,175,321 ready_for_fw is high
1,175,321 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,956 UART: [idev] Erasing UDS.KEYID = 0
1,200,598 UART: [idev] Sha1 KeyId Algorithm
1,209,310 UART: [idev] --
1,210,221 UART: [ldev] ++
1,210,389 UART: [ldev] CDI.KEYID = 6
1,210,753 UART: [ldev] SUBJECT.KEYID = 5
1,211,180 UART: [ldev] AUTHORITY.KEYID = 7
1,211,643 UART: [ldev] FE.KEYID = 1
1,216,689 UART: [ldev] Erasing FE.KEYID = 1
1,243,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,043 UART: [ldev] --
1,282,328 UART: [fwproc] Wait for Commands...
1,282,983 UART: [fwproc] Recv command 0x46574c44
1,283,716 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,405 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,090 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,385 >>> mbox cmd response: success
2,781,561 UART: [afmc] ++
2,781,729 UART: [afmc] CDI.KEYID = 6
2,782,092 UART: [afmc] SUBJECT.KEYID = 7
2,782,518 UART: [afmc] AUTHORITY.KEYID = 5
2,818,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,855 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,841,551 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,847,450 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,853,143 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,885 UART: [afmc] --
2,861,758 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,861,780 UART: [cold-reset] --
2,862,724 UART: [state] Locking Datavault
2,863,707 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,311 UART: [state] Locking ICCM
2,864,863 UART: [exit] Launching FMC @ 0x40000000
2,870,160 UART:
2,870,176 UART: Running Caliptra FMC ...
2,870,584 UART:
2,870,814 UART: [fmc] Received command: 0x46574C44
2,871,640 UART:
2,871,656 UART: Running Caliptra ROM ...
2,872,064 UART:
2,872,206 UART: [state] CFI Enabled
2,875,198 UART: [state] LifecycleState = Unprovisioned
2,875,853 UART: [state] DebugLocked = No
2,876,587 UART: [state] WD Timer not started. Device not locked for debugging
2,877,775 UART: [kat] SHA2-256
3,681,325 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,685,429 UART: [kat] ++
3,685,581 UART: [kat] sha1
3,689,927 UART: [kat] SHA2-256
3,691,867 UART: [kat] SHA2-384
3,694,480 UART: [kat] SHA2-512-ACC
3,696,380 UART: [kat] ECC-384
3,706,271 UART: [kat] HMAC-384Kdf
3,710,963 UART: [kat] LMS
3,959,275 UART: [kat] --
3,960,059 UART: [update-reset] ++
5,464,732 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,465,891 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,642,665 >>> mbox cmd response: success
5,642,942 UART: [update-reset] Copying MAN_2 To MAN_1
5,650,956 UART: [update-reset Success] --
5,651,365 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,651,995 UART: [state] Locking Datavault
5,652,869 UART: [state] Locking PCR0, PCR1 and PCR31
5,653,473 UART: [state] Locking ICCM
5,654,141 UART: [exit] Launching FMC @ 0x40000000
5,659,438 UART:
5,659,454 UART: Running Caliptra FMC ...
5,659,862 UART:
5,660,084 UART: [fmc] Received command: 0x1000000E
6,005,138 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,567 ready_for_fw is high
1,059,567 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,946 >>> mbox cmd response: success
2,688,749 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,694,736 UART:
2,694,752 UART: Running Caliptra FMC ...
2,695,160 UART:
2,695,390 UART: [fmc] Received command: 0x46574C44
5,351,473 >>> mbox cmd response: success
5,359,139 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,364,979 UART:
5,364,995 UART: Running Caliptra FMC ...
5,365,403 UART:
5,365,625 UART: [fmc] Received command: 0x1000000E
5,710,679 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,729 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
891,494 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
915,929 UART: [kat] HMAC-384Kdf
920,677 UART: [kat] LMS
1,168,989 UART: [kat] --
1,169,628 UART: [cold-reset] ++
1,170,048 UART: [fht] FHT @ 0x50003400
1,172,844 UART: [idev] ++
1,173,012 UART: [idev] CDI.KEYID = 6
1,173,373 UART: [idev] SUBJECT.KEYID = 7
1,173,798 UART: [idev] UDS.KEYID = 0
1,174,144 ready_for_fw is high
1,174,144 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,199,225 UART: [idev] Sha1 KeyId Algorithm
1,208,017 UART: [idev] --
1,208,916 UART: [ldev] ++
1,209,084 UART: [ldev] CDI.KEYID = 6
1,209,448 UART: [ldev] SUBJECT.KEYID = 5
1,209,875 UART: [ldev] AUTHORITY.KEYID = 7
1,210,338 UART: [ldev] FE.KEYID = 1
1,215,312 UART: [ldev] Erasing FE.KEYID = 1
1,241,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,188 UART: [ldev] --
1,280,565 UART: [fwproc] Wait for Commands...
1,281,300 UART: [fwproc] Recv command 0x46574c44
1,282,033 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,092 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,777 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,128 >>> mbox cmd response: success
2,778,342 UART: [afmc] ++
2,778,510 UART: [afmc] CDI.KEYID = 6
2,778,873 UART: [afmc] SUBJECT.KEYID = 7
2,779,299 UART: [afmc] AUTHORITY.KEYID = 5
2,814,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,960 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,656 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,555 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,248 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,190 UART: [afmc] --
2,858,073 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,858,095 UART: [cold-reset] --
2,859,061 UART: [state] Locking Datavault
2,859,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,522 UART: [state] Locking ICCM
2,861,138 UART: [exit] Launching FMC @ 0x40000000
2,866,435 UART:
2,866,451 UART: Running Caliptra FMC ...
2,866,859 UART:
2,867,089 UART: [fmc] Received command: 0x46574C44
2,867,915 UART:
2,867,931 UART: Running Caliptra ROM ...
2,868,339 UART:
2,868,394 UART: [state] CFI Enabled
2,871,314 UART: [state] LifecycleState = Unprovisioned
2,871,969 UART: [state] DebugLocked = No
2,872,609 UART: [state] WD Timer not started. Device not locked for debugging
2,873,737 UART: [kat] SHA2-256
3,677,287 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,391 UART: [kat] ++
3,681,543 UART: [kat] sha1
3,685,577 UART: [kat] SHA2-256
3,687,517 UART: [kat] SHA2-384
3,690,250 UART: [kat] SHA2-512-ACC
3,692,150 UART: [kat] ECC-384
3,701,589 UART: [kat] HMAC-384Kdf
3,706,059 UART: [kat] LMS
3,954,371 UART: [kat] --
3,955,407 UART: [update-reset] ++
5,458,188 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,459,185 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,635,959 >>> mbox cmd response: success
5,636,234 UART: [update-reset] Copying MAN_2 To MAN_1
5,644,248 UART: [update-reset Success] --
5,644,657 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,645,197 UART: [state] Locking Datavault
5,646,153 UART: [state] Locking PCR0, PCR1 and PCR31
5,646,757 UART: [state] Locking ICCM
5,647,255 UART: [exit] Launching FMC @ 0x40000000
5,652,552 UART:
5,652,568 UART: Running Caliptra FMC ...
5,652,976 UART:
5,653,198 UART: [fmc] Received command: 0x1000000E
5,998,252 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,192 ready_for_fw is high
1,059,192 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,305 >>> mbox cmd response: success
2,687,196 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,693,665 UART:
2,693,681 UART: Running Caliptra FMC ...
2,694,089 UART:
2,694,319 UART: [fmc] Received command: 0x46574C44
5,349,009 >>> mbox cmd response: success
5,356,737 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,362,745 UART:
5,362,761 UART: Running Caliptra FMC ...
5,363,169 UART:
5,363,391 UART: [fmc] Received command: 0x1000000E
5,708,445 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,859 UART: [state] LifecycleState = Unprovisioned
85,514 UART: [state] DebugLocked = No
86,242 UART: [state] WD Timer not started. Device not locked for debugging
87,443 UART: [kat] SHA2-256
890,993 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,097 UART: [kat] ++
895,249 UART: [kat] sha1
899,541 UART: [kat] SHA2-256
901,481 UART: [kat] SHA2-384
904,204 UART: [kat] SHA2-512-ACC
906,105 UART: [kat] ECC-384
915,572 UART: [kat] HMAC-384Kdf
920,250 UART: [kat] LMS
1,168,562 UART: [kat] --
1,169,329 UART: [cold-reset] ++
1,169,661 UART: [fht] FHT @ 0x50003400
1,172,375 UART: [idev] ++
1,172,543 UART: [idev] CDI.KEYID = 6
1,172,904 UART: [idev] SUBJECT.KEYID = 7
1,173,329 UART: [idev] UDS.KEYID = 0
1,173,675 ready_for_fw is high
1,173,675 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,652 UART: [idev] Erasing UDS.KEYID = 0
1,198,510 UART: [idev] Sha1 KeyId Algorithm
1,207,516 UART: [idev] --
1,208,595 UART: [ldev] ++
1,208,763 UART: [ldev] CDI.KEYID = 6
1,209,127 UART: [ldev] SUBJECT.KEYID = 5
1,209,554 UART: [ldev] AUTHORITY.KEYID = 7
1,210,017 UART: [ldev] FE.KEYID = 1
1,215,351 UART: [ldev] Erasing FE.KEYID = 1
1,240,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,769 UART: [ldev] --
1,280,002 UART: [fwproc] Wait for Commands...
1,280,653 UART: [fwproc] Recv command 0x46574c44
1,281,386 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,517 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,202 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,551 >>> mbox cmd response: success
2,777,757 UART: [afmc] ++
2,777,925 UART: [afmc] CDI.KEYID = 6
2,778,288 UART: [afmc] SUBJECT.KEYID = 7
2,778,714 UART: [afmc] AUTHORITY.KEYID = 5
2,814,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,413 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,109 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,008 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,701 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,339 UART: [afmc] --
2,857,330 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,857,352 UART: [cold-reset] --
2,858,180 UART: [state] Locking Datavault
2,859,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,841 UART: [state] Locking ICCM
2,860,407 UART: [exit] Launching FMC @ 0x40000000
2,865,704 UART:
2,865,720 UART: Running Caliptra FMC ...
2,866,128 UART:
2,866,358 UART: [fmc] Received command: 0x46574C44
2,867,184 UART:
2,867,200 UART: Running Caliptra ROM ...
2,867,608 UART:
2,867,750 UART: [state] CFI Enabled
2,870,746 UART: [state] LifecycleState = Unprovisioned
2,871,401 UART: [state] DebugLocked = No
2,871,975 UART: [state] WD Timer not started. Device not locked for debugging
2,873,305 UART: [kat] SHA2-256
3,676,855 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,680,959 UART: [kat] ++
3,681,111 UART: [kat] sha1
3,685,331 UART: [kat] SHA2-256
3,687,271 UART: [kat] SHA2-384
3,689,952 UART: [kat] SHA2-512-ACC
3,691,852 UART: [kat] ECC-384
3,701,745 UART: [kat] HMAC-384Kdf
3,706,245 UART: [kat] LMS
3,954,557 UART: [kat] --
3,955,271 UART: [update-reset] ++
5,458,988 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,460,113 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,636,887 >>> mbox cmd response: success
5,637,100 UART: [update-reset] Copying MAN_2 To MAN_1
5,645,114 UART: [update-reset Success] --
5,645,523 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,646,209 UART: [state] Locking Datavault
5,647,125 UART: [state] Locking PCR0, PCR1 and PCR31
5,647,729 UART: [state] Locking ICCM
5,648,169 UART: [exit] Launching FMC @ 0x40000000
5,653,466 UART:
5,653,482 UART: Running Caliptra FMC ...
5,653,890 UART:
5,654,112 UART: [fmc] Received command: 0x1000000E
5,999,166 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,327 ready_for_fw is high
1,059,327 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,234 >>> mbox cmd response: success
2,688,631 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,694,708 UART:
2,694,724 UART: Running Caliptra FMC ...
2,695,132 UART:
2,695,362 UART: [fmc] Received command: 0x46574C44
5,349,583 >>> mbox cmd response: success
5,357,075 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,362,727 UART:
5,362,743 UART: Running Caliptra FMC ...
5,363,151 UART:
5,363,373 UART: [fmc] Received command: 0x1000000E
5,708,427 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
191,941 UART:
192,318 UART: Running Caliptra ROM ...
193,420 UART:
193,573 UART: [state] CFI Enabled
264,500 UART: [state] LifecycleState = Unprovisioned
266,399 UART: [state] DebugLocked = No
268,408 UART: [state] WD Timer not started. Device not locked for debugging
272,773 UART: [kat] SHA2-256
452,396 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,208 UART: [kat] ++
463,661 UART: [kat] sha1
476,098 UART: [kat] SHA2-256
478,833 UART: [kat] SHA2-384
485,960 UART: [kat] SHA2-512-ACC
488,335 UART: [kat] ECC-384
2,948,051 UART: [kat] HMAC-384Kdf
2,970,526 UART: [kat] LMS
3,447,068 UART: [kat] --
3,451,634 UART: [cold-reset] ++
3,452,786 UART: [fht] FHT @ 0x50003400
3,464,835 UART: [idev] ++
3,465,422 UART: [idev] CDI.KEYID = 6
3,466,460 UART: [idev] SUBJECT.KEYID = 7
3,467,816 UART: [idev] UDS.KEYID = 0
3,468,771 ready_for_fw is high
3,468,985 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,607,050 UART: [idev] Erasing UDS.KEYID = 0
5,984,779 UART: [idev] Sha1 KeyId Algorithm
6,008,712 UART: [idev] --
6,013,035 UART: [ldev] ++
6,013,615 UART: [ldev] CDI.KEYID = 6
6,014,592 UART: [ldev] SUBJECT.KEYID = 5
6,015,761 UART: [ldev] AUTHORITY.KEYID = 7
6,016,999 UART: [ldev] FE.KEYID = 1
6,056,873 UART: [ldev] Erasing FE.KEYID = 1
8,564,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,052 UART: [ldev] --
10,374,118 UART: [fwproc] Wait for Commands...
10,375,690 UART: [fwproc] Recv command 0x46574c44
10,377,681 UART: [fwproc] Recv'd Img size: 109820 bytes
13,759,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,840,504 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,882,999 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,211,041 >>> mbox cmd response: success
14,215,054 UART: [afmc] ++
14,215,651 UART: [afmc] CDI.KEYID = 6
14,216,569 UART: [afmc] SUBJECT.KEYID = 7
14,217,791 UART: [afmc] AUTHORITY.KEYID = 5
16,747,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,488,571 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,490,796 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,506,557 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,522,550 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,538,252 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,562,292 UART: [afmc] --
18,565,146 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,566,055 UART: [cold-reset] --
18,567,854 UART: [state] Locking Datavault
18,573,441 UART: [state] Locking PCR0, PCR1 and PCR31
18,575,207 UART: [state] Locking ICCM
18,577,283 UART: [exit] Launching FMC @ 0x40000000
18,585,628 UART:
18,585,865 UART: Running Caliptra FMC ...
18,586,900 UART:
18,587,054 UART: [fmc] Received command: 0x10000004
18,588,758 UART:
18,588,931 UART: Running Caliptra ROM ...
18,589,956 UART:
18,590,107 UART: [state] CFI Enabled
18,590,993 >>> mbox cmd response: success
18,651,631 UART: [state] LifecycleState = Unprovisioned
18,653,580 UART: [state] DebugLocked = No
18,655,696 UART: [state] WD Timer not started. Device not locked for debugging
18,660,455 UART: [kat] SHA2-256
18,840,120 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,850,885 UART: [kat] ++
18,851,429 UART: [kat] sha1
18,863,896 UART: [kat] SHA2-256
18,866,583 UART: [kat] SHA2-384
18,872,522 UART: [kat] SHA2-512-ACC
18,874,870 UART: [kat] ECC-384
21,333,235 UART: [kat] HMAC-384Kdf
21,356,105 UART: [kat] LMS
21,832,573 UART: [kat] --
21,839,085 UART: [update-reset] ++
21,840,008 UART: Failed To Get Mailbox Txn
21,843,399 UART: ROM Non-Fatal Error: 0x01040004
21,845,441 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,846,851 UART: [state] Locking Datavault
21,849,356 UART: [state] Locking PCR0, PCR1 and PCR31
21,851,115 UART: [state] Locking ICCM
21,852,679 UART: [exit] Launching FMC @ 0x40000000
21,861,030 UART:
21,861,274 UART: Running Caliptra FMC ...
21,862,382 UART:
21,862,546 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,864,198 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,459,055 ready_for_fw is high
3,459,680 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,060,516 >>> mbox cmd response: success
18,323,800 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,338,946 UART:
18,339,311 UART: Running Caliptra FMC ...
18,340,575 UART:
18,340,768 UART: [fmc] Received command: 0x10000004
18,342,333 >>> mbox cmd response: success
21,598,561 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,609,686 UART:
21,609,959 UART: Running Caliptra FMC ...
21,611,038 UART:
21,611,196 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,612,847 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,375 UART:
192,755 UART: Running Caliptra ROM ...
193,853 UART:
603,499 UART: [state] CFI Enabled
616,380 UART: [state] LifecycleState = Unprovisioned
618,317 UART: [state] DebugLocked = No
619,543 UART: [state] WD Timer not started. Device not locked for debugging
622,589 UART: [kat] SHA2-256
802,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,042 UART: [kat] ++
813,493 UART: [kat] sha1
825,106 UART: [kat] SHA2-256
827,800 UART: [kat] SHA2-384
833,516 UART: [kat] SHA2-512-ACC
835,881 UART: [kat] ECC-384
3,280,057 UART: [kat] HMAC-384Kdf
3,291,024 UART: [kat] LMS
3,767,491 UART: [kat] --
3,772,206 UART: [cold-reset] ++
3,774,142 UART: [fht] FHT @ 0x50003400
3,784,279 UART: [idev] ++
3,784,863 UART: [idev] CDI.KEYID = 6
3,785,752 UART: [idev] SUBJECT.KEYID = 7
3,787,012 UART: [idev] UDS.KEYID = 0
3,787,950 ready_for_fw is high
3,788,154 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,926,011 UART: [idev] Erasing UDS.KEYID = 0
6,258,862 UART: [idev] Sha1 KeyId Algorithm
6,281,550 UART: [idev] --
6,287,813 UART: [ldev] ++
6,288,432 UART: [ldev] CDI.KEYID = 6
6,289,340 UART: [ldev] SUBJECT.KEYID = 5
6,290,546 UART: [ldev] AUTHORITY.KEYID = 7
6,291,776 UART: [ldev] FE.KEYID = 1
6,304,037 UART: [ldev] Erasing FE.KEYID = 1
8,786,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,061 UART: [ldev] --
10,581,931 UART: [fwproc] Wait for Commands...
10,584,521 UART: [fwproc] Recv command 0x46574c44
10,586,503 UART: [fwproc] Recv'd Img size: 109820 bytes
13,960,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,040,151 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,082,595 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,410,803 >>> mbox cmd response: success
14,415,219 UART: [afmc] ++
14,415,845 UART: [afmc] CDI.KEYID = 6
14,416,731 UART: [afmc] SUBJECT.KEYID = 7
14,417,948 UART: [afmc] AUTHORITY.KEYID = 5
16,926,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,648,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,650,434 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,666,277 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,682,192 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,697,890 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,720,962 UART: [afmc] --
18,724,356 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,725,077 UART: [cold-reset] --
18,728,292 UART: [state] Locking Datavault
18,733,277 UART: [state] Locking PCR0, PCR1 and PCR31
18,735,136 UART: [state] Locking ICCM
18,736,350 UART: [exit] Launching FMC @ 0x40000000
18,744,689 UART:
18,744,925 UART: Running Caliptra FMC ...
18,745,948 UART:
18,746,089 UART: [fmc] Received command: 0x10000004
18,747,542 UART:
18,747,692 UART: Running Caliptra ROM ...
18,748,720 UART:
18,748,902 >>> mbox cmd response: success
18,749,138 UART: [state] CFI Enabled
18,764,696 UART: [state] LifecycleState = Unprovisioned
18,766,580 UART: [state] DebugLocked = No
18,769,336 UART: [state] WD Timer not started. Device not locked for debugging
18,773,809 UART: [kat] SHA2-256
18,953,483 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,964,275 UART: [kat] ++
18,964,727 UART: [kat] sha1
18,977,282 UART: [kat] SHA2-256
18,980,012 UART: [kat] SHA2-384
18,986,113 UART: [kat] SHA2-512-ACC
18,988,475 UART: [kat] ECC-384
21,431,718 UART: [kat] HMAC-384Kdf
21,443,882 UART: [kat] LMS
21,920,341 UART: [kat] --
21,924,808 UART: [update-reset] ++
21,925,727 UART: Failed To Get Mailbox Txn
21,927,571 UART: ROM Non-Fatal Error: 0x01040004
21,929,598 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,930,997 UART: [state] Locking Datavault
21,935,440 UART: [state] Locking PCR0, PCR1 and PCR31
21,937,177 UART: [state] Locking ICCM
21,938,704 UART: [exit] Launching FMC @ 0x40000000
21,947,093 UART:
21,947,328 UART: Running Caliptra FMC ...
21,948,351 UART:
21,948,494 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,950,127 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,775,317 ready_for_fw is high
3,775,817 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,306,359 >>> mbox cmd response: success
18,538,519 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,555,656 UART:
18,555,988 UART: Running Caliptra FMC ...
18,557,241 UART:
18,557,412 UART: [fmc] Received command: 0x10000004
18,558,970 >>> mbox cmd response: success
21,725,254 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,736,489 UART:
21,736,752 UART: Running Caliptra FMC ...
21,737,835 UART:
21,737,982 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,739,616 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,690 UART: [state] LifecycleState = Unprovisioned
85,345 UART: [state] DebugLocked = No
86,013 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,972 UART: [kat] ++
895,124 UART: [kat] sha1
899,384 UART: [kat] SHA2-256
901,324 UART: [kat] SHA2-384
903,929 UART: [kat] SHA2-512-ACC
905,830 UART: [kat] ECC-384
915,531 UART: [kat] HMAC-384Kdf
920,041 UART: [kat] LMS
1,168,353 UART: [kat] --
1,169,074 UART: [cold-reset] ++
1,169,452 UART: [fht] FHT @ 0x50003400
1,172,294 UART: [idev] ++
1,172,462 UART: [idev] CDI.KEYID = 6
1,172,823 UART: [idev] SUBJECT.KEYID = 7
1,173,248 UART: [idev] UDS.KEYID = 0
1,173,594 ready_for_fw is high
1,173,594 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,291 UART: [idev] Erasing UDS.KEYID = 0
1,198,721 UART: [idev] Sha1 KeyId Algorithm
1,207,537 UART: [idev] --
1,208,556 UART: [ldev] ++
1,208,724 UART: [ldev] CDI.KEYID = 6
1,209,088 UART: [ldev] SUBJECT.KEYID = 5
1,209,515 UART: [ldev] AUTHORITY.KEYID = 7
1,209,978 UART: [ldev] FE.KEYID = 1
1,214,984 UART: [ldev] Erasing FE.KEYID = 1
1,240,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,008 UART: [ldev] --
1,279,411 UART: [fwproc] Wait for Commands...
1,280,064 UART: [fwproc] Recv command 0x46574c44
1,280,797 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,547 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,630 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,710,943 >>> mbox cmd response: success
2,712,163 UART: [afmc] ++
2,712,331 UART: [afmc] CDI.KEYID = 6
2,712,694 UART: [afmc] SUBJECT.KEYID = 7
2,713,120 UART: [afmc] AUTHORITY.KEYID = 5
2,748,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,764,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,765,730 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,450 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,343 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,036 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,790,755 UART: [afmc] --
2,791,790 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,791,812 UART: [cold-reset] --
2,792,556 UART: [state] Locking Datavault
2,793,683 UART: [state] Locking PCR0, PCR1 and PCR31
2,794,287 UART: [state] Locking ICCM
2,794,739 UART: [exit] Launching FMC @ 0x40000000
2,800,036 UART:
2,800,052 UART: Running Caliptra FMC ...
2,800,460 UART:
2,800,598 UART: [fmc] Received command: 0x10000004
2,801,335 >>> mbox cmd response: success
2,801,431 UART:
2,801,447 UART: Running Caliptra ROM ...
2,801,855 UART:
2,801,910 UART: [state] CFI Enabled
2,804,704 UART: [state] LifecycleState = Unprovisioned
2,805,359 UART: [state] DebugLocked = No
2,805,927 UART: [state] WD Timer not started. Device not locked for debugging
2,807,133 UART: [kat] SHA2-256
3,610,683 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,614,787 UART: [kat] ++
3,614,939 UART: [kat] sha1
3,619,159 UART: [kat] SHA2-256
3,621,099 UART: [kat] SHA2-384
3,623,702 UART: [kat] SHA2-512-ACC
3,625,602 UART: [kat] ECC-384
3,635,653 UART: [kat] HMAC-384Kdf
3,640,227 UART: [kat] LMS
3,888,539 UART: [kat] --
3,889,303 UART: [update-reset] ++
3,889,614 UART: Failed To Get Mailbox Txn
3,890,433 UART: ROM Non-Fatal Error: 0x01040004
3,891,108 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,891,265 UART: [state] Locking Datavault
3,891,889 UART: [state] Locking PCR0, PCR1 and PCR31
3,892,493 UART: [state] Locking ICCM
3,893,017 UART: [exit] Launching FMC @ 0x40000000
3,898,314 UART:
3,898,330 UART: Running Caliptra FMC ...
3,898,738 UART:
3,898,868 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,899,644 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,362 ready_for_fw is high
1,059,362 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,566 >>> mbox cmd response: success
2,621,732 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,627,981 UART:
2,627,997 UART: Running Caliptra FMC ...
2,628,405 UART:
2,628,543 UART: [fmc] Received command: 0x10000004
2,629,280 >>> mbox cmd response: success
3,603,962 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,609,463 UART:
3,609,479 UART: Running Caliptra FMC ...
3,609,887 UART:
3,610,017 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,610,793 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,873 UART: [kat] ++
896,025 UART: [kat] sha1
900,119 UART: [kat] SHA2-256
902,059 UART: [kat] SHA2-384
904,966 UART: [kat] SHA2-512-ACC
906,867 UART: [kat] ECC-384
916,644 UART: [kat] HMAC-384Kdf
921,162 UART: [kat] LMS
1,169,474 UART: [kat] --
1,170,401 UART: [cold-reset] ++
1,170,833 UART: [fht] FHT @ 0x50003400
1,173,401 UART: [idev] ++
1,173,569 UART: [idev] CDI.KEYID = 6
1,173,930 UART: [idev] SUBJECT.KEYID = 7
1,174,355 UART: [idev] UDS.KEYID = 0
1,174,701 ready_for_fw is high
1,174,701 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,200,038 UART: [idev] Sha1 KeyId Algorithm
1,209,028 UART: [idev] --
1,209,965 UART: [ldev] ++
1,210,133 UART: [ldev] CDI.KEYID = 6
1,210,497 UART: [ldev] SUBJECT.KEYID = 5
1,210,924 UART: [ldev] AUTHORITY.KEYID = 7
1,211,387 UART: [ldev] FE.KEYID = 1
1,216,813 UART: [ldev] Erasing FE.KEYID = 1
1,243,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,547 UART: [ldev] --
1,282,764 UART: [fwproc] Wait for Commands...
1,283,351 UART: [fwproc] Recv command 0x46574c44
1,284,084 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,896 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,979 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,306 >>> mbox cmd response: success
2,715,388 UART: [afmc] ++
2,715,556 UART: [afmc] CDI.KEYID = 6
2,715,919 UART: [afmc] SUBJECT.KEYID = 7
2,716,345 UART: [afmc] AUTHORITY.KEYID = 5
2,752,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,025 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,745 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,638 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,331 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,154 UART: [afmc] --
2,795,963 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,795,985 UART: [cold-reset] --
2,796,899 UART: [state] Locking Datavault
2,798,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,738 UART: [state] Locking ICCM
2,799,248 UART: [exit] Launching FMC @ 0x40000000
2,804,545 UART:
2,804,561 UART: Running Caliptra FMC ...
2,804,969 UART:
2,805,107 UART: [fmc] Received command: 0x10000004
2,805,844 >>> mbox cmd response: success
2,805,940 UART:
2,805,956 UART: Running Caliptra ROM ...
2,806,364 UART:
2,806,506 UART: [state] CFI Enabled
2,809,398 UART: [state] LifecycleState = Unprovisioned
2,810,053 UART: [state] DebugLocked = No
2,810,785 UART: [state] WD Timer not started. Device not locked for debugging
2,811,927 UART: [kat] SHA2-256
3,615,477 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,619,581 UART: [kat] ++
3,619,733 UART: [kat] sha1
3,624,087 UART: [kat] SHA2-256
3,626,027 UART: [kat] SHA2-384
3,628,906 UART: [kat] SHA2-512-ACC
3,630,806 UART: [kat] ECC-384
3,640,385 UART: [kat] HMAC-384Kdf
3,645,073 UART: [kat] LMS
3,893,385 UART: [kat] --
3,894,251 UART: [update-reset] ++
3,894,562 UART: Failed To Get Mailbox Txn
3,895,617 UART: ROM Non-Fatal Error: 0x01040004
3,896,292 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,896,495 UART: [state] Locking Datavault
3,897,379 UART: [state] Locking PCR0, PCR1 and PCR31
3,897,983 UART: [state] Locking ICCM
3,898,607 UART: [exit] Launching FMC @ 0x40000000
3,903,904 UART:
3,903,920 UART: Running Caliptra FMC ...
3,904,328 UART:
3,904,458 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,905,234 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,461 ready_for_fw is high
1,060,461 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,065 >>> mbox cmd response: success
2,621,887 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,627,836 UART:
2,627,852 UART: Running Caliptra FMC ...
2,628,260 UART:
2,628,398 UART: [fmc] Received command: 0x10000004
2,629,135 >>> mbox cmd response: success
3,604,374 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,609,799 UART:
3,609,815 UART: Running Caliptra FMC ...
3,610,223 UART:
3,610,353 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,611,129 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Unprovisioned
85,437 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,300 UART: [kat] SHA2-256
890,850 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,954 UART: [kat] ++
895,106 UART: [kat] sha1
899,200 UART: [kat] SHA2-256
901,140 UART: [kat] SHA2-384
903,899 UART: [kat] SHA2-512-ACC
905,800 UART: [kat] ECC-384
915,685 UART: [kat] HMAC-384Kdf
920,327 UART: [kat] LMS
1,168,639 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,184 UART: [fht] FHT @ 0x50003400
1,172,838 UART: [idev] ++
1,173,006 UART: [idev] CDI.KEYID = 6
1,173,367 UART: [idev] SUBJECT.KEYID = 7
1,173,792 UART: [idev] UDS.KEYID = 0
1,174,138 ready_for_fw is high
1,174,138 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,739 UART: [idev] Erasing UDS.KEYID = 0
1,199,121 UART: [idev] Sha1 KeyId Algorithm
1,207,987 UART: [idev] --
1,209,154 UART: [ldev] ++
1,209,322 UART: [ldev] CDI.KEYID = 6
1,209,686 UART: [ldev] SUBJECT.KEYID = 5
1,210,113 UART: [ldev] AUTHORITY.KEYID = 7
1,210,576 UART: [ldev] FE.KEYID = 1
1,215,684 UART: [ldev] Erasing FE.KEYID = 1
1,241,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,982 UART: [ldev] --
1,281,303 UART: [fwproc] Wait for Commands...
1,281,944 UART: [fwproc] Recv command 0x46574c44
1,282,677 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,703 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,786 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,177 >>> mbox cmd response: success
2,714,399 UART: [afmc] ++
2,714,567 UART: [afmc] CDI.KEYID = 6
2,714,930 UART: [afmc] SUBJECT.KEYID = 7
2,715,356 UART: [afmc] AUTHORITY.KEYID = 5
2,750,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,880 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,600 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,493 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,186 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,803 UART: [afmc] --
2,793,700 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,793,722 UART: [cold-reset] --
2,794,796 UART: [state] Locking Datavault
2,795,875 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,479 UART: [state] Locking ICCM
2,797,033 UART: [exit] Launching FMC @ 0x40000000
2,802,330 UART:
2,802,346 UART: Running Caliptra FMC ...
2,802,754 UART:
2,802,892 UART: [fmc] Received command: 0x10000004
2,803,629 >>> mbox cmd response: success
2,803,725 UART:
2,803,741 UART: Running Caliptra ROM ...
2,804,149 UART:
2,804,204 UART: [state] CFI Enabled
2,806,886 UART: [state] LifecycleState = Unprovisioned
2,807,541 UART: [state] DebugLocked = No
2,808,071 UART: [state] WD Timer not started. Device not locked for debugging
2,809,257 UART: [kat] SHA2-256
3,612,807 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,911 UART: [kat] ++
3,617,063 UART: [kat] sha1
3,621,141 UART: [kat] SHA2-256
3,623,081 UART: [kat] SHA2-384
3,625,908 UART: [kat] SHA2-512-ACC
3,627,808 UART: [kat] ECC-384
3,637,501 UART: [kat] HMAC-384Kdf
3,642,107 UART: [kat] LMS
3,890,419 UART: [kat] --
3,891,429 UART: [update-reset] ++
3,891,740 UART: Failed To Get Mailbox Txn
3,892,455 UART: ROM Non-Fatal Error: 0x01040004
3,893,130 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,893,395 UART: [state] Locking Datavault
3,894,185 UART: [state] Locking PCR0, PCR1 and PCR31
3,894,789 UART: [state] Locking ICCM
3,895,391 UART: [exit] Launching FMC @ 0x40000000
3,900,688 UART:
3,900,704 UART: Running Caliptra FMC ...
3,901,112 UART:
3,901,242 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,902,018 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,360 ready_for_fw is high
1,059,360 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,140 >>> mbox cmd response: success
2,621,912 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,627,479 UART:
2,627,495 UART: Running Caliptra FMC ...
2,627,903 UART:
2,628,041 UART: [fmc] Received command: 0x10000004
2,628,778 >>> mbox cmd response: success
3,604,864 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,610,331 UART:
3,610,347 UART: Running Caliptra FMC ...
3,610,755 UART:
3,610,885 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,611,661 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
916,130 UART: [kat] HMAC-384Kdf
920,910 UART: [kat] LMS
1,169,222 UART: [kat] --
1,169,889 UART: [cold-reset] ++
1,170,397 UART: [fht] FHT @ 0x50003400
1,173,163 UART: [idev] ++
1,173,331 UART: [idev] CDI.KEYID = 6
1,173,692 UART: [idev] SUBJECT.KEYID = 7
1,174,117 UART: [idev] UDS.KEYID = 0
1,174,463 ready_for_fw is high
1,174,463 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,166 UART: [idev] Erasing UDS.KEYID = 0
1,199,468 UART: [idev] Sha1 KeyId Algorithm
1,208,244 UART: [idev] --
1,209,087 UART: [ldev] ++
1,209,255 UART: [ldev] CDI.KEYID = 6
1,209,619 UART: [ldev] SUBJECT.KEYID = 5
1,210,046 UART: [ldev] AUTHORITY.KEYID = 7
1,210,509 UART: [ldev] FE.KEYID = 1
1,215,549 UART: [ldev] Erasing FE.KEYID = 1
1,242,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,691 UART: [ldev] --
1,281,918 UART: [fwproc] Wait for Commands...
1,282,617 UART: [fwproc] Recv command 0x46574c44
1,283,350 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,116 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,199 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,514 >>> mbox cmd response: success
2,714,658 UART: [afmc] ++
2,714,826 UART: [afmc] CDI.KEYID = 6
2,715,189 UART: [afmc] SUBJECT.KEYID = 7
2,715,615 UART: [afmc] AUTHORITY.KEYID = 5
2,751,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,101 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,821 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,714 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,407 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,236 UART: [afmc] --
2,795,149 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,795,171 UART: [cold-reset] --
2,795,847 UART: [state] Locking Datavault
2,796,978 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,582 UART: [state] Locking ICCM
2,798,090 UART: [exit] Launching FMC @ 0x40000000
2,803,387 UART:
2,803,403 UART: Running Caliptra FMC ...
2,803,811 UART:
2,803,949 UART: [fmc] Received command: 0x10000004
2,804,686 >>> mbox cmd response: success
2,804,782 UART:
2,804,798 UART: Running Caliptra ROM ...
2,805,206 UART:
2,805,348 UART: [state] CFI Enabled
2,807,666 UART: [state] LifecycleState = Unprovisioned
2,808,321 UART: [state] DebugLocked = No
2,808,811 UART: [state] WD Timer not started. Device not locked for debugging
2,810,009 UART: [kat] SHA2-256
3,613,559 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,617,663 UART: [kat] ++
3,617,815 UART: [kat] sha1
3,622,021 UART: [kat] SHA2-256
3,623,961 UART: [kat] SHA2-384
3,626,562 UART: [kat] SHA2-512-ACC
3,628,462 UART: [kat] ECC-384
3,638,371 UART: [kat] HMAC-384Kdf
3,642,907 UART: [kat] LMS
3,891,219 UART: [kat] --
3,892,231 UART: [update-reset] ++
3,892,542 UART: Failed To Get Mailbox Txn
3,893,343 UART: ROM Non-Fatal Error: 0x01040004
3,894,018 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,894,309 UART: [state] Locking Datavault
3,895,051 UART: [state] Locking PCR0, PCR1 and PCR31
3,895,655 UART: [state] Locking ICCM
3,896,239 UART: [exit] Launching FMC @ 0x40000000
3,901,536 UART:
3,901,552 UART: Running Caliptra FMC ...
3,901,960 UART:
3,902,090 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,902,866 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,139 ready_for_fw is high
1,059,139 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,847 >>> mbox cmd response: success
2,623,387 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,629,512 UART:
2,629,528 UART: Running Caliptra FMC ...
2,629,936 UART:
2,630,074 UART: [fmc] Received command: 0x10000004
2,630,811 >>> mbox cmd response: success
3,605,936 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,611,101 UART:
3,611,117 UART: Running Caliptra FMC ...
3,611,525 UART:
3,611,655 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,612,431 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,122 UART: [kat] ++
895,274 UART: [kat] sha1
899,362 UART: [kat] SHA2-256
901,302 UART: [kat] SHA2-384
904,199 UART: [kat] SHA2-512-ACC
906,100 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,170,552 UART: [cold-reset] ++
1,170,898 UART: [fht] FHT @ 0x50003400
1,173,598 UART: [idev] ++
1,173,766 UART: [idev] CDI.KEYID = 6
1,174,127 UART: [idev] SUBJECT.KEYID = 7
1,174,552 UART: [idev] UDS.KEYID = 0
1,174,898 ready_for_fw is high
1,174,898 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,509 UART: [idev] Erasing UDS.KEYID = 0
1,199,221 UART: [idev] Sha1 KeyId Algorithm
1,208,119 UART: [idev] --
1,209,288 UART: [ldev] ++
1,209,456 UART: [ldev] CDI.KEYID = 6
1,209,820 UART: [ldev] SUBJECT.KEYID = 5
1,210,247 UART: [ldev] AUTHORITY.KEYID = 7
1,210,710 UART: [ldev] FE.KEYID = 1
1,215,872 UART: [ldev] Erasing FE.KEYID = 1
1,242,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,040 UART: [ldev] --
1,281,395 UART: [fwproc] Wait for Commands...
1,282,080 UART: [fwproc] Recv command 0x46574c44
1,282,813 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,177 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,260 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,477 >>> mbox cmd response: success
2,713,651 UART: [afmc] ++
2,713,819 UART: [afmc] CDI.KEYID = 6
2,714,182 UART: [afmc] SUBJECT.KEYID = 7
2,714,608 UART: [afmc] AUTHORITY.KEYID = 5
2,749,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,960 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,680 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,573 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,266 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,273 UART: [afmc] --
2,793,080 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,793,102 UART: [cold-reset] --
2,793,980 UART: [state] Locking Datavault
2,795,181 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,785 UART: [state] Locking ICCM
2,796,211 UART: [exit] Launching FMC @ 0x40000000
2,801,508 UART:
2,801,524 UART: Running Caliptra FMC ...
2,801,932 UART:
2,802,070 UART: [fmc] Received command: 0x10000004
2,802,807 >>> mbox cmd response: success
2,802,903 UART:
2,802,919 UART: Running Caliptra ROM ...
2,803,327 UART:
2,803,382 UART: [state] CFI Enabled
2,805,812 UART: [state] LifecycleState = Unprovisioned
2,806,467 UART: [state] DebugLocked = No
2,806,993 UART: [state] WD Timer not started. Device not locked for debugging
2,808,109 UART: [kat] SHA2-256
3,611,659 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,615,763 UART: [kat] ++
3,615,915 UART: [kat] sha1
3,620,199 UART: [kat] SHA2-256
3,622,139 UART: [kat] SHA2-384
3,624,878 UART: [kat] SHA2-512-ACC
3,626,778 UART: [kat] ECC-384
3,636,671 UART: [kat] HMAC-384Kdf
3,641,191 UART: [kat] LMS
3,889,503 UART: [kat] --
3,890,469 UART: [update-reset] ++
3,890,780 UART: Failed To Get Mailbox Txn
3,891,579 UART: ROM Non-Fatal Error: 0x01040004
3,892,254 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,892,545 UART: [state] Locking Datavault
3,893,559 UART: [state] Locking PCR0, PCR1 and PCR31
3,894,163 UART: [state] Locking ICCM
3,894,683 UART: [exit] Launching FMC @ 0x40000000
3,899,980 UART:
3,899,996 UART: Running Caliptra FMC ...
3,900,404 UART:
3,900,534 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,901,310 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,524 ready_for_fw is high
1,058,524 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,832 >>> mbox cmd response: success
2,621,224 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,627,485 UART:
2,627,501 UART: Running Caliptra FMC ...
2,627,909 UART:
2,628,047 UART: [fmc] Received command: 0x10000004
2,628,784 >>> mbox cmd response: success
3,603,364 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,608,751 UART:
3,608,767 UART: Running Caliptra FMC ...
3,609,175 UART:
3,609,305 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,610,081 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,913 UART: [state] LifecycleState = Unprovisioned
86,568 UART: [state] DebugLocked = No
87,234 UART: [state] WD Timer not started. Device not locked for debugging
88,483 UART: [kat] SHA2-256
892,033 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,137 UART: [kat] ++
896,289 UART: [kat] sha1
900,595 UART: [kat] SHA2-256
902,535 UART: [kat] SHA2-384
905,234 UART: [kat] SHA2-512-ACC
907,135 UART: [kat] ECC-384
916,756 UART: [kat] HMAC-384Kdf
921,258 UART: [kat] LMS
1,169,570 UART: [kat] --
1,170,385 UART: [cold-reset] ++
1,170,715 UART: [fht] FHT @ 0x50003400
1,173,521 UART: [idev] ++
1,173,689 UART: [idev] CDI.KEYID = 6
1,174,050 UART: [idev] SUBJECT.KEYID = 7
1,174,475 UART: [idev] UDS.KEYID = 0
1,174,821 ready_for_fw is high
1,174,821 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,199,554 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,453 UART: [ldev] ++
1,209,621 UART: [ldev] CDI.KEYID = 6
1,209,985 UART: [ldev] SUBJECT.KEYID = 5
1,210,412 UART: [ldev] AUTHORITY.KEYID = 7
1,210,875 UART: [ldev] FE.KEYID = 1
1,216,201 UART: [ldev] Erasing FE.KEYID = 1
1,242,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,107 UART: [ldev] --
1,281,458 UART: [fwproc] Wait for Commands...
1,282,181 UART: [fwproc] Recv command 0x46574c44
1,282,914 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,468 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,551 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,946 >>> mbox cmd response: success
2,715,152 UART: [afmc] ++
2,715,320 UART: [afmc] CDI.KEYID = 6
2,715,683 UART: [afmc] SUBJECT.KEYID = 7
2,716,109 UART: [afmc] AUTHORITY.KEYID = 5
2,752,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,129 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,849 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,742 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,435 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,352 UART: [afmc] --
2,795,225 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,795,247 UART: [cold-reset] --
2,795,979 UART: [state] Locking Datavault
2,797,264 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,868 UART: [state] Locking ICCM
2,798,294 UART: [exit] Launching FMC @ 0x40000000
2,803,591 UART:
2,803,607 UART: Running Caliptra FMC ...
2,804,015 UART:
2,804,153 UART: [fmc] Received command: 0x10000004
2,804,890 >>> mbox cmd response: success
2,804,986 UART:
2,805,002 UART: Running Caliptra ROM ...
2,805,410 UART:
2,805,552 UART: [state] CFI Enabled
2,808,648 UART: [state] LifecycleState = Unprovisioned
2,809,303 UART: [state] DebugLocked = No
2,809,875 UART: [state] WD Timer not started. Device not locked for debugging
2,811,199 UART: [kat] SHA2-256
3,614,749 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,618,853 UART: [kat] ++
3,619,005 UART: [kat] sha1
3,623,233 UART: [kat] SHA2-256
3,625,173 UART: [kat] SHA2-384
3,628,002 UART: [kat] SHA2-512-ACC
3,629,902 UART: [kat] ECC-384
3,640,029 UART: [kat] HMAC-384Kdf
3,644,539 UART: [kat] LMS
3,892,851 UART: [kat] --
3,893,585 UART: [update-reset] ++
3,893,896 UART: Failed To Get Mailbox Txn
3,894,655 UART: ROM Non-Fatal Error: 0x01040004
3,895,330 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,895,663 UART: [state] Locking Datavault
3,896,243 UART: [state] Locking PCR0, PCR1 and PCR31
3,896,847 UART: [state] Locking ICCM
3,897,315 UART: [exit] Launching FMC @ 0x40000000
3,902,612 UART:
3,902,628 UART: Running Caliptra FMC ...
3,903,036 UART:
3,903,166 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,903,942 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,095 ready_for_fw is high
1,060,095 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,415 >>> mbox cmd response: success
2,620,903 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,627,246 UART:
2,627,262 UART: Running Caliptra FMC ...
2,627,670 UART:
2,627,808 UART: [fmc] Received command: 0x10000004
2,628,545 >>> mbox cmd response: success
3,604,270 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,609,703 UART:
3,609,719 UART: Running Caliptra FMC ...
3,610,127 UART:
3,610,257 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,611,033 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,208 UART:
192,567 UART: Running Caliptra ROM ...
193,775 UART:
193,933 UART: [state] CFI Enabled
265,019 UART: [state] LifecycleState = Unprovisioned
266,976 UART: [state] DebugLocked = No
268,166 UART: [state] WD Timer not started. Device not locked for debugging
271,772 UART: [kat] SHA2-256
451,366 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,175 UART: [kat] ++
462,660 UART: [kat] sha1
474,048 UART: [kat] SHA2-256
476,695 UART: [kat] SHA2-384
483,621 UART: [kat] SHA2-512-ACC
485,993 UART: [kat] ECC-384
2,947,915 UART: [kat] HMAC-384Kdf
2,970,367 UART: [kat] LMS
3,446,857 UART: [kat] --
3,450,570 UART: [cold-reset] ++
3,452,716 UART: [fht] FHT @ 0x50003400
3,463,484 UART: [idev] ++
3,464,123 UART: [idev] CDI.KEYID = 6
3,465,007 UART: [idev] SUBJECT.KEYID = 7
3,466,270 UART: [idev] UDS.KEYID = 0
3,467,266 ready_for_fw is high
3,467,466 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,605,622 UART: [idev] Erasing UDS.KEYID = 0
5,984,895 UART: [idev] Sha1 KeyId Algorithm
6,009,626 UART: [idev] --
6,014,841 UART: [ldev] ++
6,015,436 UART: [ldev] CDI.KEYID = 6
6,016,325 UART: [ldev] SUBJECT.KEYID = 5
6,017,543 UART: [ldev] AUTHORITY.KEYID = 7
6,018,787 UART: [ldev] FE.KEYID = 1
6,054,997 UART: [ldev] Erasing FE.KEYID = 1
8,564,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,083 UART: [ldev] --
10,373,164 UART: [fwproc] Wait for Commands...
10,374,943 UART: [fwproc] Recv command 0x46574c44
10,376,985 UART: [fwproc] Recv'd Img size: 109820 bytes
13,754,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,828,707 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,871,223 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,199,254 >>> mbox cmd response: success
14,203,099 UART: [afmc] ++
14,203,698 UART: [afmc] CDI.KEYID = 6
14,204,725 UART: [afmc] SUBJECT.KEYID = 7
14,205,886 UART: [afmc] AUTHORITY.KEYID = 5
16,745,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,489,928 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,492,160 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,507,980 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,523,945 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,539,586 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,562,851 UART: [afmc] --
18,567,334 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,568,370 UART: [cold-reset] --
18,569,680 UART: [state] Locking Datavault
18,573,057 UART: [state] Locking PCR0, PCR1 and PCR31
18,574,825 UART: [state] Locking ICCM
18,576,227 UART: [exit] Launching FMC @ 0x40000000
18,584,572 UART:
18,584,812 UART: Running Caliptra FMC ...
18,585,919 UART:
18,586,086 UART: [fmc] Received command: 0x1000000B
18,587,547 UART:
18,587,711 UART: Running Caliptra ROM ...
18,588,813 UART:
18,588,974 UART: [state] CFI Enabled
18,648,299 UART: [state] LifecycleState = Unprovisioned
18,650,228 UART: [state] DebugLocked = No
18,652,967 UART: [state] WD Timer not started. Device not locked for debugging
18,657,209 UART: [kat] SHA2-256
18,836,833 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,847,627 UART: [kat] ++
18,848,168 UART: [kat] sha1
18,859,009 UART: [kat] SHA2-256
18,861,703 UART: [kat] SHA2-384
18,868,392 UART: [kat] SHA2-512-ACC
18,870,781 UART: [kat] ECC-384
21,335,777 UART: [kat] HMAC-384Kdf
21,357,406 UART: [kat] LMS
21,833,902 UART: [kat] --
21,838,096 UART: [update-reset] ++
21,839,023 UART: Invalid command 0x1000000b recv
21,841,927 UART: ROM Non-Fatal Error: 0x01040003
21,844,420 UART: [state] Locking Datavault
21,849,105 UART: [state] Locking PCR0, PCR1 and PCR31
21,850,875 UART: [state] Locking ICCM
21,852,381 UART: [exit] Launching FMC @ 0x40000000
21,860,748 UART:
21,860,997 UART: Running Caliptra FMC ...
21,862,061 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,461,072 ready_for_fw is high
3,461,567 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,096,034 >>> mbox cmd response: success
18,373,169 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,389,213 UART:
18,389,561 UART: Running Caliptra FMC ...
18,390,742 UART:
18,390,908 UART: [fmc] Received command: 0x1000000B
21,660,866 UART:
21,661,202 UART: Running Caliptra FMC ...
21,662,289 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,475 UART:
192,835 UART: Running Caliptra ROM ...
193,966 UART:
603,763 UART: [state] CFI Enabled
616,238 UART: [state] LifecycleState = Unprovisioned
618,240 UART: [state] DebugLocked = No
621,126 UART: [state] WD Timer not started. Device not locked for debugging
625,293 UART: [kat] SHA2-256
804,960 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,758 UART: [kat] ++
816,234 UART: [kat] sha1
826,185 UART: [kat] SHA2-256
828,915 UART: [kat] SHA2-384
835,260 UART: [kat] SHA2-512-ACC
837,628 UART: [kat] ECC-384
3,279,555 UART: [kat] HMAC-384Kdf
3,291,725 UART: [kat] LMS
3,768,180 UART: [kat] --
3,771,313 UART: [cold-reset] ++
3,773,740 UART: [fht] FHT @ 0x50003400
3,785,567 UART: [idev] ++
3,786,149 UART: [idev] CDI.KEYID = 6
3,787,056 UART: [idev] SUBJECT.KEYID = 7
3,788,306 UART: [idev] UDS.KEYID = 0
3,789,355 ready_for_fw is high
3,789,556 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,927,517 UART: [idev] Erasing UDS.KEYID = 0
6,265,529 UART: [idev] Sha1 KeyId Algorithm
6,289,835 UART: [idev] --
6,294,911 UART: [ldev] ++
6,295,521 UART: [ldev] CDI.KEYID = 6
6,296,438 UART: [ldev] SUBJECT.KEYID = 5
6,297,602 UART: [ldev] AUTHORITY.KEYID = 7
6,298,888 UART: [ldev] FE.KEYID = 1
6,309,531 UART: [ldev] Erasing FE.KEYID = 1
8,788,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,642 UART: [ldev] --
10,580,689 UART: [fwproc] Wait for Commands...
10,582,836 UART: [fwproc] Recv command 0x46574c44
10,584,816 UART: [fwproc] Recv'd Img size: 109820 bytes
13,959,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,040,098 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,082,594 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,410,095 >>> mbox cmd response: success
14,414,605 UART: [afmc] ++
14,415,215 UART: [afmc] CDI.KEYID = 6
14,416,125 UART: [afmc] SUBJECT.KEYID = 7
14,417,342 UART: [afmc] AUTHORITY.KEYID = 5
16,924,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,645,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,647,409 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,663,229 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,679,240 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,694,902 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,719,380 UART: [afmc] --
18,723,035 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,723,758 UART: [cold-reset] --
18,728,458 UART: [state] Locking Datavault
18,733,987 UART: [state] Locking PCR0, PCR1 and PCR31
18,735,687 UART: [state] Locking ICCM
18,738,214 UART: [exit] Launching FMC @ 0x40000000
18,746,605 UART:
18,746,840 UART: Running Caliptra FMC ...
18,747,939 UART:
18,748,099 UART: [fmc] Received command: 0x1000000B
18,749,585 UART:
18,749,739 UART: Running Caliptra ROM ...
18,750,832 UART:
18,750,999 UART: [state] CFI Enabled
18,765,741 UART: [state] LifecycleState = Unprovisioned
18,767,617 UART: [state] DebugLocked = No
18,769,423 UART: [state] WD Timer not started. Device not locked for debugging
18,772,847 UART: [kat] SHA2-256
18,952,332 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,963,124 UART: [kat] ++
18,963,579 UART: [kat] sha1
18,974,083 UART: [kat] SHA2-256
18,976,825 UART: [kat] SHA2-384
18,983,292 UART: [kat] SHA2-512-ACC
18,985,645 UART: [kat] ECC-384
21,427,839 UART: [kat] HMAC-384Kdf
21,441,056 UART: [kat] LMS
21,917,507 UART: [kat] --
21,920,691 UART: [update-reset] ++
21,921,613 UART: Invalid command 0x1000000b recv
21,924,383 UART: ROM Non-Fatal Error: 0x01040003
21,927,827 UART: [state] Locking Datavault
21,931,187 UART: [state] Locking PCR0, PCR1 and PCR31
21,932,867 UART: [state] Locking ICCM
21,934,537 UART: [exit] Launching FMC @ 0x40000000
21,942,897 UART:
21,943,143 UART: Running Caliptra FMC ...
21,944,285 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,780,729 ready_for_fw is high
3,781,107 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,300,575 >>> mbox cmd response: success
18,543,489 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,561,226 UART:
18,561,565 UART: Running Caliptra FMC ...
18,562,833 UART:
18,563,001 UART: [fmc] Received command: 0x1000000B
21,742,606 UART:
21,742,952 UART: Running Caliptra FMC ...
21,744,083 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,132 UART: [kat] ++
895,284 UART: [kat] sha1
899,440 UART: [kat] SHA2-256
901,380 UART: [kat] SHA2-384
904,215 UART: [kat] SHA2-512-ACC
906,116 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,653 UART: [kat] LMS
1,168,965 UART: [kat] --
1,169,738 UART: [cold-reset] ++
1,170,172 UART: [fht] FHT @ 0x50003400
1,172,698 UART: [idev] ++
1,172,866 UART: [idev] CDI.KEYID = 6
1,173,227 UART: [idev] SUBJECT.KEYID = 7
1,173,652 UART: [idev] UDS.KEYID = 0
1,173,998 ready_for_fw is high
1,173,998 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,403 UART: [idev] Erasing UDS.KEYID = 0
1,198,879 UART: [idev] Sha1 KeyId Algorithm
1,207,919 UART: [idev] --
1,208,858 UART: [ldev] ++
1,209,026 UART: [ldev] CDI.KEYID = 6
1,209,390 UART: [ldev] SUBJECT.KEYID = 5
1,209,817 UART: [ldev] AUTHORITY.KEYID = 7
1,210,280 UART: [ldev] FE.KEYID = 1
1,215,498 UART: [ldev] Erasing FE.KEYID = 1
1,240,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,750 UART: [ldev] --
1,280,195 UART: [fwproc] Wait for Commands...
1,280,768 UART: [fwproc] Recv command 0x46574c44
1,281,501 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,617 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,700 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,019 >>> mbox cmd response: success
2,712,171 UART: [afmc] ++
2,712,339 UART: [afmc] CDI.KEYID = 6
2,712,702 UART: [afmc] SUBJECT.KEYID = 7
2,713,128 UART: [afmc] AUTHORITY.KEYID = 5
2,748,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,764,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,765,676 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,396 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,289 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,782,982 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,790,813 UART: [afmc] --
2,791,696 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,791,718 UART: [cold-reset] --
2,792,694 UART: [state] Locking Datavault
2,793,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,794,353 UART: [state] Locking ICCM
2,794,789 UART: [exit] Launching FMC @ 0x40000000
2,800,086 UART:
2,800,102 UART: Running Caliptra FMC ...
2,800,510 UART:
2,800,648 UART: [fmc] Received command: 0x1000000B
2,801,480 UART:
2,801,496 UART: Running Caliptra ROM ...
2,801,904 UART:
2,801,959 UART: [state] CFI Enabled
2,804,787 UART: [state] LifecycleState = Unprovisioned
2,805,442 UART: [state] DebugLocked = No
2,806,092 UART: [state] WD Timer not started. Device not locked for debugging
2,807,236 UART: [kat] SHA2-256
3,610,786 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,614,890 UART: [kat] ++
3,615,042 UART: [kat] sha1
3,619,324 UART: [kat] SHA2-256
3,621,264 UART: [kat] SHA2-384
3,624,005 UART: [kat] SHA2-512-ACC
3,625,905 UART: [kat] ECC-384
3,635,194 UART: [kat] HMAC-384Kdf
3,639,730 UART: [kat] LMS
3,888,042 UART: [kat] --
3,889,016 UART: [update-reset] ++
3,889,333 UART: Invalid command 0x1000000b recv
3,890,453 UART: ROM Non-Fatal Error: 0x01040003
3,891,347 UART: [state] Locking Datavault
3,892,139 UART: [state] Locking PCR0, PCR1 and PCR31
3,892,743 UART: [state] Locking ICCM
3,893,389 UART: [exit] Launching FMC @ 0x40000000
3,898,686 UART:
3,898,702 UART: Running Caliptra FMC ...
3,899,110 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,744 ready_for_fw is high
1,058,744 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,890 >>> mbox cmd response: success
2,621,872 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,627,905 UART:
2,627,921 UART: Running Caliptra FMC ...
2,628,329 UART:
2,628,467 UART: [fmc] Received command: 0x1000000B
3,610,388 UART:
3,610,404 UART: Running Caliptra FMC ...
3,610,812 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,553 UART: [kat] ++
895,705 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,216 UART: [kat] HMAC-384Kdf
920,882 UART: [kat] LMS
1,169,194 UART: [kat] --
1,169,967 UART: [cold-reset] ++
1,170,313 UART: [fht] FHT @ 0x50003400
1,172,807 UART: [idev] ++
1,172,975 UART: [idev] CDI.KEYID = 6
1,173,336 UART: [idev] SUBJECT.KEYID = 7
1,173,761 UART: [idev] UDS.KEYID = 0
1,174,107 ready_for_fw is high
1,174,107 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,598 UART: [idev] Erasing UDS.KEYID = 0
1,198,472 UART: [idev] Sha1 KeyId Algorithm
1,207,274 UART: [idev] --
1,208,405 UART: [ldev] ++
1,208,573 UART: [ldev] CDI.KEYID = 6
1,208,937 UART: [ldev] SUBJECT.KEYID = 5
1,209,364 UART: [ldev] AUTHORITY.KEYID = 7
1,209,827 UART: [ldev] FE.KEYID = 1
1,215,425 UART: [ldev] Erasing FE.KEYID = 1
1,241,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,227 UART: [ldev] --
1,280,632 UART: [fwproc] Wait for Commands...
1,281,239 UART: [fwproc] Recv command 0x46574c44
1,281,972 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,828 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,911 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,188 >>> mbox cmd response: success
2,712,434 UART: [afmc] ++
2,712,602 UART: [afmc] CDI.KEYID = 6
2,712,965 UART: [afmc] SUBJECT.KEYID = 7
2,713,391 UART: [afmc] AUTHORITY.KEYID = 5
2,749,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,007 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,727 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,620 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,313 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,080 UART: [afmc] --
2,791,963 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,791,985 UART: [cold-reset] --
2,792,867 UART: [state] Locking Datavault
2,794,180 UART: [state] Locking PCR0, PCR1 and PCR31
2,794,784 UART: [state] Locking ICCM
2,795,234 UART: [exit] Launching FMC @ 0x40000000
2,800,531 UART:
2,800,547 UART: Running Caliptra FMC ...
2,800,955 UART:
2,801,093 UART: [fmc] Received command: 0x1000000B
2,801,925 UART:
2,801,941 UART: Running Caliptra ROM ...
2,802,349 UART:
2,802,491 UART: [state] CFI Enabled
2,805,409 UART: [state] LifecycleState = Unprovisioned
2,806,064 UART: [state] DebugLocked = No
2,806,778 UART: [state] WD Timer not started. Device not locked for debugging
2,807,914 UART: [kat] SHA2-256
3,611,464 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,615,568 UART: [kat] ++
3,615,720 UART: [kat] sha1
3,619,804 UART: [kat] SHA2-256
3,621,744 UART: [kat] SHA2-384
3,624,455 UART: [kat] SHA2-512-ACC
3,626,355 UART: [kat] ECC-384
3,635,974 UART: [kat] HMAC-384Kdf
3,640,540 UART: [kat] LMS
3,888,852 UART: [kat] --
3,889,796 UART: [update-reset] ++
3,890,113 UART: Invalid command 0x1000000b recv
3,891,215 UART: ROM Non-Fatal Error: 0x01040003
3,892,043 UART: [state] Locking Datavault
3,892,909 UART: [state] Locking PCR0, PCR1 and PCR31
3,893,513 UART: [state] Locking ICCM
3,893,979 UART: [exit] Launching FMC @ 0x40000000
3,899,276 UART:
3,899,292 UART: Running Caliptra FMC ...
3,899,700 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,135 ready_for_fw is high
1,060,135 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,101 >>> mbox cmd response: success
2,620,741 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,627,238 UART:
2,627,254 UART: Running Caliptra FMC ...
2,627,662 UART:
2,627,800 UART: [fmc] Received command: 0x1000000B
3,609,340 UART:
3,609,356 UART: Running Caliptra FMC ...
3,609,764 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,300 UART: [kat] ++
895,452 UART: [kat] sha1
899,520 UART: [kat] SHA2-256
901,460 UART: [kat] SHA2-384
904,149 UART: [kat] SHA2-512-ACC
906,050 UART: [kat] ECC-384
915,593 UART: [kat] HMAC-384Kdf
920,155 UART: [kat] LMS
1,168,467 UART: [kat] --
1,169,118 UART: [cold-reset] ++
1,169,532 UART: [fht] FHT @ 0x50003400
1,172,060 UART: [idev] ++
1,172,228 UART: [idev] CDI.KEYID = 6
1,172,589 UART: [idev] SUBJECT.KEYID = 7
1,173,014 UART: [idev] UDS.KEYID = 0
1,173,360 ready_for_fw is high
1,173,360 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,180,855 UART: [idev] Erasing UDS.KEYID = 0
1,197,711 UART: [idev] Sha1 KeyId Algorithm
1,206,507 UART: [idev] --
1,207,578 UART: [ldev] ++
1,207,746 UART: [ldev] CDI.KEYID = 6
1,208,110 UART: [ldev] SUBJECT.KEYID = 5
1,208,537 UART: [ldev] AUTHORITY.KEYID = 7
1,209,000 UART: [ldev] FE.KEYID = 1
1,214,562 UART: [ldev] Erasing FE.KEYID = 1
1,240,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,906 UART: [ldev] --
1,280,133 UART: [fwproc] Wait for Commands...
1,280,908 UART: [fwproc] Recv command 0x46574c44
1,281,641 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,903 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,986 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,331 >>> mbox cmd response: success
2,713,357 UART: [afmc] ++
2,713,525 UART: [afmc] CDI.KEYID = 6
2,713,888 UART: [afmc] SUBJECT.KEYID = 7
2,714,314 UART: [afmc] AUTHORITY.KEYID = 5
2,749,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,244 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,964 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,857 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,550 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,441 UART: [afmc] --
2,793,262 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,793,284 UART: [cold-reset] --
2,794,156 UART: [state] Locking Datavault
2,795,301 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,905 UART: [state] Locking ICCM
2,796,445 UART: [exit] Launching FMC @ 0x40000000
2,801,742 UART:
2,801,758 UART: Running Caliptra FMC ...
2,802,166 UART:
2,802,304 UART: [fmc] Received command: 0x1000000B
2,803,136 UART:
2,803,152 UART: Running Caliptra ROM ...
2,803,560 UART:
2,803,615 UART: [state] CFI Enabled
2,806,161 UART: [state] LifecycleState = Unprovisioned
2,806,816 UART: [state] DebugLocked = No
2,807,346 UART: [state] WD Timer not started. Device not locked for debugging
2,808,662 UART: [kat] SHA2-256
3,612,212 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,316 UART: [kat] ++
3,616,468 UART: [kat] sha1
3,620,664 UART: [kat] SHA2-256
3,622,604 UART: [kat] SHA2-384
3,625,503 UART: [kat] SHA2-512-ACC
3,627,403 UART: [kat] ECC-384
3,637,212 UART: [kat] HMAC-384Kdf
3,641,716 UART: [kat] LMS
3,890,028 UART: [kat] --
3,890,934 UART: [update-reset] ++
3,891,251 UART: Invalid command 0x1000000b recv
3,892,313 UART: ROM Non-Fatal Error: 0x01040003
3,893,255 UART: [state] Locking Datavault
3,893,899 UART: [state] Locking PCR0, PCR1 and PCR31
3,894,503 UART: [state] Locking ICCM
3,894,925 UART: [exit] Launching FMC @ 0x40000000
3,900,222 UART:
3,900,238 UART: Running Caliptra FMC ...
3,900,646 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,578 ready_for_fw is high
1,059,578 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,024 >>> mbox cmd response: success
2,622,718 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,629,043 UART:
2,629,059 UART: Running Caliptra FMC ...
2,629,467 UART:
2,629,605 UART: [fmc] Received command: 0x1000000B
3,611,598 UART:
3,611,614 UART: Running Caliptra FMC ...
3,612,022 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,579 UART: [kat] SHA2-256
891,129 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
916,124 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,169,831 UART: [cold-reset] ++
1,170,267 UART: [fht] FHT @ 0x50003400
1,172,703 UART: [idev] ++
1,172,871 UART: [idev] CDI.KEYID = 6
1,173,232 UART: [idev] SUBJECT.KEYID = 7
1,173,657 UART: [idev] UDS.KEYID = 0
1,174,003 ready_for_fw is high
1,174,003 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,256 UART: [idev] Erasing UDS.KEYID = 0
1,198,860 UART: [idev] Sha1 KeyId Algorithm
1,207,620 UART: [idev] --
1,208,671 UART: [ldev] ++
1,208,839 UART: [ldev] CDI.KEYID = 6
1,209,203 UART: [ldev] SUBJECT.KEYID = 5
1,209,630 UART: [ldev] AUTHORITY.KEYID = 7
1,210,093 UART: [ldev] FE.KEYID = 1
1,215,581 UART: [ldev] Erasing FE.KEYID = 1
1,241,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,653 UART: [ldev] --
1,280,996 UART: [fwproc] Wait for Commands...
1,281,757 UART: [fwproc] Recv command 0x46574c44
1,282,490 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,288 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,371 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,772 >>> mbox cmd response: success
2,713,836 UART: [afmc] ++
2,714,004 UART: [afmc] CDI.KEYID = 6
2,714,367 UART: [afmc] SUBJECT.KEYID = 7
2,714,793 UART: [afmc] AUTHORITY.KEYID = 5
2,750,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,671 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,391 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,284 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,977 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,754 UART: [afmc] --
2,793,625 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,793,647 UART: [cold-reset] --
2,794,437 UART: [state] Locking Datavault
2,795,682 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,286 UART: [state] Locking ICCM
2,796,912 UART: [exit] Launching FMC @ 0x40000000
2,802,209 UART:
2,802,225 UART: Running Caliptra FMC ...
2,802,633 UART:
2,802,771 UART: [fmc] Received command: 0x1000000B
2,803,603 UART:
2,803,619 UART: Running Caliptra ROM ...
2,804,027 UART:
2,804,169 UART: [state] CFI Enabled
2,807,061 UART: [state] LifecycleState = Unprovisioned
2,807,716 UART: [state] DebugLocked = No
2,808,294 UART: [state] WD Timer not started. Device not locked for debugging
2,809,490 UART: [kat] SHA2-256
3,613,040 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,617,144 UART: [kat] ++
3,617,296 UART: [kat] sha1
3,621,618 UART: [kat] SHA2-256
3,623,558 UART: [kat] SHA2-384
3,626,203 UART: [kat] SHA2-512-ACC
3,628,103 UART: [kat] ECC-384
3,637,976 UART: [kat] HMAC-384Kdf
3,642,408 UART: [kat] LMS
3,890,720 UART: [kat] --
3,891,822 UART: [update-reset] ++
3,892,139 UART: Invalid command 0x1000000b recv
3,893,285 UART: ROM Non-Fatal Error: 0x01040003
3,894,277 UART: [state] Locking Datavault
3,895,027 UART: [state] Locking PCR0, PCR1 and PCR31
3,895,631 UART: [state] Locking ICCM
3,896,073 UART: [exit] Launching FMC @ 0x40000000
3,901,370 UART:
3,901,386 UART: Running Caliptra FMC ...
3,901,794 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,209 ready_for_fw is high
1,059,209 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,641 >>> mbox cmd response: success
2,623,445 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,629,352 UART:
2,629,368 UART: Running Caliptra FMC ...
2,629,776 UART:
2,629,914 UART: [fmc] Received command: 0x1000000B
3,611,770 UART:
3,611,786 UART: Running Caliptra FMC ...
3,612,194 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,891 UART: [kat] SHA2-512-ACC
906,792 UART: [kat] ECC-384
916,789 UART: [kat] HMAC-384Kdf
921,359 UART: [kat] LMS
1,169,671 UART: [kat] --
1,170,502 UART: [cold-reset] ++
1,170,964 UART: [fht] FHT @ 0x50003400
1,173,656 UART: [idev] ++
1,173,824 UART: [idev] CDI.KEYID = 6
1,174,185 UART: [idev] SUBJECT.KEYID = 7
1,174,610 UART: [idev] UDS.KEYID = 0
1,174,956 ready_for_fw is high
1,174,956 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,983 UART: [idev] Erasing UDS.KEYID = 0
1,198,999 UART: [idev] Sha1 KeyId Algorithm
1,207,845 UART: [idev] --
1,208,938 UART: [ldev] ++
1,209,106 UART: [ldev] CDI.KEYID = 6
1,209,470 UART: [ldev] SUBJECT.KEYID = 5
1,209,897 UART: [ldev] AUTHORITY.KEYID = 7
1,210,360 UART: [ldev] FE.KEYID = 1
1,215,264 UART: [ldev] Erasing FE.KEYID = 1
1,241,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,928 UART: [ldev] --
1,281,299 UART: [fwproc] Wait for Commands...
1,282,012 UART: [fwproc] Recv command 0x46574c44
1,282,745 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,731 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,814 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,045 >>> mbox cmd response: success
2,713,183 UART: [afmc] ++
2,713,351 UART: [afmc] CDI.KEYID = 6
2,713,714 UART: [afmc] SUBJECT.KEYID = 7
2,714,140 UART: [afmc] AUTHORITY.KEYID = 5
2,749,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,700 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,420 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,313 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,006 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,685 UART: [afmc] --
2,792,644 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,792,666 UART: [cold-reset] --
2,793,386 UART: [state] Locking Datavault
2,794,491 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,095 UART: [state] Locking ICCM
2,795,625 UART: [exit] Launching FMC @ 0x40000000
2,800,922 UART:
2,800,938 UART: Running Caliptra FMC ...
2,801,346 UART:
2,801,484 UART: [fmc] Received command: 0x1000000B
2,802,316 UART:
2,802,332 UART: Running Caliptra ROM ...
2,802,740 UART:
2,802,795 UART: [state] CFI Enabled
2,805,479 UART: [state] LifecycleState = Unprovisioned
2,806,134 UART: [state] DebugLocked = No
2,806,790 UART: [state] WD Timer not started. Device not locked for debugging
2,808,054 UART: [kat] SHA2-256
3,611,604 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,615,708 UART: [kat] ++
3,615,860 UART: [kat] sha1
3,620,170 UART: [kat] SHA2-256
3,622,110 UART: [kat] SHA2-384
3,624,759 UART: [kat] SHA2-512-ACC
3,626,659 UART: [kat] ECC-384
3,636,194 UART: [kat] HMAC-384Kdf
3,640,882 UART: [kat] LMS
3,889,194 UART: [kat] --
3,890,224 UART: [update-reset] ++
3,890,541 UART: Invalid command 0x1000000b recv
3,891,865 UART: ROM Non-Fatal Error: 0x01040003
3,892,721 UART: [state] Locking Datavault
3,893,555 UART: [state] Locking PCR0, PCR1 and PCR31
3,894,159 UART: [state] Locking ICCM
3,894,613 UART: [exit] Launching FMC @ 0x40000000
3,899,910 UART:
3,899,926 UART: Running Caliptra FMC ...
3,900,334 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,008 ready_for_fw is high
1,059,008 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,563,636 >>> mbox cmd response: success
2,619,658 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,625,703 UART:
2,625,719 UART: Running Caliptra FMC ...
2,626,127 UART:
2,626,265 UART: [fmc] Received command: 0x1000000B
3,607,722 UART:
3,607,738 UART: Running Caliptra FMC ...
3,608,146 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,184 UART: [state] WD Timer not started. Device not locked for debugging
88,525 UART: [kat] SHA2-256
892,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,179 UART: [kat] ++
896,331 UART: [kat] sha1
900,647 UART: [kat] SHA2-256
902,587 UART: [kat] SHA2-384
905,202 UART: [kat] SHA2-512-ACC
907,103 UART: [kat] ECC-384
916,962 UART: [kat] HMAC-384Kdf
921,746 UART: [kat] LMS
1,170,058 UART: [kat] --
1,170,793 UART: [cold-reset] ++
1,171,367 UART: [fht] FHT @ 0x50003400
1,173,891 UART: [idev] ++
1,174,059 UART: [idev] CDI.KEYID = 6
1,174,420 UART: [idev] SUBJECT.KEYID = 7
1,174,845 UART: [idev] UDS.KEYID = 0
1,175,191 ready_for_fw is high
1,175,191 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,396 UART: [idev] Erasing UDS.KEYID = 0
1,200,272 UART: [idev] Sha1 KeyId Algorithm
1,209,262 UART: [idev] --
1,210,399 UART: [ldev] ++
1,210,567 UART: [ldev] CDI.KEYID = 6
1,210,931 UART: [ldev] SUBJECT.KEYID = 5
1,211,358 UART: [ldev] AUTHORITY.KEYID = 7
1,211,821 UART: [ldev] FE.KEYID = 1
1,217,417 UART: [ldev] Erasing FE.KEYID = 1
1,243,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,401 UART: [ldev] --
1,282,608 UART: [fwproc] Wait for Commands...
1,283,353 UART: [fwproc] Recv command 0x46574c44
1,284,086 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,794 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,877 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,038 >>> mbox cmd response: success
2,715,136 UART: [afmc] ++
2,715,304 UART: [afmc] CDI.KEYID = 6
2,715,667 UART: [afmc] SUBJECT.KEYID = 7
2,716,093 UART: [afmc] AUTHORITY.KEYID = 5
2,751,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,839 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,559 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,452 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,145 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,782 UART: [afmc] --
2,794,639 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,794,661 UART: [cold-reset] --
2,795,721 UART: [state] Locking Datavault
2,796,810 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,414 UART: [state] Locking ICCM
2,797,864 UART: [exit] Launching FMC @ 0x40000000
2,803,161 UART:
2,803,177 UART: Running Caliptra FMC ...
2,803,585 UART:
2,803,723 UART: [fmc] Received command: 0x1000000B
2,804,555 UART:
2,804,571 UART: Running Caliptra ROM ...
2,804,979 UART:
2,805,121 UART: [state] CFI Enabled
2,807,857 UART: [state] LifecycleState = Unprovisioned
2,808,512 UART: [state] DebugLocked = No
2,809,074 UART: [state] WD Timer not started. Device not locked for debugging
2,810,316 UART: [kat] SHA2-256
3,613,866 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,617,970 UART: [kat] ++
3,618,122 UART: [kat] sha1
3,622,354 UART: [kat] SHA2-256
3,624,294 UART: [kat] SHA2-384
3,627,167 UART: [kat] SHA2-512-ACC
3,629,067 UART: [kat] ECC-384
3,638,850 UART: [kat] HMAC-384Kdf
3,643,454 UART: [kat] LMS
3,891,766 UART: [kat] --
3,892,570 UART: [update-reset] ++
3,892,887 UART: Invalid command 0x1000000b recv
3,894,081 UART: ROM Non-Fatal Error: 0x01040003
3,894,883 UART: [state] Locking Datavault
3,895,667 UART: [state] Locking PCR0, PCR1 and PCR31
3,896,271 UART: [state] Locking ICCM
3,896,773 UART: [exit] Launching FMC @ 0x40000000
3,902,070 UART:
3,902,086 UART: Running Caliptra FMC ...
3,902,494 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,785 ready_for_fw is high
1,058,785 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,369 >>> mbox cmd response: success
2,622,527 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,628,650 UART:
2,628,666 UART: Running Caliptra FMC ...
2,629,074 UART:
2,629,212 UART: [fmc] Received command: 0x1000000B
3,610,928 UART:
3,610,944 UART: Running Caliptra FMC ...
3,611,352 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,150 UART:
192,511 UART: Running Caliptra ROM ...
193,713 UART:
193,873 UART: [state] CFI Enabled
264,499 UART: [state] LifecycleState = Unprovisioned
266,835 UART: [state] DebugLocked = No
268,980 UART: [state] WD Timer not started. Device not locked for debugging
272,271 UART: [kat] SHA2-256
451,861 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,654 UART: [kat] ++
463,105 UART: [kat] sha1
474,150 UART: [kat] SHA2-256
476,877 UART: [kat] SHA2-384
483,434 UART: [kat] SHA2-512-ACC
485,805 UART: [kat] ECC-384
2,948,017 UART: [kat] HMAC-384Kdf
2,972,080 UART: [kat] LMS
3,448,628 UART: [kat] --
3,453,792 UART: [cold-reset] ++
3,455,807 UART: [fht] FHT @ 0x50003400
3,466,308 UART: [idev] ++
3,466,924 UART: [idev] CDI.KEYID = 6
3,467,852 UART: [idev] SUBJECT.KEYID = 7
3,469,054 UART: [idev] UDS.KEYID = 0
3,469,994 ready_for_fw is high
3,470,217 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,614,710 UART: [idev] Erasing UDS.KEYID = 0
5,986,126 UART: [idev] Sha1 KeyId Algorithm
6,009,468 UART: [idev] --
6,015,469 UART: [ldev] ++
6,016,050 UART: [ldev] CDI.KEYID = 6
6,016,973 UART: [ldev] SUBJECT.KEYID = 5
6,018,140 UART: [ldev] AUTHORITY.KEYID = 7
6,019,430 UART: [ldev] FE.KEYID = 1
6,058,066 UART: [ldev] Erasing FE.KEYID = 1
8,567,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,379 UART: [ldev] --
10,372,216 UART: [fwproc] Wait for Commands...
10,374,043 UART: [fwproc] Recv command 0x46574c44
10,376,039 UART: [fwproc] Recv'd Img size: 114888 bytes
13,814,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,702 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,956,912 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,285,935 >>> mbox cmd response: success
14,290,698 UART: [afmc] ++
14,291,289 UART: [afmc] CDI.KEYID = 6
14,292,230 UART: [afmc] SUBJECT.KEYID = 7
14,293,447 UART: [afmc] AUTHORITY.KEYID = 5
16,829,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,415 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,570,204 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,586,280 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,601,792 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,625,739 UART: [afmc] --
18,630,069 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,774,992 UART: [cold-reset] --
18,775,859 UART: [state] Locking Datavault
18,776,938 UART: [state] Locking PCR0, PCR1 and PCR31
18,778,480 UART: [state] Locking ICCM
18,779,363 UART: [exit] Launching FMC @ 0x40000000
18,780,713 UART:
18,780,867 UART: Running Caliptra FMC ...
18,781,969 UART:
18,782,130 UART: [fmc] Received command: 0x46574C44
18,783,510 UART:
18,783,661 UART: Running Caliptra ROM ...
18,784,704 UART:
18,784,858 UART: [state] CFI Enabled
18,846,291 UART: [state] LifecycleState = Unprovisioned
18,848,223 UART: [state] DebugLocked = No
18,850,459 UART: [state] WD Timer not started. Device not locked for debugging
18,854,045 UART: [kat] SHA2-256
19,033,701 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,044,496 UART: [kat] ++
19,044,960 UART: [kat] sha1
19,055,427 UART: [kat] SHA2-256
19,058,120 UART: [kat] SHA2-384
19,065,298 UART: [kat] SHA2-512-ACC
19,067,692 UART: [kat] ECC-384
21,528,480 UART: [kat] HMAC-384Kdf
21,550,148 UART: [kat] LMS
22,026,598 UART: [kat] --
22,030,631 UART: [update-reset] ++
25,482,801 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,486,826 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,871,643 >>> mbox cmd response: success
25,872,860 UART: [update-reset] Copying MAN_2 To MAN_1
25,909,998 UART: [update-reset Success] --
25,911,321 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,914,729 UART: [state] Locking Datavault
25,918,368 UART: [state] Locking PCR0, PCR1 and PCR31
25,920,128 UART: [state] Locking ICCM
25,921,746 UART: [exit] Launching FMC @ 0x40000000
25,930,096 UART:
25,930,343 UART: Running Caliptra FMC ...
25,931,448 UART:
25,931,614 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,933,284 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,462,536 ready_for_fw is high
3,463,150 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,164,297 >>> mbox cmd response: success
18,440,442 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,585,822 UART:
18,586,217 UART: Running Caliptra FMC ...
18,587,353 UART:
18,587,515 UART: [fmc] Received command: 0x46574C44
25,691,766 >>> mbox cmd response: success
25,713,729 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,728,588 UART:
25,728,876 UART: Running Caliptra FMC ...
25,730,053 UART:
25,730,228 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,731,883 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,490 UART:
192,853 UART: Running Caliptra ROM ...
194,040 UART:
603,854 UART: [state] CFI Enabled
618,737 UART: [state] LifecycleState = Unprovisioned
620,619 UART: [state] DebugLocked = No
623,499 UART: [state] WD Timer not started. Device not locked for debugging
627,946 UART: [kat] SHA2-256
807,619 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,364 UART: [kat] ++
818,972 UART: [kat] sha1
830,491 UART: [kat] SHA2-256
833,143 UART: [kat] SHA2-384
839,059 UART: [kat] SHA2-512-ACC
841,432 UART: [kat] ECC-384
3,286,302 UART: [kat] HMAC-384Kdf
3,299,118 UART: [kat] LMS
3,775,622 UART: [kat] --
3,778,984 UART: [cold-reset] ++
3,781,156 UART: [fht] FHT @ 0x50003400
3,791,999 UART: [idev] ++
3,792,562 UART: [idev] CDI.KEYID = 6
3,793,594 UART: [idev] SUBJECT.KEYID = 7
3,794,771 UART: [idev] UDS.KEYID = 0
3,795,694 ready_for_fw is high
3,795,899 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,940,182 UART: [idev] Erasing UDS.KEYID = 0
6,274,109 UART: [idev] Sha1 KeyId Algorithm
6,298,207 UART: [idev] --
6,302,792 UART: [ldev] ++
6,303,410 UART: [ldev] CDI.KEYID = 6
6,304,321 UART: [ldev] SUBJECT.KEYID = 5
6,305,532 UART: [ldev] AUTHORITY.KEYID = 7
6,306,760 UART: [ldev] FE.KEYID = 1
6,317,944 UART: [ldev] Erasing FE.KEYID = 1
8,792,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,474 UART: [ldev] --
10,589,142 UART: [fwproc] Wait for Commands...
10,591,241 UART: [fwproc] Recv command 0x46574c44
10,593,277 UART: [fwproc] Recv'd Img size: 114888 bytes
14,035,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,115,272 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,175,492 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,503,379 >>> mbox cmd response: success
14,507,499 UART: [afmc] ++
14,508,115 UART: [afmc] CDI.KEYID = 6
14,509,025 UART: [afmc] SUBJECT.KEYID = 7
14,510,242 UART: [afmc] AUTHORITY.KEYID = 5
17,016,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,736,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,739,003 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,754,622 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,770,607 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,786,192 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,810,923 UART: [afmc] --
18,815,305 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,960,956 UART: [cold-reset] --
18,962,487 UART: [state] Locking Datavault
18,963,572 UART: [state] Locking PCR0, PCR1 and PCR31
18,965,065 UART: [state] Locking ICCM
18,965,941 UART: [exit] Launching FMC @ 0x40000000
18,967,527 UART:
18,967,697 UART: Running Caliptra FMC ...
18,968,805 UART:
18,968,966 UART: [fmc] Received command: 0x46574C44
18,970,426 UART:
18,970,578 UART: Running Caliptra ROM ...
18,971,673 UART:
18,971,828 UART: [state] CFI Enabled
18,979,317 UART: [state] LifecycleState = Unprovisioned
18,981,288 UART: [state] DebugLocked = No
18,982,899 UART: [state] WD Timer not started. Device not locked for debugging
18,987,297 UART: [kat] SHA2-256
19,166,999 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,177,815 UART: [kat] ++
19,178,302 UART: [kat] sha1
19,190,207 UART: [kat] SHA2-256
19,192,907 UART: [kat] SHA2-384
19,197,654 UART: [kat] SHA2-512-ACC
19,200,003 UART: [kat] ECC-384
21,642,965 UART: [kat] HMAC-384Kdf
21,655,264 UART: [kat] LMS
22,131,715 UART: [kat] --
22,136,028 UART: [update-reset] ++
25,585,531 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,588,955 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,973,743 >>> mbox cmd response: success
25,974,222 UART: [update-reset] Copying MAN_2 To MAN_1
26,011,377 UART: [update-reset Success] --
26,012,703 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
26,015,261 UART: [state] Locking Datavault
26,019,533 UART: [state] Locking PCR0, PCR1 and PCR31
26,021,271 UART: [state] Locking ICCM
26,022,428 UART: [exit] Launching FMC @ 0x40000000
26,030,824 UART:
26,031,069 UART: Running Caliptra FMC ...
26,032,173 UART:
26,032,332 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
26,033,960 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,779,108 ready_for_fw is high
3,779,621 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,383,995 >>> mbox cmd response: success
18,617,694 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,762,479 UART:
18,762,854 UART: Running Caliptra FMC ...
18,764,068 UART:
18,764,243 UART: [fmc] Received command: 0x46574C44
25,785,832 >>> mbox cmd response: success
25,807,643 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,821,744 UART:
25,822,030 UART: Running Caliptra FMC ...
25,823,212 UART:
25,823,411 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,825,055 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [kat] SHA2-256
891,170 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,274 UART: [kat] ++
895,426 UART: [kat] sha1
899,606 UART: [kat] SHA2-256
901,546 UART: [kat] SHA2-384
904,375 UART: [kat] SHA2-512-ACC
906,276 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,569 UART: [kat] LMS
1,168,881 UART: [kat] --
1,169,680 UART: [cold-reset] ++
1,170,190 UART: [fht] FHT @ 0x50003400
1,172,840 UART: [idev] ++
1,173,008 UART: [idev] CDI.KEYID = 6
1,173,369 UART: [idev] SUBJECT.KEYID = 7
1,173,794 UART: [idev] UDS.KEYID = 0
1,174,140 ready_for_fw is high
1,174,140 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,579 UART: [idev] Erasing UDS.KEYID = 0
1,198,671 UART: [idev] Sha1 KeyId Algorithm
1,207,565 UART: [idev] --
1,208,644 UART: [ldev] ++
1,208,812 UART: [ldev] CDI.KEYID = 6
1,209,176 UART: [ldev] SUBJECT.KEYID = 5
1,209,603 UART: [ldev] AUTHORITY.KEYID = 7
1,210,066 UART: [ldev] FE.KEYID = 1
1,215,224 UART: [ldev] Erasing FE.KEYID = 1
1,241,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,656 UART: [ldev] --
1,281,005 UART: [fwproc] Wait for Commands...
1,281,818 UART: [fwproc] Recv command 0x46574c44
1,282,551 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,474 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,159 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,312 >>> mbox cmd response: success
2,780,344 UART: [afmc] ++
2,780,512 UART: [afmc] CDI.KEYID = 6
2,780,875 UART: [afmc] SUBJECT.KEYID = 7
2,781,301 UART: [afmc] AUTHORITY.KEYID = 5
2,816,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,732 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,428 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,327 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,020 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,760 UART: [afmc] --
2,859,645 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,859,667 UART: [cold-reset] --
2,860,329 UART: [state] Locking Datavault
2,861,366 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,970 UART: [state] Locking ICCM
2,862,424 UART: [exit] Launching FMC @ 0x40000000
2,867,721 UART:
2,867,737 UART: Running Caliptra FMC ...
2,868,145 UART:
2,868,375 UART: [fmc] Received command: 0x46574C44
2,869,201 UART:
2,869,217 UART: Running Caliptra ROM ...
2,869,625 UART:
2,869,680 UART: [state] CFI Enabled
2,872,592 UART: [state] LifecycleState = Unprovisioned
2,873,247 UART: [state] DebugLocked = No
2,873,861 UART: [state] WD Timer not started. Device not locked for debugging
2,875,131 UART: [kat] SHA2-256
3,678,681 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,785 UART: [kat] ++
3,682,937 UART: [kat] sha1
3,687,303 UART: [kat] SHA2-256
3,689,243 UART: [kat] SHA2-384
3,691,774 UART: [kat] SHA2-512-ACC
3,693,674 UART: [kat] ECC-384
3,703,357 UART: [kat] HMAC-384Kdf
3,708,097 UART: [kat] LMS
3,956,409 UART: [kat] --
3,957,263 UART: [update-reset] ++
5,274,969 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,164 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,428,634 >>> mbox cmd response: success
5,428,819 UART: [update-reset] Copying MAN_2 To MAN_1
5,436,833 UART: [update-reset Success] --
5,437,242 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,437,856 UART: [state] Locking Datavault
5,438,618 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,222 UART: [state] Locking ICCM
5,439,688 UART: [exit] Launching FMC @ 0x40000000
5,444,985 UART:
5,445,001 UART: Running Caliptra FMC ...
5,445,409 UART:
5,445,631 UART: [fmc] Received command: 0x1000000C
5,446,366 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,396 ready_for_fw is high
1,059,396 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,183 >>> mbox cmd response: success
2,687,814 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,805 UART:
2,693,821 UART: Running Caliptra FMC ...
2,694,229 UART:
2,694,459 UART: [fmc] Received command: 0x46574C44
5,137,092 >>> mbox cmd response: success
5,144,782 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,150,742 UART:
5,150,758 UART: Running Caliptra FMC ...
5,151,166 UART:
5,151,388 UART: [fmc] Received command: 0x1000000C
5,152,123 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,879 UART: [state] LifecycleState = Unprovisioned
86,534 UART: [state] DebugLocked = No
87,152 UART: [state] WD Timer not started. Device not locked for debugging
88,403 UART: [kat] SHA2-256
891,953 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,057 UART: [kat] ++
896,209 UART: [kat] sha1
900,363 UART: [kat] SHA2-256
902,303 UART: [kat] SHA2-384
905,046 UART: [kat] SHA2-512-ACC
906,947 UART: [kat] ECC-384
916,660 UART: [kat] HMAC-384Kdf
921,252 UART: [kat] LMS
1,169,564 UART: [kat] --
1,170,551 UART: [cold-reset] ++
1,171,025 UART: [fht] FHT @ 0x50003400
1,173,833 UART: [idev] ++
1,174,001 UART: [idev] CDI.KEYID = 6
1,174,362 UART: [idev] SUBJECT.KEYID = 7
1,174,787 UART: [idev] UDS.KEYID = 0
1,175,133 ready_for_fw is high
1,175,133 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,183,118 UART: [idev] Erasing UDS.KEYID = 0
1,199,996 UART: [idev] Sha1 KeyId Algorithm
1,208,984 UART: [idev] --
1,210,221 UART: [ldev] ++
1,210,389 UART: [ldev] CDI.KEYID = 6
1,210,753 UART: [ldev] SUBJECT.KEYID = 5
1,211,180 UART: [ldev] AUTHORITY.KEYID = 7
1,211,643 UART: [ldev] FE.KEYID = 1
1,216,585 UART: [ldev] Erasing FE.KEYID = 1
1,242,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,645 UART: [ldev] --
1,281,984 UART: [fwproc] Wait for Commands...
1,282,599 UART: [fwproc] Recv command 0x46574c44
1,283,332 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,625 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,310 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,541 >>> mbox cmd response: success
2,781,607 UART: [afmc] ++
2,781,775 UART: [afmc] CDI.KEYID = 6
2,782,138 UART: [afmc] SUBJECT.KEYID = 7
2,782,564 UART: [afmc] AUTHORITY.KEYID = 5
2,818,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,888 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,637 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,841,333 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,847,232 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,925 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,809 UART: [afmc] --
2,861,600 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,861,622 UART: [cold-reset] --
2,862,372 UART: [state] Locking Datavault
2,863,705 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,309 UART: [state] Locking ICCM
2,864,911 UART: [exit] Launching FMC @ 0x40000000
2,870,208 UART:
2,870,224 UART: Running Caliptra FMC ...
2,870,632 UART:
2,870,862 UART: [fmc] Received command: 0x46574C44
2,871,688 UART:
2,871,704 UART: Running Caliptra ROM ...
2,872,112 UART:
2,872,254 UART: [state] CFI Enabled
2,875,132 UART: [state] LifecycleState = Unprovisioned
2,875,787 UART: [state] DebugLocked = No
2,876,331 UART: [state] WD Timer not started. Device not locked for debugging
2,877,633 UART: [kat] SHA2-256
3,681,183 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,685,287 UART: [kat] ++
3,685,439 UART: [kat] sha1
3,689,759 UART: [kat] SHA2-256
3,691,699 UART: [kat] SHA2-384
3,694,592 UART: [kat] SHA2-512-ACC
3,696,492 UART: [kat] ECC-384
3,706,567 UART: [kat] HMAC-384Kdf
3,711,137 UART: [kat] LMS
3,959,449 UART: [kat] --
3,960,181 UART: [update-reset] ++
5,277,787 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,278,874 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,431,344 >>> mbox cmd response: success
5,431,533 UART: [update-reset] Copying MAN_2 To MAN_1
5,439,547 UART: [update-reset Success] --
5,439,956 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,440,610 UART: [state] Locking Datavault
5,441,288 UART: [state] Locking PCR0, PCR1 and PCR31
5,441,892 UART: [state] Locking ICCM
5,442,484 UART: [exit] Launching FMC @ 0x40000000
5,447,781 UART:
5,447,797 UART: Running Caliptra FMC ...
5,448,205 UART:
5,448,427 UART: [fmc] Received command: 0x1000000C
5,449,162 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,013 ready_for_fw is high
1,059,013 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,976 >>> mbox cmd response: success
2,686,869 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,692,780 UART:
2,692,796 UART: Running Caliptra FMC ...
2,693,204 UART:
2,693,434 UART: [fmc] Received command: 0x46574C44
5,138,276 >>> mbox cmd response: success
5,145,816 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,151,304 UART:
5,151,320 UART: Running Caliptra FMC ...
5,151,728 UART:
5,151,950 UART: [fmc] Received command: 0x1000000C
5,152,685 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
890,900 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,004 UART: [kat] ++
895,156 UART: [kat] sha1
899,402 UART: [kat] SHA2-256
901,342 UART: [kat] SHA2-384
904,183 UART: [kat] SHA2-512-ACC
906,084 UART: [kat] ECC-384
915,705 UART: [kat] HMAC-384Kdf
920,135 UART: [kat] LMS
1,168,447 UART: [kat] --
1,169,008 UART: [cold-reset] ++
1,169,468 UART: [fht] FHT @ 0x50003400
1,172,116 UART: [idev] ++
1,172,284 UART: [idev] CDI.KEYID = 6
1,172,645 UART: [idev] SUBJECT.KEYID = 7
1,173,070 UART: [idev] UDS.KEYID = 0
1,173,416 ready_for_fw is high
1,173,416 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,467 UART: [idev] Erasing UDS.KEYID = 0
1,198,209 UART: [idev] Sha1 KeyId Algorithm
1,206,875 UART: [idev] --
1,207,964 UART: [ldev] ++
1,208,132 UART: [ldev] CDI.KEYID = 6
1,208,496 UART: [ldev] SUBJECT.KEYID = 5
1,208,923 UART: [ldev] AUTHORITY.KEYID = 7
1,209,386 UART: [ldev] FE.KEYID = 1
1,214,698 UART: [ldev] Erasing FE.KEYID = 1
1,240,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,276 UART: [ldev] --
1,279,509 UART: [fwproc] Wait for Commands...
1,280,312 UART: [fwproc] Recv command 0x46574c44
1,281,045 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,114 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,799 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,046 >>> mbox cmd response: success
2,778,232 UART: [afmc] ++
2,778,400 UART: [afmc] CDI.KEYID = 6
2,778,763 UART: [afmc] SUBJECT.KEYID = 7
2,779,189 UART: [afmc] AUTHORITY.KEYID = 5
2,814,834 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,155 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,904 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,600 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,499 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,192 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,758 UART: [afmc] --
2,857,719 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,857,741 UART: [cold-reset] --
2,858,451 UART: [state] Locking Datavault
2,859,618 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,222 UART: [state] Locking ICCM
2,860,722 UART: [exit] Launching FMC @ 0x40000000
2,866,019 UART:
2,866,035 UART: Running Caliptra FMC ...
2,866,443 UART:
2,866,673 UART: [fmc] Received command: 0x46574C44
2,867,499 UART:
2,867,515 UART: Running Caliptra ROM ...
2,867,923 UART:
2,867,978 UART: [state] CFI Enabled
2,870,692 UART: [state] LifecycleState = Unprovisioned
2,871,347 UART: [state] DebugLocked = No
2,871,873 UART: [state] WD Timer not started. Device not locked for debugging
2,873,153 UART: [kat] SHA2-256
3,676,703 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,680,807 UART: [kat] ++
3,680,959 UART: [kat] sha1
3,685,041 UART: [kat] SHA2-256
3,686,981 UART: [kat] SHA2-384
3,689,872 UART: [kat] SHA2-512-ACC
3,691,772 UART: [kat] ECC-384
3,701,451 UART: [kat] HMAC-384Kdf
3,706,205 UART: [kat] LMS
3,954,517 UART: [kat] --
3,955,595 UART: [update-reset] ++
5,272,453 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,273,592 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,426,062 >>> mbox cmd response: success
5,426,191 UART: [update-reset] Copying MAN_2 To MAN_1
5,434,205 UART: [update-reset Success] --
5,434,614 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,434,906 UART: [state] Locking Datavault
5,435,684 UART: [state] Locking PCR0, PCR1 and PCR31
5,436,288 UART: [state] Locking ICCM
5,436,740 UART: [exit] Launching FMC @ 0x40000000
5,442,037 UART:
5,442,053 UART: Running Caliptra FMC ...
5,442,461 UART:
5,442,683 UART: [fmc] Received command: 0x1000000C
5,443,418 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,950 ready_for_fw is high
1,058,950 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,271 >>> mbox cmd response: success
2,687,878 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,694,111 UART:
2,694,127 UART: Running Caliptra FMC ...
2,694,535 UART:
2,694,765 UART: [fmc] Received command: 0x46574C44
5,139,442 >>> mbox cmd response: success
5,147,114 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,152,864 UART:
5,152,880 UART: Running Caliptra FMC ...
5,153,288 UART:
5,153,510 UART: [fmc] Received command: 0x1000000C
5,154,245 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,846 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
891,565 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
900,111 UART: [kat] SHA2-256
902,051 UART: [kat] SHA2-384
904,802 UART: [kat] SHA2-512-ACC
906,703 UART: [kat] ECC-384
916,580 UART: [kat] HMAC-384Kdf
921,018 UART: [kat] LMS
1,169,330 UART: [kat] --
1,170,427 UART: [cold-reset] ++
1,170,825 UART: [fht] FHT @ 0x50003400
1,173,327 UART: [idev] ++
1,173,495 UART: [idev] CDI.KEYID = 6
1,173,856 UART: [idev] SUBJECT.KEYID = 7
1,174,281 UART: [idev] UDS.KEYID = 0
1,174,627 ready_for_fw is high
1,174,627 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,170 UART: [idev] Erasing UDS.KEYID = 0
1,199,420 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,271 UART: [ldev] ++
1,209,439 UART: [ldev] CDI.KEYID = 6
1,209,803 UART: [ldev] SUBJECT.KEYID = 5
1,210,230 UART: [ldev] AUTHORITY.KEYID = 7
1,210,693 UART: [ldev] FE.KEYID = 1
1,216,133 UART: [ldev] Erasing FE.KEYID = 1
1,242,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,893 UART: [ldev] --
1,282,336 UART: [fwproc] Wait for Commands...
1,283,093 UART: [fwproc] Recv command 0x46574c44
1,283,826 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,595 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,280 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,781,555 >>> mbox cmd response: success
2,782,633 UART: [afmc] ++
2,782,801 UART: [afmc] CDI.KEYID = 6
2,783,164 UART: [afmc] SUBJECT.KEYID = 7
2,783,590 UART: [afmc] AUTHORITY.KEYID = 5
2,818,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,027 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,841,723 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,847,622 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,853,315 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,957 UART: [afmc] --
2,861,762 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,861,784 UART: [cold-reset] --
2,862,736 UART: [state] Locking Datavault
2,863,855 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,459 UART: [state] Locking ICCM
2,864,967 UART: [exit] Launching FMC @ 0x40000000
2,870,264 UART:
2,870,280 UART: Running Caliptra FMC ...
2,870,688 UART:
2,870,918 UART: [fmc] Received command: 0x46574C44
2,871,744 UART:
2,871,760 UART: Running Caliptra ROM ...
2,872,168 UART:
2,872,310 UART: [state] CFI Enabled
2,875,072 UART: [state] LifecycleState = Unprovisioned
2,875,727 UART: [state] DebugLocked = No
2,876,225 UART: [state] WD Timer not started. Device not locked for debugging
2,877,373 UART: [kat] SHA2-256
3,680,923 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,685,027 UART: [kat] ++
3,685,179 UART: [kat] sha1
3,689,339 UART: [kat] SHA2-256
3,691,279 UART: [kat] SHA2-384
3,694,034 UART: [kat] SHA2-512-ACC
3,695,934 UART: [kat] ECC-384
3,705,581 UART: [kat] HMAC-384Kdf
3,710,305 UART: [kat] LMS
3,958,617 UART: [kat] --
3,959,093 UART: [update-reset] ++
5,276,575 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,277,594 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,430,064 >>> mbox cmd response: success
5,430,223 UART: [update-reset] Copying MAN_2 To MAN_1
5,438,237 UART: [update-reset Success] --
5,438,646 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,439,038 UART: [state] Locking Datavault
5,439,858 UART: [state] Locking PCR0, PCR1 and PCR31
5,440,462 UART: [state] Locking ICCM
5,441,122 UART: [exit] Launching FMC @ 0x40000000
5,446,419 UART:
5,446,435 UART: Running Caliptra FMC ...
5,446,843 UART:
5,447,065 UART: [fmc] Received command: 0x1000000C
5,447,800 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,311 ready_for_fw is high
1,059,311 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,204 >>> mbox cmd response: success
2,686,899 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,136 UART:
2,693,152 UART: Running Caliptra FMC ...
2,693,560 UART:
2,693,790 UART: [fmc] Received command: 0x46574C44
5,139,006 >>> mbox cmd response: success
5,146,558 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,152,324 UART:
5,152,340 UART: Running Caliptra FMC ...
5,152,748 UART:
5,152,970 UART: [fmc] Received command: 0x1000000C
5,153,705 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
890,942 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,046 UART: [kat] ++
895,198 UART: [kat] sha1
899,380 UART: [kat] SHA2-256
901,320 UART: [kat] SHA2-384
904,211 UART: [kat] SHA2-512-ACC
906,112 UART: [kat] ECC-384
915,535 UART: [kat] HMAC-384Kdf
920,071 UART: [kat] LMS
1,168,383 UART: [kat] --
1,169,404 UART: [cold-reset] ++
1,169,858 UART: [fht] FHT @ 0x50003400
1,172,462 UART: [idev] ++
1,172,630 UART: [idev] CDI.KEYID = 6
1,172,991 UART: [idev] SUBJECT.KEYID = 7
1,173,416 UART: [idev] UDS.KEYID = 0
1,173,762 ready_for_fw is high
1,173,762 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,180,805 UART: [idev] Erasing UDS.KEYID = 0
1,197,581 UART: [idev] Sha1 KeyId Algorithm
1,206,531 UART: [idev] --
1,207,640 UART: [ldev] ++
1,207,808 UART: [ldev] CDI.KEYID = 6
1,208,172 UART: [ldev] SUBJECT.KEYID = 5
1,208,599 UART: [ldev] AUTHORITY.KEYID = 7
1,209,062 UART: [ldev] FE.KEYID = 1
1,214,362 UART: [ldev] Erasing FE.KEYID = 1
1,241,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,294 UART: [ldev] --
1,280,621 UART: [fwproc] Wait for Commands...
1,281,208 UART: [fwproc] Recv command 0x46574c44
1,281,941 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,832 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,517 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,714 >>> mbox cmd response: success
2,778,906 UART: [afmc] ++
2,779,074 UART: [afmc] CDI.KEYID = 6
2,779,437 UART: [afmc] SUBJECT.KEYID = 7
2,779,863 UART: [afmc] AUTHORITY.KEYID = 5
2,815,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,984 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,680 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,579 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,272 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,948 UART: [afmc] --
2,858,833 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,858,855 UART: [cold-reset] --
2,859,505 UART: [state] Locking Datavault
2,860,888 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,492 UART: [state] Locking ICCM
2,862,024 UART: [exit] Launching FMC @ 0x40000000
2,867,321 UART:
2,867,337 UART: Running Caliptra FMC ...
2,867,745 UART:
2,867,975 UART: [fmc] Received command: 0x46574C44
2,868,801 UART:
2,868,817 UART: Running Caliptra ROM ...
2,869,225 UART:
2,869,280 UART: [state] CFI Enabled
2,871,896 UART: [state] LifecycleState = Unprovisioned
2,872,551 UART: [state] DebugLocked = No
2,873,041 UART: [state] WD Timer not started. Device not locked for debugging
2,874,211 UART: [kat] SHA2-256
3,677,761 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,865 UART: [kat] ++
3,682,017 UART: [kat] sha1
3,686,259 UART: [kat] SHA2-256
3,688,199 UART: [kat] SHA2-384
3,690,866 UART: [kat] SHA2-512-ACC
3,692,766 UART: [kat] ECC-384
3,702,627 UART: [kat] HMAC-384Kdf
3,707,227 UART: [kat] LMS
3,955,539 UART: [kat] --
3,956,331 UART: [update-reset] ++
5,273,221 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,274,384 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,426,854 >>> mbox cmd response: success
5,427,093 UART: [update-reset] Copying MAN_2 To MAN_1
5,435,107 UART: [update-reset Success] --
5,435,516 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,436,068 UART: [state] Locking Datavault
5,436,656 UART: [state] Locking PCR0, PCR1 and PCR31
5,437,260 UART: [state] Locking ICCM
5,437,846 UART: [exit] Launching FMC @ 0x40000000
5,443,143 UART:
5,443,159 UART: Running Caliptra FMC ...
5,443,567 UART:
5,443,789 UART: [fmc] Received command: 0x1000000C
5,444,524 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,674 ready_for_fw is high
1,058,674 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,917 >>> mbox cmd response: success
2,687,704 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,739 UART:
2,693,755 UART: Running Caliptra FMC ...
2,694,163 UART:
2,694,393 UART: [fmc] Received command: 0x46574C44
5,138,358 >>> mbox cmd response: success
5,146,070 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,151,766 UART:
5,151,782 UART: Running Caliptra FMC ...
5,152,190 UART:
5,152,412 UART: [fmc] Received command: 0x1000000C
5,153,147 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
900,091 UART: [kat] SHA2-256
902,031 UART: [kat] SHA2-384
904,808 UART: [kat] SHA2-512-ACC
906,709 UART: [kat] ECC-384
916,438 UART: [kat] HMAC-384Kdf
921,000 UART: [kat] LMS
1,169,312 UART: [kat] --
1,170,057 UART: [cold-reset] ++
1,170,549 UART: [fht] FHT @ 0x50003400
1,173,361 UART: [idev] ++
1,173,529 UART: [idev] CDI.KEYID = 6
1,173,890 UART: [idev] SUBJECT.KEYID = 7
1,174,315 UART: [idev] UDS.KEYID = 0
1,174,661 ready_for_fw is high
1,174,661 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,616 UART: [idev] Erasing UDS.KEYID = 0
1,199,228 UART: [idev] Sha1 KeyId Algorithm
1,208,016 UART: [idev] --
1,209,015 UART: [ldev] ++
1,209,183 UART: [ldev] CDI.KEYID = 6
1,209,547 UART: [ldev] SUBJECT.KEYID = 5
1,209,974 UART: [ldev] AUTHORITY.KEYID = 7
1,210,437 UART: [ldev] FE.KEYID = 1
1,215,735 UART: [ldev] Erasing FE.KEYID = 1
1,242,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,921 UART: [ldev] --
1,281,176 UART: [fwproc] Wait for Commands...
1,281,809 UART: [fwproc] Recv command 0x46574c44
1,282,542 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,193 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,878 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,075 >>> mbox cmd response: success
2,779,173 UART: [afmc] ++
2,779,341 UART: [afmc] CDI.KEYID = 6
2,779,704 UART: [afmc] SUBJECT.KEYID = 7
2,780,130 UART: [afmc] AUTHORITY.KEYID = 5
2,815,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,837 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,533 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,432 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,125 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,997 UART: [afmc] --
2,858,854 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,858,876 UART: [cold-reset] --
2,859,794 UART: [state] Locking Datavault
2,861,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,629 UART: [state] Locking ICCM
2,862,273 UART: [exit] Launching FMC @ 0x40000000
2,867,570 UART:
2,867,586 UART: Running Caliptra FMC ...
2,867,994 UART:
2,868,224 UART: [fmc] Received command: 0x46574C44
2,869,050 UART:
2,869,066 UART: Running Caliptra ROM ...
2,869,474 UART:
2,869,616 UART: [state] CFI Enabled
2,872,528 UART: [state] LifecycleState = Unprovisioned
2,873,183 UART: [state] DebugLocked = No
2,873,847 UART: [state] WD Timer not started. Device not locked for debugging
2,875,137 UART: [kat] SHA2-256
3,678,687 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,791 UART: [kat] ++
3,682,943 UART: [kat] sha1
3,687,217 UART: [kat] SHA2-256
3,689,157 UART: [kat] SHA2-384
3,691,754 UART: [kat] SHA2-512-ACC
3,693,654 UART: [kat] ECC-384
3,703,263 UART: [kat] HMAC-384Kdf
3,707,935 UART: [kat] LMS
3,956,247 UART: [kat] --
3,957,057 UART: [update-reset] ++
5,274,293 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,428 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,898 >>> mbox cmd response: success
5,428,199 UART: [update-reset] Copying MAN_2 To MAN_1
5,436,213 UART: [update-reset Success] --
5,436,622 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,437,492 UART: [state] Locking Datavault
5,438,162 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,766 UART: [state] Locking ICCM
5,439,290 UART: [exit] Launching FMC @ 0x40000000
5,444,587 UART:
5,444,603 UART: Running Caliptra FMC ...
5,445,011 UART:
5,445,233 UART: [fmc] Received command: 0x1000000C
5,445,968 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,713 ready_for_fw is high
1,059,713 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,578 >>> mbox cmd response: success
2,688,219 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,694,324 UART:
2,694,340 UART: Running Caliptra FMC ...
2,694,748 UART:
2,694,978 UART: [fmc] Received command: 0x46574C44
5,140,378 >>> mbox cmd response: success
5,147,870 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,153,386 UART:
5,153,402 UART: Running Caliptra FMC ...
5,153,810 UART:
5,154,032 UART: [fmc] Received command: 0x1000000C
5,154,767 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
191,946 UART:
192,306 UART: Running Caliptra ROM ...
193,409 UART:
193,561 UART: [state] CFI Enabled
264,763 UART: [state] LifecycleState = Unprovisioned
266,783 UART: [state] DebugLocked = No
268,950 UART: [state] WD Timer not started. Device not locked for debugging
273,341 UART: [kat] SHA2-256
452,967 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,780 UART: [kat] ++
464,231 UART: [kat] sha1
474,686 UART: [kat] SHA2-256
477,412 UART: [kat] SHA2-384
483,900 UART: [kat] SHA2-512-ACC
486,270 UART: [kat] ECC-384
2,949,307 UART: [kat] HMAC-384Kdf
2,971,072 UART: [kat] LMS
3,447,590 UART: [kat] --
3,451,848 UART: [cold-reset] ++
3,453,112 UART: [fht] FHT @ 0x50003400
3,465,522 UART: [idev] ++
3,466,093 UART: [idev] CDI.KEYID = 6
3,467,012 UART: [idev] SUBJECT.KEYID = 7
3,468,268 UART: [idev] UDS.KEYID = 0
3,469,200 ready_for_fw is high
3,469,413 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,613,931 UART: [idev] Erasing UDS.KEYID = 0
5,990,028 UART: [idev] Sha1 KeyId Algorithm
6,012,708 UART: [idev] --
6,016,892 UART: [ldev] ++
6,017,479 UART: [ldev] CDI.KEYID = 6
6,018,423 UART: [ldev] SUBJECT.KEYID = 5
6,019,594 UART: [ldev] AUTHORITY.KEYID = 7
6,020,885 UART: [ldev] FE.KEYID = 1
6,056,009 UART: [ldev] Erasing FE.KEYID = 1
8,561,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,027 UART: [ldev] --
10,372,298 UART: [fwproc] Wait for Commands...
10,375,370 UART: [fwproc] Recv command 0x46574c44
10,377,359 UART: [fwproc] Recv'd Img size: 114888 bytes
13,816,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,893,074 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,953,268 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,280,679 >>> mbox cmd response: success
14,284,151 UART: [afmc] ++
14,284,745 UART: [afmc] CDI.KEYID = 6
14,285,689 UART: [afmc] SUBJECT.KEYID = 7
14,286,910 UART: [afmc] AUTHORITY.KEYID = 5
16,831,644 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,574,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,577,124 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,592,994 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,609,061 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,624,647 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,650,097 UART: [afmc] --
20,728,193 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
20,867,690 UART: [cold-reset] --
20,868,631 UART: [state] Locking Datavault
20,869,717 UART: [state] Locking PCR0, PCR1 and PCR31
20,871,266 UART: [state] Locking ICCM
20,872,154 UART: [exit] Launching FMC @ 0x40000000
20,873,504 UART:
20,873,664 UART: Running Caliptra FMC ...
20,874,773 UART:
20,874,935 UART: [fmc] Received command: 0x46574C44
20,876,318 UART:
20,876,495 UART: Running Caliptra ROM ...
20,877,604 UART:
20,877,766 UART: [state] CFI Enabled
20,933,902 UART: [state] LifecycleState = Unprovisioned
20,935,850 UART: [state] DebugLocked = No
20,938,082 UART: [state] WD Timer not started. Device not locked for debugging
20,942,700 UART: [kat] SHA2-256
21,122,390 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
21,133,160 UART: [kat] ++
21,133,627 UART: [kat] sha1
21,144,572 UART: [kat] SHA2-256
21,147,266 UART: [kat] SHA2-384
21,154,006 UART: [kat] SHA2-512-ACC
21,156,370 UART: [kat] ECC-384
23,620,184 UART: [kat] HMAC-384Kdf
23,640,090 UART: [kat] LMS
24,116,570 UART: [kat] --
24,121,231 UART: [update-reset] ++
24,168,724 >>> mbox cmd response: failed
24,169,266 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,170,821 UART: ROM Non-Fatal Error: 0x000B001E
24,173,782 UART: [state] Locking Datavault
24,177,043 UART: [state] Locking PCR0, PCR1 and PCR31
24,178,753 UART: [state] Locking ICCM
24,181,133 UART: [exit] Launching FMC @ 0x40000000
24,189,485 UART:
24,189,728 UART: Running Caliptra FMC ...
24,190,762 UART:
24,190,917 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,192,573 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,462,573 ready_for_fw is high
3,462,968 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,177,252 >>> mbox cmd response: success
20,534,221 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
20,673,483 UART:
20,673,891 UART: Running Caliptra FMC ...
20,675,054 UART:
20,675,242 UART: [fmc] Received command: 0x46574C44
23,978,829 >>> mbox cmd response: failed
23,979,279 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,991,998 UART:
23,992,264 UART: Running Caliptra FMC ...
23,993,384 UART:
23,993,547 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,995,211 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,286 UART:
192,657 UART: Running Caliptra ROM ...
195,303 UART:
603,569 UART: [state] CFI Enabled
615,523 UART: [state] LifecycleState = Unprovisioned
617,463 UART: [state] DebugLocked = No
619,058 UART: [state] WD Timer not started. Device not locked for debugging
623,154 UART: [kat] SHA2-256
802,750 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,556 UART: [kat] ++
814,033 UART: [kat] sha1
823,982 UART: [kat] SHA2-256
826,635 UART: [kat] SHA2-384
833,050 UART: [kat] SHA2-512-ACC
835,419 UART: [kat] ECC-384
3,274,888 UART: [kat] HMAC-384Kdf
3,286,695 UART: [kat] LMS
3,763,241 UART: [kat] --
3,765,393 UART: [cold-reset] ++
3,767,779 UART: [fht] FHT @ 0x50003400
3,778,968 UART: [idev] ++
3,779,531 UART: [idev] CDI.KEYID = 6
3,780,559 UART: [idev] SUBJECT.KEYID = 7
3,781,730 UART: [idev] UDS.KEYID = 0
3,782,650 ready_for_fw is high
3,782,829 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,927,118 UART: [idev] Erasing UDS.KEYID = 0
6,260,067 UART: [idev] Sha1 KeyId Algorithm
6,284,213 UART: [idev] --
6,288,832 UART: [ldev] ++
6,289,413 UART: [ldev] CDI.KEYID = 6
6,290,325 UART: [ldev] SUBJECT.KEYID = 5
6,291,536 UART: [ldev] AUTHORITY.KEYID = 7
6,292,766 UART: [ldev] FE.KEYID = 1
6,303,785 UART: [ldev] Erasing FE.KEYID = 1
8,781,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,515,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,568,901 UART: [ldev] --
10,573,785 UART: [fwproc] Wait for Commands...
10,577,064 UART: [fwproc] Recv command 0x46574c44
10,579,047 UART: [fwproc] Recv'd Img size: 114888 bytes
14,012,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,092,179 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,152,386 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,480,546 >>> mbox cmd response: success
14,485,175 UART: [afmc] ++
14,485,787 UART: [afmc] CDI.KEYID = 6
14,486,706 UART: [afmc] SUBJECT.KEYID = 7
14,487,937 UART: [afmc] AUTHORITY.KEYID = 5
16,996,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,533 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,739,413 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,755,465 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,771,128 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,795,575 UART: [afmc] --
20,866,238 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
21,005,666 UART: [cold-reset] --
21,006,603 UART: [state] Locking Datavault
21,007,774 UART: [state] Locking PCR0, PCR1 and PCR31
21,009,315 UART: [state] Locking ICCM
21,010,240 UART: [exit] Launching FMC @ 0x40000000
21,011,663 UART:
21,011,827 UART: Running Caliptra FMC ...
21,012,921 UART:
21,013,077 UART: [fmc] Received command: 0x46574C44
21,014,531 UART:
21,014,685 UART: Running Caliptra ROM ...
21,015,780 UART:
21,015,933 UART: [state] CFI Enabled
21,024,309 UART: [state] LifecycleState = Unprovisioned
21,026,220 UART: [state] DebugLocked = No
21,028,359 UART: [state] WD Timer not started. Device not locked for debugging
21,031,503 UART: [kat] SHA2-256
21,211,234 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
21,221,978 UART: [kat] ++
21,222,571 UART: [kat] sha1
21,233,701 UART: [kat] SHA2-256
21,236,285 UART: [kat] SHA2-384
21,242,066 UART: [kat] SHA2-512-ACC
21,244,418 UART: [kat] ECC-384
23,685,567 UART: [kat] HMAC-384Kdf
23,697,897 UART: [kat] LMS
24,174,319 UART: [kat] --
24,179,835 UART: [update-reset] ++
24,225,422 >>> mbox cmd response: failed
24,225,808 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,228,041 UART: ROM Non-Fatal Error: 0x000B001E
24,231,251 UART: [state] Locking Datavault
24,234,067 UART: [state] Locking PCR0, PCR1 and PCR31
24,235,816 UART: [state] Locking ICCM
24,236,986 UART: [exit] Launching FMC @ 0x40000000
24,245,321 UART:
24,245,556 UART: Running Caliptra FMC ...
24,246,654 UART:
24,246,809 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,248,435 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
3,775,446 ready_for_fw is high
3,775,985 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,379,363 >>> mbox cmd response: success
20,682,603 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
20,821,776 UART:
20,822,205 UART: Running Caliptra FMC ...
20,823,387 UART:
20,823,554 UART: [fmc] Received command: 0x46574C44
24,034,621 >>> mbox cmd response: failed
24,035,071 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,047,995 UART:
24,048,253 UART: Running Caliptra FMC ...
24,049,401 UART:
24,049,566 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,051,211 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,724 UART: [kat] SHA2-256
901,664 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
915,939 UART: [kat] HMAC-384Kdf
920,541 UART: [kat] LMS
1,168,853 UART: [kat] --
1,169,620 UART: [cold-reset] ++
1,170,028 UART: [fht] FHT @ 0x50003400
1,172,512 UART: [idev] ++
1,172,680 UART: [idev] CDI.KEYID = 6
1,173,041 UART: [idev] SUBJECT.KEYID = 7
1,173,466 UART: [idev] UDS.KEYID = 0
1,173,812 ready_for_fw is high
1,173,812 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,003 UART: [idev] Erasing UDS.KEYID = 0
1,198,727 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,674 UART: [ldev] ++
1,208,842 UART: [ldev] CDI.KEYID = 6
1,209,206 UART: [ldev] SUBJECT.KEYID = 5
1,209,633 UART: [ldev] AUTHORITY.KEYID = 7
1,210,096 UART: [ldev] FE.KEYID = 1
1,215,608 UART: [ldev] Erasing FE.KEYID = 1
1,241,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,280 UART: [ldev] --
1,280,657 UART: [fwproc] Wait for Commands...
1,281,302 UART: [fwproc] Recv command 0x46574c44
1,282,035 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,612,489 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,174 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,561 >>> mbox cmd response: success
2,779,683 UART: [afmc] ++
2,779,851 UART: [afmc] CDI.KEYID = 6
2,780,214 UART: [afmc] SUBJECT.KEYID = 7
2,780,640 UART: [afmc] AUTHORITY.KEYID = 5
2,815,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,207 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,838,922 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,844,814 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,850,526 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,858,285 UART: [afmc] --
2,859,290 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,859,312 UART: [cold-reset] --
2,860,100 UART: [state] Locking Datavault
2,861,229 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,833 UART: [state] Locking ICCM
2,862,335 UART: [exit] Launching FMC @ 0x40000000
2,867,632 UART:
2,867,648 UART: Running Caliptra FMC ...
2,868,056 UART:
2,868,286 UART: [fmc] Received command: 0x46574C44
2,869,112 UART:
2,869,128 UART: Running Caliptra ROM ...
2,869,536 UART:
2,869,591 UART: [state] CFI Enabled
2,872,063 UART: [state] LifecycleState = Unprovisioned
2,872,718 UART: [state] DebugLocked = No
2,873,216 UART: [state] WD Timer not started. Device not locked for debugging
2,874,468 UART: [kat] SHA2-256
3,678,018 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,122 UART: [kat] ++
3,682,274 UART: [kat] sha1
3,686,560 UART: [kat] SHA2-256
3,688,500 UART: [kat] SHA2-384
3,691,363 UART: [kat] SHA2-512-ACC
3,693,263 UART: [kat] ECC-384
3,702,514 UART: [kat] HMAC-384Kdf
3,707,006 UART: [kat] LMS
3,955,318 UART: [kat] --
3,956,214 UART: [update-reset] ++
3,973,256 >>> mbox cmd response: failed
3,973,256 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,973,846 UART: ROM Non-Fatal Error: 0x000B001E
3,974,766 UART: [state] Locking Datavault
3,975,522 UART: [state] Locking PCR0, PCR1 and PCR31
3,976,126 UART: [state] Locking ICCM
3,976,772 UART: [exit] Launching FMC @ 0x40000000
3,982,069 UART:
3,982,085 UART: Running Caliptra FMC ...
3,982,493 UART:
3,982,715 UART: [fmc] Received command: 0x1000000C
3,983,450 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,420 ready_for_fw is high
1,059,420 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,634,010 >>> mbox cmd response: success
2,689,639 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,695,782 UART:
2,695,798 UART: Running Caliptra FMC ...
2,696,206 UART:
2,696,436 UART: [fmc] Received command: 0x46574C44
3,688,617 >>> mbox cmd response: failed
3,688,617 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,694,238 UART:
3,694,254 UART: Running Caliptra FMC ...
3,694,662 UART:
3,694,884 UART: [fmc] Received command: 0x1000000C
3,695,619 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,619 UART: [kat] ++
895,771 UART: [kat] sha1
900,051 UART: [kat] SHA2-256
901,991 UART: [kat] SHA2-384
904,880 UART: [kat] SHA2-512-ACC
906,781 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
921,124 UART: [kat] LMS
1,169,436 UART: [kat] --
1,170,063 UART: [cold-reset] ++
1,170,605 UART: [fht] FHT @ 0x50003400
1,173,037 UART: [idev] ++
1,173,205 UART: [idev] CDI.KEYID = 6
1,173,566 UART: [idev] SUBJECT.KEYID = 7
1,173,991 UART: [idev] UDS.KEYID = 0
1,174,337 ready_for_fw is high
1,174,337 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,280 UART: [idev] Erasing UDS.KEYID = 0
1,199,332 UART: [idev] Sha1 KeyId Algorithm
1,208,310 UART: [idev] --
1,209,447 UART: [ldev] ++
1,209,615 UART: [ldev] CDI.KEYID = 6
1,209,979 UART: [ldev] SUBJECT.KEYID = 5
1,210,406 UART: [ldev] AUTHORITY.KEYID = 7
1,210,869 UART: [ldev] FE.KEYID = 1
1,216,181 UART: [ldev] Erasing FE.KEYID = 1
1,242,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,785 UART: [ldev] --
1,282,144 UART: [fwproc] Wait for Commands...
1,282,785 UART: [fwproc] Recv command 0x46574c44
1,283,518 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,613,782 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,467 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,850 >>> mbox cmd response: success
2,780,898 UART: [afmc] ++
2,781,066 UART: [afmc] CDI.KEYID = 6
2,781,429 UART: [afmc] SUBJECT.KEYID = 7
2,781,855 UART: [afmc] AUTHORITY.KEYID = 5
2,818,508 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,828 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,841,543 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,847,435 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,853,147 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,860,758 UART: [afmc] --
2,861,717 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,861,739 UART: [cold-reset] --
2,862,497 UART: [state] Locking Datavault
2,863,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,912 UART: [state] Locking ICCM
2,864,364 UART: [exit] Launching FMC @ 0x40000000
2,869,661 UART:
2,869,677 UART: Running Caliptra FMC ...
2,870,085 UART:
2,870,315 UART: [fmc] Received command: 0x46574C44
2,871,141 UART:
2,871,157 UART: Running Caliptra ROM ...
2,871,565 UART:
2,871,707 UART: [state] CFI Enabled
2,874,465 UART: [state] LifecycleState = Unprovisioned
2,875,120 UART: [state] DebugLocked = No
2,875,698 UART: [state] WD Timer not started. Device not locked for debugging
2,877,058 UART: [kat] SHA2-256
3,680,608 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,712 UART: [kat] ++
3,684,864 UART: [kat] sha1
3,689,026 UART: [kat] SHA2-256
3,690,966 UART: [kat] SHA2-384
3,693,583 UART: [kat] SHA2-512-ACC
3,695,483 UART: [kat] ECC-384
3,705,348 UART: [kat] HMAC-384Kdf
3,709,974 UART: [kat] LMS
3,958,286 UART: [kat] --
3,959,162 UART: [update-reset] ++
3,975,846 >>> mbox cmd response: failed
3,975,846 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,976,188 UART: ROM Non-Fatal Error: 0x000B001E
3,977,026 UART: [state] Locking Datavault
3,977,868 UART: [state] Locking PCR0, PCR1 and PCR31
3,978,472 UART: [state] Locking ICCM
3,978,982 UART: [exit] Launching FMC @ 0x40000000
3,984,279 UART:
3,984,295 UART: Running Caliptra FMC ...
3,984,703 UART:
3,984,925 UART: [fmc] Received command: 0x1000000C
3,985,660 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 ready_for_fw is high
1,060,045 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,081 >>> mbox cmd response: success
2,687,874 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,693,871 UART:
2,693,887 UART: Running Caliptra FMC ...
2,694,295 UART:
2,694,525 UART: [fmc] Received command: 0x46574C44
3,686,525 >>> mbox cmd response: failed
3,686,525 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,692,200 UART:
3,692,216 UART: Running Caliptra FMC ...
3,692,624 UART:
3,692,846 UART: [fmc] Received command: 0x1000000C
3,693,581 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,430 UART: [kat] ++
895,582 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,567 UART: [kat] SHA2-512-ACC
906,468 UART: [kat] ECC-384
916,373 UART: [kat] HMAC-384Kdf
920,961 UART: [kat] LMS
1,169,273 UART: [kat] --
1,170,008 UART: [cold-reset] ++
1,170,448 UART: [fht] FHT @ 0x50003400
1,173,222 UART: [idev] ++
1,173,390 UART: [idev] CDI.KEYID = 6
1,173,751 UART: [idev] SUBJECT.KEYID = 7
1,174,176 UART: [idev] UDS.KEYID = 0
1,174,522 ready_for_fw is high
1,174,522 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,753 UART: [idev] Erasing UDS.KEYID = 0
1,200,091 UART: [idev] Sha1 KeyId Algorithm
1,209,025 UART: [idev] --
1,210,172 UART: [ldev] ++
1,210,340 UART: [ldev] CDI.KEYID = 6
1,210,704 UART: [ldev] SUBJECT.KEYID = 5
1,211,131 UART: [ldev] AUTHORITY.KEYID = 7
1,211,594 UART: [ldev] FE.KEYID = 1
1,216,902 UART: [ldev] Erasing FE.KEYID = 1
1,243,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,866 UART: [ldev] --
1,282,085 UART: [fwproc] Wait for Commands...
1,282,818 UART: [fwproc] Recv command 0x46574c44
1,283,551 UART: [fwproc] Recv'd Img size: 114888 bytes
2,588,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,614,687 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,372 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,647 >>> mbox cmd response: success
2,781,757 UART: [afmc] ++
2,781,925 UART: [afmc] CDI.KEYID = 6
2,782,288 UART: [afmc] SUBJECT.KEYID = 7
2,782,714 UART: [afmc] AUTHORITY.KEYID = 5
2,818,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,546 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,295 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,841,010 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,846,902 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,852,614 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,860,503 UART: [afmc] --
2,861,354 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,861,376 UART: [cold-reset] --
2,862,242 UART: [state] Locking Datavault
2,863,383 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,987 UART: [state] Locking ICCM
2,864,565 UART: [exit] Launching FMC @ 0x40000000
2,869,862 UART:
2,869,878 UART: Running Caliptra FMC ...
2,870,286 UART:
2,870,516 UART: [fmc] Received command: 0x46574C44
2,871,342 UART:
2,871,358 UART: Running Caliptra ROM ...
2,871,766 UART:
2,871,821 UART: [state] CFI Enabled
2,874,577 UART: [state] LifecycleState = Unprovisioned
2,875,232 UART: [state] DebugLocked = No
2,875,840 UART: [state] WD Timer not started. Device not locked for debugging
2,877,024 UART: [kat] SHA2-256
3,680,574 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,678 UART: [kat] ++
3,684,830 UART: [kat] sha1
3,688,938 UART: [kat] SHA2-256
3,690,878 UART: [kat] SHA2-384
3,693,601 UART: [kat] SHA2-512-ACC
3,695,501 UART: [kat] ECC-384
3,705,104 UART: [kat] HMAC-384Kdf
3,709,596 UART: [kat] LMS
3,957,908 UART: [kat] --
3,958,612 UART: [update-reset] ++
3,975,266 >>> mbox cmd response: failed
3,975,266 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,975,590 UART: ROM Non-Fatal Error: 0x000B001E
3,976,412 UART: [state] Locking Datavault
3,977,188 UART: [state] Locking PCR0, PCR1 and PCR31
3,977,792 UART: [state] Locking ICCM
3,978,342 UART: [exit] Launching FMC @ 0x40000000
3,983,639 UART:
3,983,655 UART: Running Caliptra FMC ...
3,984,063 UART:
3,984,285 UART: [fmc] Received command: 0x1000000C
3,985,020 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,644 ready_for_fw is high
1,058,644 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,138 >>> mbox cmd response: success
2,687,103 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,693,030 UART:
2,693,046 UART: Running Caliptra FMC ...
2,693,454 UART:
2,693,684 UART: [fmc] Received command: 0x46574C44
3,685,575 >>> mbox cmd response: failed
3,685,575 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,691,410 UART:
3,691,426 UART: Running Caliptra FMC ...
3,691,834 UART:
3,692,056 UART: [fmc] Received command: 0x1000000C
3,692,791 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
87,188 UART: [state] WD Timer not started. Device not locked for debugging
88,311 UART: [kat] SHA2-256
891,861 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,965 UART: [kat] ++
896,117 UART: [kat] sha1
900,295 UART: [kat] SHA2-256
902,235 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,762 UART: [kat] HMAC-384Kdf
921,348 UART: [kat] LMS
1,169,660 UART: [kat] --
1,170,617 UART: [cold-reset] ++
1,171,115 UART: [fht] FHT @ 0x50003400
1,173,671 UART: [idev] ++
1,173,839 UART: [idev] CDI.KEYID = 6
1,174,200 UART: [idev] SUBJECT.KEYID = 7
1,174,625 UART: [idev] UDS.KEYID = 0
1,174,971 ready_for_fw is high
1,174,971 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,766 UART: [idev] Erasing UDS.KEYID = 0
1,200,036 UART: [idev] Sha1 KeyId Algorithm
1,208,858 UART: [idev] --
1,209,895 UART: [ldev] ++
1,210,063 UART: [ldev] CDI.KEYID = 6
1,210,427 UART: [ldev] SUBJECT.KEYID = 5
1,210,854 UART: [ldev] AUTHORITY.KEYID = 7
1,211,317 UART: [ldev] FE.KEYID = 1
1,216,699 UART: [ldev] Erasing FE.KEYID = 1
1,243,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,255 UART: [ldev] --
1,282,594 UART: [fwproc] Wait for Commands...
1,283,307 UART: [fwproc] Recv command 0x46574c44
1,284,040 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,613,908 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,593 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,834 >>> mbox cmd response: success
2,781,086 UART: [afmc] ++
2,781,254 UART: [afmc] CDI.KEYID = 6
2,781,617 UART: [afmc] SUBJECT.KEYID = 7
2,782,043 UART: [afmc] AUTHORITY.KEYID = 5
2,818,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,170 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,840,885 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,846,777 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,852,489 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,860,196 UART: [afmc] --
2,861,081 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,861,103 UART: [cold-reset] --
2,861,777 UART: [state] Locking Datavault
2,862,898 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,502 UART: [state] Locking ICCM
2,864,042 UART: [exit] Launching FMC @ 0x40000000
2,869,339 UART:
2,869,355 UART: Running Caliptra FMC ...
2,869,763 UART:
2,869,993 UART: [fmc] Received command: 0x46574C44
2,870,819 UART:
2,870,835 UART: Running Caliptra ROM ...
2,871,243 UART:
2,871,385 UART: [state] CFI Enabled
2,874,307 UART: [state] LifecycleState = Unprovisioned
2,874,962 UART: [state] DebugLocked = No
2,875,558 UART: [state] WD Timer not started. Device not locked for debugging
2,876,674 UART: [kat] SHA2-256
3,680,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,328 UART: [kat] ++
3,684,480 UART: [kat] sha1
3,688,656 UART: [kat] SHA2-256
3,690,596 UART: [kat] SHA2-384
3,693,197 UART: [kat] SHA2-512-ACC
3,695,097 UART: [kat] ECC-384
3,704,922 UART: [kat] HMAC-384Kdf
3,709,578 UART: [kat] LMS
3,957,890 UART: [kat] --
3,958,658 UART: [update-reset] ++
3,975,396 >>> mbox cmd response: failed
3,975,396 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,975,702 UART: ROM Non-Fatal Error: 0x000B001E
3,976,506 UART: [state] Locking Datavault
3,977,382 UART: [state] Locking PCR0, PCR1 and PCR31
3,977,986 UART: [state] Locking ICCM
3,978,592 UART: [exit] Launching FMC @ 0x40000000
3,983,889 UART:
3,983,905 UART: Running Caliptra FMC ...
3,984,313 UART:
3,984,535 UART: [fmc] Received command: 0x1000000C
3,985,270 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,035 ready_for_fw is high
1,059,035 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,119 >>> mbox cmd response: success
2,686,300 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,692,903 UART:
2,692,919 UART: Running Caliptra FMC ...
2,693,327 UART:
2,693,557 UART: [fmc] Received command: 0x46574C44
3,686,307 >>> mbox cmd response: failed
3,686,307 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,691,700 UART:
3,691,716 UART: Running Caliptra FMC ...
3,692,124 UART:
3,692,346 UART: [fmc] Received command: 0x1000000C
3,693,081 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
891,456 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,560 UART: [kat] ++
895,712 UART: [kat] sha1
899,908 UART: [kat] SHA2-256
901,848 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,447 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,640 UART: [fht] FHT @ 0x50003400
1,173,246 UART: [idev] ++
1,173,414 UART: [idev] CDI.KEYID = 6
1,173,775 UART: [idev] SUBJECT.KEYID = 7
1,174,200 UART: [idev] UDS.KEYID = 0
1,174,546 ready_for_fw is high
1,174,546 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,499 UART: [idev] Erasing UDS.KEYID = 0
1,198,709 UART: [idev] Sha1 KeyId Algorithm
1,207,573 UART: [idev] --
1,208,588 UART: [ldev] ++
1,208,756 UART: [ldev] CDI.KEYID = 6
1,209,120 UART: [ldev] SUBJECT.KEYID = 5
1,209,547 UART: [ldev] AUTHORITY.KEYID = 7
1,210,010 UART: [ldev] FE.KEYID = 1
1,215,508 UART: [ldev] Erasing FE.KEYID = 1
1,242,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,506 UART: [ldev] --
1,281,769 UART: [fwproc] Wait for Commands...
1,282,524 UART: [fwproc] Recv command 0x46574c44
1,283,257 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,613,221 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,906 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,265 >>> mbox cmd response: success
2,780,377 UART: [afmc] ++
2,780,545 UART: [afmc] CDI.KEYID = 6
2,780,908 UART: [afmc] SUBJECT.KEYID = 7
2,781,334 UART: [afmc] AUTHORITY.KEYID = 5
2,817,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,412 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,161 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,839,876 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,845,768 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,851,480 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,859,289 UART: [afmc] --
2,860,120 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,860,142 UART: [cold-reset] --
2,860,964 UART: [state] Locking Datavault
2,862,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,781 UART: [state] Locking ICCM
2,863,263 UART: [exit] Launching FMC @ 0x40000000
2,868,560 UART:
2,868,576 UART: Running Caliptra FMC ...
2,868,984 UART:
2,869,214 UART: [fmc] Received command: 0x46574C44
2,870,040 UART:
2,870,056 UART: Running Caliptra ROM ...
2,870,464 UART:
2,870,519 UART: [state] CFI Enabled
2,873,385 UART: [state] LifecycleState = Unprovisioned
2,874,040 UART: [state] DebugLocked = No
2,874,734 UART: [state] WD Timer not started. Device not locked for debugging
2,875,990 UART: [kat] SHA2-256
3,679,540 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,644 UART: [kat] ++
3,683,796 UART: [kat] sha1
3,688,124 UART: [kat] SHA2-256
3,690,064 UART: [kat] SHA2-384
3,692,693 UART: [kat] SHA2-512-ACC
3,694,593 UART: [kat] ECC-384
3,704,028 UART: [kat] HMAC-384Kdf
3,708,598 UART: [kat] LMS
3,956,910 UART: [kat] --
3,957,750 UART: [update-reset] ++
3,974,270 >>> mbox cmd response: failed
3,974,270 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,974,576 UART: ROM Non-Fatal Error: 0x000B001E
3,975,412 UART: [state] Locking Datavault
3,976,150 UART: [state] Locking PCR0, PCR1 and PCR31
3,976,754 UART: [state] Locking ICCM
3,977,256 UART: [exit] Launching FMC @ 0x40000000
3,982,553 UART:
3,982,569 UART: Running Caliptra FMC ...
3,982,977 UART:
3,983,199 UART: [fmc] Received command: 0x1000000C
3,983,934 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,228 ready_for_fw is high
1,059,228 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,148 >>> mbox cmd response: success
2,686,067 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,692,250 UART:
2,692,266 UART: Running Caliptra FMC ...
2,692,674 UART:
2,692,904 UART: [fmc] Received command: 0x46574C44
3,684,787 >>> mbox cmd response: failed
3,684,787 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,690,062 UART:
3,690,078 UART: Running Caliptra FMC ...
3,690,486 UART:
3,690,708 UART: [fmc] Received command: 0x1000000C
3,691,443 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
900,223 UART: [kat] SHA2-256
902,163 UART: [kat] SHA2-384
904,752 UART: [kat] SHA2-512-ACC
906,653 UART: [kat] ECC-384
916,774 UART: [kat] HMAC-384Kdf
921,454 UART: [kat] LMS
1,169,766 UART: [kat] --
1,170,827 UART: [cold-reset] ++
1,171,345 UART: [fht] FHT @ 0x50003400
1,174,095 UART: [idev] ++
1,174,263 UART: [idev] CDI.KEYID = 6
1,174,624 UART: [idev] SUBJECT.KEYID = 7
1,175,049 UART: [idev] UDS.KEYID = 0
1,175,395 ready_for_fw is high
1,175,395 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,183,542 UART: [idev] Erasing UDS.KEYID = 0
1,200,694 UART: [idev] Sha1 KeyId Algorithm
1,209,546 UART: [idev] --
1,210,447 UART: [ldev] ++
1,210,615 UART: [ldev] CDI.KEYID = 6
1,210,979 UART: [ldev] SUBJECT.KEYID = 5
1,211,406 UART: [ldev] AUTHORITY.KEYID = 7
1,211,869 UART: [ldev] FE.KEYID = 1
1,217,099 UART: [ldev] Erasing FE.KEYID = 1
1,243,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,751 UART: [ldev] --
1,282,014 UART: [fwproc] Wait for Commands...
1,282,729 UART: [fwproc] Recv command 0x46574c44
1,283,462 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,613,530 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,215 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,524 >>> mbox cmd response: success
2,780,662 UART: [afmc] ++
2,780,830 UART: [afmc] CDI.KEYID = 6
2,781,193 UART: [afmc] SUBJECT.KEYID = 7
2,781,619 UART: [afmc] AUTHORITY.KEYID = 5
2,817,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,701 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,450 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,840,165 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,846,057 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,851,769 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,859,648 UART: [afmc] --
2,860,603 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,860,625 UART: [cold-reset] --
2,861,509 UART: [state] Locking Datavault
2,862,626 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,230 UART: [state] Locking ICCM
2,863,742 UART: [exit] Launching FMC @ 0x40000000
2,869,039 UART:
2,869,055 UART: Running Caliptra FMC ...
2,869,463 UART:
2,869,693 UART: [fmc] Received command: 0x46574C44
2,870,519 UART:
2,870,535 UART: Running Caliptra ROM ...
2,870,943 UART:
2,871,085 UART: [state] CFI Enabled
2,874,023 UART: [state] LifecycleState = Unprovisioned
2,874,678 UART: [state] DebugLocked = No
2,875,354 UART: [state] WD Timer not started. Device not locked for debugging
2,876,660 UART: [kat] SHA2-256
3,680,210 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,314 UART: [kat] ++
3,684,466 UART: [kat] sha1
3,688,750 UART: [kat] SHA2-256
3,690,690 UART: [kat] SHA2-384
3,693,459 UART: [kat] SHA2-512-ACC
3,695,359 UART: [kat] ECC-384
3,705,228 UART: [kat] HMAC-384Kdf
3,709,808 UART: [kat] LMS
3,958,120 UART: [kat] --
3,958,900 UART: [update-reset] ++
3,975,454 >>> mbox cmd response: failed
3,975,454 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,975,880 UART: ROM Non-Fatal Error: 0x000B001E
3,976,780 UART: [state] Locking Datavault
3,977,572 UART: [state] Locking PCR0, PCR1 and PCR31
3,978,176 UART: [state] Locking ICCM
3,978,632 UART: [exit] Launching FMC @ 0x40000000
3,983,929 UART:
3,983,945 UART: Running Caliptra FMC ...
3,984,353 UART:
3,984,575 UART: [fmc] Received command: 0x1000000C
3,985,310 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,161 ready_for_fw is high
1,059,161 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,265 >>> mbox cmd response: success
2,688,468 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,694,495 UART:
2,694,511 UART: Running Caliptra FMC ...
2,694,919 UART:
2,695,149 UART: [fmc] Received command: 0x46574C44
3,686,873 >>> mbox cmd response: failed
3,686,873 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,692,516 UART:
3,692,532 UART: Running Caliptra FMC ...
3,692,940 UART:
3,693,162 UART: [fmc] Received command: 0x1000000C
3,693,897 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,060 UART:
192,409 UART: Running Caliptra ROM ...
193,585 UART:
193,743 UART: [state] CFI Enabled
263,514 UART: [state] LifecycleState = Unprovisioned
265,492 UART: [state] DebugLocked = No
266,889 UART: [state] WD Timer not started. Device not locked for debugging
271,354 UART: [kat] SHA2-256
450,993 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,820 UART: [kat] ++
462,364 UART: [kat] sha1
472,681 UART: [kat] SHA2-256
475,352 UART: [kat] SHA2-384
480,280 UART: [kat] SHA2-512-ACC
482,655 UART: [kat] ECC-384
2,925,961 UART: [kat] HMAC-384Kdf
2,950,902 UART: [kat] LMS
3,427,372 UART: [kat] --
3,430,450 UART: [cold-reset] ++
3,432,030 UART: [fht] FHT @ 0x50003400
3,442,944 UART: [idev] ++
3,443,517 UART: [idev] CDI.KEYID = 6
3,444,554 UART: [idev] SUBJECT.KEYID = 7
3,445,733 UART: [idev] UDS.KEYID = 0
3,446,679 ready_for_fw is high
3,446,881 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,591,408 UART: [idev] Erasing UDS.KEYID = 0
5,967,780 UART: [idev] Sha1 KeyId Algorithm
5,991,133 UART: [idev] --
5,996,562 UART: [ldev] ++
5,997,150 UART: [ldev] CDI.KEYID = 6
5,998,065 UART: [ldev] SUBJECT.KEYID = 5
5,999,284 UART: [ldev] AUTHORITY.KEYID = 7
6,000,523 UART: [ldev] FE.KEYID = 1
6,036,729 UART: [ldev] Erasing FE.KEYID = 1
8,540,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,948 UART: [ldev] --
10,351,810 UART: [fwproc] Wait for Commands...
10,353,853 UART: [fwproc] Recv command 0x46574c44
10,355,843 UART: [fwproc] Recv'd Img size: 114888 bytes
14,863,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,954,921 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,015,151 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,342,587 >>> mbox cmd response: success
15,346,762 UART: [afmc] ++
15,347,361 UART: [afmc] CDI.KEYID = 6
15,348,276 UART: [afmc] SUBJECT.KEYID = 7
15,349,497 UART: [afmc] AUTHORITY.KEYID = 5
17,893,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,616,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,618,725 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,634,607 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,650,630 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,666,186 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,689,973 UART: [afmc] --
19,694,755 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
19,839,745 UART: [cold-reset] --
19,840,604 UART: [state] Locking Datavault
19,841,772 UART: [state] Locking PCR0, PCR1 and PCR31
19,843,318 UART: [state] Locking ICCM
19,844,233 UART: [exit] Launching FMC @ 0x40000000
19,845,659 UART:
19,845,824 UART: Running Caliptra FMC ...
19,846,928 UART:
19,847,095 UART: [fmc] Received command: 0x46574C44
19,848,483 UART:
19,848,635 UART: Running Caliptra ROM ...
19,849,733 UART:
19,849,897 UART: [state] CFI Enabled
19,911,971 UART: [state] LifecycleState = Unprovisioned
19,913,957 UART: [state] DebugLocked = No
19,915,889 UART: [state] WD Timer not started. Device not locked for debugging
19,919,498 UART: [kat] SHA2-256
20,099,182 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
20,109,978 UART: [kat] ++
20,110,522 UART: [kat] sha1
20,121,911 UART: [kat] SHA2-256
20,124,659 UART: [kat] SHA2-384
20,129,888 UART: [kat] SHA2-512-ACC
20,132,245 UART: [kat] ECC-384
22,594,593 UART: [kat] HMAC-384Kdf
22,615,300 UART: [kat] LMS
23,091,722 UART: [kat] --
23,098,628 UART: [update-reset] ++
23,155,142 >>> mbox cmd response: failed
23,155,548 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,158,690 UART: ROM Non-Fatal Error: 0x000B003D
23,161,038 UART: [state] Locking Datavault
23,163,707 UART: [state] Locking PCR0, PCR1 and PCR31
23,165,409 UART: [state] Locking ICCM
23,167,377 UART: [exit] Launching FMC @ 0x40000000
23,175,721 UART:
23,175,959 UART: Running Caliptra FMC ...
23,177,189 UART:
23,177,359 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,178,923 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,462,363 ready_for_fw is high
3,462,761 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,330,380 >>> mbox cmd response: success
19,611,447 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
19,756,402 UART:
19,756,773 UART: Running Caliptra FMC ...
19,757,964 UART:
19,758,142 UART: [fmc] Received command: 0x46574C44
23,059,528 >>> mbox cmd response: failed
23,060,015 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,072,081 UART:
23,072,366 UART: Running Caliptra FMC ...
23,073,476 UART:
23,073,638 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,075,301 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,337 UART:
192,706 UART: Running Caliptra ROM ...
193,795 UART:
603,547 UART: [state] CFI Enabled
615,188 UART: [state] LifecycleState = Unprovisioned
617,077 UART: [state] DebugLocked = No
619,170 UART: [state] WD Timer not started. Device not locked for debugging
622,614 UART: [kat] SHA2-256
802,285 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,083 UART: [kat] ++
813,529 UART: [kat] sha1
825,177 UART: [kat] SHA2-256
827,821 UART: [kat] SHA2-384
832,835 UART: [kat] SHA2-512-ACC
835,242 UART: [kat] ECC-384
3,275,777 UART: [kat] HMAC-384Kdf
3,287,938 UART: [kat] LMS
3,764,467 UART: [kat] --
3,771,083 UART: [cold-reset] ++
3,772,301 UART: [fht] FHT @ 0x50003400
3,782,494 UART: [idev] ++
3,783,073 UART: [idev] CDI.KEYID = 6
3,784,110 UART: [idev] SUBJECT.KEYID = 7
3,785,280 UART: [idev] UDS.KEYID = 0
3,786,205 ready_for_fw is high
3,786,393 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,930,634 UART: [idev] Erasing UDS.KEYID = 0
6,259,198 UART: [idev] Sha1 KeyId Algorithm
6,282,311 UART: [idev] --
6,287,248 UART: [ldev] ++
6,287,820 UART: [ldev] CDI.KEYID = 6
6,288,728 UART: [ldev] SUBJECT.KEYID = 5
6,289,939 UART: [ldev] AUTHORITY.KEYID = 7
6,291,224 UART: [ldev] FE.KEYID = 1
6,301,866 UART: [ldev] Erasing FE.KEYID = 1
8,778,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,499,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,515,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,546,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,323 UART: [ldev] --
10,575,095 UART: [fwproc] Wait for Commands...
10,577,782 UART: [fwproc] Recv command 0x46574c44
10,579,823 UART: [fwproc] Recv'd Img size: 114888 bytes
15,067,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,151,494 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,211,721 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,539,417 >>> mbox cmd response: success
15,543,631 UART: [afmc] ++
15,544,237 UART: [afmc] CDI.KEYID = 6
15,545,151 UART: [afmc] SUBJECT.KEYID = 7
15,546,367 UART: [afmc] AUTHORITY.KEYID = 5
18,054,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,776,978 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,779,210 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,795,106 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,811,136 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,826,607 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,851,017 UART: [afmc] --
19,855,703 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
20,000,432 UART: [cold-reset] --
20,001,299 UART: [state] Locking Datavault
20,002,458 UART: [state] Locking PCR0, PCR1 and PCR31
20,003,996 UART: [state] Locking ICCM
20,004,902 UART: [exit] Launching FMC @ 0x40000000
20,006,327 UART:
20,006,489 UART: Running Caliptra FMC ...
20,007,589 UART:
20,007,749 UART: [fmc] Received command: 0x46574C44
20,009,235 UART:
20,009,390 UART: Running Caliptra ROM ...
20,010,404 UART:
20,010,544 UART: [state] CFI Enabled
20,018,130 UART: [state] LifecycleState = Unprovisioned
20,020,062 UART: [state] DebugLocked = No
20,021,525 UART: [state] WD Timer not started. Device not locked for debugging
20,025,090 UART: [kat] SHA2-256
20,204,835 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
20,215,608 UART: [kat] ++
20,216,057 UART: [kat] sha1
20,227,800 UART: [kat] SHA2-256
20,230,492 UART: [kat] SHA2-384
20,235,015 UART: [kat] SHA2-512-ACC
20,237,357 UART: [kat] ECC-384
22,678,882 UART: [kat] HMAC-384Kdf
22,691,013 UART: [kat] LMS
23,167,492 UART: [kat] --
23,173,005 UART: [update-reset] ++
23,221,867 >>> mbox cmd response: failed
23,222,255 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,224,359 UART: ROM Non-Fatal Error: 0x000B003D
23,226,814 UART: [state] Locking Datavault
23,230,600 UART: [state] Locking PCR0, PCR1 and PCR31
23,232,351 UART: [state] Locking ICCM
23,235,044 UART: [exit] Launching FMC @ 0x40000000
23,243,383 UART:
23,243,619 UART: Running Caliptra FMC ...
23,244,716 UART:
23,244,869 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,246,510 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
3,779,475 ready_for_fw is high
3,780,076 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,520,073 >>> mbox cmd response: success
19,759,783 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
19,904,575 UART:
19,904,952 UART: Running Caliptra FMC ...
19,906,143 UART:
19,906,335 UART: [fmc] Received command: 0x46574C44
23,127,810 >>> mbox cmd response: failed
23,128,293 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,141,052 UART:
23,141,312 UART: Running Caliptra FMC ...
23,142,481 UART:
23,142,644 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,144,274 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
920,957 UART: [kat] LMS
1,169,269 UART: [kat] --
1,170,098 UART: [cold-reset] ++
1,170,462 UART: [fht] FHT @ 0x50003400
1,173,024 UART: [idev] ++
1,173,192 UART: [idev] CDI.KEYID = 6
1,173,553 UART: [idev] SUBJECT.KEYID = 7
1,173,978 UART: [idev] UDS.KEYID = 0
1,174,324 ready_for_fw is high
1,174,324 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,223 UART: [idev] Erasing UDS.KEYID = 0
1,199,179 UART: [idev] Sha1 KeyId Algorithm
1,208,151 UART: [idev] --
1,209,138 UART: [ldev] ++
1,209,306 UART: [ldev] CDI.KEYID = 6
1,209,670 UART: [ldev] SUBJECT.KEYID = 5
1,210,097 UART: [ldev] AUTHORITY.KEYID = 7
1,210,560 UART: [ldev] FE.KEYID = 1
1,215,604 UART: [ldev] Erasing FE.KEYID = 1
1,242,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,900 UART: [ldev] --
1,281,329 UART: [fwproc] Wait for Commands...
1,282,006 UART: [fwproc] Recv command 0x46574c44
1,282,739 UART: [fwproc] Recv'd Img size: 114888 bytes
3,125,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,683 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,178,368 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,318,587 >>> mbox cmd response: success
3,319,629 UART: [afmc] ++
3,319,797 UART: [afmc] CDI.KEYID = 6
3,320,160 UART: [afmc] SUBJECT.KEYID = 7
3,320,586 UART: [afmc] AUTHORITY.KEYID = 5
3,355,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,202 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,951 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,378,662 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,384,549 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,390,247 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,398,086 UART: [afmc] --
3,399,061 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,399,083 UART: [cold-reset] --
3,399,839 UART: [state] Locking Datavault
3,401,026 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,630 UART: [state] Locking ICCM
3,402,196 UART: [exit] Launching FMC @ 0x40000000
3,407,493 UART:
3,407,509 UART: Running Caliptra FMC ...
3,407,917 UART:
3,408,147 UART: [fmc] Received command: 0x46574C44
3,408,973 UART:
3,408,989 UART: Running Caliptra ROM ...
3,409,397 UART:
3,409,452 UART: [state] CFI Enabled
3,412,324 UART: [state] LifecycleState = Unprovisioned
3,412,979 UART: [state] DebugLocked = No
3,413,557 UART: [state] WD Timer not started. Device not locked for debugging
3,414,787 UART: [kat] SHA2-256
4,218,337 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,222,441 UART: [kat] ++
4,222,593 UART: [kat] sha1
4,226,935 UART: [kat] SHA2-256
4,228,875 UART: [kat] SHA2-384
4,231,524 UART: [kat] SHA2-512-ACC
4,233,424 UART: [kat] ECC-384
4,243,011 UART: [kat] HMAC-384Kdf
4,247,565 UART: [kat] LMS
4,495,877 UART: [kat] --
4,496,661 UART: [update-reset] ++
4,514,675 >>> mbox cmd response: failed
4,514,675 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,515,187 UART: ROM Non-Fatal Error: 0x000B003D
4,516,067 UART: [state] Locking Datavault
4,516,855 UART: [state] Locking PCR0, PCR1 and PCR31
4,517,459 UART: [state] Locking ICCM
4,517,989 UART: [exit] Launching FMC @ 0x40000000
4,523,286 UART:
4,523,302 UART: Running Caliptra FMC ...
4,523,710 UART:
4,523,932 UART: [fmc] Received command: 0x1000000C
4,524,667 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,414 ready_for_fw is high
1,059,414 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,186,598 >>> mbox cmd response: success
3,242,583 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,248,284 UART:
3,248,300 UART: Running Caliptra FMC ...
3,248,708 UART:
3,248,938 UART: [fmc] Received command: 0x46574C44
4,242,143 >>> mbox cmd response: failed
4,242,143 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,248,030 UART:
4,248,046 UART: Running Caliptra FMC ...
4,248,454 UART:
4,248,676 UART: [fmc] Received command: 0x1000000C
4,249,411 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
891,545 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,649 UART: [kat] ++
895,801 UART: [kat] sha1
900,199 UART: [kat] SHA2-256
902,139 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,376 UART: [kat] HMAC-384Kdf
920,860 UART: [kat] LMS
1,169,172 UART: [kat] --
1,169,877 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,173,217 UART: [idev] ++
1,173,385 UART: [idev] CDI.KEYID = 6
1,173,746 UART: [idev] SUBJECT.KEYID = 7
1,174,171 UART: [idev] UDS.KEYID = 0
1,174,517 ready_for_fw is high
1,174,517 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,046 UART: [idev] Erasing UDS.KEYID = 0
1,199,582 UART: [idev] Sha1 KeyId Algorithm
1,208,438 UART: [idev] --
1,209,585 UART: [ldev] ++
1,209,753 UART: [ldev] CDI.KEYID = 6
1,210,117 UART: [ldev] SUBJECT.KEYID = 5
1,210,544 UART: [ldev] AUTHORITY.KEYID = 7
1,211,007 UART: [ldev] FE.KEYID = 1
1,216,117 UART: [ldev] Erasing FE.KEYID = 1
1,242,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,171 UART: [ldev] --
1,281,506 UART: [fwproc] Wait for Commands...
1,282,107 UART: [fwproc] Recv command 0x46574c44
1,282,840 UART: [fwproc] Recv'd Img size: 114888 bytes
3,135,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,163,016 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,188,701 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,329,084 >>> mbox cmd response: success
3,330,250 UART: [afmc] ++
3,330,418 UART: [afmc] CDI.KEYID = 6
3,330,781 UART: [afmc] SUBJECT.KEYID = 7
3,331,207 UART: [afmc] AUTHORITY.KEYID = 5
3,366,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,382,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,383,452 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,389,163 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,395,050 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,400,748 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,408,629 UART: [afmc] --
3,409,662 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,409,684 UART: [cold-reset] --
3,410,454 UART: [state] Locking Datavault
3,411,815 UART: [state] Locking PCR0, PCR1 and PCR31
3,412,419 UART: [state] Locking ICCM
3,412,961 UART: [exit] Launching FMC @ 0x40000000
3,418,258 UART:
3,418,274 UART: Running Caliptra FMC ...
3,418,682 UART:
3,418,912 UART: [fmc] Received command: 0x46574C44
3,419,738 UART:
3,419,754 UART: Running Caliptra ROM ...
3,420,162 UART:
3,420,304 UART: [state] CFI Enabled
3,423,302 UART: [state] LifecycleState = Unprovisioned
3,423,957 UART: [state] DebugLocked = No
3,424,517 UART: [state] WD Timer not started. Device not locked for debugging
3,425,765 UART: [kat] SHA2-256
4,229,315 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,233,419 UART: [kat] ++
4,233,571 UART: [kat] sha1
4,237,707 UART: [kat] SHA2-256
4,239,647 UART: [kat] SHA2-384
4,242,330 UART: [kat] SHA2-512-ACC
4,244,230 UART: [kat] ECC-384
4,254,275 UART: [kat] HMAC-384Kdf
4,258,885 UART: [kat] LMS
4,507,197 UART: [kat] --
4,507,899 UART: [update-reset] ++
4,525,771 >>> mbox cmd response: failed
4,525,771 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,526,077 UART: ROM Non-Fatal Error: 0x000B003D
4,526,859 UART: [state] Locking Datavault
4,527,751 UART: [state] Locking PCR0, PCR1 and PCR31
4,528,355 UART: [state] Locking ICCM
4,528,997 UART: [exit] Launching FMC @ 0x40000000
4,534,294 UART:
4,534,310 UART: Running Caliptra FMC ...
4,534,718 UART:
4,534,940 UART: [fmc] Received command: 0x1000000C
4,535,675 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,037 ready_for_fw is high
1,060,037 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,189,159 >>> mbox cmd response: success
3,245,340 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,251,565 UART:
3,251,581 UART: Running Caliptra FMC ...
3,251,989 UART:
3,252,219 UART: [fmc] Received command: 0x46574C44
4,245,233 >>> mbox cmd response: failed
4,245,233 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,250,680 UART:
4,250,696 UART: Running Caliptra FMC ...
4,251,104 UART:
4,251,326 UART: [fmc] Received command: 0x1000000C
4,252,061 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,288 UART: [kat] ++
895,440 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
915,723 UART: [kat] HMAC-384Kdf
920,185 UART: [kat] LMS
1,168,497 UART: [kat] --
1,169,546 UART: [cold-reset] ++
1,169,966 UART: [fht] FHT @ 0x50003400
1,172,672 UART: [idev] ++
1,172,840 UART: [idev] CDI.KEYID = 6
1,173,201 UART: [idev] SUBJECT.KEYID = 7
1,173,626 UART: [idev] UDS.KEYID = 0
1,173,972 ready_for_fw is high
1,173,972 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,631 UART: [idev] Erasing UDS.KEYID = 0
1,198,725 UART: [idev] Sha1 KeyId Algorithm
1,207,587 UART: [idev] --
1,208,588 UART: [ldev] ++
1,208,756 UART: [ldev] CDI.KEYID = 6
1,209,120 UART: [ldev] SUBJECT.KEYID = 5
1,209,547 UART: [ldev] AUTHORITY.KEYID = 7
1,210,010 UART: [ldev] FE.KEYID = 1
1,215,516 UART: [ldev] Erasing FE.KEYID = 1
1,241,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,552 UART: [ldev] --
1,280,807 UART: [fwproc] Wait for Commands...
1,281,612 UART: [fwproc] Recv command 0x46574c44
1,282,345 UART: [fwproc] Recv'd Img size: 114888 bytes
3,132,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,582 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,185,267 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,325,642 >>> mbox cmd response: success
3,326,804 UART: [afmc] ++
3,326,972 UART: [afmc] CDI.KEYID = 6
3,327,335 UART: [afmc] SUBJECT.KEYID = 7
3,327,761 UART: [afmc] AUTHORITY.KEYID = 5
3,363,636 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,630 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,386,341 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,392,228 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,397,926 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,405,737 UART: [afmc] --
3,406,768 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,406,790 UART: [cold-reset] --
3,407,658 UART: [state] Locking Datavault
3,408,695 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,299 UART: [state] Locking ICCM
3,409,811 UART: [exit] Launching FMC @ 0x40000000
3,415,108 UART:
3,415,124 UART: Running Caliptra FMC ...
3,415,532 UART:
3,415,762 UART: [fmc] Received command: 0x46574C44
3,416,588 UART:
3,416,604 UART: Running Caliptra ROM ...
3,417,012 UART:
3,417,067 UART: [state] CFI Enabled
3,419,881 UART: [state] LifecycleState = Unprovisioned
3,420,536 UART: [state] DebugLocked = No
3,421,058 UART: [state] WD Timer not started. Device not locked for debugging
3,422,284 UART: [kat] SHA2-256
4,225,834 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,229,938 UART: [kat] ++
4,230,090 UART: [kat] sha1
4,234,240 UART: [kat] SHA2-256
4,236,180 UART: [kat] SHA2-384
4,238,849 UART: [kat] SHA2-512-ACC
4,240,749 UART: [kat] ECC-384
4,250,668 UART: [kat] HMAC-384Kdf
4,255,462 UART: [kat] LMS
4,503,774 UART: [kat] --
4,504,510 UART: [update-reset] ++
4,522,308 >>> mbox cmd response: failed
4,522,308 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,522,728 UART: ROM Non-Fatal Error: 0x000B003D
4,523,602 UART: [state] Locking Datavault
4,524,202 UART: [state] Locking PCR0, PCR1 and PCR31
4,524,806 UART: [state] Locking ICCM
4,525,336 UART: [exit] Launching FMC @ 0x40000000
4,530,633 UART:
4,530,649 UART: Running Caliptra FMC ...
4,531,057 UART:
4,531,279 UART: [fmc] Received command: 0x1000000C
4,532,014 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,356 ready_for_fw is high
1,060,356 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,181,091 >>> mbox cmd response: success
3,236,990 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,243,217 UART:
3,243,233 UART: Running Caliptra FMC ...
3,243,641 UART:
3,243,871 UART: [fmc] Received command: 0x46574C44
4,237,162 >>> mbox cmd response: failed
4,237,162 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,242,925 UART:
4,242,941 UART: Running Caliptra FMC ...
4,243,349 UART:
4,243,571 UART: [fmc] Received command: 0x1000000C
4,244,306 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
891,657 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,761 UART: [kat] ++
895,913 UART: [kat] sha1
900,021 UART: [kat] SHA2-256
901,961 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,910 UART: [kat] LMS
1,169,222 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,467 UART: [fht] FHT @ 0x50003400
1,173,067 UART: [idev] ++
1,173,235 UART: [idev] CDI.KEYID = 6
1,173,596 UART: [idev] SUBJECT.KEYID = 7
1,174,021 UART: [idev] UDS.KEYID = 0
1,174,367 ready_for_fw is high
1,174,367 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,992 UART: [idev] Erasing UDS.KEYID = 0
1,199,506 UART: [idev] Sha1 KeyId Algorithm
1,208,466 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,197 UART: [ldev] Erasing FE.KEYID = 1
1,243,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,901 UART: [ldev] --
1,282,172 UART: [fwproc] Wait for Commands...
1,282,817 UART: [fwproc] Recv command 0x46574c44
1,283,550 UART: [fwproc] Recv'd Img size: 114888 bytes
3,134,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,162,531 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,188,216 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,328,435 >>> mbox cmd response: success
3,329,483 UART: [afmc] ++
3,329,651 UART: [afmc] CDI.KEYID = 6
3,330,014 UART: [afmc] SUBJECT.KEYID = 7
3,330,440 UART: [afmc] AUTHORITY.KEYID = 5
3,366,117 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,382,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,383,469 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,389,180 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,395,067 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,400,765 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,408,468 UART: [afmc] --
3,409,463 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,409,485 UART: [cold-reset] --
3,410,309 UART: [state] Locking Datavault
3,411,614 UART: [state] Locking PCR0, PCR1 and PCR31
3,412,218 UART: [state] Locking ICCM
3,412,644 UART: [exit] Launching FMC @ 0x40000000
3,417,941 UART:
3,417,957 UART: Running Caliptra FMC ...
3,418,365 UART:
3,418,595 UART: [fmc] Received command: 0x46574C44
3,419,421 UART:
3,419,437 UART: Running Caliptra ROM ...
3,419,845 UART:
3,419,987 UART: [state] CFI Enabled
3,422,689 UART: [state] LifecycleState = Unprovisioned
3,423,344 UART: [state] DebugLocked = No
3,424,046 UART: [state] WD Timer not started. Device not locked for debugging
3,425,200 UART: [kat] SHA2-256
4,228,750 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,232,854 UART: [kat] ++
4,233,006 UART: [kat] sha1
4,237,178 UART: [kat] SHA2-256
4,239,118 UART: [kat] SHA2-384
4,241,773 UART: [kat] SHA2-512-ACC
4,243,673 UART: [kat] ECC-384
4,253,246 UART: [kat] HMAC-384Kdf
4,258,010 UART: [kat] LMS
4,506,322 UART: [kat] --
4,507,164 UART: [update-reset] ++
4,524,422 >>> mbox cmd response: failed
4,524,422 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,524,958 UART: ROM Non-Fatal Error: 0x000B003D
4,525,750 UART: [state] Locking Datavault
4,526,502 UART: [state] Locking PCR0, PCR1 and PCR31
4,527,106 UART: [state] Locking ICCM
4,527,676 UART: [exit] Launching FMC @ 0x40000000
4,532,973 UART:
4,532,989 UART: Running Caliptra FMC ...
4,533,397 UART:
4,533,619 UART: [fmc] Received command: 0x1000000C
4,534,354 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,917 ready_for_fw is high
1,058,917 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,176,855 >>> mbox cmd response: success
3,232,692 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,238,713 UART:
3,238,729 UART: Running Caliptra FMC ...
3,239,137 UART:
3,239,367 UART: [fmc] Received command: 0x46574C44
4,231,625 >>> mbox cmd response: failed
4,231,625 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,237,474 UART:
4,237,490 UART: Running Caliptra FMC ...
4,237,898 UART:
4,238,120 UART: [fmc] Received command: 0x1000000C
4,238,855 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,684 UART: [state] LifecycleState = Unprovisioned
85,339 UART: [state] DebugLocked = No
85,939 UART: [state] WD Timer not started. Device not locked for debugging
87,084 UART: [kat] SHA2-256
890,634 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,738 UART: [kat] ++
894,890 UART: [kat] sha1
899,246 UART: [kat] SHA2-256
901,186 UART: [kat] SHA2-384
903,831 UART: [kat] SHA2-512-ACC
905,732 UART: [kat] ECC-384
915,105 UART: [kat] HMAC-384Kdf
919,661 UART: [kat] LMS
1,167,973 UART: [kat] --
1,168,890 UART: [cold-reset] ++
1,169,332 UART: [fht] FHT @ 0x50003400
1,171,974 UART: [idev] ++
1,172,142 UART: [idev] CDI.KEYID = 6
1,172,503 UART: [idev] SUBJECT.KEYID = 7
1,172,928 UART: [idev] UDS.KEYID = 0
1,173,274 ready_for_fw is high
1,173,274 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,123 UART: [idev] Erasing UDS.KEYID = 0
1,198,749 UART: [idev] Sha1 KeyId Algorithm
1,207,713 UART: [idev] --
1,208,892 UART: [ldev] ++
1,209,060 UART: [ldev] CDI.KEYID = 6
1,209,424 UART: [ldev] SUBJECT.KEYID = 5
1,209,851 UART: [ldev] AUTHORITY.KEYID = 7
1,210,314 UART: [ldev] FE.KEYID = 1
1,215,260 UART: [ldev] Erasing FE.KEYID = 1
1,241,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,966 UART: [ldev] --
1,280,325 UART: [fwproc] Wait for Commands...
1,281,144 UART: [fwproc] Recv command 0x46574c44
1,281,877 UART: [fwproc] Recv'd Img size: 114888 bytes
3,129,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,775 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,183,460 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,323,663 >>> mbox cmd response: success
3,324,857 UART: [afmc] ++
3,325,025 UART: [afmc] CDI.KEYID = 6
3,325,388 UART: [afmc] SUBJECT.KEYID = 7
3,325,814 UART: [afmc] AUTHORITY.KEYID = 5
3,360,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,499 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,383,210 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,389,097 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,394,795 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,402,560 UART: [afmc] --
3,403,403 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,403,425 UART: [cold-reset] --
3,404,239 UART: [state] Locking Datavault
3,405,266 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,870 UART: [state] Locking ICCM
3,406,440 UART: [exit] Launching FMC @ 0x40000000
3,411,737 UART:
3,411,753 UART: Running Caliptra FMC ...
3,412,161 UART:
3,412,391 UART: [fmc] Received command: 0x46574C44
3,413,217 UART:
3,413,233 UART: Running Caliptra ROM ...
3,413,641 UART:
3,413,696 UART: [state] CFI Enabled
3,416,134 UART: [state] LifecycleState = Unprovisioned
3,416,789 UART: [state] DebugLocked = No
3,417,431 UART: [state] WD Timer not started. Device not locked for debugging
3,418,537 UART: [kat] SHA2-256
4,222,087 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,226,191 UART: [kat] ++
4,226,343 UART: [kat] sha1
4,230,403 UART: [kat] SHA2-256
4,232,343 UART: [kat] SHA2-384
4,235,084 UART: [kat] SHA2-512-ACC
4,236,984 UART: [kat] ECC-384
4,246,943 UART: [kat] HMAC-384Kdf
4,251,609 UART: [kat] LMS
4,499,921 UART: [kat] --
4,500,613 UART: [update-reset] ++
4,518,117 >>> mbox cmd response: failed
4,518,117 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,518,535 UART: ROM Non-Fatal Error: 0x000B003D
4,519,501 UART: [state] Locking Datavault
4,520,513 UART: [state] Locking PCR0, PCR1 and PCR31
4,521,117 UART: [state] Locking ICCM
4,521,707 UART: [exit] Launching FMC @ 0x40000000
4,527,004 UART:
4,527,020 UART: Running Caliptra FMC ...
4,527,428 UART:
4,527,650 UART: [fmc] Received command: 0x1000000C
4,528,385 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,414 ready_for_fw is high
1,058,414 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,176,972 >>> mbox cmd response: success
3,232,121 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,238,382 UART:
3,238,398 UART: Running Caliptra FMC ...
3,238,806 UART:
3,239,036 UART: [fmc] Received command: 0x46574C44
4,231,991 >>> mbox cmd response: failed
4,231,991 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,237,600 UART:
4,237,616 UART: Running Caliptra FMC ...
4,238,024 UART:
4,238,246 UART: [fmc] Received command: 0x1000000C
4,238,981 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,813 UART: [state] LifecycleState = Unprovisioned
86,468 UART: [state] DebugLocked = No
87,172 UART: [state] WD Timer not started. Device not locked for debugging
88,451 UART: [kat] SHA2-256
892,001 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,105 UART: [kat] ++
896,257 UART: [kat] sha1
900,639 UART: [kat] SHA2-256
902,579 UART: [kat] SHA2-384
905,478 UART: [kat] SHA2-512-ACC
907,379 UART: [kat] ECC-384
917,098 UART: [kat] HMAC-384Kdf
921,902 UART: [kat] LMS
1,170,214 UART: [kat] --
1,171,043 UART: [cold-reset] ++
1,171,445 UART: [fht] FHT @ 0x50003400
1,174,237 UART: [idev] ++
1,174,405 UART: [idev] CDI.KEYID = 6
1,174,766 UART: [idev] SUBJECT.KEYID = 7
1,175,191 UART: [idev] UDS.KEYID = 0
1,175,537 ready_for_fw is high
1,175,537 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,842 UART: [idev] Erasing UDS.KEYID = 0
1,200,156 UART: [idev] Sha1 KeyId Algorithm
1,208,970 UART: [idev] --
1,210,113 UART: [ldev] ++
1,210,281 UART: [ldev] CDI.KEYID = 6
1,210,645 UART: [ldev] SUBJECT.KEYID = 5
1,211,072 UART: [ldev] AUTHORITY.KEYID = 7
1,211,535 UART: [ldev] FE.KEYID = 1
1,217,123 UART: [ldev] Erasing FE.KEYID = 1
1,243,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,769 UART: [ldev] --
1,282,218 UART: [fwproc] Wait for Commands...
1,282,975 UART: [fwproc] Recv command 0x46574c44
1,283,708 UART: [fwproc] Recv'd Img size: 114888 bytes
3,140,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,168,676 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,194,361 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,334,558 >>> mbox cmd response: success
3,335,660 UART: [afmc] ++
3,335,828 UART: [afmc] CDI.KEYID = 6
3,336,191 UART: [afmc] SUBJECT.KEYID = 7
3,336,617 UART: [afmc] AUTHORITY.KEYID = 5
3,371,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,388,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,389,002 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,394,713 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,400,600 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,406,298 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,413,967 UART: [afmc] --
3,414,938 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,414,960 UART: [cold-reset] --
3,415,892 UART: [state] Locking Datavault
3,417,225 UART: [state] Locking PCR0, PCR1 and PCR31
3,417,829 UART: [state] Locking ICCM
3,418,489 UART: [exit] Launching FMC @ 0x40000000
3,423,786 UART:
3,423,802 UART: Running Caliptra FMC ...
3,424,210 UART:
3,424,440 UART: [fmc] Received command: 0x46574C44
3,425,266 UART:
3,425,282 UART: Running Caliptra ROM ...
3,425,690 UART:
3,425,832 UART: [state] CFI Enabled
3,428,802 UART: [state] LifecycleState = Unprovisioned
3,429,457 UART: [state] DebugLocked = No
3,430,043 UART: [state] WD Timer not started. Device not locked for debugging
3,431,393 UART: [kat] SHA2-256
4,234,943 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,239,047 UART: [kat] ++
4,239,199 UART: [kat] sha1
4,243,265 UART: [kat] SHA2-256
4,245,205 UART: [kat] SHA2-384
4,247,892 UART: [kat] SHA2-512-ACC
4,249,792 UART: [kat] ECC-384
4,259,289 UART: [kat] HMAC-384Kdf
4,264,015 UART: [kat] LMS
4,512,327 UART: [kat] --
4,513,199 UART: [update-reset] ++
4,530,633 >>> mbox cmd response: failed
4,530,633 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,530,985 UART: ROM Non-Fatal Error: 0x000B003D
4,531,943 UART: [state] Locking Datavault
4,532,703 UART: [state] Locking PCR0, PCR1 and PCR31
4,533,307 UART: [state] Locking ICCM
4,533,761 UART: [exit] Launching FMC @ 0x40000000
4,539,058 UART:
4,539,074 UART: Running Caliptra FMC ...
4,539,482 UART:
4,539,704 UART: [fmc] Received command: 0x1000000C
4,540,439 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,067 ready_for_fw is high
1,060,067 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,177,527 >>> mbox cmd response: success
3,233,588 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,239,663 UART:
3,239,679 UART: Running Caliptra FMC ...
3,240,087 UART:
3,240,317 UART: [fmc] Received command: 0x46574C44
4,233,591 >>> mbox cmd response: failed
4,233,591 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,239,558 UART:
4,239,574 UART: Running Caliptra FMC ...
4,239,982 UART:
4,240,204 UART: [fmc] Received command: 0x1000000C
4,240,939 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,040 UART:
192,395 UART: Running Caliptra ROM ...
193,514 UART:
193,660 UART: [state] CFI Enabled
263,629 UART: [state] LifecycleState = Unprovisioned
265,561 UART: [state] DebugLocked = No
267,874 UART: [state] WD Timer not started. Device not locked for debugging
272,609 UART: [kat] SHA2-256
452,280 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,087 UART: [kat] ++
463,541 UART: [kat] sha1
474,361 UART: [kat] SHA2-256
477,068 UART: [kat] SHA2-384
483,293 UART: [kat] SHA2-512-ACC
485,670 UART: [kat] ECC-384
2,947,144 UART: [kat] HMAC-384Kdf
2,972,492 UART: [kat] LMS
3,449,016 UART: [kat] --
3,453,732 UART: [cold-reset] ++
3,455,811 UART: [fht] FHT @ 0x50003400
3,465,800 UART: [idev] ++
3,466,365 UART: [idev] CDI.KEYID = 6
3,467,322 UART: [idev] SUBJECT.KEYID = 7
3,468,574 UART: [idev] UDS.KEYID = 0
3,469,496 ready_for_fw is high
3,469,689 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,607,843 UART: [idev] Erasing UDS.KEYID = 0
5,985,679 UART: [idev] Sha1 KeyId Algorithm
6,009,005 UART: [idev] --
6,013,683 UART: [ldev] ++
6,014,271 UART: [ldev] CDI.KEYID = 6
6,015,163 UART: [ldev] SUBJECT.KEYID = 5
6,016,381 UART: [ldev] AUTHORITY.KEYID = 7
6,017,622 UART: [ldev] FE.KEYID = 1
6,059,025 UART: [ldev] Erasing FE.KEYID = 1
8,567,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,781 UART: [ldev] --
10,373,511 UART: [fwproc] Wait for Commands...
10,376,580 UART: [fwproc] Recv command 0x46574c44
10,378,565 UART: [fwproc] Recv'd Img size: 109820 bytes
13,751,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,830,343 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,872,800 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,200,452 >>> mbox cmd response: success
14,204,054 UART: [afmc] ++
14,204,654 UART: [afmc] CDI.KEYID = 6
14,205,544 UART: [afmc] SUBJECT.KEYID = 7
14,206,815 UART: [afmc] AUTHORITY.KEYID = 5
16,744,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,467,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,469,235 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,485,066 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,501,005 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,516,659 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,539,947 UART: [afmc] --
18,543,554 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,544,569 UART: [cold-reset] --
18,546,331 UART: [state] Locking Datavault
18,551,269 UART: [state] Locking PCR0, PCR1 and PCR31
18,553,228 UART: [state] Locking ICCM
18,554,166 UART: [exit] Launching FMC @ 0x40000000
18,562,465 UART:
18,562,704 UART: Running Caliptra FMC ...
18,563,735 UART:
18,563,888 UART: [fmc] Received command: 0x46574C44
18,565,347 UART:
18,565,508 UART: Running Caliptra ROM ...
18,566,528 UART:
18,566,698 UART: [state] CFI Enabled
18,630,898 UART: [state] LifecycleState = Unprovisioned
18,632,786 UART: [state] DebugLocked = No
18,634,527 UART: [state] WD Timer not started. Device not locked for debugging
18,638,212 UART: [kat] SHA2-256
18,817,909 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,828,701 UART: [kat] ++
18,829,163 UART: [kat] sha1
18,840,107 UART: [kat] SHA2-256
18,842,796 UART: [kat] SHA2-384
18,847,161 UART: [kat] SHA2-512-ACC
18,849,510 UART: [kat] ECC-384
21,313,460 UART: [kat] HMAC-384Kdf
21,337,463 UART: [kat] LMS
21,813,905 UART: [kat] --
21,818,767 UART: [update-reset] ++
21,827,178 >>> mbox cmd response: failed
21,829,005 UART: ROM Non-Fatal Error: 0x000B0001
21,831,490 UART: [state] Locking Datavault
21,834,824 UART: [state] Locking PCR0, PCR1 and PCR31
21,836,628 UART: [state] Locking ICCM
21,839,050 UART: [exit] Launching FMC @ 0x40000000
21,847,445 UART:
21,847,698 UART: Running Caliptra FMC ...
21,848,845 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,460,418 ready_for_fw is high
3,460,844 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,071,464 >>> mbox cmd response: success
18,350,293 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,365,613 UART:
18,365,976 UART: Running Caliptra FMC ...
18,367,232 UART:
18,367,406 UART: [fmc] Received command: 0x46574C44
21,633,364 >>> mbox cmd response: failed
21,647,252 UART:
21,647,538 UART: Running Caliptra FMC ...
21,648,701 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
192,353 UART:
192,711 UART: Running Caliptra ROM ...
193,895 UART:
603,714 UART: [state] CFI Enabled
616,914 UART: [state] LifecycleState = Unprovisioned
618,819 UART: [state] DebugLocked = No
621,493 UART: [state] WD Timer not started. Device not locked for debugging
624,944 UART: [kat] SHA2-256
804,572 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,373 UART: [kat] ++
815,823 UART: [kat] sha1
826,335 UART: [kat] SHA2-256
829,057 UART: [kat] SHA2-384
836,265 UART: [kat] SHA2-512-ACC
838,647 UART: [kat] ECC-384
3,280,176 UART: [kat] HMAC-384Kdf
3,292,447 UART: [kat] LMS
3,768,979 UART: [kat] --
3,772,626 UART: [cold-reset] ++
3,774,413 UART: [fht] FHT @ 0x50003400
3,784,821 UART: [idev] ++
3,785,389 UART: [idev] CDI.KEYID = 6
3,786,373 UART: [idev] SUBJECT.KEYID = 7
3,787,614 UART: [idev] UDS.KEYID = 0
3,788,535 ready_for_fw is high
3,788,749 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,926,755 UART: [idev] Erasing UDS.KEYID = 0
6,270,590 UART: [idev] Sha1 KeyId Algorithm
6,294,523 UART: [idev] --
6,299,358 UART: [ldev] ++
6,299,960 UART: [ldev] CDI.KEYID = 6
6,300,870 UART: [ldev] SUBJECT.KEYID = 5
6,302,079 UART: [ldev] AUTHORITY.KEYID = 7
6,303,312 UART: [ldev] FE.KEYID = 1
6,315,463 UART: [ldev] Erasing FE.KEYID = 1
8,796,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,552 UART: [ldev] --
10,589,568 UART: [fwproc] Wait for Commands...
10,591,821 UART: [fwproc] Recv command 0x46574c44
10,593,801 UART: [fwproc] Recv'd Img size: 109820 bytes
13,969,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,048,616 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,091,131 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,420,157 >>> mbox cmd response: success
14,424,549 UART: [afmc] ++
14,425,158 UART: [afmc] CDI.KEYID = 6
14,426,181 UART: [afmc] SUBJECT.KEYID = 7
14,427,342 UART: [afmc] AUTHORITY.KEYID = 5
16,928,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,650,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,652,876 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,668,692 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,684,655 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,700,327 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,724,166 UART: [afmc] --
18,727,715 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,728,448 UART: [cold-reset] --
18,732,179 UART: [state] Locking Datavault
18,737,722 UART: [state] Locking PCR0, PCR1 and PCR31
18,739,477 UART: [state] Locking ICCM
18,741,842 UART: [exit] Launching FMC @ 0x40000000
18,750,180 UART:
18,750,412 UART: Running Caliptra FMC ...
18,751,512 UART:
18,751,674 UART: [fmc] Received command: 0x46574C44
18,753,128 UART:
18,753,283 UART: Running Caliptra ROM ...
18,754,375 UART:
18,754,528 UART: [state] CFI Enabled
18,766,247 UART: [state] LifecycleState = Unprovisioned
18,768,127 UART: [state] DebugLocked = No
18,770,324 UART: [state] WD Timer not started. Device not locked for debugging
18,773,959 UART: [kat] SHA2-256
18,953,690 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,964,448 UART: [kat] ++
18,964,988 UART: [kat] sha1
18,976,897 UART: [kat] SHA2-256
18,979,588 UART: [kat] SHA2-384
18,985,301 UART: [kat] SHA2-512-ACC
18,987,703 UART: [kat] ECC-384
21,429,573 UART: [kat] HMAC-384Kdf
21,442,877 UART: [kat] LMS
21,919,308 UART: [kat] --
21,923,338 UART: [update-reset] ++
21,928,925 >>> mbox cmd response: failed
21,931,990 UART: ROM Non-Fatal Error: 0x000B0001
21,934,169 UART: [state] Locking Datavault
21,938,364 UART: [state] Locking PCR0, PCR1 and PCR31
21,940,111 UART: [state] Locking ICCM
21,941,176 UART: [exit] Launching FMC @ 0x40000000
21,949,509 UART:
21,949,754 UART: Running Caliptra FMC ...
21,950,813 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,782,432 ready_for_fw is high
3,782,832 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,321,328 >>> mbox cmd response: success
18,554,482 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,570,291 UART:
18,570,635 UART: Running Caliptra FMC ...
18,571,903 UART:
18,572,089 UART: [fmc] Received command: 0x46574C44
21,745,265 >>> mbox cmd response: failed
21,760,184 UART:
21,760,492 UART: Running Caliptra FMC ...
21,761,653 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,380 UART: [kat] ++
895,532 UART: [kat] sha1
899,788 UART: [kat] SHA2-256
901,728 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
915,883 UART: [kat] HMAC-384Kdf
920,665 UART: [kat] LMS
1,168,977 UART: [kat] --
1,169,792 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,172,862 UART: [idev] ++
1,173,030 UART: [idev] CDI.KEYID = 6
1,173,391 UART: [idev] SUBJECT.KEYID = 7
1,173,816 UART: [idev] UDS.KEYID = 0
1,174,162 ready_for_fw is high
1,174,162 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,685 UART: [idev] Erasing UDS.KEYID = 0
1,198,823 UART: [idev] Sha1 KeyId Algorithm
1,207,817 UART: [idev] --
1,208,850 UART: [ldev] ++
1,209,018 UART: [ldev] CDI.KEYID = 6
1,209,382 UART: [ldev] SUBJECT.KEYID = 5
1,209,809 UART: [ldev] AUTHORITY.KEYID = 7
1,210,272 UART: [ldev] FE.KEYID = 1
1,215,388 UART: [ldev] Erasing FE.KEYID = 1
1,242,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,098 UART: [ldev] --
1,281,489 UART: [fwproc] Wait for Commands...
1,282,192 UART: [fwproc] Recv command 0x46574c44
1,282,925 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,469 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,552 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,905 >>> mbox cmd response: success
2,715,015 UART: [afmc] ++
2,715,183 UART: [afmc] CDI.KEYID = 6
2,715,546 UART: [afmc] SUBJECT.KEYID = 7
2,715,972 UART: [afmc] AUTHORITY.KEYID = 5
2,751,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,603 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,352 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,072 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,965 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,658 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,441 UART: [afmc] --
2,794,326 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,794,348 UART: [cold-reset] --
2,795,270 UART: [state] Locking Datavault
2,796,589 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,193 UART: [state] Locking ICCM
2,797,663 UART: [exit] Launching FMC @ 0x40000000
2,802,960 UART:
2,802,976 UART: Running Caliptra FMC ...
2,803,384 UART:
2,803,522 UART: [fmc] Received command: 0x46574C44
2,804,351 UART:
2,804,367 UART: Running Caliptra ROM ...
2,804,775 UART:
2,804,830 UART: [state] CFI Enabled
2,807,810 UART: [state] LifecycleState = Unprovisioned
2,808,465 UART: [state] DebugLocked = No
2,809,065 UART: [state] WD Timer not started. Device not locked for debugging
2,810,323 UART: [kat] SHA2-256
3,613,873 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,617,977 UART: [kat] ++
3,618,129 UART: [kat] sha1
3,622,391 UART: [kat] SHA2-256
3,624,331 UART: [kat] SHA2-384
3,627,264 UART: [kat] SHA2-512-ACC
3,629,164 UART: [kat] ECC-384
3,638,857 UART: [kat] HMAC-384Kdf
3,643,531 UART: [kat] LMS
3,891,843 UART: [kat] --
3,892,779 UART: [update-reset] ++
3,894,056 >>> mbox cmd response: failed
3,894,528 UART: ROM Non-Fatal Error: 0x000B0001
3,895,362 UART: [state] Locking Datavault
3,896,064 UART: [state] Locking PCR0, PCR1 and PCR31
3,896,668 UART: [state] Locking ICCM
3,897,256 UART: [exit] Launching FMC @ 0x40000000
3,902,553 UART:
3,902,569 UART: Running Caliptra FMC ...
3,902,977 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,402 ready_for_fw is high
1,059,402 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,288 >>> mbox cmd response: success
2,619,826 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,625,881 UART:
2,625,897 UART: Running Caliptra FMC ...
2,626,305 UART:
2,626,443 UART: [fmc] Received command: 0x46574C44
3,603,712 >>> mbox cmd response: failed
3,609,317 UART:
3,609,333 UART: Running Caliptra FMC ...
3,609,741 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,475 UART: [kat] ++
895,627 UART: [kat] sha1
899,961 UART: [kat] SHA2-256
901,901 UART: [kat] SHA2-384
904,814 UART: [kat] SHA2-512-ACC
906,715 UART: [kat] ECC-384
916,644 UART: [kat] HMAC-384Kdf
921,152 UART: [kat] LMS
1,169,464 UART: [kat] --
1,170,261 UART: [cold-reset] ++
1,170,609 UART: [fht] FHT @ 0x50003400
1,173,317 UART: [idev] ++
1,173,485 UART: [idev] CDI.KEYID = 6
1,173,846 UART: [idev] SUBJECT.KEYID = 7
1,174,271 UART: [idev] UDS.KEYID = 0
1,174,617 ready_for_fw is high
1,174,617 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,058 UART: [idev] Erasing UDS.KEYID = 0
1,199,074 UART: [idev] Sha1 KeyId Algorithm
1,207,830 UART: [idev] --
1,208,893 UART: [ldev] ++
1,209,061 UART: [ldev] CDI.KEYID = 6
1,209,425 UART: [ldev] SUBJECT.KEYID = 5
1,209,852 UART: [ldev] AUTHORITY.KEYID = 7
1,210,315 UART: [ldev] FE.KEYID = 1
1,215,279 UART: [ldev] Erasing FE.KEYID = 1
1,242,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,147 UART: [ldev] --
1,281,548 UART: [fwproc] Wait for Commands...
1,282,169 UART: [fwproc] Recv command 0x46574c44
1,282,902 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,634 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,717 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,870 >>> mbox cmd response: success
2,715,964 UART: [afmc] ++
2,716,132 UART: [afmc] CDI.KEYID = 6
2,716,495 UART: [afmc] SUBJECT.KEYID = 7
2,716,921 UART: [afmc] AUTHORITY.KEYID = 5
2,752,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,107 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,827 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,720 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,413 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,232 UART: [afmc] --
2,796,065 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,796,087 UART: [cold-reset] --
2,796,693 UART: [state] Locking Datavault
2,797,712 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,316 UART: [state] Locking ICCM
2,798,960 UART: [exit] Launching FMC @ 0x40000000
2,804,257 UART:
2,804,273 UART: Running Caliptra FMC ...
2,804,681 UART:
2,804,819 UART: [fmc] Received command: 0x46574C44
2,805,648 UART:
2,805,664 UART: Running Caliptra ROM ...
2,806,072 UART:
2,806,214 UART: [state] CFI Enabled
2,808,744 UART: [state] LifecycleState = Unprovisioned
2,809,399 UART: [state] DebugLocked = No
2,810,095 UART: [state] WD Timer not started. Device not locked for debugging
2,811,273 UART: [kat] SHA2-256
3,614,823 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,618,927 UART: [kat] ++
3,619,079 UART: [kat] sha1
3,623,105 UART: [kat] SHA2-256
3,625,045 UART: [kat] SHA2-384
3,627,782 UART: [kat] SHA2-512-ACC
3,629,682 UART: [kat] ECC-384
3,639,319 UART: [kat] HMAC-384Kdf
3,644,049 UART: [kat] LMS
3,892,361 UART: [kat] --
3,893,235 UART: [update-reset] ++
3,894,470 >>> mbox cmd response: failed
3,894,986 UART: ROM Non-Fatal Error: 0x000B0001
3,895,900 UART: [state] Locking Datavault
3,896,840 UART: [state] Locking PCR0, PCR1 and PCR31
3,897,444 UART: [state] Locking ICCM
3,898,042 UART: [exit] Launching FMC @ 0x40000000
3,903,339 UART:
3,903,355 UART: Running Caliptra FMC ...
3,903,763 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,237 ready_for_fw is high
1,059,237 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,189 >>> mbox cmd response: success
2,622,747 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,628,860 UART:
2,628,876 UART: Running Caliptra FMC ...
2,629,284 UART:
2,629,422 UART: [fmc] Received command: 0x46574C44
3,606,680 >>> mbox cmd response: failed
3,612,729 UART:
3,612,745 UART: Running Caliptra FMC ...
3,613,153 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,188 UART: [kat] ++
895,340 UART: [kat] sha1
899,802 UART: [kat] SHA2-256
901,742 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,581 UART: [kat] LMS
1,168,893 UART: [kat] --
1,169,658 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,174,122 ready_for_fw is high
1,174,122 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,081 UART: [idev] Erasing UDS.KEYID = 0
1,199,357 UART: [idev] Sha1 KeyId Algorithm
1,208,215 UART: [idev] --
1,209,192 UART: [ldev] ++
1,209,360 UART: [ldev] CDI.KEYID = 6
1,209,724 UART: [ldev] SUBJECT.KEYID = 5
1,210,151 UART: [ldev] AUTHORITY.KEYID = 7
1,210,614 UART: [ldev] FE.KEYID = 1
1,215,952 UART: [ldev] Erasing FE.KEYID = 1
1,242,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,268 UART: [ldev] --
1,281,493 UART: [fwproc] Wait for Commands...
1,282,250 UART: [fwproc] Recv command 0x46574c44
1,282,983 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,561 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,644 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,907 >>> mbox cmd response: success
2,714,079 UART: [afmc] ++
2,714,247 UART: [afmc] CDI.KEYID = 6
2,714,610 UART: [afmc] SUBJECT.KEYID = 7
2,715,036 UART: [afmc] AUTHORITY.KEYID = 5
2,751,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,178 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,898 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,791 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,484 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,241 UART: [afmc] --
2,794,052 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,794,074 UART: [cold-reset] --
2,794,992 UART: [state] Locking Datavault
2,796,205 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,809 UART: [state] Locking ICCM
2,797,293 UART: [exit] Launching FMC @ 0x40000000
2,802,590 UART:
2,802,606 UART: Running Caliptra FMC ...
2,803,014 UART:
2,803,152 UART: [fmc] Received command: 0x46574C44
2,803,981 UART:
2,803,997 UART: Running Caliptra ROM ...
2,804,405 UART:
2,804,460 UART: [state] CFI Enabled
2,807,214 UART: [state] LifecycleState = Unprovisioned
2,807,869 UART: [state] DebugLocked = No
2,808,563 UART: [state] WD Timer not started. Device not locked for debugging
2,809,779 UART: [kat] SHA2-256
3,613,329 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,617,433 UART: [kat] ++
3,617,585 UART: [kat] sha1
3,621,789 UART: [kat] SHA2-256
3,623,729 UART: [kat] SHA2-384
3,626,438 UART: [kat] SHA2-512-ACC
3,628,338 UART: [kat] ECC-384
3,638,237 UART: [kat] HMAC-384Kdf
3,642,837 UART: [kat] LMS
3,891,149 UART: [kat] --
3,892,023 UART: [update-reset] ++
3,893,636 >>> mbox cmd response: failed
3,894,012 UART: ROM Non-Fatal Error: 0x000B0001
3,894,778 UART: [state] Locking Datavault
3,895,774 UART: [state] Locking PCR0, PCR1 and PCR31
3,896,378 UART: [state] Locking ICCM
3,896,880 UART: [exit] Launching FMC @ 0x40000000
3,902,177 UART:
3,902,193 UART: Running Caliptra FMC ...
3,902,601 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,820 ready_for_fw is high
1,059,820 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,964 >>> mbox cmd response: success
2,621,838 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,627,963 UART:
2,627,979 UART: Running Caliptra FMC ...
2,628,387 UART:
2,628,525 UART: [fmc] Received command: 0x46574C44
3,604,930 >>> mbox cmd response: failed
3,610,799 UART:
3,610,815 UART: Running Caliptra FMC ...
3,611,223 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,973 UART: [kat] SHA2-256
901,913 UART: [kat] SHA2-384
904,858 UART: [kat] SHA2-512-ACC
906,759 UART: [kat] ECC-384
916,528 UART: [kat] HMAC-384Kdf
921,086 UART: [kat] LMS
1,169,398 UART: [kat] --
1,170,291 UART: [cold-reset] ++
1,170,745 UART: [fht] FHT @ 0x50003400
1,173,623 UART: [idev] ++
1,173,791 UART: [idev] CDI.KEYID = 6
1,174,152 UART: [idev] SUBJECT.KEYID = 7
1,174,577 UART: [idev] UDS.KEYID = 0
1,174,923 ready_for_fw is high
1,174,923 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,738 UART: [idev] Erasing UDS.KEYID = 0
1,199,820 UART: [idev] Sha1 KeyId Algorithm
1,208,664 UART: [idev] --
1,209,707 UART: [ldev] ++
1,209,875 UART: [ldev] CDI.KEYID = 6
1,210,239 UART: [ldev] SUBJECT.KEYID = 5
1,210,666 UART: [ldev] AUTHORITY.KEYID = 7
1,211,129 UART: [ldev] FE.KEYID = 1
1,216,303 UART: [ldev] Erasing FE.KEYID = 1
1,242,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,773 UART: [ldev] --
1,282,148 UART: [fwproc] Wait for Commands...
1,282,761 UART: [fwproc] Recv command 0x46574c44
1,283,494 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,128 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,211 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,574 >>> mbox cmd response: success
2,714,688 UART: [afmc] ++
2,714,856 UART: [afmc] CDI.KEYID = 6
2,715,219 UART: [afmc] SUBJECT.KEYID = 7
2,715,645 UART: [afmc] AUTHORITY.KEYID = 5
2,751,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,523 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,243 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,136 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,829 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,550 UART: [afmc] --
2,794,575 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,794,597 UART: [cold-reset] --
2,795,589 UART: [state] Locking Datavault
2,796,726 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,330 UART: [state] Locking ICCM
2,797,884 UART: [exit] Launching FMC @ 0x40000000
2,803,181 UART:
2,803,197 UART: Running Caliptra FMC ...
2,803,605 UART:
2,803,743 UART: [fmc] Received command: 0x46574C44
2,804,572 UART:
2,804,588 UART: Running Caliptra ROM ...
2,804,996 UART:
2,805,138 UART: [state] CFI Enabled
2,808,078 UART: [state] LifecycleState = Unprovisioned
2,808,733 UART: [state] DebugLocked = No
2,809,425 UART: [state] WD Timer not started. Device not locked for debugging
2,810,659 UART: [kat] SHA2-256
3,614,209 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,618,313 UART: [kat] ++
3,618,465 UART: [kat] sha1
3,622,895 UART: [kat] SHA2-256
3,624,835 UART: [kat] SHA2-384
3,627,638 UART: [kat] SHA2-512-ACC
3,629,538 UART: [kat] ECC-384
3,639,271 UART: [kat] HMAC-384Kdf
3,643,839 UART: [kat] LMS
3,892,151 UART: [kat] --
3,893,293 UART: [update-reset] ++
3,894,882 >>> mbox cmd response: failed
3,895,388 UART: ROM Non-Fatal Error: 0x000B0001
3,896,374 UART: [state] Locking Datavault
3,897,218 UART: [state] Locking PCR0, PCR1 and PCR31
3,897,822 UART: [state] Locking ICCM
3,898,472 UART: [exit] Launching FMC @ 0x40000000
3,903,769 UART:
3,903,785 UART: Running Caliptra FMC ...
3,904,193 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,829 ready_for_fw is high
1,059,829 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,045 >>> mbox cmd response: success
2,623,649 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,629,574 UART:
2,629,590 UART: Running Caliptra FMC ...
2,629,998 UART:
2,630,136 UART: [fmc] Received command: 0x46574C44
3,607,038 >>> mbox cmd response: failed
3,612,839 UART:
3,612,855 UART: Running Caliptra FMC ...
3,613,263 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,116 UART: [kat] ++
895,268 UART: [kat] sha1
899,652 UART: [kat] SHA2-256
901,592 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
916,379 UART: [kat] HMAC-384Kdf
920,987 UART: [kat] LMS
1,169,299 UART: [kat] --
1,170,378 UART: [cold-reset] ++
1,170,882 UART: [fht] FHT @ 0x50003400
1,173,410 UART: [idev] ++
1,173,578 UART: [idev] CDI.KEYID = 6
1,173,939 UART: [idev] SUBJECT.KEYID = 7
1,174,364 UART: [idev] UDS.KEYID = 0
1,174,710 ready_for_fw is high
1,174,710 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,093 UART: [idev] Erasing UDS.KEYID = 0
1,199,371 UART: [idev] Sha1 KeyId Algorithm
1,208,463 UART: [idev] --
1,209,614 UART: [ldev] ++
1,209,782 UART: [ldev] CDI.KEYID = 6
1,210,146 UART: [ldev] SUBJECT.KEYID = 5
1,210,573 UART: [ldev] AUTHORITY.KEYID = 7
1,211,036 UART: [ldev] FE.KEYID = 1
1,215,936 UART: [ldev] Erasing FE.KEYID = 1
1,242,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,334 UART: [ldev] --
1,281,707 UART: [fwproc] Wait for Commands...
1,282,470 UART: [fwproc] Recv command 0x46574c44
1,283,203 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,189 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,272 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,657 >>> mbox cmd response: success
2,715,707 UART: [afmc] ++
2,715,875 UART: [afmc] CDI.KEYID = 6
2,716,238 UART: [afmc] SUBJECT.KEYID = 7
2,716,664 UART: [afmc] AUTHORITY.KEYID = 5
2,752,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,060 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,780 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,673 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,366 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,047 UART: [afmc] --
2,795,878 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,795,900 UART: [cold-reset] --
2,796,994 UART: [state] Locking Datavault
2,798,125 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,729 UART: [state] Locking ICCM
2,799,225 UART: [exit] Launching FMC @ 0x40000000
2,804,522 UART:
2,804,538 UART: Running Caliptra FMC ...
2,804,946 UART:
2,805,084 UART: [fmc] Received command: 0x46574C44
2,805,913 UART:
2,805,929 UART: Running Caliptra ROM ...
2,806,337 UART:
2,806,392 UART: [state] CFI Enabled
2,808,790 UART: [state] LifecycleState = Unprovisioned
2,809,445 UART: [state] DebugLocked = No
2,810,115 UART: [state] WD Timer not started. Device not locked for debugging
2,811,367 UART: [kat] SHA2-256
3,614,917 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,619,021 UART: [kat] ++
3,619,173 UART: [kat] sha1
3,623,289 UART: [kat] SHA2-256
3,625,229 UART: [kat] SHA2-384
3,627,856 UART: [kat] SHA2-512-ACC
3,629,756 UART: [kat] ECC-384
3,639,357 UART: [kat] HMAC-384Kdf
3,644,139 UART: [kat] LMS
3,892,451 UART: [kat] --
3,893,255 UART: [update-reset] ++
3,894,612 >>> mbox cmd response: failed
3,894,974 UART: ROM Non-Fatal Error: 0x000B0001
3,895,834 UART: [state] Locking Datavault
3,896,652 UART: [state] Locking PCR0, PCR1 and PCR31
3,897,256 UART: [state] Locking ICCM
3,897,914 UART: [exit] Launching FMC @ 0x40000000
3,903,211 UART:
3,903,227 UART: Running Caliptra FMC ...
3,903,635 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,590 ready_for_fw is high
1,058,590 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,786 >>> mbox cmd response: success
2,620,486 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,626,871 UART:
2,626,887 UART: Running Caliptra FMC ...
2,627,295 UART:
2,627,433 UART: [fmc] Received command: 0x46574C44
3,604,356 >>> mbox cmd response: failed
3,610,185 UART:
3,610,201 UART: Running Caliptra FMC ...
3,610,609 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,429 UART: [kat] ++
895,581 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,486 UART: [kat] SHA2-512-ACC
906,387 UART: [kat] ECC-384
915,954 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,169,893 UART: [cold-reset] ++
1,170,429 UART: [fht] FHT @ 0x50003400
1,173,243 UART: [idev] ++
1,173,411 UART: [idev] CDI.KEYID = 6
1,173,772 UART: [idev] SUBJECT.KEYID = 7
1,174,197 UART: [idev] UDS.KEYID = 0
1,174,543 ready_for_fw is high
1,174,543 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,150 UART: [idev] Erasing UDS.KEYID = 0
1,199,094 UART: [idev] Sha1 KeyId Algorithm
1,207,910 UART: [idev] --
1,209,027 UART: [ldev] ++
1,209,195 UART: [ldev] CDI.KEYID = 6
1,209,559 UART: [ldev] SUBJECT.KEYID = 5
1,209,986 UART: [ldev] AUTHORITY.KEYID = 7
1,210,449 UART: [ldev] FE.KEYID = 1
1,215,859 UART: [ldev] Erasing FE.KEYID = 1
1,242,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,371 UART: [ldev] --
1,281,762 UART: [fwproc] Wait for Commands...
1,282,343 UART: [fwproc] Recv command 0x46574c44
1,283,076 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,910 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,993 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,324 >>> mbox cmd response: success
2,715,358 UART: [afmc] ++
2,715,526 UART: [afmc] CDI.KEYID = 6
2,715,889 UART: [afmc] SUBJECT.KEYID = 7
2,716,315 UART: [afmc] AUTHORITY.KEYID = 5
2,751,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,892 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,641 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,361 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,254 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,947 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,552 UART: [afmc] --
2,794,547 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,794,569 UART: [cold-reset] --
2,795,655 UART: [state] Locking Datavault
2,796,836 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,440 UART: [state] Locking ICCM
2,798,030 UART: [exit] Launching FMC @ 0x40000000
2,803,327 UART:
2,803,343 UART: Running Caliptra FMC ...
2,803,751 UART:
2,803,889 UART: [fmc] Received command: 0x46574C44
2,804,718 UART:
2,804,734 UART: Running Caliptra ROM ...
2,805,142 UART:
2,805,284 UART: [state] CFI Enabled
2,808,078 UART: [state] LifecycleState = Unprovisioned
2,808,733 UART: [state] DebugLocked = No
2,809,257 UART: [state] WD Timer not started. Device not locked for debugging
2,810,461 UART: [kat] SHA2-256
3,614,011 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,618,115 UART: [kat] ++
3,618,267 UART: [kat] sha1
3,622,599 UART: [kat] SHA2-256
3,624,539 UART: [kat] SHA2-384
3,627,166 UART: [kat] SHA2-512-ACC
3,629,066 UART: [kat] ECC-384
3,638,709 UART: [kat] HMAC-384Kdf
3,643,523 UART: [kat] LMS
3,891,835 UART: [kat] --
3,892,595 UART: [update-reset] ++
3,894,182 >>> mbox cmd response: failed
3,894,602 UART: ROM Non-Fatal Error: 0x000B0001
3,895,608 UART: [state] Locking Datavault
3,896,588 UART: [state] Locking PCR0, PCR1 and PCR31
3,897,192 UART: [state] Locking ICCM
3,897,732 UART: [exit] Launching FMC @ 0x40000000
3,903,029 UART:
3,903,045 UART: Running Caliptra FMC ...
3,903,453 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,887 ready_for_fw is high
1,059,887 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,291 >>> mbox cmd response: success
2,622,473 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,628,876 UART:
2,628,892 UART: Running Caliptra FMC ...
2,629,300 UART:
2,629,438 UART: [fmc] Received command: 0x46574C44
3,607,122 >>> mbox cmd response: failed
3,612,757 UART:
3,612,773 UART: Running Caliptra FMC ...
3,613,181 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
3,576 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,207 UART:
192,589 UART: Running Caliptra ROM ...
193,772 UART:
193,931 UART: [state] CFI Enabled
266,054 UART: [state] LifecycleState = Unprovisioned
268,007 UART: [state] DebugLocked = No
269,726 UART: [state] WD Timer not started. Device not locked for debugging
273,350 UART: [kat] SHA2-256
453,020 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,799 UART: [kat] ++
464,306 UART: [kat] sha1
475,621 UART: [kat] SHA2-256
478,308 UART: [kat] SHA2-384
484,070 UART: [kat] SHA2-512-ACC
486,411 UART: [kat] ECC-384
2,946,684 UART: [kat] HMAC-384Kdf
2,970,680 UART: [kat] LMS
3,447,187 UART: [kat] --
3,451,309 UART: [cold-reset] ++
3,453,635 UART: [fht] FHT @ 0x50003400
3,465,323 UART: [idev] ++
3,465,946 UART: [idev] CDI.KEYID = 6
3,466,873 UART: [idev] SUBJECT.KEYID = 7
3,468,089 UART: [idev] UDS.KEYID = 0
3,500,501 UART: [idev] Erasing UDS.KEYID = 0
5,985,038 UART: [idev] Sha1 KeyId Algorithm
6,008,591 UART: [idev] --
6,014,536 UART: [ldev] ++
6,015,165 UART: [ldev] CDI.KEYID = 6
6,016,058 UART: [ldev] SUBJECT.KEYID = 5
6,017,281 UART: [ldev] AUTHORITY.KEYID = 7
6,018,529 UART: [ldev] FE.KEYID = 1
6,056,870 UART: [ldev] Erasing FE.KEYID = 1
8,565,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,603 UART: [ldev] --
10,371,792 UART: [fwproc] Wait for Commands...
10,374,710 UART: [fwproc] Recv command 0x46505652
10,376,940 UART: [rt] FIPS Version
10,378,508 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,595 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,308,604 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,085 writing to cptra_bootfsm_go
5,213 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
193,371 UART:
193,735 UART: Running Caliptra ROM ...
194,858 UART:
604,679 UART: [state] CFI Enabled
619,873 UART: [state] LifecycleState = Unprovisioned
621,792 UART: [state] DebugLocked = No
623,652 UART: [state] WD Timer not started. Device not locked for debugging
627,906 UART: [kat] SHA2-256
807,559 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,344 UART: [kat] ++
818,786 UART: [kat] sha1
828,847 UART: [kat] SHA2-256
831,543 UART: [kat] SHA2-384
837,624 UART: [kat] SHA2-512-ACC
839,967 UART: [kat] ECC-384
3,281,274 UART: [kat] HMAC-384Kdf
3,294,155 UART: [kat] LMS
3,770,678 UART: [kat] --
3,773,745 UART: [cold-reset] ++
3,775,569 UART: [fht] FHT @ 0x50003400
3,786,222 UART: [idev] ++
3,786,840 UART: [idev] CDI.KEYID = 6
3,787,775 UART: [idev] SUBJECT.KEYID = 7
3,789,037 UART: [idev] UDS.KEYID = 0
3,807,198 UART: [idev] Erasing UDS.KEYID = 0
6,271,870 UART: [idev] Sha1 KeyId Algorithm
6,295,452 UART: [idev] --
6,300,948 UART: [ldev] ++
6,301,535 UART: [ldev] CDI.KEYID = 6
6,302,449 UART: [ldev] SUBJECT.KEYID = 5
6,303,658 UART: [ldev] AUTHORITY.KEYID = 7
6,304,893 UART: [ldev] FE.KEYID = 1
6,318,071 UART: [ldev] Erasing FE.KEYID = 1
8,798,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,567,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,132 UART: [ldev] --
10,593,904 UART: [fwproc] Wait for Commands...
10,596,268 UART: [fwproc] Recv command 0x46505652
10,598,474 UART: [rt] FIPS Version
10,600,032 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
4,052 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,488,154 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [kat] SHA2-256
891,170 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,274 UART: [kat] ++
895,426 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,377 UART: [kat] SHA2-512-ACC
906,278 UART: [kat] ECC-384
915,985 UART: [kat] HMAC-384Kdf
920,733 UART: [kat] LMS
1,169,045 UART: [kat] --
1,169,978 UART: [cold-reset] ++
1,170,346 UART: [fht] FHT @ 0x50003400
1,172,960 UART: [idev] ++
1,173,128 UART: [idev] CDI.KEYID = 6
1,173,489 UART: [idev] SUBJECT.KEYID = 7
1,173,914 UART: [idev] UDS.KEYID = 0
1,182,167 UART: [idev] Erasing UDS.KEYID = 0
1,198,749 UART: [idev] Sha1 KeyId Algorithm
1,207,511 UART: [idev] --
1,208,720 UART: [ldev] ++
1,208,888 UART: [ldev] CDI.KEYID = 6
1,209,252 UART: [ldev] SUBJECT.KEYID = 5
1,209,679 UART: [ldev] AUTHORITY.KEYID = 7
1,210,142 UART: [ldev] FE.KEYID = 1
1,215,154 UART: [ldev] Erasing FE.KEYID = 1
1,241,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,446 UART: [ldev] --
1,280,743 UART: [fwproc] Wait for Commands...
1,281,324 UART: [fwproc] Recv command 0x46505652
1,282,148 UART: [rt] FIPS Version
1,282,708 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,609 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,731 UART: [kat] ++
895,883 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
916,040 UART: [kat] HMAC-384Kdf
920,548 UART: [kat] LMS
1,168,860 UART: [kat] --
1,169,755 UART: [cold-reset] ++
1,170,129 UART: [fht] FHT @ 0x50003400
1,172,753 UART: [idev] ++
1,172,921 UART: [idev] CDI.KEYID = 6
1,173,282 UART: [idev] SUBJECT.KEYID = 7
1,173,707 UART: [idev] UDS.KEYID = 0
1,182,034 UART: [idev] Erasing UDS.KEYID = 0
1,199,126 UART: [idev] Sha1 KeyId Algorithm
1,208,066 UART: [idev] --
1,209,279 UART: [ldev] ++
1,209,447 UART: [ldev] CDI.KEYID = 6
1,209,811 UART: [ldev] SUBJECT.KEYID = 5
1,210,238 UART: [ldev] AUTHORITY.KEYID = 7
1,210,701 UART: [ldev] FE.KEYID = 1
1,216,065 UART: [ldev] Erasing FE.KEYID = 1
1,243,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,039 UART: [ldev] --
1,282,458 UART: [fwproc] Wait for Commands...
1,283,147 UART: [fwproc] Recv command 0x46505652
1,283,971 UART: [rt] FIPS Version
1,284,531 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,138,910 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,722 UART: [kat] SHA2-256
901,662 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,559 UART: [kat] LMS
1,168,871 UART: [kat] --
1,169,672 UART: [cold-reset] ++
1,170,142 UART: [fht] FHT @ 0x50003400
1,172,734 UART: [idev] ++
1,172,902 UART: [idev] CDI.KEYID = 6
1,173,263 UART: [idev] SUBJECT.KEYID = 7
1,173,688 UART: [idev] UDS.KEYID = 0
1,181,833 UART: [idev] Erasing UDS.KEYID = 0
1,198,437 UART: [idev] Sha1 KeyId Algorithm
1,207,283 UART: [idev] --
1,208,262 UART: [ldev] ++
1,208,430 UART: [ldev] CDI.KEYID = 6
1,208,794 UART: [ldev] SUBJECT.KEYID = 5
1,209,221 UART: [ldev] AUTHORITY.KEYID = 7
1,209,684 UART: [ldev] FE.KEYID = 1
1,214,654 UART: [ldev] Erasing FE.KEYID = 1
1,241,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,396 UART: [ldev] --
1,280,661 UART: [fwproc] Wait for Commands...
1,281,386 UART: [fwproc] Recv command 0x46505652
1,282,210 UART: [rt] FIPS Version
1,282,770 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,138,875 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
891,351 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,455 UART: [kat] ++
895,607 UART: [kat] sha1
899,755 UART: [kat] SHA2-256
901,695 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
916,144 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,637 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,181,820 UART: [idev] Erasing UDS.KEYID = 0
1,199,402 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,289 UART: [ldev] ++
1,209,457 UART: [ldev] CDI.KEYID = 6
1,209,821 UART: [ldev] SUBJECT.KEYID = 5
1,210,248 UART: [ldev] AUTHORITY.KEYID = 7
1,210,711 UART: [ldev] FE.KEYID = 1
1,215,999 UART: [ldev] Erasing FE.KEYID = 1
1,242,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,531 UART: [ldev] --
1,281,762 UART: [fwproc] Wait for Commands...
1,282,349 UART: [fwproc] Recv command 0x46505652
1,283,173 UART: [rt] FIPS Version
1,283,733 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,320 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,021 UART: [state] WD Timer not started. Device not locked for debugging
87,130 UART: [kat] SHA2-256
890,680 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,784 UART: [kat] ++
894,936 UART: [kat] sha1
899,206 UART: [kat] SHA2-256
901,146 UART: [kat] SHA2-384
903,949 UART: [kat] SHA2-512-ACC
905,850 UART: [kat] ECC-384
915,247 UART: [kat] HMAC-384Kdf
919,851 UART: [kat] LMS
1,168,163 UART: [kat] --
1,168,870 UART: [cold-reset] ++
1,169,422 UART: [fht] FHT @ 0x50003400
1,171,846 UART: [idev] ++
1,172,014 UART: [idev] CDI.KEYID = 6
1,172,375 UART: [idev] SUBJECT.KEYID = 7
1,172,800 UART: [idev] UDS.KEYID = 0
1,180,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,145 UART: [idev] Sha1 KeyId Algorithm
1,206,973 UART: [idev] --
1,208,094 UART: [ldev] ++
1,208,262 UART: [ldev] CDI.KEYID = 6
1,208,626 UART: [ldev] SUBJECT.KEYID = 5
1,209,053 UART: [ldev] AUTHORITY.KEYID = 7
1,209,516 UART: [ldev] FE.KEYID = 1
1,214,640 UART: [ldev] Erasing FE.KEYID = 1
1,241,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,926 UART: [ldev] --
1,280,313 UART: [fwproc] Wait for Commands...
1,281,102 UART: [fwproc] Recv command 0x46505652
1,281,926 UART: [rt] FIPS Version
1,282,486 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,138,121 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,947 UART: [state] LifecycleState = Unprovisioned
86,602 UART: [state] DebugLocked = No
87,212 UART: [state] WD Timer not started. Device not locked for debugging
88,427 UART: [kat] SHA2-256
891,977 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,081 UART: [kat] ++
896,233 UART: [kat] sha1
900,473 UART: [kat] SHA2-256
902,413 UART: [kat] SHA2-384
905,132 UART: [kat] SHA2-512-ACC
907,033 UART: [kat] ECC-384
917,052 UART: [kat] HMAC-384Kdf
921,762 UART: [kat] LMS
1,170,074 UART: [kat] --
1,171,103 UART: [cold-reset] ++
1,171,451 UART: [fht] FHT @ 0x50003400
1,173,977 UART: [idev] ++
1,174,145 UART: [idev] CDI.KEYID = 6
1,174,506 UART: [idev] SUBJECT.KEYID = 7
1,174,931 UART: [idev] UDS.KEYID = 0
1,183,000 UART: [idev] Erasing UDS.KEYID = 0
1,200,402 UART: [idev] Sha1 KeyId Algorithm
1,209,264 UART: [idev] --
1,210,129 UART: [ldev] ++
1,210,297 UART: [ldev] CDI.KEYID = 6
1,210,661 UART: [ldev] SUBJECT.KEYID = 5
1,211,088 UART: [ldev] AUTHORITY.KEYID = 7
1,211,551 UART: [ldev] FE.KEYID = 1
1,216,637 UART: [ldev] Erasing FE.KEYID = 1
1,243,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,609 UART: [ldev] --
1,282,844 UART: [fwproc] Wait for Commands...
1,283,623 UART: [fwproc] Recv command 0x46505652
1,284,447 UART: [rt] FIPS Version
1,285,007 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,554 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
6,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,939 UART:
193,308 UART: Running Caliptra ROM ...
194,471 UART:
194,632 UART: [state] CFI Enabled
263,327 UART: [state] LifecycleState = Unprovisioned
265,273 UART: [state] DebugLocked = No
267,164 UART: [state] WD Timer not started. Device not locked for debugging
270,641 UART: [kat] SHA2-256
450,272 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,089 UART: [kat] ++
461,628 UART: [kat] sha1
471,278 UART: [kat] SHA2-256
473,958 UART: [kat] SHA2-384
480,311 UART: [kat] SHA2-512-ACC
482,712 UART: [kat] ECC-384
2,949,671 UART: [kat] HMAC-384Kdf
2,970,776 UART: [kat] LMS
3,447,271 UART: [kat] --
3,452,451 UART: [cold-reset] ++
3,454,658 UART: [fht] FHT @ 0x50003400
3,465,480 UART: [idev] ++
3,466,058 UART: [idev] CDI.KEYID = 6
3,467,000 UART: [idev] SUBJECT.KEYID = 7
3,468,227 UART: [idev] UDS.KEYID = 0
3,500,631 UART: [idev] Erasing UDS.KEYID = 0
6,001,170 UART: [idev] Sha1 KeyId Algorithm
6,025,050 UART: [idev] --
6,030,599 UART: [ldev] ++
6,031,182 UART: [ldev] CDI.KEYID = 6
6,032,208 UART: [ldev] SUBJECT.KEYID = 5
6,033,320 UART: [ldev] AUTHORITY.KEYID = 7
6,034,611 UART: [ldev] FE.KEYID = 1
6,070,544 UART: [ldev] Erasing FE.KEYID = 1
8,579,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,311,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,327,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,343,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,359,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,379,675 UART: [ldev] --
10,384,464 UART: [fwproc] Wait for Commands...
10,386,726 UART: [fwproc] Recv command 0x46574c44
10,388,713 UART: [fwproc] Recv'd Img size: 118548 bytes
13,870,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,954,970 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,027,997 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,355,464 >>> mbox cmd response: success
14,358,795 UART: [afmc] ++
14,359,381 UART: [afmc] CDI.KEYID = 6
14,360,325 UART: [afmc] SUBJECT.KEYID = 7
14,361,539 UART: [afmc] AUTHORITY.KEYID = 5
16,905,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,631,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,633,312 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,649,101 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,665,157 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,680,690 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
298 writing to cptra_bootfsm_go
599 UART: [afmc] -
1,036 UART: Running Caliptra ROM ...
2,130 UART:
2,279 UART: [state] CFI Enabled
63,278 UART: [state] LifecycleState = Unprovisioned
65,207 UART: [state] DebugLocked = No
66,460 UART: [state] WD Timer not started. Device not locked for debugging
69,442 UART: [kat] SHA2-256
249,076 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
259,888 UART: [kat] ++
260,340 UART: [kat] sha1
270,303 UART: [kat] SHA2-256
273,043 UART: [kat] SHA2-384
278,450 UART: [kat] SHA2-512-ACC
280,795 UART: [kat] ECC-384
2,729,330 UART: [kat] HMAC-384Kdf
2,750,133 UART: [kat] LMS
3,226,608 UART: [kat] --
3,231,154 UART: [warm-reset] ++
3,232,008 UART: [warm-reset] Prev Cold-Reset failed
3,236,262 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
5,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,215,769 >>> mbox cmd response: success
297 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
6,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,505 UART:
192,887 UART: Running Caliptra ROM ...
193,987 UART:
603,874 UART: [state] CFI Enabled
618,083 UART: [state] LifecycleState = Unprovisioned
619,982 UART: [state] DebugLocked = No
622,409 UART: [state] WD Timer not started. Device not locked for debugging
626,873 UART: [kat] SHA2-256
806,484 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,265 UART: [kat] ++
817,761 UART: [kat] sha1
829,115 UART: [kat] SHA2-256
831,838 UART: [kat] SHA2-384
837,599 UART: [kat] SHA2-512-ACC
839,988 UART: [kat] ECC-384
3,282,214 UART: [kat] HMAC-384Kdf
3,294,437 UART: [kat] LMS
3,770,991 UART: [kat] --
3,775,681 UART: [cold-reset] ++
3,778,225 UART: [fht] FHT @ 0x50003400
3,789,619 UART: [idev] ++
3,790,196 UART: [idev] CDI.KEYID = 6
3,791,167 UART: [idev] SUBJECT.KEYID = 7
3,792,376 UART: [idev] UDS.KEYID = 0
3,811,316 UART: [idev] Erasing UDS.KEYID = 0
6,271,036 UART: [idev] Sha1 KeyId Algorithm
6,294,026 UART: [idev] --
6,299,431 UART: [ldev] ++
6,300,004 UART: [ldev] CDI.KEYID = 6
6,300,918 UART: [ldev] SUBJECT.KEYID = 5
6,302,125 UART: [ldev] AUTHORITY.KEYID = 7
6,303,414 UART: [ldev] FE.KEYID = 1
6,315,998 UART: [ldev] Erasing FE.KEYID = 1
8,793,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,188 UART: [ldev] --
10,589,034 UART: [fwproc] Wait for Commands...
10,591,734 UART: [fwproc] Recv command 0x46574c44
10,593,772 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,272 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,285 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,696 >>> mbox cmd response: success
14,561,080 UART: [afmc] ++
14,561,674 UART: [afmc] CDI.KEYID = 6
14,562,691 UART: [afmc] SUBJECT.KEYID = 7
14,563,790 UART: [afmc] AUTHORITY.KEYID = 5
17,066,874 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,601 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,414 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,518 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,110 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
295 writing to cptra_bootfsm_go
599 UART: [afmc] --
1,071 UART: Running Caliptra ROM ...
2,236 UART:
1,657,338 UART: [state] CFI Enabled
1,674,696 UART: [state] LifecycleState = Unprovisioned
1,676,648 UART: [state] DebugLocked = No
1,678,521 UART: [state] WD Timer not started. Device not locked for debugging
1,682,320 UART: [kat] SHA2-256
1,862,001 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,872,795 UART: [kat] ++
1,873,296 UART: [kat] sha1
1,884,953 UART: [kat] SHA2-256
1,887,630 UART: [kat] SHA2-384
1,894,270 UART: [kat] SHA2-512-ACC
1,896,626 UART: [kat] ECC-384
4,336,604 UART: [kat] HMAC-384Kdf
4,347,745 UART: [kat] LMS
4,824,200 UART: [kat] --
4,828,292 UART: [warm-reset] ++
4,829,136 UART: [warm-reset] Prev Cold-Reset failed
4,832,996 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
6,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,562 >>> mbox cmd response: success
298 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
85,897 UART: [state] WD Timer not started. Device not locked for debugging
87,158 UART: [kat] SHA2-256
890,708 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,812 UART: [kat] ++
894,964 UART: [kat] sha1
899,164 UART: [kat] SHA2-256
901,104 UART: [kat] SHA2-384
903,731 UART: [kat] SHA2-512-ACC
905,632 UART: [kat] ECC-384
915,153 UART: [kat] HMAC-384Kdf
919,643 UART: [kat] LMS
1,167,955 UART: [kat] --
1,168,766 UART: [cold-reset] ++
1,169,298 UART: [fht] FHT @ 0x50003400
1,171,732 UART: [idev] ++
1,171,900 UART: [idev] CDI.KEYID = 6
1,172,261 UART: [idev] SUBJECT.KEYID = 7
1,172,686 UART: [idev] UDS.KEYID = 0
1,180,411 UART: [idev] Erasing UDS.KEYID = 0
1,197,335 UART: [idev] Sha1 KeyId Algorithm
1,206,039 UART: [idev] --
1,207,040 UART: [ldev] ++
1,207,208 UART: [ldev] CDI.KEYID = 6
1,207,572 UART: [ldev] SUBJECT.KEYID = 5
1,207,999 UART: [ldev] AUTHORITY.KEYID = 7
1,208,462 UART: [ldev] FE.KEYID = 1
1,213,338 UART: [ldev] Erasing FE.KEYID = 1
1,239,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,269,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,008 UART: [ldev] --
1,278,373 UART: [fwproc] Wait for Commands...
1,279,024 UART: [fwproc] Recv command 0x46574c44
1,279,757 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,385 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,560 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,822,763 >>> mbox cmd response: success
2,823,867 UART: [afmc] ++
2,824,035 UART: [afmc] CDI.KEYID = 6
2,824,398 UART: [afmc] SUBJECT.KEYID = 7
2,824,824 UART: [afmc] AUTHORITY.KEYID = 5
2,860,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,468 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,217 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,882,927 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,888,808 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,894,509 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,209 writing to cptra_bootfsm_go
2,902,301 UART:
2,902,317 UART: Running Caliptra ROM ...
2,902,725 UART:
2,902,780 UART: [state] CFI Enabled
2,905,234 UART: [state] LifecycleState = Unprovisioned
2,905,889 UART: [state] DebugLocked = No
2,906,539 UART: [state] WD Timer not started. Device not locked for debugging
2,907,808 UART: [kat] SHA2-256
3,711,358 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,715,462 UART: [kat] ++
3,715,614 UART: [kat] sha1
3,719,750 UART: [kat] SHA2-256
3,721,690 UART: [kat] SHA2-384
3,724,293 UART: [kat] SHA2-512-ACC
3,726,194 UART: [kat] ECC-384
3,735,841 UART: [kat] HMAC-384Kdf
3,740,357 UART: [kat] LMS
3,988,669 UART: [kat] --
3,989,391 UART: [warm-reset] ++
3,989,659 UART: [warm-reset] Prev Cold-Reset failed
3,990,848 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,184 >>> mbox cmd response: success
2,731,805 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
916,408 UART: [kat] HMAC-384Kdf
921,196 UART: [kat] LMS
1,169,508 UART: [kat] --
1,170,557 UART: [cold-reset] ++
1,170,897 UART: [fht] FHT @ 0x50003400
1,173,591 UART: [idev] ++
1,173,759 UART: [idev] CDI.KEYID = 6
1,174,120 UART: [idev] SUBJECT.KEYID = 7
1,174,545 UART: [idev] UDS.KEYID = 0
1,183,470 UART: [idev] Erasing UDS.KEYID = 0
1,200,980 UART: [idev] Sha1 KeyId Algorithm
1,209,930 UART: [idev] --
1,211,005 UART: [ldev] ++
1,211,173 UART: [ldev] CDI.KEYID = 6
1,211,537 UART: [ldev] SUBJECT.KEYID = 5
1,211,964 UART: [ldev] AUTHORITY.KEYID = 7
1,212,427 UART: [ldev] FE.KEYID = 1
1,217,957 UART: [ldev] Erasing FE.KEYID = 1
1,244,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,943 UART: [ldev] --
1,284,150 UART: [fwproc] Wait for Commands...
1,284,761 UART: [fwproc] Recv command 0x46574c44
1,285,494 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,390 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,565 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,942 >>> mbox cmd response: success
2,831,092 UART: [afmc] ++
2,831,260 UART: [afmc] CDI.KEYID = 6
2,831,623 UART: [afmc] SUBJECT.KEYID = 7
2,832,049 UART: [afmc] AUTHORITY.KEYID = 5
2,868,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,328 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,891,038 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,919 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,620 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,288 writing to cptra_bootfsm_go
2,910,380 UART:
2,910,396 UART: Running Caliptra ROM ...
2,910,804 UART:
2,910,946 UART: [state] CFI Enabled
2,913,672 UART: [state] LifecycleState = Unprovisioned
2,914,327 UART: [state] DebugLocked = No
2,914,973 UART: [state] WD Timer not started. Device not locked for debugging
2,916,090 UART: [kat] SHA2-256
3,719,640 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,723,744 UART: [kat] ++
3,723,896 UART: [kat] sha1
3,728,150 UART: [kat] SHA2-256
3,730,090 UART: [kat] SHA2-384
3,732,831 UART: [kat] SHA2-512-ACC
3,734,732 UART: [kat] ECC-384
3,744,715 UART: [kat] HMAC-384Kdf
3,749,373 UART: [kat] LMS
3,997,685 UART: [kat] --
3,998,459 UART: [warm-reset] ++
3,998,727 UART: [warm-reset] Prev Cold-Reset failed
3,999,822 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,115 >>> mbox cmd response: success
2,738,324 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,612 UART: [kat] SHA2-256
901,552 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
915,499 UART: [kat] HMAC-384Kdf
920,113 UART: [kat] LMS
1,168,425 UART: [kat] --
1,169,150 UART: [cold-reset] ++
1,169,616 UART: [fht] FHT @ 0x50003400
1,172,270 UART: [idev] ++
1,172,438 UART: [idev] CDI.KEYID = 6
1,172,799 UART: [idev] SUBJECT.KEYID = 7
1,173,224 UART: [idev] UDS.KEYID = 0
1,181,289 UART: [idev] Erasing UDS.KEYID = 0
1,198,013 UART: [idev] Sha1 KeyId Algorithm
1,206,871 UART: [idev] --
1,207,864 UART: [ldev] ++
1,208,032 UART: [ldev] CDI.KEYID = 6
1,208,396 UART: [ldev] SUBJECT.KEYID = 5
1,208,823 UART: [ldev] AUTHORITY.KEYID = 7
1,209,286 UART: [ldev] FE.KEYID = 1
1,214,620 UART: [ldev] Erasing FE.KEYID = 1
1,240,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,642 UART: [ldev] --
1,280,007 UART: [fwproc] Wait for Commands...
1,280,630 UART: [fwproc] Recv command 0x46574c44
1,281,363 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,169 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,344 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,595 >>> mbox cmd response: success
2,825,817 UART: [afmc] ++
2,825,985 UART: [afmc] CDI.KEYID = 6
2,826,348 UART: [afmc] SUBJECT.KEYID = 7
2,826,774 UART: [afmc] AUTHORITY.KEYID = 5
2,862,345 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,978 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,727 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,437 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,318 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,019 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,865 writing to cptra_bootfsm_go
2,904,957 UART:
2,904,973 UART: Running Caliptra ROM ...
2,905,381 UART:
2,905,436 UART: [state] CFI Enabled
2,908,330 UART: [state] LifecycleState = Unprovisioned
2,908,985 UART: [state] DebugLocked = No
2,909,497 UART: [state] WD Timer not started. Device not locked for debugging
2,910,702 UART: [kat] SHA2-256
3,714,252 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,718,356 UART: [kat] ++
3,718,508 UART: [kat] sha1
3,722,722 UART: [kat] SHA2-256
3,724,662 UART: [kat] SHA2-384
3,727,501 UART: [kat] SHA2-512-ACC
3,729,402 UART: [kat] ECC-384
3,739,037 UART: [kat] HMAC-384Kdf
3,743,695 UART: [kat] LMS
3,992,007 UART: [kat] --
3,992,519 UART: [warm-reset] ++
3,992,787 UART: [warm-reset] Prev Cold-Reset failed
3,993,732 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,790 >>> mbox cmd response: success
2,732,873 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,589 UART: [kat] ++
895,741 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
915,844 UART: [kat] HMAC-384Kdf
920,454 UART: [kat] LMS
1,168,766 UART: [kat] --
1,169,707 UART: [cold-reset] ++
1,170,047 UART: [fht] FHT @ 0x50003400
1,172,699 UART: [idev] ++
1,172,867 UART: [idev] CDI.KEYID = 6
1,173,228 UART: [idev] SUBJECT.KEYID = 7
1,173,653 UART: [idev] UDS.KEYID = 0
1,181,508 UART: [idev] Erasing UDS.KEYID = 0
1,198,548 UART: [idev] Sha1 KeyId Algorithm
1,207,558 UART: [idev] --
1,208,679 UART: [ldev] ++
1,208,847 UART: [ldev] CDI.KEYID = 6
1,209,211 UART: [ldev] SUBJECT.KEYID = 5
1,209,638 UART: [ldev] AUTHORITY.KEYID = 7
1,210,101 UART: [ldev] FE.KEYID = 1
1,215,549 UART: [ldev] Erasing FE.KEYID = 1
1,241,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,531 UART: [ldev] --
1,280,770 UART: [fwproc] Wait for Commands...
1,281,539 UART: [fwproc] Recv command 0x46574c44
1,282,272 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,746 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,921 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,138 >>> mbox cmd response: success
2,827,310 UART: [afmc] ++
2,827,478 UART: [afmc] CDI.KEYID = 6
2,827,841 UART: [afmc] SUBJECT.KEYID = 7
2,828,267 UART: [afmc] AUTHORITY.KEYID = 5
2,863,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,934 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,644 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,525 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,226 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,740 writing to cptra_bootfsm_go
2,905,832 UART:
2,905,848 UART: Running Caliptra ROM ...
2,906,256 UART:
2,906,398 UART: [state] CFI Enabled
2,909,512 UART: [state] LifecycleState = Unprovisioned
2,910,167 UART: [state] DebugLocked = No
2,910,883 UART: [state] WD Timer not started. Device not locked for debugging
2,912,228 UART: [kat] SHA2-256
3,715,778 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,719,882 UART: [kat] ++
3,720,034 UART: [kat] sha1
3,724,392 UART: [kat] SHA2-256
3,726,332 UART: [kat] SHA2-384
3,729,041 UART: [kat] SHA2-512-ACC
3,730,942 UART: [kat] ECC-384
3,740,791 UART: [kat] HMAC-384Kdf
3,745,469 UART: [kat] LMS
3,993,781 UART: [kat] --
3,994,395 UART: [warm-reset] ++
3,994,663 UART: [warm-reset] Prev Cold-Reset failed
3,995,680 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,341 >>> mbox cmd response: success
2,733,928 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,278 UART: [kat] ++
895,430 UART: [kat] sha1
899,612 UART: [kat] SHA2-256
901,552 UART: [kat] SHA2-384
904,299 UART: [kat] SHA2-512-ACC
906,200 UART: [kat] ECC-384
915,981 UART: [kat] HMAC-384Kdf
920,637 UART: [kat] LMS
1,168,949 UART: [kat] --
1,169,930 UART: [cold-reset] ++
1,170,454 UART: [fht] FHT @ 0x50003400
1,173,018 UART: [idev] ++
1,173,186 UART: [idev] CDI.KEYID = 6
1,173,547 UART: [idev] SUBJECT.KEYID = 7
1,173,972 UART: [idev] UDS.KEYID = 0
1,181,751 UART: [idev] Erasing UDS.KEYID = 0
1,198,437 UART: [idev] Sha1 KeyId Algorithm
1,207,473 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,214,852 UART: [ldev] Erasing FE.KEYID = 1
1,240,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,702 UART: [ldev] --
1,280,101 UART: [fwproc] Wait for Commands...
1,280,682 UART: [fwproc] Recv command 0x46574c44
1,281,415 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,215 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,390 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,583 >>> mbox cmd response: success
2,825,851 UART: [afmc] ++
2,826,019 UART: [afmc] CDI.KEYID = 6
2,826,382 UART: [afmc] SUBJECT.KEYID = 7
2,826,808 UART: [afmc] AUTHORITY.KEYID = 5
2,862,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,959 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,669 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,550 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,251 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,217 writing to cptra_bootfsm_go
2,904,309 UART:
2,904,325 UART: Running Caliptra ROM ...
2,904,733 UART:
2,904,788 UART: [state] CFI Enabled
2,907,380 UART: [state] LifecycleState = Unprovisioned
2,908,035 UART: [state] DebugLocked = No
2,908,669 UART: [state] WD Timer not started. Device not locked for debugging
2,909,884 UART: [kat] SHA2-256
3,713,434 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,717,538 UART: [kat] ++
3,717,690 UART: [kat] sha1
3,722,008 UART: [kat] SHA2-256
3,723,948 UART: [kat] SHA2-384
3,726,859 UART: [kat] SHA2-512-ACC
3,728,760 UART: [kat] ECC-384
3,738,437 UART: [kat] HMAC-384Kdf
3,742,867 UART: [kat] LMS
3,991,179 UART: [kat] --
3,992,107 UART: [warm-reset] ++
3,992,375 UART: [warm-reset] Prev Cold-Reset failed
3,993,492 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,074 >>> mbox cmd response: success
2,733,825 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
891,249 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
916,256 UART: [kat] HMAC-384Kdf
920,868 UART: [kat] LMS
1,169,180 UART: [kat] --
1,170,069 UART: [cold-reset] ++
1,170,409 UART: [fht] FHT @ 0x50003400
1,173,045 UART: [idev] ++
1,173,213 UART: [idev] CDI.KEYID = 6
1,173,574 UART: [idev] SUBJECT.KEYID = 7
1,173,999 UART: [idev] UDS.KEYID = 0
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,199,828 UART: [idev] Sha1 KeyId Algorithm
1,208,774 UART: [idev] --
1,209,773 UART: [ldev] ++
1,209,941 UART: [ldev] CDI.KEYID = 6
1,210,305 UART: [ldev] SUBJECT.KEYID = 5
1,210,732 UART: [ldev] AUTHORITY.KEYID = 7
1,211,195 UART: [ldev] FE.KEYID = 1
1,216,561 UART: [ldev] Erasing FE.KEYID = 1
1,243,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,977 UART: [ldev] --
1,282,276 UART: [fwproc] Wait for Commands...
1,283,009 UART: [fwproc] Recv command 0x46574c44
1,283,742 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,708 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,883 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,192 >>> mbox cmd response: success
2,827,426 UART: [afmc] ++
2,827,594 UART: [afmc] CDI.KEYID = 6
2,827,957 UART: [afmc] SUBJECT.KEYID = 7
2,828,383 UART: [afmc] AUTHORITY.KEYID = 5
2,863,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,594 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,304 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,185 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,886 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,620 writing to cptra_bootfsm_go
2,905,712 UART:
2,905,728 UART: Running Caliptra ROM ...
2,906,136 UART:
2,906,278 UART: [state] CFI Enabled
2,909,046 UART: [state] LifecycleState = Unprovisioned
2,909,701 UART: [state] DebugLocked = No
2,910,183 UART: [state] WD Timer not started. Device not locked for debugging
2,911,510 UART: [kat] SHA2-256
3,715,060 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,719,164 UART: [kat] ++
3,719,316 UART: [kat] sha1
3,723,396 UART: [kat] SHA2-256
3,725,336 UART: [kat] SHA2-384
3,728,143 UART: [kat] SHA2-512-ACC
3,730,044 UART: [kat] ECC-384
3,739,883 UART: [kat] HMAC-384Kdf
3,744,513 UART: [kat] LMS
3,992,825 UART: [kat] --
3,993,755 UART: [warm-reset] ++
3,994,023 UART: [warm-reset] Prev Cold-Reset failed
3,994,984 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,087 >>> mbox cmd response: success
2,733,418 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,019 UART:
192,409 UART: Running Caliptra ROM ...
193,590 UART:
193,752 UART: [state] CFI Enabled
267,340 UART: [state] LifecycleState = Production
269,141 UART: [state] DebugLocked = No
270,909 UART: [state] WD Timer not started. Device not locked for debugging
275,346 UART: [kat] SHA2-256
455,006 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,781 UART: [kat] ++
466,236 UART: [kat] sha1
476,470 UART: [kat] SHA2-256
479,151 UART: [kat] SHA2-384
483,504 UART: [kat] SHA2-512-ACC
485,845 UART: [kat] ECC-384
2,948,943 UART: [kat] HMAC-384Kdf
2,971,557 UART: [kat] LMS
3,448,063 UART: [kat] --
3,453,653 UART: [cold-reset] ++
3,455,218 UART: [fht] FHT @ 0x50003400
3,465,630 UART: [idev] ++
3,466,210 UART: [idev] CDI.KEYID = 6
3,467,235 UART: [idev] SUBJECT.KEYID = 7
3,468,402 UART: [idev] UDS.KEYID = 0
303 writing to cptra_bootfsm_go
967 UART:
1,127 UART: Running Caliptra ROM ...
2,306 UART:
2,471 UART: [state] CFI Enabled
60,366 UART: [state] LifecycleState = Production
62,177 UART: [state] DebugLocked = No
64,805 UART: [state] WD Timer not started. Device not locked for debugging
68,325 UART: [kat] SHA2-256
247,991 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
258,751 UART: [kat] ++
259,200 UART: [kat] sha1
269,784 UART: [kat] SHA2-256
272,459 UART: [kat] SHA2-384
278,392 UART: [kat] SHA2-512-ACC
280,736 UART: [kat] ECC-384
2,740,321 UART: [kat] HMAC-384Kdf
2,764,679 UART: [kat] LMS
3,241,164 UART: [kat] --
3,245,480 UART: [warm-reset] ++
3,246,341 UART: [warm-reset] Prev Cold-Reset failed
3,249,591 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
297 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,453 writing to cptra_bootfsm_go
192,555 UART:
192,941 UART: Running Caliptra ROM ...
194,118 UART:
603,768 UART: [state] CFI Enabled
617,119 UART: [state] LifecycleState = Production
618,925 UART: [state] DebugLocked = No
620,462 UART: [state] WD Timer not started. Device not locked for debugging
624,947 UART: [kat] SHA2-256
804,603 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,354 UART: [kat] ++
815,887 UART: [kat] sha1
826,187 UART: [kat] SHA2-256
828,931 UART: [kat] SHA2-384
833,667 UART: [kat] SHA2-512-ACC
836,058 UART: [kat] ECC-384
3,275,638 UART: [kat] HMAC-384Kdf
3,288,529 UART: [kat] LMS
3,765,054 UART: [kat] --
3,768,721 UART: [cold-reset] ++
3,770,275 UART: [fht] FHT @ 0x50003400
3,781,309 UART: [idev] ++
3,781,878 UART: [idev] CDI.KEYID = 6
3,782,820 UART: [idev] SUBJECT.KEYID = 7
3,784,030 UART: [idev] UDS.KEYID = 0
290 writing to cptra_bootfsm_go
950 UART:
1,096 UART: Running Caliptra ROM ...
2,207 UART:
16,683,258 UART: [state] CFI Enabled
16,698,761 UART: [state] LifecycleState = Production
16,700,554 UART: [state] DebugLocked = No
16,703,161 UART: [state] WD Timer not started. Device not locked for debugging
16,706,413 UART: [kat] SHA2-256
16,886,063 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
16,896,835 UART: [kat] ++
16,897,292 UART: [kat] sha1
16,908,228 UART: [kat] SHA2-256
16,910,913 UART: [kat] SHA2-384
16,917,006 UART: [kat] SHA2-512-ACC
16,919,413 UART: [kat] ECC-384
19,360,715 UART: [kat] HMAC-384Kdf
19,373,371 UART: [kat] LMS
19,849,831 UART: [kat] --
19,854,662 UART: [warm-reset] ++
19,855,512 UART: [warm-reset] Prev Cold-Reset failed
19,859,068 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
301 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,712 UART: [state] LifecycleState = Production
85,319 UART: [state] DebugLocked = No
85,869 UART: [state] WD Timer not started. Device not locked for debugging
87,072 UART: [kat] SHA2-256
890,622 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,726 UART: [kat] ++
894,878 UART: [kat] sha1
899,206 UART: [kat] SHA2-256
901,146 UART: [kat] SHA2-384
903,929 UART: [kat] SHA2-512-ACC
905,830 UART: [kat] ECC-384
915,117 UART: [kat] HMAC-384Kdf
919,727 UART: [kat] LMS
1,168,039 UART: [kat] --
1,168,740 UART: [cold-reset] ++
1,169,126 UART: [fht] FHT @ 0x50003400
1,171,942 UART: [idev] ++
1,172,110 UART: [idev] CDI.KEYID = 6
1,172,471 UART: [idev] SUBJECT.KEYID = 7
1,172,896 UART: [idev] UDS.KEYID = 0
1,174,500 writing to cptra_bootfsm_go
1,174,592 UART:
1,174,608 UART: Running Caliptra ROM ...
1,175,016 UART:
1,175,071 UART: [state] CFI Enabled
1,177,983 UART: [state] LifecycleState = Production
1,178,590 UART: [state] DebugLocked = No
1,179,264 UART: [state] WD Timer not started. Device not locked for debugging
1,180,379 UART: [kat] SHA2-256
1,983,929 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,988,033 UART: [kat] ++
1,988,185 UART: [kat] sha1
1,992,561 UART: [kat] SHA2-256
1,994,501 UART: [kat] SHA2-384
1,997,270 UART: [kat] SHA2-512-ACC
1,999,171 UART: [kat] ECC-384
2,008,838 UART: [kat] HMAC-384Kdf
2,013,394 UART: [kat] LMS
2,261,706 UART: [kat] --
2,262,844 UART: [warm-reset] ++
2,263,112 UART: [warm-reset] Prev Cold-Reset failed
2,264,111 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,374 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Production
86,340 UART: [state] DebugLocked = No
87,032 UART: [state] WD Timer not started. Device not locked for debugging
88,339 UART: [kat] SHA2-256
891,889 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,993 UART: [kat] ++
896,145 UART: [kat] sha1
900,217 UART: [kat] SHA2-256
902,157 UART: [kat] SHA2-384
905,022 UART: [kat] SHA2-512-ACC
906,923 UART: [kat] ECC-384
917,000 UART: [kat] HMAC-384Kdf
921,768 UART: [kat] LMS
1,170,080 UART: [kat] --
1,171,095 UART: [cold-reset] ++
1,171,617 UART: [fht] FHT @ 0x50003400
1,174,375 UART: [idev] ++
1,174,543 UART: [idev] CDI.KEYID = 6
1,174,904 UART: [idev] SUBJECT.KEYID = 7
1,175,329 UART: [idev] UDS.KEYID = 0
1,176,835 writing to cptra_bootfsm_go
1,176,927 UART:
1,176,943 UART: Running Caliptra ROM ...
1,177,351 UART:
1,177,493 UART: [state] CFI Enabled
1,180,557 UART: [state] LifecycleState = Production
1,181,164 UART: [state] DebugLocked = No
1,181,864 UART: [state] WD Timer not started. Device not locked for debugging
1,183,019 UART: [kat] SHA2-256
1,986,569 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,990,673 UART: [kat] ++
1,990,825 UART: [kat] sha1
1,995,119 UART: [kat] SHA2-256
1,997,059 UART: [kat] SHA2-384
1,999,884 UART: [kat] SHA2-512-ACC
2,001,785 UART: [kat] ECC-384
2,011,632 UART: [kat] HMAC-384Kdf
2,016,318 UART: [kat] LMS
2,264,630 UART: [kat] --
2,265,522 UART: [warm-reset] ++
2,265,790 UART: [warm-reset] Prev Cold-Reset failed
2,266,587 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,895 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Production
85,557 UART: [state] DebugLocked = No
86,067 UART: [state] WD Timer not started. Device not locked for debugging
87,218 UART: [kat] SHA2-256
890,768 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,872 UART: [kat] ++
895,024 UART: [kat] sha1
899,208 UART: [kat] SHA2-256
901,148 UART: [kat] SHA2-384
903,993 UART: [kat] SHA2-512-ACC
905,894 UART: [kat] ECC-384
915,713 UART: [kat] HMAC-384Kdf
920,425 UART: [kat] LMS
1,168,737 UART: [kat] --
1,169,600 UART: [cold-reset] ++
1,169,976 UART: [fht] FHT @ 0x50003400
1,172,720 UART: [idev] ++
1,172,888 UART: [idev] CDI.KEYID = 6
1,173,249 UART: [idev] SUBJECT.KEYID = 7
1,173,674 UART: [idev] UDS.KEYID = 0
1,175,216 writing to cptra_bootfsm_go
1,175,308 UART:
1,175,324 UART: Running Caliptra ROM ...
1,175,732 UART:
1,175,787 UART: [state] CFI Enabled
1,178,511 UART: [state] LifecycleState = Production
1,179,118 UART: [state] DebugLocked = No
1,179,836 UART: [state] WD Timer not started. Device not locked for debugging
1,181,179 UART: [kat] SHA2-256
1,984,729 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,988,833 UART: [kat] ++
1,988,985 UART: [kat] sha1
1,993,121 UART: [kat] SHA2-256
1,995,061 UART: [kat] SHA2-384
1,997,894 UART: [kat] SHA2-512-ACC
1,999,795 UART: [kat] ECC-384
2,009,240 UART: [kat] HMAC-384Kdf
2,013,964 UART: [kat] LMS
2,262,276 UART: [kat] --
2,263,020 UART: [warm-reset] ++
2,263,288 UART: [warm-reset] Prev Cold-Reset failed
2,264,341 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,234 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Production
85,744 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,545 UART: [kat] SHA2-256
891,095 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,199 UART: [kat] ++
895,351 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,206 UART: [kat] SHA2-512-ACC
906,107 UART: [kat] ECC-384
915,886 UART: [kat] HMAC-384Kdf
920,432 UART: [kat] LMS
1,168,744 UART: [kat] --
1,169,615 UART: [cold-reset] ++
1,170,179 UART: [fht] FHT @ 0x50003400
1,172,743 UART: [idev] ++
1,172,911 UART: [idev] CDI.KEYID = 6
1,173,272 UART: [idev] SUBJECT.KEYID = 7
1,173,697 UART: [idev] UDS.KEYID = 0
1,175,391 writing to cptra_bootfsm_go
1,175,483 UART:
1,175,499 UART: Running Caliptra ROM ...
1,175,907 UART:
1,176,049 UART: [state] CFI Enabled
1,178,613 UART: [state] LifecycleState = Production
1,179,220 UART: [state] DebugLocked = No
1,179,722 UART: [state] WD Timer not started. Device not locked for debugging
1,181,079 UART: [kat] SHA2-256
1,984,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,988,733 UART: [kat] ++
1,988,885 UART: [kat] sha1
1,993,149 UART: [kat] SHA2-256
1,995,089 UART: [kat] SHA2-384
1,997,992 UART: [kat] SHA2-512-ACC
1,999,893 UART: [kat] ECC-384
2,009,510 UART: [kat] HMAC-384Kdf
2,014,060 UART: [kat] LMS
2,262,372 UART: [kat] --
2,263,142 UART: [warm-reset] ++
2,263,410 UART: [warm-reset] Prev Cold-Reset failed
2,264,493 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,485 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Production
85,727 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,376 UART: [kat] ++
895,528 UART: [kat] sha1
899,666 UART: [kat] SHA2-256
901,606 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
915,713 UART: [kat] HMAC-384Kdf
920,315 UART: [kat] LMS
1,168,627 UART: [kat] --
1,169,544 UART: [cold-reset] ++
1,169,954 UART: [fht] FHT @ 0x50003400
1,172,786 UART: [idev] ++
1,172,954 UART: [idev] CDI.KEYID = 6
1,173,315 UART: [idev] SUBJECT.KEYID = 7
1,173,740 UART: [idev] UDS.KEYID = 0
1,175,236 writing to cptra_bootfsm_go
1,175,328 UART:
1,175,344 UART: Running Caliptra ROM ...
1,175,752 UART:
1,175,807 UART: [state] CFI Enabled
1,178,741 UART: [state] LifecycleState = Production
1,179,348 UART: [state] DebugLocked = No
1,180,034 UART: [state] WD Timer not started. Device not locked for debugging
1,181,235 UART: [kat] SHA2-256
1,984,785 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,988,889 UART: [kat] ++
1,989,041 UART: [kat] sha1
1,993,307 UART: [kat] SHA2-256
1,995,247 UART: [kat] SHA2-384
1,997,834 UART: [kat] SHA2-512-ACC
1,999,735 UART: [kat] ECC-384
2,009,456 UART: [kat] HMAC-384Kdf
2,014,010 UART: [kat] LMS
2,262,322 UART: [kat] --
2,263,220 UART: [warm-reset] ++
2,263,488 UART: [warm-reset] Prev Cold-Reset failed
2,264,483 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,588 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Production
86,226 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,209 UART: [kat] SHA2-256
891,759 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,863 UART: [kat] ++
896,015 UART: [kat] sha1
900,299 UART: [kat] SHA2-256
902,239 UART: [kat] SHA2-384
905,094 UART: [kat] SHA2-512-ACC
906,995 UART: [kat] ECC-384
916,686 UART: [kat] HMAC-384Kdf
921,352 UART: [kat] LMS
1,169,664 UART: [kat] --
1,170,481 UART: [cold-reset] ++
1,170,993 UART: [fht] FHT @ 0x50003400
1,173,729 UART: [idev] ++
1,173,897 UART: [idev] CDI.KEYID = 6
1,174,258 UART: [idev] SUBJECT.KEYID = 7
1,174,683 UART: [idev] UDS.KEYID = 0
1,176,281 writing to cptra_bootfsm_go
1,176,373 UART:
1,176,389 UART: Running Caliptra ROM ...
1,176,797 UART:
1,176,939 UART: [state] CFI Enabled
1,179,727 UART: [state] LifecycleState = Production
1,180,334 UART: [state] DebugLocked = No
1,180,820 UART: [state] WD Timer not started. Device not locked for debugging
1,182,143 UART: [kat] SHA2-256
1,985,693 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,989,797 UART: [kat] ++
1,989,949 UART: [kat] sha1
1,994,167 UART: [kat] SHA2-256
1,996,107 UART: [kat] SHA2-384
1,998,876 UART: [kat] SHA2-512-ACC
2,000,777 UART: [kat] ECC-384
2,010,840 UART: [kat] HMAC-384Kdf
2,015,258 UART: [kat] LMS
2,263,570 UART: [kat] --
2,264,400 UART: [warm-reset] ++
2,264,668 UART: [warm-reset] Prev Cold-Reset failed
2,265,773 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,307 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
5,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,353 UART:
193,299 UART: Running Caliptra ROM ...
194,420 UART:
194,577 UART: [state] CFI Enabled
266,552 UART: [state] LifecycleState = Unprovisioned
268,636 UART: [state] DebugLocked = No
270,277 UART: [state] WD Timer not started. Device not locked for debugging
274,085 UART: [kat] SHA2-256
453,750 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,522 UART: [kat] ++
465,016 UART: [kat] sha1
477,545 UART: [kat] SHA2-256
480,281 UART: [kat] SHA2-384
485,198 UART: [kat] SHA2-512-ACC
487,594 UART: [kat] ECC-384
2,952,482 UART: [kat] HMAC-384Kdf
2,974,933 UART: [kat] LMS
3,451,408 UART: [kat] --
3,455,686 UART: [cold-reset] ++
3,458,219 UART: [fht] FHT @ 0x50003400
3,469,730 UART: [idev] ++
3,470,368 UART: [idev] CDI.KEYID = 6
3,471,273 UART: [idev] SUBJECT.KEYID = 7
3,472,413 UART: [idev] UDS.KEYID = 0
3,507,306 UART: [idev] Erasing UDS.KEYID = 0
5,995,610 UART: [idev] Sha1 KeyId Algorithm
6,018,717 UART: [idev] --
6,024,832 UART: [ldev] ++
6,025,473 UART: [ldev] CDI.KEYID = 6
6,026,414 UART: [ldev] SUBJECT.KEYID = 5
6,027,527 UART: [ldev] AUTHORITY.KEYID = 7
6,028,826 UART: [ldev] FE.KEYID = 1
6,067,742 UART: [ldev] Erasing FE.KEYID = 1
8,573,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,309,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,325,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,341,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,356,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,379,434 UART: [ldev] --
10,384,761 UART: [fwproc] Wait for Commands...
10,386,648 UART: [fwproc] Recv command 0x46574c44
10,388,638 UART: [fwproc] Recv'd Img size: 118548 bytes
298 writing to cptra_bootfsm_go
1,009 UART:
1,219 UART: Running Caliptra ROM ...
2,241 UART:
2,397 UART: [state] CFI Enabled
72,009 UART: [state] LifecycleState = Unprovisioned
73,968 UART: [state] DebugLocked = No
76,601 UART: [state] WD Timer not started. Device not locked for debugging
81,101 UART: [kat] SHA2-256
260,789 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
271,575 UART: [kat] ++
272,029 UART: [kat] sha1
282,480 UART: [kat] SHA2-256
285,171 UART: [kat] SHA2-384
290,663 UART: [kat] SHA2-512-ACC
293,004 UART: [kat] ECC-384
2,754,475 UART: [kat] HMAC-384Kdf
2,777,465 UART: [kat] LMS
3,253,912 UART: [kat] --
3,259,346 UART: [warm-reset] ++
3,260,176 UART: [warm-reset] Prev Cold-Reset failed
3,263,456 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
5,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
300 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
7,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,458 UART:
192,836 UART: Running Caliptra ROM ...
194,001 UART:
603,643 UART: [state] CFI Enabled
618,758 UART: [state] LifecycleState = Unprovisioned
620,720 UART: [state] DebugLocked = No
622,251 UART: [state] WD Timer not started. Device not locked for debugging
626,678 UART: [kat] SHA2-256
806,317 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,103 UART: [kat] ++
817,599 UART: [kat] sha1
829,618 UART: [kat] SHA2-256
832,294 UART: [kat] SHA2-384
838,375 UART: [kat] SHA2-512-ACC
840,773 UART: [kat] ECC-384
3,284,478 UART: [kat] HMAC-384Kdf
3,296,693 UART: [kat] LMS
3,773,192 UART: [kat] --
3,777,201 UART: [cold-reset] ++
3,779,298 UART: [fht] FHT @ 0x50003400
3,790,618 UART: [idev] ++
3,791,180 UART: [idev] CDI.KEYID = 6
3,792,192 UART: [idev] SUBJECT.KEYID = 7
3,793,352 UART: [idev] UDS.KEYID = 0
3,811,539 UART: [idev] Erasing UDS.KEYID = 0
6,271,506 UART: [idev] Sha1 KeyId Algorithm
6,295,407 UART: [idev] --
6,301,404 UART: [ldev] ++
6,301,970 UART: [ldev] CDI.KEYID = 6
6,302,904 UART: [ldev] SUBJECT.KEYID = 5
6,304,057 UART: [ldev] AUTHORITY.KEYID = 7
6,305,335 UART: [ldev] FE.KEYID = 1
6,317,376 UART: [ldev] Erasing FE.KEYID = 1
8,799,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,520,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,567,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,586 UART: [ldev] --
10,594,262 UART: [fwproc] Wait for Commands...
10,596,948 UART: [fwproc] Recv command 0x46574c44
10,598,979 UART: [fwproc] Recv'd Img size: 118548 bytes
299 writing to cptra_bootfsm_go
1,001 UART:
1,180 UART: Running Caliptra ROM ...
2,191 UART:
9,870,646 UART: [state] CFI Enabled
9,882,805 UART: [state] LifecycleState = Unprovisioned
9,884,713 UART: [state] DebugLocked = No
9,886,529 UART: [state] WD Timer not started. Device not locked for debugging
9,890,427 UART: [kat] SHA2-256
10,070,110 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,080,915 UART: [kat] ++
10,081,399 UART: [kat] sha1
10,091,617 UART: [kat] SHA2-256
10,094,304 UART: [kat] SHA2-384
10,098,780 UART: [kat] SHA2-512-ACC
10,101,127 UART: [kat] ECC-384
12,541,800 UART: [kat] HMAC-384Kdf
12,554,341 UART: [kat] LMS
13,030,833 UART: [kat] --
13,035,898 UART: [warm-reset] ++
13,036,740 UART: [warm-reset] Prev Cold-Reset failed
13,040,943 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,410 writing to cptra_bootfsm_go
6,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
306 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,798 UART: [kat] SHA2-256
901,738 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,027 UART: [kat] HMAC-384Kdf
920,461 UART: [kat] LMS
1,168,773 UART: [kat] --
1,169,582 UART: [cold-reset] ++
1,170,060 UART: [fht] FHT @ 0x50003400
1,172,590 UART: [idev] ++
1,172,758 UART: [idev] CDI.KEYID = 6
1,173,119 UART: [idev] SUBJECT.KEYID = 7
1,173,544 UART: [idev] UDS.KEYID = 0
1,181,519 UART: [idev] Erasing UDS.KEYID = 0
1,198,985 UART: [idev] Sha1 KeyId Algorithm
1,207,863 UART: [idev] --
1,208,802 UART: [ldev] ++
1,208,970 UART: [ldev] CDI.KEYID = 6
1,209,334 UART: [ldev] SUBJECT.KEYID = 5
1,209,761 UART: [ldev] AUTHORITY.KEYID = 7
1,210,224 UART: [ldev] FE.KEYID = 1
1,215,394 UART: [ldev] Erasing FE.KEYID = 1
1,242,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,192 UART: [ldev] --
1,281,477 UART: [fwproc] Wait for Commands...
1,282,204 UART: [fwproc] Recv command 0x46574c44
1,282,937 UART: [fwproc] Recv'd Img size: 118548 bytes
1,293,717 writing to cptra_bootfsm_go
1,293,809 UART:
1,293,825 UART: Running Caliptra ROM ...
1,294,233 UART:
1,294,288 UART: [state] CFI Enabled
1,296,850 UART: [state] LifecycleState = Unprovisioned
1,297,505 UART: [state] DebugLocked = No
1,298,021 UART: [state] WD Timer not started. Device not locked for debugging
1,299,156 UART: [kat] SHA2-256
2,102,706 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,106,810 UART: [kat] ++
2,106,962 UART: [kat] sha1
2,111,286 UART: [kat] SHA2-256
2,113,226 UART: [kat] SHA2-384
2,115,847 UART: [kat] SHA2-512-ACC
2,117,748 UART: [kat] ECC-384
2,127,745 UART: [kat] HMAC-384Kdf
2,132,291 UART: [kat] LMS
2,380,603 UART: [kat] --
2,381,379 UART: [warm-reset] ++
2,381,647 UART: [warm-reset] Prev Cold-Reset failed
2,382,640 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,148,346 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,586 UART: [kat] HMAC-384Kdf
921,088 UART: [kat] LMS
1,169,400 UART: [kat] --
1,170,279 UART: [cold-reset] ++
1,170,775 UART: [fht] FHT @ 0x50003400
1,173,505 UART: [idev] ++
1,173,673 UART: [idev] CDI.KEYID = 6
1,174,034 UART: [idev] SUBJECT.KEYID = 7
1,174,459 UART: [idev] UDS.KEYID = 0
1,182,182 UART: [idev] Erasing UDS.KEYID = 0
1,199,226 UART: [idev] Sha1 KeyId Algorithm
1,208,060 UART: [idev] --
1,208,921 UART: [ldev] ++
1,209,089 UART: [ldev] CDI.KEYID = 6
1,209,453 UART: [ldev] SUBJECT.KEYID = 5
1,209,880 UART: [ldev] AUTHORITY.KEYID = 7
1,210,343 UART: [ldev] FE.KEYID = 1
1,215,819 UART: [ldev] Erasing FE.KEYID = 1
1,242,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,169 UART: [ldev] --
1,281,554 UART: [fwproc] Wait for Commands...
1,282,333 UART: [fwproc] Recv command 0x46574c44
1,283,066 UART: [fwproc] Recv'd Img size: 118548 bytes
1,293,724 writing to cptra_bootfsm_go
1,293,816 UART:
1,293,832 UART: Running Caliptra ROM ...
1,294,240 UART:
1,294,382 UART: [state] CFI Enabled
1,297,162 UART: [state] LifecycleState = Unprovisioned
1,297,817 UART: [state] DebugLocked = No
1,298,521 UART: [state] WD Timer not started. Device not locked for debugging
1,299,850 UART: [kat] SHA2-256
2,103,400 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,107,504 UART: [kat] ++
2,107,656 UART: [kat] sha1
2,112,006 UART: [kat] SHA2-256
2,113,946 UART: [kat] SHA2-384
2,116,555 UART: [kat] SHA2-512-ACC
2,118,456 UART: [kat] ECC-384
2,128,093 UART: [kat] HMAC-384Kdf
2,132,909 UART: [kat] LMS
2,381,221 UART: [kat] --
2,382,385 UART: [warm-reset] ++
2,382,653 UART: [warm-reset] Prev Cold-Reset failed
2,383,632 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,150,377 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,071 UART: [state] WD Timer not started. Device not locked for debugging
87,236 UART: [kat] SHA2-256
890,786 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,890 UART: [kat] ++
895,042 UART: [kat] sha1
899,150 UART: [kat] SHA2-256
901,090 UART: [kat] SHA2-384
903,933 UART: [kat] SHA2-512-ACC
905,834 UART: [kat] ECC-384
915,405 UART: [kat] HMAC-384Kdf
919,845 UART: [kat] LMS
1,168,157 UART: [kat] --
1,168,780 UART: [cold-reset] ++
1,169,194 UART: [fht] FHT @ 0x50003400
1,171,878 UART: [idev] ++
1,172,046 UART: [idev] CDI.KEYID = 6
1,172,407 UART: [idev] SUBJECT.KEYID = 7
1,172,832 UART: [idev] UDS.KEYID = 0
1,181,175 UART: [idev] Erasing UDS.KEYID = 0
1,198,019 UART: [idev] Sha1 KeyId Algorithm
1,206,983 UART: [idev] --
1,207,984 UART: [ldev] ++
1,208,152 UART: [ldev] CDI.KEYID = 6
1,208,516 UART: [ldev] SUBJECT.KEYID = 5
1,208,943 UART: [ldev] AUTHORITY.KEYID = 7
1,209,406 UART: [ldev] FE.KEYID = 1
1,214,306 UART: [ldev] Erasing FE.KEYID = 1
1,240,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,354 UART: [ldev] --
1,279,667 UART: [fwproc] Wait for Commands...
1,280,424 UART: [fwproc] Recv command 0x46574c44
1,281,157 UART: [fwproc] Recv'd Img size: 118548 bytes
1,291,989 writing to cptra_bootfsm_go
1,292,081 UART:
1,292,097 UART: Running Caliptra ROM ...
1,292,505 UART:
1,292,560 UART: [state] CFI Enabled
1,295,204 UART: [state] LifecycleState = Unprovisioned
1,295,859 UART: [state] DebugLocked = No
1,296,475 UART: [state] WD Timer not started. Device not locked for debugging
1,297,626 UART: [kat] SHA2-256
2,101,176 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,105,280 UART: [kat] ++
2,105,432 UART: [kat] sha1
2,109,658 UART: [kat] SHA2-256
2,111,598 UART: [kat] SHA2-384
2,114,537 UART: [kat] SHA2-512-ACC
2,116,438 UART: [kat] ECC-384
2,125,951 UART: [kat] HMAC-384Kdf
2,130,661 UART: [kat] LMS
2,378,973 UART: [kat] --
2,379,811 UART: [warm-reset] ++
2,380,079 UART: [warm-reset] Prev Cold-Reset failed
2,380,880 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,148,436 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
891,631 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,735 UART: [kat] ++
895,887 UART: [kat] sha1
900,057 UART: [kat] SHA2-256
901,997 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
916,322 UART: [kat] HMAC-384Kdf
921,016 UART: [kat] LMS
1,169,328 UART: [kat] --
1,170,193 UART: [cold-reset] ++
1,170,519 UART: [fht] FHT @ 0x50003400
1,173,231 UART: [idev] ++
1,173,399 UART: [idev] CDI.KEYID = 6
1,173,760 UART: [idev] SUBJECT.KEYID = 7
1,174,185 UART: [idev] UDS.KEYID = 0
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,480 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,633 UART: [ldev] ++
1,209,801 UART: [ldev] CDI.KEYID = 6
1,210,165 UART: [ldev] SUBJECT.KEYID = 5
1,210,592 UART: [ldev] AUTHORITY.KEYID = 7
1,211,055 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,207 UART: [ldev] --
1,281,612 UART: [fwproc] Wait for Commands...
1,282,253 UART: [fwproc] Recv command 0x46574c44
1,282,986 UART: [fwproc] Recv'd Img size: 118548 bytes
1,293,624 writing to cptra_bootfsm_go
1,293,716 UART:
1,293,732 UART: Running Caliptra ROM ...
1,294,140 UART:
1,294,282 UART: [state] CFI Enabled
1,297,008 UART: [state] LifecycleState = Unprovisioned
1,297,663 UART: [state] DebugLocked = No
1,298,309 UART: [state] WD Timer not started. Device not locked for debugging
1,299,416 UART: [kat] SHA2-256
2,102,966 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,107,070 UART: [kat] ++
2,107,222 UART: [kat] sha1
2,111,312 UART: [kat] SHA2-256
2,113,252 UART: [kat] SHA2-384
2,116,025 UART: [kat] SHA2-512-ACC
2,117,926 UART: [kat] ECC-384
2,127,789 UART: [kat] HMAC-384Kdf
2,132,317 UART: [kat] LMS
2,380,629 UART: [kat] --
2,381,597 UART: [warm-reset] ++
2,381,865 UART: [warm-reset] Prev Cold-Reset failed
2,382,918 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,149,201 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,650 UART: [state] LifecycleState = Unprovisioned
86,305 UART: [state] DebugLocked = No
86,893 UART: [state] WD Timer not started. Device not locked for debugging
88,050 UART: [kat] SHA2-256
891,600 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
904,957 UART: [kat] SHA2-512-ACC
906,858 UART: [kat] ECC-384
916,725 UART: [kat] HMAC-384Kdf
921,471 UART: [kat] LMS
1,169,783 UART: [kat] --
1,170,572 UART: [cold-reset] ++
1,171,034 UART: [fht] FHT @ 0x50003400
1,173,864 UART: [idev] ++
1,174,032 UART: [idev] CDI.KEYID = 6
1,174,393 UART: [idev] SUBJECT.KEYID = 7
1,174,818 UART: [idev] UDS.KEYID = 0
1,182,855 UART: [idev] Erasing UDS.KEYID = 0
1,199,353 UART: [idev] Sha1 KeyId Algorithm
1,208,409 UART: [idev] --
1,209,292 UART: [ldev] ++
1,209,460 UART: [ldev] CDI.KEYID = 6
1,209,824 UART: [ldev] SUBJECT.KEYID = 5
1,210,251 UART: [ldev] AUTHORITY.KEYID = 7
1,210,714 UART: [ldev] FE.KEYID = 1
1,215,682 UART: [ldev] Erasing FE.KEYID = 1
1,241,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,780 UART: [ldev] --
1,281,219 UART: [fwproc] Wait for Commands...
1,281,830 UART: [fwproc] Recv command 0x46574c44
1,282,563 UART: [fwproc] Recv'd Img size: 118548 bytes
1,293,451 writing to cptra_bootfsm_go
1,293,543 UART:
1,293,559 UART: Running Caliptra ROM ...
1,293,967 UART:
1,294,022 UART: [state] CFI Enabled
1,296,818 UART: [state] LifecycleState = Unprovisioned
1,297,473 UART: [state] DebugLocked = No
1,298,003 UART: [state] WD Timer not started. Device not locked for debugging
1,299,336 UART: [kat] SHA2-256
2,102,886 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,106,990 UART: [kat] ++
2,107,142 UART: [kat] sha1
2,111,382 UART: [kat] SHA2-256
2,113,322 UART: [kat] SHA2-384
2,116,027 UART: [kat] SHA2-512-ACC
2,117,928 UART: [kat] ECC-384
2,127,891 UART: [kat] HMAC-384Kdf
2,132,627 UART: [kat] LMS
2,380,939 UART: [kat] --
2,381,979 UART: [warm-reset] ++
2,382,247 UART: [warm-reset] Prev Cold-Reset failed
2,383,182 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,148,716 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,797 UART: [kat] ++
895,949 UART: [kat] sha1
900,195 UART: [kat] SHA2-256
902,135 UART: [kat] SHA2-384
904,746 UART: [kat] SHA2-512-ACC
906,647 UART: [kat] ECC-384
916,356 UART: [kat] HMAC-384Kdf
921,040 UART: [kat] LMS
1,169,352 UART: [kat] --
1,170,225 UART: [cold-reset] ++
1,170,801 UART: [fht] FHT @ 0x50003400
1,173,447 UART: [idev] ++
1,173,615 UART: [idev] CDI.KEYID = 6
1,173,976 UART: [idev] SUBJECT.KEYID = 7
1,174,401 UART: [idev] UDS.KEYID = 0
1,182,044 UART: [idev] Erasing UDS.KEYID = 0
1,198,770 UART: [idev] Sha1 KeyId Algorithm
1,207,578 UART: [idev] --
1,208,787 UART: [ldev] ++
1,208,955 UART: [ldev] CDI.KEYID = 6
1,209,319 UART: [ldev] SUBJECT.KEYID = 5
1,209,746 UART: [ldev] AUTHORITY.KEYID = 7
1,210,209 UART: [ldev] FE.KEYID = 1
1,215,237 UART: [ldev] Erasing FE.KEYID = 1
1,242,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,925 UART: [ldev] --
1,281,344 UART: [fwproc] Wait for Commands...
1,282,099 UART: [fwproc] Recv command 0x46574c44
1,282,832 UART: [fwproc] Recv'd Img size: 118548 bytes
1,293,598 writing to cptra_bootfsm_go
1,293,690 UART:
1,293,706 UART: Running Caliptra ROM ...
1,294,114 UART:
1,294,256 UART: [state] CFI Enabled
1,297,444 UART: [state] LifecycleState = Unprovisioned
1,298,099 UART: [state] DebugLocked = No
1,298,665 UART: [state] WD Timer not started. Device not locked for debugging
1,299,782 UART: [kat] SHA2-256
2,103,332 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,107,436 UART: [kat] ++
2,107,588 UART: [kat] sha1
2,111,668 UART: [kat] SHA2-256
2,113,608 UART: [kat] SHA2-384
2,116,361 UART: [kat] SHA2-512-ACC
2,118,262 UART: [kat] ECC-384
2,128,129 UART: [kat] HMAC-384Kdf
2,132,869 UART: [kat] LMS
2,381,181 UART: [kat] --
2,382,017 UART: [warm-reset] ++
2,382,285 UART: [warm-reset] Prev Cold-Reset failed
2,383,322 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,150,891 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
5,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,192 UART:
192,574 UART: Running Caliptra ROM ...
193,697 UART:
193,847 UART: [state] CFI Enabled
266,007 UART: [state] LifecycleState = Unprovisioned
267,986 UART: [state] DebugLocked = No
270,184 UART: [state] WD Timer not started. Device not locked for debugging
274,829 UART: [kat] SHA2-256
454,473 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,244 UART: [kat] ++
465,727 UART: [kat] sha1
476,125 UART: [kat] SHA2-256
478,819 UART: [kat] SHA2-384
484,369 UART: [kat] SHA2-512-ACC
486,730 UART: [kat] ECC-384
2,948,461 UART: [kat] HMAC-384Kdf
2,971,691 UART: [kat] LMS
3,448,189 UART: [kat] --
3,454,233 UART: [cold-reset] ++
3,455,422 UART: [fht] FHT @ 0x50003400
3,466,839 UART: [idev] ++
3,467,407 UART: [idev] CDI.KEYID = 6
3,468,430 UART: [idev] SUBJECT.KEYID = 7
3,469,590 UART: [idev] UDS.KEYID = 0
3,502,431 UART: [idev] Erasing UDS.KEYID = 0
5,987,094 UART: [idev] Sha1 KeyId Algorithm
6,010,122 UART: [idev] --
6,015,209 UART: [ldev] ++
6,015,791 UART: [ldev] CDI.KEYID = 6
6,016,707 UART: [ldev] SUBJECT.KEYID = 5
6,017,947 UART: [ldev] AUTHORITY.KEYID = 7
6,019,135 UART: [ldev] FE.KEYID = 1
6,056,207 UART: [ldev] Erasing FE.KEYID = 1
8,563,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,291,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,307,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,323,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,338,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,359,746 UART: [ldev] --
10,365,770 UART: [fwproc] Wait for Commands...
10,367,573 UART: [fwproc] Recv command 0x46574c44
10,369,607 UART: [fwproc] Recv'd Img size: 118548 bytes
13,843,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,920,451 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,993,484 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,322,368 >>> mbox cmd response: success
14,325,625 UART: [afmc] ++
14,326,230 UART: [afmc] CDI.KEYID = 6
14,327,147 UART: [afmc] SUBJECT.KEYID = 7
14,328,372 UART: [afmc] AUTHORITY.KEYID = 5
16,866,644 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,607,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,609,253 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,625,028 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,641,116 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,656,645 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,681,130 UART: [afmc] --
18,686,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,835,987 UART: [cold-reset] --
18,836,845 UART: [state] Locking Datavault
18,838,002 UART: [state] Locking PCR0, PCR1 and PCR31
18,839,547 UART: [state] Locking ICCM
18,840,478 UART: [exit] Launching FMC @ 0x40000130
18,841,908 UART:
18,842,079 UART: Running Caliptra FMC ...
18,843,182 UART:
18,843,345 UART: [state] CFI Enabled
18,844,267 UART: [fht] FMC Alias Private Key: 7
20,551,930 UART: [art] Extend RT PCRs Done
20,553,154 UART: [art] Lock RT PCRs Done
20,554,679 UART: [art] Populate DV Done
20,560,102 UART: [fht] FMC Alias Private Key: 7
20,561,647 UART: [art] Derive CDI
20,562,465 UART: [art] Store in slot 0x4
20,618,250 UART: [art] Derive Key Pair
20,619,292 UART: [art] Store priv key in slot 0x5
23,082,610 UART: [art] Derive Key Pair - Done
23,095,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,808,020 UART: [art] Erasing AUTHORITY.KEYID = 7
24,809,563 UART: [art] PUB.X = C6CDF9B69323AF442F93BE936441AE59791F72352246BFCA04F450B88EE85AF8CB077FDABEBA9F6384177B52C2BBBDC7
24,816,762 UART: [art] PUB.Y = 123FC3D2126EF5DA448BAA7C4D71022EA6F3D0AED7482D1435ACE28A00C71DA5BE6B13EFBC485E2E648B1B819551348C
24,824,038 UART: [art] SIG.R = 32302F23EDADDEA6767BB44590FA89E8B5F96A02808F8C09942E7EF359F4D6311B0F1D9C36EA8F9703CCA42F555C574D
24,831,424 UART: [art] SIG.S = 79C5F686FCADE572C503376155058614AB816177851672E2F8AC2F5910EFA862FEF424976D4D73EF382B6FD7B7C4BAC3
25,810,795 UART: Caliptra RT
25,811,508 UART: [state] CFI Enabled
25,989,937 UART: [rt] RT listening for mailbox commands...
25,992,946 UART:
25,993,119 UART: Running Caliptra ROM ...
25,994,229 UART:
25,994,389 UART: [state] CFI Enabled
26,062,622 UART: [state] LifecycleState = Unprovisioned
26,064,552 UART: [state] DebugLocked = No
26,066,243 UART: [state] WD Timer not started. Device not locked for debugging
26,069,238 UART: [kat] SHA2-256
26,248,907 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,259,694 UART: [kat] ++
26,260,154 UART: [kat] sha1
26,271,530 UART: [kat] SHA2-256
26,274,223 UART: [kat] SHA2-384
26,279,562 UART: [kat] SHA2-512-ACC
26,281,909 UART: [kat] ECC-384
28,748,972 UART: [kat] HMAC-384Kdf
28,769,284 UART: [kat] LMS
29,245,749 UART: [kat] --
29,250,316 UART: [update-reset] ++
32,746,001 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,748,678 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,146,303 >>> mbox cmd response: success
294 writing to cptra_bootfsm_go
605 UART: [update-re
1,144 UART: Running Caliptra ROM ...
2,198 UART:
2,351 UART: [state] CFI Enabled
58,444 UART: [state] LifecycleState = Unprovisioned
60,367 UART: [state] DebugLocked = No
61,643 UART: [state] WD Timer not started. Device not locked for debugging
64,731 UART: [kat] SHA2-256
244,397 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
255,210 UART: [kat] ++
255,737 UART: [kat] sha1
264,946 UART: [kat] SHA2-256
267,667 UART: [kat] SHA2-384
274,299 UART: [kat] SHA2-512-ACC
276,701 UART: [kat] ECC-384
2,722,609 UART: [kat] HMAC-384Kdf
2,744,967 UART: [kat] LMS
3,221,417 UART: [kat] --
3,224,976 UART: [warm-reset] ++
3,227,666 UART: [warm-reset] Prev Update Reset failed
3,230,222 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
5,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,227,443 >>> mbox cmd response: success
18,501,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,650,349 UART:
18,650,728 UART: Running Caliptra FMC ...
18,651,821 UART:
18,652,008 UART: [state] CFI Enabled
18,653,000 UART: [fht] FMC Alias Private Key: 7
20,350,411 UART: [art] Extend RT PCRs Done
20,351,640 UART: [art] Lock RT PCRs Done
20,353,058 UART: [art] Populate DV Done
20,358,428 UART: [fht] FMC Alias Private Key: 7
20,360,130 UART: [art] Derive CDI
20,360,874 UART: [art] Store in slot 0x4
20,416,221 UART: [art] Derive Key Pair
20,417,271 UART: [art] Store priv key in slot 0x5
22,879,962 UART: [art] Derive Key Pair - Done
22,892,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,606,120 UART: [art] Erasing AUTHORITY.KEYID = 7
24,607,624 UART: [art] PUB.X = 1F5F9560FDC1A257F1E880CB82075415E8F40D6196C4C0C967456D44C925D02931F4CE51C2DACBE9BA24671EA21B6CBC
24,614,896 UART: [art] PUB.Y = 5ED4FA399803304FBFE0FCEE8C30E39BD41233D7FE350ACBBCA2C1ECB461206C58B2FFE991A5ADB92533DA54B35FCF2F
24,622,176 UART: [art] SIG.R = 710DB25E214BC6768857A294A8196EC5182057C65BCB240E8554EFE927C9CD7A8B55A26A745E744C4AC75F735BB7CF7E
24,629,606 UART: [art] SIG.S = 3566CAA25263B3DAC7D8CCB0F8AA8F2DAFECCBEF07474056C92FE87DD3AF7800A00B9F59D57B5035E72D19E936606815
25,608,366 UART: Caliptra RT
25,609,087 UART: [state] CFI Enabled
25,791,250 UART: [rt] RT listening for mailbox commands...
32,961,341 >>> mbox cmd response: success
298 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
6,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,236 UART:
192,623 UART: Running Caliptra ROM ...
193,785 UART:
603,536 UART: [state] CFI Enabled
619,365 UART: [state] LifecycleState = Unprovisioned
621,249 UART: [state] DebugLocked = No
623,511 UART: [state] WD Timer not started. Device not locked for debugging
627,437 UART: [kat] SHA2-256
807,100 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,870 UART: [kat] ++
818,319 UART: [kat] sha1
828,756 UART: [kat] SHA2-256
831,493 UART: [kat] SHA2-384
838,891 UART: [kat] SHA2-512-ACC
841,267 UART: [kat] ECC-384
3,283,758 UART: [kat] HMAC-384Kdf
3,295,840 UART: [kat] LMS
3,772,343 UART: [kat] --
3,777,842 UART: [cold-reset] ++
3,780,198 UART: [fht] FHT @ 0x50003400
3,792,953 UART: [idev] ++
3,793,520 UART: [idev] CDI.KEYID = 6
3,794,535 UART: [idev] SUBJECT.KEYID = 7
3,795,687 UART: [idev] UDS.KEYID = 0
3,812,146 UART: [idev] Erasing UDS.KEYID = 0
6,271,782 UART: [idev] Sha1 KeyId Algorithm
6,295,811 UART: [idev] --
6,300,910 UART: [ldev] ++
6,301,539 UART: [ldev] CDI.KEYID = 6
6,302,449 UART: [ldev] SUBJECT.KEYID = 5
6,303,661 UART: [ldev] AUTHORITY.KEYID = 7
6,304,890 UART: [ldev] FE.KEYID = 1
6,314,294 UART: [ldev] Erasing FE.KEYID = 1
8,793,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,283 UART: [ldev] --
10,587,574 UART: [fwproc] Wait for Commands...
10,589,722 UART: [fwproc] Recv command 0x46574c44
10,591,709 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,098 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,122 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,220 >>> mbox cmd response: success
14,558,577 UART: [afmc] ++
14,559,160 UART: [afmc] CDI.KEYID = 6
14,560,104 UART: [afmc] SUBJECT.KEYID = 7
14,561,329 UART: [afmc] AUTHORITY.KEYID = 5
17,062,771 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,428 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,242 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,312 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,888 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,858,003 UART: [afmc] --
18,864,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,013,333 UART: [cold-reset] --
19,014,188 UART: [state] Locking Datavault
19,015,350 UART: [state] Locking PCR0, PCR1 and PCR31
19,016,888 UART: [state] Locking ICCM
19,017,796 UART: [exit] Launching FMC @ 0x40000130
19,019,228 UART:
19,019,396 UART: Running Caliptra FMC ...
19,020,521 UART:
19,020,682 UART: [state] CFI Enabled
19,021,519 UART: [fht] FMC Alias Private Key: 7
20,658,929 UART: [art] Extend RT PCRs Done
20,660,149 UART: [art] Lock RT PCRs Done
20,661,496 UART: [art] Populate DV Done
20,667,066 UART: [fht] FMC Alias Private Key: 7
20,668,764 UART: [art] Derive CDI
20,669,581 UART: [art] Store in slot 0x4
20,711,883 UART: [art] Derive Key Pair
20,712,924 UART: [art] Store priv key in slot 0x5
23,139,864 UART: [art] Derive Key Pair - Done
23,152,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,345 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,846 UART: [art] PUB.X = F5A6E44BF33208190A4E7AC8A5C387ADF8B04DCE2367E39AA91BFEBE3067B05487E9CFC324988C643FF728FD55B9A7E1
24,868,160 UART: [art] PUB.Y = 90A6C3544BF2C54F26B59598723DE734DA009EC326D24AE67B736F8CE7A54FDA555BBE9B3B9C82C02A715AFAE530B4B1
24,875,417 UART: [art] SIG.R = 229740EFFFD21EC92DEA45A71B95B9E9C92C6BA3D71CFE3B4630C3B138F8B50E0944F71C6B71FF6836B045F1CD1DAEE8
24,882,870 UART: [art] SIG.S = D4CED24715AB17121F068A435A058864B4159315C9E8493AD29A3768B095FD2FF25606382EAAAA7329586AF431917FA2
25,861,859 UART: Caliptra RT
25,862,574 UART: [state] CFI Enabled
25,995,629 UART: [rt] RT listening for mailbox commands...
25,998,472 UART:
25,998,635 UART: Running Caliptra ROM ...
25,999,736 UART:
26,000,052 UART: [state] CFI Enabled
26,016,283 UART: [state] LifecycleState = Unprovisioned
26,018,161 UART: [state] DebugLocked = No
26,019,565 UART: [state] WD Timer not started. Device not locked for debugging
26,023,237 UART: [kat] SHA2-256
26,202,949 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,213,713 UART: [kat] ++
26,214,161 UART: [kat] sha1
26,226,030 UART: [kat] SHA2-256
26,228,721 UART: [kat] SHA2-384
26,234,862 UART: [kat] SHA2-512-ACC
26,237,203 UART: [kat] ECC-384
28,679,228 UART: [kat] HMAC-384Kdf
28,692,206 UART: [kat] LMS
29,168,670 UART: [kat] --
29,174,162 UART: [update-reset] ++
32,667,911 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,671,773 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,069,419 >>> mbox cmd response: success
299 writing to cptra_bootfsm_go
612 UART: [update-r
1,089 UART: Running Caliptra ROM ...
2,267 UART:
7,513,158 UART: [state] CFI Enabled
7,526,611 UART: [state] LifecycleState = Unprovisioned
7,528,542 UART: [state] DebugLocked = No
7,530,648 UART: [state] WD Timer not started. Device not locked for debugging
7,534,070 UART: [kat] SHA2-256
7,713,718 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,724,505 UART: [kat] ++
7,724,960 UART: [kat] sha1
7,735,732 UART: [kat] SHA2-256
7,738,422 UART: [kat] SHA2-384
7,744,889 UART: [kat] SHA2-512-ACC
7,747,230 UART: [kat] ECC-384
10,186,348 UART: [kat] HMAC-384Kdf
10,199,277 UART: [kat] LMS
10,675,742 UART: [kat] --
10,681,398 UART: [warm-reset] ++
10,684,836 UART: [warm-reset] Prev Update Reset failed
10,688,537 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
6,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,995 >>> mbox cmd response: success
18,682,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,831,456 UART:
18,831,835 UART: Running Caliptra FMC ...
18,832,924 UART:
18,833,074 UART: [state] CFI Enabled
18,834,039 UART: [fht] FMC Alias Private Key: 7
20,474,572 UART: [art] Extend RT PCRs Done
20,475,798 UART: [art] Lock RT PCRs Done
20,477,613 UART: [art] Populate DV Done
20,482,838 UART: [fht] FMC Alias Private Key: 7
20,484,327 UART: [art] Derive CDI
20,485,088 UART: [art] Store in slot 0x4
20,527,795 UART: [art] Derive Key Pair
20,528,838 UART: [art] Store priv key in slot 0x5
22,955,363 UART: [art] Derive Key Pair - Done
22,968,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,019 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,521 UART: [art] PUB.X = 7389CCE2CA6EF34CD2A5BFD2A8BB2DEA6F28E6D5E1967FCEF6E9851194CC2B1FCB1EFCA454AF893233E373231320B0EF
24,683,823 UART: [art] PUB.Y = CA0A546CEC88F0078C1B83DE2C5270961107D02E4038C975904674C06303E20867865192A15F205AB2B7F5695AE0918C
24,691,031 UART: [art] SIG.R = 87FD014223F989E24D1196E065FE443064BE3579C07AD08881E492619BE652ECB9C7C71D4625B42348BCF699BE7BD7CC
24,698,424 UART: [art] SIG.S = F5D9EDDD526ADDF6F5C7C3458298D292259F9673F1D5FC5F569457F6A755CAF3759607E4FDE3770A579061A6B0680D19
25,677,908 UART: Caliptra RT
25,678,625 UART: [state] CFI Enabled
25,810,424 UART: [rt] RT listening for mailbox commands...
32,898,701 >>> mbox cmd response: success
303 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,282 UART: [kat] SHA2-256
890,832 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,936 UART: [kat] ++
895,088 UART: [kat] sha1
899,190 UART: [kat] SHA2-256
901,130 UART: [kat] SHA2-384
903,963 UART: [kat] SHA2-512-ACC
905,864 UART: [kat] ECC-384
915,585 UART: [kat] HMAC-384Kdf
920,239 UART: [kat] LMS
1,168,551 UART: [kat] --
1,169,222 UART: [cold-reset] ++
1,169,562 UART: [fht] FHT @ 0x50003400
1,172,048 UART: [idev] ++
1,172,216 UART: [idev] CDI.KEYID = 6
1,172,577 UART: [idev] SUBJECT.KEYID = 7
1,173,002 UART: [idev] UDS.KEYID = 0
1,180,875 UART: [idev] Erasing UDS.KEYID = 0
1,197,347 UART: [idev] Sha1 KeyId Algorithm
1,206,205 UART: [idev] --
1,207,252 UART: [ldev] ++
1,207,420 UART: [ldev] CDI.KEYID = 6
1,207,784 UART: [ldev] SUBJECT.KEYID = 5
1,208,211 UART: [ldev] AUTHORITY.KEYID = 7
1,208,674 UART: [ldev] FE.KEYID = 1
1,214,054 UART: [ldev] Erasing FE.KEYID = 1
1,240,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,764 UART: [ldev] --
1,280,129 UART: [fwproc] Wait for Commands...
1,280,948 UART: [fwproc] Recv command 0x46574c44
1,281,681 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,452 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,037 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,212 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,619 >>> mbox cmd response: success
2,826,743 UART: [afmc] ++
2,826,911 UART: [afmc] CDI.KEYID = 6
2,827,274 UART: [afmc] SUBJECT.KEYID = 7
2,827,700 UART: [afmc] AUTHORITY.KEYID = 5
2,863,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,595 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,305 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,186 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,887 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,560 UART: [afmc] --
2,906,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,906,433 UART: [cold-reset] --
2,907,315 UART: [state] Locking Datavault
2,908,404 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,008 UART: [state] Locking ICCM
2,909,648 UART: [exit] Launching FMC @ 0x40000130
2,914,978 UART:
2,914,994 UART: Running Caliptra FMC ...
2,915,402 UART:
2,915,456 UART: [state] CFI Enabled
2,926,210 UART: [fht] FMC Alias Private Key: 7
3,045,540 UART: [art] Extend RT PCRs Done
3,045,968 UART: [art] Lock RT PCRs Done
3,047,546 UART: [art] Populate DV Done
3,055,759 UART: [fht] FMC Alias Private Key: 7
3,056,849 UART: [art] Derive CDI
3,057,129 UART: [art] Store in slot 0x4
3,142,595 UART: [art] Derive Key Pair
3,142,955 UART: [art] Store priv key in slot 0x5
3,156,802 UART: [art] Derive Key Pair - Done
3,171,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,930 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,695 UART: [art] PUB.X = C504AB8DA1F673F1665941390B60CDFDB2102D71F02E51D15AE62AF004404C34A297B2BA0C7921ABD2AF580EADA896B6
3,194,462 UART: [art] PUB.Y = 6F52AAC9105935F803B3B839611D7156D1F7964A753D082C401A6CB039CB0611DC73BFABADD5EC898E420CA30709B27F
3,201,400 UART: [art] SIG.R = 0ADF7DCC009C0A725439E556A3C4B309E6BF39257C0CC2661FA5A86D1DCB7872E115EE46580BA36B5A6E4714DB1D00D8
3,208,123 UART: [art] SIG.S = 0AF76D6520BB8CFA6E8CBC527A1ECCB37CE3EA9E8CBC178D6A5B4BFF6E5F675A8076E7EB9AF3AF7EF504745C38A16B39
3,231,765 UART: Caliptra RT
3,232,016 UART: [state] CFI Enabled
3,351,476 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,392 UART:
3,353,408 UART: Running Caliptra ROM ...
3,353,816 UART:
3,353,871 UART: [state] CFI Enabled
3,356,377 UART: [state] LifecycleState = Unprovisioned
3,357,032 UART: [state] DebugLocked = No
3,357,540 UART: [state] WD Timer not started. Device not locked for debugging
3,358,838 UART: [kat] SHA2-256
4,162,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,166,492 UART: [kat] ++
4,166,644 UART: [kat] sha1
4,170,768 UART: [kat] SHA2-256
4,172,708 UART: [kat] SHA2-384
4,175,503 UART: [kat] SHA2-512-ACC
4,177,403 UART: [kat] ECC-384
4,187,006 UART: [kat] HMAC-384Kdf
4,191,572 UART: [kat] LMS
4,439,884 UART: [kat] --
4,440,562 UART: [update-reset] ++
5,800,361 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,801,550 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,956,765 >>> mbox cmd response: success
5,957,063 writing to cptra_bootfsm_go
5,957,155 UART:
5,957,171 UART: Running Caliptra ROM ...
5,957,579 UART:
5,957,634 UART: [state] CFI Enabled
5,960,464 UART: [state] LifecycleState = Unprovisioned
5,961,119 UART: [state] DebugLocked = No
5,961,777 UART: [state] WD Timer not started. Device not locked for debugging
5,963,078 UART: [kat] SHA2-256
6,766,628 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,770,732 UART: [kat] ++
6,770,884 UART: [kat] sha1
6,775,034 UART: [kat] SHA2-256
6,776,974 UART: [kat] SHA2-384
6,779,623 UART: [kat] SHA2-512-ACC
6,781,524 UART: [kat] ECC-384
6,791,285 UART: [kat] HMAC-384Kdf
6,796,051 UART: [kat] LMS
7,044,363 UART: [kat] --
7,045,161 UART: [warm-reset] ++
7,045,750 UART: [warm-reset] Prev Update Reset failed
7,046,731 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,078 >>> mbox cmd response: success
2,734,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,917 UART:
2,740,933 UART: Running Caliptra FMC ...
2,741,341 UART:
2,741,395 UART: [state] CFI Enabled
2,752,077 UART: [fht] FMC Alias Private Key: 7
2,870,661 UART: [art] Extend RT PCRs Done
2,871,089 UART: [art] Lock RT PCRs Done
2,872,611 UART: [art] Populate DV Done
2,880,660 UART: [fht] FMC Alias Private Key: 7
2,881,588 UART: [art] Derive CDI
2,881,868 UART: [art] Store in slot 0x4
2,967,672 UART: [art] Derive Key Pair
2,968,032 UART: [art] Store priv key in slot 0x5
2,980,949 UART: [art] Derive Key Pair - Done
2,995,658 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,957 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,722 UART: [art] PUB.X = D83DD881B83B9D79A39D8AF39836D2679118CC8D644D5713BB90FAADF25F141F8E060E22D22E72F997C7765B7C7F43E1
3,018,492 UART: [art] PUB.Y = 637540568CD069932499681683855505F4728FD72D2FAA16A68A74FC30ECAD532ED8AE62E70B95BE55457974D7A89283
3,025,428 UART: [art] SIG.R = 61657935AD9153CE6675523914220CB08F05A63BBA3DBBF10D64EC05F54C6529AA91013DB4251A4979B3545544FFD11E
3,032,181 UART: [art] SIG.S = 1EC61E0900C14611855CFC8CE4990CB6FEA5F07622FAA772EBB60D5A64CB3BAC829258FD3FD4F4F26D3BC1E8AA504E39
3,055,946 UART: Caliptra RT
3,056,197 UART: [state] CFI Enabled
3,175,727 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,665,048 >>> mbox cmd response: success
5,665,336 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,611 UART: [kat] SHA2-256
891,161 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,265 UART: [kat] ++
895,417 UART: [kat] sha1
899,713 UART: [kat] SHA2-256
901,653 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,886 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,481 UART: [cold-reset] ++
1,169,907 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,730 UART: [idev] Erasing UDS.KEYID = 0
1,198,640 UART: [idev] Sha1 KeyId Algorithm
1,207,554 UART: [idev] --
1,208,435 UART: [ldev] ++
1,208,603 UART: [ldev] CDI.KEYID = 6
1,208,967 UART: [ldev] SUBJECT.KEYID = 5
1,209,394 UART: [ldev] AUTHORITY.KEYID = 7
1,209,857 UART: [ldev] FE.KEYID = 1
1,215,395 UART: [ldev] Erasing FE.KEYID = 1
1,241,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,133 UART: [ldev] --
1,281,384 UART: [fwproc] Wait for Commands...
1,282,087 UART: [fwproc] Recv command 0x46574c44
1,282,820 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,774 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,949 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,296 >>> mbox cmd response: success
2,826,374 UART: [afmc] ++
2,826,542 UART: [afmc] CDI.KEYID = 6
2,826,905 UART: [afmc] SUBJECT.KEYID = 7
2,827,331 UART: [afmc] AUTHORITY.KEYID = 5
2,862,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,044 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,754 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,635 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,336 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,133 UART: [afmc] --
2,906,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,906,062 UART: [cold-reset] --
2,906,640 UART: [state] Locking Datavault
2,907,567 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,171 UART: [state] Locking ICCM
2,908,683 UART: [exit] Launching FMC @ 0x40000130
2,914,013 UART:
2,914,029 UART: Running Caliptra FMC ...
2,914,437 UART:
2,914,580 UART: [state] CFI Enabled
2,925,132 UART: [fht] FMC Alias Private Key: 7
3,043,896 UART: [art] Extend RT PCRs Done
3,044,324 UART: [art] Lock RT PCRs Done
3,045,756 UART: [art] Populate DV Done
3,054,091 UART: [fht] FMC Alias Private Key: 7
3,055,171 UART: [art] Derive CDI
3,055,451 UART: [art] Store in slot 0x4
3,140,637 UART: [art] Derive Key Pair
3,140,997 UART: [art] Store priv key in slot 0x5
3,154,496 UART: [art] Derive Key Pair - Done
3,169,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,924 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,689 UART: [art] PUB.X = 481461234EB359EE623535B11EC8BCD9BAC074E1AD4F56786E01D05A7138B66ABE4ED5D03F074A4DD964687DCF175E9D
3,192,463 UART: [art] PUB.Y = 3B49D639D275FABBC12AA4E49807D8D21B4B6C2F0FE3F696D194E1548A6750BB1229876D8A51D91DB078A1178FFA0144
3,199,410 UART: [art] SIG.R = F6A6B37A57EC2E3B3C563520271D57F4142081CE0F02146DF4947296295B2D2D10C8282414C7B5CAE293B1C0E429CB25
3,206,172 UART: [art] SIG.S = 5EDAB665AB439707608FFEF6410EA1C5F41A558063E6FAC4F62C8EAAE5FDCEC49044DF002008402916B90F5E99C0E1D9
3,230,026 UART: Caliptra RT
3,230,369 UART: [state] CFI Enabled
3,350,476 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,550 UART:
3,352,566 UART: Running Caliptra ROM ...
3,352,974 UART:
3,353,116 UART: [state] CFI Enabled
3,355,538 UART: [state] LifecycleState = Unprovisioned
3,356,193 UART: [state] DebugLocked = No
3,356,833 UART: [state] WD Timer not started. Device not locked for debugging
3,357,961 UART: [kat] SHA2-256
4,161,511 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,165,615 UART: [kat] ++
4,165,767 UART: [kat] sha1
4,170,111 UART: [kat] SHA2-256
4,172,051 UART: [kat] SHA2-384
4,174,642 UART: [kat] SHA2-512-ACC
4,176,542 UART: [kat] ECC-384
4,186,251 UART: [kat] HMAC-384Kdf
4,190,911 UART: [kat] LMS
4,439,223 UART: [kat] --
4,440,015 UART: [update-reset] ++
5,799,722 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,800,893 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,956,108 >>> mbox cmd response: success
5,956,352 writing to cptra_bootfsm_go
5,956,444 UART:
5,956,460 UART: Running Caliptra ROM ...
5,956,868 UART:
5,957,010 UART: [state] CFI Enabled
5,959,878 UART: [state] LifecycleState = Unprovisioned
5,960,533 UART: [state] DebugLocked = No
5,961,229 UART: [state] WD Timer not started. Device not locked for debugging
5,962,372 UART: [kat] SHA2-256
6,765,922 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,770,026 UART: [kat] ++
6,770,178 UART: [kat] sha1
6,774,402 UART: [kat] SHA2-256
6,776,342 UART: [kat] SHA2-384
6,778,941 UART: [kat] SHA2-512-ACC
6,780,842 UART: [kat] ECC-384
6,791,037 UART: [kat] HMAC-384Kdf
6,795,895 UART: [kat] LMS
7,044,207 UART: [kat] --
7,045,143 UART: [warm-reset] ++
7,045,754 UART: [warm-reset] Prev Update Reset failed
7,046,815 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,675 >>> mbox cmd response: success
2,735,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,741,056 UART:
2,741,072 UART: Running Caliptra FMC ...
2,741,480 UART:
2,741,623 UART: [state] CFI Enabled
2,752,013 UART: [fht] FMC Alias Private Key: 7
2,871,293 UART: [art] Extend RT PCRs Done
2,871,721 UART: [art] Lock RT PCRs Done
2,873,021 UART: [art] Populate DV Done
2,881,142 UART: [fht] FMC Alias Private Key: 7
2,882,194 UART: [art] Derive CDI
2,882,474 UART: [art] Store in slot 0x4
2,967,914 UART: [art] Derive Key Pair
2,968,274 UART: [art] Store priv key in slot 0x5
2,982,241 UART: [art] Derive Key Pair - Done
2,997,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,036 UART: [art] PUB.X = 4E3ADAF527A6A227D6A40158A3199186D6876F1D6F6A133DD08B22C1B50FD9BD90C423E56A058997A8DFB599DC2C7B54
3,019,805 UART: [art] PUB.Y = 82691680AA923E419923200B7A7B584A48ED0E25C94AF8375211CBE24C11EF895B9972D801A089423A4E98C54C21E1A8
3,026,740 UART: [art] SIG.R = BDB91F1CC41E48BA1F664A807054D14C6801F8D337D8EA65BF78D7761471DF20D476827ED974E0CCA8E28ADEA35B7F1E
3,033,521 UART: [art] SIG.S = 06922A165EC878E07598F92EFD2F790414FA729EA3C78BE98A1E8C2EF13A4695B6DC31AF76813BE4D70E7C1C549C80D3
3,056,956 UART: Caliptra RT
3,057,299 UART: [state] CFI Enabled
3,176,966 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,668,518 >>> mbox cmd response: success
5,668,748 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,106 UART: [kat] ++
895,258 UART: [kat] sha1
899,664 UART: [kat] SHA2-256
901,604 UART: [kat] SHA2-384
904,415 UART: [kat] SHA2-512-ACC
906,316 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,923 UART: [kat] LMS
1,169,235 UART: [kat] --
1,170,346 UART: [cold-reset] ++
1,170,796 UART: [fht] FHT @ 0x50003400
1,173,246 UART: [idev] ++
1,173,414 UART: [idev] CDI.KEYID = 6
1,173,775 UART: [idev] SUBJECT.KEYID = 7
1,174,200 UART: [idev] UDS.KEYID = 0
1,182,207 UART: [idev] Erasing UDS.KEYID = 0
1,199,563 UART: [idev] Sha1 KeyId Algorithm
1,208,451 UART: [idev] --
1,209,300 UART: [ldev] ++
1,209,468 UART: [ldev] CDI.KEYID = 6
1,209,832 UART: [ldev] SUBJECT.KEYID = 5
1,210,259 UART: [ldev] AUTHORITY.KEYID = 7
1,210,722 UART: [ldev] FE.KEYID = 1
1,216,120 UART: [ldev] Erasing FE.KEYID = 1
1,242,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,076 UART: [ldev] --
1,281,453 UART: [fwproc] Wait for Commands...
1,282,120 UART: [fwproc] Recv command 0x46574c44
1,282,853 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,865 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,040 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,377 >>> mbox cmd response: success
2,827,519 UART: [afmc] ++
2,827,687 UART: [afmc] CDI.KEYID = 6
2,828,050 UART: [afmc] SUBJECT.KEYID = 7
2,828,476 UART: [afmc] AUTHORITY.KEYID = 5
2,864,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,649 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,359 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,240 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,941 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,700 UART: [afmc] --
2,907,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,907,677 UART: [cold-reset] --
2,908,507 UART: [state] Locking Datavault
2,909,454 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,058 UART: [state] Locking ICCM
2,910,678 UART: [exit] Launching FMC @ 0x40000130
2,916,008 UART:
2,916,024 UART: Running Caliptra FMC ...
2,916,432 UART:
2,916,486 UART: [state] CFI Enabled
2,927,150 UART: [fht] FMC Alias Private Key: 7
3,046,314 UART: [art] Extend RT PCRs Done
3,046,742 UART: [art] Lock RT PCRs Done
3,048,490 UART: [art] Populate DV Done
3,056,613 UART: [fht] FMC Alias Private Key: 7
3,057,585 UART: [art] Derive CDI
3,057,865 UART: [art] Store in slot 0x4
3,143,724 UART: [art] Derive Key Pair
3,144,084 UART: [art] Store priv key in slot 0x5
3,157,284 UART: [art] Derive Key Pair - Done
3,171,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,440 UART: [art] PUB.X = DD6EE772224F4754D34A706E8B6B1066AEC13F793CEE9C80F2D13531DB98E74E3565504A56E661145D5F35FEF483A1FD
3,195,216 UART: [art] PUB.Y = F75B427A05B65C1AC989B2A767A80A6C351EB1D8921C7D77E3D9918B833437C779828522F0A692F71D0DA3FE36F6B073
3,202,157 UART: [art] SIG.R = B72C316AB7E9DF00726967A5F17E14182A317EDD88DDA867F23D3DF3ABD3CE6A3F4EC588FA7F191071E908712DDE27C4
3,208,916 UART: [art] SIG.S = 334B5A40E2A2863F4B77547D2778266C4F37A8774254F39AC69C0DC411A7FDBBC88848C80B02FE4DAA5BA8E2C8C701A1
3,232,878 UART: Caliptra RT
3,233,129 UART: [state] CFI Enabled
3,352,944 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,868 UART:
3,354,884 UART: Running Caliptra ROM ...
3,355,292 UART:
3,355,347 UART: [state] CFI Enabled
3,358,123 UART: [state] LifecycleState = Unprovisioned
3,358,778 UART: [state] DebugLocked = No
3,359,454 UART: [state] WD Timer not started. Device not locked for debugging
3,360,756 UART: [kat] SHA2-256
4,164,306 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,168,410 UART: [kat] ++
4,168,562 UART: [kat] sha1
4,172,724 UART: [kat] SHA2-256
4,174,664 UART: [kat] SHA2-384
4,177,491 UART: [kat] SHA2-512-ACC
4,179,391 UART: [kat] ECC-384
4,189,624 UART: [kat] HMAC-384Kdf
4,194,160 UART: [kat] LMS
4,442,472 UART: [kat] --
4,443,230 UART: [update-reset] ++
5,802,391 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,803,480 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,958,695 >>> mbox cmd response: success
5,958,831 writing to cptra_bootfsm_go
5,958,923 UART:
5,958,939 UART: Running Caliptra ROM ...
5,959,347 UART:
5,959,402 UART: [state] CFI Enabled
5,961,856 UART: [state] LifecycleState = Unprovisioned
5,962,511 UART: [state] DebugLocked = No
5,963,209 UART: [state] WD Timer not started. Device not locked for debugging
5,964,436 UART: [kat] SHA2-256
6,767,986 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,772,090 UART: [kat] ++
6,772,242 UART: [kat] sha1
6,776,494 UART: [kat] SHA2-256
6,778,434 UART: [kat] SHA2-384
6,780,957 UART: [kat] SHA2-512-ACC
6,782,858 UART: [kat] ECC-384
6,792,873 UART: [kat] HMAC-384Kdf
6,797,425 UART: [kat] LMS
7,045,737 UART: [kat] --
7,046,613 UART: [warm-reset] ++
7,047,282 UART: [warm-reset] Prev Update Reset failed
7,048,439 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,724 >>> mbox cmd response: success
2,733,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,739,939 UART:
2,739,955 UART: Running Caliptra FMC ...
2,740,363 UART:
2,740,417 UART: [state] CFI Enabled
2,750,977 UART: [fht] FMC Alias Private Key: 7
2,871,143 UART: [art] Extend RT PCRs Done
2,871,571 UART: [art] Lock RT PCRs Done
2,873,101 UART: [art] Populate DV Done
2,881,202 UART: [fht] FMC Alias Private Key: 7
2,882,162 UART: [art] Derive CDI
2,882,442 UART: [art] Store in slot 0x4
2,967,795 UART: [art] Derive Key Pair
2,968,155 UART: [art] Store priv key in slot 0x5
2,981,979 UART: [art] Derive Key Pair - Done
2,996,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,742 UART: [art] PUB.X = 8BF025C4E4ECD43A5B32E3D60B3C3257640C38A24064B3D3111A17280ADF5E04882901CC9C79EBDFCCF1E8DD50A012E5
3,019,509 UART: [art] PUB.Y = 515D3A4B9BC59B7A08855C2821CFD0CE9A4919DA1F8F3D5EC8FECD7E8A8D01CCF63A3F4CE761B698A1699F56FCAC057A
3,026,474 UART: [art] SIG.R = 7C0AC0FA274ECC1143DC91B375582D35013CEE3673EAEEBBF1EF0D0C1F86E06FE3E271E067466DBF79FDF5754F058623
3,033,245 UART: [art] SIG.S = B2FF43DF227BD398A24AD5DC93B70CD6A49DD446D1F47D149F3B43087F1EB6F1D8DE08C207D39E9FF5112AB4D4073EC7
3,056,980 UART: Caliptra RT
3,057,231 UART: [state] CFI Enabled
3,176,964 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,666,999 >>> mbox cmd response: success
5,667,111 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
899,931 UART: [kat] SHA2-256
901,871 UART: [kat] SHA2-384
904,484 UART: [kat] SHA2-512-ACC
906,385 UART: [kat] ECC-384
916,412 UART: [kat] HMAC-384Kdf
920,872 UART: [kat] LMS
1,169,184 UART: [kat] --
1,170,167 UART: [cold-reset] ++
1,170,551 UART: [fht] FHT @ 0x50003400
1,173,417 UART: [idev] ++
1,173,585 UART: [idev] CDI.KEYID = 6
1,173,946 UART: [idev] SUBJECT.KEYID = 7
1,174,371 UART: [idev] UDS.KEYID = 0
1,182,446 UART: [idev] Erasing UDS.KEYID = 0
1,199,108 UART: [idev] Sha1 KeyId Algorithm
1,208,132 UART: [idev] --
1,209,215 UART: [ldev] ++
1,209,383 UART: [ldev] CDI.KEYID = 6
1,209,747 UART: [ldev] SUBJECT.KEYID = 5
1,210,174 UART: [ldev] AUTHORITY.KEYID = 7
1,210,637 UART: [ldev] FE.KEYID = 1
1,216,167 UART: [ldev] Erasing FE.KEYID = 1
1,242,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,085 UART: [ldev] --
1,281,466 UART: [fwproc] Wait for Commands...
1,282,147 UART: [fwproc] Recv command 0x46574c44
1,282,880 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,436 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,611 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,830 >>> mbox cmd response: success
2,825,960 UART: [afmc] ++
2,826,128 UART: [afmc] CDI.KEYID = 6
2,826,491 UART: [afmc] SUBJECT.KEYID = 7
2,826,917 UART: [afmc] AUTHORITY.KEYID = 5
2,861,980 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,182 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,892 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,773 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,474 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,375 UART: [afmc] --
2,905,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,905,254 UART: [cold-reset] --
2,906,132 UART: [state] Locking Datavault
2,907,365 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,969 UART: [state] Locking ICCM
2,908,585 UART: [exit] Launching FMC @ 0x40000130
2,913,915 UART:
2,913,931 UART: Running Caliptra FMC ...
2,914,339 UART:
2,914,482 UART: [state] CFI Enabled
2,925,060 UART: [fht] FMC Alias Private Key: 7
3,043,708 UART: [art] Extend RT PCRs Done
3,044,136 UART: [art] Lock RT PCRs Done
3,045,940 UART: [art] Populate DV Done
3,054,253 UART: [fht] FMC Alias Private Key: 7
3,055,197 UART: [art] Derive CDI
3,055,477 UART: [art] Store in slot 0x4
3,141,278 UART: [art] Derive Key Pair
3,141,638 UART: [art] Store priv key in slot 0x5
3,155,398 UART: [art] Derive Key Pair - Done
3,170,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,244 UART: [art] PUB.X = 51E3C3C78439564528080CBCD1B1C146803EBF8A4A9B171E523EC8C439E4F5146CEDAADC10772EFF9B55573E7F0DE90B
3,193,014 UART: [art] PUB.Y = F6EA3C7EFA922D7FC72B87CB73B953127D49672E1044DB6A812B07E43446FB7B3B06978D5C8C1F84953A435A39ED6DD2
3,199,966 UART: [art] SIG.R = D875C0E96BC22131490387E126C99C6543E77610B66F65AF10BBE2538B7204DBBE4A328E3BB03625A020CC375BA47194
3,206,728 UART: [art] SIG.S = 8F562B818D0A02297F8AAE3C90822ACC29B05C5BD9A5A176571A4731E117AAC2944017EC7D99682AD779BA2D01B2E9B2
3,231,049 UART: Caliptra RT
3,231,392 UART: [state] CFI Enabled
3,351,068 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,110 UART:
3,353,126 UART: Running Caliptra ROM ...
3,353,534 UART:
3,353,676 UART: [state] CFI Enabled
3,356,466 UART: [state] LifecycleState = Unprovisioned
3,357,121 UART: [state] DebugLocked = No
3,357,667 UART: [state] WD Timer not started. Device not locked for debugging
3,358,833 UART: [kat] SHA2-256
4,162,383 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,166,487 UART: [kat] ++
4,166,639 UART: [kat] sha1
4,170,983 UART: [kat] SHA2-256
4,172,923 UART: [kat] SHA2-384
4,175,704 UART: [kat] SHA2-512-ACC
4,177,604 UART: [kat] ECC-384
4,187,459 UART: [kat] HMAC-384Kdf
4,192,079 UART: [kat] LMS
4,440,391 UART: [kat] --
4,441,151 UART: [update-reset] ++
5,800,194 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,801,157 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,956,372 >>> mbox cmd response: success
5,956,696 writing to cptra_bootfsm_go
5,956,788 UART:
5,956,804 UART: Running Caliptra ROM ...
5,957,212 UART:
5,957,354 UART: [state] CFI Enabled
5,960,514 UART: [state] LifecycleState = Unprovisioned
5,961,169 UART: [state] DebugLocked = No
5,961,683 UART: [state] WD Timer not started. Device not locked for debugging
5,962,962 UART: [kat] SHA2-256
6,766,512 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,770,616 UART: [kat] ++
6,770,768 UART: [kat] sha1
6,775,194 UART: [kat] SHA2-256
6,777,134 UART: [kat] SHA2-384
6,779,931 UART: [kat] SHA2-512-ACC
6,781,832 UART: [kat] ECC-384
6,791,775 UART: [kat] HMAC-384Kdf
6,796,245 UART: [kat] LMS
7,044,557 UART: [kat] --
7,045,457 UART: [warm-reset] ++
7,046,016 UART: [warm-reset] Prev Update Reset failed
7,047,001 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,069 >>> mbox cmd response: success
2,734,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,516 UART:
2,740,532 UART: Running Caliptra FMC ...
2,740,940 UART:
2,741,083 UART: [state] CFI Enabled
2,751,427 UART: [fht] FMC Alias Private Key: 7
2,870,871 UART: [art] Extend RT PCRs Done
2,871,299 UART: [art] Lock RT PCRs Done
2,872,575 UART: [art] Populate DV Done
2,880,930 UART: [fht] FMC Alias Private Key: 7
2,881,970 UART: [art] Derive CDI
2,882,250 UART: [art] Store in slot 0x4
2,967,961 UART: [art] Derive Key Pair
2,968,321 UART: [art] Store priv key in slot 0x5
2,981,803 UART: [art] Derive Key Pair - Done
2,996,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,622 UART: [art] PUB.X = A814E9EC34A58CC86CB48642DA4D8168610541532AD3B1CEC72A6D889981D0C73A63AED4E4DAEAC3D4949C479BC273D5
3,019,401 UART: [art] PUB.Y = 260ACD3103D9DAD5288A7B06CC33F42D1FAFB19E6C99A86E9E35C37BE66FF81CD77DC021A2231FE4CBDBC2AA2D507D69
3,026,366 UART: [art] SIG.R = D444D628C868ACE19B3771C4960FB1C2DE927E3B9EF8A5BF26EFD63A8DBBA2EB1D8CF594FFC2EDADEA2F2C6E1F56FC0D
3,033,166 UART: [art] SIG.S = 79E0C7E663D7E36F277D266FC2D8F863EB4387CFA4DCEA5D393F3175268635C330B689840F87BC3C1E20F224D2BE8704
3,056,944 UART: Caliptra RT
3,057,287 UART: [state] CFI Enabled
3,176,706 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,666,288 >>> mbox cmd response: success
5,666,612 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,404 UART: [kat] ++
895,556 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,219 UART: [kat] SHA2-512-ACC
906,120 UART: [kat] ECC-384
915,893 UART: [kat] HMAC-384Kdf
920,257 UART: [kat] LMS
1,168,569 UART: [kat] --
1,169,364 UART: [cold-reset] ++
1,169,762 UART: [fht] FHT @ 0x50003400
1,172,302 UART: [idev] ++
1,172,470 UART: [idev] CDI.KEYID = 6
1,172,831 UART: [idev] SUBJECT.KEYID = 7
1,173,256 UART: [idev] UDS.KEYID = 0
1,180,947 UART: [idev] Erasing UDS.KEYID = 0
1,197,339 UART: [idev] Sha1 KeyId Algorithm
1,206,363 UART: [idev] --
1,207,474 UART: [ldev] ++
1,207,642 UART: [ldev] CDI.KEYID = 6
1,208,006 UART: [ldev] SUBJECT.KEYID = 5
1,208,433 UART: [ldev] AUTHORITY.KEYID = 7
1,208,896 UART: [ldev] FE.KEYID = 1
1,214,010 UART: [ldev] Erasing FE.KEYID = 1
1,240,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,264 UART: [ldev] --
1,279,501 UART: [fwproc] Wait for Commands...
1,280,158 UART: [fwproc] Recv command 0x46574c44
1,280,891 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,405 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,580 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,941 >>> mbox cmd response: success
2,825,205 UART: [afmc] ++
2,825,373 UART: [afmc] CDI.KEYID = 6
2,825,736 UART: [afmc] SUBJECT.KEYID = 7
2,826,162 UART: [afmc] AUTHORITY.KEYID = 5
2,861,753 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,915 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,625 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,506 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,207 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,872 UART: [afmc] --
2,904,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,904,847 UART: [cold-reset] --
2,905,593 UART: [state] Locking Datavault
2,906,848 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,452 UART: [state] Locking ICCM
2,907,910 UART: [exit] Launching FMC @ 0x40000130
2,913,240 UART:
2,913,256 UART: Running Caliptra FMC ...
2,913,664 UART:
2,913,718 UART: [state] CFI Enabled
2,924,022 UART: [fht] FMC Alias Private Key: 7
3,042,804 UART: [art] Extend RT PCRs Done
3,043,232 UART: [art] Lock RT PCRs Done
3,044,806 UART: [art] Populate DV Done
3,053,295 UART: [fht] FMC Alias Private Key: 7
3,054,387 UART: [art] Derive CDI
3,054,667 UART: [art] Store in slot 0x4
3,140,688 UART: [art] Derive Key Pair
3,141,048 UART: [art] Store priv key in slot 0x5
3,154,146 UART: [art] Derive Key Pair - Done
3,169,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,383 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,148 UART: [art] PUB.X = C6005D3459A86D1EE5DBFFF2BC9843DF71A4F6FC34F2B4202E9CEDA17E448149A0412C601C6F2A20B0D49F8AF21C6C58
3,191,912 UART: [art] PUB.Y = 53EFA171C1F58CAC7F067766BB31F74A62E4444295A266651E49D4735B66415A57A1DC78F415C7778C5BB215C978C5CE
3,198,859 UART: [art] SIG.R = CAF3C0FE1628D68FE0D8DA5824273247339662DC24746C0D53A4C66E5E063BC7B9C6B64BC6ED1B24A7F2627E7028A955
3,205,629 UART: [art] SIG.S = 94318AA4FB890A2DDC401B161985C57F0422A5FB546EC3299FF2FF6BD79AFD1203BAD9A61121704AF73AAA1430A3F5F4
3,228,938 UART: Caliptra RT
3,229,189 UART: [state] CFI Enabled
3,348,219 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,349,889 UART:
3,349,905 UART: Running Caliptra ROM ...
3,350,313 UART:
3,350,368 UART: [state] CFI Enabled
3,352,320 UART: [state] LifecycleState = Unprovisioned
3,352,975 UART: [state] DebugLocked = No
3,353,465 UART: [state] WD Timer not started. Device not locked for debugging
3,354,739 UART: [kat] SHA2-256
4,158,289 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,162,393 UART: [kat] ++
4,162,545 UART: [kat] sha1
4,166,871 UART: [kat] SHA2-256
4,168,811 UART: [kat] SHA2-384
4,171,510 UART: [kat] SHA2-512-ACC
4,173,410 UART: [kat] ECC-384
4,183,131 UART: [kat] HMAC-384Kdf
4,187,743 UART: [kat] LMS
4,436,055 UART: [kat] --
4,436,827 UART: [update-reset] ++
5,796,604 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,797,593 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,952,808 >>> mbox cmd response: success
5,952,916 writing to cptra_bootfsm_go
5,953,008 UART:
5,953,024 UART: Running Caliptra ROM ...
5,953,432 UART:
5,953,487 UART: [state] CFI Enabled
5,956,105 UART: [state] LifecycleState = Unprovisioned
5,956,760 UART: [state] DebugLocked = No
5,957,418 UART: [state] WD Timer not started. Device not locked for debugging
5,958,615 UART: [kat] SHA2-256
6,762,165 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,766,269 UART: [kat] ++
6,766,421 UART: [kat] sha1
6,770,679 UART: [kat] SHA2-256
6,772,619 UART: [kat] SHA2-384
6,775,166 UART: [kat] SHA2-512-ACC
6,777,067 UART: [kat] ECC-384
6,786,848 UART: [kat] HMAC-384Kdf
6,791,348 UART: [kat] LMS
7,039,660 UART: [kat] --
7,040,668 UART: [warm-reset] ++
7,041,423 UART: [warm-reset] Prev Update Reset failed
7,042,374 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,700 >>> mbox cmd response: success
2,732,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,738,897 UART:
2,738,913 UART: Running Caliptra FMC ...
2,739,321 UART:
2,739,375 UART: [state] CFI Enabled
2,749,415 UART: [fht] FMC Alias Private Key: 7
2,867,881 UART: [art] Extend RT PCRs Done
2,868,309 UART: [art] Lock RT PCRs Done
2,870,195 UART: [art] Populate DV Done
2,878,210 UART: [fht] FMC Alias Private Key: 7
2,879,332 UART: [art] Derive CDI
2,879,612 UART: [art] Store in slot 0x4
2,965,439 UART: [art] Derive Key Pair
2,965,799 UART: [art] Store priv key in slot 0x5
2,979,065 UART: [art] Derive Key Pair - Done
2,993,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,478 UART: [art] PUB.X = 02DF85FA69A9E4B16D98E813A4B1C7F668C80E65B25BB21BD9B0B99E9502E1935B4B293E42360FAEA4B0FC4498A320EB
3,016,248 UART: [art] PUB.Y = 4ADDD2E1867A9B25AA509104A093119BAECAEF035EE43543CF84DAC9CF7B4C1A21C6563CA35F8E187B0F51DA519E53E7
3,023,207 UART: [art] SIG.R = CC2D57A2EB2D5F14F349735C9284D50BDEAD3EC8494F67D124DE0949A10695A6D68CBEA2313E25D8B6D1194FA9445DAB
3,029,982 UART: [art] SIG.S = CB8D86019DF929E88C65684D9DFA32066E82FE146523F30A7039F90CE4044438B2F0025CDFD38C80D573670405477E04
3,053,885 UART: Caliptra RT
3,054,136 UART: [state] CFI Enabled
3,173,082 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,662,591 >>> mbox cmd response: success
5,662,853 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,987 UART: [state] LifecycleState = Unprovisioned
85,642 UART: [state] DebugLocked = No
86,334 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,208 UART: [kat] SHA2-512-ACC
906,109 UART: [kat] ECC-384
915,622 UART: [kat] HMAC-384Kdf
920,184 UART: [kat] LMS
1,168,496 UART: [kat] --
1,169,531 UART: [cold-reset] ++
1,170,111 UART: [fht] FHT @ 0x50003400
1,172,797 UART: [idev] ++
1,172,965 UART: [idev] CDI.KEYID = 6
1,173,326 UART: [idev] SUBJECT.KEYID = 7
1,173,751 UART: [idev] UDS.KEYID = 0
1,182,168 UART: [idev] Erasing UDS.KEYID = 0
1,199,184 UART: [idev] Sha1 KeyId Algorithm
1,208,184 UART: [idev] --
1,209,053 UART: [ldev] ++
1,209,221 UART: [ldev] CDI.KEYID = 6
1,209,585 UART: [ldev] SUBJECT.KEYID = 5
1,210,012 UART: [ldev] AUTHORITY.KEYID = 7
1,210,475 UART: [ldev] FE.KEYID = 1
1,215,633 UART: [ldev] Erasing FE.KEYID = 1
1,241,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,767 UART: [ldev] --
1,281,102 UART: [fwproc] Wait for Commands...
1,281,861 UART: [fwproc] Recv command 0x46574c44
1,282,594 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,886 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,061 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,292 >>> mbox cmd response: success
2,827,324 UART: [afmc] ++
2,827,492 UART: [afmc] CDI.KEYID = 6
2,827,855 UART: [afmc] SUBJECT.KEYID = 7
2,828,281 UART: [afmc] AUTHORITY.KEYID = 5
2,864,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,462 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,172 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,053 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,754 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,627 UART: [afmc] --
2,907,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,907,566 UART: [cold-reset] --
2,908,286 UART: [state] Locking Datavault
2,909,791 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,395 UART: [state] Locking ICCM
2,910,981 UART: [exit] Launching FMC @ 0x40000130
2,916,311 UART:
2,916,327 UART: Running Caliptra FMC ...
2,916,735 UART:
2,916,878 UART: [state] CFI Enabled
2,927,504 UART: [fht] FMC Alias Private Key: 7
3,047,098 UART: [art] Extend RT PCRs Done
3,047,526 UART: [art] Lock RT PCRs Done
3,049,412 UART: [art] Populate DV Done
3,057,689 UART: [fht] FMC Alias Private Key: 7
3,058,691 UART: [art] Derive CDI
3,058,971 UART: [art] Store in slot 0x4
3,144,998 UART: [art] Derive Key Pair
3,145,358 UART: [art] Store priv key in slot 0x5
3,158,716 UART: [art] Derive Key Pair - Done
3,173,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,446 UART: [art] PUB.X = 1E71FA376D0DA69F0488254CFF4BE4D835CA9CAC2708B98A0BB5124F6C68B893B1CB3216FF22346466FA9AC5211F575B
3,196,214 UART: [art] PUB.Y = 3FBE8DB36DF4AAA58EAEE85DCB811E420AE0702D6C9590B37774536940C242D4EA8CA301AFDC9B547479B004471533D0
3,203,165 UART: [art] SIG.R = 1FE98146AE43F031CECDCCFEC09EB7F9C3E88AFABF870CCA8EC88CDE17926687B55704D1EA25732FEE9D5D9154384C82
3,209,951 UART: [art] SIG.S = E5B672525E8A453E08FE83F85DA9F58DD384A6DEE93E788485DAA748B1BAE19B9AFB30CDB0D50A75B606B87937817F60
3,233,514 UART: Caliptra RT
3,233,857 UART: [state] CFI Enabled
3,353,850 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,355,494 UART:
3,355,510 UART: Running Caliptra ROM ...
3,355,918 UART:
3,356,060 UART: [state] CFI Enabled
3,358,960 UART: [state] LifecycleState = Unprovisioned
3,359,615 UART: [state] DebugLocked = No
3,360,185 UART: [state] WD Timer not started. Device not locked for debugging
3,361,389 UART: [kat] SHA2-256
4,164,939 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,169,043 UART: [kat] ++
4,169,195 UART: [kat] sha1
4,173,445 UART: [kat] SHA2-256
4,175,385 UART: [kat] SHA2-384
4,178,078 UART: [kat] SHA2-512-ACC
4,179,978 UART: [kat] ECC-384
4,189,847 UART: [kat] HMAC-384Kdf
4,194,537 UART: [kat] LMS
4,442,849 UART: [kat] --
4,443,941 UART: [update-reset] ++
5,803,392 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,804,401 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,959,616 >>> mbox cmd response: success
5,959,930 writing to cptra_bootfsm_go
5,960,022 UART:
5,960,038 UART: Running Caliptra ROM ...
5,960,446 UART:
5,960,588 UART: [state] CFI Enabled
5,963,254 UART: [state] LifecycleState = Unprovisioned
5,963,909 UART: [state] DebugLocked = No
5,964,435 UART: [state] WD Timer not started. Device not locked for debugging
5,965,596 UART: [kat] SHA2-256
6,769,146 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,773,250 UART: [kat] ++
6,773,402 UART: [kat] sha1
6,777,806 UART: [kat] SHA2-256
6,779,746 UART: [kat] SHA2-384
6,782,461 UART: [kat] SHA2-512-ACC
6,784,362 UART: [kat] ECC-384
6,794,171 UART: [kat] HMAC-384Kdf
6,798,913 UART: [kat] LMS
7,047,225 UART: [kat] --
7,047,831 UART: [warm-reset] ++
7,048,438 UART: [warm-reset] Prev Update Reset failed
7,049,527 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,182 >>> mbox cmd response: success
2,735,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,741,901 UART:
2,741,917 UART: Running Caliptra FMC ...
2,742,325 UART:
2,742,468 UART: [state] CFI Enabled
2,752,964 UART: [fht] FMC Alias Private Key: 7
2,871,848 UART: [art] Extend RT PCRs Done
2,872,276 UART: [art] Lock RT PCRs Done
2,873,826 UART: [art] Populate DV Done
2,881,881 UART: [fht] FMC Alias Private Key: 7
2,882,939 UART: [art] Derive CDI
2,883,219 UART: [art] Store in slot 0x4
2,969,100 UART: [art] Derive Key Pair
2,969,460 UART: [art] Store priv key in slot 0x5
2,983,020 UART: [art] Derive Key Pair - Done
2,997,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,216 UART: [art] PUB.X = E0878F217EC721B7F6E5A03E37EDDBD28F788896BAA2EB38ACFE7C6C7A8CD43B7F2EE3A47DFBE592559342E9F640382C
3,021,006 UART: [art] PUB.Y = 39EF8F5D3D3DEA608438E788E356F3DA1721BFF64A97E80721A6FB67D2812DFC3CAB0C5240CDC599828713B0F35FB571
3,027,960 UART: [art] SIG.R = 88AC7E9A8036EFCDB642B0A5CDC017CD05C5B63B00CAAB3BC86526D64C89C208BE5BA9FB63159BF163FAE75129E46B25
3,034,722 UART: [art] SIG.S = 01E4AFFC099466D6F4C3AD9F91E8386C54C8DC8DD7AD807B20DFED2DC9FC1C82E2A8F4053FB283C41A69B7A6A3BCE5C8
3,058,545 UART: Caliptra RT
3,058,888 UART: [state] CFI Enabled
3,178,155 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,668,920 >>> mbox cmd response: success
5,669,134 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
191,528 UART:
192,024 UART: Running Caliptra ROM ...
193,194 UART:
193,344 UART: [state] CFI Enabled
252,052 UART: [state] LifecycleState = Production
253,877 UART: [state] DebugLocked = Yes
255,938 UART: [state] Starting the WD Timer 40000000 cycles
260,147 UART: [kat] SHA2-256
439,772 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
450,571 UART: [kat] ++
451,023 UART: [kat] sha1
462,080 UART: [kat] SHA2-256
464,745 UART: [kat] SHA2-384
470,025 UART: [kat] SHA2-512-ACC
472,400 UART: [kat] ECC-384
2,918,554 UART: [kat] HMAC-384Kdf
2,940,796 UART: [kat] LMS
3,417,291 UART: [kat] --
3,422,078 UART: [cold-reset] ++
3,423,527 UART: [fht] FHT @ 0x50003400
3,433,805 UART: [idev] ++
3,434,371 UART: [idev] CDI.KEYID = 6
3,435,328 UART: [idev] SUBJECT.KEYID = 7
3,436,598 UART: [idev] UDS.KEYID = 0
3,437,507 ready_for_fw is high
3,437,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,586,851 UART: [idev] Erasing UDS.KEYID = 0
5,957,793 UART: [idev] Sha1 KeyId Algorithm
5,981,879 UART: [idev] --
5,986,661 UART: [ldev] ++
5,987,248 UART: [ldev] CDI.KEYID = 6
5,988,193 UART: [ldev] SUBJECT.KEYID = 5
5,989,410 UART: [ldev] AUTHORITY.KEYID = 7
5,990,647 UART: [ldev] FE.KEYID = 1
6,027,468 UART: [ldev] Erasing FE.KEYID = 1
8,532,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,268,439 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,284,273 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,300,167 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,315,912 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,336,744 UART: [ldev] --
10,343,037 UART: [fwproc] Wait for Commands...
10,344,764 UART: [fwproc] Recv command 0x46574c44
10,346,757 UART: [fwproc] Recv'd Img size: 118548 bytes
13,855,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,739 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,747 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,413 >>> mbox cmd response: success
14,341,932 UART: [afmc] ++
14,342,525 UART: [afmc] CDI.KEYID = 6
14,343,469 UART: [afmc] SUBJECT.KEYID = 7
14,344,690 UART: [afmc] AUTHORITY.KEYID = 5
16,888,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,629,751 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,631,937 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,647,834 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,663,866 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,679,401 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,703,567 UART: [afmc] --
18,707,587 UART: [cold-reset] --
18,713,287 UART: [state] Locking Datavault
18,718,433 UART: [state] Locking PCR0, PCR1 and PCR31
18,720,134 UART: [state] Locking ICCM
18,722,885 UART: [exit] Launching FMC @ 0x40000130
18,731,336 UART:
18,731,578 UART: Running Caliptra FMC ...
18,732,685 UART:
18,732,849 UART: [state] CFI Enabled
18,785,923 UART: [fht] FMC Alias Private Key: 7
20,552,916 UART: [art] Extend RT PCRs Done
20,554,146 UART: [art] Lock RT PCRs Done
20,555,878 UART: [art] Populate DV Done
20,561,321 UART: [fht] FMC Alias Private Key: 7
20,563,023 UART: [art] Derive CDI
20,563,849 UART: [art] Store in slot 0x4
20,619,780 UART: [art] Derive Key Pair
20,620,823 UART: [art] Store priv key in slot 0x5
23,083,377 UART: [art] Derive Key Pair - Done
23,096,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,809,598 UART: [art] Erasing AUTHORITY.KEYID = 7
24,811,110 UART: [art] PUB.X = 66F5E89F50B6AF5781E043C2D68F2B456E034E2748B37CE5485DA554A22659F8C42C1D8220E8256A5E82E23D8E1080F1
24,818,365 UART: [art] PUB.Y = EDBD31DBB47413A28A733A9B804AD4330CEB0B5BCE0F02BA8C4D623A98EA06B15BB01FD8C62FA814806CB40C79777E57
24,825,602 UART: [art] SIG.R = 24275FFDD25C1B60E91F0FCC0D4A48B5EAB37C1690A31BD9E20A4C3A7051E945AAA74C7CD5FE6306498543CC916DFE9A
24,833,050 UART: [art] SIG.S = 9DD733D3EF6771A2D8FA4FC1E98C6E6418952CF01033C4D22366F4064BEF83043D930D7BBBCF1BD95F72AD5A7E530491
25,811,985 UART: Caliptra RT
25,812,704 UART: [state] CFI Enabled
25,995,137 UART: [rt] RT listening for mailbox commands...
301 writing to cptra_bootfsm_go
562 UART:
710 UART: Running Caliptra ROM ...
1,809 UART:
1,974 UART: [state] CFI Enabled
70,380 UART: [state] LifecycleState = Production
72,198 UART: [state] DebugLocked = Yes
74,490 UART: [state] Starting the WD Timer 40000000 cycles
79,874 UART: [kat] SHA2-256
259,546 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
270,378 UART: [kat] ++
270,912 UART: [kat] sha1
281,637 UART: [kat] SHA2-256
284,315 UART: [kat] SHA2-384
289,216 UART: [kat] SHA2-512-ACC
291,553 UART: [kat] ECC-384
2,750,983 UART: [kat] HMAC-384Kdf
2,776,440 UART: [kat] LMS
3,252,942 UART: [kat] --
3,256,122 UART: [warm-reset] ++
3,262,650 UART: [warm-reset] --
3,266,523 UART: [state] Locking Datavault
3,270,050 UART: [state] Locking PCR0, PCR1 and PCR31
3,271,755 UART: [state] Locking ICCM
3,273,374 UART: [exit] Launching FMC @ 0x40000130
3,281,781 UART:
3,282,024 UART: Running Caliptra FMC ...
3,283,128 UART:
3,283,294 UART: [state] CFI Enabled
3,343,242 UART: [art] Skip pcr extension
3,344,384 UART: [art] Extend RT PCRs Done
3,345,536 UART: [art] Lock RT PCRs Done
3,346,629 UART: [art] Populate DV Done
3,351,939 UART: [fht] FMC Alias Private Key: 7
3,353,481 UART: [art] Derive CDI
3,354,301 UART: [art] Store in slot 0x4
3,411,882 UART: [art] Derive Key Pair
3,412,926 UART: [art] Store priv key in slot 0x5
5,875,916 UART: [art] Derive Key Pair - Done
5,889,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,601,924 UART: [art] Erasing AUTHORITY.KEYID = 7
7,603,433 UART: [art] PUB.X = 66F5E89F50B6AF5781E043C2D68F2B456E034E2748B37CE5485DA554A22659F8C42C1D8220E8256A5E82E23D8E1080F1
7,610,690 UART: [art] PUB.Y = EDBD31DBB47413A28A733A9B804AD4330CEB0B5BCE0F02BA8C4D623A98EA06B15BB01FD8C62FA814806CB40C79777E57
7,617,964 UART: [art] SIG.R = 24275FFDD25C1B60E91F0FCC0D4A48B5EAB37C1690A31BD9E20A4C3A7051E945AAA74C7CD5FE6306498543CC916DFE9A
7,625,425 UART: [art] SIG.S = 9DD733D3EF6771A2D8FA4FC1E98C6E6418952CF01033C4D22366F4064BEF83043D930D7BBBCF1BD95F72AD5A7E530491
8,604,373 UART: Caliptra RT
8,605,089 UART: [state] CFI Enabled
9,027,599 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
191,458 UART:
191,817 UART: Running Caliptra ROM ...
192,920 UART:
193,070 UART: [state] CFI Enabled
265,111 UART: [state] LifecycleState = Production
266,926 UART: [state] DebugLocked = Yes
269,767 UART: [state] Starting the WD Timer 40000000 cycles
274,303 UART: [kat] SHA2-256
453,965 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,737 UART: [kat] ++
465,194 UART: [kat] sha1
476,664 UART: [kat] SHA2-256
479,329 UART: [kat] SHA2-384
485,604 UART: [kat] SHA2-512-ACC
487,981 UART: [kat] ECC-384
2,950,701 UART: [kat] HMAC-384Kdf
2,971,180 UART: [kat] LMS
3,447,683 UART: [kat] --
3,453,899 UART: [cold-reset] ++
3,456,399 UART: [fht] FHT @ 0x50003400
3,467,964 UART: [idev] ++
3,468,541 UART: [idev] CDI.KEYID = 6
3,469,498 UART: [idev] SUBJECT.KEYID = 7
3,470,744 UART: [idev] UDS.KEYID = 0
3,471,647 ready_for_fw is high
3,471,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,985 UART: [idev] Erasing UDS.KEYID = 0
5,986,054 UART: [idev] Sha1 KeyId Algorithm
6,009,537 UART: [idev] --
6,014,460 UART: [ldev] ++
6,015,037 UART: [ldev] CDI.KEYID = 6
6,015,981 UART: [ldev] SUBJECT.KEYID = 5
6,017,148 UART: [ldev] AUTHORITY.KEYID = 7
6,018,441 UART: [ldev] FE.KEYID = 1
6,058,470 UART: [ldev] Erasing FE.KEYID = 1
8,563,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,130 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,315,914 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,331,791 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,347,563 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,369,411 UART: [ldev] --
10,375,422 UART: [fwproc] Wait for Commands...
10,377,474 UART: [fwproc] Recv command 0x46574c44
10,379,515 UART: [fwproc] Recv'd Img size: 118548 bytes
13,890,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,975,136 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,048,171 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,376,157 >>> mbox cmd response: success
14,380,214 UART: [afmc] ++
14,380,805 UART: [afmc] CDI.KEYID = 6
14,381,776 UART: [afmc] SUBJECT.KEYID = 7
14,382,937 UART: [afmc] AUTHORITY.KEYID = 5
16,915,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,635,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,637,854 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,653,707 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,669,757 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,685,316 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,710,041 UART: [afmc] --
18,714,234 UART: [cold-reset] --
18,718,430 UART: [state] Locking Datavault
18,724,917 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,619 UART: [state] Locking ICCM
18,728,557 UART: [exit] Launching FMC @ 0x40000130
18,736,952 UART:
18,737,197 UART: Running Caliptra FMC ...
18,738,303 UART:
18,738,474 UART: [state] CFI Enabled
18,793,348 UART: [fht] FMC Alias Private Key: 7
20,559,585 UART: [art] Extend RT PCRs Done
20,560,812 UART: [art] Lock RT PCRs Done
20,562,441 UART: [art] Populate DV Done
20,567,859 UART: [fht] FMC Alias Private Key: 7
20,569,400 UART: [art] Derive CDI
20,570,220 UART: [art] Store in slot 0x4
20,625,642 UART: [art] Derive Key Pair
20,626,689 UART: [art] Store priv key in slot 0x5
23,089,799 UART: [art] Derive Key Pair - Done
23,102,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,814,845 UART: [art] Erasing AUTHORITY.KEYID = 7
24,816,353 UART: [art] PUB.X = D0BBD9C2CD7292F646358678557D863BB8A4C9BE25520C732DB8D6DAC6E1722D69E033A0D9BCC47D0F6F498FF9C19357
24,823,610 UART: [art] PUB.Y = EBD4CDA5C90D172F0549FD25AB8207C9A3F558073DBE89B51799AB02BD6236E494CA936DC54806D87513B77063A66CAD
24,830,854 UART: [art] SIG.R = D758909B7A45BE41D9D52A92ECC1654FFB73AB1E60424D83C6B4C6E712E5DA22615642987E3FFE5C7FDBEA3FFEEF9361
24,838,264 UART: [art] SIG.S = 511FF5080C46FC84A9472CB9E86CBB366DE44B6D3CED2D452B2107C37F138954B52824AF6D03A7378DA3E90124A5CADA
25,816,439 UART: Caliptra RT
25,817,145 UART: [state] CFI Enabled
25,997,583 UART: [rt] RT listening for mailbox commands...
295 writing to cptra_bootfsm_go
549 UART:
698 UART: Running Caliptra ROM ...
1,798 UART:
1,957 UART: [state] CFI Enabled
69,827 UART: [state] LifecycleState = Production
71,650 UART: [state] DebugLocked = Yes
74,583 UART: [state] Starting the WD Timer 40000000 cycles
79,750 UART: [kat] SHA2-256
259,417 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
270,189 UART: [kat] ++
270,721 UART: [kat] sha1
282,417 UART: [kat] SHA2-256
285,118 UART: [kat] SHA2-384
290,666 UART: [kat] SHA2-512-ACC
293,044 UART: [kat] ECC-384
2,753,730 UART: [kat] HMAC-384Kdf
2,777,786 UART: [kat] LMS
3,254,241 UART: [kat] --
3,260,287 UART: [warm-reset] ++
3,265,139 UART: [warm-reset] --
3,269,433 UART: [state] Locking Datavault
3,272,957 UART: [state] Locking PCR0, PCR1 and PCR31
3,274,717 UART: [state] Locking ICCM
3,276,710 UART: [exit] Launching FMC @ 0x40000130
3,285,108 UART:
3,285,358 UART: Running Caliptra FMC ...
3,286,411 UART:
3,286,571 UART: [state] CFI Enabled
3,344,535 UART: [art] Skip pcr extension
3,345,684 UART: [art] Extend RT PCRs Done
3,346,837 UART: [art] Lock RT PCRs Done
3,347,967 UART: [art] Populate DV Done
3,353,810 UART: [fht] FMC Alias Private Key: 7
3,355,406 UART: [art] Derive CDI
3,356,224 UART: [art] Store in slot 0x4
3,413,099 UART: [art] Derive Key Pair
3,414,148 UART: [art] Store priv key in slot 0x5
5,877,484 UART: [art] Derive Key Pair - Done
5,890,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,602,774 UART: [art] Erasing AUTHORITY.KEYID = 7
7,604,283 UART: [art] PUB.X = D0BBD9C2CD7292F646358678557D863BB8A4C9BE25520C732DB8D6DAC6E1722D69E033A0D9BCC47D0F6F498FF9C19357
7,611,547 UART: [art] PUB.Y = EBD4CDA5C90D172F0549FD25AB8207C9A3F558073DBE89B51799AB02BD6236E494CA936DC54806D87513B77063A66CAD
7,618,834 UART: [art] SIG.R = D758909B7A45BE41D9D52A92ECC1654FFB73AB1E60424D83C6B4C6E712E5DA22615642987E3FFE5C7FDBEA3FFEEF9361
7,626,254 UART: [art] SIG.S = 511FF5080C46FC84A9472CB9E86CBB366DE44B6D3CED2D452B2107C37F138954B52824AF6D03A7378DA3E90124A5CADA
8,605,945 UART: Caliptra RT
8,606,661 UART: [state] CFI Enabled
9,029,961 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
191,872 UART:
192,270 UART: Running Caliptra ROM ...
193,360 UART:
602,930 UART: [state] CFI Enabled
618,325 UART: [state] LifecycleState = Production
620,107 UART: [state] DebugLocked = Yes
622,017 UART: [state] Starting the WD Timer 40000000 cycles
626,210 UART: [kat] SHA2-256
805,867 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,692 UART: [kat] ++
817,134 UART: [kat] sha1
828,740 UART: [kat] SHA2-256
831,397 UART: [kat] SHA2-384
836,532 UART: [kat] SHA2-512-ACC
838,901 UART: [kat] ECC-384
3,282,315 UART: [kat] HMAC-384Kdf
3,294,436 UART: [kat] LMS
3,770,997 UART: [kat] --
3,774,984 UART: [cold-reset] ++
3,776,346 UART: [fht] FHT @ 0x50003400
3,788,031 UART: [idev] ++
3,788,674 UART: [idev] CDI.KEYID = 6
3,789,593 UART: [idev] SUBJECT.KEYID = 7
3,790,854 UART: [idev] UDS.KEYID = 0
3,791,780 ready_for_fw is high
3,791,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,857 UART: [idev] Erasing UDS.KEYID = 0
6,266,976 UART: [idev] Sha1 KeyId Algorithm
6,290,466 UART: [idev] --
6,295,216 UART: [ldev] ++
6,295,785 UART: [ldev] CDI.KEYID = 6
6,296,753 UART: [ldev] SUBJECT.KEYID = 5
6,297,912 UART: [ldev] AUTHORITY.KEYID = 7
6,299,194 UART: [ldev] FE.KEYID = 1
6,311,350 UART: [ldev] Erasing FE.KEYID = 1
8,791,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,787 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,527,558 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,543,431 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,559,163 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,580,350 UART: [ldev] --
10,586,387 UART: [fwproc] Wait for Commands...
10,588,862 UART: [fwproc] Recv command 0x46574c44
10,590,897 UART: [fwproc] Recv'd Img size: 118548 bytes
14,107,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,353 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,260,419 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,589,542 >>> mbox cmd response: success
14,594,081 UART: [afmc] ++
14,594,729 UART: [afmc] CDI.KEYID = 6
14,595,637 UART: [afmc] SUBJECT.KEYID = 7
14,596,849 UART: [afmc] AUTHORITY.KEYID = 5
17,105,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,824,621 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,826,855 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,842,755 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,858,770 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,874,295 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,899,904 UART: [afmc] --
18,904,035 UART: [cold-reset] --
18,907,205 UART: [state] Locking Datavault
18,912,721 UART: [state] Locking PCR0, PCR1 and PCR31
18,914,469 UART: [state] Locking ICCM
18,916,124 UART: [exit] Launching FMC @ 0x40000130
18,924,566 UART:
18,924,800 UART: Running Caliptra FMC ...
18,925,904 UART:
18,926,062 UART: [state] CFI Enabled
18,934,432 UART: [fht] FMC Alias Private Key: 7
20,700,558 UART: [art] Extend RT PCRs Done
20,701,759 UART: [art] Lock RT PCRs Done
20,703,665 UART: [art] Populate DV Done
20,709,127 UART: [fht] FMC Alias Private Key: 7
20,710,719 UART: [art] Derive CDI
20,711,534 UART: [art] Store in slot 0x4
20,754,454 UART: [art] Derive Key Pair
20,755,484 UART: [art] Store priv key in slot 0x5
23,181,982 UART: [art] Derive Key Pair - Done
23,194,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,901,466 UART: [art] Erasing AUTHORITY.KEYID = 7
24,902,960 UART: [art] PUB.X = 53907C9A7D361BA3850C3BA845454A468071BA141C25D7BC74B7FA43B074CF61036EB768F38F78A4D371F1B70730D7EE
24,910,239 UART: [art] PUB.Y = 2933C7305C287886FAD89DA1F347A221FFDD88BE9B92647D0F3C33170C7B6FD56F09F193DE1F02B0DF20CF920E5EF05E
24,917,503 UART: [art] SIG.R = D3D320EE2CD67492203218A11ADEBFB2BA541A984C5970304CE40908496DF3158A3B4C01D7BF0F10E734D4B398643B63
24,924,919 UART: [art] SIG.S = A24DC00AD38CA2B5B98127A536535B3279C205E9CA7D94C5A96219DA32417A50D9327E63DDEA81DCB45B91B09A036541
25,903,431 UART: Caliptra RT
25,904,144 UART: [state] CFI Enabled
26,036,614 UART: [rt] RT listening for mailbox commands...
292 writing to cptra_bootfsm_go
651 UART:
805 UART: Running Caliptra ROM ...
1,893 UART:
14,493,588 UART: [state] CFI Enabled
14,508,718 UART: [state] LifecycleState = Production
14,510,519 UART: [state] DebugLocked = Yes
14,512,589 UART: [state] Starting the WD Timer 40000000 cycles
14,518,016 UART: [kat] SHA2-256
14,697,691 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,708,498 UART: [kat] ++
14,709,036 UART: [kat] sha1
14,719,928 UART: [kat] SHA2-256
14,722,618 UART: [kat] SHA2-384
14,728,817 UART: [kat] SHA2-512-ACC
14,731,216 UART: [kat] ECC-384
17,171,278 UART: [kat] HMAC-384Kdf
17,183,724 UART: [kat] LMS
17,660,204 UART: [kat] --
17,665,509 UART: [warm-reset] ++
17,669,176 UART: [warm-reset] --
17,672,492 UART: [state] Locking Datavault
17,674,763 UART: [state] Locking PCR0, PCR1 and PCR31
17,676,517 UART: [state] Locking ICCM
17,677,795 UART: [exit] Launching FMC @ 0x40000130
17,686,188 UART:
17,686,421 UART: Running Caliptra FMC ...
17,687,525 UART:
17,687,684 UART: [state] CFI Enabled
17,689,683 UART: [art] Skip pcr extension
17,690,781 UART: [art] Extend RT PCRs Done
17,691,914 UART: [art] Lock RT PCRs Done
17,692,993 UART: [art] Populate DV Done
17,698,507 UART: [fht] FMC Alias Private Key: 7
17,699,992 UART: [art] Derive CDI
17,700,751 UART: [art] Store in slot 0x4
17,743,625 UART: [art] Derive Key Pair
17,744,664 UART: [art] Store priv key in slot 0x5
20,172,016 UART: [art] Derive Key Pair - Done
20,185,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,891,650 UART: [art] Erasing AUTHORITY.KEYID = 7
21,893,159 UART: [art] PUB.X = 53907C9A7D361BA3850C3BA845454A468071BA141C25D7BC74B7FA43B074CF61036EB768F38F78A4D371F1B70730D7EE
21,900,376 UART: [art] PUB.Y = 2933C7305C287886FAD89DA1F347A221FFDD88BE9B92647D0F3C33170C7B6FD56F09F193DE1F02B0DF20CF920E5EF05E
21,907,659 UART: [art] SIG.R = D3D320EE2CD67492203218A11ADEBFB2BA541A984C5970304CE40908496DF3158A3B4C01D7BF0F10E734D4B398643B63
21,915,087 UART: [art] SIG.S = A24DC00AD38CA2B5B98127A536535B3279C205E9CA7D94C5A96219DA32417A50D9327E63DDEA81DCB45B91B09A036541
22,894,600 UART: Caliptra RT
22,895,293 UART: [state] CFI Enabled
23,267,028 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
191,794 UART:
192,174 UART: Running Caliptra ROM ...
193,312 UART:
602,811 UART: [state] CFI Enabled
619,939 UART: [state] LifecycleState = Production
621,779 UART: [state] DebugLocked = Yes
624,126 UART: [state] Starting the WD Timer 40000000 cycles
629,147 UART: [kat] SHA2-256
808,817 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,638 UART: [kat] ++
820,084 UART: [kat] sha1
832,689 UART: [kat] SHA2-256
835,344 UART: [kat] SHA2-384
842,254 UART: [kat] SHA2-512-ACC
844,615 UART: [kat] ECC-384
3,286,638 UART: [kat] HMAC-384Kdf
3,298,813 UART: [kat] LMS
3,775,293 UART: [kat] --
3,780,130 UART: [cold-reset] ++
3,782,294 UART: [fht] FHT @ 0x50003400
3,794,122 UART: [idev] ++
3,794,692 UART: [idev] CDI.KEYID = 6
3,795,597 UART: [idev] SUBJECT.KEYID = 7
3,796,837 UART: [idev] UDS.KEYID = 0
3,797,883 ready_for_fw is high
3,798,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,311 UART: [idev] Erasing UDS.KEYID = 0
6,276,330 UART: [idev] Sha1 KeyId Algorithm
6,299,779 UART: [idev] --
6,304,477 UART: [ldev] ++
6,305,048 UART: [ldev] CDI.KEYID = 6
6,305,961 UART: [ldev] SUBJECT.KEYID = 5
6,307,169 UART: [ldev] AUTHORITY.KEYID = 7
6,308,453 UART: [ldev] FE.KEYID = 1
6,320,714 UART: [ldev] Erasing FE.KEYID = 1
8,798,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,366 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,533,182 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,549,002 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,564,751 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,584,959 UART: [ldev] --
10,590,234 UART: [fwproc] Wait for Commands...
10,592,163 UART: [fwproc] Recv command 0x46574c44
10,594,197 UART: [fwproc] Recv'd Img size: 118548 bytes
14,117,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,194,713 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,267,712 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,596,315 >>> mbox cmd response: success
14,601,076 UART: [afmc] ++
14,601,670 UART: [afmc] CDI.KEYID = 6
14,602,732 UART: [afmc] SUBJECT.KEYID = 7
14,603,855 UART: [afmc] AUTHORITY.KEYID = 5
17,108,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,829,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,831,927 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,847,827 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,863,869 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,879,424 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,903,165 UART: [afmc] --
18,907,609 UART: [cold-reset] --
18,910,278 UART: [state] Locking Datavault
18,914,762 UART: [state] Locking PCR0, PCR1 and PCR31
18,916,505 UART: [state] Locking ICCM
18,918,650 UART: [exit] Launching FMC @ 0x40000130
18,927,035 UART:
18,927,272 UART: Running Caliptra FMC ...
18,928,372 UART:
18,928,563 UART: [state] CFI Enabled
18,936,714 UART: [fht] FMC Alias Private Key: 7
20,702,038 UART: [art] Extend RT PCRs Done
20,703,262 UART: [art] Lock RT PCRs Done
20,705,211 UART: [art] Populate DV Done
20,710,509 UART: [fht] FMC Alias Private Key: 7
20,712,040 UART: [art] Derive CDI
20,712,802 UART: [art] Store in slot 0x4
20,755,834 UART: [art] Derive Key Pair
20,756,879 UART: [art] Store priv key in slot 0x5
23,183,406 UART: [art] Derive Key Pair - Done
23,196,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,902,254 UART: [art] Erasing AUTHORITY.KEYID = 7
24,903,762 UART: [art] PUB.X = 9FE3CDD3AF97CAE0920DD1043FFE03B971EF953D4F85A87ABB8566F8FB535615CD36424C54C46EB30F352677C215E13D
24,911,069 UART: [art] PUB.Y = 6AC0B94246CB2E780476F26C34F96211974D0D3C6202A9BEAA2E6BBB5E0596DE74A3D9AA5E81385FAB780353E2C60839
24,918,306 UART: [art] SIG.R = 07FD2679B4E3AFA578531460990699E221F5EDC73F1D5FF0508E4E459F4FB100DCF68B3136FF194E6A0E1292CF33605D
24,925,716 UART: [art] SIG.S = F995AFB2906ED80B329D6BD4574CD7CF4A022D8DB56B2B851617DFC80EE8A54BFEDC71077EE622E0E5EE90B1ED33098A
25,904,416 UART: Caliptra RT
25,905,122 UART: [state] CFI Enabled
26,038,191 UART: [rt] RT listening for mailbox commands...
298 writing to cptra_bootfsm_go
666 UART:
816 UART: Running Caliptra ROM ...
1,817 UART:
14,485,836 UART: [state] CFI Enabled
14,499,020 UART: [state] LifecycleState = Production
14,500,763 UART: [state] DebugLocked = Yes
14,502,526 UART: [state] Starting the WD Timer 40000000 cycles
14,508,052 UART: [kat] SHA2-256
14,687,725 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,698,468 UART: [kat] ++
14,698,978 UART: [kat] sha1
14,710,203 UART: [kat] SHA2-256
14,712,893 UART: [kat] SHA2-384
14,718,987 UART: [kat] SHA2-512-ACC
14,721,388 UART: [kat] ECC-384
17,162,080 UART: [kat] HMAC-384Kdf
17,174,643 UART: [kat] LMS
17,651,149 UART: [kat] --
17,657,043 UART: [warm-reset] ++
17,659,841 UART: [warm-reset] --
17,662,998 UART: [state] Locking Datavault
17,665,598 UART: [state] Locking PCR0, PCR1 and PCR31
17,667,349 UART: [state] Locking ICCM
17,668,422 UART: [exit] Launching FMC @ 0x40000130
17,676,814 UART:
17,677,049 UART: Running Caliptra FMC ...
17,678,152 UART:
17,678,328 UART: [state] CFI Enabled
17,680,378 UART: [art] Skip pcr extension
17,681,479 UART: [art] Extend RT PCRs Done
17,682,613 UART: [art] Lock RT PCRs Done
17,684,101 UART: [art] Populate DV Done
17,689,828 UART: [fht] FMC Alias Private Key: 7
17,691,410 UART: [art] Derive CDI
17,692,220 UART: [art] Store in slot 0x4
17,735,193 UART: [art] Derive Key Pair
17,736,238 UART: [art] Store priv key in slot 0x5
20,163,009 UART: [art] Derive Key Pair - Done
20,175,966 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,882,490 UART: [art] Erasing AUTHORITY.KEYID = 7
21,883,993 UART: [art] PUB.X = 9FE3CDD3AF97CAE0920DD1043FFE03B971EF953D4F85A87ABB8566F8FB535615CD36424C54C46EB30F352677C215E13D
21,891,317 UART: [art] PUB.Y = 6AC0B94246CB2E780476F26C34F96211974D0D3C6202A9BEAA2E6BBB5E0596DE74A3D9AA5E81385FAB780353E2C60839
21,898,574 UART: [art] SIG.R = 07FD2679B4E3AFA578531460990699E221F5EDC73F1D5FF0508E4E459F4FB100DCF68B3136FF194E6A0E1292CF33605D
21,905,941 UART: [art] SIG.S = F995AFB2906ED80B329D6BD4574CD7CF4A022D8DB56B2B851617DFC80EE8A54BFEDC71077EE622E0E5EE90B1ED33098A
22,884,778 UART: Caliptra RT
22,885,463 UART: [state] CFI Enabled
23,258,194 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Production
85,783 UART: [state] DebugLocked = Yes
86,343 UART: [state] Starting the WD Timer 40000000 cycles
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
899,934 UART: [kat] SHA2-256
901,874 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,401 UART: [kat] LMS
1,168,713 UART: [kat] --
1,169,738 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,173,007 UART: [idev] ++
1,173,175 UART: [idev] CDI.KEYID = 6
1,173,536 UART: [idev] SUBJECT.KEYID = 7
1,173,961 UART: [idev] UDS.KEYID = 0
1,174,307 ready_for_fw is high
1,174,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,075 UART: [idev] Erasing UDS.KEYID = 0
1,199,140 UART: [idev] Sha1 KeyId Algorithm
1,207,865 UART: [idev] --
1,208,726 UART: [ldev] ++
1,208,894 UART: [ldev] CDI.KEYID = 6
1,209,258 UART: [ldev] SUBJECT.KEYID = 5
1,209,685 UART: [ldev] AUTHORITY.KEYID = 7
1,210,148 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,241,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,789 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,483 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,353 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,059 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,315 UART: [ldev] --
1,280,590 UART: [fwproc] Wait for Commands...
1,281,303 UART: [fwproc] Recv command 0x46574c44
1,282,036 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,859 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,034 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,420 >>> mbox cmd response: success
2,851,511 UART: [afmc] ++
2,851,679 UART: [afmc] CDI.KEYID = 6
2,852,042 UART: [afmc] SUBJECT.KEYID = 7
2,852,468 UART: [afmc] AUTHORITY.KEYID = 5
2,887,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,038 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,787 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,910,503 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,386 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,091 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,929,837 UART: [afmc] --
2,930,855 UART: [cold-reset] --
2,931,575 UART: [state] Locking Datavault
2,932,632 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,236 UART: [state] Locking ICCM
2,933,678 UART: [exit] Launching FMC @ 0x40000130
2,939,008 UART:
2,939,024 UART: Running Caliptra FMC ...
2,939,432 UART:
2,939,486 UART: [state] CFI Enabled
2,950,070 UART: [fht] FMC Alias Private Key: 7
3,069,623 UART: [art] Extend RT PCRs Done
3,070,051 UART: [art] Lock RT PCRs Done
3,071,625 UART: [art] Populate DV Done
3,079,933 UART: [fht] FMC Alias Private Key: 7
3,080,951 UART: [art] Derive CDI
3,081,231 UART: [art] Store in slot 0x4
3,166,987 UART: [art] Derive Key Pair
3,167,347 UART: [art] Store priv key in slot 0x5
3,180,616 UART: [art] Derive Key Pair - Done
3,195,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,106 UART: [art] PUB.X = 374E2703C7B6B2CA646C69B78D46EB4DD9CC3F544948D6C4C1B4BAFC4E4FB473B329C2D4A7EBF18F9608CFEEE88075B7
3,218,890 UART: [art] PUB.Y = CAE27AED4DB8092185DE577E88FE9EB6686EAA097A01A192ACB48549374C26A07153EAA15650C695D27226C516A8F1F3
3,225,837 UART: [art] SIG.R = 1EE46296FD2396104629F9FFAA9C7554E7DFCD396152427921F234FEA9C11228D464CAFB1D00D850C2AFF050D9F66673
3,232,589 UART: [art] SIG.S = 7A3E20DDC2AB228C213AAAF0FDD925C271C9F2C6633D1B684F633CABFEE0EEE32A026BF1CC51F70D01DD186EB64D731A
3,256,194 UART: Caliptra RT
3,256,445 UART: [state] CFI Enabled
3,375,660 UART: [rt] RT listening for mailbox commands...
3,376,324 writing to cptra_bootfsm_go
3,376,416 UART:
3,376,432 UART: Running Caliptra ROM ...
3,376,840 UART:
3,376,895 UART: [state] CFI Enabled
3,379,592 UART: [state] LifecycleState = Production
3,380,200 UART: [state] DebugLocked = Yes
3,380,870 UART: [state] Starting the WD Timer 40000000 cycles
3,382,515 UART: [kat] SHA2-256
4,186,065 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,190,169 UART: [kat] ++
4,190,321 UART: [kat] sha1
4,194,519 UART: [kat] SHA2-256
4,196,459 UART: [kat] SHA2-384
4,199,186 UART: [kat] SHA2-512-ACC
4,201,087 UART: [kat] ECC-384
4,210,662 UART: [kat] HMAC-384Kdf
4,215,238 UART: [kat] LMS
4,463,550 UART: [kat] --
4,464,388 UART: [warm-reset] ++
4,465,453 UART: [warm-reset] --
4,466,310 UART: [state] Locking Datavault
4,467,018 UART: [state] Locking PCR0, PCR1 and PCR31
4,467,622 UART: [state] Locking ICCM
4,468,164 UART: [exit] Launching FMC @ 0x40000130
4,473,494 UART:
4,473,510 UART: Running Caliptra FMC ...
4,473,918 UART:
4,473,972 UART: [state] CFI Enabled
4,475,039 UART: [art] Skip pcr extension
4,475,448 UART: [art] Extend RT PCRs Done
4,475,876 UART: [art] Lock RT PCRs Done
4,477,409 UART: [art] Populate DV Done
4,485,511 UART: [fht] FMC Alias Private Key: 7
4,486,691 UART: [art] Derive CDI
4,486,971 UART: [art] Store in slot 0x4
4,572,167 UART: [art] Derive Key Pair
4,572,527 UART: [art] Store priv key in slot 0x5
4,585,656 UART: [art] Derive Key Pair - Done
4,600,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,615,707 UART: [art] Erasing AUTHORITY.KEYID = 7
4,616,472 UART: [art] PUB.X = 374E2703C7B6B2CA646C69B78D46EB4DD9CC3F544948D6C4C1B4BAFC4E4FB473B329C2D4A7EBF18F9608CFEEE88075B7
4,623,256 UART: [art] PUB.Y = CAE27AED4DB8092185DE577E88FE9EB6686EAA097A01A192ACB48549374C26A07153EAA15650C695D27226C516A8F1F3
4,630,203 UART: [art] SIG.R = 1EE46296FD2396104629F9FFAA9C7554E7DFCD396152427921F234FEA9C11228D464CAFB1D00D850C2AFF050D9F66673
4,636,955 UART: [art] SIG.S = 7A3E20DDC2AB228C213AAAF0FDD925C271C9F2C6633D1B684F633CABFEE0EEE32A026BF1CC51F70D01DD186EB64D731A
4,660,330 UART: Caliptra RT
4,660,581 UART: [state] CFI Enabled
5,025,653 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Production
86,197 UART: [state] DebugLocked = Yes
86,935 UART: [state] Starting the WD Timer 40000000 cycles
88,646 UART: [kat] SHA2-256
892,196 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,300 UART: [kat] ++
896,452 UART: [kat] sha1
900,454 UART: [kat] SHA2-256
902,394 UART: [kat] SHA2-384
904,897 UART: [kat] SHA2-512-ACC
906,798 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,649 UART: [fht] FHT @ 0x50003400
1,173,495 UART: [idev] ++
1,173,663 UART: [idev] CDI.KEYID = 6
1,174,024 UART: [idev] SUBJECT.KEYID = 7
1,174,449 UART: [idev] UDS.KEYID = 0
1,174,795 ready_for_fw is high
1,174,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,643 UART: [idev] Erasing UDS.KEYID = 0
1,199,528 UART: [idev] Sha1 KeyId Algorithm
1,208,361 UART: [idev] --
1,209,458 UART: [ldev] ++
1,209,626 UART: [ldev] CDI.KEYID = 6
1,209,990 UART: [ldev] SUBJECT.KEYID = 5
1,210,417 UART: [ldev] AUTHORITY.KEYID = 7
1,210,880 UART: [ldev] FE.KEYID = 1
1,216,396 UART: [ldev] Erasing FE.KEYID = 1
1,242,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,387 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,081 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,951 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,657 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,633 UART: [ldev] --
1,281,958 UART: [fwproc] Wait for Commands...
1,282,673 UART: [fwproc] Recv command 0x46574c44
1,283,406 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,807 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,982 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,302 >>> mbox cmd response: success
2,853,397 UART: [afmc] ++
2,853,565 UART: [afmc] CDI.KEYID = 6
2,853,928 UART: [afmc] SUBJECT.KEYID = 7
2,854,354 UART: [afmc] AUTHORITY.KEYID = 5
2,890,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,906,724 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,907,473 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,913,189 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,919,072 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,924,777 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,932,599 UART: [afmc] --
2,933,427 UART: [cold-reset] --
2,934,223 UART: [state] Locking Datavault
2,935,506 UART: [state] Locking PCR0, PCR1 and PCR31
2,936,110 UART: [state] Locking ICCM
2,936,594 UART: [exit] Launching FMC @ 0x40000130
2,941,924 UART:
2,941,940 UART: Running Caliptra FMC ...
2,942,348 UART:
2,942,402 UART: [state] CFI Enabled
2,952,668 UART: [fht] FMC Alias Private Key: 7
3,071,395 UART: [art] Extend RT PCRs Done
3,071,823 UART: [art] Lock RT PCRs Done
3,072,985 UART: [art] Populate DV Done
3,081,315 UART: [fht] FMC Alias Private Key: 7
3,082,335 UART: [art] Derive CDI
3,082,615 UART: [art] Store in slot 0x4
3,168,339 UART: [art] Derive Key Pair
3,168,699 UART: [art] Store priv key in slot 0x5
3,182,090 UART: [art] Derive Key Pair - Done
3,196,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,493 UART: [art] PUB.X = DCB905C24FC087A4A47E9CD2E6A523BFA448B3668547C4C74CAD53700C7747541213519617EF86A8BFECBAE475C85EDC
3,220,269 UART: [art] PUB.Y = 01559F2967581924964B0D70E869B5C1D31F613086EEA6F4DAE28BB774440815377056D3222DAB5143042609FF4E4DFB
3,227,196 UART: [art] SIG.R = E6E13265E4A2B227CF3399DEFF1666C6A720BF3402D64187D95726BB6339428B132291EB23B7D83B71A375F6EDBD2E73
3,233,965 UART: [art] SIG.S = 17C2CBCEF032AF104EE2ADD48E5D8C528AAE92E22CB510FBEA1081A20E21F3BF83F290DAA381BD72708602D62773EE1D
3,257,473 UART: Caliptra RT
3,257,724 UART: [state] CFI Enabled
3,377,376 UART: [rt] RT listening for mailbox commands...
3,378,040 writing to cptra_bootfsm_go
3,378,132 UART:
3,378,148 UART: Running Caliptra ROM ...
3,378,556 UART:
3,378,611 UART: [state] CFI Enabled
3,381,634 UART: [state] LifecycleState = Production
3,382,242 UART: [state] DebugLocked = Yes
3,382,794 UART: [state] Starting the WD Timer 40000000 cycles
3,384,407 UART: [kat] SHA2-256
4,187,957 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,192,061 UART: [kat] ++
4,192,213 UART: [kat] sha1
4,196,503 UART: [kat] SHA2-256
4,198,443 UART: [kat] SHA2-384
4,201,292 UART: [kat] SHA2-512-ACC
4,203,193 UART: [kat] ECC-384
4,212,882 UART: [kat] HMAC-384Kdf
4,217,686 UART: [kat] LMS
4,465,998 UART: [kat] --
4,466,654 UART: [warm-reset] ++
4,467,753 UART: [warm-reset] --
4,468,528 UART: [state] Locking Datavault
4,469,316 UART: [state] Locking PCR0, PCR1 and PCR31
4,469,920 UART: [state] Locking ICCM
4,470,344 UART: [exit] Launching FMC @ 0x40000130
4,475,674 UART:
4,475,690 UART: Running Caliptra FMC ...
4,476,098 UART:
4,476,152 UART: [state] CFI Enabled
4,477,383 UART: [art] Skip pcr extension
4,477,792 UART: [art] Extend RT PCRs Done
4,478,220 UART: [art] Lock RT PCRs Done
4,479,451 UART: [art] Populate DV Done
4,487,527 UART: [fht] FMC Alias Private Key: 7
4,488,639 UART: [art] Derive CDI
4,488,919 UART: [art] Store in slot 0x4
4,574,579 UART: [art] Derive Key Pair
4,574,939 UART: [art] Store priv key in slot 0x5
4,588,076 UART: [art] Derive Key Pair - Done
4,602,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,617,906 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,671 UART: [art] PUB.X = DCB905C24FC087A4A47E9CD2E6A523BFA448B3668547C4C74CAD53700C7747541213519617EF86A8BFECBAE475C85EDC
4,625,447 UART: [art] PUB.Y = 01559F2967581924964B0D70E869B5C1D31F613086EEA6F4DAE28BB774440815377056D3222DAB5143042609FF4E4DFB
4,632,374 UART: [art] SIG.R = E6E13265E4A2B227CF3399DEFF1666C6A720BF3402D64187D95726BB6339428B132291EB23B7D83B71A375F6EDBD2E73
4,639,143 UART: [art] SIG.S = 17C2CBCEF032AF104EE2ADD48E5D8C528AAE92E22CB510FBEA1081A20E21F3BF83F290DAA381BD72708602D62773EE1D
4,663,027 UART: Caliptra RT
4,663,278 UART: [state] CFI Enabled
5,025,337 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Production
86,086 UART: [state] DebugLocked = Yes
86,644 UART: [state] Starting the WD Timer 40000000 cycles
88,341 UART: [kat] SHA2-256
891,891 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,995 UART: [kat] ++
896,147 UART: [kat] sha1
900,423 UART: [kat] SHA2-256
902,363 UART: [kat] SHA2-384
905,272 UART: [kat] SHA2-512-ACC
907,173 UART: [kat] ECC-384
916,994 UART: [kat] HMAC-384Kdf
921,622 UART: [kat] LMS
1,169,934 UART: [kat] --
1,170,819 UART: [cold-reset] ++
1,171,370 UART: [fht] FHT @ 0x50003400
1,174,056 UART: [idev] ++
1,174,224 UART: [idev] CDI.KEYID = 6
1,174,585 UART: [idev] SUBJECT.KEYID = 7
1,175,010 UART: [idev] UDS.KEYID = 0
1,175,356 ready_for_fw is high
1,175,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,872 UART: [idev] Erasing UDS.KEYID = 0
1,199,447 UART: [idev] Sha1 KeyId Algorithm
1,208,490 UART: [idev] --
1,209,369 UART: [ldev] ++
1,209,537 UART: [ldev] CDI.KEYID = 6
1,209,901 UART: [ldev] SUBJECT.KEYID = 5
1,210,328 UART: [ldev] AUTHORITY.KEYID = 7
1,210,791 UART: [ldev] FE.KEYID = 1
1,216,027 UART: [ldev] Erasing FE.KEYID = 1
1,242,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,440 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,134 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,004 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,710 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,642 UART: [ldev] --
1,282,023 UART: [fwproc] Wait for Commands...
1,282,732 UART: [fwproc] Recv command 0x46574c44
1,283,465 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,570 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,745 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,937 >>> mbox cmd response: success
2,852,076 UART: [afmc] ++
2,852,244 UART: [afmc] CDI.KEYID = 6
2,852,607 UART: [afmc] SUBJECT.KEYID = 7
2,853,033 UART: [afmc] AUTHORITY.KEYID = 5
2,888,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,618 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,334 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,217 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,922 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,774 UART: [afmc] --
2,931,668 UART: [cold-reset] --
2,932,338 UART: [state] Locking Datavault
2,933,655 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,259 UART: [state] Locking ICCM
2,934,931 UART: [exit] Launching FMC @ 0x40000130
2,940,261 UART:
2,940,277 UART: Running Caliptra FMC ...
2,940,685 UART:
2,940,828 UART: [state] CFI Enabled
2,951,520 UART: [fht] FMC Alias Private Key: 7
3,069,727 UART: [art] Extend RT PCRs Done
3,070,155 UART: [art] Lock RT PCRs Done
3,071,399 UART: [art] Populate DV Done
3,079,875 UART: [fht] FMC Alias Private Key: 7
3,080,811 UART: [art] Derive CDI
3,081,091 UART: [art] Store in slot 0x4
3,166,733 UART: [art] Derive Key Pair
3,167,093 UART: [art] Store priv key in slot 0x5
3,180,934 UART: [art] Derive Key Pair - Done
3,195,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,930 UART: [art] PUB.X = 75AF27B6E9FF807A5835966C2D571AA1AE20F776D679D4EE7B43E56412511AF95E0919A7BAF714AB9CF1C568DB457683
3,218,703 UART: [art] PUB.Y = 0887D986AA75816AB5FF496C44978AA30FF63E36FACF94FCB84C8E57AA523B5B2FA7091F9A31DD264E2997C152C3F5ED
3,225,658 UART: [art] SIG.R = DF7C030671195FF210CE1885C7E55BAD1E6635D2D4A44711B500D3B38109B37C495DB4395F0BCBB1DA53F6AD0E4BA6AD
3,232,405 UART: [art] SIG.S = 11D3129A3DE9D3DC0F095A519DB43EFF2EC41F4F8F1E2C0F331A5320A5133290B6FAF72C7BF8DEBB29F3FE8A8FE9F308
3,256,227 UART: Caliptra RT
3,256,570 UART: [state] CFI Enabled
3,376,448 UART: [rt] RT listening for mailbox commands...
3,377,112 writing to cptra_bootfsm_go
3,377,204 UART:
3,377,220 UART: Running Caliptra ROM ...
3,377,628 UART:
3,377,770 UART: [state] CFI Enabled
3,380,841 UART: [state] LifecycleState = Production
3,381,449 UART: [state] DebugLocked = Yes
3,382,137 UART: [state] Starting the WD Timer 40000000 cycles
3,383,776 UART: [kat] SHA2-256
4,187,326 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,191,430 UART: [kat] ++
4,191,582 UART: [kat] sha1
4,195,840 UART: [kat] SHA2-256
4,197,780 UART: [kat] SHA2-384
4,200,499 UART: [kat] SHA2-512-ACC
4,202,400 UART: [kat] ECC-384
4,212,225 UART: [kat] HMAC-384Kdf
4,216,963 UART: [kat] LMS
4,465,275 UART: [kat] --
4,466,051 UART: [warm-reset] ++
4,466,732 UART: [warm-reset] --
4,467,393 UART: [state] Locking Datavault
4,468,155 UART: [state] Locking PCR0, PCR1 and PCR31
4,468,759 UART: [state] Locking ICCM
4,469,283 UART: [exit] Launching FMC @ 0x40000130
4,474,613 UART:
4,474,629 UART: Running Caliptra FMC ...
4,475,037 UART:
4,475,180 UART: [state] CFI Enabled
4,476,587 UART: [art] Skip pcr extension
4,476,996 UART: [art] Extend RT PCRs Done
4,477,424 UART: [art] Lock RT PCRs Done
4,478,829 UART: [art] Populate DV Done
4,487,039 UART: [fht] FMC Alias Private Key: 7
4,488,155 UART: [art] Derive CDI
4,488,435 UART: [art] Store in slot 0x4
4,574,093 UART: [art] Derive Key Pair
4,574,453 UART: [art] Store priv key in slot 0x5
4,587,918 UART: [art] Derive Key Pair - Done
4,602,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,618,515 UART: [art] Erasing AUTHORITY.KEYID = 7
4,619,280 UART: [art] PUB.X = 75AF27B6E9FF807A5835966C2D571AA1AE20F776D679D4EE7B43E56412511AF95E0919A7BAF714AB9CF1C568DB457683
4,626,053 UART: [art] PUB.Y = 0887D986AA75816AB5FF496C44978AA30FF63E36FACF94FCB84C8E57AA523B5B2FA7091F9A31DD264E2997C152C3F5ED
4,633,008 UART: [art] SIG.R = DF7C030671195FF210CE1885C7E55BAD1E6635D2D4A44711B500D3B38109B37C495DB4395F0BCBB1DA53F6AD0E4BA6AD
4,639,755 UART: [art] SIG.S = 11D3129A3DE9D3DC0F095A519DB43EFF2EC41F4F8F1E2C0F331A5320A5133290B6FAF72C7BF8DEBB29F3FE8A8FE9F308
4,663,279 UART: Caliptra RT
4,663,622 UART: [state] CFI Enabled
5,023,667 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,694 UART: [state] LifecycleState = Production
86,302 UART: [state] DebugLocked = Yes
87,064 UART: [state] Starting the WD Timer 40000000 cycles
88,653 UART: [kat] SHA2-256
892,203 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,307 UART: [kat] ++
896,459 UART: [kat] sha1
900,581 UART: [kat] SHA2-256
902,521 UART: [kat] SHA2-384
905,428 UART: [kat] SHA2-512-ACC
907,329 UART: [kat] ECC-384
917,458 UART: [kat] HMAC-384Kdf
922,042 UART: [kat] LMS
1,170,354 UART: [kat] --
1,171,091 UART: [cold-reset] ++
1,171,496 UART: [fht] FHT @ 0x50003400
1,174,134 UART: [idev] ++
1,174,302 UART: [idev] CDI.KEYID = 6
1,174,663 UART: [idev] SUBJECT.KEYID = 7
1,175,088 UART: [idev] UDS.KEYID = 0
1,175,434 ready_for_fw is high
1,175,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,610 UART: [idev] Erasing UDS.KEYID = 0
1,201,295 UART: [idev] Sha1 KeyId Algorithm
1,210,276 UART: [idev] --
1,211,249 UART: [ldev] ++
1,211,417 UART: [ldev] CDI.KEYID = 6
1,211,781 UART: [ldev] SUBJECT.KEYID = 5
1,212,208 UART: [ldev] AUTHORITY.KEYID = 7
1,212,671 UART: [ldev] FE.KEYID = 1
1,217,397 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,604 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,298 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,168 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,874 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,870 UART: [ldev] --
1,283,313 UART: [fwproc] Wait for Commands...
1,284,032 UART: [fwproc] Recv command 0x46574c44
1,284,765 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,681,710 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,712,885 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,853,061 >>> mbox cmd response: success
2,854,206 UART: [afmc] ++
2,854,374 UART: [afmc] CDI.KEYID = 6
2,854,737 UART: [afmc] SUBJECT.KEYID = 7
2,855,163 UART: [afmc] AUTHORITY.KEYID = 5
2,890,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,907,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,908,322 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,914,038 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,919,921 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,925,626 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,933,392 UART: [afmc] --
2,934,344 UART: [cold-reset] --
2,935,146 UART: [state] Locking Datavault
2,936,479 UART: [state] Locking PCR0, PCR1 and PCR31
2,937,083 UART: [state] Locking ICCM
2,937,567 UART: [exit] Launching FMC @ 0x40000130
2,942,897 UART:
2,942,913 UART: Running Caliptra FMC ...
2,943,321 UART:
2,943,464 UART: [state] CFI Enabled
2,953,948 UART: [fht] FMC Alias Private Key: 7
3,072,521 UART: [art] Extend RT PCRs Done
3,072,949 UART: [art] Lock RT PCRs Done
3,074,339 UART: [art] Populate DV Done
3,082,355 UART: [fht] FMC Alias Private Key: 7
3,083,309 UART: [art] Derive CDI
3,083,589 UART: [art] Store in slot 0x4
3,169,521 UART: [art] Derive Key Pair
3,169,881 UART: [art] Store priv key in slot 0x5
3,183,960 UART: [art] Derive Key Pair - Done
3,199,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,214,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,561 UART: [art] PUB.X = FDD774A3D1570D42B87D9CC6D1EFE80A675D97D8A26DAB7BFD5386F2D3AD40B80BBAC9119F37413C8E30145DE39D8212
3,222,338 UART: [art] PUB.Y = 971196366011A9D756C82D0793264D4BFD15A4E98E78FED81EE1F57246F344256C1132E4071B761EE2DA6CB4116774DC
3,229,278 UART: [art] SIG.R = EC545880BB5343C7FF8A6A6E6510B2290305385E8909C34F545D4D0D3D478489E4A9A3585795947E902E4DDF87791CB1
3,236,030 UART: [art] SIG.S = 81709EF2D5B18C6992DDE188C54A96842C524591EE681CB42F6256F62380310C43C9C8791FFF4A4E42790A4C61BAF6FD
3,259,816 UART: Caliptra RT
3,260,159 UART: [state] CFI Enabled
3,381,047 UART: [rt] RT listening for mailbox commands...
3,381,711 writing to cptra_bootfsm_go
3,381,803 UART:
3,381,819 UART: Running Caliptra ROM ...
3,382,227 UART:
3,382,369 UART: [state] CFI Enabled
3,385,318 UART: [state] LifecycleState = Production
3,385,926 UART: [state] DebugLocked = Yes
3,386,494 UART: [state] Starting the WD Timer 40000000 cycles
3,388,147 UART: [kat] SHA2-256
4,191,697 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,195,801 UART: [kat] ++
4,195,953 UART: [kat] sha1
4,200,235 UART: [kat] SHA2-256
4,202,175 UART: [kat] SHA2-384
4,204,858 UART: [kat] SHA2-512-ACC
4,206,759 UART: [kat] ECC-384
4,216,976 UART: [kat] HMAC-384Kdf
4,221,650 UART: [kat] LMS
4,469,962 UART: [kat] --
4,470,710 UART: [warm-reset] ++
4,471,673 UART: [warm-reset] --
4,472,324 UART: [state] Locking Datavault
4,473,200 UART: [state] Locking PCR0, PCR1 and PCR31
4,473,804 UART: [state] Locking ICCM
4,474,276 UART: [exit] Launching FMC @ 0x40000130
4,479,606 UART:
4,479,622 UART: Running Caliptra FMC ...
4,480,030 UART:
4,480,173 UART: [state] CFI Enabled
4,481,562 UART: [art] Skip pcr extension
4,481,971 UART: [art] Extend RT PCRs Done
4,482,399 UART: [art] Lock RT PCRs Done
4,484,044 UART: [art] Populate DV Done
4,492,388 UART: [fht] FMC Alias Private Key: 7
4,493,406 UART: [art] Derive CDI
4,493,686 UART: [art] Store in slot 0x4
4,579,198 UART: [art] Derive Key Pair
4,579,558 UART: [art] Store priv key in slot 0x5
4,592,797 UART: [art] Derive Key Pair - Done
4,607,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,622,943 UART: [art] Erasing AUTHORITY.KEYID = 7
4,623,708 UART: [art] PUB.X = FDD774A3D1570D42B87D9CC6D1EFE80A675D97D8A26DAB7BFD5386F2D3AD40B80BBAC9119F37413C8E30145DE39D8212
4,630,485 UART: [art] PUB.Y = 971196366011A9D756C82D0793264D4BFD15A4E98E78FED81EE1F57246F344256C1132E4071B761EE2DA6CB4116774DC
4,637,425 UART: [art] SIG.R = EC545880BB5343C7FF8A6A6E6510B2290305385E8909C34F545D4D0D3D478489E4A9A3585795947E902E4DDF87791CB1
4,644,177 UART: [art] SIG.S = 81709EF2D5B18C6992DDE188C54A96842C524591EE681CB42F6256F62380310C43C9C8791FFF4A4E42790A4C61BAF6FD
4,668,205 UART: Caliptra RT
4,668,548 UART: [state] CFI Enabled
5,032,931 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,009 UART: [state] LifecycleState = Production
85,617 UART: [state] DebugLocked = Yes
86,357 UART: [state] Starting the WD Timer 40000000 cycles
87,844 UART: [kat] SHA2-256
891,394 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,498 UART: [kat] ++
895,650 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,819 UART: [kat] LMS
1,169,131 UART: [kat] --
1,170,256 UART: [cold-reset] ++
1,170,649 UART: [fht] FHT @ 0x50003400
1,173,443 UART: [idev] ++
1,173,611 UART: [idev] CDI.KEYID = 6
1,173,972 UART: [idev] SUBJECT.KEYID = 7
1,174,397 UART: [idev] UDS.KEYID = 0
1,174,743 ready_for_fw is high
1,174,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,275 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,227 UART: [idev] --
1,209,480 UART: [ldev] ++
1,209,648 UART: [ldev] CDI.KEYID = 6
1,210,012 UART: [ldev] SUBJECT.KEYID = 5
1,210,439 UART: [ldev] AUTHORITY.KEYID = 7
1,210,902 UART: [ldev] FE.KEYID = 1
1,215,948 UART: [ldev] Erasing FE.KEYID = 1
1,242,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,285 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,979 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,849 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,555 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,465 UART: [ldev] --
1,281,766 UART: [fwproc] Wait for Commands...
1,282,385 UART: [fwproc] Recv command 0x46574c44
1,283,118 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,737 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,912 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,232 >>> mbox cmd response: success
2,852,407 UART: [afmc] ++
2,852,575 UART: [afmc] CDI.KEYID = 6
2,852,938 UART: [afmc] SUBJECT.KEYID = 7
2,853,364 UART: [afmc] AUTHORITY.KEYID = 5
2,888,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,119 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,835 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,718 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,423 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,187 UART: [afmc] --
2,932,087 UART: [cold-reset] --
2,932,987 UART: [state] Locking Datavault
2,934,376 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,980 UART: [state] Locking ICCM
2,935,502 UART: [exit] Launching FMC @ 0x40000130
2,940,832 UART:
2,940,848 UART: Running Caliptra FMC ...
2,941,256 UART:
2,941,310 UART: [state] CFI Enabled
2,951,646 UART: [fht] FMC Alias Private Key: 7
3,070,119 UART: [art] Extend RT PCRs Done
3,070,547 UART: [art] Lock RT PCRs Done
3,071,737 UART: [art] Populate DV Done
3,079,769 UART: [fht] FMC Alias Private Key: 7
3,080,891 UART: [art] Derive CDI
3,081,171 UART: [art] Store in slot 0x4
3,167,096 UART: [art] Derive Key Pair
3,167,456 UART: [art] Store priv key in slot 0x5
3,181,178 UART: [art] Derive Key Pair - Done
3,195,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,772 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,537 UART: [art] PUB.X = B276274531ACC5333F27A8CD1F46ADDC1725ACD9B13175508035B716D4BDFD9296124938C5A5C832A58D8B32E45D58C4
3,219,309 UART: [art] PUB.Y = 7EBDEC0B5B8FC0B927BBC37C90F7478F4A115BC8CA0E62BDAE5AE784C7BDF42539A669B0B6606F8B307DF5D1B2DBF067
3,226,279 UART: [art] SIG.R = 0FF423E8785003FA50F2A68AE05D282D6E49898759EE90895AC99B33536914E09DE9C4168E6950086C66D84DC0C2AB2A
3,233,038 UART: [art] SIG.S = 35E50E9CA86A36D3DB97B472BF2E037F79D1FE6533CB97CC716C13617FDEAE5E6355422ECD5EAE9E291DC341EFC4B14B
3,256,742 UART: Caliptra RT
3,256,993 UART: [state] CFI Enabled
3,376,662 UART: [rt] RT listening for mailbox commands...
3,377,326 writing to cptra_bootfsm_go
3,377,418 UART:
3,377,434 UART: Running Caliptra ROM ...
3,377,842 UART:
3,377,897 UART: [state] CFI Enabled
3,380,916 UART: [state] LifecycleState = Production
3,381,524 UART: [state] DebugLocked = Yes
3,382,106 UART: [state] Starting the WD Timer 40000000 cycles
3,383,579 UART: [kat] SHA2-256
4,187,129 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,191,233 UART: [kat] ++
4,191,385 UART: [kat] sha1
4,195,639 UART: [kat] SHA2-256
4,197,579 UART: [kat] SHA2-384
4,200,494 UART: [kat] SHA2-512-ACC
4,202,395 UART: [kat] ECC-384
4,211,848 UART: [kat] HMAC-384Kdf
4,216,354 UART: [kat] LMS
4,464,666 UART: [kat] --
4,465,500 UART: [warm-reset] ++
4,466,319 UART: [warm-reset] --
4,467,212 UART: [state] Locking Datavault
4,468,028 UART: [state] Locking PCR0, PCR1 and PCR31
4,468,632 UART: [state] Locking ICCM
4,469,280 UART: [exit] Launching FMC @ 0x40000130
4,474,610 UART:
4,474,626 UART: Running Caliptra FMC ...
4,475,034 UART:
4,475,088 UART: [state] CFI Enabled
4,476,267 UART: [art] Skip pcr extension
4,476,676 UART: [art] Extend RT PCRs Done
4,477,104 UART: [art] Lock RT PCRs Done
4,478,191 UART: [art] Populate DV Done
4,486,609 UART: [fht] FMC Alias Private Key: 7
4,487,603 UART: [art] Derive CDI
4,487,883 UART: [art] Store in slot 0x4
4,573,366 UART: [art] Derive Key Pair
4,573,726 UART: [art] Store priv key in slot 0x5
4,587,038 UART: [art] Derive Key Pair - Done
4,601,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,616,988 UART: [art] Erasing AUTHORITY.KEYID = 7
4,617,753 UART: [art] PUB.X = B276274531ACC5333F27A8CD1F46ADDC1725ACD9B13175508035B716D4BDFD9296124938C5A5C832A58D8B32E45D58C4
4,624,525 UART: [art] PUB.Y = 7EBDEC0B5B8FC0B927BBC37C90F7478F4A115BC8CA0E62BDAE5AE784C7BDF42539A669B0B6606F8B307DF5D1B2DBF067
4,631,495 UART: [art] SIG.R = 0FF423E8785003FA50F2A68AE05D282D6E49898759EE90895AC99B33536914E09DE9C4168E6950086C66D84DC0C2AB2A
4,638,254 UART: [art] SIG.S = 35E50E9CA86A36D3DB97B472BF2E037F79D1FE6533CB97CC716C13617FDEAE5E6355422ECD5EAE9E291DC341EFC4B14B
4,662,066 UART: Caliptra RT
4,662,317 UART: [state] CFI Enabled
5,026,443 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Production
85,683 UART: [state] DebugLocked = Yes
86,413 UART: [state] Starting the WD Timer 40000000 cycles
88,002 UART: [kat] SHA2-256
891,552 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,857 UART: [kat] SHA2-512-ACC
906,758 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
921,019 UART: [kat] LMS
1,169,331 UART: [kat] --
1,170,138 UART: [cold-reset] ++
1,170,485 UART: [fht] FHT @ 0x50003400
1,173,265 UART: [idev] ++
1,173,433 UART: [idev] CDI.KEYID = 6
1,173,794 UART: [idev] SUBJECT.KEYID = 7
1,174,219 UART: [idev] UDS.KEYID = 0
1,174,565 ready_for_fw is high
1,174,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,198,310 UART: [idev] Sha1 KeyId Algorithm
1,207,093 UART: [idev] --
1,208,244 UART: [ldev] ++
1,208,412 UART: [ldev] CDI.KEYID = 6
1,208,776 UART: [ldev] SUBJECT.KEYID = 5
1,209,203 UART: [ldev] AUTHORITY.KEYID = 7
1,209,666 UART: [ldev] FE.KEYID = 1
1,214,802 UART: [ldev] Erasing FE.KEYID = 1
1,241,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,685 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,379 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,249 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,955 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,073 UART: [ldev] --
1,280,484 UART: [fwproc] Wait for Commands...
1,281,151 UART: [fwproc] Recv command 0x46574c44
1,281,884 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,619 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,794 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,124 >>> mbox cmd response: success
2,851,199 UART: [afmc] ++
2,851,367 UART: [afmc] CDI.KEYID = 6
2,851,730 UART: [afmc] SUBJECT.KEYID = 7
2,852,156 UART: [afmc] AUTHORITY.KEYID = 5
2,886,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,476 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,225 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,909,941 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,915,824 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,921,529 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,929,367 UART: [afmc] --
2,930,285 UART: [cold-reset] --
2,931,349 UART: [state] Locking Datavault
2,932,464 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,068 UART: [state] Locking ICCM
2,933,562 UART: [exit] Launching FMC @ 0x40000130
2,938,892 UART:
2,938,908 UART: Running Caliptra FMC ...
2,939,316 UART:
2,939,370 UART: [state] CFI Enabled
2,949,766 UART: [fht] FMC Alias Private Key: 7
3,067,895 UART: [art] Extend RT PCRs Done
3,068,323 UART: [art] Lock RT PCRs Done
3,070,223 UART: [art] Populate DV Done
3,078,431 UART: [fht] FMC Alias Private Key: 7
3,079,377 UART: [art] Derive CDI
3,079,657 UART: [art] Store in slot 0x4
3,165,742 UART: [art] Derive Key Pair
3,166,102 UART: [art] Store priv key in slot 0x5
3,179,568 UART: [art] Derive Key Pair - Done
3,194,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,992 UART: [art] PUB.X = 9A998107BEB52B7DA621F4D51B4DC689AC40A2C1851FF20E2FEACDF4E563A5139B8637B6E9399347E8EA7BD4C81AA1A0
3,217,772 UART: [art] PUB.Y = 34164F3572DA1B93B5A44BFC7E8C224FE105092D9626A3959FF7FA7C00B6A41922DB35EA798E78D4961D6A316066C424
3,224,694 UART: [art] SIG.R = DE1BEE89DF4C3030334064FFE07CB2B72DF7930C1E76ABF67D41E358165113D66C3291E102487B6171812BF8C63636C5
3,231,458 UART: [art] SIG.S = 24CAD96646D88034B31A206991736B90617448F9B9C5A35818C668431CE7ACDA37A570D10B398F673A8087CC55C350D9
3,255,679 UART: Caliptra RT
3,255,930 UART: [state] CFI Enabled
3,374,894 UART: [rt] RT listening for mailbox commands...
3,375,558 writing to cptra_bootfsm_go
3,375,650 UART:
3,375,666 UART: Running Caliptra ROM ...
3,376,074 UART:
3,376,129 UART: [state] CFI Enabled
3,378,868 UART: [state] LifecycleState = Production
3,379,476 UART: [state] DebugLocked = Yes
3,380,118 UART: [state] Starting the WD Timer 40000000 cycles
3,381,785 UART: [kat] SHA2-256
4,185,335 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,189,439 UART: [kat] ++
4,189,591 UART: [kat] sha1
4,193,791 UART: [kat] SHA2-256
4,195,731 UART: [kat] SHA2-384
4,198,418 UART: [kat] SHA2-512-ACC
4,200,319 UART: [kat] ECC-384
4,210,682 UART: [kat] HMAC-384Kdf
4,215,220 UART: [kat] LMS
4,463,532 UART: [kat] --
4,464,498 UART: [warm-reset] ++
4,465,469 UART: [warm-reset] --
4,466,458 UART: [state] Locking Datavault
4,467,288 UART: [state] Locking PCR0, PCR1 and PCR31
4,467,892 UART: [state] Locking ICCM
4,468,478 UART: [exit] Launching FMC @ 0x40000130
4,473,808 UART:
4,473,824 UART: Running Caliptra FMC ...
4,474,232 UART:
4,474,286 UART: [state] CFI Enabled
4,475,271 UART: [art] Skip pcr extension
4,475,680 UART: [art] Extend RT PCRs Done
4,476,108 UART: [art] Lock RT PCRs Done
4,477,453 UART: [art] Populate DV Done
4,485,701 UART: [fht] FMC Alias Private Key: 7
4,486,669 UART: [art] Derive CDI
4,486,949 UART: [art] Store in slot 0x4
4,572,648 UART: [art] Derive Key Pair
4,573,008 UART: [art] Store priv key in slot 0x5
4,586,370 UART: [art] Derive Key Pair - Done
4,600,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,616,503 UART: [art] Erasing AUTHORITY.KEYID = 7
4,617,268 UART: [art] PUB.X = 9A998107BEB52B7DA621F4D51B4DC689AC40A2C1851FF20E2FEACDF4E563A5139B8637B6E9399347E8EA7BD4C81AA1A0
4,624,048 UART: [art] PUB.Y = 34164F3572DA1B93B5A44BFC7E8C224FE105092D9626A3959FF7FA7C00B6A41922DB35EA798E78D4961D6A316066C424
4,630,970 UART: [art] SIG.R = DE1BEE89DF4C3030334064FFE07CB2B72DF7930C1E76ABF67D41E358165113D66C3291E102487B6171812BF8C63636C5
4,637,734 UART: [art] SIG.S = 24CAD96646D88034B31A206991736B90617448F9B9C5A35818C668431CE7ACDA37A570D10B398F673A8087CC55C350D9
4,661,645 UART: Caliptra RT
4,661,896 UART: [state] CFI Enabled
5,026,473 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,520 UART: [state] LifecycleState = Production
86,128 UART: [state] DebugLocked = Yes
86,662 UART: [state] Starting the WD Timer 40000000 cycles
88,283 UART: [kat] SHA2-256
891,833 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,937 UART: [kat] ++
896,089 UART: [kat] sha1
900,257 UART: [kat] SHA2-256
902,197 UART: [kat] SHA2-384
905,172 UART: [kat] SHA2-512-ACC
907,073 UART: [kat] ECC-384
916,468 UART: [kat] HMAC-384Kdf
920,868 UART: [kat] LMS
1,169,180 UART: [kat] --
1,170,069 UART: [cold-reset] ++
1,170,578 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,174,544 ready_for_fw is high
1,174,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,250 UART: [idev] Erasing UDS.KEYID = 0
1,199,353 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,475 UART: [ldev] ++
1,209,643 UART: [ldev] CDI.KEYID = 6
1,210,007 UART: [ldev] SUBJECT.KEYID = 5
1,210,434 UART: [ldev] AUTHORITY.KEYID = 7
1,210,897 UART: [ldev] FE.KEYID = 1
1,216,221 UART: [ldev] Erasing FE.KEYID = 1
1,242,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,580 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,274 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,144 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,850 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,974 UART: [ldev] --
1,282,409 UART: [fwproc] Wait for Commands...
1,282,992 UART: [fwproc] Recv command 0x46574c44
1,283,725 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,116 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,291 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,523 >>> mbox cmd response: success
2,852,704 UART: [afmc] ++
2,852,872 UART: [afmc] CDI.KEYID = 6
2,853,235 UART: [afmc] SUBJECT.KEYID = 7
2,853,661 UART: [afmc] AUTHORITY.KEYID = 5
2,889,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,906,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,907,470 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,913,186 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,919,069 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,924,774 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,932,444 UART: [afmc] --
2,933,482 UART: [cold-reset] --
2,934,168 UART: [state] Locking Datavault
2,935,201 UART: [state] Locking PCR0, PCR1 and PCR31
2,935,805 UART: [state] Locking ICCM
2,936,427 UART: [exit] Launching FMC @ 0x40000130
2,941,757 UART:
2,941,773 UART: Running Caliptra FMC ...
2,942,181 UART:
2,942,324 UART: [state] CFI Enabled
2,953,088 UART: [fht] FMC Alias Private Key: 7
3,071,345 UART: [art] Extend RT PCRs Done
3,071,773 UART: [art] Lock RT PCRs Done
3,073,351 UART: [art] Populate DV Done
3,081,395 UART: [fht] FMC Alias Private Key: 7
3,082,341 UART: [art] Derive CDI
3,082,621 UART: [art] Store in slot 0x4
3,168,398 UART: [art] Derive Key Pair
3,168,758 UART: [art] Store priv key in slot 0x5
3,182,274 UART: [art] Derive Key Pair - Done
3,197,098 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,358 UART: [art] PUB.X = 19FAC0EF0235B804CBE46AA9EC81C688BDB74DD1D1948A2721B57BD9985333098F9D2A0FD8D89834ECAA7156E0207E73
3,220,126 UART: [art] PUB.Y = 4D60EBD741F9F873AD0D04559CC3B75484C8820DE8E75F5549EB562ECA86FB73AB1DDD036E9FF6E3A1ED5AA0A60A92E7
3,227,081 UART: [art] SIG.R = 64BDEC36CD8B9C4906D823868E26AD0E6DFC03B585701BC790C8C9DB982431FD0532E91C898559D3DE5092A892181FF8
3,233,843 UART: [art] SIG.S = DF4A9213FD612C1697AE2B2F4A4C11934314B745DBEF8FCF1917F6B65C7D26387EB111659F1F900ABE1DF5195B0B7B8F
3,257,655 UART: Caliptra RT
3,257,998 UART: [state] CFI Enabled
3,378,224 UART: [rt] RT listening for mailbox commands...
3,378,888 writing to cptra_bootfsm_go
3,378,980 UART:
3,378,996 UART: Running Caliptra ROM ...
3,379,404 UART:
3,379,546 UART: [state] CFI Enabled
3,382,447 UART: [state] LifecycleState = Production
3,383,055 UART: [state] DebugLocked = Yes
3,383,745 UART: [state] Starting the WD Timer 40000000 cycles
3,385,278 UART: [kat] SHA2-256
4,188,828 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,192,932 UART: [kat] ++
4,193,084 UART: [kat] sha1
4,197,422 UART: [kat] SHA2-256
4,199,362 UART: [kat] SHA2-384
4,202,069 UART: [kat] SHA2-512-ACC
4,203,970 UART: [kat] ECC-384
4,214,205 UART: [kat] HMAC-384Kdf
4,218,725 UART: [kat] LMS
4,467,037 UART: [kat] --
4,467,991 UART: [warm-reset] ++
4,468,900 UART: [warm-reset] --
4,469,499 UART: [state] Locking Datavault
4,470,213 UART: [state] Locking PCR0, PCR1 and PCR31
4,470,817 UART: [state] Locking ICCM
4,471,259 UART: [exit] Launching FMC @ 0x40000130
4,476,589 UART:
4,476,605 UART: Running Caliptra FMC ...
4,477,013 UART:
4,477,156 UART: [state] CFI Enabled
4,478,543 UART: [art] Skip pcr extension
4,478,952 UART: [art] Extend RT PCRs Done
4,479,380 UART: [art] Lock RT PCRs Done
4,480,565 UART: [art] Populate DV Done
4,488,621 UART: [fht] FMC Alias Private Key: 7
4,489,685 UART: [art] Derive CDI
4,489,965 UART: [art] Store in slot 0x4
4,575,874 UART: [art] Derive Key Pair
4,576,234 UART: [art] Store priv key in slot 0x5
4,589,792 UART: [art] Derive Key Pair - Done
4,604,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,620,419 UART: [art] Erasing AUTHORITY.KEYID = 7
4,621,184 UART: [art] PUB.X = 19FAC0EF0235B804CBE46AA9EC81C688BDB74DD1D1948A2721B57BD9985333098F9D2A0FD8D89834ECAA7156E0207E73
4,627,952 UART: [art] PUB.Y = 4D60EBD741F9F873AD0D04559CC3B75484C8820DE8E75F5549EB562ECA86FB73AB1DDD036E9FF6E3A1ED5AA0A60A92E7
4,634,907 UART: [art] SIG.R = 64BDEC36CD8B9C4906D823868E26AD0E6DFC03B585701BC790C8C9DB982431FD0532E91C898559D3DE5092A892181FF8
4,641,669 UART: [art] SIG.S = DF4A9213FD612C1697AE2B2F4A4C11934314B745DBEF8FCF1917F6B65C7D26387EB111659F1F900ABE1DF5195B0B7B8F
4,665,691 UART: Caliptra RT
4,666,034 UART: [state] CFI Enabled
5,031,767 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Production
85,728 UART: [state] DebugLocked = Yes
86,350 UART: [state] Starting the WD Timer 40000000 cycles
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,525 UART: [kat] ++
895,677 UART: [kat] sha1
899,859 UART: [kat] SHA2-256
901,799 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,192 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,169,905 UART: [cold-reset] ++
1,170,446 UART: [fht] FHT @ 0x50003400
1,172,942 UART: [idev] ++
1,173,110 UART: [idev] CDI.KEYID = 6
1,173,471 UART: [idev] SUBJECT.KEYID = 7
1,173,896 UART: [idev] UDS.KEYID = 0
1,174,242 ready_for_fw is high
1,174,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,924 UART: [idev] Erasing UDS.KEYID = 0
1,199,119 UART: [idev] Sha1 KeyId Algorithm
1,207,824 UART: [idev] --
1,208,655 UART: [ldev] ++
1,208,823 UART: [ldev] CDI.KEYID = 6
1,209,187 UART: [ldev] SUBJECT.KEYID = 5
1,209,614 UART: [ldev] AUTHORITY.KEYID = 7
1,210,077 UART: [ldev] FE.KEYID = 1
1,215,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,578 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,272 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,142 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,848 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,776 UART: [ldev] --
1,280,981 UART: [fwproc] Wait for Commands...
1,281,614 UART: [fwproc] Recv command 0x46574c44
1,282,347 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,677,400 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,708,575 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,848,855 >>> mbox cmd response: success
2,849,876 UART: [afmc] ++
2,850,044 UART: [afmc] CDI.KEYID = 6
2,850,407 UART: [afmc] SUBJECT.KEYID = 7
2,850,833 UART: [afmc] AUTHORITY.KEYID = 5
2,886,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,062 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,909,778 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,915,661 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,921,366 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,929,018 UART: [afmc] --
2,929,968 UART: [cold-reset] --
2,930,792 UART: [state] Locking Datavault
2,931,965 UART: [state] Locking PCR0, PCR1 and PCR31
2,932,569 UART: [state] Locking ICCM
2,933,101 UART: [exit] Launching FMC @ 0x40000130
2,938,431 UART:
2,938,447 UART: Running Caliptra FMC ...
2,938,855 UART:
2,938,998 UART: [state] CFI Enabled
2,949,712 UART: [fht] FMC Alias Private Key: 7
3,068,945 UART: [art] Extend RT PCRs Done
3,069,373 UART: [art] Lock RT PCRs Done
3,070,539 UART: [art] Populate DV Done
3,078,583 UART: [fht] FMC Alias Private Key: 7
3,079,521 UART: [art] Derive CDI
3,079,801 UART: [art] Store in slot 0x4
3,165,548 UART: [art] Derive Key Pair
3,165,908 UART: [art] Store priv key in slot 0x5
3,179,744 UART: [art] Derive Key Pair - Done
3,194,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,159 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,924 UART: [art] PUB.X = 5E515C999C607C8F3727F74C555968E78EDB2511091FCCA14B188DBA756F7A3FFD063E1C9B9BC9CC8716F73E5846BBA1
3,217,698 UART: [art] PUB.Y = 596664A7B0BAAFB2E249FA9F7DF377CDDA1DD93B68784D8762262B741B0F5C991AB3E1C9D501E37A71A570897E07D17F
3,224,649 UART: [art] SIG.R = A483589344F0145BF2B5DF0A4BB0E5C8631DBD6AE8A226B4F490ADDA7A7AB39DA375DFB5F0D8F9618616A470F251F43B
3,231,432 UART: [art] SIG.S = C46CC5C39CD8E6A67F9AB0DC922E3BD25FF99A7600D89883AC8CF5D9184FEDCADC78B233504F591E2ABD768B9A6CAB9E
3,255,180 UART: Caliptra RT
3,255,523 UART: [state] CFI Enabled
3,375,897 UART: [rt] RT listening for mailbox commands...
3,376,561 writing to cptra_bootfsm_go
3,376,653 UART:
3,376,669 UART: Running Caliptra ROM ...
3,377,077 UART:
3,377,219 UART: [state] CFI Enabled
3,380,282 UART: [state] LifecycleState = Production
3,380,890 UART: [state] DebugLocked = Yes
3,381,402 UART: [state] Starting the WD Timer 40000000 cycles
3,383,045 UART: [kat] SHA2-256
4,186,595 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,190,699 UART: [kat] ++
4,190,851 UART: [kat] sha1
4,195,121 UART: [kat] SHA2-256
4,197,061 UART: [kat] SHA2-384
4,199,868 UART: [kat] SHA2-512-ACC
4,201,769 UART: [kat] ECC-384
4,211,884 UART: [kat] HMAC-384Kdf
4,216,562 UART: [kat] LMS
4,464,874 UART: [kat] --
4,465,866 UART: [warm-reset] ++
4,466,857 UART: [warm-reset] --
4,467,532 UART: [state] Locking Datavault
4,468,452 UART: [state] Locking PCR0, PCR1 and PCR31
4,469,056 UART: [state] Locking ICCM
4,469,690 UART: [exit] Launching FMC @ 0x40000130
4,475,020 UART:
4,475,036 UART: Running Caliptra FMC ...
4,475,444 UART:
4,475,587 UART: [state] CFI Enabled
4,476,836 UART: [art] Skip pcr extension
4,477,245 UART: [art] Extend RT PCRs Done
4,477,673 UART: [art] Lock RT PCRs Done
4,479,082 UART: [art] Populate DV Done
4,487,108 UART: [fht] FMC Alias Private Key: 7
4,488,242 UART: [art] Derive CDI
4,488,522 UART: [art] Store in slot 0x4
4,573,949 UART: [art] Derive Key Pair
4,574,309 UART: [art] Store priv key in slot 0x5
4,587,787 UART: [art] Derive Key Pair - Done
4,602,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,617,550 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,315 UART: [art] PUB.X = 5E515C999C607C8F3727F74C555968E78EDB2511091FCCA14B188DBA756F7A3FFD063E1C9B9BC9CC8716F73E5846BBA1
4,625,089 UART: [art] PUB.Y = 596664A7B0BAAFB2E249FA9F7DF377CDDA1DD93B68784D8762262B741B0F5C991AB3E1C9D501E37A71A570897E07D17F
4,632,040 UART: [art] SIG.R = A483589344F0145BF2B5DF0A4BB0E5C8631DBD6AE8A226B4F490ADDA7A7AB39DA375DFB5F0D8F9618616A470F251F43B
4,638,823 UART: [art] SIG.S = C46CC5C39CD8E6A67F9AB0DC922E3BD25FF99A7600D89883AC8CF5D9184FEDCADC78B233504F591E2ABD768B9A6CAB9E
4,663,005 UART: Caliptra RT
4,663,348 UART: [state] CFI Enabled
5,028,449 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Production
86,173 UART: [state] DebugLocked = Yes
86,747 UART: [state] Starting the WD Timer 40000000 cycles
88,216 UART: [kat] SHA2-256
891,766 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
904,959 UART: [kat] SHA2-512-ACC
906,860 UART: [kat] ECC-384
916,375 UART: [kat] HMAC-384Kdf
921,085 UART: [kat] LMS
1,169,397 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,821 UART: [fht] FHT @ 0x50003400
1,173,455 UART: [idev] ++
1,173,623 UART: [idev] CDI.KEYID = 6
1,173,984 UART: [idev] SUBJECT.KEYID = 7
1,174,409 UART: [idev] UDS.KEYID = 0
1,174,755 ready_for_fw is high
1,174,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,525 UART: [idev] Erasing UDS.KEYID = 0
1,199,020 UART: [idev] Sha1 KeyId Algorithm
1,207,963 UART: [idev] --
1,209,148 UART: [ldev] ++
1,209,316 UART: [ldev] CDI.KEYID = 6
1,209,680 UART: [ldev] SUBJECT.KEYID = 5
1,210,107 UART: [ldev] AUTHORITY.KEYID = 7
1,210,570 UART: [ldev] FE.KEYID = 1
1,215,528 UART: [ldev] Erasing FE.KEYID = 1
1,241,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,265 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,959 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,829 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,535 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,669 UART: [ldev] --
1,280,914 UART: [fwproc] Wait for Commands...
1,281,707 UART: [fwproc] Recv command 0x46574c44
1,282,440 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,229 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,404 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,586 >>> mbox cmd response: success
2,851,781 UART: [afmc] ++
2,851,949 UART: [afmc] CDI.KEYID = 6
2,852,312 UART: [afmc] SUBJECT.KEYID = 7
2,852,738 UART: [afmc] AUTHORITY.KEYID = 5
2,888,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,185 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,910,901 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,784 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,489 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,369 UART: [afmc] --
2,931,395 UART: [cold-reset] --
2,932,283 UART: [state] Locking Datavault
2,933,374 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,978 UART: [state] Locking ICCM
2,934,482 UART: [exit] Launching FMC @ 0x40000130
2,939,812 UART:
2,939,828 UART: Running Caliptra FMC ...
2,940,236 UART:
2,940,290 UART: [state] CFI Enabled
2,950,902 UART: [fht] FMC Alias Private Key: 7
3,069,315 UART: [art] Extend RT PCRs Done
3,069,743 UART: [art] Lock RT PCRs Done
3,071,781 UART: [art] Populate DV Done
3,080,239 UART: [fht] FMC Alias Private Key: 7
3,081,341 UART: [art] Derive CDI
3,081,621 UART: [art] Store in slot 0x4
3,167,292 UART: [art] Derive Key Pair
3,167,652 UART: [art] Store priv key in slot 0x5
3,181,138 UART: [art] Derive Key Pair - Done
3,196,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,145 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,910 UART: [art] PUB.X = 0EEE5B85283B66F62AD1F0427DCDCCDFCD9F3381B52F589B40E9C4D98FA14207B52FED17D5F65CECA9C7BBB0A260364F
3,219,698 UART: [art] PUB.Y = 735480D39A91E52A44A5A284369F10C6F4F5DC7E05360EC878F279B55DDF21BA3C53E616062369CDD6B6A36920D1DF25
3,226,641 UART: [art] SIG.R = 1548DCB6DEE6896B97ED4DB809FBE2928883AFE9A1ED2613A00048286AD52F2031CA9F456C4AA9BEF34AA1FE1513AAAD
3,233,406 UART: [art] SIG.S = 85F565D9B87158D6ED14D694482BA826881A6E57A2836FEDD1394396785DFCDA2A1C2E18D1BDE5D9E048EA7C97C71EF5
3,256,826 UART: Caliptra RT
3,257,077 UART: [state] CFI Enabled
3,376,455 UART: [rt] RT listening for mailbox commands...
3,377,119 writing to cptra_bootfsm_go
3,377,211 UART:
3,377,227 UART: Running Caliptra ROM ...
3,377,635 UART:
3,377,690 UART: [state] CFI Enabled
3,380,193 UART: [state] LifecycleState = Production
3,380,801 UART: [state] DebugLocked = Yes
3,381,383 UART: [state] Starting the WD Timer 40000000 cycles
3,383,100 UART: [kat] SHA2-256
4,186,650 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,190,754 UART: [kat] ++
4,190,906 UART: [kat] sha1
4,195,056 UART: [kat] SHA2-256
4,196,996 UART: [kat] SHA2-384
4,199,833 UART: [kat] SHA2-512-ACC
4,201,734 UART: [kat] ECC-384
4,211,069 UART: [kat] HMAC-384Kdf
4,215,533 UART: [kat] LMS
4,463,845 UART: [kat] --
4,464,517 UART: [warm-reset] ++
4,465,406 UART: [warm-reset] --
4,466,313 UART: [state] Locking Datavault
4,467,133 UART: [state] Locking PCR0, PCR1 and PCR31
4,467,737 UART: [state] Locking ICCM
4,468,301 UART: [exit] Launching FMC @ 0x40000130
4,473,631 UART:
4,473,647 UART: Running Caliptra FMC ...
4,474,055 UART:
4,474,109 UART: [state] CFI Enabled
4,475,380 UART: [art] Skip pcr extension
4,475,789 UART: [art] Extend RT PCRs Done
4,476,217 UART: [art] Lock RT PCRs Done
4,477,382 UART: [art] Populate DV Done
4,485,658 UART: [fht] FMC Alias Private Key: 7
4,486,710 UART: [art] Derive CDI
4,486,990 UART: [art] Store in slot 0x4
4,572,483 UART: [art] Derive Key Pair
4,572,843 UART: [art] Store priv key in slot 0x5
4,585,921 UART: [art] Derive Key Pair - Done
4,600,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,615,962 UART: [art] Erasing AUTHORITY.KEYID = 7
4,616,727 UART: [art] PUB.X = 0EEE5B85283B66F62AD1F0427DCDCCDFCD9F3381B52F589B40E9C4D98FA14207B52FED17D5F65CECA9C7BBB0A260364F
4,623,515 UART: [art] PUB.Y = 735480D39A91E52A44A5A284369F10C6F4F5DC7E05360EC878F279B55DDF21BA3C53E616062369CDD6B6A36920D1DF25
4,630,458 UART: [art] SIG.R = 1548DCB6DEE6896B97ED4DB809FBE2928883AFE9A1ED2613A00048286AD52F2031CA9F456C4AA9BEF34AA1FE1513AAAD
4,637,223 UART: [art] SIG.S = 85F565D9B87158D6ED14D694482BA826881A6E57A2836FEDD1394396785DFCDA2A1C2E18D1BDE5D9E048EA7C97C71EF5
4,660,897 UART: Caliptra RT
4,661,148 UART: [state] CFI Enabled
5,025,203 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,917 UART: [state] LifecycleState = Production
85,525 UART: [state] DebugLocked = Yes
86,171 UART: [state] Starting the WD Timer 40000000 cycles
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,404 UART: [kat] ++
895,556 UART: [kat] sha1
899,950 UART: [kat] SHA2-256
901,890 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,397 UART: [kat] HMAC-384Kdf
921,013 UART: [kat] LMS
1,169,325 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,565 UART: [fht] FHT @ 0x50003400
1,173,401 UART: [idev] ++
1,173,569 UART: [idev] CDI.KEYID = 6
1,173,930 UART: [idev] SUBJECT.KEYID = 7
1,174,355 UART: [idev] UDS.KEYID = 0
1,174,701 ready_for_fw is high
1,174,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,399 UART: [idev] Erasing UDS.KEYID = 0
1,199,710 UART: [idev] Sha1 KeyId Algorithm
1,208,543 UART: [idev] --
1,209,614 UART: [ldev] ++
1,209,782 UART: [ldev] CDI.KEYID = 6
1,210,146 UART: [ldev] SUBJECT.KEYID = 5
1,210,573 UART: [ldev] AUTHORITY.KEYID = 7
1,211,036 UART: [ldev] FE.KEYID = 1
1,216,254 UART: [ldev] Erasing FE.KEYID = 1
1,242,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,119 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,813 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,683 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,389 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,459 UART: [ldev] --
1,281,754 UART: [fwproc] Wait for Commands...
1,282,425 UART: [fwproc] Recv command 0x46574c44
1,283,158 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,443 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,618 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,778 >>> mbox cmd response: success
2,851,889 UART: [afmc] ++
2,852,057 UART: [afmc] CDI.KEYID = 6
2,852,420 UART: [afmc] SUBJECT.KEYID = 7
2,852,846 UART: [afmc] AUTHORITY.KEYID = 5
2,888,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,626 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,375 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,091 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,974 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,679 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,317 UART: [afmc] --
2,931,257 UART: [cold-reset] --
2,932,085 UART: [state] Locking Datavault
2,933,294 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,898 UART: [state] Locking ICCM
2,934,498 UART: [exit] Launching FMC @ 0x40000130
2,939,828 UART:
2,939,844 UART: Running Caliptra FMC ...
2,940,252 UART:
2,940,306 UART: [state] CFI Enabled
2,950,820 UART: [fht] FMC Alias Private Key: 7
3,069,355 UART: [art] Extend RT PCRs Done
3,069,783 UART: [art] Lock RT PCRs Done
3,071,413 UART: [art] Populate DV Done
3,079,415 UART: [fht] FMC Alias Private Key: 7
3,080,539 UART: [art] Derive CDI
3,080,819 UART: [art] Store in slot 0x4
3,166,154 UART: [art] Derive Key Pair
3,166,514 UART: [art] Store priv key in slot 0x5
3,179,604 UART: [art] Derive Key Pair - Done
3,194,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,728 UART: [art] PUB.X = 2D4BCCCCEE3EAACFA8BAE343AC559BECCD945AADD69EBB86A71955F2E0D1AB5C441BBE446B9DCD2BDD006F9D5C6FF5B9
3,217,522 UART: [art] PUB.Y = FFE7EA887040970E188AF91F394495BC0224F7AAEF226040359D035A615C462CDA43A796D2917EDD4D0AFF6094F2D848
3,224,464 UART: [art] SIG.R = F5303CA3E71BABB58FB48A823DD3A26C5A2A83FE71B93923B8E0341C41E9D5B1266443238DC4D387241647B90002CD81
3,231,211 UART: [art] SIG.S = 9E51BAD217AB5326B41D73212CDA16E5D83E0AE69E78B2C54174689B0F7708EE4715D7BB6D9BEF8E2586DBD0457B0AD8
3,254,489 UART: Caliptra RT
3,254,740 UART: [state] CFI Enabled
3,375,948 UART: [rt] RT listening for mailbox commands...
3,376,612 writing to cptra_bootfsm_go
3,376,704 UART:
3,376,720 UART: Running Caliptra ROM ...
3,377,128 UART:
3,377,183 UART: [state] CFI Enabled
3,379,594 UART: [state] LifecycleState = Production
3,380,202 UART: [state] DebugLocked = Yes
3,380,846 UART: [state] Starting the WD Timer 40000000 cycles
3,382,453 UART: [kat] SHA2-256
4,186,003 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,190,107 UART: [kat] ++
4,190,259 UART: [kat] sha1
4,194,479 UART: [kat] SHA2-256
4,196,419 UART: [kat] SHA2-384
4,199,084 UART: [kat] SHA2-512-ACC
4,200,985 UART: [kat] ECC-384
4,210,392 UART: [kat] HMAC-384Kdf
4,215,062 UART: [kat] LMS
4,463,374 UART: [kat] --
4,464,386 UART: [warm-reset] ++
4,465,253 UART: [warm-reset] --
4,465,922 UART: [state] Locking Datavault
4,466,652 UART: [state] Locking PCR0, PCR1 and PCR31
4,467,256 UART: [state] Locking ICCM
4,467,682 UART: [exit] Launching FMC @ 0x40000130
4,473,012 UART:
4,473,028 UART: Running Caliptra FMC ...
4,473,436 UART:
4,473,490 UART: [state] CFI Enabled
4,474,721 UART: [art] Skip pcr extension
4,475,130 UART: [art] Extend RT PCRs Done
4,475,558 UART: [art] Lock RT PCRs Done
4,476,899 UART: [art] Populate DV Done
4,484,951 UART: [fht] FMC Alias Private Key: 7
4,486,115 UART: [art] Derive CDI
4,486,395 UART: [art] Store in slot 0x4
4,572,374 UART: [art] Derive Key Pair
4,572,734 UART: [art] Store priv key in slot 0x5
4,586,108 UART: [art] Derive Key Pair - Done
4,601,096 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,616,427 UART: [art] Erasing AUTHORITY.KEYID = 7
4,617,192 UART: [art] PUB.X = 2D4BCCCCEE3EAACFA8BAE343AC559BECCD945AADD69EBB86A71955F2E0D1AB5C441BBE446B9DCD2BDD006F9D5C6FF5B9
4,623,986 UART: [art] PUB.Y = FFE7EA887040970E188AF91F394495BC0224F7AAEF226040359D035A615C462CDA43A796D2917EDD4D0AFF6094F2D848
4,630,928 UART: [art] SIG.R = F5303CA3E71BABB58FB48A823DD3A26C5A2A83FE71B93923B8E0341C41E9D5B1266443238DC4D387241647B90002CD81
4,637,675 UART: [art] SIG.S = 9E51BAD217AB5326B41D73212CDA16E5D83E0AE69E78B2C54174689B0F7708EE4715D7BB6D9BEF8E2586DBD0457B0AD8
4,661,285 UART: Caliptra RT
4,661,536 UART: [state] CFI Enabled
5,024,845 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Production
85,816 UART: [state] DebugLocked = Yes
86,440 UART: [state] Starting the WD Timer 40000000 cycles
88,153 UART: [kat] SHA2-256
891,703 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,807 UART: [kat] ++
895,959 UART: [kat] sha1
899,983 UART: [kat] SHA2-256
901,923 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,170,013 UART: [cold-reset] ++
1,170,520 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,174,340 ready_for_fw is high
1,174,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,818 UART: [idev] Erasing UDS.KEYID = 0
1,198,853 UART: [idev] Sha1 KeyId Algorithm
1,207,766 UART: [idev] --
1,208,941 UART: [ldev] ++
1,209,109 UART: [ldev] CDI.KEYID = 6
1,209,473 UART: [ldev] SUBJECT.KEYID = 5
1,209,900 UART: [ldev] AUTHORITY.KEYID = 7
1,210,363 UART: [ldev] FE.KEYID = 1
1,215,527 UART: [ldev] Erasing FE.KEYID = 1
1,241,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,740 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,434 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,304 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,010 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,898 UART: [ldev] --
1,281,233 UART: [fwproc] Wait for Commands...
1,281,890 UART: [fwproc] Recv command 0x46574c44
1,282,623 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,612 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,787 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,183 >>> mbox cmd response: success
2,852,218 UART: [afmc] ++
2,852,386 UART: [afmc] CDI.KEYID = 6
2,852,749 UART: [afmc] SUBJECT.KEYID = 7
2,853,175 UART: [afmc] AUTHORITY.KEYID = 5
2,888,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,218 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,934 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,817 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,522 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,072 UART: [afmc] --
2,931,890 UART: [cold-reset] --
2,932,778 UART: [state] Locking Datavault
2,934,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,657 UART: [state] Locking ICCM
2,935,235 UART: [exit] Launching FMC @ 0x40000130
2,940,565 UART:
2,940,581 UART: Running Caliptra FMC ...
2,940,989 UART:
2,941,132 UART: [state] CFI Enabled
2,951,438 UART: [fht] FMC Alias Private Key: 7
3,069,983 UART: [art] Extend RT PCRs Done
3,070,411 UART: [art] Lock RT PCRs Done
3,072,067 UART: [art] Populate DV Done
3,080,385 UART: [fht] FMC Alias Private Key: 7
3,081,523 UART: [art] Derive CDI
3,081,803 UART: [art] Store in slot 0x4
3,167,728 UART: [art] Derive Key Pair
3,168,088 UART: [art] Store priv key in slot 0x5
3,181,708 UART: [art] Derive Key Pair - Done
3,196,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,040 UART: [art] PUB.X = 281D9970434C0FE710F9FBA87394508D373258AB4845CCE098A57CB117EE6EFB3CF100EDBDE7ADC6639FA36823521C23
3,219,793 UART: [art] PUB.Y = D84815FF88AFDF896EFE6A7D61848B2C33D6EE5AF6AC652905343AEC7B5E0A64DDA3985DAB692B84AC734BF8138649BE
3,226,755 UART: [art] SIG.R = EB73755D8CD4A1F5D75671B218CAFCD46AAFA8D8DA13AC88B129E50B8D674226983A70EB6A8491EF97DFCDA76D3337AA
3,233,542 UART: [art] SIG.S = C635869C6E56A5159592595906A8B5B800C411AB2402D82536884D9C2CBA72C7E73F1474A2F1FFD0889ECF7460A9335A
3,257,090 UART: Caliptra RT
3,257,433 UART: [state] CFI Enabled
3,377,275 UART: [rt] RT listening for mailbox commands...
3,377,939 writing to cptra_bootfsm_go
3,378,031 UART:
3,378,047 UART: Running Caliptra ROM ...
3,378,455 UART:
3,378,597 UART: [state] CFI Enabled
3,381,056 UART: [state] LifecycleState = Production
3,381,664 UART: [state] DebugLocked = Yes
3,382,388 UART: [state] Starting the WD Timer 40000000 cycles
3,383,937 UART: [kat] SHA2-256
4,187,487 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,191,591 UART: [kat] ++
4,191,743 UART: [kat] sha1
4,195,999 UART: [kat] SHA2-256
4,197,939 UART: [kat] SHA2-384
4,200,696 UART: [kat] SHA2-512-ACC
4,202,597 UART: [kat] ECC-384
4,212,474 UART: [kat] HMAC-384Kdf
4,217,200 UART: [kat] LMS
4,465,512 UART: [kat] --
4,466,360 UART: [warm-reset] ++
4,467,195 UART: [warm-reset] --
4,468,112 UART: [state] Locking Datavault
4,468,974 UART: [state] Locking PCR0, PCR1 and PCR31
4,469,578 UART: [state] Locking ICCM
4,470,036 UART: [exit] Launching FMC @ 0x40000130
4,475,366 UART:
4,475,382 UART: Running Caliptra FMC ...
4,475,790 UART:
4,475,933 UART: [state] CFI Enabled
4,477,208 UART: [art] Skip pcr extension
4,477,617 UART: [art] Extend RT PCRs Done
4,478,045 UART: [art] Lock RT PCRs Done
4,479,302 UART: [art] Populate DV Done
4,487,312 UART: [fht] FMC Alias Private Key: 7
4,488,370 UART: [art] Derive CDI
4,488,650 UART: [art] Store in slot 0x4
4,574,625 UART: [art] Derive Key Pair
4,574,985 UART: [art] Store priv key in slot 0x5
4,588,307 UART: [art] Derive Key Pair - Done
4,602,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,618,032 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,797 UART: [art] PUB.X = 281D9970434C0FE710F9FBA87394508D373258AB4845CCE098A57CB117EE6EFB3CF100EDBDE7ADC6639FA36823521C23
4,625,550 UART: [art] PUB.Y = D84815FF88AFDF896EFE6A7D61848B2C33D6EE5AF6AC652905343AEC7B5E0A64DDA3985DAB692B84AC734BF8138649BE
4,632,512 UART: [art] SIG.R = EB73755D8CD4A1F5D75671B218CAFCD46AAFA8D8DA13AC88B129E50B8D674226983A70EB6A8491EF97DFCDA76D3337AA
4,639,299 UART: [art] SIG.S = C635869C6E56A5159592595906A8B5B800C411AB2402D82536884D9C2CBA72C7E73F1474A2F1FFD0889ECF7460A9335A
4,663,343 UART: Caliptra RT
4,663,686 UART: [state] CFI Enabled
5,031,563 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,694 UART: [state] LifecycleState = Production
86,302 UART: [state] DebugLocked = Yes
86,812 UART: [state] Starting the WD Timer 40000000 cycles
88,277 UART: [kat] SHA2-256
891,827 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,931 UART: [kat] ++
896,083 UART: [kat] sha1
900,511 UART: [kat] SHA2-256
902,451 UART: [kat] SHA2-384
905,226 UART: [kat] SHA2-512-ACC
907,127 UART: [kat] ECC-384
916,970 UART: [kat] HMAC-384Kdf
921,742 UART: [kat] LMS
1,170,054 UART: [kat] --
1,170,887 UART: [cold-reset] ++
1,171,410 UART: [fht] FHT @ 0x50003400
1,174,094 UART: [idev] ++
1,174,262 UART: [idev] CDI.KEYID = 6
1,174,623 UART: [idev] SUBJECT.KEYID = 7
1,175,048 UART: [idev] UDS.KEYID = 0
1,175,394 ready_for_fw is high
1,175,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,234 UART: [idev] Erasing UDS.KEYID = 0
1,200,575 UART: [idev] Sha1 KeyId Algorithm
1,209,480 UART: [idev] --
1,210,665 UART: [ldev] ++
1,210,833 UART: [ldev] CDI.KEYID = 6
1,211,197 UART: [ldev] SUBJECT.KEYID = 5
1,211,624 UART: [ldev] AUTHORITY.KEYID = 7
1,212,087 UART: [ldev] FE.KEYID = 1
1,217,625 UART: [ldev] Erasing FE.KEYID = 1
1,244,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,172 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,866 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,736 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,442 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,518 UART: [ldev] --
1,283,967 UART: [fwproc] Wait for Commands...
1,284,748 UART: [fwproc] Recv command 0x46574c44
1,285,481 UART: [fwproc] Recv'd Img size: 118548 bytes
2,655,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,683,120 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,714,295 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,854,529 >>> mbox cmd response: success
2,855,542 UART: [afmc] ++
2,855,710 UART: [afmc] CDI.KEYID = 6
2,856,073 UART: [afmc] SUBJECT.KEYID = 7
2,856,499 UART: [afmc] AUTHORITY.KEYID = 5
2,892,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,908,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,909,654 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,915,370 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,921,253 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,926,958 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,934,706 UART: [afmc] --
2,935,680 UART: [cold-reset] --
2,936,668 UART: [state] Locking Datavault
2,937,821 UART: [state] Locking PCR0, PCR1 and PCR31
2,938,425 UART: [state] Locking ICCM
2,939,039 UART: [exit] Launching FMC @ 0x40000130
2,944,369 UART:
2,944,385 UART: Running Caliptra FMC ...
2,944,793 UART:
2,944,936 UART: [state] CFI Enabled
2,955,546 UART: [fht] FMC Alias Private Key: 7
3,074,213 UART: [art] Extend RT PCRs Done
3,074,641 UART: [art] Lock RT PCRs Done
3,076,197 UART: [art] Populate DV Done
3,084,375 UART: [fht] FMC Alias Private Key: 7
3,085,305 UART: [art] Derive CDI
3,085,585 UART: [art] Store in slot 0x4
3,171,218 UART: [art] Derive Key Pair
3,171,578 UART: [art] Store priv key in slot 0x5
3,185,184 UART: [art] Derive Key Pair - Done
3,200,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,215,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,600 UART: [art] PUB.X = 66F521919584931DEE7E097CBBAE2DA251B57A4C842A6034B7A99734369DE73FCD6484DC6241C83D317DC1220C8889EA
3,223,366 UART: [art] PUB.Y = 41954186BE91E0CC9A0D5D76F7717DEE10ADE142C65DEB16F33D276D1A1FAE593EDC84501782A91D55747F3DC9D35B57
3,230,323 UART: [art] SIG.R = 7041D8DDFD722A18B48497DFFC633056BFC8625ED263920E85C2181A76933E881D2759EEF144DD57BA44F5964C070C6E
3,237,086 UART: [art] SIG.S = 61DD76AF5A1654922E2ABF7DEF212996396F971A79849C3E92EB8FDC2E16910E599E81E916159DEF52696C1736C98599
3,260,979 UART: Caliptra RT
3,261,322 UART: [state] CFI Enabled
3,380,955 UART: [rt] RT listening for mailbox commands...
3,381,619 writing to cptra_bootfsm_go
3,381,711 UART:
3,381,727 UART: Running Caliptra ROM ...
3,382,135 UART:
3,382,277 UART: [state] CFI Enabled
3,385,028 UART: [state] LifecycleState = Production
3,385,636 UART: [state] DebugLocked = Yes
3,386,352 UART: [state] Starting the WD Timer 40000000 cycles
3,388,029 UART: [kat] SHA2-256
4,191,579 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,195,683 UART: [kat] ++
4,195,835 UART: [kat] sha1
4,199,933 UART: [kat] SHA2-256
4,201,873 UART: [kat] SHA2-384
4,204,482 UART: [kat] SHA2-512-ACC
4,206,383 UART: [kat] ECC-384
4,216,028 UART: [kat] HMAC-384Kdf
4,220,784 UART: [kat] LMS
4,469,096 UART: [kat] --
4,469,852 UART: [warm-reset] ++
4,470,731 UART: [warm-reset] --
4,471,696 UART: [state] Locking Datavault
4,472,502 UART: [state] Locking PCR0, PCR1 and PCR31
4,473,106 UART: [state] Locking ICCM
4,473,532 UART: [exit] Launching FMC @ 0x40000130
4,478,862 UART:
4,478,878 UART: Running Caliptra FMC ...
4,479,286 UART:
4,479,429 UART: [state] CFI Enabled
4,480,872 UART: [art] Skip pcr extension
4,481,281 UART: [art] Extend RT PCRs Done
4,481,709 UART: [art] Lock RT PCRs Done
4,482,808 UART: [art] Populate DV Done
4,490,984 UART: [fht] FMC Alias Private Key: 7
4,491,940 UART: [art] Derive CDI
4,492,220 UART: [art] Store in slot 0x4
4,578,207 UART: [art] Derive Key Pair
4,578,567 UART: [art] Store priv key in slot 0x5
4,591,801 UART: [art] Derive Key Pair - Done
4,606,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,621,566 UART: [art] Erasing AUTHORITY.KEYID = 7
4,622,331 UART: [art] PUB.X = 66F521919584931DEE7E097CBBAE2DA251B57A4C842A6034B7A99734369DE73FCD6484DC6241C83D317DC1220C8889EA
4,629,097 UART: [art] PUB.Y = 41954186BE91E0CC9A0D5D76F7717DEE10ADE142C65DEB16F33D276D1A1FAE593EDC84501782A91D55747F3DC9D35B57
4,636,054 UART: [art] SIG.R = 7041D8DDFD722A18B48497DFFC633056BFC8625ED263920E85C2181A76933E881D2759EEF144DD57BA44F5964C070C6E
4,642,817 UART: [art] SIG.S = 61DD76AF5A1654922E2ABF7DEF212996396F971A79849C3E92EB8FDC2E16910E599E81E916159DEF52696C1736C98599
4,666,422 UART: Caliptra RT
4,666,765 UART: [state] CFI Enabled
5,027,831 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
191,532 UART:
191,882 UART: Running Caliptra ROM ...
193,010 UART:
193,168 UART: [state] CFI Enabled
268,043 UART: [state] LifecycleState = Production
269,863 UART: [state] DebugLocked = Yes
272,642 UART: [state] Starting the WD Timer 40000000 cycles
277,526 UART: [kat] SHA2-256
457,198 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
467,981 UART: [kat] ++
468,517 UART: [kat] sha1
480,377 UART: [kat] SHA2-256
483,040 UART: [kat] SHA2-384
489,041 UART: [kat] SHA2-512-ACC
491,417 UART: [kat] ECC-384
2,948,784 UART: [kat] HMAC-384Kdf
2,972,413 UART: [kat] LMS
3,448,959 UART: [kat] --
3,454,376 UART: [cold-reset] ++
3,456,387 UART: [fht] FHT @ 0x50003400
3,466,877 UART: [idev] ++
3,467,447 UART: [idev] CDI.KEYID = 6
3,468,485 UART: [idev] SUBJECT.KEYID = 7
3,469,663 UART: [idev] UDS.KEYID = 0
3,470,600 ready_for_fw is high
3,470,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,033 UART: [idev] Erasing UDS.KEYID = 0
5,986,694 UART: [idev] Sha1 KeyId Algorithm
6,010,577 UART: [idev] --
6,015,288 UART: [ldev] ++
6,015,870 UART: [ldev] CDI.KEYID = 6
6,016,896 UART: [ldev] SUBJECT.KEYID = 5
6,018,010 UART: [ldev] AUTHORITY.KEYID = 7
6,019,304 UART: [ldev] FE.KEYID = 1
6,060,382 UART: [ldev] Erasing FE.KEYID = 1
8,568,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,572 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,317,351 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,333,223 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,348,998 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,370,584 UART: [ldev] --
10,375,532 UART: [fwproc] Wait for Commands...
10,378,378 UART: [fwproc] Recv command 0x46574c44
10,380,449 UART: [fwproc] Recv'd Img size: 118548 bytes
13,895,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,979,079 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,052,093 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,380,200 >>> mbox cmd response: success
14,384,990 UART: [afmc] ++
14,385,581 UART: [afmc] CDI.KEYID = 6
14,386,497 UART: [afmc] SUBJECT.KEYID = 7
14,387,718 UART: [afmc] AUTHORITY.KEYID = 5
16,920,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,664,508 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,666,695 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
18,682,627 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
18,698,620 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
18,714,269 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
18,738,718 UART: [afmc] --
18,741,997 UART: [cold-reset] --
18,746,300 UART: [state] Locking Datavault
18,750,148 UART: [state] Locking PCR0, PCR1 and PCR31
18,751,905 UART: [state] Locking ICCM
18,754,495 UART: [exit] Launching FMC @ 0x40000130
18,762,897 UART:
18,763,142 UART: Running Caliptra FMC ...
18,764,250 UART:
18,764,415 UART: [state] CFI Enabled
18,821,492 UART: [fht] FMC Alias Private Key: 7
20,588,620 UART: [art] Extend RT PCRs Done
20,589,841 UART: [art] Lock RT PCRs Done
20,591,419 UART: [art] Populate DV Done
20,596,948 UART: [fht] FMC Alias Private Key: 7
20,598,654 UART: [art] Derive CDI
20,599,477 UART: [art] Store in slot 0x4
20,654,652 UART: [art] Derive Key Pair
20,655,697 UART: [art] Store priv key in slot 0x5
23,118,081 UART: [art] Derive Key Pair - Done
23,131,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,844,933 UART: [art] Erasing AUTHORITY.KEYID = 7
24,846,439 UART: [art] PUB.X = 798F3F9CA7EDDC50C56C794AC7623372B0DA24B442883D5C222D172CD97500AD4DFBF0B454F0EDDF41B42A336223F2AE
24,853,745 UART: [art] PUB.Y = 826554786458DAFA8CF597823B99BD782B3893657CD36847D417F16B1F94D770F389450D80A3077F9BF0A9B425F2B85B
24,860,967 UART: [art] SIG.R = 677639F4115E31C843C3925972D9B7AFB59D159C935435B7D968B1BF03E98C3CD515B5C0D263DE234A54B86055F79CD8
24,868,343 UART: [art] SIG.S = D7DF1A160F4E321690F0B6FE118EA9C7AE19636B57E073527F7C9B9AB73AEA742378464CB38D488EFDC117D3602674A1
25,847,584 UART: Caliptra RT
25,848,296 UART: [state] CFI Enabled
26,028,904 UART: [rt] RT listening for mailbox commands...
26,030,766 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,060,543 UART: [rt]cmd =0x46505652, len=4
26,061,776 UART: [rt] FIPS Version
26,063,059 >>> mbox cmd response data (36 bytes)
296 writing to cptra_bootfsm_go
517 UART:
662 UART: Running Caliptra ROM ...
1,664 UART:
1,809 UART: [state] CFI Enabled
56,588 UART: [state] LifecycleState = Production
58,387 UART: [state] DebugLocked = Yes
60,697 UART: [state] Starting the WD Timer 40000000 cycles
66,021 UART: [kat] SHA2-256
245,730 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
256,520 UART: [kat] ++
256,966 UART: [kat] sha1
267,521 UART: [kat] SHA2-256
270,265 UART: [kat] SHA2-384
275,002 UART: [kat] SHA2-512-ACC
277,404 UART: [kat] ECC-384
2,742,860 UART: [kat] HMAC-384Kdf
2,766,123 UART: [kat] LMS
3,242,611 UART: [kat] --
3,246,008 UART: [warm-reset] ++
3,251,245 UART: [warm-reset] --
3,254,467 UART: [state] Locking Datavault
3,258,153 UART: [state] Locking PCR0, PCR1 and PCR31
3,259,916 UART: [state] Locking ICCM
3,262,017 UART: [exit] Launching FMC @ 0x40000130
3,270,425 UART:
3,270,708 UART: Running Caliptra FMC ...
3,271,826 UART:
3,271,998 UART: [state] CFI Enabled
3,332,651 UART: [art] Skip pcr extension
3,333,767 UART: [art] Extend RT PCRs Done
3,334,912 UART: [art] Lock RT PCRs Done
3,336,167 UART: [art] Populate DV Done
3,341,580 UART: [fht] FMC Alias Private Key: 7
3,343,229 UART: [art] Derive CDI
3,344,048 UART: [art] Store in slot 0x4
3,401,370 UART: [art] Derive Key Pair
3,402,417 UART: [art] Store priv key in slot 0x5
5,865,454 UART: [art] Derive Key Pair - Done
5,878,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,591,007 UART: [art] Erasing AUTHORITY.KEYID = 7
7,592,537 UART: [art] PUB.X = 798F3F9CA7EDDC50C56C794AC7623372B0DA24B442883D5C222D172CD97500AD4DFBF0B454F0EDDF41B42A336223F2AE
7,599,788 UART: [art] PUB.Y = 826554786458DAFA8CF597823B99BD782B3893657CD36847D417F16B1F94D770F389450D80A3077F9BF0A9B425F2B85B
7,607,029 UART: [art] SIG.R = 677639F4115E31C843C3925972D9B7AFB59D159C935435B7D968B1BF03E98C3CD515B5C0D263DE234A54B86055F79CD8
7,614,436 UART: [art] SIG.S = D7DF1A160F4E321690F0B6FE118EA9C7AE19636B57E073527F7C9B9AB73AEA742378464CB38D488EFDC117D3602674A1
8,593,641 UART: Caliptra RT
8,594,355 UART: [state] CFI Enabled
9,014,442 UART: [rt] RT listening for mailbox commands...
9,016,308 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
9,046,139 UART: [rt]cmd =0x46505652, len=4
9,047,423 UART: [rt] FIPS Version
9,048,650 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
191,637 UART:
192,001 UART: Running Caliptra ROM ...
193,181 UART:
193,344 UART: [state] CFI Enabled
265,179 UART: [state] LifecycleState = Production
266,985 UART: [state] DebugLocked = Yes
268,478 UART: [state] Starting the WD Timer 40000000 cycles
273,288 UART: [kat] SHA2-256
452,976 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,754 UART: [kat] ++
464,206 UART: [kat] sha1
476,108 UART: [kat] SHA2-256
478,769 UART: [kat] SHA2-384
485,608 UART: [kat] SHA2-512-ACC
487,999 UART: [kat] ECC-384
2,949,099 UART: [kat] HMAC-384Kdf
2,971,353 UART: [kat] LMS
3,447,873 UART: [kat] --
3,451,521 UART: [cold-reset] ++
3,452,673 UART: [fht] FHT @ 0x50003400
3,464,362 UART: [idev] ++
3,464,923 UART: [idev] CDI.KEYID = 6
3,465,878 UART: [idev] SUBJECT.KEYID = 7
3,467,124 UART: [idev] UDS.KEYID = 0
3,468,034 ready_for_fw is high
3,468,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,289 UART: [idev] Erasing UDS.KEYID = 0
5,985,577 UART: [idev] Sha1 KeyId Algorithm
6,008,801 UART: [idev] --
6,013,085 UART: [ldev] ++
6,013,687 UART: [ldev] CDI.KEYID = 6
6,014,579 UART: [ldev] SUBJECT.KEYID = 5
6,015,793 UART: [ldev] AUTHORITY.KEYID = 7
6,017,085 UART: [ldev] FE.KEYID = 1
6,057,564 UART: [ldev] Erasing FE.KEYID = 1
8,565,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,637 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,317,465 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,333,347 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,349,126 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,370,315 UART: [ldev] --
10,376,635 UART: [fwproc] Wait for Commands...
10,378,145 UART: [fwproc] Recv command 0x46574c44
10,380,189 UART: [fwproc] Recv'd Img size: 118548 bytes
13,889,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,970,142 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,043,192 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,372,103 >>> mbox cmd response: success
14,376,072 UART: [afmc] ++
14,376,665 UART: [afmc] CDI.KEYID = 6
14,377,613 UART: [afmc] SUBJECT.KEYID = 7
14,378,833 UART: [afmc] AUTHORITY.KEYID = 5
16,918,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,641,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,643,705 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
18,659,661 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
18,675,605 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
18,691,345 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
18,716,529 UART: [afmc] --
18,719,579 UART: [cold-reset] --
18,724,958 UART: [state] Locking Datavault
18,730,259 UART: [state] Locking PCR0, PCR1 and PCR31
18,732,035 UART: [state] Locking ICCM
18,733,064 UART: [exit] Launching FMC @ 0x40000130
18,741,468 UART:
18,741,717 UART: Running Caliptra FMC ...
18,742,822 UART:
18,742,988 UART: [state] CFI Enabled
18,798,980 UART: [fht] FMC Alias Private Key: 7
20,565,721 UART: [art] Extend RT PCRs Done
20,566,942 UART: [art] Lock RT PCRs Done
20,568,492 UART: [art] Populate DV Done
20,573,960 UART: [fht] FMC Alias Private Key: 7
20,575,496 UART: [art] Derive CDI
20,576,236 UART: [art] Store in slot 0x4
20,632,227 UART: [art] Derive Key Pair
20,633,265 UART: [art] Store priv key in slot 0x5
23,096,191 UART: [art] Derive Key Pair - Done
23,109,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,821,844 UART: [art] Erasing AUTHORITY.KEYID = 7
24,823,350 UART: [art] PUB.X = 267B292EAC061FE97472BA584290DBC6D746CD9705E01F8B6C5FB1DA33D25E2A8FCC20034631FC87DE12AA613BC9ED9B
24,830,608 UART: [art] PUB.Y = 764695E58F7A25F3713BAFA78395135D0E0B7F83C1CD620C588724DDF281E2DC146C557F6E50015681A0CB4700EA4C6D
24,837,845 UART: [art] SIG.R = 39BA89FC032EFEF4A82BB4527757488CD80BB2DD9C73CB514BB590EDB5AC46FF5A3383712E94C67447AD51E6DDAE3E94
24,845,324 UART: [art] SIG.S = F689B10BCDC29155A99B0694FB2F1C0A597B15002CB4AE4BFA82EFBA222424461EF30659BB89F8A9A992FC164DEC334E
25,824,319 UART: Caliptra RT
25,825,036 UART: [state] CFI Enabled
26,006,581 UART: [rt] RT listening for mailbox commands...
26,008,444 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,038,326 UART: [rt]cmd =0x46505652, len=4
26,039,578 UART: [rt] FIPS Version
26,040,855 >>> mbox cmd response data (36 bytes)
292 writing to cptra_bootfsm_go
539 UART:
684 UART: Running Caliptra ROM ...
1,805 UART:
1,965 UART: [state] CFI Enabled
56,947 UART: [state] LifecycleState = Production
58,713 UART: [state] DebugLocked = Yes
61,616 UART: [state] Starting the WD Timer 40000000 cycles
66,123 UART: [kat] SHA2-256
245,833 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
256,642 UART: [kat] ++
257,092 UART: [kat] sha1
268,675 UART: [kat] SHA2-256
271,364 UART: [kat] SHA2-384
276,637 UART: [kat] SHA2-512-ACC
278,977 UART: [kat] ECC-384
2,741,860 UART: [kat] HMAC-384Kdf
2,765,052 UART: [kat] LMS
3,241,496 UART: [kat] --
3,247,450 UART: [warm-reset] ++
3,251,437 UART: [warm-reset] --
3,254,923 UART: [state] Locking Datavault
3,256,935 UART: [state] Locking PCR0, PCR1 and PCR31
3,258,642 UART: [state] Locking ICCM
3,260,632 UART: [exit] Launching FMC @ 0x40000130
3,268,982 UART:
3,269,233 UART: Running Caliptra FMC ...
3,270,341 UART:
3,270,508 UART: [state] CFI Enabled
3,332,941 UART: [art] Skip pcr extension
3,334,091 UART: [art] Extend RT PCRs Done
3,335,249 UART: [art] Lock RT PCRs Done
3,336,322 UART: [art] Populate DV Done
3,341,675 UART: [fht] FMC Alias Private Key: 7
3,343,377 UART: [art] Derive CDI
3,344,214 UART: [art] Store in slot 0x4
3,401,635 UART: [art] Derive Key Pair
3,402,677 UART: [art] Store priv key in slot 0x5
5,864,649 UART: [art] Derive Key Pair - Done
5,877,335 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,590,877 UART: [art] Erasing AUTHORITY.KEYID = 7
7,592,378 UART: [art] PUB.X = 267B292EAC061FE97472BA584290DBC6D746CD9705E01F8B6C5FB1DA33D25E2A8FCC20034631FC87DE12AA613BC9ED9B
7,599,681 UART: [art] PUB.Y = 764695E58F7A25F3713BAFA78395135D0E0B7F83C1CD620C588724DDF281E2DC146C557F6E50015681A0CB4700EA4C6D
7,606,920 UART: [art] SIG.R = 39BA89FC032EFEF4A82BB4527757488CD80BB2DD9C73CB514BB590EDB5AC46FF5A3383712E94C67447AD51E6DDAE3E94
7,614,333 UART: [art] SIG.S = F689B10BCDC29155A99B0694FB2F1C0A597B15002CB4AE4BFA82EFBA222424461EF30659BB89F8A9A992FC164DEC334E
8,593,538 UART: Caliptra RT
8,594,252 UART: [state] CFI Enabled
9,013,901 UART: [rt] RT listening for mailbox commands...
9,015,747 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
9,045,411 UART: [rt]cmd =0x46505652, len=4
9,046,698 UART: [rt] FIPS Version
9,047,946 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
191,817 UART:
192,187 UART: Running Caliptra ROM ...
193,308 UART:
602,888 UART: [state] CFI Enabled
615,142 UART: [state] LifecycleState = Production
616,948 UART: [state] DebugLocked = Yes
618,804 UART: [state] Starting the WD Timer 40000000 cycles
624,259 UART: [kat] SHA2-256
803,964 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,728 UART: [kat] ++
815,170 UART: [kat] sha1
827,345 UART: [kat] SHA2-256
830,067 UART: [kat] SHA2-384
834,785 UART: [kat] SHA2-512-ACC
837,149 UART: [kat] ECC-384
3,279,038 UART: [kat] HMAC-384Kdf
3,290,847 UART: [kat] LMS
3,767,376 UART: [kat] --
3,772,288 UART: [cold-reset] ++
3,773,936 UART: [fht] FHT @ 0x50003400
3,785,915 UART: [idev] ++
3,786,479 UART: [idev] CDI.KEYID = 6
3,787,508 UART: [idev] SUBJECT.KEYID = 7
3,788,680 UART: [idev] UDS.KEYID = 0
3,789,749 ready_for_fw is high
3,789,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,789 UART: [idev] Erasing UDS.KEYID = 0
6,266,130 UART: [idev] Sha1 KeyId Algorithm
6,288,704 UART: [idev] --
6,293,867 UART: [ldev] ++
6,294,436 UART: [ldev] CDI.KEYID = 6
6,295,452 UART: [ldev] SUBJECT.KEYID = 5
6,296,556 UART: [ldev] AUTHORITY.KEYID = 7
6,297,846 UART: [ldev] FE.KEYID = 1
6,310,486 UART: [ldev] Erasing FE.KEYID = 1
8,792,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,332 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,530,115 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,545,982 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,561,704 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,583,048 UART: [ldev] --
10,588,962 UART: [fwproc] Wait for Commands...
10,591,490 UART: [fwproc] Recv command 0x46574c44
10,593,470 UART: [fwproc] Recv'd Img size: 118548 bytes
14,102,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,617 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,257,631 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,586,000 >>> mbox cmd response: success
14,590,765 UART: [afmc] ++
14,591,377 UART: [afmc] CDI.KEYID = 6
14,592,349 UART: [afmc] SUBJECT.KEYID = 7
14,593,560 UART: [afmc] AUTHORITY.KEYID = 5
17,100,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,823,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,825,432 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
18,841,309 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
18,857,338 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
18,872,992 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
18,898,727 UART: [afmc] --
18,902,684 UART: [cold-reset] --
18,907,566 UART: [state] Locking Datavault
18,914,915 UART: [state] Locking PCR0, PCR1 and PCR31
18,916,614 UART: [state] Locking ICCM
18,917,871 UART: [exit] Launching FMC @ 0x40000130
18,926,262 UART:
18,926,493 UART: Running Caliptra FMC ...
18,927,522 UART:
18,927,666 UART: [state] CFI Enabled
18,936,132 UART: [fht] FMC Alias Private Key: 7
20,701,707 UART: [art] Extend RT PCRs Done
20,702,928 UART: [art] Lock RT PCRs Done
20,704,797 UART: [art] Populate DV Done
20,710,169 UART: [fht] FMC Alias Private Key: 7
20,711,758 UART: [art] Derive CDI
20,712,488 UART: [art] Store in slot 0x4
20,755,286 UART: [art] Derive Key Pair
20,756,276 UART: [art] Store priv key in slot 0x5
23,183,147 UART: [art] Derive Key Pair - Done
23,196,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,902,685 UART: [art] Erasing AUTHORITY.KEYID = 7
24,904,183 UART: [art] PUB.X = 031283D82EE8F6091041598BC8373AC54F1B27292D06DCD2130A63207B0AE25C752957A439405F4290E3CF94D8C2BFD7
24,911,427 UART: [art] PUB.Y = 7F82721AA167BFF1D8A30A9B131BB5C30B29B691B861B3170ACEE8B61CF477DD176C909A213896598B839815F0C68FDA
24,918,659 UART: [art] SIG.R = 77251E521F3285BE186AE865E43067EF450A042ADFCF4C41038BF3EF9808AAF2A06262F6778D469381552314F87218F8
24,926,043 UART: [art] SIG.S = 3D7CBBE98058AF9BBE9D17E8617A5A5716940CB7F0E5D28846B2287FF95CF41DBDCBEB8A902E9DBB32C5FEE865FAADA0
25,905,085 UART: Caliptra RT
25,905,777 UART: [state] CFI Enabled
26,038,702 UART: [rt] RT listening for mailbox commands...
26,040,537 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,070,374 UART: [rt]cmd =0x46505652, len=4
26,071,653 UART: [rt] FIPS Version
26,073,083 >>> mbox cmd response data (36 bytes)
300 writing to cptra_bootfsm_go
605 UART:
755 UART: Running Caliptra ROM ...
1,842 UART:
14,458,880 UART: [state] CFI Enabled
14,472,564 UART: [state] LifecycleState = Production
14,474,365 UART: [state] DebugLocked = Yes
14,476,947 UART: [state] Starting the WD Timer 40000000 cycles
14,481,672 UART: [kat] SHA2-256
14,661,362 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,672,146 UART: [kat] ++
14,672,599 UART: [kat] sha1
14,682,233 UART: [kat] SHA2-256
14,684,933 UART: [kat] SHA2-384
14,691,510 UART: [kat] SHA2-512-ACC
14,693,855 UART: [kat] ECC-384
17,134,101 UART: [kat] HMAC-384Kdf
17,146,379 UART: [kat] LMS
17,622,898 UART: [kat] --
17,626,583 UART: [warm-reset] ++
17,631,378 UART: [warm-reset] --
17,634,921 UART: [state] Locking Datavault
17,639,407 UART: [state] Locking PCR0, PCR1 and PCR31
17,641,155 UART: [state] Locking ICCM
17,643,271 UART: [exit] Launching FMC @ 0x40000130
17,651,659 UART:
17,651,896 UART: Running Caliptra FMC ...
17,652,917 UART:
17,653,060 UART: [state] CFI Enabled
17,655,064 UART: [art] Skip pcr extension
17,656,203 UART: [art] Extend RT PCRs Done
17,657,266 UART: [art] Lock RT PCRs Done
17,658,812 UART: [art] Populate DV Done
17,664,591 UART: [fht] FMC Alias Private Key: 7
17,666,229 UART: [art] Derive CDI
17,666,958 UART: [art] Store in slot 0x4
17,709,865 UART: [art] Derive Key Pair
17,710,858 UART: [art] Store priv key in slot 0x5
20,137,779 UART: [art] Derive Key Pair - Done
20,150,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,856,490 UART: [art] Erasing AUTHORITY.KEYID = 7
21,857,994 UART: [art] PUB.X = 031283D82EE8F6091041598BC8373AC54F1B27292D06DCD2130A63207B0AE25C752957A439405F4290E3CF94D8C2BFD7
21,865,254 UART: [art] PUB.Y = 7F82721AA167BFF1D8A30A9B131BB5C30B29B691B861B3170ACEE8B61CF477DD176C909A213896598B839815F0C68FDA
21,872,513 UART: [art] SIG.R = 77251E521F3285BE186AE865E43067EF450A042ADFCF4C41038BF3EF9808AAF2A06262F6778D469381552314F87218F8
21,879,829 UART: [art] SIG.S = 3D7CBBE98058AF9BBE9D17E8617A5A5716940CB7F0E5D28846B2287FF95CF41DBDCBEB8A902E9DBB32C5FEE865FAADA0
22,858,005 UART: Caliptra RT
22,858,702 UART: [state] CFI Enabled
23,232,933 UART: [rt] RT listening for mailbox commands...
23,234,765 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,264,638 UART: [rt]cmd =0x46505652, len=4
23,265,917 UART: [rt] FIPS Version
23,267,295 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
191,873 UART:
192,225 UART: Running Caliptra ROM ...
193,325 UART:
602,943 UART: [state] CFI Enabled
615,742 UART: [state] LifecycleState = Production
617,519 UART: [state] DebugLocked = Yes
620,559 UART: [state] Starting the WD Timer 40000000 cycles
625,332 UART: [kat] SHA2-256
804,995 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,751 UART: [kat] ++
816,192 UART: [kat] sha1
827,381 UART: [kat] SHA2-256
830,052 UART: [kat] SHA2-384
836,406 UART: [kat] SHA2-512-ACC
838,767 UART: [kat] ECC-384
3,282,729 UART: [kat] HMAC-384Kdf
3,294,642 UART: [kat] LMS
3,771,140 UART: [kat] --
3,777,858 UART: [cold-reset] ++
3,778,871 UART: [fht] FHT @ 0x50003400
3,788,713 UART: [idev] ++
3,789,357 UART: [idev] CDI.KEYID = 6
3,790,285 UART: [idev] SUBJECT.KEYID = 7
3,791,525 UART: [idev] UDS.KEYID = 0
3,792,445 ready_for_fw is high
3,792,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,545 UART: [idev] Erasing UDS.KEYID = 0
6,269,227 UART: [idev] Sha1 KeyId Algorithm
6,292,364 UART: [idev] --
6,297,115 UART: [ldev] ++
6,297,684 UART: [ldev] CDI.KEYID = 6
6,298,591 UART: [ldev] SUBJECT.KEYID = 5
6,299,800 UART: [ldev] AUTHORITY.KEYID = 7
6,301,293 UART: [ldev] FE.KEYID = 1
6,312,595 UART: [ldev] Erasing FE.KEYID = 1
8,793,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,769 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,528,594 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,544,436 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,560,176 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,580,351 UART: [ldev] --
10,585,514 UART: [fwproc] Wait for Commands...
10,587,286 UART: [fwproc] Recv command 0x46574c44
10,589,323 UART: [fwproc] Recv'd Img size: 118548 bytes
14,107,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,441 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,260,485 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,589,226 >>> mbox cmd response: success
14,593,178 UART: [afmc] ++
14,593,786 UART: [afmc] CDI.KEYID = 6
14,594,672 UART: [afmc] SUBJECT.KEYID = 7
14,595,942 UART: [afmc] AUTHORITY.KEYID = 5
17,108,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,832,727 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,834,908 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
18,850,803 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
18,866,833 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
18,882,515 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
18,906,878 UART: [afmc] --
18,909,809 UART: [cold-reset] --
18,912,718 UART: [state] Locking Datavault
18,916,882 UART: [state] Locking PCR0, PCR1 and PCR31
18,918,631 UART: [state] Locking ICCM
18,920,019 UART: [exit] Launching FMC @ 0x40000130
18,928,417 UART:
18,928,657 UART: Running Caliptra FMC ...
18,929,759 UART:
18,929,919 UART: [state] CFI Enabled
18,938,071 UART: [fht] FMC Alias Private Key: 7
20,704,000 UART: [art] Extend RT PCRs Done
20,705,233 UART: [art] Lock RT PCRs Done
20,706,961 UART: [art] Populate DV Done
20,712,419 UART: [fht] FMC Alias Private Key: 7
20,713,907 UART: [art] Derive CDI
20,714,665 UART: [art] Store in slot 0x4
20,757,305 UART: [art] Derive Key Pair
20,758,324 UART: [art] Store priv key in slot 0x5
23,184,725 UART: [art] Derive Key Pair - Done
23,197,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,903,989 UART: [art] Erasing AUTHORITY.KEYID = 7
24,905,498 UART: [art] PUB.X = F2EE81E3C155B684156D7007ADEC73D9ADD8B60F06F4A50B3B7EEED2C526C2BA69619B2463239C2E3BFB3BE69606676B
24,912,811 UART: [art] PUB.Y = 96B89DC220FE87E442A109FFE898165642DB01B05F82E24979F7C50BEDFCE63B2FEC208E0F057473787B4F74A6A19E2B
24,920,048 UART: [art] SIG.R = 3C97B1FD76BB0AC16C6864D32E49D23F073450C874DF37C65BAB411AEC967A4AC6B04937C94DEF7DFE317412B69058C9
24,927,455 UART: [art] SIG.S = 14C728289C1F1F9FA812466A881B1F5E750179772BE53726CB826BCD7141E5BD54DA1EC1F34D3F6E27656B7CEC8F1702
25,906,101 UART: Caliptra RT
25,906,800 UART: [state] CFI Enabled
26,040,683 UART: [rt] RT listening for mailbox commands...
26,042,523 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,072,284 UART: [rt]cmd =0x46505652, len=4
26,073,561 UART: [rt] FIPS Version
26,074,941 >>> mbox cmd response data (36 bytes)
291 writing to cptra_bootfsm_go
516 UART:
663 UART: Running Caliptra ROM ...
1,766 UART:
14,459,479 UART: [state] CFI Enabled
14,475,855 UART: [state] LifecycleState = Production
14,477,689 UART: [state] DebugLocked = Yes
14,480,031 UART: [state] Starting the WD Timer 40000000 cycles
14,484,543 UART: [kat] SHA2-256
14,664,241 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,675,004 UART: [kat] ++
14,675,458 UART: [kat] sha1
14,687,144 UART: [kat] SHA2-256
14,689,883 UART: [kat] SHA2-384
14,695,649 UART: [kat] SHA2-512-ACC
14,698,044 UART: [kat] ECC-384
17,140,136 UART: [kat] HMAC-384Kdf
17,151,362 UART: [kat] LMS
17,627,827 UART: [kat] --
17,632,248 UART: [warm-reset] ++
17,636,818 UART: [warm-reset] --
17,640,239 UART: [state] Locking Datavault
17,643,597 UART: [state] Locking PCR0, PCR1 and PCR31
17,645,345 UART: [state] Locking ICCM
17,647,082 UART: [exit] Launching FMC @ 0x40000130
17,655,469 UART:
17,655,694 UART: Running Caliptra FMC ...
17,656,714 UART:
17,656,855 UART: [state] CFI Enabled
17,658,955 UART: [art] Skip pcr extension
17,660,051 UART: [art] Extend RT PCRs Done
17,661,108 UART: [art] Lock RT PCRs Done
17,662,324 UART: [art] Populate DV Done
17,667,972 UART: [fht] FMC Alias Private Key: 7
17,669,493 UART: [art] Derive CDI
17,670,235 UART: [art] Store in slot 0x4
17,713,304 UART: [art] Derive Key Pair
17,714,302 UART: [art] Store priv key in slot 0x5
20,141,231 UART: [art] Derive Key Pair - Done
20,153,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,860,082 UART: [art] Erasing AUTHORITY.KEYID = 7
21,861,596 UART: [art] PUB.X = F2EE81E3C155B684156D7007ADEC73D9ADD8B60F06F4A50B3B7EEED2C526C2BA69619B2463239C2E3BFB3BE69606676B
21,868,848 UART: [art] PUB.Y = 96B89DC220FE87E442A109FFE898165642DB01B05F82E24979F7C50BEDFCE63B2FEC208E0F057473787B4F74A6A19E2B
21,876,138 UART: [art] SIG.R = 3C97B1FD76BB0AC16C6864D32E49D23F073450C874DF37C65BAB411AEC967A4AC6B04937C94DEF7DFE317412B69058C9
21,883,525 UART: [art] SIG.S = 14C728289C1F1F9FA812466A881B1F5E750179772BE53726CB826BCD7141E5BD54DA1EC1F34D3F6E27656B7CEC8F1702
22,862,403 UART: Caliptra RT
22,863,095 UART: [state] CFI Enabled
23,233,917 UART: [rt] RT listening for mailbox commands...
23,235,775 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,265,694 UART: [rt]cmd =0x46505652, len=4
23,266,970 UART: [rt] FIPS Version
23,268,179 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,727 UART: [state] LifecycleState = Production
86,335 UART: [state] DebugLocked = Yes
86,979 UART: [state] Starting the WD Timer 40000000 cycles
88,452 UART: [kat] SHA2-256
892,002 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,106 UART: [kat] ++
896,258 UART: [kat] sha1
900,470 UART: [kat] SHA2-256
902,410 UART: [kat] SHA2-384
905,109 UART: [kat] SHA2-512-ACC
907,010 UART: [kat] ECC-384
916,413 UART: [kat] HMAC-384Kdf
920,875 UART: [kat] LMS
1,169,187 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,599 UART: [fht] FHT @ 0x50003400
1,173,359 UART: [idev] ++
1,173,527 UART: [idev] CDI.KEYID = 6
1,173,888 UART: [idev] SUBJECT.KEYID = 7
1,174,313 UART: [idev] UDS.KEYID = 0
1,174,659 ready_for_fw is high
1,174,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,329 UART: [idev] Erasing UDS.KEYID = 0
1,199,668 UART: [idev] Sha1 KeyId Algorithm
1,208,493 UART: [idev] --
1,209,500 UART: [ldev] ++
1,209,668 UART: [ldev] CDI.KEYID = 6
1,210,032 UART: [ldev] SUBJECT.KEYID = 5
1,210,459 UART: [ldev] AUTHORITY.KEYID = 7
1,210,922 UART: [ldev] FE.KEYID = 1
1,216,164 UART: [ldev] Erasing FE.KEYID = 1
1,242,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,905 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,599 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,469 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,175 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,211 UART: [ldev] --
1,281,570 UART: [fwproc] Wait for Commands...
1,282,207 UART: [fwproc] Recv command 0x46574c44
1,282,940 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,633 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,808 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,106 >>> mbox cmd response: success
2,851,193 UART: [afmc] ++
2,851,361 UART: [afmc] CDI.KEYID = 6
2,851,724 UART: [afmc] SUBJECT.KEYID = 7
2,852,150 UART: [afmc] AUTHORITY.KEYID = 5
2,887,681 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,018 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,767 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,910,479 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,916,368 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,922,075 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,929,733 UART: [afmc] --
2,930,727 UART: [cold-reset] --
2,931,569 UART: [state] Locking Datavault
2,932,630 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,234 UART: [state] Locking ICCM
2,933,690 UART: [exit] Launching FMC @ 0x40000130
2,939,020 UART:
2,939,036 UART: Running Caliptra FMC ...
2,939,444 UART:
2,939,498 UART: [state] CFI Enabled
2,949,772 UART: [fht] FMC Alias Private Key: 7
3,068,166 UART: [art] Extend RT PCRs Done
3,068,594 UART: [art] Lock RT PCRs Done
3,070,304 UART: [art] Populate DV Done
3,078,262 UART: [fht] FMC Alias Private Key: 7
3,079,248 UART: [art] Derive CDI
3,079,528 UART: [art] Store in slot 0x4
3,165,094 UART: [art] Derive Key Pair
3,165,454 UART: [art] Store priv key in slot 0x5
3,178,857 UART: [art] Derive Key Pair - Done
3,193,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,209,886 UART: [art] PUB.X = 7D0757D8278A0F7EE1B36C11DFCFBEF4325EB802B03DB8B8E13965CFD33F6E406816377555C85EF4BC691832D8644E5A
3,216,655 UART: [art] PUB.Y = 8A9E0EBC05FFFACECEE15E93D44F753D0E059C0B95CEED26CB15A7EF0866455C66082F5FEC071BFC647146813B3FC46E
3,223,603 UART: [art] SIG.R = F4B0A87572D7D0B504710A01653D9CFB9E851A70E1415F8A7172C0F168E8D752B6331D598DA6FA971EF8714A7EDC4F14
3,230,368 UART: [art] SIG.S = 4756D558F2BEEB745316E8BCFA1DCCCA59399AF003CF240265135C8961D0B7F449C3EE2ECC8FBC2853AEA846C9D0620E
3,254,161 UART: Caliptra RT
3,254,412 UART: [state] CFI Enabled
3,374,034 UART: [rt] RT listening for mailbox commands...
3,374,697 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,404,375 UART: [rt]cmd =0x46505652, len=4
3,405,035 UART: [rt] FIPS Version
3,406,254 >>> mbox cmd response data (36 bytes)
3,406,256 writing to cptra_bootfsm_go
3,406,348 UART:
3,406,364 UART: Running Caliptra ROM ...
3,406,772 UART:
3,406,827 UART: [state] CFI Enabled
3,409,002 UART: [state] LifecycleState = Production
3,409,610 UART: [state] DebugLocked = Yes
3,410,146 UART: [state] Starting the WD Timer 40000000 cycles
3,411,811 UART: [kat] SHA2-256
4,215,361 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,219,465 UART: [kat] ++
4,219,617 UART: [kat] sha1
4,223,765 UART: [kat] SHA2-256
4,225,705 UART: [kat] SHA2-384
4,228,374 UART: [kat] SHA2-512-ACC
4,230,275 UART: [kat] ECC-384
4,239,968 UART: [kat] HMAC-384Kdf
4,244,598 UART: [kat] LMS
4,492,910 UART: [kat] --
4,493,746 UART: [warm-reset] ++
4,494,599 UART: [warm-reset] --
4,495,282 UART: [state] Locking Datavault
4,495,924 UART: [state] Locking PCR0, PCR1 and PCR31
4,496,528 UART: [state] Locking ICCM
4,497,108 UART: [exit] Launching FMC @ 0x40000130
4,502,438 UART:
4,502,454 UART: Running Caliptra FMC ...
4,502,862 UART:
4,502,916 UART: [state] CFI Enabled
4,504,113 UART: [art] Skip pcr extension
4,504,522 UART: [art] Extend RT PCRs Done
4,504,950 UART: [art] Lock RT PCRs Done
4,505,975 UART: [art] Populate DV Done
4,514,505 UART: [fht] FMC Alias Private Key: 7
4,515,617 UART: [art] Derive CDI
4,515,897 UART: [art] Store in slot 0x4
4,601,751 UART: [art] Derive Key Pair
4,602,111 UART: [art] Store priv key in slot 0x5
4,615,058 UART: [art] Derive Key Pair - Done
4,629,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,645,014 UART: [art] Erasing AUTHORITY.KEYID = 7
4,645,779 UART: [art] PUB.X = 7D0757D8278A0F7EE1B36C11DFCFBEF4325EB802B03DB8B8E13965CFD33F6E406816377555C85EF4BC691832D8644E5A
4,652,548 UART: [art] PUB.Y = 8A9E0EBC05FFFACECEE15E93D44F753D0E059C0B95CEED26CB15A7EF0866455C66082F5FEC071BFC647146813B3FC46E
4,659,496 UART: [art] SIG.R = F4B0A87572D7D0B504710A01653D9CFB9E851A70E1415F8A7172C0F168E8D752B6331D598DA6FA971EF8714A7EDC4F14
4,666,261 UART: [art] SIG.S = 4756D558F2BEEB745316E8BCFA1DCCCA59399AF003CF240265135C8961D0B7F449C3EE2ECC8FBC2853AEA846C9D0620E
4,689,700 UART: Caliptra RT
4,689,951 UART: [state] CFI Enabled
5,056,030 UART: [rt] RT listening for mailbox commands...
5,056,693 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,073,299 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,103,566 UART: [rt]cmd =0x46505652, len=4
5,104,226 UART: [rt] FIPS Version
5,105,159 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,947 UART: [state] LifecycleState = Production
85,555 UART: [state] DebugLocked = Yes
86,197 UART: [state] Starting the WD Timer 40000000 cycles
87,850 UART: [kat] SHA2-256
891,400 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,504 UART: [kat] ++
895,656 UART: [kat] sha1
899,922 UART: [kat] SHA2-256
901,862 UART: [kat] SHA2-384
904,545 UART: [kat] SHA2-512-ACC
906,446 UART: [kat] ECC-384
916,039 UART: [kat] HMAC-384Kdf
920,705 UART: [kat] LMS
1,169,017 UART: [kat] --
1,169,982 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,172,969 UART: [idev] ++
1,173,137 UART: [idev] CDI.KEYID = 6
1,173,498 UART: [idev] SUBJECT.KEYID = 7
1,173,923 UART: [idev] UDS.KEYID = 0
1,174,269 ready_for_fw is high
1,174,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,135 UART: [idev] Erasing UDS.KEYID = 0
1,198,684 UART: [idev] Sha1 KeyId Algorithm
1,207,485 UART: [idev] --
1,208,508 UART: [ldev] ++
1,208,676 UART: [ldev] CDI.KEYID = 6
1,209,040 UART: [ldev] SUBJECT.KEYID = 5
1,209,467 UART: [ldev] AUTHORITY.KEYID = 7
1,209,930 UART: [ldev] FE.KEYID = 1
1,215,154 UART: [ldev] Erasing FE.KEYID = 1
1,241,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,163 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,857 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,727 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,433 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,367 UART: [ldev] --
1,280,790 UART: [fwproc] Wait for Commands...
1,281,553 UART: [fwproc] Recv command 0x46574c44
1,282,286 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,421 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,596 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,849,828 >>> mbox cmd response: success
2,850,979 UART: [afmc] ++
2,851,147 UART: [afmc] CDI.KEYID = 6
2,851,510 UART: [afmc] SUBJECT.KEYID = 7
2,851,936 UART: [afmc] AUTHORITY.KEYID = 5
2,887,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,539 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,910,251 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,916,140 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,921,847 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,929,721 UART: [afmc] --
2,930,669 UART: [cold-reset] --
2,931,545 UART: [state] Locking Datavault
2,932,632 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,236 UART: [state] Locking ICCM
2,933,666 UART: [exit] Launching FMC @ 0x40000130
2,938,996 UART:
2,939,012 UART: Running Caliptra FMC ...
2,939,420 UART:
2,939,474 UART: [state] CFI Enabled
2,950,012 UART: [fht] FMC Alias Private Key: 7
3,068,606 UART: [art] Extend RT PCRs Done
3,069,034 UART: [art] Lock RT PCRs Done
3,070,592 UART: [art] Populate DV Done
3,078,744 UART: [fht] FMC Alias Private Key: 7
3,079,838 UART: [art] Derive CDI
3,080,118 UART: [art] Store in slot 0x4
3,166,186 UART: [art] Derive Key Pair
3,166,546 UART: [art] Store priv key in slot 0x5
3,179,861 UART: [art] Derive Key Pair - Done
3,194,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,179 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,944 UART: [art] PUB.X = 0C516418B43D4B329FBF504D74D9CE04737AF422C151445F52349485E03B9A48ADD849BE124C94C30B46D63ABA206931
3,217,703 UART: [art] PUB.Y = BFF5ED424F614543D78C30D4C589FE9C0A89D3AD732C069EB921A2A4F23264DA22B633C7C0A30C9D0A3B45A736A529A9
3,224,651 UART: [art] SIG.R = 9406A5C3B20C50434B6CEDEF67A25A4BA6A2011BF3BF83CA7C317EDD29F446D7955C91A6A7F6EC6C7EA90EF075DE7D7B
3,231,431 UART: [art] SIG.S = 9EF38636A94DDDEB16B36177B70A2FEB0B97B57001728F4A2082E34EF20EAA327F1559925BA3D5C6A3BDBEADB0D751FD
3,255,101 UART: Caliptra RT
3,255,352 UART: [state] CFI Enabled
3,375,909 UART: [rt] RT listening for mailbox commands...
3,376,572 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,224 UART: [rt]cmd =0x46505652, len=4
3,406,884 UART: [rt] FIPS Version
3,408,083 >>> mbox cmd response data (36 bytes)
3,408,085 writing to cptra_bootfsm_go
3,408,177 UART:
3,408,193 UART: Running Caliptra ROM ...
3,408,601 UART:
3,408,656 UART: [state] CFI Enabled
3,411,371 UART: [state] LifecycleState = Production
3,411,979 UART: [state] DebugLocked = Yes
3,412,531 UART: [state] Starting the WD Timer 40000000 cycles
3,414,242 UART: [kat] SHA2-256
4,217,792 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,221,896 UART: [kat] ++
4,222,048 UART: [kat] sha1
4,226,200 UART: [kat] SHA2-256
4,228,140 UART: [kat] SHA2-384
4,231,009 UART: [kat] SHA2-512-ACC
4,232,910 UART: [kat] ECC-384
4,242,781 UART: [kat] HMAC-384Kdf
4,247,369 UART: [kat] LMS
4,495,681 UART: [kat] --
4,496,641 UART: [warm-reset] ++
4,497,570 UART: [warm-reset] --
4,498,483 UART: [state] Locking Datavault
4,499,271 UART: [state] Locking PCR0, PCR1 and PCR31
4,499,875 UART: [state] Locking ICCM
4,500,409 UART: [exit] Launching FMC @ 0x40000130
4,505,739 UART:
4,505,755 UART: Running Caliptra FMC ...
4,506,163 UART:
4,506,217 UART: [state] CFI Enabled
4,507,492 UART: [art] Skip pcr extension
4,507,901 UART: [art] Extend RT PCRs Done
4,508,329 UART: [art] Lock RT PCRs Done
4,509,478 UART: [art] Populate DV Done
4,517,632 UART: [fht] FMC Alias Private Key: 7
4,518,732 UART: [art] Derive CDI
4,519,012 UART: [art] Store in slot 0x4
4,604,588 UART: [art] Derive Key Pair
4,604,948 UART: [art] Store priv key in slot 0x5
4,618,279 UART: [art] Derive Key Pair - Done
4,632,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,648,629 UART: [art] Erasing AUTHORITY.KEYID = 7
4,649,394 UART: [art] PUB.X = 0C516418B43D4B329FBF504D74D9CE04737AF422C151445F52349485E03B9A48ADD849BE124C94C30B46D63ABA206931
4,656,153 UART: [art] PUB.Y = BFF5ED424F614543D78C30D4C589FE9C0A89D3AD732C069EB921A2A4F23264DA22B633C7C0A30C9D0A3B45A736A529A9
4,663,101 UART: [art] SIG.R = 9406A5C3B20C50434B6CEDEF67A25A4BA6A2011BF3BF83CA7C317EDD29F446D7955C91A6A7F6EC6C7EA90EF075DE7D7B
4,669,881 UART: [art] SIG.S = 9EF38636A94DDDEB16B36177B70A2FEB0B97B57001728F4A2082E34EF20EAA327F1559925BA3D5C6A3BDBEADB0D751FD
4,693,569 UART: Caliptra RT
4,693,820 UART: [state] CFI Enabled
5,061,130 UART: [rt] RT listening for mailbox commands...
5,061,793 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,078,701 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,808 UART: [rt]cmd =0x46505652, len=4
5,109,468 UART: [rt] FIPS Version
5,110,635 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Production
86,008 UART: [state] DebugLocked = Yes
86,572 UART: [state] Starting the WD Timer 40000000 cycles
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,105 UART: [kat] SHA2-256
902,045 UART: [kat] SHA2-384
904,920 UART: [kat] SHA2-512-ACC
906,821 UART: [kat] ECC-384
916,732 UART: [kat] HMAC-384Kdf
921,320 UART: [kat] LMS
1,169,632 UART: [kat] --
1,170,223 UART: [cold-reset] ++
1,170,678 UART: [fht] FHT @ 0x50003400
1,173,360 UART: [idev] ++
1,173,528 UART: [idev] CDI.KEYID = 6
1,173,889 UART: [idev] SUBJECT.KEYID = 7
1,174,314 UART: [idev] UDS.KEYID = 0
1,174,660 ready_for_fw is high
1,174,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,199,963 UART: [idev] Sha1 KeyId Algorithm
1,208,626 UART: [idev] --
1,209,697 UART: [ldev] ++
1,209,865 UART: [ldev] CDI.KEYID = 6
1,210,229 UART: [ldev] SUBJECT.KEYID = 5
1,210,656 UART: [ldev] AUTHORITY.KEYID = 7
1,211,119 UART: [ldev] FE.KEYID = 1
1,216,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,802 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,496 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,366 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,072 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,054 UART: [ldev] --
1,281,393 UART: [fwproc] Wait for Commands...
1,282,012 UART: [fwproc] Recv command 0x46574c44
1,282,745 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,672 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,847 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,189 >>> mbox cmd response: success
2,853,374 UART: [afmc] ++
2,853,542 UART: [afmc] CDI.KEYID = 6
2,853,905 UART: [afmc] SUBJECT.KEYID = 7
2,854,331 UART: [afmc] AUTHORITY.KEYID = 5
2,890,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,906,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,907,438 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,913,150 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,919,039 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,924,746 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,932,372 UART: [afmc] --
2,933,366 UART: [cold-reset] --
2,934,198 UART: [state] Locking Datavault
2,935,481 UART: [state] Locking PCR0, PCR1 and PCR31
2,936,085 UART: [state] Locking ICCM
2,936,647 UART: [exit] Launching FMC @ 0x40000130
2,941,977 UART:
2,941,993 UART: Running Caliptra FMC ...
2,942,401 UART:
2,942,544 UART: [state] CFI Enabled
2,953,352 UART: [fht] FMC Alias Private Key: 7
3,072,234 UART: [art] Extend RT PCRs Done
3,072,662 UART: [art] Lock RT PCRs Done
3,074,328 UART: [art] Populate DV Done
3,082,552 UART: [fht] FMC Alias Private Key: 7
3,083,512 UART: [art] Derive CDI
3,083,792 UART: [art] Store in slot 0x4
3,169,424 UART: [art] Derive Key Pair
3,169,784 UART: [art] Store priv key in slot 0x5
3,183,495 UART: [art] Derive Key Pair - Done
3,198,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,213,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,129 UART: [art] PUB.X = 63C477906ED3E05CA498A339B1E6EBE7215BF3792B4B05A90AA788342CCACAE70116842043A08736B3547EEF1D3F500B
3,220,891 UART: [art] PUB.Y = 3CDEE96472F61A7E0128D7FCA4E7687B19EF358AC142A03AC6E881B7DDDDA7CA18582DFB85AC8ED63ACA4C801DD5E905
3,227,859 UART: [art] SIG.R = A8EF7C42DB7784560FEF3C02ED2ABABD9353E07BE7C3D70844D01BC956FE1230D838DA8DA7286A538B2B403DC57AD066
3,234,636 UART: [art] SIG.S = 6663B257144BDF068E71F6187372EAD9FAADD0C4C38099A3CDB90F60B06B14FFD07187D10EFC62234940ACCF5CB31D74
3,258,023 UART: Caliptra RT
3,258,366 UART: [state] CFI Enabled
3,378,408 UART: [rt] RT listening for mailbox commands...
3,379,071 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,401 UART: [rt]cmd =0x46505652, len=4
3,410,061 UART: [rt] FIPS Version
3,411,188 >>> mbox cmd response data (36 bytes)
3,411,190 writing to cptra_bootfsm_go
3,411,282 UART:
3,411,298 UART: Running Caliptra ROM ...
3,411,706 UART:
3,411,848 UART: [state] CFI Enabled
3,414,507 UART: [state] LifecycleState = Production
3,415,115 UART: [state] DebugLocked = Yes
3,415,625 UART: [state] Starting the WD Timer 40000000 cycles
3,417,168 UART: [kat] SHA2-256
4,220,718 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,224,822 UART: [kat] ++
4,224,974 UART: [kat] sha1
4,229,110 UART: [kat] SHA2-256
4,231,050 UART: [kat] SHA2-384
4,233,943 UART: [kat] SHA2-512-ACC
4,235,844 UART: [kat] ECC-384
4,245,871 UART: [kat] HMAC-384Kdf
4,250,421 UART: [kat] LMS
4,498,733 UART: [kat] --
4,499,403 UART: [warm-reset] ++
4,500,508 UART: [warm-reset] --
4,501,441 UART: [state] Locking Datavault
4,502,265 UART: [state] Locking PCR0, PCR1 and PCR31
4,502,869 UART: [state] Locking ICCM
4,503,327 UART: [exit] Launching FMC @ 0x40000130
4,508,657 UART:
4,508,673 UART: Running Caliptra FMC ...
4,509,081 UART:
4,509,224 UART: [state] CFI Enabled
4,510,933 UART: [art] Skip pcr extension
4,511,342 UART: [art] Extend RT PCRs Done
4,511,770 UART: [art] Lock RT PCRs Done
4,513,229 UART: [art] Populate DV Done
4,521,623 UART: [fht] FMC Alias Private Key: 7
4,522,621 UART: [art] Derive CDI
4,522,901 UART: [art] Store in slot 0x4
4,608,923 UART: [art] Derive Key Pair
4,609,283 UART: [art] Store priv key in slot 0x5
4,622,140 UART: [art] Derive Key Pair - Done
4,636,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,652,539 UART: [art] Erasing AUTHORITY.KEYID = 7
4,653,304 UART: [art] PUB.X = 63C477906ED3E05CA498A339B1E6EBE7215BF3792B4B05A90AA788342CCACAE70116842043A08736B3547EEF1D3F500B
4,660,066 UART: [art] PUB.Y = 3CDEE96472F61A7E0128D7FCA4E7687B19EF358AC142A03AC6E881B7DDDDA7CA18582DFB85AC8ED63ACA4C801DD5E905
4,667,034 UART: [art] SIG.R = A8EF7C42DB7784560FEF3C02ED2ABABD9353E07BE7C3D70844D01BC956FE1230D838DA8DA7286A538B2B403DC57AD066
4,673,811 UART: [art] SIG.S = 6663B257144BDF068E71F6187372EAD9FAADD0C4C38099A3CDB90F60B06B14FFD07187D10EFC62234940ACCF5CB31D74
4,697,816 UART: Caliptra RT
4,698,159 UART: [state] CFI Enabled
5,066,848 UART: [rt] RT listening for mailbox commands...
5,067,511 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,084,097 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,113,962 UART: [rt]cmd =0x46505652, len=4
5,114,622 UART: [rt] FIPS Version
5,115,715 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Production
85,854 UART: [state] DebugLocked = Yes
86,532 UART: [state] Starting the WD Timer 40000000 cycles
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,691 UART: [kat] ++
895,843 UART: [kat] sha1
900,099 UART: [kat] SHA2-256
902,039 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,372 UART: [kat] HMAC-384Kdf
920,802 UART: [kat] LMS
1,169,114 UART: [kat] --
1,169,795 UART: [cold-reset] ++
1,170,336 UART: [fht] FHT @ 0x50003400
1,172,914 UART: [idev] ++
1,173,082 UART: [idev] CDI.KEYID = 6
1,173,443 UART: [idev] SUBJECT.KEYID = 7
1,173,868 UART: [idev] UDS.KEYID = 0
1,174,214 ready_for_fw is high
1,174,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,437 UART: [idev] Sha1 KeyId Algorithm
1,208,342 UART: [idev] --
1,209,357 UART: [ldev] ++
1,209,525 UART: [ldev] CDI.KEYID = 6
1,209,889 UART: [ldev] SUBJECT.KEYID = 5
1,210,316 UART: [ldev] AUTHORITY.KEYID = 7
1,210,779 UART: [ldev] FE.KEYID = 1
1,215,681 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,824 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,518 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,388 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,094 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,968 UART: [ldev] --
1,281,243 UART: [fwproc] Wait for Commands...
1,282,056 UART: [fwproc] Recv command 0x46574c44
1,282,789 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,718 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,893 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,135 >>> mbox cmd response: success
2,851,216 UART: [afmc] ++
2,851,384 UART: [afmc] CDI.KEYID = 6
2,851,747 UART: [afmc] SUBJECT.KEYID = 7
2,852,173 UART: [afmc] AUTHORITY.KEYID = 5
2,888,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,512 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,224 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,917,113 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,922,820 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,930,614 UART: [afmc] --
2,931,574 UART: [cold-reset] --
2,932,552 UART: [state] Locking Datavault
2,933,707 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,311 UART: [state] Locking ICCM
2,934,969 UART: [exit] Launching FMC @ 0x40000130
2,940,299 UART:
2,940,315 UART: Running Caliptra FMC ...
2,940,723 UART:
2,940,866 UART: [state] CFI Enabled
2,951,526 UART: [fht] FMC Alias Private Key: 7
3,071,014 UART: [art] Extend RT PCRs Done
3,071,442 UART: [art] Lock RT PCRs Done
3,072,964 UART: [art] Populate DV Done
3,080,948 UART: [fht] FMC Alias Private Key: 7
3,081,936 UART: [art] Derive CDI
3,082,216 UART: [art] Store in slot 0x4
3,167,742 UART: [art] Derive Key Pair
3,168,102 UART: [art] Store priv key in slot 0x5
3,182,301 UART: [art] Derive Key Pair - Done
3,196,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,064 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,829 UART: [art] PUB.X = 94412AC6D89B388FA002FEFB165A3927B6A860C51089560FFA887E551435B27D11A160550E12F637653986C9FFE1487A
3,219,584 UART: [art] PUB.Y = 47049D457286B46BE04603EED836AEA36E0B88BD89C903FF93D49B562A402206BAB89738444183C116D132E47F5F825D
3,226,515 UART: [art] SIG.R = 6DA9940E666CB3F0B9F5DC22FD7BF6DE2C539FA7322255A12A1630C305D47024EDD6A7E80C515E5F487763DFE8DFACE0
3,233,292 UART: [art] SIG.S = 50982828E6C07C445317E16989B41E02E40264BCE4B89D474F462B55AF8EB1E5E56872A4D62EAD34F6C217059934C086
3,256,947 UART: Caliptra RT
3,257,290 UART: [state] CFI Enabled
3,377,074 UART: [rt] RT listening for mailbox commands...
3,377,737 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,431 UART: [rt]cmd =0x46505652, len=4
3,408,091 UART: [rt] FIPS Version
3,408,982 >>> mbox cmd response data (36 bytes)
3,408,984 writing to cptra_bootfsm_go
3,409,076 UART:
3,409,092 UART: Running Caliptra ROM ...
3,409,500 UART:
3,409,642 UART: [state] CFI Enabled
3,412,667 UART: [state] LifecycleState = Production
3,413,275 UART: [state] DebugLocked = Yes
3,413,901 UART: [state] Starting the WD Timer 40000000 cycles
3,415,412 UART: [kat] SHA2-256
4,218,962 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,223,066 UART: [kat] ++
4,223,218 UART: [kat] sha1
4,227,518 UART: [kat] SHA2-256
4,229,458 UART: [kat] SHA2-384
4,232,061 UART: [kat] SHA2-512-ACC
4,233,962 UART: [kat] ECC-384
4,243,775 UART: [kat] HMAC-384Kdf
4,248,615 UART: [kat] LMS
4,496,927 UART: [kat] --
4,497,781 UART: [warm-reset] ++
4,498,910 UART: [warm-reset] --
4,499,623 UART: [state] Locking Datavault
4,500,363 UART: [state] Locking PCR0, PCR1 and PCR31
4,500,967 UART: [state] Locking ICCM
4,501,469 UART: [exit] Launching FMC @ 0x40000130
4,506,799 UART:
4,506,815 UART: Running Caliptra FMC ...
4,507,223 UART:
4,507,366 UART: [state] CFI Enabled
4,508,883 UART: [art] Skip pcr extension
4,509,292 UART: [art] Extend RT PCRs Done
4,509,720 UART: [art] Lock RT PCRs Done
4,511,107 UART: [art] Populate DV Done
4,519,581 UART: [fht] FMC Alias Private Key: 7
4,520,549 UART: [art] Derive CDI
4,520,829 UART: [art] Store in slot 0x4
4,606,151 UART: [art] Derive Key Pair
4,606,511 UART: [art] Store priv key in slot 0x5
4,619,182 UART: [art] Derive Key Pair - Done
4,634,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,649,459 UART: [art] Erasing AUTHORITY.KEYID = 7
4,650,224 UART: [art] PUB.X = 94412AC6D89B388FA002FEFB165A3927B6A860C51089560FFA887E551435B27D11A160550E12F637653986C9FFE1487A
4,656,979 UART: [art] PUB.Y = 47049D457286B46BE04603EED836AEA36E0B88BD89C903FF93D49B562A402206BAB89738444183C116D132E47F5F825D
4,663,910 UART: [art] SIG.R = 6DA9940E666CB3F0B9F5DC22FD7BF6DE2C539FA7322255A12A1630C305D47024EDD6A7E80C515E5F487763DFE8DFACE0
4,670,687 UART: [art] SIG.S = 50982828E6C07C445317E16989B41E02E40264BCE4B89D474F462B55AF8EB1E5E56872A4D62EAD34F6C217059934C086
4,694,034 UART: Caliptra RT
4,694,377 UART: [state] CFI Enabled
5,061,396 UART: [rt] RT listening for mailbox commands...
5,062,059 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,079,155 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,109,144 UART: [rt]cmd =0x46505652, len=4
5,109,804 UART: [rt] FIPS Version
5,110,845 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,637 UART: [state] LifecycleState = Production
85,245 UART: [state] DebugLocked = Yes
85,957 UART: [state] Starting the WD Timer 40000000 cycles
87,604 UART: [kat] SHA2-256
891,154 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,258 UART: [kat] ++
895,410 UART: [kat] sha1
899,574 UART: [kat] SHA2-256
901,514 UART: [kat] SHA2-384
904,215 UART: [kat] SHA2-512-ACC
906,116 UART: [kat] ECC-384
915,923 UART: [kat] HMAC-384Kdf
920,365 UART: [kat] LMS
1,168,677 UART: [kat] --
1,169,396 UART: [cold-reset] ++
1,169,805 UART: [fht] FHT @ 0x50003400
1,172,475 UART: [idev] ++
1,172,643 UART: [idev] CDI.KEYID = 6
1,173,004 UART: [idev] SUBJECT.KEYID = 7
1,173,429 UART: [idev] UDS.KEYID = 0
1,173,775 ready_for_fw is high
1,173,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,153 UART: [idev] Erasing UDS.KEYID = 0
1,198,362 UART: [idev] Sha1 KeyId Algorithm
1,207,045 UART: [idev] --
1,208,126 UART: [ldev] ++
1,208,294 UART: [ldev] CDI.KEYID = 6
1,208,658 UART: [ldev] SUBJECT.KEYID = 5
1,209,085 UART: [ldev] AUTHORITY.KEYID = 7
1,209,548 UART: [ldev] FE.KEYID = 1
1,214,596 UART: [ldev] Erasing FE.KEYID = 1
1,240,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,779 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,259,473 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,343 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,049 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,199 UART: [ldev] --
1,279,508 UART: [fwproc] Wait for Commands...
1,280,149 UART: [fwproc] Recv command 0x46574c44
1,280,882 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,677,513 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,708,688 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,848,912 >>> mbox cmd response: success
2,849,971 UART: [afmc] ++
2,850,139 UART: [afmc] CDI.KEYID = 6
2,850,502 UART: [afmc] SUBJECT.KEYID = 7
2,850,928 UART: [afmc] AUTHORITY.KEYID = 5
2,886,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,902,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,903,747 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,909,459 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,915,348 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,921,055 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,928,779 UART: [afmc] --
2,929,767 UART: [cold-reset] --
2,930,555 UART: [state] Locking Datavault
2,931,702 UART: [state] Locking PCR0, PCR1 and PCR31
2,932,306 UART: [state] Locking ICCM
2,932,762 UART: [exit] Launching FMC @ 0x40000130
2,938,092 UART:
2,938,108 UART: Running Caliptra FMC ...
2,938,516 UART:
2,938,570 UART: [state] CFI Enabled
2,949,098 UART: [fht] FMC Alias Private Key: 7
3,067,778 UART: [art] Extend RT PCRs Done
3,068,206 UART: [art] Lock RT PCRs Done
3,069,746 UART: [art] Populate DV Done
3,077,762 UART: [fht] FMC Alias Private Key: 7
3,078,758 UART: [art] Derive CDI
3,079,038 UART: [art] Store in slot 0x4
3,164,579 UART: [art] Derive Key Pair
3,164,939 UART: [art] Store priv key in slot 0x5
3,178,247 UART: [art] Derive Key Pair - Done
3,192,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,208,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,208,967 UART: [art] PUB.X = 0A1B718367B50A265006AD02298C53F5073CFB24DD7E1CA3C451AAF75E4DA1869F78E268A01FEBBDF9F54D4038385494
3,215,728 UART: [art] PUB.Y = BB85B1F8AEF989F3CDEDE666F743C758B58E70B9197F48AD007AC9206E49FB8FDA21D5D2B0F5F667ABB7AE7EF451ACA5
3,222,682 UART: [art] SIG.R = FF897A18C0FC764DA0FC46A8411B01C61EA14075D0FF1B68C6731D29CDAC98376AFD4C486FA6D623CB3D4D83934B99D0
3,229,463 UART: [art] SIG.S = A44A6682CE071529DF76E95332CDD007D853EE8C9D7871D09C95AE5F229033E82F3485120FEE9781DD008901028947EB
3,253,176 UART: Caliptra RT
3,253,427 UART: [state] CFI Enabled
3,373,158 UART: [rt] RT listening for mailbox commands...
3,373,821 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,403,489 UART: [rt]cmd =0x46505652, len=4
3,404,149 UART: [rt] FIPS Version
3,405,072 >>> mbox cmd response data (36 bytes)
3,405,074 writing to cptra_bootfsm_go
3,405,166 UART:
3,405,182 UART: Running Caliptra ROM ...
3,405,590 UART:
3,405,645 UART: [state] CFI Enabled
3,408,526 UART: [state] LifecycleState = Production
3,409,134 UART: [state] DebugLocked = Yes
3,409,726 UART: [state] Starting the WD Timer 40000000 cycles
3,411,371 UART: [kat] SHA2-256
4,214,921 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,219,025 UART: [kat] ++
4,219,177 UART: [kat] sha1
4,223,463 UART: [kat] SHA2-256
4,225,403 UART: [kat] SHA2-384
4,228,086 UART: [kat] SHA2-512-ACC
4,229,987 UART: [kat] ECC-384
4,239,184 UART: [kat] HMAC-384Kdf
4,243,758 UART: [kat] LMS
4,492,070 UART: [kat] --
4,492,782 UART: [warm-reset] ++
4,493,887 UART: [warm-reset] --
4,494,930 UART: [state] Locking Datavault
4,495,774 UART: [state] Locking PCR0, PCR1 and PCR31
4,496,378 UART: [state] Locking ICCM
4,496,816 UART: [exit] Launching FMC @ 0x40000130
4,502,146 UART:
4,502,162 UART: Running Caliptra FMC ...
4,502,570 UART:
4,502,624 UART: [state] CFI Enabled
4,503,945 UART: [art] Skip pcr extension
4,504,354 UART: [art] Extend RT PCRs Done
4,504,782 UART: [art] Lock RT PCRs Done
4,505,965 UART: [art] Populate DV Done
4,514,225 UART: [fht] FMC Alias Private Key: 7
4,515,175 UART: [art] Derive CDI
4,515,455 UART: [art] Store in slot 0x4
4,601,206 UART: [art] Derive Key Pair
4,601,566 UART: [art] Store priv key in slot 0x5
4,614,630 UART: [art] Derive Key Pair - Done
4,629,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,644,837 UART: [art] Erasing AUTHORITY.KEYID = 7
4,645,602 UART: [art] PUB.X = 0A1B718367B50A265006AD02298C53F5073CFB24DD7E1CA3C451AAF75E4DA1869F78E268A01FEBBDF9F54D4038385494
4,652,363 UART: [art] PUB.Y = BB85B1F8AEF989F3CDEDE666F743C758B58E70B9197F48AD007AC9206E49FB8FDA21D5D2B0F5F667ABB7AE7EF451ACA5
4,659,317 UART: [art] SIG.R = FF897A18C0FC764DA0FC46A8411B01C61EA14075D0FF1B68C6731D29CDAC98376AFD4C486FA6D623CB3D4D83934B99D0
4,666,098 UART: [art] SIG.S = A44A6682CE071529DF76E95332CDD007D853EE8C9D7871D09C95AE5F229033E82F3485120FEE9781DD008901028947EB
4,690,429 UART: Caliptra RT
4,690,680 UART: [state] CFI Enabled
5,056,322 UART: [rt] RT listening for mailbox commands...
5,056,985 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,073,511 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,103,456 UART: [rt]cmd =0x46505652, len=4
5,104,116 UART: [rt] FIPS Version
5,105,321 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,913 UART: [state] LifecycleState = Production
85,521 UART: [state] DebugLocked = Yes
86,053 UART: [state] Starting the WD Timer 40000000 cycles
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,419 UART: [kat] SHA2-512-ACC
906,320 UART: [kat] ECC-384
915,849 UART: [kat] HMAC-384Kdf
920,647 UART: [kat] LMS
1,168,959 UART: [kat] --
1,169,580 UART: [cold-reset] ++
1,170,001 UART: [fht] FHT @ 0x50003400
1,172,803 UART: [idev] ++
1,172,971 UART: [idev] CDI.KEYID = 6
1,173,332 UART: [idev] SUBJECT.KEYID = 7
1,173,757 UART: [idev] UDS.KEYID = 0
1,174,103 ready_for_fw is high
1,174,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,539 UART: [idev] Erasing UDS.KEYID = 0
1,198,440 UART: [idev] Sha1 KeyId Algorithm
1,207,461 UART: [idev] --
1,208,418 UART: [ldev] ++
1,208,586 UART: [ldev] CDI.KEYID = 6
1,208,950 UART: [ldev] SUBJECT.KEYID = 5
1,209,377 UART: [ldev] AUTHORITY.KEYID = 7
1,209,840 UART: [ldev] FE.KEYID = 1
1,214,836 UART: [ldev] Erasing FE.KEYID = 1
1,240,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,447 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,141 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,011 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,717 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,623 UART: [ldev] --
1,279,902 UART: [fwproc] Wait for Commands...
1,280,659 UART: [fwproc] Recv command 0x46574c44
1,281,392 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,677,093 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,708,268 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,848,530 >>> mbox cmd response: success
2,849,737 UART: [afmc] ++
2,849,905 UART: [afmc] CDI.KEYID = 6
2,850,268 UART: [afmc] SUBJECT.KEYID = 7
2,850,694 UART: [afmc] AUTHORITY.KEYID = 5
2,886,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,902,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,903,589 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,909,301 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,915,190 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,920,897 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,928,631 UART: [afmc] --
2,929,665 UART: [cold-reset] --
2,930,629 UART: [state] Locking Datavault
2,931,928 UART: [state] Locking PCR0, PCR1 and PCR31
2,932,532 UART: [state] Locking ICCM
2,933,182 UART: [exit] Launching FMC @ 0x40000130
2,938,512 UART:
2,938,528 UART: Running Caliptra FMC ...
2,938,936 UART:
2,938,990 UART: [state] CFI Enabled
2,949,668 UART: [fht] FMC Alias Private Key: 7
3,067,668 UART: [art] Extend RT PCRs Done
3,068,096 UART: [art] Lock RT PCRs Done
3,069,558 UART: [art] Populate DV Done
3,077,586 UART: [fht] FMC Alias Private Key: 7
3,078,702 UART: [art] Derive CDI
3,078,982 UART: [art] Store in slot 0x4
3,164,829 UART: [art] Derive Key Pair
3,165,189 UART: [art] Store priv key in slot 0x5
3,178,943 UART: [art] Derive Key Pair - Done
3,193,494 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,332 UART: [art] PUB.X = 86D66D38D7530D056FDBF5D3867C0AA8AA9513260FFA04311AD4E5097841FF01496531002518232356E38D5E6FFDE365
3,217,055 UART: [art] PUB.Y = 314DBD5B778805E0779A622CAB17A138EC0C5464ED0B51EAD9697DE764885A3519E41469605EC77E1C40346BDD6CB219
3,223,998 UART: [art] SIG.R = 1CEE1FEBD0EDD603222AD491366678DCC27CEF4CB609AEAA06492B6EABC7F9FFF5FD9DD99085285C694EC2CF0C57372B
3,230,782 UART: [art] SIG.S = FE8FAF7D8269467BE1E1FCD2CD5576ACE7988C667D3AF6D01E322AB188FE15873582C0959387EA5F97883E8827D46972
3,254,808 UART: Caliptra RT
3,255,059 UART: [state] CFI Enabled
3,374,933 UART: [rt] RT listening for mailbox commands...
3,375,596 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,405,392 UART: [rt]cmd =0x46505652, len=4
3,406,052 UART: [rt] FIPS Version
3,407,209 >>> mbox cmd response data (36 bytes)
3,407,211 writing to cptra_bootfsm_go
3,407,303 UART:
3,407,319 UART: Running Caliptra ROM ...
3,407,727 UART:
3,407,782 UART: [state] CFI Enabled
3,410,601 UART: [state] LifecycleState = Production
3,411,209 UART: [state] DebugLocked = Yes
3,411,737 UART: [state] Starting the WD Timer 40000000 cycles
3,413,254 UART: [kat] SHA2-256
4,216,804 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,220,908 UART: [kat] ++
4,221,060 UART: [kat] sha1
4,225,354 UART: [kat] SHA2-256
4,227,294 UART: [kat] SHA2-384
4,230,069 UART: [kat] SHA2-512-ACC
4,231,970 UART: [kat] ECC-384
4,241,317 UART: [kat] HMAC-384Kdf
4,245,929 UART: [kat] LMS
4,494,241 UART: [kat] --
4,495,221 UART: [warm-reset] ++
4,496,166 UART: [warm-reset] --
4,497,105 UART: [state] Locking Datavault
4,497,855 UART: [state] Locking PCR0, PCR1 and PCR31
4,498,459 UART: [state] Locking ICCM
4,499,077 UART: [exit] Launching FMC @ 0x40000130
4,504,407 UART:
4,504,423 UART: Running Caliptra FMC ...
4,504,831 UART:
4,504,885 UART: [state] CFI Enabled
4,506,148 UART: [art] Skip pcr extension
4,506,557 UART: [art] Extend RT PCRs Done
4,506,985 UART: [art] Lock RT PCRs Done
4,508,216 UART: [art] Populate DV Done
4,516,474 UART: [fht] FMC Alias Private Key: 7
4,517,596 UART: [art] Derive CDI
4,517,876 UART: [art] Store in slot 0x4
4,604,075 UART: [art] Derive Key Pair
4,604,435 UART: [art] Store priv key in slot 0x5
4,617,395 UART: [art] Derive Key Pair - Done
4,631,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,647,079 UART: [art] Erasing AUTHORITY.KEYID = 7
4,647,844 UART: [art] PUB.X = 86D66D38D7530D056FDBF5D3867C0AA8AA9513260FFA04311AD4E5097841FF01496531002518232356E38D5E6FFDE365
4,654,567 UART: [art] PUB.Y = 314DBD5B778805E0779A622CAB17A138EC0C5464ED0B51EAD9697DE764885A3519E41469605EC77E1C40346BDD6CB219
4,661,510 UART: [art] SIG.R = 1CEE1FEBD0EDD603222AD491366678DCC27CEF4CB609AEAA06492B6EABC7F9FFF5FD9DD99085285C694EC2CF0C57372B
4,668,294 UART: [art] SIG.S = FE8FAF7D8269467BE1E1FCD2CD5576ACE7988C667D3AF6D01E322AB188FE15873582C0959387EA5F97883E8827D46972
4,691,824 UART: Caliptra RT
4,692,075 UART: [state] CFI Enabled
5,060,032 UART: [rt] RT listening for mailbox commands...
5,060,695 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,077,265 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,107,484 UART: [rt]cmd =0x46505652, len=4
5,108,144 UART: [rt] FIPS Version
5,109,149 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Production
86,010 UART: [state] DebugLocked = Yes
86,750 UART: [state] Starting the WD Timer 40000000 cycles
88,451 UART: [kat] SHA2-256
892,001 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,105 UART: [kat] ++
896,257 UART: [kat] sha1
900,411 UART: [kat] SHA2-256
902,351 UART: [kat] SHA2-384
905,020 UART: [kat] SHA2-512-ACC
906,921 UART: [kat] ECC-384
916,754 UART: [kat] HMAC-384Kdf
921,306 UART: [kat] LMS
1,169,618 UART: [kat] --
1,170,253 UART: [cold-reset] ++
1,170,684 UART: [fht] FHT @ 0x50003400
1,173,430 UART: [idev] ++
1,173,598 UART: [idev] CDI.KEYID = 6
1,173,959 UART: [idev] SUBJECT.KEYID = 7
1,174,384 UART: [idev] UDS.KEYID = 0
1,174,730 ready_for_fw is high
1,174,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,348 UART: [idev] Erasing UDS.KEYID = 0
1,199,659 UART: [idev] Sha1 KeyId Algorithm
1,208,556 UART: [idev] --
1,209,539 UART: [ldev] ++
1,209,707 UART: [ldev] CDI.KEYID = 6
1,210,071 UART: [ldev] SUBJECT.KEYID = 5
1,210,498 UART: [ldev] AUTHORITY.KEYID = 7
1,210,961 UART: [ldev] FE.KEYID = 1
1,216,207 UART: [ldev] Erasing FE.KEYID = 1
1,242,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,252 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,946 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,816 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,522 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,608 UART: [ldev] --
1,281,961 UART: [fwproc] Wait for Commands...
1,282,594 UART: [fwproc] Recv command 0x46574c44
1,283,327 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,681,221 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,712,396 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,578 >>> mbox cmd response: success
2,853,807 UART: [afmc] ++
2,853,975 UART: [afmc] CDI.KEYID = 6
2,854,338 UART: [afmc] SUBJECT.KEYID = 7
2,854,764 UART: [afmc] AUTHORITY.KEYID = 5
2,890,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,907,280 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,908,029 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,913,741 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,919,630 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,925,337 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,933,107 UART: [afmc] --
2,933,969 UART: [cold-reset] --
2,934,807 UART: [state] Locking Datavault
2,935,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,936,526 UART: [state] Locking ICCM
2,937,032 UART: [exit] Launching FMC @ 0x40000130
2,942,362 UART:
2,942,378 UART: Running Caliptra FMC ...
2,942,786 UART:
2,942,929 UART: [state] CFI Enabled
2,953,779 UART: [fht] FMC Alias Private Key: 7
3,072,473 UART: [art] Extend RT PCRs Done
3,072,901 UART: [art] Lock RT PCRs Done
3,074,241 UART: [art] Populate DV Done
3,082,229 UART: [fht] FMC Alias Private Key: 7
3,083,255 UART: [art] Derive CDI
3,083,535 UART: [art] Store in slot 0x4
3,169,182 UART: [art] Derive Key Pair
3,169,542 UART: [art] Store priv key in slot 0x5
3,183,346 UART: [art] Derive Key Pair - Done
3,198,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,213,769 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,534 UART: [art] PUB.X = 495BE7F70BBA7CD0A3F27591A1E989EDE9D881ADD55A5FB19F96A0FFB2BB4468998FA059239BDC67D0BD233D7537D5EB
3,221,321 UART: [art] PUB.Y = 7FE57E95FB9A2DB08949DC2B5A210B81A250F42A143798A14FF39FC5143F6714085EE8316969216B997D62F452294C0C
3,228,258 UART: [art] SIG.R = 02C6B3142EE58D24484C849DC5A3044A2274F5FA03DA63930A3257C54F95F0DC4C369829FA6C93F59398957394414D22
3,235,008 UART: [art] SIG.S = 8470998F276128D61C984CE3342387C55ED4DDF80D438D2CD8CA123BEFF4C2A779C9FE8FE0CDF0F4BE86367395055AE7
3,259,304 UART: Caliptra RT
3,259,647 UART: [state] CFI Enabled
3,379,959 UART: [rt] RT listening for mailbox commands...
3,380,622 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,272 UART: [rt]cmd =0x46505652, len=4
3,410,932 UART: [rt] FIPS Version
3,411,837 >>> mbox cmd response data (36 bytes)
3,411,839 writing to cptra_bootfsm_go
3,411,931 UART:
3,411,947 UART: Running Caliptra ROM ...
3,412,355 UART:
3,412,497 UART: [state] CFI Enabled
3,414,988 UART: [state] LifecycleState = Production
3,415,596 UART: [state] DebugLocked = Yes
3,416,224 UART: [state] Starting the WD Timer 40000000 cycles
3,417,751 UART: [kat] SHA2-256
4,221,301 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,225,405 UART: [kat] ++
4,225,557 UART: [kat] sha1
4,229,755 UART: [kat] SHA2-256
4,231,695 UART: [kat] SHA2-384
4,234,270 UART: [kat] SHA2-512-ACC
4,236,171 UART: [kat] ECC-384
4,245,952 UART: [kat] HMAC-384Kdf
4,250,410 UART: [kat] LMS
4,498,722 UART: [kat] --
4,499,760 UART: [warm-reset] ++
4,500,677 UART: [warm-reset] --
4,501,486 UART: [state] Locking Datavault
4,502,224 UART: [state] Locking PCR0, PCR1 and PCR31
4,502,828 UART: [state] Locking ICCM
4,503,450 UART: [exit] Launching FMC @ 0x40000130
4,508,780 UART:
4,508,796 UART: Running Caliptra FMC ...
4,509,204 UART:
4,509,347 UART: [state] CFI Enabled
4,510,720 UART: [art] Skip pcr extension
4,511,129 UART: [art] Extend RT PCRs Done
4,511,557 UART: [art] Lock RT PCRs Done
4,512,802 UART: [art] Populate DV Done
4,521,036 UART: [fht] FMC Alias Private Key: 7
4,522,026 UART: [art] Derive CDI
4,522,306 UART: [art] Store in slot 0x4
4,608,113 UART: [art] Derive Key Pair
4,608,473 UART: [art] Store priv key in slot 0x5
4,621,767 UART: [art] Derive Key Pair - Done
4,636,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,652,966 UART: [art] Erasing AUTHORITY.KEYID = 7
4,653,731 UART: [art] PUB.X = 495BE7F70BBA7CD0A3F27591A1E989EDE9D881ADD55A5FB19F96A0FFB2BB4468998FA059239BDC67D0BD233D7537D5EB
4,660,518 UART: [art] PUB.Y = 7FE57E95FB9A2DB08949DC2B5A210B81A250F42A143798A14FF39FC5143F6714085EE8316969216B997D62F452294C0C
4,667,455 UART: [art] SIG.R = 02C6B3142EE58D24484C849DC5A3044A2274F5FA03DA63930A3257C54F95F0DC4C369829FA6C93F59398957394414D22
4,674,205 UART: [art] SIG.S = 8470998F276128D61C984CE3342387C55ED4DDF80D438D2CD8CA123BEFF4C2A779C9FE8FE0CDF0F4BE86367395055AE7
4,697,509 UART: Caliptra RT
4,697,852 UART: [state] CFI Enabled
5,059,871 UART: [rt] RT listening for mailbox commands...
5,060,534 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,077,156 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,107,307 UART: [rt]cmd =0x46505652, len=4
5,107,967 UART: [rt] FIPS Version
5,108,970 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Production
85,986 UART: [state] DebugLocked = Yes
86,618 UART: [state] Starting the WD Timer 40000000 cycles
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,861 UART: [kat] ++
896,013 UART: [kat] sha1
900,189 UART: [kat] SHA2-256
902,129 UART: [kat] SHA2-384
904,694 UART: [kat] SHA2-512-ACC
906,595 UART: [kat] ECC-384
916,398 UART: [kat] HMAC-384Kdf
921,058 UART: [kat] LMS
1,169,370 UART: [kat] --
1,170,237 UART: [cold-reset] ++
1,170,706 UART: [fht] FHT @ 0x50003400
1,173,428 UART: [idev] ++
1,173,596 UART: [idev] CDI.KEYID = 6
1,173,957 UART: [idev] SUBJECT.KEYID = 7
1,174,382 UART: [idev] UDS.KEYID = 0
1,174,728 ready_for_fw is high
1,174,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,578 UART: [idev] Erasing UDS.KEYID = 0
1,199,777 UART: [idev] Sha1 KeyId Algorithm
1,208,748 UART: [idev] --
1,209,641 UART: [ldev] ++
1,209,809 UART: [ldev] CDI.KEYID = 6
1,210,173 UART: [ldev] SUBJECT.KEYID = 5
1,210,600 UART: [ldev] AUTHORITY.KEYID = 7
1,211,063 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,242,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,714 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,408 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,278 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,984 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,192 UART: [ldev] --
1,281,453 UART: [fwproc] Wait for Commands...
1,282,262 UART: [fwproc] Recv command 0x46574c44
1,282,995 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,102 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,277 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,563 >>> mbox cmd response: success
2,852,726 UART: [afmc] ++
2,852,894 UART: [afmc] CDI.KEYID = 6
2,853,257 UART: [afmc] SUBJECT.KEYID = 7
2,853,683 UART: [afmc] AUTHORITY.KEYID = 5
2,888,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,768 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,480 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,917,369 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,923,076 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,930,952 UART: [afmc] --
2,931,912 UART: [cold-reset] --
2,932,824 UART: [state] Locking Datavault
2,934,015 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,619 UART: [state] Locking ICCM
2,935,069 UART: [exit] Launching FMC @ 0x40000130
2,940,399 UART:
2,940,415 UART: Running Caliptra FMC ...
2,940,823 UART:
2,940,966 UART: [state] CFI Enabled
2,951,686 UART: [fht] FMC Alias Private Key: 7
3,070,896 UART: [art] Extend RT PCRs Done
3,071,324 UART: [art] Lock RT PCRs Done
3,072,698 UART: [art] Populate DV Done
3,080,862 UART: [fht] FMC Alias Private Key: 7
3,081,814 UART: [art] Derive CDI
3,082,094 UART: [art] Store in slot 0x4
3,168,279 UART: [art] Derive Key Pair
3,168,639 UART: [art] Store priv key in slot 0x5
3,181,909 UART: [art] Derive Key Pair - Done
3,196,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,975 UART: [art] PUB.X = DBA37949F7401EAA496F17F2EFF3E018074A5A87E9A82C83979973FB19BA7CFC346B50631F669A6C177F2F1BFAEC5452
3,219,752 UART: [art] PUB.Y = 4B36A479F44140947F1ED5F28ACEAF4481E1096A43DCFFE59C4C9F6DACCB7C0F95363DEF20838AA1997E57D72587B13D
3,226,710 UART: [art] SIG.R = E4E7EC244BAAB8422F6D58ED6EB19B4791B8E486F838761303811BBD3CCCD839F4D59AB10E043C009E4D93412757AC42
3,233,457 UART: [art] SIG.S = B42A728B1B06F33987A27070BBE67980D340E35AF66A828E7EE209C3AC02006612E908127B8EDE5D8F05ABC6210CC81F
3,256,855 UART: Caliptra RT
3,257,198 UART: [state] CFI Enabled
3,377,835 UART: [rt] RT listening for mailbox commands...
3,378,498 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,408,418 UART: [rt]cmd =0x46505652, len=4
3,409,078 UART: [rt] FIPS Version
3,410,117 >>> mbox cmd response data (36 bytes)
3,410,119 writing to cptra_bootfsm_go
3,410,211 UART:
3,410,227 UART: Running Caliptra ROM ...
3,410,635 UART:
3,410,777 UART: [state] CFI Enabled
3,413,784 UART: [state] LifecycleState = Production
3,414,392 UART: [state] DebugLocked = Yes
3,414,920 UART: [state] Starting the WD Timer 40000000 cycles
3,416,623 UART: [kat] SHA2-256
4,220,173 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,224,277 UART: [kat] ++
4,224,429 UART: [kat] sha1
4,228,557 UART: [kat] SHA2-256
4,230,497 UART: [kat] SHA2-384
4,233,154 UART: [kat] SHA2-512-ACC
4,235,055 UART: [kat] ECC-384
4,245,112 UART: [kat] HMAC-384Kdf
4,249,676 UART: [kat] LMS
4,497,988 UART: [kat] --
4,498,794 UART: [warm-reset] ++
4,499,741 UART: [warm-reset] --
4,500,614 UART: [state] Locking Datavault
4,501,608 UART: [state] Locking PCR0, PCR1 and PCR31
4,502,212 UART: [state] Locking ICCM
4,502,880 UART: [exit] Launching FMC @ 0x40000130
4,508,210 UART:
4,508,226 UART: Running Caliptra FMC ...
4,508,634 UART:
4,508,777 UART: [state] CFI Enabled
4,510,082 UART: [art] Skip pcr extension
4,510,491 UART: [art] Extend RT PCRs Done
4,510,919 UART: [art] Lock RT PCRs Done
4,512,102 UART: [art] Populate DV Done
4,520,432 UART: [fht] FMC Alias Private Key: 7
4,521,418 UART: [art] Derive CDI
4,521,698 UART: [art] Store in slot 0x4
4,607,439 UART: [art] Derive Key Pair
4,607,799 UART: [art] Store priv key in slot 0x5
4,621,563 UART: [art] Derive Key Pair - Done
4,636,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,652,274 UART: [art] Erasing AUTHORITY.KEYID = 7
4,653,039 UART: [art] PUB.X = DBA37949F7401EAA496F17F2EFF3E018074A5A87E9A82C83979973FB19BA7CFC346B50631F669A6C177F2F1BFAEC5452
4,659,816 UART: [art] PUB.Y = 4B36A479F44140947F1ED5F28ACEAF4481E1096A43DCFFE59C4C9F6DACCB7C0F95363DEF20838AA1997E57D72587B13D
4,666,774 UART: [art] SIG.R = E4E7EC244BAAB8422F6D58ED6EB19B4791B8E486F838761303811BBD3CCCD839F4D59AB10E043C009E4D93412757AC42
4,673,521 UART: [art] SIG.S = B42A728B1B06F33987A27070BBE67980D340E35AF66A828E7EE209C3AC02006612E908127B8EDE5D8F05ABC6210CC81F
4,697,427 UART: Caliptra RT
4,697,770 UART: [state] CFI Enabled
5,059,732 UART: [rt] RT listening for mailbox commands...
5,060,395 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,077,293 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,107,542 UART: [rt]cmd =0x46505652, len=4
5,108,202 UART: [rt] FIPS Version
5,109,447 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Production
85,963 UART: [state] DebugLocked = Yes
86,639 UART: [state] Starting the WD Timer 40000000 cycles
88,298 UART: [kat] SHA2-256
891,848 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,952 UART: [kat] ++
896,104 UART: [kat] sha1
900,476 UART: [kat] SHA2-256
902,416 UART: [kat] SHA2-384
905,041 UART: [kat] SHA2-512-ACC
906,942 UART: [kat] ECC-384
916,705 UART: [kat] HMAC-384Kdf
921,241 UART: [kat] LMS
1,169,553 UART: [kat] --
1,170,406 UART: [cold-reset] ++
1,170,751 UART: [fht] FHT @ 0x50003400
1,173,305 UART: [idev] ++
1,173,473 UART: [idev] CDI.KEYID = 6
1,173,834 UART: [idev] SUBJECT.KEYID = 7
1,174,259 UART: [idev] UDS.KEYID = 0
1,174,605 ready_for_fw is high
1,174,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,575 UART: [idev] Erasing UDS.KEYID = 0
1,199,092 UART: [idev] Sha1 KeyId Algorithm
1,208,111 UART: [idev] --
1,209,030 UART: [ldev] ++
1,209,198 UART: [ldev] CDI.KEYID = 6
1,209,562 UART: [ldev] SUBJECT.KEYID = 5
1,209,989 UART: [ldev] AUTHORITY.KEYID = 7
1,210,452 UART: [ldev] FE.KEYID = 1
1,215,702 UART: [ldev] Erasing FE.KEYID = 1
1,241,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,995 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,689 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,559 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,265 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,459 UART: [ldev] --
1,280,760 UART: [fwproc] Wait for Commands...
1,281,543 UART: [fwproc] Recv command 0x46574c44
1,282,276 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,677 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,852 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,254 >>> mbox cmd response: success
2,851,417 UART: [afmc] ++
2,851,585 UART: [afmc] CDI.KEYID = 6
2,851,948 UART: [afmc] SUBJECT.KEYID = 7
2,852,374 UART: [afmc] AUTHORITY.KEYID = 5
2,887,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,063 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,910,775 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,916,664 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,922,371 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,930,127 UART: [afmc] --
2,931,103 UART: [cold-reset] --
2,931,865 UART: [state] Locking Datavault
2,933,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,912 UART: [state] Locking ICCM
2,934,378 UART: [exit] Launching FMC @ 0x40000130
2,939,708 UART:
2,939,724 UART: Running Caliptra FMC ...
2,940,132 UART:
2,940,186 UART: [state] CFI Enabled
2,950,634 UART: [fht] FMC Alias Private Key: 7
3,069,534 UART: [art] Extend RT PCRs Done
3,069,962 UART: [art] Lock RT PCRs Done
3,071,746 UART: [art] Populate DV Done
3,079,998 UART: [fht] FMC Alias Private Key: 7
3,080,986 UART: [art] Derive CDI
3,081,266 UART: [art] Store in slot 0x4
3,166,755 UART: [art] Derive Key Pair
3,167,115 UART: [art] Store priv key in slot 0x5
3,180,297 UART: [art] Derive Key Pair - Done
3,195,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,830 UART: [art] PUB.X = D3A02CC4771D7C97504C0137FE153C6B1D57C13835613C719AAABFDEE4AA2CA6E5A2E501B9E8D5618BFE3502D5FDC566
3,218,607 UART: [art] PUB.Y = 1EA600D90933EACB6500539F541D954302F16A58F63DB0688B467E99D0709A9D419D5635AC19690D3AA5E4B6E354F75C
3,225,502 UART: [art] SIG.R = 4E9ED3DAE9635298DB5883C0A44C90830E38B0ACB4D5A7273691EDDF505F7421387591819186B48F4FF549CD62B1C3B9
3,232,271 UART: [art] SIG.S = CB8F039C5D5D396B8D0140FA79E7466D9122CF98D88910C813D555E134C50BAB916CAA6DF404F80ADCA3C49AB570663E
3,255,466 UART: Caliptra RT
3,255,717 UART: [state] CFI Enabled
3,374,539 UART: [rt] RT listening for mailbox commands...
3,375,202 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,404,930 UART: [rt]cmd =0x46505652, len=4
3,405,590 UART: [rt] FIPS Version
3,406,633 >>> mbox cmd response data (36 bytes)
3,406,635 writing to cptra_bootfsm_go
3,406,727 UART:
3,406,743 UART: Running Caliptra ROM ...
3,407,151 UART:
3,407,206 UART: [state] CFI Enabled
3,410,081 UART: [state] LifecycleState = Production
3,410,689 UART: [state] DebugLocked = Yes
3,411,431 UART: [state] Starting the WD Timer 40000000 cycles
3,412,952 UART: [kat] SHA2-256
4,216,502 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,220,606 UART: [kat] ++
4,220,758 UART: [kat] sha1
4,225,036 UART: [kat] SHA2-256
4,226,976 UART: [kat] SHA2-384
4,229,619 UART: [kat] SHA2-512-ACC
4,231,520 UART: [kat] ECC-384
4,241,007 UART: [kat] HMAC-384Kdf
4,245,399 UART: [kat] LMS
4,493,711 UART: [kat] --
4,494,587 UART: [warm-reset] ++
4,495,678 UART: [warm-reset] --
4,496,547 UART: [state] Locking Datavault
4,497,409 UART: [state] Locking PCR0, PCR1 and PCR31
4,498,013 UART: [state] Locking ICCM
4,498,485 UART: [exit] Launching FMC @ 0x40000130
4,503,815 UART:
4,503,831 UART: Running Caliptra FMC ...
4,504,239 UART:
4,504,293 UART: [state] CFI Enabled
4,505,628 UART: [art] Skip pcr extension
4,506,037 UART: [art] Extend RT PCRs Done
4,506,465 UART: [art] Lock RT PCRs Done
4,507,408 UART: [art] Populate DV Done
4,515,670 UART: [fht] FMC Alias Private Key: 7
4,516,780 UART: [art] Derive CDI
4,517,060 UART: [art] Store in slot 0x4
4,602,827 UART: [art] Derive Key Pair
4,603,187 UART: [art] Store priv key in slot 0x5
4,616,293 UART: [art] Derive Key Pair - Done
4,630,824 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,646,075 UART: [art] Erasing AUTHORITY.KEYID = 7
4,646,840 UART: [art] PUB.X = D3A02CC4771D7C97504C0137FE153C6B1D57C13835613C719AAABFDEE4AA2CA6E5A2E501B9E8D5618BFE3502D5FDC566
4,653,617 UART: [art] PUB.Y = 1EA600D90933EACB6500539F541D954302F16A58F63DB0688B467E99D0709A9D419D5635AC19690D3AA5E4B6E354F75C
4,660,512 UART: [art] SIG.R = 4E9ED3DAE9635298DB5883C0A44C90830E38B0ACB4D5A7273691EDDF505F7421387591819186B48F4FF549CD62B1C3B9
4,667,281 UART: [art] SIG.S = CB8F039C5D5D396B8D0140FA79E7466D9122CF98D88910C813D555E134C50BAB916CAA6DF404F80ADCA3C49AB570663E
4,690,970 UART: Caliptra RT
4,691,221 UART: [state] CFI Enabled
5,056,952 UART: [rt] RT listening for mailbox commands...
5,057,615 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,074,891 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,105,046 UART: [rt]cmd =0x46505652, len=4
5,105,706 UART: [rt] FIPS Version
5,106,627 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Production
86,251 UART: [state] DebugLocked = Yes
86,979 UART: [state] Starting the WD Timer 40000000 cycles
88,594 UART: [kat] SHA2-256
892,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,248 UART: [kat] ++
896,400 UART: [kat] sha1
900,664 UART: [kat] SHA2-256
902,604 UART: [kat] SHA2-384
905,329 UART: [kat] SHA2-512-ACC
907,230 UART: [kat] ECC-384
916,933 UART: [kat] HMAC-384Kdf
921,533 UART: [kat] LMS
1,169,845 UART: [kat] --
1,170,784 UART: [cold-reset] ++
1,171,305 UART: [fht] FHT @ 0x50003400
1,173,941 UART: [idev] ++
1,174,109 UART: [idev] CDI.KEYID = 6
1,174,470 UART: [idev] SUBJECT.KEYID = 7
1,174,895 UART: [idev] UDS.KEYID = 0
1,175,241 ready_for_fw is high
1,175,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,745 UART: [idev] Erasing UDS.KEYID = 0
1,199,672 UART: [idev] Sha1 KeyId Algorithm
1,208,549 UART: [idev] --
1,209,556 UART: [ldev] ++
1,209,724 UART: [ldev] CDI.KEYID = 6
1,210,088 UART: [ldev] SUBJECT.KEYID = 5
1,210,515 UART: [ldev] AUTHORITY.KEYID = 7
1,210,978 UART: [ldev] FE.KEYID = 1
1,216,290 UART: [ldev] Erasing FE.KEYID = 1
1,242,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,359 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,053 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,923 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,629 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,833 UART: [ldev] --
1,282,176 UART: [fwproc] Wait for Commands...
1,282,843 UART: [fwproc] Recv command 0x46574c44
1,283,576 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,207 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,382 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,670 >>> mbox cmd response: success
2,852,901 UART: [afmc] ++
2,853,069 UART: [afmc] CDI.KEYID = 6
2,853,432 UART: [afmc] SUBJECT.KEYID = 7
2,853,858 UART: [afmc] AUTHORITY.KEYID = 5
2,889,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,203 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,915 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,917,804 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,923,511 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,931,457 UART: [afmc] --
2,932,521 UART: [cold-reset] --
2,933,163 UART: [state] Locking Datavault
2,934,652 UART: [state] Locking PCR0, PCR1 and PCR31
2,935,256 UART: [state] Locking ICCM
2,935,686 UART: [exit] Launching FMC @ 0x40000130
2,941,016 UART:
2,941,032 UART: Running Caliptra FMC ...
2,941,440 UART:
2,941,494 UART: [state] CFI Enabled
2,952,210 UART: [fht] FMC Alias Private Key: 7
3,071,520 UART: [art] Extend RT PCRs Done
3,071,948 UART: [art] Lock RT PCRs Done
3,073,732 UART: [art] Populate DV Done
3,082,044 UART: [fht] FMC Alias Private Key: 7
3,083,198 UART: [art] Derive CDI
3,083,478 UART: [art] Store in slot 0x4
3,169,127 UART: [art] Derive Key Pair
3,169,487 UART: [art] Store priv key in slot 0x5
3,182,557 UART: [art] Derive Key Pair - Done
3,197,422 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,213,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,844 UART: [art] PUB.X = E3893A448B094FC8CFB57851632F8A6947448027E93156DF1CDF4F9FB1092469BCAF332109F565EB0BC995E8CBE8DC7F
3,220,610 UART: [art] PUB.Y = C607379ECBDB4AF0DD4FE53161109E0E3091C2D5B3E70C30E81FD31DE513A9BE21B5A5EA9A7DC37E29BDE3F45F4F6934
3,227,571 UART: [art] SIG.R = 22DF69DE0E4D0DFCA6DC62515675E5B4127B8D9C62FF285C10B44AD07973D6508DC3F67A98398311C9BF195DD947F53B
3,234,343 UART: [art] SIG.S = 181FF3B49879834A3829AA8BBE342CDBFBF49CA87B603D7259D51DEE2301A7350957764FEA9414527A7176B2CA804529
3,258,117 UART: Caliptra RT
3,258,368 UART: [state] CFI Enabled
3,376,888 UART: [rt] RT listening for mailbox commands...
3,377,551 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,643 UART: [rt]cmd =0x46505652, len=4
3,408,303 UART: [rt] FIPS Version
3,409,192 >>> mbox cmd response data (36 bytes)
3,409,194 writing to cptra_bootfsm_go
3,409,286 UART:
3,409,302 UART: Running Caliptra ROM ...
3,409,710 UART:
3,409,765 UART: [state] CFI Enabled
3,412,504 UART: [state] LifecycleState = Production
3,413,112 UART: [state] DebugLocked = Yes
3,413,812 UART: [state] Starting the WD Timer 40000000 cycles
3,415,439 UART: [kat] SHA2-256
4,218,989 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,223,093 UART: [kat] ++
4,223,245 UART: [kat] sha1
4,227,417 UART: [kat] SHA2-256
4,229,357 UART: [kat] SHA2-384
4,232,216 UART: [kat] SHA2-512-ACC
4,234,117 UART: [kat] ECC-384
4,243,614 UART: [kat] HMAC-384Kdf
4,248,222 UART: [kat] LMS
4,496,534 UART: [kat] --
4,497,290 UART: [warm-reset] ++
4,498,249 UART: [warm-reset] --
4,499,274 UART: [state] Locking Datavault
4,499,862 UART: [state] Locking PCR0, PCR1 and PCR31
4,500,466 UART: [state] Locking ICCM
4,500,898 UART: [exit] Launching FMC @ 0x40000130
4,506,228 UART:
4,506,244 UART: Running Caliptra FMC ...
4,506,652 UART:
4,506,706 UART: [state] CFI Enabled
4,507,741 UART: [art] Skip pcr extension
4,508,150 UART: [art] Extend RT PCRs Done
4,508,578 UART: [art] Lock RT PCRs Done
4,510,167 UART: [art] Populate DV Done
4,518,235 UART: [fht] FMC Alias Private Key: 7
4,519,223 UART: [art] Derive CDI
4,519,503 UART: [art] Store in slot 0x4
4,605,230 UART: [art] Derive Key Pair
4,605,590 UART: [art] Store priv key in slot 0x5
4,618,480 UART: [art] Derive Key Pair - Done
4,633,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,648,888 UART: [art] Erasing AUTHORITY.KEYID = 7
4,649,653 UART: [art] PUB.X = E3893A448B094FC8CFB57851632F8A6947448027E93156DF1CDF4F9FB1092469BCAF332109F565EB0BC995E8CBE8DC7F
4,656,419 UART: [art] PUB.Y = C607379ECBDB4AF0DD4FE53161109E0E3091C2D5B3E70C30E81FD31DE513A9BE21B5A5EA9A7DC37E29BDE3F45F4F6934
4,663,380 UART: [art] SIG.R = 22DF69DE0E4D0DFCA6DC62515675E5B4127B8D9C62FF285C10B44AD07973D6508DC3F67A98398311C9BF195DD947F53B
4,670,152 UART: [art] SIG.S = 181FF3B49879834A3829AA8BBE342CDBFBF49CA87B603D7259D51DEE2301A7350957764FEA9414527A7176B2CA804529
4,693,570 UART: Caliptra RT
4,693,821 UART: [state] CFI Enabled
5,053,750 UART: [rt] RT listening for mailbox commands...
5,054,413 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,071,119 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,101,148 UART: [rt]cmd =0x46505652, len=4
5,101,808 UART: [rt] FIPS Version
5,103,001 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Production
86,038 UART: [state] DebugLocked = Yes
86,640 UART: [state] Starting the WD Timer 40000000 cycles
88,305 UART: [kat] SHA2-256
891,855 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,959 UART: [kat] ++
896,111 UART: [kat] sha1
900,311 UART: [kat] SHA2-256
902,251 UART: [kat] SHA2-384
905,034 UART: [kat] SHA2-512-ACC
906,935 UART: [kat] ECC-384
916,664 UART: [kat] HMAC-384Kdf
921,294 UART: [kat] LMS
1,169,606 UART: [kat] --
1,170,615 UART: [cold-reset] ++
1,171,052 UART: [fht] FHT @ 0x50003400
1,173,808 UART: [idev] ++
1,173,976 UART: [idev] CDI.KEYID = 6
1,174,337 UART: [idev] SUBJECT.KEYID = 7
1,174,762 UART: [idev] UDS.KEYID = 0
1,175,108 ready_for_fw is high
1,175,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,590 UART: [idev] Erasing UDS.KEYID = 0
1,200,257 UART: [idev] Sha1 KeyId Algorithm
1,209,082 UART: [idev] --
1,210,113 UART: [ldev] ++
1,210,281 UART: [ldev] CDI.KEYID = 6
1,210,645 UART: [ldev] SUBJECT.KEYID = 5
1,211,072 UART: [ldev] AUTHORITY.KEYID = 7
1,211,535 UART: [ldev] FE.KEYID = 1
1,216,835 UART: [ldev] Erasing FE.KEYID = 1
1,243,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,970 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,664 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,534 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,240 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,380 UART: [ldev] --
1,282,797 UART: [fwproc] Wait for Commands...
1,283,490 UART: [fwproc] Recv command 0x46574c44
1,284,223 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,126 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,301 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,535 >>> mbox cmd response: success
2,851,746 UART: [afmc] ++
2,851,914 UART: [afmc] CDI.KEYID = 6
2,852,277 UART: [afmc] SUBJECT.KEYID = 7
2,852,703 UART: [afmc] AUTHORITY.KEYID = 5
2,888,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,302 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,014 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,916,903 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,922,610 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,930,474 UART: [afmc] --
2,931,420 UART: [cold-reset] --
2,932,352 UART: [state] Locking Datavault
2,933,393 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,997 UART: [state] Locking ICCM
2,934,497 UART: [exit] Launching FMC @ 0x40000130
2,939,827 UART:
2,939,843 UART: Running Caliptra FMC ...
2,940,251 UART:
2,940,394 UART: [state] CFI Enabled
2,950,788 UART: [fht] FMC Alias Private Key: 7
3,069,360 UART: [art] Extend RT PCRs Done
3,069,788 UART: [art] Lock RT PCRs Done
3,071,432 UART: [art] Populate DV Done
3,079,656 UART: [fht] FMC Alias Private Key: 7
3,080,622 UART: [art] Derive CDI
3,080,902 UART: [art] Store in slot 0x4
3,166,547 UART: [art] Derive Key Pair
3,166,907 UART: [art] Store priv key in slot 0x5
3,180,525 UART: [art] Derive Key Pair - Done
3,195,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,371 UART: [art] PUB.X = 0D73CA2472CA3FCD985CFDEEDA9349619DCC998AC1CEC82159CCF5E1CA1ADA373C14D0847ADCE7AFD15AEF6C35B99CA4
3,218,172 UART: [art] PUB.Y = 387944FFF800AFEBEBA641C42BC4762CFE864738E5E4E46385D1467AD40A2819B786590696833640817A85EDA40AB6F6
3,225,091 UART: [art] SIG.R = 8E5ED70337436A40DF2051B68D1EC47A8C094B00F32B57D72CF58D3FB42465A3E8CF8AB3B231CA03C9B3EC829A83C54C
3,231,842 UART: [art] SIG.S = 4F0758AD9A771E34919B4C3E9579E201B2FE3DBA69537D548F3625AE392E4A4A32A09DA41FF22EE8B2ED360F49A2683E
3,256,543 UART: Caliptra RT
3,256,886 UART: [state] CFI Enabled
3,377,430 UART: [rt] RT listening for mailbox commands...
3,378,093 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,408,239 UART: [rt]cmd =0x46505652, len=4
3,408,899 UART: [rt] FIPS Version
3,409,954 >>> mbox cmd response data (36 bytes)
3,409,956 writing to cptra_bootfsm_go
3,410,048 UART:
3,410,064 UART: Running Caliptra ROM ...
3,410,472 UART:
3,410,614 UART: [state] CFI Enabled
3,413,203 UART: [state] LifecycleState = Production
3,413,811 UART: [state] DebugLocked = Yes
3,414,469 UART: [state] Starting the WD Timer 40000000 cycles
3,416,162 UART: [kat] SHA2-256
4,219,712 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,223,816 UART: [kat] ++
4,223,968 UART: [kat] sha1
4,228,160 UART: [kat] SHA2-256
4,230,100 UART: [kat] SHA2-384
4,232,771 UART: [kat] SHA2-512-ACC
4,234,672 UART: [kat] ECC-384
4,245,261 UART: [kat] HMAC-384Kdf
4,249,801 UART: [kat] LMS
4,498,113 UART: [kat] --
4,498,795 UART: [warm-reset] ++
4,499,664 UART: [warm-reset] --
4,500,467 UART: [state] Locking Datavault
4,501,225 UART: [state] Locking PCR0, PCR1 and PCR31
4,501,829 UART: [state] Locking ICCM
4,502,379 UART: [exit] Launching FMC @ 0x40000130
4,507,709 UART:
4,507,725 UART: Running Caliptra FMC ...
4,508,133 UART:
4,508,276 UART: [state] CFI Enabled
4,509,577 UART: [art] Skip pcr extension
4,509,986 UART: [art] Extend RT PCRs Done
4,510,414 UART: [art] Lock RT PCRs Done
4,511,513 UART: [art] Populate DV Done
4,519,651 UART: [fht] FMC Alias Private Key: 7
4,520,669 UART: [art] Derive CDI
4,520,949 UART: [art] Store in slot 0x4
4,606,718 UART: [art] Derive Key Pair
4,607,078 UART: [art] Store priv key in slot 0x5
4,620,982 UART: [art] Derive Key Pair - Done
4,635,824 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,651,579 UART: [art] Erasing AUTHORITY.KEYID = 7
4,652,344 UART: [art] PUB.X = 0D73CA2472CA3FCD985CFDEEDA9349619DCC998AC1CEC82159CCF5E1CA1ADA373C14D0847ADCE7AFD15AEF6C35B99CA4
4,659,145 UART: [art] PUB.Y = 387944FFF800AFEBEBA641C42BC4762CFE864738E5E4E46385D1467AD40A2819B786590696833640817A85EDA40AB6F6
4,666,064 UART: [art] SIG.R = 8E5ED70337436A40DF2051B68D1EC47A8C094B00F32B57D72CF58D3FB42465A3E8CF8AB3B231CA03C9B3EC829A83C54C
4,672,815 UART: [art] SIG.S = 4F0758AD9A771E34919B4C3E9579E201B2FE3DBA69537D548F3625AE392E4A4A32A09DA41FF22EE8B2ED360F49A2683E
4,696,908 UART: Caliptra RT
4,697,251 UART: [state] CFI Enabled
5,061,512 UART: [rt] RT listening for mailbox commands...
5,062,175 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,078,989 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,914 UART: [rt]cmd =0x46505652, len=4
5,109,574 UART: [rt] FIPS Version
5,110,509 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,666 UART: [state] LifecycleState = Production
86,274 UART: [state] DebugLocked = Yes
86,806 UART: [state] Starting the WD Timer 40000000 cycles
88,441 UART: [kat] SHA2-256
891,991 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,095 UART: [kat] ++
896,247 UART: [kat] sha1
900,557 UART: [kat] SHA2-256
902,497 UART: [kat] SHA2-384
905,226 UART: [kat] SHA2-512-ACC
907,127 UART: [kat] ECC-384
917,024 UART: [kat] HMAC-384Kdf
921,696 UART: [kat] LMS
1,170,008 UART: [kat] --
1,170,913 UART: [cold-reset] ++
1,171,280 UART: [fht] FHT @ 0x50003400
1,174,016 UART: [idev] ++
1,174,184 UART: [idev] CDI.KEYID = 6
1,174,545 UART: [idev] SUBJECT.KEYID = 7
1,174,970 UART: [idev] UDS.KEYID = 0
1,175,316 ready_for_fw is high
1,175,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,210 UART: [idev] Erasing UDS.KEYID = 0
1,200,403 UART: [idev] Sha1 KeyId Algorithm
1,209,204 UART: [idev] --
1,210,405 UART: [ldev] ++
1,210,573 UART: [ldev] CDI.KEYID = 6
1,210,937 UART: [ldev] SUBJECT.KEYID = 5
1,211,364 UART: [ldev] AUTHORITY.KEYID = 7
1,211,827 UART: [ldev] FE.KEYID = 1
1,217,133 UART: [ldev] Erasing FE.KEYID = 1
1,243,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,748 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,442 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,312 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,018 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,108 UART: [ldev] --
1,282,307 UART: [fwproc] Wait for Commands...
1,282,928 UART: [fwproc] Recv command 0x46574c44
1,283,661 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,814 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,304 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,479 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,675 >>> mbox cmd response: success
2,852,864 UART: [afmc] ++
2,853,032 UART: [afmc] CDI.KEYID = 6
2,853,395 UART: [afmc] SUBJECT.KEYID = 7
2,853,821 UART: [afmc] AUTHORITY.KEYID = 5
2,889,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,102 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,814 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,917,703 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,923,410 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,930,966 UART: [afmc] --
2,931,898 UART: [cold-reset] --
2,932,856 UART: [state] Locking Datavault
2,934,023 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,627 UART: [state] Locking ICCM
2,935,111 UART: [exit] Launching FMC @ 0x40000130
2,940,441 UART:
2,940,457 UART: Running Caliptra FMC ...
2,940,865 UART:
2,941,008 UART: [state] CFI Enabled
2,951,770 UART: [fht] FMC Alias Private Key: 7
3,070,064 UART: [art] Extend RT PCRs Done
3,070,492 UART: [art] Lock RT PCRs Done
3,072,128 UART: [art] Populate DV Done
3,080,424 UART: [fht] FMC Alias Private Key: 7
3,081,528 UART: [art] Derive CDI
3,081,808 UART: [art] Store in slot 0x4
3,167,609 UART: [art] Derive Key Pair
3,167,969 UART: [art] Store priv key in slot 0x5
3,182,097 UART: [art] Derive Key Pair - Done
3,197,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,590 UART: [art] PUB.X = DFD8B3C88ADC503DE57978D99E0995DDE63BBB3D188668B95887EF7337B950003141F7ABD31D84A10A1E8DC6EA1FF0EE
3,220,348 UART: [art] PUB.Y = FD22E35F85A5013D567F1525541535F82A9CADF6F39E7D2701F51D7442BB4F449221DD6D387DFA94E4FBA8C2466E2BB5
3,227,300 UART: [art] SIG.R = 61047FDA7BBC7B7BFC6965FC54BF949C9E1F44A34CCBE7D2B6CFB93D167594B50A119F118042C7B08B8319B3D090FF1C
3,234,080 UART: [art] SIG.S = 8E26D1CBD2981F86F1945F98B16A4D5F326862F40FF9CFC082BDFCD9AA69D4DC1222A3813F0774EE13741E0A30D62FD9
3,257,543 UART: Caliptra RT
3,257,886 UART: [state] CFI Enabled
3,377,756 UART: [rt] RT listening for mailbox commands...
3,378,419 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,408,085 UART: [rt]cmd =0x46505652, len=4
3,408,745 UART: [rt] FIPS Version
3,409,812 >>> mbox cmd response data (36 bytes)
3,409,814 writing to cptra_bootfsm_go
3,409,906 UART:
3,409,922 UART: Running Caliptra ROM ...
3,410,330 UART:
3,410,472 UART: [state] CFI Enabled
3,413,091 UART: [state] LifecycleState = Production
3,413,699 UART: [state] DebugLocked = Yes
3,414,389 UART: [state] Starting the WD Timer 40000000 cycles
3,416,008 UART: [kat] SHA2-256
4,219,558 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,223,662 UART: [kat] ++
4,223,814 UART: [kat] sha1
4,227,984 UART: [kat] SHA2-256
4,229,924 UART: [kat] SHA2-384
4,232,745 UART: [kat] SHA2-512-ACC
4,234,646 UART: [kat] ECC-384
4,244,231 UART: [kat] HMAC-384Kdf
4,248,771 UART: [kat] LMS
4,497,083 UART: [kat] --
4,497,963 UART: [warm-reset] ++
4,498,672 UART: [warm-reset] --
4,499,581 UART: [state] Locking Datavault
4,500,283 UART: [state] Locking PCR0, PCR1 and PCR31
4,500,887 UART: [state] Locking ICCM
4,501,521 UART: [exit] Launching FMC @ 0x40000130
4,506,851 UART:
4,506,867 UART: Running Caliptra FMC ...
4,507,275 UART:
4,507,418 UART: [state] CFI Enabled
4,508,983 UART: [art] Skip pcr extension
4,509,392 UART: [art] Extend RT PCRs Done
4,509,820 UART: [art] Lock RT PCRs Done
4,511,011 UART: [art] Populate DV Done
4,519,091 UART: [fht] FMC Alias Private Key: 7
4,520,133 UART: [art] Derive CDI
4,520,413 UART: [art] Store in slot 0x4
4,606,608 UART: [art] Derive Key Pair
4,606,968 UART: [art] Store priv key in slot 0x5
4,620,860 UART: [art] Derive Key Pair - Done
4,635,415 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,651,162 UART: [art] Erasing AUTHORITY.KEYID = 7
4,651,927 UART: [art] PUB.X = DFD8B3C88ADC503DE57978D99E0995DDE63BBB3D188668B95887EF7337B950003141F7ABD31D84A10A1E8DC6EA1FF0EE
4,658,685 UART: [art] PUB.Y = FD22E35F85A5013D567F1525541535F82A9CADF6F39E7D2701F51D7442BB4F449221DD6D387DFA94E4FBA8C2466E2BB5
4,665,637 UART: [art] SIG.R = 61047FDA7BBC7B7BFC6965FC54BF949C9E1F44A34CCBE7D2B6CFB93D167594B50A119F118042C7B08B8319B3D090FF1C
4,672,417 UART: [art] SIG.S = 8E26D1CBD2981F86F1945F98B16A4D5F326862F40FF9CFC082BDFCD9AA69D4DC1222A3813F0774EE13741E0A30D62FD9
4,695,864 UART: Caliptra RT
4,696,207 UART: [state] CFI Enabled
5,060,926 UART: [rt] RT listening for mailbox commands...
5,061,589 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,079,007 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,994 UART: [rt]cmd =0x46505652, len=4
5,109,654 UART: [rt] FIPS Version
5,110,809 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
191,533 UART:
191,882 UART: Running Caliptra ROM ...
193,066 UART:
193,235 UART: [state] CFI Enabled
265,190 UART: [state] LifecycleState = Unprovisioned
267,126 UART: [state] DebugLocked = Yes
269,730 UART: [state] Starting the WD Timer 1000000 cycles
275,080 UART: [kat] SHA2-256
454,752 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,567 UART: [kat] ++
466,132 UART: [kat] sha1
478,429 UART: [kat] SHA2-256
481,171 UART: [kat] SHA2-384
487,362 UART: [kat] SHA2-512-ACC
489,711 UART: [kat] ECC-384
1,273,309 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009126 ra=0x0000911E error_internal_intr_r=00000040
1,280,019 UART: WDT Expired
1,280,607 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009126 ra=0x0000911E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000812C ra=0x00008114 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
191,763 UART:
192,147 UART: Running Caliptra ROM ...
193,290 UART:
602,931 UART: [state] CFI Enabled
617,641 UART: [state] LifecycleState = Unprovisioned
619,560 UART: [state] DebugLocked = Yes
621,885 UART: [state] Starting the WD Timer 1000000 cycles
625,769 UART: [kat] SHA2-256
805,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,211 UART: [kat] ++
816,672 UART: [kat] sha1
827,702 UART: [kat] SHA2-256
830,379 UART: [kat] SHA2-384
837,183 UART: [kat] SHA2-512-ACC
839,513 UART: [kat] ECC-384
1,625,476 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009130 ra=0x0000911E error_internal_intr_r=00000040
1,632,087 UART: WDT Expired
1,632,661 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009130 ra=0x0000911E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008128 ra=0x00008114 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,027 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = Yes
86,201 UART: [state] Starting the WD Timer 1000000 cycles
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,282 UART: [kat] ++
895,434 UART: [kat] sha1
899,766 UART: [kat] SHA2-256
901,706 UART: [kat] SHA2-384
904,425 UART: [kat] SHA2-512-ACC
906,326 UART: [kat] ECC-384
915,929 UART: [kat] HMAC-384Kdf
920,385 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,514 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000797A ra=0x00008160 error_internal_intr_r=00000040
1,089,955 UART: WDT Expired
1,090,164 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000797A ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007936 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,748 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = Yes
87,038 UART: [state] Starting the WD Timer 1000000 cycles
88,613 UART: [kat] SHA2-256
892,163 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,267 UART: [kat] ++
896,419 UART: [kat] sha1
900,605 UART: [kat] SHA2-256
902,545 UART: [kat] SHA2-384
905,440 UART: [kat] SHA2-512-ACC
907,341 UART: [kat] ECC-384
916,710 UART: [kat] HMAC-384Kdf
921,362 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,351 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000A300 ra=0x00008142 error_internal_intr_r=00000040
1,090,792 UART: WDT Expired
1,091,001 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000A300 ra=0x00008142 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007922 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,167 UART: [state] DebugLocked = Yes
86,797 UART: [state] Starting the WD Timer 1000000 cycles
88,342 UART: [kat] SHA2-256
891,892 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,996 UART: [kat] ++
896,148 UART: [kat] sha1
900,454 UART: [kat] SHA2-256
902,394 UART: [kat] SHA2-384
905,303 UART: [kat] SHA2-512-ACC
907,204 UART: [kat] ECC-384
916,569 UART: [kat] HMAC-384Kdf
921,281 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,110 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00008146 ra=0x00008160 error_internal_intr_r=00000040
1,090,549 UART: WDT Expired
1,090,758 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008146 ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000078E4 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = Yes
86,380 UART: [state] Starting the WD Timer 1000000 cycles
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,867 UART: [kat] SHA2-256
901,807 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
916,482 UART: [kat] HMAC-384Kdf
921,168 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,693 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007956 ra=0x00008160 error_internal_intr_r=00000040
1,090,132 UART: WDT Expired
1,090,341 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007956 ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000078D4 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,971 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = Yes
86,327 UART: [state] Starting the WD Timer 1000000 cycles
87,834 UART: [kat] SHA2-256
891,384 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
899,842 UART: [kat] SHA2-256
901,782 UART: [kat] SHA2-384
904,521 UART: [kat] SHA2-512-ACC
906,422 UART: [kat] ECC-384
916,681 UART: [kat] HMAC-384Kdf
921,241 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,640 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079EA ra=0x00008160 error_internal_intr_r=00000040
1,090,083 UART: WDT Expired
1,090,292 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079EA ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000078C8 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,664 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = Yes
87,042 UART: [state] Starting the WD Timer 1000000 cycles
88,427 UART: [kat] SHA2-256
891,977 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,081 UART: [kat] ++
896,233 UART: [kat] sha1
900,535 UART: [kat] SHA2-256
902,475 UART: [kat] SHA2-384
905,212 UART: [kat] SHA2-512-ACC
907,113 UART: [kat] ECC-384
917,236 UART: [kat] HMAC-384Kdf
922,018 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,355 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079A0 ra=0x00008160 error_internal_intr_r=00000040
1,090,796 UART: WDT Expired
1,091,005 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079A0 ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000078D8 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
191,484 UART:
191,860 UART: Running Caliptra ROM ...
193,013 UART:
193,178 UART: [state] CFI Enabled
265,173 UART: [state] LifecycleState = Unprovisioned
267,136 UART: [state] DebugLocked = Yes
268,592 UART: [state] Starting the WD Timer 40000000 cycles
273,657 UART: [kat] SHA2-256
453,299 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,095 UART: [kat] ++
464,672 UART: [kat] sha1
476,365 UART: [kat] SHA2-256
479,037 UART: [kat] SHA2-384
484,776 UART: [kat] SHA2-512-ACC
487,135 UART: [kat] ECC-384
2,950,213 UART: [kat] HMAC-384Kdf
2,973,556 UART: [kat] LMS
3,449,977 UART: [kat] --
3,456,782 UART: [cold-reset] ++
3,458,627 UART: [fht] FHT @ 0x50003400
3,470,748 UART: [idev] ++
3,471,326 UART: [idev] CDI.KEYID = 6
3,472,302 UART: [idev] SUBJECT.KEYID = 7
3,473,518 UART: [idev] UDS.KEYID = 0
3,476,217 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,621,037 UART: [idev] Erasing UDS.KEYID = 0
5,990,643 UART: [idev] Sha1 KeyId Algorithm
6,013,497 UART: [idev] --
6,017,577 UART: [ldev] ++
6,018,157 UART: [ldev] CDI.KEYID = 6
6,019,077 UART: [ldev] SUBJECT.KEYID = 5
6,020,303 UART: [ldev] AUTHORITY.KEYID = 7
6,021,545 UART: [ldev] FE.KEYID = 1
6,058,674 UART: [ldev] Erasing FE.KEYID = 1
8,565,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,353 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,318,188 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,334,078 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,349,814 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,371,934 UART: [ldev] --
10,377,848 UART: [fwproc] Wait for Commands...
10,379,480 UART: [fwproc] Recv command 0x46574c44
10,381,478 UART: [fwproc] Recv'd Img size: 114888 bytes
13,828,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,908,597 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,968,816 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,296,991 >>> mbox cmd response: success
14,301,461 UART: [afmc] ++
14,302,075 UART: [afmc] CDI.KEYID = 6
14,303,019 UART: [afmc] SUBJECT.KEYID = 7
14,304,303 UART: [afmc] AUTHORITY.KEYID = 5
16,836,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,580,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,582,481 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,598,450 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,614,297 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,630,053 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,654,207 UART: [afmc] --
18,657,691 UART: [cold-reset] --
18,662,327 UART: [state] Locking Datavault
18,668,449 UART: [state] Locking PCR0, PCR1 and PCR31
18,670,180 UART: [state] Locking ICCM
18,672,768 UART: [exit] Launching FMC @ 0x40000000
18,681,126 UART:
18,681,379 UART: Running Caliptra FMC ...
18,682,526 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,461,031 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,187,609 >>> mbox cmd response: success
18,468,576 UART:
18,468,986 UART: Running Caliptra FMC ...
18,470,167 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
191,872 UART:
192,269 UART: Running Caliptra ROM ...
193,484 UART:
603,065 UART: [state] CFI Enabled
617,610 UART: [state] LifecycleState = Unprovisioned
619,525 UART: [state] DebugLocked = Yes
622,263 UART: [state] Starting the WD Timer 40000000 cycles
627,107 UART: [kat] SHA2-256
806,781 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,554 UART: [kat] ++
818,035 UART: [kat] sha1
829,000 UART: [kat] SHA2-256
831,683 UART: [kat] SHA2-384
837,628 UART: [kat] SHA2-512-ACC
839,991 UART: [kat] ECC-384
3,283,274 UART: [kat] HMAC-384Kdf
3,295,796 UART: [kat] LMS
3,772,312 UART: [kat] --
3,775,026 UART: [cold-reset] ++
3,776,038 UART: [fht] FHT @ 0x50003400
3,787,845 UART: [idev] ++
3,788,407 UART: [idev] CDI.KEYID = 6
3,789,364 UART: [idev] SUBJECT.KEYID = 7
3,790,618 UART: [idev] UDS.KEYID = 0
3,793,757 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,938,275 UART: [idev] Erasing UDS.KEYID = 0
6,267,563 UART: [idev] Sha1 KeyId Algorithm
6,290,211 UART: [idev] --
6,295,397 UART: [ldev] ++
6,295,967 UART: [ldev] CDI.KEYID = 6
6,296,984 UART: [ldev] SUBJECT.KEYID = 5
6,298,144 UART: [ldev] AUTHORITY.KEYID = 7
6,299,369 UART: [ldev] FE.KEYID = 1
6,308,877 UART: [ldev] Erasing FE.KEYID = 1
8,784,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,495 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,518,285 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,534,134 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,549,885 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,571,741 UART: [ldev] --
10,577,557 UART: [fwproc] Wait for Commands...
10,580,253 UART: [fwproc] Recv command 0x46574c44
10,582,298 UART: [fwproc] Recv'd Img size: 114888 bytes
14,023,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,889 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,160,087 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,487,946 >>> mbox cmd response: success
14,491,867 UART: [afmc] ++
14,492,488 UART: [afmc] CDI.KEYID = 6
14,493,449 UART: [afmc] SUBJECT.KEYID = 7
14,494,738 UART: [afmc] AUTHORITY.KEYID = 5
16,998,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,346 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,739,324 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,755,207 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,770,947 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,795,268 UART: [afmc] --
18,799,286 UART: [cold-reset] --
18,803,285 UART: [state] Locking Datavault
18,808,417 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,168 UART: [state] Locking ICCM
18,812,809 UART: [exit] Launching FMC @ 0x40000000
18,821,161 UART:
18,821,408 UART: Running Caliptra FMC ...
18,822,551 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,780,759 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,365,245 >>> mbox cmd response: success
18,614,034 UART:
18,614,408 UART: Running Caliptra FMC ...
18,615,650 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,239 UART: [state] DebugLocked = Yes
86,941 UART: [state] Starting the WD Timer 40000000 cycles
88,584 UART: [kat] SHA2-256
892,134 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,238 UART: [kat] ++
896,390 UART: [kat] sha1
900,660 UART: [kat] SHA2-256
902,600 UART: [kat] SHA2-384
905,325 UART: [kat] SHA2-512-ACC
907,226 UART: [kat] ECC-384
917,219 UART: [kat] HMAC-384Kdf
921,983 UART: [kat] LMS
1,170,295 UART: [kat] --
1,171,362 UART: [cold-reset] ++
1,171,711 UART: [fht] FHT @ 0x50003400
1,174,271 UART: [idev] ++
1,174,439 UART: [idev] CDI.KEYID = 6
1,174,800 UART: [idev] SUBJECT.KEYID = 7
1,175,225 UART: [idev] UDS.KEYID = 0
1,175,571 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,771 UART: [idev] Erasing UDS.KEYID = 0
1,200,120 UART: [idev] Sha1 KeyId Algorithm
1,209,141 UART: [idev] --
1,210,206 UART: [ldev] ++
1,210,374 UART: [ldev] CDI.KEYID = 6
1,210,738 UART: [ldev] SUBJECT.KEYID = 5
1,211,165 UART: [ldev] AUTHORITY.KEYID = 7
1,211,628 UART: [ldev] FE.KEYID = 1
1,216,784 UART: [ldev] Erasing FE.KEYID = 1
1,243,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,559 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,253 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,123 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,829 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,991 UART: [ldev] --
1,282,442 UART: [fwproc] Wait for Commands...
1,283,075 UART: [fwproc] Recv command 0x46574c44
1,283,808 UART: [fwproc] Recv'd Img size: 114888 bytes
2,588,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,026 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,711 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,781,063 >>> mbox cmd response: success
2,782,290 UART: [afmc] ++
2,782,458 UART: [afmc] CDI.KEYID = 6
2,782,821 UART: [afmc] SUBJECT.KEYID = 7
2,783,247 UART: [afmc] AUTHORITY.KEYID = 5
2,818,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,511 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,841,224 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,847,095 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,852,805 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,860,616 UART: [afmc] --
2,861,564 UART: [cold-reset] --
2,862,352 UART: [state] Locking Datavault
2,863,551 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,155 UART: [state] Locking ICCM
2,864,597 UART: [exit] Launching FMC @ 0x40000000
2,869,894 UART:
2,869,910 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,667 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,460 >>> mbox cmd response: success
2,692,873 UART:
2,692,889 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,702 UART: [state] DebugLocked = Yes
86,442 UART: [state] Starting the WD Timer 40000000 cycles
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
900,263 UART: [kat] SHA2-256
902,203 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,494 UART: [kat] HMAC-384Kdf
921,268 UART: [kat] LMS
1,169,580 UART: [kat] --
1,170,625 UART: [cold-reset] ++
1,171,024 UART: [fht] FHT @ 0x50003400
1,173,580 UART: [idev] ++
1,173,748 UART: [idev] CDI.KEYID = 6
1,174,109 UART: [idev] SUBJECT.KEYID = 7
1,174,534 UART: [idev] UDS.KEYID = 0
1,174,880 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,440 UART: [idev] Erasing UDS.KEYID = 0
1,199,619 UART: [idev] Sha1 KeyId Algorithm
1,208,498 UART: [idev] --
1,209,469 UART: [ldev] ++
1,209,637 UART: [ldev] CDI.KEYID = 6
1,210,001 UART: [ldev] SUBJECT.KEYID = 5
1,210,428 UART: [ldev] AUTHORITY.KEYID = 7
1,210,891 UART: [ldev] FE.KEYID = 1
1,216,251 UART: [ldev] Erasing FE.KEYID = 1
1,242,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,434 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,128 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,998 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,704 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,862 UART: [ldev] --
1,282,229 UART: [fwproc] Wait for Commands...
1,282,804 UART: [fwproc] Recv command 0x46574c44
1,283,537 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,731 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,416 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,718 >>> mbox cmd response: success
2,781,739 UART: [afmc] ++
2,781,907 UART: [afmc] CDI.KEYID = 6
2,782,270 UART: [afmc] SUBJECT.KEYID = 7
2,782,696 UART: [afmc] AUTHORITY.KEYID = 5
2,818,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,148 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,840,861 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,846,732 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,852,442 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,860,359 UART: [afmc] --
2,861,363 UART: [cold-reset] --
2,862,185 UART: [state] Locking Datavault
2,863,200 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,804 UART: [state] Locking ICCM
2,864,270 UART: [exit] Launching FMC @ 0x40000000
2,869,567 UART:
2,869,583 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,244 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,401 >>> mbox cmd response: success
2,696,306 UART:
2,696,322 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,877 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = Yes
86,099 UART: [state] Starting the WD Timer 40000000 cycles
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,866 UART: [kat] SHA2-256
901,806 UART: [kat] SHA2-384
904,433 UART: [kat] SHA2-512-ACC
906,334 UART: [kat] ECC-384
915,757 UART: [kat] HMAC-384Kdf
920,139 UART: [kat] LMS
1,168,451 UART: [kat] --
1,169,094 UART: [cold-reset] ++
1,169,569 UART: [fht] FHT @ 0x50003400
1,172,249 UART: [idev] ++
1,172,417 UART: [idev] CDI.KEYID = 6
1,172,778 UART: [idev] SUBJECT.KEYID = 7
1,173,203 UART: [idev] UDS.KEYID = 0
1,173,549 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,631 UART: [idev] Erasing UDS.KEYID = 0
1,198,602 UART: [idev] Sha1 KeyId Algorithm
1,207,483 UART: [idev] --
1,208,512 UART: [ldev] ++
1,208,680 UART: [ldev] CDI.KEYID = 6
1,209,044 UART: [ldev] SUBJECT.KEYID = 5
1,209,471 UART: [ldev] AUTHORITY.KEYID = 7
1,209,934 UART: [ldev] FE.KEYID = 1
1,215,336 UART: [ldev] Erasing FE.KEYID = 1
1,241,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,311 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,005 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,875 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,581 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,699 UART: [ldev] --
1,281,072 UART: [fwproc] Wait for Commands...
1,281,773 UART: [fwproc] Recv command 0x46574c44
1,282,506 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,176 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,861 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,051 >>> mbox cmd response: success
2,779,190 UART: [afmc] ++
2,779,358 UART: [afmc] CDI.KEYID = 6
2,779,721 UART: [afmc] SUBJECT.KEYID = 7
2,780,147 UART: [afmc] AUTHORITY.KEYID = 5
2,814,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,133 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,837,846 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,843,717 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,849,427 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,857,110 UART: [afmc] --
2,857,932 UART: [cold-reset] --
2,858,780 UART: [state] Locking Datavault
2,860,071 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,675 UART: [state] Locking ICCM
2,861,341 UART: [exit] Launching FMC @ 0x40000000
2,866,638 UART:
2,866,654 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,453 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,314 >>> mbox cmd response: success
2,694,607 UART:
2,694,623 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,730 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = Yes
87,052 UART: [state] Starting the WD Timer 40000000 cycles
88,669 UART: [kat] SHA2-256
892,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,323 UART: [kat] ++
896,475 UART: [kat] sha1
900,873 UART: [kat] SHA2-256
902,813 UART: [kat] SHA2-384
905,674 UART: [kat] SHA2-512-ACC
907,575 UART: [kat] ECC-384
917,770 UART: [kat] HMAC-384Kdf
922,270 UART: [kat] LMS
1,170,582 UART: [kat] --
1,171,551 UART: [cold-reset] ++
1,172,028 UART: [fht] FHT @ 0x50003400
1,174,850 UART: [idev] ++
1,175,018 UART: [idev] CDI.KEYID = 6
1,175,379 UART: [idev] SUBJECT.KEYID = 7
1,175,804 UART: [idev] UDS.KEYID = 0
1,176,150 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,183,384 UART: [idev] Erasing UDS.KEYID = 0
1,200,177 UART: [idev] Sha1 KeyId Algorithm
1,209,032 UART: [idev] --
1,210,097 UART: [ldev] ++
1,210,265 UART: [ldev] CDI.KEYID = 6
1,210,629 UART: [ldev] SUBJECT.KEYID = 5
1,211,056 UART: [ldev] AUTHORITY.KEYID = 7
1,211,519 UART: [ldev] FE.KEYID = 1
1,216,793 UART: [ldev] Erasing FE.KEYID = 1
1,243,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,952 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,646 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,516 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,222 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,222 UART: [ldev] --
1,282,559 UART: [fwproc] Wait for Commands...
1,283,178 UART: [fwproc] Recv command 0x46574c44
1,283,911 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,429 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,114 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,374 >>> mbox cmd response: success
2,779,609 UART: [afmc] ++
2,779,777 UART: [afmc] CDI.KEYID = 6
2,780,140 UART: [afmc] SUBJECT.KEYID = 7
2,780,566 UART: [afmc] AUTHORITY.KEYID = 5
2,815,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,555 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,304 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,838,017 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,843,888 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,849,598 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,857,415 UART: [afmc] --
2,858,289 UART: [cold-reset] --
2,859,213 UART: [state] Locking Datavault
2,860,356 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,960 UART: [state] Locking ICCM
2,861,496 UART: [exit] Launching FMC @ 0x40000000
2,866,793 UART:
2,866,809 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,062 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,829 >>> mbox cmd response: success
2,694,858 UART:
2,694,874 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,999 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = Yes
86,401 UART: [state] Starting the WD Timer 40000000 cycles
87,968 UART: [kat] SHA2-256
891,518 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,622 UART: [kat] ++
895,774 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,563 UART: [kat] LMS
1,168,875 UART: [kat] --
1,169,910 UART: [cold-reset] ++
1,170,463 UART: [fht] FHT @ 0x50003400
1,173,143 UART: [idev] ++
1,173,311 UART: [idev] CDI.KEYID = 6
1,173,672 UART: [idev] SUBJECT.KEYID = 7
1,174,097 UART: [idev] UDS.KEYID = 0
1,174,443 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,199 UART: [idev] Erasing UDS.KEYID = 0
1,199,324 UART: [idev] Sha1 KeyId Algorithm
1,208,343 UART: [idev] --
1,209,338 UART: [ldev] ++
1,209,506 UART: [ldev] CDI.KEYID = 6
1,209,870 UART: [ldev] SUBJECT.KEYID = 5
1,210,297 UART: [ldev] AUTHORITY.KEYID = 7
1,210,760 UART: [ldev] FE.KEYID = 1
1,215,838 UART: [ldev] Erasing FE.KEYID = 1
1,242,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,395 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,089 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,959 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,665 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,765 UART: [ldev] --
1,281,218 UART: [fwproc] Wait for Commands...
1,281,921 UART: [fwproc] Recv command 0x46574c44
1,282,654 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,048 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,733 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,903 >>> mbox cmd response: success
2,781,116 UART: [afmc] ++
2,781,284 UART: [afmc] CDI.KEYID = 6
2,781,647 UART: [afmc] SUBJECT.KEYID = 7
2,782,073 UART: [afmc] AUTHORITY.KEYID = 5
2,817,593 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,792 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,541 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,840,254 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,846,125 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,851,835 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,859,376 UART: [afmc] --
2,860,314 UART: [cold-reset] --
2,860,854 UART: [state] Locking Datavault
2,862,109 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,713 UART: [state] Locking ICCM
2,863,219 UART: [exit] Launching FMC @ 0x40000000
2,868,516 UART:
2,868,532 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,485 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,390 >>> mbox cmd response: success
2,693,267 UART:
2,693,283 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = Yes
86,682 UART: [state] Starting the WD Timer 40000000 cycles
88,353 UART: [kat] SHA2-256
891,903 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,007 UART: [kat] ++
896,159 UART: [kat] sha1
900,303 UART: [kat] SHA2-256
902,243 UART: [kat] SHA2-384
905,088 UART: [kat] SHA2-512-ACC
906,989 UART: [kat] ECC-384
916,850 UART: [kat] HMAC-384Kdf
921,456 UART: [kat] LMS
1,169,768 UART: [kat] --
1,170,925 UART: [cold-reset] ++
1,171,480 UART: [fht] FHT @ 0x50003400
1,174,186 UART: [idev] ++
1,174,354 UART: [idev] CDI.KEYID = 6
1,174,715 UART: [idev] SUBJECT.KEYID = 7
1,175,140 UART: [idev] UDS.KEYID = 0
1,175,486 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,956 UART: [idev] Erasing UDS.KEYID = 0
1,200,167 UART: [idev] Sha1 KeyId Algorithm
1,209,106 UART: [idev] --
1,210,021 UART: [ldev] ++
1,210,189 UART: [ldev] CDI.KEYID = 6
1,210,553 UART: [ldev] SUBJECT.KEYID = 5
1,210,980 UART: [ldev] AUTHORITY.KEYID = 7
1,211,443 UART: [ldev] FE.KEYID = 1
1,217,045 UART: [ldev] Erasing FE.KEYID = 1
1,243,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,004 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,698 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,568 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,274 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,464 UART: [ldev] --
1,282,789 UART: [fwproc] Wait for Commands...
1,283,530 UART: [fwproc] Recv command 0x46574c44
1,284,263 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,837 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,522 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,754 >>> mbox cmd response: success
2,779,861 UART: [afmc] ++
2,780,029 UART: [afmc] CDI.KEYID = 6
2,780,392 UART: [afmc] SUBJECT.KEYID = 7
2,780,818 UART: [afmc] AUTHORITY.KEYID = 5
2,816,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,718 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,839,431 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,845,302 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,851,012 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,858,791 UART: [afmc] --
2,859,605 UART: [cold-reset] --
2,860,765 UART: [state] Locking Datavault
2,861,900 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,504 UART: [state] Locking ICCM
2,862,970 UART: [exit] Launching FMC @ 0x40000000
2,868,267 UART:
2,868,283 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,348 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,041 >>> mbox cmd response: success
2,695,172 UART:
2,695,188 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
191,975 UART:
192,330 UART: Running Caliptra ROM ...
193,543 UART:
193,706 UART: [state] CFI Enabled
262,519 UART: [state] LifecycleState = Unprovisioned
264,426 UART: [state] DebugLocked = No
266,127 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,298 UART:
192,680 UART: Running Caliptra ROM ...
193,875 UART:
603,685 UART: [state] CFI Enabled
616,779 UART: [state] LifecycleState = Unprovisioned
618,711 UART: [state] DebugLocked = No
621,271 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,636 UART: [state] LifecycleState = Unprovisioned
85,291 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
192,003 UART:
192,408 UART: Running Caliptra ROM ...
193,499 UART:
193,647 UART: [state] CFI Enabled
261,973 UART: [state] LifecycleState = Unprovisioned
263,920 UART: [state] DebugLocked = No
265,817 UART: [state] WD Timer not started. Device not locked for debugging
270,299 UART: [kat] SHA2-256
449,934 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,730 UART: [kat] ++
461,188 UART: [kat] sha1
472,445 UART: [kat] SHA2-256
475,147 UART: [kat] SHA2-384
480,965 UART: [kat] SHA2-512-ACC
483,364 UART: [kat] ECC-384
2,944,924 UART: [kat] HMAC-384Kdf
2,969,117 UART: [kat] LMS
3,445,572 UART: [kat] --
3,448,968 UART: [cold-reset] ++
3,451,011 UART: [fht] FHT @ 0x50003400
3,462,805 UART: [idev] ++
3,463,411 UART: [idev] CDI.KEYID = 6
3,464,344 UART: [idev] SUBJECT.KEYID = 7
3,465,566 UART: [idev] UDS.KEYID = 0
3,500,071 UART: [idev] Erasing UDS.KEYID = 0
5,987,170 UART: [idev] Sha1 KeyId Algorithm
6,012,760 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,740,921 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,756,798 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,772,764 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,788,392 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,814,389 UART: [idev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
7,969,234 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
7,969,894 UART: [idev] --
7,974,248 UART: [ldev] ++
7,974,831 UART: [ldev] CDI.KEYID = 6
7,975,721 UART: [ldev] SUBJECT.KEYID = 5
7,976,940 UART: [ldev] AUTHORITY.KEYID = 7
7,978,233 UART: [ldev] FE.KEYID = 1
8,017,166 UART: [ldev] Erasing FE.KEYID = 1
10,521,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,259,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,275,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,291,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,307,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,328,781 UART: [ldev] --
12,335,030 UART: [fwproc] Wait for Commands...
12,336,382 UART: [fwproc] Recv command 0x49444352
12,352,552 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
7,763,678 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,068,308 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,503 UART:
192,892 UART: Running Caliptra ROM ...
193,974 UART:
603,563 UART: [state] CFI Enabled
619,611 UART: [state] LifecycleState = Unprovisioned
621,530 UART: [state] DebugLocked = No
623,173 UART: [state] WD Timer not started. Device not locked for debugging
626,998 UART: [kat] SHA2-256
806,681 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,451 UART: [kat] ++
817,982 UART: [kat] sha1
828,866 UART: [kat] SHA2-256
831,573 UART: [kat] SHA2-384
837,208 UART: [kat] SHA2-512-ACC
839,607 UART: [kat] ECC-384
3,281,341 UART: [kat] HMAC-384Kdf
3,292,065 UART: [kat] LMS
3,768,594 UART: [kat] --
3,774,495 UART: [cold-reset] ++
3,777,023 UART: [fht] FHT @ 0x50003400
3,788,434 UART: [idev] ++
3,789,005 UART: [idev] CDI.KEYID = 6
3,789,974 UART: [idev] SUBJECT.KEYID = 7
3,791,189 UART: [idev] UDS.KEYID = 0
3,807,714 UART: [idev] Erasing UDS.KEYID = 0
6,267,376 UART: [idev] Sha1 KeyId Algorithm
6,292,962 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,011,334 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,027,211 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,043,168 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,058,813 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,084,835 UART: [idev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
8,239,516 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,240,245 UART: [idev] --
8,244,663 UART: [ldev] ++
8,245,285 UART: [ldev] CDI.KEYID = 6
8,246,190 UART: [ldev] SUBJECT.KEYID = 5
8,247,404 UART: [ldev] AUTHORITY.KEYID = 7
8,248,691 UART: [ldev] FE.KEYID = 1
8,259,421 UART: [ldev] Erasing FE.KEYID = 1
10,735,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,454,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,470,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,486,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,501,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,523,143 UART: [ldev] --
12,527,822 UART: [fwproc] Wait for Commands...
12,530,245 UART: [fwproc] Recv command 0x49444352
12,546,445 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
8,016,492 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,248,982 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
891,240 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,557 UART: [kat] SHA2-512-ACC
906,458 UART: [kat] ECC-384
915,909 UART: [kat] HMAC-384Kdf
920,587 UART: [kat] LMS
1,168,899 UART: [kat] --
1,169,788 UART: [cold-reset] ++
1,170,254 UART: [fht] FHT @ 0x50003400
1,172,902 UART: [idev] ++
1,173,070 UART: [idev] CDI.KEYID = 6
1,173,431 UART: [idev] SUBJECT.KEYID = 7
1,173,856 UART: [idev] UDS.KEYID = 0
1,181,857 UART: [idev] Erasing UDS.KEYID = 0
1,199,125 UART: [idev] Sha1 KeyId Algorithm
1,208,871 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,443 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,151 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,036 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,742 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,171 UART: [idev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
1,299,380 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,549 UART: [idev] --
1,300,616 UART: [ldev] ++
1,300,784 UART: [ldev] CDI.KEYID = 6
1,301,148 UART: [ldev] SUBJECT.KEYID = 5
1,301,575 UART: [ldev] AUTHORITY.KEYID = 7
1,302,038 UART: [ldev] FE.KEYID = 1
1,307,356 UART: [ldev] Erasing FE.KEYID = 1
1,333,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,010 UART: [ldev] --
1,372,413 UART: [fwproc] Wait for Commands...
1,372,994 UART: [fwproc] Recv command 0x49444352
1,378,117 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,107 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,162,526 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
916,184 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,170,197 UART: [cold-reset] ++
1,170,629 UART: [fht] FHT @ 0x50003400
1,173,405 UART: [idev] ++
1,173,573 UART: [idev] CDI.KEYID = 6
1,173,934 UART: [idev] SUBJECT.KEYID = 7
1,174,359 UART: [idev] UDS.KEYID = 0
1,182,616 UART: [idev] Erasing UDS.KEYID = 0
1,199,100 UART: [idev] Sha1 KeyId Algorithm
1,208,922 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,546 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,254 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,139 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,845 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,274 UART: [idev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
1,299,483 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,652 UART: [idev] --
1,300,451 UART: [ldev] ++
1,300,619 UART: [ldev] CDI.KEYID = 6
1,300,983 UART: [ldev] SUBJECT.KEYID = 5
1,301,410 UART: [ldev] AUTHORITY.KEYID = 7
1,301,873 UART: [ldev] FE.KEYID = 1
1,306,969 UART: [ldev] Erasing FE.KEYID = 1
1,334,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,533 UART: [ldev] --
1,373,742 UART: [fwproc] Wait for Commands...
1,374,349 UART: [fwproc] Recv command 0x49444352
1,379,472 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,220 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,163,007 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,668 UART: [kat] SHA2-256
901,608 UART: [kat] SHA2-384
904,521 UART: [kat] SHA2-512-ACC
906,422 UART: [kat] ECC-384
916,211 UART: [kat] HMAC-384Kdf
920,699 UART: [kat] LMS
1,169,011 UART: [kat] --
1,169,758 UART: [cold-reset] ++
1,170,176 UART: [fht] FHT @ 0x50003400
1,172,688 UART: [idev] ++
1,172,856 UART: [idev] CDI.KEYID = 6
1,173,217 UART: [idev] SUBJECT.KEYID = 7
1,173,642 UART: [idev] UDS.KEYID = 0
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,957 UART: [idev] Sha1 KeyId Algorithm
1,208,647 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,939 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,647 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,532 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,238 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,667 UART: [idev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
1,298,876 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,045 UART: [idev] --
1,300,254 UART: [ldev] ++
1,300,422 UART: [ldev] CDI.KEYID = 6
1,300,786 UART: [ldev] SUBJECT.KEYID = 5
1,301,213 UART: [ldev] AUTHORITY.KEYID = 7
1,301,676 UART: [ldev] FE.KEYID = 1
1,306,878 UART: [ldev] Erasing FE.KEYID = 1
1,333,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,152 UART: [ldev] --
1,372,383 UART: [fwproc] Wait for Commands...
1,373,040 UART: [fwproc] Recv command 0x49444352
1,378,163 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,603 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,161,000 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
891,513 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
899,999 UART: [kat] SHA2-256
901,939 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,756 UART: [kat] LMS
1,169,068 UART: [kat] --
1,170,057 UART: [cold-reset] ++
1,170,591 UART: [fht] FHT @ 0x50003400
1,173,311 UART: [idev] ++
1,173,479 UART: [idev] CDI.KEYID = 6
1,173,840 UART: [idev] SUBJECT.KEYID = 7
1,174,265 UART: [idev] UDS.KEYID = 0
1,181,982 UART: [idev] Erasing UDS.KEYID = 0
1,198,684 UART: [idev] Sha1 KeyId Algorithm
1,208,324 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,024 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,732 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,617 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,323 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,752 UART: [idev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
1,298,961 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,130 UART: [idev] --
1,300,087 UART: [ldev] ++
1,300,255 UART: [ldev] CDI.KEYID = 6
1,300,619 UART: [ldev] SUBJECT.KEYID = 5
1,301,046 UART: [ldev] AUTHORITY.KEYID = 7
1,301,509 UART: [ldev] FE.KEYID = 1
1,306,861 UART: [ldev] Erasing FE.KEYID = 1
1,333,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,549 UART: [ldev] --
1,372,968 UART: [fwproc] Wait for Commands...
1,373,729 UART: [fwproc] Recv command 0x49444352
1,378,852 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,784 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,164,687 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
891,304 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,199 UART: [kat] HMAC-384Kdf
920,743 UART: [kat] LMS
1,169,055 UART: [kat] --
1,169,926 UART: [cold-reset] ++
1,170,460 UART: [fht] FHT @ 0x50003400
1,172,960 UART: [idev] ++
1,173,128 UART: [idev] CDI.KEYID = 6
1,173,489 UART: [idev] SUBJECT.KEYID = 7
1,173,914 UART: [idev] UDS.KEYID = 0
1,181,575 UART: [idev] Erasing UDS.KEYID = 0
1,198,119 UART: [idev] Sha1 KeyId Algorithm
1,207,783 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,275 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,223,983 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,229,868 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,574 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,003 UART: [idev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
1,298,212 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,298,381 UART: [idev] --
1,299,446 UART: [ldev] ++
1,299,614 UART: [ldev] CDI.KEYID = 6
1,299,978 UART: [ldev] SUBJECT.KEYID = 5
1,300,405 UART: [ldev] AUTHORITY.KEYID = 7
1,300,868 UART: [ldev] FE.KEYID = 1
1,306,208 UART: [ldev] Erasing FE.KEYID = 1
1,332,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,106 UART: [ldev] --
1,371,559 UART: [fwproc] Wait for Commands...
1,372,188 UART: [fwproc] Recv command 0x49444352
1,377,311 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,857 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,161,776 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
891,699 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,803 UART: [kat] ++
895,955 UART: [kat] sha1
900,187 UART: [kat] SHA2-256
902,127 UART: [kat] SHA2-384
905,102 UART: [kat] SHA2-512-ACC
907,003 UART: [kat] ECC-384
917,100 UART: [kat] HMAC-384Kdf
921,628 UART: [kat] LMS
1,169,940 UART: [kat] --
1,170,759 UART: [cold-reset] ++
1,171,209 UART: [fht] FHT @ 0x50003400
1,173,841 UART: [idev] ++
1,174,009 UART: [idev] CDI.KEYID = 6
1,174,370 UART: [idev] SUBJECT.KEYID = 7
1,174,795 UART: [idev] UDS.KEYID = 0
1,182,932 UART: [idev] Erasing UDS.KEYID = 0
1,199,868 UART: [idev] Sha1 KeyId Algorithm
1,209,426 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,196 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,904 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,789 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,495 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,924 UART: [idev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
1,300,133 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,302 UART: [idev] --
1,301,327 UART: [ldev] ++
1,301,495 UART: [ldev] CDI.KEYID = 6
1,301,859 UART: [ldev] SUBJECT.KEYID = 5
1,302,286 UART: [ldev] AUTHORITY.KEYID = 7
1,302,749 UART: [ldev] FE.KEYID = 1
1,308,039 UART: [ldev] Erasing FE.KEYID = 1
1,334,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,123 UART: [ldev] --
1,373,486 UART: [fwproc] Wait for Commands...
1,374,223 UART: [fwproc] Recv command 0x49444352
1,379,346 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,936 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,165,351 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,099 UART:
192,475 UART: Running Caliptra ROM ...
193,657 UART:
193,816 UART: [state] CFI Enabled
264,541 UART: [state] LifecycleState = Unprovisioned
266,522 UART: [state] DebugLocked = No
268,886 UART: [state] WD Timer not started. Device not locked for debugging
272,131 UART: [kat] SHA2-256
451,752 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,520 UART: [kat] ++
463,028 UART: [kat] sha1
474,825 UART: [kat] SHA2-256
477,514 UART: [kat] SHA2-384
482,797 UART: [kat] SHA2-512-ACC
485,192 UART: [kat] ECC-384
2,947,731 UART: [kat] HMAC-384Kdf
2,972,495 UART: [kat] LMS
3,448,965 UART: [kat] --
3,454,256 UART: [cold-reset] ++
3,455,221 UART: [fht] FHT @ 0x50003400
3,467,447 UART: [idev] ++
3,468,016 UART: [idev] CDI.KEYID = 6
3,469,042 UART: [idev] SUBJECT.KEYID = 7
3,470,262 UART: [idev] UDS.KEYID = 0
3,471,280 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,501,675 UART: [idev] Erasing UDS.KEYID = 0
5,987,413 UART: [idev] Sha1 KeyId Algorithm
6,011,627 UART: [idev] --
6,017,156 UART: [ldev] ++
6,017,746 UART: [ldev] CDI.KEYID = 6
6,018,670 UART: [ldev] SUBJECT.KEYID = 5
6,019,841 UART: [ldev] AUTHORITY.KEYID = 7
6,021,138 UART: [ldev] FE.KEYID = 1
6,058,227 UART: [ldev] Erasing FE.KEYID = 1
8,564,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,828 UART: [ldev] --
10,374,427 UART: [fwproc] Wait for Commands...
10,377,336 UART: [fwproc] Recv command 0x49444352
10,384,956 UART: ROM Fatal Error: 0x0102000A
10,388,167 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,459,406 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,272,638 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,564 UART:
192,950 UART: Running Caliptra ROM ...
194,050 UART:
603,933 UART: [state] CFI Enabled
620,362 UART: [state] LifecycleState = Unprovisioned
622,267 UART: [state] DebugLocked = No
623,860 UART: [state] WD Timer not started. Device not locked for debugging
627,578 UART: [kat] SHA2-256
807,254 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,993 UART: [kat] ++
818,517 UART: [kat] sha1
829,334 UART: [kat] SHA2-256
832,071 UART: [kat] SHA2-384
838,404 UART: [kat] SHA2-512-ACC
840,772 UART: [kat] ECC-384
3,282,620 UART: [kat] HMAC-384Kdf
3,295,070 UART: [kat] LMS
3,771,596 UART: [kat] --
3,777,504 UART: [cold-reset] ++
3,779,215 UART: [fht] FHT @ 0x50003400
3,788,956 UART: [idev] ++
3,789,575 UART: [idev] CDI.KEYID = 6
3,790,486 UART: [idev] SUBJECT.KEYID = 7
3,791,753 UART: [idev] UDS.KEYID = 0
3,792,965 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,809,365 UART: [idev] Erasing UDS.KEYID = 0
6,271,450 UART: [idev] Sha1 KeyId Algorithm
6,295,626 UART: [idev] --
6,301,945 UART: [ldev] ++
6,302,516 UART: [ldev] CDI.KEYID = 6
6,303,598 UART: [ldev] SUBJECT.KEYID = 5
6,304,705 UART: [ldev] AUTHORITY.KEYID = 7
6,305,878 UART: [ldev] FE.KEYID = 1
6,317,447 UART: [ldev] Erasing FE.KEYID = 1
8,792,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,916 UART: [ldev] --
10,588,100 UART: [fwproc] Wait for Commands...
10,591,013 UART: [fwproc] Recv command 0x49444352
10,597,912 UART: ROM Fatal Error: 0x0102000A
10,601,126 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
3,782,411 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,493,896 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,544 UART: [state] LifecycleState = Unprovisioned
86,199 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
891,418 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,049 UART: [kat] HMAC-384Kdf
920,479 UART: [kat] LMS
1,168,791 UART: [kat] --
1,169,632 UART: [cold-reset] ++
1,169,980 UART: [fht] FHT @ 0x50003400
1,172,754 UART: [idev] ++
1,172,922 UART: [idev] CDI.KEYID = 6
1,173,283 UART: [idev] SUBJECT.KEYID = 7
1,173,708 UART: [idev] UDS.KEYID = 0
1,174,054 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,199,007 UART: [idev] Sha1 KeyId Algorithm
1,207,993 UART: [idev] --
1,208,948 UART: [ldev] ++
1,209,116 UART: [ldev] CDI.KEYID = 6
1,209,480 UART: [ldev] SUBJECT.KEYID = 5
1,209,907 UART: [ldev] AUTHORITY.KEYID = 7
1,210,370 UART: [ldev] FE.KEYID = 1
1,215,412 UART: [ldev] Erasing FE.KEYID = 1
1,241,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,710 UART: [ldev] --
1,281,035 UART: [fwproc] Wait for Commands...
1,281,756 UART: [fwproc] Recv command 0x49444352
1,283,427 UART: ROM Fatal Error: 0x0102000A
1,284,588 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,632 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,141,072 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
891,633 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,737 UART: [kat] ++
895,889 UART: [kat] sha1
899,927 UART: [kat] SHA2-256
901,867 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,552 UART: [kat] LMS
1,168,864 UART: [kat] --
1,169,813 UART: [cold-reset] ++
1,170,279 UART: [fht] FHT @ 0x50003400
1,172,783 UART: [idev] ++
1,172,951 UART: [idev] CDI.KEYID = 6
1,173,312 UART: [idev] SUBJECT.KEYID = 7
1,173,737 UART: [idev] UDS.KEYID = 0
1,174,083 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,976 UART: [idev] Erasing UDS.KEYID = 0
1,199,192 UART: [idev] Sha1 KeyId Algorithm
1,208,078 UART: [idev] --
1,209,195 UART: [ldev] ++
1,209,363 UART: [ldev] CDI.KEYID = 6
1,209,727 UART: [ldev] SUBJECT.KEYID = 5
1,210,154 UART: [ldev] AUTHORITY.KEYID = 7
1,210,617 UART: [ldev] FE.KEYID = 1
1,215,827 UART: [ldev] Erasing FE.KEYID = 1
1,242,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,343 UART: [ldev] --
1,281,600 UART: [fwproc] Wait for Commands...
1,282,389 UART: [fwproc] Recv command 0x49444352
1,284,058 UART: ROM Fatal Error: 0x0102000A
1,285,219 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,687 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,139,577 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,218 UART: [kat] ++
895,370 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,527 UART: [kat] HMAC-384Kdf
921,163 UART: [kat] LMS
1,169,475 UART: [kat] --
1,170,218 UART: [cold-reset] ++
1,170,608 UART: [fht] FHT @ 0x50003400
1,173,248 UART: [idev] ++
1,173,416 UART: [idev] CDI.KEYID = 6
1,173,777 UART: [idev] SUBJECT.KEYID = 7
1,174,202 UART: [idev] UDS.KEYID = 0
1,174,548 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,117 UART: [idev] Erasing UDS.KEYID = 0
1,198,797 UART: [idev] Sha1 KeyId Algorithm
1,207,571 UART: [idev] --
1,208,670 UART: [ldev] ++
1,208,838 UART: [ldev] CDI.KEYID = 6
1,209,202 UART: [ldev] SUBJECT.KEYID = 5
1,209,629 UART: [ldev] AUTHORITY.KEYID = 7
1,210,092 UART: [ldev] FE.KEYID = 1
1,215,390 UART: [ldev] Erasing FE.KEYID = 1
1,241,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,502 UART: [ldev] --
1,280,883 UART: [fwproc] Wait for Commands...
1,281,680 UART: [fwproc] Recv command 0x49444352
1,283,393 UART: ROM Fatal Error: 0x0102000A
1,284,554 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,440 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,140,524 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
891,761 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,865 UART: [kat] ++
896,017 UART: [kat] sha1
900,157 UART: [kat] SHA2-256
902,097 UART: [kat] SHA2-384
904,932 UART: [kat] SHA2-512-ACC
906,833 UART: [kat] ECC-384
916,968 UART: [kat] HMAC-384Kdf
921,578 UART: [kat] LMS
1,169,890 UART: [kat] --
1,170,833 UART: [cold-reset] ++
1,171,255 UART: [fht] FHT @ 0x50003400
1,173,845 UART: [idev] ++
1,174,013 UART: [idev] CDI.KEYID = 6
1,174,374 UART: [idev] SUBJECT.KEYID = 7
1,174,799 UART: [idev] UDS.KEYID = 0
1,175,145 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,183,278 UART: [idev] Erasing UDS.KEYID = 0
1,200,548 UART: [idev] Sha1 KeyId Algorithm
1,209,360 UART: [idev] --
1,210,421 UART: [ldev] ++
1,210,589 UART: [ldev] CDI.KEYID = 6
1,210,953 UART: [ldev] SUBJECT.KEYID = 5
1,211,380 UART: [ldev] AUTHORITY.KEYID = 7
1,211,843 UART: [ldev] FE.KEYID = 1
1,217,433 UART: [ldev] Erasing FE.KEYID = 1
1,243,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,645 UART: [ldev] --
1,282,952 UART: [fwproc] Wait for Commands...
1,283,775 UART: [fwproc] Recv command 0x49444352
1,285,428 UART: ROM Fatal Error: 0x0102000A
1,286,589 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,073 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,140,531 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,625 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
899,872 UART: [kat] SHA2-256
901,812 UART: [kat] SHA2-384
904,605 UART: [kat] SHA2-512-ACC
906,506 UART: [kat] ECC-384
916,449 UART: [kat] HMAC-384Kdf
921,077 UART: [kat] LMS
1,169,389 UART: [kat] --
1,170,186 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,418 UART: [idev] ++
1,173,586 UART: [idev] CDI.KEYID = 6
1,173,947 UART: [idev] SUBJECT.KEYID = 7
1,174,372 UART: [idev] UDS.KEYID = 0
1,174,718 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,547 UART: [idev] Erasing UDS.KEYID = 0
1,199,557 UART: [idev] Sha1 KeyId Algorithm
1,208,375 UART: [idev] --
1,209,524 UART: [ldev] ++
1,209,692 UART: [ldev] CDI.KEYID = 6
1,210,056 UART: [ldev] SUBJECT.KEYID = 5
1,210,483 UART: [ldev] AUTHORITY.KEYID = 7
1,210,946 UART: [ldev] FE.KEYID = 1
1,216,104 UART: [ldev] Erasing FE.KEYID = 1
1,242,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,548 UART: [ldev] --
1,281,969 UART: [fwproc] Wait for Commands...
1,282,716 UART: [fwproc] Recv command 0x49444352
1,284,269 UART: ROM Fatal Error: 0x0102000A
1,285,430 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,022 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,140,672 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,675 UART: [kat] SHA2-256
901,615 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,799 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,172,857 UART: [idev] ++
1,173,025 UART: [idev] CDI.KEYID = 6
1,173,386 UART: [idev] SUBJECT.KEYID = 7
1,173,811 UART: [idev] UDS.KEYID = 0
1,174,157 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,842 UART: [idev] Erasing UDS.KEYID = 0
1,198,988 UART: [idev] Sha1 KeyId Algorithm
1,207,752 UART: [idev] --
1,208,929 UART: [ldev] ++
1,209,097 UART: [ldev] CDI.KEYID = 6
1,209,461 UART: [ldev] SUBJECT.KEYID = 5
1,209,888 UART: [ldev] AUTHORITY.KEYID = 7
1,210,351 UART: [ldev] FE.KEYID = 1
1,215,819 UART: [ldev] Erasing FE.KEYID = 1
1,241,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,791 UART: [ldev] --
1,281,230 UART: [fwproc] Wait for Commands...
1,281,903 UART: [fwproc] Recv command 0x49444352
1,283,428 UART: ROM Fatal Error: 0x0102000A
1,284,589 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,247 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,141,261 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,035 UART:
192,393 UART: Running Caliptra ROM ...
193,596 UART:
193,755 UART: [state] CFI Enabled
262,654 UART: [state] LifecycleState = Unprovisioned
264,633 UART: [state] DebugLocked = No
267,311 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,180 UART: [kat] SHA2-256
441,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,395 UART: [kat] ++
452,889 UART: [kat] sha1
463,184 UART: [kat] SHA2-256
465,888 UART: [kat] SHA2-384
470,962 UART: [kat] SHA2-512-ACC
473,327 UART: [kat] ECC-384
2,765,348 UART: [kat] HMAC-384Kdf
2,783,513 UART: [kat] LMS
3,973,823 UART: [kat] --
3,977,669 UART: [cold-reset] ++
3,979,366 UART: [fht] Storing FHT @ 0x50003400
3,991,362 UART: [idev] ++
3,991,927 UART: [idev] CDI.KEYID = 6
3,992,839 UART: [idev] SUBJECT.KEYID = 7
3,994,086 UART: [idev] UDS.KEYID = 0
3,995,174 ready_for_fw is high
3,995,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,144,617 UART: [idev] Erasing UDS.KEYID = 0
7,329,389 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,280 UART: [idev] --
7,354,411 UART: [ldev] ++
7,354,996 UART: [ldev] CDI.KEYID = 6
7,356,016 UART: [ldev] SUBJECT.KEYID = 5
7,357,179 UART: [ldev] AUTHORITY.KEYID = 7
7,358,412 UART: [ldev] FE.KEYID = 1
7,406,003 UART: [ldev] Erasing FE.KEYID = 1
10,739,593 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,571 UART: [ldev] --
13,120,866 UART: [fwproc] Waiting for Commands...
13,123,837 UART: [fwproc] Received command 0x46574c44
13,126,021 UART: [fwproc] Received Image of size 118548 bytes
17,229,683 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,249 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,377,421 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,439 >>> mbox cmd response: success
17,710,337 UART: [afmc] ++
17,710,982 UART: [afmc] CDI.KEYID = 6
17,711,902 UART: [afmc] SUBJECT.KEYID = 7
17,713,121 UART: [afmc] AUTHORITY.KEYID = 5
21,085,747 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,385,835 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,388,108 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,402,501 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,417,233 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,431,690 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,452,698 UART: [afmc] --
23,456,938 UART: [cold-reset] --
23,461,825 UART: [state] Locking Datavault
23,468,373 UART: [state] Locking PCR0, PCR1 and PCR31
23,470,127 UART: [state] Locking ICCM
23,471,342 UART: [exit] Launching FMC @ 0x40000130
23,479,739 UART:
23,479,972 UART: Running Caliptra FMC ...
23,481,073 UART:
23,481,236 UART: [state] CFI Enabled
23,543,932 UART: [fht] FMC Alias Private Key: 7
25,884,188 UART: [art] Extend RT PCRs Done
25,885,412 UART: [art] Lock RT PCRs Done
25,886,985 UART: [art] Populate DV Done
25,892,394 UART: [fht] FMC Alias Private Key: 7
25,893,942 UART: [art] Derive CDI
25,894,692 UART: [art] Store in slot 0x4
25,952,707 UART: [art] Derive Key Pair
25,953,699 UART: [art] Store priv key in slot 0x5
29,246,150 UART: [art] Derive Key Pair - Done
29,259,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,812 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,407 UART: [art] PUB.X = F297F0064C567784CE5CB396A58D56A6A913F86435AE1CE9847ADD2D6E9F786D8504397953D590256AADC57E120CAD84
31,556,617 UART: [art] PUB.Y = 59F0D7B70BE64CD7D49F31CE0DC73DA781B59FBCABD7DE68CA83E6F71C76ABEB231AEE3AAB23BE86B1679D0A0BDB176D
31,563,870 UART: [art] SIG.R = 46BB25F90AF9DFD68539EE4152A206A02D07BC4607BF3004567C8C6C37861064A90E30A6589FD390C13F947DACB50C3C
31,571,229 UART: [art] SIG.S = E315038C165295764C6455292BDFCADA4D677440860ED64DBD1F28EB11B6CEC86023049BA89A21273CC57A281579E5C5
32,876,536 UART: Caliptra RT
32,877,265 UART: [state] CFI Enabled
33,053,510 UART: [rt] RT listening for mailbox commands...
33,055,920 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,211,489 UART: [rt]cmd =0x41544d4e, len=14344
38,512,647 >>> mbox cmd response data (8 bytes)
38,513,279 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,544,091 UART: [rt]cmd =0x41545348, len=116
38,564,693 >>> mbox cmd response data (12 bytes)
40,646,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,797,063 UART:
40,797,427 UART: Running Caliptra ROM ...
40,798,483 UART:
40,798,641 UART: [state] CFI Enabled
40,867,789 UART: [state] LifecycleState = Unprovisioned
40,869,745 UART: [state] DebugLocked = No
40,871,348 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,876,866 UART: [kat] SHA2-256
41,046,555 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,057,047 UART: [kat] ++
41,057,509 UART: [kat] sha1
41,068,887 UART: [kat] SHA2-256
41,071,579 UART: [kat] SHA2-384
41,076,489 UART: [kat] SHA2-512-ACC
41,078,848 UART: [kat] ECC-384
43,371,989 UART: [kat] HMAC-384Kdf
43,402,818 UART: [kat] LMS
44,593,148 UART: [kat] --
44,596,632 UART: [update-reset] ++
48,794,929 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,798,884 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,196,670 >>> mbox cmd response: success
49,201,375 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,201,972 UART: [update-reset] Copying MAN_2 To MAN_1
49,220,607 UART: [update-reset Success] --
49,225,927 UART: [state] Locking Datavault
49,229,126 UART: [state] Locking PCR0, PCR1 and PCR31
49,230,827 UART: [state] Locking ICCM
49,233,602 UART: [exit] Launching FMC @ 0x40000130
49,242,055 UART:
49,242,294 UART: Running Caliptra FMC ...
49,243,321 UART:
49,243,468 UART: [state] CFI Enabled
49,344,390 UART: [art] Extend RT PCRs Done
49,345,613 UART: [art] Lock RT PCRs Done
49,347,156 UART: [art] Populate DV Done
49,352,779 UART: [fht] FMC Alias Private Key: 7
49,354,335 UART: [art] Derive CDI
49,355,100 UART: [art] Store in slot 0x4
49,413,120 UART: [art] Derive Key Pair
49,414,162 UART: [art] Store priv key in slot 0x5
52,706,118 UART: [art] Derive Key Pair - Done
52,718,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,007,893 UART: [art] Erasing AUTHORITY.KEYID = 7
55,009,417 UART: [art] PUB.X = 6D10F7CEFA48802702F7A15435BBEBC71A1CDBFC5600D32D474ED3A630B98AEB40BE383CD513239FD5FE48FAB088B95A
55,016,692 UART: [art] PUB.Y = 21C2EED648000A5B963E48D9C29D2FD636CD68054CFF51891665DAEEA6F24E0CF3DD9D2541AD3DC7C00E55F16FBEA525
55,023,949 UART: [art] SIG.R = 7C9477F80414ED1360927D3AA6E1C5A73F8E681FC124BB61EA5630ADCF304FEC45F10E3E57EBCE6A3B3328CA51D412DD
55,031,365 UART: [art] SIG.S = 483D5FC6A45C26532F46F6BBE81AD4B21265F00CFFDEF27A9CD8DC72346C067C2637102C2A82908258F429A7315D8D34
56,336,750 UART: Caliptra RT
56,337,466 UART: [state] CFI Enabled
56,752,678 UART: [rt] RT listening for mailbox commands...
56,784,679 UART: [rt]cmd =0x41545348, len=116
56,804,451 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.19s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,802,578 ready_for_fw is high
3,802,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,976,864 >>> mbox cmd response: success
23,670,121 UART:
23,670,526 UART: Running Caliptra FMC ...
23,671,670 UART:
23,671,831 UART: [state] CFI Enabled
23,737,653 UART: [fht] FMC Alias Private Key: 7
26,078,061 UART: [art] Extend RT PCRs Done
26,079,300 UART: [art] Lock RT PCRs Done
26,081,082 UART: [art] Populate DV Done
26,086,775 UART: [fht] FMC Alias Private Key: 7
26,088,265 UART: [art] Derive CDI
26,089,006 UART: [art] Store in slot 0x4
26,146,008 UART: [art] Derive Key Pair
26,147,057 UART: [art] Store priv key in slot 0x5
29,439,629 UART: [art] Derive Key Pair - Done
29,452,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,034 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,541 UART: [art] PUB.X = 8B8253C35B18C7B1309CC9B657671FD2DA9D64AD7EA7340658CE3E0298756A3894BD23348A42C0B3EBBB06F562B92606
31,749,804 UART: [art] PUB.Y = 83120D715100602B665D1D6EAC59A1D93243E38216FF1FDF575B3AF8C96C884BA75052D61FA3B3D207F15F096CE39449
31,757,031 UART: [art] SIG.R = 6DCD2341CF4CBE64EE614431C01A9AF2511E933F9F3F556FA9334E8133BC97EC2396992714451EBCB16AA84D6F762CB4
31,764,440 UART: [art] SIG.S = 54B41B9AA74B9ED7E212CD042CCB63B4DFF2D35FAF4770C975FB4E56047EA2F4508D9D9D279FC0FD22D86EF96C46F3D1
33,069,560 UART: Caliptra RT
33,070,287 UART: [state] CFI Enabled
33,246,154 UART: [rt] RT listening for mailbox commands...
33,248,559 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,403,949 UART: [rt]cmd =0x41544d4e, len=14344
38,704,192 >>> mbox cmd response data (8 bytes)
38,704,785 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,735,518 UART: [rt]cmd =0x41545348, len=116
38,755,705 >>> mbox cmd response data (12 bytes)
40,830,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,651,474 >>> mbox cmd response: success
49,652,223 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,687,241 UART:
49,687,573 UART: Running Caliptra FMC ...
49,688,638 UART:
49,688,793 UART: [state] CFI Enabled
49,792,345 UART: [art] Extend RT PCRs Done
49,793,639 UART: [art] Lock RT PCRs Done
49,794,908 UART: [art] Populate DV Done
49,800,272 UART: [fht] FMC Alias Private Key: 7
49,801,751 UART: [art] Derive CDI
49,802,484 UART: [art] Store in slot 0x4
49,861,195 UART: [art] Derive Key Pair
49,862,243 UART: [art] Store priv key in slot 0x5
53,154,162 UART: [art] Derive Key Pair - Done
53,167,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,454,895 UART: [art] Erasing AUTHORITY.KEYID = 7
55,456,407 UART: [art] PUB.X = 5C6E1D38C25AF584C12020C9BFB5CAFF6E06712DFCC3EF6D2574B37FA802F5FC19B828B806CFC4645FF76703DE504479
55,463,662 UART: [art] PUB.Y = C3BD8816E96A36938B8B93BD32C2AA98D56044B37BD3A14A7A263D6604BF8947158BAF8B749B031578470DC49B538B1E
55,470,900 UART: [art] SIG.R = 825F7DD917E4A59EBBD2D725C42B9232A19568753107DFECBF80D845BEB0F79A6B620DFA52263DDA093E10A7D7888379
55,478,316 UART: [art] SIG.S = C286ABBB7DF42D741A1F8698ED18BF97C99A9CED367DCB68B330C43689B9825F8BF57DA225564D6383F0ECC629D71AA6
56,783,543 UART: Caliptra RT
56,784,256 UART: [state] CFI Enabled
57,220,299 UART: [rt] RT listening for mailbox commands...
57,252,046 UART: [rt]cmd =0x41545348, len=116
57,271,868 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.21s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,473 UART:
192,832 UART: Running Caliptra ROM ...
194,047 UART:
603,807 UART: [state] CFI Enabled
618,214 UART: [state] LifecycleState = Unprovisioned
620,165 UART: [state] DebugLocked = No
623,106 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,530 UART: [kat] SHA2-256
797,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,827 UART: [kat] ++
808,346 UART: [kat] sha1
818,786 UART: [kat] SHA2-256
821,504 UART: [kat] SHA2-384
828,055 UART: [kat] SHA2-512-ACC
830,422 UART: [kat] ECC-384
3,115,666 UART: [kat] HMAC-384Kdf
3,128,359 UART: [kat] LMS
4,318,430 UART: [kat] --
4,323,417 UART: [cold-reset] ++
4,326,050 UART: [fht] Storing FHT @ 0x50003400
4,338,090 UART: [idev] ++
4,338,663 UART: [idev] CDI.KEYID = 6
4,339,653 UART: [idev] SUBJECT.KEYID = 7
4,340,760 UART: [idev] UDS.KEYID = 0
4,341,903 ready_for_fw is high
4,342,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,947 UART: [idev] Erasing UDS.KEYID = 0
7,631,021 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,745 UART: [idev] --
7,657,677 UART: [ldev] ++
7,658,294 UART: [ldev] CDI.KEYID = 6
7,659,299 UART: [ldev] SUBJECT.KEYID = 5
7,660,469 UART: [ldev] AUTHORITY.KEYID = 7
7,661,698 UART: [ldev] FE.KEYID = 1
7,672,565 UART: [ldev] Erasing FE.KEYID = 1
10,963,204 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,546 UART: [ldev] --
13,319,610 UART: [fwproc] Waiting for Commands...
13,321,534 UART: [fwproc] Received command 0x46574c44
13,323,765 UART: [fwproc] Received Image of size 118548 bytes
17,433,981 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,511,074 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,584,258 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,913,579 >>> mbox cmd response: success
17,918,442 UART: [afmc] ++
17,919,078 UART: [afmc] CDI.KEYID = 6
17,919,962 UART: [afmc] SUBJECT.KEYID = 7
17,921,237 UART: [afmc] AUTHORITY.KEYID = 5
21,234,388 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,529,953 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,532,212 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,546,609 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,561,360 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,575,775 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,598,733 UART: [afmc] --
23,602,654 UART: [cold-reset] --
23,606,185 UART: [state] Locking Datavault
23,611,490 UART: [state] Locking PCR0, PCR1 and PCR31
23,613,184 UART: [state] Locking ICCM
23,615,683 UART: [exit] Launching FMC @ 0x40000130
23,624,090 UART:
23,624,328 UART: Running Caliptra FMC ...
23,625,430 UART:
23,625,585 UART: [state] CFI Enabled
23,633,412 UART: [fht] FMC Alias Private Key: 7
25,974,065 UART: [art] Extend RT PCRs Done
25,975,289 UART: [art] Lock RT PCRs Done
25,976,801 UART: [art] Populate DV Done
25,982,095 UART: [fht] FMC Alias Private Key: 7
25,983,630 UART: [art] Derive CDI
25,984,443 UART: [art] Store in slot 0x4
26,027,095 UART: [art] Derive Key Pair
26,028,158 UART: [art] Store priv key in slot 0x5
29,269,992 UART: [art] Derive Key Pair - Done
29,283,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,563,258 UART: [art] Erasing AUTHORITY.KEYID = 7
31,564,810 UART: [art] PUB.X = 529321E5C0F8F6880EAA09FFAF856D1C43A207640123F6191F613CD9C42529550234DEF866EEFC4280E66EE3F4590AB6
31,572,011 UART: [art] PUB.Y = ACD9DDC0D940DD55B604115404AC0DFD38FD5B58F468D1FBC380118B03116037075D73F5643B8B925AC36D7D065D04E7
31,579,254 UART: [art] SIG.R = AB6728249DFE1C326D17CD6ED1E72FF64F45670C66EDB25CC6DDEF267A507B545A6817D766F658199ED03446375E63FC
31,586,688 UART: [art] SIG.S = FD401D319313D74685019AAC642B5D9731D253BABCF9E0A48B8A8B2906E116049D78DC52247710D917945B9EA1EEB42E
32,891,531 UART: Caliptra RT
32,892,246 UART: [state] CFI Enabled
33,025,767 UART: [rt] RT listening for mailbox commands...
33,028,174 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,183,613 UART: [rt]cmd =0x41544d4e, len=14344
38,484,137 >>> mbox cmd response data (8 bytes)
38,484,781 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,515,458 UART: [rt]cmd =0x41545348, len=116
38,535,587 >>> mbox cmd response data (12 bytes)
40,611,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,762,401 UART:
40,762,768 UART: Running Caliptra ROM ...
40,763,897 UART:
40,764,084 UART: [state] CFI Enabled
40,782,246 UART: [state] LifecycleState = Unprovisioned
40,784,142 UART: [state] DebugLocked = No
40,786,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,791,534 UART: [kat] SHA2-256
40,961,246 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,971,807 UART: [kat] ++
40,972,342 UART: [kat] sha1
40,984,691 UART: [kat] SHA2-256
40,987,373 UART: [kat] SHA2-384
40,992,883 UART: [kat] SHA2-512-ACC
40,995,289 UART: [kat] ECC-384
43,281,015 UART: [kat] HMAC-384Kdf
43,292,357 UART: [kat] LMS
44,482,414 UART: [kat] --
44,486,048 UART: [update-reset] ++
48,670,575 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,673,494 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,071,198 >>> mbox cmd response: success
49,075,835 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,076,439 UART: [update-reset] Copying MAN_2 To MAN_1
49,095,000 UART: [update-reset Success] --
49,099,583 UART: [state] Locking Datavault
49,102,565 UART: [state] Locking PCR0, PCR1 and PCR31
49,104,314 UART: [state] Locking ICCM
49,105,941 UART: [exit] Launching FMC @ 0x40000130
49,114,355 UART:
49,114,594 UART: Running Caliptra FMC ...
49,115,692 UART:
49,115,846 UART: [state] CFI Enabled
49,160,175 UART: [art] Extend RT PCRs Done
49,161,315 UART: [art] Lock RT PCRs Done
49,162,647 UART: [art] Populate DV Done
49,167,987 UART: [fht] FMC Alias Private Key: 7
49,169,590 UART: [art] Derive CDI
49,170,400 UART: [art] Store in slot 0x4
49,213,245 UART: [art] Derive Key Pair
49,214,289 UART: [art] Store priv key in slot 0x5
52,456,707 UART: [art] Derive Key Pair - Done
52,469,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,750,177 UART: [art] Erasing AUTHORITY.KEYID = 7
54,751,690 UART: [art] PUB.X = 8BC1DC9170D34CABD922916BB3F0F1785C979EF04ED8B7C75132D98C4BF798FEF69B9DD8D8E718108069EDB92C07705D
54,759,001 UART: [art] PUB.Y = 7883B7C66D7D790C67F049442FBC9F216E4EF1878D9F01C6929BDFB49F482CF0C0C105A5BC278B64385CB46A43664C6D
54,766,236 UART: [art] SIG.R = 4F730E946EA9F310AD19485793F7226BA3986A9C89373B66C8D9086B2414DE69B6B523517CEE714BADFEB11DAE6C0F1D
54,773,621 UART: [art] SIG.S = 603C385BDEABBF2F75A1BFD798E44438EA1280085C52769772CDE3815886E3770D9492793BE6559EDB8C7684791585AC
56,078,441 UART: Caliptra RT
56,079,162 UART: [state] CFI Enabled
56,450,437 UART: [rt] RT listening for mailbox commands...
56,482,279 UART: [rt]cmd =0x41545348, len=116
56,502,103 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.17s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,120,890 ready_for_fw is high
4,121,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,200 >>> mbox cmd response: success
23,797,376 UART:
23,797,760 UART: Running Caliptra FMC ...
23,798,871 UART:
23,799,020 UART: [state] CFI Enabled
23,806,908 UART: [fht] FMC Alias Private Key: 7
26,147,121 UART: [art] Extend RT PCRs Done
26,148,349 UART: [art] Lock RT PCRs Done
26,150,322 UART: [art] Populate DV Done
26,155,804 UART: [fht] FMC Alias Private Key: 7
26,157,341 UART: [art] Derive CDI
26,158,073 UART: [art] Store in slot 0x4
26,200,447 UART: [art] Derive Key Pair
26,201,442 UART: [art] Store priv key in slot 0x5
29,443,514 UART: [art] Derive Key Pair - Done
29,456,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,143 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,651 UART: [art] PUB.X = 88D25CCC8CDBC6A35D0A4E8F2EE31C0A37805ED267D88432C7A24EA2004232094D2A3A49F8F704BFDADB93491B22C4F3
31,744,951 UART: [art] PUB.Y = 266C6CE4219A8D8DEBB3E815D5B37EBE5803B513E01A52FDF5CD32B1B8A5044011982F36E71443E6EDDE9D5C754BD9D8
31,752,221 UART: [art] SIG.R = D5B19289E8DC8867966DCFB52DB02ED342FB474FD4CFE3351FC093D8187EAF3AE7F8CB54CF4C837861E260E35B947762
31,759,616 UART: [art] SIG.S = 2AE8A61169247E57448FA16AA5C7118EFE365943CE3C9E540CE7ABC827A31043DEC643A115C90FD70D58FFCA125E2E6D
33,064,838 UART: Caliptra RT
33,065,535 UART: [state] CFI Enabled
33,198,873 UART: [rt] RT listening for mailbox commands...
33,201,250 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,356,678 UART: [rt]cmd =0x41544d4e, len=14344
38,657,149 >>> mbox cmd response data (8 bytes)
38,657,727 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,688,454 UART: [rt]cmd =0x41545348, len=116
38,708,605 >>> mbox cmd response data (12 bytes)
40,784,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,529,036 >>> mbox cmd response: success
49,529,702 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,563,487 UART:
49,563,770 UART: Running Caliptra FMC ...
49,564,881 UART:
49,565,059 UART: [state] CFI Enabled
49,608,996 UART: [art] Extend RT PCRs Done
49,610,283 UART: [art] Lock RT PCRs Done
49,611,486 UART: [art] Populate DV Done
49,616,840 UART: [fht] FMC Alias Private Key: 7
49,618,489 UART: [art] Derive CDI
49,619,300 UART: [art] Store in slot 0x4
49,661,676 UART: [art] Derive Key Pair
49,662,671 UART: [art] Store priv key in slot 0x5
52,904,454 UART: [art] Derive Key Pair - Done
52,917,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,198,226 UART: [art] Erasing AUTHORITY.KEYID = 7
55,199,745 UART: [art] PUB.X = A75F012B169C9DB5AA5A23A6E3701B05454DFD843B39FD79E16F0E452D68CB282F96D0BDCFA162A2AB93CC9B79EDDB89
55,207,041 UART: [art] PUB.Y = 2CCBE4738307356ED840E226927F2DB3DE0BFB8B049A73ACD47CA36C7AD4655D3C3B1990169B98C0CC5FBBD8DB00E553
55,214,323 UART: [art] SIG.R = FDD565AAB3E97269C3E3FC70021135DC9DFD4B754EC2C4123C7B3418E02DE03DD944466609EF316F715DD4E0D5BA34BC
55,221,716 UART: [art] SIG.S = 55B143D1A30C4E76CAC052F242193679F14F62D61D9948102C44A2D96B67328A3530F1100D1AD580D1C04A7E2E3C90F2
56,526,686 UART: Caliptra RT
56,527,403 UART: [state] CFI Enabled
56,900,303 UART: [rt] RT listening for mailbox commands...
56,932,316 UART: [rt]cmd =0x41545348, len=116
56,952,545 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.19s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,199 UART:
192,567 UART: Running Caliptra ROM ...
193,695 UART:
193,835 UART: [state] CFI Enabled
263,804 UART: [state] LifecycleState = Unprovisioned
265,804 UART: [state] DebugLocked = No
268,529 UART: [state] WD Timer not started. Device not locked for debugging
272,900 UART: [kat] SHA2-256
452,582 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,383 UART: [kat] ++
463,832 UART: [kat] sha1
475,409 UART: [kat] SHA2-256
478,125 UART: [kat] SHA2-384
483,397 UART: [kat] SHA2-512-ACC
485,765 UART: [kat] ECC-384
2,948,803 UART: [kat] HMAC-384Kdf
2,971,867 UART: [kat] LMS
3,448,349 UART: [kat] --
3,452,997 UART: [cold-reset] ++
3,454,214 UART: [fht] FHT @ 0x50003400
3,465,044 UART: [idev] ++
3,465,690 UART: [idev] CDI.KEYID = 6
3,466,598 UART: [idev] SUBJECT.KEYID = 7
3,467,839 UART: [idev] UDS.KEYID = 0
3,468,885 ready_for_fw is high
3,469,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,220 UART: [idev] Erasing UDS.KEYID = 0
5,990,006 UART: [idev] Sha1 KeyId Algorithm
6,013,972 UART: [idev] --
6,020,414 UART: [ldev] ++
6,020,989 UART: [ldev] CDI.KEYID = 6
6,021,946 UART: [ldev] SUBJECT.KEYID = 5
6,023,154 UART: [ldev] AUTHORITY.KEYID = 7
6,024,384 UART: [ldev] FE.KEYID = 1
6,057,473 UART: [ldev] Erasing FE.KEYID = 1
8,562,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,563 UART: [ldev] --
10,375,789 UART: [fwproc] Wait for Commands...
10,378,790 UART: [fwproc] Recv command 0x46574c44
10,380,763 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,999 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,019 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,530 >>> mbox cmd response: success
14,344,323 UART: [afmc] ++
14,344,965 UART: [afmc] CDI.KEYID = 6
14,345,845 UART: [afmc] SUBJECT.KEYID = 7
14,347,108 UART: [afmc] AUTHORITY.KEYID = 5
16,895,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,278 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,093 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,104 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,704 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,986 UART: [afmc] --
18,716,150 UART: [cold-reset] --
18,720,872 UART: [state] Locking Datavault
18,728,386 UART: [state] Locking PCR0, PCR1 and PCR31
18,730,124 UART: [state] Locking ICCM
18,732,630 UART: [exit] Launching FMC @ 0x40000130
18,741,024 UART:
18,741,261 UART: Running Caliptra FMC ...
18,742,357 UART:
18,742,512 UART: [state] CFI Enabled
18,795,783 UART: [fht] FMC Alias Private Key: 7
20,561,650 UART: [art] Extend RT PCRs Done
20,562,867 UART: [art] Lock RT PCRs Done
20,564,392 UART: [art] Populate DV Done
20,570,002 UART: [fht] FMC Alias Private Key: 7
20,571,499 UART: [art] Derive CDI
20,572,260 UART: [art] Store in slot 0x4
20,628,973 UART: [art] Derive Key Pair
20,629,975 UART: [art] Store priv key in slot 0x5
23,093,882 UART: [art] Derive Key Pair - Done
23,106,984 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,990 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,489 UART: [art] PUB.X = ECB3E417750FC23634263A1A0D36D7D25615F6AECFCBDCF3AC660E6AF5D3A06E60103FB83580925A210A9936475D6D48
24,827,743 UART: [art] PUB.Y = 0E5B89B99444544F75550AC29DF61D55852A4BE1D9B1FEB378E91D46191BEB21CBABB22C66C08FF08EF66A11771B10A6
24,834,980 UART: [art] SIG.R = 2D99C7121F14F9F10FCD1D89D096F15C833B28A628ECCBC6C9DC44BA7826F495AFF0ACAF3297C7011761162C029B1B78
24,842,373 UART: [art] SIG.S = EA89A123D3D17AC51AFB2DCE56D9331FAF516CCD289E1EFD2059356DB124B10D714B80E3E336DAAA72CE852F9C02C033
25,821,125 UART: Caliptra RT
25,821,824 UART: [state] CFI Enabled
26,002,762 UART: [rt] RT listening for mailbox commands...
26,005,288 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,160,532 UART: [rt]cmd =0x41544d4e, len=14344
30,156,487 >>> mbox cmd response data (8 bytes)
30,157,081 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,187,926 UART: [rt]cmd =0x41545348, len=116
30,209,169 >>> mbox cmd response data (12 bytes)
32,271,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,421,951 UART:
32,422,329 UART: Running Caliptra ROM ...
32,423,383 UART:
32,423,540 UART: [state] CFI Enabled
32,492,909 UART: [state] LifecycleState = Unprovisioned
32,494,847 UART: [state] DebugLocked = No
32,496,620 UART: [state] WD Timer not started. Device not locked for debugging
32,501,403 UART: [kat] SHA2-256
32,681,074 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,691,839 UART: [kat] ++
32,692,323 UART: [kat] sha1
32,703,964 UART: [kat] SHA2-256
32,706,665 UART: [kat] SHA2-384
32,712,405 UART: [kat] SHA2-512-ACC
32,714,762 UART: [kat] ECC-384
35,157,893 UART: [kat] HMAC-384Kdf
35,182,645 UART: [kat] LMS
35,659,146 UART: [kat] --
35,663,573 UART: [update-reset] ++
39,161,018 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,164,349 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,561,984 >>> mbox cmd response: success
39,562,429 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,563,075 UART: [update-reset] Copying MAN_2 To MAN_1
39,600,203 UART: [update-reset Success] --
39,604,383 UART: [state] Locking Datavault
39,606,808 UART: [state] Locking PCR0, PCR1 and PCR31
39,608,564 UART: [state] Locking ICCM
39,610,224 UART: [exit] Launching FMC @ 0x40000130
39,618,637 UART:
39,618,882 UART: Running Caliptra FMC ...
39,619,983 UART:
39,620,157 UART: [state] CFI Enabled
39,718,395 UART: [art] Extend RT PCRs Done
39,719,571 UART: [art] Lock RT PCRs Done
39,721,075 UART: [art] Populate DV Done
39,726,648 UART: [fht] FMC Alias Private Key: 7
39,728,296 UART: [art] Derive CDI
39,729,114 UART: [art] Store in slot 0x4
39,788,019 UART: [art] Derive Key Pair
39,789,058 UART: [art] Store priv key in slot 0x5
42,251,644 UART: [art] Derive Key Pair - Done
42,264,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,977,182 UART: [art] Erasing AUTHORITY.KEYID = 7
43,978,686 UART: [art] PUB.X = 04448EB7754F45D4C29A5C89E0470EA21F4BDF999D4978CBF5986A2C180FBF8046F785880B5999C3771D7BCE80D32C4F
43,986,016 UART: [art] PUB.Y = 42402B82AF887DAA061DA343E7D14EC22DF2F68709B2BFBC94516410230263CA029F9EEFEEF5F689DC45AD142C0A122A
43,993,253 UART: [art] SIG.R = A81CBA299D3F02ADD67B2A20D6327C24C9AB0710B061C80B748B7ED9AE0AA7CC36832E93761FB77683D322EBAD184C4B
44,000,641 UART: [art] SIG.S = BBDB7B2743DE903A4476AD06FAE8839CA3EC7A3ADF70646CD8C14E78A09272A3EB6FCEFF27946F7C2FB681B27065B49B
44,979,024 UART: Caliptra RT
44,979,713 UART: [state] CFI Enabled
45,401,467 UART: [rt] RT listening for mailbox commands...
45,433,340 UART: [rt]cmd =0x41545348, len=116
45,453,241 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,459,248 ready_for_fw is high
3,459,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,226,724 >>> mbox cmd response: success
18,516,162 UART:
18,516,555 UART: Running Caliptra FMC ...
18,517,690 UART:
18,517,842 UART: [state] CFI Enabled
18,583,204 UART: [fht] FMC Alias Private Key: 7
20,348,867 UART: [art] Extend RT PCRs Done
20,350,092 UART: [art] Lock RT PCRs Done
20,351,613 UART: [art] Populate DV Done
20,357,177 UART: [fht] FMC Alias Private Key: 7
20,358,723 UART: [art] Derive CDI
20,359,540 UART: [art] Store in slot 0x4
20,415,943 UART: [art] Derive Key Pair
20,416,979 UART: [art] Store priv key in slot 0x5
22,879,982 UART: [art] Derive Key Pair - Done
22,893,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,902 UART: [art] Erasing AUTHORITY.KEYID = 7
24,607,379 UART: [art] PUB.X = E19320E609DBA6F634C37AD287CD4DE78CEEBDD1D08042873F34872B737F161FE851C63552FD01B1D4A8A63C13B661F3
24,614,686 UART: [art] PUB.Y = 2FB28C88DDD209DB10304B7FE7D3FFD617E3ACC533D45982021CEDBEAFDF93C81A2C5B95AD5D0D6A90FC8F6BA768A360
24,621,969 UART: [art] SIG.R = 2B81C438DF06D75D8CE91CDFAE091FD5FDD8682977917FCE41AE9A6FD31BADB7E2841A8C8AC71D786B5E1B225A71C394
24,629,359 UART: [art] SIG.S = DCA56743254BD62E20EF66CB7C0CA0A2C29B7E2F3E0E1A6D05F00E679D5586AF82906C3C5C07702AE4511D80D2C161A8
25,607,979 UART: Caliptra RT
25,608,691 UART: [state] CFI Enabled
25,790,344 UART: [rt] RT listening for mailbox commands...
25,792,723 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,947,821 UART: [rt]cmd =0x41544d4e, len=14344
29,943,202 >>> mbox cmd response data (8 bytes)
29,943,773 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,974,720 UART: [rt]cmd =0x41545348, len=116
29,994,840 >>> mbox cmd response data (12 bytes)
32,058,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,381,817 >>> mbox cmd response: success
39,382,456 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,414,398 UART:
39,414,688 UART: Running Caliptra FMC ...
39,415,810 UART:
39,415,974 UART: [state] CFI Enabled
39,504,856 UART: [art] Extend RT PCRs Done
39,506,110 UART: [art] Lock RT PCRs Done
39,507,198 UART: [art] Populate DV Done
39,512,766 UART: [fht] FMC Alias Private Key: 7
39,514,353 UART: [art] Derive CDI
39,515,115 UART: [art] Store in slot 0x4
39,574,080 UART: [art] Derive Key Pair
39,575,121 UART: [art] Store priv key in slot 0x5
42,038,117 UART: [art] Derive Key Pair - Done
42,051,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,763,709 UART: [art] Erasing AUTHORITY.KEYID = 7
43,765,362 UART: [art] PUB.X = E741D738B74EA505E33F0B3C6877659E723C987C584BC20E9922D05E79BD17544796FF3293ADF932D8F38E31DD3C7BE8
43,772,467 UART: [art] PUB.Y = 4070B52EECB5A9E2B1AB21CBCC6F0ABFC2B82308E3DFA06B7F002E6C8B5D94D32E9C052F492FD2D423B2935779C428BA
43,779,754 UART: [art] SIG.R = 448850DC03668ED3F3108423528527F2B4D46FD605EDCA937FFC65E464EB97F28A205F3588F93B89F7FD02E2700732DA
43,787,085 UART: [art] SIG.S = 4197807C1D2287E799D6E0CE2556158526F18CBAAA0E95406C4B1B970676309D7B32846B4402507CF761F2E39022A563
44,765,698 UART: Caliptra RT
44,766,389 UART: [state] CFI Enabled
45,187,100 UART: [rt] RT listening for mailbox commands...
45,219,175 UART: [rt]cmd =0x41545348, len=116
45,240,029 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,580 UART:
192,933 UART: Running Caliptra ROM ...
194,083 UART:
603,607 UART: [state] CFI Enabled
621,057 UART: [state] LifecycleState = Unprovisioned
622,989 UART: [state] DebugLocked = No
625,238 UART: [state] WD Timer not started. Device not locked for debugging
628,351 UART: [kat] SHA2-256
808,020 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,823 UART: [kat] ++
819,361 UART: [kat] sha1
830,955 UART: [kat] SHA2-256
833,677 UART: [kat] SHA2-384
840,476 UART: [kat] SHA2-512-ACC
842,851 UART: [kat] ECC-384
3,280,623 UART: [kat] HMAC-384Kdf
3,292,147 UART: [kat] LMS
3,768,691 UART: [kat] --
3,772,260 UART: [cold-reset] ++
3,773,619 UART: [fht] FHT @ 0x50003400
3,785,328 UART: [idev] ++
3,785,895 UART: [idev] CDI.KEYID = 6
3,786,849 UART: [idev] SUBJECT.KEYID = 7
3,788,096 UART: [idev] UDS.KEYID = 0
3,789,000 ready_for_fw is high
3,789,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,423 UART: [idev] Erasing UDS.KEYID = 0
6,264,375 UART: [idev] Sha1 KeyId Algorithm
6,288,522 UART: [idev] --
6,292,889 UART: [ldev] ++
6,293,471 UART: [ldev] CDI.KEYID = 6
6,294,383 UART: [ldev] SUBJECT.KEYID = 5
6,295,601 UART: [ldev] AUTHORITY.KEYID = 7
6,296,829 UART: [ldev] FE.KEYID = 1
6,307,586 UART: [ldev] Erasing FE.KEYID = 1
8,788,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,900 UART: [ldev] --
10,581,380 UART: [fwproc] Wait for Commands...
10,584,500 UART: [fwproc] Recv command 0x46574c44
10,586,543 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,680 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,738 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,919 >>> mbox cmd response: success
14,552,253 UART: [afmc] ++
14,552,890 UART: [afmc] CDI.KEYID = 6
14,553,803 UART: [afmc] SUBJECT.KEYID = 7
14,555,022 UART: [afmc] AUTHORITY.KEYID = 5
17,055,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,515 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,341 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,418 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,002 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,314 UART: [afmc] --
18,857,197 UART: [cold-reset] --
18,862,208 UART: [state] Locking Datavault
18,868,242 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,005 UART: [state] Locking ICCM
18,871,251 UART: [exit] Launching FMC @ 0x40000130
18,879,709 UART:
18,879,949 UART: Running Caliptra FMC ...
18,881,053 UART:
18,881,229 UART: [state] CFI Enabled
18,889,068 UART: [fht] FMC Alias Private Key: 7
20,654,666 UART: [art] Extend RT PCRs Done
20,655,887 UART: [art] Lock RT PCRs Done
20,657,465 UART: [art] Populate DV Done
20,663,039 UART: [fht] FMC Alias Private Key: 7
20,664,534 UART: [art] Derive CDI
20,665,297 UART: [art] Store in slot 0x4
20,707,893 UART: [art] Derive Key Pair
20,708,939 UART: [art] Store priv key in slot 0x5
23,135,709 UART: [art] Derive Key Pair - Done
23,148,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,855,067 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,574 UART: [art] PUB.X = 838A3A2DF5DDBBE84EDEC8AC7D9ABD55F17095F22AB186116317752BFB6EA74A1CD44A461E98E3CCC79930CA95A4D012
24,863,870 UART: [art] PUB.Y = EBABF1748084C6A8F290CB906D9722285C8A0537D8B110EE01E0B915A660221D25B9290D1F88E18EF682D7517E7548D7
24,871,098 UART: [art] SIG.R = 22EA96065B0C10399622E4DB743A3054FB1791EA13069FC87C1D54A5A4F4B2CBD7F898556381B9CA62140AF80036CDF3
24,878,430 UART: [art] SIG.S = BC2033211E15B68A1CAFDF0AC8404E349B6CDA910F772D9D6890C09DB850B7D0D88DD3F7C4A3A6AA9EF142D7B58D07A6
25,857,418 UART: Caliptra RT
25,858,119 UART: [state] CFI Enabled
25,990,463 UART: [rt] RT listening for mailbox commands...
25,992,839 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,148,256 UART: [rt]cmd =0x41544d4e, len=14344
30,143,390 >>> mbox cmd response data (8 bytes)
30,143,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,174,666 UART: [rt]cmd =0x41545348, len=116
30,194,152 >>> mbox cmd response data (12 bytes)
32,253,357 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,404,265 UART:
32,404,659 UART: Running Caliptra ROM ...
32,405,801 UART:
32,405,974 UART: [state] CFI Enabled
32,423,973 UART: [state] LifecycleState = Unprovisioned
32,425,877 UART: [state] DebugLocked = No
32,428,722 UART: [state] WD Timer not started. Device not locked for debugging
32,433,026 UART: [kat] SHA2-256
32,612,730 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,623,535 UART: [kat] ++
32,623,998 UART: [kat] sha1
32,636,208 UART: [kat] SHA2-256
32,638,909 UART: [kat] SHA2-384
32,645,220 UART: [kat] SHA2-512-ACC
32,647,627 UART: [kat] ECC-384
35,088,969 UART: [kat] HMAC-384Kdf
35,101,380 UART: [kat] LMS
35,577,830 UART: [kat] --
35,582,915 UART: [update-reset] ++
39,079,769 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,083,931 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,481,563 >>> mbox cmd response: success
39,482,069 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,482,629 UART: [update-reset] Copying MAN_2 To MAN_1
39,519,779 UART: [update-reset Success] --
39,524,269 UART: [state] Locking Datavault
39,527,481 UART: [state] Locking PCR0, PCR1 and PCR31
39,529,209 UART: [state] Locking ICCM
39,531,259 UART: [exit] Launching FMC @ 0x40000130
39,539,608 UART:
39,539,845 UART: Running Caliptra FMC ...
39,540,951 UART:
39,541,119 UART: [state] CFI Enabled
39,584,826 UART: [art] Extend RT PCRs Done
39,586,014 UART: [art] Lock RT PCRs Done
39,587,643 UART: [art] Populate DV Done
39,592,953 UART: [fht] FMC Alias Private Key: 7
39,594,546 UART: [art] Derive CDI
39,595,366 UART: [art] Store in slot 0x4
39,637,906 UART: [art] Derive Key Pair
39,638,903 UART: [art] Store priv key in slot 0x5
42,065,487 UART: [art] Derive Key Pair - Done
42,078,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,785,104 UART: [art] Erasing AUTHORITY.KEYID = 7
43,786,609 UART: [art] PUB.X = 4D32A14E5EF5A8A6E88BBE8B8FF6E216B962D340B901BD7D4D216D2600697847E9A86AABFF3BF910932E7E92E1492167
43,793,908 UART: [art] PUB.Y = CD9F8F13E4EFB96A3E601A611A5D056C92FA23F4EE401026F77A8CAF27EC78B8A16C6A2321BBD487C9841BA6DECB3FEB
43,801,192 UART: [art] SIG.R = F0684756A43BECB5B72FFB639E02FDE26C8EB6A36BAEC167C6FE14BA1110DDE6DEC32F42D3908BB70527FBE61F98965D
43,808,675 UART: [art] SIG.S = 9FAEEAF05C908D4565FC6CD04F3F50E5232BCEEABCA540EAE5794511C81799E00FE75E02FF930CDAA114CF25B9D6C623
44,787,474 UART: Caliptra RT
44,788,161 UART: [state] CFI Enabled
45,159,937 UART: [rt] RT listening for mailbox commands...
45,191,842 UART: [rt]cmd =0x41545348, len=116
45,211,339 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,775,048 ready_for_fw is high
3,775,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,434,776 >>> mbox cmd response: success
18,683,835 UART:
18,684,226 UART: Running Caliptra FMC ...
18,685,335 UART:
18,685,494 UART: [state] CFI Enabled
18,693,343 UART: [fht] FMC Alias Private Key: 7
20,459,221 UART: [art] Extend RT PCRs Done
20,460,444 UART: [art] Lock RT PCRs Done
20,462,093 UART: [art] Populate DV Done
20,467,880 UART: [fht] FMC Alias Private Key: 7
20,469,637 UART: [art] Derive CDI
20,470,376 UART: [art] Store in slot 0x4
20,512,917 UART: [art] Derive Key Pair
20,513,961 UART: [art] Store priv key in slot 0x5
22,940,368 UART: [art] Derive Key Pair - Done
22,953,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,659,634 UART: [art] Erasing AUTHORITY.KEYID = 7
24,661,139 UART: [art] PUB.X = DDD2539B09FEDDF99113549DFEC5EBD12055F84C8515B2909AA1DF0B7FC4FCEA09E775CF0059F6A667304467CCD524B5
24,668,403 UART: [art] PUB.Y = 490855A00FE1A1AEDD6EC905B894DFB66573485EA3BD2E65E0C97133B8962CC911FC3BED8B9795E680289789936D188F
24,675,664 UART: [art] SIG.R = 46835EDAE214E83098B0DE20FA369EEF2533ACE58945B67A2E77931317BC66153035ECD43D3ED336C988D0300250356D
24,683,070 UART: [art] SIG.S = 48B01609FC7C50030E73CE5F840C698E872A274EB8F9AAE831A14A8F46EF25652C77DA59B04E69B34A5920E5BEEB869A
25,662,356 UART: Caliptra RT
25,663,088 UART: [state] CFI Enabled
25,795,879 UART: [rt] RT listening for mailbox commands...
25,798,331 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,953,599 UART: [rt]cmd =0x41544d4e, len=14344
29,948,887 >>> mbox cmd response data (8 bytes)
29,949,457 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,980,089 UART: [rt]cmd =0x41545348, len=116
29,999,952 >>> mbox cmd response data (12 bytes)
32,056,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,277,318 >>> mbox cmd response: success
39,277,924 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,309,657 UART:
39,309,986 UART: Running Caliptra FMC ...
39,311,026 UART:
39,311,181 UART: [state] CFI Enabled
39,355,423 UART: [art] Extend RT PCRs Done
39,356,615 UART: [art] Lock RT PCRs Done
39,358,364 UART: [art] Populate DV Done
39,363,769 UART: [fht] FMC Alias Private Key: 7
39,365,471 UART: [art] Derive CDI
39,366,211 UART: [art] Store in slot 0x4
39,408,869 UART: [art] Derive Key Pair
39,409,939 UART: [art] Store priv key in slot 0x5
41,836,856 UART: [art] Derive Key Pair - Done
41,849,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,556,270 UART: [art] Erasing AUTHORITY.KEYID = 7
43,557,804 UART: [art] PUB.X = 6266967849D7CB0CA39AFAA36A4CAA32B5C1D0E3EC6C7CBC36FD0FC5C41D5AB5EA2B98AA28F9411334D8A83663F145A6
43,565,064 UART: [art] PUB.Y = F7AC99625822DAC7F293DED99D439C379196C58E1CA433B52DBA260A41B72C9743C7CAA195C3C4D3DF171D7F911AC534
43,572,307 UART: [art] SIG.R = E8398803ED9DDB76C04A5A3EA074353EE5043AC880C8E2E0E7BDD1402847A643D979AE7C5DD8C74F7D55D2A086B8E85E
43,579,716 UART: [art] SIG.S = E19A78F19F6142EBBC6968C4A37C2F3D09FFEB79DF317CBBD1948F921A091A5EE0EBD8F998C1D1B1B94BE9364EEDF827
44,558,582 UART: Caliptra RT
44,559,277 UART: [state] CFI Enabled
44,932,641 UART: [rt] RT listening for mailbox commands...
44,964,646 UART: [rt]cmd =0x41545348, len=116
44,985,405 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
191,975 UART:
192,356 UART: Running Caliptra ROM ...
193,566 UART:
193,725 UART: [state] CFI Enabled
267,181 UART: [state] LifecycleState = Unprovisioned
269,604 UART: [state] DebugLocked = No
271,923 UART: [state] WD Timer not started. Device not locked for debugging
276,802 UART: [kat] SHA2-256
466,674 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,483 UART: [kat] ++
477,962 UART: [kat] sha1
490,185 UART: [kat] SHA2-256
493,186 UART: [kat] SHA2-384
499,984 UART: [kat] SHA2-512-ACC
502,615 UART: [kat] ECC-384
2,968,998 UART: [kat] HMAC-384Kdf
2,993,378 UART: [kat] LMS
3,525,137 UART: [kat] --
3,531,473 UART: [cold-reset] ++
3,532,333 UART: [fht] FHT @ 0x50003400
3,543,207 UART: [idev] ++
3,543,987 UART: [idev] CDI.KEYID = 6
3,544,880 UART: [idev] SUBJECT.KEYID = 7
3,546,003 UART: [idev] UDS.KEYID = 0
3,547,001 ready_for_fw is high
3,547,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,696,389 UART: [idev] Erasing UDS.KEYID = 0
6,051,305 UART: [idev] Sha1 KeyId Algorithm
6,073,783 UART: [idev] --
6,078,096 UART: [ldev] ++
6,078,778 UART: [ldev] CDI.KEYID = 6
6,079,718 UART: [ldev] SUBJECT.KEYID = 5
6,080,874 UART: [ldev] AUTHORITY.KEYID = 7
6,082,123 UART: [ldev] FE.KEYID = 1
6,120,941 UART: [ldev] Erasing FE.KEYID = 1
8,627,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,247 UART: [ldev] --
10,435,033 UART: [fwproc] Wait for Commands...
10,437,881 UART: [fwproc] Recv command 0x46574c44
10,440,195 UART: [fwproc] Recv'd Img size: 118548 bytes
13,944,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,024,324 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,147,938 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,708,819 >>> mbox cmd response: success
14,712,118 UART: [afmc] ++
14,712,837 UART: [afmc] CDI.KEYID = 6
14,714,025 UART: [afmc] SUBJECT.KEYID = 7
14,715,467 UART: [afmc] AUTHORITY.KEYID = 5
17,255,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,977,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,979,656 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,994,753 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,009,904 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,024,788 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,049,047 UART: [afmc] --
19,052,318 UART: [cold-reset] --
19,057,697 UART: [state] Locking Datavault
19,063,921 UART: [state] Locking PCR0, PCR1 and PCR31
19,066,076 UART: [state] Locking ICCM
19,068,070 UART: [exit] Launching FMC @ 0x40000130
19,076,748 UART:
19,077,001 UART: Running Caliptra FMC ...
19,078,108 UART:
19,078,266 UART: [state] CFI Enabled
19,133,967 UART: [fht] FMC Alias Private Key: 7
20,900,273 UART: [art] Extend RT PCRs Done
20,901,496 UART: [art] Lock RT PCRs Done
20,902,903 UART: [art] Populate DV Done
20,908,260 UART: [fht] FMC Alias Private Key: 7
20,909,795 UART: [art] Derive CDI
20,910,608 UART: [art] Store in slot 0x4
20,966,124 UART: [art] Derive Key Pair
20,967,120 UART: [art] Store priv key in slot 0x5
23,430,659 UART: [art] Derive Key Pair - Done
23,443,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,156,480 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,985 UART: [art] PUB.X = F775D00E380329DCEDEB5447DCEF585E43E5EEF95EEF368DD8419CA55854E98BEF40D3E9844FA38B431A43134C9A46F2
25,165,291 UART: [art] PUB.Y = 0D6C3430E4427D1C788BA3E8D4EB86775E6606A2972126711879319F5F856614FDE835E0A2F89362B2CDADD589443FE6
25,172,503 UART: [art] SIG.R = BC69189FCC9DD28B9EC6139B16C074E31520B71A23FCD11B4B297E22D2F7D56123D5C87B4C12DDA28BF38292C3F6008B
25,179,880 UART: [art] SIG.S = 906D58D031FEA27357B9428BC4CBE501BD0D388D9E049584DDF963A29A7818D2A6EBC5BD838DBCE086BAE1087FAB38FA
26,159,465 UART: Caliptra RT
26,160,167 UART: [state] CFI Enabled
26,338,957 UART: [rt] RT listening for mailbox commands...
26,341,446 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,496,629 UART: [rt]cmd =0x41544d4e, len=14344
30,492,168 >>> mbox cmd response data (8 bytes)
30,492,781 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,523,515 UART: [rt]cmd =0x41545348, len=116
30,543,408 >>> mbox cmd response data (12 bytes)
32,610,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,761,954 UART:
32,762,336 UART: Running Caliptra ROM ...
32,763,471 UART:
32,763,636 UART: [state] CFI Enabled
32,827,116 UART: [state] LifecycleState = Unprovisioned
32,829,230 UART: [state] DebugLocked = No
32,831,426 UART: [state] WD Timer not started. Device not locked for debugging
32,836,674 UART: [kat] SHA2-256
33,026,570 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,037,325 UART: [kat] ++
33,037,868 UART: [kat] sha1
33,049,359 UART: [kat] SHA2-256
33,052,330 UART: [kat] SHA2-384
33,059,355 UART: [kat] SHA2-512-ACC
33,061,940 UART: [kat] ECC-384
35,514,372 UART: [kat] HMAC-384Kdf
35,539,894 UART: [kat] LMS
36,071,478 UART: [kat] --
36,074,448 UART: [update-reset] ++
39,580,649 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,584,363 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,214,102 >>> mbox cmd response: success
40,218,838 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,219,458 UART: [update-reset] Copying MAN_2 To MAN_1
40,253,577 UART: [update-reset Success] --
40,257,597 UART: [state] Locking Datavault
40,260,594 UART: [state] Locking PCR0, PCR1 and PCR31
40,262,744 UART: [state] Locking ICCM
40,264,894 UART: [exit] Launching FMC @ 0x40000130
40,273,514 UART:
40,273,749 UART: Running Caliptra FMC ...
40,274,848 UART:
40,275,003 UART: [state] CFI Enabled
40,369,803 UART: [art] Extend RT PCRs Done
40,370,985 UART: [art] Lock RT PCRs Done
40,372,568 UART: [art] Populate DV Done
40,377,963 UART: [fht] FMC Alias Private Key: 7
40,379,493 UART: [art] Derive CDI
40,380,222 UART: [art] Store in slot 0x4
40,438,889 UART: [art] Derive Key Pair
40,439,929 UART: [art] Store priv key in slot 0x5
42,902,560 UART: [art] Derive Key Pair - Done
42,915,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,628,206 UART: [art] Erasing AUTHORITY.KEYID = 7
44,629,712 UART: [art] PUB.X = 5EDFD9781664557D6288A5C1D5AEC9B870215B9C766FB460158AC5EDD3C89A4B10D2750CC42C8D160A874D6B75A946FD
44,636,996 UART: [art] PUB.Y = 0E010C32B0FC0C236E6BD7CFFF74A548C325EA0B9560323AA85DD24CB1C191108DD6569322DB442432AA6A87E57B0085
44,644,214 UART: [art] SIG.R = 748F155E9D4E72D29594A28FF5E70DF4EC965EEDD531A788CE62014ED1D9D9BB9F752E3C659507C310EE189AB42C2267
44,651,628 UART: [art] SIG.S = EF59B42817DB99149D3F2013D2C58CCD3566BBE11C7F6062EFD6F41E129E0DA4F182A0B54472398DCBEA4A814071448B
45,630,235 UART: Caliptra RT
45,630,947 UART: [state] CFI Enabled
46,044,933 UART: [rt] RT listening for mailbox commands...
46,076,946 UART: [rt]cmd =0x41545348, len=116
46,097,547 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,439,892 ready_for_fw is high
3,440,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,830,185 >>> mbox cmd response: success
19,109,997 UART:
19,110,387 UART: Running Caliptra FMC ...
19,111,586 UART:
19,111,753 UART: [state] CFI Enabled
19,178,435 UART: [fht] FMC Alias Private Key: 7
20,944,816 UART: [art] Extend RT PCRs Done
20,946,032 UART: [art] Lock RT PCRs Done
20,948,147 UART: [art] Populate DV Done
20,953,476 UART: [fht] FMC Alias Private Key: 7
20,955,125 UART: [art] Derive CDI
20,955,938 UART: [art] Store in slot 0x4
21,011,146 UART: [art] Derive Key Pair
21,012,182 UART: [art] Store priv key in slot 0x5
23,475,156 UART: [art] Derive Key Pair - Done
23,488,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,480 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,990 UART: [art] PUB.X = CED86E5FC9659623635E19F0F96EFC2EFB2816748CF7F0C03EA6FCB0B58FF7A861FE52204CE5C4D1178857B0E0AC844F
25,209,271 UART: [art] PUB.Y = 913932A63D64EE2FDC9E39F5FFEFB9E8071A9264AB542F7527B109B443B6024DFAD358425F07CAC4972EF45E10280AA5
25,216,505 UART: [art] SIG.R = 3C96A6F3BD66BAA6F868157D00A9BB46A97DF76CA66FBB616082991CD27B8D7FD512AF88C98ABB9395876E52E4D75B90
25,223,928 UART: [art] SIG.S = E9ED522AEDE4915E7867409EDACACDBBBEF90DFC397951ED6EF70DCC4F7998D43E03311596528F0E0E9E12D06800F5A3
26,202,883 UART: Caliptra RT
26,203,586 UART: [state] CFI Enabled
26,384,441 UART: [rt] RT listening for mailbox commands...
26,386,863 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,542,156 UART: [rt]cmd =0x41544d4e, len=14344
30,537,696 >>> mbox cmd response data (8 bytes)
30,538,273 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,568,726 UART: [rt]cmd =0x41545348, len=116
30,589,285 >>> mbox cmd response data (12 bytes)
32,653,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,570,215 >>> mbox cmd response: success
40,570,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,606,011 UART:
40,606,327 UART: Running Caliptra FMC ...
40,607,588 UART:
40,607,774 UART: [state] CFI Enabled
40,714,620 UART: [art] Extend RT PCRs Done
40,715,902 UART: [art] Lock RT PCRs Done
40,717,527 UART: [art] Populate DV Done
40,723,041 UART: [fht] FMC Alias Private Key: 7
40,724,736 UART: [art] Derive CDI
40,725,546 UART: [art] Store in slot 0x4
40,783,593 UART: [art] Derive Key Pair
40,784,634 UART: [art] Store priv key in slot 0x5
43,247,442 UART: [art] Derive Key Pair - Done
43,260,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,973,542 UART: [art] Erasing AUTHORITY.KEYID = 7
44,975,559 UART: [art] PUB.X = F98E5D283882907033F811EC4DE398CE190000504E84E7303956F019571BCEF85CF8438F2D8A1617423AFE1DBD5FABA6
44,982,342 UART: [art] PUB.Y = 96306F53A6C18AE6526FB488EF9CECECB70657B4065B1584DD813F43FB24A7046EEB663A4BCD6AFEC730237F473DCFA7
44,989,544 UART: [art] SIG.R = 0ABEA4B75AABD25FC2DBD725C4229C52FE03E1CA8A20B42633E7E5470999A26DF8E358EE828BA7CD929B0191EB6E8893
44,997,010 UART: [art] SIG.S = 06379BE9C4511DC112AAE15C3E5271CA47F051269B26AC21883647D9F2064FF1210CE3E7FADCB48489FD47C03F19AF98
45,975,773 UART: Caliptra RT
45,976,904 UART: [state] CFI Enabled
46,390,271 UART: [rt] RT listening for mailbox commands...
46,422,080 UART: [rt]cmd =0x41545348, len=116
46,441,668 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,485 UART:
192,847 UART: Running Caliptra ROM ...
194,065 UART:
603,432 UART: [state] CFI Enabled
614,659 UART: [state] LifecycleState = Unprovisioned
617,035 UART: [state] DebugLocked = No
619,625 UART: [state] WD Timer not started. Device not locked for debugging
623,389 UART: [kat] SHA2-256
813,327 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,070 UART: [kat] ++
824,596 UART: [kat] sha1
835,773 UART: [kat] SHA2-256
838,788 UART: [kat] SHA2-384
844,003 UART: [kat] SHA2-512-ACC
846,598 UART: [kat] ECC-384
3,286,583 UART: [kat] HMAC-384Kdf
3,300,103 UART: [kat] LMS
3,831,965 UART: [kat] --
3,837,525 UART: [cold-reset] ++
3,838,743 UART: [fht] FHT @ 0x50003400
3,851,590 UART: [idev] ++
3,852,304 UART: [idev] CDI.KEYID = 6
3,853,186 UART: [idev] SUBJECT.KEYID = 7
3,854,377 UART: [idev] UDS.KEYID = 0
3,855,425 ready_for_fw is high
3,855,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,467 UART: [idev] Erasing UDS.KEYID = 0
6,336,091 UART: [idev] Sha1 KeyId Algorithm
6,358,406 UART: [idev] --
6,361,696 UART: [ldev] ++
6,362,376 UART: [ldev] CDI.KEYID = 6
6,363,263 UART: [ldev] SUBJECT.KEYID = 5
6,364,474 UART: [ldev] AUTHORITY.KEYID = 7
6,365,705 UART: [ldev] FE.KEYID = 1
6,377,032 UART: [ldev] Erasing FE.KEYID = 1
8,855,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,901 UART: [ldev] --
10,649,451 UART: [fwproc] Wait for Commands...
10,651,117 UART: [fwproc] Recv command 0x46574c44
10,653,447 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,318 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,930 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,591 >>> mbox cmd response: success
14,919,744 UART: [afmc] ++
14,920,451 UART: [afmc] CDI.KEYID = 6
14,921,623 UART: [afmc] SUBJECT.KEYID = 7
14,923,133 UART: [afmc] AUTHORITY.KEYID = 5
17,428,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,614 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,671 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,859 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,753 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,222,587 UART: [afmc] --
19,225,675 UART: [cold-reset] --
19,229,825 UART: [state] Locking Datavault
19,237,039 UART: [state] Locking PCR0, PCR1 and PCR31
19,239,204 UART: [state] Locking ICCM
19,242,011 UART: [exit] Launching FMC @ 0x40000130
19,250,655 UART:
19,250,893 UART: Running Caliptra FMC ...
19,251,994 UART:
19,252,152 UART: [state] CFI Enabled
19,260,581 UART: [fht] FMC Alias Private Key: 7
21,026,466 UART: [art] Extend RT PCRs Done
21,027,692 UART: [art] Lock RT PCRs Done
21,029,136 UART: [art] Populate DV Done
21,034,720 UART: [fht] FMC Alias Private Key: 7
21,036,407 UART: [art] Derive CDI
21,037,154 UART: [art] Store in slot 0x4
21,079,721 UART: [art] Derive Key Pair
21,080,731 UART: [art] Store priv key in slot 0x5
23,506,937 UART: [art] Derive Key Pair - Done
23,520,415 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,893 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,396 UART: [art] PUB.X = DDC1DA23C7D0000836412DFB64B8E3BE30E2433100273BF2CFBA4FE59ED8C6895B3D9CFD79E99987DBF0DFF018D36E06
25,235,667 UART: [art] PUB.Y = FB21764FD2123FC957F5A969598F8A341066AA2C87148139E26BFD2076A8F28877856671D6D17A3047AC3C20FE5796CD
25,242,931 UART: [art] SIG.R = 59C710381A7E2C0744AD92CD9D95A659061A16E2C91DD97E2DB0D1B6F11C3172DCB5623C1375EC1ABE47295613AFC2F2
25,250,300 UART: [art] SIG.S = B9610EA55FAA9609EB1ADFB16FFA2C6B6DD290335CF82C31AF36CEBA359A64387B20F09383953128D121C87022BF68C9
26,229,168 UART: Caliptra RT
26,229,886 UART: [state] CFI Enabled
26,362,682 UART: [rt] RT listening for mailbox commands...
26,365,089 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,520,320 UART: [rt]cmd =0x41544d4e, len=14344
30,515,349 >>> mbox cmd response data (8 bytes)
30,515,929 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,546,734 UART: [rt]cmd =0x41545348, len=116
30,567,085 >>> mbox cmd response data (12 bytes)
32,633,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,784,609 UART:
32,784,997 UART: Running Caliptra ROM ...
32,786,097 UART:
32,786,270 UART: [state] CFI Enabled
32,799,959 UART: [state] LifecycleState = Unprovisioned
32,801,857 UART: [state] DebugLocked = No
32,804,448 UART: [state] WD Timer not started. Device not locked for debugging
32,809,703 UART: [kat] SHA2-256
32,999,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,010,307 UART: [kat] ++
33,010,858 UART: [kat] sha1
33,022,406 UART: [kat] SHA2-256
33,025,449 UART: [kat] SHA2-384
33,031,397 UART: [kat] SHA2-512-ACC
33,033,964 UART: [kat] ECC-384
35,476,658 UART: [kat] HMAC-384Kdf
35,490,213 UART: [kat] LMS
36,021,798 UART: [kat] --
36,025,254 UART: [update-reset] ++
39,535,333 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,539,473 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,168,650 >>> mbox cmd response: success
40,173,562 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,174,179 UART: [update-reset] Copying MAN_2 To MAN_1
40,206,594 UART: [update-reset Success] --
40,210,515 UART: [state] Locking Datavault
40,213,673 UART: [state] Locking PCR0, PCR1 and PCR31
40,215,885 UART: [state] Locking ICCM
40,218,187 UART: [exit] Launching FMC @ 0x40000130
40,226,867 UART:
40,227,106 UART: Running Caliptra FMC ...
40,228,214 UART:
40,228,375 UART: [state] CFI Enabled
40,272,531 UART: [art] Extend RT PCRs Done
40,273,722 UART: [art] Lock RT PCRs Done
40,275,236 UART: [art] Populate DV Done
40,280,618 UART: [fht] FMC Alias Private Key: 7
40,282,277 UART: [art] Derive CDI
40,283,097 UART: [art] Store in slot 0x4
40,325,528 UART: [art] Derive Key Pair
40,326,578 UART: [art] Store priv key in slot 0x5
42,753,279 UART: [art] Derive Key Pair - Done
42,766,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,473,493 UART: [art] Erasing AUTHORITY.KEYID = 7
44,474,977 UART: [art] PUB.X = D70B1A91338857C880051F9A90FDA328328F566E439E0EE2AE04FC248408AD1112994558A61E7333511B29BE41C439DE
44,482,249 UART: [art] PUB.Y = D7EFF5E4D8A5FFC40101453821DF368E4C75785B44D58B8B314100DD0C407C268D434BB6B719C35BA2A92793EF8B5A32
44,489,500 UART: [art] SIG.R = 69A94681E5C2689A2B64D595C71C74BF0858C5C035E455C118EFC9AE1A22224BBB92EB13FF4A87D066E9920886BFE15D
44,496,865 UART: [art] SIG.S = 04823D1EC10794953A7CFD252E9D6A855D06C1536206788CF22370DC3618787114CAE22821A4E1AAEEC8B845F2491A53
45,476,275 UART: Caliptra RT
45,476,988 UART: [state] CFI Enabled
45,847,941 UART: [rt] RT listening for mailbox commands...
45,879,954 UART: [rt]cmd =0x41545348, len=116
45,900,524 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,753,715 ready_for_fw is high
3,754,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,034,071 >>> mbox cmd response: success
19,294,560 UART:
19,294,952 UART: Running Caliptra FMC ...
19,296,162 UART:
19,296,340 UART: [state] CFI Enabled
19,304,216 UART: [fht] FMC Alias Private Key: 7
21,070,662 UART: [art] Extend RT PCRs Done
21,071,906 UART: [art] Lock RT PCRs Done
21,073,488 UART: [art] Populate DV Done
21,078,701 UART: [fht] FMC Alias Private Key: 7
21,080,356 UART: [art] Derive CDI
21,081,182 UART: [art] Store in slot 0x4
21,123,312 UART: [art] Derive Key Pair
21,124,359 UART: [art] Store priv key in slot 0x5
23,551,037 UART: [art] Derive Key Pair - Done
23,564,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,776 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,295 UART: [art] PUB.X = 1C37BD0D41C680E1D8E053366ACAEDAC420356FE18219070554DF95831054D6F2179F6C318AEBFAD35E7B2686CA2CCFB
25,279,555 UART: [art] PUB.Y = E13B34782BD5D3B9EC4FBE1C8AA979DCDB4D525E1440A4086CA081DC9E2C303B4F4154E067C6C39D13B72DA52D392221
25,286,815 UART: [art] SIG.R = E9B0EB2DEFF9DD8369296D91E8E220A42398F97BCB37880FFF19ACE40D0FF40B37B502C48EF6DD80F1E7DA27C305BAD2
25,294,263 UART: [art] SIG.S = FBDDC88A5B8CDACC25ABDC779CD7419E76A070E12048BF506C06728BB93D3C9F241E354219EAD5910912B912A7240292
26,272,910 UART: Caliptra RT
26,273,615 UART: [state] CFI Enabled
26,406,514 UART: [rt] RT listening for mailbox commands...
26,408,914 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,564,446 UART: [rt]cmd =0x41544d4e, len=14344
30,560,369 >>> mbox cmd response data (8 bytes)
30,560,947 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,591,573 UART: [rt]cmd =0x41545348, len=116
30,610,850 >>> mbox cmd response data (12 bytes)
32,680,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,507,291 >>> mbox cmd response: success
40,508,306 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,540,877 UART:
40,541,198 UART: Running Caliptra FMC ...
40,542,325 UART:
40,542,510 UART: [state] CFI Enabled
40,586,371 UART: [art] Extend RT PCRs Done
40,587,714 UART: [art] Lock RT PCRs Done
40,588,856 UART: [art] Populate DV Done
40,594,595 UART: [fht] FMC Alias Private Key: 7
40,596,299 UART: [art] Derive CDI
40,597,115 UART: [art] Store in slot 0x4
40,639,673 UART: [art] Derive Key Pair
40,640,717 UART: [art] Store priv key in slot 0x5
43,067,591 UART: [art] Derive Key Pair - Done
43,080,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,787,181 UART: [art] Erasing AUTHORITY.KEYID = 7
44,788,692 UART: [art] PUB.X = D36CC108C309D6BA47F3BAF730C645D2C1533466A66B295A2E574FF47A3B6B7AFBF1385E507E70897AF876FE03BF0072
44,795,966 UART: [art] PUB.Y = 52E4487039FD0B7D91B510AEB824F3FA22A4CAF893B306ACF9201C90F62728D5AEAAEECBA4517E72F8C2C64B34577613
44,803,178 UART: [art] SIG.R = 0CBCAC0D81A1C73FD4AFE88805F5F7EA0069120A89C2506E7AD5E68049E080DDB67EE94ED5488266EEA0FB3663B6F2FC
44,810,582 UART: [art] SIG.S = BAC8B1A9294E67EE574426C597164A86A0A8D1366B83F4586FF0CA36F4C2A42EFDF3CDF66F47F494B2038EDDA7D80C15
45,789,828 UART: Caliptra RT
45,790,532 UART: [state] CFI Enabled
46,160,338 UART: [rt] RT listening for mailbox commands...
46,192,213 UART: [rt]cmd =0x41545348, len=116
46,210,941 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,869 UART: [kat] SHA2-256
881,800 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,915 UART: [kat] ++
886,067 UART: [kat] sha1
890,285 UART: [kat] SHA2-256
892,223 UART: [kat] SHA2-384
894,804 UART: [kat] SHA2-512-ACC
896,705 UART: [kat] ECC-384
901,828 UART: [kat] HMAC-384Kdf
906,410 UART: [kat] LMS
1,474,606 UART: [kat] --
1,475,451 UART: [cold-reset] ++
1,475,855 UART: [fht] Storing FHT @ 0x50003400
1,478,584 UART: [idev] ++
1,478,752 UART: [idev] CDI.KEYID = 6
1,479,112 UART: [idev] SUBJECT.KEYID = 7
1,479,536 UART: [idev] UDS.KEYID = 0
1,479,881 ready_for_fw is high
1,479,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,458 UART: [idev] Erasing UDS.KEYID = 0
1,504,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,280 UART: [idev] --
1,514,519 UART: [ldev] ++
1,514,687 UART: [ldev] CDI.KEYID = 6
1,515,050 UART: [ldev] SUBJECT.KEYID = 5
1,515,476 UART: [ldev] AUTHORITY.KEYID = 7
1,515,939 UART: [ldev] FE.KEYID = 1
1,521,227 UART: [ldev] Erasing FE.KEYID = 1
1,546,468 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,226 UART: [ldev] --
1,585,657 UART: [fwproc] Waiting for Commands...
1,586,496 UART: [fwproc] Received command 0x46574c44
1,587,287 UART: [fwproc] Received Image of size 118548 bytes
2,932,437 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,595 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,813 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,164 >>> mbox cmd response: success
3,132,240 UART: [afmc] ++
3,132,408 UART: [afmc] CDI.KEYID = 6
3,132,770 UART: [afmc] SUBJECT.KEYID = 7
3,133,195 UART: [afmc] AUTHORITY.KEYID = 5
3,168,650 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,888 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,597 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,480 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,163 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,069 UART: [afmc] --
3,211,947 UART: [cold-reset] --
3,212,759 UART: [state] Locking Datavault
3,213,986 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,590 UART: [state] Locking ICCM
3,215,158 UART: [exit] Launching FMC @ 0x40000130
3,220,488 UART:
3,220,504 UART: Running Caliptra FMC ...
3,220,912 UART:
3,220,966 UART: [state] CFI Enabled
3,231,558 UART: [fht] FMC Alias Private Key: 7
3,350,312 UART: [art] Extend RT PCRs Done
3,350,740 UART: [art] Lock RT PCRs Done
3,352,300 UART: [art] Populate DV Done
3,360,341 UART: [fht] FMC Alias Private Key: 7
3,361,453 UART: [art] Derive CDI
3,361,733 UART: [art] Store in slot 0x4
3,447,277 UART: [art] Derive Key Pair
3,447,637 UART: [art] Store priv key in slot 0x5
3,460,876 UART: [art] Derive Key Pair - Done
3,475,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,014 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,779 UART: [art] PUB.X = A43939A6BC3016E826F78335407B03C4719237A94DF19BC6C46DF41B6B90EEB7769DB0A8280FF1E31E8B4DCEB28C7530
3,498,549 UART: [art] PUB.Y = 1C9108C34B3D2184AF2A8286FB5260FF795D1E7548B3C92E7ACB1C73BF1D5773B7200A4E461B6ACF67EA40685699761F
3,505,497 UART: [art] SIG.R = 0BC8400F03772AAF00950DC3F0AA604A3121448246B633046B334E00645EBED22EF4FF397AF045A54D4D5E27D753C158
3,512,208 UART: [art] SIG.S = 73D314B63C4C853FB6713F784917FAB9F68546A166DC47F6ED854349D9EAA465C288D08B2B0582F151031545D26EA58B
3,536,168 UART: Caliptra RT
3,536,419 UART: [state] CFI Enabled
3,656,132 UART: [rt] RT listening for mailbox commands...
3,656,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,758 UART: [rt]cmd =0x41544d4e, len=14344
4,089,990 >>> mbox cmd response data (8 bytes)
4,089,991 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,286 UART: [rt]cmd =0x41545348, len=116
4,142,687 >>> mbox cmd response data (12 bytes)
4,142,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,143,564 UART:
4,143,580 UART: Running Caliptra ROM ...
4,143,988 UART:
4,144,042 UART: [state] CFI Enabled
4,147,224 UART: [state] LifecycleState = Unprovisioned
4,147,879 UART: [state] DebugLocked = No
4,148,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,150,022 UART: [kat] SHA2-256
4,943,953 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,948,068 UART: [kat] ++
4,948,220 UART: [kat] sha1
4,952,414 UART: [kat] SHA2-256
4,954,352 UART: [kat] SHA2-384
4,957,179 UART: [kat] SHA2-512-ACC
4,959,079 UART: [kat] ECC-384
4,965,004 UART: [kat] HMAC-384Kdf
4,969,528 UART: [kat] LMS
5,537,724 UART: [kat] --
5,538,587 UART: [update-reset] ++
6,919,523 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,920,727 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,075,994 >>> mbox cmd response: success
7,075,994 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,076,099 UART: [update-reset] Copying MAN_2 To MAN_1
7,084,113 UART: [update-reset Success] --
7,085,076 UART: [state] Locking Datavault
7,085,708 UART: [state] Locking PCR0, PCR1 and PCR31
7,086,312 UART: [state] Locking ICCM
7,086,738 UART: [exit] Launching FMC @ 0x40000130
7,092,068 UART:
7,092,084 UART: Running Caliptra FMC ...
7,092,492 UART:
7,092,546 UART: [state] CFI Enabled
7,181,149 UART: [art] Extend RT PCRs Done
7,181,577 UART: [art] Lock RT PCRs Done
7,183,022 UART: [art] Populate DV Done
7,191,235 UART: [fht] FMC Alias Private Key: 7
7,192,209 UART: [art] Derive CDI
7,192,489 UART: [art] Store in slot 0x4
7,278,529 UART: [art] Derive Key Pair
7,278,889 UART: [art] Store priv key in slot 0x5
7,292,118 UART: [art] Derive Key Pair - Done
7,306,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,322,508 UART: [art] Erasing AUTHORITY.KEYID = 7
7,323,273 UART: [art] PUB.X = 9D265E20ED7D6B93C44EEACEB9D1171AB81E0718694CC9B46C2E9469CF94AFCF494B6E68357829BDCD66E6527F5C172E
7,330,054 UART: [art] PUB.Y = 1AF3811358A9B071888F04157CD981CE70BA05B77767D21C4E2F5043467E0302DE91E4C04BF89C417EC90E1B3FBEBECC
7,336,997 UART: [art] SIG.R = 377186577C2FCBCCBF6572E777441255773F4558A7A20439EC84800D3DB4B28E1AFB7982F937AE6A9D20F568E1EED99E
7,343,765 UART: [art] SIG.S = 887945E8F2A267D8AD088B43DD18C1F2C889F4EE55D562A662CFEAA4780E5445879EA2FB365A5126FFD7B839C6B95987
7,367,801 UART: Caliptra RT
7,368,052 UART: [state] CFI Enabled
7,732,137 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,763,274 UART: [rt]cmd =0x41545348, len=116
7,785,650 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,207 ready_for_fw is high
1,362,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,166 >>> mbox cmd response: success
3,043,053 UART:
3,043,069 UART: Running Caliptra FMC ...
3,043,477 UART:
3,043,531 UART: [state] CFI Enabled
3,053,997 UART: [fht] FMC Alias Private Key: 7
3,172,379 UART: [art] Extend RT PCRs Done
3,172,807 UART: [art] Lock RT PCRs Done
3,174,621 UART: [art] Populate DV Done
3,182,828 UART: [fht] FMC Alias Private Key: 7
3,183,878 UART: [art] Derive CDI
3,184,158 UART: [art] Store in slot 0x4
3,269,882 UART: [art] Derive Key Pair
3,270,242 UART: [art] Store priv key in slot 0x5
3,282,823 UART: [art] Derive Key Pair - Done
3,297,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,826 UART: [art] PUB.X = 45B391C20BE484ED492D721D81CF6A24BA295E5719605858520C31744D3DE3783026B76642CA05394475E15585A69F97
3,320,573 UART: [art] PUB.Y = B5744B1B77B87C351D0E532F2367874F583C2A69190712520E009F1E585FE828B21F596E55194F84EAEF3F08D98C9F4B
3,327,485 UART: [art] SIG.R = C7ADA7F89746D0C79B1A0EA9108984765805F53421793B3916FBE652E0FA0524CD7BB2B78E258A45495E21A6245A8992
3,334,242 UART: [art] SIG.S = BA4E0F385A7C82E1796D99938A90CD1103B9C155EC1431CC7C72B0CEA0399A4AC9B2BBB49B3190B32E7C371008D6C2BE
3,358,087 UART: Caliptra RT
3,358,338 UART: [state] CFI Enabled
3,479,305 UART: [rt] RT listening for mailbox commands...
3,479,975 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,905 UART: [rt]cmd =0x41544d4e, len=14344
3,912,819 >>> mbox cmd response data (8 bytes)
3,912,820 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,939 UART: [rt]cmd =0x41545348, len=116
3,965,018 >>> mbox cmd response data (12 bytes)
3,965,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,778,185 >>> mbox cmd response: success
6,778,185 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,791,159 UART:
6,791,175 UART: Running Caliptra FMC ...
6,791,583 UART:
6,791,637 UART: [state] CFI Enabled
6,881,162 UART: [art] Extend RT PCRs Done
6,881,590 UART: [art] Lock RT PCRs Done
6,882,961 UART: [art] Populate DV Done
6,891,168 UART: [fht] FMC Alias Private Key: 7
6,892,342 UART: [art] Derive CDI
6,892,622 UART: [art] Store in slot 0x4
6,978,354 UART: [art] Derive Key Pair
6,978,714 UART: [art] Store priv key in slot 0x5
6,991,959 UART: [art] Derive Key Pair - Done
7,006,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,021,953 UART: [art] Erasing AUTHORITY.KEYID = 7
7,022,718 UART: [art] PUB.X = EC43147D8656A4239C0103CC6B9A86C74D9681E7909C3982E7CA16D9BE439D1878CD03A67A1AD4D8A50ECF46611D16D9
7,029,480 UART: [art] PUB.Y = 27E66855D6EC987C80F66295BB6F5C9B59C1B30CBA410FF1C52F64DD4D0135D0AC60BE3AF7D1AD7A8B662E153B94F799
7,036,435 UART: [art] SIG.R = 91D8D480B131EFE7772F3C22D40F1DA8F8B2E381FFE6878B8777A46028F84C9A6F4C2C8695C636B2AB34A14294DA13DF
7,043,210 UART: [art] SIG.S = F4A50602CE8FE5EB6B31BA30B7A801A658FE41FC759C3ADD651F1B6DC99FEADD7C5A7ED8184CBCFE4B6AD62BD854CFEC
7,067,271 UART: Caliptra RT
7,067,522 UART: [state] CFI Enabled
7,434,902 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,465,931 UART: [rt]cmd =0x41545348, len=116
7,488,487 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,434 UART: [kat] SHA2-256
882,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,480 UART: [kat] ++
886,632 UART: [kat] sha1
890,700 UART: [kat] SHA2-256
892,638 UART: [kat] SHA2-384
895,343 UART: [kat] SHA2-512-ACC
897,244 UART: [kat] ECC-384
902,713 UART: [kat] HMAC-384Kdf
907,379 UART: [kat] LMS
1,475,575 UART: [kat] --
1,476,360 UART: [cold-reset] ++
1,476,764 UART: [fht] Storing FHT @ 0x50003400
1,479,655 UART: [idev] ++
1,479,823 UART: [idev] CDI.KEYID = 6
1,480,183 UART: [idev] SUBJECT.KEYID = 7
1,480,607 UART: [idev] UDS.KEYID = 0
1,480,952 ready_for_fw is high
1,480,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,439 UART: [idev] Erasing UDS.KEYID = 0
1,505,323 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,873 UART: [idev] --
1,514,792 UART: [ldev] ++
1,514,960 UART: [ldev] CDI.KEYID = 6
1,515,323 UART: [ldev] SUBJECT.KEYID = 5
1,515,749 UART: [ldev] AUTHORITY.KEYID = 7
1,516,212 UART: [ldev] FE.KEYID = 1
1,521,732 UART: [ldev] Erasing FE.KEYID = 1
1,548,087 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,903 UART: [ldev] --
1,587,254 UART: [fwproc] Waiting for Commands...
1,588,055 UART: [fwproc] Received command 0x46574c44
1,588,846 UART: [fwproc] Received Image of size 118548 bytes
2,933,670 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,032 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,250 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,505 >>> mbox cmd response: success
3,133,537 UART: [afmc] ++
3,133,705 UART: [afmc] CDI.KEYID = 6
3,134,067 UART: [afmc] SUBJECT.KEYID = 7
3,134,492 UART: [afmc] AUTHORITY.KEYID = 5
3,170,575 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,907 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,687 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,396 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,279 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,962 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,052 UART: [afmc] --
3,214,166 UART: [cold-reset] --
3,215,344 UART: [state] Locking Datavault
3,216,641 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,245 UART: [state] Locking ICCM
3,217,849 UART: [exit] Launching FMC @ 0x40000130
3,223,179 UART:
3,223,195 UART: Running Caliptra FMC ...
3,223,603 UART:
3,223,746 UART: [state] CFI Enabled
3,234,392 UART: [fht] FMC Alias Private Key: 7
3,353,232 UART: [art] Extend RT PCRs Done
3,353,660 UART: [art] Lock RT PCRs Done
3,355,076 UART: [art] Populate DV Done
3,363,095 UART: [fht] FMC Alias Private Key: 7
3,364,259 UART: [art] Derive CDI
3,364,539 UART: [art] Store in slot 0x4
3,450,881 UART: [art] Derive Key Pair
3,451,241 UART: [art] Store priv key in slot 0x5
3,464,232 UART: [art] Derive Key Pair - Done
3,478,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,353 UART: [art] PUB.X = 153FF349A10B18D88CDD723EF4E4B5B4BEDB22ED5899B659772C979F8AC84107E2A7D1A228B101F722942BC8C3D2F7D2
3,502,124 UART: [art] PUB.Y = 8786400B825CD928F51461A4801771CB5C157FA92E91F5AA3A462FD148E58C3BE66ED0EC0B3273309F27A263FFE40E0A
3,509,066 UART: [art] SIG.R = B9DB99DD57B1241E1C13D3816AA43C854104ECED6D7FD392F1046CA623153E33DC0C9DE1FC3CF210E93F9B61D24785D5
3,515,839 UART: [art] SIG.S = DEBDF2C8E640E2FEB052B35777A9A0A70454032D7945629A8769FA2F7498E682E0B5BCF336B7868FB0C00F80695298FE
3,539,256 UART: Caliptra RT
3,539,599 UART: [state] CFI Enabled
3,659,880 UART: [rt] RT listening for mailbox commands...
3,660,550 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,528 UART: [rt]cmd =0x41544d4e, len=14344
4,093,448 >>> mbox cmd response data (8 bytes)
4,093,449 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,516 UART: [rt]cmd =0x41545348, len=116
4,145,727 >>> mbox cmd response data (12 bytes)
4,145,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,146,720 UART:
4,146,736 UART: Running Caliptra ROM ...
4,147,144 UART:
4,147,285 UART: [state] CFI Enabled
4,149,855 UART: [state] LifecycleState = Unprovisioned
4,150,510 UART: [state] DebugLocked = No
4,151,074 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,152,633 UART: [kat] SHA2-256
4,946,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,950,679 UART: [kat] ++
4,950,831 UART: [kat] sha1
4,955,051 UART: [kat] SHA2-256
4,956,989 UART: [kat] SHA2-384
4,959,892 UART: [kat] SHA2-512-ACC
4,961,792 UART: [kat] ECC-384
4,967,345 UART: [kat] HMAC-384Kdf
4,972,055 UART: [kat] LMS
5,540,251 UART: [kat] --
5,541,096 UART: [update-reset] ++
6,922,154 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,923,324 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,078,591 >>> mbox cmd response: success
7,078,591 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,078,774 UART: [update-reset] Copying MAN_2 To MAN_1
7,086,788 UART: [update-reset Success] --
7,087,873 UART: [state] Locking Datavault
7,088,835 UART: [state] Locking PCR0, PCR1 and PCR31
7,089,439 UART: [state] Locking ICCM
7,089,947 UART: [exit] Launching FMC @ 0x40000130
7,095,277 UART:
7,095,293 UART: Running Caliptra FMC ...
7,095,701 UART:
7,095,844 UART: [state] CFI Enabled
7,184,977 UART: [art] Extend RT PCRs Done
7,185,405 UART: [art] Lock RT PCRs Done
7,186,680 UART: [art] Populate DV Done
7,195,107 UART: [fht] FMC Alias Private Key: 7
7,196,047 UART: [art] Derive CDI
7,196,327 UART: [art] Store in slot 0x4
7,282,077 UART: [art] Derive Key Pair
7,282,437 UART: [art] Store priv key in slot 0x5
7,296,010 UART: [art] Derive Key Pair - Done
7,310,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,326,414 UART: [art] Erasing AUTHORITY.KEYID = 7
7,327,179 UART: [art] PUB.X = E34BC88580B820FD54BB12B9D107B50A4CA0C9B446DD9622AEE63EA0A517FFD234932711E04E380D6FA8BDE3E8A5FE70
7,333,956 UART: [art] PUB.Y = E7331F260ACAA4B6230661288DA073747284A4990CB78E8AA14D34EF9572844338DE943780E1E8009112DC841C697878
7,340,863 UART: [art] SIG.R = C328A08C02F4919FAB69BD08A245FE009AFE3DE1A13612F53968561D5F12E673B7CABD021AA4873DEC65070079623CD9
7,347,583 UART: [art] SIG.S = A3843B6D6AF59E32ABA090BA7E50FF749299ED5B4F8BED5B2F6049223D681921C311B433027174D1F89F45CFBBD56BA9
7,371,600 UART: Caliptra RT
7,371,943 UART: [state] CFI Enabled
7,733,323 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,764,374 UART: [rt]cmd =0x41545348, len=116
7,786,502 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.55s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,766 ready_for_fw is high
1,362,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,399 >>> mbox cmd response: success
3,043,730 UART:
3,043,746 UART: Running Caliptra FMC ...
3,044,154 UART:
3,044,297 UART: [state] CFI Enabled
3,055,177 UART: [fht] FMC Alias Private Key: 7
3,173,871 UART: [art] Extend RT PCRs Done
3,174,299 UART: [art] Lock RT PCRs Done
3,175,901 UART: [art] Populate DV Done
3,184,198 UART: [fht] FMC Alias Private Key: 7
3,185,282 UART: [art] Derive CDI
3,185,562 UART: [art] Store in slot 0x4
3,271,254 UART: [art] Derive Key Pair
3,271,614 UART: [art] Store priv key in slot 0x5
3,284,971 UART: [art] Derive Key Pair - Done
3,299,770 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,639 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,404 UART: [art] PUB.X = 12E1A19EC5BE41BAC7C86B32920EEC93E73817E680FF19FB75DEE400E458A0266FD1FED005147262FE6BDF689559A0E6
3,323,158 UART: [art] PUB.Y = FF28E5126142E152D2BFD1825F314ACD314F03C8C4CD3BB354FE71AB237066BA8B24CCDB6B3F25238C252DB73F924949
3,330,115 UART: [art] SIG.R = FCA60F339EC9C842F7F4A1E363D0E05140083494CADAD78BC9950398A2CD0F5192B332734390822DD2EAB1B1317CCEA7
3,336,881 UART: [art] SIG.S = 1ED50A6610F81CF093A32F01F1B02DEC15FC3B64AE33CC8236ACF5DA3B64134E85DFFF2A8726965AD38C8E4C77A02A10
3,360,317 UART: Caliptra RT
3,360,660 UART: [state] CFI Enabled
3,480,568 UART: [rt] RT listening for mailbox commands...
3,481,238 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,370 UART: [rt]cmd =0x41544d4e, len=14344
3,914,748 >>> mbox cmd response data (8 bytes)
3,914,749 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,022 UART: [rt]cmd =0x41545348, len=116
3,967,245 >>> mbox cmd response data (12 bytes)
3,967,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,782,973 >>> mbox cmd response: success
6,782,973 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,796,161 UART:
6,796,177 UART: Running Caliptra FMC ...
6,796,585 UART:
6,796,728 UART: [state] CFI Enabled
6,886,407 UART: [art] Extend RT PCRs Done
6,886,835 UART: [art] Lock RT PCRs Done
6,888,452 UART: [art] Populate DV Done
6,896,899 UART: [fht] FMC Alias Private Key: 7
6,897,991 UART: [art] Derive CDI
6,898,271 UART: [art] Store in slot 0x4
6,984,099 UART: [art] Derive Key Pair
6,984,459 UART: [art] Store priv key in slot 0x5
6,997,320 UART: [art] Derive Key Pair - Done
7,012,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,027,822 UART: [art] Erasing AUTHORITY.KEYID = 7
7,028,587 UART: [art] PUB.X = 76D9223066A165827FF5DAB7EB60BA7CB38A683327B122008E463F986E7F638BBC123712FD100337D4F0D58161565419
7,035,324 UART: [art] PUB.Y = F1A0F3AE5680957C7B575753657BE1B0D0C7341DDF2691F8B055C44237C4C939373039B7F9F83EB167F67DA0F7E8F4DE
7,042,278 UART: [art] SIG.R = 199FFBC9DD36BEBC955D2D45BFC997AC66E47D2AA254ABC4763FCDD20A1E29D2EF148A81D42DFD1C4C48F4F4F3B71ABA
7,049,077 UART: [art] SIG.S = CB8F37FF451769DD1B498A92503A430671EE7ADB7FC74EBC5F3A5C6BC1E984DA641E2A5E60F83B1D63200866C9F302ED
7,072,590 UART: Caliptra RT
7,072,933 UART: [state] CFI Enabled
7,438,754 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,469,789 UART: [rt]cmd =0x41545348, len=116
7,491,739 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,339 UART: [kat] SHA2-512-ACC
906,240 UART: [kat] ECC-384
916,097 UART: [kat] HMAC-384Kdf
920,559 UART: [kat] LMS
1,168,871 UART: [kat] --
1,169,630 UART: [cold-reset] ++
1,170,056 UART: [fht] FHT @ 0x50003400
1,172,846 UART: [idev] ++
1,173,014 UART: [idev] CDI.KEYID = 6
1,173,375 UART: [idev] SUBJECT.KEYID = 7
1,173,800 UART: [idev] UDS.KEYID = 0
1,174,146 ready_for_fw is high
1,174,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,825 UART: [idev] Erasing UDS.KEYID = 0
1,198,897 UART: [idev] Sha1 KeyId Algorithm
1,207,949 UART: [idev] --
1,209,052 UART: [ldev] ++
1,209,220 UART: [ldev] CDI.KEYID = 6
1,209,584 UART: [ldev] SUBJECT.KEYID = 5
1,210,011 UART: [ldev] AUTHORITY.KEYID = 7
1,210,474 UART: [ldev] FE.KEYID = 1
1,215,808 UART: [ldev] Erasing FE.KEYID = 1
1,242,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,996 UART: [ldev] --
1,281,413 UART: [fwproc] Wait for Commands...
1,282,018 UART: [fwproc] Recv command 0x46574c44
1,282,751 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,495 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,670 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,943 >>> mbox cmd response: success
2,827,119 UART: [afmc] ++
2,827,287 UART: [afmc] CDI.KEYID = 6
2,827,650 UART: [afmc] SUBJECT.KEYID = 7
2,828,076 UART: [afmc] AUTHORITY.KEYID = 5
2,863,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,746 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,495 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,205 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,086 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,787 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,442 UART: [afmc] --
2,906,331 UART: [cold-reset] --
2,907,147 UART: [state] Locking Datavault
2,908,334 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,938 UART: [state] Locking ICCM
2,909,390 UART: [exit] Launching FMC @ 0x40000130
2,914,720 UART:
2,914,736 UART: Running Caliptra FMC ...
2,915,144 UART:
2,915,198 UART: [state] CFI Enabled
2,925,796 UART: [fht] FMC Alias Private Key: 7
3,044,860 UART: [art] Extend RT PCRs Done
3,045,288 UART: [art] Lock RT PCRs Done
3,046,768 UART: [art] Populate DV Done
3,054,899 UART: [fht] FMC Alias Private Key: 7
3,055,859 UART: [art] Derive CDI
3,056,139 UART: [art] Store in slot 0x4
3,141,652 UART: [art] Derive Key Pair
3,142,012 UART: [art] Store priv key in slot 0x5
3,155,170 UART: [art] Derive Key Pair - Done
3,169,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,213 UART: [art] PUB.X = 9D7CC5B8980549431A33461776A708B537A906D42C83F17BD49A2DD3F93335C254E8098B78036D4AD42060F880DC8468
3,192,958 UART: [art] PUB.Y = 007717DA5007E92D01317A198602C19716291199D28C80F63587EE801F4C3B37A86BA541EA59838E4A4262C3B13F4151
3,199,863 UART: [art] SIG.R = EEDC985EAF56175CAA8EF390B33DFB71C244138922F8F04D4291E18FBDF3EDDF6A3C4B8038DB92F5B02C111B5AE4149A
3,206,653 UART: [art] SIG.S = 9CD71CBE82C9445ACEF7F722119ECE878E6DDEB07169D864CB16D746AF8533649C2589004D2A82EC25932A09CC19CC50
3,230,608 UART: Caliptra RT
3,230,859 UART: [state] CFI Enabled
3,350,251 UART: [rt] RT listening for mailbox commands...
3,350,921 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,945 UART: [rt]cmd =0x41544d4e, len=14344
3,784,275 >>> mbox cmd response data (8 bytes)
3,784,276 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,361 UART: [rt]cmd =0x41545348, len=116
3,836,908 >>> mbox cmd response data (12 bytes)
3,836,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,686 UART:
3,837,702 UART: Running Caliptra ROM ...
3,838,110 UART:
3,838,165 UART: [state] CFI Enabled
3,840,541 UART: [state] LifecycleState = Unprovisioned
3,841,196 UART: [state] DebugLocked = No
3,841,904 UART: [state] WD Timer not started. Device not locked for debugging
3,843,214 UART: [kat] SHA2-256
4,646,764 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,650,868 UART: [kat] ++
4,651,020 UART: [kat] sha1
4,655,258 UART: [kat] SHA2-256
4,657,198 UART: [kat] SHA2-384
4,659,973 UART: [kat] SHA2-512-ACC
4,661,873 UART: [kat] ECC-384
4,671,418 UART: [kat] HMAC-384Kdf
4,675,964 UART: [kat] LMS
4,924,276 UART: [kat] --
4,925,196 UART: [update-reset] ++
6,283,305 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,284,422 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,439,637 >>> mbox cmd response: success
6,439,637 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,439,748 UART: [update-reset] Copying MAN_2 To MAN_1
6,447,762 UART: [update-reset Success] --
6,448,749 UART: [state] Locking Datavault
6,449,475 UART: [state] Locking PCR0, PCR1 and PCR31
6,450,079 UART: [state] Locking ICCM
6,450,657 UART: [exit] Launching FMC @ 0x40000130
6,455,987 UART:
6,456,003 UART: Running Caliptra FMC ...
6,456,411 UART:
6,456,465 UART: [state] CFI Enabled
6,545,880 UART: [art] Extend RT PCRs Done
6,546,308 UART: [art] Lock RT PCRs Done
6,547,593 UART: [art] Populate DV Done
6,555,862 UART: [fht] FMC Alias Private Key: 7
6,556,790 UART: [art] Derive CDI
6,557,070 UART: [art] Store in slot 0x4
6,643,265 UART: [art] Derive Key Pair
6,643,625 UART: [art] Store priv key in slot 0x5
6,656,705 UART: [art] Derive Key Pair - Done
6,671,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,686,382 UART: [art] Erasing AUTHORITY.KEYID = 7
6,687,147 UART: [art] PUB.X = C0E129E4237AAB608FD849E73B167930EAE96E83ED201E40540305B8CCA31C5ED24A9927EF95EDD2D558E926CB4C0900
6,693,894 UART: [art] PUB.Y = DA6824D60EF1FB3DCB3A2D128F8D5B23B846765E7E79B8AA43D92D773CFCBC85B1A0FFB2D0C7F4A2F9B2B7205D7EFE8D
6,700,869 UART: [art] SIG.R = 429958A9B285CC4517029565029E72E3563641FA22B15FD3DBBAE28A5CEB6748618211B0795B6A36A5263C9384160BF1
6,707,622 UART: [art] SIG.S = 7B049931B2610C2D0C7A6886E9E0D829B2050B8DA9818545A5C408F644721D7DCB4594264386F447EA85B6EB1A97ABF3
6,731,274 UART: Caliptra RT
6,731,525 UART: [state] CFI Enabled
7,094,644 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,125,505 UART: [rt]cmd =0x41545348, len=116
7,147,939 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,028 ready_for_fw is high
1,059,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,430 >>> mbox cmd response: success
2,740,477 UART:
2,740,493 UART: Running Caliptra FMC ...
2,740,901 UART:
2,740,955 UART: [state] CFI Enabled
2,751,593 UART: [fht] FMC Alias Private Key: 7
2,870,677 UART: [art] Extend RT PCRs Done
2,871,105 UART: [art] Lock RT PCRs Done
2,872,955 UART: [art] Populate DV Done
2,881,104 UART: [fht] FMC Alias Private Key: 7
2,882,036 UART: [art] Derive CDI
2,882,316 UART: [art] Store in slot 0x4
2,968,181 UART: [art] Derive Key Pair
2,968,541 UART: [art] Store priv key in slot 0x5
2,981,717 UART: [art] Derive Key Pair - Done
2,996,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,658 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,423 UART: [art] PUB.X = 1AAB76064670862C4A68683E8B9EEA1B7472610D9810B25FC148F242CD3E44A4CFB8845905E62AC8388F40BF698070EC
3,019,184 UART: [art] PUB.Y = ECC325D7436862C327690AA8AACF20E90735BB0C9A5D17386EFC0850B3093503CF9E64B86284D9D5394D33EB2087FC27
3,026,118 UART: [art] SIG.R = 26AB7787003114EBF2E6082372563B15E9D78FCA881D1CFD29E11C490ED3087675C26561A2244B0A8B10F91F95FAD0C4
3,032,854 UART: [art] SIG.S = 24B4F404ADA2211D54A6181FCDAF292E08E9A1BCA430C6BA5AD39786D21DB4A37F3F24FCB4F2E9F2555D5C30AEF3BF8F
3,056,710 UART: Caliptra RT
3,056,961 UART: [state] CFI Enabled
3,175,713 UART: [rt] RT listening for mailbox commands...
3,176,383 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,503 UART: [rt]cmd =0x41544d4e, len=14344
3,609,011 >>> mbox cmd response data (8 bytes)
3,609,012 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,219 UART: [rt]cmd =0x41545348, len=116
3,661,170 >>> mbox cmd response data (12 bytes)
3,661,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,150,897 >>> mbox cmd response: success
6,150,897 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,164,426 UART:
6,164,442 UART: Running Caliptra FMC ...
6,164,850 UART:
6,164,904 UART: [state] CFI Enabled
6,254,151 UART: [art] Extend RT PCRs Done
6,254,579 UART: [art] Lock RT PCRs Done
6,255,726 UART: [art] Populate DV Done
6,263,879 UART: [fht] FMC Alias Private Key: 7
6,264,983 UART: [art] Derive CDI
6,265,263 UART: [art] Store in slot 0x4
6,351,232 UART: [art] Derive Key Pair
6,351,592 UART: [art] Store priv key in slot 0x5
6,364,088 UART: [art] Derive Key Pair - Done
6,379,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,394,456 UART: [art] Erasing AUTHORITY.KEYID = 7
6,395,221 UART: [art] PUB.X = 1A9F7A97A06DCD7A85D2FB2465C0CA028F8D9069452511A6F8D11AE823A72CC7A17B8FE93165BD6FB5154587583182DF
6,401,994 UART: [art] PUB.Y = 3DE6C41532E91B1B5F25E2A25E40870EB4FD6019E68CD26819BE5C92A2556C49C7DB33A4F6830427543B6A4168F0E028
6,408,938 UART: [art] SIG.R = 10BCC9DB82A9C2909296E1E07CF70270A57B3DA53CA021BB00D4F7E6635DE98301A3392E777B1BC11C8B166939088946
6,415,677 UART: [art] SIG.S = E6F815508BD53C9F420F29700D8B365F9A374823CCAA6BCADF5FACCF4D9C2C590A083806636A173AF00601B28C25A994
6,439,768 UART: Caliptra RT
6,440,019 UART: [state] CFI Enabled
6,806,279 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,837,444 UART: [rt]cmd =0x41545348, len=116
6,860,070 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,201 UART: [kat] SHA2-256
891,751 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,855 UART: [kat] ++
896,007 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,786 UART: [kat] SHA2-512-ACC
906,687 UART: [kat] ECC-384
916,470 UART: [kat] HMAC-384Kdf
921,184 UART: [kat] LMS
1,169,496 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,527 UART: [fht] FHT @ 0x50003400
1,173,103 UART: [idev] ++
1,173,271 UART: [idev] CDI.KEYID = 6
1,173,632 UART: [idev] SUBJECT.KEYID = 7
1,174,057 UART: [idev] UDS.KEYID = 0
1,174,403 ready_for_fw is high
1,174,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,844 UART: [idev] Erasing UDS.KEYID = 0
1,198,976 UART: [idev] Sha1 KeyId Algorithm
1,207,710 UART: [idev] --
1,208,679 UART: [ldev] ++
1,208,847 UART: [ldev] CDI.KEYID = 6
1,209,211 UART: [ldev] SUBJECT.KEYID = 5
1,209,638 UART: [ldev] AUTHORITY.KEYID = 7
1,210,101 UART: [ldev] FE.KEYID = 1
1,215,523 UART: [ldev] Erasing FE.KEYID = 1
1,241,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,859 UART: [ldev] --
1,281,208 UART: [fwproc] Wait for Commands...
1,281,811 UART: [fwproc] Recv command 0x46574c44
1,282,544 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,858 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,033 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,324 >>> mbox cmd response: success
2,827,592 UART: [afmc] ++
2,827,760 UART: [afmc] CDI.KEYID = 6
2,828,123 UART: [afmc] SUBJECT.KEYID = 7
2,828,549 UART: [afmc] AUTHORITY.KEYID = 5
2,864,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,454 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,164 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,045 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,746 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,409 UART: [afmc] --
2,907,310 UART: [cold-reset] --
2,908,316 UART: [state] Locking Datavault
2,909,493 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,097 UART: [state] Locking ICCM
2,910,729 UART: [exit] Launching FMC @ 0x40000130
2,916,059 UART:
2,916,075 UART: Running Caliptra FMC ...
2,916,483 UART:
2,916,626 UART: [state] CFI Enabled
2,927,028 UART: [fht] FMC Alias Private Key: 7
3,045,594 UART: [art] Extend RT PCRs Done
3,046,022 UART: [art] Lock RT PCRs Done
3,047,696 UART: [art] Populate DV Done
3,056,281 UART: [fht] FMC Alias Private Key: 7
3,057,277 UART: [art] Derive CDI
3,057,557 UART: [art] Store in slot 0x4
3,143,476 UART: [art] Derive Key Pair
3,143,836 UART: [art] Store priv key in slot 0x5
3,157,560 UART: [art] Derive Key Pair - Done
3,172,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,610 UART: [art] PUB.X = CF314BAD194D912E6C69B9CD0AFDD08205E38FDD26642DD6D7D741237033127F5809A2BEDC5F1E04B52A5254DDC2ADCB
3,195,386 UART: [art] PUB.Y = 7928E0266ADDB71C0E3AA24202C14E2ED7DD296D2B8B28120C0CE97AEAE736FF3897F1BF062790F5281965788752805D
3,202,323 UART: [art] SIG.R = 18A8E5790696B0DAF37314EC29987FB1372EB9C1A59EB676BDD28E98E6D9D64B95832414E33B751BCD37DBE7A0FB0893
3,209,095 UART: [art] SIG.S = CFAC17DB99327EEEF99CBB17CA91D840B84AEABA0AFEDC486FEFE082127E43DEB4F5511A6752A2218887A4328ED08824
3,232,942 UART: Caliptra RT
3,233,285 UART: [state] CFI Enabled
3,353,752 UART: [rt] RT listening for mailbox commands...
3,354,422 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,354 UART: [rt]cmd =0x41544d4e, len=14344
3,787,700 >>> mbox cmd response data (8 bytes)
3,787,701 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,886 UART: [rt]cmd =0x41545348, len=116
3,839,629 >>> mbox cmd response data (12 bytes)
3,839,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,343 UART:
3,840,359 UART: Running Caliptra ROM ...
3,840,767 UART:
3,840,909 UART: [state] CFI Enabled
3,843,433 UART: [state] LifecycleState = Unprovisioned
3,844,088 UART: [state] DebugLocked = No
3,844,690 UART: [state] WD Timer not started. Device not locked for debugging
3,845,990 UART: [kat] SHA2-256
4,649,540 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,653,644 UART: [kat] ++
4,653,796 UART: [kat] sha1
4,658,134 UART: [kat] SHA2-256
4,660,074 UART: [kat] SHA2-384
4,662,827 UART: [kat] SHA2-512-ACC
4,664,727 UART: [kat] ECC-384
4,674,062 UART: [kat] HMAC-384Kdf
4,678,600 UART: [kat] LMS
4,926,912 UART: [kat] --
4,927,612 UART: [update-reset] ++
6,287,053 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,288,220 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,443,435 >>> mbox cmd response: success
6,443,435 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,443,562 UART: [update-reset] Copying MAN_2 To MAN_1
6,451,576 UART: [update-reset Success] --
6,452,557 UART: [state] Locking Datavault
6,453,317 UART: [state] Locking PCR0, PCR1 and PCR31
6,453,921 UART: [state] Locking ICCM
6,454,541 UART: [exit] Launching FMC @ 0x40000130
6,459,871 UART:
6,459,887 UART: Running Caliptra FMC ...
6,460,295 UART:
6,460,438 UART: [state] CFI Enabled
6,549,391 UART: [art] Extend RT PCRs Done
6,549,819 UART: [art] Lock RT PCRs Done
6,551,138 UART: [art] Populate DV Done
6,559,197 UART: [fht] FMC Alias Private Key: 7
6,560,253 UART: [art] Derive CDI
6,560,533 UART: [art] Store in slot 0x4
6,646,708 UART: [art] Derive Key Pair
6,647,068 UART: [art] Store priv key in slot 0x5
6,660,590 UART: [art] Derive Key Pair - Done
6,675,237 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,690,204 UART: [art] Erasing AUTHORITY.KEYID = 7
6,690,969 UART: [art] PUB.X = C2CD1420FCA31D7DC9BEE2022EDB562654461FB49111AE20118DFA318E48CAF359BD22441DC86327EDA68D26D7396987
6,697,744 UART: [art] PUB.Y = EF6A6AC733CD20D1B88E6B2BAF184C8DBCB90BC95F131CB25302F6709C059D8C6650FECA8DC6A40FDB3AF1DC41B8E863
6,704,708 UART: [art] SIG.R = C98CDEAA546B70097DB7D1E3A859362CF39D01B393B1854C765B8A854AA643B21AA8169FF33763AA1E905A802CB050BE
6,711,480 UART: [art] SIG.S = AAF55F032BED79C88BF3C01231ECF493FC53B0937ABE8D9B90A101C31D19ED6BC8A76A8B512CB90F5A93BC7042CFBAE1
6,735,561 UART: Caliptra RT
6,735,904 UART: [state] CFI Enabled
7,098,933 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,129,808 UART: [rt]cmd =0x41545348, len=116
7,151,698 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,669 ready_for_fw is high
1,059,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,481 >>> mbox cmd response: success
2,741,642 UART:
2,741,658 UART: Running Caliptra FMC ...
2,742,066 UART:
2,742,209 UART: [state] CFI Enabled
2,752,757 UART: [fht] FMC Alias Private Key: 7
2,871,387 UART: [art] Extend RT PCRs Done
2,871,815 UART: [art] Lock RT PCRs Done
2,873,155 UART: [art] Populate DV Done
2,881,326 UART: [fht] FMC Alias Private Key: 7
2,882,330 UART: [art] Derive CDI
2,882,610 UART: [art] Store in slot 0x4
2,968,647 UART: [art] Derive Key Pair
2,969,007 UART: [art] Store priv key in slot 0x5
2,982,471 UART: [art] Derive Key Pair - Done
2,996,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,307 UART: [art] PUB.X = A978A0511A4F73CCF7A19D5C7A373FE2B77CA335D93A2CF5C01088F6C484BADFC2A50F7BEB08FAD841924D3F82D11FAC
3,020,093 UART: [art] PUB.Y = AB9E4D8CB0944F62E47FFE76E75C616B2D8853DF075C1ECF5814033FAB95869F98A254DDA92AA1DA8F73A89E3A6BA76E
3,027,055 UART: [art] SIG.R = C1A37178A26BDFA6BD3780272686CC196027673E55C10E2E55E593ECEEBE4C56B02CD5B63B038D11D33BF782087C324A
3,033,822 UART: [art] SIG.S = 7C8EFB1A878DE9E47572212F6A4A4C91C3389622FABD59085745FB4B50F2D93126EE9A73D69A8212B5EC2D47A92A486D
3,057,887 UART: Caliptra RT
3,058,230 UART: [state] CFI Enabled
3,176,735 UART: [rt] RT listening for mailbox commands...
3,177,405 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,363 UART: [rt]cmd =0x41544d4e, len=14344
3,610,395 >>> mbox cmd response data (8 bytes)
3,610,396 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,495 UART: [rt]cmd =0x41545348, len=116
3,661,776 >>> mbox cmd response data (12 bytes)
3,661,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,151,764 >>> mbox cmd response: success
6,151,764 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,165,307 UART:
6,165,323 UART: Running Caliptra FMC ...
6,165,731 UART:
6,165,874 UART: [state] CFI Enabled
6,254,545 UART: [art] Extend RT PCRs Done
6,254,973 UART: [art] Lock RT PCRs Done
6,256,212 UART: [art] Populate DV Done
6,264,551 UART: [fht] FMC Alias Private Key: 7
6,265,725 UART: [art] Derive CDI
6,266,005 UART: [art] Store in slot 0x4
6,351,842 UART: [art] Derive Key Pair
6,352,202 UART: [art] Store priv key in slot 0x5
6,365,428 UART: [art] Derive Key Pair - Done
6,380,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,396,012 UART: [art] Erasing AUTHORITY.KEYID = 7
6,396,777 UART: [art] PUB.X = 86DC90FDB31B7D0D17CFCFCB091F2883A0BADFCB135243DEED176C15C509FDF47E49961B925BC73380817DBC04E2B8DB
6,403,557 UART: [art] PUB.Y = F12CECFC7853D1BDD755E286BA09E9B49BD0A7C94D0258CD744D31D273B409BD702542B1180DE26FBEF8646E846BFAA7
6,410,511 UART: [art] SIG.R = AA06059F24E4B78D1BD075A94AB76170445A7CEF2C4A0F0A482D3FB5049A63CCA3962390B234BEC3FF9BFBE9AC444E46
6,417,282 UART: [art] SIG.S = 6165918F55FB171D8E905A749D154CE7719AD444D2AE69DF6ECBC3B2D5F65212B52ED6AE47A47396F4EF5D9E84AC8E1B
6,440,380 UART: Caliptra RT
6,440,723 UART: [state] CFI Enabled
6,806,187 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,836,968 UART: [rt]cmd =0x41545348, len=116
6,858,302 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
893,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,561 UART: [kat] ++
897,713 UART: [kat] sha1
901,825 UART: [kat] SHA2-256
903,765 UART: [kat] SHA2-384
906,634 UART: [kat] SHA2-512-ACC
908,535 UART: [kat] ECC-384
918,514 UART: [kat] HMAC-384Kdf
923,240 UART: [kat] LMS
1,171,568 UART: [kat] --
1,172,267 UART: [cold-reset] ++
1,172,773 UART: [fht] FHT @ 0x50003400
1,175,434 UART: [idev] ++
1,175,602 UART: [idev] CDI.KEYID = 6
1,175,962 UART: [idev] SUBJECT.KEYID = 7
1,176,386 UART: [idev] UDS.KEYID = 0
1,176,731 ready_for_fw is high
1,176,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,572 UART: [idev] Erasing UDS.KEYID = 0
1,201,823 UART: [idev] Sha1 KeyId Algorithm
1,210,135 UART: [idev] --
1,211,313 UART: [ldev] ++
1,211,481 UART: [ldev] CDI.KEYID = 6
1,211,844 UART: [ldev] SUBJECT.KEYID = 5
1,212,270 UART: [ldev] AUTHORITY.KEYID = 7
1,212,733 UART: [ldev] FE.KEYID = 1
1,217,779 UART: [ldev] Erasing FE.KEYID = 1
1,245,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,091 UART: [ldev] --
1,284,594 UART: [fwproc] Wait for Commands...
1,285,418 UART: [fwproc] Recv command 0x46574c44
1,286,146 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,659,052 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,222 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,417 >>> mbox cmd response: success
2,831,607 UART: [afmc] ++
2,831,775 UART: [afmc] CDI.KEYID = 6
2,832,137 UART: [afmc] SUBJECT.KEYID = 7
2,832,562 UART: [afmc] AUTHORITY.KEYID = 5
2,867,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,586 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,295 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,178 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,879 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,871 UART: [afmc] --
2,910,767 UART: [cold-reset] --
2,911,547 UART: [state] Locking Datavault
2,912,810 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,414 UART: [state] Locking ICCM
2,914,086 UART: [exit] Launching FMC @ 0x40000130
2,919,416 UART:
2,919,432 UART: Running Caliptra FMC ...
2,919,840 UART:
2,919,894 UART: [state] CFI Enabled
2,930,274 UART: [fht] FMC Alias Private Key: 7
3,049,220 UART: [art] Extend RT PCRs Done
3,049,648 UART: [art] Lock RT PCRs Done
3,051,204 UART: [art] Populate DV Done
3,059,577 UART: [fht] FMC Alias Private Key: 7
3,060,605 UART: [art] Derive CDI
3,060,885 UART: [art] Store in slot 0x4
3,147,236 UART: [art] Derive Key Pair
3,147,596 UART: [art] Store priv key in slot 0x5
3,160,848 UART: [art] Derive Key Pair - Done
3,175,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,434 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,199 UART: [art] PUB.X = C23479B50C2450CA3E40AD2A15D5A42B110843C8CE9C287B982E5E944E898E00A4662715BFFCA25765D03598A3B48994
3,198,939 UART: [art] PUB.Y = 9DD2D32E758F933F6C3BFE810EAC382097B0FC63B3840B27ECF476185EBBF9E89F5EBA688119F9A8BDB6082FED2E76E1
3,205,898 UART: [art] SIG.R = 551DB41D3AEFCBE6BBE0970DAB9BE2CF91B9EF3C82330ADC0100DF0970324C6EC5BA11EA167D08B30CC9068A15C31F05
3,212,644 UART: [art] SIG.S = 96449276D3A5470CFAEF310A77AA07CBCC25DB583BD427EC949836941A8A0E1D5FA08D419A1A7A648ECE6F295AF0A70C
3,236,503 UART: Caliptra RT
3,236,754 UART: [state] CFI Enabled
3,356,823 UART: [rt] RT listening for mailbox commands...
3,357,493 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,537 UART: [rt]cmd =0x41544d4e, len=14344
3,789,947 >>> mbox cmd response data (8 bytes)
3,789,948 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,163 UART: [rt]cmd =0x41545348, len=116
3,841,144 >>> mbox cmd response data (12 bytes)
3,841,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,748 UART:
3,841,764 UART: Running Caliptra ROM ...
3,842,172 UART:
3,842,227 UART: [state] CFI Enabled
3,844,959 UART: [state] LifecycleState = Unprovisioned
3,845,614 UART: [state] DebugLocked = No
3,846,238 UART: [state] WD Timer not started. Device not locked for debugging
3,847,492 UART: [kat] SHA2-256
4,653,142 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,657,267 UART: [kat] ++
4,657,419 UART: [kat] sha1
4,661,579 UART: [kat] SHA2-256
4,663,519 UART: [kat] SHA2-384
4,666,322 UART: [kat] SHA2-512-ACC
4,668,222 UART: [kat] ECC-384
4,677,725 UART: [kat] HMAC-384Kdf
4,682,307 UART: [kat] LMS
4,930,635 UART: [kat] --
4,931,527 UART: [update-reset] ++
6,290,539 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,291,612 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,446,827 >>> mbox cmd response: success
6,446,827 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,446,942 UART: [update-reset] Copying MAN_2 To MAN_1
6,454,956 UART: [update-reset Success] --
6,455,997 UART: [state] Locking Datavault
6,456,967 UART: [state] Locking PCR0, PCR1 and PCR31
6,457,571 UART: [state] Locking ICCM
6,458,135 UART: [exit] Launching FMC @ 0x40000130
6,463,465 UART:
6,463,481 UART: Running Caliptra FMC ...
6,463,889 UART:
6,463,943 UART: [state] CFI Enabled
6,552,622 UART: [art] Extend RT PCRs Done
6,553,050 UART: [art] Lock RT PCRs Done
6,554,347 UART: [art] Populate DV Done
6,562,800 UART: [fht] FMC Alias Private Key: 7
6,563,796 UART: [art] Derive CDI
6,564,076 UART: [art] Store in slot 0x4
6,650,031 UART: [art] Derive Key Pair
6,650,391 UART: [art] Store priv key in slot 0x5
6,663,879 UART: [art] Derive Key Pair - Done
6,678,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,694,535 UART: [art] Erasing AUTHORITY.KEYID = 7
6,695,300 UART: [art] PUB.X = 672CF611568CB6A3E2443C17620DD97E11E6E4BE377968D3414D59D39CFA39F3D3F48D1D229F3778B786CC82C73BCD73
6,702,071 UART: [art] PUB.Y = 064EED04DF2859715F00714586145F1ABB2B04024E9CF06A440E7891CC50CA8DDBB2BE8E021C65B434CD749AD4D9BF3F
6,708,993 UART: [art] SIG.R = 3E4C43B9DC3BE5DCE2EC5AC29F7DC08F97BEB2B8357C824FACDBC9D4622256CE5E86CB18EB791067C7B0898B3FE67C02
6,715,784 UART: [art] SIG.S = F8AD2FDE69973927DF433A69174EF1A0092A6C5E5F86E6AF8F8CDD14E4CD10A559FB7DF485E8D1CF8EB1BB568707F0B4
6,739,340 UART: Caliptra RT
6,739,591 UART: [state] CFI Enabled
7,105,579 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,136,526 UART: [rt]cmd =0x41545348, len=116
7,158,240 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,179 ready_for_fw is high
1,060,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,436 >>> mbox cmd response: success
2,741,019 UART:
2,741,035 UART: Running Caliptra FMC ...
2,741,443 UART:
2,741,497 UART: [state] CFI Enabled
2,752,201 UART: [fht] FMC Alias Private Key: 7
2,871,319 UART: [art] Extend RT PCRs Done
2,871,747 UART: [art] Lock RT PCRs Done
2,873,065 UART: [art] Populate DV Done
2,881,102 UART: [fht] FMC Alias Private Key: 7
2,882,278 UART: [art] Derive CDI
2,882,558 UART: [art] Store in slot 0x4
2,968,603 UART: [art] Derive Key Pair
2,968,963 UART: [art] Store priv key in slot 0x5
2,981,915 UART: [art] Derive Key Pair - Done
2,996,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,842 UART: [art] PUB.X = 586DA3C1979363D9B61CF745108DCDF01271059CD4C2BD569E4DB1312E9709945A53C870DCFC65061FC22504597DD7B5
3,019,600 UART: [art] PUB.Y = 186AA23B51EF4FC1D2FB7916CE37CF7BC1755134F325AA8E64E61061E46266EAB2A828198F86AE8D567A046606616418
3,026,544 UART: [art] SIG.R = 55BCDC80176761D6CF961D646AD6F3086A9AFFAEA8C2DAA116B14A0592E40B61424704233995131BE77D6B0190A80C4D
3,033,300 UART: [art] SIG.S = 1C1D0E7D88EE64105DB7E1F67BA2CE3ED0D292CB74478CB3D76E40C84F9AC4F134FC3563C129316B9052F80190DF33EC
3,056,898 UART: Caliptra RT
3,057,149 UART: [state] CFI Enabled
3,176,481 UART: [rt] RT listening for mailbox commands...
3,177,151 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,915 UART: [rt]cmd =0x41544d4e, len=14344
3,609,473 >>> mbox cmd response data (8 bytes)
3,609,474 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,479 UART: [rt]cmd =0x41545348, len=116
3,660,800 >>> mbox cmd response data (12 bytes)
3,660,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,151,246 >>> mbox cmd response: success
6,151,246 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,164,597 UART:
6,164,613 UART: Running Caliptra FMC ...
6,165,021 UART:
6,165,075 UART: [state] CFI Enabled
6,254,134 UART: [art] Extend RT PCRs Done
6,254,562 UART: [art] Lock RT PCRs Done
6,255,773 UART: [art] Populate DV Done
6,263,898 UART: [fht] FMC Alias Private Key: 7
6,264,834 UART: [art] Derive CDI
6,265,114 UART: [art] Store in slot 0x4
6,350,525 UART: [art] Derive Key Pair
6,350,885 UART: [art] Store priv key in slot 0x5
6,364,261 UART: [art] Derive Key Pair - Done
6,379,114 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,394,911 UART: [art] Erasing AUTHORITY.KEYID = 7
6,395,676 UART: [art] PUB.X = 88A73A0445F3BB048465EC17CD3A9A47E0175196D5AD64824A833C62869648F2160E75B4C6479FC5B3460ED19BC3C880
6,402,430 UART: [art] PUB.Y = 621F41389FDE041E17F7BA3CD7B842B872A209227B9626628079A52703E7EA7F4AFDBC33BFEF3F696CF6109448BE33DF
6,409,379 UART: [art] SIG.R = DB630FD1CCFE1AD2EAE5A528D955CA4BB7A4EB93AC0F3C25F5710EC860C05584CB21402482819B994FDA10097506A087
6,416,146 UART: [art] SIG.S = 0B53C3870191234050FB6F1F6360EC7BF3BAF881D027071113B3C529F692C049D7DA2F5EB067EC31FC641252EB7AA4D8
6,439,689 UART: Caliptra RT
6,439,940 UART: [state] CFI Enabled
6,802,894 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,833,531 UART: [rt]cmd =0x41545348, len=116
6,855,597 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
893,523 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,648 UART: [kat] ++
897,800 UART: [kat] sha1
901,948 UART: [kat] SHA2-256
903,888 UART: [kat] SHA2-384
906,615 UART: [kat] SHA2-512-ACC
908,516 UART: [kat] ECC-384
918,491 UART: [kat] HMAC-384Kdf
923,179 UART: [kat] LMS
1,171,507 UART: [kat] --
1,172,468 UART: [cold-reset] ++
1,173,034 UART: [fht] FHT @ 0x50003400
1,175,921 UART: [idev] ++
1,176,089 UART: [idev] CDI.KEYID = 6
1,176,449 UART: [idev] SUBJECT.KEYID = 7
1,176,873 UART: [idev] UDS.KEYID = 0
1,177,218 ready_for_fw is high
1,177,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,855 UART: [idev] Erasing UDS.KEYID = 0
1,202,412 UART: [idev] Sha1 KeyId Algorithm
1,210,928 UART: [idev] --
1,212,034 UART: [ldev] ++
1,212,202 UART: [ldev] CDI.KEYID = 6
1,212,565 UART: [ldev] SUBJECT.KEYID = 5
1,212,991 UART: [ldev] AUTHORITY.KEYID = 7
1,213,454 UART: [ldev] FE.KEYID = 1
1,218,604 UART: [ldev] Erasing FE.KEYID = 1
1,245,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,228 UART: [ldev] --
1,284,707 UART: [fwproc] Wait for Commands...
1,285,289 UART: [fwproc] Recv command 0x46574c44
1,286,017 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,085 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,255 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,576 >>> mbox cmd response: success
2,830,768 UART: [afmc] ++
2,830,936 UART: [afmc] CDI.KEYID = 6
2,831,298 UART: [afmc] SUBJECT.KEYID = 7
2,831,723 UART: [afmc] AUTHORITY.KEYID = 5
2,866,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,163 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,872 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,755 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,456 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,270 UART: [afmc] --
2,909,236 UART: [cold-reset] --
2,910,266 UART: [state] Locking Datavault
2,911,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,789 UART: [state] Locking ICCM
2,912,257 UART: [exit] Launching FMC @ 0x40000130
2,917,587 UART:
2,917,603 UART: Running Caliptra FMC ...
2,918,011 UART:
2,918,154 UART: [state] CFI Enabled
2,928,672 UART: [fht] FMC Alias Private Key: 7
3,047,066 UART: [art] Extend RT PCRs Done
3,047,494 UART: [art] Lock RT PCRs Done
3,048,854 UART: [art] Populate DV Done
3,057,157 UART: [fht] FMC Alias Private Key: 7
3,058,251 UART: [art] Derive CDI
3,058,531 UART: [art] Store in slot 0x4
3,144,538 UART: [art] Derive Key Pair
3,144,898 UART: [art] Store priv key in slot 0x5
3,158,868 UART: [art] Derive Key Pair - Done
3,173,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,735 UART: [art] PUB.X = 726E85A91EF148BBE943090A3B47526CBC3BB6DCD7A9A91E5D5073EEB5A6423608445E351EAC299D772E76740CEEA27B
3,196,503 UART: [art] PUB.Y = 6C116A6F5B3719C436110D501A1A94A0DA7A29CEC2C7F0F5D5B9AE4608EEE2B16E3A3C7B4F3DD6E3B793C37A01B8C50D
3,203,459 UART: [art] SIG.R = 18F6DCBB81994FDF6499809ECB18CCB4714CC3EAE571B10F3146520BC40AEE8E50DCA2123A583750929E7C399CAB70EC
3,210,234 UART: [art] SIG.S = 52231D5581DFAD1F181797F6682B484FE1D1A73CE35E278233C5B9F65DA2F93AAC829BF5E1BE89BE63FCE6BE21C1F963
3,233,954 UART: Caliptra RT
3,234,297 UART: [state] CFI Enabled
3,354,457 UART: [rt] RT listening for mailbox commands...
3,355,127 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,083 UART: [rt]cmd =0x41544d4e, len=14344
3,787,679 >>> mbox cmd response data (8 bytes)
3,787,680 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,849 UART: [rt]cmd =0x41545348, len=116
3,839,874 >>> mbox cmd response data (12 bytes)
3,839,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,692 UART:
3,840,708 UART: Running Caliptra ROM ...
3,841,116 UART:
3,841,258 UART: [state] CFI Enabled
3,843,908 UART: [state] LifecycleState = Unprovisioned
3,844,563 UART: [state] DebugLocked = No
3,845,291 UART: [state] WD Timer not started. Device not locked for debugging
3,846,553 UART: [kat] SHA2-256
4,652,203 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,656,328 UART: [kat] ++
4,656,480 UART: [kat] sha1
4,660,794 UART: [kat] SHA2-256
4,662,734 UART: [kat] SHA2-384
4,665,437 UART: [kat] SHA2-512-ACC
4,667,337 UART: [kat] ECC-384
4,677,052 UART: [kat] HMAC-384Kdf
4,681,590 UART: [kat] LMS
4,929,918 UART: [kat] --
4,930,698 UART: [update-reset] ++
6,289,872 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,290,999 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,446,214 >>> mbox cmd response: success
6,446,214 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,446,319 UART: [update-reset] Copying MAN_2 To MAN_1
6,454,333 UART: [update-reset Success] --
6,455,286 UART: [state] Locking Datavault
6,455,906 UART: [state] Locking PCR0, PCR1 and PCR31
6,456,510 UART: [state] Locking ICCM
6,456,958 UART: [exit] Launching FMC @ 0x40000130
6,462,288 UART:
6,462,304 UART: Running Caliptra FMC ...
6,462,712 UART:
6,462,855 UART: [state] CFI Enabled
6,551,794 UART: [art] Extend RT PCRs Done
6,552,222 UART: [art] Lock RT PCRs Done
6,553,545 UART: [art] Populate DV Done
6,561,782 UART: [fht] FMC Alias Private Key: 7
6,562,806 UART: [art] Derive CDI
6,563,086 UART: [art] Store in slot 0x4
6,649,141 UART: [art] Derive Key Pair
6,649,501 UART: [art] Store priv key in slot 0x5
6,662,395 UART: [art] Derive Key Pair - Done
6,676,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,692,347 UART: [art] Erasing AUTHORITY.KEYID = 7
6,693,112 UART: [art] PUB.X = 3393F981FFC71878373D62E5CC313F4578FCD66DF40BB3E699E24108C8A2B01655AE29AA63B1E08950721307495CDEFB
6,699,875 UART: [art] PUB.Y = 41E0C67D11F29B5FD7D2F8624914B25293B9CA286777E42B8FBEC362F2D1B452D95AED37F1C499D8806233195C63547F
6,706,825 UART: [art] SIG.R = 3F5EF7493B83924389A28FB4345BB0BDD187E89115E5D0961F5F72AC95E7B8E39D07D717C27874F19D496E7CEBF07E66
6,713,596 UART: [art] SIG.S = 3890416B5443101892DC6EF79E32FD8A4BFAA7CFBDB3CDD42DEE14580FBA85A7CF9B4D379431BB8721F6B6B6F0077C70
6,737,852 UART: Caliptra RT
6,738,195 UART: [state] CFI Enabled
7,107,532 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,138,501 UART: [rt]cmd =0x41545348, len=116
7,160,543 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,282 ready_for_fw is high
1,060,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,237 >>> mbox cmd response: success
2,741,576 UART:
2,741,592 UART: Running Caliptra FMC ...
2,742,000 UART:
2,742,143 UART: [state] CFI Enabled
2,752,569 UART: [fht] FMC Alias Private Key: 7
2,871,739 UART: [art] Extend RT PCRs Done
2,872,167 UART: [art] Lock RT PCRs Done
2,873,535 UART: [art] Populate DV Done
2,881,712 UART: [fht] FMC Alias Private Key: 7
2,882,886 UART: [art] Derive CDI
2,883,166 UART: [art] Store in slot 0x4
2,968,967 UART: [art] Derive Key Pair
2,969,327 UART: [art] Store priv key in slot 0x5
2,982,211 UART: [art] Derive Key Pair - Done
2,996,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,002 UART: [art] PUB.X = FA3FFC0EB07A5AC42153FFD83C82836814A687D2605936030B954098257DB4612ABF0EFBE76A31DF52FDB078563DCB9D
3,019,770 UART: [art] PUB.Y = CE8AF2053B9D30398CA920E94CFFAF0194C3FC79CDC00FA65594AA19C388C85E45F3F5C1D82D28C311849BB780118418
3,026,719 UART: [art] SIG.R = 05D3A57C7DB663DB54A072078E18BE7E1942EAB5AEEB1DDE68EF033A174CDE6F45EDC309DD2BD7D9871C1B464995DD2E
3,033,499 UART: [art] SIG.S = 3D588F1A4E51C9E52A6CC9E20931196B2FBE205E543655E2FA772513CC5D8D53ADA7578716EE5DF09BC621F0C8FC2328
3,057,472 UART: Caliptra RT
3,057,815 UART: [state] CFI Enabled
3,177,405 UART: [rt] RT listening for mailbox commands...
3,178,075 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,307 UART: [rt]cmd =0x41544d4e, len=14344
3,611,245 >>> mbox cmd response data (8 bytes)
3,611,246 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,397 UART: [rt]cmd =0x41545348, len=116
3,663,462 >>> mbox cmd response data (12 bytes)
3,663,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,152,517 >>> mbox cmd response: success
6,152,517 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,165,818 UART:
6,165,834 UART: Running Caliptra FMC ...
6,166,242 UART:
6,166,385 UART: [state] CFI Enabled
6,255,274 UART: [art] Extend RT PCRs Done
6,255,702 UART: [art] Lock RT PCRs Done
6,256,943 UART: [art] Populate DV Done
6,265,254 UART: [fht] FMC Alias Private Key: 7
6,266,432 UART: [art] Derive CDI
6,266,712 UART: [art] Store in slot 0x4
6,352,333 UART: [art] Derive Key Pair
6,352,693 UART: [art] Store priv key in slot 0x5
6,365,669 UART: [art] Derive Key Pair - Done
6,380,731 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,396,490 UART: [art] Erasing AUTHORITY.KEYID = 7
6,397,255 UART: [art] PUB.X = 64BF77AF94FCF7EBDFE69A837365B2D93B4AB42C7533CDCBFF6247E04177D0DDE7C08DC570B10C9EB4846246484AD98B
6,404,040 UART: [art] PUB.Y = DA9E2F4A66E00264EBC4D7FC59DEE9E707EC3345F387C9B559153F54E9962C2AB4C1FAF4EAD4F7BD3A781AE21071EF49
6,411,004 UART: [art] SIG.R = E5D5D8BADCCBA370F6C715DABB93E64D1B5D06A28682B6E91CF1D47F3834D9FB418306BDEBDFD6FD143A1949667102ED
6,417,787 UART: [art] SIG.S = ACB822A8DEFB7FD9C1EA94C76DBA51C6344A0A15D6E7646B00BB8109A476E58ADAC58780C7BE07810172C03DBAE75F6C
6,441,993 UART: Caliptra RT
6,442,336 UART: [state] CFI Enabled
6,809,003 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,840,000 UART: [rt]cmd =0x41545348, len=116
6,862,362 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,102 UART:
192,452 UART: Running Caliptra ROM ...
193,666 UART:
193,821 UART: [state] CFI Enabled
264,517 UART: [state] LifecycleState = Unprovisioned
266,446 UART: [state] DebugLocked = No
268,416 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,665 UART: [kat] SHA2-256
443,372 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,832 UART: [kat] ++
454,475 UART: [kat] sha1
463,865 UART: [kat] SHA2-256
466,550 UART: [kat] SHA2-384
471,949 UART: [kat] SHA2-512-ACC
474,342 UART: [kat] ECC-384
2,777,564 UART: [kat] HMAC-384Kdf
2,808,930 UART: [kat] LMS
3,999,219 UART: [kat] --
4,003,458 UART: [cold-reset] ++
4,005,900 UART: [fht] Storing FHT @ 0x50003400
4,017,666 UART: [idev] ++
4,018,230 UART: [idev] CDI.KEYID = 6
4,019,190 UART: [idev] SUBJECT.KEYID = 7
4,020,432 UART: [idev] UDS.KEYID = 0
4,021,363 ready_for_fw is high
4,021,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,170,638 UART: [idev] Erasing UDS.KEYID = 0
7,352,760 UART: [idev] Using Sha1 for KeyId Algorithm
7,375,541 UART: [idev] --
7,379,158 UART: [ldev] ++
7,379,750 UART: [ldev] CDI.KEYID = 6
7,380,771 UART: [ldev] SUBJECT.KEYID = 5
7,381,930 UART: [ldev] AUTHORITY.KEYID = 7
7,383,160 UART: [ldev] FE.KEYID = 1
7,430,934 UART: [ldev] Erasing FE.KEYID = 1
10,765,719 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,078,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,093,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,107,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,122,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,142,139 UART: [ldev] --
13,147,242 UART: [fwproc] Waiting for Commands...
13,149,608 UART: [fwproc] Received command 0x46574c44
13,151,786 UART: [fwproc] Received Image of size 118548 bytes
17,259,138 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,338,920 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,412,071 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,739,899 >>> mbox cmd response: success
17,744,628 UART: [afmc] ++
17,745,261 UART: [afmc] CDI.KEYID = 6
17,746,199 UART: [afmc] SUBJECT.KEYID = 7
17,747,366 UART: [afmc] AUTHORITY.KEYID = 5
21,109,969 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,406,350 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,408,611 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,423,048 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,437,756 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,452,183 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,473,728 UART: [afmc] --
23,476,731 UART: [cold-reset] --
23,480,971 UART: [state] Locking Datavault
23,487,621 UART: [state] Locking PCR0, PCR1 and PCR31
23,489,347 UART: [state] Locking ICCM
23,490,398 UART: [exit] Launching FMC @ 0x40000130
23,498,797 UART:
23,499,032 UART: Running Caliptra FMC ...
23,500,345 UART:
23,500,520 UART: [state] CFI Enabled
23,566,352 UART: [fht] FMC Alias Private Key: 7
25,907,180 UART: [art] Extend RT PCRs Done
25,908,409 UART: [art] Lock RT PCRs Done
25,910,542 UART: [art] Populate DV Done
25,915,900 UART: [fht] FMC Alias Private Key: 7
25,917,489 UART: [art] Derive CDI
25,918,238 UART: [art] Store in slot 0x4
25,975,540 UART: [art] Derive Key Pair
25,976,536 UART: [art] Store priv key in slot 0x5
29,269,113 UART: [art] Derive Key Pair - Done
29,281,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,570,892 UART: [art] Erasing AUTHORITY.KEYID = 7
31,572,402 UART: [art] PUB.X = 83BADDABCC841D21BA829E5509737A90DF746303D06AB6C174434FECE7B63511E57425E782906B477D311D1DD1879D11
31,579,693 UART: [art] PUB.Y = C066A3B0F506DF929906F0FA13AEE4AECA34E38FC049D77599D79E8DB15A29D8DA6CBF2B15693387AE77CE672226BEED
31,586,961 UART: [art] SIG.R = 9479007B704366453BEDB913E31FD943E4CB4106D19E04FDE69A58B82DCF7D709F63F53F6C7B6E36211A16258FA4A198
31,594,322 UART: [art] SIG.S = CEB0B272BE3D0EFA9B1A927B09ADE408FC071433F0E1724FAA40EFC441A4003151753989062A1258FD283F327EA16C5C
32,900,108 UART: Caliptra RT
32,900,850 UART: [state] CFI Enabled
33,097,225 UART: [rt] RT listening for mailbox commands...
33,099,777 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,255,020 UART: [rt]cmd =0x41544d4e, len=14344
38,555,894 >>> mbox cmd response data (8 bytes)
38,556,516 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,587,283 UART: [rt]cmd =0x41545348, len=116
38,589,375 >>> mbox cmd response data (12 bytes)
40,664,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,814,819 UART:
40,815,204 UART: Running Caliptra ROM ...
40,816,344 UART:
40,816,529 UART: [state] CFI Enabled
40,891,605 UART: [state] LifecycleState = Unprovisioned
40,893,577 UART: [state] DebugLocked = No
40,896,110 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,900,434 UART: [kat] SHA2-256
41,070,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,080,638 UART: [kat] ++
41,081,135 UART: [kat] sha1
41,092,429 UART: [kat] SHA2-256
41,095,126 UART: [kat] SHA2-384
41,100,836 UART: [kat] SHA2-512-ACC
41,103,196 UART: [kat] ECC-384
43,392,306 UART: [kat] HMAC-384Kdf
43,426,627 UART: [kat] LMS
44,616,971 UART: [kat] --
44,622,640 UART: [update-reset] ++
48,819,344 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,822,221 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,219,924 >>> mbox cmd response: success
49,224,761 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,225,396 UART: [update-reset] Copying MAN_2 To MAN_1
49,242,713 UART: [update-reset Success] --
49,248,084 UART: [state] Locking Datavault
49,251,451 UART: [state] Locking PCR0, PCR1 and PCR31
49,253,205 UART: [state] Locking ICCM
49,255,723 UART: [exit] Launching FMC @ 0x40000130
49,264,140 UART:
49,264,390 UART: Running Caliptra FMC ...
49,265,495 UART:
49,265,656 UART: [state] CFI Enabled
49,366,714 UART: [art] Extend RT PCRs Done
49,367,898 UART: [art] Lock RT PCRs Done
49,369,190 UART: [art] Populate DV Done
49,374,648 UART: [fht] FMC Alias Private Key: 7
49,376,209 UART: [art] Derive CDI
49,377,024 UART: [art] Store in slot 0x4
49,435,348 UART: [art] Derive Key Pair
49,436,396 UART: [art] Store priv key in slot 0x5
52,729,027 UART: [art] Derive Key Pair - Done
52,742,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,030,714 UART: [art] Erasing AUTHORITY.KEYID = 7
55,032,228 UART: [art] PUB.X = 2E5AB43143EBC6C0F1194977EAD5BC94BDEBDB899E4A931C2A1442F030E54BFA748403306CC953B736A22349C723BF94
55,039,498 UART: [art] PUB.Y = D267BE9BF5C32CF43BBBC39D329E777EB253C28A3520B536EA25F2AF0C3246B6A5BC6ECB7169FF38F1E67D6D19C96002
55,046,806 UART: [art] SIG.R = 62C1170E8F00E746DC28B6F7DA62B4B52EFED34438E49A67E41AF7E1EA801E110B329DDA697DAA35E27896895DF79F74
55,054,170 UART: [art] SIG.S = 25D703DD2AEA015E0DA9EFA2DA4DBCC04E23ED0541673E0D54D1259051F7AA3A23FC5C072A56D0AC7E6DB3861A7ABCE9
56,359,170 UART: Caliptra RT
56,359,892 UART: [state] CFI Enabled
56,775,607 UART: [rt] RT listening for mailbox commands...
56,807,626 UART: [rt]cmd =0x41545348, len=116
56,809,871 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.16s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,785,437 ready_for_fw is high
3,785,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,943,077 >>> mbox cmd response: success
23,630,468 UART:
23,630,963 UART: Running Caliptra FMC ...
23,632,098 UART:
23,632,267 UART: [state] CFI Enabled
23,699,436 UART: [fht] FMC Alias Private Key: 7
26,040,492 UART: [art] Extend RT PCRs Done
26,041,719 UART: [art] Lock RT PCRs Done
26,043,358 UART: [art] Populate DV Done
26,048,767 UART: [fht] FMC Alias Private Key: 7
26,050,470 UART: [art] Derive CDI
26,051,284 UART: [art] Store in slot 0x4
26,108,435 UART: [art] Derive Key Pair
26,109,494 UART: [art] Store priv key in slot 0x5
29,401,875 UART: [art] Derive Key Pair - Done
29,414,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,703,273 UART: [art] Erasing AUTHORITY.KEYID = 7
31,704,782 UART: [art] PUB.X = ECD8041AFA47C76960AC4FFC28A0864D7C1E4D15884C8AA9F90B3B77ABBC1EEF6357BB0669142B437C77F7667CBF3AE9
31,712,100 UART: [art] PUB.Y = 4FFAAD453A4782E2177B7475E7A97B4AA41079CE86B4AE3CF5C2565F7F4702EFC1C3AEE0BAD4C0FE34D0A9AD907BAC82
31,719,388 UART: [art] SIG.R = 1EF5F9F5F67B933B4337D3FD8575DCB9D668589EC7A12A01C6965F6691DF015480B978BDB864FD45D8CD8E0952F4BE44
31,726,740 UART: [art] SIG.S = 00BF860F847160E79FC649313E494EBA39E25FFB4B74C77E87B3DFA73540976219AFFC11FDCF5E7C18B46CAF19612907
33,031,644 UART: Caliptra RT
33,032,356 UART: [state] CFI Enabled
33,210,522 UART: [rt] RT listening for mailbox commands...
33,213,033 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,368,479 UART: [rt]cmd =0x41544d4e, len=14344
38,669,152 >>> mbox cmd response data (8 bytes)
38,669,740 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,700,468 UART: [rt]cmd =0x41545348, len=116
38,702,959 >>> mbox cmd response data (12 bytes)
40,776,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,596,878 >>> mbox cmd response: success
49,597,460 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,633,680 UART:
49,634,013 UART: Running Caliptra FMC ...
49,635,056 UART:
49,635,212 UART: [state] CFI Enabled
49,740,859 UART: [art] Extend RT PCRs Done
49,742,147 UART: [art] Lock RT PCRs Done
49,743,661 UART: [art] Populate DV Done
49,749,032 UART: [fht] FMC Alias Private Key: 7
49,750,630 UART: [art] Derive CDI
49,751,445 UART: [art] Store in slot 0x4
49,809,433 UART: [art] Derive Key Pair
49,810,470 UART: [art] Store priv key in slot 0x5
53,102,941 UART: [art] Derive Key Pair - Done
53,115,891 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,405,069 UART: [art] Erasing AUTHORITY.KEYID = 7
55,406,580 UART: [art] PUB.X = CD13D9FE4E86E727724D0E6302C7579D6D3A1DA5691EB587FA04F60CEE762D71A04F8E67625464390BECE5839338A3BC
55,413,846 UART: [art] PUB.Y = 8C0D0048B6D39BE14B764D439549F8591F951C93170E9DCE8DCD415978816FA1F3E045BEECE19B77105907176C14A279
55,421,085 UART: [art] SIG.R = F80866DE1D944C0C3BC11217B63DACD809AC68275E1947307A85E457195DB1A0E0F8F782DF130287B281D7F48F9039FC
55,428,423 UART: [art] SIG.S = 5C5FFA468DE8072FDBEBBB2A5810B078BB557C69A51369A5DF137EF67D34AFB34D189AB1A3336B4185737C8189BF78BE
56,734,482 UART: Caliptra RT
56,735,202 UART: [state] CFI Enabled
57,151,902 UART: [rt] RT listening for mailbox commands...
57,183,866 UART: [rt]cmd =0x41545348, len=116
57,186,192 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.18s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,465 writing to cptra_bootfsm_go
203,895 UART:
204,255 UART: Running Caliptra ROM ...
205,367 UART:
615,167 UART: [state] CFI Enabled
630,328 UART: [state] LifecycleState = Unprovisioned
632,269 UART: [state] DebugLocked = No
633,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
638,559 UART: [kat] SHA2-256
808,348 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
818,868 UART: [kat] ++
819,309 UART: [kat] sha1
831,170 UART: [kat] SHA2-256
833,813 UART: [kat] SHA2-384
841,151 UART: [kat] SHA2-512-ACC
843,515 UART: [kat] ECC-384
3,128,245 UART: [kat] HMAC-384Kdf
3,139,634 UART: [kat] LMS
4,329,744 UART: [kat] --
4,335,471 UART: [cold-reset] ++
4,337,843 UART: [fht] Storing FHT @ 0x50003400
4,348,605 UART: [idev] ++
4,349,164 UART: [idev] CDI.KEYID = 6
4,350,080 UART: [idev] SUBJECT.KEYID = 7
4,351,319 UART: [idev] UDS.KEYID = 0
4,352,372 ready_for_fw is high
4,352,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,501,475 UART: [idev] Erasing UDS.KEYID = 0
7,642,094 UART: [idev] Using Sha1 for KeyId Algorithm
7,663,358 UART: [idev] --
7,666,651 UART: [ldev] ++
7,667,214 UART: [ldev] CDI.KEYID = 6
7,668,175 UART: [ldev] SUBJECT.KEYID = 5
7,669,380 UART: [ldev] AUTHORITY.KEYID = 7
7,670,657 UART: [ldev] FE.KEYID = 1
7,680,544 UART: [ldev] Erasing FE.KEYID = 1
10,969,314 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,260,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,275,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,290,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,304,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,324,699 UART: [ldev] --
13,330,129 UART: [fwproc] Waiting for Commands...
13,332,757 UART: [fwproc] Received command 0x46574c44
13,334,988 UART: [fwproc] Received Image of size 118548 bytes
17,444,778 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,526,141 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,599,268 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,928,537 >>> mbox cmd response: success
17,931,807 UART: [afmc] ++
17,932,406 UART: [afmc] CDI.KEYID = 6
17,933,318 UART: [afmc] SUBJECT.KEYID = 7
17,934,598 UART: [afmc] AUTHORITY.KEYID = 5
21,250,322 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,545,547 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,547,857 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,562,232 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,576,985 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,591,403 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,612,602 UART: [afmc] --
23,616,210 UART: [cold-reset] --
23,620,016 UART: [state] Locking Datavault
23,625,258 UART: [state] Locking PCR0, PCR1 and PCR31
23,627,006 UART: [state] Locking ICCM
23,629,403 UART: [exit] Launching FMC @ 0x40000130
23,637,796 UART:
23,638,025 UART: Running Caliptra FMC ...
23,639,122 UART:
23,639,294 UART: [state] CFI Enabled
23,647,173 UART: [fht] FMC Alias Private Key: 7
25,987,260 UART: [art] Extend RT PCRs Done
25,988,481 UART: [art] Lock RT PCRs Done
25,989,943 UART: [art] Populate DV Done
25,995,516 UART: [fht] FMC Alias Private Key: 7
25,997,045 UART: [art] Derive CDI
25,997,853 UART: [art] Store in slot 0x4
26,040,072 UART: [art] Derive Key Pair
26,041,110 UART: [art] Store priv key in slot 0x5
29,283,128 UART: [art] Derive Key Pair - Done
29,296,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,575,987 UART: [art] Erasing AUTHORITY.KEYID = 7
31,577,482 UART: [art] PUB.X = E20107B45A22C62582F2778CD8EEA4C3DDF88658EBA4184D921679D9268469EE905256197793C14A2C6E75912A3FFC82
31,584,822 UART: [art] PUB.Y = 21791D585D59BAAE42F24824D966D2C71CD25BF33DBAA524FD883162BCE76A7863EA545D65BB423382D0063F72B368C6
31,592,011 UART: [art] SIG.R = 11010EA9D80892FCD705E709792B6D86D1608C849D561CBD70772DE1BDE17CF3E99FA413986C1D137B32638A54FAD57D
31,599,438 UART: [art] SIG.S = 80B9521821BFF973F80F9DCD781BAAA717B71A90F77DF825201CF1EA4096CAEAF7FF900CDD0E4192A89DDF43E39ECED0
32,904,947 UART: Caliptra RT
32,905,656 UART: [state] CFI Enabled
33,038,752 UART: [rt] RT listening for mailbox commands...
33,041,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,196,765 UART: [rt]cmd =0x41544d4e, len=14344
38,497,390 >>> mbox cmd response data (8 bytes)
38,498,049 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,528,785 UART: [rt]cmd =0x41545348, len=116
38,531,205 >>> mbox cmd response data (12 bytes)
40,601,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,752,074 UART:
40,752,475 UART: Running Caliptra ROM ...
40,753,525 UART:
40,753,676 UART: [state] CFI Enabled
40,767,254 UART: [state] LifecycleState = Unprovisioned
40,769,145 UART: [state] DebugLocked = No
40,772,175 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,777,719 UART: [kat] SHA2-256
40,947,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,957,949 UART: [kat] ++
40,958,467 UART: [kat] sha1
40,969,730 UART: [kat] SHA2-256
40,972,401 UART: [kat] SHA2-384
40,978,225 UART: [kat] SHA2-512-ACC
40,980,566 UART: [kat] ECC-384
43,263,605 UART: [kat] HMAC-384Kdf
43,276,337 UART: [kat] LMS
44,466,405 UART: [kat] --
44,469,765 UART: [update-reset] ++
48,663,580 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,666,705 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,064,457 >>> mbox cmd response: success
49,069,190 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,069,783 UART: [update-reset] Copying MAN_2 To MAN_1
49,087,808 UART: [update-reset Success] --
49,093,114 UART: [state] Locking Datavault
49,096,195 UART: [state] Locking PCR0, PCR1 and PCR31
49,097,946 UART: [state] Locking ICCM
49,100,220 UART: [exit] Launching FMC @ 0x40000130
49,108,611 UART:
49,108,842 UART: Running Caliptra FMC ...
49,109,937 UART:
49,110,093 UART: [state] CFI Enabled
49,154,817 UART: [art] Extend RT PCRs Done
49,156,009 UART: [art] Lock RT PCRs Done
49,157,573 UART: [art] Populate DV Done
49,163,189 UART: [fht] FMC Alias Private Key: 7
49,164,876 UART: [art] Derive CDI
49,165,691 UART: [art] Store in slot 0x4
49,208,374 UART: [art] Derive Key Pair
49,209,423 UART: [art] Store priv key in slot 0x5
52,451,514 UART: [art] Derive Key Pair - Done
52,464,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,744,561 UART: [art] Erasing AUTHORITY.KEYID = 7
54,746,096 UART: [art] PUB.X = A20C84A6CEEE5B160E697DD88B7D09561AD6ABDDC45AA3531ED3AF0E63C912A1D5B890D200A377D7BE7FA8DDAF887D67
54,753,364 UART: [art] PUB.Y = F32DF8268A656DDC653B02A9B7BF952D2A8B838F03B85D53A8CF4815D606547FFE53C1EB12494801FE03B64DD023820A
54,760,652 UART: [art] SIG.R = 3E75D96669E3A227CB334A66929F99CF58DBD8EDEBED88B1D51082D73BAEA58F5CFB39136ABD66EE72CDC495DA2B479A
54,768,041 UART: [art] SIG.S = 5071AADD357236B0EEF7D6D50C37E82CFC49C3103BE842B75573DA1C1822A90F4D2CC1AC5FD4AE763EC74B9F7F557AAD
56,073,438 UART: Caliptra RT
56,074,151 UART: [state] CFI Enabled
56,449,058 UART: [rt] RT listening for mailbox commands...
56,481,081 UART: [rt]cmd =0x41545348, len=116
56,483,267 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.14s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
4,124,942 ready_for_fw is high
4,125,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,759 >>> mbox cmd response: success
23,800,708 UART:
23,801,099 UART: Running Caliptra FMC ...
23,802,230 UART:
23,802,379 UART: [state] CFI Enabled
23,810,203 UART: [fht] FMC Alias Private Key: 7
26,150,138 UART: [art] Extend RT PCRs Done
26,151,365 UART: [art] Lock RT PCRs Done
26,153,172 UART: [art] Populate DV Done
26,158,795 UART: [fht] FMC Alias Private Key: 7
26,160,224 UART: [art] Derive CDI
26,160,953 UART: [art] Store in slot 0x4
26,203,422 UART: [art] Derive Key Pair
26,204,477 UART: [art] Store priv key in slot 0x5
29,446,468 UART: [art] Derive Key Pair - Done
29,458,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,092 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,604 UART: [art] PUB.X = DF100CEDF14CB779A1561831434D5DE323613E2AA5B9F4D366AE9D4F36E94EC118220E2349EF7E3084E4669C12F7254C
31,747,848 UART: [art] PUB.Y = 3066219592D15AFFE28FBCE4412668B8ACB6BEF7995774046D9CC5C079E08A6858B8E5B63F1BAD0D0B9A7A85E281B64C
31,755,115 UART: [art] SIG.R = 176E61A5953EF7EF7FD0E975D8A25822FD1415384EB8379F42F58C7D9786BDA70ECC4D70E9EB69901C3C33D195E1B866
31,762,502 UART: [art] SIG.S = 92ED01A68C895AAC1060B10052ABA1321BABCF7EC849F96C24ED12F2D9F8B8B77C80708BD61681C79A7E3328C8C81EC5
33,067,298 UART: Caliptra RT
33,067,987 UART: [state] CFI Enabled
33,201,838 UART: [rt] RT listening for mailbox commands...
33,204,231 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,359,832 UART: [rt]cmd =0x41544d4e, len=14344
38,660,346 >>> mbox cmd response data (8 bytes)
38,660,927 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,691,651 UART: [rt]cmd =0x41545348, len=116
38,694,019 >>> mbox cmd response data (12 bytes)
40,766,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,512,261 >>> mbox cmd response: success
49,512,884 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,545,856 UART:
49,546,174 UART: Running Caliptra FMC ...
49,547,288 UART:
49,547,449 UART: [state] CFI Enabled
49,591,136 UART: [art] Extend RT PCRs Done
49,592,390 UART: [art] Lock RT PCRs Done
49,593,706 UART: [art] Populate DV Done
49,599,179 UART: [fht] FMC Alias Private Key: 7
49,600,658 UART: [art] Derive CDI
49,601,391 UART: [art] Store in slot 0x4
49,644,038 UART: [art] Derive Key Pair
49,645,083 UART: [art] Store priv key in slot 0x5
52,886,555 UART: [art] Derive Key Pair - Done
52,899,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,179,886 UART: [art] Erasing AUTHORITY.KEYID = 7
55,181,385 UART: [art] PUB.X = 1CEDE7CF8FA0CC8E41C56ACDE91A6882C01D8B56B03E417E4E192219EF9F5880ED648BA3BF4AA2078BD6CC7F2EFC6348
55,188,679 UART: [art] PUB.Y = 2C3187EAD8A5AA6A631A62C4A59D459EC5D525D51590EF83252F6692810FB15EC8AF9ADE635F10D3CEF1FD73540A7721
55,195,952 UART: [art] SIG.R = A6664DD7A82DC6142EC63A15C2DC4D1563C4BED146DB459D1CFF737C6D019C46CA1EE6FBEE46E13CADA3C92DA00CE65F
55,203,391 UART: [art] SIG.S = 309A1BB0B1FA9A5E3E8787FDD49541626781ED85976FA714FD7E7CD1CBAC0CDA91460804317AA20E75AF8D9E7CEB0DC9
56,508,744 UART: Caliptra RT
56,509,453 UART: [state] CFI Enabled
56,887,385 UART: [rt] RT listening for mailbox commands...
56,919,563 UART: [rt]cmd =0x41545348, len=116
56,921,691 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.17s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,077 UART:
192,448 UART: Running Caliptra ROM ...
193,552 UART:
193,694 UART: [state] CFI Enabled
265,788 UART: [state] LifecycleState = Unprovisioned
267,713 UART: [state] DebugLocked = No
270,013 UART: [state] WD Timer not started. Device not locked for debugging
273,607 UART: [kat] SHA2-256
453,237 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,060 UART: [kat] ++
464,511 UART: [kat] sha1
476,654 UART: [kat] SHA2-256
479,307 UART: [kat] SHA2-384
486,147 UART: [kat] SHA2-512-ACC
488,546 UART: [kat] ECC-384
2,950,683 UART: [kat] HMAC-384Kdf
2,972,171 UART: [kat] LMS
3,448,650 UART: [kat] --
3,451,225 UART: [cold-reset] ++
3,453,507 UART: [fht] FHT @ 0x50003400
3,464,122 UART: [idev] ++
3,464,757 UART: [idev] CDI.KEYID = 6
3,465,667 UART: [idev] SUBJECT.KEYID = 7
3,466,906 UART: [idev] UDS.KEYID = 0
3,467,973 ready_for_fw is high
3,468,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,701 UART: [idev] Erasing UDS.KEYID = 0
5,989,357 UART: [idev] Sha1 KeyId Algorithm
6,012,973 UART: [idev] --
6,019,325 UART: [ldev] ++
6,019,904 UART: [ldev] CDI.KEYID = 6
6,020,786 UART: [ldev] SUBJECT.KEYID = 5
6,022,003 UART: [ldev] AUTHORITY.KEYID = 7
6,023,295 UART: [ldev] FE.KEYID = 1
6,059,085 UART: [ldev] Erasing FE.KEYID = 1
8,564,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,174 UART: [ldev] --
10,377,247 UART: [fwproc] Wait for Commands...
10,379,279 UART: [fwproc] Recv command 0x46574c44
10,381,255 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,823 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,841 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,648 >>> mbox cmd response: success
14,355,612 UART: [afmc] ++
14,356,202 UART: [afmc] CDI.KEYID = 6
14,357,138 UART: [afmc] SUBJECT.KEYID = 7
14,358,347 UART: [afmc] AUTHORITY.KEYID = 5
16,899,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,535 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,342 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,363 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,973 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,714,579 UART: [afmc] --
18,719,256 UART: [cold-reset] --
18,723,759 UART: [state] Locking Datavault
18,728,284 UART: [state] Locking PCR0, PCR1 and PCR31
18,730,024 UART: [state] Locking ICCM
18,731,724 UART: [exit] Launching FMC @ 0x40000130
18,740,172 UART:
18,740,400 UART: Running Caliptra FMC ...
18,741,423 UART:
18,741,569 UART: [state] CFI Enabled
18,798,678 UART: [fht] FMC Alias Private Key: 7
20,564,905 UART: [art] Extend RT PCRs Done
20,566,128 UART: [art] Lock RT PCRs Done
20,568,067 UART: [art] Populate DV Done
20,573,684 UART: [fht] FMC Alias Private Key: 7
20,575,334 UART: [art] Derive CDI
20,576,071 UART: [art] Store in slot 0x4
20,631,480 UART: [art] Derive Key Pair
20,632,476 UART: [art] Store priv key in slot 0x5
23,095,450 UART: [art] Derive Key Pair - Done
23,108,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,821,432 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,936 UART: [art] PUB.X = 721038C568F3EA26801D6A3F14D907DEE60991EF6526F1EFEC7946D6B5F080ED62BB20FAF868E83859F6FA8A05917788
24,830,187 UART: [art] PUB.Y = 3948878C121922C21DAAC5C7DD8EB2189A9A98F41159906F9DE6EBB6DB9056A1C87AE7F579B9C382C90BFB9E71F7FE23
24,837,487 UART: [art] SIG.R = 34E9930C084B9DB054E519296CD0B306DB92DCD7C4E0FA3F8E85667D0786448C02417B02FC41EC815D086DF987755B51
24,844,881 UART: [art] SIG.S = 7CC06E2D63FC36C0AAEB7A7D743363449BAC959677001FF76F1A293FA7613909C6268D96494BA81F6A2D6166A66C9292
25,823,949 UART: Caliptra RT
25,824,640 UART: [state] CFI Enabled
26,005,942 UART: [rt] RT listening for mailbox commands...
26,008,502 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,163,922 UART: [rt]cmd =0x41544d4e, len=14344
30,159,450 >>> mbox cmd response data (8 bytes)
30,160,048 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,190,781 UART: [rt]cmd =0x41545348, len=116
30,193,175 >>> mbox cmd response data (12 bytes)
32,254,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,405,200 UART:
32,405,575 UART: Running Caliptra ROM ...
32,406,656 UART:
32,406,815 UART: [state] CFI Enabled
32,480,586 UART: [state] LifecycleState = Unprovisioned
32,482,506 UART: [state] DebugLocked = No
32,485,477 UART: [state] WD Timer not started. Device not locked for debugging
32,488,833 UART: [kat] SHA2-256
32,668,488 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,679,265 UART: [kat] ++
32,679,798 UART: [kat] sha1
32,691,234 UART: [kat] SHA2-256
32,693,969 UART: [kat] SHA2-384
32,699,674 UART: [kat] SHA2-512-ACC
32,702,024 UART: [kat] ECC-384
35,165,499 UART: [kat] HMAC-384Kdf
35,185,949 UART: [kat] LMS
35,662,386 UART: [kat] --
35,666,317 UART: [update-reset] ++
39,165,613 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,169,378 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,567,042 >>> mbox cmd response: success
39,567,491 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,568,406 UART: [update-reset] Copying MAN_2 To MAN_1
39,605,533 UART: [update-reset Success] --
39,609,719 UART: [state] Locking Datavault
39,613,009 UART: [state] Locking PCR0, PCR1 and PCR31
39,614,721 UART: [state] Locking ICCM
39,616,740 UART: [exit] Launching FMC @ 0x40000130
39,625,140 UART:
39,625,377 UART: Running Caliptra FMC ...
39,626,474 UART:
39,626,628 UART: [state] CFI Enabled
39,719,836 UART: [art] Extend RT PCRs Done
39,721,019 UART: [art] Lock RT PCRs Done
39,722,531 UART: [art] Populate DV Done
39,727,987 UART: [fht] FMC Alias Private Key: 7
39,729,682 UART: [art] Derive CDI
39,730,513 UART: [art] Store in slot 0x4
39,789,096 UART: [art] Derive Key Pair
39,790,141 UART: [art] Store priv key in slot 0x5
42,253,296 UART: [art] Derive Key Pair - Done
42,266,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,978,985 UART: [art] Erasing AUTHORITY.KEYID = 7
43,980,497 UART: [art] PUB.X = E136E07572D4408882E42DA49CDE041B6073FAB415A87BCB7213853362514740D2B0720FBA349BB37D20D052D4FD5097
43,987,746 UART: [art] PUB.Y = E8DDE088851D4891EA80ED48CF0E61CC032F9AF80640C6DA57167CFC9969726B6D59EBCC52946253EC7CC02A22156F42
43,995,032 UART: [art] SIG.R = 00C30075F5ED08940099F49B044FF40004D2D3486B6518061F8F9093D959A00042A7ECB22E6F278F1C8FB4D2197CEF88
44,002,272 UART: [art] SIG.S = 0281580C7818C7F43B59DE6F8F1871BCA192F2CA8EED76B73F4544F1260C63F1F9451486A1C08A49952FDE88CA1813F6
44,981,801 UART: Caliptra RT
44,982,493 UART: [state] CFI Enabled
45,401,981 UART: [rt] RT listening for mailbox commands...
45,433,753 UART: [rt]cmd =0x41545348, len=116
45,436,270 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,463,987 ready_for_fw is high
3,464,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,049 >>> mbox cmd response: success
18,534,215 UART:
18,534,586 UART: Running Caliptra FMC ...
18,535,781 UART:
18,535,971 UART: [state] CFI Enabled
18,602,875 UART: [fht] FMC Alias Private Key: 7
20,369,598 UART: [art] Extend RT PCRs Done
20,370,817 UART: [art] Lock RT PCRs Done
20,372,709 UART: [art] Populate DV Done
20,378,165 UART: [fht] FMC Alias Private Key: 7
20,379,645 UART: [art] Derive CDI
20,380,401 UART: [art] Store in slot 0x4
20,435,488 UART: [art] Derive Key Pair
20,436,541 UART: [art] Store priv key in slot 0x5
22,899,475 UART: [art] Derive Key Pair - Done
22,912,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,646 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,157 UART: [art] PUB.X = A8D1FB08A0D4DF1F4F2DB31FC3A637DD58E7C7314A9484AE79AA49E64C912B034C473F920AF5E17B9396FED234F906D6
24,634,416 UART: [art] PUB.Y = ED998B31B41CBC2E377BF1759B6271FBE0949FA78350321E863E1672A863E0FDA42140E957E862710D0E7713CEB55B0D
24,641,665 UART: [art] SIG.R = DFA098FABCA0D76BD968C11C330E3532A971DABAA13BB181EB834CF34D1E6CE06BBE2E9C529DBE0620913255152B5CC7
24,649,099 UART: [art] SIG.S = C860A52F61FD5989D6F200B5EB10A7625F84BED0FFABE9FD50D67C06EFCC3E5A683549D41A32179B9EB72C1AFB9B7BA9
25,627,306 UART: Caliptra RT
25,628,013 UART: [state] CFI Enabled
25,810,793 UART: [rt] RT listening for mailbox commands...
25,813,193 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,968,662 UART: [rt]cmd =0x41544d4e, len=14344
29,964,447 >>> mbox cmd response data (8 bytes)
29,965,062 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,995,690 UART: [rt]cmd =0x41545348, len=116
29,997,690 >>> mbox cmd response data (12 bytes)
32,054,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,372,665 >>> mbox cmd response: success
39,373,290 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,408,299 UART:
39,408,592 UART: Running Caliptra FMC ...
39,409,627 UART:
39,409,775 UART: [state] CFI Enabled
39,499,496 UART: [art] Extend RT PCRs Done
39,500,751 UART: [art] Lock RT PCRs Done
39,502,046 UART: [art] Populate DV Done
39,507,415 UART: [fht] FMC Alias Private Key: 7
39,508,898 UART: [art] Derive CDI
39,509,631 UART: [art] Store in slot 0x4
39,569,434 UART: [art] Derive Key Pair
39,570,471 UART: [art] Store priv key in slot 0x5
42,032,905 UART: [art] Derive Key Pair - Done
42,045,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,758,258 UART: [art] Erasing AUTHORITY.KEYID = 7
43,759,759 UART: [art] PUB.X = 236446E630C4D5F88DE71172693527EB42ECBA3F730DF8C66F3517228378E3ED4AA62FE2D8149825475382A7F331F09C
43,767,009 UART: [art] PUB.Y = 792DA4E90A9C4F5B5558768AE630DFC74D2F2F24225B37BA3D93C2882D176B4121610F46ED397D1855DC4198CAA609FD
43,774,277 UART: [art] SIG.R = 7588B7C0ED7EF8B871CD59D9A795790D88B331FE0CAA5C0A1DBECD960F479361FB58975A6A3410A52A2B82325172097A
43,781,680 UART: [art] SIG.S = 4BCF6143F1FB226CE4B938583167561E9E93318B0CEDAE6CB8163EE73E22EA6662AD75CAA11943C7949E6CF7A0C19CDC
44,760,641 UART: Caliptra RT
44,761,370 UART: [state] CFI Enabled
45,182,071 UART: [rt] RT listening for mailbox commands...
45,214,100 UART: [rt]cmd =0x41545348, len=116
45,216,541 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,491 UART:
192,854 UART: Running Caliptra ROM ...
194,008 UART:
603,705 UART: [state] CFI Enabled
616,775 UART: [state] LifecycleState = Unprovisioned
618,777 UART: [state] DebugLocked = No
621,509 UART: [state] WD Timer not started. Device not locked for debugging
625,541 UART: [kat] SHA2-256
805,170 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,970 UART: [kat] ++
816,447 UART: [kat] sha1
827,108 UART: [kat] SHA2-256
829,842 UART: [kat] SHA2-384
837,118 UART: [kat] SHA2-512-ACC
839,490 UART: [kat] ECC-384
3,284,576 UART: [kat] HMAC-384Kdf
3,296,095 UART: [kat] LMS
3,772,620 UART: [kat] --
3,775,738 UART: [cold-reset] ++
3,777,038 UART: [fht] FHT @ 0x50003400
3,787,817 UART: [idev] ++
3,788,390 UART: [idev] CDI.KEYID = 6
3,789,383 UART: [idev] SUBJECT.KEYID = 7
3,790,635 UART: [idev] UDS.KEYID = 0
3,791,559 ready_for_fw is high
3,791,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,679 UART: [idev] Erasing UDS.KEYID = 0
6,267,407 UART: [idev] Sha1 KeyId Algorithm
6,290,905 UART: [idev] --
6,296,386 UART: [ldev] ++
6,296,973 UART: [ldev] CDI.KEYID = 6
6,297,889 UART: [ldev] SUBJECT.KEYID = 5
6,299,106 UART: [ldev] AUTHORITY.KEYID = 7
6,300,342 UART: [ldev] FE.KEYID = 1
6,311,280 UART: [ldev] Erasing FE.KEYID = 1
8,791,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,770 UART: [ldev] --
10,586,634 UART: [fwproc] Wait for Commands...
10,589,918 UART: [fwproc] Recv command 0x46574c44
10,591,900 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,141 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,156 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,223 >>> mbox cmd response: success
14,563,520 UART: [afmc] ++
14,564,112 UART: [afmc] CDI.KEYID = 6
14,565,047 UART: [afmc] SUBJECT.KEYID = 7
14,566,276 UART: [afmc] AUTHORITY.KEYID = 5
17,068,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,559 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,742 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,566 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,649 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,234 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,103 UART: [afmc] --
18,867,704 UART: [cold-reset] --
18,872,103 UART: [state] Locking Datavault
18,879,454 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,163 UART: [state] Locking ICCM
18,882,921 UART: [exit] Launching FMC @ 0x40000130
18,891,375 UART:
18,891,610 UART: Running Caliptra FMC ...
18,892,661 UART:
18,892,809 UART: [state] CFI Enabled
18,901,348 UART: [fht] FMC Alias Private Key: 7
20,667,799 UART: [art] Extend RT PCRs Done
20,669,021 UART: [art] Lock RT PCRs Done
20,670,514 UART: [art] Populate DV Done
20,675,985 UART: [fht] FMC Alias Private Key: 7
20,677,470 UART: [art] Derive CDI
20,678,204 UART: [art] Store in slot 0x4
20,720,746 UART: [art] Derive Key Pair
20,721,788 UART: [art] Store priv key in slot 0x5
23,148,687 UART: [art] Derive Key Pair - Done
23,161,414 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,614 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,121 UART: [art] PUB.X = C222A6D8F26F7300AF9828098B6D3A643BD1B7FD0410F8023631EF054E4C6111AEF0087F982CBFC4DD64F301EAF26EA7
24,876,370 UART: [art] PUB.Y = DAD768180E3C5D91E37E204D779B943019FADAB968A06B4738E85D3C144881849BDF22BDE75705344409AC8904F2EE59
24,883,617 UART: [art] SIG.R = 7159C202F18A27431564168733A0458A7918118B20D4B2783E1E4EEF5FBF3B92BABB1544C70BAF7318467CF2C4550954
24,890,954 UART: [art] SIG.S = 9AD8CFB2DE75E7C68259CCD83FC595A99AB21692B73C3C199088CCCDF0490CBF7F75E319752CFE2C99147D830580AAE2
25,870,168 UART: Caliptra RT
25,870,883 UART: [state] CFI Enabled
26,003,904 UART: [rt] RT listening for mailbox commands...
26,006,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,161,677 UART: [rt]cmd =0x41544d4e, len=14344
30,156,950 >>> mbox cmd response data (8 bytes)
30,157,544 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,188,439 UART: [rt]cmd =0x41545348, len=116
30,190,754 >>> mbox cmd response data (12 bytes)
32,250,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,401,111 UART:
32,401,489 UART: Running Caliptra ROM ...
32,402,634 UART:
32,402,808 UART: [state] CFI Enabled
32,415,671 UART: [state] LifecycleState = Unprovisioned
32,417,567 UART: [state] DebugLocked = No
32,419,602 UART: [state] WD Timer not started. Device not locked for debugging
32,423,466 UART: [kat] SHA2-256
32,603,151 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,613,936 UART: [kat] ++
32,614,393 UART: [kat] sha1
32,625,926 UART: [kat] SHA2-256
32,628,610 UART: [kat] SHA2-384
32,635,354 UART: [kat] SHA2-512-ACC
32,637,714 UART: [kat] ECC-384
35,080,090 UART: [kat] HMAC-384Kdf
35,092,134 UART: [kat] LMS
35,568,633 UART: [kat] --
35,574,473 UART: [update-reset] ++
39,076,080 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,078,770 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,476,379 >>> mbox cmd response: success
39,476,825 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,477,589 UART: [update-reset] Copying MAN_2 To MAN_1
39,514,725 UART: [update-reset Success] --
39,518,732 UART: [state] Locking Datavault
39,523,292 UART: [state] Locking PCR0, PCR1 and PCR31
39,525,051 UART: [state] Locking ICCM
39,526,738 UART: [exit] Launching FMC @ 0x40000130
39,535,135 UART:
39,535,381 UART: Running Caliptra FMC ...
39,536,488 UART:
39,536,660 UART: [state] CFI Enabled
39,580,681 UART: [art] Extend RT PCRs Done
39,581,867 UART: [art] Lock RT PCRs Done
39,583,268 UART: [art] Populate DV Done
39,588,623 UART: [fht] FMC Alias Private Key: 7
39,590,158 UART: [art] Derive CDI
39,590,972 UART: [art] Store in slot 0x4
39,633,997 UART: [art] Derive Key Pair
39,635,000 UART: [art] Store priv key in slot 0x5
42,061,895 UART: [art] Derive Key Pair - Done
42,074,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,781,349 UART: [art] Erasing AUTHORITY.KEYID = 7
43,782,852 UART: [art] PUB.X = C5B2FD3748AB6B40B1EFB6CFFD7463DE2BA975A57883CD72DA9822AE3AA810BFE5BD721B12B8383B80091324530D73C8
43,790,152 UART: [art] PUB.Y = 82E8AB81838A08386727587F5730E79BD658450EDE21FE88E18896222468B31AF2280BB6BA2E3F9891CC31488C27460E
43,797,387 UART: [art] SIG.R = 02DCEE003B49FCFA6BA64AFA774F45E9C6204281DBB506F247B4B350194F6369C3D6348143B191742D1D08B8250D5555
43,804,779 UART: [art] SIG.S = 36F7C5AB299DC630B6CE2A7BB19E236645468E517617872C8C6A76D1501F4E12B7C361F78F808EB64271623EF5BDC4D3
44,783,458 UART: Caliptra RT
44,784,177 UART: [state] CFI Enabled
45,159,541 UART: [rt] RT listening for mailbox commands...
45,191,545 UART: [rt]cmd =0x41545348, len=116
45,193,664 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,775,739 ready_for_fw is high
3,776,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,425,862 >>> mbox cmd response: success
18,670,619 UART:
18,671,033 UART: Running Caliptra FMC ...
18,672,243 UART:
18,672,408 UART: [state] CFI Enabled
18,680,255 UART: [fht] FMC Alias Private Key: 7
20,446,311 UART: [art] Extend RT PCRs Done
20,447,526 UART: [art] Lock RT PCRs Done
20,449,587 UART: [art] Populate DV Done
20,454,727 UART: [fht] FMC Alias Private Key: 7
20,456,269 UART: [art] Derive CDI
20,457,086 UART: [art] Store in slot 0x4
20,499,634 UART: [art] Derive Key Pair
20,500,636 UART: [art] Store priv key in slot 0x5
22,927,368 UART: [art] Derive Key Pair - Done
22,940,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,646,342 UART: [art] Erasing AUTHORITY.KEYID = 7
24,647,853 UART: [art] PUB.X = B23DE03C1B2E9826824E70B5CF75B3547A4B1E76ACB65406C3B9DF155357F557F1C4FA17222B281D08A141E944A6F796
24,655,128 UART: [art] PUB.Y = 7DEF4B7E8E965AB7E03E52F97B8AEF0A93565979DD99D8562886C8020C69FAFBA77F3E61CEA62E6AEE2E8E36A2FC6D46
24,662,370 UART: [art] SIG.R = 8FF7C1E2B8946E433C1C49F760AB14F2DA12A8943A86D0540E5C0628D1EC987375B888497A12CE452331EF27F808B707
24,669,729 UART: [art] SIG.S = A7B6BCAB4F077857F8C1955EF2744ECADD9F4998AC5CFE3D49516DE07ED95A15529E2E8D2AC430FB8237DCCC2262C3DC
25,649,355 UART: Caliptra RT
25,650,067 UART: [state] CFI Enabled
25,784,006 UART: [rt] RT listening for mailbox commands...
25,786,392 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,941,770 UART: [rt]cmd =0x41544d4e, len=14344
29,937,926 >>> mbox cmd response data (8 bytes)
29,938,564 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,969,206 UART: [rt]cmd =0x41545348, len=116
29,971,709 >>> mbox cmd response data (12 bytes)
32,027,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,260,949 >>> mbox cmd response: success
39,261,552 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,295,213 UART:
39,295,499 UART: Running Caliptra FMC ...
39,296,538 UART:
39,296,688 UART: [state] CFI Enabled
39,341,262 UART: [art] Extend RT PCRs Done
39,342,499 UART: [art] Lock RT PCRs Done
39,343,876 UART: [art] Populate DV Done
39,349,393 UART: [fht] FMC Alias Private Key: 7
39,351,038 UART: [art] Derive CDI
39,351,780 UART: [art] Store in slot 0x4
39,394,536 UART: [art] Derive Key Pair
39,395,758 UART: [art] Store priv key in slot 0x5
41,822,902 UART: [art] Derive Key Pair - Done
41,835,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,542,453 UART: [art] Erasing AUTHORITY.KEYID = 7
43,543,957 UART: [art] PUB.X = 8D6064B1A11DDFF7645E6C5FDD759F08DE18652152D6D86DBB8263C3E4D16970FC95132B54AA9A0F186FC37B01CA7AEF
43,551,272 UART: [art] PUB.Y = 9C34CCDC6C46854593A0F1CF497EFA7A39BEA92795F3AD94C726C9BD56A6C2642082441D6C76D87EDE4D0CF279372523
43,558,516 UART: [art] SIG.R = CD0CABE9032C00B2E60EADEA263C974EF4422F2892A1FE4EE1208B5F5CC344F78E0B8C56196F63823E92F807E90771CF
43,565,937 UART: [art] SIG.S = 05F34FBE35927FD2A0E8D2747304F599DA93AD24D5650E58F17C00A3B215EADD555299647A5E0E43D8E2D2D15D12B574
44,545,339 UART: Caliptra RT
44,546,048 UART: [state] CFI Enabled
44,925,481 UART: [rt] RT listening for mailbox commands...
44,957,447 UART: [rt]cmd =0x41545348, len=116
44,959,909 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,191 UART:
192,539 UART: Running Caliptra ROM ...
193,740 UART:
193,898 UART: [state] CFI Enabled
264,414 UART: [state] LifecycleState = Unprovisioned
266,819 UART: [state] DebugLocked = No
269,137 UART: [state] WD Timer not started. Device not locked for debugging
273,531 UART: [kat] SHA2-256
463,390 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,199 UART: [kat] ++
474,644 UART: [kat] sha1
486,020 UART: [kat] SHA2-256
489,039 UART: [kat] SHA2-384
495,025 UART: [kat] SHA2-512-ACC
497,604 UART: [kat] ECC-384
2,946,888 UART: [kat] HMAC-384Kdf
2,972,123 UART: [kat] LMS
3,503,872 UART: [kat] --
3,507,669 UART: [cold-reset] ++
3,509,454 UART: [fht] FHT @ 0x50003400
3,522,058 UART: [idev] ++
3,522,769 UART: [idev] CDI.KEYID = 6
3,523,796 UART: [idev] SUBJECT.KEYID = 7
3,524,900 UART: [idev] UDS.KEYID = 0
3,525,824 ready_for_fw is high
3,526,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,176 UART: [idev] Erasing UDS.KEYID = 0
6,027,679 UART: [idev] Sha1 KeyId Algorithm
6,049,774 UART: [idev] --
6,054,688 UART: [ldev] ++
6,055,364 UART: [ldev] CDI.KEYID = 6
6,056,578 UART: [ldev] SUBJECT.KEYID = 5
6,057,638 UART: [ldev] AUTHORITY.KEYID = 7
6,058,822 UART: [ldev] FE.KEYID = 1
6,099,710 UART: [ldev] Erasing FE.KEYID = 1
8,605,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,700 UART: [ldev] --
10,411,563 UART: [fwproc] Wait for Commands...
10,414,250 UART: [fwproc] Recv command 0x46574c44
10,416,555 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,500 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,149 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,965 >>> mbox cmd response: success
14,680,306 UART: [afmc] ++
14,681,038 UART: [afmc] CDI.KEYID = 6
14,682,251 UART: [afmc] SUBJECT.KEYID = 7
14,683,693 UART: [afmc] AUTHORITY.KEYID = 5
17,209,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,258 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,352 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,505 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,412 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,836 UART: [afmc] --
19,009,542 UART: [cold-reset] --
19,013,141 UART: [state] Locking Datavault
19,017,106 UART: [state] Locking PCR0, PCR1 and PCR31
19,019,296 UART: [state] Locking ICCM
19,021,471 UART: [exit] Launching FMC @ 0x40000130
19,030,158 UART:
19,030,390 UART: Running Caliptra FMC ...
19,031,444 UART:
19,031,595 UART: [state] CFI Enabled
19,092,765 UART: [fht] FMC Alias Private Key: 7
20,880,682 UART: [art] Extend RT PCRs Done
20,881,897 UART: [art] Lock RT PCRs Done
20,883,368 UART: [art] Populate DV Done
20,888,558 UART: [fht] FMC Alias Private Key: 7
20,890,047 UART: [art] Derive CDI
20,890,811 UART: [art] Store in slot 0x4
20,946,912 UART: [art] Derive Key Pair
20,947,946 UART: [art] Store priv key in slot 0x5
23,410,583 UART: [art] Derive Key Pair - Done
23,423,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,724 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,224 UART: [art] PUB.X = C3D58486AF995A4D747D0E2DDC37293869B6067E5827B56656AA5EAD3E0809D3D959AC264F198DEB629C24BB3B61A384
25,145,499 UART: [art] PUB.Y = CEB07857A9CFCA8E3030FF6B715264AFE0D5AB8ABB43070400225EF009D3CC2A07BBF5E65F1911915A280DA2F2EBA217
25,152,720 UART: [art] SIG.R = 618D375258650AF55A1E3962B7D8C8DA5556CE58C9D772D3477422651E0950E2C03CDFA5C1F9256823DF9CBBDCB2425D
25,160,145 UART: [art] SIG.S = 1F2E8B5C613F10A529B38265896B9A888B1A53EB66B29C64C57ECCAAB2EB8A8A96C3B9C0BD6C0B61196F6D4D59BB6110
26,138,951 UART: Caliptra RT
26,139,647 UART: [state] CFI Enabled
26,321,103 UART: [rt] RT listening for mailbox commands...
26,323,583 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,479,068 UART: [rt]cmd =0x41544d4e, len=14344
30,475,352 >>> mbox cmd response data (8 bytes)
30,476,122 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,506,834 UART: [rt]cmd =0x41545348, len=116
30,509,360 >>> mbox cmd response data (12 bytes)
32,575,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,725,835 UART:
32,726,216 UART: Running Caliptra ROM ...
32,727,347 UART:
32,727,517 UART: [state] CFI Enabled
32,798,711 UART: [state] LifecycleState = Unprovisioned
32,800,824 UART: [state] DebugLocked = No
32,802,969 UART: [state] WD Timer not started. Device not locked for debugging
32,808,219 UART: [kat] SHA2-256
32,998,105 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,008,850 UART: [kat] ++
33,009,394 UART: [kat] sha1
33,020,037 UART: [kat] SHA2-256
33,023,031 UART: [kat] SHA2-384
33,028,501 UART: [kat] SHA2-512-ACC
33,031,091 UART: [kat] ECC-384
35,480,028 UART: [kat] HMAC-384Kdf
35,502,306 UART: [kat] LMS
36,033,900 UART: [kat] --
36,037,904 UART: [update-reset] ++
39,544,925 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,548,588 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,178,347 >>> mbox cmd response: success
40,183,169 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,183,776 UART: [update-reset] Copying MAN_2 To MAN_1
40,216,690 UART: [update-reset Success] --
40,221,400 UART: [state] Locking Datavault
40,224,292 UART: [state] Locking PCR0, PCR1 and PCR31
40,226,504 UART: [state] Locking ICCM
40,228,601 UART: [exit] Launching FMC @ 0x40000130
40,237,267 UART:
40,237,498 UART: Running Caliptra FMC ...
40,238,600 UART:
40,238,754 UART: [state] CFI Enabled
40,334,431 UART: [art] Extend RT PCRs Done
40,335,615 UART: [art] Lock RT PCRs Done
40,337,174 UART: [art] Populate DV Done
40,342,632 UART: [fht] FMC Alias Private Key: 7
40,344,321 UART: [art] Derive CDI
40,345,128 UART: [art] Store in slot 0x4
40,403,242 UART: [art] Derive Key Pair
40,404,281 UART: [art] Store priv key in slot 0x5
42,867,021 UART: [art] Derive Key Pair - Done
42,879,975 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,593,073 UART: [art] Erasing AUTHORITY.KEYID = 7
44,594,580 UART: [art] PUB.X = 00C9DD9D92735C6223D16A0F49AAD4AA1C82F4B50CE782AC00173CCFCB804099192354B41A19CC277DD5147FC99060DA
44,601,806 UART: [art] PUB.Y = 26DBD18CA092324D35B9B26CF4913F8135CA8A5AA6C5D677363F79CEEAB29829ACD5208F83BF07E7DD6D6D9406BA460C
44,609,064 UART: [art] SIG.R = EB49EC44738637A179CC5B2649F5F20D317D79404FE2E7B271F84F7F6365C481C20E354CFA1CC565FF24BDA900039D12
44,616,522 UART: [art] SIG.S = F4146FEC31A6B6ABF4D0C3D7478155F6197BCE4049F28BC25E0F63EA6EECA0E3FA3F9E6A2785AED92DFD210F53A6CB6C
45,595,742 UART: Caliptra RT
45,596,453 UART: [state] CFI Enabled
46,017,202 UART: [rt] RT listening for mailbox commands...
46,048,908 UART: [rt]cmd =0x41545348, len=116
46,051,368 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,441,974 ready_for_fw is high
3,442,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,810,181 >>> mbox cmd response: success
19,091,805 UART:
19,092,206 UART: Running Caliptra FMC ...
19,093,318 UART:
19,093,498 UART: [state] CFI Enabled
19,159,827 UART: [fht] FMC Alias Private Key: 7
20,926,239 UART: [art] Extend RT PCRs Done
20,927,433 UART: [art] Lock RT PCRs Done
20,928,953 UART: [art] Populate DV Done
20,934,355 UART: [fht] FMC Alias Private Key: 7
20,936,106 UART: [art] Derive CDI
20,936,915 UART: [art] Store in slot 0x4
20,993,721 UART: [art] Derive Key Pair
20,994,776 UART: [art] Store priv key in slot 0x5
23,458,003 UART: [art] Derive Key Pair - Done
23,471,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,184,503 UART: [art] Erasing AUTHORITY.KEYID = 7
25,185,991 UART: [art] PUB.X = 7A305B0138CDEA7A58306AD15667A88B62EFEB0E50A3CE0CC648B33788DDAADEBEDF07BCD71D6890780A8BDD0240314E
25,193,263 UART: [art] PUB.Y = BC38F14378819137370E3EEDB21D3E88599092A6B1AC4E91CC4CAB6A46FD4B4004562C1C57E02D98F3E75B4C16C9E2F3
25,200,545 UART: [art] SIG.R = CC54F38D6E972DA1602A799B779F341F4EEF00376451B9A66BA2C0448117906624AEDD4A6965E9856435A23B16CF4AE6
25,207,926 UART: [art] SIG.S = 4D00BC4AB9E91E0ECA770114FDAA9FD512E85C33BDAB3E1CE1DB6C05F8F8C9614CC1BF2439A5B75B3DBEC2F794B98C3E
26,186,733 UART: Caliptra RT
26,187,442 UART: [state] CFI Enabled
26,368,790 UART: [rt] RT listening for mailbox commands...
26,371,251 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,526,607 UART: [rt]cmd =0x41544d4e, len=14344
30,522,180 >>> mbox cmd response data (8 bytes)
30,522,753 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,553,170 UART: [rt]cmd =0x41545348, len=116
30,555,183 >>> mbox cmd response data (12 bytes)
32,619,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,509,893 >>> mbox cmd response: success
40,510,435 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,543,611 UART:
40,543,937 UART: Running Caliptra FMC ...
40,544,976 UART:
40,545,123 UART: [state] CFI Enabled
40,638,230 UART: [art] Extend RT PCRs Done
40,639,497 UART: [art] Lock RT PCRs Done
40,640,929 UART: [art] Populate DV Done
40,646,232 UART: [fht] FMC Alias Private Key: 7
40,647,871 UART: [art] Derive CDI
40,648,607 UART: [art] Store in slot 0x4
40,706,867 UART: [art] Derive Key Pair
40,707,900 UART: [art] Store priv key in slot 0x5
43,170,960 UART: [art] Derive Key Pair - Done
43,183,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,896,624 UART: [art] Erasing AUTHORITY.KEYID = 7
44,898,131 UART: [art] PUB.X = 31778BE9DE9CCB810B05A829AE6B51B3B1F97170C398C8D1CB3265FB6D725AC91C16016B037560407245FD3E6FE06158
44,905,397 UART: [art] PUB.Y = CD3A90F9E9B2BCCD72A76B382EEF340C0308F33345FC638D79F9984601D9C15C7160876BE21F7A387DEE7E58E69744AC
44,912,632 UART: [art] SIG.R = 391DB5CCEFC5B5F8038DFB264501B5D754F6155EA2748E589D4E797960E20947993067D7F73EF3548EC045AEFCC03876
44,920,032 UART: [art] SIG.S = 05EEF5F766EB8B1BB24EA7E2A202C29F965F1C71024BC5D1E686FF77236FC5411C759D2A9689FB642A81300C82843570
45,899,231 UART: Caliptra RT
45,899,933 UART: [state] CFI Enabled
46,326,964 UART: [rt] RT listening for mailbox commands...
46,358,724 UART: [rt]cmd =0x41545348, len=116
46,360,961 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,482 UART:
192,859 UART: Running Caliptra ROM ...
194,043 UART:
603,638 UART: [state] CFI Enabled
619,026 UART: [state] LifecycleState = Unprovisioned
621,409 UART: [state] DebugLocked = No
623,007 UART: [state] WD Timer not started. Device not locked for debugging
627,274 UART: [kat] SHA2-256
817,181 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,923 UART: [kat] ++
828,532 UART: [kat] sha1
839,419 UART: [kat] SHA2-256
842,425 UART: [kat] SHA2-384
849,350 UART: [kat] SHA2-512-ACC
851,941 UART: [kat] ECC-384
3,294,370 UART: [kat] HMAC-384Kdf
3,308,106 UART: [kat] LMS
3,839,906 UART: [kat] --
3,845,236 UART: [cold-reset] ++
3,846,680 UART: [fht] FHT @ 0x50003400
3,857,960 UART: [idev] ++
3,858,668 UART: [idev] CDI.KEYID = 6
3,859,667 UART: [idev] SUBJECT.KEYID = 7
3,860,845 UART: [idev] UDS.KEYID = 0
3,861,778 ready_for_fw is high
3,862,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,917 UART: [idev] Erasing UDS.KEYID = 0
6,343,971 UART: [idev] Sha1 KeyId Algorithm
6,366,176 UART: [idev] --
6,371,581 UART: [ldev] ++
6,372,290 UART: [ldev] CDI.KEYID = 6
6,373,238 UART: [ldev] SUBJECT.KEYID = 5
6,374,294 UART: [ldev] AUTHORITY.KEYID = 7
6,375,584 UART: [ldev] FE.KEYID = 1
6,388,957 UART: [ldev] Erasing FE.KEYID = 1
8,865,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,510 UART: [ldev] --
10,653,614 UART: [fwproc] Wait for Commands...
10,656,680 UART: [fwproc] Recv command 0x46574c44
10,658,940 UART: [fwproc] Recv'd Img size: 118548 bytes
14,162,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,243,329 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,366,934 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,927,303 >>> mbox cmd response: success
14,931,690 UART: [afmc] ++
14,932,398 UART: [afmc] CDI.KEYID = 6
14,933,539 UART: [afmc] SUBJECT.KEYID = 7
14,935,050 UART: [afmc] AUTHORITY.KEYID = 5
17,440,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,161,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,163,755 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,178,851 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,193,993 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,208,909 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,231,871 UART: [afmc] --
19,235,661 UART: [cold-reset] --
19,239,435 UART: [state] Locking Datavault
19,243,086 UART: [state] Locking PCR0, PCR1 and PCR31
19,245,253 UART: [state] Locking ICCM
19,248,098 UART: [exit] Launching FMC @ 0x40000130
19,256,732 UART:
19,256,974 UART: Running Caliptra FMC ...
19,258,033 UART:
19,258,193 UART: [state] CFI Enabled
19,266,306 UART: [fht] FMC Alias Private Key: 7
21,032,550 UART: [art] Extend RT PCRs Done
21,033,786 UART: [art] Lock RT PCRs Done
21,035,419 UART: [art] Populate DV Done
21,040,951 UART: [fht] FMC Alias Private Key: 7
21,042,505 UART: [art] Derive CDI
21,043,325 UART: [art] Store in slot 0x4
21,086,091 UART: [art] Derive Key Pair
21,087,138 UART: [art] Store priv key in slot 0x5
23,513,967 UART: [art] Derive Key Pair - Done
23,526,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,233,268 UART: [art] Erasing AUTHORITY.KEYID = 7
25,234,793 UART: [art] PUB.X = ABBFDDF694470F4C577CF56655A6A0933C1ABCC488F641789C1590FDD37CAC75FD1F01CBB7CE097B07AD09D4BEE7D967
25,242,062 UART: [art] PUB.Y = EDC306AAC04FC80EDDF2F4E741FA657FF9DE13FC6242C3373EF508596DD52A8126AC37896BF716D2C6F7763026BD3ED1
25,249,283 UART: [art] SIG.R = 772116D7BA16ECE11BDDAC1D465B305E879E7396AE99FF0AADCEDBE07DABC72DC4E943245823EB9EC9B70856F4126DA1
25,256,714 UART: [art] SIG.S = 82DBB0A5BE8A7A01F69DF9FD66EE6E186CB7C7A867E77E39C4516E0DBFECB1D10E0EA11FEE34740FC36384176934EDE0
26,235,609 UART: Caliptra RT
26,236,317 UART: [state] CFI Enabled
26,369,569 UART: [rt] RT listening for mailbox commands...
26,372,008 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,527,109 UART: [rt]cmd =0x41544d4e, len=14344
30,521,967 >>> mbox cmd response data (8 bytes)
30,522,575 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,553,413 UART: [rt]cmd =0x41545348, len=116
30,555,946 >>> mbox cmd response data (12 bytes)
32,625,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,776,456 UART:
32,776,833 UART: Running Caliptra ROM ...
32,777,890 UART:
32,778,046 UART: [state] CFI Enabled
32,789,575 UART: [state] LifecycleState = Unprovisioned
32,791,477 UART: [state] DebugLocked = No
32,793,374 UART: [state] WD Timer not started. Device not locked for debugging
32,797,484 UART: [kat] SHA2-256
32,987,376 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,998,133 UART: [kat] ++
32,998,649 UART: [kat] sha1
33,009,921 UART: [kat] SHA2-256
33,012,908 UART: [kat] SHA2-384
33,019,244 UART: [kat] SHA2-512-ACC
33,021,827 UART: [kat] ECC-384
35,463,314 UART: [kat] HMAC-384Kdf
35,477,946 UART: [kat] LMS
36,009,554 UART: [kat] --
36,015,074 UART: [update-reset] ++
39,528,514 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,531,360 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,161,116 >>> mbox cmd response: success
40,166,292 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,167,033 UART: [update-reset] Copying MAN_2 To MAN_1
40,199,477 UART: [update-reset Success] --
40,205,816 UART: [state] Locking Datavault
40,209,689 UART: [state] Locking PCR0, PCR1 and PCR31
40,211,914 UART: [state] Locking ICCM
40,214,504 UART: [exit] Launching FMC @ 0x40000130
40,223,184 UART:
40,223,420 UART: Running Caliptra FMC ...
40,224,528 UART:
40,224,690 UART: [state] CFI Enabled
40,268,644 UART: [art] Extend RT PCRs Done
40,269,845 UART: [art] Lock RT PCRs Done
40,271,312 UART: [art] Populate DV Done
40,276,617 UART: [fht] FMC Alias Private Key: 7
40,278,374 UART: [art] Derive CDI
40,279,197 UART: [art] Store in slot 0x4
40,322,204 UART: [art] Derive Key Pair
40,323,210 UART: [art] Store priv key in slot 0x5
42,749,640 UART: [art] Derive Key Pair - Done
42,762,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,469,026 UART: [art] Erasing AUTHORITY.KEYID = 7
44,470,539 UART: [art] PUB.X = 1C681E637DA8945692733DBC1F294EA7EDF7CF620BE451DFED3B8F91C62E54AB654CAE24AA5B83E5D48D86CA465D1495
44,477,817 UART: [art] PUB.Y = A3FDDD657E9C60D39D89B551B62EFCDE3944C98343ECF4F75BCFEB177C6BD87550088B10055951185D7F798195F76186
44,485,073 UART: [art] SIG.R = 34EC49542BEA5CCF3B36DB04BA259F83077A8E74F29A327CA2336EC57A344E1933BB5DF699D4AE382FEF84DD07A5F1A8
44,492,493 UART: [art] SIG.S = 6A651C4240496A5498186FFA9C870D1CB5734532DC2D6D093BE8F2F99A23C009CB06973679E10368F6D82015C0359B85
45,471,704 UART: Caliptra RT
45,472,398 UART: [state] CFI Enabled
45,848,122 UART: [rt] RT listening for mailbox commands...
45,880,046 UART: [rt]cmd =0x41545348, len=116
45,882,440 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
3,759,887 ready_for_fw is high
3,760,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,066,262 >>> mbox cmd response: success
19,321,000 UART:
19,321,401 UART: Running Caliptra FMC ...
19,322,540 UART:
19,322,708 UART: [state] CFI Enabled
19,331,092 UART: [fht] FMC Alias Private Key: 7
21,097,110 UART: [art] Extend RT PCRs Done
21,098,337 UART: [art] Lock RT PCRs Done
21,099,782 UART: [art] Populate DV Done
21,105,259 UART: [fht] FMC Alias Private Key: 7
21,106,967 UART: [art] Derive CDI
21,107,763 UART: [art] Store in slot 0x4
21,150,272 UART: [art] Derive Key Pair
21,151,286 UART: [art] Store priv key in slot 0x5
23,577,943 UART: [art] Derive Key Pair - Done
23,590,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,297,466 UART: [art] Erasing AUTHORITY.KEYID = 7
25,298,962 UART: [art] PUB.X = EAD58D928BC2E9E94EC745A2D9C789E9E89BCAF8265D6AA9F11B0DF10785D89817307F81CC4F048D78D8056038977D0F
25,306,273 UART: [art] PUB.Y = B1F64ECA552F5AF1848E1759334F7495276D30FE3E9B1C51D295CD857A935852FA45038E8A4191F6E0E9BFA6B8EC316C
25,313,481 UART: [art] SIG.R = 7299AEF420C76EA605CE8080A2E6FC80E7EBE714985ABD3CBC5FEE62BBD73AFC3A3C7C39BBDAB3D5DEC735CE52A25876
25,320,928 UART: [art] SIG.S = 7D4CB30281A6CC5E8DCEF8E302F1A91C75F792DB002B0942B26C1A9AA80D68E7776325F58429E974A4431C0A376DEA6D
26,299,510 UART: Caliptra RT
26,300,223 UART: [state] CFI Enabled
26,434,102 UART: [rt] RT listening for mailbox commands...
26,436,499 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,591,797 UART: [rt]cmd =0x41544d4e, len=14344
30,587,165 >>> mbox cmd response data (8 bytes)
30,587,742 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,618,637 UART: [rt]cmd =0x41545348, len=116
30,621,011 >>> mbox cmd response data (12 bytes)
32,690,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,521,937 >>> mbox cmd response: success
40,522,525 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,558,235 UART:
40,558,573 UART: Running Caliptra FMC ...
40,559,621 UART:
40,559,773 UART: [state] CFI Enabled
40,604,456 UART: [art] Extend RT PCRs Done
40,605,715 UART: [art] Lock RT PCRs Done
40,606,879 UART: [art] Populate DV Done
40,612,509 UART: [fht] FMC Alias Private Key: 7
40,614,216 UART: [art] Derive CDI
40,615,034 UART: [art] Store in slot 0x4
40,657,599 UART: [art] Derive Key Pair
40,658,648 UART: [art] Store priv key in slot 0x5
43,085,409 UART: [art] Derive Key Pair - Done
43,098,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,804,040 UART: [art] Erasing AUTHORITY.KEYID = 7
44,805,559 UART: [art] PUB.X = AC58B2508B85431A5968DD2100A363EFE9DFE5E51D29C77C10CB4EEEED6C49300F81CDEC4E67FA5C721195F5DCA29FC8
44,812,814 UART: [art] PUB.Y = 4E5D4478093499277F9DC32D27D52808C7FF85914DA44D9D370D3CE665698E7A02CFA5E00F419D6CC2E352F2D9F71D5A
44,820,106 UART: [art] SIG.R = 63D64625941DE7618153DFF3118825764ADA95FF4B5E845806566EE429BF9CD3D63C679A35FDFBB15DABFCA7FAACA54F
44,827,503 UART: [art] SIG.S = 8A3B2CE4D9F29D4CDEBABF89E4E063621550915F389CD1F07E3024EEEF055E851E522DFCACECCF660005C8639831D749
45,805,843 UART: Caliptra RT
45,806,554 UART: [state] CFI Enabled
46,177,307 UART: [rt] RT listening for mailbox commands...
46,209,108 UART: [rt]cmd =0x41545348, len=116
46,211,354 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,893 UART: [kat] SHA2-256
881,824 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,939 UART: [kat] ++
886,091 UART: [kat] sha1
890,239 UART: [kat] SHA2-256
892,177 UART: [kat] SHA2-384
895,070 UART: [kat] SHA2-512-ACC
896,971 UART: [kat] ECC-384
902,580 UART: [kat] HMAC-384Kdf
907,182 UART: [kat] LMS
1,475,378 UART: [kat] --
1,476,063 UART: [cold-reset] ++
1,476,551 UART: [fht] Storing FHT @ 0x50003400
1,479,368 UART: [idev] ++
1,479,536 UART: [idev] CDI.KEYID = 6
1,479,896 UART: [idev] SUBJECT.KEYID = 7
1,480,320 UART: [idev] UDS.KEYID = 0
1,480,665 ready_for_fw is high
1,480,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,740 UART: [idev] Erasing UDS.KEYID = 0
1,504,592 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,130 UART: [idev] --
1,514,149 UART: [ldev] ++
1,514,317 UART: [ldev] CDI.KEYID = 6
1,514,680 UART: [ldev] SUBJECT.KEYID = 5
1,515,106 UART: [ldev] AUTHORITY.KEYID = 7
1,515,569 UART: [ldev] FE.KEYID = 1
1,520,929 UART: [ldev] Erasing FE.KEYID = 1
1,546,722 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,520 UART: [ldev] --
1,585,809 UART: [fwproc] Waiting for Commands...
1,586,494 UART: [fwproc] Received command 0x46574c44
1,587,285 UART: [fwproc] Received Image of size 118548 bytes
2,933,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,233 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,880 >>> mbox cmd response: success
3,133,128 UART: [afmc] ++
3,133,296 UART: [afmc] CDI.KEYID = 6
3,133,658 UART: [afmc] SUBJECT.KEYID = 7
3,134,083 UART: [afmc] AUTHORITY.KEYID = 5
3,169,434 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,398 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,178 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,887 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,770 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,453 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,195 UART: [afmc] --
3,212,161 UART: [cold-reset] --
3,213,015 UART: [state] Locking Datavault
3,214,258 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,862 UART: [state] Locking ICCM
3,215,402 UART: [exit] Launching FMC @ 0x40000130
3,220,732 UART:
3,220,748 UART: Running Caliptra FMC ...
3,221,156 UART:
3,221,210 UART: [state] CFI Enabled
3,231,812 UART: [fht] FMC Alias Private Key: 7
3,350,502 UART: [art] Extend RT PCRs Done
3,350,930 UART: [art] Lock RT PCRs Done
3,352,356 UART: [art] Populate DV Done
3,360,403 UART: [fht] FMC Alias Private Key: 7
3,361,395 UART: [art] Derive CDI
3,361,675 UART: [art] Store in slot 0x4
3,447,531 UART: [art] Derive Key Pair
3,447,891 UART: [art] Store priv key in slot 0x5
3,460,380 UART: [art] Derive Key Pair - Done
3,474,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,455 UART: [art] PUB.X = 1A430103A95056BB5DD2E23BBAFF7CE743A35254A9544BA5FD2202CF9A49102878683C021C9B3D2991959AB97072722C
3,498,211 UART: [art] PUB.Y = 25C33506F840EE3DC55F3F4756997B230DFEB73A1FCAA91B6349680AE28E5BC4BBAF7E9419B3CA01BEEC89ED5B9CD5E4
3,505,171 UART: [art] SIG.R = C44D0EA942C3CF2BA46E16A576580FD149AAB7D269CE131195B3DC0A4211CA4E2C7FCE9CE52F98845F63A75A815F6CCB
3,511,950 UART: [art] SIG.S = 68C47DCD1E13B6AEEE2A960B30A64D2FFF79E8E3CDB7CCCDD61AF8D91C0A1C1CB63D77BAB76B610925DA828212671F6C
3,536,537 UART: Caliptra RT
3,536,788 UART: [state] CFI Enabled
3,656,070 UART: [rt] RT listening for mailbox commands...
3,656,740 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,160 UART: [rt]cmd =0x41544d4e, len=14344
4,089,850 >>> mbox cmd response data (8 bytes)
4,089,851 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,996 UART: [rt]cmd =0x41545348, len=116
4,121,801 >>> mbox cmd response data (12 bytes)
4,121,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,582 UART:
4,122,598 UART: Running Caliptra ROM ...
4,123,006 UART:
4,123,060 UART: [state] CFI Enabled
4,125,326 UART: [state] LifecycleState = Unprovisioned
4,125,981 UART: [state] DebugLocked = No
4,126,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,128,154 UART: [kat] SHA2-256
4,922,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,926,200 UART: [kat] ++
4,926,352 UART: [kat] sha1
4,930,630 UART: [kat] SHA2-256
4,932,568 UART: [kat] SHA2-384
4,935,421 UART: [kat] SHA2-512-ACC
4,937,321 UART: [kat] ECC-384
4,942,840 UART: [kat] HMAC-384Kdf
4,947,324 UART: [kat] LMS
5,515,520 UART: [kat] --
5,516,181 UART: [update-reset] ++
6,896,607 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,897,857 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,053,124 >>> mbox cmd response: success
7,053,124 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,053,259 UART: [update-reset] Copying MAN_2 To MAN_1
7,061,273 UART: [update-reset Success] --
7,062,142 UART: [state] Locking Datavault
7,063,024 UART: [state] Locking PCR0, PCR1 and PCR31
7,063,628 UART: [state] Locking ICCM
7,064,134 UART: [exit] Launching FMC @ 0x40000130
7,069,464 UART:
7,069,480 UART: Running Caliptra FMC ...
7,069,888 UART:
7,069,942 UART: [state] CFI Enabled
7,158,625 UART: [art] Extend RT PCRs Done
7,159,053 UART: [art] Lock RT PCRs Done
7,160,390 UART: [art] Populate DV Done
7,168,581 UART: [fht] FMC Alias Private Key: 7
7,169,543 UART: [art] Derive CDI
7,169,823 UART: [art] Store in slot 0x4
7,255,609 UART: [art] Derive Key Pair
7,255,969 UART: [art] Store priv key in slot 0x5
7,268,870 UART: [art] Derive Key Pair - Done
7,283,646 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,299,095 UART: [art] Erasing AUTHORITY.KEYID = 7
7,299,860 UART: [art] PUB.X = CFA886E65B1129FE33647CE3D77D3F44897BE1DB96182F2D81A0B3286FB3056DDBC6A72E11229B024F1459A0CF9FA223
7,306,632 UART: [art] PUB.Y = B8B509CE5E6B86B1659DA6821EEDDB7D63CD324288551C2C4E28B725F6AFE17AFE64F0AD2C1C0EFBD4E81CEEF9183B3F
7,313,602 UART: [art] SIG.R = 1474AA73F3AD71723878BC548CC22CAEDE353ED31888E6986782E712EA1217A466A28F55B6230FA541B566AB4464BF87
7,320,369 UART: [art] SIG.S = AF113CA567FF3CA2A0FB6A320927B771970ED3C23625AEF3EA385BA4BB6C0A129549E64E0F1AA674C551EC9E849BCA19
7,343,551 UART: Caliptra RT
7,343,802 UART: [state] CFI Enabled
7,709,199 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,739,908 UART: [rt]cmd =0x41545348, len=116
7,741,629 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,805 ready_for_fw is high
1,362,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,464 >>> mbox cmd response: success
3,043,721 UART:
3,043,737 UART: Running Caliptra FMC ...
3,044,145 UART:
3,044,199 UART: [state] CFI Enabled
3,055,065 UART: [fht] FMC Alias Private Key: 7
3,174,275 UART: [art] Extend RT PCRs Done
3,174,703 UART: [art] Lock RT PCRs Done
3,176,473 UART: [art] Populate DV Done
3,184,788 UART: [fht] FMC Alias Private Key: 7
3,185,858 UART: [art] Derive CDI
3,186,138 UART: [art] Store in slot 0x4
3,271,484 UART: [art] Derive Key Pair
3,271,844 UART: [art] Store priv key in slot 0x5
3,285,263 UART: [art] Derive Key Pair - Done
3,300,251 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,273 UART: [art] PUB.X = 1B11E9690AF58A04E2417B2339E605B3FDE53AC1A2AD3406039BBF3C786002D61C15EDD02CFF17C922EF796930D7FEC7
3,323,035 UART: [art] PUB.Y = 205B3A8412A8CF650F972F6A6EDC83F9A3E2515F3D4686B5A6AE235738DAC093CB89CF567DFF36F7F8A37FFF55E74B97
3,329,996 UART: [art] SIG.R = D7613D142C31822C74A1DA27FFC9D92E3B82639C81C34B96DF28A0B0A4E498E3F44D13162AADCBCC3239F1C8CBCF5398
3,336,780 UART: [art] SIG.S = 1975F4E1D0553B93AD263F206AC12928739206844FF298A2EFDDF62E156370A9A42ABFE32C3DF41C3B7AD869D8F946DD
3,360,791 UART: Caliptra RT
3,361,042 UART: [state] CFI Enabled
3,481,434 UART: [rt] RT listening for mailbox commands...
3,482,104 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,838 UART: [rt]cmd =0x41544d4e, len=14344
3,914,784 >>> mbox cmd response data (8 bytes)
3,914,785 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,750 UART: [rt]cmd =0x41545348, len=116
3,946,571 >>> mbox cmd response data (12 bytes)
3,946,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,759,694 >>> mbox cmd response: success
6,759,694 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,772,992 UART:
6,773,008 UART: Running Caliptra FMC ...
6,773,416 UART:
6,773,470 UART: [state] CFI Enabled
6,861,949 UART: [art] Extend RT PCRs Done
6,862,377 UART: [art] Lock RT PCRs Done
6,863,540 UART: [art] Populate DV Done
6,871,787 UART: [fht] FMC Alias Private Key: 7
6,872,741 UART: [art] Derive CDI
6,873,021 UART: [art] Store in slot 0x4
6,958,905 UART: [art] Derive Key Pair
6,959,265 UART: [art] Store priv key in slot 0x5
6,972,588 UART: [art] Derive Key Pair - Done
6,987,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,002,789 UART: [art] Erasing AUTHORITY.KEYID = 7
7,003,554 UART: [art] PUB.X = 68B4B0B3A02387DFC47F3C2758DAD9287A3E3591A25EB8B8001E582565D7368A01F8D2028B3417D3C6F3EAE72E97E7DC
7,010,302 UART: [art] PUB.Y = 6924B941F29E66D27F892B4852B19FBF1ABF399CAAB9DE9DCF46DC6D8DA63CFCC4322A71018FDCE5875FB42D92159B9A
7,017,269 UART: [art] SIG.R = 4EC9A1F23AE1CA76EF33ADD84131809674F0B93E52BB9753CF7F205F5257074AE496ABC0D9F2F9C27DD4599C074B17A8
7,024,043 UART: [art] SIG.S = 0A4024589B947B14F73E37F2CADC00C6F5FAB4EEA298174B4658C2B716193FACF4DC3C10AC48F2BB2688D03CB65E8505
7,047,725 UART: Caliptra RT
7,047,976 UART: [state] CFI Enabled
7,411,340 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,442,227 UART: [rt]cmd =0x41545348, len=116
7,444,150 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.56s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,774 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,280 UART: [kat] SHA2-256
882,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,326 UART: [kat] ++
886,478 UART: [kat] sha1
890,580 UART: [kat] SHA2-256
892,518 UART: [kat] SHA2-384
895,267 UART: [kat] SHA2-512-ACC
897,168 UART: [kat] ECC-384
902,865 UART: [kat] HMAC-384Kdf
907,503 UART: [kat] LMS
1,475,699 UART: [kat] --
1,476,566 UART: [cold-reset] ++
1,477,074 UART: [fht] Storing FHT @ 0x50003400
1,479,781 UART: [idev] ++
1,479,949 UART: [idev] CDI.KEYID = 6
1,480,309 UART: [idev] SUBJECT.KEYID = 7
1,480,733 UART: [idev] UDS.KEYID = 0
1,481,078 ready_for_fw is high
1,481,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,225 UART: [idev] Erasing UDS.KEYID = 0
1,506,587 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,163 UART: [idev] --
1,516,280 UART: [ldev] ++
1,516,448 UART: [ldev] CDI.KEYID = 6
1,516,811 UART: [ldev] SUBJECT.KEYID = 5
1,517,237 UART: [ldev] AUTHORITY.KEYID = 7
1,517,700 UART: [ldev] FE.KEYID = 1
1,523,072 UART: [ldev] Erasing FE.KEYID = 1
1,548,909 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,519 UART: [ldev] --
1,587,856 UART: [fwproc] Waiting for Commands...
1,588,523 UART: [fwproc] Received command 0x46574c44
1,589,314 UART: [fwproc] Received Image of size 118548 bytes
2,934,100 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,306 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,524 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,815 >>> mbox cmd response: success
3,133,937 UART: [afmc] ++
3,134,105 UART: [afmc] CDI.KEYID = 6
3,134,467 UART: [afmc] SUBJECT.KEYID = 7
3,134,892 UART: [afmc] AUTHORITY.KEYID = 5
3,170,361 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,645 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,425 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,134 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,017 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,700 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,364 UART: [afmc] --
3,213,484 UART: [cold-reset] --
3,214,434 UART: [state] Locking Datavault
3,215,401 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,005 UART: [state] Locking ICCM
3,216,571 UART: [exit] Launching FMC @ 0x40000130
3,221,901 UART:
3,221,917 UART: Running Caliptra FMC ...
3,222,325 UART:
3,222,468 UART: [state] CFI Enabled
3,232,988 UART: [fht] FMC Alias Private Key: 7
3,351,978 UART: [art] Extend RT PCRs Done
3,352,406 UART: [art] Lock RT PCRs Done
3,354,152 UART: [art] Populate DV Done
3,362,445 UART: [fht] FMC Alias Private Key: 7
3,363,383 UART: [art] Derive CDI
3,363,663 UART: [art] Store in slot 0x4
3,449,559 UART: [art] Derive Key Pair
3,449,919 UART: [art] Store priv key in slot 0x5
3,463,602 UART: [art] Derive Key Pair - Done
3,478,593 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,795 UART: [art] PUB.X = BBBCC1378ACDE1B7E346D42F5BAD28F79CA3B90E58E88D4E8C3FE1259FC5ACAA8D59B4F9F114C666A1226859084D4967
3,501,577 UART: [art] PUB.Y = 8A67568D3C33BB4EFCCE7660F3B1175D05BCDB21646CBF77EDFFEBF309302E7B07EF41D2C4EF2166B9E74FDEC6508BA9
3,508,542 UART: [art] SIG.R = 246CD94B35438A302D1AA6CBE08B216E473CDF87C269613193A818A496A7A68A2052815190BEEDAE60493CEF41F0517F
3,515,314 UART: [art] SIG.S = C0516037D31ED6856B62ABC9C3DE3593CB2F4004C1DC7587BB3673D164EBCCE1A9AD7F55ABBAE48B360378C57B75E2AD
3,539,508 UART: Caliptra RT
3,539,851 UART: [state] CFI Enabled
3,659,551 UART: [rt] RT listening for mailbox commands...
3,660,221 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,267 UART: [rt]cmd =0x41544d4e, len=14344
4,093,073 >>> mbox cmd response data (8 bytes)
4,093,074 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,895 UART: [rt]cmd =0x41545348, len=116
4,124,660 >>> mbox cmd response data (12 bytes)
4,124,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,125,367 UART:
4,125,383 UART: Running Caliptra ROM ...
4,125,791 UART:
4,125,932 UART: [state] CFI Enabled
4,128,634 UART: [state] LifecycleState = Unprovisioned
4,129,289 UART: [state] DebugLocked = No
4,129,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,131,490 UART: [kat] SHA2-256
4,925,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,929,536 UART: [kat] ++
4,929,688 UART: [kat] sha1
4,933,826 UART: [kat] SHA2-256
4,935,764 UART: [kat] SHA2-384
4,938,377 UART: [kat] SHA2-512-ACC
4,940,277 UART: [kat] ECC-384
4,945,874 UART: [kat] HMAC-384Kdf
4,950,444 UART: [kat] LMS
5,518,640 UART: [kat] --
5,519,739 UART: [update-reset] ++
6,900,927 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,902,025 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,057,292 >>> mbox cmd response: success
7,057,292 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,057,551 UART: [update-reset] Copying MAN_2 To MAN_1
7,065,565 UART: [update-reset Success] --
7,066,564 UART: [state] Locking Datavault
7,067,266 UART: [state] Locking PCR0, PCR1 and PCR31
7,067,870 UART: [state] Locking ICCM
7,068,374 UART: [exit] Launching FMC @ 0x40000130
7,073,704 UART:
7,073,720 UART: Running Caliptra FMC ...
7,074,128 UART:
7,074,271 UART: [state] CFI Enabled
7,163,226 UART: [art] Extend RT PCRs Done
7,163,654 UART: [art] Lock RT PCRs Done
7,164,935 UART: [art] Populate DV Done
7,173,078 UART: [fht] FMC Alias Private Key: 7
7,174,012 UART: [art] Derive CDI
7,174,292 UART: [art] Store in slot 0x4
7,259,552 UART: [art] Derive Key Pair
7,259,912 UART: [art] Store priv key in slot 0x5
7,273,643 UART: [art] Derive Key Pair - Done
7,288,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,303,835 UART: [art] Erasing AUTHORITY.KEYID = 7
7,304,600 UART: [art] PUB.X = FC8A7E5CE285DBF7DF792A095BE55BB268F45406F0CF65AC4E10FAFAC24A8167E204D7C324DE655DF2D1C2A5FFFAF606
7,311,384 UART: [art] PUB.Y = E94BAD66EDB5D538A5C74AB92A930E56EF3AE42E3E89AF43C8C163638AA77F5FE376C522D00F1A01536BAB814D4F5CE6
7,318,343 UART: [art] SIG.R = 09CB8E31457B61D5CB1C1F8FDF9EF93DCC9D4532C0A0F4EF0C452CF1EB8895AED277478C216AA7237EB43AFC91773CF9
7,325,127 UART: [art] SIG.S = E8E10A480FBFCD639EEEF7FA266CFA49DA3C4CBE1AAF3FFC3EB2EB5889D536760AD1880EB441476E4F5B07F265A9677A
7,349,352 UART: Caliptra RT
7,349,695 UART: [state] CFI Enabled
7,712,812 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,743,939 UART: [rt]cmd =0x41545348, len=116
7,746,122 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,748 ready_for_fw is high
1,362,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,951 >>> mbox cmd response: success
3,042,816 UART:
3,042,832 UART: Running Caliptra FMC ...
3,043,240 UART:
3,043,383 UART: [state] CFI Enabled
3,054,167 UART: [fht] FMC Alias Private Key: 7
3,173,363 UART: [art] Extend RT PCRs Done
3,173,791 UART: [art] Lock RT PCRs Done
3,175,527 UART: [art] Populate DV Done
3,183,984 UART: [fht] FMC Alias Private Key: 7
3,184,992 UART: [art] Derive CDI
3,185,272 UART: [art] Store in slot 0x4
3,270,846 UART: [art] Derive Key Pair
3,271,206 UART: [art] Store priv key in slot 0x5
3,284,505 UART: [art] Derive Key Pair - Done
3,299,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,446 UART: [art] PUB.X = F8F94A7384CC98D370242AA497A16905ED0D4EA423D059532254A12DE3D59BAB66F50A7FB5EF282CCB8EAC8DB269DEC6
3,322,223 UART: [art] PUB.Y = 977F15DED67ADABE2891E0450866ECF260C5CBF2FAE0AEFFCEEB9F616E6AC06326AF70E2433B53BB1EC576D5191E4D70
3,329,194 UART: [art] SIG.R = 58B17EC391FF4AAF5E3A43346D0115465F6D2C4BDAC9D69486C2F4EDFFB863B4B2695E78AB4101F989CC7AEAFA757CC6
3,335,978 UART: [art] SIG.S = 70A7FC110F5060E5C11A42C6399D9DAA4DBBA04EBC4CC73AEA97AC46D0B08EA0C7EB41451C89B55EB87881C81FF62B7F
3,360,049 UART: Caliptra RT
3,360,392 UART: [state] CFI Enabled
3,481,209 UART: [rt] RT listening for mailbox commands...
3,481,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,893 UART: [rt]cmd =0x41544d4e, len=14344
3,914,847 >>> mbox cmd response data (8 bytes)
3,914,848 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,095 UART: [rt]cmd =0x41545348, len=116
3,946,780 >>> mbox cmd response data (12 bytes)
3,946,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,761,392 >>> mbox cmd response: success
6,761,392 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,774,764 UART:
6,774,780 UART: Running Caliptra FMC ...
6,775,188 UART:
6,775,331 UART: [state] CFI Enabled
6,864,312 UART: [art] Extend RT PCRs Done
6,864,740 UART: [art] Lock RT PCRs Done
6,865,943 UART: [art] Populate DV Done
6,874,120 UART: [fht] FMC Alias Private Key: 7
6,875,074 UART: [art] Derive CDI
6,875,354 UART: [art] Store in slot 0x4
6,960,970 UART: [art] Derive Key Pair
6,961,330 UART: [art] Store priv key in slot 0x5
6,974,555 UART: [art] Derive Key Pair - Done
6,989,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,005,328 UART: [art] Erasing AUTHORITY.KEYID = 7
7,006,093 UART: [art] PUB.X = 2C6FD81081BC2CE79C70B2BE8E62B85206366E1A4CBAE77CA32C97C832A963F0A4CC35B12C2399F59074EC67B2131BA6
7,012,870 UART: [art] PUB.Y = 4F776B5F1FAD581034661F23E3D75EAF113383E93CDAC5786E3482BE2D08B63C36BE6A5DC3FE6A3B23AC579A6482D529
7,019,827 UART: [art] SIG.R = 213F689017375D0CF95F372091D04C5BA144EA1F3886EB2D53C3C2C0A2CF450F106991F02300C138BA1AC6A27A54A50C
7,026,568 UART: [art] SIG.S = 2DB4319FD0AEE870286F39745F1740E8414E604885DD567210379532C1C5857AAF978C3AFFFA7835D3F79DC5163B72DA
7,050,408 UART: Caliptra RT
7,050,751 UART: [state] CFI Enabled
7,415,705 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,446,488 UART: [rt]cmd =0x41545348, len=116
7,448,555 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,358 UART: [kat] ++
895,510 UART: [kat] sha1
899,726 UART: [kat] SHA2-256
901,666 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
921,031 UART: [kat] LMS
1,169,343 UART: [kat] --
1,170,118 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,272 UART: [idev] ++
1,173,440 UART: [idev] CDI.KEYID = 6
1,173,801 UART: [idev] SUBJECT.KEYID = 7
1,174,226 UART: [idev] UDS.KEYID = 0
1,174,572 ready_for_fw is high
1,174,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,231 UART: [idev] Erasing UDS.KEYID = 0
1,199,385 UART: [idev] Sha1 KeyId Algorithm
1,208,345 UART: [idev] --
1,209,220 UART: [ldev] ++
1,209,388 UART: [ldev] CDI.KEYID = 6
1,209,752 UART: [ldev] SUBJECT.KEYID = 5
1,210,179 UART: [ldev] AUTHORITY.KEYID = 7
1,210,642 UART: [ldev] FE.KEYID = 1
1,215,788 UART: [ldev] Erasing FE.KEYID = 1
1,242,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,970 UART: [ldev] --
1,281,211 UART: [fwproc] Wait for Commands...
1,281,996 UART: [fwproc] Recv command 0x46574c44
1,282,729 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,333 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,508 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,863 >>> mbox cmd response: success
2,826,975 UART: [afmc] ++
2,827,143 UART: [afmc] CDI.KEYID = 6
2,827,506 UART: [afmc] SUBJECT.KEYID = 7
2,827,932 UART: [afmc] AUTHORITY.KEYID = 5
2,863,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,645 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,355 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,236 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,937 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,710 UART: [afmc] --
2,906,771 UART: [cold-reset] --
2,907,721 UART: [state] Locking Datavault
2,909,150 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,754 UART: [state] Locking ICCM
2,910,248 UART: [exit] Launching FMC @ 0x40000130
2,915,578 UART:
2,915,594 UART: Running Caliptra FMC ...
2,916,002 UART:
2,916,056 UART: [state] CFI Enabled
2,926,494 UART: [fht] FMC Alias Private Key: 7
3,045,490 UART: [art] Extend RT PCRs Done
3,045,918 UART: [art] Lock RT PCRs Done
3,047,316 UART: [art] Populate DV Done
3,055,631 UART: [fht] FMC Alias Private Key: 7
3,056,655 UART: [art] Derive CDI
3,056,935 UART: [art] Store in slot 0x4
3,142,838 UART: [art] Derive Key Pair
3,143,198 UART: [art] Store priv key in slot 0x5
3,156,262 UART: [art] Derive Key Pair - Done
3,171,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,447 UART: [art] PUB.X = 223DAC8ADFE0D7444181A3EBE3FA93D1ED791698ED15E6D2BF523267B0BA62419A4DC9E2CCE28DB83E39D8CDF9B8AD8B
3,194,243 UART: [art] PUB.Y = 5FF8FCD98A5C76447A6A12A0C8C946C8B0220A981686616985F47696F6BBD3A989EBA2BB6C09E11B71EF310CC0E93C2D
3,201,194 UART: [art] SIG.R = F585BD3604053E06A1A961EE8CFBF2CDA5F6BA56D79AFC0CAF146B54571B688DD7F6A0B6B1065CF89677B4BDB70147FE
3,207,966 UART: [art] SIG.S = 6CF251E966CFD7CA5589027E701AA4C7B838B8106D09B07C630F1621E9EB472DC0362BA14C28D343D28681872289E545
3,231,181 UART: Caliptra RT
3,231,432 UART: [state] CFI Enabled
3,350,683 UART: [rt] RT listening for mailbox commands...
3,351,353 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,547 UART: [rt]cmd =0x41544d4e, len=14344
3,784,287 >>> mbox cmd response data (8 bytes)
3,784,288 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,521 UART: [rt]cmd =0x41545348, len=116
3,816,368 >>> mbox cmd response data (12 bytes)
3,816,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,102 UART:
3,817,118 UART: Running Caliptra ROM ...
3,817,526 UART:
3,817,581 UART: [state] CFI Enabled
3,820,167 UART: [state] LifecycleState = Unprovisioned
3,820,822 UART: [state] DebugLocked = No
3,821,348 UART: [state] WD Timer not started. Device not locked for debugging
3,822,604 UART: [kat] SHA2-256
4,626,154 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,630,258 UART: [kat] ++
4,630,410 UART: [kat] sha1
4,634,746 UART: [kat] SHA2-256
4,636,686 UART: [kat] SHA2-384
4,639,437 UART: [kat] SHA2-512-ACC
4,641,337 UART: [kat] ECC-384
4,650,860 UART: [kat] HMAC-384Kdf
4,655,454 UART: [kat] LMS
4,903,766 UART: [kat] --
4,904,762 UART: [update-reset] ++
6,264,731 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,265,910 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,421,125 >>> mbox cmd response: success
6,421,125 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,421,250 UART: [update-reset] Copying MAN_2 To MAN_1
6,429,264 UART: [update-reset Success] --
6,430,083 UART: [state] Locking Datavault
6,430,935 UART: [state] Locking PCR0, PCR1 and PCR31
6,431,539 UART: [state] Locking ICCM
6,432,023 UART: [exit] Launching FMC @ 0x40000130
6,437,353 UART:
6,437,369 UART: Running Caliptra FMC ...
6,437,777 UART:
6,437,831 UART: [state] CFI Enabled
6,526,812 UART: [art] Extend RT PCRs Done
6,527,240 UART: [art] Lock RT PCRs Done
6,528,799 UART: [art] Populate DV Done
6,537,044 UART: [fht] FMC Alias Private Key: 7
6,538,026 UART: [art] Derive CDI
6,538,306 UART: [art] Store in slot 0x4
6,623,777 UART: [art] Derive Key Pair
6,624,137 UART: [art] Store priv key in slot 0x5
6,637,859 UART: [art] Derive Key Pair - Done
6,652,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,667,267 UART: [art] Erasing AUTHORITY.KEYID = 7
6,668,032 UART: [art] PUB.X = 23DFF6B8FF91B2D108A1362B7252C64264107F387C3F0ED507CA8431D5BAE2421FF126242F25664895CBBCC233069BE4
6,674,792 UART: [art] PUB.Y = B287281CE22489C6C2D9AD294BA5C5E5F1F1A757024FE99545542CF14062CA7F05FAA4F332C3A3B21D9405A2D19722FA
6,681,739 UART: [art] SIG.R = D245B8E36FCAD5F22CE5E8C64C61D68F03591F94F22C65E523D1EEFC1967B81EE94F537CECA0CBE79F00F0186FC758A6
6,688,502 UART: [art] SIG.S = C6CB7706C2B4167086924F3314F6894BBDC746FA1C98F4A9135FAA9BCD84C6D4BB9407639830A24D7B1AE29D0403E24F
6,712,490 UART: Caliptra RT
6,712,741 UART: [state] CFI Enabled
7,076,270 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,107,081 UART: [rt]cmd =0x41545348, len=116
7,109,154 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,854 ready_for_fw is high
1,058,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,112 >>> mbox cmd response: success
2,742,295 UART:
2,742,311 UART: Running Caliptra FMC ...
2,742,719 UART:
2,742,773 UART: [state] CFI Enabled
2,753,295 UART: [fht] FMC Alias Private Key: 7
2,872,475 UART: [art] Extend RT PCRs Done
2,872,903 UART: [art] Lock RT PCRs Done
2,874,657 UART: [art] Populate DV Done
2,882,824 UART: [fht] FMC Alias Private Key: 7
2,883,896 UART: [art] Derive CDI
2,884,176 UART: [art] Store in slot 0x4
2,970,153 UART: [art] Derive Key Pair
2,970,513 UART: [art] Store priv key in slot 0x5
2,983,587 UART: [art] Derive Key Pair - Done
2,998,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,789 UART: [art] PUB.X = C9C0103B03D9F6FCD2D2459DBE35B587E09ED35021E3B683AB8135259D50B390212DE4049319876E90863765C47039AF
3,020,547 UART: [art] PUB.Y = C32F878AFDC8086CE77A11C7C597BAA40EEB275CA0FA4741B65DC84D0F81AE5178EC24B3323EDC5A0F0982AC308048ED
3,027,500 UART: [art] SIG.R = 85FAD1ED75DA217E5E8E7A365B8691326B4F1B7AC48C221E95016A466E2EAAC5744186D6890C1625A6F84076BBC10711
3,034,263 UART: [art] SIG.S = E882154DAE19F8B7FC5B8EE640016ABAC5EA851226A44E202FCB435336DE31122489925D22421E4EDB837F3B8F70A97D
3,057,804 UART: Caliptra RT
3,058,055 UART: [state] CFI Enabled
3,177,057 UART: [rt] RT listening for mailbox commands...
3,177,727 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,815 UART: [rt]cmd =0x41544d4e, len=14344
3,610,591 >>> mbox cmd response data (8 bytes)
3,610,592 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,675 UART: [rt]cmd =0x41545348, len=116
3,642,410 >>> mbox cmd response data (12 bytes)
3,642,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,131,205 >>> mbox cmd response: success
6,131,205 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,144,616 UART:
6,144,632 UART: Running Caliptra FMC ...
6,145,040 UART:
6,145,094 UART: [state] CFI Enabled
6,234,483 UART: [art] Extend RT PCRs Done
6,234,911 UART: [art] Lock RT PCRs Done
6,236,456 UART: [art] Populate DV Done
6,244,859 UART: [fht] FMC Alias Private Key: 7
6,245,787 UART: [art] Derive CDI
6,246,067 UART: [art] Store in slot 0x4
6,331,854 UART: [art] Derive Key Pair
6,332,214 UART: [art] Store priv key in slot 0x5
6,345,034 UART: [art] Derive Key Pair - Done
6,359,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,375,095 UART: [art] Erasing AUTHORITY.KEYID = 7
6,375,860 UART: [art] PUB.X = 343E20B77FE313DBED438D7F4D72EDCBAE03205096076AC1C0E85DE13A50EB26F3365B6D7D5A4960B4EF83E100C6099C
6,382,611 UART: [art] PUB.Y = 241C293A291CD84A6FC6C518092D9DAAE9B7D1E427525215F917121EB34B078284985583BF019F2BF3D4EC41ADEDED93
6,389,558 UART: [art] SIG.R = EA68C7A028A2BD21EA6801B37B664FFA5737B405FFB7D5B248A2CDC5CA18D7DC52660C8F9C7B1640133F8C865B10F71B
6,396,333 UART: [art] SIG.S = FBFE5098F8F77E1B86A718CA5787D36AAED7681F98F8D061C995C35DBA84A3C0A5923BED4E9E3E36F03D65965984C85E
6,419,897 UART: Caliptra RT
6,420,148 UART: [state] CFI Enabled
6,785,861 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,816,806 UART: [rt]cmd =0x41545348, len=116
6,818,555 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [kat] SHA2-256
891,365 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,469 UART: [kat] ++
895,621 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,386 UART: [kat] SHA2-512-ACC
906,287 UART: [kat] ECC-384
916,324 UART: [kat] HMAC-384Kdf
920,872 UART: [kat] LMS
1,169,184 UART: [kat] --
1,170,395 UART: [cold-reset] ++
1,170,865 UART: [fht] FHT @ 0x50003400
1,173,559 UART: [idev] ++
1,173,727 UART: [idev] CDI.KEYID = 6
1,174,088 UART: [idev] SUBJECT.KEYID = 7
1,174,513 UART: [idev] UDS.KEYID = 0
1,174,859 ready_for_fw is high
1,174,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,230 UART: [idev] Erasing UDS.KEYID = 0
1,199,626 UART: [idev] Sha1 KeyId Algorithm
1,208,362 UART: [idev] --
1,209,515 UART: [ldev] ++
1,209,683 UART: [ldev] CDI.KEYID = 6
1,210,047 UART: [ldev] SUBJECT.KEYID = 5
1,210,474 UART: [ldev] AUTHORITY.KEYID = 7
1,210,937 UART: [ldev] FE.KEYID = 1
1,216,255 UART: [ldev] Erasing FE.KEYID = 1
1,242,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,819 UART: [ldev] --
1,282,064 UART: [fwproc] Wait for Commands...
1,282,725 UART: [fwproc] Recv command 0x46574c44
1,283,458 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,834 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,009 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,334 >>> mbox cmd response: success
2,827,558 UART: [afmc] ++
2,827,726 UART: [afmc] CDI.KEYID = 6
2,828,089 UART: [afmc] SUBJECT.KEYID = 7
2,828,515 UART: [afmc] AUTHORITY.KEYID = 5
2,863,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,423 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,172 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,882 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,763 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,464 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,247 UART: [afmc] --
2,907,226 UART: [cold-reset] --
2,907,884 UART: [state] Locking Datavault
2,908,925 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,529 UART: [state] Locking ICCM
2,910,015 UART: [exit] Launching FMC @ 0x40000130
2,915,345 UART:
2,915,361 UART: Running Caliptra FMC ...
2,915,769 UART:
2,915,912 UART: [state] CFI Enabled
2,926,886 UART: [fht] FMC Alias Private Key: 7
3,045,438 UART: [art] Extend RT PCRs Done
3,045,866 UART: [art] Lock RT PCRs Done
3,047,330 UART: [art] Populate DV Done
3,055,569 UART: [fht] FMC Alias Private Key: 7
3,056,569 UART: [art] Derive CDI
3,056,849 UART: [art] Store in slot 0x4
3,142,580 UART: [art] Derive Key Pair
3,142,940 UART: [art] Store priv key in slot 0x5
3,156,120 UART: [art] Derive Key Pair - Done
3,171,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,291 UART: [art] PUB.X = F80C8A688F1373400830FFFB69A80F41FF36643A42033C7C054DFC0329C50FDCF902CE2A0BC669A14D0AA88225A0FB1A
3,194,041 UART: [art] PUB.Y = 12652412BED722EA739799F9D46C8BB3A03694F8A22196E189666649BAC3F51D657DED6F9F6C0EAD7D1FA0478FA6B2B6
3,200,996 UART: [art] SIG.R = C61014BB34E493550BD075BF667726AE95626C84158B2016742F30C0D197921EC1D7D396E55870E4E296AFFAC51301EB
3,207,756 UART: [art] SIG.S = 83411616452474C4E3F9FCA3ACFC8AF28A53B6F38ABBF94D608A5924F29B324A9B7B8EACA5FF6371FF546EE0D49D9BDE
3,230,944 UART: Caliptra RT
3,231,287 UART: [state] CFI Enabled
3,351,481 UART: [rt] RT listening for mailbox commands...
3,352,151 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,217 UART: [rt]cmd =0x41544d4e, len=14344
3,784,983 >>> mbox cmd response data (8 bytes)
3,784,984 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,917 UART: [rt]cmd =0x41545348, len=116
3,816,876 >>> mbox cmd response data (12 bytes)
3,816,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,018 UART:
3,818,034 UART: Running Caliptra ROM ...
3,818,442 UART:
3,818,584 UART: [state] CFI Enabled
3,821,252 UART: [state] LifecycleState = Unprovisioned
3,821,907 UART: [state] DebugLocked = No
3,822,509 UART: [state] WD Timer not started. Device not locked for debugging
3,823,809 UART: [kat] SHA2-256
4,627,359 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,631,463 UART: [kat] ++
4,631,615 UART: [kat] sha1
4,636,019 UART: [kat] SHA2-256
4,637,959 UART: [kat] SHA2-384
4,640,824 UART: [kat] SHA2-512-ACC
4,642,724 UART: [kat] ECC-384
4,652,279 UART: [kat] HMAC-384Kdf
4,656,767 UART: [kat] LMS
4,905,079 UART: [kat] --
4,906,021 UART: [update-reset] ++
6,264,754 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,265,921 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,421,136 >>> mbox cmd response: success
6,421,136 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,421,379 UART: [update-reset] Copying MAN_2 To MAN_1
6,429,393 UART: [update-reset Success] --
6,430,312 UART: [state] Locking Datavault
6,431,114 UART: [state] Locking PCR0, PCR1 and PCR31
6,431,718 UART: [state] Locking ICCM
6,432,220 UART: [exit] Launching FMC @ 0x40000130
6,437,550 UART:
6,437,566 UART: Running Caliptra FMC ...
6,437,974 UART:
6,438,117 UART: [state] CFI Enabled
6,527,018 UART: [art] Extend RT PCRs Done
6,527,446 UART: [art] Lock RT PCRs Done
6,528,773 UART: [art] Populate DV Done
6,537,068 UART: [fht] FMC Alias Private Key: 7
6,538,144 UART: [art] Derive CDI
6,538,424 UART: [art] Store in slot 0x4
6,624,019 UART: [art] Derive Key Pair
6,624,379 UART: [art] Store priv key in slot 0x5
6,637,701 UART: [art] Derive Key Pair - Done
6,652,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,668,250 UART: [art] Erasing AUTHORITY.KEYID = 7
6,669,015 UART: [art] PUB.X = 447E8206210FACD010088A95E38DB765D1FC9418F50E9C581AC15D0E68A159DBE33E60AB069148752C830BFB856420E0
6,675,764 UART: [art] PUB.Y = 328E47BFB396B07FCF6245CDFE6FFCD485AAF4CDCA6B52235BFBC163C6FCA89501540CD4709B5004C0143ED9115B164D
6,682,723 UART: [art] SIG.R = 5EFD5B607844F86DAFE06059EB30635D19BC5E23867612BB38D7BB236D5734855954752F70178C54209BDF957FB09B70
6,689,489 UART: [art] SIG.S = 170B26C686AFA37473DD099066488A1E92C9F51E04642B1FF30AEBADE045895C012941C9A2E1321DEE040D8FE16D04F2
6,713,501 UART: Caliptra RT
6,713,844 UART: [state] CFI Enabled
7,078,949 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,109,948 UART: [rt]cmd =0x41545348, len=116
7,111,745 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,301 ready_for_fw is high
1,059,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,269 >>> mbox cmd response: success
2,740,274 UART:
2,740,290 UART: Running Caliptra FMC ...
2,740,698 UART:
2,740,841 UART: [state] CFI Enabled
2,751,461 UART: [fht] FMC Alias Private Key: 7
2,870,619 UART: [art] Extend RT PCRs Done
2,871,047 UART: [art] Lock RT PCRs Done
2,872,569 UART: [art] Populate DV Done
2,880,930 UART: [fht] FMC Alias Private Key: 7
2,881,978 UART: [art] Derive CDI
2,882,258 UART: [art] Store in slot 0x4
2,967,591 UART: [art] Derive Key Pair
2,967,951 UART: [art] Store priv key in slot 0x5
2,981,521 UART: [art] Derive Key Pair - Done
2,996,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,719 UART: [art] PUB.X = 3AF0F21D2F560CE2316A3C4B0CE136A68D49161418E91D28EF5D5A73C466C92897DB06946FA35E9526AE9BCBCEAA81B9
3,019,492 UART: [art] PUB.Y = D8EB373CCEC63C213FA1939B7F6C0B372F114C08B29F9C60634AEDA340CB8252EBF7BCD62B92E436B280FBE02357D858
3,026,450 UART: [art] SIG.R = B681E2A47025A178B35E25E89B89D06F46C4344F0FB015B3C4D712A7D188EC80CCA7E7477A8C90B53CE20EA52D856522
3,033,218 UART: [art] SIG.S = 944142028975C140D5F45C248CC18E3457F9C779EDAED426541AD9A4080EEE089F24A99E35E6772534C46AEBD936F630
3,056,832 UART: Caliptra RT
3,057,175 UART: [state] CFI Enabled
3,176,073 UART: [rt] RT listening for mailbox commands...
3,176,743 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,903 UART: [rt]cmd =0x41544d4e, len=14344
3,609,429 >>> mbox cmd response data (8 bytes)
3,609,430 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,633 UART: [rt]cmd =0x41545348, len=116
3,641,294 >>> mbox cmd response data (12 bytes)
3,641,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,130,978 >>> mbox cmd response: success
6,130,978 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,144,323 UART:
6,144,339 UART: Running Caliptra FMC ...
6,144,747 UART:
6,144,890 UART: [state] CFI Enabled
6,234,369 UART: [art] Extend RT PCRs Done
6,234,797 UART: [art] Lock RT PCRs Done
6,236,198 UART: [art] Populate DV Done
6,244,545 UART: [fht] FMC Alias Private Key: 7
6,245,639 UART: [art] Derive CDI
6,245,919 UART: [art] Store in slot 0x4
6,331,724 UART: [art] Derive Key Pair
6,332,084 UART: [art] Store priv key in slot 0x5
6,346,326 UART: [art] Derive Key Pair - Done
6,361,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,376,489 UART: [art] Erasing AUTHORITY.KEYID = 7
6,377,254 UART: [art] PUB.X = 8415E7D7C0704B2799BB5EAFFFA25B7D8509BD7BC4CBCDE1D071FFA3F3E93CEB3BFA82A7B01C8779DB6E92B1DA73EBC7
6,384,053 UART: [art] PUB.Y = DB6AB7320932FAA0F9C84A5E55DE01F367B8C5996D24DDAC18ED6C00A5DF89B573D1FF6C993F98E5CB143B9C3554893D
6,390,991 UART: [art] SIG.R = 70BCC23E07609E49B626F2B1795CDE091E8C5744F898CD910FF6DFD55D009DB30087243FF7CF574013B6983D1BB3BBC5
6,397,716 UART: [art] SIG.S = C0AED3315AAECEE5CBD3EEDBCB2FBB7C0EC7BAA8A59B4186849D999F1C89474CB21439F3DB30C7BDA8D1DDFC69DB98D1
6,421,675 UART: Caliptra RT
6,422,018 UART: [state] CFI Enabled
6,788,796 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,819,747 UART: [rt]cmd =0x41545348, len=116
6,821,554 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [kat] SHA2-256
893,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,699 UART: [kat] ++
897,851 UART: [kat] sha1
902,177 UART: [kat] SHA2-256
904,117 UART: [kat] SHA2-384
906,890 UART: [kat] SHA2-512-ACC
908,791 UART: [kat] ECC-384
918,840 UART: [kat] HMAC-384Kdf
923,594 UART: [kat] LMS
1,171,922 UART: [kat] --
1,172,577 UART: [cold-reset] ++
1,173,085 UART: [fht] FHT @ 0x50003400
1,175,682 UART: [idev] ++
1,175,850 UART: [idev] CDI.KEYID = 6
1,176,210 UART: [idev] SUBJECT.KEYID = 7
1,176,634 UART: [idev] UDS.KEYID = 0
1,176,979 ready_for_fw is high
1,176,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,754 UART: [idev] Erasing UDS.KEYID = 0
1,201,479 UART: [idev] Sha1 KeyId Algorithm
1,209,937 UART: [idev] --
1,211,115 UART: [ldev] ++
1,211,283 UART: [ldev] CDI.KEYID = 6
1,211,646 UART: [ldev] SUBJECT.KEYID = 5
1,212,072 UART: [ldev] AUTHORITY.KEYID = 7
1,212,535 UART: [ldev] FE.KEYID = 1
1,217,985 UART: [ldev] Erasing FE.KEYID = 1
1,244,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,855 UART: [ldev] --
1,283,126 UART: [fwproc] Wait for Commands...
1,283,896 UART: [fwproc] Recv command 0x46574c44
1,284,624 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,268 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,438 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,651 >>> mbox cmd response: success
2,828,865 UART: [afmc] ++
2,829,033 UART: [afmc] CDI.KEYID = 6
2,829,395 UART: [afmc] SUBJECT.KEYID = 7
2,829,820 UART: [afmc] AUTHORITY.KEYID = 5
2,864,957 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,272 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,981 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,864 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,565 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,313 UART: [afmc] --
2,908,343 UART: [cold-reset] --
2,909,271 UART: [state] Locking Datavault
2,910,462 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,066 UART: [state] Locking ICCM
2,911,518 UART: [exit] Launching FMC @ 0x40000130
2,916,848 UART:
2,916,864 UART: Running Caliptra FMC ...
2,917,272 UART:
2,917,326 UART: [state] CFI Enabled
2,927,974 UART: [fht] FMC Alias Private Key: 7
3,048,014 UART: [art] Extend RT PCRs Done
3,048,442 UART: [art] Lock RT PCRs Done
3,049,674 UART: [art] Populate DV Done
3,057,985 UART: [fht] FMC Alias Private Key: 7
3,059,099 UART: [art] Derive CDI
3,059,379 UART: [art] Store in slot 0x4
3,145,450 UART: [art] Derive Key Pair
3,145,810 UART: [art] Store priv key in slot 0x5
3,159,004 UART: [art] Derive Key Pair - Done
3,174,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,598 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,363 UART: [art] PUB.X = E3BA3783F2D6A6160A34E11566907F8923C21A500586A96A9C6201FC090804B54AD8BBE64515D33801881D71455A38A8
3,197,102 UART: [art] PUB.Y = 3CA579DEE0DB0B0983BA94A73726438B7DC032C0C34895A6AFBFAA8BFDFFCBFD610AA1C07026F6ED26EAE180C463B28E
3,204,069 UART: [art] SIG.R = EF662D2C660F29524D8A1BAA8CA89F396F8560100B0EBD310A45E3D377EF3D14A25FB28050BF39D83BC8A717EAAB2E19
3,210,841 UART: [art] SIG.S = 9AF742886045382EE078040DE7ED80E575B67BE2C184047F85C4CFB589C18C72E62913E496AE12F7325F68C3181EFD93
3,234,920 UART: Caliptra RT
3,235,171 UART: [state] CFI Enabled
3,354,387 UART: [rt] RT listening for mailbox commands...
3,355,057 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,773 UART: [rt]cmd =0x41544d4e, len=14344
3,788,039 >>> mbox cmd response data (8 bytes)
3,788,040 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,211 UART: [rt]cmd =0x41545348, len=116
3,820,172 >>> mbox cmd response data (12 bytes)
3,820,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,922 UART:
3,820,938 UART: Running Caliptra ROM ...
3,821,346 UART:
3,821,401 UART: [state] CFI Enabled
3,824,233 UART: [state] LifecycleState = Unprovisioned
3,824,888 UART: [state] DebugLocked = No
3,825,416 UART: [state] WD Timer not started. Device not locked for debugging
3,826,706 UART: [kat] SHA2-256
4,632,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,636,481 UART: [kat] ++
4,636,633 UART: [kat] sha1
4,640,817 UART: [kat] SHA2-256
4,642,757 UART: [kat] SHA2-384
4,645,484 UART: [kat] SHA2-512-ACC
4,647,384 UART: [kat] ECC-384
4,656,869 UART: [kat] HMAC-384Kdf
4,661,497 UART: [kat] LMS
4,909,825 UART: [kat] --
4,910,907 UART: [update-reset] ++
6,269,863 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,270,900 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,426,115 >>> mbox cmd response: success
6,426,115 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,426,466 UART: [update-reset] Copying MAN_2 To MAN_1
6,434,480 UART: [update-reset Success] --
6,435,351 UART: [state] Locking Datavault
6,436,013 UART: [state] Locking PCR0, PCR1 and PCR31
6,436,617 UART: [state] Locking ICCM
6,437,277 UART: [exit] Launching FMC @ 0x40000130
6,442,607 UART:
6,442,623 UART: Running Caliptra FMC ...
6,443,031 UART:
6,443,085 UART: [state] CFI Enabled
6,532,110 UART: [art] Extend RT PCRs Done
6,532,538 UART: [art] Lock RT PCRs Done
6,533,623 UART: [art] Populate DV Done
6,541,716 UART: [fht] FMC Alias Private Key: 7
6,542,838 UART: [art] Derive CDI
6,543,118 UART: [art] Store in slot 0x4
6,629,091 UART: [art] Derive Key Pair
6,629,451 UART: [art] Store priv key in slot 0x5
6,643,041 UART: [art] Derive Key Pair - Done
6,657,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,673,728 UART: [art] Erasing AUTHORITY.KEYID = 7
6,674,493 UART: [art] PUB.X = CB92E891722388CB9B40603EEDFEA77FAB50DF51E5793E2FD5E07E00F143D8D8584E4AA5DDCD9F72280C2A5425E88FC7
6,681,254 UART: [art] PUB.Y = 047AC068DD6B072EE0C2670834EBDC7298A5D9F29F2B8549FCAA90D829379B7344922CAF9C2E693B259C1EE44C7599C7
6,688,201 UART: [art] SIG.R = 61758A0BD7EDD20E78330F656FF5558C9288C1B20622696000DECF095F7D8D2DEA51CD12F3D7D2AE60996D9AB4479815
6,694,938 UART: [art] SIG.S = A283C9E76E03A0E5118B06B6C6DA2DD0DA63EFF0DE835827C9F27A6A10FB3CE3803A7C73956F00BB23AE8E906169F7F5
6,718,862 UART: Caliptra RT
6,719,113 UART: [state] CFI Enabled
7,081,951 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,112,906 UART: [rt]cmd =0x41545348, len=116
7,114,787 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,945 ready_for_fw is high
1,059,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,588 >>> mbox cmd response: success
2,741,641 UART:
2,741,657 UART: Running Caliptra FMC ...
2,742,065 UART:
2,742,119 UART: [state] CFI Enabled
2,753,003 UART: [fht] FMC Alias Private Key: 7
2,872,205 UART: [art] Extend RT PCRs Done
2,872,633 UART: [art] Lock RT PCRs Done
2,873,999 UART: [art] Populate DV Done
2,882,022 UART: [fht] FMC Alias Private Key: 7
2,883,014 UART: [art] Derive CDI
2,883,294 UART: [art] Store in slot 0x4
2,968,959 UART: [art] Derive Key Pair
2,969,319 UART: [art] Store priv key in slot 0x5
2,982,857 UART: [art] Derive Key Pair - Done
2,997,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,251 UART: [art] PUB.X = 5398E80D86DDBA6CCE6E50AD2748BECCDFB665C598E3A6690F66B427281B99803A39077B2D6D267B92CAE97F2791BB77
3,020,022 UART: [art] PUB.Y = 700B0B220D79C93DEB7C187E9107ADB49D805D6FB677BE3570C126AF380F0CB65EF54F7F562F1D2CA245E058800C9D7E
3,026,961 UART: [art] SIG.R = 72C411C27E212D39C8EF490814A195C48A74DC6E754EA138F68F5AC160ADBC0659070636DF9A14C5981863DA4F0E9D17
3,033,718 UART: [art] SIG.S = E9B1389B8B168D64EED6C774DC534EF0A02CA79386473160EE8EFBFC52D818F920A367D9F8C53451181908B0A93FB84B
3,057,345 UART: Caliptra RT
3,057,596 UART: [state] CFI Enabled
3,178,543 UART: [rt] RT listening for mailbox commands...
3,179,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,437 UART: [rt]cmd =0x41544d4e, len=14344
3,612,249 >>> mbox cmd response data (8 bytes)
3,612,250 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,205 UART: [rt]cmd =0x41545348, len=116
3,644,194 >>> mbox cmd response data (12 bytes)
3,644,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,134,318 >>> mbox cmd response: success
6,134,318 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,147,637 UART:
6,147,653 UART: Running Caliptra FMC ...
6,148,061 UART:
6,148,115 UART: [state] CFI Enabled
6,237,130 UART: [art] Extend RT PCRs Done
6,237,558 UART: [art] Lock RT PCRs Done
6,238,717 UART: [art] Populate DV Done
6,246,950 UART: [fht] FMC Alias Private Key: 7
6,248,054 UART: [art] Derive CDI
6,248,334 UART: [art] Store in slot 0x4
6,333,933 UART: [art] Derive Key Pair
6,334,293 UART: [art] Store priv key in slot 0x5
6,348,031 UART: [art] Derive Key Pair - Done
6,362,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,378,555 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,320 UART: [art] PUB.X = B196FAAD608E5C8EBF4E4213DA5180645FBDE515F2F056DB5F7E68B39A6AD8D4144EB0F28F6E05FA40E8BC8BC8FC3A89
6,386,111 UART: [art] PUB.Y = 0C6B2C896E64A5EC99AF7F4029E9722032A8002359261870C5B951FF5243B3C26784E66E06451C28AEF71561F046C987
6,393,023 UART: [art] SIG.R = 7E7FDD60575BB3EC23665CEB626840757D06EEA99C86AFEE024FAE3A415EA45CE7F9D135CA87CB3BB0CFBD4058F5F4F2
6,399,811 UART: [art] SIG.S = 081F0614795E8CCA2F12AA9A56E74F0A7BB492B52C6CECBDB6BA26F5037B367EDA6CFED5966D1FF28B58FADCA5726178
6,423,145 UART: Caliptra RT
6,423,396 UART: [state] CFI Enabled
6,788,421 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,819,050 UART: [rt]cmd =0x41545348, len=116
6,820,905 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
893,443 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,568 UART: [kat] ++
897,720 UART: [kat] sha1
901,760 UART: [kat] SHA2-256
903,700 UART: [kat] SHA2-384
906,357 UART: [kat] SHA2-512-ACC
908,258 UART: [kat] ECC-384
918,333 UART: [kat] HMAC-384Kdf
923,083 UART: [kat] LMS
1,171,411 UART: [kat] --
1,172,378 UART: [cold-reset] ++
1,172,824 UART: [fht] FHT @ 0x50003400
1,175,373 UART: [idev] ++
1,175,541 UART: [idev] CDI.KEYID = 6
1,175,901 UART: [idev] SUBJECT.KEYID = 7
1,176,325 UART: [idev] UDS.KEYID = 0
1,176,670 ready_for_fw is high
1,176,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,225 UART: [idev] Erasing UDS.KEYID = 0
1,201,588 UART: [idev] Sha1 KeyId Algorithm
1,210,094 UART: [idev] --
1,211,122 UART: [ldev] ++
1,211,290 UART: [ldev] CDI.KEYID = 6
1,211,653 UART: [ldev] SUBJECT.KEYID = 5
1,212,079 UART: [ldev] AUTHORITY.KEYID = 7
1,212,542 UART: [ldev] FE.KEYID = 1
1,217,838 UART: [ldev] Erasing FE.KEYID = 1
1,244,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,646 UART: [ldev] --
1,283,967 UART: [fwproc] Wait for Commands...
1,284,673 UART: [fwproc] Recv command 0x46574c44
1,285,401 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,233 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,403 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,622 >>> mbox cmd response: success
2,828,656 UART: [afmc] ++
2,828,824 UART: [afmc] CDI.KEYID = 6
2,829,186 UART: [afmc] SUBJECT.KEYID = 7
2,829,611 UART: [afmc] AUTHORITY.KEYID = 5
2,864,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,325 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,034 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,917 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,618 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,400 UART: [afmc] --
2,908,378 UART: [cold-reset] --
2,909,464 UART: [state] Locking Datavault
2,910,865 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,469 UART: [state] Locking ICCM
2,912,119 UART: [exit] Launching FMC @ 0x40000130
2,917,449 UART:
2,917,465 UART: Running Caliptra FMC ...
2,917,873 UART:
2,918,016 UART: [state] CFI Enabled
2,928,368 UART: [fht] FMC Alias Private Key: 7
3,047,100 UART: [art] Extend RT PCRs Done
3,047,528 UART: [art] Lock RT PCRs Done
3,048,874 UART: [art] Populate DV Done
3,057,215 UART: [fht] FMC Alias Private Key: 7
3,058,251 UART: [art] Derive CDI
3,058,531 UART: [art] Store in slot 0x4
3,144,478 UART: [art] Derive Key Pair
3,144,838 UART: [art] Store priv key in slot 0x5
3,158,776 UART: [art] Derive Key Pair - Done
3,173,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,505 UART: [art] PUB.X = D488B863EBFE2124C93F73CA635EC0CB8CF465886BAC329F4A039838B1A8B179CB4A6C84D5EA97D6EA57497E4C56DEF3
3,196,288 UART: [art] PUB.Y = 842582E0FA8E4729A36BABDE27AB5BE4F4F4FA4AF008A1B42DFCDE992667A0E0DEA9F65553BFFD7C5E5EC8B2C3EDE920
3,203,265 UART: [art] SIG.R = F8A07B7B0B5793C131E6547D3224694EC4E0BB178014EB8573AEF549D86A5E4F131D7A6410304082FB4A85A276167B57
3,210,028 UART: [art] SIG.S = 7F382AF9847064D5F2DD2FBED45D0CFFC443EA81A0BCD1D2178ACB35B7F9878625AD27E6D40B8913CD80D178C175F9AD
3,233,222 UART: Caliptra RT
3,233,565 UART: [state] CFI Enabled
3,353,874 UART: [rt] RT listening for mailbox commands...
3,354,544 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,620 UART: [rt]cmd =0x41544d4e, len=14344
3,787,788 >>> mbox cmd response data (8 bytes)
3,787,789 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,982 UART: [rt]cmd =0x41545348, len=116
3,819,901 >>> mbox cmd response data (12 bytes)
3,819,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,611 UART:
3,820,627 UART: Running Caliptra ROM ...
3,821,035 UART:
3,821,177 UART: [state] CFI Enabled
3,824,061 UART: [state] LifecycleState = Unprovisioned
3,824,716 UART: [state] DebugLocked = No
3,825,202 UART: [state] WD Timer not started. Device not locked for debugging
3,826,556 UART: [kat] SHA2-256
4,632,206 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,636,331 UART: [kat] ++
4,636,483 UART: [kat] sha1
4,640,713 UART: [kat] SHA2-256
4,642,653 UART: [kat] SHA2-384
4,645,636 UART: [kat] SHA2-512-ACC
4,647,536 UART: [kat] ECC-384
4,657,339 UART: [kat] HMAC-384Kdf
4,661,927 UART: [kat] LMS
4,910,255 UART: [kat] --
4,911,057 UART: [update-reset] ++
6,270,517 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,271,632 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,426,847 >>> mbox cmd response: success
6,426,847 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,426,950 UART: [update-reset] Copying MAN_2 To MAN_1
6,434,964 UART: [update-reset Success] --
6,435,749 UART: [state] Locking Datavault
6,436,583 UART: [state] Locking PCR0, PCR1 and PCR31
6,437,187 UART: [state] Locking ICCM
6,437,609 UART: [exit] Launching FMC @ 0x40000130
6,442,939 UART:
6,442,955 UART: Running Caliptra FMC ...
6,443,363 UART:
6,443,506 UART: [state] CFI Enabled
6,532,361 UART: [art] Extend RT PCRs Done
6,532,789 UART: [art] Lock RT PCRs Done
6,534,140 UART: [art] Populate DV Done
6,542,155 UART: [fht] FMC Alias Private Key: 7
6,543,297 UART: [art] Derive CDI
6,543,577 UART: [art] Store in slot 0x4
6,629,622 UART: [art] Derive Key Pair
6,629,982 UART: [art] Store priv key in slot 0x5
6,643,756 UART: [art] Derive Key Pair - Done
6,658,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,674,514 UART: [art] Erasing AUTHORITY.KEYID = 7
6,675,279 UART: [art] PUB.X = 3989BCD172427B0C61DAA6D69CB29DC13681DE9449CD48B19FBABFADFCFEA79E9D32826D7FFA91EBBCB9F2362E87CD4D
6,682,076 UART: [art] PUB.Y = 573CDBF7570F23F9C3B5E093F718AF5FE7C769AD54CC40A5B99BB50E59CDC2EECC5169DD3EEA3B4825EDA2B1FF24839A
6,689,046 UART: [art] SIG.R = 8F1D8DFA5F409FE0DFD29C1EBD5ABF4C8B1A0AF8ABCDC4695B735AC2719C474DC8A0A41F5B639E20A2AE31A9DFA186C5
6,695,845 UART: [art] SIG.S = 0B63BE01CA7C421224386269D06177729F1BF1BCB401DBB79D34CE8B35DA0CBDA0C857CF55CC026974D3A7625D2B7564
6,719,914 UART: Caliptra RT
6,720,257 UART: [state] CFI Enabled
7,086,697 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,117,818 UART: [rt]cmd =0x41545348, len=116
7,119,725 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,874 ready_for_fw is high
1,060,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,027 >>> mbox cmd response: success
2,742,926 UART:
2,742,942 UART: Running Caliptra FMC ...
2,743,350 UART:
2,743,493 UART: [state] CFI Enabled
2,754,057 UART: [fht] FMC Alias Private Key: 7
2,873,931 UART: [art] Extend RT PCRs Done
2,874,359 UART: [art] Lock RT PCRs Done
2,875,989 UART: [art] Populate DV Done
2,884,408 UART: [fht] FMC Alias Private Key: 7
2,885,434 UART: [art] Derive CDI
2,885,714 UART: [art] Store in slot 0x4
2,971,473 UART: [art] Derive Key Pair
2,971,833 UART: [art] Store priv key in slot 0x5
2,985,033 UART: [art] Derive Key Pair - Done
2,999,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,330 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,095 UART: [art] PUB.X = 67792D93F49690379DAC457CD04C0AC1BDA98288FBF6B618E9A54694A1914FCA7280526F15792D30043A2499A72829DB
3,022,855 UART: [art] PUB.Y = 2DC1132B7AFA1B3D279F22493024C29ACF394B9651CAB23F518B7DDD081E8E8647CC627404139BA74F19E83926249C41
3,029,799 UART: [art] SIG.R = F991D7F6F1BE9785A93C6BEE6D28265E9722553A78EDBB007449452C260ED42BBA508E88B0A50BAEC711B8EA685796E7
3,036,549 UART: [art] SIG.S = 51D87601EAB814908ACBE35BE19EA8A2E354A58005E2317E4561FB3E475D94DE0BC2A3B9F97A920E7C87D2EC3FDBB692
3,060,545 UART: Caliptra RT
3,060,888 UART: [state] CFI Enabled
3,181,887 UART: [rt] RT listening for mailbox commands...
3,182,557 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,605 UART: [rt]cmd =0x41544d4e, len=14344
3,615,785 >>> mbox cmd response data (8 bytes)
3,615,786 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,645,867 UART: [rt]cmd =0x41545348, len=116
3,647,492 >>> mbox cmd response data (12 bytes)
3,647,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,138,087 >>> mbox cmd response: success
6,138,087 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,151,334 UART:
6,151,350 UART: Running Caliptra FMC ...
6,151,758 UART:
6,151,901 UART: [state] CFI Enabled
6,241,616 UART: [art] Extend RT PCRs Done
6,242,044 UART: [art] Lock RT PCRs Done
6,243,481 UART: [art] Populate DV Done
6,251,690 UART: [fht] FMC Alias Private Key: 7
6,252,624 UART: [art] Derive CDI
6,252,904 UART: [art] Store in slot 0x4
6,339,119 UART: [art] Derive Key Pair
6,339,479 UART: [art] Store priv key in slot 0x5
6,353,259 UART: [art] Derive Key Pair - Done
6,368,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,383,390 UART: [art] Erasing AUTHORITY.KEYID = 7
6,384,155 UART: [art] PUB.X = C290ED8CE383500354977B8440219F05595DA9494266DF26F4F1413A7136DEA1E86E52DFFD899578F9235321F7D97D94
6,390,911 UART: [art] PUB.Y = 96800147472301BA7F202656BB0D8F30CBD0EF527DC1A983A5FD8CFA0CFC9F40A6AF410A1BB1199B08927DFE67AD73D8
6,397,857 UART: [art] SIG.R = 2C41D3652415355685E376478776CA14D8D2884B0912F0DC2E4151947914385EC6BADED7C80314363152785CB011D611
6,404,605 UART: [art] SIG.S = 2715E5546286B265BD954724B230A1EBBE8ABEA5F978672288AF106EDAB226412BCC964A5002BFE18AEEF78C8C3ED677
6,428,506 UART: Caliptra RT
6,428,849 UART: [state] CFI Enabled
6,796,860 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,827,599 UART: [rt]cmd =0x41545348, len=116
6,829,310 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,122 UART:
192,484 UART: Running Caliptra ROM ...
193,934 UART:
194,096 UART: [state] CFI Enabled
267,380 UART: [state] LifecycleState = Unprovisioned
269,306 UART: [state] DebugLocked = No
271,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,314 UART: [kat] SHA2-256
446,022 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,556 UART: [kat] ++
457,094 UART: [kat] sha1
468,691 UART: [kat] SHA2-256
471,436 UART: [kat] SHA2-384
477,280 UART: [kat] SHA2-512-ACC
479,646 UART: [kat] ECC-384
2,767,413 UART: [kat] HMAC-384Kdf
2,800,246 UART: [kat] LMS
3,990,566 UART: [kat] --
3,994,730 UART: [cold-reset] ++
3,995,805 UART: [fht] Storing FHT @ 0x50003400
4,005,820 UART: [idev] ++
4,006,461 UART: [idev] CDI.KEYID = 6
4,007,349 UART: [idev] SUBJECT.KEYID = 7
4,008,596 UART: [idev] UDS.KEYID = 0
4,009,531 ready_for_fw is high
4,009,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,158,768 UART: [idev] Erasing UDS.KEYID = 0
7,339,465 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,458 UART: [idev] --
7,364,185 UART: [ldev] ++
7,364,756 UART: [ldev] CDI.KEYID = 6
7,365,697 UART: [ldev] SUBJECT.KEYID = 5
7,366,963 UART: [ldev] AUTHORITY.KEYID = 7
7,368,115 UART: [ldev] FE.KEYID = 1
7,415,143 UART: [ldev] Erasing FE.KEYID = 1
10,744,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,040,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,069,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,084,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,103,844 UART: [ldev] --
13,108,195 UART: [fwproc] Waiting for Commands...
13,110,288 UART: [fwproc] Received command 0x46574c44
13,112,479 UART: [fwproc] Received Image of size 118548 bytes
17,217,346 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,304 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,470 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,697,350 >>> mbox cmd response: success
17,701,144 UART: [afmc] ++
17,701,818 UART: [afmc] CDI.KEYID = 6
17,702,708 UART: [afmc] SUBJECT.KEYID = 7
17,703,926 UART: [afmc] AUTHORITY.KEYID = 5
21,063,411 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,360,269 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,362,522 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,376,969 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,391,700 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,406,088 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,427,799 UART: [afmc] --
23,430,853 UART: [cold-reset] --
23,434,840 UART: [state] Locking Datavault
23,440,520 UART: [state] Locking PCR0, PCR1 and PCR31
23,442,221 UART: [state] Locking ICCM
23,444,779 UART: [exit] Launching FMC @ 0x40000130
23,453,180 UART:
23,453,420 UART: Running Caliptra FMC ...
23,454,452 UART:
23,454,600 UART: [state] CFI Enabled
23,520,485 UART: [fht] FMC Alias Private Key: 7
25,860,688 UART: [art] Extend RT PCRs Done
25,861,907 UART: [art] Lock RT PCRs Done
25,863,614 UART: [art] Populate DV Done
25,868,672 UART: [fht] FMC Alias Private Key: 7
25,870,268 UART: [art] Derive CDI
25,871,014 UART: [art] Store in slot 0x4
25,928,757 UART: [art] Derive Key Pair
25,929,776 UART: [art] Store priv key in slot 0x5
29,222,986 UART: [art] Derive Key Pair - Done
29,236,155 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,523,800 UART: [art] Erasing AUTHORITY.KEYID = 7
31,525,328 UART: [art] PUB.X = 0C52ECFF1D313E2D970E0E513D1611D723C9C1DA289E351B49DD65310CDC74821DD86D3A8E9431DEBDF68D8E235E8DAD
31,532,611 UART: [art] PUB.Y = 8AE0E644D85AA07D54E2348F07237829087E62E7ECC6A3021C68A96FE3E7ABB28B7C62F2A46A1CE1DEE50687800596F0
31,539,860 UART: [art] SIG.R = 08F361D49E7368E180AD79ED41919E333A79B55BDC646E6F2C8AB41C5904E5B76087F7B9B12FBDEA5C11F959354958D0
31,547,261 UART: [art] SIG.S = 9296ED4015D7B4B67214C4A9A776DF52870B25D152E8F7E36E570836AE5C2E303B712F21BD0E9F0AF990AB770C0442C6
32,852,510 UART: Caliptra RT
32,853,233 UART: [state] CFI Enabled
33,049,166 UART: [rt] RT listening for mailbox commands...
33,051,594 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,207,089 UART: [rt]cmd =0x41544d4e, len=14344
38,508,234 >>> mbox cmd response data (8 bytes)
38,508,892 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,539,675 UART: [rt]cmd =0x41545348, len=116
38,559,344 >>> mbox cmd response data (12 bytes)
38,560,222 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,591,196 UART: [rt]cmd =0x41545348, len=116
38,593,541 >>> mbox cmd response data (12 bytes)
40,671,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,822,772 UART:
40,823,145 UART: Running Caliptra ROM ...
40,824,530 UART:
40,824,714 UART: [state] CFI Enabled
40,888,676 UART: [state] LifecycleState = Unprovisioned
40,890,629 UART: [state] DebugLocked = No
40,892,788 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,897,473 UART: [kat] SHA2-256
41,067,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,077,690 UART: [kat] ++
41,078,185 UART: [kat] sha1
41,088,752 UART: [kat] SHA2-256
41,091,454 UART: [kat] SHA2-384
41,096,362 UART: [kat] SHA2-512-ACC
41,098,714 UART: [kat] ECC-384
43,391,150 UART: [kat] HMAC-384Kdf
43,422,534 UART: [kat] LMS
44,612,892 UART: [kat] --
44,616,188 UART: [update-reset] ++
48,809,760 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,813,853 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,211,648 >>> mbox cmd response: success
49,216,664 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,217,271 UART: [update-reset] Copying MAN_2 To MAN_1
49,234,934 UART: [update-reset Success] --
49,239,539 UART: [state] Locking Datavault
49,243,716 UART: [state] Locking PCR0, PCR1 and PCR31
49,245,477 UART: [state] Locking ICCM
49,248,149 UART: [exit] Launching FMC @ 0x40000130
49,256,594 UART:
49,256,823 UART: Running Caliptra FMC ...
49,257,848 UART:
49,257,994 UART: [state] CFI Enabled
49,362,970 UART: [art] Extend RT PCRs Done
49,364,179 UART: [art] Lock RT PCRs Done
49,365,571 UART: [art] Populate DV Done
49,370,909 UART: [fht] FMC Alias Private Key: 7
49,372,615 UART: [art] Derive CDI
49,373,349 UART: [art] Store in slot 0x4
49,431,698 UART: [art] Derive Key Pair
49,432,743 UART: [art] Store priv key in slot 0x5
52,725,277 UART: [art] Derive Key Pair - Done
52,738,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,026,266 UART: [art] Erasing AUTHORITY.KEYID = 7
55,027,802 UART: [art] PUB.X = 54AD8EFFA2AE952AFAAF4A5B33880D7E53B9F141B367A973299B2DD41BDBA47F228312DA59FC7E128FEBD2BB12D9A007
55,035,080 UART: [art] PUB.Y = DCB0EED59692410A75C20B2573D516288DEC8F738021127D6C174D4E79CA70DDEA190F8025D6147DAF24B78880BFA12D
55,042,285 UART: [art] SIG.R = 7B1A9CA347099B2F1D746D787801603FE9310FF5628BCA219C4BB5D4446011B51C4864414D0F80915AD2B13D050F4EE7
55,049,699 UART: [art] SIG.S = 1313D6FF3EA45E8A8C0F6C67B4642C4AA54E787244A1E2F6628948DE09A59C9F21C0845AAAD0F472302A7EAEB0D63C4B
56,353,968 UART: Caliptra RT
56,354,672 UART: [state] CFI Enabled
56,768,151 UART: [rt] RT listening for mailbox commands...
56,800,274 UART: [rt]cmd =0x41545348, len=116
56,819,912 >>> mbox cmd response data (12 bytes)
56,820,848 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,851,458 UART: [rt]cmd =0x41545348, len=116
56,853,497 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
60,919,562 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,074,992 UART: [rt]cmd =0x41544d4e, len=14344
66,375,456 >>> mbox cmd response data (8 bytes)
66,376,027 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,406,745 UART: [rt]cmd =0x41545348, len=116
66,426,597 >>> mbox cmd response data (12 bytes)
66,427,076 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,457,903 UART: [rt]cmd =0x41545348, len=116
66,460,010 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,787,858 ready_for_fw is high
3,788,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,960,373 >>> mbox cmd response: success
23,656,284 UART:
23,656,715 UART: Running Caliptra FMC ...
23,657,862 UART:
23,658,028 UART: [state] CFI Enabled
23,727,623 UART: [fht] FMC Alias Private Key: 7
26,068,707 UART: [art] Extend RT PCRs Done
26,069,934 UART: [art] Lock RT PCRs Done
26,071,507 UART: [art] Populate DV Done
26,077,028 UART: [fht] FMC Alias Private Key: 7
26,078,736 UART: [art] Derive CDI
26,079,554 UART: [art] Store in slot 0x4
26,136,514 UART: [art] Derive Key Pair
26,137,572 UART: [art] Store priv key in slot 0x5
29,430,259 UART: [art] Derive Key Pair - Done
29,443,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,017 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,527 UART: [art] PUB.X = 420927167EB5B2BD9D04FA9B726801B073464DC837834B440B025496A7BCC0FE771AF066B7CA89C73DAAC3A7AB8377B3
31,740,788 UART: [art] PUB.Y = 812F19DE4523902E421860D92AB85B09E4B962DE2503C54D9614CB7E4362853734CFD1D198386AA84F1A469B46533A13
31,748,063 UART: [art] SIG.R = DFD99523D2D4BF821C9906B23D3A49D53FE039E6FEE0E891BEEC9ED172FE78D835514337F79941D7D627225ED0C57112
31,755,423 UART: [art] SIG.S = C9B349899117C17E13587C3715D1ADC5E894C09D385DD53BC3B3A089ED88F1793E7F2C5C66415CDB3B9BA6227AB528E6
33,061,259 UART: Caliptra RT
33,061,972 UART: [state] CFI Enabled
33,236,647 UART: [rt] RT listening for mailbox commands...
33,239,033 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,394,695 UART: [rt]cmd =0x41544d4e, len=14344
38,695,844 >>> mbox cmd response data (8 bytes)
38,696,505 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,727,101 UART: [rt]cmd =0x41545348, len=116
38,747,087 >>> mbox cmd response data (12 bytes)
38,748,036 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,778,770 UART: [rt]cmd =0x41545348, len=116
38,781,011 >>> mbox cmd response data (12 bytes)
40,854,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,669,579 >>> mbox cmd response: success
49,670,267 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,706,053 UART:
49,706,350 UART: Running Caliptra FMC ...
49,707,470 UART:
49,707,627 UART: [state] CFI Enabled
49,805,533 UART: [art] Extend RT PCRs Done
49,806,736 UART: [art] Lock RT PCRs Done
49,808,248 UART: [art] Populate DV Done
49,813,550 UART: [fht] FMC Alias Private Key: 7
49,815,249 UART: [art] Derive CDI
49,816,061 UART: [art] Store in slot 0x4
49,874,542 UART: [art] Derive Key Pair
49,875,583 UART: [art] Store priv key in slot 0x5
53,168,347 UART: [art] Derive Key Pair - Done
53,181,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,470,206 UART: [art] Erasing AUTHORITY.KEYID = 7
55,471,728 UART: [art] PUB.X = A93B66836A03A49E2CD0C724B1449693B334D7C52A77D223157918FD58B5CAD3151B252C8288197EBF0983A891139F73
55,478,998 UART: [art] PUB.Y = BAB0ECA01DB046A0EA0E2A92A39D8DDAA2E5D3F99CFAA4701C0C4714DAB388628AABD95049E94DDC9284216557B5E6E8
55,486,240 UART: [art] SIG.R = 590D057A018A7449D8F7E30A852480E1BEF09AFE951AD65A13E349482D6D75D027F6A630BFA148D66BA865835966D7A5
55,493,636 UART: [art] SIG.S = 73405FCCC3E40C0E96F1BB1FBF48DA1F67BA70D40224EB1F9104163D62A500231F55F0B344B40C076CB47F643247FDC8
56,798,374 UART: Caliptra RT
56,799,097 UART: [state] CFI Enabled
57,215,687 UART: [rt] RT listening for mailbox commands...
57,247,458 UART: [rt]cmd =0x41545348, len=116
57,268,307 >>> mbox cmd response data (12 bytes)
57,269,006 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
57,299,588 UART: [rt]cmd =0x41545348, len=116
57,301,573 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
61,363,471 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,519,119 UART: [rt]cmd =0x41544d4e, len=14344
66,819,747 >>> mbox cmd response data (8 bytes)
66,820,275 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,851,079 UART: [rt]cmd =0x41545348, len=116
66,870,602 >>> mbox cmd response data (12 bytes)
66,871,041 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,901,885 UART: [rt]cmd =0x41545348, len=116
66,904,019 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.66s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,454 UART:
192,825 UART: Running Caliptra ROM ...
194,337 UART:
603,524 UART: [state] CFI Enabled
617,353 UART: [state] LifecycleState = Unprovisioned
619,304 UART: [state] DebugLocked = No
620,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,607 UART: [kat] SHA2-256
794,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,848 UART: [kat] ++
805,446 UART: [kat] sha1
814,704 UART: [kat] SHA2-256
817,420 UART: [kat] SHA2-384
823,617 UART: [kat] SHA2-512-ACC
825,973 UART: [kat] ECC-384
3,109,189 UART: [kat] HMAC-384Kdf
3,120,973 UART: [kat] LMS
4,311,096 UART: [kat] --
4,313,178 UART: [cold-reset] ++
4,315,028 UART: [fht] Storing FHT @ 0x50003400
4,325,865 UART: [idev] ++
4,326,422 UART: [idev] CDI.KEYID = 6
4,327,441 UART: [idev] SUBJECT.KEYID = 7
4,328,613 UART: [idev] UDS.KEYID = 0
4,329,570 ready_for_fw is high
4,329,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,478,717 UART: [idev] Erasing UDS.KEYID = 0
7,618,177 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,193 UART: [idev] --
7,643,245 UART: [ldev] ++
7,643,875 UART: [ldev] CDI.KEYID = 6
7,644,780 UART: [ldev] SUBJECT.KEYID = 5
7,646,038 UART: [ldev] AUTHORITY.KEYID = 7
7,647,267 UART: [ldev] FE.KEYID = 1
7,658,387 UART: [ldev] Erasing FE.KEYID = 1
10,947,964 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,359 UART: [ldev] --
13,310,237 UART: [fwproc] Waiting for Commands...
13,312,167 UART: [fwproc] Received command 0x46574c44
13,314,410 UART: [fwproc] Received Image of size 118548 bytes
17,419,754 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,496,029 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,569,196 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,400 >>> mbox cmd response: success
17,902,480 UART: [afmc] ++
17,903,104 UART: [afmc] CDI.KEYID = 6
17,904,017 UART: [afmc] SUBJECT.KEYID = 7
17,905,285 UART: [afmc] AUTHORITY.KEYID = 5
21,217,857 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,512,187 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,514,446 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,528,880 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,543,581 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,558,040 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,651 UART: [afmc] --
23,584,123 UART: [cold-reset] --
23,587,823 UART: [state] Locking Datavault
23,595,065 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,758 UART: [state] Locking ICCM
23,597,849 UART: [exit] Launching FMC @ 0x40000130
23,606,234 UART:
23,606,464 UART: Running Caliptra FMC ...
23,607,504 UART:
23,607,649 UART: [state] CFI Enabled
23,615,855 UART: [fht] FMC Alias Private Key: 7
25,955,744 UART: [art] Extend RT PCRs Done
25,956,960 UART: [art] Lock RT PCRs Done
25,958,687 UART: [art] Populate DV Done
25,964,041 UART: [fht] FMC Alias Private Key: 7
25,965,631 UART: [art] Derive CDI
25,966,439 UART: [art] Store in slot 0x4
26,009,312 UART: [art] Derive Key Pair
26,010,316 UART: [art] Store priv key in slot 0x5
29,252,101 UART: [art] Derive Key Pair - Done
29,265,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,637 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,144 UART: [art] PUB.X = D5391288B893CF6245982F469DB12BE60D82845EF7E4E1FEE891233AE3F494A8F42C4AC3BC95451891392E677846AE19
31,554,415 UART: [art] PUB.Y = 38955F02B318A20AFB27A35D9A0DB1EFAE62BDFE134D41D569B05F9676E71D78D6BEB87E89381932AF808ED1490FB43F
31,561,614 UART: [art] SIG.R = 3680BFABA015DA38A9AE5FA1B04015FB26B64D9D6BC5873FCDD709D51A72574EE516B9528B6C96D7126C36B9468144D4
31,569,011 UART: [art] SIG.S = 0494260728D15D0A1BE6657B1169EAB044BCAD421C27C569FA8FE66F407431BACDCB8BB0B935126DF9D72A2004B4DD4E
32,874,267 UART: Caliptra RT
32,874,974 UART: [state] CFI Enabled
33,008,835 UART: [rt] RT listening for mailbox commands...
33,011,230 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,166,532 UART: [rt]cmd =0x41544d4e, len=14344
38,467,003 >>> mbox cmd response data (8 bytes)
38,467,590 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,498,271 UART: [rt]cmd =0x41545348, len=116
38,517,815 >>> mbox cmd response data (12 bytes)
38,518,875 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,549,694 UART: [rt]cmd =0x41545348, len=116
38,552,011 >>> mbox cmd response data (12 bytes)
40,626,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,776,731 UART:
40,777,110 UART: Running Caliptra ROM ...
40,778,242 UART:
40,778,418 UART: [state] CFI Enabled
40,796,135 UART: [state] LifecycleState = Unprovisioned
40,798,047 UART: [state] DebugLocked = No
40,799,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,804,051 UART: [kat] SHA2-256
40,973,739 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,984,300 UART: [kat] ++
40,984,836 UART: [kat] sha1
40,995,673 UART: [kat] SHA2-256
40,998,352 UART: [kat] SHA2-384
41,004,606 UART: [kat] SHA2-512-ACC
41,007,005 UART: [kat] ECC-384
43,290,936 UART: [kat] HMAC-384Kdf
43,302,045 UART: [kat] LMS
44,492,085 UART: [kat] --
44,496,859 UART: [update-reset] ++
48,683,791 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,687,835 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,085,603 >>> mbox cmd response: success
49,090,114 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,090,711 UART: [update-reset] Copying MAN_2 To MAN_1
49,109,381 UART: [update-reset Success] --
49,112,479 UART: [state] Locking Datavault
49,116,857 UART: [state] Locking PCR0, PCR1 and PCR31
49,118,604 UART: [state] Locking ICCM
49,121,021 UART: [exit] Launching FMC @ 0x40000130
49,129,468 UART:
49,129,706 UART: Running Caliptra FMC ...
49,130,802 UART:
49,130,958 UART: [state] CFI Enabled
49,175,565 UART: [art] Extend RT PCRs Done
49,176,756 UART: [art] Lock RT PCRs Done
49,178,103 UART: [art] Populate DV Done
49,183,796 UART: [fht] FMC Alias Private Key: 7
49,185,386 UART: [art] Derive CDI
49,186,195 UART: [art] Store in slot 0x4
49,228,948 UART: [art] Derive Key Pair
49,229,944 UART: [art] Store priv key in slot 0x5
52,472,029 UART: [art] Derive Key Pair - Done
52,485,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,765,307 UART: [art] Erasing AUTHORITY.KEYID = 7
54,766,824 UART: [art] PUB.X = 4C711C33184AFE2E197AC5C6C44078DE3B496F18F9D025DAB323FF268B109F17F5FBB1F49B618D7F54A4FD66A4F17800
54,774,090 UART: [art] PUB.Y = A5B298753AFFAA717FF6060084889EC19A77CBADC78C4AA45B227E69479F0B81797DB6157D9B94C673BFFBE1DC8BAEA8
54,781,384 UART: [art] SIG.R = 9C12B56C06619EF2A3C3D4B8C6FB55F82413E22170E53947D4F3B277DAAEF051554972366FE53DA91055D3B347A3F75A
54,788,779 UART: [art] SIG.S = CD63A995383AFE788F348AA6ABBD6ADC6C923EAE7F3304D6FD4AA549E1F68128244F4E8DEDD255335E3809D0D191F8B1
56,093,254 UART: Caliptra RT
56,093,977 UART: [state] CFI Enabled
56,468,790 UART: [rt] RT listening for mailbox commands...
56,500,474 UART: [rt]cmd =0x41545348, len=116
56,520,308 >>> mbox cmd response data (12 bytes)
56,521,233 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,551,863 UART: [rt]cmd =0x41545348, len=116
56,554,064 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
60,624,616 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,780,235 UART: [rt]cmd =0x41544d4e, len=14344
66,080,623 >>> mbox cmd response data (8 bytes)
66,081,158 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,111,887 UART: [rt]cmd =0x41545348, len=116
66,131,763 >>> mbox cmd response data (12 bytes)
66,132,219 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,163,058 UART: [rt]cmd =0x41545348, len=116
66,165,143 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,129,636 ready_for_fw is high
4,130,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,213 >>> mbox cmd response: success
23,804,375 UART:
23,804,779 UART: Running Caliptra FMC ...
23,805,883 UART:
23,806,036 UART: [state] CFI Enabled
23,813,973 UART: [fht] FMC Alias Private Key: 7
26,153,942 UART: [art] Extend RT PCRs Done
26,155,168 UART: [art] Lock RT PCRs Done
26,156,928 UART: [art] Populate DV Done
26,162,501 UART: [fht] FMC Alias Private Key: 7
26,164,145 UART: [art] Derive CDI
26,164,878 UART: [art] Store in slot 0x4
26,207,788 UART: [art] Derive Key Pair
26,208,780 UART: [art] Store priv key in slot 0x5
29,450,460 UART: [art] Derive Key Pair - Done
29,463,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,578 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,152 UART: [art] PUB.X = E8B1AE198B0FCC23C87CA4CA7C18A9A8A7C1C3218F917B51655105BDEBFAFDFC1512AB5B20752E80E1264BDCED405C4F
31,752,360 UART: [art] PUB.Y = 0F24D4BBFF0DBEF8C7C5BCB71396D99B116A767040C034CD1134E70F35F7D51F1C85B4D907A525BEB27CBC4492F53C75
31,759,616 UART: [art] SIG.R = 78D45AE8720103ED8A7793DAF903D7018B8405934D66B92F619BA2FB33F2511B1908C859A70AFCDE4FA70F124916B902
31,767,006 UART: [art] SIG.S = D8A25C1DE2675D071DCE7706EE05F15D62743F707DC1A412EE673125571A4C3367954B93BE794C84B7BF3C90A761D89A
33,072,769 UART: Caliptra RT
33,073,477 UART: [state] CFI Enabled
33,206,977 UART: [rt] RT listening for mailbox commands...
33,209,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,364,734 UART: [rt]cmd =0x41544d4e, len=14344
38,665,611 >>> mbox cmd response data (8 bytes)
38,666,187 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,696,859 UART: [rt]cmd =0x41545348, len=116
38,716,272 >>> mbox cmd response data (12 bytes)
38,717,184 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,748,228 UART: [rt]cmd =0x41545348, len=116
38,750,345 >>> mbox cmd response data (12 bytes)
40,823,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,576,284 >>> mbox cmd response: success
49,577,277 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,609,997 UART:
49,610,282 UART: Running Caliptra FMC ...
49,611,399 UART:
49,611,559 UART: [state] CFI Enabled
49,655,324 UART: [art] Extend RT PCRs Done
49,656,477 UART: [art] Lock RT PCRs Done
49,657,701 UART: [art] Populate DV Done
49,663,142 UART: [fht] FMC Alias Private Key: 7
49,664,687 UART: [art] Derive CDI
49,665,442 UART: [art] Store in slot 0x4
49,708,140 UART: [art] Derive Key Pair
49,709,135 UART: [art] Store priv key in slot 0x5
52,951,072 UART: [art] Derive Key Pair - Done
52,964,077 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,244,375 UART: [art] Erasing AUTHORITY.KEYID = 7
55,245,886 UART: [art] PUB.X = ECE615A2E48C9C10EDCC5FCADB4CCC5E70C8F23416B492B18496901CCEA2D8AFDC229ECC5EC7E03364BE31BD8119F3CB
55,253,182 UART: [art] PUB.Y = 71F6AD0B84F7E34CEB5246FFB6803DA685AFAAEA881E5263BAF72217B9E1CF4BB3B9D45C8A8A4225293E2F54A8B4C117
55,260,440 UART: [art] SIG.R = 93BA7E2EEC001D6639A2A6DC34FE9C5FD97045096EB1A732E02ACABFFA6838AB19DCEB2D0AFD14F0CF9D36437E95CB14
55,267,889 UART: [art] SIG.S = 6468D7C07F648B81D792DBA9AB3C0C7AC53A1159AEA55657F19ADB66F9BC87CAA9714CBA0730826AFCDC6407168F3B27
56,572,921 UART: Caliptra RT
56,573,634 UART: [state] CFI Enabled
56,941,028 UART: [rt] RT listening for mailbox commands...
56,972,989 UART: [rt]cmd =0x41545348, len=116
56,993,234 >>> mbox cmd response data (12 bytes)
56,993,945 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
57,024,701 UART: [rt]cmd =0x41545348, len=116
57,026,837 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
61,093,054 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,248,703 UART: [rt]cmd =0x41544d4e, len=14344
66,549,851 >>> mbox cmd response data (8 bytes)
66,550,414 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,581,199 UART: [rt]cmd =0x41545348, len=116
66,600,458 >>> mbox cmd response data (12 bytes)
66,600,873 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,631,758 UART: [rt]cmd =0x41545348, len=116
66,633,873 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.65s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,119 UART:
192,496 UART: Running Caliptra ROM ...
193,624 UART:
193,765 UART: [state] CFI Enabled
264,896 UART: [state] LifecycleState = Unprovisioned
266,768 UART: [state] DebugLocked = No
269,418 UART: [state] WD Timer not started. Device not locked for debugging
272,580 UART: [kat] SHA2-256
452,135 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,944 UART: [kat] ++
463,387 UART: [kat] sha1
475,390 UART: [kat] SHA2-256
478,106 UART: [kat] SHA2-384
483,735 UART: [kat] SHA2-512-ACC
486,106 UART: [kat] ECC-384
2,947,711 UART: [kat] HMAC-384Kdf
2,971,241 UART: [kat] LMS
3,447,757 UART: [kat] --
3,450,818 UART: [cold-reset] ++
3,452,815 UART: [fht] FHT @ 0x50003400
3,464,496 UART: [idev] ++
3,465,131 UART: [idev] CDI.KEYID = 6
3,466,012 UART: [idev] SUBJECT.KEYID = 7
3,467,255 UART: [idev] UDS.KEYID = 0
3,468,291 ready_for_fw is high
3,468,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,613 UART: [idev] Erasing UDS.KEYID = 0
5,985,750 UART: [idev] Sha1 KeyId Algorithm
6,009,379 UART: [idev] --
6,014,298 UART: [ldev] ++
6,014,928 UART: [ldev] CDI.KEYID = 6
6,015,836 UART: [ldev] SUBJECT.KEYID = 5
6,017,049 UART: [ldev] AUTHORITY.KEYID = 7
6,018,277 UART: [ldev] FE.KEYID = 1
6,055,257 UART: [ldev] Erasing FE.KEYID = 1
8,563,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,664 UART: [ldev] --
10,372,778 UART: [fwproc] Wait for Commands...
10,375,574 UART: [fwproc] Recv command 0x46574c44
10,377,554 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,763 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,773 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,338,962 >>> mbox cmd response: success
14,342,552 UART: [afmc] ++
14,343,141 UART: [afmc] CDI.KEYID = 6
14,344,076 UART: [afmc] SUBJECT.KEYID = 7
14,345,289 UART: [afmc] AUTHORITY.KEYID = 5
16,872,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,638 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,613,423 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,629,487 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,645,039 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,669,539 UART: [afmc] --
18,674,012 UART: [cold-reset] --
18,678,347 UART: [state] Locking Datavault
18,682,895 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,644 UART: [state] Locking ICCM
18,686,140 UART: [exit] Launching FMC @ 0x40000130
18,694,593 UART:
18,694,828 UART: Running Caliptra FMC ...
18,695,876 UART:
18,696,025 UART: [state] CFI Enabled
18,753,594 UART: [fht] FMC Alias Private Key: 7
20,519,683 UART: [art] Extend RT PCRs Done
20,520,901 UART: [art] Lock RT PCRs Done
20,522,518 UART: [art] Populate DV Done
20,527,891 UART: [fht] FMC Alias Private Key: 7
20,529,536 UART: [art] Derive CDI
20,530,347 UART: [art] Store in slot 0x4
20,587,432 UART: [art] Derive Key Pair
20,588,430 UART: [art] Store priv key in slot 0x5
23,051,629 UART: [art] Derive Key Pair - Done
23,064,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,674 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,177 UART: [art] PUB.X = D431A4443820D61A4C4F4E5FD0B4F8BCFF3842426CB65E5CAD8ED6B2729DA8ADFACE6649D67524D0D8EE8E9A9C71B064
24,785,484 UART: [art] PUB.Y = C27A0C4EF76CB031B661C26524AFC1E8058B8CA8814B1996FAB3FA87DA25C876CE97A1AC10B422A5AC4EB5B39E45EA48
24,792,776 UART: [art] SIG.R = 01C5C5E5DCA46B6B9B393FDF5425C699E92D27E012FCFFC4EC0F1D8B50EBB70B1C52741139DDA15FA59222C2662CB1F2
24,800,164 UART: [art] SIG.S = A59E8E19B6BFDE8B4198F038F912D76173B52F625BFD3C60D176D388CD24D758D527CEA82D7B6B5CC455A26C3BFC5493
25,779,631 UART: Caliptra RT
25,780,332 UART: [state] CFI Enabled
25,960,098 UART: [rt] RT listening for mailbox commands...
25,962,496 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,118,156 UART: [rt]cmd =0x41544d4e, len=14344
30,113,655 >>> mbox cmd response data (8 bytes)
30,114,240 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,144,860 UART: [rt]cmd =0x41545348, len=116
30,164,994 >>> mbox cmd response data (12 bytes)
30,165,988 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,196,880 UART: [rt]cmd =0x41545348, len=116
30,198,794 >>> mbox cmd response data (12 bytes)
32,260,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,410,714 UART:
32,411,077 UART: Running Caliptra ROM ...
32,412,210 UART:
32,412,402 UART: [state] CFI Enabled
32,470,323 UART: [state] LifecycleState = Unprovisioned
32,472,259 UART: [state] DebugLocked = No
32,474,073 UART: [state] WD Timer not started. Device not locked for debugging
32,478,624 UART: [kat] SHA2-256
32,658,293 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,669,065 UART: [kat] ++
32,669,606 UART: [kat] sha1
32,681,119 UART: [kat] SHA2-256
32,683,845 UART: [kat] SHA2-384
32,689,191 UART: [kat] SHA2-512-ACC
32,691,591 UART: [kat] ECC-384
35,140,762 UART: [kat] HMAC-384Kdf
35,159,376 UART: [kat] LMS
35,635,812 UART: [kat] --
35,640,456 UART: [update-reset] ++
39,134,345 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,138,254 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,535,878 >>> mbox cmd response: success
39,536,304 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,537,007 UART: [update-reset] Copying MAN_2 To MAN_1
39,574,143 UART: [update-reset Success] --
39,578,626 UART: [state] Locking Datavault
39,582,370 UART: [state] Locking PCR0, PCR1 and PCR31
39,584,064 UART: [state] Locking ICCM
39,586,764 UART: [exit] Launching FMC @ 0x40000130
39,595,158 UART:
39,595,393 UART: Running Caliptra FMC ...
39,596,502 UART:
39,596,659 UART: [state] CFI Enabled
39,692,466 UART: [art] Extend RT PCRs Done
39,693,653 UART: [art] Lock RT PCRs Done
39,695,392 UART: [art] Populate DV Done
39,700,634 UART: [fht] FMC Alias Private Key: 7
39,702,338 UART: [art] Derive CDI
39,703,147 UART: [art] Store in slot 0x4
39,761,838 UART: [art] Derive Key Pair
39,762,924 UART: [art] Store priv key in slot 0x5
42,225,935 UART: [art] Derive Key Pair - Done
42,238,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,951,725 UART: [art] Erasing AUTHORITY.KEYID = 7
43,953,229 UART: [art] PUB.X = 9D150E92EF9A9469EC8B74FC125AA12AEE667B0BBA21031F487E9163ECE5C54819D840CBAA02D6117AD9F2317514F7E1
43,960,493 UART: [art] PUB.Y = 83AB3F93489618380A3663CD88ECEE3133C048743437DDBD5631AFBDE69F5FC0341F0B5ABB9041BE09A43E1EEF8E8B83
43,967,779 UART: [art] SIG.R = EDB83ED8589E4569D9D2A24BE10841EC006EAD8658BB7E28BB0A11017E7D75272A058AE8B9ACAD8EEC6A79B75245B2CC
43,975,164 UART: [art] SIG.S = 0B1AFB57AE604398F585830F04F218E79BC45F37B5893609537BBC59624BEB86A3E6C7D11F80C0A0F011EE1A6A46D429
44,954,301 UART: Caliptra RT
44,954,986 UART: [state] CFI Enabled
45,372,401 UART: [rt] RT listening for mailbox commands...
45,404,119 UART: [rt]cmd =0x41545348, len=116
45,424,324 >>> mbox cmd response data (12 bytes)
45,425,387 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,456,226 UART: [rt]cmd =0x41545348, len=116
45,458,418 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
49,488,472 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,644,047 UART: [rt]cmd =0x41544d4e, len=14344
53,639,917 >>> mbox cmd response data (8 bytes)
53,640,494 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,671,175 UART: [rt]cmd =0x41545348, len=116
53,690,604 >>> mbox cmd response data (12 bytes)
53,691,030 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,721,869 UART: [rt]cmd =0x41545348, len=116
53,723,984 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.01s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
3,462,149 ready_for_fw is high
3,462,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,216,403 >>> mbox cmd response: success
18,510,304 UART:
18,510,720 UART: Running Caliptra FMC ...
18,511,852 UART:
18,512,013 UART: [state] CFI Enabled
18,581,365 UART: [fht] FMC Alias Private Key: 7
20,347,838 UART: [art] Extend RT PCRs Done
20,349,052 UART: [art] Lock RT PCRs Done
20,350,408 UART: [art] Populate DV Done
20,355,922 UART: [fht] FMC Alias Private Key: 7
20,357,521 UART: [art] Derive CDI
20,358,329 UART: [art] Store in slot 0x4
20,413,536 UART: [art] Derive Key Pair
20,414,570 UART: [art] Store priv key in slot 0x5
22,877,573 UART: [art] Derive Key Pair - Done
22,890,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,174 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,677 UART: [art] PUB.X = 2FE82459E70BF2D724D4F6D9D090C5DA2D4BF3C9C1B604519D7C7EC7ED549C13744A43E8E647D8C30BFBCDCC15800022
24,610,934 UART: [art] PUB.Y = C637F2BC8FF56A063C4FBA4BD136672836E65EF9EF2A3258376FFB6A0B050B3EB36021230B842FBBC9D4F59F649A7C3B
24,618,229 UART: [art] SIG.R = EA737EF245C6A756B1638D7E0F2EDC094B84FDD5096D30F0F2E1EFBD7DF97F8FA9A7F80CD2AC5F5F9B25766D9DF8DEC4
24,625,620 UART: [art] SIG.S = DF942E79205FA627A6D4DE958298EB9A2C13627BFED86BF8F3569A1B4F1A7AFFED9AEC5E9DC0F2AA61797E20817B00C6
25,604,316 UART: Caliptra RT
25,605,046 UART: [state] CFI Enabled
25,783,450 UART: [rt] RT listening for mailbox commands...
25,785,871 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,941,226 UART: [rt]cmd =0x41544d4e, len=14344
29,936,101 >>> mbox cmd response data (8 bytes)
29,936,679 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,967,402 UART: [rt]cmd =0x41545348, len=116
29,987,631 >>> mbox cmd response data (12 bytes)
29,988,856 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,019,560 UART: [rt]cmd =0x41545348, len=116
30,021,480 >>> mbox cmd response data (12 bytes)
32,087,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,395,331 >>> mbox cmd response: success
39,395,933 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,430,944 UART:
39,431,239 UART: Running Caliptra FMC ...
39,432,356 UART:
39,432,511 UART: [state] CFI Enabled
39,537,566 UART: [art] Extend RT PCRs Done
39,538,769 UART: [art] Lock RT PCRs Done
39,540,496 UART: [art] Populate DV Done
39,545,738 UART: [fht] FMC Alias Private Key: 7
39,547,376 UART: [art] Derive CDI
39,548,183 UART: [art] Store in slot 0x4
39,607,248 UART: [art] Derive Key Pair
39,608,307 UART: [art] Store priv key in slot 0x5
42,071,011 UART: [art] Derive Key Pair - Done
42,083,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,796,274 UART: [art] Erasing AUTHORITY.KEYID = 7
43,797,779 UART: [art] PUB.X = 0FD23CDE039073D4A653D28669AFFC54F64FD6B6C8B985079A75ED28CC50F82A564CF88694B85EA797DB00E4221EB8D8
43,805,032 UART: [art] PUB.Y = 77B4A54D6508EADB664DC0E8C6CEBCFF7E953F045FEA89C8E6FEC4788837D31F0CD51E7B7807684D04855BF50AC169A1
43,812,319 UART: [art] SIG.R = 0993044597923D4F31030CC7CE0BE056ED1DFC540579A190E3A95160B4260F269D3239703E3320CC308D87041B3B4BC1
43,819,655 UART: [art] SIG.S = 8B562B55027E0203DFE2E2AC268EA86ACDD40E4086962A6D7A15273B516E2BC0E5C07F2E9D6F62B352396B54E815D165
44,798,388 UART: Caliptra RT
44,799,097 UART: [state] CFI Enabled
45,217,420 UART: [rt] RT listening for mailbox commands...
45,249,167 UART: [rt]cmd =0x41545348, len=116
45,269,231 >>> mbox cmd response data (12 bytes)
45,269,917 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,300,725 UART: [rt]cmd =0x41545348, len=116
45,302,851 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
49,331,847 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,487,456 UART: [rt]cmd =0x41544d4e, len=14344
53,483,138 >>> mbox cmd response data (8 bytes)
53,483,710 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,514,458 UART: [rt]cmd =0x41545348, len=116
53,534,416 >>> mbox cmd response data (12 bytes)
53,534,851 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,565,505 UART: [rt]cmd =0x41545348, len=116
53,567,851 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.00s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
192,475 UART:
192,835 UART: Running Caliptra ROM ...
193,952 UART:
603,586 UART: [state] CFI Enabled
616,701 UART: [state] LifecycleState = Unprovisioned
618,682 UART: [state] DebugLocked = No
621,073 UART: [state] WD Timer not started. Device not locked for debugging
624,568 UART: [kat] SHA2-256
804,258 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,994 UART: [kat] ++
815,601 UART: [kat] sha1
827,690 UART: [kat] SHA2-256
830,410 UART: [kat] SHA2-384
836,398 UART: [kat] SHA2-512-ACC
838,767 UART: [kat] ECC-384
3,282,155 UART: [kat] HMAC-384Kdf
3,294,742 UART: [kat] LMS
3,771,259 UART: [kat] --
3,775,734 UART: [cold-reset] ++
3,777,453 UART: [fht] FHT @ 0x50003400
3,788,384 UART: [idev] ++
3,788,964 UART: [idev] CDI.KEYID = 6
3,790,002 UART: [idev] SUBJECT.KEYID = 7
3,791,208 UART: [idev] UDS.KEYID = 0
3,792,140 ready_for_fw is high
3,792,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,283 UART: [idev] Erasing UDS.KEYID = 0
6,268,520 UART: [idev] Sha1 KeyId Algorithm
6,291,269 UART: [idev] --
6,296,834 UART: [ldev] ++
6,297,447 UART: [ldev] CDI.KEYID = 6
6,298,336 UART: [ldev] SUBJECT.KEYID = 5
6,299,549 UART: [ldev] AUTHORITY.KEYID = 7
6,300,789 UART: [ldev] FE.KEYID = 1
6,310,762 UART: [ldev] Erasing FE.KEYID = 1
8,790,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,188 UART: [ldev] --
10,584,612 UART: [fwproc] Wait for Commands...
10,586,549 UART: [fwproc] Recv command 0x46574c44
10,588,535 UART: [fwproc] Recv'd Img size: 118548 bytes
14,080,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,159,716 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,232,719 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,560,540 >>> mbox cmd response: success
14,565,395 UART: [afmc] ++
14,566,010 UART: [afmc] CDI.KEYID = 6
14,566,931 UART: [afmc] SUBJECT.KEYID = 7
14,568,160 UART: [afmc] AUTHORITY.KEYID = 5
17,072,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,799,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,801,224 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,817,071 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,833,100 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,848,685 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,873,205 UART: [afmc] --
18,876,547 UART: [cold-reset] --
18,879,820 UART: [state] Locking Datavault
18,884,962 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,659 UART: [state] Locking ICCM
18,887,762 UART: [exit] Launching FMC @ 0x40000130
18,896,210 UART:
18,896,447 UART: Running Caliptra FMC ...
18,897,554 UART:
18,897,714 UART: [state] CFI Enabled
18,905,657 UART: [fht] FMC Alias Private Key: 7
20,671,969 UART: [art] Extend RT PCRs Done
20,673,187 UART: [art] Lock RT PCRs Done
20,674,918 UART: [art] Populate DV Done
20,680,438 UART: [fht] FMC Alias Private Key: 7
20,682,029 UART: [art] Derive CDI
20,682,779 UART: [art] Store in slot 0x4
20,725,862 UART: [art] Derive Key Pair
20,726,902 UART: [art] Store priv key in slot 0x5
23,154,088 UART: [art] Derive Key Pair - Done
23,167,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,873,774 UART: [art] Erasing AUTHORITY.KEYID = 7
24,875,276 UART: [art] PUB.X = 5FD818365BBB251165976E98DE04703D2E21D45FCDEB3BCEA87753AD74C7C87945CB3613D458E18717A7B1664379269D
24,882,525 UART: [art] PUB.Y = 7B32125CBEB17C8195F82AE1DD7DBE96CD76B2992BC33ED2528A15F5E874314B2248DB10E2148B9314976A1EAEC0F29C
24,889,814 UART: [art] SIG.R = 7B082815673E38CBF94BF2014B394F1562C08E5EE154A30ADF5B930D3BDEF401BA571D85E3F374D66FA3D98A929E0E7B
24,897,204 UART: [art] SIG.S = B0DB4ACB4EA7B30678722F16ABF9744EA911E5C36F323F9E0651BD3360C031D76BA4DA155FE34D688D62A95152AEE869
25,876,470 UART: Caliptra RT
25,877,176 UART: [state] CFI Enabled
26,010,034 UART: [rt] RT listening for mailbox commands...
26,012,450 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,167,527 UART: [rt]cmd =0x41544d4e, len=14344
30,163,151 >>> mbox cmd response data (8 bytes)
30,163,744 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,194,416 UART: [rt]cmd =0x41545348, len=116
30,214,450 >>> mbox cmd response data (12 bytes)
30,215,440 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,246,044 UART: [rt]cmd =0x41545348, len=116
30,248,307 >>> mbox cmd response data (12 bytes)
32,306,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,457,641 UART:
32,458,023 UART: Running Caliptra ROM ...
32,459,101 UART:
32,459,256 UART: [state] CFI Enabled
32,477,049 UART: [state] LifecycleState = Unprovisioned
32,478,948 UART: [state] DebugLocked = No
32,480,681 UART: [state] WD Timer not started. Device not locked for debugging
32,485,393 UART: [kat] SHA2-256
32,665,082 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,675,881 UART: [kat] ++
32,676,339 UART: [kat] sha1
32,687,334 UART: [kat] SHA2-256
32,689,984 UART: [kat] SHA2-384
32,695,591 UART: [kat] SHA2-512-ACC
32,697,961 UART: [kat] ECC-384
35,140,879 UART: [kat] HMAC-384Kdf
35,153,321 UART: [kat] LMS
35,629,768 UART: [kat] --
35,633,454 UART: [update-reset] ++
39,131,178 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,135,051 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,532,627 >>> mbox cmd response: success
39,533,087 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,534,558 UART: [update-reset] Copying MAN_2 To MAN_1
39,571,682 UART: [update-reset Success] --
39,576,199 UART: [state] Locking Datavault
39,580,083 UART: [state] Locking PCR0, PCR1 and PCR31
39,581,795 UART: [state] Locking ICCM
39,583,327 UART: [exit] Launching FMC @ 0x40000130
39,591,719 UART:
39,591,952 UART: Running Caliptra FMC ...
39,592,973 UART:
39,593,124 UART: [state] CFI Enabled
39,637,351 UART: [art] Extend RT PCRs Done
39,638,515 UART: [art] Lock RT PCRs Done
39,639,722 UART: [art] Populate DV Done
39,645,345 UART: [fht] FMC Alias Private Key: 7
39,647,042 UART: [art] Derive CDI
39,647,862 UART: [art] Store in slot 0x4
39,690,568 UART: [art] Derive Key Pair
39,691,673 UART: [art] Store priv key in slot 0x5
42,118,683 UART: [art] Derive Key Pair - Done
42,131,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,838,018 UART: [art] Erasing AUTHORITY.KEYID = 7
43,839,535 UART: [art] PUB.X = 98EC4B1CADC11508FD4D585EE67A20662C8B2D5E8FAFB4F173AB3DF7787E50CB3036AFC3C13059C3AF1C5E559C70F0B4
43,846,840 UART: [art] PUB.Y = 5DEDAE42B1543B02545BEBED0479DCC5904F777FF85CD8A7C8E38774E347294925641B9B6854BE7710AE6F3C2DFD3CF3
43,854,119 UART: [art] SIG.R = C01FE611709736D2B09CCD225749059B8FF25A08F7395E110E6B9D6AE8AD9D8B41625A946419ECC3912BEC8F1390222E
43,861,502 UART: [art] SIG.S = BA09470F2CD1F4D571DA6BFAE6592097B9053B55DF56E1A0E8F4FBB9DC8DE5E38FA12950A0AAFC8265065C5AC97DD416
44,839,661 UART: Caliptra RT
44,840,354 UART: [state] CFI Enabled
45,217,855 UART: [rt] RT listening for mailbox commands...
45,249,773 UART: [rt]cmd =0x41545348, len=116
45,269,688 >>> mbox cmd response data (12 bytes)
45,270,755 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,301,537 UART: [rt]cmd =0x41545348, len=116
45,303,740 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
49,331,932 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,488,121 UART: [rt]cmd =0x41544d4e, len=14344
53,483,279 >>> mbox cmd response data (8 bytes)
53,483,826 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,514,589 UART: [rt]cmd =0x41545348, len=116
53,534,721 >>> mbox cmd response data (12 bytes)
53,535,166 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,565,990 UART: [rt]cmd =0x41545348, len=116
53,568,313 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.00s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,780,225 ready_for_fw is high
3,780,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,875 >>> mbox cmd response: success
18,702,398 UART:
18,702,778 UART: Running Caliptra FMC ...
18,703,976 UART:
18,704,147 UART: [state] CFI Enabled
18,711,996 UART: [fht] FMC Alias Private Key: 7
20,478,157 UART: [art] Extend RT PCRs Done
20,480,064 UART: [art] Lock RT PCRs Done
20,481,094 UART: [art] Populate DV Done
20,486,208 UART: [fht] FMC Alias Private Key: 7
20,487,870 UART: [art] Derive CDI
20,488,704 UART: [art] Store in slot 0x4
20,531,255 UART: [art] Derive Key Pair
20,532,291 UART: [art] Store priv key in slot 0x5
22,959,279 UART: [art] Derive Key Pair - Done
22,972,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,678,286 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,339 UART: [art] PUB.X = 4DA2DCEB760E3461B01EF1FF30F78B61DB4CC6CDB4D7599512FB742E8CC92D3C083FD5EEF405EE5DCCEC86B9F7953FAF
24,687,130 UART: [art] PUB.Y = 03297880AF5D2A47BEB18C4BA870D9BE57B580DD043EFB28DE92132D7D4CCE3AD8FF8A08BDF5595B66106B68AB2FED9B
24,694,443 UART: [art] SIG.R = 9E1E05D8D88449E29128D3D830EC685651F238A5C477DBEEC76492134BA3C16D80E11309A4C6DB468362E828B40B281C
24,701,803 UART: [art] SIG.S = AAF7C32FCFFC4033771C95441D2A1609AAFFB5E6B35D2BA3A583FD3178D5F706D37A9AF6B1A40EF27FDB3633B7495FC8
25,680,850 UART: Caliptra RT
25,681,543 UART: [state] CFI Enabled
25,814,268 UART: [rt] RT listening for mailbox commands...
25,816,728 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,972,226 UART: [rt]cmd =0x41544d4e, len=14344
29,967,862 >>> mbox cmd response data (8 bytes)
29,968,519 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,999,262 UART: [rt]cmd =0x41545348, len=116
30,019,483 >>> mbox cmd response data (12 bytes)
30,020,901 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,051,862 UART: [rt]cmd =0x41545348, len=116
30,053,882 >>> mbox cmd response data (12 bytes)
32,109,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,337,808 >>> mbox cmd response: success
39,338,458 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,370,679 UART:
39,371,009 UART: Running Caliptra FMC ...
39,372,146 UART:
39,372,312 UART: [state] CFI Enabled
39,416,385 UART: [art] Extend RT PCRs Done
39,417,559 UART: [art] Lock RT PCRs Done
39,419,015 UART: [art] Populate DV Done
39,424,214 UART: [fht] FMC Alias Private Key: 7
39,425,746 UART: [art] Derive CDI
39,426,496 UART: [art] Store in slot 0x4
39,469,201 UART: [art] Derive Key Pair
39,470,204 UART: [art] Store priv key in slot 0x5
41,896,566 UART: [art] Derive Key Pair - Done
41,909,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,615,571 UART: [art] Erasing AUTHORITY.KEYID = 7
43,617,568 UART: [art] PUB.X = FB1AA2E4A4C753C89E0E3E51BEEC3AA9F79F9F9A1CC7E1282F34B264867798392FD74459C92524A740A9F267D8779DED
43,624,363 UART: [art] PUB.Y = 0B132C3DA1E95EC8C7BB63C550D19CFAAC31CC232E20D8EA414E32472EF7FA7A1FB0997C5451B9493593C6931E6BE783
43,631,601 UART: [art] SIG.R = 7E22D38F1AE361B7224D1054CC310EB3E130C0AA2272A739CD27FD7B9E7AD087EF9E7E5DE369D2A9017D9DB3466BA330
43,639,002 UART: [art] SIG.S = 48E8C36C06EB80D90ABF612721E8872D6EAF2003CEB84DF714DD5E22CC7A4C8ACCDB7DD7BAB9171344EAA2EA7E75D38B
44,617,717 UART: Caliptra RT
44,618,431 UART: [state] CFI Enabled
44,988,112 UART: [rt] RT listening for mailbox commands...
45,020,072 UART: [rt]cmd =0x41545348, len=116
45,040,689 >>> mbox cmd response data (12 bytes)
45,041,891 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,072,963 UART: [rt]cmd =0x41545348, len=116
45,075,212 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
49,106,021 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,261,457 UART: [rt]cmd =0x41544d4e, len=14344
53,257,186 >>> mbox cmd response data (8 bytes)
53,257,731 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,288,480 UART: [rt]cmd =0x41545348, len=116
53,307,946 >>> mbox cmd response data (12 bytes)
53,308,382 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,339,041 UART: [rt]cmd =0x41545348, len=116
53,341,098 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.99s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,076 UART:
192,453 UART: Running Caliptra ROM ...
193,595 UART:
193,742 UART: [state] CFI Enabled
263,024 UART: [state] LifecycleState = Unprovisioned
265,439 UART: [state] DebugLocked = No
267,829 UART: [state] WD Timer not started. Device not locked for debugging
272,520 UART: [kat] SHA2-256
462,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,182 UART: [kat] ++
473,657 UART: [kat] sha1
484,813 UART: [kat] SHA2-256
487,819 UART: [kat] SHA2-384
493,037 UART: [kat] SHA2-512-ACC
495,620 UART: [kat] ECC-384
2,950,051 UART: [kat] HMAC-384Kdf
2,973,015 UART: [kat] LMS
3,504,781 UART: [kat] --
3,509,638 UART: [cold-reset] ++
3,511,787 UART: [fht] FHT @ 0x50003400
3,523,617 UART: [idev] ++
3,524,319 UART: [idev] CDI.KEYID = 6
3,525,345 UART: [idev] SUBJECT.KEYID = 7
3,526,541 UART: [idev] UDS.KEYID = 0
3,527,518 ready_for_fw is high
3,527,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,783 UART: [idev] Erasing UDS.KEYID = 0
6,030,157 UART: [idev] Sha1 KeyId Algorithm
6,052,212 UART: [idev] --
6,057,211 UART: [ldev] ++
6,057,901 UART: [ldev] CDI.KEYID = 6
6,058,814 UART: [ldev] SUBJECT.KEYID = 5
6,059,972 UART: [ldev] AUTHORITY.KEYID = 7
6,061,201 UART: [ldev] FE.KEYID = 1
6,101,927 UART: [ldev] Erasing FE.KEYID = 1
8,606,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,625 UART: [ldev] --
10,413,621 UART: [fwproc] Wait for Commands...
10,416,305 UART: [fwproc] Recv command 0x46574c44
10,418,607 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,023 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,630 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,518 >>> mbox cmd response: success
14,680,753 UART: [afmc] ++
14,681,487 UART: [afmc] CDI.KEYID = 6
14,682,597 UART: [afmc] SUBJECT.KEYID = 7
14,684,144 UART: [afmc] AUTHORITY.KEYID = 5
17,217,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,554 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,653 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,805 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,713 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,510 UART: [afmc] --
19,013,743 UART: [cold-reset] --
19,017,451 UART: [state] Locking Datavault
19,022,223 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,373 UART: [state] Locking ICCM
19,026,363 UART: [exit] Launching FMC @ 0x40000130
19,035,052 UART:
19,035,291 UART: Running Caliptra FMC ...
19,036,393 UART:
19,036,551 UART: [state] CFI Enabled
19,096,100 UART: [fht] FMC Alias Private Key: 7
20,862,138 UART: [art] Extend RT PCRs Done
20,863,354 UART: [art] Lock RT PCRs Done
20,865,295 UART: [art] Populate DV Done
20,870,758 UART: [fht] FMC Alias Private Key: 7
20,872,508 UART: [art] Derive CDI
20,873,244 UART: [art] Store in slot 0x4
20,928,717 UART: [art] Derive Key Pair
20,929,750 UART: [art] Store priv key in slot 0x5
23,392,279 UART: [art] Derive Key Pair - Done
23,405,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,771 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,269 UART: [art] PUB.X = F3C55C42005B48D97DF430B715C59F0FB84264EF1DBC9D270A34C9B289AAF53D7391D8FF2D15B83716F499FCC4748233
25,126,492 UART: [art] PUB.Y = E9ED5B3F35A883BDFB6EF2B17AB9E9C1C9CD144056F9FCE0BB1881D6EEF247EBDBF921AD29256FD26E3389A36A6582A8
25,133,765 UART: [art] SIG.R = 1A3AAAAC6D3BFCCB0CA219EA92A1698CCC98E20C80BA6D99790231547F30CE4EFCB49D6D3478D367520586212F6CB155
25,141,192 UART: [art] SIG.S = A5D087977B6BEEC4C8D5E63636E86D2AD25FB361EF942CFC90DA0099351FBFFC0AABEA5A9A00FDEC23A2010C3F713F26
26,120,393 UART: Caliptra RT
26,121,096 UART: [state] CFI Enabled
26,300,453 UART: [rt] RT listening for mailbox commands...
26,302,856 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,458,557 UART: [rt]cmd =0x41544d4e, len=14344
30,454,369 >>> mbox cmd response data (8 bytes)
30,454,973 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,485,696 UART: [rt]cmd =0x41545348, len=116
30,505,718 >>> mbox cmd response data (12 bytes)
30,506,516 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,537,216 UART: [rt]cmd =0x41545348, len=116
30,539,399 >>> mbox cmd response data (12 bytes)
32,603,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,754,137 UART:
32,754,516 UART: Running Caliptra ROM ...
32,755,574 UART:
32,755,723 UART: [state] CFI Enabled
32,812,905 UART: [state] LifecycleState = Unprovisioned
32,814,956 UART: [state] DebugLocked = No
32,817,397 UART: [state] WD Timer not started. Device not locked for debugging
32,822,868 UART: [kat] SHA2-256
33,012,708 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,023,460 UART: [kat] ++
33,023,915 UART: [kat] sha1
33,035,183 UART: [kat] SHA2-256
33,038,207 UART: [kat] SHA2-384
33,044,200 UART: [kat] SHA2-512-ACC
33,046,817 UART: [kat] ECC-384
35,498,211 UART: [kat] HMAC-384Kdf
35,519,102 UART: [kat] LMS
36,050,702 UART: [kat] --
36,055,492 UART: [update-reset] ++
39,565,829 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,568,767 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,198,495 >>> mbox cmd response: success
40,203,394 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,204,009 UART: [update-reset] Copying MAN_2 To MAN_1
40,237,315 UART: [update-reset Success] --
40,241,223 UART: [state] Locking Datavault
40,245,501 UART: [state] Locking PCR0, PCR1 and PCR31
40,247,692 UART: [state] Locking ICCM
40,249,030 UART: [exit] Launching FMC @ 0x40000130
40,257,679 UART:
40,257,916 UART: Running Caliptra FMC ...
40,259,021 UART:
40,259,181 UART: [state] CFI Enabled
40,352,033 UART: [art] Extend RT PCRs Done
40,353,229 UART: [art] Lock RT PCRs Done
40,354,632 UART: [art] Populate DV Done
40,360,237 UART: [fht] FMC Alias Private Key: 7
40,361,818 UART: [art] Derive CDI
40,362,641 UART: [art] Store in slot 0x4
40,421,276 UART: [art] Derive Key Pair
40,422,327 UART: [art] Store priv key in slot 0x5
42,885,254 UART: [art] Derive Key Pair - Done
42,898,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,610,628 UART: [art] Erasing AUTHORITY.KEYID = 7
44,612,146 UART: [art] PUB.X = 64670E472E712C6B8EF75529DCFD2FE16AB8360E5CCEBB022D5FD8721A60A49EAB33E6498DA304D8F89EC1A034DD148F
44,619,434 UART: [art] PUB.Y = B32A9B1F332F519F2C2B0E294249D90EEB0199B81712EA4D4EE2F38D1534957AA47DF21A74C36D2579A75422882256BF
44,626,642 UART: [art] SIG.R = 52581AD0D1E49898DECCB88CA277685A57387625D73678D92C7D259E387A2A98D4168CD9869F04F77C8C8851FED1A05B
44,634,008 UART: [art] SIG.S = 5A0FCABC865F8D7C40C0CA88A8B065756AB8A50BB5798DE4DF9125FCD30EFF2FC6691C044B6350E15870779562EB919C
45,612,872 UART: Caliptra RT
45,613,557 UART: [state] CFI Enabled
46,034,151 UART: [rt] RT listening for mailbox commands...
46,066,143 UART: [rt]cmd =0x41545348, len=116
46,087,276 >>> mbox cmd response data (12 bytes)
46,088,190 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,119,026 UART: [rt]cmd =0x41545348, len=116
46,121,158 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
50,173,557 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,328,841 UART: [rt]cmd =0x41544d4e, len=14344
54,324,217 >>> mbox cmd response data (8 bytes)
54,324,841 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,355,634 UART: [rt]cmd =0x41545348, len=116
54,376,371 >>> mbox cmd response data (12 bytes)
54,376,833 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,407,549 UART: [rt]cmd =0x41545348, len=116
54,409,627 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.04s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,440,087 ready_for_fw is high
3,440,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,170 >>> mbox cmd response: success
19,134,965 UART:
19,135,347 UART: Running Caliptra FMC ...
19,136,541 UART:
19,136,727 UART: [state] CFI Enabled
19,198,550 UART: [fht] FMC Alias Private Key: 7
20,965,017 UART: [art] Extend RT PCRs Done
20,966,247 UART: [art] Lock RT PCRs Done
20,968,120 UART: [art] Populate DV Done
20,973,699 UART: [fht] FMC Alias Private Key: 7
20,975,301 UART: [art] Derive CDI
20,976,036 UART: [art] Store in slot 0x4
21,030,966 UART: [art] Derive Key Pair
21,032,007 UART: [art] Store priv key in slot 0x5
23,494,981 UART: [art] Derive Key Pair - Done
23,507,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,319 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,806 UART: [art] PUB.X = CCC1804F7A8381C7B92A4A36A71DC54E23A9B8BC95D1F6B57D1E5CFFF072FAA47B76837222203A3DAE42CC70CC54492A
25,229,085 UART: [art] PUB.Y = 5FC5D03DD545868F7AAFD1ECAEFD66D1669B3550BD7969EC11B4B3848D483D544BB8EC057AD8633DF9FBB15B9309874F
25,236,368 UART: [art] SIG.R = 3122B828C108EE3841D11BA8E8EA8155B201D57EFB12ADAEC34179B1C4D904F650C909B7D6A6A4FCC294BC879DF131F3
25,243,810 UART: [art] SIG.S = 66B8464FE0743BBDAE073A824C3C00B291840752A36F1BAAE8107D2FB362214C23FA8FFCD55170859A915A9E37497BC2
26,222,931 UART: Caliptra RT
26,223,649 UART: [state] CFI Enabled
26,402,697 UART: [rt] RT listening for mailbox commands...
26,405,132 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,560,585 UART: [rt]cmd =0x41544d4e, len=14344
30,556,030 >>> mbox cmd response data (8 bytes)
30,556,600 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,587,055 UART: [rt]cmd =0x41545348, len=116
30,606,824 >>> mbox cmd response data (12 bytes)
30,607,750 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,638,527 UART: [rt]cmd =0x41545348, len=116
30,640,838 >>> mbox cmd response data (12 bytes)
32,704,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,619,827 >>> mbox cmd response: success
40,620,425 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,654,252 UART:
40,654,553 UART: Running Caliptra FMC ...
40,655,687 UART:
40,655,844 UART: [state] CFI Enabled
40,751,678 UART: [art] Extend RT PCRs Done
40,752,866 UART: [art] Lock RT PCRs Done
40,754,285 UART: [art] Populate DV Done
40,760,016 UART: [fht] FMC Alias Private Key: 7
40,761,664 UART: [art] Derive CDI
40,762,473 UART: [art] Store in slot 0x4
40,820,450 UART: [art] Derive Key Pair
40,821,544 UART: [art] Store priv key in slot 0x5
43,284,062 UART: [art] Derive Key Pair - Done
43,297,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,010,558 UART: [art] Erasing AUTHORITY.KEYID = 7
45,012,068 UART: [art] PUB.X = 5C624ABD5DD1D383C17F246266F8FC5CBF34A01305E9FFFA57215984B4CDD129ADD0D73DA34363DEE27861905FD650D0
45,019,331 UART: [art] PUB.Y = 3F1569A329C3033360AAA2961CE63312CCC1B487EBF9169209D274F20BA6D94F09AD9A8ED5DE769813E18AD17104DB24
45,026,626 UART: [art] SIG.R = 4D607C38AB626614BF4129C35ED098401C4AEF9D8AA57BC1C15D93BEA3BA7719F3D186863270C291FD4315B81653B66A
45,033,974 UART: [art] SIG.S = CE3DA635A9AB777D5C4FE42B1A385499593989C327D9C6E4C8DFB042AF4E6CBECD56B7B5B1DEFD3E691DAB548C10D3C0
46,013,012 UART: Caliptra RT
46,013,721 UART: [state] CFI Enabled
46,434,455 UART: [rt] RT listening for mailbox commands...
46,466,501 UART: [rt]cmd =0x41545348, len=116
46,486,231 >>> mbox cmd response data (12 bytes)
46,487,197 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,518,036 UART: [rt]cmd =0x41545348, len=116
46,520,196 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
50,561,038 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,716,403 UART: [rt]cmd =0x41544d4e, len=14344
54,711,305 >>> mbox cmd response data (8 bytes)
54,711,820 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,742,437 UART: [rt]cmd =0x41545348, len=116
54,762,512 >>> mbox cmd response data (12 bytes)
54,762,938 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,793,608 UART: [rt]cmd =0x41545348, len=116
54,795,771 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.06s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,463 UART:
192,842 UART: Running Caliptra ROM ...
193,957 UART:
603,673 UART: [state] CFI Enabled
617,928 UART: [state] LifecycleState = Unprovisioned
620,330 UART: [state] DebugLocked = No
622,214 UART: [state] WD Timer not started. Device not locked for debugging
627,617 UART: [kat] SHA2-256
817,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,312 UART: [kat] ++
828,924 UART: [kat] sha1
841,014 UART: [kat] SHA2-256
844,032 UART: [kat] SHA2-384
850,031 UART: [kat] SHA2-512-ACC
852,622 UART: [kat] ECC-384
3,293,161 UART: [kat] HMAC-384Kdf
3,306,215 UART: [kat] LMS
3,838,025 UART: [kat] --
3,844,243 UART: [cold-reset] ++
3,845,401 UART: [fht] FHT @ 0x50003400
3,855,766 UART: [idev] ++
3,856,496 UART: [idev] CDI.KEYID = 6
3,857,416 UART: [idev] SUBJECT.KEYID = 7
3,858,598 UART: [idev] UDS.KEYID = 0
3,859,529 ready_for_fw is high
3,859,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,623 UART: [idev] Erasing UDS.KEYID = 0
6,334,011 UART: [idev] Sha1 KeyId Algorithm
6,357,517 UART: [idev] --
6,363,407 UART: [ldev] ++
6,364,090 UART: [ldev] CDI.KEYID = 6
6,365,008 UART: [ldev] SUBJECT.KEYID = 5
6,366,177 UART: [ldev] AUTHORITY.KEYID = 7
6,367,414 UART: [ldev] FE.KEYID = 1
6,379,790 UART: [ldev] Erasing FE.KEYID = 1
8,860,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,872 UART: [ldev] --
10,653,120 UART: [fwproc] Wait for Commands...
10,654,959 UART: [fwproc] Recv command 0x46574c44
10,657,274 UART: [fwproc] Recv'd Img size: 118548 bytes
14,165,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,246,475 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,370,078 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,930,653 >>> mbox cmd response: success
14,934,222 UART: [afmc] ++
14,934,932 UART: [afmc] CDI.KEYID = 6
14,936,130 UART: [afmc] SUBJECT.KEYID = 7
14,937,571 UART: [afmc] AUTHORITY.KEYID = 5
17,442,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,163,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,165,617 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,180,660 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,195,861 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,210,766 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,233,727 UART: [afmc] --
19,236,413 UART: [cold-reset] --
19,239,913 UART: [state] Locking Datavault
19,246,098 UART: [state] Locking PCR0, PCR1 and PCR31
19,248,262 UART: [state] Locking ICCM
19,249,667 UART: [exit] Launching FMC @ 0x40000130
19,258,364 UART:
19,258,598 UART: Running Caliptra FMC ...
19,259,705 UART:
19,259,874 UART: [state] CFI Enabled
19,267,761 UART: [fht] FMC Alias Private Key: 7
21,033,975 UART: [art] Extend RT PCRs Done
21,035,193 UART: [art] Lock RT PCRs Done
21,037,095 UART: [art] Populate DV Done
21,042,409 UART: [fht] FMC Alias Private Key: 7
21,044,116 UART: [art] Derive CDI
21,044,935 UART: [art] Store in slot 0x4
21,088,158 UART: [art] Derive Key Pair
21,089,183 UART: [art] Store priv key in slot 0x5
23,516,145 UART: [art] Derive Key Pair - Done
23,529,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,235,576 UART: [art] Erasing AUTHORITY.KEYID = 7
25,237,061 UART: [art] PUB.X = 0461123ABA8AA5279819A0D3250E6F70048AEDC0767E59B86ABE9BD97A990DFA02C4F034EF67CB4CD3111F241C5D8276
25,244,348 UART: [art] PUB.Y = AE50CA3C3889E67BB1EE3A3ADD6E42AA3F3DA44477405FEFA47DF95E1D2DA3183B1D7F72A7129BD861E6E9140D333915
25,251,613 UART: [art] SIG.R = 688B435B4A5A516ED1A7EBAA8E25B8AD7430C7092B0E710CB25794863F18089FDE888B3230E3A5AC73F431B515FE977F
25,259,037 UART: [art] SIG.S = F2557D1F3287CA3094E4032FD978C24B276DD662938516EC9988B0D3916E8F8233BABDADB8A0899208E69E1E6CB15886
26,238,282 UART: Caliptra RT
26,239,022 UART: [state] CFI Enabled
26,371,716 UART: [rt] RT listening for mailbox commands...
26,374,179 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,529,589 UART: [rt]cmd =0x41544d4e, len=14344
30,525,824 >>> mbox cmd response data (8 bytes)
30,526,412 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,557,365 UART: [rt]cmd =0x41545348, len=116
30,577,502 >>> mbox cmd response data (12 bytes)
30,578,295 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,608,975 UART: [rt]cmd =0x41545348, len=116
30,611,082 >>> mbox cmd response data (12 bytes)
32,677,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,828,824 UART:
32,829,184 UART: Running Caliptra ROM ...
32,830,329 UART:
32,830,496 UART: [state] CFI Enabled
32,846,273 UART: [state] LifecycleState = Unprovisioned
32,848,158 UART: [state] DebugLocked = No
32,850,899 UART: [state] WD Timer not started. Device not locked for debugging
32,855,534 UART: [kat] SHA2-256
33,045,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,056,189 UART: [kat] ++
33,056,794 UART: [kat] sha1
33,069,692 UART: [kat] SHA2-256
33,072,667 UART: [kat] SHA2-384
33,078,989 UART: [kat] SHA2-512-ACC
33,081,563 UART: [kat] ECC-384
35,523,510 UART: [kat] HMAC-384Kdf
35,537,056 UART: [kat] LMS
36,068,664 UART: [kat] --
36,071,225 UART: [update-reset] ++
39,578,790 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,582,395 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,212,131 >>> mbox cmd response: success
40,216,660 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,217,266 UART: [update-reset] Copying MAN_2 To MAN_1
40,250,875 UART: [update-reset Success] --
40,256,408 UART: [state] Locking Datavault
40,260,059 UART: [state] Locking PCR0, PCR1 and PCR31
40,262,289 UART: [state] Locking ICCM
40,265,048 UART: [exit] Launching FMC @ 0x40000130
40,273,679 UART:
40,273,916 UART: Running Caliptra FMC ...
40,275,024 UART:
40,275,197 UART: [state] CFI Enabled
40,318,781 UART: [art] Extend RT PCRs Done
40,319,929 UART: [art] Lock RT PCRs Done
40,321,379 UART: [art] Populate DV Done
40,326,819 UART: [fht] FMC Alias Private Key: 7
40,328,411 UART: [art] Derive CDI
40,329,242 UART: [art] Store in slot 0x4
40,371,950 UART: [art] Derive Key Pair
40,373,018 UART: [art] Store priv key in slot 0x5
42,800,114 UART: [art] Derive Key Pair - Done
42,813,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,519,992 UART: [art] Erasing AUTHORITY.KEYID = 7
44,521,502 UART: [art] PUB.X = 90A1F41675A9FF7296D56FFDD5D5A6AA3D6C56866236A04F43CC1C20BA338B4A3AAB9B1EA175DA8E2FDA56ECA057B336
44,528,776 UART: [art] PUB.Y = 2BCD67DECE904B495E65F6F890A59E2FD8DEF3B2D148CCFEB26BD0FA7BCDBA4E06B3452B0861A31075E47E10CA13B505
44,536,079 UART: [art] SIG.R = 5A11EB20C3C92FB41F6B665460B17768710107D298A7ABA06FE30529AEBC9C5525CD7B0CCBBDFB8EE9272D9774BD1C63
44,543,450 UART: [art] SIG.S = F876E5C50C002CA5FD351AEC984B08D3E98BFF941FE29867618D24D85A8CD55E7E87E4B48729FDEB19AABFAD1A0EC1BD
45,522,375 UART: Caliptra RT
45,523,066 UART: [state] CFI Enabled
45,894,969 UART: [rt] RT listening for mailbox commands...
45,926,710 UART: [rt]cmd =0x41545348, len=116
45,947,131 >>> mbox cmd response data (12 bytes)
45,948,193 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,978,925 UART: [rt]cmd =0x41545348, len=116
45,981,227 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
50,032,146 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,187,860 UART: [rt]cmd =0x41544d4e, len=14344
54,183,291 >>> mbox cmd response data (8 bytes)
54,183,917 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,214,344 UART: [rt]cmd =0x41545348, len=116
54,234,384 >>> mbox cmd response data (12 bytes)
54,234,807 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,265,472 UART: [rt]cmd =0x41545348, len=116
54,267,706 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.03s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,759,462 ready_for_fw is high
3,760,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,035,793 >>> mbox cmd response: success
19,288,559 UART:
19,288,951 UART: Running Caliptra FMC ...
19,290,103 UART:
19,290,272 UART: [state] CFI Enabled
19,298,391 UART: [fht] FMC Alias Private Key: 7
21,064,446 UART: [art] Extend RT PCRs Done
21,065,701 UART: [art] Lock RT PCRs Done
21,067,724 UART: [art] Populate DV Done
21,073,288 UART: [fht] FMC Alias Private Key: 7
21,074,789 UART: [art] Derive CDI
21,075,561 UART: [art] Store in slot 0x4
21,118,231 UART: [art] Derive Key Pair
21,119,276 UART: [art] Store priv key in slot 0x5
23,546,291 UART: [art] Derive Key Pair - Done
23,559,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,265,729 UART: [art] Erasing AUTHORITY.KEYID = 7
25,267,253 UART: [art] PUB.X = E097798391A3D916E56CA44A9AC7C5E852CB382A8C09D491F07886549A1E479924055EBE04C2FBA8F4B41DCF058C9751
25,274,499 UART: [art] PUB.Y = 81F579F0F6169609246EF24FC49F329C6EB9343604E682692AFAC60D3B389D2FE7563C601E6AE3F949A540EB5F24C8BF
25,281,753 UART: [art] SIG.R = 3ABC978D9F5C5C8ECDD6A5D38F29F37538B141C7AD172606ED3AA3F5790F6FBBC7C045975CA7D3FE6FF26FE90F57E42E
25,289,204 UART: [art] SIG.S = BDC66A0FB4CD6239B56A4DC90078F047BCA7CEBEF8BCA1D189C08BC7BC0B7D2710C7C0AED510D978C33B2E4B6AC8D524
26,268,573 UART: Caliptra RT
26,269,289 UART: [state] CFI Enabled
26,401,758 UART: [rt] RT listening for mailbox commands...
26,404,150 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,559,477 UART: [rt]cmd =0x41544d4e, len=14344
30,554,976 >>> mbox cmd response data (8 bytes)
30,555,557 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,586,238 UART: [rt]cmd =0x41545348, len=116
30,605,081 >>> mbox cmd response data (12 bytes)
30,606,062 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,637,148 UART: [rt]cmd =0x41545348, len=116
30,639,269 >>> mbox cmd response data (12 bytes)
32,707,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,538,217 >>> mbox cmd response: success
40,539,051 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,572,916 UART:
40,573,219 UART: Running Caliptra FMC ...
40,574,353 UART:
40,574,515 UART: [state] CFI Enabled
40,618,290 UART: [art] Extend RT PCRs Done
40,619,517 UART: [art] Lock RT PCRs Done
40,620,935 UART: [art] Populate DV Done
40,626,351 UART: [fht] FMC Alias Private Key: 7
40,627,951 UART: [art] Derive CDI
40,628,772 UART: [art] Store in slot 0x4
40,671,315 UART: [art] Derive Key Pair
40,672,324 UART: [art] Store priv key in slot 0x5
43,099,524 UART: [art] Derive Key Pair - Done
43,112,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,818,422 UART: [art] Erasing AUTHORITY.KEYID = 7
44,819,952 UART: [art] PUB.X = 9DF3F0437CC110BE57DB24D548EDE8C4BE4302ABDD2A162A53013F2FDAC2A6DC998AD08955AD02C77DE40D31CC8F2A52
44,827,297 UART: [art] PUB.Y = 3A8C386F497DEE3FBC33DA7EDCC80880E4B1328E7D5C37B7884864B7C909D8915F9F5C43742A3869C04EED65317A18CE
44,834,484 UART: [art] SIG.R = 971F4673D9AE1FF2016761785FA82750B93210B797874142E2A459CB1DE2C067C698214F4742F0A1976A64DA2B55804F
44,841,884 UART: [art] SIG.S = D1E32BF757348D2323086EF57AA16CEDC937F3717F2E970A724448C7C3C6E96F7EE41B264CD95E0639A82AEE595A07C5
45,820,440 UART: Caliptra RT
45,821,147 UART: [state] CFI Enabled
46,199,277 UART: [rt] RT listening for mailbox commands...
46,231,385 UART: [rt]cmd =0x41545348, len=116
46,251,643 >>> mbox cmd response data (12 bytes)
46,252,381 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,283,176 UART: [rt]cmd =0x41545348, len=116
46,285,545 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
50,337,381 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,492,703 UART: [rt]cmd =0x41544d4e, len=14344
54,488,201 >>> mbox cmd response data (8 bytes)
54,488,790 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,519,642 UART: [rt]cmd =0x41545348, len=116
54,540,192 >>> mbox cmd response data (12 bytes)
54,540,666 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,571,330 UART: [rt]cmd =0x41545348, len=116
54,573,207 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.05s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,455 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,055 UART: [kat] SHA2-256
881,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,101 UART: [kat] ++
886,253 UART: [kat] sha1
890,403 UART: [kat] SHA2-256
892,341 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,860 UART: [kat] HMAC-384Kdf
907,456 UART: [kat] LMS
1,475,652 UART: [kat] --
1,476,385 UART: [cold-reset] ++
1,476,839 UART: [fht] Storing FHT @ 0x50003400
1,479,676 UART: [idev] ++
1,479,844 UART: [idev] CDI.KEYID = 6
1,480,204 UART: [idev] SUBJECT.KEYID = 7
1,480,628 UART: [idev] UDS.KEYID = 0
1,480,973 ready_for_fw is high
1,480,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,846 UART: [idev] Erasing UDS.KEYID = 0
1,505,760 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,550 UART: [idev] --
1,515,607 UART: [ldev] ++
1,515,775 UART: [ldev] CDI.KEYID = 6
1,516,138 UART: [ldev] SUBJECT.KEYID = 5
1,516,564 UART: [ldev] AUTHORITY.KEYID = 7
1,517,027 UART: [ldev] FE.KEYID = 1
1,522,259 UART: [ldev] Erasing FE.KEYID = 1
1,547,680 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,602 UART: [ldev] --
1,586,911 UART: [fwproc] Waiting for Commands...
1,587,742 UART: [fwproc] Received command 0x46574c44
1,588,533 UART: [fwproc] Received Image of size 118548 bytes
2,932,771 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,531 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,749 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,092 >>> mbox cmd response: success
3,133,266 UART: [afmc] ++
3,133,434 UART: [afmc] CDI.KEYID = 6
3,133,796 UART: [afmc] SUBJECT.KEYID = 7
3,134,221 UART: [afmc] AUTHORITY.KEYID = 5
3,168,720 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,822 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,602 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,311 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,194 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,877 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,667 UART: [afmc] --
3,211,619 UART: [cold-reset] --
3,212,601 UART: [state] Locking Datavault
3,213,716 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,320 UART: [state] Locking ICCM
3,214,844 UART: [exit] Launching FMC @ 0x40000130
3,220,174 UART:
3,220,190 UART: Running Caliptra FMC ...
3,220,598 UART:
3,220,652 UART: [state] CFI Enabled
3,231,428 UART: [fht] FMC Alias Private Key: 7
3,350,540 UART: [art] Extend RT PCRs Done
3,350,968 UART: [art] Lock RT PCRs Done
3,352,622 UART: [art] Populate DV Done
3,360,825 UART: [fht] FMC Alias Private Key: 7
3,361,971 UART: [art] Derive CDI
3,362,251 UART: [art] Store in slot 0x4
3,448,117 UART: [art] Derive Key Pair
3,448,477 UART: [art] Store priv key in slot 0x5
3,461,736 UART: [art] Derive Key Pair - Done
3,476,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,312 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,077 UART: [art] PUB.X = 9626203FA608E01A2C2955FBDA7E929858DD78E221E558B6C9EEB85400F292F307D03B08BA57565DFF71A712303F5E00
3,498,794 UART: [art] PUB.Y = 3A642C9F8F9F63CD2D9EA05D3C0F9113750FFA260CF247EF2398DDEC8FFA77B6D34CAC736E5B53B478249550D7F8EA43
3,505,751 UART: [art] SIG.R = E59657DC362FEB4C8A2A8838539F2A9AB8F6D998A60D614310DE1F3922AFA0A590C5EBF3139247352C04F0C4E5F0A40C
3,512,520 UART: [art] SIG.S = 6244DDD25038A00ACFEFB31CE4B0AEEAEF458D96284FB1513835922D6CFFFCB69B108234EB916820F814F8FBC772C0F3
3,536,641 UART: Caliptra RT
3,536,892 UART: [state] CFI Enabled
3,657,644 UART: [rt] RT listening for mailbox commands...
3,658,314 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,472 UART: [rt]cmd =0x41544d4e, len=14344
4,090,948 >>> mbox cmd response data (8 bytes)
4,090,949 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,180 UART: [rt]cmd =0x41545348, len=116
4,142,853 >>> mbox cmd response data (12 bytes)
4,142,854 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,173,173 UART: [rt]cmd =0x41545348, len=116
4,174,948 >>> mbox cmd response data (12 bytes)
4,174,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,175,465 UART:
4,175,481 UART: Running Caliptra ROM ...
4,175,889 UART:
4,175,943 UART: [state] CFI Enabled
4,178,273 UART: [state] LifecycleState = Unprovisioned
4,178,928 UART: [state] DebugLocked = No
4,179,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,181,055 UART: [kat] SHA2-256
4,974,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,979,101 UART: [kat] ++
4,979,253 UART: [kat] sha1
4,983,427 UART: [kat] SHA2-256
4,985,365 UART: [kat] SHA2-384
4,988,096 UART: [kat] SHA2-512-ACC
4,989,996 UART: [kat] ECC-384
4,995,269 UART: [kat] HMAC-384Kdf
4,999,795 UART: [kat] LMS
5,567,991 UART: [kat] --
5,568,956 UART: [update-reset] ++
6,950,006 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,951,244 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,106,511 >>> mbox cmd response: success
7,106,511 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,106,844 UART: [update-reset] Copying MAN_2 To MAN_1
7,114,858 UART: [update-reset Success] --
7,115,793 UART: [state] Locking Datavault
7,116,437 UART: [state] Locking PCR0, PCR1 and PCR31
7,117,041 UART: [state] Locking ICCM
7,117,669 UART: [exit] Launching FMC @ 0x40000130
7,122,999 UART:
7,123,015 UART: Running Caliptra FMC ...
7,123,423 UART:
7,123,477 UART: [state] CFI Enabled
7,212,616 UART: [art] Extend RT PCRs Done
7,213,044 UART: [art] Lock RT PCRs Done
7,214,109 UART: [art] Populate DV Done
7,222,440 UART: [fht] FMC Alias Private Key: 7
7,223,440 UART: [art] Derive CDI
7,223,720 UART: [art] Store in slot 0x4
7,309,646 UART: [art] Derive Key Pair
7,310,006 UART: [art] Store priv key in slot 0x5
7,322,997 UART: [art] Derive Key Pair - Done
7,337,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,353,311 UART: [art] Erasing AUTHORITY.KEYID = 7
7,354,076 UART: [art] PUB.X = 84AE9F3F0B70C726C6F263D6B164DDA73A66BAB3600232FF9BB4C96C036107E27E501786722F981B2A49A2B56FE4DD16
7,360,840 UART: [art] PUB.Y = 47E7D6BA168C08348469FB618E89112635F07A3BD44721A257796D4570F6A15CB225272BAD1B6280315ACC19B3165CD2
7,367,781 UART: [art] SIG.R = 7D5DE8E973D023606411F3ED4D982D8257884EAD0113E51AEC36CDFE1C075EAC28EFD7DE569A989B52428E952BB0635B
7,374,555 UART: [art] SIG.S = 9C38AC5C991920358A0C87636B391F5004F66D093295D9CDA8E28ABB28EEA2F5C92F3B0F0FDEB7A1968A76BCEDE2D945
7,398,130 UART: Caliptra RT
7,398,381 UART: [state] CFI Enabled
7,761,318 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,792,193 UART: [rt]cmd =0x41545348, len=116
7,814,233 >>> mbox cmd response data (12 bytes)
7,814,234 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,844,433 UART: [rt]cmd =0x41545348, len=116
7,846,126 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,846,127 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,968,806 UART: [rt]cmd =0x41544d4e, len=14344
8,278,640 >>> mbox cmd response data (8 bytes)
8,278,641 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,308,838 UART: [rt]cmd =0x41545348, len=116
8,331,809 >>> mbox cmd response data (12 bytes)
8,331,810 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,362,147 UART: [rt]cmd =0x41545348, len=116
8,364,017 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,771 ready_for_fw is high
1,362,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,578 >>> mbox cmd response: success
3,042,855 UART:
3,042,871 UART: Running Caliptra FMC ...
3,043,279 UART:
3,043,333 UART: [state] CFI Enabled
3,053,873 UART: [fht] FMC Alias Private Key: 7
3,172,027 UART: [art] Extend RT PCRs Done
3,172,455 UART: [art] Lock RT PCRs Done
3,174,009 UART: [art] Populate DV Done
3,182,208 UART: [fht] FMC Alias Private Key: 7
3,183,380 UART: [art] Derive CDI
3,183,660 UART: [art] Store in slot 0x4
3,269,706 UART: [art] Derive Key Pair
3,270,066 UART: [art] Store priv key in slot 0x5
3,283,081 UART: [art] Derive Key Pair - Done
3,297,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,923 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,688 UART: [art] PUB.X = 18B453091C8D2EB3B977975C85DA601D3D66BBC9527BF17E228569D3F9AF2F5C852E321638CEB425BFB27E7A68912AA6
3,320,461 UART: [art] PUB.Y = BF6EDC21010A3E584DD7CA6083ED8477A24EA0862979218FC2428C722E2AD11AB9FEAFD3FAFFC7BBC71B81DBE108F235
3,327,424 UART: [art] SIG.R = B4955B02C97AFBA17A416340E88D826122FD9E0F9354A6B20180DE42CB9635206A97C9DF4BE05F71C1E4ABFBFC099DD8
3,334,194 UART: [art] SIG.S = F193A690422D913A1BB1E47F624EA05C3715CB75CF58F431C74613EFF6630A1976604496CA59771176E062DDB27BC51A
3,357,573 UART: Caliptra RT
3,357,824 UART: [state] CFI Enabled
3,478,251 UART: [rt] RT listening for mailbox commands...
3,478,921 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,847 UART: [rt]cmd =0x41544d4e, len=14344
3,912,059 >>> mbox cmd response data (8 bytes)
3,912,060 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,183 UART: [rt]cmd =0x41545348, len=116
3,964,166 >>> mbox cmd response data (12 bytes)
3,964,167 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,994,280 UART: [rt]cmd =0x41545348, len=116
3,996,187 >>> mbox cmd response data (12 bytes)
3,996,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,811,358 >>> mbox cmd response: success
6,811,358 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,824,394 UART:
6,824,410 UART: Running Caliptra FMC ...
6,824,818 UART:
6,824,872 UART: [state] CFI Enabled
6,913,765 UART: [art] Extend RT PCRs Done
6,914,193 UART: [art] Lock RT PCRs Done
6,915,452 UART: [art] Populate DV Done
6,923,729 UART: [fht] FMC Alias Private Key: 7
6,924,859 UART: [art] Derive CDI
6,925,139 UART: [art] Store in slot 0x4
7,010,875 UART: [art] Derive Key Pair
7,011,235 UART: [art] Store priv key in slot 0x5
7,024,248 UART: [art] Derive Key Pair - Done
7,039,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,054,336 UART: [art] Erasing AUTHORITY.KEYID = 7
7,055,101 UART: [art] PUB.X = FAE5EDDC77ECE561B0831CAFF6DC487E2230D5B373AA9F5321B5795FECB6AAAA7A463C66F84FE241781A7B0509D9AE5C
7,061,889 UART: [art] PUB.Y = 27E7F50F5E28BB1B25737503D965B5CE290461BB0B3799E755A3267840A2156C95FF11080852D1F7D8446EEC4616EF02
7,068,812 UART: [art] SIG.R = 5FA740CBBEF9311D9FB1D6A5211AE30DFF3F7BC556F6ED8E253DDF1660E4FADB846756F9435698D5E8840668F7093F5B
7,075,587 UART: [art] SIG.S = 3E437F84649F16A01203AED56804AB29AC609419EE7640F7AD34A6A50F3E3CC7E83864DFCAB17F293EE86E0D26CA959B
7,099,009 UART: Caliptra RT
7,099,260 UART: [state] CFI Enabled
7,464,854 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,495,835 UART: [rt]cmd =0x41545348, len=116
7,517,627 >>> mbox cmd response data (12 bytes)
7,517,628 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,547,887 UART: [rt]cmd =0x41545348, len=116
7,549,496 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,549,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,671,994 UART: [rt]cmd =0x41544d4e, len=14344
7,982,150 >>> mbox cmd response data (8 bytes)
7,982,151 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,012,160 UART: [rt]cmd =0x41545348, len=116
8,035,453 >>> mbox cmd response data (12 bytes)
8,035,454 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,065,387 UART: [rt]cmd =0x41545348, len=116
8,066,913 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.23s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
86,912 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,462 UART: [kat] SHA2-256
882,393 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,508 UART: [kat] ++
886,660 UART: [kat] sha1
890,984 UART: [kat] SHA2-256
892,922 UART: [kat] SHA2-384
895,511 UART: [kat] SHA2-512-ACC
897,412 UART: [kat] ECC-384
903,097 UART: [kat] HMAC-384Kdf
907,839 UART: [kat] LMS
1,476,035 UART: [kat] --
1,476,854 UART: [cold-reset] ++
1,477,326 UART: [fht] Storing FHT @ 0x50003400
1,479,927 UART: [idev] ++
1,480,095 UART: [idev] CDI.KEYID = 6
1,480,455 UART: [idev] SUBJECT.KEYID = 7
1,480,879 UART: [idev] UDS.KEYID = 0
1,481,224 ready_for_fw is high
1,481,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,715 UART: [idev] Erasing UDS.KEYID = 0
1,505,135 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,905 UART: [idev] --
1,514,978 UART: [ldev] ++
1,515,146 UART: [ldev] CDI.KEYID = 6
1,515,509 UART: [ldev] SUBJECT.KEYID = 5
1,515,935 UART: [ldev] AUTHORITY.KEYID = 7
1,516,398 UART: [ldev] FE.KEYID = 1
1,521,898 UART: [ldev] Erasing FE.KEYID = 1
1,546,981 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,299 UART: [ldev] --
1,586,686 UART: [fwproc] Waiting for Commands...
1,587,333 UART: [fwproc] Received command 0x46574c44
1,588,124 UART: [fwproc] Received Image of size 118548 bytes
2,933,344 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,564 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,782 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,015 >>> mbox cmd response: success
3,133,087 UART: [afmc] ++
3,133,255 UART: [afmc] CDI.KEYID = 6
3,133,617 UART: [afmc] SUBJECT.KEYID = 7
3,134,042 UART: [afmc] AUTHORITY.KEYID = 5
3,169,347 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,347 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,127 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,836 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,719 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,402 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,178 UART: [afmc] --
3,212,192 UART: [cold-reset] --
3,212,806 UART: [state] Locking Datavault
3,214,331 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,935 UART: [state] Locking ICCM
3,215,535 UART: [exit] Launching FMC @ 0x40000130
3,220,865 UART:
3,220,881 UART: Running Caliptra FMC ...
3,221,289 UART:
3,221,432 UART: [state] CFI Enabled
3,232,248 UART: [fht] FMC Alias Private Key: 7
3,350,524 UART: [art] Extend RT PCRs Done
3,350,952 UART: [art] Lock RT PCRs Done
3,352,452 UART: [art] Populate DV Done
3,361,061 UART: [fht] FMC Alias Private Key: 7
3,362,023 UART: [art] Derive CDI
3,362,303 UART: [art] Store in slot 0x4
3,448,023 UART: [art] Derive Key Pair
3,448,383 UART: [art] Store priv key in slot 0x5
3,461,342 UART: [art] Derive Key Pair - Done
3,475,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,480 UART: [art] PUB.X = 7D526762D1226E4247A11B7F5725B234CA17E0641EFEA6208E88EB95D5CF7A36922A6BE9F7C44B3555E0B90931269863
3,499,243 UART: [art] PUB.Y = 4D891A550B9F4FBB29C95C69B14A6BD78AAFEE7ED38381B9CAF8317E768272C7870D3D6EB5B16F7E7CAA294F2CA311F1
3,506,205 UART: [art] SIG.R = C44849A112378DF2E9B0568A2F8ACD223A1B2027AAD7CD26674B35F19D639F0ED5EF958B309FA90FDFF08BFFF8843C76
3,512,983 UART: [art] SIG.S = BACB8E6923BA7F996D30ED3C60C11EFE35E803C1F081DA0C96278F98899D2FA19877E148A37390EC971B9729AC8DBB12
3,536,219 UART: Caliptra RT
3,536,562 UART: [state] CFI Enabled
3,657,019 UART: [rt] RT listening for mailbox commands...
3,657,689 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,825 UART: [rt]cmd =0x41544d4e, len=14344
4,090,651 >>> mbox cmd response data (8 bytes)
4,090,652 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,009 UART: [rt]cmd =0x41545348, len=116
4,143,338 >>> mbox cmd response data (12 bytes)
4,143,339 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,173,442 UART: [rt]cmd =0x41545348, len=116
4,175,311 >>> mbox cmd response data (12 bytes)
4,175,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,176,026 UART:
4,176,042 UART: Running Caliptra ROM ...
4,176,450 UART:
4,176,591 UART: [state] CFI Enabled
4,179,297 UART: [state] LifecycleState = Unprovisioned
4,179,952 UART: [state] DebugLocked = No
4,180,438 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,182,009 UART: [kat] SHA2-256
4,975,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,980,055 UART: [kat] ++
4,980,207 UART: [kat] sha1
4,984,525 UART: [kat] SHA2-256
4,986,463 UART: [kat] SHA2-384
4,989,264 UART: [kat] SHA2-512-ACC
4,991,164 UART: [kat] ECC-384
4,996,873 UART: [kat] HMAC-384Kdf
5,001,531 UART: [kat] LMS
5,569,727 UART: [kat] --
5,570,574 UART: [update-reset] ++
6,951,136 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,952,368 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,107,635 >>> mbox cmd response: success
7,107,635 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,107,764 UART: [update-reset] Copying MAN_2 To MAN_1
7,115,778 UART: [update-reset Success] --
7,116,843 UART: [state] Locking Datavault
7,117,785 UART: [state] Locking PCR0, PCR1 and PCR31
7,118,389 UART: [state] Locking ICCM
7,119,063 UART: [exit] Launching FMC @ 0x40000130
7,124,393 UART:
7,124,409 UART: Running Caliptra FMC ...
7,124,817 UART:
7,124,960 UART: [state] CFI Enabled
7,214,673 UART: [art] Extend RT PCRs Done
7,215,101 UART: [art] Lock RT PCRs Done
7,216,448 UART: [art] Populate DV Done
7,224,775 UART: [fht] FMC Alias Private Key: 7
7,225,713 UART: [art] Derive CDI
7,225,993 UART: [art] Store in slot 0x4
7,311,613 UART: [art] Derive Key Pair
7,311,973 UART: [art] Store priv key in slot 0x5
7,324,780 UART: [art] Derive Key Pair - Done
7,339,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,355,156 UART: [art] Erasing AUTHORITY.KEYID = 7
7,355,921 UART: [art] PUB.X = 7D52257FE2F144CC257ECB90290B0493CD669519B72D513914B5CD86D7E0729DDE1151F7F41A6FC3D4B2B183E4BF7E4A
7,362,693 UART: [art] PUB.Y = E14D2DB70AFE796F9436CAFB0E57551A308A0672E7FAB821025E4CF33FAE469F4345494E2BC557217D75A3A22582E21F
7,369,637 UART: [art] SIG.R = 1C7563F4339BC8D09098B5D0D5FD4E1BC096444E6633BF37C5E0E943E6C417A9F82194DE2FD7A460D3AC20266D5BBC80
7,376,415 UART: [art] SIG.S = AB6CFDBB9F81B02815603AEE082855E37DD47D1C7532371A00E14ACBF094AD0417F4E04C7DFF4BEF46F1E136AC384363
7,400,133 UART: Caliptra RT
7,400,476 UART: [state] CFI Enabled
7,763,501 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,794,174 UART: [rt]cmd =0x41545348, len=116
7,816,846 >>> mbox cmd response data (12 bytes)
7,816,847 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,846,724 UART: [rt]cmd =0x41545348, len=116
7,848,517 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,848,518 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,970,987 UART: [rt]cmd =0x41544d4e, len=14344
8,281,179 >>> mbox cmd response data (8 bytes)
8,281,180 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,311,159 UART: [rt]cmd =0x41545348, len=116
8,332,812 >>> mbox cmd response data (12 bytes)
8,332,813 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,362,834 UART: [rt]cmd =0x41545348, len=116
8,364,286 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,160 ready_for_fw is high
1,363,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,641 >>> mbox cmd response: success
3,043,344 UART:
3,043,360 UART: Running Caliptra FMC ...
3,043,768 UART:
3,043,911 UART: [state] CFI Enabled
3,054,567 UART: [fht] FMC Alias Private Key: 7
3,174,341 UART: [art] Extend RT PCRs Done
3,174,769 UART: [art] Lock RT PCRs Done
3,176,507 UART: [art] Populate DV Done
3,184,698 UART: [fht] FMC Alias Private Key: 7
3,185,868 UART: [art] Derive CDI
3,186,148 UART: [art] Store in slot 0x4
3,272,110 UART: [art] Derive Key Pair
3,272,470 UART: [art] Store priv key in slot 0x5
3,285,955 UART: [art] Derive Key Pair - Done
3,300,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,812 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,577 UART: [art] PUB.X = 2A0247BAC6AFEC9C2674558CE18B12DDE5E17E2CAE020B9DFEB566FE63F3B80823FE33A85EF0B05C3FD670C6D267AD0E
3,323,356 UART: [art] PUB.Y = EE921F466EE4376949FA6A476717384B3B28BD973E4BC139FBAC621B70627D883FCB0B48497DB746784D28305783B4E3
3,330,301 UART: [art] SIG.R = FA91EB2F61FD778E2BF4403F88B059492FF5CA77E1A6ACD0DF269F92BA4B03ECE031715FE219FD2656CCEB77631C3B7F
3,337,088 UART: [art] SIG.S = D912A06D5D2BC2315E75589E9514B53FBD311A1FD6740050774F8BB0EA7FECEC8C19F4352FAF76B8A0E531718B3B8B4C
3,360,484 UART: Caliptra RT
3,360,827 UART: [state] CFI Enabled
3,481,058 UART: [rt] RT listening for mailbox commands...
3,481,728 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,768 UART: [rt]cmd =0x41544d4e, len=14344
3,914,832 >>> mbox cmd response data (8 bytes)
3,914,833 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,006 UART: [rt]cmd =0x41545348, len=116
3,966,899 >>> mbox cmd response data (12 bytes)
3,966,900 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,996,935 UART: [rt]cmd =0x41545348, len=116
3,998,672 >>> mbox cmd response data (12 bytes)
3,998,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,813,126 >>> mbox cmd response: success
6,813,126 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,826,256 UART:
6,826,272 UART: Running Caliptra FMC ...
6,826,680 UART:
6,826,823 UART: [state] CFI Enabled
6,915,796 UART: [art] Extend RT PCRs Done
6,916,224 UART: [art] Lock RT PCRs Done
6,917,659 UART: [art] Populate DV Done
6,925,960 UART: [fht] FMC Alias Private Key: 7
6,927,056 UART: [art] Derive CDI
6,927,336 UART: [art] Store in slot 0x4
7,013,274 UART: [art] Derive Key Pair
7,013,634 UART: [art] Store priv key in slot 0x5
7,027,007 UART: [art] Derive Key Pair - Done
7,041,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,056,531 UART: [art] Erasing AUTHORITY.KEYID = 7
7,057,296 UART: [art] PUB.X = B91CD55BE62460CCED1A7B22967CB7EEA8B555F1D6DAF30AA1AD205FE24C7E2B12CAE5C604B7AB97300D6EFF7CD9912F
7,064,085 UART: [art] PUB.Y = BCD24B708D1222B9154BC5047A0F9A329E1081F17F0BFC97CDC2D8C51FF8CC3597979B5B765863B511A13BF6F7AA04BE
7,071,035 UART: [art] SIG.R = 29E0C81C44A30E3628D6BEC64EAA0B7D8D718F60CA1518ABC4B36B767CB85A6DC918E5E7DD594F326BD9281E0CAFB9EC
7,077,818 UART: [art] SIG.S = 3CCF5E593FB408115CA38AC387E3F1E24BE141454DE6EA7959039766667FDC401F6DC2D5126AC6DCBC75A16FDCBF31C3
7,101,788 UART: Caliptra RT
7,102,131 UART: [state] CFI Enabled
7,465,157 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,496,128 UART: [rt]cmd =0x41545348, len=116
7,518,824 >>> mbox cmd response data (12 bytes)
7,518,825 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,548,944 UART: [rt]cmd =0x41545348, len=116
7,550,493 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,550,494 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,672,947 UART: [rt]cmd =0x41544d4e, len=14344
7,982,683 >>> mbox cmd response data (8 bytes)
7,982,684 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,012,919 UART: [rt]cmd =0x41545348, len=116
8,034,808 >>> mbox cmd response data (12 bytes)
8,034,809 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,064,910 UART: [rt]cmd =0x41545348, len=116
8,066,436 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.90s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,700 UART: [state] LifecycleState = Unprovisioned
85,355 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,342 UART: [kat] SHA2-256
890,892 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,996 UART: [kat] ++
895,148 UART: [kat] sha1
899,248 UART: [kat] SHA2-256
901,188 UART: [kat] SHA2-384
904,035 UART: [kat] SHA2-512-ACC
905,936 UART: [kat] ECC-384
915,749 UART: [kat] HMAC-384Kdf
920,219 UART: [kat] LMS
1,168,531 UART: [kat] --
1,169,210 UART: [cold-reset] ++
1,169,772 UART: [fht] FHT @ 0x50003400
1,172,302 UART: [idev] ++
1,172,470 UART: [idev] CDI.KEYID = 6
1,172,831 UART: [idev] SUBJECT.KEYID = 7
1,173,256 UART: [idev] UDS.KEYID = 0
1,173,602 ready_for_fw is high
1,173,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,453 UART: [idev] Erasing UDS.KEYID = 0
1,198,021 UART: [idev] Sha1 KeyId Algorithm
1,206,845 UART: [idev] --
1,207,852 UART: [ldev] ++
1,208,020 UART: [ldev] CDI.KEYID = 6
1,208,384 UART: [ldev] SUBJECT.KEYID = 5
1,208,811 UART: [ldev] AUTHORITY.KEYID = 7
1,209,274 UART: [ldev] FE.KEYID = 1
1,214,498 UART: [ldev] Erasing FE.KEYID = 1
1,240,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,120 UART: [ldev] --
1,280,413 UART: [fwproc] Wait for Commands...
1,281,138 UART: [fwproc] Recv command 0x46574c44
1,281,871 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,731 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,906 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,143 >>> mbox cmd response: success
2,826,255 UART: [afmc] ++
2,826,423 UART: [afmc] CDI.KEYID = 6
2,826,786 UART: [afmc] SUBJECT.KEYID = 7
2,827,212 UART: [afmc] AUTHORITY.KEYID = 5
2,862,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,177 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,887 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,768 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,469 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,308 UART: [afmc] --
2,906,313 UART: [cold-reset] --
2,906,907 UART: [state] Locking Datavault
2,908,226 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,830 UART: [state] Locking ICCM
2,909,292 UART: [exit] Launching FMC @ 0x40000130
2,914,622 UART:
2,914,638 UART: Running Caliptra FMC ...
2,915,046 UART:
2,915,100 UART: [state] CFI Enabled
2,925,362 UART: [fht] FMC Alias Private Key: 7
3,044,432 UART: [art] Extend RT PCRs Done
3,044,860 UART: [art] Lock RT PCRs Done
3,046,164 UART: [art] Populate DV Done
3,054,493 UART: [fht] FMC Alias Private Key: 7
3,055,561 UART: [art] Derive CDI
3,055,841 UART: [art] Store in slot 0x4
3,141,600 UART: [art] Derive Key Pair
3,141,960 UART: [art] Store priv key in slot 0x5
3,155,542 UART: [art] Derive Key Pair - Done
3,170,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,009 UART: [art] PUB.X = 0798BE9F730ECFD116A5F2E69737C680877B08D2C1B6C9AC800821D9993DC3E3E8966BAF3BBD0161235A0E0D1CA6164A
3,192,766 UART: [art] PUB.Y = 1613B4845B0F425C85671CE0139234B8A17F5BC1F7E286311F4BD2430B659C7F497C8A99F82B4699366DD160FCC03755
3,199,704 UART: [art] SIG.R = C28DD6602B79AF827EDF97D9538C6DED5EE68CF68B4674A31E7F228A704AC66F2BFABCBA4D4A446A9429DBF8A17A28A6
3,206,496 UART: [art] SIG.S = FE6126C48C162DF88B9007C6B1DC348608E19E69A0EAAC2751A0DBFF4946B1ACC71EC89FF7E34BFD2D71F979A68D1B88
3,230,356 UART: Caliptra RT
3,230,607 UART: [state] CFI Enabled
3,351,281 UART: [rt] RT listening for mailbox commands...
3,351,951 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,897 UART: [rt]cmd =0x41544d4e, len=14344
3,785,285 >>> mbox cmd response data (8 bytes)
3,785,286 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,129 UART: [rt]cmd =0x41545348, len=116
3,837,060 >>> mbox cmd response data (12 bytes)
3,837,061 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,867,292 UART: [rt]cmd =0x41545348, len=116
3,869,005 >>> mbox cmd response data (12 bytes)
3,869,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,869,731 UART:
3,869,747 UART: Running Caliptra ROM ...
3,870,155 UART:
3,870,210 UART: [state] CFI Enabled
3,872,616 UART: [state] LifecycleState = Unprovisioned
3,873,271 UART: [state] DebugLocked = No
3,873,787 UART: [state] WD Timer not started. Device not locked for debugging
3,875,121 UART: [kat] SHA2-256
4,678,671 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,682,775 UART: [kat] ++
4,682,927 UART: [kat] sha1
4,687,257 UART: [kat] SHA2-256
4,689,197 UART: [kat] SHA2-384
4,691,944 UART: [kat] SHA2-512-ACC
4,693,844 UART: [kat] ECC-384
4,703,369 UART: [kat] HMAC-384Kdf
4,707,985 UART: [kat] LMS
4,956,297 UART: [kat] --
4,957,157 UART: [update-reset] ++
6,317,340 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,318,487 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,473,702 >>> mbox cmd response: success
6,473,702 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,474,017 UART: [update-reset] Copying MAN_2 To MAN_1
6,482,031 UART: [update-reset Success] --
6,482,938 UART: [state] Locking Datavault
6,483,716 UART: [state] Locking PCR0, PCR1 and PCR31
6,484,320 UART: [state] Locking ICCM
6,484,994 UART: [exit] Launching FMC @ 0x40000130
6,490,324 UART:
6,490,340 UART: Running Caliptra FMC ...
6,490,748 UART:
6,490,802 UART: [state] CFI Enabled
6,579,715 UART: [art] Extend RT PCRs Done
6,580,143 UART: [art] Lock RT PCRs Done
6,581,264 UART: [art] Populate DV Done
6,589,425 UART: [fht] FMC Alias Private Key: 7
6,590,387 UART: [art] Derive CDI
6,590,667 UART: [art] Store in slot 0x4
6,676,434 UART: [art] Derive Key Pair
6,676,794 UART: [art] Store priv key in slot 0x5
6,690,054 UART: [art] Derive Key Pair - Done
6,704,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,719,738 UART: [art] Erasing AUTHORITY.KEYID = 7
6,720,503 UART: [art] PUB.X = 1CA133E8301FBC2A8F331A99779CBD06CAB8BD4257AC79528A5A3C85ADF9346190651C415A4CA83D599D394015C359E9
6,727,274 UART: [art] PUB.Y = F55242DD616D187605A7255D76FF2D3064490D5D1B061F70DD1B18F20461323DFC671AC602FD953C4C2B26DE2501CF8F
6,734,208 UART: [art] SIG.R = A9EB06CBDE871FA80AF9BA06251EE071E578CF9C0D92876BA571C225D8EE74243BC068C4EFD4BD4F232A6717D4AB8601
6,740,979 UART: [art] SIG.S = E72E914C7A5E221903F79643EEBB680A17A0F781707C5B60D5A2F42207FD1E2FBB8BD6FBC2F951A7471D5E000FFA65FB
6,765,371 UART: Caliptra RT
6,765,622 UART: [state] CFI Enabled
7,129,223 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,159,996 UART: [rt]cmd =0x41545348, len=116
7,181,626 >>> mbox cmd response data (12 bytes)
7,181,627 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,211,824 UART: [rt]cmd =0x41545348, len=116
7,213,369 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,213,370 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,335,963 UART: [rt]cmd =0x41544d4e, len=14344
7,645,685 >>> mbox cmd response data (8 bytes)
7,645,686 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,675,899 UART: [rt]cmd =0x41545348, len=116
7,698,398 >>> mbox cmd response data (12 bytes)
7,698,399 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,728,554 UART: [rt]cmd =0x41545348, len=116
7,730,392 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.74s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,654 ready_for_fw is high
1,058,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,866 >>> mbox cmd response: success
2,741,211 UART:
2,741,227 UART: Running Caliptra FMC ...
2,741,635 UART:
2,741,689 UART: [state] CFI Enabled
2,752,145 UART: [fht] FMC Alias Private Key: 7
2,871,631 UART: [art] Extend RT PCRs Done
2,872,059 UART: [art] Lock RT PCRs Done
2,873,517 UART: [art] Populate DV Done
2,881,778 UART: [fht] FMC Alias Private Key: 7
2,882,770 UART: [art] Derive CDI
2,883,050 UART: [art] Store in slot 0x4
2,968,919 UART: [art] Derive Key Pair
2,969,279 UART: [art] Store priv key in slot 0x5
2,982,337 UART: [art] Derive Key Pair - Done
2,997,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,982 UART: [art] PUB.X = 587D624949A583546099D7B8CCB25960457D1D82F31F16C36E902535747A54282D3DFD2A132FCEBC9CDBC2128001AAA5
3,019,749 UART: [art] PUB.Y = 1EF7B2B2E063CC337D0D984FC0E3E5B7123DE17DE47A8C57611F96DF34869E00AA7E1E0FBC75897C81602AF0D844235C
3,026,681 UART: [art] SIG.R = 1317712B7018E9E5EF08E190642D7C04BBE38B5B192C7A5D876A731F64099DBBBD782917B05E5E221B5C7178E21894EA
3,033,442 UART: [art] SIG.S = 2C8551728C37C71E2C1FC455EDCB5243726F61B1E03C8B89B61100750B4A8319E0B22276ECA9E0162043D0E0A501BA5F
3,057,136 UART: Caliptra RT
3,057,387 UART: [state] CFI Enabled
3,176,317 UART: [rt] RT listening for mailbox commands...
3,176,987 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,907 UART: [rt]cmd =0x41544d4e, len=14344
3,609,877 >>> mbox cmd response data (8 bytes)
3,609,878 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,947 UART: [rt]cmd =0x41545348, len=116
3,661,836 >>> mbox cmd response data (12 bytes)
3,661,837 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,866 UART: [rt]cmd =0x41545348, len=116
3,693,559 >>> mbox cmd response data (12 bytes)
3,693,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,181,868 >>> mbox cmd response: success
6,181,868 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,195,025 UART:
6,195,041 UART: Running Caliptra FMC ...
6,195,449 UART:
6,195,503 UART: [state] CFI Enabled
6,284,974 UART: [art] Extend RT PCRs Done
6,285,402 UART: [art] Lock RT PCRs Done
6,286,861 UART: [art] Populate DV Done
6,295,082 UART: [fht] FMC Alias Private Key: 7
6,296,034 UART: [art] Derive CDI
6,296,314 UART: [art] Store in slot 0x4
6,382,233 UART: [art] Derive Key Pair
6,382,593 UART: [art] Store priv key in slot 0x5
6,395,585 UART: [art] Derive Key Pair - Done
6,410,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,425,441 UART: [art] Erasing AUTHORITY.KEYID = 7
6,426,206 UART: [art] PUB.X = 5C901F634C81CD5EC42869B83F5B1301BEB52578E1CDD394016654EFEC4BE9CF6BB72B23EC232EC7D73DBA838E83851F
6,432,984 UART: [art] PUB.Y = 0069DA090FFD4422ECB5C7434B1DCE631D5D07423B1D883FE738C715B4BBA66A28F956CD4B6AEA1F8F1A348213858601
6,439,908 UART: [art] SIG.R = D0380922456E42402713CDB1451F5CFFB8F277B77E6EA698D5479B8AC121BD5C8B1E3E2AD7DDB57AB11BC640B14A7888
6,446,685 UART: [art] SIG.S = 3F40FBBE1E96C859BD5E9E566182E3DA23FCF93AAF5926B3A243AC5A1FBC759DE1D4CF38D401F9605CFFB9BD9A65E992
6,471,062 UART: Caliptra RT
6,471,313 UART: [state] CFI Enabled
6,837,577 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,868,368 UART: [rt]cmd =0x41545348, len=116
6,891,330 >>> mbox cmd response data (12 bytes)
6,891,331 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,921,492 UART: [rt]cmd =0x41545348, len=116
6,923,137 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,923,138 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,045,733 UART: [rt]cmd =0x41544d4e, len=14344
7,355,251 >>> mbox cmd response data (8 bytes)
7,355,252 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,385,487 UART: [rt]cmd =0x41545348, len=116
7,407,870 >>> mbox cmd response data (12 bytes)
7,407,871 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,437,912 UART: [rt]cmd =0x41545348, len=116
7,439,908 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,589 UART: [kat] SHA2-256
901,529 UART: [kat] SHA2-384
904,426 UART: [kat] SHA2-512-ACC
906,327 UART: [kat] ECC-384
916,074 UART: [kat] HMAC-384Kdf
920,738 UART: [kat] LMS
1,169,050 UART: [kat] --
1,170,015 UART: [cold-reset] ++
1,170,493 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,174,511 ready_for_fw is high
1,174,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,554 UART: [idev] Erasing UDS.KEYID = 0
1,199,292 UART: [idev] Sha1 KeyId Algorithm
1,208,128 UART: [idev] --
1,208,977 UART: [ldev] ++
1,209,145 UART: [ldev] CDI.KEYID = 6
1,209,509 UART: [ldev] SUBJECT.KEYID = 5
1,209,936 UART: [ldev] AUTHORITY.KEYID = 7
1,210,399 UART: [ldev] FE.KEYID = 1
1,215,759 UART: [ldev] Erasing FE.KEYID = 1
1,242,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,399 UART: [ldev] --
1,281,628 UART: [fwproc] Wait for Commands...
1,282,407 UART: [fwproc] Recv command 0x46574c44
1,283,140 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,084 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,259 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,568 >>> mbox cmd response: success
2,827,740 UART: [afmc] ++
2,827,908 UART: [afmc] CDI.KEYID = 6
2,828,271 UART: [afmc] SUBJECT.KEYID = 7
2,828,697 UART: [afmc] AUTHORITY.KEYID = 5
2,864,642 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,880 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,590 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,471 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,172 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,067 UART: [afmc] --
2,908,036 UART: [cold-reset] --
2,909,040 UART: [state] Locking Datavault
2,910,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,139 UART: [state] Locking ICCM
2,911,567 UART: [exit] Launching FMC @ 0x40000130
2,916,897 UART:
2,916,913 UART: Running Caliptra FMC ...
2,917,321 UART:
2,917,464 UART: [state] CFI Enabled
2,927,598 UART: [fht] FMC Alias Private Key: 7
3,046,700 UART: [art] Extend RT PCRs Done
3,047,128 UART: [art] Lock RT PCRs Done
3,048,810 UART: [art] Populate DV Done
3,056,983 UART: [fht] FMC Alias Private Key: 7
3,057,981 UART: [art] Derive CDI
3,058,261 UART: [art] Store in slot 0x4
3,144,232 UART: [art] Derive Key Pair
3,144,592 UART: [art] Store priv key in slot 0x5
3,158,074 UART: [art] Derive Key Pair - Done
3,173,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,572 UART: [art] PUB.X = 70BB92A7462A5AC820FC57BB056FF8BCD8A0F577F2EE83A01ABDA2995A3110C60F8D3627C17192B4BA74AC2B18497F2E
3,196,350 UART: [art] PUB.Y = 882AF46F50BABAF3FF4FB65E1DCD57830CA5C5613EC81733E164121299CECC62A46BDDC1417B986A71DF93FFEB2975DA
3,203,317 UART: [art] SIG.R = FC0A70BED8E799FA962878EDE51AF055E4EDFCE856CFA144179E9E0F60DD77089F011D73B621CB97D788E52E68AEBB77
3,210,093 UART: [art] SIG.S = 6F2841964CDE67719AB519602EE23EC52F5EC4CE2A6A18E8901CA0DF78C56C7DC3BB9E75B7037353F1D4B973296B34D6
3,234,446 UART: Caliptra RT
3,234,789 UART: [state] CFI Enabled
3,354,838 UART: [rt] RT listening for mailbox commands...
3,355,508 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,818 UART: [rt]cmd =0x41544d4e, len=14344
3,788,486 >>> mbox cmd response data (8 bytes)
3,788,487 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,366 UART: [rt]cmd =0x41545348, len=116
3,840,869 >>> mbox cmd response data (12 bytes)
3,840,870 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,870,843 UART: [rt]cmd =0x41545348, len=116
3,872,392 >>> mbox cmd response data (12 bytes)
3,872,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,873,054 UART:
3,873,070 UART: Running Caliptra ROM ...
3,873,478 UART:
3,873,620 UART: [state] CFI Enabled
3,876,184 UART: [state] LifecycleState = Unprovisioned
3,876,839 UART: [state] DebugLocked = No
3,877,475 UART: [state] WD Timer not started. Device not locked for debugging
3,878,669 UART: [kat] SHA2-256
4,682,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,686,323 UART: [kat] ++
4,686,475 UART: [kat] sha1
4,690,799 UART: [kat] SHA2-256
4,692,739 UART: [kat] SHA2-384
4,695,560 UART: [kat] SHA2-512-ACC
4,697,460 UART: [kat] ECC-384
4,707,313 UART: [kat] HMAC-384Kdf
4,712,001 UART: [kat] LMS
4,960,313 UART: [kat] --
4,960,977 UART: [update-reset] ++
6,319,794 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,320,855 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,476,070 >>> mbox cmd response: success
6,476,070 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,476,417 UART: [update-reset] Copying MAN_2 To MAN_1
6,484,431 UART: [update-reset Success] --
6,485,176 UART: [state] Locking Datavault
6,486,056 UART: [state] Locking PCR0, PCR1 and PCR31
6,486,660 UART: [state] Locking ICCM
6,487,214 UART: [exit] Launching FMC @ 0x40000130
6,492,544 UART:
6,492,560 UART: Running Caliptra FMC ...
6,492,968 UART:
6,493,111 UART: [state] CFI Enabled
6,582,586 UART: [art] Extend RT PCRs Done
6,583,014 UART: [art] Lock RT PCRs Done
6,584,027 UART: [art] Populate DV Done
6,592,066 UART: [fht] FMC Alias Private Key: 7
6,593,126 UART: [art] Derive CDI
6,593,406 UART: [art] Store in slot 0x4
6,679,193 UART: [art] Derive Key Pair
6,679,553 UART: [art] Store priv key in slot 0x5
6,693,027 UART: [art] Derive Key Pair - Done
6,708,025 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,723,182 UART: [art] Erasing AUTHORITY.KEYID = 7
6,723,947 UART: [art] PUB.X = 6B2A929CD29D396DCD8917976CBE77F2FE85E0A7D6A58879A453597A4E8FD304F7C8203C871952981F680F38C0404EB8
6,730,711 UART: [art] PUB.Y = 2579D3AF61FE45FB1B8FE589A9B9F4F0FC68B5F40EAFA52AFBEB0E3C37F04F82B708778FC7E69DDDCA3D25D94E57DA7E
6,737,682 UART: [art] SIG.R = E7DBE2CE93558F44F235812E0F50ADFA42F71B5C15C8DB12D606FD13013B4EFAE5F907EABBB43FA8408FCEDCAFCFAF26
6,744,472 UART: [art] SIG.S = 2D23A408446AAE82291804573D64A44987EA6BCC4D764A30BA158F31AC542F0A422446614946DC83DDCC8C70D073F03C
6,768,005 UART: Caliptra RT
6,768,348 UART: [state] CFI Enabled
7,131,640 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,162,573 UART: [rt]cmd =0x41545348, len=116
7,184,553 >>> mbox cmd response data (12 bytes)
7,184,554 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,214,741 UART: [rt]cmd =0x41545348, len=116
7,216,304 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,216,305 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,338,928 UART: [rt]cmd =0x41544d4e, len=14344
7,649,140 >>> mbox cmd response data (8 bytes)
7,649,141 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,679,362 UART: [rt]cmd =0x41545348, len=116
7,701,631 >>> mbox cmd response data (12 bytes)
7,701,632 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,731,903 UART: [rt]cmd =0x41545348, len=116
7,733,469 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,815 ready_for_fw is high
1,059,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,081 >>> mbox cmd response: success
2,741,830 UART:
2,741,846 UART: Running Caliptra FMC ...
2,742,254 UART:
2,742,397 UART: [state] CFI Enabled
2,752,985 UART: [fht] FMC Alias Private Key: 7
2,872,279 UART: [art] Extend RT PCRs Done
2,872,707 UART: [art] Lock RT PCRs Done
2,874,563 UART: [art] Populate DV Done
2,882,832 UART: [fht] FMC Alias Private Key: 7
2,884,002 UART: [art] Derive CDI
2,884,282 UART: [art] Store in slot 0x4
2,970,421 UART: [art] Derive Key Pair
2,970,781 UART: [art] Store priv key in slot 0x5
2,984,051 UART: [art] Derive Key Pair - Done
2,998,905 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,632 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,397 UART: [art] PUB.X = AC8562BF4CC045E197C9FE65DA5AF5A094B546AFDC2892048641AA1355C07BD1D299261E777FE248B32B2E227028DFAC
3,022,174 UART: [art] PUB.Y = C9334F992A545901EFEF24D852148C4F5802DA1D9434725F63EB4ACDCC584595D430A63ED20C76D30E63377583CC9EF8
3,029,114 UART: [art] SIG.R = 4F36C82ADB7923C16C5242A00E86E0A1B683197BE4A74266EA9C2D59FE4B3F55C5F34E26A6782263335439C5FDD54F50
3,035,883 UART: [art] SIG.S = 2D2573E6F2729872C31D9BD2DADF0E04D76A0E8D860DC6736D3E41A29E8F123790C67EB9E83BA422D04514DA73D8022A
3,059,810 UART: Caliptra RT
3,060,153 UART: [state] CFI Enabled
3,179,489 UART: [rt] RT listening for mailbox commands...
3,180,159 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,995 UART: [rt]cmd =0x41544d4e, len=14344
3,613,125 >>> mbox cmd response data (8 bytes)
3,613,126 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,311 UART: [rt]cmd =0x41545348, len=116
3,665,510 >>> mbox cmd response data (12 bytes)
3,665,511 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,695,532 UART: [rt]cmd =0x41545348, len=116
3,696,989 >>> mbox cmd response data (12 bytes)
3,696,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,186,165 >>> mbox cmd response: success
6,186,165 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,199,274 UART:
6,199,290 UART: Running Caliptra FMC ...
6,199,698 UART:
6,199,841 UART: [state] CFI Enabled
6,288,862 UART: [art] Extend RT PCRs Done
6,289,290 UART: [art] Lock RT PCRs Done
6,290,615 UART: [art] Populate DV Done
6,298,970 UART: [fht] FMC Alias Private Key: 7
6,299,952 UART: [art] Derive CDI
6,300,232 UART: [art] Store in slot 0x4
6,386,245 UART: [art] Derive Key Pair
6,386,605 UART: [art] Store priv key in slot 0x5
6,399,949 UART: [art] Derive Key Pair - Done
6,414,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,430,689 UART: [art] Erasing AUTHORITY.KEYID = 7
6,431,454 UART: [art] PUB.X = 75672B32CB1F7B613F40F7D5A467052084F2D70164B9315C3F0CCF1B0AEFD3FD98E1B49A55970A5880718DC17C1DFD75
6,438,215 UART: [art] PUB.Y = 857A640074EA68B73FCDDCDAD8FEF370510D8EB0EA8D922B0A3F7E92967B107A6052F0DCFF7D458C4FB704CBF77DE0AD
6,445,158 UART: [art] SIG.R = BBF00F35A3B5BBDE28542D755CC384849E85F003D65DCF7B45194DA12892C0475A47271F0D860E51AF6E2B58D4A1E117
6,451,922 UART: [art] SIG.S = DD46372CB40BD3584FD08E9EB17CD724845611419EF0A977C55DB2B777F8641D007A9C0D0DD733D8D4F67BB553A82A59
6,475,295 UART: Caliptra RT
6,475,638 UART: [state] CFI Enabled
6,841,007 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,872,138 UART: [rt]cmd =0x41545348, len=116
6,894,486 >>> mbox cmd response data (12 bytes)
6,894,487 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,924,738 UART: [rt]cmd =0x41545348, len=116
6,926,567 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,926,568 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,048,945 UART: [rt]cmd =0x41544d4e, len=14344
7,359,127 >>> mbox cmd response data (8 bytes)
7,359,128 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,389,299 UART: [rt]cmd =0x41545348, len=116
7,411,644 >>> mbox cmd response data (12 bytes)
7,411,645 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,441,830 UART: [rt]cmd =0x41545348, len=116
7,443,670 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
893,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,495 UART: [kat] ++
897,647 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,478 UART: [kat] SHA2-512-ACC
908,379 UART: [kat] ECC-384
918,246 UART: [kat] HMAC-384Kdf
923,000 UART: [kat] LMS
1,171,328 UART: [kat] --
1,172,065 UART: [cold-reset] ++
1,172,643 UART: [fht] FHT @ 0x50003400
1,175,390 UART: [idev] ++
1,175,558 UART: [idev] CDI.KEYID = 6
1,175,918 UART: [idev] SUBJECT.KEYID = 7
1,176,342 UART: [idev] UDS.KEYID = 0
1,176,687 ready_for_fw is high
1,176,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,572 UART: [idev] Erasing UDS.KEYID = 0
1,201,285 UART: [idev] Sha1 KeyId Algorithm
1,209,979 UART: [idev] --
1,211,029 UART: [ldev] ++
1,211,197 UART: [ldev] CDI.KEYID = 6
1,211,560 UART: [ldev] SUBJECT.KEYID = 5
1,211,986 UART: [ldev] AUTHORITY.KEYID = 7
1,212,449 UART: [ldev] FE.KEYID = 1
1,217,593 UART: [ldev] Erasing FE.KEYID = 1
1,243,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,167 UART: [ldev] --
1,282,678 UART: [fwproc] Wait for Commands...
1,283,474 UART: [fwproc] Recv command 0x46574c44
1,284,202 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,402 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,572 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,927 >>> mbox cmd response: success
2,828,991 UART: [afmc] ++
2,829,159 UART: [afmc] CDI.KEYID = 6
2,829,521 UART: [afmc] SUBJECT.KEYID = 7
2,829,946 UART: [afmc] AUTHORITY.KEYID = 5
2,865,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,948 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,657 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,540 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,241 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,103 UART: [afmc] --
2,909,069 UART: [cold-reset] --
2,910,031 UART: [state] Locking Datavault
2,911,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,000 UART: [state] Locking ICCM
2,912,540 UART: [exit] Launching FMC @ 0x40000130
2,917,870 UART:
2,917,886 UART: Running Caliptra FMC ...
2,918,294 UART:
2,918,348 UART: [state] CFI Enabled
2,928,674 UART: [fht] FMC Alias Private Key: 7
3,047,902 UART: [art] Extend RT PCRs Done
3,048,330 UART: [art] Lock RT PCRs Done
3,050,008 UART: [art] Populate DV Done
3,058,327 UART: [fht] FMC Alias Private Key: 7
3,059,437 UART: [art] Derive CDI
3,059,717 UART: [art] Store in slot 0x4
3,145,574 UART: [art] Derive Key Pair
3,145,934 UART: [art] Store priv key in slot 0x5
3,158,834 UART: [art] Derive Key Pair - Done
3,173,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,117 UART: [art] PUB.X = 89EC747D1D2C20ACEC2E2013F3A3092525B9C4DE843293D428F072E0D59CD16C6A85B70F611B10342DE5B2F6A2388A73
3,196,885 UART: [art] PUB.Y = A55B2503A43DEDB814E1B6EA14DA4B4B5B3940502FAF7A131302BD8EE9A15E21BE0D4B43E71B97BD8F211724A45A10B6
3,203,840 UART: [art] SIG.R = B17D639BC010079A61BA5AB3F6867E24B1DB41CD8F0870673116723FB8A69ED414B6F4DEB22ACFB5B8ACFEA6CA71EBA4
3,210,626 UART: [art] SIG.S = 4DBCCB8AFA82161847F02325883911BD4BD8C8F13E0F80FA6CBB00BFDB7323C20AC7A55AE3BB6F4DE2B1C2F22EA0A2E2
3,234,402 UART: Caliptra RT
3,234,653 UART: [state] CFI Enabled
3,354,390 UART: [rt] RT listening for mailbox commands...
3,355,060 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,292 UART: [rt]cmd =0x41544d4e, len=14344
3,787,828 >>> mbox cmd response data (8 bytes)
3,787,829 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,994 UART: [rt]cmd =0x41545348, len=116
3,841,215 >>> mbox cmd response data (12 bytes)
3,841,216 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,871,331 UART: [rt]cmd =0x41545348, len=116
3,873,056 >>> mbox cmd response data (12 bytes)
3,873,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,873,988 UART:
3,874,004 UART: Running Caliptra ROM ...
3,874,412 UART:
3,874,467 UART: [state] CFI Enabled
3,877,393 UART: [state] LifecycleState = Unprovisioned
3,878,048 UART: [state] DebugLocked = No
3,878,728 UART: [state] WD Timer not started. Device not locked for debugging
3,879,978 UART: [kat] SHA2-256
4,685,628 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,689,753 UART: [kat] ++
4,689,905 UART: [kat] sha1
4,694,189 UART: [kat] SHA2-256
4,696,129 UART: [kat] SHA2-384
4,698,884 UART: [kat] SHA2-512-ACC
4,700,784 UART: [kat] ECC-384
4,710,589 UART: [kat] HMAC-384Kdf
4,715,121 UART: [kat] LMS
4,963,449 UART: [kat] --
4,964,325 UART: [update-reset] ++
6,324,625 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,325,768 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,480,983 >>> mbox cmd response: success
6,480,983 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,481,096 UART: [update-reset] Copying MAN_2 To MAN_1
6,489,110 UART: [update-reset Success] --
6,490,115 UART: [state] Locking Datavault
6,490,819 UART: [state] Locking PCR0, PCR1 and PCR31
6,491,423 UART: [state] Locking ICCM
6,492,001 UART: [exit] Launching FMC @ 0x40000130
6,497,331 UART:
6,497,347 UART: Running Caliptra FMC ...
6,497,755 UART:
6,497,809 UART: [state] CFI Enabled
6,586,424 UART: [art] Extend RT PCRs Done
6,586,852 UART: [art] Lock RT PCRs Done
6,588,121 UART: [art] Populate DV Done
6,596,242 UART: [fht] FMC Alias Private Key: 7
6,597,408 UART: [art] Derive CDI
6,597,688 UART: [art] Store in slot 0x4
6,683,393 UART: [art] Derive Key Pair
6,683,753 UART: [art] Store priv key in slot 0x5
6,697,193 UART: [art] Derive Key Pair - Done
6,712,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,728,219 UART: [art] Erasing AUTHORITY.KEYID = 7
6,728,984 UART: [art] PUB.X = 46CA2B396A43AC68D60857DA13DABEF1AA7424FB0380B8C626FB53ABAE12B8F66FAE7ABBBACAD126DC02EA2DFB554662
6,735,775 UART: [art] PUB.Y = 67799CA12E29BC303BDAA69488C38FB9B261648CF913B0FE28880A2A13DA830B82D51764AB20048DA98C62957F5EBB9B
6,742,722 UART: [art] SIG.R = B1687B759B650D3CC22B1ED8FBFDEA10D918C77BED8023120F990EB95FA53ACC38E57DDC03D9453F323959B5F4D58D4E
6,749,496 UART: [art] SIG.S = 161989ECE24CCE3DFF062E3199F5EDD967CB7EFECD6DEC60CF0A457D9EE21CAA0050FB21DC595D8B80BBC86F0C017F16
6,773,424 UART: Caliptra RT
6,773,675 UART: [state] CFI Enabled
7,137,717 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,168,448 UART: [rt]cmd =0x41545348, len=116
7,190,550 >>> mbox cmd response data (12 bytes)
7,190,551 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,220,744 UART: [rt]cmd =0x41545348, len=116
7,222,405 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,222,406 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,345,023 UART: [rt]cmd =0x41544d4e, len=14344
7,654,929 >>> mbox cmd response data (8 bytes)
7,654,930 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,685,041 UART: [rt]cmd =0x41545348, len=116
7,706,724 >>> mbox cmd response data (12 bytes)
7,706,725 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,736,808 UART: [rt]cmd =0x41545348, len=116
7,738,266 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,539 ready_for_fw is high
1,060,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,426 >>> mbox cmd response: success
2,741,345 UART:
2,741,361 UART: Running Caliptra FMC ...
2,741,769 UART:
2,741,823 UART: [state] CFI Enabled
2,752,365 UART: [fht] FMC Alias Private Key: 7
2,871,169 UART: [art] Extend RT PCRs Done
2,871,597 UART: [art] Lock RT PCRs Done
2,873,105 UART: [art] Populate DV Done
2,881,330 UART: [fht] FMC Alias Private Key: 7
2,882,414 UART: [art] Derive CDI
2,882,694 UART: [art] Store in slot 0x4
2,968,059 UART: [art] Derive Key Pair
2,968,419 UART: [art] Store priv key in slot 0x5
2,982,093 UART: [art] Derive Key Pair - Done
2,996,341 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,857 UART: [art] PUB.X = 72395A79D3661A0A2E09AFCE9BF51882A2881F331F72E18C1F740796BE4DD442555C92CA5F8156DE94ACA7AA1B5BA56C
3,019,628 UART: [art] PUB.Y = CCCA1CFF55AA80B11CDA89432C0F6B786201214A48F7A8CA9A6A5882E8EA528685B566A845DCE358AFC1E2638782AAD5
3,026,586 UART: [art] SIG.R = DA8E83E431100F022EB1FB48D183AC2129ADAC657B30919CF2F4EE502C919F7653F8DFBF442FA241324EC5918E7FE538
3,033,360 UART: [art] SIG.S = 96BF2C30BEA45207353A2D3BBF0A5A3719A81C2A834CC221EE8F47AE0BBE6C0504600A2FA1A362F063EABB41E508986F
3,056,691 UART: Caliptra RT
3,056,942 UART: [state] CFI Enabled
3,175,778 UART: [rt] RT listening for mailbox commands...
3,176,448 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,470 UART: [rt]cmd =0x41544d4e, len=14344
3,609,914 >>> mbox cmd response data (8 bytes)
3,609,915 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,078 UART: [rt]cmd =0x41545348, len=116
3,662,481 >>> mbox cmd response data (12 bytes)
3,662,482 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,692,543 UART: [rt]cmd =0x41545348, len=116
3,694,280 >>> mbox cmd response data (12 bytes)
3,694,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,182,931 >>> mbox cmd response: success
6,182,931 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,196,364 UART:
6,196,380 UART: Running Caliptra FMC ...
6,196,788 UART:
6,196,842 UART: [state] CFI Enabled
6,286,331 UART: [art] Extend RT PCRs Done
6,286,759 UART: [art] Lock RT PCRs Done
6,288,012 UART: [art] Populate DV Done
6,296,107 UART: [fht] FMC Alias Private Key: 7
6,297,199 UART: [art] Derive CDI
6,297,479 UART: [art] Store in slot 0x4
6,383,598 UART: [art] Derive Key Pair
6,383,958 UART: [art] Store priv key in slot 0x5
6,397,554 UART: [art] Derive Key Pair - Done
6,412,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,427,791 UART: [art] Erasing AUTHORITY.KEYID = 7
6,428,556 UART: [art] PUB.X = 97E9FD10791E3B1EBF2E7628209566C19DF9FA43BFD07704BA373EEF7569297890CF01D47110FCB0C422949644EB081D
6,435,319 UART: [art] PUB.Y = 82B4531794A13696BDAF621F42E5223C561C2A42424FE504CF284277635EAD6FC529DFF8BDAD23A455217D05498BEDEC
6,442,269 UART: [art] SIG.R = 0BA6A721318618B244E5502CC696FC6D85991F794B4159BAA5A23788255004EB2314489CD3D9BBEDEB256B4100456733
6,449,005 UART: [art] SIG.S = 1D03CBBC0598B2E32156C316F95A982C15D01DF8D150DCE4B37103E540398494EBEAC33767469C800AA34DB534D48E4D
6,472,865 UART: Caliptra RT
6,473,116 UART: [state] CFI Enabled
6,837,539 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,868,548 UART: [rt]cmd =0x41545348, len=116
6,890,566 >>> mbox cmd response data (12 bytes)
6,890,567 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,920,682 UART: [rt]cmd =0x41545348, len=116
6,922,821 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,922,822 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,045,247 UART: [rt]cmd =0x41544d4e, len=14344
7,355,387 >>> mbox cmd response data (8 bytes)
7,355,388 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,385,343 UART: [rt]cmd =0x41545348, len=116
7,408,678 >>> mbox cmd response data (12 bytes)
7,408,679 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,438,834 UART: [rt]cmd =0x41545348, len=116
7,440,410 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.65s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,579 UART: [kat] SHA2-256
893,229 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,354 UART: [kat] ++
897,506 UART: [kat] sha1
901,692 UART: [kat] SHA2-256
903,632 UART: [kat] SHA2-384
906,409 UART: [kat] SHA2-512-ACC
908,310 UART: [kat] ECC-384
918,295 UART: [kat] HMAC-384Kdf
923,135 UART: [kat] LMS
1,171,463 UART: [kat] --
1,172,124 UART: [cold-reset] ++
1,172,662 UART: [fht] FHT @ 0x50003400
1,175,219 UART: [idev] ++
1,175,387 UART: [idev] CDI.KEYID = 6
1,175,747 UART: [idev] SUBJECT.KEYID = 7
1,176,171 UART: [idev] UDS.KEYID = 0
1,176,516 ready_for_fw is high
1,176,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,193 UART: [idev] Erasing UDS.KEYID = 0
1,201,472 UART: [idev] Sha1 KeyId Algorithm
1,209,752 UART: [idev] --
1,210,822 UART: [ldev] ++
1,210,990 UART: [ldev] CDI.KEYID = 6
1,211,353 UART: [ldev] SUBJECT.KEYID = 5
1,211,779 UART: [ldev] AUTHORITY.KEYID = 7
1,212,242 UART: [ldev] FE.KEYID = 1
1,217,256 UART: [ldev] Erasing FE.KEYID = 1
1,243,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,346 UART: [ldev] --
1,282,783 UART: [fwproc] Wait for Commands...
1,283,549 UART: [fwproc] Recv command 0x46574c44
1,284,277 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,649 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,819 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,168 >>> mbox cmd response: success
2,828,268 UART: [afmc] ++
2,828,436 UART: [afmc] CDI.KEYID = 6
2,828,798 UART: [afmc] SUBJECT.KEYID = 7
2,829,223 UART: [afmc] AUTHORITY.KEYID = 5
2,864,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,817 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,526 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,409 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,110 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,174 UART: [afmc] --
2,908,178 UART: [cold-reset] --
2,908,844 UART: [state] Locking Datavault
2,909,919 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,523 UART: [state] Locking ICCM
2,911,041 UART: [exit] Launching FMC @ 0x40000130
2,916,371 UART:
2,916,387 UART: Running Caliptra FMC ...
2,916,795 UART:
2,916,938 UART: [state] CFI Enabled
2,927,706 UART: [fht] FMC Alias Private Key: 7
3,046,326 UART: [art] Extend RT PCRs Done
3,046,754 UART: [art] Lock RT PCRs Done
3,048,502 UART: [art] Populate DV Done
3,056,695 UART: [fht] FMC Alias Private Key: 7
3,057,677 UART: [art] Derive CDI
3,057,957 UART: [art] Store in slot 0x4
3,144,120 UART: [art] Derive Key Pair
3,144,480 UART: [art] Store priv key in slot 0x5
3,157,750 UART: [art] Derive Key Pair - Done
3,172,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,696 UART: [art] PUB.X = BA604034C2FF789E593B0322A9E6E1F7FC16817209EC9F85D0BC1D04616E1CBD9B9A32E3633CCCCC522DA203CDB43BC3
3,195,470 UART: [art] PUB.Y = 8B3EE70CF8C98EC9300F62D8BD9984635DB9C50FEEEAE63E6333AD292EA8C4AAB18C60AE174AE8664D0CE02A3ED72681
3,202,428 UART: [art] SIG.R = FE82904BA7263DD6357344EC5F2ECBB6906E2DC893DF85942E8AB189D715A0B5C86D47BF4A9B0878467022B125A1C5B9
3,209,201 UART: [art] SIG.S = EC90320D96FACCB55D1D40C0A18C2E0A054B4140A56C8DC3AEA03B6B8ABFF471942DB75121A1215A7DFA5325CAD972A7
3,233,098 UART: Caliptra RT
3,233,441 UART: [state] CFI Enabled
3,352,817 UART: [rt] RT listening for mailbox commands...
3,353,487 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,709 UART: [rt]cmd =0x41544d4e, len=14344
3,786,785 >>> mbox cmd response data (8 bytes)
3,786,786 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,983 UART: [rt]cmd =0x41545348, len=116
3,838,976 >>> mbox cmd response data (12 bytes)
3,838,977 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,869,010 UART: [rt]cmd =0x41545348, len=116
3,870,611 >>> mbox cmd response data (12 bytes)
3,870,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,871,287 UART:
3,871,303 UART: Running Caliptra ROM ...
3,871,711 UART:
3,871,853 UART: [state] CFI Enabled
3,874,607 UART: [state] LifecycleState = Unprovisioned
3,875,262 UART: [state] DebugLocked = No
3,875,752 UART: [state] WD Timer not started. Device not locked for debugging
3,876,906 UART: [kat] SHA2-256
4,682,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,686,681 UART: [kat] ++
4,686,833 UART: [kat] sha1
4,691,055 UART: [kat] SHA2-256
4,692,995 UART: [kat] SHA2-384
4,695,648 UART: [kat] SHA2-512-ACC
4,697,548 UART: [kat] ECC-384
4,707,401 UART: [kat] HMAC-384Kdf
4,711,815 UART: [kat] LMS
4,960,143 UART: [kat] --
4,961,061 UART: [update-reset] ++
6,320,703 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,321,850 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,477,065 >>> mbox cmd response: success
6,477,065 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,477,182 UART: [update-reset] Copying MAN_2 To MAN_1
6,485,196 UART: [update-reset Success] --
6,486,335 UART: [state] Locking Datavault
6,487,277 UART: [state] Locking PCR0, PCR1 and PCR31
6,487,881 UART: [state] Locking ICCM
6,488,405 UART: [exit] Launching FMC @ 0x40000130
6,493,735 UART:
6,493,751 UART: Running Caliptra FMC ...
6,494,159 UART:
6,494,302 UART: [state] CFI Enabled
6,583,361 UART: [art] Extend RT PCRs Done
6,583,789 UART: [art] Lock RT PCRs Done
6,585,184 UART: [art] Populate DV Done
6,593,333 UART: [fht] FMC Alias Private Key: 7
6,594,317 UART: [art] Derive CDI
6,594,597 UART: [art] Store in slot 0x4
6,680,260 UART: [art] Derive Key Pair
6,680,620 UART: [art] Store priv key in slot 0x5
6,694,542 UART: [art] Derive Key Pair - Done
6,709,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,725,238 UART: [art] Erasing AUTHORITY.KEYID = 7
6,726,003 UART: [art] PUB.X = 91BE16E7746209118B8921ED75EAA34E0AFDBBC9AD52D0AA784C53D560BD0D547B1D52DCD1DF37FDA3F5F120B3842047
6,732,780 UART: [art] PUB.Y = 69855436463FE826D2B9F4EB3DF876B949DB401728FD40FED8CF41A6DBC07B4BB8AC7427C8778F4574F627446117974E
6,739,732 UART: [art] SIG.R = 5EED6211D5D04E46856D3401AD39C73343D35B8BCDAD0D8F6731FB9D7EC5919390DC8C66CF9B9DDF67E922B324B87157
6,746,506 UART: [art] SIG.S = 294F9E7A21867F87DC117B0DC71E8A6B8A35C79FF1B34FC20B45E5401B4F0579BE9FFB1AD363C90CE0119A6D703A21DA
6,770,450 UART: Caliptra RT
6,770,793 UART: [state] CFI Enabled
7,133,194 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,164,035 UART: [rt]cmd =0x41545348, len=116
7,186,229 >>> mbox cmd response data (12 bytes)
7,186,230 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,216,187 UART: [rt]cmd =0x41545348, len=116
7,217,952 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,217,953 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,340,580 UART: [rt]cmd =0x41544d4e, len=14344
7,650,650 >>> mbox cmd response data (8 bytes)
7,650,651 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,680,632 UART: [rt]cmd =0x41545348, len=116
7,702,413 >>> mbox cmd response data (12 bytes)
7,702,414 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,732,635 UART: [rt]cmd =0x41545348, len=116
7,734,359 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,778 ready_for_fw is high
1,060,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,399 >>> mbox cmd response: success
2,741,900 UART:
2,741,916 UART: Running Caliptra FMC ...
2,742,324 UART:
2,742,467 UART: [state] CFI Enabled
2,753,197 UART: [fht] FMC Alias Private Key: 7
2,871,525 UART: [art] Extend RT PCRs Done
2,871,953 UART: [art] Lock RT PCRs Done
2,873,815 UART: [art] Populate DV Done
2,881,760 UART: [fht] FMC Alias Private Key: 7
2,882,788 UART: [art] Derive CDI
2,883,068 UART: [art] Store in slot 0x4
2,968,977 UART: [art] Derive Key Pair
2,969,337 UART: [art] Store priv key in slot 0x5
2,982,629 UART: [art] Derive Key Pair - Done
2,997,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,869 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,634 UART: [art] PUB.X = 5AF0D9E544C2F477492C19D133671D1766F43C4A84BBB5E949ADF12BF92B9E6C4B11369379C8C6C94316F859C9CA47C3
3,019,408 UART: [art] PUB.Y = 33CD8FA69D5D8C97C69E14CA7E44CC2F49E254FDC6FD94BBE94FA866ACDA93D6B223477138A4F1D3914D6B0AF7873ACC
3,026,377 UART: [art] SIG.R = F2DB1704850AB4CAAB1B2A53E794D81887779FDBC6202F32FA3281848B3BC22467A873A08D15BBCE81F6BDA3A2D17B01
3,033,150 UART: [art] SIG.S = 825C62FA48F5480FB486126FD45750155D932A428854FC919A9CF34DB7A7D060854D85B09533A480971D1A4A582CD233
3,056,379 UART: Caliptra RT
3,056,722 UART: [state] CFI Enabled
3,176,380 UART: [rt] RT listening for mailbox commands...
3,177,050 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,328 UART: [rt]cmd =0x41544d4e, len=14344
3,610,668 >>> mbox cmd response data (8 bytes)
3,610,669 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,784 UART: [rt]cmd =0x41545348, len=116
3,663,379 >>> mbox cmd response data (12 bytes)
3,663,380 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,607 UART: [rt]cmd =0x41545348, len=116
3,695,542 >>> mbox cmd response data (12 bytes)
3,695,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,184,607 >>> mbox cmd response: success
6,184,607 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,197,800 UART:
6,197,816 UART: Running Caliptra FMC ...
6,198,224 UART:
6,198,367 UART: [state] CFI Enabled
6,287,808 UART: [art] Extend RT PCRs Done
6,288,236 UART: [art] Lock RT PCRs Done
6,289,679 UART: [art] Populate DV Done
6,297,882 UART: [fht] FMC Alias Private Key: 7
6,299,006 UART: [art] Derive CDI
6,299,286 UART: [art] Store in slot 0x4
6,385,557 UART: [art] Derive Key Pair
6,385,917 UART: [art] Store priv key in slot 0x5
6,399,511 UART: [art] Derive Key Pair - Done
6,414,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,430,200 UART: [art] Erasing AUTHORITY.KEYID = 7
6,430,965 UART: [art] PUB.X = AA388161D9396EE2231F421326A7B81A3713C67A1177E60AD97D7DAD85A01A1FF0D7B47DFE28FA76F6A26FBD2BCF4C8A
6,437,748 UART: [art] PUB.Y = 58EEA08E6FCB4B0F52CC1ED216D6D07D52EB3E74BDCD92B6E7928044335442FC935B44D9426298848C03E2F59779F27E
6,444,698 UART: [art] SIG.R = ABBE4774282ED516E844D8D57F75AE59AFF8DD883DB22A20D7482E0F0819AE28F1FBE32C47CEF97B94506375BAC07A71
6,451,476 UART: [art] SIG.S = E63EEF4D1CD4EE371AA73FFD8048CACCAA881F4964843834C4F2F29F60C0A83E23B3FCF9BBBE2007944BE8CDB1F0F6F6
6,475,075 UART: Caliptra RT
6,475,418 UART: [state] CFI Enabled
6,840,121 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,871,066 UART: [rt]cmd =0x41545348, len=116
6,893,180 >>> mbox cmd response data (12 bytes)
6,893,181 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,923,292 UART: [rt]cmd =0x41545348, len=116
6,925,113 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,925,114 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,047,655 UART: [rt]cmd =0x41544d4e, len=14344
7,357,597 >>> mbox cmd response data (8 bytes)
7,357,598 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,387,683 UART: [rt]cmd =0x41545348, len=116
7,410,004 >>> mbox cmd response data (12 bytes)
7,410,005 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,440,170 UART: [rt]cmd =0x41545348, len=116
7,442,044 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
191,940 UART:
192,300 UART: Running Caliptra ROM ...
193,391 UART:
193,536 UART: [state] CFI Enabled
267,351 UART: [state] LifecycleState = Unprovisioned
269,325 UART: [state] DebugLocked = No
272,155 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,335 UART: [kat] SHA2-256
446,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,508 UART: [kat] ++
456,992 UART: [kat] sha1
468,080 UART: [kat] SHA2-256
470,738 UART: [kat] SHA2-384
475,236 UART: [kat] SHA2-512-ACC
477,600 UART: [kat] ECC-384
2,768,127 UART: [kat] HMAC-384Kdf
2,800,610 UART: [kat] LMS
3,990,863 UART: [kat] --
3,997,362 UART: [cold-reset] ++
3,998,378 UART: [fht] Storing FHT @ 0x50003400
4,008,459 UART: [idev] ++
4,009,031 UART: [idev] CDI.KEYID = 6
4,009,991 UART: [idev] SUBJECT.KEYID = 7
4,011,256 UART: [idev] UDS.KEYID = 0
4,012,222 ready_for_fw is high
4,012,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,478 UART: [idev] Erasing UDS.KEYID = 0
7,346,716 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,741 UART: [idev] --
7,373,276 UART: [ldev] ++
7,373,846 UART: [ldev] CDI.KEYID = 6
7,374,824 UART: [ldev] SUBJECT.KEYID = 5
7,375,985 UART: [ldev] AUTHORITY.KEYID = 7
7,377,284 UART: [ldev] FE.KEYID = 1
7,420,991 UART: [ldev] Erasing FE.KEYID = 1
10,753,343 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,903 UART: [ldev] --
13,113,250 UART: [fwproc] Waiting for Commands...
13,114,963 UART: [fwproc] Received command 0x46574c44
13,117,147 UART: [fwproc] Received Image of size 118548 bytes
17,216,900 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,299,883 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,373,053 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,700,849 >>> mbox cmd response: success
17,705,249 UART: [afmc] ++
17,705,877 UART: [afmc] CDI.KEYID = 6
17,706,791 UART: [afmc] SUBJECT.KEYID = 7
17,708,057 UART: [afmc] AUTHORITY.KEYID = 5
21,068,185 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,367,898 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,160 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,384,638 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,333 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,413,746 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,434,775 UART: [afmc] --
23,439,342 UART: [cold-reset] --
23,444,015 UART: [state] Locking Datavault
23,449,975 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,679 UART: [state] Locking ICCM
23,452,860 UART: [exit] Launching FMC @ 0x40000130
23,461,259 UART:
23,461,495 UART: Running Caliptra FMC ...
23,462,593 UART:
23,462,755 UART: [state] CFI Enabled
23,527,187 UART: [fht] FMC Alias Private Key: 7
25,867,723 UART: [art] Extend RT PCRs Done
25,868,940 UART: [art] Lock RT PCRs Done
25,870,421 UART: [art] Populate DV Done
25,875,835 UART: [fht] FMC Alias Private Key: 7
25,877,541 UART: [art] Derive CDI
25,878,358 UART: [art] Store in slot 0x4
25,935,289 UART: [art] Derive Key Pair
25,936,323 UART: [art] Store priv key in slot 0x5
29,229,294 UART: [art] Derive Key Pair - Done
29,242,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,530,156 UART: [art] Erasing AUTHORITY.KEYID = 7
31,531,657 UART: [art] PUB.X = C548A24B5AACA88A1585F6FD12D8FB139E8C468B441ADF2E5B6E0527F137438B125A388CDE080696FC558867F9751C5C
31,538,966 UART: [art] PUB.Y = 622DF68468BE467B939FCD5C555F188460BF8972DDD53F1FD9D9BE1FCF027AAACE137858F0301B6966964E72589B1553
31,546,165 UART: [art] SIG.R = 891C784EB08EDF00E206731C3C66E494AD1663953E82A9683B6B929C453B54103768B080D6CC563A5A255606018B82D5
31,553,518 UART: [art] SIG.S = 788825C08DB2FF9471019D7E4E1ED40EDC25DD920F103C0413817FD0AEFE4346F03283FEC020C94B70E7FC63275E053B
32,858,174 UART: Caliptra RT
32,858,889 UART: [state] CFI Enabled
33,036,533 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,100,970 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,256,681 UART: [rt]cmd =0x41544d4e, len=14344
42,557,514 >>> mbox cmd response data (8 bytes)
42,558,199 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,588,835 UART: [rt]cmd =0x41545348, len=116
42,608,886 >>> mbox cmd response data (12 bytes)
44,684,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,834,655 UART:
44,835,027 UART: Running Caliptra ROM ...
44,836,186 UART:
44,836,367 UART: [state] CFI Enabled
44,900,632 UART: [state] LifecycleState = Unprovisioned
44,902,575 UART: [state] DebugLocked = No
44,904,774 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,909,476 UART: [kat] SHA2-256
45,079,222 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,089,670 UART: [kat] ++
45,090,164 UART: [kat] sha1
45,101,542 UART: [kat] SHA2-256
45,104,232 UART: [kat] SHA2-384
45,110,605 UART: [kat] SHA2-512-ACC
45,112,950 UART: [kat] ECC-384
47,404,054 UART: [kat] HMAC-384Kdf
47,416,200 UART: [kat] LMS
48,606,537 UART: [kat] --
48,611,544 UART: [update-reset] ++
52,805,834 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,809,257 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
53,207,045 >>> mbox cmd response: success
53,211,701 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,212,317 UART: [update-reset] Copying MAN_2 To MAN_1
53,230,445 UART: [update-reset Success] --
53,234,455 UART: [state] Locking Datavault
53,236,298 UART: [state] Locking PCR0, PCR1 and PCR31
53,238,063 UART: [state] Locking ICCM
53,239,352 UART: [exit] Launching FMC @ 0x40000130
53,247,612 UART:
53,247,870 UART: Running Caliptra FMC ...
53,248,975 UART:
53,249,137 UART: [state] CFI Enabled
53,337,575 UART: [art] Extend RT PCRs Done
53,338,757 UART: [art] Lock RT PCRs Done
53,340,318 UART: [art] Populate DV Done
53,345,828 UART: [fht] FMC Alias Private Key: 7
53,347,387 UART: [art] Derive CDI
53,348,131 UART: [art] Store in slot 0x4
53,406,807 UART: [art] Derive Key Pair
53,407,847 UART: [art] Store priv key in slot 0x5
56,700,956 UART: [art] Derive Key Pair - Done
56,714,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,001,958 UART: [art] Erasing AUTHORITY.KEYID = 7
59,003,467 UART: [art] PUB.X = DDE7AA7507E2E52C34B2F6A28B5D3B914B62484C62095E26EC491656D4C216FE1C2A90C3FD8218B8806B4A5888F5A662
59,010,747 UART: [art] PUB.Y = F852EE951A61BD8EA20E5E3925C4DC73FDD04010808B4C945922E839AC5E6A3B6A0F060EF0CA1F701F9ABF7180C902AC
59,018,018 UART: [art] SIG.R = 2BDBA153903CD77795AA7F7CC88AF019F53F229EC17D21CD8E581DFFD19D8ECE23CBEB2FACA20385065C12C862FCBA58
59,025,430 UART: [art] SIG.S = F9EC8C24338876D4577548141E10BB84D965BB8F8C017916B824BD577EA86B19EA29D7C6BCF0E50892A6C900512157ED
60,330,709 UART: Caliptra RT
60,331,423 UART: [state] CFI Enabled
60,747,693 UART: [rt] RT listening for mailbox commands...
60,779,552 UART: [rt]cmd =0x41545348, len=116
60,799,325 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,784,843 ready_for_fw is high
3,785,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,957,007 >>> mbox cmd response: success
23,649,461 UART:
23,649,875 UART: Running Caliptra FMC ...
23,651,025 UART:
23,651,196 UART: [state] CFI Enabled
23,721,471 UART: [fht] FMC Alias Private Key: 7
26,061,794 UART: [art] Extend RT PCRs Done
26,063,035 UART: [art] Lock RT PCRs Done
26,064,724 UART: [art] Populate DV Done
26,070,147 UART: [fht] FMC Alias Private Key: 7
26,071,692 UART: [art] Derive CDI
26,072,507 UART: [art] Store in slot 0x4
26,129,791 UART: [art] Derive Key Pair
26,130,839 UART: [art] Store priv key in slot 0x5
29,423,481 UART: [art] Derive Key Pair - Done
29,436,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,267 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,787 UART: [art] PUB.X = C2A8C4B6E0242FF3E412D660FEF6D5B07B129BB241C50A7BCB926155BF9ED9DC744F3A232293F8203B59A71DDD3B285D
31,742,053 UART: [art] PUB.Y = 1F10C92C5DEC1A8C4F9CDB86D8E6A98079F87B31C9A8283563EE0AF7521A2797F05FB6E40227427A100DA497F140EF6B
31,749,307 UART: [art] SIG.R = FA7A3855E4F29B29BFAFCA9CC85477FCA1A4FB2933B1213EFC591FE61688E6940C5534B6BDECDD3CAC9645FB96F1666F
31,756,708 UART: [art] SIG.S = 519A993FB7D4AFB1692C2D577B2CD38F375BE2DCC941CE5B41D8643149E6F21356FFBA5E46AD0C75185315CA0D3FBEBF
33,061,987 UART: Caliptra RT
33,062,699 UART: [state] CFI Enabled
33,238,723 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,302,014 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,457,647 UART: [rt]cmd =0x41544d4e, len=14344
42,758,081 >>> mbox cmd response data (8 bytes)
42,758,715 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,789,581 UART: [rt]cmd =0x41545348, len=116
42,809,178 >>> mbox cmd response data (12 bytes)
44,884,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
53,712,092 >>> mbox cmd response: success
53,717,118 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,746,003 UART:
53,746,307 UART: Running Caliptra FMC ...
53,747,350 UART:
53,747,500 UART: [state] CFI Enabled
53,834,404 UART: [art] Extend RT PCRs Done
53,835,760 UART: [art] Lock RT PCRs Done
53,836,762 UART: [art] Populate DV Done
53,842,227 UART: [fht] FMC Alias Private Key: 7
53,843,818 UART: [art] Derive CDI
53,844,552 UART: [art] Store in slot 0x4
53,903,649 UART: [art] Derive Key Pair
53,904,719 UART: [art] Store priv key in slot 0x5
57,197,588 UART: [art] Derive Key Pair - Done
57,210,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,498,012 UART: [art] Erasing AUTHORITY.KEYID = 7
59,499,533 UART: [art] PUB.X = B65742A1B43578F5A48F8B434896E1071DFC3FF688A0CB4B8647DBD6E8E540719B935F6220920249664088F259E06443
59,506,806 UART: [art] PUB.Y = EC1C6FDD4013D85C622D8A7DF538CED3FFB5A294A05AAFF2EDCDA2554D2C8A4D663AA28B0982BBEA5B438CC155B8A888
59,514,042 UART: [art] SIG.R = A58446B8B758B8DF602E209D1CD1E67778762D38D3D40B95D341A9B80CC431E901A89F184ED32363C2B9F08544BF105C
59,521,440 UART: [art] SIG.S = 40014AC5EFC6695A0CA994EF0DA337DB2A9BDBABA65A7CB642CBBC66AB0047521576CA0DAB66B8936290C4C96F8EC66A
60,826,975 UART: Caliptra RT
60,827,699 UART: [state] CFI Enabled
61,263,922 UART: [rt] RT listening for mailbox commands...
61,295,824 UART: [rt]cmd =0x41545348, len=116
61,314,841 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,478 UART:
192,841 UART: Running Caliptra ROM ...
194,060 UART:
603,723 UART: [state] CFI Enabled
619,105 UART: [state] LifecycleState = Unprovisioned
621,042 UART: [state] DebugLocked = No
623,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,990 UART: [kat] SHA2-256
798,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,238 UART: [kat] ++
809,782 UART: [kat] sha1
821,218 UART: [kat] SHA2-256
823,935 UART: [kat] SHA2-384
828,779 UART: [kat] SHA2-512-ACC
831,141 UART: [kat] ECC-384
3,114,575 UART: [kat] HMAC-384Kdf
3,125,873 UART: [kat] LMS
4,316,032 UART: [kat] --
4,322,864 UART: [cold-reset] ++
4,324,085 UART: [fht] Storing FHT @ 0x50003400
4,334,141 UART: [idev] ++
4,334,695 UART: [idev] CDI.KEYID = 6
4,335,641 UART: [idev] SUBJECT.KEYID = 7
4,336,874 UART: [idev] UDS.KEYID = 0
4,337,955 ready_for_fw is high
4,338,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,085 UART: [idev] Erasing UDS.KEYID = 0
7,618,417 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,592 UART: [idev] --
7,643,256 UART: [ldev] ++
7,643,832 UART: [ldev] CDI.KEYID = 6
7,644,795 UART: [ldev] SUBJECT.KEYID = 5
7,646,005 UART: [ldev] AUTHORITY.KEYID = 7
7,647,297 UART: [ldev] FE.KEYID = 1
7,657,738 UART: [ldev] Erasing FE.KEYID = 1
10,951,109 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,379 UART: [ldev] --
13,309,444 UART: [fwproc] Waiting for Commands...
13,312,563 UART: [fwproc] Received command 0x46574c44
13,314,781 UART: [fwproc] Received Image of size 118548 bytes
17,426,528 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,465 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,656 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,016 >>> mbox cmd response: success
17,907,393 UART: [afmc] ++
17,908,015 UART: [afmc] CDI.KEYID = 6
17,908,945 UART: [afmc] SUBJECT.KEYID = 7
17,910,162 UART: [afmc] AUTHORITY.KEYID = 5
21,223,776 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,991 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,245 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,679 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,373 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,820 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,587,822 UART: [afmc] --
23,592,273 UART: [cold-reset] --
23,596,132 UART: [state] Locking Datavault
23,601,477 UART: [state] Locking PCR0, PCR1 and PCR31
23,603,220 UART: [state] Locking ICCM
23,605,417 UART: [exit] Launching FMC @ 0x40000130
23,613,807 UART:
23,614,044 UART: Running Caliptra FMC ...
23,615,163 UART:
23,615,318 UART: [state] CFI Enabled
23,623,441 UART: [fht] FMC Alias Private Key: 7
25,963,473 UART: [art] Extend RT PCRs Done
25,964,702 UART: [art] Lock RT PCRs Done
25,966,375 UART: [art] Populate DV Done
25,971,782 UART: [fht] FMC Alias Private Key: 7
25,973,260 UART: [art] Derive CDI
25,974,016 UART: [art] Store in slot 0x4
26,016,543 UART: [art] Derive Key Pair
26,017,539 UART: [art] Store priv key in slot 0x5
29,258,925 UART: [art] Derive Key Pair - Done
29,271,708 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,833 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,441 UART: [art] PUB.X = 9AE63D29383B463A462FFCC628B21AEB628757926DE4D5C380D020ADA268C2623E4D4EF696752C0A99EB68B4B15F7ED9
31,560,599 UART: [art] PUB.Y = AD07FFCF79CBEFA4C85A0F89C34F2C273FA649035D840FE65BA64D31846C0CA3C3236AB6C76968B8B2CA0989F5148F20
31,567,857 UART: [art] SIG.R = 0F07CADD72DDA8FC02D36C44989C3B72508D30FC7C2D8DC975B04E43664C76D963732A737910ED29D7D5E0680555AF77
31,575,260 UART: [art] SIG.S = C145ACA20C1096E952B9D002CEADE4DBCFB1913F6F6D1FE67F032C6A72C2BFCC69B64330D463A291327EAD73221B99C4
32,880,517 UART: Caliptra RT
32,881,232 UART: [state] CFI Enabled
33,015,373 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,086,059 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,241,886 UART: [rt]cmd =0x41544d4e, len=14344
42,542,300 >>> mbox cmd response data (8 bytes)
42,542,914 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,573,763 UART: [rt]cmd =0x41545348, len=116
42,593,046 >>> mbox cmd response data (12 bytes)
44,670,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,821,486 UART:
44,821,865 UART: Running Caliptra ROM ...
44,822,914 UART:
44,823,121 UART: [state] CFI Enabled
44,835,821 UART: [state] LifecycleState = Unprovisioned
44,837,764 UART: [state] DebugLocked = No
44,839,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,845,369 UART: [kat] SHA2-256
45,015,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,025,632 UART: [kat] ++
45,026,174 UART: [kat] sha1
45,037,281 UART: [kat] SHA2-256
45,039,963 UART: [kat] SHA2-384
45,045,261 UART: [kat] SHA2-512-ACC
45,047,670 UART: [kat] ECC-384
47,330,921 UART: [kat] HMAC-384Kdf
47,341,975 UART: [kat] LMS
48,532,044 UART: [kat] --
48,537,985 UART: [update-reset] ++
52,733,371 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,737,808 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
53,135,563 >>> mbox cmd response: success
53,140,290 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,140,902 UART: [update-reset] Copying MAN_2 To MAN_1
53,158,594 UART: [update-reset Success] --
53,162,660 UART: [state] Locking Datavault
53,165,007 UART: [state] Locking PCR0, PCR1 and PCR31
53,166,710 UART: [state] Locking ICCM
53,168,103 UART: [exit] Launching FMC @ 0x40000130
53,176,493 UART:
53,176,723 UART: Running Caliptra FMC ...
53,177,817 UART:
53,177,972 UART: [state] CFI Enabled
53,221,920 UART: [art] Extend RT PCRs Done
53,223,060 UART: [art] Lock RT PCRs Done
53,224,773 UART: [art] Populate DV Done
53,230,440 UART: [fht] FMC Alias Private Key: 7
53,232,210 UART: [art] Derive CDI
53,233,013 UART: [art] Store in slot 0x4
53,275,625 UART: [art] Derive Key Pair
53,276,634 UART: [art] Store priv key in slot 0x5
56,518,918 UART: [art] Derive Key Pair - Done
56,531,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,811,978 UART: [art] Erasing AUTHORITY.KEYID = 7
58,813,484 UART: [art] PUB.X = C240311352E667B0FC5CB9327E4071220E8AE172C1643ADE034D50A041A3B5BB1EC205A4625AB4EB603724ACA873B4EA
58,820,739 UART: [art] PUB.Y = 14D00696BC1EECC5544D4CCCB8E54F85148B685A481D31872FDE7876A87B8BD831AC5BA62AACA2C53B38017F52F622FD
58,828,033 UART: [art] SIG.R = 24CC34AF1BEDA2C35E5AFA3131D90FDF5E4AE0385514A6459B07C6B8BEB89ABC7F056F4EA4CDC5FC0C8C1410FBD0A165
58,835,470 UART: [art] SIG.S = 131F6FC39C2687588262087D7A5783A6782D559BC712A225F01211681596894EC1F6D4FFC2D43116169DE1938D567E5A
60,140,203 UART: Caliptra RT
60,140,925 UART: [state] CFI Enabled
60,515,758 UART: [rt] RT listening for mailbox commands...
60,547,667 UART: [rt]cmd =0x41545348, len=116
60,567,567 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
4,126,540 ready_for_fw is high
4,126,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,176,714 >>> mbox cmd response: success
23,822,006 UART:
23,822,726 UART: Running Caliptra FMC ...
23,823,853 UART:
23,824,010 UART: [state] CFI Enabled
23,831,711 UART: [fht] FMC Alias Private Key: 7
26,171,468 UART: [art] Extend RT PCRs Done
26,172,705 UART: [art] Lock RT PCRs Done
26,174,175 UART: [art] Populate DV Done
26,179,443 UART: [fht] FMC Alias Private Key: 7
26,180,940 UART: [art] Derive CDI
26,181,724 UART: [art] Store in slot 0x4
26,224,425 UART: [art] Derive Key Pair
26,225,423 UART: [art] Store priv key in slot 0x5
29,467,711 UART: [art] Derive Key Pair - Done
29,480,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,761,118 UART: [art] Erasing AUTHORITY.KEYID = 7
31,762,652 UART: [art] PUB.X = B3B9DFEEB15440DDCD0A6BFBE430021246A23723B15A40BE21762D75380968EC361B4CD73AAF66EBDC1C3F7A2D66C488
31,769,895 UART: [art] PUB.Y = 72AD2DB367F8D4ACCAE798F7E90E0D7847BE9D682F084BCDC8449595B6F57E272E528049952F4AFECD64F577BEC6F516
31,777,180 UART: [art] SIG.R = 4D2592A9E285A06A40E504A3565C1C2F7A0426776E0E585E24A9ADACF6CBFD1045F998B7329E249597165EDF2352E3C4
31,784,562 UART: [art] SIG.S = 5E27CC40898F5610EF9E21787469D442ECF96BEA5AD80605448A1370ED109D88313A96FA9D4541DB81AD8354787209F5
33,089,579 UART: Caliptra RT
33,090,758 UART: [state] CFI Enabled
33,223,633 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,297,449 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,452,919 UART: [rt]cmd =0x41544d4e, len=14344
42,754,289 >>> mbox cmd response data (8 bytes)
42,754,892 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,785,581 UART: [rt]cmd =0x41545348, len=116
42,805,006 >>> mbox cmd response data (12 bytes)
44,878,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
53,617,909 >>> mbox cmd response: success
53,622,725 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,650,654 UART:
53,650,927 UART: Running Caliptra FMC ...
53,652,032 UART:
53,652,205 UART: [state] CFI Enabled
53,696,292 UART: [art] Extend RT PCRs Done
53,697,606 UART: [art] Lock RT PCRs Done
53,698,863 UART: [art] Populate DV Done
53,704,371 UART: [fht] FMC Alias Private Key: 7
53,706,010 UART: [art] Derive CDI
53,706,824 UART: [art] Store in slot 0x4
53,749,234 UART: [art] Derive Key Pair
53,750,278 UART: [art] Store priv key in slot 0x5
56,992,303 UART: [art] Derive Key Pair - Done
57,005,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,285,505 UART: [art] Erasing AUTHORITY.KEYID = 7
59,287,044 UART: [art] PUB.X = 0E02CF76D02B13E3D903EF778B07EB0B4C6460A00164B5AC7CCCE5623396199B124CD8BBC2DE8ACC791555F85E7564A6
59,294,251 UART: [art] PUB.Y = EB78E325183D06498026623696D5F22237176AA79F19318A1F5D672F687A5C5950557B8C6C14173EA35C2D662AB8C08B
59,301,475 UART: [art] SIG.R = 1085082E119F510D3004CE0625FD62D0A9E466C0A3923D0C63893B097082C83DF61C624D811C62BA8A7C741CDA2456A0
59,308,859 UART: [art] SIG.S = 8126A634ED9530DB88A383988565569AFE8F7FE2058B7873A9EE66330D218E9970001D62939F948CA727B1AF070A3AB9
60,613,643 UART: Caliptra RT
60,614,359 UART: [state] CFI Enabled
60,986,609 UART: [rt] RT listening for mailbox commands...
61,018,564 UART: [rt]cmd =0x41545348, len=116
61,038,189 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,173 UART:
192,527 UART: Running Caliptra ROM ...
193,654 UART:
193,801 UART: [state] CFI Enabled
263,231 UART: [state] LifecycleState = Unprovisioned
265,112 UART: [state] DebugLocked = No
267,216 UART: [state] WD Timer not started. Device not locked for debugging
271,175 UART: [kat] SHA2-256
450,829 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,578 UART: [kat] ++
462,181 UART: [kat] sha1
473,364 UART: [kat] SHA2-256
476,080 UART: [kat] SHA2-384
480,999 UART: [kat] SHA2-512-ACC
483,368 UART: [kat] ECC-384
2,930,997 UART: [kat] HMAC-384Kdf
2,950,628 UART: [kat] LMS
3,427,087 UART: [kat] --
3,430,683 UART: [cold-reset] ++
3,432,121 UART: [fht] FHT @ 0x50003400
3,442,106 UART: [idev] ++
3,442,745 UART: [idev] CDI.KEYID = 6
3,443,650 UART: [idev] SUBJECT.KEYID = 7
3,444,887 UART: [idev] UDS.KEYID = 0
3,445,932 ready_for_fw is high
3,446,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,595,169 UART: [idev] Erasing UDS.KEYID = 0
5,968,213 UART: [idev] Sha1 KeyId Algorithm
5,991,600 UART: [idev] --
5,995,322 UART: [ldev] ++
5,995,897 UART: [ldev] CDI.KEYID = 6
5,997,010 UART: [ldev] SUBJECT.KEYID = 5
5,998,121 UART: [ldev] AUTHORITY.KEYID = 7
5,999,293 UART: [ldev] FE.KEYID = 1
6,037,752 UART: [ldev] Erasing FE.KEYID = 1
8,544,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,062 UART: [ldev] --
10,355,709 UART: [fwproc] Wait for Commands...
10,358,057 UART: [fwproc] Recv command 0x46574c44
10,360,072 UART: [fwproc] Recv'd Img size: 118548 bytes
13,840,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,912,229 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,985,241 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,313,246 >>> mbox cmd response: success
14,317,532 UART: [afmc] ++
14,318,156 UART: [afmc] CDI.KEYID = 6
14,319,073 UART: [afmc] SUBJECT.KEYID = 7
14,320,294 UART: [afmc] AUTHORITY.KEYID = 5
16,855,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,382 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,615,162 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,259 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,646,807 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,670,890 UART: [afmc] --
18,673,910 UART: [cold-reset] --
18,677,648 UART: [state] Locking Datavault
18,685,716 UART: [state] Locking PCR0, PCR1 and PCR31
18,687,475 UART: [state] Locking ICCM
18,689,999 UART: [exit] Launching FMC @ 0x40000130
18,698,392 UART:
18,698,623 UART: Running Caliptra FMC ...
18,699,721 UART:
18,699,874 UART: [state] CFI Enabled
18,753,742 UART: [fht] FMC Alias Private Key: 7
20,521,028 UART: [art] Extend RT PCRs Done
20,522,248 UART: [art] Lock RT PCRs Done
20,523,759 UART: [art] Populate DV Done
20,529,222 UART: [fht] FMC Alias Private Key: 7
20,530,872 UART: [art] Derive CDI
20,531,685 UART: [art] Store in slot 0x4
20,586,308 UART: [art] Derive Key Pair
20,587,308 UART: [art] Store priv key in slot 0x5
23,049,720 UART: [art] Derive Key Pair - Done
23,062,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,775,047 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,553 UART: [art] PUB.X = BCE18D07F76F52D990E7590625E729F294DBD022C4EC85EEFC94D2099791A3B50BE7372C40C98576804D603DEB96DE54
24,783,809 UART: [art] PUB.Y = FEE1127A812147FF8F8B1A574B61F81EC0F5B10DBB4850C9995E60F4C2A081FF579706CA20E8DCCB651F89AD33FDC514
24,791,049 UART: [art] SIG.R = 1712A5CC976294A7D80B9B07A243681C5BDEB8EE5E1DB4FA1FC007AA8CF5AC329C4D012007E64D5AB6AB21860711DE7C
24,798,451 UART: [art] SIG.S = 6B3E33F99EB8C67634EA40CBF477E756710774090BFD50E1310AE08FCF2CA8EC580BC4C0954F7EECA2E48568708B22C9
25,777,512 UART: Caliptra RT
25,778,211 UART: [state] CFI Enabled
25,958,118 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,992,523 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,148,037 UART: [rt]cmd =0x41544d4e, len=14344
34,143,755 >>> mbox cmd response data (8 bytes)
34,144,346 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,174,929 UART: [rt]cmd =0x41545348, len=116
34,195,032 >>> mbox cmd response data (12 bytes)
36,251,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,402,341 UART:
36,402,725 UART: Running Caliptra ROM ...
36,403,778 UART:
36,403,929 UART: [state] CFI Enabled
36,478,331 UART: [state] LifecycleState = Unprovisioned
36,480,268 UART: [state] DebugLocked = No
36,482,546 UART: [state] WD Timer not started. Device not locked for debugging
36,486,863 UART: [kat] SHA2-256
36,666,524 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,677,346 UART: [kat] ++
36,677,899 UART: [kat] sha1
36,688,578 UART: [kat] SHA2-256
36,691,287 UART: [kat] SHA2-384
36,698,411 UART: [kat] SHA2-512-ACC
36,700,762 UART: [kat] ECC-384
39,164,843 UART: [kat] HMAC-384Kdf
39,185,807 UART: [kat] LMS
39,662,238 UART: [kat] --
39,667,192 UART: [update-reset] ++
43,167,365 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,170,579 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
43,568,209 >>> mbox cmd response: success
43,568,649 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,569,114 UART: [update-reset] Copying MAN_2 To MAN_1
43,606,190 UART: [update-reset Success] --
43,610,206 UART: [state] Locking Datavault
43,613,565 UART: [state] Locking PCR0, PCR1 and PCR31
43,615,314 UART: [state] Locking ICCM
43,616,432 UART: [exit] Launching FMC @ 0x40000130
43,624,832 UART:
43,625,065 UART: Running Caliptra FMC ...
43,626,175 UART:
43,626,334 UART: [state] CFI Enabled
43,720,369 UART: [art] Extend RT PCRs Done
43,721,551 UART: [art] Lock RT PCRs Done
43,723,006 UART: [art] Populate DV Done
43,728,582 UART: [fht] FMC Alias Private Key: 7
43,730,113 UART: [art] Derive CDI
43,730,927 UART: [art] Store in slot 0x4
43,789,846 UART: [art] Derive Key Pair
43,790,843 UART: [art] Store priv key in slot 0x5
46,254,114 UART: [art] Derive Key Pair - Done
46,267,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,979,846 UART: [art] Erasing AUTHORITY.KEYID = 7
47,981,353 UART: [art] PUB.X = 94D78BC1EBA4A0F7ECBEE25471E162BE042E2D7B96F2AD39AB313A1721C976514519B258C671841204F20684689B531A
47,988,609 UART: [art] PUB.Y = E0B5682F322BB9D54D340A8AEFA26A80470713BF05469D4DACD24A89783D096536613B16CE79CE56F400EF8BA4D1B917
47,995,894 UART: [art] SIG.R = DC17BA4241B09DDC4AADCEDB4B257A2F3C42DBFC70FF177B3CCC569B922930EE2318E8E6F3A5B40BD9ADAC7B02F54767
48,003,293 UART: [art] SIG.S = 0FF8E5157307DB95B4C0F17EB146CC92985FDC1075413E20F9A4DAE22719106428E6A3FF98088E029FE7ED311323E4D5
48,982,324 UART: Caliptra RT
48,983,007 UART: [state] CFI Enabled
49,405,451 UART: [rt] RT listening for mailbox commands...
49,437,318 UART: [rt]cmd =0x41545348, len=116
49,457,052 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,459,451 ready_for_fw is high
3,460,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,431 >>> mbox cmd response: success
18,536,619 UART:
18,537,008 UART: Running Caliptra FMC ...
18,538,159 UART:
18,538,314 UART: [state] CFI Enabled
18,603,122 UART: [fht] FMC Alias Private Key: 7
20,390,350 UART: [art] Extend RT PCRs Done
20,391,575 UART: [art] Lock RT PCRs Done
20,393,008 UART: [art] Populate DV Done
20,398,436 UART: [fht] FMC Alias Private Key: 7
20,400,082 UART: [art] Derive CDI
20,400,818 UART: [art] Store in slot 0x4
20,456,659 UART: [art] Derive Key Pair
20,457,719 UART: [art] Store priv key in slot 0x5
22,920,821 UART: [art] Derive Key Pair - Done
22,933,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,646,920 UART: [art] Erasing AUTHORITY.KEYID = 7
24,648,431 UART: [art] PUB.X = 3445AA5667A9C32976E383776618D7226A5EEB51A87E24AE18C1A5446E4E4B2C0D06E68B943CAC00734D963BBBE2A434
24,655,677 UART: [art] PUB.Y = D24DF892E5E9F45BA81D8FD596CF891C7C4AD0CB5607811F6D91C67E38679EB529A18D34894BEF3636173100E910E16F
24,662,868 UART: [art] SIG.R = 360067FE6818BCFB7685D4F503387260BD92EE7AECE60F260FA543DD811CBBC9BEA34B30568E7A373F6C3F0F841DF11F
24,670,278 UART: [art] SIG.S = 6C9F489B93C0A7A34A86602F836D399AE7EE07AD0AB955BAA56B3B2EBECACB89A72094BBC3983A1E10125D8CA30031CA
25,649,224 UART: Caliptra RT
25,649,928 UART: [state] CFI Enabled
25,830,590 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,861,408 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,016,992 UART: [rt]cmd =0x41544d4e, len=14344
34,012,768 >>> mbox cmd response data (8 bytes)
34,013,396 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,044,110 UART: [rt]cmd =0x41545348, len=116
34,063,536 >>> mbox cmd response data (12 bytes)
36,132,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,449,554 >>> mbox cmd response: success
43,450,183 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,484,008 UART:
43,484,348 UART: Running Caliptra FMC ...
43,485,476 UART:
43,485,633 UART: [state] CFI Enabled
43,572,056 UART: [art] Extend RT PCRs Done
43,573,359 UART: [art] Lock RT PCRs Done
43,574,572 UART: [art] Populate DV Done
43,580,195 UART: [fht] FMC Alias Private Key: 7
43,581,737 UART: [art] Derive CDI
43,582,548 UART: [art] Store in slot 0x4
43,641,295 UART: [art] Derive Key Pair
43,642,332 UART: [art] Store priv key in slot 0x5
46,105,157 UART: [art] Derive Key Pair - Done
46,118,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,830,928 UART: [art] Erasing AUTHORITY.KEYID = 7
47,832,438 UART: [art] PUB.X = 30A2A5BB14F192541BA98E9E2FA058A60E8F636D6D6D4DCDEFD59F38C51DCD800499896985C438B397CDA0CD62D264F4
47,839,756 UART: [art] PUB.Y = 0A66FAE9A42DC2805B71D08AAA0B142A47CD71D4DEC3A6767FD237E6723A4E6622E5C279562657293F9B2A26F3C9F111
47,846,987 UART: [art] SIG.R = 3FC5BA51B229438EC84E8D9AEF903EF43931AF221A2ACCD10D548ED8A3800F260F879244D5F4268F05BB125B10958825
47,854,373 UART: [art] SIG.S = C6435EFFE137862CE54BBB170884FF765940CCA97A678991584EE3136B752A3EB20D7DDF8D39D5701DE0110C192CE026
48,833,211 UART: Caliptra RT
48,833,924 UART: [state] CFI Enabled
49,257,373 UART: [rt] RT listening for mailbox commands...
49,289,189 UART: [rt]cmd =0x41545348, len=116
49,308,437 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,602 UART:
192,981 UART: Running Caliptra ROM ...
194,107 UART:
603,895 UART: [state] CFI Enabled
616,812 UART: [state] LifecycleState = Unprovisioned
618,767 UART: [state] DebugLocked = No
621,358 UART: [state] WD Timer not started. Device not locked for debugging
625,110 UART: [kat] SHA2-256
804,769 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,570 UART: [kat] ++
816,013 UART: [kat] sha1
827,269 UART: [kat] SHA2-256
830,001 UART: [kat] SHA2-384
836,073 UART: [kat] SHA2-512-ACC
838,448 UART: [kat] ECC-384
3,279,201 UART: [kat] HMAC-384Kdf
3,291,087 UART: [kat] LMS
3,767,616 UART: [kat] --
3,771,329 UART: [cold-reset] ++
3,773,332 UART: [fht] FHT @ 0x50003400
3,784,452 UART: [idev] ++
3,785,023 UART: [idev] CDI.KEYID = 6
3,786,060 UART: [idev] SUBJECT.KEYID = 7
3,787,240 UART: [idev] UDS.KEYID = 0
3,788,165 ready_for_fw is high
3,788,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,219 UART: [idev] Erasing UDS.KEYID = 0
6,261,776 UART: [idev] Sha1 KeyId Algorithm
6,284,520 UART: [idev] --
6,289,271 UART: [ldev] ++
6,289,844 UART: [ldev] CDI.KEYID = 6
6,290,821 UART: [ldev] SUBJECT.KEYID = 5
6,291,898 UART: [ldev] AUTHORITY.KEYID = 7
6,293,241 UART: [ldev] FE.KEYID = 1
6,303,002 UART: [ldev] Erasing FE.KEYID = 1
8,778,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,497,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,513,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,529,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,545,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,566,496 UART: [ldev] --
10,572,517 UART: [fwproc] Wait for Commands...
10,574,885 UART: [fwproc] Recv command 0x46574c44
10,576,896 UART: [fwproc] Recv'd Img size: 118548 bytes
14,062,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,140,161 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,213,226 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,541,188 >>> mbox cmd response: success
14,544,989 UART: [afmc] ++
14,545,637 UART: [afmc] CDI.KEYID = 6
14,546,565 UART: [afmc] SUBJECT.KEYID = 7
14,547,733 UART: [afmc] AUTHORITY.KEYID = 5
17,046,735 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,770,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,772,315 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,788,154 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,804,193 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,819,780 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,843,361 UART: [afmc] --
18,846,601 UART: [cold-reset] --
18,849,066 UART: [state] Locking Datavault
18,855,349 UART: [state] Locking PCR0, PCR1 and PCR31
18,857,051 UART: [state] Locking ICCM
18,858,614 UART: [exit] Launching FMC @ 0x40000130
18,867,022 UART:
18,867,336 UART: Running Caliptra FMC ...
18,868,453 UART:
18,868,629 UART: [state] CFI Enabled
18,877,060 UART: [fht] FMC Alias Private Key: 7
20,643,275 UART: [art] Extend RT PCRs Done
20,644,492 UART: [art] Lock RT PCRs Done
20,645,851 UART: [art] Populate DV Done
20,651,211 UART: [fht] FMC Alias Private Key: 7
20,652,811 UART: [art] Derive CDI
20,653,630 UART: [art] Store in slot 0x4
20,696,029 UART: [art] Derive Key Pair
20,697,039 UART: [art] Store priv key in slot 0x5
23,123,956 UART: [art] Derive Key Pair - Done
23,136,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,843,188 UART: [art] Erasing AUTHORITY.KEYID = 7
24,844,693 UART: [art] PUB.X = 2BAF9BACF1E087DAE2572B6E758794CE24EF992987111029700E6A87E2178ACD23978CAEE8802034E6C87E4BADC90D82
24,851,938 UART: [art] PUB.Y = AA2EFFAA9E905585E40E2ABD0F1547AFC43B464B3D36356416D93322738EA8C01F841AADCD16A91A5937D11CF6D673C0
24,859,225 UART: [art] SIG.R = 3082E0BAAF22C2129FD37057D9D1CB0935DD2B06640603E554FF67714A3618B3B42D5F9AF97E93E97300E491C1CEE168
24,866,649 UART: [art] SIG.S = 711E83277D07F1A04EF43BED0EDC721782CEF9615CC6C804243E87BD4D06F456A7D426905C7D1EF9788E831E436FA83D
25,845,457 UART: Caliptra RT
25,846,160 UART: [state] CFI Enabled
25,979,370 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,010,004 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,165,710 UART: [rt]cmd =0x41544d4e, len=14344
34,161,458 >>> mbox cmd response data (8 bytes)
34,162,030 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,192,667 UART: [rt]cmd =0x41545348, len=116
34,212,111 >>> mbox cmd response data (12 bytes)
36,270,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,421,056 UART:
36,421,434 UART: Running Caliptra ROM ...
36,422,525 UART:
36,422,688 UART: [state] CFI Enabled
36,437,087 UART: [state] LifecycleState = Unprovisioned
36,438,996 UART: [state] DebugLocked = No
36,441,087 UART: [state] WD Timer not started. Device not locked for debugging
36,444,120 UART: [kat] SHA2-256
36,623,776 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,634,613 UART: [kat] ++
36,635,104 UART: [kat] sha1
36,646,102 UART: [kat] SHA2-256
36,648,757 UART: [kat] SHA2-384
36,655,502 UART: [kat] SHA2-512-ACC
36,657,857 UART: [kat] ECC-384
39,100,394 UART: [kat] HMAC-384Kdf
39,111,867 UART: [kat] LMS
39,588,300 UART: [kat] --
39,593,177 UART: [update-reset] ++
43,090,681 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,094,185 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
43,491,823 >>> mbox cmd response: success
43,492,262 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,493,587 UART: [update-reset] Copying MAN_2 To MAN_1
43,530,719 UART: [update-reset Success] --
43,533,964 UART: [state] Locking Datavault
43,538,089 UART: [state] Locking PCR0, PCR1 and PCR31
43,539,800 UART: [state] Locking ICCM
43,541,249 UART: [exit] Launching FMC @ 0x40000130
43,549,608 UART:
43,549,845 UART: Running Caliptra FMC ...
43,550,876 UART:
43,551,033 UART: [state] CFI Enabled
43,595,058 UART: [art] Extend RT PCRs Done
43,596,254 UART: [art] Lock RT PCRs Done
43,597,554 UART: [art] Populate DV Done
43,603,013 UART: [fht] FMC Alias Private Key: 7
43,604,713 UART: [art] Derive CDI
43,605,531 UART: [art] Store in slot 0x4
43,648,304 UART: [art] Derive Key Pair
43,649,309 UART: [art] Store priv key in slot 0x5
46,076,099 UART: [art] Derive Key Pair - Done
46,089,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,795,795 UART: [art] Erasing AUTHORITY.KEYID = 7
47,797,297 UART: [art] PUB.X = FE8AF24887107939D0C95C04D7FF911FD36DBDFBCC62B5F1F408B3945D9FD9600107E995C3B4709D9546B08A443193CC
47,804,555 UART: [art] PUB.Y = 5FB9C4600E5C9DADC9C760D6A5FF99A3AFB1B8EB0BC1C7646B87BCED424D59EFFB6E6765BCBE88BD9EFA7BA4B880CFA0
47,811,893 UART: [art] SIG.R = E3437249C92F1EC4D42C7C2857E1E758B362F1A22CBC3C5C01F245BC5AAA578E8CB2CD1D0D0D039D795A1340CC8CDC37
47,819,277 UART: [art] SIG.S = 6A59C73860DD5120EE042FDAA1F41BC41EDDCEC340430BA2E873D08A88E963E651048DA9FF96B3696B3866885C44C7AF
48,798,003 UART: Caliptra RT
48,798,695 UART: [state] CFI Enabled
49,171,506 UART: [rt] RT listening for mailbox commands...
49,203,536 UART: [rt]cmd =0x41545348, len=116
49,223,259 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,411 writing to cptra_bootfsm_go
3,775,603 ready_for_fw is high
3,776,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,339 >>> mbox cmd response: success
18,692,314 UART:
18,692,703 UART: Running Caliptra FMC ...
18,693,805 UART:
18,693,958 UART: [state] CFI Enabled
18,702,122 UART: [fht] FMC Alias Private Key: 7
20,468,132 UART: [art] Extend RT PCRs Done
20,469,359 UART: [art] Lock RT PCRs Done
20,471,071 UART: [art] Populate DV Done
20,476,506 UART: [fht] FMC Alias Private Key: 7
20,478,105 UART: [art] Derive CDI
20,478,921 UART: [art] Store in slot 0x4
20,521,585 UART: [art] Derive Key Pair
20,522,633 UART: [art] Store priv key in slot 0x5
22,949,104 UART: [art] Derive Key Pair - Done
22,961,897 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,181 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,694 UART: [art] PUB.X = 0A9B261BBE2D2011945ED9D88A70D4B7DF78FB5D3972E9E940FBEFE71C240BFAFDDE31CF9E02B6D89442DE603C1B8037
24,677,013 UART: [art] PUB.Y = 24C95BB8FF658F96E3266B5DA69E8A51693C567DEE1BBF4DF4A41236D0EC3CF9458F15D62E67593FD47F502D410696F4
24,684,282 UART: [art] SIG.R = D212480AC6EB3452ECC9A3EFCA27AD91E0652F59FECB384A11072B35E7DCD1775D29AEE4D609C4D4A49F9A6EF5AF590C
24,691,680 UART: [art] SIG.S = 542A060EF0412C0163696F1086A34255BF31F4E800AFC410DD54AD6CC06038C78D2BFADAD05249015356991D2B547F99
25,670,500 UART: Caliptra RT
25,671,207 UART: [state] CFI Enabled
25,804,362 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,851,847 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,007,365 UART: [rt]cmd =0x41544d4e, len=14344
34,003,279 >>> mbox cmd response data (8 bytes)
34,003,903 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,034,639 UART: [rt]cmd =0x41545348, len=116
34,053,935 >>> mbox cmd response data (12 bytes)
36,110,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,344,204 >>> mbox cmd response: success
43,344,837 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,376,320 UART:
43,376,639 UART: Running Caliptra FMC ...
43,377,763 UART:
43,377,928 UART: [state] CFI Enabled
43,422,112 UART: [art] Extend RT PCRs Done
43,423,356 UART: [art] Lock RT PCRs Done
43,424,597 UART: [art] Populate DV Done
43,430,166 UART: [fht] FMC Alias Private Key: 7
43,431,678 UART: [art] Derive CDI
43,432,421 UART: [art] Store in slot 0x4
43,475,400 UART: [art] Derive Key Pair
43,476,447 UART: [art] Store priv key in slot 0x5
45,902,813 UART: [art] Derive Key Pair - Done
45,915,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,621,579 UART: [art] Erasing AUTHORITY.KEYID = 7
47,623,093 UART: [art] PUB.X = 7484C790CE9D7D8B5704ED78A869D6188550BFFE3F7ACAEAFBEFA2024A08CF45DD16FA3CE80214B1020C85B821E1C479
47,630,354 UART: [art] PUB.Y = B10C45623A15FF7831518555F466555BAFF5AAED61BBA8F896633169B2441F70565843B62E561FE9229DF205FFCC82EF
47,637,644 UART: [art] SIG.R = F79CE85E538DF2D50140679FA9B88FC4F0804695C4963AFE1B05F158B6F234EBD057D69673493E2B4E21111D32017BB6
47,644,992 UART: [art] SIG.S = 03ACB2966DAF5C2515CD38F37ABDFCD697A70E671B856E92286106565F73BA74C9EBD5729C6596E40E08448EDC2D5FC6
48,623,831 UART: Caliptra RT
48,624,521 UART: [state] CFI Enabled
48,995,160 UART: [rt] RT listening for mailbox commands...
49,027,190 UART: [rt]cmd =0x41545348, len=116
49,046,608 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,125 UART:
192,485 UART: Running Caliptra ROM ...
193,579 UART:
193,723 UART: [state] CFI Enabled
262,954 UART: [state] LifecycleState = Unprovisioned
265,371 UART: [state] DebugLocked = No
267,244 UART: [state] WD Timer not started. Device not locked for debugging
272,347 UART: [kat] SHA2-256
462,201 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,944 UART: [kat] ++
473,392 UART: [kat] sha1
485,826 UART: [kat] SHA2-256
488,852 UART: [kat] SHA2-384
494,699 UART: [kat] SHA2-512-ACC
497,348 UART: [kat] ECC-384
2,948,682 UART: [kat] HMAC-384Kdf
2,970,889 UART: [kat] LMS
3,502,697 UART: [kat] --
3,508,182 UART: [cold-reset] ++
3,509,045 UART: [fht] FHT @ 0x50003400
3,520,939 UART: [idev] ++
3,521,636 UART: [idev] CDI.KEYID = 6
3,522,515 UART: [idev] SUBJECT.KEYID = 7
3,523,756 UART: [idev] UDS.KEYID = 0
3,524,658 ready_for_fw is high
3,524,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,905 UART: [idev] Erasing UDS.KEYID = 0
6,027,225 UART: [idev] Sha1 KeyId Algorithm
6,049,988 UART: [idev] --
6,054,737 UART: [ldev] ++
6,055,430 UART: [ldev] CDI.KEYID = 6
6,056,360 UART: [ldev] SUBJECT.KEYID = 5
6,057,524 UART: [ldev] AUTHORITY.KEYID = 7
6,058,758 UART: [ldev] FE.KEYID = 1
6,099,220 UART: [ldev] Erasing FE.KEYID = 1
8,605,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,093 UART: [ldev] --
10,412,362 UART: [fwproc] Wait for Commands...
10,415,590 UART: [fwproc] Recv command 0x46574c44
10,417,838 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,211 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,108,815 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,669,158 >>> mbox cmd response: success
14,673,798 UART: [afmc] ++
14,674,530 UART: [afmc] CDI.KEYID = 6
14,675,722 UART: [afmc] SUBJECT.KEYID = 7
14,677,212 UART: [afmc] AUTHORITY.KEYID = 5
17,213,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,574 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,685 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,839 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,738 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,202 UART: [afmc] --
19,012,621 UART: [cold-reset] --
19,017,369 UART: [state] Locking Datavault
19,023,059 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,264 UART: [state] Locking ICCM
19,027,360 UART: [exit] Launching FMC @ 0x40000130
19,036,038 UART:
19,036,273 UART: Running Caliptra FMC ...
19,037,375 UART:
19,037,537 UART: [state] CFI Enabled
19,094,226 UART: [fht] FMC Alias Private Key: 7
20,860,543 UART: [art] Extend RT PCRs Done
20,861,754 UART: [art] Lock RT PCRs Done
20,863,104 UART: [art] Populate DV Done
20,868,514 UART: [fht] FMC Alias Private Key: 7
20,870,212 UART: [art] Derive CDI
20,871,021 UART: [art] Store in slot 0x4
20,927,682 UART: [art] Derive Key Pair
20,928,779 UART: [art] Store priv key in slot 0x5
23,391,440 UART: [art] Derive Key Pair - Done
23,404,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,638 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,141 UART: [art] PUB.X = 9522614B7D72B377E0F2A6BE6C7827110262BEE21CD344CB498F20451E5274960488DB63222F95173D8669B222295A2B
25,126,366 UART: [art] PUB.Y = 6B3353FB1EFFBC58E9085F6D35A2C78510CFB39D39DEBBAED50898A6F0444D3A5DD4854E000A4EB1DD082FFFC709322B
25,133,641 UART: [art] SIG.R = 5C4A2456919769E2B69D402282BB2646F48D23B2A686D74A9386E107EC2053C241616231CE5A3DDB12443CB1FF85AF7D
25,141,012 UART: [art] SIG.S = A9874F47A9391B4CA069624AF1AB612E5C4E6168F667195E4A9E0AD816F66CAA2225C0561E2AF879D939F31C8667B87E
26,120,173 UART: Caliptra RT
26,120,859 UART: [state] CFI Enabled
26,305,030 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,346,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,501,967 UART: [rt]cmd =0x41544d4e, len=14344
34,497,637 >>> mbox cmd response data (8 bytes)
34,498,233 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,528,924 UART: [rt]cmd =0x41545348, len=116
34,548,877 >>> mbox cmd response data (12 bytes)
36,613,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,764,498 UART:
36,764,874 UART: Running Caliptra ROM ...
36,766,018 UART:
36,766,193 UART: [state] CFI Enabled
36,825,876 UART: [state] LifecycleState = Unprovisioned
36,827,933 UART: [state] DebugLocked = No
36,829,306 UART: [state] WD Timer not started. Device not locked for debugging
36,833,772 UART: [kat] SHA2-256
37,023,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,034,378 UART: [kat] ++
37,034,838 UART: [kat] sha1
37,046,858 UART: [kat] SHA2-256
37,049,884 UART: [kat] SHA2-384
37,056,953 UART: [kat] SHA2-512-ACC
37,059,524 UART: [kat] ECC-384
39,510,519 UART: [kat] HMAC-384Kdf
39,536,147 UART: [kat] LMS
40,067,733 UART: [kat] --
40,070,655 UART: [update-reset] ++
43,578,800 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,582,350 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,212,093 >>> mbox cmd response: success
44,216,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,217,361 UART: [update-reset] Copying MAN_2 To MAN_1
44,250,722 UART: [update-reset Success] --
44,253,292 UART: [state] Locking Datavault
44,256,770 UART: [state] Locking PCR0, PCR1 and PCR31
44,258,959 UART: [state] Locking ICCM
44,260,998 UART: [exit] Launching FMC @ 0x40000130
44,269,667 UART:
44,269,900 UART: Running Caliptra FMC ...
44,271,000 UART:
44,271,164 UART: [state] CFI Enabled
44,369,455 UART: [art] Extend RT PCRs Done
44,370,659 UART: [art] Lock RT PCRs Done
44,372,031 UART: [art] Populate DV Done
44,377,553 UART: [fht] FMC Alias Private Key: 7
44,379,194 UART: [art] Derive CDI
44,380,004 UART: [art] Store in slot 0x4
44,438,581 UART: [art] Derive Key Pair
44,439,623 UART: [art] Store priv key in slot 0x5
46,901,540 UART: [art] Derive Key Pair - Done
46,914,486 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,627,459 UART: [art] Erasing AUTHORITY.KEYID = 7
48,628,982 UART: [art] PUB.X = CF8974EA8CFD300CDC993A2BDF6DAD25FF562CDE2C4CEEA7E3287673EEDF5285F19E65CE3A4076E4381A963ECC885D52
48,636,257 UART: [art] PUB.Y = 591C7D67668B7AC0E6519F9F7048376F4DC1633A338A6095BA344DCDD75363B91E24E5F6CA8489BDBCA6C315990DADE8
48,643,514 UART: [art] SIG.R = A7300AADC2913E3F36C0319D343B915EB23057C6BA456B12ABC5B89EFA5300BC8822BDD0C2768BD73DF89CC82F86B78A
48,650,873 UART: [art] SIG.S = 10CDAA884939FEAF23F1B3EF8DE7F40C38BE192E60B40101C2E65A6BF74717DFF313B1254C40607A3701AAD19CE9467F
49,629,068 UART: Caliptra RT
49,629,777 UART: [state] CFI Enabled
50,055,447 UART: [rt] RT listening for mailbox commands...
50,087,506 UART: [rt]cmd =0x41545348, len=116
50,106,448 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,441,432 ready_for_fw is high
3,441,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,804,147 >>> mbox cmd response: success
19,112,882 UART:
19,113,610 UART: Running Caliptra FMC ...
19,114,729 UART:
19,114,880 UART: [state] CFI Enabled
19,180,408 UART: [fht] FMC Alias Private Key: 7
20,947,409 UART: [art] Extend RT PCRs Done
20,948,622 UART: [art] Lock RT PCRs Done
20,950,037 UART: [art] Populate DV Done
20,955,629 UART: [fht] FMC Alias Private Key: 7
20,957,166 UART: [art] Derive CDI
20,957,978 UART: [art] Store in slot 0x4
21,013,552 UART: [art] Derive Key Pair
21,014,544 UART: [art] Store priv key in slot 0x5
23,477,577 UART: [art] Derive Key Pair - Done
23,490,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,747 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,253 UART: [art] PUB.X = F503A6B93FF05D6C3BC1D9F93D0F9421DAD11CEF5A52D42C922DC93A06EBD989D89FC4A4E58FAD8CFB91CB3808A45287
25,212,533 UART: [art] PUB.Y = 2B0EC2C9A4FBB23E8636A0A49912E3B715B9FFEF5F3CA124E3341F83F0C591D698BC332F13FC4D6A4B44DEA03BF12E00
25,219,791 UART: [art] SIG.R = 55FF19AEE31AB7EAB285887573D1269638BCF2D5029AE0DCFAC7C68942C88493269AEBCE7FC4EAD96B414C4FEC3A42AD
25,227,163 UART: [art] SIG.S = E7FE234ADAE87D270AC44E7062412703E5E9DD61B3400F414CD79A51356DB6480B69E3BACAB2D94156A04F3E49AF23AD
26,206,534 UART: Caliptra RT
26,207,228 UART: [state] CFI Enabled
26,387,113 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,429,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,584,875 UART: [rt]cmd =0x41544d4e, len=14344
34,580,140 >>> mbox cmd response data (8 bytes)
34,580,719 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,611,399 UART: [rt]cmd =0x41545348, len=116
34,630,839 >>> mbox cmd response data (12 bytes)
36,696,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,609,641 >>> mbox cmd response: success
44,615,425 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,644,524 UART:
44,644,857 UART: Running Caliptra FMC ...
44,645,930 UART:
44,646,092 UART: [state] CFI Enabled
44,736,387 UART: [art] Extend RT PCRs Done
44,737,756 UART: [art] Lock RT PCRs Done
44,739,008 UART: [art] Populate DV Done
44,744,476 UART: [fht] FMC Alias Private Key: 7
44,746,062 UART: [art] Derive CDI
44,746,897 UART: [art] Store in slot 0x4
44,805,827 UART: [art] Derive Key Pair
44,806,887 UART: [art] Store priv key in slot 0x5
47,270,047 UART: [art] Derive Key Pair - Done
47,282,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,995,696 UART: [art] Erasing AUTHORITY.KEYID = 7
48,997,214 UART: [art] PUB.X = 509DD42444BF63ACDD5B63E5BF9F308BAE708949E178FDE982B0F3222FD2DA8B99EBD49F0F32F975ADDA7FBDC389950D
49,004,483 UART: [art] PUB.Y = F1A91A11D522477A86EEC2DCD6D5737A04585C6CF0FD2BD5414FAADD7CE3572E1CC6E7D782A811422DFE983613B9DF8E
49,011,784 UART: [art] SIG.R = 7D69AFFFDD3BB92E24BFCE95B37F1CDE28771E0699CFF4F869949BC9B3E6D5020DE63EAFD2C663CB92101D1C72908B5A
49,019,221 UART: [art] SIG.S = 34511F64745CA75996983225AE72DD4ED04DAD048CF08B8E7BCCA52C512926E51AD0224E6BC6ABA83996CD4C5D4A7C45
49,998,188 UART: Caliptra RT
49,998,886 UART: [state] CFI Enabled
50,418,103 UART: [rt] RT listening for mailbox commands...
50,450,082 UART: [rt]cmd =0x41545348, len=116
50,469,714 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
192,467 UART:
192,827 UART: Running Caliptra ROM ...
194,024 UART:
603,738 UART: [state] CFI Enabled
619,372 UART: [state] LifecycleState = Unprovisioned
621,763 UART: [state] DebugLocked = No
624,438 UART: [state] WD Timer not started. Device not locked for debugging
629,697 UART: [kat] SHA2-256
819,566 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,378 UART: [kat] ++
830,826 UART: [kat] sha1
841,918 UART: [kat] SHA2-256
844,928 UART: [kat] SHA2-384
849,927 UART: [kat] SHA2-512-ACC
852,511 UART: [kat] ECC-384
3,295,983 UART: [kat] HMAC-384Kdf
3,310,639 UART: [kat] LMS
3,842,490 UART: [kat] --
3,846,210 UART: [cold-reset] ++
3,848,355 UART: [fht] FHT @ 0x50003400
3,860,774 UART: [idev] ++
3,861,415 UART: [idev] CDI.KEYID = 6
3,862,553 UART: [idev] SUBJECT.KEYID = 7
3,863,664 UART: [idev] UDS.KEYID = 0
3,864,591 ready_for_fw is high
3,864,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,648 UART: [idev] Erasing UDS.KEYID = 0
6,336,997 UART: [idev] Sha1 KeyId Algorithm
6,360,508 UART: [idev] --
6,366,241 UART: [ldev] ++
6,366,926 UART: [ldev] CDI.KEYID = 6
6,367,858 UART: [ldev] SUBJECT.KEYID = 5
6,369,022 UART: [ldev] AUTHORITY.KEYID = 7
6,370,205 UART: [ldev] FE.KEYID = 1
6,382,208 UART: [ldev] Erasing FE.KEYID = 1
8,857,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,075 UART: [ldev] --
10,649,818 UART: [fwproc] Wait for Commands...
10,652,354 UART: [fwproc] Recv command 0x46574c44
10,654,666 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,206 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,831 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,339 >>> mbox cmd response: success
14,916,761 UART: [afmc] ++
14,917,514 UART: [afmc] CDI.KEYID = 6
14,918,637 UART: [afmc] SUBJECT.KEYID = 7
14,920,144 UART: [afmc] AUTHORITY.KEYID = 5
17,422,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,909 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,010 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,157 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,024 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,550 UART: [afmc] --
19,218,975 UART: [cold-reset] --
19,223,827 UART: [state] Locking Datavault
19,230,772 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,931 UART: [state] Locking ICCM
19,235,091 UART: [exit] Launching FMC @ 0x40000130
19,243,794 UART:
19,244,032 UART: Running Caliptra FMC ...
19,245,141 UART:
19,245,302 UART: [state] CFI Enabled
19,253,480 UART: [fht] FMC Alias Private Key: 7
21,019,726 UART: [art] Extend RT PCRs Done
21,020,956 UART: [art] Lock RT PCRs Done
21,022,625 UART: [art] Populate DV Done
21,027,935 UART: [fht] FMC Alias Private Key: 7
21,029,532 UART: [art] Derive CDI
21,030,353 UART: [art] Store in slot 0x4
21,073,230 UART: [art] Derive Key Pair
21,074,283 UART: [art] Store priv key in slot 0x5
23,501,450 UART: [art] Derive Key Pair - Done
23,514,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,756 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,255 UART: [art] PUB.X = D6EFE05B13816F79621A394257A26672A0B85DAB17F15AD89068AD9520CA87541816922C51E41BECE84BC23054A9C127
25,229,528 UART: [art] PUB.Y = 3233A6BB463C8EE786AED380D3C331038F6A1EB34F7A2C646F2AD13335EC8CCB482A1635153D14E0136A4A2F05C0D530
25,236,794 UART: [art] SIG.R = 166087B6C8ECBB7008C579181BD100B403C2C67316E6C4E155583D3FED16557F8D740241137AB39EE78536F590C56D74
25,244,125 UART: [art] SIG.S = 0C953AD80C16E8CED26488DEC942EACEEB02450C47B199EA09DF60E238090D5DC9E900B682ED77759C43D2F51E74ED30
26,222,514 UART: Caliptra RT
26,223,232 UART: [state] CFI Enabled
26,356,028 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,408,030 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,563,454 UART: [rt]cmd =0x41544d4e, len=14344
34,558,880 >>> mbox cmd response data (8 bytes)
34,559,486 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,590,279 UART: [rt]cmd =0x41545348, len=116
34,610,039 >>> mbox cmd response data (12 bytes)
36,680,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,831,339 UART:
36,831,716 UART: Running Caliptra ROM ...
36,832,766 UART:
36,832,977 UART: [state] CFI Enabled
36,850,345 UART: [state] LifecycleState = Unprovisioned
36,852,252 UART: [state] DebugLocked = No
36,855,067 UART: [state] WD Timer not started. Device not locked for debugging
36,859,728 UART: [kat] SHA2-256
37,049,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,060,396 UART: [kat] ++
37,060,917 UART: [kat] sha1
37,072,515 UART: [kat] SHA2-256
37,075,497 UART: [kat] SHA2-384
37,080,586 UART: [kat] SHA2-512-ACC
37,083,168 UART: [kat] ECC-384
39,522,926 UART: [kat] HMAC-384Kdf
39,536,577 UART: [kat] LMS
40,068,142 UART: [kat] --
40,072,003 UART: [update-reset] ++
43,573,152 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,577,016 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,206,758 >>> mbox cmd response: success
44,211,460 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,212,061 UART: [update-reset] Copying MAN_2 To MAN_1
44,245,657 UART: [update-reset Success] --
44,252,211 UART: [state] Locking Datavault
44,255,325 UART: [state] Locking PCR0, PCR1 and PCR31
44,257,508 UART: [state] Locking ICCM
44,259,129 UART: [exit] Launching FMC @ 0x40000130
44,267,814 UART:
44,268,051 UART: Running Caliptra FMC ...
44,269,169 UART:
44,269,335 UART: [state] CFI Enabled
44,313,459 UART: [art] Extend RT PCRs Done
44,314,605 UART: [art] Lock RT PCRs Done
44,316,111 UART: [art] Populate DV Done
44,321,442 UART: [fht] FMC Alias Private Key: 7
44,322,993 UART: [art] Derive CDI
44,323,815 UART: [art] Store in slot 0x4
44,366,466 UART: [art] Derive Key Pair
44,367,471 UART: [art] Store priv key in slot 0x5
46,794,670 UART: [art] Derive Key Pair - Done
46,807,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,514,082 UART: [art] Erasing AUTHORITY.KEYID = 7
48,515,594 UART: [art] PUB.X = 34737918CC6179BDDCCD0571E5187D158443068C5C7DC507429A90B0427519C67BF8B7550295B8A11B9B1DF0DFAAF886
48,522,823 UART: [art] PUB.Y = 3AFCE9B2DFA0F1FD1E52C1F024946FEEBECA0797A36CBBBC10C8AAD8F784418B84D9E21EE8FDB7909494D45ACEA96250
48,530,132 UART: [art] SIG.R = EFF4CC5E4E6309CE8DD7FB3935DE1B728700197A94DBEF85864F4BD0CBE6836E3E1A464E3630B76CD88A5D44E30DE5D6
48,537,550 UART: [art] SIG.S = 1427D048E72FB00795FDDA45136B0204A53E425BAAA200A7625867A574BC4967FF453CD5C44326408976F51544AF6EA7
49,516,716 UART: Caliptra RT
49,517,526 UART: [state] CFI Enabled
49,890,905 UART: [rt] RT listening for mailbox commands...
49,922,867 UART: [rt]cmd =0x41545348, len=116
49,942,425 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,754,985 ready_for_fw is high
3,755,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,637 >>> mbox cmd response: success
19,298,660 UART:
19,299,067 UART: Running Caliptra FMC ...
19,300,391 UART:
19,300,566 UART: [state] CFI Enabled
19,308,639 UART: [fht] FMC Alias Private Key: 7
21,074,477 UART: [art] Extend RT PCRs Done
21,075,709 UART: [art] Lock RT PCRs Done
21,077,290 UART: [art] Populate DV Done
21,082,558 UART: [fht] FMC Alias Private Key: 7
21,084,171 UART: [art] Derive CDI
21,084,994 UART: [art] Store in slot 0x4
21,127,598 UART: [art] Derive Key Pair
21,128,648 UART: [art] Store priv key in slot 0x5
23,555,820 UART: [art] Derive Key Pair - Done
23,568,453 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,274,721 UART: [art] Erasing AUTHORITY.KEYID = 7
25,276,243 UART: [art] PUB.X = D30C995FBAA615DBA99B8C08225CB72E8EECA840ADA8758E66D7E3E969210D775256D78B9CA05109D8F0DA94E056E4FF
25,283,548 UART: [art] PUB.Y = BF8D882FABB9DCBF5BCB6F79962EBAF9061EFC1DF786118ED240E5C823E5A8887E280838A3A428E0F9E525EA464B92A7
25,290,828 UART: [art] SIG.R = 9116F003227A7BA0F665A1D51BD5D9F391362AD4EA9B47F1124A51AD74C1526FE0174F8FE88C8229BBD28E1D586A68C9
25,298,213 UART: [art] SIG.S = 68638B6D4BB53C032E4468A7EACB859F855EE94410C60CC378B580D1566BFE9D560186766E2CFC8AAE3B196189637AB4
26,277,383 UART: Caliptra RT
26,278,089 UART: [state] CFI Enabled
26,411,265 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,461,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,616,696 UART: [rt]cmd =0x41544d4e, len=14344
34,612,535 >>> mbox cmd response data (8 bytes)
34,613,133 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,643,896 UART: [rt]cmd =0x41545348, len=116
34,663,663 >>> mbox cmd response data (12 bytes)
36,730,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,551,901 >>> mbox cmd response: success
44,556,924 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,585,874 UART:
44,586,180 UART: Running Caliptra FMC ...
44,587,322 UART:
44,587,496 UART: [state] CFI Enabled
44,631,163 UART: [art] Extend RT PCRs Done
44,632,488 UART: [art] Lock RT PCRs Done
44,633,961 UART: [art] Populate DV Done
44,639,053 UART: [fht] FMC Alias Private Key: 7
44,640,813 UART: [art] Derive CDI
44,641,632 UART: [art] Store in slot 0x4
44,683,961 UART: [art] Derive Key Pair
44,684,965 UART: [art] Store priv key in slot 0x5
47,112,054 UART: [art] Derive Key Pair - Done
47,125,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,831,490 UART: [art] Erasing AUTHORITY.KEYID = 7
48,833,001 UART: [art] PUB.X = D174577043197C721F0F3F7A7AD890CD9531DE922AEF41B1A697DBFBDA7C73383EAD856AC5EB5765E68DDDFB55E2C4B1
48,840,312 UART: [art] PUB.Y = 100D22176790A2E8F9A311F0D2391B284E879D9FD79019A0A679CBD82398DC512AB4633A59CAA163C9A425A8783BF983
48,847,552 UART: [art] SIG.R = C46B794276412F91770459448F7248977CEDDC4C22EAE60694FC1AE46C0F4EC9B9DE82B8268B522CD23271B0D87D7CCD
48,855,009 UART: [art] SIG.S = 9F6ED4BF2B9DADFA1CCE66559A415869DDE54B1D2B9F7AB112D268DC72DF3AF18B92423DA4CFFCDA4252DBBAEDDA1863
49,834,096 UART: Caliptra RT
49,834,821 UART: [state] CFI Enabled
50,203,430 UART: [rt] RT listening for mailbox commands...
50,235,266 UART: [rt]cmd =0x41545348, len=116
50,255,092 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,598 UART: [state] LifecycleState = Unprovisioned
86,253 UART: [state] DebugLocked = No
86,935 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,539 UART: [kat] SHA2-256
882,470 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,585 UART: [kat] ++
886,737 UART: [kat] sha1
890,887 UART: [kat] SHA2-256
892,825 UART: [kat] SHA2-384
895,562 UART: [kat] SHA2-512-ACC
897,463 UART: [kat] ECC-384
903,184 UART: [kat] HMAC-384Kdf
907,882 UART: [kat] LMS
1,476,078 UART: [kat] --
1,476,937 UART: [cold-reset] ++
1,477,379 UART: [fht] Storing FHT @ 0x50003400
1,480,050 UART: [idev] ++
1,480,218 UART: [idev] CDI.KEYID = 6
1,480,578 UART: [idev] SUBJECT.KEYID = 7
1,481,002 UART: [idev] UDS.KEYID = 0
1,481,347 ready_for_fw is high
1,481,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,992 UART: [idev] Erasing UDS.KEYID = 0
1,506,050 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,748 UART: [idev] --
1,515,855 UART: [ldev] ++
1,516,023 UART: [ldev] CDI.KEYID = 6
1,516,386 UART: [ldev] SUBJECT.KEYID = 5
1,516,812 UART: [ldev] AUTHORITY.KEYID = 7
1,517,275 UART: [ldev] FE.KEYID = 1
1,522,141 UART: [ldev] Erasing FE.KEYID = 1
1,547,156 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,274 UART: [ldev] --
1,586,575 UART: [fwproc] Waiting for Commands...
1,587,196 UART: [fwproc] Received command 0x46574c44
1,587,987 UART: [fwproc] Received Image of size 118548 bytes
2,932,479 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,055 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,670 >>> mbox cmd response: success
3,133,794 UART: [afmc] ++
3,133,962 UART: [afmc] CDI.KEYID = 6
3,134,324 UART: [afmc] SUBJECT.KEYID = 7
3,134,749 UART: [afmc] AUTHORITY.KEYID = 5
3,169,636 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,928 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,708 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,417 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,300 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,983 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,763 UART: [afmc] --
3,212,857 UART: [cold-reset] --
3,213,691 UART: [state] Locking Datavault
3,214,934 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,538 UART: [state] Locking ICCM
3,216,050 UART: [exit] Launching FMC @ 0x40000130
3,221,380 UART:
3,221,396 UART: Running Caliptra FMC ...
3,221,804 UART:
3,221,858 UART: [state] CFI Enabled
3,232,396 UART: [fht] FMC Alias Private Key: 7
3,352,726 UART: [art] Extend RT PCRs Done
3,353,154 UART: [art] Lock RT PCRs Done
3,354,944 UART: [art] Populate DV Done
3,363,131 UART: [fht] FMC Alias Private Key: 7
3,364,217 UART: [art] Derive CDI
3,364,497 UART: [art] Store in slot 0x4
3,450,325 UART: [art] Derive Key Pair
3,450,685 UART: [art] Store priv key in slot 0x5
3,463,300 UART: [art] Derive Key Pair - Done
3,477,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,261 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,026 UART: [art] PUB.X = 2449D3383370D9660B0D20E3D27ADA9DA250BED8B43DB13F49CFE6C0F65F5CFFED69277E0A667B4634B2A2AA1F451DD4
3,500,803 UART: [art] PUB.Y = 927051B36D49AE81CA85059D6A36BC3D8793B7B1597F18803161F1BC5E67C742F8C1A12F94A011F836930074C3D2E6B2
3,507,724 UART: [art] SIG.R = B7E32A3197C0D1AE4ACBBDF5FFC63F7FAEE98DA1BB9F0920FEB765882B3F5EAC662DF6B283375B6858E94D9FCE2C627A
3,514,519 UART: [art] SIG.S = 579A48B648744BEE37D84C19C9E11C1559BA125D5D8BAA4B20641B3039B382CC53DACF71C940395B96ECD8EA782942CA
3,538,147 UART: Caliptra RT
3,538,398 UART: [state] CFI Enabled
3,659,406 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,660,076 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,204 UART: [rt]cmd =0x41544d4e, len=14344
4,093,039 >>> mbox cmd response data (8 bytes)
4,093,040 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,985 UART: [rt]cmd =0x41545348, len=116
4,143,966 >>> mbox cmd response data (12 bytes)
4,143,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,144,695 UART:
4,144,711 UART: Running Caliptra ROM ...
4,145,119 UART:
4,145,173 UART: [state] CFI Enabled
4,147,649 UART: [state] LifecycleState = Unprovisioned
4,148,304 UART: [state] DebugLocked = No
4,149,026 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,150,609 UART: [kat] SHA2-256
4,944,540 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,948,655 UART: [kat] ++
4,948,807 UART: [kat] sha1
4,952,843 UART: [kat] SHA2-256
4,954,781 UART: [kat] SHA2-384
4,957,540 UART: [kat] SHA2-512-ACC
4,959,440 UART: [kat] ECC-384
4,965,165 UART: [kat] HMAC-384Kdf
4,969,659 UART: [kat] LMS
5,537,855 UART: [kat] --
5,538,892 UART: [update-reset] ++
6,920,842 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,922,056 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,077,323 >>> mbox cmd response: success
7,077,323 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,077,614 UART: [update-reset] Copying MAN_2 To MAN_1
7,085,628 UART: [update-reset Success] --
7,086,561 UART: [state] Locking Datavault
7,087,437 UART: [state] Locking PCR0, PCR1 and PCR31
7,088,041 UART: [state] Locking ICCM
7,088,565 UART: [exit] Launching FMC @ 0x40000130
7,093,895 UART:
7,093,911 UART: Running Caliptra FMC ...
7,094,319 UART:
7,094,373 UART: [state] CFI Enabled
7,183,370 UART: [art] Extend RT PCRs Done
7,183,798 UART: [art] Lock RT PCRs Done
7,185,059 UART: [art] Populate DV Done
7,193,350 UART: [fht] FMC Alias Private Key: 7
7,194,428 UART: [art] Derive CDI
7,194,708 UART: [art] Store in slot 0x4
7,280,488 UART: [art] Derive Key Pair
7,280,848 UART: [art] Store priv key in slot 0x5
7,293,907 UART: [art] Derive Key Pair - Done
7,308,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,324,051 UART: [art] Erasing AUTHORITY.KEYID = 7
7,324,816 UART: [art] PUB.X = ECA45E5538F0CAABE1C378F260785384D952FF237948EA0F9A861BCC2DCAD6E8706F21E5C6C67EC1C92C8EDFD4802FCA
7,331,605 UART: [art] PUB.Y = 66682998A85732A400E7538406ACE031CDEAADB81A83C94075911C468444111238BAABCD97647286D667C2525A6190B6
7,338,520 UART: [art] SIG.R = 8CE8EA17191C3FE0F2218FD2EEC45D2E91CA4FB626A1A73162DD7684F48D92068D1167409449C7535E5C1F8CB0796A29
7,345,291 UART: [art] SIG.S = 129D2F3B666DB305D4644F523E768CB93D2B0E8712C3F9DCF3C72BAD1BBB19F20E4F4FD48B094321E598D6A5D4F775FC
7,368,723 UART: Caliptra RT
7,368,974 UART: [state] CFI Enabled
7,732,979 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,763,762 UART: [rt]cmd =0x41545348, len=116
7,785,442 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,551 ready_for_fw is high
1,362,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,492 >>> mbox cmd response: success
3,039,743 UART:
3,039,759 UART: Running Caliptra FMC ...
3,040,167 UART:
3,040,221 UART: [state] CFI Enabled
3,050,735 UART: [fht] FMC Alias Private Key: 7
3,169,823 UART: [art] Extend RT PCRs Done
3,170,251 UART: [art] Lock RT PCRs Done
3,171,725 UART: [art] Populate DV Done
3,180,156 UART: [fht] FMC Alias Private Key: 7
3,181,120 UART: [art] Derive CDI
3,181,400 UART: [art] Store in slot 0x4
3,267,412 UART: [art] Derive Key Pair
3,267,772 UART: [art] Store priv key in slot 0x5
3,281,133 UART: [art] Derive Key Pair - Done
3,296,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,470 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,235 UART: [art] PUB.X = 7DF0B77DBAC0F5F25190749BAB443163014CB4B7C9E9EEC810A9903477341A5C7B068217CA71E35173BC6A42FAE36045
3,319,003 UART: [art] PUB.Y = 03789B9C6458C6028B29599ABBEBB1207C81411880E85453A3F5A78FC9C216852303D4EEF7250F011A65A1C4526AD1BB
3,325,936 UART: [art] SIG.R = 0F1A56B20CA75DE3DF726E833F30A615D91E5C316FD93850EC4334C07E11DE11CBE29663F93867F90494A3F8B6A2D8FE
3,332,705 UART: [art] SIG.S = 91C81AF8CD82C7DE8CA1644FA40C1CAED143348FFB86931694743A13DEC228EA8723928BC48482164B5194FA1F974D1E
3,356,322 UART: Caliptra RT
3,356,573 UART: [state] CFI Enabled
3,476,357 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,477,027 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,600,211 UART: [rt]cmd =0x41544d4e, len=14344
3,909,890 >>> mbox cmd response data (8 bytes)
3,909,891 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,940,132 UART: [rt]cmd =0x41545348, len=116
3,961,833 >>> mbox cmd response data (12 bytes)
3,961,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,775,716 >>> mbox cmd response: success
6,775,716 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,789,152 UART:
6,789,168 UART: Running Caliptra FMC ...
6,789,576 UART:
6,789,630 UART: [state] CFI Enabled
6,878,595 UART: [art] Extend RT PCRs Done
6,879,023 UART: [art] Lock RT PCRs Done
6,880,204 UART: [art] Populate DV Done
6,888,391 UART: [fht] FMC Alias Private Key: 7
6,889,465 UART: [art] Derive CDI
6,889,745 UART: [art] Store in slot 0x4
6,975,439 UART: [art] Derive Key Pair
6,975,799 UART: [art] Store priv key in slot 0x5
6,988,560 UART: [art] Derive Key Pair - Done
7,003,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,018,863 UART: [art] Erasing AUTHORITY.KEYID = 7
7,019,628 UART: [art] PUB.X = C52DC90591FB98676C8DA80846E836D515F41F7D1EEF9A0C839F7111E88342B42E18AA04C8593F4C3099EA62693616CF
7,026,386 UART: [art] PUB.Y = F5BB83C9875E3D4E2373BACB24AE91F8192E58F52A71BEBCB734E3ECC2CCF672DE790CC17FEF382921C2D244E19A7704
7,033,348 UART: [art] SIG.R = 9942D736BC5EBD5B958CA5C20F58479337CC308DD61442E8A458F5EE51C077792C3DABD0804FB6A5C1174601F22ADAB0
7,040,120 UART: [art] SIG.S = 5323F3908AE23E50B32004BDED6C2619484E45FED240DDFCA4C06D6B2686F209B8671A6CF01E1306CE20F181DAC62F8B
7,063,663 UART: Caliptra RT
7,063,914 UART: [state] CFI Enabled
7,429,991 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,460,952 UART: [rt]cmd =0x41545348, len=116
7,482,602 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,562 UART: [kat] SHA2-256
882,493 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,608 UART: [kat] ++
886,760 UART: [kat] sha1
890,932 UART: [kat] SHA2-256
892,870 UART: [kat] SHA2-384
895,771 UART: [kat] SHA2-512-ACC
897,672 UART: [kat] ECC-384
903,181 UART: [kat] HMAC-384Kdf
907,929 UART: [kat] LMS
1,476,125 UART: [kat] --
1,476,804 UART: [cold-reset] ++
1,477,310 UART: [fht] Storing FHT @ 0x50003400
1,480,093 UART: [idev] ++
1,480,261 UART: [idev] CDI.KEYID = 6
1,480,621 UART: [idev] SUBJECT.KEYID = 7
1,481,045 UART: [idev] UDS.KEYID = 0
1,481,390 ready_for_fw is high
1,481,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,983 UART: [idev] Erasing UDS.KEYID = 0
1,505,771 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,273 UART: [idev] --
1,515,144 UART: [ldev] ++
1,515,312 UART: [ldev] CDI.KEYID = 6
1,515,675 UART: [ldev] SUBJECT.KEYID = 5
1,516,101 UART: [ldev] AUTHORITY.KEYID = 7
1,516,564 UART: [ldev] FE.KEYID = 1
1,521,866 UART: [ldev] Erasing FE.KEYID = 1
1,547,515 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,365 UART: [ldev] --
1,586,774 UART: [fwproc] Waiting for Commands...
1,587,475 UART: [fwproc] Received command 0x46574c44
1,588,266 UART: [fwproc] Received Image of size 118548 bytes
2,933,396 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,214 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,432 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,829 >>> mbox cmd response: success
3,134,017 UART: [afmc] ++
3,134,185 UART: [afmc] CDI.KEYID = 6
3,134,547 UART: [afmc] SUBJECT.KEYID = 7
3,134,972 UART: [afmc] AUTHORITY.KEYID = 5
3,170,123 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,697 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,477 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,186 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,069 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,752 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,488 UART: [afmc] --
3,213,408 UART: [cold-reset] --
3,214,430 UART: [state] Locking Datavault
3,215,599 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,203 UART: [state] Locking ICCM
3,216,865 UART: [exit] Launching FMC @ 0x40000130
3,222,195 UART:
3,222,211 UART: Running Caliptra FMC ...
3,222,619 UART:
3,222,762 UART: [state] CFI Enabled
3,233,210 UART: [fht] FMC Alias Private Key: 7
3,352,012 UART: [art] Extend RT PCRs Done
3,352,440 UART: [art] Lock RT PCRs Done
3,354,260 UART: [art] Populate DV Done
3,362,441 UART: [fht] FMC Alias Private Key: 7
3,363,551 UART: [art] Derive CDI
3,363,831 UART: [art] Store in slot 0x4
3,449,713 UART: [art] Derive Key Pair
3,450,073 UART: [art] Store priv key in slot 0x5
3,464,182 UART: [art] Derive Key Pair - Done
3,479,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,875 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,640 UART: [art] PUB.X = 7F448B5329201742B05FCF71286657EAA207D23B1380BEDF5BDE069DA929E15CB471F7C4A2737D507D8C498265220544
3,502,397 UART: [art] PUB.Y = BC65F311946C170284D331B2CB6053E0C70D64584FE1672F45BA5766E876462DA13E6F8F013E08C6C614C1410ED51CA5
3,509,330 UART: [art] SIG.R = FF6F16AE48570FE4F3509BA1C141F03DB109EC5AEA20728A056E93008E2FF9BD54D3A0AAE03884B1960AFA1F9D45FA37
3,516,082 UART: [art] SIG.S = 76C8B4BE6548FBB1BA3B5EA6509D25C4095FF0F05E801A173BBE24640070A0D7490235D8199B6035181FC93C28863B16
3,539,988 UART: Caliptra RT
3,540,331 UART: [state] CFI Enabled
3,660,763 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,661,433 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,784,573 UART: [rt]cmd =0x41544d4e, len=14344
4,094,758 >>> mbox cmd response data (8 bytes)
4,094,759 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,746 UART: [rt]cmd =0x41545348, len=116
4,146,419 >>> mbox cmd response data (12 bytes)
4,146,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,147,028 UART:
4,147,044 UART: Running Caliptra ROM ...
4,147,452 UART:
4,147,593 UART: [state] CFI Enabled
4,149,727 UART: [state] LifecycleState = Unprovisioned
4,150,382 UART: [state] DebugLocked = No
4,150,870 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,152,463 UART: [kat] SHA2-256
4,946,394 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,950,509 UART: [kat] ++
4,950,661 UART: [kat] sha1
4,954,731 UART: [kat] SHA2-256
4,956,669 UART: [kat] SHA2-384
4,959,350 UART: [kat] SHA2-512-ACC
4,961,250 UART: [kat] ECC-384
4,967,025 UART: [kat] HMAC-384Kdf
4,971,877 UART: [kat] LMS
5,540,073 UART: [kat] --
5,540,956 UART: [update-reset] ++
6,922,658 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,923,734 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,079,001 >>> mbox cmd response: success
7,079,001 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,079,108 UART: [update-reset] Copying MAN_2 To MAN_1
7,087,122 UART: [update-reset Success] --
7,088,021 UART: [state] Locking Datavault
7,088,781 UART: [state] Locking PCR0, PCR1 and PCR31
7,089,385 UART: [state] Locking ICCM
7,089,861 UART: [exit] Launching FMC @ 0x40000130
7,095,191 UART:
7,095,207 UART: Running Caliptra FMC ...
7,095,615 UART:
7,095,758 UART: [state] CFI Enabled
7,185,325 UART: [art] Extend RT PCRs Done
7,185,753 UART: [art] Lock RT PCRs Done
7,186,922 UART: [art] Populate DV Done
7,195,217 UART: [fht] FMC Alias Private Key: 7
7,196,283 UART: [art] Derive CDI
7,196,563 UART: [art] Store in slot 0x4
7,282,367 UART: [art] Derive Key Pair
7,282,727 UART: [art] Store priv key in slot 0x5
7,296,228 UART: [art] Derive Key Pair - Done
7,311,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,326,543 UART: [art] Erasing AUTHORITY.KEYID = 7
7,327,308 UART: [art] PUB.X = C609F54A1B27139A96FA2D093926D0A00B07021775253A70F2F218A87420FBBCED6F534804F3DB486C67062D4F2A4794
7,334,053 UART: [art] PUB.Y = 0F8299D6E183B242F412BBB62E1487EEDB8A98595E20D8F4C9083425A1237DC1D0EC992A85A6358AA43DA6CA559EDF7F
7,341,007 UART: [art] SIG.R = 02417F4DEC73DC0F65DBDC81EB49A3CCF783DFA5E9D61A006C62ED971E189E4DB826F00193D2D2A9C0C6F49B05E62BDE
7,347,765 UART: [art] SIG.S = DA253690858DF4630855B060F88BA500BCE6CBD05AF15AAE4E910FB2D9121793A5A89CCB805DA67602AA1F29369479BA
7,371,500 UART: Caliptra RT
7,371,843 UART: [state] CFI Enabled
7,734,646 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,765,379 UART: [rt]cmd =0x41545348, len=116
7,786,599 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,280 ready_for_fw is high
1,363,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,787 >>> mbox cmd response: success
3,044,990 UART:
3,045,006 UART: Running Caliptra FMC ...
3,045,414 UART:
3,045,557 UART: [state] CFI Enabled
3,056,253 UART: [fht] FMC Alias Private Key: 7
3,175,975 UART: [art] Extend RT PCRs Done
3,176,403 UART: [art] Lock RT PCRs Done
3,178,331 UART: [art] Populate DV Done
3,186,628 UART: [fht] FMC Alias Private Key: 7
3,187,674 UART: [art] Derive CDI
3,187,954 UART: [art] Store in slot 0x4
3,274,130 UART: [art] Derive Key Pair
3,274,490 UART: [art] Store priv key in slot 0x5
3,288,251 UART: [art] Derive Key Pair - Done
3,302,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,318,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,318,891 UART: [art] PUB.X = BDD7E5AAE4BFD020338F85976952ACA6D4287A43B025E870C4D2C744264DBD8DCBB757D5E67B89B75C1418216DFAB28D
3,325,675 UART: [art] PUB.Y = 5725605054721324426B1BBC7C2E0E49F8570A930E8C5B3F89B4CDF539836FD27AF1D2059100FCD2D6420E59B3E7292A
3,332,586 UART: [art] SIG.R = 57242E0E104AD6A791B4C897C4E8C0E7F6E8D9DA657D9C351A937AD1C1E518BEB2269DF126948C883D07C78817C4DCF8
3,339,358 UART: [art] SIG.S = 15101D4FCEAE548338F50BFD08589F63FA48396BF058B7188FBE21BC60DBA605669A21AF45A33D3104BCA036237CB564
3,363,008 UART: Caliptra RT
3,363,351 UART: [state] CFI Enabled
3,484,272 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,484,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,640 UART: [rt]cmd =0x41544d4e, len=14344
3,917,637 >>> mbox cmd response data (8 bytes)
3,917,638 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,947,779 UART: [rt]cmd =0x41545348, len=116
3,969,148 >>> mbox cmd response data (12 bytes)
3,969,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,784,164 >>> mbox cmd response: success
6,784,164 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,797,224 UART:
6,797,240 UART: Running Caliptra FMC ...
6,797,648 UART:
6,797,791 UART: [state] CFI Enabled
6,886,844 UART: [art] Extend RT PCRs Done
6,887,272 UART: [art] Lock RT PCRs Done
6,888,477 UART: [art] Populate DV Done
6,896,512 UART: [fht] FMC Alias Private Key: 7
6,897,568 UART: [art] Derive CDI
6,897,848 UART: [art] Store in slot 0x4
6,983,482 UART: [art] Derive Key Pair
6,983,842 UART: [art] Store priv key in slot 0x5
6,997,635 UART: [art] Derive Key Pair - Done
7,012,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,027,577 UART: [art] Erasing AUTHORITY.KEYID = 7
7,028,342 UART: [art] PUB.X = C195D66F1D4F5977AB1DE8BEF5749615C9594F44F1B8C2EB7E97EE97B6E5BFA3A752095E0154AACCFC5F1E87ADBB003C
7,035,106 UART: [art] PUB.Y = 62A7B46335376FE8C481E9D94944016320F97BB408B66650B943F2F1A8293508E1C3BC11828A7A2D603C4A402C0D33F0
7,042,036 UART: [art] SIG.R = A214E6E8A0876EB19994F6A9E4C6757FE2109BA9FEF83179785479E5B49758AECEAB4108ADFAD5BA4D042AA5D2ED12D9
7,048,816 UART: [art] SIG.S = 6E85D4524E760784EF82A39982370A0E65181677FFF3BA2A108EAB961959EC20F30E23EC5E763FD25999D7F112ACBC3C
7,071,894 UART: Caliptra RT
7,072,237 UART: [state] CFI Enabled
7,436,902 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,467,619 UART: [rt]cmd =0x41545348, len=116
7,489,361 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
890,878 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,982 UART: [kat] ++
895,134 UART: [kat] sha1
899,322 UART: [kat] SHA2-256
901,262 UART: [kat] SHA2-384
903,991 UART: [kat] SHA2-512-ACC
905,892 UART: [kat] ECC-384
915,363 UART: [kat] HMAC-384Kdf
920,123 UART: [kat] LMS
1,168,435 UART: [kat] --
1,169,496 UART: [cold-reset] ++
1,170,010 UART: [fht] FHT @ 0x50003400
1,172,606 UART: [idev] ++
1,172,774 UART: [idev] CDI.KEYID = 6
1,173,135 UART: [idev] SUBJECT.KEYID = 7
1,173,560 UART: [idev] UDS.KEYID = 0
1,173,906 ready_for_fw is high
1,173,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,111 UART: [idev] Erasing UDS.KEYID = 0
1,198,943 UART: [idev] Sha1 KeyId Algorithm
1,207,705 UART: [idev] --
1,208,742 UART: [ldev] ++
1,208,910 UART: [ldev] CDI.KEYID = 6
1,209,274 UART: [ldev] SUBJECT.KEYID = 5
1,209,701 UART: [ldev] AUTHORITY.KEYID = 7
1,210,164 UART: [ldev] FE.KEYID = 1
1,215,308 UART: [ldev] Erasing FE.KEYID = 1
1,242,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,756 UART: [ldev] --
1,282,053 UART: [fwproc] Wait for Commands...
1,282,646 UART: [fwproc] Recv command 0x46574c44
1,283,379 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,259 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,434 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,693 >>> mbox cmd response: success
2,826,893 UART: [afmc] ++
2,827,061 UART: [afmc] CDI.KEYID = 6
2,827,424 UART: [afmc] SUBJECT.KEYID = 7
2,827,850 UART: [afmc] AUTHORITY.KEYID = 5
2,862,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,691 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,401 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,282 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,983 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,684 UART: [afmc] --
2,905,613 UART: [cold-reset] --
2,906,543 UART: [state] Locking Datavault
2,907,810 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,414 UART: [state] Locking ICCM
2,909,034 UART: [exit] Launching FMC @ 0x40000130
2,914,364 UART:
2,914,380 UART: Running Caliptra FMC ...
2,914,788 UART:
2,914,842 UART: [state] CFI Enabled
2,925,662 UART: [fht] FMC Alias Private Key: 7
3,044,802 UART: [art] Extend RT PCRs Done
3,045,230 UART: [art] Lock RT PCRs Done
3,046,786 UART: [art] Populate DV Done
3,055,017 UART: [fht] FMC Alias Private Key: 7
3,055,987 UART: [art] Derive CDI
3,056,267 UART: [art] Store in slot 0x4
3,142,176 UART: [art] Derive Key Pair
3,142,536 UART: [art] Store priv key in slot 0x5
3,156,270 UART: [art] Derive Key Pair - Done
3,170,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,780 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,545 UART: [art] PUB.X = B4043D68134F3A5A024A891C66C8BAD124436BEFD8BBD685B07516E7B736FA44EED9243CACB449E34DAEF8DB84989F2F
3,194,325 UART: [art] PUB.Y = 1E36977CCD64C37DCEB010DB36A759EF24D98D459FEC31254F9D9EAAF9A3E4A25DCCA32DF1E5D182955A1542F7AB18D3
3,201,295 UART: [art] SIG.R = 35DE813846D5EF1D4749EF62E3C077B5D725934EB4AF87C423C764EB5889480A9C5D9F93ACEE32BD461DF3AE5E209B41
3,208,072 UART: [art] SIG.S = 4A62C6ED25D176141890AAF2B66373F2ECA0D6B12A4C10746F9E52EF50783E96D59F1C0A20831EB2A96006C28822C2AD
3,232,076 UART: Caliptra RT
3,232,327 UART: [state] CFI Enabled
3,351,243 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,913 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,727 UART: [rt]cmd =0x41544d4e, len=14344
3,784,380 >>> mbox cmd response data (8 bytes)
3,784,381 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,426 UART: [rt]cmd =0x41545348, len=116
3,835,603 >>> mbox cmd response data (12 bytes)
3,835,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,425 UART:
3,836,441 UART: Running Caliptra ROM ...
3,836,849 UART:
3,836,904 UART: [state] CFI Enabled
3,839,594 UART: [state] LifecycleState = Unprovisioned
3,840,249 UART: [state] DebugLocked = No
3,840,863 UART: [state] WD Timer not started. Device not locked for debugging
3,842,119 UART: [kat] SHA2-256
4,645,669 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,649,773 UART: [kat] ++
4,649,925 UART: [kat] sha1
4,654,183 UART: [kat] SHA2-256
4,656,123 UART: [kat] SHA2-384
4,658,906 UART: [kat] SHA2-512-ACC
4,660,806 UART: [kat] ECC-384
4,670,141 UART: [kat] HMAC-384Kdf
4,674,753 UART: [kat] LMS
4,923,065 UART: [kat] --
4,924,293 UART: [update-reset] ++
6,283,322 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,284,369 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,439,584 >>> mbox cmd response: success
6,439,584 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,439,913 UART: [update-reset] Copying MAN_2 To MAN_1
6,447,927 UART: [update-reset Success] --
6,449,054 UART: [state] Locking Datavault
6,449,800 UART: [state] Locking PCR0, PCR1 and PCR31
6,450,404 UART: [state] Locking ICCM
6,450,912 UART: [exit] Launching FMC @ 0x40000130
6,456,242 UART:
6,456,258 UART: Running Caliptra FMC ...
6,456,666 UART:
6,456,720 UART: [state] CFI Enabled
6,545,665 UART: [art] Extend RT PCRs Done
6,546,093 UART: [art] Lock RT PCRs Done
6,547,382 UART: [art] Populate DV Done
6,555,641 UART: [fht] FMC Alias Private Key: 7
6,556,765 UART: [art] Derive CDI
6,557,045 UART: [art] Store in slot 0x4
6,642,810 UART: [art] Derive Key Pair
6,643,170 UART: [art] Store priv key in slot 0x5
6,656,750 UART: [art] Derive Key Pair - Done
6,671,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,687,331 UART: [art] Erasing AUTHORITY.KEYID = 7
6,688,096 UART: [art] PUB.X = B2868AC144E249B7C4D163A004105A59F1F7ABF971CA984604353E9ADAEBC9898801EB2AF5A4415A56043192ABF7DF03
6,694,857 UART: [art] PUB.Y = A1399F480EC9239631BF38B803ACC7EF0CA467FC6F3E42D93ADB57A0033C9621DB8E389B64870E3AF1E004800B43CC59
6,701,794 UART: [art] SIG.R = 9DB35CC7F26A6E66812A61EAA8FE6AF23AAC8F69E914477B6C9DD9C11C9CF7667D9149B60817AA88F400536693402EBC
6,708,549 UART: [art] SIG.S = 951BDBA7FA07F7720832400EF91A7CF30788924E4AC235F6E39DC2780BB344386D99663AED34564FFC9C6CB446365051
6,732,264 UART: Caliptra RT
6,732,515 UART: [state] CFI Enabled
7,097,614 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,128,511 UART: [rt]cmd =0x41545348, len=116
7,149,795 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,498 ready_for_fw is high
1,058,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,638 >>> mbox cmd response: success
2,741,379 UART:
2,741,395 UART: Running Caliptra FMC ...
2,741,803 UART:
2,741,857 UART: [state] CFI Enabled
2,752,079 UART: [fht] FMC Alias Private Key: 7
2,871,823 UART: [art] Extend RT PCRs Done
2,872,251 UART: [art] Lock RT PCRs Done
2,873,761 UART: [art] Populate DV Done
2,882,018 UART: [fht] FMC Alias Private Key: 7
2,883,158 UART: [art] Derive CDI
2,883,438 UART: [art] Store in slot 0x4
2,969,113 UART: [art] Derive Key Pair
2,969,473 UART: [art] Store priv key in slot 0x5
2,982,523 UART: [art] Derive Key Pair - Done
2,997,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,620 UART: [art] PUB.X = 957FF3665FB97D56F5569ADD81782101D40888918958BABC888951AA1D557E4F407EBE2B25825CC89008521AB5952202
3,020,370 UART: [art] PUB.Y = 67BF834F1CFA8EEE6863194B3A9983E184D8EC5C48887CCABE48A5BAD5E56CDC3950403C62B7BFBBF1821571D18B4E47
3,027,336 UART: [art] SIG.R = 283EEAC175B185407853DDCDAD21A1600B8D224F92DED5350BBD6B95BE9EF2422D2E941053A257C7527CFA35C0191E68
3,034,108 UART: [art] SIG.S = 877BF4B7CF72BE74E6D5A039B6E858D82588172D30CE7227C0BAF3A82B05226368493FABE4CCB2B08060C99586FBBA7F
3,058,215 UART: Caliptra RT
3,058,466 UART: [state] CFI Enabled
3,178,507 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,179,177 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,829 UART: [rt]cmd =0x41544d4e, len=14344
3,612,002 >>> mbox cmd response data (8 bytes)
3,612,003 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,966 UART: [rt]cmd =0x41545348, len=116
3,663,151 >>> mbox cmd response data (12 bytes)
3,663,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,150,366 >>> mbox cmd response: success
6,150,366 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,163,901 UART:
6,163,917 UART: Running Caliptra FMC ...
6,164,325 UART:
6,164,379 UART: [state] CFI Enabled
6,253,430 UART: [art] Extend RT PCRs Done
6,253,858 UART: [art] Lock RT PCRs Done
6,254,959 UART: [art] Populate DV Done
6,263,140 UART: [fht] FMC Alias Private Key: 7
6,264,306 UART: [art] Derive CDI
6,264,586 UART: [art] Store in slot 0x4
6,350,343 UART: [art] Derive Key Pair
6,350,703 UART: [art] Store priv key in slot 0x5
6,364,065 UART: [art] Derive Key Pair - Done
6,378,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,394,364 UART: [art] Erasing AUTHORITY.KEYID = 7
6,395,129 UART: [art] PUB.X = FC728A74991F53E5BC916F68195CB7960C51FBEADD1922B2DE0ABA685B24D4CFDB4D1DAE0ECACC10754B6EA0467482B8
6,401,912 UART: [art] PUB.Y = A5C15515DDF2B6BD572DAF2ACA0E63D1007D5305AEEA2D24B45F963606D8A78069006CCF1261EEDCD76B565AB9BF6CE1
6,408,829 UART: [art] SIG.R = A76DA1F00051D3243E18E92EB4101357030DA68F1FB1446AB9F11E9D1A09E76CC29C7598C61CABCF1DB5CC13119A72F1
6,415,578 UART: [art] SIG.S = 94450F0FC75FDD22A58EA1660699278D6E8D7469CBB3CC4A7A5A41CF080ACD932438BE297F2257663319C65F3BDB1EA6
6,438,947 UART: Caliptra RT
6,439,198 UART: [state] CFI Enabled
6,804,167 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,834,986 UART: [rt]cmd =0x41545348, len=116
6,855,908 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,137 UART: [kat] SHA2-256
902,077 UART: [kat] SHA2-384
904,746 UART: [kat] SHA2-512-ACC
906,647 UART: [kat] ECC-384
916,430 UART: [kat] HMAC-384Kdf
921,118 UART: [kat] LMS
1,169,430 UART: [kat] --
1,169,977 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,173,165 UART: [idev] ++
1,173,333 UART: [idev] CDI.KEYID = 6
1,173,694 UART: [idev] SUBJECT.KEYID = 7
1,174,119 UART: [idev] UDS.KEYID = 0
1,174,465 ready_for_fw is high
1,174,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,248 UART: [idev] Erasing UDS.KEYID = 0
1,199,228 UART: [idev] Sha1 KeyId Algorithm
1,208,098 UART: [idev] --
1,209,295 UART: [ldev] ++
1,209,463 UART: [ldev] CDI.KEYID = 6
1,209,827 UART: [ldev] SUBJECT.KEYID = 5
1,210,254 UART: [ldev] AUTHORITY.KEYID = 7
1,210,717 UART: [ldev] FE.KEYID = 1
1,216,075 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,965 UART: [ldev] --
1,282,362 UART: [fwproc] Wait for Commands...
1,283,061 UART: [fwproc] Recv command 0x46574c44
1,283,794 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,718 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,893 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,188 >>> mbox cmd response: success
2,826,274 UART: [afmc] ++
2,826,442 UART: [afmc] CDI.KEYID = 6
2,826,805 UART: [afmc] SUBJECT.KEYID = 7
2,827,231 UART: [afmc] AUTHORITY.KEYID = 5
2,863,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,548 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,258 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,139 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,840 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,481 UART: [afmc] --
2,906,444 UART: [cold-reset] --
2,907,236 UART: [state] Locking Datavault
2,908,273 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,877 UART: [state] Locking ICCM
2,909,545 UART: [exit] Launching FMC @ 0x40000130
2,914,875 UART:
2,914,891 UART: Running Caliptra FMC ...
2,915,299 UART:
2,915,442 UART: [state] CFI Enabled
2,926,478 UART: [fht] FMC Alias Private Key: 7
3,045,496 UART: [art] Extend RT PCRs Done
3,045,924 UART: [art] Lock RT PCRs Done
3,047,452 UART: [art] Populate DV Done
3,055,861 UART: [fht] FMC Alias Private Key: 7
3,056,899 UART: [art] Derive CDI
3,057,179 UART: [art] Store in slot 0x4
3,142,858 UART: [art] Derive Key Pair
3,143,218 UART: [art] Store priv key in slot 0x5
3,156,220 UART: [art] Derive Key Pair - Done
3,170,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,194 UART: [art] PUB.X = 1EF5CEF2ED5054BA9904B488550E59C193E27E3C5997A244196FB5EAAD9BFAE30147A836B777432A4B5DB409E89F07C5
3,193,957 UART: [art] PUB.Y = B94E36D4B0E89E0E595B4B99569B525F1B2649E3234794E107CEC0227422252989C3112BFF70AB88E9E3D771526F4325
3,200,893 UART: [art] SIG.R = 3F943860D6D91887124590D2094D3276B0EAE524142D2C0307F930724A36426C9FE2B4EA5052291024FFC4AF3494E63C
3,207,644 UART: [art] SIG.S = 8BB9BC70F5AEF24EB5F3747C442A9C1DCA4086965822A2FDBC5D07B56D6EC06E8F7E4124DF3D441790CD4D02881C2D52
3,231,796 UART: Caliptra RT
3,232,139 UART: [state] CFI Enabled
3,351,532 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,202 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,172 UART: [rt]cmd =0x41544d4e, len=14344
3,785,167 >>> mbox cmd response data (8 bytes)
3,785,168 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,091 UART: [rt]cmd =0x41545348, len=116
3,836,416 >>> mbox cmd response data (12 bytes)
3,836,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,018 UART:
3,837,034 UART: Running Caliptra ROM ...
3,837,442 UART:
3,837,584 UART: [state] CFI Enabled
3,840,552 UART: [state] LifecycleState = Unprovisioned
3,841,207 UART: [state] DebugLocked = No
3,841,859 UART: [state] WD Timer not started. Device not locked for debugging
3,842,995 UART: [kat] SHA2-256
4,646,545 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,650,649 UART: [kat] ++
4,650,801 UART: [kat] sha1
4,654,919 UART: [kat] SHA2-256
4,656,859 UART: [kat] SHA2-384
4,659,408 UART: [kat] SHA2-512-ACC
4,661,308 UART: [kat] ECC-384
4,670,801 UART: [kat] HMAC-384Kdf
4,675,537 UART: [kat] LMS
4,923,849 UART: [kat] --
4,924,575 UART: [update-reset] ++
6,283,408 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,284,601 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,439,816 >>> mbox cmd response: success
6,439,816 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,439,981 UART: [update-reset] Copying MAN_2 To MAN_1
6,447,995 UART: [update-reset Success] --
6,448,916 UART: [state] Locking Datavault
6,449,820 UART: [state] Locking PCR0, PCR1 and PCR31
6,450,424 UART: [state] Locking ICCM
6,450,948 UART: [exit] Launching FMC @ 0x40000130
6,456,278 UART:
6,456,294 UART: Running Caliptra FMC ...
6,456,702 UART:
6,456,845 UART: [state] CFI Enabled
6,546,396 UART: [art] Extend RT PCRs Done
6,546,824 UART: [art] Lock RT PCRs Done
6,548,203 UART: [art] Populate DV Done
6,556,408 UART: [fht] FMC Alias Private Key: 7
6,557,440 UART: [art] Derive CDI
6,557,720 UART: [art] Store in slot 0x4
6,643,701 UART: [art] Derive Key Pair
6,644,061 UART: [art] Store priv key in slot 0x5
6,657,809 UART: [art] Derive Key Pair - Done
6,672,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,688,609 UART: [art] Erasing AUTHORITY.KEYID = 7
6,689,374 UART: [art] PUB.X = ABBDE925897F4C4D3DDB3DAF4B1549D52F959BE802E76D1A70570651CA0F62BF2B52300BA29BD99714BCF45EFD24CC91
6,696,150 UART: [art] PUB.Y = 35F3A4E7A4BD40D5788DE825AB88A8816089F89B676C351D42039CE71653960F58F53C2EBC7242162DA8F71705B837E5
6,703,087 UART: [art] SIG.R = 43FF8410D0ABB548846ACE2698E46CB4BE98DEEF251E90883AF0C1809665C1166976DA9FD3D8C43941432BDB9DE87ED3
6,709,867 UART: [art] SIG.S = D434F9CE4BF88CEF624B32E3F638CC86135D5DC383E69A633C15F80D91636A600224212732ED4D82B17580DC14534AB4
6,733,521 UART: Caliptra RT
6,733,864 UART: [state] CFI Enabled
7,098,884 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,129,641 UART: [rt]cmd =0x41545348, len=116
7,150,113 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,859 ready_for_fw is high
1,059,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,999 >>> mbox cmd response: success
2,743,790 UART:
2,743,806 UART: Running Caliptra FMC ...
2,744,214 UART:
2,744,357 UART: [state] CFI Enabled
2,755,289 UART: [fht] FMC Alias Private Key: 7
2,874,253 UART: [art] Extend RT PCRs Done
2,874,681 UART: [art] Lock RT PCRs Done
2,876,289 UART: [art] Populate DV Done
2,884,582 UART: [fht] FMC Alias Private Key: 7
2,885,698 UART: [art] Derive CDI
2,885,978 UART: [art] Store in slot 0x4
2,972,071 UART: [art] Derive Key Pair
2,972,431 UART: [art] Store priv key in slot 0x5
2,986,123 UART: [art] Derive Key Pair - Done
3,000,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,868 UART: [art] PUB.X = A3994E809DB13A52C7067F8D0503DCCF43038993E44437A6A64076D8142B0C816D2853B91EDB71019E661000EE54A42F
3,023,592 UART: [art] PUB.Y = 1347E098200677AC7F7F1EEFAE3C37FA3F49FE213A9CCFF6CCDD89F2A8985B6A4FFAC41F490685C4F2E295FB7F4195B6
3,030,556 UART: [art] SIG.R = DDACC64B8406AA10D6C139688A95FC34E3B0013D631ACB6F8ADF9F4442250785E5FCA7FBC53CD3C7898A58132A6F8FA3
3,037,333 UART: [art] SIG.S = 38E65AD7099641C65EA136CDD35E2AEC803E5CCB866A1D47A4D16B5F28A92C24B3F21F118E34A2D1E186F7D218EFBFB4
3,061,084 UART: Caliptra RT
3,061,427 UART: [state] CFI Enabled
3,181,514 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,182,184 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,054 UART: [rt]cmd =0x41544d4e, len=14344
3,614,343 >>> mbox cmd response data (8 bytes)
3,614,344 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,525 UART: [rt]cmd =0x41545348, len=116
3,666,632 >>> mbox cmd response data (12 bytes)
3,666,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,156,120 >>> mbox cmd response: success
6,156,120 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,169,321 UART:
6,169,337 UART: Running Caliptra FMC ...
6,169,745 UART:
6,169,888 UART: [state] CFI Enabled
6,259,453 UART: [art] Extend RT PCRs Done
6,259,881 UART: [art] Lock RT PCRs Done
6,261,110 UART: [art] Populate DV Done
6,269,305 UART: [fht] FMC Alias Private Key: 7
6,270,439 UART: [art] Derive CDI
6,270,719 UART: [art] Store in slot 0x4
6,356,712 UART: [art] Derive Key Pair
6,357,072 UART: [art] Store priv key in slot 0x5
6,370,130 UART: [art] Derive Key Pair - Done
6,385,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,400,365 UART: [art] Erasing AUTHORITY.KEYID = 7
6,401,130 UART: [art] PUB.X = 92DA25360DB9E5B0907DF1D8F7C765A981995A38529BDD15C0FC0A8C2269366C153B27C37D2353ED09DD5E1237FE3FC2
6,407,897 UART: [art] PUB.Y = 08368CE06EE7BE85360A34A5566361A2E79BC8BFCD7F763A6A8C657140965C949A6EC9EE6077F3F05615AFBF3654D698
6,414,845 UART: [art] SIG.R = 710D36C98E1450CEE796D11051024BB4456EB2196B1A0C8376B23440A02F4B632C1D17E6113A48E0327CBE027B15A180
6,421,597 UART: [art] SIG.S = 452E1E5FE6561172EBB18CD9804AFA56F2691D40FDE533FBD5D0A0778E46014301A96DCC76947521FF9673209C36CCC9
6,445,781 UART: Caliptra RT
6,446,124 UART: [state] CFI Enabled
6,811,033 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,841,926 UART: [rt]cmd =0x41545348, len=116
6,863,228 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
893,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,369 UART: [kat] ++
897,521 UART: [kat] sha1
901,675 UART: [kat] SHA2-256
903,615 UART: [kat] SHA2-384
906,346 UART: [kat] SHA2-512-ACC
908,247 UART: [kat] ECC-384
917,720 UART: [kat] HMAC-384Kdf
922,286 UART: [kat] LMS
1,170,614 UART: [kat] --
1,171,739 UART: [cold-reset] ++
1,172,251 UART: [fht] FHT @ 0x50003400
1,174,738 UART: [idev] ++
1,174,906 UART: [idev] CDI.KEYID = 6
1,175,266 UART: [idev] SUBJECT.KEYID = 7
1,175,690 UART: [idev] UDS.KEYID = 0
1,176,035 ready_for_fw is high
1,176,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,276 UART: [idev] Erasing UDS.KEYID = 0
1,200,205 UART: [idev] Sha1 KeyId Algorithm
1,208,867 UART: [idev] --
1,209,915 UART: [ldev] ++
1,210,083 UART: [ldev] CDI.KEYID = 6
1,210,446 UART: [ldev] SUBJECT.KEYID = 5
1,210,872 UART: [ldev] AUTHORITY.KEYID = 7
1,211,335 UART: [ldev] FE.KEYID = 1
1,216,595 UART: [ldev] Erasing FE.KEYID = 1
1,242,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,619 UART: [ldev] --
1,281,960 UART: [fwproc] Wait for Commands...
1,282,594 UART: [fwproc] Recv command 0x46574c44
1,283,322 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,118 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,288 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,495 >>> mbox cmd response: success
2,826,685 UART: [afmc] ++
2,826,853 UART: [afmc] CDI.KEYID = 6
2,827,215 UART: [afmc] SUBJECT.KEYID = 7
2,827,640 UART: [afmc] AUTHORITY.KEYID = 5
2,863,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,382 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,091 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,974 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,675 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,473 UART: [afmc] --
2,906,547 UART: [cold-reset] --
2,907,421 UART: [state] Locking Datavault
2,908,802 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,406 UART: [state] Locking ICCM
2,909,910 UART: [exit] Launching FMC @ 0x40000130
2,915,240 UART:
2,915,256 UART: Running Caliptra FMC ...
2,915,664 UART:
2,915,718 UART: [state] CFI Enabled
2,926,078 UART: [fht] FMC Alias Private Key: 7
3,045,498 UART: [art] Extend RT PCRs Done
3,045,926 UART: [art] Lock RT PCRs Done
3,047,670 UART: [art] Populate DV Done
3,055,921 UART: [fht] FMC Alias Private Key: 7
3,057,033 UART: [art] Derive CDI
3,057,313 UART: [art] Store in slot 0x4
3,143,240 UART: [art] Derive Key Pair
3,143,600 UART: [art] Store priv key in slot 0x5
3,156,916 UART: [art] Derive Key Pair - Done
3,171,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,415 UART: [art] PUB.X = EEFB46ADB84798A810D52EDDCE300124F0E6FDFC848BA0034055BE6CF6A1A470138366689286E644C693ECAA3E180AEA
3,194,190 UART: [art] PUB.Y = D1397A0341D0A8B28DC6FAC082F392BC09CADBAFC91AA32313EFF2EBE8A398454ECA5538A7CB31B89D69857CEF3C973E
3,201,156 UART: [art] SIG.R = 3A675DE26190A1830024DC3A30DB535AAA4961CBDF2A0F28A093AF4C5608C9A08D4B25ACBCA6592965667949A781D752
3,207,902 UART: [art] SIG.S = 44434B57D6E265F7EA6538D8067E981CD900AEB4B9C14245B820C933DB94484A9C7D37AD1026E9CB492F97FE76F909FE
3,231,750 UART: Caliptra RT
3,232,001 UART: [state] CFI Enabled
3,352,037 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,707 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,919 UART: [rt]cmd =0x41544d4e, len=14344
3,785,804 >>> mbox cmd response data (8 bytes)
3,785,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,980 UART: [rt]cmd =0x41545348, len=116
3,837,783 >>> mbox cmd response data (12 bytes)
3,837,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,729 UART:
3,838,745 UART: Running Caliptra ROM ...
3,839,153 UART:
3,839,208 UART: [state] CFI Enabled
3,841,522 UART: [state] LifecycleState = Unprovisioned
3,842,177 UART: [state] DebugLocked = No
3,842,713 UART: [state] WD Timer not started. Device not locked for debugging
3,844,067 UART: [kat] SHA2-256
4,649,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,653,842 UART: [kat] ++
4,653,994 UART: [kat] sha1
4,658,368 UART: [kat] SHA2-256
4,660,308 UART: [kat] SHA2-384
4,663,043 UART: [kat] SHA2-512-ACC
4,664,943 UART: [kat] ECC-384
4,674,984 UART: [kat] HMAC-384Kdf
4,679,724 UART: [kat] LMS
4,928,052 UART: [kat] --
4,929,160 UART: [update-reset] ++
6,287,618 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,288,597 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,443,812 >>> mbox cmd response: success
6,443,812 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,443,947 UART: [update-reset] Copying MAN_2 To MAN_1
6,451,961 UART: [update-reset Success] --
6,452,932 UART: [state] Locking Datavault
6,453,828 UART: [state] Locking PCR0, PCR1 and PCR31
6,454,432 UART: [state] Locking ICCM
6,454,902 UART: [exit] Launching FMC @ 0x40000130
6,460,232 UART:
6,460,248 UART: Running Caliptra FMC ...
6,460,656 UART:
6,460,710 UART: [state] CFI Enabled
6,549,247 UART: [art] Extend RT PCRs Done
6,549,675 UART: [art] Lock RT PCRs Done
6,551,206 UART: [art] Populate DV Done
6,559,359 UART: [fht] FMC Alias Private Key: 7
6,560,297 UART: [art] Derive CDI
6,560,577 UART: [art] Store in slot 0x4
6,646,546 UART: [art] Derive Key Pair
6,646,906 UART: [art] Store priv key in slot 0x5
6,659,744 UART: [art] Derive Key Pair - Done
6,674,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,690,549 UART: [art] Erasing AUTHORITY.KEYID = 7
6,691,314 UART: [art] PUB.X = 11A7382DDC3BBE0E7D1B710BD85065837525496C177F2962C90C2B639F6C8D9AA019D0ED450FCC12A4BF5CB98A26CAD1
6,698,084 UART: [art] PUB.Y = 626E40ED1C4978F07671BBEA215F1CFFEB6A8E94371728B19D88CD84EEAF703D6855134EE24EC827BF141B9075F18C34
6,705,042 UART: [art] SIG.R = AF10132D27325FD67A3F4D4ADBB0F18BEAF2C4E204DFFEC462055BCD26EC0A38740E0532FDE136594407CBBC59368791
6,711,808 UART: [art] SIG.S = C6D6C45B0C6CAD557F5B1CF957628DD613D6A2E485229755AC76194AEDB1F2472A9DC34D7CA6D9BF0E2B7D41023297C0
6,735,789 UART: Caliptra RT
6,736,040 UART: [state] CFI Enabled
7,100,577 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,131,284 UART: [rt]cmd =0x41545348, len=116
7,152,940 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,409 ready_for_fw is high
1,059,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,314 >>> mbox cmd response: success
2,741,249 UART:
2,741,265 UART: Running Caliptra FMC ...
2,741,673 UART:
2,741,727 UART: [state] CFI Enabled
2,752,191 UART: [fht] FMC Alias Private Key: 7
2,870,595 UART: [art] Extend RT PCRs Done
2,871,023 UART: [art] Lock RT PCRs Done
2,872,569 UART: [art] Populate DV Done
2,880,908 UART: [fht] FMC Alias Private Key: 7
2,882,020 UART: [art] Derive CDI
2,882,300 UART: [art] Store in slot 0x4
2,968,087 UART: [art] Derive Key Pair
2,968,447 UART: [art] Store priv key in slot 0x5
2,981,811 UART: [art] Derive Key Pair - Done
2,996,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,598 UART: [art] PUB.X = A34BA12A3A1CB2B390E7808FB8B0204046E4A458C0675E9CAAF6F64B5B6ECFEA04F026DDB62DFD9A09A9B3456DB5C929
3,019,382 UART: [art] PUB.Y = 99B2E269E18105BFEBA7F3C70C8F8F6453A199A53E395A085CCFDA0F8818229B0FF9924B52D8C211EED68D2263D66F63
3,026,325 UART: [art] SIG.R = B30B843812A17802F33CB54441A4717666D1AE211BB5089858F1F1CB4BA271804CAB953E9680D433070CAAA1DDEDF97F
3,033,084 UART: [art] SIG.S = 922BF638DA376579B5A6275B8ACA3918490868DB672FC012F90639E5DFCEBA2EFF29AC257D40F87D0B3B9AE8CF1F018B
3,056,884 UART: Caliptra RT
3,057,135 UART: [state] CFI Enabled
3,176,629 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,167 UART: [rt]cmd =0x41544d4e, len=14344
3,610,088 >>> mbox cmd response data (8 bytes)
3,610,089 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,016 UART: [rt]cmd =0x41545348, len=116
3,661,841 >>> mbox cmd response data (12 bytes)
3,661,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,152,589 >>> mbox cmd response: success
6,152,589 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,166,114 UART:
6,166,130 UART: Running Caliptra FMC ...
6,166,538 UART:
6,166,592 UART: [state] CFI Enabled
6,255,897 UART: [art] Extend RT PCRs Done
6,256,325 UART: [art] Lock RT PCRs Done
6,257,526 UART: [art] Populate DV Done
6,265,749 UART: [fht] FMC Alias Private Key: 7
6,266,703 UART: [art] Derive CDI
6,266,983 UART: [art] Store in slot 0x4
6,352,930 UART: [art] Derive Key Pair
6,353,290 UART: [art] Store priv key in slot 0x5
6,366,876 UART: [art] Derive Key Pair - Done
6,381,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,397,287 UART: [art] Erasing AUTHORITY.KEYID = 7
6,398,052 UART: [art] PUB.X = 5A376B5BB69ECD9C47C9349B866EF3F4D1610ECBA615660F0706E83B702342F2F4FB2E353C525EB738AACD96CDE5C3EE
6,404,826 UART: [art] PUB.Y = 602FC0ABA5DF07C9C4868EA152E4DD60E95688E00419A3B742BCE856D8933D8FEBC51FECC499EC59A73253D6C37E81DF
6,411,786 UART: [art] SIG.R = 79A56D81EF165135A6BC439A70CEA91CB3A7E7DD53221E8F33DCF72CCDFEEC9FBF56B0CB1BF7D0E2E391361D4039C8EF
6,418,582 UART: [art] SIG.S = A92F8B799B2BAA348F83F4136A83A1F61E3BF2DD45F7512FF915E56C439CAD9FB244B266D2890BBB4A0B538B7DECE6ED
6,442,478 UART: Caliptra RT
6,442,729 UART: [state] CFI Enabled
6,806,223 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,836,936 UART: [rt]cmd =0x41545348, len=116
6,858,138 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
893,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,870 UART: [kat] ++
898,022 UART: [kat] sha1
902,140 UART: [kat] SHA2-256
904,080 UART: [kat] SHA2-384
906,691 UART: [kat] SHA2-512-ACC
908,592 UART: [kat] ECC-384
918,419 UART: [kat] HMAC-384Kdf
923,043 UART: [kat] LMS
1,171,371 UART: [kat] --
1,172,428 UART: [cold-reset] ++
1,172,848 UART: [fht] FHT @ 0x50003400
1,175,503 UART: [idev] ++
1,175,671 UART: [idev] CDI.KEYID = 6
1,176,031 UART: [idev] SUBJECT.KEYID = 7
1,176,455 UART: [idev] UDS.KEYID = 0
1,176,800 ready_for_fw is high
1,176,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,715 UART: [idev] Erasing UDS.KEYID = 0
1,202,210 UART: [idev] Sha1 KeyId Algorithm
1,210,538 UART: [idev] --
1,211,570 UART: [ldev] ++
1,211,738 UART: [ldev] CDI.KEYID = 6
1,212,101 UART: [ldev] SUBJECT.KEYID = 5
1,212,527 UART: [ldev] AUTHORITY.KEYID = 7
1,212,990 UART: [ldev] FE.KEYID = 1
1,218,166 UART: [ldev] Erasing FE.KEYID = 1
1,244,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,064 UART: [ldev] --
1,283,435 UART: [fwproc] Wait for Commands...
1,284,021 UART: [fwproc] Recv command 0x46574c44
1,284,749 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,777 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,947 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,202 >>> mbox cmd response: success
2,829,418 UART: [afmc] ++
2,829,586 UART: [afmc] CDI.KEYID = 6
2,829,948 UART: [afmc] SUBJECT.KEYID = 7
2,830,373 UART: [afmc] AUTHORITY.KEYID = 5
2,866,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,891 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,600 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,483 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,184 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,044 UART: [afmc] --
2,910,020 UART: [cold-reset] --
2,910,798 UART: [state] Locking Datavault
2,912,081 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,685 UART: [state] Locking ICCM
2,913,265 UART: [exit] Launching FMC @ 0x40000130
2,918,595 UART:
2,918,611 UART: Running Caliptra FMC ...
2,919,019 UART:
2,919,162 UART: [state] CFI Enabled
2,929,844 UART: [fht] FMC Alias Private Key: 7
3,049,312 UART: [art] Extend RT PCRs Done
3,049,740 UART: [art] Lock RT PCRs Done
3,051,068 UART: [art] Populate DV Done
3,059,619 UART: [fht] FMC Alias Private Key: 7
3,060,703 UART: [art] Derive CDI
3,060,983 UART: [art] Store in slot 0x4
3,147,024 UART: [art] Derive Key Pair
3,147,384 UART: [art] Store priv key in slot 0x5
3,160,572 UART: [art] Derive Key Pair - Done
3,175,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,745 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,510 UART: [art] PUB.X = 6F42C06F6149DA39B8EBC1C718D1B47389AA540EE5D1B199CD72A4B994C937C1CD61551DF94764A2D985E488A77CB63F
3,198,285 UART: [art] PUB.Y = 40650C1FF007991808FEA9DBD628F1C1C5E34B218B68A74872E5B30CD6A8194775B12E4877981352F24A4D293FF3B7B3
3,205,221 UART: [art] SIG.R = 87B12548D96B1E2B02B4705B3184242AFCBA9A114E89C0ADF7668D02646A95E3812138ED4D57E8D4A3502A2D4E06ED08
3,211,981 UART: [art] SIG.S = 4AA03B70FFA83C16A0DB4626AF12A2BBDFA44B7C04E364425F3A28BE3634428F464D6FA5C5EBC56186425F01D7E18653
3,235,475 UART: Caliptra RT
3,235,818 UART: [state] CFI Enabled
3,355,101 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,355,771 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,001 UART: [rt]cmd =0x41544d4e, len=14344
3,788,384 >>> mbox cmd response data (8 bytes)
3,788,385 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,542 UART: [rt]cmd =0x41545348, len=116
3,840,525 >>> mbox cmd response data (12 bytes)
3,840,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,143 UART:
3,841,159 UART: Running Caliptra ROM ...
3,841,567 UART:
3,841,709 UART: [state] CFI Enabled
3,844,495 UART: [state] LifecycleState = Unprovisioned
3,845,150 UART: [state] DebugLocked = No
3,845,848 UART: [state] WD Timer not started. Device not locked for debugging
3,847,202 UART: [kat] SHA2-256
4,652,852 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,656,977 UART: [kat] ++
4,657,129 UART: [kat] sha1
4,661,411 UART: [kat] SHA2-256
4,663,351 UART: [kat] SHA2-384
4,666,024 UART: [kat] SHA2-512-ACC
4,667,924 UART: [kat] ECC-384
4,677,723 UART: [kat] HMAC-384Kdf
4,682,367 UART: [kat] LMS
4,930,695 UART: [kat] --
4,931,531 UART: [update-reset] ++
6,291,229 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,292,254 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,447,469 >>> mbox cmd response: success
6,447,469 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,447,606 UART: [update-reset] Copying MAN_2 To MAN_1
6,455,620 UART: [update-reset Success] --
6,456,731 UART: [state] Locking Datavault
6,457,665 UART: [state] Locking PCR0, PCR1 and PCR31
6,458,269 UART: [state] Locking ICCM
6,458,813 UART: [exit] Launching FMC @ 0x40000130
6,464,143 UART:
6,464,159 UART: Running Caliptra FMC ...
6,464,567 UART:
6,464,710 UART: [state] CFI Enabled
6,553,841 UART: [art] Extend RT PCRs Done
6,554,269 UART: [art] Lock RT PCRs Done
6,555,438 UART: [art] Populate DV Done
6,563,625 UART: [fht] FMC Alias Private Key: 7
6,564,737 UART: [art] Derive CDI
6,565,017 UART: [art] Store in slot 0x4
6,650,860 UART: [art] Derive Key Pair
6,651,220 UART: [art] Store priv key in slot 0x5
6,664,686 UART: [art] Derive Key Pair - Done
6,679,475 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,694,844 UART: [art] Erasing AUTHORITY.KEYID = 7
6,695,609 UART: [art] PUB.X = 88414374C7997F32B22A6ECF80C623BB0F991E8AAD427E2E87836C38ABF70952746CCC9ED2C5D0161EED90B880BDC13C
6,702,383 UART: [art] PUB.Y = 41912A3ADEE0D08E3048487B943CDC6AF04D1FB1D2E17D5F86A4C17E3CB94AF80032B905CDB26F6D86ADC6C910BC8CE9
6,709,328 UART: [art] SIG.R = 4B6D66397778B7BACE9DDA46BCD2193F88D72AA8F21897D3039B31839369EE8EDBB6F0C52792B589937BF67DF161C1A9
6,716,103 UART: [art] SIG.S = A5CD6E1F039E90E7948144F4EF4653AF6B84AB3A91512FADEEBBE5663521942F0C48116899583FA6E2B43C012D351C7C
6,739,756 UART: Caliptra RT
6,740,099 UART: [state] CFI Enabled
7,107,631 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,138,620 UART: [rt]cmd =0x41545348, len=116
7,160,504 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,998 ready_for_fw is high
1,059,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,377 >>> mbox cmd response: success
2,742,018 UART:
2,742,034 UART: Running Caliptra FMC ...
2,742,442 UART:
2,742,585 UART: [state] CFI Enabled
2,753,197 UART: [fht] FMC Alias Private Key: 7
2,872,953 UART: [art] Extend RT PCRs Done
2,873,381 UART: [art] Lock RT PCRs Done
2,874,509 UART: [art] Populate DV Done
2,882,768 UART: [fht] FMC Alias Private Key: 7
2,883,932 UART: [art] Derive CDI
2,884,212 UART: [art] Store in slot 0x4
2,970,081 UART: [art] Derive Key Pair
2,970,441 UART: [art] Store priv key in slot 0x5
2,983,875 UART: [art] Derive Key Pair - Done
2,999,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,297 UART: [art] PUB.X = 7594C3C4406F5D115A095C3F81DEE36F0AEE7FD7C6358D1BB14A0E1C2162B0F03AC17D6D6930CDB4FC70892117E7AFF7
3,022,072 UART: [art] PUB.Y = 6B8A9A3E4F96117F109F1D97C043FA2209E514B70D12F68DB7E1EBF8614DF41BB50048B31355A633C5A98CA0F77A5B43
3,029,000 UART: [art] SIG.R = C1194904303119A6D364A8E1B3E8F284840CF271205188559DDAF9CA5E78A46EDA7AEDA892F63340FD8756415C3C38F9
3,035,764 UART: [art] SIG.S = A9F871C027FCF0E6DC0DF744A2FE6DD08BB681398927205F9E9E17154E7FC15113406A45A4155CE60F81DA2A110498DC
3,059,929 UART: Caliptra RT
3,060,272 UART: [state] CFI Enabled
3,180,354 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,181,024 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,196 UART: [rt]cmd =0x41544d4e, len=14344
3,613,845 >>> mbox cmd response data (8 bytes)
3,613,846 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,945 UART: [rt]cmd =0x41545348, len=116
3,665,188 >>> mbox cmd response data (12 bytes)
3,665,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,155,819 >>> mbox cmd response: success
6,155,819 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,169,312 UART:
6,169,328 UART: Running Caliptra FMC ...
6,169,736 UART:
6,169,879 UART: [state] CFI Enabled
6,259,170 UART: [art] Extend RT PCRs Done
6,259,598 UART: [art] Lock RT PCRs Done
6,261,007 UART: [art] Populate DV Done
6,269,244 UART: [fht] FMC Alias Private Key: 7
6,270,340 UART: [art] Derive CDI
6,270,620 UART: [art] Store in slot 0x4
6,356,289 UART: [art] Derive Key Pair
6,356,649 UART: [art] Store priv key in slot 0x5
6,369,445 UART: [art] Derive Key Pair - Done
6,384,378 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,399,717 UART: [art] Erasing AUTHORITY.KEYID = 7
6,400,482 UART: [art] PUB.X = F45C37422D6A96A00AF25320CD4DE2F093C558C283FEA7744C77E4C20670C1C56B9629259D2A44E9E985EA4661A44B17
6,407,246 UART: [art] PUB.Y = F9C96D12244B895F5FB50B788ED9C7A3C0ADEC330B8DD16A476ED8E48D55729C7F1022A70F761ED9DE6B4A461AB703E3
6,414,198 UART: [art] SIG.R = 05578B903303DE2E21C50ACC56F8A40D4A868C094F9AE7D151E7A9CE27C491B318B77DF19ECEACCE277A54FFFA01F874
6,420,966 UART: [art] SIG.S = AF9722940169414783B238967EFFBF26F258D398F3542D4E55857CE545A81B1E98AFE6711F3D9F744AD7B33AEE0EE692
6,444,222 UART: Caliptra RT
6,444,565 UART: [state] CFI Enabled
6,811,855 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,842,620 UART: [rt]cmd =0x41545348, len=116
6,864,644 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
192,258 UART:
192,618 UART: Running Caliptra ROM ...
193,830 UART:
193,987 UART: [state] CFI Enabled
263,035 UART: [state] LifecycleState = Unprovisioned
264,959 UART: [state] DebugLocked = No
266,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,731 UART: [kat] SHA2-256
440,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,897 UART: [kat] ++
451,499 UART: [kat] sha1
461,551 UART: [kat] SHA2-256
464,243 UART: [kat] SHA2-384
471,583 UART: [kat] SHA2-512-ACC
473,952 UART: [kat] ECC-384
2,768,609 UART: [kat] HMAC-384Kdf
2,802,186 UART: [kat] LMS
3,992,484 UART: [kat] --
3,996,930 UART: [cold-reset] ++
3,998,084 UART: [fht] Storing FHT @ 0x50003400
4,010,175 UART: [idev] ++
4,010,752 UART: [idev] CDI.KEYID = 6
4,011,636 UART: [idev] SUBJECT.KEYID = 7
4,012,889 UART: [idev] UDS.KEYID = 0
4,013,844 ready_for_fw is high
4,014,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,106 UART: [idev] Erasing UDS.KEYID = 0
7,349,916 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,658 UART: [idev] --
7,374,867 UART: [ldev] ++
7,375,435 UART: [ldev] CDI.KEYID = 6
7,376,401 UART: [ldev] SUBJECT.KEYID = 5
7,377,615 UART: [ldev] AUTHORITY.KEYID = 7
7,378,851 UART: [ldev] FE.KEYID = 1
7,423,796 UART: [ldev] Erasing FE.KEYID = 1
10,756,282 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,949 UART: [ldev] --
13,135,973 UART: [fwproc] Waiting for Commands...
13,139,039 UART: [fwproc] Received command 0x46574c44
13,141,225 UART: [fwproc] Received Image of size 118548 bytes
17,248,747 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,857 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,392,039 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,720,420 >>> mbox cmd response: success
17,723,920 UART: [afmc] ++
17,724,532 UART: [afmc] CDI.KEYID = 6
17,725,422 UART: [afmc] SUBJECT.KEYID = 7
17,726,643 UART: [afmc] AUTHORITY.KEYID = 5
21,091,137 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,389,243 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,391,512 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,405,954 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,420,670 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,435,119 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,456,136 UART: [afmc] --
23,459,196 UART: [cold-reset] --
23,462,086 UART: [state] Locking Datavault
23,468,477 UART: [state] Locking PCR0, PCR1 and PCR31
23,470,230 UART: [state] Locking ICCM
23,472,682 UART: [exit] Launching FMC @ 0x40000130
23,481,076 UART:
23,481,311 UART: Running Caliptra FMC ...
23,482,410 UART:
23,482,567 UART: [state] CFI Enabled
23,549,592 UART: [fht] FMC Alias Private Key: 7
25,889,737 UART: [art] Extend RT PCRs Done
25,890,958 UART: [art] Lock RT PCRs Done
25,892,775 UART: [art] Populate DV Done
25,898,088 UART: [fht] FMC Alias Private Key: 7
25,899,807 UART: [art] Derive CDI
25,900,545 UART: [art] Store in slot 0x4
25,957,589 UART: [art] Derive Key Pair
25,958,596 UART: [art] Store priv key in slot 0x5
29,251,601 UART: [art] Derive Key Pair - Done
29,264,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,994 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,537 UART: [art] PUB.X = 62F72D871318710E6EA403387FE2BCE427279BB016AA9A73276FBDF3D5A2EA028AD56D68A9153D14259628BC7930DD99
31,562,769 UART: [art] PUB.Y = 3A55217C1A74BFCD4DFB8AE1A60FF816CE7E2856EE7757047F50B879D810072F4B6CED649C4332B80CDB7CF6C7963319
31,569,978 UART: [art] SIG.R = 15664BD17D5B0DCDE7B21D9079E9974F5268E1731C1140C8141969A253FF633FD25B5AD94A358826A3ECCDB879F7DC0C
31,577,429 UART: [art] SIG.S = DDA38C236175961777F738424D7272D5F8ED30B5D66823A169B251F0D376FF6A91F6CB2733171777801BCE2D1551CD14
32,883,033 UART: Caliptra RT
32,883,761 UART: [state] CFI Enabled
33,059,317 UART: [rt] RT listening for mailbox commands...
33,061,728 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,217,026 UART: [rt]cmd =0x41544d4e, len=14344
38,517,876 >>> mbox cmd response data (8 bytes)
38,518,550 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,549,257 UART: [rt]cmd =0x41545348, len=116
38,551,439 >>> mbox cmd response data (12 bytes)
40,627,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,778,562 UART:
40,778,912 UART: Running Caliptra ROM ...
40,780,053 UART:
40,780,233 UART: [state] CFI Enabled
40,854,352 UART: [state] LifecycleState = Unprovisioned
40,856,318 UART: [state] DebugLocked = No
40,858,849 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,863,546 UART: [kat] SHA2-256
41,033,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,043,743 UART: [kat] ++
41,044,297 UART: [kat] sha1
41,055,951 UART: [kat] SHA2-256
41,058,649 UART: [kat] SHA2-384
41,064,477 UART: [kat] SHA2-512-ACC
41,066,888 UART: [kat] ECC-384
43,356,821 UART: [kat] HMAC-384Kdf
43,390,654 UART: [kat] LMS
44,581,012 UART: [kat] --
44,584,620 UART: [update-reset] ++
48,777,226 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,780,342 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,177,993 >>> mbox cmd response: success
49,182,630 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,183,252 UART: [update-reset] Copying MAN_2 To MAN_1
49,201,242 UART: [update-reset Success] --
49,205,906 UART: [state] Locking Datavault
49,208,135 UART: [state] Locking PCR0, PCR1 and PCR31
49,209,891 UART: [state] Locking ICCM
49,212,493 UART: [exit] Launching FMC @ 0x40000130
49,220,944 UART:
49,221,179 UART: Running Caliptra FMC ...
49,222,285 UART:
49,222,467 UART: [state] CFI Enabled
49,309,839 UART: [art] Extend RT PCRs Done
49,311,034 UART: [art] Lock RT PCRs Done
49,312,492 UART: [art] Populate DV Done
49,317,902 UART: [fht] FMC Alias Private Key: 7
49,319,366 UART: [art] Derive CDI
49,320,106 UART: [art] Store in slot 0x4
49,378,560 UART: [art] Derive Key Pair
49,379,614 UART: [art] Store priv key in slot 0x5
52,672,692 UART: [art] Derive Key Pair - Done
52,685,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,973,592 UART: [art] Erasing AUTHORITY.KEYID = 7
54,975,123 UART: [art] PUB.X = 276B69DFD686FA9048904D73E69FB175BDC4239ED4FCBE2C90E0BDEC05F0D7D02A7D713BD2FFAA388968615D72C774D8
54,982,395 UART: [art] PUB.Y = 94F393738874A6B518566FA1EF0D8A972AC2ECDC76123366ECD04FD8528529043B76AD8CB7F4328B2DD87476DB567852
54,989,645 UART: [art] SIG.R = 3F1B1B50FA6C5AFD501F0265A4CA3BE4A48905D4CD0D4D9ACCC22EA11961FC2868F5A094D5708DA87DC67B17E03B9CB9
54,997,066 UART: [art] SIG.S = 1CB9A994D0A9E45AE964A119D07943461708D5C70D919A0D8D152C587237B8F4A2E79862836E142D444C79C17DE3EE20
56,302,803 UART: Caliptra RT
56,303,527 UART: [state] CFI Enabled
56,745,436 UART: [rt] RT listening for mailbox commands...
56,777,497 UART: [rt]cmd =0x41545348, len=116
56,779,777 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.16s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,804,440 ready_for_fw is high
3,804,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,941,478 >>> mbox cmd response: success
23,634,140 UART:
23,635,037 UART: Running Caliptra FMC ...
23,636,187 UART:
23,636,439 UART: [state] CFI Enabled
23,703,797 UART: [fht] FMC Alias Private Key: 7
26,043,987 UART: [art] Extend RT PCRs Done
26,045,220 UART: [art] Lock RT PCRs Done
26,047,124 UART: [art] Populate DV Done
26,052,455 UART: [fht] FMC Alias Private Key: 7
26,054,115 UART: [art] Derive CDI
26,054,935 UART: [art] Store in slot 0x4
26,112,201 UART: [art] Derive Key Pair
26,113,241 UART: [art] Store priv key in slot 0x5
29,406,450 UART: [art] Derive Key Pair - Done
29,419,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,708,626 UART: [art] Erasing AUTHORITY.KEYID = 7
31,710,178 UART: [art] PUB.X = 474800494203E9046971BBADEA1D6D282EEA179E5A807A166CBD90028BB916726CA186E496CC9CC8F44C5FA01FBAF253
31,717,406 UART: [art] PUB.Y = 5B4AB7D3C56CA8F9543E171ED8D6AE47E3A01E3CF7EE9679350A061EDFE2BBCF60AC6811842F22C019371287816DF817
31,724,630 UART: [art] SIG.R = 0385BC7AFAADA74484236D80F48E720EBF125741588FD5F49537E96286295B06137E808ECC1E96B7D7C631C2FA462A00
31,732,000 UART: [art] SIG.S = 7EA993B4B534A1988148A6D21FDE9C5DFE6226E625D5248578C5B3AF7D628F8FBC9A357AF5F235A173C00DAD98C22284
33,037,897 UART: Caliptra RT
33,038,604 UART: [state] CFI Enabled
33,215,590 UART: [rt] RT listening for mailbox commands...
33,217,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,373,356 UART: [rt]cmd =0x41544d4e, len=14344
38,674,346 >>> mbox cmd response data (8 bytes)
38,674,952 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,705,760 UART: [rt]cmd =0x41545348, len=116
38,707,702 >>> mbox cmd response data (12 bytes)
40,787,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,613,443 >>> mbox cmd response: success
49,614,602 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,647,554 UART:
49,647,843 UART: Running Caliptra FMC ...
49,648,968 UART:
49,649,132 UART: [state] CFI Enabled
49,753,076 UART: [art] Extend RT PCRs Done
49,754,412 UART: [art] Lock RT PCRs Done
49,755,601 UART: [art] Populate DV Done
49,760,880 UART: [fht] FMC Alias Private Key: 7
49,762,595 UART: [art] Derive CDI
49,763,416 UART: [art] Store in slot 0x4
49,821,996 UART: [art] Derive Key Pair
49,823,004 UART: [art] Store priv key in slot 0x5
53,117,372 UART: [art] Derive Key Pair - Done
53,130,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,418,017 UART: [art] Erasing AUTHORITY.KEYID = 7
55,419,546 UART: [art] PUB.X = 7B6DAF3F4699E1973CC1A5CE94C2DCE418BC8AA60D602C0ED9BD837A1D038BEF8F2235F7D92F4568707312CB80F7B336
55,426,808 UART: [art] PUB.Y = B028A1120D7F911F1FD46F1AAE2E1E4BCCE4F4B2A68AD63D2085F16670EDE8DB1A2A5EC081320ABBFA73F26E4BE68D59
55,434,113 UART: [art] SIG.R = 773BA453583A1B218723D8E1B7418ED9A575E74C23C9EF16E63E945E3F67F05F242ABE47CF2BF2C9285ABB75605A2388
55,441,537 UART: [art] SIG.S = C85D25F524F50D2F72C175E03FED2586A91B0C0DC74641A9CED1AF4DD278709EF70F5521E9E79601B5A16850C05CF9C2
56,746,742 UART: Caliptra RT
56,747,459 UART: [state] CFI Enabled
57,168,165 UART: [rt] RT listening for mailbox commands...
57,200,113 UART: [rt]cmd =0x41545348, len=116
57,202,282 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.18s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,383 UART:
192,747 UART: Running Caliptra ROM ...
193,903 UART:
603,655 UART: [state] CFI Enabled
615,055 UART: [state] LifecycleState = Unprovisioned
617,015 UART: [state] DebugLocked = No
618,618 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,967 UART: [kat] SHA2-256
793,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,250 UART: [kat] ++
804,698 UART: [kat] sha1
815,851 UART: [kat] SHA2-256
818,574 UART: [kat] SHA2-384
822,707 UART: [kat] SHA2-512-ACC
825,087 UART: [kat] ECC-384
3,109,457 UART: [kat] HMAC-384Kdf
3,120,831 UART: [kat] LMS
4,310,931 UART: [kat] --
4,314,808 UART: [cold-reset] ++
4,316,671 UART: [fht] Storing FHT @ 0x50003400
4,327,585 UART: [idev] ++
4,328,146 UART: [idev] CDI.KEYID = 6
4,329,050 UART: [idev] SUBJECT.KEYID = 7
4,330,290 UART: [idev] UDS.KEYID = 0
4,331,362 ready_for_fw is high
4,331,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,432 UART: [idev] Erasing UDS.KEYID = 0
7,614,798 UART: [idev] Using Sha1 for KeyId Algorithm
7,635,841 UART: [idev] --
7,639,970 UART: [ldev] ++
7,640,564 UART: [ldev] CDI.KEYID = 6
7,641,472 UART: [ldev] SUBJECT.KEYID = 5
7,642,674 UART: [ldev] AUTHORITY.KEYID = 7
7,643,951 UART: [ldev] FE.KEYID = 1
7,654,316 UART: [ldev] Erasing FE.KEYID = 1
10,944,921 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,120 UART: [ldev] --
13,307,590 UART: [fwproc] Waiting for Commands...
13,310,160 UART: [fwproc] Received command 0x46574c44
13,312,337 UART: [fwproc] Received Image of size 118548 bytes
17,413,932 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,346 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,504 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,912 >>> mbox cmd response: success
17,898,401 UART: [afmc] ++
17,899,018 UART: [afmc] CDI.KEYID = 6
17,899,907 UART: [afmc] SUBJECT.KEYID = 7
17,901,172 UART: [afmc] AUTHORITY.KEYID = 5
21,215,194 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,508,774 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,511,024 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,525,459 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,540,154 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,115 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,129 UART: [afmc] --
23,580,531 UART: [cold-reset] --
23,584,868 UART: [state] Locking Datavault
23,590,378 UART: [state] Locking PCR0, PCR1 and PCR31
23,592,151 UART: [state] Locking ICCM
23,594,704 UART: [exit] Launching FMC @ 0x40000130
23,603,092 UART:
23,603,323 UART: Running Caliptra FMC ...
23,604,351 UART:
23,604,494 UART: [state] CFI Enabled
23,612,588 UART: [fht] FMC Alias Private Key: 7
25,952,936 UART: [art] Extend RT PCRs Done
25,954,159 UART: [art] Lock RT PCRs Done
25,956,106 UART: [art] Populate DV Done
25,961,588 UART: [fht] FMC Alias Private Key: 7
25,963,130 UART: [art] Derive CDI
25,963,866 UART: [art] Store in slot 0x4
26,006,396 UART: [art] Derive Key Pair
26,007,393 UART: [art] Store priv key in slot 0x5
29,249,975 UART: [art] Derive Key Pair - Done
29,262,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,342 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,844 UART: [art] PUB.X = 6E81C05DFD5C378F9C2FB20929324A5B001CBC0976AF63375AC1DBD403795D9AC4688FC1ABA2E7A9E285DF775907F569
31,552,095 UART: [art] PUB.Y = 495F4A6DCED47E26FA768931A6C0D98A0B4DFFA92431BA55D8C10B2422883168C0A65ED745194BCB6520E28627B14EB9
31,559,375 UART: [art] SIG.R = 4E4EAC66F52E6F4E467ABFC20CB6FC4BD0F229E5D1F93DA9118A3FA9940993C5127A767C9BB27D2F961171CA41B2FF28
31,566,782 UART: [art] SIG.S = DD72E9B94E315D26577CFB8C77425BE78EBD3B1485158942C878398A35731F7DB80092D421D1DF5BDCDBA6C70FB7B498
32,871,969 UART: Caliptra RT
32,872,682 UART: [state] CFI Enabled
33,006,400 UART: [rt] RT listening for mailbox commands...
33,008,789 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,164,096 UART: [rt]cmd =0x41544d4e, len=14344
38,464,421 >>> mbox cmd response data (8 bytes)
38,465,039 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,495,665 UART: [rt]cmd =0x41545348, len=116
38,497,967 >>> mbox cmd response data (12 bytes)
40,570,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,720,746 UART:
40,721,119 UART: Running Caliptra ROM ...
40,722,168 UART:
40,722,426 UART: [state] CFI Enabled
40,735,996 UART: [state] LifecycleState = Unprovisioned
40,737,884 UART: [state] DebugLocked = No
40,739,939 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,744,559 UART: [kat] SHA2-256
40,914,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,924,811 UART: [kat] ++
40,925,268 UART: [kat] sha1
40,937,306 UART: [kat] SHA2-256
40,940,015 UART: [kat] SHA2-384
40,945,625 UART: [kat] SHA2-512-ACC
40,948,022 UART: [kat] ECC-384
43,232,579 UART: [kat] HMAC-384Kdf
43,243,771 UART: [kat] LMS
44,433,803 UART: [kat] --
44,438,952 UART: [update-reset] ++
48,627,080 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,630,227 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,027,949 >>> mbox cmd response: success
49,032,793 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,033,436 UART: [update-reset] Copying MAN_2 To MAN_1
49,052,332 UART: [update-reset Success] --
49,056,685 UART: [state] Locking Datavault
49,059,127 UART: [state] Locking PCR0, PCR1 and PCR31
49,060,877 UART: [state] Locking ICCM
49,063,098 UART: [exit] Launching FMC @ 0x40000130
49,071,552 UART:
49,071,793 UART: Running Caliptra FMC ...
49,072,893 UART:
49,073,056 UART: [state] CFI Enabled
49,117,272 UART: [art] Extend RT PCRs Done
49,118,465 UART: [art] Lock RT PCRs Done
49,119,811 UART: [art] Populate DV Done
49,125,159 UART: [fht] FMC Alias Private Key: 7
49,126,723 UART: [art] Derive CDI
49,127,483 UART: [art] Store in slot 0x4
49,170,044 UART: [art] Derive Key Pair
49,171,092 UART: [art] Store priv key in slot 0x5
52,412,909 UART: [art] Derive Key Pair - Done
52,425,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,705,926 UART: [art] Erasing AUTHORITY.KEYID = 7
54,707,445 UART: [art] PUB.X = 108627D5863FB68618C62944EAAD195933C81969969F18A287D2DC743599AFDB98573BAB5FC954D8326DBAFCDCE9DA7D
54,714,708 UART: [art] PUB.Y = D136B0712DE4E72D81B82765300F51C516F56A3F4586D5318F126C8E82CF1318123298DF093FC8CF77A09CEEC12EE3A6
54,721,937 UART: [art] SIG.R = 96354D5F281A717C7CA7A89776B4B2F2454C3A35CC07F9CCB30041513604E8F72D31F5AC86A64542C2B2650AD8D099D9
54,729,323 UART: [art] SIG.S = B55FB469212C573A04B04500615BD0A49FAEE6CF60DBDCC383A7BC1C540840C0662BC68B121E8EE757A3D7A7BE936B7F
56,033,942 UART: Caliptra RT
56,034,796 UART: [state] CFI Enabled
56,407,373 UART: [rt] RT listening for mailbox commands...
56,439,263 UART: [rt]cmd =0x41545348, len=116
56,441,537 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.14s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
4,124,456 ready_for_fw is high
4,125,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,929 >>> mbox cmd response: success
23,807,245 UART:
23,807,701 UART: Running Caliptra FMC ...
23,808,815 UART:
23,808,971 UART: [state] CFI Enabled
23,816,739 UART: [fht] FMC Alias Private Key: 7
26,156,557 UART: [art] Extend RT PCRs Done
26,157,778 UART: [art] Lock RT PCRs Done
26,159,401 UART: [art] Populate DV Done
26,165,132 UART: [fht] FMC Alias Private Key: 7
26,166,671 UART: [art] Derive CDI
26,167,450 UART: [art] Store in slot 0x4
26,210,264 UART: [art] Derive Key Pair
26,211,294 UART: [art] Store priv key in slot 0x5
29,453,055 UART: [art] Derive Key Pair - Done
29,465,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,498 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,498 UART: [art] PUB.X = 144B1478A292743E6E1B5E719D7C337EE9B20C870F749121992357BB591A544178AD073D0CEC576337EEF8FA9CC7A31E
31,755,258 UART: [art] PUB.Y = A6666CD3383C019752C8FB6A3C077D6926200A89D89C9AC3BAE46FC2C5879878F5775C23036BFDEB63F6503014230E0E
31,762,521 UART: [art] SIG.R = 8880B8EE9FBF700739BED5D4F0D7D06D2FB50BC2A654E5F1ECE092285AA310C8E7F1811729DE145F90974788AA7858E7
31,769,902 UART: [art] SIG.S = E854806F49A8F56FB020439B51563EBB3872A868B9F04E9158E88A4755EEE1F871541F25CF7BA11706626E5437A66C8A
33,075,250 UART: Caliptra RT
33,076,603 UART: [state] CFI Enabled
33,209,944 UART: [rt] RT listening for mailbox commands...
33,212,896 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,368,180 UART: [rt]cmd =0x41544d4e, len=14344
38,669,581 >>> mbox cmd response data (8 bytes)
38,670,727 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,701,496 UART: [rt]cmd =0x41545348, len=116
38,703,375 >>> mbox cmd response data (12 bytes)
40,774,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,527,565 >>> mbox cmd response: success
49,529,116 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,561,001 UART:
49,561,300 UART: Running Caliptra FMC ...
49,562,419 UART:
49,562,575 UART: [state] CFI Enabled
49,607,020 UART: [art] Extend RT PCRs Done
49,608,535 UART: [art] Lock RT PCRs Done
49,609,622 UART: [art] Populate DV Done
49,614,976 UART: [fht] FMC Alias Private Key: 7
49,616,670 UART: [art] Derive CDI
49,617,480 UART: [art] Store in slot 0x4
49,659,743 UART: [art] Derive Key Pair
49,660,739 UART: [art] Store priv key in slot 0x5
52,903,153 UART: [art] Derive Key Pair - Done
52,915,883 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,195,964 UART: [art] Erasing AUTHORITY.KEYID = 7
55,197,482 UART: [art] PUB.X = 827BE4C8E0654AAC5297F72CFA5DE02C882A1614970EF9CD69FA3482B2DD4B9914F679CE83CD6EC182F18A87E260EB4C
55,204,775 UART: [art] PUB.Y = B3B81B6C13CCD11E8E76608FBE96276E2786D6FD65E930C27E7CF1D36BFA9A5E19FF36DD56B5D06CE4C8A792C4841795
55,212,038 UART: [art] SIG.R = CF86E17EFBEEE4247214C5B4FBE899642C9FEA905615F061CD036F849DF506877A66F8ECFEA3E2B8865544FAD327E88D
55,219,444 UART: [art] SIG.S = FBA4C334CE61F5DE9C128279A81B04E2973DE9C0A9B0C4340B01EF97FB3D0604CBB605B5C022444FB03EC7B6E98D8222
56,524,717 UART: Caliptra RT
56,525,436 UART: [state] CFI Enabled
56,899,278 UART: [rt] RT listening for mailbox commands...
56,931,029 UART: [rt]cmd =0x41545348, len=116
56,933,333 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.17s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,113 UART:
192,469 UART: Running Caliptra ROM ...
193,678 UART:
193,836 UART: [state] CFI Enabled
263,227 UART: [state] LifecycleState = Unprovisioned
265,157 UART: [state] DebugLocked = No
267,756 UART: [state] WD Timer not started. Device not locked for debugging
271,723 UART: [kat] SHA2-256
451,426 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,177 UART: [kat] ++
462,657 UART: [kat] sha1
472,748 UART: [kat] SHA2-256
475,394 UART: [kat] SHA2-384
481,236 UART: [kat] SHA2-512-ACC
483,610 UART: [kat] ECC-384
2,944,996 UART: [kat] HMAC-384Kdf
2,971,021 UART: [kat] LMS
3,447,492 UART: [kat] --
3,451,490 UART: [cold-reset] ++
3,454,126 UART: [fht] FHT @ 0x50003400
3,465,524 UART: [idev] ++
3,466,167 UART: [idev] CDI.KEYID = 6
3,467,077 UART: [idev] SUBJECT.KEYID = 7
3,468,323 UART: [idev] UDS.KEYID = 0
3,469,241 ready_for_fw is high
3,469,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,644 UART: [idev] Erasing UDS.KEYID = 0
5,985,204 UART: [idev] Sha1 KeyId Algorithm
6,008,709 UART: [idev] --
6,013,685 UART: [ldev] ++
6,014,253 UART: [ldev] CDI.KEYID = 6
6,015,180 UART: [ldev] SUBJECT.KEYID = 5
6,016,401 UART: [ldev] AUTHORITY.KEYID = 7
6,017,633 UART: [ldev] FE.KEYID = 1
6,057,076 UART: [ldev] Erasing FE.KEYID = 1
8,562,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,635 UART: [ldev] --
10,373,925 UART: [fwproc] Wait for Commands...
10,376,379 UART: [fwproc] Recv command 0x46574c44
10,378,428 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,176 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,228 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,022 >>> mbox cmd response: success
14,345,549 UART: [afmc] ++
14,346,144 UART: [afmc] CDI.KEYID = 6
14,347,050 UART: [afmc] SUBJECT.KEYID = 7
14,348,268 UART: [afmc] AUTHORITY.KEYID = 5
16,896,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,223 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,005 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,056 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,612 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,714,237 UART: [afmc] --
18,717,787 UART: [cold-reset] --
18,721,213 UART: [state] Locking Datavault
18,726,940 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,644 UART: [state] Locking ICCM
18,731,134 UART: [exit] Launching FMC @ 0x40000130
18,739,526 UART:
18,739,762 UART: Running Caliptra FMC ...
18,740,857 UART:
18,741,012 UART: [state] CFI Enabled
18,795,160 UART: [fht] FMC Alias Private Key: 7
20,561,769 UART: [art] Extend RT PCRs Done
20,563,045 UART: [art] Lock RT PCRs Done
20,564,757 UART: [art] Populate DV Done
20,570,330 UART: [fht] FMC Alias Private Key: 7
20,571,823 UART: [art] Derive CDI
20,572,777 UART: [art] Store in slot 0x4
20,627,719 UART: [art] Derive Key Pair
20,628,763 UART: [art] Store priv key in slot 0x5
23,092,222 UART: [art] Derive Key Pair - Done
23,105,096 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,816 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,318 UART: [art] PUB.X = BCBF6F10E58E24EDB6EA9658CB4490EAF272862EF6F948AB124B3C10E9DDC069AE7C67329086B69A8475C3ADE6BFA4DC
24,826,628 UART: [art] PUB.Y = 438D7C1E2A4B247C764D2B4EBB86AA412851AE6B32F481161E264A034FE8C13519835D9962150D77AEB45EED353A35E9
24,833,872 UART: [art] SIG.R = 220506126D37AD22B7374EA4CE893C57722BA99FB280754F511ABB64216668D273994E26A85CF841C07479C909AB359B
24,841,266 UART: [art] SIG.S = 07B0EB4DC6B1BA127B7E4EF843F1C895A238E00412611C5A892C7535791075942D154C835F3CAB8C49CD405F3D356488
25,820,007 UART: Caliptra RT
25,820,729 UART: [state] CFI Enabled
26,002,559 UART: [rt] RT listening for mailbox commands...
26,004,988 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,160,102 UART: [rt]cmd =0x41544d4e, len=14344
30,155,541 >>> mbox cmd response data (8 bytes)
30,156,128 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,187,180 UART: [rt]cmd =0x41545348, len=116
30,189,434 >>> mbox cmd response data (12 bytes)
32,250,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,400,871 UART:
32,401,246 UART: Running Caliptra ROM ...
32,402,293 UART:
32,402,443 UART: [state] CFI Enabled
32,469,608 UART: [state] LifecycleState = Unprovisioned
32,471,548 UART: [state] DebugLocked = No
32,473,284 UART: [state] WD Timer not started. Device not locked for debugging
32,477,683 UART: [kat] SHA2-256
32,657,298 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,668,087 UART: [kat] ++
32,668,557 UART: [kat] sha1
32,679,979 UART: [kat] SHA2-256
32,682,673 UART: [kat] SHA2-384
32,688,843 UART: [kat] SHA2-512-ACC
32,691,192 UART: [kat] ECC-384
35,135,996 UART: [kat] HMAC-384Kdf
35,159,300 UART: [kat] LMS
35,635,773 UART: [kat] --
35,639,898 UART: [update-reset] ++
39,137,603 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,141,000 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,538,630 >>> mbox cmd response: success
39,539,125 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,539,569 UART: [update-reset] Copying MAN_2 To MAN_1
39,576,055 UART: [update-reset Success] --
39,580,060 UART: [state] Locking Datavault
39,583,210 UART: [state] Locking PCR0, PCR1 and PCR31
39,584,961 UART: [state] Locking ICCM
39,587,620 UART: [exit] Launching FMC @ 0x40000130
39,595,974 UART:
39,596,219 UART: Running Caliptra FMC ...
39,597,317 UART:
39,597,470 UART: [state] CFI Enabled
39,693,440 UART: [art] Extend RT PCRs Done
39,694,627 UART: [art] Lock RT PCRs Done
39,696,190 UART: [art] Populate DV Done
39,701,378 UART: [fht] FMC Alias Private Key: 7
39,703,016 UART: [art] Derive CDI
39,703,828 UART: [art] Store in slot 0x4
39,762,570 UART: [art] Derive Key Pair
39,763,610 UART: [art] Store priv key in slot 0x5
42,226,082 UART: [art] Derive Key Pair - Done
42,239,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,952,008 UART: [art] Erasing AUTHORITY.KEYID = 7
43,953,517 UART: [art] PUB.X = 46D984562ABF368179B6BA41232705976A994E00C49CF1859B2B528FF7AD03581D789218C57348556A3E3676D6CC7430
43,960,736 UART: [art] PUB.Y = 7FB4926854D4D8B32BB1089DB3F792C5AFAA6E448A8B60CF8EAE680A2D33DF0BB2B4A72110B5148081C2E11C11308932
43,967,967 UART: [art] SIG.R = A5E1FF85C2CAAFDAC3C217C86A4B38E60408E64DCF6C87099CA467E206C6CE0077E3ECDFD7C792DE6F89670537FD0913
43,975,412 UART: [art] SIG.S = 7F0C1411E7412CA71699B266ACCB6A0B6CD718A1A4615F8ADCEB184C3F0C1F36CD2ED098135D5728C76049CF30943B43
44,954,539 UART: Caliptra RT
44,955,219 UART: [state] CFI Enabled
45,372,545 UART: [rt] RT listening for mailbox commands...
45,404,544 UART: [rt]cmd =0x41545348, len=116
45,406,348 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,461,287 ready_for_fw is high
3,461,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,225,016 >>> mbox cmd response: success
18,515,849 UART:
18,516,860 UART: Running Caliptra FMC ...
18,517,994 UART:
18,518,146 UART: [state] CFI Enabled
18,585,404 UART: [fht] FMC Alias Private Key: 7
20,351,908 UART: [art] Extend RT PCRs Done
20,353,172 UART: [art] Lock RT PCRs Done
20,354,606 UART: [art] Populate DV Done
20,359,798 UART: [fht] FMC Alias Private Key: 7
20,361,337 UART: [art] Derive CDI
20,362,069 UART: [art] Store in slot 0x4
20,418,526 UART: [art] Derive Key Pair
20,419,521 UART: [art] Store priv key in slot 0x5
22,882,650 UART: [art] Derive Key Pair - Done
22,895,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,608,107 UART: [art] Erasing AUTHORITY.KEYID = 7
24,609,618 UART: [art] PUB.X = A16FABF9152D6E5F3E5347E84939FA6FB9B0BB966A85E86F8B030EBE407A4E6F7D656C842E8F5547B489EFFEF667BAD8
24,616,879 UART: [art] PUB.Y = E530749BA38FA70961C64BAA630CAD06F0FDB1469EA252DE980F557A498509C5423EAD623F8759C0CC5C4019EA521695
24,624,129 UART: [art] SIG.R = 8E11AE064FA395A7C1F25AB62830D94DD9FD6CE3A0EFA201DF12412C5EB74F27188D8FA181880806072B9ACDB2FD5072
24,631,527 UART: [art] SIG.S = AA96E2416EB6F1012657351D079A7F3D9DE4F34F65FE82257A63C5FD1C45A4AB7AE64349B14D32C5820D77A4D192EC13
25,609,859 UART: Caliptra RT
25,610,577 UART: [state] CFI Enabled
25,790,824 UART: [rt] RT listening for mailbox commands...
25,793,475 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,948,882 UART: [rt]cmd =0x41544d4e, len=14344
29,943,591 >>> mbox cmd response data (8 bytes)
29,944,170 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,975,018 UART: [rt]cmd =0x41545348, len=116
29,976,925 >>> mbox cmd response data (12 bytes)
32,038,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,346,770 >>> mbox cmd response: success
39,347,350 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,382,797 UART:
39,383,089 UART: Running Caliptra FMC ...
39,384,206 UART:
39,384,357 UART: [state] CFI Enabled
39,481,061 UART: [art] Extend RT PCRs Done
39,482,313 UART: [art] Lock RT PCRs Done
39,483,610 UART: [art] Populate DV Done
39,489,124 UART: [fht] FMC Alias Private Key: 7
39,490,621 UART: [art] Derive CDI
39,491,386 UART: [art] Store in slot 0x4
39,549,937 UART: [art] Derive Key Pair
39,550,920 UART: [art] Store priv key in slot 0x5
42,013,422 UART: [art] Derive Key Pair - Done
42,026,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,744,403 UART: [art] Erasing AUTHORITY.KEYID = 7
43,745,942 UART: [art] PUB.X = D54FF3A4588C0F7560A1ADBE97284EC2889BFBBD6D8191247C6F6B521C828D6D55996DA17A0FB171D83D1D53840B2EA6
43,753,154 UART: [art] PUB.Y = 6FEE21FFF8FC0E75BBC31494ECAB3BC044EEBC8BA2D42422F5BE92A66FB3749FCF9CB125BB164CB28846B67A81D0F5E3
43,760,444 UART: [art] SIG.R = CD9F19A31C3030EB2294FB4B956486AE0BABDBAB0417214292A814CD99AC3F373E85AA1FC59C21FBB225203046D2B427
43,767,831 UART: [art] SIG.S = 7081CDEE17E436942C85B483322C60E2F0318DE87AECD763079713C09B113F42F6F1D97B59B8D991830F4D54DDB950C5
44,747,396 UART: Caliptra RT
44,748,133 UART: [state] CFI Enabled
45,165,466 UART: [rt] RT listening for mailbox commands...
45,197,532 UART: [rt]cmd =0x41545348, len=116
45,199,932 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,461 UART:
192,823 UART: Running Caliptra ROM ...
194,036 UART:
603,837 UART: [state] CFI Enabled
616,090 UART: [state] LifecycleState = Unprovisioned
618,049 UART: [state] DebugLocked = No
620,006 UART: [state] WD Timer not started. Device not locked for debugging
624,468 UART: [kat] SHA2-256
804,135 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,914 UART: [kat] ++
815,399 UART: [kat] sha1
825,994 UART: [kat] SHA2-256
828,720 UART: [kat] SHA2-384
833,362 UART: [kat] SHA2-512-ACC
835,800 UART: [kat] ECC-384
3,278,031 UART: [kat] HMAC-384Kdf
3,290,543 UART: [kat] LMS
3,767,115 UART: [kat] --
3,770,199 UART: [cold-reset] ++
3,771,704 UART: [fht] FHT @ 0x50003400
3,783,040 UART: [idev] ++
3,783,610 UART: [idev] CDI.KEYID = 6
3,784,589 UART: [idev] SUBJECT.KEYID = 7
3,785,762 UART: [idev] UDS.KEYID = 0
3,786,813 ready_for_fw is high
3,787,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,960 UART: [idev] Erasing UDS.KEYID = 0
6,261,430 UART: [idev] Sha1 KeyId Algorithm
6,284,981 UART: [idev] --
6,289,512 UART: [ldev] ++
6,290,083 UART: [ldev] CDI.KEYID = 6
6,290,999 UART: [ldev] SUBJECT.KEYID = 5
6,292,210 UART: [ldev] AUTHORITY.KEYID = 7
6,293,545 UART: [ldev] FE.KEYID = 1
6,304,660 UART: [ldev] Erasing FE.KEYID = 1
8,778,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,499,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,515,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,530,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,546,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,336 UART: [ldev] --
10,574,789 UART: [fwproc] Wait for Commands...
10,576,667 UART: [fwproc] Recv command 0x46574c44
10,578,659 UART: [fwproc] Recv'd Img size: 118548 bytes
14,058,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,139,522 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,212,532 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,539,969 >>> mbox cmd response: success
14,543,745 UART: [afmc] ++
14,544,406 UART: [afmc] CDI.KEYID = 6
14,545,298 UART: [afmc] SUBJECT.KEYID = 7
14,546,516 UART: [afmc] AUTHORITY.KEYID = 5
17,051,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,773,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,776,136 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,791,905 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,808,014 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,823,579 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,848,985 UART: [afmc] --
18,853,127 UART: [cold-reset] --
18,858,073 UART: [state] Locking Datavault
18,862,729 UART: [state] Locking PCR0, PCR1 and PCR31
18,864,428 UART: [state] Locking ICCM
18,867,123 UART: [exit] Launching FMC @ 0x40000130
18,875,529 UART:
18,875,765 UART: Running Caliptra FMC ...
18,877,066 UART:
18,877,240 UART: [state] CFI Enabled
18,884,970 UART: [fht] FMC Alias Private Key: 7
20,650,988 UART: [art] Extend RT PCRs Done
20,652,210 UART: [art] Lock RT PCRs Done
20,654,054 UART: [art] Populate DV Done
20,659,469 UART: [fht] FMC Alias Private Key: 7
20,660,921 UART: [art] Derive CDI
20,661,661 UART: [art] Store in slot 0x4
20,704,557 UART: [art] Derive Key Pair
20,705,554 UART: [art] Store priv key in slot 0x5
23,132,459 UART: [art] Derive Key Pair - Done
23,145,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,851,525 UART: [art] Erasing AUTHORITY.KEYID = 7
24,853,027 UART: [art] PUB.X = AF612FEF1C8B8493B822338FFFD40C70F66CC73CC0E5D9D65AA370FEB7D01D56A4186E2FD5F8FF9850A01CE8080AB683
24,860,327 UART: [art] PUB.Y = 26F7F2B2D3454B184E167EDB0DB51E96FD95A4CC191FD03772D542044445279291F7E9C9E7E981243C15E88B408835B7
24,867,561 UART: [art] SIG.R = 10E7FD441C5624D806BE0EC50CC85181E97A3EB89451AD386A330B315B9ABD4B68887FFE9837E8C46DE5FD8FCF51E5A1
24,874,951 UART: [art] SIG.S = A7E3E1C3176D52A6A82831B60F7094292921A1D949CD436E1BA75ED5FBF29B9BC628F5E94278FAE7D93F3B4D5353BD46
25,853,850 UART: Caliptra RT
25,854,562 UART: [state] CFI Enabled
25,987,080 UART: [rt] RT listening for mailbox commands...
25,989,480 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,144,805 UART: [rt]cmd =0x41544d4e, len=14344
30,140,092 >>> mbox cmd response data (8 bytes)
30,140,712 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,171,352 UART: [rt]cmd =0x41545348, len=116
30,173,588 >>> mbox cmd response data (12 bytes)
32,231,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,382,347 UART:
32,382,722 UART: Running Caliptra ROM ...
32,383,861 UART:
32,384,034 UART: [state] CFI Enabled
32,397,989 UART: [state] LifecycleState = Unprovisioned
32,399,936 UART: [state] DebugLocked = No
32,401,809 UART: [state] WD Timer not started. Device not locked for debugging
32,405,100 UART: [kat] SHA2-256
32,584,780 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,595,602 UART: [kat] ++
32,596,067 UART: [kat] sha1
32,608,091 UART: [kat] SHA2-256
32,610,794 UART: [kat] SHA2-384
32,615,377 UART: [kat] SHA2-512-ACC
32,617,732 UART: [kat] ECC-384
35,057,896 UART: [kat] HMAC-384Kdf
35,071,320 UART: [kat] LMS
35,547,799 UART: [kat] --
35,552,433 UART: [update-reset] ++
39,048,214 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,051,570 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,449,187 >>> mbox cmd response: success
39,449,611 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,451,151 UART: [update-reset] Copying MAN_2 To MAN_1
39,488,278 UART: [update-reset Success] --
39,493,799 UART: [state] Locking Datavault
39,496,456 UART: [state] Locking PCR0, PCR1 and PCR31
39,498,210 UART: [state] Locking ICCM
39,500,748 UART: [exit] Launching FMC @ 0x40000130
39,509,143 UART:
39,509,377 UART: Running Caliptra FMC ...
39,510,479 UART:
39,510,650 UART: [state] CFI Enabled
39,554,674 UART: [art] Extend RT PCRs Done
39,555,854 UART: [art] Lock RT PCRs Done
39,557,256 UART: [art] Populate DV Done
39,562,823 UART: [fht] FMC Alias Private Key: 7
39,564,414 UART: [art] Derive CDI
39,565,229 UART: [art] Store in slot 0x4
39,607,954 UART: [art] Derive Key Pair
39,608,999 UART: [art] Store priv key in slot 0x5
42,035,684 UART: [art] Derive Key Pair - Done
42,048,731 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,755,093 UART: [art] Erasing AUTHORITY.KEYID = 7
43,756,735 UART: [art] PUB.X = 50A3A21C9417536B50B9DB908CB799E899BC2047A9438E38BA2FF61A980895639E991B678EF1FA652F0DF87CE4FE9272
43,763,885 UART: [art] PUB.Y = 03DC9B126F89C0A539C57238B491D8CD432D5C89B0D2F5CB96F52B43FB35AD8AC9575AA68FE6C10AE00A31999DD8F9E5
43,771,172 UART: [art] SIG.R = 27AF99A8222761EE0560D7D57C008E671DA252642306A8A9C38A0AB820ABB31B846E3D22BE878E7862D8942A7DFBD7A8
43,778,502 UART: [art] SIG.S = 22D5B5B8AC13EBE13C54215E6746FFE5D087E9EDD964557D6918242D2AA8E4E8CBEB0E23A8B520AE44F7B55E148ADF1B
44,757,533 UART: Caliptra RT
44,758,233 UART: [state] CFI Enabled
45,132,540 UART: [rt] RT listening for mailbox commands...
45,164,497 UART: [rt]cmd =0x41545348, len=116
45,166,958 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,785,549 ready_for_fw is high
3,785,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,441,883 >>> mbox cmd response: success
18,694,178 UART:
18,694,668 UART: Running Caliptra FMC ...
18,695,777 UART:
18,695,939 UART: [state] CFI Enabled
18,704,224 UART: [fht] FMC Alias Private Key: 7
20,470,852 UART: [art] Extend RT PCRs Done
20,472,080 UART: [art] Lock RT PCRs Done
20,473,556 UART: [art] Populate DV Done
20,479,291 UART: [fht] FMC Alias Private Key: 7
20,480,785 UART: [art] Derive CDI
20,481,549 UART: [art] Store in slot 0x4
20,523,997 UART: [art] Derive Key Pair
20,525,056 UART: [art] Store priv key in slot 0x5
22,952,051 UART: [art] Derive Key Pair - Done
22,965,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,114 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,627 UART: [art] PUB.X = B53C5ED08F1215646AD979C54AD63C60DE6CD43797D958B6205F650FC2C7167C89B38BAC886BD7D27469281FEF156C4C
24,680,899 UART: [art] PUB.Y = B4988B901B3E5B3403E8E88F28A53F5C5D9D1AF4AD9AF696867E4AB32652208E05DA97A540038BD3027614D31D65CAA7
24,688,148 UART: [art] SIG.R = 5F5BF714D29608492726D887DB6DF78614DAF006BEEE428CE2C8481F2242DA7C6CB396524580FB9A2A5606D58E758A39
24,695,549 UART: [art] SIG.S = CEAB459C2172957EF379B628A5CCC42FB6C766D13441F987ED58560CA0240AC21AE0D4716A588A3F0C868D48C20E77D0
25,674,326 UART: Caliptra RT
25,675,018 UART: [state] CFI Enabled
25,806,947 UART: [rt] RT listening for mailbox commands...
25,809,428 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,964,634 UART: [rt]cmd =0x41544d4e, len=14344
29,960,203 >>> mbox cmd response data (8 bytes)
29,960,787 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,991,574 UART: [rt]cmd =0x41545348, len=116
29,993,748 >>> mbox cmd response data (12 bytes)
32,049,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,268,347 >>> mbox cmd response: success
39,268,911 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,303,823 UART:
39,304,150 UART: Running Caliptra FMC ...
39,305,192 UART:
39,305,347 UART: [state] CFI Enabled
39,349,164 UART: [art] Extend RT PCRs Done
39,350,362 UART: [art] Lock RT PCRs Done
39,351,856 UART: [art] Populate DV Done
39,357,209 UART: [fht] FMC Alias Private Key: 7
39,358,807 UART: [art] Derive CDI
39,359,548 UART: [art] Store in slot 0x4
39,402,272 UART: [art] Derive Key Pair
39,403,319 UART: [art] Store priv key in slot 0x5
41,830,089 UART: [art] Derive Key Pair - Done
41,842,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,549,362 UART: [art] Erasing AUTHORITY.KEYID = 7
43,550,878 UART: [art] PUB.X = A2F04EA22B76A69062927B6EC98697EAD663B951EF5D680ACCC03149139C03842E660520042F4EE841962A338A082CB1
43,558,133 UART: [art] PUB.Y = 10A7F04578CB8256C2240D8EFCFD8858105E73EC44A8E86F16282B9D594A1BAD89A816987B7CCC4FD6C07E02901BCF85
43,565,439 UART: [art] SIG.R = 18A5BB3428D6B8AC99C3F1F73D6AE661F36E73F79F5589213ECD68A9754822D9E4F23B979EF0F53ADC034337FA8097DC
43,572,784 UART: [art] SIG.S = 2EB64EF32B128F0F605C15E0A35A2F76B509454C8091C725407AD78104CFCA8A78737450F8A21BAD00C7D84C04302A4D
44,551,473 UART: Caliptra RT
44,552,168 UART: [state] CFI Enabled
44,926,808 UART: [rt] RT listening for mailbox commands...
44,958,644 UART: [rt]cmd =0x41545348, len=116
44,960,843 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,237 UART:
192,586 UART: Running Caliptra ROM ...
193,768 UART:
193,926 UART: [state] CFI Enabled
266,304 UART: [state] LifecycleState = Unprovisioned
268,716 UART: [state] DebugLocked = No
270,413 UART: [state] WD Timer not started. Device not locked for debugging
274,304 UART: [kat] SHA2-256
464,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,907 UART: [kat] ++
475,357 UART: [kat] sha1
486,795 UART: [kat] SHA2-256
489,868 UART: [kat] SHA2-384
495,707 UART: [kat] SHA2-512-ACC
498,290 UART: [kat] ECC-384
2,947,454 UART: [kat] HMAC-384Kdf
2,973,465 UART: [kat] LMS
3,505,256 UART: [kat] --
3,511,186 UART: [cold-reset] ++
3,512,620 UART: [fht] FHT @ 0x50003400
3,524,740 UART: [idev] ++
3,525,446 UART: [idev] CDI.KEYID = 6
3,526,494 UART: [idev] SUBJECT.KEYID = 7
3,527,597 UART: [idev] UDS.KEYID = 0
3,528,533 ready_for_fw is high
3,528,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,926 UART: [idev] Erasing UDS.KEYID = 0
6,049,436 UART: [idev] Sha1 KeyId Algorithm
6,072,232 UART: [idev] --
6,076,382 UART: [ldev] ++
6,077,071 UART: [ldev] CDI.KEYID = 6
6,077,964 UART: [ldev] SUBJECT.KEYID = 5
6,079,178 UART: [ldev] AUTHORITY.KEYID = 7
6,080,355 UART: [ldev] FE.KEYID = 1
6,124,276 UART: [ldev] Erasing FE.KEYID = 1
8,628,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,556 UART: [ldev] --
10,435,139 UART: [fwproc] Wait for Commands...
10,437,126 UART: [fwproc] Recv command 0x46574c44
10,439,430 UART: [fwproc] Recv'd Img size: 118548 bytes
13,932,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,007,591 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,131,208 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,691,634 >>> mbox cmd response: success
14,695,032 UART: [afmc] ++
14,695,719 UART: [afmc] CDI.KEYID = 6
14,696,917 UART: [afmc] SUBJECT.KEYID = 7
14,698,354 UART: [afmc] AUTHORITY.KEYID = 5
17,235,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,894 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,995 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,994,152 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,009,017 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,344 UART: [afmc] --
19,035,416 UART: [cold-reset] --
19,038,854 UART: [state] Locking Datavault
19,042,975 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,124 UART: [state] Locking ICCM
19,046,740 UART: [exit] Launching FMC @ 0x40000130
19,055,421 UART:
19,055,662 UART: Running Caliptra FMC ...
19,056,765 UART:
19,056,926 UART: [state] CFI Enabled
19,117,992 UART: [fht] FMC Alias Private Key: 7
20,884,269 UART: [art] Extend RT PCRs Done
20,885,501 UART: [art] Lock RT PCRs Done
20,887,178 UART: [art] Populate DV Done
20,892,474 UART: [fht] FMC Alias Private Key: 7
20,893,956 UART: [art] Derive CDI
20,894,693 UART: [art] Store in slot 0x4
20,950,190 UART: [art] Derive Key Pair
20,951,244 UART: [art] Store priv key in slot 0x5
23,414,240 UART: [art] Derive Key Pair - Done
23,427,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,815 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,316 UART: [art] PUB.X = 82B5583C721871D9827671413A7782F2B40EF85BD9283421AA6C6884F16E5C1FDCB976FA199FC1DDAAE8FEF9A24D506F
25,148,576 UART: [art] PUB.Y = A9DE2451D92FB3A7169CFB351C2D9FCD29D32C51738D33D126EB7CD706E417F37F89DAD10175C0741E24DB9EE955660E
25,155,839 UART: [art] SIG.R = 01E46B8B9CF6D169347490DE58C817E517B67EEAB78E2924561597C2C7DE26AE46DD4CB7D6FDE5F5AEF4B04387BB658B
25,163,274 UART: [art] SIG.S = A09A631BCA933FE1E36F7F4D9FBE39CF456DA11F4FAC56F1B696F351B4ED779CAF4717B1D440C9896C44D1CF49C7F93C
26,142,277 UART: Caliptra RT
26,142,976 UART: [state] CFI Enabled
26,324,503 UART: [rt] RT listening for mailbox commands...
26,326,896 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,482,167 UART: [rt]cmd =0x41544d4e, len=14344
30,477,677 >>> mbox cmd response data (8 bytes)
30,478,301 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,509,157 UART: [rt]cmd =0x41545348, len=116
30,511,573 >>> mbox cmd response data (12 bytes)
32,578,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,728,929 UART:
32,729,286 UART: Running Caliptra ROM ...
32,730,344 UART:
32,730,518 UART: [state] CFI Enabled
32,798,116 UART: [state] LifecycleState = Unprovisioned
32,800,163 UART: [state] DebugLocked = No
32,801,739 UART: [state] WD Timer not started. Device not locked for debugging
32,805,634 UART: [kat] SHA2-256
32,995,487 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,006,279 UART: [kat] ++
33,006,746 UART: [kat] sha1
33,019,635 UART: [kat] SHA2-256
33,022,644 UART: [kat] SHA2-384
33,030,315 UART: [kat] SHA2-512-ACC
33,032,892 UART: [kat] ECC-384
35,481,656 UART: [kat] HMAC-384Kdf
35,503,917 UART: [kat] LMS
36,035,466 UART: [kat] --
36,041,196 UART: [update-reset] ++
39,546,009 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,548,528 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,178,280 >>> mbox cmd response: success
40,182,766 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,183,391 UART: [update-reset] Copying MAN_2 To MAN_1
40,217,282 UART: [update-reset Success] --
40,222,044 UART: [state] Locking Datavault
40,224,284 UART: [state] Locking PCR0, PCR1 and PCR31
40,226,473 UART: [state] Locking ICCM
40,228,653 UART: [exit] Launching FMC @ 0x40000130
40,237,309 UART:
40,237,547 UART: Running Caliptra FMC ...
40,238,590 UART:
40,238,736 UART: [state] CFI Enabled
40,332,196 UART: [art] Extend RT PCRs Done
40,333,384 UART: [art] Lock RT PCRs Done
40,335,082 UART: [art] Populate DV Done
40,340,538 UART: [fht] FMC Alias Private Key: 7
40,342,243 UART: [art] Derive CDI
40,343,056 UART: [art] Store in slot 0x4
40,401,349 UART: [art] Derive Key Pair
40,402,392 UART: [art] Store priv key in slot 0x5
42,864,994 UART: [art] Derive Key Pair - Done
42,878,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,591,575 UART: [art] Erasing AUTHORITY.KEYID = 7
44,593,066 UART: [art] PUB.X = A5F8A8B8ADE0942709BDDBF67D048D113CA0C836EDFD52E18287DB46FEC91A685FC0EC6ABA3ACFCA77A5D9505A68E661
44,600,404 UART: [art] PUB.Y = 77C8D57AC0EF48CFE60BF659C5AB49898EB8D31B517FF37ADF124D15B3AEF41D73998E7698C6E36DB27F0C6659556E4E
44,607,661 UART: [art] SIG.R = 4256EED339532BCFF9148B093A64DB73E7601C67963A26B3125656B10FE5473FF08C72980E1A81BF64CA311DD65BE435
44,615,073 UART: [art] SIG.S = 5412BA05A0DF54A8DA107082AECE128C3D06283C7E75EF484CF6C17F2FC612239EA311D9E4906E5BC2BB91323584C292
45,594,091 UART: Caliptra RT
45,594,806 UART: [state] CFI Enabled
46,012,256 UART: [rt] RT listening for mailbox commands...
46,044,068 UART: [rt]cmd =0x41545348, len=116
46,046,160 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,429,245 ready_for_fw is high
3,429,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,808,771 >>> mbox cmd response: success
19,101,556 UART:
19,101,966 UART: Running Caliptra FMC ...
19,103,078 UART:
19,103,235 UART: [state] CFI Enabled
19,170,941 UART: [fht] FMC Alias Private Key: 7
20,937,609 UART: [art] Extend RT PCRs Done
20,938,844 UART: [art] Lock RT PCRs Done
20,940,230 UART: [art] Populate DV Done
20,945,486 UART: [fht] FMC Alias Private Key: 7
20,947,189 UART: [art] Derive CDI
20,947,925 UART: [art] Store in slot 0x4
21,003,930 UART: [art] Derive Key Pair
21,004,934 UART: [art] Store priv key in slot 0x5
23,467,851 UART: [art] Derive Key Pair - Done
23,481,070 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,193,737 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,244 UART: [art] PUB.X = 13CCDDE417D50A6115461CCB05CAD6A584039D92A95D4482786D531B45BC210CFF8CD6CE0833242E022206BD49EF71C9
25,202,527 UART: [art] PUB.Y = 776B01AE28BB8716865C97429EDB90083B2CAD8D2A7E1FBC236B9104D20F3B285C13452B9E3C551F7A6FD36EA4D977E0
25,209,753 UART: [art] SIG.R = 1DDDEBA4136AD51ED823AD119F071691C1BD816E0EBAA11DAE6BC8AEF23D7E9E368A0702F95033CB0E49769403B661FD
25,217,173 UART: [art] SIG.S = 6FB5FC99956363278ADD63A228B707FCB6B819355CD648C1A06BF7CC14F7DDF45B3525569B454823E3A091577134416B
26,195,577 UART: Caliptra RT
26,196,292 UART: [state] CFI Enabled
26,378,046 UART: [rt] RT listening for mailbox commands...
26,380,434 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,535,627 UART: [rt]cmd =0x41544d4e, len=14344
30,530,954 >>> mbox cmd response data (8 bytes)
30,531,533 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,561,983 UART: [rt]cmd =0x41545348, len=116
30,564,128 >>> mbox cmd response data (12 bytes)
32,628,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,523,012 >>> mbox cmd response: success
40,523,771 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,557,187 UART:
40,557,540 UART: Running Caliptra FMC ...
40,558,668 UART:
40,558,833 UART: [state] CFI Enabled
40,647,631 UART: [art] Extend RT PCRs Done
40,648,920 UART: [art] Lock RT PCRs Done
40,650,110 UART: [art] Populate DV Done
40,655,516 UART: [fht] FMC Alias Private Key: 7
40,657,113 UART: [art] Derive CDI
40,657,926 UART: [art] Store in slot 0x4
40,716,509 UART: [art] Derive Key Pair
40,717,552 UART: [art] Store priv key in slot 0x5
43,180,056 UART: [art] Derive Key Pair - Done
43,193,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,906,050 UART: [art] Erasing AUTHORITY.KEYID = 7
44,907,566 UART: [art] PUB.X = 4D8BF1FE0095AEDFAB75C3C2DE7B5C4238599294DCE213AFA45DC2B24CDE01B7C2D7219BCB1C82D899D1411E8DEA7EE1
44,914,890 UART: [art] PUB.Y = 0D8A4F25FF6351A580856AA0062230E508C9BEBBC371B1620511471BBB5558AE6FD20946ED28F38E165CA84C6819FD5E
44,922,095 UART: [art] SIG.R = 031B0D7974AEF30CF5CAF4336B29297969E30DC71E14BDAEF94F60764451FDDD1FE04313BD39A7DF676A14464BB62017
44,929,651 UART: [art] SIG.S = 15C1EAAAD768B14EDA8D7BA18839A859E0608BF42C24ACB65CCA2D9CAD909F633D06CEBF0FB9E1CFBB297BA50ABCE6D8
45,908,078 UART: Caliptra RT
45,908,781 UART: [state] CFI Enabled
46,335,939 UART: [rt] RT listening for mailbox commands...
46,367,932 UART: [rt]cmd =0x41545348, len=116
46,370,007 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
192,547 UART:
192,919 UART: Running Caliptra ROM ...
194,054 UART:
603,865 UART: [state] CFI Enabled
617,253 UART: [state] LifecycleState = Unprovisioned
619,636 UART: [state] DebugLocked = No
622,506 UART: [state] WD Timer not started. Device not locked for debugging
627,613 UART: [kat] SHA2-256
817,506 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,272 UART: [kat] ++
828,796 UART: [kat] sha1
840,902 UART: [kat] SHA2-256
843,921 UART: [kat] SHA2-384
849,305 UART: [kat] SHA2-512-ACC
851,900 UART: [kat] ECC-384
3,294,665 UART: [kat] HMAC-384Kdf
3,307,178 UART: [kat] LMS
3,839,062 UART: [kat] --
3,844,285 UART: [cold-reset] ++
3,846,435 UART: [fht] FHT @ 0x50003400
3,857,137 UART: [idev] ++
3,857,782 UART: [idev] CDI.KEYID = 6
3,858,766 UART: [idev] SUBJECT.KEYID = 7
3,859,950 UART: [idev] UDS.KEYID = 0
3,860,881 ready_for_fw is high
3,861,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,955 UART: [idev] Erasing UDS.KEYID = 0
6,334,363 UART: [idev] Sha1 KeyId Algorithm
6,355,423 UART: [idev] --
6,361,500 UART: [ldev] ++
6,362,192 UART: [ldev] CDI.KEYID = 6
6,363,110 UART: [ldev] SUBJECT.KEYID = 5
6,364,322 UART: [ldev] AUTHORITY.KEYID = 7
6,365,500 UART: [ldev] FE.KEYID = 1
6,376,365 UART: [ldev] Erasing FE.KEYID = 1
8,854,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,192 UART: [ldev] --
10,644,618 UART: [fwproc] Wait for Commands...
10,647,628 UART: [fwproc] Recv command 0x46574c44
10,649,965 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,218,987 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,342,598 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,902,653 >>> mbox cmd response: success
14,906,929 UART: [afmc] ++
14,907,667 UART: [afmc] CDI.KEYID = 6
14,908,794 UART: [afmc] SUBJECT.KEYID = 7
14,910,296 UART: [afmc] AUTHORITY.KEYID = 5
17,412,793 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,136,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,138,292 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,153,402 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,168,556 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,183,474 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,208,144 UART: [afmc] --
19,211,554 UART: [cold-reset] --
19,216,620 UART: [state] Locking Datavault
19,223,293 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,545 UART: [state] Locking ICCM
19,227,016 UART: [exit] Launching FMC @ 0x40000130
19,235,660 UART:
19,235,898 UART: Running Caliptra FMC ...
19,236,953 UART:
19,237,105 UART: [state] CFI Enabled
19,245,107 UART: [fht] FMC Alias Private Key: 7
21,011,680 UART: [art] Extend RT PCRs Done
21,012,903 UART: [art] Lock RT PCRs Done
21,014,645 UART: [art] Populate DV Done
21,020,120 UART: [fht] FMC Alias Private Key: 7
21,021,774 UART: [art] Derive CDI
21,022,593 UART: [art] Store in slot 0x4
21,065,321 UART: [art] Derive Key Pair
21,066,367 UART: [art] Store priv key in slot 0x5
23,493,246 UART: [art] Derive Key Pair - Done
23,506,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,831 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,335 UART: [art] PUB.X = 10E2CED55E536E98E9D8EAADD39244BA90EEF1767037BFA2EF7B0888C1461B83DA6AE7E16F9BC90623E84CE61DFDE8C4
25,221,604 UART: [art] PUB.Y = E8692B0C018D1E362D4B52AA5CA9FF94B4D7DF25163844D472B5C0A11224913871F61AB5B0B66912369919638D5484F0
25,228,835 UART: [art] SIG.R = C13D732DA6E6FEB3A5B31A3896A4FA64B35306E91825F6C0761A8ADE6C867C732C0394DBF4481E0C1604E74C29DA7059
25,236,209 UART: [art] SIG.S = D0C81009244F9A6E78B3BF18F366CE1C7D7345D6C00F94EB1C8C136D44F5A7B01D6CF1633661DB0E49B23FE110D22AB2
26,215,098 UART: Caliptra RT
26,215,815 UART: [state] CFI Enabled
26,348,746 UART: [rt] RT listening for mailbox commands...
26,351,128 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,506,606 UART: [rt]cmd =0x41544d4e, len=14344
30,503,075 >>> mbox cmd response data (8 bytes)
30,503,663 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,534,213 UART: [rt]cmd =0x41545348, len=116
30,536,498 >>> mbox cmd response data (12 bytes)
32,606,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,756,758 UART:
32,757,134 UART: Running Caliptra ROM ...
32,758,272 UART:
32,758,447 UART: [state] CFI Enabled
32,769,589 UART: [state] LifecycleState = Unprovisioned
32,771,484 UART: [state] DebugLocked = No
32,773,673 UART: [state] WD Timer not started. Device not locked for debugging
32,778,327 UART: [kat] SHA2-256
32,968,202 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,978,981 UART: [kat] ++
32,979,499 UART: [kat] sha1
32,991,918 UART: [kat] SHA2-256
32,994,891 UART: [kat] SHA2-384
33,000,359 UART: [kat] SHA2-512-ACC
33,002,948 UART: [kat] ECC-384
35,445,656 UART: [kat] HMAC-384Kdf
35,459,307 UART: [kat] LMS
35,990,920 UART: [kat] --
35,995,896 UART: [update-reset] ++
39,497,753 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,500,322 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,130,060 >>> mbox cmd response: success
40,135,309 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,136,043 UART: [update-reset] Copying MAN_2 To MAN_1
40,168,607 UART: [update-reset Success] --
40,174,083 UART: [state] Locking Datavault
40,177,421 UART: [state] Locking PCR0, PCR1 and PCR31
40,179,598 UART: [state] Locking ICCM
40,181,323 UART: [exit] Launching FMC @ 0x40000130
40,189,963 UART:
40,190,270 UART: Running Caliptra FMC ...
40,191,394 UART:
40,191,555 UART: [state] CFI Enabled
40,235,465 UART: [art] Extend RT PCRs Done
40,236,616 UART: [art] Lock RT PCRs Done
40,238,065 UART: [art] Populate DV Done
40,243,549 UART: [fht] FMC Alias Private Key: 7
40,245,251 UART: [art] Derive CDI
40,246,069 UART: [art] Store in slot 0x4
40,288,285 UART: [art] Derive Key Pair
40,289,337 UART: [art] Store priv key in slot 0x5
42,716,722 UART: [art] Derive Key Pair - Done
42,729,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,435,970 UART: [art] Erasing AUTHORITY.KEYID = 7
44,437,476 UART: [art] PUB.X = 5B6F6F4D2D2AE555795387C8232E8E80FE84A2C245F6C99AE7232AE0A3DE7868DCDDE0A29007C12B6376CB9FC98B9F08
44,444,801 UART: [art] PUB.Y = 66B4A691DFCCD52FEBB150E867EC1272401435B079DB85C1AF604683A1BDD97390F3649F8B88B873212924402608C721
44,452,052 UART: [art] SIG.R = 5753162E958B49131CADD51F5D406C38BA315A468A84271E0729402A4353905C83535F8AB34CAC99EDB8C960AB01742D
44,459,421 UART: [art] SIG.S = 4088DC27D51F40765360A8F234E866400591B73CD371B919EE742E9F6375660B5B6CC2567501D1E185927BCAF8A2B35A
45,438,088 UART: Caliptra RT
45,438,788 UART: [state] CFI Enabled
45,814,982 UART: [rt] RT listening for mailbox commands...
45,846,957 UART: [rt]cmd =0x41545348, len=116
45,849,284 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
1,113 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,432 writing to cptra_bootfsm_go
3,757,410 ready_for_fw is high
3,757,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,810 >>> mbox cmd response: success
19,301,184 UART:
19,301,701 UART: Running Caliptra FMC ...
19,302,832 UART:
19,303,003 UART: [state] CFI Enabled
19,310,891 UART: [fht] FMC Alias Private Key: 7
21,077,348 UART: [art] Extend RT PCRs Done
21,078,583 UART: [art] Lock RT PCRs Done
21,080,171 UART: [art] Populate DV Done
21,085,616 UART: [fht] FMC Alias Private Key: 7
21,087,269 UART: [art] Derive CDI
21,088,092 UART: [art] Store in slot 0x4
21,130,873 UART: [art] Derive Key Pair
21,131,921 UART: [art] Store priv key in slot 0x5
23,558,606 UART: [art] Derive Key Pair - Done
23,571,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,268 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,780 UART: [art] PUB.X = BD27AB7ECC3BB9E2894E09055507377E190C6F62940ED533D0FD3FD880D859D6CEA6A9B5397C93E6A38F3B9AB2D13DE5
25,286,105 UART: [art] PUB.Y = ECB389FEA8E8728C8AF94999B17B68BBDBC372E0AC7006A98B184D3607BCCEE2931860ACB512710F1AD6356F7E3B1646
25,293,315 UART: [art] SIG.R = 87A0B01A6B384D2DBA1CC04284DAF4B2C36346EBD3D1A86E2A8BF254D2D38E0A4A12CC83672250EB6FAC2750CF8D0A6A
25,300,764 UART: [art] SIG.S = AF32684A3D7232203DEC8223AFF25CAC9CC7B1FC8183D86348C8E31A26478FE3D75B8D160CD178A261FAFDED7B7512E1
26,279,489 UART: Caliptra RT
26,280,215 UART: [state] CFI Enabled
26,412,621 UART: [rt] RT listening for mailbox commands...
26,415,053 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,570,625 UART: [rt]cmd =0x41544d4e, len=14344
30,566,687 >>> mbox cmd response data (8 bytes)
30,567,283 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,597,805 UART: [rt]cmd =0x41545348, len=116
30,599,698 >>> mbox cmd response data (12 bytes)
32,672,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,500,105 >>> mbox cmd response: success
40,500,696 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,535,878 UART:
40,536,177 UART: Running Caliptra FMC ...
40,537,303 UART:
40,537,490 UART: [state] CFI Enabled
40,581,785 UART: [art] Extend RT PCRs Done
40,583,070 UART: [art] Lock RT PCRs Done
40,584,461 UART: [art] Populate DV Done
40,590,045 UART: [fht] FMC Alias Private Key: 7
40,591,592 UART: [art] Derive CDI
40,592,328 UART: [art] Store in slot 0x4
40,635,302 UART: [art] Derive Key Pair
40,636,303 UART: [art] Store priv key in slot 0x5
43,063,552 UART: [art] Derive Key Pair - Done
43,076,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,783,017 UART: [art] Erasing AUTHORITY.KEYID = 7
44,784,518 UART: [art] PUB.X = 23B2FBD6BF28743CAEB89D54740BC8304EFACE8359715A7E89FE9AB9595FA1CF49E96F2A44691898446926A3A201D953
44,791,829 UART: [art] PUB.Y = BD3E6031EB434FD62FE98D6C1429B260745D58879D8561B5067E120EB09F7BF3DAEB694A0CF0BA0FD6731ABECCD7E9A2
44,799,065 UART: [art] SIG.R = 8DF7A150CF4303B455DCE66B092D67EE80A4943E6A00458775A1BD5588DB386E769399C8BF8AFDE8F4D4B6D631011128
44,806,466 UART: [art] SIG.S = 74DB256334EC3C61A73092E565AA678197306E0713B3FB72DD0745CE18CE22FB93B71B2E755A6AE856D695E0F81DDBBF
45,785,368 UART: Caliptra RT
45,786,088 UART: [state] CFI Enabled
46,162,224 UART: [rt] RT listening for mailbox commands...
46,194,217 UART: [rt]cmd =0x41545348, len=116
46,196,365 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Unprovisioned
86,183 UART: [state] DebugLocked = No
86,769 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,293 UART: [kat] SHA2-256
882,224 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,339 UART: [kat] ++
886,491 UART: [kat] sha1
890,623 UART: [kat] SHA2-256
892,561 UART: [kat] SHA2-384
895,234 UART: [kat] SHA2-512-ACC
897,135 UART: [kat] ECC-384
902,924 UART: [kat] HMAC-384Kdf
907,580 UART: [kat] LMS
1,475,776 UART: [kat] --
1,476,431 UART: [cold-reset] ++
1,476,865 UART: [fht] Storing FHT @ 0x50003400
1,479,544 UART: [idev] ++
1,479,712 UART: [idev] CDI.KEYID = 6
1,480,072 UART: [idev] SUBJECT.KEYID = 7
1,480,496 UART: [idev] UDS.KEYID = 0
1,480,841 ready_for_fw is high
1,480,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,692 UART: [idev] Erasing UDS.KEYID = 0
1,505,222 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,766 UART: [idev] --
1,514,761 UART: [ldev] ++
1,514,929 UART: [ldev] CDI.KEYID = 6
1,515,292 UART: [ldev] SUBJECT.KEYID = 5
1,515,718 UART: [ldev] AUTHORITY.KEYID = 7
1,516,181 UART: [ldev] FE.KEYID = 1
1,521,235 UART: [ldev] Erasing FE.KEYID = 1
1,546,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,294 UART: [ldev] --
1,585,617 UART: [fwproc] Waiting for Commands...
1,586,458 UART: [fwproc] Received command 0x46574c44
1,587,249 UART: [fwproc] Received Image of size 118548 bytes
2,932,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,933 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,151 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,456 >>> mbox cmd response: success
3,132,702 UART: [afmc] ++
3,132,870 UART: [afmc] CDI.KEYID = 6
3,133,232 UART: [afmc] SUBJECT.KEYID = 7
3,133,657 UART: [afmc] AUTHORITY.KEYID = 5
3,168,270 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,360 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,140 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,849 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,732 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,415 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,235 UART: [afmc] --
3,211,133 UART: [cold-reset] --
3,211,947 UART: [state] Locking Datavault
3,213,094 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,698 UART: [state] Locking ICCM
3,214,244 UART: [exit] Launching FMC @ 0x40000130
3,219,574 UART:
3,219,590 UART: Running Caliptra FMC ...
3,219,998 UART:
3,220,052 UART: [state] CFI Enabled
3,230,498 UART: [fht] FMC Alias Private Key: 7
3,349,656 UART: [art] Extend RT PCRs Done
3,350,084 UART: [art] Lock RT PCRs Done
3,351,896 UART: [art] Populate DV Done
3,360,203 UART: [fht] FMC Alias Private Key: 7
3,361,253 UART: [art] Derive CDI
3,361,533 UART: [art] Store in slot 0x4
3,447,135 UART: [art] Derive Key Pair
3,447,495 UART: [art] Store priv key in slot 0x5
3,460,510 UART: [art] Derive Key Pair - Done
3,475,079 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,312 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,077 UART: [art] PUB.X = 86126F2D20B4F3581ECC20260C31A949F52DF3FE9FA47B1047BB9D4412B93CE38825F42852370400F930E3BAECD64A43
3,497,821 UART: [art] PUB.Y = 0CADA6A85E3400077B08E5A581563122266FC585E396A7AA71DBABB652C1B4886548B4798D9CD60719BE51E58AF79787
3,504,737 UART: [art] SIG.R = F4E91E874BC304A03607B13B66073FC813EB7E61A1765323258BD9B4FA7D2A4FECB3DCFEFC41CE69FCDDF7D44735DCAB
3,511,522 UART: [art] SIG.S = BE8D88D3026729088D34E85B301CA74604CC7CE607C45BBEFDC6AB02F817476823FF59D4C5D4BA660308476A63E5C5AD
3,535,029 UART: Caliptra RT
3,535,280 UART: [state] CFI Enabled
3,654,829 UART: [rt] RT listening for mailbox commands...
3,655,499 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,555 UART: [rt]cmd =0x41544d4e, len=14344
4,088,545 >>> mbox cmd response data (8 bytes)
4,088,546 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,118,697 UART: [rt]cmd =0x41545348, len=116
4,120,600 >>> mbox cmd response data (12 bytes)
4,120,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,637 UART:
4,121,653 UART: Running Caliptra ROM ...
4,122,061 UART:
4,122,115 UART: [state] CFI Enabled
4,124,555 UART: [state] LifecycleState = Unprovisioned
4,125,210 UART: [state] DebugLocked = No
4,125,782 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,127,479 UART: [kat] SHA2-256
4,921,410 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,925,525 UART: [kat] ++
4,925,677 UART: [kat] sha1
4,929,975 UART: [kat] SHA2-256
4,931,913 UART: [kat] SHA2-384
4,934,622 UART: [kat] SHA2-512-ACC
4,936,522 UART: [kat] ECC-384
4,942,223 UART: [kat] HMAC-384Kdf
4,946,693 UART: [kat] LMS
5,514,889 UART: [kat] --
5,515,894 UART: [update-reset] ++
6,897,538 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,898,800 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,054,067 >>> mbox cmd response: success
7,054,067 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,054,392 UART: [update-reset] Copying MAN_2 To MAN_1
7,062,406 UART: [update-reset Success] --
7,063,493 UART: [state] Locking Datavault
7,064,287 UART: [state] Locking PCR0, PCR1 and PCR31
7,064,891 UART: [state] Locking ICCM
7,065,489 UART: [exit] Launching FMC @ 0x40000130
7,070,819 UART:
7,070,835 UART: Running Caliptra FMC ...
7,071,243 UART:
7,071,297 UART: [state] CFI Enabled
7,161,088 UART: [art] Extend RT PCRs Done
7,161,516 UART: [art] Lock RT PCRs Done
7,162,885 UART: [art] Populate DV Done
7,171,368 UART: [fht] FMC Alias Private Key: 7
7,172,516 UART: [art] Derive CDI
7,172,796 UART: [art] Store in slot 0x4
7,258,140 UART: [art] Derive Key Pair
7,258,500 UART: [art] Store priv key in slot 0x5
7,271,689 UART: [art] Derive Key Pair - Done
7,286,470 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,301,929 UART: [art] Erasing AUTHORITY.KEYID = 7
7,302,694 UART: [art] PUB.X = E99CD8D4684BE4F777070F322CE04182E011CE9C0CA10804CE817F6E3A3FA2BED5EA3BE85C09974A528D79BB03C9AC3A
7,309,459 UART: [art] PUB.Y = CAD2785461D5416DD34316A9ACD23AC3523918BC2D15EF1B8915CE3249CC0B824535166ECEE192AFD3AC4E73671E98D6
7,316,414 UART: [art] SIG.R = C318FC9BA05F20A10C7CB4194F4CBA0ABF33D754C54AA88D64B70708E25AE56E28BF8658FBF1E499C778BAF67B0FE366
7,323,187 UART: [art] SIG.S = 3CB038BA778B608AFC69879178B8E81389D4BAC4AE6DCCFA5841F73273F026115BB6E6AFF845F093159CA40EE08AF9B5
7,346,568 UART: Caliptra RT
7,346,819 UART: [state] CFI Enabled
7,716,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,746,741 UART: [rt]cmd =0x41545348, len=116
7,748,484 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,781 ready_for_fw is high
1,362,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,440 >>> mbox cmd response: success
3,043,351 UART:
3,043,367 UART: Running Caliptra FMC ...
3,043,775 UART:
3,043,829 UART: [state] CFI Enabled
3,054,575 UART: [fht] FMC Alias Private Key: 7
3,173,639 UART: [art] Extend RT PCRs Done
3,174,067 UART: [art] Lock RT PCRs Done
3,175,503 UART: [art] Populate DV Done
3,183,652 UART: [fht] FMC Alias Private Key: 7
3,184,724 UART: [art] Derive CDI
3,185,004 UART: [art] Store in slot 0x4
3,270,836 UART: [art] Derive Key Pair
3,271,196 UART: [art] Store priv key in slot 0x5
3,284,987 UART: [art] Derive Key Pair - Done
3,299,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,301 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,066 UART: [art] PUB.X = 1907FCC66E0010817E2740A648573E06C2BDA251D065A5A54F3CF07BB1A3994A30E39AF71926A51CE73A0349E2284842
3,322,801 UART: [art] PUB.Y = 71856E31DAB53E90095F7A179E4E7E6072AD18332D07A7030A9CEDE41AF7C46D10886D7213FE44BC598980DBFE1C8AAD
3,329,749 UART: [art] SIG.R = 1BB1DE1B6C07C986A4C0446B07048E278F2B02C651B043F442A1A48BBC1B1DFA8F7F0CACED279407FE2308B873F1245F
3,336,510 UART: [art] SIG.S = FE7DCE4DC848CB4D3CBB5806EFAB14660E2EB636095FAA8FBC30D77870B2DF2714AB96679BC5F32FEA831DD266AD4A2D
3,359,465 UART: Caliptra RT
3,359,716 UART: [state] CFI Enabled
3,480,694 UART: [rt] RT listening for mailbox commands...
3,481,364 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,406 UART: [rt]cmd =0x41544d4e, len=14344
3,914,952 >>> mbox cmd response data (8 bytes)
3,914,953 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,168 UART: [rt]cmd =0x41545348, len=116
3,946,993 >>> mbox cmd response data (12 bytes)
3,946,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,760,628 >>> mbox cmd response: success
6,760,628 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,773,940 UART:
6,773,956 UART: Running Caliptra FMC ...
6,774,364 UART:
6,774,418 UART: [state] CFI Enabled
6,863,315 UART: [art] Extend RT PCRs Done
6,863,743 UART: [art] Lock RT PCRs Done
6,864,922 UART: [art] Populate DV Done
6,873,137 UART: [fht] FMC Alias Private Key: 7
6,874,201 UART: [art] Derive CDI
6,874,481 UART: [art] Store in slot 0x4
6,960,469 UART: [art] Derive Key Pair
6,960,829 UART: [art] Store priv key in slot 0x5
6,973,988 UART: [art] Derive Key Pair - Done
6,988,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,003,904 UART: [art] Erasing AUTHORITY.KEYID = 7
7,004,669 UART: [art] PUB.X = 3C2B3B06C20D26D45A4E62C65EFAEB4C0DF610332661FE2BA721C74AD6F43A9012D8F47B43C646CF9B6B97083BBF152D
7,011,441 UART: [art] PUB.Y = D860BE5506F7109E62296E4AC8F06E809E64A244AD976D253DE97652825AF4F8D4710037460CB82C363031F37A4DA7C6
7,018,359 UART: [art] SIG.R = 64590597054BA3A078805260F5114D432EF53C0580962C8E3519FB6476FF5EADAF3A89A8C81422B532DDABC8F184D443
7,025,118 UART: [art] SIG.S = E9BE7D20140F4D75F86C57C5E4B0D1FB12C0B7D60F1A8C137D5EBFABEE8E1148FBF4D46BC3DECB65A602B43850FFE749
7,049,031 UART: Caliptra RT
7,049,282 UART: [state] CFI Enabled
7,409,237 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,440,218 UART: [rt]cmd =0x41545348, len=116
7,442,209 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.06s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,192 UART: [kat] SHA2-256
882,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,238 UART: [kat] ++
886,390 UART: [kat] sha1
890,806 UART: [kat] SHA2-256
892,744 UART: [kat] SHA2-384
895,685 UART: [kat] SHA2-512-ACC
897,586 UART: [kat] ECC-384
903,211 UART: [kat] HMAC-384Kdf
907,849 UART: [kat] LMS
1,476,045 UART: [kat] --
1,476,844 UART: [cold-reset] ++
1,477,328 UART: [fht] Storing FHT @ 0x50003400
1,480,287 UART: [idev] ++
1,480,455 UART: [idev] CDI.KEYID = 6
1,480,815 UART: [idev] SUBJECT.KEYID = 7
1,481,239 UART: [idev] UDS.KEYID = 0
1,481,584 ready_for_fw is high
1,481,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,339 UART: [idev] Erasing UDS.KEYID = 0
1,505,915 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,413 UART: [idev] --
1,515,360 UART: [ldev] ++
1,515,528 UART: [ldev] CDI.KEYID = 6
1,515,891 UART: [ldev] SUBJECT.KEYID = 5
1,516,317 UART: [ldev] AUTHORITY.KEYID = 7
1,516,780 UART: [ldev] FE.KEYID = 1
1,521,986 UART: [ldev] Erasing FE.KEYID = 1
1,547,521 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,397 UART: [ldev] --
1,586,746 UART: [fwproc] Waiting for Commands...
1,587,587 UART: [fwproc] Received command 0x46574c44
1,588,378 UART: [fwproc] Received Image of size 118548 bytes
2,932,046 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,760 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,978 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,209 >>> mbox cmd response: success
3,132,297 UART: [afmc] ++
3,132,465 UART: [afmc] CDI.KEYID = 6
3,132,827 UART: [afmc] SUBJECT.KEYID = 7
3,133,252 UART: [afmc] AUTHORITY.KEYID = 5
3,168,145 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,577 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,357 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,066 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,949 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,632 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,488 UART: [afmc] --
3,211,478 UART: [cold-reset] --
3,212,262 UART: [state] Locking Datavault
3,213,307 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,911 UART: [state] Locking ICCM
3,214,401 UART: [exit] Launching FMC @ 0x40000130
3,219,731 UART:
3,219,747 UART: Running Caliptra FMC ...
3,220,155 UART:
3,220,298 UART: [state] CFI Enabled
3,231,090 UART: [fht] FMC Alias Private Key: 7
3,350,454 UART: [art] Extend RT PCRs Done
3,350,882 UART: [art] Lock RT PCRs Done
3,352,480 UART: [art] Populate DV Done
3,360,895 UART: [fht] FMC Alias Private Key: 7
3,361,877 UART: [art] Derive CDI
3,362,157 UART: [art] Store in slot 0x4
3,448,041 UART: [art] Derive Key Pair
3,448,401 UART: [art] Store priv key in slot 0x5
3,462,022 UART: [art] Derive Key Pair - Done
3,476,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,070 UART: [art] PUB.X = DEA333F1FDE0F79FF8EA502474CB7DE9B1F6C485638F6B507BC6FD720EE2273BE68F2BA18F3EFE6736EBA3F2FBE199A9
3,499,863 UART: [art] PUB.Y = D96962A8EB4CF2AB777C1EC20F2E6837118F76891B0B873FDDF3FBB2D10EE11C8B6C043EE6D78B9FD961A6486DA3C9D8
3,506,819 UART: [art] SIG.R = 34F42865D4F1810A6670D1FEC0F42BA66DFA3C0C7F1CD765F46F7AF805FECCC6F279A2602FFD73EC42C0A29E4A07E6B1
3,513,597 UART: [art] SIG.S = 3D7052289357C8DFD0B9A52FD6D45D2482FABD95A75ED90C90AE5900597161CF266EB5CF7713E00F46149B9D82D48DD2
3,537,639 UART: Caliptra RT
3,537,982 UART: [state] CFI Enabled
3,659,001 UART: [rt] RT listening for mailbox commands...
3,659,671 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,629 UART: [rt]cmd =0x41544d4e, len=14344
4,091,995 >>> mbox cmd response data (8 bytes)
4,091,996 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,837 UART: [rt]cmd =0x41545348, len=116
4,123,272 >>> mbox cmd response data (12 bytes)
4,123,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,077 UART:
4,124,093 UART: Running Caliptra ROM ...
4,124,501 UART:
4,124,642 UART: [state] CFI Enabled
4,127,596 UART: [state] LifecycleState = Unprovisioned
4,128,251 UART: [state] DebugLocked = No
4,128,983 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,130,602 UART: [kat] SHA2-256
4,924,533 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,928,648 UART: [kat] ++
4,928,800 UART: [kat] sha1
4,932,932 UART: [kat] SHA2-256
4,934,870 UART: [kat] SHA2-384
4,937,513 UART: [kat] SHA2-512-ACC
4,939,413 UART: [kat] ECC-384
4,945,070 UART: [kat] HMAC-384Kdf
4,949,876 UART: [kat] LMS
5,518,072 UART: [kat] --
5,518,919 UART: [update-reset] ++
6,900,311 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,901,519 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,056,786 >>> mbox cmd response: success
7,056,786 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,057,049 UART: [update-reset] Copying MAN_2 To MAN_1
7,065,063 UART: [update-reset Success] --
7,065,726 UART: [state] Locking Datavault
7,066,676 UART: [state] Locking PCR0, PCR1 and PCR31
7,067,280 UART: [state] Locking ICCM
7,067,930 UART: [exit] Launching FMC @ 0x40000130
7,073,260 UART:
7,073,276 UART: Running Caliptra FMC ...
7,073,684 UART:
7,073,827 UART: [state] CFI Enabled
7,163,418 UART: [art] Extend RT PCRs Done
7,163,846 UART: [art] Lock RT PCRs Done
7,165,345 UART: [art] Populate DV Done
7,173,614 UART: [fht] FMC Alias Private Key: 7
7,174,564 UART: [art] Derive CDI
7,174,844 UART: [art] Store in slot 0x4
7,260,562 UART: [art] Derive Key Pair
7,260,922 UART: [art] Store priv key in slot 0x5
7,274,017 UART: [art] Derive Key Pair - Done
7,288,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,304,536 UART: [art] Erasing AUTHORITY.KEYID = 7
7,305,301 UART: [art] PUB.X = 41E9D12D6F9A09DFBBF971E196B4BB842D79A1373E042ED8B61C52AB3A7CAAF5EECA89DC38B4FD1C95B65E44FA49B3E4
7,312,091 UART: [art] PUB.Y = EECBAC92CF9319DDB7081FA7FCDF5C7B473448DAA6C0FB1DD20BBFDFA7F7B04ABDD14E6A132DA3359DAEED3A681ECAD7
7,319,079 UART: [art] SIG.R = C12C4DCC0B135F3D2E4F3254543F1DB81661F6532DEDC34805F545A7FDE732A9AB4E21F7BE0D5B19696F700445162F6C
7,325,845 UART: [art] SIG.S = CAAE4285F2B96123FDE5E8F09BDF7837A7C0C6A568E33ADDAFC8791996AFCB7416D4D41257BBEF1C9287E6888DE3707B
7,349,321 UART: Caliptra RT
7,349,664 UART: [state] CFI Enabled
7,716,776 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,747,421 UART: [rt]cmd =0x41545348, len=116
7,749,164 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,578 ready_for_fw is high
1,362,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,237 >>> mbox cmd response: success
3,042,002 UART:
3,042,018 UART: Running Caliptra FMC ...
3,042,426 UART:
3,042,569 UART: [state] CFI Enabled
3,053,437 UART: [fht] FMC Alias Private Key: 7
3,172,381 UART: [art] Extend RT PCRs Done
3,172,809 UART: [art] Lock RT PCRs Done
3,174,517 UART: [art] Populate DV Done
3,182,788 UART: [fht] FMC Alias Private Key: 7
3,183,812 UART: [art] Derive CDI
3,184,092 UART: [art] Store in slot 0x4
3,269,664 UART: [art] Derive Key Pair
3,270,024 UART: [art] Store priv key in slot 0x5
3,283,665 UART: [art] Derive Key Pair - Done
3,298,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,753 UART: [art] PUB.X = 6949E3A5A226532C2B933562FF7332BF17512F79613511D7CCA522EF7670D2A405FC2DEE4E1FDED54DDD4A935D9BC33E
3,321,530 UART: [art] PUB.Y = FDAABB3FE52D83164E38426F5C6FB5E6C42932D89D9F60A675A1A28602041CF2E8A1F4B503B2E82B9CDD808111FD6580
3,328,481 UART: [art] SIG.R = 5D1244586DCFB2B5DA820CC04492CE197CF3D98829653F71265E3C816967E973A200B9018E09E3BE3DE484AC23929E56
3,335,218 UART: [art] SIG.S = 1669D8421EEAEEDC36A755859A7C77A1D792E74E84200330A442A0D63C787694DAF9045950FB25E4DC3945BCB7C95BFE
3,359,616 UART: Caliptra RT
3,359,959 UART: [state] CFI Enabled
3,480,724 UART: [rt] RT listening for mailbox commands...
3,481,394 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,326 UART: [rt]cmd =0x41544d4e, len=14344
3,914,316 >>> mbox cmd response data (8 bytes)
3,914,317 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,390 UART: [rt]cmd =0x41545348, len=116
3,946,163 >>> mbox cmd response data (12 bytes)
3,946,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,759,739 >>> mbox cmd response: success
6,759,739 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,773,453 UART:
6,773,469 UART: Running Caliptra FMC ...
6,773,877 UART:
6,774,020 UART: [state] CFI Enabled
6,863,273 UART: [art] Extend RT PCRs Done
6,863,701 UART: [art] Lock RT PCRs Done
6,864,856 UART: [art] Populate DV Done
6,873,269 UART: [fht] FMC Alias Private Key: 7
6,874,365 UART: [art] Derive CDI
6,874,645 UART: [art] Store in slot 0x4
6,960,457 UART: [art] Derive Key Pair
6,960,817 UART: [art] Store priv key in slot 0x5
6,974,396 UART: [art] Derive Key Pair - Done
6,989,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,005,113 UART: [art] Erasing AUTHORITY.KEYID = 7
7,005,878 UART: [art] PUB.X = 8BA5DF511BA090570F7533359FCF71BF9871B3AA8E3D4BC8272CB47163527F8DB4F6B73BB3D5A1DB95265A249C32C865
7,012,653 UART: [art] PUB.Y = B8CDAB4A3AFE2C4C38BAEAD69D49FB41638DA6FAD652EDF59C9A17EF240A217B39C032D2B32BC4462159D15CD2B45AE5
7,019,626 UART: [art] SIG.R = 742603B0862B1A7C13436CCBDB267A4C1F871BC63C9B3CFF58EACF8C98A51E95A9B99239BA898726928D0FD13A2BEC30
7,026,402 UART: [art] SIG.S = 0016FB35138D7C49A9133522040422FDB4C0C57CCDF0413FF43FF517EDF59D61D5841CD53356A37829186629B66DD296
7,049,644 UART: Caliptra RT
7,049,987 UART: [state] CFI Enabled
7,416,429 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,447,450 UART: [rt]cmd =0x41545348, len=116
7,448,993 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.07s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,304 UART: [kat] SHA2-256
890,854 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,958 UART: [kat] ++
895,110 UART: [kat] sha1
899,370 UART: [kat] SHA2-256
901,310 UART: [kat] SHA2-384
903,879 UART: [kat] SHA2-512-ACC
905,780 UART: [kat] ECC-384
914,787 UART: [kat] HMAC-384Kdf
919,217 UART: [kat] LMS
1,167,529 UART: [kat] --
1,168,462 UART: [cold-reset] ++
1,168,824 UART: [fht] FHT @ 0x50003400
1,171,630 UART: [idev] ++
1,171,798 UART: [idev] CDI.KEYID = 6
1,172,159 UART: [idev] SUBJECT.KEYID = 7
1,172,584 UART: [idev] UDS.KEYID = 0
1,172,930 ready_for_fw is high
1,172,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,171 UART: [idev] Erasing UDS.KEYID = 0
1,198,163 UART: [idev] Sha1 KeyId Algorithm
1,207,037 UART: [idev] --
1,208,154 UART: [ldev] ++
1,208,322 UART: [ldev] CDI.KEYID = 6
1,208,686 UART: [ldev] SUBJECT.KEYID = 5
1,209,113 UART: [ldev] AUTHORITY.KEYID = 7
1,209,576 UART: [ldev] FE.KEYID = 1
1,214,748 UART: [ldev] Erasing FE.KEYID = 1
1,241,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,026 UART: [ldev] --
1,280,255 UART: [fwproc] Wait for Commands...
1,280,896 UART: [fwproc] Recv command 0x46574c44
1,281,629 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,233 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,408 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,683 >>> mbox cmd response: success
2,824,779 UART: [afmc] ++
2,824,947 UART: [afmc] CDI.KEYID = 6
2,825,310 UART: [afmc] SUBJECT.KEYID = 7
2,825,736 UART: [afmc] AUTHORITY.KEYID = 5
2,862,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,207 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,917 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,798 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,499 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,434 UART: [afmc] --
2,905,441 UART: [cold-reset] --
2,906,335 UART: [state] Locking Datavault
2,907,430 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,034 UART: [state] Locking ICCM
2,908,534 UART: [exit] Launching FMC @ 0x40000130
2,913,864 UART:
2,913,880 UART: Running Caliptra FMC ...
2,914,288 UART:
2,914,342 UART: [state] CFI Enabled
2,924,518 UART: [fht] FMC Alias Private Key: 7
3,043,220 UART: [art] Extend RT PCRs Done
3,043,648 UART: [art] Lock RT PCRs Done
3,045,308 UART: [art] Populate DV Done
3,053,479 UART: [fht] FMC Alias Private Key: 7
3,054,581 UART: [art] Derive CDI
3,054,861 UART: [art] Store in slot 0x4
3,141,040 UART: [art] Derive Key Pair
3,141,400 UART: [art] Store priv key in slot 0x5
3,154,486 UART: [art] Derive Key Pair - Done
3,169,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,149 UART: [art] PUB.X = DC7ECD8B8C25D37DBBC96AF504579470BAF78497B504BCAAAE8C6B7F20ED1EB9A80DACF3ADAC913091EB8B1D6648B0C0
3,191,940 UART: [art] PUB.Y = 8248C6B744F59A22A09798CB5BB9476194B9E5502DD5461D3FDF80D910171CF32D87060FC16A5D73D218A20354D591E2
3,198,877 UART: [art] SIG.R = 08AE31DB96787D144B3B9ED2162883254495A89857CDAE273C169E54C1D660673348374D85A0B5E9482F7C0D8BFF2486
3,205,635 UART: [art] SIG.S = 92F365767F51DB0337A6320F11EBBD8D19DF75670BBFD143EC2859703E28BFC9432F7107D243F11AAFA9965C63DCB68B
3,229,581 UART: Caliptra RT
3,229,832 UART: [state] CFI Enabled
3,349,153 UART: [rt] RT listening for mailbox commands...
3,349,823 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,661 UART: [rt]cmd =0x41544d4e, len=14344
3,782,913 >>> mbox cmd response data (8 bytes)
3,782,914 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,153 UART: [rt]cmd =0x41545348, len=116
3,814,846 >>> mbox cmd response data (12 bytes)
3,814,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,798 UART:
3,815,814 UART: Running Caliptra ROM ...
3,816,222 UART:
3,816,277 UART: [state] CFI Enabled
3,818,851 UART: [state] LifecycleState = Unprovisioned
3,819,506 UART: [state] DebugLocked = No
3,820,134 UART: [state] WD Timer not started. Device not locked for debugging
3,821,260 UART: [kat] SHA2-256
4,624,810 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,628,914 UART: [kat] ++
4,629,066 UART: [kat] sha1
4,633,190 UART: [kat] SHA2-256
4,635,130 UART: [kat] SHA2-384
4,637,805 UART: [kat] SHA2-512-ACC
4,639,705 UART: [kat] ECC-384
4,649,294 UART: [kat] HMAC-384Kdf
4,653,678 UART: [kat] LMS
4,901,990 UART: [kat] --
4,902,770 UART: [update-reset] ++
6,261,583 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,262,638 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,417,853 >>> mbox cmd response: success
6,417,853 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,418,020 UART: [update-reset] Copying MAN_2 To MAN_1
6,426,034 UART: [update-reset Success] --
6,426,839 UART: [state] Locking Datavault
6,427,641 UART: [state] Locking PCR0, PCR1 and PCR31
6,428,245 UART: [state] Locking ICCM
6,428,805 UART: [exit] Launching FMC @ 0x40000130
6,434,135 UART:
6,434,151 UART: Running Caliptra FMC ...
6,434,559 UART:
6,434,613 UART: [state] CFI Enabled
6,523,640 UART: [art] Extend RT PCRs Done
6,524,068 UART: [art] Lock RT PCRs Done
6,525,531 UART: [art] Populate DV Done
6,533,950 UART: [fht] FMC Alias Private Key: 7
6,535,068 UART: [art] Derive CDI
6,535,348 UART: [art] Store in slot 0x4
6,621,259 UART: [art] Derive Key Pair
6,621,619 UART: [art] Store priv key in slot 0x5
6,634,427 UART: [art] Derive Key Pair - Done
6,649,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,664,651 UART: [art] Erasing AUTHORITY.KEYID = 7
6,665,416 UART: [art] PUB.X = 74B2D9E5DD97177B33F84553B8173CAF88FDCC3804EEC600434DB4D67622E432607662E6D634C3E848065A18E882ECF0
6,672,158 UART: [art] PUB.Y = 107872077DA55623A03FAEA27679C2134256ACFC4BB456F1019584CF31CB122ED75F2D91405567D15FF8CD75575E1C7C
6,679,102 UART: [art] SIG.R = D735221C1B7137CE49CE8CD3B9A901E637378742E54E2138F25E0D5419076E3237A581BD9BBCC87BAF42CB36F39C00F7
6,685,845 UART: [art] SIG.S = D4B94480EF417B80BFA5782A4AB531DE127374A971C12682346A93EA3675819928A008D1341DAB1FFBE56A785BBC7364
6,709,390 UART: Caliptra RT
6,709,641 UART: [state] CFI Enabled
7,076,246 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,107,175 UART: [rt]cmd =0x41545348, len=116
7,109,258 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,738 ready_for_fw is high
1,058,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,434 >>> mbox cmd response: success
2,739,931 UART:
2,739,947 UART: Running Caliptra FMC ...
2,740,355 UART:
2,740,409 UART: [state] CFI Enabled
2,750,709 UART: [fht] FMC Alias Private Key: 7
2,870,155 UART: [art] Extend RT PCRs Done
2,870,583 UART: [art] Lock RT PCRs Done
2,872,091 UART: [art] Populate DV Done
2,880,538 UART: [fht] FMC Alias Private Key: 7
2,881,516 UART: [art] Derive CDI
2,881,796 UART: [art] Store in slot 0x4
2,967,459 UART: [art] Derive Key Pair
2,967,819 UART: [art] Store priv key in slot 0x5
2,980,929 UART: [art] Derive Key Pair - Done
2,995,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,548 UART: [art] PUB.X = D8E5AD219CB5C31FFDB578D5BD0F36F66383B30D7D38910F9DF0A54CE8EC07D634094E21D587A8F70E787F95765015F7
3,019,308 UART: [art] PUB.Y = EC99055F947F65E337CA6F834F4BA6F9A9E08587B88069F868D43D8309E6B6BF8D68DC109324DB4B820A537302CB89E2
3,026,248 UART: [art] SIG.R = D0E7B55C36F2FE6CE6FC4019965D96650C08D2DBD956AB2CA403D12B71C3D824534EBD5C7C256983A8DE8E97113D3BDB
3,033,023 UART: [art] SIG.S = 755827CCC855EDE88FA6D6E6B905E2697D3212DFCA1FB5CC7F59D030AD72EABFC69111B3E9EF256724D3BF6F1FB58CCA
3,056,876 UART: Caliptra RT
3,057,127 UART: [state] CFI Enabled
3,177,596 UART: [rt] RT listening for mailbox commands...
3,178,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,406 UART: [rt]cmd =0x41544d4e, len=14344
3,610,822 >>> mbox cmd response data (8 bytes)
3,610,823 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,792 UART: [rt]cmd =0x41545348, len=116
3,642,645 >>> mbox cmd response data (12 bytes)
3,642,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,130,526 >>> mbox cmd response: success
6,130,526 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,144,009 UART:
6,144,025 UART: Running Caliptra FMC ...
6,144,433 UART:
6,144,487 UART: [state] CFI Enabled
6,233,446 UART: [art] Extend RT PCRs Done
6,233,874 UART: [art] Lock RT PCRs Done
6,234,935 UART: [art] Populate DV Done
6,243,314 UART: [fht] FMC Alias Private Key: 7
6,244,458 UART: [art] Derive CDI
6,244,738 UART: [art] Store in slot 0x4
6,330,653 UART: [art] Derive Key Pair
6,331,013 UART: [art] Store priv key in slot 0x5
6,344,001 UART: [art] Derive Key Pair - Done
6,358,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,374,185 UART: [art] Erasing AUTHORITY.KEYID = 7
6,374,950 UART: [art] PUB.X = D8C6138668509D65EC8D2DBC506DC01834F97824D609DCE92D68FAF8AED797D7DDEB285E7DD12EA5E1D3D0900D1BB560
6,381,730 UART: [art] PUB.Y = A38C1F2421913D1E3FB39895047343AB1DEFE6318289BC7BA27F935BAADA9FC7F9CF57FAFB74ECF05082E78C1EF396E7
6,388,695 UART: [art] SIG.R = 34007D5349794C02DA548B4C6D578E6DBF638DBAAA001C9BB11A4792D46160697B863BD87D8A187B5CD337A838ECB44F
6,395,424 UART: [art] SIG.S = F005502611DC7986968C75D229B820AD8FF7A9E3B9AD35E80FDD248588DD355DC770B09CB5652D29E00EFB53268850FF
6,418,881 UART: Caliptra RT
6,419,132 UART: [state] CFI Enabled
6,780,640 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,811,661 UART: [rt]cmd =0x41545348, len=116
6,813,518 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
87,082 UART: [state] WD Timer not started. Device not locked for debugging
88,393 UART: [kat] SHA2-256
891,943 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,047 UART: [kat] ++
896,199 UART: [kat] sha1
900,487 UART: [kat] SHA2-256
902,427 UART: [kat] SHA2-384
905,246 UART: [kat] SHA2-512-ACC
907,147 UART: [kat] ECC-384
916,842 UART: [kat] HMAC-384Kdf
921,568 UART: [kat] LMS
1,169,880 UART: [kat] --
1,170,773 UART: [cold-reset] ++
1,171,213 UART: [fht] FHT @ 0x50003400
1,173,987 UART: [idev] ++
1,174,155 UART: [idev] CDI.KEYID = 6
1,174,516 UART: [idev] SUBJECT.KEYID = 7
1,174,941 UART: [idev] UDS.KEYID = 0
1,175,287 ready_for_fw is high
1,175,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,200 UART: [idev] Erasing UDS.KEYID = 0
1,200,508 UART: [idev] Sha1 KeyId Algorithm
1,209,474 UART: [idev] --
1,210,577 UART: [ldev] ++
1,210,745 UART: [ldev] CDI.KEYID = 6
1,211,109 UART: [ldev] SUBJECT.KEYID = 5
1,211,536 UART: [ldev] AUTHORITY.KEYID = 7
1,211,999 UART: [ldev] FE.KEYID = 1
1,217,457 UART: [ldev] Erasing FE.KEYID = 1
1,244,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,453 UART: [ldev] --
1,282,664 UART: [fwproc] Wait for Commands...
1,283,473 UART: [fwproc] Recv command 0x46574c44
1,284,206 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,740 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,915 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,094 >>> mbox cmd response: success
2,828,162 UART: [afmc] ++
2,828,330 UART: [afmc] CDI.KEYID = 6
2,828,693 UART: [afmc] SUBJECT.KEYID = 7
2,829,119 UART: [afmc] AUTHORITY.KEYID = 5
2,864,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,562 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,272 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,153 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,854 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,641 UART: [afmc] --
2,907,594 UART: [cold-reset] --
2,908,474 UART: [state] Locking Datavault
2,909,563 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,167 UART: [state] Locking ICCM
2,910,661 UART: [exit] Launching FMC @ 0x40000130
2,915,991 UART:
2,916,007 UART: Running Caliptra FMC ...
2,916,415 UART:
2,916,558 UART: [state] CFI Enabled
2,927,032 UART: [fht] FMC Alias Private Key: 7
3,046,232 UART: [art] Extend RT PCRs Done
3,046,660 UART: [art] Lock RT PCRs Done
3,048,226 UART: [art] Populate DV Done
3,056,577 UART: [fht] FMC Alias Private Key: 7
3,057,519 UART: [art] Derive CDI
3,057,799 UART: [art] Store in slot 0x4
3,143,628 UART: [art] Derive Key Pair
3,143,988 UART: [art] Store priv key in slot 0x5
3,157,140 UART: [art] Derive Key Pair - Done
3,171,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,827 UART: [art] PUB.X = ECBB2871A81521763020BA2934F309D4ADA435754ABC89B67660890998D2B96C600B1854F9764B18981D6F6CD5D0EAF3
3,194,586 UART: [art] PUB.Y = 366E2F0FD7FB60C7B9E356ABF813481E412BB811703C5CE48B2D8958A067FB80FA8BA39B792DAA70B4D8323E64C196C3
3,201,543 UART: [art] SIG.R = 649ECC6DF1C0A25B9E93C840A138C153419778AA5196F880A54D65AE4A359572AF580124ABBC377E0C0964F0CA42A5CF
3,208,310 UART: [art] SIG.S = 8A8851403A32ADA41740908EBC595EBD4FDAB00A695DCBDBB01D2401D66D0946C662A9DF4741EA5E5D7BD5F5DE8A99AA
3,232,459 UART: Caliptra RT
3,232,802 UART: [state] CFI Enabled
3,352,753 UART: [rt] RT listening for mailbox commands...
3,353,423 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,481 UART: [rt]cmd =0x41544d4e, len=14344
3,786,083 >>> mbox cmd response data (8 bytes)
3,786,084 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,997 UART: [rt]cmd =0x41545348, len=116
3,817,650 >>> mbox cmd response data (12 bytes)
3,817,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,680 UART:
3,818,696 UART: Running Caliptra ROM ...
3,819,104 UART:
3,819,246 UART: [state] CFI Enabled
3,822,522 UART: [state] LifecycleState = Unprovisioned
3,823,177 UART: [state] DebugLocked = No
3,823,817 UART: [state] WD Timer not started. Device not locked for debugging
3,825,097 UART: [kat] SHA2-256
4,628,647 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,632,751 UART: [kat] ++
4,632,903 UART: [kat] sha1
4,637,293 UART: [kat] SHA2-256
4,639,233 UART: [kat] SHA2-384
4,642,028 UART: [kat] SHA2-512-ACC
4,643,928 UART: [kat] ECC-384
4,653,837 UART: [kat] HMAC-384Kdf
4,658,639 UART: [kat] LMS
4,906,951 UART: [kat] --
4,907,585 UART: [update-reset] ++
6,265,528 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,266,717 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,421,932 >>> mbox cmd response: success
6,421,932 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,422,113 UART: [update-reset] Copying MAN_2 To MAN_1
6,430,127 UART: [update-reset Success] --
6,430,896 UART: [state] Locking Datavault
6,431,832 UART: [state] Locking PCR0, PCR1 and PCR31
6,432,436 UART: [state] Locking ICCM
6,433,066 UART: [exit] Launching FMC @ 0x40000130
6,438,396 UART:
6,438,412 UART: Running Caliptra FMC ...
6,438,820 UART:
6,438,963 UART: [state] CFI Enabled
6,528,166 UART: [art] Extend RT PCRs Done
6,528,594 UART: [art] Lock RT PCRs Done
6,529,787 UART: [art] Populate DV Done
6,538,248 UART: [fht] FMC Alias Private Key: 7
6,539,180 UART: [art] Derive CDI
6,539,460 UART: [art] Store in slot 0x4
6,625,731 UART: [art] Derive Key Pair
6,626,091 UART: [art] Store priv key in slot 0x5
6,639,569 UART: [art] Derive Key Pair - Done
6,654,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,670,013 UART: [art] Erasing AUTHORITY.KEYID = 7
6,670,778 UART: [art] PUB.X = 28063F45F30E68C9FE30C682C3BEA7F2DFF26DFE84768A3A68849B25F5E5B65589F2AEE570597E59C93DEC3E4517CAFA
6,677,556 UART: [art] PUB.Y = 54BA9CF7B33A13B1704345C24CE6DD0225814BF2FCC947B301D59AD82B665C8D7811300AF6D76BFEADF2CE4E9AA714FB
6,684,515 UART: [art] SIG.R = 3C65881BDF2DAB48DD7305C26EC1961B8215289CF5A0D20B61FBFF577B8AF4D9EBC3A1821D6735E52C98141EE50CFDBD
6,691,294 UART: [art] SIG.S = 75773B7B5E38DAF549DA1DC6D6CEA98E0E0561F4DE842EFE31FF8572DD7CD907E10D11BF0AEDBE8A1281C7605A7C6822
6,715,451 UART: Caliptra RT
6,715,794 UART: [state] CFI Enabled
7,077,487 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,108,344 UART: [rt]cmd =0x41545348, len=116
7,110,315 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,609 ready_for_fw is high
1,059,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,163 >>> mbox cmd response: success
2,740,214 UART:
2,740,230 UART: Running Caliptra FMC ...
2,740,638 UART:
2,740,781 UART: [state] CFI Enabled
2,751,051 UART: [fht] FMC Alias Private Key: 7
2,870,293 UART: [art] Extend RT PCRs Done
2,870,721 UART: [art] Lock RT PCRs Done
2,872,591 UART: [art] Populate DV Done
2,880,658 UART: [fht] FMC Alias Private Key: 7
2,881,744 UART: [art] Derive CDI
2,882,024 UART: [art] Store in slot 0x4
2,967,967 UART: [art] Derive Key Pair
2,968,327 UART: [art] Store priv key in slot 0x5
2,981,337 UART: [art] Derive Key Pair - Done
2,995,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,454 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,219 UART: [art] PUB.X = D05F904B10B0E695015F0407B0472566B6E5B0462CD0A1E658CA93303618D0F5DB74628A6563D1AED43E25D8064456C5
3,018,971 UART: [art] PUB.Y = BC4737E6EE41EC7387E6AE849D6F6622BE370CC91B5AB5C8EA133E1F7F2BB229579522D8BD213E13256FC2497D5F93F9
3,025,928 UART: [art] SIG.R = 9D1D1B834FAF3B0C7CBB2C1734E44C6405EEEDAEC0C1E761E0FD95C7723CE36B35894DC62F44B052603632442C2A1249
3,032,702 UART: [art] SIG.S = 761823BF6A5A596D3C69E6FFC94F3567B9A705509661D3CB96B58714EF03E100B812D97C6C899FAF842DDBA48FD2C99A
3,056,456 UART: Caliptra RT
3,056,799 UART: [state] CFI Enabled
3,175,554 UART: [rt] RT listening for mailbox commands...
3,176,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,074 UART: [rt]cmd =0x41544d4e, len=14344
3,609,216 >>> mbox cmd response data (8 bytes)
3,609,217 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,162 UART: [rt]cmd =0x41545348, len=116
3,640,825 >>> mbox cmd response data (12 bytes)
3,640,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,129,939 >>> mbox cmd response: success
6,129,939 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,143,364 UART:
6,143,380 UART: Running Caliptra FMC ...
6,143,788 UART:
6,143,931 UART: [state] CFI Enabled
6,233,314 UART: [art] Extend RT PCRs Done
6,233,742 UART: [art] Lock RT PCRs Done
6,234,755 UART: [art] Populate DV Done
6,242,950 UART: [fht] FMC Alias Private Key: 7
6,244,022 UART: [art] Derive CDI
6,244,302 UART: [art] Store in slot 0x4
6,330,553 UART: [art] Derive Key Pair
6,330,913 UART: [art] Store priv key in slot 0x5
6,344,461 UART: [art] Derive Key Pair - Done
6,359,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,374,649 UART: [art] Erasing AUTHORITY.KEYID = 7
6,375,414 UART: [art] PUB.X = A5221196AEE11F5EF651D73C63140F88EE909C91081B06DF0D6EB31588E586B75612D567A2EC7BD45B22CC5AF5FB8B15
6,382,180 UART: [art] PUB.Y = 378543090D0A08C67EFAC1462B2F3B55EAF2C22ECA6E5FD08B7928AC49670908CB254973B383F359209836F89F2C0950
6,389,107 UART: [art] SIG.R = 27C3E9A6DA726CEE25E25A64B5E8875E22D20026966A70A5E328B86FB5ECD57CB0EADB45B11710AF3F3E6267E680E5C9
6,395,867 UART: [art] SIG.S = 5BE5D1829DE248E3365E6427F38CB56D50B1007C23C55E7028E0803C3EE98B852F0DBB756E39E34600AEFB5BBEF44ADD
6,419,372 UART: Caliptra RT
6,419,715 UART: [state] CFI Enabled
6,789,122 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,819,999 UART: [rt]cmd =0x41545348, len=116
6,821,608 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
893,264 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,389 UART: [kat] ++
897,541 UART: [kat] sha1
901,921 UART: [kat] SHA2-256
903,861 UART: [kat] SHA2-384
906,646 UART: [kat] SHA2-512-ACC
908,547 UART: [kat] ECC-384
918,130 UART: [kat] HMAC-384Kdf
922,818 UART: [kat] LMS
1,171,146 UART: [kat] --
1,172,081 UART: [cold-reset] ++
1,172,429 UART: [fht] FHT @ 0x50003400
1,175,180 UART: [idev] ++
1,175,348 UART: [idev] CDI.KEYID = 6
1,175,708 UART: [idev] SUBJECT.KEYID = 7
1,176,132 UART: [idev] UDS.KEYID = 0
1,176,477 ready_for_fw is high
1,176,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,356 UART: [idev] Erasing UDS.KEYID = 0
1,201,443 UART: [idev] Sha1 KeyId Algorithm
1,209,937 UART: [idev] --
1,210,835 UART: [ldev] ++
1,211,003 UART: [ldev] CDI.KEYID = 6
1,211,366 UART: [ldev] SUBJECT.KEYID = 5
1,211,792 UART: [ldev] AUTHORITY.KEYID = 7
1,212,255 UART: [ldev] FE.KEYID = 1
1,217,233 UART: [ldev] Erasing FE.KEYID = 1
1,243,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,431 UART: [ldev] --
1,282,920 UART: [fwproc] Wait for Commands...
1,283,626 UART: [fwproc] Recv command 0x46574c44
1,284,354 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,952 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,122 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,489 >>> mbox cmd response: success
2,830,735 UART: [afmc] ++
2,830,903 UART: [afmc] CDI.KEYID = 6
2,831,265 UART: [afmc] SUBJECT.KEYID = 7
2,831,690 UART: [afmc] AUTHORITY.KEYID = 5
2,867,779 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,144 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,853 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,736 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,437 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,345 UART: [afmc] --
2,911,349 UART: [cold-reset] --
2,912,353 UART: [state] Locking Datavault
2,913,566 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,170 UART: [state] Locking ICCM
2,914,662 UART: [exit] Launching FMC @ 0x40000130
2,919,992 UART:
2,920,008 UART: Running Caliptra FMC ...
2,920,416 UART:
2,920,470 UART: [state] CFI Enabled
2,931,056 UART: [fht] FMC Alias Private Key: 7
3,049,826 UART: [art] Extend RT PCRs Done
3,050,254 UART: [art] Lock RT PCRs Done
3,051,528 UART: [art] Populate DV Done
3,059,565 UART: [fht] FMC Alias Private Key: 7
3,060,549 UART: [art] Derive CDI
3,060,829 UART: [art] Store in slot 0x4
3,146,852 UART: [art] Derive Key Pair
3,147,212 UART: [art] Store priv key in slot 0x5
3,160,684 UART: [art] Derive Key Pair - Done
3,175,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,791 UART: [art] PUB.X = 070B69B6F6F6621A24BC20FD48D428FF3378369602942290E82CCDD795D1698DD4BDBE18B7F8ADCC828228C2128E7862
3,198,554 UART: [art] PUB.Y = 4D2BEBE77ACED81B842687DA1AF11B396817874B9531BF38B786570F62EEEB859467A1495F11C89F474428B605A85B23
3,205,498 UART: [art] SIG.R = DB0E37B6DDAD71BBA87908179DDEA785873E0B5F96B7ABE18DD4027409FDB5B6F267EB86CFF3E1F2BB210B054A2DF308
3,212,266 UART: [art] SIG.S = 89236CC1B3B50ADD4E5AAA2A633E949D02E9FA7A8B731394B7BA124AFA9C4A837BB453372DC38FDA30CD6EC7AF1DA8F0
3,236,360 UART: Caliptra RT
3,236,611 UART: [state] CFI Enabled
3,355,709 UART: [rt] RT listening for mailbox commands...
3,356,379 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,495 UART: [rt]cmd =0x41544d4e, len=14344
3,789,393 >>> mbox cmd response data (8 bytes)
3,789,394 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,453 UART: [rt]cmd =0x41545348, len=116
3,821,166 >>> mbox cmd response data (12 bytes)
3,821,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,822,146 UART:
3,822,162 UART: Running Caliptra ROM ...
3,822,570 UART:
3,822,625 UART: [state] CFI Enabled
3,825,133 UART: [state] LifecycleState = Unprovisioned
3,825,788 UART: [state] DebugLocked = No
3,826,470 UART: [state] WD Timer not started. Device not locked for debugging
3,827,656 UART: [kat] SHA2-256
4,633,306 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,637,431 UART: [kat] ++
4,637,583 UART: [kat] sha1
4,641,703 UART: [kat] SHA2-256
4,643,643 UART: [kat] SHA2-384
4,646,216 UART: [kat] SHA2-512-ACC
4,648,116 UART: [kat] ECC-384
4,658,033 UART: [kat] HMAC-384Kdf
4,662,805 UART: [kat] LMS
4,911,133 UART: [kat] --
4,911,817 UART: [update-reset] ++
6,270,626 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,271,651 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,426,866 >>> mbox cmd response: success
6,426,866 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,427,223 UART: [update-reset] Copying MAN_2 To MAN_1
6,435,237 UART: [update-reset Success] --
6,436,356 UART: [state] Locking Datavault
6,437,180 UART: [state] Locking PCR0, PCR1 and PCR31
6,437,784 UART: [state] Locking ICCM
6,438,260 UART: [exit] Launching FMC @ 0x40000130
6,443,590 UART:
6,443,606 UART: Running Caliptra FMC ...
6,444,014 UART:
6,444,068 UART: [state] CFI Enabled
6,532,919 UART: [art] Extend RT PCRs Done
6,533,347 UART: [art] Lock RT PCRs Done
6,534,578 UART: [art] Populate DV Done
6,542,739 UART: [fht] FMC Alias Private Key: 7
6,543,741 UART: [art] Derive CDI
6,544,021 UART: [art] Store in slot 0x4
6,629,916 UART: [art] Derive Key Pair
6,630,276 UART: [art] Store priv key in slot 0x5
6,643,186 UART: [art] Derive Key Pair - Done
6,657,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,673,505 UART: [art] Erasing AUTHORITY.KEYID = 7
6,674,270 UART: [art] PUB.X = 7B5E3466CDEC13F0128A3D006D0B14908EA0D8D087BD2628F1DC0B1CE52980BF4B6B74A82E467EC2ED903DDD4DAC45A3
6,681,030 UART: [art] PUB.Y = CA466ADDADAF79B2E3C5B1C7115FC1EB1C494006024B4ED0788862CA32B5414FF60AAA3EE3062F44C6315BB2137EFE66
6,687,984 UART: [art] SIG.R = 9B15EE9FB97116DD0566BDB0E5F478E86ADFA3772BC54472573DBEE80EC6A28178176B2AE74B38E671EBDBAF0C17484D
6,694,761 UART: [art] SIG.S = DC4A0B39CD7912BE3FBA9FDF25D4A415F9D4F66507DC0BFBD462795FA5DBAEC9893CE786D6565553B2190C6C8CBB4EE2
6,719,055 UART: Caliptra RT
6,719,306 UART: [state] CFI Enabled
7,088,709 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,119,666 UART: [rt]cmd =0x41545348, len=116
7,121,365 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,035 ready_for_fw is high
1,060,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,838 >>> mbox cmd response: success
2,739,245 UART:
2,739,261 UART: Running Caliptra FMC ...
2,739,669 UART:
2,739,723 UART: [state] CFI Enabled
2,750,151 UART: [fht] FMC Alias Private Key: 7
2,869,399 UART: [art] Extend RT PCRs Done
2,869,827 UART: [art] Lock RT PCRs Done
2,871,359 UART: [art] Populate DV Done
2,879,592 UART: [fht] FMC Alias Private Key: 7
2,880,720 UART: [art] Derive CDI
2,881,000 UART: [art] Store in slot 0x4
2,966,331 UART: [art] Derive Key Pair
2,966,691 UART: [art] Store priv key in slot 0x5
2,979,657 UART: [art] Derive Key Pair - Done
2,994,453 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,033 UART: [art] PUB.X = 65F45C169FBD253E23285181CEA26A9BE61BAB02F079F3DCF2F6FE7C6512AE59021EA32E7D6E0F396177EE22A2981DBA
3,017,808 UART: [art] PUB.Y = 9D29C646A8F8F966E2DF9DBEB183281F00F757E2A4D1BF6EA46E830DA8E2F8E8198C9EDFE9025DE2EC363E40C7E574D3
3,024,748 UART: [art] SIG.R = 5C1024C803AE7DADD6AD387B4F15152FDA1F7A817266514FFE60A25A44AA5256097982CC2A653BE66E36AC68159AB212
3,031,518 UART: [art] SIG.S = C2BBBAE2CC3D9CD8E39A7556F0CE9C4685778DD783403C5DF139EE138A2B28944D97B818A90F3BCDF90D5E00BC6D7893
3,055,332 UART: Caliptra RT
3,055,583 UART: [state] CFI Enabled
3,174,392 UART: [rt] RT listening for mailbox commands...
3,175,062 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,202 UART: [rt]cmd =0x41544d4e, len=14344
3,608,932 >>> mbox cmd response data (8 bytes)
3,608,933 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,120 UART: [rt]cmd =0x41545348, len=116
3,640,805 >>> mbox cmd response data (12 bytes)
3,640,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,130,029 >>> mbox cmd response: success
6,130,029 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,143,382 UART:
6,143,398 UART: Running Caliptra FMC ...
6,143,806 UART:
6,143,860 UART: [state] CFI Enabled
6,232,965 UART: [art] Extend RT PCRs Done
6,233,393 UART: [art] Lock RT PCRs Done
6,234,468 UART: [art] Populate DV Done
6,242,853 UART: [fht] FMC Alias Private Key: 7
6,243,959 UART: [art] Derive CDI
6,244,239 UART: [art] Store in slot 0x4
6,330,420 UART: [art] Derive Key Pair
6,330,780 UART: [art] Store priv key in slot 0x5
6,344,440 UART: [art] Derive Key Pair - Done
6,359,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,374,841 UART: [art] Erasing AUTHORITY.KEYID = 7
6,375,606 UART: [art] PUB.X = F9B8BB71D4A3D69CAFE61333D5767A4D9884D4C9DD91A3DD0809C811DE701239FC9BFA5CBEEB09D8B5CA293E8D353977
6,382,385 UART: [art] PUB.Y = B8317481928CFD440F29951CC40AD5B26358D20757463B6BBBD35A79644BB16DFBFBBF0835A55BCC4053402799D94784
6,389,323 UART: [art] SIG.R = EEF4778F8483D7D7B70A930FB956705D456716279A5620524ADCAA90066396BABCEFFE5A50BEDF0D61F7ED72D959FD24
6,396,093 UART: [art] SIG.S = A7803B67AE5751257C252FCE68DB624C5A93C4A7808CDBE98C0A4A71745245596153734BA2FB1016D25A6C2A884437C4
6,419,886 UART: Caliptra RT
6,420,137 UART: [state] CFI Enabled
6,782,826 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,813,683 UART: [rt]cmd =0x41545348, len=116
6,815,548 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,513 UART: [kat] SHA2-256
893,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,288 UART: [kat] ++
897,440 UART: [kat] sha1
901,664 UART: [kat] SHA2-256
903,604 UART: [kat] SHA2-384
906,491 UART: [kat] SHA2-512-ACC
908,392 UART: [kat] ECC-384
917,779 UART: [kat] HMAC-384Kdf
922,497 UART: [kat] LMS
1,170,825 UART: [kat] --
1,171,690 UART: [cold-reset] ++
1,172,134 UART: [fht] FHT @ 0x50003400
1,174,687 UART: [idev] ++
1,174,855 UART: [idev] CDI.KEYID = 6
1,175,215 UART: [idev] SUBJECT.KEYID = 7
1,175,639 UART: [idev] UDS.KEYID = 0
1,175,984 ready_for_fw is high
1,175,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,129 UART: [idev] Erasing UDS.KEYID = 0
1,200,380 UART: [idev] Sha1 KeyId Algorithm
1,208,748 UART: [idev] --
1,209,918 UART: [ldev] ++
1,210,086 UART: [ldev] CDI.KEYID = 6
1,210,449 UART: [ldev] SUBJECT.KEYID = 5
1,210,875 UART: [ldev] AUTHORITY.KEYID = 7
1,211,338 UART: [ldev] FE.KEYID = 1
1,216,620 UART: [ldev] Erasing FE.KEYID = 1
1,242,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,180 UART: [ldev] --
1,282,517 UART: [fwproc] Wait for Commands...
1,283,197 UART: [fwproc] Recv command 0x46574c44
1,283,925 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,137 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,307 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,498 >>> mbox cmd response: success
2,828,592 UART: [afmc] ++
2,828,760 UART: [afmc] CDI.KEYID = 6
2,829,122 UART: [afmc] SUBJECT.KEYID = 7
2,829,547 UART: [afmc] AUTHORITY.KEYID = 5
2,864,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,115 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,863 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,572 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,455 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,156 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,148 UART: [afmc] --
2,908,066 UART: [cold-reset] --
2,909,030 UART: [state] Locking Datavault
2,909,941 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,545 UART: [state] Locking ICCM
2,911,203 UART: [exit] Launching FMC @ 0x40000130
2,916,533 UART:
2,916,549 UART: Running Caliptra FMC ...
2,916,957 UART:
2,917,100 UART: [state] CFI Enabled
2,927,696 UART: [fht] FMC Alias Private Key: 7
3,046,684 UART: [art] Extend RT PCRs Done
3,047,112 UART: [art] Lock RT PCRs Done
3,048,614 UART: [art] Populate DV Done
3,056,799 UART: [fht] FMC Alias Private Key: 7
3,057,981 UART: [art] Derive CDI
3,058,261 UART: [art] Store in slot 0x4
3,143,860 UART: [art] Derive Key Pair
3,144,220 UART: [art] Store priv key in slot 0x5
3,157,958 UART: [art] Derive Key Pair - Done
3,172,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,898 UART: [art] PUB.X = 6A2314E0675C86D2C03D1F8580A517D9E55D74DBE74209B6565B654927CDE58C784E757166BA974A5463715ADDC0D275
3,195,661 UART: [art] PUB.Y = 1D6388AABA908DD39F88109CA9389AA8BCE8FAEC01EB1263E7F2A2614104D95C53FE08F8FA4C9EB5DBE184BBC85ECE7D
3,202,628 UART: [art] SIG.R = 1BE51078A1E407E37294A1BE6A38790E230FE17D512CD080985C552302F72453C75E48B153C20E4C20B61D79740B29DF
3,209,374 UART: [art] SIG.S = C1B36CEB7266D76E9E7CA73878FD7BCADF9699A7CD6842DD9761B718E452853375DD502A4DCB02177DEE51FAF7CBE142
3,233,491 UART: Caliptra RT
3,233,834 UART: [state] CFI Enabled
3,352,973 UART: [rt] RT listening for mailbox commands...
3,353,643 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,517 UART: [rt]cmd =0x41544d4e, len=14344
3,786,693 >>> mbox cmd response data (8 bytes)
3,786,694 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,927 UART: [rt]cmd =0x41545348, len=116
3,818,666 >>> mbox cmd response data (12 bytes)
3,818,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,658 UART:
3,819,674 UART: Running Caliptra ROM ...
3,820,082 UART:
3,820,224 UART: [state] CFI Enabled
3,822,750 UART: [state] LifecycleState = Unprovisioned
3,823,405 UART: [state] DebugLocked = No
3,824,079 UART: [state] WD Timer not started. Device not locked for debugging
3,825,213 UART: [kat] SHA2-256
4,630,863 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,634,988 UART: [kat] ++
4,635,140 UART: [kat] sha1
4,639,424 UART: [kat] SHA2-256
4,641,364 UART: [kat] SHA2-384
4,644,099 UART: [kat] SHA2-512-ACC
4,645,999 UART: [kat] ECC-384
4,655,770 UART: [kat] HMAC-384Kdf
4,660,392 UART: [kat] LMS
4,908,720 UART: [kat] --
4,909,598 UART: [update-reset] ++
6,268,622 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,269,603 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,424,818 >>> mbox cmd response: success
6,424,818 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,424,957 UART: [update-reset] Copying MAN_2 To MAN_1
6,432,971 UART: [update-reset Success] --
6,433,916 UART: [state] Locking Datavault
6,434,584 UART: [state] Locking PCR0, PCR1 and PCR31
6,435,188 UART: [state] Locking ICCM
6,435,608 UART: [exit] Launching FMC @ 0x40000130
6,440,938 UART:
6,440,954 UART: Running Caliptra FMC ...
6,441,362 UART:
6,441,505 UART: [state] CFI Enabled
6,530,478 UART: [art] Extend RT PCRs Done
6,530,906 UART: [art] Lock RT PCRs Done
6,532,267 UART: [art] Populate DV Done
6,540,458 UART: [fht] FMC Alias Private Key: 7
6,541,588 UART: [art] Derive CDI
6,541,868 UART: [art] Store in slot 0x4
6,627,829 UART: [art] Derive Key Pair
6,628,189 UART: [art] Store priv key in slot 0x5
6,641,051 UART: [art] Derive Key Pair - Done
6,655,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,671,234 UART: [art] Erasing AUTHORITY.KEYID = 7
6,671,999 UART: [art] PUB.X = E4146E5F9F26B3A47A3BFABBEE45BBE6D608DB2A4EC9F54CB82651125FA63CC228F165BBBE98675846C6E77843007C35
6,678,758 UART: [art] PUB.Y = 08B6DD273FC309FD4176B03FE1397036421F5623F2772DF53960304FA03303E52AFBB8BB21125666B7C31C846331008B
6,685,669 UART: [art] SIG.R = FF4113C051B33804E4ACEB86E4925D6EB82E99E014D217F410DE74015FDF3923551E9477EF110017E47356301F4D026E
6,692,404 UART: [art] SIG.S = 25C9B7EA7FB599C1AACACA71485AB0360F95788E5B59CD9DD313E57B1A777AAA58C2A2933F519347F6F608277EE55F7B
6,715,540 UART: Caliptra RT
6,715,883 UART: [state] CFI Enabled
7,084,551 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,115,442 UART: [rt]cmd =0x41545348, len=116
7,117,123 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,922 ready_for_fw is high
1,060,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,807 >>> mbox cmd response: success
2,743,902 UART:
2,743,918 UART: Running Caliptra FMC ...
2,744,326 UART:
2,744,469 UART: [state] CFI Enabled
2,755,311 UART: [fht] FMC Alias Private Key: 7
2,874,191 UART: [art] Extend RT PCRs Done
2,874,619 UART: [art] Lock RT PCRs Done
2,876,331 UART: [art] Populate DV Done
2,884,816 UART: [fht] FMC Alias Private Key: 7
2,885,942 UART: [art] Derive CDI
2,886,222 UART: [art] Store in slot 0x4
2,972,229 UART: [art] Derive Key Pair
2,972,589 UART: [art] Store priv key in slot 0x5
2,986,151 UART: [art] Derive Key Pair - Done
3,000,770 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,988 UART: [art] PUB.X = F66DC7D729115878BFD5080F20FA9EC143FCA610C077383AA1645B2FAF8C404E88BEE165CEABB1AB1282FF5BD0AB4851
3,023,770 UART: [art] PUB.Y = A942DD992A06E0F522A58E68222A0C7E2D2BE6DF0417C56E6DB2F20CC28470F727EEFA0BC167748FFB71DC03E3E64079
3,030,714 UART: [art] SIG.R = 0AA07FC9F1F2E9E90BB0D05448403457D36A05D387EE473C93ED7D166B8FA1E13B0BCA74E2BC8E38F34A480A86D2B67C
3,037,483 UART: [art] SIG.S = CB8992B0BC929EF5C81DB108869CBDEEDA4B9146CE4F5CECB3FE61E7DD90B6F1C943307DBB6A1CFE3716483AFA132D3B
3,061,130 UART: Caliptra RT
3,061,473 UART: [state] CFI Enabled
3,181,668 UART: [rt] RT listening for mailbox commands...
3,182,338 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,206 UART: [rt]cmd =0x41544d4e, len=14344
3,615,162 >>> mbox cmd response data (8 bytes)
3,615,163 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,645,496 UART: [rt]cmd =0x41545348, len=116
3,647,073 >>> mbox cmd response data (12 bytes)
3,647,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,136,290 >>> mbox cmd response: success
6,136,290 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,149,939 UART:
6,149,955 UART: Running Caliptra FMC ...
6,150,363 UART:
6,150,506 UART: [state] CFI Enabled
6,239,911 UART: [art] Extend RT PCRs Done
6,240,339 UART: [art] Lock RT PCRs Done
6,241,488 UART: [art] Populate DV Done
6,249,543 UART: [fht] FMC Alias Private Key: 7
6,250,683 UART: [art] Derive CDI
6,250,963 UART: [art] Store in slot 0x4
6,336,716 UART: [art] Derive Key Pair
6,337,076 UART: [art] Store priv key in slot 0x5
6,350,608 UART: [art] Derive Key Pair - Done
6,365,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,380,938 UART: [art] Erasing AUTHORITY.KEYID = 7
6,381,703 UART: [art] PUB.X = AA1080683ABCC13D880D5A72E00D7FB03464F04E0C331053B5240C181ADFF06F02FB20A33B3EB2A2754408424D68536B
6,388,457 UART: [art] PUB.Y = 64E24FCC211F98B4267AC2949F812106DB38B95050840D4B501E29D64023C53E7D15426EDAC9749FD570DC1030EBE8E7
6,395,401 UART: [art] SIG.R = 4A4006258AB5C0A3DF06897E9B978D09917B5584E0B8B787948C3E05D369C02C06102B94AF2A8C7B01931A4BCF76C2F5
6,402,153 UART: [art] SIG.S = 512DB488D96EEF4258D801F3B18C9E11866BD51B2525DEC05FEF3BBCA69737D8A5EC90936BCF51EE2B118E3C05898C9A
6,425,025 UART: Caliptra RT
6,425,368 UART: [state] CFI Enabled
6,787,873 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,818,904 UART: [rt]cmd =0x41545348, len=116
6,820,709 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,086 UART:
192,460 UART: Running Caliptra ROM ...
193,598 UART:
193,747 UART: [state] CFI Enabled
262,949 UART: [state] LifecycleState = Unprovisioned
264,933 UART: [state] DebugLocked = No
267,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,915 UART: [kat] SHA2-256
441,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,133 UART: [kat] ++
452,587 UART: [kat] sha1
464,063 UART: [kat] SHA2-256
466,770 UART: [kat] SHA2-384
471,914 UART: [kat] SHA2-512-ACC
474,285 UART: [kat] ECC-384
2,765,310 UART: [kat] HMAC-384Kdf
2,780,362 UART: [kat] LMS
3,970,688 UART: [kat] --
3,975,755 UART: [cold-reset] ++
3,978,252 UART: [fht] Storing FHT @ 0x50003400
3,988,676 UART: [idev] ++
3,989,283 UART: [idev] CDI.KEYID = 6
3,990,220 UART: [idev] SUBJECT.KEYID = 7
3,991,397 UART: [idev] UDS.KEYID = 0
3,992,513 ready_for_fw is high
3,992,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,693 UART: [idev] Erasing UDS.KEYID = 0
7,322,280 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,842 UART: [idev] --
7,346,275 UART: [ldev] ++
7,346,909 UART: [ldev] CDI.KEYID = 6
7,347,824 UART: [ldev] SUBJECT.KEYID = 5
7,349,042 UART: [ldev] AUTHORITY.KEYID = 7
7,350,279 UART: [ldev] FE.KEYID = 1
7,380,537 UART: [ldev] Erasing FE.KEYID = 1
10,717,904 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,345 UART: [ldev] --
13,093,911 UART: [fwproc] Waiting for Commands...
13,097,249 UART: [fwproc] Received command 0x46574c44
13,099,436 UART: [fwproc] Received Image of size 118548 bytes
17,212,313 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,287,885 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,361,060 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,689,968 >>> mbox cmd response: success
17,694,604 UART: [afmc] ++
17,695,227 UART: [afmc] CDI.KEYID = 6
17,696,138 UART: [afmc] SUBJECT.KEYID = 7
17,697,352 UART: [afmc] AUTHORITY.KEYID = 5
21,070,911 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,975 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,236 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,688 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,409 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,778 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,443 UART: [afmc] --
23,440,309 UART: [cold-reset] --
23,445,413 UART: [state] Locking Datavault
23,450,443 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,193 UART: [state] Locking ICCM
23,453,614 UART: [exit] Launching FMC @ 0x40000130
23,462,015 UART:
23,462,260 UART: Running Caliptra FMC ...
23,463,360 UART:
23,463,520 UART: [state] CFI Enabled
23,528,759 UART: [fht] FMC Alias Private Key: 7
25,868,615 UART: [art] Extend RT PCRs Done
25,869,833 UART: [art] Lock RT PCRs Done
25,871,458 UART: [art] Populate DV Done
25,876,894 UART: [fht] FMC Alias Private Key: 7
25,878,432 UART: [art] Derive CDI
25,879,243 UART: [art] Store in slot 0x4
25,937,421 UART: [art] Derive Key Pair
25,938,463 UART: [art] Store priv key in slot 0x5
29,231,043 UART: [art] Derive Key Pair - Done
29,244,047 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,946 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,452 UART: [art] PUB.X = 99583C81AA65BE9C9A2D299FF78007C706E834A9891C8920871E53857CF0B6F727005D573CE8DAB14B881F3E6237D43E
31,541,661 UART: [art] PUB.Y = A2C8A3FA46BEBB08FD4AF9C78732329C339063F8F0BE8B555453F9791FB2505AF1AB0BC0511092C9CFDE65C183869CD8
31,548,969 UART: [art] SIG.R = 1216FB229EE6AE4BEB0B7FA5A138CCCD6ABCA0B8819680735CFE7F95C3F5BB68D5CB6107BADB80E958FC0A94B8857487
31,556,383 UART: [art] SIG.S = 1F53665B7D2A87B067E8F904DBFCA8235101DA5A0F66E221CCE2F51DEFB7E34329C96E3BAB26DC9A5BE8063D3F290D2F
32,861,388 UART: Caliptra RT
32,862,089 UART: [state] CFI Enabled
33,038,236 UART: [rt] RT listening for mailbox commands...
33,040,524 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,071,382 UART: [rt]cmd =0x41545348, len=116
33,073,918 >>> mbox cmd response data (12 bytes)
35,145,370 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,251,192 UART:
35,251,537 UART: Running Caliptra ROM ...
35,252,667 UART:
35,252,844 UART: [state] CFI Enabled
35,307,214 UART: [state] LifecycleState = Unprovisioned
35,309,155 UART: [state] DebugLocked = No
35,311,083 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,315,563 UART: [kat] SHA2-256
35,485,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,495,745 UART: [kat] ++
35,496,292 UART: [kat] sha1
35,507,078 UART: [kat] SHA2-256
35,509,762 UART: [kat] SHA2-384
35,515,647 UART: [kat] SHA2-512-ACC
35,518,050 UART: [kat] ECC-384
37,811,339 UART: [kat] HMAC-384Kdf
37,844,305 UART: [kat] LMS
39,034,645 UART: [kat] --
39,037,666 UART: [update-reset] ++
42,793,965 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,796,836 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,069,561 >>> mbox cmd response: success
43,069,921 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,070,686 UART: [update-reset] Copying MAN_2 To MAN_1
43,093,123 UART: [update-reset Success] --
43,097,920 UART: [state] Locking Datavault
43,101,701 UART: [state] Locking PCR0, PCR1 and PCR31
43,103,411 UART: [state] Locking ICCM
43,104,594 UART: [exit] Launching FMC @ 0x40000130
43,113,047 UART:
43,113,291 UART: Running Caliptra FMC ...
43,114,392 UART:
43,114,545 UART: [state] CFI Enabled
43,210,236 UART: [art] Extend RT PCRs Done
43,211,413 UART: [art] Lock RT PCRs Done
43,212,678 UART: [art] Populate DV Done
43,218,253 UART: [fht] FMC Alias Private Key: 7
43,220,000 UART: [art] Derive CDI
43,220,809 UART: [art] Store in slot 0x4
43,279,180 UART: [art] Derive Key Pair
43,280,220 UART: [art] Store priv key in slot 0x5
46,573,400 UART: [art] Derive Key Pair - Done
46,586,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,874,547 UART: [art] Erasing AUTHORITY.KEYID = 7
48,876,048 UART: [art] PUB.X = 4CB72CE5399F58A2EC63F4AF4B6BCEBB7DA00D66AD8DF968D0F721F655E86E09205B1958FD657091B75F1370FA94ABAA
48,883,324 UART: [art] PUB.Y = 22FF177E68F016A8A3732C2129CC06C3A4CF777C69F5BFFC8DD8C0A0AFA4660391C9DDE056E6B435487041F2DCD26FE3
48,890,625 UART: [art] SIG.R = B26BF2E585F65768077521CAB9CF193926763A54ED91B50E5FAAC91D5C0F3AC9229FD3BB09B8768149A8A448EF217F9D
48,898,026 UART: [art] SIG.S = 70117CC1A467B5B0F915E29A4EE29D6A53E5968B6124862878F0BE235AC79472CFD9B3209C6820635DD21BC06BE01B52
50,202,451 UART: mbox::rt_entry...
50,203,436 UART: ____ _ _ _ ____ _____
50,205,347 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,207,354 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,209,411 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,211,343 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,213,194 UART: |_|
50,214,031 UART:
50,590,024 UART: [rt] Runtime listening for mailbox commands...
50,592,221 >>> mbox cmd response data (48 bytes)
50,592,808 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,595,128 >>> mbox cmd response data (48 bytes)
50,595,997 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,611,557 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,786,354 ready_for_fw is high
3,786,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,965,922 >>> mbox cmd response: success
23,646,487 UART:
23,646,949 UART: Running Caliptra FMC ...
23,648,060 UART:
23,648,232 UART: [state] CFI Enabled
23,717,301 UART: [fht] FMC Alias Private Key: 7
26,057,173 UART: [art] Extend RT PCRs Done
26,058,399 UART: [art] Lock RT PCRs Done
26,060,463 UART: [art] Populate DV Done
26,065,998 UART: [fht] FMC Alias Private Key: 7
26,067,743 UART: [art] Derive CDI
26,068,580 UART: [art] Store in slot 0x4
26,126,226 UART: [art] Derive Key Pair
26,127,226 UART: [art] Store priv key in slot 0x5
29,419,967 UART: [art] Derive Key Pair - Done
29,432,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,721,309 UART: [art] Erasing AUTHORITY.KEYID = 7
31,722,820 UART: [art] PUB.X = EEDD666037CFC1CD4590D83A1049D11BCB903B12E00BB25466FD43887FE3764A5ECEAC1E7BB597F55220E0D92294FAD3
31,730,089 UART: [art] PUB.Y = 7B38037A9BDDCE2BEE41514507737DA2C58395AC9A789EBBB57429B803E7358AFEA7E8C7AAEC414D37E271C983822524
31,737,346 UART: [art] SIG.R = 9A933E4DF52F61938353064D14D16CB2322EC9D345F7C5922279C19F8862CDA467341A77F7A2C543396122E8667850FD
31,744,705 UART: [art] SIG.S = 2338181CEAB03086783978ACB6B888CE8F07802613FECBC2BCF0E3BD23AB389260B1D1779B246D0DBC00789955233A5B
33,050,120 UART: Caliptra RT
33,050,825 UART: [state] CFI Enabled
33,247,672 UART: [rt] RT listening for mailbox commands...
33,249,945 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,280,529 UART: [rt]cmd =0x41545348, len=116
33,282,842 >>> mbox cmd response data (12 bytes)
35,353,671 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,405,150 >>> mbox cmd response: success
43,405,848 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,440,643 UART:
43,440,971 UART: Running Caliptra FMC ...
43,442,100 UART:
43,442,261 UART: [state] CFI Enabled
43,544,630 UART: [art] Extend RT PCRs Done
43,545,825 UART: [art] Lock RT PCRs Done
43,547,490 UART: [art] Populate DV Done
43,553,022 UART: [fht] FMC Alias Private Key: 7
43,554,589 UART: [art] Derive CDI
43,555,409 UART: [art] Store in slot 0x4
43,613,620 UART: [art] Derive Key Pair
43,614,662 UART: [art] Store priv key in slot 0x5
46,907,427 UART: [art] Derive Key Pair - Done
46,920,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,209,930 UART: [art] Erasing AUTHORITY.KEYID = 7
49,211,441 UART: [art] PUB.X = 3947335DFFF4B485FF11751138F9FFB6D14D37E747022E3AF35EB0FDFA712BF4307E8D26A6089592C3E74A5A01241D65
49,218,705 UART: [art] PUB.Y = 32BEE071D78502BB7F2F94F683CF39AE01ADF514C55C3EBB0E5AFC9A85DF8343CC4D14708869FE457013C28904A0B242
49,225,936 UART: [art] SIG.R = 832799E04C00EB1A77C2EDBF4EFD6CCB286B06965641666E45342865699862FCCB977754EB4A2663FFBCDAF6B42B5EB0
49,233,335 UART: [art] SIG.S = 109CED5C91330D16AE94F122CC8C764545C8436BE789CB463BA0082CD313A98B0C7539CE9A472273FCFB062559C75889
50,538,361 UART: mbox::rt_entry...
50,539,329 UART: ____ _ _ _ ____ _____
50,541,315 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,543,322 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,545,249 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,547,398 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,549,344 UART: |_|
50,550,337 UART:
50,919,209 UART: [rt] Runtime listening for mailbox commands...
50,921,413 >>> mbox cmd response data (48 bytes)
50,921,994 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,924,410 >>> mbox cmd response data (48 bytes)
50,925,263 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,940,832 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
192,391 UART:
192,746 UART: Running Caliptra ROM ...
193,943 UART:
603,391 UART: [state] CFI Enabled
617,782 UART: [state] LifecycleState = Unprovisioned
619,722 UART: [state] DebugLocked = No
621,314 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,881 UART: [kat] SHA2-256
796,757 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,199 UART: [kat] ++
807,728 UART: [kat] sha1
818,958 UART: [kat] SHA2-256
821,674 UART: [kat] SHA2-384
828,365 UART: [kat] SHA2-512-ACC
830,725 UART: [kat] ECC-384
3,116,073 UART: [kat] HMAC-384Kdf
3,128,256 UART: [kat] LMS
4,318,363 UART: [kat] --
4,322,096 UART: [cold-reset] ++
4,324,534 UART: [fht] Storing FHT @ 0x50003400
4,335,370 UART: [idev] ++
4,335,925 UART: [idev] CDI.KEYID = 6
4,336,948 UART: [idev] SUBJECT.KEYID = 7
4,338,114 UART: [idev] UDS.KEYID = 0
4,339,222 ready_for_fw is high
4,339,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,584 UART: [idev] Erasing UDS.KEYID = 0
7,624,699 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,895 UART: [idev] --
7,650,774 UART: [ldev] ++
7,651,342 UART: [ldev] CDI.KEYID = 6
7,652,307 UART: [ldev] SUBJECT.KEYID = 5
7,653,531 UART: [ldev] AUTHORITY.KEYID = 7
7,654,756 UART: [ldev] FE.KEYID = 1
7,664,695 UART: [ldev] Erasing FE.KEYID = 1
10,953,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,209 UART: [ldev] --
13,312,247 UART: [fwproc] Waiting for Commands...
13,315,259 UART: [fwproc] Received command 0x46574c44
13,317,491 UART: [fwproc] Received Image of size 118548 bytes
17,420,098 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,846 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,875 >>> mbox cmd response: success
17,898,421 UART: [afmc] ++
17,899,037 UART: [afmc] CDI.KEYID = 6
17,899,950 UART: [afmc] SUBJECT.KEYID = 7
17,901,218 UART: [afmc] AUTHORITY.KEYID = 5
21,213,464 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,582 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,511,834 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,294 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,540,992 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,413 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,849 UART: [afmc] --
23,581,354 UART: [cold-reset] --
23,585,207 UART: [state] Locking Datavault
23,591,794 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,555 UART: [state] Locking ICCM
23,594,731 UART: [exit] Launching FMC @ 0x40000130
23,603,107 UART:
23,603,370 UART: Running Caliptra FMC ...
23,604,474 UART:
23,604,631 UART: [state] CFI Enabled
23,612,132 UART: [fht] FMC Alias Private Key: 7
25,951,653 UART: [art] Extend RT PCRs Done
25,952,873 UART: [art] Lock RT PCRs Done
25,954,709 UART: [art] Populate DV Done
25,959,954 UART: [fht] FMC Alias Private Key: 7
25,961,490 UART: [art] Derive CDI
25,962,299 UART: [art] Store in slot 0x4
26,004,992 UART: [art] Derive Key Pair
26,006,030 UART: [art] Store priv key in slot 0x5
29,248,367 UART: [art] Derive Key Pair - Done
29,261,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,541,558 UART: [art] Erasing AUTHORITY.KEYID = 7
31,543,084 UART: [art] PUB.X = 16FDB019C99236141AF71E8B05E24B44FCA6E14F0B0EB453F9469E052511F8819ADE58916AF1AF95123282D91EC806DF
31,550,289 UART: [art] PUB.Y = BF97704A29B80EA1CDF7ADB50F4952120425D96ABBB32CB7D19185524EA7904F5AA7D15DCFA659B0A49D1BB0066FDF07
31,557,580 UART: [art] SIG.R = 20A965ABFD8B9F4C6CAC6F5175FC7BAABCCB218DB7D1D446BECDC23832B3E1D67075FFA397C320DED73C2D7B10389A4C
31,565,032 UART: [art] SIG.S = 658AAE8CCE879F6BAB65654B0F2F2CCF5F4C1DB35E4B54E3C9D49B673641F156BEFFB4D82BAEC0B5E7F5F4EE17BA2A0B
32,869,930 UART: Caliptra RT
32,870,627 UART: [state] CFI Enabled
33,004,534 UART: [rt] RT listening for mailbox commands...
33,006,861 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,037,565 UART: [rt]cmd =0x41545348, len=116
33,039,861 >>> mbox cmd response data (12 bytes)
35,109,043 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,214,626 UART:
35,215,012 UART: Running Caliptra ROM ...
35,216,147 UART:
35,216,314 UART: [state] CFI Enabled
35,229,655 UART: [state] LifecycleState = Unprovisioned
35,231,542 UART: [state] DebugLocked = No
35,234,212 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,239,636 UART: [kat] SHA2-256
35,409,362 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,419,912 UART: [kat] ++
35,420,449 UART: [kat] sha1
35,430,148 UART: [kat] SHA2-256
35,432,827 UART: [kat] SHA2-384
35,437,726 UART: [kat] SHA2-512-ACC
35,440,118 UART: [kat] ECC-384
37,723,580 UART: [kat] HMAC-384Kdf
37,736,140 UART: [kat] LMS
38,926,206 UART: [kat] --
38,929,762 UART: [update-reset] ++
42,685,099 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,689,688 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,962,417 >>> mbox cmd response: success
42,962,767 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,963,043 UART: [update-reset] Copying MAN_2 To MAN_1
42,985,471 UART: [update-reset Success] --
42,990,394 UART: [state] Locking Datavault
42,993,852 UART: [state] Locking PCR0, PCR1 and PCR31
42,995,545 UART: [state] Locking ICCM
42,997,314 UART: [exit] Launching FMC @ 0x40000130
43,005,757 UART:
43,005,990 UART: Running Caliptra FMC ...
43,007,090 UART:
43,007,250 UART: [state] CFI Enabled
43,051,400 UART: [art] Extend RT PCRs Done
43,052,615 UART: [art] Lock RT PCRs Done
43,054,159 UART: [art] Populate DV Done
43,059,670 UART: [fht] FMC Alias Private Key: 7
43,061,255 UART: [art] Derive CDI
43,062,051 UART: [art] Store in slot 0x4
43,104,699 UART: [art] Derive Key Pair
43,105,692 UART: [art] Store priv key in slot 0x5
46,347,724 UART: [art] Derive Key Pair - Done
46,360,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,640,515 UART: [art] Erasing AUTHORITY.KEYID = 7
48,642,110 UART: [art] PUB.X = 2909B8C95F014C424852A7FA8B8D28BDD4E44729E13747BD188E209C78C71B769B65684BB456EA59C3310A98E5BD0C8F
48,649,266 UART: [art] PUB.Y = 589CFA9C6A42E14E8F29B714485298C10FC408083D3316589CFCDB40CBDD174B6290C2B259A4FA1771C1A72A267D1C4B
48,656,548 UART: [art] SIG.R = 8ED0694C3C69B351162A60C76387DE48A71592B4197486164F70109AB7A01F185B59FB52BC30004394D15D1EF01E1BAA
48,663,883 UART: [art] SIG.S = 95CD13175BB39CC15230E2BFADD8E2D5B17336FB850243E0957916FC58C36CE670FF7154D651641786D553D5F076CBCD
49,968,926 UART: mbox::rt_entry...
49,969,920 UART: ____ _ _ _ ____ _____
49,971,916 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,973,919 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,975,845 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,977,769 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,979,697 UART: |_|
49,980,502 UART:
50,352,749 UART: [rt] Runtime listening for mailbox commands...
50,354,922 >>> mbox cmd response data (48 bytes)
50,355,546 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,357,883 >>> mbox cmd response data (48 bytes)
50,358,739 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,374,297 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
4,129,837 ready_for_fw is high
4,130,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,681 >>> mbox cmd response: success
23,804,727 UART:
23,805,144 UART: Running Caliptra FMC ...
23,806,458 UART:
23,806,625 UART: [state] CFI Enabled
23,814,243 UART: [fht] FMC Alias Private Key: 7
26,154,495 UART: [art] Extend RT PCRs Done
26,155,734 UART: [art] Lock RT PCRs Done
26,157,283 UART: [art] Populate DV Done
26,162,706 UART: [fht] FMC Alias Private Key: 7
26,164,253 UART: [art] Derive CDI
26,164,987 UART: [art] Store in slot 0x4
26,207,797 UART: [art] Derive Key Pair
26,208,833 UART: [art] Store priv key in slot 0x5
29,451,205 UART: [art] Derive Key Pair - Done
29,464,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,415 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,941 UART: [art] PUB.X = D4D1E15AE912988D8BD75E8D01506EB137F9B44D28DE8E8B9506C2041097AC6BFCD4D44B3C5DF7FD858C508E4D95583A
31,753,195 UART: [art] PUB.Y = 9969E9AFD4E523E61938AAFBB2A72BC05251CE3006C874586D9547CEC30076CEF45B8BB7AFCAB5AFAFAFF406B828576E
31,760,487 UART: [art] SIG.R = 4FC676A679489CC8096F254D21382E198701743A5022218860D4CB3A8C36602E0B1FD8EC4B700F0EED37E4C74802DEA0
31,767,833 UART: [art] SIG.S = 84328F3D55258D03466A39677C491BD4CF21B78E1D1F1B26784719917B20B5959602270A96D450F1420FC8F1F875BC9C
33,073,370 UART: Caliptra RT
33,074,084 UART: [state] CFI Enabled
33,207,138 UART: [rt] RT listening for mailbox commands...
33,209,403 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,240,092 UART: [rt]cmd =0x41545348, len=116
33,242,165 >>> mbox cmd response data (12 bytes)
35,318,448 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,303,286 >>> mbox cmd response: success
43,303,845 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,337,257 UART:
43,337,560 UART: Running Caliptra FMC ...
43,338,683 UART:
43,338,842 UART: [state] CFI Enabled
43,382,529 UART: [art] Extend RT PCRs Done
43,383,676 UART: [art] Lock RT PCRs Done
43,385,271 UART: [art] Populate DV Done
43,390,692 UART: [fht] FMC Alias Private Key: 7
43,392,390 UART: [art] Derive CDI
43,393,200 UART: [art] Store in slot 0x4
43,435,731 UART: [art] Derive Key Pair
43,436,727 UART: [art] Store priv key in slot 0x5
46,678,856 UART: [art] Derive Key Pair - Done
46,692,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,972,493 UART: [art] Erasing AUTHORITY.KEYID = 7
48,974,076 UART: [art] PUB.X = 82F24E034071EF108417E46F1BA190C56EA01BEC5EA39C7E6A950A064487931598FF6909AE20DFA782D96D7EDC8E1FDF
48,981,287 UART: [art] PUB.Y = 6A3E1D24DF01EE5485A65907E126783E20A45DDACCE9F32E56051A8E3ABF751B01A4BAC48BA11BBB5D3621BBE2A2C84F
48,988,560 UART: [art] SIG.R = 9B0A4039075BD01EE728D315CB18E66963B92E1248DC2D0F62416EE910A11D92B820B4BD7BF1D1C0AF1D7971BDBF1274
48,995,956 UART: [art] SIG.S = D254C60840734532EED1CFEC7EB8FC64E86E2A96FCF88E404EA8F30020C898B2D36D3082199DBF76FFFAA4D5F15A4065
50,301,390 UART: mbox::rt_entry...
50,302,391 UART: ____ _ _ _ ____ _____
50,304,378 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,306,377 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,308,302 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,310,224 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,312,143 UART: |_|
50,312,943 UART:
50,687,160 UART: [rt] Runtime listening for mailbox commands...
50,689,353 >>> mbox cmd response data (48 bytes)
50,689,957 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,692,376 >>> mbox cmd response data (48 bytes)
50,693,229 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,708,797 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,045 UART:
192,408 UART: Running Caliptra ROM ...
193,592 UART:
193,746 UART: [state] CFI Enabled
267,465 UART: [state] LifecycleState = Unprovisioned
269,381 UART: [state] DebugLocked = No
271,407 UART: [state] WD Timer not started. Device not locked for debugging
275,166 UART: [kat] SHA2-256
454,796 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,613 UART: [kat] ++
466,063 UART: [kat] sha1
476,796 UART: [kat] SHA2-256
479,522 UART: [kat] SHA2-384
484,814 UART: [kat] SHA2-512-ACC
487,179 UART: [kat] ECC-384
2,947,885 UART: [kat] HMAC-384Kdf
2,972,614 UART: [kat] LMS
3,449,103 UART: [kat] --
3,453,831 UART: [cold-reset] ++
3,455,907 UART: [fht] FHT @ 0x50003400
3,466,734 UART: [idev] ++
3,467,290 UART: [idev] CDI.KEYID = 6
3,468,240 UART: [idev] SUBJECT.KEYID = 7
3,469,476 UART: [idev] UDS.KEYID = 0
3,470,482 ready_for_fw is high
3,470,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,773 UART: [idev] Erasing UDS.KEYID = 0
5,986,916 UART: [idev] Sha1 KeyId Algorithm
6,010,860 UART: [idev] --
6,015,584 UART: [ldev] ++
6,016,154 UART: [ldev] CDI.KEYID = 6
6,017,037 UART: [ldev] SUBJECT.KEYID = 5
6,018,252 UART: [ldev] AUTHORITY.KEYID = 7
6,019,464 UART: [ldev] FE.KEYID = 1
6,058,944 UART: [ldev] Erasing FE.KEYID = 1
8,565,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,034 UART: [ldev] --
10,373,650 UART: [fwproc] Wait for Commands...
10,375,418 UART: [fwproc] Recv command 0x46574c44
10,377,451 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,397 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,390 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,423 >>> mbox cmd response: success
14,348,496 UART: [afmc] ++
14,349,106 UART: [afmc] CDI.KEYID = 6
14,349,991 UART: [afmc] SUBJECT.KEYID = 7
14,351,258 UART: [afmc] AUTHORITY.KEYID = 5
16,897,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,403 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,575 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,408 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,439 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,989 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,906 UART: [afmc] --
18,717,073 UART: [cold-reset] --
18,720,614 UART: [state] Locking Datavault
18,724,912 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,665 UART: [state] Locking ICCM
18,728,112 UART: [exit] Launching FMC @ 0x40000130
18,736,557 UART:
18,736,790 UART: Running Caliptra FMC ...
18,737,884 UART:
18,738,036 UART: [state] CFI Enabled
18,796,560 UART: [fht] FMC Alias Private Key: 7
20,563,041 UART: [art] Extend RT PCRs Done
20,564,254 UART: [art] Lock RT PCRs Done
20,565,824 UART: [art] Populate DV Done
20,571,072 UART: [fht] FMC Alias Private Key: 7
20,572,826 UART: [art] Derive CDI
20,573,642 UART: [art] Store in slot 0x4
20,629,549 UART: [art] Derive Key Pair
20,630,583 UART: [art] Store priv key in slot 0x5
23,093,315 UART: [art] Derive Key Pair - Done
23,106,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,143 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,640 UART: [art] PUB.X = 1223B8AB72E93618D5D1908446D75A67E94DD7DD53FD8700BD3B0F2253D15F45087C7AF41CAB5CE0E5D7A15A05738D98
24,828,944 UART: [art] PUB.Y = F94EEE92B416BBC7BA7C9CD29F1A86A3343D78085EF8832E64483C937B26BF3093C73D947DB0437F3F4FDBCF85D896DD
24,836,181 UART: [art] SIG.R = 9ED1554DF54398A9ABFFD4536820D8677657F977ADA48CF4A134436130E365AD58A5BD9FAA359F248B30A3203B8C7F3F
24,843,567 UART: [art] SIG.S = B502FD1FF5E887CAFE82385FA9B83781E7ABF01BC082EE6251D56E0610ECC7A0E8B5FA4A78FEA6464F793BEE396973B4
25,821,771 UART: Caliptra RT
25,822,465 UART: [state] CFI Enabled
26,003,579 UART: [rt] RT listening for mailbox commands...
26,005,869 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,036,600 UART: [rt]cmd =0x41545348, len=116
26,039,128 >>> mbox cmd response data (12 bytes)
28,096,176 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,202,215 UART:
28,202,571 UART: Running Caliptra ROM ...
28,203,706 UART:
28,203,873 UART: [state] CFI Enabled
28,274,425 UART: [state] LifecycleState = Unprovisioned
28,276,395 UART: [state] DebugLocked = No
28,279,133 UART: [state] WD Timer not started. Device not locked for debugging
28,282,492 UART: [kat] SHA2-256
28,462,146 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,472,946 UART: [kat] ++
28,473,487 UART: [kat] sha1
28,483,026 UART: [kat] SHA2-256
28,485,718 UART: [kat] SHA2-384
28,490,942 UART: [kat] SHA2-512-ACC
28,493,307 UART: [kat] ECC-384
30,960,675 UART: [kat] HMAC-384Kdf
30,980,459 UART: [kat] LMS
31,456,882 UART: [kat] --
31,462,563 UART: [update-reset] ++
34,524,099 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,528,174 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,800,791 >>> mbox cmd response: success
34,801,150 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,801,966 UART: [update-reset] Copying MAN_2 To MAN_1
34,839,090 UART: [update-reset Success] --
34,842,678 UART: [state] Locking Datavault
34,847,221 UART: [state] Locking PCR0, PCR1 and PCR31
34,848,976 UART: [state] Locking ICCM
34,851,362 UART: [exit] Launching FMC @ 0x40000130
34,859,752 UART:
34,860,003 UART: Running Caliptra FMC ...
34,861,035 UART:
34,861,181 UART: [state] CFI Enabled
34,960,421 UART: [art] Extend RT PCRs Done
34,961,620 UART: [art] Lock RT PCRs Done
34,962,946 UART: [art] Populate DV Done
34,968,466 UART: [fht] FMC Alias Private Key: 7
34,970,050 UART: [art] Derive CDI
34,970,800 UART: [art] Store in slot 0x4
35,029,807 UART: [art] Derive Key Pair
35,030,841 UART: [art] Store priv key in slot 0x5
37,493,349 UART: [art] Derive Key Pair - Done
37,506,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,220,050 UART: [art] Erasing AUTHORITY.KEYID = 7
39,221,552 UART: [art] PUB.X = 124BE381CD57B5EDA5E7BF1B41B75B39A4DBABF30B5A8E0183EEA366CCE52739AA24A09FD8EC6F946DA8BCDCF0BB6020
39,228,850 UART: [art] PUB.Y = F91DDD59B672588DFBC1E05EF5EFF6157397084BBD1E741C1A25875F248179F660631129E7ADE6E6B380C5D750B79A91
39,236,171 UART: [art] SIG.R = A31939CFCDA8DDE3ADA24883754AEF3C0BE95AE233460B37095890C1BA924D5651819AD5AB18B830FC32D325784008B5
39,243,509 UART: [art] SIG.S = 11F7F774746D29530C9AC28D24CD03077297C81475D9911F9109E0A180E56A8C7661AE07FE6A40F08B67E6D839C36E4B
40,221,859 UART: mbox::rt_entry...
40,222,810 UART: ____ _ _ _ ____ _____
40,224,976 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,226,988 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,228,844 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,230,766 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,232,689 UART: |_|
40,233,495 UART:
40,602,821 UART: [rt] Runtime listening for mailbox commands...
40,604,987 >>> mbox cmd response data (48 bytes)
40,605,563 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,607,924 >>> mbox cmd response data (48 bytes)
40,608,778 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,624,362 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,461,135 ready_for_fw is high
3,461,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,191,826 >>> mbox cmd response: success
18,471,217 UART:
18,471,634 UART: Running Caliptra FMC ...
18,472,770 UART:
18,472,926 UART: [state] CFI Enabled
18,541,354 UART: [fht] FMC Alias Private Key: 7
20,307,394 UART: [art] Extend RT PCRs Done
20,308,611 UART: [art] Lock RT PCRs Done
20,310,179 UART: [art] Populate DV Done
20,315,755 UART: [fht] FMC Alias Private Key: 7
20,317,251 UART: [art] Derive CDI
20,318,013 UART: [art] Store in slot 0x4
20,375,011 UART: [art] Derive Key Pair
20,376,053 UART: [art] Store priv key in slot 0x5
22,838,760 UART: [art] Derive Key Pair - Done
22,851,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,565,030 UART: [art] Erasing AUTHORITY.KEYID = 7
24,566,536 UART: [art] PUB.X = E429FB54C07841EFE1B6A3CE431DD0D627D1C98E3230D06B5E375EAEEE97FF92A7B561BABCE737889DB354B43A79517C
24,573,816 UART: [art] PUB.Y = 01B73C2CDCAA0B4FE85A64877B8B5BB6334ECC0B758F967E8A2EAFBBB05387BCF8CEDA7A60370D2360F7FD75A80BCDD9
24,581,073 UART: [art] SIG.R = 50E753C8FE1581D979F97CDC791AD73E30F8CA917DB13D520A301847858B1EC8325B6969031343843DB9FCF2FA8E3B57
24,588,520 UART: [art] SIG.S = 9B93B841E33C8DB440A702C22C4F4F11DBCCD8785C9CF0C9CA6233441D64DF3332725E1F12E99DF245D392CBE4085EE2
25,567,048 UART: Caliptra RT
25,567,751 UART: [state] CFI Enabled
25,749,385 UART: [rt] RT listening for mailbox commands...
25,751,664 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,782,629 UART: [rt]cmd =0x41545348, len=116
25,784,759 >>> mbox cmd response data (12 bytes)
27,839,435 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,535,844 >>> mbox cmd response: success
34,536,284 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,567,601 UART:
34,567,878 UART: Running Caliptra FMC ...
34,568,989 UART:
34,569,146 UART: [state] CFI Enabled
34,662,616 UART: [art] Extend RT PCRs Done
34,663,807 UART: [art] Lock RT PCRs Done
34,664,986 UART: [art] Populate DV Done
34,670,397 UART: [fht] FMC Alias Private Key: 7
34,672,036 UART: [art] Derive CDI
34,672,850 UART: [art] Store in slot 0x4
34,732,291 UART: [art] Derive Key Pair
34,733,279 UART: [art] Store priv key in slot 0x5
37,196,466 UART: [art] Derive Key Pair - Done
37,209,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,922,083 UART: [art] Erasing AUTHORITY.KEYID = 7
38,923,592 UART: [art] PUB.X = C7F37D4CCD7A7013FEC84C3D8B347956483B04C10565E252CCFBB08B0182040B285FECC38CB6AB3254A761E4CA2C8C65
38,930,915 UART: [art] PUB.Y = 77CFE6A43F39470E900B2883260CF26B79DFF27E8880D8527585D094E0B833887CAC507F59EBDD223B8D67E9C7FD2A38
38,938,105 UART: [art] SIG.R = D3C0AE941514D0F672C1C2FEBC793918E77464FF2FB58C6AAAE282A735F7FACBFD275DB1BBEBCE2BA4E9F0703A81452E
38,945,549 UART: [art] SIG.S = 193E23A1C9A1E0EDC971D537985221DCA8DF08CB702BFC468FBD0143D269943D46B6B28CB1E20E19B28D0FC58B4F31E9
39,924,583 UART: mbox::rt_entry...
39,925,537 UART: ____ _ _ _ ____ _____
39,927,517 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,929,518 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,931,439 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,933,358 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,935,280 UART: |_|
39,936,084 UART:
40,308,601 UART: [rt] Runtime listening for mailbox commands...
40,310,779 >>> mbox cmd response data (48 bytes)
40,311,347 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,313,658 >>> mbox cmd response data (48 bytes)
40,314,499 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,330,085 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,478 UART:
192,840 UART: Running Caliptra ROM ...
193,975 UART:
603,625 UART: [state] CFI Enabled
619,643 UART: [state] LifecycleState = Unprovisioned
621,611 UART: [state] DebugLocked = No
623,135 UART: [state] WD Timer not started. Device not locked for debugging
626,810 UART: [kat] SHA2-256
806,482 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,247 UART: [kat] ++
817,699 UART: [kat] sha1
828,789 UART: [kat] SHA2-256
831,531 UART: [kat] SHA2-384
837,668 UART: [kat] SHA2-512-ACC
840,041 UART: [kat] ECC-384
3,280,714 UART: [kat] HMAC-384Kdf
3,293,881 UART: [kat] LMS
3,770,392 UART: [kat] --
3,773,465 UART: [cold-reset] ++
3,774,611 UART: [fht] FHT @ 0x50003400
3,786,519 UART: [idev] ++
3,787,112 UART: [idev] CDI.KEYID = 6
3,788,030 UART: [idev] SUBJECT.KEYID = 7
3,789,287 UART: [idev] UDS.KEYID = 0
3,790,217 ready_for_fw is high
3,790,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,343 UART: [idev] Erasing UDS.KEYID = 0
6,266,139 UART: [idev] Sha1 KeyId Algorithm
6,289,588 UART: [idev] --
6,294,614 UART: [ldev] ++
6,295,189 UART: [ldev] CDI.KEYID = 6
6,296,096 UART: [ldev] SUBJECT.KEYID = 5
6,297,314 UART: [ldev] AUTHORITY.KEYID = 7
6,298,554 UART: [ldev] FE.KEYID = 1
6,308,499 UART: [ldev] Erasing FE.KEYID = 1
8,788,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,514 UART: [ldev] --
10,582,440 UART: [fwproc] Wait for Commands...
10,584,329 UART: [fwproc] Recv command 0x46574c44
10,586,312 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,154 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,165 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,230 >>> mbox cmd response: success
14,557,747 UART: [afmc] ++
14,558,365 UART: [afmc] CDI.KEYID = 6
14,559,282 UART: [afmc] SUBJECT.KEYID = 7
14,560,451 UART: [afmc] AUTHORITY.KEYID = 5
17,063,349 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,105 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,957 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,987 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,833,575 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,403 UART: [afmc] --
18,860,508 UART: [cold-reset] --
18,866,583 UART: [state] Locking Datavault
18,871,999 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,757 UART: [state] Locking ICCM
18,876,071 UART: [exit] Launching FMC @ 0x40000130
18,884,461 UART:
18,884,710 UART: Running Caliptra FMC ...
18,885,817 UART:
18,885,985 UART: [state] CFI Enabled
18,894,252 UART: [fht] FMC Alias Private Key: 7
20,660,359 UART: [art] Extend RT PCRs Done
20,661,579 UART: [art] Lock RT PCRs Done
20,663,069 UART: [art] Populate DV Done
20,668,545 UART: [fht] FMC Alias Private Key: 7
20,670,256 UART: [art] Derive CDI
20,671,072 UART: [art] Store in slot 0x4
20,713,618 UART: [art] Derive Key Pair
20,714,618 UART: [art] Store priv key in slot 0x5
23,141,249 UART: [art] Derive Key Pair - Done
23,153,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,860,117 UART: [art] Erasing AUTHORITY.KEYID = 7
24,861,619 UART: [art] PUB.X = 224FD16FB02F3FCAF0105DDC2550A46A6DC2CD34F89AEE98F67A3BF8AA46341F85AA9ADDE2AF1703C6CFB22BD05E55BA
24,868,911 UART: [art] PUB.Y = A532CCBC4E827CCAFC759DFCF9F43303EDAD251B8A92762D4F8FE0AF4E0EDFB4D6DA350778F353AB32F440927EB4168E
24,876,191 UART: [art] SIG.R = 18737395E57CA6091CC1B26419DD1ECA16F7A3C4D8BB4429BA0A9DC54E2F310D7B615A190FD5C9CA0F6DFC358861C1AF
24,883,681 UART: [art] SIG.S = F87CBE1586AD079E1EE78DEF478BDC88186D8F5F0C65706EA46C6DA7B9390DF11B3EEA01EB30B80CBEB18E3C5455902D
25,862,452 UART: Caliptra RT
25,863,182 UART: [state] CFI Enabled
25,996,126 UART: [rt] RT listening for mailbox commands...
25,998,618 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,029,567 UART: [rt]cmd =0x41545348, len=116
26,031,888 >>> mbox cmd response data (12 bytes)
28,087,918 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,193,660 UART:
28,194,036 UART: Running Caliptra ROM ...
28,195,175 UART:
28,195,357 UART: [state] CFI Enabled
28,208,672 UART: [state] LifecycleState = Unprovisioned
28,210,614 UART: [state] DebugLocked = No
28,213,257 UART: [state] WD Timer not started. Device not locked for debugging
28,217,971 UART: [kat] SHA2-256
28,397,645 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,408,448 UART: [kat] ++
28,408,993 UART: [kat] sha1
28,420,428 UART: [kat] SHA2-256
28,423,114 UART: [kat] SHA2-384
28,428,939 UART: [kat] SHA2-512-ACC
28,431,297 UART: [kat] ECC-384
30,873,073 UART: [kat] HMAC-384Kdf
30,886,295 UART: [kat] LMS
31,362,747 UART: [kat] --
31,367,545 UART: [update-reset] ++
34,426,769 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,430,899 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,703,523 >>> mbox cmd response: success
34,703,908 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,705,221 UART: [update-reset] Copying MAN_2 To MAN_1
34,742,352 UART: [update-reset Success] --
34,745,242 UART: [state] Locking Datavault
34,747,701 UART: [state] Locking PCR0, PCR1 and PCR31
34,749,467 UART: [state] Locking ICCM
34,750,819 UART: [exit] Launching FMC @ 0x40000130
34,759,216 UART:
34,759,451 UART: Running Caliptra FMC ...
34,760,556 UART:
34,760,716 UART: [state] CFI Enabled
34,805,064 UART: [art] Extend RT PCRs Done
34,806,269 UART: [art] Lock RT PCRs Done
34,807,836 UART: [art] Populate DV Done
34,813,189 UART: [fht] FMC Alias Private Key: 7
34,814,669 UART: [art] Derive CDI
34,815,504 UART: [art] Store in slot 0x4
34,858,421 UART: [art] Derive Key Pair
34,859,420 UART: [art] Store priv key in slot 0x5
37,286,576 UART: [art] Derive Key Pair - Done
37,299,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,005,724 UART: [art] Erasing AUTHORITY.KEYID = 7
39,007,226 UART: [art] PUB.X = 05E1737D89A88481F47DC9DA492E98F946DE137DA983A560B201AA86BBDC43ABE7894CAA87897993D2434C1091010768
39,014,474 UART: [art] PUB.Y = 1157CF33ED7D60AB3ED9F519E13CE407272CD26A995709A3AB727721ED20F78EBAE7C653DF7CA0E5E0A0E846E2B02769
39,021,759 UART: [art] SIG.R = C8DD51DCB20F5F96BDCA26488B8B1A095CE450C4A12997A4E15C19BBDDAED29A7A02D5859A893BCE31C600ADD083BB8A
39,029,142 UART: [art] SIG.S = B79ADBC7FFFB35793DE52A73858F83580FD3C906FDA53EFD27B9A53705680008975B2BC1C5D672E07EBD00F966E8D734
40,007,545 UART: mbox::rt_entry...
40,008,509 UART: ____ _ _ _ ____ _____
40,010,498 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,012,506 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,014,439 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,016,371 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,018,323 UART: |_|
40,019,168 UART:
40,391,674 UART: [rt] Runtime listening for mailbox commands...
40,393,850 >>> mbox cmd response data (48 bytes)
40,394,484 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,396,937 >>> mbox cmd response data (48 bytes)
40,397,837 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,413,408 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,779,108 ready_for_fw is high
3,779,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,439,939 >>> mbox cmd response: success
18,694,526 UART:
18,694,947 UART: Running Caliptra FMC ...
18,696,061 UART:
18,696,219 UART: [state] CFI Enabled
18,704,175 UART: [fht] FMC Alias Private Key: 7
20,470,331 UART: [art] Extend RT PCRs Done
20,471,554 UART: [art] Lock RT PCRs Done
20,473,600 UART: [art] Populate DV Done
20,479,132 UART: [fht] FMC Alias Private Key: 7
20,480,725 UART: [art] Derive CDI
20,481,466 UART: [art] Store in slot 0x4
20,524,064 UART: [art] Derive Key Pair
20,525,111 UART: [art] Store priv key in slot 0x5
22,951,788 UART: [art] Derive Key Pair - Done
22,965,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,339 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,861 UART: [art] PUB.X = E30A0748D44422B53A105C252309E91D1201467755AEDB596FC2DA0E3CB78D3FC1AAF3E874A3F7621B16B1365278B9EC
24,680,073 UART: [art] PUB.Y = 2AC85B3015A823FE690310EA94B1D8F6FB0253A86789D307F3FAF214C38E02366C249FB2C5A87C755547187811F603AD
24,687,292 UART: [art] SIG.R = ED53F02B1CA1A607D466F01A6D054C01DE5057F07FEB271E3CE131D920BA0FD9A47978FB463941012D9F202169AB2F51
24,694,709 UART: [art] SIG.S = EED514AD60D893927A06B09DB6502C31E21219C103FAAC00EF0A84F3D1E20473E31FEF5C6F2E8F828B4C5216F9AEAFC8
25,673,524 UART: Caliptra RT
25,674,231 UART: [state] CFI Enabled
25,806,678 UART: [rt] RT listening for mailbox commands...
25,809,077 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,839,904 UART: [rt]cmd =0x41545348, len=116
25,842,169 >>> mbox cmd response data (12 bytes)
27,897,058 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,500,198 >>> mbox cmd response: success
34,500,747 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,533,610 UART:
34,533,899 UART: Running Caliptra FMC ...
34,534,978 UART:
34,535,133 UART: [state] CFI Enabled
34,579,404 UART: [art] Extend RT PCRs Done
34,580,593 UART: [art] Lock RT PCRs Done
34,581,838 UART: [art] Populate DV Done
34,587,633 UART: [fht] FMC Alias Private Key: 7
34,589,228 UART: [art] Derive CDI
34,590,047 UART: [art] Store in slot 0x4
34,632,700 UART: [art] Derive Key Pair
34,633,702 UART: [art] Store priv key in slot 0x5
37,060,433 UART: [art] Derive Key Pair - Done
37,073,803 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,779,813 UART: [art] Erasing AUTHORITY.KEYID = 7
38,781,335 UART: [art] PUB.X = 56E648473FEDBB10065B1A306F3A21176423906862884B2E28EA5287888CD82BBA6A29EAE1DC949053246AA6B4B4995B
38,788,605 UART: [art] PUB.Y = D234C75316672E4BE1D865949AA06FDEBD676D87A6B72AF323B30099285C243C4956BF81CB4EEA68A57016269DF35FBF
38,795,798 UART: [art] SIG.R = 70F27FB3D54C38CA277BE506C175E10751BF9172AF2BF93E37585B377EF65FDF13A5EF4786068728069D015D291A750B
38,803,197 UART: [art] SIG.S = 5B9913E94E12070018126179BD38A0E359F652E151D0890EB1A476ABE8C4D7E83FE6D708F1E39943DC934EBD3BFE84BB
39,781,723 UART: mbox::rt_entry...
39,782,672 UART: ____ _ _ _ ____ _____
39,784,656 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,786,661 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,788,593 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,790,522 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,792,454 UART: |_|
39,793,294 UART:
40,169,430 UART: [rt] Runtime listening for mailbox commands...
40,171,642 >>> mbox cmd response data (48 bytes)
40,172,203 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,174,784 >>> mbox cmd response data (48 bytes)
40,175,666 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,191,430 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,213 UART:
192,590 UART: Running Caliptra ROM ...
193,687 UART:
193,838 UART: [state] CFI Enabled
255,315 UART: [state] LifecycleState = Unprovisioned
257,677 UART: [state] DebugLocked = No
259,839 UART: [state] WD Timer not started. Device not locked for debugging
264,993 UART: [kat] SHA2-256
454,899 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
465,710 UART: [kat] ++
466,208 UART: [kat] sha1
476,940 UART: [kat] SHA2-256
479,951 UART: [kat] SHA2-384
486,577 UART: [kat] SHA2-512-ACC
489,157 UART: [kat] ECC-384
2,941,827 UART: [kat] HMAC-384Kdf
2,965,751 UART: [kat] LMS
3,497,517 UART: [kat] --
3,502,814 UART: [cold-reset] ++
3,505,247 UART: [fht] FHT @ 0x50003400
3,517,216 UART: [idev] ++
3,517,918 UART: [idev] CDI.KEYID = 6
3,518,907 UART: [idev] SUBJECT.KEYID = 7
3,520,077 UART: [idev] UDS.KEYID = 0
3,520,983 ready_for_fw is high
3,521,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,670,316 UART: [idev] Erasing UDS.KEYID = 0
6,045,421 UART: [idev] Sha1 KeyId Algorithm
6,066,936 UART: [idev] --
6,071,259 UART: [ldev] ++
6,071,936 UART: [ldev] CDI.KEYID = 6
6,072,924 UART: [ldev] SUBJECT.KEYID = 5
6,074,031 UART: [ldev] AUTHORITY.KEYID = 7
6,075,262 UART: [ldev] FE.KEYID = 1
6,114,381 UART: [ldev] Erasing FE.KEYID = 1
8,622,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,357,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,372,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,388,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,403,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,725 UART: [ldev] --
10,428,487 UART: [fwproc] Wait for Commands...
10,430,589 UART: [fwproc] Recv command 0x46574c44
10,432,893 UART: [fwproc] Recv'd Img size: 118548 bytes
13,935,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,013,332 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,136,965 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,698,135 >>> mbox cmd response: success
14,702,335 UART: [afmc] ++
14,703,053 UART: [afmc] CDI.KEYID = 6
14,704,244 UART: [afmc] SUBJECT.KEYID = 7
14,705,678 UART: [afmc] AUTHORITY.KEYID = 5
17,246,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,972,647 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,974,578 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,989,726 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,004,834 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,019,712 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,043,094 UART: [afmc] --
19,046,641 UART: [cold-reset] --
19,050,668 UART: [state] Locking Datavault
19,054,734 UART: [state] Locking PCR0, PCR1 and PCR31
19,056,880 UART: [state] Locking ICCM
19,059,543 UART: [exit] Launching FMC @ 0x40000130
19,068,175 UART:
19,068,451 UART: Running Caliptra FMC ...
19,069,561 UART:
19,069,726 UART: [state] CFI Enabled
19,129,002 UART: [fht] FMC Alias Private Key: 7
20,895,355 UART: [art] Extend RT PCRs Done
20,896,588 UART: [art] Lock RT PCRs Done
20,898,345 UART: [art] Populate DV Done
20,903,536 UART: [fht] FMC Alias Private Key: 7
20,905,180 UART: [art] Derive CDI
20,906,001 UART: [art] Store in slot 0x4
20,963,156 UART: [art] Derive Key Pair
20,964,157 UART: [art] Store priv key in slot 0x5
23,427,198 UART: [art] Derive Key Pair - Done
23,440,210 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,153,293 UART: [art] Erasing AUTHORITY.KEYID = 7
25,154,810 UART: [art] PUB.X = 92EF9CAFBBB9A5BA6B185B1E66E708D20224AD988D44F3AC89F34A8054AD624C207EE5618D945A3CF7F57DEE9019D387
25,162,046 UART: [art] PUB.Y = E537E39FF88D5D93113050B92AADFD963227E7496BB73FE951E3D2D4BE871516F586763B8C548DAC3B9F2189484D20E3
25,169,312 UART: [art] SIG.R = 3A8E40D7252626D19DB0F707E0DF4A4A883D9DBC37038CC867E09A6595DB3B99BBB8E96B3F4AF7464F3C7ED7256E756A
25,176,684 UART: [art] SIG.S = DB999BD065052F7993C220047753CA3021AFF5272450B107E8C0950E5835CF9F7FBAE084150CBC590E7DDCEAFCEBED11
26,155,654 UART: Caliptra RT
26,156,365 UART: [state] CFI Enabled
26,336,876 UART: [rt] RT listening for mailbox commands...
26,339,022 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,369,689 UART: [rt]cmd =0x41545348, len=116
26,371,983 >>> mbox cmd response data (12 bytes)
28,432,726 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,538,562 UART:
28,538,923 UART: Running Caliptra ROM ...
28,540,048 UART:
28,540,224 UART: [state] CFI Enabled
28,608,886 UART: [state] LifecycleState = Unprovisioned
28,610,929 UART: [state] DebugLocked = No
28,613,664 UART: [state] WD Timer not started. Device not locked for debugging
28,618,653 UART: [kat] SHA2-256
28,808,535 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,819,278 UART: [kat] ++
28,819,818 UART: [kat] sha1
28,831,468 UART: [kat] SHA2-256
28,834,478 UART: [kat] SHA2-384
28,841,393 UART: [kat] SHA2-512-ACC
28,843,959 UART: [kat] ECC-384
31,290,610 UART: [kat] HMAC-384Kdf
31,314,256 UART: [kat] LMS
31,845,856 UART: [kat] --
31,850,163 UART: [update-reset] ++
34,926,340 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,930,106 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,345,548 >>> mbox cmd response: success
35,345,905 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,346,396 UART: [update-reset] Copying MAN_2 To MAN_1
35,383,955 UART: [update-reset Success] --
35,388,161 UART: [state] Locking Datavault
35,392,010 UART: [state] Locking PCR0, PCR1 and PCR31
35,394,205 UART: [state] Locking ICCM
35,395,597 UART: [exit] Launching FMC @ 0x40000130
35,404,260 UART:
35,404,492 UART: Running Caliptra FMC ...
35,405,590 UART:
35,405,765 UART: [state] CFI Enabled
35,507,289 UART: [art] Extend RT PCRs Done
35,508,475 UART: [art] Lock RT PCRs Done
35,509,766 UART: [art] Populate DV Done
35,515,222 UART: [fht] FMC Alias Private Key: 7
35,516,809 UART: [art] Derive CDI
35,517,618 UART: [art] Store in slot 0x4
35,576,035 UART: [art] Derive Key Pair
35,577,077 UART: [art] Store priv key in slot 0x5
38,039,863 UART: [art] Derive Key Pair - Done
38,053,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,765,961 UART: [art] Erasing AUTHORITY.KEYID = 7
39,767,469 UART: [art] PUB.X = 25E93DFE3BA695BB27AD84C7CB44627BFF99625FCE5928BB76F30D14E54CFBDE9D8C4BF14811A59C25EBCB349B1A1EAE
39,774,801 UART: [art] PUB.Y = 8EE5F310E6AF99FFF5740CF5FA160EA2E09850F1BB41A10C53DE5E03AABABFB7DF9394179A654F8D9CC64823B358EA73
39,782,062 UART: [art] SIG.R = 2A80272D0B6D48C45D4AE53A6B9D52E5070EAE8A15D76C9DE1EE4C96D2E91BE9AF003BDDAE1F13A19101331C93D55806
39,789,459 UART: [art] SIG.S = E200C2E0642F0B1886E42AF30E1F0B9BF8478669691184DCA991FF0B61C8DCBDA2C3429072E164BF64A13EC504C9E57B
40,767,810 UART: mbox::rt_entry...
40,768,777 UART: ____ _ _ _ ____ _____
40,770,709 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,772,713 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,774,565 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,776,484 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,778,532 UART: |_|
40,779,341 UART:
41,152,025 UART: [rt] Runtime listening for mailbox commands...
41,154,195 >>> mbox cmd response data (48 bytes)
41,154,755 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,157,072 >>> mbox cmd response data (48 bytes)
41,157,934 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,173,502 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,437,658 ready_for_fw is high
3,438,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,832,536 >>> mbox cmd response: success
19,133,552 UART:
19,133,990 UART: Running Caliptra FMC ...
19,135,104 UART:
19,135,265 UART: [state] CFI Enabled
19,200,588 UART: [fht] FMC Alias Private Key: 7
20,967,002 UART: [art] Extend RT PCRs Done
20,968,243 UART: [art] Lock RT PCRs Done
20,969,933 UART: [art] Populate DV Done
20,975,244 UART: [fht] FMC Alias Private Key: 7
20,976,946 UART: [art] Derive CDI
20,977,760 UART: [art] Store in slot 0x4
21,033,229 UART: [art] Derive Key Pair
21,034,235 UART: [art] Store priv key in slot 0x5
23,497,291 UART: [art] Derive Key Pair - Done
23,509,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,622 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,131 UART: [art] PUB.X = 155EF9E18137B1172909A27C7693FCD1B29D1745C3607583A1DD6CEA1BA52A309FEE68D7DC2ABF90273F306057B90512
25,231,405 UART: [art] PUB.Y = AD9CB307E1098D343EBFA4B8D8C607663F71F8BD2F37A90B7AECDA1E106DA95B80477892142C77FC3038B17FA77F6D29
25,238,686 UART: [art] SIG.R = C86D869693ED32B5CF07B97CDA8B6666226324C8786417F00D56FE8C618D076142A0D6F9892853C921630ABF02C62060
25,246,047 UART: [art] SIG.S = D992934DD002929B05482AB8784AC8DEADD99F38C3775C729E5E5B2F38F0498D1FA1BB24F42D07C5A858B92870A46CEB
26,224,909 UART: Caliptra RT
26,225,624 UART: [state] CFI Enabled
26,405,755 UART: [rt] RT listening for mailbox commands...
26,408,116 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,438,912 UART: [rt]cmd =0x41545348, len=116
26,441,441 >>> mbox cmd response data (12 bytes)
28,502,987 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,604,210 >>> mbox cmd response: success
35,604,821 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,637,515 UART:
35,637,801 UART: Running Caliptra FMC ...
35,638,833 UART:
35,638,978 UART: [state] CFI Enabled
35,726,511 UART: [art] Extend RT PCRs Done
35,727,701 UART: [art] Lock RT PCRs Done
35,729,064 UART: [art] Populate DV Done
35,734,761 UART: [fht] FMC Alias Private Key: 7
35,736,461 UART: [art] Derive CDI
35,737,198 UART: [art] Store in slot 0x4
35,795,396 UART: [art] Derive Key Pair
35,796,426 UART: [art] Store priv key in slot 0x5
38,259,366 UART: [art] Derive Key Pair - Done
38,272,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,985,256 UART: [art] Erasing AUTHORITY.KEYID = 7
39,986,765 UART: [art] PUB.X = 855D9CA90855F711CCFDB615AF70FD89187DFD77137E7A56BE22D594D340D4F4407333AB39A20F61EE70073086D5A600
39,994,023 UART: [art] PUB.Y = 2E61758763090AD4274B620C462ABA6597673514B0E63F439EE63B0AC152E4F63BCA825B954F23EBA5811DD335D5DA47
40,001,246 UART: [art] SIG.R = A54254871B505A9AA4A52F24CE990943725455C6C6FDB93E9FA75C4C77E86FAC250B1564A3A003228822121066EBA1A7
40,008,659 UART: [art] SIG.S = 6E6C497CED2989A6593CD9ECBE0C54FA4DC57DC2D53C987AA1F4E8CC42992573367EB71E534C015B4048916195072A6B
40,986,717 UART: mbox::rt_entry...
40,987,680 UART: ____ _ _ _ ____ _____
40,989,665 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,991,665 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,993,589 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,995,519 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,997,441 UART: |_|
40,998,274 UART:
41,370,140 UART: [rt] Runtime listening for mailbox commands...
41,372,323 >>> mbox cmd response data (48 bytes)
41,372,905 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,375,252 >>> mbox cmd response data (48 bytes)
41,376,103 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,391,673 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
192,265 UART:
192,639 UART: Running Caliptra ROM ...
193,798 UART:
603,599 UART: [state] CFI Enabled
618,696 UART: [state] LifecycleState = Unprovisioned
621,081 UART: [state] DebugLocked = No
622,834 UART: [state] WD Timer not started. Device not locked for debugging
626,958 UART: [kat] SHA2-256
816,906 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,641 UART: [kat] ++
828,249 UART: [kat] sha1
839,205 UART: [kat] SHA2-256
842,221 UART: [kat] SHA2-384
847,646 UART: [kat] SHA2-512-ACC
850,240 UART: [kat] ECC-384
3,292,584 UART: [kat] HMAC-384Kdf
3,304,670 UART: [kat] LMS
3,836,463 UART: [kat] --
3,841,614 UART: [cold-reset] ++
3,843,340 UART: [fht] FHT @ 0x50003400
3,855,050 UART: [idev] ++
3,855,801 UART: [idev] CDI.KEYID = 6
3,856,693 UART: [idev] SUBJECT.KEYID = 7
3,857,860 UART: [idev] UDS.KEYID = 0
3,858,910 ready_for_fw is high
3,859,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,868 UART: [idev] Erasing UDS.KEYID = 0
6,331,955 UART: [idev] Sha1 KeyId Algorithm
6,354,245 UART: [idev] --
6,359,307 UART: [ldev] ++
6,359,998 UART: [ldev] CDI.KEYID = 6
6,360,916 UART: [ldev] SUBJECT.KEYID = 5
6,362,082 UART: [ldev] AUTHORITY.KEYID = 7
6,363,324 UART: [ldev] FE.KEYID = 1
6,374,077 UART: [ldev] Erasing FE.KEYID = 1
8,848,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,730 UART: [ldev] --
10,637,860 UART: [fwproc] Wait for Commands...
10,639,469 UART: [fwproc] Recv command 0x46574c44
10,641,776 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,215,209 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,338,835 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,899,803 >>> mbox cmd response: success
14,903,805 UART: [afmc] ++
14,904,512 UART: [afmc] CDI.KEYID = 6
14,905,729 UART: [afmc] SUBJECT.KEYID = 7
14,907,177 UART: [afmc] AUTHORITY.KEYID = 5
17,413,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,137,021 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,138,941 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,154,045 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,169,198 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,184,126 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,207,554 UART: [afmc] --
19,211,700 UART: [cold-reset] --
19,215,734 UART: [state] Locking Datavault
19,223,311 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,546 UART: [state] Locking ICCM
19,227,708 UART: [exit] Launching FMC @ 0x40000130
19,236,351 UART:
19,236,595 UART: Running Caliptra FMC ...
19,237,673 UART:
19,237,836 UART: [state] CFI Enabled
19,246,159 UART: [fht] FMC Alias Private Key: 7
21,012,541 UART: [art] Extend RT PCRs Done
21,013,757 UART: [art] Lock RT PCRs Done
21,015,496 UART: [art] Populate DV Done
21,020,964 UART: [fht] FMC Alias Private Key: 7
21,022,509 UART: [art] Derive CDI
21,023,329 UART: [art] Store in slot 0x4
21,066,088 UART: [art] Derive Key Pair
21,067,136 UART: [art] Store priv key in slot 0x5
23,494,485 UART: [art] Derive Key Pair - Done
23,507,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,832 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,480 UART: [art] PUB.X = 43F09615375887DDE2EFB50CFE8068E7A5B0D08D849F3C38E407A7F0C7A7CA2ADD29740DFFA42F33B1AD1A834368D526
25,222,594 UART: [art] PUB.Y = D0253DEBCE728FFB9FA28DD365B2D53269AA031943E3F0A13393A0C8CDC1E189CE0070C4927E4DADECA0A5037E59D20D
25,229,871 UART: [art] SIG.R = 105E4391FEFC346A37AD5A12A690C9342885051E9C5BD2EC0ABA6A1BB036F3D4E94DCE56ACBDCC7864E7829EFAAA9CD4
25,237,294 UART: [art] SIG.S = BD0854E8DA1F5AE620E7F8BE52C46128E568E37E004FCBD6B008FBEFACFA9028A2F40D41778BB562A4641A08E9ACB3D0
26,215,798 UART: Caliptra RT
26,216,487 UART: [state] CFI Enabled
26,348,633 UART: [rt] RT listening for mailbox commands...
26,350,722 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,381,680 UART: [rt]cmd =0x41545348, len=116
26,383,940 >>> mbox cmd response data (12 bytes)
28,448,654 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,554,135 UART:
28,554,496 UART: Running Caliptra ROM ...
28,555,630 UART:
28,555,822 UART: [state] CFI Enabled
28,569,661 UART: [state] LifecycleState = Unprovisioned
28,571,557 UART: [state] DebugLocked = No
28,574,502 UART: [state] WD Timer not started. Device not locked for debugging
28,578,757 UART: [kat] SHA2-256
28,768,654 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,779,409 UART: [kat] ++
28,779,970 UART: [kat] sha1
28,791,670 UART: [kat] SHA2-256
28,794,646 UART: [kat] SHA2-384
28,799,131 UART: [kat] SHA2-512-ACC
28,801,702 UART: [kat] ECC-384
31,242,555 UART: [kat] HMAC-384Kdf
31,255,882 UART: [kat] LMS
31,787,503 UART: [kat] --
31,791,713 UART: [update-reset] ++
34,855,715 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,859,141 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,274,609 >>> mbox cmd response: success
35,274,977 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,275,263 UART: [update-reset] Copying MAN_2 To MAN_1
35,312,727 UART: [update-reset Success] --
35,317,602 UART: [state] Locking Datavault
35,322,007 UART: [state] Locking PCR0, PCR1 and PCR31
35,324,163 UART: [state] Locking ICCM
35,325,709 UART: [exit] Launching FMC @ 0x40000130
35,334,391 UART:
35,334,627 UART: Running Caliptra FMC ...
35,335,670 UART:
35,335,820 UART: [state] CFI Enabled
35,379,289 UART: [art] Extend RT PCRs Done
35,380,499 UART: [art] Lock RT PCRs Done
35,381,794 UART: [art] Populate DV Done
35,387,264 UART: [fht] FMC Alias Private Key: 7
35,388,753 UART: [art] Derive CDI
35,389,516 UART: [art] Store in slot 0x4
35,431,888 UART: [art] Derive Key Pair
35,432,887 UART: [art] Store priv key in slot 0x5
37,859,885 UART: [art] Derive Key Pair - Done
37,872,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,578,765 UART: [art] Erasing AUTHORITY.KEYID = 7
39,580,263 UART: [art] PUB.X = 7BB378DD102D205801A1A56F2F30CD01500EA1CDC616803ABF836B22F386ED0CB93C18AD820638D5AB6A1104F558C699
39,587,540 UART: [art] PUB.Y = 737DD877860A4831DD3DDBECB438D2E910300E46FB71617FAC74899B73AA83609CFEA2ACF788870F47A8F00F0DE2F62F
39,594,790 UART: [art] SIG.R = EF05A49812DC61F488C8EAADDA233CCAA5BD912A16D58F18F924483262E9E0AB243F7C8E2B75DB7FC981E2E5262622D9
39,602,203 UART: [art] SIG.S = B98C47981AD635D52C17653DBE49ED7A1592A5818DB83D51DCA03F875434FBF8C16DCECE630CC32CC04D394C4E13860A
40,580,761 UART: mbox::rt_entry...
40,581,721 UART: ____ _ _ _ ____ _____
40,583,652 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,585,685 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,587,620 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,589,551 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,591,489 UART: |_|
40,592,331 UART:
40,967,282 UART: [rt] Runtime listening for mailbox commands...
40,969,507 >>> mbox cmd response data (48 bytes)
40,970,091 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,972,417 >>> mbox cmd response data (48 bytes)
40,973,287 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,988,866 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,757,272 ready_for_fw is high
3,757,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,203 >>> mbox cmd response: success
19,295,308 UART:
19,295,716 UART: Running Caliptra FMC ...
19,296,835 UART:
19,297,002 UART: [state] CFI Enabled
19,305,294 UART: [fht] FMC Alias Private Key: 7
21,071,213 UART: [art] Extend RT PCRs Done
21,072,448 UART: [art] Lock RT PCRs Done
21,074,085 UART: [art] Populate DV Done
21,079,680 UART: [fht] FMC Alias Private Key: 7
21,081,245 UART: [art] Derive CDI
21,082,072 UART: [art] Store in slot 0x4
21,124,519 UART: [art] Derive Key Pair
21,125,562 UART: [art] Store priv key in slot 0x5
23,552,385 UART: [art] Derive Key Pair - Done
23,565,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,675 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,183 UART: [art] PUB.X = A115672C1F7940DB8425D21FAE7119520C695DA1C0830220A622C9161F0AF96D821824EA2FC5D5C5425C7A21E84E2DFB
25,280,429 UART: [art] PUB.Y = 2A415803B16AC19539FB55A4211A455D315B77BC646ACAF662D408544866A0AEA55AD889421EC9E2A9F23FA12B1C2D5A
25,287,707 UART: [art] SIG.R = E86B46DFA4AEBA3DFE8653E78FA1396E9DC121856B2D2C5E76AE61C783D21533229A2D3BC45ABED2C682594C945F8E4D
25,295,081 UART: [art] SIG.S = C5EC7F3BCDF8B6B6B9ABA5A7AC18A827CC9FDFAFBC8A111E0145908D99E23D4C4F755D4F232096BAA538BDF07978CFCE
26,273,352 UART: Caliptra RT
26,274,047 UART: [state] CFI Enabled
26,407,960 UART: [rt] RT listening for mailbox commands...
26,410,252 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,440,993 UART: [rt]cmd =0x41545348, len=116
26,443,171 >>> mbox cmd response data (12 bytes)
28,507,331 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,524,425 >>> mbox cmd response: success
35,524,922 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,557,886 UART:
35,558,186 UART: Running Caliptra FMC ...
35,559,310 UART:
35,559,475 UART: [state] CFI Enabled
35,603,719 UART: [art] Extend RT PCRs Done
35,604,915 UART: [art] Lock RT PCRs Done
35,606,227 UART: [art] Populate DV Done
35,611,557 UART: [fht] FMC Alias Private Key: 7
35,613,172 UART: [art] Derive CDI
35,613,919 UART: [art] Store in slot 0x4
35,656,643 UART: [art] Derive Key Pair
35,657,688 UART: [art] Store priv key in slot 0x5
38,084,626 UART: [art] Derive Key Pair - Done
38,097,797 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,804,149 UART: [art] Erasing AUTHORITY.KEYID = 7
39,805,653 UART: [art] PUB.X = 3B1E470ED7CE7A9617633B2FA44150CDBF8D3A17AB7DC2DB3AE3FDBB559FA15CE76503B3DB8287B3F55F4776FC139ACA
39,812,992 UART: [art] PUB.Y = 399649DE8D28DB63042BA61B06467267B54EBC90A2035F1E29CD00CDC094905D67FC3ADEA09F623AB0FBE33EF9681BB6
39,820,241 UART: [art] SIG.R = 99F8D0E34D172B25B1BC3C300918C5CA2EC3E9FFA68FDC591BEC59CA46E2AF4A64B620C97433A089B6C9C28856D76F03
39,827,637 UART: [art] SIG.S = AE64B71F90E027F4B942969F57A4BA905166E41E078C221B8F7FEFCFEB40E23735E393A9D25BCF6DE3FD392FC87EC0BE
40,805,944 UART: mbox::rt_entry...
40,806,915 UART: ____ _ _ _ ____ _____
40,808,904 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,810,917 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,812,851 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,814,800 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,816,743 UART: |_|
40,817,556 UART:
41,189,029 UART: [rt] Runtime listening for mailbox commands...
41,191,190 >>> mbox cmd response data (48 bytes)
41,191,767 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,194,097 >>> mbox cmd response data (48 bytes)
41,194,960 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,210,534 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,661 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,217 UART: [kat] SHA2-256
882,148 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,263 UART: [kat] ++
886,415 UART: [kat] sha1
890,429 UART: [kat] SHA2-256
892,367 UART: [kat] SHA2-384
895,020 UART: [kat] SHA2-512-ACC
896,921 UART: [kat] ECC-384
902,698 UART: [kat] HMAC-384Kdf
907,266 UART: [kat] LMS
1,475,462 UART: [kat] --
1,476,269 UART: [cold-reset] ++
1,476,845 UART: [fht] Storing FHT @ 0x50003400
1,479,600 UART: [idev] ++
1,479,768 UART: [idev] CDI.KEYID = 6
1,480,128 UART: [idev] SUBJECT.KEYID = 7
1,480,552 UART: [idev] UDS.KEYID = 0
1,480,897 ready_for_fw is high
1,480,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,884 UART: [idev] Erasing UDS.KEYID = 0
1,504,896 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,586 UART: [idev] --
1,514,633 UART: [ldev] ++
1,514,801 UART: [ldev] CDI.KEYID = 6
1,515,164 UART: [ldev] SUBJECT.KEYID = 5
1,515,590 UART: [ldev] AUTHORITY.KEYID = 7
1,516,053 UART: [ldev] FE.KEYID = 1
1,521,245 UART: [ldev] Erasing FE.KEYID = 1
1,546,816 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,344 UART: [ldev] --
1,585,737 UART: [fwproc] Waiting for Commands...
1,586,518 UART: [fwproc] Received command 0x46574c44
1,587,309 UART: [fwproc] Received Image of size 118548 bytes
2,933,167 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,101 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,319 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,704 >>> mbox cmd response: success
3,132,902 UART: [afmc] ++
3,133,070 UART: [afmc] CDI.KEYID = 6
3,133,432 UART: [afmc] SUBJECT.KEYID = 7
3,133,857 UART: [afmc] AUTHORITY.KEYID = 5
3,168,264 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,784 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,564 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,273 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,156 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,839 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,643 UART: [afmc] --
3,211,561 UART: [cold-reset] --
3,212,625 UART: [state] Locking Datavault
3,213,742 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,346 UART: [state] Locking ICCM
3,214,772 UART: [exit] Launching FMC @ 0x40000130
3,220,102 UART:
3,220,118 UART: Running Caliptra FMC ...
3,220,526 UART:
3,220,580 UART: [state] CFI Enabled
3,231,182 UART: [fht] FMC Alias Private Key: 7
3,350,628 UART: [art] Extend RT PCRs Done
3,351,056 UART: [art] Lock RT PCRs Done
3,352,378 UART: [art] Populate DV Done
3,360,641 UART: [fht] FMC Alias Private Key: 7
3,361,743 UART: [art] Derive CDI
3,362,023 UART: [art] Store in slot 0x4
3,447,497 UART: [art] Derive Key Pair
3,447,857 UART: [art] Store priv key in slot 0x5
3,461,290 UART: [art] Derive Key Pair - Done
3,476,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,799 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,564 UART: [art] PUB.X = 1161BCBA6E21EE29C146D9658333440F62D8197D1BAE3E23A3DEDA03D0BA6B56544483FB46BD17050BBE7DC30E1B2C46
3,499,331 UART: [art] PUB.Y = D19178F2B7498D26BEE32FD5183781387D9BF4CFB7610A438CBAE89537C47A5B8DE925B5EB3B075BBF6FBFBFDE2E673E
3,506,295 UART: [art] SIG.R = DCBF3226806D71C254E44E938093E5A1C957DFAA7FCA29B87074BF70B1764E377A282D07E4D7911C2EB5BE190997BD0E
3,513,064 UART: [art] SIG.S = 9DD88A268B84D160B9FB11B0EECE361B0F1AFF551710D59225207CAD6BD9D768D512E7004704C117144B9E56A8744681
3,536,542 UART: Caliptra RT
3,536,793 UART: [state] CFI Enabled
3,656,774 UART: [rt] RT listening for mailbox commands...
3,657,444 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,842 UART: [rt]cmd =0x41545348, len=116
3,689,667 >>> mbox cmd response data (12 bytes)
3,689,668 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,466 UART:
3,690,482 UART: Running Caliptra ROM ...
3,690,890 UART:
3,690,944 UART: [state] CFI Enabled
3,693,376 UART: [state] LifecycleState = Unprovisioned
3,694,031 UART: [state] DebugLocked = No
3,694,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,696,132 UART: [kat] SHA2-256
4,490,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,494,178 UART: [kat] ++
4,494,330 UART: [kat] sha1
4,498,456 UART: [kat] SHA2-256
4,500,394 UART: [kat] SHA2-384
4,503,383 UART: [kat] SHA2-512-ACC
4,505,283 UART: [kat] ECC-384
4,510,558 UART: [kat] HMAC-384Kdf
4,514,954 UART: [kat] LMS
5,083,150 UART: [kat] --
5,083,989 UART: [update-reset] ++
6,056,702 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,057,922 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,159,615 >>> mbox cmd response: success
6,159,615 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,159,964 UART: [update-reset] Copying MAN_2 To MAN_1
6,167,978 UART: [update-reset Success] --
6,168,977 UART: [state] Locking Datavault
6,169,857 UART: [state] Locking PCR0, PCR1 and PCR31
6,170,461 UART: [state] Locking ICCM
6,171,119 UART: [exit] Launching FMC @ 0x40000130
6,176,449 UART:
6,176,465 UART: Running Caliptra FMC ...
6,176,873 UART:
6,176,927 UART: [state] CFI Enabled
6,265,766 UART: [art] Extend RT PCRs Done
6,266,194 UART: [art] Lock RT PCRs Done
6,267,585 UART: [art] Populate DV Done
6,275,736 UART: [fht] FMC Alias Private Key: 7
6,276,760 UART: [art] Derive CDI
6,277,040 UART: [art] Store in slot 0x4
6,362,848 UART: [art] Derive Key Pair
6,363,208 UART: [art] Store priv key in slot 0x5
6,376,189 UART: [art] Derive Key Pair - Done
6,390,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,406,356 UART: [art] Erasing AUTHORITY.KEYID = 7
6,407,121 UART: [art] PUB.X = AB40F94CC540B0E73996143002F139EC35383F04E0428B426E9E1C28FCFA68BAFA0FC7E7447F04FD579EFEFE2E111992
6,413,889 UART: [art] PUB.Y = F433FB32A5BF0AE059E6A57DBFEBB1C41F2D10278C8438EB96EE6A338392407E1E00D4D430699CE0E61642DBA2350C9E
6,420,823 UART: [art] SIG.R = 7FC294219C4AD2F37E6CC96CB2D4564AA742DDC2C68D73C5CAFA0292506F414DFA1C0D1738E02FAB4725AB1831B423CC
6,427,603 UART: [art] SIG.S = 7239207AE54E9F5C897482E537D4B3AE150074F776D3575CDA400ECF32D675F80A9E11734C5FCBD20D47F80E280A6DB8
6,451,270 UART: mbox::rt_entry...
6,451,642 UART: ____ _ _ _ ____ _____
6,452,426 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,453,226 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,453,994 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,454,762 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,455,530 UART: |_|
6,455,842 UART:
6,822,118 UART: [rt] Runtime listening for mailbox commands...
6,823,316 >>> mbox cmd response data (48 bytes)
6,823,317 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,826,104 >>> mbox cmd response data (48 bytes)
6,826,105 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,842,051 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,027 ready_for_fw is high
1,362,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,798 >>> mbox cmd response: success
3,041,463 UART:
3,041,479 UART: Running Caliptra FMC ...
3,041,887 UART:
3,041,941 UART: [state] CFI Enabled
3,052,665 UART: [fht] FMC Alias Private Key: 7
3,171,991 UART: [art] Extend RT PCRs Done
3,172,419 UART: [art] Lock RT PCRs Done
3,174,029 UART: [art] Populate DV Done
3,182,324 UART: [fht] FMC Alias Private Key: 7
3,183,374 UART: [art] Derive CDI
3,183,654 UART: [art] Store in slot 0x4
3,269,168 UART: [art] Derive Key Pair
3,269,528 UART: [art] Store priv key in slot 0x5
3,282,879 UART: [art] Derive Key Pair - Done
3,297,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,772 UART: [art] PUB.X = 103FAA08DF1315D9295BF08F0431B0DC4C83F8F1C74A371D6BDC5C89EDB945465E353E35A87DDAFC8A6BD9D66F12D0D3
3,320,554 UART: [art] PUB.Y = 2A695F4632BC01996AD48F45F698495318D197DDD1EB38375288396B1ED472366D2EA6594A4D42A0D6FEC6772934EF64
3,327,497 UART: [art] SIG.R = D2BF0BCFDA1082A126FEEC3D8922BEFD2030511AA887238406CDDCBEF15A4D994CE9BB6C576130F865C5241192BA5C0F
3,334,276 UART: [art] SIG.S = 84A5D08D7F4CF97EC30C21667BA05A22E8A14A6C1FE89E3ED4EE3845B18D46472209F52F887388601F6BDB05325A5E32
3,358,363 UART: Caliptra RT
3,358,614 UART: [state] CFI Enabled
3,479,937 UART: [rt] RT listening for mailbox commands...
3,480,607 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,135 UART: [rt]cmd =0x41545348, len=116
3,512,956 >>> mbox cmd response data (12 bytes)
3,512,957 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,864,016 >>> mbox cmd response: success
5,864,016 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,877,218 UART:
5,877,234 UART: Running Caliptra FMC ...
5,877,642 UART:
5,877,696 UART: [state] CFI Enabled
5,967,193 UART: [art] Extend RT PCRs Done
5,967,621 UART: [art] Lock RT PCRs Done
5,968,652 UART: [art] Populate DV Done
5,977,159 UART: [fht] FMC Alias Private Key: 7
5,978,293 UART: [art] Derive CDI
5,978,573 UART: [art] Store in slot 0x4
6,063,915 UART: [art] Derive Key Pair
6,064,275 UART: [art] Store priv key in slot 0x5
6,077,088 UART: [art] Derive Key Pair - Done
6,091,766 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,107,287 UART: [art] Erasing AUTHORITY.KEYID = 7
6,108,052 UART: [art] PUB.X = E9BBC7B20CC1A83AD63486337033D9FBAE3E94728E7CCC2E0DAE53B7DC300122B2DF7885407697C6B2C6E2CB73A92406
6,114,822 UART: [art] PUB.Y = 6AA266493157B3F3BD6AC3C63717F682066DF4F976D99A3668134DB452CB22416DC4A1AC33329B8A1713D7EEC2C07A7F
6,121,773 UART: [art] SIG.R = 42E6BD300C992A16A6C5B1DC17C068946F3841978438F4020D5556B7691EB6EC7A3E032CDD10703AB355E545C89DF9CC
6,128,533 UART: [art] SIG.S = 84E14D6833FA93D93CA63E88D00770996ACDA23A865FE184A83B9D234F11EADD98F6A9B4AEC10611F80CB4D821EEA673
6,151,336 UART: mbox::rt_entry...
6,151,708 UART: ____ _ _ _ ____ _____
6,152,492 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,153,292 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,154,060 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,154,828 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,155,596 UART: |_|
6,155,908 UART:
6,524,985 UART: [rt] Runtime listening for mailbox commands...
6,526,183 >>> mbox cmd response data (48 bytes)
6,526,184 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,528,971 >>> mbox cmd response data (48 bytes)
6,528,972 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,544,918 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,238 UART: [kat] SHA2-256
882,169 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,284 UART: [kat] ++
886,436 UART: [kat] sha1
890,818 UART: [kat] SHA2-256
892,756 UART: [kat] SHA2-384
895,409 UART: [kat] SHA2-512-ACC
897,310 UART: [kat] ECC-384
903,291 UART: [kat] HMAC-384Kdf
907,801 UART: [kat] LMS
1,475,997 UART: [kat] --
1,476,830 UART: [cold-reset] ++
1,477,352 UART: [fht] Storing FHT @ 0x50003400
1,480,181 UART: [idev] ++
1,480,349 UART: [idev] CDI.KEYID = 6
1,480,709 UART: [idev] SUBJECT.KEYID = 7
1,481,133 UART: [idev] UDS.KEYID = 0
1,481,478 ready_for_fw is high
1,481,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,007 UART: [idev] Erasing UDS.KEYID = 0
1,505,923 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,573 UART: [idev] --
1,515,612 UART: [ldev] ++
1,515,780 UART: [ldev] CDI.KEYID = 6
1,516,143 UART: [ldev] SUBJECT.KEYID = 5
1,516,569 UART: [ldev] AUTHORITY.KEYID = 7
1,517,032 UART: [ldev] FE.KEYID = 1
1,522,416 UART: [ldev] Erasing FE.KEYID = 1
1,548,141 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,475 UART: [ldev] --
1,587,976 UART: [fwproc] Waiting for Commands...
1,588,727 UART: [fwproc] Received command 0x46574c44
1,589,518 UART: [fwproc] Received Image of size 118548 bytes
2,933,176 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,348 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,566 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,983 >>> mbox cmd response: success
3,133,141 UART: [afmc] ++
3,133,309 UART: [afmc] CDI.KEYID = 6
3,133,671 UART: [afmc] SUBJECT.KEYID = 7
3,134,096 UART: [afmc] AUTHORITY.KEYID = 5
3,168,559 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,601 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,381 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,090 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,973 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,656 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,720 UART: [afmc] --
3,211,840 UART: [cold-reset] --
3,212,714 UART: [state] Locking Datavault
3,213,747 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,351 UART: [state] Locking ICCM
3,214,961 UART: [exit] Launching FMC @ 0x40000130
3,220,291 UART:
3,220,307 UART: Running Caliptra FMC ...
3,220,715 UART:
3,220,858 UART: [state] CFI Enabled
3,231,702 UART: [fht] FMC Alias Private Key: 7
3,350,736 UART: [art] Extend RT PCRs Done
3,351,164 UART: [art] Lock RT PCRs Done
3,352,878 UART: [art] Populate DV Done
3,361,295 UART: [fht] FMC Alias Private Key: 7
3,362,377 UART: [art] Derive CDI
3,362,657 UART: [art] Store in slot 0x4
3,448,433 UART: [art] Derive Key Pair
3,448,793 UART: [art] Store priv key in slot 0x5
3,461,708 UART: [art] Derive Key Pair - Done
3,475,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,541 UART: [art] PUB.X = FEE8D4BF8337C03BE36D71927D1AE4A69DF68D51EE396A127F7BB8B64A7E510237BAD3FAB73F3536642B73DA59665060
3,499,318 UART: [art] PUB.Y = 47F7984DC82E5598A5353AFD58CAA3BCF8509FDA74660A5EB102377AA0CCA94455367E098893AF31FA7820C81BC66FE6
3,506,267 UART: [art] SIG.R = 64CA344DD6F19633CB217EAC12949EFBDBA58F2F0BE6491F25040FC2A096A2A5E2C7BF3048A09695C2FC3199B2BC9484
3,513,040 UART: [art] SIG.S = B4478ACD39909AF48F2362D6D417706921143AD3A5DBE442C00E1A595AE3B91D431F325783100EE54AD70BA530105215
3,537,075 UART: Caliptra RT
3,537,418 UART: [state] CFI Enabled
3,657,348 UART: [rt] RT listening for mailbox commands...
3,658,018 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,418 UART: [rt]cmd =0x41545348, len=116
3,689,919 >>> mbox cmd response data (12 bytes)
3,689,920 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,930 UART:
3,690,946 UART: Running Caliptra ROM ...
3,691,354 UART:
3,691,495 UART: [state] CFI Enabled
3,693,981 UART: [state] LifecycleState = Unprovisioned
3,694,636 UART: [state] DebugLocked = No
3,695,206 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,696,825 UART: [kat] SHA2-256
4,490,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,494,871 UART: [kat] ++
4,495,023 UART: [kat] sha1
4,499,067 UART: [kat] SHA2-256
4,501,005 UART: [kat] SHA2-384
4,503,968 UART: [kat] SHA2-512-ACC
4,505,868 UART: [kat] ECC-384
4,511,859 UART: [kat] HMAC-384Kdf
4,516,729 UART: [kat] LMS
5,084,925 UART: [kat] --
5,085,866 UART: [update-reset] ++
6,058,041 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,059,249 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,160,942 >>> mbox cmd response: success
6,160,942 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,161,045 UART: [update-reset] Copying MAN_2 To MAN_1
6,169,059 UART: [update-reset Success] --
6,170,114 UART: [state] Locking Datavault
6,170,918 UART: [state] Locking PCR0, PCR1 and PCR31
6,171,522 UART: [state] Locking ICCM
6,172,128 UART: [exit] Launching FMC @ 0x40000130
6,177,458 UART:
6,177,474 UART: Running Caliptra FMC ...
6,177,882 UART:
6,178,025 UART: [state] CFI Enabled
6,267,394 UART: [art] Extend RT PCRs Done
6,267,822 UART: [art] Lock RT PCRs Done
6,269,037 UART: [art] Populate DV Done
6,277,220 UART: [fht] FMC Alias Private Key: 7
6,278,234 UART: [art] Derive CDI
6,278,514 UART: [art] Store in slot 0x4
6,364,276 UART: [art] Derive Key Pair
6,364,636 UART: [art] Store priv key in slot 0x5
6,377,489 UART: [art] Derive Key Pair - Done
6,392,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,407,668 UART: [art] Erasing AUTHORITY.KEYID = 7
6,408,433 UART: [art] PUB.X = 7BD2DEC60C046E402B810F24589AD60364FD140E1CD8F6EC09B7956B6D355D23213AB3BDFD0AA2F9B207C61CF61E0DED
6,415,194 UART: [art] PUB.Y = 28E2ED8FB91F57655F82C6A8C06BA8105E5BE23A8143126011AC83C8F3C2FE9189CEE07FFEEA4A668A04449CAE61CBEC
6,422,159 UART: [art] SIG.R = E853109BAD5839C91CD1ECC23F11A8088CD5C12D90F7E23E2AFCAF298B16BEB8D4662817CE6C9C908ED6A2A8A63929F0
6,428,942 UART: [art] SIG.S = BA3D196A94C528811D6E8FE8B1F30B28728C871F153FCB07B32B321632A8301890EE2E83C8EBA1D8EF1CF29DAE9A865F
6,452,924 UART: mbox::rt_entry...
6,453,296 UART: ____ _ _ _ ____ _____
6,454,080 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,454,880 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,455,648 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,456,416 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,457,184 UART: |_|
6,457,496 UART:
6,813,362 UART: [rt] Runtime listening for mailbox commands...
6,814,560 >>> mbox cmd response data (48 bytes)
6,814,561 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,817,348 >>> mbox cmd response data (48 bytes)
6,817,349 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,833,295 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,552 ready_for_fw is high
1,362,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,505 >>> mbox cmd response: success
3,042,846 UART:
3,042,862 UART: Running Caliptra FMC ...
3,043,270 UART:
3,043,413 UART: [state] CFI Enabled
3,054,365 UART: [fht] FMC Alias Private Key: 7
3,173,699 UART: [art] Extend RT PCRs Done
3,174,127 UART: [art] Lock RT PCRs Done
3,175,785 UART: [art] Populate DV Done
3,183,970 UART: [fht] FMC Alias Private Key: 7
3,185,024 UART: [art] Derive CDI
3,185,304 UART: [art] Store in slot 0x4
3,271,018 UART: [art] Derive Key Pair
3,271,378 UART: [art] Store priv key in slot 0x5
3,284,529 UART: [art] Derive Key Pair - Done
3,299,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,621 UART: [art] PUB.X = F21BFF3F52D6FFCC484F6EF73BC49E58DDF0171C9FAACB48942CEE90DEB0092613BF73BA522CA02D7108E2EA84670EE3
3,322,406 UART: [art] PUB.Y = 0F4248A987EE48547EB3C9F7E8D1A628C3BA0FE491CFED4712A447DE54F1F1EDD46475822761DEDC4DD20D173E06E01F
3,329,358 UART: [art] SIG.R = 303A4F865D43F82A6A2FC8012E145CE7D67A4876166827D122DFE975D2A8B7ECA6CF00D190DFCCBE7AE9EAFAC34D64D4
3,336,123 UART: [art] SIG.S = 34865362EC33A241C6387E791581105AB7705E6EAAACB7915C102AC1553EF7D62E25123988E22D92290AA651500E3034
3,360,223 UART: Caliptra RT
3,360,566 UART: [state] CFI Enabled
3,480,847 UART: [rt] RT listening for mailbox commands...
3,481,517 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,285 UART: [rt]cmd =0x41545348, len=116
3,513,970 >>> mbox cmd response data (12 bytes)
3,513,971 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,864,689 >>> mbox cmd response: success
5,864,689 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,877,645 UART:
5,877,661 UART: Running Caliptra FMC ...
5,878,069 UART:
5,878,212 UART: [state] CFI Enabled
5,967,493 UART: [art] Extend RT PCRs Done
5,967,921 UART: [art] Lock RT PCRs Done
5,968,886 UART: [art] Populate DV Done
5,977,211 UART: [fht] FMC Alias Private Key: 7
5,978,311 UART: [art] Derive CDI
5,978,591 UART: [art] Store in slot 0x4
6,063,977 UART: [art] Derive Key Pair
6,064,337 UART: [art] Store priv key in slot 0x5
6,077,840 UART: [art] Derive Key Pair - Done
6,092,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,108,102 UART: [art] Erasing AUTHORITY.KEYID = 7
6,108,867 UART: [art] PUB.X = ED0C58548563F2C5CE33006E78B521F9AED3359F0BBAC5913817A1D4C5AB8A8AD6E71EA9C4D9AA3F953879A24F730F16
6,115,618 UART: [art] PUB.Y = 4CCBB522BE5C3C7E30C6227B85255A6A46285C3F1427562B1DDD184880DC638409E8535CD463FE5A9AADD4DF83D2BA06
6,122,572 UART: [art] SIG.R = 985861B51244E6C4F4B783EC2C8D7C649D4E06EFAA260D257F8B4BC39B6F9A00BAC4A6E5A18C7E1067C03C932E522180
6,129,322 UART: [art] SIG.S = 656747B8944C3B92CAE47541693E6CA0A6513D3BB5E0575EEAA6B057DDD432CEF02229E4F160236A2130B72FDAE78DCA
6,152,438 UART: mbox::rt_entry...
6,152,810 UART: ____ _ _ _ ____ _____
6,153,594 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,154,394 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,155,162 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,155,930 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,156,698 UART: |_|
6,157,010 UART:
6,520,103 UART: [rt] Runtime listening for mailbox commands...
6,521,301 >>> mbox cmd response data (48 bytes)
6,521,302 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,524,089 >>> mbox cmd response data (48 bytes)
6,524,090 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,540,036 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,712 UART: [state] LifecycleState = Unprovisioned
86,367 UART: [state] DebugLocked = No
86,937 UART: [state] WD Timer not started. Device not locked for debugging
88,102 UART: [kat] SHA2-256
891,652 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,756 UART: [kat] ++
895,908 UART: [kat] sha1
900,134 UART: [kat] SHA2-256
902,074 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
920,891 UART: [kat] LMS
1,169,203 UART: [kat] --
1,170,250 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,174,512 ready_for_fw is high
1,174,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,199 UART: [idev] Erasing UDS.KEYID = 0
1,198,813 UART: [idev] Sha1 KeyId Algorithm
1,207,813 UART: [idev] --
1,208,728 UART: [ldev] ++
1,208,896 UART: [ldev] CDI.KEYID = 6
1,209,260 UART: [ldev] SUBJECT.KEYID = 5
1,209,687 UART: [ldev] AUTHORITY.KEYID = 7
1,210,150 UART: [ldev] FE.KEYID = 1
1,215,494 UART: [ldev] Erasing FE.KEYID = 1
1,241,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,580 UART: [ldev] --
1,280,903 UART: [fwproc] Wait for Commands...
1,281,712 UART: [fwproc] Recv command 0x46574c44
1,282,445 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,853 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,028 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,329 >>> mbox cmd response: success
2,826,443 UART: [afmc] ++
2,826,611 UART: [afmc] CDI.KEYID = 6
2,826,974 UART: [afmc] SUBJECT.KEYID = 7
2,827,400 UART: [afmc] AUTHORITY.KEYID = 5
2,862,723 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,272 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,021 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,731 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,612 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,313 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,046 UART: [afmc] --
2,905,957 UART: [cold-reset] --
2,906,885 UART: [state] Locking Datavault
2,908,010 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,614 UART: [state] Locking ICCM
2,909,250 UART: [exit] Launching FMC @ 0x40000130
2,914,580 UART:
2,914,596 UART: Running Caliptra FMC ...
2,915,004 UART:
2,915,058 UART: [state] CFI Enabled
2,925,714 UART: [fht] FMC Alias Private Key: 7
3,044,970 UART: [art] Extend RT PCRs Done
3,045,398 UART: [art] Lock RT PCRs Done
3,046,940 UART: [art] Populate DV Done
3,055,327 UART: [fht] FMC Alias Private Key: 7
3,056,483 UART: [art] Derive CDI
3,056,763 UART: [art] Store in slot 0x4
3,142,574 UART: [art] Derive Key Pair
3,142,934 UART: [art] Store priv key in slot 0x5
3,155,904 UART: [art] Derive Key Pair - Done
3,170,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,205 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,970 UART: [art] PUB.X = 5ED38AACDD1AE446099E324CC3433364423EC17293B8BB62EC5C13575570289BF454F5B0B88BDBF34148BEF5AE7AE88B
3,193,749 UART: [art] PUB.Y = 1E91EBA053511DFE493EB41D158C8C777FA39AEF8A4BA83C54FD0F30336785B1FA3C4D0F505266EC4C85554D645A4744
3,200,701 UART: [art] SIG.R = 249F0E810B72D1C6A03F123A7FB309DEB7FA929F275D4696B46BB477B4D04776AB10670CF313127365CBE585120E5615
3,207,454 UART: [art] SIG.S = 51CE6B88E6D789E41EAB7C3303C37DFE6D707AFE72AFBB464D599265DE6BA97688B65D834A5DB1BB9C19C55FBA3CB96D
3,231,233 UART: Caliptra RT
3,231,484 UART: [state] CFI Enabled
3,351,718 UART: [rt] RT listening for mailbox commands...
3,352,388 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,784 UART: [rt]cmd =0x41545348, len=116
3,384,669 >>> mbox cmd response data (12 bytes)
3,384,670 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,429 UART:
3,385,445 UART: Running Caliptra ROM ...
3,385,853 UART:
3,385,908 UART: [state] CFI Enabled
3,388,196 UART: [state] LifecycleState = Unprovisioned
3,388,851 UART: [state] DebugLocked = No
3,389,483 UART: [state] WD Timer not started. Device not locked for debugging
3,390,813 UART: [kat] SHA2-256
4,194,363 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,198,467 UART: [kat] ++
4,198,619 UART: [kat] sha1
4,202,759 UART: [kat] SHA2-256
4,204,699 UART: [kat] SHA2-384
4,207,490 UART: [kat] SHA2-512-ACC
4,209,390 UART: [kat] ECC-384
4,219,441 UART: [kat] HMAC-384Kdf
4,223,949 UART: [kat] LMS
4,472,261 UART: [kat] --
4,473,149 UART: [update-reset] ++
5,423,125 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,190 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,525,831 >>> mbox cmd response: success
5,525,831 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,526,130 UART: [update-reset] Copying MAN_2 To MAN_1
5,534,144 UART: [update-reset Success] --
5,535,363 UART: [state] Locking Datavault
5,536,067 UART: [state] Locking PCR0, PCR1 and PCR31
5,536,671 UART: [state] Locking ICCM
5,537,179 UART: [exit] Launching FMC @ 0x40000130
5,542,509 UART:
5,542,525 UART: Running Caliptra FMC ...
5,542,933 UART:
5,542,987 UART: [state] CFI Enabled
5,632,262 UART: [art] Extend RT PCRs Done
5,632,690 UART: [art] Lock RT PCRs Done
5,633,813 UART: [art] Populate DV Done
5,641,928 UART: [fht] FMC Alias Private Key: 7
5,642,962 UART: [art] Derive CDI
5,643,242 UART: [art] Store in slot 0x4
5,728,983 UART: [art] Derive Key Pair
5,729,343 UART: [art] Store priv key in slot 0x5
5,742,697 UART: [art] Derive Key Pair - Done
5,757,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,772,657 UART: [art] Erasing AUTHORITY.KEYID = 7
5,773,422 UART: [art] PUB.X = 556303C1217AC80633FD4CB0C394013735B784E0F8D68B44C8259ACDBC060AF19E73879D99EAE6F6E0A68E5BA901C909
5,780,175 UART: [art] PUB.Y = 2D245E8A77B54F57EEF611055FB75A436860E91D412BC8F255655D40E7FDA946524907AE9D9F39EF92F2BD645AA0B4A0
5,787,125 UART: [art] SIG.R = C4D5786646CDF304975E52DC3D0F8B1BDAF00081B7608BAD68EB5B0CF0738BBCA98E2235B61894FA06A46B01F03C0BA3
5,793,869 UART: [art] SIG.S = 1D75EFEF595B6ECC0AEEA94C874E05D4BBB0E2ED6F3A6B1DF49C18597BF477C8B7FBA600AE0861AFA4C0E74FE635A50F
5,817,961 UART: mbox::rt_entry...
5,818,333 UART: ____ _ _ _ ____ _____
5,819,117 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,819,917 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,820,685 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,821,453 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,822,221 UART: |_|
5,822,533 UART:
6,191,061 UART: [rt] Runtime listening for mailbox commands...
6,192,259 >>> mbox cmd response data (48 bytes)
6,192,260 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,195,047 >>> mbox cmd response data (48 bytes)
6,195,048 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,210,994 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,496 ready_for_fw is high
1,059,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,110 >>> mbox cmd response: success
2,740,547 UART:
2,740,563 UART: Running Caliptra FMC ...
2,740,971 UART:
2,741,025 UART: [state] CFI Enabled
2,751,673 UART: [fht] FMC Alias Private Key: 7
2,870,347 UART: [art] Extend RT PCRs Done
2,870,775 UART: [art] Lock RT PCRs Done
2,872,437 UART: [art] Populate DV Done
2,880,844 UART: [fht] FMC Alias Private Key: 7
2,881,790 UART: [art] Derive CDI
2,882,070 UART: [art] Store in slot 0x4
2,967,625 UART: [art] Derive Key Pair
2,967,985 UART: [art] Store priv key in slot 0x5
2,980,627 UART: [art] Derive Key Pair - Done
2,995,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,596 UART: [art] PUB.X = 86EC6D223DCEF757D01581CA8937F0CBE757D3D1DAAF8D27A8A540F134418A871AB1BA7B02C39990B45D4D001E8BDBEE
3,018,359 UART: [art] PUB.Y = 35DF0225909E83E31E72B4B2A9EBEE3DBF67B51421D01D0160CD57689AD9BCA84ECC8B1C764899C1DAF21D0A65E2A1A1
3,025,316 UART: [art] SIG.R = 2109E8863A8E8B7CEE1515288C8E8ACAD0B2A878E70179FD1960AEE219050140BAA2A8AA14DCB01423CB109E2ED8774D
3,032,084 UART: [art] SIG.S = E1EEF3D58BAB3B32D8B1EEE2576AEF5899339F0BE57C41F3E3035376F8083A5E8F8E5A1634B1054FB8C417597AC813D0
3,056,294 UART: Caliptra RT
3,056,545 UART: [state] CFI Enabled
3,176,062 UART: [rt] RT listening for mailbox commands...
3,176,732 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,306 UART: [rt]cmd =0x41545348, len=116
3,209,153 >>> mbox cmd response data (12 bytes)
3,209,154 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,235,083 >>> mbox cmd response: success
5,235,083 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,248,580 UART:
5,248,596 UART: Running Caliptra FMC ...
5,249,004 UART:
5,249,058 UART: [state] CFI Enabled
5,337,747 UART: [art] Extend RT PCRs Done
5,338,175 UART: [art] Lock RT PCRs Done
5,339,748 UART: [art] Populate DV Done
5,348,075 UART: [fht] FMC Alias Private Key: 7
5,349,237 UART: [art] Derive CDI
5,349,517 UART: [art] Store in slot 0x4
5,434,998 UART: [art] Derive Key Pair
5,435,358 UART: [art] Store priv key in slot 0x5
5,448,958 UART: [art] Derive Key Pair - Done
5,463,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,478,720 UART: [art] Erasing AUTHORITY.KEYID = 7
5,479,485 UART: [art] PUB.X = 640DEFC7C3D39F9DF5C76F92266B75C38DF25809EECD9A31833B10A867398A9CA6DB9604CEC29707B6D7D94CA76F13B4
5,486,255 UART: [art] PUB.Y = ECA5C2BA35FCB9EEDFDD7DE36267A0B194118479A4DED454F394D01C76953CAB8D6FD206A03A14FFDB67AA965E0D093D
5,493,220 UART: [art] SIG.R = BB919019CE636ED6FC34A6C7C32423E8F01556373BF0426538336D8B14DC8FC0A44A14F9BE529F453F942747C0481BDB
5,499,992 UART: [art] SIG.S = BC2F94C35588A79F79D8563F6E0C4E3475B516DB98E3C9D8C25AD297DCBD630E141ECABF7DCACB849A902C61B1D3D83E
5,524,234 UART: mbox::rt_entry...
5,524,606 UART: ____ _ _ _ ____ _____
5,525,390 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,526,190 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,526,958 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,527,726 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,528,494 UART: |_|
5,528,806 UART:
5,895,621 UART: [rt] Runtime listening for mailbox commands...
5,896,819 >>> mbox cmd response data (48 bytes)
5,896,820 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,899,607 >>> mbox cmd response data (48 bytes)
5,899,608 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,915,554 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,903 UART: [state] LifecycleState = Unprovisioned
85,558 UART: [state] DebugLocked = No
86,286 UART: [state] WD Timer not started. Device not locked for debugging
87,457 UART: [kat] SHA2-256
891,007 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,111 UART: [kat] ++
895,263 UART: [kat] sha1
899,409 UART: [kat] SHA2-256
901,349 UART: [kat] SHA2-384
904,046 UART: [kat] SHA2-512-ACC
905,947 UART: [kat] ECC-384
915,574 UART: [kat] HMAC-384Kdf
920,252 UART: [kat] LMS
1,168,564 UART: [kat] --
1,169,371 UART: [cold-reset] ++
1,169,743 UART: [fht] FHT @ 0x50003400
1,172,387 UART: [idev] ++
1,172,555 UART: [idev] CDI.KEYID = 6
1,172,916 UART: [idev] SUBJECT.KEYID = 7
1,173,341 UART: [idev] UDS.KEYID = 0
1,173,687 ready_for_fw is high
1,173,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,170 UART: [idev] Erasing UDS.KEYID = 0
1,198,514 UART: [idev] Sha1 KeyId Algorithm
1,207,446 UART: [idev] --
1,208,539 UART: [ldev] ++
1,208,707 UART: [ldev] CDI.KEYID = 6
1,209,071 UART: [ldev] SUBJECT.KEYID = 5
1,209,498 UART: [ldev] AUTHORITY.KEYID = 7
1,209,961 UART: [ldev] FE.KEYID = 1
1,215,397 UART: [ldev] Erasing FE.KEYID = 1
1,242,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,075 UART: [ldev] --
1,281,462 UART: [fwproc] Wait for Commands...
1,282,123 UART: [fwproc] Recv command 0x46574c44
1,282,856 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,232 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,407 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,736 >>> mbox cmd response: success
2,826,874 UART: [afmc] ++
2,827,042 UART: [afmc] CDI.KEYID = 6
2,827,405 UART: [afmc] SUBJECT.KEYID = 7
2,827,831 UART: [afmc] AUTHORITY.KEYID = 5
2,863,648 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,630 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,340 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,221 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,922 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,693 UART: [afmc] --
2,906,642 UART: [cold-reset] --
2,907,472 UART: [state] Locking Datavault
2,908,863 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,467 UART: [state] Locking ICCM
2,909,907 UART: [exit] Launching FMC @ 0x40000130
2,915,237 UART:
2,915,253 UART: Running Caliptra FMC ...
2,915,661 UART:
2,915,804 UART: [state] CFI Enabled
2,926,290 UART: [fht] FMC Alias Private Key: 7
3,045,212 UART: [art] Extend RT PCRs Done
3,045,640 UART: [art] Lock RT PCRs Done
3,047,090 UART: [art] Populate DV Done
3,055,445 UART: [fht] FMC Alias Private Key: 7
3,056,523 UART: [art] Derive CDI
3,056,803 UART: [art] Store in slot 0x4
3,142,634 UART: [art] Derive Key Pair
3,142,994 UART: [art] Store priv key in slot 0x5
3,155,810 UART: [art] Derive Key Pair - Done
3,170,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,295 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,060 UART: [art] PUB.X = F57193BE2B46B43D50F0359EA71A1C166B30A1C0B39BDE494577F274D8681C60D759BAE7CD935412E3DA549FF2EDEE2E
3,193,842 UART: [art] PUB.Y = 7358CDE1F7F601E3AD0D1BD58F537E5E2D59D2215D282A4FC4B66A71DB396EF4FDD5B877F8DBE56550FA515D03B4D52B
3,200,801 UART: [art] SIG.R = D36337E4D9FCE1C08BDA20EED39ACFC2F6934186BCE1484C6B03DB03A7208E88F26A754D5B63B2C3820868FF262238A1
3,207,572 UART: [art] SIG.S = 724983C1A8755EB09DA8E9E6DDC62D41F14A7644FE7394AB79F62E6B246DCC49FFD361EC752F7CF9B3B800B858DAE305
3,231,447 UART: Caliptra RT
3,231,790 UART: [state] CFI Enabled
3,350,503 UART: [rt] RT listening for mailbox commands...
3,351,173 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,721 UART: [rt]cmd =0x41545348, len=116
3,383,702 >>> mbox cmd response data (12 bytes)
3,383,703 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,280 UART:
3,384,296 UART: Running Caliptra ROM ...
3,384,704 UART:
3,384,846 UART: [state] CFI Enabled
3,387,900 UART: [state] LifecycleState = Unprovisioned
3,388,555 UART: [state] DebugLocked = No
3,389,135 UART: [state] WD Timer not started. Device not locked for debugging
3,390,291 UART: [kat] SHA2-256
4,193,841 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,197,945 UART: [kat] ++
4,198,097 UART: [kat] sha1
4,202,377 UART: [kat] SHA2-256
4,204,317 UART: [kat] SHA2-384
4,206,940 UART: [kat] SHA2-512-ACC
4,208,840 UART: [kat] ECC-384
4,218,331 UART: [kat] HMAC-384Kdf
4,222,945 UART: [kat] LMS
4,471,257 UART: [kat] --
4,472,257 UART: [update-reset] ++
5,421,273 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,422,250 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,523,891 >>> mbox cmd response: success
5,523,891 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,524,200 UART: [update-reset] Copying MAN_2 To MAN_1
5,532,214 UART: [update-reset Success] --
5,533,233 UART: [state] Locking Datavault
5,534,073 UART: [state] Locking PCR0, PCR1 and PCR31
5,534,677 UART: [state] Locking ICCM
5,535,275 UART: [exit] Launching FMC @ 0x40000130
5,540,605 UART:
5,540,621 UART: Running Caliptra FMC ...
5,541,029 UART:
5,541,172 UART: [state] CFI Enabled
5,630,237 UART: [art] Extend RT PCRs Done
5,630,665 UART: [art] Lock RT PCRs Done
5,631,896 UART: [art] Populate DV Done
5,640,327 UART: [fht] FMC Alias Private Key: 7
5,641,343 UART: [art] Derive CDI
5,641,623 UART: [art] Store in slot 0x4
5,727,238 UART: [art] Derive Key Pair
5,727,598 UART: [art] Store priv key in slot 0x5
5,741,462 UART: [art] Derive Key Pair - Done
5,756,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,771,910 UART: [art] Erasing AUTHORITY.KEYID = 7
5,772,675 UART: [art] PUB.X = DB5FDA214B57A80718C59F50FF89B384E22EB7295B285F307497937A564D4D9C1A6DF3D7618EAFB31697AC62A34A8B84
5,779,448 UART: [art] PUB.Y = 2497A93E4504A4325DE8BE593D45B67D5BD49A96E830CC8D497B4096911487A57ADE5B20A5CD7EBD68FC633862424231
5,786,395 UART: [art] SIG.R = 4E84871FCD2760A83F9CB8F24835D0B59FB3FF49F040FF34B8ED38C3765AD76F9B5185AD87D696364CB2D9C7270C63E6
5,793,170 UART: [art] SIG.S = F3D4E3C7AF5818654318DDA2C715B840A6988AB17BA7EB2C987DE080814B31C301BB0C20487D62D5D824E7CFA4AFF9FB
5,816,544 UART: mbox::rt_entry...
5,816,916 UART: ____ _ _ _ ____ _____
5,817,700 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,818,500 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,819,268 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,820,036 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,820,804 UART: |_|
5,821,116 UART:
6,189,666 UART: [rt] Runtime listening for mailbox commands...
6,190,864 >>> mbox cmd response data (48 bytes)
6,190,865 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,193,652 >>> mbox cmd response data (48 bytes)
6,193,653 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,209,599 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,011 ready_for_fw is high
1,060,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,135 >>> mbox cmd response: success
2,743,404 UART:
2,743,420 UART: Running Caliptra FMC ...
2,743,828 UART:
2,743,971 UART: [state] CFI Enabled
2,754,337 UART: [fht] FMC Alias Private Key: 7
2,873,619 UART: [art] Extend RT PCRs Done
2,874,047 UART: [art] Lock RT PCRs Done
2,875,793 UART: [art] Populate DV Done
2,883,804 UART: [fht] FMC Alias Private Key: 7
2,884,822 UART: [art] Derive CDI
2,885,102 UART: [art] Store in slot 0x4
2,970,959 UART: [art] Derive Key Pair
2,971,319 UART: [art] Store priv key in slot 0x5
2,984,857 UART: [art] Derive Key Pair - Done
2,999,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,619 UART: [art] PUB.X = 23ECF1023F839C66236F3E5C3A31A798941A60D82BCB966BB812B12AF048C102F01F9D2E47F68CB9F023CB198BB6A4F8
3,022,391 UART: [art] PUB.Y = BE0BD0AF2DFD5229EFF20D943B1D5F5A238B3F5CBCA53B1419967E31F6EBA909BBF0752E2308DA781ECD54CD9B7E77C5
3,029,353 UART: [art] SIG.R = 6A266C03B98C84FC18E15AF3DE8CAA104B9F9E317CFAF75F489B0D0D82A6C8DD2408F1C0672FD8C7F70543BB400B6A78
3,036,121 UART: [art] SIG.S = 5A8B89473A46E84D5DF82006962C83FC2E8EF32C032E229018C68C8623C1FB706D1DA16C111AD438149C65F8364ABAFA
3,059,735 UART: Caliptra RT
3,060,078 UART: [state] CFI Enabled
3,179,440 UART: [rt] RT listening for mailbox commands...
3,180,110 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,578 UART: [rt]cmd =0x41545348, len=116
3,212,277 >>> mbox cmd response data (12 bytes)
3,212,278 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,238,372 >>> mbox cmd response: success
5,238,372 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,251,817 UART:
5,251,833 UART: Running Caliptra FMC ...
5,252,241 UART:
5,252,384 UART: [state] CFI Enabled
5,341,151 UART: [art] Extend RT PCRs Done
5,341,579 UART: [art] Lock RT PCRs Done
5,342,988 UART: [art] Populate DV Done
5,351,325 UART: [fht] FMC Alias Private Key: 7
5,352,375 UART: [art] Derive CDI
5,352,655 UART: [art] Store in slot 0x4
5,437,852 UART: [art] Derive Key Pair
5,438,212 UART: [art] Store priv key in slot 0x5
5,451,718 UART: [art] Derive Key Pair - Done
5,466,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,481,892 UART: [art] Erasing AUTHORITY.KEYID = 7
5,482,657 UART: [art] PUB.X = 164458C90334D57B97A8955A66B96EF09D3FAD62A637213ED6C8F715F9656D2720B5C2AD780C816F4DB507B53B37D565
5,489,416 UART: [art] PUB.Y = 2CC53BB79954963DFFDA77BB20B8E3F05D65FA9165C2FF605908CC0D40EF78B1277E6EDA5041AEF4F7688297245B1FF8
5,496,372 UART: [art] SIG.R = 12DF4ED30C3ECC3C49F01F846B9F9444EB5E21DAB5E3CB5D4F750CA9B97D7A21C80F72B71E9F4689B6261073012930E5
5,503,140 UART: [art] SIG.S = 6253D645F419EE3AFD8448CEC1B26F2DC17F7A0703C87CFBF9B5FBCCD1F52F8A63F5898351BA817CA2B647FF4EE30402
5,527,344 UART: mbox::rt_entry...
5,527,716 UART: ____ _ _ _ ____ _____
5,528,500 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,529,300 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,530,068 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,530,836 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,531,604 UART: |_|
5,531,916 UART:
5,892,525 UART: [rt] Runtime listening for mailbox commands...
5,893,723 >>> mbox cmd response data (48 bytes)
5,893,724 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,896,511 >>> mbox cmd response data (48 bytes)
5,896,512 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,912,458 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,720 UART: [state] LifecycleState = Unprovisioned
86,375 UART: [state] DebugLocked = No
87,081 UART: [state] WD Timer not started. Device not locked for debugging
88,266 UART: [kat] SHA2-256
893,916 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,041 UART: [kat] ++
898,193 UART: [kat] sha1
902,441 UART: [kat] SHA2-256
904,381 UART: [kat] SHA2-384
907,242 UART: [kat] SHA2-512-ACC
909,143 UART: [kat] ECC-384
918,492 UART: [kat] HMAC-384Kdf
923,156 UART: [kat] LMS
1,171,484 UART: [kat] --
1,172,109 UART: [cold-reset] ++
1,172,459 UART: [fht] FHT @ 0x50003400
1,175,172 UART: [idev] ++
1,175,340 UART: [idev] CDI.KEYID = 6
1,175,700 UART: [idev] SUBJECT.KEYID = 7
1,176,124 UART: [idev] UDS.KEYID = 0
1,176,469 ready_for_fw is high
1,176,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,416 UART: [idev] Erasing UDS.KEYID = 0
1,201,563 UART: [idev] Sha1 KeyId Algorithm
1,209,995 UART: [idev] --
1,210,991 UART: [ldev] ++
1,211,159 UART: [ldev] CDI.KEYID = 6
1,211,522 UART: [ldev] SUBJECT.KEYID = 5
1,211,948 UART: [ldev] AUTHORITY.KEYID = 7
1,212,411 UART: [ldev] FE.KEYID = 1
1,217,283 UART: [ldev] Erasing FE.KEYID = 1
1,243,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,081 UART: [ldev] --
1,282,484 UART: [fwproc] Wait for Commands...
1,283,114 UART: [fwproc] Recv command 0x46574c44
1,283,842 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,710 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,880 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,141 >>> mbox cmd response: success
2,829,149 UART: [afmc] ++
2,829,317 UART: [afmc] CDI.KEYID = 6
2,829,679 UART: [afmc] SUBJECT.KEYID = 7
2,830,104 UART: [afmc] AUTHORITY.KEYID = 5
2,865,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,230 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,939 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,822 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,523 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,187 UART: [afmc] --
2,909,193 UART: [cold-reset] --
2,909,841 UART: [state] Locking Datavault
2,910,812 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,416 UART: [state] Locking ICCM
2,912,040 UART: [exit] Launching FMC @ 0x40000130
2,917,370 UART:
2,917,386 UART: Running Caliptra FMC ...
2,917,794 UART:
2,917,848 UART: [state] CFI Enabled
2,928,148 UART: [fht] FMC Alias Private Key: 7
3,047,346 UART: [art] Extend RT PCRs Done
3,047,774 UART: [art] Lock RT PCRs Done
3,049,610 UART: [art] Populate DV Done
3,057,729 UART: [fht] FMC Alias Private Key: 7
3,058,705 UART: [art] Derive CDI
3,058,985 UART: [art] Store in slot 0x4
3,144,478 UART: [art] Derive Key Pair
3,144,838 UART: [art] Store priv key in slot 0x5
3,157,284 UART: [art] Derive Key Pair - Done
3,172,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,816 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,581 UART: [art] PUB.X = 2FE2A7DA64B5687B45E58686A801FEBCCB088DFE930945CBCE8663390136F0B98479DD7091E42CA25B9F2DE648990CE1
3,195,344 UART: [art] PUB.Y = 985FC0D7C5F97A3D49B24A1DB3555B6F0A97BDF898F62465792B4E348E11C177F5FFDB99BCA722C324BA9F9D151849E7
3,202,301 UART: [art] SIG.R = BEACEC80C39103413FE0EBD0FB077453830BBC8E2834BB0D06C5F7DF58CF1AD690CDB33AA47AC149DC97A87E76A5BF3F
3,209,082 UART: [art] SIG.S = 477BB2668841211D99D8392879ACDAC1EB9BC17917370BEFD3914452CD48995BDE0429187D36B3DA8D93AE5D580A2FF8
3,233,013 UART: Caliptra RT
3,233,264 UART: [state] CFI Enabled
3,352,861 UART: [rt] RT listening for mailbox commands...
3,353,531 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,021 UART: [rt]cmd =0x41545348, len=116
3,385,730 >>> mbox cmd response data (12 bytes)
3,385,731 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,534 UART:
3,386,550 UART: Running Caliptra ROM ...
3,386,958 UART:
3,387,013 UART: [state] CFI Enabled
3,389,737 UART: [state] LifecycleState = Unprovisioned
3,390,392 UART: [state] DebugLocked = No
3,391,064 UART: [state] WD Timer not started. Device not locked for debugging
3,392,266 UART: [kat] SHA2-256
4,197,916 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,202,041 UART: [kat] ++
4,202,193 UART: [kat] sha1
4,206,263 UART: [kat] SHA2-256
4,208,203 UART: [kat] SHA2-384
4,211,122 UART: [kat] SHA2-512-ACC
4,213,022 UART: [kat] ECC-384
4,222,859 UART: [kat] HMAC-384Kdf
4,227,601 UART: [kat] LMS
4,475,929 UART: [kat] --
4,477,003 UART: [update-reset] ++
5,427,738 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,428,941 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,530,582 >>> mbox cmd response: success
5,530,582 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,530,863 UART: [update-reset] Copying MAN_2 To MAN_1
5,538,877 UART: [update-reset Success] --
5,539,892 UART: [state] Locking Datavault
5,540,844 UART: [state] Locking PCR0, PCR1 and PCR31
5,541,448 UART: [state] Locking ICCM
5,542,048 UART: [exit] Launching FMC @ 0x40000130
5,547,378 UART:
5,547,394 UART: Running Caliptra FMC ...
5,547,802 UART:
5,547,856 UART: [state] CFI Enabled
5,636,495 UART: [art] Extend RT PCRs Done
5,636,923 UART: [art] Lock RT PCRs Done
5,637,980 UART: [art] Populate DV Done
5,646,437 UART: [fht] FMC Alias Private Key: 7
5,647,579 UART: [art] Derive CDI
5,647,859 UART: [art] Store in slot 0x4
5,733,582 UART: [art] Derive Key Pair
5,733,942 UART: [art] Store priv key in slot 0x5
5,747,156 UART: [art] Derive Key Pair - Done
5,761,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,777,717 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,482 UART: [art] PUB.X = B56B73D9176D29F7F78E2F8D3CBBFF8ECAD233CDFB125BB2656557DCC5DD1983D8A3980673BF814B46BEF909BEF1DD37
5,785,268 UART: [art] PUB.Y = AF739DF596EE090EB1CBD0F8566A3430FD5A8A4FB0DC1A5F791B81F6EFC38333964CABA0FB1685CDD5D4128F1440392A
5,792,230 UART: [art] SIG.R = E940ED8F39B66042C1A7E683C98096572A26683B4983766FD626D65F6D787BECDF8C8216AAA2346B5CBC8CC0B50E66DE
5,799,005 UART: [art] SIG.S = 13C57855FE726F0DCB9CA00E6A00074CA0522C4BB4B283BB45B8A7AFCC7CE54D1667CFE1D5D0CF63BAE29633E64FB89A
5,823,498 UART: mbox::rt_entry...
5,823,870 UART: ____ _ _ _ ____ _____
5,824,654 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,825,454 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,826,222 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,826,990 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,827,758 UART: |_|
5,828,070 UART:
6,194,406 UART: [rt] Runtime listening for mailbox commands...
6,195,604 >>> mbox cmd response data (48 bytes)
6,195,605 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,198,392 >>> mbox cmd response data (48 bytes)
6,198,393 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,214,339 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,897 ready_for_fw is high
1,059,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,340 >>> mbox cmd response: success
2,739,163 UART:
2,739,179 UART: Running Caliptra FMC ...
2,739,587 UART:
2,739,641 UART: [state] CFI Enabled
2,750,117 UART: [fht] FMC Alias Private Key: 7
2,868,153 UART: [art] Extend RT PCRs Done
2,868,581 UART: [art] Lock RT PCRs Done
2,869,831 UART: [art] Populate DV Done
2,878,002 UART: [fht] FMC Alias Private Key: 7
2,879,054 UART: [art] Derive CDI
2,879,334 UART: [art] Store in slot 0x4
2,965,249 UART: [art] Derive Key Pair
2,965,609 UART: [art] Store priv key in slot 0x5
2,978,761 UART: [art] Derive Key Pair - Done
2,993,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,096 UART: [art] PUB.X = DA5AC69612CA7EE16422893691883D88C26B871C4784816C56382DFC357F58A178AB36C3BD40AA50D0A7E992C364809A
3,015,864 UART: [art] PUB.Y = FDDAF6A55E053DDE14E83B121D6C33AF9F199F9955C63565F08103FE0D28C9606B8737D6823BCD52D56F335F98691769
3,022,807 UART: [art] SIG.R = 65003B11D4DDE734B63FEDB276ABB020F4365991F7D3F80152E923B6B6F17014DCED9868F67F239DD4979EAEF7CB6F66
3,029,562 UART: [art] SIG.S = 7716163740A456A58A37DDEFEC40FEF92A97CF0272A03D2655F394AD01F73F49A76E9C2C56B3D7C08D1462BE5525906F
3,052,938 UART: Caliptra RT
3,053,189 UART: [state] CFI Enabled
3,172,499 UART: [rt] RT listening for mailbox commands...
3,173,169 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,497 UART: [rt]cmd =0x41545348, len=116
3,205,428 >>> mbox cmd response data (12 bytes)
3,205,429 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,232,569 >>> mbox cmd response: success
5,232,569 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,245,790 UART:
5,245,806 UART: Running Caliptra FMC ...
5,246,214 UART:
5,246,268 UART: [state] CFI Enabled
5,335,179 UART: [art] Extend RT PCRs Done
5,335,607 UART: [art] Lock RT PCRs Done
5,336,896 UART: [art] Populate DV Done
5,345,185 UART: [fht] FMC Alias Private Key: 7
5,346,231 UART: [art] Derive CDI
5,346,511 UART: [art] Store in slot 0x4
5,432,122 UART: [art] Derive Key Pair
5,432,482 UART: [art] Store priv key in slot 0x5
5,445,858 UART: [art] Derive Key Pair - Done
5,460,764 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,476,331 UART: [art] Erasing AUTHORITY.KEYID = 7
5,477,096 UART: [art] PUB.X = 0FEF04FFE14DC7933CAC120775988557A47FFFD5E851540FDB43940833D8C33810FECF50348E227E1BD7D5504E12FE2C
5,483,859 UART: [art] PUB.Y = 1F3AA59B62EBC202E18AB100D92739084B6DC4B2EA324990B1E1906568AB29A069102C1E515AF257F511413B4DA57FCA
5,490,785 UART: [art] SIG.R = AF42DC283203246D5117ED61121583DD820B6924B56C86982E15C73EDA6E779D0743C59DDA3E27B76CD1362CB46F052E
5,497,543 UART: [art] SIG.S = C9287DE24401EE65B5B80BCF8272B31BB086B3CFC8B76E2DB73E3DF34DFCD226662ECEB3471A44BF83D29C073D065735
5,521,433 UART: mbox::rt_entry...
5,521,805 UART: ____ _ _ _ ____ _____
5,522,589 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,523,389 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,524,157 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,524,925 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,525,693 UART: |_|
5,526,005 UART:
5,892,036 UART: [rt] Runtime listening for mailbox commands...
5,893,234 >>> mbox cmd response data (48 bytes)
5,893,235 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,896,022 >>> mbox cmd response data (48 bytes)
5,896,023 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,911,969 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
893,521 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,646 UART: [kat] ++
897,798 UART: [kat] sha1
902,190 UART: [kat] SHA2-256
904,130 UART: [kat] SHA2-384
906,875 UART: [kat] SHA2-512-ACC
908,776 UART: [kat] ECC-384
918,643 UART: [kat] HMAC-384Kdf
923,143 UART: [kat] LMS
1,171,471 UART: [kat] --
1,172,272 UART: [cold-reset] ++
1,172,722 UART: [fht] FHT @ 0x50003400
1,175,307 UART: [idev] ++
1,175,475 UART: [idev] CDI.KEYID = 6
1,175,835 UART: [idev] SUBJECT.KEYID = 7
1,176,259 UART: [idev] UDS.KEYID = 0
1,176,604 ready_for_fw is high
1,176,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,041 UART: [idev] Erasing UDS.KEYID = 0
1,201,452 UART: [idev] Sha1 KeyId Algorithm
1,209,982 UART: [idev] --
1,210,874 UART: [ldev] ++
1,211,042 UART: [ldev] CDI.KEYID = 6
1,211,405 UART: [ldev] SUBJECT.KEYID = 5
1,211,831 UART: [ldev] AUTHORITY.KEYID = 7
1,212,294 UART: [ldev] FE.KEYID = 1
1,217,682 UART: [ldev] Erasing FE.KEYID = 1
1,244,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,302 UART: [ldev] --
1,283,619 UART: [fwproc] Wait for Commands...
1,284,397 UART: [fwproc] Recv command 0x46574c44
1,285,125 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,409 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,579 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,972 >>> mbox cmd response: success
2,828,226 UART: [afmc] ++
2,828,394 UART: [afmc] CDI.KEYID = 6
2,828,756 UART: [afmc] SUBJECT.KEYID = 7
2,829,181 UART: [afmc] AUTHORITY.KEYID = 5
2,864,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,571 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,319 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,028 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,911 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,612 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,646 UART: [afmc] --
2,908,708 UART: [cold-reset] --
2,909,286 UART: [state] Locking Datavault
2,910,491 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,095 UART: [state] Locking ICCM
2,911,633 UART: [exit] Launching FMC @ 0x40000130
2,916,963 UART:
2,916,979 UART: Running Caliptra FMC ...
2,917,387 UART:
2,917,530 UART: [state] CFI Enabled
2,927,990 UART: [fht] FMC Alias Private Key: 7
3,047,112 UART: [art] Extend RT PCRs Done
3,047,540 UART: [art] Lock RT PCRs Done
3,048,944 UART: [art] Populate DV Done
3,056,921 UART: [fht] FMC Alias Private Key: 7
3,057,941 UART: [art] Derive CDI
3,058,221 UART: [art] Store in slot 0x4
3,143,820 UART: [art] Derive Key Pair
3,144,180 UART: [art] Store priv key in slot 0x5
3,157,480 UART: [art] Derive Key Pair - Done
3,172,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,565 UART: [art] PUB.X = FA98E14C4F036562B31DD8E8F71F2A61472E39D2DBA54A4CC871DC858AD61D9DADCC6DF2250901071DE9E79C0A1BB948
3,195,336 UART: [art] PUB.Y = 9B0451F4AECBB8CFE2726366B3FBD7220F87985788BE0A8D9F93D30DDDBBBC8D173344DE5428260B4C8BC90F71516DD2
3,202,282 UART: [art] SIG.R = 415E1CFE0F8F74CE74A9A85C1ACF542C51849BA35875FB51AE82C7C3522277228E804254EE16082302E7382298EEE0EC
3,209,045 UART: [art] SIG.S = 4452282C2B4B54A595B95F0E5D25BE047B069DA00339765C4A816C4CC2D4F2A91093255DE57FA1A083F8288F7FFC650A
3,232,932 UART: Caliptra RT
3,233,275 UART: [state] CFI Enabled
3,353,345 UART: [rt] RT listening for mailbox commands...
3,354,015 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,791 UART: [rt]cmd =0x41545348, len=116
3,386,808 >>> mbox cmd response data (12 bytes)
3,386,809 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,466 UART:
3,387,482 UART: Running Caliptra ROM ...
3,387,890 UART:
3,388,032 UART: [state] CFI Enabled
3,390,910 UART: [state] LifecycleState = Unprovisioned
3,391,565 UART: [state] DebugLocked = No
3,392,149 UART: [state] WD Timer not started. Device not locked for debugging
3,393,337 UART: [kat] SHA2-256
4,198,987 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,203,112 UART: [kat] ++
4,203,264 UART: [kat] sha1
4,207,700 UART: [kat] SHA2-256
4,209,640 UART: [kat] SHA2-384
4,212,313 UART: [kat] SHA2-512-ACC
4,214,213 UART: [kat] ECC-384
4,224,164 UART: [kat] HMAC-384Kdf
4,228,606 UART: [kat] LMS
4,476,934 UART: [kat] --
4,477,556 UART: [update-reset] ++
5,427,699 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,428,888 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,530,529 >>> mbox cmd response: success
5,530,529 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,530,760 UART: [update-reset] Copying MAN_2 To MAN_1
5,538,774 UART: [update-reset Success] --
5,539,789 UART: [state] Locking Datavault
5,540,633 UART: [state] Locking PCR0, PCR1 and PCR31
5,541,237 UART: [state] Locking ICCM
5,541,845 UART: [exit] Launching FMC @ 0x40000130
5,547,175 UART:
5,547,191 UART: Running Caliptra FMC ...
5,547,599 UART:
5,547,742 UART: [state] CFI Enabled
5,637,043 UART: [art] Extend RT PCRs Done
5,637,471 UART: [art] Lock RT PCRs Done
5,639,070 UART: [art] Populate DV Done
5,647,245 UART: [fht] FMC Alias Private Key: 7
5,648,223 UART: [art] Derive CDI
5,648,503 UART: [art] Store in slot 0x4
5,734,566 UART: [art] Derive Key Pair
5,734,926 UART: [art] Store priv key in slot 0x5
5,748,566 UART: [art] Derive Key Pair - Done
5,763,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,778,746 UART: [art] Erasing AUTHORITY.KEYID = 7
5,779,511 UART: [art] PUB.X = 06857539FB45D9DCE37FB884AC8659CD73E79F71B21CC6E99F16A42EC2999F49D123E25252A4DC8EA350BDCC4335BE93
5,786,288 UART: [art] PUB.Y = F5759246F06FF1522FDC759CBADA3CE5CC04B438FB394FE5D2A075F5CBF1B656FE8789D57D2B8CFEB22BF2CD4A01E4E7
5,793,258 UART: [art] SIG.R = 7E3421F848335CFD15F3BA0E0C4F8B6FABC171792459646EED4EAF889C1669BF73E7B04F6549C0C31593B11DF9E36612
5,800,028 UART: [art] SIG.S = D7646087ED0BFE62F2D37B690FC2D1EA9DF10634C6AF17D39351D1D389FBFF7C75817D5453F6A768B325900D6EA42556
5,823,924 UART: mbox::rt_entry...
5,824,296 UART: ____ _ _ _ ____ _____
5,825,080 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,825,880 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,826,648 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,827,416 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,828,184 UART: |_|
5,828,496 UART:
6,192,792 UART: [rt] Runtime listening for mailbox commands...
6,193,990 >>> mbox cmd response data (48 bytes)
6,193,991 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,196,778 >>> mbox cmd response data (48 bytes)
6,196,779 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,212,725 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,218 ready_for_fw is high
1,061,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,795 >>> mbox cmd response: success
2,740,996 UART:
2,741,012 UART: Running Caliptra FMC ...
2,741,420 UART:
2,741,563 UART: [state] CFI Enabled
2,751,811 UART: [fht] FMC Alias Private Key: 7
2,871,121 UART: [art] Extend RT PCRs Done
2,871,549 UART: [art] Lock RT PCRs Done
2,873,151 UART: [art] Populate DV Done
2,881,200 UART: [fht] FMC Alias Private Key: 7
2,882,190 UART: [art] Derive CDI
2,882,470 UART: [art] Store in slot 0x4
2,968,485 UART: [art] Derive Key Pair
2,968,845 UART: [art] Store priv key in slot 0x5
2,981,989 UART: [art] Derive Key Pair - Done
2,996,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,908 UART: [art] PUB.X = FAAD9B48F7910FF420156CC718D3366FA333638057535DD748B914B5983E6A27CC74E322C044BF5EBEAB3D6EA203A31D
3,019,680 UART: [art] PUB.Y = 846834F5931652CEBDE30944B2DAAB634F5F145092E9C16F474078877589689C64FB846F73FFA6C777BDFAB950CA93EA
3,026,631 UART: [art] SIG.R = E82F63B09C853BFD678B20835A6B857FD8E5C01532CDFEB23A9B320F7DE55BF3ED966748EBCF055C98C9F10538DB9787
3,033,404 UART: [art] SIG.S = D43E9BC8665E8CE5349A1AB4711396F6469B29A3F8060786C144500880B15D9B9A2374C6ED095786063A3615BF7F7707
3,057,388 UART: Caliptra RT
3,057,731 UART: [state] CFI Enabled
3,177,549 UART: [rt] RT listening for mailbox commands...
3,178,219 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,701 UART: [rt]cmd =0x41545348, len=116
3,210,148 >>> mbox cmd response data (12 bytes)
3,210,149 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,238,234 >>> mbox cmd response: success
5,238,234 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,251,499 UART:
5,251,515 UART: Running Caliptra FMC ...
5,251,923 UART:
5,252,066 UART: [state] CFI Enabled
5,341,585 UART: [art] Extend RT PCRs Done
5,342,013 UART: [art] Lock RT PCRs Done
5,343,180 UART: [art] Populate DV Done
5,351,321 UART: [fht] FMC Alias Private Key: 7
5,352,389 UART: [art] Derive CDI
5,352,669 UART: [art] Store in slot 0x4
5,438,644 UART: [art] Derive Key Pair
5,439,004 UART: [art] Store priv key in slot 0x5
5,452,984 UART: [art] Derive Key Pair - Done
5,467,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,483,153 UART: [art] Erasing AUTHORITY.KEYID = 7
5,483,918 UART: [art] PUB.X = A42AF8D7D75C7C7CE239CF3311CF6AF20EE842E629EFBB13C8EF900D032EFCA936218D9A965546DB14011085DDC63E61
5,490,690 UART: [art] PUB.Y = C31B43D481658EBE5A9E3F70EB5C65232A7CA448A21C0DD6BA0B1728AECB03A9F19DB1D22C34B4E34CCD9EED41658B0B
5,497,650 UART: [art] SIG.R = 2079ED598952C1C3E234F34CBCF3AF8727E0B969E505CEDE7AE1005811EF11205B7D0CEED3BF28768AA15A97A1CEC98C
5,504,408 UART: [art] SIG.S = BEF7FF4E3E676324AE2A300449B54470FB30D65F1C4103A14A12EC6F0F208E1F638F6E3120E2C276210BB045A702CB4A
5,528,439 UART: mbox::rt_entry...
5,528,811 UART: ____ _ _ _ ____ _____
5,529,595 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,530,395 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,531,163 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,531,931 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,532,699 UART: |_|
5,533,011 UART:
5,895,073 UART: [rt] Runtime listening for mailbox commands...
5,896,271 >>> mbox cmd response data (48 bytes)
5,896,272 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,899,059 >>> mbox cmd response data (48 bytes)
5,899,060 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,915,006 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,091 UART:
192,460 UART: Running Caliptra ROM ...
193,654 UART:
193,809 UART: [state] CFI Enabled
261,151 UART: [state] LifecycleState = Unprovisioned
263,071 UART: [state] DebugLocked = No
264,825 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,417 UART: [kat] SHA2-256
439,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,624 UART: [kat] ++
450,103 UART: [kat] sha1
461,976 UART: [kat] SHA2-256
464,635 UART: [kat] SHA2-384
470,841 UART: [kat] SHA2-512-ACC
473,212 UART: [kat] ECC-384
2,765,004 UART: [kat] HMAC-384Kdf
2,778,240 UART: [kat] LMS
3,968,510 UART: [kat] --
3,974,230 UART: [cold-reset] ++
3,976,166 UART: [fht] Storing FHT @ 0x50003400
3,986,574 UART: [idev] ++
3,987,141 UART: [idev] CDI.KEYID = 6
3,988,096 UART: [idev] SUBJECT.KEYID = 7
3,989,344 UART: [idev] UDS.KEYID = 0
3,990,362 ready_for_fw is high
3,990,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,437 UART: [idev] Erasing UDS.KEYID = 0
7,321,937 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,875 UART: [idev] --
7,347,039 UART: [ldev] ++
7,347,609 UART: [ldev] CDI.KEYID = 6
7,348,555 UART: [ldev] SUBJECT.KEYID = 5
7,349,785 UART: [ldev] AUTHORITY.KEYID = 7
7,350,946 UART: [ldev] FE.KEYID = 1
7,379,178 UART: [ldev] Erasing FE.KEYID = 1
10,713,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,605 UART: [ldev] --
13,093,387 UART: [fwproc] Waiting for Commands...
13,094,993 UART: [fwproc] Received command 0x46574c44
13,097,182 UART: [fwproc] Received Image of size 118548 bytes
17,208,784 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,291,736 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,364,877 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,693,466 >>> mbox cmd response: success
17,697,469 UART: [afmc] ++
17,698,036 UART: [afmc] CDI.KEYID = 6
17,698,983 UART: [afmc] SUBJECT.KEYID = 7
17,700,227 UART: [afmc] AUTHORITY.KEYID = 5
21,065,506 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,366,509 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,368,812 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,383,207 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,397,959 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,412,383 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,434,590 UART: [afmc] --
23,438,276 UART: [cold-reset] --
23,442,252 UART: [state] Locking Datavault
23,447,881 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,647 UART: [state] Locking ICCM
23,452,077 UART: [exit] Launching FMC @ 0x40000130
23,460,450 UART:
23,460,690 UART: Running Caliptra FMC ...
23,461,792 UART:
23,461,960 UART: [state] CFI Enabled
23,524,292 UART: [fht] FMC Alias Private Key: 7
25,865,095 UART: [art] Extend RT PCRs Done
25,866,320 UART: [art] Lock RT PCRs Done
25,868,189 UART: [art] Populate DV Done
25,873,489 UART: [fht] FMC Alias Private Key: 7
25,875,186 UART: [art] Derive CDI
25,876,003 UART: [art] Store in slot 0x4
25,934,780 UART: [art] Derive Key Pair
25,935,815 UART: [art] Store priv key in slot 0x5
29,228,334 UART: [art] Derive Key Pair - Done
29,241,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,529,216 UART: [art] Erasing AUTHORITY.KEYID = 7
31,530,742 UART: [art] PUB.X = 5196BF89AE4BE3FC5505503D64CEA74A360BF6D908E72A306952BB4A92A1ECBE166C535F8CBA9FFA3158EC5A6173D2D3
31,538,017 UART: [art] PUB.Y = 5698BC552780CE025405408A46CF974A63F7DFF7F441BF1AA3B7336BE7D84E450F8F984354E4484B4F1C3B1CD3779F56
31,545,279 UART: [art] SIG.R = B8032A726174AB891D6308F03AFB97902D522F53AB3B6B5641219475321EB0A547300C45134AC7BE9D3834AAF2045AFD
31,552,640 UART: [art] SIG.S = ED355157D121124B1E4ABB76BEA97F875CD3ED6FD38F7636F41092D8A0A24E5A51484FC3B5F7C46EE2CFB6C2F3C33347
32,857,659 UART: Caliptra RT
32,858,396 UART: [state] CFI Enabled
33,055,047 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,121,473 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,276,833 UART: [rt]cmd =0x41544d4e, len=14344
42,577,064 >>> mbox cmd response data (8 bytes)
42,577,663 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,608,345 UART: [rt]cmd =0x41545348, len=116
42,610,495 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,803,309 ready_for_fw is high
3,804,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,952,084 >>> mbox cmd response: success
23,647,686 UART:
23,648,116 UART: Running Caliptra FMC ...
23,649,278 UART:
23,649,442 UART: [state] CFI Enabled
23,715,482 UART: [fht] FMC Alias Private Key: 7
26,056,142 UART: [art] Extend RT PCRs Done
26,057,381 UART: [art] Lock RT PCRs Done
26,059,062 UART: [art] Populate DV Done
26,064,607 UART: [fht] FMC Alias Private Key: 7
26,066,059 UART: [art] Derive CDI
26,066,807 UART: [art] Store in slot 0x4
26,123,129 UART: [art] Derive Key Pair
26,124,171 UART: [art] Store priv key in slot 0x5
29,416,615 UART: [art] Derive Key Pair - Done
29,429,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,718,150 UART: [art] Erasing AUTHORITY.KEYID = 7
31,719,672 UART: [art] PUB.X = 6416DFCB797D41DEAF2711BAB7462BD4000DC07690698BE9EBEA13242C1F21BAC027A61F442DDB148062BFDE9903F800
31,726,898 UART: [art] PUB.Y = FB573BBE533B86002BFCBD96F2AF183384C9E23F0587C0BDD5EF3CC7938B83C25534FBCE5CB9A4FBFA8D20F9D9A9B8BE
31,734,184 UART: [art] SIG.R = 6C2400B2A6BFEF8231F283DCC5279DAC9F065F900C6ED444AC4A72102D95F2F5AEDBA4AE1AD36431FD36FCA6A595190E
31,741,587 UART: [art] SIG.S = D35F2B6D2F2FF570FC1907A806988A40F53D0BDF38403BD560A4B2E1BFD2495C975CD3DE9D5218F6CA0B23CB3E10C2BF
33,047,528 UART: Caliptra RT
33,048,298 UART: [state] CFI Enabled
33,244,520 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,312,358 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,467,839 UART: [rt]cmd =0x41544d4e, len=14344
42,768,473 >>> mbox cmd response data (8 bytes)
42,769,065 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,799,865 UART: [rt]cmd =0x41545348, len=116
42,802,233 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,377 UART:
192,738 UART: Running Caliptra ROM ...
193,868 UART:
603,527 UART: [state] CFI Enabled
617,708 UART: [state] LifecycleState = Unprovisioned
619,647 UART: [state] DebugLocked = No
622,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,511 UART: [kat] SHA2-256
797,254 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,789 UART: [kat] ++
808,330 UART: [kat] sha1
818,699 UART: [kat] SHA2-256
821,414 UART: [kat] SHA2-384
828,317 UART: [kat] SHA2-512-ACC
830,678 UART: [kat] ECC-384
3,113,711 UART: [kat] HMAC-384Kdf
3,124,168 UART: [kat] LMS
4,314,256 UART: [kat] --
4,319,692 UART: [cold-reset] ++
4,321,971 UART: [fht] Storing FHT @ 0x50003400
4,333,507 UART: [idev] ++
4,334,070 UART: [idev] CDI.KEYID = 6
4,334,948 UART: [idev] SUBJECT.KEYID = 7
4,336,258 UART: [idev] UDS.KEYID = 0
4,337,255 ready_for_fw is high
4,337,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,421 UART: [idev] Erasing UDS.KEYID = 0
7,626,954 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,061 UART: [idev] --
7,652,087 UART: [ldev] ++
7,652,669 UART: [ldev] CDI.KEYID = 6
7,653,634 UART: [ldev] SUBJECT.KEYID = 5
7,654,841 UART: [ldev] AUTHORITY.KEYID = 7
7,656,122 UART: [ldev] FE.KEYID = 1
7,666,333 UART: [ldev] Erasing FE.KEYID = 1
10,958,378 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,674 UART: [ldev] --
13,319,737 UART: [fwproc] Waiting for Commands...
13,321,493 UART: [fwproc] Received command 0x46574c44
13,323,677 UART: [fwproc] Received Image of size 118548 bytes
17,429,341 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,012 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,187 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,170 >>> mbox cmd response: success
17,906,502 UART: [afmc] ++
17,907,090 UART: [afmc] CDI.KEYID = 6
17,908,004 UART: [afmc] SUBJECT.KEYID = 7
17,909,277 UART: [afmc] AUTHORITY.KEYID = 5
21,224,364 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,507 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,747 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,182 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,883 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,381 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,346 UART: [afmc] --
23,589,318 UART: [cold-reset] --
23,594,091 UART: [state] Locking Datavault
23,599,716 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,461 UART: [state] Locking ICCM
23,603,826 UART: [exit] Launching FMC @ 0x40000130
23,612,223 UART:
23,612,450 UART: Running Caliptra FMC ...
23,613,540 UART:
23,613,697 UART: [state] CFI Enabled
23,621,713 UART: [fht] FMC Alias Private Key: 7
25,961,605 UART: [art] Extend RT PCRs Done
25,962,822 UART: [art] Lock RT PCRs Done
25,964,392 UART: [art] Populate DV Done
25,969,853 UART: [fht] FMC Alias Private Key: 7
25,971,353 UART: [art] Derive CDI
25,972,110 UART: [art] Store in slot 0x4
26,014,913 UART: [art] Derive Key Pair
26,015,914 UART: [art] Store priv key in slot 0x5
29,258,430 UART: [art] Derive Key Pair - Done
29,271,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,833 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,334 UART: [art] PUB.X = 76CC6D42B92BB39B3CC2383B7689D0E3B8E41C9CF743BD5697EDAA2080E59B0F332BAD5BB5084F5E615F697B07DB3097
31,560,664 UART: [art] PUB.Y = BEBEE7E73FDB8097BAD81560C0EEB3440A2B283617A3067B60E396F8B569291E41D3739DF2AFC480C8716CC24D670130
31,567,908 UART: [art] SIG.R = 01725FADD303FE40EB30B37B1C08C991DA8C1ECA04CEFA305684802F4EFE2A1092E9CB5B748CE3A4591655DBD30C0EA8
31,575,310 UART: [art] SIG.S = B3AAEFA4557410818ECAA17D4C32DF1EC6AD98FE2501B514E87985F06B6313411978F875BED2ADDAFC002CBBC8AE9EAA
32,880,594 UART: Caliptra RT
32,881,328 UART: [state] CFI Enabled
33,014,574 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,077,539 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,233,135 UART: [rt]cmd =0x41544d4e, len=14344
42,534,228 >>> mbox cmd response data (8 bytes)
42,535,363 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,566,133 UART: [rt]cmd =0x41545348, len=116
42,568,403 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
4,127,904 ready_for_fw is high
4,128,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,414 >>> mbox cmd response: success
23,797,213 UART:
23,797,644 UART: Running Caliptra FMC ...
23,798,760 UART:
23,798,910 UART: [state] CFI Enabled
23,806,476 UART: [fht] FMC Alias Private Key: 7
26,146,609 UART: [art] Extend RT PCRs Done
26,147,845 UART: [art] Lock RT PCRs Done
26,149,525 UART: [art] Populate DV Done
26,154,835 UART: [fht] FMC Alias Private Key: 7
26,156,478 UART: [art] Derive CDI
26,157,286 UART: [art] Store in slot 0x4
26,199,669 UART: [art] Derive Key Pair
26,200,707 UART: [art] Store priv key in slot 0x5
29,443,314 UART: [art] Derive Key Pair - Done
29,456,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,689 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,194 UART: [art] PUB.X = 132AB18756931485761CDBE7FD60F29FF33B50A3A40BFCE6497D348984554B50B255E0A61CB2F174F7DEDCDCA2F4EB1D
31,745,518 UART: [art] PUB.Y = 2F310489C6A2B7FEE9A541AE3B42B2A3D058643AA01CF1B0E970B40F1447AD31BECE290FBF5BA04C31F2363EF351F6C2
31,752,769 UART: [art] SIG.R = B403C0C61728B5A955224BDA6549FEBD4CF673987444556001F711711315A466F8D30D9FA9D5C4E8851BFD95CFF7905F
31,760,104 UART: [art] SIG.S = 8E4A25AF7C3E9F489B48117EF0EEB592B6E75DB3F601536905E9723A9FEE7F187FBB8B74D798D9D9453A98DE725107E4
33,065,600 UART: Caliptra RT
33,066,319 UART: [state] CFI Enabled
33,200,131 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,268,636 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,424,366 UART: [rt]cmd =0x41544d4e, len=14344
42,725,357 >>> mbox cmd response data (8 bytes)
42,725,951 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,756,699 UART: [rt]cmd =0x41545348, len=116
42,758,725 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,120 UART:
192,487 UART: Running Caliptra ROM ...
193,672 UART:
193,823 UART: [state] CFI Enabled
266,937 UART: [state] LifecycleState = Unprovisioned
268,861 UART: [state] DebugLocked = No
270,968 UART: [state] WD Timer not started. Device not locked for debugging
275,359 UART: [kat] SHA2-256
455,035 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,818 UART: [kat] ++
466,272 UART: [kat] sha1
476,855 UART: [kat] SHA2-256
479,507 UART: [kat] SHA2-384
485,145 UART: [kat] SHA2-512-ACC
487,504 UART: [kat] ECC-384
2,947,881 UART: [kat] HMAC-384Kdf
2,970,770 UART: [kat] LMS
3,447,263 UART: [kat] --
3,452,071 UART: [cold-reset] ++
3,454,441 UART: [fht] FHT @ 0x50003400
3,464,090 UART: [idev] ++
3,464,653 UART: [idev] CDI.KEYID = 6
3,465,679 UART: [idev] SUBJECT.KEYID = 7
3,466,849 UART: [idev] UDS.KEYID = 0
3,467,787 ready_for_fw is high
3,467,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,052 UART: [idev] Erasing UDS.KEYID = 0
5,986,499 UART: [idev] Sha1 KeyId Algorithm
6,010,039 UART: [idev] --
6,015,111 UART: [ldev] ++
6,015,677 UART: [ldev] CDI.KEYID = 6
6,016,612 UART: [ldev] SUBJECT.KEYID = 5
6,017,820 UART: [ldev] AUTHORITY.KEYID = 7
6,019,104 UART: [ldev] FE.KEYID = 1
6,057,393 UART: [ldev] Erasing FE.KEYID = 1
8,563,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,375 UART: [ldev] --
10,371,093 UART: [fwproc] Wait for Commands...
10,372,702 UART: [fwproc] Recv command 0x46574c44
10,374,736 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,832 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,889 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,566 >>> mbox cmd response: success
14,344,269 UART: [afmc] ++
14,344,879 UART: [afmc] CDI.KEYID = 6
14,345,849 UART: [afmc] SUBJECT.KEYID = 7
14,347,007 UART: [afmc] AUTHORITY.KEYID = 5
16,894,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,228 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,399 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,233 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,281 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,835 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,052 UART: [afmc] --
18,715,356 UART: [cold-reset] --
18,719,861 UART: [state] Locking Datavault
18,724,618 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,365 UART: [state] Locking ICCM
18,728,863 UART: [exit] Launching FMC @ 0x40000130
18,737,255 UART:
18,737,484 UART: Running Caliptra FMC ...
18,738,507 UART:
18,738,651 UART: [state] CFI Enabled
18,794,325 UART: [fht] FMC Alias Private Key: 7
20,560,486 UART: [art] Extend RT PCRs Done
20,561,701 UART: [art] Lock RT PCRs Done
20,563,452 UART: [art] Populate DV Done
20,568,699 UART: [fht] FMC Alias Private Key: 7
20,570,394 UART: [art] Derive CDI
20,571,204 UART: [art] Store in slot 0x4
20,626,539 UART: [art] Derive Key Pair
20,627,575 UART: [art] Store priv key in slot 0x5
23,090,060 UART: [art] Derive Key Pair - Done
23,103,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,815,700 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,206 UART: [art] PUB.X = 581BDF9187796445B78A685AE13438F5E276979710AEBAA2EA4317FDEE3E00CA171FA8D01DEB1D8B1E5DC8F3A9F72039
24,824,469 UART: [art] PUB.Y = B9CB7A3646D4800C3D4298F3E57F57B071B43B1A44096B9AB813D1BE4A1E43F62620A28016E2AD2AE89B30F562869DB6
24,831,758 UART: [art] SIG.R = 66EF4DD93257049A3AB05A8838DF1ABCF517A17AE5171B49E2671A4C9E98BA69C34BB5241ECF43ADBA68C8FF2901B9A3
24,839,148 UART: [art] SIG.S = 186E62292A11D0BF08D06E5D8A010F821CAA226AA5F6156635A7851BB21635A6F792D300049ACDF9AE3134C8DB7B0442
25,818,040 UART: Caliptra RT
25,818,742 UART: [state] CFI Enabled
25,998,283 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,035,433 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,190,904 UART: [rt]cmd =0x41544d4e, len=14344
34,186,576 >>> mbox cmd response data (8 bytes)
34,187,166 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,217,757 UART: [rt]cmd =0x41545348, len=116
34,219,996 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,460,426 ready_for_fw is high
3,460,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,230,966 >>> mbox cmd response: success
18,513,923 UART:
18,514,327 UART: Running Caliptra FMC ...
18,515,466 UART:
18,515,622 UART: [state] CFI Enabled
18,581,256 UART: [fht] FMC Alias Private Key: 7
20,347,443 UART: [art] Extend RT PCRs Done
20,348,661 UART: [art] Lock RT PCRs Done
20,350,336 UART: [art] Populate DV Done
20,355,586 UART: [fht] FMC Alias Private Key: 7
20,357,177 UART: [art] Derive CDI
20,357,988 UART: [art] Store in slot 0x4
20,413,782 UART: [art] Derive Key Pair
20,414,821 UART: [art] Store priv key in slot 0x5
22,877,344 UART: [art] Derive Key Pair - Done
22,890,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,369 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,865 UART: [art] PUB.X = D88A7556F2030741227C07D0020C842B79E4A4670F5098DC5B6EF8F396297FB8ADE857B4AA3191A6D06F31ED9BAAB6C2
24,612,170 UART: [art] PUB.Y = 0A441458B48CD0E574162C56F2E08A3C18434202DDF328F3956B28A516308905165D365C87F84B9CC874C861BC12279F
24,619,362 UART: [art] SIG.R = F4A5F11551DCEA9625DC889F50CD9D33075D7821281DA59A812A94DB34AA88B8AF3AE930DD0EB05E0E23AE3B9467B4F3
24,626,771 UART: [art] SIG.S = C091CBBE764F6CC33C4B894F9E60AD53AE34C4CCB917D9E6B70507500AEF73903B280C7D851EAABA14C12424BCA64B6A
25,605,778 UART: Caliptra RT
25,606,473 UART: [state] CFI Enabled
25,786,977 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,828,914 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,984,770 UART: [rt]cmd =0x41544d4e, len=14344
33,980,847 >>> mbox cmd response data (8 bytes)
33,981,441 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,012,289 UART: [rt]cmd =0x41545348, len=116
34,014,707 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,529 UART:
192,901 UART: Running Caliptra ROM ...
194,092 UART:
603,852 UART: [state] CFI Enabled
619,730 UART: [state] LifecycleState = Unprovisioned
621,676 UART: [state] DebugLocked = No
623,444 UART: [state] WD Timer not started. Device not locked for debugging
626,853 UART: [kat] SHA2-256
806,486 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,266 UART: [kat] ++
817,749 UART: [kat] sha1
829,007 UART: [kat] SHA2-256
831,707 UART: [kat] SHA2-384
837,917 UART: [kat] SHA2-512-ACC
840,297 UART: [kat] ECC-384
3,280,669 UART: [kat] HMAC-384Kdf
3,293,393 UART: [kat] LMS
3,769,901 UART: [kat] --
3,773,316 UART: [cold-reset] ++
3,775,751 UART: [fht] FHT @ 0x50003400
3,787,649 UART: [idev] ++
3,788,213 UART: [idev] CDI.KEYID = 6
3,789,283 UART: [idev] SUBJECT.KEYID = 7
3,790,403 UART: [idev] UDS.KEYID = 0
3,791,474 ready_for_fw is high
3,791,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,391 UART: [idev] Erasing UDS.KEYID = 0
6,266,146 UART: [idev] Sha1 KeyId Algorithm
6,289,641 UART: [idev] --
6,293,989 UART: [ldev] ++
6,294,619 UART: [ldev] CDI.KEYID = 6
6,295,530 UART: [ldev] SUBJECT.KEYID = 5
6,296,745 UART: [ldev] AUTHORITY.KEYID = 7
6,297,982 UART: [ldev] FE.KEYID = 1
6,308,520 UART: [ldev] Erasing FE.KEYID = 1
8,786,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,957 UART: [ldev] --
10,577,740 UART: [fwproc] Wait for Commands...
10,580,482 UART: [fwproc] Recv command 0x46574c44
10,582,468 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,139,113 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,212,115 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,540,888 >>> mbox cmd response: success
14,545,594 UART: [afmc] ++
14,546,252 UART: [afmc] CDI.KEYID = 6
14,547,151 UART: [afmc] SUBJECT.KEYID = 7
14,548,254 UART: [afmc] AUTHORITY.KEYID = 5
17,052,525 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,773,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,775,461 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,791,294 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,807,390 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,822,920 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,847,190 UART: [afmc] --
18,851,127 UART: [cold-reset] --
18,856,026 UART: [state] Locking Datavault
18,861,336 UART: [state] Locking PCR0, PCR1 and PCR31
18,863,092 UART: [state] Locking ICCM
18,865,843 UART: [exit] Launching FMC @ 0x40000130
18,874,297 UART:
18,874,544 UART: Running Caliptra FMC ...
18,875,652 UART:
18,875,818 UART: [state] CFI Enabled
18,884,082 UART: [fht] FMC Alias Private Key: 7
20,650,685 UART: [art] Extend RT PCRs Done
20,651,892 UART: [art] Lock RT PCRs Done
20,653,556 UART: [art] Populate DV Done
20,658,664 UART: [fht] FMC Alias Private Key: 7
20,660,313 UART: [art] Derive CDI
20,661,129 UART: [art] Store in slot 0x4
20,703,511 UART: [art] Derive Key Pair
20,704,558 UART: [art] Store priv key in slot 0x5
23,131,152 UART: [art] Derive Key Pair - Done
23,144,414 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,850,621 UART: [art] Erasing AUTHORITY.KEYID = 7
24,852,108 UART: [art] PUB.X = E47519765771581F2FA09397A09D0A8E4FACC5B3186560F64B0F27E102A0C07F04D6F271CC10689808C0C571D09CF539
24,859,399 UART: [art] PUB.Y = 503EAE011547C77976A4F295D8236229A53AB6B1D8053D3F5195C29184DE6E49650C22BA34855EB61137AAC1802486AD
24,866,629 UART: [art] SIG.R = 6B0F828575FFDB624AB215997AD761C9B3147C96F649574F4C33AA4AE38D880C9B8E6A843B569114AA0FB38F63C6144D
24,874,025 UART: [art] SIG.S = 250C7D42598524D875C5280CDB84E9F9810C0F3F44EFFB8A39BFBE426360F3B14A30A7504A20E5B585A7712B50CCD984
25,852,882 UART: Caliptra RT
25,853,590 UART: [state] CFI Enabled
25,986,980 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,034,872 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,190,441 UART: [rt]cmd =0x41544d4e, len=14344
34,186,361 >>> mbox cmd response data (8 bytes)
34,186,964 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,217,776 UART: [rt]cmd =0x41545348, len=116
34,219,854 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,775,795 ready_for_fw is high
3,776,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,778 >>> mbox cmd response: success
18,701,911 UART:
18,702,307 UART: Running Caliptra FMC ...
18,703,422 UART:
18,703,576 UART: [state] CFI Enabled
18,711,585 UART: [fht] FMC Alias Private Key: 7
20,477,685 UART: [art] Extend RT PCRs Done
20,478,908 UART: [art] Lock RT PCRs Done
20,480,943 UART: [art] Populate DV Done
20,486,425 UART: [fht] FMC Alias Private Key: 7
20,487,979 UART: [art] Derive CDI
20,488,717 UART: [art] Store in slot 0x4
20,531,481 UART: [art] Derive Key Pair
20,532,523 UART: [art] Store priv key in slot 0x5
22,959,821 UART: [art] Derive Key Pair - Done
22,972,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,678,690 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,190 UART: [art] PUB.X = 260A64F750641056FD70A0B07C0A1C54EBB3F5353FF617B324A7807894D0771E4B2804A03B07CDF5BB328CFE3FD73D44
24,687,447 UART: [art] PUB.Y = 19AD7C4B61E148FFE48C837AF5DAB236E0E009DE9694161B5A3F8D150F5EF5E3C6FB995A6C566E7EB58EF84EB5CCF8BF
24,694,748 UART: [art] SIG.R = F046F04EC4B1643D584A19F86FCAFBD2A728E47DBF5D770A1B93155D42464DFBAC779F31AAE79EB6043EA8ACF2B36D23
24,702,149 UART: [art] SIG.S = FF175EAD92DBC85139802A0B47A6D210B666A69744EF47A0DB8D8B9D9FA21ADCA2F368EB5FCACACEE47E06D05C3C46ED
25,681,686 UART: Caliptra RT
25,682,414 UART: [state] CFI Enabled
25,815,856 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,875,132 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,030,877 UART: [rt]cmd =0x41544d4e, len=14344
34,026,235 >>> mbox cmd response data (8 bytes)
34,026,852 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,057,654 UART: [rt]cmd =0x41545348, len=116
34,059,912 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,056 UART:
192,425 UART: Running Caliptra ROM ...
193,646 UART:
193,808 UART: [state] CFI Enabled
261,449 UART: [state] LifecycleState = Unprovisioned
263,792 UART: [state] DebugLocked = No
265,609 UART: [state] WD Timer not started. Device not locked for debugging
270,422 UART: [kat] SHA2-256
460,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,075 UART: [kat] ++
471,575 UART: [kat] sha1
482,163 UART: [kat] SHA2-256
485,237 UART: [kat] SHA2-384
492,215 UART: [kat] SHA2-512-ACC
494,788 UART: [kat] ECC-384
2,946,495 UART: [kat] HMAC-384Kdf
2,971,092 UART: [kat] LMS
3,502,798 UART: [kat] --
3,506,657 UART: [cold-reset] ++
3,507,544 UART: [fht] FHT @ 0x50003400
3,519,585 UART: [idev] ++
3,520,289 UART: [idev] CDI.KEYID = 6
3,521,195 UART: [idev] SUBJECT.KEYID = 7
3,522,441 UART: [idev] UDS.KEYID = 0
3,523,365 ready_for_fw is high
3,523,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,612 UART: [idev] Erasing UDS.KEYID = 0
6,026,457 UART: [idev] Sha1 KeyId Algorithm
6,048,775 UART: [idev] --
6,052,286 UART: [ldev] ++
6,052,967 UART: [ldev] CDI.KEYID = 6
6,053,937 UART: [ldev] SUBJECT.KEYID = 5
6,055,092 UART: [ldev] AUTHORITY.KEYID = 7
6,056,323 UART: [ldev] FE.KEYID = 1
6,098,591 UART: [ldev] Erasing FE.KEYID = 1
8,608,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,495 UART: [ldev] --
10,412,513 UART: [fwproc] Wait for Commands...
10,414,821 UART: [fwproc] Recv command 0x46574c44
10,417,120 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,726 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,335 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,984 >>> mbox cmd response: success
14,681,251 UART: [afmc] ++
14,681,977 UART: [afmc] CDI.KEYID = 6
14,683,193 UART: [afmc] SUBJECT.KEYID = 7
14,684,640 UART: [afmc] AUTHORITY.KEYID = 5
17,211,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,935,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,937,693 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,952,821 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,967,933 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,837 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,787 UART: [afmc] --
19,009,383 UART: [cold-reset] --
19,014,331 UART: [state] Locking Datavault
19,020,237 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,382 UART: [state] Locking ICCM
19,024,954 UART: [exit] Launching FMC @ 0x40000130
19,033,603 UART:
19,033,841 UART: Running Caliptra FMC ...
19,034,960 UART:
19,035,120 UART: [state] CFI Enabled
19,091,581 UART: [fht] FMC Alias Private Key: 7
20,879,328 UART: [art] Extend RT PCRs Done
20,880,546 UART: [art] Lock RT PCRs Done
20,882,197 UART: [art] Populate DV Done
20,887,607 UART: [fht] FMC Alias Private Key: 7
20,889,299 UART: [art] Derive CDI
20,890,108 UART: [art] Store in slot 0x4
20,945,691 UART: [art] Derive Key Pair
20,946,719 UART: [art] Store priv key in slot 0x5
23,409,722 UART: [art] Derive Key Pair - Done
23,422,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,135,101 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,608 UART: [art] PUB.X = F0C0831D72EFF259DB62EB6E402ADAB990E22152CB404726E7592A8B736258B8C7E77EEBB7DFC12351EF68451F2DEA95
25,143,829 UART: [art] PUB.Y = A740F714B841452D9EC877D7913F271C4D8988CE1563AC94B44A8255AA7229F6096B11CBEF6EC0D3B216B389756A932B
25,151,119 UART: [art] SIG.R = AB4E659B556F1B51B095539311DB24B366B844275366DFA55D5D6B936FD064FE931A9D1B6E1CDA4C802ABC153C34230B
25,158,491 UART: [art] SIG.S = 5873BA367B35B17FECD4AC4F777C5E7A27223AFCEFE171BF5CD1D09E6902EBDB32D2CD7852CEE2FE02CF57DC1ECFAD21
26,137,385 UART: Caliptra RT
26,138,074 UART: [state] CFI Enabled
26,317,669 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,363,792 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,519,254 UART: [rt]cmd =0x41544d4e, len=14344
34,514,490 >>> mbox cmd response data (8 bytes)
34,515,064 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,545,703 UART: [rt]cmd =0x41545348, len=116
34,547,998 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,438,867 ready_for_fw is high
3,439,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,830,899 >>> mbox cmd response: success
19,131,210 UART:
19,131,584 UART: Running Caliptra FMC ...
19,132,693 UART:
19,132,845 UART: [state] CFI Enabled
19,200,737 UART: [fht] FMC Alias Private Key: 7
20,988,206 UART: [art] Extend RT PCRs Done
20,989,434 UART: [art] Lock RT PCRs Done
20,991,138 UART: [art] Populate DV Done
20,996,441 UART: [fht] FMC Alias Private Key: 7
20,997,976 UART: [art] Derive CDI
20,998,707 UART: [art] Store in slot 0x4
21,054,726 UART: [art] Derive Key Pair
21,055,769 UART: [art] Store priv key in slot 0x5
23,518,716 UART: [art] Derive Key Pair - Done
23,531,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,245,069 UART: [art] Erasing AUTHORITY.KEYID = 7
25,246,578 UART: [art] PUB.X = 5BC5A208013E6F9F3B78B89F318AEDAEA5C5E41CA26C86BB98A423581D061D1F1C08826298800E9BF9A8413208426C4E
25,253,848 UART: [art] PUB.Y = EA06B20963A33A9169943A610A793223177E35B6492C78340FF2F7DFEA3231128D042C1A697615994A0806AC8DEF4D70
25,261,064 UART: [art] SIG.R = 3A49E63197D631B8925CD24BF6CD024513507D71346A9CDB7F7545245952EB77C60EEF0998AD6EF6E9B38B2BF3CAEF2A
25,268,475 UART: [art] SIG.S = D4E54D36F852DD6C8E4987726F1C9C74CB71074CEFC377C6B238BC9FBDF46DF3B2FC0E1566B3720472D97A9DF1F935F5
26,247,403 UART: Caliptra RT
26,248,100 UART: [state] CFI Enabled
26,429,133 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,474,883 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,630,427 UART: [rt]cmd =0x41544d4e, len=14344
34,625,773 >>> mbox cmd response data (8 bytes)
34,626,374 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,656,965 UART: [rt]cmd =0x41545348, len=116
34,658,958 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,519 UART:
192,876 UART: Running Caliptra ROM ...
194,059 UART:
603,644 UART: [state] CFI Enabled
618,051 UART: [state] LifecycleState = Unprovisioned
620,449 UART: [state] DebugLocked = No
622,868 UART: [state] WD Timer not started. Device not locked for debugging
627,814 UART: [kat] SHA2-256
817,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,448 UART: [kat] ++
829,051 UART: [kat] sha1
839,866 UART: [kat] SHA2-256
842,878 UART: [kat] SHA2-384
849,814 UART: [kat] SHA2-512-ACC
852,404 UART: [kat] ECC-384
3,293,949 UART: [kat] HMAC-384Kdf
3,307,835 UART: [kat] LMS
3,839,604 UART: [kat] --
3,844,614 UART: [cold-reset] ++
3,846,271 UART: [fht] FHT @ 0x50003400
3,857,043 UART: [idev] ++
3,857,684 UART: [idev] CDI.KEYID = 6
3,858,720 UART: [idev] SUBJECT.KEYID = 7
3,859,900 UART: [idev] UDS.KEYID = 0
3,860,840 ready_for_fw is high
3,861,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,908 UART: [idev] Erasing UDS.KEYID = 0
6,335,275 UART: [idev] Sha1 KeyId Algorithm
6,357,162 UART: [idev] --
6,362,100 UART: [ldev] ++
6,362,787 UART: [ldev] CDI.KEYID = 6
6,363,865 UART: [ldev] SUBJECT.KEYID = 5
6,364,971 UART: [ldev] AUTHORITY.KEYID = 7
6,366,154 UART: [ldev] FE.KEYID = 1
6,376,588 UART: [ldev] Erasing FE.KEYID = 1
8,853,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,339 UART: [ldev] --
10,646,591 UART: [fwproc] Wait for Commands...
10,648,580 UART: [fwproc] Recv command 0x46574c44
10,650,893 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,703 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,304 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,220 >>> mbox cmd response: success
14,909,421 UART: [afmc] ++
14,910,133 UART: [afmc] CDI.KEYID = 6
14,911,381 UART: [afmc] SUBJECT.KEYID = 7
14,912,829 UART: [afmc] AUTHORITY.KEYID = 5
17,411,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,133,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,135,548 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,150,654 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,165,793 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,180,667 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,204,032 UART: [afmc] --
19,207,214 UART: [cold-reset] --
19,211,411 UART: [state] Locking Datavault
19,216,002 UART: [state] Locking PCR0, PCR1 and PCR31
19,218,174 UART: [state] Locking ICCM
19,220,280 UART: [exit] Launching FMC @ 0x40000130
19,228,972 UART:
19,229,209 UART: Running Caliptra FMC ...
19,230,312 UART:
19,230,476 UART: [state] CFI Enabled
19,239,065 UART: [fht] FMC Alias Private Key: 7
21,005,581 UART: [art] Extend RT PCRs Done
21,006,808 UART: [art] Lock RT PCRs Done
21,008,764 UART: [art] Populate DV Done
21,014,131 UART: [fht] FMC Alias Private Key: 7
21,015,796 UART: [art] Derive CDI
21,016,616 UART: [art] Store in slot 0x4
21,059,652 UART: [art] Derive Key Pair
21,060,696 UART: [art] Store priv key in slot 0x5
23,486,903 UART: [art] Derive Key Pair - Done
23,499,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,611 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,119 UART: [art] PUB.X = 76D0FC8F7569888C42C9F8DCE9B9D23C30C09CF0E76E06C7062CE9F7FEFD637233002138906C112C2959556699573F73
25,214,330 UART: [art] PUB.Y = 85176A3060076E52672F187F2BB25C082D3F56F4CD3E220A61431F687DA7CB9DCABF1B77DCA5F4B9C38505F4D77FEF7D
25,221,642 UART: [art] SIG.R = FE0BDDE04DBA9EBF35535BE7598E443E8A576B49BDEC453E5857E745D869D56F3089A3E7EF44F050C733E4E66E1F8DA9
25,229,021 UART: [art] SIG.S = FFD7425134FD7AB33712DB588A67FE4CF2A537524974BBDB61F1CD22BF97AE30F565339AB9283E21F67A5D65792CB820
26,207,503 UART: Caliptra RT
26,208,196 UART: [state] CFI Enabled
26,341,312 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,396,065 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,551,436 UART: [rt]cmd =0x41544d4e, len=14344
34,546,860 >>> mbox cmd response data (8 bytes)
34,547,448 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,578,158 UART: [rt]cmd =0x41545348, len=116
34,580,274 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
3,756,469 ready_for_fw is high
3,756,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,647 >>> mbox cmd response: success
19,302,119 UART:
19,302,522 UART: Running Caliptra FMC ...
19,303,674 UART:
19,303,836 UART: [state] CFI Enabled
19,311,697 UART: [fht] FMC Alias Private Key: 7
21,077,626 UART: [art] Extend RT PCRs Done
21,078,861 UART: [art] Lock RT PCRs Done
21,080,390 UART: [art] Populate DV Done
21,085,926 UART: [fht] FMC Alias Private Key: 7
21,087,480 UART: [art] Derive CDI
21,088,303 UART: [art] Store in slot 0x4
21,131,247 UART: [art] Derive Key Pair
21,132,295 UART: [art] Store priv key in slot 0x5
23,558,951 UART: [art] Derive Key Pair - Done
23,572,135 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,115 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,627 UART: [art] PUB.X = F67815F1A9E5846FA400836972E1C2DD04F7FFB203040A25312C4966E353652688DB7371FD6E828B2F1FAB89566B866C
25,286,863 UART: [art] PUB.Y = 55CD3ED76697300760A56DFD7F92CE7F31124373F1E78A38A2C65DA17D8DA50DDADDD1509DE2FBBDDDD71147F8978F39
25,294,167 UART: [art] SIG.R = 45E510CE614ED017E526FF505C4785E2CFFFFBE7FDB35914752B684C4320034165DD9CF260E1F4911449E7F08DE64AE9
25,301,508 UART: [art] SIG.S = 9F0DA81A54A9BFCE16D001CDDDDB2CD11184669D9C00ED1DB1040EB709EEB61565E76F8B74FD32028118D4F83D066255
26,280,597 UART: Caliptra RT
26,281,289 UART: [state] CFI Enabled
26,413,497 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,466,295 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,621,828 UART: [rt]cmd =0x41544d4e, len=14344
34,617,560 >>> mbox cmd response data (8 bytes)
34,618,189 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,648,722 UART: [rt]cmd =0x41545348, len=116
34,650,726 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,213 UART: [kat] SHA2-256
882,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,259 UART: [kat] ++
886,411 UART: [kat] sha1
890,577 UART: [kat] SHA2-256
892,515 UART: [kat] SHA2-384
895,346 UART: [kat] SHA2-512-ACC
897,247 UART: [kat] ECC-384
902,442 UART: [kat] HMAC-384Kdf
907,180 UART: [kat] LMS
1,475,376 UART: [kat] --
1,476,247 UART: [cold-reset] ++
1,476,825 UART: [fht] Storing FHT @ 0x50003400
1,479,808 UART: [idev] ++
1,479,976 UART: [idev] CDI.KEYID = 6
1,480,336 UART: [idev] SUBJECT.KEYID = 7
1,480,760 UART: [idev] UDS.KEYID = 0
1,481,105 ready_for_fw is high
1,481,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,024 UART: [idev] Erasing UDS.KEYID = 0
1,505,578 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,250 UART: [idev] --
1,515,267 UART: [ldev] ++
1,515,435 UART: [ldev] CDI.KEYID = 6
1,515,798 UART: [ldev] SUBJECT.KEYID = 5
1,516,224 UART: [ldev] AUTHORITY.KEYID = 7
1,516,687 UART: [ldev] FE.KEYID = 1
1,521,897 UART: [ldev] Erasing FE.KEYID = 1
1,547,732 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,888 UART: [ldev] --
1,587,221 UART: [fwproc] Waiting for Commands...
1,587,912 UART: [fwproc] Received command 0x46574c44
1,588,703 UART: [fwproc] Received Image of size 118548 bytes
2,934,221 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,659 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,877 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,262 >>> mbox cmd response: success
3,134,316 UART: [afmc] ++
3,134,484 UART: [afmc] CDI.KEYID = 6
3,134,846 UART: [afmc] SUBJECT.KEYID = 7
3,135,271 UART: [afmc] AUTHORITY.KEYID = 5
3,170,656 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,906 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,686 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,395 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,278 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,961 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,799 UART: [afmc] --
3,213,695 UART: [cold-reset] --
3,214,323 UART: [state] Locking Datavault
3,215,680 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,284 UART: [state] Locking ICCM
3,216,782 UART: [exit] Launching FMC @ 0x40000130
3,222,112 UART:
3,222,128 UART: Running Caliptra FMC ...
3,222,536 UART:
3,222,590 UART: [state] CFI Enabled
3,233,004 UART: [fht] FMC Alias Private Key: 7
3,352,302 UART: [art] Extend RT PCRs Done
3,352,730 UART: [art] Lock RT PCRs Done
3,354,494 UART: [art] Populate DV Done
3,362,769 UART: [fht] FMC Alias Private Key: 7
3,363,911 UART: [art] Derive CDI
3,364,191 UART: [art] Store in slot 0x4
3,449,815 UART: [art] Derive Key Pair
3,450,175 UART: [art] Store priv key in slot 0x5
3,463,886 UART: [art] Derive Key Pair - Done
3,478,844 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,076 UART: [art] PUB.X = E5A81A1DCDDCF7EA692DD9D7C9FB9AE63B48450D508C3BE68CBE03B4B85DD79263C6971E432F60DF19F97797F97A653E
3,501,858 UART: [art] PUB.Y = 437C240644B5040BFC248B1CDFB599E54EFCAAB5A17B2A7B257C4DCCE99FB56EFCB67B6F1493E1DAF162629E4BFECAA5
3,508,827 UART: [art] SIG.R = 89ABE08328CFD3D4FC433E38E6131932CFCAB677B19E76B31C4F8949C250BA108FC094BE66D9FAC46D490D5B9A57B797
3,515,606 UART: [art] SIG.S = 03C97E2CBF24873175AC6E886C7E0FD9EAE9EC1337366877491A69D2D898970DC175B10603C06345A697FF72B0A844AD
3,539,185 UART: Caliptra RT
3,539,436 UART: [state] CFI Enabled
3,659,794 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,660,464 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,714 UART: [rt]cmd =0x41544d4e, len=14344
4,093,701 >>> mbox cmd response data (8 bytes)
4,093,702 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,747 UART: [rt]cmd =0x41545348, len=116
4,125,553 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,065 ready_for_fw is high
1,363,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,570 >>> mbox cmd response: success
3,044,083 UART:
3,044,099 UART: Running Caliptra FMC ...
3,044,507 UART:
3,044,561 UART: [state] CFI Enabled
3,055,197 UART: [fht] FMC Alias Private Key: 7
3,173,703 UART: [art] Extend RT PCRs Done
3,174,131 UART: [art] Lock RT PCRs Done
3,175,539 UART: [art] Populate DV Done
3,183,964 UART: [fht] FMC Alias Private Key: 7
3,184,974 UART: [art] Derive CDI
3,185,254 UART: [art] Store in slot 0x4
3,270,888 UART: [art] Derive Key Pair
3,271,248 UART: [art] Store priv key in slot 0x5
3,284,109 UART: [art] Derive Key Pair - Done
3,299,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,015 UART: [art] PUB.X = E1BC9C8CDA186655BE58FDF58CE8588863AAC19D0169080A7223750C5D6942A67AE7DEBBA2B2988853FB4D0340922AC1
3,321,778 UART: [art] PUB.Y = 8D8DB812EE911CFAD9C818EC76E3A7B2D26486F078DB4C680209674B35B3E287CC2007772AE5C2A7EEB7D3FE6BC56FBB
3,328,737 UART: [art] SIG.R = B0AAF2DFA8D4AFB2B3571257C567510F2C59919035F0373F00D1DDAC1124D2C3034EE01724223E406C005BFAA45035C4
3,335,461 UART: [art] SIG.S = 55631311F6B19D44222C5031BFB9221930DD01A95DF8D31DAB3E766239ADA0531CA95E2FEC0E1BD934C32B6E0A1F6A07
3,359,681 UART: Caliptra RT
3,359,932 UART: [state] CFI Enabled
3,479,184 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,479,854 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,870 UART: [rt]cmd =0x41544d4e, len=14344
3,912,211 >>> mbox cmd response data (8 bytes)
3,912,212 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,221 UART: [rt]cmd =0x41545348, len=116
3,943,979 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,688 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,190 UART: [kat] SHA2-256
882,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,236 UART: [kat] ++
886,388 UART: [kat] sha1
890,670 UART: [kat] SHA2-256
892,608 UART: [kat] SHA2-384
895,219 UART: [kat] SHA2-512-ACC
897,120 UART: [kat] ECC-384
902,643 UART: [kat] HMAC-384Kdf
907,371 UART: [kat] LMS
1,475,567 UART: [kat] --
1,476,316 UART: [cold-reset] ++
1,476,848 UART: [fht] Storing FHT @ 0x50003400
1,479,559 UART: [idev] ++
1,479,727 UART: [idev] CDI.KEYID = 6
1,480,087 UART: [idev] SUBJECT.KEYID = 7
1,480,511 UART: [idev] UDS.KEYID = 0
1,480,856 ready_for_fw is high
1,480,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,741 UART: [idev] Erasing UDS.KEYID = 0
1,505,565 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,043 UART: [idev] --
1,515,100 UART: [ldev] ++
1,515,268 UART: [ldev] CDI.KEYID = 6
1,515,631 UART: [ldev] SUBJECT.KEYID = 5
1,516,057 UART: [ldev] AUTHORITY.KEYID = 7
1,516,520 UART: [ldev] FE.KEYID = 1
1,521,666 UART: [ldev] Erasing FE.KEYID = 1
1,547,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,797 UART: [ldev] --
1,587,242 UART: [fwproc] Waiting for Commands...
1,587,873 UART: [fwproc] Received command 0x46574c44
1,588,664 UART: [fwproc] Received Image of size 118548 bytes
2,932,614 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,372 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,590 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,995 >>> mbox cmd response: success
3,132,103 UART: [afmc] ++
3,132,271 UART: [afmc] CDI.KEYID = 6
3,132,633 UART: [afmc] SUBJECT.KEYID = 7
3,133,058 UART: [afmc] AUTHORITY.KEYID = 5
3,168,777 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,261 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,041 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,750 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,633 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,316 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,144 UART: [afmc] --
3,212,276 UART: [cold-reset] --
3,213,024 UART: [state] Locking Datavault
3,214,337 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,941 UART: [state] Locking ICCM
3,215,443 UART: [exit] Launching FMC @ 0x40000130
3,220,773 UART:
3,220,789 UART: Running Caliptra FMC ...
3,221,197 UART:
3,221,340 UART: [state] CFI Enabled
3,231,580 UART: [fht] FMC Alias Private Key: 7
3,350,476 UART: [art] Extend RT PCRs Done
3,350,904 UART: [art] Lock RT PCRs Done
3,352,564 UART: [art] Populate DV Done
3,360,825 UART: [fht] FMC Alias Private Key: 7
3,361,835 UART: [art] Derive CDI
3,362,115 UART: [art] Store in slot 0x4
3,447,963 UART: [art] Derive Key Pair
3,448,323 UART: [art] Store priv key in slot 0x5
3,461,606 UART: [art] Derive Key Pair - Done
3,476,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,242 UART: [art] PUB.X = C965A646502264D348DD43AC05E0577E3358B834148C0E0B598943F971DC73A75F0951DECFFE7814CCDA8C194527130D
3,498,995 UART: [art] PUB.Y = 5786A7AECA8365C53881C4A6D26531A5D20B78BB17570678D4B043496DC1F05EDF2A37DB6CCAA2C803E2DF5D6095BAF8
3,505,948 UART: [art] SIG.R = 0C0D40F0E2804CC12930EFDDA2DBEFE9BA4B93F5E521B527F8DDBC48417BF7545E368FFA5589CEA1884222EB70EF3E9C
3,512,734 UART: [art] SIG.S = 477562D82D6AA3591CF9F34A93A9C392311206A5493A3FDDB9709E6534685205E17A151491C8571D4FD0E2553BBFFE22
3,536,448 UART: Caliptra RT
3,536,791 UART: [state] CFI Enabled
3,657,170 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,840 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,880 UART: [rt]cmd =0x41544d4e, len=14344
4,090,567 >>> mbox cmd response data (8 bytes)
4,090,568 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,497 UART: [rt]cmd =0x41545348, len=116
4,122,121 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,224 ready_for_fw is high
1,362,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,365 >>> mbox cmd response: success
3,043,666 UART:
3,043,682 UART: Running Caliptra FMC ...
3,044,090 UART:
3,044,233 UART: [state] CFI Enabled
3,055,317 UART: [fht] FMC Alias Private Key: 7
3,174,873 UART: [art] Extend RT PCRs Done
3,175,301 UART: [art] Lock RT PCRs Done
3,176,769 UART: [art] Populate DV Done
3,185,088 UART: [fht] FMC Alias Private Key: 7
3,186,040 UART: [art] Derive CDI
3,186,320 UART: [art] Store in slot 0x4
3,272,238 UART: [art] Derive Key Pair
3,272,598 UART: [art] Store priv key in slot 0x5
3,285,699 UART: [art] Derive Key Pair - Done
3,300,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,090 UART: [art] PUB.X = 477E5982F17B2143C29CBA436A32AE809A2E65F41E9B322759EF642DBF97E8DADAC3C581E006827ADF29E21C01B06BA9
3,323,864 UART: [art] PUB.Y = 642A2E3D954293D41A6318EC71BD085BD4143EF1D15E50C4C14731978B91026E108FA09F0ADCECDC4E5F13389A582B31
3,330,809 UART: [art] SIG.R = 168907F6765EA94D7792605D26F68870A3B30E3D59E0D001ACDDD33EE5949F20E923A5F52C3F313E96AFFFEBFC945629
3,337,576 UART: [art] SIG.S = 31B01F8D3FF221768DABEF6A436DFC19BC816CCFA8F9B1EE3A5612FB3CEA9B8B5EE63879B1BD2897C338BDBDCFE4265C
3,361,328 UART: Caliptra RT
3,361,671 UART: [state] CFI Enabled
3,481,272 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,481,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,056 UART: [rt]cmd =0x41544d4e, len=14344
3,914,343 >>> mbox cmd response data (8 bytes)
3,914,344 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,263 UART: [rt]cmd =0x41545348, len=116
3,946,075 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,807 UART: [state] WD Timer not started. Device not locked for debugging
87,982 UART: [kat] SHA2-256
891,532 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,636 UART: [kat] ++
895,788 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
915,799 UART: [kat] HMAC-384Kdf
920,193 UART: [kat] LMS
1,168,505 UART: [kat] --
1,169,458 UART: [cold-reset] ++
1,169,954 UART: [fht] FHT @ 0x50003400
1,172,572 UART: [idev] ++
1,172,740 UART: [idev] CDI.KEYID = 6
1,173,101 UART: [idev] SUBJECT.KEYID = 7
1,173,526 UART: [idev] UDS.KEYID = 0
1,173,872 ready_for_fw is high
1,173,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,623 UART: [idev] Erasing UDS.KEYID = 0
1,198,309 UART: [idev] Sha1 KeyId Algorithm
1,207,279 UART: [idev] --
1,208,220 UART: [ldev] ++
1,208,388 UART: [ldev] CDI.KEYID = 6
1,208,752 UART: [ldev] SUBJECT.KEYID = 5
1,209,179 UART: [ldev] AUTHORITY.KEYID = 7
1,209,642 UART: [ldev] FE.KEYID = 1
1,214,718 UART: [ldev] Erasing FE.KEYID = 1
1,240,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,226 UART: [ldev] --
1,279,663 UART: [fwproc] Wait for Commands...
1,280,254 UART: [fwproc] Recv command 0x46574c44
1,280,987 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,933 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,108 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,391 >>> mbox cmd response: success
2,824,619 UART: [afmc] ++
2,824,787 UART: [afmc] CDI.KEYID = 6
2,825,150 UART: [afmc] SUBJECT.KEYID = 7
2,825,576 UART: [afmc] AUTHORITY.KEYID = 5
2,861,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,874 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,623 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,333 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,214 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,915 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,590 UART: [afmc] --
2,904,453 UART: [cold-reset] --
2,905,267 UART: [state] Locking Datavault
2,906,516 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,120 UART: [state] Locking ICCM
2,907,672 UART: [exit] Launching FMC @ 0x40000130
2,913,002 UART:
2,913,018 UART: Running Caliptra FMC ...
2,913,426 UART:
2,913,480 UART: [state] CFI Enabled
2,923,952 UART: [fht] FMC Alias Private Key: 7
3,043,112 UART: [art] Extend RT PCRs Done
3,043,540 UART: [art] Lock RT PCRs Done
3,044,756 UART: [art] Populate DV Done
3,052,933 UART: [fht] FMC Alias Private Key: 7
3,054,043 UART: [art] Derive CDI
3,054,323 UART: [art] Store in slot 0x4
3,139,890 UART: [art] Derive Key Pair
3,140,250 UART: [art] Store priv key in slot 0x5
3,153,556 UART: [art] Derive Key Pair - Done
3,168,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,483 UART: [art] PUB.X = 9D8CE3891BE03F968E6424B9F9935619EDAEE88CFFE3057A2D5711E24A046B6258A0680DE2C7C859190D6E6DAE7BEC1B
3,191,253 UART: [art] PUB.Y = BE62B87BCBF58B95E009458F9CE1BADD69F67E586371301C04829B74BD7FCE4199A1446E8676E95F54A39CFD0DAFBCCB
3,198,212 UART: [art] SIG.R = 3F195C0FAE8910130E5AB4BF9B46727CC8BF65813EFD5960074A8652A7FCD2189BEB6FBEFED861E86E9E83B4874B142E
3,204,987 UART: [art] SIG.S = 83C7E9161AD83EB47B80260779D877B10E4CF29626D5710C8D28214CDA54A06477B5D413FAEA2DA10DF3F79898066EBF
3,228,770 UART: Caliptra RT
3,229,021 UART: [state] CFI Enabled
3,348,300 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,348,970 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,180 UART: [rt]cmd =0x41544d4e, len=14344
3,782,455 >>> mbox cmd response data (8 bytes)
3,782,456 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,812,735 UART: [rt]cmd =0x41545348, len=116
3,814,343 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,674 ready_for_fw is high
1,058,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,712 >>> mbox cmd response: success
2,739,417 UART:
2,739,433 UART: Running Caliptra FMC ...
2,739,841 UART:
2,739,895 UART: [state] CFI Enabled
2,750,557 UART: [fht] FMC Alias Private Key: 7
2,869,445 UART: [art] Extend RT PCRs Done
2,869,873 UART: [art] Lock RT PCRs Done
2,871,125 UART: [art] Populate DV Done
2,879,540 UART: [fht] FMC Alias Private Key: 7
2,880,700 UART: [art] Derive CDI
2,880,980 UART: [art] Store in slot 0x4
2,966,751 UART: [art] Derive Key Pair
2,967,111 UART: [art] Store priv key in slot 0x5
2,980,481 UART: [art] Derive Key Pair - Done
2,995,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,401 UART: [art] PUB.X = 4603078975B6BFBA4E1FB64DBD8D87C671065E554963F678228C7A92DE08AFCC73D85BF9ED8AD16353B530E7797B45BA
3,018,167 UART: [art] PUB.Y = 23BFEC3D5BAA86DF1F22E5BC7D4E6D2910F662628675C618D4EA41AEA2621F0A1D0792CA3334DC2A2F55861AC7178F3B
3,025,125 UART: [art] SIG.R = 676C0711B9E3F6092C5327C12C6B121C1B9E21C62D5FA19BB7FE41C7B25D464F6150C960EEB8D689D26A231DBE729D3A
3,031,897 UART: [art] SIG.S = AD23E5BC27FEC510DD3EE0C42F53872A294ACF8D13827217B746FE97DF7CCF4251FADF6D207984058938966A4E23D9EB
3,055,118 UART: Caliptra RT
3,055,369 UART: [state] CFI Enabled
3,175,546 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,176,216 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,446 UART: [rt]cmd =0x41544d4e, len=14344
3,609,213 >>> mbox cmd response data (8 bytes)
3,609,214 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,423 UART: [rt]cmd =0x41545348, len=116
3,641,119 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
891,211 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,689 UART: [kat] SHA2-256
901,629 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
916,088 UART: [kat] HMAC-384Kdf
920,580 UART: [kat] LMS
1,168,892 UART: [kat] --
1,169,627 UART: [cold-reset] ++
1,170,017 UART: [fht] FHT @ 0x50003400
1,172,731 UART: [idev] ++
1,172,899 UART: [idev] CDI.KEYID = 6
1,173,260 UART: [idev] SUBJECT.KEYID = 7
1,173,685 UART: [idev] UDS.KEYID = 0
1,174,031 ready_for_fw is high
1,174,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,536 UART: [idev] Erasing UDS.KEYID = 0
1,198,270 UART: [idev] Sha1 KeyId Algorithm
1,207,078 UART: [idev] --
1,208,089 UART: [ldev] ++
1,208,257 UART: [ldev] CDI.KEYID = 6
1,208,621 UART: [ldev] SUBJECT.KEYID = 5
1,209,048 UART: [ldev] AUTHORITY.KEYID = 7
1,209,511 UART: [ldev] FE.KEYID = 1
1,214,797 UART: [ldev] Erasing FE.KEYID = 1
1,241,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,453 UART: [ldev] --
1,280,716 UART: [fwproc] Wait for Commands...
1,281,485 UART: [fwproc] Recv command 0x46574c44
1,282,218 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,338 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,513 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,674 >>> mbox cmd response: success
2,825,764 UART: [afmc] ++
2,825,932 UART: [afmc] CDI.KEYID = 6
2,826,295 UART: [afmc] SUBJECT.KEYID = 7
2,826,721 UART: [afmc] AUTHORITY.KEYID = 5
2,861,694 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,854 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,564 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,445 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,146 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,979 UART: [afmc] --
2,904,826 UART: [cold-reset] --
2,905,464 UART: [state] Locking Datavault
2,906,977 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,581 UART: [state] Locking ICCM
2,908,151 UART: [exit] Launching FMC @ 0x40000130
2,913,481 UART:
2,913,497 UART: Running Caliptra FMC ...
2,913,905 UART:
2,914,048 UART: [state] CFI Enabled
2,924,448 UART: [fht] FMC Alias Private Key: 7
3,043,036 UART: [art] Extend RT PCRs Done
3,043,464 UART: [art] Lock RT PCRs Done
3,045,072 UART: [art] Populate DV Done
3,053,175 UART: [fht] FMC Alias Private Key: 7
3,054,247 UART: [art] Derive CDI
3,054,527 UART: [art] Store in slot 0x4
3,140,442 UART: [art] Derive Key Pair
3,140,802 UART: [art] Store priv key in slot 0x5
3,154,412 UART: [art] Derive Key Pair - Done
3,169,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,046 UART: [art] PUB.X = B5116A2E9CDD83791070AF8AEEFD4143D8516BFC261A598D0509944121827A414D239C18853529EB0FB5620C72026566
3,192,793 UART: [art] PUB.Y = 4E23095F40F1B57FD433EA52EB69E6681121842AF7E01782CD773DECB23E587077608C00B4FA45697BBF20FFC697C10E
3,199,719 UART: [art] SIG.R = B235C0D6258E79E28EF98668F5D09D058198A3D7051110840168955EE2834C401A2BDD23EEAFE1DFD13C54C2C6D3C1DD
3,206,486 UART: [art] SIG.S = 8A39607A1877E30BC0FA078E4CB4576312D27036B9855A051E0DA65E8EFDD51CC14F3BEB596F00187AF3CA037A2749BE
3,230,241 UART: Caliptra RT
3,230,584 UART: [state] CFI Enabled
3,350,906 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,576 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,544 UART: [rt]cmd =0x41544d4e, len=14344
3,785,181 >>> mbox cmd response data (8 bytes)
3,785,182 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,337 UART: [rt]cmd =0x41545348, len=116
3,817,001 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,149 ready_for_fw is high
1,059,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,585 >>> mbox cmd response: success
2,738,834 UART:
2,738,850 UART: Running Caliptra FMC ...
2,739,258 UART:
2,739,401 UART: [state] CFI Enabled
2,749,665 UART: [fht] FMC Alias Private Key: 7
2,868,481 UART: [art] Extend RT PCRs Done
2,868,909 UART: [art] Lock RT PCRs Done
2,870,403 UART: [art] Populate DV Done
2,878,368 UART: [fht] FMC Alias Private Key: 7
2,879,414 UART: [art] Derive CDI
2,879,694 UART: [art] Store in slot 0x4
2,965,769 UART: [art] Derive Key Pair
2,966,129 UART: [art] Store priv key in slot 0x5
2,979,673 UART: [art] Derive Key Pair - Done
2,994,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,745 UART: [art] PUB.X = D4795509A74D7A6D6BA4F4F145D555772C58170DACFA6C3A4965394BEADDCE17863C84BB08B4C0C490199355C978C2F9
3,017,512 UART: [art] PUB.Y = 7576148169FF3B784E6ED6598232B0B604A44F8C5BFDDA57D5A5BE5FF2016046935DF80ABB63B385AAC68B1FC0FF7C46
3,024,465 UART: [art] SIG.R = 1847EB5A4A96301950D663D39B84F55E38D9F1AC90C68C1921DB0AF046A055996153D1FC270CD4F9EC7BDA2D7AC69B8B
3,031,239 UART: [art] SIG.S = 4C2DB31796FB88F107082F043A7B6E9F17DACF84EFBC4C1AFCD70A1B62D5C2B81154E8A2BEA6C937BCB1D0FEE3F27BD7
3,055,319 UART: Caliptra RT
3,055,662 UART: [state] CFI Enabled
3,175,238 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,175,908 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,846 UART: [rt]cmd =0x41544d4e, len=14344
3,608,909 >>> mbox cmd response data (8 bytes)
3,608,910 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,055 UART: [rt]cmd =0x41545348, len=116
3,640,843 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,871 UART: [kat] SHA2-256
903,811 UART: [kat] SHA2-384
906,366 UART: [kat] SHA2-512-ACC
908,267 UART: [kat] ECC-384
917,918 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,669 UART: [cold-reset] ++
1,172,201 UART: [fht] FHT @ 0x50003400
1,174,646 UART: [idev] ++
1,174,814 UART: [idev] CDI.KEYID = 6
1,175,174 UART: [idev] SUBJECT.KEYID = 7
1,175,598 UART: [idev] UDS.KEYID = 0
1,175,943 ready_for_fw is high
1,175,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,600 UART: [idev] Erasing UDS.KEYID = 0
1,200,151 UART: [idev] Sha1 KeyId Algorithm
1,208,665 UART: [idev] --
1,209,601 UART: [ldev] ++
1,209,769 UART: [ldev] CDI.KEYID = 6
1,210,132 UART: [ldev] SUBJECT.KEYID = 5
1,210,558 UART: [ldev] AUTHORITY.KEYID = 7
1,211,021 UART: [ldev] FE.KEYID = 1
1,215,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,983 UART: [ldev] --
1,281,318 UART: [fwproc] Wait for Commands...
1,282,084 UART: [fwproc] Recv command 0x46574c44
1,282,812 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,298 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,468 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,823 >>> mbox cmd response: success
2,827,965 UART: [afmc] ++
2,828,133 UART: [afmc] CDI.KEYID = 6
2,828,495 UART: [afmc] SUBJECT.KEYID = 7
2,828,920 UART: [afmc] AUTHORITY.KEYID = 5
2,864,579 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,826 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,535 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,418 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,119 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,087 UART: [afmc] --
2,908,045 UART: [cold-reset] --
2,908,863 UART: [state] Locking Datavault
2,910,236 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,840 UART: [state] Locking ICCM
2,911,308 UART: [exit] Launching FMC @ 0x40000130
2,916,638 UART:
2,916,654 UART: Running Caliptra FMC ...
2,917,062 UART:
2,917,116 UART: [state] CFI Enabled
2,927,432 UART: [fht] FMC Alias Private Key: 7
3,046,218 UART: [art] Extend RT PCRs Done
3,046,646 UART: [art] Lock RT PCRs Done
3,048,174 UART: [art] Populate DV Done
3,056,545 UART: [fht] FMC Alias Private Key: 7
3,057,607 UART: [art] Derive CDI
3,057,887 UART: [art] Store in slot 0x4
3,143,602 UART: [art] Derive Key Pair
3,143,962 UART: [art] Store priv key in slot 0x5
3,156,654 UART: [art] Derive Key Pair - Done
3,171,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,087 UART: [art] PUB.X = 155D4793341DF93582CBD0594B931C9FF8D8829B2D2E7780AA3765EC7DE596949D08ADA354EB2F2AE03751E8C5F8731F
3,193,858 UART: [art] PUB.Y = 38C160374F16486BD9C8FE126FFD89FE91068861209ECB3824C68C86367BF3A54A10C8814109D653C125408BFA2638B7
3,200,796 UART: [art] SIG.R = 75CA5CF757B2C89F12DB7959C2FE7F6E93FCBBA3B69921DC4C6E2F2377DA3C54F86800AE54DEA4C40B716361EC672C57
3,207,557 UART: [art] SIG.S = 3C59383C0874C67538833696307B60FD4E75782F7CE531FEDE8A6E8030008B0FBA37DB0C9D0698AC5AFAD90A57D350AA
3,231,608 UART: Caliptra RT
3,231,859 UART: [state] CFI Enabled
3,351,765 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,435 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,475 UART: [rt]cmd =0x41544d4e, len=14344
3,785,560 >>> mbox cmd response data (8 bytes)
3,785,561 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,664 UART: [rt]cmd =0x41545348, len=116
3,817,532 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,375 ready_for_fw is high
1,061,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,694 >>> mbox cmd response: success
2,744,887 UART:
2,744,903 UART: Running Caliptra FMC ...
2,745,311 UART:
2,745,365 UART: [state] CFI Enabled
2,755,657 UART: [fht] FMC Alias Private Key: 7
2,874,439 UART: [art] Extend RT PCRs Done
2,874,867 UART: [art] Lock RT PCRs Done
2,876,437 UART: [art] Populate DV Done
2,884,814 UART: [fht] FMC Alias Private Key: 7
2,885,894 UART: [art] Derive CDI
2,886,174 UART: [art] Store in slot 0x4
2,972,041 UART: [art] Derive Key Pair
2,972,401 UART: [art] Store priv key in slot 0x5
2,985,743 UART: [art] Derive Key Pair - Done
3,000,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,033 UART: [art] PUB.X = F6600A52866643DB828AC2D733F46B4007138503BB66CC5B1DCC711D07CF6384EDBD1621EFF78A404866EAAFAF1A6440
3,023,799 UART: [art] PUB.Y = FFF1C03553B99A6CA56B113FBEC7ED2ADF4436A0A6F2A8420AB1271D1FC20B4DB0D9BED668472D1EC01CBD8A7AD923EB
3,030,771 UART: [art] SIG.R = C8E85686764AEA67297313971E92C20374B82BDD25AC8730B70021953A3A4FFB412EE1DC4B70D2E6F149311E01CB6318
3,037,511 UART: [art] SIG.S = FD1548231319B2C7A9ADC447A5C641262B4A306E62E2C6223D11E41A7E2963071AD610539A4C452DCDF077BB5BBAD0E7
3,061,094 UART: Caliptra RT
3,061,345 UART: [state] CFI Enabled
3,181,359 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,182,029 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,181 UART: [rt]cmd =0x41544d4e, len=14344
3,614,612 >>> mbox cmd response data (8 bytes)
3,614,613 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,658 UART: [rt]cmd =0x41545348, len=116
3,646,418 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
893,821 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,946 UART: [kat] ++
898,098 UART: [kat] sha1
902,520 UART: [kat] SHA2-256
904,460 UART: [kat] SHA2-384
907,033 UART: [kat] SHA2-512-ACC
908,934 UART: [kat] ECC-384
918,835 UART: [kat] HMAC-384Kdf
923,559 UART: [kat] LMS
1,171,887 UART: [kat] --
1,172,724 UART: [cold-reset] ++
1,173,238 UART: [fht] FHT @ 0x50003400
1,175,821 UART: [idev] ++
1,175,989 UART: [idev] CDI.KEYID = 6
1,176,349 UART: [idev] SUBJECT.KEYID = 7
1,176,773 UART: [idev] UDS.KEYID = 0
1,177,118 ready_for_fw is high
1,177,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,089 UART: [idev] Erasing UDS.KEYID = 0
1,202,262 UART: [idev] Sha1 KeyId Algorithm
1,210,910 UART: [idev] --
1,212,100 UART: [ldev] ++
1,212,268 UART: [ldev] CDI.KEYID = 6
1,212,631 UART: [ldev] SUBJECT.KEYID = 5
1,213,057 UART: [ldev] AUTHORITY.KEYID = 7
1,213,520 UART: [ldev] FE.KEYID = 1
1,218,728 UART: [ldev] Erasing FE.KEYID = 1
1,245,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,990 UART: [ldev] --
1,284,403 UART: [fwproc] Wait for Commands...
1,285,013 UART: [fwproc] Recv command 0x46574c44
1,285,741 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,655 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,825 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,020 >>> mbox cmd response: success
2,830,246 UART: [afmc] ++
2,830,414 UART: [afmc] CDI.KEYID = 6
2,830,776 UART: [afmc] SUBJECT.KEYID = 7
2,831,201 UART: [afmc] AUTHORITY.KEYID = 5
2,867,452 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,677 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,386 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,269 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,970 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,760 UART: [afmc] --
2,910,648 UART: [cold-reset] --
2,911,262 UART: [state] Locking Datavault
2,912,527 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,131 UART: [state] Locking ICCM
2,913,721 UART: [exit] Launching FMC @ 0x40000130
2,919,051 UART:
2,919,067 UART: Running Caliptra FMC ...
2,919,475 UART:
2,919,618 UART: [state] CFI Enabled
2,930,310 UART: [fht] FMC Alias Private Key: 7
3,049,652 UART: [art] Extend RT PCRs Done
3,050,080 UART: [art] Lock RT PCRs Done
3,051,784 UART: [art] Populate DV Done
3,060,007 UART: [fht] FMC Alias Private Key: 7
3,061,027 UART: [art] Derive CDI
3,061,307 UART: [art] Store in slot 0x4
3,147,104 UART: [art] Derive Key Pair
3,147,464 UART: [art] Store priv key in slot 0x5
3,160,550 UART: [art] Derive Key Pair - Done
3,174,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,146 UART: [art] PUB.X = 9317BF2EC4CA6A316111EEAEE0E6F7E6DE6CF080DDB5063135785D5A56DA805E2CFCEE78F8C56688D549DC6C894A4DE9
3,197,933 UART: [art] PUB.Y = 45868A0984722D87545A28CDAB5F1C8C37B953607FFAAA8ED9AF621487D44170A66081B79436F5339EC262B4BEF77A39
3,204,880 UART: [art] SIG.R = DAB43C6D57295F7F4DF3B060DF3CE2748F60B60F0B6E7C378434F8DC0475B2CDD8DA6638D12325D3B9C17B55DDC9C7EA
3,211,659 UART: [art] SIG.S = F935160EB078C50A0F618F2B4BF078297284A08D7D9576BCBAFCB646A4C52E4D44F9BEDA7538950F5E90B3B37B811B2F
3,235,135 UART: Caliptra RT
3,235,478 UART: [state] CFI Enabled
3,355,360 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,356,030 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,888 UART: [rt]cmd =0x41544d4e, len=14344
3,789,259 >>> mbox cmd response data (8 bytes)
3,789,260 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,573 UART: [rt]cmd =0x41545348, len=116
3,821,159 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,906 ready_for_fw is high
1,060,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,011 >>> mbox cmd response: success
2,741,948 UART:
2,741,964 UART: Running Caliptra FMC ...
2,742,372 UART:
2,742,515 UART: [state] CFI Enabled
2,753,663 UART: [fht] FMC Alias Private Key: 7
2,872,683 UART: [art] Extend RT PCRs Done
2,873,111 UART: [art] Lock RT PCRs Done
2,874,609 UART: [art] Populate DV Done
2,882,648 UART: [fht] FMC Alias Private Key: 7
2,883,586 UART: [art] Derive CDI
2,883,866 UART: [art] Store in slot 0x4
2,969,847 UART: [art] Derive Key Pair
2,970,207 UART: [art] Store priv key in slot 0x5
2,983,197 UART: [art] Derive Key Pair - Done
2,997,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,904 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,669 UART: [art] PUB.X = 767F1C3F195851DAF4411870268FB91BDE0E5FF4E60F89BB22FD8DC7810DCB16B7638944309D60D6F32A3A09073CE6E1
3,020,430 UART: [art] PUB.Y = 0CC631785298472EC41F460F0A25C96F8B3BC07AE39DB7E23F144EDFFC81778B8E296A47C6EBB74E8504EAD0A6C607B7
3,027,377 UART: [art] SIG.R = 8E6CD4BCEAFCDF6FA7287C4E5FB60FD6555B24114A080AD716C83C07ADEFCB9A8736629D8CF633EC44D8E94D0F974ACC
3,034,158 UART: [art] SIG.S = D08CF7BB7A3A3B43AF896BE17D7EB3D68E94C1452D9F57FC3658DB521A87259AB54F3B8D4397A80215296E403EAE113A
3,057,913 UART: Caliptra RT
3,058,256 UART: [state] CFI Enabled
3,178,502 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,179,172 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,978 UART: [rt]cmd =0x41544d4e, len=14344
3,611,975 >>> mbox cmd response data (8 bytes)
3,611,976 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,259 UART: [rt]cmd =0x41545348, len=116
3,644,073 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,083 UART:
192,461 UART: Running Caliptra ROM ...
193,682 UART:
193,839 UART: [state] CFI Enabled
262,121 UART: [state] LifecycleState = Unprovisioned
264,039 UART: [state] DebugLocked = No
266,993 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,375 UART: [kat] SHA2-256
441,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,561 UART: [kat] ++
452,092 UART: [kat] sha1
463,048 UART: [kat] SHA2-256
465,699 UART: [kat] SHA2-384
471,762 UART: [kat] SHA2-512-ACC
474,129 UART: [kat] ECC-384
2,768,292 UART: [kat] HMAC-384Kdf
2,801,286 UART: [kat] LMS
3,991,589 UART: [kat] --
3,996,845 UART: [cold-reset] ++
3,998,152 UART: [fht] Storing FHT @ 0x50003400
4,009,705 UART: [idev] ++
4,010,279 UART: [idev] CDI.KEYID = 6
4,011,315 UART: [idev] SUBJECT.KEYID = 7
4,012,491 UART: [idev] UDS.KEYID = 0
4,013,553 ready_for_fw is high
4,013,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,862 UART: [idev] Erasing UDS.KEYID = 0
7,347,788 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,630 UART: [idev] --
7,374,117 UART: [ldev] ++
7,374,742 UART: [ldev] CDI.KEYID = 6
7,375,727 UART: [ldev] SUBJECT.KEYID = 5
7,376,954 UART: [ldev] AUTHORITY.KEYID = 7
7,378,149 UART: [ldev] FE.KEYID = 1
7,423,393 UART: [ldev] Erasing FE.KEYID = 1
10,756,734 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,065 UART: [ldev] --
13,114,679 UART: [fwproc] Waiting for Commands...
13,116,341 UART: [fwproc] Received command 0x46574c44
13,118,522 UART: [fwproc] Received Image of size 118548 bytes
17,220,255 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,165 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,341 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,206 >>> mbox cmd response: success
17,699,870 UART: [afmc] ++
17,700,484 UART: [afmc] CDI.KEYID = 6
17,701,393 UART: [afmc] SUBJECT.KEYID = 7
17,702,671 UART: [afmc] AUTHORITY.KEYID = 5
21,073,465 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,976 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,246 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,387,672 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,380 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,416,810 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,992 UART: [afmc] --
23,442,230 UART: [cold-reset] --
23,446,898 UART: [state] Locking Datavault
23,451,013 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,727 UART: [state] Locking ICCM
23,453,850 UART: [exit] Launching FMC @ 0x40000130
23,462,233 UART:
23,462,481 UART: Running Caliptra FMC ...
23,463,600 UART:
23,463,760 UART: [state] CFI Enabled
23,530,965 UART: [fht] FMC Alias Private Key: 7
25,871,663 UART: [art] Extend RT PCRs Done
25,872,899 UART: [art] Lock RT PCRs Done
25,874,284 UART: [art] Populate DV Done
25,879,748 UART: [fht] FMC Alias Private Key: 7
25,881,442 UART: [art] Derive CDI
25,882,252 UART: [art] Store in slot 0x4
25,939,755 UART: [art] Derive Key Pair
25,940,784 UART: [art] Store priv key in slot 0x5
29,233,705 UART: [art] Derive Key Pair - Done
29,246,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,535,139 UART: [art] Erasing AUTHORITY.KEYID = 7
31,536,653 UART: [art] PUB.X = 1B06D74CBCC656D84BC748D8A4B23EC2706F01D2180CE28A246F7D64B351B9B359F4CC4F85D4BD68E8C14706B1ED3103
31,543,935 UART: [art] PUB.Y = 2FC46958ED8E6EACDF35967BD460C988C876D5F32AC7A89BC521A2DD2A73024D6B4EB165FC1533E6C3DBB48D2DF21228
31,551,182 UART: [art] SIG.R = 365D151326F4C0FE51E9C377B707D52F28BA338F2BE879C83C61E4D2EDD7A5854812A0E9C18679F904ED6ECF733C8764
31,558,590 UART: [art] SIG.S = C0C5BC2D2E643BC9AA46359AA5B3A6AE23FC1FC39D75551D3E9AD9C29BD4227C26A20E3FD2F97D93C97CD39B67E76E88
32,864,149 UART: Caliptra RT
32,864,848 UART: [state] CFI Enabled
33,042,371 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,111,896 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,267,403 UART: [rt]cmd =0x41544d4e, len=14344
42,567,772 >>> mbox cmd response data (8 bytes)
42,568,411 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,599,439 UART: [rt]cmd =0x41545348, len=116
42,601,699 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,883 writing to cptra_bootfsm_go
3,789,158 ready_for_fw is high
3,789,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,942,259 >>> mbox cmd response: success
23,633,734 UART:
23,634,235 UART: Running Caliptra FMC ...
23,635,365 UART:
23,635,518 UART: [state] CFI Enabled
23,704,009 UART: [fht] FMC Alias Private Key: 7
26,043,953 UART: [art] Extend RT PCRs Done
26,045,197 UART: [art] Lock RT PCRs Done
26,046,970 UART: [art] Populate DV Done
26,052,516 UART: [fht] FMC Alias Private Key: 7
26,054,063 UART: [art] Derive CDI
26,054,884 UART: [art] Store in slot 0x4
26,112,146 UART: [art] Derive Key Pair
26,113,195 UART: [art] Store priv key in slot 0x5
29,406,046 UART: [art] Derive Key Pair - Done
29,419,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,706,533 UART: [art] Erasing AUTHORITY.KEYID = 7
31,708,045 UART: [art] PUB.X = EFC35CAF9BFD22FAD50B9FCF0B0D1B8C755F74496FF8C4C92986AADA0299FFCC3D565B9E7CA53ECF18385DCDA39C00F9
31,715,315 UART: [art] PUB.Y = 64CEF8A4104E5B80862D608CB708F1AB58DC75E95E64694B3723BF7C3034612C9FF5D94CDD4A5F4D973F7B11527ED99A
31,722,618 UART: [art] SIG.R = 68144810FFA6CB538A3812FC16BA2176B579552D7E94E91527B32B63FCBFD52EA704D6F88BB5B54ED6CF51AEBEB803CD
31,729,973 UART: [art] SIG.S = 95DF1A14F6C5FD7028EDB2E443129F20C6D7B012FECD06506315BD20B73AD6E7291F15900137BBDE333B44EE8DAB3032
33,035,080 UART: Caliptra RT
33,035,787 UART: [state] CFI Enabled
33,233,447 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,299,760 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,455,469 UART: [rt]cmd =0x41544d4e, len=14344
42,756,367 >>> mbox cmd response data (8 bytes)
42,756,994 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,787,847 UART: [rt]cmd =0x41545348, len=116
42,790,377 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,426 UART:
192,781 UART: Running Caliptra ROM ...
193,879 UART:
603,745 UART: [state] CFI Enabled
619,121 UART: [state] LifecycleState = Unprovisioned
621,064 UART: [state] DebugLocked = No
623,022 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,458 UART: [kat] SHA2-256
797,235 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,752 UART: [kat] ++
808,273 UART: [kat] sha1
819,380 UART: [kat] SHA2-256
822,069 UART: [kat] SHA2-384
826,871 UART: [kat] SHA2-512-ACC
829,247 UART: [kat] ECC-384
3,113,953 UART: [kat] HMAC-384Kdf
3,125,401 UART: [kat] LMS
4,315,483 UART: [kat] --
4,319,816 UART: [cold-reset] ++
4,322,460 UART: [fht] Storing FHT @ 0x50003400
4,333,505 UART: [idev] ++
4,334,070 UART: [idev] CDI.KEYID = 6
4,335,097 UART: [idev] SUBJECT.KEYID = 7
4,336,271 UART: [idev] UDS.KEYID = 0
4,337,253 ready_for_fw is high
4,337,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,324 UART: [idev] Erasing UDS.KEYID = 0
7,623,904 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,720 UART: [idev] --
7,650,164 UART: [ldev] ++
7,650,731 UART: [ldev] CDI.KEYID = 6
7,651,689 UART: [ldev] SUBJECT.KEYID = 5
7,652,897 UART: [ldev] AUTHORITY.KEYID = 7
7,654,173 UART: [ldev] FE.KEYID = 1
7,666,537 UART: [ldev] Erasing FE.KEYID = 1
10,954,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,584 UART: [ldev] --
13,315,369 UART: [fwproc] Waiting for Commands...
13,316,969 UART: [fwproc] Received command 0x46574c44
13,319,202 UART: [fwproc] Received Image of size 118548 bytes
17,423,510 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,613 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,771 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,709 >>> mbox cmd response: success
17,911,248 UART: [afmc] ++
17,911,830 UART: [afmc] CDI.KEYID = 6
17,912,738 UART: [afmc] SUBJECT.KEYID = 7
17,913,997 UART: [afmc] AUTHORITY.KEYID = 5
21,224,535 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,521,217 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,523,462 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,538,118 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,552,604 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,567,027 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,587,915 UART: [afmc] --
23,592,365 UART: [cold-reset] --
23,596,219 UART: [state] Locking Datavault
23,600,232 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,988 UART: [state] Locking ICCM
23,603,588 UART: [exit] Launching FMC @ 0x40000130
23,611,978 UART:
23,612,205 UART: Running Caliptra FMC ...
23,613,294 UART:
23,613,447 UART: [state] CFI Enabled
23,621,717 UART: [fht] FMC Alias Private Key: 7
25,962,248 UART: [art] Extend RT PCRs Done
25,963,470 UART: [art] Lock RT PCRs Done
25,965,118 UART: [art] Populate DV Done
25,970,467 UART: [fht] FMC Alias Private Key: 7
25,972,009 UART: [art] Derive CDI
25,972,821 UART: [art] Store in slot 0x4
26,015,457 UART: [art] Derive Key Pair
26,016,453 UART: [art] Store priv key in slot 0x5
29,259,360 UART: [art] Derive Key Pair - Done
29,272,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,346 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,857 UART: [art] PUB.X = 57C50F9DF9AA83864BDA0514BA53B3DB5B640923D76B58DCDD41E96AB76EDB68047782E797025DF48C6DD673DE8BFC5E
31,561,111 UART: [art] PUB.Y = D11D1A6E62E670023280A1FC0DCAC67B651C855103853114E7BD305BDF8A1ECAD2469C309F6F82DE63E3C0D41F017ADA
31,568,405 UART: [art] SIG.R = 1AE52D003C00EBC70FF8F8C00868CFAC1C705E0BFBC4686FBA36568D0D8698BC406F32360BC4F6686203CDD20FDEBB1B
31,575,740 UART: [art] SIG.S = B8D74225D68F8D16E45251D0EE2765F0FF4C465D656190963F3E7B3E213AC4FD4323A8711CBB4A55341A183874D47E4A
32,880,937 UART: Caliptra RT
32,881,647 UART: [state] CFI Enabled
33,015,254 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,077,338 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,233,037 UART: [rt]cmd =0x41544d4e, len=14344
42,534,035 >>> mbox cmd response data (8 bytes)
42,534,625 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,565,266 UART: [rt]cmd =0x41545348, len=116
42,567,578 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
4,131,600 ready_for_fw is high
4,132,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,211 >>> mbox cmd response: success
23,798,018 UART:
23,798,412 UART: Running Caliptra FMC ...
23,799,562 UART:
23,799,716 UART: [state] CFI Enabled
23,808,099 UART: [fht] FMC Alias Private Key: 7
26,148,283 UART: [art] Extend RT PCRs Done
26,149,510 UART: [art] Lock RT PCRs Done
26,150,886 UART: [art] Populate DV Done
26,156,202 UART: [fht] FMC Alias Private Key: 7
26,157,742 UART: [art] Derive CDI
26,158,479 UART: [art] Store in slot 0x4
26,201,282 UART: [art] Derive Key Pair
26,202,279 UART: [art] Store priv key in slot 0x5
29,444,205 UART: [art] Derive Key Pair - Done
29,456,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,547 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,057 UART: [art] PUB.X = 9B0E44C26F13558A37F512501C0598921E12ADFC6C6671AA7EF89A0831FAFBDBD0FF984418F2EA22A9D91D6B7EC37EA9
31,746,392 UART: [art] PUB.Y = 8753BC80378E1F552499D5E7FA998B60887817EF3DC965891CBD7D1243735D329B0555A031158A4D3C488388DB3FC4B1
31,753,558 UART: [art] SIG.R = C0C34F8CA0F516BAD7377A69B06461454DF6DDAD29DCEC585032525CB347F3C5834110B176E85691287922B124E21159
31,760,949 UART: [art] SIG.S = 6F4368C897013CF0EC04F762CF04FCB0176DA4B54CB662B702F8AFD6C7EE5622C62419FF203D91E06A7ECBE34DB60B1E
33,066,052 UART: Caliptra RT
33,066,767 UART: [state] CFI Enabled
33,200,538 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,263,128 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,418,806 UART: [rt]cmd =0x41544d4e, len=14344
42,719,391 >>> mbox cmd response data (8 bytes)
42,719,983 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,750,944 UART: [rt]cmd =0x41545348, len=116
42,753,363 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,255 UART:
192,619 UART: Running Caliptra ROM ...
193,805 UART:
193,954 UART: [state] CFI Enabled
265,449 UART: [state] LifecycleState = Unprovisioned
267,368 UART: [state] DebugLocked = No
270,270 UART: [state] WD Timer not started. Device not locked for debugging
275,023 UART: [kat] SHA2-256
454,641 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,451 UART: [kat] ++
465,927 UART: [kat] sha1
476,227 UART: [kat] SHA2-256
478,947 UART: [kat] SHA2-384
485,287 UART: [kat] SHA2-512-ACC
487,647 UART: [kat] ECC-384
2,949,795 UART: [kat] HMAC-384Kdf
2,971,389 UART: [kat] LMS
3,447,870 UART: [kat] --
3,452,854 UART: [cold-reset] ++
3,455,344 UART: [fht] FHT @ 0x50003400
3,466,669 UART: [idev] ++
3,467,297 UART: [idev] CDI.KEYID = 6
3,468,194 UART: [idev] SUBJECT.KEYID = 7
3,469,430 UART: [idev] UDS.KEYID = 0
3,470,399 ready_for_fw is high
3,470,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,701 UART: [idev] Erasing UDS.KEYID = 0
5,987,025 UART: [idev] Sha1 KeyId Algorithm
6,010,365 UART: [idev] --
6,013,820 UART: [ldev] ++
6,014,385 UART: [ldev] CDI.KEYID = 6
6,015,267 UART: [ldev] SUBJECT.KEYID = 5
6,016,531 UART: [ldev] AUTHORITY.KEYID = 7
6,017,760 UART: [ldev] FE.KEYID = 1
6,057,932 UART: [ldev] Erasing FE.KEYID = 1
8,564,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,929 UART: [ldev] --
10,373,222 UART: [fwproc] Wait for Commands...
10,374,814 UART: [fwproc] Recv command 0x46574c44
10,376,801 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,450 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,463 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,909 >>> mbox cmd response: success
14,345,795 UART: [afmc] ++
14,346,411 UART: [afmc] CDI.KEYID = 6
14,347,327 UART: [afmc] SUBJECT.KEYID = 7
14,348,541 UART: [afmc] AUTHORITY.KEYID = 5
16,894,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,341 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,536 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,320 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,412 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,967 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,775 UART: [afmc] --
18,698,049 UART: [cold-reset] --
18,702,191 UART: [state] Locking Datavault
18,706,351 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,100 UART: [state] Locking ICCM
18,709,867 UART: [exit] Launching FMC @ 0x40000130
18,718,314 UART:
18,718,546 UART: Running Caliptra FMC ...
18,719,645 UART:
18,719,795 UART: [state] CFI Enabled
18,774,702 UART: [fht] FMC Alias Private Key: 7
20,541,107 UART: [art] Extend RT PCRs Done
20,542,343 UART: [art] Lock RT PCRs Done
20,544,029 UART: [art] Populate DV Done
20,549,284 UART: [fht] FMC Alias Private Key: 7
20,550,827 UART: [art] Derive CDI
20,551,562 UART: [art] Store in slot 0x4
20,607,895 UART: [art] Derive Key Pair
20,608,887 UART: [art] Store priv key in slot 0x5
23,071,401 UART: [art] Derive Key Pair - Done
23,084,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,262 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,768 UART: [art] PUB.X = 722D96B5D366DBB4EAC3B54D5F79F90DF958F0239E8126BF555E19B3A4425EE7B71EB3CD24641476D1E29EC7D7E0E7DB
24,807,023 UART: [art] PUB.Y = 45701234685C22D730B1CE071C2D454E4F15E42119336DC552D29A4BCF819191BAA37D543D5D4226FFE9DD8FFE23701B
24,814,255 UART: [art] SIG.R = B7529B9D893D1B74BD9B06A4B596E18F5B8E9B52C15E385E070B8C281A0B8E59EC5245A26934A5F1C103168A9CCC72F4
24,821,648 UART: [art] SIG.S = 33144A9D8E39F653BDBCC8626691C1BEC78D3002AD8FB9784414F1B73D34EAF0DBE92607486F82AF0E8A9248A488F7F9
25,800,288 UART: Caliptra RT
25,800,986 UART: [state] CFI Enabled
25,982,593 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,021,791 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,177,611 UART: [rt]cmd =0x41544d4e, len=14344
34,173,505 >>> mbox cmd response data (8 bytes)
34,174,144 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,204,734 UART: [rt]cmd =0x41545348, len=116
34,207,051 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,460,350 ready_for_fw is high
3,460,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,221,962 >>> mbox cmd response: success
18,511,187 UART:
18,511,566 UART: Running Caliptra FMC ...
18,512,660 UART:
18,512,814 UART: [state] CFI Enabled
18,581,983 UART: [fht] FMC Alias Private Key: 7
20,348,161 UART: [art] Extend RT PCRs Done
20,349,384 UART: [art] Lock RT PCRs Done
20,351,032 UART: [art] Populate DV Done
20,356,396 UART: [fht] FMC Alias Private Key: 7
20,358,096 UART: [art] Derive CDI
20,358,834 UART: [art] Store in slot 0x4
20,414,625 UART: [art] Derive Key Pair
20,415,666 UART: [art] Store priv key in slot 0x5
22,878,940 UART: [art] Derive Key Pair - Done
22,891,844 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,102 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,605 UART: [art] PUB.X = 3C898514FECC691C354FB7E65F26077EBC02D7FFD0607C6458A91CF99D7C0360445D9178F64DB98856816F17544A396F
24,612,860 UART: [art] PUB.Y = DA3E674541EB4218DDDCF94641AC2CE69AB9A13533BE6378EFA91A304F8691EB0F61A620B201486E1064DD18832CDB11
24,620,150 UART: [art] SIG.R = 8A8405BECBD23FF374EC15B23A4899FCA42532958D8E06F1D6C7A8A242F07835685E298CE0B27B8ADC85A3848245AFDA
24,627,501 UART: [art] SIG.S = B7FEAA6645C3181156FF07C4A594F3C8717B606CC5B5B6ABCADA273B88E52A15CD2226D4E6F7E3EAACEC9AD329CB433D
25,606,278 UART: Caliptra RT
25,606,990 UART: [state] CFI Enabled
25,788,271 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,824,034 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,979,771 UART: [rt]cmd =0x41544d4e, len=14344
33,975,460 >>> mbox cmd response data (8 bytes)
33,976,036 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,006,630 UART: [rt]cmd =0x41545348, len=116
34,008,900 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,334 UART:
192,700 UART: Running Caliptra ROM ...
193,828 UART:
603,458 UART: [state] CFI Enabled
615,920 UART: [state] LifecycleState = Unprovisioned
617,792 UART: [state] DebugLocked = No
620,549 UART: [state] WD Timer not started. Device not locked for debugging
623,732 UART: [kat] SHA2-256
803,405 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,209 UART: [kat] ++
814,687 UART: [kat] sha1
826,557 UART: [kat] SHA2-256
829,288 UART: [kat] SHA2-384
835,225 UART: [kat] SHA2-512-ACC
837,643 UART: [kat] ECC-384
3,279,949 UART: [kat] HMAC-384Kdf
3,291,566 UART: [kat] LMS
3,768,079 UART: [kat] --
3,772,221 UART: [cold-reset] ++
3,774,292 UART: [fht] FHT @ 0x50003400
3,786,188 UART: [idev] ++
3,786,831 UART: [idev] CDI.KEYID = 6
3,787,763 UART: [idev] SUBJECT.KEYID = 7
3,789,006 UART: [idev] UDS.KEYID = 0
3,789,941 ready_for_fw is high
3,790,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,067 UART: [idev] Erasing UDS.KEYID = 0
6,264,244 UART: [idev] Sha1 KeyId Algorithm
6,288,983 UART: [idev] --
6,292,850 UART: [ldev] ++
6,293,432 UART: [ldev] CDI.KEYID = 6
6,294,320 UART: [ldev] SUBJECT.KEYID = 5
6,295,539 UART: [ldev] AUTHORITY.KEYID = 7
6,296,827 UART: [ldev] FE.KEYID = 1
6,307,578 UART: [ldev] Erasing FE.KEYID = 1
8,783,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,290 UART: [ldev] --
10,578,629 UART: [fwproc] Wait for Commands...
10,581,491 UART: [fwproc] Recv command 0x46574c44
10,583,477 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,161 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,163 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,284 >>> mbox cmd response: success
14,550,082 UART: [afmc] ++
14,550,736 UART: [afmc] CDI.KEYID = 6
14,551,648 UART: [afmc] SUBJECT.KEYID = 7
14,552,866 UART: [afmc] AUTHORITY.KEYID = 5
17,053,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,775,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,777,817 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,793,639 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,809,721 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,825,264 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,850,918 UART: [afmc] --
18,854,304 UART: [cold-reset] --
18,857,197 UART: [state] Locking Datavault
18,862,233 UART: [state] Locking PCR0, PCR1 and PCR31
18,863,999 UART: [state] Locking ICCM
18,865,609 UART: [exit] Launching FMC @ 0x40000130
18,874,006 UART:
18,874,247 UART: Running Caliptra FMC ...
18,875,349 UART:
18,875,507 UART: [state] CFI Enabled
18,883,825 UART: [fht] FMC Alias Private Key: 7
20,649,406 UART: [art] Extend RT PCRs Done
20,650,634 UART: [art] Lock RT PCRs Done
20,652,048 UART: [art] Populate DV Done
20,657,627 UART: [fht] FMC Alias Private Key: 7
20,659,219 UART: [art] Derive CDI
20,660,032 UART: [art] Store in slot 0x4
20,702,787 UART: [art] Derive Key Pair
20,703,847 UART: [art] Store priv key in slot 0x5
23,130,625 UART: [art] Derive Key Pair - Done
23,143,512 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,849,715 UART: [art] Erasing AUTHORITY.KEYID = 7
24,851,211 UART: [art] PUB.X = 903D825EF2601F375335126E47D40A9416D54AA53D65D5963E57F60EFF23013538FDF75EFD2389356446CA31DF58A1C6
24,858,448 UART: [art] PUB.Y = 811970D90A0730C776B1FE235EC6FDF8EF6503567818448288AF92BE718D45441FF411A6CEF0A07FFBEA9DF1B2FD2BF0
24,865,731 UART: [art] SIG.R = 0C122B97A04B8583311568DFF249D469884A965174B3E3F757B499D3460637A94541B241FC16147056DC83248926EA9B
24,873,069 UART: [art] SIG.S = 6F62D48F0271112CE64AE5B4F2919E3594A189AA84E4F38CA94CEB72F52921426F107C71A64A37158AF428AFF4254008
25,851,621 UART: Caliptra RT
25,852,322 UART: [state] CFI Enabled
25,985,023 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,020,632 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,176,448 UART: [rt]cmd =0x41544d4e, len=14344
34,172,164 >>> mbox cmd response data (8 bytes)
34,172,742 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,203,380 UART: [rt]cmd =0x41545348, len=116
34,205,992 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,777,722 ready_for_fw is high
3,778,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,639 >>> mbox cmd response: success
18,712,060 UART:
18,712,445 UART: Running Caliptra FMC ...
18,713,636 UART:
18,713,809 UART: [state] CFI Enabled
18,721,526 UART: [fht] FMC Alias Private Key: 7
20,487,803 UART: [art] Extend RT PCRs Done
20,489,031 UART: [art] Lock RT PCRs Done
20,490,965 UART: [art] Populate DV Done
20,496,340 UART: [fht] FMC Alias Private Key: 7
20,497,843 UART: [art] Derive CDI
20,498,611 UART: [art] Store in slot 0x4
20,541,646 UART: [art] Derive Key Pair
20,542,688 UART: [art] Store priv key in slot 0x5
22,969,716 UART: [art] Derive Key Pair - Done
22,982,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,689,317 UART: [art] Erasing AUTHORITY.KEYID = 7
24,690,823 UART: [art] PUB.X = 688FD2FADB287486D02D9C3FB0789E0142D63F6E6DE6A8EA66895C6E898BB8BFC601B14AC0A26678E0A98C6D79914557
24,698,139 UART: [art] PUB.Y = E8181D14DFC5A4835CFBC943544841378B44D6583A2DADCF7B637AAC971805669C6E4812E7401678C0311E76BE472C7A
24,705,338 UART: [art] SIG.R = E50DFC8563C5F333E3154659F906569BF54AAED9598484A01E30AF6A8204EA941F53B5AD770ADB300A0CDEBD8D3E7C23
24,712,749 UART: [art] SIG.S = 9EA6CD8032A9EDA66588A7F4630DCFC9E5E73622C424D9AAD4649109F98CCE37AE4DAF9D675304EE09360E81000EDAFB
25,691,260 UART: Caliptra RT
25,691,975 UART: [state] CFI Enabled
25,824,660 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,874,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,030,336 UART: [rt]cmd =0x41544d4e, len=14344
34,026,373 >>> mbox cmd response data (8 bytes)
34,026,971 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,057,630 UART: [rt]cmd =0x41545348, len=116
34,059,930 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
192,317 UART:
192,695 UART: Running Caliptra ROM ...
193,897 UART:
194,048 UART: [state] CFI Enabled
264,323 UART: [state] LifecycleState = Unprovisioned
266,751 UART: [state] DebugLocked = No
268,072 UART: [state] WD Timer not started. Device not locked for debugging
273,034 UART: [kat] SHA2-256
462,905 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,725 UART: [kat] ++
474,208 UART: [kat] sha1
485,248 UART: [kat] SHA2-256
488,311 UART: [kat] SHA2-384
494,664 UART: [kat] SHA2-512-ACC
497,242 UART: [kat] ECC-384
2,948,038 UART: [kat] HMAC-384Kdf
2,970,898 UART: [kat] LMS
3,502,622 UART: [kat] --
3,504,701 UART: [cold-reset] ++
3,506,420 UART: [fht] FHT @ 0x50003400
3,518,042 UART: [idev] ++
3,518,806 UART: [idev] CDI.KEYID = 6
3,519,727 UART: [idev] SUBJECT.KEYID = 7
3,520,896 UART: [idev] UDS.KEYID = 0
3,521,823 ready_for_fw is high
3,522,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,036 UART: [idev] Erasing UDS.KEYID = 0
6,031,007 UART: [idev] Sha1 KeyId Algorithm
6,051,868 UART: [idev] --
6,057,439 UART: [ldev] ++
6,058,170 UART: [ldev] CDI.KEYID = 6
6,059,084 UART: [ldev] SUBJECT.KEYID = 5
6,060,249 UART: [ldev] AUTHORITY.KEYID = 7
6,061,478 UART: [ldev] FE.KEYID = 1
6,102,442 UART: [ldev] Erasing FE.KEYID = 1
8,609,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,905 UART: [ldev] --
10,417,185 UART: [fwproc] Wait for Commands...
10,419,657 UART: [fwproc] Recv command 0x46574c44
10,421,909 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,133 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,353 >>> mbox cmd response: success
14,684,149 UART: [afmc] ++
14,684,887 UART: [afmc] CDI.KEYID = 6
14,686,087 UART: [afmc] SUBJECT.KEYID = 7
14,687,477 UART: [afmc] AUTHORITY.KEYID = 5
17,218,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,942,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,944,541 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,959,661 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,974,826 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,989,729 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,014,316 UART: [afmc] --
19,017,044 UART: [cold-reset] --
19,020,910 UART: [state] Locking Datavault
19,027,144 UART: [state] Locking PCR0, PCR1 and PCR31
19,029,292 UART: [state] Locking ICCM
19,031,176 UART: [exit] Launching FMC @ 0x40000130
19,039,802 UART:
19,040,081 UART: Running Caliptra FMC ...
19,041,198 UART:
19,041,397 UART: [state] CFI Enabled
19,099,456 UART: [fht] FMC Alias Private Key: 7
20,865,551 UART: [art] Extend RT PCRs Done
20,866,781 UART: [art] Lock RT PCRs Done
20,868,693 UART: [art] Populate DV Done
20,873,994 UART: [fht] FMC Alias Private Key: 7
20,875,532 UART: [art] Derive CDI
20,876,342 UART: [art] Store in slot 0x4
20,932,424 UART: [art] Derive Key Pair
20,933,438 UART: [art] Store priv key in slot 0x5
23,396,667 UART: [art] Derive Key Pair - Done
23,409,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,122,228 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,735 UART: [art] PUB.X = CDAF1663DA4742C1B31E2112B3A58C4A29855B38D87AA6C7F6E18044A6999CAAFDE4FFD21C1AA0D02076358C25FA8343
25,131,015 UART: [art] PUB.Y = 9EA6ED91F133CF670EFFF112306A8655FE1F8380E54C7C3FC8CF8E0C5AA2817E303471C3C62998A2CA92085030269DE2
25,138,284 UART: [art] SIG.R = 1A467517617D83F16469EC61B945B923F1A1DCC8BBB5A165CE8526BCBB4F0AF087FE8627F5462579277D2A0B8F94723E
25,145,629 UART: [art] SIG.S = F4C149B0FDA8EAB2995404C0BDF919BF96D5AE4B327EC615EB132078924338B1537666BDE7DE431632B62C84E1EE4035
26,125,098 UART: Caliptra RT
26,125,793 UART: [state] CFI Enabled
26,305,052 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,351,669 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,507,357 UART: [rt]cmd =0x41544d4e, len=14344
34,502,870 >>> mbox cmd response data (8 bytes)
34,503,451 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,534,071 UART: [rt]cmd =0x41545348, len=116
34,536,442 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,439,291 ready_for_fw is high
3,439,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,723 >>> mbox cmd response: success
19,109,420 UART:
19,109,818 UART: Running Caliptra FMC ...
19,111,021 UART:
19,111,204 UART: [state] CFI Enabled
19,177,268 UART: [fht] FMC Alias Private Key: 7
20,944,103 UART: [art] Extend RT PCRs Done
20,945,354 UART: [art] Lock RT PCRs Done
20,946,775 UART: [art] Populate DV Done
20,952,192 UART: [fht] FMC Alias Private Key: 7
20,953,836 UART: [art] Derive CDI
20,954,652 UART: [art] Store in slot 0x4
21,010,500 UART: [art] Derive Key Pair
21,011,504 UART: [art] Store priv key in slot 0x5
23,487,484 UART: [art] Derive Key Pair - Done
23,500,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,226 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,967 UART: [art] PUB.X = E7380AA61248BD3649EC48365252182F9C06A58C04EE558711EDB2C16D0941B7227F19DA285B649ABA489F3B47395B45
25,221,984 UART: [art] PUB.Y = B7ACC7859C6B0C0372D963BB6F1CD233638862B1DD50BE570C4404F654C273D1747B25F16583F8D9DA1BFE2A8603B241
25,229,225 UART: [art] SIG.R = 15654D22E08265665DF7AF8054850E5C67F9F2A9166F4EE543C4A23343605DBFB21A256FAF2DA5D989626727763388B6
25,236,581 UART: [art] SIG.S = 3F9B5B5EAE2CFEF2F8BC3ECBCEBAE95B3BADFC2738761B55C1A20A22BDE60529E324DB424BE4932C0F77FC66AAD6E44D
26,215,645 UART: Caliptra RT
26,216,366 UART: [state] CFI Enabled
26,396,505 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,441,688 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,597,404 UART: [rt]cmd =0x41544d4e, len=14344
34,593,332 >>> mbox cmd response data (8 bytes)
34,593,917 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,624,722 UART: [rt]cmd =0x41545348, len=116
34,626,961 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,451 UART:
192,816 UART: Running Caliptra ROM ...
193,920 UART:
603,727 UART: [state] CFI Enabled
615,807 UART: [state] LifecycleState = Unprovisioned
618,228 UART: [state] DebugLocked = No
619,890 UART: [state] WD Timer not started. Device not locked for debugging
624,798 UART: [kat] SHA2-256
814,633 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,440 UART: [kat] ++
825,961 UART: [kat] sha1
836,976 UART: [kat] SHA2-256
839,986 UART: [kat] SHA2-384
846,257 UART: [kat] SHA2-512-ACC
848,836 UART: [kat] ECC-384
3,288,490 UART: [kat] HMAC-384Kdf
3,301,717 UART: [kat] LMS
3,833,567 UART: [kat] --
3,838,555 UART: [cold-reset] ++
3,840,145 UART: [fht] FHT @ 0x50003400
3,851,346 UART: [idev] ++
3,852,064 UART: [idev] CDI.KEYID = 6
3,852,986 UART: [idev] SUBJECT.KEYID = 7
3,854,241 UART: [idev] UDS.KEYID = 0
3,855,169 ready_for_fw is high
3,855,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,296 UART: [idev] Erasing UDS.KEYID = 0
6,335,210 UART: [idev] Sha1 KeyId Algorithm
6,356,554 UART: [idev] --
6,361,791 UART: [ldev] ++
6,362,477 UART: [ldev] CDI.KEYID = 6
6,363,360 UART: [ldev] SUBJECT.KEYID = 5
6,364,573 UART: [ldev] AUTHORITY.KEYID = 7
6,365,808 UART: [ldev] FE.KEYID = 1
6,374,750 UART: [ldev] Erasing FE.KEYID = 1
8,853,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,147 UART: [ldev] --
10,643,980 UART: [fwproc] Wait for Commands...
10,646,941 UART: [fwproc] Recv command 0x46574c44
10,649,255 UART: [fwproc] Recv'd Img size: 118548 bytes
14,135,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,213,334 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,336,939 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,897,474 >>> mbox cmd response: success
14,901,029 UART: [afmc] ++
14,901,762 UART: [afmc] CDI.KEYID = 6
14,902,965 UART: [afmc] SUBJECT.KEYID = 7
14,904,434 UART: [afmc] AUTHORITY.KEYID = 5
17,408,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,132,525 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,134,487 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,149,588 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,164,736 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,179,701 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,203,149 UART: [afmc] --
19,206,927 UART: [cold-reset] --
19,210,154 UART: [state] Locking Datavault
19,214,610 UART: [state] Locking PCR0, PCR1 and PCR31
19,216,771 UART: [state] Locking ICCM
19,218,507 UART: [exit] Launching FMC @ 0x40000130
19,227,147 UART:
19,227,382 UART: Running Caliptra FMC ...
19,228,489 UART:
19,228,670 UART: [state] CFI Enabled
19,236,460 UART: [fht] FMC Alias Private Key: 7
21,002,269 UART: [art] Extend RT PCRs Done
21,003,487 UART: [art] Lock RT PCRs Done
21,005,037 UART: [art] Populate DV Done
21,010,722 UART: [fht] FMC Alias Private Key: 7
21,012,409 UART: [art] Derive CDI
21,013,160 UART: [art] Store in slot 0x4
21,055,708 UART: [art] Derive Key Pair
21,056,712 UART: [art] Store priv key in slot 0x5
23,483,776 UART: [art] Derive Key Pair - Done
23,496,658 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,006 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,525 UART: [art] PUB.X = B194460C93536BE83CEF88CDC0459F62E432B19649A1FFF82C4AD96FD1411A859FFAB28A8A298FEEFA3B5C5B12134DD1
25,211,798 UART: [art] PUB.Y = EE4DA95FB77640BCF2A20350790793E9E9BA46B76746D6D567FDC2CFE7E018C162A79FA0D0507D4E3C9C6AC5A5F173EE
25,219,063 UART: [art] SIG.R = DDBA82F494C1328FB3B0787BEF9808B8612AA61E59F03B78A5EE3235F23A6F778A6C95757B556C6180BD03B237473F33
25,226,460 UART: [art] SIG.S = A68B0AF9DF5C4F957433C16EAFFE36F993C2560927AA540375AFFDA535EA753427CF96B231921FCBBDB95B9E0D017B73
26,205,864 UART: Caliptra RT
26,206,576 UART: [state] CFI Enabled
26,339,549 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,393,451 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,549,170 UART: [rt]cmd =0x41544d4e, len=14344
34,544,628 >>> mbox cmd response data (8 bytes)
34,545,218 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,575,795 UART: [rt]cmd =0x41545348, len=116
34,578,066 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,757,255 ready_for_fw is high
3,757,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,988 >>> mbox cmd response: success
19,300,058 UART:
19,300,463 UART: Running Caliptra FMC ...
19,301,599 UART:
19,301,761 UART: [state] CFI Enabled
19,309,838 UART: [fht] FMC Alias Private Key: 7
21,076,314 UART: [art] Extend RT PCRs Done
21,077,543 UART: [art] Lock RT PCRs Done
21,078,986 UART: [art] Populate DV Done
21,084,435 UART: [fht] FMC Alias Private Key: 7
21,085,882 UART: [art] Derive CDI
21,086,659 UART: [art] Store in slot 0x4
21,129,706 UART: [art] Derive Key Pair
21,130,755 UART: [art] Store priv key in slot 0x5
23,557,085 UART: [art] Derive Key Pair - Done
23,569,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,157 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,670 UART: [art] PUB.X = 923E2A611DA9698BC2CE3CD36523F0C759DBD744DB64AB1407611163A9FE10D2EDC2A8DC0808FD8463341516FA6348B9
25,284,911 UART: [art] PUB.Y = 4E599A36D514B6A2985A31A6981226FB6F411D0AC3E92910F4FC22F720F0CB7719C00187F56DBBC5287879E885E29579
25,292,124 UART: [art] SIG.R = 730BE45B83799CFDC8C1BF0C9235144B235397EBDF177A287F1E95A2BEA7E23FB96A9E1BE42B175911248E5769BB9218
25,299,575 UART: [art] SIG.S = 2FC36608F4D95E7C002BFEAB89D20D5D46D9E2E0774B29E2CDDE0EA7000144446B0BA2EDD75C6BDBAB90075289ACCD7B
26,278,362 UART: Caliptra RT
26,279,051 UART: [state] CFI Enabled
26,412,098 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,467,444 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,623,075 UART: [rt]cmd =0x41544d4e, len=14344
34,618,641 >>> mbox cmd response data (8 bytes)
34,619,655 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,650,485 UART: [rt]cmd =0x41545348, len=116
34,652,999 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,603 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,243 UART: [kat] SHA2-256
882,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,289 UART: [kat] ++
886,441 UART: [kat] sha1
890,787 UART: [kat] SHA2-256
892,725 UART: [kat] SHA2-384
895,718 UART: [kat] SHA2-512-ACC
897,619 UART: [kat] ECC-384
903,234 UART: [kat] HMAC-384Kdf
907,600 UART: [kat] LMS
1,475,796 UART: [kat] --
1,476,819 UART: [cold-reset] ++
1,477,295 UART: [fht] Storing FHT @ 0x50003400
1,480,184 UART: [idev] ++
1,480,352 UART: [idev] CDI.KEYID = 6
1,480,712 UART: [idev] SUBJECT.KEYID = 7
1,481,136 UART: [idev] UDS.KEYID = 0
1,481,481 ready_for_fw is high
1,481,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,250 UART: [idev] Erasing UDS.KEYID = 0
1,506,376 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,854 UART: [idev] --
1,515,859 UART: [ldev] ++
1,516,027 UART: [ldev] CDI.KEYID = 6
1,516,390 UART: [ldev] SUBJECT.KEYID = 5
1,516,816 UART: [ldev] AUTHORITY.KEYID = 7
1,517,279 UART: [ldev] FE.KEYID = 1
1,522,475 UART: [ldev] Erasing FE.KEYID = 1
1,547,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,826 UART: [ldev] --
1,586,271 UART: [fwproc] Waiting for Commands...
1,586,940 UART: [fwproc] Received command 0x46574c44
1,587,731 UART: [fwproc] Received Image of size 118548 bytes
2,932,213 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,881 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,099 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,548 >>> mbox cmd response: success
3,132,628 UART: [afmc] ++
3,132,796 UART: [afmc] CDI.KEYID = 6
3,133,158 UART: [afmc] SUBJECT.KEYID = 7
3,133,583 UART: [afmc] AUTHORITY.KEYID = 5
3,169,070 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,344 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,124 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,833 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,716 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,399 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,433 UART: [afmc] --
3,212,561 UART: [cold-reset] --
3,213,225 UART: [state] Locking Datavault
3,214,358 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,962 UART: [state] Locking ICCM
3,215,398 UART: [exit] Launching FMC @ 0x40000130
3,220,728 UART:
3,220,744 UART: Running Caliptra FMC ...
3,221,152 UART:
3,221,206 UART: [state] CFI Enabled
3,232,010 UART: [fht] FMC Alias Private Key: 7
3,351,296 UART: [art] Extend RT PCRs Done
3,351,724 UART: [art] Lock RT PCRs Done
3,353,208 UART: [art] Populate DV Done
3,361,501 UART: [fht] FMC Alias Private Key: 7
3,362,529 UART: [art] Derive CDI
3,362,809 UART: [art] Store in slot 0x4
3,448,545 UART: [art] Derive Key Pair
3,448,905 UART: [art] Store priv key in slot 0x5
3,461,714 UART: [art] Derive Key Pair - Done
3,476,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,309 UART: [art] PUB.X = 10A8D8897D4975979F7E516BA817911B1A099948DA9C3E534A37B3C7E2CAB9655FDD4DAAC282DE13B0FFBED3DB706B36
3,500,090 UART: [art] PUB.Y = EBB7E2459205B24A26EDE7329DF611AA9128262B48DE9ACBBC5E17D2D5E4A4EB1C7CA46BE70790A9F8D4357CE240CF8A
3,507,054 UART: [art] SIG.R = 57E63F7288E5FDA5E883139F0DC05A32C5876F99BC0266AC1DB20A17BB8844ABADEB06D7C309073B35614342496F46C6
3,513,810 UART: [art] SIG.S = 5C9C21FA48930CBA071E83B194D69C0BED4562C0EB898588ED15A1C8D21194E613B6A6EE3A3D5674CAFD32EE768D5450
3,537,715 UART: Caliptra RT
3,537,966 UART: [state] CFI Enabled
3,658,519 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,659,189 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,169 UART: [rt]cmd =0x41544d4e, len=14344
4,091,812 >>> mbox cmd response data (8 bytes)
4,091,813 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,014 UART: [rt]cmd =0x41545348, len=116
4,124,097 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,245 ready_for_fw is high
1,362,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,438 >>> mbox cmd response: success
3,043,101 UART:
3,043,117 UART: Running Caliptra FMC ...
3,043,525 UART:
3,043,579 UART: [state] CFI Enabled
3,054,441 UART: [fht] FMC Alias Private Key: 7
3,173,097 UART: [art] Extend RT PCRs Done
3,173,525 UART: [art] Lock RT PCRs Done
3,174,911 UART: [art] Populate DV Done
3,183,316 UART: [fht] FMC Alias Private Key: 7
3,184,370 UART: [art] Derive CDI
3,184,650 UART: [art] Store in slot 0x4
3,270,494 UART: [art] Derive Key Pair
3,270,854 UART: [art] Store priv key in slot 0x5
3,284,323 UART: [art] Derive Key Pair - Done
3,299,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,352 UART: [art] PUB.X = 5E2258A5F5CBC4C78E3A8A9790D61F377C6A6048581A3997663899F6C1F4462C691EFD388120F826CD611EF8E3F822EF
3,322,122 UART: [art] PUB.Y = A9EBEDF7FE4ADC43480FAADB5EE5E03B9BFEE5D19C595C9F1F0049503B82ECB63F11F5A3B0EF9C470D88DD979309BC54
3,329,069 UART: [art] SIG.R = B6F8A70F7908DF6BA026BA7AEA530331E491F1CE44633E22665B90B63EF6C0453C5B8382B31A38A8ED323E065DBD76A7
3,335,835 UART: [art] SIG.S = 0755CFB49BBB2D8E5ED1AF160F5D0D7328B992467D0CD7527487A8D414108336A1602B3F19BFEC477276E65F8CB23AEB
3,360,151 UART: Caliptra RT
3,360,402 UART: [state] CFI Enabled
3,480,148 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,480,818 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,868 UART: [rt]cmd =0x41544d4e, len=14344
3,913,991 >>> mbox cmd response data (8 bytes)
3,913,992 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,019 UART: [rt]cmd =0x41545348, len=116
3,945,836 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,420 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,028 UART: [kat] SHA2-256
881,959 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,074 UART: [kat] ++
886,226 UART: [kat] sha1
890,350 UART: [kat] SHA2-256
892,288 UART: [kat] SHA2-384
894,929 UART: [kat] SHA2-512-ACC
896,830 UART: [kat] ECC-384
902,519 UART: [kat] HMAC-384Kdf
907,157 UART: [kat] LMS
1,475,353 UART: [kat] --
1,475,932 UART: [cold-reset] ++
1,476,372 UART: [fht] Storing FHT @ 0x50003400
1,479,059 UART: [idev] ++
1,479,227 UART: [idev] CDI.KEYID = 6
1,479,587 UART: [idev] SUBJECT.KEYID = 7
1,480,011 UART: [idev] UDS.KEYID = 0
1,480,356 ready_for_fw is high
1,480,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,453 UART: [idev] Erasing UDS.KEYID = 0
1,504,639 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,169 UART: [idev] --
1,514,322 UART: [ldev] ++
1,514,490 UART: [ldev] CDI.KEYID = 6
1,514,853 UART: [ldev] SUBJECT.KEYID = 5
1,515,279 UART: [ldev] AUTHORITY.KEYID = 7
1,515,742 UART: [ldev] FE.KEYID = 1
1,521,030 UART: [ldev] Erasing FE.KEYID = 1
1,546,569 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,271 UART: [ldev] --
1,585,690 UART: [fwproc] Waiting for Commands...
1,586,339 UART: [fwproc] Received command 0x46574c44
1,587,130 UART: [fwproc] Received Image of size 118548 bytes
2,932,288 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,728 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,946 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,329 >>> mbox cmd response: success
3,131,387 UART: [afmc] ++
3,131,555 UART: [afmc] CDI.KEYID = 6
3,131,917 UART: [afmc] SUBJECT.KEYID = 7
3,132,342 UART: [afmc] AUTHORITY.KEYID = 5
3,168,021 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,471 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,251 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,960 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,843 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,526 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,504 UART: [afmc] --
3,211,610 UART: [cold-reset] --
3,212,456 UART: [state] Locking Datavault
3,213,423 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,027 UART: [state] Locking ICCM
3,214,595 UART: [exit] Launching FMC @ 0x40000130
3,219,925 UART:
3,219,941 UART: Running Caliptra FMC ...
3,220,349 UART:
3,220,492 UART: [state] CFI Enabled
3,231,410 UART: [fht] FMC Alias Private Key: 7
3,350,730 UART: [art] Extend RT PCRs Done
3,351,158 UART: [art] Lock RT PCRs Done
3,352,566 UART: [art] Populate DV Done
3,360,835 UART: [fht] FMC Alias Private Key: 7
3,361,807 UART: [art] Derive CDI
3,362,087 UART: [art] Store in slot 0x4
3,447,599 UART: [art] Derive Key Pair
3,447,959 UART: [art] Store priv key in slot 0x5
3,461,216 UART: [art] Derive Key Pair - Done
3,475,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,611 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,376 UART: [art] PUB.X = 4CA2E131688C274886E6FFC1EA4004EF26E5BF2E3846F09080FDD23BB74439F636B96545973F87D1FCEB596A1C19F465
3,499,147 UART: [art] PUB.Y = 46BCFDAC1DA6E8815D77ED9512F033ED47F75BF2FBD922B1D20AE0602DAD0CA2DA85355CDE270BA8D218E61867C40F80
3,506,105 UART: [art] SIG.R = F8D00188461A33044E8331454AFAE97E0E38519896C3C1356C48FB19C4438DAF386D67BDCCB04C0B9EA47BBB12520CE0
3,512,866 UART: [art] SIG.S = 4781318745B170FD02859E4F90C91A96C42052866EFBD30BAEC242ECAEF03D05CBC5A16A04A562450835209FFB65C462
3,536,539 UART: Caliptra RT
3,536,882 UART: [state] CFI Enabled
3,657,066 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,736 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,872 UART: [rt]cmd =0x41544d4e, len=14344
4,091,679 >>> mbox cmd response data (8 bytes)
4,091,680 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,923 UART: [rt]cmd =0x41545348, len=116
4,123,810 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,710 ready_for_fw is high
1,362,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,195 >>> mbox cmd response: success
3,040,966 UART:
3,040,982 UART: Running Caliptra FMC ...
3,041,390 UART:
3,041,533 UART: [state] CFI Enabled
3,052,229 UART: [fht] FMC Alias Private Key: 7
3,171,513 UART: [art] Extend RT PCRs Done
3,171,941 UART: [art] Lock RT PCRs Done
3,173,161 UART: [art] Populate DV Done
3,181,620 UART: [fht] FMC Alias Private Key: 7
3,182,762 UART: [art] Derive CDI
3,183,042 UART: [art] Store in slot 0x4
3,268,524 UART: [art] Derive Key Pair
3,268,884 UART: [art] Store priv key in slot 0x5
3,282,545 UART: [art] Derive Key Pair - Done
3,297,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,696 UART: [art] PUB.X = D865A8FEA5B1C9C201240F2B95F57EC079D5C45334218B1B702262AF8DA7B2252384B3040739C0A72B0F36DA065F6C89
3,320,448 UART: [art] PUB.Y = 4E4F79C72FF55A22C51BC8838632AA2DB3F71E99268E83C2F5433F85F91D736FCA1681A4B77116162D06E73F17492B36
3,327,393 UART: [art] SIG.R = 8D4BF32CAD4510E96AD1698DF64C32E17CA172B0DE78360AD30639A72AEEB4C3CF3580E7242F928572355DB07EE9E9A7
3,334,167 UART: [art] SIG.S = 9FCD261FD12D3D7026AC97C129183136F17FDC71544D799A07CBE2BC83752C899EA28BF350B064A7273CD92450527E0F
3,357,747 UART: Caliptra RT
3,358,090 UART: [state] CFI Enabled
3,477,697 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,478,367 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,523 UART: [rt]cmd =0x41544d4e, len=14344
3,911,974 >>> mbox cmd response data (8 bytes)
3,911,975 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,096 UART: [rt]cmd =0x41545348, len=116
3,944,001 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,347 UART: [kat] SHA2-512-ACC
906,248 UART: [kat] ECC-384
915,699 UART: [kat] HMAC-384Kdf
920,239 UART: [kat] LMS
1,168,551 UART: [kat] --
1,169,386 UART: [cold-reset] ++
1,169,796 UART: [fht] FHT @ 0x50003400
1,172,556 UART: [idev] ++
1,172,724 UART: [idev] CDI.KEYID = 6
1,173,085 UART: [idev] SUBJECT.KEYID = 7
1,173,510 UART: [idev] UDS.KEYID = 0
1,173,856 ready_for_fw is high
1,173,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,198,343 UART: [idev] Sha1 KeyId Algorithm
1,207,219 UART: [idev] --
1,208,418 UART: [ldev] ++
1,208,586 UART: [ldev] CDI.KEYID = 6
1,208,950 UART: [ldev] SUBJECT.KEYID = 5
1,209,377 UART: [ldev] AUTHORITY.KEYID = 7
1,209,840 UART: [ldev] FE.KEYID = 1
1,215,014 UART: [ldev] Erasing FE.KEYID = 1
1,241,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,280 UART: [ldev] --
1,280,533 UART: [fwproc] Wait for Commands...
1,281,304 UART: [fwproc] Recv command 0x46574c44
1,282,037 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,521 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,696 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,855 >>> mbox cmd response: success
2,826,935 UART: [afmc] ++
2,827,103 UART: [afmc] CDI.KEYID = 6
2,827,466 UART: [afmc] SUBJECT.KEYID = 7
2,827,892 UART: [afmc] AUTHORITY.KEYID = 5
2,862,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,751 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,461 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,342 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,043 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,652 UART: [afmc] --
2,905,559 UART: [cold-reset] --
2,906,407 UART: [state] Locking Datavault
2,907,528 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,132 UART: [state] Locking ICCM
2,908,616 UART: [exit] Launching FMC @ 0x40000130
2,913,946 UART:
2,913,962 UART: Running Caliptra FMC ...
2,914,370 UART:
2,914,424 UART: [state] CFI Enabled
2,925,110 UART: [fht] FMC Alias Private Key: 7
3,044,684 UART: [art] Extend RT PCRs Done
3,045,112 UART: [art] Lock RT PCRs Done
3,046,514 UART: [art] Populate DV Done
3,054,767 UART: [fht] FMC Alias Private Key: 7
3,055,793 UART: [art] Derive CDI
3,056,073 UART: [art] Store in slot 0x4
3,141,518 UART: [art] Derive Key Pair
3,141,878 UART: [art] Store priv key in slot 0x5
3,155,100 UART: [art] Derive Key Pair - Done
3,170,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,394 UART: [art] PUB.X = 493FD4C66AB9C43CE02F6FFAB4840BA8DC726655642C5000BC8865685168471E6C56418229D5E1277838DF7844D64A32
3,193,133 UART: [art] PUB.Y = C902722CCAA5C843291AE5E17113E00BB9FB1AA7FC48DF8D15B76D53A787361DFAC5294BA5175C70CA704BE2C33B9C0A
3,200,090 UART: [art] SIG.R = 1ADF86288A37A82CE33CE96CB510F3708BC934BB16D3D216539DAED8FAEF9CA28A3508652DF77625D1949A667812EA58
3,206,865 UART: [art] SIG.S = 40C23CD456D51FF817833BD98CAE37C6CA8CC3DDB1FE65EE3B86D4C29D155E3DC2BE1EC9030F6A4550D78FA830CF3065
3,231,055 UART: Caliptra RT
3,231,306 UART: [state] CFI Enabled
3,350,958 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,628 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,742 UART: [rt]cmd =0x41544d4e, len=14344
3,784,973 >>> mbox cmd response data (8 bytes)
3,784,974 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,873 UART: [rt]cmd =0x41545348, len=116
3,816,872 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,450 ready_for_fw is high
1,059,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,100 >>> mbox cmd response: success
2,739,163 UART:
2,739,179 UART: Running Caliptra FMC ...
2,739,587 UART:
2,739,641 UART: [state] CFI Enabled
2,750,299 UART: [fht] FMC Alias Private Key: 7
2,869,413 UART: [art] Extend RT PCRs Done
2,869,841 UART: [art] Lock RT PCRs Done
2,871,567 UART: [art] Populate DV Done
2,879,758 UART: [fht] FMC Alias Private Key: 7
2,880,906 UART: [art] Derive CDI
2,881,186 UART: [art] Store in slot 0x4
2,966,755 UART: [art] Derive Key Pair
2,967,115 UART: [art] Store priv key in slot 0x5
2,980,009 UART: [art] Derive Key Pair - Done
2,994,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,382 UART: [art] PUB.X = B38F1BCB7F9B4C6015895601F74B6C08B78B295F75A133154273E1174FD1A8B55B41B85487549BE055C64937D2EF3D47
3,018,142 UART: [art] PUB.Y = 7C8246A8267E65A6936FE80CBD45C5A104F88A8667EEF5DF26319B58B55A32419723253C302FF12E7E491E38C4296D66
3,025,082 UART: [art] SIG.R = DB8688E18B2C18B521BBA6EE25C69ED78E9844597496109EC5569D4C3140E9E37C8EDBDD90851207C6E2338A25CACD43
3,031,855 UART: [art] SIG.S = 6575EB01B88AB179D9BA72B2F4C49A0CB10C557F51C0376EE65A522D32B143713783DCD28AD891AB0AACA2638AFCBBEB
3,055,169 UART: Caliptra RT
3,055,420 UART: [state] CFI Enabled
3,174,947 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,175,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,821 UART: [rt]cmd =0x41544d4e, len=14344
3,608,860 >>> mbox cmd response data (8 bytes)
3,608,861 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,016 UART: [rt]cmd =0x41545348, len=116
3,640,917 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,891 UART: [kat] ++
896,043 UART: [kat] sha1
900,159 UART: [kat] SHA2-256
902,099 UART: [kat] SHA2-384
904,822 UART: [kat] SHA2-512-ACC
906,723 UART: [kat] ECC-384
916,174 UART: [kat] HMAC-384Kdf
920,908 UART: [kat] LMS
1,169,220 UART: [kat] --
1,169,987 UART: [cold-reset] ++
1,170,313 UART: [fht] FHT @ 0x50003400
1,173,133 UART: [idev] ++
1,173,301 UART: [idev] CDI.KEYID = 6
1,173,662 UART: [idev] SUBJECT.KEYID = 7
1,174,087 UART: [idev] UDS.KEYID = 0
1,174,433 ready_for_fw is high
1,174,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,058 UART: [idev] Erasing UDS.KEYID = 0
1,199,480 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,131 UART: [ldev] ++
1,209,299 UART: [ldev] CDI.KEYID = 6
1,209,663 UART: [ldev] SUBJECT.KEYID = 5
1,210,090 UART: [ldev] AUTHORITY.KEYID = 7
1,210,553 UART: [ldev] FE.KEYID = 1
1,215,871 UART: [ldev] Erasing FE.KEYID = 1
1,243,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,649 UART: [ldev] --
1,281,872 UART: [fwproc] Wait for Commands...
1,282,597 UART: [fwproc] Recv command 0x46574c44
1,283,330 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,320 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,495 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,714 >>> mbox cmd response: success
2,826,974 UART: [afmc] ++
2,827,142 UART: [afmc] CDI.KEYID = 6
2,827,505 UART: [afmc] SUBJECT.KEYID = 7
2,827,931 UART: [afmc] AUTHORITY.KEYID = 5
2,863,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,830 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,540 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,421 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,122 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,851 UART: [afmc] --
2,906,732 UART: [cold-reset] --
2,907,708 UART: [state] Locking Datavault
2,908,847 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,451 UART: [state] Locking ICCM
2,910,067 UART: [exit] Launching FMC @ 0x40000130
2,915,397 UART:
2,915,413 UART: Running Caliptra FMC ...
2,915,821 UART:
2,915,964 UART: [state] CFI Enabled
2,926,286 UART: [fht] FMC Alias Private Key: 7
3,045,234 UART: [art] Extend RT PCRs Done
3,045,662 UART: [art] Lock RT PCRs Done
3,047,338 UART: [art] Populate DV Done
3,055,725 UART: [fht] FMC Alias Private Key: 7
3,056,655 UART: [art] Derive CDI
3,056,935 UART: [art] Store in slot 0x4
3,142,496 UART: [art] Derive Key Pair
3,142,856 UART: [art] Store priv key in slot 0x5
3,156,136 UART: [art] Derive Key Pair - Done
3,171,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,324 UART: [art] PUB.X = 4742CA267E8630A8264C2D0D2453B218B91AA33A47A61FD85D3A36790F9A121F853C7FC972E2558A9E54D7D928E1A7D6
3,194,088 UART: [art] PUB.Y = 0138AF62D388DA41BC1615824BCCF9E2E8AE94263534E3F44AC52EA4D0694129EA3E63781ABA9F3AA76C237AEFA46DE5
3,201,049 UART: [art] SIG.R = ABDA90BFBD5D59823A41CA82EDDD78A1F954279BA8071A89EF2ED89C1AFAD77410CAA15E2DDDA18BFAB8A9A2C71E6656
3,207,846 UART: [art] SIG.S = 4398D9E31E0C11CEB8E504C9418F6119E90AB3E9A6A9E5CB64D44F986317A9B42DED63EE59D9C4E5DC1C56E0CE884912
3,231,651 UART: Caliptra RT
3,231,994 UART: [state] CFI Enabled
3,350,917 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,587 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,683 UART: [rt]cmd =0x41544d4e, len=14344
3,784,450 >>> mbox cmd response data (8 bytes)
3,784,451 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,358 UART: [rt]cmd =0x41545348, len=116
3,816,049 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,977 ready_for_fw is high
1,059,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,023 >>> mbox cmd response: success
2,742,108 UART:
2,742,124 UART: Running Caliptra FMC ...
2,742,532 UART:
2,742,675 UART: [state] CFI Enabled
2,753,609 UART: [fht] FMC Alias Private Key: 7
2,873,455 UART: [art] Extend RT PCRs Done
2,873,883 UART: [art] Lock RT PCRs Done
2,875,835 UART: [art] Populate DV Done
2,884,374 UART: [fht] FMC Alias Private Key: 7
2,885,316 UART: [art] Derive CDI
2,885,596 UART: [art] Store in slot 0x4
2,971,815 UART: [art] Derive Key Pair
2,972,175 UART: [art] Store priv key in slot 0x5
2,985,643 UART: [art] Derive Key Pair - Done
3,000,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,267 UART: [art] PUB.X = 079ED560A5B5C769F761DFB5779010E1C23508F03891F2037204513DB4ED5E75797F7FBD3C9A9CE2DAD9937073D79917
3,023,023 UART: [art] PUB.Y = 8DB9BD58405F30851CD474B191A8BE9EE039AA845201113AB6FFAFEBEC667788DAE8193A47C6B6117D9D8B980AF20435
3,029,974 UART: [art] SIG.R = F27FC686FB848E0A91217E4B5C748EC2FF4E469656F6A93EE62D40B7E19A9625630443F3F4022C91DB9099B4245015F6
3,036,733 UART: [art] SIG.S = 94A6FA0D849F449339B79B7F466CDA32BB999C9F6B6CA83B5ED22F3352FEDEA5969C12D9FB780EBE6D0AE6828829304A
3,060,568 UART: Caliptra RT
3,060,911 UART: [state] CFI Enabled
3,180,413 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,181,083 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,009 UART: [rt]cmd =0x41544d4e, len=14344
3,613,696 >>> mbox cmd response data (8 bytes)
3,613,697 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,936 UART: [rt]cmd =0x41545348, len=116
3,645,903 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,634 UART: [state] LifecycleState = Unprovisioned
86,289 UART: [state] DebugLocked = No
86,977 UART: [state] WD Timer not started. Device not locked for debugging
88,338 UART: [kat] SHA2-256
893,988 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,113 UART: [kat] ++
898,265 UART: [kat] sha1
902,345 UART: [kat] SHA2-256
904,285 UART: [kat] SHA2-384
906,914 UART: [kat] SHA2-512-ACC
908,815 UART: [kat] ECC-384
918,340 UART: [kat] HMAC-384Kdf
923,100 UART: [kat] LMS
1,171,428 UART: [kat] --
1,172,341 UART: [cold-reset] ++
1,172,799 UART: [fht] FHT @ 0x50003400
1,175,382 UART: [idev] ++
1,175,550 UART: [idev] CDI.KEYID = 6
1,175,910 UART: [idev] SUBJECT.KEYID = 7
1,176,334 UART: [idev] UDS.KEYID = 0
1,176,679 ready_for_fw is high
1,176,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,086 UART: [idev] Erasing UDS.KEYID = 0
1,201,179 UART: [idev] Sha1 KeyId Algorithm
1,209,751 UART: [idev] --
1,210,671 UART: [ldev] ++
1,210,839 UART: [ldev] CDI.KEYID = 6
1,211,202 UART: [ldev] SUBJECT.KEYID = 5
1,211,628 UART: [ldev] AUTHORITY.KEYID = 7
1,212,091 UART: [ldev] FE.KEYID = 1
1,217,307 UART: [ldev] Erasing FE.KEYID = 1
1,242,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,443 UART: [ldev] --
1,281,718 UART: [fwproc] Wait for Commands...
1,282,430 UART: [fwproc] Recv command 0x46574c44
1,283,158 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,976 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,146 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,531 >>> mbox cmd response: success
2,827,627 UART: [afmc] ++
2,827,795 UART: [afmc] CDI.KEYID = 6
2,828,157 UART: [afmc] SUBJECT.KEYID = 7
2,828,582 UART: [afmc] AUTHORITY.KEYID = 5
2,864,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,192 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,901 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,784 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,485 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,283 UART: [afmc] --
2,907,279 UART: [cold-reset] --
2,908,207 UART: [state] Locking Datavault
2,908,996 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,600 UART: [state] Locking ICCM
2,910,044 UART: [exit] Launching FMC @ 0x40000130
2,915,374 UART:
2,915,390 UART: Running Caliptra FMC ...
2,915,798 UART:
2,915,852 UART: [state] CFI Enabled
2,925,976 UART: [fht] FMC Alias Private Key: 7
3,045,178 UART: [art] Extend RT PCRs Done
3,045,606 UART: [art] Lock RT PCRs Done
3,047,364 UART: [art] Populate DV Done
3,055,483 UART: [fht] FMC Alias Private Key: 7
3,056,535 UART: [art] Derive CDI
3,056,815 UART: [art] Store in slot 0x4
3,142,712 UART: [art] Derive Key Pair
3,143,072 UART: [art] Store priv key in slot 0x5
3,155,810 UART: [art] Derive Key Pair - Done
3,170,915 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,815 UART: [art] PUB.X = 2C5E904A92F32EAF45C914C57C17EFB920B213C623B49F6C479F5FCEE9A487A30E9301BD507BB481079B42ED92F0F65A
3,193,586 UART: [art] PUB.Y = 73F94C0A96855BCD1205C71884E701D07088C7E29ADC24E9D18ACFEA19DBFB952CE2D2B89BC464DF4265DEA1B7F6B02E
3,200,545 UART: [art] SIG.R = 9BC57E7FD62DE01A4D3466822E50992D64DFCC62C2CC702299008A684DF11C374C3AD633AF60FD71E611BE22C57B7E7E
3,207,303 UART: [art] SIG.S = 299065B41E083CDB62A63B2A1185DE4FB6A5BD6DA6DD3B03B12BACE74B64069F19E4FDD776D2F4B31878C10A3113DC44
3,231,447 UART: Caliptra RT
3,231,698 UART: [state] CFI Enabled
3,351,169 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,839 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,195 UART: [rt]cmd =0x41544d4e, len=14344
3,785,044 >>> mbox cmd response data (8 bytes)
3,785,045 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,240 UART: [rt]cmd =0x41545348, len=116
3,816,809 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,043 ready_for_fw is high
1,060,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,326 >>> mbox cmd response: success
2,741,227 UART:
2,741,243 UART: Running Caliptra FMC ...
2,741,651 UART:
2,741,705 UART: [state] CFI Enabled
2,752,435 UART: [fht] FMC Alias Private Key: 7
2,871,633 UART: [art] Extend RT PCRs Done
2,872,061 UART: [art] Lock RT PCRs Done
2,873,461 UART: [art] Populate DV Done
2,881,598 UART: [fht] FMC Alias Private Key: 7
2,882,686 UART: [art] Derive CDI
2,882,966 UART: [art] Store in slot 0x4
2,968,551 UART: [art] Derive Key Pair
2,968,911 UART: [art] Store priv key in slot 0x5
2,982,347 UART: [art] Derive Key Pair - Done
2,996,851 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,121 UART: [art] PUB.X = 9D386286B1373AD45A074C99543052855055D7956F1CC6F51C169B98B1EA36B79B3634D94E142E95946DFD759AD432BE
3,019,882 UART: [art] PUB.Y = 8E7964D6037ABEE7C001D3FCA6FC161293C39477863651D9EC580A4F60F2E456C7FC6B2C70043E877D5E5BE67828A13A
3,026,824 UART: [art] SIG.R = EA1217D1BE6B87D000C83BA47B06A220C393FFA3B571C30CF0DB86D3A681ADC6DBDF529CDE5DDB27F3668BC53029FC23
3,033,588 UART: [art] SIG.S = A58AC68C66C46647A396275C0EA9F258C94446940394B52547B50F3A894371F009F748BCC7C2C2C944FDCCF025952856
3,057,440 UART: Caliptra RT
3,057,691 UART: [state] CFI Enabled
3,176,629 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,455 UART: [rt]cmd =0x41544d4e, len=14344
3,610,420 >>> mbox cmd response data (8 bytes)
3,610,421 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,358 UART: [rt]cmd =0x41545348, len=116
3,642,441 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
893,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,730 UART: [kat] ++
897,882 UART: [kat] sha1
901,994 UART: [kat] SHA2-256
903,934 UART: [kat] SHA2-384
906,571 UART: [kat] SHA2-512-ACC
908,472 UART: [kat] ECC-384
918,203 UART: [kat] HMAC-384Kdf
922,759 UART: [kat] LMS
1,171,087 UART: [kat] --
1,171,916 UART: [cold-reset] ++
1,172,484 UART: [fht] FHT @ 0x50003400
1,175,303 UART: [idev] ++
1,175,471 UART: [idev] CDI.KEYID = 6
1,175,831 UART: [idev] SUBJECT.KEYID = 7
1,176,255 UART: [idev] UDS.KEYID = 0
1,176,600 ready_for_fw is high
1,176,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,235 UART: [idev] Erasing UDS.KEYID = 0
1,201,404 UART: [idev] Sha1 KeyId Algorithm
1,209,856 UART: [idev] --
1,210,744 UART: [ldev] ++
1,210,912 UART: [ldev] CDI.KEYID = 6
1,211,275 UART: [ldev] SUBJECT.KEYID = 5
1,211,701 UART: [ldev] AUTHORITY.KEYID = 7
1,212,164 UART: [ldev] FE.KEYID = 1
1,217,558 UART: [ldev] Erasing FE.KEYID = 1
1,244,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,102 UART: [ldev] --
1,283,569 UART: [fwproc] Wait for Commands...
1,284,363 UART: [fwproc] Recv command 0x46574c44
1,285,091 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,837 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,007 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,190 >>> mbox cmd response: success
2,829,268 UART: [afmc] ++
2,829,436 UART: [afmc] CDI.KEYID = 6
2,829,798 UART: [afmc] SUBJECT.KEYID = 7
2,830,223 UART: [afmc] AUTHORITY.KEYID = 5
2,865,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,301 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,010 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,893 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,594 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,354 UART: [afmc] --
2,909,292 UART: [cold-reset] --
2,910,146 UART: [state] Locking Datavault
2,911,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,939 UART: [state] Locking ICCM
2,912,599 UART: [exit] Launching FMC @ 0x40000130
2,917,929 UART:
2,917,945 UART: Running Caliptra FMC ...
2,918,353 UART:
2,918,496 UART: [state] CFI Enabled
2,929,226 UART: [fht] FMC Alias Private Key: 7
3,048,132 UART: [art] Extend RT PCRs Done
3,048,560 UART: [art] Lock RT PCRs Done
3,050,278 UART: [art] Populate DV Done
3,058,341 UART: [fht] FMC Alias Private Key: 7
3,059,445 UART: [art] Derive CDI
3,059,725 UART: [art] Store in slot 0x4
3,145,408 UART: [art] Derive Key Pair
3,145,768 UART: [art] Store priv key in slot 0x5
3,159,338 UART: [art] Derive Key Pair - Done
3,174,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,810 UART: [art] PUB.X = 70E0A3587B6F606376FE904AA847ACD413941EBDFBB4A2B4D209FE36D04DEC7933B25F670382C2194070E9057ED24D71
3,197,575 UART: [art] PUB.Y = 9C86808EBF186FFAAA6647F766A3C4C78A3F76259D61E1DBF1DF5238DFF9B8E0F5FF1C2FDEE64A3E8934C9B5EA87AAD2
3,204,551 UART: [art] SIG.R = 80ACBC47A182BE79E6E406F8BA269876AE4619B99FCCB3695D4B2ED39978B3586DF69EB7BD17A8667CD11DB382204903
3,211,323 UART: [art] SIG.S = 08336C0AD1903C6E0D7CEC59C5C74073BAF5BD5DB22094BEEDA4F666606D71497617F52379EE2A323FF238D66302B1E1
3,235,115 UART: Caliptra RT
3,235,458 UART: [state] CFI Enabled
3,355,663 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,356,333 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,349 UART: [rt]cmd =0x41544d4e, len=14344
3,789,500 >>> mbox cmd response data (8 bytes)
3,789,501 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,524 UART: [rt]cmd =0x41545348, len=116
3,821,403 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,264 ready_for_fw is high
1,060,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,149 >>> mbox cmd response: success
2,740,510 UART:
2,740,526 UART: Running Caliptra FMC ...
2,740,934 UART:
2,741,077 UART: [state] CFI Enabled
2,751,627 UART: [fht] FMC Alias Private Key: 7
2,870,183 UART: [art] Extend RT PCRs Done
2,870,611 UART: [art] Lock RT PCRs Done
2,872,089 UART: [art] Populate DV Done
2,880,330 UART: [fht] FMC Alias Private Key: 7
2,881,346 UART: [art] Derive CDI
2,881,626 UART: [art] Store in slot 0x4
2,967,257 UART: [art] Derive Key Pair
2,967,617 UART: [art] Store priv key in slot 0x5
2,981,755 UART: [art] Derive Key Pair - Done
2,996,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,827 UART: [art] PUB.X = 115456F656FDBB331639CDFD1EA8D608ED4E11D0A76DEAC735527EE2F0AD89A20BA820A99265308D98173E811A476E89
3,019,597 UART: [art] PUB.Y = 2C74510E31168530D80CCE0F260A4462A54A4B25183A09A78BE67DDB69AD289F6501FE741DF44B743D998DEA2EBA04C1
3,026,532 UART: [art] SIG.R = 53CB529E854586923F78F632599BECDDCD54F8C268057E17959A35BEE96F45331D0C4581FF2962F8D3B4BDAA6F25D7DB
3,033,304 UART: [art] SIG.S = 8EC4888C6C980BDA37F23954C793034233991FCFE28A58A4BFDCE2A6865334546B78089E4EC40BC25FED94A7E5AF29F1
3,056,500 UART: Caliptra RT
3,056,843 UART: [state] CFI Enabled
3,177,358 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,028 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,976 UART: [rt]cmd =0x41544d4e, len=14344
3,610,569 >>> mbox cmd response data (8 bytes)
3,610,570 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,705 UART: [rt]cmd =0x41545348, len=116
3,642,342 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,020 UART:
192,376 UART: Running Caliptra ROM ...
193,562 UART:
193,716 UART: [state] CFI Enabled
263,903 UART: [state] LifecycleState = Unprovisioned
265,823 UART: [state] DebugLocked = No
267,364 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,657 UART: [kat] SHA2-256
442,387 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,865 UART: [kat] ++
453,345 UART: [kat] sha1
464,223 UART: [kat] SHA2-256
466,881 UART: [kat] SHA2-384
473,008 UART: [kat] SHA2-512-ACC
475,421 UART: [kat] ECC-384
2,767,281 UART: [kat] HMAC-384Kdf
2,798,581 UART: [kat] LMS
3,988,867 UART: [kat] --
3,994,096 UART: [cold-reset] ++
3,996,673 UART: [fht] Storing FHT @ 0x50003400
4,007,721 UART: [idev] ++
4,008,297 UART: [idev] CDI.KEYID = 6
4,009,290 UART: [idev] SUBJECT.KEYID = 7
4,010,474 UART: [idev] UDS.KEYID = 0
4,011,592 ready_for_fw is high
4,011,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,033 UART: [idev] Erasing UDS.KEYID = 0
7,344,409 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,012 UART: [idev] --
7,370,641 UART: [ldev] ++
7,371,265 UART: [ldev] CDI.KEYID = 6
7,372,184 UART: [ldev] SUBJECT.KEYID = 5
7,373,398 UART: [ldev] AUTHORITY.KEYID = 7
7,374,686 UART: [ldev] FE.KEYID = 1
7,421,943 UART: [ldev] Erasing FE.KEYID = 1
10,752,929 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,183 UART: [ldev] --
13,112,386 UART: [fwproc] Waiting for Commands...
13,114,698 UART: [fwproc] Received command 0x46574c44
13,116,879 UART: [fwproc] Received Image of size 118548 bytes
17,216,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,294,045 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,367,208 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,348 >>> mbox cmd response: success
17,700,405 UART: [afmc] ++
17,701,028 UART: [afmc] CDI.KEYID = 6
17,701,922 UART: [afmc] SUBJECT.KEYID = 7
17,703,196 UART: [afmc] AUTHORITY.KEYID = 5
21,071,129 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,367,445 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,369,709 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,384,113 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,398,884 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,413,297 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,434,643 UART: [afmc] --
23,437,692 UART: [cold-reset] --
23,441,282 UART: [state] Locking Datavault
23,444,315 UART: [state] Locking PCR0, PCR1 and PCR31
23,446,066 UART: [state] Locking ICCM
23,448,843 UART: [exit] Launching FMC @ 0x40000130
23,457,232 UART:
23,457,461 UART: Running Caliptra FMC ...
23,458,502 UART:
23,458,650 UART: [state] CFI Enabled
23,527,867 UART: [fht] FMC Alias Private Key: 7
25,868,433 UART: [art] Extend RT PCRs Done
25,869,666 UART: [art] Lock RT PCRs Done
25,871,212 UART: [art] Populate DV Done
25,876,528 UART: [fht] FMC Alias Private Key: 7
25,878,279 UART: [art] Derive CDI
25,879,014 UART: [art] Store in slot 0x4
25,936,699 UART: [art] Derive Key Pair
25,937,735 UART: [art] Store priv key in slot 0x5
29,229,810 UART: [art] Derive Key Pair - Done
29,243,183 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,531,354 UART: [art] Erasing AUTHORITY.KEYID = 7
31,532,864 UART: [art] PUB.X = DFEC66F4A7EA6F657543784FA414CDD6E0EDC61E23C7953F3036C18FBB829742B6810F35B6D3E2D3AA729FF6A9FEFFAE
31,540,131 UART: [art] PUB.Y = 697BB53CDAA629810C181F12530184F3EB410E0058564BA55D7521E99AFCC469EFB2EC9F3331AF36A820955966BA6B9A
31,547,384 UART: [art] SIG.R = 7616FCDC897FCC68DC628235CE613CC296F7E9DB2A580C338CCE995CBF0B3617CC4AB9D691958EDCA0183ED1E3A5A4BB
31,554,794 UART: [art] SIG.S = F56C40E60F79D62B4C3FCBE512D7AFB2A385CCF1D5403228D84C65836AA0EC0BC429A60CD3380F8BA5B0DA5D4898E650
32,859,959 UART: Caliptra RT
32,860,677 UART: [state] CFI Enabled
33,038,000 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,106,331 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,262,269 UART: [rt]cmd =0x41544d4e, len=14344
42,563,171 >>> mbox cmd response data (8 bytes)
42,563,787 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,594,366 UART: [rt]cmd =0x41545348, len=116
42,596,357 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,807,598 ready_for_fw is high
3,808,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,981,743 >>> mbox cmd response: success
23,668,887 UART:
23,669,318 UART: Running Caliptra FMC ...
23,670,464 UART:
23,670,628 UART: [state] CFI Enabled
23,738,272 UART: [fht] FMC Alias Private Key: 7
26,078,707 UART: [art] Extend RT PCRs Done
26,079,931 UART: [art] Lock RT PCRs Done
26,081,343 UART: [art] Populate DV Done
26,086,758 UART: [fht] FMC Alias Private Key: 7
26,088,245 UART: [art] Derive CDI
26,089,008 UART: [art] Store in slot 0x4
26,147,244 UART: [art] Derive Key Pair
26,148,288 UART: [art] Store priv key in slot 0x5
29,440,862 UART: [art] Derive Key Pair - Done
29,454,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,179 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,704 UART: [art] PUB.X = 4DC9322D5818719E06A640751C38227B40E56089D1504D68AD47CF37B882DAD4E7A3FE25D9849BD613DA0828543AE1AE
31,752,023 UART: [art] PUB.Y = 6C2CB66F36F865E57D638AED9A6F9BA25FA1AE24E4193BE088AF378C44A9A0714D62F63AF3AC6C0750DB29FFF641D48E
31,759,238 UART: [art] SIG.R = 75F1D1BBACF3E77E4D5569CEB2E508B75E7DD4C39A813CAFE6C305C8FA0E29C5BB495EF680273FE562EC83C82F47D81F
31,766,648 UART: [art] SIG.S = 717253170E8A7DF144E4FF0345361E721237D0AF7E106A44FF12E84CA5B65C00CE1504322DA4DCB733962ACF0D32E399
33,071,417 UART: Caliptra RT
33,072,138 UART: [state] CFI Enabled
33,249,878 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,317,469 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,473,219 UART: [rt]cmd =0x41544d4e, len=14344
42,773,777 >>> mbox cmd response data (8 bytes)
42,774,384 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,805,125 UART: [rt]cmd =0x41545348, len=116
42,807,014 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,313 UART:
192,710 UART: Running Caliptra ROM ...
193,820 UART:
603,328 UART: [state] CFI Enabled
618,213 UART: [state] LifecycleState = Unprovisioned
620,085 UART: [state] DebugLocked = No
621,532 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,176 UART: [kat] SHA2-256
795,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,480 UART: [kat] ++
806,919 UART: [kat] sha1
817,240 UART: [kat] SHA2-256
820,000 UART: [kat] SHA2-384
824,721 UART: [kat] SHA2-512-ACC
827,082 UART: [kat] ECC-384
3,112,608 UART: [kat] HMAC-384Kdf
3,123,282 UART: [kat] LMS
4,313,416 UART: [kat] --
4,318,385 UART: [cold-reset] ++
4,319,607 UART: [fht] Storing FHT @ 0x50003400
4,331,793 UART: [idev] ++
4,332,348 UART: [idev] CDI.KEYID = 6
4,333,338 UART: [idev] SUBJECT.KEYID = 7
4,334,577 UART: [idev] UDS.KEYID = 0
4,335,645 ready_for_fw is high
4,335,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,861 UART: [idev] Erasing UDS.KEYID = 0
7,618,784 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,396 UART: [idev] --
7,646,252 UART: [ldev] ++
7,646,820 UART: [ldev] CDI.KEYID = 6
7,647,848 UART: [ldev] SUBJECT.KEYID = 5
7,649,004 UART: [ldev] AUTHORITY.KEYID = 7
7,650,235 UART: [ldev] FE.KEYID = 1
7,661,898 UART: [ldev] Erasing FE.KEYID = 1
10,950,754 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,972 UART: [ldev] --
13,307,383 UART: [fwproc] Waiting for Commands...
13,309,527 UART: [fwproc] Received command 0x46574c44
13,311,704 UART: [fwproc] Received Image of size 118548 bytes
17,417,763 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,496,478 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,569,651 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,995 >>> mbox cmd response: success
17,903,843 UART: [afmc] ++
17,904,461 UART: [afmc] CDI.KEYID = 6
17,905,380 UART: [afmc] SUBJECT.KEYID = 7
17,906,532 UART: [afmc] AUTHORITY.KEYID = 5
21,217,966 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,512,106 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,514,413 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,528,781 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,543,571 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,557,944 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,315 UART: [afmc] --
23,584,037 UART: [cold-reset] --
23,588,704 UART: [state] Locking Datavault
23,594,551 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,251 UART: [state] Locking ICCM
23,597,963 UART: [exit] Launching FMC @ 0x40000130
23,606,357 UART:
23,606,592 UART: Running Caliptra FMC ...
23,607,691 UART:
23,607,843 UART: [state] CFI Enabled
23,615,861 UART: [fht] FMC Alias Private Key: 7
25,956,043 UART: [art] Extend RT PCRs Done
25,957,256 UART: [art] Lock RT PCRs Done
25,958,824 UART: [art] Populate DV Done
25,964,230 UART: [fht] FMC Alias Private Key: 7
25,965,776 UART: [art] Derive CDI
25,966,589 UART: [art] Store in slot 0x4
26,009,125 UART: [art] Derive Key Pair
26,010,125 UART: [art] Store priv key in slot 0x5
29,252,250 UART: [art] Derive Key Pair - Done
29,265,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,401 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,923 UART: [art] PUB.X = 8D8F1C6FB7D27E9A0765481934AB6B0349FE2C99190153C071F76C7233311595919A4B64F5ADB77D59AA55959F4254E8
31,554,124 UART: [art] PUB.Y = 5FF609941127C15DEC3637474350B13CE65AFD06CAD5A4202EAA0D7E0B31C4E21940A9A4308C902C408CEA84A0437DAD
31,561,417 UART: [art] SIG.R = 3E1396752D0D423D180E0353C4A71D70AC2DC296FC18CDE5DEEED6C9521C9C4556A26F01001A82EFD046B2D8EFD17157
31,568,757 UART: [art] SIG.S = 1462FF0B532F9466E88773AB7D4F8F3ECDF4EDB5A909C51A560C8435B9CB7747343FEAE838C080733C249BCD3CA04129
32,874,359 UART: Caliptra RT
32,875,047 UART: [state] CFI Enabled
33,007,776 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,071,102 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,226,503 UART: [rt]cmd =0x41544d4e, len=14344
42,527,399 >>> mbox cmd response data (8 bytes)
42,528,001 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,558,801 UART: [rt]cmd =0x41545348, len=116
42,561,154 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
4,122,910 ready_for_fw is high
4,123,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,449 >>> mbox cmd response: success
23,801,352 UART:
23,801,752 UART: Running Caliptra FMC ...
23,802,953 UART:
23,803,123 UART: [state] CFI Enabled
23,811,010 UART: [fht] FMC Alias Private Key: 7
26,150,914 UART: [art] Extend RT PCRs Done
26,152,136 UART: [art] Lock RT PCRs Done
26,153,709 UART: [art] Populate DV Done
26,158,980 UART: [fht] FMC Alias Private Key: 7
26,160,470 UART: [art] Derive CDI
26,161,227 UART: [art] Store in slot 0x4
26,203,877 UART: [art] Derive Key Pair
26,204,924 UART: [art] Store priv key in slot 0x5
29,447,335 UART: [art] Derive Key Pair - Done
29,460,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,694 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,207 UART: [art] PUB.X = E6048C2B8C6AE020CA312D619BF2797C88444AB61090CDD818525040B1B44776F75A9DBAC2350C5F25C9387B7DD935A4
31,749,511 UART: [art] PUB.Y = 57BBB87E5DFC414B4FE73B1A01726C24DE169245D9812FFA43507D1AFEA26EF12D5395CA7C2FCC16401A6A9600E88251
31,756,755 UART: [art] SIG.R = 49171E6EFDC3290E0F1B9648475CF4F2F9B1B22E9C98B810F3F7DF7E83130A25E3B3B1484F3D90A6B53F4B37C3B5BAC6
31,764,143 UART: [art] SIG.S = 965FA7C601C2AEF3C97FEA2CEB9FB7F3B159486D146E12C247678F34D0430158B3DB3F5EC649E91D3B821ADDF620A701
33,069,322 UART: Caliptra RT
33,070,027 UART: [state] CFI Enabled
33,203,020 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,266,433 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,422,077 UART: [rt]cmd =0x41544d4e, len=14344
42,722,078 >>> mbox cmd response data (8 bytes)
42,722,673 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,753,370 UART: [rt]cmd =0x41545348, len=116
42,755,558 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,212 UART:
192,569 UART: Running Caliptra ROM ...
193,757 UART:
193,909 UART: [state] CFI Enabled
260,860 UART: [state] LifecycleState = Unprovisioned
262,871 UART: [state] DebugLocked = No
264,854 UART: [state] WD Timer not started. Device not locked for debugging
269,105 UART: [kat] SHA2-256
448,731 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,550 UART: [kat] ++
460,080 UART: [kat] sha1
470,458 UART: [kat] SHA2-256
473,152 UART: [kat] SHA2-384
479,284 UART: [kat] SHA2-512-ACC
481,647 UART: [kat] ECC-384
2,925,466 UART: [kat] HMAC-384Kdf
2,950,642 UART: [kat] LMS
3,427,126 UART: [kat] --
3,432,818 UART: [cold-reset] ++
3,434,528 UART: [fht] FHT @ 0x50003400
3,444,644 UART: [idev] ++
3,445,208 UART: [idev] CDI.KEYID = 6
3,446,252 UART: [idev] SUBJECT.KEYID = 7
3,447,353 UART: [idev] UDS.KEYID = 0
3,448,394 ready_for_fw is high
3,448,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,630 UART: [idev] Erasing UDS.KEYID = 0
5,965,604 UART: [idev] Sha1 KeyId Algorithm
5,988,565 UART: [idev] --
5,994,583 UART: [ldev] ++
5,995,156 UART: [ldev] CDI.KEYID = 6
5,996,070 UART: [ldev] SUBJECT.KEYID = 5
5,997,285 UART: [ldev] AUTHORITY.KEYID = 7
5,998,508 UART: [ldev] FE.KEYID = 1
6,037,124 UART: [ldev] Erasing FE.KEYID = 1
8,546,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,770 UART: [ldev] --
10,353,137 UART: [fwproc] Wait for Commands...
10,354,740 UART: [fwproc] Recv command 0x46574c44
10,356,775 UART: [fwproc] Recv'd Img size: 118548 bytes
13,841,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,920,666 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,993,685 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,322,639 >>> mbox cmd response: success
14,326,155 UART: [afmc] ++
14,326,765 UART: [afmc] CDI.KEYID = 6
14,327,677 UART: [afmc] SUBJECT.KEYID = 7
14,328,887 UART: [afmc] AUTHORITY.KEYID = 5
16,876,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,242 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,042 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,104 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,663 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,943 UART: [afmc] --
18,696,478 UART: [cold-reset] --
18,701,954 UART: [state] Locking Datavault
18,708,124 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,865 UART: [state] Locking ICCM
18,710,939 UART: [exit] Launching FMC @ 0x40000130
18,719,334 UART:
18,719,569 UART: Running Caliptra FMC ...
18,720,667 UART:
18,720,821 UART: [state] CFI Enabled
18,777,335 UART: [fht] FMC Alias Private Key: 7
20,543,652 UART: [art] Extend RT PCRs Done
20,544,895 UART: [art] Lock RT PCRs Done
20,546,538 UART: [art] Populate DV Done
20,551,806 UART: [fht] FMC Alias Private Key: 7
20,553,350 UART: [art] Derive CDI
20,554,084 UART: [art] Store in slot 0x4
20,609,606 UART: [art] Derive Key Pair
20,610,598 UART: [art] Store priv key in slot 0x5
23,074,271 UART: [art] Derive Key Pair - Done
23,087,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,800,326 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,823 UART: [art] PUB.X = 32FD12ADD04337F225ADAF581EC374ED1A5BC9348E8D672C8A1D185581C144630D39EFBD7976CBD511919E6941D0D73D
24,809,071 UART: [art] PUB.Y = 78066B9DBC6B6B8F52459067381DE3D5DB5EBF5C557EC8B98C1B65AF40646A244FE124DE76E3A80D34E5177D311CB80B
24,816,363 UART: [art] SIG.R = 3849B41C88581138AB11F3FEDE2C3A7C5AAE854A85058F063F201ED7210CB9F2B5F944EC61FC55BA55FA9A2DC0FF2512
24,823,747 UART: [art] SIG.S = E37947488E8B3FF97AEB105C2EE02E6E670F72286A1EC68C6239EE2E443677DD63FC97607177384C3689D7DC6E26B583
25,802,651 UART: Caliptra RT
25,803,363 UART: [state] CFI Enabled
25,983,728 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,020,104 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,175,841 UART: [rt]cmd =0x41544d4e, len=14344
34,171,654 >>> mbox cmd response data (8 bytes)
34,172,215 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,203,003 UART: [rt]cmd =0x41545348, len=116
34,205,377 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,463,261 ready_for_fw is high
3,463,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,236,787 >>> mbox cmd response: success
18,516,549 UART:
18,516,945 UART: Running Caliptra FMC ...
18,518,072 UART:
18,518,234 UART: [state] CFI Enabled
18,587,454 UART: [fht] FMC Alias Private Key: 7
20,353,673 UART: [art] Extend RT PCRs Done
20,354,894 UART: [art] Lock RT PCRs Done
20,356,624 UART: [art] Populate DV Done
20,362,199 UART: [fht] FMC Alias Private Key: 7
20,363,901 UART: [art] Derive CDI
20,364,713 UART: [art] Store in slot 0x4
20,420,014 UART: [art] Derive Key Pair
20,421,038 UART: [art] Store priv key in slot 0x5
22,883,676 UART: [art] Derive Key Pair - Done
22,896,726 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,609,199 UART: [art] Erasing AUTHORITY.KEYID = 7
24,610,697 UART: [art] PUB.X = B456851AA5D9022A2FDBAC761C05CA8FE69D9C7BCBA70F7306A5770795198907256B603794FDF1D800EE09F16EDCD020
24,617,945 UART: [art] PUB.Y = 8E91781903C3BF1AFD5909045AFED0367834A2F384E999C3B91A3367A294FA7D056154F82292A8EDC81AD8811EAF9BA0
24,625,191 UART: [art] SIG.R = BB03A6CBC2B96DCFA329F522F8A6D41133D7FF7E35C86075524604F08E37321D6EE08B228C7A1337E76A13BCA716B449
24,632,598 UART: [art] SIG.S = 73C83C2D5063768D065072FBE386F60B7CDC18B304A366EA560D119583D9C526DA2839F7B4F3585578237B68C7722C92
25,611,053 UART: Caliptra RT
25,611,757 UART: [state] CFI Enabled
25,792,482 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,830,671 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,986,181 UART: [rt]cmd =0x41544d4e, len=14344
33,981,252 >>> mbox cmd response data (8 bytes)
33,981,860 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,012,593 UART: [rt]cmd =0x41545348, len=116
34,014,740 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,440 UART:
192,803 UART: Running Caliptra ROM ...
193,943 UART:
603,441 UART: [state] CFI Enabled
617,542 UART: [state] LifecycleState = Unprovisioned
619,415 UART: [state] DebugLocked = No
621,716 UART: [state] WD Timer not started. Device not locked for debugging
626,042 UART: [kat] SHA2-256
805,728 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,455 UART: [kat] ++
817,058 UART: [kat] sha1
828,938 UART: [kat] SHA2-256
831,670 UART: [kat] SHA2-384
837,375 UART: [kat] SHA2-512-ACC
839,731 UART: [kat] ECC-384
3,284,968 UART: [kat] HMAC-384Kdf
3,297,058 UART: [kat] LMS
3,773,547 UART: [kat] --
3,778,481 UART: [cold-reset] ++
3,779,665 UART: [fht] FHT @ 0x50003400
3,790,574 UART: [idev] ++
3,791,139 UART: [idev] CDI.KEYID = 6
3,792,122 UART: [idev] SUBJECT.KEYID = 7
3,793,297 UART: [idev] UDS.KEYID = 0
3,794,352 ready_for_fw is high
3,794,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,413 UART: [idev] Erasing UDS.KEYID = 0
6,274,034 UART: [idev] Sha1 KeyId Algorithm
6,298,266 UART: [idev] --
6,303,046 UART: [ldev] ++
6,303,630 UART: [ldev] CDI.KEYID = 6
6,304,609 UART: [ldev] SUBJECT.KEYID = 5
6,305,717 UART: [ldev] AUTHORITY.KEYID = 7
6,307,007 UART: [ldev] FE.KEYID = 1
6,320,361 UART: [ldev] Erasing FE.KEYID = 1
8,802,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,520,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,536,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,552,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,567,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,588,720 UART: [ldev] --
10,593,339 UART: [fwproc] Wait for Commands...
10,595,116 UART: [fwproc] Recv command 0x46574c44
10,597,159 UART: [fwproc] Recv'd Img size: 118548 bytes
14,085,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,272 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,238,280 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,566,032 >>> mbox cmd response: success
14,569,747 UART: [afmc] ++
14,570,367 UART: [afmc] CDI.KEYID = 6
14,571,282 UART: [afmc] SUBJECT.KEYID = 7
14,572,524 UART: [afmc] AUTHORITY.KEYID = 5
17,077,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,799,252 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,801,438 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,817,263 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,833,344 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,848,911 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,873,674 UART: [afmc] --
18,877,542 UART: [cold-reset] --
18,881,518 UART: [state] Locking Datavault
18,887,359 UART: [state] Locking PCR0, PCR1 and PCR31
18,889,059 UART: [state] Locking ICCM
18,891,702 UART: [exit] Launching FMC @ 0x40000130
18,900,103 UART:
18,900,349 UART: Running Caliptra FMC ...
18,901,450 UART:
18,901,641 UART: [state] CFI Enabled
18,909,481 UART: [fht] FMC Alias Private Key: 7
20,675,876 UART: [art] Extend RT PCRs Done
20,677,093 UART: [art] Lock RT PCRs Done
20,678,697 UART: [art] Populate DV Done
20,684,131 UART: [fht] FMC Alias Private Key: 7
20,685,790 UART: [art] Derive CDI
20,686,608 UART: [art] Store in slot 0x4
20,729,096 UART: [art] Derive Key Pair
20,730,098 UART: [art] Store priv key in slot 0x5
23,156,916 UART: [art] Derive Key Pair - Done
23,169,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,876,574 UART: [art] Erasing AUTHORITY.KEYID = 7
24,878,085 UART: [art] PUB.X = 370DE455C38CEB9EE8A95B27E7F43AA4939B93EE920C9A0C6993AC211C73AC3E7510C4A16195BC6130AEB12D089025B4
24,885,333 UART: [art] PUB.Y = 4FDE1153A13CCB1F0300CB28BA67F0A950AAFEED194A1B6538ECEE27855703CFA3738F380A7699CA787C0BDFE5D1767E
24,892,615 UART: [art] SIG.R = C96FBBC6587ACD913F9FE9EF4D2F016A44F2BE59F63DC126FFD42E2A9E31F87BCED20F1EB03A34012DC86CAB4938866C
24,900,088 UART: [art] SIG.S = 4D997C568E85B7878B3F99055CE8FD185C01E873EDC4BA9CE45E23F4A08BA254E59DFED9D65470C0FEEFA798BBE7C036
25,878,863 UART: Caliptra RT
25,879,551 UART: [state] CFI Enabled
26,012,540 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,067,501 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,223,294 UART: [rt]cmd =0x41544d4e, len=14344
34,218,501 >>> mbox cmd response data (8 bytes)
34,219,079 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,249,928 UART: [rt]cmd =0x41545348, len=116
34,252,133 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,780,598 ready_for_fw is high
3,781,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,464,246 >>> mbox cmd response: success
18,712,821 UART:
18,713,214 UART: Running Caliptra FMC ...
18,714,332 UART:
18,714,487 UART: [state] CFI Enabled
18,722,769 UART: [fht] FMC Alias Private Key: 7
20,489,015 UART: [art] Extend RT PCRs Done
20,490,252 UART: [art] Lock RT PCRs Done
20,492,264 UART: [art] Populate DV Done
20,497,736 UART: [fht] FMC Alias Private Key: 7
20,499,335 UART: [art] Derive CDI
20,500,152 UART: [art] Store in slot 0x4
20,542,598 UART: [art] Derive Key Pair
20,543,640 UART: [art] Store priv key in slot 0x5
22,970,355 UART: [art] Derive Key Pair - Done
22,983,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,689,706 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,214 UART: [art] PUB.X = 01513B3D7E0BCF75A824E0EBCE4356DF7211290767B515953FCB798CD6B8087CE281FD2AB9BB74ADFAEC5A532D0AA2F8
24,698,483 UART: [art] PUB.Y = 34DAAD12E7287303AAA1A9C9AC810681215E1DCFAEBB045D8CA25F72EFCD06D462527D88D4D2362515597F95CDCCFAEA
24,705,740 UART: [art] SIG.R = 30E9FD1032E7C9DEB714574AE90FCA4013C172DD91000A572DF1DFEEE041365D94ABE291F7083F4A1DFE34D4EB50868B
24,713,146 UART: [art] SIG.S = 94B89A87C40FA25C3BF5457FAE4F9EB394717FEDEE222BC39B6C73A9B58F271831803717C6929DF417A21422BD8B3A6A
25,692,247 UART: Caliptra RT
25,692,946 UART: [state] CFI Enabled
25,826,161 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,872,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,028,165 UART: [rt]cmd =0x41544d4e, len=14344
34,023,777 >>> mbox cmd response data (8 bytes)
34,024,370 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,055,016 UART: [rt]cmd =0x41545348, len=116
34,057,206 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,165 UART:
192,534 UART: Running Caliptra ROM ...
193,658 UART:
193,803 UART: [state] CFI Enabled
265,124 UART: [state] LifecycleState = Unprovisioned
267,541 UART: [state] DebugLocked = No
269,308 UART: [state] WD Timer not started. Device not locked for debugging
273,358 UART: [kat] SHA2-256
463,203 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,010 UART: [kat] ++
474,462 UART: [kat] sha1
485,686 UART: [kat] SHA2-256
488,754 UART: [kat] SHA2-384
494,103 UART: [kat] SHA2-512-ACC
496,681 UART: [kat] ECC-384
2,951,560 UART: [kat] HMAC-384Kdf
2,973,885 UART: [kat] LMS
3,505,661 UART: [kat] --
3,510,335 UART: [cold-reset] ++
3,511,852 UART: [fht] FHT @ 0x50003400
3,524,537 UART: [idev] ++
3,525,168 UART: [idev] CDI.KEYID = 6
3,526,123 UART: [idev] SUBJECT.KEYID = 7
3,527,380 UART: [idev] UDS.KEYID = 0
3,528,285 ready_for_fw is high
3,528,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,543 UART: [idev] Erasing UDS.KEYID = 0
6,029,193 UART: [idev] Sha1 KeyId Algorithm
6,051,662 UART: [idev] --
6,057,286 UART: [ldev] ++
6,057,968 UART: [ldev] CDI.KEYID = 6
6,058,944 UART: [ldev] SUBJECT.KEYID = 5
6,060,105 UART: [ldev] AUTHORITY.KEYID = 7
6,061,281 UART: [ldev] FE.KEYID = 1
6,102,604 UART: [ldev] Erasing FE.KEYID = 1
8,605,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,062 UART: [ldev] --
10,414,864 UART: [fwproc] Wait for Commands...
10,417,710 UART: [fwproc] Recv command 0x46574c44
10,420,012 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,364 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,978 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,792 >>> mbox cmd response: success
14,681,671 UART: [afmc] ++
14,682,373 UART: [afmc] CDI.KEYID = 6
14,683,620 UART: [afmc] SUBJECT.KEYID = 7
14,685,005 UART: [afmc] AUTHORITY.KEYID = 5
17,213,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,941,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,934 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,958,037 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,973,182 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,988,083 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,704 UART: [afmc] --
19,015,144 UART: [cold-reset] --
19,019,821 UART: [state] Locking Datavault
19,026,698 UART: [state] Locking PCR0, PCR1 and PCR31
19,028,846 UART: [state] Locking ICCM
19,030,902 UART: [exit] Launching FMC @ 0x40000130
19,039,584 UART:
19,039,816 UART: Running Caliptra FMC ...
19,040,916 UART:
19,041,078 UART: [state] CFI Enabled
19,097,541 UART: [fht] FMC Alias Private Key: 7
20,863,426 UART: [art] Extend RT PCRs Done
20,864,648 UART: [art] Lock RT PCRs Done
20,866,407 UART: [art] Populate DV Done
20,871,656 UART: [fht] FMC Alias Private Key: 7
20,873,297 UART: [art] Derive CDI
20,874,105 UART: [art] Store in slot 0x4
20,930,166 UART: [art] Derive Key Pair
20,931,206 UART: [art] Store priv key in slot 0x5
23,393,848 UART: [art] Derive Key Pair - Done
23,406,735 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,582 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,103 UART: [art] PUB.X = 9F6D3D9FFC83EF144E31752D79C54BC8ADE9ADAD34954E2C1138E369084E1E2FC43268C953DD9EAA5DE1E0A3DB7AAC61
25,129,383 UART: [art] PUB.Y = 417A2B7CDFBA1F21DAE6A5407AF03A9B73468BFC30CC3605257523D3A78F295C4637F793E452E9ED8825CB5B122B9671
25,136,657 UART: [art] SIG.R = 7850966CEF44E9500B6DAA29A731D811E0E746B23827E08A88AE7EB19AA7D9D074EF3B0F791BF10CE217190E306AA48B
25,144,064 UART: [art] SIG.S = 6E05A227CAFCCDEFD27EA4EEEE42592D8B369C89D9824E5CD1084D6956E598639C411B1A6930C124201F986E332BE4FD
26,123,246 UART: Caliptra RT
26,123,960 UART: [state] CFI Enabled
26,305,436 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,351,081 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,506,589 UART: [rt]cmd =0x41544d4e, len=14344
34,501,831 >>> mbox cmd response data (8 bytes)
34,502,425 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,533,068 UART: [rt]cmd =0x41545348, len=116
34,535,311 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,435,876 ready_for_fw is high
3,436,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,622 >>> mbox cmd response: success
19,133,671 UART:
19,134,077 UART: Running Caliptra FMC ...
19,135,228 UART:
19,135,389 UART: [state] CFI Enabled
19,199,725 UART: [fht] FMC Alias Private Key: 7
20,966,110 UART: [art] Extend RT PCRs Done
20,967,324 UART: [art] Lock RT PCRs Done
20,968,945 UART: [art] Populate DV Done
20,974,360 UART: [fht] FMC Alias Private Key: 7
20,976,061 UART: [art] Derive CDI
20,976,878 UART: [art] Store in slot 0x4
21,032,994 UART: [art] Derive Key Pair
21,034,057 UART: [art] Store priv key in slot 0x5
23,496,611 UART: [art] Derive Key Pair - Done
23,509,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,224 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,715 UART: [art] PUB.X = 3D3406A66251B88414AE2D78D374A6341B82094BD30EB9B1F5D4A44BA82C824F470DC3D9E7AC28C56D747BB6163874E1
25,230,986 UART: [art] PUB.Y = C2937DC0D985B841D4C9EA11416C08DC3A4AEE7AE276FDE2CC46833609CF447ABF985C13B0B6B854C59F665D8965BBD2
25,238,253 UART: [art] SIG.R = 53F69F047D248EF16B4B25DC272CD676786BCE2DA2E015D502BA33F449C2547A8FBEB7F2D8ADBB2E9CFC16DA5F3142FB
25,245,680 UART: [art] SIG.S = 3217FEC7BFF4C3864281E39C445F9890D00FF1B7CB50FDF732A1ECB535A69D1D7451DD0B46EA25FB2191E8259853CE04
26,224,683 UART: Caliptra RT
26,225,392 UART: [state] CFI Enabled
26,405,895 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,452,481 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,608,224 UART: [rt]cmd =0x41544d4e, len=14344
34,604,102 >>> mbox cmd response data (8 bytes)
34,604,701 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,635,389 UART: [rt]cmd =0x41545348, len=116
34,637,249 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,489 UART:
192,853 UART: Running Caliptra ROM ...
194,002 UART:
603,722 UART: [state] CFI Enabled
622,022 UART: [state] LifecycleState = Unprovisioned
624,368 UART: [state] DebugLocked = No
626,391 UART: [state] WD Timer not started. Device not locked for debugging
630,220 UART: [kat] SHA2-256
820,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,905 UART: [kat] ++
831,356 UART: [kat] sha1
842,657 UART: [kat] SHA2-256
845,624 UART: [kat] SHA2-384
850,505 UART: [kat] SHA2-512-ACC
853,056 UART: [kat] ECC-384
3,289,841 UART: [kat] HMAC-384Kdf
3,302,829 UART: [kat] LMS
3,834,653 UART: [kat] --
3,839,969 UART: [cold-reset] ++
3,841,754 UART: [fht] FHT @ 0x50003400
3,852,897 UART: [idev] ++
3,853,612 UART: [idev] CDI.KEYID = 6
3,854,504 UART: [idev] SUBJECT.KEYID = 7
3,855,752 UART: [idev] UDS.KEYID = 0
3,856,704 ready_for_fw is high
3,856,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,213 UART: [idev] Erasing UDS.KEYID = 0
6,330,320 UART: [idev] Sha1 KeyId Algorithm
6,353,301 UART: [idev] --
6,357,622 UART: [ldev] ++
6,358,300 UART: [ldev] CDI.KEYID = 6
6,359,192 UART: [ldev] SUBJECT.KEYID = 5
6,360,405 UART: [ldev] AUTHORITY.KEYID = 7
6,361,583 UART: [ldev] FE.KEYID = 1
6,372,210 UART: [ldev] Erasing FE.KEYID = 1
8,852,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,980 UART: [ldev] --
10,647,164 UART: [fwproc] Wait for Commands...
10,649,638 UART: [fwproc] Recv command 0x46574c44
10,651,949 UART: [fwproc] Recv'd Img size: 118548 bytes
14,157,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,236,552 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,360,213 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,919,617 >>> mbox cmd response: success
14,922,845 UART: [afmc] ++
14,923,573 UART: [afmc] CDI.KEYID = 6
14,924,772 UART: [afmc] SUBJECT.KEYID = 7
14,926,217 UART: [afmc] AUTHORITY.KEYID = 5
17,427,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,148,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,150,400 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,165,494 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,180,620 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,195,556 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,291 UART: [afmc] --
19,222,375 UART: [cold-reset] --
19,226,216 UART: [state] Locking Datavault
19,230,411 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,627 UART: [state] Locking ICCM
19,233,924 UART: [exit] Launching FMC @ 0x40000130
19,242,571 UART:
19,242,806 UART: Running Caliptra FMC ...
19,243,842 UART:
19,243,994 UART: [state] CFI Enabled
19,252,373 UART: [fht] FMC Alias Private Key: 7
21,018,466 UART: [art] Extend RT PCRs Done
21,019,687 UART: [art] Lock RT PCRs Done
21,021,400 UART: [art] Populate DV Done
21,026,875 UART: [fht] FMC Alias Private Key: 7
21,028,594 UART: [art] Derive CDI
21,029,416 UART: [art] Store in slot 0x4
21,072,123 UART: [art] Derive Key Pair
21,073,144 UART: [art] Store priv key in slot 0x5
23,500,419 UART: [art] Derive Key Pair - Done
23,513,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,535 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,043 UART: [art] PUB.X = 5C6A6284D9B749A0B72A1C7C5D95D43F5FFA96EAC718E3A159A64922118588C6D5A57A8ED5D36F84691F330E9E0626A6
25,228,307 UART: [art] PUB.Y = 1910DAF67D83B58FE493EDBF006FD68CCE05DDD3DEC720E567ADAB083333BE1B09E2D79237F2935A392516E6B5628D8F
25,235,561 UART: [art] SIG.R = F2493956FD0F02BB392BFFA9E13688F27B6785D7AB3D728B6F72A89147F077B023BACF8EF58D192E55D6C9272DFF730C
25,242,990 UART: [art] SIG.S = 33D8112B0881CD998B1CCF1E78EDD00CAFF050D50C7D47D59BF5929FDD16745F033DCB492C2FCEBB1C42A2192EC7D009
26,221,384 UART: Caliptra RT
26,222,075 UART: [state] CFI Enabled
26,355,288 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,411,186 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,566,708 UART: [rt]cmd =0x41544d4e, len=14344
34,562,666 >>> mbox cmd response data (8 bytes)
34,563,278 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,593,966 UART: [rt]cmd =0x41545348, len=116
34,596,130 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,755,856 ready_for_fw is high
3,756,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,035,051 >>> mbox cmd response: success
19,289,574 UART:
19,289,974 UART: Running Caliptra FMC ...
19,291,183 UART:
19,291,385 UART: [state] CFI Enabled
19,299,118 UART: [fht] FMC Alias Private Key: 7
21,065,804 UART: [art] Extend RT PCRs Done
21,067,026 UART: [art] Lock RT PCRs Done
21,068,933 UART: [art] Populate DV Done
21,074,213 UART: [fht] FMC Alias Private Key: 7
21,075,712 UART: [art] Derive CDI
21,076,482 UART: [art] Store in slot 0x4
21,118,983 UART: [art] Derive Key Pair
21,120,050 UART: [art] Store priv key in slot 0x5
23,547,420 UART: [art] Derive Key Pair - Done
23,560,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,266,613 UART: [art] Erasing AUTHORITY.KEYID = 7
25,268,123 UART: [art] PUB.X = 574818ED176D3518A708CE7CD2C6E4CFA209E17BC7112B65E68DBE15D3DF9E37489898ECFE349E6F8B793DA84EA28B99
25,275,432 UART: [art] PUB.Y = 8470407C5AC49A24320943391FE92F0EE3385CF508A704145CBF01A15B25479AB017B9727764D72839D4BE8D2E148EEB
25,282,667 UART: [art] SIG.R = 15F2FD184F9AE7633D503D776912125CC856DFD713690B294D78DEF7C69B1FE1F8EB75E2192AA3E16C854DA2AA592E22
25,290,050 UART: [art] SIG.S = 864AC01DD6DCB1431A28504137E418D19E3ABDF05609E62A35A0824A83D1F7642F1678480E20988E84635828D28106BD
26,268,995 UART: Caliptra RT
26,269,694 UART: [state] CFI Enabled
26,402,329 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,458,198 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,613,925 UART: [rt]cmd =0x41544d4e, len=14344
34,609,332 >>> mbox cmd response data (8 bytes)
34,609,913 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,640,591 UART: [rt]cmd =0x41545348, len=116
34,643,021 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,861 UART: [kat] SHA2-256
881,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,907 UART: [kat] ++
886,059 UART: [kat] sha1
890,321 UART: [kat] SHA2-256
892,259 UART: [kat] SHA2-384
895,042 UART: [kat] SHA2-512-ACC
896,943 UART: [kat] ECC-384
902,844 UART: [kat] HMAC-384Kdf
907,638 UART: [kat] LMS
1,475,834 UART: [kat] --
1,476,661 UART: [cold-reset] ++
1,477,163 UART: [fht] Storing FHT @ 0x50003400
1,479,950 UART: [idev] ++
1,480,118 UART: [idev] CDI.KEYID = 6
1,480,478 UART: [idev] SUBJECT.KEYID = 7
1,480,902 UART: [idev] UDS.KEYID = 0
1,481,247 ready_for_fw is high
1,481,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,874 UART: [idev] Erasing UDS.KEYID = 0
1,505,582 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,096 UART: [idev] --
1,515,311 UART: [ldev] ++
1,515,479 UART: [ldev] CDI.KEYID = 6
1,515,842 UART: [ldev] SUBJECT.KEYID = 5
1,516,268 UART: [ldev] AUTHORITY.KEYID = 7
1,516,731 UART: [ldev] FE.KEYID = 1
1,521,917 UART: [ldev] Erasing FE.KEYID = 1
1,546,800 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,772 UART: [ldev] --
1,586,199 UART: [fwproc] Waiting for Commands...
1,586,888 UART: [fwproc] Received command 0x46574c44
1,587,679 UART: [fwproc] Received Image of size 118548 bytes
2,931,745 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,549 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,767 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,990 >>> mbox cmd response: success
3,132,002 UART: [afmc] ++
3,132,170 UART: [afmc] CDI.KEYID = 6
3,132,532 UART: [afmc] SUBJECT.KEYID = 7
3,132,957 UART: [afmc] AUTHORITY.KEYID = 5
3,167,486 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,242 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,022 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,731 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,614 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,297 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,133 UART: [afmc] --
3,211,205 UART: [cold-reset] --
3,212,101 UART: [state] Locking Datavault
3,213,490 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,094 UART: [state] Locking ICCM
3,214,516 UART: [exit] Launching FMC @ 0x40000130
3,219,846 UART:
3,219,862 UART: Running Caliptra FMC ...
3,220,270 UART:
3,220,324 UART: [state] CFI Enabled
3,230,854 UART: [fht] FMC Alias Private Key: 7
3,350,452 UART: [art] Extend RT PCRs Done
3,350,880 UART: [art] Lock RT PCRs Done
3,352,230 UART: [art] Populate DV Done
3,360,211 UART: [fht] FMC Alias Private Key: 7
3,361,175 UART: [art] Derive CDI
3,361,455 UART: [art] Store in slot 0x4
3,447,101 UART: [art] Derive Key Pair
3,447,461 UART: [art] Store priv key in slot 0x5
3,460,756 UART: [art] Derive Key Pair - Done
3,475,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,952 UART: [art] PUB.X = 69B2402E1A522D2BDB0FE98ED1B6228F0BA6C5F1CE8B4F77C385271ACA56D3D3B5600AF45A64317D65B5E53D58C97D2B
3,498,727 UART: [art] PUB.Y = EFE59B0D15F6827DCB2628F8C430381250CDA23EE4B06A66C9EAB587AEB9EC116D2FB115DAAFBFB4136EE872EEA39F03
3,505,695 UART: [art] SIG.R = C1C7E515C5E936A4E21ECF77AB5226CD6484FEFAA81BBD07BEAE33A4E06F51236A0D00D98773EE9B23C4427198DCDCEF
3,512,459 UART: [art] SIG.S = A7627BDE1736D42A35FFD1715DCB8AAC1EFE3B5AFFF4E11462E809736037B4DA3E872EDEF18E20E12947088878F1B66C
3,535,837 UART: Caliptra RT
3,536,088 UART: [state] CFI Enabled
3,656,831 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,501 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,517 UART: [rt]cmd =0x41544d4e, len=14344
4,090,252 >>> mbox cmd response data (8 bytes)
4,090,253 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,246 UART: [rt]cmd =0x41545348, len=116
4,121,861 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,969 ready_for_fw is high
1,362,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,600 >>> mbox cmd response: success
3,042,303 UART:
3,042,319 UART: Running Caliptra FMC ...
3,042,727 UART:
3,042,781 UART: [state] CFI Enabled
3,053,205 UART: [fht] FMC Alias Private Key: 7
3,171,915 UART: [art] Extend RT PCRs Done
3,172,343 UART: [art] Lock RT PCRs Done
3,173,859 UART: [art] Populate DV Done
3,182,134 UART: [fht] FMC Alias Private Key: 7
3,183,160 UART: [art] Derive CDI
3,183,440 UART: [art] Store in slot 0x4
3,269,316 UART: [art] Derive Key Pair
3,269,676 UART: [art] Store priv key in slot 0x5
3,282,593 UART: [art] Derive Key Pair - Done
3,297,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,500 UART: [art] PUB.X = 7305EE1C2E5B27B4BA9460DF4CB02304F4DCF417E656F4B372C26DC8526A2F9CCDD1FE342527B046DECB8E16A594DED0
3,320,282 UART: [art] PUB.Y = 6FE76F9E7697C230869AF72A37240857A9CDACB6BB164B6FD7CA115D5C574E29FF68C24783D0113EF41410E9D39F3C0F
3,327,234 UART: [art] SIG.R = 72DB1170686F48C1CAB72BB0CEF0206E468DE41D1CC3834A876915B5CF5F4680302632079B403E20D590ADCD43FA6835
3,334,003 UART: [art] SIG.S = 81F75F92C9EFB86B69A283DC5513049BBF8156D7A4716275097A429999B1EA0B632F4E6A184D4E2C3AA9EE20617FB757
3,357,504 UART: Caliptra RT
3,357,755 UART: [state] CFI Enabled
3,477,653 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,478,323 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,227 UART: [rt]cmd =0x41544d4e, len=14344
3,911,154 >>> mbox cmd response data (8 bytes)
3,911,155 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,114 UART: [rt]cmd =0x41545348, len=116
3,942,775 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,282 UART: [kat] SHA2-256
882,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,328 UART: [kat] ++
886,480 UART: [kat] sha1
890,792 UART: [kat] SHA2-256
892,730 UART: [kat] SHA2-384
895,351 UART: [kat] SHA2-512-ACC
897,252 UART: [kat] ECC-384
902,739 UART: [kat] HMAC-384Kdf
907,455 UART: [kat] LMS
1,475,651 UART: [kat] --
1,476,852 UART: [cold-reset] ++
1,477,300 UART: [fht] Storing FHT @ 0x50003400
1,479,993 UART: [idev] ++
1,480,161 UART: [idev] CDI.KEYID = 6
1,480,521 UART: [idev] SUBJECT.KEYID = 7
1,480,945 UART: [idev] UDS.KEYID = 0
1,481,290 ready_for_fw is high
1,481,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,363 UART: [idev] Erasing UDS.KEYID = 0
1,506,159 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,873 UART: [idev] --
1,515,842 UART: [ldev] ++
1,516,010 UART: [ldev] CDI.KEYID = 6
1,516,373 UART: [ldev] SUBJECT.KEYID = 5
1,516,799 UART: [ldev] AUTHORITY.KEYID = 7
1,517,262 UART: [ldev] FE.KEYID = 1
1,522,612 UART: [ldev] Erasing FE.KEYID = 1
1,548,297 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,331 UART: [ldev] --
1,587,600 UART: [fwproc] Waiting for Commands...
1,588,399 UART: [fwproc] Received command 0x46574c44
1,589,190 UART: [fwproc] Received Image of size 118548 bytes
2,934,080 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,292 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,510 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,707 >>> mbox cmd response: success
3,133,813 UART: [afmc] ++
3,133,981 UART: [afmc] CDI.KEYID = 6
3,134,343 UART: [afmc] SUBJECT.KEYID = 7
3,134,768 UART: [afmc] AUTHORITY.KEYID = 5
3,169,325 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,537 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,317 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,026 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,909 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,592 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,448 UART: [afmc] --
3,212,356 UART: [cold-reset] --
3,213,252 UART: [state] Locking Datavault
3,214,487 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,091 UART: [state] Locking ICCM
3,215,669 UART: [exit] Launching FMC @ 0x40000130
3,220,999 UART:
3,221,015 UART: Running Caliptra FMC ...
3,221,423 UART:
3,221,566 UART: [state] CFI Enabled
3,232,324 UART: [fht] FMC Alias Private Key: 7
3,351,084 UART: [art] Extend RT PCRs Done
3,351,512 UART: [art] Lock RT PCRs Done
3,352,964 UART: [art] Populate DV Done
3,360,987 UART: [fht] FMC Alias Private Key: 7
3,361,949 UART: [art] Derive CDI
3,362,229 UART: [art] Store in slot 0x4
3,448,081 UART: [art] Derive Key Pair
3,448,441 UART: [art] Store priv key in slot 0x5
3,461,590 UART: [art] Derive Key Pair - Done
3,476,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,271 UART: [art] PUB.X = D4594F2AEFFA519A31D38EF1DEF832D42078E924092613875E2D38A131EE7D11DB0AE0DDBFABFF0F515EF3AE95AB0D73
3,499,051 UART: [art] PUB.Y = DC263B7577A26EC402D0AA22C46BFBEB4C41E9FD07EBEEE105604D54FE1EC0EBAF08CF05258CDC0CF4918F634933C643
3,506,005 UART: [art] SIG.R = E87EB2BCF6DB869FA7C3CC25438829CDDDFF61792BC00232B2F34F5FDF96CFFAD3F1D17508FEB8511F9098A1698B4AAE
3,512,793 UART: [art] SIG.S = 82855A15A0F71EB0DACCD97E55C40C78384842F21B2F6F04613FC0B8A0195D91FBE275D23D8C2521667BA0B69BC41C49
3,536,629 UART: Caliptra RT
3,536,972 UART: [state] CFI Enabled
3,657,689 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,658,359 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,095 UART: [rt]cmd =0x41544d4e, len=14344
4,090,930 >>> mbox cmd response data (8 bytes)
4,090,931 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,016 UART: [rt]cmd =0x41545348, len=116
4,122,571 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,486 ready_for_fw is high
1,362,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,813 >>> mbox cmd response: success
3,043,010 UART:
3,043,026 UART: Running Caliptra FMC ...
3,043,434 UART:
3,043,577 UART: [state] CFI Enabled
3,053,919 UART: [fht] FMC Alias Private Key: 7
3,172,505 UART: [art] Extend RT PCRs Done
3,172,933 UART: [art] Lock RT PCRs Done
3,174,205 UART: [art] Populate DV Done
3,182,526 UART: [fht] FMC Alias Private Key: 7
3,183,456 UART: [art] Derive CDI
3,183,736 UART: [art] Store in slot 0x4
3,269,746 UART: [art] Derive Key Pair
3,270,106 UART: [art] Store priv key in slot 0x5
3,283,415 UART: [art] Derive Key Pair - Done
3,298,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,217 UART: [art] PUB.X = 9D27A89926D1454D0C411916CD62822F1183D9286D4BD2444FCACB9F7DFCCC4AFD3E63902FDC8C29D75930819EC54784
3,320,990 UART: [art] PUB.Y = 7385EC595631C36D1224E0BC83AFFF2149D6AA56D1A741AB7AEE92F26CA33AB8DC471DBEFBA43D27B123E1AF3DFE4173
3,327,962 UART: [art] SIG.R = 7D9A0274DFE7A3936B43BA6172426E49AD2C00EDB57A1C7B652A4D54F3D149A6769288C0C5DDD131C95FE88455FEC91D
3,334,717 UART: [art] SIG.S = A018A4FA5D9948A91A00AC4C2FA2D8AE518E9465A0EA128F15AF82AE4CF2E64C0C2F56578C73FEEABD3E6BFB2796FA8D
3,358,454 UART: Caliptra RT
3,358,797 UART: [state] CFI Enabled
3,480,323 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,480,993 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,157 UART: [rt]cmd =0x41544d4e, len=14344
3,914,604 >>> mbox cmd response data (8 bytes)
3,914,605 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,452 UART: [rt]cmd =0x41545348, len=116
3,946,087 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,304 UART: [kat] ++
895,456 UART: [kat] sha1
899,692 UART: [kat] SHA2-256
901,632 UART: [kat] SHA2-384
904,341 UART: [kat] SHA2-512-ACC
906,242 UART: [kat] ECC-384
916,123 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,169,910 UART: [cold-reset] ++
1,170,390 UART: [fht] FHT @ 0x50003400
1,173,142 UART: [idev] ++
1,173,310 UART: [idev] CDI.KEYID = 6
1,173,671 UART: [idev] SUBJECT.KEYID = 7
1,174,096 UART: [idev] UDS.KEYID = 0
1,174,442 ready_for_fw is high
1,174,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,063 UART: [idev] Erasing UDS.KEYID = 0
1,198,853 UART: [idev] Sha1 KeyId Algorithm
1,207,605 UART: [idev] --
1,208,742 UART: [ldev] ++
1,208,910 UART: [ldev] CDI.KEYID = 6
1,209,274 UART: [ldev] SUBJECT.KEYID = 5
1,209,701 UART: [ldev] AUTHORITY.KEYID = 7
1,210,164 UART: [ldev] FE.KEYID = 1
1,215,520 UART: [ldev] Erasing FE.KEYID = 1
1,241,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,164 UART: [ldev] --
1,280,589 UART: [fwproc] Wait for Commands...
1,281,312 UART: [fwproc] Recv command 0x46574c44
1,282,045 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,867 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,042 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,447 >>> mbox cmd response: success
2,826,491 UART: [afmc] ++
2,826,659 UART: [afmc] CDI.KEYID = 6
2,827,022 UART: [afmc] SUBJECT.KEYID = 7
2,827,448 UART: [afmc] AUTHORITY.KEYID = 5
2,862,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,589 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,299 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,180 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,881 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,466 UART: [afmc] --
2,905,519 UART: [cold-reset] --
2,906,291 UART: [state] Locking Datavault
2,907,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,796 UART: [state] Locking ICCM
2,908,322 UART: [exit] Launching FMC @ 0x40000130
2,913,652 UART:
2,913,668 UART: Running Caliptra FMC ...
2,914,076 UART:
2,914,130 UART: [state] CFI Enabled
2,924,728 UART: [fht] FMC Alias Private Key: 7
3,043,652 UART: [art] Extend RT PCRs Done
3,044,080 UART: [art] Lock RT PCRs Done
3,045,764 UART: [art] Populate DV Done
3,053,973 UART: [fht] FMC Alias Private Key: 7
3,055,127 UART: [art] Derive CDI
3,055,407 UART: [art] Store in slot 0x4
3,140,876 UART: [art] Derive Key Pair
3,141,236 UART: [art] Store priv key in slot 0x5
3,154,154 UART: [art] Derive Key Pair - Done
3,168,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,230 UART: [art] PUB.X = B8FE5033E5BC70A5AA8164D94FA785AEA2B76D806A1F90A4FC69713A1254DCA7BDCF6D48F2F8F2E2396E7D1F36FDA1B7
3,192,022 UART: [art] PUB.Y = E2558F58741F5F4E3D829FDF5EBA31F696F25EEC22F3AEE6F7A82DED518E1E608AC5B437A503FEF53F89C24FE926033F
3,198,984 UART: [art] SIG.R = 291E665217FD053B108209F87040D7B81327AAADA54567D609158F4BF301A690B4423255F66FB7927DA31F2C54D1825A
3,205,734 UART: [art] SIG.S = 420F58A19535B49FA3C4D4BD6C55462EC5DB00D3713AC3097466E018E4CD7C55B7F4076C5BE77DDB6B6E286223640136
3,229,984 UART: Caliptra RT
3,230,235 UART: [state] CFI Enabled
3,349,555 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,350,225 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,213 UART: [rt]cmd =0x41544d4e, len=14344
3,783,236 >>> mbox cmd response data (8 bytes)
3,783,237 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,128 UART: [rt]cmd =0x41545348, len=116
3,814,803 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,760 ready_for_fw is high
1,058,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,446 >>> mbox cmd response: success
2,740,421 UART:
2,740,437 UART: Running Caliptra FMC ...
2,740,845 UART:
2,740,899 UART: [state] CFI Enabled
2,751,465 UART: [fht] FMC Alias Private Key: 7
2,870,869 UART: [art] Extend RT PCRs Done
2,871,297 UART: [art] Lock RT PCRs Done
2,872,527 UART: [art] Populate DV Done
2,880,616 UART: [fht] FMC Alias Private Key: 7
2,881,678 UART: [art] Derive CDI
2,881,958 UART: [art] Store in slot 0x4
2,968,061 UART: [art] Derive Key Pair
2,968,421 UART: [art] Store priv key in slot 0x5
2,981,481 UART: [art] Derive Key Pair - Done
2,996,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,620 UART: [art] PUB.X = 2E7BFF8F713E9E430E92C054C0F8B2DD6C252E368E7D69CCBFAD00975FC7693015F03B6DED73DFB696E79F83FBFC15A0
3,019,385 UART: [art] PUB.Y = 1CA69ECA4856051818AC474E6775DD608949B6355B83E3B64E8B3F67AB9D3F588640F2F76AD67AA96ED9D70C2D9C21C1
3,026,335 UART: [art] SIG.R = 9C5237E82CA8DC5B2E8CECE538A62CBCC416376B97278724AF4054FFE8E231BF85D37BE7BE1C8AE0C3F838C02E79DC02
3,033,120 UART: [art] SIG.S = D0ADC9D6BC4AC71DFD0D805CDC63FF48AA1637774C405058FFFBC006E1181EF8107338BEFAF8BB178D5C4D09572B85F2
3,056,887 UART: Caliptra RT
3,057,138 UART: [state] CFI Enabled
3,176,228 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,176,898 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,062 UART: [rt]cmd =0x41544d4e, len=14344
3,609,813 >>> mbox cmd response data (8 bytes)
3,609,814 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,921 UART: [rt]cmd =0x41545348, len=116
3,641,572 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,945 UART: [state] LifecycleState = Unprovisioned
86,600 UART: [state] DebugLocked = No
87,174 UART: [state] WD Timer not started. Device not locked for debugging
88,357 UART: [kat] SHA2-256
891,907 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,011 UART: [kat] ++
896,163 UART: [kat] sha1
900,471 UART: [kat] SHA2-256
902,411 UART: [kat] SHA2-384
905,330 UART: [kat] SHA2-512-ACC
907,231 UART: [kat] ECC-384
916,742 UART: [kat] HMAC-384Kdf
921,368 UART: [kat] LMS
1,169,680 UART: [kat] --
1,170,659 UART: [cold-reset] ++
1,171,149 UART: [fht] FHT @ 0x50003400
1,173,839 UART: [idev] ++
1,174,007 UART: [idev] CDI.KEYID = 6
1,174,368 UART: [idev] SUBJECT.KEYID = 7
1,174,793 UART: [idev] UDS.KEYID = 0
1,175,139 ready_for_fw is high
1,175,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,904 UART: [idev] Erasing UDS.KEYID = 0
1,199,880 UART: [idev] Sha1 KeyId Algorithm
1,208,736 UART: [idev] --
1,209,841 UART: [ldev] ++
1,210,009 UART: [ldev] CDI.KEYID = 6
1,210,373 UART: [ldev] SUBJECT.KEYID = 5
1,210,800 UART: [ldev] AUTHORITY.KEYID = 7
1,211,263 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,243,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,885 UART: [ldev] --
1,282,132 UART: [fwproc] Wait for Commands...
1,282,813 UART: [fwproc] Recv command 0x46574c44
1,283,546 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,056 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,231 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,486 >>> mbox cmd response: success
2,827,722 UART: [afmc] ++
2,827,890 UART: [afmc] CDI.KEYID = 6
2,828,253 UART: [afmc] SUBJECT.KEYID = 7
2,828,679 UART: [afmc] AUTHORITY.KEYID = 5
2,863,994 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,898 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,608 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,489 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,190 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,159 UART: [afmc] --
2,907,090 UART: [cold-reset] --
2,908,040 UART: [state] Locking Datavault
2,909,299 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,903 UART: [state] Locking ICCM
2,910,355 UART: [exit] Launching FMC @ 0x40000130
2,915,685 UART:
2,915,701 UART: Running Caliptra FMC ...
2,916,109 UART:
2,916,252 UART: [state] CFI Enabled
2,926,712 UART: [fht] FMC Alias Private Key: 7
3,046,194 UART: [art] Extend RT PCRs Done
3,046,622 UART: [art] Lock RT PCRs Done
3,048,282 UART: [art] Populate DV Done
3,056,569 UART: [fht] FMC Alias Private Key: 7
3,057,585 UART: [art] Derive CDI
3,057,865 UART: [art] Store in slot 0x4
3,143,778 UART: [art] Derive Key Pair
3,144,138 UART: [art] Store priv key in slot 0x5
3,157,244 UART: [art] Derive Key Pair - Done
3,172,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,149 UART: [art] PUB.X = 391CBE558A0CFF95B115B2FF6175CCEA27AE23958ECD1B0F89F8329B4F84E2DB091A609D15CDD721E7B3F37E2A3D1EBB
3,194,932 UART: [art] PUB.Y = 0488730B76FE5DB75A90D8C94E44E96C902912F46AA6AC01C9816716F16B3AD4676D357498723B6FCA2DA854DF3ABD0E
3,201,876 UART: [art] SIG.R = 79FC8AC144ECCA7046546FDB97DDDC268F97610D02F35754C4EAE002E694ECB3B9698B3F4A967C04575C182580F61C9C
3,208,642 UART: [art] SIG.S = 94F49A432BA4DD477DA078F87C1B650DFE6FAB08F22E657EBD648576514A5C5467444FD7E7481A1D1A4B2A3A77BF5E26
3,232,464 UART: Caliptra RT
3,232,807 UART: [state] CFI Enabled
3,352,440 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,110 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,308 UART: [rt]cmd =0x41544d4e, len=14344
3,785,831 >>> mbox cmd response data (8 bytes)
3,785,832 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,945 UART: [rt]cmd =0x41545348, len=116
3,817,594 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,625 ready_for_fw is high
1,059,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,313 >>> mbox cmd response: success
2,740,342 UART:
2,740,358 UART: Running Caliptra FMC ...
2,740,766 UART:
2,740,909 UART: [state] CFI Enabled
2,750,985 UART: [fht] FMC Alias Private Key: 7
2,869,311 UART: [art] Extend RT PCRs Done
2,869,739 UART: [art] Lock RT PCRs Done
2,871,485 UART: [art] Populate DV Done
2,879,656 UART: [fht] FMC Alias Private Key: 7
2,880,636 UART: [art] Derive CDI
2,880,916 UART: [art] Store in slot 0x4
2,966,735 UART: [art] Derive Key Pair
2,967,095 UART: [art] Store priv key in slot 0x5
2,980,783 UART: [art] Derive Key Pair - Done
2,995,712 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,040 UART: [art] PUB.X = 2E7EC70E40B8EDE578DBAF4C5806785E897E4942780BCE8C75A5450E8F878B3BF9EBA02156B4CF5A57E92CF225DD1E59
3,018,812 UART: [art] PUB.Y = 15E3A9C17CFCFE71F0973616CC0256265A0206831BFA22C9ECC92E86E82DAAD780AF92127F873D2E2F921E789F02B029
3,025,756 UART: [art] SIG.R = C41E54B307382815EE9A92D5CA3FC4CB7A698FCB43FF90644EFFBCC65941C81C8A14E6DF012404BCAC09914FFA98C0B0
3,032,532 UART: [art] SIG.S = 9662DCE1B146F7BD09260117C002083D44CD133AE881899EF267BF7D0ADD02295101344FB5B15D64C08F4FA35AB0C83E
3,056,507 UART: Caliptra RT
3,056,850 UART: [state] CFI Enabled
3,177,290 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,960 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,844 UART: [rt]cmd =0x41544d4e, len=14344
3,610,445 >>> mbox cmd response data (8 bytes)
3,610,446 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,541 UART: [rt]cmd =0x41545348, len=116
3,642,086 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,065 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
893,004 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,129 UART: [kat] ++
897,281 UART: [kat] sha1
901,763 UART: [kat] SHA2-256
903,703 UART: [kat] SHA2-384
906,412 UART: [kat] SHA2-512-ACC
908,313 UART: [kat] ECC-384
918,058 UART: [kat] HMAC-384Kdf
922,556 UART: [kat] LMS
1,170,884 UART: [kat] --
1,171,889 UART: [cold-reset] ++
1,172,449 UART: [fht] FHT @ 0x50003400
1,175,278 UART: [idev] ++
1,175,446 UART: [idev] CDI.KEYID = 6
1,175,806 UART: [idev] SUBJECT.KEYID = 7
1,176,230 UART: [idev] UDS.KEYID = 0
1,176,575 ready_for_fw is high
1,176,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,322 UART: [idev] Erasing UDS.KEYID = 0
1,201,161 UART: [idev] Sha1 KeyId Algorithm
1,209,421 UART: [idev] --
1,210,533 UART: [ldev] ++
1,210,701 UART: [ldev] CDI.KEYID = 6
1,211,064 UART: [ldev] SUBJECT.KEYID = 5
1,211,490 UART: [ldev] AUTHORITY.KEYID = 7
1,211,953 UART: [ldev] FE.KEYID = 1
1,217,275 UART: [ldev] Erasing FE.KEYID = 1
1,243,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,401 UART: [ldev] --
1,282,692 UART: [fwproc] Wait for Commands...
1,283,340 UART: [fwproc] Recv command 0x46574c44
1,284,068 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,808 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,978 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,195 >>> mbox cmd response: success
2,828,339 UART: [afmc] ++
2,828,507 UART: [afmc] CDI.KEYID = 6
2,828,869 UART: [afmc] SUBJECT.KEYID = 7
2,829,294 UART: [afmc] AUTHORITY.KEYID = 5
2,865,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,620 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,368 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,077 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,960 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,661 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,509 UART: [afmc] --
2,908,561 UART: [cold-reset] --
2,909,551 UART: [state] Locking Datavault
2,910,882 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,486 UART: [state] Locking ICCM
2,912,002 UART: [exit] Launching FMC @ 0x40000130
2,917,332 UART:
2,917,348 UART: Running Caliptra FMC ...
2,917,756 UART:
2,917,810 UART: [state] CFI Enabled
2,928,640 UART: [fht] FMC Alias Private Key: 7
3,048,686 UART: [art] Extend RT PCRs Done
3,049,114 UART: [art] Lock RT PCRs Done
3,050,840 UART: [art] Populate DV Done
3,058,859 UART: [fht] FMC Alias Private Key: 7
3,059,979 UART: [art] Derive CDI
3,060,259 UART: [art] Store in slot 0x4
3,146,232 UART: [art] Derive Key Pair
3,146,592 UART: [art] Store priv key in slot 0x5
3,159,960 UART: [art] Derive Key Pair - Done
3,174,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,113 UART: [art] PUB.X = 0B944B46F402E5E0D3AFE036004C78AA326C49994C112A929F3C49E3A7EB3288F287E687AF3E8EB7F581F0BC7A4055ED
3,197,863 UART: [art] PUB.Y = 3D4DC2FB493E9136A017A6AEE50D1512478269F59BB1AF04CF6FF6A0799F0F2DDF737B15621C2AC7F0316713A07CE822
3,204,812 UART: [art] SIG.R = C3B9B9538A00936AFE898EEF7A211CD251970C5509E1F83837F6B0138209A56D1C5E8BF7A87FAB699670429FC6C6F711
3,211,553 UART: [art] SIG.S = 9E5D9298FA74EE21C8B379E235B4E9E5F3839BC56176E2C55409565846AB1E53C11EBF6FFA0F340D35D0590C17486E88
3,235,159 UART: Caliptra RT
3,235,410 UART: [state] CFI Enabled
3,355,232 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,355,902 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,770 UART: [rt]cmd =0x41544d4e, len=14344
3,788,773 >>> mbox cmd response data (8 bytes)
3,788,774 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,815 UART: [rt]cmd =0x41545348, len=116
3,820,508 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,703 ready_for_fw is high
1,059,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,162 >>> mbox cmd response: success
2,742,047 UART:
2,742,063 UART: Running Caliptra FMC ...
2,742,471 UART:
2,742,525 UART: [state] CFI Enabled
2,752,925 UART: [fht] FMC Alias Private Key: 7
2,871,663 UART: [art] Extend RT PCRs Done
2,872,091 UART: [art] Lock RT PCRs Done
2,873,669 UART: [art] Populate DV Done
2,881,904 UART: [fht] FMC Alias Private Key: 7
2,882,946 UART: [art] Derive CDI
2,883,226 UART: [art] Store in slot 0x4
2,969,129 UART: [art] Derive Key Pair
2,969,489 UART: [art] Store priv key in slot 0x5
2,982,645 UART: [art] Derive Key Pair - Done
2,997,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,965 UART: [art] PUB.X = 03AC7F060BBFE6C4B1A09790BDC2CFC8BA6CACFBA3DEB3909D89DB484598A3BB462AE8B9047B5CB791388840C644A3D9
3,020,745 UART: [art] PUB.Y = C1F90924472C15C8DE8F883BEE51E4C7F2BD989EE2805FF86887B9A41E2520A19B836DAD25519B9FD9B08D41214CA772
3,027,698 UART: [art] SIG.R = C600B3F4E5652551BE7DEA9F12E7105D95BBAD7B7C23B2DD39C29906BB45E9E479A8296A9E9197A1C35F59A787AB56F3
3,034,453 UART: [art] SIG.S = 709231D7EB00AD8A0956211C095079FC9765E10138382932E14A46D5D161371F113498D5CD3D7937EE1EC8DE20AD057D
3,058,649 UART: Caliptra RT
3,058,900 UART: [state] CFI Enabled
3,178,495 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,179,165 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,153 UART: [rt]cmd =0x41544d4e, len=14344
3,611,466 >>> mbox cmd response data (8 bytes)
3,611,467 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,478 UART: [rt]cmd =0x41545348, len=116
3,642,991 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,971 UART: [state] LifecycleState = Unprovisioned
85,626 UART: [state] DebugLocked = No
86,128 UART: [state] WD Timer not started. Device not locked for debugging
87,401 UART: [kat] SHA2-256
893,051 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,176 UART: [kat] ++
897,328 UART: [kat] sha1
901,618 UART: [kat] SHA2-256
903,558 UART: [kat] SHA2-384
906,275 UART: [kat] SHA2-512-ACC
908,176 UART: [kat] ECC-384
918,149 UART: [kat] HMAC-384Kdf
922,933 UART: [kat] LMS
1,171,261 UART: [kat] --
1,172,236 UART: [cold-reset] ++
1,172,714 UART: [fht] FHT @ 0x50003400
1,175,473 UART: [idev] ++
1,175,641 UART: [idev] CDI.KEYID = 6
1,176,001 UART: [idev] SUBJECT.KEYID = 7
1,176,425 UART: [idev] UDS.KEYID = 0
1,176,770 ready_for_fw is high
1,176,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,457 UART: [idev] Erasing UDS.KEYID = 0
1,201,632 UART: [idev] Sha1 KeyId Algorithm
1,209,914 UART: [idev] --
1,211,102 UART: [ldev] ++
1,211,270 UART: [ldev] CDI.KEYID = 6
1,211,633 UART: [ldev] SUBJECT.KEYID = 5
1,212,059 UART: [ldev] AUTHORITY.KEYID = 7
1,212,522 UART: [ldev] FE.KEYID = 1
1,217,912 UART: [ldev] Erasing FE.KEYID = 1
1,244,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,734 UART: [ldev] --
1,283,231 UART: [fwproc] Wait for Commands...
1,283,857 UART: [fwproc] Recv command 0x46574c44
1,284,585 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,715 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,885 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,258 >>> mbox cmd response: success
2,828,396 UART: [afmc] ++
2,828,564 UART: [afmc] CDI.KEYID = 6
2,828,926 UART: [afmc] SUBJECT.KEYID = 7
2,829,351 UART: [afmc] AUTHORITY.KEYID = 5
2,864,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,069 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,778 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,661 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,362 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,014 UART: [afmc] --
2,908,110 UART: [cold-reset] --
2,908,988 UART: [state] Locking Datavault
2,910,031 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,635 UART: [state] Locking ICCM
2,911,123 UART: [exit] Launching FMC @ 0x40000130
2,916,453 UART:
2,916,469 UART: Running Caliptra FMC ...
2,916,877 UART:
2,917,020 UART: [state] CFI Enabled
2,927,532 UART: [fht] FMC Alias Private Key: 7
3,046,374 UART: [art] Extend RT PCRs Done
3,046,802 UART: [art] Lock RT PCRs Done
3,048,244 UART: [art] Populate DV Done
3,056,321 UART: [fht] FMC Alias Private Key: 7
3,057,255 UART: [art] Derive CDI
3,057,535 UART: [art] Store in slot 0x4
3,143,340 UART: [art] Derive Key Pair
3,143,700 UART: [art] Store priv key in slot 0x5
3,156,840 UART: [art] Derive Key Pair - Done
3,171,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,094 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,859 UART: [art] PUB.X = 19472451B797B6B603C9391896771DAD98965B67470542869803111EB85F2267D4F68E418DAB2BF17A7D365D05CFA142
3,194,605 UART: [art] PUB.Y = 6435BA7D3ACC15DF911B4ECBFADBAB74989E3D09F94352D1FA6BB9860941FB10832B7F0B770F61A324A82B6680E54250
3,201,553 UART: [art] SIG.R = 7674298888BD63D6014E53BAE6BBBED262280BAC389E1385CB81450D3D93B44E54E722B0FF6922F74C789712868BB5E8
3,208,314 UART: [art] SIG.S = 853A2EE5259E6CCDD1DF137F1B7E91FCDC17870C3C8F38AF7429AB53DD90FD7B207D8FAB7999BE23A531AC3CD201C506
3,232,447 UART: Caliptra RT
3,232,790 UART: [state] CFI Enabled
3,352,231 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,901 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,957 UART: [rt]cmd =0x41544d4e, len=14344
3,786,086 >>> mbox cmd response data (8 bytes)
3,786,087 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,402 UART: [rt]cmd =0x41545348, len=116
3,818,065 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,878 ready_for_fw is high
1,059,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,677 >>> mbox cmd response: success
2,740,892 UART:
2,740,908 UART: Running Caliptra FMC ...
2,741,316 UART:
2,741,459 UART: [state] CFI Enabled
2,751,921 UART: [fht] FMC Alias Private Key: 7
2,870,999 UART: [art] Extend RT PCRs Done
2,871,427 UART: [art] Lock RT PCRs Done
2,873,213 UART: [art] Populate DV Done
2,881,504 UART: [fht] FMC Alias Private Key: 7
2,882,594 UART: [art] Derive CDI
2,882,874 UART: [art] Store in slot 0x4
2,968,897 UART: [art] Derive Key Pair
2,969,257 UART: [art] Store priv key in slot 0x5
2,982,873 UART: [art] Derive Key Pair - Done
2,997,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,087 UART: [art] PUB.X = C90369DFCE90B917BE2F6F72477CD8D442F7243440B32A5917CAD15D7C450681A7F0439509A6817911D4DB8B1A780D66
3,019,843 UART: [art] PUB.Y = C1C4A0828FE7323427A3175A35C4718BC7F778F2BF5193F99126939E466A491FD87F5E08E9F9F3D56AB192D0135F0DBF
3,026,789 UART: [art] SIG.R = DEDBC0D5922D5E404DB5432AF8C96535F4AEAEC9D2ACC77673F984318D941C3AB8D6BDED54E2F0916B09E759027EA21D
3,033,571 UART: [art] SIG.S = 8DF6915410E5A62820E1F29739D688F1B210DF97D528AA5DB49C96ADBD03656BBF88ECEBE0D6FAE2CE471A1CAE7A655A
3,057,614 UART: Caliptra RT
3,057,957 UART: [state] CFI Enabled
3,178,045 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,715 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,027 UART: [rt]cmd =0x41544d4e, len=14344
3,612,452 >>> mbox cmd response data (8 bytes)
3,612,453 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,744 UART: [rt]cmd =0x41545348, len=116
3,644,555 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,075 UART:
192,446 UART: Running Caliptra ROM ...
193,644 UART:
193,804 UART: [state] CFI Enabled
263,631 UART: [state] LifecycleState = Unprovisioned
265,602 UART: [state] DebugLocked = No
268,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,991 UART: [kat] SHA2-256
442,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,188 UART: [kat] ++
453,680 UART: [kat] sha1
465,496 UART: [kat] SHA2-256
468,158 UART: [kat] SHA2-384
473,581 UART: [kat] SHA2-512-ACC
475,949 UART: [kat] ECC-384
2,769,003 UART: [kat] HMAC-384Kdf
2,798,817 UART: [kat] LMS
3,989,148 UART: [kat] --
3,992,531 UART: [cold-reset] ++
3,994,682 UART: [fht] Storing FHT @ 0x50003400
4,006,462 UART: [idev] ++
4,007,077 UART: [idev] CDI.KEYID = 6
4,008,010 UART: [idev] SUBJECT.KEYID = 7
4,009,197 UART: [idev] UDS.KEYID = 0
4,010,241 ready_for_fw is high
4,010,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,378 UART: [idev] Erasing UDS.KEYID = 0
7,344,340 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,433 UART: [idev] --
7,371,372 UART: [ldev] ++
7,372,002 UART: [ldev] CDI.KEYID = 6
7,372,893 UART: [ldev] SUBJECT.KEYID = 5
7,374,156 UART: [ldev] AUTHORITY.KEYID = 7
7,375,441 UART: [ldev] FE.KEYID = 1
7,422,355 UART: [ldev] Erasing FE.KEYID = 1
10,755,073 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,809 UART: [ldev] --
13,133,948 UART: [fwproc] Waiting for Commands...
13,136,795 UART: [fwproc] Received command 0x46574c44
13,138,993 UART: [fwproc] Received Image of size 118548 bytes
17,245,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,323,907 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,397,083 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,725,963 >>> mbox cmd response: success
17,730,996 UART: [afmc] ++
17,731,612 UART: [afmc] CDI.KEYID = 6
17,732,498 UART: [afmc] SUBJECT.KEYID = 7
17,733,771 UART: [afmc] AUTHORITY.KEYID = 5
21,090,363 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,389,667 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,391,924 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,377 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,079 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,435,510 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,456,921 UART: [afmc] --
23,461,619 UART: [cold-reset] --
23,465,167 UART: [state] Locking Datavault
23,472,202 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,999 UART: [state] Locking ICCM
23,476,404 UART: [exit] Launching FMC @ 0x40000130
23,484,807 UART:
23,485,049 UART: Running Caliptra FMC ...
23,486,076 UART:
23,486,230 UART: [state] CFI Enabled
23,549,917 UART: [fht] FMC Alias Private Key: 7
25,890,896 UART: [art] Extend RT PCRs Done
25,892,125 UART: [art] Lock RT PCRs Done
25,893,937 UART: [art] Populate DV Done
25,899,407 UART: [fht] FMC Alias Private Key: 7
25,901,054 UART: [art] Derive CDI
25,901,873 UART: [art] Store in slot 0x4
25,958,882 UART: [art] Derive Key Pair
25,959,924 UART: [art] Store priv key in slot 0x5
29,252,997 UART: [art] Derive Key Pair - Done
29,266,173 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,178 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,682 UART: [art] PUB.X = 967E8552DB80A8D7A92CDB06E1CC53F869C2393CA239ECA71F79FDD56ED740F915EB9B5577CD828F8D793541FDF0D422
31,562,948 UART: [art] PUB.Y = 3E10FD0062F2121CD9BF7224C6CEA85A7E078C6EAB6A96BF6C58389C32E843108F336A26987FBFF1927A521D0A61B5D2
31,570,202 UART: [art] SIG.R = E4957C2B4D7575E65D52858B8105B945DCBDA257A0CDB76E5AE513146ACDD95746BF6DB7FB54D05E284FC21BB34254F5
31,577,610 UART: [art] SIG.S = 40799E6094B2EA5526976C296E867654A2985D4D2D51C38DFE1090163CADB638662C341F5E4D174EAD53506F83886174
32,882,903 UART: Caliptra RT
32,883,641 UART: [state] CFI Enabled
33,060,586 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,138,364 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,294,065 UART: [rt]cmd =0x41544d4e, len=14344
42,594,834 >>> mbox cmd response data (8 bytes)
42,595,427 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,626,113 UART: [rt]cmd =0x41545348, len=116
42,645,612 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,038 UART:
192,396 UART: Running Caliptra ROM ...
193,585 UART:
193,740 UART: [state] CFI Enabled
263,190 UART: [state] LifecycleState = Unprovisioned
265,176 UART: [state] DebugLocked = No
266,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,023 UART: [kat] SHA2-256
440,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,288 UART: [kat] ++
451,736 UART: [kat] sha1
461,971 UART: [kat] SHA2-256
464,687 UART: [kat] SHA2-384
469,399 UART: [kat] SHA2-512-ACC
471,760 UART: [kat] ECC-384
2,765,897 UART: [kat] HMAC-384Kdf
2,778,233 UART: [kat] LMS
3,968,556 UART: [kat] --
3,973,587 UART: [cold-reset] ++
3,974,606 UART: [fht] Storing FHT @ 0x50003400
3,984,380 UART: [idev] ++
3,984,935 UART: [idev] CDI.KEYID = 6
3,985,888 UART: [idev] SUBJECT.KEYID = 7
3,987,128 UART: [idev] UDS.KEYID = 0
3,988,167 ready_for_fw is high
3,988,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,137,528 UART: [idev] Erasing UDS.KEYID = 0
7,329,186 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,026 UART: [idev] --
7,357,534 UART: [ldev] ++
7,358,104 UART: [ldev] CDI.KEYID = 6
7,359,041 UART: [ldev] SUBJECT.KEYID = 5
7,360,275 UART: [ldev] AUTHORITY.KEYID = 7
7,361,508 UART: [ldev] FE.KEYID = 1
7,400,136 UART: [ldev] Erasing FE.KEYID = 1
10,732,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,130 UART: [ldev] --
13,111,066 UART: [fwproc] Waiting for Commands...
13,113,592 UART: [fwproc] Received command 0x46574c44
13,115,781 UART: [fwproc] Received Image of size 118548 bytes
17,218,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,921 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,047 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,229 >>> mbox cmd response: success
17,707,701 UART: [afmc] ++
17,708,363 UART: [afmc] CDI.KEYID = 6
17,709,261 UART: [afmc] SUBJECT.KEYID = 7
17,710,310 UART: [afmc] AUTHORITY.KEYID = 5
21,067,891 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,730 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,997 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,489 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,209 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,589 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,434,942 UART: [afmc] --
23,438,324 UART: [cold-reset] --
23,442,553 UART: [state] Locking Datavault
23,447,272 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,028 UART: [state] Locking ICCM
23,451,591 UART: [exit] Launching FMC @ 0x40000130
23,459,934 UART:
23,460,186 UART: Running Caliptra FMC ...
23,461,289 UART:
23,461,449 UART: [state] CFI Enabled
23,526,620 UART: [fht] FMC Alias Private Key: 7
25,866,983 UART: [art] Extend RT PCRs Done
25,868,221 UART: [art] Lock RT PCRs Done
25,869,904 UART: [art] Populate DV Done
25,875,369 UART: [fht] FMC Alias Private Key: 7
25,876,960 UART: [art] Derive CDI
25,877,772 UART: [art] Store in slot 0x4
25,935,525 UART: [art] Derive Key Pair
25,936,586 UART: [art] Store priv key in slot 0x5
29,229,244 UART: [art] Derive Key Pair - Done
29,242,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,530,918 UART: [art] Erasing AUTHORITY.KEYID = 7
31,532,427 UART: [art] PUB.X = BCAC7D730BE5322870C914A30DE8A5E6913DB6428BF0CD04C03694902D079B7F260487886062201A4D786D7AF3CBEC86
31,539,695 UART: [art] PUB.Y = 472B90ED809ECDC9C2E65F4A425B97037C021317EF79B32A4732C291E79F388C1E79E141CE4E853F73094B091082ACF7
31,546,950 UART: [art] SIG.R = F00D6F7E44E8625672D5DF651DC472B448DF4174B68920C50971257C57BBF9673231E2FF0122F4F2DA2AB069A3194D75
31,554,320 UART: [art] SIG.S = 83B08242513504C8D691A8867A86ED982A07CF530FB0D48FDF385599BDF97C4056CB257B19B7D65929EE33F2401BAE74
32,859,091 UART: Caliptra RT
32,859,787 UART: [state] CFI Enabled
33,035,047 UART: [rt] RT listening for mailbox commands...
33,037,459 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,193,192 UART: [rt]cmd =0x41544d4e, len=14344
38,493,997 >>> mbox cmd response data (8 bytes)
38,494,622 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,525,254 UART: [rt]cmd =0x41545348, len=116
38,527,373 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,806,877 ready_for_fw is high
3,807,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,964,256 >>> mbox cmd response: success
23,648,431 UART:
23,648,880 UART: Running Caliptra FMC ...
23,650,000 UART:
23,650,174 UART: [state] CFI Enabled
23,720,893 UART: [fht] FMC Alias Private Key: 7
26,060,843 UART: [art] Extend RT PCRs Done
26,062,078 UART: [art] Lock RT PCRs Done
26,063,775 UART: [art] Populate DV Done
26,069,225 UART: [fht] FMC Alias Private Key: 7
26,070,725 UART: [art] Derive CDI
26,071,466 UART: [art] Store in slot 0x4
26,127,609 UART: [art] Derive Key Pair
26,128,660 UART: [art] Store priv key in slot 0x5
29,421,648 UART: [art] Derive Key Pair - Done
29,434,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,470 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,003 UART: [art] PUB.X = A3E9C8741EE8325A50824FF6AB5E7299CE9BAB8C578AA5F91C6775F9EB9B2B938FBC2BB38230FB6481807CD2A9E087B0
31,732,280 UART: [art] PUB.Y = 6C01A93E4442A7FA98C996D01059CFD55D249574131259DFD88D0F009E70C4C9A53D4CB4F42A32A93EC7677663A1FE15
31,739,500 UART: [art] SIG.R = D85FF837D65EB001C02E83774698BE700F98918A24ACD1EC409643C0C6A3640313CF0BA1EA8BF36324785B4D3FAAA133
31,746,898 UART: [art] SIG.S = 5A63622697AC01DE6628E90A58213EB980A3071C2C934AD3FEF2E6116813DD74DED512D15FAED4761EA7BA834B6E1A49
33,052,306 UART: Caliptra RT
33,053,013 UART: [state] CFI Enabled
33,228,993 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,304,869 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,460,677 UART: [rt]cmd =0x41544d4e, len=14344
42,761,093 >>> mbox cmd response data (8 bytes)
42,761,708 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,792,669 UART: [rt]cmd =0x41545348, len=116
42,812,539 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
3,785,513 ready_for_fw is high
3,785,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,925,729 >>> mbox cmd response: success
23,611,525 UART:
23,612,037 UART: Running Caliptra FMC ...
23,613,171 UART:
23,613,340 UART: [state] CFI Enabled
23,681,627 UART: [fht] FMC Alias Private Key: 7
26,021,725 UART: [art] Extend RT PCRs Done
26,023,000 UART: [art] Lock RT PCRs Done
26,024,479 UART: [art] Populate DV Done
26,029,625 UART: [fht] FMC Alias Private Key: 7
26,031,114 UART: [art] Derive CDI
26,031,886 UART: [art] Store in slot 0x4
26,089,432 UART: [art] Derive Key Pair
26,090,471 UART: [art] Store priv key in slot 0x5
29,383,403 UART: [art] Derive Key Pair - Done
29,396,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,684,899 UART: [art] Erasing AUTHORITY.KEYID = 7
31,686,428 UART: [art] PUB.X = EAE368FA54BB763814C237E7B704FEEDF9DBDB8BEAC4067024738B12715B82BD4F4271B2B66054FF49465997338C4E14
31,693,713 UART: [art] PUB.Y = 9F2357645F5BB587E58D99DCEF229A88BAD213FB996776E30284E1EEB3B37FA09513F2198EF29930690B1D5BDD00681B
31,700,900 UART: [art] SIG.R = ABEE40A6B8B8089218DE798294F3CB2CB010E8A78391B4E129D4296960C10B1DADCAB429BCCB4D3BB810ED391392FA9D
31,708,306 UART: [art] SIG.S = 194CE5A256851091017AEB581EEC8FEA26C5B5B9294E8B49E4E2E81FE78218F288FEE886822CCCEDC68C0D22549946D0
33,013,552 UART: Caliptra RT
33,014,277 UART: [state] CFI Enabled
33,191,417 UART: [rt] RT listening for mailbox commands...
33,193,828 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,349,452 UART: [rt]cmd =0x41544d4e, len=14344
38,650,222 >>> mbox cmd response data (8 bytes)
38,650,851 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,681,591 UART: [rt]cmd =0x41545348, len=116
38,684,011 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.50s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,487 UART:
192,854 UART: Running Caliptra ROM ...
194,040 UART:
603,529 UART: [state] CFI Enabled
618,560 UART: [state] LifecycleState = Unprovisioned
620,511 UART: [state] DebugLocked = No
621,897 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,834 UART: [kat] SHA2-256
796,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,082 UART: [kat] ++
807,531 UART: [kat] sha1
818,841 UART: [kat] SHA2-256
821,527 UART: [kat] SHA2-384
827,803 UART: [kat] SHA2-512-ACC
830,174 UART: [kat] ECC-384
3,115,093 UART: [kat] HMAC-384Kdf
3,126,363 UART: [kat] LMS
4,316,448 UART: [kat] --
4,321,592 UART: [cold-reset] ++
4,324,084 UART: [fht] Storing FHT @ 0x50003400
4,335,575 UART: [idev] ++
4,336,181 UART: [idev] CDI.KEYID = 6
4,337,067 UART: [idev] SUBJECT.KEYID = 7
4,338,379 UART: [idev] UDS.KEYID = 0
4,339,436 ready_for_fw is high
4,339,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,381 UART: [idev] Erasing UDS.KEYID = 0
7,630,127 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,317 UART: [idev] --
7,655,385 UART: [ldev] ++
7,655,952 UART: [ldev] CDI.KEYID = 6
7,656,898 UART: [ldev] SUBJECT.KEYID = 5
7,658,159 UART: [ldev] AUTHORITY.KEYID = 7
7,659,306 UART: [ldev] FE.KEYID = 1
7,671,909 UART: [ldev] Erasing FE.KEYID = 1
10,957,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,784 UART: [ldev] --
13,318,663 UART: [fwproc] Waiting for Commands...
13,320,801 UART: [fwproc] Received command 0x46574c44
13,322,974 UART: [fwproc] Received Image of size 118548 bytes
17,429,229 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,711 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,916 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,820 >>> mbox cmd response: success
17,904,806 UART: [afmc] ++
17,905,417 UART: [afmc] CDI.KEYID = 6
17,906,301 UART: [afmc] SUBJECT.KEYID = 7
17,907,565 UART: [afmc] AUTHORITY.KEYID = 5
21,221,869 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,774 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,028 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,501 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,201 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,574 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,048 UART: [afmc] --
23,589,236 UART: [cold-reset] --
23,594,114 UART: [state] Locking Datavault
23,598,595 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,336 UART: [state] Locking ICCM
23,602,367 UART: [exit] Launching FMC @ 0x40000130
23,610,760 UART:
23,610,987 UART: Running Caliptra FMC ...
23,612,178 UART:
23,612,330 UART: [state] CFI Enabled
23,620,755 UART: [fht] FMC Alias Private Key: 7
25,960,813 UART: [art] Extend RT PCRs Done
25,962,036 UART: [art] Lock RT PCRs Done
25,963,640 UART: [art] Populate DV Done
25,968,991 UART: [fht] FMC Alias Private Key: 7
25,970,684 UART: [art] Derive CDI
25,971,415 UART: [art] Store in slot 0x4
26,013,953 UART: [art] Derive Key Pair
26,014,991 UART: [art] Store priv key in slot 0x5
29,257,547 UART: [art] Derive Key Pair - Done
29,270,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,190 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,695 UART: [art] PUB.X = B1D042411A9E69BA2205B2BADC12930FE68FC97935575142119F3D81CEFF56AAB91D04B548DC846D00D694AEC2D0664D
31,558,948 UART: [art] PUB.Y = 93B78528DBC42164CA68F211AD9EB02308E0E1F6251262AE2EABE038144BEAE9A491E46D817C1995E4FD90931D7CEFDD
31,566,237 UART: [art] SIG.R = 703AB1BA331925C1876AD7153C08EF8D5A378AB6EED200DA5B14068E07F2A191A9FA7A284F1C2BFA927A5C3EEFD7CC16
31,573,635 UART: [art] SIG.S = EFBFDDAEB99E20CC39C77E1C3C99AF7CAB4BC0FE01EE11EAA0025286288F2FF7B184AE0C3F0CCB8A0E64BC7B798A6355
32,878,590 UART: Caliptra RT
32,879,301 UART: [state] CFI Enabled
33,012,393 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,089,251 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,244,750 UART: [rt]cmd =0x41544d4e, len=14344
42,545,180 >>> mbox cmd response data (8 bytes)
42,545,782 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,576,309 UART: [rt]cmd =0x41545348, len=116
42,597,230 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,532 UART:
192,888 UART: Running Caliptra ROM ...
194,066 UART:
603,642 UART: [state] CFI Enabled
619,413 UART: [state] LifecycleState = Unprovisioned
621,357 UART: [state] DebugLocked = No
624,162 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,156 UART: [kat] SHA2-256
797,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,441 UART: [kat] ++
808,883 UART: [kat] sha1
820,532 UART: [kat] SHA2-256
823,249 UART: [kat] SHA2-384
827,887 UART: [kat] SHA2-512-ACC
830,246 UART: [kat] ECC-384
3,115,760 UART: [kat] HMAC-384Kdf
3,127,707 UART: [kat] LMS
4,317,834 UART: [kat] --
4,321,213 UART: [cold-reset] ++
4,323,145 UART: [fht] Storing FHT @ 0x50003400
4,334,710 UART: [idev] ++
4,335,344 UART: [idev] CDI.KEYID = 6
4,336,249 UART: [idev] SUBJECT.KEYID = 7
4,337,489 UART: [idev] UDS.KEYID = 0
4,338,495 ready_for_fw is high
4,338,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,528 UART: [idev] Erasing UDS.KEYID = 0
7,617,707 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,723 UART: [idev] --
7,644,091 UART: [ldev] ++
7,644,659 UART: [ldev] CDI.KEYID = 6
7,645,670 UART: [ldev] SUBJECT.KEYID = 5
7,646,818 UART: [ldev] AUTHORITY.KEYID = 7
7,648,091 UART: [ldev] FE.KEYID = 1
7,656,686 UART: [ldev] Erasing FE.KEYID = 1
10,949,337 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,920 UART: [ldev] --
13,308,532 UART: [fwproc] Waiting for Commands...
13,310,457 UART: [fwproc] Received command 0x46574c44
13,312,632 UART: [fwproc] Received Image of size 118548 bytes
17,420,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,981 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,139 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,702 >>> mbox cmd response: success
17,908,910 UART: [afmc] ++
17,909,562 UART: [afmc] CDI.KEYID = 6
17,910,475 UART: [afmc] SUBJECT.KEYID = 7
17,911,581 UART: [afmc] AUTHORITY.KEYID = 5
21,226,620 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,976 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,232 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,664 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,352 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,768 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,520 UART: [afmc] --
23,594,367 UART: [cold-reset] --
23,599,148 UART: [state] Locking Datavault
23,604,668 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,414 UART: [state] Locking ICCM
23,607,747 UART: [exit] Launching FMC @ 0x40000130
23,616,159 UART:
23,616,389 UART: Running Caliptra FMC ...
23,617,484 UART:
23,617,635 UART: [state] CFI Enabled
23,625,674 UART: [fht] FMC Alias Private Key: 7
25,965,503 UART: [art] Extend RT PCRs Done
25,966,718 UART: [art] Lock RT PCRs Done
25,968,584 UART: [art] Populate DV Done
25,974,099 UART: [fht] FMC Alias Private Key: 7
25,975,739 UART: [art] Derive CDI
25,976,467 UART: [art] Store in slot 0x4
26,018,946 UART: [art] Derive Key Pair
26,019,985 UART: [art] Store priv key in slot 0x5
29,262,134 UART: [art] Derive Key Pair - Done
29,275,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,668 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,192 UART: [art] PUB.X = E0974448F1452653040FACD6BA52A4646F647D7FCB273E906B9F9F9D20C30F1AA2CFB892762F4E7E6E3AC2C2D2C8726D
31,564,449 UART: [art] PUB.Y = 8F3E9685739825ACFF5478B4609C22759E4EF5349A291A8082661940063D8F1E596FEAF869E5CE7EEEBDB94DF0F75CD2
31,571,680 UART: [art] SIG.R = DC98864FE802874A3C8832807C60B9C2863F5BB99879C5472A14CBB1A6BBF0877DB6F6346F85C08BD0DE720CCA1E1145
31,579,070 UART: [art] SIG.S = 194665981FF95AB0C3BBF1896AB685F477680B878BF1905B2AFD7BA5BADED15604B47F5AD03F746FD1ACB10634CCFF82
32,884,321 UART: Caliptra RT
32,885,027 UART: [state] CFI Enabled
33,017,648 UART: [rt] RT listening for mailbox commands...
33,020,073 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,175,448 UART: [rt]cmd =0x41544d4e, len=14344
38,476,519 >>> mbox cmd response data (8 bytes)
38,477,177 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,507,844 UART: [rt]cmd =0x41545348, len=116
38,509,994 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,125,451 ready_for_fw is high
4,126,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,398 >>> mbox cmd response: success
23,790,631 UART:
23,791,102 UART: Running Caliptra FMC ...
23,792,228 UART:
23,792,390 UART: [state] CFI Enabled
23,800,565 UART: [fht] FMC Alias Private Key: 7
26,140,707 UART: [art] Extend RT PCRs Done
26,141,946 UART: [art] Lock RT PCRs Done
26,143,382 UART: [art] Populate DV Done
26,148,703 UART: [fht] FMC Alias Private Key: 7
26,150,252 UART: [art] Derive CDI
26,150,987 UART: [art] Store in slot 0x4
26,193,896 UART: [art] Derive Key Pair
26,194,887 UART: [art] Store priv key in slot 0x5
29,437,244 UART: [art] Derive Key Pair - Done
29,450,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,208 UART: [art] Erasing AUTHORITY.KEYID = 7
31,731,715 UART: [art] PUB.X = 119604598FD9644A632B08882B9C155CAD47A4EC902B2F588F1638A74D9F1953E43C7CDC6515E518AA692A7318F37777
31,738,985 UART: [art] PUB.Y = E9D2912677E92590D762A59F26AA9BD0FB9DAF1B1953A71F18125F4C34E0D0945BE9CE99CE130E1FDB39C2F1BE7F9C00
31,746,235 UART: [art] SIG.R = 884B139578C3EA4FE7B3B9D23D94E5126AD1D73EE66C2A6C1C91E6BFD007D0BDD006AE5180EE829726689AA18D5DB6C2
31,753,624 UART: [art] SIG.S = 5C1C1C22061B7BF245F28FB799A3E08F8EF8A879D65434E9CCD21BF8AE30A100F1BDFC8452CC13FA6FF5F806B07B0ADA
33,058,287 UART: Caliptra RT
33,058,992 UART: [state] CFI Enabled
33,192,603 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,269,078 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,424,818 UART: [rt]cmd =0x41544d4e, len=14344
42,725,454 >>> mbox cmd response data (8 bytes)
42,726,069 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,756,875 UART: [rt]cmd =0x41545348, len=116
42,777,345 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,126,981 ready_for_fw is high
4,127,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,170,450 >>> mbox cmd response: success
23,812,043 UART:
23,812,487 UART: Running Caliptra FMC ...
23,813,624 UART:
23,813,778 UART: [state] CFI Enabled
23,821,721 UART: [fht] FMC Alias Private Key: 7
26,161,868 UART: [art] Extend RT PCRs Done
26,163,096 UART: [art] Lock RT PCRs Done
26,164,860 UART: [art] Populate DV Done
26,170,322 UART: [fht] FMC Alias Private Key: 7
26,171,970 UART: [art] Derive CDI
26,172,780 UART: [art] Store in slot 0x4
26,215,032 UART: [art] Derive Key Pair
26,216,077 UART: [art] Store priv key in slot 0x5
29,458,878 UART: [art] Derive Key Pair - Done
29,471,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,751,914 UART: [art] Erasing AUTHORITY.KEYID = 7
31,753,431 UART: [art] PUB.X = 84C2845C84C5CD1474B3BF838C447769E134CFE9C82DEB16F071752294F32B5F24A3E3DA1E003B0031DAA363446CB3DB
31,760,627 UART: [art] PUB.Y = 243C7CDF1C12B6B63C2B7E3C4192CE63F24875C06CE59A407339A050709E3C17A110721D5573F8FB9A4C179455A8B1CA
31,767,850 UART: [art] SIG.R = C40FBC076C40818A3BB3A929D9BF13B6990954266BB19B842383820F7E29C51E8CC68D3A9DA13DFEB7553957CE58EE1D
31,775,299 UART: [art] SIG.S = 2CF635096AFFB9F2E480F53DBB8B352A095FB7E0BB983B72FCF311032BB6BC1198ABBFB7D217D5F52455EFD6DC04A1B5
33,080,120 UART: Caliptra RT
33,080,841 UART: [state] CFI Enabled
33,214,220 UART: [rt] RT listening for mailbox commands...
33,216,627 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,372,116 UART: [rt]cmd =0x41544d4e, len=14344
38,672,298 >>> mbox cmd response data (8 bytes)
38,672,907 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,703,651 UART: [rt]cmd =0x41545348, len=116
38,706,125 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,189 UART:
192,533 UART: Running Caliptra ROM ...
193,709 UART:
193,865 UART: [state] CFI Enabled
264,329 UART: [state] LifecycleState = Unprovisioned
266,307 UART: [state] DebugLocked = No
268,334 UART: [state] WD Timer not started. Device not locked for debugging
272,148 UART: [kat] SHA2-256
451,840 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,583 UART: [kat] ++
463,068 UART: [kat] sha1
473,017 UART: [kat] SHA2-256
475,722 UART: [kat] SHA2-384
481,289 UART: [kat] SHA2-512-ACC
483,673 UART: [kat] ECC-384
2,948,768 UART: [kat] HMAC-384Kdf
2,971,484 UART: [kat] LMS
3,447,971 UART: [kat] --
3,452,314 UART: [cold-reset] ++
3,453,621 UART: [fht] FHT @ 0x50003400
3,464,948 UART: [idev] ++
3,465,507 UART: [idev] CDI.KEYID = 6
3,466,460 UART: [idev] SUBJECT.KEYID = 7
3,467,719 UART: [idev] UDS.KEYID = 0
3,468,856 ready_for_fw is high
3,469,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,317 UART: [idev] Erasing UDS.KEYID = 0
5,988,910 UART: [idev] Sha1 KeyId Algorithm
6,013,277 UART: [idev] --
6,017,418 UART: [ldev] ++
6,018,015 UART: [ldev] CDI.KEYID = 6
6,018,931 UART: [ldev] SUBJECT.KEYID = 5
6,020,143 UART: [ldev] AUTHORITY.KEYID = 7
6,021,372 UART: [ldev] FE.KEYID = 1
6,061,347 UART: [ldev] Erasing FE.KEYID = 1
8,572,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,320,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,336,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,290 UART: [ldev] --
10,379,037 UART: [fwproc] Wait for Commands...
10,381,128 UART: [fwproc] Recv command 0x46574c44
10,383,162 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,648 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,627 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,355 >>> mbox cmd response: success
14,344,803 UART: [afmc] ++
14,345,419 UART: [afmc] CDI.KEYID = 6
14,346,436 UART: [afmc] SUBJECT.KEYID = 7
14,347,591 UART: [afmc] AUTHORITY.KEYID = 5
16,878,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,601,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,603,679 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,619,461 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,635,527 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,651,150 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,675,183 UART: [afmc] --
18,679,478 UART: [cold-reset] --
18,681,667 UART: [state] Locking Datavault
18,687,935 UART: [state] Locking PCR0, PCR1 and PCR31
18,689,699 UART: [state] Locking ICCM
18,691,498 UART: [exit] Launching FMC @ 0x40000130
18,699,889 UART:
18,700,132 UART: Running Caliptra FMC ...
18,701,231 UART:
18,701,387 UART: [state] CFI Enabled
18,758,025 UART: [fht] FMC Alias Private Key: 7
20,524,305 UART: [art] Extend RT PCRs Done
20,525,519 UART: [art] Lock RT PCRs Done
20,526,963 UART: [art] Populate DV Done
20,532,534 UART: [fht] FMC Alias Private Key: 7
20,534,227 UART: [art] Derive CDI
20,534,959 UART: [art] Store in slot 0x4
20,591,080 UART: [art] Derive Key Pair
20,592,132 UART: [art] Store priv key in slot 0x5
23,055,152 UART: [art] Derive Key Pair - Done
23,068,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,780,920 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,416 UART: [art] PUB.X = A834167DD3DF3DEEB81B3CADB5123831EC12F08A169BDE981E8198BA88486890A89D70EBB097B1D6EBB10763D65216AF
24,789,721 UART: [art] PUB.Y = A9F15017282EB2F488447EC0A039247E95CBE62302CDCD7C65491D2B966B55D6AA7DEEF15598E68CA5E1ED761E3DE3EC
24,796,994 UART: [art] SIG.R = BF165CA967C5F01BFC71D475AE5A9B1C5DF29AD5D7A11556BB2AA28933C7BC0FA96AE7E159934859BE51DC827ABC0231
24,804,407 UART: [art] SIG.S = 391873EA82F8CC2EFA34DF5E8CDDBDE23A947D296B29CC9C420FF4685B3ABE392F9724B6B371DCE081149C905AA0361D
25,783,278 UART: Caliptra RT
25,783,973 UART: [state] CFI Enabled
25,964,842 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,012,560 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,168,102 UART: [rt]cmd =0x41544d4e, len=14344
34,163,305 >>> mbox cmd response data (8 bytes)
34,163,910 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,194,696 UART: [rt]cmd =0x41545348, len=116
34,214,857 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,047 UART:
192,417 UART: Running Caliptra ROM ...
193,545 UART:
193,689 UART: [state] CFI Enabled
261,690 UART: [state] LifecycleState = Unprovisioned
263,593 UART: [state] DebugLocked = No
266,341 UART: [state] WD Timer not started. Device not locked for debugging
270,743 UART: [kat] SHA2-256
450,399 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,224 UART: [kat] ++
461,681 UART: [kat] sha1
473,190 UART: [kat] SHA2-256
475,904 UART: [kat] SHA2-384
481,124 UART: [kat] SHA2-512-ACC
483,482 UART: [kat] ECC-384
2,948,331 UART: [kat] HMAC-384Kdf
2,970,652 UART: [kat] LMS
3,447,143 UART: [kat] --
3,452,913 UART: [cold-reset] ++
3,455,475 UART: [fht] FHT @ 0x50003400
3,467,866 UART: [idev] ++
3,468,434 UART: [idev] CDI.KEYID = 6
3,469,462 UART: [idev] SUBJECT.KEYID = 7
3,470,630 UART: [idev] UDS.KEYID = 0
3,471,673 ready_for_fw is high
3,471,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,923 UART: [idev] Erasing UDS.KEYID = 0
5,987,744 UART: [idev] Sha1 KeyId Algorithm
6,009,834 UART: [idev] --
6,014,825 UART: [ldev] ++
6,015,395 UART: [ldev] CDI.KEYID = 6
6,016,307 UART: [ldev] SUBJECT.KEYID = 5
6,017,520 UART: [ldev] AUTHORITY.KEYID = 7
6,018,807 UART: [ldev] FE.KEYID = 1
6,056,576 UART: [ldev] Erasing FE.KEYID = 1
8,563,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,940 UART: [ldev] --
10,374,759 UART: [fwproc] Wait for Commands...
10,376,316 UART: [fwproc] Recv command 0x46574c44
10,378,349 UART: [fwproc] Recv'd Img size: 118548 bytes
13,858,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,861 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,872 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,734 >>> mbox cmd response: success
14,347,580 UART: [afmc] ++
14,348,253 UART: [afmc] CDI.KEYID = 6
14,349,147 UART: [afmc] SUBJECT.KEYID = 7
14,350,308 UART: [afmc] AUTHORITY.KEYID = 5
16,898,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,636,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,638,884 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,654,674 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,670,715 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,281 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,168 UART: [afmc] --
18,715,369 UART: [cold-reset] --
18,719,117 UART: [state] Locking Datavault
18,722,902 UART: [state] Locking PCR0, PCR1 and PCR31
18,724,598 UART: [state] Locking ICCM
18,726,039 UART: [exit] Launching FMC @ 0x40000130
18,734,446 UART:
18,734,679 UART: Running Caliptra FMC ...
18,735,775 UART:
18,735,929 UART: [state] CFI Enabled
18,796,476 UART: [fht] FMC Alias Private Key: 7
20,563,636 UART: [art] Extend RT PCRs Done
20,564,858 UART: [art] Lock RT PCRs Done
20,566,588 UART: [art] Populate DV Done
20,572,264 UART: [fht] FMC Alias Private Key: 7
20,573,987 UART: [art] Derive CDI
20,574,803 UART: [art] Store in slot 0x4
20,629,084 UART: [art] Derive Key Pair
20,630,127 UART: [art] Store priv key in slot 0x5
23,093,026 UART: [art] Derive Key Pair - Done
23,106,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,157 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,658 UART: [art] PUB.X = 3DB21EEA43A87D81BF6A7DDCF8CECEEA2F37727ED18435DF25003A88A08E2851069F826331752D0FACF555CAD236615C
24,826,957 UART: [art] PUB.Y = B4B9AC0A5FE751422EE41A99A59D92FCA4B30ACC355738AD5AED8CB3B1AAEAC85993F61103E177223A30A6D7AF0E0A9A
24,834,247 UART: [art] SIG.R = EC37827AE6417880297B67F5DF1A15E49D6EC984F688ADB27AAA6BA98F6893D0C020071FD47BF06CDADF94ADECB9BAB7
24,841,631 UART: [art] SIG.S = 78966509D0BEE08EC8F523D4295B078A20FA11CD38466CDD147C1D5AB65A5E47CCE0DF974E3CEC7027C8F22776D861EB
25,820,458 UART: Caliptra RT
25,821,164 UART: [state] CFI Enabled
26,002,858 UART: [rt] RT listening for mailbox commands...
26,005,270 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,160,479 UART: [rt]cmd =0x41544d4e, len=14344
30,156,381 >>> mbox cmd response data (8 bytes)
30,157,000 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,187,625 UART: [rt]cmd =0x41545348, len=116
30,189,886 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,993 writing to cptra_bootfsm_go
3,459,701 ready_for_fw is high
3,460,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,249,833 >>> mbox cmd response: success
18,538,687 UART:
18,539,096 UART: Running Caliptra FMC ...
18,540,274 UART:
18,540,434 UART: [state] CFI Enabled
18,607,633 UART: [fht] FMC Alias Private Key: 7
20,373,610 UART: [art] Extend RT PCRs Done
20,374,833 UART: [art] Lock RT PCRs Done
20,376,373 UART: [art] Populate DV Done
20,381,678 UART: [fht] FMC Alias Private Key: 7
20,383,223 UART: [art] Derive CDI
20,383,956 UART: [art] Store in slot 0x4
20,442,022 UART: [art] Derive Key Pair
20,443,064 UART: [art] Store priv key in slot 0x5
22,905,749 UART: [art] Derive Key Pair - Done
22,919,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,631,798 UART: [art] Erasing AUTHORITY.KEYID = 7
24,633,299 UART: [art] PUB.X = 4F3B0AB5007ABC2B0A728DBA0E59E809A993C312B4A116114D19C129F14548885E844552867CF68A2C472C44CB4C719D
24,640,562 UART: [art] PUB.Y = 0A123C1134A444144862427A6CA65082DD3F9E6CFD01E2A6585065FE3A60E4B894FEB754274805B4B2C97696376F8549
24,647,814 UART: [art] SIG.R = 2B4EB40717C36B95666AB89043ED1CFAAB6CD9197C05FEBF261547F30303C17EA937126FCB8FB1C035AF5D9120F38EF2
24,655,171 UART: [art] SIG.S = CE2C07D70AAD1A55B0051C135BF0ED4B3CF5307167A58C04B09CA890A956C8CFCD9F006D8BF14A5FB9FFC40F7F282A27
25,633,917 UART: Caliptra RT
25,634,626 UART: [state] CFI Enabled
25,814,980 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,866,544 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,021,817 UART: [rt]cmd =0x41544d4e, len=14344
34,017,278 >>> mbox cmd response data (8 bytes)
34,017,889 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,048,785 UART: [rt]cmd =0x41545348, len=116
34,068,593 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,459,799 ready_for_fw is high
3,460,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,204,689 >>> mbox cmd response: success
18,493,309 UART:
18,493,703 UART: Running Caliptra FMC ...
18,494,890 UART:
18,495,057 UART: [state] CFI Enabled
18,561,475 UART: [fht] FMC Alias Private Key: 7
20,328,444 UART: [art] Extend RT PCRs Done
20,329,653 UART: [art] Lock RT PCRs Done
20,331,054 UART: [art] Populate DV Done
20,336,661 UART: [fht] FMC Alias Private Key: 7
20,338,221 UART: [art] Derive CDI
20,339,034 UART: [art] Store in slot 0x4
20,393,494 UART: [art] Derive Key Pair
20,394,528 UART: [art] Store priv key in slot 0x5
22,857,674 UART: [art] Derive Key Pair - Done
22,870,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,582,721 UART: [art] Erasing AUTHORITY.KEYID = 7
24,584,217 UART: [art] PUB.X = 3C7681A9CCA72669E96F5C53C9C3D779813B71FCA53BCC4E12AF649A7D2977D9D14D010AD9B949FA97D325D45C1A03F6
24,591,464 UART: [art] PUB.Y = 6863B20C6502AFDFBEFCF0597184382F667BECA811D1FAFEF217D628686E6E43F2B26B3C2B7DF25C41B1703E69BF392F
24,598,774 UART: [art] SIG.R = 33BC2FB082DAB956C6C08B78F00019DAAE9F711BBE5DCB24BBC8FB8780BD4F3099ADF6BD207204F9CB339DFED50571BE
24,606,205 UART: [art] SIG.S = D0A98492D6C5B1410F196681041B31F94E398AB1220E720B27EE35163B488AA92A4189DFB819888D5E29FE8B0A98E773
25,585,457 UART: Caliptra RT
25,586,167 UART: [state] CFI Enabled
25,766,409 UART: [rt] RT listening for mailbox commands...
25,768,872 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,924,194 UART: [rt]cmd =0x41544d4e, len=14344
29,920,042 >>> mbox cmd response data (8 bytes)
29,920,609 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,951,490 UART: [rt]cmd =0x41545348, len=116
29,953,526 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,407 UART:
192,771 UART: Running Caliptra ROM ...
193,964 UART:
603,609 UART: [state] CFI Enabled
616,929 UART: [state] LifecycleState = Unprovisioned
618,871 UART: [state] DebugLocked = No
620,746 UART: [state] WD Timer not started. Device not locked for debugging
624,796 UART: [kat] SHA2-256
804,455 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,256 UART: [kat] ++
815,789 UART: [kat] sha1
827,448 UART: [kat] SHA2-256
830,166 UART: [kat] SHA2-384
835,372 UART: [kat] SHA2-512-ACC
837,749 UART: [kat] ECC-384
3,281,180 UART: [kat] HMAC-384Kdf
3,293,203 UART: [kat] LMS
3,769,722 UART: [kat] --
3,774,925 UART: [cold-reset] ++
3,776,147 UART: [fht] FHT @ 0x50003400
3,787,053 UART: [idev] ++
3,787,621 UART: [idev] CDI.KEYID = 6
3,788,655 UART: [idev] SUBJECT.KEYID = 7
3,789,835 UART: [idev] UDS.KEYID = 0
3,790,787 ready_for_fw is high
3,790,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,210 UART: [idev] Erasing UDS.KEYID = 0
6,269,835 UART: [idev] Sha1 KeyId Algorithm
6,293,921 UART: [idev] --
6,299,156 UART: [ldev] ++
6,299,782 UART: [ldev] CDI.KEYID = 6
6,300,697 UART: [ldev] SUBJECT.KEYID = 5
6,301,909 UART: [ldev] AUTHORITY.KEYID = 7
6,303,137 UART: [ldev] FE.KEYID = 1
6,315,080 UART: [ldev] Erasing FE.KEYID = 1
8,794,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,976 UART: [ldev] --
10,587,759 UART: [fwproc] Wait for Commands...
10,589,535 UART: [fwproc] Recv command 0x46574c44
10,591,519 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,986 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,216,037 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,272 >>> mbox cmd response: success
14,548,252 UART: [afmc] ++
14,548,875 UART: [afmc] CDI.KEYID = 6
14,549,767 UART: [afmc] SUBJECT.KEYID = 7
14,550,991 UART: [afmc] AUTHORITY.KEYID = 5
17,054,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,775,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,777,857 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,793,687 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,809,769 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,825,313 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,849,457 UART: [afmc] --
18,853,757 UART: [cold-reset] --
18,857,784 UART: [state] Locking Datavault
18,863,466 UART: [state] Locking PCR0, PCR1 and PCR31
18,865,165 UART: [state] Locking ICCM
18,866,887 UART: [exit] Launching FMC @ 0x40000130
18,875,293 UART:
18,875,533 UART: Running Caliptra FMC ...
18,876,636 UART:
18,876,797 UART: [state] CFI Enabled
18,884,676 UART: [fht] FMC Alias Private Key: 7
20,650,864 UART: [art] Extend RT PCRs Done
20,652,091 UART: [art] Lock RT PCRs Done
20,654,087 UART: [art] Populate DV Done
20,659,633 UART: [fht] FMC Alias Private Key: 7
20,661,291 UART: [art] Derive CDI
20,662,106 UART: [art] Store in slot 0x4
20,704,756 UART: [art] Derive Key Pair
20,705,762 UART: [art] Store priv key in slot 0x5
23,132,508 UART: [art] Derive Key Pair - Done
23,145,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,001 UART: [art] Erasing AUTHORITY.KEYID = 7
24,853,507 UART: [art] PUB.X = 555D91702FFD54146A63A94290CD5366CAAE95749B5A9788A5D2C9A4A88FB4ECE411662DA4E118236A2272B62D20C927
24,860,747 UART: [art] PUB.Y = 7664AFD0FF6608F8A42450F9437B4D4DAAF5BC8B850C98EB8E8C2CD3E52ADFCFC56498A677F314DACFCAA14C596C2929
24,868,034 UART: [art] SIG.R = B279B77E8EA07EE3E29817997C275714F7030CF1692AB4BD27E5B6818B4E3CD881CE76A7C07F9B4491A8E2CC9501F65B
24,875,422 UART: [art] SIG.S = 579F58F36C4799B80BFBEC7AF18045F8B8D59A7E8CE343FA2FABCD671450C601DD7546CC742EEC34ECF89D31F8760642
25,855,234 UART: Caliptra RT
25,855,926 UART: [state] CFI Enabled
25,989,052 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,045,652 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,201,780 UART: [rt]cmd =0x41544d4e, len=14344
34,197,261 >>> mbox cmd response data (8 bytes)
34,197,872 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,228,508 UART: [rt]cmd =0x41545348, len=116
34,247,479 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,473 UART:
192,834 UART: Running Caliptra ROM ...
193,967 UART:
603,675 UART: [state] CFI Enabled
618,402 UART: [state] LifecycleState = Unprovisioned
620,340 UART: [state] DebugLocked = No
622,724 UART: [state] WD Timer not started. Device not locked for debugging
627,278 UART: [kat] SHA2-256
806,944 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,736 UART: [kat] ++
818,211 UART: [kat] sha1
829,806 UART: [kat] SHA2-256
832,522 UART: [kat] SHA2-384
838,450 UART: [kat] SHA2-512-ACC
840,828 UART: [kat] ECC-384
3,284,609 UART: [kat] HMAC-384Kdf
3,296,702 UART: [kat] LMS
3,773,152 UART: [kat] --
3,777,991 UART: [cold-reset] ++
3,779,069 UART: [fht] FHT @ 0x50003400
3,791,758 UART: [idev] ++
3,792,356 UART: [idev] CDI.KEYID = 6
3,793,313 UART: [idev] SUBJECT.KEYID = 7
3,794,585 UART: [idev] UDS.KEYID = 0
3,795,522 ready_for_fw is high
3,795,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,440 UART: [idev] Erasing UDS.KEYID = 0
6,270,568 UART: [idev] Sha1 KeyId Algorithm
6,293,628 UART: [idev] --
6,297,838 UART: [ldev] ++
6,298,408 UART: [ldev] CDI.KEYID = 6
6,299,319 UART: [ldev] SUBJECT.KEYID = 5
6,300,532 UART: [ldev] AUTHORITY.KEYID = 7
6,301,761 UART: [ldev] FE.KEYID = 1
6,313,866 UART: [ldev] Erasing FE.KEYID = 1
8,792,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,756 UART: [ldev] --
10,585,829 UART: [fwproc] Wait for Commands...
10,588,148 UART: [fwproc] Recv command 0x46574c44
10,590,174 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,674 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,710 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,529 >>> mbox cmd response: success
14,550,923 UART: [afmc] ++
14,551,572 UART: [afmc] CDI.KEYID = 6
14,552,492 UART: [afmc] SUBJECT.KEYID = 7
14,553,622 UART: [afmc] AUTHORITY.KEYID = 5
17,054,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,370 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,198 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,283 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,826,863 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,791 UART: [afmc] --
18,856,458 UART: [cold-reset] --
18,859,842 UART: [state] Locking Datavault
18,865,579 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,380 UART: [state] Locking ICCM
18,869,569 UART: [exit] Launching FMC @ 0x40000130
18,878,026 UART:
18,878,266 UART: Running Caliptra FMC ...
18,879,304 UART:
18,879,472 UART: [state] CFI Enabled
18,887,148 UART: [fht] FMC Alias Private Key: 7
20,653,476 UART: [art] Extend RT PCRs Done
20,654,699 UART: [art] Lock RT PCRs Done
20,656,061 UART: [art] Populate DV Done
20,661,532 UART: [fht] FMC Alias Private Key: 7
20,663,075 UART: [art] Derive CDI
20,663,896 UART: [art] Store in slot 0x4
20,706,763 UART: [art] Derive Key Pair
20,707,804 UART: [art] Store priv key in slot 0x5
23,133,963 UART: [art] Derive Key Pair - Done
23,146,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,474 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,972 UART: [art] PUB.X = 79FD03CD4C9920C155B7421C9227E56202B27CC56331F350C808FDAB50767372411127AAFE7C67BE7B0B34A0470F2AC6
24,862,215 UART: [art] PUB.Y = 298E9538AA85A3307384290AF484D7943A89AE0AD99C801D5B48A321795989BF6AAC84293305DA973430F505B6C04031
24,869,441 UART: [art] SIG.R = 7F5F93A502EE93371DAB50A58105EA2F669BC68969CB94ED66D734604B07C7C33A00FC40B80CA0FFFEE102B961F6899F
24,876,849 UART: [art] SIG.S = D864A8972DE93F2817B8A1B9504F11E40D54CFDB73577A62219554186F0528407D6855F0FE246C7105B77402D9F59674
25,855,208 UART: Caliptra RT
25,855,918 UART: [state] CFI Enabled
25,988,723 UART: [rt] RT listening for mailbox commands...
25,991,137 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,146,702 UART: [rt]cmd =0x41544d4e, len=14344
30,142,827 >>> mbox cmd response data (8 bytes)
30,143,421 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,174,313 UART: [rt]cmd =0x41545348, len=116
30,176,889 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,779,379 ready_for_fw is high
3,779,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,457,390 >>> mbox cmd response: success
18,709,600 UART:
18,710,000 UART: Running Caliptra FMC ...
18,711,123 UART:
18,711,277 UART: [state] CFI Enabled
18,719,230 UART: [fht] FMC Alias Private Key: 7
20,485,171 UART: [art] Extend RT PCRs Done
20,486,399 UART: [art] Lock RT PCRs Done
20,487,908 UART: [art] Populate DV Done
20,493,110 UART: [fht] FMC Alias Private Key: 7
20,494,762 UART: [art] Derive CDI
20,495,502 UART: [art] Store in slot 0x4
20,538,108 UART: [art] Derive Key Pair
20,539,157 UART: [art] Store priv key in slot 0x5
22,966,514 UART: [art] Derive Key Pair - Done
22,979,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,685,923 UART: [art] Erasing AUTHORITY.KEYID = 7
24,687,442 UART: [art] PUB.X = FAB22BC83423FFFDE91ABF77AC1BF71A4386CAE4000643A8DD3715C8644A289AC7CC9175016A45544DEEE10DA760308D
24,694,663 UART: [art] PUB.Y = F58D145472F0F4F4ACA48E1935F1581119EB274A102608DD7E0085E66333C178FA5CCC3A7DDCAE3F78CD58D09CD487BF
24,701,906 UART: [art] SIG.R = F80FFA431AEF01D886986DE043BD5BAE22574CBEFAAF7D14E71A66434E3142CFDB96AE7F4051AA0CB6CB3F37695D1BB0
24,709,325 UART: [art] SIG.S = F3C1AAB5DDC60A4CE5085F4F8171779D8523F81C4508E4765C2ED24D1A43B01B767D886D3C2201F7E84FB5704F1C9C92
25,688,153 UART: Caliptra RT
25,688,853 UART: [state] CFI Enabled
25,821,956 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,881,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,036,885 UART: [rt]cmd =0x41544d4e, len=14344
34,032,524 >>> mbox cmd response data (8 bytes)
34,033,107 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,064,008 UART: [rt]cmd =0x41545348, len=116
34,083,749 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,779,868 ready_for_fw is high
3,780,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,736 >>> mbox cmd response: success
18,692,375 UART:
18,692,781 UART: Running Caliptra FMC ...
18,693,983 UART:
18,694,151 UART: [state] CFI Enabled
18,701,880 UART: [fht] FMC Alias Private Key: 7
20,467,457 UART: [art] Extend RT PCRs Done
20,468,673 UART: [art] Lock RT PCRs Done
20,470,328 UART: [art] Populate DV Done
20,475,666 UART: [fht] FMC Alias Private Key: 7
20,477,373 UART: [art] Derive CDI
20,478,186 UART: [art] Store in slot 0x4
20,520,785 UART: [art] Derive Key Pair
20,521,821 UART: [art] Store priv key in slot 0x5
22,948,673 UART: [art] Derive Key Pair - Done
22,961,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,939 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,439 UART: [art] PUB.X = 3BB64D680DF51DC7819CDFD624B07A405DB16CCF0F25A734B223572756470F4DF65039B6796FE55B124C67143E509698
24,676,703 UART: [art] PUB.Y = 2BBCB06A7DB9CAEE16582B61FAF3BC1A7588F1B88224BE30214BB0C3D8600A61BA2E9A042F24DFB7E7850EA9561A1F78
24,683,977 UART: [art] SIG.R = 7FF7AD6E3827937DAB98B9C37B6DD4C89656BA1BBCB6483006116B5082EF5A3C29E57F51736DAD1D8D75D9EEE88DA0C9
24,691,384 UART: [art] SIG.S = EED42656C88814A00819AEF0BC8A4DF4C778DB012900311C4D5567B26BF0EC7B57089C1F3DBA4B5AA0FEE5C0017D6021
25,670,739 UART: Caliptra RT
25,671,435 UART: [state] CFI Enabled
25,805,143 UART: [rt] RT listening for mailbox commands...
25,807,588 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,962,925 UART: [rt]cmd =0x41544d4e, len=14344
29,958,218 >>> mbox cmd response data (8 bytes)
29,958,816 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,989,495 UART: [rt]cmd =0x41545348, len=116
29,992,185 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,114 UART:
192,487 UART: Running Caliptra ROM ...
193,598 UART:
193,741 UART: [state] CFI Enabled
263,894 UART: [state] LifecycleState = Unprovisioned
266,231 UART: [state] DebugLocked = No
267,763 UART: [state] WD Timer not started. Device not locked for debugging
271,867 UART: [kat] SHA2-256
461,768 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,581 UART: [kat] ++
473,054 UART: [kat] sha1
485,638 UART: [kat] SHA2-256
488,641 UART: [kat] SHA2-384
494,906 UART: [kat] SHA2-512-ACC
497,487 UART: [kat] ECC-384
2,949,124 UART: [kat] HMAC-384Kdf
2,972,298 UART: [kat] LMS
3,504,041 UART: [kat] --
3,510,379 UART: [cold-reset] ++
3,511,730 UART: [fht] FHT @ 0x50003400
3,522,698 UART: [idev] ++
3,523,406 UART: [idev] CDI.KEYID = 6
3,524,356 UART: [idev] SUBJECT.KEYID = 7
3,525,595 UART: [idev] UDS.KEYID = 0
3,526,487 ready_for_fw is high
3,526,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,096 UART: [idev] Erasing UDS.KEYID = 0
6,029,129 UART: [idev] Sha1 KeyId Algorithm
6,052,849 UART: [idev] --
6,057,578 UART: [ldev] ++
6,058,269 UART: [ldev] CDI.KEYID = 6
6,059,186 UART: [ldev] SUBJECT.KEYID = 5
6,060,346 UART: [ldev] AUTHORITY.KEYID = 7
6,061,576 UART: [ldev] FE.KEYID = 1
6,101,655 UART: [ldev] Erasing FE.KEYID = 1
8,606,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,007 UART: [ldev] --
10,416,382 UART: [fwproc] Wait for Commands...
10,418,828 UART: [fwproc] Recv command 0x46574c44
10,421,083 UART: [fwproc] Recv'd Img size: 118548 bytes
13,921,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,275 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,127,875 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,687,796 >>> mbox cmd response: success
14,691,752 UART: [afmc] ++
14,692,480 UART: [afmc] CDI.KEYID = 6
14,693,672 UART: [afmc] SUBJECT.KEYID = 7
14,695,160 UART: [afmc] AUTHORITY.KEYID = 5
17,235,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,412 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,528 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,681 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,589 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,696 UART: [afmc] --
19,035,560 UART: [cold-reset] --
19,038,459 UART: [state] Locking Datavault
19,044,531 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,730 UART: [state] Locking ICCM
19,049,206 UART: [exit] Launching FMC @ 0x40000130
19,057,881 UART:
19,058,124 UART: Running Caliptra FMC ...
19,059,224 UART:
19,059,394 UART: [state] CFI Enabled
19,117,164 UART: [fht] FMC Alias Private Key: 7
20,883,064 UART: [art] Extend RT PCRs Done
20,884,287 UART: [art] Lock RT PCRs Done
20,885,916 UART: [art] Populate DV Done
20,891,375 UART: [fht] FMC Alias Private Key: 7
20,892,852 UART: [art] Derive CDI
20,893,633 UART: [art] Store in slot 0x4
20,949,756 UART: [art] Derive Key Pair
20,950,792 UART: [art] Store priv key in slot 0x5
23,413,661 UART: [art] Derive Key Pair - Done
23,426,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,327 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,847 UART: [art] PUB.X = 81950CFAC076B17F99CC7E4C8DCB7436C5E58F437C89A71FD3490AFDFD57D57E75C9B9A67DF508D6213194F11FB4B986
25,148,128 UART: [art] PUB.Y = 3472A055086C84EA2C5B8C5E27425530B5880AD4150633E943CDA940C61BDAB2A95EDF44A4D30A2A21D5EE34B35F8A35
25,155,389 UART: [art] SIG.R = 4A5E4800724051331BF7AE50135A203048BC5C390105E81032087711AEF042F76331EC0B1AAFE0C8BFA3BED259BD3FED
25,162,764 UART: [art] SIG.S = 111A023E70F50C76C44856F4B9BE52575B7CBB9A303ED10BA5CD26F99012CDFD33B251B6D7F3322B9AB5DBB6C297CBC1
26,141,469 UART: Caliptra RT
26,142,160 UART: [state] CFI Enabled
26,323,149 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,381,401 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,537,028 UART: [rt]cmd =0x41544d4e, len=14344
34,532,198 >>> mbox cmd response data (8 bytes)
34,532,793 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,563,372 UART: [rt]cmd =0x41545348, len=116
34,583,187 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
192,289 UART:
192,636 UART: Running Caliptra ROM ...
193,753 UART:
193,901 UART: [state] CFI Enabled
260,901 UART: [state] LifecycleState = Unprovisioned
263,308 UART: [state] DebugLocked = No
265,908 UART: [state] WD Timer not started. Device not locked for debugging
270,808 UART: [kat] SHA2-256
460,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,443 UART: [kat] ++
471,978 UART: [kat] sha1
483,853 UART: [kat] SHA2-256
486,884 UART: [kat] SHA2-384
492,804 UART: [kat] SHA2-512-ACC
495,392 UART: [kat] ECC-384
2,945,737 UART: [kat] HMAC-384Kdf
2,970,348 UART: [kat] LMS
3,502,058 UART: [kat] --
3,507,193 UART: [cold-reset] ++
3,508,839 UART: [fht] FHT @ 0x50003400
3,520,901 UART: [idev] ++
3,521,642 UART: [idev] CDI.KEYID = 6
3,522,525 UART: [idev] SUBJECT.KEYID = 7
3,523,767 UART: [idev] UDS.KEYID = 0
3,524,690 ready_for_fw is high
3,524,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,926 UART: [idev] Erasing UDS.KEYID = 0
6,028,120 UART: [idev] Sha1 KeyId Algorithm
6,050,710 UART: [idev] --
6,055,788 UART: [ldev] ++
6,056,467 UART: [ldev] CDI.KEYID = 6
6,057,396 UART: [ldev] SUBJECT.KEYID = 5
6,058,560 UART: [ldev] AUTHORITY.KEYID = 7
6,059,787 UART: [ldev] FE.KEYID = 1
6,099,006 UART: [ldev] Erasing FE.KEYID = 1
8,606,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,834 UART: [ldev] --
10,412,752 UART: [fwproc] Wait for Commands...
10,415,823 UART: [fwproc] Recv command 0x46574c44
10,418,131 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,994 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,609 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,867 >>> mbox cmd response: success
14,682,122 UART: [afmc] ++
14,682,778 UART: [afmc] CDI.KEYID = 6
14,683,698 UART: [afmc] SUBJECT.KEYID = 7
14,684,860 UART: [afmc] AUTHORITY.KEYID = 5
17,207,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,324 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,437 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,546 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,470 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,125 UART: [afmc] --
19,011,009 UART: [cold-reset] --
19,014,883 UART: [state] Locking Datavault
19,018,088 UART: [state] Locking PCR0, PCR1 and PCR31
19,020,295 UART: [state] Locking ICCM
19,023,043 UART: [exit] Launching FMC @ 0x40000130
19,031,729 UART:
19,031,975 UART: Running Caliptra FMC ...
19,033,665 UART:
19,033,839 UART: [state] CFI Enabled
19,091,283 UART: [fht] FMC Alias Private Key: 7
20,858,072 UART: [art] Extend RT PCRs Done
20,859,271 UART: [art] Lock RT PCRs Done
20,861,029 UART: [art] Populate DV Done
20,866,491 UART: [fht] FMC Alias Private Key: 7
20,868,132 UART: [art] Derive CDI
20,868,870 UART: [art] Store in slot 0x4
20,923,867 UART: [art] Derive Key Pair
20,924,906 UART: [art] Store priv key in slot 0x5
23,387,416 UART: [art] Derive Key Pair - Done
23,400,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,113,023 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,538 UART: [art] PUB.X = 8AA9AB239FA6745B1878ABC50D826BFCEA6161746203F666D333A02F53DD753EDBDC5F182753E31C2F202A3F5F7AC11B
25,121,821 UART: [art] PUB.Y = 9960146981AFA5A69D44122D02B38163F9DC0C5816C4CA84D5632F78E69EE103EDF043016EDA13C0013A2222737DF0F9
25,129,026 UART: [art] SIG.R = A92FA26DB954E8247E94621308F13D27C397365A21C4724DE5684A43C95B427CA990ED0073A71A1D9C6EFC4736DD5D81
25,136,411 UART: [art] SIG.S = 90BA9EBD38E614C2290C4B216103D41D3F3B85F9610760CCB2AE8E145BC0525A8220CFB0E21808AB2F6A0A18153A9DEB
26,115,928 UART: Caliptra RT
26,116,638 UART: [state] CFI Enabled
26,296,229 UART: [rt] RT listening for mailbox commands...
26,298,637 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,454,160 UART: [rt]cmd =0x41544d4e, len=14344
30,449,809 >>> mbox cmd response data (8 bytes)
30,450,418 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,481,370 UART: [rt]cmd =0x41545348, len=116
30,483,875 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,438,093 ready_for_fw is high
3,438,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,202 >>> mbox cmd response: success
19,108,520 UART:
19,108,919 UART: Running Caliptra FMC ...
19,110,124 UART:
19,110,287 UART: [state] CFI Enabled
19,177,811 UART: [fht] FMC Alias Private Key: 7
20,945,092 UART: [art] Extend RT PCRs Done
20,946,330 UART: [art] Lock RT PCRs Done
20,948,075 UART: [art] Populate DV Done
20,953,563 UART: [fht] FMC Alias Private Key: 7
20,955,258 UART: [art] Derive CDI
20,956,101 UART: [art] Store in slot 0x4
21,011,789 UART: [art] Derive Key Pair
21,012,794 UART: [art] Store priv key in slot 0x5
23,475,570 UART: [art] Derive Key Pair - Done
23,488,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,773 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,285 UART: [art] PUB.X = 312F7C7D8221E0913C7CBD8648340DC4F193F43D024F320FD2521F939D42BE7B84C7FE6011633838B81276F31D54BBD7
25,209,515 UART: [art] PUB.Y = 6956FAF1E599A2646A0B195C35F18EBFAF4C8C9D2C73D49C2F8DCA15CC87FF8228F803AF8972D3CC825120D8E0E9FD80
25,216,776 UART: [art] SIG.R = 925F509094F39C9080BA4F66A950250304CDC39B647287048ADE0827B4462FA8B13C91A06759318B93DFFD34ABF7D10B
25,224,141 UART: [art] SIG.S = B14161A5F33071757E953BA4DB50993716E292D6D95E1DAE4EE2FA6BED0B6A4DE9A6730C5EF19F203593FA5D6E93E386
26,203,137 UART: Caliptra RT
26,203,828 UART: [state] CFI Enabled
26,384,153 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,442,215 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,598,119 UART: [rt]cmd =0x41544d4e, len=14344
34,593,723 >>> mbox cmd response data (8 bytes)
34,594,330 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,625,286 UART: [rt]cmd =0x41545348, len=116
34,645,267 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,417,975 ready_for_fw is high
3,418,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,805,530 >>> mbox cmd response: success
19,089,964 UART:
19,090,928 UART: Running Caliptra FMC ...
19,092,054 UART:
19,092,294 UART: [state] CFI Enabled
19,160,417 UART: [fht] FMC Alias Private Key: 7
20,926,347 UART: [art] Extend RT PCRs Done
20,927,553 UART: [art] Lock RT PCRs Done
20,929,018 UART: [art] Populate DV Done
20,934,527 UART: [fht] FMC Alias Private Key: 7
20,936,174 UART: [art] Derive CDI
20,936,989 UART: [art] Store in slot 0x4
20,992,724 UART: [art] Derive Key Pair
20,993,729 UART: [art] Store priv key in slot 0x5
23,456,572 UART: [art] Derive Key Pair - Done
23,469,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,181,869 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,630 UART: [art] PUB.X = 0F0A6F3E4C6570426EEF3BD4D4E2CA82CD2BA58812A6072F38873A773811F16340199D339838B20B17DDCB970CC13CB0
25,190,625 UART: [art] PUB.Y = B2E4A86CD04A50B3539C2294787AF392A9EBC6C58AAD7F4F459E339790BBC211998D3B581CFB9E568B1C681C78919ECD
25,197,885 UART: [art] SIG.R = DE563E6638207DD2778727F2AF583F4AA512DAD0A8F10CEEBAF4CF17C04D9C370D551EDB1A6604BFD718D7EEB4682C12
25,205,305 UART: [art] SIG.S = 552A9AE67920FE8488978AD85F2FFA68FBC0523B3C1D51BB984E3695CB608EE875A49D16C6E144EBA185C75AB1C1454D
26,184,979 UART: Caliptra RT
26,185,733 UART: [state] CFI Enabled
26,366,305 UART: [rt] RT listening for mailbox commands...
26,368,739 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,524,303 UART: [rt]cmd =0x41544d4e, len=14344
30,520,439 >>> mbox cmd response data (8 bytes)
30,521,626 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,552,137 UART: [rt]cmd =0x41545348, len=116
30,554,257 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.69s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,542 UART:
192,925 UART: Running Caliptra ROM ...
194,062 UART:
603,873 UART: [state] CFI Enabled
617,409 UART: [state] LifecycleState = Unprovisioned
619,807 UART: [state] DebugLocked = No
622,119 UART: [state] WD Timer not started. Device not locked for debugging
626,453 UART: [kat] SHA2-256
816,343 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,157 UART: [kat] ++
827,800 UART: [kat] sha1
839,394 UART: [kat] SHA2-256
842,435 UART: [kat] SHA2-384
849,284 UART: [kat] SHA2-512-ACC
851,871 UART: [kat] ECC-384
3,293,756 UART: [kat] HMAC-384Kdf
3,306,842 UART: [kat] LMS
3,838,633 UART: [kat] --
3,843,101 UART: [cold-reset] ++
3,845,394 UART: [fht] FHT @ 0x50003400
3,857,751 UART: [idev] ++
3,858,434 UART: [idev] CDI.KEYID = 6
3,859,369 UART: [idev] SUBJECT.KEYID = 7
3,860,548 UART: [idev] UDS.KEYID = 0
3,861,485 ready_for_fw is high
3,861,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,647 UART: [idev] Erasing UDS.KEYID = 0
6,338,705 UART: [idev] Sha1 KeyId Algorithm
6,361,856 UART: [idev] --
6,365,500 UART: [ldev] ++
6,366,184 UART: [ldev] CDI.KEYID = 6
6,367,122 UART: [ldev] SUBJECT.KEYID = 5
6,368,225 UART: [ldev] AUTHORITY.KEYID = 7
6,369,512 UART: [ldev] FE.KEYID = 1
6,380,859 UART: [ldev] Erasing FE.KEYID = 1
8,860,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,550 UART: [ldev] --
10,651,366 UART: [fwproc] Wait for Commands...
10,654,380 UART: [fwproc] Recv command 0x46574c44
10,656,701 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,482 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,099 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,890 >>> mbox cmd response: success
14,912,266 UART: [afmc] ++
14,912,985 UART: [afmc] CDI.KEYID = 6
14,914,239 UART: [afmc] SUBJECT.KEYID = 7
14,915,688 UART: [afmc] AUTHORITY.KEYID = 5
17,420,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,989 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,091 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,174,242 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,111 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,818 UART: [afmc] --
19,216,519 UART: [cold-reset] --
19,221,125 UART: [state] Locking Datavault
19,226,508 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,671 UART: [state] Locking ICCM
19,231,217 UART: [exit] Launching FMC @ 0x40000130
19,239,911 UART:
19,240,146 UART: Running Caliptra FMC ...
19,241,248 UART:
19,241,413 UART: [state] CFI Enabled
19,249,299 UART: [fht] FMC Alias Private Key: 7
21,015,932 UART: [art] Extend RT PCRs Done
21,017,196 UART: [art] Lock RT PCRs Done
21,019,131 UART: [art] Populate DV Done
21,024,661 UART: [fht] FMC Alias Private Key: 7
21,026,368 UART: [art] Derive CDI
21,027,189 UART: [art] Store in slot 0x4
21,069,958 UART: [art] Derive Key Pair
21,071,014 UART: [art] Store priv key in slot 0x5
23,498,450 UART: [art] Derive Key Pair - Done
23,511,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,970 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,476 UART: [art] PUB.X = DE682719E5ABC9DC0C5D84B1F31A48CA4BB3F36D28A64B1ED308707F37F381FED394668B74948C633B93D7CDF368DC9B
25,226,744 UART: [art] PUB.Y = A8A068EE813EEC60A1F87A45B9C3DC1B10E613E7FEA1A69B4C9FC6F92649C1759DB79DCF0E57AF4DE663C59DF1590AB3
25,234,053 UART: [art] SIG.R = B2CD4B9986518AF7C4F24CB6C1782D591049E06BB3B840BDE75B4E997BF37963D8A867C9C8B62CBB0FD38AE797E1B0A0
25,241,473 UART: [art] SIG.S = 27017D496208604A8CA34E89117F2E3440AFC1CEAEBB5871A60D0F6D0459C2EF5F03A73A275EB71324357DB8A1FF81DC
26,220,437 UART: Caliptra RT
26,221,127 UART: [state] CFI Enabled
26,352,887 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,416,973 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,572,583 UART: [rt]cmd =0x41544d4e, len=14344
34,568,061 >>> mbox cmd response data (8 bytes)
34,568,683 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,599,501 UART: [rt]cmd =0x41545348, len=116
34,619,617 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,480 UART:
192,886 UART: Running Caliptra ROM ...
194,081 UART:
603,799 UART: [state] CFI Enabled
618,991 UART: [state] LifecycleState = Unprovisioned
621,376 UART: [state] DebugLocked = No
623,610 UART: [state] WD Timer not started. Device not locked for debugging
627,574 UART: [kat] SHA2-256
817,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,277 UART: [kat] ++
828,886 UART: [kat] sha1
839,061 UART: [kat] SHA2-256
842,149 UART: [kat] SHA2-384
847,786 UART: [kat] SHA2-512-ACC
850,372 UART: [kat] ECC-384
3,294,286 UART: [kat] HMAC-384Kdf
3,308,146 UART: [kat] LMS
3,839,980 UART: [kat] --
3,845,185 UART: [cold-reset] ++
3,847,055 UART: [fht] FHT @ 0x50003400
3,857,687 UART: [idev] ++
3,858,398 UART: [idev] CDI.KEYID = 6
3,859,311 UART: [idev] SUBJECT.KEYID = 7
3,860,561 UART: [idev] UDS.KEYID = 0
3,861,492 ready_for_fw is high
3,861,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,641 UART: [idev] Erasing UDS.KEYID = 0
6,343,729 UART: [idev] Sha1 KeyId Algorithm
6,366,899 UART: [idev] --
6,370,300 UART: [ldev] ++
6,370,877 UART: [ldev] CDI.KEYID = 6
6,371,793 UART: [ldev] SUBJECT.KEYID = 5
6,372,956 UART: [ldev] AUTHORITY.KEYID = 7
6,374,208 UART: [ldev] FE.KEYID = 1
6,385,671 UART: [ldev] Erasing FE.KEYID = 1
8,866,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,497 UART: [ldev] --
10,656,117 UART: [fwproc] Wait for Commands...
10,657,832 UART: [fwproc] Recv command 0x46574c44
10,660,096 UART: [fwproc] Recv'd Img size: 118548 bytes
14,160,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,240,306 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,363,966 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,924,703 >>> mbox cmd response: success
14,928,798 UART: [afmc] ++
14,929,445 UART: [afmc] CDI.KEYID = 6
14,930,373 UART: [afmc] SUBJECT.KEYID = 7
14,931,488 UART: [afmc] AUTHORITY.KEYID = 5
17,437,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,157,005 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,158,924 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,174,025 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,189,201 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,204,077 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,227,902 UART: [afmc] --
19,230,796 UART: [cold-reset] --
19,234,673 UART: [state] Locking Datavault
19,241,042 UART: [state] Locking PCR0, PCR1 and PCR31
19,243,206 UART: [state] Locking ICCM
19,244,861 UART: [exit] Launching FMC @ 0x40000130
19,253,551 UART:
19,253,793 UART: Running Caliptra FMC ...
19,254,896 UART:
19,255,057 UART: [state] CFI Enabled
19,263,221 UART: [fht] FMC Alias Private Key: 7
21,029,508 UART: [art] Extend RT PCRs Done
21,030,728 UART: [art] Lock RT PCRs Done
21,032,632 UART: [art] Populate DV Done
21,038,051 UART: [fht] FMC Alias Private Key: 7
21,039,758 UART: [art] Derive CDI
21,040,578 UART: [art] Store in slot 0x4
21,083,395 UART: [art] Derive Key Pair
21,084,404 UART: [art] Store priv key in slot 0x5
23,510,889 UART: [art] Derive Key Pair - Done
23,523,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,230,692 UART: [art] Erasing AUTHORITY.KEYID = 7
25,232,198 UART: [art] PUB.X = 24476B175AB4647128EB789B7634859A673485ACD7F22265DD9399E32C6D63FA933952FCB79CB55038C74DDB3F605DF3
25,239,412 UART: [art] PUB.Y = 1B13DE001041AF255BC18C9DF656EE4FF421CF9CE8A25013291EDB87D24D49B201B1724EE504B84DACADDFD73AEA1C45
25,246,721 UART: [art] SIG.R = BE3D3F561ADDCEE2DA6ABC87272DFA1ED40869EC2A903BC35F338076B05C0BB4EFA153FFDC57DA08314C74525E234AAB
25,254,145 UART: [art] SIG.S = 7B3BA38CB4312B443B6AFE206A9E2783B0A9CBB80F44E7FF17CE64EFA8628BEE59760F5179201AD297AF8F296427C83C
26,232,389 UART: Caliptra RT
26,233,102 UART: [state] CFI Enabled
26,365,255 UART: [rt] RT listening for mailbox commands...
26,367,664 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,523,085 UART: [rt]cmd =0x41544d4e, len=14344
30,519,163 >>> mbox cmd response data (8 bytes)
30,519,771 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,550,517 UART: [rt]cmd =0x41545348, len=116
30,552,907 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,757,015 ready_for_fw is high
3,757,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,048,865 >>> mbox cmd response: success
19,299,031 UART:
19,299,479 UART: Running Caliptra FMC ...
19,300,612 UART:
19,300,788 UART: [state] CFI Enabled
19,308,332 UART: [fht] FMC Alias Private Key: 7
21,074,480 UART: [art] Extend RT PCRs Done
21,075,713 UART: [art] Lock RT PCRs Done
21,077,254 UART: [art] Populate DV Done
21,082,582 UART: [fht] FMC Alias Private Key: 7
21,084,132 UART: [art] Derive CDI
21,084,956 UART: [art] Store in slot 0x4
21,127,625 UART: [art] Derive Key Pair
21,128,678 UART: [art] Store priv key in slot 0x5
23,555,100 UART: [art] Derive Key Pair - Done
23,567,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,274,041 UART: [art] Erasing AUTHORITY.KEYID = 7
25,275,582 UART: [art] PUB.X = D7AE6ADA18959B6AC89494A88D2AA959C82E76D6B09E43FDECC2018C2987C029A9F06B8CD63DE1FBEFF0A9D7ECC73FA8
25,282,875 UART: [art] PUB.Y = B9CEE95980D1E26A628DD742AB14E1A607A72B9FB8B4D2F66D85F23211985F9A0B82F4108440FE2149E866C8729B64B8
25,290,106 UART: [art] SIG.R = E28C83555D4E04EA558841650E21B313B3AFFD334001485D939D3D844C08BB146FC693ABD518EB5640187CE202CBEE01
25,297,509 UART: [art] SIG.S = 3C2EE9A3D648DD8C6D1313D8125DFB5B5CF1506A0ABC0F95499EC245757999E3DCD53EF5AA48CF97ECB2E47B0056BED2
26,276,234 UART: Caliptra RT
26,276,948 UART: [state] CFI Enabled
26,409,643 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,480,232 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,635,963 UART: [rt]cmd =0x41544d4e, len=14344
34,631,588 >>> mbox cmd response data (8 bytes)
34,632,694 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,663,690 UART: [rt]cmd =0x41545348, len=116
34,683,478 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,758,475 ready_for_fw is high
3,758,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,115 >>> mbox cmd response: success
19,293,767 UART:
19,294,198 UART: Running Caliptra FMC ...
19,295,336 UART:
19,295,492 UART: [state] CFI Enabled
19,303,639 UART: [fht] FMC Alias Private Key: 7
21,070,267 UART: [art] Extend RT PCRs Done
21,071,507 UART: [art] Lock RT PCRs Done
21,073,421 UART: [art] Populate DV Done
21,079,000 UART: [fht] FMC Alias Private Key: 7
21,080,560 UART: [art] Derive CDI
21,081,387 UART: [art] Store in slot 0x4
21,124,044 UART: [art] Derive Key Pair
21,125,051 UART: [art] Store priv key in slot 0x5
23,552,148 UART: [art] Derive Key Pair - Done
23,564,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,343 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,853 UART: [art] PUB.X = D99011A3B8E596080313C8527D18E17B812E0524ED58941DCB9F4CE4804F1E187557D0D0BE352F1A93DE6AED9789295F
25,280,093 UART: [art] PUB.Y = 5B21B00AEFA9DF8E8E884A57C69D9866611177960B9071BFAA0D94E2FC8AAD75275C1E99BEF304DF6185F97CC65B31F8
25,287,328 UART: [art] SIG.R = DDEB163C455D1D3237E1F5877FD23B8E18F6F2489FA97FBC778D1E88B1F30C78800C594D9AC4E12D70E328E720632801
25,294,731 UART: [art] SIG.S = 366F4F6DA19354B6009C76A433A61D98427560B8B065E00DBACAA45439291D77E9A2715DA27ED5DDBD7ADDF9236B6049
26,273,521 UART: Caliptra RT
26,274,225 UART: [state] CFI Enabled
26,407,856 UART: [rt] RT listening for mailbox commands...
26,410,287 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,565,699 UART: [rt]cmd =0x41544d4e, len=14344
30,561,658 >>> mbox cmd response data (8 bytes)
30,562,274 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,592,974 UART: [rt]cmd =0x41545348, len=116
30,595,593 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,475 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,087 UART: [kat] SHA2-256
882,018 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,133 UART: [kat] ++
886,285 UART: [kat] sha1
890,553 UART: [kat] SHA2-256
892,491 UART: [kat] SHA2-384
895,058 UART: [kat] SHA2-512-ACC
896,959 UART: [kat] ECC-384
902,432 UART: [kat] HMAC-384Kdf
907,066 UART: [kat] LMS
1,475,262 UART: [kat] --
1,476,169 UART: [cold-reset] ++
1,476,683 UART: [fht] Storing FHT @ 0x50003400
1,479,422 UART: [idev] ++
1,479,590 UART: [idev] CDI.KEYID = 6
1,479,950 UART: [idev] SUBJECT.KEYID = 7
1,480,374 UART: [idev] UDS.KEYID = 0
1,480,719 ready_for_fw is high
1,480,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,330 UART: [idev] Erasing UDS.KEYID = 0
1,504,972 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,646 UART: [idev] --
1,514,783 UART: [ldev] ++
1,514,951 UART: [ldev] CDI.KEYID = 6
1,515,314 UART: [ldev] SUBJECT.KEYID = 5
1,515,740 UART: [ldev] AUTHORITY.KEYID = 7
1,516,203 UART: [ldev] FE.KEYID = 1
1,521,337 UART: [ldev] Erasing FE.KEYID = 1
1,546,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,780 UART: [ldev] --
1,586,133 UART: [fwproc] Waiting for Commands...
1,586,886 UART: [fwproc] Received command 0x46574c44
1,587,677 UART: [fwproc] Received Image of size 118548 bytes
2,932,679 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,781 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,999 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,210 >>> mbox cmd response: success
3,132,260 UART: [afmc] ++
3,132,428 UART: [afmc] CDI.KEYID = 6
3,132,790 UART: [afmc] SUBJECT.KEYID = 7
3,133,215 UART: [afmc] AUTHORITY.KEYID = 5
3,168,016 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,178 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,958 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,667 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,550 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,233 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,039 UART: [afmc] --
3,211,069 UART: [cold-reset] --
3,212,039 UART: [state] Locking Datavault
3,213,104 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,708 UART: [state] Locking ICCM
3,214,366 UART: [exit] Launching FMC @ 0x40000130
3,219,696 UART:
3,219,712 UART: Running Caliptra FMC ...
3,220,120 UART:
3,220,174 UART: [state] CFI Enabled
3,230,872 UART: [fht] FMC Alias Private Key: 7
3,349,468 UART: [art] Extend RT PCRs Done
3,349,896 UART: [art] Lock RT PCRs Done
3,351,652 UART: [art] Populate DV Done
3,360,183 UART: [fht] FMC Alias Private Key: 7
3,361,327 UART: [art] Derive CDI
3,361,607 UART: [art] Store in slot 0x4
3,447,335 UART: [art] Derive Key Pair
3,447,695 UART: [art] Store priv key in slot 0x5
3,461,228 UART: [art] Derive Key Pair - Done
3,476,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,576 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,341 UART: [art] PUB.X = CE0B3CAEC587E1E0B05CBE652A0789DE08A85C20333FB589770EF9CDA6387E055A6401EAD49EF607E8A49CA045919A05
3,499,099 UART: [art] PUB.Y = 78B9227FC4F0E52390916762EB50B37EB10CC9CB9D7FD1D144C5B8FBE46AADB5D1EEF1AC150D34B517CA73E7E568B0B1
3,506,063 UART: [art] SIG.R = 3FA941F6D4B269967A12762DCAEC5D8431A1A4AB80DE142B67C1129618A09DD28B2C8709C6EB8736844742C7BDB382E3
3,512,834 UART: [art] SIG.S = C858290D00E33048E3280F6EF9C9B37B70FAE4DF77C877FA7CF151D87666F45CD7D14195ADD24953A9D419013583326E
3,536,725 UART: Caliptra RT
3,536,976 UART: [state] CFI Enabled
3,657,222 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,892 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,968 UART: [rt]cmd =0x41544d4e, len=14344
4,090,719 >>> mbox cmd response data (8 bytes)
4,090,720 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,767 UART: [rt]cmd =0x41545348, len=116
4,143,332 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,624 UART: [state] LifecycleState = Unprovisioned
86,279 UART: [state] DebugLocked = No
86,873 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,553 UART: [kat] SHA2-256
882,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,599 UART: [kat] ++
886,751 UART: [kat] sha1
890,947 UART: [kat] SHA2-256
892,885 UART: [kat] SHA2-384
895,582 UART: [kat] SHA2-512-ACC
897,483 UART: [kat] ECC-384
902,954 UART: [kat] HMAC-384Kdf
907,518 UART: [kat] LMS
1,475,714 UART: [kat] --
1,476,641 UART: [cold-reset] ++
1,477,003 UART: [fht] Storing FHT @ 0x50003400
1,479,764 UART: [idev] ++
1,479,932 UART: [idev] CDI.KEYID = 6
1,480,292 UART: [idev] SUBJECT.KEYID = 7
1,480,716 UART: [idev] UDS.KEYID = 0
1,481,061 ready_for_fw is high
1,481,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,596 UART: [idev] Erasing UDS.KEYID = 0
1,504,910 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,466 UART: [idev] --
1,514,533 UART: [ldev] ++
1,514,701 UART: [ldev] CDI.KEYID = 6
1,515,064 UART: [ldev] SUBJECT.KEYID = 5
1,515,490 UART: [ldev] AUTHORITY.KEYID = 7
1,515,953 UART: [ldev] FE.KEYID = 1
1,521,245 UART: [ldev] Erasing FE.KEYID = 1
1,546,202 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,184 UART: [ldev] --
1,585,485 UART: [fwproc] Waiting for Commands...
1,586,162 UART: [fwproc] Received command 0x46574c44
1,586,953 UART: [fwproc] Received Image of size 118548 bytes
2,932,339 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,161 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,379 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,644 >>> mbox cmd response: success
3,132,746 UART: [afmc] ++
3,132,914 UART: [afmc] CDI.KEYID = 6
3,133,276 UART: [afmc] SUBJECT.KEYID = 7
3,133,701 UART: [afmc] AUTHORITY.KEYID = 5
3,168,722 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,090 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,870 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,579 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,462 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,145 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,021 UART: [afmc] --
3,212,135 UART: [cold-reset] --
3,212,907 UART: [state] Locking Datavault
3,214,180 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,784 UART: [state] Locking ICCM
3,215,430 UART: [exit] Launching FMC @ 0x40000130
3,220,760 UART:
3,220,776 UART: Running Caliptra FMC ...
3,221,184 UART:
3,221,238 UART: [state] CFI Enabled
3,232,112 UART: [fht] FMC Alias Private Key: 7
3,351,450 UART: [art] Extend RT PCRs Done
3,351,878 UART: [art] Lock RT PCRs Done
3,353,400 UART: [art] Populate DV Done
3,361,635 UART: [fht] FMC Alias Private Key: 7
3,362,811 UART: [art] Derive CDI
3,363,091 UART: [art] Store in slot 0x4
3,449,011 UART: [art] Derive Key Pair
3,449,371 UART: [art] Store priv key in slot 0x5
3,462,786 UART: [art] Derive Key Pair - Done
3,477,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,791 UART: [art] PUB.X = 1161A17BBB79EB045C0857612CE727182200053EF1F90FBD9C3241C19B0650064E980430E9E3CF5CE0547A4F23B1747D
3,500,514 UART: [art] PUB.Y = 9AB6A50BFC7F82165CB4CA3C3D867563278CE4DF384AAE421DB261B3718AA573606524BC46179272007B90BB329BACA0
3,507,445 UART: [art] SIG.R = 9AE7D48A2F1AA20B857A0E9DDC5130C9D7C27B9FAA8A8A6C2904BB6B72E838584CD7D4B7A287A58FA0C1D2226087DE2A
3,514,224 UART: [art] SIG.S = 305271E51460461244BDDAFD30FAA04A1AE955D5BC8F5EBAC15EEB0E04507C4EA3A75105816118356AD308B4DDBE2DD5
3,538,226 UART: Caliptra RT
3,538,477 UART: [state] CFI Enabled
3,657,787 UART: [rt] RT listening for mailbox commands...
3,658,457 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,377 UART: [rt]cmd =0x41544d4e, len=14344
4,091,127 >>> mbox cmd response data (8 bytes)
4,091,128 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,099 UART: [rt]cmd =0x41545348, len=116
4,123,164 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,477 ready_for_fw is high
1,361,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,446 >>> mbox cmd response: success
3,041,977 UART:
3,041,993 UART: Running Caliptra FMC ...
3,042,401 UART:
3,042,455 UART: [state] CFI Enabled
3,052,633 UART: [fht] FMC Alias Private Key: 7
3,172,053 UART: [art] Extend RT PCRs Done
3,172,481 UART: [art] Lock RT PCRs Done
3,173,859 UART: [art] Populate DV Done
3,182,160 UART: [fht] FMC Alias Private Key: 7
3,183,334 UART: [art] Derive CDI
3,183,614 UART: [art] Store in slot 0x4
3,269,292 UART: [art] Derive Key Pair
3,269,652 UART: [art] Store priv key in slot 0x5
3,282,717 UART: [art] Derive Key Pair - Done
3,297,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,280 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,045 UART: [art] PUB.X = A5FB0CEA7184053CAFD6D633C2E43B905A48F0C2594875E686967A4AB5E7C45AD7480ECF7FD9D1CEB2F0483D81803405
3,320,813 UART: [art] PUB.Y = C25118BEC0D9A08A57173235F107EFECD3200D224E44B1E6FBA77589E041B51BAE873C5AF996B8C1DFDDA3EAB924156D
3,327,773 UART: [art] SIG.R = 8E06F3F775419BA3E069BB39C00B23FDA47A06179BCFB1EB017057F28102537EEA6F140DEA0B49887964CDDCE2E87768
3,334,530 UART: [art] SIG.S = 74E1DF1F84A642E1C984508232DB4F7C57CA727A9F5792DE8B8EE96350857C50BC79305F46158027F840F6083D37F6A6
3,358,457 UART: Caliptra RT
3,358,708 UART: [state] CFI Enabled
3,479,008 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,479,678 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,478 UART: [rt]cmd =0x41544d4e, len=14344
3,912,335 >>> mbox cmd response data (8 bytes)
3,912,336 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,533 UART: [rt]cmd =0x41545348, len=116
3,964,378 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,815 ready_for_fw is high
1,362,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,096 >>> mbox cmd response: success
3,042,065 UART:
3,042,081 UART: Running Caliptra FMC ...
3,042,489 UART:
3,042,543 UART: [state] CFI Enabled
3,052,859 UART: [fht] FMC Alias Private Key: 7
3,171,745 UART: [art] Extend RT PCRs Done
3,172,173 UART: [art] Lock RT PCRs Done
3,173,815 UART: [art] Populate DV Done
3,182,020 UART: [fht] FMC Alias Private Key: 7
3,183,000 UART: [art] Derive CDI
3,183,280 UART: [art] Store in slot 0x4
3,268,714 UART: [art] Derive Key Pair
3,269,074 UART: [art] Store priv key in slot 0x5
3,282,181 UART: [art] Derive Key Pair - Done
3,296,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,648 UART: [art] PUB.X = DECBEC9C5D20D64BDD9ED9C9B9543777D3256708D4132DADAF25DC38960F096E155945F47FF4A2C036B84553F64ED189
3,320,419 UART: [art] PUB.Y = FB4799B013FF9EE8C6D3C0CC09F24D541DD63ACAD351AC5D1EF14116E234C86EFE6E9B23778FC88BAB8697E510E6E392
3,327,384 UART: [art] SIG.R = 302111759BA29BCBC340633C0368F9C1D982BAFF6C77A9319AFFBCDC9BAB66A66A31187B4511529B5B143B9F8EDF88B8
3,334,163 UART: [art] SIG.S = 88C5CC4CEB37254B3AB2ED6359F51E716F51B82520950E611BAC4536FFECD19BAEEFA1C3FFF0FB6F311FD1BD6F08EED4
3,358,573 UART: Caliptra RT
3,358,824 UART: [state] CFI Enabled
3,479,028 UART: [rt] RT listening for mailbox commands...
3,479,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,922 UART: [rt]cmd =0x41544d4e, len=14344
3,913,082 >>> mbox cmd response data (8 bytes)
3,913,083 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,136 UART: [rt]cmd =0x41545348, len=116
3,945,033 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,875 UART: [state] LifecycleState = Unprovisioned
86,530 UART: [state] DebugLocked = No
87,098 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,800 UART: [kat] SHA2-256
882,731 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,846 UART: [kat] ++
886,998 UART: [kat] sha1
891,392 UART: [kat] SHA2-256
893,330 UART: [kat] SHA2-384
896,315 UART: [kat] SHA2-512-ACC
898,216 UART: [kat] ECC-384
903,791 UART: [kat] HMAC-384Kdf
908,483 UART: [kat] LMS
1,476,679 UART: [kat] --
1,477,724 UART: [cold-reset] ++
1,478,190 UART: [fht] Storing FHT @ 0x50003400
1,481,037 UART: [idev] ++
1,481,205 UART: [idev] CDI.KEYID = 6
1,481,565 UART: [idev] SUBJECT.KEYID = 7
1,481,989 UART: [idev] UDS.KEYID = 0
1,482,334 ready_for_fw is high
1,482,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,823 UART: [idev] Erasing UDS.KEYID = 0
1,507,227 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,805 UART: [idev] --
1,516,834 UART: [ldev] ++
1,517,002 UART: [ldev] CDI.KEYID = 6
1,517,365 UART: [ldev] SUBJECT.KEYID = 5
1,517,791 UART: [ldev] AUTHORITY.KEYID = 7
1,518,254 UART: [ldev] FE.KEYID = 1
1,523,574 UART: [ldev] Erasing FE.KEYID = 1
1,549,123 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,967 UART: [ldev] --
1,588,284 UART: [fwproc] Waiting for Commands...
1,589,001 UART: [fwproc] Received command 0x46574c44
1,589,792 UART: [fwproc] Received Image of size 118548 bytes
2,934,922 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,508 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,726 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,134,075 >>> mbox cmd response: success
3,135,229 UART: [afmc] ++
3,135,397 UART: [afmc] CDI.KEYID = 6
3,135,759 UART: [afmc] SUBJECT.KEYID = 7
3,136,184 UART: [afmc] AUTHORITY.KEYID = 5
3,171,407 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,919 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,188,699 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,194,408 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,200,291 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,974 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,880 UART: [afmc] --
3,215,008 UART: [cold-reset] --
3,216,030 UART: [state] Locking Datavault
3,217,043 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,647 UART: [state] Locking ICCM
3,218,075 UART: [exit] Launching FMC @ 0x40000130
3,223,405 UART:
3,223,421 UART: Running Caliptra FMC ...
3,223,829 UART:
3,223,972 UART: [state] CFI Enabled
3,234,456 UART: [fht] FMC Alias Private Key: 7
3,353,854 UART: [art] Extend RT PCRs Done
3,354,282 UART: [art] Lock RT PCRs Done
3,355,540 UART: [art] Populate DV Done
3,363,795 UART: [fht] FMC Alias Private Key: 7
3,364,745 UART: [art] Derive CDI
3,365,025 UART: [art] Store in slot 0x4
3,450,685 UART: [art] Derive Key Pair
3,451,045 UART: [art] Store priv key in slot 0x5
3,464,132 UART: [art] Derive Key Pair - Done
3,478,975 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,335 UART: [art] PUB.X = 31C7B0375610B0740CEB4E4F00B7D15755BA85737EDC2D5275EF77AB61CCD1800703F17ED8420669BE5CE1DA0522E8B2
3,502,074 UART: [art] PUB.Y = A00184735D1B9D12003B136C1EF8BBFA5FE985A9DB2F96C1C820FDDF98DDFDB0D10CC13091C0A8B2D40D27FB6E499754
3,509,011 UART: [art] SIG.R = 1D11EBD1D4B51703D1CC604800ACBFAE8FAABFB9490A29F7E1750568F09810D8247C0E9801BCFEB640112D401B22CA80
3,515,756 UART: [art] SIG.S = 2B9DD1DF98EF04AF351E11F49CDA5C8A91591B9A946225EEDE0FB2A83282EAF63E3315BE8549241B800FF59235EF2FA3
3,539,909 UART: Caliptra RT
3,540,252 UART: [state] CFI Enabled
3,660,897 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,661,567 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,784,715 UART: [rt]cmd =0x41544d4e, len=14344
4,094,112 >>> mbox cmd response data (8 bytes)
4,094,113 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,244 UART: [rt]cmd =0x41545348, len=116
4,146,321 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
86,886 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,530 UART: [kat] SHA2-256
882,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,576 UART: [kat] ++
886,728 UART: [kat] sha1
891,068 UART: [kat] SHA2-256
893,006 UART: [kat] SHA2-384
895,679 UART: [kat] SHA2-512-ACC
897,580 UART: [kat] ECC-384
903,481 UART: [kat] HMAC-384Kdf
908,095 UART: [kat] LMS
1,476,291 UART: [kat] --
1,477,014 UART: [cold-reset] ++
1,477,394 UART: [fht] Storing FHT @ 0x50003400
1,480,279 UART: [idev] ++
1,480,447 UART: [idev] CDI.KEYID = 6
1,480,807 UART: [idev] SUBJECT.KEYID = 7
1,481,231 UART: [idev] UDS.KEYID = 0
1,481,576 ready_for_fw is high
1,481,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,201 UART: [idev] Erasing UDS.KEYID = 0
1,505,913 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,459 UART: [idev] --
1,515,550 UART: [ldev] ++
1,515,718 UART: [ldev] CDI.KEYID = 6
1,516,081 UART: [ldev] SUBJECT.KEYID = 5
1,516,507 UART: [ldev] AUTHORITY.KEYID = 7
1,516,970 UART: [ldev] FE.KEYID = 1
1,522,016 UART: [ldev] Erasing FE.KEYID = 1
1,547,687 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,659 UART: [ldev] --
1,586,970 UART: [fwproc] Waiting for Commands...
1,587,789 UART: [fwproc] Received command 0x46574c44
1,588,580 UART: [fwproc] Received Image of size 118548 bytes
2,934,272 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,944 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,162 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,539 >>> mbox cmd response: success
3,133,547 UART: [afmc] ++
3,133,715 UART: [afmc] CDI.KEYID = 6
3,134,077 UART: [afmc] SUBJECT.KEYID = 7
3,134,502 UART: [afmc] AUTHORITY.KEYID = 5
3,169,471 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,993 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,773 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,482 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,365 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,048 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,796 UART: [afmc] --
3,212,686 UART: [cold-reset] --
3,213,540 UART: [state] Locking Datavault
3,214,513 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,117 UART: [state] Locking ICCM
3,215,621 UART: [exit] Launching FMC @ 0x40000130
3,220,951 UART:
3,220,967 UART: Running Caliptra FMC ...
3,221,375 UART:
3,221,518 UART: [state] CFI Enabled
3,231,874 UART: [fht] FMC Alias Private Key: 7
3,350,566 UART: [art] Extend RT PCRs Done
3,350,994 UART: [art] Lock RT PCRs Done
3,352,426 UART: [art] Populate DV Done
3,360,653 UART: [fht] FMC Alias Private Key: 7
3,361,655 UART: [art] Derive CDI
3,361,935 UART: [art] Store in slot 0x4
3,447,757 UART: [art] Derive Key Pair
3,448,117 UART: [art] Store priv key in slot 0x5
3,461,614 UART: [art] Derive Key Pair - Done
3,476,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,566 UART: [art] PUB.X = C401619A316D44E1E51EA8749E3CDFEA4C21C903866ADEB4799BCCE14DE78E888A353F3B1382E65224ABB3C31A55A427
3,499,340 UART: [art] PUB.Y = EC70FAE84ED2F230B866003B2441656557F497C2CD78270DB5517746A1F3B99B78ED72578705DB11AEE83334F5F63951
3,506,258 UART: [art] SIG.R = EAF1F017CCF9C6BA20F6DB2E2F706A4D15DB4A197C39AA775525AFA02D0DAFD97E6A74A2BB700BE947ACA57F4172CCAC
3,513,052 UART: [art] SIG.S = F19E84A8BF17F590A0026904C3EC9DD9D6BC34CC6BE29AC6D1CF304B595555AA64FF3D66875174D448C71FE24A480A50
3,536,683 UART: Caliptra RT
3,537,026 UART: [state] CFI Enabled
3,656,721 UART: [rt] RT listening for mailbox commands...
3,657,391 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,507 UART: [rt]cmd =0x41544d4e, len=14344
4,090,187 >>> mbox cmd response data (8 bytes)
4,090,188 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,241 UART: [rt]cmd =0x41545348, len=116
4,122,156 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,010 ready_for_fw is high
1,363,010 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,533 >>> mbox cmd response: success
3,042,278 UART:
3,042,294 UART: Running Caliptra FMC ...
3,042,702 UART:
3,042,845 UART: [state] CFI Enabled
3,053,425 UART: [fht] FMC Alias Private Key: 7
3,173,081 UART: [art] Extend RT PCRs Done
3,173,509 UART: [art] Lock RT PCRs Done
3,174,833 UART: [art] Populate DV Done
3,182,786 UART: [fht] FMC Alias Private Key: 7
3,183,788 UART: [art] Derive CDI
3,184,068 UART: [art] Store in slot 0x4
3,269,790 UART: [art] Derive Key Pair
3,270,150 UART: [art] Store priv key in slot 0x5
3,283,437 UART: [art] Derive Key Pair - Done
3,298,262 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,731 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,496 UART: [art] PUB.X = 875B1ADCD21BD46C523890508E27122F4F9B3A8D0EC9DDEEF770225F0323DC0B8B91D8820F045EE48CB0FF586184916B
3,321,259 UART: [art] PUB.Y = 19D06861CCB39716C025EFDA6D83F77EDA8B51451B0770221168C126F260AC3E3365DA2EDF05F6B3F63CB0FAD429F496
3,328,211 UART: [art] SIG.R = B9E5A63BDDB43BEE8B61F3049F8CEE0B7B726D8037409B1FFD5FC74BDE9DBDA4401ED1BA23381A97D86076337357C217
3,334,991 UART: [art] SIG.S = 6AA8D68228061CDFF9004B435307B4B353BD2432FAE0FE053632B42B8D07B36B22563686D680854ECEBEF43AE8E8032A
3,358,716 UART: Caliptra RT
3,359,059 UART: [state] CFI Enabled
3,478,763 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,479,433 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,505 UART: [rt]cmd =0x41544d4e, len=14344
3,912,642 >>> mbox cmd response data (8 bytes)
3,912,643 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,826 UART: [rt]cmd =0x41545348, len=116
3,965,165 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,138 ready_for_fw is high
1,363,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,505 >>> mbox cmd response: success
3,044,052 UART:
3,044,068 UART: Running Caliptra FMC ...
3,044,476 UART:
3,044,619 UART: [state] CFI Enabled
3,055,127 UART: [fht] FMC Alias Private Key: 7
3,174,157 UART: [art] Extend RT PCRs Done
3,174,585 UART: [art] Lock RT PCRs Done
3,176,487 UART: [art] Populate DV Done
3,184,776 UART: [fht] FMC Alias Private Key: 7
3,185,934 UART: [art] Derive CDI
3,186,214 UART: [art] Store in slot 0x4
3,271,852 UART: [art] Derive Key Pair
3,272,212 UART: [art] Store priv key in slot 0x5
3,285,167 UART: [art] Derive Key Pair - Done
3,300,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,043 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,808 UART: [art] PUB.X = DB003324108DD48242B18E623397335C1C2C3CE3CAA7393D844EE0FFC5CCF6CCACB24C7ABC60E3F7A6817A4BAE84BEE9
3,323,578 UART: [art] PUB.Y = 9AA1377BF54D9027074C15582718C5F0BDB987876D6AEAE3393596FEB635BD0DDC8560C9FBCF12BF9DAA1B21C4683C22
3,330,534 UART: [art] SIG.R = 52328C9B824983ABEDA8D25360C8A762E17F6B483F9FE3FD5FD9E3D3E908200474A4A188E58B7EFE7573AAE40512E216
3,337,301 UART: [art] SIG.S = D72F45D013824771DA87DB64BF3937AF6358539310E814A6AFE701E774E1B130EAB5128CE363D40FA5E575E00D295C7B
3,361,004 UART: Caliptra RT
3,361,347 UART: [state] CFI Enabled
3,482,305 UART: [rt] RT listening for mailbox commands...
3,482,975 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,027 UART: [rt]cmd =0x41544d4e, len=14344
3,916,201 >>> mbox cmd response data (8 bytes)
3,916,202 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,946,173 UART: [rt]cmd =0x41545348, len=116
3,948,116 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,731 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
891,446 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,621 UART: [kat] LMS
1,168,933 UART: [kat] --
1,170,052 UART: [cold-reset] ++
1,170,426 UART: [fht] FHT @ 0x50003400
1,173,274 UART: [idev] ++
1,173,442 UART: [idev] CDI.KEYID = 6
1,173,803 UART: [idev] SUBJECT.KEYID = 7
1,174,228 UART: [idev] UDS.KEYID = 0
1,174,574 ready_for_fw is high
1,174,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,101 UART: [idev] Erasing UDS.KEYID = 0
1,199,407 UART: [idev] Sha1 KeyId Algorithm
1,208,225 UART: [idev] --
1,209,114 UART: [ldev] ++
1,209,282 UART: [ldev] CDI.KEYID = 6
1,209,646 UART: [ldev] SUBJECT.KEYID = 5
1,210,073 UART: [ldev] AUTHORITY.KEYID = 7
1,210,536 UART: [ldev] FE.KEYID = 1
1,215,890 UART: [ldev] Erasing FE.KEYID = 1
1,242,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,882 UART: [ldev] --
1,281,203 UART: [fwproc] Wait for Commands...
1,281,772 UART: [fwproc] Recv command 0x46574c44
1,282,505 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,149 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,324 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,483 >>> mbox cmd response: success
2,826,517 UART: [afmc] ++
2,826,685 UART: [afmc] CDI.KEYID = 6
2,827,048 UART: [afmc] SUBJECT.KEYID = 7
2,827,474 UART: [afmc] AUTHORITY.KEYID = 5
2,862,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,629 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,339 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,220 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,921 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,580 UART: [afmc] --
2,905,523 UART: [cold-reset] --
2,906,191 UART: [state] Locking Datavault
2,907,448 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,052 UART: [state] Locking ICCM
2,908,714 UART: [exit] Launching FMC @ 0x40000130
2,914,044 UART:
2,914,060 UART: Running Caliptra FMC ...
2,914,468 UART:
2,914,522 UART: [state] CFI Enabled
2,924,914 UART: [fht] FMC Alias Private Key: 7
3,043,662 UART: [art] Extend RT PCRs Done
3,044,090 UART: [art] Lock RT PCRs Done
3,045,488 UART: [art] Populate DV Done
3,053,569 UART: [fht] FMC Alias Private Key: 7
3,054,641 UART: [art] Derive CDI
3,054,921 UART: [art] Store in slot 0x4
3,140,848 UART: [art] Derive Key Pair
3,141,208 UART: [art] Store priv key in slot 0x5
3,154,204 UART: [art] Derive Key Pair - Done
3,168,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,509 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,274 UART: [art] PUB.X = FC66E476AC6D5A62326D6C097E9DB792B2B13A668D8662F39C6D3D6ED840C0DDC0EC9880B307FC819219FB89E271FA9F
3,192,050 UART: [art] PUB.Y = EC2D9DB25CA7F01A7EC8F7DC536EBEF703C3BF9579A47B8067303E2F6E546C0E928B8FFBC71E11717110BB13FAE1BA46
3,199,014 UART: [art] SIG.R = F78F82C27383BDE528CF042EAAD15F49FC1AD2749D5DB1860EB18F95F5377939A294188FED3031C95064EDCDC2072E5F
3,205,785 UART: [art] SIG.S = 2E7B3E5BDFD9957D55164A632287D9324FB6AF974AA741B7A48844D083F9764C9EC6DC0F1A23D6D127DECAF58B6D6A6B
3,229,470 UART: Caliptra RT
3,229,721 UART: [state] CFI Enabled
3,349,756 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,350,426 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,754 UART: [rt]cmd =0x41544d4e, len=14344
3,783,521 >>> mbox cmd response data (8 bytes)
3,783,522 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,683 UART: [rt]cmd =0x41545348, len=116
3,835,846 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,736 UART: [kat] SHA2-256
901,676 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
915,771 UART: [kat] HMAC-384Kdf
920,423 UART: [kat] LMS
1,168,735 UART: [kat] --
1,169,564 UART: [cold-reset] ++
1,170,118 UART: [fht] FHT @ 0x50003400
1,172,840 UART: [idev] ++
1,173,008 UART: [idev] CDI.KEYID = 6
1,173,369 UART: [idev] SUBJECT.KEYID = 7
1,173,794 UART: [idev] UDS.KEYID = 0
1,174,140 ready_for_fw is high
1,174,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,621 UART: [idev] Erasing UDS.KEYID = 0
1,198,067 UART: [idev] Sha1 KeyId Algorithm
1,206,897 UART: [idev] --
1,207,970 UART: [ldev] ++
1,208,138 UART: [ldev] CDI.KEYID = 6
1,208,502 UART: [ldev] SUBJECT.KEYID = 5
1,208,929 UART: [ldev] AUTHORITY.KEYID = 7
1,209,392 UART: [ldev] FE.KEYID = 1
1,214,500 UART: [ldev] Erasing FE.KEYID = 1
1,240,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,332 UART: [ldev] --
1,279,749 UART: [fwproc] Wait for Commands...
1,280,564 UART: [fwproc] Recv command 0x46574c44
1,281,297 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,323 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,498 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,653 >>> mbox cmd response: success
2,824,699 UART: [afmc] ++
2,824,867 UART: [afmc] CDI.KEYID = 6
2,825,230 UART: [afmc] SUBJECT.KEYID = 7
2,825,656 UART: [afmc] AUTHORITY.KEYID = 5
2,861,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,255 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,965 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,846 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,547 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,220 UART: [afmc] --
2,904,121 UART: [cold-reset] --
2,904,883 UART: [state] Locking Datavault
2,905,836 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,440 UART: [state] Locking ICCM
2,906,886 UART: [exit] Launching FMC @ 0x40000130
2,912,216 UART:
2,912,232 UART: Running Caliptra FMC ...
2,912,640 UART:
2,912,694 UART: [state] CFI Enabled
2,923,262 UART: [fht] FMC Alias Private Key: 7
3,042,372 UART: [art] Extend RT PCRs Done
3,042,800 UART: [art] Lock RT PCRs Done
3,043,988 UART: [art] Populate DV Done
3,052,141 UART: [fht] FMC Alias Private Key: 7
3,053,307 UART: [art] Derive CDI
3,053,587 UART: [art] Store in slot 0x4
3,139,560 UART: [art] Derive Key Pair
3,139,920 UART: [art] Store priv key in slot 0x5
3,153,092 UART: [art] Derive Key Pair - Done
3,168,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,275 UART: [art] PUB.X = D78DFB83BDD27040F507FBC37BED73C687A6BD6C078EF9C10ED303A9BA6608999B99E381D965EEEDAE173039888B4344
3,191,042 UART: [art] PUB.Y = 924058F193501F94E039B26698FDFC20B5E34FD3988FAB53D89C562F7CB089B9B0B00671A81E4CC823EFB8E30D79E66F
3,197,992 UART: [art] SIG.R = B93D5260B08C24E1401CB56CF49AD0406866BE92876DB7264E3C299BA3002F55792257720768DD2C9C32666DF87AA79B
3,204,733 UART: [art] SIG.S = EE9B834847F03C18A1897304A04B2C66816C8787DC48E5F0A49795754BA1F86DC98073E94B86654D5F48DA2FC47F9926
3,228,616 UART: Caliptra RT
3,228,867 UART: [state] CFI Enabled
3,347,659 UART: [rt] RT listening for mailbox commands...
3,348,329 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,545 UART: [rt]cmd =0x41544d4e, len=14344
3,781,935 >>> mbox cmd response data (8 bytes)
3,781,936 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,811,799 UART: [rt]cmd =0x41545348, len=116
3,813,720 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,354 ready_for_fw is high
1,059,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,226 >>> mbox cmd response: success
2,740,717 UART:
2,740,733 UART: Running Caliptra FMC ...
2,741,141 UART:
2,741,195 UART: [state] CFI Enabled
2,751,773 UART: [fht] FMC Alias Private Key: 7
2,870,969 UART: [art] Extend RT PCRs Done
2,871,397 UART: [art] Lock RT PCRs Done
2,872,807 UART: [art] Populate DV Done
2,880,994 UART: [fht] FMC Alias Private Key: 7
2,881,964 UART: [art] Derive CDI
2,882,244 UART: [art] Store in slot 0x4
2,968,209 UART: [art] Derive Key Pair
2,968,569 UART: [art] Store priv key in slot 0x5
2,982,025 UART: [art] Derive Key Pair - Done
2,996,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,816 UART: [art] PUB.X = 169466A12D76397FD44BCE97AD635F692FC152156AAA94C0FFFBA775DE4037FAD470373E15C59502B3AC0F5198A1CAA2
3,019,590 UART: [art] PUB.Y = 7081891B79A239BF195473C318BC354298F30B1A9073295D3F5E1F1669947C2A3C728FBED624B27C823B3893D0A7B70B
3,026,528 UART: [art] SIG.R = 24BE3617735E77B51B4B9ADC6FCB364B726D9A93D466E096B31CF8C4B04BCD8C88E244C9AB438BED5BF59F9A7296A9FA
3,033,316 UART: [art] SIG.S = 360EEB31A4428DD687D59D4CEA3E9DB3D0EB5CC14C548E0A828C473A155EE6C12F08F2EF17D036DF7A2A42AF06E5AE79
3,057,112 UART: Caliptra RT
3,057,363 UART: [state] CFI Enabled
3,177,419 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,089 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,015 UART: [rt]cmd =0x41544d4e, len=14344
3,610,726 >>> mbox cmd response data (8 bytes)
3,610,727 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,878 UART: [rt]cmd =0x41545348, len=116
3,663,021 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,464 ready_for_fw is high
1,058,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,220 >>> mbox cmd response: success
2,739,735 UART:
2,739,751 UART: Running Caliptra FMC ...
2,740,159 UART:
2,740,213 UART: [state] CFI Enabled
2,750,527 UART: [fht] FMC Alias Private Key: 7
2,869,557 UART: [art] Extend RT PCRs Done
2,869,985 UART: [art] Lock RT PCRs Done
2,871,699 UART: [art] Populate DV Done
2,879,788 UART: [fht] FMC Alias Private Key: 7
2,880,718 UART: [art] Derive CDI
2,880,998 UART: [art] Store in slot 0x4
2,967,063 UART: [art] Derive Key Pair
2,967,423 UART: [art] Store priv key in slot 0x5
2,980,463 UART: [art] Derive Key Pair - Done
2,995,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,771 UART: [art] PUB.X = 0421A83B1C7415CA6563B328DB0B60D58499A053EF5B0D80CAB0E8F73318ED8C3D9588C36DC6257A7241437171208693
3,018,526 UART: [art] PUB.Y = 14CA3998650878F76D0E4BE85E697BA2F1F5F50E469C847D1DB327D54BE9C4B9676DA8411BB3753DD9E09F611F45B5F4
3,025,473 UART: [art] SIG.R = F42FC43C2DCCA7E9B7DC5E5FB40E7F97418318AD10C79912370ED3130C67CD9B6491AD4F5E1FE1FD7C942E06A4804FD8
3,032,247 UART: [art] SIG.S = F1E774E2CD9254DEF878624965C47040E6BB440A4CBD38C18CB70D4E67F0F5DEE6480034C75C2FCC36191E9068DDEF52
3,055,849 UART: Caliptra RT
3,056,100 UART: [state] CFI Enabled
3,175,328 UART: [rt] RT listening for mailbox commands...
3,175,998 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,852 UART: [rt]cmd =0x41544d4e, len=14344
3,608,928 >>> mbox cmd response data (8 bytes)
3,608,929 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,916 UART: [rt]cmd =0x41545348, len=116
3,640,885 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,995 UART: [state] LifecycleState = Unprovisioned
85,650 UART: [state] DebugLocked = No
86,334 UART: [state] WD Timer not started. Device not locked for debugging
87,609 UART: [kat] SHA2-256
891,159 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,170 UART: [kat] SHA2-512-ACC
906,071 UART: [kat] ECC-384
916,026 UART: [kat] HMAC-384Kdf
920,522 UART: [kat] LMS
1,168,834 UART: [kat] --
1,169,633 UART: [cold-reset] ++
1,169,965 UART: [fht] FHT @ 0x50003400
1,172,627 UART: [idev] ++
1,172,795 UART: [idev] CDI.KEYID = 6
1,173,156 UART: [idev] SUBJECT.KEYID = 7
1,173,581 UART: [idev] UDS.KEYID = 0
1,173,927 ready_for_fw is high
1,173,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,894 UART: [idev] Erasing UDS.KEYID = 0
1,199,236 UART: [idev] Sha1 KeyId Algorithm
1,208,108 UART: [idev] --
1,209,239 UART: [ldev] ++
1,209,407 UART: [ldev] CDI.KEYID = 6
1,209,771 UART: [ldev] SUBJECT.KEYID = 5
1,210,198 UART: [ldev] AUTHORITY.KEYID = 7
1,210,661 UART: [ldev] FE.KEYID = 1
1,215,647 UART: [ldev] Erasing FE.KEYID = 1
1,241,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,521 UART: [ldev] --
1,280,754 UART: [fwproc] Wait for Commands...
1,281,387 UART: [fwproc] Recv command 0x46574c44
1,282,120 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,512 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,687 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,046 >>> mbox cmd response: success
2,826,192 UART: [afmc] ++
2,826,360 UART: [afmc] CDI.KEYID = 6
2,826,723 UART: [afmc] SUBJECT.KEYID = 7
2,827,149 UART: [afmc] AUTHORITY.KEYID = 5
2,862,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,158 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,868 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,749 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,450 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,023 UART: [afmc] --
2,905,998 UART: [cold-reset] --
2,906,744 UART: [state] Locking Datavault
2,907,665 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,269 UART: [state] Locking ICCM
2,908,865 UART: [exit] Launching FMC @ 0x40000130
2,914,195 UART:
2,914,211 UART: Running Caliptra FMC ...
2,914,619 UART:
2,914,762 UART: [state] CFI Enabled
2,925,456 UART: [fht] FMC Alias Private Key: 7
3,044,928 UART: [art] Extend RT PCRs Done
3,045,356 UART: [art] Lock RT PCRs Done
3,046,758 UART: [art] Populate DV Done
3,055,195 UART: [fht] FMC Alias Private Key: 7
3,056,289 UART: [art] Derive CDI
3,056,569 UART: [art] Store in slot 0x4
3,142,240 UART: [art] Derive Key Pair
3,142,600 UART: [art] Store priv key in slot 0x5
3,155,984 UART: [art] Derive Key Pair - Done
3,170,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,345 UART: [art] PUB.X = 66845B088A2040A8DCDF1E05F9DFE775431E7A4E055FAD3942EF42908520CEDEDDC55CEBCDAE9A1645FA527CBD53E57A
3,194,128 UART: [art] PUB.Y = DFC4D2BA95643CF3864B16C4008F770E7F1A15370A98D1A86C73A8F541C3C9591F8FCFC524435DF74D6859963EDD2A9D
3,201,058 UART: [art] SIG.R = C3E08E2C58B54EA13E6406CEC633854631489F3D670E4A0B486F1FB414DC90F7256C7C0B184735B005F40C7CABC6EA98
3,207,816 UART: [art] SIG.S = C8109B75C614D953B2E67DC6A3CB3CE0F4BAE1EF58AAAC9C69FE4C02FD9ADEC85B7CE68AD1EE7F7E0CD3FA6E51B2455D
3,231,644 UART: Caliptra RT
3,231,987 UART: [state] CFI Enabled
3,350,353 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,023 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,101 UART: [rt]cmd =0x41544d4e, len=14344
3,784,168 >>> mbox cmd response data (8 bytes)
3,784,169 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,162 UART: [rt]cmd =0x41545348, len=116
3,836,737 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,583 UART: [kat] SHA2-256
891,133 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,042 UART: [kat] SHA2-512-ACC
905,943 UART: [kat] ECC-384
915,938 UART: [kat] HMAC-384Kdf
920,350 UART: [kat] LMS
1,168,662 UART: [kat] --
1,169,433 UART: [cold-reset] ++
1,169,943 UART: [fht] FHT @ 0x50003400
1,172,599 UART: [idev] ++
1,172,767 UART: [idev] CDI.KEYID = 6
1,173,128 UART: [idev] SUBJECT.KEYID = 7
1,173,553 UART: [idev] UDS.KEYID = 0
1,173,899 ready_for_fw is high
1,173,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,644 UART: [idev] Erasing UDS.KEYID = 0
1,198,614 UART: [idev] Sha1 KeyId Algorithm
1,207,594 UART: [idev] --
1,208,619 UART: [ldev] ++
1,208,787 UART: [ldev] CDI.KEYID = 6
1,209,151 UART: [ldev] SUBJECT.KEYID = 5
1,209,578 UART: [ldev] AUTHORITY.KEYID = 7
1,210,041 UART: [ldev] FE.KEYID = 1
1,215,573 UART: [ldev] Erasing FE.KEYID = 1
1,242,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,361 UART: [ldev] --
1,281,742 UART: [fwproc] Wait for Commands...
1,282,409 UART: [fwproc] Recv command 0x46574c44
1,283,142 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,354 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,529 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,850 >>> mbox cmd response: success
2,828,086 UART: [afmc] ++
2,828,254 UART: [afmc] CDI.KEYID = 6
2,828,617 UART: [afmc] SUBJECT.KEYID = 7
2,829,043 UART: [afmc] AUTHORITY.KEYID = 5
2,864,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,478 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,188 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,069 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,770 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,693 UART: [afmc] --
2,908,646 UART: [cold-reset] --
2,909,606 UART: [state] Locking Datavault
2,910,923 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,527 UART: [state] Locking ICCM
2,912,185 UART: [exit] Launching FMC @ 0x40000130
2,917,515 UART:
2,917,531 UART: Running Caliptra FMC ...
2,917,939 UART:
2,918,082 UART: [state] CFI Enabled
2,928,544 UART: [fht] FMC Alias Private Key: 7
3,047,184 UART: [art] Extend RT PCRs Done
3,047,612 UART: [art] Lock RT PCRs Done
3,049,214 UART: [art] Populate DV Done
3,057,321 UART: [fht] FMC Alias Private Key: 7
3,058,457 UART: [art] Derive CDI
3,058,737 UART: [art] Store in slot 0x4
3,144,512 UART: [art] Derive Key Pair
3,144,872 UART: [art] Store priv key in slot 0x5
3,158,446 UART: [art] Derive Key Pair - Done
3,173,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,704 UART: [art] PUB.X = 10743A8AE6565D70B3C45729301006A5FC1D0265737BAD38406BED0011B0AE8FD1D5847A1407E4C59B433A61B9D1BB28
3,196,443 UART: [art] PUB.Y = FD0AF8463657F41C10AE002DA1C4F704AAA2CBE67A8F5C5B931CF6D88583CFD47717EC2C8A0EC08DFA06D0135C780D66
3,203,374 UART: [art] SIG.R = 3B264C236AF276A47E36B1313145A42A1E17DAC89F1DE3AD0DEAD6AD6424DAC658723C2D4C82C425DEC256A52C48A05C
3,210,155 UART: [art] SIG.S = 4CDC853EC506835735DEBD33334EB24AFAFCFA5FAE06D2568ADE6B90BFCFFD265F4C0E40AAAF84A55F6B105C666EC6FC
3,233,516 UART: Caliptra RT
3,233,859 UART: [state] CFI Enabled
3,353,429 UART: [rt] RT listening for mailbox commands...
3,354,099 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,015 UART: [rt]cmd =0x41544d4e, len=14344
3,787,075 >>> mbox cmd response data (8 bytes)
3,787,076 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,435 UART: [rt]cmd =0x41545348, len=116
3,819,174 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,801 ready_for_fw is high
1,059,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,033 >>> mbox cmd response: success
2,741,766 UART:
2,741,782 UART: Running Caliptra FMC ...
2,742,190 UART:
2,742,333 UART: [state] CFI Enabled
2,753,111 UART: [fht] FMC Alias Private Key: 7
2,871,849 UART: [art] Extend RT PCRs Done
2,872,277 UART: [art] Lock RT PCRs Done
2,873,621 UART: [art] Populate DV Done
2,882,028 UART: [fht] FMC Alias Private Key: 7
2,882,962 UART: [art] Derive CDI
2,883,242 UART: [art] Store in slot 0x4
2,969,245 UART: [art] Derive Key Pair
2,969,605 UART: [art] Store priv key in slot 0x5
2,983,143 UART: [art] Derive Key Pair - Done
2,998,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,625 UART: [art] PUB.X = 6125B65C7DCDE66EB62F1031CBD8F865CD1C271054010F0B221F147EA7C09AE844B4EB5FABA2787B8B790137732E88F0
3,021,391 UART: [art] PUB.Y = F577DA1C457F4ABC08F92AF110B12A5401E09D548F034586FCEA2E266B35170B4028937B8A684FE48E7292C57559E020
3,028,327 UART: [art] SIG.R = 9A926953F970BE9A9A8A7464FDD4B271D590BBC7FA42EB8160FE6C47E552A01477A1B382ACBD36B56CBB83CE637421A4
3,035,109 UART: [art] SIG.S = D4BCCA86C765FDC8BEB6D7117ED831C3CC66D366BF717CFC0DFEEB74C2BC43F142C94259CE1B050E427C5DE0954B1374
3,060,070 UART: Caliptra RT
3,060,413 UART: [state] CFI Enabled
3,179,923 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,180,593 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,655 UART: [rt]cmd =0x41544d4e, len=14344
3,613,110 >>> mbox cmd response data (8 bytes)
3,613,111 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,282 UART: [rt]cmd =0x41545348, len=116
3,665,397 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,641 ready_for_fw is high
1,059,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,731 >>> mbox cmd response: success
2,742,738 UART:
2,742,754 UART: Running Caliptra FMC ...
2,743,162 UART:
2,743,305 UART: [state] CFI Enabled
2,754,089 UART: [fht] FMC Alias Private Key: 7
2,873,653 UART: [art] Extend RT PCRs Done
2,874,081 UART: [art] Lock RT PCRs Done
2,875,653 UART: [art] Populate DV Done
2,883,916 UART: [fht] FMC Alias Private Key: 7
2,884,916 UART: [art] Derive CDI
2,885,196 UART: [art] Store in slot 0x4
2,970,919 UART: [art] Derive Key Pair
2,971,279 UART: [art] Store priv key in slot 0x5
2,984,761 UART: [art] Derive Key Pair - Done
2,999,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,653 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,418 UART: [art] PUB.X = 94EFBAD2E8086CEC8E5163430702A13554D24233DE1A1BDDD55C2E6C1FB2BE4EF239D5CB0BED58C035D41490D3FDC651
3,022,194 UART: [art] PUB.Y = C75E5B4444FAE57A3CAE870957D1FF4970908DDD3D6777C098A12C2A6D6797B4D292EF9D68D1B857F8AAB477EE801050
3,029,149 UART: [art] SIG.R = 1F56C8C8625CA190F0FA76A064AE97B632D541282652A241E9667C9DC1261E33D74E70AE07828DBE5E27A8F624B87CA9
3,035,918 UART: [art] SIG.S = C3279ABF3D2CF42CC61BB8E3339D5997F8F901F0DF62E66B22391535A6CA7BB1B0E41A313545BE039E5DCCB284E33752
3,059,598 UART: Caliptra RT
3,059,941 UART: [state] CFI Enabled
3,180,026 UART: [rt] RT listening for mailbox commands...
3,180,696 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,566 UART: [rt]cmd =0x41544d4e, len=14344
3,613,904 >>> mbox cmd response data (8 bytes)
3,613,905 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,892 UART: [rt]cmd =0x41545348, len=116
3,645,905 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
893,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,545 UART: [kat] ++
897,697 UART: [kat] sha1
901,919 UART: [kat] SHA2-256
903,859 UART: [kat] SHA2-384
906,454 UART: [kat] SHA2-512-ACC
908,355 UART: [kat] ECC-384
918,184 UART: [kat] HMAC-384Kdf
922,560 UART: [kat] LMS
1,170,888 UART: [kat] --
1,171,529 UART: [cold-reset] ++
1,172,091 UART: [fht] FHT @ 0x50003400
1,174,776 UART: [idev] ++
1,174,944 UART: [idev] CDI.KEYID = 6
1,175,304 UART: [idev] SUBJECT.KEYID = 7
1,175,728 UART: [idev] UDS.KEYID = 0
1,176,073 ready_for_fw is high
1,176,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,952 UART: [idev] Erasing UDS.KEYID = 0
1,201,291 UART: [idev] Sha1 KeyId Algorithm
1,209,749 UART: [idev] --
1,210,693 UART: [ldev] ++
1,210,861 UART: [ldev] CDI.KEYID = 6
1,211,224 UART: [ldev] SUBJECT.KEYID = 5
1,211,650 UART: [ldev] AUTHORITY.KEYID = 7
1,212,113 UART: [ldev] FE.KEYID = 1
1,217,401 UART: [ldev] Erasing FE.KEYID = 1
1,243,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,589 UART: [ldev] --
1,283,098 UART: [fwproc] Wait for Commands...
1,283,830 UART: [fwproc] Recv command 0x46574c44
1,284,558 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,902 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,072 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,337 >>> mbox cmd response: success
2,828,549 UART: [afmc] ++
2,828,717 UART: [afmc] CDI.KEYID = 6
2,829,079 UART: [afmc] SUBJECT.KEYID = 7
2,829,504 UART: [afmc] AUTHORITY.KEYID = 5
2,864,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,540 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,288 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,997 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,880 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,581 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,525 UART: [afmc] --
2,908,443 UART: [cold-reset] --
2,909,159 UART: [state] Locking Datavault
2,910,442 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,046 UART: [state] Locking ICCM
2,911,546 UART: [exit] Launching FMC @ 0x40000130
2,916,876 UART:
2,916,892 UART: Running Caliptra FMC ...
2,917,300 UART:
2,917,354 UART: [state] CFI Enabled
2,927,798 UART: [fht] FMC Alias Private Key: 7
3,047,224 UART: [art] Extend RT PCRs Done
3,047,652 UART: [art] Lock RT PCRs Done
3,049,170 UART: [art] Populate DV Done
3,057,721 UART: [fht] FMC Alias Private Key: 7
3,058,781 UART: [art] Derive CDI
3,059,061 UART: [art] Store in slot 0x4
3,144,940 UART: [art] Derive Key Pair
3,145,300 UART: [art] Store priv key in slot 0x5
3,158,552 UART: [art] Derive Key Pair - Done
3,173,135 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,782 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,547 UART: [art] PUB.X = 97208A0478310FFAD6934AD055FA8D7042779F798F8B6AC104EE4C7322BE8975451F5F18E8720FC24188E063BA869245
3,196,299 UART: [art] PUB.Y = 130122C119585827EAFED1F2BE75C7B0188FCF63CE5C8A42828004EB39150B50DACF3A0A71F556242D1CD51458C31FD9
3,203,243 UART: [art] SIG.R = 773687A1559D35A53900DA674A07D6CD57F1963331917A8B61F98F0B5F8119FB2C3CD4E77D8E45DB189A1B7FB3473314
3,209,983 UART: [art] SIG.S = B68DAC2371496DFEC6B7DA15FD38FCC700C7EEEA17B1353B46F5E8FCB8EF4A98F82E880093E7218667883F574127670C
3,233,606 UART: Caliptra RT
3,233,857 UART: [state] CFI Enabled
3,353,350 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,354,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,230 UART: [rt]cmd =0x41544d4e, len=14344
3,787,145 >>> mbox cmd response data (8 bytes)
3,787,146 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,029 UART: [rt]cmd =0x41545348, len=116
3,838,800 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,374 UART: [kat] SHA2-256
893,024 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,149 UART: [kat] ++
897,301 UART: [kat] sha1
901,619 UART: [kat] SHA2-256
903,559 UART: [kat] SHA2-384
906,562 UART: [kat] SHA2-512-ACC
908,463 UART: [kat] ECC-384
918,208 UART: [kat] HMAC-384Kdf
922,652 UART: [kat] LMS
1,170,980 UART: [kat] --
1,172,107 UART: [cold-reset] ++
1,172,501 UART: [fht] FHT @ 0x50003400
1,175,132 UART: [idev] ++
1,175,300 UART: [idev] CDI.KEYID = 6
1,175,660 UART: [idev] SUBJECT.KEYID = 7
1,176,084 UART: [idev] UDS.KEYID = 0
1,176,429 ready_for_fw is high
1,176,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,998 UART: [idev] Erasing UDS.KEYID = 0
1,201,261 UART: [idev] Sha1 KeyId Algorithm
1,209,733 UART: [idev] --
1,210,967 UART: [ldev] ++
1,211,135 UART: [ldev] CDI.KEYID = 6
1,211,498 UART: [ldev] SUBJECT.KEYID = 5
1,211,924 UART: [ldev] AUTHORITY.KEYID = 7
1,212,387 UART: [ldev] FE.KEYID = 1
1,217,525 UART: [ldev] Erasing FE.KEYID = 1
1,243,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,715 UART: [ldev] --
1,283,186 UART: [fwproc] Wait for Commands...
1,283,830 UART: [fwproc] Recv command 0x46574c44
1,284,558 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,454 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,624 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,021 >>> mbox cmd response: success
2,828,143 UART: [afmc] ++
2,828,311 UART: [afmc] CDI.KEYID = 6
2,828,673 UART: [afmc] SUBJECT.KEYID = 7
2,829,098 UART: [afmc] AUTHORITY.KEYID = 5
2,864,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,396 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,105 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,988 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,689 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,759 UART: [afmc] --
2,907,655 UART: [cold-reset] --
2,908,453 UART: [state] Locking Datavault
2,909,598 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,202 UART: [state] Locking ICCM
2,910,778 UART: [exit] Launching FMC @ 0x40000130
2,916,108 UART:
2,916,124 UART: Running Caliptra FMC ...
2,916,532 UART:
2,916,586 UART: [state] CFI Enabled
2,927,108 UART: [fht] FMC Alias Private Key: 7
3,046,148 UART: [art] Extend RT PCRs Done
3,046,576 UART: [art] Lock RT PCRs Done
3,047,966 UART: [art] Populate DV Done
3,056,163 UART: [fht] FMC Alias Private Key: 7
3,057,117 UART: [art] Derive CDI
3,057,397 UART: [art] Store in slot 0x4
3,143,550 UART: [art] Derive Key Pair
3,143,910 UART: [art] Store priv key in slot 0x5
3,157,456 UART: [art] Derive Key Pair - Done
3,172,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,879 UART: [art] PUB.X = 51E950BC9E4952F56A4CCFD859DD8BFCD4AF7E7FB19BCDAEFCE77F9B0EC7E45F90F41F1B9A5F0D455A054ABB74A44F14
3,195,672 UART: [art] PUB.Y = 5A080DBEAA292468CF0DDD27670E635597E94F58F1C3C2854948DF3F143873B0450FFEFA20EE7A011B9B808502A68600
3,202,581 UART: [art] SIG.R = 48EA2937C68C25595E788E0F7A64BEC5194250113EEE2A00D38CC15BA3AF0B96D4645338C85F4293611C9C9CDF974F1B
3,209,327 UART: [art] SIG.S = 343D14CE14DBADBBE99FB4AB8A6EFBBAC206C6280E8CE8BB15AE5D03AAB45A4872376A5462D766C8C713D66E5522FA8E
3,232,736 UART: Caliptra RT
3,232,987 UART: [state] CFI Enabled
3,352,715 UART: [rt] RT listening for mailbox commands...
3,353,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,429 UART: [rt]cmd =0x41544d4e, len=14344
3,785,909 >>> mbox cmd response data (8 bytes)
3,785,910 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,005 UART: [rt]cmd =0x41545348, len=116
3,817,882 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,583 ready_for_fw is high
1,060,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,684 >>> mbox cmd response: success
2,739,649 UART:
2,739,665 UART: Running Caliptra FMC ...
2,740,073 UART:
2,740,127 UART: [state] CFI Enabled
2,750,599 UART: [fht] FMC Alias Private Key: 7
2,869,501 UART: [art] Extend RT PCRs Done
2,869,929 UART: [art] Lock RT PCRs Done
2,871,247 UART: [art] Populate DV Done
2,879,474 UART: [fht] FMC Alias Private Key: 7
2,880,624 UART: [art] Derive CDI
2,880,904 UART: [art] Store in slot 0x4
2,966,909 UART: [art] Derive Key Pair
2,967,269 UART: [art] Store priv key in slot 0x5
2,979,941 UART: [art] Derive Key Pair - Done
2,994,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,628 UART: [art] PUB.X = 33744524017A5E83029B6575E34CD4F161C61703509C4371492C25DF55A9F482031252FED4E9F6156A631A52BBA04BBD
3,018,378 UART: [art] PUB.Y = 273C31805CBC7BC4D172F488A17A8F5DF7B52181F0AC1B99A1443838596EC0600D23F4C726BB4A3B7474338C0742A6A4
3,025,322 UART: [art] SIG.R = 2D453535248C1781390D650F95529038D65BE9901A7F28EBF3DCAB4B1548B3660281A4EC4C4D51BDB67EAB360E9DF940
3,032,082 UART: [art] SIG.S = A5F48A88671122E51E235F0151C2757456CFF861A05E03E5732438002476BC2A8F0C86F7FD41E73C14A2AC4145096433
3,055,396 UART: Caliptra RT
3,055,647 UART: [state] CFI Enabled
3,174,798 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,175,468 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,400 UART: [rt]cmd =0x41544d4e, len=14344
3,608,217 >>> mbox cmd response data (8 bytes)
3,608,218 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,437 UART: [rt]cmd =0x41545348, len=116
3,660,446 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,009 ready_for_fw is high
1,060,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,970 >>> mbox cmd response: success
2,740,507 UART:
2,740,523 UART: Running Caliptra FMC ...
2,740,931 UART:
2,740,985 UART: [state] CFI Enabled
2,751,439 UART: [fht] FMC Alias Private Key: 7
2,869,361 UART: [art] Extend RT PCRs Done
2,869,789 UART: [art] Lock RT PCRs Done
2,871,469 UART: [art] Populate DV Done
2,879,638 UART: [fht] FMC Alias Private Key: 7
2,880,756 UART: [art] Derive CDI
2,881,036 UART: [art] Store in slot 0x4
2,966,515 UART: [art] Derive Key Pair
2,966,875 UART: [art] Store priv key in slot 0x5
2,980,433 UART: [art] Derive Key Pair - Done
2,995,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,511 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,276 UART: [art] PUB.X = 22778B77E8E2A25B172DABAABAB69AE1EDD6CAA6C4B0FA90EDE784660152754EF402F826805920B93046593220940B85
3,018,041 UART: [art] PUB.Y = 438491465D332B28FC23E92CDC0F0068FEF64E43AE1168103B90E8652CB26ED9E9DD4A08EF594C136A40BD827317E96D
3,024,967 UART: [art] SIG.R = 237166E4751C9B01197AE29856A8F9A11EA1CF07227E06536860F8688D6789884D07DBF7072CB8372FBA921CBB921A55
3,031,716 UART: [art] SIG.S = BE0F1A651E19C8C1E07B451614FD57D001DF538B5B3AFECAD29092D51FBB80904AB0FD3EAD79114643E630693B1AA5D9
3,055,646 UART: Caliptra RT
3,055,897 UART: [state] CFI Enabled
3,175,180 UART: [rt] RT listening for mailbox commands...
3,175,850 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,896 UART: [rt]cmd =0x41544d4e, len=14344
3,608,922 >>> mbox cmd response data (8 bytes)
3,608,923 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,984 UART: [rt]cmd =0x41545348, len=116
3,640,813 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
893,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,890 UART: [kat] ++
898,042 UART: [kat] sha1
902,298 UART: [kat] SHA2-256
904,238 UART: [kat] SHA2-384
907,017 UART: [kat] SHA2-512-ACC
908,918 UART: [kat] ECC-384
918,655 UART: [kat] HMAC-384Kdf
923,325 UART: [kat] LMS
1,171,653 UART: [kat] --
1,172,598 UART: [cold-reset] ++
1,172,924 UART: [fht] FHT @ 0x50003400
1,175,595 UART: [idev] ++
1,175,763 UART: [idev] CDI.KEYID = 6
1,176,123 UART: [idev] SUBJECT.KEYID = 7
1,176,547 UART: [idev] UDS.KEYID = 0
1,176,892 ready_for_fw is high
1,176,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,477 UART: [idev] Erasing UDS.KEYID = 0
1,201,620 UART: [idev] Sha1 KeyId Algorithm
1,210,058 UART: [idev] --
1,211,014 UART: [ldev] ++
1,211,182 UART: [ldev] CDI.KEYID = 6
1,211,545 UART: [ldev] SUBJECT.KEYID = 5
1,211,971 UART: [ldev] AUTHORITY.KEYID = 7
1,212,434 UART: [ldev] FE.KEYID = 1
1,217,686 UART: [ldev] Erasing FE.KEYID = 1
1,244,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,194 UART: [ldev] --
1,283,527 UART: [fwproc] Wait for Commands...
1,284,321 UART: [fwproc] Recv command 0x46574c44
1,285,049 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,345 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,515 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,760 >>> mbox cmd response: success
2,829,784 UART: [afmc] ++
2,829,952 UART: [afmc] CDI.KEYID = 6
2,830,314 UART: [afmc] SUBJECT.KEYID = 7
2,830,739 UART: [afmc] AUTHORITY.KEYID = 5
2,866,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,745 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,454 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,337 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,038 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,966 UART: [afmc] --
2,909,920 UART: [cold-reset] --
2,910,920 UART: [state] Locking Datavault
2,912,111 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,715 UART: [state] Locking ICCM
2,913,221 UART: [exit] Launching FMC @ 0x40000130
2,918,551 UART:
2,918,567 UART: Running Caliptra FMC ...
2,918,975 UART:
2,919,118 UART: [state] CFI Enabled
2,929,722 UART: [fht] FMC Alias Private Key: 7
3,048,834 UART: [art] Extend RT PCRs Done
3,049,262 UART: [art] Lock RT PCRs Done
3,050,750 UART: [art] Populate DV Done
3,058,925 UART: [fht] FMC Alias Private Key: 7
3,060,047 UART: [art] Derive CDI
3,060,327 UART: [art] Store in slot 0x4
3,146,222 UART: [art] Derive Key Pair
3,146,582 UART: [art] Store priv key in slot 0x5
3,160,088 UART: [art] Derive Key Pair - Done
3,175,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,918 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,683 UART: [art] PUB.X = 33CC669AF2070F35A6CD88FA23D6C0E573E4FC06A6EEE53D51341C66F7E4443F154A194547D5671ADAAACA524F3B22FF
3,198,458 UART: [art] PUB.Y = 40CC8C691CC8C3C1A5F60B2ECAF83B64D5478EE4B1B67F285AE7357F260B3ED367956F940F8D1DDDE5956792FB5FEC91
3,205,415 UART: [art] SIG.R = 80254B327B4E85E19A019A1AE24117B7E1573EA8DDE3AD9FF49FE907994A701E8F2D99005D25DC7550FC9EE52C63D0D7
3,212,165 UART: [art] SIG.S = A2184F118F9BEE12BA36C91B9016FAB3EF1F8E92E1370C21C6AD774AA7160161DADB9025739836F9768088A82D5DD464
3,235,931 UART: Caliptra RT
3,236,274 UART: [state] CFI Enabled
3,356,416 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,357,086 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,014 UART: [rt]cmd =0x41544d4e, len=14344
3,789,249 >>> mbox cmd response data (8 bytes)
3,789,250 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,373 UART: [rt]cmd =0x41545348, len=116
3,840,818 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
893,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,900 UART: [kat] ++
898,052 UART: [kat] sha1
902,486 UART: [kat] SHA2-256
904,426 UART: [kat] SHA2-384
907,341 UART: [kat] SHA2-512-ACC
909,242 UART: [kat] ECC-384
919,153 UART: [kat] HMAC-384Kdf
923,755 UART: [kat] LMS
1,172,083 UART: [kat] --
1,172,804 UART: [cold-reset] ++
1,173,282 UART: [fht] FHT @ 0x50003400
1,175,947 UART: [idev] ++
1,176,115 UART: [idev] CDI.KEYID = 6
1,176,475 UART: [idev] SUBJECT.KEYID = 7
1,176,899 UART: [idev] UDS.KEYID = 0
1,177,244 ready_for_fw is high
1,177,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,255 UART: [idev] Erasing UDS.KEYID = 0
1,202,176 UART: [idev] Sha1 KeyId Algorithm
1,210,730 UART: [idev] --
1,211,858 UART: [ldev] ++
1,212,026 UART: [ldev] CDI.KEYID = 6
1,212,389 UART: [ldev] SUBJECT.KEYID = 5
1,212,815 UART: [ldev] AUTHORITY.KEYID = 7
1,213,278 UART: [ldev] FE.KEYID = 1
1,218,580 UART: [ldev] Erasing FE.KEYID = 1
1,245,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,530 UART: [ldev] --
1,284,857 UART: [fwproc] Wait for Commands...
1,285,611 UART: [fwproc] Recv command 0x46574c44
1,286,339 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,221 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,391 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,642 >>> mbox cmd response: success
2,828,818 UART: [afmc] ++
2,828,986 UART: [afmc] CDI.KEYID = 6
2,829,348 UART: [afmc] SUBJECT.KEYID = 7
2,829,773 UART: [afmc] AUTHORITY.KEYID = 5
2,865,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,795 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,504 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,387 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,088 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,038 UART: [afmc] --
2,909,120 UART: [cold-reset] --
2,910,048 UART: [state] Locking Datavault
2,911,321 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,925 UART: [state] Locking ICCM
2,912,505 UART: [exit] Launching FMC @ 0x40000130
2,917,835 UART:
2,917,851 UART: Running Caliptra FMC ...
2,918,259 UART:
2,918,402 UART: [state] CFI Enabled
2,928,736 UART: [fht] FMC Alias Private Key: 7
3,048,106 UART: [art] Extend RT PCRs Done
3,048,534 UART: [art] Lock RT PCRs Done
3,049,930 UART: [art] Populate DV Done
3,058,281 UART: [fht] FMC Alias Private Key: 7
3,059,245 UART: [art] Derive CDI
3,059,525 UART: [art] Store in slot 0x4
3,145,154 UART: [art] Derive Key Pair
3,145,514 UART: [art] Store priv key in slot 0x5
3,158,358 UART: [art] Derive Key Pair - Done
3,173,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,253 UART: [art] PUB.X = 4A37568107D26D9F999D96ECE702750F8C8039D6B73239BB9CFB7AB617B769984442EFA8BACE1258BE28B0A84E936F34
3,196,018 UART: [art] PUB.Y = 6B5F65B75D7815E248BD0960A4C36C5C226F37C76485B02DBB25E49F07E9932A8BB1E1DAE83E7534610FE9595CDE270F
3,202,962 UART: [art] SIG.R = 876626D2E976250671263082E1C91F8E1F2721AAE937A25D79A384A4FA08CAD3CD4401B5B83BF629F823D11249AA61B8
3,209,721 UART: [art] SIG.S = 23829C10D8C36C652410440EF744ED830B188E1D232EF9258EE0B7112D29FB1FAA3D46B48101FFC0320342746A4F542E
3,234,015 UART: Caliptra RT
3,234,358 UART: [state] CFI Enabled
3,353,555 UART: [rt] RT listening for mailbox commands...
3,354,225 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,407 UART: [rt]cmd =0x41544d4e, len=14344
3,787,031 >>> mbox cmd response data (8 bytes)
3,787,032 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,971 UART: [rt]cmd =0x41545348, len=116
3,818,914 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,058 ready_for_fw is high
1,061,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,215 >>> mbox cmd response: success
2,743,330 UART:
2,743,346 UART: Running Caliptra FMC ...
2,743,754 UART:
2,743,897 UART: [state] CFI Enabled
2,754,541 UART: [fht] FMC Alias Private Key: 7
2,873,507 UART: [art] Extend RT PCRs Done
2,873,935 UART: [art] Lock RT PCRs Done
2,875,587 UART: [art] Populate DV Done
2,883,902 UART: [fht] FMC Alias Private Key: 7
2,885,030 UART: [art] Derive CDI
2,885,310 UART: [art] Store in slot 0x4
2,971,049 UART: [art] Derive Key Pair
2,971,409 UART: [art] Store priv key in slot 0x5
2,985,103 UART: [art] Derive Key Pair - Done
2,999,794 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,213 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,978 UART: [art] PUB.X = 4939F921E0858B76051A599E2AA51F88174C6EE545D7FC3C59D4B33938D7BA9D86DAB5478E43989425E075D1BFCBA972
3,022,747 UART: [art] PUB.Y = BAC25BF78B5D7967C7EA3ABF3113FDC407B3B4F9EB51C711D46738E71222013DAEDCC0E8B8FF32F569AD6E187DA62BA1
3,029,713 UART: [art] SIG.R = 4778EF73541DEAF61F2F164F0B13F4F42D35D5C6B2CE04227867C2C158A8589740985FD652E5A01A564A57DFD35295CD
3,036,479 UART: [art] SIG.S = F8EC6294E93C8CEAC0177565D439EB046C7FED5ABB3A4C2D45065BFF10BF0335A5FEE8E25349ED649E2DB3BE07C73B95
3,060,483 UART: Caliptra RT
3,060,826 UART: [state] CFI Enabled
3,180,737 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,181,407 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,593 UART: [rt]cmd =0x41544d4e, len=14344
3,614,102 >>> mbox cmd response data (8 bytes)
3,614,103 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,242 UART: [rt]cmd =0x41545348, len=116
3,666,505 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,012 ready_for_fw is high
1,061,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,853 >>> mbox cmd response: success
2,744,636 UART:
2,744,652 UART: Running Caliptra FMC ...
2,745,060 UART:
2,745,203 UART: [state] CFI Enabled
2,755,855 UART: [fht] FMC Alias Private Key: 7
2,875,323 UART: [art] Extend RT PCRs Done
2,875,751 UART: [art] Lock RT PCRs Done
2,877,225 UART: [art] Populate DV Done
2,885,178 UART: [fht] FMC Alias Private Key: 7
2,886,306 UART: [art] Derive CDI
2,886,586 UART: [art] Store in slot 0x4
2,972,569 UART: [art] Derive Key Pair
2,972,929 UART: [art] Store priv key in slot 0x5
2,985,939 UART: [art] Derive Key Pair - Done
3,001,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,352 UART: [art] PUB.X = 3F3FBE90616073F3667DD84408AE10642A6DCD7A3DD8759C7AF401319AF7B235C31818E2E3BB8CB4DA9B25FC49D6B38A
3,024,128 UART: [art] PUB.Y = 9BB882469ED5250EF72A209CB62A366115B03BB2E0E275153ED57C7D9B3EBF104A39948577D049F9272B5820499FB31F
3,031,073 UART: [art] SIG.R = C31245D6C2CE02196217D428706CEC5B9354693BCF23880CE07CAB5CD4556FB12CFD685AE64DD891941B542AA76F4A1F
3,037,845 UART: [art] SIG.S = C847ED95CEC9FA9E2A0AE4F5E7A8F5C26F0C25CB27CDA23DA3F2B8C3DA6B4312825DD6B1925B0749776A80D37B0695FE
3,061,209 UART: Caliptra RT
3,061,552 UART: [state] CFI Enabled
3,181,266 UART: [rt] RT listening for mailbox commands...
3,181,936 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,150 UART: [rt]cmd =0x41544d4e, len=14344
3,615,286 >>> mbox cmd response data (8 bytes)
3,615,287 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,645,188 UART: [rt]cmd =0x41545348, len=116
3,647,151 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
192,140 UART:
192,497 UART: Running Caliptra ROM ...
193,699 UART:
193,854 UART: [state] CFI Enabled
265,105 UART: [state] LifecycleState = Unprovisioned
267,029 UART: [state] DebugLocked = No
268,994 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,577 UART: [kat] SHA2-256
444,304 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,840 UART: [kat] ++
455,556 UART: [kat] sha1
466,093 UART: [kat] SHA2-256
468,753 UART: [kat] SHA2-384
473,820 UART: [kat] SHA2-512-ACC
476,190 UART: [kat] ECC-384
2,768,426 UART: [kat] HMAC-384Kdf
2,800,367 UART: [kat] LMS
3,990,697 UART: [kat] --
3,995,786 UART: [cold-reset] ++
3,998,145 UART: [fht] Storing FHT @ 0x50003400
4,010,615 UART: [idev] ++
4,011,263 UART: [idev] CDI.KEYID = 6
4,012,177 UART: [idev] SUBJECT.KEYID = 7
4,013,426 UART: [idev] UDS.KEYID = 0
4,014,485 ready_for_fw is high
4,014,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,785 UART: [idev] Erasing UDS.KEYID = 0
7,349,521 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,973 UART: [idev] --
7,376,454 UART: [ldev] ++
7,377,079 UART: [ldev] CDI.KEYID = 6
7,377,988 UART: [ldev] SUBJECT.KEYID = 5
7,379,257 UART: [ldev] AUTHORITY.KEYID = 7
7,380,483 UART: [ldev] FE.KEYID = 1
7,422,570 UART: [ldev] Erasing FE.KEYID = 1
10,753,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,179 UART: [ldev] --
13,115,025 UART: [fwproc] Waiting for Commands...
13,116,638 UART: [fwproc] Received command 0x46574c44
13,118,888 UART: [fwproc] Received Image of size 118548 bytes
17,224,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,302,563 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,375,740 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,704,844 >>> mbox cmd response: success
17,709,445 UART: [afmc] ++
17,710,056 UART: [afmc] CDI.KEYID = 6
17,710,979 UART: [afmc] SUBJECT.KEYID = 7
17,712,199 UART: [afmc] AUTHORITY.KEYID = 5
21,072,478 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,615 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,895 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,295 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,052 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,499 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,435,851 UART: [afmc] --
23,439,072 UART: [cold-reset] --
23,444,067 UART: [state] Locking Datavault
23,449,918 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,684 UART: [state] Locking ICCM
23,452,912 UART: [exit] Launching FMC @ 0x40000130
23,461,314 UART:
23,461,545 UART: Running Caliptra FMC ...
23,462,650 UART:
23,462,828 UART: [state] CFI Enabled
23,528,970 UART: [fht] FMC Alias Private Key: 7
25,869,165 UART: [art] Extend RT PCRs Done
25,870,392 UART: [art] Lock RT PCRs Done
25,872,017 UART: [art] Populate DV Done
25,877,596 UART: [fht] FMC Alias Private Key: 7
25,879,241 UART: [art] Derive CDI
25,880,054 UART: [art] Store in slot 0x4
25,937,172 UART: [art] Derive Key Pair
25,938,210 UART: [art] Store priv key in slot 0x5
29,231,269 UART: [art] Derive Key Pair - Done
29,244,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,244 UART: [art] Erasing AUTHORITY.KEYID = 7
31,533,749 UART: [art] PUB.X = B36A5FF6EDDFC46D6ED679AD13E3E37514704B096196AA468C201524CE56B33C70E9B81F85169FEC31E33E457B73D77A
31,541,019 UART: [art] PUB.Y = FFC22373904C63B5969632399ABB2B5585A30A26D3914FE8FE6B21ABBAE34C40B662E559A9BF13072F7EC2C1ED95017F
31,548,289 UART: [art] SIG.R = C1F95EAFBE86C4690C3D34A29735E961600080F506F3F0290B4B304AEE1A232AE24805022E2503335C3078367CBA5BDD
31,555,652 UART: [art] SIG.S = 6E02DF999FAD33363ADF292BC9B5A7E05F9ED01C0C44445E9402E6D13A7E881B9801E05BB017ACBCE05B63FE835A4455
32,861,350 UART: Caliptra RT
32,862,049 UART: [state] CFI Enabled
33,038,112 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,103,993 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,259,563 UART: [rt]cmd =0x41544d4e, len=14344
42,560,861 >>> mbox cmd response data (8 bytes)
42,561,677 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,592,584 UART: [rt]cmd =0x41545348, len=116
42,613,555 >>> mbox cmd response data (12 bytes)
44,681,831 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
44,787,978 UART:
44,788,343 UART: Running Caliptra ROM ...
44,789,478 UART:
44,789,650 UART: [state] CFI Enabled
44,864,479 UART: [state] LifecycleState = Unprovisioned
44,866,425 UART: [state] DebugLocked = No
44,868,798 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,873,107 UART: [kat] SHA2-256
45,042,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,053,312 UART: [kat] ++
45,053,777 UART: [kat] sha1
45,064,686 UART: [kat] SHA2-256
45,067,374 UART: [kat] SHA2-384
45,074,061 UART: [kat] SHA2-512-ACC
45,076,419 UART: [kat] ECC-384
47,369,362 UART: [kat] HMAC-384Kdf
47,398,625 UART: [kat] LMS
48,588,953 UART: [kat] --
48,592,835 UART: [update-reset] ++
52,350,350 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,354,624 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
52,627,337 >>> mbox cmd response: success
52,627,689 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,629,039 UART: [update-reset] Copying MAN_2 To MAN_1
52,651,476 UART: [update-reset Success] --
52,655,609 UART: [state] Locking Datavault
52,659,942 UART: [state] Locking PCR0, PCR1 and PCR31
52,661,660 UART: [state] Locking ICCM
52,663,087 UART: [exit] Launching FMC @ 0x40000130
52,671,542 UART:
52,671,775 UART: Running Caliptra FMC ...
52,672,798 UART:
52,672,945 UART: [state] CFI Enabled
52,764,222 UART: [art] Extend RT PCRs Done
52,765,412 UART: [art] Lock RT PCRs Done
52,766,958 UART: [art] Populate DV Done
52,772,423 UART: [fht] FMC Alias Private Key: 7
52,774,102 UART: [art] Derive CDI
52,774,845 UART: [art] Store in slot 0x4
52,833,153 UART: [art] Derive Key Pair
52,834,156 UART: [art] Store priv key in slot 0x5
56,126,978 UART: [art] Derive Key Pair - Done
56,140,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,428,131 UART: [art] Erasing AUTHORITY.KEYID = 7
58,429,638 UART: [art] PUB.X = 572C42715E2B5F317D7BB6932D27239C2F874CADE44CBC935DEDC03344FB937B653CC94871863C256268C08BC8624D96
58,436,907 UART: [art] PUB.Y = 4B852DB95E0F695AC9909A6C9934F273C8177AF7E5E1C3D374DD9FF955009352D4161D9A8166E646CD963F672AEB36D4
58,444,099 UART: [art] SIG.R = AAB22788A3B2F748E880F4E405AEFD8E9C791A0542D71D8E56FEABA508AC07A9EE5C12DBAD02B0D0E3F4BEE2E1AEA1FB
58,451,610 UART: [art] SIG.S = E583F4C2AA10384C26D24E7025C5123B4E7D253955E828280FFAE61617F22145DE3FEBC8B4E388A18D6E624E5C53A645
59,756,270 UART: mbox::rt_entry...
59,757,234 UART: ____ _ _ _ ____ _____
59,759,216 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,761,216 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,763,146 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,765,076 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,767,009 UART: |_|
59,767,851 UART:
60,138,774 UART: [rt] Runtime listening for mailbox commands...
60,140,940 >>> mbox cmd response data (48 bytes)
60,141,558 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,143,898 >>> mbox cmd response data (48 bytes)
60,144,792 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,161,656 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,804,685 ready_for_fw is high
3,805,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,992,275 >>> mbox cmd response: success
23,696,840 UART:
23,697,282 UART: Running Caliptra FMC ...
23,698,423 UART:
23,698,587 UART: [state] CFI Enabled
23,764,891 UART: [fht] FMC Alias Private Key: 7
26,105,334 UART: [art] Extend RT PCRs Done
26,106,575 UART: [art] Lock RT PCRs Done
26,108,314 UART: [art] Populate DV Done
26,113,952 UART: [fht] FMC Alias Private Key: 7
26,115,436 UART: [art] Derive CDI
26,116,248 UART: [art] Store in slot 0x4
26,173,289 UART: [art] Derive Key Pair
26,174,325 UART: [art] Store priv key in slot 0x5
29,467,382 UART: [art] Derive Key Pair - Done
29,480,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,769,799 UART: [art] Erasing AUTHORITY.KEYID = 7
31,771,308 UART: [art] PUB.X = 4CDEBA0701616D55E8E60C8B7C936F6C754AEA3E01230C01BC976154580CD8566708120ED24A0BF01FC52521D07D07F8
31,778,566 UART: [art] PUB.Y = F7609FEC56DFC7A06B3FC8F8EE16FA0EE179E2309C997364D023B05A376E7CB6BEBF7FCAF23CF4DE8134E04F98DA7E1A
31,785,886 UART: [art] SIG.R = 0B6590E79D9F24C912000F612E65DE118A78CCA30760A6F21A8829EA3874C114897A67ECAD2FFCF50963FA5F18BF1106
31,793,228 UART: [art] SIG.S = E9C35254CA37B13149336D9B5792E8E213AE7125031B354B2F8C32B26361CC577F1BE6199A16410217C6809195B0AB28
33,097,765 UART: Caliptra RT
33,098,493 UART: [state] CFI Enabled
33,276,366 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,343,974 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,499,609 UART: [rt]cmd =0x41544d4e, len=14344
42,800,789 >>> mbox cmd response data (8 bytes)
42,801,583 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,832,345 UART: [rt]cmd =0x41545348, len=116
42,851,728 >>> mbox cmd response data (12 bytes)
44,918,558 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,981,866 >>> mbox cmd response: success
52,982,461 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
53,014,858 UART:
53,015,152 UART: Running Caliptra FMC ...
53,016,398 UART:
53,016,563 UART: [state] CFI Enabled
53,105,157 UART: [art] Extend RT PCRs Done
53,106,496 UART: [art] Lock RT PCRs Done
53,107,715 UART: [art] Populate DV Done
53,113,076 UART: [fht] FMC Alias Private Key: 7
53,114,779 UART: [art] Derive CDI
53,115,518 UART: [art] Store in slot 0x4
53,173,444 UART: [art] Derive Key Pair
53,174,444 UART: [art] Store priv key in slot 0x5
56,466,714 UART: [art] Derive Key Pair - Done
56,479,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,767,966 UART: [art] Erasing AUTHORITY.KEYID = 7
58,769,477 UART: [art] PUB.X = 5095541C927E76D4C21E9428BBDA597AA7E5813AD3807C4D9371A029AD4D76A7D3A907F012E85EFAB30C2DFE61630888
58,776,780 UART: [art] PUB.Y = BE690734ED2D5ADF123DB847DF74370B4937DC54EC612F93C232CE2A175086194EF72B3CF07A9C1330121421B4DEFBDD
58,783,984 UART: [art] SIG.R = 9903C992D658745348A37F36DF507E4E1D3FA40D09D2A1CA2271A3E3754A587DA15B55123FEEFE6F58EF2BDCA80428A8
58,791,386 UART: [art] SIG.S = 607D6D79D1E14305679E45DB421865B39EF33102CE2ABD63F5C999CB0D705B777FADDF9A347FE08CEC8E24BF3A1E0009
60,095,897 UART: mbox::rt_entry...
60,096,872 UART: ____ _ _ _ ____ _____
60,098,812 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
60,100,824 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
60,102,677 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
60,104,606 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
60,106,457 UART: |_|
60,107,256 UART:
60,480,929 UART: [rt] Runtime listening for mailbox commands...
60,483,092 >>> mbox cmd response data (48 bytes)
60,483,685 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,486,068 >>> mbox cmd response data (48 bytes)
60,486,974 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,503,853 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,385 UART:
192,756 UART: Running Caliptra ROM ...
193,941 UART:
603,475 UART: [state] CFI Enabled
617,647 UART: [state] LifecycleState = Unprovisioned
619,588 UART: [state] DebugLocked = No
622,033 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,044 UART: [kat] SHA2-256
795,794 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,375 UART: [kat] ++
806,830 UART: [kat] sha1
818,192 UART: [kat] SHA2-256
820,904 UART: [kat] SHA2-384
826,317 UART: [kat] SHA2-512-ACC
828,676 UART: [kat] ECC-384
3,113,236 UART: [kat] HMAC-384Kdf
3,125,673 UART: [kat] LMS
4,315,726 UART: [kat] --
4,321,582 UART: [cold-reset] ++
4,322,938 UART: [fht] Storing FHT @ 0x50003400
4,335,195 UART: [idev] ++
4,335,817 UART: [idev] CDI.KEYID = 6
4,336,691 UART: [idev] SUBJECT.KEYID = 7
4,337,995 UART: [idev] UDS.KEYID = 0
4,338,963 ready_for_fw is high
4,339,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,020 UART: [idev] Erasing UDS.KEYID = 0
7,627,275 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,888 UART: [idev] --
7,651,206 UART: [ldev] ++
7,651,778 UART: [ldev] CDI.KEYID = 6
7,652,744 UART: [ldev] SUBJECT.KEYID = 5
7,653,950 UART: [ldev] AUTHORITY.KEYID = 7
7,655,227 UART: [ldev] FE.KEYID = 1
7,667,378 UART: [ldev] Erasing FE.KEYID = 1
10,954,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,821 UART: [ldev] --
13,315,704 UART: [fwproc] Waiting for Commands...
13,317,787 UART: [fwproc] Received command 0x46574c44
13,319,987 UART: [fwproc] Received Image of size 118548 bytes
17,430,069 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,826 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,011 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,908,493 >>> mbox cmd response: success
17,911,795 UART: [afmc] ++
17,912,405 UART: [afmc] CDI.KEYID = 6
17,913,315 UART: [afmc] SUBJECT.KEYID = 7
17,914,587 UART: [afmc] AUTHORITY.KEYID = 5
21,231,211 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,330 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,575 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,015 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,738 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,150 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,905 UART: [afmc] --
23,595,116 UART: [cold-reset] --
23,597,945 UART: [state] Locking Datavault
23,603,570 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,322 UART: [state] Locking ICCM
23,607,140 UART: [exit] Launching FMC @ 0x40000130
23,615,526 UART:
23,615,754 UART: Running Caliptra FMC ...
23,616,851 UART:
23,617,009 UART: [state] CFI Enabled
23,625,231 UART: [fht] FMC Alias Private Key: 7
25,965,429 UART: [art] Extend RT PCRs Done
25,966,652 UART: [art] Lock RT PCRs Done
25,968,514 UART: [art] Populate DV Done
25,974,150 UART: [fht] FMC Alias Private Key: 7
25,975,844 UART: [art] Derive CDI
25,976,650 UART: [art] Store in slot 0x4
26,019,340 UART: [art] Derive Key Pair
26,020,339 UART: [art] Store priv key in slot 0x5
29,262,345 UART: [art] Derive Key Pair - Done
29,275,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,360 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,067 UART: [art] PUB.X = CD52B6CB49B8F656A9C369BDD08CD1335E49D85C9011933DCFCAA2B37C76A8A3C66BDFC3F0FA1C0B9F2ADF888162C823
31,564,200 UART: [art] PUB.Y = 8EFA406B5FDBA27D37F8ECF82344AD38BD206C94D041388BEA420986B3C978EF1066A93422144E34E5B7702D1CF15655
31,571,400 UART: [art] SIG.R = EC01AA6827897DAB3016C680AB52671720166A0F1B4F42EE1F782A8D883B57480D6EC71FDA94C3DC7F1B87D1E5601412
31,578,802 UART: [art] SIG.S = 3D50B6C36E92906D19D2944C2A026066FB1A54240127DA054C39529188D26749950E5F0551F8C495D217EAA465F560B3
32,883,647 UART: Caliptra RT
32,884,346 UART: [state] CFI Enabled
33,017,729 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,082,131 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,237,478 UART: [rt]cmd =0x41544d4e, len=14344
42,538,005 >>> mbox cmd response data (8 bytes)
42,538,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,569,299 UART: [rt]cmd =0x41545348, len=116
42,589,180 >>> mbox cmd response data (12 bytes)
44,658,820 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
44,765,098 UART:
44,765,473 UART: Running Caliptra ROM ...
44,766,606 UART:
44,766,774 UART: [state] CFI Enabled
44,780,408 UART: [state] LifecycleState = Unprovisioned
44,782,304 UART: [state] DebugLocked = No
44,783,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,789,270 UART: [kat] SHA2-256
44,958,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,969,530 UART: [kat] ++
44,970,066 UART: [kat] sha1
44,980,634 UART: [kat] SHA2-256
44,983,312 UART: [kat] SHA2-384
44,988,584 UART: [kat] SHA2-512-ACC
44,990,935 UART: [kat] ECC-384
47,272,786 UART: [kat] HMAC-384Kdf
47,283,886 UART: [kat] LMS
48,473,975 UART: [kat] --
48,477,986 UART: [update-reset] ++
52,232,301 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,235,711 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
52,508,482 >>> mbox cmd response: success
52,508,838 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,510,031 UART: [update-reset] Copying MAN_2 To MAN_1
52,532,464 UART: [update-reset Success] --
52,536,563 UART: [state] Locking Datavault
52,539,605 UART: [state] Locking PCR0, PCR1 and PCR31
52,541,350 UART: [state] Locking ICCM
52,542,527 UART: [exit] Launching FMC @ 0x40000130
52,550,968 UART:
52,551,195 UART: Running Caliptra FMC ...
52,552,290 UART:
52,552,440 UART: [state] CFI Enabled
52,596,819 UART: [art] Extend RT PCRs Done
52,597,957 UART: [art] Lock RT PCRs Done
52,599,498 UART: [art] Populate DV Done
52,605,035 UART: [fht] FMC Alias Private Key: 7
52,606,704 UART: [art] Derive CDI
52,607,520 UART: [art] Store in slot 0x4
52,650,433 UART: [art] Derive Key Pair
52,651,426 UART: [art] Store priv key in slot 0x5
55,893,382 UART: [art] Derive Key Pair - Done
55,906,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,186,786 UART: [art] Erasing AUTHORITY.KEYID = 7
58,188,290 UART: [art] PUB.X = 79E94390800D2AC959C668372E958B299AC845804CE23C236C9D700477A524B0A446F0EDD0322AEC759EEC5D336231C3
58,195,551 UART: [art] PUB.Y = 814C03B85BA050920D27F6B9235A3505A1AA2334E7F14056933C40C9D5615A0712143C27ED7E4D54D5A3116AA297A351
58,202,776 UART: [art] SIG.R = 983EBB1BAD3146190F84E21E5D24959299E261E50F6F0079E289B72E954264603FFDC750919C55853FB0BF2C2DB9C60C
58,210,128 UART: [art] SIG.S = E9043456FF14E01A75ADC83C69F5F607A7BC262A32B31762927483D862BB7248C8CED04D139725B331C47978AE6F61DA
59,514,768 UART: mbox::rt_entry...
59,515,733 UART: ____ _ _ _ ____ _____
59,517,718 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,519,719 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,521,673 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,523,606 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,525,530 UART: |_|
59,526,330 UART:
59,902,992 UART: [rt] Runtime listening for mailbox commands...
59,905,166 >>> mbox cmd response data (48 bytes)
59,905,725 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,908,040 >>> mbox cmd response data (48 bytes)
59,908,927 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,925,819 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
4,131,768 ready_for_fw is high
4,132,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,169,437 >>> mbox cmd response: success
23,809,927 UART:
23,810,317 UART: Running Caliptra FMC ...
23,811,456 UART:
23,811,609 UART: [state] CFI Enabled
23,819,070 UART: [fht] FMC Alias Private Key: 7
26,158,900 UART: [art] Extend RT PCRs Done
26,160,125 UART: [art] Lock RT PCRs Done
26,162,016 UART: [art] Populate DV Done
26,167,650 UART: [fht] FMC Alias Private Key: 7
26,169,291 UART: [art] Derive CDI
26,170,102 UART: [art] Store in slot 0x4
26,212,868 UART: [art] Derive Key Pair
26,213,911 UART: [art] Store priv key in slot 0x5
29,455,789 UART: [art] Derive Key Pair - Done
29,468,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,994 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,511 UART: [art] PUB.X = 25FC763055C60A7861AAEE50C2011B6A247E8EF133784969C9656467D448152158335862FC3149719995860BAD563414
31,757,706 UART: [art] PUB.Y = 0F85FE6EB80E5138C399422ED12046048A53316B4852E1719F8E47CAC9DA65E559C24521564D3C65D6CDFCD86D3C31B0
31,764,954 UART: [art] SIG.R = 90055DDAF9A2636908B6AA6F8384A560D8C9F401A9B4B9C2597957608694EF5646F6DF179A9517F48357C7B02CFF8291
31,772,340 UART: [art] SIG.S = A303163A4B933E561FDF45C0FEC4B8A8204490868711EA230339F7654FB39F590EEAFE668890078A7E6A9042CBD77E7D
33,077,405 UART: Caliptra RT
33,078,118 UART: [state] CFI Enabled
33,212,502 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,281,349 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,436,883 UART: [rt]cmd =0x41544d4e, len=14344
42,737,736 >>> mbox cmd response data (8 bytes)
42,738,507 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,769,316 UART: [rt]cmd =0x41545348, len=116
42,789,386 >>> mbox cmd response data (12 bytes)
44,856,898 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,845,000 >>> mbox cmd response: success
52,845,565 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,880,640 UART:
52,880,918 UART: Running Caliptra FMC ...
52,882,033 UART:
52,882,192 UART: [state] CFI Enabled
52,926,862 UART: [art] Extend RT PCRs Done
52,928,160 UART: [art] Lock RT PCRs Done
52,929,289 UART: [art] Populate DV Done
52,934,715 UART: [fht] FMC Alias Private Key: 7
52,936,357 UART: [art] Derive CDI
52,937,165 UART: [art] Store in slot 0x4
52,979,638 UART: [art] Derive Key Pair
52,980,630 UART: [art] Store priv key in slot 0x5
56,222,966 UART: [art] Derive Key Pair - Done
56,235,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,516,314 UART: [art] Erasing AUTHORITY.KEYID = 7
58,517,815 UART: [art] PUB.X = C2F2425A1FF7535ADD2E6AFA7F721C7E65E030BE4F5709D7FDDB539898E91E8950A0734C1AC8EBC4D43B1F535F8A06FD
58,525,100 UART: [art] PUB.Y = A92375ABB94D4DA47EEFFDDB0337629CF94B6C0C2682BA0799AF06E4FEB7DB94B35737C2717071081B293C250269FAE7
58,532,340 UART: [art] SIG.R = 11B8CBB447BF736BF8DCB2D570EB9A17919BA04C03647C7888C674648A657FE0909AED4B2BDECE3B376449D6A23CBCCB
58,539,729 UART: [art] SIG.S = CFEFB7DEBB86AFF6E00E744E3C3AF0651A267D40A0CD36709C26D34CDE9722E51E61E4A32BB0E33433A4C566A2795C5A
59,844,449 UART: mbox::rt_entry...
59,845,492 UART: ____ _ _ _ ____ _____
59,847,477 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,849,479 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,851,423 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,853,349 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,855,273 UART: |_|
59,856,106 UART:
60,224,290 UART: [rt] Runtime listening for mailbox commands...
60,226,553 >>> mbox cmd response data (48 bytes)
60,227,161 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,229,556 >>> mbox cmd response data (48 bytes)
60,230,555 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,247,476 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,114 UART:
192,470 UART: Running Caliptra ROM ...
193,662 UART:
193,814 UART: [state] CFI Enabled
266,945 UART: [state] LifecycleState = Unprovisioned
268,940 UART: [state] DebugLocked = No
271,613 UART: [state] WD Timer not started. Device not locked for debugging
274,864 UART: [kat] SHA2-256
454,478 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,310 UART: [kat] ++
465,760 UART: [kat] sha1
476,382 UART: [kat] SHA2-256
479,068 UART: [kat] SHA2-384
485,777 UART: [kat] SHA2-512-ACC
488,210 UART: [kat] ECC-384
2,950,606 UART: [kat] HMAC-384Kdf
2,970,933 UART: [kat] LMS
3,447,484 UART: [kat] --
3,452,900 UART: [cold-reset] ++
3,455,530 UART: [fht] FHT @ 0x50003400
3,467,494 UART: [idev] ++
3,468,058 UART: [idev] CDI.KEYID = 6
3,469,015 UART: [idev] SUBJECT.KEYID = 7
3,470,254 UART: [idev] UDS.KEYID = 0
3,471,172 ready_for_fw is high
3,471,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,411 UART: [idev] Erasing UDS.KEYID = 0
5,990,491 UART: [idev] Sha1 KeyId Algorithm
6,013,471 UART: [idev] --
6,018,709 UART: [ldev] ++
6,019,281 UART: [ldev] CDI.KEYID = 6
6,020,263 UART: [ldev] SUBJECT.KEYID = 5
6,021,366 UART: [ldev] AUTHORITY.KEYID = 7
6,022,701 UART: [ldev] FE.KEYID = 1
6,057,601 UART: [ldev] Erasing FE.KEYID = 1
8,564,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,736 UART: [ldev] --
10,376,403 UART: [fwproc] Wait for Commands...
10,379,136 UART: [fwproc] Recv command 0x46574c44
10,381,113 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,053 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,118 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,439 >>> mbox cmd response: success
14,349,665 UART: [afmc] ++
14,350,288 UART: [afmc] CDI.KEYID = 6
14,351,176 UART: [afmc] SUBJECT.KEYID = 7
14,352,395 UART: [afmc] AUTHORITY.KEYID = 5
16,894,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,682 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,496 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,514 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,058 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,161 UART: [afmc] --
18,696,726 UART: [cold-reset] --
18,701,550 UART: [state] Locking Datavault
18,708,142 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,041 UART: [state] Locking ICCM
18,712,418 UART: [exit] Launching FMC @ 0x40000130
18,720,877 UART:
18,721,112 UART: Running Caliptra FMC ...
18,722,208 UART:
18,722,363 UART: [state] CFI Enabled
18,775,740 UART: [fht] FMC Alias Private Key: 7
20,542,148 UART: [art] Extend RT PCRs Done
20,543,367 UART: [art] Lock RT PCRs Done
20,544,905 UART: [art] Populate DV Done
20,550,500 UART: [fht] FMC Alias Private Key: 7
20,552,072 UART: [art] Derive CDI
20,552,820 UART: [art] Store in slot 0x4
20,608,015 UART: [art] Derive Key Pair
20,609,016 UART: [art] Store priv key in slot 0x5
23,071,466 UART: [art] Derive Key Pair - Done
23,084,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,521 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,023 UART: [art] PUB.X = A0F74A7C36A6BD2A0F01D121EDC9337440711BED90C483A01986EA047E9E65C713165409CC6C5618FCC8D4F41678901D
24,807,270 UART: [art] PUB.Y = 27CE225162A9BCA42F891B8C0F8CD6220AD119B69F9329FF62ECDC7319A3C68A6EBEC61013F40A418F3958614A80B316
24,814,555 UART: [art] SIG.R = 54802C359A8380B215F18C04B4A120A3046C66074F30874D17A0C1B96CD4495074443C987FADEB0428AC183D31F860EE
24,821,947 UART: [art] SIG.S = A8E4126928E4519A4735120466EE86F2CDC1F237D98756ACDC8C5589FCF6F6455203E805877D1156705520A116B97F03
25,800,996 UART: Caliptra RT
25,801,712 UART: [state] CFI Enabled
25,981,852 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,027,736 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,183,472 UART: [rt]cmd =0x41544d4e, len=14344
34,178,867 >>> mbox cmd response data (8 bytes)
34,179,616 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,210,306 UART: [rt]cmd =0x41545348, len=116
34,230,202 >>> mbox cmd response data (12 bytes)
36,282,030 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
36,388,045 UART:
36,388,403 UART: Running Caliptra ROM ...
36,389,683 UART:
36,389,860 UART: [state] CFI Enabled
36,460,498 UART: [state] LifecycleState = Unprovisioned
36,462,466 UART: [state] DebugLocked = No
36,463,852 UART: [state] WD Timer not started. Device not locked for debugging
36,467,050 UART: [kat] SHA2-256
36,646,710 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,657,500 UART: [kat] ++
36,658,037 UART: [kat] sha1
36,668,771 UART: [kat] SHA2-256
36,671,465 UART: [kat] SHA2-384
36,677,015 UART: [kat] SHA2-512-ACC
36,679,417 UART: [kat] ECC-384
39,124,781 UART: [kat] HMAC-384Kdf
39,147,058 UART: [kat] LMS
39,623,564 UART: [kat] --
39,625,820 UART: [update-reset] ++
42,681,639 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,684,498 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
42,957,088 >>> mbox cmd response: success
42,957,445 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,958,111 UART: [update-reset] Copying MAN_2 To MAN_1
42,995,225 UART: [update-reset Success] --
43,000,637 UART: [state] Locking Datavault
43,003,831 UART: [state] Locking PCR0, PCR1 and PCR31
43,005,582 UART: [state] Locking ICCM
43,006,948 UART: [exit] Launching FMC @ 0x40000130
43,015,344 UART:
43,015,580 UART: Running Caliptra FMC ...
43,016,681 UART:
43,016,840 UART: [state] CFI Enabled
43,104,289 UART: [art] Extend RT PCRs Done
43,105,476 UART: [art] Lock RT PCRs Done
43,106,929 UART: [art] Populate DV Done
43,112,519 UART: [fht] FMC Alias Private Key: 7
43,114,147 UART: [art] Derive CDI
43,114,967 UART: [art] Store in slot 0x4
43,173,759 UART: [art] Derive Key Pair
43,174,756 UART: [art] Store priv key in slot 0x5
45,638,007 UART: [art] Derive Key Pair - Done
45,650,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,363,830 UART: [art] Erasing AUTHORITY.KEYID = 7
47,365,338 UART: [art] PUB.X = A91AF1024945028114E5EBA32850291952CEDE395CA892C3C5176E4BE0D33AAF04BBD89841DB4C33A2529316086A600E
47,372,591 UART: [art] PUB.Y = 3EB8E8E8C57F25852C76870D9B6112B2CECC3BFD4080967ED88C7604AD7093B7C937C84ABBB58592456DCC639F98B98E
47,379,873 UART: [art] SIG.R = 10DA0809612AEBDFC3ACA17FA0C4D2CD18EAF3C486661EBF6B6ACA7CF95AFA5D41C6347EA5AF1E95C078F2837FEED73B
47,387,309 UART: [art] SIG.S = 00763A8834F2780FE83CFFEEE7D1F8D58BFBA404312B633D444CF13C46B3A07FC20BB0336D93FF065E2215010B622B6E
48,365,683 UART: mbox::rt_entry...
48,366,645 UART: ____ _ _ _ ____ _____
48,368,572 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,370,576 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,372,523 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,374,452 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,376,375 UART: |_|
48,377,201 UART:
48,749,785 UART: [rt] Runtime listening for mailbox commands...
48,751,956 >>> mbox cmd response data (48 bytes)
48,752,578 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,754,933 >>> mbox cmd response data (48 bytes)
48,755,825 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,772,745 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,455,654 ready_for_fw is high
3,456,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,216,840 >>> mbox cmd response: success
18,508,821 UART:
18,509,217 UART: Running Caliptra FMC ...
18,510,418 UART:
18,510,575 UART: [state] CFI Enabled
18,578,877 UART: [fht] FMC Alias Private Key: 7
20,345,472 UART: [art] Extend RT PCRs Done
20,346,687 UART: [art] Lock RT PCRs Done
20,348,633 UART: [art] Populate DV Done
20,353,990 UART: [fht] FMC Alias Private Key: 7
20,355,635 UART: [art] Derive CDI
20,356,447 UART: [art] Store in slot 0x4
20,411,973 UART: [art] Derive Key Pair
20,413,013 UART: [art] Store priv key in slot 0x5
22,875,674 UART: [art] Derive Key Pair - Done
22,888,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,454 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,931 UART: [art] PUB.X = C904C4AC904CFE109A7E41844CC130A72C92336A0905E1345647F3826ABFE710C6CA44CA3CFCD7B404A12FF88229BE4F
24,611,198 UART: [art] PUB.Y = 2F34FEDE399D8675C01F79997E929937AA800D4C638EC2B7D2E54BD5A1BEC722C06B2F547886A5F8A0AD23B827BB0E2F
24,618,456 UART: [art] SIG.R = 428D1C9D738708AEFBE23EC22F874D5F68F0DD439D0686517DC0115DABA6FA548D64EB3DCD01DAD9160DA7C7F496B5D7
24,625,916 UART: [art] SIG.S = 80E05EB3AF457E93F4BDEC24F78898FEC789D01D78AF2EB71D30237573230EED1FC6C1F5C1E991AE043DF2ABD75E4550
25,605,182 UART: Caliptra RT
25,605,896 UART: [state] CFI Enabled
25,785,920 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,825,191 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,981,103 UART: [rt]cmd =0x41544d4e, len=14344
33,976,872 >>> mbox cmd response data (8 bytes)
33,977,627 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,008,501 UART: [rt]cmd =0x41545348, len=116
34,028,512 >>> mbox cmd response data (12 bytes)
36,088,425 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,783,731 >>> mbox cmd response: success
42,784,239 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,819,251 UART:
42,819,572 UART: Running Caliptra FMC ...
42,820,612 UART:
42,820,759 UART: [state] CFI Enabled
42,928,238 UART: [art] Extend RT PCRs Done
42,929,531 UART: [art] Lock RT PCRs Done
42,930,910 UART: [art] Populate DV Done
42,936,380 UART: [fht] FMC Alias Private Key: 7
42,937,969 UART: [art] Derive CDI
42,938,702 UART: [art] Store in slot 0x4
42,996,913 UART: [art] Derive Key Pair
42,997,973 UART: [art] Store priv key in slot 0x5
45,461,020 UART: [art] Derive Key Pair - Done
45,474,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,186,828 UART: [art] Erasing AUTHORITY.KEYID = 7
47,188,331 UART: [art] PUB.X = 05ABFE3F7A088EC7B55763BF3383A0DE012C95868D6228962B4297E8750744DA6B169A353E7959849BCA0AA3FDEF4FBE
47,195,662 UART: [art] PUB.Y = D62DB1F6C175B40F7624FB50A7B690FBEF62891F5B602C644183F87605FA2DD0916D05FE6E9991465F1B37B1AB125B3D
47,202,850 UART: [art] SIG.R = 97B39F072E2A030E1E54450DDB06FC08C414402CFC92F5552E0605BDDC934A2F30578C43780D4AF0327759E18A89B5A1
47,210,297 UART: [art] SIG.S = C5ACAD602BCDC8268141415B540EACAC96F6A417496FF5B60579ADB823B39C4816F08AE79517E4609D890CC4893C6E74
48,189,033 UART: mbox::rt_entry...
48,189,994 UART: ____ _ _ _ ____ _____
48,191,979 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,193,982 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,195,905 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,197,836 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,199,760 UART: |_|
48,200,565 UART:
48,571,686 UART: [rt] Runtime listening for mailbox commands...
48,573,885 >>> mbox cmd response data (48 bytes)
48,574,458 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,576,779 >>> mbox cmd response data (48 bytes)
48,577,658 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,594,526 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,471 UART:
192,831 UART: Running Caliptra ROM ...
193,948 UART:
603,874 UART: [state] CFI Enabled
617,129 UART: [state] LifecycleState = Unprovisioned
619,001 UART: [state] DebugLocked = No
621,879 UART: [state] WD Timer not started. Device not locked for debugging
625,842 UART: [kat] SHA2-256
805,465 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,273 UART: [kat] ++
816,722 UART: [kat] sha1
827,880 UART: [kat] SHA2-256
830,602 UART: [kat] SHA2-384
836,877 UART: [kat] SHA2-512-ACC
839,253 UART: [kat] ECC-384
3,281,342 UART: [kat] HMAC-384Kdf
3,293,074 UART: [kat] LMS
3,769,607 UART: [kat] --
3,775,468 UART: [cold-reset] ++
3,778,043 UART: [fht] FHT @ 0x50003400
3,789,521 UART: [idev] ++
3,790,088 UART: [idev] CDI.KEYID = 6
3,791,122 UART: [idev] SUBJECT.KEYID = 7
3,792,312 UART: [idev] UDS.KEYID = 0
3,793,262 ready_for_fw is high
3,793,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,391 UART: [idev] Erasing UDS.KEYID = 0
6,271,333 UART: [idev] Sha1 KeyId Algorithm
6,294,592 UART: [idev] --
6,299,297 UART: [ldev] ++
6,299,865 UART: [ldev] CDI.KEYID = 6
6,300,807 UART: [ldev] SUBJECT.KEYID = 5
6,302,018 UART: [ldev] AUTHORITY.KEYID = 7
6,303,307 UART: [ldev] FE.KEYID = 1
6,313,607 UART: [ldev] Erasing FE.KEYID = 1
8,796,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,266 UART: [ldev] --
10,590,609 UART: [fwproc] Wait for Commands...
10,593,897 UART: [fwproc] Recv command 0x46574c44
10,595,879 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,818 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,879 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,239 >>> mbox cmd response: success
14,563,213 UART: [afmc] ++
14,563,798 UART: [afmc] CDI.KEYID = 6
14,564,739 UART: [afmc] SUBJECT.KEYID = 7
14,565,955 UART: [afmc] AUTHORITY.KEYID = 5
17,069,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,562 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,386 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,484 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,018 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,867,863 UART: [afmc] --
18,872,467 UART: [cold-reset] --
18,876,778 UART: [state] Locking Datavault
18,881,272 UART: [state] Locking PCR0, PCR1 and PCR31
18,882,970 UART: [state] Locking ICCM
18,884,664 UART: [exit] Launching FMC @ 0x40000130
18,893,059 UART:
18,893,307 UART: Running Caliptra FMC ...
18,894,411 UART:
18,894,570 UART: [state] CFI Enabled
18,902,619 UART: [fht] FMC Alias Private Key: 7
20,669,111 UART: [art] Extend RT PCRs Done
20,670,331 UART: [art] Lock RT PCRs Done
20,671,932 UART: [art] Populate DV Done
20,677,524 UART: [fht] FMC Alias Private Key: 7
20,679,120 UART: [art] Derive CDI
20,679,867 UART: [art] Store in slot 0x4
20,722,359 UART: [art] Derive Key Pair
20,723,397 UART: [art] Store priv key in slot 0x5
23,149,760 UART: [art] Derive Key Pair - Done
23,162,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,456 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,970 UART: [art] PUB.X = F57E4BE193D3DCF91104AF11F73113EF9D4C8A9D0EAA6FDE9BDB24F935735A5FA463B95A1B4C48BDDFC4C7B6D63233F0
24,878,267 UART: [art] PUB.Y = 55147DFECCB8CC7C28CF8088AC99E6C73C5B5BBFC706E1C42CD0192B5F42E3F5F91787FDAE297CCABC46B6398B877A1D
24,885,539 UART: [art] SIG.R = 9245C08951E19C2B6BC7192BCA9604CBE033C19726B8EA983114828FC4411F63D9CA3293E344CEAC4EC3C7E29241AC18
24,892,936 UART: [art] SIG.S = 6E0F457353287E383FECB469AAE4E2C0ED6D5E5B340EAEE766A66569447C57649899EF3527FB19D11748109FC7CCA0B0
25,871,797 UART: Caliptra RT
25,872,499 UART: [state] CFI Enabled
26,005,238 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,048,787 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,204,479 UART: [rt]cmd =0x41544d4e, len=14344
34,200,871 >>> mbox cmd response data (8 bytes)
34,201,989 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,232,878 UART: [rt]cmd =0x41545348, len=116
34,252,244 >>> mbox cmd response data (12 bytes)
36,304,201 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
36,410,234 UART:
36,410,613 UART: Running Caliptra ROM ...
36,411,671 UART:
36,411,824 UART: [state] CFI Enabled
36,427,746 UART: [state] LifecycleState = Unprovisioned
36,429,650 UART: [state] DebugLocked = No
36,431,062 UART: [state] WD Timer not started. Device not locked for debugging
36,434,158 UART: [kat] SHA2-256
36,613,870 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,624,663 UART: [kat] ++
36,625,120 UART: [kat] sha1
36,637,477 UART: [kat] SHA2-256
36,640,213 UART: [kat] SHA2-384
36,645,938 UART: [kat] SHA2-512-ACC
36,648,290 UART: [kat] ECC-384
39,090,805 UART: [kat] HMAC-384Kdf
39,102,444 UART: [kat] LMS
39,578,915 UART: [kat] --
39,581,990 UART: [update-reset] ++
42,638,588 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,641,767 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
42,914,392 >>> mbox cmd response: success
42,914,755 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,915,576 UART: [update-reset] Copying MAN_2 To MAN_1
42,952,668 UART: [update-reset Success] --
42,957,267 UART: [state] Locking Datavault
42,961,177 UART: [state] Locking PCR0, PCR1 and PCR31
42,962,936 UART: [state] Locking ICCM
42,964,278 UART: [exit] Launching FMC @ 0x40000130
42,972,679 UART:
42,972,919 UART: Running Caliptra FMC ...
42,974,021 UART:
42,974,184 UART: [state] CFI Enabled
43,017,925 UART: [art] Extend RT PCRs Done
43,019,075 UART: [art] Lock RT PCRs Done
43,020,581 UART: [art] Populate DV Done
43,025,960 UART: [fht] FMC Alias Private Key: 7
43,027,649 UART: [art] Derive CDI
43,028,473 UART: [art] Store in slot 0x4
43,071,069 UART: [art] Derive Key Pair
43,072,078 UART: [art] Store priv key in slot 0x5
45,499,350 UART: [art] Derive Key Pair - Done
45,512,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,218,380 UART: [art] Erasing AUTHORITY.KEYID = 7
47,219,880 UART: [art] PUB.X = 287663D0C3A5508B9A9BF6BDE12758F830D4B8B8F108F86CA78532C6E437AF3EEE03597DC97BF6AEA44C7186B2AB387F
47,227,187 UART: [art] PUB.Y = 7EA74B83333131757B318E0C514642BBFE5935E820C5662B0D84665C41EC748226814C26B73B56E0E81BFB623639C9D1
47,234,418 UART: [art] SIG.R = DB63F8C18E55F9EFE555DDFA97868026381C488DB6703F8E0181902CEFBF492713952D498CF00B475FFEEFA8156C417F
47,241,810 UART: [art] SIG.S = ADF63D6E08ED27C25C589D7D29F6B96400E996AE3FCE311A20F88FAC4A750BA09A8E45676D350F2735BF3E7FBDB25056
48,220,516 UART: mbox::rt_entry...
48,221,473 UART: ____ _ _ _ ____ _____
48,223,460 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,225,614 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,227,594 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,229,537 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,231,481 UART: |_|
48,232,320 UART:
48,605,438 UART: [rt] Runtime listening for mailbox commands...
48,607,661 >>> mbox cmd response data (48 bytes)
48,608,238 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,610,559 >>> mbox cmd response data (48 bytes)
48,611,445 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,628,365 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,780,162 ready_for_fw is high
3,780,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,009 >>> mbox cmd response: success
18,705,146 UART:
18,705,528 UART: Running Caliptra FMC ...
18,706,673 UART:
18,706,839 UART: [state] CFI Enabled
18,714,893 UART: [fht] FMC Alias Private Key: 7
20,481,405 UART: [art] Extend RT PCRs Done
20,482,625 UART: [art] Lock RT PCRs Done
20,483,845 UART: [art] Populate DV Done
20,489,385 UART: [fht] FMC Alias Private Key: 7
20,491,112 UART: [art] Derive CDI
20,491,936 UART: [art] Store in slot 0x4
20,534,703 UART: [art] Derive Key Pair
20,535,707 UART: [art] Store priv key in slot 0x5
22,962,602 UART: [art] Derive Key Pair - Done
22,975,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,093 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,601 UART: [art] PUB.X = D63D3BA1E7E3438A7B4DC916929993DFC2F226A7DA74F2C12C01EDABD3C8AC195D8B12B92C900CA21826AEE9CADC0148
24,690,910 UART: [art] PUB.Y = 2686D0D50CDC913E93EF6DE3856B885BE6108C1EF107B18C87D187AAF8763BA15EF9AE741F0453574FA332EF31DBAB6D
24,698,174 UART: [art] SIG.R = F6588B45676CA0E90DBA7E72434E6823A38E262200242E3B4F1625AEC28A7FAC19BC902045FB857580387D4F3BB76B52
24,705,578 UART: [art] SIG.S = A710946D29CC41995B492A52992D6D299EDD29D790325DDF078CB6C3C7A40290DC7CAFB06196B08339965FEF317E8BE5
25,685,020 UART: Caliptra RT
25,685,726 UART: [state] CFI Enabled
25,818,070 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,858,419 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,014,103 UART: [rt]cmd =0x41544d4e, len=14344
34,009,962 >>> mbox cmd response data (8 bytes)
34,010,710 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,041,258 UART: [rt]cmd =0x41545348, len=116
34,060,541 >>> mbox cmd response data (12 bytes)
36,112,117 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,719,074 >>> mbox cmd response: success
42,719,532 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,753,841 UART:
42,754,130 UART: Running Caliptra FMC ...
42,755,251 UART:
42,755,430 UART: [state] CFI Enabled
42,799,242 UART: [art] Extend RT PCRs Done
42,800,521 UART: [art] Lock RT PCRs Done
42,802,147 UART: [art] Populate DV Done
42,807,665 UART: [fht] FMC Alias Private Key: 7
42,809,364 UART: [art] Derive CDI
42,810,179 UART: [art] Store in slot 0x4
42,852,826 UART: [art] Derive Key Pair
42,853,828 UART: [art] Store priv key in slot 0x5
45,281,066 UART: [art] Derive Key Pair - Done
45,294,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,000,973 UART: [art] Erasing AUTHORITY.KEYID = 7
47,002,461 UART: [art] PUB.X = A6B5ABCD6182176F82D0B9E237C153D924F54BC956857194981A6461B53B330CE42534312D2CF4221F7CEDEB3AF2E53F
47,009,728 UART: [art] PUB.Y = 4FB2A4D6278C21D4303AE1D0BF419DD29329676D62E81E8A66D729CDC8C374EB4967F0B0C97C3240F649868A07FE0E00
47,016,979 UART: [art] SIG.R = 548BC222DF8B0C6CFC52FAF66D5365511B17C93C22BEA526D333678B7ACC407E441B6A3B87C353187DF4DDE280379581
47,024,319 UART: [art] SIG.S = 08BB7C7B2F4DF7E86520B9B61388E58E4FDAC1FC8072D6BF7CC1E023BC1289BFDE9F2E8DD6A20B1A6E703BC0BE4A6D2F
48,002,933 UART: mbox::rt_entry...
48,003,908 UART: ____ _ _ _ ____ _____
48,005,846 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,007,861 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,009,724 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,011,654 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,013,700 UART: |_|
48,014,513 UART:
48,381,998 UART: [rt] Runtime listening for mailbox commands...
48,384,142 >>> mbox cmd response data (48 bytes)
48,384,714 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,387,037 >>> mbox cmd response data (48 bytes)
48,387,926 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,404,799 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,162 UART:
192,532 UART: Running Caliptra ROM ...
193,630 UART:
193,772 UART: [state] CFI Enabled
266,282 UART: [state] LifecycleState = Unprovisioned
268,632 UART: [state] DebugLocked = No
269,868 UART: [state] WD Timer not started. Device not locked for debugging
274,545 UART: [kat] SHA2-256
464,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,166 UART: [kat] ++
475,623 UART: [kat] sha1
486,710 UART: [kat] SHA2-256
489,720 UART: [kat] SHA2-384
495,284 UART: [kat] SHA2-512-ACC
497,864 UART: [kat] ECC-384
2,946,845 UART: [kat] HMAC-384Kdf
2,972,019 UART: [kat] LMS
3,503,800 UART: [kat] --
3,507,592 UART: [cold-reset] ++
3,509,895 UART: [fht] FHT @ 0x50003400
3,521,686 UART: [idev] ++
3,522,331 UART: [idev] CDI.KEYID = 6
3,523,313 UART: [idev] SUBJECT.KEYID = 7
3,524,483 UART: [idev] UDS.KEYID = 0
3,525,407 ready_for_fw is high
3,525,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,709 UART: [idev] Erasing UDS.KEYID = 0
6,031,257 UART: [idev] Sha1 KeyId Algorithm
6,053,728 UART: [idev] --
6,058,419 UART: [ldev] ++
6,059,100 UART: [ldev] CDI.KEYID = 6
6,060,062 UART: [ldev] SUBJECT.KEYID = 5
6,061,240 UART: [ldev] AUTHORITY.KEYID = 7
6,062,425 UART: [ldev] FE.KEYID = 1
6,099,438 UART: [ldev] Erasing FE.KEYID = 1
8,604,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,894 UART: [ldev] --
10,413,542 UART: [fwproc] Wait for Commands...
10,415,796 UART: [fwproc] Recv command 0x46574c44
10,418,099 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,093 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,705 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,835 >>> mbox cmd response: success
14,682,099 UART: [afmc] ++
14,682,826 UART: [afmc] CDI.KEYID = 6
14,684,023 UART: [afmc] SUBJECT.KEYID = 7
14,685,466 UART: [afmc] AUTHORITY.KEYID = 5
17,211,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,933,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,935,489 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,950,573 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,965,741 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,980,617 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,004,966 UART: [afmc] --
19,009,380 UART: [cold-reset] --
19,013,086 UART: [state] Locking Datavault
19,018,346 UART: [state] Locking PCR0, PCR1 and PCR31
19,020,502 UART: [state] Locking ICCM
19,023,470 UART: [exit] Launching FMC @ 0x40000130
19,032,124 UART:
19,032,405 UART: Running Caliptra FMC ...
19,033,439 UART:
19,033,588 UART: [state] CFI Enabled
19,091,516 UART: [fht] FMC Alias Private Key: 7
20,857,471 UART: [art] Extend RT PCRs Done
20,858,699 UART: [art] Lock RT PCRs Done
20,859,918 UART: [art] Populate DV Done
20,865,269 UART: [fht] FMC Alias Private Key: 7
20,866,919 UART: [art] Derive CDI
20,867,738 UART: [art] Store in slot 0x4
20,924,036 UART: [art] Derive Key Pair
20,925,106 UART: [art] Store priv key in slot 0x5
23,388,798 UART: [art] Derive Key Pair - Done
23,401,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,114,954 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,473 UART: [art] PUB.X = 67843C87217DEC2DF9DCF3078E3E184B9C9A937343FFE65BC14B0F57587FED230C69323B98B1E2F153FFFFD4CE418FD4
25,123,754 UART: [art] PUB.Y = 2B002D9E4953CC654E7035E4F0F8552F5DF6371A628A9C1AFF61CCB164FE788B526D98542C1204F4A30CF7CA840D99FE
25,131,014 UART: [art] SIG.R = B1E44A6C14711C164979E3B605B99054803577EA4F6FF2A69054E6F2634E621FDDADFDAB05325442461EA0A270E765E6
25,138,387 UART: [art] SIG.S = EA022EE370E74CDAE2E7236AB3536F038FA71330CE9D332BBFBB168488F27F0E46FE73055F3142D614A5A4E885C62A45
26,117,230 UART: Caliptra RT
26,117,945 UART: [state] CFI Enabled
26,297,950 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,343,088 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,498,603 UART: [rt]cmd =0x41544d4e, len=14344
34,494,502 >>> mbox cmd response data (8 bytes)
34,495,308 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,526,217 UART: [rt]cmd =0x41545348, len=116
34,547,012 >>> mbox cmd response data (12 bytes)
36,604,867 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
36,710,753 UART:
36,711,116 UART: Running Caliptra ROM ...
36,712,175 UART:
36,712,325 UART: [state] CFI Enabled
36,777,656 UART: [state] LifecycleState = Unprovisioned
36,779,710 UART: [state] DebugLocked = No
36,781,440 UART: [state] WD Timer not started. Device not locked for debugging
36,785,127 UART: [kat] SHA2-256
36,974,820 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,985,564 UART: [kat] ++
36,986,019 UART: [kat] sha1
36,997,237 UART: [kat] SHA2-256
37,000,274 UART: [kat] SHA2-384
37,007,569 UART: [kat] SHA2-512-ACC
37,010,137 UART: [kat] ECC-384
39,462,014 UART: [kat] HMAC-384Kdf
39,483,806 UART: [kat] LMS
40,015,395 UART: [kat] --
40,020,434 UART: [update-reset] ++
43,092,511 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,096,266 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
43,511,683 >>> mbox cmd response: success
43,512,056 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,512,979 UART: [update-reset] Copying MAN_2 To MAN_1
43,550,540 UART: [update-reset Success] --
43,554,227 UART: [state] Locking Datavault
43,557,203 UART: [state] Locking PCR0, PCR1 and PCR31
43,559,388 UART: [state] Locking ICCM
43,561,966 UART: [exit] Launching FMC @ 0x40000130
43,570,629 UART:
43,570,862 UART: Running Caliptra FMC ...
43,571,897 UART:
43,572,042 UART: [state] CFI Enabled
43,675,263 UART: [art] Extend RT PCRs Done
43,676,454 UART: [art] Lock RT PCRs Done
43,677,773 UART: [art] Populate DV Done
43,683,289 UART: [fht] FMC Alias Private Key: 7
43,684,997 UART: [art] Derive CDI
43,685,811 UART: [art] Store in slot 0x4
43,744,493 UART: [art] Derive Key Pair
43,745,490 UART: [art] Store priv key in slot 0x5
46,209,136 UART: [art] Derive Key Pair - Done
46,221,974 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,935,139 UART: [art] Erasing AUTHORITY.KEYID = 7
47,936,664 UART: [art] PUB.X = A701CA9870E36F9D4AE4E3FF191072BF59B71EC96098D9FD90B775EA3978E1DE48636DD204CD415077B597C99B427452
47,943,885 UART: [art] PUB.Y = 16D509CD511F1B1A3F4F197ABD6888D48C9B9F85516B2ABA0FBBDC46F58FC52D7FA4ABD0F20BE5A5EE9D6E005319D2D4
47,951,193 UART: [art] SIG.R = 8CE52E64667DEFAABD6121E91A77105E487BC492F46EA49AE06D047413663E07F473EC72C191202E828EEF8EF622BC79
47,958,559 UART: [art] SIG.S = A512417D38DBB9DA98334B6FB7D5943E4FACB93806D1B907B5A4C35E124E72BAD2131AB8CF63D84903ADD9558A561A24
48,936,931 UART: mbox::rt_entry...
48,937,894 UART: ____ _ _ _ ____ _____
48,939,881 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,941,887 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,943,815 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,945,740 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,947,662 UART: |_|
48,948,467 UART:
49,315,634 UART: [rt] Runtime listening for mailbox commands...
49,317,806 >>> mbox cmd response data (48 bytes)
49,318,375 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,320,689 >>> mbox cmd response data (48 bytes)
49,321,597 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,338,452 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,437,903 ready_for_fw is high
3,438,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,831,096 >>> mbox cmd response: success
19,107,934 UART:
19,108,315 UART: Running Caliptra FMC ...
19,109,517 UART:
19,109,699 UART: [state] CFI Enabled
19,176,512 UART: [fht] FMC Alias Private Key: 7
20,943,132 UART: [art] Extend RT PCRs Done
20,944,362 UART: [art] Lock RT PCRs Done
20,945,636 UART: [art] Populate DV Done
20,951,115 UART: [fht] FMC Alias Private Key: 7
20,952,660 UART: [art] Derive CDI
20,953,425 UART: [art] Store in slot 0x4
21,009,057 UART: [art] Derive Key Pair
21,010,065 UART: [art] Store priv key in slot 0x5
23,472,619 UART: [art] Derive Key Pair - Done
23,485,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,197,983 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,516 UART: [art] PUB.X = 342DD99BFDD3A80F842C18FF9CB4200A66E537297AD26A99F07BB89D3441FD3109B55DD6F58EBC2B5F526FB856B4518C
25,206,795 UART: [art] PUB.Y = 26133A2F8990D193796682A5CBAE1F7D04101A7CB0B1A481346E4C161D236DEA9AE63B17A5D39FC057F78BC0DAC5F3C0
25,214,058 UART: [art] SIG.R = F1C22A73506A8747DB649E0EA146921C788912750973F74442A57A383CFB2949BB6047D18A672738A51E6E9A5280F1B1
25,221,427 UART: [art] SIG.S = 9ABF8B41B9CB0607B7C3C228732BB7C86A78061F8D4A5FAE4D96E114108AAA777CCB485104E38EEB324BCA32957CC40E
26,200,202 UART: Caliptra RT
26,200,918 UART: [state] CFI Enabled
26,381,323 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,428,080 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,583,636 UART: [rt]cmd =0x41544d4e, len=14344
34,579,264 >>> mbox cmd response data (8 bytes)
34,579,999 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,610,689 UART: [rt]cmd =0x41545348, len=116
34,631,869 >>> mbox cmd response data (12 bytes)
36,689,210 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,789,510 >>> mbox cmd response: success
43,790,021 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,823,771 UART:
43,824,091 UART: Running Caliptra FMC ...
43,825,130 UART:
43,825,276 UART: [state] CFI Enabled
43,929,244 UART: [art] Extend RT PCRs Done
43,930,537 UART: [art] Lock RT PCRs Done
43,931,757 UART: [art] Populate DV Done
43,937,436 UART: [fht] FMC Alias Private Key: 7
43,938,920 UART: [art] Derive CDI
43,939,684 UART: [art] Store in slot 0x4
43,998,501 UART: [art] Derive Key Pair
43,999,546 UART: [art] Store priv key in slot 0x5
46,462,290 UART: [art] Derive Key Pair - Done
46,475,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,188,595 UART: [art] Erasing AUTHORITY.KEYID = 7
48,190,106 UART: [art] PUB.X = 92B44DF8D7A136AE6C622134A0385AF198EAE77291C13064B857D12D8694DCD2F68D2910300E7C09F64985FD03C146D4
48,197,373 UART: [art] PUB.Y = 9F40D9B923E690026A85F2B732B269A68D7AFC6D1BC3E052732462FE2C8E15F760D6618FC505CA61519A453666E61678
48,204,604 UART: [art] SIG.R = 43A297ABEE552F8B0C08B9C013C6B9375A9C1705A6FC51F7BCAA8B97446BCB8131D8B375A6DAA2827511FA3D400232DF
48,212,006 UART: [art] SIG.S = 47C996BBD2A96ADC65AC9D5A908D341665345F9DCB4A1362A42168011F3AF5A04BD7DBFC9A8DFDD586B60DA7E0290E84
49,190,363 UART: mbox::rt_entry...
49,191,306 UART: ____ _ _ _ ____ _____
49,193,285 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,195,288 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,197,217 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,199,141 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,201,158 UART: |_|
49,201,993 UART:
49,573,654 UART: [rt] Runtime listening for mailbox commands...
49,575,820 >>> mbox cmd response data (48 bytes)
49,576,394 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,578,906 >>> mbox cmd response data (48 bytes)
49,579,809 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,596,722 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
192,496 UART:
192,876 UART: Running Caliptra ROM ...
193,987 UART:
603,649 UART: [state] CFI Enabled
619,668 UART: [state] LifecycleState = Unprovisioned
622,049 UART: [state] DebugLocked = No
624,797 UART: [state] WD Timer not started. Device not locked for debugging
630,060 UART: [kat] SHA2-256
819,951 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,773 UART: [kat] ++
831,382 UART: [kat] sha1
843,331 UART: [kat] SHA2-256
846,339 UART: [kat] SHA2-384
852,262 UART: [kat] SHA2-512-ACC
854,858 UART: [kat] ECC-384
3,298,758 UART: [kat] HMAC-384Kdf
3,310,715 UART: [kat] LMS
3,842,591 UART: [kat] --
3,847,717 UART: [cold-reset] ++
3,850,014 UART: [fht] FHT @ 0x50003400
3,861,280 UART: [idev] ++
3,861,918 UART: [idev] CDI.KEYID = 6
3,863,097 UART: [idev] SUBJECT.KEYID = 7
3,864,165 UART: [idev] UDS.KEYID = 0
3,865,144 ready_for_fw is high
3,865,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,639 UART: [idev] Erasing UDS.KEYID = 0
6,340,903 UART: [idev] Sha1 KeyId Algorithm
6,363,693 UART: [idev] --
6,368,556 UART: [ldev] ++
6,369,290 UART: [ldev] CDI.KEYID = 6
6,370,181 UART: [ldev] SUBJECT.KEYID = 5
6,371,337 UART: [ldev] AUTHORITY.KEYID = 7
6,372,584 UART: [ldev] FE.KEYID = 1
6,382,164 UART: [ldev] Erasing FE.KEYID = 1
8,861,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,883 UART: [ldev] --
10,654,648 UART: [fwproc] Wait for Commands...
10,657,122 UART: [fwproc] Recv command 0x46574c44
10,659,430 UART: [fwproc] Recv'd Img size: 118548 bytes
14,160,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,704 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,359,305 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,920,171 >>> mbox cmd response: success
14,924,709 UART: [afmc] ++
14,925,435 UART: [afmc] CDI.KEYID = 6
14,926,557 UART: [afmc] SUBJECT.KEYID = 7
14,928,109 UART: [afmc] AUTHORITY.KEYID = 5
17,432,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,153,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,155,152 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,170,259 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,185,402 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,200,320 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,224,513 UART: [afmc] --
19,227,793 UART: [cold-reset] --
19,232,316 UART: [state] Locking Datavault
19,238,071 UART: [state] Locking PCR0, PCR1 and PCR31
19,240,236 UART: [state] Locking ICCM
19,242,320 UART: [exit] Launching FMC @ 0x40000130
19,251,006 UART:
19,251,271 UART: Running Caliptra FMC ...
19,252,302 UART:
19,252,455 UART: [state] CFI Enabled
19,260,833 UART: [fht] FMC Alias Private Key: 7
21,026,770 UART: [art] Extend RT PCRs Done
21,028,002 UART: [art] Lock RT PCRs Done
21,029,859 UART: [art] Populate DV Done
21,035,528 UART: [fht] FMC Alias Private Key: 7
21,036,996 UART: [art] Derive CDI
21,037,745 UART: [art] Store in slot 0x4
21,080,638 UART: [art] Derive Key Pair
21,081,642 UART: [art] Store priv key in slot 0x5
23,508,387 UART: [art] Derive Key Pair - Done
23,521,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,811 UART: [art] Erasing AUTHORITY.KEYID = 7
25,229,320 UART: [art] PUB.X = 087AE3ACF93ABE3B8719746C37F5A25EA1975C2D34091B2B985B0E404C9A0406DBD1CBE0DC6DCAB7861F58499B84AAAA
25,236,612 UART: [art] PUB.Y = 270793FE01B1653B83A9D16506C8771A8D05B36342ED25DCB67B42E50423E0B5D09BFD3CDE0A10DFB21F433D65416C80
25,243,878 UART: [art] SIG.R = 6B399BAD9757A041D8ADAFAFA5588934A1258DB5BB15F87F994CCD25A4704CB0236DDAFC13693A8615C43AA40BB3CDD9
25,251,256 UART: [art] SIG.S = 0D51A39D3193F28BF52E93055C68CAC94A78E1906A0CBF1BA66F0851E31E81C86E77FBEDDB459111EC9C0EE548AD30E5
26,230,290 UART: Caliptra RT
26,230,986 UART: [state] CFI Enabled
26,364,075 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,416,678 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,572,390 UART: [rt]cmd =0x41544d4e, len=14344
34,567,751 >>> mbox cmd response data (8 bytes)
34,568,583 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,599,395 UART: [rt]cmd =0x41545348, len=116
34,618,623 >>> mbox cmd response data (12 bytes)
36,680,521 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
36,786,244 UART:
36,786,622 UART: Running Caliptra ROM ...
36,787,680 UART:
36,787,889 UART: [state] CFI Enabled
36,801,320 UART: [state] LifecycleState = Unprovisioned
36,803,261 UART: [state] DebugLocked = No
36,804,458 UART: [state] WD Timer not started. Device not locked for debugging
36,807,554 UART: [kat] SHA2-256
36,997,475 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,008,191 UART: [kat] ++
37,008,720 UART: [kat] sha1
37,019,613 UART: [kat] SHA2-256
37,022,639 UART: [kat] SHA2-384
37,029,143 UART: [kat] SHA2-512-ACC
37,031,729 UART: [kat] ECC-384
39,473,248 UART: [kat] HMAC-384Kdf
39,485,876 UART: [kat] LMS
40,017,533 UART: [kat] --
40,022,365 UART: [update-reset] ++
43,095,054 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,098,497 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
43,513,965 >>> mbox cmd response: success
43,514,343 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,515,608 UART: [update-reset] Copying MAN_2 To MAN_1
43,553,183 UART: [update-reset Success] --
43,558,349 UART: [state] Locking Datavault
43,562,804 UART: [state] Locking PCR0, PCR1 and PCR31
43,565,010 UART: [state] Locking ICCM
43,567,709 UART: [exit] Launching FMC @ 0x40000130
43,576,364 UART:
43,576,606 UART: Running Caliptra FMC ...
43,577,710 UART:
43,577,871 UART: [state] CFI Enabled
43,621,785 UART: [art] Extend RT PCRs Done
43,622,971 UART: [art] Lock RT PCRs Done
43,624,538 UART: [art] Populate DV Done
43,630,274 UART: [fht] FMC Alias Private Key: 7
43,631,816 UART: [art] Derive CDI
43,632,584 UART: [art] Store in slot 0x4
43,675,159 UART: [art] Derive Key Pair
43,676,201 UART: [art] Store priv key in slot 0x5
46,103,237 UART: [art] Derive Key Pair - Done
46,116,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,822,396 UART: [art] Erasing AUTHORITY.KEYID = 7
47,823,903 UART: [art] PUB.X = 78D06F51ADC29892B69C9906D3346FAE0A9C580D5E84D687E4E2614ADCF6E931914ED62C3127535F665A9E9387765D20
47,831,147 UART: [art] PUB.Y = 3AD4D3E860A50BFA7EE3D17AF0B391BD03F91CB9B7BB98E9484F8920E51390F09C337A76DE5290FA459EA838B7AB8881
47,838,405 UART: [art] SIG.R = DEDA200CAB0762ACFADB173A86A9A20C9785DC34A48E6B53B9B8EB4BF7C13A448BDFA66C8A9EE60144714F63722F756A
47,845,830 UART: [art] SIG.S = 873ABA98522DA316B6D865A721704FD1A15C8B1819EC267166ADA51565A54F365860F856BC0F0B448349295ABC20F38E
48,824,674 UART: mbox::rt_entry...
48,825,622 UART: ____ _ _ _ ____ _____
48,827,605 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,829,613 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,831,547 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,833,477 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,835,407 UART: |_|
48,836,243 UART:
49,212,223 UART: [rt] Runtime listening for mailbox commands...
49,214,391 >>> mbox cmd response data (48 bytes)
49,214,970 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,217,303 >>> mbox cmd response data (48 bytes)
49,218,205 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,235,094 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
3,755,327 ready_for_fw is high
3,755,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,051,278 >>> mbox cmd response: success
19,307,091 UART:
19,307,488 UART: Running Caliptra FMC ...
19,308,609 UART:
19,308,767 UART: [state] CFI Enabled
19,316,997 UART: [fht] FMC Alias Private Key: 7
21,082,849 UART: [art] Extend RT PCRs Done
21,084,079 UART: [art] Lock RT PCRs Done
21,085,431 UART: [art] Populate DV Done
21,091,027 UART: [fht] FMC Alias Private Key: 7
21,092,577 UART: [art] Derive CDI
21,093,320 UART: [art] Store in slot 0x4
21,136,085 UART: [art] Derive Key Pair
21,137,157 UART: [art] Store priv key in slot 0x5
23,563,947 UART: [art] Derive Key Pair - Done
23,577,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,283,423 UART: [art] Erasing AUTHORITY.KEYID = 7
25,284,933 UART: [art] PUB.X = 474011CD62C811E077301F74F1CF504C775B1B7A40F7AC6FA0A460E9F199B7982834846EA04F7FCEEACBD83ECDC35618
25,292,235 UART: [art] PUB.Y = 19B8F26595EA79E678AA32E5393E8E9A75EF584375D6F733C5A451A35B4EBB50BFC31E4FB87FDBA03D7084B53E4B0E10
25,299,511 UART: [art] SIG.R = 3411607F9EDF95F23D6354BF7C52B9E64D851883DF9E9D56F7E3BAD802F11F2042118E53EE528AA1897E24423C9CEC44
25,306,885 UART: [art] SIG.S = 98070490CA6A5F88188FA970A9E5C553507AFD6657146DE8A6008CD9F1798B87ED520F3CC38AD197FD93EC4395DF3DEA
26,285,914 UART: Caliptra RT
26,286,609 UART: [state] CFI Enabled
26,419,305 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,470,737 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,626,287 UART: [rt]cmd =0x41544d4e, len=14344
34,621,621 >>> mbox cmd response data (8 bytes)
34,623,373 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,654,059 UART: [rt]cmd =0x41545348, len=116
34,674,240 >>> mbox cmd response data (12 bytes)
36,735,508 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,750,839 >>> mbox cmd response: success
43,751,471 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,785,695 UART:
43,785,988 UART: Running Caliptra FMC ...
43,787,025 UART:
43,787,186 UART: [state] CFI Enabled
43,831,222 UART: [art] Extend RT PCRs Done
43,832,548 UART: [art] Lock RT PCRs Done
43,833,794 UART: [art] Populate DV Done
43,839,481 UART: [fht] FMC Alias Private Key: 7
43,841,133 UART: [art] Derive CDI
43,841,955 UART: [art] Store in slot 0x4
43,884,828 UART: [art] Derive Key Pair
43,885,830 UART: [art] Store priv key in slot 0x5
46,312,784 UART: [art] Derive Key Pair - Done
46,325,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,031,990 UART: [art] Erasing AUTHORITY.KEYID = 7
48,033,515 UART: [art] PUB.X = 89B6B12C7B379864FC665FC4C6EDE174F7805A3E3303C1FF930F8B6D308C514B83E4BBE2D1D6C9C437FBE39B9B10E78A
48,040,778 UART: [art] PUB.Y = 6D1834A0F4869938BCAFDF9FB3AE11CE49E727F3CC859DB4B187F1D7EF2CF7D14BA3E466C0DFF6120771A0940D197FF2
48,048,080 UART: [art] SIG.R = 787C16D96DBA7DBB125131D2D5E344D88A521EC2BF490C06E7F959E1960815543EC11D4C83F2F6BE6E3F04B16305C49E
48,055,438 UART: [art] SIG.S = 1BCE79C89060404C9C78F35D32AD874010C6297B9AFD327BE07FF9DF7E52EB9B4F1C439192BB324BBB262DF75BFC7B8C
49,033,448 UART: mbox::rt_entry...
49,034,398 UART: ____ _ _ _ ____ _____
49,036,400 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,038,434 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,040,383 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,042,325 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,044,190 UART: |_|
49,044,999 UART:
49,415,945 UART: [rt] Runtime listening for mailbox commands...
49,418,120 >>> mbox cmd response data (48 bytes)
49,418,701 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,421,039 >>> mbox cmd response data (48 bytes)
49,421,971 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,438,926 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,583 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,147 UART: [kat] SHA2-256
882,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,193 UART: [kat] ++
886,345 UART: [kat] sha1
890,579 UART: [kat] SHA2-256
892,517 UART: [kat] SHA2-384
895,474 UART: [kat] SHA2-512-ACC
897,375 UART: [kat] ECC-384
902,930 UART: [kat] HMAC-384Kdf
907,578 UART: [kat] LMS
1,475,774 UART: [kat] --
1,476,471 UART: [cold-reset] ++
1,476,863 UART: [fht] Storing FHT @ 0x50003400
1,479,800 UART: [idev] ++
1,479,968 UART: [idev] CDI.KEYID = 6
1,480,328 UART: [idev] SUBJECT.KEYID = 7
1,480,752 UART: [idev] UDS.KEYID = 0
1,481,097 ready_for_fw is high
1,481,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,296 UART: [idev] Erasing UDS.KEYID = 0
1,504,906 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,640 UART: [idev] --
1,514,553 UART: [ldev] ++
1,514,721 UART: [ldev] CDI.KEYID = 6
1,515,084 UART: [ldev] SUBJECT.KEYID = 5
1,515,510 UART: [ldev] AUTHORITY.KEYID = 7
1,515,973 UART: [ldev] FE.KEYID = 1
1,521,305 UART: [ldev] Erasing FE.KEYID = 1
1,546,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,414 UART: [ldev] --
1,585,689 UART: [fwproc] Waiting for Commands...
1,586,424 UART: [fwproc] Received command 0x46574c44
1,587,215 UART: [fwproc] Received Image of size 118548 bytes
2,931,427 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,153 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,371 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,792 >>> mbox cmd response: success
3,132,024 UART: [afmc] ++
3,132,192 UART: [afmc] CDI.KEYID = 6
3,132,554 UART: [afmc] SUBJECT.KEYID = 7
3,132,979 UART: [afmc] AUTHORITY.KEYID = 5
3,168,200 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,694 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,474 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,183 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,066 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,749 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,683 UART: [afmc] --
3,211,711 UART: [cold-reset] --
3,212,537 UART: [state] Locking Datavault
3,213,742 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,346 UART: [state] Locking ICCM
3,214,988 UART: [exit] Launching FMC @ 0x40000130
3,220,318 UART:
3,220,334 UART: Running Caliptra FMC ...
3,220,742 UART:
3,220,796 UART: [state] CFI Enabled
3,231,086 UART: [fht] FMC Alias Private Key: 7
3,349,814 UART: [art] Extend RT PCRs Done
3,350,242 UART: [art] Lock RT PCRs Done
3,351,772 UART: [art] Populate DV Done
3,360,029 UART: [fht] FMC Alias Private Key: 7
3,361,067 UART: [art] Derive CDI
3,361,347 UART: [art] Store in slot 0x4
3,447,085 UART: [art] Derive Key Pair
3,447,445 UART: [art] Store priv key in slot 0x5
3,460,476 UART: [art] Derive Key Pair - Done
3,475,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,679 UART: [art] PUB.X = 461FFEE1A29B5387C6549B7BB2F8CB31C38D74E61BF9A54381573FD3BC48E3903F76DDB7C20B2ABC3C5B633E8C82140C
3,498,457 UART: [art] PUB.Y = B91BC30FCEA58856845E77C5DC703B03C6A83921024DE5D349468FFD22BBCB7DD3F6383E1C04F0441D0FA31AF4B959C3
3,505,404 UART: [art] SIG.R = BE1B37E5C85A03BDA8A6C4123AE29E79589B76ECBB6D13B3BBAA6BD13F5BEF90FF70A9D219490C16A3BAF60620AC2F5D
3,512,191 UART: [art] SIG.S = 8711EB34377991ABDBA0C12B80B41E0B2C8E8D99AA1D92528922E2C0E829872CDE0B3DD14045F59B7AC055A8C89E1657
3,536,087 UART: Caliptra RT
3,536,338 UART: [state] CFI Enabled
3,656,523 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,193 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,555 UART: [rt]cmd =0x41544d4e, len=14344
4,091,004 >>> mbox cmd response data (8 bytes)
4,091,005 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,222 UART: [rt]cmd =0x41545348, len=116
4,143,023 >>> mbox cmd response data (12 bytes)
4,143,024 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,143,882 UART:
4,143,898 UART: Running Caliptra ROM ...
4,144,306 UART:
4,144,360 UART: [state] CFI Enabled
4,147,482 UART: [state] LifecycleState = Unprovisioned
4,148,137 UART: [state] DebugLocked = No
4,148,731 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,150,420 UART: [kat] SHA2-256
4,944,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,948,466 UART: [kat] ++
4,948,618 UART: [kat] sha1
4,952,806 UART: [kat] SHA2-256
4,954,744 UART: [kat] SHA2-384
4,957,381 UART: [kat] SHA2-512-ACC
4,959,281 UART: [kat] ECC-384
4,964,448 UART: [kat] HMAC-384Kdf
4,968,904 UART: [kat] LMS
5,537,100 UART: [kat] --
5,538,019 UART: [update-reset] ++
6,510,536 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,511,714 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,613,407 >>> mbox cmd response: success
6,613,407 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,613,740 UART: [update-reset] Copying MAN_2 To MAN_1
6,621,754 UART: [update-reset Success] --
6,622,723 UART: [state] Locking Datavault
6,623,589 UART: [state] Locking PCR0, PCR1 and PCR31
6,624,193 UART: [state] Locking ICCM
6,624,855 UART: [exit] Launching FMC @ 0x40000130
6,630,185 UART:
6,630,201 UART: Running Caliptra FMC ...
6,630,609 UART:
6,630,663 UART: [state] CFI Enabled
6,719,676 UART: [art] Extend RT PCRs Done
6,720,104 UART: [art] Lock RT PCRs Done
6,721,307 UART: [art] Populate DV Done
6,729,526 UART: [fht] FMC Alias Private Key: 7
6,730,528 UART: [art] Derive CDI
6,730,808 UART: [art] Store in slot 0x4
6,816,218 UART: [art] Derive Key Pair
6,816,578 UART: [art] Store priv key in slot 0x5
6,829,857 UART: [art] Derive Key Pair - Done
6,844,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,860,114 UART: [art] Erasing AUTHORITY.KEYID = 7
6,860,879 UART: [art] PUB.X = 1A66D9E6E368B88D8A899361C5F8BD270AED4A63FD15C5B5EF98424C16B8CA3332E9C1C535F28C9364902B7119C08FE7
6,867,652 UART: [art] PUB.Y = 0F8F8C7998B11AF7AC495CE426170927C20C9FFF197B0DAE02B8B6C5C171732628E33194D8D0744A05FD8672A35FB38A
6,874,588 UART: [art] SIG.R = 1733DF867611F56876D7E20ACF6D06C12D28E731F4CFE87F1F1576924AA476186E4F6256FAA1CE5A4D8ADE33AB176DF4
6,881,362 UART: [art] SIG.S = 25836944CF78D6DFE139B52D49A8992DDA9B712CABDD97947918F201F7D0048B245EA8E389E6D16A88C760ECF6CF7DD6
6,905,688 UART: mbox::rt_entry...
6,906,060 UART: ____ _ _ _ ____ _____
6,906,844 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,907,644 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,908,412 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,909,180 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,909,948 UART: |_|
6,910,260 UART:
7,272,890 UART: [rt] Runtime listening for mailbox commands...
7,274,088 >>> mbox cmd response data (48 bytes)
7,274,089 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,276,876 >>> mbox cmd response data (48 bytes)
7,276,877 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,295,022 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,633 ready_for_fw is high
1,362,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,164 >>> mbox cmd response: success
3,043,039 UART:
3,043,055 UART: Running Caliptra FMC ...
3,043,463 UART:
3,043,517 UART: [state] CFI Enabled
3,054,201 UART: [fht] FMC Alias Private Key: 7
3,172,201 UART: [art] Extend RT PCRs Done
3,172,629 UART: [art] Lock RT PCRs Done
3,173,945 UART: [art] Populate DV Done
3,182,366 UART: [fht] FMC Alias Private Key: 7
3,183,458 UART: [art] Derive CDI
3,183,738 UART: [art] Store in slot 0x4
3,269,544 UART: [art] Derive Key Pair
3,269,904 UART: [art] Store priv key in slot 0x5
3,283,475 UART: [art] Derive Key Pair - Done
3,298,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,521 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,286 UART: [art] PUB.X = C5F129618CE6B0FFA85FC6CFE6E7ACC933E73AD2C90125D74B43C0E39849DBB869D66E9CCACDD3D45F989B441AAF7405
3,321,072 UART: [art] PUB.Y = D5DB66F14DED69FAF1B41EA3E15E75B6FC45DBF0759E541B9698BD6159D88D7AA52C9CFDC8AD0E422438B1628FCD9821
3,328,039 UART: [art] SIG.R = A84FC59E5A93FE6EEC9D9111035293913CF12496D290A4DC5201CE9B041544E6D6DA0EDBB23D264DB76FE94FB1F18A5B
3,334,811 UART: [art] SIG.S = 862A1BE0A123CA3F0F1D83C4D48F6804EFBF0BB23A173899ACA94DA0FFDCFEB1DE1279C3DBDB27D8F0DEFDAB3A41BFCD
3,358,726 UART: Caliptra RT
3,358,977 UART: [state] CFI Enabled
3,478,976 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,479,646 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,866 UART: [rt]cmd =0x41544d4e, len=14344
3,912,779 >>> mbox cmd response data (8 bytes)
3,912,780 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,599 UART: [rt]cmd =0x41545348, len=116
3,964,572 >>> mbox cmd response data (12 bytes)
3,964,573 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,316,184 >>> mbox cmd response: success
6,316,184 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,329,286 UART:
6,329,302 UART: Running Caliptra FMC ...
6,329,710 UART:
6,329,764 UART: [state] CFI Enabled
6,419,007 UART: [art] Extend RT PCRs Done
6,419,435 UART: [art] Lock RT PCRs Done
6,420,656 UART: [art] Populate DV Done
6,428,827 UART: [fht] FMC Alias Private Key: 7
6,429,791 UART: [art] Derive CDI
6,430,071 UART: [art] Store in slot 0x4
6,516,067 UART: [art] Derive Key Pair
6,516,427 UART: [art] Store priv key in slot 0x5
6,529,734 UART: [art] Derive Key Pair - Done
6,544,620 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,560,089 UART: [art] Erasing AUTHORITY.KEYID = 7
6,560,854 UART: [art] PUB.X = BE1F10DE8F1ACA0FFFEBD94B593938B6EB81270BA1529E639352754769DBFCC2ACD39FC343D847AB2FCD8E8B2A373E2B
6,567,642 UART: [art] PUB.Y = FC9872AF91C08E8820449E85D9BFAE5EB63E90C553810AF663AC98961CD6654AFF4BA112759A06942830F0C97AC89D21
6,574,590 UART: [art] SIG.R = 9D4462BE3C948CF4E1199D70A0235B14030D4937E89217A73A3066DDFCA6F50E42C05F3A7FBA3D8DC32A291B5A5B0834
6,581,354 UART: [art] SIG.S = 29B8CCA771FD607C8DA4FFAEC8B4B7389DB81AE83B5EAB1884A4A88531F789026F411A08682D9EFBB386982C567ADB75
6,605,116 UART: mbox::rt_entry...
6,605,488 UART: ____ _ _ _ ____ _____
6,606,272 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,607,072 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,607,840 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,608,608 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,609,376 UART: |_|
6,609,688 UART:
6,972,077 UART: [rt] Runtime listening for mailbox commands...
6,973,275 >>> mbox cmd response data (48 bytes)
6,973,276 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,976,063 >>> mbox cmd response data (48 bytes)
6,976,064 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,994,209 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,190 UART: [kat] SHA2-256
882,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,236 UART: [kat] ++
886,388 UART: [kat] sha1
890,628 UART: [kat] SHA2-256
892,566 UART: [kat] SHA2-384
895,281 UART: [kat] SHA2-512-ACC
897,182 UART: [kat] ECC-384
902,593 UART: [kat] HMAC-384Kdf
907,127 UART: [kat] LMS
1,475,323 UART: [kat] --
1,476,446 UART: [cold-reset] ++
1,476,914 UART: [fht] Storing FHT @ 0x50003400
1,479,745 UART: [idev] ++
1,479,913 UART: [idev] CDI.KEYID = 6
1,480,273 UART: [idev] SUBJECT.KEYID = 7
1,480,697 UART: [idev] UDS.KEYID = 0
1,481,042 ready_for_fw is high
1,481,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,237 UART: [idev] Erasing UDS.KEYID = 0
1,506,415 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,179 UART: [idev] --
1,516,158 UART: [ldev] ++
1,516,326 UART: [ldev] CDI.KEYID = 6
1,516,689 UART: [ldev] SUBJECT.KEYID = 5
1,517,115 UART: [ldev] AUTHORITY.KEYID = 7
1,517,578 UART: [ldev] FE.KEYID = 1
1,522,608 UART: [ldev] Erasing FE.KEYID = 1
1,548,131 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,215 UART: [ldev] --
1,587,674 UART: [fwproc] Waiting for Commands...
1,588,517 UART: [fwproc] Received command 0x46574c44
1,589,308 UART: [fwproc] Received Image of size 118548 bytes
2,933,318 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,548 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,766 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,973 >>> mbox cmd response: success
3,133,077 UART: [afmc] ++
3,133,245 UART: [afmc] CDI.KEYID = 6
3,133,607 UART: [afmc] SUBJECT.KEYID = 7
3,134,032 UART: [afmc] AUTHORITY.KEYID = 5
3,168,629 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,737 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,517 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,226 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,109 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,792 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,770 UART: [afmc] --
3,211,772 UART: [cold-reset] --
3,212,642 UART: [state] Locking Datavault
3,213,669 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,273 UART: [state] Locking ICCM
3,214,939 UART: [exit] Launching FMC @ 0x40000130
3,220,269 UART:
3,220,285 UART: Running Caliptra FMC ...
3,220,693 UART:
3,220,836 UART: [state] CFI Enabled
3,231,492 UART: [fht] FMC Alias Private Key: 7
3,350,742 UART: [art] Extend RT PCRs Done
3,351,170 UART: [art] Lock RT PCRs Done
3,352,912 UART: [art] Populate DV Done
3,361,113 UART: [fht] FMC Alias Private Key: 7
3,362,103 UART: [art] Derive CDI
3,362,383 UART: [art] Store in slot 0x4
3,448,141 UART: [art] Derive Key Pair
3,448,501 UART: [art] Store priv key in slot 0x5
3,461,930 UART: [art] Derive Key Pair - Done
3,476,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,704 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,469 UART: [art] PUB.X = 7963A0A93DBB950066C1B7FCF60ADA7FE7EA15790FB765E113AD497E72C7DD4C9FE2C0315B41132ED94C739D2E49C1EF
3,499,227 UART: [art] PUB.Y = 36B7049599CADCCBE5BB2AEC1776E1A212807F1DAB6F9E9E21DDFC8EC910FB11C1885FA9AF30B9A4A106C6667863D17F
3,506,191 UART: [art] SIG.R = C618406A882CBD721F7EFF76E60AA21CF36054179FDDC598E24BABFB2B2A2109EE2DD4B8BF345A710277BBA5E0C52907
3,512,965 UART: [art] SIG.S = C0BB3F4E7DB3E86DAB097492858EE2925E802C94016992B63A233EC9086825C82ED19BD2EE1F1F026FD7295C08B72B39
3,536,856 UART: Caliptra RT
3,537,199 UART: [state] CFI Enabled
3,657,270 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,940 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,188 UART: [rt]cmd =0x41544d4e, len=14344
4,090,929 >>> mbox cmd response data (8 bytes)
4,090,930 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,001 UART: [rt]cmd =0x41545348, len=116
4,143,110 >>> mbox cmd response data (12 bytes)
4,143,111 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,144,205 UART:
4,144,221 UART: Running Caliptra ROM ...
4,144,629 UART:
4,144,770 UART: [state] CFI Enabled
4,147,876 UART: [state] LifecycleState = Unprovisioned
4,148,531 UART: [state] DebugLocked = No
4,149,055 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,150,576 UART: [kat] SHA2-256
4,944,507 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,948,622 UART: [kat] ++
4,948,774 UART: [kat] sha1
4,953,168 UART: [kat] SHA2-256
4,955,106 UART: [kat] SHA2-384
4,957,805 UART: [kat] SHA2-512-ACC
4,959,705 UART: [kat] ECC-384
4,965,588 UART: [kat] HMAC-384Kdf
4,970,132 UART: [kat] LMS
5,538,328 UART: [kat] --
5,539,119 UART: [update-reset] ++
6,512,826 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,514,038 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,615,731 >>> mbox cmd response: success
6,615,731 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,615,964 UART: [update-reset] Copying MAN_2 To MAN_1
6,623,978 UART: [update-reset Success] --
6,624,885 UART: [state] Locking Datavault
6,625,703 UART: [state] Locking PCR0, PCR1 and PCR31
6,626,307 UART: [state] Locking ICCM
6,626,773 UART: [exit] Launching FMC @ 0x40000130
6,632,103 UART:
6,632,119 UART: Running Caliptra FMC ...
6,632,527 UART:
6,632,670 UART: [state] CFI Enabled
6,722,379 UART: [art] Extend RT PCRs Done
6,722,807 UART: [art] Lock RT PCRs Done
6,723,994 UART: [art] Populate DV Done
6,732,275 UART: [fht] FMC Alias Private Key: 7
6,733,255 UART: [art] Derive CDI
6,733,535 UART: [art] Store in slot 0x4
6,819,085 UART: [art] Derive Key Pair
6,819,445 UART: [art] Store priv key in slot 0x5
6,832,806 UART: [art] Derive Key Pair - Done
6,847,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,863,096 UART: [art] Erasing AUTHORITY.KEYID = 7
6,863,861 UART: [art] PUB.X = 914117856DE47D639489C7FF067364EAAD55975E07711B27471851622F44549E5765434588BCFCF3522826BF4EDF5A7E
6,870,615 UART: [art] PUB.Y = 6F180DCF461220E972721070CFA6ED4CE9A0DC4B68E60DB1B210CADC34474C5435A9CD7B7ABDAD6BA28A1D50BC8732AC
6,877,581 UART: [art] SIG.R = 2116CE8C60E09985CF90E56C2E2F1A3D3596F6165414E3A1D120042ADFA5410602F7BD6DA3587A0AE0BB47F5A8B41CC8
6,884,347 UART: [art] SIG.S = 183D5C7EC1C68F4833E121F142E13F13E92081E275C4E5ED7E9BCEBE843F9B5F237443EEFF0B6D3C5710A8D149668CE8
6,907,994 UART: mbox::rt_entry...
6,908,366 UART: ____ _ _ _ ____ _____
6,909,150 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,909,950 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,910,718 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,911,486 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,912,254 UART: |_|
6,912,566 UART:
7,274,466 UART: [rt] Runtime listening for mailbox commands...
7,275,664 >>> mbox cmd response data (48 bytes)
7,275,665 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,278,452 >>> mbox cmd response data (48 bytes)
7,278,453 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,296,598 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,222 ready_for_fw is high
1,362,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,901 >>> mbox cmd response: success
3,042,500 UART:
3,042,516 UART: Running Caliptra FMC ...
3,042,924 UART:
3,043,067 UART: [state] CFI Enabled
3,053,513 UART: [fht] FMC Alias Private Key: 7
3,172,819 UART: [art] Extend RT PCRs Done
3,173,247 UART: [art] Lock RT PCRs Done
3,174,783 UART: [art] Populate DV Done
3,182,922 UART: [fht] FMC Alias Private Key: 7
3,184,022 UART: [art] Derive CDI
3,184,302 UART: [art] Store in slot 0x4
3,269,730 UART: [art] Derive Key Pair
3,270,090 UART: [art] Store priv key in slot 0x5
3,283,417 UART: [art] Derive Key Pair - Done
3,298,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,281 UART: [art] PUB.X = 6D2EA72F44B55FE988648023AF26DE58517FE8CBD9C831971186DCC47CDAC3130F4DE7CC84C37086B84C8EC4E966A667
3,321,058 UART: [art] PUB.Y = 968192168F72F0AC50BE8F330B15DF1536EF88757CCAA3642D358B7775207E4F30F209D76D1E2806CC88E2D9800DF9F2
3,327,996 UART: [art] SIG.R = 0C96F8CFD8B23A1A2EEC8901DF33159FC4EC3DEA864EC9500F6613E724D3C1CF04B5644A24F8AC0602CBB8F1AC6EC561
3,334,768 UART: [art] SIG.S = 8FADD3BEB92837D36CB9D27029DFF0499AEE24EA08888C87D36C0873F283591C3775D4EF3BA93E7CA1B22B3A4A6DAE51
3,358,666 UART: Caliptra RT
3,359,009 UART: [state] CFI Enabled
3,479,993 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,480,663 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,827 UART: [rt]cmd =0x41544d4e, len=14344
3,914,032 >>> mbox cmd response data (8 bytes)
3,914,033 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,862 UART: [rt]cmd =0x41545348, len=116
3,966,365 >>> mbox cmd response data (12 bytes)
3,966,366 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,318,162 >>> mbox cmd response: success
6,318,162 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,331,118 UART:
6,331,134 UART: Running Caliptra FMC ...
6,331,542 UART:
6,331,685 UART: [state] CFI Enabled
6,421,368 UART: [art] Extend RT PCRs Done
6,421,796 UART: [art] Lock RT PCRs Done
6,422,801 UART: [art] Populate DV Done
6,430,874 UART: [fht] FMC Alias Private Key: 7
6,432,002 UART: [art] Derive CDI
6,432,282 UART: [art] Store in slot 0x4
6,518,126 UART: [art] Derive Key Pair
6,518,486 UART: [art] Store priv key in slot 0x5
6,531,585 UART: [art] Derive Key Pair - Done
6,546,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,561,894 UART: [art] Erasing AUTHORITY.KEYID = 7
6,562,659 UART: [art] PUB.X = 1DA1FFAF0EC86579F782369206AFB532AACDE7EC92D595D6AF0153CA97DF92DA5AF73FCE388B898AAB6878C4AE791967
6,569,440 UART: [art] PUB.Y = 8281F3D266A9149C4BB1882EA3C2C37F53409E2F48953A3CC77DC81F42635EEBBE98CD324F919DB5224E1F5B09F011FC
6,576,395 UART: [art] SIG.R = 57E0D563231CBA013D904BBFC7E147B427FC61966DD4B7C73E30AA5BFDFCF2C8D83DC37B5DB2972895EFD8CCDA87703F
6,583,184 UART: [art] SIG.S = B8749D25DD4DE6416B7C7CA272BE1B36B1DC0FB709FCA09CA3D03CD5487F9F920A74759B6CE3A0D7DB89FC7E64C5BC03
6,606,794 UART: mbox::rt_entry...
6,607,166 UART: ____ _ _ _ ____ _____
6,607,950 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,608,750 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,609,518 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,610,286 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,611,054 UART: |_|
6,611,366 UART:
6,979,507 UART: [rt] Runtime listening for mailbox commands...
6,980,705 >>> mbox cmd response data (48 bytes)
6,980,706 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,983,493 >>> mbox cmd response data (48 bytes)
6,983,494 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,001,639 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,702 UART: [state] LifecycleState = Unprovisioned
86,357 UART: [state] DebugLocked = No
86,987 UART: [state] WD Timer not started. Device not locked for debugging
88,248 UART: [kat] SHA2-256
891,798 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,902 UART: [kat] ++
896,054 UART: [kat] sha1
900,308 UART: [kat] SHA2-256
902,248 UART: [kat] SHA2-384
904,983 UART: [kat] SHA2-512-ACC
906,884 UART: [kat] ECC-384
916,649 UART: [kat] HMAC-384Kdf
921,371 UART: [kat] LMS
1,169,683 UART: [kat] --
1,170,614 UART: [cold-reset] ++
1,171,018 UART: [fht] FHT @ 0x50003400
1,173,510 UART: [idev] ++
1,173,678 UART: [idev] CDI.KEYID = 6
1,174,039 UART: [idev] SUBJECT.KEYID = 7
1,174,464 UART: [idev] UDS.KEYID = 0
1,174,810 ready_for_fw is high
1,174,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,297 UART: [idev] Erasing UDS.KEYID = 0
1,199,599 UART: [idev] Sha1 KeyId Algorithm
1,208,381 UART: [idev] --
1,209,566 UART: [ldev] ++
1,209,734 UART: [ldev] CDI.KEYID = 6
1,210,098 UART: [ldev] SUBJECT.KEYID = 5
1,210,525 UART: [ldev] AUTHORITY.KEYID = 7
1,210,988 UART: [ldev] FE.KEYID = 1
1,216,166 UART: [ldev] Erasing FE.KEYID = 1
1,242,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,368 UART: [ldev] --
1,281,603 UART: [fwproc] Wait for Commands...
1,282,420 UART: [fwproc] Recv command 0x46574c44
1,283,153 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,716 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,891 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,088 >>> mbox cmd response: success
2,826,290 UART: [afmc] ++
2,826,458 UART: [afmc] CDI.KEYID = 6
2,826,821 UART: [afmc] SUBJECT.KEYID = 7
2,827,247 UART: [afmc] AUTHORITY.KEYID = 5
2,862,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,385 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,134 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,844 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,725 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,426 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,025 UART: [afmc] --
2,906,048 UART: [cold-reset] --
2,906,930 UART: [state] Locking Datavault
2,908,291 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,895 UART: [state] Locking ICCM
2,909,393 UART: [exit] Launching FMC @ 0x40000130
2,914,723 UART:
2,914,739 UART: Running Caliptra FMC ...
2,915,147 UART:
2,915,201 UART: [state] CFI Enabled
2,925,829 UART: [fht] FMC Alias Private Key: 7
3,045,311 UART: [art] Extend RT PCRs Done
3,045,739 UART: [art] Lock RT PCRs Done
3,047,227 UART: [art] Populate DV Done
3,055,668 UART: [fht] FMC Alias Private Key: 7
3,056,816 UART: [art] Derive CDI
3,057,096 UART: [art] Store in slot 0x4
3,142,783 UART: [art] Derive Key Pair
3,143,143 UART: [art] Store priv key in slot 0x5
3,156,297 UART: [art] Derive Key Pair - Done
3,171,151 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,867 UART: [art] PUB.X = 9EC78569D8E2BC4F3025458BF4C5522A1DE71FC9B8CA200F9CF0F68832ED17A6C1CA749413ACDD3C9D00BA4F1A689F16
3,193,628 UART: [art] PUB.Y = 0BD20DBBC179DA31CFC1F9EFBB1FCE38A04E5EE10A0E78FAB5DAFAD736E6D5346B603FAFD6196290BC9856F8ADD0136C
3,200,598 UART: [art] SIG.R = B4828A7355D60595365B323F08994DDF438CD77EF74FD471EDD4A36B85410A90CE9AD3BA0D4011C05F14AC3528FEAD64
3,207,364 UART: [art] SIG.S = 6C8EFF5670F005653EAFABC19FE4947A91939A3D21F9CB69BD796FA0AA81A4AC6C3F7669CA6491E3068FBDC3D0344969
3,231,586 UART: Caliptra RT
3,231,837 UART: [state] CFI Enabled
3,351,790 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,460 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,688 UART: [rt]cmd =0x41544d4e, len=14344
3,785,689 >>> mbox cmd response data (8 bytes)
3,785,690 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,921 UART: [rt]cmd =0x41545348, len=116
3,837,192 >>> mbox cmd response data (12 bytes)
3,837,193 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,804 UART:
3,837,820 UART: Running Caliptra ROM ...
3,838,228 UART:
3,838,283 UART: [state] CFI Enabled
3,840,205 UART: [state] LifecycleState = Unprovisioned
3,840,860 UART: [state] DebugLocked = No
3,841,452 UART: [state] WD Timer not started. Device not locked for debugging
3,842,588 UART: [kat] SHA2-256
4,646,138 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,650,242 UART: [kat] ++
4,650,394 UART: [kat] sha1
4,654,846 UART: [kat] SHA2-256
4,656,786 UART: [kat] SHA2-384
4,659,619 UART: [kat] SHA2-512-ACC
4,661,519 UART: [kat] ECC-384
4,671,034 UART: [kat] HMAC-384Kdf
4,675,718 UART: [kat] LMS
4,924,030 UART: [kat] --
4,925,062 UART: [update-reset] ++
5,874,888 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,875,961 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,977,602 >>> mbox cmd response: success
5,977,602 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,977,737 UART: [update-reset] Copying MAN_2 To MAN_1
5,985,751 UART: [update-reset Success] --
5,986,710 UART: [state] Locking Datavault
5,987,640 UART: [state] Locking PCR0, PCR1 and PCR31
5,988,244 UART: [state] Locking ICCM
5,988,870 UART: [exit] Launching FMC @ 0x40000130
5,994,200 UART:
5,994,216 UART: Running Caliptra FMC ...
5,994,624 UART:
5,994,678 UART: [state] CFI Enabled
6,083,613 UART: [art] Extend RT PCRs Done
6,084,041 UART: [art] Lock RT PCRs Done
6,085,580 UART: [art] Populate DV Done
6,093,789 UART: [fht] FMC Alias Private Key: 7
6,094,789 UART: [art] Derive CDI
6,095,069 UART: [art] Store in slot 0x4
6,180,348 UART: [art] Derive Key Pair
6,180,708 UART: [art] Store priv key in slot 0x5
6,194,006 UART: [art] Derive Key Pair - Done
6,208,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,224,210 UART: [art] Erasing AUTHORITY.KEYID = 7
6,224,975 UART: [art] PUB.X = 3AE028D3463C05E2893095281BFBD8921CD8BD5DC6FA36A24A8BB22A644FEEF01B66F19492D07E6309E0785EBEBE0283
6,231,746 UART: [art] PUB.Y = FA9C47B64F56871EAD42FAD5F2178CE3ADA28334D997315B354237AD2D77B9E45B1559482DE03ABCEEFFCA41780F874E
6,238,707 UART: [art] SIG.R = 289E5303DB71DD3C9374B98FA8CA6CF7FE2134291EFEFFD8CB906AB3B694CD437106B56B25C3EFE871B519AC02E5178D
6,245,484 UART: [art] SIG.S = 3099F86039B85D33AA91FE672084ABB246B4E0BD1795B4A35588115E0B5F3A10F8644A383ED03331AC1623143760D718
6,269,109 UART: mbox::rt_entry...
6,269,481 UART: ____ _ _ _ ____ _____
6,270,265 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,271,065 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,271,833 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,272,601 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,273,369 UART: |_|
6,273,681 UART:
6,637,274 UART: [rt] Runtime listening for mailbox commands...
6,638,472 >>> mbox cmd response data (48 bytes)
6,638,473 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,641,260 >>> mbox cmd response data (48 bytes)
6,641,261 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,659,406 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,464 ready_for_fw is high
1,059,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,270 >>> mbox cmd response: success
2,740,897 UART:
2,740,913 UART: Running Caliptra FMC ...
2,741,321 UART:
2,741,375 UART: [state] CFI Enabled
2,751,993 UART: [fht] FMC Alias Private Key: 7
2,870,655 UART: [art] Extend RT PCRs Done
2,871,083 UART: [art] Lock RT PCRs Done
2,872,663 UART: [art] Populate DV Done
2,880,816 UART: [fht] FMC Alias Private Key: 7
2,881,950 UART: [art] Derive CDI
2,882,230 UART: [art] Store in slot 0x4
2,967,715 UART: [art] Derive Key Pair
2,968,075 UART: [art] Store priv key in slot 0x5
2,981,477 UART: [art] Derive Key Pair - Done
2,996,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,468 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,233 UART: [art] PUB.X = 66556A74A75D99B78D038701A2D902CF235E67BC78EE3F40277E6952F0C97A34BDA3A02DDD01A14C719983EAC63746BE
3,018,995 UART: [art] PUB.Y = 22088DE1766B48BF9E8A5A16C6D0C53DAC4A71259E211D5DDA280FFC91BAF1A5190085CDE0BF8210D6B54C10F7FF7D04
3,025,930 UART: [art] SIG.R = 7E6847EAA52A33637C7F680CC13C24B5667DF6E8961C3D7F177BCBD3C79D23E22E082F801AA3D461F9EA095DA15A8EFE
3,032,705 UART: [art] SIG.S = 04CFBC6F7A652141FD113D8A24AA930D129D01583646452F3E379AF372CF4DF3CECA228BF73040C607D1610F8901CED4
3,057,119 UART: Caliptra RT
3,057,370 UART: [state] CFI Enabled
3,176,998 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,668 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,778 UART: [rt]cmd =0x41544d4e, len=14344
3,610,309 >>> mbox cmd response data (8 bytes)
3,610,310 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,313 UART: [rt]cmd =0x41545348, len=116
3,662,188 >>> mbox cmd response data (12 bytes)
3,662,189 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,688,042 >>> mbox cmd response: success
5,688,042 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,701,597 UART:
5,701,613 UART: Running Caliptra FMC ...
5,702,021 UART:
5,702,075 UART: [state] CFI Enabled
5,790,906 UART: [art] Extend RT PCRs Done
5,791,334 UART: [art] Lock RT PCRs Done
5,792,711 UART: [art] Populate DV Done
5,801,042 UART: [fht] FMC Alias Private Key: 7
5,802,204 UART: [art] Derive CDI
5,802,484 UART: [art] Store in slot 0x4
5,888,169 UART: [art] Derive Key Pair
5,888,529 UART: [art] Store priv key in slot 0x5
5,902,059 UART: [art] Derive Key Pair - Done
5,916,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,932,120 UART: [art] Erasing AUTHORITY.KEYID = 7
5,932,885 UART: [art] PUB.X = 3752FE9DCB7658E7D15D1105C862C8218313BD171AAA100F8BEE89E58ABB52F6ABC663163F7A52184B2D938820E48CC3
5,939,655 UART: [art] PUB.Y = B5022C35D12FCF2F38BAC957EF47C44C00D0487AE70EBE6DBD99E8BD4150568CB308E1171311B440F55C82D32B584C57
5,946,582 UART: [art] SIG.R = CB6CB73DDCBE223EFF2DC270A00167518B32BCE8D8D5DF7BC5918EEAD93C95047945A0236D4A898D897C21051535AE1F
5,953,357 UART: [art] SIG.S = 237ECD256D789D541F30232C7AEABBB8E090A594A582384ECF71676031C5EE000C369FA0CEABD00A84F4FB07C07D023A
5,976,711 UART: mbox::rt_entry...
5,977,083 UART: ____ _ _ _ ____ _____
5,977,867 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,978,667 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,979,435 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,980,203 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,980,971 UART: |_|
5,981,283 UART:
6,341,957 UART: [rt] Runtime listening for mailbox commands...
6,343,155 >>> mbox cmd response data (48 bytes)
6,343,156 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,345,943 >>> mbox cmd response data (48 bytes)
6,345,944 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,364,089 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,007 UART: [state] LifecycleState = Unprovisioned
85,662 UART: [state] DebugLocked = No
86,270 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,223 UART: [kat] ++
895,375 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,300 UART: [kat] SHA2-512-ACC
906,201 UART: [kat] ECC-384
916,028 UART: [kat] HMAC-384Kdf
920,710 UART: [kat] LMS
1,169,022 UART: [kat] --
1,169,835 UART: [cold-reset] ++
1,170,351 UART: [fht] FHT @ 0x50003400
1,173,139 UART: [idev] ++
1,173,307 UART: [idev] CDI.KEYID = 6
1,173,668 UART: [idev] SUBJECT.KEYID = 7
1,174,093 UART: [idev] UDS.KEYID = 0
1,174,439 ready_for_fw is high
1,174,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,078 UART: [idev] Erasing UDS.KEYID = 0
1,198,992 UART: [idev] Sha1 KeyId Algorithm
1,207,922 UART: [idev] --
1,208,805 UART: [ldev] ++
1,208,973 UART: [ldev] CDI.KEYID = 6
1,209,337 UART: [ldev] SUBJECT.KEYID = 5
1,209,764 UART: [ldev] AUTHORITY.KEYID = 7
1,210,227 UART: [ldev] FE.KEYID = 1
1,215,801 UART: [ldev] Erasing FE.KEYID = 1
1,242,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,088 UART: [fwproc] Wait for Commands...
1,282,751 UART: [fwproc] Recv command 0x46574c44
1,283,484 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,746 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,921 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,224 >>> mbox cmd response: success
2,827,318 UART: [afmc] ++
2,827,486 UART: [afmc] CDI.KEYID = 6
2,827,849 UART: [afmc] SUBJECT.KEYID = 7
2,828,275 UART: [afmc] AUTHORITY.KEYID = 5
2,863,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,195 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,944 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,654 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,535 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,236 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,049 UART: [afmc] --
2,907,026 UART: [cold-reset] --
2,908,116 UART: [state] Locking Datavault
2,909,367 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,971 UART: [state] Locking ICCM
2,910,493 UART: [exit] Launching FMC @ 0x40000130
2,915,823 UART:
2,915,839 UART: Running Caliptra FMC ...
2,916,247 UART:
2,916,390 UART: [state] CFI Enabled
2,926,798 UART: [fht] FMC Alias Private Key: 7
3,046,262 UART: [art] Extend RT PCRs Done
3,046,690 UART: [art] Lock RT PCRs Done
3,047,862 UART: [art] Populate DV Done
3,056,151 UART: [fht] FMC Alias Private Key: 7
3,057,249 UART: [art] Derive CDI
3,057,529 UART: [art] Store in slot 0x4
3,143,088 UART: [art] Derive Key Pair
3,143,448 UART: [art] Store priv key in slot 0x5
3,156,394 UART: [art] Derive Key Pair - Done
3,171,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,034 UART: [art] PUB.X = FF84C33F33BCCDE2D8168EFDC5C4A93B7523F6D0E5E4096DC31C674211080C8648429468C98F4CBE3889A3BA3DD26648
3,194,803 UART: [art] PUB.Y = B0CE9F39E44C61A807B4B8078E5F99223C5A74D620FC4C770FFE0FD3B1339A3BD3CB2A2B469924D12EB02B8BB6EB3C4C
3,201,759 UART: [art] SIG.R = CAB5E952D1088ADA92B0AEC7BF4415A568AA150A0DD0A686931B6EFA2F775C5D392B55463671ABBDB59EACC57A061C39
3,208,535 UART: [art] SIG.S = ED1106BC6D1A70423F3023C28E55AC6B73D53785C9BF0BD773AA2A4F00F0834DFC082A6A94B2FC084BC0507DE0E0BE7E
3,231,837 UART: Caliptra RT
3,232,180 UART: [state] CFI Enabled
3,352,624 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,294 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,518 UART: [rt]cmd =0x41544d4e, len=14344
3,786,935 >>> mbox cmd response data (8 bytes)
3,786,936 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,909 UART: [rt]cmd =0x41545348, len=116
3,838,976 >>> mbox cmd response data (12 bytes)
3,838,977 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,746 UART:
3,839,762 UART: Running Caliptra ROM ...
3,840,170 UART:
3,840,312 UART: [state] CFI Enabled
3,843,212 UART: [state] LifecycleState = Unprovisioned
3,843,867 UART: [state] DebugLocked = No
3,844,603 UART: [state] WD Timer not started. Device not locked for debugging
3,845,827 UART: [kat] SHA2-256
4,649,377 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,653,481 UART: [kat] ++
4,653,633 UART: [kat] sha1
4,657,783 UART: [kat] SHA2-256
4,659,723 UART: [kat] SHA2-384
4,662,330 UART: [kat] SHA2-512-ACC
4,664,230 UART: [kat] ECC-384
4,674,123 UART: [kat] HMAC-384Kdf
4,678,671 UART: [kat] LMS
4,926,983 UART: [kat] --
4,927,951 UART: [update-reset] ++
5,877,609 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,878,650 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,980,291 >>> mbox cmd response: success
5,980,291 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,980,468 UART: [update-reset] Copying MAN_2 To MAN_1
5,988,482 UART: [update-reset Success] --
5,989,191 UART: [state] Locking Datavault
5,989,907 UART: [state] Locking PCR0, PCR1 and PCR31
5,990,511 UART: [state] Locking ICCM
5,991,059 UART: [exit] Launching FMC @ 0x40000130
5,996,389 UART:
5,996,405 UART: Running Caliptra FMC ...
5,996,813 UART:
5,996,956 UART: [state] CFI Enabled
6,086,613 UART: [art] Extend RT PCRs Done
6,087,041 UART: [art] Lock RT PCRs Done
6,088,298 UART: [art] Populate DV Done
6,096,627 UART: [fht] FMC Alias Private Key: 7
6,097,603 UART: [art] Derive CDI
6,097,883 UART: [art] Store in slot 0x4
6,183,670 UART: [art] Derive Key Pair
6,184,030 UART: [art] Store priv key in slot 0x5
6,197,474 UART: [art] Derive Key Pair - Done
6,212,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,227,669 UART: [art] Erasing AUTHORITY.KEYID = 7
6,228,434 UART: [art] PUB.X = 79C075E518932CFD2F3EC5A65C0FAC27DC1DC77682B558F67A5084A118DF90936A95FAECAB72AE43BBCD8E409CC2B85A
6,235,221 UART: [art] PUB.Y = 048708CF424B64B3BC12F8FE01D0B0F986EDE05BF6092C8155713A5A18E5235ED76E7D4461B5DA780197E7E96A895DA7
6,242,160 UART: [art] SIG.R = 4EEF4FE95DB87A4089ABD636BDFC81ECF97A6D027E02B0ED79D341EF41066BEF4C7F48C3487451E4C7661FBCCB636F14
6,248,941 UART: [art] SIG.S = D07ED39AE5BB4A047A61F1310E90D2A2C548739B4A664D6DB0CB46774E6D3CDF1DF4862B5CF5479F93264EEDA0EA1680
6,272,265 UART: mbox::rt_entry...
6,272,637 UART: ____ _ _ _ ____ _____
6,273,421 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,274,221 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,274,989 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,275,757 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,276,525 UART: |_|
6,276,837 UART:
6,637,875 UART: [rt] Runtime listening for mailbox commands...
6,639,073 >>> mbox cmd response data (48 bytes)
6,639,074 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,641,861 >>> mbox cmd response data (48 bytes)
6,641,862 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,660,007 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,787 ready_for_fw is high
1,059,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,211 >>> mbox cmd response: success
2,742,320 UART:
2,742,336 UART: Running Caliptra FMC ...
2,742,744 UART:
2,742,887 UART: [state] CFI Enabled
2,753,455 UART: [fht] FMC Alias Private Key: 7
2,872,761 UART: [art] Extend RT PCRs Done
2,873,189 UART: [art] Lock RT PCRs Done
2,874,621 UART: [art] Populate DV Done
2,883,028 UART: [fht] FMC Alias Private Key: 7
2,884,128 UART: [art] Derive CDI
2,884,408 UART: [art] Store in slot 0x4
2,969,877 UART: [art] Derive Key Pair
2,970,237 UART: [art] Store priv key in slot 0x5
2,983,725 UART: [art] Derive Key Pair - Done
2,998,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,125 UART: [art] PUB.X = 02DB27978C6B7DF75DE77671FFCE91EE323C4B1EE718F9B1F6D33308059CBDDF993A7B4C7D48121E710FF1481367F176
3,021,891 UART: [art] PUB.Y = 1C92D0726E63AE0110D5F3F0CEA67CAE798AA6B7174F3717BE7DC70D4CD83636302825236FB426082A9F45C4A9E05409
3,028,831 UART: [art] SIG.R = 47CAE002BD30A89851472E875E6BE769EBCC61288551F7BEE24FC3999C4D67B884A34105F88CC1E607585C11B2B44F6D
3,035,596 UART: [art] SIG.S = 428300EBDDF085806B678F6A317D26F8AF9DAD309A41A0573153A1FFCDB947FD238A9FDE415F03E4C6AE2441C879A8A6
3,058,957 UART: Caliptra RT
3,059,300 UART: [state] CFI Enabled
3,179,244 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,179,914 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,196 UART: [rt]cmd =0x41544d4e, len=14344
3,613,333 >>> mbox cmd response data (8 bytes)
3,613,334 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,719 UART: [rt]cmd =0x41545348, len=116
3,665,588 >>> mbox cmd response data (12 bytes)
3,665,589 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,693,523 >>> mbox cmd response: success
5,693,523 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,707,274 UART:
5,707,290 UART: Running Caliptra FMC ...
5,707,698 UART:
5,707,841 UART: [state] CFI Enabled
5,796,906 UART: [art] Extend RT PCRs Done
5,797,334 UART: [art] Lock RT PCRs Done
5,798,651 UART: [art] Populate DV Done
5,806,838 UART: [fht] FMC Alias Private Key: 7
5,807,800 UART: [art] Derive CDI
5,808,080 UART: [art] Store in slot 0x4
5,893,881 UART: [art] Derive Key Pair
5,894,241 UART: [art] Store priv key in slot 0x5
5,907,377 UART: [art] Derive Key Pair - Done
5,922,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,937,471 UART: [art] Erasing AUTHORITY.KEYID = 7
5,938,236 UART: [art] PUB.X = DADF4EB83B751C4D36CF271FCF60AEDE8652FB61B49F4B098ABCE672B8A1160479FD4C9F0CCB11DA2F57DE722255AB42
5,945,021 UART: [art] PUB.Y = AC5CF7899BB58EE9180085955E02411353E42588318F6C74CE997E57065B4A530548A195814BA885B522324C69B0E0DC
5,951,930 UART: [art] SIG.R = 821459BA2D1822B546BE9CB85BD834876B38EC9522BC17780CC12BB04C47DBA208DB58FBCCA9419BED1C41965AE7B822
5,958,706 UART: [art] SIG.S = E05A2818C80AAA1BEB3385C1E8221D4376199EBFD5B8BBE0F78198A083420106616F32CAD0D59264C6A65F501467DC6A
5,982,781 UART: mbox::rt_entry...
5,983,153 UART: ____ _ _ _ ____ _____
5,983,937 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,984,737 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,985,505 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,986,273 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,987,041 UART: |_|
5,987,353 UART:
6,352,970 UART: [rt] Runtime listening for mailbox commands...
6,354,168 >>> mbox cmd response data (48 bytes)
6,354,169 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,356,956 >>> mbox cmd response data (48 bytes)
6,356,957 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,375,102 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,705 UART: [state] WD Timer not started. Device not locked for debugging
87,880 UART: [kat] SHA2-256
893,530 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,655 UART: [kat] ++
897,807 UART: [kat] sha1
902,267 UART: [kat] SHA2-256
904,207 UART: [kat] SHA2-384
906,958 UART: [kat] SHA2-512-ACC
908,859 UART: [kat] ECC-384
918,194 UART: [kat] HMAC-384Kdf
922,842 UART: [kat] LMS
1,171,170 UART: [kat] --
1,171,863 UART: [cold-reset] ++
1,172,249 UART: [fht] FHT @ 0x50003400
1,174,876 UART: [idev] ++
1,175,044 UART: [idev] CDI.KEYID = 6
1,175,404 UART: [idev] SUBJECT.KEYID = 7
1,175,828 UART: [idev] UDS.KEYID = 0
1,176,173 ready_for_fw is high
1,176,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,136 UART: [idev] Erasing UDS.KEYID = 0
1,201,023 UART: [idev] Sha1 KeyId Algorithm
1,209,623 UART: [idev] --
1,210,671 UART: [ldev] ++
1,210,839 UART: [ldev] CDI.KEYID = 6
1,211,202 UART: [ldev] SUBJECT.KEYID = 5
1,211,628 UART: [ldev] AUTHORITY.KEYID = 7
1,212,091 UART: [ldev] FE.KEYID = 1
1,217,343 UART: [ldev] Erasing FE.KEYID = 1
1,243,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,865 UART: [ldev] --
1,283,294 UART: [fwproc] Wait for Commands...
1,284,000 UART: [fwproc] Recv command 0x46574c44
1,284,728 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,224 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,394 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,635 >>> mbox cmd response: success
2,828,855 UART: [afmc] ++
2,829,023 UART: [afmc] CDI.KEYID = 6
2,829,385 UART: [afmc] SUBJECT.KEYID = 7
2,829,810 UART: [afmc] AUTHORITY.KEYID = 5
2,865,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,502 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,211 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,094 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,795 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,757 UART: [afmc] --
2,908,781 UART: [cold-reset] --
2,909,623 UART: [state] Locking Datavault
2,910,838 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,442 UART: [state] Locking ICCM
2,911,894 UART: [exit] Launching FMC @ 0x40000130
2,917,224 UART:
2,917,240 UART: Running Caliptra FMC ...
2,917,648 UART:
2,917,702 UART: [state] CFI Enabled
2,927,882 UART: [fht] FMC Alias Private Key: 7
3,046,756 UART: [art] Extend RT PCRs Done
3,047,184 UART: [art] Lock RT PCRs Done
3,048,842 UART: [art] Populate DV Done
3,056,999 UART: [fht] FMC Alias Private Key: 7
3,057,941 UART: [art] Derive CDI
3,058,221 UART: [art] Store in slot 0x4
3,144,084 UART: [art] Derive Key Pair
3,144,444 UART: [art] Store priv key in slot 0x5
3,157,984 UART: [art] Derive Key Pair - Done
3,172,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,019 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,784 UART: [art] PUB.X = AB5069C07D6588356239EBC9DACEBA46928B764763849C67915ECEFDC74D3FB8D73E801EB63E3B32CB04998B232CE498
3,195,559 UART: [art] PUB.Y = D05B54E141FF0D43C492FA5999B12EC9A25CE4D414B6E1524CFB6C797DCF357F6CBB3319B447BC56C97EC157FB1D9D47
3,202,522 UART: [art] SIG.R = 564960B2FDA90D861D69202D778340DF49FED116FA8C4CF1A5DDA7B257ADE8A84E2D0282DA36C377B01AD368289DB46F
3,209,298 UART: [art] SIG.S = D3BF4D882C7AAAF35D40D326488DA4A40DDF70FED13217FA35E250956C566ECA926F082F76494BDD3DBF17FF1BA51138
3,233,202 UART: Caliptra RT
3,233,453 UART: [state] CFI Enabled
3,352,508 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,114 UART: [rt]cmd =0x41544d4e, len=14344
3,786,139 >>> mbox cmd response data (8 bytes)
3,786,140 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,237 UART: [rt]cmd =0x41545348, len=116
3,838,360 >>> mbox cmd response data (12 bytes)
3,838,361 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,106 UART:
3,839,122 UART: Running Caliptra ROM ...
3,839,530 UART:
3,839,585 UART: [state] CFI Enabled
3,842,047 UART: [state] LifecycleState = Unprovisioned
3,842,702 UART: [state] DebugLocked = No
3,843,212 UART: [state] WD Timer not started. Device not locked for debugging
3,844,470 UART: [kat] SHA2-256
4,650,120 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,654,245 UART: [kat] ++
4,654,397 UART: [kat] sha1
4,658,613 UART: [kat] SHA2-256
4,660,553 UART: [kat] SHA2-384
4,663,396 UART: [kat] SHA2-512-ACC
4,665,296 UART: [kat] ECC-384
4,675,131 UART: [kat] HMAC-384Kdf
4,679,855 UART: [kat] LMS
4,928,183 UART: [kat] --
4,929,107 UART: [update-reset] ++
5,879,810 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,880,817 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,982,458 >>> mbox cmd response: success
5,982,458 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,982,599 UART: [update-reset] Copying MAN_2 To MAN_1
5,990,613 UART: [update-reset Success] --
5,991,460 UART: [state] Locking Datavault
5,992,166 UART: [state] Locking PCR0, PCR1 and PCR31
5,992,770 UART: [state] Locking ICCM
5,993,430 UART: [exit] Launching FMC @ 0x40000130
5,998,760 UART:
5,998,776 UART: Running Caliptra FMC ...
5,999,184 UART:
5,999,238 UART: [state] CFI Enabled
6,088,613 UART: [art] Extend RT PCRs Done
6,089,041 UART: [art] Lock RT PCRs Done
6,090,084 UART: [art] Populate DV Done
6,098,369 UART: [fht] FMC Alias Private Key: 7
6,099,309 UART: [art] Derive CDI
6,099,589 UART: [art] Store in slot 0x4
6,185,342 UART: [art] Derive Key Pair
6,185,702 UART: [art] Store priv key in slot 0x5
6,199,506 UART: [art] Derive Key Pair - Done
6,214,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,230,043 UART: [art] Erasing AUTHORITY.KEYID = 7
6,230,808 UART: [art] PUB.X = B5A2771414664AA302CB5B6388E817949326461CE31753CE9C31322C44A4CF35930E8521BF0ECE0F9B3C1B20369AD435
6,237,562 UART: [art] PUB.Y = C324744F68FBBC77B7D03C2BF0FB429D9FBF63A336BDB52A6AD6E7FCD675BECD930E22FF9ABB77557450B1951D1487C4
6,244,529 UART: [art] SIG.R = 77DEAEB05C245C7D169EF939B51A7691D4BCBBF7B3830A3ED00F4EAC92A2368FCCAA8522DBBADA55A73274340F8CC9DD
6,251,316 UART: [art] SIG.S = F0A75E495E88F580B1E8D27BCD6195C6544AFBA3CFFBA4FBD0EDE3054B6DB40BB0AB71373077930F6CA243A307A56C0F
6,274,709 UART: mbox::rt_entry...
6,275,081 UART: ____ _ _ _ ____ _____
6,275,865 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,276,665 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,277,433 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,278,201 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,278,969 UART: |_|
6,279,281 UART:
6,646,621 UART: [rt] Runtime listening for mailbox commands...
6,647,819 >>> mbox cmd response data (48 bytes)
6,647,820 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,650,607 >>> mbox cmd response data (48 bytes)
6,650,608 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,668,753 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,151 ready_for_fw is high
1,060,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,996 >>> mbox cmd response: success
2,740,189 UART:
2,740,205 UART: Running Caliptra FMC ...
2,740,613 UART:
2,740,667 UART: [state] CFI Enabled
2,751,635 UART: [fht] FMC Alias Private Key: 7
2,870,389 UART: [art] Extend RT PCRs Done
2,870,817 UART: [art] Lock RT PCRs Done
2,872,413 UART: [art] Populate DV Done
2,880,768 UART: [fht] FMC Alias Private Key: 7
2,881,810 UART: [art] Derive CDI
2,882,090 UART: [art] Store in slot 0x4
2,967,983 UART: [art] Derive Key Pair
2,968,343 UART: [art] Store priv key in slot 0x5
2,981,347 UART: [art] Derive Key Pair - Done
2,996,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,282 UART: [art] PUB.X = 6AD59E839DB0E37E81C8CEB18DAE5D9CB1DBB684F35801BDBFB2CDFD860E9C1E64D3BE11A9F87CA3EE28455D9ED71E82
3,019,076 UART: [art] PUB.Y = 9D5C3024A17E264B5B732047DD01230148509A65F065F2191A04D867E59D2E474461793C99122CED4939978569267BC9
3,025,999 UART: [art] SIG.R = 81EFE98576F09893940D8B3C1F7A026535573230D89F2AAAC7F2743B9BF2844DC0E4DE981530DEE5C854726DE2451F17
3,032,763 UART: [art] SIG.S = 208C4A71EE088B0291CBB34EB8501D63F27DD452235D9A95B78BBF5317D96E3EFF841B76ED2629E40529E397E88102B8
3,056,391 UART: Caliptra RT
3,056,642 UART: [state] CFI Enabled
3,176,193 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,176,863 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,773 UART: [rt]cmd =0x41544d4e, len=14344
3,609,728 >>> mbox cmd response data (8 bytes)
3,609,729 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,702 UART: [rt]cmd =0x41545348, len=116
3,661,503 >>> mbox cmd response data (12 bytes)
3,661,504 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,687,516 >>> mbox cmd response: success
5,687,516 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,700,921 UART:
5,700,937 UART: Running Caliptra FMC ...
5,701,345 UART:
5,701,399 UART: [state] CFI Enabled
5,790,408 UART: [art] Extend RT PCRs Done
5,790,836 UART: [art] Lock RT PCRs Done
5,792,223 UART: [art] Populate DV Done
5,800,356 UART: [fht] FMC Alias Private Key: 7
5,801,318 UART: [art] Derive CDI
5,801,598 UART: [art] Store in slot 0x4
5,887,193 UART: [art] Derive Key Pair
5,887,553 UART: [art] Store priv key in slot 0x5
5,900,893 UART: [art] Derive Key Pair - Done
5,915,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,931,540 UART: [art] Erasing AUTHORITY.KEYID = 7
5,932,305 UART: [art] PUB.X = 4AF89C047DEB269EBE08503E4C385D3AABC0CC88D4831672988B0174329BEF5A8A96615F42B421571D432B685FA530A7
5,939,068 UART: [art] PUB.Y = 88FB9F4CB56261E48A9FAE1CDB224B9649FAE03AAEBEE0DD37304A7FE3A9C2B5CEDE30D6F3C6583CDAE9F413C17381C8
5,946,046 UART: [art] SIG.R = 6BE59F2EA620A041122BCC79D985D4D729A0FE86C5296FE18018D6F08834002E4275A1071CA153074AF8B2BEF7A87846
5,952,788 UART: [art] SIG.S = DD80EF931088464E3F49D099AED5ACC880AAAA172580103900F5C918483FC044A6FA7F12BBDBB762B4B6A48BDAE480BE
5,976,606 UART: mbox::rt_entry...
5,976,978 UART: ____ _ _ _ ____ _____
5,977,762 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,978,562 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,979,330 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,980,098 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,980,866 UART: |_|
5,981,178 UART:
6,344,388 UART: [rt] Runtime listening for mailbox commands...
6,345,586 >>> mbox cmd response data (48 bytes)
6,345,587 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,348,374 >>> mbox cmd response data (48 bytes)
6,348,375 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,366,520 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
893,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,746 UART: [kat] ++
897,898 UART: [kat] sha1
902,272 UART: [kat] SHA2-256
904,212 UART: [kat] SHA2-384
907,069 UART: [kat] SHA2-512-ACC
908,970 UART: [kat] ECC-384
918,785 UART: [kat] HMAC-384Kdf
923,421 UART: [kat] LMS
1,171,749 UART: [kat] --
1,172,670 UART: [cold-reset] ++
1,173,038 UART: [fht] FHT @ 0x50003400
1,175,719 UART: [idev] ++
1,175,887 UART: [idev] CDI.KEYID = 6
1,176,247 UART: [idev] SUBJECT.KEYID = 7
1,176,671 UART: [idev] UDS.KEYID = 0
1,177,016 ready_for_fw is high
1,177,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,745 UART: [idev] Erasing UDS.KEYID = 0
1,201,520 UART: [idev] Sha1 KeyId Algorithm
1,209,982 UART: [idev] --
1,211,044 UART: [ldev] ++
1,211,212 UART: [ldev] CDI.KEYID = 6
1,211,575 UART: [ldev] SUBJECT.KEYID = 5
1,212,001 UART: [ldev] AUTHORITY.KEYID = 7
1,212,464 UART: [ldev] FE.KEYID = 1
1,218,022 UART: [ldev] Erasing FE.KEYID = 1
1,244,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,214 UART: [ldev] --
1,283,673 UART: [fwproc] Wait for Commands...
1,284,247 UART: [fwproc] Recv command 0x46574c44
1,284,975 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,571 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,741 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,074 >>> mbox cmd response: success
2,828,092 UART: [afmc] ++
2,828,260 UART: [afmc] CDI.KEYID = 6
2,828,622 UART: [afmc] SUBJECT.KEYID = 7
2,829,047 UART: [afmc] AUTHORITY.KEYID = 5
2,864,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,779 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,488 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,371 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,072 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,966 UART: [afmc] --
2,908,070 UART: [cold-reset] --
2,908,842 UART: [state] Locking Datavault
2,909,901 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,505 UART: [state] Locking ICCM
2,910,933 UART: [exit] Launching FMC @ 0x40000130
2,916,263 UART:
2,916,279 UART: Running Caliptra FMC ...
2,916,687 UART:
2,916,830 UART: [state] CFI Enabled
2,927,248 UART: [fht] FMC Alias Private Key: 7
3,046,550 UART: [art] Extend RT PCRs Done
3,046,978 UART: [art] Lock RT PCRs Done
3,048,596 UART: [art] Populate DV Done
3,056,999 UART: [fht] FMC Alias Private Key: 7
3,058,175 UART: [art] Derive CDI
3,058,455 UART: [art] Store in slot 0x4
3,143,964 UART: [art] Derive Key Pair
3,144,324 UART: [art] Store priv key in slot 0x5
3,157,108 UART: [art] Derive Key Pair - Done
3,172,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,152 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,917 UART: [art] PUB.X = FEF6ABE58D34BF185A4A2EA2154412938585EDFFE1A699AAAB983CB1B1B54385B7B3F02DC3D333A57CAD5D90DE3274FD
3,194,709 UART: [art] PUB.Y = 54240D7EB306A542A1FED2D2F4ED3859A7EEF13FCA9586C2217BA036709C9FEE047890766A6064D5940F860A946D65CF
3,201,648 UART: [art] SIG.R = 107855E96B4FD38C514A13641B67FDE3ED7276403CE2688BA21AD95CF162697D69F4D9AE5E74C9D2D0EF45A5831A1942
3,208,422 UART: [art] SIG.S = 14407227FF69D252AFF06590B47556FA2457025B2B4B1619F8AE12A4BC694C733FD48C98201866041F06003EA66CC045
3,231,743 UART: Caliptra RT
3,232,086 UART: [state] CFI Enabled
3,350,714 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,384 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,306 UART: [rt]cmd =0x41544d4e, len=14344
3,784,197 >>> mbox cmd response data (8 bytes)
3,784,198 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,187 UART: [rt]cmd =0x41545348, len=116
3,836,422 >>> mbox cmd response data (12 bytes)
3,836,423 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,314 UART:
3,837,330 UART: Running Caliptra ROM ...
3,837,738 UART:
3,837,880 UART: [state] CFI Enabled
3,841,046 UART: [state] LifecycleState = Unprovisioned
3,841,701 UART: [state] DebugLocked = No
3,842,373 UART: [state] WD Timer not started. Device not locked for debugging
3,843,497 UART: [kat] SHA2-256
4,649,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,653,272 UART: [kat] ++
4,653,424 UART: [kat] sha1
4,657,750 UART: [kat] SHA2-256
4,659,690 UART: [kat] SHA2-384
4,662,459 UART: [kat] SHA2-512-ACC
4,664,359 UART: [kat] ECC-384
4,674,174 UART: [kat] HMAC-384Kdf
4,678,726 UART: [kat] LMS
4,927,054 UART: [kat] --
4,927,724 UART: [update-reset] ++
5,877,893 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,878,858 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,980,499 >>> mbox cmd response: success
5,980,499 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,980,772 UART: [update-reset] Copying MAN_2 To MAN_1
5,988,786 UART: [update-reset Success] --
5,989,921 UART: [state] Locking Datavault
5,990,543 UART: [state] Locking PCR0, PCR1 and PCR31
5,991,147 UART: [state] Locking ICCM
5,991,637 UART: [exit] Launching FMC @ 0x40000130
5,996,967 UART:
5,996,983 UART: Running Caliptra FMC ...
5,997,391 UART:
5,997,534 UART: [state] CFI Enabled
6,086,197 UART: [art] Extend RT PCRs Done
6,086,625 UART: [art] Lock RT PCRs Done
6,087,736 UART: [art] Populate DV Done
6,095,951 UART: [fht] FMC Alias Private Key: 7
6,096,961 UART: [art] Derive CDI
6,097,241 UART: [art] Store in slot 0x4
6,182,836 UART: [art] Derive Key Pair
6,183,196 UART: [art] Store priv key in slot 0x5
6,195,904 UART: [art] Derive Key Pair - Done
6,210,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,226,491 UART: [art] Erasing AUTHORITY.KEYID = 7
6,227,256 UART: [art] PUB.X = 3587941F0916B7690235886BB7D053EA76E98E89DA6090C979C092D4FBD0D97C7E14E720CA636299FEDE9C3F43B21389
6,234,018 UART: [art] PUB.Y = 9A3CC616AE692229BE8DA0D9C8BB34D06DD9BAD38207DBA3A3918ACE67EF7F337CEFD4A596B2D440BEE8F0CA4A24B8F5
6,240,993 UART: [art] SIG.R = E543590558ABFE04F717D5EFDC34F527A3C5AF7D17A5AF2766449F7BB09F53536909DDE766DFFB4ED6D6CF61A6BE44A0
6,247,772 UART: [art] SIG.S = 0499700F6D2C210483188512B9DA7EDC92B6D72CF73BB6BA819882F952C623453A69F89A1834792FB1148081784F6B55
6,271,781 UART: mbox::rt_entry...
6,272,153 UART: ____ _ _ _ ____ _____
6,272,937 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,273,737 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,274,505 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,275,273 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,276,041 UART: |_|
6,276,353 UART:
6,640,455 UART: [rt] Runtime listening for mailbox commands...
6,641,653 >>> mbox cmd response data (48 bytes)
6,641,654 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,644,441 >>> mbox cmd response data (48 bytes)
6,644,442 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,662,587 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,466 ready_for_fw is high
1,060,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,083 >>> mbox cmd response: success
2,742,020 UART:
2,742,036 UART: Running Caliptra FMC ...
2,742,444 UART:
2,742,587 UART: [state] CFI Enabled
2,753,345 UART: [fht] FMC Alias Private Key: 7
2,872,381 UART: [art] Extend RT PCRs Done
2,872,809 UART: [art] Lock RT PCRs Done
2,874,229 UART: [art] Populate DV Done
2,882,298 UART: [fht] FMC Alias Private Key: 7
2,883,276 UART: [art] Derive CDI
2,883,556 UART: [art] Store in slot 0x4
2,969,317 UART: [art] Derive Key Pair
2,969,677 UART: [art] Store priv key in slot 0x5
2,983,211 UART: [art] Derive Key Pair - Done
2,997,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,244 UART: [art] PUB.X = 36DB544384111CC14F6D08CB1D1D890F0219ACFE0DF6839B7412136729344EC7F2807C08A4FBC3467F4716C1D4D8311C
3,020,999 UART: [art] PUB.Y = 45E1D82223352E3DDD4BE3433BA9800324C1BECF8D520329B0F9D4AEE9B6013542EE941F754BAE8398BE3081603338A8
3,027,942 UART: [art] SIG.R = 1E23750A7718C70F03C4F2ECE86829455801B2BC29F2FFC841E662CB0C533139C5C056E9086BA346DF6A1696C8280406
3,034,684 UART: [art] SIG.S = 40C6D2C883CF70F82DC9DC476FD01A3642C5CECF45CA71C376FBAE7604095F8FDC2678998DD27F9A7DEC52D1E14DE180
3,057,732 UART: Caliptra RT
3,058,075 UART: [state] CFI Enabled
3,178,157 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,827 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,907 UART: [rt]cmd =0x41544d4e, len=14344
3,611,950 >>> mbox cmd response data (8 bytes)
3,611,951 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,072 UART: [rt]cmd =0x41545348, len=116
3,664,547 >>> mbox cmd response data (12 bytes)
3,664,548 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,693,651 >>> mbox cmd response: success
5,693,651 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,707,060 UART:
5,707,076 UART: Running Caliptra FMC ...
5,707,484 UART:
5,707,627 UART: [state] CFI Enabled
5,796,898 UART: [art] Extend RT PCRs Done
5,797,326 UART: [art] Lock RT PCRs Done
5,798,429 UART: [art] Populate DV Done
5,806,612 UART: [fht] FMC Alias Private Key: 7
5,807,544 UART: [art] Derive CDI
5,807,824 UART: [art] Store in slot 0x4
5,893,673 UART: [art] Derive Key Pair
5,894,033 UART: [art] Store priv key in slot 0x5
5,907,111 UART: [art] Derive Key Pair - Done
5,921,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,937,199 UART: [art] Erasing AUTHORITY.KEYID = 7
5,937,964 UART: [art] PUB.X = E1743B793016AC4C6EE69FD2BDD63CE1821FC8C256AB712A47E073BA1211F0F84FA145A67E2C1A408FF392D0F1B46620
5,944,744 UART: [art] PUB.Y = 2E95A65D8C920CCF266ADC9774CB94B3874B935B5F6DB4F801699E418FC7393DCCB7EC8EC7B1808D23207725BB006E08
5,951,671 UART: [art] SIG.R = 62592A81A3B51F1B556852ACED399F14F07ED275FD5E9122C7D0FA40DBD7AA3D011763C891EE1EAA77D8B79BB56C804F
5,958,452 UART: [art] SIG.S = 998BD962D6D7A143A3A4B62D13D220DDACD8A7F1842EDB263DF3AF558F1DC092A81B58531E030410F7B2E26F08DC51F9
5,982,605 UART: mbox::rt_entry...
5,982,977 UART: ____ _ _ _ ____ _____
5,983,761 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,984,561 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,985,329 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,986,097 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,986,865 UART: |_|
5,987,177 UART:
6,352,139 UART: [rt] Runtime listening for mailbox commands...
6,353,337 >>> mbox cmd response data (48 bytes)
6,353,338 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,356,125 >>> mbox cmd response data (48 bytes)
6,356,126 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,374,271 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,253 UART:
192,623 UART: Running Caliptra ROM ...
193,801 UART:
193,956 UART: [state] CFI Enabled
263,712 UART: [state] LifecycleState = Unprovisioned
265,686 UART: [state] DebugLocked = No
267,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,667 UART: [kat] SHA2-256
442,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,865 UART: [kat] ++
453,503 UART: [kat] sha1
464,412 UART: [kat] SHA2-256
467,123 UART: [kat] SHA2-384
472,412 UART: [kat] SHA2-512-ACC
474,782 UART: [kat] ECC-384
2,767,826 UART: [kat] HMAC-384Kdf
2,798,815 UART: [kat] LMS
3,989,109 UART: [kat] --
3,993,420 UART: [cold-reset] ++
3,995,077 UART: [fht] Storing FHT @ 0x50003400
4,007,696 UART: [idev] ++
4,008,278 UART: [idev] CDI.KEYID = 6
4,009,212 UART: [idev] SUBJECT.KEYID = 7
4,010,470 UART: [idev] UDS.KEYID = 0
4,011,532 ready_for_fw is high
4,011,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,825 UART: [idev] Erasing UDS.KEYID = 0
7,345,621 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,595 UART: [idev] --
7,372,350 UART: [ldev] ++
7,372,976 UART: [ldev] CDI.KEYID = 6
7,373,955 UART: [ldev] SUBJECT.KEYID = 5
7,375,055 UART: [ldev] AUTHORITY.KEYID = 7
7,376,405 UART: [ldev] FE.KEYID = 1
7,421,330 UART: [ldev] Erasing FE.KEYID = 1
10,752,524 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,041 UART: [ldev] --
13,115,238 UART: [fwproc] Waiting for Commands...
13,117,011 UART: [fwproc] Received command 0x46574c44
13,119,256 UART: [fwproc] Received Image of size 118548 bytes
17,217,871 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,291,730 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,364,894 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,693,050 >>> mbox cmd response: success
17,697,551 UART: [afmc] ++
17,698,176 UART: [afmc] CDI.KEYID = 6
17,699,098 UART: [afmc] SUBJECT.KEYID = 7
17,700,261 UART: [afmc] AUTHORITY.KEYID = 5
21,076,111 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,389,975 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,245 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,703 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,441 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,435,830 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,457,329 UART: [afmc] --
23,460,757 UART: [cold-reset] --
23,464,834 UART: [state] Locking Datavault
23,469,918 UART: [state] Locking PCR0, PCR1 and PCR31
23,471,672 UART: [state] Locking ICCM
23,473,932 UART: [exit] Launching FMC @ 0x40000130
23,482,352 UART:
23,482,587 UART: Running Caliptra FMC ...
23,483,687 UART:
23,483,847 UART: [state] CFI Enabled
23,550,638 UART: [fht] FMC Alias Private Key: 7
25,891,034 UART: [art] Extend RT PCRs Done
25,892,271 UART: [art] Lock RT PCRs Done
25,894,059 UART: [art] Populate DV Done
25,899,261 UART: [fht] FMC Alias Private Key: 7
25,900,740 UART: [art] Derive CDI
25,901,511 UART: [art] Store in slot 0x4
25,959,691 UART: [art] Derive Key Pair
25,960,684 UART: [art] Store priv key in slot 0x5
29,253,453 UART: [art] Derive Key Pair - Done
29,266,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,566 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,091 UART: [art] PUB.X = 3EA1D8C71A28C9B8B13D44CCBE96063A672D33D208857342210605BF9052D0712C05CC2DC680BA8D9E08F69331EBE08D
31,564,321 UART: [art] PUB.Y = 8A793E04C7BEC26BD84804423C0C5907B75D2A404F1DBF0CE1FAD30BAF9FF9FAE0E4B5441CB6D21A125E2E38289DEE98
31,571,576 UART: [art] SIG.R = 04152CD8D9AB0E51247B80F946238F39E21A1E79BCD006EC04144CBC179C4C51B124D9D25FDEBA0DFC3E2F732DD6DA66
31,579,024 UART: [art] SIG.S = 967A87194AECA1A36A04F102CAA8F4ACCF74341DA5F15C444C9FA0C8856EA4224EFCD3D51B1C70B603987E0F49DDC329
32,884,608 UART: Caliptra RT
32,885,310 UART: [state] CFI Enabled
33,062,087 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,130,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,285,868 UART: [rt]cmd =0x41544d4e, len=14344
42,586,665 >>> mbox cmd response data (8 bytes)
42,587,326 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,618,087 UART: [rt]cmd =0x41545348, len=116
42,637,567 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,785,321 ready_for_fw is high
3,786,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,938,542 >>> mbox cmd response: success
23,627,293 UART:
23,627,700 UART: Running Caliptra FMC ...
23,628,825 UART:
23,628,981 UART: [state] CFI Enabled
23,695,034 UART: [fht] FMC Alias Private Key: 7
26,035,752 UART: [art] Extend RT PCRs Done
26,036,986 UART: [art] Lock RT PCRs Done
26,038,591 UART: [art] Populate DV Done
26,044,181 UART: [fht] FMC Alias Private Key: 7
26,045,832 UART: [art] Derive CDI
26,046,653 UART: [art] Store in slot 0x4
26,103,093 UART: [art] Derive Key Pair
26,104,096 UART: [art] Store priv key in slot 0x5
29,396,795 UART: [art] Derive Key Pair - Done
29,409,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,697,924 UART: [art] Erasing AUTHORITY.KEYID = 7
31,699,427 UART: [art] PUB.X = 9019170C7F3F99564E53D507EB717F2994A5997733AB87BBDABE3F9F6DC3CD74B89EC4D38FE08F82389259C61070C842
31,706,659 UART: [art] PUB.Y = 683CEAFBE739D0AB824F12BDE59E8AE00408E9D7501148E7D77C49E44E53D75140FB1BED91DA5E86EE8F403FE2952771
31,713,935 UART: [art] SIG.R = D890AAD4D68B04C1266B9E36F846F03F1BC588586054C8C4C517AF05048B056A3FEFC01EFA323937465965EE7C5981DA
31,721,334 UART: [art] SIG.S = BCFC48A7F0BB8990DAE199C81F5589D962D63820B56C282189C41D5811A7B1460D922D4129689B5CAA9A17513D2B4680
33,026,566 UART: Caliptra RT
33,027,306 UART: [state] CFI Enabled
33,204,196 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,277,743 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,433,524 UART: [rt]cmd =0x41544d4e, len=14344
42,734,267 >>> mbox cmd response data (8 bytes)
42,734,882 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,765,636 UART: [rt]cmd =0x41545348, len=116
42,785,539 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,488 UART:
192,856 UART: Running Caliptra ROM ...
193,949 UART:
603,860 UART: [state] CFI Enabled
618,101 UART: [state] LifecycleState = Unprovisioned
620,038 UART: [state] DebugLocked = No
621,415 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,980 UART: [kat] SHA2-256
796,772 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,284 UART: [kat] ++
807,727 UART: [kat] sha1
820,300 UART: [kat] SHA2-256
823,014 UART: [kat] SHA2-384
828,432 UART: [kat] SHA2-512-ACC
830,852 UART: [kat] ECC-384
3,113,437 UART: [kat] HMAC-384Kdf
3,126,049 UART: [kat] LMS
4,316,158 UART: [kat] --
4,319,582 UART: [cold-reset] ++
4,321,722 UART: [fht] Storing FHT @ 0x50003400
4,334,397 UART: [idev] ++
4,335,026 UART: [idev] CDI.KEYID = 6
4,335,935 UART: [idev] SUBJECT.KEYID = 7
4,337,169 UART: [idev] UDS.KEYID = 0
4,338,271 ready_for_fw is high
4,338,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,514 UART: [idev] Erasing UDS.KEYID = 0
7,623,766 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,322 UART: [idev] --
7,649,123 UART: [ldev] ++
7,649,746 UART: [ldev] CDI.KEYID = 6
7,650,652 UART: [ldev] SUBJECT.KEYID = 5
7,651,932 UART: [ldev] AUTHORITY.KEYID = 7
7,653,160 UART: [ldev] FE.KEYID = 1
7,663,960 UART: [ldev] Erasing FE.KEYID = 1
10,955,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,319 UART: [ldev] --
13,316,656 UART: [fwproc] Waiting for Commands...
13,319,670 UART: [fwproc] Received command 0x46574c44
13,321,906 UART: [fwproc] Received Image of size 118548 bytes
17,431,740 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,510,805 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,583,986 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,911,794 >>> mbox cmd response: success
17,916,536 UART: [afmc] ++
17,917,158 UART: [afmc] CDI.KEYID = 6
17,918,042 UART: [afmc] SUBJECT.KEYID = 7
17,919,312 UART: [afmc] AUTHORITY.KEYID = 5
21,233,510 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,954 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,531,260 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,647 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,560,372 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,802 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,324 UART: [afmc] --
23,600,829 UART: [cold-reset] --
23,603,821 UART: [state] Locking Datavault
23,610,517 UART: [state] Locking PCR0, PCR1 and PCR31
23,612,265 UART: [state] Locking ICCM
23,614,243 UART: [exit] Launching FMC @ 0x40000130
23,622,655 UART:
23,622,887 UART: Running Caliptra FMC ...
23,623,985 UART:
23,624,142 UART: [state] CFI Enabled
23,632,146 UART: [fht] FMC Alias Private Key: 7
25,972,359 UART: [art] Extend RT PCRs Done
25,973,578 UART: [art] Lock RT PCRs Done
25,975,063 UART: [art] Populate DV Done
25,980,535 UART: [fht] FMC Alias Private Key: 7
25,982,014 UART: [art] Derive CDI
25,982,747 UART: [art] Store in slot 0x4
26,025,436 UART: [art] Derive Key Pair
26,026,423 UART: [art] Store priv key in slot 0x5
29,268,354 UART: [art] Derive Key Pair - Done
29,281,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,653 UART: [art] Erasing AUTHORITY.KEYID = 7
31,563,180 UART: [art] PUB.X = 01820F4D9F4DCD2399557686EEB1641E79E21DBD807496CF11D7F7A777772142CB5153BC2D35FAF76719BC583131F2D3
31,570,432 UART: [art] PUB.Y = C8F2AF7B6AD15AE1B2F1022334D69C658CB94A3B80D8457ED56AF77AC91CCBACA526B9108C573462179738502EB0E0B5
31,577,681 UART: [art] SIG.R = A3B82A56D5CB76345E50604DBFAA7D7D79CEABA80D88D0D3A61E1DB7DBF2D00A8CB8ACB46767A3EF6D1F50F04C5F73C4
31,585,129 UART: [art] SIG.S = AC25FFDEA7AD38E2FD1DBE713A6F75E2C18971E04CE1571A9FF3F09FE8FEEA1074FBEAD42AA9B1E5B24CB5C3A1C2C54E
32,890,626 UART: Caliptra RT
32,891,346 UART: [state] CFI Enabled
33,024,458 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,097,233 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,252,768 UART: [rt]cmd =0x41544d4e, len=14344
42,553,455 >>> mbox cmd response data (8 bytes)
42,554,039 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,584,608 UART: [rt]cmd =0x41545348, len=116
42,604,043 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
4,124,266 ready_for_fw is high
4,124,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,870 >>> mbox cmd response: success
23,810,884 UART:
23,811,291 UART: Running Caliptra FMC ...
23,812,433 UART:
23,812,595 UART: [state] CFI Enabled
23,820,113 UART: [fht] FMC Alias Private Key: 7
26,159,680 UART: [art] Extend RT PCRs Done
26,160,898 UART: [art] Lock RT PCRs Done
26,162,468 UART: [art] Populate DV Done
26,167,941 UART: [fht] FMC Alias Private Key: 7
26,169,481 UART: [art] Derive CDI
26,170,212 UART: [art] Store in slot 0x4
26,213,164 UART: [art] Derive Key Pair
26,214,207 UART: [art] Store priv key in slot 0x5
29,456,440 UART: [art] Derive Key Pair - Done
29,469,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,762 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,269 UART: [art] PUB.X = 905C0DDEA5F69C0BDBF8716F65910A03580927470948391671B2121286E667077C1987A7A4E5353E7A2929989FFD1EC8
31,758,517 UART: [art] PUB.Y = 52C92BEE6FF87511C5A9D3C6D32E70B22AB7976E25765EE4565EF6D8A5B14D895AA0961D8640940D1632FCFA59F6E38A
31,765,769 UART: [art] SIG.R = FFFC5C3022F9D91D641CBB0B82D1D3B9DC3BFC8CB71D106E309D3056F5EA8F7A299685332627F2566C4D152F37D96ABA
31,773,153 UART: [art] SIG.S = F0ACC2FC4DF14F33337ACDCF68232FBBAF97CCD085C6C776E378364EFCD468C719F5A3643A8D165C93B565981D5429A4
33,078,222 UART: Caliptra RT
33,079,099 UART: [state] CFI Enabled
33,213,130 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,280,947 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,436,473 UART: [rt]cmd =0x41544d4e, len=14344
42,737,627 >>> mbox cmd response data (8 bytes)
42,738,198 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,769,080 UART: [rt]cmd =0x41545348, len=116
42,788,703 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
192,287 UART:
192,644 UART: Running Caliptra ROM ...
193,832 UART:
193,980 UART: [state] CFI Enabled
264,072 UART: [state] LifecycleState = Unprovisioned
265,999 UART: [state] DebugLocked = No
268,534 UART: [state] WD Timer not started. Device not locked for debugging
273,228 UART: [kat] SHA2-256
452,875 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,688 UART: [kat] ++
464,137 UART: [kat] sha1
473,729 UART: [kat] SHA2-256
476,394 UART: [kat] SHA2-384
483,489 UART: [kat] SHA2-512-ACC
485,856 UART: [kat] ECC-384
2,948,091 UART: [kat] HMAC-384Kdf
2,970,906 UART: [kat] LMS
3,447,443 UART: [kat] --
3,451,288 UART: [cold-reset] ++
3,452,716 UART: [fht] FHT @ 0x50003400
3,463,689 UART: [idev] ++
3,464,249 UART: [idev] CDI.KEYID = 6
3,465,273 UART: [idev] SUBJECT.KEYID = 7
3,466,463 UART: [idev] UDS.KEYID = 0
3,467,399 ready_for_fw is high
3,467,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,047 UART: [idev] Erasing UDS.KEYID = 0
5,990,780 UART: [idev] Sha1 KeyId Algorithm
6,014,266 UART: [idev] --
6,019,976 UART: [ldev] ++
6,020,557 UART: [ldev] CDI.KEYID = 6
6,021,473 UART: [ldev] SUBJECT.KEYID = 5
6,022,686 UART: [ldev] AUTHORITY.KEYID = 7
6,023,917 UART: [ldev] FE.KEYID = 1
6,058,980 UART: [ldev] Erasing FE.KEYID = 1
8,564,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,288 UART: [ldev] --
10,374,332 UART: [fwproc] Wait for Commands...
10,376,215 UART: [fwproc] Recv command 0x46574c44
10,378,194 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,629 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,615 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,059 >>> mbox cmd response: success
14,348,845 UART: [afmc] ++
14,349,465 UART: [afmc] CDI.KEYID = 6
14,350,377 UART: [afmc] SUBJECT.KEYID = 7
14,351,588 UART: [afmc] AUTHORITY.KEYID = 5
16,896,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,327 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,125 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,159 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,771 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,451 UART: [afmc] --
18,716,450 UART: [cold-reset] --
18,720,240 UART: [state] Locking Datavault
18,726,203 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,905 UART: [state] Locking ICCM
18,728,947 UART: [exit] Launching FMC @ 0x40000130
18,737,392 UART:
18,737,621 UART: Running Caliptra FMC ...
18,738,643 UART:
18,738,787 UART: [state] CFI Enabled
18,797,198 UART: [fht] FMC Alias Private Key: 7
20,584,772 UART: [art] Extend RT PCRs Done
20,585,981 UART: [art] Lock RT PCRs Done
20,587,489 UART: [art] Populate DV Done
20,592,688 UART: [fht] FMC Alias Private Key: 7
20,594,387 UART: [art] Derive CDI
20,595,197 UART: [art] Store in slot 0x4
20,651,204 UART: [art] Derive Key Pair
20,652,244 UART: [art] Store priv key in slot 0x5
23,115,428 UART: [art] Derive Key Pair - Done
23,128,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,841,434 UART: [art] Erasing AUTHORITY.KEYID = 7
24,842,937 UART: [art] PUB.X = F964C737C3C4719A1488CEA73893BC1D3BCE4F4EF913374EF481A2EC51B9D4D795F5205D87D4F481DB5FDEE3A708059F
24,850,251 UART: [art] PUB.Y = 0A7DCB43804620AB351D6EA102F8ECB50D2236067C17DDC02109C8B4B5DEAE80266B46D3C63829657CFF74CCE26859F4
24,857,483 UART: [art] SIG.R = B3C51BAC0830B6E0ADC5B04CDC8D5479583BC9F1797C37DA6C3FAB48C2B7490C5B3A8AE99023726BC979C9A8B77CF3BF
24,864,875 UART: [art] SIG.S = A5DC6C5941B09682FED7F95BA00451A384D568F2AF5C87A9A113B94A3386677B4DE1B06358C885E063449BB1244C99A6
25,844,143 UART: Caliptra RT
25,844,841 UART: [state] CFI Enabled
26,025,432 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,061,496 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,217,070 UART: [rt]cmd =0x41544d4e, len=14344
34,213,170 >>> mbox cmd response data (8 bytes)
34,213,860 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,244,630 UART: [rt]cmd =0x41545348, len=116
34,263,504 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,458,237 ready_for_fw is high
3,458,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,240,217 >>> mbox cmd response: success
18,534,408 UART:
18,534,820 UART: Running Caliptra FMC ...
18,535,927 UART:
18,536,076 UART: [state] CFI Enabled
18,603,770 UART: [fht] FMC Alias Private Key: 7
20,370,312 UART: [art] Extend RT PCRs Done
20,371,533 UART: [art] Lock RT PCRs Done
20,373,074 UART: [art] Populate DV Done
20,378,328 UART: [fht] FMC Alias Private Key: 7
20,379,865 UART: [art] Derive CDI
20,380,600 UART: [art] Store in slot 0x4
20,436,802 UART: [art] Derive Key Pair
20,437,835 UART: [art] Store priv key in slot 0x5
22,900,512 UART: [art] Derive Key Pair - Done
22,913,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,891 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,389 UART: [art] PUB.X = 07C356B2A3A982968EF0CD3B6514AAABA0B551AA8452D7FE0B22ADBE86BDD06A0D1AD417A43930CC2E802D8E35E856B1
24,635,701 UART: [art] PUB.Y = CB058D5C0758261C258622F2BFB78BB67AA09D8F3C0430EC75A229E9EE6BD6975386238803C017C5FB9AC8B060310146
24,642,949 UART: [art] SIG.R = 2DCC4E1C639F51232D08138FC95A51932B850C707DFCDBA8AEB5824858FD35E86737ED6EA408950CFEA43792AA3CCF64
24,650,336 UART: [art] SIG.S = 95B8F45F2C2EA984EBF57FC2C84A341EF0292F7370322D3A1C5F9924E8802622FF34A55B0787A105A54A6037064B90B7
25,629,548 UART: Caliptra RT
25,630,255 UART: [state] CFI Enabled
25,810,287 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,848,913 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,004,433 UART: [rt]cmd =0x41544d4e, len=14344
33,999,758 >>> mbox cmd response data (8 bytes)
34,000,345 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,031,312 UART: [rt]cmd =0x41545348, len=116
34,050,983 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,492 UART:
192,854 UART: Running Caliptra ROM ...
194,041 UART:
603,687 UART: [state] CFI Enabled
618,494 UART: [state] LifecycleState = Unprovisioned
620,554 UART: [state] DebugLocked = No
623,372 UART: [state] WD Timer not started. Device not locked for debugging
626,695 UART: [kat] SHA2-256
806,291 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,084 UART: [kat] ++
817,577 UART: [kat] sha1
829,096 UART: [kat] SHA2-256
831,830 UART: [kat] SHA2-384
836,403 UART: [kat] SHA2-512-ACC
838,772 UART: [kat] ECC-384
3,278,204 UART: [kat] HMAC-384Kdf
3,290,440 UART: [kat] LMS
3,766,946 UART: [kat] --
3,772,168 UART: [cold-reset] ++
3,773,752 UART: [fht] FHT @ 0x50003400
3,783,876 UART: [idev] ++
3,784,447 UART: [idev] CDI.KEYID = 6
3,785,378 UART: [idev] SUBJECT.KEYID = 7
3,786,629 UART: [idev] UDS.KEYID = 0
3,787,555 ready_for_fw is high
3,787,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,660 UART: [idev] Erasing UDS.KEYID = 0
6,263,370 UART: [idev] Sha1 KeyId Algorithm
6,288,162 UART: [idev] --
6,293,560 UART: [ldev] ++
6,294,131 UART: [ldev] CDI.KEYID = 6
6,295,173 UART: [ldev] SUBJECT.KEYID = 5
6,296,280 UART: [ldev] AUTHORITY.KEYID = 7
6,297,509 UART: [ldev] FE.KEYID = 1
6,309,939 UART: [ldev] Erasing FE.KEYID = 1
8,789,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,392 UART: [ldev] --
10,584,631 UART: [fwproc] Wait for Commands...
10,587,316 UART: [fwproc] Recv command 0x46574c44
10,589,355 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,141,815 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,214,830 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,542,542 >>> mbox cmd response: success
14,547,308 UART: [afmc] ++
14,547,922 UART: [afmc] CDI.KEYID = 6
14,548,840 UART: [afmc] SUBJECT.KEYID = 7
14,550,061 UART: [afmc] AUTHORITY.KEYID = 5
17,054,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,553 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,403 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,492 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,030 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,521 UART: [afmc] --
18,856,111 UART: [cold-reset] --
18,860,457 UART: [state] Locking Datavault
18,864,781 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,493 UART: [state] Locking ICCM
18,868,397 UART: [exit] Launching FMC @ 0x40000130
18,876,803 UART:
18,877,045 UART: Running Caliptra FMC ...
18,878,153 UART:
18,878,318 UART: [state] CFI Enabled
18,886,531 UART: [fht] FMC Alias Private Key: 7
20,652,082 UART: [art] Extend RT PCRs Done
20,653,304 UART: [art] Lock RT PCRs Done
20,654,878 UART: [art] Populate DV Done
20,660,503 UART: [fht] FMC Alias Private Key: 7
20,662,096 UART: [art] Derive CDI
20,662,917 UART: [art] Store in slot 0x4
20,705,409 UART: [art] Derive Key Pair
20,706,452 UART: [art] Store priv key in slot 0x5
23,133,174 UART: [art] Derive Key Pair - Done
23,145,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,061 UART: [art] Erasing AUTHORITY.KEYID = 7
24,853,571 UART: [art] PUB.X = A7E1A66D09FC342C49C0F503A4BF80F280A61144658AC1ADBFFF4B8D6A1558E4871A7795D206870527246A9B57FED4E4
24,860,837 UART: [art] PUB.Y = 2AFF8F97FFADE81DACA37149E4D35E30C68D3D8C693DE836BDC5008CFFC434188DD0F8735E6EA67BA4EF6161B9D815A6
24,868,072 UART: [art] SIG.R = D93BAC6DC0A6A4F658354CE24F57F1BCC8EC738897511F694781C3A36C7DD88F4FD1777A43D095FAA2287E375C3B979E
24,875,468 UART: [art] SIG.S = 461019D7976365871A6A417A948F2329BA2CEFBD3A2584773C20D7B899771CB6953CEE0091B541A8FCD94C5035B4EE6E
25,854,134 UART: Caliptra RT
25,854,832 UART: [state] CFI Enabled
25,986,760 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,049,865 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,205,717 UART: [rt]cmd =0x41544d4e, len=14344
34,201,082 >>> mbox cmd response data (8 bytes)
34,201,672 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,232,361 UART: [rt]cmd =0x41545348, len=116
34,252,252 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,776,305 ready_for_fw is high
3,776,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,433,293 >>> mbox cmd response: success
18,684,307 UART:
18,684,693 UART: Running Caliptra FMC ...
18,685,898 UART:
18,686,069 UART: [state] CFI Enabled
18,693,760 UART: [fht] FMC Alias Private Key: 7
20,460,031 UART: [art] Extend RT PCRs Done
20,461,259 UART: [art] Lock RT PCRs Done
20,463,003 UART: [art] Populate DV Done
20,468,111 UART: [fht] FMC Alias Private Key: 7
20,469,614 UART: [art] Derive CDI
20,470,379 UART: [art] Store in slot 0x4
20,512,968 UART: [art] Derive Key Pair
20,513,968 UART: [art] Store priv key in slot 0x5
22,940,295 UART: [art] Derive Key Pair - Done
22,953,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,659,607 UART: [art] Erasing AUTHORITY.KEYID = 7
24,661,115 UART: [art] PUB.X = 4DF5B210DBC4BFD893172D0A37A8B56041DF072E0678597149D1EF39B232CD2DC17318B8A14B525100EFE38DC61F4E73
24,668,378 UART: [art] PUB.Y = 4E6A3A50E8DE0506EB1C218A4EF32C5131882232979E1988699772245A4C77CC8532B4CCE85BB80E404EF846C2B6394E
24,675,632 UART: [art] SIG.R = 98FFAC13F710DE58C63FB6234D304D885A3126C144D9E3227B8CC61319AF4427AFEE384C7C6F7D87971456EF5A2B6BA3
24,683,042 UART: [art] SIG.S = 1153879F5A43BCF9286447F520CE8EFBB93E89D30538EF19ED3C5140ACE4DEC468796AE40405143E0973DED95EF83954
25,662,171 UART: Caliptra RT
25,662,900 UART: [state] CFI Enabled
25,796,436 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,841,645 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,997,234 UART: [rt]cmd =0x41544d4e, len=14344
33,992,589 >>> mbox cmd response data (8 bytes)
33,993,161 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,023,900 UART: [rt]cmd =0x41545348, len=116
34,043,880 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
192,010 UART:
192,396 UART: Running Caliptra ROM ...
193,590 UART:
193,743 UART: [state] CFI Enabled
266,722 UART: [state] LifecycleState = Unprovisioned
269,060 UART: [state] DebugLocked = No
271,877 UART: [state] WD Timer not started. Device not locked for debugging
277,193 UART: [kat] SHA2-256
467,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,884 UART: [kat] ++
478,380 UART: [kat] sha1
490,195 UART: [kat] SHA2-256
493,211 UART: [kat] SHA2-384
498,703 UART: [kat] SHA2-512-ACC
501,280 UART: [kat] ECC-384
2,949,240 UART: [kat] HMAC-384Kdf
2,972,996 UART: [kat] LMS
3,504,736 UART: [kat] --
3,508,167 UART: [cold-reset] ++
3,509,954 UART: [fht] FHT @ 0x50003400
3,521,138 UART: [idev] ++
3,521,764 UART: [idev] CDI.KEYID = 6
3,522,714 UART: [idev] SUBJECT.KEYID = 7
3,523,949 UART: [idev] UDS.KEYID = 0
3,524,849 ready_for_fw is high
3,525,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,218 UART: [idev] Erasing UDS.KEYID = 0
6,028,817 UART: [idev] Sha1 KeyId Algorithm
6,050,648 UART: [idev] --
6,054,799 UART: [ldev] ++
6,055,476 UART: [ldev] CDI.KEYID = 6
6,056,386 UART: [ldev] SUBJECT.KEYID = 5
6,057,599 UART: [ldev] AUTHORITY.KEYID = 7
6,058,775 UART: [ldev] FE.KEYID = 1
6,101,453 UART: [ldev] Erasing FE.KEYID = 1
8,607,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,116 UART: [ldev] --
10,414,540 UART: [fwproc] Wait for Commands...
10,416,463 UART: [fwproc] Recv command 0x46574c44
10,418,790 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,439 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,125,059 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,045 >>> mbox cmd response: success
14,689,290 UART: [afmc] ++
14,690,011 UART: [afmc] CDI.KEYID = 6
14,691,127 UART: [afmc] SUBJECT.KEYID = 7
14,692,674 UART: [afmc] AUTHORITY.KEYID = 5
17,226,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,949,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,951,474 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,966,558 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,981,711 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,996,674 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,020,711 UART: [afmc] --
19,024,440 UART: [cold-reset] --
19,026,527 UART: [state] Locking Datavault
19,030,971 UART: [state] Locking PCR0, PCR1 and PCR31
19,033,119 UART: [state] Locking ICCM
19,035,596 UART: [exit] Launching FMC @ 0x40000130
19,044,219 UART:
19,044,460 UART: Running Caliptra FMC ...
19,045,561 UART:
19,045,723 UART: [state] CFI Enabled
19,107,922 UART: [fht] FMC Alias Private Key: 7
20,874,239 UART: [art] Extend RT PCRs Done
20,875,467 UART: [art] Lock RT PCRs Done
20,877,227 UART: [art] Populate DV Done
20,882,692 UART: [fht] FMC Alias Private Key: 7
20,884,282 UART: [art] Derive CDI
20,885,090 UART: [art] Store in slot 0x4
20,939,561 UART: [art] Derive Key Pair
20,940,601 UART: [art] Store priv key in slot 0x5
23,405,395 UART: [art] Derive Key Pair - Done
23,418,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,135,084 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,621 UART: [art] PUB.X = F11264B5E8B26118EB3C3AC19F0624066B3F487B36A034A0F1983247AC68F519D8FF80624C4106B5FC77A0F4C7E771A2
25,143,873 UART: [art] PUB.Y = 21800026139F957BF0DE5BB8DA6DB36504528CC4B52BBA000158E47E8BA7B5A7BC78612FB5201D330A342E20EBC16D41
25,151,095 UART: [art] SIG.R = 349A8EF1EE188AFD6E90F7C4807123AD127C47C6A08E7865D0A427505797330439152B5FC589FE90F413DA8D91AB3084
25,158,420 UART: [art] SIG.S = 54CCBF5ABC80537BA0D4C3FE9AAB06A0CBB9A512EB8D88F01BEC3A7AB2EA0E83A84C0EBA1AE96DD96D9264B724ED5EEA
26,137,495 UART: Caliptra RT
26,138,205 UART: [state] CFI Enabled
26,318,810 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,364,673 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,520,368 UART: [rt]cmd =0x41544d4e, len=14344
34,516,065 >>> mbox cmd response data (8 bytes)
34,516,654 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,547,288 UART: [rt]cmd =0x41545348, len=116
34,566,613 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
3,439,215 ready_for_fw is high
3,439,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,646 >>> mbox cmd response: success
19,130,241 UART:
19,130,675 UART: Running Caliptra FMC ...
19,131,887 UART:
19,132,078 UART: [state] CFI Enabled
19,200,418 UART: [fht] FMC Alias Private Key: 7
20,967,096 UART: [art] Extend RT PCRs Done
20,968,311 UART: [art] Lock RT PCRs Done
20,970,207 UART: [art] Populate DV Done
20,975,898 UART: [fht] FMC Alias Private Key: 7
20,977,438 UART: [art] Derive CDI
20,978,197 UART: [art] Store in slot 0x4
21,033,368 UART: [art] Derive Key Pair
21,034,363 UART: [art] Store priv key in slot 0x5
23,497,194 UART: [art] Derive Key Pair - Done
23,510,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,678 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,731 UART: [art] PUB.X = 0677C4DFCE25E8C55ABB634AE3D9ED268C9DAB695EB2121B2E5D10865C32ED498D6FE2D34D8C6D39B2982C5DE2B014E5
25,232,484 UART: [art] PUB.Y = B914093185B34BEE644FC41B1B499FF23D4F006020847B25A1EAF772F28FCB969B60B8355CE863B58AF29E22496ACED2
25,239,710 UART: [art] SIG.R = E1D7DD85A21735EC9F57D55711C2E56F8D6C11FB974D212007C0DB273315D808723D3C311C0170B412C4A9FA24005151
25,247,085 UART: [art] SIG.S = 9B54B938B52263E470EAC8F343053816713A4F73312F4DFF28CDDA29310F43F43160EDEB71445583CEF60DF6B8AE1B28
26,226,074 UART: Caliptra RT
26,226,804 UART: [state] CFI Enabled
26,412,890 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,458,964 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,614,885 UART: [rt]cmd =0x41544d4e, len=14344
34,610,703 >>> mbox cmd response data (8 bytes)
34,611,299 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,641,958 UART: [rt]cmd =0x41545348, len=116
34,662,020 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,490 UART:
192,864 UART: Running Caliptra ROM ...
194,064 UART:
603,472 UART: [state] CFI Enabled
620,159 UART: [state] LifecycleState = Unprovisioned
622,578 UART: [state] DebugLocked = No
623,830 UART: [state] WD Timer not started. Device not locked for debugging
628,097 UART: [kat] SHA2-256
818,014 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,756 UART: [kat] ++
829,362 UART: [kat] sha1
841,243 UART: [kat] SHA2-256
844,327 UART: [kat] SHA2-384
848,919 UART: [kat] SHA2-512-ACC
851,542 UART: [kat] ECC-384
3,295,308 UART: [kat] HMAC-384Kdf
3,309,119 UART: [kat] LMS
3,840,918 UART: [kat] --
3,843,358 UART: [cold-reset] ++
3,845,430 UART: [fht] FHT @ 0x50003400
3,857,837 UART: [idev] ++
3,858,550 UART: [idev] CDI.KEYID = 6
3,859,480 UART: [idev] SUBJECT.KEYID = 7
3,860,659 UART: [idev] UDS.KEYID = 0
3,861,604 ready_for_fw is high
3,861,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,690 UART: [idev] Erasing UDS.KEYID = 0
6,343,748 UART: [idev] Sha1 KeyId Algorithm
6,366,824 UART: [idev] --
6,370,501 UART: [ldev] ++
6,371,225 UART: [ldev] CDI.KEYID = 6
6,372,151 UART: [ldev] SUBJECT.KEYID = 5
6,373,263 UART: [ldev] AUTHORITY.KEYID = 7
6,374,494 UART: [ldev] FE.KEYID = 1
6,386,114 UART: [ldev] Erasing FE.KEYID = 1
8,857,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,700 UART: [ldev] --
10,647,491 UART: [fwproc] Wait for Commands...
10,650,071 UART: [fwproc] Recv command 0x46574c44
10,652,330 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,779 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,380 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,264 >>> mbox cmd response: success
14,918,690 UART: [afmc] ++
14,919,401 UART: [afmc] CDI.KEYID = 6
14,920,515 UART: [afmc] SUBJECT.KEYID = 7
14,922,016 UART: [afmc] AUTHORITY.KEYID = 5
17,426,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,148,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,150,429 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,165,480 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,180,667 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,195,548 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,411 UART: [afmc] --
19,222,474 UART: [cold-reset] --
19,226,026 UART: [state] Locking Datavault
19,229,891 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,051 UART: [state] Locking ICCM
19,234,356 UART: [exit] Launching FMC @ 0x40000130
19,242,990 UART:
19,243,230 UART: Running Caliptra FMC ...
19,244,260 UART:
19,244,409 UART: [state] CFI Enabled
19,252,577 UART: [fht] FMC Alias Private Key: 7
21,019,358 UART: [art] Extend RT PCRs Done
21,020,583 UART: [art] Lock RT PCRs Done
21,022,077 UART: [art] Populate DV Done
21,027,734 UART: [fht] FMC Alias Private Key: 7
21,029,333 UART: [art] Derive CDI
21,030,077 UART: [art] Store in slot 0x4
21,072,675 UART: [art] Derive Key Pair
21,073,681 UART: [art] Store priv key in slot 0x5
23,500,339 UART: [art] Derive Key Pair - Done
23,513,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,834 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,349 UART: [art] PUB.X = 2BE6E6AB8D7DA1B3BB7AD6D6DB0CACE6632668C6966EA4FD2805F63E827895877E610BE00F2CDA533E9EC77E70FF3BA8
25,228,618 UART: [art] PUB.Y = 271C7E1D634B946312ED920D9F91C64D324A6A9B5F17008E41966EFF998BF9DFF2828FB91EADF7BF838E98314D288192
25,235,870 UART: [art] SIG.R = C165F8157703186958E33590FDDA863138AC17A4DF70BCF22B1DA41BA686B45DAABD9A6425C103A6A606D96766937F01
25,243,190 UART: [art] SIG.S = B877A7ABAE138BA2D8D5B5B5E30B2AE14A75082020A635FDFB0550135CEEFF1D5DFC0F837878D3BA9CD6855F69C6C3C5
26,222,526 UART: Caliptra RT
26,223,238 UART: [state] CFI Enabled
26,355,799 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,412,399 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,568,018 UART: [rt]cmd =0x41544d4e, len=14344
34,563,171 >>> mbox cmd response data (8 bytes)
34,564,377 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,595,324 UART: [rt]cmd =0x41545348, len=116
34,615,137 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,573 writing to cptra_bootfsm_go
3,756,444 ready_for_fw is high
3,756,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,041,531 >>> mbox cmd response: success
19,296,688 UART:
19,297,111 UART: Running Caliptra FMC ...
19,298,356 UART:
19,298,537 UART: [state] CFI Enabled
19,306,222 UART: [fht] FMC Alias Private Key: 7
21,072,234 UART: [art] Extend RT PCRs Done
21,073,473 UART: [art] Lock RT PCRs Done
21,075,087 UART: [art] Populate DV Done
21,080,312 UART: [fht] FMC Alias Private Key: 7
21,081,923 UART: [art] Derive CDI
21,082,753 UART: [art] Store in slot 0x4
21,125,413 UART: [art] Derive Key Pair
21,126,457 UART: [art] Store priv key in slot 0x5
23,552,418 UART: [art] Derive Key Pair - Done
23,565,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,956 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,467 UART: [art] PUB.X = FC6031585DF796CEFFB02AABFB43061F4427F54FB14F7E1008E651EA6EC0BF5B5747DC92860E332DD14A1F2F243E4283
25,280,760 UART: [art] PUB.Y = C07F4AB23860D9B724AE4CC2B5F0976B62D322C402ECBC2CDDB8A5A143DDCB3E1D8E8B9377010922EA6A83F412D0BC5B
25,288,070 UART: [art] SIG.R = CDDFD3ECAE13250422B686C78ABCC9BC1392D792BDD31A1ECB4728AB7532836E995A77ABBC450E8FB09D8C7DC9C4A181
25,295,476 UART: [art] SIG.S = 5FDDF5BCCF422A21529C789B9CCEC209228EAA94A86F1F89D0EDC8C8509AC5A8CB8A5BB8F3F58FFAE39BA1E2D4CB32ED
26,274,662 UART: Caliptra RT
26,275,355 UART: [state] CFI Enabled
26,408,906 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,463,960 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,619,792 UART: [rt]cmd =0x41544d4e, len=14344
34,616,006 >>> mbox cmd response data (8 bytes)
34,616,623 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,647,325 UART: [rt]cmd =0x41545348, len=116
34,667,390 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,546 UART: [state] LifecycleState = Unprovisioned
86,201 UART: [state] DebugLocked = No
86,809 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,391 UART: [kat] SHA2-256
882,322 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,437 UART: [kat] ++
886,589 UART: [kat] sha1
891,029 UART: [kat] SHA2-256
892,967 UART: [kat] SHA2-384
895,646 UART: [kat] SHA2-512-ACC
897,547 UART: [kat] ECC-384
903,026 UART: [kat] HMAC-384Kdf
907,462 UART: [kat] LMS
1,475,658 UART: [kat] --
1,476,547 UART: [cold-reset] ++
1,476,999 UART: [fht] Storing FHT @ 0x50003400
1,480,002 UART: [idev] ++
1,480,170 UART: [idev] CDI.KEYID = 6
1,480,530 UART: [idev] SUBJECT.KEYID = 7
1,480,954 UART: [idev] UDS.KEYID = 0
1,481,299 ready_for_fw is high
1,481,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,878 UART: [idev] Erasing UDS.KEYID = 0
1,505,496 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,152 UART: [idev] --
1,515,149 UART: [ldev] ++
1,515,317 UART: [ldev] CDI.KEYID = 6
1,515,680 UART: [ldev] SUBJECT.KEYID = 5
1,516,106 UART: [ldev] AUTHORITY.KEYID = 7
1,516,569 UART: [ldev] FE.KEYID = 1
1,521,597 UART: [ldev] Erasing FE.KEYID = 1
1,546,756 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,862 UART: [ldev] --
1,586,177 UART: [fwproc] Waiting for Commands...
1,586,930 UART: [fwproc] Received command 0x46574c44
1,587,721 UART: [fwproc] Received Image of size 118548 bytes
2,932,629 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,591 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,809 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,198 >>> mbox cmd response: success
3,133,402 UART: [afmc] ++
3,133,570 UART: [afmc] CDI.KEYID = 6
3,133,932 UART: [afmc] SUBJECT.KEYID = 7
3,134,357 UART: [afmc] AUTHORITY.KEYID = 5
3,169,492 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,278 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,058 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,767 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,650 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,333 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,129 UART: [afmc] --
3,212,037 UART: [cold-reset] --
3,212,945 UART: [state] Locking Datavault
3,214,148 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,752 UART: [state] Locking ICCM
3,215,414 UART: [exit] Launching FMC @ 0x40000130
3,220,744 UART:
3,220,760 UART: Running Caliptra FMC ...
3,221,168 UART:
3,221,222 UART: [state] CFI Enabled
3,231,806 UART: [fht] FMC Alias Private Key: 7
3,351,300 UART: [art] Extend RT PCRs Done
3,351,728 UART: [art] Lock RT PCRs Done
3,353,006 UART: [art] Populate DV Done
3,361,167 UART: [fht] FMC Alias Private Key: 7
3,362,169 UART: [art] Derive CDI
3,362,449 UART: [art] Store in slot 0x4
3,448,379 UART: [art] Derive Key Pair
3,448,739 UART: [art] Store priv key in slot 0x5
3,461,842 UART: [art] Derive Key Pair - Done
3,476,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,380 UART: [art] PUB.X = 5F28F1C9834F4A366F32259769C337D9A8ADA29E4711A8803335CC11B19813BE63711ABCD3E2FC97EF0678650F04AAA2
3,499,143 UART: [art] PUB.Y = 793096B1DA82693F024BD0F32FB42521C84D90D63239AB0D23DD50AC985CC4AF93A4C4F52FFA94F452234C11D9E7110B
3,506,090 UART: [art] SIG.R = 9990958533F57FB35C66D69EF3D59CF0AB21497A96570F280851D16B26FA160F9E450FD9051052EE3F89D17CD874A92B
3,512,843 UART: [art] SIG.S = 1E7E95F1EAF8A53F2DBD4B75E5EF2F8355357618145931599F6B282A435F7C430216623AA958A1F8844671FBC965B947
3,536,702 UART: Caliptra RT
3,536,953 UART: [state] CFI Enabled
3,656,775 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,445 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,563 UART: [rt]cmd =0x41544d4e, len=14344
4,089,790 >>> mbox cmd response data (8 bytes)
4,089,791 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,106 UART: [rt]cmd =0x41545348, len=116
4,141,309 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,245 ready_for_fw is high
1,362,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,222 >>> mbox cmd response: success
3,041,539 UART:
3,041,555 UART: Running Caliptra FMC ...
3,041,963 UART:
3,042,017 UART: [state] CFI Enabled
3,052,199 UART: [fht] FMC Alias Private Key: 7
3,171,707 UART: [art] Extend RT PCRs Done
3,172,135 UART: [art] Lock RT PCRs Done
3,174,011 UART: [art] Populate DV Done
3,182,306 UART: [fht] FMC Alias Private Key: 7
3,183,474 UART: [art] Derive CDI
3,183,754 UART: [art] Store in slot 0x4
3,269,290 UART: [art] Derive Key Pair
3,269,650 UART: [art] Store priv key in slot 0x5
3,282,503 UART: [art] Derive Key Pair - Done
3,297,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,353 UART: [art] PUB.X = 4B1E3FE39B4562CDA90239156A35635EAF4A47A01833E0E14737BA2E572AA6DD04CB605E35C0946BFEE115CB59BE3896
3,320,125 UART: [art] PUB.Y = BD37D220BBCC87235A36E377CE757CD54C995B001DC92A23378897609204E9F0BD9262ED36BF7F4D36C2C417873B93D8
3,327,052 UART: [art] SIG.R = DE6E1C8A9B5BD415F485DBF1A04BA585E7C555514BA019B6B72D2AF75AFF8632E2FC02F263120F050786DE0F908792BC
3,333,819 UART: [art] SIG.S = 90A72652C9B807708A476958F7CA4D25041C0B818BBD33D85E4629A7373018C740256692F89D1C2AC0418092FF1BEF09
3,358,399 UART: Caliptra RT
3,358,650 UART: [state] CFI Enabled
3,478,951 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,479,621 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,529 UART: [rt]cmd =0x41544d4e, len=14344
3,912,260 >>> mbox cmd response data (8 bytes)
3,912,261 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,340 UART: [rt]cmd =0x41545348, len=116
3,963,561 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
87,082 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,556 UART: [kat] SHA2-256
882,487 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,602 UART: [kat] ++
886,754 UART: [kat] sha1
890,994 UART: [kat] SHA2-256
892,932 UART: [kat] SHA2-384
895,707 UART: [kat] SHA2-512-ACC
897,608 UART: [kat] ECC-384
902,845 UART: [kat] HMAC-384Kdf
907,455 UART: [kat] LMS
1,475,651 UART: [kat] --
1,476,646 UART: [cold-reset] ++
1,477,014 UART: [fht] Storing FHT @ 0x50003400
1,479,847 UART: [idev] ++
1,480,015 UART: [idev] CDI.KEYID = 6
1,480,375 UART: [idev] SUBJECT.KEYID = 7
1,480,799 UART: [idev] UDS.KEYID = 0
1,481,144 ready_for_fw is high
1,481,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,813 UART: [idev] Erasing UDS.KEYID = 0
1,505,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,749 UART: [idev] --
1,514,902 UART: [ldev] ++
1,515,070 UART: [ldev] CDI.KEYID = 6
1,515,433 UART: [ldev] SUBJECT.KEYID = 5
1,515,859 UART: [ldev] AUTHORITY.KEYID = 7
1,516,322 UART: [ldev] FE.KEYID = 1
1,521,616 UART: [ldev] Erasing FE.KEYID = 1
1,546,679 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,971 UART: [ldev] --
1,586,246 UART: [fwproc] Waiting for Commands...
1,586,977 UART: [fwproc] Received command 0x46574c44
1,587,768 UART: [fwproc] Received Image of size 118548 bytes
2,934,178 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,950 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,168 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,617 >>> mbox cmd response: success
3,134,773 UART: [afmc] ++
3,134,941 UART: [afmc] CDI.KEYID = 6
3,135,303 UART: [afmc] SUBJECT.KEYID = 7
3,135,728 UART: [afmc] AUTHORITY.KEYID = 5
3,170,773 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,181 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,961 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,670 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,553 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,236 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,218 UART: [afmc] --
3,214,222 UART: [cold-reset] --
3,214,932 UART: [state] Locking Datavault
3,216,139 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,743 UART: [state] Locking ICCM
3,217,229 UART: [exit] Launching FMC @ 0x40000130
3,222,559 UART:
3,222,575 UART: Running Caliptra FMC ...
3,222,983 UART:
3,223,126 UART: [state] CFI Enabled
3,233,794 UART: [fht] FMC Alias Private Key: 7
3,352,914 UART: [art] Extend RT PCRs Done
3,353,342 UART: [art] Lock RT PCRs Done
3,354,944 UART: [art] Populate DV Done
3,363,309 UART: [fht] FMC Alias Private Key: 7
3,364,441 UART: [art] Derive CDI
3,364,721 UART: [art] Store in slot 0x4
3,450,107 UART: [art] Derive Key Pair
3,450,467 UART: [art] Store priv key in slot 0x5
3,463,658 UART: [art] Derive Key Pair - Done
3,478,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,043 UART: [art] PUB.X = 8DB8662EC74D92FEF58034B0A266EF4038BB7C87828106444C4C1F39B32D1B49BA686480E0D45A7A0D917AFBA0E89CA8
3,501,815 UART: [art] PUB.Y = 6691B6D7CBB62EF0B422D533B075C2182E490F6137F2B4B4D5EC648F2B7EE699C97D60E81189A3227324A5CC9A872817
3,508,762 UART: [art] SIG.R = 1FB2AB9A068ECC745AFE1814DDB911138F748BD0576F5716FB7DDED722CE0C1C2D3FBD4602185BA8C1793807471325C5
3,515,530 UART: [art] SIG.S = DB2B5E784296189B1A9A3875DCCB13D2381ACE4E8F85E77DA41E80C3A7A4468E086A71F675BC6AA905E79D430C6A85A5
3,539,705 UART: Caliptra RT
3,540,048 UART: [state] CFI Enabled
3,660,010 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,660,680 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,726 UART: [rt]cmd =0x41544d4e, len=14344
4,094,065 >>> mbox cmd response data (8 bytes)
4,094,066 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,961 UART: [rt]cmd =0x41545348, len=116
4,145,456 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,092 ready_for_fw is high
1,363,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,361 >>> mbox cmd response: success
3,044,780 UART:
3,044,796 UART: Running Caliptra FMC ...
3,045,204 UART:
3,045,347 UART: [state] CFI Enabled
3,056,047 UART: [fht] FMC Alias Private Key: 7
3,175,563 UART: [art] Extend RT PCRs Done
3,175,991 UART: [art] Lock RT PCRs Done
3,177,407 UART: [art] Populate DV Done
3,185,576 UART: [fht] FMC Alias Private Key: 7
3,186,526 UART: [art] Derive CDI
3,186,806 UART: [art] Store in slot 0x4
3,272,760 UART: [art] Derive Key Pair
3,273,120 UART: [art] Store priv key in slot 0x5
3,285,501 UART: [art] Derive Key Pair - Done
3,300,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,212 UART: [art] PUB.X = 092AAAF35968A29490D7E7A1C94077DD252BEDC8B897984EF51A945BC2A77339BFD2951B51E0CAD8A35DEBFE54F90650
3,323,988 UART: [art] PUB.Y = D4ADA84BBF3459A38E349EFF30B3F66EC56072B574532D508132FC06772C4512A266AD792FD374ADBD77C44F658501E6
3,330,936 UART: [art] SIG.R = 5CDB252300F4ED3DEFA2853AE6EA9734F44367F9445C80D342A612C4ECBF87CE11D0550DE36387245FD6A74A907C4B87
3,337,689 UART: [art] SIG.S = 5C0AFFAEAC9F53CD3F0304822CBDFCB9AA6EDD6135E12FB38DE2DE8E9BA24AE486E806A89D36F3CAA9F126C5660BDA32
3,361,370 UART: Caliptra RT
3,361,713 UART: [state] CFI Enabled
3,482,350 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,483,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,026 UART: [rt]cmd =0x41544d4e, len=14344
3,916,761 >>> mbox cmd response data (8 bytes)
3,916,762 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,946,717 UART: [rt]cmd =0x41545348, len=116
3,968,908 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
891,446 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
899,774 UART: [kat] SHA2-256
901,714 UART: [kat] SHA2-384
904,545 UART: [kat] SHA2-512-ACC
906,446 UART: [kat] ECC-384
916,211 UART: [kat] HMAC-384Kdf
920,959 UART: [kat] LMS
1,169,271 UART: [kat] --
1,170,082 UART: [cold-reset] ++
1,170,588 UART: [fht] FHT @ 0x50003400
1,173,372 UART: [idev] ++
1,173,540 UART: [idev] CDI.KEYID = 6
1,173,901 UART: [idev] SUBJECT.KEYID = 7
1,174,326 UART: [idev] UDS.KEYID = 0
1,174,672 ready_for_fw is high
1,174,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,355 UART: [idev] Erasing UDS.KEYID = 0
1,198,895 UART: [idev] Sha1 KeyId Algorithm
1,207,589 UART: [idev] --
1,208,674 UART: [ldev] ++
1,208,842 UART: [ldev] CDI.KEYID = 6
1,209,206 UART: [ldev] SUBJECT.KEYID = 5
1,209,633 UART: [ldev] AUTHORITY.KEYID = 7
1,210,096 UART: [ldev] FE.KEYID = 1
1,215,360 UART: [ldev] Erasing FE.KEYID = 1
1,241,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,358 UART: [ldev] --
1,280,729 UART: [fwproc] Wait for Commands...
1,281,366 UART: [fwproc] Recv command 0x46574c44
1,282,099 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,637 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,812 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,139 >>> mbox cmd response: success
2,825,291 UART: [afmc] ++
2,825,459 UART: [afmc] CDI.KEYID = 6
2,825,822 UART: [afmc] SUBJECT.KEYID = 7
2,826,248 UART: [afmc] AUTHORITY.KEYID = 5
2,861,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,540 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,289 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,999 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,880 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,581 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,310 UART: [afmc] --
2,905,155 UART: [cold-reset] --
2,905,941 UART: [state] Locking Datavault
2,907,108 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,712 UART: [state] Locking ICCM
2,908,296 UART: [exit] Launching FMC @ 0x40000130
2,913,626 UART:
2,913,642 UART: Running Caliptra FMC ...
2,914,050 UART:
2,914,104 UART: [state] CFI Enabled
2,924,830 UART: [fht] FMC Alias Private Key: 7
3,043,212 UART: [art] Extend RT PCRs Done
3,043,640 UART: [art] Lock RT PCRs Done
3,045,196 UART: [art] Populate DV Done
3,053,631 UART: [fht] FMC Alias Private Key: 7
3,054,589 UART: [art] Derive CDI
3,054,869 UART: [art] Store in slot 0x4
3,140,572 UART: [art] Derive Key Pair
3,140,932 UART: [art] Store priv key in slot 0x5
3,154,756 UART: [art] Derive Key Pair - Done
3,169,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,950 UART: [art] PUB.X = 3810BC61374560903DCF57F9D10D369A49606357D0B7C7725452A316D5A3EFD69F6DD3534096DFBFBE9972637BCF6399
3,192,715 UART: [art] PUB.Y = 1700E1F3C1545E3B68E28A02C8F264980B796182287E5801698DD55D4B118BF50753F2886691E1D1497303F4A41C7527
3,199,612 UART: [art] SIG.R = 829164EACE46DA8A1ACF497ACC3742E144DE08C5F631FE33307DA7CD39BCE9B8499C5A8D801C803969D0BB9D447933E4
3,206,391 UART: [art] SIG.S = E50BE7EF68F33D295DC9101B00006C9B88E4EC1CAE6D3CD27C976FC09B9A5B5EEDB1FF85C73ADF951EA2420DFC1C5CB3
3,229,601 UART: Caliptra RT
3,229,852 UART: [state] CFI Enabled
3,349,800 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,350,470 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,398 UART: [rt]cmd =0x41544d4e, len=14344
3,783,031 >>> mbox cmd response data (8 bytes)
3,783,032 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,812,871 UART: [rt]cmd =0x41545348, len=116
3,834,724 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,526 ready_for_fw is high
1,058,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,800 >>> mbox cmd response: success
2,738,783 UART:
2,738,799 UART: Running Caliptra FMC ...
2,739,207 UART:
2,739,261 UART: [state] CFI Enabled
2,749,951 UART: [fht] FMC Alias Private Key: 7
2,868,431 UART: [art] Extend RT PCRs Done
2,868,859 UART: [art] Lock RT PCRs Done
2,870,391 UART: [art] Populate DV Done
2,878,620 UART: [fht] FMC Alias Private Key: 7
2,879,792 UART: [art] Derive CDI
2,880,072 UART: [art] Store in slot 0x4
2,965,743 UART: [art] Derive Key Pair
2,966,103 UART: [art] Store priv key in slot 0x5
2,979,405 UART: [art] Derive Key Pair - Done
2,994,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,284 UART: [art] PUB.X = AE10D5DAC76B5F62C34AF9852A451D44BDA7218A70F448196911CF5CEE36BE07FD9386FE7E76E3737D5E9E5DFB04FA26
3,017,064 UART: [art] PUB.Y = 5C4B44AF391159A2F9996D21CCFBB39765892B6D74062A3991FAD882B10DA682F6C162B84E7205CF915271FA349BA0F5
3,024,007 UART: [art] SIG.R = 88F82D41124B27E4B463C365EF15A316831A930A50D91989308BAEE992E9C9C298A72F1B11AF35C3FEAD116B3F3F09E2
3,030,775 UART: [art] SIG.S = B5101B94AFBAA523D5D87B7863B58E56C28A7CDA9C5F9827EFBE894E2E812C6C27FBB2F01B6E406D2EB85F29449DB719
3,054,803 UART: Caliptra RT
3,055,054 UART: [state] CFI Enabled
3,175,232 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,175,902 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,864 UART: [rt]cmd =0x41544d4e, len=14344
3,608,873 >>> mbox cmd response data (8 bytes)
3,608,874 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,999 UART: [rt]cmd =0x41545348, len=116
3,660,078 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
891,399 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,503 UART: [kat] ++
895,655 UART: [kat] sha1
899,955 UART: [kat] SHA2-256
901,895 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
916,892 UART: [kat] HMAC-384Kdf
921,422 UART: [kat] LMS
1,169,734 UART: [kat] --
1,170,541 UART: [cold-reset] ++
1,171,049 UART: [fht] FHT @ 0x50003400
1,173,783 UART: [idev] ++
1,173,951 UART: [idev] CDI.KEYID = 6
1,174,312 UART: [idev] SUBJECT.KEYID = 7
1,174,737 UART: [idev] UDS.KEYID = 0
1,175,083 ready_for_fw is high
1,175,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,792 UART: [idev] Erasing UDS.KEYID = 0
1,200,024 UART: [idev] Sha1 KeyId Algorithm
1,209,104 UART: [idev] --
1,210,183 UART: [ldev] ++
1,210,351 UART: [ldev] CDI.KEYID = 6
1,210,715 UART: [ldev] SUBJECT.KEYID = 5
1,211,142 UART: [ldev] AUTHORITY.KEYID = 7
1,211,605 UART: [ldev] FE.KEYID = 1
1,216,823 UART: [ldev] Erasing FE.KEYID = 1
1,242,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,857 UART: [ldev] --
1,282,116 UART: [fwproc] Wait for Commands...
1,282,747 UART: [fwproc] Recv command 0x46574c44
1,283,480 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,234 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,409 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,610 >>> mbox cmd response: success
2,828,698 UART: [afmc] ++
2,828,866 UART: [afmc] CDI.KEYID = 6
2,829,229 UART: [afmc] SUBJECT.KEYID = 7
2,829,655 UART: [afmc] AUTHORITY.KEYID = 5
2,865,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,812 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,522 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,403 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,104 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,821 UART: [afmc] --
2,908,632 UART: [cold-reset] --
2,909,434 UART: [state] Locking Datavault
2,910,783 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,387 UART: [state] Locking ICCM
2,911,873 UART: [exit] Launching FMC @ 0x40000130
2,917,203 UART:
2,917,219 UART: Running Caliptra FMC ...
2,917,627 UART:
2,917,770 UART: [state] CFI Enabled
2,928,244 UART: [fht] FMC Alias Private Key: 7
3,046,808 UART: [art] Extend RT PCRs Done
3,047,236 UART: [art] Lock RT PCRs Done
3,048,746 UART: [art] Populate DV Done
3,057,025 UART: [fht] FMC Alias Private Key: 7
3,058,171 UART: [art] Derive CDI
3,058,451 UART: [art] Store in slot 0x4
3,144,224 UART: [art] Derive Key Pair
3,144,584 UART: [art] Store priv key in slot 0x5
3,158,126 UART: [art] Derive Key Pair - Done
3,173,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,645 UART: [art] PUB.X = A4FA2E84E141BF0C9E064E4DFEBD2BD389B16DC0441B7AB8DA1A95505E27F4C6722DC793D30FBBFCED5E1E3A5ABFC2CE
3,196,440 UART: [art] PUB.Y = DBF3EBE96240F02396F56AFAADC1D301051C1DACE67AB39AC0F6BAA79168DEA721E750B8FE22C905E668D88D7306845D
3,203,396 UART: [art] SIG.R = 78E6C6DB848798B1AFCC69210725D1ACED54B5B02840F37B1E10FD5CA902428E1A42AF96FEF2EBE0CA53ECC2D5CE3244
3,210,180 UART: [art] SIG.S = 5249A8CE8B134C44CF17EAB8912FD7DF003D69D45FAA335BC84D0C80B31BCDA76AE7A8CF847443F05C3F824D099F4B92
3,233,936 UART: Caliptra RT
3,234,279 UART: [state] CFI Enabled
3,354,605 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,355,275 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,387 UART: [rt]cmd =0x41544d4e, len=14344
3,788,478 >>> mbox cmd response data (8 bytes)
3,788,479 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,890 UART: [rt]cmd =0x41545348, len=116
3,840,495 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,233 ready_for_fw is high
1,059,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,051 >>> mbox cmd response: success
2,741,430 UART:
2,741,446 UART: Running Caliptra FMC ...
2,741,854 UART:
2,741,997 UART: [state] CFI Enabled
2,752,737 UART: [fht] FMC Alias Private Key: 7
2,871,785 UART: [art] Extend RT PCRs Done
2,872,213 UART: [art] Lock RT PCRs Done
2,873,859 UART: [art] Populate DV Done
2,882,226 UART: [fht] FMC Alias Private Key: 7
2,883,340 UART: [art] Derive CDI
2,883,620 UART: [art] Store in slot 0x4
2,969,691 UART: [art] Derive Key Pair
2,970,051 UART: [art] Store priv key in slot 0x5
2,983,983 UART: [art] Derive Key Pair - Done
2,998,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,908 UART: [art] PUB.X = 7C7055F2CA2BE6FB65A7726A7A71B2BB2D9AF23289E44F1E95E4DD51167084C98DB68FAD826B5FB1B09579CF085430AA
3,021,687 UART: [art] PUB.Y = 8DCA314773609DB3AA5048A77000462F1F47901C5A32E67F148323559C464CC6520509EFDF9E64ADFC41EBF8C5FBC416
3,028,613 UART: [art] SIG.R = 2B59173C25117506B79122A18A62445020E7386378FF8842E7EE8F54354FB9D207D792780A7CE0A3B610BFAED0B11751
3,035,366 UART: [art] SIG.S = 8EE41D779F195E0AB3D74772C657463F37919CA67DECDD87174CB5DEB4C78F87746E50D9B5B7CFBE2436918776F6FFF1
3,059,253 UART: Caliptra RT
3,059,596 UART: [state] CFI Enabled
3,180,109 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,180,779 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,905 UART: [rt]cmd =0x41544d4e, len=14344
3,613,538 >>> mbox cmd response data (8 bytes)
3,613,539 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,556 UART: [rt]cmd =0x41545348, len=116
3,664,785 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
893,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,311 UART: [kat] ++
897,463 UART: [kat] sha1
901,745 UART: [kat] SHA2-256
903,685 UART: [kat] SHA2-384
906,496 UART: [kat] SHA2-512-ACC
908,397 UART: [kat] ECC-384
918,332 UART: [kat] HMAC-384Kdf
923,138 UART: [kat] LMS
1,171,466 UART: [kat] --
1,172,459 UART: [cold-reset] ++
1,172,863 UART: [fht] FHT @ 0x50003400
1,175,462 UART: [idev] ++
1,175,630 UART: [idev] CDI.KEYID = 6
1,175,990 UART: [idev] SUBJECT.KEYID = 7
1,176,414 UART: [idev] UDS.KEYID = 0
1,176,759 ready_for_fw is high
1,176,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,880 UART: [idev] Erasing UDS.KEYID = 0
1,202,007 UART: [idev] Sha1 KeyId Algorithm
1,210,395 UART: [idev] --
1,211,545 UART: [ldev] ++
1,211,713 UART: [ldev] CDI.KEYID = 6
1,212,076 UART: [ldev] SUBJECT.KEYID = 5
1,212,502 UART: [ldev] AUTHORITY.KEYID = 7
1,212,965 UART: [ldev] FE.KEYID = 1
1,218,231 UART: [ldev] Erasing FE.KEYID = 1
1,244,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,697 UART: [ldev] --
1,284,054 UART: [fwproc] Wait for Commands...
1,284,766 UART: [fwproc] Recv command 0x46574c44
1,285,494 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,992 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,162 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,385 >>> mbox cmd response: success
2,830,625 UART: [afmc] ++
2,830,793 UART: [afmc] CDI.KEYID = 6
2,831,155 UART: [afmc] SUBJECT.KEYID = 7
2,831,580 UART: [afmc] AUTHORITY.KEYID = 5
2,866,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,306 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,015 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,898 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,599 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,427 UART: [afmc] --
2,910,541 UART: [cold-reset] --
2,911,413 UART: [state] Locking Datavault
2,912,730 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,334 UART: [state] Locking ICCM
2,913,842 UART: [exit] Launching FMC @ 0x40000130
2,919,172 UART:
2,919,188 UART: Running Caliptra FMC ...
2,919,596 UART:
2,919,650 UART: [state] CFI Enabled
2,929,858 UART: [fht] FMC Alias Private Key: 7
3,048,892 UART: [art] Extend RT PCRs Done
3,049,320 UART: [art] Lock RT PCRs Done
3,051,034 UART: [art] Populate DV Done
3,059,481 UART: [fht] FMC Alias Private Key: 7
3,060,641 UART: [art] Derive CDI
3,060,921 UART: [art] Store in slot 0x4
3,146,332 UART: [art] Derive Key Pair
3,146,692 UART: [art] Store priv key in slot 0x5
3,159,398 UART: [art] Derive Key Pair - Done
3,174,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,468 UART: [art] PUB.X = E7F9DAC4BEB55E09DBAD5D042DF4E9B021B1406E4D652AB8C5F04C71457C8DBCBE87B23C1EBE5A85A9998F24AD038867
3,197,251 UART: [art] PUB.Y = 507DE6319B54545C27A3A7046E3E8BC2E51FC8D7A00D50EC9B9B2BDD424F34B04C382405447A6D3F0822B50FA5B2C4C4
3,204,194 UART: [art] SIG.R = 2A167A4020496D2C6E04945543CE22B337B369752EA608E1E35D10169EFEF2D5AE425C71158A68B314919D901C16D783
3,210,950 UART: [art] SIG.S = F82B86756B3C9A06D4B47CE101E3E11930F9494D47AB3D6D66C1FFDA245C50BC8BBAD4B3D56B9F59134D482D2BC5D2EE
3,234,742 UART: Caliptra RT
3,234,993 UART: [state] CFI Enabled
3,354,452 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,355,122 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,110 UART: [rt]cmd =0x41544d4e, len=14344
3,788,719 >>> mbox cmd response data (8 bytes)
3,788,720 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,873 UART: [rt]cmd =0x41545348, len=116
3,840,130 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,493 ready_for_fw is high
1,060,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,414 >>> mbox cmd response: success
2,740,843 UART:
2,740,859 UART: Running Caliptra FMC ...
2,741,267 UART:
2,741,321 UART: [state] CFI Enabled
2,751,887 UART: [fht] FMC Alias Private Key: 7
2,870,733 UART: [art] Extend RT PCRs Done
2,871,161 UART: [art] Lock RT PCRs Done
2,872,787 UART: [art] Populate DV Done
2,881,020 UART: [fht] FMC Alias Private Key: 7
2,882,118 UART: [art] Derive CDI
2,882,398 UART: [art] Store in slot 0x4
2,968,033 UART: [art] Derive Key Pair
2,968,393 UART: [art] Store priv key in slot 0x5
2,981,605 UART: [art] Derive Key Pair - Done
2,996,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,965 UART: [art] PUB.X = A9438693C65B36F90B04F0E4FC58791867171E0BF8CE0AC6074ED7B7352E5392A5169B75DC7B5FE60F9E2A90E768B3CE
3,019,723 UART: [art] PUB.Y = CC46E5F965C564933AF3F785562DB1CE8C3B9CF8799ED33BA7870F9F5EC0852285A143A72E841BCCABDDDDAA48547D94
3,026,686 UART: [art] SIG.R = FD726A2E142EF3B3E3EFBA89B55BF16125A101F6E8373271D5E63127299A915B8E620FA9D6E2AD87BF14F79C7E1112AD
3,033,460 UART: [art] SIG.S = 4FC2C702D4EC9D77A82FE3A84C85C4C0960AB53161064AD3C54B9558E083779B7CF03F2746234423AFCA579BED286698
3,057,025 UART: Caliptra RT
3,057,276 UART: [state] CFI Enabled
3,177,067 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,737 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,687 UART: [rt]cmd =0x41544d4e, len=14344
3,610,428 >>> mbox cmd response data (8 bytes)
3,610,429 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,214 UART: [rt]cmd =0x41545348, len=116
3,660,947 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
893,305 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,430 UART: [kat] ++
897,582 UART: [kat] sha1
901,770 UART: [kat] SHA2-256
903,710 UART: [kat] SHA2-384
906,675 UART: [kat] SHA2-512-ACC
908,576 UART: [kat] ECC-384
918,023 UART: [kat] HMAC-384Kdf
922,817 UART: [kat] LMS
1,171,145 UART: [kat] --
1,172,070 UART: [cold-reset] ++
1,172,618 UART: [fht] FHT @ 0x50003400
1,175,309 UART: [idev] ++
1,175,477 UART: [idev] CDI.KEYID = 6
1,175,837 UART: [idev] SUBJECT.KEYID = 7
1,176,261 UART: [idev] UDS.KEYID = 0
1,176,606 ready_for_fw is high
1,176,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,323 UART: [idev] Erasing UDS.KEYID = 0
1,201,460 UART: [idev] Sha1 KeyId Algorithm
1,210,094 UART: [idev] --
1,211,130 UART: [ldev] ++
1,211,298 UART: [ldev] CDI.KEYID = 6
1,211,661 UART: [ldev] SUBJECT.KEYID = 5
1,212,087 UART: [ldev] AUTHORITY.KEYID = 7
1,212,550 UART: [ldev] FE.KEYID = 1
1,217,548 UART: [ldev] Erasing FE.KEYID = 1
1,243,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,170 UART: [ldev] --
1,282,541 UART: [fwproc] Wait for Commands...
1,283,357 UART: [fwproc] Recv command 0x46574c44
1,284,085 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,839 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,009 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,336 >>> mbox cmd response: success
2,830,568 UART: [afmc] ++
2,830,736 UART: [afmc] CDI.KEYID = 6
2,831,098 UART: [afmc] SUBJECT.KEYID = 7
2,831,523 UART: [afmc] AUTHORITY.KEYID = 5
2,866,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,993 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,702 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,585 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,286 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,026 UART: [afmc] --
2,910,020 UART: [cold-reset] --
2,910,592 UART: [state] Locking Datavault
2,911,863 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,467 UART: [state] Locking ICCM
2,912,887 UART: [exit] Launching FMC @ 0x40000130
2,918,217 UART:
2,918,233 UART: Running Caliptra FMC ...
2,918,641 UART:
2,918,784 UART: [state] CFI Enabled
2,929,130 UART: [fht] FMC Alias Private Key: 7
3,048,026 UART: [art] Extend RT PCRs Done
3,048,454 UART: [art] Lock RT PCRs Done
3,049,598 UART: [art] Populate DV Done
3,057,805 UART: [fht] FMC Alias Private Key: 7
3,058,827 UART: [art] Derive CDI
3,059,107 UART: [art] Store in slot 0x4
3,144,866 UART: [art] Derive Key Pair
3,145,226 UART: [art] Store priv key in slot 0x5
3,158,676 UART: [art] Derive Key Pair - Done
3,173,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,666 UART: [art] PUB.X = 59E0BB1B668EBAFDAF7A3BC7BA2FCB83C23E2C87D56BAE7F65DD42CB9D8380024729DEA68598EFB3F50050DDD20969D8
3,196,432 UART: [art] PUB.Y = 4D78D5B63E67C5F15029DC928270F130C2885BD9F4EA49AE543780DEE1358F7E06D35F8A5ABABD0BB07CCB6AEA8A4853
3,203,392 UART: [art] SIG.R = 5B16B7881A9CFBA986E5A09B0A42DA3605B0B4FBB5C72370BE24C0FE57CBC40348EB7A5ECE420A7C6448B3C304DD7BB8
3,210,167 UART: [art] SIG.S = BB24D33EAB7A2D62966DF1F590FEE5D451401DE8E806B8BE70FA18B3509F34DB247FF395263B7105D575E4063045EC63
3,233,970 UART: Caliptra RT
3,234,313 UART: [state] CFI Enabled
3,354,366 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,355,036 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,228 UART: [rt]cmd =0x41544d4e, len=14344
3,788,053 >>> mbox cmd response data (8 bytes)
3,788,054 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,245 UART: [rt]cmd =0x41545348, len=116
3,840,210 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,242 ready_for_fw is high
1,060,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,737 >>> mbox cmd response: success
2,741,930 UART:
2,741,946 UART: Running Caliptra FMC ...
2,742,354 UART:
2,742,497 UART: [state] CFI Enabled
2,753,087 UART: [fht] FMC Alias Private Key: 7
2,872,015 UART: [art] Extend RT PCRs Done
2,872,443 UART: [art] Lock RT PCRs Done
2,874,053 UART: [art] Populate DV Done
2,882,190 UART: [fht] FMC Alias Private Key: 7
2,883,132 UART: [art] Derive CDI
2,883,412 UART: [art] Store in slot 0x4
2,968,893 UART: [art] Derive Key Pair
2,969,253 UART: [art] Store priv key in slot 0x5
2,982,679 UART: [art] Derive Key Pair - Done
2,997,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,550 UART: [art] PUB.X = 5DE387A4919B3B12BD0644E765216670EF0059C42A8948206158785D5050CA096C235C98075891C491E37624379C1E11
3,020,269 UART: [art] PUB.Y = FC310BEAD2B95BE1181BEDBDE74B77F23B95EF85387C7F62CA49F2933F2ED530985E5E71BEB659B3895CFB34A42B9772
3,027,232 UART: [art] SIG.R = 999A4174935F808566ECEF2332E3E18EFDCCC46F4EFAE4966AE0BEC7B147F0470BF84832BC474B33F4B68D0ADB7D5265
3,034,010 UART: [art] SIG.S = 88B4BC72FB1949CD422147DD07EA9B3E72AD082FC2DCC1B29ED782C10E8109EACB935E83E2ACC17B6FCE74108D654195
3,058,328 UART: Caliptra RT
3,058,671 UART: [state] CFI Enabled
3,179,205 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,179,875 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,845 UART: [rt]cmd =0x41544d4e, len=14344
3,612,196 >>> mbox cmd response data (8 bytes)
3,612,197 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,192 UART: [rt]cmd =0x41545348, len=116
3,663,655 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,232 UART:
192,584 UART: Running Caliptra ROM ...
193,779 UART:
193,934 UART: [state] CFI Enabled
260,856 UART: [state] LifecycleState = Unprovisioned
262,830 UART: [state] DebugLocked = No
264,507 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,799 UART: [kat] SHA2-256
439,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,033 UART: [kat] ++
450,678 UART: [kat] sha1
462,270 UART: [kat] SHA2-256
464,928 UART: [kat] SHA2-384
469,604 UART: [kat] SHA2-512-ACC
471,959 UART: [kat] ECC-384
2,765,886 UART: [kat] HMAC-384Kdf
2,777,985 UART: [kat] LMS
3,968,343 UART: [kat] --
3,972,565 UART: [cold-reset] ++
3,973,792 UART: [fht] Storing FHT @ 0x50003400
3,986,547 UART: [idev] ++
3,987,117 UART: [idev] CDI.KEYID = 6
3,988,030 UART: [idev] SUBJECT.KEYID = 7
3,989,839 UART: [idev] UDS.KEYID = 0
3,990,808 ready_for_fw is high
3,990,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,935 UART: [idev] Erasing UDS.KEYID = 0
7,322,015 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,672 UART: [idev] --
7,348,823 UART: [ldev] ++
7,349,433 UART: [ldev] CDI.KEYID = 6
7,350,319 UART: [ldev] SUBJECT.KEYID = 5
7,351,422 UART: [ldev] AUTHORITY.KEYID = 7
7,352,762 UART: [ldev] FE.KEYID = 1
7,398,112 UART: [ldev] Erasing FE.KEYID = 1
10,730,651 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,085,550 UART: [ldev] --
13,090,383 UART: [fwproc] Waiting for Commands...
13,093,293 UART: [fwproc] Received command 0x46574c44
13,095,477 UART: [fwproc] Received Image of size 118548 bytes
17,201,066 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,275,172 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,348,357 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,677,333 >>> mbox cmd response: success
17,682,121 UART: [afmc] ++
17,682,743 UART: [afmc] CDI.KEYID = 6
17,683,637 UART: [afmc] SUBJECT.KEYID = 7
17,684,912 UART: [afmc] AUTHORITY.KEYID = 5
21,045,927 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,344,609 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,346,865 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,361,340 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,376,045 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,390,473 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,410,934 UART: [afmc] --
23,415,332 UART: [cold-reset] --
23,418,977 UART: [state] Locking Datavault
23,422,463 UART: [state] Locking PCR0, PCR1 and PCR31
23,424,217 UART: [state] Locking ICCM
23,425,422 UART: [exit] Launching FMC @ 0x40000130
23,433,775 UART:
23,434,056 UART: Running Caliptra FMC ...
23,435,177 UART:
23,435,337 UART: [state] CFI Enabled
23,504,841 UART: [fht] FMC Alias Private Key: 7
25,866,607 UART: [art] Extend RT PCRs Done
25,867,833 UART: [art] Lock RT PCRs Done
25,869,513 UART: [art] Populate DV Done
25,874,657 UART: [fht] FMC Alias Private Key: 7
25,876,253 UART: [art] Derive CDI
25,877,070 UART: [art] Store in slot 0x4
25,934,484 UART: [art] Derive Key Pair
25,935,523 UART: [art] Store priv key in slot 0x5
29,228,324 UART: [art] Derive Key Pair - Done
29,241,321 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,530,563 UART: [art] Erasing AUTHORITY.KEYID = 7
31,532,078 UART: [art] PUB.X = A702C46FB2336B00F62EAD4C0092AB92EF944BB09503D268ABDA94655480F37523A6BDAAE585BD032F8A6DD35594612A
31,539,305 UART: [art] PUB.Y = 691AC41C998F5FADBF89E422783487ACD439815AD9C5FEDD8C520272A331EC8BE4C7D7EABC8B8BF18FC840C0AC59F13A
31,546,567 UART: [art] SIG.R = B6CC3D7418B7DDF3669422AABD75611702D811BE8F82C5D288383E5119768D03E4C6C62E83C8802D46268296308B114A
31,553,928 UART: [art] SIG.S = A07994BE98A49A52C13FEE69341335195847681FF64E6DB4BB2EF16581B030DFFAD0242FED3FC9D0AF11B06DE8F9468C
32,859,288 UART: Caliptra RT
32,859,982 UART: [state] CFI Enabled
33,038,019 UART: [rt] RT listening for mailbox commands...
33,040,563 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,195,929 UART: [rt]cmd =0x41544d4e, len=14344
38,497,265 >>> mbox cmd response data (8 bytes)
38,497,904 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,528,528 UART: [rt]cmd =0x41545348, len=116
38,548,666 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,782,567 ready_for_fw is high
3,783,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,959,251 >>> mbox cmd response: success
23,672,225 UART:
23,672,636 UART: Running Caliptra FMC ...
23,673,793 UART:
23,673,959 UART: [state] CFI Enabled
23,740,426 UART: [fht] FMC Alias Private Key: 7
26,080,946 UART: [art] Extend RT PCRs Done
26,082,199 UART: [art] Lock RT PCRs Done
26,083,887 UART: [art] Populate DV Done
26,089,298 UART: [fht] FMC Alias Private Key: 7
26,090,949 UART: [art] Derive CDI
26,091,766 UART: [art] Store in slot 0x4
26,149,652 UART: [art] Derive Key Pair
26,150,687 UART: [art] Store priv key in slot 0x5
29,443,303 UART: [art] Derive Key Pair - Done
29,456,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,214 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,739 UART: [art] PUB.X = C9EDC866AC77270FED246410D26A5177FB09B12F609F4132560469CCD1C8E4A743176716AC6560E6523C9BAF81CC617D
31,754,016 UART: [art] PUB.Y = CD6835583E428B66ED3A12AA3F22C1B35D59535305E48EE60E752A951C59DFCE299C74D570F7C91431FAA2D7F9BB4DC1
31,761,233 UART: [art] SIG.R = A21F7FFB157F4FF8E268E2F7B4A9DC61BA3946BE0BBDC4EE20A7B35874AC70F7AFC787508885BB91B3FFEA800E6779FD
31,768,645 UART: [art] SIG.S = 36F60A5A859688018C34F127F8C05092D0E68C3789B665EA0C94DE3A69ACE83D12B3895EAE4DF466EA7BA3BD2ABC852A
33,073,752 UART: Caliptra RT
33,074,450 UART: [state] CFI Enabled
33,250,845 UART: [rt] RT listening for mailbox commands...
33,253,270 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,408,931 UART: [rt]cmd =0x41544d4e, len=14344
38,709,564 >>> mbox cmd response data (8 bytes)
38,710,157 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,740,730 UART: [rt]cmd =0x41545348, len=116
38,760,915 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
192,376 UART:
192,723 UART: Running Caliptra ROM ...
193,911 UART:
603,655 UART: [state] CFI Enabled
617,567 UART: [state] LifecycleState = Unprovisioned
619,512 UART: [state] DebugLocked = No
621,747 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,523 UART: [kat] SHA2-256
797,236 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,753 UART: [kat] ++
808,313 UART: [kat] sha1
819,110 UART: [kat] SHA2-256
821,826 UART: [kat] SHA2-384
828,955 UART: [kat] SHA2-512-ACC
831,319 UART: [kat] ECC-384
3,117,189 UART: [kat] HMAC-384Kdf
3,130,346 UART: [kat] LMS
4,320,444 UART: [kat] --
4,326,674 UART: [cold-reset] ++
4,327,901 UART: [fht] Storing FHT @ 0x50003400
4,339,391 UART: [idev] ++
4,339,953 UART: [idev] CDI.KEYID = 6
4,340,927 UART: [idev] SUBJECT.KEYID = 7
4,342,163 UART: [idev] UDS.KEYID = 0
4,343,105 ready_for_fw is high
4,343,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,132 UART: [idev] Erasing UDS.KEYID = 0
7,631,134 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,293 UART: [idev] --
7,657,141 UART: [ldev] ++
7,657,702 UART: [ldev] CDI.KEYID = 6
7,658,634 UART: [ldev] SUBJECT.KEYID = 5
7,659,887 UART: [ldev] AUTHORITY.KEYID = 7
7,661,166 UART: [ldev] FE.KEYID = 1
7,673,617 UART: [ldev] Erasing FE.KEYID = 1
10,964,576 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,270,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,285,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,801 UART: [ldev] --
13,324,003 UART: [fwproc] Waiting for Commands...
13,325,778 UART: [fwproc] Received command 0x46574c44
13,327,957 UART: [fwproc] Received Image of size 118548 bytes
17,442,373 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,516,747 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,589,939 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,919,248 >>> mbox cmd response: success
17,923,212 UART: [afmc] ++
17,923,817 UART: [afmc] CDI.KEYID = 6
17,924,752 UART: [afmc] SUBJECT.KEYID = 7
17,926,014 UART: [afmc] AUTHORITY.KEYID = 5
21,237,495 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,533,295 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,535,553 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,549,982 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,564,692 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,579,108 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,599,676 UART: [afmc] --
23,602,992 UART: [cold-reset] --
23,605,399 UART: [state] Locking Datavault
23,608,804 UART: [state] Locking PCR0, PCR1 and PCR31
23,610,552 UART: [state] Locking ICCM
23,612,673 UART: [exit] Launching FMC @ 0x40000130
23,621,115 UART:
23,621,350 UART: Running Caliptra FMC ...
23,622,444 UART:
23,622,598 UART: [state] CFI Enabled
23,630,500 UART: [fht] FMC Alias Private Key: 7
25,971,017 UART: [art] Extend RT PCRs Done
25,972,238 UART: [art] Lock RT PCRs Done
25,973,832 UART: [art] Populate DV Done
25,979,455 UART: [fht] FMC Alias Private Key: 7
25,981,042 UART: [art] Derive CDI
25,981,778 UART: [art] Store in slot 0x4
26,024,360 UART: [art] Derive Key Pair
26,025,402 UART: [art] Store priv key in slot 0x5
29,267,803 UART: [art] Derive Key Pair - Done
29,280,526 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,046 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,555 UART: [art] PUB.X = 163CE4C76314AEA6E92C966A1279CA9D3F28EF63B41BB451031093934480132EAC9D2A5903E22745BDF02CBAEB2C0952
31,569,820 UART: [art] PUB.Y = 9CEDFE8E107976FEFEFF56D05194FD2F2B92E47D4DC177DDE1BB472E29500CA69F46F3191ABFF9A234ECD577CE14940F
31,577,110 UART: [art] SIG.R = 54093647428F8DDBCE232807E0FD8526720AEFBBFC53BFC2A388E96CFE55D9257C90EB54CAA10DBA0E10594A186517D2
31,584,502 UART: [art] SIG.S = 1B59F0AB9890C26B0A1ACC83B4C10E1B3B4629DAD87F30BC626DB3D994811DC3CB6D8003F5BA042302F3EFD8E071359F
32,888,936 UART: Caliptra RT
32,889,623 UART: [state] CFI Enabled
33,023,845 UART: [rt] RT listening for mailbox commands...
33,026,280 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,181,981 UART: [rt]cmd =0x41544d4e, len=14344
38,482,804 >>> mbox cmd response data (8 bytes)
38,483,403 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,514,078 UART: [rt]cmd =0x41545348, len=116
38,534,698 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
4,126,983 ready_for_fw is high
4,127,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,175,376 >>> mbox cmd response: success
23,814,054 UART:
23,814,463 UART: Running Caliptra FMC ...
23,815,570 UART:
23,815,731 UART: [state] CFI Enabled
23,823,448 UART: [fht] FMC Alias Private Key: 7
26,163,336 UART: [art] Extend RT PCRs Done
26,164,562 UART: [art] Lock RT PCRs Done
26,166,529 UART: [art] Populate DV Done
26,171,897 UART: [fht] FMC Alias Private Key: 7
26,173,539 UART: [art] Derive CDI
26,174,269 UART: [art] Store in slot 0x4
26,216,962 UART: [art] Derive Key Pair
26,217,956 UART: [art] Store priv key in slot 0x5
29,460,196 UART: [art] Derive Key Pair - Done
29,473,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,753,076 UART: [art] Erasing AUTHORITY.KEYID = 7
31,754,589 UART: [art] PUB.X = 0DC7CE790F3466CC50D57648E7ACFBAB8276A1CC9EACB0DF67C666C5B5888B6595A16F60AC132F6AD03CF5A1F24622CB
31,761,841 UART: [art] PUB.Y = 4C77D8E1BC21EC1E6839CE17B72918DCACCD396A4D6C4363F98F5DA5BE7E7C241406EA86F09ACFED4720884F73D373CB
31,769,145 UART: [art] SIG.R = 2155FC8F52ADB278D418E3C3251FF70C89220E5C604DD383536FE19BF7DFB642634A316CAE7797425970CC4917588602
31,776,530 UART: [art] SIG.S = 9B4345376E0D23F641D51846232B0BC8992B08836B4070ED23EA080CB149950A9BE66885E54D032CE7477C277F7DFD0F
33,082,615 UART: Caliptra RT
33,083,348 UART: [state] CFI Enabled
33,217,334 UART: [rt] RT listening for mailbox commands...
33,219,738 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,375,146 UART: [rt]cmd =0x41544d4e, len=14344
38,675,876 >>> mbox cmd response data (8 bytes)
38,676,469 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,707,081 UART: [rt]cmd =0x41545348, len=116
38,726,422 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,107 UART:
192,460 UART: Running Caliptra ROM ...
193,666 UART:
193,820 UART: [state] CFI Enabled
259,771 UART: [state] LifecycleState = Unprovisioned
261,753 UART: [state] DebugLocked = No
263,272 UART: [state] WD Timer not started. Device not locked for debugging
266,999 UART: [kat] SHA2-256
446,650 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,395 UART: [kat] ++
457,916 UART: [kat] sha1
467,366 UART: [kat] SHA2-256
470,082 UART: [kat] SHA2-384
476,520 UART: [kat] SHA2-512-ACC
478,878 UART: [kat] ECC-384
2,925,673 UART: [kat] HMAC-384Kdf
2,948,417 UART: [kat] LMS
3,424,913 UART: [kat] --
3,430,079 UART: [cold-reset] ++
3,431,154 UART: [fht] FHT @ 0x50003400
3,442,290 UART: [idev] ++
3,442,887 UART: [idev] CDI.KEYID = 6
3,443,843 UART: [idev] SUBJECT.KEYID = 7
3,445,083 UART: [idev] UDS.KEYID = 0
3,446,023 ready_for_fw is high
3,446,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,595,303 UART: [idev] Erasing UDS.KEYID = 0
5,965,414 UART: [idev] Sha1 KeyId Algorithm
5,990,425 UART: [idev] --
5,995,682 UART: [ldev] ++
5,996,301 UART: [ldev] CDI.KEYID = 6
5,997,207 UART: [ldev] SUBJECT.KEYID = 5
5,998,616 UART: [ldev] AUTHORITY.KEYID = 7
5,999,804 UART: [ldev] FE.KEYID = 1
6,035,215 UART: [ldev] Erasing FE.KEYID = 1
8,545,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,296 UART: [ldev] --
10,350,070 UART: [fwproc] Wait for Commands...
10,352,752 UART: [fwproc] Recv command 0x46574c44
10,354,795 UART: [fwproc] Recv'd Img size: 118548 bytes
13,837,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,910,606 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,983,600 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,312,521 >>> mbox cmd response: success
14,316,644 UART: [afmc] ++
14,317,238 UART: [afmc] CDI.KEYID = 6
14,318,306 UART: [afmc] SUBJECT.KEYID = 7
14,319,426 UART: [afmc] AUTHORITY.KEYID = 5
16,854,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,202 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,612,997 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,629,041 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,644,639 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,669,006 UART: [afmc] --
18,673,525 UART: [cold-reset] --
18,676,897 UART: [state] Locking Datavault
18,680,430 UART: [state] Locking PCR0, PCR1 and PCR31
18,682,136 UART: [state] Locking ICCM
18,684,013 UART: [exit] Launching FMC @ 0x40000130
18,692,464 UART:
18,692,694 UART: Running Caliptra FMC ...
18,693,792 UART:
18,693,947 UART: [state] CFI Enabled
18,753,599 UART: [fht] FMC Alias Private Key: 7
20,541,755 UART: [art] Extend RT PCRs Done
20,542,974 UART: [art] Lock RT PCRs Done
20,544,726 UART: [art] Populate DV Done
20,549,974 UART: [fht] FMC Alias Private Key: 7
20,551,667 UART: [art] Derive CDI
20,552,479 UART: [art] Store in slot 0x4
20,607,782 UART: [art] Derive Key Pair
20,608,815 UART: [art] Store priv key in slot 0x5
23,071,935 UART: [art] Derive Key Pair - Done
23,084,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,863 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,377 UART: [art] PUB.X = E93844FBE1AD3D81F7BCF9AB051FC9C4BEAB7AB65F28DC5FE34AB7703D68558C859855CA01757A56E77F36DA2A4F134F
24,806,635 UART: [art] PUB.Y = A8FEF5472646ADCF3C1C0AFEB0907024E29695D8743CEB4E135319C6659632601D361D3EC194B63E3786D995D98142C7
24,813,869 UART: [art] SIG.R = CDF697AAFC09318756145C4AEF4430B0774452B89E0616D66B57D3A61620A4BD528CE8EFBABBA0001C41AD93D094C4A2
24,821,256 UART: [art] SIG.S = 7335AA57F99D16431D8D949C5FD7A37BFDCF6CB8B868ED9259160E73C4F4FB273B9CD11F0EAC6387FB3B20DBDB2DFF3E
25,800,009 UART: Caliptra RT
25,800,721 UART: [state] CFI Enabled
25,981,010 UART: [rt] RT listening for mailbox commands...
25,983,443 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,138,930 UART: [rt]cmd =0x41544d4e, len=14344
30,134,582 >>> mbox cmd response data (8 bytes)
30,135,193 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,165,769 UART: [rt]cmd =0x41545348, len=116
30,186,031 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,460,799 ready_for_fw is high
3,461,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,039 >>> mbox cmd response: success
18,537,662 UART:
18,538,061 UART: Running Caliptra FMC ...
18,539,176 UART:
18,539,327 UART: [state] CFI Enabled
18,602,021 UART: [fht] FMC Alias Private Key: 7
20,388,935 UART: [art] Extend RT PCRs Done
20,390,150 UART: [art] Lock RT PCRs Done
20,391,978 UART: [art] Populate DV Done
20,397,622 UART: [fht] FMC Alias Private Key: 7
20,399,216 UART: [art] Derive CDI
20,399,950 UART: [art] Store in slot 0x4
20,456,072 UART: [art] Derive Key Pair
20,457,116 UART: [art] Store priv key in slot 0x5
22,920,023 UART: [art] Derive Key Pair - Done
22,933,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,645,783 UART: [art] Erasing AUTHORITY.KEYID = 7
24,647,286 UART: [art] PUB.X = 8D544EBF02EBAEBDFC69BDC261827FBB008CCBF818F36A13E34E586755111C2D949A43C07E939183521CA2FAB7803ADA
24,654,554 UART: [art] PUB.Y = 2A153FBB03D348F3810665A1FBAED6C389C263F3228907DE7F45CC60F395E1FD5336B3B905DBBD86C85879DB6D52E74B
24,661,829 UART: [art] SIG.R = 3EDE638C34C799804ADDFD2985A1D9F1D50467B6A9B03781648FEEBA91AB6DCADAB24C31E2D6E7F99731CC0AFA3A7AEA
24,669,237 UART: [art] SIG.S = 281698BBB901E8F067DB3F962561D5744B6E8AE080B680F4B8124EA058A75BC75B476627DEFB9765D1A09D0C148C5889
25,648,098 UART: Caliptra RT
25,648,788 UART: [state] CFI Enabled
25,830,181 UART: [rt] RT listening for mailbox commands...
25,832,576 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,987,883 UART: [rt]cmd =0x41544d4e, len=14344
29,983,313 >>> mbox cmd response data (8 bytes)
29,983,905 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,014,538 UART: [rt]cmd =0x41545348, len=116
30,034,474 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,362 UART:
192,741 UART: Running Caliptra ROM ...
193,906 UART:
603,397 UART: [state] CFI Enabled
615,576 UART: [state] LifecycleState = Unprovisioned
617,470 UART: [state] DebugLocked = No
618,797 UART: [state] WD Timer not started. Device not locked for debugging
622,966 UART: [kat] SHA2-256
802,635 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,373 UART: [kat] ++
813,851 UART: [kat] sha1
823,450 UART: [kat] SHA2-256
826,102 UART: [kat] SHA2-384
831,591 UART: [kat] SHA2-512-ACC
833,962 UART: [kat] ECC-384
3,274,337 UART: [kat] HMAC-384Kdf
3,286,034 UART: [kat] LMS
3,762,554 UART: [kat] --
3,768,230 UART: [cold-reset] ++
3,769,396 UART: [fht] FHT @ 0x50003400
3,780,520 UART: [idev] ++
3,781,088 UART: [idev] CDI.KEYID = 6
3,782,125 UART: [idev] SUBJECT.KEYID = 7
3,783,300 UART: [idev] UDS.KEYID = 0
3,784,229 ready_for_fw is high
3,784,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,933,433 UART: [idev] Erasing UDS.KEYID = 0
6,262,668 UART: [idev] Sha1 KeyId Algorithm
6,285,682 UART: [idev] --
6,290,844 UART: [ldev] ++
6,291,430 UART: [ldev] CDI.KEYID = 6
6,292,345 UART: [ldev] SUBJECT.KEYID = 5
6,293,562 UART: [ldev] AUTHORITY.KEYID = 7
6,294,801 UART: [ldev] FE.KEYID = 1
6,307,687 UART: [ldev] Erasing FE.KEYID = 1
8,782,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,141 UART: [ldev] --
10,575,517 UART: [fwproc] Wait for Commands...
10,577,718 UART: [fwproc] Recv command 0x46574c44
10,579,710 UART: [fwproc] Recv'd Img size: 118548 bytes
14,062,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,960 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,216,000 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,265 >>> mbox cmd response: success
14,547,883 UART: [afmc] ++
14,548,497 UART: [afmc] CDI.KEYID = 6
14,549,434 UART: [afmc] SUBJECT.KEYID = 7
14,550,662 UART: [afmc] AUTHORITY.KEYID = 5
17,051,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,772,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,774,210 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,790,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,806,111 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,821,696 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,845,862 UART: [afmc] --
18,849,438 UART: [cold-reset] --
18,853,201 UART: [state] Locking Datavault
18,857,858 UART: [state] Locking PCR0, PCR1 and PCR31
18,859,613 UART: [state] Locking ICCM
18,861,604 UART: [exit] Launching FMC @ 0x40000130
18,870,016 UART:
18,870,256 UART: Running Caliptra FMC ...
18,871,380 UART:
18,871,551 UART: [state] CFI Enabled
18,879,768 UART: [fht] FMC Alias Private Key: 7
20,645,733 UART: [art] Extend RT PCRs Done
20,646,949 UART: [art] Lock RT PCRs Done
20,648,580 UART: [art] Populate DV Done
20,653,941 UART: [fht] FMC Alias Private Key: 7
20,655,643 UART: [art] Derive CDI
20,656,459 UART: [art] Store in slot 0x4
20,699,217 UART: [art] Derive Key Pair
20,700,259 UART: [art] Store priv key in slot 0x5
23,127,163 UART: [art] Derive Key Pair - Done
23,140,108 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,846,461 UART: [art] Erasing AUTHORITY.KEYID = 7
24,847,963 UART: [art] PUB.X = 50EB4230D7273033F4820E46FCFC692AA672655A39C7BF5827B304879944C4D9AD335ABE415FA41474B2AA0980BB40B2
24,855,262 UART: [art] PUB.Y = FB49F1333161FE757D6EC76FC7B9848C0DDE8FE8814C4A9B9FE2BF18FC77AC88BD3545B1A0D2A2C2C4CD69B3C79E13B6
24,862,515 UART: [art] SIG.R = C32CCE5991712C77C19E66EBFFF8C4A0C173E41AA35CB6DAB001C7D399D62970DA1C071CDC957325A7BB2543BB91FE43
24,869,905 UART: [art] SIG.S = 60C557F5AD0FB0975C9E7C8496A20E3DE07261B824A088AED74C54B9ECC410A98C20A673A40ED204537ACF74D1F12C06
25,848,851 UART: Caliptra RT
25,849,548 UART: [state] CFI Enabled
25,982,127 UART: [rt] RT listening for mailbox commands...
25,984,552 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,139,725 UART: [rt]cmd =0x41544d4e, len=14344
30,135,416 >>> mbox cmd response data (8 bytes)
30,136,010 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,166,696 UART: [rt]cmd =0x41545348, len=116
30,186,937 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
3,780,919 ready_for_fw is high
3,781,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,515 >>> mbox cmd response: success
18,701,278 UART:
18,701,672 UART: Running Caliptra FMC ...
18,702,826 UART:
18,702,987 UART: [state] CFI Enabled
18,710,730 UART: [fht] FMC Alias Private Key: 7
20,476,954 UART: [art] Extend RT PCRs Done
20,478,159 UART: [art] Lock RT PCRs Done
20,480,270 UART: [art] Populate DV Done
20,485,614 UART: [fht] FMC Alias Private Key: 7
20,487,154 UART: [art] Derive CDI
20,487,973 UART: [art] Store in slot 0x4
20,530,892 UART: [art] Derive Key Pair
20,531,895 UART: [art] Store priv key in slot 0x5
22,957,948 UART: [art] Derive Key Pair - Done
22,970,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,930 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,424 UART: [art] PUB.X = C357071C77C0B6A382979E0D9BDC1417214422A406CF5049DFBC70A328A824E87E852B9A5D1E8A8D2BFB4C6FA365F160
24,685,686 UART: [art] PUB.Y = 169DC82EB1012CBEFEEA53612E62D6BDA51FDC0C3E565785F56BFBC1117FD2BB07DBB853FA1F6A81EF5D66B02492E779
24,692,980 UART: [art] SIG.R = 90BA0DA9C6BE3FBB0DBEAA61FB7B060F653E450E95D8FCDB6B32FE2CACAF3795113EF3416A59031C8E5528C99893819D
24,700,419 UART: [art] SIG.S = 3C5E2A1C3C7B69BC240D496FFC8DD5A00F9A45D9DBE9C2C417329D4D292F1BB6D07EEE5AC52D7CE832336779BD574B68
25,679,741 UART: Caliptra RT
25,680,448 UART: [state] CFI Enabled
25,814,576 UART: [rt] RT listening for mailbox commands...
25,816,949 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,972,613 UART: [rt]cmd =0x41544d4e, len=14344
29,968,248 >>> mbox cmd response data (8 bytes)
29,968,856 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,999,645 UART: [rt]cmd =0x41545348, len=116
30,020,076 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,226 UART:
192,575 UART: Running Caliptra ROM ...
193,765 UART:
193,924 UART: [state] CFI Enabled
267,112 UART: [state] LifecycleState = Unprovisioned
269,555 UART: [state] DebugLocked = No
270,727 UART: [state] WD Timer not started. Device not locked for debugging
273,572 UART: [kat] SHA2-256
463,231 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,967 UART: [kat] ++
474,466 UART: [kat] sha1
486,402 UART: [kat] SHA2-256
489,417 UART: [kat] SHA2-384
495,902 UART: [kat] SHA2-512-ACC
498,479 UART: [kat] ECC-384
2,948,187 UART: [kat] HMAC-384Kdf
2,972,461 UART: [kat] LMS
3,504,234 UART: [kat] --
3,509,332 UART: [cold-reset] ++
3,511,164 UART: [fht] FHT @ 0x50003400
3,521,512 UART: [idev] ++
3,522,152 UART: [idev] CDI.KEYID = 6
3,523,134 UART: [idev] SUBJECT.KEYID = 7
3,524,382 UART: [idev] UDS.KEYID = 0
3,525,574 ready_for_fw is high
3,525,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,903 UART: [idev] Erasing UDS.KEYID = 0
6,028,639 UART: [idev] Sha1 KeyId Algorithm
6,051,718 UART: [idev] --
6,056,850 UART: [ldev] ++
6,057,542 UART: [ldev] CDI.KEYID = 6
6,058,476 UART: [ldev] SUBJECT.KEYID = 5
6,059,635 UART: [ldev] AUTHORITY.KEYID = 7
6,060,864 UART: [ldev] FE.KEYID = 1
6,099,553 UART: [ldev] Erasing FE.KEYID = 1
8,604,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,508 UART: [ldev] --
10,411,726 UART: [fwproc] Wait for Commands...
10,413,223 UART: [fwproc] Recv command 0x46574c44
10,415,150 UART: [fwproc] Recv'd Img size: 118548 bytes
13,910,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,722 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,321 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,830 >>> mbox cmd response: success
14,680,355 UART: [afmc] ++
14,681,078 UART: [afmc] CDI.KEYID = 6
14,682,191 UART: [afmc] SUBJECT.KEYID = 7
14,683,732 UART: [afmc] AUTHORITY.KEYID = 5
17,214,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,392 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,455 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,620 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,496 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,075 UART: [afmc] --
19,011,132 UART: [cold-reset] --
19,015,429 UART: [state] Locking Datavault
19,021,825 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,029 UART: [state] Locking ICCM
19,025,589 UART: [exit] Launching FMC @ 0x40000130
19,034,213 UART:
19,034,490 UART: Running Caliptra FMC ...
19,035,523 UART:
19,035,672 UART: [state] CFI Enabled
19,094,198 UART: [fht] FMC Alias Private Key: 7
20,860,986 UART: [art] Extend RT PCRs Done
20,862,213 UART: [art] Lock RT PCRs Done
20,863,756 UART: [art] Populate DV Done
20,869,158 UART: [fht] FMC Alias Private Key: 7
20,870,858 UART: [art] Derive CDI
20,871,602 UART: [art] Store in slot 0x4
20,927,291 UART: [art] Derive Key Pair
20,928,292 UART: [art] Store priv key in slot 0x5
23,390,996 UART: [art] Derive Key Pair - Done
23,404,210 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,448 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,958 UART: [art] PUB.X = 2E020DA50E66DFB0D92EB2F96F12A45468F2F89E4D050A6CA69FA8F2434225C9DC964F48040D830164DBF74AFD06E5FB
25,126,240 UART: [art] PUB.Y = CCA6953653A69D0EEA9960C4AA7430D2EA80676A51A5C392012B8EBFF1319E5797E24778406EC4EFDEE24757EAD1DFCA
25,133,500 UART: [art] SIG.R = 9BEF45E388D0A386DF3D362FDEE24CCF2056215AF9CD0ED6E423C2E8507F2A1EE45D51D5E6FF2DFB00AB16B5C8F36B54
25,140,878 UART: [art] SIG.S = 47AAF3A461456C0950CC7B290D39F85F20D62A11B56D3F7CBE8BC776A8B52871E9924BBE34F2380B639A43FEDBC4031A
26,119,416 UART: Caliptra RT
26,120,135 UART: [state] CFI Enabled
26,302,055 UART: [rt] RT listening for mailbox commands...
26,304,534 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,459,976 UART: [rt]cmd =0x41544d4e, len=14344
30,455,051 >>> mbox cmd response data (8 bytes)
30,456,248 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,487,056 UART: [rt]cmd =0x41545348, len=116
30,507,222 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,437,315 ready_for_fw is high
3,437,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,804,518 >>> mbox cmd response: success
19,109,134 UART:
19,109,536 UART: Running Caliptra FMC ...
19,110,645 UART:
19,110,803 UART: [state] CFI Enabled
19,178,783 UART: [fht] FMC Alias Private Key: 7
20,965,613 UART: [art] Extend RT PCRs Done
20,966,839 UART: [art] Lock RT PCRs Done
20,968,394 UART: [art] Populate DV Done
20,973,717 UART: [fht] FMC Alias Private Key: 7
20,975,360 UART: [art] Derive CDI
20,976,092 UART: [art] Store in slot 0x4
21,032,434 UART: [art] Derive Key Pair
21,033,478 UART: [art] Store priv key in slot 0x5
23,496,110 UART: [art] Derive Key Pair - Done
23,508,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,772 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,277 UART: [art] PUB.X = 3FB332AA0A22C02C6DDBEDE9519E0CEB92E45031E66E951C1F33098DE83EE8CE06310E8ED250EB459D9275249AD8CFC3
25,231,553 UART: [art] PUB.Y = 5C087FD896F22BFEF8591A06AA64E8F9C408D75ED703793ECD89C857F2F88D2A8CE34EC74B0505C6377A75A2989F2524
25,238,771 UART: [art] SIG.R = 5AE2230CFE3DD9A5DCB7A4E08DCACCD320E0DD9DBC6D216122A7AA06757D28AA192AC9AEE1BE99F72BAD644B652F8A2F
25,246,239 UART: [art] SIG.S = B54E05644FBAB3E6F70D32E8F299F0D1E1C32B43BEF2FE3D3AB025F38D9845D31173922125FAC5E67A39C7032B28ED46
26,225,509 UART: Caliptra RT
26,226,203 UART: [state] CFI Enabled
26,407,956 UART: [rt] RT listening for mailbox commands...
26,410,462 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,565,982 UART: [rt]cmd =0x41544d4e, len=14344
30,561,159 >>> mbox cmd response data (8 bytes)
30,561,722 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,592,447 UART: [rt]cmd =0x41545348, len=116
30,612,161 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,576 UART:
192,943 UART: Running Caliptra ROM ...
194,065 UART:
603,981 UART: [state] CFI Enabled
621,934 UART: [state] LifecycleState = Unprovisioned
624,244 UART: [state] DebugLocked = No
627,125 UART: [state] WD Timer not started. Device not locked for debugging
631,672 UART: [kat] SHA2-256
821,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,352 UART: [kat] ++
832,953 UART: [kat] sha1
845,255 UART: [kat] SHA2-256
848,270 UART: [kat] SHA2-384
854,831 UART: [kat] SHA2-512-ACC
857,417 UART: [kat] ECC-384
3,301,030 UART: [kat] HMAC-384Kdf
3,315,416 UART: [kat] LMS
3,847,240 UART: [kat] --
3,851,809 UART: [cold-reset] ++
3,853,317 UART: [fht] FHT @ 0x50003400
3,864,510 UART: [idev] ++
3,865,148 UART: [idev] CDI.KEYID = 6
3,866,233 UART: [idev] SUBJECT.KEYID = 7
3,867,356 UART: [idev] UDS.KEYID = 0
3,868,298 ready_for_fw is high
3,868,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,017,245 UART: [idev] Erasing UDS.KEYID = 0
6,347,559 UART: [idev] Sha1 KeyId Algorithm
6,370,032 UART: [idev] --
6,376,025 UART: [ldev] ++
6,376,719 UART: [ldev] CDI.KEYID = 6
6,377,653 UART: [ldev] SUBJECT.KEYID = 5
6,378,762 UART: [ldev] AUTHORITY.KEYID = 7
6,379,998 UART: [ldev] FE.KEYID = 1
6,390,621 UART: [ldev] Erasing FE.KEYID = 1
8,869,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,592,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,607,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,622,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,637,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,660,061 UART: [ldev] --
10,666,304 UART: [fwproc] Wait for Commands...
10,668,281 UART: [fwproc] Recv command 0x46574c44
10,670,548 UART: [fwproc] Recv'd Img size: 118548 bytes
14,175,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,252,734 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,376,354 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,937,037 >>> mbox cmd response: success
14,940,802 UART: [afmc] ++
14,941,529 UART: [afmc] CDI.KEYID = 6
14,942,725 UART: [afmc] SUBJECT.KEYID = 7
14,944,170 UART: [afmc] AUTHORITY.KEYID = 5
17,446,090 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,171,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,173,465 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,188,576 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,203,721 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,218,583 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,242,198 UART: [afmc] --
19,245,813 UART: [cold-reset] --
19,251,636 UART: [state] Locking Datavault
19,257,457 UART: [state] Locking PCR0, PCR1 and PCR31
19,259,628 UART: [state] Locking ICCM
19,262,354 UART: [exit] Launching FMC @ 0x40000130
19,271,001 UART:
19,271,255 UART: Running Caliptra FMC ...
19,272,361 UART:
19,272,525 UART: [state] CFI Enabled
19,280,684 UART: [fht] FMC Alias Private Key: 7
21,047,064 UART: [art] Extend RT PCRs Done
21,048,285 UART: [art] Lock RT PCRs Done
21,050,163 UART: [art] Populate DV Done
21,055,741 UART: [fht] FMC Alias Private Key: 7
21,057,455 UART: [art] Derive CDI
21,058,276 UART: [art] Store in slot 0x4
21,100,450 UART: [art] Derive Key Pair
21,101,491 UART: [art] Store priv key in slot 0x5
23,528,492 UART: [art] Derive Key Pair - Done
23,541,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,247,667 UART: [art] Erasing AUTHORITY.KEYID = 7
25,249,159 UART: [art] PUB.X = 31CA5F837D0776F8F0E033E4458CA407715768A86DB924E700B375A606A07A3B4941B73AA81F1C9D8C9BABB862B4BE30
25,256,429 UART: [art] PUB.Y = 4502BA1091162DF9AD6FB81F7495AADAA7C47666117EBA2544589395BCD0C12B1C9C663662CC834B0F41E58EBD7C1DED
25,263,687 UART: [art] SIG.R = E7DB32FF5D722FB946DBE68A0C1F4E54B47DABB2F820D149BAE30EF9229A395DA57632C210FB43C29A749009FEEAD59E
25,271,119 UART: [art] SIG.S = 1397F9A44ACA5E8DEAB460451B48EEAFBA7C9E032AAC4C64B6DDD0FBD83F59682BCD919A5C28AE45E0E21C9ECEC2A4F5
26,250,211 UART: Caliptra RT
26,250,928 UART: [state] CFI Enabled
26,382,842 UART: [rt] RT listening for mailbox commands...
26,385,250 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,540,724 UART: [rt]cmd =0x41544d4e, len=14344
30,536,403 >>> mbox cmd response data (8 bytes)
30,536,994 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,567,672 UART: [rt]cmd =0x41545348, len=116
30,587,059 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,760,672 ready_for_fw is high
3,761,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,649 >>> mbox cmd response: success
19,304,772 UART:
19,305,159 UART: Running Caliptra FMC ...
19,306,288 UART:
19,306,445 UART: [state] CFI Enabled
19,314,601 UART: [fht] FMC Alias Private Key: 7
21,080,548 UART: [art] Extend RT PCRs Done
21,081,791 UART: [art] Lock RT PCRs Done
21,083,292 UART: [art] Populate DV Done
21,088,563 UART: [fht] FMC Alias Private Key: 7
21,090,226 UART: [art] Derive CDI
21,091,050 UART: [art] Store in slot 0x4
21,133,728 UART: [art] Derive Key Pair
21,134,773 UART: [art] Store priv key in slot 0x5
23,562,471 UART: [art] Derive Key Pair - Done
23,575,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,282,370 UART: [art] Erasing AUTHORITY.KEYID = 7
25,283,879 UART: [art] PUB.X = 46F4ED029E498BCA54FB00BA8ED88469ED13D4CCF51470481F8561086996BD4B2D2245B1623F791C334BCC9AB28F6994
25,291,122 UART: [art] PUB.Y = A648EC2888EAA0E3D93AB32D037204FAABC5A71BF1091DC7830316B5F397069095A30FFF7E326EEA15F8EF7819EA2A0D
25,298,395 UART: [art] SIG.R = 6EB014B7F8B3C99DC5D0689428AD0865EB59721B45DC082C93B3D1047638E458D3BA55D2C33F5887DA51506502F5083B
25,305,741 UART: [art] SIG.S = 566EE92B1DA55158B496B2C24CF0F8F89FC369E57459523F105FEE9299E65CA5448D81F08636C0C253544A8AF9BD0CD5
26,285,166 UART: Caliptra RT
26,285,871 UART: [state] CFI Enabled
26,419,214 UART: [rt] RT listening for mailbox commands...
26,421,696 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,577,075 UART: [rt]cmd =0x41544d4e, len=14344
30,572,826 >>> mbox cmd response data (8 bytes)
30,573,404 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,604,139 UART: [rt]cmd =0x41545348, len=116
30,623,741 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,635 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,291 UART: [kat] SHA2-256
882,222 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,337 UART: [kat] ++
886,489 UART: [kat] sha1
890,505 UART: [kat] SHA2-256
892,443 UART: [kat] SHA2-384
895,164 UART: [kat] SHA2-512-ACC
897,065 UART: [kat] ECC-384
902,540 UART: [kat] HMAC-384Kdf
907,182 UART: [kat] LMS
1,475,378 UART: [kat] --
1,476,193 UART: [cold-reset] ++
1,476,773 UART: [fht] Storing FHT @ 0x50003400
1,479,578 UART: [idev] ++
1,479,746 UART: [idev] CDI.KEYID = 6
1,480,106 UART: [idev] SUBJECT.KEYID = 7
1,480,530 UART: [idev] UDS.KEYID = 0
1,480,875 ready_for_fw is high
1,480,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,910 UART: [idev] Erasing UDS.KEYID = 0
1,505,946 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,388 UART: [idev] --
1,515,277 UART: [ldev] ++
1,515,445 UART: [ldev] CDI.KEYID = 6
1,515,808 UART: [ldev] SUBJECT.KEYID = 5
1,516,234 UART: [ldev] AUTHORITY.KEYID = 7
1,516,697 UART: [ldev] FE.KEYID = 1
1,522,117 UART: [ldev] Erasing FE.KEYID = 1
1,547,274 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,600 UART: [ldev] --
1,586,937 UART: [fwproc] Waiting for Commands...
1,587,796 UART: [fwproc] Received command 0x46574c44
1,588,587 UART: [fwproc] Received Image of size 118548 bytes
2,931,947 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,437 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,655 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,960 >>> mbox cmd response: success
3,131,970 UART: [afmc] ++
3,132,138 UART: [afmc] CDI.KEYID = 6
3,132,500 UART: [afmc] SUBJECT.KEYID = 7
3,132,925 UART: [afmc] AUTHORITY.KEYID = 5
3,168,466 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,858 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,638 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,347 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,230 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,913 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,741 UART: [afmc] --
3,211,735 UART: [cold-reset] --
3,212,593 UART: [state] Locking Datavault
3,213,618 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,222 UART: [state] Locking ICCM
3,214,746 UART: [exit] Launching FMC @ 0x40000130
3,220,076 UART:
3,220,092 UART: Running Caliptra FMC ...
3,220,500 UART:
3,220,554 UART: [state] CFI Enabled
3,231,386 UART: [fht] FMC Alias Private Key: 7
3,350,486 UART: [art] Extend RT PCRs Done
3,350,914 UART: [art] Lock RT PCRs Done
3,352,442 UART: [art] Populate DV Done
3,360,799 UART: [fht] FMC Alias Private Key: 7
3,361,947 UART: [art] Derive CDI
3,362,227 UART: [art] Store in slot 0x4
3,448,083 UART: [art] Derive Key Pair
3,448,443 UART: [art] Store priv key in slot 0x5
3,462,174 UART: [art] Derive Key Pair - Done
3,477,262 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,694 UART: [art] PUB.X = 8AFC2CEAA5EB488210EF1BB3C2044BB2440BCF93DE985439AD997A9CCB26C891DC408B486B34341F98D435E3E7D7E3D2
3,500,474 UART: [art] PUB.Y = A22D29EF06905D85A81A0DAB6C81B52581945B6B10186BB58EF248C61A1C6BC39449736E68BAB9146B5273C07CB2AA92
3,507,422 UART: [art] SIG.R = 442B482A1C7FBA37BA52171F12FCD14187C75EB83E3A61608897DD5EA67D36B26A13152FC76EF3FECE6B6138A0E28576
3,514,200 UART: [art] SIG.S = C3778F026708DB4C35625F24CBD3EF3C813FFFC52D825FB6F0DD41EFA8DF55CE430CCD5F13BBDDC76C20BDB393A6D8D3
3,537,865 UART: Caliptra RT
3,538,116 UART: [state] CFI Enabled
3,658,188 UART: [rt] RT listening for mailbox commands...
3,658,858 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,036 UART: [rt]cmd =0x41544d4e, len=14344
4,091,430 >>> mbox cmd response data (8 bytes)
4,091,431 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,644 UART: [rt]cmd =0x41545348, len=116
4,143,015 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,951 ready_for_fw is high
1,362,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,602 >>> mbox cmd response: success
3,040,091 UART:
3,040,107 UART: Running Caliptra FMC ...
3,040,515 UART:
3,040,569 UART: [state] CFI Enabled
3,050,933 UART: [fht] FMC Alias Private Key: 7
3,169,415 UART: [art] Extend RT PCRs Done
3,169,843 UART: [art] Lock RT PCRs Done
3,171,367 UART: [art] Populate DV Done
3,179,700 UART: [fht] FMC Alias Private Key: 7
3,180,808 UART: [art] Derive CDI
3,181,088 UART: [art] Store in slot 0x4
3,266,332 UART: [art] Derive Key Pair
3,266,692 UART: [art] Store priv key in slot 0x5
3,279,507 UART: [art] Derive Key Pair - Done
3,294,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,309,878 UART: [art] Erasing AUTHORITY.KEYID = 7
3,310,643 UART: [art] PUB.X = 254C7C500D061B2E4C05FB190F9B54C6F0530C6A1D84E30F8E607DF90FCFE5F66C6AEF296C563DE283DB6CD38B1D62B6
3,317,408 UART: [art] PUB.Y = B97A774A1A5E05CF1CCBFFF5A234AFD5D9E91F2676E23D7878A0D6F9827552F85F7FE006AC53801772574684691FB389
3,324,356 UART: [art] SIG.R = E8AC7789FF4B81C878C554AEC2E87B0E3106157A9DBFF5C8CA471EA3F9EA250018A624FBF8E9250D6F1D4FCD0D875233
3,331,108 UART: [art] SIG.S = 8D6217CA6DDA908F298671F6B47933FA4329A39BF5A2182BF4037D4ECF184F82AFAB28F3582876B499CB41BE485AF524
3,354,407 UART: Caliptra RT
3,354,658 UART: [state] CFI Enabled
3,474,239 UART: [rt] RT listening for mailbox commands...
3,474,909 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,597,969 UART: [rt]cmd =0x41544d4e, len=14344
3,907,931 >>> mbox cmd response data (8 bytes)
3,907,932 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,938,151 UART: [rt]cmd =0x41545348, len=116
3,960,350 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,670 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,318 UART: [kat] SHA2-256
882,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,364 UART: [kat] ++
886,516 UART: [kat] sha1
890,698 UART: [kat] SHA2-256
892,636 UART: [kat] SHA2-384
895,427 UART: [kat] SHA2-512-ACC
897,328 UART: [kat] ECC-384
902,751 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,696 UART: [cold-reset] ++
1,477,254 UART: [fht] Storing FHT @ 0x50003400
1,480,141 UART: [idev] ++
1,480,309 UART: [idev] CDI.KEYID = 6
1,480,669 UART: [idev] SUBJECT.KEYID = 7
1,481,093 UART: [idev] UDS.KEYID = 0
1,481,438 ready_for_fw is high
1,481,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,009 UART: [idev] Erasing UDS.KEYID = 0
1,506,149 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,709 UART: [idev] --
1,515,718 UART: [ldev] ++
1,515,886 UART: [ldev] CDI.KEYID = 6
1,516,249 UART: [ldev] SUBJECT.KEYID = 5
1,516,675 UART: [ldev] AUTHORITY.KEYID = 7
1,517,138 UART: [ldev] FE.KEYID = 1
1,522,306 UART: [ldev] Erasing FE.KEYID = 1
1,548,539 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,103 UART: [ldev] --
1,587,480 UART: [fwproc] Waiting for Commands...
1,588,171 UART: [fwproc] Received command 0x46574c44
1,588,962 UART: [fwproc] Received Image of size 118548 bytes
2,933,718 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,680 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,253 >>> mbox cmd response: success
3,133,479 UART: [afmc] ++
3,133,647 UART: [afmc] CDI.KEYID = 6
3,134,009 UART: [afmc] SUBJECT.KEYID = 7
3,134,434 UART: [afmc] AUTHORITY.KEYID = 5
3,169,253 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,747 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,527 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,236 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,119 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,802 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,722 UART: [afmc] --
3,212,622 UART: [cold-reset] --
3,213,684 UART: [state] Locking Datavault
3,214,925 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,529 UART: [state] Locking ICCM
3,215,991 UART: [exit] Launching FMC @ 0x40000130
3,221,321 UART:
3,221,337 UART: Running Caliptra FMC ...
3,221,745 UART:
3,221,888 UART: [state] CFI Enabled
3,232,256 UART: [fht] FMC Alias Private Key: 7
3,350,702 UART: [art] Extend RT PCRs Done
3,351,130 UART: [art] Lock RT PCRs Done
3,352,620 UART: [art] Populate DV Done
3,360,723 UART: [fht] FMC Alias Private Key: 7
3,361,887 UART: [art] Derive CDI
3,362,167 UART: [art] Store in slot 0x4
3,448,047 UART: [art] Derive Key Pair
3,448,407 UART: [art] Store priv key in slot 0x5
3,461,768 UART: [art] Derive Key Pair - Done
3,476,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,894 UART: [art] PUB.X = D157BA9F89C0E14D841742C48F31F6A504494CF9565B0F71F6C80E4FFD7F5144B77C46D4B49FA9E835C91DBF16CCCF84
3,499,667 UART: [art] PUB.Y = DACFFB3B2B8C767C6A95BB2A192A420FF589DE39D46B70C8C850E7037EF8C2EFFE1090E21D965AEC2DF1E9569DF0EFDB
3,506,639 UART: [art] SIG.R = 4083B9212781D277BFE47687DF7FDEB9EBCEE46A65B2F862E205852598B50A15DF1EB43A6B7C66F1B3464F7DBA94150C
3,513,410 UART: [art] SIG.S = B32CD5D1173A02E1A2A533F39987255319330754F5787720FD8EB073A6B5E9F7481F09794C2D39260F6BA4410FDED754
3,536,557 UART: Caliptra RT
3,536,900 UART: [state] CFI Enabled
3,657,464 UART: [rt] RT listening for mailbox commands...
3,658,134 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,032 UART: [rt]cmd =0x41544d4e, len=14344
4,091,130 >>> mbox cmd response data (8 bytes)
4,091,131 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,326 UART: [rt]cmd =0x41545348, len=116
4,143,033 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,204 ready_for_fw is high
1,363,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,353 >>> mbox cmd response: success
3,042,904 UART:
3,042,920 UART: Running Caliptra FMC ...
3,043,328 UART:
3,043,471 UART: [state] CFI Enabled
3,054,283 UART: [fht] FMC Alias Private Key: 7
3,173,955 UART: [art] Extend RT PCRs Done
3,174,383 UART: [art] Lock RT PCRs Done
3,176,257 UART: [art] Populate DV Done
3,184,488 UART: [fht] FMC Alias Private Key: 7
3,185,416 UART: [art] Derive CDI
3,185,696 UART: [art] Store in slot 0x4
3,271,004 UART: [art] Derive Key Pair
3,271,364 UART: [art] Store priv key in slot 0x5
3,284,547 UART: [art] Derive Key Pair - Done
3,298,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,870 UART: [art] PUB.X = 162F9514232808752B736337846C26BB2323D1A1C0F7B2A6B00AA62D621F96AB97E49900C5612596CAC1358C352B676C
3,321,602 UART: [art] PUB.Y = CEB536235D4C8A5D219020A59867365CEACE6F7804B95D54F309BFFCA5CA481900A679F08281344472E2D9D166031BE5
3,328,521 UART: [art] SIG.R = 6F0DD7A906A3B51D8CE9E233B1047A3E723FE2256B97795D161785FB6721A9A0DE469B44A707B38169B10668DDF5CE52
3,335,278 UART: [art] SIG.S = D4B86BD989F82B460B83D798FBEBCEA685580B55EA3AE70FB8F73765FB8244886641B6883B1AE3975492463092F9B7A0
3,358,913 UART: Caliptra RT
3,359,256 UART: [state] CFI Enabled
3,480,162 UART: [rt] RT listening for mailbox commands...
3,480,832 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,946 UART: [rt]cmd =0x41544d4e, len=14344
3,913,986 >>> mbox cmd response data (8 bytes)
3,913,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,150 UART: [rt]cmd =0x41545348, len=116
3,966,577 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [kat] SHA2-256
891,596 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,700 UART: [kat] ++
895,852 UART: [kat] sha1
900,216 UART: [kat] SHA2-256
902,156 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,419 UART: [kat] LMS
1,169,731 UART: [kat] --
1,170,902 UART: [cold-reset] ++
1,171,432 UART: [fht] FHT @ 0x50003400
1,174,154 UART: [idev] ++
1,174,322 UART: [idev] CDI.KEYID = 6
1,174,683 UART: [idev] SUBJECT.KEYID = 7
1,175,108 UART: [idev] UDS.KEYID = 0
1,175,454 ready_for_fw is high
1,175,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,171 UART: [idev] Erasing UDS.KEYID = 0
1,199,975 UART: [idev] Sha1 KeyId Algorithm
1,208,979 UART: [idev] --
1,210,154 UART: [ldev] ++
1,210,322 UART: [ldev] CDI.KEYID = 6
1,210,686 UART: [ldev] SUBJECT.KEYID = 5
1,211,113 UART: [ldev] AUTHORITY.KEYID = 7
1,211,576 UART: [ldev] FE.KEYID = 1
1,216,712 UART: [ldev] Erasing FE.KEYID = 1
1,242,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,642 UART: [ldev] --
1,281,925 UART: [fwproc] Wait for Commands...
1,282,708 UART: [fwproc] Recv command 0x46574c44
1,283,441 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,635 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,810 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,019 >>> mbox cmd response: success
2,828,203 UART: [afmc] ++
2,828,371 UART: [afmc] CDI.KEYID = 6
2,828,734 UART: [afmc] SUBJECT.KEYID = 7
2,829,160 UART: [afmc] AUTHORITY.KEYID = 5
2,864,441 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,445 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,155 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,036 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,737 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,436 UART: [afmc] --
2,907,363 UART: [cold-reset] --
2,908,201 UART: [state] Locking Datavault
2,909,658 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,262 UART: [state] Locking ICCM
2,910,908 UART: [exit] Launching FMC @ 0x40000130
2,916,238 UART:
2,916,254 UART: Running Caliptra FMC ...
2,916,662 UART:
2,916,716 UART: [state] CFI Enabled
2,926,998 UART: [fht] FMC Alias Private Key: 7
3,045,446 UART: [art] Extend RT PCRs Done
3,045,874 UART: [art] Lock RT PCRs Done
3,047,584 UART: [art] Populate DV Done
3,055,873 UART: [fht] FMC Alias Private Key: 7
3,056,919 UART: [art] Derive CDI
3,057,199 UART: [art] Store in slot 0x4
3,142,516 UART: [art] Derive Key Pair
3,142,876 UART: [art] Store priv key in slot 0x5
3,156,422 UART: [art] Derive Key Pair - Done
3,171,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,813 UART: [art] PUB.X = E463D9EA216B1C8D0ADC131947E092EDFFAE980019A53C6097E057D90D289AA0F613EE08F9B7B958837F6BE522FAA742
3,194,562 UART: [art] PUB.Y = 3178EDDB8B359452AB0089A81E9DE7DEC16682F4157586038A25DC0206EDB3C079965D387F1E11F7081E3D822A2388B4
3,201,476 UART: [art] SIG.R = 59F8B587E435750969413C0A009F3C245941274FD7DA2B4B50D7B788C4DC1A31D4A94029B0687AB3A3F18C4B34ACEA9F
3,208,222 UART: [art] SIG.S = CFFD962A057A67EA7E2860450980BB59076023870353302771ECEA1FE81B22A181B1B8E7FAA749EB69C7E52615D22C2B
3,232,034 UART: Caliptra RT
3,232,285 UART: [state] CFI Enabled
3,352,156 UART: [rt] RT listening for mailbox commands...
3,352,826 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,832 UART: [rt]cmd =0x41544d4e, len=14344
3,785,446 >>> mbox cmd response data (8 bytes)
3,785,447 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,352 UART: [rt]cmd =0x41545348, len=116
3,837,613 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,108 ready_for_fw is high
1,059,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,412 >>> mbox cmd response: success
2,740,165 UART:
2,740,181 UART: Running Caliptra FMC ...
2,740,589 UART:
2,740,643 UART: [state] CFI Enabled
2,750,823 UART: [fht] FMC Alias Private Key: 7
2,869,193 UART: [art] Extend RT PCRs Done
2,869,621 UART: [art] Lock RT PCRs Done
2,871,265 UART: [art] Populate DV Done
2,879,170 UART: [fht] FMC Alias Private Key: 7
2,880,188 UART: [art] Derive CDI
2,880,468 UART: [art] Store in slot 0x4
2,966,375 UART: [art] Derive Key Pair
2,966,735 UART: [art] Store priv key in slot 0x5
2,980,023 UART: [art] Derive Key Pair - Done
2,994,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,106 UART: [art] PUB.X = BC6DEC6288D9195AC32C0296F68E2D6EE1F814F74E29088294C5F9A4BD475124071CAA171FB256C4F5BE6C06AF373847
3,017,870 UART: [art] PUB.Y = EC332115040F40D8B41AB3F3C36ED8A372D01FA669A71A8111E44640A83A4EA08DEC42A35BBBF5170A52D82CB0139143
3,024,817 UART: [art] SIG.R = F99527F414FE7F32B2FAE3A5007468B049B46632266B9BEFF4C24EF5D14C8A2537E2BFFC5D019233BE606CF2A60BD3D4
3,031,571 UART: [art] SIG.S = C2A3EDF267C7D2F42630B6BAF801D96542B745D783FDC6DFD5E3E67CD4BB92AE0AFD97887486D6C5F8E71B186E685F5F
3,055,875 UART: Caliptra RT
3,056,126 UART: [state] CFI Enabled
3,175,710 UART: [rt] RT listening for mailbox commands...
3,176,380 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,460 UART: [rt]cmd =0x41544d4e, len=14344
3,608,878 >>> mbox cmd response data (8 bytes)
3,608,879 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,998 UART: [rt]cmd =0x41545348, len=116
3,661,049 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,827 UART: [kat] ++
895,979 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,698 UART: [kat] SHA2-512-ACC
906,599 UART: [kat] ECC-384
916,504 UART: [kat] HMAC-384Kdf
921,172 UART: [kat] LMS
1,169,484 UART: [kat] --
1,170,529 UART: [cold-reset] ++
1,170,929 UART: [fht] FHT @ 0x50003400
1,173,453 UART: [idev] ++
1,173,621 UART: [idev] CDI.KEYID = 6
1,173,982 UART: [idev] SUBJECT.KEYID = 7
1,174,407 UART: [idev] UDS.KEYID = 0
1,174,753 ready_for_fw is high
1,174,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,224 UART: [idev] Erasing UDS.KEYID = 0
1,199,168 UART: [idev] Sha1 KeyId Algorithm
1,208,090 UART: [idev] --
1,209,191 UART: [ldev] ++
1,209,359 UART: [ldev] CDI.KEYID = 6
1,209,723 UART: [ldev] SUBJECT.KEYID = 5
1,210,150 UART: [ldev] AUTHORITY.KEYID = 7
1,210,613 UART: [ldev] FE.KEYID = 1
1,215,977 UART: [ldev] Erasing FE.KEYID = 1
1,242,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,003 UART: [ldev] --
1,282,300 UART: [fwproc] Wait for Commands...
1,283,093 UART: [fwproc] Recv command 0x46574c44
1,283,826 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,388 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,563 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,960 >>> mbox cmd response: success
2,829,150 UART: [afmc] ++
2,829,318 UART: [afmc] CDI.KEYID = 6
2,829,681 UART: [afmc] SUBJECT.KEYID = 7
2,830,107 UART: [afmc] AUTHORITY.KEYID = 5
2,865,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,632 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,342 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,223 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,924 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,585 UART: [afmc] --
2,908,636 UART: [cold-reset] --
2,909,434 UART: [state] Locking Datavault
2,910,757 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,361 UART: [state] Locking ICCM
2,911,883 UART: [exit] Launching FMC @ 0x40000130
2,917,213 UART:
2,917,229 UART: Running Caliptra FMC ...
2,917,637 UART:
2,917,780 UART: [state] CFI Enabled
2,928,476 UART: [fht] FMC Alias Private Key: 7
3,046,726 UART: [art] Extend RT PCRs Done
3,047,154 UART: [art] Lock RT PCRs Done
3,048,840 UART: [art] Populate DV Done
3,057,209 UART: [fht] FMC Alias Private Key: 7
3,058,205 UART: [art] Derive CDI
3,058,485 UART: [art] Store in slot 0x4
3,144,080 UART: [art] Derive Key Pair
3,144,440 UART: [art] Store priv key in slot 0x5
3,158,004 UART: [art] Derive Key Pair - Done
3,172,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,222 UART: [art] PUB.X = B2D01486EB281FAB74F7DE513D94FE0673D24D82782BA500BF91228A5B57DFAAE835714795C2D71E02E41F8061141370
3,195,964 UART: [art] PUB.Y = 92E084863F4799DF1F71BE4B9CC94B5D817AC78B1ED0A10A4A61E2A8D67A93A1A3F2FB0B1094DEA8B9A703D7B1760EE4
3,202,918 UART: [art] SIG.R = 4D42D290CAEA3A2D4AF320BE4C69261E1FE5CC6E5CC4B7ED87AF38000FC1999383E83BF620C6FB9607B48A4F9AAF1098
3,209,678 UART: [art] SIG.S = 2D588D0C16EF41EDBE530449821D0139B33E6FF6D58085BD9CD1C26BE23B0C3E9D853E53F24B53784FF5486FCCA1614D
3,233,618 UART: Caliptra RT
3,233,961 UART: [state] CFI Enabled
3,352,491 UART: [rt] RT listening for mailbox commands...
3,353,161 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,301 UART: [rt]cmd =0x41544d4e, len=14344
3,785,723 >>> mbox cmd response data (8 bytes)
3,785,724 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,759 UART: [rt]cmd =0x41545348, len=116
3,838,004 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,889 ready_for_fw is high
1,059,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,072 >>> mbox cmd response: success
2,742,563 UART:
2,742,579 UART: Running Caliptra FMC ...
2,742,987 UART:
2,743,130 UART: [state] CFI Enabled
2,753,870 UART: [fht] FMC Alias Private Key: 7
2,873,548 UART: [art] Extend RT PCRs Done
2,873,976 UART: [art] Lock RT PCRs Done
2,875,096 UART: [art] Populate DV Done
2,883,335 UART: [fht] FMC Alias Private Key: 7
2,884,303 UART: [art] Derive CDI
2,884,583 UART: [art] Store in slot 0x4
2,970,608 UART: [art] Derive Key Pair
2,970,968 UART: [art] Store priv key in slot 0x5
2,984,258 UART: [art] Derive Key Pair - Done
2,998,915 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,019 UART: [art] PUB.X = E0329A91E42C5CBFDCA7003A8F99188D36DD53230F612DC9F53CE0A019312C1F309486D3E0EDA7A1B50A5424B93A7762
3,021,767 UART: [art] PUB.Y = 14A3B1BBE4262AC4AF3A6589ADDC54A726915050846D2D64D28CFE774CA917FB6B6A8B7972A2E6A33A88011EB0D2FDC0
3,028,728 UART: [art] SIG.R = 4C331A44EA831439A311636204708ED8818603A184A7AE99BADED337F3D6044AD81118B1C61B532C81A201DFDBF09C60
3,035,486 UART: [art] SIG.S = 8E433491B9589CCD6AA18BD8053FCC1EBC7CF003699E006EBAC123AD045F48D704BEF5575BB047D402D28FE8365A34AB
3,059,247 UART: Caliptra RT
3,059,590 UART: [state] CFI Enabled
3,180,959 UART: [rt] RT listening for mailbox commands...
3,181,629 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,697 UART: [rt]cmd =0x41544d4e, len=14344
3,614,319 >>> mbox cmd response data (8 bytes)
3,614,320 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,357 UART: [rt]cmd =0x41545348, len=116
3,666,564 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.90s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,907 UART: [state] WD Timer not started. Device not locked for debugging
88,090 UART: [kat] SHA2-256
893,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,865 UART: [kat] ++
898,017 UART: [kat] sha1
902,109 UART: [kat] SHA2-256
904,049 UART: [kat] SHA2-384
906,750 UART: [kat] SHA2-512-ACC
908,651 UART: [kat] ECC-384
918,560 UART: [kat] HMAC-384Kdf
923,260 UART: [kat] LMS
1,171,588 UART: [kat] --
1,172,555 UART: [cold-reset] ++
1,173,093 UART: [fht] FHT @ 0x50003400
1,175,672 UART: [idev] ++
1,175,840 UART: [idev] CDI.KEYID = 6
1,176,200 UART: [idev] SUBJECT.KEYID = 7
1,176,624 UART: [idev] UDS.KEYID = 0
1,176,969 ready_for_fw is high
1,176,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,202 UART: [idev] Erasing UDS.KEYID = 0
1,201,347 UART: [idev] Sha1 KeyId Algorithm
1,209,685 UART: [idev] --
1,210,847 UART: [ldev] ++
1,211,015 UART: [ldev] CDI.KEYID = 6
1,211,378 UART: [ldev] SUBJECT.KEYID = 5
1,211,804 UART: [ldev] AUTHORITY.KEYID = 7
1,212,267 UART: [ldev] FE.KEYID = 1
1,217,291 UART: [ldev] Erasing FE.KEYID = 1
1,243,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,803 UART: [ldev] --
1,283,158 UART: [fwproc] Wait for Commands...
1,283,906 UART: [fwproc] Recv command 0x46574c44
1,284,634 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,864 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,034 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,203 >>> mbox cmd response: success
2,828,465 UART: [afmc] ++
2,828,633 UART: [afmc] CDI.KEYID = 6
2,828,995 UART: [afmc] SUBJECT.KEYID = 7
2,829,420 UART: [afmc] AUTHORITY.KEYID = 5
2,864,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,436 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,145 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,028 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,729 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,601 UART: [afmc] --
2,907,481 UART: [cold-reset] --
2,908,303 UART: [state] Locking Datavault
2,909,634 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,238 UART: [state] Locking ICCM
2,910,660 UART: [exit] Launching FMC @ 0x40000130
2,915,990 UART:
2,916,006 UART: Running Caliptra FMC ...
2,916,414 UART:
2,916,468 UART: [state] CFI Enabled
2,926,720 UART: [fht] FMC Alias Private Key: 7
3,045,436 UART: [art] Extend RT PCRs Done
3,045,864 UART: [art] Lock RT PCRs Done
3,047,442 UART: [art] Populate DV Done
3,055,545 UART: [fht] FMC Alias Private Key: 7
3,056,543 UART: [art] Derive CDI
3,056,823 UART: [art] Store in slot 0x4
3,142,952 UART: [art] Derive Key Pair
3,143,312 UART: [art] Store priv key in slot 0x5
3,156,688 UART: [art] Derive Key Pair - Done
3,171,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,673 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,438 UART: [art] PUB.X = 17B6EF43FD461158B58E039A6C202B2D05D635944F4FD40C116670C886F7DED63E914BC05D964FD8765C6F31BF84030F
3,195,195 UART: [art] PUB.Y = 35979AD04B9922B8BCEC460FF9ECF31628B685EF9C90C9E915B84EB60A477AB68FE6D96208DF35B104BC3A5F298D12B5
3,202,145 UART: [art] SIG.R = 9DD8E42D508A50B2739A2940E8A1EC90B2C0555E9489B623D13F56B6E00D4C5AFE86B2D4F92FAE11592295BBD47492AB
3,208,920 UART: [art] SIG.S = 279B3C21850EE54F48C3C41F99CD0C47856123093F4809036785441AFE2EAAB0188B0740251B6A9DEB8EDAA739F994E0
3,232,852 UART: Caliptra RT
3,233,103 UART: [state] CFI Enabled
3,352,362 UART: [rt] RT listening for mailbox commands...
3,353,032 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,224 UART: [rt]cmd =0x41544d4e, len=14344
3,785,788 >>> mbox cmd response data (8 bytes)
3,785,789 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,986 UART: [rt]cmd =0x41545348, len=116
3,838,129 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 ready_for_fw is high
1,060,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,332 >>> mbox cmd response: success
2,741,771 UART:
2,741,787 UART: Running Caliptra FMC ...
2,742,195 UART:
2,742,249 UART: [state] CFI Enabled
2,752,677 UART: [fht] FMC Alias Private Key: 7
2,872,107 UART: [art] Extend RT PCRs Done
2,872,535 UART: [art] Lock RT PCRs Done
2,873,877 UART: [art] Populate DV Done
2,882,258 UART: [fht] FMC Alias Private Key: 7
2,883,216 UART: [art] Derive CDI
2,883,496 UART: [art] Store in slot 0x4
2,969,341 UART: [art] Derive Key Pair
2,969,701 UART: [art] Store priv key in slot 0x5
2,982,629 UART: [art] Derive Key Pair - Done
2,997,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,410 UART: [art] PUB.X = F0A227ABD233652AD99C3007F83D83056512FA35E855AAFC402CF41876D12CD8BE4E6ECE4E3DE6B807C76D89FEB65CC9
3,020,187 UART: [art] PUB.Y = F41261341C2C4DDFC9BF1AC643A2194A18CCE1399603DC7AB305AE296A61ED7ED5BEBC3B5A6C4934852182C57819B962
3,027,141 UART: [art] SIG.R = 146A2CB3B7062B629096FEE2079A09265EED9A2045917DCF359EE3084D9DE26EF3B69AF622A859B0A1572079DDB96D84
3,033,903 UART: [art] SIG.S = C57B828A6D49CB3B7A143C95EBC3426C1269B8481A37D65E33DCC70B0596B22CED0F0DE22FB5D05C84CFA58BF0F21E62
3,057,709 UART: Caliptra RT
3,057,960 UART: [state] CFI Enabled
3,178,195 UART: [rt] RT listening for mailbox commands...
3,178,865 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,737 UART: [rt]cmd =0x41544d4e, len=14344
3,611,269 >>> mbox cmd response data (8 bytes)
3,611,270 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,439 UART: [rt]cmd =0x41545348, len=116
3,663,342 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
893,635 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,760 UART: [kat] ++
897,912 UART: [kat] sha1
902,078 UART: [kat] SHA2-256
904,018 UART: [kat] SHA2-384
906,773 UART: [kat] SHA2-512-ACC
908,674 UART: [kat] ECC-384
918,531 UART: [kat] HMAC-384Kdf
923,175 UART: [kat] LMS
1,171,503 UART: [kat] --
1,172,340 UART: [cold-reset] ++
1,172,694 UART: [fht] FHT @ 0x50003400
1,175,317 UART: [idev] ++
1,175,485 UART: [idev] CDI.KEYID = 6
1,175,845 UART: [idev] SUBJECT.KEYID = 7
1,176,269 UART: [idev] UDS.KEYID = 0
1,176,614 ready_for_fw is high
1,176,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,267 UART: [idev] Erasing UDS.KEYID = 0
1,201,486 UART: [idev] Sha1 KeyId Algorithm
1,209,800 UART: [idev] --
1,210,944 UART: [ldev] ++
1,211,112 UART: [ldev] CDI.KEYID = 6
1,211,475 UART: [ldev] SUBJECT.KEYID = 5
1,211,901 UART: [ldev] AUTHORITY.KEYID = 7
1,212,364 UART: [ldev] FE.KEYID = 1
1,217,796 UART: [ldev] Erasing FE.KEYID = 1
1,244,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,422 UART: [ldev] --
1,283,907 UART: [fwproc] Wait for Commands...
1,284,729 UART: [fwproc] Recv command 0x46574c44
1,285,457 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,853 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,023 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,412 >>> mbox cmd response: success
2,830,442 UART: [afmc] ++
2,830,610 UART: [afmc] CDI.KEYID = 6
2,830,972 UART: [afmc] SUBJECT.KEYID = 7
2,831,397 UART: [afmc] AUTHORITY.KEYID = 5
2,866,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,217 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,926 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,809 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,510 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,182 UART: [afmc] --
2,910,068 UART: [cold-reset] --
2,910,868 UART: [state] Locking Datavault
2,912,103 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,707 UART: [state] Locking ICCM
2,913,131 UART: [exit] Launching FMC @ 0x40000130
2,918,461 UART:
2,918,477 UART: Running Caliptra FMC ...
2,918,885 UART:
2,919,028 UART: [state] CFI Enabled
2,929,754 UART: [fht] FMC Alias Private Key: 7
3,049,106 UART: [art] Extend RT PCRs Done
3,049,534 UART: [art] Lock RT PCRs Done
3,051,086 UART: [art] Populate DV Done
3,059,347 UART: [fht] FMC Alias Private Key: 7
3,060,463 UART: [art] Derive CDI
3,060,743 UART: [art] Store in slot 0x4
3,146,912 UART: [art] Derive Key Pair
3,147,272 UART: [art] Store priv key in slot 0x5
3,160,852 UART: [art] Derive Key Pair - Done
3,175,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,500 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,265 UART: [art] PUB.X = 237C4BA28EFCD2A2AB2013D4678185EE1276F8FE7C7D2E66DD354B2B49A042A79F5AEE3065B6D68799AD2D9E13E62460
3,199,045 UART: [art] PUB.Y = ADDDC41520438F4DFE1398742BE45309483C2EFF40E4EAD115A9E3CA2C41C25E7E6F9D58B9E60D3A958FC41BAF5A8864
3,206,005 UART: [art] SIG.R = 562C639616ACFAB13B85BBADF038182ABAAFA6DBABF7CD64306E156706D70B7EF3FC5927BCCF325EACA4D71AAE42F24A
3,212,799 UART: [art] SIG.S = C5602713EA785518E49514FB981D2ED253CDB88562705802A0FA3E247B5F1EC740C4E8ED329E09069C07BC88EC8713CF
3,236,315 UART: Caliptra RT
3,236,658 UART: [state] CFI Enabled
3,356,099 UART: [rt] RT listening for mailbox commands...
3,356,769 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,101 UART: [rt]cmd =0x41544d4e, len=14344
3,790,379 >>> mbox cmd response data (8 bytes)
3,790,380 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,449 UART: [rt]cmd =0x41545348, len=116
3,843,178 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,736 ready_for_fw is high
1,060,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,413 >>> mbox cmd response: success
2,741,468 UART:
2,741,484 UART: Running Caliptra FMC ...
2,741,892 UART:
2,742,035 UART: [state] CFI Enabled
2,752,623 UART: [fht] FMC Alias Private Key: 7
2,872,289 UART: [art] Extend RT PCRs Done
2,872,717 UART: [art] Lock RT PCRs Done
2,874,073 UART: [art] Populate DV Done
2,882,530 UART: [fht] FMC Alias Private Key: 7
2,883,534 UART: [art] Derive CDI
2,883,814 UART: [art] Store in slot 0x4
2,969,853 UART: [art] Derive Key Pair
2,970,213 UART: [art] Store priv key in slot 0x5
2,983,023 UART: [art] Derive Key Pair - Done
2,997,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,279 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,044 UART: [art] PUB.X = 2A8CC493A823ACE5668EF5C7CEBF608C252FE6874C9E6D9172FE08D0A1AD55FF1E74A8AC364C5FB75FC69E581D36A497
3,020,829 UART: [art] PUB.Y = FAA76C56E69A6FE2142F51BAC936C663C5168E16B3B1C7DF30767572B14349C6233D2724530D9FB52AADB263DC0E57B5
3,027,779 UART: [art] SIG.R = 283DA56254AAF85862B62B15DF50A25FF02E6B934D098AF94160DCB5E601AD097B688A8BDEC34A60A2F82BB55CD55E51
3,034,552 UART: [art] SIG.S = 7CAB54C20FE23546D208AB9BC0E7DCACCF4F0C2EDDE6EE9D70F2BE214629AFF4C05225A2E6932A5672612322B0484909
3,058,712 UART: Caliptra RT
3,059,055 UART: [state] CFI Enabled
3,178,455 UART: [rt] RT listening for mailbox commands...
3,179,125 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,139 UART: [rt]cmd =0x41544d4e, len=14344
3,611,901 >>> mbox cmd response data (8 bytes)
3,611,902 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,031 UART: [rt]cmd =0x41545348, len=116
3,663,950 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
192,099 UART:
192,452 UART: Running Caliptra ROM ...
193,670 UART:
193,825 UART: [state] CFI Enabled
265,790 UART: [state] LifecycleState = Unprovisioned
267,704 UART: [state] DebugLocked = No
269,538 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,979 UART: [kat] SHA2-256
443,633 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,179 UART: [kat] ++
454,628 UART: [kat] sha1
465,361 UART: [kat] SHA2-256
468,083 UART: [kat] SHA2-384
474,787 UART: [kat] SHA2-512-ACC
477,157 UART: [kat] ECC-384
2,767,530 UART: [kat] HMAC-384Kdf
2,778,552 UART: [kat] LMS
3,968,843 UART: [kat] --
3,974,551 UART: [cold-reset] ++
3,976,631 UART: [fht] Storing FHT @ 0x50003400
3,988,323 UART: [idev] ++
3,988,956 UART: [idev] CDI.KEYID = 6
3,989,875 UART: [idev] SUBJECT.KEYID = 7
3,991,122 UART: [idev] UDS.KEYID = 0
3,992,156 ready_for_fw is high
3,992,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,505 UART: [idev] Erasing UDS.KEYID = 0
7,325,982 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,167 UART: [idev] --
7,353,680 UART: [ldev] ++
7,354,255 UART: [ldev] CDI.KEYID = 6
7,355,222 UART: [ldev] SUBJECT.KEYID = 5
7,356,325 UART: [ldev] AUTHORITY.KEYID = 7
7,357,662 UART: [ldev] FE.KEYID = 1
7,401,147 UART: [ldev] Erasing FE.KEYID = 1
10,733,622 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,326 UART: [ldev] --
13,114,712 UART: [fwproc] Waiting for Commands...
13,117,726 UART: [fwproc] Received command 0x46574c44
13,119,958 UART: [fwproc] Received Image of size 118548 bytes
17,227,897 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,942 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,123 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,707,015 >>> mbox cmd response: success
17,710,547 UART: [afmc] ++
17,711,174 UART: [afmc] CDI.KEYID = 6
17,712,066 UART: [afmc] SUBJECT.KEYID = 7
17,713,341 UART: [afmc] AUTHORITY.KEYID = 5
21,074,445 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,363 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,623 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,073 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,791 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,201 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,438,828 UART: [afmc] --
23,443,077 UART: [cold-reset] --
23,446,132 UART: [state] Locking Datavault
23,450,516 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,213 UART: [state] Locking ICCM
23,454,989 UART: [exit] Launching FMC @ 0x40000130
23,463,353 UART:
23,463,648 UART: Running Caliptra FMC ...
23,464,682 UART:
23,464,830 UART: [state] CFI Enabled
23,532,178 UART: [fht] FMC Alias Private Key: 7
25,873,460 UART: [art] Extend RT PCRs Done
25,874,683 UART: [art] Lock RT PCRs Done
25,876,500 UART: [art] Populate DV Done
25,881,967 UART: [fht] FMC Alias Private Key: 7
25,883,688 UART: [art] Derive CDI
25,884,502 UART: [art] Store in slot 0x4
25,940,358 UART: [art] Derive Key Pair
25,941,396 UART: [art] Store priv key in slot 0x5
29,234,616 UART: [art] Derive Key Pair - Done
29,247,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,250 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,759 UART: [art] PUB.X = A1AA76C9ADC9490BC7188D7E459506A804CCD57AA2997053E93D873210404B067BD73F66D2534B52F7E4EC9E9054B31F
31,545,050 UART: [art] PUB.Y = F60CFEB297424D9C6D4DB65C2AFD31B9F3289B11C69596ED945D97A30B1DCB70D4A8205C488ABEEB235B17438F12C683
31,552,275 UART: [art] SIG.R = F945D3F9DDB2383DC73483B1AC6D940DEBA0551C1C6F65B117AC879972B9A05B2B5C1CAE973523603B16778709B3F8C2
31,559,691 UART: [art] SIG.S = 2B935AE176AAA8EA84F146229216FB3AFF75EBA38C3AE330E076D0EB7EFEDD15680C2CEC6BD9F2B70B6869F4C6ECE9A2
32,864,063 UART: Caliptra RT
32,864,777 UART: [state] CFI Enabled
33,042,255 UART: [rt] RT listening for mailbox commands...
33,044,683 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,200,097 UART: [rt]cmd =0x41544d4e, len=14344
38,500,870 >>> mbox cmd response data (8 bytes)
38,501,462 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,532,181 UART: [rt]cmd =0x41545348, len=116
38,551,932 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,787,516 ready_for_fw is high
3,787,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,967,082 >>> mbox cmd response: success
23,653,047 UART:
23,653,521 UART: Running Caliptra FMC ...
23,654,653 UART:
23,654,818 UART: [state] CFI Enabled
23,723,465 UART: [fht] FMC Alias Private Key: 7
26,063,413 UART: [art] Extend RT PCRs Done
26,064,641 UART: [art] Lock RT PCRs Done
26,066,489 UART: [art] Populate DV Done
26,072,036 UART: [fht] FMC Alias Private Key: 7
26,073,588 UART: [art] Derive CDI
26,074,409 UART: [art] Store in slot 0x4
26,130,804 UART: [art] Derive Key Pair
26,131,849 UART: [art] Store priv key in slot 0x5
29,425,014 UART: [art] Derive Key Pair - Done
29,437,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,521 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,046 UART: [art] PUB.X = 5B497CF301A77F40265429E1CF75930B4ECD8B6B4F21CD9CA02496BB2088DB39670350710219ECD5D749513B1DB7055E
31,734,270 UART: [art] PUB.Y = 73B5548E86A33FC89FFA1616F1FBC6CF34625A4FFCBB2440431A7F8F6C0014BAE75E8DF4E3676E2640F8E281BF6FAD40
31,741,536 UART: [art] SIG.R = 1164AF0E24E0BA5713387B0FE9FAA5F7603280633D3791EE700415C83DB4A8AB6C22B4D97B43DF0B2CCAA046A5EB5B40
31,748,959 UART: [art] SIG.S = 7009DCF304902B66A4198762FD605369D3D5BD1C0AF69E6A5B4F6333F67DFAF74D93256431E7333193FB76D86B9F3F19
33,053,879 UART: Caliptra RT
33,054,599 UART: [state] CFI Enabled
33,230,509 UART: [rt] RT listening for mailbox commands...
33,232,935 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,388,367 UART: [rt]cmd =0x41544d4e, len=14344
38,688,123 >>> mbox cmd response data (8 bytes)
38,688,731 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,719,374 UART: [rt]cmd =0x41545348, len=116
38,739,230 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,274 UART:
192,636 UART: Running Caliptra ROM ...
193,852 UART:
603,576 UART: [state] CFI Enabled
616,138 UART: [state] LifecycleState = Unprovisioned
618,034 UART: [state] DebugLocked = No
619,858 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,649 UART: [kat] SHA2-256
794,362 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,941 UART: [kat] ++
805,380 UART: [kat] sha1
817,532 UART: [kat] SHA2-256
820,259 UART: [kat] SHA2-384
827,023 UART: [kat] SHA2-512-ACC
829,386 UART: [kat] ECC-384
3,112,868 UART: [kat] HMAC-384Kdf
3,126,270 UART: [kat] LMS
4,316,372 UART: [kat] --
4,319,778 UART: [cold-reset] ++
4,321,998 UART: [fht] Storing FHT @ 0x50003400
4,333,114 UART: [idev] ++
4,333,681 UART: [idev] CDI.KEYID = 6
4,334,561 UART: [idev] SUBJECT.KEYID = 7
4,335,871 UART: [idev] UDS.KEYID = 0
4,336,830 ready_for_fw is high
4,337,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,958 UART: [idev] Erasing UDS.KEYID = 0
7,622,255 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,334 UART: [idev] --
7,649,288 UART: [ldev] ++
7,649,891 UART: [ldev] CDI.KEYID = 6
7,650,854 UART: [ldev] SUBJECT.KEYID = 5
7,652,061 UART: [ldev] AUTHORITY.KEYID = 7
7,653,286 UART: [ldev] FE.KEYID = 1
7,664,573 UART: [ldev] Erasing FE.KEYID = 1
10,951,755 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,445 UART: [ldev] --
13,311,373 UART: [fwproc] Waiting for Commands...
13,314,540 UART: [fwproc] Received command 0x46574c44
13,316,733 UART: [fwproc] Received Image of size 118548 bytes
17,422,710 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,024 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,208 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,945 >>> mbox cmd response: success
17,898,531 UART: [afmc] ++
17,899,151 UART: [afmc] CDI.KEYID = 6
17,900,058 UART: [afmc] SUBJECT.KEYID = 7
17,901,272 UART: [afmc] AUTHORITY.KEYID = 5
21,214,185 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,924 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,512,182 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,563 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,541,304 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,725 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,575,956 UART: [afmc] --
23,579,197 UART: [cold-reset] --
23,581,273 UART: [state] Locking Datavault
23,585,272 UART: [state] Locking PCR0, PCR1 and PCR31
23,587,030 UART: [state] Locking ICCM
23,588,292 UART: [exit] Launching FMC @ 0x40000130
23,596,678 UART:
23,596,906 UART: Running Caliptra FMC ...
23,598,001 UART:
23,598,159 UART: [state] CFI Enabled
23,606,038 UART: [fht] FMC Alias Private Key: 7
25,946,539 UART: [art] Extend RT PCRs Done
25,947,755 UART: [art] Lock RT PCRs Done
25,949,589 UART: [art] Populate DV Done
25,955,050 UART: [fht] FMC Alias Private Key: 7
25,956,708 UART: [art] Derive CDI
25,957,517 UART: [art] Store in slot 0x4
26,000,027 UART: [art] Derive Key Pair
26,001,077 UART: [art] Store priv key in slot 0x5
29,242,923 UART: [art] Derive Key Pair - Done
29,256,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,414 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,922 UART: [art] PUB.X = 9F471C36186D7F4280709822EA877692226DABCE3C26F5F296B337ED77FAA62E84EDD71B87A99B624E8C1E6BE5AD29D9
31,545,171 UART: [art] PUB.Y = 7084D75FC7A9F22D83D6B93F8ADEC9D211A5E3DE38E1E536CDFDAD3735620B651ECD055D612349436ECF3DDA057DD0A1
31,552,459 UART: [art] SIG.R = F3F724D911B8EAA257F87E2018D67BD4CB1325B2EF9803C7A528C11850E7F06BC74E683873B10F92EB355171CE912239
31,559,859 UART: [art] SIG.S = 80E06BEE154296B64A209AA4284AA87C9CABD40983D7C45A17FEA12232E3883C2E633A6C548D0210118135FCCDB40D47
32,864,568 UART: Caliptra RT
32,865,276 UART: [state] CFI Enabled
32,998,266 UART: [rt] RT listening for mailbox commands...
33,000,731 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,156,303 UART: [rt]cmd =0x41544d4e, len=14344
38,457,039 >>> mbox cmd response data (8 bytes)
38,457,623 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,488,369 UART: [rt]cmd =0x41545348, len=116
38,508,333 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,126,848 ready_for_fw is high
4,127,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,165 >>> mbox cmd response: success
23,796,458 UART:
23,796,882 UART: Running Caliptra FMC ...
23,798,035 UART:
23,798,199 UART: [state] CFI Enabled
23,806,314 UART: [fht] FMC Alias Private Key: 7
26,146,630 UART: [art] Extend RT PCRs Done
26,147,855 UART: [art] Lock RT PCRs Done
26,149,373 UART: [art] Populate DV Done
26,154,672 UART: [fht] FMC Alias Private Key: 7
26,156,372 UART: [art] Derive CDI
26,157,180 UART: [art] Store in slot 0x4
26,199,829 UART: [art] Derive Key Pair
26,200,864 UART: [art] Store priv key in slot 0x5
29,443,568 UART: [art] Derive Key Pair - Done
29,456,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,037 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,554 UART: [art] PUB.X = B4C9736500A199AE83595BDFE75ABDD89E68F8578E80A9AFF4927C898DEFC3D68F7CB987A18E7FACF47118DB028BFC47
31,745,809 UART: [art] PUB.Y = C79348E5E07708FE0D47AB63A9A536D0D47D6A3EB908E4E6D0D263B0CCFE2D6E2068981348F059BF22C4858E5DDA45DC
31,753,060 UART: [art] SIG.R = A59BD2C0DE336BAA283B3D3D1855FE725E14C6510AAFC6AF7F92D8EC84ECED009A6C1BD7FB3132B1ECADB6B5CCC8948B
31,760,507 UART: [art] SIG.S = AED5222BADE12A4DE111047B509DF28B5AD43F6E0FF2EB7068634CD865BD0FBD0F1C7DFA54C7465E41C0F4325A3076A7
33,065,876 UART: Caliptra RT
33,066,596 UART: [state] CFI Enabled
33,200,462 UART: [rt] RT listening for mailbox commands...
33,202,889 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,358,373 UART: [rt]cmd =0x41544d4e, len=14344
38,658,752 >>> mbox cmd response data (8 bytes)
38,659,383 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,689,915 UART: [rt]cmd =0x41545348, len=116
38,709,786 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,130 UART:
192,485 UART: Running Caliptra ROM ...
193,614 UART:
193,752 UART: [state] CFI Enabled
264,285 UART: [state] LifecycleState = Unprovisioned
266,211 UART: [state] DebugLocked = No
269,080 UART: [state] WD Timer not started. Device not locked for debugging
272,259 UART: [kat] SHA2-256
451,931 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,675 UART: [kat] ++
463,241 UART: [kat] sha1
473,834 UART: [kat] SHA2-256
476,560 UART: [kat] SHA2-384
481,421 UART: [kat] SHA2-512-ACC
483,786 UART: [kat] ECC-384
2,945,504 UART: [kat] HMAC-384Kdf
2,972,238 UART: [kat] LMS
3,448,705 UART: [kat] --
3,453,064 UART: [cold-reset] ++
3,454,435 UART: [fht] FHT @ 0x50003400
3,465,905 UART: [idev] ++
3,466,465 UART: [idev] CDI.KEYID = 6
3,467,494 UART: [idev] SUBJECT.KEYID = 7
3,468,663 UART: [idev] UDS.KEYID = 0
3,469,709 ready_for_fw is high
3,469,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,958 UART: [idev] Erasing UDS.KEYID = 0
5,985,245 UART: [idev] Sha1 KeyId Algorithm
6,009,605 UART: [idev] --
6,013,981 UART: [ldev] ++
6,014,551 UART: [ldev] CDI.KEYID = 6
6,015,464 UART: [ldev] SUBJECT.KEYID = 5
6,016,678 UART: [ldev] AUTHORITY.KEYID = 7
6,017,912 UART: [ldev] FE.KEYID = 1
6,058,048 UART: [ldev] Erasing FE.KEYID = 1
8,565,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,869 UART: [ldev] --
10,377,456 UART: [fwproc] Wait for Commands...
10,380,158 UART: [fwproc] Recv command 0x46574c44
10,382,343 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,183 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,197 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,177 >>> mbox cmd response: success
14,346,997 UART: [afmc] ++
14,347,588 UART: [afmc] CDI.KEYID = 6
14,348,551 UART: [afmc] SUBJECT.KEYID = 7
14,349,762 UART: [afmc] AUTHORITY.KEYID = 5
16,897,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,420 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,203 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,241 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,846 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,975 UART: [afmc] --
18,716,939 UART: [cold-reset] --
18,721,501 UART: [state] Locking Datavault
18,726,634 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,383 UART: [state] Locking ICCM
18,730,526 UART: [exit] Launching FMC @ 0x40000130
18,738,972 UART:
18,739,211 UART: Running Caliptra FMC ...
18,740,258 UART:
18,740,407 UART: [state] CFI Enabled
18,797,456 UART: [fht] FMC Alias Private Key: 7
20,564,213 UART: [art] Extend RT PCRs Done
20,565,419 UART: [art] Lock RT PCRs Done
20,566,712 UART: [art] Populate DV Done
20,572,072 UART: [fht] FMC Alias Private Key: 7
20,573,773 UART: [art] Derive CDI
20,574,602 UART: [art] Store in slot 0x4
20,630,027 UART: [art] Derive Key Pair
20,631,064 UART: [art] Store priv key in slot 0x5
23,093,788 UART: [art] Derive Key Pair - Done
23,106,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,316 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,819 UART: [art] PUB.X = 5542BFF04411BB1732C82464AD582949BE731D71A22F0C227DD1D8ED95CEDDB89FA704DFCE642AF8F6C45D1599BCCC07
24,828,125 UART: [art] PUB.Y = 341DE20D896D7C42955C1EAE18C20BE487B6812004A2CA46A5384FA7A2657839E71696AB928A646559C6A248F8F27EBD
24,835,355 UART: [art] SIG.R = 105D67005BD0EAFAEAB262594EC69E471A8ADCA9031D26B219A62A1940B70A7A382F5A720A23069A5BC199AD6877C735
24,842,747 UART: [art] SIG.S = 1F2B093091349C405C2200DB36CE182DEDEC50C2D22EF9870E83A8CF087215F817DF52FD36D8E820FF0AC6AB690CC5EB
25,821,253 UART: Caliptra RT
25,822,106 UART: [state] CFI Enabled
26,002,130 UART: [rt] RT listening for mailbox commands...
26,004,538 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,159,796 UART: [rt]cmd =0x41544d4e, len=14344
30,155,443 >>> mbox cmd response data (8 bytes)
30,156,051 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,186,619 UART: [rt]cmd =0x41545348, len=116
30,206,209 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,461,994 ready_for_fw is high
3,462,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,023 >>> mbox cmd response: success
18,513,938 UART:
18,514,336 UART: Running Caliptra FMC ...
18,515,486 UART:
18,515,640 UART: [state] CFI Enabled
18,582,761 UART: [fht] FMC Alias Private Key: 7
20,349,664 UART: [art] Extend RT PCRs Done
20,350,888 UART: [art] Lock RT PCRs Done
20,352,506 UART: [art] Populate DV Done
20,358,065 UART: [fht] FMC Alias Private Key: 7
20,359,659 UART: [art] Derive CDI
20,360,473 UART: [art] Store in slot 0x4
20,415,142 UART: [art] Derive Key Pair
20,416,178 UART: [art] Store priv key in slot 0x5
22,878,322 UART: [art] Derive Key Pair - Done
22,891,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,272 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,807 UART: [art] PUB.X = 9C7E906914732D9E0A5899F80D1C5B0663EA2D9757F98F82EDB8321EC90D66EED858B3E424C6B36F8ACD176D7F2CEFC2
24,614,004 UART: [art] PUB.Y = 09654A88E0AA66776D68297C8AF29FA1106B0B18776B7B9E88AD610C038FCFD33DA9148594CDD78F9996BB27E496FF0B
24,621,297 UART: [art] SIG.R = D397496AF788482BA29BD5DA12738AC08189796F36D354385D6BAABCF91100E0413755154E83D545B3B18C2654403861
24,628,634 UART: [art] SIG.S = 924A87A406B2A1B981A8B60F1EADDB5026276009F1F4E4EE804E6FC57CB750A42DA4D57C5F62FFA41991E4D6446A56BA
25,607,546 UART: Caliptra RT
25,608,259 UART: [state] CFI Enabled
25,790,012 UART: [rt] RT listening for mailbox commands...
25,792,490 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,947,748 UART: [rt]cmd =0x41544d4e, len=14344
29,943,060 >>> mbox cmd response data (8 bytes)
29,943,624 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,974,129 UART: [rt]cmd =0x41545348, len=116
29,994,305 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,525 UART:
192,895 UART: Running Caliptra ROM ...
194,040 UART:
603,724 UART: [state] CFI Enabled
615,340 UART: [state] LifecycleState = Unprovisioned
617,297 UART: [state] DebugLocked = No
618,686 UART: [state] WD Timer not started. Device not locked for debugging
621,870 UART: [kat] SHA2-256
801,537 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,268 UART: [kat] ++
813,065 UART: [kat] sha1
824,530 UART: [kat] SHA2-256
827,182 UART: [kat] SHA2-384
833,239 UART: [kat] SHA2-512-ACC
835,609 UART: [kat] ECC-384
3,278,700 UART: [kat] HMAC-384Kdf
3,291,430 UART: [kat] LMS
3,768,005 UART: [kat] --
3,773,021 UART: [cold-reset] ++
3,774,722 UART: [fht] FHT @ 0x50003400
3,786,351 UART: [idev] ++
3,786,922 UART: [idev] CDI.KEYID = 6
3,787,837 UART: [idev] SUBJECT.KEYID = 7
3,789,084 UART: [idev] UDS.KEYID = 0
3,790,016 ready_for_fw is high
3,790,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,072 UART: [idev] Erasing UDS.KEYID = 0
6,265,845 UART: [idev] Sha1 KeyId Algorithm
6,289,829 UART: [idev] --
6,294,693 UART: [ldev] ++
6,295,262 UART: [ldev] CDI.KEYID = 6
6,296,281 UART: [ldev] SUBJECT.KEYID = 5
6,297,387 UART: [ldev] AUTHORITY.KEYID = 7
6,298,677 UART: [ldev] FE.KEYID = 1
6,309,919 UART: [ldev] Erasing FE.KEYID = 1
8,783,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,116 UART: [ldev] --
10,577,716 UART: [fwproc] Wait for Commands...
10,579,339 UART: [fwproc] Recv command 0x46574c44
10,581,328 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,444 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,452 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,740 >>> mbox cmd response: success
14,553,521 UART: [afmc] ++
14,554,136 UART: [afmc] CDI.KEYID = 6
14,555,053 UART: [afmc] SUBJECT.KEYID = 7
14,556,298 UART: [afmc] AUTHORITY.KEYID = 5
17,058,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,988 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,807 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,879 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,434 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,191 UART: [afmc] --
18,857,434 UART: [cold-reset] --
18,862,917 UART: [state] Locking Datavault
18,870,114 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,870 UART: [state] Locking ICCM
18,874,487 UART: [exit] Launching FMC @ 0x40000130
18,882,939 UART:
18,883,180 UART: Running Caliptra FMC ...
18,884,282 UART:
18,884,468 UART: [state] CFI Enabled
18,892,415 UART: [fht] FMC Alias Private Key: 7
20,658,798 UART: [art] Extend RT PCRs Done
20,660,022 UART: [art] Lock RT PCRs Done
20,662,090 UART: [art] Populate DV Done
20,667,405 UART: [fht] FMC Alias Private Key: 7
20,668,849 UART: [art] Derive CDI
20,669,611 UART: [art] Store in slot 0x4
20,712,158 UART: [art] Derive Key Pair
20,713,163 UART: [art] Store priv key in slot 0x5
23,140,499 UART: [art] Derive Key Pair - Done
23,153,439 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,309 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,821 UART: [art] PUB.X = 041E728720632F76A9CA98F21DE59E391CACE36236C3AC97B2AB5CE4E84871A310E93CC5A19F7A6DEB8AF4140CBC401F
24,868,068 UART: [art] PUB.Y = 056852078314C83F556FC29FDED3A952580DAA341A8A1361DCE0BDFEBBEBA0AAD17F0538CF313524C8ABBB738079EFD4
24,875,353 UART: [art] SIG.R = F7DD6BD7539A6B74D157B301183626BBD7720BDC154549B6C7A6A1D8C551CA15D65EC53CBC604B36D5B09E37DFCEB187
24,882,771 UART: [art] SIG.S = 76865F00C021DF9DA8B5E5D6E09371C62919C6B41453272A483C6683BB3E666D364AEB6F9D3D2962A38F638E0C33E775
25,861,656 UART: Caliptra RT
25,862,352 UART: [state] CFI Enabled
25,996,434 UART: [rt] RT listening for mailbox commands...
25,998,845 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,154,412 UART: [rt]cmd =0x41544d4e, len=14344
30,149,958 >>> mbox cmd response data (8 bytes)
30,150,580 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,181,050 UART: [rt]cmd =0x41545348, len=116
30,200,887 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
3,779,477 ready_for_fw is high
3,779,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,758 >>> mbox cmd response: success
18,693,436 UART:
18,693,847 UART: Running Caliptra FMC ...
18,695,175 UART:
18,695,347 UART: [state] CFI Enabled
18,702,756 UART: [fht] FMC Alias Private Key: 7
20,468,580 UART: [art] Extend RT PCRs Done
20,469,789 UART: [art] Lock RT PCRs Done
20,471,800 UART: [art] Populate DV Done
20,477,326 UART: [fht] FMC Alias Private Key: 7
20,478,930 UART: [art] Derive CDI
20,479,746 UART: [art] Store in slot 0x4
20,522,039 UART: [art] Derive Key Pair
20,523,051 UART: [art] Store priv key in slot 0x5
22,949,419 UART: [art] Derive Key Pair - Done
22,962,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,358 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,854 UART: [art] PUB.X = EAE3FB7C24C217A32BB342EEE69C2987D10072C9FB546409B7935F9D7EA5A50B42D64EE2BC59D3DA1A640E6B969A77C8
24,678,165 UART: [art] PUB.Y = FF52ADF0B5268DEDF648A8659D8C76062D38C79CF15BC7D5EF2020AFED9915B2B12E3E74DBB20C76C31BF2ACFF272E6B
24,685,459 UART: [art] SIG.R = 301096442F8756B13A4325F1B12B9E4C00CDBA7F84315E732436E710424881FD4C09B215777D1F05BFCB8253C40999AE
24,692,818 UART: [art] SIG.S = CC5F4665B9625B6D5B8808B331FD0DCA8F2F680B645B5F188140DB5C1F70A4AC520EBF7E538CA189FD950DF4355FFBE6
25,671,927 UART: Caliptra RT
25,672,632 UART: [state] CFI Enabled
25,805,245 UART: [rt] RT listening for mailbox commands...
25,807,647 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,963,445 UART: [rt]cmd =0x41544d4e, len=14344
29,958,972 >>> mbox cmd response data (8 bytes)
29,959,531 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,990,282 UART: [rt]cmd =0x41545348, len=116
30,010,281 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
192,228 UART:
192,589 UART: Running Caliptra ROM ...
193,806 UART:
193,965 UART: [state] CFI Enabled
263,933 UART: [state] LifecycleState = Unprovisioned
266,352 UART: [state] DebugLocked = No
269,022 UART: [state] WD Timer not started. Device not locked for debugging
273,546 UART: [kat] SHA2-256
463,474 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,219 UART: [kat] ++
474,699 UART: [kat] sha1
485,146 UART: [kat] SHA2-256
488,166 UART: [kat] SHA2-384
494,796 UART: [kat] SHA2-512-ACC
497,355 UART: [kat] ECC-384
2,946,873 UART: [kat] HMAC-384Kdf
2,971,905 UART: [kat] LMS
3,503,647 UART: [kat] --
3,508,826 UART: [cold-reset] ++
3,510,556 UART: [fht] FHT @ 0x50003400
3,522,810 UART: [idev] ++
3,523,513 UART: [idev] CDI.KEYID = 6
3,524,430 UART: [idev] SUBJECT.KEYID = 7
3,525,675 UART: [idev] UDS.KEYID = 0
3,526,600 ready_for_fw is high
3,526,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,921 UART: [idev] Erasing UDS.KEYID = 0
6,051,959 UART: [idev] Sha1 KeyId Algorithm
6,074,183 UART: [idev] --
6,077,669 UART: [ldev] ++
6,078,363 UART: [ldev] CDI.KEYID = 6
6,079,274 UART: [ldev] SUBJECT.KEYID = 5
6,080,434 UART: [ldev] AUTHORITY.KEYID = 7
6,081,668 UART: [ldev] FE.KEYID = 1
6,123,129 UART: [ldev] Erasing FE.KEYID = 1
8,627,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,366,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,381,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,397,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,412,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,432,970 UART: [ldev] --
10,437,796 UART: [fwproc] Wait for Commands...
10,440,480 UART: [fwproc] Recv command 0x46574c44
10,442,784 UART: [fwproc] Recv'd Img size: 118548 bytes
13,946,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,027,068 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,150,686 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,711,757 >>> mbox cmd response: success
14,715,111 UART: [afmc] ++
14,715,846 UART: [afmc] CDI.KEYID = 6
14,717,037 UART: [afmc] SUBJECT.KEYID = 7
14,718,480 UART: [afmc] AUTHORITY.KEYID = 5
17,260,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,002,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,004,172 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,019,299 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,034,415 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,049,296 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,071,767 UART: [afmc] --
19,074,713 UART: [cold-reset] --
19,080,756 UART: [state] Locking Datavault
19,087,525 UART: [state] Locking PCR0, PCR1 and PCR31
19,089,739 UART: [state] Locking ICCM
19,091,924 UART: [exit] Launching FMC @ 0x40000130
19,100,546 UART:
19,100,816 UART: Running Caliptra FMC ...
19,101,851 UART:
19,101,997 UART: [state] CFI Enabled
19,158,357 UART: [fht] FMC Alias Private Key: 7
20,924,927 UART: [art] Extend RT PCRs Done
20,926,169 UART: [art] Lock RT PCRs Done
20,927,873 UART: [art] Populate DV Done
20,933,016 UART: [fht] FMC Alias Private Key: 7
20,934,839 UART: [art] Derive CDI
20,935,639 UART: [art] Store in slot 0x4
20,990,636 UART: [art] Derive Key Pair
20,991,663 UART: [art] Store priv key in slot 0x5
23,454,127 UART: [art] Derive Key Pair - Done
23,467,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,179,519 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,043 UART: [art] PUB.X = 2B801AB6C9063C1193B78A55C161CA2B2050D16FA77641C73736185A58AFC57B6B6A97B1F40D8D77390D9F4F942AC80C
25,188,280 UART: [art] PUB.Y = C5545B38921A03356C2D4995A1A6D48B683AAB04F32D560AABEE30E79A4D05F9B8AE3CF687A13966DF06C29B8EB9C389
25,195,554 UART: [art] SIG.R = 75674304A7C1ACB297DED0F3D2E48A661860AFB52336DE15660F0B45D00594A42BDD940CFF869ADB0BD4D243D3FAE8BD
25,202,924 UART: [art] SIG.S = 51F1056C3E3EB706A53D5528881641F2821B5284761CF4765F5FDD8A611C8DE10847E3FA55A3E041C5F36BCD5F7BE0B9
26,182,481 UART: Caliptra RT
26,183,175 UART: [state] CFI Enabled
26,363,882 UART: [rt] RT listening for mailbox commands...
26,366,296 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,521,776 UART: [rt]cmd =0x41544d4e, len=14344
30,517,621 >>> mbox cmd response data (8 bytes)
30,518,778 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,549,603 UART: [rt]cmd =0x41545348, len=116
30,569,592 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,438,601 ready_for_fw is high
3,439,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,651 >>> mbox cmd response: success
19,110,500 UART:
19,110,888 UART: Running Caliptra FMC ...
19,112,023 UART:
19,112,186 UART: [state] CFI Enabled
19,177,970 UART: [fht] FMC Alias Private Key: 7
20,944,481 UART: [art] Extend RT PCRs Done
20,945,706 UART: [art] Lock RT PCRs Done
20,947,061 UART: [art] Populate DV Done
20,952,575 UART: [fht] FMC Alias Private Key: 7
20,954,219 UART: [art] Derive CDI
20,955,034 UART: [art] Store in slot 0x4
21,010,783 UART: [art] Derive Key Pair
21,011,829 UART: [art] Store priv key in slot 0x5
23,474,430 UART: [art] Derive Key Pair - Done
23,487,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,646 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,184 UART: [art] PUB.X = 76F868B3B3C14FDB1DCE03EEF5446C9B3F29F39D902D5A30DE712268B95F57399814B011252ACE92073FD402D9E1A9C9
25,208,434 UART: [art] PUB.Y = 88A6A2C921D3D149FB65B3891BDF5DB61ED44FD2A8B966FF57456046B619735B2FA936A4DC0FB9EDC4D7DED37022570C
25,215,709 UART: [art] SIG.R = D6CB6798ABBE4DE4593BA1233ABA8F280126D6A66BB22ACA99505844A45243C69F86891EF9DE2141A9EC4F0E3E0EFB02
25,223,083 UART: [art] SIG.S = 6E9B3CAE4E88521E015182CA60443B4E5A1C566ED2BC4BBC7099C16BE87046DA576DF569B0899522611073A3D5AD2055
26,202,513 UART: Caliptra RT
26,203,237 UART: [state] CFI Enabled
26,383,491 UART: [rt] RT listening for mailbox commands...
26,385,930 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,541,270 UART: [rt]cmd =0x41544d4e, len=14344
30,536,784 >>> mbox cmd response data (8 bytes)
30,537,382 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,567,997 UART: [rt]cmd =0x41545348, len=116
30,587,909 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,423 UART:
192,778 UART: Running Caliptra ROM ...
193,928 UART:
603,726 UART: [state] CFI Enabled
613,860 UART: [state] LifecycleState = Unprovisioned
616,237 UART: [state] DebugLocked = No
617,771 UART: [state] WD Timer not started. Device not locked for debugging
623,176 UART: [kat] SHA2-256
813,003 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,817 UART: [kat] ++
824,340 UART: [kat] sha1
834,518 UART: [kat] SHA2-256
837,497 UART: [kat] SHA2-384
842,933 UART: [kat] SHA2-512-ACC
845,519 UART: [kat] ECC-384
3,287,252 UART: [kat] HMAC-384Kdf
3,301,504 UART: [kat] LMS
3,833,304 UART: [kat] --
3,837,664 UART: [cold-reset] ++
3,838,814 UART: [fht] FHT @ 0x50003400
3,851,385 UART: [idev] ++
3,852,103 UART: [idev] CDI.KEYID = 6
3,853,061 UART: [idev] SUBJECT.KEYID = 7
3,854,242 UART: [idev] UDS.KEYID = 0
3,855,146 ready_for_fw is high
3,855,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,261 UART: [idev] Erasing UDS.KEYID = 0
6,331,709 UART: [idev] Sha1 KeyId Algorithm
6,353,160 UART: [idev] --
6,357,948 UART: [ldev] ++
6,358,638 UART: [ldev] CDI.KEYID = 6
6,359,524 UART: [ldev] SUBJECT.KEYID = 5
6,360,755 UART: [ldev] AUTHORITY.KEYID = 7
6,361,940 UART: [ldev] FE.KEYID = 1
6,373,459 UART: [ldev] Erasing FE.KEYID = 1
8,851,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,450 UART: [ldev] --
10,641,281 UART: [fwproc] Wait for Commands...
10,643,544 UART: [fwproc] Recv command 0x46574c44
10,645,797 UART: [fwproc] Recv'd Img size: 118548 bytes
14,138,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,217,940 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,341,541 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,901,774 >>> mbox cmd response: success
14,905,780 UART: [afmc] ++
14,906,519 UART: [afmc] CDI.KEYID = 6
14,907,718 UART: [afmc] SUBJECT.KEYID = 7
14,909,164 UART: [afmc] AUTHORITY.KEYID = 5
17,409,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,131,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,133,528 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,148,586 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,163,772 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,178,655 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,202,798 UART: [afmc] --
19,206,091 UART: [cold-reset] --
19,209,112 UART: [state] Locking Datavault
19,216,272 UART: [state] Locking PCR0, PCR1 and PCR31
19,218,489 UART: [state] Locking ICCM
19,220,001 UART: [exit] Launching FMC @ 0x40000130
19,228,667 UART:
19,228,907 UART: Running Caliptra FMC ...
19,230,012 UART:
19,230,189 UART: [state] CFI Enabled
19,238,454 UART: [fht] FMC Alias Private Key: 7
21,005,138 UART: [art] Extend RT PCRs Done
21,006,594 UART: [art] Lock RT PCRs Done
21,007,670 UART: [art] Populate DV Done
21,012,967 UART: [fht] FMC Alias Private Key: 7
21,014,579 UART: [art] Derive CDI
21,015,404 UART: [art] Store in slot 0x4
21,057,691 UART: [art] Derive Key Pair
21,058,697 UART: [art] Store priv key in slot 0x5
23,485,673 UART: [art] Derive Key Pair - Done
23,498,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,801 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,322 UART: [art] PUB.X = 9712D0A4213A13F58DEA8178D637E285354270D62E3BEB1B9FC4A21177BD935CA9F46260A8944A7A17AF95A63BD6531D
25,213,530 UART: [art] PUB.Y = B7358070C9E0AE04F68EA25C8594FA699CE4B89BBCE242DE020299DD11186DAB328F26F173C416F09A9F85D2CAA754A9
25,220,790 UART: [art] SIG.R = C6BAC8861F15F6236A3FF1ADD1C9BE598D37C325100630D4E7194749F93D569236B57121DF07AADE26FFF5B1287DDED7
25,228,205 UART: [art] SIG.S = BED049376F02DF9FB9C3408A54BEE79C824702C86B0FDEA93C2A273EE114593AA49B9850F10AD2EF4D1C5E2349473435
26,207,053 UART: Caliptra RT
26,207,781 UART: [state] CFI Enabled
26,340,950 UART: [rt] RT listening for mailbox commands...
26,343,402 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,498,610 UART: [rt]cmd =0x41544d4e, len=14344
30,493,830 >>> mbox cmd response data (8 bytes)
30,494,448 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,525,138 UART: [rt]cmd =0x41545348, len=116
30,545,027 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
3,759,621 ready_for_fw is high
3,760,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,055,938 >>> mbox cmd response: success
19,310,897 UART:
19,311,346 UART: Running Caliptra FMC ...
19,312,473 UART:
19,312,627 UART: [state] CFI Enabled
19,320,412 UART: [fht] FMC Alias Private Key: 7
21,086,620 UART: [art] Extend RT PCRs Done
21,087,850 UART: [art] Lock RT PCRs Done
21,089,560 UART: [art] Populate DV Done
21,094,878 UART: [fht] FMC Alias Private Key: 7
21,096,426 UART: [art] Derive CDI
21,097,166 UART: [art] Store in slot 0x4
21,139,662 UART: [art] Derive Key Pair
21,140,666 UART: [art] Store priv key in slot 0x5
23,566,769 UART: [art] Derive Key Pair - Done
23,579,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,286,679 UART: [art] Erasing AUTHORITY.KEYID = 7
25,288,199 UART: [art] PUB.X = 9816E18CA7867E378A613729937D29EC41B43EECC7AB877B9F3D4BFCBE31DE77261A9A6AA4515F225DDD362126AB7919
25,295,467 UART: [art] PUB.Y = FFC476A0CF065C335EDE15B454FB2D515253B5F85DEA018718EFD9A11D3DA83718DFDF85704D3F09764EC3E0212643DD
25,302,682 UART: [art] SIG.R = 398AF89C57808466AA8FBBDF55612F2B54BEB47780C4676A75DC4072B0AB5DF03EAEB57E8DFA9F6D8C154D6C9D1F18C8
25,310,127 UART: [art] SIG.S = B9C5345A506BECB633142D2E9C1B7923D0A74BEB9F57DBA29BE0299BBC8B3AEE1F9185E6C439FB626D69DCF8AD0E0296
26,288,900 UART: Caliptra RT
26,289,599 UART: [state] CFI Enabled
26,423,031 UART: [rt] RT listening for mailbox commands...
26,425,487 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,581,018 UART: [rt]cmd =0x41544d4e, len=14344
30,576,744 >>> mbox cmd response data (8 bytes)
30,577,370 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,608,278 UART: [rt]cmd =0x41545348, len=116
30,628,555 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,003 UART: [kat] SHA2-256
881,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,049 UART: [kat] ++
886,201 UART: [kat] sha1
890,599 UART: [kat] SHA2-256
892,537 UART: [kat] SHA2-384
895,172 UART: [kat] SHA2-512-ACC
897,073 UART: [kat] ECC-384
902,510 UART: [kat] HMAC-384Kdf
907,006 UART: [kat] LMS
1,475,202 UART: [kat] --
1,476,297 UART: [cold-reset] ++
1,476,757 UART: [fht] Storing FHT @ 0x50003400
1,479,364 UART: [idev] ++
1,479,532 UART: [idev] CDI.KEYID = 6
1,479,892 UART: [idev] SUBJECT.KEYID = 7
1,480,316 UART: [idev] UDS.KEYID = 0
1,480,661 ready_for_fw is high
1,480,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,318 UART: [idev] Erasing UDS.KEYID = 0
1,504,656 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,134 UART: [idev] --
1,514,137 UART: [ldev] ++
1,514,305 UART: [ldev] CDI.KEYID = 6
1,514,668 UART: [ldev] SUBJECT.KEYID = 5
1,515,094 UART: [ldev] AUTHORITY.KEYID = 7
1,515,557 UART: [ldev] FE.KEYID = 1
1,520,609 UART: [ldev] Erasing FE.KEYID = 1
1,545,994 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,996 UART: [ldev] --
1,585,405 UART: [fwproc] Waiting for Commands...
1,586,254 UART: [fwproc] Received command 0x46574c44
1,587,045 UART: [fwproc] Received Image of size 118548 bytes
2,932,473 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,589 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,807 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,176 >>> mbox cmd response: success
3,132,216 UART: [afmc] ++
3,132,384 UART: [afmc] CDI.KEYID = 6
3,132,746 UART: [afmc] SUBJECT.KEYID = 7
3,133,171 UART: [afmc] AUTHORITY.KEYID = 5
3,168,684 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,030 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,810 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,519 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,402 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,085 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,007 UART: [afmc] --
3,211,889 UART: [cold-reset] --
3,212,545 UART: [state] Locking Datavault
3,213,694 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,298 UART: [state] Locking ICCM
3,214,724 UART: [exit] Launching FMC @ 0x40000130
3,220,054 UART:
3,220,070 UART: Running Caliptra FMC ...
3,220,478 UART:
3,220,532 UART: [state] CFI Enabled
3,230,732 UART: [fht] FMC Alias Private Key: 7
3,349,224 UART: [art] Extend RT PCRs Done
3,349,652 UART: [art] Lock RT PCRs Done
3,351,174 UART: [art] Populate DV Done
3,359,043 UART: [fht] FMC Alias Private Key: 7
3,360,153 UART: [art] Derive CDI
3,360,433 UART: [art] Store in slot 0x4
3,446,099 UART: [art] Derive Key Pair
3,446,459 UART: [art] Store priv key in slot 0x5
3,459,330 UART: [art] Derive Key Pair - Done
3,474,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,100 UART: [art] PUB.X = D8688D597EE54192DB9A79E4A37FFCB7BEC02CBF406F2C2C3F4B975C01517BEC2146B5127A409EC2590B01D76E70B008
3,496,868 UART: [art] PUB.Y = 97CFF6785E7ADD34C6A90A62306D8BEAEF4E6F107242D1007C747BA841F39AE895093918D3819353AC8C0F019AB81275
3,503,786 UART: [art] SIG.R = AFB8B4BD2371F8BCCAE018AEB26D5F78E5872585D9462F034079C1F4E1F661DEA38EEA8EEA29938E48F35B7EE8142257
3,510,567 UART: [art] SIG.S = EA4DA7CB449F8E69FB54172E2476556C9CDC696DFB9C48E87CAD308E1E4FD62E9065A25D7C1C7396F76B8084460D0B1E
3,534,555 UART: Caliptra RT
3,534,806 UART: [state] CFI Enabled
3,654,629 UART: [rt] RT listening for mailbox commands...
3,655,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,141 UART: [rt]cmd =0x41544d4e, len=14344
4,088,711 >>> mbox cmd response data (8 bytes)
4,088,712 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,118,811 UART: [rt]cmd =0x41545348, len=116
4,140,296 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,073 ready_for_fw is high
1,363,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,528 >>> mbox cmd response: success
3,042,663 UART:
3,042,679 UART: Running Caliptra FMC ...
3,043,087 UART:
3,043,141 UART: [state] CFI Enabled
3,053,605 UART: [fht] FMC Alias Private Key: 7
3,172,625 UART: [art] Extend RT PCRs Done
3,173,053 UART: [art] Lock RT PCRs Done
3,174,399 UART: [art] Populate DV Done
3,182,550 UART: [fht] FMC Alias Private Key: 7
3,183,538 UART: [art] Derive CDI
3,183,818 UART: [art] Store in slot 0x4
3,269,378 UART: [art] Derive Key Pair
3,269,738 UART: [art] Store priv key in slot 0x5
3,282,895 UART: [art] Derive Key Pair - Done
3,297,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,843 UART: [art] PUB.X = 99081123E473041F5B9FCA51F7F1BF58F813EA440DA5EDB1D673B6040442CDE501C72FBD79EF9C9E9089E5B7FC8677EE
3,320,607 UART: [art] PUB.Y = C82546B9FABCCEEE0BA0EFA9F57A72CA14F2B1C3787509ECC57665D8F25DF0CDE2644D4347D9D8D6CE3F91862BB6AD44
3,327,575 UART: [art] SIG.R = 21C5CBAF113A14EA4BC2C4DD03F46CB5EEB857CE356E94E3ED358C73FCAE11A8284FA7BD356FE6990B2BADAEF644A063
3,334,367 UART: [art] SIG.S = B14E64D1A0CF368926ADD8EE9BB2E71FA61036FCE7871CC1414E28121083942911DB49419B58480375605C625ABCE773
3,358,732 UART: Caliptra RT
3,358,983 UART: [state] CFI Enabled
3,478,939 UART: [rt] RT listening for mailbox commands...
3,479,609 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,705 UART: [rt]cmd =0x41544d4e, len=14344
3,912,871 >>> mbox cmd response data (8 bytes)
3,912,872 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,043 UART: [rt]cmd =0x41545348, len=116
3,965,828 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,172 UART: [kat] SHA2-256
882,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,218 UART: [kat] ++
886,370 UART: [kat] sha1
890,640 UART: [kat] SHA2-256
892,578 UART: [kat] SHA2-384
895,239 UART: [kat] SHA2-512-ACC
897,140 UART: [kat] ECC-384
902,835 UART: [kat] HMAC-384Kdf
907,367 UART: [kat] LMS
1,475,563 UART: [kat] --
1,476,388 UART: [cold-reset] ++
1,476,902 UART: [fht] Storing FHT @ 0x50003400
1,479,617 UART: [idev] ++
1,479,785 UART: [idev] CDI.KEYID = 6
1,480,145 UART: [idev] SUBJECT.KEYID = 7
1,480,569 UART: [idev] UDS.KEYID = 0
1,480,914 ready_for_fw is high
1,480,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,829 UART: [idev] Erasing UDS.KEYID = 0
1,504,875 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,293 UART: [idev] --
1,514,428 UART: [ldev] ++
1,514,596 UART: [ldev] CDI.KEYID = 6
1,514,959 UART: [ldev] SUBJECT.KEYID = 5
1,515,385 UART: [ldev] AUTHORITY.KEYID = 7
1,515,848 UART: [ldev] FE.KEYID = 1
1,521,298 UART: [ldev] Erasing FE.KEYID = 1
1,546,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,589 UART: [ldev] --
1,585,996 UART: [fwproc] Waiting for Commands...
1,586,827 UART: [fwproc] Received command 0x46574c44
1,587,618 UART: [fwproc] Received Image of size 118548 bytes
2,931,518 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,060 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,278 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,715 >>> mbox cmd response: success
3,131,801 UART: [afmc] ++
3,131,969 UART: [afmc] CDI.KEYID = 6
3,132,331 UART: [afmc] SUBJECT.KEYID = 7
3,132,756 UART: [afmc] AUTHORITY.KEYID = 5
3,167,825 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,401 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,181 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,890 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,773 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,456 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,282 UART: [afmc] --
3,211,392 UART: [cold-reset] --
3,212,114 UART: [state] Locking Datavault
3,213,275 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,879 UART: [state] Locking ICCM
3,214,499 UART: [exit] Launching FMC @ 0x40000130
3,219,829 UART:
3,219,845 UART: Running Caliptra FMC ...
3,220,253 UART:
3,220,396 UART: [state] CFI Enabled
3,230,942 UART: [fht] FMC Alias Private Key: 7
3,349,956 UART: [art] Extend RT PCRs Done
3,350,384 UART: [art] Lock RT PCRs Done
3,351,970 UART: [art] Populate DV Done
3,360,105 UART: [fht] FMC Alias Private Key: 7
3,361,121 UART: [art] Derive CDI
3,361,401 UART: [art] Store in slot 0x4
3,447,157 UART: [art] Derive Key Pair
3,447,517 UART: [art] Store priv key in slot 0x5
3,460,970 UART: [art] Derive Key Pair - Done
3,475,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,551 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,316 UART: [art] PUB.X = 608811C409190537EA4CF84D66177458E6DBCCDAAD41E62F6F6C986E475994C6ACBA15AF5714779658AED51B4154F25E
3,499,084 UART: [art] PUB.Y = 8A716742260849CFED0D5E9B15C0FCAD69ED275884AD399395045CDE1DDB4869A14057E526B722BCBB86EB25098DD5F2
3,506,030 UART: [art] SIG.R = 7B43928A4D0D2A3F87B98FD70D94406B9FD28AA1E3C5409063393B18D9306A39788C5004B3BB87B9FAF4D2185125ED43
3,512,791 UART: [art] SIG.S = FB431D91C3FB3B3B190EF55D475B1DAD0D8E0DE23EE2C82A4AF8E100BB910C2A817FB392BD82800E6579B1448A1CCF4C
3,536,534 UART: Caliptra RT
3,536,877 UART: [state] CFI Enabled
3,657,443 UART: [rt] RT listening for mailbox commands...
3,658,113 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,419 UART: [rt]cmd =0x41544d4e, len=14344
4,091,249 >>> mbox cmd response data (8 bytes)
4,091,250 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,121 UART: [rt]cmd =0x41545348, len=116
4,143,134 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,300 ready_for_fw is high
1,363,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,285 >>> mbox cmd response: success
3,041,746 UART:
3,041,762 UART: Running Caliptra FMC ...
3,042,170 UART:
3,042,313 UART: [state] CFI Enabled
3,053,351 UART: [fht] FMC Alias Private Key: 7
3,173,019 UART: [art] Extend RT PCRs Done
3,173,447 UART: [art] Lock RT PCRs Done
3,175,035 UART: [art] Populate DV Done
3,183,244 UART: [fht] FMC Alias Private Key: 7
3,184,362 UART: [art] Derive CDI
3,184,642 UART: [art] Store in slot 0x4
3,270,190 UART: [art] Derive Key Pair
3,270,550 UART: [art] Store priv key in slot 0x5
3,283,825 UART: [art] Derive Key Pair - Done
3,298,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,941 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,706 UART: [art] PUB.X = E1C9F3875AD71084E48AA977A9910019A9EEB634F3D7266C079AF836948AFE707951237E94097FB924B7B644198DA6E6
3,322,444 UART: [art] PUB.Y = 118C4AB5476506F102CE518E21D4BF7A26CD2D379DAE8830207157F6D2B3B1B31ECF912DCBCC9DDAD552CC901A6E1A47
3,329,404 UART: [art] SIG.R = ED4AA9100D01C428F62841CEBC6D9B65ACF80342CE4857E46EDF1A168F7B3B7F24CDDCE092B65EF9377DD0BBE1BA87EC
3,336,191 UART: [art] SIG.S = 20186157B368F6CF85635D382518A8DF2DB74941CDBC54F1865544644FB9AC8657E4C8BC8D818AC825A59EA4FA490706
3,359,449 UART: Caliptra RT
3,359,792 UART: [state] CFI Enabled
3,479,750 UART: [rt] RT listening for mailbox commands...
3,480,420 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,368 UART: [rt]cmd =0x41544d4e, len=14344
3,913,250 >>> mbox cmd response data (8 bytes)
3,913,251 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,326 UART: [rt]cmd =0x41545348, len=116
3,965,199 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,506 UART: [state] LifecycleState = Unprovisioned
85,161 UART: [state] DebugLocked = No
85,659 UART: [state] WD Timer not started. Device not locked for debugging
86,958 UART: [kat] SHA2-256
890,508 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,612 UART: [kat] ++
894,764 UART: [kat] sha1
898,970 UART: [kat] SHA2-256
900,910 UART: [kat] SHA2-384
903,817 UART: [kat] SHA2-512-ACC
905,718 UART: [kat] ECC-384
915,659 UART: [kat] HMAC-384Kdf
920,289 UART: [kat] LMS
1,168,601 UART: [kat] --
1,169,600 UART: [cold-reset] ++
1,170,074 UART: [fht] FHT @ 0x50003400
1,172,838 UART: [idev] ++
1,173,006 UART: [idev] CDI.KEYID = 6
1,173,367 UART: [idev] SUBJECT.KEYID = 7
1,173,792 UART: [idev] UDS.KEYID = 0
1,174,138 ready_for_fw is high
1,174,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,743 UART: [idev] Erasing UDS.KEYID = 0
1,198,705 UART: [idev] Sha1 KeyId Algorithm
1,207,477 UART: [idev] --
1,208,438 UART: [ldev] ++
1,208,606 UART: [ldev] CDI.KEYID = 6
1,208,970 UART: [ldev] SUBJECT.KEYID = 5
1,209,397 UART: [ldev] AUTHORITY.KEYID = 7
1,209,860 UART: [ldev] FE.KEYID = 1
1,214,806 UART: [ldev] Erasing FE.KEYID = 1
1,240,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,466 UART: [ldev] --
1,279,857 UART: [fwproc] Wait for Commands...
1,280,556 UART: [fwproc] Recv command 0x46574c44
1,281,289 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,757 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,932 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,325 >>> mbox cmd response: success
2,825,429 UART: [afmc] ++
2,825,597 UART: [afmc] CDI.KEYID = 6
2,825,960 UART: [afmc] SUBJECT.KEYID = 7
2,826,386 UART: [afmc] AUTHORITY.KEYID = 5
2,861,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,899 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,609 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,490 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,191 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,994 UART: [afmc] --
2,904,829 UART: [cold-reset] --
2,905,723 UART: [state] Locking Datavault
2,906,690 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,294 UART: [state] Locking ICCM
2,907,946 UART: [exit] Launching FMC @ 0x40000130
2,913,276 UART:
2,913,292 UART: Running Caliptra FMC ...
2,913,700 UART:
2,913,754 UART: [state] CFI Enabled
2,924,506 UART: [fht] FMC Alias Private Key: 7
3,043,858 UART: [art] Extend RT PCRs Done
3,044,286 UART: [art] Lock RT PCRs Done
3,046,004 UART: [art] Populate DV Done
3,054,287 UART: [fht] FMC Alias Private Key: 7
3,055,311 UART: [art] Derive CDI
3,055,591 UART: [art] Store in slot 0x4
3,141,018 UART: [art] Derive Key Pair
3,141,378 UART: [art] Store priv key in slot 0x5
3,154,680 UART: [art] Derive Key Pair - Done
3,169,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,416 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,181 UART: [art] PUB.X = 9525CC36BABDBA095EDAA254DEC1636A4EB132DA50404DFCF9BC1600E763C31DF39A7AA55C11A74601EB403391B82E93
3,192,939 UART: [art] PUB.Y = FDF963AFC3063417B35CB81FDE87141CBD9CC92DE6C989292E6FA4DC699E48CB36890EE8647D1F6939DB101DA622F730
3,199,895 UART: [art] SIG.R = BB0DF1EED03ABF96342324F0A1194BB33B80E8655A0EAEA01A1171DA64E4457EE5E8624ECFF7728ABA7A61F1346E9EF6
3,206,677 UART: [art] SIG.S = D775515E94CC5069C8A1666EF28BC2478FEF8F0A42D61E13FFB9B98A5BFAF5E456AB6D31EF37819BE9EEAAD337028E32
3,230,537 UART: Caliptra RT
3,230,788 UART: [state] CFI Enabled
3,351,098 UART: [rt] RT listening for mailbox commands...
3,351,768 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,906 UART: [rt]cmd =0x41544d4e, len=14344
3,784,758 >>> mbox cmd response data (8 bytes)
3,784,759 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,898 UART: [rt]cmd =0x41545348, len=116
3,836,537 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,090 ready_for_fw is high
1,059,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,628 >>> mbox cmd response: success
2,739,611 UART:
2,739,627 UART: Running Caliptra FMC ...
2,740,035 UART:
2,740,089 UART: [state] CFI Enabled
2,750,451 UART: [fht] FMC Alias Private Key: 7
2,869,515 UART: [art] Extend RT PCRs Done
2,869,943 UART: [art] Lock RT PCRs Done
2,871,909 UART: [art] Populate DV Done
2,880,192 UART: [fht] FMC Alias Private Key: 7
2,881,274 UART: [art] Derive CDI
2,881,554 UART: [art] Store in slot 0x4
2,967,477 UART: [art] Derive Key Pair
2,967,837 UART: [art] Store priv key in slot 0x5
2,981,593 UART: [art] Derive Key Pair - Done
2,996,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,638 UART: [art] PUB.X = 434AC54CD5869FD2D17DA7095549A4DFE7359549FF56A4A21246F5DF12AB7AB1898A865FE7B68AB9EDA63C0B3D465B0B
3,019,413 UART: [art] PUB.Y = 4205B05E49D89E3AF9D1FDCAFA6493BC43A2D483F6BB00F6BB6D7E220E2DB80C0FFCC81B7414826F36D50F959C0069A8
3,026,320 UART: [art] SIG.R = A46EEEB4D07FC880BD5F39D97F603AC4929E071074C46A357712C0008D28A4382CE30689303B2C1F100184D02D63869E
3,033,055 UART: [art] SIG.S = FD2338F119902FE9B8E54286397DA78D02B562FD5C9F641AA3C495C69D0675CFFA7A32CB18617FDEC5B72E035C650AC2
3,056,679 UART: Caliptra RT
3,056,930 UART: [state] CFI Enabled
3,176,116 UART: [rt] RT listening for mailbox commands...
3,176,786 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,652 UART: [rt]cmd =0x41544d4e, len=14344
3,609,734 >>> mbox cmd response data (8 bytes)
3,609,735 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,504 UART: [rt]cmd =0x41545348, len=116
3,660,887 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,599 UART: [kat] SHA2-256
891,149 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,469 UART: [kat] SHA2-256
901,409 UART: [kat] SHA2-384
904,296 UART: [kat] SHA2-512-ACC
906,197 UART: [kat] ECC-384
916,068 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,170,079 UART: [cold-reset] ++
1,170,593 UART: [fht] FHT @ 0x50003400
1,173,121 UART: [idev] ++
1,173,289 UART: [idev] CDI.KEYID = 6
1,173,650 UART: [idev] SUBJECT.KEYID = 7
1,174,075 UART: [idev] UDS.KEYID = 0
1,174,421 ready_for_fw is high
1,174,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,882 UART: [idev] Erasing UDS.KEYID = 0
1,198,942 UART: [idev] Sha1 KeyId Algorithm
1,207,924 UART: [idev] --
1,209,113 UART: [ldev] ++
1,209,281 UART: [ldev] CDI.KEYID = 6
1,209,645 UART: [ldev] SUBJECT.KEYID = 5
1,210,072 UART: [ldev] AUTHORITY.KEYID = 7
1,210,535 UART: [ldev] FE.KEYID = 1
1,215,697 UART: [ldev] Erasing FE.KEYID = 1
1,242,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,687 UART: [ldev] --
1,282,048 UART: [fwproc] Wait for Commands...
1,282,869 UART: [fwproc] Recv command 0x46574c44
1,283,602 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,293 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,468 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,805 >>> mbox cmd response: success
2,827,951 UART: [afmc] ++
2,828,119 UART: [afmc] CDI.KEYID = 6
2,828,482 UART: [afmc] SUBJECT.KEYID = 7
2,828,908 UART: [afmc] AUTHORITY.KEYID = 5
2,864,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,712 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,461 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,171 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,052 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,753 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,450 UART: [afmc] --
2,908,459 UART: [cold-reset] --
2,909,033 UART: [state] Locking Datavault
2,910,358 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,962 UART: [state] Locking ICCM
2,911,560 UART: [exit] Launching FMC @ 0x40000130
2,916,890 UART:
2,916,906 UART: Running Caliptra FMC ...
2,917,314 UART:
2,917,457 UART: [state] CFI Enabled
2,928,097 UART: [fht] FMC Alias Private Key: 7
3,047,443 UART: [art] Extend RT PCRs Done
3,047,871 UART: [art] Lock RT PCRs Done
3,049,321 UART: [art] Populate DV Done
3,057,434 UART: [fht] FMC Alias Private Key: 7
3,058,384 UART: [art] Derive CDI
3,058,664 UART: [art] Store in slot 0x4
3,144,615 UART: [art] Derive Key Pair
3,144,975 UART: [art] Store priv key in slot 0x5
3,158,273 UART: [art] Derive Key Pair - Done
3,173,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,827 UART: [art] PUB.X = E8338027A127EA735C463C7BB95AA78F7754510C2AC94602B28098381FDB68143CBCA2A83CDB66FA0FB2708147CCC53D
3,196,594 UART: [art] PUB.Y = 8D33A932DA94702998C46DF67A5F40F3EA737B5865EC1D9147A57AE2FE5D552C8D2C8485A2B4BAC57B76C647C0D0B850
3,203,552 UART: [art] SIG.R = 72D6FF1C377DCECCB08C88F1FDAA25909914929F8BD42509CF15F026621D72F043F0729AC2BA912A66661EBA69A5F175
3,210,327 UART: [art] SIG.S = 5BE177621E61DE97312E70B73C0DE0E0351EB6059AB643D373181524E53ECDE0608BA70D38BCA5FC7914728B542DC813
3,234,158 UART: Caliptra RT
3,234,501 UART: [state] CFI Enabled
3,354,023 UART: [rt] RT listening for mailbox commands...
3,354,693 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,509 UART: [rt]cmd =0x41544d4e, len=14344
3,787,481 >>> mbox cmd response data (8 bytes)
3,787,482 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,451 UART: [rt]cmd =0x41545348, len=116
3,838,862 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,355 ready_for_fw is high
1,059,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,049 >>> mbox cmd response: success
2,743,802 UART:
2,743,818 UART: Running Caliptra FMC ...
2,744,226 UART:
2,744,369 UART: [state] CFI Enabled
2,755,299 UART: [fht] FMC Alias Private Key: 7
2,874,137 UART: [art] Extend RT PCRs Done
2,874,565 UART: [art] Lock RT PCRs Done
2,876,141 UART: [art] Populate DV Done
2,884,688 UART: [fht] FMC Alias Private Key: 7
2,885,806 UART: [art] Derive CDI
2,886,086 UART: [art] Store in slot 0x4
2,971,715 UART: [art] Derive Key Pair
2,972,075 UART: [art] Store priv key in slot 0x5
2,985,409 UART: [art] Derive Key Pair - Done
3,000,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,615 UART: [art] PUB.X = F161E64A167D5E4C1F6A42D6B77FE9B6A36CCD0A36415FB4C1AE46BEFF980A5F100A071AC8463208BBD5E0E4064F7F5E
3,023,385 UART: [art] PUB.Y = 1105D50776BEE9A6322E33EA47F347082EA401553F703E0BDDD87AB0456F37BADA1F128E42AB0D541784499E643D087A
3,030,316 UART: [art] SIG.R = 07E5B1099EC6F5313C031D6DD193B748A866C2F219CA898F3153C73BAFAD070279EFE9F060FEB9914A173E7BFE891D50
3,037,079 UART: [art] SIG.S = 25786A1C6581358365EA2AC6BC9506C7D294EE9FC3779110D6341779445E52AC87760E475174EE0AF32E70B65450E9DE
3,060,420 UART: Caliptra RT
3,060,763 UART: [state] CFI Enabled
3,180,169 UART: [rt] RT listening for mailbox commands...
3,180,839 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,935 UART: [rt]cmd =0x41544d4e, len=14344
3,614,297 >>> mbox cmd response data (8 bytes)
3,614,298 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,229 UART: [rt]cmd =0x41545348, len=116
3,666,458 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,783 UART: [state] WD Timer not started. Device not locked for debugging
88,114 UART: [kat] SHA2-256
893,764 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,889 UART: [kat] ++
898,041 UART: [kat] sha1
902,267 UART: [kat] SHA2-256
904,207 UART: [kat] SHA2-384
907,070 UART: [kat] SHA2-512-ACC
908,971 UART: [kat] ECC-384
918,546 UART: [kat] HMAC-384Kdf
923,014 UART: [kat] LMS
1,171,342 UART: [kat] --
1,172,237 UART: [cold-reset] ++
1,172,705 UART: [fht] FHT @ 0x50003400
1,175,240 UART: [idev] ++
1,175,408 UART: [idev] CDI.KEYID = 6
1,175,768 UART: [idev] SUBJECT.KEYID = 7
1,176,192 UART: [idev] UDS.KEYID = 0
1,176,537 ready_for_fw is high
1,176,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,568 UART: [idev] Erasing UDS.KEYID = 0
1,200,613 UART: [idev] Sha1 KeyId Algorithm
1,209,137 UART: [idev] --
1,210,117 UART: [ldev] ++
1,210,285 UART: [ldev] CDI.KEYID = 6
1,210,648 UART: [ldev] SUBJECT.KEYID = 5
1,211,074 UART: [ldev] AUTHORITY.KEYID = 7
1,211,537 UART: [ldev] FE.KEYID = 1
1,216,593 UART: [ldev] Erasing FE.KEYID = 1
1,242,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,811 UART: [ldev] --
1,282,088 UART: [fwproc] Wait for Commands...
1,282,880 UART: [fwproc] Recv command 0x46574c44
1,283,608 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,324 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,494 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,895 >>> mbox cmd response: success
2,829,087 UART: [afmc] ++
2,829,255 UART: [afmc] CDI.KEYID = 6
2,829,617 UART: [afmc] SUBJECT.KEYID = 7
2,830,042 UART: [afmc] AUTHORITY.KEYID = 5
2,865,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,138 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,847 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,730 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,431 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,227 UART: [afmc] --
2,909,195 UART: [cold-reset] --
2,910,009 UART: [state] Locking Datavault
2,911,450 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,054 UART: [state] Locking ICCM
2,912,700 UART: [exit] Launching FMC @ 0x40000130
2,918,030 UART:
2,918,046 UART: Running Caliptra FMC ...
2,918,454 UART:
2,918,508 UART: [state] CFI Enabled
2,929,076 UART: [fht] FMC Alias Private Key: 7
3,047,456 UART: [art] Extend RT PCRs Done
3,047,884 UART: [art] Lock RT PCRs Done
3,049,626 UART: [art] Populate DV Done
3,057,923 UART: [fht] FMC Alias Private Key: 7
3,058,855 UART: [art] Derive CDI
3,059,135 UART: [art] Store in slot 0x4
3,144,784 UART: [art] Derive Key Pair
3,145,144 UART: [art] Store priv key in slot 0x5
3,157,726 UART: [art] Derive Key Pair - Done
3,172,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,759 UART: [art] PUB.X = 70B9645EB06D653A1B6A8649D28E74B8C17CC31F30D988B78E83FDFE74198F125649A5E933880582B3E6E12E885AC3E3
3,195,526 UART: [art] PUB.Y = DBA05DE337A73508243C2475BA1AA1150F83EAF6999746F74AD2BFA1C77DAA8C445D1449450EAA6918C2AA568530E1A3
3,202,475 UART: [art] SIG.R = 9913CCA89A49D5D55ABB52738DBF412FCC20EFF0AF559EA0891BBB2D3B85AD343A7A2AF8797D9DDB6478ADFD1148E8D2
3,209,269 UART: [art] SIG.S = E1A026B5F14D4C4540767BC048CF9BD9FA31189F705D79C8A4D172B955447F8995CAD61357C9C38ED386F21249B80F38
3,233,314 UART: Caliptra RT
3,233,565 UART: [state] CFI Enabled
3,353,093 UART: [rt] RT listening for mailbox commands...
3,353,763 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,945 UART: [rt]cmd =0x41544d4e, len=14344
3,787,039 >>> mbox cmd response data (8 bytes)
3,787,040 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,845 UART: [rt]cmd =0x41545348, len=116
3,838,840 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,925 ready_for_fw is high
1,059,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,968 >>> mbox cmd response: success
2,742,161 UART:
2,742,177 UART: Running Caliptra FMC ...
2,742,585 UART:
2,742,639 UART: [state] CFI Enabled
2,753,013 UART: [fht] FMC Alias Private Key: 7
2,871,771 UART: [art] Extend RT PCRs Done
2,872,199 UART: [art] Lock RT PCRs Done
2,873,539 UART: [art] Populate DV Done
2,881,662 UART: [fht] FMC Alias Private Key: 7
2,882,642 UART: [art] Derive CDI
2,882,922 UART: [art] Store in slot 0x4
2,968,309 UART: [art] Derive Key Pair
2,968,669 UART: [art] Store priv key in slot 0x5
2,981,815 UART: [art] Derive Key Pair - Done
2,996,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,187 UART: [art] PUB.X = 82A5F294D12948F461BDBCFE26BC0E0C44008DB1AA27E831870C81DC4EF5BC25B63161C11BCE94E86DFA939C012AF57E
3,019,939 UART: [art] PUB.Y = D68217E172B5A792D974DBA3C351D6303281758FD896783D40639B4E1FE82B9B5D68FC201340FE557F1EC6017AAEC295
3,026,886 UART: [art] SIG.R = 7644A130CDD60EA27FD128F9EFD48BA19C45C08FE346D5AAAD274F6C8EA6C4260666D94B877D3919E0327FB1B261D752
3,033,660 UART: [art] SIG.S = C597AF7BD052B73ECE84CCB55A5E679471CC88831CE0CCADD61E25A802CDB4EBEC5393374C01C410DBDDA787A4C9668B
3,057,384 UART: Caliptra RT
3,057,635 UART: [state] CFI Enabled
3,176,792 UART: [rt] RT listening for mailbox commands...
3,177,462 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,570 UART: [rt]cmd =0x41544d4e, len=14344
3,610,178 >>> mbox cmd response data (8 bytes)
3,610,179 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,308 UART: [rt]cmd =0x41545348, len=116
3,662,813 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
893,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,768 UART: [kat] ++
897,920 UART: [kat] sha1
902,206 UART: [kat] SHA2-256
904,146 UART: [kat] SHA2-384
906,797 UART: [kat] SHA2-512-ACC
908,698 UART: [kat] ECC-384
918,227 UART: [kat] HMAC-384Kdf
922,913 UART: [kat] LMS
1,171,241 UART: [kat] --
1,172,088 UART: [cold-reset] ++
1,172,536 UART: [fht] FHT @ 0x50003400
1,175,089 UART: [idev] ++
1,175,257 UART: [idev] CDI.KEYID = 6
1,175,617 UART: [idev] SUBJECT.KEYID = 7
1,176,041 UART: [idev] UDS.KEYID = 0
1,176,386 ready_for_fw is high
1,176,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,073 UART: [idev] Erasing UDS.KEYID = 0
1,200,658 UART: [idev] Sha1 KeyId Algorithm
1,209,040 UART: [idev] --
1,210,184 UART: [ldev] ++
1,210,352 UART: [ldev] CDI.KEYID = 6
1,210,715 UART: [ldev] SUBJECT.KEYID = 5
1,211,141 UART: [ldev] AUTHORITY.KEYID = 7
1,211,604 UART: [ldev] FE.KEYID = 1
1,217,048 UART: [ldev] Erasing FE.KEYID = 1
1,242,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,604 UART: [ldev] --
1,281,955 UART: [fwproc] Wait for Commands...
1,282,701 UART: [fwproc] Recv command 0x46574c44
1,283,429 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,681 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,851 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,174 >>> mbox cmd response: success
2,827,238 UART: [afmc] ++
2,827,406 UART: [afmc] CDI.KEYID = 6
2,827,768 UART: [afmc] SUBJECT.KEYID = 7
2,828,193 UART: [afmc] AUTHORITY.KEYID = 5
2,864,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,117 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,826 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,709 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,410 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,304 UART: [afmc] --
2,907,344 UART: [cold-reset] --
2,908,230 UART: [state] Locking Datavault
2,909,119 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,723 UART: [state] Locking ICCM
2,910,369 UART: [exit] Launching FMC @ 0x40000130
2,915,699 UART:
2,915,715 UART: Running Caliptra FMC ...
2,916,123 UART:
2,916,266 UART: [state] CFI Enabled
2,927,010 UART: [fht] FMC Alias Private Key: 7
3,045,832 UART: [art] Extend RT PCRs Done
3,046,260 UART: [art] Lock RT PCRs Done
3,047,758 UART: [art] Populate DV Done
3,056,077 UART: [fht] FMC Alias Private Key: 7
3,057,055 UART: [art] Derive CDI
3,057,335 UART: [art] Store in slot 0x4
3,143,392 UART: [art] Derive Key Pair
3,143,752 UART: [art] Store priv key in slot 0x5
3,157,126 UART: [art] Derive Key Pair - Done
3,172,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,459 UART: [art] PUB.X = E1DB6F8758F4E03A4A04B353AEBDC3EBB15F91D4350E8B0B5E571AF3285E0782FBB4ADC95BF98788654131D52D9D3272
3,195,229 UART: [art] PUB.Y = 37760DFDB5ACD3D8F622EE589CBE717B50885E01D9A9850821C08F2D19F6637897431FA71D3A49E6C16A7884341ECB8E
3,202,174 UART: [art] SIG.R = CE398F0B9951259F7C9CE4E4074C80DA04F212315FF1ABC6599A5C7266CA9EE862A29E3152FA3F6C454BB01C6784817E
3,208,941 UART: [art] SIG.S = 13C9154045B53745B4278678CFC80159B0EEA646660A072DDA2473C89D9E43659F6382CBFBCFF31DC9327F1A67FD96F3
3,232,844 UART: Caliptra RT
3,233,187 UART: [state] CFI Enabled
3,352,418 UART: [rt] RT listening for mailbox commands...
3,353,088 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,330 UART: [rt]cmd =0x41544d4e, len=14344
3,786,200 >>> mbox cmd response data (8 bytes)
3,786,201 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,086 UART: [rt]cmd =0x41545348, len=116
3,837,449 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,320 ready_for_fw is high
1,060,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,435 >>> mbox cmd response: success
2,741,580 UART:
2,741,596 UART: Running Caliptra FMC ...
2,742,004 UART:
2,742,147 UART: [state] CFI Enabled
2,753,017 UART: [fht] FMC Alias Private Key: 7
2,872,147 UART: [art] Extend RT PCRs Done
2,872,575 UART: [art] Lock RT PCRs Done
2,874,047 UART: [art] Populate DV Done
2,882,326 UART: [fht] FMC Alias Private Key: 7
2,883,262 UART: [art] Derive CDI
2,883,542 UART: [art] Store in slot 0x4
2,969,387 UART: [art] Derive Key Pair
2,969,747 UART: [art] Store priv key in slot 0x5
2,983,103 UART: [art] Derive Key Pair - Done
2,997,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,644 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,409 UART: [art] PUB.X = DD0DD993C3CB28D0A17571439AD4F7040A2C846DEF8D3AE1CB50D41AE25B372215AA1F092D8BE1966637AA1A8F06DF09
3,021,175 UART: [art] PUB.Y = 297DE235FCE9C258E4D8AC3FE0F2394112FD10F20AE882DA02CE8A161DAC91A4C3218E505D9D3EBB93288736720AEA21
3,028,128 UART: [art] SIG.R = EA3E57D872EC898ABB6491ADE6798B8210F1A9A0D4904E4D3F0C54B581ACA14F61C5E9C5C3BADE06B8A11366492EC1C2
3,034,908 UART: [art] SIG.S = C82E99CB19559AD3D214400BD53BD330634E57AF36FDC171712E97D20528C899221F40BA6AC884EA1B9364CFE5C528B7
3,058,600 UART: Caliptra RT
3,058,943 UART: [state] CFI Enabled
3,179,235 UART: [rt] RT listening for mailbox commands...
3,179,905 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,763 UART: [rt]cmd =0x41544d4e, len=14344
3,612,551 >>> mbox cmd response data (8 bytes)
3,612,552 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,821 UART: [rt]cmd =0x41545348, len=116
3,663,934 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,147 UART:
192,487 UART: Running Caliptra ROM ...
193,676 UART:
193,836 UART: [state] CFI Enabled
263,284 UART: [state] LifecycleState = Unprovisioned
265,280 UART: [state] DebugLocked = No
267,104 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,421 UART: [kat] SHA2-256
441,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,654 UART: [kat] ++
452,103 UART: [kat] sha1
463,501 UART: [kat] SHA2-256
466,218 UART: [kat] SHA2-384
471,799 UART: [kat] SHA2-512-ACC
474,172 UART: [kat] ECC-384
2,766,781 UART: [kat] HMAC-384Kdf
2,800,001 UART: [kat] LMS
3,990,355 UART: [kat] --
3,995,313 UART: [cold-reset] ++
3,997,036 UART: [fht] Storing FHT @ 0x50003400
4,008,237 UART: [idev] ++
4,008,835 UART: [idev] CDI.KEYID = 6
4,009,731 UART: [idev] SUBJECT.KEYID = 7
4,010,989 UART: [idev] UDS.KEYID = 0
4,012,002 ready_for_fw is high
4,012,205 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,056,618 UART: [idev] Erasing UDS.KEYID = 0
7,337,588 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,861 UART: [idev] --
7,362,320 UART: [ldev] ++
7,362,890 UART: [ldev] CDI.KEYID = 6
7,363,909 UART: [ldev] SUBJECT.KEYID = 5
7,365,066 UART: [ldev] AUTHORITY.KEYID = 7
7,366,354 UART: [ldev] FE.KEYID = 1
7,414,622 UART: [ldev] Erasing FE.KEYID = 1
10,746,454 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,040,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,055,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,070,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,084,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,103,863 UART: [ldev] --
13,107,851 UART: [fwproc] Waiting for Commands...
13,110,762 UART: [fwproc] Received command 0x46574c44
13,113,247 UART: [fwproc] Received Image of size 34948 bytes
16,197,015 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,274,505 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,347,715 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,383,622 >>> mbox cmd response: success
16,388,041 UART: [afmc] ++
16,388,665 UART: [afmc] CDI.KEYID = 6
16,389,576 UART: [afmc] SUBJECT.KEYID = 7
16,390,858 UART: [afmc] AUTHORITY.KEYID = 5
19,765,792 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,065,116 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,067,402 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,081,809 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,096,502 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,110,931 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,132,920 UART: [afmc] --
22,136,870 UART: [cold-reset] --
22,142,913 UART: [state] Locking Datavault
22,148,972 UART: [state] Locking PCR0, PCR1 and PCR31
22,150,748 UART: [state] Locking ICCM
22,152,585 UART: [exit] Launching FMC @ 0x40000130
22,160,948 UART:
22,161,192 UART: Running Caliptra FMC ...
22,162,249 UART:
22,162,398 UART: [state] CFI Enabled
22,223,767 UART: [fht] FMC Alias Private Key: 7
24,563,955 UART: [art] Extend RT PCRs Done
24,565,221 UART: [art] Lock RT PCRs Done
24,566,551 UART: [art] Populate DV Done
24,572,068 UART: [fht] FMC Alias Private Key: 7
24,573,658 UART: [art] Derive CDI
24,574,428 UART: [art] Store in slot 0x4
24,632,247 UART: [art] Derive Key Pair
24,633,321 UART: [art] Store priv key in slot 0x5
27,926,018 UART: [art] Derive Key Pair - Done
27,938,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,227,455 UART: [art] Erasing AUTHORITY.KEYID = 7
30,229,038 UART: [art] PUB.X = B92849AAAFDED54860C346DE87E84EDA291D431B53424178373D75897DBBC7EB0B950A7F57D36165A4EA18AB0B9B7FF3
30,236,268 UART: [art] PUB.Y = B4D0A9118B90AF8AA7F696457A1E8D1B49C7992AD4AEE54877133200DCD42956E3CB543E0380125010CE4E634074AE24
30,243,500 UART: [art] SIG.R = 1B18862C0D1D42BBFCF9EA30E2C74964715C6BC3332EE069BF98558E0FACC4871648360B9B7DEB04B0709E505B5FF6E7
30,250,906 UART: [art] SIG.S = 4A36E58F7B15AA3D7CC72E96EB3B4BE46C4E86B3B373989E0016AC601179948F8C1845D73CBB1A312AD08920E0701951
31,555,689 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,804,832 ready_for_fw is high
3,805,226 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,285,436 >>> mbox cmd response: success
21,984,480 UART:
21,985,076 UART: Running Caliptra FMC ...
21,986,221 UART:
21,986,381 UART: [state] CFI Enabled
22,036,374 UART: [fht] FMC Alias Private Key: 7
24,377,140 UART: [art] Extend RT PCRs Done
24,378,437 UART: [art] Lock RT PCRs Done
24,379,853 UART: [art] Populate DV Done
24,385,318 UART: [fht] FMC Alias Private Key: 7
24,386,995 UART: [art] Derive CDI
24,387,853 UART: [art] Store in slot 0x4
24,446,255 UART: [art] Derive Key Pair
24,447,332 UART: [art] Store priv key in slot 0x5
27,740,118 UART: [art] Derive Key Pair - Done
27,753,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,042,354 UART: [art] Erasing AUTHORITY.KEYID = 7
30,043,943 UART: [art] PUB.X = 64C280A89869CA5812018F8A6A527957D41A2D4A67C93BA5AB2205E11C4DDED505C6D6DAADAF2AE77944BA4171CB5FFE
30,051,173 UART: [art] PUB.Y = F6B3C4D9A6BC3AA8A69EF8A06ED8165A341754CF68DC4CB30B2286272F55C3AA5C3B5804D6B544AC820A3A317113DE70
30,058,402 UART: [art] SIG.R = 3888D9182A2F43598281CAD4DAAAEECA51144B89526A585711A5ADCC975A73DD49466949C2CB1BDB402183617D40354F
30,065,804 UART: [art] SIG.S = 28D73AEEFE279691BF806DDCA7CF4569E18833FA212B32F59C4DE11E404692B4E95CC2A62430E9CF23F0671DE916B628
31,371,292 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,368 UART:
192,833 UART: Running Caliptra ROM ...
193,999 UART:
603,435 UART: [state] CFI Enabled
615,582 UART: [state] LifecycleState = Unprovisioned
617,499 UART: [state] DebugLocked = No
620,098 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,209 UART: [kat] SHA2-256
793,937 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,459 UART: [kat] ++
804,904 UART: [kat] sha1
815,703 UART: [kat] SHA2-256
818,351 UART: [kat] SHA2-384
825,471 UART: [kat] SHA2-512-ACC
827,832 UART: [kat] ECC-384
3,112,002 UART: [kat] HMAC-384Kdf
3,123,455 UART: [kat] LMS
4,313,560 UART: [kat] --
4,319,579 UART: [cold-reset] ++
4,322,009 UART: [fht] Storing FHT @ 0x50003400
4,333,415 UART: [idev] ++
4,333,978 UART: [idev] CDI.KEYID = 6
4,335,000 UART: [idev] SUBJECT.KEYID = 7
4,336,176 UART: [idev] UDS.KEYID = 0
4,337,214 ready_for_fw is high
4,337,421 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,381,705 UART: [idev] Erasing UDS.KEYID = 0
7,624,189 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,431 UART: [idev] --
7,648,541 UART: [ldev] ++
7,649,120 UART: [ldev] CDI.KEYID = 6
7,650,079 UART: [ldev] SUBJECT.KEYID = 5
7,651,293 UART: [ldev] AUTHORITY.KEYID = 7
7,652,568 UART: [ldev] FE.KEYID = 1
7,664,801 UART: [ldev] Erasing FE.KEYID = 1
10,953,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,856 UART: [ldev] --
13,315,035 UART: [fwproc] Waiting for Commands...
13,318,259 UART: [fwproc] Received command 0x46574c44
13,320,488 UART: [fwproc] Received Image of size 34948 bytes
16,417,196 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,492,051 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,565,252 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,600,823 >>> mbox cmd response: success
16,604,682 UART: [afmc] ++
16,605,513 UART: [afmc] CDI.KEYID = 6
16,606,482 UART: [afmc] SUBJECT.KEYID = 7
16,607,644 UART: [afmc] AUTHORITY.KEYID = 5
19,918,548 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,211,816 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,214,110 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,228,495 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,243,231 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,257,638 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,280,138 UART: [afmc] --
22,284,053 UART: [cold-reset] --
22,287,695 UART: [state] Locking Datavault
22,293,568 UART: [state] Locking PCR0, PCR1 and PCR31
22,295,334 UART: [state] Locking ICCM
22,297,250 UART: [exit] Launching FMC @ 0x40000130
22,305,679 UART:
22,305,921 UART: Running Caliptra FMC ...
22,307,073 UART:
22,307,232 UART: [state] CFI Enabled
22,315,242 UART: [fht] FMC Alias Private Key: 7
24,655,482 UART: [art] Extend RT PCRs Done
24,656,744 UART: [art] Lock RT PCRs Done
24,658,228 UART: [art] Populate DV Done
24,663,874 UART: [fht] FMC Alias Private Key: 7
24,665,458 UART: [art] Derive CDI
24,666,304 UART: [art] Store in slot 0x4
24,708,919 UART: [art] Derive Key Pair
24,709,997 UART: [art] Store priv key in slot 0x5
27,951,676 UART: [art] Derive Key Pair - Done
27,964,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,244,886 UART: [art] Erasing AUTHORITY.KEYID = 7
30,246,455 UART: [art] PUB.X = 669F404BA9CB0A742BBD8CAD608C439A23268C1E89494AA18B4C7FB79AE5F1377066D891BB99B1948B332A413C995D41
30,253,667 UART: [art] PUB.Y = D370DEC00636FFE5B564883C2040D134D56787B4E50580D6E6F264495C458A738D91A7579AF89EE73C08748862A61016
30,260,902 UART: [art] SIG.R = D4E2145E9B6E5415AEABA68BCD94A2D50DE91BB0A180513477E48D0ECA915236E0983EF4345288464320DBB2719067E5
30,268,296 UART: [art] SIG.S = 0E72AEFE9607867F591870029B6700543CCA36F754E04ADBDBF37A0A61948FC871620F0EA17B93F0DAC0526C225F3F7E
31,572,953 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,128,775 ready_for_fw is high
4,129,287 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,454,967 >>> mbox cmd response: success
22,096,329 UART:
22,096,760 UART: Running Caliptra FMC ...
22,097,874 UART:
22,098,041 UART: [state] CFI Enabled
22,106,090 UART: [fht] FMC Alias Private Key: 7
24,446,014 UART: [art] Extend RT PCRs Done
24,447,298 UART: [art] Lock RT PCRs Done
24,448,944 UART: [art] Populate DV Done
24,454,366 UART: [fht] FMC Alias Private Key: 7
24,456,004 UART: [art] Derive CDI
24,456,877 UART: [art] Store in slot 0x4
24,499,121 UART: [art] Derive Key Pair
24,500,166 UART: [art] Store priv key in slot 0x5
27,742,013 UART: [art] Derive Key Pair - Done
27,754,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,034,750 UART: [art] Erasing AUTHORITY.KEYID = 7
30,036,346 UART: [art] PUB.X = B0CF15DB6B21625D8BB56848153A95993F67780C3A525ECB38D835D082B1D4D9CDA0D7F293D42ABBBBC6FD9BFE8BAE25
30,043,566 UART: [art] PUB.Y = D1E8AC1778F121AD5916BCFA58F464ED6540AE5FE0F17CC2BC65E816C1C79EE897D0684C7BA95056A4E638D4E28FC8FB
30,050,887 UART: [art] SIG.R = 85E2F658001103193C244920FF1F735547777D310BE4BF73CF29EE68E2B0108AF4DC088D91855648AE560F09B46655BF
30,058,217 UART: [art] SIG.S = 951D9BD10D0A31503A14FA5C25E3DDE7305420D320858F8C0D2508D85973CCDA9BA9A72D498FAF958DBD0C53A6F435E4
31,362,894 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
191,964 UART:
192,345 UART: Running Caliptra ROM ...
193,542 UART:
193,694 UART: [state] CFI Enabled
263,204 UART: [state] LifecycleState = Unprovisioned
265,120 UART: [state] DebugLocked = No
266,366 UART: [state] WD Timer not started. Device not locked for debugging
270,399 UART: [kat] SHA2-256
450,011 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,824 UART: [kat] ++
461,355 UART: [kat] sha1
472,018 UART: [kat] SHA2-256
474,741 UART: [kat] SHA2-384
481,079 UART: [kat] SHA2-512-ACC
483,453 UART: [kat] ECC-384
2,929,623 UART: [kat] HMAC-384Kdf
2,950,384 UART: [kat] LMS
3,426,902 UART: [kat] --
3,431,984 UART: [cold-reset] ++
3,433,416 UART: [fht] FHT @ 0x50003400
3,444,888 UART: [idev] ++
3,445,455 UART: [idev] CDI.KEYID = 6
3,446,454 UART: [idev] SUBJECT.KEYID = 7
3,447,701 UART: [idev] UDS.KEYID = 0
3,448,601 ready_for_fw is high
3,448,796 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,493,170 UART: [idev] Erasing UDS.KEYID = 0
5,967,093 UART: [idev] Sha1 KeyId Algorithm
5,991,237 UART: [idev] --
5,996,308 UART: [ldev] ++
5,996,881 UART: [ldev] CDI.KEYID = 6
5,997,845 UART: [ldev] SUBJECT.KEYID = 5
5,998,999 UART: [ldev] AUTHORITY.KEYID = 7
6,000,299 UART: [ldev] FE.KEYID = 1
6,036,943 UART: [ldev] Erasing FE.KEYID = 1
8,544,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,786 UART: [ldev] --
10,353,790 UART: [fwproc] Wait for Commands...
10,356,906 UART: [fwproc] Recv command 0x46574c44
10,358,940 UART: [fwproc] Recv'd Img size: 34948 bytes
12,816,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,902,389 UART: [fwproc] Load FMC at address 0x40000000 len 20044
12,975,399 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,011,349 >>> mbox cmd response: success
13,015,466 UART: [afmc] ++
13,016,125 UART: [afmc] CDI.KEYID = 6
13,017,119 UART: [afmc] SUBJECT.KEYID = 7
13,018,290 UART: [afmc] AUTHORITY.KEYID = 5
15,550,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,278,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,281,117 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,296,916 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,312,943 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,328,559 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,353,624 UART: [afmc] --
17,357,681 UART: [cold-reset] --
17,361,284 UART: [state] Locking Datavault
17,365,393 UART: [state] Locking PCR0, PCR1 and PCR31
17,367,171 UART: [state] Locking ICCM
17,368,327 UART: [exit] Launching FMC @ 0x40000130
17,376,797 UART:
17,377,104 UART: Running Caliptra FMC ...
17,378,261 UART:
17,378,422 UART: [state] CFI Enabled
17,433,356 UART: [fht] FMC Alias Private Key: 7
19,199,559 UART: [art] Extend RT PCRs Done
19,200,817 UART: [art] Lock RT PCRs Done
19,202,627 UART: [art] Populate DV Done
19,208,205 UART: [fht] FMC Alias Private Key: 7
19,209,805 UART: [art] Derive CDI
19,210,583 UART: [art] Store in slot 0x4
19,266,171 UART: [art] Derive Key Pair
19,267,250 UART: [art] Store priv key in slot 0x5
21,730,140 UART: [art] Derive Key Pair - Done
21,743,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,455,913 UART: [art] Erasing AUTHORITY.KEYID = 7
23,457,475 UART: [art] PUB.X = 6604FDA635934C1FA2E0D1ADD66F5DF365C3D1CE56388819118A41267BB16F518E3A68C4F2331F4C47DD50A876879AD8
23,464,710 UART: [art] PUB.Y = 397375A3AE9709190254C693763D08A00C6AE2CF766F4E3A89EB4B8A18DA44E27FD1901C44B2FD7779110B5E12A7E555
23,471,938 UART: [art] SIG.R = D637D5DE07742CA154CD442478C19D23C25175EC3D90EEB790B6F33DB93E6D23A56C8A8B27FB24C02D0D301ABF262D06
23,479,341 UART: [art] SIG.S = AB744B199A89024D4387EF62330D42098D2F6BCAE91E9C1CC3320DDA8F7CE4D870018B36E1B982B5EC0D826F54A9736E
24,457,982 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,460,627 ready_for_fw is high
3,461,199 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
12,880,083 >>> mbox cmd response: success
17,168,038 UART:
17,168,428 UART: Running Caliptra FMC ...
17,169,628 UART:
17,169,791 UART: [state] CFI Enabled
17,237,490 UART: [fht] FMC Alias Private Key: 7
19,004,379 UART: [art] Extend RT PCRs Done
19,005,652 UART: [art] Lock RT PCRs Done
19,007,026 UART: [art] Populate DV Done
19,012,218 UART: [fht] FMC Alias Private Key: 7
19,013,748 UART: [art] Derive CDI
19,014,554 UART: [art] Store in slot 0x4
19,070,777 UART: [art] Derive Key Pair
19,071,868 UART: [art] Store priv key in slot 0x5
21,534,707 UART: [art] Derive Key Pair - Done
21,547,646 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,260,508 UART: [art] Erasing AUTHORITY.KEYID = 7
23,262,061 UART: [art] PUB.X = 10BCCA56C27AEF9D8EBE0A6350C5FF0C3991BCEA6B7883E848691F6129E273F4131F48AE07913DA8E4500B0BF80A671C
23,269,281 UART: [art] PUB.Y = F440078700797CAEA5D9D4FE44F956758CCCD7DD0AD712034A39B75D0101A0D32AD244B156075C823A1B05ABD009D2BB
23,276,499 UART: [art] SIG.R = F604913F320AB00509A60B13FEC0E19042B076F2643C894A0166532BE76597454D881FBBF92FBF9167CBE5FDAC198233
23,283,896 UART: [art] SIG.S = 3AA8973583515429E404A3EBB0A3E672562587CDDB8239B5B2DA6C0101A20256F5826F6B527D00F4DDB469892C2010AB
24,262,041 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,643 UART:
192,996 UART: Running Caliptra ROM ...
194,091 UART:
603,854 UART: [state] CFI Enabled
618,998 UART: [state] LifecycleState = Unprovisioned
620,868 UART: [state] DebugLocked = No
622,957 UART: [state] WD Timer not started. Device not locked for debugging
626,513 UART: [kat] SHA2-256
806,193 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,933 UART: [kat] ++
817,381 UART: [kat] sha1
828,991 UART: [kat] SHA2-256
831,679 UART: [kat] SHA2-384
838,427 UART: [kat] SHA2-512-ACC
840,804 UART: [kat] ECC-384
3,283,161 UART: [kat] HMAC-384Kdf
3,295,395 UART: [kat] LMS
3,771,918 UART: [kat] --
3,777,120 UART: [cold-reset] ++
3,778,694 UART: [fht] FHT @ 0x50003400
3,789,747 UART: [idev] ++
3,790,319 UART: [idev] CDI.KEYID = 6
3,791,501 UART: [idev] SUBJECT.KEYID = 7
3,792,658 UART: [idev] UDS.KEYID = 0
3,793,599 ready_for_fw is high
3,793,799 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,837,872 UART: [idev] Erasing UDS.KEYID = 0
6,271,895 UART: [idev] Sha1 KeyId Algorithm
6,296,249 UART: [idev] --
6,300,996 UART: [ldev] ++
6,301,575 UART: [ldev] CDI.KEYID = 6
6,302,489 UART: [ldev] SUBJECT.KEYID = 5
6,303,704 UART: [ldev] AUTHORITY.KEYID = 7
6,304,937 UART: [ldev] FE.KEYID = 1
6,316,071 UART: [ldev] Erasing FE.KEYID = 1
8,794,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,428 UART: [ldev] --
10,591,234 UART: [fwproc] Wait for Commands...
10,593,100 UART: [fwproc] Recv command 0x46574c44
10,595,101 UART: [fwproc] Recv'd Img size: 34948 bytes
13,043,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,120,137 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,193,183 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,229,466 >>> mbox cmd response: success
13,233,977 UART: [afmc] ++
13,234,636 UART: [afmc] CDI.KEYID = 6
13,235,577 UART: [afmc] SUBJECT.KEYID = 7
13,236,752 UART: [afmc] AUTHORITY.KEYID = 5
15,744,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,468,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,471,088 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,486,917 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,502,951 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,518,534 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,542,138 UART: [afmc] --
17,545,791 UART: [cold-reset] --
17,550,091 UART: [state] Locking Datavault
17,557,116 UART: [state] Locking PCR0, PCR1 and PCR31
17,558,913 UART: [state] Locking ICCM
17,561,125 UART: [exit] Launching FMC @ 0x40000130
17,569,570 UART:
17,569,815 UART: Running Caliptra FMC ...
17,570,953 UART:
17,571,118 UART: [state] CFI Enabled
17,578,990 UART: [fht] FMC Alias Private Key: 7
19,345,275 UART: [art] Extend RT PCRs Done
19,346,521 UART: [art] Lock RT PCRs Done
19,348,308 UART: [art] Populate DV Done
19,353,894 UART: [fht] FMC Alias Private Key: 7
19,355,413 UART: [art] Derive CDI
19,356,414 UART: [art] Store in slot 0x4
19,398,767 UART: [art] Derive Key Pair
19,399,844 UART: [art] Store priv key in slot 0x5
21,826,139 UART: [art] Derive Key Pair - Done
21,838,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,545,358 UART: [art] Erasing AUTHORITY.KEYID = 7
23,546,908 UART: [art] PUB.X = 59E995E61D98D4DBEE20855B47E37F254A589FFDB47B96D2B22CC7CFCD10A221D96669876800DBE3002104161B777E59
23,554,133 UART: [art] PUB.Y = 48F4C5C521A7683689220B8F816F091A09CEB403576F4980245796E066D89845B16C37696F0BC0BAC3159C4484338443
23,561,374 UART: [art] SIG.R = B59BD8C8CA1F46D6FF1C4776F109D4CCFBAC0792143D77D9464B31A9EEF2209BE759C7B81927BCC64DBFCE4FDE262614
23,568,778 UART: [art] SIG.S = E79D4829FFF56CACDA0DA8BB28549B0EF7A6898323DFE5A1F95BC09BB616FDCFCB0D32AD584D0E21EC922A8413E27E1F
24,546,990 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,781,225 ready_for_fw is high
3,781,762 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,101,861 >>> mbox cmd response: success
17,348,567 UART:
17,348,970 UART: Running Caliptra FMC ...
17,350,080 UART:
17,350,250 UART: [state] CFI Enabled
17,357,828 UART: [fht] FMC Alias Private Key: 7
19,123,915 UART: [art] Extend RT PCRs Done
19,125,221 UART: [art] Lock RT PCRs Done
19,126,913 UART: [art] Populate DV Done
19,132,309 UART: [fht] FMC Alias Private Key: 7
19,133,845 UART: [art] Derive CDI
19,134,712 UART: [art] Store in slot 0x4
19,177,377 UART: [art] Derive Key Pair
19,178,432 UART: [art] Store priv key in slot 0x5
21,605,090 UART: [art] Derive Key Pair - Done
21,617,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,324,152 UART: [art] Erasing AUTHORITY.KEYID = 7
23,325,719 UART: [art] PUB.X = 4285424F7FFFB75312909EAC8604ACF2A7CAAE76426D0FD470B932041A56C4A1E56CF5319807596CC30AAA42DE849D9E
23,332,945 UART: [art] PUB.Y = E55097786C6E17E80F24954C8526C9927948F4231EADAC5231936B1459FFCF68E7C1DAB02435F09F8C039829ADFEBFBF
23,340,170 UART: [art] SIG.R = 65799AD50BC969C2901310E01F68423E241834A072936F51AD6FE45C63D30637E21AC55F93F7FA4954FC92E2A66301E7
23,347,572 UART: [art] SIG.S = 00D66296BA686AA4DD34BD06DFCEB4540E1D49CAE9FC980CD152FDE67A1DA78AE4C49DD327D72D87719D86AECA04E47C
24,326,409 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,243 UART:
192,607 UART: Running Caliptra ROM ...
193,792 UART:
193,965 UART: [state] CFI Enabled
260,434 UART: [state] LifecycleState = Unprovisioned
262,839 UART: [state] DebugLocked = No
264,088 UART: [state] WD Timer not started. Device not locked for debugging
268,337 UART: [kat] SHA2-256
458,199 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,946 UART: [kat] ++
469,393 UART: [kat] sha1
481,224 UART: [kat] SHA2-256
484,204 UART: [kat] SHA2-384
489,491 UART: [kat] SHA2-512-ACC
492,136 UART: [kat] ECC-384
2,947,585 UART: [kat] HMAC-384Kdf
2,971,142 UART: [kat] LMS
3,502,949 UART: [kat] --
3,505,382 UART: [cold-reset] ++
3,507,113 UART: [fht] FHT @ 0x50003400
3,518,945 UART: [idev] ++
3,519,645 UART: [idev] CDI.KEYID = 6
3,520,535 UART: [idev] SUBJECT.KEYID = 7
3,521,778 UART: [idev] UDS.KEYID = 0
3,522,702 ready_for_fw is high
3,522,891 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,567,035 UART: [idev] Erasing UDS.KEYID = 0
6,028,664 UART: [idev] Sha1 KeyId Algorithm
6,049,682 UART: [idev] --
6,054,108 UART: [ldev] ++
6,054,783 UART: [ldev] CDI.KEYID = 6
6,055,716 UART: [ldev] SUBJECT.KEYID = 5
6,056,869 UART: [ldev] AUTHORITY.KEYID = 7
6,058,102 UART: [ldev] FE.KEYID = 1
6,098,051 UART: [ldev] Erasing FE.KEYID = 1
8,604,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,129 UART: [ldev] --
10,414,430 UART: [fwproc] Wait for Commands...
10,415,983 UART: [fwproc] Recv command 0x46574c44
10,418,290 UART: [fwproc] Recv'd Img size: 34948 bytes
12,881,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,960,738 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,084,350 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,142,657 >>> mbox cmd response: success
13,147,301 UART: [afmc] ++
13,147,938 UART: [afmc] CDI.KEYID = 6
13,149,051 UART: [afmc] SUBJECT.KEYID = 7
13,150,571 UART: [afmc] AUTHORITY.KEYID = 5
15,697,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,441,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,443,255 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,458,313 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,473,464 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,488,361 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,512,847 UART: [afmc] --
17,516,762 UART: [cold-reset] --
17,522,417 UART: [state] Locking Datavault
17,526,883 UART: [state] Locking PCR0, PCR1 and PCR31
17,529,078 UART: [state] Locking ICCM
17,530,826 UART: [exit] Launching FMC @ 0x40000130
17,539,463 UART:
17,539,702 UART: Running Caliptra FMC ...
17,540,832 UART:
17,541,011 UART: [state] CFI Enabled
17,599,251 UART: [fht] FMC Alias Private Key: 7
19,365,314 UART: [art] Extend RT PCRs Done
19,366,999 UART: [art] Lock RT PCRs Done
19,368,167 UART: [art] Populate DV Done
19,373,874 UART: [fht] FMC Alias Private Key: 7
19,375,601 UART: [art] Derive CDI
19,376,367 UART: [art] Store in slot 0x4
19,431,951 UART: [art] Derive Key Pair
19,433,034 UART: [art] Store priv key in slot 0x5
21,896,184 UART: [art] Derive Key Pair - Done
21,909,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,621,986 UART: [art] Erasing AUTHORITY.KEYID = 7
23,623,542 UART: [art] PUB.X = ABE0FE64028989743940FD9FD0C73A41C7A29A2293099BEE0B7EC7CF3E37FC3916F8276E6EFA808B7DDC64E8096145BB
23,630,763 UART: [art] PUB.Y = C4ADC398E68103BF4D7ED7A2530A7372E8FC7617CFEE9062394C4A2FEDD8804A867CA59F80CE554574AA29E10B11B950
23,637,986 UART: [art] SIG.R = 592DB178426FAEF3A790C819396041BFE51376F54DCF8F8CE3668A111535AB846E82EB6F9E13C1286515ACA154667F51
23,645,407 UART: [art] SIG.S = 4A4CC34404C974F6A324CF1BEE393B33295E3DB7D0912F2DB485E18443CEFFD16EEF61EB573431428CA7BB678A56089B
24,623,854 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
3,440,260 ready_for_fw is high
3,440,717 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,023,652 >>> mbox cmd response: success
17,320,586 UART:
17,320,975 UART: Running Caliptra FMC ...
17,322,080 UART:
17,322,234 UART: [state] CFI Enabled
17,387,377 UART: [fht] FMC Alias Private Key: 7
19,153,639 UART: [art] Extend RT PCRs Done
19,154,925 UART: [art] Lock RT PCRs Done
19,156,686 UART: [art] Populate DV Done
19,162,095 UART: [fht] FMC Alias Private Key: 7
19,163,638 UART: [art] Derive CDI
19,164,440 UART: [art] Store in slot 0x4
19,220,345 UART: [art] Derive Key Pair
19,221,391 UART: [art] Store priv key in slot 0x5
21,684,480 UART: [art] Derive Key Pair - Done
21,697,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,410,285 UART: [art] Erasing AUTHORITY.KEYID = 7
23,411,869 UART: [art] PUB.X = 7E48C2F46F9898ADE026F75B36684BC867B42030822A96A20767EFD742E94E0DFCE51EB55D6EA2DF9895FAC695BC0C9D
23,419,102 UART: [art] PUB.Y = 7AC00067C3FBC63444A3B4341B64BC87DB49F26405FFB337027CD86418EEDD8378C29CBE8A9EA3305778CDE276632B4E
23,426,330 UART: [art] SIG.R = 35C2152C28042CFF1CB5A75A7C6CA90AB109AAB84989B456F5813350C8E74AD600CE623BDA42B5EF947C98891496F5F3
23,433,729 UART: [art] SIG.S = AB3D2EA676D609757D569679C7399829B6C7537B51907208866AF3F9E36E433D2CD9C2773F135D08211B9467EA24B132
24,412,471 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,538 UART:
192,906 UART: Running Caliptra ROM ...
194,098 UART:
603,599 UART: [state] CFI Enabled
619,960 UART: [state] LifecycleState = Unprovisioned
622,354 UART: [state] DebugLocked = No
624,756 UART: [state] WD Timer not started. Device not locked for debugging
629,095 UART: [kat] SHA2-256
818,957 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,772 UART: [kat] ++
830,375 UART: [kat] sha1
842,610 UART: [kat] SHA2-256
845,622 UART: [kat] SHA2-384
853,103 UART: [kat] SHA2-512-ACC
855,625 UART: [kat] ECC-384
3,299,956 UART: [kat] HMAC-384Kdf
3,311,693 UART: [kat] LMS
3,843,549 UART: [kat] --
3,848,915 UART: [cold-reset] ++
3,850,639 UART: [fht] FHT @ 0x50003400
3,862,195 UART: [idev] ++
3,862,836 UART: [idev] CDI.KEYID = 6
3,863,843 UART: [idev] SUBJECT.KEYID = 7
3,865,027 UART: [idev] UDS.KEYID = 0
3,865,961 ready_for_fw is high
3,866,159 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,910,189 UART: [idev] Erasing UDS.KEYID = 0
6,339,244 UART: [idev] Sha1 KeyId Algorithm
6,360,741 UART: [idev] --
6,365,163 UART: [ldev] ++
6,365,847 UART: [ldev] CDI.KEYID = 6
6,366,763 UART: [ldev] SUBJECT.KEYID = 5
6,367,975 UART: [ldev] AUTHORITY.KEYID = 7
6,369,152 UART: [ldev] FE.KEYID = 1
6,378,104 UART: [ldev] Erasing FE.KEYID = 1
8,851,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,384 UART: [ldev] --
10,641,736 UART: [fwproc] Wait for Commands...
10,644,465 UART: [fwproc] Recv command 0x46574c44
10,646,793 UART: [fwproc] Recv'd Img size: 34948 bytes
13,104,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,180,411 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,304,033 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,363,090 >>> mbox cmd response: success
13,367,588 UART: [afmc] ++
13,368,288 UART: [afmc] CDI.KEYID = 6
13,369,498 UART: [afmc] SUBJECT.KEYID = 7
13,370,919 UART: [afmc] AUTHORITY.KEYID = 5
15,872,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,595,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,597,763 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,612,899 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,628,027 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,642,924 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,667,480 UART: [afmc] --
17,671,351 UART: [cold-reset] --
17,674,107 UART: [state] Locking Datavault
17,680,672 UART: [state] Locking PCR0, PCR1 and PCR31
17,682,914 UART: [state] Locking ICCM
17,684,490 UART: [exit] Launching FMC @ 0x40000130
17,693,142 UART:
17,693,398 UART: Running Caliptra FMC ...
17,694,542 UART:
17,694,712 UART: [state] CFI Enabled
17,702,452 UART: [fht] FMC Alias Private Key: 7
19,468,147 UART: [art] Extend RT PCRs Done
19,469,418 UART: [art] Lock RT PCRs Done
19,470,906 UART: [art] Populate DV Done
19,476,013 UART: [fht] FMC Alias Private Key: 7
19,477,620 UART: [art] Derive CDI
19,478,471 UART: [art] Store in slot 0x4
19,520,931 UART: [art] Derive Key Pair
19,522,009 UART: [art] Store priv key in slot 0x5
21,949,088 UART: [art] Derive Key Pair - Done
21,962,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,668,762 UART: [art] Erasing AUTHORITY.KEYID = 7
23,670,327 UART: [art] PUB.X = 8789ADF979A7DB4EBE4B23015952D488D5B1BF80E26A5E752B53BB70DF920C60BCB4A11349F86951DB6E1E57BAFB8524
23,677,556 UART: [art] PUB.Y = B3B8879399D5E7A1A203735477EF94AD794D97CE434C807D4C3E911BC55FA3A38B2E91BE1F3C0CE615A07F8CEFADEF10
23,684,880 UART: [art] SIG.R = 22F2DAAA6A03A942E87962F98B847FF8237F60987BFC5C2276D2CC7C5BED202489B569CBB570B7393251BFFE08632CE9
23,692,216 UART: [art] SIG.S = C57E8C5945523F42EF7AB85BA6894A8342D8DCF7D117836E0D1867D436D771189C7FAA0A49F3E42DF077F829D9D013CC
24,670,037 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,754,936 ready_for_fw is high
3,755,379 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,251,129 >>> mbox cmd response: success
17,505,804 UART:
17,506,205 UART: Running Caliptra FMC ...
17,507,358 UART:
17,507,528 UART: [state] CFI Enabled
17,515,104 UART: [fht] FMC Alias Private Key: 7
19,281,588 UART: [art] Extend RT PCRs Done
19,282,873 UART: [art] Lock RT PCRs Done
19,284,635 UART: [art] Populate DV Done
19,290,028 UART: [fht] FMC Alias Private Key: 7
19,291,715 UART: [art] Derive CDI
19,292,498 UART: [art] Store in slot 0x4
19,335,264 UART: [art] Derive Key Pair
19,336,355 UART: [art] Store priv key in slot 0x5
21,763,218 UART: [art] Derive Key Pair - Done
21,776,512 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,482,997 UART: [art] Erasing AUTHORITY.KEYID = 7
23,484,587 UART: [art] PUB.X = 1C054331142E75E5C96A910FBD1ACE39A5A3FB99D251014863B9D660BAC4C3068E845051ECB58CE77DC178F35192B215
23,491,842 UART: [art] PUB.Y = 92084629CC6CB7B475A5F7BE2BA401BE9EEB3706938B6E900CFAECBF9D4CBD6C5A793850F3EEF2F76D11063DFACE13CD
23,499,086 UART: [art] SIG.R = B3A3FE43198CF89A14627D385C6F6B3548E8F0051036662B80DB49FB909ED9AD36EDFC069E4C0EF1696BDA0E84BB755A
23,506,520 UART: [art] SIG.S = CE61CBF51294DC7D5B1B7D656752EB12C17EFC83FA4444CA924329700610160737C312A0D03A37C2C7C6F602E44BD7BC
24,485,185 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,091 UART: [kat] SHA2-256
882,022 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,137 UART: [kat] ++
886,289 UART: [kat] sha1
890,567 UART: [kat] SHA2-256
892,505 UART: [kat] SHA2-384
895,312 UART: [kat] SHA2-512-ACC
897,213 UART: [kat] ECC-384
902,786 UART: [kat] HMAC-384Kdf
907,422 UART: [kat] LMS
1,475,618 UART: [kat] --
1,476,443 UART: [cold-reset] ++
1,476,927 UART: [fht] Storing FHT @ 0x50003400
1,479,850 UART: [idev] ++
1,480,018 UART: [idev] CDI.KEYID = 6
1,480,378 UART: [idev] SUBJECT.KEYID = 7
1,480,802 UART: [idev] UDS.KEYID = 0
1,481,147 ready_for_fw is high
1,481,147 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,488,842 UART: [idev] Erasing UDS.KEYID = 0
1,504,970 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,458 UART: [idev] --
1,514,589 UART: [ldev] ++
1,514,757 UART: [ldev] CDI.KEYID = 6
1,515,120 UART: [ldev] SUBJECT.KEYID = 5
1,515,546 UART: [ldev] AUTHORITY.KEYID = 7
1,516,009 UART: [ldev] FE.KEYID = 1
1,521,001 UART: [ldev] Erasing FE.KEYID = 1
1,545,806 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,996 UART: [ldev] --
1,585,359 UART: [fwproc] Waiting for Commands...
1,586,032 UART: [fwproc] Received command 0x46574c44
1,586,823 UART: [fwproc] Received Image of size 34948 bytes
1,974,345 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,002,139 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,033,357 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,048,370 >>> mbox cmd response: success
2,049,456 UART: [afmc] ++
2,049,624 UART: [afmc] CDI.KEYID = 6
2,049,986 UART: [afmc] SUBJECT.KEYID = 7
2,050,411 UART: [afmc] AUTHORITY.KEYID = 5
2,085,432 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,101,326 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,102,106 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,107,815 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,113,698 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,119,381 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,127,163 UART: [afmc] --
2,128,167 UART: [cold-reset] --
2,128,817 UART: [state] Locking Datavault
2,129,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,130,542 UART: [state] Locking ICCM
2,131,014 UART: [exit] Launching FMC @ 0x40000130
2,136,344 UART:
2,136,360 UART: Running Caliptra FMC ...
2,136,768 UART:
2,136,822 UART: [state] CFI Enabled
2,147,296 UART: [fht] FMC Alias Private Key: 7
2,266,330 UART: [art] Extend RT PCRs Done
2,266,758 UART: [art] Lock RT PCRs Done
2,268,318 UART: [art] Populate DV Done
2,276,639 UART: [fht] FMC Alias Private Key: 7
2,277,599 UART: [art] Derive CDI
2,277,879 UART: [art] Store in slot 0x4
2,363,649 UART: [art] Derive Key Pair
2,364,009 UART: [art] Store priv key in slot 0x5
2,377,092 UART: [art] Derive Key Pair - Done
2,392,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,408,007 UART: [art] Erasing AUTHORITY.KEYID = 7
2,408,772 UART: [art] PUB.X = 0A2D40B7E6B5B3D717B52B832D776E9696530F6AC80EAD946284484CB4BF2856D6C24D2393FF4CFEB8D6CCF2C9258876
2,415,541 UART: [art] PUB.Y = 9289125EC4EB81857E95A6DDAA967F0AABCCF464831763A9A8EAA07F5585334F0BC90F6A2BF8F36121C967DF3B0EB4DA
2,422,495 UART: [art] SIG.R = 4757203353297378B7998E540B60B60672A9BB474185AA0F53C3E93820F408D702DAC226085A26DCE7AB2323CF74136C
2,429,237 UART: [art] SIG.S = F86A7109BDBBF6CAD00408C248D8DF91DF38991643E874735CB37D33FA755C1149CD16858D6EB8B72C8900B66A081B7C
2,452,746 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,839 ready_for_fw is high
1,362,839 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,899,664 >>> mbox cmd response: success
1,960,547 UART:
1,960,563 UART: Running Caliptra FMC ...
1,960,971 UART:
1,961,025 UART: [state] CFI Enabled
1,971,213 UART: [fht] FMC Alias Private Key: 7
2,089,915 UART: [art] Extend RT PCRs Done
2,090,343 UART: [art] Lock RT PCRs Done
2,092,173 UART: [art] Populate DV Done
2,100,440 UART: [fht] FMC Alias Private Key: 7
2,101,446 UART: [art] Derive CDI
2,101,726 UART: [art] Store in slot 0x4
2,187,022 UART: [art] Derive Key Pair
2,187,382 UART: [art] Store priv key in slot 0x5
2,200,165 UART: [art] Derive Key Pair - Done
2,214,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,230,302 UART: [art] Erasing AUTHORITY.KEYID = 7
2,231,067 UART: [art] PUB.X = 2C2036F0927FA580596FDAE33439EB80806A496E8AD153778528AF6FDACEE5C28F5BA968B198DD4A9936F33D425B4EB7
2,237,845 UART: [art] PUB.Y = 1D1239327AFC36D74F1DA59A8688353D8DAFAE25CD0B667B9E94543F79B46564337DCFEED175709516BD15AE0D222FD1
2,244,797 UART: [art] SIG.R = 6135D29F469019DB5091DB3DA72B7C693A7D59062C1DE2712C3EDA61F4736C3794D6BEB181F48B2BD3E3B0CBCA3DE6B6
2,251,578 UART: [art] SIG.S = 5521C330613537187790AD9715F9D32C1A45A8293D8DA7946309669826FED1E48C1DB33B3FEB2E258CB2745BCE79F935
2,275,324 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,084 UART: [kat] SHA2-256
882,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,130 UART: [kat] ++
886,282 UART: [kat] sha1
890,562 UART: [kat] SHA2-256
892,500 UART: [kat] SHA2-384
895,217 UART: [kat] SHA2-512-ACC
897,118 UART: [kat] ECC-384
902,963 UART: [kat] HMAC-384Kdf
907,529 UART: [kat] LMS
1,475,725 UART: [kat] --
1,476,524 UART: [cold-reset] ++
1,476,890 UART: [fht] Storing FHT @ 0x50003400
1,479,763 UART: [idev] ++
1,479,931 UART: [idev] CDI.KEYID = 6
1,480,291 UART: [idev] SUBJECT.KEYID = 7
1,480,715 UART: [idev] UDS.KEYID = 0
1,481,060 ready_for_fw is high
1,481,060 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,488,503 UART: [idev] Erasing UDS.KEYID = 0
1,504,987 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,761 UART: [idev] --
1,514,916 UART: [ldev] ++
1,515,084 UART: [ldev] CDI.KEYID = 6
1,515,447 UART: [ldev] SUBJECT.KEYID = 5
1,515,873 UART: [ldev] AUTHORITY.KEYID = 7
1,516,336 UART: [ldev] FE.KEYID = 1
1,521,646 UART: [ldev] Erasing FE.KEYID = 1
1,547,025 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,329 UART: [ldev] --
1,586,728 UART: [fwproc] Waiting for Commands...
1,587,497 UART: [fwproc] Received command 0x46574c44
1,588,288 UART: [fwproc] Received Image of size 34948 bytes
1,976,534 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,004,362 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,035,580 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,050,437 >>> mbox cmd response: success
2,051,495 UART: [afmc] ++
2,051,663 UART: [afmc] CDI.KEYID = 6
2,052,025 UART: [afmc] SUBJECT.KEYID = 7
2,052,450 UART: [afmc] AUTHORITY.KEYID = 5
2,087,147 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,103,563 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,104,343 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,110,052 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,115,935 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,121,618 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,129,514 UART: [afmc] --
2,130,642 UART: [cold-reset] --
2,131,590 UART: [state] Locking Datavault
2,132,641 UART: [state] Locking PCR0, PCR1 and PCR31
2,133,245 UART: [state] Locking ICCM
2,133,683 UART: [exit] Launching FMC @ 0x40000130
2,139,013 UART:
2,139,029 UART: Running Caliptra FMC ...
2,139,437 UART:
2,139,580 UART: [state] CFI Enabled
2,150,260 UART: [fht] FMC Alias Private Key: 7
2,269,402 UART: [art] Extend RT PCRs Done
2,269,830 UART: [art] Lock RT PCRs Done
2,271,128 UART: [art] Populate DV Done
2,279,419 UART: [fht] FMC Alias Private Key: 7
2,280,501 UART: [art] Derive CDI
2,280,781 UART: [art] Store in slot 0x4
2,366,749 UART: [art] Derive Key Pair
2,367,109 UART: [art] Store priv key in slot 0x5
2,380,588 UART: [art] Derive Key Pair - Done
2,395,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,411,266 UART: [art] Erasing AUTHORITY.KEYID = 7
2,412,031 UART: [art] PUB.X = BDDA51831F0C875DEC23EDB0326C99EAAD93AC1D2CC54F250F82BE8752CB106AE12BED22DCD0DA033C7E76E1603ABDA4
2,418,820 UART: [art] PUB.Y = A97CFD566A00EC5087FC2D46DC387E7604801255AB7DE92593368C428B523A3EBBC682C8CCC1B476091B76257D4E498E
2,425,746 UART: [art] SIG.R = 9FB05306C3012D0BB331AD1BB4A8CD83DEB8CAC1586714856F18809DCA03283C6BD129F0191D3430BDF6E496975D7A0C
2,432,509 UART: [art] SIG.S = 0E04FE385BDAAFF013DDD83EFCE4A98D8B3841A588BE89AA79DA704DFF85FDF90B1A2C12AED0028535FB08AEB5655803
2,456,076 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,064 ready_for_fw is high
1,363,064 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,901,295 >>> mbox cmd response: success
1,963,622 UART:
1,963,638 UART: Running Caliptra FMC ...
1,964,046 UART:
1,964,189 UART: [state] CFI Enabled
1,974,965 UART: [fht] FMC Alias Private Key: 7
2,094,401 UART: [art] Extend RT PCRs Done
2,094,829 UART: [art] Lock RT PCRs Done
2,096,653 UART: [art] Populate DV Done
2,105,074 UART: [fht] FMC Alias Private Key: 7
2,106,082 UART: [art] Derive CDI
2,106,362 UART: [art] Store in slot 0x4
2,191,854 UART: [art] Derive Key Pair
2,192,214 UART: [art] Store priv key in slot 0x5
2,205,319 UART: [art] Derive Key Pair - Done
2,220,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,236,367 UART: [art] Erasing AUTHORITY.KEYID = 7
2,237,132 UART: [art] PUB.X = D3C9C0294233722F8B2E80D9DF626D18E7DEF8478CD60D9CD6ED66BF37F5601CBBAD71140F9240D539018E5F1C3874D1
2,243,901 UART: [art] PUB.Y = 51A521C411A878CD77F57B3E01EC8E0EF6633C1F5CDD04FDF232119B1BAB46A86F069A84A8616305336B8A95BAE52E92
2,250,844 UART: [art] SIG.R = 4D8D87542FF89EEC5ADF6130A33A8B9BEDD323BB8EFF1445A9DF88E7AAFEC382527065E7E5DBA18B37AADEE241CD27A3
2,257,642 UART: [art] SIG.S = 937EFF4F38A7D1AC2629C824E9744874A28FE5C431F4E193AD2568E35579C7C43227AF4BA786EFB6406971EC77D72F7F
2,281,699 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,353 UART: [kat] SHA2-512-ACC
906,254 UART: [kat] ECC-384
916,049 UART: [kat] HMAC-384Kdf
920,733 UART: [kat] LMS
1,169,045 UART: [kat] --
1,169,916 UART: [cold-reset] ++
1,170,466 UART: [fht] FHT @ 0x50003400
1,173,216 UART: [idev] ++
1,173,384 UART: [idev] CDI.KEYID = 6
1,173,745 UART: [idev] SUBJECT.KEYID = 7
1,174,170 UART: [idev] UDS.KEYID = 0
1,174,516 ready_for_fw is high
1,174,516 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,182,209 UART: [idev] Erasing UDS.KEYID = 0
1,198,959 UART: [idev] Sha1 KeyId Algorithm
1,207,719 UART: [idev] --
1,208,788 UART: [ldev] ++
1,208,956 UART: [ldev] CDI.KEYID = 6
1,209,320 UART: [ldev] SUBJECT.KEYID = 5
1,209,747 UART: [ldev] AUTHORITY.KEYID = 7
1,210,210 UART: [ldev] FE.KEYID = 1
1,215,356 UART: [ldev] Erasing FE.KEYID = 1
1,242,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,920 UART: [ldev] --
1,281,311 UART: [fwproc] Wait for Commands...
1,281,934 UART: [fwproc] Recv command 0x46574c44
1,282,667 UART: [fwproc] Recv'd Img size: 34948 bytes
1,669,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,696,399 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,727,574 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,742,381 >>> mbox cmd response: success
1,743,621 UART: [afmc] ++
1,743,789 UART: [afmc] CDI.KEYID = 6
1,744,152 UART: [afmc] SUBJECT.KEYID = 7
1,744,578 UART: [afmc] AUTHORITY.KEYID = 5
1,779,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,795,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,796,419 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,802,129 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,808,010 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,813,711 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,821,468 UART: [afmc] --
1,822,425 UART: [cold-reset] --
1,823,445 UART: [state] Locking Datavault
1,824,698 UART: [state] Locking PCR0, PCR1 and PCR31
1,825,302 UART: [state] Locking ICCM
1,825,942 UART: [exit] Launching FMC @ 0x40000130
1,831,272 UART:
1,831,288 UART: Running Caliptra FMC ...
1,831,696 UART:
1,831,750 UART: [state] CFI Enabled
1,842,350 UART: [fht] FMC Alias Private Key: 7
1,961,670 UART: [art] Extend RT PCRs Done
1,962,098 UART: [art] Lock RT PCRs Done
1,963,460 UART: [art] Populate DV Done
1,971,293 UART: [fht] FMC Alias Private Key: 7
1,972,471 UART: [art] Derive CDI
1,972,751 UART: [art] Store in slot 0x4
2,058,340 UART: [art] Derive Key Pair
2,058,700 UART: [art] Store priv key in slot 0x5
2,071,620 UART: [art] Derive Key Pair - Done
2,086,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,101,770 UART: [art] Erasing AUTHORITY.KEYID = 7
2,102,535 UART: [art] PUB.X = 063134C2431F3725D0B0C5B1A63AF7CD5CEBCC7B267DE37148710C30BB0E8A686CE17E70A35281F50A97A3F0A3D9343E
2,109,301 UART: [art] PUB.Y = BBC17C7E42A189F1AD5E0ACBFF69827F52094BD85A49036BA314056FC9BBF3D9DC47D71A91D0975F5A5F17111E81D185
2,116,251 UART: [art] SIG.R = 76CE66E50AED4DA105CBAA3DB2472B154CE87AC503E88B78AE40FE2D8B9E75B3CC25827CC1A8362F98D80F2F37DB2CFF
2,123,033 UART: [art] SIG.S = 72237DF08999EA3C5BA8FB07B1C1CED88AAE5826B12760B1AC4E66CFCD30B2833397E7AB095E1E6873245D356BC1B1F0
2,146,462 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,604 ready_for_fw is high
1,058,604 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,593,858 >>> mbox cmd response: success
1,655,881 UART:
1,655,897 UART: Running Caliptra FMC ...
1,656,305 UART:
1,656,359 UART: [state] CFI Enabled
1,666,819 UART: [fht] FMC Alias Private Key: 7
1,785,481 UART: [art] Extend RT PCRs Done
1,785,909 UART: [art] Lock RT PCRs Done
1,787,599 UART: [art] Populate DV Done
1,795,944 UART: [fht] FMC Alias Private Key: 7
1,797,038 UART: [art] Derive CDI
1,797,318 UART: [art] Store in slot 0x4
1,883,173 UART: [art] Derive Key Pair
1,883,533 UART: [art] Store priv key in slot 0x5
1,896,535 UART: [art] Derive Key Pair - Done
1,911,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,927,505 UART: [art] Erasing AUTHORITY.KEYID = 7
1,928,270 UART: [art] PUB.X = 0CBD13551DF500BC7E607E478CCB3CCAE69DFDE3F419829AE438829646FD82EC86436E6C5A6DF6487E41B24CA7232FBC
1,935,031 UART: [art] PUB.Y = 01103B6D177613F9273F7A500BD3C80E60F98720272C49DAEE18E75A03DEA81D2ABFABDA3376586021E28691097C1313
1,941,964 UART: [art] SIG.R = D9D1D912D7934393B2FF6F7F7E2E38FFD091BAC1B8627D340E7AF2E4B9357F286ABE2A9FC039EB13C027CF8AB40C6057
1,948,744 UART: [art] SIG.S = D06778B761F06B1A6DCD0FB52C1B183AF6F5E218C2759F9B5E124FC9E06B47ECF7407F29FBCAB9A36E6BC54215C747C6
1,972,552 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,180 UART: [state] WD Timer not started. Device not locked for debugging
88,511 UART: [kat] SHA2-256
892,061 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,165 UART: [kat] ++
896,317 UART: [kat] sha1
900,477 UART: [kat] SHA2-256
902,417 UART: [kat] SHA2-384
905,194 UART: [kat] SHA2-512-ACC
907,095 UART: [kat] ECC-384
916,734 UART: [kat] HMAC-384Kdf
921,354 UART: [kat] LMS
1,169,666 UART: [kat] --
1,170,615 UART: [cold-reset] ++
1,171,159 UART: [fht] FHT @ 0x50003400
1,173,929 UART: [idev] ++
1,174,097 UART: [idev] CDI.KEYID = 6
1,174,458 UART: [idev] SUBJECT.KEYID = 7
1,174,883 UART: [idev] UDS.KEYID = 0
1,175,229 ready_for_fw is high
1,175,229 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,182,682 UART: [idev] Erasing UDS.KEYID = 0
1,200,438 UART: [idev] Sha1 KeyId Algorithm
1,209,346 UART: [idev] --
1,210,419 UART: [ldev] ++
1,210,587 UART: [ldev] CDI.KEYID = 6
1,210,951 UART: [ldev] SUBJECT.KEYID = 5
1,211,378 UART: [ldev] AUTHORITY.KEYID = 7
1,211,841 UART: [ldev] FE.KEYID = 1
1,217,015 UART: [ldev] Erasing FE.KEYID = 1
1,243,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,557 UART: [ldev] --
1,282,960 UART: [fwproc] Wait for Commands...
1,283,737 UART: [fwproc] Recv command 0x46574c44
1,284,470 UART: [fwproc] Recv'd Img size: 34948 bytes
1,672,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,700,532 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,731,707 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,746,472 >>> mbox cmd response: success
1,747,486 UART: [afmc] ++
1,747,654 UART: [afmc] CDI.KEYID = 6
1,748,017 UART: [afmc] SUBJECT.KEYID = 7
1,748,443 UART: [afmc] AUTHORITY.KEYID = 5
1,784,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,800,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,801,196 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,806,906 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,812,787 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,818,488 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,826,299 UART: [afmc] --
1,827,356 UART: [cold-reset] --
1,828,350 UART: [state] Locking Datavault
1,829,465 UART: [state] Locking PCR0, PCR1 and PCR31
1,830,069 UART: [state] Locking ICCM
1,830,619 UART: [exit] Launching FMC @ 0x40000130
1,835,949 UART:
1,835,965 UART: Running Caliptra FMC ...
1,836,373 UART:
1,836,516 UART: [state] CFI Enabled
1,847,402 UART: [fht] FMC Alias Private Key: 7
1,966,128 UART: [art] Extend RT PCRs Done
1,966,556 UART: [art] Lock RT PCRs Done
1,968,000 UART: [art] Populate DV Done
1,976,179 UART: [fht] FMC Alias Private Key: 7
1,977,209 UART: [art] Derive CDI
1,977,489 UART: [art] Store in slot 0x4
2,063,376 UART: [art] Derive Key Pair
2,063,736 UART: [art] Store priv key in slot 0x5
2,077,108 UART: [art] Derive Key Pair - Done
2,091,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,106,722 UART: [art] Erasing AUTHORITY.KEYID = 7
2,107,487 UART: [art] PUB.X = ACDE13BAFD4039F17F9A2D742A420D09ACF5FECADEFB5209A4318E5CC33BA61AE38800D18FC63048D009C9CFFA6D6127
2,114,247 UART: [art] PUB.Y = AA0D449EF07EDF9AAB123DE91A509C11D3BE2E543B2F73384E191EB1C515C1F513E047CCFF572356BB1882D1E5D304AD
2,121,207 UART: [art] SIG.R = 05EC5D5EE82F6FD476AB56A443EEF20AF4B8E3EAFFF8EC03D0DB0CDAF430D9C605E49D17FE786FD4C250C277DA4CF95D
2,127,994 UART: [art] SIG.S = 3275EE7B31E65BBB6D2EC1E84D4897027591A98F44296C4ACA0539C7CC79CF0C552ECD3063BB690B40FB567B1F10B6F5
2,151,853 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,317 ready_for_fw is high
1,059,317 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,595,021 >>> mbox cmd response: success
1,656,832 UART:
1,656,848 UART: Running Caliptra FMC ...
1,657,256 UART:
1,657,399 UART: [state] CFI Enabled
1,668,129 UART: [fht] FMC Alias Private Key: 7
1,786,973 UART: [art] Extend RT PCRs Done
1,787,401 UART: [art] Lock RT PCRs Done
1,788,741 UART: [art] Populate DV Done
1,796,954 UART: [fht] FMC Alias Private Key: 7
1,797,884 UART: [art] Derive CDI
1,798,164 UART: [art] Store in slot 0x4
1,884,009 UART: [art] Derive Key Pair
1,884,369 UART: [art] Store priv key in slot 0x5
1,897,699 UART: [art] Derive Key Pair - Done
1,912,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,927,799 UART: [art] Erasing AUTHORITY.KEYID = 7
1,928,564 UART: [art] PUB.X = 03F4F4292F1AAFC6E8DD930A6DCEAD5A3C322A1D7CBCC80FBFE797897D867687446B3066AE175C39AED867B7C87B0A5A
1,935,342 UART: [art] PUB.Y = D4D22219B53453FAC455718EA19A7501AEBA9B832FD1A7DDF0CB5EFBBF85E06E2C75D19159D52539A856DBD1E183FA5B
1,942,307 UART: [art] SIG.R = 4F13D3DA931F9656117BC76EDD386A10BB217EC14282B5762DBDB430C75D1BDB8DF31C4A701B281631A7290DAA8AA609
1,949,081 UART: [art] SIG.S = 9A9F96F99144C38ADFB420852ADA181FD0037545EF31911C74D1ADD84FBDE3EF8C23694AD505727431F67C45DC01F6B4
1,972,755 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,650 UART: [state] LifecycleState = Unprovisioned
86,305 UART: [state] DebugLocked = No
86,977 UART: [state] WD Timer not started. Device not locked for debugging
88,154 UART: [kat] SHA2-256
893,804 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,929 UART: [kat] ++
898,081 UART: [kat] sha1
902,173 UART: [kat] SHA2-256
904,113 UART: [kat] SHA2-384
907,022 UART: [kat] SHA2-512-ACC
908,923 UART: [kat] ECC-384
918,168 UART: [kat] HMAC-384Kdf
922,600 UART: [kat] LMS
1,170,928 UART: [kat] --
1,172,049 UART: [cold-reset] ++
1,172,385 UART: [fht] FHT @ 0x50003400
1,174,918 UART: [idev] ++
1,175,086 UART: [idev] CDI.KEYID = 6
1,175,446 UART: [idev] SUBJECT.KEYID = 7
1,175,870 UART: [idev] UDS.KEYID = 0
1,176,215 ready_for_fw is high
1,176,215 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,183,738 UART: [idev] Erasing UDS.KEYID = 0
1,200,863 UART: [idev] Sha1 KeyId Algorithm
1,209,201 UART: [idev] --
1,210,365 UART: [ldev] ++
1,210,533 UART: [ldev] CDI.KEYID = 6
1,210,896 UART: [ldev] SUBJECT.KEYID = 5
1,211,322 UART: [ldev] AUTHORITY.KEYID = 7
1,211,785 UART: [ldev] FE.KEYID = 1
1,216,955 UART: [ldev] Erasing FE.KEYID = 1
1,242,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,697 UART: [ldev] --
1,282,152 UART: [fwproc] Wait for Commands...
1,282,920 UART: [fwproc] Recv command 0x46574c44
1,283,648 UART: [fwproc] Recv'd Img size: 34948 bytes
1,672,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,586 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,730,756 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,745,513 >>> mbox cmd response: success
1,746,659 UART: [afmc] ++
1,746,827 UART: [afmc] CDI.KEYID = 6
1,747,189 UART: [afmc] SUBJECT.KEYID = 7
1,747,614 UART: [afmc] AUTHORITY.KEYID = 5
1,782,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,799,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,799,876 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,585 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,811,468 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,817,169 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,825,037 UART: [afmc] --
1,826,165 UART: [cold-reset] --
1,827,087 UART: [state] Locking Datavault
1,828,050 UART: [state] Locking PCR0, PCR1 and PCR31
1,828,654 UART: [state] Locking ICCM
1,829,202 UART: [exit] Launching FMC @ 0x40000130
1,834,532 UART:
1,834,548 UART: Running Caliptra FMC ...
1,834,956 UART:
1,835,010 UART: [state] CFI Enabled
1,845,446 UART: [fht] FMC Alias Private Key: 7
1,964,656 UART: [art] Extend RT PCRs Done
1,965,084 UART: [art] Lock RT PCRs Done
1,966,862 UART: [art] Populate DV Done
1,975,103 UART: [fht] FMC Alias Private Key: 7
1,976,049 UART: [art] Derive CDI
1,976,329 UART: [art] Store in slot 0x4
2,061,858 UART: [art] Derive Key Pair
2,062,218 UART: [art] Store priv key in slot 0x5
2,075,824 UART: [art] Derive Key Pair - Done
2,090,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,106,275 UART: [art] Erasing AUTHORITY.KEYID = 7
2,107,040 UART: [art] PUB.X = 947FF28CD13F6272A8CBB0E8418142257034E3F3DACF6C3EE3215E16F9152E1CC25DEB8E96F7ACE0545F741C8A59D654
2,113,820 UART: [art] PUB.Y = DFA860DFEB52D647BC779CE70D7EC3FC3F862085DA1AE0C8EAE8BF8BC042ECF7E8BC35F78FD59242C8A5FD3EED97B821
2,120,799 UART: [art] SIG.R = D7371BD2ED5DBD0CBFFDD398B32193C3D2AFCD17AF30EA2B7AAF12CC7A2D002F839802557961ECEF6477FE2794AE7797
2,127,563 UART: [art] SIG.S = E4AC6CCFF8621EE6F3E23F490DDEC0B6B708D8BA7E499D78AC6E19D0ACF6CCA019098C02506BAB24B79DD35A5CAB2AB9
2,151,460 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,539 ready_for_fw is high
1,060,539 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,596,254 >>> mbox cmd response: success
1,658,857 UART:
1,658,873 UART: Running Caliptra FMC ...
1,659,281 UART:
1,659,335 UART: [state] CFI Enabled
1,669,715 UART: [fht] FMC Alias Private Key: 7
1,788,095 UART: [art] Extend RT PCRs Done
1,788,523 UART: [art] Lock RT PCRs Done
1,789,861 UART: [art] Populate DV Done
1,798,356 UART: [fht] FMC Alias Private Key: 7
1,799,460 UART: [art] Derive CDI
1,799,740 UART: [art] Store in slot 0x4
1,885,907 UART: [art] Derive Key Pair
1,886,267 UART: [art] Store priv key in slot 0x5
1,899,517 UART: [art] Derive Key Pair - Done
1,914,439 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,929,984 UART: [art] Erasing AUTHORITY.KEYID = 7
1,930,749 UART: [art] PUB.X = B9EBE4738F8F2A953AAC99E0D01B0A360ACD1F023F977BD8A1662AAB534020770FC8F62158B2607AC9FB76FD0A6C34AE
1,937,520 UART: [art] PUB.Y = F882D89C9270B45D0904234144274C5107D3C3CE61ABA1BAC1D276EF003ABA4560FE4143991C0ED3C3DC2F036E04A293
1,944,434 UART: [art] SIG.R = DE8349618C16DC078A06F0E515B49CE404CF2BD2A928083ADC03E809FB2ACA96B05B2B9039004FAB9C9E42024348C2A6
1,951,169 UART: [art] SIG.S = 07593D5541F8A116070151AC7678A18527AB97CF49C57B344374DEEC4D9E4B44F4253A77EE72745E744E27F93D139F8C
1,974,907 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
893,449 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,574 UART: [kat] ++
897,726 UART: [kat] sha1
901,940 UART: [kat] SHA2-256
903,880 UART: [kat] SHA2-384
906,783 UART: [kat] SHA2-512-ACC
908,684 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
922,955 UART: [kat] LMS
1,171,283 UART: [kat] --
1,171,952 UART: [cold-reset] ++
1,172,428 UART: [fht] FHT @ 0x50003400
1,175,065 UART: [idev] ++
1,175,233 UART: [idev] CDI.KEYID = 6
1,175,593 UART: [idev] SUBJECT.KEYID = 7
1,176,017 UART: [idev] UDS.KEYID = 0
1,176,362 ready_for_fw is high
1,176,362 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,183,967 UART: [idev] Erasing UDS.KEYID = 0
1,200,646 UART: [idev] Sha1 KeyId Algorithm
1,209,094 UART: [idev] --
1,210,390 UART: [ldev] ++
1,210,558 UART: [ldev] CDI.KEYID = 6
1,210,921 UART: [ldev] SUBJECT.KEYID = 5
1,211,347 UART: [ldev] AUTHORITY.KEYID = 7
1,211,810 UART: [ldev] FE.KEYID = 1
1,217,156 UART: [ldev] Erasing FE.KEYID = 1
1,243,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,860 UART: [ldev] --
1,282,301 UART: [fwproc] Wait for Commands...
1,283,029 UART: [fwproc] Recv command 0x46574c44
1,283,757 UART: [fwproc] Recv'd Img size: 34948 bytes
1,671,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,191 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,730,361 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,745,284 >>> mbox cmd response: success
1,746,508 UART: [afmc] ++
1,746,676 UART: [afmc] CDI.KEYID = 6
1,747,038 UART: [afmc] SUBJECT.KEYID = 7
1,747,463 UART: [afmc] AUTHORITY.KEYID = 5
1,783,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,800,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,800,807 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,806,516 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,812,399 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,818,100 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,826,044 UART: [afmc] --
1,827,094 UART: [cold-reset] --
1,827,788 UART: [state] Locking Datavault
1,828,993 UART: [state] Locking PCR0, PCR1 and PCR31
1,829,597 UART: [state] Locking ICCM
1,830,075 UART: [exit] Launching FMC @ 0x40000130
1,835,405 UART:
1,835,421 UART: Running Caliptra FMC ...
1,835,829 UART:
1,835,972 UART: [state] CFI Enabled
1,846,594 UART: [fht] FMC Alias Private Key: 7
1,965,432 UART: [art] Extend RT PCRs Done
1,965,860 UART: [art] Lock RT PCRs Done
1,967,242 UART: [art] Populate DV Done
1,975,377 UART: [fht] FMC Alias Private Key: 7
1,976,317 UART: [art] Derive CDI
1,976,597 UART: [art] Store in slot 0x4
2,062,774 UART: [art] Derive Key Pair
2,063,134 UART: [art] Store priv key in slot 0x5
2,076,600 UART: [art] Derive Key Pair - Done
2,091,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,106,428 UART: [art] Erasing AUTHORITY.KEYID = 7
2,107,193 UART: [art] PUB.X = AA664E677241B40197CB6BD58FDF71580A71408F1B76C3EBA83B747A7C3264EC1F0CF15C7DCC991912BF1ACC67168F70
2,113,964 UART: [art] PUB.Y = 0BF9BACC4BC13859B71FC4B4E6CCA8A646EC30DFE21C8B88726A3DDCEE928BEE6DC1D8DB453AEF746083942893176470
2,120,931 UART: [art] SIG.R = CB2D9384898F4C7B27002006BFC4EE83681CB75F3883AB872B367C39963AFB539B8EA7C7822C82FEA5C2D209139E161A
2,127,677 UART: [art] SIG.S = EE50F4FE25395F8AA8B58334E8A050EF197516D5C2A991AA87E756B6A49EADE262888D05C05C4307E33146364EA9D18B
2,151,412 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,210 ready_for_fw is high
1,060,210 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,596,945 >>> mbox cmd response: success
1,659,118 UART:
1,659,134 UART: Running Caliptra FMC ...
1,659,542 UART:
1,659,685 UART: [state] CFI Enabled
1,670,247 UART: [fht] FMC Alias Private Key: 7
1,789,883 UART: [art] Extend RT PCRs Done
1,790,311 UART: [art] Lock RT PCRs Done
1,791,999 UART: [art] Populate DV Done
1,800,136 UART: [fht] FMC Alias Private Key: 7
1,801,222 UART: [art] Derive CDI
1,801,502 UART: [art] Store in slot 0x4
1,887,421 UART: [art] Derive Key Pair
1,887,781 UART: [art] Store priv key in slot 0x5
1,901,291 UART: [art] Derive Key Pair - Done
1,915,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,931,372 UART: [art] Erasing AUTHORITY.KEYID = 7
1,932,137 UART: [art] PUB.X = 5022D094813595EF04FAE4EE2551533631EEDF0BF89C894290B0678C20D69DA8DD043BB5FE5EA34552DE9D6B922D133F
1,938,904 UART: [art] PUB.Y = CA4F3FEABDDCB31EC94E8A8194B1ADBFF8A22B14D63271A73E6BCA8EFA6948E6B2E0974D34AE801CCE5E2DF7A225BD8F
1,945,888 UART: [art] SIG.R = 99E2E10998F55DA9DC88B6F5578495A2EB61EE241D5878F515D91A0D55CA06FC345FE0A3562B83F5C79060920E2656D3
1,952,646 UART: [art] SIG.S = D95F52838088186FD4905BCCFBE269BE96A0179C5E548912F7DD038198576C4568E0642D512B957DDB84D12C94DAF230
1,976,226 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
191,943 UART:
192,304 UART: Running Caliptra ROM ...
193,517 UART:
193,676 UART: [state] CFI Enabled
265,940 UART: [state] LifecycleState = Unprovisioned
267,918 UART: [state] DebugLocked = No
269,665 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,600 UART: [kat] SHA2-256
444,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,811 UART: [kat] ++
455,264 UART: [kat] sha1
466,067 UART: [kat] SHA2-256
468,799 UART: [kat] SHA2-384
474,506 UART: [kat] SHA2-512-ACC
476,870 UART: [kat] ECC-384
2,769,537 UART: [kat] HMAC-384Kdf
2,802,089 UART: [kat] LMS
3,992,398 UART: [kat] --
3,996,788 UART: [cold-reset] ++
3,998,799 UART: [fht] Storing FHT @ 0x50003400
4,010,346 UART: [idev] ++
4,010,993 UART: [idev] CDI.KEYID = 6
4,011,908 UART: [idev] SUBJECT.KEYID = 7
4,013,157 UART: [idev] UDS.KEYID = 0
4,014,145 ready_for_fw is high
4,014,342 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,118,628 UART: [idev] Erasing UDS.KEYID = 0
7,349,456 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,797 UART: [idev] --
7,375,524 UART: [ldev] ++
7,376,089 UART: [ldev] CDI.KEYID = 6
7,377,106 UART: [ldev] SUBJECT.KEYID = 5
7,378,267 UART: [ldev] AUTHORITY.KEYID = 7
7,379,500 UART: [ldev] FE.KEYID = 1
7,423,752 UART: [ldev] Erasing FE.KEYID = 1
10,758,288 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,073,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,088,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,102,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,117,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,136,924 UART: [ldev] --
13,141,274 UART: [fwproc] Waiting for Commands...
13,144,232 UART: [fwproc] Received command 0x46574c44
13,146,468 UART: [fwproc] Received Image of size 82832 bytes
16,814,152 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,883,522 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,956,700 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,161,029 >>> mbox cmd response: success
17,162,143 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,165,086 UART: [afmc] ++
17,165,692 UART: [afmc] CDI.KEYID = 6
17,166,607 UART: [afmc] SUBJECT.KEYID = 7
17,167,824 UART: [afmc] AUTHORITY.KEYID = 5
20,546,554 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,842,793 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,845,056 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,859,516 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,874,223 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,888,648 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,910,788 UART: [afmc] --
22,913,952 UART: [cold-reset] --
22,916,893 UART: [state] Locking Datavault
22,923,609 UART: [state] Locking PCR0, PCR1 and PCR31
22,925,355 UART: [state] Locking ICCM
22,926,433 UART: [exit] Launching FMC @ 0x40000130
22,934,840 UART:
22,935,096 UART: Running Caliptra FMC ...
22,936,205 UART:
22,936,368 UART: [state] CFI Enabled
23,001,287 UART: [fht] FMC Alias Private Key: 7
25,342,161 UART: [art] Extend RT PCRs Done
25,343,381 UART: [art] Lock RT PCRs Done
25,345,199 UART: [art] Populate DV Done
25,350,611 UART: [fht] FMC Alias Private Key: 7
25,352,199 UART: [art] Derive CDI
25,352,928 UART: [art] Store in slot 0x4
25,410,377 UART: [art] Derive Key Pair
25,411,424 UART: [art] Store priv key in slot 0x5
28,704,286 UART: [art] Derive Key Pair - Done
28,717,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,005,175 UART: [art] Erasing AUTHORITY.KEYID = 7
31,006,694 UART: [art] PUB.X = A3493B30C1DCC84E4103E448C7ACBFABCC0D2025AD5483DD3B0F8B7AF6D6D757588BA57D9EF8B9217E3D0CB99762B898
31,013,986 UART: [art] PUB.Y = 8326042AB11CAE3D444BF6B2C50ABFAE380B509B29DB9A9A6B96EAFCDBD23B9D9E44AFC613F458F57948D9D97B2347FC
31,021,237 UART: [art] SIG.R = 6907690A8DC309AC7A4411AEB9B874F8759353A13C38233D5A4F7A02A5B28C5786958242339ABD5C41977F68AF3486FF
31,028,599 UART: [art] SIG.S = 099C1D9A55A7A0BE64B7216685C14FA953F8529F3D7EE578E0CFBB12CEF23947AAA38A91A5263823275AE5BAC9DFB371
32,333,380 UART: mbox::rt_entry...
32,334,324 UART: ____ _ _ _ ____ _____
32,336,304 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,338,263 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,340,194 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,342,069 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,344,011 UART: |_|
32,344,822 UART:
32,476,748 UART: [rt] Runtime listening for mailbox commands...
32,478,931 >>> mbox cmd response data (48 bytes)
32,479,552 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,481,873 >>> mbox cmd response data (48 bytes)
32,482,721 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,498,301 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,800,850 ready_for_fw is high
3,801,470 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,241,689 >>> mbox cmd response: success
17,242,925 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,926,993 UART:
22,927,391 UART: Running Caliptra FMC ...
22,928,538 UART:
22,928,696 UART: [state] CFI Enabled
22,995,390 UART: [fht] FMC Alias Private Key: 7
25,335,679 UART: [art] Extend RT PCRs Done
25,336,912 UART: [art] Lock RT PCRs Done
25,338,526 UART: [art] Populate DV Done
25,344,053 UART: [fht] FMC Alias Private Key: 7
25,345,597 UART: [art] Derive CDI
25,346,330 UART: [art] Store in slot 0x4
25,403,509 UART: [art] Derive Key Pair
25,404,555 UART: [art] Store priv key in slot 0x5
28,697,081 UART: [art] Derive Key Pair - Done
28,710,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,998,091 UART: [art] Erasing AUTHORITY.KEYID = 7
30,999,608 UART: [art] PUB.X = 54FA929CC885D84030A4EC8A3E6799F7078840F5815A019F5561FC480B051E770A30497E0FBBA1FCE2F3E0DFA3A086F2
31,006,815 UART: [art] PUB.Y = 4C760BB87F7F219D04D9BEDE7C72FE9EBCF6889204A418E9744F7272F1ED01E65AA87874B79A5E52AA916483F972F3AC
31,014,072 UART: [art] SIG.R = 27F36DB5FC706FA3A9B2E6273723D572C2A8F8EFA6CC214C04EE2262C40E47D5063D319497271B078D4A6F99102FFA3A
31,021,483 UART: [art] SIG.S = CB51642A70FDE5CF1BAED5206C746833BA7B0D17CEE2F3D87B55C4DF7EDF503432BEE2259EC88A5EDA5EF3795F3BC969
32,326,353 UART: mbox::rt_entry...
32,327,295 UART: ____ _ _ _ ____ _____
32,329,276 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,331,277 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,333,208 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,335,200 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,337,054 UART: |_|
32,337,856 UART:
32,469,483 UART: [rt] Runtime listening for mailbox commands...
32,471,681 >>> mbox cmd response data (48 bytes)
32,472,281 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,474,651 >>> mbox cmd response data (48 bytes)
32,475,494 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,491,058 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,308 UART:
192,688 UART: Running Caliptra ROM ...
193,789 UART:
603,730 UART: [state] CFI Enabled
615,610 UART: [state] LifecycleState = Unprovisioned
617,548 UART: [state] DebugLocked = No
620,200 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,409 UART: [kat] SHA2-256
794,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,716 UART: [kat] ++
805,163 UART: [kat] sha1
816,530 UART: [kat] SHA2-256
819,244 UART: [kat] SHA2-384
823,665 UART: [kat] SHA2-512-ACC
826,024 UART: [kat] ECC-384
3,111,548 UART: [kat] HMAC-384Kdf
3,124,616 UART: [kat] LMS
4,314,840 UART: [kat] --
4,320,077 UART: [cold-reset] ++
4,321,020 UART: [fht] Storing FHT @ 0x50003400
4,333,276 UART: [idev] ++
4,333,914 UART: [idev] CDI.KEYID = 6
4,334,831 UART: [idev] SUBJECT.KEYID = 7
4,336,065 UART: [idev] UDS.KEYID = 0
4,337,099 ready_for_fw is high
4,337,294 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,441,363 UART: [idev] Erasing UDS.KEYID = 0
7,624,813 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,876 UART: [idev] --
7,652,845 UART: [ldev] ++
7,653,412 UART: [ldev] CDI.KEYID = 6
7,654,375 UART: [ldev] SUBJECT.KEYID = 5
7,655,576 UART: [ldev] AUTHORITY.KEYID = 7
7,656,878 UART: [ldev] FE.KEYID = 1
7,667,360 UART: [ldev] Erasing FE.KEYID = 1
10,954,845 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,120 UART: [ldev] --
13,314,513 UART: [fwproc] Waiting for Commands...
13,317,245 UART: [fwproc] Received command 0x46574c44
13,319,418 UART: [fwproc] Received Image of size 82832 bytes
16,990,042 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,067,452 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,140,576 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,343,991 >>> mbox cmd response: success
17,344,496 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,348,477 UART: [afmc] ++
17,349,049 UART: [afmc] CDI.KEYID = 6
17,350,015 UART: [afmc] SUBJECT.KEYID = 7
17,351,238 UART: [afmc] AUTHORITY.KEYID = 5
20,663,715 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,959,666 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,961,936 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,976,374 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,991,104 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,005,464 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,026,182 UART: [afmc] --
23,029,337 UART: [cold-reset] --
23,032,866 UART: [state] Locking Datavault
23,039,225 UART: [state] Locking PCR0, PCR1 and PCR31
23,040,959 UART: [state] Locking ICCM
23,043,087 UART: [exit] Launching FMC @ 0x40000130
23,051,445 UART:
23,051,714 UART: Running Caliptra FMC ...
23,052,744 UART:
23,052,891 UART: [state] CFI Enabled
23,061,365 UART: [fht] FMC Alias Private Key: 7
25,401,808 UART: [art] Extend RT PCRs Done
25,403,036 UART: [art] Lock RT PCRs Done
25,404,877 UART: [art] Populate DV Done
25,410,343 UART: [fht] FMC Alias Private Key: 7
25,411,987 UART: [art] Derive CDI
25,412,798 UART: [art] Store in slot 0x4
25,455,337 UART: [art] Derive Key Pair
25,456,374 UART: [art] Store priv key in slot 0x5
28,698,238 UART: [art] Derive Key Pair - Done
28,711,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,991,233 UART: [art] Erasing AUTHORITY.KEYID = 7
30,992,757 UART: [art] PUB.X = 1BA85AC5241446D840FA01B6242EBA38E27418672F334EC3B11261FCE33950A4C79E8CD01F010CD65C9B5484D50395F9
30,999,954 UART: [art] PUB.Y = 3CF1928B4491F2FC3250B4F2F28237ACE209E43AE73B49754CBAEFEF32FE0CA86AB6C2066F7C9D9B0BC6F8639F5BBC2E
31,007,254 UART: [art] SIG.R = E7F45AF5682EE325959A468F37086AB6D5C230ADD75A7959943ADA6517C40EF9F67883E923AD0C6B3E180DFFBC68E3C4
31,014,652 UART: [art] SIG.S = C72FBE20A93CB8BD7AD47EA6F34D1B825536FCAF194D0B930710EC9DF9B5B90BEB2FEB42DA00B7A73C260EC515B1DFA1
32,319,985 UART: mbox::rt_entry...
32,320,950 UART: ____ _ _ _ ____ _____
32,322,876 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,324,881 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,326,730 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,328,648 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,330,523 UART: |_|
32,331,398 UART:
32,463,104 UART: [rt] Runtime listening for mailbox commands...
32,465,267 >>> mbox cmd response data (48 bytes)
32,465,852 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,468,167 >>> mbox cmd response data (48 bytes)
32,469,033 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,484,611 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
4,123,968 ready_for_fw is high
4,124,395 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,426,955 >>> mbox cmd response: success
17,427,576 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,063,485 UART:
23,063,888 UART: Running Caliptra FMC ...
23,065,000 UART:
23,065,159 UART: [state] CFI Enabled
23,072,729 UART: [fht] FMC Alias Private Key: 7
25,412,489 UART: [art] Extend RT PCRs Done
25,413,737 UART: [art] Lock RT PCRs Done
25,415,551 UART: [art] Populate DV Done
25,421,253 UART: [fht] FMC Alias Private Key: 7
25,422,958 UART: [art] Derive CDI
25,423,728 UART: [art] Store in slot 0x4
25,465,892 UART: [art] Derive Key Pair
25,466,950 UART: [art] Store priv key in slot 0x5
28,708,913 UART: [art] Derive Key Pair - Done
28,721,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,002,486 UART: [art] Erasing AUTHORITY.KEYID = 7
31,004,004 UART: [art] PUB.X = 9498594746B6FA1C9C3E3FC2197073B307F8450BA6BADE7F87A784365509E8F3AE0DA4C81E2DD598BDEAE1C2C0FEBC22
31,011,308 UART: [art] PUB.Y = E6464B78BE5548B5A0EB1A6A42499810C71395AD2007FEF3B588F550F3392DE829BC46242853DD64F88F9FC46F6DB713
31,018,550 UART: [art] SIG.R = A1791A3B9FC8EE73E7F4F02D05039026FFCAACB376685807B16C97B4639CC24681B92A19A449025F0FB6C878E310F897
31,025,950 UART: [art] SIG.S = C5397139E9EAAF9D049D70E4AF4442F8D099694DC2B39ED35C29DC13C58F1620D70A2E267D7D1176EDF1B7CF4BBCADB8
32,330,598 UART: mbox::rt_entry...
32,331,572 UART: ____ _ _ _ ____ _____
32,333,504 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,335,513 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,337,445 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,339,435 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,341,358 UART: |_|
32,342,165 UART:
32,472,913 UART: [rt] Runtime listening for mailbox commands...
32,475,078 >>> mbox cmd response data (48 bytes)
32,475,679 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,478,021 >>> mbox cmd response data (48 bytes)
32,478,868 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,494,433 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
191,954 UART:
192,317 UART: Running Caliptra ROM ...
193,430 UART:
193,571 UART: [state] CFI Enabled
266,446 UART: [state] LifecycleState = Unprovisioned
268,415 UART: [state] DebugLocked = No
269,662 UART: [state] WD Timer not started. Device not locked for debugging
272,903 UART: [kat] SHA2-256
452,594 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,347 UART: [kat] ++
463,835 UART: [kat] sha1
474,422 UART: [kat] SHA2-256
477,151 UART: [kat] SHA2-384
483,067 UART: [kat] SHA2-512-ACC
485,436 UART: [kat] ECC-384
2,947,755 UART: [kat] HMAC-384Kdf
2,971,730 UART: [kat] LMS
3,448,165 UART: [kat] --
3,450,525 UART: [cold-reset] ++
3,452,807 UART: [fht] FHT @ 0x50003400
3,464,298 UART: [idev] ++
3,464,899 UART: [idev] CDI.KEYID = 6
3,465,931 UART: [idev] SUBJECT.KEYID = 7
3,467,109 UART: [idev] UDS.KEYID = 0
3,468,040 ready_for_fw is high
3,468,226 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,572,484 UART: [idev] Erasing UDS.KEYID = 0
5,987,205 UART: [idev] Sha1 KeyId Algorithm
6,011,136 UART: [idev] --
6,016,054 UART: [ldev] ++
6,016,628 UART: [ldev] CDI.KEYID = 6
6,017,650 UART: [ldev] SUBJECT.KEYID = 5
6,018,776 UART: [ldev] AUTHORITY.KEYID = 7
6,020,064 UART: [ldev] FE.KEYID = 1
6,057,956 UART: [ldev] Erasing FE.KEYID = 1
8,566,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,598 UART: [ldev] --
10,375,619 UART: [fwproc] Wait for Commands...
10,378,359 UART: [fwproc] Recv command 0x46574c44
10,380,397 UART: [fwproc] Recv'd Img size: 82832 bytes
13,423,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,505,868 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,578,877 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,782,932 >>> mbox cmd response: success
13,784,002 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,787,810 UART: [afmc] ++
13,788,389 UART: [afmc] CDI.KEYID = 6
13,789,409 UART: [afmc] SUBJECT.KEYID = 7
13,790,561 UART: [afmc] AUTHORITY.KEYID = 5
16,319,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,062,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,064,599 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,080,440 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,096,493 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,112,078 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,137,355 UART: [afmc] --
18,141,272 UART: [cold-reset] --
18,146,153 UART: [state] Locking Datavault
18,151,834 UART: [state] Locking PCR0, PCR1 and PCR31
18,153,582 UART: [state] Locking ICCM
18,154,884 UART: [exit] Launching FMC @ 0x40000130
18,163,331 UART:
18,163,567 UART: Running Caliptra FMC ...
18,164,662 UART:
18,164,822 UART: [state] CFI Enabled
18,221,357 UART: [fht] FMC Alias Private Key: 7
19,987,896 UART: [art] Extend RT PCRs Done
19,989,102 UART: [art] Lock RT PCRs Done
19,990,775 UART: [art] Populate DV Done
19,996,400 UART: [fht] FMC Alias Private Key: 7
19,998,039 UART: [art] Derive CDI
19,998,854 UART: [art] Store in slot 0x4
20,054,200 UART: [art] Derive Key Pair
20,055,247 UART: [art] Store priv key in slot 0x5
22,517,844 UART: [art] Derive Key Pair - Done
22,530,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,243,929 UART: [art] Erasing AUTHORITY.KEYID = 7
24,245,408 UART: [art] PUB.X = E24525737491C83BD7805D6389167F8D3D3C7F3352DF449FE0FF903B4FAA9DA1F72992C16DDA5A82A9C0218A0656E36B
24,252,660 UART: [art] PUB.Y = E65902DD1EE4F7680618EE7BD4EAC35B222C9504970A482F62C64392BA50D474477A9BB6DDCF5B20CF092D6AF2AC0BD0
24,259,946 UART: [art] SIG.R = 954C0A1681216F76B2FE79762B33873FFA3D82C2B65E8F08C3F78D46A00E50127B0221E691F1092AAE221B1594B85470
24,267,319 UART: [art] SIG.S = B9C2A4CCCB903D943C8BC2650C6CB1942A9FA4EBD17EDAD24250CAB7B39D55BD05BDE100375D85CDC5B9E8CA72BA7516
25,245,935 UART: mbox::rt_entry...
25,246,902 UART: ____ _ _ _ ____ _____
25,248,881 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,250,883 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,252,812 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,254,746 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,256,672 UART: |_|
25,257,479 UART:
25,388,448 UART: [rt] Runtime listening for mailbox commands...
25,390,668 >>> mbox cmd response data (48 bytes)
25,391,268 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,393,641 >>> mbox cmd response data (48 bytes)
25,394,487 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,410,060 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,457,426 ready_for_fw is high
3,458,102 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,649,017 >>> mbox cmd response: success
13,650,221 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,934,561 UART:
17,934,947 UART: Running Caliptra FMC ...
17,936,087 UART:
17,936,260 UART: [state] CFI Enabled
18,000,656 UART: [fht] FMC Alias Private Key: 7
19,767,414 UART: [art] Extend RT PCRs Done
19,768,636 UART: [art] Lock RT PCRs Done
19,770,313 UART: [art] Populate DV Done
19,775,671 UART: [fht] FMC Alias Private Key: 7
19,777,372 UART: [art] Derive CDI
19,778,185 UART: [art] Store in slot 0x4
19,833,210 UART: [art] Derive Key Pair
19,834,240 UART: [art] Store priv key in slot 0x5
22,297,265 UART: [art] Derive Key Pair - Done
22,310,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,023,179 UART: [art] Erasing AUTHORITY.KEYID = 7
24,024,850 UART: [art] PUB.X = 9D6D508E37557D96264FE6416BAF5600EE43BBF6E2DB35641CF3C6726234804F85BFBFCA42ADDE4C5C127D282687E0A4
24,031,938 UART: [art] PUB.Y = 8F0C138A1B41F20A850B8FEB3F7D86B43D9F73CA29878079C3469CB936F032DCD0C2471CAF570852D8F92107EAA46ECF
24,039,207 UART: [art] SIG.R = B368276C49305AA80EA4AA87C441929880243630A17CFCBCE92D5FE75D03C63ED6EBE5E86615B4E56F15F523D46C2808
24,046,613 UART: [art] SIG.S = FF2E3DB9336C913D9FB4B4B370B67C5F0942C624ABAA73A1E751C5E849BD6F1074B53A39ECCC97A64FCD863C0D76248A
25,024,674 UART: mbox::rt_entry...
25,025,623 UART: ____ _ _ _ ____ _____
25,027,613 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,029,619 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,031,552 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,033,566 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,035,497 UART: |_|
25,036,310 UART:
25,166,405 UART: [rt] Runtime listening for mailbox commands...
25,168,587 >>> mbox cmd response data (48 bytes)
25,169,198 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,171,554 >>> mbox cmd response data (48 bytes)
25,172,409 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,187,991 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
192,500 UART:
192,847 UART: Running Caliptra ROM ...
193,972 UART:
603,740 UART: [state] CFI Enabled
615,563 UART: [state] LifecycleState = Unprovisioned
617,425 UART: [state] DebugLocked = No
618,872 UART: [state] WD Timer not started. Device not locked for debugging
622,254 UART: [kat] SHA2-256
801,912 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,654 UART: [kat] ++
813,174 UART: [kat] sha1
823,492 UART: [kat] SHA2-256
826,180 UART: [kat] SHA2-384
831,963 UART: [kat] SHA2-512-ACC
834,330 UART: [kat] ECC-384
3,275,703 UART: [kat] HMAC-384Kdf
3,288,296 UART: [kat] LMS
3,764,823 UART: [kat] --
3,767,775 UART: [cold-reset] ++
3,769,087 UART: [fht] FHT @ 0x50003400
3,780,391 UART: [idev] ++
3,780,994 UART: [idev] CDI.KEYID = 6
3,781,883 UART: [idev] SUBJECT.KEYID = 7
3,783,205 UART: [idev] UDS.KEYID = 0
3,784,110 ready_for_fw is high
3,784,295 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,888,340 UART: [idev] Erasing UDS.KEYID = 0
6,261,870 UART: [idev] Sha1 KeyId Algorithm
6,286,101 UART: [idev] --
6,291,124 UART: [ldev] ++
6,291,753 UART: [ldev] CDI.KEYID = 6
6,292,671 UART: [ldev] SUBJECT.KEYID = 5
6,293,885 UART: [ldev] AUTHORITY.KEYID = 7
6,295,118 UART: [ldev] FE.KEYID = 1
6,306,524 UART: [ldev] Erasing FE.KEYID = 1
8,789,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,325 UART: [ldev] --
10,581,213 UART: [fwproc] Wait for Commands...
10,583,131 UART: [fwproc] Recv command 0x46574c44
10,585,180 UART: [fwproc] Recv'd Img size: 82832 bytes
13,633,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,710,166 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,783,165 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,986,199 >>> mbox cmd response: success
13,986,738 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,991,198 UART: [afmc] ++
13,991,829 UART: [afmc] CDI.KEYID = 6
13,992,761 UART: [afmc] SUBJECT.KEYID = 7
13,993,979 UART: [afmc] AUTHORITY.KEYID = 5
16,501,222 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,224,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,226,458 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,242,278 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,258,377 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,273,972 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,297,748 UART: [afmc] --
18,301,179 UART: [cold-reset] --
18,304,068 UART: [state] Locking Datavault
18,310,078 UART: [state] Locking PCR0, PCR1 and PCR31
18,311,837 UART: [state] Locking ICCM
18,312,963 UART: [exit] Launching FMC @ 0x40000130
18,321,362 UART:
18,321,598 UART: Running Caliptra FMC ...
18,322,725 UART:
18,322,888 UART: [state] CFI Enabled
18,330,964 UART: [fht] FMC Alias Private Key: 7
20,096,934 UART: [art] Extend RT PCRs Done
20,098,817 UART: [art] Lock RT PCRs Done
20,099,872 UART: [art] Populate DV Done
20,105,697 UART: [fht] FMC Alias Private Key: 7
20,107,374 UART: [art] Derive CDI
20,108,143 UART: [art] Store in slot 0x4
20,150,754 UART: [art] Derive Key Pair
20,151,756 UART: [art] Store priv key in slot 0x5
22,578,739 UART: [art] Derive Key Pair - Done
22,591,735 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,297,950 UART: [art] Erasing AUTHORITY.KEYID = 7
24,299,452 UART: [art] PUB.X = E37F37035E735AED4EEBC7326521D1B3B9F68FD0C0583F2576757AEA5C1E5A6E360F582686649C1745253260E5D8590F
24,306,689 UART: [art] PUB.Y = 2B1CA56AD6AFF179834D4C26C9001584040870F8113E523D80092A4C156F7E5001D2E859DC18E2240525CA3BA2CB4A1F
24,313,936 UART: [art] SIG.R = 5FC2F55DB9E101FD80869BB88B773B11990C98439BB48FA4B994031DBBD58AD9BDC660F17CF9B0A0FBEF733ADC74DBB2
24,321,323 UART: [art] SIG.S = A755BAD8E8E18B1735ABCAE692C0E85F2BA3CEB0A389E95B681CD90FD568DB196FBA282A57E0886652A6D6769ED60263
25,299,761 UART: mbox::rt_entry...
25,300,712 UART: ____ _ _ _ ____ _____
25,302,640 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,304,645 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,306,501 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,308,428 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,310,279 UART: |_|
25,311,102 UART:
25,442,479 UART: [rt] Runtime listening for mailbox commands...
25,444,643 >>> mbox cmd response data (48 bytes)
25,445,258 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,447,598 >>> mbox cmd response data (48 bytes)
25,448,453 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,464,037 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,779,388 ready_for_fw is high
3,779,775 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,870,224 >>> mbox cmd response: success
13,871,092 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,117,190 UART:
18,117,578 UART: Running Caliptra FMC ...
18,118,677 UART:
18,118,834 UART: [state] CFI Enabled
18,126,656 UART: [fht] FMC Alias Private Key: 7
19,893,168 UART: [art] Extend RT PCRs Done
19,894,391 UART: [art] Lock RT PCRs Done
19,895,645 UART: [art] Populate DV Done
19,900,952 UART: [fht] FMC Alias Private Key: 7
19,902,660 UART: [art] Derive CDI
19,903,474 UART: [art] Store in slot 0x4
19,946,178 UART: [art] Derive Key Pair
19,947,483 UART: [art] Store priv key in slot 0x5
22,373,995 UART: [art] Derive Key Pair - Done
22,386,984 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,092,638 UART: [art] Erasing AUTHORITY.KEYID = 7
24,094,142 UART: [art] PUB.X = 06886E9710F694370FDEE82568657BEFFEFE4C7D5EED26525B6C45DB301A3FBD6B4DAECDFA817B2EC0F5BD46159345E0
24,101,407 UART: [art] PUB.Y = 81A0DD1A41FF6A4007C6596B654D77A1658CFFAC1413B9A742587BF0F10B8226864D040287B3B06FF4CF390516960E4F
24,108,677 UART: [art] SIG.R = 3F5B2A8037AC3E0CE1D97615AED578DA07C163F4F44BDE61CF942E885FB7CA3E16F6E4FBD475EC91A3FC90A2FC9A2072
24,116,094 UART: [art] SIG.S = C9F8BF15821F0457F3D6C8FC2C457CAB4CE05F599648A4F92011F5A20F3BE3BCDF8E44301828A87C5E53862E376D80BA
25,095,254 UART: mbox::rt_entry...
25,096,208 UART: ____ _ _ _ ____ _____
25,098,141 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,100,151 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,102,006 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,104,006 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,105,868 UART: |_|
25,106,692 UART:
25,238,139 UART: [rt] Runtime listening for mailbox commands...
25,240,313 >>> mbox cmd response data (48 bytes)
25,240,915 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,243,240 >>> mbox cmd response data (48 bytes)
25,244,091 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,259,658 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
191,982 UART:
192,394 UART: Running Caliptra ROM ...
193,560 UART:
193,717 UART: [state] CFI Enabled
260,725 UART: [state] LifecycleState = Unprovisioned
263,090 UART: [state] DebugLocked = No
265,470 UART: [state] WD Timer not started. Device not locked for debugging
269,967 UART: [kat] SHA2-256
459,868 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,618 UART: [kat] ++
471,114 UART: [kat] sha1
483,336 UART: [kat] SHA2-256
486,346 UART: [kat] SHA2-384
491,764 UART: [kat] SHA2-512-ACC
494,341 UART: [kat] ECC-384
2,942,423 UART: [kat] HMAC-384Kdf
2,968,916 UART: [kat] LMS
3,500,702 UART: [kat] --
3,506,450 UART: [cold-reset] ++
3,508,310 UART: [fht] FHT @ 0x50003400
3,518,357 UART: [idev] ++
3,519,055 UART: [idev] CDI.KEYID = 6
3,520,009 UART: [idev] SUBJECT.KEYID = 7
3,521,250 UART: [idev] UDS.KEYID = 0
3,522,148 ready_for_fw is high
3,522,364 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,626,815 UART: [idev] Erasing UDS.KEYID = 0
6,025,657 UART: [idev] Sha1 KeyId Algorithm
6,047,543 UART: [idev] --
6,052,922 UART: [ldev] ++
6,053,611 UART: [ldev] CDI.KEYID = 6
6,054,523 UART: [ldev] SUBJECT.KEYID = 5
6,055,678 UART: [ldev] AUTHORITY.KEYID = 7
6,056,910 UART: [ldev] FE.KEYID = 1
6,096,848 UART: [ldev] Erasing FE.KEYID = 1
8,605,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,201 UART: [ldev] --
10,410,297 UART: [fwproc] Wait for Commands...
10,413,252 UART: [fwproc] Recv command 0x46574c44
10,415,555 UART: [fwproc] Recv'd Img size: 82832 bytes
13,484,788 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,566,491 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,690,144 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,036,589 >>> mbox cmd response: success
14,037,626 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
14,040,351 UART: [afmc] ++
14,041,066 UART: [afmc] CDI.KEYID = 6
14,042,314 UART: [afmc] SUBJECT.KEYID = 7
14,043,751 UART: [afmc] AUTHORITY.KEYID = 5
16,569,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,294,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,296,919 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,311,982 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,327,136 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,342,057 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,366,074 UART: [afmc] --
18,369,299 UART: [cold-reset] --
18,373,538 UART: [state] Locking Datavault
18,380,074 UART: [state] Locking PCR0, PCR1 and PCR31
18,382,258 UART: [state] Locking ICCM
18,384,600 UART: [exit] Launching FMC @ 0x40000130
18,393,261 UART:
18,393,520 UART: Running Caliptra FMC ...
18,394,623 UART:
18,394,778 UART: [state] CFI Enabled
18,450,536 UART: [fht] FMC Alias Private Key: 7
20,216,922 UART: [art] Extend RT PCRs Done
20,218,147 UART: [art] Lock RT PCRs Done
20,219,958 UART: [art] Populate DV Done
20,225,361 UART: [fht] FMC Alias Private Key: 7
20,226,837 UART: [art] Derive CDI
20,227,570 UART: [art] Store in slot 0x4
20,282,956 UART: [art] Derive Key Pair
20,283,998 UART: [art] Store priv key in slot 0x5
22,746,607 UART: [art] Derive Key Pair - Done
22,759,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,472,127 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,619 UART: [art] PUB.X = 6D000985C37DF5E659E64ECCF358E56212E57B75277DAD62AF1C1E628A1F61CCA465FC8820802DB799428FB13D87677C
24,480,905 UART: [art] PUB.Y = CCB02F2EF089AFC0E84ACAF14B82EB2286706230FB9AB59649C6E646A483C6136501332731A8049765372402BCC517C7
24,488,104 UART: [art] SIG.R = 96909721971DC51A0D161C116B6A6CF33D7E6C968C48F012FF0DF277F8135B82D84464DC7D19FACD15FC2C561CFB8239
24,495,486 UART: [art] SIG.S = B912D31000A7A13DB7F03B7C283196EB24183878B21DA68B6460AE4C698F0BBDF6AB97666FDDD8F22D778EBF93087666
25,474,200 UART: mbox::rt_entry...
25,475,171 UART: ____ _ _ _ ____ _____
25,477,099 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,479,106 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,480,959 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,482,883 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,484,810 UART: |_|
25,485,792 UART:
25,616,531 UART: [rt] Runtime listening for mailbox commands...
25,618,694 >>> mbox cmd response data (48 bytes)
25,619,306 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,621,719 >>> mbox cmd response data (48 bytes)
25,622,548 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,638,145 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,440,261 ready_for_fw is high
3,440,802 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,066,265 >>> mbox cmd response: success
14,067,482 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,346,508 UART:
18,346,917 UART: Running Caliptra FMC ...
18,348,104 UART:
18,348,270 UART: [state] CFI Enabled
18,414,764 UART: [fht] FMC Alias Private Key: 7
20,181,465 UART: [art] Extend RT PCRs Done
20,182,683 UART: [art] Lock RT PCRs Done
20,184,251 UART: [art] Populate DV Done
20,189,819 UART: [fht] FMC Alias Private Key: 7
20,191,421 UART: [art] Derive CDI
20,192,235 UART: [art] Store in slot 0x4
20,247,800 UART: [art] Derive Key Pair
20,248,833 UART: [art] Store priv key in slot 0x5
22,711,760 UART: [art] Derive Key Pair - Done
22,724,974 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,437,664 UART: [art] Erasing AUTHORITY.KEYID = 7
24,439,162 UART: [art] PUB.X = 2694237E07B257BF1C32497E542BCA033D36FB0F245F27348D25B8188553B32B41B68B47A24AE6DD10CBEE1D77327E08
24,446,484 UART: [art] PUB.Y = 6E9D64DC06305D6A92E6F4B197656902B62080E11BD5914A4EC6F303251DB1CA6AB7567D54EC67CB8AABE9D9E11056BC
24,453,750 UART: [art] SIG.R = E052A376293B47604B85A35AAC01B68749ECEF16E8A8AC922EA251312D26EABC7F1B51E44F6FFED5EFBE8E19959929EB
24,461,107 UART: [art] SIG.S = E42B636D4F882FAAC6F7F81EE59CC280CD1901D08EB10C4A6E0077FE26C2F145053F76C327523E8F6054468554CDE822
25,439,647 UART: mbox::rt_entry...
25,440,602 UART: ____ _ _ _ ____ _____
25,442,526 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,444,524 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,446,377 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,448,355 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,450,208 UART: |_|
25,451,007 UART:
25,581,976 UART: [rt] Runtime listening for mailbox commands...
25,584,094 >>> mbox cmd response data (48 bytes)
25,584,694 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,587,011 >>> mbox cmd response data (48 bytes)
25,587,881 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,603,462 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,452 UART:
192,834 UART: Running Caliptra ROM ...
194,021 UART:
603,504 UART: [state] CFI Enabled
615,961 UART: [state] LifecycleState = Unprovisioned
618,297 UART: [state] DebugLocked = No
619,975 UART: [state] WD Timer not started. Device not locked for debugging
623,670 UART: [kat] SHA2-256
813,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,142 UART: [kat] ++
824,667 UART: [kat] sha1
835,184 UART: [kat] SHA2-256
838,195 UART: [kat] SHA2-384
844,903 UART: [kat] SHA2-512-ACC
847,495 UART: [kat] ECC-384
3,288,189 UART: [kat] HMAC-384Kdf
3,301,486 UART: [kat] LMS
3,833,367 UART: [kat] --
3,839,136 UART: [cold-reset] ++
3,840,358 UART: [fht] FHT @ 0x50003400
3,852,003 UART: [idev] ++
3,852,742 UART: [idev] CDI.KEYID = 6
3,853,632 UART: [idev] SUBJECT.KEYID = 7
3,854,884 UART: [idev] UDS.KEYID = 0
3,855,790 ready_for_fw is high
3,855,989 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,960,070 UART: [idev] Erasing UDS.KEYID = 0
6,339,004 UART: [idev] Sha1 KeyId Algorithm
6,362,081 UART: [idev] --
6,367,702 UART: [ldev] ++
6,368,385 UART: [ldev] CDI.KEYID = 6
6,369,269 UART: [ldev] SUBJECT.KEYID = 5
6,370,483 UART: [ldev] AUTHORITY.KEYID = 7
6,371,719 UART: [ldev] FE.KEYID = 1
6,382,432 UART: [ldev] Erasing FE.KEYID = 1
8,859,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,939 UART: [ldev] --
10,650,217 UART: [fwproc] Wait for Commands...
10,653,288 UART: [fwproc] Recv command 0x46574c44
10,655,598 UART: [fwproc] Recv'd Img size: 82832 bytes
13,712,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,788,263 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,911,877 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,257,358 >>> mbox cmd response: success
14,258,383 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
14,261,985 UART: [afmc] ++
14,262,695 UART: [afmc] CDI.KEYID = 6
14,263,811 UART: [afmc] SUBJECT.KEYID = 7
14,265,361 UART: [afmc] AUTHORITY.KEYID = 5
16,766,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,491,001 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,492,972 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,508,077 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,523,212 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,538,110 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,561,309 UART: [afmc] --
18,564,760 UART: [cold-reset] --
18,569,443 UART: [state] Locking Datavault
18,573,676 UART: [state] Locking PCR0, PCR1 and PCR31
18,575,822 UART: [state] Locking ICCM
18,578,574 UART: [exit] Launching FMC @ 0x40000130
18,587,196 UART:
18,587,441 UART: Running Caliptra FMC ...
18,588,550 UART:
18,588,710 UART: [state] CFI Enabled
18,596,892 UART: [fht] FMC Alias Private Key: 7
20,363,676 UART: [art] Extend RT PCRs Done
20,364,899 UART: [art] Lock RT PCRs Done
20,366,173 UART: [art] Populate DV Done
20,371,811 UART: [fht] FMC Alias Private Key: 7
20,373,405 UART: [art] Derive CDI
20,374,149 UART: [art] Store in slot 0x4
20,416,853 UART: [art] Derive Key Pair
20,417,896 UART: [art] Store priv key in slot 0x5
22,844,817 UART: [art] Derive Key Pair - Done
22,857,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,563,739 UART: [art] Erasing AUTHORITY.KEYID = 7
24,565,244 UART: [art] PUB.X = ABAB864C2D7F1E6B2BBEF5621F666FBF138AB1BBB6ABC8C33D104A2791C0213C0447B33403763975A2F163C698F18BF6
24,572,498 UART: [art] PUB.Y = 7248A4C4286B9183ED49E38CF16DD9B614EAADFF3C5D7C883B7E760858320472D4E200E3A34BC65743D9E5EB9CFBC073
24,579,795 UART: [art] SIG.R = ABDC64287967C01AC3AAB905C916E3D4E457CDB73115F8936EEE532B2F0855D95607E71087A418DE82D94934D3021CC3
24,587,165 UART: [art] SIG.S = 19257130B56742789D45485E1DFA55DFA54046BDD2BA11DD989DC96AAB26CA0F950C9FADAA2CE9F9EAFCD854B50F856E
25,565,691 UART: mbox::rt_entry...
25,566,664 UART: ____ _ _ _ ____ _____
25,568,595 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,570,616 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,572,480 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,574,419 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,576,360 UART: |_|
25,577,170 UART:
25,708,791 UART: [rt] Runtime listening for mailbox commands...
25,710,967 >>> mbox cmd response data (48 bytes)
25,711,561 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,713,885 >>> mbox cmd response data (48 bytes)
25,714,731 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,730,339 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,754,267 ready_for_fw is high
3,754,694 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,291,702 >>> mbox cmd response: success
14,292,829 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,550,377 UART:
18,550,781 UART: Running Caliptra FMC ...
18,551,924 UART:
18,552,092 UART: [state] CFI Enabled
18,560,032 UART: [fht] FMC Alias Private Key: 7
20,326,376 UART: [art] Extend RT PCRs Done
20,327,612 UART: [art] Lock RT PCRs Done
20,328,920 UART: [art] Populate DV Done
20,334,289 UART: [fht] FMC Alias Private Key: 7
20,335,893 UART: [art] Derive CDI
20,336,717 UART: [art] Store in slot 0x4
20,379,212 UART: [art] Derive Key Pair
20,380,263 UART: [art] Store priv key in slot 0x5
22,807,467 UART: [art] Derive Key Pair - Done
22,820,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,526,641 UART: [art] Erasing AUTHORITY.KEYID = 7
24,528,152 UART: [art] PUB.X = 3676B3E895A89F54D96F2EE4BB9677CB5046088421F8607B89A09DE87786CAB7DD0CCEED4B870E562F9EBC081027104B
24,535,414 UART: [art] PUB.Y = 14CD792713EEC3F4EF9E4894D2C0A05CEC88BE5D6670310A8BFE562F40A3EDD2220B8B25F0BA2B2581356AC59832EED3
24,542,657 UART: [art] SIG.R = 04CC95E8C67FFDD717B95C37A0F69A856FC6A625F07C6924FC37291DDDBB62AF8BF903A33BA7F2286DE2337AC084BC98
24,550,108 UART: [art] SIG.S = CCD47CBB1159C9D2E0F88718DC3CF9605381B160ED656376AF2A36AEBF6DA723FA8B37E86DFD2ED4ADBE57670342D1D3
25,529,017 UART: mbox::rt_entry...
25,529,973 UART: ____ _ _ _ ____ _____
25,531,959 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,533,970 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,535,906 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,537,896 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,540,032 UART: |_|
25,540,854 UART:
25,671,262 UART: [rt] Runtime listening for mailbox commands...
25,673,427 >>> mbox cmd response data (48 bytes)
25,674,037 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,676,468 >>> mbox cmd response data (48 bytes)
25,677,313 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,692,917 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,532 UART: [state] LifecycleState = Unprovisioned
86,187 UART: [state] DebugLocked = No
86,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,495 UART: [kat] SHA2-256
882,426 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,541 UART: [kat] ++
886,693 UART: [kat] sha1
890,945 UART: [kat] SHA2-256
892,883 UART: [kat] SHA2-384
895,594 UART: [kat] SHA2-512-ACC
897,495 UART: [kat] ECC-384
903,328 UART: [kat] HMAC-384Kdf
907,954 UART: [kat] LMS
1,476,150 UART: [kat] --
1,476,873 UART: [cold-reset] ++
1,477,369 UART: [fht] Storing FHT @ 0x50003400
1,480,086 UART: [idev] ++
1,480,254 UART: [idev] CDI.KEYID = 6
1,480,614 UART: [idev] SUBJECT.KEYID = 7
1,481,038 UART: [idev] UDS.KEYID = 0
1,481,383 ready_for_fw is high
1,481,383 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,489,232 UART: [idev] Erasing UDS.KEYID = 0
1,506,074 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,660 UART: [idev] --
1,515,849 UART: [ldev] ++
1,516,017 UART: [ldev] CDI.KEYID = 6
1,516,380 UART: [ldev] SUBJECT.KEYID = 5
1,516,806 UART: [ldev] AUTHORITY.KEYID = 7
1,517,269 UART: [ldev] FE.KEYID = 1
1,522,413 UART: [ldev] Erasing FE.KEYID = 1
1,548,108 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,880 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,844 UART: [fwproc] Received command 0x46574c44
1,588,635 UART: [fwproc] Received Image of size 82832 bytes
2,524,856 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,551,888 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,583,106 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,669,825 >>> mbox cmd response: success
2,669,825 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,671,009 UART: [afmc] ++
2,671,177 UART: [afmc] CDI.KEYID = 6
2,671,539 UART: [afmc] SUBJECT.KEYID = 7
2,671,964 UART: [afmc] AUTHORITY.KEYID = 5
2,707,279 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,723,345 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,724,125 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,729,834 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,735,717 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,741,400 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,749,290 UART: [afmc] --
2,750,316 UART: [cold-reset] --
2,751,350 UART: [state] Locking Datavault
2,752,409 UART: [state] Locking PCR0, PCR1 and PCR31
2,753,013 UART: [state] Locking ICCM
2,753,641 UART: [exit] Launching FMC @ 0x40000130
2,758,971 UART:
2,758,987 UART: Running Caliptra FMC ...
2,759,395 UART:
2,759,449 UART: [state] CFI Enabled
2,769,633 UART: [fht] FMC Alias Private Key: 7
2,888,119 UART: [art] Extend RT PCRs Done
2,888,547 UART: [art] Lock RT PCRs Done
2,890,045 UART: [art] Populate DV Done
2,898,350 UART: [fht] FMC Alias Private Key: 7
2,899,450 UART: [art] Derive CDI
2,899,730 UART: [art] Store in slot 0x4
2,985,404 UART: [art] Derive Key Pair
2,985,764 UART: [art] Store priv key in slot 0x5
2,998,683 UART: [art] Derive Key Pair - Done
3,013,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,084 UART: [art] PUB.X = 46290587D53B9A82F4D0205FEB094129A0C839770632B5E2ED2E305E2F95DD1BE26B3532D2265E250B375A11956D06FE
3,036,835 UART: [art] PUB.Y = CF89B70B6874180C671930DD649F81E1D809FA320BA2CE61E6DBA0A71B30323843F98D7384B2BD26E6E092345B092374
3,043,768 UART: [art] SIG.R = D333228AC39F007612C3B1BF153B4EABFA65D586A9BBF22E1449C1D8FC643B38892CB9BCC215109B22234BA816DAA4DB
3,050,530 UART: [art] SIG.S = C4E0CE8073AA429D224D478261D8E09861C52C342BB4E44F1CF1F3F7D7B88CC3CEE67F402125593570576A1C1E5DE6BB
3,075,004 UART: mbox::rt_entry...
3,075,376 UART: ____ _ _ _ ____ _____
3,076,160 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,076,960 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,077,728 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,078,496 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,079,264 UART: |_|
3,079,576 UART:
3,197,992 UART: [rt] Runtime listening for mailbox commands...
3,199,181 >>> mbox cmd response data (48 bytes)
3,199,182 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,201,969 >>> mbox cmd response data (48 bytes)
3,201,970 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,217,916 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,723 ready_for_fw is high
1,362,723 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,224 >>> mbox cmd response: success
2,518,224 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,579,485 UART:
2,579,501 UART: Running Caliptra FMC ...
2,579,909 UART:
2,579,963 UART: [state] CFI Enabled
2,590,303 UART: [fht] FMC Alias Private Key: 7
2,709,617 UART: [art] Extend RT PCRs Done
2,710,045 UART: [art] Lock RT PCRs Done
2,711,621 UART: [art] Populate DV Done
2,719,896 UART: [fht] FMC Alias Private Key: 7
2,720,944 UART: [art] Derive CDI
2,721,224 UART: [art] Store in slot 0x4
2,807,160 UART: [art] Derive Key Pair
2,807,520 UART: [art] Store priv key in slot 0x5
2,820,695 UART: [art] Derive Key Pair - Done
2,835,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,850,442 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,207 UART: [art] PUB.X = 1BDEC6672548956EBA154F37771CC15C41342173204C2AA37CCDC1A895A0B038046903DDCAF0F167FA4E56AED2197AF8
2,857,979 UART: [art] PUB.Y = 85FBB9235D703EA2A3106E82FDD9FB2434B3DFC32F84B858914BBE3753F17477CF6870AE0E20996AB6CA48158D67D10F
2,864,931 UART: [art] SIG.R = 33587D35D58CAE98158B3982AE25EA42F02C1B6C9CDEE2C70FD00408BDEE0AB1B1A70B9EAF66589576ED765DDBC7277A
2,871,704 UART: [art] SIG.S = F0F00D9BFB7EC2622DC70A7829A45B26A4F120135F96B20F8E48FB3ACD61D84594D1CEE099DF6E636CB010701A43BA4E
2,894,983 UART: mbox::rt_entry...
2,895,355 UART: ____ _ _ _ ____ _____
2,896,139 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,896,939 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,897,707 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,898,475 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,899,243 UART: |_|
2,899,555 UART:
3,018,564 UART: [rt] Runtime listening for mailbox commands...
3,019,753 >>> mbox cmd response data (48 bytes)
3,019,754 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,022,541 >>> mbox cmd response data (48 bytes)
3,022,542 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,038,488 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,624 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,154 UART: [kat] SHA2-256
882,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,200 UART: [kat] ++
886,352 UART: [kat] sha1
890,666 UART: [kat] SHA2-256
892,604 UART: [kat] SHA2-384
895,289 UART: [kat] SHA2-512-ACC
897,190 UART: [kat] ECC-384
902,763 UART: [kat] HMAC-384Kdf
907,437 UART: [kat] LMS
1,475,633 UART: [kat] --
1,476,172 UART: [cold-reset] ++
1,476,580 UART: [fht] Storing FHT @ 0x50003400
1,479,157 UART: [idev] ++
1,479,325 UART: [idev] CDI.KEYID = 6
1,479,685 UART: [idev] SUBJECT.KEYID = 7
1,480,109 UART: [idev] UDS.KEYID = 0
1,480,454 ready_for_fw is high
1,480,454 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,275 UART: [idev] Erasing UDS.KEYID = 0
1,505,015 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,765 UART: [idev] --
1,514,878 UART: [ldev] ++
1,515,046 UART: [ldev] CDI.KEYID = 6
1,515,409 UART: [ldev] SUBJECT.KEYID = 5
1,515,835 UART: [ldev] AUTHORITY.KEYID = 7
1,516,298 UART: [ldev] FE.KEYID = 1
1,521,492 UART: [ldev] Erasing FE.KEYID = 1
1,546,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,357 UART: [ldev] --
1,585,814 UART: [fwproc] Waiting for Commands...
1,586,513 UART: [fwproc] Received command 0x46574c44
1,587,304 UART: [fwproc] Received Image of size 82832 bytes
2,522,729 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,549,281 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,580,499 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,667,374 >>> mbox cmd response: success
2,667,374 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,668,448 UART: [afmc] ++
2,668,616 UART: [afmc] CDI.KEYID = 6
2,668,978 UART: [afmc] SUBJECT.KEYID = 7
2,669,403 UART: [afmc] AUTHORITY.KEYID = 5
2,703,942 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,720,252 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,721,032 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,726,741 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,732,624 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,738,307 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,746,189 UART: [afmc] --
2,747,289 UART: [cold-reset] --
2,747,985 UART: [state] Locking Datavault
2,749,326 UART: [state] Locking PCR0, PCR1 and PCR31
2,749,930 UART: [state] Locking ICCM
2,750,384 UART: [exit] Launching FMC @ 0x40000130
2,755,714 UART:
2,755,730 UART: Running Caliptra FMC ...
2,756,138 UART:
2,756,281 UART: [state] CFI Enabled
2,766,761 UART: [fht] FMC Alias Private Key: 7
2,885,573 UART: [art] Extend RT PCRs Done
2,886,001 UART: [art] Lock RT PCRs Done
2,887,433 UART: [art] Populate DV Done
2,895,482 UART: [fht] FMC Alias Private Key: 7
2,896,536 UART: [art] Derive CDI
2,896,816 UART: [art] Store in slot 0x4
2,982,568 UART: [art] Derive Key Pair
2,982,928 UART: [art] Store priv key in slot 0x5
2,995,389 UART: [art] Derive Key Pair - Done
3,010,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,501 UART: [art] PUB.X = F0235CFBBD894CC8DAA7C28D9F391477DAB9E36757CAC2EDE2A303130AC31CFE767CEB94509468BF5D5FB52D07D83F89
3,033,282 UART: [art] PUB.Y = C33DD8980F4945F0211513E63FC0EC68FD3891C29BBF719EFE17F52179017FFEE8873761231AC67C268AD6DED2B4FF5F
3,040,236 UART: [art] SIG.R = 98F110DCF6C1EA12BDC20223BD827D11288E28A12CCB5DA083BE6E9E5887A5A5753A41B048E0077B0C210033F067E6C3
3,046,981 UART: [art] SIG.S = E3DC02047066CA752BB8A38F66B5983A2CC6494C58A018274E2B5B3B5E7E5DD7AD17A199B97D82B914C58D4EE9E39C81
3,070,489 UART: mbox::rt_entry...
3,070,861 UART: ____ _ _ _ ____ _____
3,071,645 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,072,445 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,073,213 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,073,981 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,074,749 UART: |_|
3,075,061 UART:
3,192,909 UART: [rt] Runtime listening for mailbox commands...
3,194,098 >>> mbox cmd response data (48 bytes)
3,194,099 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,196,886 >>> mbox cmd response data (48 bytes)
3,196,887 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,212,833 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,210 ready_for_fw is high
1,363,210 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,519,478 >>> mbox cmd response: success
2,519,478 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,581,233 UART:
2,581,249 UART: Running Caliptra FMC ...
2,581,657 UART:
2,581,800 UART: [state] CFI Enabled
2,592,356 UART: [fht] FMC Alias Private Key: 7
2,711,244 UART: [art] Extend RT PCRs Done
2,711,672 UART: [art] Lock RT PCRs Done
2,713,306 UART: [art] Populate DV Done
2,721,631 UART: [fht] FMC Alias Private Key: 7
2,722,673 UART: [art] Derive CDI
2,722,953 UART: [art] Store in slot 0x4
2,808,639 UART: [art] Derive Key Pair
2,808,999 UART: [art] Store priv key in slot 0x5
2,822,386 UART: [art] Derive Key Pair - Done
2,837,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,852,828 UART: [art] Erasing AUTHORITY.KEYID = 7
2,853,593 UART: [art] PUB.X = 346EA738DCC1588D80430AA69D78F1E28D107A0DC06EAA953579F521BD3C0E11CD3DCBB3AEC737356387DA7E9A7DF4A0
2,860,370 UART: [art] PUB.Y = 00A58BA507CA1D736EACF4BEA2DEDCF9B1C8C85FB410DCBFF36F5BF195B69BE1188C550D29FB1505283A218B9120B1CD
2,867,313 UART: [art] SIG.R = E0AFF5BB9E399B91902CF1F89268EF5B2EFAC62044D28E5215147B4179773ACC4F2CE7444630E5C6DA36B8983789128C
2,874,087 UART: [art] SIG.S = A710639E092E5DF050E6DB56DB47A90FD4D555F556F7AA56A37FA2A04B06F2C3A3AD1E1983069D388D2FB6D1BB6DC95F
2,897,687 UART: mbox::rt_entry...
2,898,059 UART: ____ _ _ _ ____ _____
2,898,843 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,899,643 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,900,411 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,901,179 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,901,947 UART: |_|
2,902,259 UART:
3,021,465 UART: [rt] Runtime listening for mailbox commands...
3,022,654 >>> mbox cmd response data (48 bytes)
3,022,655 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,025,442 >>> mbox cmd response data (48 bytes)
3,025,443 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,041,389 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
891,512 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,616 UART: [kat] ++
895,768 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,591 UART: [kat] SHA2-512-ACC
906,492 UART: [kat] ECC-384
916,105 UART: [kat] HMAC-384Kdf
920,821 UART: [kat] LMS
1,169,133 UART: [kat] --
1,170,328 UART: [cold-reset] ++
1,170,900 UART: [fht] FHT @ 0x50003400
1,173,624 UART: [idev] ++
1,173,792 UART: [idev] CDI.KEYID = 6
1,174,153 UART: [idev] SUBJECT.KEYID = 7
1,174,578 UART: [idev] UDS.KEYID = 0
1,174,924 ready_for_fw is high
1,174,924 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,515 UART: [idev] Erasing UDS.KEYID = 0
1,199,637 UART: [idev] Sha1 KeyId Algorithm
1,208,621 UART: [idev] --
1,209,650 UART: [ldev] ++
1,209,818 UART: [ldev] CDI.KEYID = 6
1,210,182 UART: [ldev] SUBJECT.KEYID = 5
1,210,609 UART: [ldev] AUTHORITY.KEYID = 7
1,211,072 UART: [ldev] FE.KEYID = 1
1,216,262 UART: [ldev] Erasing FE.KEYID = 1
1,242,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,952 UART: [ldev] --
1,281,361 UART: [fwproc] Wait for Commands...
1,282,176 UART: [fwproc] Recv command 0x46574c44
1,282,909 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,352 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,527 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,294 >>> mbox cmd response: success
2,363,294 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,364,482 UART: [afmc] ++
2,364,650 UART: [afmc] CDI.KEYID = 6
2,365,013 UART: [afmc] SUBJECT.KEYID = 7
2,365,439 UART: [afmc] AUTHORITY.KEYID = 5
2,400,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,840 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,550 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,431 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,132 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,963 UART: [afmc] --
2,443,976 UART: [cold-reset] --
2,444,806 UART: [state] Locking Datavault
2,446,101 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,705 UART: [state] Locking ICCM
2,447,347 UART: [exit] Launching FMC @ 0x40000130
2,452,677 UART:
2,452,693 UART: Running Caliptra FMC ...
2,453,101 UART:
2,453,155 UART: [state] CFI Enabled
2,463,773 UART: [fht] FMC Alias Private Key: 7
2,582,449 UART: [art] Extend RT PCRs Done
2,582,877 UART: [art] Lock RT PCRs Done
2,584,407 UART: [art] Populate DV Done
2,592,578 UART: [fht] FMC Alias Private Key: 7
2,593,524 UART: [art] Derive CDI
2,593,804 UART: [art] Store in slot 0x4
2,679,627 UART: [art] Derive Key Pair
2,679,987 UART: [art] Store priv key in slot 0x5
2,693,135 UART: [art] Derive Key Pair - Done
2,707,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,701 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,466 UART: [art] PUB.X = B994D804A2E360F8CDCC300860930DE7A0753812C01BA114DAF93992725079C36A8930E6FFDA360595DD8FDDD210C9A4
2,731,228 UART: [art] PUB.Y = 82FF7036362C27C35F36E69C1E99F8B428222523B82157DF07B0EF235E094533DE3F1692A9B8B56B607E3CBBCDBB0613
2,738,171 UART: [art] SIG.R = C76097B21DD993EEE2B4F44A146561F5C86051482C086780D65C9CB301142C1CC5768619E0CDB9540A65741BF70164AA
2,744,925 UART: [art] SIG.S = DD5BB8659517D65143308FA33F3ECBE3D683FF31F8812F99853B30047705EF9873FAAE1EDB711EA29F85666149C847CD
2,768,417 UART: mbox::rt_entry...
2,768,789 UART: ____ _ _ _ ____ _____
2,769,573 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,373 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,141 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,771,909 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,677 UART: |_|
2,772,989 UART:
2,891,404 UART: [rt] Runtime listening for mailbox commands...
2,892,593 >>> mbox cmd response data (48 bytes)
2,892,594 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,895,381 >>> mbox cmd response data (48 bytes)
2,895,382 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,911,328 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,798 ready_for_fw is high
1,059,798 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,121 >>> mbox cmd response: success
2,216,121 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,278,236 UART:
2,278,252 UART: Running Caliptra FMC ...
2,278,660 UART:
2,278,714 UART: [state] CFI Enabled
2,289,596 UART: [fht] FMC Alias Private Key: 7
2,408,354 UART: [art] Extend RT PCRs Done
2,408,782 UART: [art] Lock RT PCRs Done
2,410,146 UART: [art] Populate DV Done
2,418,483 UART: [fht] FMC Alias Private Key: 7
2,419,487 UART: [art] Derive CDI
2,419,767 UART: [art] Store in slot 0x4
2,505,326 UART: [art] Derive Key Pair
2,505,686 UART: [art] Store priv key in slot 0x5
2,519,328 UART: [art] Derive Key Pair - Done
2,534,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,549,693 UART: [art] Erasing AUTHORITY.KEYID = 7
2,550,458 UART: [art] PUB.X = FB67F1CFF9D2D2AECA63F681EF30A8C4683A457EAAA9680753370313A51B06DB3E77F89D5FBEC1C43186115680175494
2,557,225 UART: [art] PUB.Y = 60E95F4C388A853AA9F9828C184ECD4CBF0D2CF84AB514EFEFC0E24F5B740AC2FBF04AF031FEB2CC36699566D6E1CBA5
2,564,195 UART: [art] SIG.R = 798253ECFC8B60B7A5842C695545C397B191E703AAF2FDF5BC53A287016CA1C7970B24DCFCB8658282F16D0B34CA6A60
2,570,961 UART: [art] SIG.S = EFFA875D9161EFB451512979953ACAA2378BDECCCD07E74E8D1905DBA7E5E7A7CCDE932E7C08AEBC737F52F89124A81F
2,594,878 UART: mbox::rt_entry...
2,595,250 UART: ____ _ _ _ ____ _____
2,596,034 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,596,834 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,597,602 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,598,370 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,138 UART: |_|
2,599,450 UART:
2,717,874 UART: [rt] Runtime listening for mailbox commands...
2,719,063 >>> mbox cmd response data (48 bytes)
2,719,064 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,721,851 >>> mbox cmd response data (48 bytes)
2,721,852 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,737,798 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,963 UART: [state] LifecycleState = Unprovisioned
86,618 UART: [state] DebugLocked = No
87,240 UART: [state] WD Timer not started. Device not locked for debugging
88,525 UART: [kat] SHA2-256
892,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,179 UART: [kat] ++
896,331 UART: [kat] sha1
900,571 UART: [kat] SHA2-256
902,511 UART: [kat] SHA2-384
905,392 UART: [kat] SHA2-512-ACC
907,293 UART: [kat] ECC-384
917,364 UART: [kat] HMAC-384Kdf
922,086 UART: [kat] LMS
1,170,398 UART: [kat] --
1,171,207 UART: [cold-reset] ++
1,171,773 UART: [fht] FHT @ 0x50003400
1,174,401 UART: [idev] ++
1,174,569 UART: [idev] CDI.KEYID = 6
1,174,930 UART: [idev] SUBJECT.KEYID = 7
1,175,355 UART: [idev] UDS.KEYID = 0
1,175,701 ready_for_fw is high
1,175,701 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,174 UART: [idev] Erasing UDS.KEYID = 0
1,200,680 UART: [idev] Sha1 KeyId Algorithm
1,209,520 UART: [idev] --
1,210,511 UART: [ldev] ++
1,210,679 UART: [ldev] CDI.KEYID = 6
1,211,043 UART: [ldev] SUBJECT.KEYID = 5
1,211,470 UART: [ldev] AUTHORITY.KEYID = 7
1,211,933 UART: [ldev] FE.KEYID = 1
1,217,151 UART: [ldev] Erasing FE.KEYID = 1
1,243,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,009 UART: [ldev] --
1,283,324 UART: [fwproc] Wait for Commands...
1,284,103 UART: [fwproc] Recv command 0x46574c44
1,284,836 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,863 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,038 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,715 >>> mbox cmd response: success
2,363,715 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,364,953 UART: [afmc] ++
2,365,121 UART: [afmc] CDI.KEYID = 6
2,365,484 UART: [afmc] SUBJECT.KEYID = 7
2,365,910 UART: [afmc] AUTHORITY.KEYID = 5
2,402,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,645 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,355 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,236 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,937 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,672 UART: [afmc] --
2,445,485 UART: [cold-reset] --
2,446,511 UART: [state] Locking Datavault
2,447,802 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,406 UART: [state] Locking ICCM
2,448,968 UART: [exit] Launching FMC @ 0x40000130
2,454,298 UART:
2,454,314 UART: Running Caliptra FMC ...
2,454,722 UART:
2,454,865 UART: [state] CFI Enabled
2,465,571 UART: [fht] FMC Alias Private Key: 7
2,584,881 UART: [art] Extend RT PCRs Done
2,585,309 UART: [art] Lock RT PCRs Done
2,587,093 UART: [art] Populate DV Done
2,595,408 UART: [fht] FMC Alias Private Key: 7
2,596,492 UART: [art] Derive CDI
2,596,772 UART: [art] Store in slot 0x4
2,682,473 UART: [art] Derive Key Pair
2,682,833 UART: [art] Store priv key in slot 0x5
2,695,693 UART: [art] Derive Key Pair - Done
2,710,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,726,020 UART: [art] Erasing AUTHORITY.KEYID = 7
2,726,785 UART: [art] PUB.X = 9EC90968BE8578DB136F062B63BB1ACB56DBEE0D1F8B0C485EE611724640AFA5F8E57010BAB982FE2BE3DFD43754993B
2,733,559 UART: [art] PUB.Y = 38D3FA5E96A933C3B979B39A0F118223D039450C002C5500D94DD94A2895A012BE055821A154165A47E2B0329415C569
2,740,444 UART: [art] SIG.R = 5A08ECC442D2324FC18CF6A5DF6CEC0DC42BADF3BBC0D82E385E17BCCC2E126B08BE0B53BC445BF6E20EA32B6E86B9B7
2,747,231 UART: [art] SIG.S = 3FD921FC35B9E6C86B7D67E3D3420B1789DDBC8C5D1BBA068FD416B1D3ED4B6CC4140A2212E12D7AE83024FA100B0B4B
2,771,092 UART: mbox::rt_entry...
2,771,464 UART: ____ _ _ _ ____ _____
2,772,248 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,773,048 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,773,816 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,774,584 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,775,352 UART: |_|
2,775,664 UART:
2,893,697 UART: [rt] Runtime listening for mailbox commands...
2,894,886 >>> mbox cmd response data (48 bytes)
2,894,887 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,897,674 >>> mbox cmd response data (48 bytes)
2,897,675 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,913,621 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,923 ready_for_fw is high
1,059,923 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,812 >>> mbox cmd response: success
2,216,812 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,279,427 UART:
2,279,443 UART: Running Caliptra FMC ...
2,279,851 UART:
2,279,994 UART: [state] CFI Enabled
2,290,428 UART: [fht] FMC Alias Private Key: 7
2,409,610 UART: [art] Extend RT PCRs Done
2,410,038 UART: [art] Lock RT PCRs Done
2,411,688 UART: [art] Populate DV Done
2,420,073 UART: [fht] FMC Alias Private Key: 7
2,421,169 UART: [art] Derive CDI
2,421,449 UART: [art] Store in slot 0x4
2,507,244 UART: [art] Derive Key Pair
2,507,604 UART: [art] Store priv key in slot 0x5
2,520,630 UART: [art] Derive Key Pair - Done
2,535,533 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,118 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,883 UART: [art] PUB.X = A2D24166518A2BCBB95BA82773E5A4209C4D718F62C7016DB37D9A193CE8E90D37EC65C0020480587172AD262A3854E9
2,558,639 UART: [art] PUB.Y = 92D8A2685D829489EA8B9D19D8FEAE64341706375F1E48619AEAA5F47A4EAB8E6C38AC84AD000824DB8F0E6881A166B9
2,565,566 UART: [art] SIG.R = 6302F30D342174CE9E1F5B0E4943203CC68EE57D45CE95EDE6044874443962123F4DC18AF90323D4B9F4C2674DC37698
2,572,317 UART: [art] SIG.S = 7FFFDD78012959C6CED514B9243C45D4604CFCEDF7DCF66233E25A41B2D2174281C8482C7A2E7F58A6EDB04C6888A6F5
2,596,202 UART: mbox::rt_entry...
2,596,574 UART: ____ _ _ _ ____ _____
2,597,358 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,158 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,926 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,694 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,462 UART: |_|
2,600,774 UART:
2,719,265 UART: [rt] Runtime listening for mailbox commands...
2,720,454 >>> mbox cmd response data (48 bytes)
2,720,455 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,723,242 >>> mbox cmd response data (48 bytes)
2,723,243 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,739,189 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
893,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,407 UART: [kat] ++
897,559 UART: [kat] sha1
901,921 UART: [kat] SHA2-256
903,861 UART: [kat] SHA2-384
906,506 UART: [kat] SHA2-512-ACC
908,407 UART: [kat] ECC-384
918,244 UART: [kat] HMAC-384Kdf
922,704 UART: [kat] LMS
1,171,032 UART: [kat] --
1,171,659 UART: [cold-reset] ++
1,172,231 UART: [fht] FHT @ 0x50003400
1,174,902 UART: [idev] ++
1,175,070 UART: [idev] CDI.KEYID = 6
1,175,430 UART: [idev] SUBJECT.KEYID = 7
1,175,854 UART: [idev] UDS.KEYID = 0
1,176,199 ready_for_fw is high
1,176,199 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,010 UART: [idev] Erasing UDS.KEYID = 0
1,200,917 UART: [idev] Sha1 KeyId Algorithm
1,209,407 UART: [idev] --
1,210,287 UART: [ldev] ++
1,210,455 UART: [ldev] CDI.KEYID = 6
1,210,818 UART: [ldev] SUBJECT.KEYID = 5
1,211,244 UART: [ldev] AUTHORITY.KEYID = 7
1,211,707 UART: [ldev] FE.KEYID = 1
1,216,859 UART: [ldev] Erasing FE.KEYID = 1
1,243,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,603 UART: [ldev] --
1,282,992 UART: [fwproc] Wait for Commands...
1,283,630 UART: [fwproc] Recv command 0x46574c44
1,284,358 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,867 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,278,037 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,664 >>> mbox cmd response: success
2,364,664 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,365,776 UART: [afmc] ++
2,365,944 UART: [afmc] CDI.KEYID = 6
2,366,306 UART: [afmc] SUBJECT.KEYID = 7
2,366,731 UART: [afmc] AUTHORITY.KEYID = 5
2,402,774 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,419,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,901 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,610 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,493 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,437,194 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,168 UART: [afmc] --
2,446,260 UART: [cold-reset] --
2,447,196 UART: [state] Locking Datavault
2,448,417 UART: [state] Locking PCR0, PCR1 and PCR31
2,449,021 UART: [state] Locking ICCM
2,449,655 UART: [exit] Launching FMC @ 0x40000130
2,454,985 UART:
2,455,001 UART: Running Caliptra FMC ...
2,455,409 UART:
2,455,463 UART: [state] CFI Enabled
2,465,955 UART: [fht] FMC Alias Private Key: 7
2,584,419 UART: [art] Extend RT PCRs Done
2,584,847 UART: [art] Lock RT PCRs Done
2,586,097 UART: [art] Populate DV Done
2,594,194 UART: [fht] FMC Alias Private Key: 7
2,595,148 UART: [art] Derive CDI
2,595,428 UART: [art] Store in slot 0x4
2,681,507 UART: [art] Derive Key Pair
2,681,867 UART: [art] Store priv key in slot 0x5
2,695,665 UART: [art] Derive Key Pair - Done
2,710,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,490 UART: [art] Erasing AUTHORITY.KEYID = 7
2,726,255 UART: [art] PUB.X = E8659C170504A783044DADA6FDFDCDCECB888400BADDDA82BFA6FB268632E2DA3F98DBFFF2AFB66AF14F4313E65967DE
2,733,024 UART: [art] PUB.Y = 3552A1E0940A6CB27CDDF554AC6F1E8E5E96877DA77E92B65052E7F0FC955B26BD1A2E1335246C19FC21FA6C5022D9C2
2,739,981 UART: [art] SIG.R = AF93948FC970D51D61A6F72FE2C7FB55738A6C225A6F65D97CFDA4AF00302C09ADA8F71A8764F5654E945171E3398D52
2,746,732 UART: [art] SIG.S = 3BA6252A44C4B0706A0A5DE9E079FB5DAF2AC48A2A1D2315867F9C8DA76DC9BA8447C6EAEFFBD01145C50F2FE269490B
2,770,443 UART: mbox::rt_entry...
2,770,815 UART: ____ _ _ _ ____ _____
2,771,599 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,399 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,773,167 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,935 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,703 UART: |_|
2,775,015 UART:
2,893,339 UART: [rt] Runtime listening for mailbox commands...
2,894,528 >>> mbox cmd response data (48 bytes)
2,894,529 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,897,316 >>> mbox cmd response data (48 bytes)
2,897,317 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,913,263 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,125 ready_for_fw is high
1,060,125 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,291 >>> mbox cmd response: success
2,216,291 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,278,158 UART:
2,278,174 UART: Running Caliptra FMC ...
2,278,582 UART:
2,278,636 UART: [state] CFI Enabled
2,289,160 UART: [fht] FMC Alias Private Key: 7
2,407,944 UART: [art] Extend RT PCRs Done
2,408,372 UART: [art] Lock RT PCRs Done
2,409,946 UART: [art] Populate DV Done
2,417,849 UART: [fht] FMC Alias Private Key: 7
2,418,969 UART: [art] Derive CDI
2,419,249 UART: [art] Store in slot 0x4
2,505,062 UART: [art] Derive Key Pair
2,505,422 UART: [art] Store priv key in slot 0x5
2,518,814 UART: [art] Derive Key Pair - Done
2,533,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,549,769 UART: [art] Erasing AUTHORITY.KEYID = 7
2,550,534 UART: [art] PUB.X = 349E774E58F647113E494C6A438E2E2B95C6AA970ECC2FA25F53E0191211F114140A373501E1E5D2D20183E50B84234F
2,557,283 UART: [art] PUB.Y = C7757048FB25379D845A38A702C584C1CB1A476AB390787DE4ABF4C8991A7CEC4ED7A48B7677E1EC95109624A11E2BFA
2,564,238 UART: [art] SIG.R = DAE09542595DF2D98F4DA5E169394F5AEDBBD4605B1F3E202CBE25740877B560CAC44FB9FF1E2A14CD304047BD3DBEA2
2,571,025 UART: [art] SIG.S = 9281AA78A7CFD448EF042E48B008C86D903B69D5628B3C1B106D4E5B03E4369477C04E26D964045A11F5F53059321505
2,595,056 UART: mbox::rt_entry...
2,595,428 UART: ____ _ _ _ ____ _____
2,596,212 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,012 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,597,780 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,598,548 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,316 UART: |_|
2,599,628 UART:
2,718,977 UART: [rt] Runtime listening for mailbox commands...
2,720,166 >>> mbox cmd response data (48 bytes)
2,720,167 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,722,954 >>> mbox cmd response data (48 bytes)
2,722,955 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,738,901 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
893,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,818 UART: [kat] ++
897,970 UART: [kat] sha1
902,208 UART: [kat] SHA2-256
904,148 UART: [kat] SHA2-384
907,079 UART: [kat] SHA2-512-ACC
908,980 UART: [kat] ECC-384
918,169 UART: [kat] HMAC-384Kdf
922,809 UART: [kat] LMS
1,171,137 UART: [kat] --
1,171,930 UART: [cold-reset] ++
1,172,338 UART: [fht] FHT @ 0x50003400
1,175,149 UART: [idev] ++
1,175,317 UART: [idev] CDI.KEYID = 6
1,175,677 UART: [idev] SUBJECT.KEYID = 7
1,176,101 UART: [idev] UDS.KEYID = 0
1,176,446 ready_for_fw is high
1,176,446 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,397 UART: [idev] Erasing UDS.KEYID = 0
1,200,682 UART: [idev] Sha1 KeyId Algorithm
1,209,196 UART: [idev] --
1,210,260 UART: [ldev] ++
1,210,428 UART: [ldev] CDI.KEYID = 6
1,210,791 UART: [ldev] SUBJECT.KEYID = 5
1,211,217 UART: [ldev] AUTHORITY.KEYID = 7
1,211,680 UART: [ldev] FE.KEYID = 1
1,216,690 UART: [ldev] Erasing FE.KEYID = 1
1,243,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,118 UART: [ldev] --
1,282,505 UART: [fwproc] Wait for Commands...
1,283,249 UART: [fwproc] Recv command 0x46574c44
1,283,977 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,606 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,776 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,381 >>> mbox cmd response: success
2,364,381 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,365,491 UART: [afmc] ++
2,365,659 UART: [afmc] CDI.KEYID = 6
2,366,021 UART: [afmc] SUBJECT.KEYID = 7
2,366,446 UART: [afmc] AUTHORITY.KEYID = 5
2,402,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,494 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,242 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,951 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,834 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,535 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,577 UART: [afmc] --
2,445,653 UART: [cold-reset] --
2,446,367 UART: [state] Locking Datavault
2,447,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,102 UART: [state] Locking ICCM
2,448,668 UART: [exit] Launching FMC @ 0x40000130
2,453,998 UART:
2,454,014 UART: Running Caliptra FMC ...
2,454,422 UART:
2,454,565 UART: [state] CFI Enabled
2,465,019 UART: [fht] FMC Alias Private Key: 7
2,584,221 UART: [art] Extend RT PCRs Done
2,584,649 UART: [art] Lock RT PCRs Done
2,586,211 UART: [art] Populate DV Done
2,594,452 UART: [fht] FMC Alias Private Key: 7
2,595,622 UART: [art] Derive CDI
2,595,902 UART: [art] Store in slot 0x4
2,682,101 UART: [art] Derive Key Pair
2,682,461 UART: [art] Store priv key in slot 0x5
2,695,827 UART: [art] Derive Key Pair - Done
2,710,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,754 UART: [art] Erasing AUTHORITY.KEYID = 7
2,726,519 UART: [art] PUB.X = EA4CBABC57A251E754D560E4606DD362A25B201298C7D9375F56570695CCDFE7D37BBB24D32B0313F0ADC49EB7340377
2,733,288 UART: [art] PUB.Y = 705C94EE993247A730F378BE56871ECE0E8AEAF9F231377020CC2B022A9AA559110DE179222D0FF5BBB49C8D877C5D3E
2,740,234 UART: [art] SIG.R = 63354F5A73FA91A03D77E45757C318BF0A11A2D7FA8C094405B72B1D0BC836C30D8506CE199F83A2FC7E02CF40B334F6
2,746,989 UART: [art] SIG.S = E9C47E479FB16B89F53C3D726A5F2F892702DAE5ECD00D433F7BD7051E372A1548417B2006AD7CA0F539A82B0BBE3C7F
2,769,988 UART: mbox::rt_entry...
2,770,360 UART: ____ _ _ _ ____ _____
2,771,144 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,944 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,712 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,480 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,248 UART: |_|
2,774,560 UART:
2,893,686 UART: [rt] Runtime listening for mailbox commands...
2,894,875 >>> mbox cmd response data (48 bytes)
2,894,876 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,897,663 >>> mbox cmd response data (48 bytes)
2,897,664 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,913,610 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,062 ready_for_fw is high
1,060,062 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,842 >>> mbox cmd response: success
2,215,842 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,278,817 UART:
2,278,833 UART: Running Caliptra FMC ...
2,279,241 UART:
2,279,384 UART: [state] CFI Enabled
2,289,798 UART: [fht] FMC Alias Private Key: 7
2,408,790 UART: [art] Extend RT PCRs Done
2,409,218 UART: [art] Lock RT PCRs Done
2,410,974 UART: [art] Populate DV Done
2,419,025 UART: [fht] FMC Alias Private Key: 7
2,420,137 UART: [art] Derive CDI
2,420,417 UART: [art] Store in slot 0x4
2,506,122 UART: [art] Derive Key Pair
2,506,482 UART: [art] Store priv key in slot 0x5
2,519,840 UART: [art] Derive Key Pair - Done
2,534,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,416 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,181 UART: [art] PUB.X = F595CB7343DA22186C987C084F33F1E0460CA3F4211EF44E674C5595AEE6BDFEBBFCE6BC0CB40B365697A57A3CBD38B2
2,557,957 UART: [art] PUB.Y = 62CAD6D0F3FE32D2BEF28ADC8F975B011599FCD9F7C4154AE1DDC7C0A7EB2E00071FF99609B9BCBBD97E9C8CD43E6AD5
2,564,906 UART: [art] SIG.R = 4524F9982707B29CCB98CBDC8C1BFC80076552EDBB942530AC893C706021452C1F54126F70698C030C3CE4FB6B723148
2,571,662 UART: [art] SIG.S = 2A5FEA97DCF99305C138A66130BB6D86E8E9FB24E8F99995CD80E3BCD1F4948832E57378E1867F37D373B01706614BA7
2,595,710 UART: mbox::rt_entry...
2,596,082 UART: ____ _ _ _ ____ _____
2,596,866 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,666 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,434 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,202 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,970 UART: |_|
2,600,282 UART:
2,718,733 UART: [rt] Runtime listening for mailbox commands...
2,719,922 >>> mbox cmd response data (48 bytes)
2,719,923 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,722,710 >>> mbox cmd response data (48 bytes)
2,722,711 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,738,657 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
191,964 UART:
192,321 UART: Running Caliptra ROM ...
193,424 UART:
193,569 UART: [state] CFI Enabled
264,226 UART: [state] LifecycleState = Unprovisioned
266,186 UART: [state] DebugLocked = No
268,233 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,827 UART: [kat] SHA2-256
443,547 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,078 UART: [kat] ++
454,560 UART: [kat] sha1
466,501 UART: [kat] SHA2-256
469,232 UART: [kat] SHA2-384
474,300 UART: [kat] SHA2-512-ACC
476,667 UART: [kat] ECC-384
2,768,354 UART: [kat] HMAC-384Kdf
2,801,090 UART: [kat] LMS
3,991,390 UART: [kat] --
3,996,488 UART: [cold-reset] ++
3,998,996 UART: [fht] Storing FHT @ 0x50003400
4,010,823 UART: [idev] ++
4,011,418 UART: [idev] CDI.KEYID = 6
4,012,383 UART: [idev] SUBJECT.KEYID = 7
4,013,560 UART: [idev] UDS.KEYID = 0
4,014,659 ready_for_fw is high
4,014,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,047 UART: [idev] Erasing UDS.KEYID = 0
7,345,849 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,469 UART: [idev] --
7,372,783 UART: [ldev] ++
7,373,352 UART: [ldev] CDI.KEYID = 6
7,374,291 UART: [ldev] SUBJECT.KEYID = 5
7,375,500 UART: [ldev] AUTHORITY.KEYID = 7
7,376,785 UART: [ldev] FE.KEYID = 1
7,422,019 UART: [ldev] Erasing FE.KEYID = 1
10,759,618 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,062 UART: [ldev] --
13,137,710 UART: [fwproc] Waiting for Commands...
13,139,588 UART: [fwproc] Received command 0x46574c44
13,141,766 UART: [fwproc] Received Image of size 118548 bytes
17,253,778 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,332,330 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,405,469 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,734,305 >>> mbox cmd response: success
17,739,028 UART: [afmc] ++
17,739,651 UART: [afmc] CDI.KEYID = 6
17,740,565 UART: [afmc] SUBJECT.KEYID = 7
17,741,787 UART: [afmc] AUTHORITY.KEYID = 5
21,113,985 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,415,673 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,417,900 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,432,358 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,447,061 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,461,482 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,484,066 UART: [afmc] --
23,488,477 UART: [cold-reset] --
23,491,266 UART: [state] Locking Datavault
23,495,864 UART: [state] Locking PCR0, PCR1 and PCR31
23,497,615 UART: [state] Locking ICCM
23,500,229 UART: [exit] Launching FMC @ 0x40000130
23,508,620 UART:
23,508,851 UART: Running Caliptra FMC ...
23,509,951 UART:
23,510,107 UART: [state] CFI Enabled
23,574,429 UART: [fht] FMC Alias Private Key: 7
25,914,936 UART: [art] Extend RT PCRs Done
25,916,166 UART: [art] Lock RT PCRs Done
25,918,036 UART: [art] Populate DV Done
25,923,291 UART: [fht] FMC Alias Private Key: 7
25,924,894 UART: [art] Derive CDI
25,925,709 UART: [art] Store in slot 0x4
25,983,069 UART: [art] Derive Key Pair
25,984,116 UART: [art] Store priv key in slot 0x5
29,277,854 UART: [art] Derive Key Pair - Done
29,291,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,579,074 UART: [art] Erasing AUTHORITY.KEYID = 7
31,580,626 UART: [art] PUB.X = C1757ACAD99750979A83D2B722E4725D3688D6319E4B03308572F028F9CD972F46877BB4E602A01E5D431F60071EDBB3
31,587,847 UART: [art] PUB.Y = C75F1A519EC551B3CF8AE526E012C203A5A657AE6E65BB7C30A1FEC6E35A43039B824EA42E8AA79B60E76CDD41F48CBC
31,595,156 UART: [art] SIG.R = 056B4F61CDB368C78BEFDFCB2C2F24DA72104926873E97BD102CA36A1A231FF9123D806D15AFF11C48B00AD37AD14B01
31,602,514 UART: [art] SIG.S = 55EED621AA5B1A5F85570D03CDC9776484635E3C1E936D99BF57476EF7B3BCEAB07CC16C644896686EBC69F0F2A56B5A
32,907,839 UART: Caliptra RT
32,908,573 UART: [state] CFI Enabled
33,086,736 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,808,163 ready_for_fw is high
3,808,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,977,815 >>> mbox cmd response: success
23,671,044 UART:
23,671,542 UART: Running Caliptra FMC ...
23,672,657 UART:
23,672,820 UART: [state] CFI Enabled
23,742,016 UART: [fht] FMC Alias Private Key: 7
26,082,909 UART: [art] Extend RT PCRs Done
26,084,880 UART: [art] Lock RT PCRs Done
26,085,896 UART: [art] Populate DV Done
26,090,980 UART: [fht] FMC Alias Private Key: 7
26,092,666 UART: [art] Derive CDI
26,093,507 UART: [art] Store in slot 0x4
26,152,998 UART: [art] Derive Key Pair
26,154,255 UART: [art] Store priv key in slot 0x5
29,428,822 UART: [art] Derive Key Pair - Done
29,441,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,315 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,860 UART: [art] PUB.X = E3B5E902B052131691A964FC34D60C8538572F0AD085C53E31F1A15DF8D32BDC5CC741A2ACDF2D37203853539AD251E6
31,741,086 UART: [art] PUB.Y = 949612FEEE0EC050736389BE8F18B0C6EB46A784EE92A6B0258F3C1A827053ECD9633E0629BC054A3AC122C14E48630F
31,748,340 UART: [art] SIG.R = 5368C4590D377FE0B671723ECE68710CD7F4A53BBD148DDF754A3A0A501CB2D7683873C64BCAEDA9BC6D9AC824450D9A
31,755,753 UART: [art] SIG.S = 98015E3289C104B4B2F646E5D36346313E0984A6ABE69EE84C001FF45070B6DD4D4F0EBB9539A3A2C8A811A8D08B96D8
33,061,358 UART: Caliptra RT
33,062,086 UART: [state] CFI Enabled
33,236,822 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
192,370 UART:
192,721 UART: Running Caliptra ROM ...
193,916 UART:
603,637 UART: [state] CFI Enabled
621,351 UART: [state] LifecycleState = Unprovisioned
623,293 UART: [state] DebugLocked = No
625,308 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,380 UART: [kat] SHA2-256
800,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,608 UART: [kat] ++
811,086 UART: [kat] sha1
821,031 UART: [kat] SHA2-256
823,705 UART: [kat] SHA2-384
829,121 UART: [kat] SHA2-512-ACC
831,484 UART: [kat] ECC-384
3,114,517 UART: [kat] HMAC-384Kdf
3,126,739 UART: [kat] LMS
4,316,847 UART: [kat] --
4,322,874 UART: [cold-reset] ++
4,324,200 UART: [fht] Storing FHT @ 0x50003400
4,336,179 UART: [idev] ++
4,336,740 UART: [idev] CDI.KEYID = 6
4,337,765 UART: [idev] SUBJECT.KEYID = 7
4,338,933 UART: [idev] UDS.KEYID = 0
4,339,933 ready_for_fw is high
4,340,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,040 UART: [idev] Erasing UDS.KEYID = 0
7,627,053 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,775 UART: [idev] --
7,653,470 UART: [ldev] ++
7,654,038 UART: [ldev] CDI.KEYID = 6
7,654,974 UART: [ldev] SUBJECT.KEYID = 5
7,656,180 UART: [ldev] AUTHORITY.KEYID = 7
7,657,459 UART: [ldev] FE.KEYID = 1
7,671,210 UART: [ldev] Erasing FE.KEYID = 1
10,954,631 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,047 UART: [ldev] --
13,316,090 UART: [fwproc] Waiting for Commands...
13,318,295 UART: [fwproc] Received command 0x46574c44
13,320,468 UART: [fwproc] Received Image of size 118548 bytes
17,424,148 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,505,664 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,832 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,362 >>> mbox cmd response: success
17,911,240 UART: [afmc] ++
17,911,852 UART: [afmc] CDI.KEYID = 6
17,912,790 UART: [afmc] SUBJECT.KEYID = 7
17,913,999 UART: [afmc] AUTHORITY.KEYID = 5
21,229,397 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,526,311 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,528,618 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,995 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,557,744 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,572,172 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,593,697 UART: [afmc] --
23,597,128 UART: [cold-reset] --
23,600,397 UART: [state] Locking Datavault
23,606,686 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,384 UART: [state] Locking ICCM
23,611,067 UART: [exit] Launching FMC @ 0x40000130
23,619,470 UART:
23,619,701 UART: Running Caliptra FMC ...
23,620,795 UART:
23,620,946 UART: [state] CFI Enabled
23,629,067 UART: [fht] FMC Alias Private Key: 7
25,969,208 UART: [art] Extend RT PCRs Done
25,970,429 UART: [art] Lock RT PCRs Done
25,971,916 UART: [art] Populate DV Done
25,977,320 UART: [fht] FMC Alias Private Key: 7
25,978,960 UART: [art] Derive CDI
25,979,693 UART: [art] Store in slot 0x4
26,022,281 UART: [art] Derive Key Pair
26,023,339 UART: [art] Store priv key in slot 0x5
29,264,661 UART: [art] Derive Key Pair - Done
29,277,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,268 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,783 UART: [art] PUB.X = C0E504C431AE5AE76DF558B769E93E65A9FA9E00D85BCD0A523AF24F90C7B0FD62A9A53C9702963523C67EAA449E376E
31,567,088 UART: [art] PUB.Y = DCA6A698B5DFD9C8B6AFC1C02C24A14757AC232EC614182004675B6004E5DBD352955D31A8A9C4E88C40CF33A56E1E64
31,574,330 UART: [art] SIG.R = B56D8FAC576C728A24D1C5D9F99B320D7589807A44C41F8B9A41D4BDC6D6004AD8736FA7BC9B2AF251D8BD0B974E738E
31,581,728 UART: [art] SIG.S = 13707D00E1D543B18BE890DE1EBF571B3C9305B7E367ED4C0843FEE7C3D6E18DB0D28D19A76D7305FADDF0276D928A87
32,886,727 UART: Caliptra RT
32,887,446 UART: [state] CFI Enabled
33,020,544 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
4,125,736 ready_for_fw is high
4,126,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,910 >>> mbox cmd response: success
23,796,028 UART:
23,796,460 UART: Running Caliptra FMC ...
23,797,578 UART:
23,797,739 UART: [state] CFI Enabled
23,805,914 UART: [fht] FMC Alias Private Key: 7
26,146,319 UART: [art] Extend RT PCRs Done
26,147,550 UART: [art] Lock RT PCRs Done
26,149,148 UART: [art] Populate DV Done
26,154,733 UART: [fht] FMC Alias Private Key: 7
26,156,267 UART: [art] Derive CDI
26,156,995 UART: [art] Store in slot 0x4
26,199,799 UART: [art] Derive Key Pair
26,200,812 UART: [art] Store priv key in slot 0x5
29,442,509 UART: [art] Derive Key Pair - Done
29,455,406 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,620 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,134 UART: [art] PUB.X = 4F72AF0393250EAFD20677615EF43AFFC7ACB5A77A9A2F48BCCEA9CAA4340CC5BA753C571ECC145404C20372D94DEF1E
31,744,433 UART: [art] PUB.Y = DF495FA572A84E8AF2B10D4A272F3A05EF5BFA5FD09D137B309E0D5797C5731F327F8AE18102AA393DC53394CAC5F012
31,751,682 UART: [art] SIG.R = 677BE3E4DE5E27BE63C6D5171111756123B2E84FDC08D5DEF66DB9E9E7A50629C3E51765BD0635C0ED51133B792184B7
31,759,067 UART: [art] SIG.S = 1E25C995399B2F9D95FB725173D2144E380C50A26730A8C6F970CA4C7E15269CBB47B595926CAC7974F4E6480AB7F3E2
33,064,576 UART: Caliptra RT
33,065,292 UART: [state] CFI Enabled
33,198,789 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,135 UART:
192,506 UART: Running Caliptra ROM ...
193,651 UART:
193,793 UART: [state] CFI Enabled
263,247 UART: [state] LifecycleState = Unprovisioned
265,291 UART: [state] DebugLocked = No
267,757 UART: [state] WD Timer not started. Device not locked for debugging
272,363 UART: [kat] SHA2-256
452,043 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,852 UART: [kat] ++
463,379 UART: [kat] sha1
474,679 UART: [kat] SHA2-256
477,329 UART: [kat] SHA2-384
483,665 UART: [kat] SHA2-512-ACC
486,028 UART: [kat] ECC-384
2,950,408 UART: [kat] HMAC-384Kdf
2,973,438 UART: [kat] LMS
3,449,970 UART: [kat] --
3,454,105 UART: [cold-reset] ++
3,455,183 UART: [fht] FHT @ 0x50003400
3,466,101 UART: [idev] ++
3,466,718 UART: [idev] CDI.KEYID = 6
3,467,630 UART: [idev] SUBJECT.KEYID = 7
3,468,884 UART: [idev] UDS.KEYID = 0
3,469,808 ready_for_fw is high
3,469,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,900 UART: [idev] Erasing UDS.KEYID = 0
5,990,023 UART: [idev] Sha1 KeyId Algorithm
6,015,424 UART: [idev] --
6,021,316 UART: [ldev] ++
6,021,887 UART: [ldev] CDI.KEYID = 6
6,022,900 UART: [ldev] SUBJECT.KEYID = 5
6,024,210 UART: [ldev] AUTHORITY.KEYID = 7
6,025,403 UART: [ldev] FE.KEYID = 1
6,058,465 UART: [ldev] Erasing FE.KEYID = 1
8,566,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,371 UART: [ldev] --
10,377,905 UART: [fwproc] Wait for Commands...
10,381,017 UART: [fwproc] Recv command 0x46574c44
10,383,053 UART: [fwproc] Recv'd Img size: 118548 bytes
13,870,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,791 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,172 >>> mbox cmd response: success
14,352,144 UART: [afmc] ++
14,352,761 UART: [afmc] CDI.KEYID = 6
14,353,642 UART: [afmc] SUBJECT.KEYID = 7
14,354,917 UART: [afmc] AUTHORITY.KEYID = 5
16,893,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,510 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,344 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,390 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,970 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,738 UART: [afmc] --
18,697,818 UART: [cold-reset] --
18,700,437 UART: [state] Locking Datavault
18,705,519 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,269 UART: [state] Locking ICCM
18,709,466 UART: [exit] Launching FMC @ 0x40000130
18,717,907 UART:
18,718,148 UART: Running Caliptra FMC ...
18,719,244 UART:
18,719,398 UART: [state] CFI Enabled
18,777,901 UART: [fht] FMC Alias Private Key: 7
20,544,302 UART: [art] Extend RT PCRs Done
20,545,514 UART: [art] Lock RT PCRs Done
20,547,352 UART: [art] Populate DV Done
20,552,652 UART: [fht] FMC Alias Private Key: 7
20,554,343 UART: [art] Derive CDI
20,555,153 UART: [art] Store in slot 0x4
20,610,834 UART: [art] Derive Key Pair
20,611,871 UART: [art] Store priv key in slot 0x5
23,074,443 UART: [art] Derive Key Pair - Done
23,087,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,800,584 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,096 UART: [art] PUB.X = D1E98C632448F04272FA006DDE3693869AFA197524AB847AF0E8CE32BCE311B7577B53BBC880180D2F5E54D57F0C314F
24,809,350 UART: [art] PUB.Y = 80F9B05831903F9033E4140AB0AC5CD80D774752EC31CC3D857767C72F2BA41833440771950C7EDFBAB4501E6321D9B8
24,816,581 UART: [art] SIG.R = 554480648868415CD166144E32F9061D577509D3E177FE67E4EFC5DF579B6AD722C585EE2CAC74B9E71C182395D4B19D
24,824,179 UART: [art] SIG.S = 61F0797F3612254984A0A7098F53A99F8F637334E917871722A07EF7A646E746E84EE142C215761300C8E4F9DCD5237F
25,802,951 UART: Caliptra RT
25,803,680 UART: [state] CFI Enabled
25,984,282 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,462,899 ready_for_fw is high
3,463,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,210,949 >>> mbox cmd response: success
18,499,087 UART:
18,499,498 UART: Running Caliptra FMC ...
18,500,606 UART:
18,500,767 UART: [state] CFI Enabled
18,564,960 UART: [fht] FMC Alias Private Key: 7
20,330,873 UART: [art] Extend RT PCRs Done
20,332,095 UART: [art] Lock RT PCRs Done
20,333,855 UART: [art] Populate DV Done
20,339,162 UART: [fht] FMC Alias Private Key: 7
20,340,646 UART: [art] Derive CDI
20,341,411 UART: [art] Store in slot 0x4
20,398,467 UART: [art] Derive Key Pair
20,399,501 UART: [art] Store priv key in slot 0x5
22,862,859 UART: [art] Derive Key Pair - Done
22,875,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,588,165 UART: [art] Erasing AUTHORITY.KEYID = 7
24,589,670 UART: [art] PUB.X = F0EAA8A90B7C93624DD2201ABE51645EE414E452096FA793B7D71656BCFC998CCEAD6C670FB5A514F4C58DB706015B60
24,596,924 UART: [art] PUB.Y = 26DD25F573F6BD65F978AC36020270418F50A687E588583E791B81C55C297410A06482E2BD1C4BBAFF9D6DEFF14F9D09
24,604,174 UART: [art] SIG.R = 8954557CA46ED9A035AE1CF27B075E6A1A8C2691666E510DBEFE812EDEB7BD1D086D93CD0333E2990BE1C080C444BEF7
24,611,652 UART: [art] SIG.S = CD4F9BC329DC889E0DD881DD4255E43962D3C067B1E79D06000CADEB4648752BA0ADB46D9737CD37D6ECC832F1CAC8C9
25,590,460 UART: Caliptra RT
25,591,172 UART: [state] CFI Enabled
25,771,744 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,442 UART:
192,804 UART: Running Caliptra ROM ...
193,930 UART:
603,738 UART: [state] CFI Enabled
618,621 UART: [state] LifecycleState = Unprovisioned
620,565 UART: [state] DebugLocked = No
622,238 UART: [state] WD Timer not started. Device not locked for debugging
625,912 UART: [kat] SHA2-256
805,587 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,324 UART: [kat] ++
816,799 UART: [kat] sha1
826,472 UART: [kat] SHA2-256
829,133 UART: [kat] SHA2-384
835,764 UART: [kat] SHA2-512-ACC
838,201 UART: [kat] ECC-384
3,279,307 UART: [kat] HMAC-384Kdf
3,292,389 UART: [kat] LMS
3,768,846 UART: [kat] --
3,773,763 UART: [cold-reset] ++
3,775,982 UART: [fht] FHT @ 0x50003400
3,788,032 UART: [idev] ++
3,788,601 UART: [idev] CDI.KEYID = 6
3,789,514 UART: [idev] SUBJECT.KEYID = 7
3,790,760 UART: [idev] UDS.KEYID = 0
3,791,687 ready_for_fw is high
3,791,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,738 UART: [idev] Erasing UDS.KEYID = 0
6,270,605 UART: [idev] Sha1 KeyId Algorithm
6,294,211 UART: [idev] --
6,298,345 UART: [ldev] ++
6,298,921 UART: [ldev] CDI.KEYID = 6
6,299,857 UART: [ldev] SUBJECT.KEYID = 5
6,301,075 UART: [ldev] AUTHORITY.KEYID = 7
6,302,317 UART: [ldev] FE.KEYID = 1
6,314,691 UART: [ldev] Erasing FE.KEYID = 1
8,797,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,566 UART: [ldev] --
10,589,887 UART: [fwproc] Wait for Commands...
10,592,793 UART: [fwproc] Recv command 0x46574c44
10,594,783 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,295 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,362 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,335 >>> mbox cmd response: success
14,557,982 UART: [afmc] ++
14,558,612 UART: [afmc] CDI.KEYID = 6
14,559,527 UART: [afmc] SUBJECT.KEYID = 7
14,560,749 UART: [afmc] AUTHORITY.KEYID = 5
17,065,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,844 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,674 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,753 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,286 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,262 UART: [afmc] --
18,866,524 UART: [cold-reset] --
18,870,171 UART: [state] Locking Datavault
18,874,937 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,692 UART: [state] Locking ICCM
18,879,061 UART: [exit] Launching FMC @ 0x40000130
18,887,467 UART:
18,887,710 UART: Running Caliptra FMC ...
18,888,816 UART:
18,888,973 UART: [state] CFI Enabled
18,896,804 UART: [fht] FMC Alias Private Key: 7
20,663,505 UART: [art] Extend RT PCRs Done
20,664,717 UART: [art] Lock RT PCRs Done
20,666,098 UART: [art] Populate DV Done
20,671,519 UART: [fht] FMC Alias Private Key: 7
20,673,167 UART: [art] Derive CDI
20,673,988 UART: [art] Store in slot 0x4
20,716,262 UART: [art] Derive Key Pair
20,717,326 UART: [art] Store priv key in slot 0x5
23,144,303 UART: [art] Derive Key Pair - Done
23,157,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,498 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,005 UART: [art] PUB.X = 5F1811A1732009D04A4C0CCB5E0B1F878ACB35B138AE1D8C382E282B1183C940D3CAB1B58896CD6949AEBDFBB9C5CEF0
24,872,248 UART: [art] PUB.Y = CCDEE03F0F1E9694117763F43BB89D7EA75214A637B25CB0302D16E3AEBD0F43C0B2CEF5AF7BF0641BBA553B3A1656C7
24,879,535 UART: [art] SIG.R = B9DA217EE0C91A754C4D1BCE6FD872A336774E0780D30828A20A5C9E2E56918CF5D8ECAB79D03687978391A7AD592428
24,886,920 UART: [art] SIG.S = ACFDDDB4638B01919B8C68B3DBCCD284EB4CC654B41FE3988FE86C37850E1F453D8E59823165C4AA1EBC3E5BB6E6D2E7
25,865,568 UART: Caliptra RT
25,866,259 UART: [state] CFI Enabled
25,998,615 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
3,778,741 ready_for_fw is high
3,779,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,908 >>> mbox cmd response: success
18,693,700 UART:
18,694,084 UART: Running Caliptra FMC ...
18,695,232 UART:
18,695,396 UART: [state] CFI Enabled
18,703,397 UART: [fht] FMC Alias Private Key: 7
20,468,846 UART: [art] Extend RT PCRs Done
20,470,094 UART: [art] Lock RT PCRs Done
20,471,682 UART: [art] Populate DV Done
20,476,932 UART: [fht] FMC Alias Private Key: 7
20,478,538 UART: [art] Derive CDI
20,479,359 UART: [art] Store in slot 0x4
20,522,128 UART: [art] Derive Key Pair
20,523,172 UART: [art] Store priv key in slot 0x5
22,949,889 UART: [art] Derive Key Pair - Done
22,962,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,137 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,178 UART: [art] PUB.X = 6F4EE2340FB297485ED66D2FBA0656B488A04AFA25B6AE7E1A2A6CE9EC7AADC6DC957EADFDF287D65B4E002B6B7B911C
24,677,932 UART: [art] PUB.Y = B00DD95B325208E33D8F3306B0F646B11799D049D7B8DD884DFBB643AD4D218FE36959CFDFB0789DF51B5B8292935284
24,685,222 UART: [art] SIG.R = 491E057FB0F3CF09BC14C5EDEC74E57AC8BFA7633136F068841ED8D45639A5A351D1912D902DA708A0DF5C95DAAD395B
24,692,583 UART: [art] SIG.S = B04C2D8D7BE25F4A45EAF6E7815F7C24634D1111614387768F3E992FEC22E5DFF5ECBD28180C892A9EEC4C0F50905CB7
25,671,589 UART: Caliptra RT
25,672,733 UART: [state] CFI Enabled
25,805,524 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,112 UART:
192,495 UART: Running Caliptra ROM ...
193,674 UART:
193,823 UART: [state] CFI Enabled
265,849 UART: [state] LifecycleState = Unprovisioned
268,251 UART: [state] DebugLocked = No
270,208 UART: [state] WD Timer not started. Device not locked for debugging
275,586 UART: [kat] SHA2-256
465,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,210 UART: [kat] ++
476,849 UART: [kat] sha1
488,780 UART: [kat] SHA2-256
491,833 UART: [kat] SHA2-384
496,335 UART: [kat] SHA2-512-ACC
498,910 UART: [kat] ECC-384
2,948,321 UART: [kat] HMAC-384Kdf
2,971,344 UART: [kat] LMS
3,503,127 UART: [kat] --
3,507,120 UART: [cold-reset] ++
3,508,335 UART: [fht] FHT @ 0x50003400
3,519,386 UART: [idev] ++
3,520,136 UART: [idev] CDI.KEYID = 6
3,521,049 UART: [idev] SUBJECT.KEYID = 7
3,522,295 UART: [idev] UDS.KEYID = 0
3,523,218 ready_for_fw is high
3,523,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,319 UART: [idev] Erasing UDS.KEYID = 0
6,026,811 UART: [idev] Sha1 KeyId Algorithm
6,049,980 UART: [idev] --
6,055,435 UART: [ldev] ++
6,056,114 UART: [ldev] CDI.KEYID = 6
6,057,029 UART: [ldev] SUBJECT.KEYID = 5
6,058,206 UART: [ldev] AUTHORITY.KEYID = 7
6,059,440 UART: [ldev] FE.KEYID = 1
6,101,149 UART: [ldev] Erasing FE.KEYID = 1
8,611,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,589 UART: [ldev] --
10,416,185 UART: [fwproc] Wait for Commands...
10,418,763 UART: [fwproc] Recv command 0x46574c44
10,421,071 UART: [fwproc] Recv'd Img size: 118548 bytes
13,926,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,995 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,128,606 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,689,158 >>> mbox cmd response: success
14,692,755 UART: [afmc] ++
14,693,484 UART: [afmc] CDI.KEYID = 6
14,694,676 UART: [afmc] SUBJECT.KEYID = 7
14,696,166 UART: [afmc] AUTHORITY.KEYID = 5
17,234,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,079 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,162 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,307 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,234 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,757 UART: [afmc] --
19,032,965 UART: [cold-reset] --
19,038,073 UART: [state] Locking Datavault
19,043,645 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,806 UART: [state] Locking ICCM
19,048,647 UART: [exit] Launching FMC @ 0x40000130
19,057,281 UART:
19,057,515 UART: Running Caliptra FMC ...
19,058,535 UART:
19,058,682 UART: [state] CFI Enabled
19,116,066 UART: [fht] FMC Alias Private Key: 7
20,882,433 UART: [art] Extend RT PCRs Done
20,883,644 UART: [art] Lock RT PCRs Done
20,884,972 UART: [art] Populate DV Done
20,890,164 UART: [fht] FMC Alias Private Key: 7
20,891,750 UART: [art] Derive CDI
20,892,481 UART: [art] Store in slot 0x4
20,948,966 UART: [art] Derive Key Pair
20,949,956 UART: [art] Store priv key in slot 0x5
23,412,763 UART: [art] Derive Key Pair - Done
23,425,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,834 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,363 UART: [art] PUB.X = 4C3A00B209E3C08392D06B49737102E74E21555D727BD8D9E66C0AEAA64C485514E0C60051ADB11E73AD965AB19D27DF
25,146,590 UART: [art] PUB.Y = F9B7B9A0E688ED890EFEC471497E0E20B36687FD3A7B181F9F1F9C10D319119B7AA87B443C07B2F91A8F96A8532E8DC2
25,153,853 UART: [art] SIG.R = 97024BD94A63AACA1239FFE44E79FE5D5DD87E39DBB9EBEDC2F6E0C2A92A9D2B9E819B32B351E9C2C24DE32AE933C0D4
25,161,223 UART: [art] SIG.S = 0B85C710E56136BA84055D17975653B9D0F3FD26249F9889914C5800D7C452FA65E983696A4283306DB69347180050E7
26,140,272 UART: Caliptra RT
26,140,966 UART: [state] CFI Enabled
26,323,571 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
3,439,617 ready_for_fw is high
3,440,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,837,541 >>> mbox cmd response: success
19,130,858 UART:
19,131,240 UART: Running Caliptra FMC ...
19,132,442 UART:
19,132,606 UART: [state] CFI Enabled
19,199,740 UART: [fht] FMC Alias Private Key: 7
20,987,547 UART: [art] Extend RT PCRs Done
20,988,778 UART: [art] Lock RT PCRs Done
20,990,834 UART: [art] Populate DV Done
20,995,827 UART: [fht] FMC Alias Private Key: 7
20,997,577 UART: [art] Derive CDI
20,998,398 UART: [art] Store in slot 0x4
21,054,423 UART: [art] Derive Key Pair
21,055,490 UART: [art] Store priv key in slot 0x5
23,517,658 UART: [art] Derive Key Pair - Done
23,530,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,243,995 UART: [art] Erasing AUTHORITY.KEYID = 7
25,245,503 UART: [art] PUB.X = 271E4E950189CE1905C2078B54ADDCB05F837428B54DC7641051D8D05A818C497DCDB705BA1E2EEBB52EB1C2BB0F4342
25,252,792 UART: [art] PUB.Y = DA70439F40670FE74B37F098EF8FFEC06A424E4DBC505E3B22CD9B18144F03F0EA97050E378D5A2D82120A8BE8FB4642
25,260,024 UART: [art] SIG.R = DDC60C4AF0D3FBFBA436449A89FC0BFF1DF1951BD4A4E897C9A2803F0657F24105CD5FB75780C14DA3C6391BB76805F8
25,267,396 UART: [art] SIG.S = A4A8DE94A35969DB47D815C97149DCAC77659854A113BBE232A2734C28A9F4469E699110976D23E0AD22808FE5FC674A
26,246,645 UART: Caliptra RT
26,247,356 UART: [state] CFI Enabled
26,428,461 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
192,317 UART:
192,703 UART: Running Caliptra ROM ...
193,831 UART:
603,469 UART: [state] CFI Enabled
615,905 UART: [state] LifecycleState = Unprovisioned
618,308 UART: [state] DebugLocked = No
620,967 UART: [state] WD Timer not started. Device not locked for debugging
624,804 UART: [kat] SHA2-256
814,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,453 UART: [kat] ++
825,979 UART: [kat] sha1
836,022 UART: [kat] SHA2-256
839,026 UART: [kat] SHA2-384
843,829 UART: [kat] SHA2-512-ACC
846,427 UART: [kat] ECC-384
3,286,782 UART: [kat] HMAC-384Kdf
3,300,048 UART: [kat] LMS
3,831,871 UART: [kat] --
3,836,434 UART: [cold-reset] ++
3,838,579 UART: [fht] FHT @ 0x50003400
3,851,405 UART: [idev] ++
3,852,040 UART: [idev] CDI.KEYID = 6
3,852,999 UART: [idev] SUBJECT.KEYID = 7
3,854,244 UART: [idev] UDS.KEYID = 0
3,855,148 ready_for_fw is high
3,855,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,321 UART: [idev] Erasing UDS.KEYID = 0
6,332,493 UART: [idev] Sha1 KeyId Algorithm
6,355,267 UART: [idev] --
6,359,838 UART: [ldev] ++
6,360,530 UART: [ldev] CDI.KEYID = 6
6,361,418 UART: [ldev] SUBJECT.KEYID = 5
6,362,538 UART: [ldev] AUTHORITY.KEYID = 7
6,363,784 UART: [ldev] FE.KEYID = 1
6,376,648 UART: [ldev] Erasing FE.KEYID = 1
8,855,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,190 UART: [ldev] --
10,643,893 UART: [fwproc] Wait for Commands...
10,645,607 UART: [fwproc] Recv command 0x46574c44
10,647,918 UART: [fwproc] Recv'd Img size: 118548 bytes
14,131,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,208,161 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,331,761 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,892,641 >>> mbox cmd response: success
14,897,059 UART: [afmc] ++
14,897,793 UART: [afmc] CDI.KEYID = 6
14,898,997 UART: [afmc] SUBJECT.KEYID = 7
14,900,445 UART: [afmc] AUTHORITY.KEYID = 5
17,399,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,122,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,124,896 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,140,001 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,155,137 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,170,013 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,194,535 UART: [afmc] --
19,198,952 UART: [cold-reset] --
19,201,819 UART: [state] Locking Datavault
19,207,581 UART: [state] Locking PCR0, PCR1 and PCR31
19,209,742 UART: [state] Locking ICCM
19,211,040 UART: [exit] Launching FMC @ 0x40000130
19,219,741 UART:
19,219,981 UART: Running Caliptra FMC ...
19,221,088 UART:
19,221,255 UART: [state] CFI Enabled
19,228,874 UART: [fht] FMC Alias Private Key: 7
20,994,720 UART: [art] Extend RT PCRs Done
20,995,942 UART: [art] Lock RT PCRs Done
20,997,541 UART: [art] Populate DV Done
21,003,015 UART: [fht] FMC Alias Private Key: 7
21,004,513 UART: [art] Derive CDI
21,005,264 UART: [art] Store in slot 0x4
21,048,191 UART: [art] Derive Key Pair
21,049,218 UART: [art] Store priv key in slot 0x5
23,476,488 UART: [art] Derive Key Pair - Done
23,489,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,195,181 UART: [art] Erasing AUTHORITY.KEYID = 7
25,196,688 UART: [art] PUB.X = 865AFFE393836B0292373EEEDD9D8CD8436638A4A57F29481CFD85DA5B6762C8A357E78E1E5CAED3673AAC705F5D81DA
25,203,964 UART: [art] PUB.Y = 9A84EB8AD06A7FEBD765747C0F31EE763E49AEB1C0E812535600353004E34E5A722CB96F3EF667BB711FB50F855F9D73
25,211,229 UART: [art] SIG.R = 37F34686EE9A531F4733F97A6540005129E73C74B530DF38C8FFAE67F78BEA39C42BB7F4136D36E3E4C71980BB61007D
25,218,545 UART: [art] SIG.S = F94C7E32D1E0CE395C14BAA2CEB07C5FF55C0CF07C34E4B189C858F4BC9AFED4988EE9475641D37EC5AE193DCACB5F27
26,197,455 UART: Caliptra RT
26,198,150 UART: [state] CFI Enabled
26,331,179 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,750,992 ready_for_fw is high
3,751,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,409 >>> mbox cmd response: success
19,301,765 UART:
19,302,173 UART: Running Caliptra FMC ...
19,303,486 UART:
19,303,665 UART: [state] CFI Enabled
19,311,406 UART: [fht] FMC Alias Private Key: 7
21,077,726 UART: [art] Extend RT PCRs Done
21,078,967 UART: [art] Lock RT PCRs Done
21,080,286 UART: [art] Populate DV Done
21,085,722 UART: [fht] FMC Alias Private Key: 7
21,087,230 UART: [art] Derive CDI
21,088,003 UART: [art] Store in slot 0x4
21,130,400 UART: [art] Derive Key Pair
21,131,406 UART: [art] Store priv key in slot 0x5
23,558,432 UART: [art] Derive Key Pair - Done
23,571,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,612 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,146 UART: [art] PUB.X = 573059403CB7CC6F3763A2A3A19888E6E3688EE912F32A3DCCD33458F9A6AFC1F3111681A0F0950CB19BFE8AD093BAEE
25,286,394 UART: [art] PUB.Y = 88CC8343A507728DD31BA54D8B01FC80BA61A9D90100133A3FC5414C64BFBAEA66E412DE1439FA3FE5BBC702AEAD9270
25,293,644 UART: [art] SIG.R = 26BFA27A0D165E189F2B12F769EDC11AFC09454436B7F44366E9B25A96EB7F94AE436667E7C053DBD87E871107902131
25,301,081 UART: [art] SIG.S = 0BFDC53AF7280D206DFEBAD2B0AC6AC9C6CC2839100C430D2D0FE06DAEE62A56F655F89536CCB97C90846F38AC3C2F9E
26,279,669 UART: Caliptra RT
26,280,380 UART: [state] CFI Enabled
26,413,917 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,789 UART: [kat] SHA2-256
881,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,835 UART: [kat] ++
885,987 UART: [kat] sha1
890,343 UART: [kat] SHA2-256
892,281 UART: [kat] SHA2-384
895,130 UART: [kat] SHA2-512-ACC
897,031 UART: [kat] ECC-384
902,852 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,421 UART: [cold-reset] ++
1,476,913 UART: [fht] Storing FHT @ 0x50003400
1,479,586 UART: [idev] ++
1,479,754 UART: [idev] CDI.KEYID = 6
1,480,114 UART: [idev] SUBJECT.KEYID = 7
1,480,538 UART: [idev] UDS.KEYID = 0
1,480,883 ready_for_fw is high
1,480,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,892 UART: [idev] Erasing UDS.KEYID = 0
1,505,394 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,044 UART: [idev] --
1,515,219 UART: [ldev] ++
1,515,387 UART: [ldev] CDI.KEYID = 6
1,515,750 UART: [ldev] SUBJECT.KEYID = 5
1,516,176 UART: [ldev] AUTHORITY.KEYID = 7
1,516,639 UART: [ldev] FE.KEYID = 1
1,521,709 UART: [ldev] Erasing FE.KEYID = 1
1,546,912 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,042 UART: [ldev] --
1,586,499 UART: [fwproc] Waiting for Commands...
1,587,270 UART: [fwproc] Received command 0x46574c44
1,588,061 UART: [fwproc] Received Image of size 118548 bytes
2,933,099 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,165 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,383 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,682 >>> mbox cmd response: success
3,132,772 UART: [afmc] ++
3,132,940 UART: [afmc] CDI.KEYID = 6
3,133,302 UART: [afmc] SUBJECT.KEYID = 7
3,133,727 UART: [afmc] AUTHORITY.KEYID = 5
3,168,040 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,628 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,408 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,117 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,000 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,683 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,649 UART: [afmc] --
3,210,531 UART: [cold-reset] --
3,211,491 UART: [state] Locking Datavault
3,212,748 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,352 UART: [state] Locking ICCM
3,213,926 UART: [exit] Launching FMC @ 0x40000130
3,219,256 UART:
3,219,272 UART: Running Caliptra FMC ...
3,219,680 UART:
3,219,734 UART: [state] CFI Enabled
3,230,376 UART: [fht] FMC Alias Private Key: 7
3,349,444 UART: [art] Extend RT PCRs Done
3,349,872 UART: [art] Lock RT PCRs Done
3,351,736 UART: [art] Populate DV Done
3,359,855 UART: [fht] FMC Alias Private Key: 7
3,360,877 UART: [art] Derive CDI
3,361,157 UART: [art] Store in slot 0x4
3,447,433 UART: [art] Derive Key Pair
3,447,793 UART: [art] Store priv key in slot 0x5
3,460,514 UART: [art] Derive Key Pair - Done
3,475,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,583 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,348 UART: [art] PUB.X = 6A85DAEBB7530F29393B6ABCA19B4633B539755181719CBB1BB7D7CF80E25DEDD53B715CD3D7BF87E80103D4E88BB6C8
3,498,125 UART: [art] PUB.Y = CED32EFA16B198FB27BA6A620216D995CE32342794AA439E748FC205B111452A8650D0E6E110911175D5E11405777E68
3,505,060 UART: [art] SIG.R = ABA1B7E001D168989EBB7F6D079C5790F12060E71542B3B50703B46FF073EC8D7F16A301B07841073A3D8581854C2C90
3,511,808 UART: [art] SIG.S = 300CED47C6C61866251D50F8C6A6CC5F80B91085834A0A0FA0B35594B8EB1A4A2C7A756FEF698DF429936E4F5750B933
3,535,047 UART: Caliptra RT
3,535,298 UART: [state] CFI Enabled
3,655,704 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,745 ready_for_fw is high
1,362,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,128 >>> mbox cmd response: success
3,044,715 UART:
3,044,731 UART: Running Caliptra FMC ...
3,045,139 UART:
3,045,193 UART: [state] CFI Enabled
3,055,673 UART: [fht] FMC Alias Private Key: 7
3,174,285 UART: [art] Extend RT PCRs Done
3,174,713 UART: [art] Lock RT PCRs Done
3,176,137 UART: [art] Populate DV Done
3,184,562 UART: [fht] FMC Alias Private Key: 7
3,185,684 UART: [art] Derive CDI
3,185,964 UART: [art] Store in slot 0x4
3,272,190 UART: [art] Derive Key Pair
3,272,550 UART: [art] Store priv key in slot 0x5
3,286,335 UART: [art] Derive Key Pair - Done
3,301,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,490 UART: [art] PUB.X = 7438A315D0B997E0CAE7F67992D4FED787E28D17ABA6C89A1CAF919C5137F538DA6CD580C49B401DED90BD4C389B9B76
3,324,274 UART: [art] PUB.Y = 55EF01F18342C82BA476688131A4F65C1CAFC50EA1134871EB0F74F1C6EF26E2F56E7458E164E1F39A0F715C8D730A8B
3,331,215 UART: [art] SIG.R = 04509D7BB41ECBC9F955D68E483268EA613AA850FD0E28A5EEAFBB6CA48C3B32DEF0DD79D32B69E79D92325BDD7D9B87
3,338,001 UART: [art] SIG.S = B95D214D49F8ACB4CEAF86C05344E2C0FA4589F292EF17637D1D07F17E6F8E304BAFEF2367EAA3DEF3132ACB79AEE62E
3,361,892 UART: Caliptra RT
3,362,143 UART: [state] CFI Enabled
3,483,043 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,542 UART: [kat] SHA2-256
882,473 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,588 UART: [kat] ++
886,740 UART: [kat] sha1
890,910 UART: [kat] SHA2-256
892,848 UART: [kat] SHA2-384
895,671 UART: [kat] SHA2-512-ACC
897,572 UART: [kat] ECC-384
903,453 UART: [kat] HMAC-384Kdf
908,279 UART: [kat] LMS
1,476,475 UART: [kat] --
1,477,194 UART: [cold-reset] ++
1,477,550 UART: [fht] Storing FHT @ 0x50003400
1,480,261 UART: [idev] ++
1,480,429 UART: [idev] CDI.KEYID = 6
1,480,789 UART: [idev] SUBJECT.KEYID = 7
1,481,213 UART: [idev] UDS.KEYID = 0
1,481,558 ready_for_fw is high
1,481,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,139 UART: [idev] Erasing UDS.KEYID = 0
1,505,845 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,371 UART: [idev] --
1,515,488 UART: [ldev] ++
1,515,656 UART: [ldev] CDI.KEYID = 6
1,516,019 UART: [ldev] SUBJECT.KEYID = 5
1,516,445 UART: [ldev] AUTHORITY.KEYID = 7
1,516,908 UART: [ldev] FE.KEYID = 1
1,522,206 UART: [ldev] Erasing FE.KEYID = 1
1,547,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,759 UART: [ldev] --
1,587,218 UART: [fwproc] Waiting for Commands...
1,587,903 UART: [fwproc] Received command 0x46574c44
1,588,694 UART: [fwproc] Received Image of size 118548 bytes
2,933,566 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,306 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,524 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,763 >>> mbox cmd response: success
3,134,007 UART: [afmc] ++
3,134,175 UART: [afmc] CDI.KEYID = 6
3,134,537 UART: [afmc] SUBJECT.KEYID = 7
3,134,962 UART: [afmc] AUTHORITY.KEYID = 5
3,169,905 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,977 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,757 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,466 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,349 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,032 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,918 UART: [afmc] --
3,212,852 UART: [cold-reset] --
3,213,736 UART: [state] Locking Datavault
3,214,859 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,463 UART: [state] Locking ICCM
3,216,107 UART: [exit] Launching FMC @ 0x40000130
3,221,437 UART:
3,221,453 UART: Running Caliptra FMC ...
3,221,861 UART:
3,222,004 UART: [state] CFI Enabled
3,232,756 UART: [fht] FMC Alias Private Key: 7
3,351,888 UART: [art] Extend RT PCRs Done
3,352,316 UART: [art] Lock RT PCRs Done
3,353,798 UART: [art] Populate DV Done
3,361,911 UART: [fht] FMC Alias Private Key: 7
3,363,045 UART: [art] Derive CDI
3,363,325 UART: [art] Store in slot 0x4
3,449,125 UART: [art] Derive Key Pair
3,449,485 UART: [art] Store priv key in slot 0x5
3,462,716 UART: [art] Derive Key Pair - Done
3,477,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,100 UART: [art] PUB.X = FBBAA48191F5A49EDC2C631E4BE2B301B581877C6D21CE88FA9C2EEA7DE446488DABEC1A9F733ACE3CD47CAEF0551BCD
3,500,899 UART: [art] PUB.Y = 71B7B738F17AE99B8F389A167CC60BCE7F36360A8E62FF285CC7CFFEDBCA9F10EE266BF92A13BEAC6918A090D12235B9
3,507,863 UART: [art] SIG.R = EA0F074BE02F3AAB7243CF8421F419FE8DB51E023F4EA3274471D8E12C573F657E4EE378C9B34E73A56926207337D210
3,514,626 UART: [art] SIG.S = FDACA28895F99AE0E2A7622A0709E3C46FDB485ABC3F755968EAEDBF9C49062E0450FD66E6D3BC01F7F7DC2FDA1C50E7
3,538,145 UART: Caliptra RT
3,538,488 UART: [state] CFI Enabled
3,659,125 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,392 ready_for_fw is high
1,362,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,727 >>> mbox cmd response: success
3,041,520 UART:
3,041,536 UART: Running Caliptra FMC ...
3,041,944 UART:
3,042,087 UART: [state] CFI Enabled
3,053,013 UART: [fht] FMC Alias Private Key: 7
3,172,497 UART: [art] Extend RT PCRs Done
3,172,925 UART: [art] Lock RT PCRs Done
3,174,479 UART: [art] Populate DV Done
3,182,482 UART: [fht] FMC Alias Private Key: 7
3,183,662 UART: [art] Derive CDI
3,183,942 UART: [art] Store in slot 0x4
3,269,782 UART: [art] Derive Key Pair
3,270,142 UART: [art] Store priv key in slot 0x5
3,283,537 UART: [art] Derive Key Pair - Done
3,298,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,011 UART: [art] PUB.X = 05D49F1BAEF84E8BFC8C16B9E2FA200A84E890C396299F6015515B20A2A7A070266800069C79EF6811E3AC2F02E61BBD
3,320,753 UART: [art] PUB.Y = EA518C0E583C5F6262FC6327FA3154BC9DD2728D332DA409EDC2F0AD8FDA075E0BD5E20015DC28E48FEFAF5F0A434F0B
3,327,685 UART: [art] SIG.R = C600A6E6ADA27614419B151A7814D391118AA717710D7B841B25631462360CEF0C5E0E935B7E04D28174E1638E2E8B7B
3,334,412 UART: [art] SIG.S = 811E85446F24CA2F9C7AE2D960E40705C6D80692018237712443949A53AFA9D57F53F26B2CE4F1D9252333D25573E9AF
3,358,290 UART: Caliptra RT
3,358,633 UART: [state] CFI Enabled
3,478,106 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
890,890 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,994 UART: [kat] ++
895,146 UART: [kat] sha1
899,398 UART: [kat] SHA2-256
901,338 UART: [kat] SHA2-384
904,077 UART: [kat] SHA2-512-ACC
905,978 UART: [kat] ECC-384
915,467 UART: [kat] HMAC-384Kdf
920,013 UART: [kat] LMS
1,168,325 UART: [kat] --
1,169,302 UART: [cold-reset] ++
1,169,662 UART: [fht] FHT @ 0x50003400
1,172,262 UART: [idev] ++
1,172,430 UART: [idev] CDI.KEYID = 6
1,172,791 UART: [idev] SUBJECT.KEYID = 7
1,173,216 UART: [idev] UDS.KEYID = 0
1,173,562 ready_for_fw is high
1,173,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,193 UART: [idev] Erasing UDS.KEYID = 0
1,198,395 UART: [idev] Sha1 KeyId Algorithm
1,207,423 UART: [idev] --
1,208,616 UART: [ldev] ++
1,208,784 UART: [ldev] CDI.KEYID = 6
1,209,148 UART: [ldev] SUBJECT.KEYID = 5
1,209,575 UART: [ldev] AUTHORITY.KEYID = 7
1,210,038 UART: [ldev] FE.KEYID = 1
1,215,438 UART: [ldev] Erasing FE.KEYID = 1
1,241,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,446 UART: [ldev] --
1,280,877 UART: [fwproc] Wait for Commands...
1,281,656 UART: [fwproc] Recv command 0x46574c44
1,282,389 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,253 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,428 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,731 >>> mbox cmd response: success
2,826,917 UART: [afmc] ++
2,827,085 UART: [afmc] CDI.KEYID = 6
2,827,448 UART: [afmc] SUBJECT.KEYID = 7
2,827,874 UART: [afmc] AUTHORITY.KEYID = 5
2,863,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,227 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,937 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,818 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,519 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,192 UART: [afmc] --
2,906,021 UART: [cold-reset] --
2,907,019 UART: [state] Locking Datavault
2,908,168 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,772 UART: [state] Locking ICCM
2,909,200 UART: [exit] Launching FMC @ 0x40000130
2,914,530 UART:
2,914,546 UART: Running Caliptra FMC ...
2,914,954 UART:
2,915,008 UART: [state] CFI Enabled
2,925,338 UART: [fht] FMC Alias Private Key: 7
3,044,306 UART: [art] Extend RT PCRs Done
3,044,734 UART: [art] Lock RT PCRs Done
3,046,466 UART: [art] Populate DV Done
3,054,757 UART: [fht] FMC Alias Private Key: 7
3,055,735 UART: [art] Derive CDI
3,056,015 UART: [art] Store in slot 0x4
3,141,716 UART: [art] Derive Key Pair
3,142,076 UART: [art] Store priv key in slot 0x5
3,156,156 UART: [art] Derive Key Pair - Done
3,171,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,593 UART: [art] PUB.X = EE7DB4F4F4BB85B9F38FFF04CE4A6F6C8B41F8C70325F5E3418B45EFAED8DF2F8A9C41F6CEEB816F7F342A1DDD13B1FC
3,194,391 UART: [art] PUB.Y = 1659E8ACA8D955E5D6C415CED0C832D1FB239B7B06635DD0238AC76CECADE63E0FEBC051B0F15DBE3D4E5B382D80CAE2
3,201,361 UART: [art] SIG.R = 5F3946AEA72688B7F8284924399F8CE6361A2A7E8AF5A13ECFDA5C7F517D01536F84F9B67C98439513465690DEA6BD18
3,208,130 UART: [art] SIG.S = 413D1E27AC1DA556C96F863A182D373FB7EF156BA1CDF2D6C2FB8F95A2E21A2AB281FDD6D9697EEA113A7DC87C0119F0
3,231,815 UART: Caliptra RT
3,232,066 UART: [state] CFI Enabled
3,352,174 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,980 ready_for_fw is high
1,059,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,724 >>> mbox cmd response: success
2,741,041 UART:
2,741,057 UART: Running Caliptra FMC ...
2,741,465 UART:
2,741,519 UART: [state] CFI Enabled
2,752,305 UART: [fht] FMC Alias Private Key: 7
2,871,199 UART: [art] Extend RT PCRs Done
2,871,627 UART: [art] Lock RT PCRs Done
2,873,275 UART: [art] Populate DV Done
2,881,328 UART: [fht] FMC Alias Private Key: 7
2,882,404 UART: [art] Derive CDI
2,882,684 UART: [art] Store in slot 0x4
2,968,585 UART: [art] Derive Key Pair
2,968,945 UART: [art] Store priv key in slot 0x5
2,982,391 UART: [art] Derive Key Pair - Done
2,997,063 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,197 UART: [art] PUB.X = 511841B42A53F0E17888A263EBF55FBAACD883A0CBB0ED1E4D8D555CA4B99A7EBE3F69B0745D17DCD0301F1D9F6FE482
3,019,987 UART: [art] PUB.Y = EF9E9C9C3AC70D3939B88A53A183F67249820BB584011847DA6D05CA4C36CB6F88F22AEA17904998C8D416AC880B6E6E
3,026,928 UART: [art] SIG.R = DC66F2162750ADF99DCFF7016A8ADF34A9BD34F1A38531C0ADDC382C282FEC9969C64ECD4590C8FAD5CC6F7CF6515C9B
3,033,719 UART: [art] SIG.S = 3C8BC67A05402175CD8C86D74487F98FC404A174F33A82C1EBE63940D007118F04C1F4FC291F2DD0C7DE0852E7301CE5
3,057,304 UART: Caliptra RT
3,057,555 UART: [state] CFI Enabled
3,177,198 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,933 UART: [state] LifecycleState = Unprovisioned
86,588 UART: [state] DebugLocked = No
87,174 UART: [state] WD Timer not started. Device not locked for debugging
88,359 UART: [kat] SHA2-256
891,909 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,013 UART: [kat] ++
896,165 UART: [kat] sha1
900,365 UART: [kat] SHA2-256
902,305 UART: [kat] SHA2-384
905,064 UART: [kat] SHA2-512-ACC
906,965 UART: [kat] ECC-384
916,488 UART: [kat] HMAC-384Kdf
921,274 UART: [kat] LMS
1,169,586 UART: [kat] --
1,170,627 UART: [cold-reset] ++
1,171,095 UART: [fht] FHT @ 0x50003400
1,173,535 UART: [idev] ++
1,173,703 UART: [idev] CDI.KEYID = 6
1,174,064 UART: [idev] SUBJECT.KEYID = 7
1,174,489 UART: [idev] UDS.KEYID = 0
1,174,835 ready_for_fw is high
1,174,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,694 UART: [idev] Erasing UDS.KEYID = 0
1,199,890 UART: [idev] Sha1 KeyId Algorithm
1,208,762 UART: [idev] --
1,209,823 UART: [ldev] ++
1,209,991 UART: [ldev] CDI.KEYID = 6
1,210,355 UART: [ldev] SUBJECT.KEYID = 5
1,210,782 UART: [ldev] AUTHORITY.KEYID = 7
1,211,245 UART: [ldev] FE.KEYID = 1
1,216,501 UART: [ldev] Erasing FE.KEYID = 1
1,243,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,667 UART: [ldev] --
1,281,948 UART: [fwproc] Wait for Commands...
1,282,519 UART: [fwproc] Recv command 0x46574c44
1,283,252 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,536 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,711 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,898 >>> mbox cmd response: success
2,829,110 UART: [afmc] ++
2,829,278 UART: [afmc] CDI.KEYID = 6
2,829,641 UART: [afmc] SUBJECT.KEYID = 7
2,830,067 UART: [afmc] AUTHORITY.KEYID = 5
2,865,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,920 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,630 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,511 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,212 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,989 UART: [afmc] --
2,908,940 UART: [cold-reset] --
2,909,718 UART: [state] Locking Datavault
2,910,881 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,485 UART: [state] Locking ICCM
2,912,071 UART: [exit] Launching FMC @ 0x40000130
2,917,401 UART:
2,917,417 UART: Running Caliptra FMC ...
2,917,825 UART:
2,917,968 UART: [state] CFI Enabled
2,928,482 UART: [fht] FMC Alias Private Key: 7
3,047,576 UART: [art] Extend RT PCRs Done
3,048,004 UART: [art] Lock RT PCRs Done
3,049,526 UART: [art] Populate DV Done
3,057,711 UART: [fht] FMC Alias Private Key: 7
3,058,667 UART: [art] Derive CDI
3,058,947 UART: [art] Store in slot 0x4
3,144,794 UART: [art] Derive Key Pair
3,145,154 UART: [art] Store priv key in slot 0x5
3,159,230 UART: [art] Derive Key Pair - Done
3,173,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,918 UART: [art] PUB.X = 2D154EA7659DE1D7342211B8E2B6DB22B6FC81876152E6E77A99979232D44AC4B53BF9687EDEE01CF0F8AF7DEF5AA6A3
3,196,702 UART: [art] PUB.Y = 322198B3036DF35EECD69D8D5E7B4D940C2D050EED904236EE8206D0A293ADB68F6E93BD417883DE915792A147CA7FF3
3,203,645 UART: [art] SIG.R = 605B42BA5C2A1DC48DA8F1C569A9AE3432C8DFE7DB17114BC01BF961956C25E34D0CC0F9CCCA52692EA0FE3AB9C45056
3,210,432 UART: [art] SIG.S = 4F224341B87E989B4CEB2D220607C9ECC8ECACA8DC1D7E7D526DE4692F7C8A528C1B77D683CAEF519DC843BA4B2C6A91
3,233,958 UART: Caliptra RT
3,234,301 UART: [state] CFI Enabled
3,353,327 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,485 ready_for_fw is high
1,060,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,097 >>> mbox cmd response: success
2,744,262 UART:
2,744,278 UART: Running Caliptra FMC ...
2,744,686 UART:
2,744,829 UART: [state] CFI Enabled
2,755,815 UART: [fht] FMC Alias Private Key: 7
2,875,145 UART: [art] Extend RT PCRs Done
2,875,573 UART: [art] Lock RT PCRs Done
2,877,345 UART: [art] Populate DV Done
2,885,546 UART: [fht] FMC Alias Private Key: 7
2,886,622 UART: [art] Derive CDI
2,886,902 UART: [art] Store in slot 0x4
2,973,015 UART: [art] Derive Key Pair
2,973,375 UART: [art] Store priv key in slot 0x5
2,986,179 UART: [art] Derive Key Pair - Done
3,000,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,798 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,563 UART: [art] PUB.X = E8293BB4714291F6BA38FFC0CBAA43EC8555A72672C3E4C29A3F705CE815823AC779651EF3A166F9ACC28565ACE1DC28
3,023,345 UART: [art] PUB.Y = DE8AC19611C27CC7C8428027DF11C370790692D6646C86C2D1D546AFECEED78BE71BF0863A078BA59FF626176464911F
3,030,293 UART: [art] SIG.R = FC423BDAC9446A1C15E9BC4AFFDD43CF84386FA6D0AC6EFE1CD2AAF355B143D404746024EEA2B611EA84B26447D6CB5A
3,037,086 UART: [art] SIG.S = A25EB2C1DF5A03086EFE392A4DC0785EBF5F726603AF49EAC7FA2DD9C98C1BEB1DDF916239096ABAFC908F9691EB45F9
3,060,928 UART: Caliptra RT
3,061,271 UART: [state] CFI Enabled
3,181,585 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
893,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,577 UART: [kat] ++
897,729 UART: [kat] sha1
902,041 UART: [kat] SHA2-256
903,981 UART: [kat] SHA2-384
906,774 UART: [kat] SHA2-512-ACC
908,675 UART: [kat] ECC-384
918,464 UART: [kat] HMAC-384Kdf
923,132 UART: [kat] LMS
1,171,460 UART: [kat] --
1,172,223 UART: [cold-reset] ++
1,172,709 UART: [fht] FHT @ 0x50003400
1,175,384 UART: [idev] ++
1,175,552 UART: [idev] CDI.KEYID = 6
1,175,912 UART: [idev] SUBJECT.KEYID = 7
1,176,336 UART: [idev] UDS.KEYID = 0
1,176,681 ready_for_fw is high
1,176,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,984 UART: [idev] Erasing UDS.KEYID = 0
1,200,417 UART: [idev] Sha1 KeyId Algorithm
1,208,895 UART: [idev] --
1,209,931 UART: [ldev] ++
1,210,099 UART: [ldev] CDI.KEYID = 6
1,210,462 UART: [ldev] SUBJECT.KEYID = 5
1,210,888 UART: [ldev] AUTHORITY.KEYID = 7
1,211,351 UART: [ldev] FE.KEYID = 1
1,216,117 UART: [ldev] Erasing FE.KEYID = 1
1,242,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,385 UART: [ldev] --
1,281,722 UART: [fwproc] Wait for Commands...
1,282,414 UART: [fwproc] Recv command 0x46574c44
1,283,142 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,928 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,098 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,277 >>> mbox cmd response: success
2,827,327 UART: [afmc] ++
2,827,495 UART: [afmc] CDI.KEYID = 6
2,827,857 UART: [afmc] SUBJECT.KEYID = 7
2,828,282 UART: [afmc] AUTHORITY.KEYID = 5
2,863,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,386 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,095 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,978 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,679 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,723 UART: [afmc] --
2,906,765 UART: [cold-reset] --
2,907,531 UART: [state] Locking Datavault
2,908,718 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,322 UART: [state] Locking ICCM
2,909,886 UART: [exit] Launching FMC @ 0x40000130
2,915,216 UART:
2,915,232 UART: Running Caliptra FMC ...
2,915,640 UART:
2,915,694 UART: [state] CFI Enabled
2,925,814 UART: [fht] FMC Alias Private Key: 7
3,045,570 UART: [art] Extend RT PCRs Done
3,045,998 UART: [art] Lock RT PCRs Done
3,047,114 UART: [art] Populate DV Done
3,055,177 UART: [fht] FMC Alias Private Key: 7
3,056,207 UART: [art] Derive CDI
3,056,487 UART: [art] Store in slot 0x4
3,142,584 UART: [art] Derive Key Pair
3,142,944 UART: [art] Store priv key in slot 0x5
3,156,446 UART: [art] Derive Key Pair - Done
3,170,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,593 UART: [art] PUB.X = 1FED2036EF7FC6B56E1503FFBCF70AF9BAF922471F0943AA7F0E229119B2E564E000A70EBB8ED61559C7C896F00DB62C
3,194,339 UART: [art] PUB.Y = 85EAA872A77D680DB1879534F2D4E6C34C1AACC43EC677818F1480343547279F51702D9D3360573BDA812CB1FB28EC22
3,201,286 UART: [art] SIG.R = 5CDB8BCE8D8FFD5E709050B0D09EBD1ECAE8262A8016D84F01E77D7BBD78E74F46B94ECCC22E2968AFE6953355A91BE9
3,208,075 UART: [art] SIG.S = D5DC02ADC829B2AE18989829F2C47BCB7FE4A6FCA69D9B1FE4C342D156F14DD3A94B5D467EA6BDA6B2955539B123737C
3,231,364 UART: Caliptra RT
3,231,615 UART: [state] CFI Enabled
3,351,430 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,203 ready_for_fw is high
1,060,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,422 >>> mbox cmd response: success
2,740,247 UART:
2,740,263 UART: Running Caliptra FMC ...
2,740,671 UART:
2,740,725 UART: [state] CFI Enabled
2,751,065 UART: [fht] FMC Alias Private Key: 7
2,869,997 UART: [art] Extend RT PCRs Done
2,870,425 UART: [art] Lock RT PCRs Done
2,872,243 UART: [art] Populate DV Done
2,880,420 UART: [fht] FMC Alias Private Key: 7
2,881,500 UART: [art] Derive CDI
2,881,780 UART: [art] Store in slot 0x4
2,967,487 UART: [art] Derive Key Pair
2,967,847 UART: [art] Store priv key in slot 0x5
2,981,445 UART: [art] Derive Key Pair - Done
2,995,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,129 UART: [art] PUB.X = 1CDBFA5A60227C22A02CE5418D8B8A17FA2344CD7FCDA802B7CBCEEEBA18D8CE1D0FE12EF4BDA94351A98875B178453F
3,018,919 UART: [art] PUB.Y = BDF123924AF175454C7D443783D9F7A90FAAD288CFCAE23E273ECE505344F52F922D72E209C7626CF7DE38A2349DE2E2
3,025,873 UART: [art] SIG.R = 4CD83720602F6790E19AB448D70DEEE40D2C7A3790B21FF32048CAC63B4C50A4D70C1A88CA993CA8CFECF54AA8F3E66A
3,032,652 UART: [art] SIG.S = BD0D956BDA1F94381CDB4857EED71019579024E21F6182CFB69BDF2CF8D08ECA93D9A9825A4CF4D95BB9D5D00EF2BCEF
3,056,186 UART: Caliptra RT
3,056,437 UART: [state] CFI Enabled
3,175,398 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,891 UART: [state] LifecycleState = Unprovisioned
86,546 UART: [state] DebugLocked = No
87,146 UART: [state] WD Timer not started. Device not locked for debugging
88,453 UART: [kat] SHA2-256
894,103 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,228 UART: [kat] ++
898,380 UART: [kat] sha1
902,768 UART: [kat] SHA2-256
904,708 UART: [kat] SHA2-384
907,345 UART: [kat] SHA2-512-ACC
909,246 UART: [kat] ECC-384
918,873 UART: [kat] HMAC-384Kdf
923,533 UART: [kat] LMS
1,171,861 UART: [kat] --
1,172,456 UART: [cold-reset] ++
1,172,836 UART: [fht] FHT @ 0x50003400
1,175,449 UART: [idev] ++
1,175,617 UART: [idev] CDI.KEYID = 6
1,175,977 UART: [idev] SUBJECT.KEYID = 7
1,176,401 UART: [idev] UDS.KEYID = 0
1,176,746 ready_for_fw is high
1,176,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,019 UART: [idev] Erasing UDS.KEYID = 0
1,200,864 UART: [idev] Sha1 KeyId Algorithm
1,209,438 UART: [idev] --
1,210,626 UART: [ldev] ++
1,210,794 UART: [ldev] CDI.KEYID = 6
1,211,157 UART: [ldev] SUBJECT.KEYID = 5
1,211,583 UART: [ldev] AUTHORITY.KEYID = 7
1,212,046 UART: [ldev] FE.KEYID = 1
1,217,206 UART: [ldev] Erasing FE.KEYID = 1
1,243,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,242 UART: [ldev] --
1,282,721 UART: [fwproc] Wait for Commands...
1,283,443 UART: [fwproc] Recv command 0x46574c44
1,284,171 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,451 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,621 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,868 >>> mbox cmd response: success
2,829,018 UART: [afmc] ++
2,829,186 UART: [afmc] CDI.KEYID = 6
2,829,548 UART: [afmc] SUBJECT.KEYID = 7
2,829,973 UART: [afmc] AUTHORITY.KEYID = 5
2,866,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,035 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,744 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,627 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,328 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,158 UART: [afmc] --
2,909,128 UART: [cold-reset] --
2,910,042 UART: [state] Locking Datavault
2,911,139 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,743 UART: [state] Locking ICCM
2,912,273 UART: [exit] Launching FMC @ 0x40000130
2,917,603 UART:
2,917,619 UART: Running Caliptra FMC ...
2,918,027 UART:
2,918,170 UART: [state] CFI Enabled
2,928,778 UART: [fht] FMC Alias Private Key: 7
3,048,142 UART: [art] Extend RT PCRs Done
3,048,570 UART: [art] Lock RT PCRs Done
3,050,036 UART: [art] Populate DV Done
3,057,947 UART: [fht] FMC Alias Private Key: 7
3,059,103 UART: [art] Derive CDI
3,059,383 UART: [art] Store in slot 0x4
3,145,144 UART: [art] Derive Key Pair
3,145,504 UART: [art] Store priv key in slot 0x5
3,159,216 UART: [art] Derive Key Pair - Done
3,173,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,358 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,123 UART: [art] PUB.X = 6021DBA0E55C4775F4E3D7644A6B2A874A1CD2A6DF76BEBEB836C550527EF0F3EE55CB16B37D1FB051F662B926953AE0
3,196,907 UART: [art] PUB.Y = FE841059DAE98016E5F4A3C6E4267E660EE71031B97497C59B40BA1E0DE0C6C95E0CB6B89E1A67BFB1A57898D110E9DC
3,203,860 UART: [art] SIG.R = 580E77968E5E02F8087148F7D3FD4E40189B0DE86AD14CABBC7954FC7E7AD82173D5ED7FDECFBACE08DEA348D5978611
3,210,633 UART: [art] SIG.S = 2CDC82362B235AC588288A82276A7A1DC02E2297CF3FEA25E4E49D8806CBDD78B03D59299F9A4C6CDDBB73C5F941F699
3,234,878 UART: Caliptra RT
3,235,221 UART: [state] CFI Enabled
3,354,273 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,236 ready_for_fw is high
1,061,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,511 >>> mbox cmd response: success
2,742,598 UART:
2,742,614 UART: Running Caliptra FMC ...
2,743,022 UART:
2,743,165 UART: [state] CFI Enabled
2,753,813 UART: [fht] FMC Alias Private Key: 7
2,872,739 UART: [art] Extend RT PCRs Done
2,873,167 UART: [art] Lock RT PCRs Done
2,874,833 UART: [art] Populate DV Done
2,883,264 UART: [fht] FMC Alias Private Key: 7
2,884,204 UART: [art] Derive CDI
2,884,484 UART: [art] Store in slot 0x4
2,970,233 UART: [art] Derive Key Pair
2,970,593 UART: [art] Store priv key in slot 0x5
2,983,647 UART: [art] Derive Key Pair - Done
2,998,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,288 UART: [art] PUB.X = E701E633945A3258AF0B9BB5A14BC64D3F785A8C656E941C3D8B1537562E1CDC7756341FAAB636877929B7F4AC74A3CA
3,021,058 UART: [art] PUB.Y = DC0415CB0F2C2175C2ECED23BF32B03B5D26E8BEACFF97C320363EF30D89ADE1AD9FEBE39FBE637554C4FF72BF690C1F
3,028,026 UART: [art] SIG.R = 2F28597ACB8B1E5AAFA8291F7F0C28D9E5DA48A9732166618146D73600CF25D181528F81DA683AC8634E27992606D9B5
3,034,766 UART: [art] SIG.S = 43D1E465E133BFB49232D831152756A44182749A78BD2AED055867DAF6E7F287BAE538853B12E436967A27DD5669E7A1
3,058,237 UART: Caliptra RT
3,058,580 UART: [state] CFI Enabled
3,177,992 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
2,227,570 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,229,187 UART:
2,229,457 UART: Running Caliptra ROM ...
2,230,539 UART:
2,230,696 UART: [state] CFI Enabled
2,231,590 UART: [state] LifecycleState = Unprovisioned
2,233,259 UART: [state] DebugLocked = No
2,234,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,237,628 UART: [kat] SHA2-256
2,238,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,241,308 UART: [kat] ++
2,241,759 UART: [kat] sha1
2,242,293 UART: [kat] SHA2-256
2,243,037 UART: [kat] SHA2-384
2,243,707 UART: [kat] SHA2-512-ACC
2,244,536 UART: [kat] ECC-384
2,766,824 UART: [kat] HMAC-384Kdf
2,798,059 UART: [kat] LMS
3,988,318 UART: [kat] --
3,992,716 UART: [cold-reset] ++
3,995,036 UART: [fht] Storing FHT @ 0x50003400
4,006,846 UART: [idev] ++
4,007,417 UART: [idev] CDI.KEYID = 6
4,008,448 UART: [idev] SUBJECT.KEYID = 7
4,009,614 UART: [idev] UDS.KEYID = 0
4,030,524 UART: [idev] Erasing UDS.KEYID = 0
7,343,880 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,924 UART: [idev] --
7,370,046 UART: [ldev] ++
7,370,674 UART: [ldev] CDI.KEYID = 6
7,371,583 UART: [ldev] SUBJECT.KEYID = 5
7,372,805 UART: [ldev] AUTHORITY.KEYID = 7
7,374,098 UART: [ldev] FE.KEYID = 1
7,417,928 UART: [ldev] Erasing FE.KEYID = 1
10,747,729 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,042,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,057,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,086,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,119 UART: [ldev] --
13,110,448 UART: [fwproc] Waiting for Commands...
13,113,421 UART: [fwproc] Received command 0x4d454153
13,122,311 >>> mbox cmd response data (12 bytes)
13,125,218 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,229,662 UART: [fwproc] Received command 0x46574c44
13,231,929 UART: [fwproc] Received Image of size 82832 bytes
16,901,296 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,975,986 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,049,136 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,253,478 >>> mbox cmd response: success
17,257,546 UART: [afmc] ++
17,258,162 UART: [afmc] CDI.KEYID = 6
17,259,053 UART: [afmc] SUBJECT.KEYID = 7
17,260,329 UART: [afmc] AUTHORITY.KEYID = 5
20,617,731 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,914,295 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,916,570 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,931,024 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,945,712 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,960,139 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,981,934 UART: [afmc] --
22,986,235 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,986,583 UART: [cold-reset] --
22,990,047 UART: [state] Locking Datavault
22,994,107 UART: [state] Locking PCR0, PCR1 and PCR31
22,995,865 UART: [state] Locking ICCM
22,997,316 UART: [exit] Launching FMC @ 0x40000130
23,005,710 UART:
23,005,951 UART: Running Caliptra FMC ...
23,007,062 UART:
23,007,248 UART: [state] CFI Enabled
23,074,936 UART: [fht] FMC Alias Private Key: 7
25,414,987 UART: [art] Extend RT PCRs Done
25,416,339 UART: [art] Lock RT PCRs Done
25,417,911 UART: [art] Populate DV Done
25,423,218 UART: [fht] FMC Alias Private Key: 7
25,424,724 UART: [art] Derive CDI
25,425,487 UART: [art] Store in slot 0x4
25,482,289 UART: [art] Derive Key Pair
25,483,286 UART: [art] Store priv key in slot 0x5
28,776,011 UART: [art] Derive Key Pair - Done
28,788,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,078,226 UART: [art] Erasing AUTHORITY.KEYID = 7
31,079,745 UART: [art] PUB.X = 64FAF30B8ECB4129C843E6B10F07DF981CC729250EC0E743D7ED188A88A648F09047151FF6178D1BDEAE3CFA99B3FC34
31,087,028 UART: [art] PUB.Y = 08D495E587FE79AFA43B012B6600A533BCE7729F85DF83432BCD0877EBC8B1C2EF8B8F945312A7E8610E491B7BABD1E1
31,094,275 UART: [art] SIG.R = 77B2CC980C527F3D6087680D9323A2463F44E1253B25A002084E67E688630285F931DD3EFB14B239362E209FFBAF1E70
31,101,673 UART: [art] SIG.S = B31F5E988C34DA73DD7C08852FAEA53B88BF506BCB6797DDE4651E015A59C2E70D0FDB3E3C2747290392F7C690A61CBF
32,405,815 UART: mbox::rt_entry...
32,406,767 UART: ____ _ _ _ ____ _____
32,408,701 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,410,700 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,412,554 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,414,497 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,416,388 UART: |_|
32,417,276 UART:
32,559,379 UART: [rt] Runtime listening for mailbox commands...
32,561,552 >>> mbox cmd response data (48 bytes)
32,562,118 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,564,432 >>> mbox cmd response data (48 bytes)
32,565,314 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,582,227 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
2,228,431 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,825,592 >>> mbox cmd response data (12 bytes)
12,828,535 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,324,904 >>> mbox cmd response: success
22,988,937 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,003,456 UART:
23,003,798 UART: Running Caliptra FMC ...
23,004,928 UART:
23,005,096 UART: [state] CFI Enabled
23,075,717 UART: [fht] FMC Alias Private Key: 7
25,416,295 UART: [art] Extend RT PCRs Done
25,417,517 UART: [art] Lock RT PCRs Done
25,419,258 UART: [art] Populate DV Done
25,424,765 UART: [fht] FMC Alias Private Key: 7
25,426,318 UART: [art] Derive CDI
25,427,136 UART: [art] Store in slot 0x4
25,484,471 UART: [art] Derive Key Pair
25,485,473 UART: [art] Store priv key in slot 0x5
28,778,290 UART: [art] Derive Key Pair - Done
28,791,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,079,333 UART: [art] Erasing AUTHORITY.KEYID = 7
31,080,842 UART: [art] PUB.X = A01C246639C8516DE17104FB49841EECF9AE46C68860705A93E66E07B0A02884330BA17C943B9FF3AC8E882DEDECF153
31,088,154 UART: [art] PUB.Y = DD9173F255FE36B9FB0BE01250962A3BEBE083A099AFFD2C8D5A3D39698472928B8638241750B521E376C099185E8ECA
31,095,391 UART: [art] SIG.R = 26BF67176F583A0C2BAF8EFA155C543134A3D13F6037E7ADFB0CDC50C2740DD6BDE359FFFBE21B8D2238CBE1866DFEB5
31,102,839 UART: [art] SIG.S = 1FC98585DF63F444097D3876EE9FD35CB9DEC87DF6C3B8C28C20B8F832C05192E1FB49A94967C88A73A4330B63548FD5
32,407,731 UART: mbox::rt_entry...
32,408,702 UART: ____ _ _ _ ____ _____
32,410,692 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,412,628 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,414,550 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,416,469 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,418,398 UART: |_|
32,419,204 UART:
32,562,458 UART: [rt] Runtime listening for mailbox commands...
32,564,642 >>> mbox cmd response data (48 bytes)
32,565,226 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,567,552 >>> mbox cmd response data (48 bytes)
32,568,442 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,585,354 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
2,229,964 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,231,669 UART:
2,231,914 UART: Running Caliptra ROM ...
2,232,970 UART:
2,233,121 UART: [state] CFI Enabled
2,234,004 UART: [state] LifecycleState = Unprovisioned
2,235,683 UART: [state] DebugLocked = No
2,236,799 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,240,107 UART: [kat] SHA2-256
2,240,774 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,243,776 UART: [kat] ++
2,244,226 UART: [kat] sha1
2,244,776 UART: [kat] SHA2-256
2,245,457 UART: [kat] SHA2-384
2,246,151 UART: [kat] SHA2-512-ACC
2,247,035 UART: [kat] ECC-384
3,110,958 UART: [kat] HMAC-384Kdf
3,122,986 UART: [kat] LMS
4,313,108 UART: [kat] --
4,317,373 UART: [cold-reset] ++
4,318,538 UART: [fht] Storing FHT @ 0x50003400
4,330,065 UART: [idev] ++
4,330,646 UART: [idev] CDI.KEYID = 6
4,331,578 UART: [idev] SUBJECT.KEYID = 7
4,332,837 UART: [idev] UDS.KEYID = 0
4,349,119 UART: [idev] Erasing UDS.KEYID = 0
7,619,496 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,790 UART: [idev] --
7,644,497 UART: [ldev] ++
7,645,127 UART: [ldev] CDI.KEYID = 6
7,646,003 UART: [ldev] SUBJECT.KEYID = 5
7,647,272 UART: [ldev] AUTHORITY.KEYID = 7
7,648,553 UART: [ldev] FE.KEYID = 1
7,659,117 UART: [ldev] Erasing FE.KEYID = 1
10,947,876 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,365 UART: [ldev] --
13,311,643 UART: [fwproc] Waiting for Commands...
13,314,692 UART: [fwproc] Received command 0x4d454153
13,323,530 >>> mbox cmd response data (12 bytes)
13,326,296 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,431,506 UART: [fwproc] Received command 0x46574c44
13,433,782 UART: [fwproc] Received Image of size 82832 bytes
17,101,185 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,174,883 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,248,012 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,451,692 >>> mbox cmd response: success
17,455,894 UART: [afmc] ++
17,456,477 UART: [afmc] CDI.KEYID = 6
17,457,355 UART: [afmc] SUBJECT.KEYID = 7
17,458,619 UART: [afmc] AUTHORITY.KEYID = 5
20,770,571 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,065,903 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,068,150 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,082,621 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,097,328 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,111,752 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,133,950 UART: [afmc] --
23,137,128 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,137,530 UART: [cold-reset] --
23,139,860 UART: [state] Locking Datavault
23,143,536 UART: [state] Locking PCR0, PCR1 and PCR31
23,145,281 UART: [state] Locking ICCM
23,146,456 UART: [exit] Launching FMC @ 0x40000130
23,154,866 UART:
23,155,140 UART: Running Caliptra FMC ...
23,156,247 UART:
23,156,432 UART: [state] CFI Enabled
23,164,314 UART: [fht] FMC Alias Private Key: 7
25,503,821 UART: [art] Extend RT PCRs Done
25,505,249 UART: [art] Lock RT PCRs Done
25,506,583 UART: [art] Populate DV Done
25,512,054 UART: [fht] FMC Alias Private Key: 7
25,513,593 UART: [art] Derive CDI
25,514,323 UART: [art] Store in slot 0x4
25,557,034 UART: [art] Derive Key Pair
25,558,083 UART: [art] Store priv key in slot 0x5
28,800,148 UART: [art] Derive Key Pair - Done
28,813,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,093,180 UART: [art] Erasing AUTHORITY.KEYID = 7
31,094,705 UART: [art] PUB.X = 9A9DF2E0BD604740E3C0CB63BC77891DF0B872AF3B721DA58C012D53579C8001CFF1CB220713300394419D9859AA4309
31,101,971 UART: [art] PUB.Y = 2C59EC695DD5ADF46A71EDAA06F0D6147F37EA809319FFDB4B5FC4A238AE9C6986EAF9873A7865645D0D79336614E0E8
31,109,257 UART: [art] SIG.R = 4A2F00439E46C36AD55147530ACFAD0695F68B0938A53CFF9584B16BF16D425F2146FC3CD795994B6C4221690086CB4C
31,116,609 UART: [art] SIG.S = D2FEF772456199CFF17DDA46B24E1D9D9789F0B5C76AC5225998C2A9263DF9CB298FCDC8484E8093DFF60F3481EC2FA7
32,420,596 UART: mbox::rt_entry...
32,421,577 UART: ____ _ _ _ ____ _____
32,423,512 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,425,513 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,427,366 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,429,496 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,431,559 UART: |_|
32,432,396 UART:
32,575,544 UART: [rt] Runtime listening for mailbox commands...
32,577,763 >>> mbox cmd response data (48 bytes)
32,578,399 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,580,744 >>> mbox cmd response data (48 bytes)
32,581,641 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,598,511 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
2,231,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,053,255 >>> mbox cmd response data (12 bytes)
13,056,108 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,548,617 >>> mbox cmd response: success
23,173,384 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,188,310 UART:
23,188,624 UART: Running Caliptra FMC ...
23,189,692 UART:
23,189,839 UART: [state] CFI Enabled
23,197,746 UART: [fht] FMC Alias Private Key: 7
25,537,517 UART: [art] Extend RT PCRs Done
25,538,740 UART: [art] Lock RT PCRs Done
25,540,822 UART: [art] Populate DV Done
25,546,275 UART: [fht] FMC Alias Private Key: 7
25,547,755 UART: [art] Derive CDI
25,548,516 UART: [art] Store in slot 0x4
25,591,411 UART: [art] Derive Key Pair
25,592,479 UART: [art] Store priv key in slot 0x5
28,833,789 UART: [art] Derive Key Pair - Done
28,846,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,126,679 UART: [art] Erasing AUTHORITY.KEYID = 7
31,128,188 UART: [art] PUB.X = 6CB80A431CD2CBE6F7F7F3F8001ADF0E1ACF14AFE709BD5C992D644DC1C975D27EF6E24E92F430647FC61E7105553D9B
31,135,431 UART: [art] PUB.Y = D69D2F76D492F3170C88BAD5DF56AA5575C2F23EF8BB8DF35A078FA8BC65B9633BB6EC96EC485A1A2B798DCC676EDB01
31,142,728 UART: [art] SIG.R = 164149B2861D7601449494D190CE915A033BC4374B4FA44F709210628CB3E0D8700B6EAC9CCC22D1C1F09FB3878A216C
31,150,125 UART: [art] SIG.S = D3E7FD75A74DB6CCE420806DB514CE666C4EFE49C7448AC0F6A274E89500CD1614D51E5D495528544B579EABF093A356
32,454,811 UART: mbox::rt_entry...
32,455,766 UART: ____ _ _ _ ____ _____
32,457,853 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,459,854 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,461,708 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,463,654 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,465,505 UART: |_|
32,466,382 UART:
32,608,928 UART: [rt] Runtime listening for mailbox commands...
32,611,102 >>> mbox cmd response data (48 bytes)
32,611,639 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,613,951 >>> mbox cmd response data (48 bytes)
32,614,831 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,631,740 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,208,982 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,210,523 UART:
2,210,780 UART: Running Caliptra ROM ...
2,211,867 UART:
2,212,022 UART: [state] CFI Enabled
2,212,932 UART: [state] LifecycleState = Unprovisioned
2,214,595 UART: [state] DebugLocked = No
2,215,711 UART: [state] WD Timer not started. Device not locked for debugging
2,218,181 UART: [kat] SHA2-256
2,218,850 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,221,864 UART: [kat] ++
2,222,316 UART: [kat] sha1
2,222,828 UART: [kat] SHA2-256
2,223,569 UART: [kat] SHA2-384
2,224,234 UART: [kat] SHA2-512-ACC
2,225,066 UART: [kat] ECC-384
2,924,441 UART: [kat] HMAC-384Kdf
2,947,199 UART: [kat] LMS
3,423,691 UART: [kat] --
3,428,687 UART: [cold-reset] ++
3,429,707 UART: [fht] FHT @ 0x50003400
3,440,441 UART: [idev] ++
3,441,088 UART: [idev] CDI.KEYID = 6
3,441,982 UART: [idev] SUBJECT.KEYID = 7
3,443,255 UART: [idev] UDS.KEYID = 0
3,476,780 UART: [idev] Erasing UDS.KEYID = 0
5,966,510 UART: [idev] Sha1 KeyId Algorithm
5,989,522 UART: [idev] --
5,994,762 UART: [ldev] ++
5,995,369 UART: [ldev] CDI.KEYID = 6
5,996,281 UART: [ldev] SUBJECT.KEYID = 5
5,997,490 UART: [ldev] AUTHORITY.KEYID = 7
5,998,741 UART: [ldev] FE.KEYID = 1
6,034,932 UART: [ldev] Erasing FE.KEYID = 1
8,539,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,267 UART: [ldev] --
10,351,101 UART: [fwproc] Wait for Commands...
10,352,924 UART: [fwproc] Recv command 0x4d454153
10,362,147 >>> mbox cmd response data (12 bytes)
10,364,702 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
10,469,158 UART: [fwproc] Recv command 0x46574c44
10,471,218 UART: [fwproc] Recv'd Img size: 82832 bytes
13,516,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,600,085 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,673,114 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,877,027 >>> mbox cmd response: success
13,882,015 UART: [afmc] ++
13,882,608 UART: [afmc] CDI.KEYID = 6
13,883,569 UART: [afmc] SUBJECT.KEYID = 7
13,884,780 UART: [afmc] AUTHORITY.KEYID = 5
16,424,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,167,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,169,245 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,184,952 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,201,017 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,216,603 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,239,885 UART: [afmc] --
18,243,708 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,244,056 UART: [cold-reset] --
18,246,708 UART: [state] Locking Datavault
18,253,861 UART: [state] Locking PCR0, PCR1 and PCR31
18,255,615 UART: [state] Locking ICCM
18,257,471 UART: [exit] Launching FMC @ 0x40000130
18,265,864 UART:
18,266,110 UART: Running Caliptra FMC ...
18,267,215 UART:
18,267,386 UART: [state] CFI Enabled
18,325,110 UART: [fht] FMC Alias Private Key: 7
20,112,677 UART: [art] Extend RT PCRs Done
20,113,894 UART: [art] Lock RT PCRs Done
20,115,570 UART: [art] Populate DV Done
20,121,137 UART: [fht] FMC Alias Private Key: 7
20,122,726 UART: [art] Derive CDI
20,123,538 UART: [art] Store in slot 0x4
20,178,924 UART: [art] Derive Key Pair
20,179,956 UART: [art] Store priv key in slot 0x5
22,643,208 UART: [art] Derive Key Pair - Done
22,656,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,369,425 UART: [art] Erasing AUTHORITY.KEYID = 7
24,370,927 UART: [art] PUB.X = DA88B0FAD06C1145AF683D457705AE6E0DB2EEDF6D96B186337CA65CD89074C8255C1EE5057B8236483F26B3E5EFDAC5
24,378,175 UART: [art] PUB.Y = 8A1C2B47E3DD87E04231D01B105DE22B5E46C4E6F7B305E5E310C8ED49A499B915D0AE1B61B31C77C5D9012637246524
24,385,463 UART: [art] SIG.R = 6BC15F38056FFF316B0E79D509AF865DEF7CAD1B4783A090ADA4DA5840FFFB6D308ACD3914DED46D239F5516D0AB7CA9
24,392,896 UART: [art] SIG.S = F37F7138EE3098E81E989C695E47E217644BBF609B1FEE41E95DD22654579C15A01D0A4BBC43978808DD2FDFDC63A5FF
25,370,826 UART: mbox::rt_entry...
25,371,774 UART: ____ _ _ _ ____ _____
25,373,752 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,375,752 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,377,680 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,379,602 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,381,524 UART: |_|
25,382,325 UART:
25,524,253 UART: [rt] Runtime listening for mailbox commands...
25,526,444 >>> mbox cmd response data (48 bytes)
25,526,998 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,529,349 >>> mbox cmd response data (48 bytes)
25,530,240 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,547,187 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,206,546 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,291,243 >>> mbox cmd response data (12 bytes)
10,293,542 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,777,429 >>> mbox cmd response: success
18,052,085 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,070,026 UART:
18,070,350 UART: Running Caliptra FMC ...
18,071,517 UART:
18,071,717 UART: [state] CFI Enabled
18,131,482 UART: [fht] FMC Alias Private Key: 7
19,898,045 UART: [art] Extend RT PCRs Done
19,899,278 UART: [art] Lock RT PCRs Done
19,900,849 UART: [art] Populate DV Done
19,906,043 UART: [fht] FMC Alias Private Key: 7
19,907,588 UART: [art] Derive CDI
19,908,347 UART: [art] Store in slot 0x4
19,964,429 UART: [art] Derive Key Pair
19,965,473 UART: [art] Store priv key in slot 0x5
22,428,096 UART: [art] Derive Key Pair - Done
22,441,097 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,154,087 UART: [art] Erasing AUTHORITY.KEYID = 7
24,155,599 UART: [art] PUB.X = 32C3F5D16A8072027448B843EF1263B19FAD21D8E6BBCEB2B12B26572379F55C0A19F79045A9ED04DE57974EFD2510AE
24,162,879 UART: [art] PUB.Y = 5ADD59FE60846062703419650FAA202F1AF6AA7066EFB058C88A7209606D6791684EEF8DB8B9213D5BE8FBC6136F7339
24,170,123 UART: [art] SIG.R = A43639B04C7C5E5AFA552541DE238497DBD61793E754DD6237FB333AFD37C53FA972B8F4D09DB95620B09376F0DAAD99
24,177,482 UART: [art] SIG.S = 86293C91348728F86A0F15311E0EFBAB504FFC0E816B67409152DFD74F5CDE0FFBDF935AB69A1CBD921B8B734F4C49BB
25,155,653 UART: mbox::rt_entry...
25,156,618 UART: ____ _ _ _ ____ _____
25,158,550 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,160,553 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,162,479 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,164,437 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,166,364 UART: |_|
25,167,342 UART:
25,310,687 UART: [rt] Runtime listening for mailbox commands...
25,312,808 >>> mbox cmd response data (48 bytes)
25,313,376 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,315,722 >>> mbox cmd response data (48 bytes)
25,316,611 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,333,552 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
2,215,864 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,217,409 UART:
2,217,660 UART: Running Caliptra ROM ...
2,218,769 UART:
2,218,927 UART: [state] CFI Enabled
2,219,825 UART: [state] LifecycleState = Unprovisioned
2,221,488 UART: [state] DebugLocked = No
2,222,613 UART: [state] WD Timer not started. Device not locked for debugging
2,225,088 UART: [kat] SHA2-256
2,225,767 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,228,786 UART: [kat] ++
2,229,240 UART: [kat] sha1
2,229,787 UART: [kat] SHA2-256
2,230,449 UART: [kat] SHA2-384
2,231,193 UART: [kat] SHA2-512-ACC
2,232,006 UART: [kat] ECC-384
3,280,394 UART: [kat] HMAC-384Kdf
3,293,432 UART: [kat] LMS
3,769,915 UART: [kat] --
3,776,035 UART: [cold-reset] ++
3,777,392 UART: [fht] FHT @ 0x50003400
3,789,127 UART: [idev] ++
3,789,704 UART: [idev] CDI.KEYID = 6
3,790,723 UART: [idev] SUBJECT.KEYID = 7
3,791,883 UART: [idev] UDS.KEYID = 0
3,808,563 UART: [idev] Erasing UDS.KEYID = 0
6,271,333 UART: [idev] Sha1 KeyId Algorithm
6,295,429 UART: [idev] --
6,301,581 UART: [ldev] ++
6,302,161 UART: [ldev] CDI.KEYID = 6
6,303,073 UART: [ldev] SUBJECT.KEYID = 5
6,304,293 UART: [ldev] AUTHORITY.KEYID = 7
6,305,526 UART: [ldev] FE.KEYID = 1
6,316,281 UART: [ldev] Erasing FE.KEYID = 1
8,792,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,865 UART: [ldev] --
10,584,713 UART: [fwproc] Wait for Commands...
10,587,193 UART: [fwproc] Recv command 0x4d454153
10,596,427 >>> mbox cmd response data (12 bytes)
10,598,969 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
10,703,432 UART: [fwproc] Recv command 0x46574c44
10,705,545 UART: [fwproc] Recv'd Img size: 82832 bytes
13,756,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,836,310 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,909,316 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,111,964 >>> mbox cmd response: success
14,116,597 UART: [afmc] ++
14,117,200 UART: [afmc] CDI.KEYID = 6
14,118,119 UART: [afmc] SUBJECT.KEYID = 7
14,119,338 UART: [afmc] AUTHORITY.KEYID = 5
16,622,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,348,018 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,350,195 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,365,915 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,381,999 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,397,579 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,422,473 UART: [afmc] --
18,426,686 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,427,038 UART: [cold-reset] --
18,429,910 UART: [state] Locking Datavault
18,435,483 UART: [state] Locking PCR0, PCR1 and PCR31
18,437,183 UART: [state] Locking ICCM
18,438,582 UART: [exit] Launching FMC @ 0x40000130
18,446,945 UART:
18,447,193 UART: Running Caliptra FMC ...
18,448,299 UART:
18,448,465 UART: [state] CFI Enabled
18,456,836 UART: [fht] FMC Alias Private Key: 7
20,223,347 UART: [art] Extend RT PCRs Done
20,224,572 UART: [art] Lock RT PCRs Done
20,226,088 UART: [art] Populate DV Done
20,231,732 UART: [fht] FMC Alias Private Key: 7
20,233,434 UART: [art] Derive CDI
20,234,257 UART: [art] Store in slot 0x4
20,277,254 UART: [art] Derive Key Pair
20,278,296 UART: [art] Store priv key in slot 0x5
22,705,196 UART: [art] Derive Key Pair - Done
22,718,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,424,266 UART: [art] Erasing AUTHORITY.KEYID = 7
24,425,785 UART: [art] PUB.X = EAE0DA88B7DF2BDE42F10BAEB60A5181DD83DE2533D575C772D7F208D05B3EA9138E319341E15436C07D0ACAF94F75B8
24,433,027 UART: [art] PUB.Y = DCA8FB8F7093D5E2DFB24B31CE82F014EDF05FB9EC7751A0E114D645907ECE21084BA28E00AF6A46E304C177F4A4BA37
24,440,310 UART: [art] SIG.R = 63F68F7B6F1FB884F7C76DF625585EA57F68F8DE1AD225A40C662D080DE073E4A4BF8A2DC509BC29F393EA2C81ABFFE2
24,447,690 UART: [art] SIG.S = 4A7779D1FE82366C8748C79C9B751CA44CCF760985D0E2D2B07D9E07D1FACA34BE12AE1D06B415A386C44F08F2170DD6
25,426,631 UART: mbox::rt_entry...
25,427,597 UART: ____ _ _ _ ____ _____
25,429,531 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,431,544 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,433,480 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,435,411 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,437,343 UART: |_|
25,438,176 UART:
25,579,776 UART: [rt] Runtime listening for mailbox commands...
25,581,945 >>> mbox cmd response data (48 bytes)
25,582,487 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,584,838 >>> mbox cmd response data (48 bytes)
25,585,729 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,602,677 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,213,434 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,490,206 >>> mbox cmd response data (12 bytes)
10,492,083 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,989,429 >>> mbox cmd response: success
18,227,416 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,244,271 UART:
18,244,594 UART: Running Caliptra FMC ...
18,245,662 UART:
18,245,816 UART: [state] CFI Enabled
18,254,370 UART: [fht] FMC Alias Private Key: 7
20,021,052 UART: [art] Extend RT PCRs Done
20,022,277 UART: [art] Lock RT PCRs Done
20,023,962 UART: [art] Populate DV Done
20,029,324 UART: [fht] FMC Alias Private Key: 7
20,031,053 UART: [art] Derive CDI
20,031,882 UART: [art] Store in slot 0x4
20,074,427 UART: [art] Derive Key Pair
20,075,529 UART: [art] Store priv key in slot 0x5
22,502,410 UART: [art] Derive Key Pair - Done
22,515,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,221,490 UART: [art] Erasing AUTHORITY.KEYID = 7
24,222,971 UART: [art] PUB.X = BCD792B991045E225B1903D0E03A140B784FCE7F1784A01D0BAE9E7BA7571F22147F1DCE13392A3643BE6AEB1D851CE9
24,230,280 UART: [art] PUB.Y = 9545DB519A25798F7C1CF6C1919FBD3CF67036797C5B046D4A6BCAC9D082EA37D18C94541AB528B08367F5A765700D97
24,237,536 UART: [art] SIG.R = A77127E0D1F0A81BA2073D1D032D3693687FE0F9800B8337C681C84AC5DA69F44CF12E46BC9A83B35CAEE52C72B0AAB1
24,244,900 UART: [art] SIG.S = 66142044DB7137D84711246AB143208230C34BD66A306F5CF1B7EE126B3539C7B70E702E2D4C30BAA518006128C34859
25,224,015 UART: mbox::rt_entry...
25,224,981 UART: ____ _ _ _ ____ _____
25,226,966 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,228,975 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,230,905 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,232,895 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,234,830 UART: |_|
25,235,638 UART:
25,377,872 UART: [rt] Runtime listening for mailbox commands...
25,379,931 >>> mbox cmd response data (48 bytes)
25,380,456 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,382,770 >>> mbox cmd response data (48 bytes)
25,383,653 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,400,566 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
2,214,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,215,870 UART:
2,216,123 UART: Running Caliptra ROM ...
2,217,192 UART:
2,217,343 UART: [state] CFI Enabled
2,218,221 UART: [state] LifecycleState = Unprovisioned
2,219,877 UART: [state] DebugLocked = No
2,220,912 UART: [state] WD Timer not started. Device not locked for debugging
2,223,381 UART: [kat] SHA2-256
2,224,045 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,227,054 UART: [kat] ++
2,227,508 UART: [kat] sha1
2,228,020 UART: [kat] SHA2-256
2,228,700 UART: [kat] SHA2-384
2,229,356 UART: [kat] SHA2-512-ACC
2,230,184 UART: [kat] ECC-384
2,946,590 UART: [kat] HMAC-384Kdf
2,970,402 UART: [kat] LMS
3,502,192 UART: [kat] --
3,505,157 UART: [cold-reset] ++
3,506,601 UART: [fht] FHT @ 0x50003400
3,518,279 UART: [idev] ++
3,518,993 UART: [idev] CDI.KEYID = 6
3,519,935 UART: [idev] SUBJECT.KEYID = 7
3,521,148 UART: [idev] UDS.KEYID = 0
3,542,090 UART: [idev] Erasing UDS.KEYID = 0
6,027,932 UART: [idev] Sha1 KeyId Algorithm
6,051,657 UART: [idev] --
6,055,873 UART: [ldev] ++
6,056,571 UART: [ldev] CDI.KEYID = 6
6,057,479 UART: [ldev] SUBJECT.KEYID = 5
6,058,691 UART: [ldev] AUTHORITY.KEYID = 7
6,059,868 UART: [ldev] FE.KEYID = 1
6,098,326 UART: [ldev] Erasing FE.KEYID = 1
8,602,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,415 UART: [ldev] --
10,412,009 UART: [fwproc] Wait for Commands...
10,414,657 UART: [fwproc] Recv command 0x4d454153
10,424,370 >>> mbox cmd response data (12 bytes)
10,426,978 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
10,532,101 UART: [fwproc] Recv command 0x46574c44
10,534,127 UART: [fwproc] Recv'd Img size: 82832 bytes
13,600,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,686,458 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,810,080 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,156,609 >>> mbox cmd response: success
14,160,146 UART: [afmc] ++
14,160,896 UART: [afmc] CDI.KEYID = 6
14,162,077 UART: [afmc] SUBJECT.KEYID = 7
14,163,566 UART: [afmc] AUTHORITY.KEYID = 5
16,698,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,425,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,427,866 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,442,940 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,458,099 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,473,141 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,496,523 UART: [afmc] --
18,500,894 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,501,259 UART: [cold-reset] --
18,503,641 UART: [state] Locking Datavault
18,509,641 UART: [state] Locking PCR0, PCR1 and PCR31
18,511,780 UART: [state] Locking ICCM
18,513,147 UART: [exit] Launching FMC @ 0x40000130
18,521,810 UART:
18,522,044 UART: Running Caliptra FMC ...
18,523,148 UART:
18,523,308 UART: [state] CFI Enabled
18,581,910 UART: [fht] FMC Alias Private Key: 7
20,348,428 UART: [art] Extend RT PCRs Done
20,349,649 UART: [art] Lock RT PCRs Done
20,351,122 UART: [art] Populate DV Done
20,356,702 UART: [fht] FMC Alias Private Key: 7
20,358,292 UART: [art] Derive CDI
20,359,122 UART: [art] Store in slot 0x4
20,414,844 UART: [art] Derive Key Pair
20,415,883 UART: [art] Store priv key in slot 0x5
22,878,722 UART: [art] Derive Key Pair - Done
22,891,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,796 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,303 UART: [art] PUB.X = BBB63328580C0A7822FB0512091D972DCFB40ADE23AD73918201A526BEA8589684C86AC91DE15F60D91665B22107FF2F
24,613,534 UART: [art] PUB.Y = E522E3B0CB276E35A8F1BAC7FCE9A8E6786DF9554846B5680D8FC226FC78531CB4B77E2F95344CE04BF3D14D113BF81E
24,620,787 UART: [art] SIG.R = 7E174A3FE270670DBB0B81CBCBFFC0D504CB006502A02893B2445489116C09EB02BD1A509FD804D23904F56090DCAB61
24,628,145 UART: [art] SIG.S = 72BC28D8D7AFAF13356B0E3EFBF599379D78CD48EB3235F9A1A5A068AC86577754B5726073B8067C835BA131171F7A29
25,606,242 UART: mbox::rt_entry...
25,607,200 UART: ____ _ _ _ ____ _____
25,609,125 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,611,128 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,612,982 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,614,904 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,616,803 UART: |_|
25,617,689 UART:
25,759,406 UART: [rt] Runtime listening for mailbox commands...
25,761,576 >>> mbox cmd response data (48 bytes)
25,762,133 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,764,448 >>> mbox cmd response data (48 bytes)
25,765,323 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,782,182 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
2,217,439 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,247,183 >>> mbox cmd response data (12 bytes)
10,250,605 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,173,133 >>> mbox cmd response: success
18,444,884 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,461,138 UART:
18,461,445 UART: Running Caliptra FMC ...
18,462,599 UART:
18,462,769 UART: [state] CFI Enabled
18,529,576 UART: [fht] FMC Alias Private Key: 7
20,295,718 UART: [art] Extend RT PCRs Done
20,296,945 UART: [art] Lock RT PCRs Done
20,298,846 UART: [art] Populate DV Done
20,304,213 UART: [fht] FMC Alias Private Key: 7
20,305,697 UART: [art] Derive CDI
20,306,456 UART: [art] Store in slot 0x4
20,361,905 UART: [art] Derive Key Pair
20,362,946 UART: [art] Store priv key in slot 0x5
22,825,917 UART: [art] Derive Key Pair - Done
22,838,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,551,433 UART: [art] Erasing AUTHORITY.KEYID = 7
24,552,948 UART: [art] PUB.X = EFF4E75C43113F81CBBAF559E7D9CCB5DB1ABEEB78D74C0C919164485B1404E23223C347E9DBBFCF7EFD36E08E8FF7E1
24,560,221 UART: [art] PUB.Y = F86AA8071437F297A9A481A2567678096F91D9F98DCE6BCE93BD596732075F6183BAF7D67270CBD7CB56720D0C105259
24,567,474 UART: [art] SIG.R = A2D2EDAB0FA1747E4C79A4A6AD2C0A81EEF4BA4BA75CA8DF9917F8EAB231A1E540941FDE34E67CED2222014BFA59E21F
24,574,933 UART: [art] SIG.S = 3CAB790EDAC8EE4EC728F9F307BC791F6FF0AA1D4DC443D60FF5F1C946074170B2B595A7D44FDB5833A9F071D3B0CF99
25,553,326 UART: mbox::rt_entry...
25,554,270 UART: ____ _ _ _ ____ _____
25,556,371 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,558,374 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,560,303 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,562,259 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,564,185 UART: |_|
25,564,992 UART:
25,706,165 UART: [rt] Runtime listening for mailbox commands...
25,708,322 >>> mbox cmd response data (48 bytes)
25,708,875 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,711,225 >>> mbox cmd response data (48 bytes)
25,712,103 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,729,022 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
2,227,482 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,229,087 UART:
2,229,348 UART: Running Caliptra ROM ...
2,230,446 UART:
2,230,604 UART: [state] CFI Enabled
2,231,502 UART: [state] LifecycleState = Unprovisioned
2,233,170 UART: [state] DebugLocked = No
2,234,297 UART: [state] WD Timer not started. Device not locked for debugging
2,236,778 UART: [kat] SHA2-256
2,237,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,240,470 UART: [kat] ++
2,240,927 UART: [kat] sha1
2,241,445 UART: [kat] SHA2-256
2,242,109 UART: [kat] SHA2-384
2,242,771 UART: [kat] SHA2-512-ACC
2,243,601 UART: [kat] ECC-384
3,290,735 UART: [kat] HMAC-384Kdf
3,304,124 UART: [kat] LMS
3,835,909 UART: [kat] --
3,841,852 UART: [cold-reset] ++
3,844,328 UART: [fht] FHT @ 0x50003400
3,855,153 UART: [idev] ++
3,855,923 UART: [idev] CDI.KEYID = 6
3,856,818 UART: [idev] SUBJECT.KEYID = 7
3,858,033 UART: [idev] UDS.KEYID = 0
3,873,911 UART: [idev] Erasing UDS.KEYID = 0
6,337,627 UART: [idev] Sha1 KeyId Algorithm
6,360,295 UART: [idev] --
6,366,401 UART: [ldev] ++
6,367,082 UART: [ldev] CDI.KEYID = 6
6,368,002 UART: [ldev] SUBJECT.KEYID = 5
6,369,171 UART: [ldev] AUTHORITY.KEYID = 7
6,370,407 UART: [ldev] FE.KEYID = 1
6,380,618 UART: [ldev] Erasing FE.KEYID = 1
8,857,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,823 UART: [ldev] --
10,648,853 UART: [fwproc] Wait for Commands...
10,650,791 UART: [fwproc] Recv command 0x4d454153
10,660,533 >>> mbox cmd response data (12 bytes)
10,663,414 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
10,768,847 UART: [fwproc] Recv command 0x46574c44
10,770,879 UART: [fwproc] Recv'd Img size: 82832 bytes
13,829,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,912,107 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,035,759 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,381,295 >>> mbox cmd response: success
14,385,702 UART: [afmc] ++
14,386,427 UART: [afmc] CDI.KEYID = 6
14,387,626 UART: [afmc] SUBJECT.KEYID = 7
14,389,076 UART: [afmc] AUTHORITY.KEYID = 5
16,893,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,614,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,616,629 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,631,704 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,646,844 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,661,776 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,684,913 UART: [afmc] --
18,687,982 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,688,360 UART: [cold-reset] --
18,692,849 UART: [state] Locking Datavault
18,699,512 UART: [state] Locking PCR0, PCR1 and PCR31
18,701,659 UART: [state] Locking ICCM
18,703,380 UART: [exit] Launching FMC @ 0x40000130
18,712,022 UART:
18,712,264 UART: Running Caliptra FMC ...
18,713,373 UART:
18,713,540 UART: [state] CFI Enabled
18,721,483 UART: [fht] FMC Alias Private Key: 7
20,487,613 UART: [art] Extend RT PCRs Done
20,488,832 UART: [art] Lock RT PCRs Done
20,490,299 UART: [art] Populate DV Done
20,495,881 UART: [fht] FMC Alias Private Key: 7
20,497,410 UART: [art] Derive CDI
20,498,182 UART: [art] Store in slot 0x4
20,540,726 UART: [art] Derive Key Pair
20,541,731 UART: [art] Store priv key in slot 0x5
22,968,280 UART: [art] Derive Key Pair - Done
22,980,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,687,251 UART: [art] Erasing AUTHORITY.KEYID = 7
24,688,777 UART: [art] PUB.X = A1B7B80FF02F39A333CF7998C19501FA27C4A79BF723943B72EA5D8F356C195C7D239CC48EF2CD1487440AAB9F485B12
24,695,988 UART: [art] PUB.Y = 2172EAFE110219DCF4649C3679B63574950B244E85FE661B50DE3F82137F117346AA3D3A1E0355B0AB48BB184B3D10B3
24,703,240 UART: [art] SIG.R = 84569CCFCA90FBA8DDD9BA421F88ED7D50486DC250B3A8D1D460D8D53D8E1A4A4FF7C92051C1C70152D5249A8E1FACC7
24,710,662 UART: [art] SIG.S = 8670AA815BE773DDB6EE8AF0CD8711E8C7924753C0522F3FDBA19BAAE4BDAA560B1BAAF5AC01A1879B991F74B29AEDC1
25,689,740 UART: mbox::rt_entry...
25,690,682 UART: ____ _ _ _ ____ _____
25,692,669 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,694,675 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,696,834 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,698,780 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,700,714 UART: |_|
25,701,556 UART:
25,843,328 UART: [rt] Runtime listening for mailbox commands...
25,845,485 >>> mbox cmd response data (48 bytes)
25,846,130 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,848,460 >>> mbox cmd response data (48 bytes)
25,849,368 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,866,283 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,225,038 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,470,782 >>> mbox cmd response data (12 bytes)
10,473,934 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,395,928 >>> mbox cmd response: success
18,633,661 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,649,428 UART:
18,649,781 UART: Running Caliptra FMC ...
18,650,951 UART:
18,651,126 UART: [state] CFI Enabled
18,659,213 UART: [fht] FMC Alias Private Key: 7
20,425,430 UART: [art] Extend RT PCRs Done
20,426,661 UART: [art] Lock RT PCRs Done
20,428,350 UART: [art] Populate DV Done
20,433,721 UART: [fht] FMC Alias Private Key: 7
20,435,215 UART: [art] Derive CDI
20,435,984 UART: [art] Store in slot 0x4
20,478,531 UART: [art] Derive Key Pair
20,479,537 UART: [art] Store priv key in slot 0x5
22,906,674 UART: [art] Derive Key Pair - Done
22,919,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,017 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,520 UART: [art] PUB.X = 8E3E0E5419F18B9046BA3AF9C31E2A23A2954F51546D83494A4343F0048746F41560824EDBB673E256F78E3255700616
24,634,773 UART: [art] PUB.Y = D78489E0391A9A9ACDC68833D1D505AE6640705552A938F8FCFE548D1CEFC872473A1C6B2623D9E9F8F5DDCBBF19EECD
24,641,994 UART: [art] SIG.R = 0C72EFBADA37B6CA9038C44911924B46363FEE1FC09167771F5A8AE7CE67BDDD0B3D5D49004AD2A76DBC8D977EAB2974
24,649,443 UART: [art] SIG.S = 72811C3E60A3CB5A807B6614D95DD4CB90789E64ABA9245220918AABF5424C3F64936B4D8CAA3C9A0132608E16510332
25,627,833 UART: mbox::rt_entry...
25,628,804 UART: ____ _ _ _ ____ _____
25,630,794 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,632,803 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,634,735 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,636,708 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,638,645 UART: |_|
25,639,459 UART:
25,781,531 UART: [rt] Runtime listening for mailbox commands...
25,783,655 >>> mbox cmd response data (48 bytes)
25,784,223 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,786,575 >>> mbox cmd response data (48 bytes)
25,787,449 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,804,555 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,923 UART: [kat] SHA2-256
881,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,969 UART: [kat] ++
886,121 UART: [kat] sha1
890,419 UART: [kat] SHA2-256
892,357 UART: [kat] SHA2-384
895,194 UART: [kat] SHA2-512-ACC
897,095 UART: [kat] ECC-384
902,312 UART: [kat] HMAC-384Kdf
907,064 UART: [kat] LMS
1,475,260 UART: [kat] --
1,476,213 UART: [cold-reset] ++
1,476,557 UART: [fht] Storing FHT @ 0x50003400
1,479,228 UART: [idev] ++
1,479,396 UART: [idev] CDI.KEYID = 6
1,479,756 UART: [idev] SUBJECT.KEYID = 7
1,480,180 UART: [idev] UDS.KEYID = 0
1,487,736 UART: [idev] Erasing UDS.KEYID = 0
1,504,406 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,120 UART: [idev] --
1,514,361 UART: [ldev] ++
1,514,529 UART: [ldev] CDI.KEYID = 6
1,514,892 UART: [ldev] SUBJECT.KEYID = 5
1,515,318 UART: [ldev] AUTHORITY.KEYID = 7
1,515,781 UART: [ldev] FE.KEYID = 1
1,521,015 UART: [ldev] Erasing FE.KEYID = 1
1,546,652 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,900 UART: [ldev] --
1,586,273 UART: [fwproc] Waiting for Commands...
1,587,006 UART: [fwproc] Received command 0x4d454153
1,591,070 >>> mbox cmd response data (12 bytes)
1,591,071 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,591,175 UART: [fwproc] Received command 0x46574c44
1,591,966 UART: [fwproc] Received Image of size 82832 bytes
2,527,261 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,554,571 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,585,789 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,672,488 >>> mbox cmd response: success
2,673,692 UART: [afmc] ++
2,673,860 UART: [afmc] CDI.KEYID = 6
2,674,222 UART: [afmc] SUBJECT.KEYID = 7
2,674,647 UART: [afmc] AUTHORITY.KEYID = 5
2,709,664 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,725,932 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,726,712 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,732,421 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,738,304 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,743,987 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,751,667 UART: [afmc] --
2,752,665 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,752,687 UART: [cold-reset] --
2,753,509 UART: [state] Locking Datavault
2,754,372 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,976 UART: [state] Locking ICCM
2,755,480 UART: [exit] Launching FMC @ 0x40000130
2,760,810 UART:
2,760,826 UART: Running Caliptra FMC ...
2,761,234 UART:
2,761,288 UART: [state] CFI Enabled
2,772,110 UART: [fht] FMC Alias Private Key: 7
2,890,970 UART: [art] Extend RT PCRs Done
2,891,398 UART: [art] Lock RT PCRs Done
2,893,128 UART: [art] Populate DV Done
2,901,161 UART: [fht] FMC Alias Private Key: 7
2,902,343 UART: [art] Derive CDI
2,902,623 UART: [art] Store in slot 0x4
2,987,955 UART: [art] Derive Key Pair
2,988,315 UART: [art] Store priv key in slot 0x5
3,001,652 UART: [art] Derive Key Pair - Done
3,016,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,303 UART: [art] PUB.X = 01A754934BE9409D8BE2591CA439B7C2CE0C0CD2BE37A5AC096B0769ECF65F0524FD936A3BF7FDB6D5701511C5A1910B
3,039,064 UART: [art] PUB.Y = 816C477D11F5A8C51EFAEF3BEB0F873C57BDBF2877DBA9D35E8598E0B280FC76E9A78D445CDD11B69B4FD7664C049F24
3,046,026 UART: [art] SIG.R = 598DDD77E746FF6E112DE24A4A7E2ED746A4349A4568E3967B2A2FAE82B42BDA76C7358DDC6F098278E0687380463F43
3,052,797 UART: [art] SIG.S = 92E47512DC70126CBBCC4215A7AE8DFB18EB0BA7CE8EAD3699CB6069A932D389CC4340F3024F2F4B91D5E4C2E288D6C6
3,075,899 UART: mbox::rt_entry...
3,076,271 UART: ____ _ _ _ ____ _____
3,077,055 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,077,855 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,078,623 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,079,391 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,080,159 UART: |_|
3,080,471 UART:
3,211,316 UART: [rt] Runtime listening for mailbox commands...
3,212,505 >>> mbox cmd response data (48 bytes)
3,212,506 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,215,293 >>> mbox cmd response data (48 bytes)
3,215,294 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,233,439 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,271 >>> mbox cmd response data (12 bytes)
1,444,272 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,520,796 >>> mbox cmd response: success
2,576,609 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,582,427 UART:
2,582,443 UART: Running Caliptra FMC ...
2,582,851 UART:
2,582,905 UART: [state] CFI Enabled
2,593,455 UART: [fht] FMC Alias Private Key: 7
2,712,503 UART: [art] Extend RT PCRs Done
2,712,931 UART: [art] Lock RT PCRs Done
2,714,407 UART: [art] Populate DV Done
2,722,538 UART: [fht] FMC Alias Private Key: 7
2,723,468 UART: [art] Derive CDI
2,723,748 UART: [art] Store in slot 0x4
2,809,748 UART: [art] Derive Key Pair
2,810,108 UART: [art] Store priv key in slot 0x5
2,822,869 UART: [art] Derive Key Pair - Done
2,837,727 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,852,924 UART: [art] Erasing AUTHORITY.KEYID = 7
2,853,689 UART: [art] PUB.X = 1D307C3100EA9652AE8CD9D9D1BCD93550A47B3C2035C0972B640148BE8942EC5DEC3BC1B3F253D5A530785274D541E5
2,860,438 UART: [art] PUB.Y = CE7D98EBB9F396401A3E758F2AE861558DD7165CD72A39F5FB39C4558A3D3ADEDF08A6C71A28C23B7756FE573E6C3AF1
2,867,401 UART: [art] SIG.R = A5001C2977D464D565C24DA83BE2A7D58D60811FC770A2E7FF63BD26FAC99B779A47EC51DE3CBFDA3D0C6A53401B2741
2,874,160 UART: [art] SIG.S = E18067B8090C803F69374238185249A5D1C95AE9433D5DAD1AA6FA7BDF029BED277008C419703E390F8657115712F85D
2,898,081 UART: mbox::rt_entry...
2,898,453 UART: ____ _ _ _ ____ _____
2,899,237 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,900,037 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,900,805 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,901,573 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,902,341 UART: |_|
2,902,653 UART:
3,034,275 UART: [rt] Runtime listening for mailbox commands...
3,035,464 >>> mbox cmd response data (48 bytes)
3,035,465 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,038,252 >>> mbox cmd response data (48 bytes)
3,038,253 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,056,398 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,666 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,236 UART: [kat] SHA2-256
882,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,282 UART: [kat] ++
886,434 UART: [kat] sha1
890,518 UART: [kat] SHA2-256
892,456 UART: [kat] SHA2-384
895,175 UART: [kat] SHA2-512-ACC
897,076 UART: [kat] ECC-384
902,497 UART: [kat] HMAC-384Kdf
907,131 UART: [kat] LMS
1,475,327 UART: [kat] --
1,476,342 UART: [cold-reset] ++
1,476,726 UART: [fht] Storing FHT @ 0x50003400
1,479,589 UART: [idev] ++
1,479,757 UART: [idev] CDI.KEYID = 6
1,480,117 UART: [idev] SUBJECT.KEYID = 7
1,480,541 UART: [idev] UDS.KEYID = 0
1,489,323 UART: [idev] Erasing UDS.KEYID = 0
1,506,277 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,973 UART: [idev] --
1,516,142 UART: [ldev] ++
1,516,310 UART: [ldev] CDI.KEYID = 6
1,516,673 UART: [ldev] SUBJECT.KEYID = 5
1,517,099 UART: [ldev] AUTHORITY.KEYID = 7
1,517,562 UART: [ldev] FE.KEYID = 1
1,523,006 UART: [ldev] Erasing FE.KEYID = 1
1,548,759 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,781 UART: [ldev] --
1,588,152 UART: [fwproc] Waiting for Commands...
1,588,829 UART: [fwproc] Received command 0x4d454153
1,592,893 >>> mbox cmd response data (12 bytes)
1,592,894 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,593,024 UART: [fwproc] Received command 0x46574c44
1,593,815 UART: [fwproc] Received Image of size 82832 bytes
2,528,064 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,555,230 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,586,448 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,673,135 >>> mbox cmd response: success
2,674,211 UART: [afmc] ++
2,674,379 UART: [afmc] CDI.KEYID = 6
2,674,741 UART: [afmc] SUBJECT.KEYID = 7
2,675,166 UART: [afmc] AUTHORITY.KEYID = 5
2,710,361 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,726,761 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,727,541 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,733,250 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,739,133 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,744,816 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,752,922 UART: [afmc] --
2,754,010 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,754,032 UART: [cold-reset] --
2,754,874 UART: [state] Locking Datavault
2,755,845 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,449 UART: [state] Locking ICCM
2,757,115 UART: [exit] Launching FMC @ 0x40000130
2,762,445 UART:
2,762,461 UART: Running Caliptra FMC ...
2,762,869 UART:
2,763,012 UART: [state] CFI Enabled
2,774,214 UART: [fht] FMC Alias Private Key: 7
2,893,000 UART: [art] Extend RT PCRs Done
2,893,428 UART: [art] Lock RT PCRs Done
2,894,806 UART: [art] Populate DV Done
2,903,065 UART: [fht] FMC Alias Private Key: 7
2,904,055 UART: [art] Derive CDI
2,904,335 UART: [art] Store in slot 0x4
2,990,141 UART: [art] Derive Key Pair
2,990,501 UART: [art] Store priv key in slot 0x5
3,003,828 UART: [art] Derive Key Pair - Done
3,018,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,034,603 UART: [art] Erasing AUTHORITY.KEYID = 7
3,035,368 UART: [art] PUB.X = F256D3A51BE5D99D67A4E422F43ED55AC2A195DEE55D419007FD5EE1EB053BBF494C26770974C02EC193199B97BA6462
3,042,137 UART: [art] PUB.Y = 3D12EC4AF0CF1D420CFE3752CA72FAA73F3DFFCF2F2C882B5AAFDE60A637F3F2C18821366CF7C1DE032ABB3A2764F3A5
3,049,109 UART: [art] SIG.R = 6572EDE464EA8985A9F1FFE63A2223B9301F835AA8AE5409BC31BA4A3A00B1D2B069CC5207CBF2265AE05273F79613F2
3,055,859 UART: [art] SIG.S = CF21CAE1A88BA260BD8BB262056133D890222EFE6EC0932FCCBC85941491E5ACA162EA0FC3BB8DB8426527352B51E9EF
3,079,611 UART: mbox::rt_entry...
3,079,983 UART: ____ _ _ _ ____ _____
3,080,767 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,081,567 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,082,335 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,083,103 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,083,871 UART: |_|
3,084,183 UART:
3,215,358 UART: [rt] Runtime listening for mailbox commands...
3,216,547 >>> mbox cmd response data (48 bytes)
3,216,548 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,219,335 >>> mbox cmd response data (48 bytes)
3,219,336 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,237,481 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,902 >>> mbox cmd response data (12 bytes)
1,445,903 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,522,727 >>> mbox cmd response: success
2,578,030 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,583,760 UART:
2,583,776 UART: Running Caliptra FMC ...
2,584,184 UART:
2,584,327 UART: [state] CFI Enabled
2,594,993 UART: [fht] FMC Alias Private Key: 7
2,713,479 UART: [art] Extend RT PCRs Done
2,713,907 UART: [art] Lock RT PCRs Done
2,715,549 UART: [art] Populate DV Done
2,723,540 UART: [fht] FMC Alias Private Key: 7
2,724,482 UART: [art] Derive CDI
2,724,762 UART: [art] Store in slot 0x4
2,810,298 UART: [art] Derive Key Pair
2,810,658 UART: [art] Store priv key in slot 0x5
2,823,863 UART: [art] Derive Key Pair - Done
2,838,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,854,145 UART: [art] Erasing AUTHORITY.KEYID = 7
2,854,910 UART: [art] PUB.X = F104F721D105BC7DC97B3BABC00328899D97143E12FE62780E00B90C511A20D3892E3720DDC07048A5B2A4FBF304934C
2,861,642 UART: [art] PUB.Y = E7CEF243B2CA556581CBD5D6DB4A06893642FB810E5C9135116461627B7A31F4C0394BB0EEBB04AB9D1DC1CCCEC807ED
2,868,598 UART: [art] SIG.R = 4D191E7F9EB8C78A125DCB9BEFBD204687376681ACCA9A064DE399EFE0FAE36E133180A60E745A9AD15AD97DA7937873
2,875,376 UART: [art] SIG.S = 9A75AD79B95D169D55DF696147992E32A4BAE1B60FAC87C1D27C8C74A90F82B8FC71B37EF39867B95986F6A829EEB97E
2,899,252 UART: mbox::rt_entry...
2,899,624 UART: ____ _ _ _ ____ _____
2,900,408 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,901,208 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,901,976 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,902,744 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,903,512 UART: |_|
2,903,824 UART:
3,035,871 UART: [rt] Runtime listening for mailbox commands...
3,037,060 >>> mbox cmd response data (48 bytes)
3,037,061 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,039,848 >>> mbox cmd response data (48 bytes)
3,039,849 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,057,994 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
890,982 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,086 UART: [kat] ++
895,238 UART: [kat] sha1
899,512 UART: [kat] SHA2-256
901,452 UART: [kat] SHA2-384
904,121 UART: [kat] SHA2-512-ACC
906,022 UART: [kat] ECC-384
916,009 UART: [kat] HMAC-384Kdf
920,599 UART: [kat] LMS
1,168,911 UART: [kat] --
1,169,792 UART: [cold-reset] ++
1,170,272 UART: [fht] FHT @ 0x50003400
1,173,166 UART: [idev] ++
1,173,334 UART: [idev] CDI.KEYID = 6
1,173,695 UART: [idev] SUBJECT.KEYID = 7
1,174,120 UART: [idev] UDS.KEYID = 0
1,182,361 UART: [idev] Erasing UDS.KEYID = 0
1,199,193 UART: [idev] Sha1 KeyId Algorithm
1,208,135 UART: [idev] --
1,209,274 UART: [ldev] ++
1,209,442 UART: [ldev] CDI.KEYID = 6
1,209,806 UART: [ldev] SUBJECT.KEYID = 5
1,210,233 UART: [ldev] AUTHORITY.KEYID = 7
1,210,696 UART: [ldev] FE.KEYID = 1
1,215,836 UART: [ldev] Erasing FE.KEYID = 1
1,242,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,474 UART: [ldev] --
1,281,881 UART: [fwproc] Wait for Commands...
1,282,616 UART: [fwproc] Recv command 0x4d454153
1,286,639 >>> mbox cmd response data (12 bytes)
1,286,640 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,286,911 UART: [fwproc] Recv command 0x46574c44
1,287,644 UART: [fwproc] Recv'd Img size: 82832 bytes
2,222,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,249,717 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,280,892 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,367,529 >>> mbox cmd response: success
2,368,753 UART: [afmc] ++
2,368,921 UART: [afmc] CDI.KEYID = 6
2,369,284 UART: [afmc] SUBJECT.KEYID = 7
2,369,710 UART: [afmc] AUTHORITY.KEYID = 5
2,405,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,422,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,422,789 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,428,499 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,434,380 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,440,081 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,448,012 UART: [afmc] --
2,448,889 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,448,911 UART: [cold-reset] --
2,449,833 UART: [state] Locking Datavault
2,450,976 UART: [state] Locking PCR0, PCR1 and PCR31
2,451,580 UART: [state] Locking ICCM
2,452,098 UART: [exit] Launching FMC @ 0x40000130
2,457,428 UART:
2,457,444 UART: Running Caliptra FMC ...
2,457,852 UART:
2,457,906 UART: [state] CFI Enabled
2,468,506 UART: [fht] FMC Alias Private Key: 7
2,588,260 UART: [art] Extend RT PCRs Done
2,588,688 UART: [art] Lock RT PCRs Done
2,590,074 UART: [art] Populate DV Done
2,598,261 UART: [fht] FMC Alias Private Key: 7
2,599,205 UART: [art] Derive CDI
2,599,485 UART: [art] Store in slot 0x4
2,685,278 UART: [art] Derive Key Pair
2,685,638 UART: [art] Store priv key in slot 0x5
2,698,962 UART: [art] Derive Key Pair - Done
2,713,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,729,340 UART: [art] Erasing AUTHORITY.KEYID = 7
2,730,105 UART: [art] PUB.X = A4F726494DB25D34E5819002542497E0B198AECD11AA3071BA038A8FD4E5D1FC4D335BE0B71E38344BAB64D5539DB106
2,736,872 UART: [art] PUB.Y = D64E5ACD3E4D88D463B0E9453F5E4B8D6CE9AA2BD21C7C29E6AA2556F012E990ABBE36A35416251840AC8980B5122746
2,743,830 UART: [art] SIG.R = D39C4F9D83330919929FFE615E2CFA7D1064D7D97901E64CE21D5B7BAB3BF09F2924482EE45E5CD0ACCAD4B078D74213
2,750,606 UART: [art] SIG.S = 411BB9CF12FEE365173A39ADBBA3861B217928AA3F8BF0680BF272E5ED11B30D425563AC926D994C55C51D1893AB1173
2,774,244 UART: mbox::rt_entry...
2,774,616 UART: ____ _ _ _ ____ _____
2,775,400 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,776,200 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,776,968 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,777,736 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,778,504 UART: |_|
2,778,816 UART:
2,909,850 UART: [rt] Runtime listening for mailbox commands...
2,911,039 >>> mbox cmd response data (48 bytes)
2,911,040 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,913,827 >>> mbox cmd response data (48 bytes)
2,913,828 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,931,973 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,346 >>> mbox cmd response data (12 bytes)
1,143,347 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,220,532 >>> mbox cmd response: success
2,276,267 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,282,623 UART:
2,282,639 UART: Running Caliptra FMC ...
2,283,047 UART:
2,283,101 UART: [state] CFI Enabled
2,293,555 UART: [fht] FMC Alias Private Key: 7
2,413,023 UART: [art] Extend RT PCRs Done
2,413,451 UART: [art] Lock RT PCRs Done
2,414,999 UART: [art] Populate DV Done
2,423,008 UART: [fht] FMC Alias Private Key: 7
2,424,154 UART: [art] Derive CDI
2,424,434 UART: [art] Store in slot 0x4
2,509,953 UART: [art] Derive Key Pair
2,510,313 UART: [art] Store priv key in slot 0x5
2,523,511 UART: [art] Derive Key Pair - Done
2,538,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,553,234 UART: [art] Erasing AUTHORITY.KEYID = 7
2,553,999 UART: [art] PUB.X = 6B80DB4B46E98B3D7A7C2D74579B4F6B8C859BEF819EB46D565262A87356674DA9FC2FAB692DCF7CE233F8CE4F93D371
2,560,783 UART: [art] PUB.Y = EA8900B6C96F9913539F317243DB0ADAD478A6F36A0FCD4174907AA12278D40FCF03BCAAA19E9179647F0B212DE59B4C
2,567,706 UART: [art] SIG.R = E83063F5074FF47B5664A9AD79E63A343A7EE2A9C5C8F7E857E472F518F45D0307759370BFAAEECB03C13308A7621A0D
2,574,464 UART: [art] SIG.S = C70B393F8BC6AD8C010FFC43A28BD395A4476AAAD7C780A69601841BA3BA2DFA7289F9F96B539C70102476CA61844EB0
2,598,184 UART: mbox::rt_entry...
2,598,556 UART: ____ _ _ _ ____ _____
2,599,340 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,600,140 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,600,908 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,601,676 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,602,444 UART: |_|
2,602,756 UART:
2,732,587 UART: [rt] Runtime listening for mailbox commands...
2,733,776 >>> mbox cmd response data (48 bytes)
2,733,777 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,736,564 >>> mbox cmd response data (48 bytes)
2,736,565 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,754,710 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,869 UART: [state] LifecycleState = Unprovisioned
86,524 UART: [state] DebugLocked = No
87,188 UART: [state] WD Timer not started. Device not locked for debugging
88,353 UART: [kat] SHA2-256
891,903 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,007 UART: [kat] ++
896,159 UART: [kat] sha1
900,369 UART: [kat] SHA2-256
902,309 UART: [kat] SHA2-384
905,228 UART: [kat] SHA2-512-ACC
907,129 UART: [kat] ECC-384
916,594 UART: [kat] HMAC-384Kdf
921,204 UART: [kat] LMS
1,169,516 UART: [kat] --
1,170,139 UART: [cold-reset] ++
1,170,705 UART: [fht] FHT @ 0x50003400
1,173,257 UART: [idev] ++
1,173,425 UART: [idev] CDI.KEYID = 6
1,173,786 UART: [idev] SUBJECT.KEYID = 7
1,174,211 UART: [idev] UDS.KEYID = 0
1,182,428 UART: [idev] Erasing UDS.KEYID = 0
1,199,404 UART: [idev] Sha1 KeyId Algorithm
1,208,190 UART: [idev] --
1,209,131 UART: [ldev] ++
1,209,299 UART: [ldev] CDI.KEYID = 6
1,209,663 UART: [ldev] SUBJECT.KEYID = 5
1,210,090 UART: [ldev] AUTHORITY.KEYID = 7
1,210,553 UART: [ldev] FE.KEYID = 1
1,215,883 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,597 UART: [ldev] --
1,281,946 UART: [fwproc] Wait for Commands...
1,282,559 UART: [fwproc] Recv command 0x4d454153
1,286,582 >>> mbox cmd response data (12 bytes)
1,286,583 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,286,832 UART: [fwproc] Recv command 0x46574c44
1,287,565 UART: [fwproc] Recv'd Img size: 82832 bytes
2,222,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,250,090 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,281,265 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,368,036 >>> mbox cmd response: success
2,369,122 UART: [afmc] ++
2,369,290 UART: [afmc] CDI.KEYID = 6
2,369,653 UART: [afmc] SUBJECT.KEYID = 7
2,370,079 UART: [afmc] AUTHORITY.KEYID = 5
2,405,066 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,421,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,422,212 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,427,922 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,433,803 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,439,504 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,447,351 UART: [afmc] --
2,448,284 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,448,306 UART: [cold-reset] --
2,449,104 UART: [state] Locking Datavault
2,450,187 UART: [state] Locking PCR0, PCR1 and PCR31
2,450,791 UART: [state] Locking ICCM
2,451,431 UART: [exit] Launching FMC @ 0x40000130
2,456,761 UART:
2,456,777 UART: Running Caliptra FMC ...
2,457,185 UART:
2,457,328 UART: [state] CFI Enabled
2,467,712 UART: [fht] FMC Alias Private Key: 7
2,586,676 UART: [art] Extend RT PCRs Done
2,587,104 UART: [art] Lock RT PCRs Done
2,588,394 UART: [art] Populate DV Done
2,596,715 UART: [fht] FMC Alias Private Key: 7
2,597,737 UART: [art] Derive CDI
2,598,017 UART: [art] Store in slot 0x4
2,683,678 UART: [art] Derive Key Pair
2,684,038 UART: [art] Store priv key in slot 0x5
2,697,130 UART: [art] Derive Key Pair - Done
2,712,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,727,637 UART: [art] Erasing AUTHORITY.KEYID = 7
2,728,402 UART: [art] PUB.X = 3994514ADCCADB55A0C79985ECD52BA19E08F045FF69155C51AD0CA981DA77C157C56146660A025D6C19FF9C5FCE15C1
2,735,172 UART: [art] PUB.Y = A77B83535A15B8F52151A3D5AFDE8CC4621E4B3598B76F86C29946FE9D77850480F7F1641996D9F55DA8862EE714D4F5
2,742,119 UART: [art] SIG.R = EF01FC27CE776F62D8FE798FD6CF62B27FD8962B796F98B882C612D10418088F4F9B5BFBE250448C56255AEA64F99DDC
2,748,892 UART: [art] SIG.S = EDE703A5035A5E60067C7EA05F977414F1249E2238A3F696F61E3D7E25C7F9718E254765E70FE75D36FA304B6399A0F5
2,772,378 UART: mbox::rt_entry...
2,772,750 UART: ____ _ _ _ ____ _____
2,773,534 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,774,334 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,775,102 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,775,870 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,776,638 UART: |_|
2,776,950 UART:
2,909,057 UART: [rt] Runtime listening for mailbox commands...
2,910,246 >>> mbox cmd response data (48 bytes)
2,910,247 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,913,034 >>> mbox cmd response data (48 bytes)
2,913,035 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,931,180 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,571 >>> mbox cmd response data (12 bytes)
1,142,572 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,219,075 >>> mbox cmd response: success
2,274,944 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,281,014 UART:
2,281,030 UART: Running Caliptra FMC ...
2,281,438 UART:
2,281,581 UART: [state] CFI Enabled
2,292,239 UART: [fht] FMC Alias Private Key: 7
2,411,893 UART: [art] Extend RT PCRs Done
2,412,321 UART: [art] Lock RT PCRs Done
2,413,917 UART: [art] Populate DV Done
2,422,394 UART: [fht] FMC Alias Private Key: 7
2,423,418 UART: [art] Derive CDI
2,423,698 UART: [art] Store in slot 0x4
2,509,817 UART: [art] Derive Key Pair
2,510,177 UART: [art] Store priv key in slot 0x5
2,523,549 UART: [art] Derive Key Pair - Done
2,538,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,554,025 UART: [art] Erasing AUTHORITY.KEYID = 7
2,554,790 UART: [art] PUB.X = B3806D998FB6E3D1BF7CFA0C06D9D437F9B739FC6A911B21382304D3090DDF00399493392C481C429161CFF0277533A1
2,561,521 UART: [art] PUB.Y = A0C88D9054FE8C55060F3734FF3F01439D17388E08DFC2F2324D3223382B2939EB97B1D2ACBB1CEAFF9BB18431C50F3A
2,568,466 UART: [art] SIG.R = C840C6883B69C4AD17E79F543A214BC71AE018E43FBF74AA620E5AAC692429F95AE08066C09987505C7DEB47A017BB11
2,575,239 UART: [art] SIG.S = 3AF4BC7004BFA2A1924D5D2ACFEA5AB24C614DB77A25438BE845B3EF378B6F98001CB781B26A9E6F70949940E8CCE17D
2,598,902 UART: mbox::rt_entry...
2,599,274 UART: ____ _ _ _ ____ _____
2,600,058 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,600,858 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,601,626 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,602,394 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,603,162 UART: |_|
2,603,474 UART:
2,734,258 UART: [rt] Runtime listening for mailbox commands...
2,735,447 >>> mbox cmd response data (48 bytes)
2,735,448 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,738,235 >>> mbox cmd response data (48 bytes)
2,738,236 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,756,381 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,724 UART: [state] LifecycleState = Unprovisioned
86,379 UART: [state] DebugLocked = No
87,107 UART: [state] WD Timer not started. Device not locked for debugging
88,302 UART: [kat] SHA2-256
893,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,077 UART: [kat] ++
898,229 UART: [kat] sha1
902,585 UART: [kat] SHA2-256
904,525 UART: [kat] SHA2-384
907,244 UART: [kat] SHA2-512-ACC
909,145 UART: [kat] ECC-384
918,948 UART: [kat] HMAC-384Kdf
923,424 UART: [kat] LMS
1,171,752 UART: [kat] --
1,172,817 UART: [cold-reset] ++
1,173,315 UART: [fht] FHT @ 0x50003400
1,175,804 UART: [idev] ++
1,175,972 UART: [idev] CDI.KEYID = 6
1,176,332 UART: [idev] SUBJECT.KEYID = 7
1,176,756 UART: [idev] UDS.KEYID = 0
1,184,524 UART: [idev] Erasing UDS.KEYID = 0
1,200,883 UART: [idev] Sha1 KeyId Algorithm
1,209,203 UART: [idev] --
1,210,245 UART: [ldev] ++
1,210,413 UART: [ldev] CDI.KEYID = 6
1,210,776 UART: [ldev] SUBJECT.KEYID = 5
1,211,202 UART: [ldev] AUTHORITY.KEYID = 7
1,211,665 UART: [ldev] FE.KEYID = 1
1,216,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,839 UART: [ldev] --
1,282,292 UART: [fwproc] Wait for Commands...
1,282,978 UART: [fwproc] Recv command 0x4d454153
1,286,987 >>> mbox cmd response data (12 bytes)
1,286,988 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,287,275 UART: [fwproc] Recv command 0x46574c44
1,288,003 UART: [fwproc] Recv'd Img size: 82832 bytes
2,223,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,250,518 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,281,688 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,368,267 >>> mbox cmd response: success
2,369,527 UART: [afmc] ++
2,369,695 UART: [afmc] CDI.KEYID = 6
2,370,057 UART: [afmc] SUBJECT.KEYID = 7
2,370,482 UART: [afmc] AUTHORITY.KEYID = 5
2,406,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,422,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,423,734 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,429,443 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,435,326 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,441,027 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,448,973 UART: [afmc] --
2,449,979 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,450,001 UART: [cold-reset] --
2,450,655 UART: [state] Locking Datavault
2,451,716 UART: [state] Locking PCR0, PCR1 and PCR31
2,452,320 UART: [state] Locking ICCM
2,452,954 UART: [exit] Launching FMC @ 0x40000130
2,458,284 UART:
2,458,300 UART: Running Caliptra FMC ...
2,458,708 UART:
2,458,762 UART: [state] CFI Enabled
2,469,132 UART: [fht] FMC Alias Private Key: 7
2,587,998 UART: [art] Extend RT PCRs Done
2,588,426 UART: [art] Lock RT PCRs Done
2,590,030 UART: [art] Populate DV Done
2,598,105 UART: [fht] FMC Alias Private Key: 7
2,599,235 UART: [art] Derive CDI
2,599,515 UART: [art] Store in slot 0x4
2,685,082 UART: [art] Derive Key Pair
2,685,442 UART: [art] Store priv key in slot 0x5
2,698,848 UART: [art] Derive Key Pair - Done
2,713,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,729,018 UART: [art] Erasing AUTHORITY.KEYID = 7
2,729,783 UART: [art] PUB.X = 9EFCC12321164220EB3C9E62E2B57C8B0BCBDF74E364F040F0DCA3988619BA24DCF7913E9FF85962B3F1A651A4D4274C
2,736,562 UART: [art] PUB.Y = 3255F1DD1ACBABEED386C14633731CC67814B40653E8E03441DFD557A03A042970783233186C8E0EBB193C7AA694103E
2,743,503 UART: [art] SIG.R = 8BF287C912C6D626111E463225D74E8181F2BA576F3697A5C53FC85C4B19C23E628EA64042DC5DC1FCF4D98AAEDFFF1A
2,750,287 UART: [art] SIG.S = BA4C62770E0918539CDE14BA2A53BBB289BC40A3F17399975B6B2742CDCC0E37B3EC3AE311D9A07D61840BEE88FB8616
2,773,985 UART: mbox::rt_entry...
2,774,357 UART: ____ _ _ _ ____ _____
2,775,141 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,775,941 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,776,709 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,777,477 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,778,245 UART: |_|
2,778,557 UART:
2,908,544 UART: [rt] Runtime listening for mailbox commands...
2,909,733 >>> mbox cmd response data (48 bytes)
2,909,734 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,912,521 >>> mbox cmd response data (48 bytes)
2,912,522 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,930,667 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,179 >>> mbox cmd response data (12 bytes)
1,143,180 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,221,144 >>> mbox cmd response: success
2,276,505 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,282,919 UART:
2,282,935 UART: Running Caliptra FMC ...
2,283,343 UART:
2,283,397 UART: [state] CFI Enabled
2,294,007 UART: [fht] FMC Alias Private Key: 7
2,412,365 UART: [art] Extend RT PCRs Done
2,412,793 UART: [art] Lock RT PCRs Done
2,414,247 UART: [art] Populate DV Done
2,422,374 UART: [fht] FMC Alias Private Key: 7
2,423,514 UART: [art] Derive CDI
2,423,794 UART: [art] Store in slot 0x4
2,510,061 UART: [art] Derive Key Pair
2,510,421 UART: [art] Store priv key in slot 0x5
2,523,389 UART: [art] Derive Key Pair - Done
2,538,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,553,691 UART: [art] Erasing AUTHORITY.KEYID = 7
2,554,456 UART: [art] PUB.X = 5D14896978C8117539DF0C9580BCECFD2250ACC805E82FF7F1670C37D31B7FEEA0E529381D0D5066D25B0E442EC8B082
2,561,217 UART: [art] PUB.Y = D65D2D65BD7D935FBEA29D47286315BF566FF6624B9489867C976662C523E444A697631467BCF27FD7FD48DC2F4EF990
2,568,169 UART: [art] SIG.R = 42BFBBA7E09E0A8900DAD4C482C795B2E6EA594C7BBAF44C8D5CC095426D0AA0B21B0000B455EC55EE12E5ECD62DC5EB
2,574,893 UART: [art] SIG.S = 7A6C5C13C1F94D1E477280A86334DEDA479D187B55BD92A4D5D405877191EF1D88A8FBB574731BF5798BD048ACE0B036
2,598,492 UART: mbox::rt_entry...
2,598,864 UART: ____ _ _ _ ____ _____
2,599,648 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,600,448 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,601,216 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,601,984 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,602,752 UART: |_|
2,603,064 UART:
2,733,019 UART: [rt] Runtime listening for mailbox commands...
2,734,208 >>> mbox cmd response data (48 bytes)
2,734,209 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,736,996 >>> mbox cmd response data (48 bytes)
2,736,997 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,755,142 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
893,383 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,508 UART: [kat] ++
897,660 UART: [kat] sha1
902,084 UART: [kat] SHA2-256
904,024 UART: [kat] SHA2-384
906,859 UART: [kat] SHA2-512-ACC
908,760 UART: [kat] ECC-384
918,559 UART: [kat] HMAC-384Kdf
923,219 UART: [kat] LMS
1,171,547 UART: [kat] --
1,172,086 UART: [cold-reset] ++
1,172,538 UART: [fht] FHT @ 0x50003400
1,175,265 UART: [idev] ++
1,175,433 UART: [idev] CDI.KEYID = 6
1,175,793 UART: [idev] SUBJECT.KEYID = 7
1,176,217 UART: [idev] UDS.KEYID = 0
1,183,983 UART: [idev] Erasing UDS.KEYID = 0
1,200,586 UART: [idev] Sha1 KeyId Algorithm
1,209,092 UART: [idev] --
1,209,952 UART: [ldev] ++
1,210,120 UART: [ldev] CDI.KEYID = 6
1,210,483 UART: [ldev] SUBJECT.KEYID = 5
1,210,909 UART: [ldev] AUTHORITY.KEYID = 7
1,211,372 UART: [ldev] FE.KEYID = 1
1,216,582 UART: [ldev] Erasing FE.KEYID = 1
1,242,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,170 UART: [ldev] --
1,282,653 UART: [fwproc] Wait for Commands...
1,283,365 UART: [fwproc] Recv command 0x4d454153
1,287,374 >>> mbox cmd response data (12 bytes)
1,287,375 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,287,598 UART: [fwproc] Recv command 0x46574c44
1,288,326 UART: [fwproc] Recv'd Img size: 82832 bytes
2,224,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,250,931 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,282,101 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,368,690 >>> mbox cmd response: success
2,369,924 UART: [afmc] ++
2,370,092 UART: [afmc] CDI.KEYID = 6
2,370,454 UART: [afmc] SUBJECT.KEYID = 7
2,370,879 UART: [afmc] AUTHORITY.KEYID = 5
2,405,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,422,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,423,023 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,428,732 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,434,615 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,440,316 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,448,248 UART: [afmc] --
2,449,280 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,449,302 UART: [cold-reset] --
2,449,844 UART: [state] Locking Datavault
2,451,041 UART: [state] Locking PCR0, PCR1 and PCR31
2,451,645 UART: [state] Locking ICCM
2,452,203 UART: [exit] Launching FMC @ 0x40000130
2,457,533 UART:
2,457,549 UART: Running Caliptra FMC ...
2,457,957 UART:
2,458,100 UART: [state] CFI Enabled
2,469,086 UART: [fht] FMC Alias Private Key: 7
2,588,306 UART: [art] Extend RT PCRs Done
2,588,734 UART: [art] Lock RT PCRs Done
2,590,368 UART: [art] Populate DV Done
2,598,427 UART: [fht] FMC Alias Private Key: 7
2,599,511 UART: [art] Derive CDI
2,599,791 UART: [art] Store in slot 0x4
2,685,476 UART: [art] Derive Key Pair
2,685,836 UART: [art] Store priv key in slot 0x5
2,699,656 UART: [art] Derive Key Pair - Done
2,714,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,730,341 UART: [art] Erasing AUTHORITY.KEYID = 7
2,731,106 UART: [art] PUB.X = CE698A6F579B9A60C2DEF4DC7A8AB788F894B21BE75E551AABA7043596256685C92EAEDB72D048B74CC2D7B34FB67C07
2,737,886 UART: [art] PUB.Y = 743EA372FE18097FE1230986BAC3CC7AE7531671C3E4E2B9BE721E47BD1792233027324D795304B533513471945A729A
2,744,817 UART: [art] SIG.R = 60C9464426F2C9A0DA36D24E06B27A3BCD209CA0C8C46A5F3C3CFE97B230C52C831CB3FB4FA63D0C5844C1A90B792D17
2,751,592 UART: [art] SIG.S = CF717FB82760FEC705D6B35321547E887F30915123D554E6E806945D42DDB857AE8C130B8B7C0BE7F664AD2A7981F2CC
2,775,316 UART: mbox::rt_entry...
2,775,688 UART: ____ _ _ _ ____ _____
2,776,472 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,777,272 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,778,040 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,778,808 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,779,576 UART: |_|
2,779,888 UART:
2,911,686 UART: [rt] Runtime listening for mailbox commands...
2,912,875 >>> mbox cmd response data (48 bytes)
2,912,876 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,915,663 >>> mbox cmd response data (48 bytes)
2,915,664 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,933,809 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,092 >>> mbox cmd response data (12 bytes)
1,143,093 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,219,531 >>> mbox cmd response: success
2,275,674 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,281,556 UART:
2,281,572 UART: Running Caliptra FMC ...
2,281,980 UART:
2,282,123 UART: [state] CFI Enabled
2,293,133 UART: [fht] FMC Alias Private Key: 7
2,412,523 UART: [art] Extend RT PCRs Done
2,412,951 UART: [art] Lock RT PCRs Done
2,414,441 UART: [art] Populate DV Done
2,422,598 UART: [fht] FMC Alias Private Key: 7
2,423,596 UART: [art] Derive CDI
2,423,876 UART: [art] Store in slot 0x4
2,509,503 UART: [art] Derive Key Pair
2,509,863 UART: [art] Store priv key in slot 0x5
2,523,557 UART: [art] Derive Key Pair - Done
2,538,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,554,223 UART: [art] Erasing AUTHORITY.KEYID = 7
2,554,988 UART: [art] PUB.X = 1A74F35A339BD09DA66F359F913806D2FF67750A4A2CC9E119A1AECA58FA505B1C738C645B0001CF42D420B34E7C8462
2,561,733 UART: [art] PUB.Y = 00A7830196C3471BA33FE90DD604E3313CF7DEC667833478B8A067AB4DFCCE7A0015A8749AE7EB2CB46F4255B8F21484
2,568,636 UART: [art] SIG.R = 37DEE13A2717D4E03675A23D3E36CD7168FCA021928727A69F97BB5A761CA9D813F8CDA3096E9CF0AC9657162BD37109
2,575,404 UART: [art] SIG.S = CAC52CCD3576ED68833209140F2458E96057518341433632F751D9A24DDC2F25F773409F1BF0223A13168E9748615BD0
2,599,036 UART: mbox::rt_entry...
2,599,408 UART: ____ _ _ _ ____ _____
2,600,192 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,600,992 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,601,760 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,602,528 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,603,296 UART: |_|
2,603,608 UART:
2,735,302 UART: [rt] Runtime listening for mailbox commands...
2,736,491 >>> mbox cmd response data (48 bytes)
2,736,492 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,739,279 >>> mbox cmd response data (48 bytes)
2,739,280 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,757,425 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,203 UART:
192,554 UART: Running Caliptra ROM ...
193,762 UART:
193,916 UART: [state] CFI Enabled
265,435 UART: [state] LifecycleState = Unprovisioned
267,365 UART: [state] DebugLocked = No
268,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,988 UART: [kat] SHA2-256
443,707 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,195 UART: [kat] ++
454,802 UART: [kat] sha1
466,074 UART: [kat] SHA2-256
468,771 UART: [kat] SHA2-384
474,974 UART: [kat] SHA2-512-ACC
477,348 UART: [kat] ECC-384
2,767,207 UART: [kat] HMAC-384Kdf
2,799,199 UART: [kat] LMS
3,989,560 UART: [kat] --
3,994,594 UART: [cold-reset] ++
3,996,739 UART: [fht] Storing FHT @ 0x50003400
4,008,361 UART: [idev] ++
4,008,930 UART: [idev] CDI.KEYID = 6
4,009,962 UART: [idev] SUBJECT.KEYID = 7
4,011,146 UART: [idev] UDS.KEYID = 0
4,012,160 ready_for_fw is high
4,012,362 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
4,056,987 UART: [idev] Erasing UDS.KEYID = 0
7,347,585 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,724 UART: [idev] --
7,373,773 UART: [ldev] ++
7,374,339 UART: [ldev] CDI.KEYID = 6
7,375,303 UART: [ldev] SUBJECT.KEYID = 5
7,376,522 UART: [ldev] AUTHORITY.KEYID = 7
7,377,698 UART: [ldev] FE.KEYID = 1
7,423,201 UART: [ldev] Erasing FE.KEYID = 1
10,758,239 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,136,022 UART: [ldev] --
13,140,589 UART: [fwproc] Waiting for Commands...
13,143,705 UART: [fwproc] Received command 0x46574c44
13,145,882 UART: [fwproc] Received Image of size 35124 bytes
16,236,790 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,315,501 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,388,661 UART: [fwproc] Loading Runtime at address 0x40005000 len 9196
16,424,825 >>> mbox cmd response: success
16,428,791 UART: [afmc] ++
16,429,425 UART: [afmc] CDI.KEYID = 6
16,430,382 UART: [afmc] SUBJECT.KEYID = 7
16,431,566 UART: [afmc] AUTHORITY.KEYID = 5
19,794,991 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,093,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,095,437 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,109,864 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,124,577 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,139,033 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,162,366 UART: [afmc] --
22,165,467 UART: [cold-reset] --
22,169,276 UART: [state] Locking Datavault
22,176,304 UART: [state] Locking PCR0, PCR1 and PCR31
22,178,066 UART: [state] Locking ICCM
22,179,843 UART: [exit] Launching FMC @ 0x40000130
22,188,229 UART:
22,188,475 UART: Running Caliptra FMC ...
22,189,628 UART:
22,189,788 UART: [state] CFI Enabled
22,254,119 UART: [fht] FMC Alias Private Key: 7
24,595,030 UART: [art] Extend RT PCRs Done
24,596,296 UART: [art] Lock RT PCRs Done
24,597,780 UART: [art] Populate DV Done
24,603,365 UART: [fht] FMC Alias Private Key: 7
24,604,876 UART: [art] Derive CDI
24,605,669 UART: [art] Store in slot 0x4
24,663,378 UART: [art] Derive Key Pair
24,664,452 UART: [art] Store priv key in slot 0x5
27,957,834 UART: [art] Derive Key Pair - Done
27,970,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,261,670 UART: [art] Erasing AUTHORITY.KEYID = 7
30,263,243 UART: [art] PUB.X = D8A6CBA954AECC0AEE5EEBCA198C5147A42E3867F02DCBE30AA6B87BD2925F557ECBEACCDD8BC96119BF4A16621E984E
30,270,470 UART: [art] PUB.Y = 5074F49E1DB754554FA648E43D6A3645993E21AB3E9107985D61A6777A78B16D18C8B603CF64E4FA771343795DB2E1BA
30,277,724 UART: [art] SIG.R = A919FDC6DA1DC36778F162760799620635E7A6CDE8551206088BD4B3ED025E70EC61E857514DEE8B5E6EB54D28855D09
30,285,137 UART: [art] SIG.S = 929AAB218161FA3E3F43D3A1E4FECF75057BB4899AA2D8A15C7EDB23E06266060B299B9B899844F018E6E70DDB956ED9
31,590,262 UART: persistent_rt::test_persistent_data_layout...[ok]
31,592,526 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,785,177 ready_for_fw is high
3,785,598 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
16,271,447 >>> mbox cmd response: success
21,960,420 UART:
21,960,850 UART: Running Caliptra FMC ...
21,961,961 UART:
21,962,123 UART: [state] CFI Enabled
22,012,372 UART: [fht] FMC Alias Private Key: 7
24,352,362 UART: [art] Extend RT PCRs Done
24,353,653 UART: [art] Lock RT PCRs Done
24,355,205 UART: [art] Populate DV Done
24,360,467 UART: [fht] FMC Alias Private Key: 7
24,362,069 UART: [art] Derive CDI
24,362,877 UART: [art] Store in slot 0x4
24,420,623 UART: [art] Derive Key Pair
24,421,713 UART: [art] Store priv key in slot 0x5
27,713,929 UART: [art] Derive Key Pair - Done
27,726,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,014,976 UART: [art] Erasing AUTHORITY.KEYID = 7
30,016,556 UART: [art] PUB.X = 30DDE1E2032A3CF5054BD54D3E0FBD4DF70321644B6CAD0E2066A6B5914D4751775BA3EB0566D76DEF0E1C25A95095F2
30,023,782 UART: [art] PUB.Y = F28B8822B8A5A6873524AC354B0764B932309CD6F6BB60075D90308C1BDA6DEE7E78D7A06D76A53ED59D321AAA44B3FF
30,031,010 UART: [art] SIG.R = 15EB96DDD7D5980A607127CEF7C972BF96AD8B12B65ABB600E9E3448E857A7B7F5EB13F4DCB0665AFA75F342D30FE7B9
30,038,422 UART: [art] SIG.S = 0398C535D2D967FF88BCDB62A25CC0DF703447408FA77EFFA6F833E31FF7E28A96C39B9D4D0655262AE295F5B0B9CCBC
31,342,796 UART: persistent_rt::test_persistent_data_layout...[ok]
31,345,063 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,304 UART:
192,682 UART: Running Caliptra ROM ...
193,765 UART:
603,716 UART: [state] CFI Enabled
615,878 UART: [state] LifecycleState = Unprovisioned
617,809 UART: [state] DebugLocked = No
619,753 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,250 UART: [kat] SHA2-256
793,999 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,588 UART: [kat] ++
805,067 UART: [kat] sha1
815,538 UART: [kat] SHA2-256
818,226 UART: [kat] SHA2-384
822,799 UART: [kat] SHA2-512-ACC
825,164 UART: [kat] ECC-384
3,108,892 UART: [kat] HMAC-384Kdf
3,120,529 UART: [kat] LMS
4,310,633 UART: [kat] --
4,314,414 UART: [cold-reset] ++
4,315,698 UART: [fht] Storing FHT @ 0x50003400
4,327,739 UART: [idev] ++
4,328,300 UART: [idev] CDI.KEYID = 6
4,329,323 UART: [idev] SUBJECT.KEYID = 7
4,330,496 UART: [idev] UDS.KEYID = 0
4,331,587 ready_for_fw is high
4,332,002 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
4,376,383 UART: [idev] Erasing UDS.KEYID = 0
7,619,236 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,515 UART: [idev] --
7,644,611 UART: [ldev] ++
7,645,238 UART: [ldev] CDI.KEYID = 6
7,646,198 UART: [ldev] SUBJECT.KEYID = 5
7,647,407 UART: [ldev] AUTHORITY.KEYID = 7
7,648,638 UART: [ldev] FE.KEYID = 1
7,660,411 UART: [ldev] Erasing FE.KEYID = 1
10,948,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,748 UART: [ldev] --
13,309,322 UART: [fwproc] Waiting for Commands...
13,312,070 UART: [fwproc] Received command 0x46574c44
13,314,253 UART: [fwproc] Received Image of size 35124 bytes
16,411,171 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,484,233 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,557,372 UART: [fwproc] Loading Runtime at address 0x40005000 len 9196
16,594,017 >>> mbox cmd response: success
16,598,187 UART: [afmc] ++
16,598,828 UART: [afmc] CDI.KEYID = 6
16,599,727 UART: [afmc] SUBJECT.KEYID = 7
16,600,987 UART: [afmc] AUTHORITY.KEYID = 5
19,916,301 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,208,434 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,210,726 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,225,130 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,239,859 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,254,298 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,275,876 UART: [afmc] --
22,279,447 UART: [cold-reset] --
22,283,647 UART: [state] Locking Datavault
22,289,975 UART: [state] Locking PCR0, PCR1 and PCR31
22,291,719 UART: [state] Locking ICCM
22,292,799 UART: [exit] Launching FMC @ 0x40000130
22,301,154 UART:
22,301,394 UART: Running Caliptra FMC ...
22,302,440 UART:
22,302,588 UART: [state] CFI Enabled
22,310,669 UART: [fht] FMC Alias Private Key: 7
24,649,783 UART: [art] Extend RT PCRs Done
24,651,034 UART: [art] Lock RT PCRs Done
24,652,480 UART: [art] Populate DV Done
24,657,831 UART: [fht] FMC Alias Private Key: 7
24,659,423 UART: [art] Derive CDI
24,660,274 UART: [art] Store in slot 0x4
24,703,062 UART: [art] Derive Key Pair
24,704,095 UART: [art] Store priv key in slot 0x5
27,946,403 UART: [art] Derive Key Pair - Done
27,959,251 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,239,611 UART: [art] Erasing AUTHORITY.KEYID = 7
30,241,166 UART: [art] PUB.X = 72EE1DD1A40AA60EC74F4E716AF76473A53B011EA7725BFE2A714DBC76E898431861F892D23D773EB69E831E4F4B0677
30,248,373 UART: [art] PUB.Y = BAC3C78DF75B8AF2FF70F5DCC0B35D0035915EF365F4EBAC0502B4B74A5DB366586A61AC3E2B5FFD3463A47C80B12AC8
30,255,713 UART: [art] SIG.R = 1BA07BDA7DD65CDCB8B97A14D6C185652FCE5B918F2BAC0191DEBDABD5AE652F2FB92CCC07A05F39A783C0A47531512A
30,263,121 UART: [art] SIG.S = D91EF5DB6217CF8DF8A8F3130A50059BC9A54FDB4033DF2143CF9C535FB158362A81C2F24DE2B154442BE578A223CE8B
31,567,995 UART: persistent_rt::test_persistent_data_layout...[ok]
31,570,225 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
4,128,757 ready_for_fw is high
4,129,211 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
16,464,830 >>> mbox cmd response: success
22,107,309 UART:
22,107,727 UART: Running Caliptra FMC ...
22,108,834 UART:
22,109,011 UART: [state] CFI Enabled
22,116,843 UART: [fht] FMC Alias Private Key: 7
24,456,804 UART: [art] Extend RT PCRs Done
24,458,102 UART: [art] Lock RT PCRs Done
24,459,618 UART: [art] Populate DV Done
24,464,952 UART: [fht] FMC Alias Private Key: 7
24,466,618 UART: [art] Derive CDI
24,467,477 UART: [art] Store in slot 0x4
24,510,040 UART: [art] Derive Key Pair
24,511,136 UART: [art] Store priv key in slot 0x5
27,752,846 UART: [art] Derive Key Pair - Done
27,765,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,045,937 UART: [art] Erasing AUTHORITY.KEYID = 7
30,047,515 UART: [art] PUB.X = 282B8636EDA00D3A90E756C3130C21A9E26AC7CC75652C6FB6E25B8979EEA7368A56FDC71C7F42530EE9FA49171F84E3
30,054,751 UART: [art] PUB.Y = B6F956AF8E0BCB65BD82261169C620C0349A2DF0BDB64AEBF87FCEE474135DD405991ED881DFDAC1437D73A2E6495819
30,061,972 UART: [art] SIG.R = EDD5A3438A492E11AEE335AA4C31A67079DD2263591E3C69B2E012637C0BC27138FFE809E2CDE26786EA566B3FE8CCEB
30,069,388 UART: [art] SIG.S = FDEE44B04DF9DB948A7B77AE45808279D2728F95FD62B3F1F2DF3424EA17559492CDDD3C286A431A6B3F5DD47003F523
31,374,098 UART: persistent_rt::test_persistent_data_layout...[ok]
31,376,373 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,104 UART:
192,461 UART: Running Caliptra ROM ...
193,565 UART:
193,705 UART: [state] CFI Enabled
265,716 UART: [state] LifecycleState = Unprovisioned
267,643 UART: [state] DebugLocked = No
270,087 UART: [state] WD Timer not started. Device not locked for debugging
274,402 UART: [kat] SHA2-256
454,101 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,843 UART: [kat] ++
465,293 UART: [kat] sha1
475,185 UART: [kat] SHA2-256
477,907 UART: [kat] SHA2-384
484,530 UART: [kat] SHA2-512-ACC
486,890 UART: [kat] ECC-384
2,947,659 UART: [kat] HMAC-384Kdf
2,972,538 UART: [kat] LMS
3,449,239 UART: [kat] --
3,451,893 UART: [cold-reset] ++
3,453,902 UART: [fht] FHT @ 0x50003400
3,465,657 UART: [idev] ++
3,466,308 UART: [idev] CDI.KEYID = 6
3,467,225 UART: [idev] SUBJECT.KEYID = 7
3,468,466 UART: [idev] UDS.KEYID = 0
3,469,364 ready_for_fw is high
3,469,552 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
3,514,132 UART: [idev] Erasing UDS.KEYID = 0
5,988,282 UART: [idev] Sha1 KeyId Algorithm
6,012,109 UART: [idev] --
6,017,783 UART: [ldev] ++
6,018,353 UART: [ldev] CDI.KEYID = 6
6,019,263 UART: [ldev] SUBJECT.KEYID = 5
6,020,479 UART: [ldev] AUTHORITY.KEYID = 7
6,021,763 UART: [ldev] FE.KEYID = 1
6,061,276 UART: [ldev] Erasing FE.KEYID = 1
8,569,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,320,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,336,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,352,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,374,237 UART: [ldev] --
10,380,045 UART: [fwproc] Wait for Commands...
10,381,587 UART: [fwproc] Recv command 0x46574c44
10,383,573 UART: [fwproc] Recv'd Img size: 35124 bytes
12,841,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,919,277 UART: [fwproc] Load FMC at address 0x40000000 len 20044
12,992,290 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
13,028,609 >>> mbox cmd response: success
13,033,323 UART: [afmc] ++
13,033,985 UART: [afmc] CDI.KEYID = 6
13,034,925 UART: [afmc] SUBJECT.KEYID = 7
13,036,127 UART: [afmc] AUTHORITY.KEYID = 5
15,578,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,319,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,321,644 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,337,486 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,353,471 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,369,072 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,394,553 UART: [afmc] --
17,398,058 UART: [cold-reset] --
17,403,809 UART: [state] Locking Datavault
17,407,387 UART: [state] Locking PCR0, PCR1 and PCR31
17,409,133 UART: [state] Locking ICCM
17,411,941 UART: [exit] Launching FMC @ 0x40000130
17,420,335 UART:
17,420,641 UART: Running Caliptra FMC ...
17,421,785 UART:
17,421,946 UART: [state] CFI Enabled
17,479,086 UART: [fht] FMC Alias Private Key: 7
19,245,417 UART: [art] Extend RT PCRs Done
19,246,676 UART: [art] Lock RT PCRs Done
19,248,096 UART: [art] Populate DV Done
19,253,612 UART: [fht] FMC Alias Private Key: 7
19,255,198 UART: [art] Derive CDI
19,256,041 UART: [art] Store in slot 0x4
19,311,808 UART: [art] Derive Key Pair
19,312,858 UART: [art] Store priv key in slot 0x5
21,775,605 UART: [art] Derive Key Pair - Done
21,788,662 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,501,298 UART: [art] Erasing AUTHORITY.KEYID = 7
23,502,852 UART: [art] PUB.X = 9A6DDD31D012F42F49520EAC30B5C8AA239B6DBFF38C7FCB1C49E7CAD383AE94FD0D5F05F72331CFB7DFBBD722151D6D
23,510,156 UART: [art] PUB.Y = F37C181E102CA526C43D6D0D09F1F0340A651610969019136B7BFDB537D31E0A7555AC716DAB9DECD89DBEBFC65B619E
23,517,466 UART: [art] SIG.R = 07EB6ED1B81AC57739A3703A49F29A85D2C1CEA395329DB0B4A94752EAA6AEB5FF3F51E82FE25D239A8BC86D01C9B265
23,524,868 UART: [art] SIG.S = 64F5FFB7DC9794F25EE649D191AD53F3B251C7E1F3808692CB9BCEC1A4BE74980AD33D4B3D41CD7A699EB3A5C54CEC8E
24,502,862 UART: persistent_rt::test_persistent_data_layout...[ok]
24,505,128 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,460,677 ready_for_fw is high
3,461,256 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
12,897,384 >>> mbox cmd response: success
17,191,588 UART:
17,192,018 UART: Running Caliptra FMC ...
17,193,132 UART:
17,193,295 UART: [state] CFI Enabled
17,259,195 UART: [fht] FMC Alias Private Key: 7
19,025,680 UART: [art] Extend RT PCRs Done
19,026,971 UART: [art] Lock RT PCRs Done
19,029,044 UART: [art] Populate DV Done
19,034,519 UART: [fht] FMC Alias Private Key: 7
19,035,982 UART: [art] Derive CDI
19,036,782 UART: [art] Store in slot 0x4
19,091,951 UART: [art] Derive Key Pair
19,093,034 UART: [art] Store priv key in slot 0x5
21,555,849 UART: [art] Derive Key Pair - Done
21,568,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,281,388 UART: [art] Erasing AUTHORITY.KEYID = 7
23,282,952 UART: [art] PUB.X = D63357C2BB448FBE511C665B3A7713428D7AE383DA0DDD4B6E714ACCE15351E845E99FF99EA9CCD26C29A892242DE3CC
23,290,169 UART: [art] PUB.Y = BE119DDE9F29A5D73DE32BBC4923BB25E279DDC6239319BE9E9A5622E005388445A800609B6527A1E2C1A1DF2D4B9902
23,297,398 UART: [art] SIG.R = 173064D2FC9442D01A66D89AE46789C14A95181C64B8C672F963660F234928176AC2A9B95A8A03C3DA17E630BCEBF927
23,304,794 UART: [art] SIG.S = 2995CC71ABCC53E7682A9C91508644720CF318A143BA23007A3F002BC7FB36857179D00AB21B4EC738BF3DA4C65345C4
24,283,588 UART: persistent_rt::test_persistent_data_layout...[ok]
24,285,883 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,396 UART:
192,759 UART: Running Caliptra ROM ...
193,844 UART:
603,612 UART: [state] CFI Enabled
618,196 UART: [state] LifecycleState = Unprovisioned
620,137 UART: [state] DebugLocked = No
622,226 UART: [state] WD Timer not started. Device not locked for debugging
626,893 UART: [kat] SHA2-256
806,515 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,310 UART: [kat] ++
817,758 UART: [kat] sha1
827,854 UART: [kat] SHA2-256
830,512 UART: [kat] SHA2-384
835,156 UART: [kat] SHA2-512-ACC
837,526 UART: [kat] ECC-384
3,281,700 UART: [kat] HMAC-384Kdf
3,294,143 UART: [kat] LMS
3,770,600 UART: [kat] --
3,773,412 UART: [cold-reset] ++
3,774,779 UART: [fht] FHT @ 0x50003400
3,787,106 UART: [idev] ++
3,787,740 UART: [idev] CDI.KEYID = 6
3,788,661 UART: [idev] SUBJECT.KEYID = 7
3,789,906 UART: [idev] UDS.KEYID = 0
3,790,835 ready_for_fw is high
3,791,051 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
3,835,359 UART: [idev] Erasing UDS.KEYID = 0
6,266,225 UART: [idev] Sha1 KeyId Algorithm
6,289,398 UART: [idev] --
6,293,879 UART: [ldev] ++
6,294,459 UART: [ldev] CDI.KEYID = 6
6,295,445 UART: [ldev] SUBJECT.KEYID = 5
6,296,607 UART: [ldev] AUTHORITY.KEYID = 7
6,297,843 UART: [ldev] FE.KEYID = 1
6,309,033 UART: [ldev] Erasing FE.KEYID = 1
8,786,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,768 UART: [ldev] --
10,581,555 UART: [fwproc] Wait for Commands...
10,584,081 UART: [fwproc] Recv command 0x46574c44
10,586,074 UART: [fwproc] Recv'd Img size: 35124 bytes
13,043,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,115,975 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,189,036 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
13,225,002 >>> mbox cmd response: success
13,229,803 UART: [afmc] ++
13,230,441 UART: [afmc] CDI.KEYID = 6
13,231,376 UART: [afmc] SUBJECT.KEYID = 7
13,232,550 UART: [afmc] AUTHORITY.KEYID = 5
15,732,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,455,172 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,457,395 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,473,231 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,489,302 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,504,820 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,528,691 UART: [afmc] --
17,532,033 UART: [cold-reset] --
17,535,423 UART: [state] Locking Datavault
17,541,691 UART: [state] Locking PCR0, PCR1 and PCR31
17,543,449 UART: [state] Locking ICCM
17,545,374 UART: [exit] Launching FMC @ 0x40000130
17,553,806 UART:
17,554,053 UART: Running Caliptra FMC ...
17,555,197 UART:
17,555,363 UART: [state] CFI Enabled
17,563,443 UART: [fht] FMC Alias Private Key: 7
19,329,789 UART: [art] Extend RT PCRs Done
19,331,058 UART: [art] Lock RT PCRs Done
19,332,768 UART: [art] Populate DV Done
19,338,077 UART: [fht] FMC Alias Private Key: 7
19,339,747 UART: [art] Derive CDI
19,340,596 UART: [art] Store in slot 0x4
19,383,219 UART: [art] Derive Key Pair
19,384,296 UART: [art] Store priv key in slot 0x5
21,811,039 UART: [art] Derive Key Pair - Done
21,823,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,530,455 UART: [art] Erasing AUTHORITY.KEYID = 7
23,532,010 UART: [art] PUB.X = EBE118759F5422800858EE4C6338A31648233596E218FDB4395C7C829706E08460AEB2A3296879C855D985DB59895EAF
23,539,227 UART: [art] PUB.Y = 9CA2E60A6123E3A4FB8D7C59175B03457F5CA8A84DE3C618ACB9B5854A42E9F8A787BB76E1888856D819D38D2D9935E7
23,546,442 UART: [art] SIG.R = 164902A380614DE4B6A7D5B575E1FA6309FEDA3CB6D5EF19717D3A74EBB131EB849C1054E1AA0DC15894402156E19250
23,553,849 UART: [art] SIG.S = 591611209B0257F4638095C938DA72092A92999D958CF5E650C5E5C6E09B7B2383FEDC3F600ECA99748A2D097B7A3661
24,532,185 UART: persistent_rt::test_persistent_data_layout...[ok]
24,534,456 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
3,780,510 ready_for_fw is high
3,780,901 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
13,098,372 >>> mbox cmd response: success
17,349,620 UART:
17,350,003 UART: Running Caliptra FMC ...
17,351,209 UART:
17,351,389 UART: [state] CFI Enabled
17,359,431 UART: [fht] FMC Alias Private Key: 7
19,125,037 UART: [art] Extend RT PCRs Done
19,126,310 UART: [art] Lock RT PCRs Done
19,127,950 UART: [art] Populate DV Done
19,133,552 UART: [fht] FMC Alias Private Key: 7
19,135,077 UART: [art] Derive CDI
19,135,893 UART: [art] Store in slot 0x4
19,178,568 UART: [art] Derive Key Pair
19,179,807 UART: [art] Store priv key in slot 0x5
21,606,017 UART: [art] Derive Key Pair - Done
21,618,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,325,157 UART: [art] Erasing AUTHORITY.KEYID = 7
23,326,722 UART: [art] PUB.X = 1D2522767EF1D225DCE2EC758FEFD68580227B478C5BF1CF7CE261294C3C405B396A3553856B0B7C87031CCE4DC390F3
23,333,938 UART: [art] PUB.Y = F9F42A3B9AFB38A79F29E1D691A41C1770FD0C4BA6EE6494EB2856B73CD61842E95A7AF6D245AB67F71E8BF2FF3ED2B8
23,341,188 UART: [art] SIG.R = 091402BBD47D2CF00128366CCC46D2E48D49C9E793EAD2622C8A3BCF5BCC3C0FB1086F703E6C3E9C6F018EF13041A2DB
23,348,608 UART: [art] SIG.S = 5E8A20E50098F26A9CC5F3D7CB9993D5CFC1F6F85785D441B1D2523BAD198AA5A59BA0B6B69E181911A1E97329DB44B2
24,327,177 UART: persistent_rt::test_persistent_data_layout...[ok]
24,329,465 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,112 UART:
192,473 UART: Running Caliptra ROM ...
193,612 UART:
193,762 UART: [state] CFI Enabled
264,362 UART: [state] LifecycleState = Unprovisioned
266,775 UART: [state] DebugLocked = No
269,591 UART: [state] WD Timer not started. Device not locked for debugging
273,864 UART: [kat] SHA2-256
463,772 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,505 UART: [kat] ++
474,948 UART: [kat] sha1
486,455 UART: [kat] SHA2-256
489,460 UART: [kat] SHA2-384
495,530 UART: [kat] SHA2-512-ACC
498,080 UART: [kat] ECC-384
2,948,440 UART: [kat] HMAC-384Kdf
2,973,103 UART: [kat] LMS
3,504,856 UART: [kat] --
3,511,339 UART: [cold-reset] ++
3,513,130 UART: [fht] FHT @ 0x50003400
3,526,092 UART: [idev] ++
3,526,798 UART: [idev] CDI.KEYID = 6
3,527,827 UART: [idev] SUBJECT.KEYID = 7
3,528,945 UART: [idev] UDS.KEYID = 0
3,529,869 ready_for_fw is high
3,530,056 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
3,574,554 UART: [idev] Erasing UDS.KEYID = 0
6,051,762 UART: [idev] Sha1 KeyId Algorithm
6,074,783 UART: [idev] --
6,080,730 UART: [ldev] ++
6,081,465 UART: [ldev] CDI.KEYID = 6
6,082,372 UART: [ldev] SUBJECT.KEYID = 5
6,083,532 UART: [ldev] AUTHORITY.KEYID = 7
6,084,759 UART: [ldev] FE.KEYID = 1
6,123,498 UART: [ldev] Erasing FE.KEYID = 1
8,627,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,380,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,395,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,410,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,431,825 UART: [ldev] --
10,437,644 UART: [fwproc] Wait for Commands...
10,439,736 UART: [fwproc] Recv command 0x46574c44
10,441,986 UART: [fwproc] Recv'd Img size: 35124 bytes
12,912,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,996,193 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,119,801 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
13,179,823 >>> mbox cmd response: success
13,183,024 UART: [afmc] ++
13,183,744 UART: [afmc] CDI.KEYID = 6
13,184,942 UART: [afmc] SUBJECT.KEYID = 7
13,186,345 UART: [afmc] AUTHORITY.KEYID = 5
15,726,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,448,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,450,569 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,465,656 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,480,799 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,495,703 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,518,169 UART: [afmc] --
17,521,062 UART: [cold-reset] --
17,525,469 UART: [state] Locking Datavault
17,530,416 UART: [state] Locking PCR0, PCR1 and PCR31
17,532,605 UART: [state] Locking ICCM
17,535,312 UART: [exit] Launching FMC @ 0x40000130
17,543,946 UART:
17,544,197 UART: Running Caliptra FMC ...
17,545,329 UART:
17,545,487 UART: [state] CFI Enabled
17,605,895 UART: [fht] FMC Alias Private Key: 7
19,372,453 UART: [art] Extend RT PCRs Done
19,373,728 UART: [art] Lock RT PCRs Done
19,375,357 UART: [art] Populate DV Done
19,380,612 UART: [fht] FMC Alias Private Key: 7
19,382,132 UART: [art] Derive CDI
19,382,926 UART: [art] Store in slot 0x4
19,439,106 UART: [art] Derive Key Pair
19,440,144 UART: [art] Store priv key in slot 0x5
21,903,009 UART: [art] Derive Key Pair - Done
21,916,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,628,823 UART: [art] Erasing AUTHORITY.KEYID = 7
23,630,379 UART: [art] PUB.X = ED6CB749BA7F8EDB70A0E82970FA8CF586336E601056E3230F8FB589B1DFCE4DB5A6866C11367F992708943BF71907AE
23,637,684 UART: [art] PUB.Y = DAAA3E65653F4A5B847A3ECC945C1FC966EBB4B1F6D8261AC77267134D0E20E4C4A3D991C305FDFA8B9CE6515271ACF8
23,644,909 UART: [art] SIG.R = 750C746D4E8F3157F2184EF62E657AD7FE675A0B29CCFA5526794E9FA222D56372E126BC84E6BF1BE3F2A37AD848643E
23,652,306 UART: [art] SIG.S = 6BD5CAEC13124D3A69041B8F44B11DD6897C00ADF240263E7B640717BBF7EF63427511BDB402EA916D0E2CD14733922F
24,631,221 UART: persistent_rt::test_persistent_data_layout...[ok]
24,633,464 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,431,380 ready_for_fw is high
3,431,784 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
13,030,810 >>> mbox cmd response: success
17,340,791 UART:
17,341,704 UART: Running Caliptra FMC ...
17,342,854 UART:
17,343,009 UART: [state] CFI Enabled
17,408,787 UART: [fht] FMC Alias Private Key: 7
19,175,088 UART: [art] Extend RT PCRs Done
19,176,370 UART: [art] Lock RT PCRs Done
19,177,996 UART: [art] Populate DV Done
19,183,321 UART: [fht] FMC Alias Private Key: 7
19,184,851 UART: [art] Derive CDI
19,185,625 UART: [art] Store in slot 0x4
19,241,799 UART: [art] Derive Key Pair
19,242,887 UART: [art] Store priv key in slot 0x5
21,705,882 UART: [art] Derive Key Pair - Done
21,718,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,434,085 UART: [art] Erasing AUTHORITY.KEYID = 7
23,436,236 UART: [art] PUB.X = 7099C612569D915C6ADC842E23C8CA80D8E6D117F3654C51CCD0041F9DC8F9B629751CD4E314492EA2F5D7264EE5F2CD
23,442,859 UART: [art] PUB.Y = 66DAD3051773C3B31B42B291B949C6CB756331761B37810F57A9DCAA513B5DF51F451DDA442ABD88D76005C5DFD3004C
23,450,113 UART: [art] SIG.R = 4832D79FD33BA66A583C6839A6AA896FB68E6930211A761B73CC32F4C57DD9A3848F18AD0A13330CA147C0931C4A6C3D
23,457,580 UART: [art] SIG.S = 9CA416362A887C5E77244D87322C8E8490CEA289B5BB36B817565630E1B9EA1E66C4F6AB8A08B2A31B072ABD2A499863
24,435,584 UART: persistent_rt::test_persistent_data_layout...[ok]
24,437,873 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,486 UART:
192,852 UART: Running Caliptra ROM ...
193,990 UART:
603,743 UART: [state] CFI Enabled
619,246 UART: [state] LifecycleState = Unprovisioned
621,620 UART: [state] DebugLocked = No
624,432 UART: [state] WD Timer not started. Device not locked for debugging
629,925 UART: [kat] SHA2-256
819,798 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,613 UART: [kat] ++
831,223 UART: [kat] sha1
843,032 UART: [kat] SHA2-256
846,113 UART: [kat] SHA2-384
852,820 UART: [kat] SHA2-512-ACC
855,406 UART: [kat] ECC-384
3,297,726 UART: [kat] HMAC-384Kdf
3,311,392 UART: [kat] LMS
3,843,231 UART: [kat] --
3,847,728 UART: [cold-reset] ++
3,848,815 UART: [fht] FHT @ 0x50003400
3,860,094 UART: [idev] ++
3,860,776 UART: [idev] CDI.KEYID = 6
3,861,698 UART: [idev] SUBJECT.KEYID = 7
3,862,898 UART: [idev] UDS.KEYID = 0
3,863,837 ready_for_fw is high
3,864,034 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
3,908,273 UART: [idev] Erasing UDS.KEYID = 0
6,344,667 UART: [idev] Sha1 KeyId Algorithm
6,367,140 UART: [idev] --
6,371,140 UART: [ldev] ++
6,371,880 UART: [ldev] CDI.KEYID = 6
6,372,794 UART: [ldev] SUBJECT.KEYID = 5
6,373,957 UART: [ldev] AUTHORITY.KEYID = 7
6,375,134 UART: [ldev] FE.KEYID = 1
6,384,759 UART: [ldev] Erasing FE.KEYID = 1
8,860,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,368 UART: [ldev] --
10,651,691 UART: [fwproc] Wait for Commands...
10,654,325 UART: [fwproc] Recv command 0x46574c44
10,656,638 UART: [fwproc] Recv'd Img size: 35124 bytes
13,123,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,197,247 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,320,870 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
13,380,187 >>> mbox cmd response: success
13,384,043 UART: [afmc] ++
13,384,694 UART: [afmc] CDI.KEYID = 6
13,385,888 UART: [afmc] SUBJECT.KEYID = 7
13,387,405 UART: [afmc] AUTHORITY.KEYID = 5
15,890,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,610,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,612,083 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,627,259 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,642,383 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,657,271 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,679,767 UART: [afmc] --
17,682,929 UART: [cold-reset] --
17,686,761 UART: [state] Locking Datavault
17,693,860 UART: [state] Locking PCR0, PCR1 and PCR31
17,696,065 UART: [state] Locking ICCM
17,697,788 UART: [exit] Launching FMC @ 0x40000130
17,706,480 UART:
17,706,735 UART: Running Caliptra FMC ...
17,707,875 UART:
17,708,040 UART: [state] CFI Enabled
17,715,898 UART: [fht] FMC Alias Private Key: 7
19,482,421 UART: [art] Extend RT PCRs Done
19,483,657 UART: [art] Lock RT PCRs Done
19,485,014 UART: [art] Populate DV Done
19,490,330 UART: [fht] FMC Alias Private Key: 7
19,491,999 UART: [art] Derive CDI
19,492,851 UART: [art] Store in slot 0x4
19,535,646 UART: [art] Derive Key Pair
19,536,682 UART: [art] Store priv key in slot 0x5
21,963,875 UART: [art] Derive Key Pair - Done
21,976,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,683,115 UART: [art] Erasing AUTHORITY.KEYID = 7
23,684,667 UART: [art] PUB.X = 4AD92A742AC86DF63773F83EAB965C8FA9374040D8AF12CD2A23BC7D280C847F6A1FC40977A0A16EBBFB4D87205CD5FF
23,691,900 UART: [art] PUB.Y = 1B0707405C0B2ECFB9CA186BBC06D032E4C67B7DF2404B7985A337E1A3F04849332630290A6B995B13FD53F7CABFD7D3
23,699,160 UART: [art] SIG.R = 8E924DD1513567C479C29CF6F3432064592EF57DD260ACE21FF6CD72F8B023ED92505D7AF708312ED681775F9FA00A55
23,706,599 UART: [art] SIG.S = F5B65F4E4101727414889B799AE05C00C52D37C9DA07AB6D7E094CC93B5D519207B87DB06388F149503362FA3473556B
24,685,286 UART: persistent_rt::test_persistent_data_layout...[ok]
24,687,560 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
3,753,242 ready_for_fw is high
3,753,645 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
13,251,422 >>> mbox cmd response: success
17,506,391 UART:
17,506,830 UART: Running Caliptra FMC ...
17,508,000 UART:
17,508,180 UART: [state] CFI Enabled
17,516,387 UART: [fht] FMC Alias Private Key: 7
19,282,267 UART: [art] Extend RT PCRs Done
19,283,611 UART: [art] Lock RT PCRs Done
19,285,141 UART: [art] Populate DV Done
19,290,545 UART: [fht] FMC Alias Private Key: 7
19,292,150 UART: [art] Derive CDI
19,292,937 UART: [art] Store in slot 0x4
19,335,533 UART: [art] Derive Key Pair
19,336,585 UART: [art] Store priv key in slot 0x5
21,762,523 UART: [art] Derive Key Pair - Done
21,775,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,481,692 UART: [art] Erasing AUTHORITY.KEYID = 7
23,483,263 UART: [art] PUB.X = F8E0E19ADBD273AC1B47F21B8FD3F4F2BA702C1C129EA3DB8CA7CEBBA3BE22CBD4B39F2442BFCB08F46E9D1E0126A87D
23,490,499 UART: [art] PUB.Y = 83E60994BBF6159F21AE85C9783B40A1135AEA9B8DA7007ED2CDE01407156A51223CD05AB0D1971597861C4702551821
23,497,761 UART: [art] SIG.R = 0DE16C3B5D70EEEAEA04BC0E4F3C6B89054E7F49648EE37F32BBDEA5450CC72DEBF240960B3978610259A58695F73B76
23,505,203 UART: [art] SIG.S = B00C4B74E69788D752BC086B9CFC431999CC2047A84EF85128B2DAAD58177FF06792A6937EF9BC0B3C888C70A08DFEC8
24,483,323 UART: persistent_rt::test_persistent_data_layout...[ok]
24,485,576 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,705 UART: [kat] SHA2-256
881,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,751 UART: [kat] ++
885,903 UART: [kat] sha1
890,363 UART: [kat] SHA2-256
892,301 UART: [kat] SHA2-384
895,176 UART: [kat] SHA2-512-ACC
897,077 UART: [kat] ECC-384
903,108 UART: [kat] HMAC-384Kdf
907,770 UART: [kat] LMS
1,475,966 UART: [kat] --
1,476,759 UART: [cold-reset] ++
1,477,121 UART: [fht] Storing FHT @ 0x50003400
1,479,780 UART: [idev] ++
1,479,948 UART: [idev] CDI.KEYID = 6
1,480,308 UART: [idev] SUBJECT.KEYID = 7
1,480,732 UART: [idev] UDS.KEYID = 0
1,481,077 ready_for_fw is high
1,481,077 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,488,450 UART: [idev] Erasing UDS.KEYID = 0
1,505,090 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,758 UART: [idev] --
1,514,821 UART: [ldev] ++
1,514,989 UART: [ldev] CDI.KEYID = 6
1,515,352 UART: [ldev] SUBJECT.KEYID = 5
1,515,778 UART: [ldev] AUTHORITY.KEYID = 7
1,516,241 UART: [ldev] FE.KEYID = 1
1,521,387 UART: [ldev] Erasing FE.KEYID = 1
1,546,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,434 UART: [ldev] --
1,585,831 UART: [fwproc] Waiting for Commands...
1,586,502 UART: [fwproc] Received command 0x46574c44
1,587,293 UART: [fwproc] Received Image of size 35124 bytes
1,975,843 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,003,527 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,034,745 UART: [fwproc] Loading Runtime at address 0x40005000 len 9196
2,049,988 >>> mbox cmd response: success
2,051,030 UART: [afmc] ++
2,051,198 UART: [afmc] CDI.KEYID = 6
2,051,560 UART: [afmc] SUBJECT.KEYID = 7
2,051,985 UART: [afmc] AUTHORITY.KEYID = 5
2,087,474 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,103,408 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,104,188 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,109,897 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,115,780 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,121,463 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,129,411 UART: [afmc] --
2,130,389 UART: [cold-reset] --
2,131,071 UART: [state] Locking Datavault
2,132,288 UART: [state] Locking PCR0, PCR1 and PCR31
2,132,892 UART: [state] Locking ICCM
2,133,452 UART: [exit] Launching FMC @ 0x40000130
2,138,782 UART:
2,138,798 UART: Running Caliptra FMC ...
2,139,206 UART:
2,139,260 UART: [state] CFI Enabled
2,149,998 UART: [fht] FMC Alias Private Key: 7
2,268,278 UART: [art] Extend RT PCRs Done
2,268,706 UART: [art] Lock RT PCRs Done
2,270,300 UART: [art] Populate DV Done
2,278,511 UART: [fht] FMC Alias Private Key: 7
2,279,633 UART: [art] Derive CDI
2,279,913 UART: [art] Store in slot 0x4
2,365,627 UART: [art] Derive Key Pair
2,365,987 UART: [art] Store priv key in slot 0x5
2,379,682 UART: [art] Derive Key Pair - Done
2,394,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,409,716 UART: [art] Erasing AUTHORITY.KEYID = 7
2,410,481 UART: [art] PUB.X = 57E020B232443E775C603150C7A6099671756DCC3123343D5E8385F69A7178418D2F3BFFA81AFC9E97CE2DD865156C36
2,417,242 UART: [art] PUB.Y = E314040FEF8D9F1E46872C1BCD63E4C2BB33C224A3ED1E53C9CEA21F5544B16D6342CEA4747D0B0F7FC8F2195E43CBD1
2,424,198 UART: [art] SIG.R = F9BE58DA73A89686B1C806C6CBB92199AEECC35429A4E817832CAEBC847D0446C3B30B557BDBCDF26227403148D730E7
2,430,969 UART: [art] SIG.S = 7DEBD69A1913D119B18AD47E79C5745D05FD66BEBC8ECD0018BFADE989351D9C10591FDAC1BDDF4E694FB51BD2FC69E9
2,454,507 UART: persistent_rt::test_persistent_data_layout...[ok]
2,455,750 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,409 ready_for_fw is high
1,362,409 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,899,276 >>> mbox cmd response: success
1,960,913 UART:
1,960,929 UART: Running Caliptra FMC ...
1,961,337 UART:
1,961,391 UART: [state] CFI Enabled
1,971,431 UART: [fht] FMC Alias Private Key: 7
2,090,711 UART: [art] Extend RT PCRs Done
2,091,139 UART: [art] Lock RT PCRs Done
2,092,965 UART: [art] Populate DV Done
2,101,404 UART: [fht] FMC Alias Private Key: 7
2,102,526 UART: [art] Derive CDI
2,102,806 UART: [art] Store in slot 0x4
2,188,482 UART: [art] Derive Key Pair
2,188,842 UART: [art] Store priv key in slot 0x5
2,201,741 UART: [art] Derive Key Pair - Done
2,216,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,232,149 UART: [art] Erasing AUTHORITY.KEYID = 7
2,232,914 UART: [art] PUB.X = 286C05B1E26FFC0784E2D66F5D7C7B51E26E2758C353C7450C8DFB0CD2E9C4FC859137B5B624F45036F42A51679DE4B5
2,239,678 UART: [art] PUB.Y = A2BAE5FD934924BF5F5D268C6EFA161667350FAD9A4CC0ECA64228E760430F2DE3BB9CEBDE309C5405108D9531ED9844
2,246,633 UART: [art] SIG.R = 23AFA750E1F73F8396844909112F4782B7BE017CCBBA426BF8E32A8F767B26CB853F9EA567DB3466D971265509868BCD
2,253,396 UART: [art] SIG.S = 0528CEA489EA2B34C4C79F90C12755546F449D273B0C68D07EA85C2E28506AA1BFAF2AD3DC9CA5D0E0F4A4FEC958AFB0
2,277,183 UART: persistent_rt::test_persistent_data_layout...[ok]
2,278,426 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,290 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,000 UART: [kat] SHA2-256
881,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,046 UART: [kat] ++
886,198 UART: [kat] sha1
890,370 UART: [kat] SHA2-256
892,308 UART: [kat] SHA2-384
894,881 UART: [kat] SHA2-512-ACC
896,782 UART: [kat] ECC-384
902,363 UART: [kat] HMAC-384Kdf
906,915 UART: [kat] LMS
1,475,111 UART: [kat] --
1,476,216 UART: [cold-reset] ++
1,476,696 UART: [fht] Storing FHT @ 0x50003400
1,479,549 UART: [idev] ++
1,479,717 UART: [idev] CDI.KEYID = 6
1,480,077 UART: [idev] SUBJECT.KEYID = 7
1,480,501 UART: [idev] UDS.KEYID = 0
1,480,846 ready_for_fw is high
1,480,846 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,488,515 UART: [idev] Erasing UDS.KEYID = 0
1,505,231 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,803 UART: [idev] --
1,514,638 UART: [ldev] ++
1,514,806 UART: [ldev] CDI.KEYID = 6
1,515,169 UART: [ldev] SUBJECT.KEYID = 5
1,515,595 UART: [ldev] AUTHORITY.KEYID = 7
1,516,058 UART: [ldev] FE.KEYID = 1
1,521,152 UART: [ldev] Erasing FE.KEYID = 1
1,546,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,569 UART: [ldev] --
1,585,878 UART: [fwproc] Waiting for Commands...
1,586,635 UART: [fwproc] Received command 0x46574c44
1,587,426 UART: [fwproc] Received Image of size 35124 bytes
1,976,804 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,005,382 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,036,600 UART: [fwproc] Loading Runtime at address 0x40005000 len 9196
2,051,705 >>> mbox cmd response: success
2,052,715 UART: [afmc] ++
2,052,883 UART: [afmc] CDI.KEYID = 6
2,053,245 UART: [afmc] SUBJECT.KEYID = 7
2,053,670 UART: [afmc] AUTHORITY.KEYID = 5
2,088,827 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,105,089 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,105,869 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,111,578 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,117,461 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,123,144 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,130,794 UART: [afmc] --
2,131,784 UART: [cold-reset] --
2,132,742 UART: [state] Locking Datavault
2,133,731 UART: [state] Locking PCR0, PCR1 and PCR31
2,134,335 UART: [state] Locking ICCM
2,134,939 UART: [exit] Launching FMC @ 0x40000130
2,140,269 UART:
2,140,285 UART: Running Caliptra FMC ...
2,140,693 UART:
2,140,836 UART: [state] CFI Enabled
2,151,678 UART: [fht] FMC Alias Private Key: 7
2,270,846 UART: [art] Extend RT PCRs Done
2,271,274 UART: [art] Lock RT PCRs Done
2,273,050 UART: [art] Populate DV Done
2,281,181 UART: [fht] FMC Alias Private Key: 7
2,282,331 UART: [art] Derive CDI
2,282,611 UART: [art] Store in slot 0x4
2,367,977 UART: [art] Derive Key Pair
2,368,337 UART: [art] Store priv key in slot 0x5
2,381,502 UART: [art] Derive Key Pair - Done
2,396,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,411,588 UART: [art] Erasing AUTHORITY.KEYID = 7
2,412,353 UART: [art] PUB.X = 67095DF14911D26F3A40B006183D68C1D9BD71223109130C7E6A3B9B7E038E4A03E6C07AF28968090E940E17076C2D0B
2,419,084 UART: [art] PUB.Y = CC7D4ACFAD01D42C5467AFDA438ACEBE3021EA78767B5E455443689A23A1380AD047F90BDA16D246D5F92F236D3FCFD0
2,426,043 UART: [art] SIG.R = D19F355803A753E9D21551961A9F5A200F7AD103BFFE88408545079F842C9CD21ADDFEC447F5766D0D61C42086199F62
2,432,796 UART: [art] SIG.S = 0E5205C7475DC91F89A31485029F692BFC63ACA05A2541F2CC78543CBAD4E0F6550A148F1027C717BCD8ED3FA18CE06C
2,456,809 UART: persistent_rt::test_persistent_data_layout...[ok]
2,458,052 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,340 ready_for_fw is high
1,363,340 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,900,417 >>> mbox cmd response: success
1,962,452 UART:
1,962,468 UART: Running Caliptra FMC ...
1,962,876 UART:
1,963,019 UART: [state] CFI Enabled
1,973,675 UART: [fht] FMC Alias Private Key: 7
2,092,769 UART: [art] Extend RT PCRs Done
2,093,197 UART: [art] Lock RT PCRs Done
2,094,633 UART: [art] Populate DV Done
2,103,050 UART: [fht] FMC Alias Private Key: 7
2,104,122 UART: [art] Derive CDI
2,104,402 UART: [art] Store in slot 0x4
2,189,646 UART: [art] Derive Key Pair
2,190,006 UART: [art] Store priv key in slot 0x5
2,203,551 UART: [art] Derive Key Pair - Done
2,217,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,233,492 UART: [art] Erasing AUTHORITY.KEYID = 7
2,234,257 UART: [art] PUB.X = 8E01B616B8B96779B8721221AC82D9615B179B096C322CF993F0BD6ABF25E9468407935B6CE65A1AADADDC335BA235B2
2,241,024 UART: [art] PUB.Y = 96261E2DBA80225F02E6E2FB227033055591F122CD0A074F2E0A090733A42AC0872CE6CF16F9885D37755899029477A1
2,247,940 UART: [art] SIG.R = C7A442D52439AF04EF9E6A4BA9995ECFAC1BD8A7F19A23BDFD4D9B64F0DD1040E5F9F7A0117D44F4E8DFEBC220E9AEAD
2,254,739 UART: [art] SIG.S = 391916609A23EF844DFB94B741AE9BB4B75672D66CC84058849E7254CB851CCFA0CBF80944C594DA342384ECCD31BB36
2,279,047 UART: persistent_rt::test_persistent_data_layout...[ok]
2,280,290 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,711 UART: [kat] SHA2-512-ACC
906,612 UART: [kat] ECC-384
916,301 UART: [kat] HMAC-384Kdf
920,821 UART: [kat] LMS
1,169,133 UART: [kat] --
1,170,028 UART: [cold-reset] ++
1,170,378 UART: [fht] FHT @ 0x50003400
1,173,046 UART: [idev] ++
1,173,214 UART: [idev] CDI.KEYID = 6
1,173,575 UART: [idev] SUBJECT.KEYID = 7
1,174,000 UART: [idev] UDS.KEYID = 0
1,174,346 ready_for_fw is high
1,174,346 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,181,673 UART: [idev] Erasing UDS.KEYID = 0
1,198,747 UART: [idev] Sha1 KeyId Algorithm
1,207,651 UART: [idev] --
1,208,804 UART: [ldev] ++
1,208,972 UART: [ldev] CDI.KEYID = 6
1,209,336 UART: [ldev] SUBJECT.KEYID = 5
1,209,763 UART: [ldev] AUTHORITY.KEYID = 7
1,210,226 UART: [ldev] FE.KEYID = 1
1,215,372 UART: [ldev] Erasing FE.KEYID = 1
1,241,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,120 UART: [ldev] --
1,281,379 UART: [fwproc] Wait for Commands...
1,281,952 UART: [fwproc] Recv command 0x46574c44
1,282,685 UART: [fwproc] Recv'd Img size: 35124 bytes
1,671,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,049 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,730,224 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
1,745,345 >>> mbox cmd response: success
1,746,425 UART: [afmc] ++
1,746,593 UART: [afmc] CDI.KEYID = 6
1,746,956 UART: [afmc] SUBJECT.KEYID = 7
1,747,382 UART: [afmc] AUTHORITY.KEYID = 5
1,782,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,799,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,799,973 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,683 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,811,564 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,817,265 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,825,208 UART: [afmc] --
1,826,263 UART: [cold-reset] --
1,827,169 UART: [state] Locking Datavault
1,828,520 UART: [state] Locking PCR0, PCR1 and PCR31
1,829,124 UART: [state] Locking ICCM
1,829,712 UART: [exit] Launching FMC @ 0x40000130
1,835,042 UART:
1,835,058 UART: Running Caliptra FMC ...
1,835,466 UART:
1,835,520 UART: [state] CFI Enabled
1,846,106 UART: [fht] FMC Alias Private Key: 7
1,964,628 UART: [art] Extend RT PCRs Done
1,965,056 UART: [art] Lock RT PCRs Done
1,966,484 UART: [art] Populate DV Done
1,974,727 UART: [fht] FMC Alias Private Key: 7
1,975,867 UART: [art] Derive CDI
1,976,147 UART: [art] Store in slot 0x4
2,062,084 UART: [art] Derive Key Pair
2,062,444 UART: [art] Store priv key in slot 0x5
2,075,382 UART: [art] Derive Key Pair - Done
2,090,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,105,605 UART: [art] Erasing AUTHORITY.KEYID = 7
2,106,370 UART: [art] PUB.X = 7448BA922CC6C645B287EB1422790910F9F303D9FE979E3885916F5B00B72B5E2BD1185F07C6E0C8F644329840369DCC
2,113,105 UART: [art] PUB.Y = 4E773E3E3CE5C1A348A52216DC0FC0A6F49B7D8F6E0B5B6050DE87EFD0C62CD225F39862E990BE08DF56BFBC882BB58F
2,120,066 UART: [art] SIG.R = E26CE1F60BDD9CF84CB3DAB819591BA4DD4EE99F0253CD949D42DF97E08123DFF41B0560AEA306CBC2263BD47911992B
2,126,842 UART: [art] SIG.S = C76116DE96FDD5C91D8A5948C82D6E74277F43CE25040DDAC2179C1605CFF44EEC89925CEE32126FA65D139C3ED41B10
2,150,126 UART: persistent_rt::test_persistent_data_layout...[ok]
2,151,369 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,344 ready_for_fw is high
1,059,344 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,597,074 >>> mbox cmd response: success
1,659,965 UART:
1,659,981 UART: Running Caliptra FMC ...
1,660,389 UART:
1,660,443 UART: [state] CFI Enabled
1,670,735 UART: [fht] FMC Alias Private Key: 7
1,789,547 UART: [art] Extend RT PCRs Done
1,789,975 UART: [art] Lock RT PCRs Done
1,791,497 UART: [art] Populate DV Done
1,799,712 UART: [fht] FMC Alias Private Key: 7
1,800,846 UART: [art] Derive CDI
1,801,126 UART: [art] Store in slot 0x4
1,886,731 UART: [art] Derive Key Pair
1,887,091 UART: [art] Store priv key in slot 0x5
1,901,123 UART: [art] Derive Key Pair - Done
1,915,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,930,835 UART: [art] Erasing AUTHORITY.KEYID = 7
1,931,600 UART: [art] PUB.X = 5EC7D191B248FDB4CAD8D6ADA1B09835B78B486A6F885BCCDB5F1C31CC8012B7BC70FD9C2E89E16015449BBB50BB7B4B
1,938,394 UART: [art] PUB.Y = 639FE96E1A53DB03F05C19EAA961086DF968CB81608E7BE4832A6867499EDC65234F9F838D94C37DEF3C1E9C6396DB71
1,945,344 UART: [art] SIG.R = 0881C124A6AF2AA52D0BA175A4A55B4264E379768EFE9E10B8DA71B2D87D35B96C18AB26AB6FA27FCF92347030D90523
1,952,113 UART: [art] SIG.S = 20742681A63650F55D4B94525DA2C5FD77D4CF0B3E4BBE637C1971F661C909F67762BACE5848FFBC623EB6497CC1CEF4
1,975,946 UART: persistent_rt::test_persistent_data_layout...[ok]
1,977,189 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,033 UART: [kat] SHA2-256
891,583 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,687 UART: [kat] ++
895,839 UART: [kat] sha1
900,285 UART: [kat] SHA2-256
902,225 UART: [kat] SHA2-384
904,942 UART: [kat] SHA2-512-ACC
906,843 UART: [kat] ECC-384
916,942 UART: [kat] HMAC-384Kdf
921,564 UART: [kat] LMS
1,169,876 UART: [kat] --
1,170,709 UART: [cold-reset] ++
1,171,267 UART: [fht] FHT @ 0x50003400
1,173,825 UART: [idev] ++
1,173,993 UART: [idev] CDI.KEYID = 6
1,174,354 UART: [idev] SUBJECT.KEYID = 7
1,174,779 UART: [idev] UDS.KEYID = 0
1,175,125 ready_for_fw is high
1,175,125 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,183,122 UART: [idev] Erasing UDS.KEYID = 0
1,200,220 UART: [idev] Sha1 KeyId Algorithm
1,209,076 UART: [idev] --
1,209,959 UART: [ldev] ++
1,210,127 UART: [ldev] CDI.KEYID = 6
1,210,491 UART: [ldev] SUBJECT.KEYID = 5
1,210,918 UART: [ldev] AUTHORITY.KEYID = 7
1,211,381 UART: [ldev] FE.KEYID = 1
1,216,769 UART: [ldev] Erasing FE.KEYID = 1
1,242,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,987 UART: [ldev] --
1,282,414 UART: [fwproc] Wait for Commands...
1,283,135 UART: [fwproc] Recv command 0x46574c44
1,283,868 UART: [fwproc] Recv'd Img size: 35124 bytes
1,672,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,790 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,730,965 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
1,745,996 >>> mbox cmd response: success
1,747,256 UART: [afmc] ++
1,747,424 UART: [afmc] CDI.KEYID = 6
1,747,787 UART: [afmc] SUBJECT.KEYID = 7
1,748,213 UART: [afmc] AUTHORITY.KEYID = 5
1,783,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,799,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,800,206 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,916 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,811,797 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,817,498 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,825,291 UART: [afmc] --
1,826,236 UART: [cold-reset] --
1,826,884 UART: [state] Locking Datavault
1,828,095 UART: [state] Locking PCR0, PCR1 and PCR31
1,828,699 UART: [state] Locking ICCM
1,829,183 UART: [exit] Launching FMC @ 0x40000130
1,834,513 UART:
1,834,529 UART: Running Caliptra FMC ...
1,834,937 UART:
1,835,080 UART: [state] CFI Enabled
1,845,618 UART: [fht] FMC Alias Private Key: 7
1,963,928 UART: [art] Extend RT PCRs Done
1,964,356 UART: [art] Lock RT PCRs Done
1,966,034 UART: [art] Populate DV Done
1,974,255 UART: [fht] FMC Alias Private Key: 7
1,975,425 UART: [art] Derive CDI
1,975,705 UART: [art] Store in slot 0x4
2,061,508 UART: [art] Derive Key Pair
2,061,868 UART: [art] Store priv key in slot 0x5
2,074,776 UART: [art] Derive Key Pair - Done
2,089,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,104,933 UART: [art] Erasing AUTHORITY.KEYID = 7
2,105,698 UART: [art] PUB.X = A0B56A0D0FF9DBE716811C9DB63D942EC9C2E98638240831D0942D28229EDBB98E9DABDE4440C9B207C5F59547C6E8B0
2,112,466 UART: [art] PUB.Y = C562EEEAEDE3C084823D8164BDBEF5917BD15695BFF8E40F17D961F658372D276B14A846A1CB0F15BD642C1813B7FF34
2,119,422 UART: [art] SIG.R = 2F15E4724693B4E8D4FA1D258A4BC44A01349134D45C5A85BA1ECE0C7DE60A17D8099D7BA120286F89DD0AA631F2EF1B
2,126,189 UART: [art] SIG.S = 103BCFF432FDC1CA299B54EE275B60672ECDAB9694A9AA7F67BA59D572B83FFC0ED313414EA5BDBEB48CE2F393CA161B
2,150,245 UART: persistent_rt::test_persistent_data_layout...[ok]
2,151,488 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,085 ready_for_fw is high
1,060,085 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,598,545 >>> mbox cmd response: success
1,660,152 UART:
1,660,168 UART: Running Caliptra FMC ...
1,660,576 UART:
1,660,719 UART: [state] CFI Enabled
1,671,537 UART: [fht] FMC Alias Private Key: 7
1,790,707 UART: [art] Extend RT PCRs Done
1,791,135 UART: [art] Lock RT PCRs Done
1,792,707 UART: [art] Populate DV Done
1,800,994 UART: [fht] FMC Alias Private Key: 7
1,801,980 UART: [art] Derive CDI
1,802,260 UART: [art] Store in slot 0x4
1,888,451 UART: [art] Derive Key Pair
1,888,811 UART: [art] Store priv key in slot 0x5
1,902,377 UART: [art] Derive Key Pair - Done
1,917,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,932,387 UART: [art] Erasing AUTHORITY.KEYID = 7
1,933,152 UART: [art] PUB.X = 1AD2A2996A00D38171ACDF2A6E74D50F736B4B431EE3CC931A45F3E529F01E5F2AF6DC0D1B958566041E62236B850A87
1,939,894 UART: [art] PUB.Y = 68C76EAE996EBEBD07233673641C39F2B54E4FADFE2D2B03AC765648639B1C14899323A84F7E6C93118E43D92A192FBC
1,946,844 UART: [art] SIG.R = AB1A626D26B0B17AD923495EAE60260CB7A76217A9216E52B9D99E407B002369FC55939E29CF0565C413BC226564F1BE
1,953,586 UART: [art] SIG.S = AA4EB1FDB56044044C9EF0CDA83DF5C016B36D2D883B70ABD8A2DF3976CF3E9150D5523AF3A344328E4D3471EA5E4720
1,977,818 UART: persistent_rt::test_persistent_data_layout...[ok]
1,979,061 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
893,032 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,157 UART: [kat] ++
897,309 UART: [kat] sha1
901,741 UART: [kat] SHA2-256
903,681 UART: [kat] SHA2-384
906,506 UART: [kat] SHA2-512-ACC
908,407 UART: [kat] ECC-384
917,970 UART: [kat] HMAC-384Kdf
922,490 UART: [kat] LMS
1,170,818 UART: [kat] --
1,171,669 UART: [cold-reset] ++
1,172,089 UART: [fht] FHT @ 0x50003400
1,174,748 UART: [idev] ++
1,174,916 UART: [idev] CDI.KEYID = 6
1,175,276 UART: [idev] SUBJECT.KEYID = 7
1,175,700 UART: [idev] UDS.KEYID = 0
1,176,045 ready_for_fw is high
1,176,045 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,183,924 UART: [idev] Erasing UDS.KEYID = 0
1,200,601 UART: [idev] Sha1 KeyId Algorithm
1,209,031 UART: [idev] --
1,209,935 UART: [ldev] ++
1,210,103 UART: [ldev] CDI.KEYID = 6
1,210,466 UART: [ldev] SUBJECT.KEYID = 5
1,210,892 UART: [ldev] AUTHORITY.KEYID = 7
1,211,355 UART: [ldev] FE.KEYID = 1
1,216,459 UART: [ldev] Erasing FE.KEYID = 1
1,242,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,453 UART: [ldev] --
1,281,942 UART: [fwproc] Wait for Commands...
1,282,566 UART: [fwproc] Recv command 0x46574c44
1,283,294 UART: [fwproc] Recv'd Img size: 35124 bytes
1,671,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,698,406 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,729,576 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
1,744,773 >>> mbox cmd response: success
1,745,807 UART: [afmc] ++
1,745,975 UART: [afmc] CDI.KEYID = 6
1,746,337 UART: [afmc] SUBJECT.KEYID = 7
1,746,762 UART: [afmc] AUTHORITY.KEYID = 5
1,782,057 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,798,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,799,066 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,804,775 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,810,658 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,816,359 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,824,191 UART: [afmc] --
1,825,167 UART: [cold-reset] --
1,825,847 UART: [state] Locking Datavault
1,826,976 UART: [state] Locking PCR0, PCR1 and PCR31
1,827,580 UART: [state] Locking ICCM
1,828,230 UART: [exit] Launching FMC @ 0x40000130
1,833,560 UART:
1,833,576 UART: Running Caliptra FMC ...
1,833,984 UART:
1,834,038 UART: [state] CFI Enabled
1,844,564 UART: [fht] FMC Alias Private Key: 7
1,964,306 UART: [art] Extend RT PCRs Done
1,964,734 UART: [art] Lock RT PCRs Done
1,966,390 UART: [art] Populate DV Done
1,974,693 UART: [fht] FMC Alias Private Key: 7
1,975,637 UART: [art] Derive CDI
1,975,917 UART: [art] Store in slot 0x4
2,061,226 UART: [art] Derive Key Pair
2,061,586 UART: [art] Store priv key in slot 0x5
2,075,172 UART: [art] Derive Key Pair - Done
2,089,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,105,238 UART: [art] Erasing AUTHORITY.KEYID = 7
2,106,003 UART: [art] PUB.X = D5C3EC15CF918AEF06753030CE5EB1B1517DCAD54DADC757A0AA59D990BBD2CA74C41DC8D9F41B139C1378D8DBAFB977
2,112,796 UART: [art] PUB.Y = 7AE1CB8B3EA292A554154C790088CCE15FB2FEBD98B3B9EAFA9FE9DC4F840D9F2AACA32948FBD865941E875911482265
2,119,737 UART: [art] SIG.R = B6D9CBC5F2FA1B305533EF691739D8804BF58D469837CD7694D49A5C76F5748919DE611BDCAA616B18BF501B908439D5
2,126,511 UART: [art] SIG.S = 33C073E5E04782E8E881B21DFC43CB1A82EFC683C207D8860B9397E2DF3318F2A7E0448A3D1730660D682498B9A21F21
2,150,759 UART: persistent_rt::test_persistent_data_layout...[ok]
2,152,002 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,991 ready_for_fw is high
1,059,991 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,597,596 >>> mbox cmd response: success
1,659,937 UART:
1,659,953 UART: Running Caliptra FMC ...
1,660,361 UART:
1,660,415 UART: [state] CFI Enabled
1,670,933 UART: [fht] FMC Alias Private Key: 7
1,790,205 UART: [art] Extend RT PCRs Done
1,790,633 UART: [art] Lock RT PCRs Done
1,792,323 UART: [art] Populate DV Done
1,800,800 UART: [fht] FMC Alias Private Key: 7
1,801,892 UART: [art] Derive CDI
1,802,172 UART: [art] Store in slot 0x4
1,887,515 UART: [art] Derive Key Pair
1,887,875 UART: [art] Store priv key in slot 0x5
1,901,655 UART: [art] Derive Key Pair - Done
1,916,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,931,677 UART: [art] Erasing AUTHORITY.KEYID = 7
1,932,442 UART: [art] PUB.X = 2A2E18F55E43305E2B29F7FA75955988899ACE83F64F230B1541E5FF07B6223C0FA3FB6637AA642D92C8B7D18620F55A
1,939,205 UART: [art] PUB.Y = FA7263E67CE7B0DAEA0AD1EB7A870F858FB94206F22BE4A48C00A1190B0108133ED33FCAD17F988EA9D8B6BADE1431E0
1,946,135 UART: [art] SIG.R = 4220052766DA5F4C61C0122C79CE17EFFD7462064E46F11FEBAF39B3F5B6601AB4355468A12526674AF79DE913AFD7E6
1,952,903 UART: [art] SIG.S = 1B15AB442CF2C3EB9FDCF1FB6E339A5E8F4EC82013F6B1D183803BE28E1590B043840899D1A8D792C83AC7FB71994101
1,976,344 UART: persistent_rt::test_persistent_data_layout...[ok]
1,977,587 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
893,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,936 UART: [kat] ++
898,088 UART: [kat] sha1
902,368 UART: [kat] SHA2-256
904,308 UART: [kat] SHA2-384
907,077 UART: [kat] SHA2-512-ACC
908,978 UART: [kat] ECC-384
918,619 UART: [kat] HMAC-384Kdf
923,427 UART: [kat] LMS
1,171,755 UART: [kat] --
1,172,690 UART: [cold-reset] ++
1,173,170 UART: [fht] FHT @ 0x50003400
1,175,967 UART: [idev] ++
1,176,135 UART: [idev] CDI.KEYID = 6
1,176,495 UART: [idev] SUBJECT.KEYID = 7
1,176,919 UART: [idev] UDS.KEYID = 0
1,177,264 ready_for_fw is high
1,177,264 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,184,585 UART: [idev] Erasing UDS.KEYID = 0
1,201,820 UART: [idev] Sha1 KeyId Algorithm
1,210,130 UART: [idev] --
1,211,240 UART: [ldev] ++
1,211,408 UART: [ldev] CDI.KEYID = 6
1,211,771 UART: [ldev] SUBJECT.KEYID = 5
1,212,197 UART: [ldev] AUTHORITY.KEYID = 7
1,212,660 UART: [ldev] FE.KEYID = 1
1,217,862 UART: [ldev] Erasing FE.KEYID = 1
1,243,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,810 UART: [ldev] --
1,283,243 UART: [fwproc] Wait for Commands...
1,283,839 UART: [fwproc] Recv command 0x46574c44
1,284,567 UART: [fwproc] Recv'd Img size: 35124 bytes
1,673,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,700,981 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,732,151 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
1,747,188 >>> mbox cmd response: success
1,748,204 UART: [afmc] ++
1,748,372 UART: [afmc] CDI.KEYID = 6
1,748,734 UART: [afmc] SUBJECT.KEYID = 7
1,749,159 UART: [afmc] AUTHORITY.KEYID = 5
1,784,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,801,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,802,121 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,807,830 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,813,713 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,819,414 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,827,446 UART: [afmc] --
1,828,472 UART: [cold-reset] --
1,829,504 UART: [state] Locking Datavault
1,830,601 UART: [state] Locking PCR0, PCR1 and PCR31
1,831,205 UART: [state] Locking ICCM
1,831,837 UART: [exit] Launching FMC @ 0x40000130
1,837,167 UART:
1,837,183 UART: Running Caliptra FMC ...
1,837,591 UART:
1,837,734 UART: [state] CFI Enabled
1,848,496 UART: [fht] FMC Alias Private Key: 7
1,967,652 UART: [art] Extend RT PCRs Done
1,968,080 UART: [art] Lock RT PCRs Done
1,969,312 UART: [art] Populate DV Done
1,977,697 UART: [fht] FMC Alias Private Key: 7
1,978,635 UART: [art] Derive CDI
1,978,915 UART: [art] Store in slot 0x4
2,064,606 UART: [art] Derive Key Pair
2,064,966 UART: [art] Store priv key in slot 0x5
2,078,572 UART: [art] Derive Key Pair - Done
2,093,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,108,798 UART: [art] Erasing AUTHORITY.KEYID = 7
2,109,563 UART: [art] PUB.X = DDE5F40B72BC80AC2C4C5CC1303FAD4C970CDFFAACAEC67B79D841C7472A73EC4D296676367D38C3DF5184F6A292E72F
2,116,349 UART: [art] PUB.Y = B9B6F14B8A3A3EB1B5E29DD5FE7E265E8C597F62E26D58974ABA1728D056F4802C627DEAFD7693FBC76B472CAEF01115
2,123,315 UART: [art] SIG.R = E35532DDA7F88763C8B32B4695A714DF14F53543DEDAB55DF74B028023AFFF1CD487C6FC37617E2B4EC841A18DD83500
2,130,070 UART: [art] SIG.S = 51313057D8A5713531387BF2623155A607872AE27E1C1E8C1E125BE3E9F834C09BDA299E59C44084DE6C68E3C6C4D5B4
2,153,400 UART: persistent_rt::test_persistent_data_layout...[ok]
2,154,643 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,834 ready_for_fw is high
1,060,834 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,599,529 >>> mbox cmd response: success
1,661,250 UART:
1,661,266 UART: Running Caliptra FMC ...
1,661,674 UART:
1,661,817 UART: [state] CFI Enabled
1,672,743 UART: [fht] FMC Alias Private Key: 7
1,790,907 UART: [art] Extend RT PCRs Done
1,791,335 UART: [art] Lock RT PCRs Done
1,793,033 UART: [art] Populate DV Done
1,801,114 UART: [fht] FMC Alias Private Key: 7
1,802,226 UART: [art] Derive CDI
1,802,506 UART: [art] Store in slot 0x4
1,888,255 UART: [art] Derive Key Pair
1,888,615 UART: [art] Store priv key in slot 0x5
1,902,459 UART: [art] Derive Key Pair - Done
1,917,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,933,059 UART: [art] Erasing AUTHORITY.KEYID = 7
1,933,824 UART: [art] PUB.X = C8FCC5A46468E49B7626A8C44AF5BFB8C6D1726AD7BB866B391970789D7CF025E69FFBD0DF07FC229F57F142D6293ED1
1,940,605 UART: [art] PUB.Y = C9F601D3C5948CC1DA6054C8D4118571F4427F2802F00FD797AD6A45063A2E7E2CBD00C3C2AC8A536BB02B6AFF00786C
1,947,509 UART: [art] SIG.R = 68277AB9E35CF4DD24BD54C32513FF60DD566E6F93B02FE955F149BEDC235023F0B3A97D6E56B160A92626BDD4C0471E
1,954,289 UART: [art] SIG.S = E547FF300100A16318CFF52A97F8C3550AD03407F59AD70B860C52AF56134E310AE28607A422DF63DBE55245799A0DD1
1,978,016 UART: persistent_rt::test_persistent_data_layout...[ok]
1,979,259 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
191,979 UART:
192,356 UART: Running Caliptra ROM ...
193,545 UART:
193,722 UART: [state] CFI Enabled
264,864 UART: [state] LifecycleState = Unprovisioned
266,785 UART: [state] DebugLocked = No
268,963 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,615 UART: [kat] SHA2-256
444,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,845 UART: [kat] ++
455,332 UART: [kat] sha1
466,573 UART: [kat] SHA2-256
469,210 UART: [kat] SHA2-384
475,068 UART: [kat] SHA2-512-ACC
477,442 UART: [kat] ECC-384
2,769,131 UART: [kat] HMAC-384Kdf
2,801,932 UART: [kat] LMS
3,992,212 UART: [kat] --
3,995,304 UART: [cold-reset] ++
3,996,690 UART: [fht] Storing FHT @ 0x50003400
4,009,378 UART: [idev] ++
4,009,957 UART: [idev] CDI.KEYID = 6
4,010,999 UART: [idev] SUBJECT.KEYID = 7
4,012,175 UART: [idev] UDS.KEYID = 0
4,013,235 ready_for_fw is high
4,013,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,545 UART: [idev] Erasing UDS.KEYID = 0
7,347,210 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,880 UART: [idev] --
7,373,632 UART: [ldev] ++
7,374,200 UART: [ldev] CDI.KEYID = 6
7,375,219 UART: [ldev] SUBJECT.KEYID = 5
7,376,374 UART: [ldev] AUTHORITY.KEYID = 7
7,377,655 UART: [ldev] FE.KEYID = 1
7,425,214 UART: [ldev] Erasing FE.KEYID = 1
10,755,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,231 UART: [ldev] --
13,119,399 UART: [fwproc] Waiting for Commands...
13,121,012 UART: [fwproc] Received command 0x46574c44
13,123,200 UART: [fwproc] Received Image of size 118548 bytes
17,229,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,667 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,380,799 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,708,419 >>> mbox cmd response: success
17,713,138 UART: [afmc] ++
17,713,766 UART: [afmc] CDI.KEYID = 6
17,714,692 UART: [afmc] SUBJECT.KEYID = 7
17,715,928 UART: [afmc] AUTHORITY.KEYID = 5
21,076,141 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,376,189 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,378,508 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,392,896 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,407,650 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,422,072 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,444,760 UART: [afmc] --
23,448,527 UART: [cold-reset] --
23,453,255 UART: [state] Locking Datavault
23,457,695 UART: [state] Locking PCR0, PCR1 and PCR31
23,459,392 UART: [state] Locking ICCM
23,461,272 UART: [exit] Launching FMC @ 0x40000130
23,469,675 UART:
23,469,912 UART: Running Caliptra FMC ...
23,471,009 UART:
23,471,194 UART: [state] CFI Enabled
23,535,281 UART: [fht] FMC Alias Private Key: 7
25,896,613 UART: [art] Extend RT PCRs Done
25,897,837 UART: [art] Lock RT PCRs Done
25,899,848 UART: [art] Populate DV Done
25,905,042 UART: [fht] FMC Alias Private Key: 7
25,906,743 UART: [art] Derive CDI
25,907,557 UART: [art] Store in slot 0x4
25,965,195 UART: [art] Derive Key Pair
25,966,192 UART: [art] Store priv key in slot 0x5
29,259,216 UART: [art] Derive Key Pair - Done
29,271,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,160 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,687 UART: [art] PUB.X = 71AFF6B8B652BAD05F5336D7940D6194D9EDEAFAD0C09D6F0BF2E0424422007E4A416CEFD6602A30AA310CB6B3F29FF8
31,569,952 UART: [art] PUB.Y = B6FDF8B8A82910793B0D08B218DF84ECA1FB3106DEC93BFBDECC59B3F1353496B7BEA938369FAB36967ED53ED3390C3F
31,577,232 UART: [art] SIG.R = FB42E1C77B43A1AC8D2411237F9AC5D8FD238BC4235B1EB2CA4084AEB28C83563380CECF467E8C7B4B3785E9756AC243
31,584,641 UART: [art] SIG.S = A8831F19894986AFD55D28D328274B84610DBBB4B8601D4E814DDB7B980E531AF207F240593C0369E5C974369162C965
32,889,907 UART: Caliptra RT
32,890,615 UART: [state] CFI Enabled
33,067,741 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
3,784,049 ready_for_fw is high
3,784,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,965,146 >>> mbox cmd response: success
23,652,257 UART:
23,652,674 UART: Running Caliptra FMC ...
23,653,818 UART:
23,653,985 UART: [state] CFI Enabled
23,722,207 UART: [fht] FMC Alias Private Key: 7
26,062,774 UART: [art] Extend RT PCRs Done
26,064,007 UART: [art] Lock RT PCRs Done
26,065,689 UART: [art] Populate DV Done
26,071,238 UART: [fht] FMC Alias Private Key: 7
26,072,947 UART: [art] Derive CDI
26,073,764 UART: [art] Store in slot 0x4
26,130,310 UART: [art] Derive Key Pair
26,131,309 UART: [art] Store priv key in slot 0x5
29,424,092 UART: [art] Derive Key Pair - Done
29,437,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,599 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,107 UART: [art] PUB.X = 18C9140A1551986C07D36ED131A02D0E5D916041FA9D9DC577A91375EBE5ABF262AF1F51748324A01DE7F0ABDC43404F
31,734,372 UART: [art] PUB.Y = 2D0781CBAA8AC7567E6BF6B080C6C93A8CD3FEFF45EE1B855687712EF0921347EEC6C55ABD65066416EA1C8713035ECE
31,741,649 UART: [art] SIG.R = 65E3A230F3CCAD5582601D7DEE9576BE15DC3C13AF59B36BA146B7962AAC60456C51FD4D757C1A007AA1AF88916013A2
31,749,063 UART: [art] SIG.S = 8719F565ED39C49745D9D7DE0FE63D8455F7EA89F7B888D94BB973E2B57F0C2099B5933EB95EA84CB0277EB473DCBF99
33,054,104 UART: Caliptra RT
33,054,825 UART: [state] CFI Enabled
33,231,588 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,452 UART:
192,812 UART: Running Caliptra ROM ...
193,931 UART:
603,634 UART: [state] CFI Enabled
619,596 UART: [state] LifecycleState = Unprovisioned
621,508 UART: [state] DebugLocked = No
624,520 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,673 UART: [kat] SHA2-256
798,467 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,976 UART: [kat] ++
809,419 UART: [kat] sha1
820,215 UART: [kat] SHA2-256
822,933 UART: [kat] SHA2-384
830,051 UART: [kat] SHA2-512-ACC
832,418 UART: [kat] ECC-384
3,115,197 UART: [kat] HMAC-384Kdf
3,126,644 UART: [kat] LMS
4,316,785 UART: [kat] --
4,322,090 UART: [cold-reset] ++
4,324,168 UART: [fht] Storing FHT @ 0x50003400
4,335,356 UART: [idev] ++
4,335,981 UART: [idev] CDI.KEYID = 6
4,336,855 UART: [idev] SUBJECT.KEYID = 7
4,338,158 UART: [idev] UDS.KEYID = 0
4,339,126 ready_for_fw is high
4,339,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,161 UART: [idev] Erasing UDS.KEYID = 0
7,623,712 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,442 UART: [idev] --
7,649,133 UART: [ldev] ++
7,649,749 UART: [ldev] CDI.KEYID = 6
7,650,683 UART: [ldev] SUBJECT.KEYID = 5
7,651,884 UART: [ldev] AUTHORITY.KEYID = 7
7,653,163 UART: [ldev] FE.KEYID = 1
7,662,941 UART: [ldev] Erasing FE.KEYID = 1
10,952,265 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,895 UART: [ldev] --
13,314,340 UART: [fwproc] Waiting for Commands...
13,317,245 UART: [fwproc] Received command 0x46574c44
13,319,416 UART: [fwproc] Received Image of size 118548 bytes
17,423,762 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,648 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,814 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,976 >>> mbox cmd response: success
17,910,765 UART: [afmc] ++
17,911,381 UART: [afmc] CDI.KEYID = 6
17,912,286 UART: [afmc] SUBJECT.KEYID = 7
17,913,503 UART: [afmc] AUTHORITY.KEYID = 5
21,227,009 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,563 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,810 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,245 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,986 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,394 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,762 UART: [afmc] --
23,590,734 UART: [cold-reset] --
23,594,690 UART: [state] Locking Datavault
23,599,386 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,073 UART: [state] Locking ICCM
23,603,568 UART: [exit] Launching FMC @ 0x40000130
23,611,950 UART:
23,612,176 UART: Running Caliptra FMC ...
23,613,288 UART:
23,613,440 UART: [state] CFI Enabled
23,621,593 UART: [fht] FMC Alias Private Key: 7
25,961,970 UART: [art] Extend RT PCRs Done
25,963,198 UART: [art] Lock RT PCRs Done
25,965,063 UART: [art] Populate DV Done
25,970,522 UART: [fht] FMC Alias Private Key: 7
25,972,106 UART: [art] Derive CDI
25,972,913 UART: [art] Store in slot 0x4
26,015,775 UART: [art] Derive Key Pair
26,016,814 UART: [art] Store priv key in slot 0x5
29,259,338 UART: [art] Derive Key Pair - Done
29,272,335 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,375 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,880 UART: [art] PUB.X = 8A2636DDA85557C8847B736D60589EE8CDDD6AF2B3B16BFE8870D165092577356534FC93DE9FEEC7433F3243FDFD1331
31,561,201 UART: [art] PUB.Y = 6F7A691450E2F7511A9219DEEE837E409D6B51E19FD37330A975C0C49D47714DAA9C6B180C40B9ADD8DD2F4CAD9764F8
31,568,464 UART: [art] SIG.R = EA9B53D12F1FB8C3A682A5BCDA267A7554681462C4DE86F8F458CCB10F1CE8519E59A5CF72063685A6127D753E630179
31,575,858 UART: [art] SIG.S = BC916B5B9DD6DA99713AE869F62EC0E043066372FB55F777B4C25B331F299892A1463567C6F52DADE3828A2DBD440E0F
32,880,777 UART: Caliptra RT
32,881,480 UART: [state] CFI Enabled
33,015,565 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
4,129,144 ready_for_fw is high
4,129,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,168,382 >>> mbox cmd response: success
23,809,645 UART:
23,810,087 UART: Running Caliptra FMC ...
23,811,206 UART:
23,811,362 UART: [state] CFI Enabled
23,819,750 UART: [fht] FMC Alias Private Key: 7
26,159,404 UART: [art] Extend RT PCRs Done
26,160,632 UART: [art] Lock RT PCRs Done
26,162,159 UART: [art] Populate DV Done
26,167,752 UART: [fht] FMC Alias Private Key: 7
26,169,447 UART: [art] Derive CDI
26,170,271 UART: [art] Store in slot 0x4
26,212,702 UART: [art] Derive Key Pair
26,213,696 UART: [art] Store priv key in slot 0x5
29,455,587 UART: [art] Derive Key Pair - Done
29,468,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,448 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,948 UART: [art] PUB.X = B07AEBFD8077E715A6849E0B436FCFE4F5CB5515F87796A6E8DF764A137B26A5A2632BEA8D8723C4A39EFCB4CCF34013
31,757,248 UART: [art] PUB.Y = 2C22C012AB698B4353F274ED8C264B2BBB7F9ECFAFB80ACD0BBF2CDE4BD82C5DDD6DC1C174E25A3848D0B72D27E91ABB
31,764,564 UART: [art] SIG.R = 182E529793FFA30AC19E34BD086CC966503E7DF852753C517EF9A04F4AE5B60CC7CD47CB68359976DB7ACE94397A181E
31,771,989 UART: [art] SIG.S = 72CFE8CE325449B4840A9A46F3F2B22BCE106E62E0CB2A17358FE8D06671B7E6B02BC3AFAF88FC35A433E83540E31FB9
33,077,346 UART: Caliptra RT
33,078,057 UART: [state] CFI Enabled
33,210,859 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
191,963 UART:
192,344 UART: Running Caliptra ROM ...
193,476 UART:
193,623 UART: [state] CFI Enabled
268,718 UART: [state] LifecycleState = Unprovisioned
270,705 UART: [state] DebugLocked = No
272,581 UART: [state] WD Timer not started. Device not locked for debugging
276,337 UART: [kat] SHA2-256
455,952 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,749 UART: [kat] ++
467,190 UART: [kat] sha1
478,343 UART: [kat] SHA2-256
481,061 UART: [kat] SHA2-384
487,337 UART: [kat] SHA2-512-ACC
489,698 UART: [kat] ECC-384
2,950,797 UART: [kat] HMAC-384Kdf
2,972,054 UART: [kat] LMS
3,448,563 UART: [kat] --
3,452,410 UART: [cold-reset] ++
3,454,900 UART: [fht] FHT @ 0x50003400
3,465,964 UART: [idev] ++
3,466,563 UART: [idev] CDI.KEYID = 6
3,467,599 UART: [idev] SUBJECT.KEYID = 7
3,468,769 UART: [idev] UDS.KEYID = 0
3,469,691 ready_for_fw is high
3,469,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,893 UART: [idev] Erasing UDS.KEYID = 0
5,988,771 UART: [idev] Sha1 KeyId Algorithm
6,012,159 UART: [idev] --
6,016,857 UART: [ldev] ++
6,017,464 UART: [ldev] CDI.KEYID = 6
6,018,379 UART: [ldev] SUBJECT.KEYID = 5
6,019,538 UART: [ldev] AUTHORITY.KEYID = 7
6,020,841 UART: [ldev] FE.KEYID = 1
6,059,359 UART: [ldev] Erasing FE.KEYID = 1
8,568,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,858 UART: [ldev] --
10,376,694 UART: [fwproc] Wait for Commands...
10,378,565 UART: [fwproc] Recv command 0x46574c44
10,380,601 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,327 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,329 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,099 >>> mbox cmd response: success
14,353,733 UART: [afmc] ++
14,354,374 UART: [afmc] CDI.KEYID = 6
14,355,263 UART: [afmc] SUBJECT.KEYID = 7
14,356,477 UART: [afmc] AUTHORITY.KEYID = 5
16,898,069 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,621,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,623,520 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,639,344 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,655,413 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,671,031 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,695,205 UART: [afmc] --
18,699,018 UART: [cold-reset] --
18,702,931 UART: [state] Locking Datavault
18,707,689 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,441 UART: [state] Locking ICCM
18,711,455 UART: [exit] Launching FMC @ 0x40000130
18,719,842 UART:
18,720,098 UART: Running Caliptra FMC ...
18,721,126 UART:
18,721,271 UART: [state] CFI Enabled
18,777,741 UART: [fht] FMC Alias Private Key: 7
20,544,489 UART: [art] Extend RT PCRs Done
20,545,694 UART: [art] Lock RT PCRs Done
20,547,556 UART: [art] Populate DV Done
20,553,121 UART: [fht] FMC Alias Private Key: 7
20,554,705 UART: [art] Derive CDI
20,555,437 UART: [art] Store in slot 0x4
20,610,903 UART: [art] Derive Key Pair
20,611,941 UART: [art] Store priv key in slot 0x5
23,074,470 UART: [art] Derive Key Pair - Done
23,087,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,800,510 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,001 UART: [art] PUB.X = FE80ECA0943DCFE8FE98FB0B2DA002F038E794FDFA073FB15152D77647D306D49CE3F1B1CE93338D26FBCE037CD8D756
24,809,344 UART: [art] PUB.Y = 92B8A5B9B796231BE5D020F83942453B777C2C27E9F7B522D9E81ADFE115B747DFD80C69ED34CF7D2DCC738498707A2F
24,816,738 UART: [art] SIG.R = B1E36D135B9159EE579C14C70528DA492F362276FAE3BB941AC8D37719B5493F092FF3FCE8AEA94BFD6A11BC8F63C310
24,824,023 UART: [art] SIG.S = 42DFE4963C0B98D1725D25A263ACC98DB004E7597BB80B7B936DE2A72568AB770DF5778EC3EE9C740919F6964275B502
25,802,779 UART: Caliptra RT
25,803,490 UART: [state] CFI Enabled
25,984,432 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
3,461,541 ready_for_fw is high
3,461,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,237,186 >>> mbox cmd response: success
18,536,745 UART:
18,537,153 UART: Running Caliptra FMC ...
18,538,280 UART:
18,538,437 UART: [state] CFI Enabled
18,601,970 UART: [fht] FMC Alias Private Key: 7
20,367,860 UART: [art] Extend RT PCRs Done
20,369,076 UART: [art] Lock RT PCRs Done
20,370,592 UART: [art] Populate DV Done
20,375,900 UART: [fht] FMC Alias Private Key: 7
20,377,609 UART: [art] Derive CDI
20,378,420 UART: [art] Store in slot 0x4
20,434,593 UART: [art] Derive Key Pair
20,435,625 UART: [art] Store priv key in slot 0x5
22,898,800 UART: [art] Derive Key Pair - Done
22,911,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,920 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,408 UART: [art] PUB.X = 549E6B2EE0E4F0C19FE4DCC59397AC57A8C7885220D4BB7F63B1D51ED6625E38C1F1EFED11E41D20769BDC9E2B38CA1C
24,632,722 UART: [art] PUB.Y = 716A25DCBA9112EA0ED792B5687EE08E894F72D39BE2940ECA77F0BAFC12D18FD5565E8F0715503499C3A704C5603C84
24,639,967 UART: [art] SIG.R = D79EFCB976E689B9D711AC0D44BF7176DF529A121C20DA4F5227D8FD15934460A43C749A895E2D2857FFC2AB3058FA0D
24,647,367 UART: [art] SIG.S = 2BA868B6BBE487184CF77F9539B1E8E39B0A7891F4B2974F56C649048ADD009179CCC63853699AB1DFA97CADC3626D11
25,626,295 UART: Caliptra RT
25,627,007 UART: [state] CFI Enabled
25,807,845 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,429 UART:
192,791 UART: Running Caliptra ROM ...
193,894 UART:
603,437 UART: [state] CFI Enabled
615,554 UART: [state] LifecycleState = Unprovisioned
617,505 UART: [state] DebugLocked = No
619,449 UART: [state] WD Timer not started. Device not locked for debugging
622,704 UART: [kat] SHA2-256
802,364 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,094 UART: [kat] ++
813,620 UART: [kat] sha1
825,637 UART: [kat] SHA2-256
828,341 UART: [kat] SHA2-384
834,340 UART: [kat] SHA2-512-ACC
836,680 UART: [kat] ECC-384
3,274,893 UART: [kat] HMAC-384Kdf
3,286,286 UART: [kat] LMS
3,762,797 UART: [kat] --
3,767,288 UART: [cold-reset] ++
3,768,296 UART: [fht] FHT @ 0x50003400
3,778,632 UART: [idev] ++
3,779,258 UART: [idev] CDI.KEYID = 6
3,780,182 UART: [idev] SUBJECT.KEYID = 7
3,781,371 UART: [idev] UDS.KEYID = 0
3,782,302 ready_for_fw is high
3,782,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,931,219 UART: [idev] Erasing UDS.KEYID = 0
6,258,197 UART: [idev] Sha1 KeyId Algorithm
6,281,737 UART: [idev] --
6,287,146 UART: [ldev] ++
6,287,720 UART: [ldev] CDI.KEYID = 6
6,288,690 UART: [ldev] SUBJECT.KEYID = 5
6,289,851 UART: [ldev] AUTHORITY.KEYID = 7
6,291,138 UART: [ldev] FE.KEYID = 1
6,301,403 UART: [ldev] Erasing FE.KEYID = 1
8,778,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,496,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,512,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,528,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,543,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,567,023 UART: [ldev] --
10,572,182 UART: [fwproc] Wait for Commands...
10,575,117 UART: [fwproc] Recv command 0x46574c44
10,577,151 UART: [fwproc] Recv'd Img size: 118548 bytes
14,055,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,133,004 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,206,064 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,533,482 >>> mbox cmd response: success
14,538,217 UART: [afmc] ++
14,538,830 UART: [afmc] CDI.KEYID = 6
14,539,752 UART: [afmc] SUBJECT.KEYID = 7
14,540,975 UART: [afmc] AUTHORITY.KEYID = 5
17,036,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,756,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,758,342 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,774,179 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,790,214 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,805,806 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,830,079 UART: [afmc] --
18,833,795 UART: [cold-reset] --
18,839,085 UART: [state] Locking Datavault
18,843,690 UART: [state] Locking PCR0, PCR1 and PCR31
18,845,444 UART: [state] Locking ICCM
18,847,668 UART: [exit] Launching FMC @ 0x40000130
18,856,067 UART:
18,856,308 UART: Running Caliptra FMC ...
18,857,412 UART:
18,857,581 UART: [state] CFI Enabled
18,865,683 UART: [fht] FMC Alias Private Key: 7
20,632,167 UART: [art] Extend RT PCRs Done
20,633,399 UART: [art] Lock RT PCRs Done
20,634,891 UART: [art] Populate DV Done
20,640,096 UART: [fht] FMC Alias Private Key: 7
20,641,638 UART: [art] Derive CDI
20,642,372 UART: [art] Store in slot 0x4
20,685,343 UART: [art] Derive Key Pair
20,686,405 UART: [art] Store priv key in slot 0x5
23,113,274 UART: [art] Derive Key Pair - Done
23,125,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,832,231 UART: [art] Erasing AUTHORITY.KEYID = 7
24,833,790 UART: [art] PUB.X = BA366F7E509653A3A2CC7805DC93D00A591410683220FAABF1970150696D9DEF4F7D1A8DFC7E70FB9BA402F0DDD00CF2
24,841,048 UART: [art] PUB.Y = AF59D876C25789FD01DFE615F71B71C1A52185E356DCEA196EACBE1E3643DD93E0749C8124EF1947142508ECAC0E1563
24,848,293 UART: [art] SIG.R = 668085B4CC3104C158089798CC85E59C94F8D9A266D8F7468FA802E304F0263B2D1CF3C344A7CD46DCCEA417C60568DC
24,855,685 UART: [art] SIG.S = F09DE74237E085465B25B2F2EB19C4410F9D07C400B2A545D8B76B508A3889B86172FCE91838BFCFF4467A65F92F2ED9
25,834,982 UART: Caliptra RT
25,835,685 UART: [state] CFI Enabled
25,968,363 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,776,928 ready_for_fw is high
3,777,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,441,142 >>> mbox cmd response: success
18,687,867 UART:
18,688,255 UART: Running Caliptra FMC ...
18,689,392 UART:
18,689,558 UART: [state] CFI Enabled
18,697,453 UART: [fht] FMC Alias Private Key: 7
20,463,604 UART: [art] Extend RT PCRs Done
20,464,833 UART: [art] Lock RT PCRs Done
20,466,625 UART: [art] Populate DV Done
20,472,253 UART: [fht] FMC Alias Private Key: 7
20,473,804 UART: [art] Derive CDI
20,474,544 UART: [art] Store in slot 0x4
20,517,363 UART: [art] Derive Key Pair
20,518,398 UART: [art] Store priv key in slot 0x5
22,945,439 UART: [art] Derive Key Pair - Done
22,958,486 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,664,880 UART: [art] Erasing AUTHORITY.KEYID = 7
24,666,390 UART: [art] PUB.X = F2458B7475C0C3AB0F3733CBBCA8CDA75D22FB5DB9EAEC4C54B9227C0730D449A25A23B29C129F451394ACC9E98C80B0
24,673,651 UART: [art] PUB.Y = F97784BD8D95C7859A0A7B2A010D20AA625065D6520370AEBC8855ECFC129A285B739822AF5CF029314A2A16087157F1
24,680,916 UART: [art] SIG.R = 827D8475A3D92FBF9A0C36A2D45BEC087049A5F8C59CAE17E153A41A428AA7A8288CC4FBF5F3BD19A6E901F9B542A768
24,688,330 UART: [art] SIG.S = 6691540D2EAFF1A9FC954B6E6472883A953EB91C054903142FC8A69C4AAC4F86E815DAC1562DF0A7BEBCE393636143BB
25,667,283 UART: Caliptra RT
25,667,997 UART: [state] CFI Enabled
25,801,473 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
191,994 UART:
192,354 UART: Running Caliptra ROM ...
193,531 UART:
193,682 UART: [state] CFI Enabled
262,609 UART: [state] LifecycleState = Unprovisioned
265,013 UART: [state] DebugLocked = No
266,546 UART: [state] WD Timer not started. Device not locked for debugging
270,927 UART: [kat] SHA2-256
460,846 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,594 UART: [kat] ++
472,045 UART: [kat] sha1
484,236 UART: [kat] SHA2-256
487,315 UART: [kat] SHA2-384
493,801 UART: [kat] SHA2-512-ACC
496,377 UART: [kat] ECC-384
2,948,504 UART: [kat] HMAC-384Kdf
2,973,413 UART: [kat] LMS
3,505,123 UART: [kat] --
3,508,929 UART: [cold-reset] ++
3,510,865 UART: [fht] FHT @ 0x50003400
3,522,406 UART: [idev] ++
3,523,115 UART: [idev] CDI.KEYID = 6
3,524,041 UART: [idev] SUBJECT.KEYID = 7
3,525,215 UART: [idev] UDS.KEYID = 0
3,526,141 ready_for_fw is high
3,526,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,456 UART: [idev] Erasing UDS.KEYID = 0
6,027,619 UART: [idev] Sha1 KeyId Algorithm
6,048,576 UART: [idev] --
6,054,603 UART: [ldev] ++
6,055,296 UART: [ldev] CDI.KEYID = 6
6,056,209 UART: [ldev] SUBJECT.KEYID = 5
6,057,390 UART: [ldev] AUTHORITY.KEYID = 7
6,058,570 UART: [ldev] FE.KEYID = 1
6,103,557 UART: [ldev] Erasing FE.KEYID = 1
8,608,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,612 UART: [ldev] --
10,419,027 UART: [fwproc] Wait for Commands...
10,421,452 UART: [fwproc] Recv command 0x46574c44
10,423,758 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,591 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,186 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,763 >>> mbox cmd response: success
14,678,148 UART: [afmc] ++
14,678,847 UART: [afmc] CDI.KEYID = 6
14,680,086 UART: [afmc] SUBJECT.KEYID = 7
14,681,686 UART: [afmc] AUTHORITY.KEYID = 5
17,218,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,942,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,944,543 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,959,602 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,974,752 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,989,676 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,013,146 UART: [afmc] --
19,016,260 UART: [cold-reset] --
19,018,403 UART: [state] Locking Datavault
19,022,356 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,488 UART: [state] Locking ICCM
19,026,422 UART: [exit] Launching FMC @ 0x40000130
19,035,111 UART:
19,035,345 UART: Running Caliptra FMC ...
19,036,443 UART:
19,036,603 UART: [state] CFI Enabled
19,099,133 UART: [fht] FMC Alias Private Key: 7
20,866,141 UART: [art] Extend RT PCRs Done
20,867,360 UART: [art] Lock RT PCRs Done
20,869,092 UART: [art] Populate DV Done
20,874,290 UART: [fht] FMC Alias Private Key: 7
20,875,931 UART: [art] Derive CDI
20,876,665 UART: [art] Store in slot 0x4
20,932,773 UART: [art] Derive Key Pair
20,933,812 UART: [art] Store priv key in slot 0x5
23,396,496 UART: [art] Derive Key Pair - Done
23,409,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,122,828 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,351 UART: [art] PUB.X = 32060F1AE7464E8E5DCF86C6AD3104D1643723A3C60D98AD64A82A484E3972B18A80CA6EC97C912A8875AA071714C0F6
25,131,553 UART: [art] PUB.Y = B54C5CB935ACFE246800C9EBDA9A2114675D696BE8192D1AFC6B7CC6A6115C588D48E58AD0B61F0882F9322749417F07
25,138,836 UART: [art] SIG.R = 8295E9AC927EAACDA04EBAF321140F7F5D2495D6F0555120FF375A563789BC549C1C23DA5D61F627467B50BC4EF6CF0A
25,146,185 UART: [art] SIG.S = E59D0F92E333C8FFBDEF7094CB4163FA85EA9D09EF3519EB9A09041EBCF196D4F6D388D63E40B3CD4C0C1DBA007103D5
26,124,549 UART: Caliptra RT
26,125,258 UART: [state] CFI Enabled
26,307,001 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,417,701 ready_for_fw is high
3,418,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,798,928 >>> mbox cmd response: success
19,109,137 UART:
19,109,524 UART: Running Caliptra FMC ...
19,110,628 UART:
19,110,778 UART: [state] CFI Enabled
19,177,118 UART: [fht] FMC Alias Private Key: 7
20,943,781 UART: [art] Extend RT PCRs Done
20,945,011 UART: [art] Lock RT PCRs Done
20,946,558 UART: [art] Populate DV Done
20,952,096 UART: [fht] FMC Alias Private Key: 7
20,953,581 UART: [art] Derive CDI
20,954,488 UART: [art] Store in slot 0x4
21,010,072 UART: [art] Derive Key Pair
21,011,082 UART: [art] Store priv key in slot 0x5
23,474,057 UART: [art] Derive Key Pair - Done
23,486,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,795 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,321 UART: [art] PUB.X = A6CAB44F56762A81DB3F4EEFCF18DE0292E20A32E27A7477D4A5723225C6D91F0A1F504329EFA2A4DA74235FD2621F41
25,208,622 UART: [art] PUB.Y = 52431A730B0FB89EC0A471808A0D2B0F24B2B46800F73104BEB2A93BA5E9E56C9F6343F3F6DA7FC2C9617226D4237B41
25,215,800 UART: [art] SIG.R = 45538E446885BFC5907899F34DDFEE20BE541D9D9F383E7A7A1C0734E1C86F40F43835605640BDB7CA192431386FC3AA
25,223,171 UART: [art] SIG.S = 9DBACF2C09972E07DD8583270FC19B6AE868E142DCB9BF114715418D4413AC1A2292C9D93AD201B066E544E25FD7D323
26,201,855 UART: Caliptra RT
26,202,549 UART: [state] CFI Enabled
26,382,191 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,524 UART:
192,898 UART: Running Caliptra ROM ...
194,094 UART:
603,785 UART: [state] CFI Enabled
620,357 UART: [state] LifecycleState = Unprovisioned
622,634 UART: [state] DebugLocked = No
624,396 UART: [state] WD Timer not started. Device not locked for debugging
629,874 UART: [kat] SHA2-256
819,712 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,527 UART: [kat] ++
831,137 UART: [kat] sha1
842,163 UART: [kat] SHA2-256
845,180 UART: [kat] SHA2-384
850,038 UART: [kat] SHA2-512-ACC
852,558 UART: [kat] ECC-384
3,293,329 UART: [kat] HMAC-384Kdf
3,306,984 UART: [kat] LMS
3,838,756 UART: [kat] --
3,842,632 UART: [cold-reset] ++
3,844,785 UART: [fht] FHT @ 0x50003400
3,856,283 UART: [idev] ++
3,857,001 UART: [idev] CDI.KEYID = 6
3,857,919 UART: [idev] SUBJECT.KEYID = 7
3,859,167 UART: [idev] UDS.KEYID = 0
3,860,098 ready_for_fw is high
3,860,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,164 UART: [idev] Erasing UDS.KEYID = 0
6,336,764 UART: [idev] Sha1 KeyId Algorithm
6,360,104 UART: [idev] --
6,365,180 UART: [ldev] ++
6,365,858 UART: [ldev] CDI.KEYID = 6
6,366,745 UART: [ldev] SUBJECT.KEYID = 5
6,367,955 UART: [ldev] AUTHORITY.KEYID = 7
6,369,191 UART: [ldev] FE.KEYID = 1
6,379,919 UART: [ldev] Erasing FE.KEYID = 1
8,860,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,573 UART: [ldev] --
10,652,627 UART: [fwproc] Wait for Commands...
10,655,425 UART: [fwproc] Recv command 0x46574c44
10,657,736 UART: [fwproc] Recv'd Img size: 118548 bytes
14,155,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,503 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,116 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,495 >>> mbox cmd response: success
14,918,114 UART: [afmc] ++
14,918,845 UART: [afmc] CDI.KEYID = 6
14,920,041 UART: [afmc] SUBJECT.KEYID = 7
14,921,484 UART: [afmc] AUTHORITY.KEYID = 5
17,422,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,264 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,361 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,177,497 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,453 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,216,656 UART: [afmc] --
19,219,771 UART: [cold-reset] --
19,223,153 UART: [state] Locking Datavault
19,228,084 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,240 UART: [state] Locking ICCM
19,231,591 UART: [exit] Launching FMC @ 0x40000130
19,240,272 UART:
19,240,511 UART: Running Caliptra FMC ...
19,241,616 UART:
19,241,776 UART: [state] CFI Enabled
19,249,629 UART: [fht] FMC Alias Private Key: 7
21,015,407 UART: [art] Extend RT PCRs Done
21,016,634 UART: [art] Lock RT PCRs Done
21,018,457 UART: [art] Populate DV Done
21,024,198 UART: [fht] FMC Alias Private Key: 7
21,025,832 UART: [art] Derive CDI
21,026,583 UART: [art] Store in slot 0x4
21,069,130 UART: [art] Derive Key Pair
21,070,136 UART: [art] Store priv key in slot 0x5
23,497,101 UART: [art] Derive Key Pair - Done
23,510,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,306 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,868 UART: [art] PUB.X = 0059C33FBD1E2B1C6CA24E7C7042DCF1080363BE1D042FD1EBB9E1E0693297E93E2FDDFD6C730AD7205E56CE0A248241
25,225,095 UART: [art] PUB.Y = 27338075E304F463DFF667D173B69D40A55ED1B371714D9BEEF43CFD0096FACFCCE32ED1C3AA3672E78716AC872AD0EB
25,232,296 UART: [art] SIG.R = 258DC082DF3AE95BC19C211185D0625882455B11AD5D19B940C4B9449EAF87E0677B70DFE8622BB7786F9B9CA04C2C20
25,239,709 UART: [art] SIG.S = 4EC8974463D28F34F79B5D567766834A982F4A609CC30FF15ED02A4368DE2FE026A2339EBDFBEDB458DAE17B3AF03B80
26,219,169 UART: Caliptra RT
26,219,863 UART: [state] CFI Enabled
26,352,278 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,756,558 ready_for_fw is high
3,756,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,854 >>> mbox cmd response: success
19,301,635 UART:
19,302,021 UART: Running Caliptra FMC ...
19,303,231 UART:
19,303,408 UART: [state] CFI Enabled
19,311,194 UART: [fht] FMC Alias Private Key: 7
21,077,073 UART: [art] Extend RT PCRs Done
21,078,346 UART: [art] Lock RT PCRs Done
21,079,619 UART: [art] Populate DV Done
21,085,230 UART: [fht] FMC Alias Private Key: 7
21,086,778 UART: [art] Derive CDI
21,087,605 UART: [art] Store in slot 0x4
21,130,055 UART: [art] Derive Key Pair
21,131,101 UART: [art] Store priv key in slot 0x5
23,557,538 UART: [art] Derive Key Pair - Done
23,570,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,848 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,346 UART: [art] PUB.X = DC3EC81078FA660001AAB2BD10B6CBE7E0FF159F97C0D96701BF116F5903510D53F0D230CBB7DD5A0B933EB9309628CB
25,285,612 UART: [art] PUB.Y = 074C4B3501C3914CB7A8AA8EC182D57EEE76B8BDE775415520CF5E1E36481EE22CF7060067B98FF7CAAFA1D7AB57C66B
25,292,821 UART: [art] SIG.R = A75A20343C5F0690A5E66F109C3EE4FDCC755CBAAE38C6770F29C5968DD72DF688A47A203779F748C056F2ADB5F00BD2
25,300,239 UART: [art] SIG.S = 16D7EA1D659E8E7E8B1D395A309EA1E9CC3FD7621F393FF95CF235850AB009D3D63F60F960EA2CBD819DC5EAB33207DC
26,279,002 UART: Caliptra RT
26,279,730 UART: [state] CFI Enabled
26,413,009 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,311 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,837 UART: [kat] SHA2-256
881,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,883 UART: [kat] ++
886,035 UART: [kat] sha1
890,179 UART: [kat] SHA2-256
892,117 UART: [kat] SHA2-384
894,812 UART: [kat] SHA2-512-ACC
896,713 UART: [kat] ECC-384
902,350 UART: [kat] HMAC-384Kdf
906,884 UART: [kat] LMS
1,475,080 UART: [kat] --
1,476,119 UART: [cold-reset] ++
1,476,481 UART: [fht] Storing FHT @ 0x50003400
1,479,298 UART: [idev] ++
1,479,466 UART: [idev] CDI.KEYID = 6
1,479,826 UART: [idev] SUBJECT.KEYID = 7
1,480,250 UART: [idev] UDS.KEYID = 0
1,480,595 ready_for_fw is high
1,480,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,314 UART: [idev] Erasing UDS.KEYID = 0
1,504,370 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,918 UART: [idev] --
1,513,939 UART: [ldev] ++
1,514,107 UART: [ldev] CDI.KEYID = 6
1,514,470 UART: [ldev] SUBJECT.KEYID = 5
1,514,896 UART: [ldev] AUTHORITY.KEYID = 7
1,515,359 UART: [ldev] FE.KEYID = 1
1,520,497 UART: [ldev] Erasing FE.KEYID = 1
1,545,818 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,904 UART: [ldev] --
1,585,283 UART: [fwproc] Waiting for Commands...
1,586,072 UART: [fwproc] Received command 0x46574c44
1,586,863 UART: [fwproc] Received Image of size 118548 bytes
2,931,619 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,987 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,205 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,524 >>> mbox cmd response: success
3,130,680 UART: [afmc] ++
3,130,848 UART: [afmc] CDI.KEYID = 6
3,131,210 UART: [afmc] SUBJECT.KEYID = 7
3,131,635 UART: [afmc] AUTHORITY.KEYID = 5
3,166,492 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,718 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,498 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,207 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,090 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,773 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,831 UART: [afmc] --
3,209,929 UART: [cold-reset] --
3,210,809 UART: [state] Locking Datavault
3,211,776 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,380 UART: [state] Locking ICCM
3,213,052 UART: [exit] Launching FMC @ 0x40000130
3,218,382 UART:
3,218,398 UART: Running Caliptra FMC ...
3,218,806 UART:
3,218,860 UART: [state] CFI Enabled
3,229,098 UART: [fht] FMC Alias Private Key: 7
3,347,950 UART: [art] Extend RT PCRs Done
3,348,378 UART: [art] Lock RT PCRs Done
3,350,140 UART: [art] Populate DV Done
3,358,571 UART: [fht] FMC Alias Private Key: 7
3,359,743 UART: [art] Derive CDI
3,360,023 UART: [art] Store in slot 0x4
3,445,637 UART: [art] Derive Key Pair
3,445,997 UART: [art] Store priv key in slot 0x5
3,459,496 UART: [art] Derive Key Pair - Done
3,474,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,565 UART: [art] PUB.X = BFD471553FABC062E1095AB3E7AFDC1B898819A20CD94BB11EAD4E8B6E2B25C2757DA6A51683C13D5F0E59D1314AF36F
3,497,344 UART: [art] PUB.Y = AF0C8ED424C5D057226830DFAFA176B3C877A2766CA424923964DF61C32D06C7CC1A3E3BBE558C1BEE7A3BBC7360D976
3,504,302 UART: [art] SIG.R = CC340FAAC28AAA98404100D98E2CD816088268B994E2D12B404FD28D9F765FDEC4246A96B6723ADDD40D3AA90DA93215
3,511,048 UART: [art] SIG.S = 0D10AEB0F383D9E0E36EFEAD6D06571A0A16311345B2DCBD808AD26ACC6F61104A06E6555BB30E51E4A6705D14B1D18C
3,534,853 UART: Caliptra RT
3,535,104 UART: [state] CFI Enabled
3,655,610 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,459 ready_for_fw is high
1,362,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,032 >>> mbox cmd response: success
3,042,629 UART:
3,042,645 UART: Running Caliptra FMC ...
3,043,053 UART:
3,043,107 UART: [state] CFI Enabled
3,053,551 UART: [fht] FMC Alias Private Key: 7
3,172,631 UART: [art] Extend RT PCRs Done
3,173,059 UART: [art] Lock RT PCRs Done
3,174,519 UART: [art] Populate DV Done
3,182,824 UART: [fht] FMC Alias Private Key: 7
3,183,926 UART: [art] Derive CDI
3,184,206 UART: [art] Store in slot 0x4
3,269,722 UART: [art] Derive Key Pair
3,270,082 UART: [art] Store priv key in slot 0x5
3,283,535 UART: [art] Derive Key Pair - Done
3,298,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,645 UART: [art] PUB.X = 13CE50F0767B5FF307A8CD19C1D3CA3F9BBB154454CC80E6A2B1710574A4620A024298D55008C723DE7A784013F31DBE
3,321,404 UART: [art] PUB.Y = CD8FB29C25B1DCBD08C0B82CDFA6C3468A81691B1872AF041C29C0BED33B21544698FE397E12BC7A8942E58120D23695
3,328,356 UART: [art] SIG.R = F936EFA2C6F2BCD94A3228C44EA18C475D39C326716A1A3BE52F8CF258168626CE64AFD87D33552D3D0FA719B13DB1D7
3,335,135 UART: [art] SIG.S = 6F1E51B01F65733E3314F90D4B50762C878AA93559C4810EDBF163C9B58768406FA8C318D6242C0BCF886E5FAFE36A2C
3,359,290 UART: Caliptra RT
3,359,541 UART: [state] CFI Enabled
3,480,209 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,096 UART: [kat] SHA2-256
882,027 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,142 UART: [kat] ++
886,294 UART: [kat] sha1
890,714 UART: [kat] SHA2-256
892,652 UART: [kat] SHA2-384
895,557 UART: [kat] SHA2-512-ACC
897,458 UART: [kat] ECC-384
903,217 UART: [kat] HMAC-384Kdf
907,883 UART: [kat] LMS
1,476,079 UART: [kat] --
1,477,036 UART: [cold-reset] ++
1,477,524 UART: [fht] Storing FHT @ 0x50003400
1,480,355 UART: [idev] ++
1,480,523 UART: [idev] CDI.KEYID = 6
1,480,883 UART: [idev] SUBJECT.KEYID = 7
1,481,307 UART: [idev] UDS.KEYID = 0
1,481,652 ready_for_fw is high
1,481,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,407 UART: [idev] Erasing UDS.KEYID = 0
1,506,519 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,065 UART: [idev] --
1,516,252 UART: [ldev] ++
1,516,420 UART: [ldev] CDI.KEYID = 6
1,516,783 UART: [ldev] SUBJECT.KEYID = 5
1,517,209 UART: [ldev] AUTHORITY.KEYID = 7
1,517,672 UART: [ldev] FE.KEYID = 1
1,522,990 UART: [ldev] Erasing FE.KEYID = 1
1,548,581 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,481 UART: [ldev] --
1,587,926 UART: [fwproc] Waiting for Commands...
1,588,719 UART: [fwproc] Received command 0x46574c44
1,589,510 UART: [fwproc] Received Image of size 118548 bytes
2,934,596 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,952 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,170 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,579 >>> mbox cmd response: success
3,134,617 UART: [afmc] ++
3,134,785 UART: [afmc] CDI.KEYID = 6
3,135,147 UART: [afmc] SUBJECT.KEYID = 7
3,135,572 UART: [afmc] AUTHORITY.KEYID = 5
3,170,707 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,181 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,961 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,670 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,553 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,236 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,932 UART: [afmc] --
3,213,822 UART: [cold-reset] --
3,214,778 UART: [state] Locking Datavault
3,215,963 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,567 UART: [state] Locking ICCM
3,217,011 UART: [exit] Launching FMC @ 0x40000130
3,222,341 UART:
3,222,357 UART: Running Caliptra FMC ...
3,222,765 UART:
3,222,908 UART: [state] CFI Enabled
3,233,410 UART: [fht] FMC Alias Private Key: 7
3,351,870 UART: [art] Extend RT PCRs Done
3,352,298 UART: [art] Lock RT PCRs Done
3,353,904 UART: [art] Populate DV Done
3,362,045 UART: [fht] FMC Alias Private Key: 7
3,363,087 UART: [art] Derive CDI
3,363,367 UART: [art] Store in slot 0x4
3,449,127 UART: [art] Derive Key Pair
3,449,487 UART: [art] Store priv key in slot 0x5
3,462,952 UART: [art] Derive Key Pair - Done
3,477,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,206 UART: [art] PUB.X = 5CB1BA04CEE5DF447FF5C3E15212DA6D52AB0FC6834911A6D1593559F6C479A6E46AA91998D12A4C1D6791B7AB8B4C8A
3,500,984 UART: [art] PUB.Y = B936807D3B83220670FEB72E7462F0D80A3F3D37A2D7E54EAA772EFB840054AF8C2B85CFC2FB030105575FA289DA38C3
3,507,905 UART: [art] SIG.R = 6AA7BA7EB3B45CE5C9DEBE7FF7C7CC4B50EA697269EF0DD5DFB3AF08ED480B024D03F6D0E3850D617958A261253B529D
3,514,679 UART: [art] SIG.S = 4D56F39446E987AB86C69CECA0845B32E4CB2F90F57BB6E8CC618B6B7B9A9AC0FAA16BDF4663F778C02E863781279CB7
3,538,291 UART: Caliptra RT
3,538,634 UART: [state] CFI Enabled
3,658,785 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,864 ready_for_fw is high
1,362,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,779 >>> mbox cmd response: success
3,045,262 UART:
3,045,278 UART: Running Caliptra FMC ...
3,045,686 UART:
3,045,829 UART: [state] CFI Enabled
3,056,339 UART: [fht] FMC Alias Private Key: 7
3,174,893 UART: [art] Extend RT PCRs Done
3,175,321 UART: [art] Lock RT PCRs Done
3,176,839 UART: [art] Populate DV Done
3,185,118 UART: [fht] FMC Alias Private Key: 7
3,186,216 UART: [art] Derive CDI
3,186,496 UART: [art] Store in slot 0x4
3,272,350 UART: [art] Derive Key Pair
3,272,710 UART: [art] Store priv key in slot 0x5
3,286,251 UART: [art] Derive Key Pair - Done
3,301,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,258 UART: [art] PUB.X = 202A5A81BED1DB7E02E6C9F893B3DE61400137D4555150FCF3154629923E5F7469D7074296B9CFB28899537D6B222A64
3,324,013 UART: [art] PUB.Y = BC0DB997F33E4C22DE7A69753CB0224CF1DDF2DDE0FB5A572A4A03E64CB40E6D2962717CA4BA2270E8D6FECC7B8968FE
3,330,978 UART: [art] SIG.R = 637C34329DC05E9E1B4300ED0868A5C94DFF4A0E4C40851A36D31D984D9F379217DC0142571333075E8FBC6224FD1C15
3,337,712 UART: [art] SIG.S = 16E7420F0891E2130D0E5F698D331A8FB24C3B0E1DAC1D92676BD49D129B121C745D1E4DD3D7F9BA3A8E359E5D02E61B
3,361,652 UART: Caliptra RT
3,361,995 UART: [state] CFI Enabled
3,482,238 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
891,022 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,126 UART: [kat] ++
895,278 UART: [kat] sha1
899,406 UART: [kat] SHA2-256
901,346 UART: [kat] SHA2-384
904,209 UART: [kat] SHA2-512-ACC
906,110 UART: [kat] ECC-384
915,815 UART: [kat] HMAC-384Kdf
920,397 UART: [kat] LMS
1,168,709 UART: [kat] --
1,169,328 UART: [cold-reset] ++
1,169,850 UART: [fht] FHT @ 0x50003400
1,172,690 UART: [idev] ++
1,172,858 UART: [idev] CDI.KEYID = 6
1,173,219 UART: [idev] SUBJECT.KEYID = 7
1,173,644 UART: [idev] UDS.KEYID = 0
1,173,990 ready_for_fw is high
1,173,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,639 UART: [idev] Erasing UDS.KEYID = 0
1,198,619 UART: [idev] Sha1 KeyId Algorithm
1,207,485 UART: [idev] --
1,208,428 UART: [ldev] ++
1,208,596 UART: [ldev] CDI.KEYID = 6
1,208,960 UART: [ldev] SUBJECT.KEYID = 5
1,209,387 UART: [ldev] AUTHORITY.KEYID = 7
1,209,850 UART: [ldev] FE.KEYID = 1
1,214,610 UART: [ldev] Erasing FE.KEYID = 1
1,240,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,574 UART: [ldev] --
1,280,015 UART: [fwproc] Wait for Commands...
1,280,632 UART: [fwproc] Recv command 0x46574c44
1,281,365 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,962 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,947 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,122 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,403 >>> mbox cmd response: success
2,825,473 UART: [afmc] ++
2,825,641 UART: [afmc] CDI.KEYID = 6
2,826,004 UART: [afmc] SUBJECT.KEYID = 7
2,826,430 UART: [afmc] AUTHORITY.KEYID = 5
2,862,623 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,813 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,523 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,404 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,105 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,950 UART: [afmc] --
2,905,867 UART: [cold-reset] --
2,906,791 UART: [state] Locking Datavault
2,908,030 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,634 UART: [state] Locking ICCM
2,909,072 UART: [exit] Launching FMC @ 0x40000130
2,914,402 UART:
2,914,418 UART: Running Caliptra FMC ...
2,914,826 UART:
2,914,880 UART: [state] CFI Enabled
2,925,224 UART: [fht] FMC Alias Private Key: 7
3,044,114 UART: [art] Extend RT PCRs Done
3,044,542 UART: [art] Lock RT PCRs Done
3,046,106 UART: [art] Populate DV Done
3,054,195 UART: [fht] FMC Alias Private Key: 7
3,055,353 UART: [art] Derive CDI
3,055,633 UART: [art] Store in slot 0x4
3,141,870 UART: [art] Derive Key Pair
3,142,230 UART: [art] Store priv key in slot 0x5
3,156,108 UART: [art] Derive Key Pair - Done
3,170,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,755 UART: [art] PUB.X = 70C0ED9BE39D9D1814EEF62E4F41B16EE822D607826F1433E21A41DBDB6BCBE0BF1FDD06BADCF76B856A5E474CC9322A
3,193,543 UART: [art] PUB.Y = A476A2D8D8FC722C0EF2F4857BD038D64BF41843E21ABCF25C4F82635329FC6F00F5307E12D3E3456DCC108A7F164057
3,200,474 UART: [art] SIG.R = CF6A4E840FD62AD1150D42302AF1604E776E793CD50391E92462A2FFC984F091DF37E0B1C120B9C67E18F3EE966682AB
3,207,241 UART: [art] SIG.S = 31457CBE8DE0783D80F2A68CBDF0759FC72DC152F5F8D3446E65B2BCDBC158B7965E392FE55B0893254162365CA436B3
3,231,192 UART: Caliptra RT
3,231,443 UART: [state] CFI Enabled
3,350,498 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,352 ready_for_fw is high
1,059,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,442 >>> mbox cmd response: success
2,740,853 UART:
2,740,869 UART: Running Caliptra FMC ...
2,741,277 UART:
2,741,331 UART: [state] CFI Enabled
2,751,891 UART: [fht] FMC Alias Private Key: 7
2,870,729 UART: [art] Extend RT PCRs Done
2,871,157 UART: [art] Lock RT PCRs Done
2,872,477 UART: [art] Populate DV Done
2,880,894 UART: [fht] FMC Alias Private Key: 7
2,882,050 UART: [art] Derive CDI
2,882,330 UART: [art] Store in slot 0x4
2,967,899 UART: [art] Derive Key Pair
2,968,259 UART: [art] Store priv key in slot 0x5
2,981,651 UART: [art] Derive Key Pair - Done
2,996,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,853 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,618 UART: [art] PUB.X = 2DD320346CD5B99F7F962B4ACE02FA03FF3D3AB6B7C1B4DCCD222C1D3EF1A1C6E3322C3187DF0BA0AC586B3EEAD877CE
3,019,409 UART: [art] PUB.Y = CBC869574E644B2C26C99CAAAF2FE1A98DCC130D449F5EB86231CD27EE29ADC07DC2EC971E9CFE1C71E29CDFC5EC1617
3,026,384 UART: [art] SIG.R = 10F172C9EB3AD8A0F4F606EB40E686CD38DB56C2E7E93FD8D10573E49F0642918DFB86E92EBB6BADC5A2966E714DA7F3
3,033,163 UART: [art] SIG.S = EEA029662AF00721C09874BB021D612817EC406ABF66DC37558E0514F541D401C546C856257EC3A5051CBDE47ED4DD4A
3,057,362 UART: Caliptra RT
3,057,613 UART: [state] CFI Enabled
3,178,142 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,509 UART: [kat] ++
895,661 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,538 UART: [kat] HMAC-384Kdf
921,168 UART: [kat] LMS
1,169,480 UART: [kat] --
1,170,501 UART: [cold-reset] ++
1,170,857 UART: [fht] FHT @ 0x50003400
1,173,611 UART: [idev] ++
1,173,779 UART: [idev] CDI.KEYID = 6
1,174,140 UART: [idev] SUBJECT.KEYID = 7
1,174,565 UART: [idev] UDS.KEYID = 0
1,174,911 ready_for_fw is high
1,174,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,632 UART: [idev] Erasing UDS.KEYID = 0
1,200,146 UART: [idev] Sha1 KeyId Algorithm
1,209,032 UART: [idev] --
1,210,135 UART: [ldev] ++
1,210,303 UART: [ldev] CDI.KEYID = 6
1,210,667 UART: [ldev] SUBJECT.KEYID = 5
1,211,094 UART: [ldev] AUTHORITY.KEYID = 7
1,211,557 UART: [ldev] FE.KEYID = 1
1,216,931 UART: [ldev] Erasing FE.KEYID = 1
1,242,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,287 UART: [ldev] --
1,281,610 UART: [fwproc] Wait for Commands...
1,282,291 UART: [fwproc] Recv command 0x46574c44
1,283,024 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,680 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,855 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,158 >>> mbox cmd response: success
2,827,316 UART: [afmc] ++
2,827,484 UART: [afmc] CDI.KEYID = 6
2,827,847 UART: [afmc] SUBJECT.KEYID = 7
2,828,273 UART: [afmc] AUTHORITY.KEYID = 5
2,863,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,686 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,396 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,277 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,978 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,859 UART: [afmc] --
2,906,868 UART: [cold-reset] --
2,907,598 UART: [state] Locking Datavault
2,908,639 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,243 UART: [state] Locking ICCM
2,909,769 UART: [exit] Launching FMC @ 0x40000130
2,915,099 UART:
2,915,115 UART: Running Caliptra FMC ...
2,915,523 UART:
2,915,666 UART: [state] CFI Enabled
2,926,350 UART: [fht] FMC Alias Private Key: 7
3,045,024 UART: [art] Extend RT PCRs Done
3,045,452 UART: [art] Lock RT PCRs Done
3,047,190 UART: [art] Populate DV Done
3,055,237 UART: [fht] FMC Alias Private Key: 7
3,056,365 UART: [art] Derive CDI
3,056,645 UART: [art] Store in slot 0x4
3,142,222 UART: [art] Derive Key Pair
3,142,582 UART: [art] Store priv key in slot 0x5
3,156,380 UART: [art] Derive Key Pair - Done
3,171,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,674 UART: [art] PUB.X = 7E05565DA5C8B8C90B293C43AA10C76D3E86A54AE041DF39EBA911845DC60116694FA04285AB0A97F12EECCAC10D4E5B
3,194,443 UART: [art] PUB.Y = 8ED3DB6DD9A5993B97593609896721971401D7F203212C4682B2C7DA70B548A415422A273FAA19AC8B5CA22AB5AD10EF
3,201,386 UART: [art] SIG.R = 0FE04E64D707D6311EA9C7E15FAB9F4BEB53E196CB2683F0C46909D1B4DE232B913871AE68383EDEEB86EBDB6D4B1D1B
3,208,167 UART: [art] SIG.S = 5C55592C6C243144C03AABAA10DC1DF8AB323274B0AD4AFADFE32E568C2C4A7DCE9F12A949E88BC6F326AC2164BEFCC6
3,231,689 UART: Caliptra RT
3,232,032 UART: [state] CFI Enabled
3,351,882 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,249 ready_for_fw is high
1,060,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,825 >>> mbox cmd response: success
2,743,090 UART:
2,743,106 UART: Running Caliptra FMC ...
2,743,514 UART:
2,743,657 UART: [state] CFI Enabled
2,754,263 UART: [fht] FMC Alias Private Key: 7
2,873,531 UART: [art] Extend RT PCRs Done
2,873,959 UART: [art] Lock RT PCRs Done
2,875,467 UART: [art] Populate DV Done
2,883,860 UART: [fht] FMC Alias Private Key: 7
2,884,798 UART: [art] Derive CDI
2,885,078 UART: [art] Store in slot 0x4
2,970,557 UART: [art] Derive Key Pair
2,970,917 UART: [art] Store priv key in slot 0x5
2,984,451 UART: [art] Derive Key Pair - Done
2,998,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,364 UART: [art] PUB.X = DB7D6938087468E61C4A3DBDB09AD92B2642726CEBACEB9E9C2D9096807CCDB90E46E6A27734090E798B52FB29E06AE1
3,022,134 UART: [art] PUB.Y = 0F95E8FAA53C67A8C2B12DAC6927FA08CCB5A290E50C19A4A7E39214851BE96C270BCFED9D33F8941CF0D5193073D13D
3,029,086 UART: [art] SIG.R = 7DB544C7D0CFD3FC454E9AE0EA8C902B6BEFBB3733A5F3B6636A3C4B3C7DD6385BC24A22711949056D05BCA71232F972
3,035,864 UART: [art] SIG.S = D6FE88C3974B4BE1E8BD56BF8C21938CFCDC01EBEDED3C62C36A55707A2D322F99D9C8E5A7D32AEF4B2433CD9E1A49CC
3,059,379 UART: Caliptra RT
3,059,722 UART: [state] CFI Enabled
3,179,753 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
893,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,397 UART: [kat] ++
897,549 UART: [kat] sha1
901,603 UART: [kat] SHA2-256
903,543 UART: [kat] SHA2-384
906,288 UART: [kat] SHA2-512-ACC
908,189 UART: [kat] ECC-384
917,814 UART: [kat] HMAC-384Kdf
922,416 UART: [kat] LMS
1,170,744 UART: [kat] --
1,171,601 UART: [cold-reset] ++
1,172,081 UART: [fht] FHT @ 0x50003400
1,174,836 UART: [idev] ++
1,175,004 UART: [idev] CDI.KEYID = 6
1,175,364 UART: [idev] SUBJECT.KEYID = 7
1,175,788 UART: [idev] UDS.KEYID = 0
1,176,133 ready_for_fw is high
1,176,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,974 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,773 UART: [idev] --
1,210,021 UART: [ldev] ++
1,210,189 UART: [ldev] CDI.KEYID = 6
1,210,552 UART: [ldev] SUBJECT.KEYID = 5
1,210,978 UART: [ldev] AUTHORITY.KEYID = 7
1,211,441 UART: [ldev] FE.KEYID = 1
1,216,529 UART: [ldev] Erasing FE.KEYID = 1
1,243,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,155 UART: [ldev] --
1,282,586 UART: [fwproc] Wait for Commands...
1,283,312 UART: [fwproc] Recv command 0x46574c44
1,284,040 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,902 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,072 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,277 >>> mbox cmd response: success
2,828,533 UART: [afmc] ++
2,828,701 UART: [afmc] CDI.KEYID = 6
2,829,063 UART: [afmc] SUBJECT.KEYID = 7
2,829,488 UART: [afmc] AUTHORITY.KEYID = 5
2,864,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,374 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,122 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,831 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,714 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,415 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,315 UART: [afmc] --
2,908,299 UART: [cold-reset] --
2,909,155 UART: [state] Locking Datavault
2,910,142 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,746 UART: [state] Locking ICCM
2,911,166 UART: [exit] Launching FMC @ 0x40000130
2,916,496 UART:
2,916,512 UART: Running Caliptra FMC ...
2,916,920 UART:
2,916,974 UART: [state] CFI Enabled
2,927,222 UART: [fht] FMC Alias Private Key: 7
3,046,060 UART: [art] Extend RT PCRs Done
3,046,488 UART: [art] Lock RT PCRs Done
3,048,048 UART: [art] Populate DV Done
3,056,599 UART: [fht] FMC Alias Private Key: 7
3,057,709 UART: [art] Derive CDI
3,057,989 UART: [art] Store in slot 0x4
3,143,470 UART: [art] Derive Key Pair
3,143,830 UART: [art] Store priv key in slot 0x5
3,157,404 UART: [art] Derive Key Pair - Done
3,172,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,923 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,688 UART: [art] PUB.X = BE7E92926267C64384431A3F8649B74CD15C1F824614C9CEAB3ED3C2446D5946DEFD0268DA806060B30AA9B279F2F60E
3,195,453 UART: [art] PUB.Y = D2F4D2D44530E7A2F94EBCF2FB25954E393385D2D6412D26AEBB5EEAB4A5A41B13A1D8827671D379FD21CF2A6808E398
3,202,412 UART: [art] SIG.R = 541261AF6F7E518485184CFE179BDD22A9E4AD175B06AFFF9A4775688EC46C9FD08330CA0F51902AC9173C2E5EF4F5F5
3,209,186 UART: [art] SIG.S = 24A2D9DFED92A3FC38B5EA3E2FD1E3CEB769BC129EE70D7722EAC5B66EA4100AF6F40A9AA7797D1265BCB0BB8B7EDCBB
3,233,335 UART: Caliptra RT
3,233,586 UART: [state] CFI Enabled
3,353,646 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,257 ready_for_fw is high
1,060,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,100 >>> mbox cmd response: success
2,741,541 UART:
2,741,557 UART: Running Caliptra FMC ...
2,741,965 UART:
2,742,019 UART: [state] CFI Enabled
2,752,199 UART: [fht] FMC Alias Private Key: 7
2,871,515 UART: [art] Extend RT PCRs Done
2,871,943 UART: [art] Lock RT PCRs Done
2,873,639 UART: [art] Populate DV Done
2,881,808 UART: [fht] FMC Alias Private Key: 7
2,882,778 UART: [art] Derive CDI
2,883,058 UART: [art] Store in slot 0x4
2,969,009 UART: [art] Derive Key Pair
2,969,369 UART: [art] Store priv key in slot 0x5
2,983,135 UART: [art] Derive Key Pair - Done
2,997,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,851 UART: [art] PUB.X = 60790962F5E64D27733FFD3AE1763F75DB00AB77139A107801E07C65E4640F6DFF4E0183F817147FDC647C4CBAB0FD67
3,020,591 UART: [art] PUB.Y = 7E278251244A81FF00D382A4CD0A7E324F8259D82924C0AC29BE819D88A832110768018DEE2F109AFE35B260CD7CD8A6
3,027,512 UART: [art] SIG.R = 1E5C72121C327F23BEEED3F3B2402761B9C6091561D95B84B06F59D4F946B858C7070051985E3BDF2C63153C762E6831
3,034,248 UART: [art] SIG.S = CA6785DD769089D2270147F92C8405DFCE57B4FA51ED95F372C77C7481DA26EB6075ABAE174E8E334D27FD2D2F87843B
3,057,980 UART: Caliptra RT
3,058,231 UART: [state] CFI Enabled
3,178,456 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [kat] SHA2-256
893,411 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,536 UART: [kat] ++
897,688 UART: [kat] sha1
901,964 UART: [kat] SHA2-256
903,904 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,395 UART: [kat] HMAC-384Kdf
922,819 UART: [kat] LMS
1,171,147 UART: [kat] --
1,171,972 UART: [cold-reset] ++
1,172,536 UART: [fht] FHT @ 0x50003400
1,175,229 UART: [idev] ++
1,175,397 UART: [idev] CDI.KEYID = 6
1,175,757 UART: [idev] SUBJECT.KEYID = 7
1,176,181 UART: [idev] UDS.KEYID = 0
1,176,526 ready_for_fw is high
1,176,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,321 UART: [idev] Erasing UDS.KEYID = 0
1,201,926 UART: [idev] Sha1 KeyId Algorithm
1,210,302 UART: [idev] --
1,211,386 UART: [ldev] ++
1,211,554 UART: [ldev] CDI.KEYID = 6
1,211,917 UART: [ldev] SUBJECT.KEYID = 5
1,212,343 UART: [ldev] AUTHORITY.KEYID = 7
1,212,806 UART: [ldev] FE.KEYID = 1
1,217,822 UART: [ldev] Erasing FE.KEYID = 1
1,244,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,506 UART: [ldev] --
1,283,919 UART: [fwproc] Wait for Commands...
1,284,713 UART: [fwproc] Recv command 0x46574c44
1,285,441 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,653 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,823 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,058 >>> mbox cmd response: success
2,831,070 UART: [afmc] ++
2,831,238 UART: [afmc] CDI.KEYID = 6
2,831,600 UART: [afmc] SUBJECT.KEYID = 7
2,832,025 UART: [afmc] AUTHORITY.KEYID = 5
2,867,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,463 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,172 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,055 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,756 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,492 UART: [afmc] --
2,910,604 UART: [cold-reset] --
2,911,368 UART: [state] Locking Datavault
2,912,479 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,083 UART: [state] Locking ICCM
2,913,743 UART: [exit] Launching FMC @ 0x40000130
2,919,073 UART:
2,919,089 UART: Running Caliptra FMC ...
2,919,497 UART:
2,919,640 UART: [state] CFI Enabled
2,930,390 UART: [fht] FMC Alias Private Key: 7
3,050,092 UART: [art] Extend RT PCRs Done
3,050,520 UART: [art] Lock RT PCRs Done
3,052,112 UART: [art] Populate DV Done
3,060,513 UART: [fht] FMC Alias Private Key: 7
3,061,593 UART: [art] Derive CDI
3,061,873 UART: [art] Store in slot 0x4
3,147,804 UART: [art] Derive Key Pair
3,148,164 UART: [art] Store priv key in slot 0x5
3,161,674 UART: [art] Derive Key Pair - Done
3,176,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,645 UART: [art] PUB.X = AA2F74B3D12825A5D4C2725FE6F3A52B7C98EE00C3F751D4AA69830A8E865D0D134DF439B37BB3AF3894DAB47B493DC2
3,199,401 UART: [art] PUB.Y = 6CEBAD5061F1945F49D9810C4DEE99D9BAC769EC1F1443F56176D8B51B2C613C58113BE33A316739DCA98676FA5DE1BC
3,206,360 UART: [art] SIG.R = 1E21F16970EE1947DE04B3DC09DD5CCCBDD1EBF7393A80C91ACB86F35AC23B5B3E49D2DEF32F53B4D165F60D50825B2A
3,213,143 UART: [art] SIG.S = C1D54FB69274E8E7A3D160B01D9BA0B4D1D80637C7EA3CEDC28CFAC7D92BAE1061F470C3FEF5C1CBB6BC8311B35AF2B5
3,237,180 UART: Caliptra RT
3,237,523 UART: [state] CFI Enabled
3,356,984 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,102 ready_for_fw is high
1,061,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,687 >>> mbox cmd response: success
2,743,886 UART:
2,743,902 UART: Running Caliptra FMC ...
2,744,310 UART:
2,744,453 UART: [state] CFI Enabled
2,755,447 UART: [fht] FMC Alias Private Key: 7
2,875,105 UART: [art] Extend RT PCRs Done
2,875,533 UART: [art] Lock RT PCRs Done
2,877,171 UART: [art] Populate DV Done
2,885,536 UART: [fht] FMC Alias Private Key: 7
2,886,568 UART: [art] Derive CDI
2,886,848 UART: [art] Store in slot 0x4
2,972,753 UART: [art] Derive Key Pair
2,973,113 UART: [art] Store priv key in slot 0x5
2,986,263 UART: [art] Derive Key Pair - Done
3,000,708 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,196 UART: [art] PUB.X = 2344C0DDB742E6A1EE081F5B196C5ED9E1A2A1CF233357397F7B2C1AFA0F03D0BB0E130766DDA3B53BFB4E9686F74D49
3,023,967 UART: [art] PUB.Y = 45346853FBBF281065BEFF929AC583BCF25917B3CF0C44E18531A092F6A55053640D2D65BEDAA538B8C763798E1F7294
3,030,913 UART: [art] SIG.R = 48D7B1C97DCE2C50EC7510EE26A60C2A87FA03204EF05786C34946B05AAE3C1DFAB1DB5243A288A40087ED4C43B6962B
3,037,667 UART: [art] SIG.S = D04AE6C1220E43E62702BFC623D2FB5D7073CEBF5EDA4D2AF846A4A0C74E8564FF90215AE44532BC3213B50178011632
3,061,681 UART: Caliptra RT
3,062,024 UART: [state] CFI Enabled
3,182,993 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
Truncated 1330315 bytes from beginning
UART: [exit] Launching FMC @ 0x40000130
3,711,946,423 UART:
3,711,946,662 UART: Running Caliptra FMC ...
3,711,947,690 UART:
3,711,947,843 UART: [state] CFI Enabled
3,712,053,791 UART: [art] Extend RT PCRs Done
3,712,054,990 UART: [art] Lock RT PCRs Done
3,712,056,204 UART: [art] Populate DV Done
3,712,061,730 UART: [fht] FMC Alias Private Key: 7
3,712,063,278 UART: [art] Derive CDI
3,712,064,099 UART: [art] Store in slot 0x4
3,712,122,763 UART: [art] Derive Key Pair
3,712,123,807 UART: [art] Store priv key in slot 0x5
3,715,416,466 UART: [art] Derive Key Pair - Done
3,715,429,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,717,718,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,717,720,145 UART: [art] PUB.X = 4CA2989206C4D86C05F11C4160BBA7423863BD4E90C9FE25514733EDF438DFBFF261355D5273703C5B4B507E75A9DB66
3,717,727,374 UART: [art] PUB.Y = DA4EB36B42FAE2A4ED0FBB8D979ED17B4DF31C46BF270D96F961C3D526791A1F954EF6292752164A351B6ED3251E50B9
3,717,734,627 UART: [art] SIG.R = B33C608D3BBA1F1ECE31DCD7B38134C807AB7D334B8EC97B54F2F986893A76888B3650F21A8E57FE0A3A2F0994A11B15
3,717,742,048 UART: [art] SIG.S = 9F93C4239ABD6AFA13658BA6B0AA6738028F38674E2B0ECEB8C18426865721A0065669E16F8C8AE3C690A4B1DF4F61C5
3,719,047,003 UART: Caliptra RT
3,719,047,732 UART: [state] CFI Enabled
3,719,462,994 UART: [rt] RT listening for mailbox commands...
3,719,464,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,719,614,856 UART:
3,719,615,165 UART: Running Caliptra ROM ...
3,719,616,206 UART:
3,719,616,358 UART: [state] CFI Enabled
3,719,681,012 UART: [state] LifecycleState = Unprovisioned
3,719,682,955 UART: [state] DebugLocked = No
3,719,685,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,719,690,197 UART: [kat] SHA2-256
3,719,859,921 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,719,870,411 UART: [kat] ++
3,719,870,872 UART: [kat] sha1
3,719,881,376 UART: [kat] SHA2-256
3,719,884,069 UART: [kat] SHA2-384
3,719,890,065 UART: [kat] SHA2-512-ACC
3,719,892,418 UART: [kat] ECC-384
3,722,184,255 UART: [kat] HMAC-384Kdf
3,722,217,648 UART: [kat] LMS
3,723,408,024 UART: [kat] --
3,723,412,523 UART: [update-reset] ++
3,727,616,812 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,727,621,405 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,728,019,170 >>> mbox cmd response: success
3,728,019,555 UART: [update-reset] Copying MAN_2 To MAN_1
3,728,041,890 UART: [update-reset Success] --
3,728,046,294 UART: [state] Locking Datavault
3,728,049,670 UART: [state] Locking PCR0, PCR1 and PCR31
3,728,051,380 UART: [state] Locking ICCM
3,728,053,646 UART: [exit] Launching FMC @ 0x40000130
3,728,062,107 UART:
3,728,062,351 UART: Running Caliptra FMC ...
3,728,063,458 UART:
3,728,063,644 UART: [state] CFI Enabled
3,728,161,030 UART: [art] Extend RT PCRs Done
3,728,162,220 UART: [art] Lock RT PCRs Done
3,728,163,355 UART: [art] Populate DV Done
3,728,168,979 UART: [fht] FMC Alias Private Key: 7
3,728,170,526 UART: [art] Derive CDI
3,728,171,347 UART: [art] Store in slot 0x4
3,728,230,016 UART: [art] Derive Key Pair
3,728,231,348 UART: [art] Store priv key in slot 0x5
3,731,524,099 UART: [art] Derive Key Pair - Done
3,731,537,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,825,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,827,462 UART: [art] PUB.X = 11B17116113EE00FDD179B5A2C0F3099E5A63E5C18A5A9DB050336D89E95F1C86B418CD98B342C8CFB80B7211C18D870
3,733,834,752 UART: [art] PUB.Y = 376D2BFAFF0B4A2BDE9E091BA56E926CFFB23CDA811E8BCB43EBA9B223FC0840E5F388F5EABF47569ABDBB1A6C979BDE
3,733,842,038 UART: [art] SIG.R = 4ED02C4F34E260BAF8C0D5E04E1217209A09D732428509DB3245423648DAE17B01F3165ADEB94DF9B93FA180BB6B9954
3,733,849,421 UART: [art] SIG.S = A014584A13869BBE965E5976EC500BE6A2CF2916C40625ACAEBDC95A5C9D27F522B5E8F4D4EADC21FBDF93F7C378C913
3,735,154,466 UART: Caliptra RT
3,735,155,165 UART: [state] CFI Enabled
3,735,569,491 UART: [rt] RT listening for mailbox commands...
3,735,571,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,735,721,322 UART:
3,735,721,631 UART: Running Caliptra ROM ...
3,735,722,750 UART:
3,735,722,916 UART: [state] CFI Enabled
3,735,789,622 UART: [state] LifecycleState = Unprovisioned
3,735,791,556 UART: [state] DebugLocked = No
3,735,792,839 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,735,797,420 UART: [kat] SHA2-256
3,735,967,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,735,977,543 UART: [kat] ++
3,735,978,083 UART: [kat] sha1
3,735,989,581 UART: [kat] SHA2-256
3,735,992,291 UART: [kat] SHA2-384
3,735,997,311 UART: [kat] SHA2-512-ACC
3,735,999,716 UART: [kat] ECC-384
3,738,293,186 UART: [kat] HMAC-384Kdf
3,738,323,922 UART: [kat] LMS
3,739,514,285 UART: [kat] --
3,739,518,513 UART: [update-reset] ++
3,743,696,980 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,743,700,171 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,744,097,925 >>> mbox cmd response: success
3,744,098,843 UART: [update-reset] Copying MAN_2 To MAN_1
3,744,121,292 UART: [update-reset Success] --
3,744,125,682 UART: [state] Locking Datavault
3,744,128,393 UART: [state] Locking PCR0, PCR1 and PCR31
3,744,130,159 UART: [state] Locking ICCM
3,744,132,799 UART: [exit] Launching FMC @ 0x40000130
3,744,141,272 UART:
3,744,141,510 UART: Running Caliptra FMC ...
3,744,142,612 UART:
3,744,142,779 UART: [state] CFI Enabled
3,744,245,669 UART: [art] Extend RT PCRs Done
3,744,246,868 UART: [art] Lock RT PCRs Done
3,744,248,285 UART: [art] Populate DV Done
3,744,253,859 UART: [fht] FMC Alias Private Key: 7
3,744,255,399 UART: [art] Derive CDI
3,744,256,215 UART: [art] Store in slot 0x4
3,744,314,986 UART: [art] Derive Key Pair
3,744,315,987 UART: [art] Store priv key in slot 0x5
3,747,608,467 UART: [art] Derive Key Pair - Done
3,747,621,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,749,909,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,749,911,207 UART: [art] PUB.X = 4CA2989206C4D86C05F11C4160BBA7423863BD4E90C9FE25514733EDF438DFBFF261355D5273703C5B4B507E75A9DB66
3,749,918,443 UART: [art] PUB.Y = DA4EB36B42FAE2A4ED0FBB8D979ED17B4DF31C46BF270D96F961C3D526791A1F954EF6292752164A351B6ED3251E50B9
3,749,925,693 UART: [art] SIG.R = B33C608D3BBA1F1ECE31DCD7B38134C807AB7D334B8EC97B54F2F986893A76888B3650F21A8E57FE0A3A2F0994A11B15
3,749,933,123 UART: [art] SIG.S = 9F93C4239ABD6AFA13658BA6B0AA6738028F38674E2B0ECEB8C18426865721A0065669E16F8C8AE3C690A4B1DF4F61C5
3,751,237,759 UART: Caliptra RT
3,751,238,465 UART: [state] CFI Enabled
3,751,654,884 UART: [rt] RT listening for mailbox commands...
3,751,656,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,751,806,531 UART:
3,751,806,834 UART: Running Caliptra ROM ...
3,751,807,956 UART:
3,751,808,120 UART: [state] CFI Enabled
3,751,872,089 UART: [state] LifecycleState = Unprovisioned
3,751,874,055 UART: [state] DebugLocked = No
3,751,876,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,751,881,980 UART: [kat] SHA2-256
3,752,051,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,752,062,195 UART: [kat] ++
3,752,062,744 UART: [kat] sha1
3,752,073,481 UART: [kat] SHA2-256
3,752,076,176 UART: [kat] SHA2-384
3,752,081,197 UART: [kat] SHA2-512-ACC
3,752,083,594 UART: [kat] ECC-384
3,754,374,913 UART: [kat] HMAC-384Kdf
3,754,408,103 UART: [kat] LMS
3,755,598,452 UART: [kat] --
3,755,602,380 UART: [update-reset] ++
3,759,788,778 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,759,792,839 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,760,190,563 >>> mbox cmd response: success
3,760,192,312 UART: [update-reset] Copying MAN_2 To MAN_1
3,760,214,716 UART: [update-reset Success] --
3,760,220,414 UART: [state] Locking Datavault
3,760,222,882 UART: [state] Locking PCR0, PCR1 and PCR31
3,760,224,585 UART: [state] Locking ICCM
3,760,226,199 UART: [exit] Launching FMC @ 0x40000130
3,760,234,657 UART:
3,760,234,895 UART: Running Caliptra FMC ...
3,760,236,001 UART:
3,760,236,173 UART: [state] CFI Enabled
3,760,326,999 UART: [art] Extend RT PCRs Done
3,760,328,193 UART: [art] Lock RT PCRs Done
3,760,329,604 UART: [art] Populate DV Done
3,760,334,854 UART: [fht] FMC Alias Private Key: 7
3,760,336,443 UART: [art] Derive CDI
3,760,337,262 UART: [art] Store in slot 0x4
3,760,396,192 UART: [art] Derive Key Pair
3,760,397,193 UART: [art] Store priv key in slot 0x5
3,763,689,443 UART: [art] Derive Key Pair - Done
3,763,702,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,765,990,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,765,992,120 UART: [art] PUB.X = 11B17116113EE00FDD179B5A2C0F3099E5A63E5C18A5A9DB050336D89E95F1C86B418CD98B342C8CFB80B7211C18D870
3,765,999,415 UART: [art] PUB.Y = 376D2BFAFF0B4A2BDE9E091BA56E926CFFB23CDA811E8BCB43EBA9B223FC0840E5F388F5EABF47569ABDBB1A6C979BDE
3,766,006,689 UART: [art] SIG.R = 4ED02C4F34E260BAF8C0D5E04E1217209A09D732428509DB3245423648DAE17B01F3165ADEB94DF9B93FA180BB6B9954
3,766,014,062 UART: [art] SIG.S = A014584A13869BBE965E5976EC500BE6A2CF2916C40625ACAEBDC95A5C9D27F522B5E8F4D4EADC21FBDF93F7C378C913
3,767,319,186 UART: Caliptra RT
3,767,319,901 UART: [state] CFI Enabled
3,767,737,424 UART: [rt] RT listening for mailbox commands...
3,767,739,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,767,889,071 UART:
3,767,889,381 UART: Running Caliptra ROM ...
3,767,890,418 UART:
3,767,890,570 UART: [state] CFI Enabled
3,767,954,382 UART: [state] LifecycleState = Unprovisioned
3,767,956,315 UART: [state] DebugLocked = No
3,767,958,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,767,962,606 UART: [kat] SHA2-256
3,768,132,322 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,768,142,824 UART: [kat] ++
3,768,143,286 UART: [kat] sha1
3,768,153,418 UART: [kat] SHA2-256
3,768,156,110 UART: [kat] SHA2-384
3,768,162,214 UART: [kat] SHA2-512-ACC
3,768,164,613 UART: [kat] ECC-384
3,770,458,525 UART: [kat] HMAC-384Kdf
3,770,488,031 UART: [kat] LMS
3,771,678,397 UART: [kat] --
3,771,682,489 UART: [update-reset] ++
3,775,875,013 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,775,878,373 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,776,276,105 >>> mbox cmd response: success
3,776,277,368 UART: [update-reset] Copying MAN_2 To MAN_1
3,776,299,820 UART: [update-reset Success] --
3,776,303,086 UART: [state] Locking Datavault
3,776,305,053 UART: [state] Locking PCR0, PCR1 and PCR31
3,776,306,765 UART: [state] Locking ICCM
3,776,309,026 UART: [exit] Launching FMC @ 0x40000130
3,776,317,435 UART:
3,776,317,672 UART: Running Caliptra FMC ...
3,776,318,894 UART:
3,776,319,467 UART: [state] CFI Enabled
3,776,410,407 UART: [art] Extend RT PCRs Done
3,776,411,607 UART: [art] Lock RT PCRs Done
3,776,413,120 UART: [art] Populate DV Done
3,776,418,581 UART: [fht] FMC Alias Private Key: 7
3,776,420,226 UART: [art] Derive CDI
3,776,421,044 UART: [art] Store in slot 0x4
3,776,479,411 UART: [art] Derive Key Pair
3,776,480,460 UART: [art] Store priv key in slot 0x5
3,779,772,586 UART: [art] Derive Key Pair - Done
3,779,785,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,782,074,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,782,076,075 UART: [art] PUB.X = 4CA2989206C4D86C05F11C4160BBA7423863BD4E90C9FE25514733EDF438DFBFF261355D5273703C5B4B507E75A9DB66
3,782,083,365 UART: [art] PUB.Y = DA4EB36B42FAE2A4ED0FBB8D979ED17B4DF31C46BF270D96F961C3D526791A1F954EF6292752164A351B6ED3251E50B9
3,782,090,649 UART: [art] SIG.R = B33C608D3BBA1F1ECE31DCD7B38134C807AB7D334B8EC97B54F2F986893A76888B3650F21A8E57FE0A3A2F0994A11B15
3,782,098,018 UART: [art] SIG.S = 9F93C4239ABD6AFA13658BA6B0AA6738028F38674E2B0ECEB8C18426865721A0065669E16F8C8AE3C690A4B1DF4F61C5
3,783,403,388 UART: Caliptra RT
3,783,404,104 UART: [state] CFI Enabled
3,783,822,501 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 404.27s
Truncated 698673 bytes from beginning
= 7
3,789,941,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,789,942,591 UART: [art] PUB.X = 6B3DDBC798229DD1C125C3162439C315B7256553EBA1C5AB17A1F29593DA04984A3F6899A7FA0A4D4A5E2B7BB7A969B3
3,789,949,890 UART: [art] PUB.Y = 306C0F2D47D1DEBA678E402AC23841258447302E7D8EE19D32C677247F7D6DBDFFAF273227ACE4BFFEA19196F9363C1C
3,789,957,088 UART: [art] SIG.R = 8910FB81B170DD8FC7675AF555537B5ECF66A50A9F940CEE794B27A96E9FBEE3C7255AA4B72317D3E91FE41A357A950E
3,789,964,520 UART: [art] SIG.S = C3CB23AEF0EA2AACD9ABFC03E83D46B07523A0EF1D84C0E27EF830FA9FA12F828EC1ADE7DF75FABD059B1618CE656A6C
3,791,270,452 UART: Caliptra RT
3,791,271,159 UART: [state] CFI Enabled
3,791,688,356 UART: [rt] RT listening for mailbox commands...
3,791,690,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,800,507,854 >>> mbox cmd response: success
3,800,543,070 UART:
3,800,543,374 UART: Running Caliptra FMC ...
3,800,544,418 UART:
3,800,544,571 UART: [state] CFI Enabled
3,800,636,294 UART: [art] Extend RT PCRs Done
3,800,637,497 UART: [art] Lock RT PCRs Done
3,800,638,933 UART: [art] Populate DV Done
3,800,644,244 UART: [fht] FMC Alias Private Key: 7
3,800,645,943 UART: [art] Derive CDI
3,800,646,690 UART: [art] Store in slot 0x4
3,800,705,121 UART: [art] Derive Key Pair
3,800,706,163 UART: [art] Store priv key in slot 0x5
3,803,998,979 UART: [art] Derive Key Pair - Done
3,804,011,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,806,299,347 UART: [art] Erasing AUTHORITY.KEYID = 7
3,806,300,860 UART: [art] PUB.X = A833CDD0A5F19650EAE553F0B02A825541EFB378EBF818A5ED366E5F444BBBCB51A262A1D3562BE8AD2401749E964077
3,806,308,127 UART: [art] PUB.Y = FD2FA3F17527DB89532E414D51DF16AC30798B227351EAAB96F65E7F463A173EE7CDA1F091617CFF96D12F831A66C1F3
3,806,315,427 UART: [art] SIG.R = C7E47081419A3751F8F36EE24A56797134A5FEEA846E5E2937D4F8D59A2037567FB859719896768C51ECC57B9F825610
3,806,322,777 UART: [art] SIG.S = A85FA726B656E70E8B63FB4DCD4973BDD966A6AC819772C2CC0329DD973754AC461BA0D7CAD3B6AE248AAFC8BBA516F1
3,807,627,778 UART: Caliptra RT
3,807,628,531 UART: [state] CFI Enabled
3,808,042,936 UART: [rt] RT listening for mailbox commands...
3,808,044,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,816,852,821 >>> mbox cmd response: success
3,816,889,192 UART:
3,816,889,503 UART: Running Caliptra FMC ...
3,816,890,650 UART:
3,816,890,820 UART: [state] CFI Enabled
3,816,996,188 UART: [art] Extend RT PCRs Done
3,816,997,377 UART: [art] Lock RT PCRs Done
3,816,998,679 UART: [art] Populate DV Done
3,817,004,147 UART: [fht] FMC Alias Private Key: 7
3,817,005,819 UART: [art] Derive CDI
3,817,006,646 UART: [art] Store in slot 0x4
3,817,064,776 UART: [art] Derive Key Pair
3,817,065,826 UART: [art] Store priv key in slot 0x5
3,820,358,416 UART: [art] Derive Key Pair - Done
3,820,371,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,822,660,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,822,662,205 UART: [art] PUB.X = 6B3DDBC798229DD1C125C3162439C315B7256553EBA1C5AB17A1F29593DA04984A3F6899A7FA0A4D4A5E2B7BB7A969B3
3,822,669,421 UART: [art] PUB.Y = 306C0F2D47D1DEBA678E402AC23841258447302E7D8EE19D32C677247F7D6DBDFFAF273227ACE4BFFEA19196F9363C1C
3,822,676,728 UART: [art] SIG.R = 8910FB81B170DD8FC7675AF555537B5ECF66A50A9F940CEE794B27A96E9FBEE3C7255AA4B72317D3E91FE41A357A950E
3,822,684,152 UART: [art] SIG.S = C3CB23AEF0EA2AACD9ABFC03E83D46B07523A0EF1D84C0E27EF830FA9FA12F828EC1ADE7DF75FABD059B1618CE656A6C
3,823,988,738 UART: Caliptra RT
3,823,989,456 UART: [state] CFI Enabled
3,824,405,911 UART: [rt] RT listening for mailbox commands...
3,824,407,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,833,242,743 >>> mbox cmd response: success
3,833,277,737 UART:
3,833,278,041 UART: Running Caliptra FMC ...
3,833,279,174 UART:
3,833,279,348 UART: [state] CFI Enabled
3,833,377,343 UART: [art] Extend RT PCRs Done
3,833,378,527 UART: [art] Lock RT PCRs Done
3,833,379,940 UART: [art] Populate DV Done
3,833,385,404 UART: [fht] FMC Alias Private Key: 7
3,833,387,105 UART: [art] Derive CDI
3,833,387,921 UART: [art] Store in slot 0x4
3,833,445,793 UART: [art] Derive Key Pair
3,833,446,861 UART: [art] Store priv key in slot 0x5
3,836,739,601 UART: [art] Derive Key Pair - Done
3,836,752,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,839,040,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,839,041,794 UART: [art] PUB.X = A833CDD0A5F19650EAE553F0B02A825541EFB378EBF818A5ED366E5F444BBBCB51A262A1D3562BE8AD2401749E964077
3,839,049,059 UART: [art] PUB.Y = FD2FA3F17527DB89532E414D51DF16AC30798B227351EAAB96F65E7F463A173EE7CDA1F091617CFF96D12F831A66C1F3
3,839,056,318 UART: [art] SIG.R = C7E47081419A3751F8F36EE24A56797134A5FEEA846E5E2937D4F8D59A2037567FB859719896768C51ECC57B9F825610
3,839,063,676 UART: [art] SIG.S = A85FA726B656E70E8B63FB4DCD4973BDD966A6AC819772C2CC0329DD973754AC461BA0D7CAD3B6AE248AAFC8BBA516F1
3,840,369,043 UART: Caliptra RT
3,840,369,761 UART: [state] CFI Enabled
3,840,789,397 UART: [rt] RT listening for mailbox commands...
3,840,791,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,849,609,343 >>> mbox cmd response: success
3,849,643,246 UART:
3,849,643,521 UART: Running Caliptra FMC ...
3,849,644,659 UART:
3,849,644,830 UART: [state] CFI Enabled
3,849,737,183 UART: [art] Extend RT PCRs Done
3,849,738,389 UART: [art] Lock RT PCRs Done
3,849,739,958 UART: [art] Populate DV Done
3,849,745,319 UART: [fht] FMC Alias Private Key: 7
3,849,746,964 UART: [art] Derive CDI
3,849,747,777 UART: [art] Store in slot 0x4
3,849,806,005 UART: [art] Derive Key Pair
3,849,807,017 UART: [art] Store priv key in slot 0x5
3,853,099,945 UART: [art] Derive Key Pair - Done
3,853,113,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,855,401,717 UART: [art] Erasing AUTHORITY.KEYID = 7
3,855,403,228 UART: [art] PUB.X = 6B3DDBC798229DD1C125C3162439C315B7256553EBA1C5AB17A1F29593DA04984A3F6899A7FA0A4D4A5E2B7BB7A969B3
3,855,410,486 UART: [art] PUB.Y = 306C0F2D47D1DEBA678E402AC23841258447302E7D8EE19D32C677247F7D6DBDFFAF273227ACE4BFFEA19196F9363C1C
3,855,417,765 UART: [art] SIG.R = 8910FB81B170DD8FC7675AF555537B5ECF66A50A9F940CEE794B27A96E9FBEE3C7255AA4B72317D3E91FE41A357A950E
3,855,425,209 UART: [art] SIG.S = C3CB23AEF0EA2AACD9ABFC03E83D46B07523A0EF1D84C0E27EF830FA9FA12F828EC1ADE7DF75FABD059B1618CE656A6C
3,856,729,779 UART: Caliptra RT
3,856,730,492 UART: [state] CFI Enabled
3,857,148,248 UART: [rt] RT listening for mailbox commands...
3,857,150,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,865,949,491 >>> mbox cmd response: success
3,865,983,925 UART:
3,865,984,225 UART: Running Caliptra FMC ...
3,865,985,271 UART:
3,865,985,426 UART: [state] CFI Enabled
3,866,078,350 UART: [art] Extend RT PCRs Done
3,866,079,551 UART: [art] Lock RT PCRs Done
3,866,080,936 UART: [art] Populate DV Done
3,866,086,410 UART: [fht] FMC Alias Private Key: 7
3,866,087,901 UART: [art] Derive CDI
3,866,088,644 UART: [art] Store in slot 0x4
3,866,147,162 UART: [art] Derive Key Pair
3,866,148,207 UART: [art] Store priv key in slot 0x5
3,869,440,519 UART: [art] Derive Key Pair - Done
3,869,453,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,871,743,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,871,744,615 UART: [art] PUB.X = A833CDD0A5F19650EAE553F0B02A825541EFB378EBF818A5ED366E5F444BBBCB51A262A1D3562BE8AD2401749E964077
3,871,751,874 UART: [art] PUB.Y = FD2FA3F17527DB89532E414D51DF16AC30798B227351EAAB96F65E7F463A173EE7CDA1F091617CFF96D12F831A66C1F3
3,871,759,130 UART: [art] SIG.R = C7E47081419A3751F8F36EE24A56797134A5FEEA846E5E2937D4F8D59A2037567FB859719896768C51ECC57B9F825610
3,871,766,477 UART: [art] SIG.S = A85FA726B656E70E8B63FB4DCD4973BDD966A6AC819772C2CC0329DD973754AC461BA0D7CAD3B6AE248AAFC8BBA516F1
3,873,072,365 UART: Caliptra RT
3,873,073,090 UART: [state] CFI Enabled
3,873,513,888 UART: [rt] RT listening for mailbox commands...
3,873,515,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,882,333,391 >>> mbox cmd response: success
3,882,368,508 UART:
3,882,368,788 UART: Running Caliptra FMC ...
3,882,369,931 UART:
3,882,370,109 UART: [state] CFI Enabled
3,882,477,276 UART: [art] Extend RT PCRs Done
3,882,478,477 UART: [art] Lock RT PCRs Done
3,882,479,885 UART: [art] Populate DV Done
3,882,485,514 UART: [fht] FMC Alias Private Key: 7
3,882,487,211 UART: [art] Derive CDI
3,882,488,034 UART: [art] Store in slot 0x4
3,882,546,061 UART: [art] Derive Key Pair
3,882,547,114 UART: [art] Store priv key in slot 0x5
3,885,839,792 UART: [art] Derive Key Pair - Done
3,885,852,742 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,888,140,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,888,141,534 UART: [art] PUB.X = 6B3DDBC798229DD1C125C3162439C315B7256553EBA1C5AB17A1F29593DA04984A3F6899A7FA0A4D4A5E2B7BB7A969B3
3,888,148,802 UART: [art] PUB.Y = 306C0F2D47D1DEBA678E402AC23841258447302E7D8EE19D32C677247F7D6DBDFFAF273227ACE4BFFEA19196F9363C1C
3,888,156,059 UART: [art] SIG.R = 8910FB81B170DD8FC7675AF555537B5ECF66A50A9F940CEE794B27A96E9FBEE3C7255AA4B72317D3E91FE41A357A950E
3,888,163,495 UART: [art] SIG.S = C3CB23AEF0EA2AACD9ABFC03E83D46B07523A0EF1D84C0E27EF830FA9FA12F828EC1ADE7DF75FABD059B1618CE656A6C
3,889,468,652 UART: Caliptra RT
3,889,469,348 UART: [state] CFI Enabled
3,889,885,677 UART: [rt] RT listening for mailbox commands...
3,889,887,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,898,695,186 >>> mbox cmd response: success
3,898,732,367 UART:
3,898,732,670 UART: Running Caliptra FMC ...
3,898,733,720 UART:
3,898,733,875 UART: [state] CFI Enabled
3,898,832,741 UART: [art] Extend RT PCRs Done
3,898,833,940 UART: [art] Lock RT PCRs Done
3,898,835,461 UART: [art] Populate DV Done
3,898,840,662 UART: [fht] FMC Alias Private Key: 7
3,898,842,311 UART: [art] Derive CDI
3,898,843,129 UART: [art] Store in slot 0x4
3,898,902,250 UART: [art] Derive Key Pair
3,898,903,296 UART: [art] Store priv key in slot 0x5
3,902,195,876 UART: [art] Derive Key Pair - Done
3,902,208,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,904,497,155 UART: [art] Erasing AUTHORITY.KEYID = 7
3,904,498,672 UART: [art] PUB.X = A833CDD0A5F19650EAE553F0B02A825541EFB378EBF818A5ED366E5F444BBBCB51A262A1D3562BE8AD2401749E964077
3,904,505,932 UART: [art] PUB.Y = FD2FA3F17527DB89532E414D51DF16AC30798B227351EAAB96F65E7F463A173EE7CDA1F091617CFF96D12F831A66C1F3
3,904,513,177 UART: [art] SIG.R = C7E47081419A3751F8F36EE24A56797134A5FEEA846E5E2937D4F8D59A2037567FB859719896768C51ECC57B9F825610
3,904,520,581 UART: [art] SIG.S = A85FA726B656E70E8B63FB4DCD4973BDD966A6AC819772C2CC0329DD973754AC461BA0D7CAD3B6AE248AAFC8BBA516F1
3,905,826,337 UART: Caliptra RT
3,905,827,043 UART: [state] CFI Enabled
3,906,264,955 UART: [rt] RT listening for mailbox commands...
3,906,266,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,915,062,543 >>> mbox cmd response: success
3,915,097,552 UART:
3,915,097,870 UART: Running Caliptra FMC ...
3,915,099,021 UART:
3,915,099,201 UART: [state] CFI Enabled
3,915,192,183 UART: [art] Extend RT PCRs Done
3,915,193,378 UART: [art] Lock RT PCRs Done
3,915,194,998 UART: [art] Populate DV Done
3,915,200,192 UART: [fht] FMC Alias Private Key: 7
3,915,201,784 UART: [art] Derive CDI
3,915,202,600 UART: [art] Store in slot 0x4
3,915,260,942 UART: [art] Derive Key Pair
3,915,261,990 UART: [art] Store priv key in slot 0x5
3,918,554,207 UART: [art] Derive Key Pair - Done
3,918,566,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,920,855,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,920,856,914 UART: [art] PUB.X = 6B3DDBC798229DD1C125C3162439C315B7256553EBA1C5AB17A1F29593DA04984A3F6899A7FA0A4D4A5E2B7BB7A969B3
3,920,864,068 UART: [art] PUB.Y = 306C0F2D47D1DEBA678E402AC23841258447302E7D8EE19D32C677247F7D6DBDFFAF273227ACE4BFFEA19196F9363C1C
3,920,871,321 UART: [art] SIG.R = 8910FB81B170DD8FC7675AF555537B5ECF66A50A9F940CEE794B27A96E9FBEE3C7255AA4B72317D3E91FE41A357A950E
3,920,878,754 UART: [art] SIG.S = C3CB23AEF0EA2AACD9ABFC03E83D46B07523A0EF1D84C0E27EF830FA9FA12F828EC1ADE7DF75FABD059B1618CE656A6C
3,922,183,590 UART: Caliptra RT
3,922,184,300 UART: [state] CFI Enabled
3,922,601,519 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 411.20s
Truncated 1330153 bytes from beginning
UART: [exit] Launching FMC @ 0x40000130
3,594,715,853 UART:
3,594,716,084 UART: Running Caliptra FMC ...
3,594,717,182 UART:
3,594,717,338 UART: [state] CFI Enabled
3,594,762,158 UART: [art] Extend RT PCRs Done
3,594,763,343 UART: [art] Lock RT PCRs Done
3,594,764,906 UART: [art] Populate DV Done
3,594,770,094 UART: [fht] FMC Alias Private Key: 7
3,594,771,734 UART: [art] Derive CDI
3,594,772,549 UART: [art] Store in slot 0x4
3,594,815,142 UART: [art] Derive Key Pair
3,594,816,138 UART: [art] Store priv key in slot 0x5
3,598,058,049 UART: [art] Derive Key Pair - Done
3,598,071,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,600,351,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,600,352,895 UART: [art] PUB.X = 21D6685C9B48BBA9D453654CC664147EB948876D397AC9C4A188610DE6356AF1BB559A8D3F0D3BFBA036E33E92972CC7
3,600,360,183 UART: [art] PUB.Y = 55C4A8A081C6033864F65649CAE0E509958626B1ECACE0E359BA22E193F9CB1E979D431B4E1F1C2542CEC16F6A0157C3
3,600,367,442 UART: [art] SIG.R = D19A87F882166D7509AE8D9E4827837DB259B58DF588797950977F3560909DC8CC56A5E87CA96A4B40441BB390CC3D2C
3,600,374,789 UART: [art] SIG.S = 5A3A04702FACB7D7D202670854E8C2DF25B0C458F080EE8637CADE53B222B8AE23380863CFC071BBC62BDC4C827DAB51
3,601,679,915 UART: Caliptra RT
3,601,680,637 UART: [state] CFI Enabled
3,602,056,226 UART: [rt] RT listening for mailbox commands...
3,602,058,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,602,208,038 UART:
3,602,208,363 UART: Running Caliptra ROM ...
3,602,209,481 UART:
3,602,209,701 UART: [state] CFI Enabled
3,602,223,532 UART: [state] LifecycleState = Unprovisioned
3,602,225,466 UART: [state] DebugLocked = No
3,602,227,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,602,232,353 UART: [kat] SHA2-256
3,602,402,073 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,602,412,594 UART: [kat] ++
3,602,413,048 UART: [kat] sha1
3,602,424,044 UART: [kat] SHA2-256
3,602,426,740 UART: [kat] SHA2-384
3,602,432,561 UART: [kat] SHA2-512-ACC
3,602,434,958 UART: [kat] ECC-384
3,604,720,292 UART: [kat] HMAC-384Kdf
3,604,731,596 UART: [kat] LMS
3,605,921,651 UART: [kat] --
3,605,925,653 UART: [update-reset] ++
3,610,117,954 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,610,121,960 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,610,519,720 >>> mbox cmd response: success
3,610,520,519 UART: [update-reset] Copying MAN_2 To MAN_1
3,610,542,918 UART: [update-reset Success] --
3,610,547,687 UART: [state] Locking Datavault
3,610,552,122 UART: [state] Locking PCR0, PCR1 and PCR31
3,610,553,875 UART: [state] Locking ICCM
3,610,555,184 UART: [exit] Launching FMC @ 0x40000130
3,610,563,571 UART:
3,610,563,800 UART: Running Caliptra FMC ...
3,610,564,831 UART:
3,610,564,977 UART: [state] CFI Enabled
3,610,609,212 UART: [art] Extend RT PCRs Done
3,610,610,397 UART: [art] Lock RT PCRs Done
3,610,612,145 UART: [art] Populate DV Done
3,610,617,813 UART: [fht] FMC Alias Private Key: 7
3,610,619,460 UART: [art] Derive CDI
3,610,620,270 UART: [art] Store in slot 0x4
3,610,662,987 UART: [art] Derive Key Pair
3,610,664,244 UART: [art] Store priv key in slot 0x5
3,613,906,145 UART: [art] Derive Key Pair - Done
3,613,918,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,616,199,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,616,200,994 UART: [art] PUB.X = C813FD131BDCD2039DBD56090378B19C012070B65F8DDD9BD0ACAF128F7137CF321CF2AE14ED37FE3897423069BD77C6
3,616,208,261 UART: [art] PUB.Y = 34B72F7F817B6C9CFFE1974CB29CBB3B9A1225C070A8965F869A0999A182325D593B80ECB3008056734D026713615447
3,616,215,504 UART: [art] SIG.R = 5FF3D7C1541808D010D6B6A351493E2FF75CF410E698CF15A6CA9B109281FE372BFEC9AAD0D794A8CA36F98BDA4F8189
3,616,222,895 UART: [art] SIG.S = 63D95BD23AFE24F45E69275B260D0040E68B4C79D67BD0957DB12EC065EB9BF16884D070155B77CDB34A26C5BE9836BA
3,617,528,190 UART: Caliptra RT
3,617,528,906 UART: [state] CFI Enabled
3,617,903,786 UART: [rt] RT listening for mailbox commands...
3,617,905,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,055,503 UART:
3,618,055,812 UART: Running Caliptra ROM ...
3,618,056,853 UART:
3,618,057,136 UART: [state] CFI Enabled
3,618,074,709 UART: [state] LifecycleState = Unprovisioned
3,618,076,641 UART: [state] DebugLocked = No
3,618,079,074 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,618,084,558 UART: [kat] SHA2-256
3,618,254,291 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,618,264,785 UART: [kat] ++
3,618,265,237 UART: [kat] sha1
3,618,275,905 UART: [kat] SHA2-256
3,618,278,753 UART: [kat] SHA2-384
3,618,283,755 UART: [kat] SHA2-512-ACC
3,618,286,158 UART: [kat] ECC-384
3,620,571,162 UART: [kat] HMAC-384Kdf
3,620,583,875 UART: [kat] LMS
3,621,773,984 UART: [kat] --
3,621,779,234 UART: [update-reset] ++
3,625,973,794 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,625,978,162 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,626,375,918 >>> mbox cmd response: success
3,626,377,373 UART: [update-reset] Copying MAN_2 To MAN_1
3,626,399,816 UART: [update-reset Success] --
3,626,404,101 UART: [state] Locking Datavault
3,626,406,592 UART: [state] Locking PCR0, PCR1 and PCR31
3,626,408,340 UART: [state] Locking ICCM
3,626,410,355 UART: [exit] Launching FMC @ 0x40000130
3,626,418,799 UART:
3,626,419,029 UART: Running Caliptra FMC ...
3,626,420,060 UART:
3,626,420,211 UART: [state] CFI Enabled
3,626,464,169 UART: [art] Extend RT PCRs Done
3,626,465,356 UART: [art] Lock RT PCRs Done
3,626,466,671 UART: [art] Populate DV Done
3,626,472,312 UART: [fht] FMC Alias Private Key: 7
3,626,474,009 UART: [art] Derive CDI
3,626,474,751 UART: [art] Store in slot 0x4
3,626,516,798 UART: [art] Derive Key Pair
3,626,517,792 UART: [art] Store priv key in slot 0x5
3,629,760,122 UART: [art] Derive Key Pair - Done
3,629,773,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,632,053,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,632,055,195 UART: [art] PUB.X = 21D6685C9B48BBA9D453654CC664147EB948876D397AC9C4A188610DE6356AF1BB559A8D3F0D3BFBA036E33E92972CC7
3,632,062,465 UART: [art] PUB.Y = 55C4A8A081C6033864F65649CAE0E509958626B1ECACE0E359BA22E193F9CB1E979D431B4E1F1C2542CEC16F6A0157C3
3,632,069,717 UART: [art] SIG.R = D19A87F882166D7509AE8D9E4827837DB259B58DF588797950977F3560909DC8CC56A5E87CA96A4B40441BB390CC3D2C
3,632,077,117 UART: [art] SIG.S = 5A3A04702FACB7D7D202670854E8C2DF25B0C458F080EE8637CADE53B222B8AE23380863CFC071BBC62BDC4C827DAB51
3,633,382,354 UART: Caliptra RT
3,633,383,066 UART: [state] CFI Enabled
3,633,758,301 UART: [rt] RT listening for mailbox commands...
3,633,760,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,633,909,899 UART:
3,633,910,208 UART: Running Caliptra ROM ...
3,633,911,243 UART:
3,633,911,556 UART: [state] CFI Enabled
3,633,923,658 UART: [state] LifecycleState = Unprovisioned
3,633,925,597 UART: [state] DebugLocked = No
3,633,928,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,633,932,456 UART: [kat] SHA2-256
3,634,102,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,634,112,700 UART: [kat] ++
3,634,113,233 UART: [kat] sha1
3,634,124,340 UART: [kat] SHA2-256
3,634,127,076 UART: [kat] SHA2-384
3,634,133,717 UART: [kat] SHA2-512-ACC
3,634,136,120 UART: [kat] ECC-384
3,636,420,951 UART: [kat] HMAC-384Kdf
3,636,432,548 UART: [kat] LMS
3,637,622,604 UART: [kat] --
3,637,626,507 UART: [update-reset] ++
3,641,816,192 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,641,820,501 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,642,218,211 >>> mbox cmd response: success
3,642,220,207 UART: [update-reset] Copying MAN_2 To MAN_1
3,642,242,585 UART: [update-reset Success] --
3,642,248,813 UART: [state] Locking Datavault
3,642,251,955 UART: [state] Locking PCR0, PCR1 and PCR31
3,642,253,651 UART: [state] Locking ICCM
3,642,255,906 UART: [exit] Launching FMC @ 0x40000130
3,642,264,296 UART:
3,642,264,535 UART: Running Caliptra FMC ...
3,642,265,633 UART:
3,642,265,791 UART: [state] CFI Enabled
3,642,309,827 UART: [art] Extend RT PCRs Done
3,642,311,017 UART: [art] Lock RT PCRs Done
3,642,312,531 UART: [art] Populate DV Done
3,642,317,933 UART: [fht] FMC Alias Private Key: 7
3,642,319,677 UART: [art] Derive CDI
3,642,320,484 UART: [art] Store in slot 0x4
3,642,363,234 UART: [art] Derive Key Pair
3,642,364,279 UART: [art] Store priv key in slot 0x5
3,645,606,155 UART: [art] Derive Key Pair - Done
3,645,618,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,647,899,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,647,900,873 UART: [art] PUB.X = C813FD131BDCD2039DBD56090378B19C012070B65F8DDD9BD0ACAF128F7137CF321CF2AE14ED37FE3897423069BD77C6
3,647,908,133 UART: [art] PUB.Y = 34B72F7F817B6C9CFFE1974CB29CBB3B9A1225C070A8965F869A0999A182325D593B80ECB3008056734D026713615447
3,647,915,366 UART: [art] SIG.R = 5FF3D7C1541808D010D6B6A351493E2FF75CF410E698CF15A6CA9B109281FE372BFEC9AAD0D794A8CA36F98BDA4F8189
3,647,922,812 UART: [art] SIG.S = 63D95BD23AFE24F45E69275B260D0040E68B4C79D67BD0957DB12EC065EB9BF16884D070155B77CDB34A26C5BE9836BA
3,649,228,342 UART: Caliptra RT
3,649,229,057 UART: [state] CFI Enabled
3,649,610,412 UART: [rt] RT listening for mailbox commands...
3,649,612,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,649,762,365 UART:
3,649,762,667 UART: Running Caliptra ROM ...
3,649,763,701 UART:
3,649,763,960 UART: [state] CFI Enabled
3,649,782,819 UART: [state] LifecycleState = Unprovisioned
3,649,784,765 UART: [state] DebugLocked = No
3,649,786,172 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,649,791,815 UART: [kat] SHA2-256
3,649,961,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,649,972,100 UART: [kat] ++
3,649,972,563 UART: [kat] sha1
3,649,982,748 UART: [kat] SHA2-256
3,649,985,440 UART: [kat] SHA2-384
3,649,991,713 UART: [kat] SHA2-512-ACC
3,649,994,114 UART: [kat] ECC-384
3,652,276,363 UART: [kat] HMAC-384Kdf
3,652,287,839 UART: [kat] LMS
3,653,477,902 UART: [kat] --
3,653,482,037 UART: [update-reset] ++
3,657,669,929 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,657,673,001 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,658,070,752 >>> mbox cmd response: success
3,658,071,184 UART: [update-reset] Copying MAN_2 To MAN_1
3,658,093,595 UART: [update-reset Success] --
3,658,098,526 UART: [state] Locking Datavault
3,658,101,665 UART: [state] Locking PCR0, PCR1 and PCR31
3,658,103,362 UART: [state] Locking ICCM
3,658,105,755 UART: [exit] Launching FMC @ 0x40000130
3,658,114,199 UART:
3,658,114,445 UART: Running Caliptra FMC ...
3,658,115,471 UART:
3,658,115,619 UART: [state] CFI Enabled
3,658,159,852 UART: [art] Extend RT PCRs Done
3,658,161,039 UART: [art] Lock RT PCRs Done
3,658,162,527 UART: [art] Populate DV Done
3,658,167,876 UART: [fht] FMC Alias Private Key: 7
3,658,169,357 UART: [art] Derive CDI
3,658,170,112 UART: [art] Store in slot 0x4
3,658,212,920 UART: [art] Derive Key Pair
3,658,213,960 UART: [art] Store priv key in slot 0x5
3,661,455,822 UART: [art] Derive Key Pair - Done
3,661,468,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,663,749,069 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,750,578 UART: [art] PUB.X = 21D6685C9B48BBA9D453654CC664147EB948876D397AC9C4A188610DE6356AF1BB559A8D3F0D3BFBA036E33E92972CC7
3,663,757,843 UART: [art] PUB.Y = 55C4A8A081C6033864F65649CAE0E509958626B1ECACE0E359BA22E193F9CB1E979D431B4E1F1C2542CEC16F6A0157C3
3,663,765,102 UART: [art] SIG.R = D19A87F882166D7509AE8D9E4827837DB259B58DF588797950977F3560909DC8CC56A5E87CA96A4B40441BB390CC3D2C
3,663,772,441 UART: [art] SIG.S = 5A3A04702FACB7D7D202670854E8C2DF25B0C458F080EE8637CADE53B222B8AE23380863CFC071BBC62BDC4C827DAB51
3,665,077,738 UART: Caliptra RT
3,665,078,456 UART: [state] CFI Enabled
3,665,452,217 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 398.34s
Truncated 698585 bytes from beginning
= 7
3,670,948,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,950,106 UART: [art] PUB.X = 08CEB2C8F103E3E85DEE7D010E896A0105170015F10E2A1A1E1999F03FAFA03FEE7F470F0C23A83915C0F1E74D3C4074
3,670,957,355 UART: [art] PUB.Y = 5D7927DE5430E3DE08B63F63110FCE6C674DABFE944A287A38EC0AAA48CECBC2B6335B6B49CFF96B5A8E4FDB7C9A4C4C
3,670,964,637 UART: [art] SIG.R = EAD6ACED4792D38353592303A00CF619236C66DE0F58962AFF2DA355170C6F230D414F19FFAC5E9C0671B1935203F5D8
3,670,972,024 UART: [art] SIG.S = F810400F9BFC69A553B5E04DC58BD63310F501F434ECF90C8058468C142A138C18006AF7D310CE3D0A7517A14A963D5D
3,672,276,840 UART: Caliptra RT
3,672,277,559 UART: [state] CFI Enabled
3,672,653,232 UART: [rt] RT listening for mailbox commands...
3,672,655,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,681,401,479 >>> mbox cmd response: success
3,681,437,190 UART:
3,681,437,494 UART: Running Caliptra FMC ...
3,681,438,618 UART:
3,681,438,780 UART: [state] CFI Enabled
3,681,483,446 UART: [art] Extend RT PCRs Done
3,681,484,634 UART: [art] Lock RT PCRs Done
3,681,485,878 UART: [art] Populate DV Done
3,681,491,282 UART: [fht] FMC Alias Private Key: 7
3,681,493,002 UART: [art] Derive CDI
3,681,493,759 UART: [art] Store in slot 0x4
3,681,536,080 UART: [art] Derive Key Pair
3,681,537,105 UART: [art] Store priv key in slot 0x5
3,684,779,335 UART: [art] Derive Key Pair - Done
3,684,792,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,687,073,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,687,074,587 UART: [art] PUB.X = 740102BD402612725F0462065037EBC996947B1EA645F3AB4721ABF99672D51DA4449E61E6CF52D9E31F7A27858254FA
3,687,081,790 UART: [art] PUB.Y = C10E984C568E50EB958E6216AD6EBBDC81DE5B2ED73F6B3E33838ACDD3E6F7FCB942A1F764AF1667634D044C1BD73874
3,687,089,057 UART: [art] SIG.R = 1220094149DB948B4D92309A320773741A59FB366711FC45AD4EFF279E57F581580331C14E9AE3A10D3B79940E858CEA
3,687,096,408 UART: [art] SIG.S = AD673FED40B47104257C303C479942C156CC7271701965D61088E1F735DB2905EE79A29820B79F7B1DD8A448E9CC5C52
3,688,401,739 UART: Caliptra RT
3,688,402,433 UART: [state] CFI Enabled
3,688,770,780 UART: [rt] RT listening for mailbox commands...
3,688,772,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,697,528,040 >>> mbox cmd response: success
3,697,561,589 UART:
3,697,561,861 UART: Running Caliptra FMC ...
3,697,563,089 UART:
3,697,563,279 UART: [state] CFI Enabled
3,697,607,216 UART: [art] Extend RT PCRs Done
3,697,608,365 UART: [art] Lock RT PCRs Done
3,697,609,790 UART: [art] Populate DV Done
3,697,615,244 UART: [fht] FMC Alias Private Key: 7
3,697,616,831 UART: [art] Derive CDI
3,697,617,563 UART: [art] Store in slot 0x4
3,697,660,263 UART: [art] Derive Key Pair
3,697,661,298 UART: [art] Store priv key in slot 0x5
3,700,903,268 UART: [art] Derive Key Pair - Done
3,700,916,264 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,703,196,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,703,198,100 UART: [art] PUB.X = 08CEB2C8F103E3E85DEE7D010E896A0105170015F10E2A1A1E1999F03FAFA03FEE7F470F0C23A83915C0F1E74D3C4074
3,703,205,344 UART: [art] PUB.Y = 5D7927DE5430E3DE08B63F63110FCE6C674DABFE944A287A38EC0AAA48CECBC2B6335B6B49CFF96B5A8E4FDB7C9A4C4C
3,703,212,620 UART: [art] SIG.R = EAD6ACED4792D38353592303A00CF619236C66DE0F58962AFF2DA355170C6F230D414F19FFAC5E9C0671B1935203F5D8
3,703,220,002 UART: [art] SIG.S = F810400F9BFC69A553B5E04DC58BD63310F501F434ECF90C8058468C142A138C18006AF7D310CE3D0A7517A14A963D5D
3,704,525,077 UART: Caliptra RT
3,704,525,806 UART: [state] CFI Enabled
3,704,901,873 UART: [rt] RT listening for mailbox commands...
3,704,903,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,713,653,431 >>> mbox cmd response: success
3,713,688,137 UART:
3,713,688,409 UART: Running Caliptra FMC ...
3,713,689,442 UART:
3,713,689,592 UART: [state] CFI Enabled
3,713,734,424 UART: [art] Extend RT PCRs Done
3,713,735,613 UART: [art] Lock RT PCRs Done
3,713,737,358 UART: [art] Populate DV Done
3,713,742,927 UART: [fht] FMC Alias Private Key: 7
3,713,744,573 UART: [art] Derive CDI
3,713,745,311 UART: [art] Store in slot 0x4
3,713,788,547 UART: [art] Derive Key Pair
3,713,789,562 UART: [art] Store priv key in slot 0x5
3,717,031,826 UART: [art] Derive Key Pair - Done
3,717,044,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,719,324,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,719,326,364 UART: [art] PUB.X = 740102BD402612725F0462065037EBC996947B1EA645F3AB4721ABF99672D51DA4449E61E6CF52D9E31F7A27858254FA
3,719,333,610 UART: [art] PUB.Y = C10E984C568E50EB958E6216AD6EBBDC81DE5B2ED73F6B3E33838ACDD3E6F7FCB942A1F764AF1667634D044C1BD73874
3,719,340,892 UART: [art] SIG.R = 1220094149DB948B4D92309A320773741A59FB366711FC45AD4EFF279E57F581580331C14E9AE3A10D3B79940E858CEA
3,719,348,224 UART: [art] SIG.S = AD673FED40B47104257C303C479942C156CC7271701965D61088E1F735DB2905EE79A29820B79F7B1DD8A448E9CC5C52
3,720,652,922 UART: Caliptra RT
3,720,653,648 UART: [state] CFI Enabled
3,721,028,386 UART: [rt] RT listening for mailbox commands...
3,721,030,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,729,772,946 >>> mbox cmd response: success
3,729,806,004 UART:
3,729,806,313 UART: Running Caliptra FMC ...
3,729,807,434 UART:
3,729,807,617 UART: [state] CFI Enabled
3,729,851,959 UART: [art] Extend RT PCRs Done
3,729,853,102 UART: [art] Lock RT PCRs Done
3,729,854,332 UART: [art] Populate DV Done
3,729,859,793 UART: [fht] FMC Alias Private Key: 7
3,729,861,494 UART: [art] Derive CDI
3,729,862,307 UART: [art] Store in slot 0x4
3,729,904,908 UART: [art] Derive Key Pair
3,729,905,953 UART: [art] Store priv key in slot 0x5
3,733,147,905 UART: [art] Derive Key Pair - Done
3,733,160,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,440,445 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,441,954 UART: [art] PUB.X = 08CEB2C8F103E3E85DEE7D010E896A0105170015F10E2A1A1E1999F03FAFA03FEE7F470F0C23A83915C0F1E74D3C4074
3,735,449,198 UART: [art] PUB.Y = 5D7927DE5430E3DE08B63F63110FCE6C674DABFE944A287A38EC0AAA48CECBC2B6335B6B49CFF96B5A8E4FDB7C9A4C4C
3,735,456,483 UART: [art] SIG.R = EAD6ACED4792D38353592303A00CF619236C66DE0F58962AFF2DA355170C6F230D414F19FFAC5E9C0671B1935203F5D8
3,735,463,879 UART: [art] SIG.S = F810400F9BFC69A553B5E04DC58BD63310F501F434ECF90C8058468C142A138C18006AF7D310CE3D0A7517A14A963D5D
3,736,769,224 UART: Caliptra RT
3,736,769,935 UART: [state] CFI Enabled
3,737,142,143 UART: [rt] RT listening for mailbox commands...
3,737,144,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,745,884,932 >>> mbox cmd response: success
3,745,920,126 UART:
3,745,920,394 UART: Running Caliptra FMC ...
3,745,921,507 UART:
3,745,921,682 UART: [state] CFI Enabled
3,745,965,703 UART: [art] Extend RT PCRs Done
3,745,966,895 UART: [art] Lock RT PCRs Done
3,745,968,296 UART: [art] Populate DV Done
3,745,973,918 UART: [fht] FMC Alias Private Key: 7
3,745,975,508 UART: [art] Derive CDI
3,745,976,318 UART: [art] Store in slot 0x4
3,746,018,855 UART: [art] Derive Key Pair
3,746,019,877 UART: [art] Store priv key in slot 0x5
3,749,261,533 UART: [art] Derive Key Pair - Done
3,749,274,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,751,554,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,751,556,306 UART: [art] PUB.X = 740102BD402612725F0462065037EBC996947B1EA645F3AB4721ABF99672D51DA4449E61E6CF52D9E31F7A27858254FA
3,751,563,575 UART: [art] PUB.Y = C10E984C568E50EB958E6216AD6EBBDC81DE5B2ED73F6B3E33838ACDD3E6F7FCB942A1F764AF1667634D044C1BD73874
3,751,570,817 UART: [art] SIG.R = 1220094149DB948B4D92309A320773741A59FB366711FC45AD4EFF279E57F581580331C14E9AE3A10D3B79940E858CEA
3,751,578,208 UART: [art] SIG.S = AD673FED40B47104257C303C479942C156CC7271701965D61088E1F735DB2905EE79A29820B79F7B1DD8A448E9CC5C52
3,752,883,523 UART: Caliptra RT
3,752,884,214 UART: [state] CFI Enabled
3,753,258,237 UART: [rt] RT listening for mailbox commands...
3,753,260,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,762,017,260 >>> mbox cmd response: success
3,762,052,269 UART:
3,762,052,576 UART: Running Caliptra FMC ...
3,762,053,702 UART:
3,762,053,895 UART: [state] CFI Enabled
3,762,098,404 UART: [art] Extend RT PCRs Done
3,762,099,556 UART: [art] Lock RT PCRs Done
3,762,101,114 UART: [art] Populate DV Done
3,762,106,733 UART: [fht] FMC Alias Private Key: 7
3,762,108,323 UART: [art] Derive CDI
3,762,109,135 UART: [art] Store in slot 0x4
3,762,152,141 UART: [art] Derive Key Pair
3,762,153,180 UART: [art] Store priv key in slot 0x5
3,765,395,430 UART: [art] Derive Key Pair - Done
3,765,408,430 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,767,689,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,767,690,745 UART: [art] PUB.X = 08CEB2C8F103E3E85DEE7D010E896A0105170015F10E2A1A1E1999F03FAFA03FEE7F470F0C23A83915C0F1E74D3C4074
3,767,697,939 UART: [art] PUB.Y = 5D7927DE5430E3DE08B63F63110FCE6C674DABFE944A287A38EC0AAA48CECBC2B6335B6B49CFF96B5A8E4FDB7C9A4C4C
3,767,705,218 UART: [art] SIG.R = EAD6ACED4792D38353592303A00CF619236C66DE0F58962AFF2DA355170C6F230D414F19FFAC5E9C0671B1935203F5D8
3,767,712,606 UART: [art] SIG.S = F810400F9BFC69A553B5E04DC58BD63310F501F434ECF90C8058468C142A138C18006AF7D310CE3D0A7517A14A963D5D
3,769,017,774 UART: Caliptra RT
3,769,018,488 UART: [state] CFI Enabled
3,769,397,127 UART: [rt] RT listening for mailbox commands...
3,769,399,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,778,325,512 >>> mbox cmd response: success
3,778,360,175 UART:
3,778,360,484 UART: Running Caliptra FMC ...
3,778,361,523 UART:
3,778,361,671 UART: [state] CFI Enabled
3,778,406,343 UART: [art] Extend RT PCRs Done
3,778,407,488 UART: [art] Lock RT PCRs Done
3,778,408,749 UART: [art] Populate DV Done
3,778,414,424 UART: [fht] FMC Alias Private Key: 7
3,778,416,172 UART: [art] Derive CDI
3,778,416,908 UART: [art] Store in slot 0x4
3,778,459,623 UART: [art] Derive Key Pair
3,778,460,689 UART: [art] Store priv key in slot 0x5
3,781,703,118 UART: [art] Derive Key Pair - Done
3,781,716,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,783,996,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,783,998,398 UART: [art] PUB.X = 740102BD402612725F0462065037EBC996947B1EA645F3AB4721ABF99672D51DA4449E61E6CF52D9E31F7A27858254FA
3,784,005,641 UART: [art] PUB.Y = C10E984C568E50EB958E6216AD6EBBDC81DE5B2ED73F6B3E33838ACDD3E6F7FCB942A1F764AF1667634D044C1BD73874
3,784,012,883 UART: [art] SIG.R = 1220094149DB948B4D92309A320773741A59FB366711FC45AD4EFF279E57F581580331C14E9AE3A10D3B79940E858CEA
3,784,020,272 UART: [art] SIG.S = AD673FED40B47104257C303C479942C156CC7271701965D61088E1F735DB2905EE79A29820B79F7B1DD8A448E9CC5C52
3,785,325,327 UART: Caliptra RT
3,785,326,042 UART: [state] CFI Enabled
3,785,700,612 UART: [rt] RT listening for mailbox commands...
3,785,702,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,794,450,442 >>> mbox cmd response: success
3,794,484,680 UART:
3,794,484,952 UART: Running Caliptra FMC ...
3,794,485,984 UART:
3,794,486,156 UART: [state] CFI Enabled
3,794,530,609 UART: [art] Extend RT PCRs Done
3,794,531,794 UART: [art] Lock RT PCRs Done
3,794,532,957 UART: [art] Populate DV Done
3,794,538,530 UART: [fht] FMC Alias Private Key: 7
3,794,540,122 UART: [art] Derive CDI
3,794,540,857 UART: [art] Store in slot 0x4
3,794,583,510 UART: [art] Derive Key Pair
3,794,584,506 UART: [art] Store priv key in slot 0x5
3,797,826,677 UART: [art] Derive Key Pair - Done
3,797,839,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,800,120,137 UART: [art] Erasing AUTHORITY.KEYID = 7
3,800,121,646 UART: [art] PUB.X = 08CEB2C8F103E3E85DEE7D010E896A0105170015F10E2A1A1E1999F03FAFA03FEE7F470F0C23A83915C0F1E74D3C4074
3,800,128,887 UART: [art] PUB.Y = 5D7927DE5430E3DE08B63F63110FCE6C674DABFE944A287A38EC0AAA48CECBC2B6335B6B49CFF96B5A8E4FDB7C9A4C4C
3,800,136,220 UART: [art] SIG.R = EAD6ACED4792D38353592303A00CF619236C66DE0F58962AFF2DA355170C6F230D414F19FFAC5E9C0671B1935203F5D8
3,800,143,553 UART: [art] SIG.S = F810400F9BFC69A553B5E04DC58BD63310F501F434ECF90C8058468C142A138C18006AF7D310CE3D0A7517A14A963D5D
3,801,448,466 UART: Caliptra RT
3,801,449,182 UART: [state] CFI Enabled
3,801,823,788 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 405.17s
Truncated 1311866 bytes from beginning
g Datavault
2,241,689,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,241,691,342 UART: [state] Locking ICCM
2,241,692,411 UART: [exit] Launching FMC @ 0x40000130
2,241,700,825 UART:
2,241,701,070 UART: Running Caliptra FMC ...
2,241,702,101 UART:
2,241,702,248 UART: [state] CFI Enabled
2,241,807,189 UART: [art] Extend RT PCRs Done
2,241,808,372 UART: [art] Lock RT PCRs Done
2,241,809,531 UART: [art] Populate DV Done
2,241,814,936 UART: [fht] FMC Alias Private Key: 7
2,241,816,639 UART: [art] Derive CDI
2,241,817,376 UART: [art] Store in slot 0x4
2,241,876,572 UART: [art] Derive Key Pair
2,241,877,615 UART: [art] Store priv key in slot 0x5
2,244,340,232 UART: [art] Derive Key Pair - Done
2,244,353,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,246,066,064 UART: [art] Erasing AUTHORITY.KEYID = 7
2,246,067,574 UART: [art] PUB.X = 2EBDBC9A850FF51DEB4419F46EC7E802041FCC04E0F1B943CECCEF2AC2DD3F2B8867AEFDA1B05B4B7F25524F289C4F39
2,246,074,859 UART: [art] PUB.Y = DFC36766EADDF0AFD0B04ED406C9173416C96763DCAFAC73B4840C92A08471BB65B219AE54B28F7AD3B439486ECE48AC
2,246,082,136 UART: [art] SIG.R = 38BD1710A6E36684F8096AEC2E1C77B4C5838A83677448E759D50927A0F61A871AAE6D4EC9ACAD1B2226300E6C96A26A
2,246,089,510 UART: [art] SIG.S = 06D3161CC9B5DAFBC33503203A7B7F76B82F2B69621D190AF5603D4BE6953A85AFE095B6F367319F6B085FC4DC346244
2,247,068,801 UART: Caliptra RT
2,247,069,513 UART: [state] CFI Enabled
2,247,486,320 UART: [rt] RT listening for mailbox commands...
2,247,488,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,247,638,436 UART:
2,247,638,741 UART: Running Caliptra ROM ...
2,247,639,854 UART:
2,247,640,015 UART: [state] CFI Enabled
2,247,708,459 UART: [state] LifecycleState = Unprovisioned
2,247,710,387 UART: [state] DebugLocked = No
2,247,713,020 UART: [state] WD Timer not started. Device not locked for debugging
2,247,717,458 UART: [kat] SHA2-256
2,247,897,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,247,907,906 UART: [kat] ++
2,247,908,443 UART: [kat] sha1
2,247,917,822 UART: [kat] SHA2-256
2,247,920,516 UART: [kat] SHA2-384
2,247,926,305 UART: [kat] SHA2-512-ACC
2,247,928,655 UART: [kat] ECC-384
2,250,391,202 UART: [kat] HMAC-384Kdf
2,250,413,473 UART: [kat] LMS
2,250,889,889 UART: [kat] --
2,250,895,992 UART: [update-reset] ++
2,254,402,132 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,254,405,779 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,254,803,402 >>> mbox cmd response: success
2,254,805,292 UART: [update-reset] Copying MAN_2 To MAN_1
2,254,842,414 UART: [update-reset Success] --
2,254,846,844 UART: [state] Locking Datavault
2,254,849,884 UART: [state] Locking PCR0, PCR1 and PCR31
2,254,851,637 UART: [state] Locking ICCM
2,254,852,899 UART: [exit] Launching FMC @ 0x40000130
2,254,861,241 UART:
2,254,861,505 UART: Running Caliptra FMC ...
2,254,862,609 UART:
2,254,862,768 UART: [state] CFI Enabled
2,254,968,666 UART: [art] Extend RT PCRs Done
2,254,969,853 UART: [art] Lock RT PCRs Done
2,254,971,363 UART: [art] Populate DV Done
2,254,976,816 UART: [fht] FMC Alias Private Key: 7
2,254,978,335 UART: [art] Derive CDI
2,254,979,159 UART: [art] Store in slot 0x4
2,255,037,712 UART: [art] Derive Key Pair
2,255,038,718 UART: [art] Store priv key in slot 0x5
2,257,501,360 UART: [art] Derive Key Pair - Done
2,257,514,223 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,259,227,995 UART: [art] Erasing AUTHORITY.KEYID = 7
2,259,229,515 UART: [art] PUB.X = 86D2991E4809C652EC65D2D8CB6A56B0BEDB4CEF521618C1AB780FEA13B1965673E941773074EC0B25E147F2A493D57E
2,259,236,738 UART: [art] PUB.Y = B8440C6560B2E4D94FD2EE307D10A697AF5C2E3FC2C71BD945449315A919E5DCD183EC0EC24F7CE0297563A52FD3630F
2,259,244,034 UART: [art] SIG.R = F1E3ED49C6F31927E52FC07C43CD02F5A49D47D2C0AE811F1F4C84D48287EF4907373ECB5FFF571DF39732FCD6608F4A
2,259,251,456 UART: [art] SIG.S = 881FFC6479CF8675143D991AEA1D28FF1316E43D75BCE3E691F27A2FECA3954E896F382C043156269CA8362AF6D71C76
2,260,230,304 UART: Caliptra RT
2,260,231,014 UART: [state] CFI Enabled
2,260,652,651 UART: [rt] RT listening for mailbox commands...
2,260,654,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,260,804,708 UART:
2,260,805,014 UART: Running Caliptra ROM ...
2,260,806,137 UART:
2,260,806,305 UART: [state] CFI Enabled
2,260,868,106 UART: [state] LifecycleState = Unprovisioned
2,260,870,034 UART: [state] DebugLocked = No
2,260,871,912 UART: [state] WD Timer not started. Device not locked for debugging
2,260,876,296 UART: [kat] SHA2-256
2,261,055,959 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,261,066,729 UART: [kat] ++
2,261,067,213 UART: [kat] sha1
2,261,079,562 UART: [kat] SHA2-256
2,261,082,254 UART: [kat] SHA2-384
2,261,088,401 UART: [kat] SHA2-512-ACC
2,261,090,754 UART: [kat] ECC-384
2,263,551,839 UART: [kat] HMAC-384Kdf
2,263,575,791 UART: [kat] LMS
2,264,052,281 UART: [kat] --
2,264,056,131 UART: [update-reset] ++
2,267,559,793 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,267,563,263 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,267,960,878 >>> mbox cmd response: success
2,267,961,251 UART: [update-reset] Copying MAN_2 To MAN_1
2,267,998,207 UART: [update-reset Success] --
2,268,001,190 UART: [state] Locking Datavault
2,268,004,715 UART: [state] Locking PCR0, PCR1 and PCR31
2,268,006,499 UART: [state] Locking ICCM
2,268,008,711 UART: [exit] Launching FMC @ 0x40000130
2,268,017,120 UART:
2,268,017,422 UART: Running Caliptra FMC ...
2,268,018,540 UART:
2,268,018,707 UART: [state] CFI Enabled
2,268,110,992 UART: [art] Extend RT PCRs Done
2,268,112,185 UART: [art] Lock RT PCRs Done
2,268,113,638 UART: [art] Populate DV Done
2,268,119,101 UART: [fht] FMC Alias Private Key: 7
2,268,120,583 UART: [art] Derive CDI
2,268,121,344 UART: [art] Store in slot 0x4
2,268,180,255 UART: [art] Derive Key Pair
2,268,181,316 UART: [art] Store priv key in slot 0x5
2,270,644,467 UART: [art] Derive Key Pair - Done
2,270,657,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,272,368,556 UART: [art] Erasing AUTHORITY.KEYID = 7
2,272,370,056 UART: [art] PUB.X = 2EBDBC9A850FF51DEB4419F46EC7E802041FCC04E0F1B943CECCEF2AC2DD3F2B8867AEFDA1B05B4B7F25524F289C4F39
2,272,377,387 UART: [art] PUB.Y = DFC36766EADDF0AFD0B04ED406C9173416C96763DCAFAC73B4840C92A08471BB65B219AE54B28F7AD3B439486ECE48AC
2,272,384,655 UART: [art] SIG.R = 38BD1710A6E36684F8096AEC2E1C77B4C5838A83677448E759D50927A0F61A871AAE6D4EC9ACAD1B2226300E6C96A26A
2,272,392,037 UART: [art] SIG.S = 06D3161CC9B5DAFBC33503203A7B7F76B82F2B69621D190AF5603D4BE6953A85AFE095B6F367319F6B085FC4DC346244
2,273,370,827 UART: Caliptra RT
2,273,371,540 UART: [state] CFI Enabled
2,273,790,584 UART: [rt] RT listening for mailbox commands...
2,273,792,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,273,942,646 UART:
2,273,942,951 UART: Running Caliptra ROM ...
2,273,944,069 UART:
2,273,944,236 UART: [state] CFI Enabled
2,274,012,938 UART: [state] LifecycleState = Unprovisioned
2,274,014,875 UART: [state] DebugLocked = No
2,274,016,914 UART: [state] WD Timer not started. Device not locked for debugging
2,274,021,485 UART: [kat] SHA2-256
2,274,201,152 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,274,211,957 UART: [kat] ++
2,274,212,421 UART: [kat] sha1
2,274,224,063 UART: [kat] SHA2-256
2,274,226,757 UART: [kat] SHA2-384
2,274,232,362 UART: [kat] SHA2-512-ACC
2,274,234,708 UART: [kat] ECC-384
2,276,691,403 UART: [kat] HMAC-384Kdf
2,276,717,081 UART: [kat] LMS
2,277,193,520 UART: [kat] --
2,277,199,401 UART: [update-reset] ++
2,280,693,303 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,280,695,980 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,281,093,580 >>> mbox cmd response: success
2,281,094,504 UART: [update-reset] Copying MAN_2 To MAN_1
2,281,131,607 UART: [update-reset Success] --
2,281,134,280 UART: [state] Locking Datavault
2,281,137,369 UART: [state] Locking PCR0, PCR1 and PCR31
2,281,139,132 UART: [state] Locking ICCM
2,281,140,311 UART: [exit] Launching FMC @ 0x40000130
2,281,148,706 UART:
2,281,148,940 UART: Running Caliptra FMC ...
2,281,150,043 UART:
2,281,150,206 UART: [state] CFI Enabled
2,281,251,244 UART: [art] Extend RT PCRs Done
2,281,252,429 UART: [art] Lock RT PCRs Done
2,281,253,774 UART: [art] Populate DV Done
2,281,259,239 UART: [fht] FMC Alias Private Key: 7
2,281,260,890 UART: [art] Derive CDI
2,281,261,704 UART: [art] Store in slot 0x4
2,281,320,641 UART: [art] Derive Key Pair
2,281,321,702 UART: [art] Store priv key in slot 0x5
2,283,783,990 UART: [art] Derive Key Pair - Done
2,283,797,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,285,510,483 UART: [art] Erasing AUTHORITY.KEYID = 7
2,285,511,992 UART: [art] PUB.X = 86D2991E4809C652EC65D2D8CB6A56B0BEDB4CEF521618C1AB780FEA13B1965673E941773074EC0B25E147F2A493D57E
2,285,519,271 UART: [art] PUB.Y = B8440C6560B2E4D94FD2EE307D10A697AF5C2E3FC2C71BD945449315A919E5DCD183EC0EC24F7CE0297563A52FD3630F
2,285,526,535 UART: [art] SIG.R = F1E3ED49C6F31927E52FC07C43CD02F5A49D47D2C0AE811F1F4C84D48287EF4907373ECB5FFF571DF39732FCD6608F4A
2,285,534,023 UART: [art] SIG.S = 881FFC6479CF8675143D991AEA1D28FF1316E43D75BCE3E691F27A2FECA3954E896F382C043156269CA8362AF6D71C76
2,286,513,070 UART: Caliptra RT
2,286,513,764 UART: [state] CFI Enabled
2,286,930,683 UART: [rt] RT listening for mailbox commands...
2,286,932,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,287,082,338 UART:
2,287,082,639 UART: Running Caliptra ROM ...
2,287,083,679 UART:
2,287,083,832 UART: [state] CFI Enabled
2,287,147,501 UART: [state] LifecycleState = Unprovisioned
2,287,149,434 UART: [state] DebugLocked = No
2,287,151,981 UART: [state] WD Timer not started. Device not locked for debugging
2,287,156,316 UART: [kat] SHA2-256
2,287,335,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,287,346,774 UART: [kat] ++
2,287,347,317 UART: [kat] sha1
2,287,358,255 UART: [kat] SHA2-256
2,287,360,943 UART: [kat] SHA2-384
2,287,366,549 UART: [kat] SHA2-512-ACC
2,287,368,905 UART: [kat] ECC-384
2,289,813,317 UART: [kat] HMAC-384Kdf
2,289,836,125 UART: [kat] LMS
2,290,312,569 UART: [kat] --
2,290,315,364 UART: [update-reset] ++
2,293,816,705 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,293,819,931 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,294,217,527 >>> mbox cmd response: success
2,294,218,989 UART: [update-reset] Copying MAN_2 To MAN_1
2,294,256,123 UART: [update-reset Success] --
2,294,259,503 UART: [state] Locking Datavault
2,294,264,011 UART: [state] Locking PCR0, PCR1 and PCR31
2,294,265,769 UART: [state] Locking ICCM
2,294,267,244 UART: [exit] Launching FMC @ 0x40000130
2,294,275,632 UART:
2,294,275,866 UART: Running Caliptra FMC ...
2,294,276,964 UART:
2,294,277,124 UART: [state] CFI Enabled
2,294,371,786 UART: [art] Extend RT PCRs Done
2,294,372,999 UART: [art] Lock RT PCRs Done
2,294,374,246 UART: [art] Populate DV Done
2,294,379,439 UART: [fht] FMC Alias Private Key: 7
2,294,380,991 UART: [art] Derive CDI
2,294,381,807 UART: [art] Store in slot 0x4
2,294,440,805 UART: [art] Derive Key Pair
2,294,441,852 UART: [art] Store priv key in slot 0x5
2,296,904,205 UART: [art] Derive Key Pair - Done
2,296,917,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,298,629,877 UART: [art] Erasing AUTHORITY.KEYID = 7
2,298,631,399 UART: [art] PUB.X = 2EBDBC9A850FF51DEB4419F46EC7E802041FCC04E0F1B943CECCEF2AC2DD3F2B8867AEFDA1B05B4B7F25524F289C4F39
2,298,638,732 UART: [art] PUB.Y = DFC36766EADDF0AFD0B04ED406C9173416C96763DCAFAC73B4840C92A08471BB65B219AE54B28F7AD3B439486ECE48AC
2,298,646,015 UART: [art] SIG.R = 38BD1710A6E36684F8096AEC2E1C77B4C5838A83677448E759D50927A0F61A871AAE6D4EC9ACAD1B2226300E6C96A26A
2,298,653,385 UART: [art] SIG.S = 06D3161CC9B5DAFBC33503203A7B7F76B82F2B69621D190AF5603D4BE6953A85AFE095B6F367319F6B085FC4DC346244
2,299,632,495 UART: Caliptra RT
2,299,633,342 UART: [state] CFI Enabled
2,300,054,447 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 330.07s
Truncated 697233 bytes from beginning
= 7
2,186,917,118 UART: [art] Erasing AUTHORITY.KEYID = 7
2,186,918,640 UART: [art] PUB.X = E0E5786E54A52E56A7AC9C292CFD6599ADDEB58696D64AABBA491AF87903DA45B141293327DF5B44A93F20CD6E9E63C8
2,186,925,900 UART: [art] PUB.Y = 1486E217C71631DD6C450FEAAAB36F74759459B667D7738A94AB19FECB2CFCA26D6B4EF34F74965B3802C313A025EA44
2,186,933,184 UART: [art] SIG.R = F0D87139945CF22564C40E4C38DCEA7B9F7C99F65771AE5EE5BEC805B627D46332C8FB78872ADC67454EB0A66B161ABB
2,186,940,590 UART: [art] SIG.S = 7687872DF23889239C3D334EEC8EAC93A1EBC73132B965464E0E9DACC29CD99A32A524F0A9686353E60534372BB9873A
2,187,919,020 UART: Caliptra RT
2,187,919,738 UART: [state] CFI Enabled
2,188,338,620 UART: [rt] RT listening for mailbox commands...
2,188,340,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,195,651,582 >>> mbox cmd response: success
2,195,683,910 UART:
2,195,684,174 UART: Running Caliptra FMC ...
2,195,685,278 UART:
2,195,685,439 UART: [state] CFI Enabled
2,195,778,783 UART: [art] Extend RT PCRs Done
2,195,779,987 UART: [art] Lock RT PCRs Done
2,195,781,336 UART: [art] Populate DV Done
2,195,786,870 UART: [fht] FMC Alias Private Key: 7
2,195,788,739 UART: [art] Derive CDI
2,195,789,492 UART: [art] Store in slot 0x4
2,195,847,720 UART: [art] Derive Key Pair
2,195,848,715 UART: [art] Store priv key in slot 0x5
2,198,311,266 UART: [art] Derive Key Pair - Done
2,198,323,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,200,036,792 UART: [art] Erasing AUTHORITY.KEYID = 7
2,200,038,307 UART: [art] PUB.X = 0FBA3FFD80B5CBFC07E8113FB4273F643F29183CDB75CFFBCC85F978176F6CAC0CBE82CC960E19CCC59363F6C1A83BB1
2,200,045,571 UART: [art] PUB.Y = 0D17E938658D07A2C8CC80578C38E17BE7066E50323A34FB7FE6D7587F3BFD1B84A75E384F9C4944166895930CAA41B1
2,200,052,827 UART: [art] SIG.R = 3B98FF2AB22F0D66BC99A059A67249471A0CFFB97B7A8185356BA9D33024917F74F969FF60630CFC33E7F186B10939BB
2,200,060,233 UART: [art] SIG.S = AA665DDAF1E7BB73A1737D1AC0EF9DCF143610FE0E7EAF26560F200CE55B579C8AC26178F7E8675F1A5A4A02EF3601A8
2,201,039,121 UART: Caliptra RT
2,201,039,817 UART: [state] CFI Enabled
2,201,464,532 UART: [rt] RT listening for mailbox commands...
2,201,466,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,208,772,773 >>> mbox cmd response: success
2,208,807,821 UART:
2,208,808,092 UART: Running Caliptra FMC ...
2,208,809,158 UART:
2,208,809,310 UART: [state] CFI Enabled
2,208,898,343 UART: [art] Extend RT PCRs Done
2,208,899,535 UART: [art] Lock RT PCRs Done
2,208,900,777 UART: [art] Populate DV Done
2,208,906,397 UART: [fht] FMC Alias Private Key: 7
2,208,907,984 UART: [art] Derive CDI
2,208,908,943 UART: [art] Store in slot 0x4
2,208,967,181 UART: [art] Derive Key Pair
2,208,968,182 UART: [art] Store priv key in slot 0x5
2,211,430,824 UART: [art] Derive Key Pair - Done
2,211,443,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,213,157,443 UART: [art] Erasing AUTHORITY.KEYID = 7
2,213,158,968 UART: [art] PUB.X = E0E5786E54A52E56A7AC9C292CFD6599ADDEB58696D64AABBA491AF87903DA45B141293327DF5B44A93F20CD6E9E63C8
2,213,166,229 UART: [art] PUB.Y = 1486E217C71631DD6C450FEAAAB36F74759459B667D7738A94AB19FECB2CFCA26D6B4EF34F74965B3802C313A025EA44
2,213,173,514 UART: [art] SIG.R = F0D87139945CF22564C40E4C38DCEA7B9F7C99F65771AE5EE5BEC805B627D46332C8FB78872ADC67454EB0A66B161ABB
2,213,180,917 UART: [art] SIG.S = 7687872DF23889239C3D334EEC8EAC93A1EBC73132B965464E0E9DACC29CD99A32A524F0A9686353E60534372BB9873A
2,214,158,876 UART: Caliptra RT
2,214,159,573 UART: [state] CFI Enabled
2,214,588,005 UART: [rt] RT listening for mailbox commands...
2,214,589,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,221,894,528 >>> mbox cmd response: success
2,221,929,828 UART:
2,221,930,096 UART: Running Caliptra FMC ...
2,221,931,216 UART:
2,221,931,381 UART: [state] CFI Enabled
2,222,017,772 UART: [art] Extend RT PCRs Done
2,222,018,965 UART: [art] Lock RT PCRs Done
2,222,020,537 UART: [art] Populate DV Done
2,222,025,920 UART: [fht] FMC Alias Private Key: 7
2,222,027,569 UART: [art] Derive CDI
2,222,028,606 UART: [art] Store in slot 0x4
2,222,087,313 UART: [art] Derive Key Pair
2,222,088,321 UART: [art] Store priv key in slot 0x5
2,224,551,253 UART: [art] Derive Key Pair - Done
2,224,564,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,226,276,917 UART: [art] Erasing AUTHORITY.KEYID = 7
2,226,278,426 UART: [art] PUB.X = 0FBA3FFD80B5CBFC07E8113FB4273F643F29183CDB75CFFBCC85F978176F6CAC0CBE82CC960E19CCC59363F6C1A83BB1
2,226,285,733 UART: [art] PUB.Y = 0D17E938658D07A2C8CC80578C38E17BE7066E50323A34FB7FE6D7587F3BFD1B84A75E384F9C4944166895930CAA41B1
2,226,292,970 UART: [art] SIG.R = 3B98FF2AB22F0D66BC99A059A67249471A0CFFB97B7A8185356BA9D33024917F74F969FF60630CFC33E7F186B10939BB
2,226,300,360 UART: [art] SIG.S = AA665DDAF1E7BB73A1737D1AC0EF9DCF143610FE0E7EAF26560F200CE55B579C8AC26178F7E8675F1A5A4A02EF3601A8
2,227,279,341 UART: Caliptra RT
2,227,280,053 UART: [state] CFI Enabled
2,227,696,566 UART: [rt] RT listening for mailbox commands...
2,227,698,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,235,009,626 >>> mbox cmd response: success
2,235,044,290 UART:
2,235,044,561 UART: Running Caliptra FMC ...
2,235,045,678 UART:
2,235,045,840 UART: [state] CFI Enabled
2,235,138,129 UART: [art] Extend RT PCRs Done
2,235,139,318 UART: [art] Lock RT PCRs Done
2,235,140,724 UART: [art] Populate DV Done
2,235,146,237 UART: [fht] FMC Alias Private Key: 7
2,235,147,823 UART: [art] Derive CDI
2,235,148,846 UART: [art] Store in slot 0x4
2,235,207,464 UART: [art] Derive Key Pair
2,235,208,466 UART: [art] Store priv key in slot 0x5
2,237,671,625 UART: [art] Derive Key Pair - Done
2,237,684,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,239,397,263 UART: [art] Erasing AUTHORITY.KEYID = 7
2,239,398,789 UART: [art] PUB.X = E0E5786E54A52E56A7AC9C292CFD6599ADDEB58696D64AABBA491AF87903DA45B141293327DF5B44A93F20CD6E9E63C8
2,239,406,045 UART: [art] PUB.Y = 1486E217C71631DD6C450FEAAAB36F74759459B667D7738A94AB19FECB2CFCA26D6B4EF34F74965B3802C313A025EA44
2,239,413,291 UART: [art] SIG.R = F0D87139945CF22564C40E4C38DCEA7B9F7C99F65771AE5EE5BEC805B627D46332C8FB78872ADC67454EB0A66B161ABB
2,239,420,685 UART: [art] SIG.S = 7687872DF23889239C3D334EEC8EAC93A1EBC73132B965464E0E9DACC29CD99A32A524F0A9686353E60534372BB9873A
2,240,398,695 UART: Caliptra RT
2,240,399,384 UART: [state] CFI Enabled
2,240,822,824 UART: [rt] RT listening for mailbox commands...
2,240,824,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,248,131,817 >>> mbox cmd response: success
2,248,165,012 UART:
2,248,165,284 UART: Running Caliptra FMC ...
2,248,166,313 UART:
2,248,166,459 UART: [state] CFI Enabled
2,248,258,375 UART: [art] Extend RT PCRs Done
2,248,259,561 UART: [art] Lock RT PCRs Done
2,248,260,800 UART: [art] Populate DV Done
2,248,266,439 UART: [fht] FMC Alias Private Key: 7
2,248,268,142 UART: [art] Derive CDI
2,248,269,158 UART: [art] Store in slot 0x4
2,248,327,784 UART: [art] Derive Key Pair
2,248,328,787 UART: [art] Store priv key in slot 0x5
2,250,791,127 UART: [art] Derive Key Pair - Done
2,250,803,794 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,252,517,525 UART: [art] Erasing AUTHORITY.KEYID = 7
2,252,519,027 UART: [art] PUB.X = 0FBA3FFD80B5CBFC07E8113FB4273F643F29183CDB75CFFBCC85F978176F6CAC0CBE82CC960E19CCC59363F6C1A83BB1
2,252,526,349 UART: [art] PUB.Y = 0D17E938658D07A2C8CC80578C38E17BE7066E50323A34FB7FE6D7587F3BFD1B84A75E384F9C4944166895930CAA41B1
2,252,533,587 UART: [art] SIG.R = 3B98FF2AB22F0D66BC99A059A67249471A0CFFB97B7A8185356BA9D33024917F74F969FF60630CFC33E7F186B10939BB
2,252,540,926 UART: [art] SIG.S = AA665DDAF1E7BB73A1737D1AC0EF9DCF143610FE0E7EAF26560F200CE55B579C8AC26178F7E8675F1A5A4A02EF3601A8
2,253,519,454 UART: Caliptra RT
2,253,520,160 UART: [state] CFI Enabled
2,253,943,292 UART: [rt] RT listening for mailbox commands...
2,253,945,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,261,245,683 >>> mbox cmd response: success
2,261,281,635 UART:
2,261,281,905 UART: Running Caliptra FMC ...
2,261,282,936 UART:
2,261,283,082 UART: [state] CFI Enabled
2,261,376,817 UART: [art] Extend RT PCRs Done
2,261,378,006 UART: [art] Lock RT PCRs Done
2,261,379,548 UART: [art] Populate DV Done
2,261,384,954 UART: [fht] FMC Alias Private Key: 7
2,261,386,540 UART: [art] Derive CDI
2,261,387,276 UART: [art] Store in slot 0x4
2,261,446,780 UART: [art] Derive Key Pair
2,261,447,811 UART: [art] Store priv key in slot 0x5
2,263,909,975 UART: [art] Derive Key Pair - Done
2,263,922,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,265,635,990 UART: [art] Erasing AUTHORITY.KEYID = 7
2,265,637,515 UART: [art] PUB.X = E0E5786E54A52E56A7AC9C292CFD6599ADDEB58696D64AABBA491AF87903DA45B141293327DF5B44A93F20CD6E9E63C8
2,265,644,773 UART: [art] PUB.Y = 1486E217C71631DD6C450FEAAAB36F74759459B667D7738A94AB19FECB2CFCA26D6B4EF34F74965B3802C313A025EA44
2,265,652,014 UART: [art] SIG.R = F0D87139945CF22564C40E4C38DCEA7B9F7C99F65771AE5EE5BEC805B627D46332C8FB78872ADC67454EB0A66B161ABB
2,265,659,412 UART: [art] SIG.S = 7687872DF23889239C3D334EEC8EAC93A1EBC73132B965464E0E9DACC29CD99A32A524F0A9686353E60534372BB9873A
2,266,638,985 UART: Caliptra RT
2,266,639,700 UART: [state] CFI Enabled
2,267,059,729 UART: [rt] RT listening for mailbox commands...
2,267,061,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,274,379,334 >>> mbox cmd response: success
2,274,415,714 UART:
2,274,415,982 UART: Running Caliptra FMC ...
2,274,417,012 UART:
2,274,417,164 UART: [state] CFI Enabled
2,274,515,405 UART: [art] Extend RT PCRs Done
2,274,516,600 UART: [art] Lock RT PCRs Done
2,274,518,084 UART: [art] Populate DV Done
2,274,523,241 UART: [fht] FMC Alias Private Key: 7
2,274,524,726 UART: [art] Derive CDI
2,274,525,462 UART: [art] Store in slot 0x4
2,274,584,174 UART: [art] Derive Key Pair
2,274,585,172 UART: [art] Store priv key in slot 0x5
2,277,049,688 UART: [art] Derive Key Pair - Done
2,277,062,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,278,775,053 UART: [art] Erasing AUTHORITY.KEYID = 7
2,278,776,554 UART: [art] PUB.X = 0FBA3FFD80B5CBFC07E8113FB4273F643F29183CDB75CFFBCC85F978176F6CAC0CBE82CC960E19CCC59363F6C1A83BB1
2,278,783,851 UART: [art] PUB.Y = 0D17E938658D07A2C8CC80578C38E17BE7066E50323A34FB7FE6D7587F3BFD1B84A75E384F9C4944166895930CAA41B1
2,278,791,136 UART: [art] SIG.R = 3B98FF2AB22F0D66BC99A059A67249471A0CFFB97B7A8185356BA9D33024917F74F969FF60630CFC33E7F186B10939BB
2,278,798,481 UART: [art] SIG.S = AA665DDAF1E7BB73A1737D1AC0EF9DCF143610FE0E7EAF26560F200CE55B579C8AC26178F7E8675F1A5A4A02EF3601A8
2,279,777,112 UART: Caliptra RT
2,279,777,823 UART: [state] CFI Enabled
2,280,194,819 UART: [rt] RT listening for mailbox commands...
2,280,196,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,287,507,321 >>> mbox cmd response: success
2,287,542,355 UART:
2,287,542,634 UART: Running Caliptra FMC ...
2,287,543,749 UART:
2,287,543,907 UART: [state] CFI Enabled
2,287,631,883 UART: [art] Extend RT PCRs Done
2,287,633,075 UART: [art] Lock RT PCRs Done
2,287,634,155 UART: [art] Populate DV Done
2,287,639,348 UART: [fht] FMC Alias Private Key: 7
2,287,640,882 UART: [art] Derive CDI
2,287,641,695 UART: [art] Store in slot 0x4
2,287,701,111 UART: [art] Derive Key Pair
2,287,702,112 UART: [art] Store priv key in slot 0x5
2,290,165,158 UART: [art] Derive Key Pair - Done
2,290,177,935 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,291,890,433 UART: [art] Erasing AUTHORITY.KEYID = 7
2,291,891,959 UART: [art] PUB.X = E0E5786E54A52E56A7AC9C292CFD6599ADDEB58696D64AABBA491AF87903DA45B141293327DF5B44A93F20CD6E9E63C8
2,291,899,212 UART: [art] PUB.Y = 1486E217C71631DD6C450FEAAAB36F74759459B667D7738A94AB19FECB2CFCA26D6B4EF34F74965B3802C313A025EA44
2,291,906,459 UART: [art] SIG.R = F0D87139945CF22564C40E4C38DCEA7B9F7C99F65771AE5EE5BEC805B627D46332C8FB78872ADC67454EB0A66B161ABB
2,291,913,858 UART: [art] SIG.S = 7687872DF23889239C3D334EEC8EAC93A1EBC73132B965464E0E9DACC29CD99A32A524F0A9686353E60534372BB9873A
2,292,892,188 UART: Caliptra RT
2,292,892,880 UART: [state] CFI Enabled
2,293,319,098 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 329.73s
Truncated 1312178 bytes from beginning
g Datavault
2,357,927,505 UART: [state] Locking PCR0, PCR1 and PCR31
2,357,929,224 UART: [state] Locking ICCM
2,357,932,029 UART: [exit] Launching FMC @ 0x40000130
2,357,940,436 UART:
2,357,940,678 UART: Running Caliptra FMC ...
2,357,941,790 UART:
2,357,941,950 UART: [state] CFI Enabled
2,357,986,293 UART: [art] Extend RT PCRs Done
2,357,987,444 UART: [art] Lock RT PCRs Done
2,357,989,200 UART: [art] Populate DV Done
2,357,994,643 UART: [fht] FMC Alias Private Key: 7
2,357,996,308 UART: [art] Derive CDI
2,357,997,128 UART: [art] Store in slot 0x4
2,358,039,999 UART: [art] Derive Key Pair
2,358,041,010 UART: [art] Store priv key in slot 0x5
2,360,468,583 UART: [art] Derive Key Pair - Done
2,360,481,533 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,362,187,601 UART: [art] Erasing AUTHORITY.KEYID = 7
2,362,189,109 UART: [art] PUB.X = C8E38DF680206099E4F0EE2C7857FFA982378F1478A80D62ECB7D87372506E9464F303EDD6F138634961B9DA6136CE0B
2,362,196,351 UART: [art] PUB.Y = F53F11493E385027755406CF4CB9F70CC72A1ABFDB2430C980663CE365950C2C1498CC8230F574ECE27EAB65F6A4DA99
2,362,203,635 UART: [art] SIG.R = AE5E8E81B7C15F5CAEA562306845D15747E97BE8A57A091B349E188E977F8826D85FCC8F5BD101D5286012346D2DD23F
2,362,211,031 UART: [art] SIG.S = 226E3DD108FE203DC8D800A8E357C6D9C3835478E8925C51FDCCE5E380D0E10CBF87DEF9F5E47B545169362316A379F8
2,363,190,054 UART: Caliptra RT
2,363,190,769 UART: [state] CFI Enabled
2,363,562,690 UART: [rt] RT listening for mailbox commands...
2,363,564,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,363,714,681 UART:
2,363,714,994 UART: Running Caliptra ROM ...
2,363,716,119 UART:
2,363,716,342 UART: [state] CFI Enabled
2,365,137,308 UART: [state] LifecycleState = Unprovisioned
2,365,139,228 UART: [state] DebugLocked = No
2,365,141,083 UART: [state] WD Timer not started. Device not locked for debugging
2,365,145,118 UART: [kat] SHA2-256
2,365,324,846 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,365,335,643 UART: [kat] ++
2,365,336,102 UART: [kat] sha1
2,365,347,475 UART: [kat] SHA2-256
2,365,350,147 UART: [kat] SHA2-384
2,365,356,528 UART: [kat] SHA2-512-ACC
2,365,358,884 UART: [kat] ECC-384
2,367,799,232 UART: [kat] HMAC-384Kdf
2,367,811,912 UART: [kat] LMS
2,368,288,382 UART: [kat] --
2,368,292,804 UART: [update-reset] ++
2,371,787,395 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,371,790,017 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,372,187,648 >>> mbox cmd response: success
2,372,189,325 UART: [update-reset] Copying MAN_2 To MAN_1
2,372,226,466 UART: [update-reset Success] --
2,372,231,284 UART: [state] Locking Datavault
2,372,234,928 UART: [state] Locking PCR0, PCR1 and PCR31
2,372,236,650 UART: [state] Locking ICCM
2,372,239,187 UART: [exit] Launching FMC @ 0x40000130
2,372,247,587 UART:
2,372,247,828 UART: Running Caliptra FMC ...
2,372,248,935 UART:
2,372,249,095 UART: [state] CFI Enabled
2,372,293,356 UART: [art] Extend RT PCRs Done
2,372,294,510 UART: [art] Lock RT PCRs Done
2,372,295,914 UART: [art] Populate DV Done
2,372,301,542 UART: [fht] FMC Alias Private Key: 7
2,372,303,139 UART: [art] Derive CDI
2,372,303,958 UART: [art] Store in slot 0x4
2,372,346,997 UART: [art] Derive Key Pair
2,372,348,047 UART: [art] Store priv key in slot 0x5
2,374,774,476 UART: [art] Derive Key Pair - Done
2,374,787,533 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,376,494,118 UART: [art] Erasing AUTHORITY.KEYID = 7
2,376,495,619 UART: [art] PUB.X = F4AE54B74CA4A6BBD3022344164D26594B79B3CC05498C3AE3E04CABBC613D7AD5DED5AE798448AE45A775195042B59C
2,376,502,916 UART: [art] PUB.Y = 5128F2556FFBB34685074DEC18DCCBA7145B6B8D5C7A5BE4599FEA59C48D013ADA59293DD797B7AFE14154685731739F
2,376,510,213 UART: [art] SIG.R = 54B7BE39867822C95B185AF163E4E8963CD01A6E5F2F499533478924AA1AA387D22BE144A8AB0158179D51DA41582F0B
2,376,517,548 UART: [art] SIG.S = B9682D3429A5C2B9435E8D7AE634FF87E1E60037510B7B3BA8C4470F5D49E95980F59C02AAE440B7B633B77DFA3E9696
2,377,496,100 UART: Caliptra RT
2,377,496,841 UART: [state] CFI Enabled
2,377,869,374 UART: [rt] RT listening for mailbox commands...
2,377,871,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,378,021,506 UART:
2,378,021,817 UART: Running Caliptra ROM ...
2,378,022,951 UART:
2,378,023,124 UART: [state] CFI Enabled
2,378,036,049 UART: [state] LifecycleState = Unprovisioned
2,378,037,942 UART: [state] DebugLocked = No
2,378,040,733 UART: [state] WD Timer not started. Device not locked for debugging
2,378,044,003 UART: [kat] SHA2-256
2,378,223,748 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,378,234,509 UART: [kat] ++
2,378,235,001 UART: [kat] sha1
2,378,246,762 UART: [kat] SHA2-256
2,378,249,454 UART: [kat] SHA2-384
2,378,255,838 UART: [kat] SHA2-512-ACC
2,378,258,197 UART: [kat] ECC-384
2,380,699,742 UART: [kat] HMAC-384Kdf
2,380,711,425 UART: [kat] LMS
2,381,187,875 UART: [kat] --
2,381,193,726 UART: [update-reset] ++
2,384,692,374 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,384,695,101 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,385,092,711 >>> mbox cmd response: success
2,385,094,291 UART: [update-reset] Copying MAN_2 To MAN_1
2,385,131,424 UART: [update-reset Success] --
2,385,135,700 UART: [state] Locking Datavault
2,385,140,581 UART: [state] Locking PCR0, PCR1 and PCR31
2,385,142,343 UART: [state] Locking ICCM
2,385,143,689 UART: [exit] Launching FMC @ 0x40000130
2,385,152,039 UART:
2,385,152,311 UART: Running Caliptra FMC ...
2,385,153,429 UART:
2,385,153,594 UART: [state] CFI Enabled
2,385,197,677 UART: [art] Extend RT PCRs Done
2,385,198,868 UART: [art] Lock RT PCRs Done
2,385,200,574 UART: [art] Populate DV Done
2,385,206,205 UART: [fht] FMC Alias Private Key: 7
2,385,207,749 UART: [art] Derive CDI
2,385,208,519 UART: [art] Store in slot 0x4
2,385,251,496 UART: [art] Derive Key Pair
2,385,252,507 UART: [art] Store priv key in slot 0x5
2,387,679,635 UART: [art] Derive Key Pair - Done
2,387,692,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,389,398,411 UART: [art] Erasing AUTHORITY.KEYID = 7
2,389,399,896 UART: [art] PUB.X = C8E38DF680206099E4F0EE2C7857FFA982378F1478A80D62ECB7D87372506E9464F303EDD6F138634961B9DA6136CE0B
2,389,407,140 UART: [art] PUB.Y = F53F11493E385027755406CF4CB9F70CC72A1ABFDB2430C980663CE365950C2C1498CC8230F574ECE27EAB65F6A4DA99
2,389,414,447 UART: [art] SIG.R = AE5E8E81B7C15F5CAEA562306845D15747E97BE8A57A091B349E188E977F8826D85FCC8F5BD101D5286012346D2DD23F
2,389,421,839 UART: [art] SIG.S = 226E3DD108FE203DC8D800A8E357C6D9C3835478E8925C51FDCCE5E380D0E10CBF87DEF9F5E47B545169362316A379F8
2,390,400,945 UART: Caliptra RT
2,390,401,653 UART: [state] CFI Enabled
2,390,769,855 UART: [rt] RT listening for mailbox commands...
2,390,771,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,390,921,480 UART:
2,390,921,782 UART: Running Caliptra ROM ...
2,390,922,907 UART:
2,390,923,128 UART: [state] CFI Enabled
2,390,935,075 UART: [state] LifecycleState = Unprovisioned
2,390,936,963 UART: [state] DebugLocked = No
2,390,939,434 UART: [state] WD Timer not started. Device not locked for debugging
2,390,943,287 UART: [kat] SHA2-256
2,391,122,976 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,391,133,776 UART: [kat] ++
2,391,134,283 UART: [kat] sha1
2,391,144,859 UART: [kat] SHA2-256
2,391,147,551 UART: [kat] SHA2-384
2,391,151,985 UART: [kat] SHA2-512-ACC
2,391,154,336 UART: [kat] ECC-384
2,393,592,586 UART: [kat] HMAC-384Kdf
2,393,604,390 UART: [kat] LMS
2,394,080,835 UART: [kat] --
2,394,084,074 UART: [update-reset] ++
2,397,578,065 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,397,582,261 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,397,979,848 >>> mbox cmd response: success
2,397,980,892 UART: [update-reset] Copying MAN_2 To MAN_1
2,398,017,980 UART: [update-reset Success] --
2,398,021,885 UART: [state] Locking Datavault
2,398,024,665 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,026,398 UART: [state] Locking ICCM
2,398,027,777 UART: [exit] Launching FMC @ 0x40000130
2,398,036,181 UART:
2,398,036,426 UART: Running Caliptra FMC ...
2,398,037,536 UART:
2,398,037,702 UART: [state] CFI Enabled
2,398,081,835 UART: [art] Extend RT PCRs Done
2,398,083,023 UART: [art] Lock RT PCRs Done
2,398,084,680 UART: [art] Populate DV Done
2,398,090,207 UART: [fht] FMC Alias Private Key: 7
2,398,091,872 UART: [art] Derive CDI
2,398,092,698 UART: [art] Store in slot 0x4
2,398,135,085 UART: [art] Derive Key Pair
2,398,136,094 UART: [art] Store priv key in slot 0x5
2,400,562,861 UART: [art] Derive Key Pair - Done
2,400,575,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,402,281,989 UART: [art] Erasing AUTHORITY.KEYID = 7
2,402,283,511 UART: [art] PUB.X = F4AE54B74CA4A6BBD3022344164D26594B79B3CC05498C3AE3E04CABBC613D7AD5DED5AE798448AE45A775195042B59C
2,402,290,762 UART: [art] PUB.Y = 5128F2556FFBB34685074DEC18DCCBA7145B6B8D5C7A5BE4599FEA59C48D013ADA59293DD797B7AFE14154685731739F
2,402,298,047 UART: [art] SIG.R = 54B7BE39867822C95B185AF163E4E8963CD01A6E5F2F499533478924AA1AA387D22BE144A8AB0158179D51DA41582F0B
2,402,305,449 UART: [art] SIG.S = B9682D3429A5C2B9435E8D7AE634FF87E1E60037510B7B3BA8C4470F5D49E95980F59C02AAE440B7B633B77DFA3E9696
2,403,283,652 UART: Caliptra RT
2,403,284,345 UART: [state] CFI Enabled
2,403,654,201 UART: [rt] RT listening for mailbox commands...
2,403,656,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,403,806,624 UART:
2,403,806,946 UART: Running Caliptra ROM ...
2,403,807,987 UART:
2,403,808,251 UART: [state] CFI Enabled
2,405,253,400 UART: [state] LifecycleState = Unprovisioned
2,405,255,373 UART: [state] DebugLocked = No
2,405,257,663 UART: [state] WD Timer not started. Device not locked for debugging
2,405,261,815 UART: [kat] SHA2-256
2,405,441,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,405,452,326 UART: [kat] ++
2,405,452,820 UART: [kat] sha1
2,405,465,120 UART: [kat] SHA2-256
2,405,467,815 UART: [kat] SHA2-384
2,405,473,644 UART: [kat] SHA2-512-ACC
2,405,476,006 UART: [kat] ECC-384
2,407,917,762 UART: [kat] HMAC-384Kdf
2,407,930,310 UART: [kat] LMS
2,408,406,778 UART: [kat] --
2,408,409,981 UART: [update-reset] ++
2,411,905,392 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,411,908,237 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,412,305,838 >>> mbox cmd response: success
2,412,307,648 UART: [update-reset] Copying MAN_2 To MAN_1
2,412,344,798 UART: [update-reset Success] --
2,412,349,873 UART: [state] Locking Datavault
2,412,352,656 UART: [state] Locking PCR0, PCR1 and PCR31
2,412,354,418 UART: [state] Locking ICCM
2,412,356,304 UART: [exit] Launching FMC @ 0x40000130
2,412,364,656 UART:
2,412,364,899 UART: Running Caliptra FMC ...
2,412,366,010 UART:
2,412,366,188 UART: [state] CFI Enabled
2,412,410,330 UART: [art] Extend RT PCRs Done
2,412,411,524 UART: [art] Lock RT PCRs Done
2,412,412,827 UART: [art] Populate DV Done
2,412,418,515 UART: [fht] FMC Alias Private Key: 7
2,412,420,058 UART: [art] Derive CDI
2,412,420,882 UART: [art] Store in slot 0x4
2,412,463,479 UART: [art] Derive Key Pair
2,412,464,504 UART: [art] Store priv key in slot 0x5
2,414,891,702 UART: [art] Derive Key Pair - Done
2,414,904,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,416,610,981 UART: [art] Erasing AUTHORITY.KEYID = 7
2,416,612,490 UART: [art] PUB.X = C8E38DF680206099E4F0EE2C7857FFA982378F1478A80D62ECB7D87372506E9464F303EDD6F138634961B9DA6136CE0B
2,416,619,737 UART: [art] PUB.Y = F53F11493E385027755406CF4CB9F70CC72A1ABFDB2430C980663CE365950C2C1498CC8230F574ECE27EAB65F6A4DA99
2,416,626,979 UART: [art] SIG.R = AE5E8E81B7C15F5CAEA562306845D15747E97BE8A57A091B349E188E977F8826D85FCC8F5BD101D5286012346D2DD23F
2,416,634,422 UART: [art] SIG.S = 226E3DD108FE203DC8D800A8E357C6D9C3835478E8925C51FDCCE5E380D0E10CBF87DEF9F5E47B545169362316A379F8
2,417,612,973 UART: Caliptra RT
2,417,613,677 UART: [state] CFI Enabled
2,417,981,781 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 335.97s
Truncated 697347 bytes from beginning
= 7
2,309,097,733 UART: [art] Erasing AUTHORITY.KEYID = 7
2,309,099,246 UART: [art] PUB.X = CA46AFC9F65516D489602E42668A4B2F4664672416932E439DFF63D2CD8BA157E757B53B1FAC341AB2AF3C5F3E964F39
2,309,106,477 UART: [art] PUB.Y = 2198BDEEDC9271EAFA830BBD1FBAE7717C3B6572AEF02E1684DC03894440EB0E98395BD2A60578C63CEB28AB8E5304B5
2,309,113,783 UART: [art] SIG.R = 1932989BA605853388A8E851BA6AAD5857C38C65BC59D62CE469294A9D2E5A1557F2993370FAAA34BFB77B73CA4916F4
2,309,121,136 UART: [art] SIG.S = 4B996A1B84EA8D728C70D75F748A95660B2B1BB8D0E71F1999B2BFFED0C878AA348578C9AA0C480940AD0EDFB944FF18
2,310,100,009 UART: Caliptra RT
2,310,100,709 UART: [state] CFI Enabled
2,310,471,192 UART: [rt] RT listening for mailbox commands...
2,310,473,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,317,689,657 >>> mbox cmd response: success
2,317,725,381 UART:
2,317,725,668 UART: Running Caliptra FMC ...
2,317,726,788 UART:
2,317,726,957 UART: [state] CFI Enabled
2,317,771,467 UART: [art] Extend RT PCRs Done
2,317,772,673 UART: [art] Lock RT PCRs Done
2,317,774,297 UART: [art] Populate DV Done
2,317,779,767 UART: [fht] FMC Alias Private Key: 7
2,317,781,344 UART: [art] Derive CDI
2,317,782,095 UART: [art] Store in slot 0x4
2,317,824,877 UART: [art] Derive Key Pair
2,317,825,932 UART: [art] Store priv key in slot 0x5
2,320,252,081 UART: [art] Derive Key Pair - Done
2,320,265,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,321,971,631 UART: [art] Erasing AUTHORITY.KEYID = 7
2,321,973,139 UART: [art] PUB.X = FDAA76BD711B1CC162733AF3F931B305C4EEC88DA26038A822F327CE438A160B103DB91B2EE656C20854E81DAF2FCC5F
2,321,980,426 UART: [art] PUB.Y = 448AECEB3A86F66E97D8DF930E112AECB78839DBBB073A205B330C3DC6FDCDECC9359BA7FCE368F0664A403840DEB1A6
2,321,987,680 UART: [art] SIG.R = B361032AE994307D6D3D5F6AC009B865306CBC5EE8334036C56D8E749FEC7D44324FE85DCC4DDED96C5589CD9F9FE274
2,321,995,089 UART: [art] SIG.S = 4F67CAFBB5D94226B4D4694FE7730C4BC4419C81DF30C09DADB0D50BE6D1EE4B4FEBFF8B1B5E252F150C82633EB59B76
2,322,974,040 UART: Caliptra RT
2,322,974,759 UART: [state] CFI Enabled
2,323,353,973 UART: [rt] RT listening for mailbox commands...
2,323,355,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,332,051,152 >>> mbox cmd response: success
2,332,084,097 UART:
2,332,084,405 UART: Running Caliptra FMC ...
2,332,085,458 UART:
2,332,085,614 UART: [state] CFI Enabled
2,332,129,427 UART: [art] Extend RT PCRs Done
2,332,130,582 UART: [art] Lock RT PCRs Done
2,332,131,925 UART: [art] Populate DV Done
2,332,137,336 UART: [fht] FMC Alias Private Key: 7
2,332,138,918 UART: [art] Derive CDI
2,332,139,743 UART: [art] Store in slot 0x4
2,332,182,450 UART: [art] Derive Key Pair
2,332,183,461 UART: [art] Store priv key in slot 0x5
2,334,610,274 UART: [art] Derive Key Pair - Done
2,334,623,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,336,329,689 UART: [art] Erasing AUTHORITY.KEYID = 7
2,336,331,195 UART: [art] PUB.X = CA46AFC9F65516D489602E42668A4B2F4664672416932E439DFF63D2CD8BA157E757B53B1FAC341AB2AF3C5F3E964F39
2,336,338,475 UART: [art] PUB.Y = 2198BDEEDC9271EAFA830BBD1FBAE7717C3B6572AEF02E1684DC03894440EB0E98395BD2A60578C63CEB28AB8E5304B5
2,336,345,791 UART: [art] SIG.R = 1932989BA605853388A8E851BA6AAD5857C38C65BC59D62CE469294A9D2E5A1557F2993370FAAA34BFB77B73CA4916F4
2,336,353,150 UART: [art] SIG.S = 4B996A1B84EA8D728C70D75F748A95660B2B1BB8D0E71F1999B2BFFED0C878AA348578C9AA0C480940AD0EDFB944FF18
2,337,332,336 UART: Caliptra RT
2,337,333,046 UART: [state] CFI Enabled
2,337,708,501 UART: [rt] RT listening for mailbox commands...
2,337,710,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,344,947,141 >>> mbox cmd response: success
2,344,980,449 UART:
2,344,980,724 UART: Running Caliptra FMC ...
2,344,981,842 UART:
2,344,982,010 UART: [state] CFI Enabled
2,345,025,745 UART: [art] Extend RT PCRs Done
2,345,026,952 UART: [art] Lock RT PCRs Done
2,345,028,258 UART: [art] Populate DV Done
2,345,033,459 UART: [fht] FMC Alias Private Key: 7
2,345,035,132 UART: [art] Derive CDI
2,345,035,962 UART: [art] Store in slot 0x4
2,345,078,300 UART: [art] Derive Key Pair
2,345,079,311 UART: [art] Store priv key in slot 0x5
2,347,506,128 UART: [art] Derive Key Pair - Done
2,347,519,022 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,349,225,041 UART: [art] Erasing AUTHORITY.KEYID = 7
2,349,226,549 UART: [art] PUB.X = FDAA76BD711B1CC162733AF3F931B305C4EEC88DA26038A822F327CE438A160B103DB91B2EE656C20854E81DAF2FCC5F
2,349,233,801 UART: [art] PUB.Y = 448AECEB3A86F66E97D8DF930E112AECB78839DBBB073A205B330C3DC6FDCDECC9359BA7FCE368F0664A403840DEB1A6
2,349,241,119 UART: [art] SIG.R = B361032AE994307D6D3D5F6AC009B865306CBC5EE8334036C56D8E749FEC7D44324FE85DCC4DDED96C5589CD9F9FE274
2,349,248,469 UART: [art] SIG.S = 4F67CAFBB5D94226B4D4694FE7730C4BC4419C81DF30C09DADB0D50BE6D1EE4B4FEBFF8B1B5E252F150C82633EB59B76
2,350,227,880 UART: Caliptra RT
2,350,228,606 UART: [state] CFI Enabled
2,350,601,397 UART: [rt] RT listening for mailbox commands...
2,350,603,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,357,831,102 >>> mbox cmd response: success
2,357,863,089 UART:
2,357,863,371 UART: Running Caliptra FMC ...
2,357,864,413 UART:
2,357,864,566 UART: [state] CFI Enabled
2,357,908,597 UART: [art] Extend RT PCRs Done
2,357,909,792 UART: [art] Lock RT PCRs Done
2,357,911,390 UART: [art] Populate DV Done
2,357,917,123 UART: [fht] FMC Alias Private Key: 7
2,357,918,719 UART: [art] Derive CDI
2,357,919,462 UART: [art] Store in slot 0x4
2,357,962,174 UART: [art] Derive Key Pair
2,357,963,178 UART: [art] Store priv key in slot 0x5
2,360,389,947 UART: [art] Derive Key Pair - Done
2,360,402,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,362,109,562 UART: [art] Erasing AUTHORITY.KEYID = 7
2,362,111,061 UART: [art] PUB.X = CA46AFC9F65516D489602E42668A4B2F4664672416932E439DFF63D2CD8BA157E757B53B1FAC341AB2AF3C5F3E964F39
2,362,118,355 UART: [art] PUB.Y = 2198BDEEDC9271EAFA830BBD1FBAE7717C3B6572AEF02E1684DC03894440EB0E98395BD2A60578C63CEB28AB8E5304B5
2,362,125,610 UART: [art] SIG.R = 1932989BA605853388A8E851BA6AAD5857C38C65BC59D62CE469294A9D2E5A1557F2993370FAAA34BFB77B73CA4916F4
2,362,132,961 UART: [art] SIG.S = 4B996A1B84EA8D728C70D75F748A95660B2B1BB8D0E71F1999B2BFFED0C878AA348578C9AA0C480940AD0EDFB944FF18
2,363,112,150 UART: Caliptra RT
2,363,112,869 UART: [state] CFI Enabled
2,363,489,754 UART: [rt] RT listening for mailbox commands...
2,363,491,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,372,178,185 >>> mbox cmd response: success
2,372,214,807 UART:
2,372,215,092 UART: Running Caliptra FMC ...
2,372,216,218 UART:
2,372,216,385 UART: [state] CFI Enabled
2,372,260,351 UART: [art] Extend RT PCRs Done
2,372,261,520 UART: [art] Lock RT PCRs Done
2,372,262,981 UART: [art] Populate DV Done
2,372,268,718 UART: [fht] FMC Alias Private Key: 7
2,372,270,336 UART: [art] Derive CDI
2,372,271,159 UART: [art] Store in slot 0x4
2,372,314,068 UART: [art] Derive Key Pair
2,372,315,127 UART: [art] Store priv key in slot 0x5
2,374,741,335 UART: [art] Derive Key Pair - Done
2,374,754,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,376,460,775 UART: [art] Erasing AUTHORITY.KEYID = 7
2,376,462,269 UART: [art] PUB.X = FDAA76BD711B1CC162733AF3F931B305C4EEC88DA26038A822F327CE438A160B103DB91B2EE656C20854E81DAF2FCC5F
2,376,469,522 UART: [art] PUB.Y = 448AECEB3A86F66E97D8DF930E112AECB78839DBBB073A205B330C3DC6FDCDECC9359BA7FCE368F0664A403840DEB1A6
2,376,476,817 UART: [art] SIG.R = B361032AE994307D6D3D5F6AC009B865306CBC5EE8334036C56D8E749FEC7D44324FE85DCC4DDED96C5589CD9F9FE274
2,376,484,226 UART: [art] SIG.S = 4F67CAFBB5D94226B4D4694FE7730C4BC4419C81DF30C09DADB0D50BE6D1EE4B4FEBFF8B1B5E252F150C82633EB59B76
2,377,463,322 UART: Caliptra RT
2,377,464,040 UART: [state] CFI Enabled
2,377,833,378 UART: [rt] RT listening for mailbox commands...
2,377,835,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,385,063,657 >>> mbox cmd response: success
2,385,098,072 UART:
2,385,098,395 UART: Running Caliptra FMC ...
2,385,099,469 UART:
2,385,099,631 UART: [state] CFI Enabled
2,385,144,099 UART: [art] Extend RT PCRs Done
2,385,145,261 UART: [art] Lock RT PCRs Done
2,385,146,556 UART: [art] Populate DV Done
2,385,152,188 UART: [fht] FMC Alias Private Key: 7
2,385,153,781 UART: [art] Derive CDI
2,385,154,602 UART: [art] Store in slot 0x4
2,385,196,841 UART: [art] Derive Key Pair
2,385,197,881 UART: [art] Store priv key in slot 0x5
2,387,624,630 UART: [art] Derive Key Pair - Done
2,387,637,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,389,343,886 UART: [art] Erasing AUTHORITY.KEYID = 7
2,389,345,393 UART: [art] PUB.X = CA46AFC9F65516D489602E42668A4B2F4664672416932E439DFF63D2CD8BA157E757B53B1FAC341AB2AF3C5F3E964F39
2,389,352,672 UART: [art] PUB.Y = 2198BDEEDC9271EAFA830BBD1FBAE7717C3B6572AEF02E1684DC03894440EB0E98395BD2A60578C63CEB28AB8E5304B5
2,389,359,995 UART: [art] SIG.R = 1932989BA605853388A8E851BA6AAD5857C38C65BC59D62CE469294A9D2E5A1557F2993370FAAA34BFB77B73CA4916F4
2,389,367,359 UART: [art] SIG.S = 4B996A1B84EA8D728C70D75F748A95660B2B1BB8D0E71F1999B2BFFED0C878AA348578C9AA0C480940AD0EDFB944FF18
2,390,346,646 UART: Caliptra RT
2,390,347,352 UART: [state] CFI Enabled
2,390,717,551 UART: [rt] RT listening for mailbox commands...
2,390,719,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,397,944,285 >>> mbox cmd response: success
2,397,976,913 UART:
2,397,977,193 UART: Running Caliptra FMC ...
2,397,978,449 UART:
2,397,978,622 UART: [state] CFI Enabled
2,398,022,597 UART: [art] Extend RT PCRs Done
2,398,023,758 UART: [art] Lock RT PCRs Done
2,398,025,326 UART: [art] Populate DV Done
2,398,030,635 UART: [fht] FMC Alias Private Key: 7
2,398,032,307 UART: [art] Derive CDI
2,398,033,137 UART: [art] Store in slot 0x4
2,398,075,434 UART: [art] Derive Key Pair
2,398,076,481 UART: [art] Store priv key in slot 0x5
2,400,503,364 UART: [art] Derive Key Pair - Done
2,400,516,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,402,222,840 UART: [art] Erasing AUTHORITY.KEYID = 7
2,402,224,365 UART: [art] PUB.X = FDAA76BD711B1CC162733AF3F931B305C4EEC88DA26038A822F327CE438A160B103DB91B2EE656C20854E81DAF2FCC5F
2,402,231,618 UART: [art] PUB.Y = 448AECEB3A86F66E97D8DF930E112AECB78839DBBB073A205B330C3DC6FDCDECC9359BA7FCE368F0664A403840DEB1A6
2,402,238,912 UART: [art] SIG.R = B361032AE994307D6D3D5F6AC009B865306CBC5EE8334036C56D8E749FEC7D44324FE85DCC4DDED96C5589CD9F9FE274
2,402,246,316 UART: [art] SIG.S = 4F67CAFBB5D94226B4D4694FE7730C4BC4419C81DF30C09DADB0D50BE6D1EE4B4FEBFF8B1B5E252F150C82633EB59B76
2,403,225,292 UART: Caliptra RT
2,403,226,021 UART: [state] CFI Enabled
2,403,603,389 UART: [rt] RT listening for mailbox commands...
2,403,605,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,412,291,906 >>> mbox cmd response: success
2,412,326,359 UART:
2,412,326,662 UART: Running Caliptra FMC ...
2,412,327,791 UART:
2,412,327,962 UART: [state] CFI Enabled
2,412,371,933 UART: [art] Extend RT PCRs Done
2,412,373,084 UART: [art] Lock RT PCRs Done
2,412,374,328 UART: [art] Populate DV Done
2,412,379,698 UART: [fht] FMC Alias Private Key: 7
2,412,381,230 UART: [art] Derive CDI
2,412,381,975 UART: [art] Store in slot 0x4
2,412,424,467 UART: [art] Derive Key Pair
2,412,425,469 UART: [art] Store priv key in slot 0x5
2,414,852,616 UART: [art] Derive Key Pair - Done
2,414,865,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,416,571,534 UART: [art] Erasing AUTHORITY.KEYID = 7
2,416,573,042 UART: [art] PUB.X = CA46AFC9F65516D489602E42668A4B2F4664672416932E439DFF63D2CD8BA157E757B53B1FAC341AB2AF3C5F3E964F39
2,416,580,333 UART: [art] PUB.Y = 2198BDEEDC9271EAFA830BBD1FBAE7717C3B6572AEF02E1684DC03894440EB0E98395BD2A60578C63CEB28AB8E5304B5
2,416,587,588 UART: [art] SIG.R = 1932989BA605853388A8E851BA6AAD5857C38C65BC59D62CE469294A9D2E5A1557F2993370FAAA34BFB77B73CA4916F4
2,416,594,998 UART: [art] SIG.S = 4B996A1B84EA8D728C70D75F748A95660B2B1BB8D0E71F1999B2BFFED0C878AA348578C9AA0C480940AD0EDFB944FF18
2,417,574,608 UART: Caliptra RT
2,417,575,328 UART: [state] CFI Enabled
2,417,945,556 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 335.97s
Truncated 1312270 bytes from beginning
g Datavault
2,392,590,425 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,592,619 UART: [state] Locking ICCM
2,392,594,046 UART: [exit] Launching FMC @ 0x40000130
2,392,602,720 UART:
2,392,603,115 UART: Running Caliptra FMC ...
2,392,604,245 UART:
2,392,604,427 UART: [state] CFI Enabled
2,392,710,280 UART: [art] Extend RT PCRs Done
2,392,711,468 UART: [art] Lock RT PCRs Done
2,392,712,899 UART: [art] Populate DV Done
2,392,718,415 UART: [fht] FMC Alias Private Key: 7
2,392,720,004 UART: [art] Derive CDI
2,392,720,826 UART: [art] Store in slot 0x4
2,392,779,440 UART: [art] Derive Key Pair
2,392,780,486 UART: [art] Store priv key in slot 0x5
2,395,243,037 UART: [art] Derive Key Pair - Done
2,395,256,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,396,969,440 UART: [art] Erasing AUTHORITY.KEYID = 7
2,396,970,953 UART: [art] PUB.X = F1EF2FC18BC07AD844D9902799897305266238516B9DCF14C3C91185AEB727FBC518D8986653E3DD6C4101DB85FABCDD
2,396,978,194 UART: [art] PUB.Y = B5BB10F0667A1BA9825D6CEA61844C756DB4E7BDB442683679BDDCF23FF6834818CDE5938D411059D62539D01AB968DF
2,396,985,472 UART: [art] SIG.R = 0CB13638360D017B9AB6343B6E1AE275017A427269BAA13D83AD99B667AE89953A3DB21C8CB97DC0829AD4450B60D97C
2,396,992,865 UART: [art] SIG.S = 9332EA3CA540355A5CBF6A0E2AAB0F8D1E7E2B589E4780D527D3088BB3F3A086B1F6B1121D27367EBD2801604F02B5D7
2,397,971,682 UART: Caliptra RT
2,397,972,404 UART: [state] CFI Enabled
2,398,393,067 UART: [rt] RT listening for mailbox commands...
2,398,395,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,398,545,378 UART:
2,398,545,706 UART: Running Caliptra ROM ...
2,398,546,747 UART:
2,398,546,898 UART: [state] CFI Enabled
2,398,611,622 UART: [state] LifecycleState = Unprovisioned
2,398,613,718 UART: [state] DebugLocked = No
2,398,615,509 UART: [state] WD Timer not started. Device not locked for debugging
2,398,620,111 UART: [kat] SHA2-256
2,398,809,941 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,398,820,729 UART: [kat] ++
2,398,821,186 UART: [kat] sha1
2,398,832,184 UART: [kat] SHA2-256
2,398,835,158 UART: [kat] SHA2-384
2,398,841,200 UART: [kat] SHA2-512-ACC
2,398,843,788 UART: [kat] ECC-384
2,401,296,794 UART: [kat] HMAC-384Kdf
2,401,317,605 UART: [kat] LMS
2,401,849,152 UART: [kat] --
2,401,854,544 UART: [update-reset] ++
2,405,354,428 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,405,358,078 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,405,987,800 >>> mbox cmd response: success
2,405,989,306 UART: [update-reset] Copying MAN_2 To MAN_1
2,406,026,875 UART: [update-reset Success] --
2,406,030,784 UART: [state] Locking Datavault
2,406,034,155 UART: [state] Locking PCR0, PCR1 and PCR31
2,406,036,296 UART: [state] Locking ICCM
2,406,038,648 UART: [exit] Launching FMC @ 0x40000130
2,406,047,290 UART:
2,406,047,568 UART: Running Caliptra FMC ...
2,406,048,606 UART:
2,406,048,759 UART: [state] CFI Enabled
2,406,149,733 UART: [art] Extend RT PCRs Done
2,406,150,916 UART: [art] Lock RT PCRs Done
2,406,152,236 UART: [art] Populate DV Done
2,406,157,700 UART: [fht] FMC Alias Private Key: 7
2,406,159,402 UART: [art] Derive CDI
2,406,160,143 UART: [art] Store in slot 0x4
2,406,218,798 UART: [art] Derive Key Pair
2,406,219,837 UART: [art] Store priv key in slot 0x5
2,408,682,153 UART: [art] Derive Key Pair - Done
2,408,695,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,410,407,812 UART: [art] Erasing AUTHORITY.KEYID = 7
2,410,409,319 UART: [art] PUB.X = 25767878B06A3324E9C6999F4DA639FF3B7E57D70E8E2EC6AAF10CBA8B7A4F88865902B1950987928BAB9FC37172E5E5
2,410,416,585 UART: [art] PUB.Y = 81C7FA9447F824F01BAFE04F487E1E0CDF6D52FA81BE82AB3771D83E2A66425FA514BB6136178ED75F5FEAE39478EB62
2,410,423,872 UART: [art] SIG.R = EEE807319E0301B2288B13744F9923A350599E3FCF66576E1860B2029191BC92ACE7B65FB7FB7D4B80A49FDE8C80BEEB
2,410,431,253 UART: [art] SIG.S = 4B82356B22D77C30F55082A0117640075A0245BEB0BA45BE2C9DB7180C0F5F3CACE56D6A9D556092ED24C73C527F3CEB
2,411,409,942 UART: Caliptra RT
2,411,410,658 UART: [state] CFI Enabled
2,411,831,001 UART: [rt] RT listening for mailbox commands...
2,411,832,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,411,983,119 UART:
2,411,983,434 UART: Running Caliptra ROM ...
2,411,984,555 UART:
2,411,984,717 UART: [state] CFI Enabled
2,412,048,450 UART: [state] LifecycleState = Unprovisioned
2,412,050,487 UART: [state] DebugLocked = No
2,412,053,717 UART: [state] WD Timer not started. Device not locked for debugging
2,412,058,108 UART: [kat] SHA2-256
2,412,247,934 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,412,258,745 UART: [kat] ++
2,412,259,288 UART: [kat] sha1
2,412,271,102 UART: [kat] SHA2-256
2,412,274,068 UART: [kat] SHA2-384
2,412,279,625 UART: [kat] SHA2-512-ACC
2,412,282,199 UART: [kat] ECC-384
2,414,729,535 UART: [kat] HMAC-384Kdf
2,414,754,562 UART: [kat] LMS
2,415,286,114 UART: [kat] --
2,415,291,042 UART: [update-reset] ++
2,418,798,516 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,418,801,133 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,419,430,888 >>> mbox cmd response: success
2,419,431,505 UART: [update-reset] Copying MAN_2 To MAN_1
2,419,469,079 UART: [update-reset Success] --
2,419,474,342 UART: [state] Locking Datavault
2,419,477,842 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,480,046 UART: [state] Locking ICCM
2,419,481,556 UART: [exit] Launching FMC @ 0x40000130
2,419,490,169 UART:
2,419,490,420 UART: Running Caliptra FMC ...
2,419,491,526 UART:
2,419,491,686 UART: [state] CFI Enabled
2,419,584,982 UART: [art] Extend RT PCRs Done
2,419,586,170 UART: [art] Lock RT PCRs Done
2,419,587,572 UART: [art] Populate DV Done
2,419,593,192 UART: [fht] FMC Alias Private Key: 7
2,419,594,729 UART: [art] Derive CDI
2,419,595,542 UART: [art] Store in slot 0x4
2,419,654,741 UART: [art] Derive Key Pair
2,419,655,773 UART: [art] Store priv key in slot 0x5
2,422,118,304 UART: [art] Derive Key Pair - Done
2,422,131,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,423,845,158 UART: [art] Erasing AUTHORITY.KEYID = 7
2,423,846,668 UART: [art] PUB.X = F1EF2FC18BC07AD844D9902799897305266238516B9DCF14C3C91185AEB727FBC518D8986653E3DD6C4101DB85FABCDD
2,423,853,908 UART: [art] PUB.Y = B5BB10F0667A1BA9825D6CEA61844C756DB4E7BDB442683679BDDCF23FF6834818CDE5938D411059D62539D01AB968DF
2,423,861,196 UART: [art] SIG.R = 0CB13638360D017B9AB6343B6E1AE275017A427269BAA13D83AD99B667AE89953A3DB21C8CB97DC0829AD4450B60D97C
2,423,868,579 UART: [art] SIG.S = 9332EA3CA540355A5CBF6A0E2AAB0F8D1E7E2B589E4780D527D3088BB3F3A086B1F6B1121D27367EBD2801604F02B5D7
2,424,847,300 UART: Caliptra RT
2,424,848,022 UART: [state] CFI Enabled
2,425,269,335 UART: [rt] RT listening for mailbox commands...
2,425,271,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,425,421,282 UART:
2,425,421,585 UART: Running Caliptra ROM ...
2,425,422,702 UART:
2,425,422,866 UART: [state] CFI Enabled
2,425,487,680 UART: [state] LifecycleState = Unprovisioned
2,425,489,774 UART: [state] DebugLocked = No
2,425,491,835 UART: [state] WD Timer not started. Device not locked for debugging
2,425,496,945 UART: [kat] SHA2-256
2,425,686,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,425,697,563 UART: [kat] ++
2,425,698,048 UART: [kat] sha1
2,425,708,457 UART: [kat] SHA2-256
2,425,711,480 UART: [kat] SHA2-384
2,425,717,148 UART: [kat] SHA2-512-ACC
2,425,719,710 UART: [kat] ECC-384
2,428,172,584 UART: [kat] HMAC-384Kdf
2,428,191,726 UART: [kat] LMS
2,428,723,326 UART: [kat] --
2,428,727,098 UART: [update-reset] ++
2,432,241,768 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,432,245,252 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,432,874,991 >>> mbox cmd response: success
2,432,875,816 UART: [update-reset] Copying MAN_2 To MAN_1
2,432,913,385 UART: [update-reset Success] --
2,432,917,294 UART: [state] Locking Datavault
2,432,921,255 UART: [state] Locking PCR0, PCR1 and PCR31
2,432,923,645 UART: [state] Locking ICCM
2,432,924,970 UART: [exit] Launching FMC @ 0x40000130
2,432,933,589 UART:
2,432,933,824 UART: Running Caliptra FMC ...
2,432,934,849 UART:
2,432,934,997 UART: [state] CFI Enabled
2,433,024,933 UART: [art] Extend RT PCRs Done
2,433,026,115 UART: [art] Lock RT PCRs Done
2,433,027,655 UART: [art] Populate DV Done
2,433,033,110 UART: [fht] FMC Alias Private Key: 7
2,433,034,646 UART: [art] Derive CDI
2,433,035,382 UART: [art] Store in slot 0x4
2,433,094,390 UART: [art] Derive Key Pair
2,433,095,436 UART: [art] Store priv key in slot 0x5
2,435,557,448 UART: [art] Derive Key Pair - Done
2,435,570,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,437,285,188 UART: [art] Erasing AUTHORITY.KEYID = 7
2,437,286,702 UART: [art] PUB.X = 25767878B06A3324E9C6999F4DA639FF3B7E57D70E8E2EC6AAF10CBA8B7A4F88865902B1950987928BAB9FC37172E5E5
2,437,293,947 UART: [art] PUB.Y = 81C7FA9447F824F01BAFE04F487E1E0CDF6D52FA81BE82AB3771D83E2A66425FA514BB6136178ED75F5FEAE39478EB62
2,437,301,232 UART: [art] SIG.R = EEE807319E0301B2288B13744F9923A350599E3FCF66576E1860B2029191BC92ACE7B65FB7FB7D4B80A49FDE8C80BEEB
2,437,308,621 UART: [art] SIG.S = 4B82356B22D77C30F55082A0117640075A0245BEB0BA45BE2C9DB7180C0F5F3CACE56D6A9D556092ED24C73C527F3CEB
2,438,287,467 UART: Caliptra RT
2,438,288,182 UART: [state] CFI Enabled
2,438,711,800 UART: [rt] RT listening for mailbox commands...
2,438,713,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,438,863,637 UART:
2,438,863,939 UART: Running Caliptra ROM ...
2,438,865,057 UART:
2,438,865,246 UART: [state] CFI Enabled
2,438,924,345 UART: [state] LifecycleState = Unprovisioned
2,438,926,432 UART: [state] DebugLocked = No
2,438,928,783 UART: [state] WD Timer not started. Device not locked for debugging
2,438,932,898 UART: [kat] SHA2-256
2,439,122,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,439,133,533 UART: [kat] ++
2,439,134,021 UART: [kat] sha1
2,439,145,504 UART: [kat] SHA2-256
2,439,148,468 UART: [kat] SHA2-384
2,439,155,428 UART: [kat] SHA2-512-ACC
2,439,158,046 UART: [kat] ECC-384
2,441,612,954 UART: [kat] HMAC-384Kdf
2,441,632,585 UART: [kat] LMS
2,442,164,163 UART: [kat] --
2,442,168,271 UART: [update-reset] ++
2,445,680,652 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,445,683,769 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,446,313,525 >>> mbox cmd response: success
2,446,314,767 UART: [update-reset] Copying MAN_2 To MAN_1
2,446,352,340 UART: [update-reset Success] --
2,446,357,003 UART: [state] Locking Datavault
2,446,359,629 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,361,824 UART: [state] Locking ICCM
2,446,364,585 UART: [exit] Launching FMC @ 0x40000130
2,446,373,216 UART:
2,446,373,462 UART: Running Caliptra FMC ...
2,446,374,566 UART:
2,446,374,730 UART: [state] CFI Enabled
2,446,466,032 UART: [art] Extend RT PCRs Done
2,446,467,225 UART: [art] Lock RT PCRs Done
2,446,468,574 UART: [art] Populate DV Done
2,446,473,729 UART: [fht] FMC Alias Private Key: 7
2,446,475,374 UART: [art] Derive CDI
2,446,476,183 UART: [art] Store in slot 0x4
2,446,534,950 UART: [art] Derive Key Pair
2,446,535,990 UART: [art] Store priv key in slot 0x5
2,448,999,065 UART: [art] Derive Key Pair - Done
2,449,012,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,450,724,684 UART: [art] Erasing AUTHORITY.KEYID = 7
2,450,726,189 UART: [art] PUB.X = F1EF2FC18BC07AD844D9902799897305266238516B9DCF14C3C91185AEB727FBC518D8986653E3DD6C4101DB85FABCDD
2,450,733,430 UART: [art] PUB.Y = B5BB10F0667A1BA9825D6CEA61844C756DB4E7BDB442683679BDDCF23FF6834818CDE5938D411059D62539D01AB968DF
2,450,740,712 UART: [art] SIG.R = 0CB13638360D017B9AB6343B6E1AE275017A427269BAA13D83AD99B667AE89953A3DB21C8CB97DC0829AD4450B60D97C
2,450,748,095 UART: [art] SIG.S = 9332EA3CA540355A5CBF6A0E2AAB0F8D1E7E2B589E4780D527D3088BB3F3A086B1F6B1121D27367EBD2801604F02B5D7
2,451,727,063 UART: Caliptra RT
2,451,727,772 UART: [state] CFI Enabled
2,452,151,726 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 337.68s
Truncated 697543 bytes from beginning
= 7
2,482,892,773 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,894,279 UART: [art] PUB.X = 26ACED27C657209968C16CB239AD28E7CBCB223BB2184DA3B960B5147BD61F63BDBFAA3B14723497FBF0293ECB0FEAED
2,482,901,560 UART: [art] PUB.Y = 54051AD95D46B7F8FD47D82C748F7D7A6F9F14185B6982C1ACBC1AC1029F92AD3B3DE956CA80EB272FFE70149F5AC37C
2,482,908,870 UART: [art] SIG.R = 71F181463DD5AA2ED75567169372A4FD3AD2B7FFCFB4B75755AC56C33FDEF0F0A36834798C5C1DA351D8FB6C8193D816
2,482,916,242 UART: [art] SIG.S = 3FF3396D51B08C75DA1820CDDDDE17A6AE2101A6CAB724F4CF66FE5D65F114E48103B5D330F9E93AE49D001E96A3A1DD
2,483,895,487 UART: Caliptra RT
2,483,896,191 UART: [state] CFI Enabled
2,484,319,492 UART: [rt] RT listening for mailbox commands...
2,484,321,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,492,227,039 >>> mbox cmd response: success
2,492,262,262 UART:
2,492,262,535 UART: Running Caliptra FMC ...
2,492,263,569 UART:
2,492,263,721 UART: [state] CFI Enabled
2,492,369,002 UART: [art] Extend RT PCRs Done
2,492,370,205 UART: [art] Lock RT PCRs Done
2,492,371,753 UART: [art] Populate DV Done
2,492,377,107 UART: [fht] FMC Alias Private Key: 7
2,492,378,824 UART: [art] Derive CDI
2,492,379,569 UART: [art] Store in slot 0x4
2,492,438,099 UART: [art] Derive Key Pair
2,492,439,100 UART: [art] Store priv key in slot 0x5
2,494,901,448 UART: [art] Derive Key Pair - Done
2,494,914,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,496,627,585 UART: [art] Erasing AUTHORITY.KEYID = 7
2,496,629,100 UART: [art] PUB.X = 07B8284ACBB6138AF983F1DD2AE13D9AF4D6B0FCCE579C65E93F948426ED6CAC3744B3D2249F9EC4DEDD8B06EA27FCB9
2,496,636,400 UART: [art] PUB.Y = 889D71DB547C00B47A0F8D9D3B33841A2B8E33ABF52898DAF61A37CB7D9F3F60C78175DC89FE5A894EA1DA5F8C1D8B2E
2,496,643,665 UART: [art] SIG.R = 0AAA50E362FB87334C8CDDBB5F2D6F2258601BE6B53FB8DA21BF1A7A5A14715DFED63AB6EF32C173005489BBED2A7D27
2,496,651,093 UART: [art] SIG.S = 7E7AAC17DD10BE634A1452D9BE2ABD1394EA9EDB3969275AE5FF32686CC74789FAFE2BA47421B61CE556D656FD0D9C5E
2,497,630,503 UART: Caliptra RT
2,497,631,227 UART: [state] CFI Enabled
2,498,048,178 UART: [rt] RT listening for mailbox commands...
2,498,050,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,505,959,626 >>> mbox cmd response: success
2,505,995,255 UART:
2,505,995,556 UART: Running Caliptra FMC ...
2,505,996,598 UART:
2,505,996,752 UART: [state] CFI Enabled
2,506,083,885 UART: [art] Extend RT PCRs Done
2,506,085,081 UART: [art] Lock RT PCRs Done
2,506,086,519 UART: [art] Populate DV Done
2,506,091,985 UART: [fht] FMC Alias Private Key: 7
2,506,093,546 UART: [art] Derive CDI
2,506,094,286 UART: [art] Store in slot 0x4
2,506,152,511 UART: [art] Derive Key Pair
2,506,153,553 UART: [art] Store priv key in slot 0x5
2,508,616,209 UART: [art] Derive Key Pair - Done
2,508,629,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,510,341,596 UART: [art] Erasing AUTHORITY.KEYID = 7
2,510,343,110 UART: [art] PUB.X = 26ACED27C657209968C16CB239AD28E7CBCB223BB2184DA3B960B5147BD61F63BDBFAA3B14723497FBF0293ECB0FEAED
2,510,350,383 UART: [art] PUB.Y = 54051AD95D46B7F8FD47D82C748F7D7A6F9F14185B6982C1ACBC1AC1029F92AD3B3DE956CA80EB272FFE70149F5AC37C
2,510,357,698 UART: [art] SIG.R = 71F181463DD5AA2ED75567169372A4FD3AD2B7FFCFB4B75755AC56C33FDEF0F0A36834798C5C1DA351D8FB6C8193D816
2,510,365,130 UART: [art] SIG.S = 3FF3396D51B08C75DA1820CDDDDE17A6AE2101A6CAB724F4CF66FE5D65F114E48103B5D330F9E93AE49D001E96A3A1DD
2,511,343,776 UART: Caliptra RT
2,511,344,480 UART: [state] CFI Enabled
2,511,764,720 UART: [rt] RT listening for mailbox commands...
2,511,766,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,519,683,701 >>> mbox cmd response: success
2,519,718,111 UART:
2,519,718,386 UART: Running Caliptra FMC ...
2,519,719,504 UART:
2,519,719,663 UART: [state] CFI Enabled
2,519,817,599 UART: [art] Extend RT PCRs Done
2,519,818,810 UART: [art] Lock RT PCRs Done
2,519,820,376 UART: [art] Populate DV Done
2,519,825,622 UART: [fht] FMC Alias Private Key: 7
2,519,827,386 UART: [art] Derive CDI
2,519,828,203 UART: [art] Store in slot 0x4
2,519,886,114 UART: [art] Derive Key Pair
2,519,887,116 UART: [art] Store priv key in slot 0x5
2,522,350,262 UART: [art] Derive Key Pair - Done
2,522,363,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,524,075,167 UART: [art] Erasing AUTHORITY.KEYID = 7
2,524,076,673 UART: [art] PUB.X = 07B8284ACBB6138AF983F1DD2AE13D9AF4D6B0FCCE579C65E93F948426ED6CAC3744B3D2249F9EC4DEDD8B06EA27FCB9
2,524,083,975 UART: [art] PUB.Y = 889D71DB547C00B47A0F8D9D3B33841A2B8E33ABF52898DAF61A37CB7D9F3F60C78175DC89FE5A894EA1DA5F8C1D8B2E
2,524,091,239 UART: [art] SIG.R = 0AAA50E362FB87334C8CDDBB5F2D6F2258601BE6B53FB8DA21BF1A7A5A14715DFED63AB6EF32C173005489BBED2A7D27
2,524,098,666 UART: [art] SIG.S = 7E7AAC17DD10BE634A1452D9BE2ABD1394EA9EDB3969275AE5FF32686CC74789FAFE2BA47421B61CE556D656FD0D9C5E
2,525,077,572 UART: Caliptra RT
2,525,078,292 UART: [state] CFI Enabled
2,525,500,919 UART: [rt] RT listening for mailbox commands...
2,525,502,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,533,401,958 >>> mbox cmd response: success
2,533,434,838 UART:
2,533,435,143 UART: Running Caliptra FMC ...
2,533,436,185 UART:
2,533,436,337 UART: [state] CFI Enabled
2,533,530,104 UART: [art] Extend RT PCRs Done
2,533,531,302 UART: [art] Lock RT PCRs Done
2,533,532,630 UART: [art] Populate DV Done
2,533,538,046 UART: [fht] FMC Alias Private Key: 7
2,533,539,667 UART: [art] Derive CDI
2,533,540,409 UART: [art] Store in slot 0x4
2,533,599,019 UART: [art] Derive Key Pair
2,533,600,067 UART: [art] Store priv key in slot 0x5
2,536,062,656 UART: [art] Derive Key Pair - Done
2,536,075,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,537,788,608 UART: [art] Erasing AUTHORITY.KEYID = 7
2,537,790,122 UART: [art] PUB.X = 26ACED27C657209968C16CB239AD28E7CBCB223BB2184DA3B960B5147BD61F63BDBFAA3B14723497FBF0293ECB0FEAED
2,537,797,410 UART: [art] PUB.Y = 54051AD95D46B7F8FD47D82C748F7D7A6F9F14185B6982C1ACBC1AC1029F92AD3B3DE956CA80EB272FFE70149F5AC37C
2,537,804,720 UART: [art] SIG.R = 71F181463DD5AA2ED75567169372A4FD3AD2B7FFCFB4B75755AC56C33FDEF0F0A36834798C5C1DA351D8FB6C8193D816
2,537,812,113 UART: [art] SIG.S = 3FF3396D51B08C75DA1820CDDDDE17A6AE2101A6CAB724F4CF66FE5D65F114E48103B5D330F9E93AE49D001E96A3A1DD
2,538,791,386 UART: Caliptra RT
2,538,792,099 UART: [state] CFI Enabled
2,539,209,859 UART: [rt] RT listening for mailbox commands...
2,539,211,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,547,102,931 >>> mbox cmd response: success
2,547,137,492 UART:
2,547,137,762 UART: Running Caliptra FMC ...
2,547,138,877 UART:
2,547,139,037 UART: [state] CFI Enabled
2,547,242,581 UART: [art] Extend RT PCRs Done
2,547,243,770 UART: [art] Lock RT PCRs Done
2,547,245,417 UART: [art] Populate DV Done
2,547,250,881 UART: [fht] FMC Alias Private Key: 7
2,547,252,508 UART: [art] Derive CDI
2,547,253,261 UART: [art] Store in slot 0x4
2,547,311,711 UART: [art] Derive Key Pair
2,547,312,715 UART: [art] Store priv key in slot 0x5
2,549,775,503 UART: [art] Derive Key Pair - Done
2,549,788,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,500,617 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,502,130 UART: [art] PUB.X = 07B8284ACBB6138AF983F1DD2AE13D9AF4D6B0FCCE579C65E93F948426ED6CAC3744B3D2249F9EC4DEDD8B06EA27FCB9
2,551,509,430 UART: [art] PUB.Y = 889D71DB547C00B47A0F8D9D3B33841A2B8E33ABF52898DAF61A37CB7D9F3F60C78175DC89FE5A894EA1DA5F8C1D8B2E
2,551,516,699 UART: [art] SIG.R = 0AAA50E362FB87334C8CDDBB5F2D6F2258601BE6B53FB8DA21BF1A7A5A14715DFED63AB6EF32C173005489BBED2A7D27
2,551,524,067 UART: [art] SIG.S = 7E7AAC17DD10BE634A1452D9BE2ABD1394EA9EDB3969275AE5FF32686CC74789FAFE2BA47421B61CE556D656FD0D9C5E
2,552,502,647 UART: Caliptra RT
2,552,503,346 UART: [state] CFI Enabled
2,552,923,733 UART: [rt] RT listening for mailbox commands...
2,552,925,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,560,836,347 >>> mbox cmd response: success
2,560,870,422 UART:
2,560,870,744 UART: Running Caliptra FMC ...
2,560,871,791 UART:
2,560,871,951 UART: [state] CFI Enabled
2,560,978,740 UART: [art] Extend RT PCRs Done
2,560,979,933 UART: [art] Lock RT PCRs Done
2,560,981,394 UART: [art] Populate DV Done
2,560,986,806 UART: [fht] FMC Alias Private Key: 7
2,560,988,415 UART: [art] Derive CDI
2,560,989,228 UART: [art] Store in slot 0x4
2,561,047,576 UART: [art] Derive Key Pair
2,561,048,626 UART: [art] Store priv key in slot 0x5
2,563,511,425 UART: [art] Derive Key Pair - Done
2,563,524,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,565,237,090 UART: [art] Erasing AUTHORITY.KEYID = 7
2,565,238,604 UART: [art] PUB.X = 26ACED27C657209968C16CB239AD28E7CBCB223BB2184DA3B960B5147BD61F63BDBFAA3B14723497FBF0293ECB0FEAED
2,565,245,885 UART: [art] PUB.Y = 54051AD95D46B7F8FD47D82C748F7D7A6F9F14185B6982C1ACBC1AC1029F92AD3B3DE956CA80EB272FFE70149F5AC37C
2,565,253,167 UART: [art] SIG.R = 71F181463DD5AA2ED75567169372A4FD3AD2B7FFCFB4B75755AC56C33FDEF0F0A36834798C5C1DA351D8FB6C8193D816
2,565,260,598 UART: [art] SIG.S = 3FF3396D51B08C75DA1820CDDDDE17A6AE2101A6CAB724F4CF66FE5D65F114E48103B5D330F9E93AE49D001E96A3A1DD
2,566,239,669 UART: Caliptra RT
2,566,240,386 UART: [state] CFI Enabled
2,566,663,587 UART: [rt] RT listening for mailbox commands...
2,566,665,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,574,574,275 >>> mbox cmd response: success
2,574,607,396 UART:
2,574,607,671 UART: Running Caliptra FMC ...
2,574,608,937 UART:
2,574,609,100 UART: [state] CFI Enabled
2,574,716,264 UART: [art] Extend RT PCRs Done
2,574,717,452 UART: [art] Lock RT PCRs Done
2,574,718,831 UART: [art] Populate DV Done
2,574,724,461 UART: [fht] FMC Alias Private Key: 7
2,574,725,997 UART: [art] Derive CDI
2,574,726,733 UART: [art] Store in slot 0x4
2,574,784,956 UART: [art] Derive Key Pair
2,574,785,991 UART: [art] Store priv key in slot 0x5
2,577,248,555 UART: [art] Derive Key Pair - Done
2,577,261,289 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,578,974,655 UART: [art] Erasing AUTHORITY.KEYID = 7
2,578,976,169 UART: [art] PUB.X = 07B8284ACBB6138AF983F1DD2AE13D9AF4D6B0FCCE579C65E93F948426ED6CAC3744B3D2249F9EC4DEDD8B06EA27FCB9
2,578,983,474 UART: [art] PUB.Y = 889D71DB547C00B47A0F8D9D3B33841A2B8E33ABF52898DAF61A37CB7D9F3F60C78175DC89FE5A894EA1DA5F8C1D8B2E
2,578,990,690 UART: [art] SIG.R = 0AAA50E362FB87334C8CDDBB5F2D6F2258601BE6B53FB8DA21BF1A7A5A14715DFED63AB6EF32C173005489BBED2A7D27
2,578,998,122 UART: [art] SIG.S = 7E7AAC17DD10BE634A1452D9BE2ABD1394EA9EDB3969275AE5FF32686CC74789FAFE2BA47421B61CE556D656FD0D9C5E
2,579,976,972 UART: Caliptra RT
2,579,977,664 UART: [state] CFI Enabled
2,580,401,092 UART: [rt] RT listening for mailbox commands...
2,580,402,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,588,311,722 >>> mbox cmd response: success
2,588,346,972 UART:
2,588,347,247 UART: Running Caliptra FMC ...
2,588,348,363 UART:
2,588,348,522 UART: [state] CFI Enabled
2,588,449,531 UART: [art] Extend RT PCRs Done
2,588,450,733 UART: [art] Lock RT PCRs Done
2,588,451,977 UART: [art] Populate DV Done
2,588,457,417 UART: [fht] FMC Alias Private Key: 7
2,588,458,968 UART: [art] Derive CDI
2,588,459,787 UART: [art] Store in slot 0x4
2,588,518,566 UART: [art] Derive Key Pair
2,588,519,568 UART: [art] Store priv key in slot 0x5
2,590,981,374 UART: [art] Derive Key Pair - Done
2,590,994,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,592,707,509 UART: [art] Erasing AUTHORITY.KEYID = 7
2,592,708,996 UART: [art] PUB.X = 26ACED27C657209968C16CB239AD28E7CBCB223BB2184DA3B960B5147BD61F63BDBFAA3B14723497FBF0293ECB0FEAED
2,592,716,321 UART: [art] PUB.Y = 54051AD95D46B7F8FD47D82C748F7D7A6F9F14185B6982C1ACBC1AC1029F92AD3B3DE956CA80EB272FFE70149F5AC37C
2,592,723,640 UART: [art] SIG.R = 71F181463DD5AA2ED75567169372A4FD3AD2B7FFCFB4B75755AC56C33FDEF0F0A36834798C5C1DA351D8FB6C8193D816
2,592,731,060 UART: [art] SIG.S = 3FF3396D51B08C75DA1820CDDDDE17A6AE2101A6CAB724F4CF66FE5D65F114E48103B5D330F9E93AE49D001E96A3A1DD
2,593,710,202 UART: Caliptra RT
2,593,710,922 UART: [state] CFI Enabled
2,594,128,888 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 344.78s
Truncated 1312194 bytes from beginning
g Datavault
2,359,331,251 UART: [state] Locking PCR0, PCR1 and PCR31
2,359,333,427 UART: [state] Locking ICCM
2,359,335,732 UART: [exit] Launching FMC @ 0x40000130
2,359,344,414 UART:
2,359,344,654 UART: Running Caliptra FMC ...
2,359,345,684 UART:
2,359,345,837 UART: [state] CFI Enabled
2,359,389,800 UART: [art] Extend RT PCRs Done
2,359,390,988 UART: [art] Lock RT PCRs Done
2,359,392,428 UART: [art] Populate DV Done
2,359,398,012 UART: [fht] FMC Alias Private Key: 7
2,359,399,722 UART: [art] Derive CDI
2,359,400,466 UART: [art] Store in slot 0x4
2,359,443,281 UART: [art] Derive Key Pair
2,359,444,288 UART: [art] Store priv key in slot 0x5
2,361,871,310 UART: [art] Derive Key Pair - Done
2,361,884,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,363,590,546 UART: [art] Erasing AUTHORITY.KEYID = 7
2,363,592,058 UART: [art] PUB.X = 1257A474D4502665DC65B2821597BAFBE66A60D2798ACF82288435968D3CB0A7A3185B91D877F1DD549E41A9DB7F202F
2,363,599,276 UART: [art] PUB.Y = C3BFC7C89977E1C45B2F1FFFAD06DF1ADB761C98D119260E7592CA5CC7971FF5518812E0E241BA75D27074D4B8AA9A85
2,363,606,584 UART: [art] SIG.R = 9E667A02ECE9C612D3E43D648315CFD1A8D671FD64B864D0BAB946771E3685F24C6C6558AC284E7371A03FF29C8F4FC4
2,363,613,957 UART: [art] SIG.S = 43CB137811C5A9600D93FAB1F0B1285066B21BE9B14C5E227701C5CDE065B70D23A0722CD1E926349BA7BAEC1D86CA0C
2,364,592,871 UART: Caliptra RT
2,364,593,566 UART: [state] CFI Enabled
2,364,966,021 UART: [rt] RT listening for mailbox commands...
2,364,968,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,365,118,147 UART:
2,365,118,464 UART: Running Caliptra ROM ...
2,365,119,588 UART:
2,365,119,756 UART: [state] CFI Enabled
2,365,598,508 UART: [state] LifecycleState = Unprovisioned
2,365,600,479 UART: [state] DebugLocked = No
2,365,602,418 UART: [state] WD Timer not started. Device not locked for debugging
2,365,606,427 UART: [kat] SHA2-256
2,365,796,333 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,365,807,115 UART: [kat] ++
2,365,807,613 UART: [kat] sha1
2,365,818,780 UART: [kat] SHA2-256
2,365,821,812 UART: [kat] SHA2-384
2,365,827,595 UART: [kat] SHA2-512-ACC
2,365,830,226 UART: [kat] ECC-384
2,368,270,619 UART: [kat] HMAC-384Kdf
2,368,283,720 UART: [kat] LMS
2,368,815,328 UART: [kat] --
2,368,818,671 UART: [update-reset] ++
2,372,331,373 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,372,334,931 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,372,964,647 >>> mbox cmd response: success
2,372,965,898 UART: [update-reset] Copying MAN_2 To MAN_1
2,373,003,437 UART: [update-reset Success] --
2,373,006,653 UART: [state] Locking Datavault
2,373,010,151 UART: [state] Locking PCR0, PCR1 and PCR31
2,373,012,367 UART: [state] Locking ICCM
2,373,014,481 UART: [exit] Launching FMC @ 0x40000130
2,373,023,117 UART:
2,373,023,364 UART: Running Caliptra FMC ...
2,373,024,478 UART:
2,373,024,645 UART: [state] CFI Enabled
2,373,068,400 UART: [art] Extend RT PCRs Done
2,373,069,594 UART: [art] Lock RT PCRs Done
2,373,070,845 UART: [art] Populate DV Done
2,373,076,101 UART: [fht] FMC Alias Private Key: 7
2,373,077,814 UART: [art] Derive CDI
2,373,078,639 UART: [art] Store in slot 0x4
2,373,121,083 UART: [art] Derive Key Pair
2,373,122,113 UART: [art] Store priv key in slot 0x5
2,375,548,974 UART: [art] Derive Key Pair - Done
2,375,562,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,377,268,493 UART: [art] Erasing AUTHORITY.KEYID = 7
2,377,270,010 UART: [art] PUB.X = C2E2AB96EE848B4C3F72134008521009E4CD2423003ECC5DC77C5202FB63DFB61EFE4BFAF6DD31EB0392425C7D4DA464
2,377,277,241 UART: [art] PUB.Y = 1C75743B22110CE217110408ED359D23A9C7896EADD54996B11B528F9E8512D379CB194719D1AA0D25EE5FABA66BE314
2,377,284,510 UART: [art] SIG.R = 910EAEDB8B6876F9CFA118EA33C55AAEC523555FD23097F59DC9E0E06B1ED3117CFC3F31170D17E98394193403BDEDF8
2,377,291,926 UART: [art] SIG.S = 8C9038FE03567B2FD724923A9C76D4009EF2FC3972E205F0FEAA1F2115CE012AB2DFAF4E361A4260C79707E01930B9D0
2,378,270,506 UART: Caliptra RT
2,378,271,217 UART: [state] CFI Enabled
2,378,639,489 UART: [rt] RT listening for mailbox commands...
2,378,641,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,378,791,172 UART:
2,378,791,477 UART: Running Caliptra ROM ...
2,378,792,601 UART:
2,378,792,776 UART: [state] CFI Enabled
2,378,803,075 UART: [state] LifecycleState = Unprovisioned
2,378,804,971 UART: [state] DebugLocked = No
2,378,806,304 UART: [state] WD Timer not started. Device not locked for debugging
2,378,810,075 UART: [kat] SHA2-256
2,378,999,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,379,010,512 UART: [kat] ++
2,379,011,064 UART: [kat] sha1
2,379,021,978 UART: [kat] SHA2-256
2,379,025,007 UART: [kat] SHA2-384
2,379,029,825 UART: [kat] SHA2-512-ACC
2,379,032,411 UART: [kat] ECC-384
2,381,476,606 UART: [kat] HMAC-384Kdf
2,381,489,442 UART: [kat] LMS
2,382,021,019 UART: [kat] --
2,382,025,740 UART: [update-reset] ++
2,385,533,354 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,385,537,195 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,386,166,929 >>> mbox cmd response: success
2,386,167,314 UART: [update-reset] Copying MAN_2 To MAN_1
2,386,204,827 UART: [update-reset Success] --
2,386,210,540 UART: [state] Locking Datavault
2,386,213,607 UART: [state] Locking PCR0, PCR1 and PCR31
2,386,215,760 UART: [state] Locking ICCM
2,386,217,660 UART: [exit] Launching FMC @ 0x40000130
2,386,226,297 UART:
2,386,226,539 UART: Running Caliptra FMC ...
2,386,227,574 UART:
2,386,227,729 UART: [state] CFI Enabled
2,386,271,598 UART: [art] Extend RT PCRs Done
2,386,272,791 UART: [art] Lock RT PCRs Done
2,386,274,123 UART: [art] Populate DV Done
2,386,279,865 UART: [fht] FMC Alias Private Key: 7
2,386,281,378 UART: [art] Derive CDI
2,386,282,120 UART: [art] Store in slot 0x4
2,386,325,096 UART: [art] Derive Key Pair
2,386,326,109 UART: [art] Store priv key in slot 0x5
2,388,752,777 UART: [art] Derive Key Pair - Done
2,388,765,610 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,390,471,947 UART: [art] Erasing AUTHORITY.KEYID = 7
2,390,473,463 UART: [art] PUB.X = 1257A474D4502665DC65B2821597BAFBE66A60D2798ACF82288435968D3CB0A7A3185B91D877F1DD549E41A9DB7F202F
2,390,480,736 UART: [art] PUB.Y = C3BFC7C89977E1C45B2F1FFFAD06DF1ADB761C98D119260E7592CA5CC7971FF5518812E0E241BA75D27074D4B8AA9A85
2,390,487,998 UART: [art] SIG.R = 9E667A02ECE9C612D3E43D648315CFD1A8D671FD64B864D0BAB946771E3685F24C6C6558AC284E7371A03FF29C8F4FC4
2,390,495,375 UART: [art] SIG.S = 43CB137811C5A9600D93FAB1F0B1285066B21BE9B14C5E227701C5CDE065B70D23A0722CD1E926349BA7BAEC1D86CA0C
2,391,474,060 UART: Caliptra RT
2,391,474,759 UART: [state] CFI Enabled
2,391,848,395 UART: [rt] RT listening for mailbox commands...
2,391,850,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,392,000,577 UART:
2,392,000,929 UART: Running Caliptra ROM ...
2,392,002,069 UART:
2,392,002,246 UART: [state] CFI Enabled
2,392,018,139 UART: [state] LifecycleState = Unprovisioned
2,392,020,045 UART: [state] DebugLocked = No
2,392,022,675 UART: [state] WD Timer not started. Device not locked for debugging
2,392,026,863 UART: [kat] SHA2-256
2,392,216,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,392,227,482 UART: [kat] ++
2,392,228,088 UART: [kat] sha1
2,392,238,453 UART: [kat] SHA2-256
2,392,241,486 UART: [kat] SHA2-384
2,392,246,241 UART: [kat] SHA2-512-ACC
2,392,248,872 UART: [kat] ECC-384
2,394,688,562 UART: [kat] HMAC-384Kdf
2,394,701,881 UART: [kat] LMS
2,395,233,512 UART: [kat] --
2,395,237,990 UART: [update-reset] ++
2,398,744,506 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,398,747,069 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,399,376,765 >>> mbox cmd response: success
2,399,377,691 UART: [update-reset] Copying MAN_2 To MAN_1
2,399,415,267 UART: [update-reset Success] --
2,399,420,093 UART: [state] Locking Datavault
2,399,422,563 UART: [state] Locking PCR0, PCR1 and PCR31
2,399,424,720 UART: [state] Locking ICCM
2,399,427,318 UART: [exit] Launching FMC @ 0x40000130
2,399,435,958 UART:
2,399,436,199 UART: Running Caliptra FMC ...
2,399,437,312 UART:
2,399,437,473 UART: [state] CFI Enabled
2,399,481,000 UART: [art] Extend RT PCRs Done
2,399,482,217 UART: [art] Lock RT PCRs Done
2,399,483,685 UART: [art] Populate DV Done
2,399,489,100 UART: [fht] FMC Alias Private Key: 7
2,399,490,697 UART: [art] Derive CDI
2,399,491,517 UART: [art] Store in slot 0x4
2,399,534,224 UART: [art] Derive Key Pair
2,399,535,232 UART: [art] Store priv key in slot 0x5
2,401,961,800 UART: [art] Derive Key Pair - Done
2,401,974,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,403,680,711 UART: [art] Erasing AUTHORITY.KEYID = 7
2,403,682,225 UART: [art] PUB.X = C2E2AB96EE848B4C3F72134008521009E4CD2423003ECC5DC77C5202FB63DFB61EFE4BFAF6DD31EB0392425C7D4DA464
2,403,689,512 UART: [art] PUB.Y = 1C75743B22110CE217110408ED359D23A9C7896EADD54996B11B528F9E8512D379CB194719D1AA0D25EE5FABA66BE314
2,403,696,765 UART: [art] SIG.R = 910EAEDB8B6876F9CFA118EA33C55AAEC523555FD23097F59DC9E0E06B1ED3117CFC3F31170D17E98394193403BDEDF8
2,403,704,131 UART: [art] SIG.S = 8C9038FE03567B2FD724923A9C76D4009EF2FC3972E205F0FEAA1F2115CE012AB2DFAF4E361A4260C79707E01930B9D0
2,404,683,252 UART: Caliptra RT
2,404,683,952 UART: [state] CFI Enabled
2,405,053,664 UART: [rt] RT listening for mailbox commands...
2,405,055,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,405,205,500 UART:
2,405,205,818 UART: Running Caliptra ROM ...
2,405,206,951 UART:
2,405,207,119 UART: [state] CFI Enabled
2,405,722,397 UART: [state] LifecycleState = Unprovisioned
2,405,724,290 UART: [state] DebugLocked = No
2,405,725,904 UART: [state] WD Timer not started. Device not locked for debugging
2,405,729,837 UART: [kat] SHA2-256
2,405,919,718 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,405,930,476 UART: [kat] ++
2,405,931,023 UART: [kat] sha1
2,405,942,464 UART: [kat] SHA2-256
2,405,945,429 UART: [kat] SHA2-384
2,405,952,445 UART: [kat] SHA2-512-ACC
2,405,955,070 UART: [kat] ECC-384
2,408,396,508 UART: [kat] HMAC-384Kdf
2,408,409,337 UART: [kat] LMS
2,408,940,990 UART: [kat] --
2,408,944,493 UART: [update-reset] ++
2,412,453,796 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,412,457,214 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,413,086,962 >>> mbox cmd response: success
2,413,087,892 UART: [update-reset] Copying MAN_2 To MAN_1
2,413,125,423 UART: [update-reset Success] --
2,413,130,371 UART: [state] Locking Datavault
2,413,134,066 UART: [state] Locking PCR0, PCR1 and PCR31
2,413,136,222 UART: [state] Locking ICCM
2,413,138,851 UART: [exit] Launching FMC @ 0x40000130
2,413,147,480 UART:
2,413,147,766 UART: Running Caliptra FMC ...
2,413,148,822 UART:
2,413,148,980 UART: [state] CFI Enabled
2,413,193,005 UART: [art] Extend RT PCRs Done
2,413,194,169 UART: [art] Lock RT PCRs Done
2,413,195,758 UART: [art] Populate DV Done
2,413,201,327 UART: [fht] FMC Alias Private Key: 7
2,413,203,028 UART: [art] Derive CDI
2,413,203,773 UART: [art] Store in slot 0x4
2,413,246,518 UART: [art] Derive Key Pair
2,413,247,586 UART: [art] Store priv key in slot 0x5
2,415,674,510 UART: [art] Derive Key Pair - Done
2,415,687,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,417,394,583 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,396,121 UART: [art] PUB.X = 1257A474D4502665DC65B2821597BAFBE66A60D2798ACF82288435968D3CB0A7A3185B91D877F1DD549E41A9DB7F202F
2,417,403,345 UART: [art] PUB.Y = C3BFC7C89977E1C45B2F1FFFAD06DF1ADB761C98D119260E7592CA5CC7971FF5518812E0E241BA75D27074D4B8AA9A85
2,417,410,606 UART: [art] SIG.R = 9E667A02ECE9C612D3E43D648315CFD1A8D671FD64B864D0BAB946771E3685F24C6C6558AC284E7371A03FF29C8F4FC4
2,417,418,055 UART: [art] SIG.S = 43CB137811C5A9600D93FAB1F0B1285066B21BE9B14C5E227701C5CDE065B70D23A0722CD1E926349BA7BAEC1D86CA0C
2,418,397,424 UART: Caliptra RT
2,418,398,119 UART: [state] CFI Enabled
2,418,774,454 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 336.01s
Truncated 697473 bytes from beginning
= 7
2,404,931,620 UART: [art] Erasing AUTHORITY.KEYID = 7
2,404,933,148 UART: [art] PUB.X = DCE03E673C5265258DDEB42D2999D121EAA51B73343657FE0C7BAD24EE87E9DCE7FB626A02F7D255032DFB69FF7058E5
2,404,940,420 UART: [art] PUB.Y = 43135A9E34CB48CB3212CFB18473CC9B3289480D2E33BA375A154E1D235A434DA351E6C3823C1CCBB142D946931ACF42
2,404,947,665 UART: [art] SIG.R = AB18A877F3F1A639D0C79BA451FAEF9B4CB39E81CDB2B54EEDF66261C97223563540DFEF8A5DE6E9E6500F0C2DACD521
2,404,955,184 UART: [art] SIG.S = AB7BE2FD5169AFC5FAEEF1FE3E753ABE1236D96B7B5AE0C5053988BE2CDE5501CE87E0D140040B0DBFAE71BA0A349571
2,405,933,012 UART: Caliptra RT
2,405,933,742 UART: [state] CFI Enabled
2,406,307,238 UART: [rt] RT listening for mailbox commands...
2,406,309,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,414,127,690 >>> mbox cmd response: success
2,414,163,274 UART:
2,414,163,555 UART: Running Caliptra FMC ...
2,414,164,689 UART:
2,414,164,857 UART: [state] CFI Enabled
2,414,209,430 UART: [art] Extend RT PCRs Done
2,414,210,648 UART: [art] Lock RT PCRs Done
2,414,212,227 UART: [art] Populate DV Done
2,414,217,698 UART: [fht] FMC Alias Private Key: 7
2,414,219,407 UART: [art] Derive CDI
2,414,220,156 UART: [art] Store in slot 0x4
2,414,262,545 UART: [art] Derive Key Pair
2,414,263,556 UART: [art] Store priv key in slot 0x5
2,416,690,342 UART: [art] Derive Key Pair - Done
2,416,703,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,418,409,700 UART: [art] Erasing AUTHORITY.KEYID = 7
2,418,411,223 UART: [art] PUB.X = AE666F05EB3ED3DBDAC43556525EBA9130AB1F958DBEF3FA794A03E4BF990F16709B9DC89045EC7373D6DCD985ADE6CC
2,418,418,540 UART: [art] PUB.Y = 7E02C60564DAA0CA42FD7410797E2DD93D9AEB3E42A044AF87CBB66B6EA8CFC47CADE28A99E6CF38C2B87C8DB2050531
2,418,425,794 UART: [art] SIG.R = E7E3D972E26E51000E5BEC5C002BED5FED33322FC1B51125A1CF4A9B4FFB596AD46333852CDFC2835B2B500C2532EFC9
2,418,433,149 UART: [art] SIG.S = 0E7747A29C9C3FFB6D8FC60107387CCA0B3DAEBD0E8252D42165D31F46313E4380CFDD36926CD9B79AAEA86A6A55AD6B
2,419,412,337 UART: Caliptra RT
2,419,413,060 UART: [state] CFI Enabled
2,419,785,168 UART: [rt] RT listening for mailbox commands...
2,419,787,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,427,615,406 >>> mbox cmd response: success
2,427,648,250 UART:
2,427,648,559 UART: Running Caliptra FMC ...
2,427,649,605 UART:
2,427,649,763 UART: [state] CFI Enabled
2,427,693,842 UART: [art] Extend RT PCRs Done
2,427,694,997 UART: [art] Lock RT PCRs Done
2,427,696,586 UART: [art] Populate DV Done
2,427,701,886 UART: [fht] FMC Alias Private Key: 7
2,427,703,588 UART: [art] Derive CDI
2,427,704,331 UART: [art] Store in slot 0x4
2,427,747,360 UART: [art] Derive Key Pair
2,427,748,405 UART: [art] Store priv key in slot 0x5
2,430,175,499 UART: [art] Derive Key Pair - Done
2,430,188,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,431,894,326 UART: [art] Erasing AUTHORITY.KEYID = 7
2,431,895,867 UART: [art] PUB.X = DCE03E673C5265258DDEB42D2999D121EAA51B73343657FE0C7BAD24EE87E9DCE7FB626A02F7D255032DFB69FF7058E5
2,431,903,142 UART: [art] PUB.Y = 43135A9E34CB48CB3212CFB18473CC9B3289480D2E33BA375A154E1D235A434DA351E6C3823C1CCBB142D946931ACF42
2,431,910,394 UART: [art] SIG.R = AB18A877F3F1A639D0C79BA451FAEF9B4CB39E81CDB2B54EEDF66261C97223563540DFEF8A5DE6E9E6500F0C2DACD521
2,431,917,804 UART: [art] SIG.S = AB7BE2FD5169AFC5FAEEF1FE3E753ABE1236D96B7B5AE0C5053988BE2CDE5501CE87E0D140040B0DBFAE71BA0A349571
2,432,896,260 UART: Caliptra RT
2,432,897,005 UART: [state] CFI Enabled
2,433,270,842 UART: [rt] RT listening for mailbox commands...
2,433,272,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,441,093,936 >>> mbox cmd response: success
2,441,126,233 UART:
2,441,126,511 UART: Running Caliptra FMC ...
2,441,127,558 UART:
2,441,127,714 UART: [state] CFI Enabled
2,441,171,713 UART: [art] Extend RT PCRs Done
2,441,172,908 UART: [art] Lock RT PCRs Done
2,441,174,239 UART: [art] Populate DV Done
2,441,179,827 UART: [fht] FMC Alias Private Key: 7
2,441,181,488 UART: [art] Derive CDI
2,441,182,236 UART: [art] Store in slot 0x4
2,441,225,055 UART: [art] Derive Key Pair
2,441,226,068 UART: [art] Store priv key in slot 0x5
2,443,653,132 UART: [art] Derive Key Pair - Done
2,443,665,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,445,371,973 UART: [art] Erasing AUTHORITY.KEYID = 7
2,445,373,493 UART: [art] PUB.X = AE666F05EB3ED3DBDAC43556525EBA9130AB1F958DBEF3FA794A03E4BF990F16709B9DC89045EC7373D6DCD985ADE6CC
2,445,380,826 UART: [art] PUB.Y = 7E02C60564DAA0CA42FD7410797E2DD93D9AEB3E42A044AF87CBB66B6EA8CFC47CADE28A99E6CF38C2B87C8DB2050531
2,445,388,083 UART: [art] SIG.R = E7E3D972E26E51000E5BEC5C002BED5FED33322FC1B51125A1CF4A9B4FFB596AD46333852CDFC2835B2B500C2532EFC9
2,445,395,436 UART: [art] SIG.S = 0E7747A29C9C3FFB6D8FC60107387CCA0B3DAEBD0E8252D42165D31F46313E4380CFDD36926CD9B79AAEA86A6A55AD6B
2,446,374,238 UART: Caliptra RT
2,446,374,979 UART: [state] CFI Enabled
2,446,750,603 UART: [rt] RT listening for mailbox commands...
2,446,752,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,454,575,278 >>> mbox cmd response: success
2,454,610,076 UART:
2,454,610,390 UART: Running Caliptra FMC ...
2,454,611,529 UART:
2,454,611,705 UART: [state] CFI Enabled
2,454,656,381 UART: [art] Extend RT PCRs Done
2,454,657,531 UART: [art] Lock RT PCRs Done
2,454,659,200 UART: [art] Populate DV Done
2,454,664,669 UART: [fht] FMC Alias Private Key: 7
2,454,666,328 UART: [art] Derive CDI
2,454,667,151 UART: [art] Store in slot 0x4
2,454,709,973 UART: [art] Derive Key Pair
2,454,711,021 UART: [art] Store priv key in slot 0x5
2,457,138,018 UART: [art] Derive Key Pair - Done
2,457,151,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,458,857,248 UART: [art] Erasing AUTHORITY.KEYID = 7
2,458,858,784 UART: [art] PUB.X = DCE03E673C5265258DDEB42D2999D121EAA51B73343657FE0C7BAD24EE87E9DCE7FB626A02F7D255032DFB69FF7058E5
2,458,866,058 UART: [art] PUB.Y = 43135A9E34CB48CB3212CFB18473CC9B3289480D2E33BA375A154E1D235A434DA351E6C3823C1CCBB142D946931ACF42
2,458,873,317 UART: [art] SIG.R = AB18A877F3F1A639D0C79BA451FAEF9B4CB39E81CDB2B54EEDF66261C97223563540DFEF8A5DE6E9E6500F0C2DACD521
2,458,880,742 UART: [art] SIG.S = AB7BE2FD5169AFC5FAEEF1FE3E753ABE1236D96B7B5AE0C5053988BE2CDE5501CE87E0D140040B0DBFAE71BA0A349571
2,459,859,179 UART: Caliptra RT
2,459,859,875 UART: [state] CFI Enabled
2,460,231,636 UART: [rt] RT listening for mailbox commands...
2,460,233,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,468,052,302 >>> mbox cmd response: success
2,468,085,380 UART:
2,468,085,667 UART: Running Caliptra FMC ...
2,468,086,799 UART:
2,468,086,977 UART: [state] CFI Enabled
2,468,131,359 UART: [art] Extend RT PCRs Done
2,468,132,559 UART: [art] Lock RT PCRs Done
2,468,134,189 UART: [art] Populate DV Done
2,468,139,715 UART: [fht] FMC Alias Private Key: 7
2,468,141,204 UART: [art] Derive CDI
2,468,141,978 UART: [art] Store in slot 0x4
2,468,184,583 UART: [art] Derive Key Pair
2,468,185,592 UART: [art] Store priv key in slot 0x5
2,470,612,585 UART: [art] Derive Key Pair - Done
2,470,625,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,472,331,951 UART: [art] Erasing AUTHORITY.KEYID = 7
2,472,333,476 UART: [art] PUB.X = AE666F05EB3ED3DBDAC43556525EBA9130AB1F958DBEF3FA794A03E4BF990F16709B9DC89045EC7373D6DCD985ADE6CC
2,472,340,754 UART: [art] PUB.Y = 7E02C60564DAA0CA42FD7410797E2DD93D9AEB3E42A044AF87CBB66B6EA8CFC47CADE28A99E6CF38C2B87C8DB2050531
2,472,348,070 UART: [art] SIG.R = E7E3D972E26E51000E5BEC5C002BED5FED33322FC1B51125A1CF4A9B4FFB596AD46333852CDFC2835B2B500C2532EFC9
2,472,355,393 UART: [art] SIG.S = 0E7747A29C9C3FFB6D8FC60107387CCA0B3DAEBD0E8252D42165D31F46313E4380CFDD36926CD9B79AAEA86A6A55AD6B
2,473,334,791 UART: Caliptra RT
2,473,335,530 UART: [state] CFI Enabled
2,473,709,822 UART: [rt] RT listening for mailbox commands...
2,473,711,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,544,259 >>> mbox cmd response: success
2,481,579,717 UART:
2,481,580,035 UART: Running Caliptra FMC ...
2,481,581,176 UART:
2,481,581,352 UART: [state] CFI Enabled
2,481,625,651 UART: [art] Extend RT PCRs Done
2,481,626,812 UART: [art] Lock RT PCRs Done
2,481,628,266 UART: [art] Populate DV Done
2,481,633,903 UART: [fht] FMC Alias Private Key: 7
2,481,635,670 UART: [art] Derive CDI
2,481,636,499 UART: [art] Store in slot 0x4
2,481,679,342 UART: [art] Derive Key Pair
2,481,680,391 UART: [art] Store priv key in slot 0x5
2,484,107,473 UART: [art] Derive Key Pair - Done
2,484,120,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,485,826,930 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,828,446 UART: [art] PUB.X = DCE03E673C5265258DDEB42D2999D121EAA51B73343657FE0C7BAD24EE87E9DCE7FB626A02F7D255032DFB69FF7058E5
2,485,835,709 UART: [art] PUB.Y = 43135A9E34CB48CB3212CFB18473CC9B3289480D2E33BA375A154E1D235A434DA351E6C3823C1CCBB142D946931ACF42
2,485,843,015 UART: [art] SIG.R = AB18A877F3F1A639D0C79BA451FAEF9B4CB39E81CDB2B54EEDF66261C97223563540DFEF8A5DE6E9E6500F0C2DACD521
2,485,850,448 UART: [art] SIG.S = AB7BE2FD5169AFC5FAEEF1FE3E753ABE1236D96B7B5AE0C5053988BE2CDE5501CE87E0D140040B0DBFAE71BA0A349571
2,486,829,503 UART: Caliptra RT
2,486,830,236 UART: [state] CFI Enabled
2,487,205,577 UART: [rt] RT listening for mailbox commands...
2,487,207,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,495,028,141 >>> mbox cmd response: success
2,495,064,049 UART:
2,495,064,335 UART: Running Caliptra FMC ...
2,495,065,385 UART:
2,495,065,544 UART: [state] CFI Enabled
2,495,109,387 UART: [art] Extend RT PCRs Done
2,495,110,589 UART: [art] Lock RT PCRs Done
2,495,112,245 UART: [art] Populate DV Done
2,495,117,551 UART: [fht] FMC Alias Private Key: 7
2,495,119,209 UART: [art] Derive CDI
2,495,119,955 UART: [art] Store in slot 0x4
2,495,162,445 UART: [art] Derive Key Pair
2,495,163,650 UART: [art] Store priv key in slot 0x5
2,497,590,584 UART: [art] Derive Key Pair - Done
2,497,603,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,499,309,809 UART: [art] Erasing AUTHORITY.KEYID = 7
2,499,311,339 UART: [art] PUB.X = AE666F05EB3ED3DBDAC43556525EBA9130AB1F958DBEF3FA794A03E4BF990F16709B9DC89045EC7373D6DCD985ADE6CC
2,499,318,610 UART: [art] PUB.Y = 7E02C60564DAA0CA42FD7410797E2DD93D9AEB3E42A044AF87CBB66B6EA8CFC47CADE28A99E6CF38C2B87C8DB2050531
2,499,325,898 UART: [art] SIG.R = E7E3D972E26E51000E5BEC5C002BED5FED33322FC1B51125A1CF4A9B4FFB596AD46333852CDFC2835B2B500C2532EFC9
2,499,333,274 UART: [art] SIG.S = 0E7747A29C9C3FFB6D8FC60107387CCA0B3DAEBD0E8252D42165D31F46313E4380CFDD36926CD9B79AAEA86A6A55AD6B
2,500,311,848 UART: Caliptra RT
2,500,312,583 UART: [state] CFI Enabled
2,500,689,490 UART: [rt] RT listening for mailbox commands...
2,500,691,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,509,425 >>> mbox cmd response: success
2,508,545,007 UART:
2,508,545,341 UART: Running Caliptra FMC ...
2,508,546,395 UART:
2,508,546,561 UART: [state] CFI Enabled
2,508,590,754 UART: [art] Extend RT PCRs Done
2,508,591,925 UART: [art] Lock RT PCRs Done
2,508,593,280 UART: [art] Populate DV Done
2,508,598,766 UART: [fht] FMC Alias Private Key: 7
2,508,600,421 UART: [art] Derive CDI
2,508,601,173 UART: [art] Store in slot 0x4
2,508,643,958 UART: [art] Derive Key Pair
2,508,645,009 UART: [art] Store priv key in slot 0x5
2,511,071,508 UART: [art] Derive Key Pair - Done
2,511,084,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,512,790,872 UART: [art] Erasing AUTHORITY.KEYID = 7
2,512,792,389 UART: [art] PUB.X = DCE03E673C5265258DDEB42D2999D121EAA51B73343657FE0C7BAD24EE87E9DCE7FB626A02F7D255032DFB69FF7058E5
2,512,799,673 UART: [art] PUB.Y = 43135A9E34CB48CB3212CFB18473CC9B3289480D2E33BA375A154E1D235A434DA351E6C3823C1CCBB142D946931ACF42
2,512,806,974 UART: [art] SIG.R = AB18A877F3F1A639D0C79BA451FAEF9B4CB39E81CDB2B54EEDF66261C97223563540DFEF8A5DE6E9E6500F0C2DACD521
2,512,814,379 UART: [art] SIG.S = AB7BE2FD5169AFC5FAEEF1FE3E753ABE1236D96B7B5AE0C5053988BE2CDE5501CE87E0D140040B0DBFAE71BA0A349571
2,513,793,486 UART: Caliptra RT
2,513,794,189 UART: [state] CFI Enabled
2,514,169,364 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 340.78s
Truncated 1341950 bytes from beginning
77,574 UART: [art] Lock RT PCRs Done
1,784,478,593 UART: [art] Populate DV Done
1,784,486,822 UART: [fht] FMC Alias Private Key: 7
1,784,487,776 UART: [art] Derive CDI
1,784,488,056 UART: [art] Store in slot 0x4
1,784,574,196 UART: [art] Derive Key Pair
1,784,574,556 UART: [art] Store priv key in slot 0x5
1,784,587,231 UART: [art] Derive Key Pair - Done
1,784,602,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,784,617,597 UART: [art] Erasing AUTHORITY.KEYID = 7
1,784,618,362 UART: [art] PUB.X = 7577DE4B996D367D3C716E530438F072B42C2CB20D0B525869E63A01232C55BEC257340D479923B566C3D2A916C7AE73
1,784,625,111 UART: [art] PUB.Y = 9441D2234A43E03FB9AF90DE44418A655B0ACA442936FA1D63FE8B7C333D567CDA7C94FA8B782BE69D7AD0F7308FFFB7
1,784,632,074 UART: [art] SIG.R = 0812751F19A55A26011494DE363AC1BC6BB95AA7E1567E5955FC96AA098E9FC205735B5FEC0CC2FEDBAEB74B55346E7C
1,784,638,843 UART: [art] SIG.S = 01EE0CC08D8559DEAE357731FA3E338F161E1EDE247AF0FF30CE633DB0EEE9FB49B48620E70D4A7EEB90D20A4D7776ED
1,784,662,835 UART: Caliptra RT
1,784,663,086 UART: [state] CFI Enabled
1,785,028,816 UART: [rt] RT listening for mailbox commands...
1,785,029,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,785,030,404 UART:
1,785,030,420 UART: Running Caliptra ROM ...
1,785,030,828 UART:
1,785,030,882 UART: [state] CFI Enabled
1,785,033,454 UART: [state] LifecycleState = Unprovisioned
1,785,034,109 UART: [state] DebugLocked = No
1,785,034,647 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,785,036,188 UART: [kat] SHA2-256
1,785,830,119 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,785,834,234 UART: [kat] ++
1,785,834,386 UART: [kat] sha1
1,785,838,686 UART: [kat] SHA2-256
1,785,840,624 UART: [kat] SHA2-384
1,785,843,391 UART: [kat] SHA2-512-ACC
1,785,845,291 UART: [kat] ECC-384
1,785,850,732 UART: [kat] HMAC-384Kdf
1,785,855,272 UART: [kat] LMS
1,786,423,468 UART: [kat] --
1,786,424,193 UART: [update-reset] ++
1,787,805,977 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,787,807,079 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,787,962,346 >>> mbox cmd response: success
1,787,962,641 UART: [update-reset] Copying MAN_2 To MAN_1
1,787,970,655 UART: [update-reset Success] --
1,787,971,596 UART: [state] Locking Datavault
1,787,972,190 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,972,794 UART: [state] Locking ICCM
1,787,973,452 UART: [exit] Launching FMC @ 0x40000130
1,787,978,782 UART:
1,787,978,798 UART: Running Caliptra FMC ...
1,787,979,206 UART:
1,787,979,260 UART: [state] CFI Enabled
1,788,068,467 UART: [art] Extend RT PCRs Done
1,788,068,895 UART: [art] Lock RT PCRs Done
1,788,070,304 UART: [art] Populate DV Done
1,788,078,429 UART: [fht] FMC Alias Private Key: 7
1,788,079,591 UART: [art] Derive CDI
1,788,079,871 UART: [art] Store in slot 0x4
1,788,165,217 UART: [art] Derive Key Pair
1,788,165,577 UART: [art] Store priv key in slot 0x5
1,788,178,926 UART: [art] Derive Key Pair - Done
1,788,193,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,788,209,118 UART: [art] Erasing AUTHORITY.KEYID = 7
1,788,209,883 UART: [art] PUB.X = 61D62FC6610AAD3756DEFF8DF7F980DAA54B5BEAC41E338D8A069F3C269041D42B8F2E3C000759D7D06E627BE6FCB1E1
1,788,216,640 UART: [art] PUB.Y = 605854AE83E222BB2A349FA9A2D05ACF8231D1792909CAFEBB58A6170714784564A7D8F46C53CAF5B1AB439574EE199D
1,788,223,590 UART: [art] SIG.R = B5F2B9332B20719A2F6EFEB2CEF4E99CF0CADB8129E5B0D15A1AE0FD176A678F28955CE8C225AA42923E461818B76565
1,788,230,372 UART: [art] SIG.S = B91FE4EBBA6C17CF8E92E9499EAAFB48F371EB049E4CF294D7116FCE47A0C4BB7BE50F80D41F617548A7FC384FB530CC
1,788,254,634 UART: Caliptra RT
1,788,254,885 UART: [state] CFI Enabled
1,788,622,595 UART: [rt] RT listening for mailbox commands...
1,788,623,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,788,624,541 UART:
1,788,624,557 UART: Running Caliptra ROM ...
1,788,624,965 UART:
1,788,625,019 UART: [state] CFI Enabled
1,788,627,659 UART: [state] LifecycleState = Unprovisioned
1,788,628,314 UART: [state] DebugLocked = No
1,788,628,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,788,630,497 UART: [kat] SHA2-256
1,789,424,428 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,789,428,543 UART: [kat] ++
1,789,428,695 UART: [kat] sha1
1,789,432,861 UART: [kat] SHA2-256
1,789,434,799 UART: [kat] SHA2-384
1,789,437,324 UART: [kat] SHA2-512-ACC
1,789,439,224 UART: [kat] ECC-384
1,789,444,627 UART: [kat] HMAC-384Kdf
1,789,449,189 UART: [kat] LMS
1,790,017,385 UART: [kat] --
1,790,018,192 UART: [update-reset] ++
1,791,399,476 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,791,400,714 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,791,555,981 >>> mbox cmd response: success
1,791,556,228 UART: [update-reset] Copying MAN_2 To MAN_1
1,791,564,242 UART: [update-reset Success] --
1,791,565,351 UART: [state] Locking Datavault
1,791,566,239 UART: [state] Locking PCR0, PCR1 and PCR31
1,791,566,843 UART: [state] Locking ICCM
1,791,567,513 UART: [exit] Launching FMC @ 0x40000130
1,791,572,843 UART:
1,791,572,859 UART: Running Caliptra FMC ...
1,791,573,267 UART:
1,791,573,321 UART: [state] CFI Enabled
1,791,662,320 UART: [art] Extend RT PCRs Done
1,791,662,748 UART: [art] Lock RT PCRs Done
1,791,664,183 UART: [art] Populate DV Done
1,791,672,360 UART: [fht] FMC Alias Private Key: 7
1,791,673,470 UART: [art] Derive CDI
1,791,673,750 UART: [art] Store in slot 0x4
1,791,759,302 UART: [art] Derive Key Pair
1,791,759,662 UART: [art] Store priv key in slot 0x5
1,791,772,777 UART: [art] Derive Key Pair - Done
1,791,787,434 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,791,802,745 UART: [art] Erasing AUTHORITY.KEYID = 7
1,791,803,510 UART: [art] PUB.X = 7577DE4B996D367D3C716E530438F072B42C2CB20D0B525869E63A01232C55BEC257340D479923B566C3D2A916C7AE73
1,791,810,259 UART: [art] PUB.Y = 9441D2234A43E03FB9AF90DE44418A655B0ACA442936FA1D63FE8B7C333D567CDA7C94FA8B782BE69D7AD0F7308FFFB7
1,791,817,222 UART: [art] SIG.R = 0812751F19A55A26011494DE363AC1BC6BB95AA7E1567E5955FC96AA098E9FC205735B5FEC0CC2FEDBAEB74B55346E7C
1,791,823,991 UART: [art] SIG.S = 01EE0CC08D8559DEAE357731FA3E338F161E1EDE247AF0FF30CE633DB0EEE9FB49B48620E70D4A7EEB90D20A4D7776ED
1,791,847,059 UART: Caliptra RT
1,791,847,310 UART: [state] CFI Enabled
1,792,214,702 UART: [rt] RT listening for mailbox commands...
1,792,215,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,792,216,310 UART:
1,792,216,326 UART: Running Caliptra ROM ...
1,792,216,734 UART:
1,792,216,788 UART: [state] CFI Enabled
1,792,219,594 UART: [state] LifecycleState = Unprovisioned
1,792,220,249 UART: [state] DebugLocked = No
1,792,220,839 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,792,222,464 UART: [kat] SHA2-256
1,793,016,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,793,020,510 UART: [kat] ++
1,793,020,662 UART: [kat] sha1
1,793,024,794 UART: [kat] SHA2-256
1,793,026,732 UART: [kat] SHA2-384
1,793,029,643 UART: [kat] SHA2-512-ACC
1,793,031,543 UART: [kat] ECC-384
1,793,037,118 UART: [kat] HMAC-384Kdf
1,793,041,654 UART: [kat] LMS
1,793,609,850 UART: [kat] --
1,793,610,391 UART: [update-reset] ++
1,794,991,461 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,794,992,615 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,795,147,882 >>> mbox cmd response: success
1,795,148,117 UART: [update-reset] Copying MAN_2 To MAN_1
1,795,156,131 UART: [update-reset Success] --
1,795,157,032 UART: [state] Locking Datavault
1,795,157,994 UART: [state] Locking PCR0, PCR1 and PCR31
1,795,158,598 UART: [state] Locking ICCM
1,795,159,266 UART: [exit] Launching FMC @ 0x40000130
1,795,164,596 UART:
1,795,164,612 UART: Running Caliptra FMC ...
1,795,165,020 UART:
1,795,165,074 UART: [state] CFI Enabled
1,795,254,245 UART: [art] Extend RT PCRs Done
1,795,254,673 UART: [art] Lock RT PCRs Done
1,795,256,238 UART: [art] Populate DV Done
1,795,264,591 UART: [fht] FMC Alias Private Key: 7
1,795,265,561 UART: [art] Derive CDI
1,795,265,841 UART: [art] Store in slot 0x4
1,795,351,611 UART: [art] Derive Key Pair
1,795,351,971 UART: [art] Store priv key in slot 0x5
1,795,365,812 UART: [art] Derive Key Pair - Done
1,795,380,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,795,396,098 UART: [art] Erasing AUTHORITY.KEYID = 7
1,795,396,863 UART: [art] PUB.X = 61D62FC6610AAD3756DEFF8DF7F980DAA54B5BEAC41E338D8A069F3C269041D42B8F2E3C000759D7D06E627BE6FCB1E1
1,795,403,620 UART: [art] PUB.Y = 605854AE83E222BB2A349FA9A2D05ACF8231D1792909CAFEBB58A6170714784564A7D8F46C53CAF5B1AB439574EE199D
1,795,410,570 UART: [art] SIG.R = B5F2B9332B20719A2F6EFEB2CEF4E99CF0CADB8129E5B0D15A1AE0FD176A678F28955CE8C225AA42923E461818B76565
1,795,417,352 UART: [art] SIG.S = B91FE4EBBA6C17CF8E92E9499EAAFB48F371EB049E4CF294D7116FCE47A0C4BB7BE50F80D41F617548A7FC384FB530CC
1,795,440,990 UART: Caliptra RT
1,795,441,241 UART: [state] CFI Enabled
1,795,809,095 UART: [rt] RT listening for mailbox commands...
1,795,809,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,795,810,691 UART:
1,795,810,707 UART: Running Caliptra ROM ...
1,795,811,115 UART:
1,795,811,169 UART: [state] CFI Enabled
1,795,813,893 UART: [state] LifecycleState = Unprovisioned
1,795,814,548 UART: [state] DebugLocked = No
1,795,815,156 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,795,816,829 UART: [kat] SHA2-256
1,796,610,760 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,796,614,875 UART: [kat] ++
1,796,615,027 UART: [kat] sha1
1,796,619,299 UART: [kat] SHA2-256
1,796,621,237 UART: [kat] SHA2-384
1,796,624,084 UART: [kat] SHA2-512-ACC
1,796,625,984 UART: [kat] ECC-384
1,796,631,479 UART: [kat] HMAC-384Kdf
1,796,636,289 UART: [kat] LMS
1,797,204,485 UART: [kat] --
1,797,205,360 UART: [update-reset] ++
1,798,585,728 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,798,586,902 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,798,742,169 >>> mbox cmd response: success
1,798,742,322 UART: [update-reset] Copying MAN_2 To MAN_1
1,798,750,336 UART: [update-reset Success] --
1,798,751,299 UART: [state] Locking Datavault
1,798,752,129 UART: [state] Locking PCR0, PCR1 and PCR31
1,798,752,733 UART: [state] Locking ICCM
1,798,753,299 UART: [exit] Launching FMC @ 0x40000130
1,798,758,629 UART:
1,798,758,645 UART: Running Caliptra FMC ...
1,798,759,053 UART:
1,798,759,107 UART: [state] CFI Enabled
1,798,848,636 UART: [art] Extend RT PCRs Done
1,798,849,064 UART: [art] Lock RT PCRs Done
1,798,850,315 UART: [art] Populate DV Done
1,798,858,464 UART: [fht] FMC Alias Private Key: 7
1,798,859,550 UART: [art] Derive CDI
1,798,859,830 UART: [art] Store in slot 0x4
1,798,946,056 UART: [art] Derive Key Pair
1,798,946,416 UART: [art] Store priv key in slot 0x5
1,798,960,095 UART: [art] Derive Key Pair - Done
1,798,974,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,798,990,253 UART: [art] Erasing AUTHORITY.KEYID = 7
1,798,991,018 UART: [art] PUB.X = 7577DE4B996D367D3C716E530438F072B42C2CB20D0B525869E63A01232C55BEC257340D479923B566C3D2A916C7AE73
1,798,997,767 UART: [art] PUB.Y = 9441D2234A43E03FB9AF90DE44418A655B0ACA442936FA1D63FE8B7C333D567CDA7C94FA8B782BE69D7AD0F7308FFFB7
1,799,004,730 UART: [art] SIG.R = 0812751F19A55A26011494DE363AC1BC6BB95AA7E1567E5955FC96AA098E9FC205735B5FEC0CC2FEDBAEB74B55346E7C
1,799,011,499 UART: [art] SIG.S = 01EE0CC08D8559DEAE357731FA3E338F161E1EDE247AF0FF30CE633DB0EEE9FB49B48620E70D4A7EEB90D20A4D7776ED
1,799,035,467 UART: Caliptra RT
1,799,035,718 UART: [state] CFI Enabled
1,799,402,076 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 361.66s
Truncated 718092 bytes from beginning
C77A8C71A2
1,710,166,466 UART: [art] SIG.S = A02B6668FB1D8D04CCC3ACACDA8926FA07721CC64E9BC01F97D43274B5DC0E8911036A54FE8F79DEE316EE69CB5103B9
1,710,189,759 UART: Caliptra RT
1,710,190,010 UART: [state] CFI Enabled
1,710,557,949 UART: [rt] RT listening for mailbox commands...
1,710,558,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,713,372,371 >>> mbox cmd response: success
1,713,385,673 UART:
1,713,385,689 UART: Running Caliptra FMC ...
1,713,386,097 UART:
1,713,386,151 UART: [state] CFI Enabled
1,713,475,098 UART: [art] Extend RT PCRs Done
1,713,475,526 UART: [art] Lock RT PCRs Done
1,713,476,565 UART: [art] Populate DV Done
1,713,484,764 UART: [fht] FMC Alias Private Key: 7
1,713,485,756 UART: [art] Derive CDI
1,713,486,036 UART: [art] Store in slot 0x4
1,713,571,426 UART: [art] Derive Key Pair
1,713,571,786 UART: [art] Store priv key in slot 0x5
1,713,584,951 UART: [art] Derive Key Pair - Done
1,713,599,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,713,615,258 UART: [art] Erasing AUTHORITY.KEYID = 7
1,713,616,023 UART: [art] PUB.X = 76B0E395E7401D5D18A709372CF43F0CB70655BB6535C3AF5185D51D80901D2863C8BA8AFC24BAB53B6448E2B69EE747
1,713,622,788 UART: [art] PUB.Y = 652CD85F31FCFDF707B49AE06FA22D89A9350F3DCA8B396C8C0093D18F291C492355827414B814A778E78086762E65DC
1,713,629,710 UART: [art] SIG.R = 2ED7190A82EEF00CD051D93FC25C36780D01CCFB36F4B01CF9C9BE3F10B6B4CDC5AB551C5E92B0DC72FF49DB025CE327
1,713,636,489 UART: [art] SIG.S = 6BC7B070357369F8672F98A7C677B8ADEB5E515888E060DC1ED9E8D2A88AE32AF61544BE4B98679E503CEEBDA921BE71
1,713,660,881 UART: Caliptra RT
1,713,661,132 UART: [state] CFI Enabled
1,714,028,472 UART: [rt] RT listening for mailbox commands...
1,714,029,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,716,843,728 >>> mbox cmd response: success
1,716,857,136 UART:
1,716,857,152 UART: Running Caliptra FMC ...
1,716,857,560 UART:
1,716,857,614 UART: [state] CFI Enabled
1,716,946,299 UART: [art] Extend RT PCRs Done
1,716,946,727 UART: [art] Lock RT PCRs Done
1,716,948,098 UART: [art] Populate DV Done
1,716,956,167 UART: [fht] FMC Alias Private Key: 7
1,716,957,209 UART: [art] Derive CDI
1,716,957,489 UART: [art] Store in slot 0x4
1,717,042,905 UART: [art] Derive Key Pair
1,717,043,265 UART: [art] Store priv key in slot 0x5
1,717,056,620 UART: [art] Derive Key Pair - Done
1,717,071,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,717,086,883 UART: [art] Erasing AUTHORITY.KEYID = 7
1,717,087,648 UART: [art] PUB.X = E31BDA43D1DFC424CBE06030805DB05CBDDC2AD989C81E786F1F56F5068CB26EA03F60CF155E9042C4462B052587C4AE
1,717,094,426 UART: [art] PUB.Y = B3BCC1C9B127EBDF61D1BC48224F4A3EAE80223FBFA4CA8E4D655B8E6BD300716302F6B6EFE94BAFE886521B210CCAAF
1,717,101,376 UART: [art] SIG.R = 108E0EA1D162407CF2D22BEFAEFB67278F14E779F8A249C9D5B8D2DCCB56F39E4785F6E1C387B51659C326C77A8C71A2
1,717,108,155 UART: [art] SIG.S = A02B6668FB1D8D04CCC3ACACDA8926FA07721CC64E9BC01F97D43274B5DC0E8911036A54FE8F79DEE316EE69CB5103B9
1,717,131,994 UART: Caliptra RT
1,717,132,245 UART: [state] CFI Enabled
1,717,500,158 UART: [rt] RT listening for mailbox commands...
1,717,500,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,720,315,778 >>> mbox cmd response: success
1,720,328,992 UART:
1,720,329,008 UART: Running Caliptra FMC ...
1,720,329,416 UART:
1,720,329,470 UART: [state] CFI Enabled
1,720,418,071 UART: [art] Extend RT PCRs Done
1,720,418,499 UART: [art] Lock RT PCRs Done
1,720,419,542 UART: [art] Populate DV Done
1,720,427,743 UART: [fht] FMC Alias Private Key: 7
1,720,428,853 UART: [art] Derive CDI
1,720,429,133 UART: [art] Store in slot 0x4
1,720,514,721 UART: [art] Derive Key Pair
1,720,515,081 UART: [art] Store priv key in slot 0x5
1,720,528,428 UART: [art] Derive Key Pair - Done
1,720,543,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,720,559,221 UART: [art] Erasing AUTHORITY.KEYID = 7
1,720,559,986 UART: [art] PUB.X = 76B0E395E7401D5D18A709372CF43F0CB70655BB6535C3AF5185D51D80901D2863C8BA8AFC24BAB53B6448E2B69EE747
1,720,566,751 UART: [art] PUB.Y = 652CD85F31FCFDF707B49AE06FA22D89A9350F3DCA8B396C8C0093D18F291C492355827414B814A778E78086762E65DC
1,720,573,673 UART: [art] SIG.R = 2ED7190A82EEF00CD051D93FC25C36780D01CCFB36F4B01CF9C9BE3F10B6B4CDC5AB551C5E92B0DC72FF49DB025CE327
1,720,580,452 UART: [art] SIG.S = 6BC7B070357369F8672F98A7C677B8ADEB5E515888E060DC1ED9E8D2A88AE32AF61544BE4B98679E503CEEBDA921BE71
1,720,604,310 UART: Caliptra RT
1,720,604,561 UART: [state] CFI Enabled
1,720,967,251 UART: [rt] RT listening for mailbox commands...
1,720,967,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,723,781,083 >>> mbox cmd response: success
1,723,794,423 UART:
1,723,794,439 UART: Running Caliptra FMC ...
1,723,794,847 UART:
1,723,794,901 UART: [state] CFI Enabled
1,723,884,086 UART: [art] Extend RT PCRs Done
1,723,884,514 UART: [art] Lock RT PCRs Done
1,723,885,891 UART: [art] Populate DV Done
1,723,894,194 UART: [fht] FMC Alias Private Key: 7
1,723,895,198 UART: [art] Derive CDI
1,723,895,478 UART: [art] Store in slot 0x4
1,723,981,104 UART: [art] Derive Key Pair
1,723,981,464 UART: [art] Store priv key in slot 0x5
1,723,995,103 UART: [art] Derive Key Pair - Done
1,724,009,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,724,025,650 UART: [art] Erasing AUTHORITY.KEYID = 7
1,724,026,415 UART: [art] PUB.X = E31BDA43D1DFC424CBE06030805DB05CBDDC2AD989C81E786F1F56F5068CB26EA03F60CF155E9042C4462B052587C4AE
1,724,033,193 UART: [art] PUB.Y = B3BCC1C9B127EBDF61D1BC48224F4A3EAE80223FBFA4CA8E4D655B8E6BD300716302F6B6EFE94BAFE886521B210CCAAF
1,724,040,143 UART: [art] SIG.R = 108E0EA1D162407CF2D22BEFAEFB67278F14E779F8A249C9D5B8D2DCCB56F39E4785F6E1C387B51659C326C77A8C71A2
1,724,046,922 UART: [art] SIG.S = A02B6668FB1D8D04CCC3ACACDA8926FA07721CC64E9BC01F97D43274B5DC0E8911036A54FE8F79DEE316EE69CB5103B9
1,724,070,717 UART: Caliptra RT
1,724,070,968 UART: [state] CFI Enabled
1,724,438,771 UART: [rt] RT listening for mailbox commands...
1,724,439,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,727,252,541 >>> mbox cmd response: success
1,727,266,349 UART:
1,727,266,365 UART: Running Caliptra FMC ...
1,727,266,773 UART:
1,727,266,827 UART: [state] CFI Enabled
1,727,355,816 UART: [art] Extend RT PCRs Done
1,727,356,244 UART: [art] Lock RT PCRs Done
1,727,357,477 UART: [art] Populate DV Done
1,727,365,736 UART: [fht] FMC Alias Private Key: 7
1,727,366,778 UART: [art] Derive CDI
1,727,367,058 UART: [art] Store in slot 0x4
1,727,453,046 UART: [art] Derive Key Pair
1,727,453,406 UART: [art] Store priv key in slot 0x5
1,727,466,601 UART: [art] Derive Key Pair - Done
1,727,481,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,727,496,964 UART: [art] Erasing AUTHORITY.KEYID = 7
1,727,497,729 UART: [art] PUB.X = 76B0E395E7401D5D18A709372CF43F0CB70655BB6535C3AF5185D51D80901D2863C8BA8AFC24BAB53B6448E2B69EE747
1,727,504,494 UART: [art] PUB.Y = 652CD85F31FCFDF707B49AE06FA22D89A9350F3DCA8B396C8C0093D18F291C492355827414B814A778E78086762E65DC
1,727,511,416 UART: [art] SIG.R = 2ED7190A82EEF00CD051D93FC25C36780D01CCFB36F4B01CF9C9BE3F10B6B4CDC5AB551C5E92B0DC72FF49DB025CE327
1,727,518,195 UART: [art] SIG.S = 6BC7B070357369F8672F98A7C677B8ADEB5E515888E060DC1ED9E8D2A88AE32AF61544BE4B98679E503CEEBDA921BE71
1,727,541,865 UART: Caliptra RT
1,727,542,116 UART: [state] CFI Enabled
1,727,910,796 UART: [rt] RT listening for mailbox commands...
1,727,911,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,730,727,034 >>> mbox cmd response: success
1,730,740,120 UART:
1,730,740,136 UART: Running Caliptra FMC ...
1,730,740,544 UART:
1,730,740,598 UART: [state] CFI Enabled
1,730,829,705 UART: [art] Extend RT PCRs Done
1,730,830,133 UART: [art] Lock RT PCRs Done
1,730,831,176 UART: [art] Populate DV Done
1,730,839,375 UART: [fht] FMC Alias Private Key: 7
1,730,840,497 UART: [art] Derive CDI
1,730,840,777 UART: [art] Store in slot 0x4
1,730,926,565 UART: [art] Derive Key Pair
1,730,926,925 UART: [art] Store priv key in slot 0x5
1,730,939,968 UART: [art] Derive Key Pair - Done
1,730,954,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,730,970,661 UART: [art] Erasing AUTHORITY.KEYID = 7
1,730,971,426 UART: [art] PUB.X = E31BDA43D1DFC424CBE06030805DB05CBDDC2AD989C81E786F1F56F5068CB26EA03F60CF155E9042C4462B052587C4AE
1,730,978,204 UART: [art] PUB.Y = B3BCC1C9B127EBDF61D1BC48224F4A3EAE80223FBFA4CA8E4D655B8E6BD300716302F6B6EFE94BAFE886521B210CCAAF
1,730,985,154 UART: [art] SIG.R = 108E0EA1D162407CF2D22BEFAEFB67278F14E779F8A249C9D5B8D2DCCB56F39E4785F6E1C387B51659C326C77A8C71A2
1,730,991,933 UART: [art] SIG.S = A02B6668FB1D8D04CCC3ACACDA8926FA07721CC64E9BC01F97D43274B5DC0E8911036A54FE8F79DEE316EE69CB5103B9
1,731,015,246 UART: Caliptra RT
1,731,015,497 UART: [state] CFI Enabled
1,731,378,060 UART: [rt] RT listening for mailbox commands...
1,731,378,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,734,193,714 >>> mbox cmd response: success
1,734,207,072 UART:
1,734,207,088 UART: Running Caliptra FMC ...
1,734,207,496 UART:
1,734,207,550 UART: [state] CFI Enabled
1,734,297,059 UART: [art] Extend RT PCRs Done
1,734,297,487 UART: [art] Lock RT PCRs Done
1,734,298,812 UART: [art] Populate DV Done
1,734,307,149 UART: [fht] FMC Alias Private Key: 7
1,734,308,185 UART: [art] Derive CDI
1,734,308,465 UART: [art] Store in slot 0x4
1,734,394,111 UART: [art] Derive Key Pair
1,734,394,471 UART: [art] Store priv key in slot 0x5
1,734,407,836 UART: [art] Derive Key Pair - Done
1,734,422,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,734,438,315 UART: [art] Erasing AUTHORITY.KEYID = 7
1,734,439,080 UART: [art] PUB.X = 76B0E395E7401D5D18A709372CF43F0CB70655BB6535C3AF5185D51D80901D2863C8BA8AFC24BAB53B6448E2B69EE747
1,734,445,845 UART: [art] PUB.Y = 652CD85F31FCFDF707B49AE06FA22D89A9350F3DCA8B396C8C0093D18F291C492355827414B814A778E78086762E65DC
1,734,452,767 UART: [art] SIG.R = 2ED7190A82EEF00CD051D93FC25C36780D01CCFB36F4B01CF9C9BE3F10B6B4CDC5AB551C5E92B0DC72FF49DB025CE327
1,734,459,546 UART: [art] SIG.S = 6BC7B070357369F8672F98A7C677B8ADEB5E515888E060DC1ED9E8D2A88AE32AF61544BE4B98679E503CEEBDA921BE71
1,734,483,252 UART: Caliptra RT
1,734,483,503 UART: [state] CFI Enabled
1,734,852,631 UART: [rt] RT listening for mailbox commands...
1,734,853,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,737,668,181 >>> mbox cmd response: success
1,737,681,227 UART:
1,737,681,243 UART: Running Caliptra FMC ...
1,737,681,651 UART:
1,737,681,705 UART: [state] CFI Enabled
1,737,770,514 UART: [art] Extend RT PCRs Done
1,737,770,942 UART: [art] Lock RT PCRs Done
1,737,772,507 UART: [art] Populate DV Done
1,737,780,666 UART: [fht] FMC Alias Private Key: 7
1,737,781,768 UART: [art] Derive CDI
1,737,782,048 UART: [art] Store in slot 0x4
1,737,867,874 UART: [art] Derive Key Pair
1,737,868,234 UART: [art] Store priv key in slot 0x5
1,737,880,891 UART: [art] Derive Key Pair - Done
1,737,895,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,737,911,548 UART: [art] Erasing AUTHORITY.KEYID = 7
1,737,912,313 UART: [art] PUB.X = E31BDA43D1DFC424CBE06030805DB05CBDDC2AD989C81E786F1F56F5068CB26EA03F60CF155E9042C4462B052587C4AE
1,737,919,091 UART: [art] PUB.Y = B3BCC1C9B127EBDF61D1BC48224F4A3EAE80223FBFA4CA8E4D655B8E6BD300716302F6B6EFE94BAFE886521B210CCAAF
1,737,926,041 UART: [art] SIG.R = 108E0EA1D162407CF2D22BEFAEFB67278F14E779F8A249C9D5B8D2DCCB56F39E4785F6E1C387B51659C326C77A8C71A2
1,737,932,820 UART: [art] SIG.S = A02B6668FB1D8D04CCC3ACACDA8926FA07721CC64E9BC01F97D43274B5DC0E8911036A54FE8F79DEE316EE69CB5103B9
1,737,956,611 UART: Caliptra RT
1,737,956,862 UART: [state] CFI Enabled
1,738,317,293 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 349.32s
Truncated 1341954 bytes from beginning
32,424 UART: [art] Lock RT PCRs Done
1,784,833,869 UART: [art] Populate DV Done
1,784,842,046 UART: [fht] FMC Alias Private Key: 7
1,784,843,056 UART: [art] Derive CDI
1,784,843,336 UART: [art] Store in slot 0x4
1,784,929,126 UART: [art] Derive Key Pair
1,784,929,486 UART: [art] Store priv key in slot 0x5
1,784,942,395 UART: [art] Derive Key Pair - Done
1,784,956,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,784,972,019 UART: [art] Erasing AUTHORITY.KEYID = 7
1,784,972,784 UART: [art] PUB.X = 5239165A9B9D6C662D70D9A69925014E81D414233C2BDB72732CE431629B974F81FA2F1234AEBFC3B7E884A77FBBF406
1,784,979,550 UART: [art] PUB.Y = 6BB6C1A82BF006C00592E15FEF67B7BD11BEA2DD43599E7FBDE07CEB18A6D8295A09D5376EB7C558027B4285F212B806
1,784,986,497 UART: [art] SIG.R = AA5164BD08DA436F8AF8E540474149EF29C4F9AC068EEA44898D44BB39711DC9FF27F19498A29C8652EC3EF4C1678123
1,784,993,267 UART: [art] SIG.S = 53F282798FCC34FD487FEDA7677977067A0446D01FB0F4AF582651AC8C691E8BAF37BC1F4A07FC619AD44ABA841BA3A8
1,785,017,150 UART: Caliptra RT
1,785,017,493 UART: [state] CFI Enabled
1,785,391,032 UART: [rt] RT listening for mailbox commands...
1,785,391,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,785,392,722 UART:
1,785,392,738 UART: Running Caliptra ROM ...
1,785,393,146 UART:
1,785,393,287 UART: [state] CFI Enabled
1,785,396,167 UART: [state] LifecycleState = Unprovisioned
1,785,396,822 UART: [state] DebugLocked = No
1,785,397,492 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,785,398,993 UART: [kat] SHA2-256
1,786,192,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,786,197,039 UART: [kat] ++
1,786,197,191 UART: [kat] sha1
1,786,201,421 UART: [kat] SHA2-256
1,786,203,359 UART: [kat] SHA2-384
1,786,206,198 UART: [kat] SHA2-512-ACC
1,786,208,098 UART: [kat] ECC-384
1,786,213,875 UART: [kat] HMAC-384Kdf
1,786,218,701 UART: [kat] LMS
1,786,786,897 UART: [kat] --
1,786,787,694 UART: [update-reset] ++
1,788,168,608 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,788,169,856 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,788,325,123 >>> mbox cmd response: success
1,788,325,280 UART: [update-reset] Copying MAN_2 To MAN_1
1,788,333,294 UART: [update-reset Success] --
1,788,334,121 UART: [state] Locking Datavault
1,788,335,121 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,335,725 UART: [state] Locking ICCM
1,788,336,317 UART: [exit] Launching FMC @ 0x40000130
1,788,341,647 UART:
1,788,341,663 UART: Running Caliptra FMC ...
1,788,342,071 UART:
1,788,342,214 UART: [state] CFI Enabled
1,788,431,041 UART: [art] Extend RT PCRs Done
1,788,431,469 UART: [art] Lock RT PCRs Done
1,788,432,824 UART: [art] Populate DV Done
1,788,441,001 UART: [fht] FMC Alias Private Key: 7
1,788,442,159 UART: [art] Derive CDI
1,788,442,439 UART: [art] Store in slot 0x4
1,788,528,051 UART: [art] Derive Key Pair
1,788,528,411 UART: [art] Store priv key in slot 0x5
1,788,541,458 UART: [art] Derive Key Pair - Done
1,788,556,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,788,571,242 UART: [art] Erasing AUTHORITY.KEYID = 7
1,788,572,007 UART: [art] PUB.X = 430CF29092349D02D3C22779D350F11873FE98C2099F06245CF3D16FDB3CB3F4BECF1C558070E72D87D19089B8307AC4
1,788,578,765 UART: [art] PUB.Y = 5DF29C8AC19F95ADE42BF48CB80FD17B228C662A393825E253D348411920EB8A6365B384E02A01594FF658C250831A04
1,788,585,704 UART: [art] SIG.R = 91070C3C1D90FCC7F37B3FB000D2127F002CB225893329BBC2837B1BBD8DE5A215780B29617B79AA4EE0F658D8848D29
1,788,592,425 UART: [art] SIG.S = F1818C0247341873524323D2A46E324695DCE905B9BE451B5A3B0220C3C9BE2B9E3160C06DCE65D25F1CA9B93FDF7969
1,788,616,154 UART: Caliptra RT
1,788,616,497 UART: [state] CFI Enabled
1,788,980,855 UART: [rt] RT listening for mailbox commands...
1,788,981,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,788,982,525 UART:
1,788,982,541 UART: Running Caliptra ROM ...
1,788,982,949 UART:
1,788,983,090 UART: [state] CFI Enabled
1,788,986,114 UART: [state] LifecycleState = Unprovisioned
1,788,986,769 UART: [state] DebugLocked = No
1,788,987,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,788,989,152 UART: [kat] SHA2-256
1,789,783,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,789,787,198 UART: [kat] ++
1,789,787,350 UART: [kat] sha1
1,789,791,614 UART: [kat] SHA2-256
1,789,793,552 UART: [kat] SHA2-384
1,789,796,459 UART: [kat] SHA2-512-ACC
1,789,798,359 UART: [kat] ECC-384
1,789,803,642 UART: [kat] HMAC-384Kdf
1,789,808,350 UART: [kat] LMS
1,790,376,546 UART: [kat] --
1,790,377,465 UART: [update-reset] ++
1,791,758,397 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,791,759,639 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,791,914,906 >>> mbox cmd response: success
1,791,915,145 UART: [update-reset] Copying MAN_2 To MAN_1
1,791,923,159 UART: [update-reset Success] --
1,791,924,196 UART: [state] Locking Datavault
1,791,924,892 UART: [state] Locking PCR0, PCR1 and PCR31
1,791,925,496 UART: [state] Locking ICCM
1,791,926,104 UART: [exit] Launching FMC @ 0x40000130
1,791,931,434 UART:
1,791,931,450 UART: Running Caliptra FMC ...
1,791,931,858 UART:
1,791,932,001 UART: [state] CFI Enabled
1,792,021,528 UART: [art] Extend RT PCRs Done
1,792,021,956 UART: [art] Lock RT PCRs Done
1,792,023,147 UART: [art] Populate DV Done
1,792,031,264 UART: [fht] FMC Alias Private Key: 7
1,792,032,312 UART: [art] Derive CDI
1,792,032,592 UART: [art] Store in slot 0x4
1,792,118,556 UART: [art] Derive Key Pair
1,792,118,916 UART: [art] Store priv key in slot 0x5
1,792,132,233 UART: [art] Derive Key Pair - Done
1,792,146,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,792,162,071 UART: [art] Erasing AUTHORITY.KEYID = 7
1,792,162,836 UART: [art] PUB.X = 5239165A9B9D6C662D70D9A69925014E81D414233C2BDB72732CE431629B974F81FA2F1234AEBFC3B7E884A77FBBF406
1,792,169,602 UART: [art] PUB.Y = 6BB6C1A82BF006C00592E15FEF67B7BD11BEA2DD43599E7FBDE07CEB18A6D8295A09D5376EB7C558027B4285F212B806
1,792,176,549 UART: [art] SIG.R = AA5164BD08DA436F8AF8E540474149EF29C4F9AC068EEA44898D44BB39711DC9FF27F19498A29C8652EC3EF4C1678123
1,792,183,319 UART: [art] SIG.S = 53F282798FCC34FD487FEDA7677977067A0446D01FB0F4AF582651AC8C691E8BAF37BC1F4A07FC619AD44ABA841BA3A8
1,792,207,424 UART: Caliptra RT
1,792,207,767 UART: [state] CFI Enabled
1,792,572,628 UART: [rt] RT listening for mailbox commands...
1,792,573,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,792,574,360 UART:
1,792,574,376 UART: Running Caliptra ROM ...
1,792,574,784 UART:
1,792,574,925 UART: [state] CFI Enabled
1,792,577,809 UART: [state] LifecycleState = Unprovisioned
1,792,578,464 UART: [state] DebugLocked = No
1,792,579,130 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,792,580,763 UART: [kat] SHA2-256
1,793,374,694 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,793,378,809 UART: [kat] ++
1,793,378,961 UART: [kat] sha1
1,793,383,221 UART: [kat] SHA2-256
1,793,385,159 UART: [kat] SHA2-384
1,793,388,084 UART: [kat] SHA2-512-ACC
1,793,389,984 UART: [kat] ECC-384
1,793,395,439 UART: [kat] HMAC-384Kdf
1,793,400,053 UART: [kat] LMS
1,793,968,249 UART: [kat] --
1,793,969,182 UART: [update-reset] ++
1,795,350,730 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,795,351,896 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,795,507,163 >>> mbox cmd response: success
1,795,507,312 UART: [update-reset] Copying MAN_2 To MAN_1
1,795,515,326 UART: [update-reset Success] --
1,795,516,157 UART: [state] Locking Datavault
1,795,517,089 UART: [state] Locking PCR0, PCR1 and PCR31
1,795,517,693 UART: [state] Locking ICCM
1,795,518,161 UART: [exit] Launching FMC @ 0x40000130
1,795,523,491 UART:
1,795,523,507 UART: Running Caliptra FMC ...
1,795,523,915 UART:
1,795,524,058 UART: [state] CFI Enabled
1,795,613,665 UART: [art] Extend RT PCRs Done
1,795,614,093 UART: [art] Lock RT PCRs Done
1,795,615,404 UART: [art] Populate DV Done
1,795,623,669 UART: [fht] FMC Alias Private Key: 7
1,795,624,697 UART: [art] Derive CDI
1,795,624,977 UART: [art] Store in slot 0x4
1,795,710,757 UART: [art] Derive Key Pair
1,795,711,117 UART: [art] Store priv key in slot 0x5
1,795,723,966 UART: [art] Derive Key Pair - Done
1,795,738,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,795,754,332 UART: [art] Erasing AUTHORITY.KEYID = 7
1,795,755,097 UART: [art] PUB.X = 430CF29092349D02D3C22779D350F11873FE98C2099F06245CF3D16FDB3CB3F4BECF1C558070E72D87D19089B8307AC4
1,795,761,855 UART: [art] PUB.Y = 5DF29C8AC19F95ADE42BF48CB80FD17B228C662A393825E253D348411920EB8A6365B384E02A01594FF658C250831A04
1,795,768,794 UART: [art] SIG.R = 91070C3C1D90FCC7F37B3FB000D2127F002CB225893329BBC2837B1BBD8DE5A215780B29617B79AA4EE0F658D8848D29
1,795,775,515 UART: [art] SIG.S = F1818C0247341873524323D2A46E324695DCE905B9BE451B5A3B0220C3C9BE2B9E3160C06DCE65D25F1CA9B93FDF7969
1,795,798,776 UART: Caliptra RT
1,795,799,119 UART: [state] CFI Enabled
1,796,165,793 UART: [rt] RT listening for mailbox commands...
1,796,166,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,796,167,255 UART:
1,796,167,271 UART: Running Caliptra ROM ...
1,796,167,679 UART:
1,796,167,820 UART: [state] CFI Enabled
1,796,170,654 UART: [state] LifecycleState = Unprovisioned
1,796,171,309 UART: [state] DebugLocked = No
1,796,171,895 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,796,173,488 UART: [kat] SHA2-256
1,796,967,419 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,796,971,534 UART: [kat] ++
1,796,971,686 UART: [kat] sha1
1,796,975,808 UART: [kat] SHA2-256
1,796,977,746 UART: [kat] SHA2-384
1,796,980,595 UART: [kat] SHA2-512-ACC
1,796,982,495 UART: [kat] ECC-384
1,796,988,178 UART: [kat] HMAC-384Kdf
1,796,992,770 UART: [kat] LMS
1,797,560,966 UART: [kat] --
1,797,561,759 UART: [update-reset] ++
1,798,943,873 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,798,945,065 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,799,100,332 >>> mbox cmd response: success
1,799,100,643 UART: [update-reset] Copying MAN_2 To MAN_1
1,799,108,657 UART: [update-reset Success] --
1,799,109,524 UART: [state] Locking Datavault
1,799,110,404 UART: [state] Locking PCR0, PCR1 and PCR31
1,799,111,008 UART: [state] Locking ICCM
1,799,111,510 UART: [exit] Launching FMC @ 0x40000130
1,799,116,840 UART:
1,799,116,856 UART: Running Caliptra FMC ...
1,799,117,264 UART:
1,799,117,407 UART: [state] CFI Enabled
1,799,207,018 UART: [art] Extend RT PCRs Done
1,799,207,446 UART: [art] Lock RT PCRs Done
1,799,208,675 UART: [art] Populate DV Done
1,799,216,852 UART: [fht] FMC Alias Private Key: 7
1,799,217,808 UART: [art] Derive CDI
1,799,218,088 UART: [art] Store in slot 0x4
1,799,304,226 UART: [art] Derive Key Pair
1,799,304,586 UART: [art] Store priv key in slot 0x5
1,799,318,215 UART: [art] Derive Key Pair - Done
1,799,333,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,799,348,689 UART: [art] Erasing AUTHORITY.KEYID = 7
1,799,349,454 UART: [art] PUB.X = 5239165A9B9D6C662D70D9A69925014E81D414233C2BDB72732CE431629B974F81FA2F1234AEBFC3B7E884A77FBBF406
1,799,356,220 UART: [art] PUB.Y = 6BB6C1A82BF006C00592E15FEF67B7BD11BEA2DD43599E7FBDE07CEB18A6D8295A09D5376EB7C558027B4285F212B806
1,799,363,167 UART: [art] SIG.R = AA5164BD08DA436F8AF8E540474149EF29C4F9AC068EEA44898D44BB39711DC9FF27F19498A29C8652EC3EF4C1678123
1,799,369,937 UART: [art] SIG.S = 53F282798FCC34FD487FEDA7677977067A0446D01FB0F4AF582651AC8C691E8BAF37BC1F4A07FC619AD44ABA841BA3A8
1,799,394,012 UART: Caliptra RT
1,799,394,355 UART: [state] CFI Enabled
1,799,756,544 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 368.43s
Truncated 718092 bytes from beginning
E4C8F8B859
1,710,675,059 UART: [art] SIG.S = ECFCA12882E8E20504F31B8BBAAF55774B92822248017B5C6C184EE5B1ADBA7CF93261B4E400E6EF365EEBE785268AF7
1,710,699,054 UART: Caliptra RT
1,710,699,397 UART: [state] CFI Enabled
1,711,067,900 UART: [rt] RT listening for mailbox commands...
1,711,068,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,713,882,743 >>> mbox cmd response: success
1,713,896,119 UART:
1,713,896,135 UART: Running Caliptra FMC ...
1,713,896,543 UART:
1,713,896,686 UART: [state] CFI Enabled
1,713,986,423 UART: [art] Extend RT PCRs Done
1,713,986,851 UART: [art] Lock RT PCRs Done
1,713,988,230 UART: [art] Populate DV Done
1,713,996,165 UART: [fht] FMC Alias Private Key: 7
1,713,997,129 UART: [art] Derive CDI
1,713,997,409 UART: [art] Store in slot 0x4
1,714,082,975 UART: [art] Derive Key Pair
1,714,083,335 UART: [art] Store priv key in slot 0x5
1,714,096,414 UART: [art] Derive Key Pair - Done
1,714,111,156 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,714,126,591 UART: [art] Erasing AUTHORITY.KEYID = 7
1,714,127,356 UART: [art] PUB.X = 2B37A766EE07299C802CD0FFA90F489A1FF83E8C24843F828BF24F0F990E6A514F4FF32500A7AD117B7E0C65B74D0561
1,714,134,092 UART: [art] PUB.Y = 6C24BE5F27803F0C4FA9BEECFDB8EEA789DC1ED4219B06BBD21FB6A7F7D4228C6C560474EAA78C7B8DB67973D21E0B59
1,714,141,054 UART: [art] SIG.R = 8035FA2E7869BE71EE2117456032972CB12F81BB952DD6F43949A849FF3BFF7621F457B0AEFAE540FE7486F92B94CA70
1,714,147,830 UART: [art] SIG.S = CCECA510D5AC6FB88DAC0E9F4A638500F5CBB25DAED5039722A8387D454F115453EF475D395556FAED1F0549D1BDD9EB
1,714,171,275 UART: Caliptra RT
1,714,171,618 UART: [state] CFI Enabled
1,714,540,196 UART: [rt] RT listening for mailbox commands...
1,714,540,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,717,354,727 >>> mbox cmd response: success
1,717,368,093 UART:
1,717,368,109 UART: Running Caliptra FMC ...
1,717,368,517 UART:
1,717,368,660 UART: [state] CFI Enabled
1,717,457,971 UART: [art] Extend RT PCRs Done
1,717,458,399 UART: [art] Lock RT PCRs Done
1,717,459,890 UART: [art] Populate DV Done
1,717,468,121 UART: [fht] FMC Alias Private Key: 7
1,717,469,123 UART: [art] Derive CDI
1,717,469,403 UART: [art] Store in slot 0x4
1,717,555,129 UART: [art] Derive Key Pair
1,717,555,489 UART: [art] Store priv key in slot 0x5
1,717,568,630 UART: [art] Derive Key Pair - Done
1,717,583,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,717,599,244 UART: [art] Erasing AUTHORITY.KEYID = 7
1,717,600,009 UART: [art] PUB.X = E8A212CBAF7B2F4A23C1EBA945CF88FD61E0DBF2E0E2E6731031043F57921CDD7497FC6AEF8FCA79F9A51D941D046541
1,717,606,791 UART: [art] PUB.Y = C3CF520FDA5D917153CF6FCC3A8A3315FD42A67501C37D4259543DE369B98CCDBB2B0BBB47680B4B5DE506A6ED0A988B
1,717,613,741 UART: [art] SIG.R = 300C8C4ADB5C84F02D4281947881C2AABB7F006D45A30D3E804A6F33D89358F2A7D3264B1888C7BD1B508CE4C8F8B859
1,717,620,489 UART: [art] SIG.S = ECFCA12882E8E20504F31B8BBAAF55774B92822248017B5C6C184EE5B1ADBA7CF93261B4E400E6EF365EEBE785268AF7
1,717,643,916 UART: Caliptra RT
1,717,644,259 UART: [state] CFI Enabled
1,718,007,628 UART: [rt] RT listening for mailbox commands...
1,718,008,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,720,822,897 >>> mbox cmd response: success
1,720,836,597 UART:
1,720,836,613 UART: Running Caliptra FMC ...
1,720,837,021 UART:
1,720,837,164 UART: [state] CFI Enabled
1,720,926,491 UART: [art] Extend RT PCRs Done
1,720,926,919 UART: [art] Lock RT PCRs Done
1,720,927,982 UART: [art] Populate DV Done
1,720,935,951 UART: [fht] FMC Alias Private Key: 7
1,720,937,133 UART: [art] Derive CDI
1,720,937,413 UART: [art] Store in slot 0x4
1,721,023,027 UART: [art] Derive Key Pair
1,721,023,387 UART: [art] Store priv key in slot 0x5
1,721,036,566 UART: [art] Derive Key Pair - Done
1,721,051,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,721,066,743 UART: [art] Erasing AUTHORITY.KEYID = 7
1,721,067,508 UART: [art] PUB.X = 2B37A766EE07299C802CD0FFA90F489A1FF83E8C24843F828BF24F0F990E6A514F4FF32500A7AD117B7E0C65B74D0561
1,721,074,244 UART: [art] PUB.Y = 6C24BE5F27803F0C4FA9BEECFDB8EEA789DC1ED4219B06BBD21FB6A7F7D4228C6C560474EAA78C7B8DB67973D21E0B59
1,721,081,206 UART: [art] SIG.R = 8035FA2E7869BE71EE2117456032972CB12F81BB952DD6F43949A849FF3BFF7621F457B0AEFAE540FE7486F92B94CA70
1,721,087,982 UART: [art] SIG.S = CCECA510D5AC6FB88DAC0E9F4A638500F5CBB25DAED5039722A8387D454F115453EF475D395556FAED1F0549D1BDD9EB
1,721,112,073 UART: Caliptra RT
1,721,112,416 UART: [state] CFI Enabled
1,721,479,056 UART: [rt] RT listening for mailbox commands...
1,721,479,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,724,294,077 >>> mbox cmd response: success
1,724,307,399 UART:
1,724,307,415 UART: Running Caliptra FMC ...
1,724,307,823 UART:
1,724,307,966 UART: [state] CFI Enabled
1,724,396,881 UART: [art] Extend RT PCRs Done
1,724,397,309 UART: [art] Lock RT PCRs Done
1,724,398,454 UART: [art] Populate DV Done
1,724,406,891 UART: [fht] FMC Alias Private Key: 7
1,724,407,939 UART: [art] Derive CDI
1,724,408,219 UART: [art] Store in slot 0x4
1,724,494,067 UART: [art] Derive Key Pair
1,724,494,427 UART: [art] Store priv key in slot 0x5
1,724,507,886 UART: [art] Derive Key Pair - Done
1,724,522,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,724,538,072 UART: [art] Erasing AUTHORITY.KEYID = 7
1,724,538,837 UART: [art] PUB.X = E8A212CBAF7B2F4A23C1EBA945CF88FD61E0DBF2E0E2E6731031043F57921CDD7497FC6AEF8FCA79F9A51D941D046541
1,724,545,619 UART: [art] PUB.Y = C3CF520FDA5D917153CF6FCC3A8A3315FD42A67501C37D4259543DE369B98CCDBB2B0BBB47680B4B5DE506A6ED0A988B
1,724,552,569 UART: [art] SIG.R = 300C8C4ADB5C84F02D4281947881C2AABB7F006D45A30D3E804A6F33D89358F2A7D3264B1888C7BD1B508CE4C8F8B859
1,724,559,317 UART: [art] SIG.S = ECFCA12882E8E20504F31B8BBAAF55774B92822248017B5C6C184EE5B1ADBA7CF93261B4E400E6EF365EEBE785268AF7
1,724,582,886 UART: Caliptra RT
1,724,583,229 UART: [state] CFI Enabled
1,724,950,592 UART: [rt] RT listening for mailbox commands...
1,724,951,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,727,765,475 >>> mbox cmd response: success
1,727,778,859 UART:
1,727,778,875 UART: Running Caliptra FMC ...
1,727,779,283 UART:
1,727,779,426 UART: [state] CFI Enabled
1,727,868,643 UART: [art] Extend RT PCRs Done
1,727,869,071 UART: [art] Lock RT PCRs Done
1,727,870,556 UART: [art] Populate DV Done
1,727,878,961 UART: [fht] FMC Alias Private Key: 7
1,727,880,111 UART: [art] Derive CDI
1,727,880,391 UART: [art] Store in slot 0x4
1,727,966,183 UART: [art] Derive Key Pair
1,727,966,543 UART: [art] Store priv key in slot 0x5
1,727,979,322 UART: [art] Derive Key Pair - Done
1,727,994,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,728,009,879 UART: [art] Erasing AUTHORITY.KEYID = 7
1,728,010,644 UART: [art] PUB.X = 2B37A766EE07299C802CD0FFA90F489A1FF83E8C24843F828BF24F0F990E6A514F4FF32500A7AD117B7E0C65B74D0561
1,728,017,380 UART: [art] PUB.Y = 6C24BE5F27803F0C4FA9BEECFDB8EEA789DC1ED4219B06BBD21FB6A7F7D4228C6C560474EAA78C7B8DB67973D21E0B59
1,728,024,342 UART: [art] SIG.R = 8035FA2E7869BE71EE2117456032972CB12F81BB952DD6F43949A849FF3BFF7621F457B0AEFAE540FE7486F92B94CA70
1,728,031,118 UART: [art] SIG.S = CCECA510D5AC6FB88DAC0E9F4A638500F5CBB25DAED5039722A8387D454F115453EF475D395556FAED1F0549D1BDD9EB
1,728,055,371 UART: Caliptra RT
1,728,055,714 UART: [state] CFI Enabled
1,728,420,966 UART: [rt] RT listening for mailbox commands...
1,728,421,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,731,237,481 >>> mbox cmd response: success
1,731,250,691 UART:
1,731,250,707 UART: Running Caliptra FMC ...
1,731,251,115 UART:
1,731,251,258 UART: [state] CFI Enabled
1,731,341,151 UART: [art] Extend RT PCRs Done
1,731,341,579 UART: [art] Lock RT PCRs Done
1,731,342,714 UART: [art] Populate DV Done
1,731,351,027 UART: [fht] FMC Alias Private Key: 7
1,731,351,995 UART: [art] Derive CDI
1,731,352,275 UART: [art] Store in slot 0x4
1,731,437,915 UART: [art] Derive Key Pair
1,731,438,275 UART: [art] Store priv key in slot 0x5
1,731,451,872 UART: [art] Derive Key Pair - Done
1,731,466,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,731,482,166 UART: [art] Erasing AUTHORITY.KEYID = 7
1,731,482,931 UART: [art] PUB.X = E8A212CBAF7B2F4A23C1EBA945CF88FD61E0DBF2E0E2E6731031043F57921CDD7497FC6AEF8FCA79F9A51D941D046541
1,731,489,713 UART: [art] PUB.Y = C3CF520FDA5D917153CF6FCC3A8A3315FD42A67501C37D4259543DE369B98CCDBB2B0BBB47680B4B5DE506A6ED0A988B
1,731,496,663 UART: [art] SIG.R = 300C8C4ADB5C84F02D4281947881C2AABB7F006D45A30D3E804A6F33D89358F2A7D3264B1888C7BD1B508CE4C8F8B859
1,731,503,411 UART: [art] SIG.S = ECFCA12882E8E20504F31B8BBAAF55774B92822248017B5C6C184EE5B1ADBA7CF93261B4E400E6EF365EEBE785268AF7
1,731,527,188 UART: Caliptra RT
1,731,527,531 UART: [state] CFI Enabled
1,731,890,348 UART: [rt] RT listening for mailbox commands...
1,731,891,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,734,705,775 >>> mbox cmd response: success
1,734,719,213 UART:
1,734,719,229 UART: Running Caliptra FMC ...
1,734,719,637 UART:
1,734,719,780 UART: [state] CFI Enabled
1,734,809,553 UART: [art] Extend RT PCRs Done
1,734,809,981 UART: [art] Lock RT PCRs Done
1,734,811,066 UART: [art] Populate DV Done
1,734,819,151 UART: [fht] FMC Alias Private Key: 7
1,734,820,105 UART: [art] Derive CDI
1,734,820,385 UART: [art] Store in slot 0x4
1,734,905,925 UART: [art] Derive Key Pair
1,734,906,285 UART: [art] Store priv key in slot 0x5
1,734,919,610 UART: [art] Derive Key Pair - Done
1,734,934,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,734,950,217 UART: [art] Erasing AUTHORITY.KEYID = 7
1,734,950,982 UART: [art] PUB.X = 2B37A766EE07299C802CD0FFA90F489A1FF83E8C24843F828BF24F0F990E6A514F4FF32500A7AD117B7E0C65B74D0561
1,734,957,718 UART: [art] PUB.Y = 6C24BE5F27803F0C4FA9BEECFDB8EEA789DC1ED4219B06BBD21FB6A7F7D4228C6C560474EAA78C7B8DB67973D21E0B59
1,734,964,680 UART: [art] SIG.R = 8035FA2E7869BE71EE2117456032972CB12F81BB952DD6F43949A849FF3BFF7621F457B0AEFAE540FE7486F92B94CA70
1,734,971,456 UART: [art] SIG.S = CCECA510D5AC6FB88DAC0E9F4A638500F5CBB25DAED5039722A8387D454F115453EF475D395556FAED1F0549D1BDD9EB
1,734,995,113 UART: Caliptra RT
1,734,995,456 UART: [state] CFI Enabled
1,735,354,810 UART: [rt] RT listening for mailbox commands...
1,735,355,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,738,167,981 >>> mbox cmd response: success
1,738,181,383 UART:
1,738,181,399 UART: Running Caliptra FMC ...
1,738,181,807 UART:
1,738,181,950 UART: [state] CFI Enabled
1,738,271,159 UART: [art] Extend RT PCRs Done
1,738,271,587 UART: [art] Lock RT PCRs Done
1,738,272,684 UART: [art] Populate DV Done
1,738,281,133 UART: [fht] FMC Alias Private Key: 7
1,738,282,279 UART: [art] Derive CDI
1,738,282,559 UART: [art] Store in slot 0x4
1,738,368,629 UART: [art] Derive Key Pair
1,738,368,989 UART: [art] Store priv key in slot 0x5
1,738,382,468 UART: [art] Derive Key Pair - Done
1,738,396,743 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,738,412,000 UART: [art] Erasing AUTHORITY.KEYID = 7
1,738,412,765 UART: [art] PUB.X = E8A212CBAF7B2F4A23C1EBA945CF88FD61E0DBF2E0E2E6731031043F57921CDD7497FC6AEF8FCA79F9A51D941D046541
1,738,419,547 UART: [art] PUB.Y = C3CF520FDA5D917153CF6FCC3A8A3315FD42A67501C37D4259543DE369B98CCDBB2B0BBB47680B4B5DE506A6ED0A988B
1,738,426,497 UART: [art] SIG.R = 300C8C4ADB5C84F02D4281947881C2AABB7F006D45A30D3E804A6F33D89358F2A7D3264B1888C7BD1B508CE4C8F8B859
1,738,433,245 UART: [art] SIG.S = ECFCA12882E8E20504F31B8BBAAF55774B92822248017B5C6C184EE5B1ADBA7CF93261B4E400E6EF365EEBE785268AF7
1,738,457,228 UART: Caliptra RT
1,738,457,571 UART: [state] CFI Enabled
1,738,824,018 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 357.04s
Truncated 1323521 bytes from beginning
a FMC ...
1,620,622,254 UART:
1,620,622,308 UART: [state] CFI Enabled
1,620,711,055 UART: [art] Extend RT PCRs Done
1,620,711,483 UART: [art] Lock RT PCRs Done
1,620,712,480 UART: [art] Populate DV Done
1,620,720,701 UART: [fht] FMC Alias Private Key: 7
1,620,721,841 UART: [art] Derive CDI
1,620,722,121 UART: [art] Store in slot 0x4
1,620,808,150 UART: [art] Derive Key Pair
1,620,808,510 UART: [art] Store priv key in slot 0x5
1,620,822,124 UART: [art] Derive Key Pair - Done
1,620,836,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,620,852,457 UART: [art] Erasing AUTHORITY.KEYID = 7
1,620,853,222 UART: [art] PUB.X = DB48A319B481AF9616F0E6FAD919550C13C6465FFD30C69B0A3CDF9C357C0AD5CB4E472E8BE3EA06A45BBB9D9BBED073
1,620,860,004 UART: [art] PUB.Y = 83677AD68CA167EBC5F6C388A67672ADC848595459028A24CB51B22338F3CE61B272F382FCB49B97C2EE933A14DE3D92
1,620,866,955 UART: [art] SIG.R = 1C9F345AACB8C98BFC974D56C6DC12629ACF9091A60C5C49B08CD092B0E16A394918664CF34B29BC569C7D685228D13C
1,620,873,730 UART: [art] SIG.S = A7B2DF217581147E476AB5730B6F16BEE39ECB71235F5DE9B8EF217A228F3B0DB02AED05CED16E6B3D9EE24EF47F2709
1,620,897,050 UART: Caliptra RT
1,620,897,301 UART: [state] CFI Enabled
1,621,262,251 UART: [rt] RT listening for mailbox commands...
1,621,262,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,263,844 UART:
1,621,263,860 UART: Running Caliptra ROM ...
1,621,264,268 UART:
1,621,264,323 UART: [state] CFI Enabled
1,621,266,835 UART: [state] LifecycleState = Unprovisioned
1,621,267,490 UART: [state] DebugLocked = No
1,621,268,156 UART: [state] WD Timer not started. Device not locked for debugging
1,621,269,498 UART: [kat] SHA2-256
1,622,073,048 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,622,077,152 UART: [kat] ++
1,622,077,304 UART: [kat] sha1
1,622,081,462 UART: [kat] SHA2-256
1,622,083,402 UART: [kat] SHA2-384
1,622,086,077 UART: [kat] SHA2-512-ACC
1,622,087,977 UART: [kat] ECC-384
1,622,097,946 UART: [kat] HMAC-384Kdf
1,622,102,562 UART: [kat] LMS
1,622,350,874 UART: [kat] --
1,622,351,714 UART: [update-reset] ++
1,623,711,479 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,623,712,478 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,623,867,693 >>> mbox cmd response: success
1,623,867,996 UART: [update-reset] Copying MAN_2 To MAN_1
1,623,876,010 UART: [update-reset Success] --
1,623,877,151 UART: [state] Locking Datavault
1,623,878,181 UART: [state] Locking PCR0, PCR1 and PCR31
1,623,878,785 UART: [state] Locking ICCM
1,623,879,309 UART: [exit] Launching FMC @ 0x40000130
1,623,884,639 UART:
1,623,884,655 UART: Running Caliptra FMC ...
1,623,885,063 UART:
1,623,885,117 UART: [state] CFI Enabled
1,623,974,500 UART: [art] Extend RT PCRs Done
1,623,974,928 UART: [art] Lock RT PCRs Done
1,623,976,197 UART: [art] Populate DV Done
1,623,984,546 UART: [fht] FMC Alias Private Key: 7
1,623,985,698 UART: [art] Derive CDI
1,623,985,978 UART: [art] Store in slot 0x4
1,624,071,625 UART: [art] Derive Key Pair
1,624,071,985 UART: [art] Store priv key in slot 0x5
1,624,085,317 UART: [art] Derive Key Pair - Done
1,624,100,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,624,115,913 UART: [art] Erasing AUTHORITY.KEYID = 7
1,624,116,678 UART: [art] PUB.X = 22D2906B2674B47CED4BF4B2376370E60DE862348B5405F97F2AB88BD1CBD8BD8C41B9BAA9A8E4D170A358CED5A87C86
1,624,123,456 UART: [art] PUB.Y = B7F115FAF71D9AFD30FFC5F5FB984C085A0DC9D00231E27EB2C7579865ADBDF2A51ED58C1E636906FF92718F5A0A3A92
1,624,130,409 UART: [art] SIG.R = 48F5E9344F8AD5F5558C1B6EABE9E7006F09AB60A87793A51F5EEA9E42DE1BCD9DB3ADDB99C7C72FA3FC0D3562B2A529
1,624,137,175 UART: [art] SIG.S = DFB2046DCE664A9106B3DCE706DACC2777C5BC08CA15A1D4C98CEC517098C8F7A37F17691E7A6E9AB0214B36F88F2728
1,624,160,995 UART: Caliptra RT
1,624,161,246 UART: [state] CFI Enabled
1,624,525,354 UART: [rt] RT listening for mailbox commands...
1,624,526,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,624,527,113 UART:
1,624,527,129 UART: Running Caliptra ROM ...
1,624,527,537 UART:
1,624,527,592 UART: [state] CFI Enabled
1,624,530,328 UART: [state] LifecycleState = Unprovisioned
1,624,530,983 UART: [state] DebugLocked = No
1,624,531,603 UART: [state] WD Timer not started. Device not locked for debugging
1,624,532,931 UART: [kat] SHA2-256
1,625,336,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,625,340,585 UART: [kat] ++
1,625,340,737 UART: [kat] sha1
1,625,344,965 UART: [kat] SHA2-256
1,625,346,905 UART: [kat] SHA2-384
1,625,349,554 UART: [kat] SHA2-512-ACC
1,625,351,454 UART: [kat] ECC-384
1,625,360,945 UART: [kat] HMAC-384Kdf
1,625,365,435 UART: [kat] LMS
1,625,613,747 UART: [kat] --
1,625,614,919 UART: [update-reset] ++
1,626,973,406 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,626,974,513 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,627,129,728 >>> mbox cmd response: success
1,627,130,059 UART: [update-reset] Copying MAN_2 To MAN_1
1,627,138,073 UART: [update-reset Success] --
1,627,139,190 UART: [state] Locking Datavault
1,627,140,024 UART: [state] Locking PCR0, PCR1 and PCR31
1,627,140,628 UART: [state] Locking ICCM
1,627,141,114 UART: [exit] Launching FMC @ 0x40000130
1,627,146,444 UART:
1,627,146,460 UART: Running Caliptra FMC ...
1,627,146,868 UART:
1,627,146,922 UART: [state] CFI Enabled
1,627,236,381 UART: [art] Extend RT PCRs Done
1,627,236,809 UART: [art] Lock RT PCRs Done
1,627,238,134 UART: [art] Populate DV Done
1,627,246,521 UART: [fht] FMC Alias Private Key: 7
1,627,247,497 UART: [art] Derive CDI
1,627,247,777 UART: [art] Store in slot 0x4
1,627,333,488 UART: [art] Derive Key Pair
1,627,333,848 UART: [art] Store priv key in slot 0x5
1,627,346,830 UART: [art] Derive Key Pair - Done
1,627,361,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,627,376,777 UART: [art] Erasing AUTHORITY.KEYID = 7
1,627,377,542 UART: [art] PUB.X = DB48A319B481AF9616F0E6FAD919550C13C6465FFD30C69B0A3CDF9C357C0AD5CB4E472E8BE3EA06A45BBB9D9BBED073
1,627,384,324 UART: [art] PUB.Y = 83677AD68CA167EBC5F6C388A67672ADC848595459028A24CB51B22338F3CE61B272F382FCB49B97C2EE933A14DE3D92
1,627,391,275 UART: [art] SIG.R = 1C9F345AACB8C98BFC974D56C6DC12629ACF9091A60C5C49B08CD092B0E16A394918664CF34B29BC569C7D685228D13C
1,627,398,050 UART: [art] SIG.S = A7B2DF217581147E476AB5730B6F16BEE39ECB71235F5DE9B8EF217A228F3B0DB02AED05CED16E6B3D9EE24EF47F2709
1,627,421,852 UART: Caliptra RT
1,627,422,103 UART: [state] CFI Enabled
1,627,786,321 UART: [rt] RT listening for mailbox commands...
1,627,786,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,627,787,990 UART:
1,627,788,006 UART: Running Caliptra ROM ...
1,627,788,414 UART:
1,627,788,469 UART: [state] CFI Enabled
1,627,791,157 UART: [state] LifecycleState = Unprovisioned
1,627,791,812 UART: [state] DebugLocked = No
1,627,792,402 UART: [state] WD Timer not started. Device not locked for debugging
1,627,793,684 UART: [kat] SHA2-256
1,628,597,234 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,628,601,338 UART: [kat] ++
1,628,601,490 UART: [kat] sha1
1,628,605,680 UART: [kat] SHA2-256
1,628,607,620 UART: [kat] SHA2-384
1,628,610,345 UART: [kat] SHA2-512-ACC
1,628,612,245 UART: [kat] ECC-384
1,628,621,944 UART: [kat] HMAC-384Kdf
1,628,626,632 UART: [kat] LMS
1,628,874,944 UART: [kat] --
1,628,875,976 UART: [update-reset] ++
1,630,235,447 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,630,236,458 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,630,391,673 >>> mbox cmd response: success
1,630,391,958 UART: [update-reset] Copying MAN_2 To MAN_1
1,630,399,972 UART: [update-reset Success] --
1,630,400,929 UART: [state] Locking Datavault
1,630,401,641 UART: [state] Locking PCR0, PCR1 and PCR31
1,630,402,245 UART: [state] Locking ICCM
1,630,402,811 UART: [exit] Launching FMC @ 0x40000130
1,630,408,141 UART:
1,630,408,157 UART: Running Caliptra FMC ...
1,630,408,565 UART:
1,630,408,619 UART: [state] CFI Enabled
1,630,497,556 UART: [art] Extend RT PCRs Done
1,630,497,984 UART: [art] Lock RT PCRs Done
1,630,499,109 UART: [art] Populate DV Done
1,630,507,422 UART: [fht] FMC Alias Private Key: 7
1,630,508,422 UART: [art] Derive CDI
1,630,508,702 UART: [art] Store in slot 0x4
1,630,594,547 UART: [art] Derive Key Pair
1,630,594,907 UART: [art] Store priv key in slot 0x5
1,630,608,223 UART: [art] Derive Key Pair - Done
1,630,622,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,630,638,545 UART: [art] Erasing AUTHORITY.KEYID = 7
1,630,639,310 UART: [art] PUB.X = 22D2906B2674B47CED4BF4B2376370E60DE862348B5405F97F2AB88BD1CBD8BD8C41B9BAA9A8E4D170A358CED5A87C86
1,630,646,088 UART: [art] PUB.Y = B7F115FAF71D9AFD30FFC5F5FB984C085A0DC9D00231E27EB2C7579865ADBDF2A51ED58C1E636906FF92718F5A0A3A92
1,630,653,041 UART: [art] SIG.R = 48F5E9344F8AD5F5558C1B6EABE9E7006F09AB60A87793A51F5EEA9E42DE1BCD9DB3ADDB99C7C72FA3FC0D3562B2A529
1,630,659,807 UART: [art] SIG.S = DFB2046DCE664A9106B3DCE706DACC2777C5BC08CA15A1D4C98CEC517098C8F7A37F17691E7A6E9AB0214B36F88F2728
1,630,683,561 UART: Caliptra RT
1,630,683,812 UART: [state] CFI Enabled
1,631,049,810 UART: [rt] RT listening for mailbox commands...
1,631,050,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,631,051,403 UART:
1,631,051,419 UART: Running Caliptra ROM ...
1,631,051,827 UART:
1,631,051,882 UART: [state] CFI Enabled
1,631,054,746 UART: [state] LifecycleState = Unprovisioned
1,631,055,401 UART: [state] DebugLocked = No
1,631,055,973 UART: [state] WD Timer not started. Device not locked for debugging
1,631,057,197 UART: [kat] SHA2-256
1,631,860,747 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,631,864,851 UART: [kat] ++
1,631,865,003 UART: [kat] sha1
1,631,869,223 UART: [kat] SHA2-256
1,631,871,163 UART: [kat] SHA2-384
1,631,873,938 UART: [kat] SHA2-512-ACC
1,631,875,838 UART: [kat] ECC-384
1,631,885,277 UART: [kat] HMAC-384Kdf
1,631,889,841 UART: [kat] LMS
1,632,138,153 UART: [kat] --
1,632,138,983 UART: [update-reset] ++
1,633,497,272 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,633,498,461 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,633,653,676 >>> mbox cmd response: success
1,633,654,029 UART: [update-reset] Copying MAN_2 To MAN_1
1,633,662,043 UART: [update-reset Success] --
1,633,663,186 UART: [state] Locking Datavault
1,633,663,956 UART: [state] Locking PCR0, PCR1 and PCR31
1,633,664,560 UART: [state] Locking ICCM
1,633,665,002 UART: [exit] Launching FMC @ 0x40000130
1,633,670,332 UART:
1,633,670,348 UART: Running Caliptra FMC ...
1,633,670,756 UART:
1,633,670,810 UART: [state] CFI Enabled
1,633,760,423 UART: [art] Extend RT PCRs Done
1,633,760,851 UART: [art] Lock RT PCRs Done
1,633,762,252 UART: [art] Populate DV Done
1,633,770,275 UART: [fht] FMC Alias Private Key: 7
1,633,771,391 UART: [art] Derive CDI
1,633,771,671 UART: [art] Store in slot 0x4
1,633,857,852 UART: [art] Derive Key Pair
1,633,858,212 UART: [art] Store priv key in slot 0x5
1,633,871,368 UART: [art] Derive Key Pair - Done
1,633,886,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,633,901,345 UART: [art] Erasing AUTHORITY.KEYID = 7
1,633,902,110 UART: [art] PUB.X = DB48A319B481AF9616F0E6FAD919550C13C6465FFD30C69B0A3CDF9C357C0AD5CB4E472E8BE3EA06A45BBB9D9BBED073
1,633,908,892 UART: [art] PUB.Y = 83677AD68CA167EBC5F6C388A67672ADC848595459028A24CB51B22338F3CE61B272F382FCB49B97C2EE933A14DE3D92
1,633,915,843 UART: [art] SIG.R = 1C9F345AACB8C98BFC974D56C6DC12629ACF9091A60C5C49B08CD092B0E16A394918664CF34B29BC569C7D685228D13C
1,633,922,618 UART: [art] SIG.S = A7B2DF217581147E476AB5730B6F16BEE39ECB71235F5DE9B8EF217A228F3B0DB02AED05CED16E6B3D9EE24EF47F2709
1,633,946,184 UART: Caliptra RT
1,633,946,435 UART: [state] CFI Enabled
1,634,310,411 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 359.47s
Truncated 716652 bytes from beginning
F3DD2A5032
1,549,392,549 UART: [art] SIG.S = E93038C1BD4662FC66D5F7F664C0BB9E126A70B95C75150401CDEB5E5D5630F0A72A0532B0AE1627592F15221DDEAA58
1,549,416,578 UART: Caliptra RT
1,549,416,829 UART: [state] CFI Enabled
1,549,790,572 UART: [rt] RT listening for mailbox commands...
1,549,791,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,552,280,178 >>> mbox cmd response: success
1,552,293,511 UART:
1,552,293,527 UART: Running Caliptra FMC ...
1,552,293,935 UART:
1,552,293,989 UART: [state] CFI Enabled
1,552,382,934 UART: [art] Extend RT PCRs Done
1,552,383,362 UART: [art] Lock RT PCRs Done
1,552,384,605 UART: [art] Populate DV Done
1,552,392,520 UART: [fht] FMC Alias Private Key: 7
1,552,393,596 UART: [art] Derive CDI
1,552,393,876 UART: [art] Store in slot 0x4
1,552,480,027 UART: [art] Derive Key Pair
1,552,480,387 UART: [art] Store priv key in slot 0x5
1,552,493,997 UART: [art] Derive Key Pair - Done
1,552,508,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,552,524,010 UART: [art] Erasing AUTHORITY.KEYID = 7
1,552,524,775 UART: [art] PUB.X = C82764FAB2DC65F5839DAEC914CEE09EFCE71F14B0E1710203A62152BCE4D298A1504DD7C894E7086FF3DCBF8C830545
1,552,531,547 UART: [art] PUB.Y = 828E5E36654ED504A2B0571271354D998256937B960CB89BB2366B300AF536CE9B5C2078C9A1D26D10A1F190C887F536
1,552,538,480 UART: [art] SIG.R = C05FD4232BDA6D7FC5074E18093DEC2C48A0CD34E7842C98705699F95240B818CBCA4C20130C94FC07C8342359A38955
1,552,545,238 UART: [art] SIG.S = 8B4889FC16003E377C9F881EE3735B8711A800F8FA6C341819932E486E0660E8105D535DF9FB6A0E58BCE768FF4D8AEA
1,552,569,202 UART: Caliptra RT
1,552,569,453 UART: [state] CFI Enabled
1,552,931,986 UART: [rt] RT listening for mailbox commands...
1,552,932,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,555,420,316 >>> mbox cmd response: success
1,555,433,577 UART:
1,555,433,593 UART: Running Caliptra FMC ...
1,555,434,001 UART:
1,555,434,055 UART: [state] CFI Enabled
1,555,523,248 UART: [art] Extend RT PCRs Done
1,555,523,676 UART: [art] Lock RT PCRs Done
1,555,524,843 UART: [art] Populate DV Done
1,555,533,040 UART: [fht] FMC Alias Private Key: 7
1,555,534,066 UART: [art] Derive CDI
1,555,534,346 UART: [art] Store in slot 0x4
1,555,620,477 UART: [art] Derive Key Pair
1,555,620,837 UART: [art] Store priv key in slot 0x5
1,555,634,087 UART: [art] Derive Key Pair - Done
1,555,648,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,555,664,184 UART: [art] Erasing AUTHORITY.KEYID = 7
1,555,664,949 UART: [art] PUB.X = 9579A5FCF639CC1E2E7C98BBC9AC91A8BD56430795BB06CDB5BE210EC45001578C2A98D887913AEF6AE9FB895150EFC6
1,555,671,723 UART: [art] PUB.Y = CCE7BBFA1BBB3086307A3478C4780082D72AD416F8E39BEBF87B086795641735BF39E4F3A6A377DC911B069F1A202231
1,555,678,649 UART: [art] SIG.R = D909696417BD9DB0B733B16B394DE7B5FDC2CD4AF23965FE943B80015F48A605841BF23598717903AB585AF3DD2A5032
1,555,685,409 UART: [art] SIG.S = E93038C1BD4662FC66D5F7F664C0BB9E126A70B95C75150401CDEB5E5D5630F0A72A0532B0AE1627592F15221DDEAA58
1,555,708,808 UART: Caliptra RT
1,555,709,059 UART: [state] CFI Enabled
1,556,068,778 UART: [rt] RT listening for mailbox commands...
1,556,069,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,558,558,700 >>> mbox cmd response: success
1,558,572,051 UART:
1,558,572,067 UART: Running Caliptra FMC ...
1,558,572,475 UART:
1,558,572,529 UART: [state] CFI Enabled
1,558,661,924 UART: [art] Extend RT PCRs Done
1,558,662,352 UART: [art] Lock RT PCRs Done
1,558,663,839 UART: [art] Populate DV Done
1,558,672,060 UART: [fht] FMC Alias Private Key: 7
1,558,673,104 UART: [art] Derive CDI
1,558,673,384 UART: [art] Store in slot 0x4
1,558,759,673 UART: [art] Derive Key Pair
1,558,760,033 UART: [art] Store priv key in slot 0x5
1,558,773,151 UART: [art] Derive Key Pair - Done
1,558,788,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,558,803,674 UART: [art] Erasing AUTHORITY.KEYID = 7
1,558,804,439 UART: [art] PUB.X = C82764FAB2DC65F5839DAEC914CEE09EFCE71F14B0E1710203A62152BCE4D298A1504DD7C894E7086FF3DCBF8C830545
1,558,811,211 UART: [art] PUB.Y = 828E5E36654ED504A2B0571271354D998256937B960CB89BB2366B300AF536CE9B5C2078C9A1D26D10A1F190C887F536
1,558,818,144 UART: [art] SIG.R = C05FD4232BDA6D7FC5074E18093DEC2C48A0CD34E7842C98705699F95240B818CBCA4C20130C94FC07C8342359A38955
1,558,824,902 UART: [art] SIG.S = 8B4889FC16003E377C9F881EE3735B8711A800F8FA6C341819932E486E0660E8105D535DF9FB6A0E58BCE768FF4D8AEA
1,558,848,462 UART: Caliptra RT
1,558,848,713 UART: [state] CFI Enabled
1,559,211,256 UART: [rt] RT listening for mailbox commands...
1,559,211,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,561,700,238 >>> mbox cmd response: success
1,561,713,615 UART:
1,561,713,631 UART: Running Caliptra FMC ...
1,561,714,039 UART:
1,561,714,093 UART: [state] CFI Enabled
1,561,803,372 UART: [art] Extend RT PCRs Done
1,561,803,800 UART: [art] Lock RT PCRs Done
1,561,805,149 UART: [art] Populate DV Done
1,561,813,142 UART: [fht] FMC Alias Private Key: 7
1,561,814,192 UART: [art] Derive CDI
1,561,814,472 UART: [art] Store in slot 0x4
1,561,900,459 UART: [art] Derive Key Pair
1,561,900,819 UART: [art] Store priv key in slot 0x5
1,561,913,823 UART: [art] Derive Key Pair - Done
1,561,928,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,561,944,174 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,944,939 UART: [art] PUB.X = 9579A5FCF639CC1E2E7C98BBC9AC91A8BD56430795BB06CDB5BE210EC45001578C2A98D887913AEF6AE9FB895150EFC6
1,561,951,713 UART: [art] PUB.Y = CCE7BBFA1BBB3086307A3478C4780082D72AD416F8E39BEBF87B086795641735BF39E4F3A6A377DC911B069F1A202231
1,561,958,639 UART: [art] SIG.R = D909696417BD9DB0B733B16B394DE7B5FDC2CD4AF23965FE943B80015F48A605841BF23598717903AB585AF3DD2A5032
1,561,965,399 UART: [art] SIG.S = E93038C1BD4662FC66D5F7F664C0BB9E126A70B95C75150401CDEB5E5D5630F0A72A0532B0AE1627592F15221DDEAA58
1,561,989,260 UART: Caliptra RT
1,561,989,511 UART: [state] CFI Enabled
1,562,358,278 UART: [rt] RT listening for mailbox commands...
1,562,358,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,564,847,534 >>> mbox cmd response: success
1,564,860,879 UART:
1,564,860,895 UART: Running Caliptra FMC ...
1,564,861,303 UART:
1,564,861,357 UART: [state] CFI Enabled
1,564,950,418 UART: [art] Extend RT PCRs Done
1,564,950,846 UART: [art] Lock RT PCRs Done
1,564,951,949 UART: [art] Populate DV Done
1,564,960,028 UART: [fht] FMC Alias Private Key: 7
1,564,961,190 UART: [art] Derive CDI
1,564,961,470 UART: [art] Store in slot 0x4
1,565,047,353 UART: [art] Derive Key Pair
1,565,047,713 UART: [art] Store priv key in slot 0x5
1,565,061,483 UART: [art] Derive Key Pair - Done
1,565,076,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,565,091,820 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,092,585 UART: [art] PUB.X = C82764FAB2DC65F5839DAEC914CEE09EFCE71F14B0E1710203A62152BCE4D298A1504DD7C894E7086FF3DCBF8C830545
1,565,099,357 UART: [art] PUB.Y = 828E5E36654ED504A2B0571271354D998256937B960CB89BB2366B300AF536CE9B5C2078C9A1D26D10A1F190C887F536
1,565,106,290 UART: [art] SIG.R = C05FD4232BDA6D7FC5074E18093DEC2C48A0CD34E7842C98705699F95240B818CBCA4C20130C94FC07C8342359A38955
1,565,113,048 UART: [art] SIG.S = 8B4889FC16003E377C9F881EE3735B8711A800F8FA6C341819932E486E0660E8105D535DF9FB6A0E58BCE768FF4D8AEA
1,565,137,520 UART: Caliptra RT
1,565,137,771 UART: [state] CFI Enabled
1,565,501,076 UART: [rt] RT listening for mailbox commands...
1,565,501,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,567,989,360 >>> mbox cmd response: success
1,568,002,889 UART:
1,568,002,905 UART: Running Caliptra FMC ...
1,568,003,313 UART:
1,568,003,367 UART: [state] CFI Enabled
1,568,092,674 UART: [art] Extend RT PCRs Done
1,568,093,102 UART: [art] Lock RT PCRs Done
1,568,094,133 UART: [art] Populate DV Done
1,568,102,292 UART: [fht] FMC Alias Private Key: 7
1,568,103,418 UART: [art] Derive CDI
1,568,103,698 UART: [art] Store in slot 0x4
1,568,189,381 UART: [art] Derive Key Pair
1,568,189,741 UART: [art] Store priv key in slot 0x5
1,568,203,329 UART: [art] Derive Key Pair - Done
1,568,218,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,568,233,756 UART: [art] Erasing AUTHORITY.KEYID = 7
1,568,234,521 UART: [art] PUB.X = 9579A5FCF639CC1E2E7C98BBC9AC91A8BD56430795BB06CDB5BE210EC45001578C2A98D887913AEF6AE9FB895150EFC6
1,568,241,295 UART: [art] PUB.Y = CCE7BBFA1BBB3086307A3478C4780082D72AD416F8E39BEBF87B086795641735BF39E4F3A6A377DC911B069F1A202231
1,568,248,221 UART: [art] SIG.R = D909696417BD9DB0B733B16B394DE7B5FDC2CD4AF23965FE943B80015F48A605841BF23598717903AB585AF3DD2A5032
1,568,254,981 UART: [art] SIG.S = E93038C1BD4662FC66D5F7F664C0BB9E126A70B95C75150401CDEB5E5D5630F0A72A0532B0AE1627592F15221DDEAA58
1,568,278,428 UART: Caliptra RT
1,568,278,679 UART: [state] CFI Enabled
1,568,645,548 UART: [rt] RT listening for mailbox commands...
1,568,646,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,571,135,164 >>> mbox cmd response: success
1,571,148,363 UART:
1,571,148,379 UART: Running Caliptra FMC ...
1,571,148,787 UART:
1,571,148,841 UART: [state] CFI Enabled
1,571,237,812 UART: [art] Extend RT PCRs Done
1,571,238,240 UART: [art] Lock RT PCRs Done
1,571,239,649 UART: [art] Populate DV Done
1,571,247,994 UART: [fht] FMC Alias Private Key: 7
1,571,249,078 UART: [art] Derive CDI
1,571,249,358 UART: [art] Store in slot 0x4
1,571,335,311 UART: [art] Derive Key Pair
1,571,335,671 UART: [art] Store priv key in slot 0x5
1,571,348,757 UART: [art] Derive Key Pair - Done
1,571,363,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,571,378,812 UART: [art] Erasing AUTHORITY.KEYID = 7
1,571,379,577 UART: [art] PUB.X = C82764FAB2DC65F5839DAEC914CEE09EFCE71F14B0E1710203A62152BCE4D298A1504DD7C894E7086FF3DCBF8C830545
1,571,386,349 UART: [art] PUB.Y = 828E5E36654ED504A2B0571271354D998256937B960CB89BB2366B300AF536CE9B5C2078C9A1D26D10A1F190C887F536
1,571,393,282 UART: [art] SIG.R = C05FD4232BDA6D7FC5074E18093DEC2C48A0CD34E7842C98705699F95240B818CBCA4C20130C94FC07C8342359A38955
1,571,400,040 UART: [art] SIG.S = 8B4889FC16003E377C9F881EE3735B8711A800F8FA6C341819932E486E0660E8105D535DF9FB6A0E58BCE768FF4D8AEA
1,571,423,906 UART: Caliptra RT
1,571,424,157 UART: [state] CFI Enabled
1,571,787,416 UART: [rt] RT listening for mailbox commands...
1,571,788,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,574,278,074 >>> mbox cmd response: success
1,574,291,803 UART:
1,574,291,819 UART: Running Caliptra FMC ...
1,574,292,227 UART:
1,574,292,281 UART: [state] CFI Enabled
1,574,381,344 UART: [art] Extend RT PCRs Done
1,574,381,772 UART: [art] Lock RT PCRs Done
1,574,382,905 UART: [art] Populate DV Done
1,574,391,158 UART: [fht] FMC Alias Private Key: 7
1,574,392,270 UART: [art] Derive CDI
1,574,392,550 UART: [art] Store in slot 0x4
1,574,478,613 UART: [art] Derive Key Pair
1,574,478,973 UART: [art] Store priv key in slot 0x5
1,574,492,917 UART: [art] Derive Key Pair - Done
1,574,507,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,574,522,526 UART: [art] Erasing AUTHORITY.KEYID = 7
1,574,523,291 UART: [art] PUB.X = 9579A5FCF639CC1E2E7C98BBC9AC91A8BD56430795BB06CDB5BE210EC45001578C2A98D887913AEF6AE9FB895150EFC6
1,574,530,065 UART: [art] PUB.Y = CCE7BBFA1BBB3086307A3478C4780082D72AD416F8E39BEBF87B086795641735BF39E4F3A6A377DC911B069F1A202231
1,574,536,991 UART: [art] SIG.R = D909696417BD9DB0B733B16B394DE7B5FDC2CD4AF23965FE943B80015F48A605841BF23598717903AB585AF3DD2A5032
1,574,543,751 UART: [art] SIG.S = E93038C1BD4662FC66D5F7F664C0BB9E126A70B95C75150401CDEB5E5D5630F0A72A0532B0AE1627592F15221DDEAA58
1,574,567,758 UART: Caliptra RT
1,574,568,009 UART: [state] CFI Enabled
1,574,930,814 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 352.33s
Truncated 1323521 bytes from beginning
a FMC ...
1,621,110,537 UART:
1,621,110,680 UART: [state] CFI Enabled
1,621,200,117 UART: [art] Extend RT PCRs Done
1,621,200,545 UART: [art] Lock RT PCRs Done
1,621,201,948 UART: [art] Populate DV Done
1,621,210,269 UART: [fht] FMC Alias Private Key: 7
1,621,211,327 UART: [art] Derive CDI
1,621,211,607 UART: [art] Store in slot 0x4
1,621,296,726 UART: [art] Derive Key Pair
1,621,297,086 UART: [art] Store priv key in slot 0x5
1,621,310,396 UART: [art] Derive Key Pair - Done
1,621,325,299 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,621,340,614 UART: [art] Erasing AUTHORITY.KEYID = 7
1,621,341,379 UART: [art] PUB.X = F60F9AFBE149B2AF4FE743031742104BA1C0320ECA612AC64AC1F74DBFC7C152062DCC36931C4E36B3D59404B4F8C6DF
1,621,348,150 UART: [art] PUB.Y = 6A1DA08346B9BCA76DD1B4FC05878190A4222A69EAEE542B44619946EED4A6CBBFEAB7CA80109B5C14FBB8AF7E296F58
1,621,355,117 UART: [art] SIG.R = 539EA94A41D0128C96C2F0158AD19F1625928FA4FB2E7A9A66BA3FBC8075A6368FB6A70D668B75DBFD8C5A7D65119A03
1,621,361,891 UART: [art] SIG.S = 91109F34FC3D3AE4D533174118D72627C8CB5E0848A1C41741E995103E18F5F22C995DE3F7DADD982FFC08CB8E5FAC45
1,621,385,961 UART: Caliptra RT
1,621,386,304 UART: [state] CFI Enabled
1,621,751,590 UART: [rt] RT listening for mailbox commands...
1,621,752,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,753,349 UART:
1,621,753,365 UART: Running Caliptra ROM ...
1,621,753,773 UART:
1,621,753,915 UART: [state] CFI Enabled
1,621,756,525 UART: [state] LifecycleState = Unprovisioned
1,621,757,180 UART: [state] DebugLocked = No
1,621,757,822 UART: [state] WD Timer not started. Device not locked for debugging
1,621,759,060 UART: [kat] SHA2-256
1,622,562,610 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,622,566,714 UART: [kat] ++
1,622,566,866 UART: [kat] sha1
1,622,571,048 UART: [kat] SHA2-256
1,622,572,988 UART: [kat] SHA2-384
1,622,575,807 UART: [kat] SHA2-512-ACC
1,622,577,707 UART: [kat] ECC-384
1,622,587,594 UART: [kat] HMAC-384Kdf
1,622,592,216 UART: [kat] LMS
1,622,840,528 UART: [kat] --
1,622,841,542 UART: [update-reset] ++
1,624,200,335 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,624,201,544 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,624,356,759 >>> mbox cmd response: success
1,624,356,936 UART: [update-reset] Copying MAN_2 To MAN_1
1,624,364,950 UART: [update-reset Success] --
1,624,365,835 UART: [state] Locking Datavault
1,624,366,503 UART: [state] Locking PCR0, PCR1 and PCR31
1,624,367,107 UART: [state] Locking ICCM
1,624,367,747 UART: [exit] Launching FMC @ 0x40000130
1,624,373,077 UART:
1,624,373,093 UART: Running Caliptra FMC ...
1,624,373,501 UART:
1,624,373,644 UART: [state] CFI Enabled
1,624,462,695 UART: [art] Extend RT PCRs Done
1,624,463,123 UART: [art] Lock RT PCRs Done
1,624,464,618 UART: [art] Populate DV Done
1,624,472,933 UART: [fht] FMC Alias Private Key: 7
1,624,474,089 UART: [art] Derive CDI
1,624,474,369 UART: [art] Store in slot 0x4
1,624,560,072 UART: [art] Derive Key Pair
1,624,560,432 UART: [art] Store priv key in slot 0x5
1,624,574,330 UART: [art] Derive Key Pair - Done
1,624,589,108 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,624,604,659 UART: [art] Erasing AUTHORITY.KEYID = 7
1,624,605,424 UART: [art] PUB.X = 0E294368F62942828BDC453AC8D645D9A44484172EA47EBFB3A511DAFA04898F8D14430AE4F1841445F9BEA4640A1888
1,624,612,182 UART: [art] PUB.Y = F444D03DA47333ACAAD65F39BF159985B1F0225BEC1CFD983537E2496393B2E093883C1770B2649B3A6E310CE3D323BD
1,624,619,133 UART: [art] SIG.R = 78E335BD7871847C970026178F85CEB6049AEEF4F8B8E74388BBB089651D0E8E96B55AF3BADC6F0C9807EAD394DA5EC9
1,624,625,881 UART: [art] SIG.S = 94935B28BD640361BECC6B037A3666A4C30F1007C3F4C584951AB3CE795C2377E1E783F34B8BA2A25DCCDA615B93B773
1,624,649,643 UART: Caliptra RT
1,624,649,986 UART: [state] CFI Enabled
1,625,017,880 UART: [rt] RT listening for mailbox commands...
1,625,018,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,625,019,747 UART:
1,625,019,763 UART: Running Caliptra ROM ...
1,625,020,171 UART:
1,625,020,313 UART: [state] CFI Enabled
1,625,022,681 UART: [state] LifecycleState = Unprovisioned
1,625,023,336 UART: [state] DebugLocked = No
1,625,023,880 UART: [state] WD Timer not started. Device not locked for debugging
1,625,025,142 UART: [kat] SHA2-256
1,625,828,692 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,625,832,796 UART: [kat] ++
1,625,832,948 UART: [kat] sha1
1,625,837,214 UART: [kat] SHA2-256
1,625,839,154 UART: [kat] SHA2-384
1,625,841,821 UART: [kat] SHA2-512-ACC
1,625,843,721 UART: [kat] ECC-384
1,625,853,606 UART: [kat] HMAC-384Kdf
1,625,858,108 UART: [kat] LMS
1,626,106,420 UART: [kat] --
1,626,107,052 UART: [update-reset] ++
1,627,465,387 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,627,466,558 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,627,621,773 >>> mbox cmd response: success
1,627,622,070 UART: [update-reset] Copying MAN_2 To MAN_1
1,627,630,084 UART: [update-reset Success] --
1,627,631,159 UART: [state] Locking Datavault
1,627,631,755 UART: [state] Locking PCR0, PCR1 and PCR31
1,627,632,359 UART: [state] Locking ICCM
1,627,632,875 UART: [exit] Launching FMC @ 0x40000130
1,627,638,205 UART:
1,627,638,221 UART: Running Caliptra FMC ...
1,627,638,629 UART:
1,627,638,772 UART: [state] CFI Enabled
1,627,727,651 UART: [art] Extend RT PCRs Done
1,627,728,079 UART: [art] Lock RT PCRs Done
1,627,729,350 UART: [art] Populate DV Done
1,627,737,345 UART: [fht] FMC Alias Private Key: 7
1,627,738,383 UART: [art] Derive CDI
1,627,738,663 UART: [art] Store in slot 0x4
1,627,824,296 UART: [art] Derive Key Pair
1,627,824,656 UART: [art] Store priv key in slot 0x5
1,627,838,126 UART: [art] Derive Key Pair - Done
1,627,853,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,627,868,676 UART: [art] Erasing AUTHORITY.KEYID = 7
1,627,869,441 UART: [art] PUB.X = F60F9AFBE149B2AF4FE743031742104BA1C0320ECA612AC64AC1F74DBFC7C152062DCC36931C4E36B3D59404B4F8C6DF
1,627,876,212 UART: [art] PUB.Y = 6A1DA08346B9BCA76DD1B4FC05878190A4222A69EAEE542B44619946EED4A6CBBFEAB7CA80109B5C14FBB8AF7E296F58
1,627,883,179 UART: [art] SIG.R = 539EA94A41D0128C96C2F0158AD19F1625928FA4FB2E7A9A66BA3FBC8075A6368FB6A70D668B75DBFD8C5A7D65119A03
1,627,889,953 UART: [art] SIG.S = 91109F34FC3D3AE4D533174118D72627C8CB5E0848A1C41741E995103E18F5F22C995DE3F7DADD982FFC08CB8E5FAC45
1,627,913,847 UART: Caliptra RT
1,627,914,190 UART: [state] CFI Enabled
1,628,278,836 UART: [rt] RT listening for mailbox commands...
1,628,279,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,628,280,445 UART:
1,628,280,461 UART: Running Caliptra ROM ...
1,628,280,869 UART:
1,628,281,011 UART: [state] CFI Enabled
1,628,284,111 UART: [state] LifecycleState = Unprovisioned
1,628,284,766 UART: [state] DebugLocked = No
1,628,285,268 UART: [state] WD Timer not started. Device not locked for debugging
1,628,286,448 UART: [kat] SHA2-256
1,629,089,998 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,629,094,102 UART: [kat] ++
1,629,094,254 UART: [kat] sha1
1,629,098,322 UART: [kat] SHA2-256
1,629,100,262 UART: [kat] SHA2-384
1,629,102,949 UART: [kat] SHA2-512-ACC
1,629,104,849 UART: [kat] ECC-384
1,629,114,676 UART: [kat] HMAC-384Kdf
1,629,119,214 UART: [kat] LMS
1,629,367,526 UART: [kat] --
1,629,368,520 UART: [update-reset] ++
1,630,729,003 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,630,730,076 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,630,885,291 >>> mbox cmd response: success
1,630,885,640 UART: [update-reset] Copying MAN_2 To MAN_1
1,630,893,654 UART: [update-reset Success] --
1,630,894,613 UART: [state] Locking Datavault
1,630,895,231 UART: [state] Locking PCR0, PCR1 and PCR31
1,630,895,835 UART: [state] Locking ICCM
1,630,896,419 UART: [exit] Launching FMC @ 0x40000130
1,630,901,749 UART:
1,630,901,765 UART: Running Caliptra FMC ...
1,630,902,173 UART:
1,630,902,316 UART: [state] CFI Enabled
1,630,991,117 UART: [art] Extend RT PCRs Done
1,630,991,545 UART: [art] Lock RT PCRs Done
1,630,992,644 UART: [art] Populate DV Done
1,631,001,023 UART: [fht] FMC Alias Private Key: 7
1,631,002,077 UART: [art] Derive CDI
1,631,002,357 UART: [art] Store in slot 0x4
1,631,088,238 UART: [art] Derive Key Pair
1,631,088,598 UART: [art] Store priv key in slot 0x5
1,631,102,190 UART: [art] Derive Key Pair - Done
1,631,116,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,631,131,819 UART: [art] Erasing AUTHORITY.KEYID = 7
1,631,132,584 UART: [art] PUB.X = 0E294368F62942828BDC453AC8D645D9A44484172EA47EBFB3A511DAFA04898F8D14430AE4F1841445F9BEA4640A1888
1,631,139,342 UART: [art] PUB.Y = F444D03DA47333ACAAD65F39BF159985B1F0225BEC1CFD983537E2496393B2E093883C1770B2649B3A6E310CE3D323BD
1,631,146,293 UART: [art] SIG.R = 78E335BD7871847C970026178F85CEB6049AEEF4F8B8E74388BBB089651D0E8E96B55AF3BADC6F0C9807EAD394DA5EC9
1,631,153,041 UART: [art] SIG.S = 94935B28BD640361BECC6B037A3666A4C30F1007C3F4C584951AB3CE795C2377E1E783F34B8BA2A25DCCDA615B93B773
1,631,176,685 UART: Caliptra RT
1,631,177,028 UART: [state] CFI Enabled
1,631,541,710 UART: [rt] RT listening for mailbox commands...
1,631,542,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,631,543,285 UART:
1,631,543,301 UART: Running Caliptra ROM ...
1,631,543,709 UART:
1,631,543,851 UART: [state] CFI Enabled
1,631,546,481 UART: [state] LifecycleState = Unprovisioned
1,631,547,136 UART: [state] DebugLocked = No
1,631,547,728 UART: [state] WD Timer not started. Device not locked for debugging
1,631,549,052 UART: [kat] SHA2-256
1,632,352,602 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,632,356,706 UART: [kat] ++
1,632,356,858 UART: [kat] sha1
1,632,361,068 UART: [kat] SHA2-256
1,632,363,008 UART: [kat] SHA2-384
1,632,365,801 UART: [kat] SHA2-512-ACC
1,632,367,701 UART: [kat] ECC-384
1,632,377,544 UART: [kat] HMAC-384Kdf
1,632,382,282 UART: [kat] LMS
1,632,630,594 UART: [kat] --
1,632,631,430 UART: [update-reset] ++
1,633,991,653 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,633,992,660 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,634,147,875 >>> mbox cmd response: success
1,634,148,046 UART: [update-reset] Copying MAN_2 To MAN_1
1,634,156,060 UART: [update-reset Success] --
1,634,156,925 UART: [state] Locking Datavault
1,634,157,613 UART: [state] Locking PCR0, PCR1 and PCR31
1,634,158,217 UART: [state] Locking ICCM
1,634,158,841 UART: [exit] Launching FMC @ 0x40000130
1,634,164,171 UART:
1,634,164,187 UART: Running Caliptra FMC ...
1,634,164,595 UART:
1,634,164,738 UART: [state] CFI Enabled
1,634,254,533 UART: [art] Extend RT PCRs Done
1,634,254,961 UART: [art] Lock RT PCRs Done
1,634,256,252 UART: [art] Populate DV Done
1,634,264,131 UART: [fht] FMC Alias Private Key: 7
1,634,265,249 UART: [art] Derive CDI
1,634,265,529 UART: [art] Store in slot 0x4
1,634,351,316 UART: [art] Derive Key Pair
1,634,351,676 UART: [art] Store priv key in slot 0x5
1,634,364,816 UART: [art] Derive Key Pair - Done
1,634,379,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,634,395,078 UART: [art] Erasing AUTHORITY.KEYID = 7
1,634,395,843 UART: [art] PUB.X = F60F9AFBE149B2AF4FE743031742104BA1C0320ECA612AC64AC1F74DBFC7C152062DCC36931C4E36B3D59404B4F8C6DF
1,634,402,614 UART: [art] PUB.Y = 6A1DA08346B9BCA76DD1B4FC05878190A4222A69EAEE542B44619946EED4A6CBBFEAB7CA80109B5C14FBB8AF7E296F58
1,634,409,581 UART: [art] SIG.R = 539EA94A41D0128C96C2F0158AD19F1625928FA4FB2E7A9A66BA3FBC8075A6368FB6A70D668B75DBFD8C5A7D65119A03
1,634,416,355 UART: [art] SIG.S = 91109F34FC3D3AE4D533174118D72627C8CB5E0848A1C41741E995103E18F5F22C995DE3F7DADD982FFC08CB8E5FAC45
1,634,440,455 UART: Caliptra RT
1,634,440,798 UART: [state] CFI Enabled
1,634,801,146 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 354.93s
Truncated 716652 bytes from beginning
7DBEB8C5A4
1,549,823,709 UART: [art] SIG.S = 46FC1F66F2C951E7FD36B702DE8F8D185B6483DAAA95E80C7725698EFA9E959FCB56F74FB913DD77C800C9E831335FD7
1,549,847,689 UART: Caliptra RT
1,549,848,032 UART: [state] CFI Enabled
1,550,213,600 UART: [rt] RT listening for mailbox commands...
1,550,214,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,552,703,257 >>> mbox cmd response: success
1,552,716,544 UART:
1,552,716,560 UART: Running Caliptra FMC ...
1,552,716,968 UART:
1,552,717,111 UART: [state] CFI Enabled
1,552,806,228 UART: [art] Extend RT PCRs Done
1,552,806,656 UART: [art] Lock RT PCRs Done
1,552,807,967 UART: [art] Populate DV Done
1,552,816,180 UART: [fht] FMC Alias Private Key: 7
1,552,817,282 UART: [art] Derive CDI
1,552,817,562 UART: [art] Store in slot 0x4
1,552,903,287 UART: [art] Derive Key Pair
1,552,903,647 UART: [art] Store priv key in slot 0x5
1,552,916,915 UART: [art] Derive Key Pair - Done
1,552,931,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,552,947,514 UART: [art] Erasing AUTHORITY.KEYID = 7
1,552,948,279 UART: [art] PUB.X = D8F2138A7C6930EB9A3DA909C7D14A006366013D0E4D704AF4B8E830C43ECA9066B58AB73883065F5F479B7F17E7AE6E
1,552,955,021 UART: [art] PUB.Y = 757E78F5BA344DBB81E5A40C6A8FCE29A03E40E0B5849ABEED32EB8FD8C851B6D7EAC3AB4BB69A58361F81BD9882AA4E
1,552,961,994 UART: [art] SIG.R = F6334CBAC9669CA73F25244591B74BC0DFF5B2007B7B8AB2A5A32735231ECF09593046E33EDBD77A558A46588EF3898E
1,552,968,745 UART: [art] SIG.S = D4AD88B1542BCEDA2A5EDE5DAE3F59AA3C489006A677FC26A2085B8117C5367786ECB24790A3001B9E340C3150285B4D
1,552,992,406 UART: Caliptra RT
1,552,992,749 UART: [state] CFI Enabled
1,553,357,998 UART: [rt] RT listening for mailbox commands...
1,553,358,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,555,847,885 >>> mbox cmd response: success
1,555,861,474 UART:
1,555,861,490 UART: Running Caliptra FMC ...
1,555,861,898 UART:
1,555,862,041 UART: [state] CFI Enabled
1,555,951,100 UART: [art] Extend RT PCRs Done
1,555,951,528 UART: [art] Lock RT PCRs Done
1,555,952,953 UART: [art] Populate DV Done
1,555,961,142 UART: [fht] FMC Alias Private Key: 7
1,555,962,302 UART: [art] Derive CDI
1,555,962,582 UART: [art] Store in slot 0x4
1,556,048,279 UART: [art] Derive Key Pair
1,556,048,639 UART: [art] Store priv key in slot 0x5
1,556,061,419 UART: [art] Derive Key Pair - Done
1,556,076,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,556,091,852 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,092,617 UART: [art] PUB.X = 68693B36AB580AEE0F0B6E55986A343E1DDCC5E663939F394DFCA8664F2CBE94E10C5836754B74DFDBE13B2404E01BEB
1,556,099,386 UART: [art] PUB.Y = 44A6B7A14696043333A23E4D8B8B34C6B65FDA0047FCFC9BD92A7F5F6428500AB5C8756581841D445046D76AEBA99446
1,556,106,308 UART: [art] SIG.R = B7040F35DA53753AE3DA531F11D00B69748498C3D5B1C99BF86DC83C701AF672CF8B6D6D4EB92D0BC1D3597DBEB8C5A4
1,556,113,082 UART: [art] SIG.S = 46FC1F66F2C951E7FD36B702DE8F8D185B6483DAAA95E80C7725698EFA9E959FCB56F74FB913DD77C800C9E831335FD7
1,556,136,136 UART: Caliptra RT
1,556,136,479 UART: [state] CFI Enabled
1,556,499,497 UART: [rt] RT listening for mailbox commands...
1,556,500,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,558,989,516 >>> mbox cmd response: success
1,559,002,667 UART:
1,559,002,683 UART: Running Caliptra FMC ...
1,559,003,091 UART:
1,559,003,234 UART: [state] CFI Enabled
1,559,092,291 UART: [art] Extend RT PCRs Done
1,559,092,719 UART: [art] Lock RT PCRs Done
1,559,094,054 UART: [art] Populate DV Done
1,559,102,417 UART: [fht] FMC Alias Private Key: 7
1,559,103,593 UART: [art] Derive CDI
1,559,103,873 UART: [art] Store in slot 0x4
1,559,189,494 UART: [art] Derive Key Pair
1,559,189,854 UART: [art] Store priv key in slot 0x5
1,559,203,308 UART: [art] Derive Key Pair - Done
1,559,218,366 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,559,233,531 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,234,296 UART: [art] PUB.X = D8F2138A7C6930EB9A3DA909C7D14A006366013D0E4D704AF4B8E830C43ECA9066B58AB73883065F5F479B7F17E7AE6E
1,559,241,038 UART: [art] PUB.Y = 757E78F5BA344DBB81E5A40C6A8FCE29A03E40E0B5849ABEED32EB8FD8C851B6D7EAC3AB4BB69A58361F81BD9882AA4E
1,559,248,011 UART: [art] SIG.R = F6334CBAC9669CA73F25244591B74BC0DFF5B2007B7B8AB2A5A32735231ECF09593046E33EDBD77A558A46588EF3898E
1,559,254,762 UART: [art] SIG.S = D4AD88B1542BCEDA2A5EDE5DAE3F59AA3C489006A677FC26A2085B8117C5367786ECB24790A3001B9E340C3150285B4D
1,559,278,147 UART: Caliptra RT
1,559,278,490 UART: [state] CFI Enabled
1,559,648,145 UART: [rt] RT listening for mailbox commands...
1,559,648,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,562,139,222 >>> mbox cmd response: success
1,562,152,525 UART:
1,562,152,541 UART: Running Caliptra FMC ...
1,562,152,949 UART:
1,562,153,092 UART: [state] CFI Enabled
1,562,242,451 UART: [art] Extend RT PCRs Done
1,562,242,879 UART: [art] Lock RT PCRs Done
1,562,243,994 UART: [art] Populate DV Done
1,562,252,033 UART: [fht] FMC Alias Private Key: 7
1,562,253,025 UART: [art] Derive CDI
1,562,253,305 UART: [art] Store in slot 0x4
1,562,339,144 UART: [art] Derive Key Pair
1,562,339,504 UART: [art] Store priv key in slot 0x5
1,562,353,278 UART: [art] Derive Key Pair - Done
1,562,368,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,562,383,411 UART: [art] Erasing AUTHORITY.KEYID = 7
1,562,384,176 UART: [art] PUB.X = 68693B36AB580AEE0F0B6E55986A343E1DDCC5E663939F394DFCA8664F2CBE94E10C5836754B74DFDBE13B2404E01BEB
1,562,390,945 UART: [art] PUB.Y = 44A6B7A14696043333A23E4D8B8B34C6B65FDA0047FCFC9BD92A7F5F6428500AB5C8756581841D445046D76AEBA99446
1,562,397,867 UART: [art] SIG.R = B7040F35DA53753AE3DA531F11D00B69748498C3D5B1C99BF86DC83C701AF672CF8B6D6D4EB92D0BC1D3597DBEB8C5A4
1,562,404,641 UART: [art] SIG.S = 46FC1F66F2C951E7FD36B702DE8F8D185B6483DAAA95E80C7725698EFA9E959FCB56F74FB913DD77C800C9E831335FD7
1,562,428,329 UART: Caliptra RT
1,562,428,672 UART: [state] CFI Enabled
1,562,790,500 UART: [rt] RT listening for mailbox commands...
1,562,791,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,565,279,891 >>> mbox cmd response: success
1,565,293,352 UART:
1,565,293,368 UART: Running Caliptra FMC ...
1,565,293,776 UART:
1,565,293,919 UART: [state] CFI Enabled
1,565,382,820 UART: [art] Extend RT PCRs Done
1,565,383,248 UART: [art] Lock RT PCRs Done
1,565,384,473 UART: [art] Populate DV Done
1,565,392,672 UART: [fht] FMC Alias Private Key: 7
1,565,393,812 UART: [art] Derive CDI
1,565,394,092 UART: [art] Store in slot 0x4
1,565,480,089 UART: [art] Derive Key Pair
1,565,480,449 UART: [art] Store priv key in slot 0x5
1,565,493,527 UART: [art] Derive Key Pair - Done
1,565,508,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,565,523,804 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,524,569 UART: [art] PUB.X = D8F2138A7C6930EB9A3DA909C7D14A006366013D0E4D704AF4B8E830C43ECA9066B58AB73883065F5F479B7F17E7AE6E
1,565,531,311 UART: [art] PUB.Y = 757E78F5BA344DBB81E5A40C6A8FCE29A03E40E0B5849ABEED32EB8FD8C851B6D7EAC3AB4BB69A58361F81BD9882AA4E
1,565,538,284 UART: [art] SIG.R = F6334CBAC9669CA73F25244591B74BC0DFF5B2007B7B8AB2A5A32735231ECF09593046E33EDBD77A558A46588EF3898E
1,565,545,035 UART: [art] SIG.S = D4AD88B1542BCEDA2A5EDE5DAE3F59AA3C489006A677FC26A2085B8117C5367786ECB24790A3001B9E340C3150285B4D
1,565,569,178 UART: Caliptra RT
1,565,569,521 UART: [state] CFI Enabled
1,565,932,706 UART: [rt] RT listening for mailbox commands...
1,565,933,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,568,423,051 >>> mbox cmd response: success
1,568,436,386 UART:
1,568,436,402 UART: Running Caliptra FMC ...
1,568,436,810 UART:
1,568,436,953 UART: [state] CFI Enabled
1,568,525,968 UART: [art] Extend RT PCRs Done
1,568,526,396 UART: [art] Lock RT PCRs Done
1,568,527,529 UART: [art] Populate DV Done
1,568,535,698 UART: [fht] FMC Alias Private Key: 7
1,568,536,828 UART: [art] Derive CDI
1,568,537,108 UART: [art] Store in slot 0x4
1,568,622,831 UART: [art] Derive Key Pair
1,568,623,191 UART: [art] Store priv key in slot 0x5
1,568,636,053 UART: [art] Derive Key Pair - Done
1,568,650,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,568,665,924 UART: [art] Erasing AUTHORITY.KEYID = 7
1,568,666,689 UART: [art] PUB.X = 68693B36AB580AEE0F0B6E55986A343E1DDCC5E663939F394DFCA8664F2CBE94E10C5836754B74DFDBE13B2404E01BEB
1,568,673,458 UART: [art] PUB.Y = 44A6B7A14696043333A23E4D8B8B34C6B65FDA0047FCFC9BD92A7F5F6428500AB5C8756581841D445046D76AEBA99446
1,568,680,380 UART: [art] SIG.R = B7040F35DA53753AE3DA531F11D00B69748498C3D5B1C99BF86DC83C701AF672CF8B6D6D4EB92D0BC1D3597DBEB8C5A4
1,568,687,154 UART: [art] SIG.S = 46FC1F66F2C951E7FD36B702DE8F8D185B6483DAAA95E80C7725698EFA9E959FCB56F74FB913DD77C800C9E831335FD7
1,568,710,288 UART: Caliptra RT
1,568,710,631 UART: [state] CFI Enabled
1,569,080,867 UART: [rt] RT listening for mailbox commands...
1,569,081,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,571,570,802 >>> mbox cmd response: success
1,571,584,555 UART:
1,571,584,571 UART: Running Caliptra FMC ...
1,571,584,979 UART:
1,571,585,122 UART: [state] CFI Enabled
1,571,674,677 UART: [art] Extend RT PCRs Done
1,571,675,105 UART: [art] Lock RT PCRs Done
1,571,676,082 UART: [art] Populate DV Done
1,571,684,097 UART: [fht] FMC Alias Private Key: 7
1,571,685,167 UART: [art] Derive CDI
1,571,685,447 UART: [art] Store in slot 0x4
1,571,771,580 UART: [art] Derive Key Pair
1,571,771,940 UART: [art] Store priv key in slot 0x5
1,571,785,144 UART: [art] Derive Key Pair - Done
1,571,799,838 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,571,815,503 UART: [art] Erasing AUTHORITY.KEYID = 7
1,571,816,268 UART: [art] PUB.X = D8F2138A7C6930EB9A3DA909C7D14A006366013D0E4D704AF4B8E830C43ECA9066B58AB73883065F5F479B7F17E7AE6E
1,571,823,010 UART: [art] PUB.Y = 757E78F5BA344DBB81E5A40C6A8FCE29A03E40E0B5849ABEED32EB8FD8C851B6D7EAC3AB4BB69A58361F81BD9882AA4E
1,571,829,983 UART: [art] SIG.R = F6334CBAC9669CA73F25244591B74BC0DFF5B2007B7B8AB2A5A32735231ECF09593046E33EDBD77A558A46588EF3898E
1,571,836,734 UART: [art] SIG.S = D4AD88B1542BCEDA2A5EDE5DAE3F59AA3C489006A677FC26A2085B8117C5367786ECB24790A3001B9E340C3150285B4D
1,571,860,435 UART: Caliptra RT
1,571,860,778 UART: [state] CFI Enabled
1,572,228,431 UART: [rt] RT listening for mailbox commands...
1,572,229,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,574,718,680 >>> mbox cmd response: success
1,574,732,415 UART:
1,574,732,431 UART: Running Caliptra FMC ...
1,574,732,839 UART:
1,574,732,982 UART: [state] CFI Enabled
1,574,822,569 UART: [art] Extend RT PCRs Done
1,574,822,997 UART: [art] Lock RT PCRs Done
1,574,824,098 UART: [art] Populate DV Done
1,574,832,595 UART: [fht] FMC Alias Private Key: 7
1,574,833,771 UART: [art] Derive CDI
1,574,834,051 UART: [art] Store in slot 0x4
1,574,919,732 UART: [art] Derive Key Pair
1,574,920,092 UART: [art] Store priv key in slot 0x5
1,574,932,776 UART: [art] Derive Key Pair - Done
1,574,947,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,574,962,965 UART: [art] Erasing AUTHORITY.KEYID = 7
1,574,963,730 UART: [art] PUB.X = 68693B36AB580AEE0F0B6E55986A343E1DDCC5E663939F394DFCA8664F2CBE94E10C5836754B74DFDBE13B2404E01BEB
1,574,970,499 UART: [art] PUB.Y = 44A6B7A14696043333A23E4D8B8B34C6B65FDA0047FCFC9BD92A7F5F6428500AB5C8756581841D445046D76AEBA99446
1,574,977,421 UART: [art] SIG.R = B7040F35DA53753AE3DA531F11D00B69748498C3D5B1C99BF86DC83C701AF672CF8B6D6D4EB92D0BC1D3597DBEB8C5A4
1,574,984,195 UART: [art] SIG.S = 46FC1F66F2C951E7FD36B702DE8F8D185B6483DAAA95E80C7725698EFA9E959FCB56F74FB913DD77C800C9E831335FD7
1,575,007,877 UART: Caliptra RT
1,575,008,220 UART: [state] CFI Enabled
1,575,375,012 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 349.47s
Truncated 1323523 bytes from beginning
a FMC ...
1,621,764,948 UART:
1,621,765,002 UART: [state] CFI Enabled
1,621,854,435 UART: [art] Extend RT PCRs Done
1,621,854,863 UART: [art] Lock RT PCRs Done
1,621,855,766 UART: [art] Populate DV Done
1,621,863,979 UART: [fht] FMC Alias Private Key: 7
1,621,865,067 UART: [art] Derive CDI
1,621,865,347 UART: [art] Store in slot 0x4
1,621,950,952 UART: [art] Derive Key Pair
1,621,951,312 UART: [art] Store priv key in slot 0x5
1,621,964,262 UART: [art] Derive Key Pair - Done
1,621,979,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,621,994,609 UART: [art] Erasing AUTHORITY.KEYID = 7
1,621,995,374 UART: [art] PUB.X = BF6E48691CF64A1F5A95C21BE8445527CBCD8DFB92614D295A7E7EB66D58615755B6DE55B6D0FA541CE89D98B219E5D8
1,622,002,156 UART: [art] PUB.Y = 631EBBC6FE843BD25201EE8D48B69B97AD97900C837AB0D575514A3299896769CAD0AED795FA02D2FA9B9BA10D1A7F66
1,622,009,106 UART: [art] SIG.R = 59BA130C770C41E7B079676A0063007D79E3B4604A1FC4CF16B801A46CE89CE290C59DD90035805BB6E4854F4453ACBF
1,622,015,803 UART: [art] SIG.S = C7C9ABADA6F75165A308ED614D0BFEAA2C47AA940C79A2E4BB954F8DF756F71CED333EDA79C4538A58ACB6EA6A940028
1,622,040,166 UART: Caliptra RT
1,622,040,417 UART: [state] CFI Enabled
1,622,404,441 UART: [rt] RT listening for mailbox commands...
1,622,405,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,405,900 UART:
1,622,405,916 UART: Running Caliptra ROM ...
1,622,406,324 UART:
1,622,406,379 UART: [state] CFI Enabled
1,622,409,231 UART: [state] LifecycleState = Unprovisioned
1,622,409,886 UART: [state] DebugLocked = No
1,622,410,528 UART: [state] WD Timer not started. Device not locked for debugging
1,622,411,770 UART: [kat] SHA2-256
1,623,217,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,623,221,545 UART: [kat] ++
1,623,221,697 UART: [kat] sha1
1,623,225,949 UART: [kat] SHA2-256
1,623,227,889 UART: [kat] SHA2-384
1,623,230,414 UART: [kat] SHA2-512-ACC
1,623,232,314 UART: [kat] ECC-384
1,623,242,035 UART: [kat] HMAC-384Kdf
1,623,246,691 UART: [kat] LMS
1,623,495,019 UART: [kat] --
1,623,495,811 UART: [update-reset] ++
1,624,853,861 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,624,854,946 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,625,010,161 >>> mbox cmd response: success
1,625,010,400 UART: [update-reset] Copying MAN_2 To MAN_1
1,625,018,414 UART: [update-reset Success] --
1,625,019,311 UART: [state] Locking Datavault
1,625,020,191 UART: [state] Locking PCR0, PCR1 and PCR31
1,625,020,795 UART: [state] Locking ICCM
1,625,021,389 UART: [exit] Launching FMC @ 0x40000130
1,625,026,719 UART:
1,625,026,735 UART: Running Caliptra FMC ...
1,625,027,143 UART:
1,625,027,197 UART: [state] CFI Enabled
1,625,116,216 UART: [art] Extend RT PCRs Done
1,625,116,644 UART: [art] Lock RT PCRs Done
1,625,117,925 UART: [art] Populate DV Done
1,625,126,272 UART: [fht] FMC Alias Private Key: 7
1,625,127,246 UART: [art] Derive CDI
1,625,127,526 UART: [art] Store in slot 0x4
1,625,213,341 UART: [art] Derive Key Pair
1,625,213,701 UART: [art] Store priv key in slot 0x5
1,625,226,697 UART: [art] Derive Key Pair - Done
1,625,241,731 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,625,257,166 UART: [art] Erasing AUTHORITY.KEYID = 7
1,625,257,931 UART: [art] PUB.X = 4463AA13CDAB7E4A84AB3D5E46951BB2EEED2603989DA7926E12C5D2E69039D3329B658EEEFB5FC5641A0E7617C34392
1,625,264,705 UART: [art] PUB.Y = B666B9893B18F95315D035C6CA68BB01F71B7B9B2DE227BA7FB97BFB3D544F7A05059B79C80CB5E51508C6C11C6980BF
1,625,271,650 UART: [art] SIG.R = 5FC1DA500A94220E64DB12662AA4031F634E9B36171449DD8F527F1617C25C55B6AD9868E8C962B9A068A48DDBA7C4BF
1,625,278,417 UART: [art] SIG.S = 325C6C20ACF9DAF2D3A4BF59509FDFC01FD3034A89AAD81CF6E07F031CC5BDA45EB27C7994BA3CDE725550B4D9BAAF01
1,625,302,456 UART: Caliptra RT
1,625,302,707 UART: [state] CFI Enabled
1,625,664,390 UART: [rt] RT listening for mailbox commands...
1,625,665,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,625,665,785 UART:
1,625,665,801 UART: Running Caliptra ROM ...
1,625,666,209 UART:
1,625,666,264 UART: [state] CFI Enabled
1,625,669,324 UART: [state] LifecycleState = Unprovisioned
1,625,669,979 UART: [state] DebugLocked = No
1,625,670,635 UART: [state] WD Timer not started. Device not locked for debugging
1,625,671,857 UART: [kat] SHA2-256
1,626,477,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,626,481,632 UART: [kat] ++
1,626,481,784 UART: [kat] sha1
1,626,486,170 UART: [kat] SHA2-256
1,626,488,110 UART: [kat] SHA2-384
1,626,490,803 UART: [kat] SHA2-512-ACC
1,626,492,703 UART: [kat] ECC-384
1,626,502,600 UART: [kat] HMAC-384Kdf
1,626,507,302 UART: [kat] LMS
1,626,755,630 UART: [kat] --
1,626,756,534 UART: [update-reset] ++
1,628,116,890 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,628,117,983 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,628,273,198 >>> mbox cmd response: success
1,628,273,411 UART: [update-reset] Copying MAN_2 To MAN_1
1,628,281,425 UART: [update-reset Success] --
1,628,282,462 UART: [state] Locking Datavault
1,628,283,288 UART: [state] Locking PCR0, PCR1 and PCR31
1,628,283,892 UART: [state] Locking ICCM
1,628,284,394 UART: [exit] Launching FMC @ 0x40000130
1,628,289,724 UART:
1,628,289,740 UART: Running Caliptra FMC ...
1,628,290,148 UART:
1,628,290,202 UART: [state] CFI Enabled
1,628,379,505 UART: [art] Extend RT PCRs Done
1,628,379,933 UART: [art] Lock RT PCRs Done
1,628,381,012 UART: [art] Populate DV Done
1,628,389,317 UART: [fht] FMC Alias Private Key: 7
1,628,390,253 UART: [art] Derive CDI
1,628,390,533 UART: [art] Store in slot 0x4
1,628,476,240 UART: [art] Derive Key Pair
1,628,476,600 UART: [art] Store priv key in slot 0x5
1,628,490,354 UART: [art] Derive Key Pair - Done
1,628,504,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,628,520,427 UART: [art] Erasing AUTHORITY.KEYID = 7
1,628,521,192 UART: [art] PUB.X = BF6E48691CF64A1F5A95C21BE8445527CBCD8DFB92614D295A7E7EB66D58615755B6DE55B6D0FA541CE89D98B219E5D8
1,628,527,974 UART: [art] PUB.Y = 631EBBC6FE843BD25201EE8D48B69B97AD97900C837AB0D575514A3299896769CAD0AED795FA02D2FA9B9BA10D1A7F66
1,628,534,924 UART: [art] SIG.R = 59BA130C770C41E7B079676A0063007D79E3B4604A1FC4CF16B801A46CE89CE290C59DD90035805BB6E4854F4453ACBF
1,628,541,621 UART: [art] SIG.S = C7C9ABADA6F75165A308ED614D0BFEAA2C47AA940C79A2E4BB954F8DF756F71CED333EDA79C4538A58ACB6EA6A940028
1,628,565,026 UART: Caliptra RT
1,628,565,277 UART: [state] CFI Enabled
1,628,927,619 UART: [rt] RT listening for mailbox commands...
1,628,928,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,628,929,294 UART:
1,628,929,310 UART: Running Caliptra ROM ...
1,628,929,718 UART:
1,628,929,773 UART: [state] CFI Enabled
1,628,932,519 UART: [state] LifecycleState = Unprovisioned
1,628,933,174 UART: [state] DebugLocked = No
1,628,933,864 UART: [state] WD Timer not started. Device not locked for debugging
1,628,935,048 UART: [kat] SHA2-256
1,629,740,698 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,629,744,823 UART: [kat] ++
1,629,744,975 UART: [kat] sha1
1,629,749,109 UART: [kat] SHA2-256
1,629,751,049 UART: [kat] SHA2-384
1,629,753,734 UART: [kat] SHA2-512-ACC
1,629,755,634 UART: [kat] ECC-384
1,629,765,529 UART: [kat] HMAC-384Kdf
1,629,770,173 UART: [kat] LMS
1,630,018,501 UART: [kat] --
1,630,019,535 UART: [update-reset] ++
1,631,379,387 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,631,380,572 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,631,535,787 >>> mbox cmd response: success
1,631,535,964 UART: [update-reset] Copying MAN_2 To MAN_1
1,631,543,978 UART: [update-reset Success] --
1,631,545,107 UART: [state] Locking Datavault
1,631,545,975 UART: [state] Locking PCR0, PCR1 and PCR31
1,631,546,579 UART: [state] Locking ICCM
1,631,547,055 UART: [exit] Launching FMC @ 0x40000130
1,631,552,385 UART:
1,631,552,401 UART: Running Caliptra FMC ...
1,631,552,809 UART:
1,631,552,863 UART: [state] CFI Enabled
1,631,641,934 UART: [art] Extend RT PCRs Done
1,631,642,362 UART: [art] Lock RT PCRs Done
1,631,643,507 UART: [art] Populate DV Done
1,631,651,752 UART: [fht] FMC Alias Private Key: 7
1,631,652,932 UART: [art] Derive CDI
1,631,653,212 UART: [art] Store in slot 0x4
1,631,738,555 UART: [art] Derive Key Pair
1,631,738,915 UART: [art] Store priv key in slot 0x5
1,631,751,589 UART: [art] Derive Key Pair - Done
1,631,766,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,631,782,080 UART: [art] Erasing AUTHORITY.KEYID = 7
1,631,782,845 UART: [art] PUB.X = 4463AA13CDAB7E4A84AB3D5E46951BB2EEED2603989DA7926E12C5D2E69039D3329B658EEEFB5FC5641A0E7617C34392
1,631,789,619 UART: [art] PUB.Y = B666B9893B18F95315D035C6CA68BB01F71B7B9B2DE227BA7FB97BFB3D544F7A05059B79C80CB5E51508C6C11C6980BF
1,631,796,564 UART: [art] SIG.R = 5FC1DA500A94220E64DB12662AA4031F634E9B36171449DD8F527F1617C25C55B6AD9868E8C962B9A068A48DDBA7C4BF
1,631,803,331 UART: [art] SIG.S = 325C6C20ACF9DAF2D3A4BF59509FDFC01FD3034A89AAD81CF6E07F031CC5BDA45EB27C7994BA3CDE725550B4D9BAAF01
1,631,826,912 UART: Caliptra RT
1,631,827,163 UART: [state] CFI Enabled
1,632,192,646 UART: [rt] RT listening for mailbox commands...
1,632,193,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,632,194,335 UART:
1,632,194,351 UART: Running Caliptra ROM ...
1,632,194,759 UART:
1,632,194,814 UART: [state] CFI Enabled
1,632,197,508 UART: [state] LifecycleState = Unprovisioned
1,632,198,163 UART: [state] DebugLocked = No
1,632,198,835 UART: [state] WD Timer not started. Device not locked for debugging
1,632,200,013 UART: [kat] SHA2-256
1,633,005,663 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,633,009,788 UART: [kat] ++
1,633,009,940 UART: [kat] sha1
1,633,014,132 UART: [kat] SHA2-256
1,633,016,072 UART: [kat] SHA2-384
1,633,018,817 UART: [kat] SHA2-512-ACC
1,633,020,717 UART: [kat] ECC-384
1,633,030,280 UART: [kat] HMAC-384Kdf
1,633,034,950 UART: [kat] LMS
1,633,283,278 UART: [kat] --
1,633,284,172 UART: [update-reset] ++
1,634,643,998 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,634,645,061 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,634,800,276 >>> mbox cmd response: success
1,634,800,429 UART: [update-reset] Copying MAN_2 To MAN_1
1,634,808,443 UART: [update-reset Success] --
1,634,809,212 UART: [state] Locking Datavault
1,634,809,998 UART: [state] Locking PCR0, PCR1 and PCR31
1,634,810,602 UART: [state] Locking ICCM
1,634,811,028 UART: [exit] Launching FMC @ 0x40000130
1,634,816,358 UART:
1,634,816,374 UART: Running Caliptra FMC ...
1,634,816,782 UART:
1,634,816,836 UART: [state] CFI Enabled
1,634,906,119 UART: [art] Extend RT PCRs Done
1,634,906,547 UART: [art] Lock RT PCRs Done
1,634,907,774 UART: [art] Populate DV Done
1,634,915,835 UART: [fht] FMC Alias Private Key: 7
1,634,916,877 UART: [art] Derive CDI
1,634,917,157 UART: [art] Store in slot 0x4
1,635,003,352 UART: [art] Derive Key Pair
1,635,003,712 UART: [art] Store priv key in slot 0x5
1,635,017,680 UART: [art] Derive Key Pair - Done
1,635,032,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,635,047,631 UART: [art] Erasing AUTHORITY.KEYID = 7
1,635,048,396 UART: [art] PUB.X = BF6E48691CF64A1F5A95C21BE8445527CBCD8DFB92614D295A7E7EB66D58615755B6DE55B6D0FA541CE89D98B219E5D8
1,635,055,178 UART: [art] PUB.Y = 631EBBC6FE843BD25201EE8D48B69B97AD97900C837AB0D575514A3299896769CAD0AED795FA02D2FA9B9BA10D1A7F66
1,635,062,128 UART: [art] SIG.R = 59BA130C770C41E7B079676A0063007D79E3B4604A1FC4CF16B801A46CE89CE290C59DD90035805BB6E4854F4453ACBF
1,635,068,825 UART: [art] SIG.S = C7C9ABADA6F75165A308ED614D0BFEAA2C47AA940C79A2E4BB954F8DF756F71CED333EDA79C4538A58ACB6EA6A940028
1,635,092,732 UART: Caliptra RT
1,635,092,983 UART: [state] CFI Enabled
1,635,460,413 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 354.43s
Truncated 716656 bytes from beginning
B4FBDC8EB1
1,550,028,252 UART: [art] SIG.S = A76BFDF4F54E6FB92007CC926966EB16254D01FA4DC6CEB45A05DC9FECA18ECD9AE17A29E67C056214E90EACAEE79784
1,550,051,801 UART: Caliptra RT
1,550,052,052 UART: [state] CFI Enabled
1,550,419,103 UART: [rt] RT listening for mailbox commands...
1,550,419,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,552,909,526 >>> mbox cmd response: success
1,552,922,785 UART:
1,552,922,801 UART: Running Caliptra FMC ...
1,552,923,209 UART:
1,552,923,263 UART: [state] CFI Enabled
1,553,012,082 UART: [art] Extend RT PCRs Done
1,553,012,510 UART: [art] Lock RT PCRs Done
1,553,013,577 UART: [art] Populate DV Done
1,553,021,926 UART: [fht] FMC Alias Private Key: 7
1,553,022,924 UART: [art] Derive CDI
1,553,023,204 UART: [art] Store in slot 0x4
1,553,108,877 UART: [art] Derive Key Pair
1,553,109,237 UART: [art] Store priv key in slot 0x5
1,553,122,589 UART: [art] Derive Key Pair - Done
1,553,137,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,553,152,547 UART: [art] Erasing AUTHORITY.KEYID = 7
1,553,153,312 UART: [art] PUB.X = 0D6292A8D0D86825DF548D00A2B3DB6EF81C6926E6024237FDE6B7AB2C7582531D5C02EC9F63D71A5822FF51C0E9AD3F
1,553,160,061 UART: [art] PUB.Y = 77300C301BE8F61BB574F4BA1252D25A5F9552E5AF7E7CD1393A65A487EC3A31DE01B41C042C252F5F24663A73E27A08
1,553,167,003 UART: [art] SIG.R = 700774E1306A96C064031AAA69F44D98F943E06313CAA6987ECDCA924E14EE6701E5A566D9F5A3BBEC1751034390F0CF
1,553,173,765 UART: [art] SIG.S = 7BEBD678FD0B89174D9EDAC67B6C0197C00BDE77EE3A2A4A10F2405FB90DEA7B54EC6F0FD9F873BCAAE325FE095FBCB1
1,553,196,831 UART: Caliptra RT
1,553,197,082 UART: [state] CFI Enabled
1,553,565,621 UART: [rt] RT listening for mailbox commands...
1,553,566,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,556,055,242 >>> mbox cmd response: success
1,556,068,729 UART:
1,556,068,745 UART: Running Caliptra FMC ...
1,556,069,153 UART:
1,556,069,207 UART: [state] CFI Enabled
1,556,157,826 UART: [art] Extend RT PCRs Done
1,556,158,254 UART: [art] Lock RT PCRs Done
1,556,159,483 UART: [art] Populate DV Done
1,556,167,490 UART: [fht] FMC Alias Private Key: 7
1,556,168,516 UART: [art] Derive CDI
1,556,168,796 UART: [art] Store in slot 0x4
1,556,254,623 UART: [art] Derive Key Pair
1,556,254,983 UART: [art] Store priv key in slot 0x5
1,556,268,037 UART: [art] Derive Key Pair - Done
1,556,282,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,556,298,417 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,299,182 UART: [art] PUB.X = 3D47DA7FC4DAFC4E554AE0A368B7CCD9F1F785B6C8A09E948F436A19314E6DB9F35E48BAD8779984D5F27DCC546A239D
1,556,305,970 UART: [art] PUB.Y = E89BDAA4020E5AB0E1863B6D0C654619F2BB4A13ADAF64616C3A3EA7045FDE88B81127CA27CBD9628FBDBE2340B84E07
1,556,312,923 UART: [art] SIG.R = F21F8CF24CAF88BF4ED7760BD1BE8E2AB36D8166164FEC16822CF0D3291E001559204195DE4AF511D40EBBB4FBDC8EB1
1,556,319,685 UART: [art] SIG.S = A76BFDF4F54E6FB92007CC926966EB16254D01FA4DC6CEB45A05DC9FECA18ECD9AE17A29E67C056214E90EACAEE79784
1,556,343,250 UART: Caliptra RT
1,556,343,501 UART: [state] CFI Enabled
1,556,711,392 UART: [rt] RT listening for mailbox commands...
1,556,712,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,559,203,185 >>> mbox cmd response: success
1,559,216,692 UART:
1,559,216,708 UART: Running Caliptra FMC ...
1,559,217,116 UART:
1,559,217,170 UART: [state] CFI Enabled
1,559,306,197 UART: [art] Extend RT PCRs Done
1,559,306,625 UART: [art] Lock RT PCRs Done
1,559,307,872 UART: [art] Populate DV Done
1,559,316,369 UART: [fht] FMC Alias Private Key: 7
1,559,317,443 UART: [art] Derive CDI
1,559,317,723 UART: [art] Store in slot 0x4
1,559,403,438 UART: [art] Derive Key Pair
1,559,403,798 UART: [art] Store priv key in slot 0x5
1,559,417,268 UART: [art] Derive Key Pair - Done
1,559,431,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,559,447,160 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,447,925 UART: [art] PUB.X = 0D6292A8D0D86825DF548D00A2B3DB6EF81C6926E6024237FDE6B7AB2C7582531D5C02EC9F63D71A5822FF51C0E9AD3F
1,559,454,674 UART: [art] PUB.Y = 77300C301BE8F61BB574F4BA1252D25A5F9552E5AF7E7CD1393A65A487EC3A31DE01B41C042C252F5F24663A73E27A08
1,559,461,616 UART: [art] SIG.R = 700774E1306A96C064031AAA69F44D98F943E06313CAA6987ECDCA924E14EE6701E5A566D9F5A3BBEC1751034390F0CF
1,559,468,378 UART: [art] SIG.S = 7BEBD678FD0B89174D9EDAC67B6C0197C00BDE77EE3A2A4A10F2405FB90DEA7B54EC6F0FD9F873BCAAE325FE095FBCB1
1,559,491,896 UART: Caliptra RT
1,559,492,147 UART: [state] CFI Enabled
1,559,854,868 UART: [rt] RT listening for mailbox commands...
1,559,855,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,562,345,111 >>> mbox cmd response: success
1,562,358,442 UART:
1,562,358,458 UART: Running Caliptra FMC ...
1,562,358,866 UART:
1,562,358,920 UART: [state] CFI Enabled
1,562,448,475 UART: [art] Extend RT PCRs Done
1,562,448,903 UART: [art] Lock RT PCRs Done
1,562,450,114 UART: [art] Populate DV Done
1,562,458,123 UART: [fht] FMC Alias Private Key: 7
1,562,459,101 UART: [art] Derive CDI
1,562,459,381 UART: [art] Store in slot 0x4
1,562,545,098 UART: [art] Derive Key Pair
1,562,545,458 UART: [art] Store priv key in slot 0x5
1,562,558,566 UART: [art] Derive Key Pair - Done
1,562,573,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,562,589,144 UART: [art] Erasing AUTHORITY.KEYID = 7
1,562,589,909 UART: [art] PUB.X = 3D47DA7FC4DAFC4E554AE0A368B7CCD9F1F785B6C8A09E948F436A19314E6DB9F35E48BAD8779984D5F27DCC546A239D
1,562,596,697 UART: [art] PUB.Y = E89BDAA4020E5AB0E1863B6D0C654619F2BB4A13ADAF64616C3A3EA7045FDE88B81127CA27CBD9628FBDBE2340B84E07
1,562,603,650 UART: [art] SIG.R = F21F8CF24CAF88BF4ED7760BD1BE8E2AB36D8166164FEC16822CF0D3291E001559204195DE4AF511D40EBBB4FBDC8EB1
1,562,610,412 UART: [art] SIG.S = A76BFDF4F54E6FB92007CC926966EB16254D01FA4DC6CEB45A05DC9FECA18ECD9AE17A29E67C056214E90EACAEE79784
1,562,633,769 UART: Caliptra RT
1,562,634,020 UART: [state] CFI Enabled
1,563,000,313 UART: [rt] RT listening for mailbox commands...
1,563,000,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,565,490,732 >>> mbox cmd response: success
1,565,504,201 UART:
1,565,504,217 UART: Running Caliptra FMC ...
1,565,504,625 UART:
1,565,504,679 UART: [state] CFI Enabled
1,565,593,462 UART: [art] Extend RT PCRs Done
1,565,593,890 UART: [art] Lock RT PCRs Done
1,565,595,043 UART: [art] Populate DV Done
1,565,603,166 UART: [fht] FMC Alias Private Key: 7
1,565,604,112 UART: [art] Derive CDI
1,565,604,392 UART: [art] Store in slot 0x4
1,565,690,027 UART: [art] Derive Key Pair
1,565,690,387 UART: [art] Store priv key in slot 0x5
1,565,703,635 UART: [art] Derive Key Pair - Done
1,565,718,674 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,565,734,129 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,734,894 UART: [art] PUB.X = 0D6292A8D0D86825DF548D00A2B3DB6EF81C6926E6024237FDE6B7AB2C7582531D5C02EC9F63D71A5822FF51C0E9AD3F
1,565,741,643 UART: [art] PUB.Y = 77300C301BE8F61BB574F4BA1252D25A5F9552E5AF7E7CD1393A65A487EC3A31DE01B41C042C252F5F24663A73E27A08
1,565,748,585 UART: [art] SIG.R = 700774E1306A96C064031AAA69F44D98F943E06313CAA6987ECDCA924E14EE6701E5A566D9F5A3BBEC1751034390F0CF
1,565,755,347 UART: [art] SIG.S = 7BEBD678FD0B89174D9EDAC67B6C0197C00BDE77EE3A2A4A10F2405FB90DEA7B54EC6F0FD9F873BCAAE325FE095FBCB1
1,565,778,715 UART: Caliptra RT
1,565,778,966 UART: [state] CFI Enabled
1,566,141,267 UART: [rt] RT listening for mailbox commands...
1,566,141,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,568,631,930 >>> mbox cmd response: success
1,568,645,691 UART:
1,568,645,707 UART: Running Caliptra FMC ...
1,568,646,115 UART:
1,568,646,169 UART: [state] CFI Enabled
1,568,735,110 UART: [art] Extend RT PCRs Done
1,568,735,538 UART: [art] Lock RT PCRs Done
1,568,736,729 UART: [art] Populate DV Done
1,568,745,054 UART: [fht] FMC Alias Private Key: 7
1,568,746,228 UART: [art] Derive CDI
1,568,746,508 UART: [art] Store in slot 0x4
1,568,832,213 UART: [art] Derive Key Pair
1,568,832,573 UART: [art] Store priv key in slot 0x5
1,568,845,521 UART: [art] Derive Key Pair - Done
1,568,860,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,568,875,395 UART: [art] Erasing AUTHORITY.KEYID = 7
1,568,876,160 UART: [art] PUB.X = 3D47DA7FC4DAFC4E554AE0A368B7CCD9F1F785B6C8A09E948F436A19314E6DB9F35E48BAD8779984D5F27DCC546A239D
1,568,882,948 UART: [art] PUB.Y = E89BDAA4020E5AB0E1863B6D0C654619F2BB4A13ADAF64616C3A3EA7045FDE88B81127CA27CBD9628FBDBE2340B84E07
1,568,889,901 UART: [art] SIG.R = F21F8CF24CAF88BF4ED7760BD1BE8E2AB36D8166164FEC16822CF0D3291E001559204195DE4AF511D40EBBB4FBDC8EB1
1,568,896,663 UART: [art] SIG.S = A76BFDF4F54E6FB92007CC926966EB16254D01FA4DC6CEB45A05DC9FECA18ECD9AE17A29E67C056214E90EACAEE79784
1,568,920,528 UART: Caliptra RT
1,568,920,779 UART: [state] CFI Enabled
1,569,279,036 UART: [rt] RT listening for mailbox commands...
1,569,279,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,571,769,995 >>> mbox cmd response: success
1,571,783,306 UART:
1,571,783,322 UART: Running Caliptra FMC ...
1,571,783,730 UART:
1,571,783,784 UART: [state] CFI Enabled
1,571,872,667 UART: [art] Extend RT PCRs Done
1,571,873,095 UART: [art] Lock RT PCRs Done
1,571,874,464 UART: [art] Populate DV Done
1,571,882,757 UART: [fht] FMC Alias Private Key: 7
1,571,883,811 UART: [art] Derive CDI
1,571,884,091 UART: [art] Store in slot 0x4
1,571,970,178 UART: [art] Derive Key Pair
1,571,970,538 UART: [art] Store priv key in slot 0x5
1,571,983,720 UART: [art] Derive Key Pair - Done
1,571,998,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,572,014,048 UART: [art] Erasing AUTHORITY.KEYID = 7
1,572,014,813 UART: [art] PUB.X = 0D6292A8D0D86825DF548D00A2B3DB6EF81C6926E6024237FDE6B7AB2C7582531D5C02EC9F63D71A5822FF51C0E9AD3F
1,572,021,562 UART: [art] PUB.Y = 77300C301BE8F61BB574F4BA1252D25A5F9552E5AF7E7CD1393A65A487EC3A31DE01B41C042C252F5F24663A73E27A08
1,572,028,504 UART: [art] SIG.R = 700774E1306A96C064031AAA69F44D98F943E06313CAA6987ECDCA924E14EE6701E5A566D9F5A3BBEC1751034390F0CF
1,572,035,266 UART: [art] SIG.S = 7BEBD678FD0B89174D9EDAC67B6C0197C00BDE77EE3A2A4A10F2405FB90DEA7B54EC6F0FD9F873BCAAE325FE095FBCB1
1,572,059,302 UART: Caliptra RT
1,572,059,553 UART: [state] CFI Enabled
1,572,429,404 UART: [rt] RT listening for mailbox commands...
1,572,430,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,574,919,635 >>> mbox cmd response: success
1,574,933,252 UART:
1,574,933,268 UART: Running Caliptra FMC ...
1,574,933,676 UART:
1,574,933,730 UART: [state] CFI Enabled
1,575,023,323 UART: [art] Extend RT PCRs Done
1,575,023,751 UART: [art] Lock RT PCRs Done
1,575,025,320 UART: [art] Populate DV Done
1,575,033,679 UART: [fht] FMC Alias Private Key: 7
1,575,034,627 UART: [art] Derive CDI
1,575,034,907 UART: [art] Store in slot 0x4
1,575,120,784 UART: [art] Derive Key Pair
1,575,121,144 UART: [art] Store priv key in slot 0x5
1,575,134,040 UART: [art] Derive Key Pair - Done
1,575,148,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,575,164,256 UART: [art] Erasing AUTHORITY.KEYID = 7
1,575,165,021 UART: [art] PUB.X = 3D47DA7FC4DAFC4E554AE0A368B7CCD9F1F785B6C8A09E948F436A19314E6DB9F35E48BAD8779984D5F27DCC546A239D
1,575,171,809 UART: [art] PUB.Y = E89BDAA4020E5AB0E1863B6D0C654619F2BB4A13ADAF64616C3A3EA7045FDE88B81127CA27CBD9628FBDBE2340B84E07
1,575,178,762 UART: [art] SIG.R = F21F8CF24CAF88BF4ED7760BD1BE8E2AB36D8166164FEC16822CF0D3291E001559204195DE4AF511D40EBBB4FBDC8EB1
1,575,185,524 UART: [art] SIG.S = A76BFDF4F54E6FB92007CC926966EB16254D01FA4DC6CEB45A05DC9FECA18ECD9AE17A29E67C056214E90EACAEE79784
1,575,210,089 UART: Caliptra RT
1,575,210,340 UART: [state] CFI Enabled
1,575,573,575 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 344.89s
Truncated 1323543 bytes from beginning
a FMC ...
1,622,328,325 UART:
1,622,328,468 UART: [state] CFI Enabled
1,622,417,823 UART: [art] Extend RT PCRs Done
1,622,418,251 UART: [art] Lock RT PCRs Done
1,622,419,454 UART: [art] Populate DV Done
1,622,427,637 UART: [fht] FMC Alias Private Key: 7
1,622,428,637 UART: [art] Derive CDI
1,622,428,917 UART: [art] Store in slot 0x4
1,622,514,836 UART: [art] Derive Key Pair
1,622,515,196 UART: [art] Store priv key in slot 0x5
1,622,528,734 UART: [art] Derive Key Pair - Done
1,622,543,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,622,559,103 UART: [art] Erasing AUTHORITY.KEYID = 7
1,622,559,868 UART: [art] PUB.X = 2003284EB8518D23345EF4D71A297211F4C83F22FC5F3F30E33363E2FE8EDBF67BE2515698DEE2203F28397BC6B3F7B7
1,622,566,639 UART: [art] PUB.Y = 81000C49CFB6F32CF05AD5247DF998110AE4C2541E384A0139D52A33BE7025251EBC58FEED8F4502241FA28897767439
1,622,573,553 UART: [art] SIG.R = ABF621C4A2228485EEBA30CA4206CB7AB6C98EC3FF29059B0675791FD6954BF669266F7741582021915D5D4B9BAB5311
1,622,580,316 UART: [art] SIG.S = EB76E4983750F8F05EBDF0C978CFEB92B9145E52E94705D1AC19633CEED6D3EE5B0742E5F72E717B0D5F6FB357B131AF
1,622,604,469 UART: Caliptra RT
1,622,604,812 UART: [state] CFI Enabled
1,622,966,467 UART: [rt] RT listening for mailbox commands...
1,622,967,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,968,170 UART:
1,622,968,186 UART: Running Caliptra ROM ...
1,622,968,594 UART:
1,622,968,736 UART: [state] CFI Enabled
1,622,971,570 UART: [state] LifecycleState = Unprovisioned
1,622,972,225 UART: [state] DebugLocked = No
1,622,972,903 UART: [state] WD Timer not started. Device not locked for debugging
1,622,974,087 UART: [kat] SHA2-256
1,623,779,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,623,783,862 UART: [kat] ++
1,623,784,014 UART: [kat] sha1
1,623,788,176 UART: [kat] SHA2-256
1,623,790,116 UART: [kat] SHA2-384
1,623,792,761 UART: [kat] SHA2-512-ACC
1,623,794,661 UART: [kat] ECC-384
1,623,803,984 UART: [kat] HMAC-384Kdf
1,623,808,834 UART: [kat] LMS
1,624,057,162 UART: [kat] --
1,624,058,146 UART: [update-reset] ++
1,625,417,204 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,625,418,195 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,625,573,410 >>> mbox cmd response: success
1,625,573,677 UART: [update-reset] Copying MAN_2 To MAN_1
1,625,581,691 UART: [update-reset Success] --
1,625,582,674 UART: [state] Locking Datavault
1,625,583,634 UART: [state] Locking PCR0, PCR1 and PCR31
1,625,584,238 UART: [state] Locking ICCM
1,625,584,704 UART: [exit] Launching FMC @ 0x40000130
1,625,590,034 UART:
1,625,590,050 UART: Running Caliptra FMC ...
1,625,590,458 UART:
1,625,590,601 UART: [state] CFI Enabled
1,625,679,946 UART: [art] Extend RT PCRs Done
1,625,680,374 UART: [art] Lock RT PCRs Done
1,625,681,399 UART: [art] Populate DV Done
1,625,689,578 UART: [fht] FMC Alias Private Key: 7
1,625,690,582 UART: [art] Derive CDI
1,625,690,862 UART: [art] Store in slot 0x4
1,625,776,467 UART: [art] Derive Key Pair
1,625,776,827 UART: [art] Store priv key in slot 0x5
1,625,790,199 UART: [art] Derive Key Pair - Done
1,625,804,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,625,820,418 UART: [art] Erasing AUTHORITY.KEYID = 7
1,625,821,183 UART: [art] PUB.X = 0EBF6EB1E2A88A715C90C2C0DBCB0DD83FD821A88C37AD8A874F593FA262EF3E27B1D9D87C8DB107F050D1225BFE772C
1,625,827,966 UART: [art] PUB.Y = EDE21F9C1B3AF092B98466AA764B5C77DB08696946A0AF5F2AFAA0703A582E882C0CF55978111C4A6D60CA72E64661EE
1,625,834,920 UART: [art] SIG.R = E193715238E9D20C2D0ABFDE0295CF6FFD7B63856BD1E02038B05934B3E87B897B69C35E8040BF0BC02F5EF1ED604974
1,625,841,686 UART: [art] SIG.S = ED9CA56FAC34F995254962D4B6F7BAB13AE514BB1439A57FB638ACB17F7B6061BDE2E99A311E83DFE046D267B73B4DDE
1,625,865,248 UART: Caliptra RT
1,625,865,591 UART: [state] CFI Enabled
1,626,235,402 UART: [rt] RT listening for mailbox commands...
1,626,236,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,626,236,951 UART:
1,626,236,967 UART: Running Caliptra ROM ...
1,626,237,375 UART:
1,626,237,517 UART: [state] CFI Enabled
1,626,240,433 UART: [state] LifecycleState = Unprovisioned
1,626,241,088 UART: [state] DebugLocked = No
1,626,241,700 UART: [state] WD Timer not started. Device not locked for debugging
1,626,242,820 UART: [kat] SHA2-256
1,627,048,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,627,052,595 UART: [kat] ++
1,627,052,747 UART: [kat] sha1
1,627,056,937 UART: [kat] SHA2-256
1,627,058,877 UART: [kat] SHA2-384
1,627,061,618 UART: [kat] SHA2-512-ACC
1,627,063,518 UART: [kat] ECC-384
1,627,073,349 UART: [kat] HMAC-384Kdf
1,627,078,173 UART: [kat] LMS
1,627,326,501 UART: [kat] --
1,627,327,515 UART: [update-reset] ++
1,628,685,841 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,628,687,004 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,628,842,219 >>> mbox cmd response: success
1,628,842,560 UART: [update-reset] Copying MAN_2 To MAN_1
1,628,850,574 UART: [update-reset Success] --
1,628,851,713 UART: [state] Locking Datavault
1,628,852,377 UART: [state] Locking PCR0, PCR1 and PCR31
1,628,852,981 UART: [state] Locking ICCM
1,628,853,435 UART: [exit] Launching FMC @ 0x40000130
1,628,858,765 UART:
1,628,858,781 UART: Running Caliptra FMC ...
1,628,859,189 UART:
1,628,859,332 UART: [state] CFI Enabled
1,628,948,691 UART: [art] Extend RT PCRs Done
1,628,949,119 UART: [art] Lock RT PCRs Done
1,628,950,446 UART: [art] Populate DV Done
1,628,958,763 UART: [fht] FMC Alias Private Key: 7
1,628,959,827 UART: [art] Derive CDI
1,628,960,107 UART: [art] Store in slot 0x4
1,629,045,360 UART: [art] Derive Key Pair
1,629,045,720 UART: [art] Store priv key in slot 0x5
1,629,059,784 UART: [art] Derive Key Pair - Done
1,629,074,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,629,090,221 UART: [art] Erasing AUTHORITY.KEYID = 7
1,629,090,986 UART: [art] PUB.X = 2003284EB8518D23345EF4D71A297211F4C83F22FC5F3F30E33363E2FE8EDBF67BE2515698DEE2203F28397BC6B3F7B7
1,629,097,757 UART: [art] PUB.Y = 81000C49CFB6F32CF05AD5247DF998110AE4C2541E384A0139D52A33BE7025251EBC58FEED8F4502241FA28897767439
1,629,104,671 UART: [art] SIG.R = ABF621C4A2228485EEBA30CA4206CB7AB6C98EC3FF29059B0675791FD6954BF669266F7741582021915D5D4B9BAB5311
1,629,111,434 UART: [art] SIG.S = EB76E4983750F8F05EBDF0C978CFEB92B9145E52E94705D1AC19633CEED6D3EE5B0742E5F72E717B0D5F6FB357B131AF
1,629,135,319 UART: Caliptra RT
1,629,135,662 UART: [state] CFI Enabled
1,629,501,051 UART: [rt] RT listening for mailbox commands...
1,629,501,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,629,502,980 UART:
1,629,502,996 UART: Running Caliptra ROM ...
1,629,503,404 UART:
1,629,503,546 UART: [state] CFI Enabled
1,629,506,420 UART: [state] LifecycleState = Unprovisioned
1,629,507,075 UART: [state] DebugLocked = No
1,629,507,731 UART: [state] WD Timer not started. Device not locked for debugging
1,629,508,895 UART: [kat] SHA2-256
1,630,314,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,630,318,670 UART: [kat] ++
1,630,318,822 UART: [kat] sha1
1,630,323,024 UART: [kat] SHA2-256
1,630,324,964 UART: [kat] SHA2-384
1,630,327,707 UART: [kat] SHA2-512-ACC
1,630,329,607 UART: [kat] ECC-384
1,630,339,236 UART: [kat] HMAC-384Kdf
1,630,344,068 UART: [kat] LMS
1,630,592,396 UART: [kat] --
1,630,593,132 UART: [update-reset] ++
1,631,951,034 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,631,952,017 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,632,107,232 >>> mbox cmd response: success
1,632,107,407 UART: [update-reset] Copying MAN_2 To MAN_1
1,632,115,421 UART: [update-reset Success] --
1,632,116,310 UART: [state] Locking Datavault
1,632,117,168 UART: [state] Locking PCR0, PCR1 and PCR31
1,632,117,772 UART: [state] Locking ICCM
1,632,118,304 UART: [exit] Launching FMC @ 0x40000130
1,632,123,634 UART:
1,632,123,650 UART: Running Caliptra FMC ...
1,632,124,058 UART:
1,632,124,201 UART: [state] CFI Enabled
1,632,213,440 UART: [art] Extend RT PCRs Done
1,632,213,868 UART: [art] Lock RT PCRs Done
1,632,215,149 UART: [art] Populate DV Done
1,632,223,542 UART: [fht] FMC Alias Private Key: 7
1,632,224,696 UART: [art] Derive CDI
1,632,224,976 UART: [art] Store in slot 0x4
1,632,310,489 UART: [art] Derive Key Pair
1,632,310,849 UART: [art] Store priv key in slot 0x5
1,632,324,143 UART: [art] Derive Key Pair - Done
1,632,338,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,632,354,358 UART: [art] Erasing AUTHORITY.KEYID = 7
1,632,355,123 UART: [art] PUB.X = 0EBF6EB1E2A88A715C90C2C0DBCB0DD83FD821A88C37AD8A874F593FA262EF3E27B1D9D87C8DB107F050D1225BFE772C
1,632,361,906 UART: [art] PUB.Y = EDE21F9C1B3AF092B98466AA764B5C77DB08696946A0AF5F2AFAA0703A582E882C0CF55978111C4A6D60CA72E64661EE
1,632,368,860 UART: [art] SIG.R = E193715238E9D20C2D0ABFDE0295CF6FFD7B63856BD1E02038B05934B3E87B897B69C35E8040BF0BC02F5EF1ED604974
1,632,375,626 UART: [art] SIG.S = ED9CA56FAC34F995254962D4B6F7BAB13AE514BB1439A57FB638ACB17F7B6061BDE2E99A311E83DFE046D267B73B4DDE
1,632,399,604 UART: Caliptra RT
1,632,399,947 UART: [state] CFI Enabled
1,632,766,776 UART: [rt] RT listening for mailbox commands...
1,632,767,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,632,768,287 UART:
1,632,768,303 UART: Running Caliptra ROM ...
1,632,768,711 UART:
1,632,768,853 UART: [state] CFI Enabled
1,632,771,587 UART: [state] LifecycleState = Unprovisioned
1,632,772,242 UART: [state] DebugLocked = No
1,632,772,782 UART: [state] WD Timer not started. Device not locked for debugging
1,632,774,052 UART: [kat] SHA2-256
1,633,579,702 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,633,583,827 UART: [kat] ++
1,633,583,979 UART: [kat] sha1
1,633,588,219 UART: [kat] SHA2-256
1,633,590,159 UART: [kat] SHA2-384
1,633,592,806 UART: [kat] SHA2-512-ACC
1,633,594,706 UART: [kat] ECC-384
1,633,604,245 UART: [kat] HMAC-384Kdf
1,633,608,715 UART: [kat] LMS
1,633,857,043 UART: [kat] --
1,633,857,707 UART: [update-reset] ++
1,635,216,517 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,635,217,566 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,635,372,781 >>> mbox cmd response: success
1,635,372,962 UART: [update-reset] Copying MAN_2 To MAN_1
1,635,380,976 UART: [update-reset Success] --
1,635,382,009 UART: [state] Locking Datavault
1,635,382,833 UART: [state] Locking PCR0, PCR1 and PCR31
1,635,383,437 UART: [state] Locking ICCM
1,635,383,883 UART: [exit] Launching FMC @ 0x40000130
1,635,389,213 UART:
1,635,389,229 UART: Running Caliptra FMC ...
1,635,389,637 UART:
1,635,389,780 UART: [state] CFI Enabled
1,635,478,815 UART: [art] Extend RT PCRs Done
1,635,479,243 UART: [art] Lock RT PCRs Done
1,635,480,508 UART: [art] Populate DV Done
1,635,488,683 UART: [fht] FMC Alias Private Key: 7
1,635,489,793 UART: [art] Derive CDI
1,635,490,073 UART: [art] Store in slot 0x4
1,635,575,792 UART: [art] Derive Key Pair
1,635,576,152 UART: [art] Store priv key in slot 0x5
1,635,589,796 UART: [art] Derive Key Pair - Done
1,635,604,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,635,620,099 UART: [art] Erasing AUTHORITY.KEYID = 7
1,635,620,864 UART: [art] PUB.X = 2003284EB8518D23345EF4D71A297211F4C83F22FC5F3F30E33363E2FE8EDBF67BE2515698DEE2203F28397BC6B3F7B7
1,635,627,635 UART: [art] PUB.Y = 81000C49CFB6F32CF05AD5247DF998110AE4C2541E384A0139D52A33BE7025251EBC58FEED8F4502241FA28897767439
1,635,634,549 UART: [art] SIG.R = ABF621C4A2228485EEBA30CA4206CB7AB6C98EC3FF29059B0675791FD6954BF669266F7741582021915D5D4B9BAB5311
1,635,641,312 UART: [art] SIG.S = EB76E4983750F8F05EBDF0C978CFEB92B9145E52E94705D1AC19633CEED6D3EE5B0742E5F72E717B0D5F6FB357B131AF
1,635,665,025 UART: Caliptra RT
1,635,665,368 UART: [state] CFI Enabled
1,636,030,847 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 358.62s
Truncated 716678 bytes from beginning
48AE32AB53
1,550,712,046 UART: [art] SIG.S = 2D55A6242A29FC781667D9489D1EEF1E88E10B46CE8B39A8B6BF8F22281FF5B081A9D1D6BFF3FBC8284195193CE9D23C
1,550,735,859 UART: Caliptra RT
1,550,736,202 UART: [state] CFI Enabled
1,551,097,655 UART: [rt] RT listening for mailbox commands...
1,551,098,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,553,589,793 >>> mbox cmd response: success
1,553,603,390 UART:
1,553,603,406 UART: Running Caliptra FMC ...
1,553,603,814 UART:
1,553,603,957 UART: [state] CFI Enabled
1,553,693,626 UART: [art] Extend RT PCRs Done
1,553,694,054 UART: [art] Lock RT PCRs Done
1,553,695,349 UART: [art] Populate DV Done
1,553,703,548 UART: [fht] FMC Alias Private Key: 7
1,553,704,656 UART: [art] Derive CDI
1,553,704,936 UART: [art] Store in slot 0x4
1,553,790,783 UART: [art] Derive Key Pair
1,553,791,143 UART: [art] Store priv key in slot 0x5
1,553,804,729 UART: [art] Derive Key Pair - Done
1,553,819,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,553,835,142 UART: [art] Erasing AUTHORITY.KEYID = 7
1,553,835,907 UART: [art] PUB.X = 87F25F374B20B4C0ED2549BCB038CCA74B50791408E1A705263289A8ACD24701ABEC0E0E8C71BFFD6CECAF92ACD1B7E6
1,553,842,682 UART: [art] PUB.Y = 3E8F67F78D0F5441FAAA27FA2DD46F2E9F224FCB96A9B6A6C4FCFBCF59F09734739CC99437792F386A9BB491784DAD3A
1,553,849,647 UART: [art] SIG.R = 98023EFF48067675B49A140991545E853653F881C0DC16667C3897B8973B65D985E3DF441DFDCD299296F60C911EAABD
1,553,856,401 UART: [art] SIG.S = 4B2D3A69E9AA7B1237984CB5718715F736E40EEC9D6BD88E836AD4AB524CA528EB1DF0E7BBF1F3AB5D3B15295009555B
1,553,879,851 UART: Caliptra RT
1,553,880,194 UART: [state] CFI Enabled
1,554,250,972 UART: [rt] RT listening for mailbox commands...
1,554,251,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,556,743,360 >>> mbox cmd response: success
1,556,756,919 UART:
1,556,756,935 UART: Running Caliptra FMC ...
1,556,757,343 UART:
1,556,757,486 UART: [state] CFI Enabled
1,556,846,885 UART: [art] Extend RT PCRs Done
1,556,847,313 UART: [art] Lock RT PCRs Done
1,556,848,592 UART: [art] Populate DV Done
1,556,856,821 UART: [fht] FMC Alias Private Key: 7
1,556,857,939 UART: [art] Derive CDI
1,556,858,219 UART: [art] Store in slot 0x4
1,556,944,266 UART: [art] Derive Key Pair
1,556,944,626 UART: [art] Store priv key in slot 0x5
1,556,957,780 UART: [art] Derive Key Pair - Done
1,556,972,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,556,987,991 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,988,756 UART: [art] PUB.X = 13443B330B5DA938494A89E245FC810812FB3D229A426E87984A1F7B8448A82463AD1F7D0BC4568EC0B4CD4D58F72E9D
1,556,995,519 UART: [art] PUB.Y = 5255957774565BC9A56D42A2AA512F1103D42DD060EE38093FD5F10C04991A05CE2CCE15E4B9EFE6306E1FC7639A84AA
1,557,002,460 UART: [art] SIG.R = 0F4FC609B495599AAB0DC188E4F74B57810FF9E61DE9E0A127FF07D708167D072AAEAC43AF5A3F8CE239FC48AE32AB53
1,557,009,227 UART: [art] SIG.S = 2D55A6242A29FC781667D9489D1EEF1E88E10B46CE8B39A8B6BF8F22281FF5B081A9D1D6BFF3FBC8284195193CE9D23C
1,557,032,910 UART: Caliptra RT
1,557,033,253 UART: [state] CFI Enabled
1,557,400,602 UART: [rt] RT listening for mailbox commands...
1,557,401,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,559,890,464 >>> mbox cmd response: success
1,559,903,877 UART:
1,559,903,893 UART: Running Caliptra FMC ...
1,559,904,301 UART:
1,559,904,444 UART: [state] CFI Enabled
1,559,993,407 UART: [art] Extend RT PCRs Done
1,559,993,835 UART: [art] Lock RT PCRs Done
1,559,994,966 UART: [art] Populate DV Done
1,560,003,541 UART: [fht] FMC Alias Private Key: 7
1,560,004,697 UART: [art] Derive CDI
1,560,004,977 UART: [art] Store in slot 0x4
1,560,090,822 UART: [art] Derive Key Pair
1,560,091,182 UART: [art] Store priv key in slot 0x5
1,560,104,320 UART: [art] Derive Key Pair - Done
1,560,118,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,560,134,401 UART: [art] Erasing AUTHORITY.KEYID = 7
1,560,135,166 UART: [art] PUB.X = 87F25F374B20B4C0ED2549BCB038CCA74B50791408E1A705263289A8ACD24701ABEC0E0E8C71BFFD6CECAF92ACD1B7E6
1,560,141,941 UART: [art] PUB.Y = 3E8F67F78D0F5441FAAA27FA2DD46F2E9F224FCB96A9B6A6C4FCFBCF59F09734739CC99437792F386A9BB491784DAD3A
1,560,148,906 UART: [art] SIG.R = 98023EFF48067675B49A140991545E853653F881C0DC16667C3897B8973B65D985E3DF441DFDCD299296F60C911EAABD
1,560,155,660 UART: [art] SIG.S = 4B2D3A69E9AA7B1237984CB5718715F736E40EEC9D6BD88E836AD4AB524CA528EB1DF0E7BBF1F3AB5D3B15295009555B
1,560,179,504 UART: Caliptra RT
1,560,179,847 UART: [state] CFI Enabled
1,560,544,801 UART: [rt] RT listening for mailbox commands...
1,560,545,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,563,034,445 >>> mbox cmd response: success
1,563,047,744 UART:
1,563,047,760 UART: Running Caliptra FMC ...
1,563,048,168 UART:
1,563,048,311 UART: [state] CFI Enabled
1,563,137,802 UART: [art] Extend RT PCRs Done
1,563,138,230 UART: [art] Lock RT PCRs Done
1,563,139,669 UART: [art] Populate DV Done
1,563,147,708 UART: [fht] FMC Alias Private Key: 7
1,563,148,804 UART: [art] Derive CDI
1,563,149,084 UART: [art] Store in slot 0x4
1,563,234,681 UART: [art] Derive Key Pair
1,563,235,041 UART: [art] Store priv key in slot 0x5
1,563,248,575 UART: [art] Derive Key Pair - Done
1,563,263,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,563,279,470 UART: [art] Erasing AUTHORITY.KEYID = 7
1,563,280,235 UART: [art] PUB.X = 13443B330B5DA938494A89E245FC810812FB3D229A426E87984A1F7B8448A82463AD1F7D0BC4568EC0B4CD4D58F72E9D
1,563,286,998 UART: [art] PUB.Y = 5255957774565BC9A56D42A2AA512F1103D42DD060EE38093FD5F10C04991A05CE2CCE15E4B9EFE6306E1FC7639A84AA
1,563,293,939 UART: [art] SIG.R = 0F4FC609B495599AAB0DC188E4F74B57810FF9E61DE9E0A127FF07D708167D072AAEAC43AF5A3F8CE239FC48AE32AB53
1,563,300,706 UART: [art] SIG.S = 2D55A6242A29FC781667D9489D1EEF1E88E10B46CE8B39A8B6BF8F22281FF5B081A9D1D6BFF3FBC8284195193CE9D23C
1,563,324,377 UART: Caliptra RT
1,563,324,720 UART: [state] CFI Enabled
1,563,687,401 UART: [rt] RT listening for mailbox commands...
1,563,688,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,566,178,081 >>> mbox cmd response: success
1,566,191,420 UART:
1,566,191,436 UART: Running Caliptra FMC ...
1,566,191,844 UART:
1,566,191,987 UART: [state] CFI Enabled
1,566,281,676 UART: [art] Extend RT PCRs Done
1,566,282,104 UART: [art] Lock RT PCRs Done
1,566,283,239 UART: [art] Populate DV Done
1,566,291,596 UART: [fht] FMC Alias Private Key: 7
1,566,292,734 UART: [art] Derive CDI
1,566,293,014 UART: [art] Store in slot 0x4
1,566,378,679 UART: [art] Derive Key Pair
1,566,379,039 UART: [art] Store priv key in slot 0x5
1,566,392,825 UART: [art] Derive Key Pair - Done
1,566,407,655 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,566,423,444 UART: [art] Erasing AUTHORITY.KEYID = 7
1,566,424,209 UART: [art] PUB.X = 87F25F374B20B4C0ED2549BCB038CCA74B50791408E1A705263289A8ACD24701ABEC0E0E8C71BFFD6CECAF92ACD1B7E6
1,566,430,984 UART: [art] PUB.Y = 3E8F67F78D0F5441FAAA27FA2DD46F2E9F224FCB96A9B6A6C4FCFBCF59F09734739CC99437792F386A9BB491784DAD3A
1,566,437,949 UART: [art] SIG.R = 98023EFF48067675B49A140991545E853653F881C0DC16667C3897B8973B65D985E3DF441DFDCD299296F60C911EAABD
1,566,444,703 UART: [art] SIG.S = 4B2D3A69E9AA7B1237984CB5718715F736E40EEC9D6BD88E836AD4AB524CA528EB1DF0E7BBF1F3AB5D3B15295009555B
1,566,468,723 UART: Caliptra RT
1,566,469,066 UART: [state] CFI Enabled
1,566,835,836 UART: [rt] RT listening for mailbox commands...
1,566,836,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,569,325,048 >>> mbox cmd response: success
1,569,338,421 UART:
1,569,338,437 UART: Running Caliptra FMC ...
1,569,338,845 UART:
1,569,338,988 UART: [state] CFI Enabled
1,569,427,777 UART: [art] Extend RT PCRs Done
1,569,428,205 UART: [art] Lock RT PCRs Done
1,569,429,396 UART: [art] Populate DV Done
1,569,437,751 UART: [fht] FMC Alias Private Key: 7
1,569,438,877 UART: [art] Derive CDI
1,569,439,157 UART: [art] Store in slot 0x4
1,569,524,900 UART: [art] Derive Key Pair
1,569,525,260 UART: [art] Store priv key in slot 0x5
1,569,538,726 UART: [art] Derive Key Pair - Done
1,569,553,554 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,569,568,987 UART: [art] Erasing AUTHORITY.KEYID = 7
1,569,569,752 UART: [art] PUB.X = 13443B330B5DA938494A89E245FC810812FB3D229A426E87984A1F7B8448A82463AD1F7D0BC4568EC0B4CD4D58F72E9D
1,569,576,515 UART: [art] PUB.Y = 5255957774565BC9A56D42A2AA512F1103D42DD060EE38093FD5F10C04991A05CE2CCE15E4B9EFE6306E1FC7639A84AA
1,569,583,456 UART: [art] SIG.R = 0F4FC609B495599AAB0DC188E4F74B57810FF9E61DE9E0A127FF07D708167D072AAEAC43AF5A3F8CE239FC48AE32AB53
1,569,590,223 UART: [art] SIG.S = 2D55A6242A29FC781667D9489D1EEF1E88E10B46CE8B39A8B6BF8F22281FF5B081A9D1D6BFF3FBC8284195193CE9D23C
1,569,613,596 UART: Caliptra RT
1,569,613,939 UART: [state] CFI Enabled
1,569,980,424 UART: [rt] RT listening for mailbox commands...
1,569,981,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,572,469,348 >>> mbox cmd response: success
1,572,482,911 UART:
1,572,482,927 UART: Running Caliptra FMC ...
1,572,483,335 UART:
1,572,483,478 UART: [state] CFI Enabled
1,572,572,853 UART: [art] Extend RT PCRs Done
1,572,573,281 UART: [art] Lock RT PCRs Done
1,572,574,554 UART: [art] Populate DV Done
1,572,582,745 UART: [fht] FMC Alias Private Key: 7
1,572,583,679 UART: [art] Derive CDI
1,572,583,959 UART: [art] Store in slot 0x4
1,572,669,790 UART: [art] Derive Key Pair
1,572,670,150 UART: [art] Store priv key in slot 0x5
1,572,683,096 UART: [art] Derive Key Pair - Done
1,572,697,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,572,713,023 UART: [art] Erasing AUTHORITY.KEYID = 7
1,572,713,788 UART: [art] PUB.X = 87F25F374B20B4C0ED2549BCB038CCA74B50791408E1A705263289A8ACD24701ABEC0E0E8C71BFFD6CECAF92ACD1B7E6
1,572,720,563 UART: [art] PUB.Y = 3E8F67F78D0F5441FAAA27FA2DD46F2E9F224FCB96A9B6A6C4FCFBCF59F09734739CC99437792F386A9BB491784DAD3A
1,572,727,528 UART: [art] SIG.R = 98023EFF48067675B49A140991545E853653F881C0DC16667C3897B8973B65D985E3DF441DFDCD299296F60C911EAABD
1,572,734,282 UART: [art] SIG.S = 4B2D3A69E9AA7B1237984CB5718715F736E40EEC9D6BD88E836AD4AB524CA528EB1DF0E7BBF1F3AB5D3B15295009555B
1,572,758,984 UART: Caliptra RT
1,572,759,327 UART: [state] CFI Enabled
1,573,121,033 UART: [rt] RT listening for mailbox commands...
1,573,121,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,575,612,927 >>> mbox cmd response: success
1,575,626,024 UART:
1,575,626,040 UART: Running Caliptra FMC ...
1,575,626,448 UART:
1,575,626,591 UART: [state] CFI Enabled
1,575,715,804 UART: [art] Extend RT PCRs Done
1,575,716,232 UART: [art] Lock RT PCRs Done
1,575,717,597 UART: [art] Populate DV Done
1,575,726,020 UART: [fht] FMC Alias Private Key: 7
1,575,726,960 UART: [art] Derive CDI
1,575,727,240 UART: [art] Store in slot 0x4
1,575,812,765 UART: [art] Derive Key Pair
1,575,813,125 UART: [art] Store priv key in slot 0x5
1,575,826,541 UART: [art] Derive Key Pair - Done
1,575,840,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,575,856,408 UART: [art] Erasing AUTHORITY.KEYID = 7
1,575,857,173 UART: [art] PUB.X = 13443B330B5DA938494A89E245FC810812FB3D229A426E87984A1F7B8448A82463AD1F7D0BC4568EC0B4CD4D58F72E9D
1,575,863,936 UART: [art] PUB.Y = 5255957774565BC9A56D42A2AA512F1103D42DD060EE38093FD5F10C04991A05CE2CCE15E4B9EFE6306E1FC7639A84AA
1,575,870,877 UART: [art] SIG.R = 0F4FC609B495599AAB0DC188E4F74B57810FF9E61DE9E0A127FF07D708167D072AAEAC43AF5A3F8CE239FC48AE32AB53
1,575,877,644 UART: [art] SIG.S = 2D55A6242A29FC781667D9489D1EEF1E88E10B46CE8B39A8B6BF8F22281FF5B081A9D1D6BFF3FBC8284195193CE9D23C
1,575,901,001 UART: Caliptra RT
1,575,901,344 UART: [state] CFI Enabled
1,576,266,073 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 344.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,060 UART:
192,437 UART: Running Caliptra ROM ...
193,564 UART:
193,713 UART: [state] CFI Enabled
263,345 UART: [state] LifecycleState = Unprovisioned
265,327 UART: [state] DebugLocked = No
266,931 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,248 UART: [kat] SHA2-256
441,897 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,431 UART: [kat] ++
452,920 UART: [kat] sha1
462,448 UART: [kat] SHA2-256
465,105 UART: [kat] SHA2-384
472,303 UART: [kat] SHA2-512-ACC
474,673 UART: [kat] ECC-384
2,768,746 UART: [kat] HMAC-384Kdf
2,781,504 UART: [kat] LMS
3,971,774 UART: [kat] --
3,976,581 UART: [cold-reset] ++
3,977,592 UART: [fht] Storing FHT @ 0x50003400
3,988,852 UART: [idev] ++
3,989,422 UART: [idev] CDI.KEYID = 6
3,990,408 UART: [idev] SUBJECT.KEYID = 7
3,991,654 UART: [idev] UDS.KEYID = 0
3,992,820 ready_for_fw is high
3,993,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,287 UART: [idev] Erasing UDS.KEYID = 0
7,326,512 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,788 UART: [idev] --
7,351,944 UART: [ldev] ++
7,352,516 UART: [ldev] CDI.KEYID = 6
7,353,507 UART: [ldev] SUBJECT.KEYID = 5
7,354,667 UART: [ldev] AUTHORITY.KEYID = 7
7,355,948 UART: [ldev] FE.KEYID = 1
7,383,940 UART: [ldev] Erasing FE.KEYID = 1
10,717,737 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,046,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,330 UART: [ldev] --
13,097,894 UART: [fwproc] Waiting for Commands...
13,101,122 UART: [fwproc] Received command 0x46574c44
13,103,299 UART: [fwproc] Received Image of size 118548 bytes
17,212,663 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,294,777 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,695,899 >>> mbox cmd response: success
17,696,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,846,013 UART: [afmc] ++
17,846,665 UART: [afmc] CDI.KEYID = 6
17,847,833 UART: [afmc] SUBJECT.KEYID = 7
17,848,909 UART: [afmc] AUTHORITY.KEYID = 5
21,074,796 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,374,154 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,376,407 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,390,855 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,405,608 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,419,976 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,274 UART: [afmc] --
23,444,998 UART: [cold-reset] --
23,449,945 UART: [state] Locking Datavault
23,454,693 UART: [state] Locking PCR0, PCR1 and PCR31
23,456,474 UART: [state] Locking ICCM
23,458,409 UART: [exit] Launching FMC @ 0x40000130
23,466,806 UART:
23,467,046 UART: Running Caliptra FMC ...
23,468,150 UART:
23,468,315 UART: [state] CFI Enabled
23,535,226 UART: [fht] FMC Alias Private Key: 7
25,896,510 UART: [art] Extend RT PCRs Done
25,897,738 UART: [art] Lock RT PCRs Done
25,899,575 UART: [art] Populate DV Done
25,904,884 UART: [fht] FMC Alias Private Key: 7
25,906,471 UART: [art] Derive CDI
25,907,284 UART: [art] Store in slot 0x4
25,965,105 UART: [art] Derive Key Pair
25,966,144 UART: [art] Store priv key in slot 0x5
29,258,652 UART: [art] Derive Key Pair - Done
29,271,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,251 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,759 UART: [art] PUB.X = E5A3D2CEC5F8930D31F0C895832BF204C30D570157584C062787DF38B9B984B4BA9C4A0AFA2BB3C7DEC425EC41CB4959
31,570,032 UART: [art] PUB.Y = 1A7452269C8CBB68051652BEBA50408DF919D06555F178D91054C26A08E1902AD80AF911F1F8AA45E9EBD88B3DE4AB29
31,577,233 UART: [art] SIG.R = 4F25B8B69AEDAF8E03A0ADC036C79E5A552521A6996BF4107F17E864DB87107FBFC6685F88DBDC69EAD7F031EB6F6E5E
31,584,704 UART: [art] SIG.S = 64DE708CF50F3A35AE85D7786DBC16CC9B85894BADA57C4827D505C4DA04127A2E5F0D09E7B0EA83ECB698EF380A0221
32,890,125 UART: Caliptra RT
32,890,837 UART: [state] CFI Enabled
33,067,708 UART: [rt] RT listening for mailbox commands...
33,070,717 UART:
33,070,890 UART: Running Caliptra ROM ...
33,071,911 UART:
33,072,064 UART: [state] CFI Enabled
33,141,851 UART: [state] LifecycleState = Unprovisioned
33,143,781 UART: [state] DebugLocked = No
33,145,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,149,859 UART: [kat] SHA2-256
33,319,576 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,330,056 UART: [kat] ++
33,330,516 UART: [kat] sha1
33,342,695 UART: [kat] SHA2-256
33,345,391 UART: [kat] SHA2-384
33,352,616 UART: [kat] SHA2-512-ACC
33,354,960 UART: [kat] ECC-384
35,643,034 UART: [kat] HMAC-384Kdf
35,673,673 UART: [kat] LMS
36,864,056 UART: [kat] --
36,869,039 UART: [update-reset] ++
41,052,406 UART: [update-reset] Image verified using Vendor ECC Key Index 0
41,056,300 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
41,454,080 >>> mbox cmd response: success
41,456,040 UART: [update-reset] Copying MAN_2 To MAN_1
41,478,512 UART: [update-reset Success] --
41,483,823 UART: [state] Locking Datavault
41,488,261 UART: [state] Locking PCR0, PCR1 and PCR31
41,490,013 UART: [state] Locking ICCM
41,492,838 UART: [exit] Launching FMC @ 0x40000130
41,501,229 UART:
41,501,468 UART: Running Caliptra FMC ...
41,502,503 UART:
41,502,651 UART: [state] CFI Enabled
41,594,165 UART: [art] Extend RT PCRs Done
41,595,350 UART: [art] Lock RT PCRs Done
41,596,621 UART: [art] Populate DV Done
41,602,192 UART: [fht] FMC Alias Private Key: 7
41,603,887 UART: [art] Derive CDI
41,604,698 UART: [art] Store in slot 0x4
41,662,712 UART: [art] Derive Key Pair
41,663,765 UART: [art] Store priv key in slot 0x5
44,956,211 UART: [art] Derive Key Pair - Done
44,969,422 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,257,618 UART: [art] Erasing AUTHORITY.KEYID = 7
47,259,132 UART: [art] PUB.X = EDCBC79688650AA870ADD44464BDD24EDD2C38B2B882E8907B72653AA2DAA1DA3EB13D8DBE70DAC3E29CE4C1F457E279
47,266,402 UART: [art] PUB.Y = 0DFA0717AC1FD15063D50A463D4EA1B9B0BF716DDD97474EAA82B759E8A70353B66B7F81DFA27907487469D96F485C54
47,273,653 UART: [art] SIG.R = 0C08DAFCE019A3819006D9E41D0F2ECB14F615403393BC7ED7048FCBAD67B08E305FFAACD31F07EDA2DEF47FBF256D94
47,281,118 UART: [art] SIG.S = 9093E6EFE3C18FEC75DD54AADEDF5DD62360825A6C120CFAD3BC60256788626893F7E9F173B8666C7C00AA9B055A31DF
48,586,651 UART: Caliptra RT
48,587,365 UART: [state] CFI Enabled
49,007,398 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,807,284 ready_for_fw is high
3,807,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,983,083 >>> mbox cmd response: success
17,984,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,686,537 UART:
23,686,952 UART: Running Caliptra FMC ...
23,688,071 UART:
23,688,231 UART: [state] CFI Enabled
23,753,836 UART: [fht] FMC Alias Private Key: 7
26,094,468 UART: [art] Extend RT PCRs Done
26,095,701 UART: [art] Lock RT PCRs Done
26,097,276 UART: [art] Populate DV Done
26,102,756 UART: [fht] FMC Alias Private Key: 7
26,104,239 UART: [art] Derive CDI
26,105,000 UART: [art] Store in slot 0x4
26,161,426 UART: [art] Derive Key Pair
26,162,430 UART: [art] Store priv key in slot 0x5
29,454,696 UART: [art] Derive Key Pair - Done
29,467,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,756,301 UART: [art] Erasing AUTHORITY.KEYID = 7
31,757,806 UART: [art] PUB.X = 5306E7356A31A6F03401308C88124457542A15BFE3FB29C33B581AC6A5B48CC4C59391134A794F72AE4801355ED66E7E
31,765,100 UART: [art] PUB.Y = 2C9886BDDC32C66019009E15180A7950BEB6D30075E6C604941CFBCDCCC5B6F627AC0E6679F6E5CF93E18451056D2C98
31,772,265 UART: [art] SIG.R = ABAD28097C6392FE92B9ED695DA6EE8C2E7BF66D512C001C6071F8617EC74163DA095F5971673920AED90F0D239C75AF
31,779,638 UART: [art] SIG.S = 9F659FE348EE540BA43D3F816DEC10ECE2DE0890B7E329629814666E575D3D1B6A7A649BBB399934C4D980A69ED99095
33,084,740 UART: Caliptra RT
33,085,466 UART: [state] CFI Enabled
33,261,398 UART: [rt] RT listening for mailbox commands...
41,929,008 >>> mbox cmd response: success
41,964,710 UART:
41,965,011 UART: Running Caliptra FMC ...
41,966,135 UART:
41,966,307 UART: [state] CFI Enabled
42,069,086 UART: [art] Extend RT PCRs Done
42,070,281 UART: [art] Lock RT PCRs Done
42,071,813 UART: [art] Populate DV Done
42,077,231 UART: [fht] FMC Alias Private Key: 7
42,078,849 UART: [art] Derive CDI
42,079,673 UART: [art] Store in slot 0x4
42,137,967 UART: [art] Derive Key Pair
42,139,012 UART: [art] Store priv key in slot 0x5
45,431,348 UART: [art] Derive Key Pair - Done
45,444,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,733,444 UART: [art] Erasing AUTHORITY.KEYID = 7
47,734,969 UART: [art] PUB.X = D893A9F1EECD4101FAB9DD3BA139062F5843742F543EEE5A71038E016DBD9C672CEAFF4526128163689A867F48987566
47,742,242 UART: [art] PUB.Y = 8E85E9D912D2F0F9C84699E8A9A2622B7C12349021E25CFA0EB19BFD1C6B1113A7E46A66DE4E65E16B8158D0CDF7D34B
47,749,479 UART: [art] SIG.R = 8F5C9F6F2AD3FE6C86076620AC046667D4CE43CB2DBE08E07284E5AF614637E9655307CF14EC22C4F8EE39495B6EE43A
47,756,832 UART: [art] SIG.S = 039D45C7F3A8D8E23CBE2E8F7C90CD89FF1C59F8DAE16FA85BFAD79CC65463AB30BEE719D309E6DF0BA5CF750030BF76
49,061,480 UART: Caliptra RT
49,062,187 UART: [state] CFI Enabled
49,476,750 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,407 UART:
192,776 UART: Running Caliptra ROM ...
193,875 UART:
603,652 UART: [state] CFI Enabled
618,614 UART: [state] LifecycleState = Unprovisioned
620,574 UART: [state] DebugLocked = No
622,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,956 UART: [kat] SHA2-256
796,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,188 UART: [kat] ++
807,655 UART: [kat] sha1
819,109 UART: [kat] SHA2-256
821,763 UART: [kat] SHA2-384
828,808 UART: [kat] SHA2-512-ACC
831,206 UART: [kat] ECC-384
3,115,504 UART: [kat] HMAC-384Kdf
3,128,343 UART: [kat] LMS
4,318,441 UART: [kat] --
4,320,262 UART: [cold-reset] ++
4,322,495 UART: [fht] Storing FHT @ 0x50003400
4,332,693 UART: [idev] ++
4,333,250 UART: [idev] CDI.KEYID = 6
4,334,132 UART: [idev] SUBJECT.KEYID = 7
4,335,440 UART: [idev] UDS.KEYID = 0
4,336,520 ready_for_fw is high
4,336,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,772 UART: [idev] Erasing UDS.KEYID = 0
7,622,303 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,485 UART: [idev] --
7,646,610 UART: [ldev] ++
7,647,174 UART: [ldev] CDI.KEYID = 6
7,648,136 UART: [ldev] SUBJECT.KEYID = 5
7,649,339 UART: [ldev] AUTHORITY.KEYID = 7
7,650,615 UART: [ldev] FE.KEYID = 1
7,662,872 UART: [ldev] Erasing FE.KEYID = 1
10,956,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,904 UART: [ldev] --
13,316,152 UART: [fwproc] Waiting for Commands...
13,318,155 UART: [fwproc] Received command 0x46574c44
13,320,342 UART: [fwproc] Received Image of size 118548 bytes
17,417,900 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,771 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,938 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,739 >>> mbox cmd response: success
17,896,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,045,815 UART: [afmc] ++
18,046,460 UART: [afmc] CDI.KEYID = 6
18,047,383 UART: [afmc] SUBJECT.KEYID = 7
18,048,488 UART: [afmc] AUTHORITY.KEYID = 5
21,219,449 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,689 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,949 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,381 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,068 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,523 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,196 UART: [afmc] --
23,588,566 UART: [cold-reset] --
23,593,386 UART: [state] Locking Datavault
23,598,686 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,431 UART: [state] Locking ICCM
23,602,948 UART: [exit] Launching FMC @ 0x40000130
23,611,330 UART:
23,611,558 UART: Running Caliptra FMC ...
23,612,653 UART:
23,612,805 UART: [state] CFI Enabled
23,620,410 UART: [fht] FMC Alias Private Key: 7
25,960,294 UART: [art] Extend RT PCRs Done
25,961,515 UART: [art] Lock RT PCRs Done
25,963,081 UART: [art] Populate DV Done
25,968,490 UART: [fht] FMC Alias Private Key: 7
25,970,147 UART: [art] Derive CDI
25,970,955 UART: [art] Store in slot 0x4
26,013,434 UART: [art] Derive Key Pair
26,014,431 UART: [art] Store priv key in slot 0x5
29,257,076 UART: [art] Derive Key Pair - Done
29,270,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,916 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,423 UART: [art] PUB.X = 15A70F15216FDEC3F7AB665408FD7481DE6EFC088D60F6ED36C42B3A7791CEC5D0E9D6E8FC8A9A71E4123B2A3BCC7774
31,558,729 UART: [art] PUB.Y = EA8715A67C7EF4649D0D8B312479E309E049DE5184C5EBDA52F47A34EDABF07BB40278C52445AE8E1E9D7EB21A27C1EE
31,566,022 UART: [art] SIG.R = 22FC67E7C30EFD35563026AD689F4DB56E7313F5ECBF021ABA1F69F532F7084DEAD5F887BB4A1B05134F0F9EF2FFD709
31,573,411 UART: [art] SIG.S = E743027D294DED13CD86F4C1C071D3D63188380CEEC9EEFA27E2454160C57424D09483D123D8CE1DAD671E867D469E88
32,878,625 UART: Caliptra RT
32,879,324 UART: [state] CFI Enabled
33,011,892 UART: [rt] RT listening for mailbox commands...
33,015,143 UART:
33,015,398 UART: Running Caliptra ROM ...
33,016,521 UART:
33,016,791 UART: [state] CFI Enabled
33,033,159 UART: [state] LifecycleState = Unprovisioned
33,035,037 UART: [state] DebugLocked = No
33,037,118 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,042,820 UART: [kat] SHA2-256
33,212,508 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,223,059 UART: [kat] ++
33,223,509 UART: [kat] sha1
33,235,337 UART: [kat] SHA2-256
33,238,093 UART: [kat] SHA2-384
33,243,704 UART: [kat] SHA2-512-ACC
33,246,047 UART: [kat] ECC-384
35,529,562 UART: [kat] HMAC-384Kdf
35,541,687 UART: [kat] LMS
36,731,784 UART: [kat] --
36,736,603 UART: [update-reset] ++
40,925,217 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,928,506 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
41,326,300 >>> mbox cmd response: success
41,326,871 UART: [update-reset] Copying MAN_2 To MAN_1
41,349,313 UART: [update-reset Success] --
41,354,348 UART: [state] Locking Datavault
41,357,969 UART: [state] Locking PCR0, PCR1 and PCR31
41,359,713 UART: [state] Locking ICCM
41,361,370 UART: [exit] Launching FMC @ 0x40000130
41,369,753 UART:
41,369,978 UART: Running Caliptra FMC ...
41,371,020 UART:
41,371,168 UART: [state] CFI Enabled
41,415,293 UART: [art] Extend RT PCRs Done
41,416,475 UART: [art] Lock RT PCRs Done
41,417,944 UART: [art] Populate DV Done
41,423,294 UART: [fht] FMC Alias Private Key: 7
41,424,985 UART: [art] Derive CDI
41,425,790 UART: [art] Store in slot 0x4
41,468,168 UART: [art] Derive Key Pair
41,469,204 UART: [art] Store priv key in slot 0x5
44,711,583 UART: [art] Derive Key Pair - Done
44,724,582 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,004,647 UART: [art] Erasing AUTHORITY.KEYID = 7
47,006,153 UART: [art] PUB.X = E88E810A81222A97411169B0E3645D1C23CE7C604298DF9053519635999D6930B5DB3AD3882E340A1985C498D3C87801
47,013,358 UART: [art] PUB.Y = 0FEA3D5F66D70F4458AD2741EB7DFFC08C53B5D4C21FB78B994E49BA8BE76F8E7E71C596782B7456B2117ECB27B1275F
47,020,666 UART: [art] SIG.R = E753C0A747039478D38DFF7F7902E9850F83659B31AB25BBE5FBB8925E87E9455E0707BDA759A0CD5314C6D297622E91
47,028,061 UART: [art] SIG.S = 39BA7859F8E8EC0F00FD50191F67A69BB4E01D52A1E2E337BCF157014BBFFAA1FAFBB03BCAC8A2118A5E0C8C9A1BBC0E
48,333,357 UART: Caliptra RT
48,334,068 UART: [state] CFI Enabled
48,712,351 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
4,121,889 ready_for_fw is high
4,122,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,148,972 >>> mbox cmd response: success
18,150,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,793,274 UART:
23,793,712 UART: Running Caliptra FMC ...
23,794,818 UART:
23,794,970 UART: [state] CFI Enabled
23,802,855 UART: [fht] FMC Alias Private Key: 7
26,142,234 UART: [art] Extend RT PCRs Done
26,143,469 UART: [art] Lock RT PCRs Done
26,145,180 UART: [art] Populate DV Done
26,150,711 UART: [fht] FMC Alias Private Key: 7
26,152,263 UART: [art] Derive CDI
26,153,046 UART: [art] Store in slot 0x4
26,195,911 UART: [art] Derive Key Pair
26,196,908 UART: [art] Store priv key in slot 0x5
29,438,904 UART: [art] Derive Key Pair - Done
29,451,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,882 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,387 UART: [art] PUB.X = 3973758AC01256EAEA877BA2407ED67B1BF9C34833E72AEEDFD4F5AF327285205EB16D3D92D32EAE37D00908E0F66D97
31,740,679 UART: [art] PUB.Y = 0488A61A225DFFCA272DCED137BF0D0F8513EA4C958A5DEDA846C6CE2DACF75B112297C788410EECB2F612767F876813
31,748,019 UART: [art] SIG.R = B73577E57FA7BD3833BC9719505350E786D93E6DCFB5F6678A92FFFD4D75A3F6CBCD6880ACB59DFF84F34F714BE78892
31,755,381 UART: [art] SIG.S = E2BCD3F291503FF3AAAA3AB7D6374A5AE3FB1082D7FD1484BC3D9AD7A294EB7647EEFC6F3461374752B392F7591EC99F
33,061,005 UART: Caliptra RT
33,061,733 UART: [state] CFI Enabled
33,194,813 UART: [rt] RT listening for mailbox commands...
41,797,308 >>> mbox cmd response: success
41,833,345 UART:
41,833,646 UART: Running Caliptra FMC ...
41,834,786 UART:
41,834,951 UART: [state] CFI Enabled
41,879,077 UART: [art] Extend RT PCRs Done
41,880,223 UART: [art] Lock RT PCRs Done
41,881,909 UART: [art] Populate DV Done
41,887,567 UART: [fht] FMC Alias Private Key: 7
41,889,266 UART: [art] Derive CDI
41,890,089 UART: [art] Store in slot 0x4
41,932,746 UART: [art] Derive Key Pair
41,933,742 UART: [art] Store priv key in slot 0x5
45,175,992 UART: [art] Derive Key Pair - Done
45,188,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,469,442 UART: [art] Erasing AUTHORITY.KEYID = 7
47,470,969 UART: [art] PUB.X = B86980970EA9A05A8A134B02F6E3D2876A168E42724F683FB2F53DFAB9F9852776B19BC4D4C5A2BE902412F0365FCC28
47,478,219 UART: [art] PUB.Y = E11DA752826CA1D4B80EF03B3AC7734A60F4D997951D155C1CA91528A532B5CBCE40A6101F576F621EC4158EC90E90E1
47,485,477 UART: [art] SIG.R = 903EB1E7C205EF0A050CB6F53F7D85BC4E432CE0B6A472A743E133BCEC9A7329B28A7D6F7C1552428793F08ED565C542
47,492,895 UART: [art] SIG.S = C90A16C41F3B71D9E90C8D7849D9761CCD9B679CC500EDBEB6AC83901807655E815429B6BB9CA92C1B032EBE92E87D55
48,797,894 UART: Caliptra RT
48,798,600 UART: [state] CFI Enabled
49,173,434 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,095 UART:
192,464 UART: Running Caliptra ROM ...
193,631 UART:
193,788 UART: [state] CFI Enabled
263,802 UART: [state] LifecycleState = Unprovisioned
265,783 UART: [state] DebugLocked = No
267,878 UART: [state] WD Timer not started. Device not locked for debugging
270,954 UART: [kat] SHA2-256
450,638 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,423 UART: [kat] ++
461,952 UART: [kat] sha1
472,189 UART: [kat] SHA2-256
474,904 UART: [kat] SHA2-384
479,390 UART: [kat] SHA2-512-ACC
481,758 UART: [kat] ECC-384
2,938,374 UART: [kat] HMAC-384Kdf
2,963,161 UART: [kat] LMS
3,439,630 UART: [kat] --
3,441,998 UART: [cold-reset] ++
3,442,988 UART: [fht] FHT @ 0x50003400
3,456,024 UART: [idev] ++
3,456,660 UART: [idev] CDI.KEYID = 6
3,457,578 UART: [idev] SUBJECT.KEYID = 7
3,458,838 UART: [idev] UDS.KEYID = 0
3,459,760 ready_for_fw is high
3,459,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,609,938 UART: [idev] Erasing UDS.KEYID = 0
5,980,106 UART: [idev] Sha1 KeyId Algorithm
6,004,369 UART: [idev] --
6,010,053 UART: [ldev] ++
6,010,625 UART: [ldev] CDI.KEYID = 6
6,011,564 UART: [ldev] SUBJECT.KEYID = 5
6,012,775 UART: [ldev] AUTHORITY.KEYID = 7
6,014,057 UART: [ldev] FE.KEYID = 1
6,050,780 UART: [ldev] Erasing FE.KEYID = 1
8,556,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,293,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,309,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,325,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,340,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,361,699 UART: [ldev] --
10,367,039 UART: [fwproc] Wait for Commands...
10,369,729 UART: [fwproc] Recv command 0x46574c44
10,371,709 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,025 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,033 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,834 >>> mbox cmd response: success
14,348,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,497,410 UART: [afmc] ++
14,498,056 UART: [afmc] CDI.KEYID = 6
14,498,975 UART: [afmc] SUBJECT.KEYID = 7
14,500,030 UART: [afmc] AUTHORITY.KEYID = 5
16,885,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,609,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,612,085 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,627,885 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,643,984 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,659,534 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,684,084 UART: [afmc] --
18,687,708 UART: [cold-reset] --
18,692,601 UART: [state] Locking Datavault
18,698,063 UART: [state] Locking PCR0, PCR1 and PCR31
18,699,813 UART: [state] Locking ICCM
18,701,097 UART: [exit] Launching FMC @ 0x40000130
18,709,492 UART:
18,709,730 UART: Running Caliptra FMC ...
18,710,847 UART:
18,711,007 UART: [state] CFI Enabled
18,767,094 UART: [fht] FMC Alias Private Key: 7
20,534,001 UART: [art] Extend RT PCRs Done
20,535,228 UART: [art] Lock RT PCRs Done
20,536,792 UART: [art] Populate DV Done
20,542,096 UART: [fht] FMC Alias Private Key: 7
20,543,687 UART: [art] Derive CDI
20,544,496 UART: [art] Store in slot 0x4
20,599,839 UART: [art] Derive Key Pair
20,600,880 UART: [art] Store priv key in slot 0x5
23,063,872 UART: [art] Derive Key Pair - Done
23,076,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,789,323 UART: [art] Erasing AUTHORITY.KEYID = 7
24,790,829 UART: [art] PUB.X = D0D7251F5BDB6C4442D2DB230DEF4ED2F53CBBEC4BF3F1EA338438E36C9C249370A87C3F8B8212863848AC0A8F30B85F
24,798,077 UART: [art] PUB.Y = DDF9FA83F290A7387CD0DF65D45D447C0416E59267318AAB2021F38D5F3975C336E99D43FB8E343432AE37C1B00C8334
24,805,331 UART: [art] SIG.R = 7FFEC54D3AFB706CA4F08035CF68AF8EEDFD6345527B635FECFA21F076F566EF1490A73919BED3A471686A90529CF95C
24,812,783 UART: [art] SIG.S = 0AAD86AE97EFE1486A2CCF0E7D68A5CA928D5039FF01051C66DFE9792B63A0FE4DDEF3DC22447B3053891E797B9BA117
25,792,128 UART: Caliptra RT
25,792,840 UART: [state] CFI Enabled
25,972,842 UART: [rt] RT listening for mailbox commands...
25,975,643 UART:
25,975,810 UART: Running Caliptra ROM ...
25,976,919 UART:
25,977,072 UART: [state] CFI Enabled
26,046,114 UART: [state] LifecycleState = Unprovisioned
26,048,042 UART: [state] DebugLocked = No
26,050,701 UART: [state] WD Timer not started. Device not locked for debugging
26,055,409 UART: [kat] SHA2-256
26,235,066 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,245,894 UART: [kat] ++
26,246,348 UART: [kat] sha1
26,258,705 UART: [kat] SHA2-256
26,261,399 UART: [kat] SHA2-384
26,267,906 UART: [kat] SHA2-512-ACC
26,270,263 UART: [kat] ECC-384
28,730,169 UART: [kat] HMAC-384Kdf
28,753,094 UART: [kat] LMS
29,229,559 UART: [kat] --
29,234,072 UART: [update-reset] ++
32,731,219 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,735,404 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,133,009 >>> mbox cmd response: success
33,133,431 UART: [update-reset] Copying MAN_2 To MAN_1
33,170,528 UART: [update-reset Success] --
33,177,012 UART: [state] Locking Datavault
33,179,740 UART: [state] Locking PCR0, PCR1 and PCR31
33,181,437 UART: [state] Locking ICCM
33,183,093 UART: [exit] Launching FMC @ 0x40000130
33,191,489 UART:
33,191,719 UART: Running Caliptra FMC ...
33,192,754 UART:
33,192,900 UART: [state] CFI Enabled
33,286,399 UART: [art] Extend RT PCRs Done
33,287,575 UART: [art] Lock RT PCRs Done
33,289,165 UART: [art] Populate DV Done
33,294,732 UART: [fht] FMC Alias Private Key: 7
33,296,370 UART: [art] Derive CDI
33,297,176 UART: [art] Store in slot 0x4
33,355,785 UART: [art] Derive Key Pair
33,356,826 UART: [art] Store priv key in slot 0x5
35,819,474 UART: [art] Derive Key Pair - Done
35,832,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
37,545,770 UART: [art] Erasing AUTHORITY.KEYID = 7
37,547,292 UART: [art] PUB.X = 54F12B7FBD730E728DD206636607D2C4B92D094BB55784770EDBE92FDA713170146B1F929E7EB5F90EA6D58C17F22181
37,554,517 UART: [art] PUB.Y = 3E061AA3BFA1EFCBAE24B3E210A0DE4F73F47D382C6E393AFD43A582FF3F8C5DD86945885A99BC9191CC90599AD3DB4B
37,561,833 UART: [art] SIG.R = 994BDFA7910BE9F550CDCF5F5439D1F0B0DFBD98EA7CD0D4AED31D2EDB68ED502DE16DB6FCB07F98CF431EDA191B9B0B
37,569,298 UART: [art] SIG.S = F463A6B991C3EE683BA638F7EC1368D442C0D0FD86EAB9588AB81AA3A91D5819DA7C62A489086C423060919BDFF97890
38,548,681 UART: Caliptra RT
38,549,392 UART: [state] CFI Enabled
38,969,092 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,461,524 ready_for_fw is high
3,461,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,193 >>> mbox cmd response: success
14,252,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,540,397 UART:
18,540,794 UART: Running Caliptra FMC ...
18,541,946 UART:
18,542,111 UART: [state] CFI Enabled
18,605,474 UART: [fht] FMC Alias Private Key: 7
20,371,493 UART: [art] Extend RT PCRs Done
20,372,716 UART: [art] Lock RT PCRs Done
20,374,365 UART: [art] Populate DV Done
20,379,828 UART: [fht] FMC Alias Private Key: 7
20,381,472 UART: [art] Derive CDI
20,382,279 UART: [art] Store in slot 0x4
20,437,718 UART: [art] Derive Key Pair
20,438,752 UART: [art] Store priv key in slot 0x5
22,901,850 UART: [art] Derive Key Pair - Done
22,914,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,359 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,016 UART: [art] PUB.X = 28EA98F43172E3F761A5687755FBEBE296F9E8C539828F89964D03A8AC67C4B9EFB71126E5B0DDE7B01C6F75F6A7C163
24,636,119 UART: [art] PUB.Y = 1B7D2ECE4777995772B50EB7CB09C042CB757F0312D38CC5022D6AACFDF5C63ACFD7EF67F4921F2747884F2977071067
24,643,394 UART: [art] SIG.R = 6766E591BF7028D0A4B969E434F58EA70AC3A1ADBBF07923BFB33B0D14096131169B124AC1D06C0445898EF990A955A4
24,650,730 UART: [art] SIG.S = F840323A5D74229FC7FE5D58F949EC7E0B7B88481C8975A84400602F7FB78EF5F7D1DA802EC4D08D505B7C25F155D885
25,629,216 UART: Caliptra RT
25,629,932 UART: [state] CFI Enabled
25,810,109 UART: [rt] RT listening for mailbox commands...
32,980,267 >>> mbox cmd response: success
33,015,812 UART:
33,016,091 UART: Running Caliptra FMC ...
33,017,123 UART:
33,017,271 UART: [state] CFI Enabled
33,103,713 UART: [art] Extend RT PCRs Done
33,104,902 UART: [art] Lock RT PCRs Done
33,106,492 UART: [art] Populate DV Done
33,111,901 UART: [fht] FMC Alias Private Key: 7
33,113,589 UART: [art] Derive CDI
33,114,330 UART: [art] Store in slot 0x4
33,173,591 UART: [art] Derive Key Pair
33,174,599 UART: [art] Store priv key in slot 0x5
35,637,216 UART: [art] Derive Key Pair - Done
35,650,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
37,363,389 UART: [art] Erasing AUTHORITY.KEYID = 7
37,365,186 UART: [art] PUB.X = 20E496F566E515DDFC3922C88F55F8D537A43A48B24D0719C389722551305CE62518C23DAC0A82BDF825A5C70D8A32FF
37,372,171 UART: [art] PUB.Y = 759CDE5370469DC6C45D2F99F5012BC2FDF54165EB8BD58169A4204BD256D56DF0F3AAA75D60DFDB4D880C1AE1F5CE15
37,379,457 UART: [art] SIG.R = 73CA318EB0735B96FD902FA11832113108B3719806A0462F7EDD099EA377F833E788BBF7EDDB157E8448F5EE3370B1BC
37,386,789 UART: [art] SIG.S = 0246103F4191B972B6699E7AD57D40EF316ABA2CDB334FA025BBD14FAE01F3A302DA7F8F4169BEF3354D31FCD28165AF
38,365,460 UART: Caliptra RT
38,366,157 UART: [state] CFI Enabled
38,788,778 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,405 UART:
192,753 UART: Running Caliptra ROM ...
193,842 UART:
603,493 UART: [state] CFI Enabled
619,534 UART: [state] LifecycleState = Unprovisioned
621,475 UART: [state] DebugLocked = No
622,712 UART: [state] WD Timer not started. Device not locked for debugging
625,834 UART: [kat] SHA2-256
805,422 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,220 UART: [kat] ++
816,687 UART: [kat] sha1
827,635 UART: [kat] SHA2-256
830,291 UART: [kat] SHA2-384
836,714 UART: [kat] SHA2-512-ACC
839,093 UART: [kat] ECC-384
3,283,763 UART: [kat] HMAC-384Kdf
3,297,295 UART: [kat] LMS
3,773,818 UART: [kat] --
3,777,030 UART: [cold-reset] ++
3,778,252 UART: [fht] FHT @ 0x50003400
3,789,802 UART: [idev] ++
3,790,365 UART: [idev] CDI.KEYID = 6
3,791,284 UART: [idev] SUBJECT.KEYID = 7
3,792,528 UART: [idev] UDS.KEYID = 0
3,793,453 ready_for_fw is high
3,793,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,670 UART: [idev] Erasing UDS.KEYID = 0
6,271,867 UART: [idev] Sha1 KeyId Algorithm
6,294,986 UART: [idev] --
6,299,795 UART: [ldev] ++
6,300,370 UART: [ldev] CDI.KEYID = 6
6,301,345 UART: [ldev] SUBJECT.KEYID = 5
6,302,505 UART: [ldev] AUTHORITY.KEYID = 7
6,303,789 UART: [ldev] FE.KEYID = 1
6,314,714 UART: [ldev] Erasing FE.KEYID = 1
8,791,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,999 UART: [ldev] --
10,588,128 UART: [fwproc] Wait for Commands...
10,590,411 UART: [fwproc] Recv command 0x46574c44
10,592,402 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,791 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,847 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,909 >>> mbox cmd response: success
14,564,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,713,469 UART: [afmc] ++
14,714,293 UART: [afmc] CDI.KEYID = 6
14,715,232 UART: [afmc] SUBJECT.KEYID = 7
14,716,354 UART: [afmc] AUTHORITY.KEYID = 5
17,070,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,358 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,084 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,159 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,689 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,929 UART: [afmc] --
18,869,983 UART: [cold-reset] --
18,873,690 UART: [state] Locking Datavault
18,877,599 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,366 UART: [state] Locking ICCM
18,881,575 UART: [exit] Launching FMC @ 0x40000130
18,889,977 UART:
18,890,215 UART: Running Caliptra FMC ...
18,891,324 UART:
18,891,493 UART: [state] CFI Enabled
18,899,547 UART: [fht] FMC Alias Private Key: 7
20,665,530 UART: [art] Extend RT PCRs Done
20,666,744 UART: [art] Lock RT PCRs Done
20,668,665 UART: [art] Populate DV Done
20,674,182 UART: [fht] FMC Alias Private Key: 7
20,675,730 UART: [art] Derive CDI
20,676,490 UART: [art] Store in slot 0x4
20,719,137 UART: [art] Derive Key Pair
20,720,176 UART: [art] Store priv key in slot 0x5
23,147,301 UART: [art] Derive Key Pair - Done
23,159,930 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,991 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,477 UART: [art] PUB.X = C4FE9517135199C39B2405D770068EEB9F7FD9E0731C48DE55A9FE06D04C167C364A2E17C75655074CE7E1B387AB85F0
24,874,781 UART: [art] PUB.Y = 81F620BBA031D9B3FC2EE39465E21294A9C3A34EB6BF6C3D82B06A098F6760EFF1F1667D9207BA7A040AA938219215B3
24,882,065 UART: [art] SIG.R = 46F92C085EF6F952532935D92103AA4DB8D518F46A085209EDDB2EA3BE881AB0601FFF79917A36F5D311484568601855
24,889,407 UART: [art] SIG.S = DCC758B1E06973BD027DFA77867C26B03BDE2B96F79B65C88B6566E1B6E9DEFB953D233B6C21EA98D3BFDC600018481A
25,868,211 UART: Caliptra RT
25,868,946 UART: [state] CFI Enabled
26,001,095 UART: [rt] RT listening for mailbox commands...
26,004,221 UART:
26,004,398 UART: Running Caliptra ROM ...
26,005,451 UART:
26,005,877 UART: [state] CFI Enabled
26,020,147 UART: [state] LifecycleState = Unprovisioned
26,022,100 UART: [state] DebugLocked = No
26,024,558 UART: [state] WD Timer not started. Device not locked for debugging
26,029,111 UART: [kat] SHA2-256
26,208,787 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,219,579 UART: [kat] ++
26,220,119 UART: [kat] sha1
26,232,201 UART: [kat] SHA2-256
26,234,891 UART: [kat] SHA2-384
26,240,913 UART: [kat] SHA2-512-ACC
26,243,289 UART: [kat] ECC-384
28,685,376 UART: [kat] HMAC-384Kdf
28,697,648 UART: [kat] LMS
29,174,137 UART: [kat] --
29,179,497 UART: [update-reset] ++
32,670,084 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,673,081 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,070,709 >>> mbox cmd response: success
33,072,303 UART: [update-reset] Copying MAN_2 To MAN_1
33,109,433 UART: [update-reset Success] --
33,113,881 UART: [state] Locking Datavault
33,116,682 UART: [state] Locking PCR0, PCR1 and PCR31
33,118,396 UART: [state] Locking ICCM
33,120,284 UART: [exit] Launching FMC @ 0x40000130
33,128,681 UART:
33,128,919 UART: Running Caliptra FMC ...
33,130,038 UART:
33,130,206 UART: [state] CFI Enabled
33,174,283 UART: [art] Extend RT PCRs Done
33,175,429 UART: [art] Lock RT PCRs Done
33,176,767 UART: [art] Populate DV Done
33,182,175 UART: [fht] FMC Alias Private Key: 7
33,183,763 UART: [art] Derive CDI
33,184,575 UART: [art] Store in slot 0x4
33,227,388 UART: [art] Derive Key Pair
33,228,428 UART: [art] Store priv key in slot 0x5
35,655,028 UART: [art] Derive Key Pair - Done
35,668,029 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
37,373,986 UART: [art] Erasing AUTHORITY.KEYID = 7
37,375,471 UART: [art] PUB.X = 51E11078C6A3FE066881D94F4A91FBB9638DE1661E7A57BF0AD218BD21E6FFD03D27DD5B861F4E73AFD95EA50B80A600
37,382,761 UART: [art] PUB.Y = A4781DF74B127DC2BBD9D164E00980FDADF7E5E39BE1E7C4B528951AA159E4E3CC575D9596E7EBC3E5038F1E513CD0A6
37,390,052 UART: [art] SIG.R = 69FAFF5EC4C58794DD1297F3AB05649D7CA07C7454B76554946CACD14472E8522A755C934F1C43494B94EE7D3CA3AB9C
37,397,466 UART: [art] SIG.S = C202710CAECD7A4EEF04C686D0A882F2652C933C402AC78D78C5BBBCCAC6A8E0FD26B040C7D10943EE889E7F82FC4576
38,376,105 UART: Caliptra RT
38,376,812 UART: [state] CFI Enabled
38,749,322 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,778,996 ready_for_fw is high
3,779,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,434 >>> mbox cmd response: success
14,450,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,692,373 UART:
18,692,798 UART: Running Caliptra FMC ...
18,693,911 UART:
18,694,065 UART: [state] CFI Enabled
18,702,030 UART: [fht] FMC Alias Private Key: 7
20,468,001 UART: [art] Extend RT PCRs Done
20,469,228 UART: [art] Lock RT PCRs Done
20,471,064 UART: [art] Populate DV Done
20,476,543 UART: [fht] FMC Alias Private Key: 7
20,478,258 UART: [art] Derive CDI
20,478,999 UART: [art] Store in slot 0x4
20,521,330 UART: [art] Derive Key Pair
20,522,369 UART: [art] Store priv key in slot 0x5
22,949,439 UART: [art] Derive Key Pair - Done
22,962,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,647 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,145 UART: [art] PUB.X = B280F355D755FC9E296EA0600668A4A18EA878259BEC3C9ECC2F4379F7F0D198280D5886C67F030E1169CBAD5095172D
24,677,406 UART: [art] PUB.Y = 53A2D003D6B4F025CDB8175D297F19D48E8F54257B553B89802639A02EBEDFC55B30EECA2F5023F99A112D216A7C14E1
24,684,620 UART: [art] SIG.R = 83E39E88169A742521E3074B45C5657E09FA054581917CEC3D7A3F926AB4B60A40BB975407780360FD9DA8BF1FC8799C
24,692,017 UART: [art] SIG.S = A089ABEE17F4D7062573ED136CE61ABABC4E5B7EF8BAC5F7EC4F19E25B7E09BCE9F70D4C4F318FFD11D9CE218CAB654B
25,670,572 UART: Caliptra RT
25,671,273 UART: [state] CFI Enabled
25,803,741 UART: [rt] RT listening for mailbox commands...
32,877,562 >>> mbox cmd response: success
32,910,526 UART:
32,910,819 UART: Running Caliptra FMC ...
32,911,942 UART:
32,912,107 UART: [state] CFI Enabled
32,955,853 UART: [art] Extend RT PCRs Done
32,957,007 UART: [art] Lock RT PCRs Done
32,958,622 UART: [art] Populate DV Done
32,964,031 UART: [fht] FMC Alias Private Key: 7
32,965,641 UART: [art] Derive CDI
32,966,414 UART: [art] Store in slot 0x4
33,009,180 UART: [art] Derive Key Pair
33,010,229 UART: [art] Store priv key in slot 0x5
35,436,717 UART: [art] Derive Key Pair - Done
35,449,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
37,155,905 UART: [art] Erasing AUTHORITY.KEYID = 7
37,157,428 UART: [art] PUB.X = CD6117238D3E924E0EA2DBD7E3A7D54699AB58F65F9DE2F3EFE9C09DF7D263021F0AD0EB3D81160D8ABE58A0900BC942
37,164,688 UART: [art] PUB.Y = E334F1C67F34280AC36913CDC87EAB821074385FFF8DE49958C29E16A86CFEE549DDDB9AC57045E232A8645EF8607C9A
37,171,932 UART: [art] SIG.R = EF4A9F745C706076EFC327B50C5D96188882B85FC16189EB5046A9EF8B34F6A9DBC80389B9FBBA689F8022C2377D56C3
37,179,332 UART: [art] SIG.S = C81919C40DED6751868E19E093FD5A1017336C8E90A0651B7627EB6AC3ADA850BAE70A10E27E52A7126A7D45AAC76753
38,158,691 UART: Caliptra RT
38,159,390 UART: [state] CFI Enabled
38,534,500 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,226 UART:
192,581 UART: Running Caliptra ROM ...
193,745 UART:
193,901 UART: [state] CFI Enabled
265,284 UART: [state] LifecycleState = Unprovisioned
267,702 UART: [state] DebugLocked = No
269,662 UART: [state] WD Timer not started. Device not locked for debugging
274,329 UART: [kat] SHA2-256
464,195 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,945 UART: [kat] ++
475,429 UART: [kat] sha1
487,510 UART: [kat] SHA2-256
490,531 UART: [kat] SHA2-384
497,230 UART: [kat] SHA2-512-ACC
499,821 UART: [kat] ECC-384
2,946,833 UART: [kat] HMAC-384Kdf
2,972,487 UART: [kat] LMS
3,504,254 UART: [kat] --
3,507,484 UART: [cold-reset] ++
3,509,355 UART: [fht] FHT @ 0x50003400
3,520,726 UART: [idev] ++
3,521,446 UART: [idev] CDI.KEYID = 6
3,522,478 UART: [idev] SUBJECT.KEYID = 7
3,523,581 UART: [idev] UDS.KEYID = 0
3,524,510 ready_for_fw is high
3,524,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,311 UART: [idev] Erasing UDS.KEYID = 0
6,031,467 UART: [idev] Sha1 KeyId Algorithm
6,054,187 UART: [idev] --
6,060,234 UART: [ldev] ++
6,060,973 UART: [ldev] CDI.KEYID = 6
6,061,886 UART: [ldev] SUBJECT.KEYID = 5
6,063,046 UART: [ldev] AUTHORITY.KEYID = 7
6,064,282 UART: [ldev] FE.KEYID = 1
6,103,079 UART: [ldev] Erasing FE.KEYID = 1
8,609,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,204 UART: [ldev] --
10,417,684 UART: [fwproc] Wait for Commands...
10,419,883 UART: [fwproc] Recv command 0x46574c44
10,422,133 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,000,750 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,361 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,685,519 >>> mbox cmd response: success
14,687,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,836,906 UART: [afmc] ++
14,837,575 UART: [afmc] CDI.KEYID = 6
14,838,466 UART: [afmc] SUBJECT.KEYID = 7
14,839,571 UART: [afmc] AUTHORITY.KEYID = 5
17,219,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,965,261 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,967,223 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,982,287 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,997,442 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,012,321 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,035,661 UART: [afmc] --
19,038,561 UART: [cold-reset] --
19,042,380 UART: [state] Locking Datavault
19,049,194 UART: [state] Locking PCR0, PCR1 and PCR31
19,051,382 UART: [state] Locking ICCM
19,053,107 UART: [exit] Launching FMC @ 0x40000130
19,061,775 UART:
19,062,010 UART: Running Caliptra FMC ...
19,063,113 UART:
19,063,275 UART: [state] CFI Enabled
19,121,923 UART: [fht] FMC Alias Private Key: 7
20,889,206 UART: [art] Extend RT PCRs Done
20,890,423 UART: [art] Lock RT PCRs Done
20,892,159 UART: [art] Populate DV Done
20,897,351 UART: [fht] FMC Alias Private Key: 7
20,899,053 UART: [art] Derive CDI
20,899,792 UART: [art] Store in slot 0x4
20,954,715 UART: [art] Derive Key Pair
20,955,752 UART: [art] Store priv key in slot 0x5
23,418,698 UART: [art] Derive Key Pair - Done
23,431,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,144,698 UART: [art] Erasing AUTHORITY.KEYID = 7
25,146,199 UART: [art] PUB.X = E5E0E057AE3BC2FAAFE9D29A8AF628AF99B6710400057E7D51DEA8F06F1448C9E81CA4FD682DDC0F98E32AF435297778
25,153,471 UART: [art] PUB.Y = 2F4A753F1495D2860F035E49F3E0D0D62151898FFA4C0F59C37D082BB8012B3A9F224F1E5226284D15FDF9DDA73800A6
25,160,720 UART: [art] SIG.R = 0D16AD06F5282A5B6C489072C9C8D1108C695FE51DF048A2B0238182F525D1F65BA442F08BBDAF33F4DB717BB6BBC0F6
25,168,075 UART: [art] SIG.S = 4537AA88A1C5B61B2D5EC1D2307DFB9C39E98124FF50CE73E81C6DB7E45323653F5081B3057E3CF056F3727EC194AAFD
26,147,083 UART: Caliptra RT
26,147,807 UART: [state] CFI Enabled
26,328,883 UART: [rt] RT listening for mailbox commands...
26,332,219 UART:
26,332,468 UART: Running Caliptra ROM ...
26,333,571 UART:
26,333,728 UART: [state] CFI Enabled
26,400,384 UART: [state] LifecycleState = Unprovisioned
26,402,419 UART: [state] DebugLocked = No
26,404,233 UART: [state] WD Timer not started. Device not locked for debugging
26,408,288 UART: [kat] SHA2-256
26,598,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,608,899 UART: [kat] ++
26,609,444 UART: [kat] sha1
26,620,605 UART: [kat] SHA2-256
26,623,612 UART: [kat] SHA2-384
26,630,358 UART: [kat] SHA2-512-ACC
26,632,961 UART: [kat] ECC-384
29,085,264 UART: [kat] HMAC-384Kdf
29,109,141 UART: [kat] LMS
29,640,707 UART: [kat] --
29,645,064 UART: [update-reset] ++
33,155,367 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,158,702 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,788,461 >>> mbox cmd response: success
33,789,773 UART: [update-reset] Copying MAN_2 To MAN_1
33,827,287 UART: [update-reset Success] --
33,832,324 UART: [state] Locking Datavault
33,835,782 UART: [state] Locking PCR0, PCR1 and PCR31
33,837,992 UART: [state] Locking ICCM
33,840,955 UART: [exit] Launching FMC @ 0x40000130
33,849,571 UART:
33,849,801 UART: Running Caliptra FMC ...
33,850,902 UART:
33,851,058 UART: [state] CFI Enabled
33,941,172 UART: [art] Extend RT PCRs Done
33,942,353 UART: [art] Lock RT PCRs Done
33,943,916 UART: [art] Populate DV Done
33,949,104 UART: [fht] FMC Alias Private Key: 7
33,950,761 UART: [art] Derive CDI
33,951,578 UART: [art] Store in slot 0x4
34,009,966 UART: [art] Derive Key Pair
34,011,011 UART: [art] Store priv key in slot 0x5
36,474,197 UART: [art] Derive Key Pair - Done
36,487,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,199,029 UART: [art] Erasing AUTHORITY.KEYID = 7
38,200,540 UART: [art] PUB.X = BC66BDAF2D64E2D441815642E99DF0C6F167090D7802BA7BF172C18D5B76167B42AEE69FC42071F11AA7A59A46D515DD
38,207,782 UART: [art] PUB.Y = 03520C2CDF379545F8BDE5B4A91F5BE81D3781EA4033B9F4D598E2E91D851B6C803D5F7A728881562DF45F6194226042
38,215,058 UART: [art] SIG.R = 97054208A2B6D81B64C2416DAC597B01C7412D3029A04954EB3295D983D5173374E773B842933DC85309A1A58AFA2691
38,222,410 UART: [art] SIG.S = 5805310F0D18EC07D38F49782433D61E3A589D1D72E983414780AA701A4CD45CFDBC85BA29FA20126991E7BBCF876548
39,201,204 UART: Caliptra RT
39,201,913 UART: [state] CFI Enabled
39,624,979 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
3,414,542 ready_for_fw is high
3,414,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,799,094 >>> mbox cmd response: success
14,800,690 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,113,217 UART:
19,113,634 UART: Running Caliptra FMC ...
19,114,736 UART:
19,114,886 UART: [state] CFI Enabled
19,179,335 UART: [fht] FMC Alias Private Key: 7
20,967,146 UART: [art] Extend RT PCRs Done
20,968,359 UART: [art] Lock RT PCRs Done
20,969,951 UART: [art] Populate DV Done
20,975,379 UART: [fht] FMC Alias Private Key: 7
20,977,067 UART: [art] Derive CDI
20,977,810 UART: [art] Store in slot 0x4
21,032,884 UART: [art] Derive Key Pair
21,033,888 UART: [art] Store priv key in slot 0x5
23,496,816 UART: [art] Derive Key Pair - Done
23,509,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,109 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,625 UART: [art] PUB.X = 09B55AF63DD373382A30F6D1B250E49FE6C27C5F3751F3C64F1FD687FD20823C8E7561606359A2FA418E687151F4FA13
25,231,887 UART: [art] PUB.Y = 8DB299FFFF97559CEBEB31E916669E3708787CF42F6B153F01C32548FA48305C6A1F5245636AB603A0854B43BDBCA69A
25,239,135 UART: [art] SIG.R = 17BE90BF28D2EDD4CF8BD772FA7C4491D694C4529C9B9F20B8AC60FD519C5F2775B8123F1005DF0F8F5F5C7BEDCA5BBD
25,246,534 UART: [art] SIG.S = 8B07999ACCE57389CC6EA3A8EFCC7885D7AE1CBE7037AFEE321C2CF8FCEF0C9D01DD001283766F5B2E0C486425619C19
26,224,925 UART: Caliptra RT
26,225,641 UART: [state] CFI Enabled
26,406,943 UART: [rt] RT listening for mailbox commands...
34,173,819 >>> mbox cmd response: success
34,207,954 UART:
34,208,233 UART: Running Caliptra FMC ...
34,209,293 UART:
34,209,440 UART: [state] CFI Enabled
34,316,391 UART: [art] Extend RT PCRs Done
34,317,596 UART: [art] Lock RT PCRs Done
34,319,002 UART: [art] Populate DV Done
34,324,629 UART: [fht] FMC Alias Private Key: 7
34,326,275 UART: [art] Derive CDI
34,327,089 UART: [art] Store in slot 0x4
34,385,273 UART: [art] Derive Key Pair
34,386,319 UART: [art] Store priv key in slot 0x5
36,849,231 UART: [art] Derive Key Pair - Done
36,862,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,574,383 UART: [art] Erasing AUTHORITY.KEYID = 7
38,575,898 UART: [art] PUB.X = A37EF635E52086F64D16A6DF9304BF1969C04E23D4FAA1C57EFA4C32647FD6FEC2A52E72978AED8A658532856B9F8289
38,583,179 UART: [art] PUB.Y = 2807B583D27D5B6C24B79B0EBF80F0133B394D79D085BD8C29AFD8E3544250EF8312782A4258C87A63DC8C22CED8A31F
38,590,455 UART: [art] SIG.R = 93F7409DBCB30D345024F274CF04B472CC2D0409CA251C09C402CBAC2BF05ED51B53BA08E3004F4BD450DC9A02260CA8
38,597,827 UART: [art] SIG.S = 818196DBF6EB28072D7BFFD6016B9A29E08750EECD3F98B7DFDA4BFD60140AF34EFCB8871CE6877A499324970043C430
39,576,992 UART: Caliptra RT
39,577,683 UART: [state] CFI Enabled
39,998,569 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
192,536 UART:
192,892 UART: Running Caliptra ROM ...
194,080 UART:
603,840 UART: [state] CFI Enabled
620,813 UART: [state] LifecycleState = Unprovisioned
623,178 UART: [state] DebugLocked = No
624,861 UART: [state] WD Timer not started. Device not locked for debugging
629,854 UART: [kat] SHA2-256
819,712 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,516 UART: [kat] ++
830,998 UART: [kat] sha1
842,872 UART: [kat] SHA2-256
845,888 UART: [kat] SHA2-384
851,102 UART: [kat] SHA2-512-ACC
853,668 UART: [kat] ECC-384
3,294,681 UART: [kat] HMAC-384Kdf
3,307,230 UART: [kat] LMS
3,839,075 UART: [kat] --
3,842,233 UART: [cold-reset] ++
3,844,095 UART: [fht] FHT @ 0x50003400
3,855,579 UART: [idev] ++
3,856,296 UART: [idev] CDI.KEYID = 6
3,857,216 UART: [idev] SUBJECT.KEYID = 7
3,858,392 UART: [idev] UDS.KEYID = 0
3,859,319 ready_for_fw is high
3,859,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,534 UART: [idev] Erasing UDS.KEYID = 0
6,337,228 UART: [idev] Sha1 KeyId Algorithm
6,360,304 UART: [idev] --
6,365,326 UART: [ldev] ++
6,366,088 UART: [ldev] CDI.KEYID = 6
6,367,012 UART: [ldev] SUBJECT.KEYID = 5
6,368,129 UART: [ldev] AUTHORITY.KEYID = 7
6,369,369 UART: [ldev] FE.KEYID = 1
6,382,059 UART: [ldev] Erasing FE.KEYID = 1
8,859,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,813 UART: [ldev] --
10,648,601 UART: [fwproc] Wait for Commands...
10,650,590 UART: [fwproc] Recv command 0x46574c44
10,652,900 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,532 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,155 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,341 >>> mbox cmd response: success
14,914,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,063,399 UART: [afmc] ++
15,064,051 UART: [afmc] CDI.KEYID = 6
15,064,986 UART: [afmc] SUBJECT.KEYID = 7
15,066,103 UART: [afmc] AUTHORITY.KEYID = 5
17,425,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,808 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,163,914 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,087 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,193,956 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,217,925 UART: [afmc] --
19,220,603 UART: [cold-reset] --
19,224,372 UART: [state] Locking Datavault
19,231,544 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,746 UART: [state] Locking ICCM
19,235,202 UART: [exit] Launching FMC @ 0x40000130
19,243,838 UART:
19,244,089 UART: Running Caliptra FMC ...
19,245,127 UART:
19,245,277 UART: [state] CFI Enabled
19,253,544 UART: [fht] FMC Alias Private Key: 7
21,019,448 UART: [art] Extend RT PCRs Done
21,020,679 UART: [art] Lock RT PCRs Done
21,022,232 UART: [art] Populate DV Done
21,027,552 UART: [fht] FMC Alias Private Key: 7
21,029,112 UART: [art] Derive CDI
21,029,940 UART: [art] Store in slot 0x4
21,072,864 UART: [art] Derive Key Pair
21,073,870 UART: [art] Store priv key in slot 0x5
23,499,989 UART: [art] Derive Key Pair - Done
23,513,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,186 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,693 UART: [art] PUB.X = 1875F3551111FC4ADB0504375C6372F84D37CE3ED3144A918CA45140540622CC0F369808EB621C7A3B34013B7A1BD382
25,227,959 UART: [art] PUB.Y = FF5A76B906B282D82F4621D96E506CBFD03C24575E1BA9AC6B13FB63899A62CAF07E60FCCA46A3258B87623543BA82A1
25,235,207 UART: [art] SIG.R = A847D290F37CC6570E6A8AA5A3323D5489983CF2FFCAFEA0CAF55109319088FCD210A2A88697759B79605D41C19B7C06
25,242,575 UART: [art] SIG.S = 405ECB53B5013FCA5B28CF4A3EC09886A8E872BF427DD8BA7B6056034F5BFB92B7472B6ED6092B9F17D48FE56AD0EB56
26,221,332 UART: Caliptra RT
26,222,050 UART: [state] CFI Enabled
26,356,043 UART: [rt] RT listening for mailbox commands...
26,359,458 UART:
26,359,712 UART: Running Caliptra ROM ...
26,360,824 UART:
26,361,094 UART: [state] CFI Enabled
26,374,842 UART: [state] LifecycleState = Unprovisioned
26,376,724 UART: [state] DebugLocked = No
26,379,327 UART: [state] WD Timer not started. Device not locked for debugging
26,384,400 UART: [kat] SHA2-256
26,574,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,585,049 UART: [kat] ++
26,585,572 UART: [kat] sha1
26,596,791 UART: [kat] SHA2-256
26,599,810 UART: [kat] SHA2-384
26,606,562 UART: [kat] SHA2-512-ACC
26,609,145 UART: [kat] ECC-384
29,050,972 UART: [kat] HMAC-384Kdf
29,064,125 UART: [kat] LMS
29,595,732 UART: [kat] --
29,600,526 UART: [update-reset] ++
33,111,400 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,115,110 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,744,874 >>> mbox cmd response: success
33,745,504 UART: [update-reset] Copying MAN_2 To MAN_1
33,783,027 UART: [update-reset Success] --
33,788,410 UART: [state] Locking Datavault
33,791,673 UART: [state] Locking PCR0, PCR1 and PCR31
33,793,819 UART: [state] Locking ICCM
33,795,850 UART: [exit] Launching FMC @ 0x40000130
33,804,535 UART:
33,804,771 UART: Running Caliptra FMC ...
33,805,799 UART:
33,805,952 UART: [state] CFI Enabled
33,850,458 UART: [art] Extend RT PCRs Done
33,851,647 UART: [art] Lock RT PCRs Done
33,852,971 UART: [art] Populate DV Done
33,858,544 UART: [fht] FMC Alias Private Key: 7
33,860,089 UART: [art] Derive CDI
33,860,830 UART: [art] Store in slot 0x4
33,903,498 UART: [art] Derive Key Pair
33,904,540 UART: [art] Store priv key in slot 0x5
36,331,189 UART: [art] Derive Key Pair - Done
36,343,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,050,202 UART: [art] Erasing AUTHORITY.KEYID = 7
38,051,704 UART: [art] PUB.X = 8B4DEB31AE8B91F0C068C2BBF4000AFDEEF12B725A5320F34EBBA7F79605A558056F432E707B6933A4D8EF512375CA0F
38,059,011 UART: [art] PUB.Y = 02A3EF70E29B3B14A8671FA48B92E9792C2FC52B679044A313CFE9F76191901724CCBC95C145391B8D344F54304EDFF0
38,066,233 UART: [art] SIG.R = FCE187FD935F8B5780879135C5603E6195C8CEFDAEF199118EC0F81D53321B5DEC63D58B8AB2484149D251BC7A9B6845
38,073,599 UART: [art] SIG.S = C609222A422306D022DBDF8CCDF41107FC1AB649FEE473CB2471EFF195E15C994E4A28771FCBD5E221B9961E13AF62B7
39,052,618 UART: Caliptra RT
39,053,338 UART: [state] CFI Enabled
39,429,323 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,754,839 ready_for_fw is high
3,755,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,040,992 >>> mbox cmd response: success
15,042,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,292,169 UART:
19,292,573 UART: Running Caliptra FMC ...
19,293,683 UART:
19,293,864 UART: [state] CFI Enabled
19,301,719 UART: [fht] FMC Alias Private Key: 7
21,068,501 UART: [art] Extend RT PCRs Done
21,069,737 UART: [art] Lock RT PCRs Done
21,071,504 UART: [art] Populate DV Done
21,077,036 UART: [fht] FMC Alias Private Key: 7
21,078,533 UART: [art] Derive CDI
21,079,356 UART: [art] Store in slot 0x4
21,121,592 UART: [art] Derive Key Pair
21,122,639 UART: [art] Store priv key in slot 0x5
23,549,776 UART: [art] Derive Key Pair - Done
23,562,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,268,551 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,058 UART: [art] PUB.X = 68B0E95687F6FCD984A4CC3DCD9FF206FBA97F05AB956AD2C8793536214F7ED1FF2C086C7E727C32012AC4E700A2F32F
25,277,334 UART: [art] PUB.Y = 58D21883D810800F2AB70A0A43F00D7BB6A08D89265EF40E1F439BFF4E8CCAE0B056EBEA9777F68FCBBC9DCADB3B7ABF
25,284,628 UART: [art] SIG.R = 33438BEFA8158783ABDAF695BA41110F69231230EB5B51DC9926CC87A75D44521B648D6DDA648B6F7BB9D2BE85C79570
25,292,055 UART: [art] SIG.S = FA5314D24F5487BD61A68788866543F30D07A43C12B4DD526F562541E0B7BF7E2CF09F394D97F3B136A4088B7CF443D0
26,271,122 UART: Caliptra RT
26,271,836 UART: [state] CFI Enabled
26,405,383 UART: [rt] RT listening for mailbox commands...
34,083,644 >>> mbox cmd response: success
34,118,042 UART:
34,118,338 UART: Running Caliptra FMC ...
34,119,383 UART:
34,119,533 UART: [state] CFI Enabled
34,163,666 UART: [art] Extend RT PCRs Done
34,164,880 UART: [art] Lock RT PCRs Done
34,166,322 UART: [art] Populate DV Done
34,171,793 UART: [fht] FMC Alias Private Key: 7
34,173,429 UART: [art] Derive CDI
34,174,169 UART: [art] Store in slot 0x4
34,217,211 UART: [art] Derive Key Pair
34,218,278 UART: [art] Store priv key in slot 0x5
36,645,269 UART: [art] Derive Key Pair - Done
36,657,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,364,442 UART: [art] Erasing AUTHORITY.KEYID = 7
38,365,948 UART: [art] PUB.X = 9E575FAF72944CD99FBE7AF3A74EEF2FF7A49CF1E638AA48596BA0EE680EDB7549150BC990BE6BF9841BF355BFFCFDF0
38,373,291 UART: [art] PUB.Y = BD74BA9294221C0A6FF6A04E5283A5660D727B6845CCA3731F36A2A3DB56E77FB5037B4935C348FC07948624DB06768C
38,380,486 UART: [art] SIG.R = B4C63923F477410354A1B4BE63A71B55A4ADA78F5C7B4CB5C7B4EF1A2C821A1CFC43E3C165BB391B5372D208C21E4B75
38,387,896 UART: [art] SIG.S = 7B74D498DC8FA47864E7ADA932433D25110F60EE05021CFF99650FAEA9602D55AEDEBDF428A32FACB289152CC84138C2
39,366,669 UART: Caliptra RT
39,367,387 UART: [state] CFI Enabled
39,739,869 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,829 UART: [kat] SHA2-256
881,760 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,875 UART: [kat] ++
886,027 UART: [kat] sha1
890,243 UART: [kat] SHA2-256
892,181 UART: [kat] SHA2-384
895,006 UART: [kat] SHA2-512-ACC
896,907 UART: [kat] ECC-384
902,776 UART: [kat] HMAC-384Kdf
907,260 UART: [kat] LMS
1,475,456 UART: [kat] --
1,476,725 UART: [cold-reset] ++
1,477,137 UART: [fht] Storing FHT @ 0x50003400
1,479,958 UART: [idev] ++
1,480,126 UART: [idev] CDI.KEYID = 6
1,480,486 UART: [idev] SUBJECT.KEYID = 7
1,480,910 UART: [idev] UDS.KEYID = 0
1,481,255 ready_for_fw is high
1,481,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,180 UART: [idev] Erasing UDS.KEYID = 0
1,506,030 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,882 UART: [idev] --
1,516,043 UART: [ldev] ++
1,516,211 UART: [ldev] CDI.KEYID = 6
1,516,574 UART: [ldev] SUBJECT.KEYID = 5
1,517,000 UART: [ldev] AUTHORITY.KEYID = 7
1,517,463 UART: [ldev] FE.KEYID = 1
1,522,759 UART: [ldev] Erasing FE.KEYID = 1
1,548,294 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,936 UART: [ldev] --
1,587,361 UART: [fwproc] Waiting for Commands...
1,588,132 UART: [fwproc] Received command 0x46574c44
1,588,923 UART: [fwproc] Received Image of size 118548 bytes
2,932,581 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,669 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,132 >>> mbox cmd response: success
3,132,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,133,146 UART: [afmc] ++
3,133,314 UART: [afmc] CDI.KEYID = 6
3,133,676 UART: [afmc] SUBJECT.KEYID = 7
3,134,101 UART: [afmc] AUTHORITY.KEYID = 5
3,169,118 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,376 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,156 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,865 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,748 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,431 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,279 UART: [afmc] --
3,212,197 UART: [cold-reset] --
3,213,023 UART: [state] Locking Datavault
3,214,274 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,878 UART: [state] Locking ICCM
3,215,414 UART: [exit] Launching FMC @ 0x40000130
3,220,744 UART:
3,220,760 UART: Running Caliptra FMC ...
3,221,168 UART:
3,221,222 UART: [state] CFI Enabled
3,231,624 UART: [fht] FMC Alias Private Key: 7
3,350,668 UART: [art] Extend RT PCRs Done
3,351,096 UART: [art] Lock RT PCRs Done
3,352,456 UART: [art] Populate DV Done
3,360,701 UART: [fht] FMC Alias Private Key: 7
3,361,665 UART: [art] Derive CDI
3,361,945 UART: [art] Store in slot 0x4
3,447,799 UART: [art] Derive Key Pair
3,448,159 UART: [art] Store priv key in slot 0x5
3,461,374 UART: [art] Derive Key Pair - Done
3,476,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,670 UART: [art] PUB.X = EB837881058F358306B41FDF87DA301C36C6CB8D5344D1CF2427C2912D976CB2952595E15AF19C5B475670E740E73C18
3,500,430 UART: [art] PUB.Y = 1365AAC6D0A5544E240074E0C2965F2CDA21F04F5EB50C0D9B8123E38F1926E67E2370B62C3F0FBFFB0983154DAE9E85
3,507,354 UART: [art] SIG.R = 44C2A875C2ED191E006A289C7815CDE7C9BE8CD4265F891C41D8C679D7C30E48F549044D1A098AE210AF9AAAFF234DF7
3,514,105 UART: [art] SIG.S = 7095673F65008B517E893AC416B56E7E0958386EA9C12F9B36AEC10862BABAB1024910D612E99782E62C9BC371B44BB7
3,537,074 UART: Caliptra RT
3,537,325 UART: [state] CFI Enabled
3,657,994 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,659,941 UART:
3,659,957 UART: Running Caliptra ROM ...
3,660,365 UART:
3,660,419 UART: [state] CFI Enabled
3,662,811 UART: [state] LifecycleState = Unprovisioned
3,663,466 UART: [state] DebugLocked = No
3,664,094 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,665,785 UART: [kat] SHA2-256
4,459,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,463,831 UART: [kat] ++
4,463,983 UART: [kat] sha1
4,468,203 UART: [kat] SHA2-256
4,470,141 UART: [kat] SHA2-384
4,473,072 UART: [kat] SHA2-512-ACC
4,474,972 UART: [kat] ECC-384
4,480,243 UART: [kat] HMAC-384Kdf
4,484,695 UART: [kat] LMS
5,052,891 UART: [kat] --
5,053,770 UART: [update-reset] ++
6,436,004 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,437,276 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,592,543 >>> mbox cmd response: success
6,592,678 UART: [update-reset] Copying MAN_2 To MAN_1
6,600,692 UART: [update-reset Success] --
6,601,789 UART: [state] Locking Datavault
6,602,639 UART: [state] Locking PCR0, PCR1 and PCR31
6,603,243 UART: [state] Locking ICCM
6,603,733 UART: [exit] Launching FMC @ 0x40000130
6,609,063 UART:
6,609,079 UART: Running Caliptra FMC ...
6,609,487 UART:
6,609,541 UART: [state] CFI Enabled
6,698,568 UART: [art] Extend RT PCRs Done
6,698,996 UART: [art] Lock RT PCRs Done
6,700,089 UART: [art] Populate DV Done
6,708,248 UART: [fht] FMC Alias Private Key: 7
6,709,276 UART: [art] Derive CDI
6,709,556 UART: [art] Store in slot 0x4
6,795,256 UART: [art] Derive Key Pair
6,795,616 UART: [art] Store priv key in slot 0x5
6,808,629 UART: [art] Derive Key Pair - Done
6,823,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,839,037 UART: [art] Erasing AUTHORITY.KEYID = 7
6,839,802 UART: [art] PUB.X = 45003B66E2E57E22D8540B4AF6BF56B02FD5E9522F6456FE59958C3EF98571C6B043522754D7E41B16309DF7E9F99718
6,846,543 UART: [art] PUB.Y = 95C950DD43ACA0115A146EAA058768C29F5CA53709796D6F8977251A3B4C37B7283957AEDA08B7AC248B1B58C874D955
6,853,484 UART: [art] SIG.R = 0CA1BCAD777A6A839E697E63944D9F1E491388CC2DF8DFB666A88CF94520BB2E41B4015F140E0CA50DCD988DB3A7E2F9
6,860,255 UART: [art] SIG.S = FBDBC4ACF49AB601336CB9EB451FBA3617FDBB082130C2FCD2A315ED4EAE4ABB60AE39BC49B9639200E821320D4678B2
6,884,852 UART: Caliptra RT
6,885,103 UART: [state] CFI Enabled
7,250,174 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,047 ready_for_fw is high
1,363,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,956 >>> mbox cmd response: success
2,981,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,043,289 UART:
3,043,305 UART: Running Caliptra FMC ...
3,043,713 UART:
3,043,767 UART: [state] CFI Enabled
3,054,687 UART: [fht] FMC Alias Private Key: 7
3,172,969 UART: [art] Extend RT PCRs Done
3,173,397 UART: [art] Lock RT PCRs Done
3,174,869 UART: [art] Populate DV Done
3,182,986 UART: [fht] FMC Alias Private Key: 7
3,184,096 UART: [art] Derive CDI
3,184,376 UART: [art] Store in slot 0x4
3,270,034 UART: [art] Derive Key Pair
3,270,394 UART: [art] Store priv key in slot 0x5
3,283,923 UART: [art] Derive Key Pair - Done
3,298,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,792 UART: [art] PUB.X = 34FBC1EFD025B517B1545E4E18C6D6A5DE9C34C4F9CE84D36FB56B842BBE0F68FC66A6E74A50DFDD28DDB2500D9C6779
3,321,578 UART: [art] PUB.Y = EA0B5B1265AFAC71CF19FC9DE4F24DCCA26D00879EBF6D508A35463AA885C100745D3C0C93F998CE10F467DA79989B96
3,328,492 UART: [art] SIG.R = 8CDCD97970B00773E636FA9BAB7C05D6C0C9FE08B8BA71361B14F48084BC9A699770854798F2140A3829EEE87AD9832C
3,335,254 UART: [art] SIG.S = 4F32A2C99DF5F878392C8F1809958FB1A11B2ABD6465041FC3F4CF5E214F1B3B9275BA2F5F9277C562158F46888F1693
3,359,370 UART: Caliptra RT
3,359,621 UART: [state] CFI Enabled
3,479,825 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,295,766 >>> mbox cmd response: success
6,309,170 UART:
6,309,186 UART: Running Caliptra FMC ...
6,309,594 UART:
6,309,648 UART: [state] CFI Enabled
6,398,561 UART: [art] Extend RT PCRs Done
6,398,989 UART: [art] Lock RT PCRs Done
6,400,106 UART: [art] Populate DV Done
6,408,529 UART: [fht] FMC Alias Private Key: 7
6,409,637 UART: [art] Derive CDI
6,409,917 UART: [art] Store in slot 0x4
6,495,543 UART: [art] Derive Key Pair
6,495,903 UART: [art] Store priv key in slot 0x5
6,509,394 UART: [art] Derive Key Pair - Done
6,523,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,539,133 UART: [art] Erasing AUTHORITY.KEYID = 7
6,539,898 UART: [art] PUB.X = 7CB350E4BDAE395B8859705145E5D8E6C02440013F3DC856075B0DC34869A432A0E33A38245115A1B3E782E13C105C2E
6,546,655 UART: [art] PUB.Y = E5F4A6E238FBD5B54DEE86BD1A4AAFBD475798FC51CB953A839347B821B9EB3B63524D84E281736628213E27AD0ED648
6,553,612 UART: [art] SIG.R = 3EF55EA4958C62A94848DCC3106FDACED832676E678507A49BF514349C20B0C0A60B613AA2F7611E589C7BC88F4CA76E
6,560,384 UART: [art] SIG.S = D550F50CF025F41C2636E8D17873A8B042E631D5A398CCB6409AE3BBAFE003D8F1F94550E74052B03C392F180D3D0CA5
6,583,302 UART: Caliptra RT
6,583,553 UART: [state] CFI Enabled
6,947,678 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,596 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,152 UART: [kat] SHA2-256
882,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,198 UART: [kat] ++
886,350 UART: [kat] sha1
890,388 UART: [kat] SHA2-256
892,326 UART: [kat] SHA2-384
895,125 UART: [kat] SHA2-512-ACC
897,026 UART: [kat] ECC-384
902,859 UART: [kat] HMAC-384Kdf
907,383 UART: [kat] LMS
1,475,579 UART: [kat] --
1,476,834 UART: [cold-reset] ++
1,477,212 UART: [fht] Storing FHT @ 0x50003400
1,480,037 UART: [idev] ++
1,480,205 UART: [idev] CDI.KEYID = 6
1,480,565 UART: [idev] SUBJECT.KEYID = 7
1,480,989 UART: [idev] UDS.KEYID = 0
1,481,334 ready_for_fw is high
1,481,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,087 UART: [idev] Erasing UDS.KEYID = 0
1,506,441 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,105 UART: [idev] --
1,516,000 UART: [ldev] ++
1,516,168 UART: [ldev] CDI.KEYID = 6
1,516,531 UART: [ldev] SUBJECT.KEYID = 5
1,516,957 UART: [ldev] AUTHORITY.KEYID = 7
1,517,420 UART: [ldev] FE.KEYID = 1
1,522,650 UART: [ldev] Erasing FE.KEYID = 1
1,548,061 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,965 UART: [ldev] --
1,587,294 UART: [fwproc] Waiting for Commands...
1,587,981 UART: [fwproc] Received command 0x46574c44
1,588,772 UART: [fwproc] Received Image of size 118548 bytes
2,933,958 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,562 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,141 >>> mbox cmd response: success
3,133,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,134,227 UART: [afmc] ++
3,134,395 UART: [afmc] CDI.KEYID = 6
3,134,757 UART: [afmc] SUBJECT.KEYID = 7
3,135,182 UART: [afmc] AUTHORITY.KEYID = 5
3,170,025 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,531 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,311 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,020 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,903 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,586 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,494 UART: [afmc] --
3,213,382 UART: [cold-reset] --
3,214,148 UART: [state] Locking Datavault
3,215,127 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,731 UART: [state] Locking ICCM
3,216,323 UART: [exit] Launching FMC @ 0x40000130
3,221,653 UART:
3,221,669 UART: Running Caliptra FMC ...
3,222,077 UART:
3,222,220 UART: [state] CFI Enabled
3,232,530 UART: [fht] FMC Alias Private Key: 7
3,351,666 UART: [art] Extend RT PCRs Done
3,352,094 UART: [art] Lock RT PCRs Done
3,353,948 UART: [art] Populate DV Done
3,362,039 UART: [fht] FMC Alias Private Key: 7
3,363,205 UART: [art] Derive CDI
3,363,485 UART: [art] Store in slot 0x4
3,448,811 UART: [art] Derive Key Pair
3,449,171 UART: [art] Store priv key in slot 0x5
3,462,504 UART: [art] Derive Key Pair - Done
3,476,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,540 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,305 UART: [art] PUB.X = FD411CCC730F67F2ADD2712945CD8059D43548BF65AC5BC030C254749A6DEC2EB9B1F74314782FDCCC7CB3097F0F6521
3,500,078 UART: [art] PUB.Y = 337BE569C0CF5201FB4B60FA81D521B5F798C377903FBD586537F4F9A70C33DE876A0ABB93B87488EE49BFF1920CDADC
3,507,030 UART: [art] SIG.R = 063334C79653E3DA0E65EAAAA62D75F4FC7A4A36466B10799E33F4FCC6B20264582A8FC0DCB21546C28C3D6479A36EEB
3,513,801 UART: [art] SIG.S = C5287EF48E1660050266B27B2C284C08791EC39B02FE60CA69E6137B0084348B467B3AD822C8EBB74B6AF46AAB8D28EF
3,537,759 UART: Caliptra RT
3,538,102 UART: [state] CFI Enabled
3,659,644 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,621 UART:
3,661,637 UART: Running Caliptra ROM ...
3,662,045 UART:
3,662,186 UART: [state] CFI Enabled
3,664,796 UART: [state] LifecycleState = Unprovisioned
3,665,451 UART: [state] DebugLocked = No
3,666,005 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,667,618 UART: [kat] SHA2-256
4,461,549 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,465,664 UART: [kat] ++
4,465,816 UART: [kat] sha1
4,469,932 UART: [kat] SHA2-256
4,471,870 UART: [kat] SHA2-384
4,474,597 UART: [kat] SHA2-512-ACC
4,476,497 UART: [kat] ECC-384
4,482,262 UART: [kat] HMAC-384Kdf
4,486,970 UART: [kat] LMS
5,055,166 UART: [kat] --
5,055,753 UART: [update-reset] ++
6,436,867 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,437,973 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,593,240 >>> mbox cmd response: success
6,593,409 UART: [update-reset] Copying MAN_2 To MAN_1
6,601,423 UART: [update-reset Success] --
6,602,244 UART: [state] Locking Datavault
6,602,986 UART: [state] Locking PCR0, PCR1 and PCR31
6,603,590 UART: [state] Locking ICCM
6,604,184 UART: [exit] Launching FMC @ 0x40000130
6,609,514 UART:
6,609,530 UART: Running Caliptra FMC ...
6,609,938 UART:
6,610,081 UART: [state] CFI Enabled
6,699,536 UART: [art] Extend RT PCRs Done
6,699,964 UART: [art] Lock RT PCRs Done
6,701,241 UART: [art] Populate DV Done
6,709,546 UART: [fht] FMC Alias Private Key: 7
6,710,588 UART: [art] Derive CDI
6,710,868 UART: [art] Store in slot 0x4
6,796,272 UART: [art] Derive Key Pair
6,796,632 UART: [art] Store priv key in slot 0x5
6,809,781 UART: [art] Derive Key Pair - Done
6,824,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,840,152 UART: [art] Erasing AUTHORITY.KEYID = 7
6,840,917 UART: [art] PUB.X = 29F7541F57429B462FB1BE4ED41DDF0DF10957D4C37C82C0796889FC9EBBEDED36294210D6FC96BB7D2DDF35DC493CEF
6,847,701 UART: [art] PUB.Y = 723C245D3F03FE2FE48FCBAD18EA46A3C7EB85C73F5FC3B3D537BD647DC7D350C98E92D72FAA84BB8A581430E85D89DE
6,854,670 UART: [art] SIG.R = 8C521819B8B4FFA5FFC090A0F181F86C6CDFAAACA154F31658A8D958974B53A460C43F33E39B8716E61AA9A6D6FA0C89
6,861,451 UART: [art] SIG.S = 103FB71C18F4E8FFABBA4E5EECAECA6C0D03B17045C6BFBA1F81B3780A274B889A64C1B7B77F4FBCD157739276CE431C
6,884,542 UART: Caliptra RT
6,884,885 UART: [state] CFI Enabled
7,247,660 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,306 ready_for_fw is high
1,363,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,229 >>> mbox cmd response: success
2,983,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,044,200 UART:
3,044,216 UART: Running Caliptra FMC ...
3,044,624 UART:
3,044,767 UART: [state] CFI Enabled
3,055,667 UART: [fht] FMC Alias Private Key: 7
3,174,437 UART: [art] Extend RT PCRs Done
3,174,865 UART: [art] Lock RT PCRs Done
3,176,395 UART: [art] Populate DV Done
3,184,568 UART: [fht] FMC Alias Private Key: 7
3,185,682 UART: [art] Derive CDI
3,185,962 UART: [art] Store in slot 0x4
3,271,868 UART: [art] Derive Key Pair
3,272,228 UART: [art] Store priv key in slot 0x5
3,285,865 UART: [art] Derive Key Pair - Done
3,300,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,002 UART: [art] PUB.X = 8B043FBD02624F055566D925393C0C7E2730C77B54DBBE06A1B2CE5957707CFC45A3DE9FEBEA6F4961FE360D45BBC348
3,323,766 UART: [art] PUB.Y = EC93CA340B52C5F8BDCB27DCEC4091940F9A68A72B752669A08686422056FD733F47D1138C62BA71716319BFB828226A
3,330,710 UART: [art] SIG.R = 679B9C534592A11D07FD9B0AC0D7A11D0D6BA7E9A3869012B05A6F90A94BF68DE20EAF5B39D08EA6F014E0832F14AB27
3,337,480 UART: [art] SIG.S = 2B06FF27737C08A0A5338B130D9A3324FF8B8CACFCD8820566C18D1DDC4A38BBCCF396E7626694AD6293370D9E9578E2
3,360,581 UART: Caliptra RT
3,360,924 UART: [state] CFI Enabled
3,479,835 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,295,707 >>> mbox cmd response: success
6,309,175 UART:
6,309,191 UART: Running Caliptra FMC ...
6,309,599 UART:
6,309,742 UART: [state] CFI Enabled
6,398,461 UART: [art] Extend RT PCRs Done
6,398,889 UART: [art] Lock RT PCRs Done
6,400,290 UART: [art] Populate DV Done
6,408,331 UART: [fht] FMC Alias Private Key: 7
6,409,321 UART: [art] Derive CDI
6,409,601 UART: [art] Store in slot 0x4
6,495,605 UART: [art] Derive Key Pair
6,495,965 UART: [art] Store priv key in slot 0x5
6,509,660 UART: [art] Derive Key Pair - Done
6,524,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,540,035 UART: [art] Erasing AUTHORITY.KEYID = 7
6,540,800 UART: [art] PUB.X = 0C849463E5AE8A5237B3CC50E46A3B8FD414C852411D23F3AA4740F482AA212ABFD0D4A8F5820FDD237F46799868C3D7
6,547,570 UART: [art] PUB.Y = F3A32EED00B3DDCF24336AD0F64F87F75D9B80BCBC9E95D30C0EF98A1BF907094A51BE81668B3F3873CEE5C5B433FDCD
6,554,510 UART: [art] SIG.R = B0B65410C09FB15580EB351B40ECD6D75DDEB6BE19C0CEDFA94114572B6D7A892C5E29C1A317DE061A13B440FE18287B
6,561,291 UART: [art] SIG.S = 6D0492AA7231E02235E0E25EABD69B585DFC298A20EFFF863E37E1C00E1BCA9682C909117FE696522CED502E0CA0FFD1
6,585,279 UART: Caliptra RT
6,585,622 UART: [state] CFI Enabled
6,949,183 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,087 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
890,970 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,074 UART: [kat] ++
895,226 UART: [kat] sha1
899,352 UART: [kat] SHA2-256
901,292 UART: [kat] SHA2-384
904,225 UART: [kat] SHA2-512-ACC
906,126 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,653 UART: [kat] LMS
1,168,965 UART: [kat] --
1,169,978 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,398 UART: [idev] ++
1,173,566 UART: [idev] CDI.KEYID = 6
1,173,927 UART: [idev] SUBJECT.KEYID = 7
1,174,352 UART: [idev] UDS.KEYID = 0
1,174,698 ready_for_fw is high
1,174,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,759 UART: [idev] Erasing UDS.KEYID = 0
1,199,887 UART: [idev] Sha1 KeyId Algorithm
1,208,607 UART: [idev] --
1,209,842 UART: [ldev] ++
1,210,010 UART: [ldev] CDI.KEYID = 6
1,210,374 UART: [ldev] SUBJECT.KEYID = 5
1,210,801 UART: [ldev] AUTHORITY.KEYID = 7
1,211,264 UART: [ldev] FE.KEYID = 1
1,216,288 UART: [ldev] Erasing FE.KEYID = 1
1,242,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,664 UART: [ldev] --
1,280,923 UART: [fwproc] Wait for Commands...
1,281,726 UART: [fwproc] Recv command 0x46574c44
1,282,459 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,253 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,428 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,823 >>> mbox cmd response: success
2,824,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,825,917 UART: [afmc] ++
2,826,085 UART: [afmc] CDI.KEYID = 6
2,826,448 UART: [afmc] SUBJECT.KEYID = 7
2,826,874 UART: [afmc] AUTHORITY.KEYID = 5
2,861,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,419 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,129 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,010 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,711 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,332 UART: [afmc] --
2,904,343 UART: [cold-reset] --
2,905,261 UART: [state] Locking Datavault
2,906,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,814 UART: [state] Locking ICCM
2,907,408 UART: [exit] Launching FMC @ 0x40000130
2,912,738 UART:
2,912,754 UART: Running Caliptra FMC ...
2,913,162 UART:
2,913,216 UART: [state] CFI Enabled
2,923,452 UART: [fht] FMC Alias Private Key: 7
3,042,414 UART: [art] Extend RT PCRs Done
3,042,842 UART: [art] Lock RT PCRs Done
3,043,906 UART: [art] Populate DV Done
3,052,245 UART: [fht] FMC Alias Private Key: 7
3,053,367 UART: [art] Derive CDI
3,053,647 UART: [art] Store in slot 0x4
3,139,064 UART: [art] Derive Key Pair
3,139,424 UART: [art] Store priv key in slot 0x5
3,153,032 UART: [art] Derive Key Pair - Done
3,167,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,811 UART: [art] PUB.X = 17C8160A005CD1C4E7D9B116926CC1A8F67923D2163C5D34FBDD5D0A507CDBA4DC5BAA14DF6FBAF76D0EBC249BDF426B
3,190,576 UART: [art] PUB.Y = DC71808D00F7E9077571A7CACC20B637140E3868387910BD8EB3C5B224A985561EFED7FD6AD7D3F13A8126369DEB0351
3,197,499 UART: [art] SIG.R = E7ADD121D477EEA7B46F51D05E7477FE603ED30CD7CEC577872BFF3604A11EFB6F88FFB0D0B9F9D63279D2556BCA5743
3,204,281 UART: [art] SIG.S = C85259CBDDA289E24B72D946F3DC31AF61E57E2EF192D7E6B9505F836370F855AC722BE011131A3D39F0BB9A7901ED1D
3,228,220 UART: Caliptra RT
3,228,471 UART: [state] CFI Enabled
3,348,497 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,350,011 UART:
3,350,027 UART: Running Caliptra ROM ...
3,350,435 UART:
3,350,490 UART: [state] CFI Enabled
3,352,992 UART: [state] LifecycleState = Unprovisioned
3,353,647 UART: [state] DebugLocked = No
3,354,265 UART: [state] WD Timer not started. Device not locked for debugging
3,355,481 UART: [kat] SHA2-256
4,159,031 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,163,135 UART: [kat] ++
4,163,287 UART: [kat] sha1
4,167,383 UART: [kat] SHA2-256
4,169,323 UART: [kat] SHA2-384
4,171,908 UART: [kat] SHA2-512-ACC
4,173,808 UART: [kat] ECC-384
4,183,811 UART: [kat] HMAC-384Kdf
4,188,553 UART: [kat] LMS
4,436,865 UART: [kat] --
4,437,855 UART: [update-reset] ++
5,797,740 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,798,927 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,954,142 >>> mbox cmd response: success
5,954,251 UART: [update-reset] Copying MAN_2 To MAN_1
5,962,265 UART: [update-reset Success] --
5,963,094 UART: [state] Locking Datavault
5,963,788 UART: [state] Locking PCR0, PCR1 and PCR31
5,964,392 UART: [state] Locking ICCM
5,965,042 UART: [exit] Launching FMC @ 0x40000130
5,970,372 UART:
5,970,388 UART: Running Caliptra FMC ...
5,970,796 UART:
5,970,850 UART: [state] CFI Enabled
6,060,669 UART: [art] Extend RT PCRs Done
6,061,097 UART: [art] Lock RT PCRs Done
6,062,598 UART: [art] Populate DV Done
6,070,905 UART: [fht] FMC Alias Private Key: 7
6,071,973 UART: [art] Derive CDI
6,072,253 UART: [art] Store in slot 0x4
6,158,082 UART: [art] Derive Key Pair
6,158,442 UART: [art] Store priv key in slot 0x5
6,172,234 UART: [art] Derive Key Pair - Done
6,186,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,202,604 UART: [art] Erasing AUTHORITY.KEYID = 7
6,203,369 UART: [art] PUB.X = 0E9BAFD0CE1B01063B5CAF9D3C2C983E7A346D49561C2D11ED442F15CCAF748D65967F51FDB8C05011E2F2CFA5C78247
6,210,146 UART: [art] PUB.Y = 993E5C37D9A5CBA56125C473C36A527C6B9635E645762D35D774645255564CAEF2CB29DDC769F7C16EB6D5AD06E9784C
6,217,097 UART: [art] SIG.R = 5BEA28CEF45C0DE07E996F0EB39459F1E8B545AA0DA34333F61374922D0DF307A965C62687A623515ACEC3613216108E
6,223,854 UART: [art] SIG.S = 7D85405645A45D41BF68C77808B2E354CD133724179E2F9A525BB03DFE639D5DEA5C4F2917F9D6AEF3A85161A26C1544
6,247,781 UART: Caliptra RT
6,248,032 UART: [state] CFI Enabled
6,613,099 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,538 ready_for_fw is high
1,058,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,110 >>> mbox cmd response: success
2,676,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,738,055 UART:
2,738,071 UART: Running Caliptra FMC ...
2,738,479 UART:
2,738,533 UART: [state] CFI Enabled
2,749,369 UART: [fht] FMC Alias Private Key: 7
2,868,297 UART: [art] Extend RT PCRs Done
2,868,725 UART: [art] Lock RT PCRs Done
2,870,061 UART: [art] Populate DV Done
2,878,494 UART: [fht] FMC Alias Private Key: 7
2,879,554 UART: [art] Derive CDI
2,879,834 UART: [art] Store in slot 0x4
2,965,737 UART: [art] Derive Key Pair
2,966,097 UART: [art] Store priv key in slot 0x5
2,978,999 UART: [art] Derive Key Pair - Done
2,993,535 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,247 UART: [art] PUB.X = 78B202E6F9FA8FF58007CB5169F9C4A46B19D65D49CBB6D2BC852B4D4A827F9D1E0AC9C9AC85CB013EE90526C95AB1C2
3,017,020 UART: [art] PUB.Y = 97BE22AC54CE75C5D05BC2A146E2DD5BDCDD450187B72DFAECAB59710CF3261BC5D6E04B19383A50A290D47604C98840
3,023,975 UART: [art] SIG.R = 8A04589EE7B535B06EDDCADC6B881EEFA241557B4C85EF9713B48376BF8ACA2FD5DD71A81467295185DB938573D27CD4
3,030,754 UART: [art] SIG.S = 059575C85D385B795DABAAB70AEB782C48D7DF7E215793180B62E97E8550E2A37BF4212667B8ADC2FE32816D665977F7
3,054,463 UART: Caliptra RT
3,054,714 UART: [state] CFI Enabled
3,173,857 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,664,240 >>> mbox cmd response: success
5,677,567 UART:
5,677,583 UART: Running Caliptra FMC ...
5,677,991 UART:
5,678,045 UART: [state] CFI Enabled
5,767,690 UART: [art] Extend RT PCRs Done
5,768,118 UART: [art] Lock RT PCRs Done
5,769,155 UART: [art] Populate DV Done
5,777,520 UART: [fht] FMC Alias Private Key: 7
5,778,484 UART: [art] Derive CDI
5,778,764 UART: [art] Store in slot 0x4
5,864,889 UART: [art] Derive Key Pair
5,865,249 UART: [art] Store priv key in slot 0x5
5,878,467 UART: [art] Derive Key Pair - Done
5,893,251 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,908,942 UART: [art] Erasing AUTHORITY.KEYID = 7
5,909,707 UART: [art] PUB.X = 1415115CF5E42804AE7E65F7C55199A902B5AF7E21F9FAEA33FBA8B6BDC0CA62AAF9B4D73DCF25FCDB050215F25F9D95
5,916,487 UART: [art] PUB.Y = 51D1AA1BB6E3C30DC637E1AEB33547808D8C78DBB854E8C3FFCDF806E58CAE3BD9DE0A970325228EE464B09957E1759D
5,923,441 UART: [art] SIG.R = A9432F774C2862A5DB0D0CDD18B9848FD5E74160AC5655538CD55167E41F7FA1C1B20FB27801001F1AEFFAF76240E60C
5,930,182 UART: [art] SIG.S = EFDC99E7EEB2E791C8F5CADA6FBD00505EB79115AF015DF37C8E7C72CF789866ACCAB2F806ED6456F19AD399ED9DD20C
5,953,371 UART: Caliptra RT
5,953,622 UART: [state] CFI Enabled
6,314,091 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,601 UART: [kat] ++
895,753 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,690 UART: [kat] SHA2-512-ACC
906,591 UART: [kat] ECC-384
916,170 UART: [kat] HMAC-384Kdf
920,876 UART: [kat] LMS
1,169,188 UART: [kat] --
1,170,267 UART: [cold-reset] ++
1,170,675 UART: [fht] FHT @ 0x50003400
1,173,357 UART: [idev] ++
1,173,525 UART: [idev] CDI.KEYID = 6
1,173,886 UART: [idev] SUBJECT.KEYID = 7
1,174,311 UART: [idev] UDS.KEYID = 0
1,174,657 ready_for_fw is high
1,174,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,724 UART: [idev] Erasing UDS.KEYID = 0
1,199,730 UART: [idev] Sha1 KeyId Algorithm
1,208,566 UART: [idev] --
1,209,437 UART: [ldev] ++
1,209,605 UART: [ldev] CDI.KEYID = 6
1,209,969 UART: [ldev] SUBJECT.KEYID = 5
1,210,396 UART: [ldev] AUTHORITY.KEYID = 7
1,210,859 UART: [ldev] FE.KEYID = 1
1,216,079 UART: [ldev] Erasing FE.KEYID = 1
1,242,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,727 UART: [ldev] --
1,282,016 UART: [fwproc] Wait for Commands...
1,282,671 UART: [fwproc] Recv command 0x46574c44
1,283,404 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,608 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,783 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,182 >>> mbox cmd response: success
2,826,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,827,288 UART: [afmc] ++
2,827,456 UART: [afmc] CDI.KEYID = 6
2,827,819 UART: [afmc] SUBJECT.KEYID = 7
2,828,245 UART: [afmc] AUTHORITY.KEYID = 5
2,864,048 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,827 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,576 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,286 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,167 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,868 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,641 UART: [afmc] --
2,907,564 UART: [cold-reset] --
2,908,552 UART: [state] Locking Datavault
2,909,523 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,127 UART: [state] Locking ICCM
2,910,591 UART: [exit] Launching FMC @ 0x40000130
2,915,921 UART:
2,915,937 UART: Running Caliptra FMC ...
2,916,345 UART:
2,916,488 UART: [state] CFI Enabled
2,927,662 UART: [fht] FMC Alias Private Key: 7
3,046,842 UART: [art] Extend RT PCRs Done
3,047,270 UART: [art] Lock RT PCRs Done
3,048,518 UART: [art] Populate DV Done
3,056,711 UART: [fht] FMC Alias Private Key: 7
3,057,745 UART: [art] Derive CDI
3,058,025 UART: [art] Store in slot 0x4
3,143,868 UART: [art] Derive Key Pair
3,144,228 UART: [art] Store priv key in slot 0x5
3,157,226 UART: [art] Derive Key Pair - Done
3,171,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,380 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,145 UART: [art] PUB.X = C059675AA9775ACF680BCE1ACB0CF9F68205210DF1E7CC131906A79FCD02469FFA23E9A83E4351DFD7FF81FDA85F2FE8
3,194,917 UART: [art] PUB.Y = AEDB49B17DEC3F6F57A68520F935E8B379522B45304110897C9AC4A239514DF425B39C84B17C31CD3DEF390BCD88B024
3,201,870 UART: [art] SIG.R = 7621D3D577E467167BCF7416EACC72C879A88B4D0AA8BF62C6FC8A194DAA34CF1B97650968DEC913D19B02EFEE86F979
3,208,645 UART: [art] SIG.S = 25B4C0B476C4391E6F7E501918D1EA405F14BA9347F2C3463F7B0ED0F5C9BCAF39F3E686ABF4087150EBBA8794B54D3E
3,232,119 UART: Caliptra RT
3,232,462 UART: [state] CFI Enabled
3,352,478 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,292 UART:
3,354,308 UART: Running Caliptra ROM ...
3,354,716 UART:
3,354,858 UART: [state] CFI Enabled
3,357,636 UART: [state] LifecycleState = Unprovisioned
3,358,291 UART: [state] DebugLocked = No
3,358,997 UART: [state] WD Timer not started. Device not locked for debugging
3,360,221 UART: [kat] SHA2-256
4,163,771 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,167,875 UART: [kat] ++
4,168,027 UART: [kat] sha1
4,172,399 UART: [kat] SHA2-256
4,174,339 UART: [kat] SHA2-384
4,177,042 UART: [kat] SHA2-512-ACC
4,178,942 UART: [kat] ECC-384
4,188,617 UART: [kat] HMAC-384Kdf
4,193,177 UART: [kat] LMS
4,441,489 UART: [kat] --
4,442,423 UART: [update-reset] ++
5,799,442 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,800,647 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,955,862 >>> mbox cmd response: success
5,956,175 UART: [update-reset] Copying MAN_2 To MAN_1
5,964,189 UART: [update-reset Success] --
5,965,294 UART: [state] Locking Datavault
5,965,940 UART: [state] Locking PCR0, PCR1 and PCR31
5,966,544 UART: [state] Locking ICCM
5,967,142 UART: [exit] Launching FMC @ 0x40000130
5,972,472 UART:
5,972,488 UART: Running Caliptra FMC ...
5,972,896 UART:
5,973,039 UART: [state] CFI Enabled
6,062,660 UART: [art] Extend RT PCRs Done
6,063,088 UART: [art] Lock RT PCRs Done
6,064,331 UART: [art] Populate DV Done
6,072,308 UART: [fht] FMC Alias Private Key: 7
6,073,402 UART: [art] Derive CDI
6,073,682 UART: [art] Store in slot 0x4
6,159,639 UART: [art] Derive Key Pair
6,159,999 UART: [art] Store priv key in slot 0x5
6,173,635 UART: [art] Derive Key Pair - Done
6,188,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,203,762 UART: [art] Erasing AUTHORITY.KEYID = 7
6,204,527 UART: [art] PUB.X = 64DC3E51AE79FFB04D9B90C06EFBB23709609649B7D24D91A6F02A09FC99407F253FEC8355359A69A687E6DDB593E297
6,211,297 UART: [art] PUB.Y = D97B37E580503696CAE89930F7844FDAC3F09CA61F97F42D6089F24B19A0A1114A8F92573AE98E5E9A76129C59D4F92A
6,218,249 UART: [art] SIG.R = 9DFC90830C7B4F3C1F46F637CD619644DF0BFF0867652FFCFC1B41A0767AD483B499BD1DC947F28897048E84B381CB8E
6,225,017 UART: [art] SIG.S = B9FF719C145C84405169C594C555DF1859902E2978077261D148E8087E291035D4B732B4E35CD8C4BBCD428C92626B70
6,248,591 UART: Caliptra RT
6,248,934 UART: [state] CFI Enabled
6,610,429 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,449 ready_for_fw is high
1,059,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,941 >>> mbox cmd response: success
2,679,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,741,900 UART:
2,741,916 UART: Running Caliptra FMC ...
2,742,324 UART:
2,742,467 UART: [state] CFI Enabled
2,752,891 UART: [fht] FMC Alias Private Key: 7
2,871,957 UART: [art] Extend RT PCRs Done
2,872,385 UART: [art] Lock RT PCRs Done
2,873,777 UART: [art] Populate DV Done
2,881,926 UART: [fht] FMC Alias Private Key: 7
2,882,938 UART: [art] Derive CDI
2,883,218 UART: [art] Store in slot 0x4
2,969,233 UART: [art] Derive Key Pair
2,969,593 UART: [art] Store priv key in slot 0x5
2,983,181 UART: [art] Derive Key Pair - Done
2,998,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,732 UART: [art] PUB.X = 035B8AFE2962CE876090A6B820A1FBE6D95AC76A6631A12E0B93521D51DEE65B37501ED8309B9A7121AE7C7034985546
3,020,496 UART: [art] PUB.Y = C9501E40972EF7B6E2C27ACFD748A92517FC8A45E44F1FC73EADD9E08A9DDDD27F2BA50A03AB1465421F9227483F8E02
3,027,451 UART: [art] SIG.R = 6C2F529FB321827F482074C1ACD384CDC0008EAFD3C993C9ED6E9539CAF0FAEFE465ABA62D085CDE5B482AC87565EB4D
3,034,218 UART: [art] SIG.S = AA0FD1AB71C773F9E0B68CAE0867EB8B137C6E6E392329DE78FDCB9784EDE3331642DEF3618E1A56770392D9101246BD
3,058,105 UART: Caliptra RT
3,058,448 UART: [state] CFI Enabled
3,179,401 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,669,005 >>> mbox cmd response: success
5,682,442 UART:
5,682,458 UART: Running Caliptra FMC ...
5,682,866 UART:
5,683,009 UART: [state] CFI Enabled
5,772,236 UART: [art] Extend RT PCRs Done
5,772,664 UART: [art] Lock RT PCRs Done
5,773,825 UART: [art] Populate DV Done
5,781,994 UART: [fht] FMC Alias Private Key: 7
5,782,948 UART: [art] Derive CDI
5,783,228 UART: [art] Store in slot 0x4
5,868,419 UART: [art] Derive Key Pair
5,868,779 UART: [art] Store priv key in slot 0x5
5,882,265 UART: [art] Derive Key Pair - Done
5,897,058 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,912,285 UART: [art] Erasing AUTHORITY.KEYID = 7
5,913,050 UART: [art] PUB.X = 41500B137401CE6919C4B25C4DA910071FDFAC02039A5122ADEC7106532B901958EC4FEB3F4FB1CA053AE1E72AE503F0
5,919,804 UART: [art] PUB.Y = D6297A8B2940CF15BAA1A9CAE13E97F30065873D49A4C5FD607B6975163026F11DB208A6F4EA9598A0354B6B2FDA2055
5,926,733 UART: [art] SIG.R = 04B880E30167F010779FC86F017F6A6971C206F6C82D305159C062F11AB96F03B7A13EC4A024C8814354A3C1B600969D
5,933,458 UART: [art] SIG.S = 7E7C05C103D2DBDFAE912C3B74A610A0787AC1C2C70740456097BA1C1B8EA5B81233CEA7D2FA2E6762FB57C79CE1543C
5,957,331 UART: Caliptra RT
5,957,674 UART: [state] CFI Enabled
6,319,721 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
893,098 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,223 UART: [kat] ++
897,375 UART: [kat] sha1
901,453 UART: [kat] SHA2-256
903,393 UART: [kat] SHA2-384
906,154 UART: [kat] SHA2-512-ACC
908,055 UART: [kat] ECC-384
917,642 UART: [kat] HMAC-384Kdf
922,114 UART: [kat] LMS
1,170,442 UART: [kat] --
1,171,365 UART: [cold-reset] ++
1,171,825 UART: [fht] FHT @ 0x50003400
1,174,584 UART: [idev] ++
1,174,752 UART: [idev] CDI.KEYID = 6
1,175,112 UART: [idev] SUBJECT.KEYID = 7
1,175,536 UART: [idev] UDS.KEYID = 0
1,175,881 ready_for_fw is high
1,175,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,984 UART: [idev] Erasing UDS.KEYID = 0
1,201,483 UART: [idev] Sha1 KeyId Algorithm
1,210,041 UART: [idev] --
1,211,073 UART: [ldev] ++
1,211,241 UART: [ldev] CDI.KEYID = 6
1,211,604 UART: [ldev] SUBJECT.KEYID = 5
1,212,030 UART: [ldev] AUTHORITY.KEYID = 7
1,212,493 UART: [ldev] FE.KEYID = 1
1,217,677 UART: [ldev] Erasing FE.KEYID = 1
1,243,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,209 UART: [ldev] --
1,283,568 UART: [fwproc] Wait for Commands...
1,284,238 UART: [fwproc] Recv command 0x46574c44
1,284,966 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,314 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,484 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,811 >>> mbox cmd response: success
2,827,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,828,867 UART: [afmc] ++
2,829,035 UART: [afmc] CDI.KEYID = 6
2,829,397 UART: [afmc] SUBJECT.KEYID = 7
2,829,822 UART: [afmc] AUTHORITY.KEYID = 5
2,865,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,498 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,207 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,090 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,791 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,681 UART: [afmc] --
2,908,743 UART: [cold-reset] --
2,909,621 UART: [state] Locking Datavault
2,910,806 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,410 UART: [state] Locking ICCM
2,911,960 UART: [exit] Launching FMC @ 0x40000130
2,917,290 UART:
2,917,306 UART: Running Caliptra FMC ...
2,917,714 UART:
2,917,768 UART: [state] CFI Enabled
2,928,536 UART: [fht] FMC Alias Private Key: 7
3,046,902 UART: [art] Extend RT PCRs Done
3,047,330 UART: [art] Lock RT PCRs Done
3,048,742 UART: [art] Populate DV Done
3,056,905 UART: [fht] FMC Alias Private Key: 7
3,058,003 UART: [art] Derive CDI
3,058,283 UART: [art] Store in slot 0x4
3,144,510 UART: [art] Derive Key Pair
3,144,870 UART: [art] Store priv key in slot 0x5
3,158,220 UART: [art] Derive Key Pair - Done
3,172,891 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,624 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,389 UART: [art] PUB.X = 06E87959F1AABAE2331F81FAE47815BBAF1BB587F66CE9BD370A8AAA493A29330160D31D5F310A43DF6ABD1CEC4C3B8A
3,196,169 UART: [art] PUB.Y = 570BF5EA64D4677D1A469E28D1B0C9DC1D63786C73A1C56AC411A21565F2D05309965069B9F31D19877AC2C72055F40A
3,203,108 UART: [art] SIG.R = EB1F8DE6B1B42934FEE3871CEEAE67B86C11578E749EDC76AF316D51D9A374D84B6FB7D07D3D3927F192FA42254911D7
3,209,890 UART: [art] SIG.S = 3AB720AF6089FA862349410E7214135EE625FEB56A21311FD3C3D72A9886376EDE52A742CDCD62778B1E999580104CCB
3,233,619 UART: Caliptra RT
3,233,870 UART: [state] CFI Enabled
3,353,505 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,355,247 UART:
3,355,263 UART: Running Caliptra ROM ...
3,355,671 UART:
3,355,726 UART: [state] CFI Enabled
3,358,212 UART: [state] LifecycleState = Unprovisioned
3,358,867 UART: [state] DebugLocked = No
3,359,485 UART: [state] WD Timer not started. Device not locked for debugging
3,360,683 UART: [kat] SHA2-256
4,166,333 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,170,458 UART: [kat] ++
4,170,610 UART: [kat] sha1
4,174,764 UART: [kat] SHA2-256
4,176,704 UART: [kat] SHA2-384
4,179,287 UART: [kat] SHA2-512-ACC
4,181,187 UART: [kat] ECC-384
4,190,938 UART: [kat] HMAC-384Kdf
4,195,742 UART: [kat] LMS
4,444,070 UART: [kat] --
4,444,938 UART: [update-reset] ++
5,804,184 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,805,171 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,960,386 >>> mbox cmd response: success
5,960,701 UART: [update-reset] Copying MAN_2 To MAN_1
5,968,715 UART: [update-reset Success] --
5,969,582 UART: [state] Locking Datavault
5,970,350 UART: [state] Locking PCR0, PCR1 and PCR31
5,970,954 UART: [state] Locking ICCM
5,971,382 UART: [exit] Launching FMC @ 0x40000130
5,976,712 UART:
5,976,728 UART: Running Caliptra FMC ...
5,977,136 UART:
5,977,190 UART: [state] CFI Enabled
6,066,539 UART: [art] Extend RT PCRs Done
6,066,967 UART: [art] Lock RT PCRs Done
6,068,294 UART: [art] Populate DV Done
6,076,597 UART: [fht] FMC Alias Private Key: 7
6,077,629 UART: [art] Derive CDI
6,077,909 UART: [art] Store in slot 0x4
6,163,900 UART: [art] Derive Key Pair
6,164,260 UART: [art] Store priv key in slot 0x5
6,177,060 UART: [art] Derive Key Pair - Done
6,191,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,207,526 UART: [art] Erasing AUTHORITY.KEYID = 7
6,208,291 UART: [art] PUB.X = 3901C3E689D76145B89ED5904B1E73D2F35A9A0856773B732D16DEAEB0DEA6838FDCDBFDCA8C91FFB9967AF181E76D07
6,215,068 UART: [art] PUB.Y = 13CBB780712BABD544C02F86FEFB75D1B3363CC8F55E3D09020E237FECB1E8C6A077581D552A92D48FDDA6EE91A34ED0
6,222,027 UART: [art] SIG.R = 87E4BA4CB1E84401136BEA0E05DD75797942D585B5E129E9CB57E00E054E4AE4BBBBBAF5302E45DB1F549A82F219E35D
6,228,796 UART: [art] SIG.S = 0AA22F96C706E89F5AA00974CB88A6BF6E4A39B796F724940617F4AE38F122D2BB310D871E6D91FFC8AF53F901EBF725
6,252,414 UART: Caliptra RT
6,252,665 UART: [state] CFI Enabled
6,621,399 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,965 ready_for_fw is high
1,059,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,790 >>> mbox cmd response: success
2,678,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,659 UART:
2,740,675 UART: Running Caliptra FMC ...
2,741,083 UART:
2,741,137 UART: [state] CFI Enabled
2,751,785 UART: [fht] FMC Alias Private Key: 7
2,870,759 UART: [art] Extend RT PCRs Done
2,871,187 UART: [art] Lock RT PCRs Done
2,872,773 UART: [art] Populate DV Done
2,880,970 UART: [fht] FMC Alias Private Key: 7
2,881,930 UART: [art] Derive CDI
2,882,210 UART: [art] Store in slot 0x4
2,968,261 UART: [art] Derive Key Pair
2,968,621 UART: [art] Store priv key in slot 0x5
2,981,463 UART: [art] Derive Key Pair - Done
2,996,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,090 UART: [art] PUB.X = BA686177ED033E9A6F084B40B05D4050EB51914A3217368C21E02130B3B8D8A8DB6FDE11B0C9AE3D7889C0A9AF18DC2D
3,018,864 UART: [art] PUB.Y = 59DDB6EDFAD59AEB134251246F0CFCAD30899D33E0B9EDB429E2934506FAE4EED281AC6E22C7B15004C7FB96BDCE6B68
3,025,829 UART: [art] SIG.R = 35CBEE81BDA7BBB509678655FF563B5BB769FDCC5560163DD99C46828F1A9FB28FAB83A041F283461EB2EFBBBFA18EE6
3,032,618 UART: [art] SIG.S = B73D040FCF7905D8D1FD2BF7D5E132A6155B1A7A0B5CED9F9B7F50B4B4B33AC7C6A57771B6E3D5D4F07A454A8E248B4A
3,056,500 UART: Caliptra RT
3,056,751 UART: [state] CFI Enabled
3,176,732 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,667,822 >>> mbox cmd response: success
5,681,175 UART:
5,681,191 UART: Running Caliptra FMC ...
5,681,599 UART:
5,681,653 UART: [state] CFI Enabled
5,770,850 UART: [art] Extend RT PCRs Done
5,771,278 UART: [art] Lock RT PCRs Done
5,772,573 UART: [art] Populate DV Done
5,780,950 UART: [fht] FMC Alias Private Key: 7
5,782,100 UART: [art] Derive CDI
5,782,380 UART: [art] Store in slot 0x4
5,867,623 UART: [art] Derive Key Pair
5,867,983 UART: [art] Store priv key in slot 0x5
5,881,305 UART: [art] Derive Key Pair - Done
5,895,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,911,373 UART: [art] Erasing AUTHORITY.KEYID = 7
5,912,138 UART: [art] PUB.X = A5EA486C0596837DFA38A3EFAC5016A5CEEB433BB475C09ED7C74C62234F8D9342B71984E2CEA833B1508DDE6F5C57CA
5,918,921 UART: [art] PUB.Y = EAE2918DC6EC736DA73B227DB606FC1C79602F9E0DCB605DC2B19BC704290B7785D751CBBBE4D41D197119373154E764
5,925,867 UART: [art] SIG.R = 86DF354BF2F21EEC96A64024CFA05379EB13A9745EEA0F4170EF7BB85F583457F4C26C8DCC1F825AA6AECDAB60046AD4
5,932,651 UART: [art] SIG.S = 9BFB627A8305F079868731D99DF2BF45C33AAF993DB2D2F8E8F0BA463DB24EE5DA05C32DA13AEFD8F9B923FD6CD3FBE5
5,956,367 UART: Caliptra RT
5,956,618 UART: [state] CFI Enabled
6,322,507 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
893,495 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,620 UART: [kat] ++
897,772 UART: [kat] sha1
901,870 UART: [kat] SHA2-256
903,810 UART: [kat] SHA2-384
906,551 UART: [kat] SHA2-512-ACC
908,452 UART: [kat] ECC-384
918,411 UART: [kat] HMAC-384Kdf
923,077 UART: [kat] LMS
1,171,405 UART: [kat] --
1,172,434 UART: [cold-reset] ++
1,172,932 UART: [fht] FHT @ 0x50003400
1,175,623 UART: [idev] ++
1,175,791 UART: [idev] CDI.KEYID = 6
1,176,151 UART: [idev] SUBJECT.KEYID = 7
1,176,575 UART: [idev] UDS.KEYID = 0
1,176,920 ready_for_fw is high
1,176,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,639 UART: [idev] Erasing UDS.KEYID = 0
1,201,906 UART: [idev] Sha1 KeyId Algorithm
1,210,400 UART: [idev] --
1,211,586 UART: [ldev] ++
1,211,754 UART: [ldev] CDI.KEYID = 6
1,212,117 UART: [ldev] SUBJECT.KEYID = 5
1,212,543 UART: [ldev] AUTHORITY.KEYID = 7
1,213,006 UART: [ldev] FE.KEYID = 1
1,218,220 UART: [ldev] Erasing FE.KEYID = 1
1,244,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,074 UART: [ldev] --
1,284,347 UART: [fwproc] Wait for Commands...
1,285,069 UART: [fwproc] Recv command 0x46574c44
1,285,797 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,113 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,283 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,556 >>> mbox cmd response: success
2,829,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,830,580 UART: [afmc] ++
2,830,748 UART: [afmc] CDI.KEYID = 6
2,831,110 UART: [afmc] SUBJECT.KEYID = 7
2,831,535 UART: [afmc] AUTHORITY.KEYID = 5
2,866,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,135 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,844 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,727 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,428 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,412 UART: [afmc] --
2,910,344 UART: [cold-reset] --
2,911,084 UART: [state] Locking Datavault
2,912,257 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,861 UART: [state] Locking ICCM
2,913,421 UART: [exit] Launching FMC @ 0x40000130
2,918,751 UART:
2,918,767 UART: Running Caliptra FMC ...
2,919,175 UART:
2,919,318 UART: [state] CFI Enabled
2,930,102 UART: [fht] FMC Alias Private Key: 7
3,048,580 UART: [art] Extend RT PCRs Done
3,049,008 UART: [art] Lock RT PCRs Done
3,050,612 UART: [art] Populate DV Done
3,058,927 UART: [fht] FMC Alias Private Key: 7
3,060,045 UART: [art] Derive CDI
3,060,325 UART: [art] Store in slot 0x4
3,146,354 UART: [art] Derive Key Pair
3,146,714 UART: [art] Store priv key in slot 0x5
3,159,612 UART: [art] Derive Key Pair - Done
3,174,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,781 UART: [art] PUB.X = BC70AD8A4DE2EF9633850F9B50D7F3619923FD8065A0E911E7BFB90FD1EB88D97DC1EC45AE6F0B7127DC09307EDDD92F
3,197,559 UART: [art] PUB.Y = DCA2052839B964CA133E5FE7F808A441EDC07799A0934DCC9A6C2557D39E66655036DA17B47F11FEB1772B0A0A7596C6
3,204,501 UART: [art] SIG.R = F9AEBF414059650199874CBE37EDFC5D49E144BB76D3C7A0F59436FCED330B3322C9E29C2EACEDED2076297A293D2DC9
3,211,281 UART: [art] SIG.S = F256AD3DCE4368AC968A0FD0CCCA63611386E441FFF212B18BEA515FD625FF7B45EBE643136DC127F1AA24449CD92E2A
3,235,110 UART: Caliptra RT
3,235,453 UART: [state] CFI Enabled
3,355,851 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,358,367 UART:
3,358,383 UART: Running Caliptra ROM ...
3,358,791 UART:
3,358,933 UART: [state] CFI Enabled
3,362,085 UART: [state] LifecycleState = Unprovisioned
3,362,740 UART: [state] DebugLocked = No
3,363,286 UART: [state] WD Timer not started. Device not locked for debugging
3,364,588 UART: [kat] SHA2-256
4,170,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,174,363 UART: [kat] ++
4,174,515 UART: [kat] sha1
4,178,705 UART: [kat] SHA2-256
4,180,645 UART: [kat] SHA2-384
4,183,234 UART: [kat] SHA2-512-ACC
4,185,134 UART: [kat] ECC-384
4,194,823 UART: [kat] HMAC-384Kdf
4,199,317 UART: [kat] LMS
4,447,645 UART: [kat] --
4,448,501 UART: [update-reset] ++
5,808,675 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,809,808 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,965,023 >>> mbox cmd response: success
5,965,248 UART: [update-reset] Copying MAN_2 To MAN_1
5,973,262 UART: [update-reset Success] --
5,973,973 UART: [state] Locking Datavault
5,974,931 UART: [state] Locking PCR0, PCR1 and PCR31
5,975,535 UART: [state] Locking ICCM
5,976,207 UART: [exit] Launching FMC @ 0x40000130
5,981,537 UART:
5,981,553 UART: Running Caliptra FMC ...
5,981,961 UART:
5,982,104 UART: [state] CFI Enabled
6,071,625 UART: [art] Extend RT PCRs Done
6,072,053 UART: [art] Lock RT PCRs Done
6,073,264 UART: [art] Populate DV Done
6,081,505 UART: [fht] FMC Alias Private Key: 7
6,082,479 UART: [art] Derive CDI
6,082,759 UART: [art] Store in slot 0x4
6,168,400 UART: [art] Derive Key Pair
6,168,760 UART: [art] Store priv key in slot 0x5
6,181,642 UART: [art] Derive Key Pair - Done
6,196,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,212,342 UART: [art] Erasing AUTHORITY.KEYID = 7
6,213,107 UART: [art] PUB.X = C7AC6A49058C859FB344DB5E20DCD2AB4FBA35BD3CAD7590EB9CDAB10AD6B07B09CAA1E2526218E6979CF1A1579DE0B5
6,219,894 UART: [art] PUB.Y = 32E7DCF3C515C15E940DA13FFB2E0F20ED0416D9E5646F5D946AD7398204D3291F3BDABB97DFB029593D06544B4FEEBC
6,226,845 UART: [art] SIG.R = 3AC936FC9B45493F063550205456B13658E8F900AA3F256C015FD1510C4FE1F3C6670BCD5C13A50709EA5E448DB0EFD5
6,233,579 UART: [art] SIG.S = A401FBC2382206B4D5F623CAFBB4B04A76D374C7CCA09F6439B96C5136B2DB9EFB837E0A02FE1179E1862A7A5144AC0E
6,257,594 UART: Caliptra RT
6,257,937 UART: [state] CFI Enabled
6,618,409 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,408 ready_for_fw is high
1,060,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,427 >>> mbox cmd response: success
2,679,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,366 UART:
2,740,382 UART: Running Caliptra FMC ...
2,740,790 UART:
2,740,933 UART: [state] CFI Enabled
2,751,593 UART: [fht] FMC Alias Private Key: 7
2,869,921 UART: [art] Extend RT PCRs Done
2,870,349 UART: [art] Lock RT PCRs Done
2,872,167 UART: [art] Populate DV Done
2,880,342 UART: [fht] FMC Alias Private Key: 7
2,881,410 UART: [art] Derive CDI
2,881,690 UART: [art] Store in slot 0x4
2,967,475 UART: [art] Derive Key Pair
2,967,835 UART: [art] Store priv key in slot 0x5
2,981,125 UART: [art] Derive Key Pair - Done
2,995,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,499 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,264 UART: [art] PUB.X = FCC6AB9A298CB594949D227D546273E66E582CB37870791561B5E854F1455B21D00AEE2262CA1F6754997B7C988B68D9
3,019,027 UART: [art] PUB.Y = 730E76D5D4B64095B2E5887E71033D5D4EE711B26110767096F69490518A5F9DEECA0A3EC2FA52FABC1A973A20212691
3,025,968 UART: [art] SIG.R = AF9E5952FB1E6F424B140F6A109DBAAAD93245DBF262D979F801CE853D64E04089E2B87F433DBA105291139B1E5A648D
3,032,740 UART: [art] SIG.S = B87E6CA0298F4765EC9BF476AEFAAD9EEA1D496ACC3FF9372220119A8E6EB21F753D7E93B931DEF40D7ABED9B1E227F5
3,056,341 UART: Caliptra RT
3,056,684 UART: [state] CFI Enabled
3,175,990 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,666,463 >>> mbox cmd response: success
5,680,304 UART:
5,680,320 UART: Running Caliptra FMC ...
5,680,728 UART:
5,680,871 UART: [state] CFI Enabled
5,769,440 UART: [art] Extend RT PCRs Done
5,769,868 UART: [art] Lock RT PCRs Done
5,771,169 UART: [art] Populate DV Done
5,779,512 UART: [fht] FMC Alias Private Key: 7
5,780,468 UART: [art] Derive CDI
5,780,748 UART: [art] Store in slot 0x4
5,866,721 UART: [art] Derive Key Pair
5,867,081 UART: [art] Store priv key in slot 0x5
5,880,765 UART: [art] Derive Key Pair - Done
5,895,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,911,098 UART: [art] Erasing AUTHORITY.KEYID = 7
5,911,863 UART: [art] PUB.X = 3B1446437D5BE39F6AB8E2F59D4FC64195CB91AFD9E74FA39F92D37A7ABEA698C9054926375D09689E323F8AB38714A7
5,918,633 UART: [art] PUB.Y = 13C55D2FB3086E3908D9942C35D0EC24BC21268B2DD3FC22D35E10CC81EB3AD2F4DF727488EAF7E56EACFDA52D7B5C00
5,925,575 UART: [art] SIG.R = B44B16FF3FD8D0327C793528AB9345BD4C1ADD87A1186F98139342AD7427E0EBBC246C6CB040EB1BA183F4BE4D0B7232
5,932,354 UART: [art] SIG.S = 9F6B7BBDB46EEAE714FD70DCB8841D29C9A209AF791ED000BE8DF0BA06E4C04B6E75CD2365355C29A2C7CBEEEDFCDAB7
5,956,516 UART: Caliptra RT
5,956,859 UART: [state] CFI Enabled
6,321,548 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,025 UART:
192,387 UART: Running Caliptra ROM ...
193,517 UART:
193,663 UART: [state] CFI Enabled
262,679 UART: [state] LifecycleState = Unprovisioned
264,590 UART: [state] DebugLocked = No
266,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,123 UART: [kat] SHA2-256
440,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,331 UART: [kat] ++
451,781 UART: [kat] sha1
463,720 UART: [kat] SHA2-256
466,390 UART: [kat] SHA2-384
472,031 UART: [kat] SHA2-512-ACC
474,345 UART: [kat] ECC-384
2,767,761 UART: [kat] HMAC-384Kdf
2,801,588 UART: [kat] LMS
3,991,908 UART: [kat] --
3,996,141 UART: [cold-reset] ++
3,997,228 UART: [fht] Storing FHT @ 0x50003400
4,007,434 UART: [idev] ++
4,008,005 UART: [idev] CDI.KEYID = 6
4,008,932 UART: [idev] SUBJECT.KEYID = 7
4,010,106 UART: [idev] UDS.KEYID = 0
4,011,138 ready_for_fw is high
4,011,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,519 UART: [idev] Erasing UDS.KEYID = 0
7,337,926 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,076 UART: [idev] --
7,364,984 UART: [ldev] ++
7,365,550 UART: [ldev] CDI.KEYID = 6
7,366,516 UART: [ldev] SUBJECT.KEYID = 5
7,367,730 UART: [ldev] AUTHORITY.KEYID = 7
7,368,958 UART: [ldev] FE.KEYID = 1
7,415,903 UART: [ldev] Erasing FE.KEYID = 1
10,740,719 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,046,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,061,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,201 UART: [ldev] --
13,099,734 UART: [fwproc] Waiting for Commands...
13,102,325 UART: [fwproc] Received command 0x46574c44
13,104,507 UART: [fwproc] Received Image of size 118548 bytes
17,214,854 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,790 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,960 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,698,204 >>> mbox cmd response: success
17,702,237 UART: [afmc] ++
17,702,856 UART: [afmc] CDI.KEYID = 6
17,703,768 UART: [afmc] SUBJECT.KEYID = 7
17,705,037 UART: [afmc] AUTHORITY.KEYID = 5
21,058,097 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,359,275 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,361,570 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,376,021 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,390,726 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,405,143 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,425,936 UART: [afmc] --
23,429,039 UART: [cold-reset] --
23,433,297 UART: [state] Locking Datavault
23,438,335 UART: [state] Locking PCR0, PCR1 and PCR31
23,440,035 UART: [state] Locking ICCM
23,442,296 UART: [exit] Launching FMC @ 0x40000130
23,450,691 UART:
23,450,924 UART: Running Caliptra FMC ...
23,452,020 UART:
23,452,187 UART: [state] CFI Enabled
23,517,609 UART: [fht] FMC Alias Private Key: 7
25,858,417 UART: [art] Extend RT PCRs Done
25,859,637 UART: [art] Lock RT PCRs Done
25,861,048 UART: [art] Populate DV Done
25,866,410 UART: [fht] FMC Alias Private Key: 7
25,867,956 UART: [art] Derive CDI
25,868,767 UART: [art] Store in slot 0x4
25,926,938 UART: [art] Derive Key Pair
25,928,002 UART: [art] Store priv key in slot 0x5
29,220,691 UART: [art] Derive Key Pair - Done
29,233,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,522,654 UART: [art] Erasing AUTHORITY.KEYID = 7
31,524,170 UART: [art] PUB.X = AE21545FDBE6863808A21DEF8C53CD7A1DA461C1070FFB6E4449C816F8AD62CFCA702CD9A589561BC566371E476BB468
31,531,440 UART: [art] PUB.Y = 7611FC2C2210EAA43EC8D5DCE73E9C567933741D7CDADD21B9F1D280F8120969A530C9ED8C9675739F3DF5314DF63CA9
31,538,688 UART: [art] SIG.R = 63B85628633136721BBEB18B81EB6D6F97617BE2B20B2A36C85610AA8FFB66F50B05B1267B6BD2BDACF714E8F41EE951
31,546,106 UART: [art] SIG.S = FFBC929A5BB61C3AA68F905457D9BE397061ED3163776BD73CA575B6FB33CAF3AF93647476C461D7F2290BCC985CCC39
32,850,895 UART: Caliptra RT
32,851,612 UART: [state] CFI Enabled
33,029,042 UART: [rt] RT listening for mailbox commands...
33,030,957 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,061,424 UART: [rt]cmd =0x434b4558, len=80
38,797,475 >>> mbox cmd response data (6280 bytes)
38,831,253 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,861,546 UART: [rt]cmd =0x414c544e, len=41
38,863,812 >>> mbox cmd response data (8 bytes)
38,864,405 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,894,869 UART: [rt]cmd =0x434b4558, len=80
44,641,912 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,783,317 ready_for_fw is high
3,783,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,962,577 >>> mbox cmd response: success
23,655,067 UART:
23,655,481 UART: Running Caliptra FMC ...
23,656,631 UART:
23,656,800 UART: [state] CFI Enabled
23,723,329 UART: [fht] FMC Alias Private Key: 7
26,063,025 UART: [art] Extend RT PCRs Done
26,064,282 UART: [art] Lock RT PCRs Done
26,066,105 UART: [art] Populate DV Done
26,071,696 UART: [fht] FMC Alias Private Key: 7
26,073,415 UART: [art] Derive CDI
26,074,238 UART: [art] Store in slot 0x4
26,131,662 UART: [art] Derive Key Pair
26,132,866 UART: [art] Store priv key in slot 0x5
29,425,240 UART: [art] Derive Key Pair - Done
29,437,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,726,606 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,129 UART: [art] PUB.X = CFF6EE310C00C993642D5532B8857EC3BB915565864BCA381442F6769F7D0ACA6DA5BE85ED4D450E842205C3D74DEE19
31,735,378 UART: [art] PUB.Y = CD329ABB039F511E416148B37CA50AFA4A3BBA3E27B8B4B14261D4C69D96302116A5A2C5E67C25AEB62295A46E339C56
31,742,593 UART: [art] SIG.R = 5692C9895946938D5691E3346D805034AA887C7A3B2CDA38E2BA125DA90D2C6F71C437E14A5425CAE754FBDD13CB903C
31,749,992 UART: [art] SIG.S = D98D0BFA189465827C9B5E45EAC3CF9E8E17987C9504C83D784ED62DA4184C4113B7422CB50AE493DAA6D1FB8257A3FD
33,055,115 UART: Caliptra RT
33,055,830 UART: [state] CFI Enabled
33,233,201 UART: [rt] RT listening for mailbox commands...
33,235,100 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,265,573 UART: [rt]cmd =0x434b4558, len=80
39,001,597 >>> mbox cmd response data (6280 bytes)
39,035,875 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
39,066,211 UART: [rt]cmd =0x414c544e, len=41
39,068,573 >>> mbox cmd response data (8 bytes)
39,069,199 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
39,099,746 UART: [rt]cmd =0x434b4558, len=80
44,844,717 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,378 UART:
192,744 UART: Running Caliptra ROM ...
193,862 UART:
603,751 UART: [state] CFI Enabled
615,071 UART: [state] LifecycleState = Unprovisioned
617,028 UART: [state] DebugLocked = No
619,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,758 UART: [kat] SHA2-256
793,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,013 UART: [kat] ++
804,536 UART: [kat] sha1
814,955 UART: [kat] SHA2-256
817,678 UART: [kat] SHA2-384
824,160 UART: [kat] SHA2-512-ACC
826,530 UART: [kat] ECC-384
3,111,378 UART: [kat] HMAC-384Kdf
3,124,160 UART: [kat] LMS
4,314,228 UART: [kat] --
4,317,651 UART: [cold-reset] ++
4,319,152 UART: [fht] Storing FHT @ 0x50003400
4,331,045 UART: [idev] ++
4,331,609 UART: [idev] CDI.KEYID = 6
4,332,521 UART: [idev] SUBJECT.KEYID = 7
4,333,758 UART: [idev] UDS.KEYID = 0
4,334,841 ready_for_fw is high
4,335,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,003 UART: [idev] Erasing UDS.KEYID = 0
7,621,648 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,694 UART: [idev] --
7,647,473 UART: [ldev] ++
7,648,043 UART: [ldev] CDI.KEYID = 6
7,648,974 UART: [ldev] SUBJECT.KEYID = 5
7,650,231 UART: [ldev] AUTHORITY.KEYID = 7
7,651,509 UART: [ldev] FE.KEYID = 1
7,662,290 UART: [ldev] Erasing FE.KEYID = 1
10,949,743 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,461 UART: [ldev] --
13,311,175 UART: [fwproc] Waiting for Commands...
13,314,445 UART: [fwproc] Received command 0x46574c44
13,316,652 UART: [fwproc] Received Image of size 118548 bytes
17,420,996 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,898 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,070 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,908,565 >>> mbox cmd response: success
17,913,422 UART: [afmc] ++
17,914,029 UART: [afmc] CDI.KEYID = 6
17,914,914 UART: [afmc] SUBJECT.KEYID = 7
17,916,183 UART: [afmc] AUTHORITY.KEYID = 5
21,232,171 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,527,380 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,529,632 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,544,019 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,558,783 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,573,165 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,595,521 UART: [afmc] --
23,600,210 UART: [cold-reset] --
23,605,103 UART: [state] Locking Datavault
23,607,968 UART: [state] Locking PCR0, PCR1 and PCR31
23,609,656 UART: [state] Locking ICCM
23,611,852 UART: [exit] Launching FMC @ 0x40000130
23,620,240 UART:
23,620,476 UART: Running Caliptra FMC ...
23,621,572 UART:
23,621,726 UART: [state] CFI Enabled
23,629,854 UART: [fht] FMC Alias Private Key: 7
25,970,077 UART: [art] Extend RT PCRs Done
25,971,295 UART: [art] Lock RT PCRs Done
25,973,106 UART: [art] Populate DV Done
25,978,512 UART: [fht] FMC Alias Private Key: 7
25,980,205 UART: [art] Derive CDI
25,981,014 UART: [art] Store in slot 0x4
26,023,465 UART: [art] Derive Key Pair
26,024,463 UART: [art] Store priv key in slot 0x5
29,266,230 UART: [art] Derive Key Pair - Done
29,279,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,650 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,156 UART: [art] PUB.X = CDDE6557359E5391254541B535EA11C21D09BCC131034C7A629E7D6141B73B72E22A328B4363CFA5266D19481A1C8DD8
31,568,362 UART: [art] PUB.Y = D386AB5A7FC401F58A908CE8FCCE28462BFF76B24AB857003AA72AC3D8B64A2070E64113A9ABCB7FD8987102018CE0A7
31,575,645 UART: [art] SIG.R = F82F8D1301B7AAF7A228BBAC2F0A95B2A3BA023DA7E1E7D2405EF8EC33241DCC872FFF28376E4356BBE933DF52BC174A
31,583,038 UART: [art] SIG.S = 8F4B4BE6D0C9D3F5CA7B6C0631F3515516523457A2BA763337148D68C0972E491512DF906218205547F89585EF36AC5F
32,888,179 UART: Caliptra RT
32,888,898 UART: [state] CFI Enabled
33,021,690 UART: [rt] RT listening for mailbox commands...
33,023,590 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,054,101 UART: [rt]cmd =0x434b4558, len=80
38,714,059 >>> mbox cmd response data (6280 bytes)
38,747,749 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,778,120 UART: [rt]cmd =0x414c544e, len=41
38,780,543 >>> mbox cmd response data (8 bytes)
38,781,057 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,811,357 UART: [rt]cmd =0x434b4558, len=80
44,471,237 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
4,126,111 ready_for_fw is high
4,126,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,991 >>> mbox cmd response: success
23,807,750 UART:
23,808,160 UART: Running Caliptra FMC ...
23,809,316 UART:
23,809,474 UART: [state] CFI Enabled
23,817,480 UART: [fht] FMC Alias Private Key: 7
26,157,759 UART: [art] Extend RT PCRs Done
26,158,986 UART: [art] Lock RT PCRs Done
26,160,534 UART: [art] Populate DV Done
26,165,900 UART: [fht] FMC Alias Private Key: 7
26,167,544 UART: [art] Derive CDI
26,168,278 UART: [art] Store in slot 0x4
26,211,521 UART: [art] Derive Key Pair
26,212,511 UART: [art] Store priv key in slot 0x5
29,454,013 UART: [art] Derive Key Pair - Done
29,466,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,388 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,899 UART: [art] PUB.X = 46F8D174CD84072F443ACB5412C1DE1DA2C93315C764042B4AD906E5CD78E29087DD734579EE1844FEB2AF905541E061
31,756,195 UART: [art] PUB.Y = FF236210C49E35705187CF67938792FDB5B4FC0F9289C74B8A9D862D8DC028D8F05D3634D0BEC49650E0EC14AEAA807B
31,763,401 UART: [art] SIG.R = 42B2F2D2B789A22CA735B21757BA4C1C84F945CFDE8228141956E1CE742CF27562433B4FE57CCCAC110DE41C0E009B05
31,770,800 UART: [art] SIG.S = 4DCEAF0658B18E1AC1227D06E0378A2FC729E80C6B9BD68A99FD982EC2A64FAAB8FF405968886A7A6DA956A03EA6060B
33,076,523 UART: Caliptra RT
33,077,233 UART: [state] CFI Enabled
33,209,849 UART: [rt] RT listening for mailbox commands...
33,211,744 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,242,370 UART: [rt]cmd =0x434b4558, len=80
38,902,425 >>> mbox cmd response data (6280 bytes)
38,936,000 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,966,316 UART: [rt]cmd =0x414c544e, len=41
38,968,800 >>> mbox cmd response data (8 bytes)
38,969,462 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
39,000,032 UART: [rt]cmd =0x434b4558, len=80
44,660,411 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,178 UART:
192,528 UART: Running Caliptra ROM ...
193,723 UART:
193,881 UART: [state] CFI Enabled
261,347 UART: [state] LifecycleState = Unprovisioned
263,324 UART: [state] DebugLocked = No
265,491 UART: [state] WD Timer not started. Device not locked for debugging
269,822 UART: [kat] SHA2-256
449,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,275 UART: [kat] ++
460,761 UART: [kat] sha1
472,432 UART: [kat] SHA2-256
475,135 UART: [kat] SHA2-384
480,562 UART: [kat] SHA2-512-ACC
482,939 UART: [kat] ECC-384
2,949,193 UART: [kat] HMAC-384Kdf
2,972,396 UART: [kat] LMS
3,448,859 UART: [kat] --
3,453,802 UART: [cold-reset] ++
3,456,019 UART: [fht] FHT @ 0x50003400
3,468,488 UART: [idev] ++
3,469,047 UART: [idev] CDI.KEYID = 6
3,469,997 UART: [idev] SUBJECT.KEYID = 7
3,471,234 UART: [idev] UDS.KEYID = 0
3,472,201 ready_for_fw is high
3,472,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,512 UART: [idev] Erasing UDS.KEYID = 0
5,990,326 UART: [idev] Sha1 KeyId Algorithm
6,014,494 UART: [idev] --
6,020,651 UART: [ldev] ++
6,021,275 UART: [ldev] CDI.KEYID = 6
6,022,159 UART: [ldev] SUBJECT.KEYID = 5
6,023,372 UART: [ldev] AUTHORITY.KEYID = 7
6,024,661 UART: [ldev] FE.KEYID = 1
6,059,354 UART: [ldev] Erasing FE.KEYID = 1
8,564,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,707 UART: [ldev] --
10,375,685 UART: [fwproc] Wait for Commands...
10,378,429 UART: [fwproc] Recv command 0x46574c44
10,380,406 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,012 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,031 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,150 >>> mbox cmd response: success
14,354,821 UART: [afmc] ++
14,355,433 UART: [afmc] CDI.KEYID = 6
14,356,315 UART: [afmc] SUBJECT.KEYID = 7
14,357,526 UART: [afmc] AUTHORITY.KEYID = 5
16,895,238 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,257 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,443 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,257 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,302 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,881 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,578 UART: [afmc] --
18,695,841 UART: [cold-reset] --
18,698,348 UART: [state] Locking Datavault
18,702,832 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,591 UART: [state] Locking ICCM
18,705,743 UART: [exit] Launching FMC @ 0x40000130
18,714,144 UART:
18,714,413 UART: Running Caliptra FMC ...
18,715,521 UART:
18,715,678 UART: [state] CFI Enabled
18,777,011 UART: [fht] FMC Alias Private Key: 7
20,543,636 UART: [art] Extend RT PCRs Done
20,544,858 UART: [art] Lock RT PCRs Done
20,546,503 UART: [art] Populate DV Done
20,552,021 UART: [fht] FMC Alias Private Key: 7
20,553,670 UART: [art] Derive CDI
20,554,408 UART: [art] Store in slot 0x4
20,610,146 UART: [art] Derive Key Pair
20,611,145 UART: [art] Store priv key in slot 0x5
23,074,454 UART: [art] Derive Key Pair - Done
23,087,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,914 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,414 UART: [art] PUB.X = 3D3AB846649456280E44535BC6CD27F5835517696B92EAD2AE10CA39D115F0FDFA0B4553CFC46345D8EEB4BC296921B0
24,808,671 UART: [art] PUB.Y = 42F9B6F59D61D2A84C73C0ED4D475C0FDBFE953C8BAEF2B4C601E3CCC7812EF159AE60746B0620AB78B46141F81AD736
24,815,954 UART: [art] SIG.R = 588BBF4590BD804B6D6A7D458BD2574527B55183DD0ECF5E6DBFEE9F4EDF386BA639863FD4B12D4AA8A3099978CB5FE7
24,823,350 UART: [art] SIG.S = D8ECAD42593BBE047223044AF843DF112D4577AF4BE368CBB33E5B44A3D49655DAAAAE65AA29550E5810EFB50C09840B
25,802,101 UART: Caliptra RT
25,802,784 UART: [state] CFI Enabled
25,983,353 UART: [rt] RT listening for mailbox commands...
25,985,255 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,015,880 UART: [rt]cmd =0x434b4558, len=80
30,347,377 >>> mbox cmd response data (6280 bytes)
30,380,822 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,410,917 UART: [rt]cmd =0x414c544e, len=41
30,413,396 >>> mbox cmd response data (8 bytes)
30,413,990 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,444,452 UART: [rt]cmd =0x434b4558, len=80
34,784,020 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,459,847 ready_for_fw is high
3,460,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,247,651 >>> mbox cmd response: success
18,536,020 UART:
18,536,406 UART: Running Caliptra FMC ...
18,537,506 UART:
18,537,658 UART: [state] CFI Enabled
18,604,542 UART: [fht] FMC Alias Private Key: 7
20,370,982 UART: [art] Extend RT PCRs Done
20,372,207 UART: [art] Lock RT PCRs Done
20,374,074 UART: [art] Populate DV Done
20,379,631 UART: [fht] FMC Alias Private Key: 7
20,381,278 UART: [art] Derive CDI
20,382,013 UART: [art] Store in slot 0x4
20,437,160 UART: [art] Derive Key Pair
20,438,198 UART: [art] Store priv key in slot 0x5
22,901,403 UART: [art] Derive Key Pair - Done
22,914,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,303 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,810 UART: [art] PUB.X = 69C78448B2502AB9B1D015952E127EEFF7A51EC094C02D2D86116AD0A2A64E97EB858269EA7A2D652B34EDCD12AE8CC0
24,636,071 UART: [art] PUB.Y = 8659EA7A226E917167773AC550E0F408D7D78097FBE7CA6A6AB3585B232E53585A737FEAA46D609C0814F18F807620C0
24,643,332 UART: [art] SIG.R = 6F4B66631718B791D067FC0737F92E719D4463C3A93A07FE19E6370CAFB2944C99B0D66EA4272ADA2DDC5FEA9CEC0323
24,650,685 UART: [art] SIG.S = D26E46623B6291E52FB7E667120E887A4FDB81BC81CAF13CD5AA1BE333898BA045473D2531A1681965C048DFBDD7689A
25,629,462 UART: Caliptra RT
25,630,176 UART: [state] CFI Enabled
25,812,557 UART: [rt] RT listening for mailbox commands...
25,814,484 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,845,186 UART: [rt]cmd =0x434b4558, len=80
30,176,201 >>> mbox cmd response data (6280 bytes)
30,209,737 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,240,211 UART: [rt]cmd =0x414c544e, len=41
30,242,577 >>> mbox cmd response data (8 bytes)
30,243,060 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,273,475 UART: [rt]cmd =0x434b4558, len=80
34,613,540 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,540 UART:
192,894 UART: Running Caliptra ROM ...
194,021 UART:
603,662 UART: [state] CFI Enabled
616,904 UART: [state] LifecycleState = Unprovisioned
618,778 UART: [state] DebugLocked = No
620,948 UART: [state] WD Timer not started. Device not locked for debugging
625,577 UART: [kat] SHA2-256
805,175 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,979 UART: [kat] ++
816,426 UART: [kat] sha1
827,583 UART: [kat] SHA2-256
830,332 UART: [kat] SHA2-384
837,277 UART: [kat] SHA2-512-ACC
839,653 UART: [kat] ECC-384
3,281,301 UART: [kat] HMAC-384Kdf
3,294,553 UART: [kat] LMS
3,771,100 UART: [kat] --
3,775,314 UART: [cold-reset] ++
3,776,892 UART: [fht] FHT @ 0x50003400
3,786,731 UART: [idev] ++
3,787,307 UART: [idev] CDI.KEYID = 6
3,788,221 UART: [idev] SUBJECT.KEYID = 7
3,789,483 UART: [idev] UDS.KEYID = 0
3,790,421 ready_for_fw is high
3,790,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,408 UART: [idev] Erasing UDS.KEYID = 0
6,267,825 UART: [idev] Sha1 KeyId Algorithm
6,290,967 UART: [idev] --
6,294,371 UART: [ldev] ++
6,294,943 UART: [ldev] CDI.KEYID = 6
6,296,066 UART: [ldev] SUBJECT.KEYID = 5
6,297,178 UART: [ldev] AUTHORITY.KEYID = 7
6,298,355 UART: [ldev] FE.KEYID = 1
6,309,867 UART: [ldev] Erasing FE.KEYID = 1
8,790,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,273 UART: [ldev] --
10,586,382 UART: [fwproc] Wait for Commands...
10,588,586 UART: [fwproc] Recv command 0x46574c44
10,590,616 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,487 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,545 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,557,976 >>> mbox cmd response: success
14,561,767 UART: [afmc] ++
14,562,365 UART: [afmc] CDI.KEYID = 6
14,563,251 UART: [afmc] SUBJECT.KEYID = 7
14,564,520 UART: [afmc] AUTHORITY.KEYID = 5
17,066,041 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,155 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,345 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,189 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,267 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,833 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,859,110 UART: [afmc] --
18,863,782 UART: [cold-reset] --
18,867,813 UART: [state] Locking Datavault
18,870,955 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,709 UART: [state] Locking ICCM
18,875,292 UART: [exit] Launching FMC @ 0x40000130
18,883,688 UART:
18,883,929 UART: Running Caliptra FMC ...
18,885,033 UART:
18,885,201 UART: [state] CFI Enabled
18,893,361 UART: [fht] FMC Alias Private Key: 7
20,659,021 UART: [art] Extend RT PCRs Done
20,660,240 UART: [art] Lock RT PCRs Done
20,661,831 UART: [art] Populate DV Done
20,667,141 UART: [fht] FMC Alias Private Key: 7
20,668,861 UART: [art] Derive CDI
20,669,657 UART: [art] Store in slot 0x4
20,712,259 UART: [art] Derive Key Pair
20,713,265 UART: [art] Store priv key in slot 0x5
23,140,249 UART: [art] Derive Key Pair - Done
23,153,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,493 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,993 UART: [art] PUB.X = 483664896060C64144AB603FF4989C74EDCFA0321776A94077FB72D4AA98FDBEC11C1520E2CFE50602E431611903E4B0
24,868,290 UART: [art] PUB.Y = 6B969759433573AB21D1E9E110A6EA8E1D552F68F00D655310A030261542185651E10E7B27E5E8CEC50C95F8D7C45A73
24,875,521 UART: [art] SIG.R = 1121D8C45D0C35AC84F9AAD5408FB78982D8F913BF7508AB60D9F1517D9567B5729D881D602218C47643968684E8808C
24,882,916 UART: [art] SIG.S = 98E756BA8E255A602278176FC028A66E85183BA66B82C8D7D4C969B1D29262597C8DE50D5C8831129053B2D7F14CFAAB
25,861,677 UART: Caliptra RT
25,862,381 UART: [state] CFI Enabled
25,995,598 UART: [rt] RT listening for mailbox commands...
25,997,511 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,027,884 UART: [rt]cmd =0x434b4558, len=80
30,298,914 >>> mbox cmd response data (6280 bytes)
30,332,832 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,363,042 UART: [rt]cmd =0x414c544e, len=41
30,365,307 >>> mbox cmd response data (8 bytes)
30,365,922 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,396,501 UART: [rt]cmd =0x434b4558, len=80
34,667,183 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,775,211 ready_for_fw is high
3,775,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,426,542 >>> mbox cmd response: success
18,679,077 UART:
18,679,462 UART: Running Caliptra FMC ...
18,680,663 UART:
18,680,868 UART: [state] CFI Enabled
18,688,835 UART: [fht] FMC Alias Private Key: 7
20,454,496 UART: [art] Extend RT PCRs Done
20,455,720 UART: [art] Lock RT PCRs Done
20,457,412 UART: [art] Populate DV Done
20,462,668 UART: [fht] FMC Alias Private Key: 7
20,464,207 UART: [art] Derive CDI
20,465,028 UART: [art] Store in slot 0x4
20,507,412 UART: [art] Derive Key Pair
20,508,414 UART: [art] Store priv key in slot 0x5
22,935,187 UART: [art] Derive Key Pair - Done
22,948,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,654,162 UART: [art] Erasing AUTHORITY.KEYID = 7
24,655,667 UART: [art] PUB.X = 1EDC6EB712A4F4B1A46AA31DAA0833AE3A401E9E11ECBF2A29E3EFF6222491A2D93F89A2DA34DE046C30BE0ACE0731C1
24,662,928 UART: [art] PUB.Y = 8D4A2C02CF098042FEB5284495B01DEDA8CE6A7D5ECA0160CE99FBD99CD7D5FB984CCCDB1334790C9BB0CF3812C93BC6
24,670,236 UART: [art] SIG.R = 29A00885DFA5D1B0C5ED718EF10DE3C39C4D4C0651EB3E26408B80C30B0E944BF4D29A56B3B0D09906F47BC1BA8CDB3C
24,677,665 UART: [art] SIG.S = 6EFFA7B96CDAE732F24E56DC62CA24392E09F06AF592B1FE055173408C34DA6BDF4E58F6DBA7D34E932D650D3F1E4F46
25,656,844 UART: Caliptra RT
25,657,553 UART: [state] CFI Enabled
25,790,063 UART: [rt] RT listening for mailbox commands...
25,791,967 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,822,378 UART: [rt]cmd =0x434b4558, len=80
30,094,115 >>> mbox cmd response data (6280 bytes)
30,128,177 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,158,469 UART: [rt]cmd =0x414c544e, len=41
30,160,966 >>> mbox cmd response data (8 bytes)
30,161,535 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,191,838 UART: [rt]cmd =0x434b4558, len=80
34,463,512 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,114 UART:
192,467 UART: Running Caliptra ROM ...
193,644 UART:
193,801 UART: [state] CFI Enabled
266,246 UART: [state] LifecycleState = Unprovisioned
268,655 UART: [state] DebugLocked = No
271,327 UART: [state] WD Timer not started. Device not locked for debugging
276,496 UART: [kat] SHA2-256
466,355 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,114 UART: [kat] ++
477,594 UART: [kat] sha1
490,315 UART: [kat] SHA2-256
493,320 UART: [kat] SHA2-384
499,874 UART: [kat] SHA2-512-ACC
502,461 UART: [kat] ECC-384
2,946,868 UART: [kat] HMAC-384Kdf
2,970,890 UART: [kat] LMS
3,502,663 UART: [kat] --
3,506,120 UART: [cold-reset] ++
3,508,692 UART: [fht] FHT @ 0x50003400
3,520,238 UART: [idev] ++
3,520,952 UART: [idev] CDI.KEYID = 6
3,521,933 UART: [idev] SUBJECT.KEYID = 7
3,523,104 UART: [idev] UDS.KEYID = 0
3,524,025 ready_for_fw is high
3,524,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,301 UART: [idev] Erasing UDS.KEYID = 0
6,026,749 UART: [idev] Sha1 KeyId Algorithm
6,049,175 UART: [idev] --
6,053,332 UART: [ldev] ++
6,054,012 UART: [ldev] CDI.KEYID = 6
6,054,980 UART: [ldev] SUBJECT.KEYID = 5
6,056,062 UART: [ldev] AUTHORITY.KEYID = 7
6,057,502 UART: [ldev] FE.KEYID = 1
6,101,850 UART: [ldev] Erasing FE.KEYID = 1
8,606,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,956 UART: [ldev] --
10,416,207 UART: [fwproc] Wait for Commands...
10,418,514 UART: [fwproc] Recv command 0x46574c44
10,420,763 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,704 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,354 >>> mbox cmd response: success
14,682,773 UART: [afmc] ++
14,683,498 UART: [afmc] CDI.KEYID = 6
14,684,686 UART: [afmc] SUBJECT.KEYID = 7
14,686,172 UART: [afmc] AUTHORITY.KEYID = 5
17,219,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,024 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,141 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,285 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,173 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,741 UART: [afmc] --
19,031,399 UART: [cold-reset] --
19,035,322 UART: [state] Locking Datavault
19,039,340 UART: [state] Locking PCR0, PCR1 and PCR31
19,041,542 UART: [state] Locking ICCM
19,043,536 UART: [exit] Launching FMC @ 0x40000130
19,052,163 UART:
19,052,396 UART: Running Caliptra FMC ...
19,053,495 UART:
19,053,658 UART: [state] CFI Enabled
19,115,863 UART: [fht] FMC Alias Private Key: 7
20,882,167 UART: [art] Extend RT PCRs Done
20,883,383 UART: [art] Lock RT PCRs Done
20,885,301 UART: [art] Populate DV Done
20,891,031 UART: [fht] FMC Alias Private Key: 7
20,892,646 UART: [art] Derive CDI
20,893,459 UART: [art] Store in slot 0x4
20,948,442 UART: [art] Derive Key Pair
20,949,478 UART: [art] Store priv key in slot 0x5
23,412,447 UART: [art] Derive Key Pair - Done
23,425,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,140,034 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,547 UART: [art] PUB.X = 715414DC30ACC1A87E96F8C6471CDE5E19275D6454FAD056C053E0E78DD229C046EC9559FD635CAA943A55B1BFFA0084
25,148,772 UART: [art] PUB.Y = 17A509613017C15CFBFE4DE04A2E7DEEB17EE8FB8DDC951B3602C143918361055CA55AB0C0B60AB711AAADC0F0F84DFD
25,156,036 UART: [art] SIG.R = B57C74446EC18054EE24358924FF7754DD36E8BC27810FEE4709D6AC05CDD63BBD27971DA31749E0CE088AB5F5297921
25,163,413 UART: [art] SIG.S = 4B6104E0A4343A5CDDA81C91573F93C4E25E2CC45527F8222E14771489E757C2236C3FA1D0E47CE3E2B69CDA1FE2C1CC
26,142,129 UART: Caliptra RT
26,142,813 UART: [state] CFI Enabled
26,323,969 UART: [rt] RT listening for mailbox commands...
26,325,887 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,356,336 UART: [rt]cmd =0x434b4558, len=80
30,688,530 >>> mbox cmd response data (6280 bytes)
30,722,653 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,752,941 UART: [rt]cmd =0x414c544e, len=41
30,755,183 >>> mbox cmd response data (8 bytes)
30,755,759 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,786,262 UART: [rt]cmd =0x434b4558, len=80
35,125,482 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,439,130 ready_for_fw is high
3,439,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,315 >>> mbox cmd response: success
19,111,998 UART:
19,112,406 UART: Running Caliptra FMC ...
19,113,545 UART:
19,113,703 UART: [state] CFI Enabled
19,179,303 UART: [fht] FMC Alias Private Key: 7
20,945,401 UART: [art] Extend RT PCRs Done
20,946,631 UART: [art] Lock RT PCRs Done
20,948,312 UART: [art] Populate DV Done
20,954,116 UART: [fht] FMC Alias Private Key: 7
20,955,816 UART: [art] Derive CDI
20,956,630 UART: [art] Store in slot 0x4
21,011,950 UART: [art] Derive Key Pair
21,012,998 UART: [art] Store priv key in slot 0x5
23,476,337 UART: [art] Derive Key Pair - Done
23,489,069 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,245 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,753 UART: [art] PUB.X = 051FF4B232C7DBC51B8F1FFDB6C2C280997645948A3F99A2C81BB0A144943A04A1D89CA1448A1EB0359A6C6DED71FB4B
25,211,023 UART: [art] PUB.Y = 6014DC016271C2C3508F8D1823D2EC32C1BAA5A0A14C42A6ABC34511285B131CD1C8966827C8E1B3DBB4A100305CF723
25,218,234 UART: [art] SIG.R = 5EA71CA3F11E4E8B2BB9C37E82E9841406AAC7AD938ADAEEB57813B47EA8006F1C429725F9430C730EC575C5B90913C8
25,225,600 UART: [art] SIG.S = CA62B959CE2E5341B71B37BF02C23009B4521E60CE2F7A98769F61914C6C40E594742CBEBB4530B18334A665346732E0
26,204,248 UART: Caliptra RT
26,204,936 UART: [state] CFI Enabled
26,386,342 UART: [rt] RT listening for mailbox commands...
26,388,253 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,418,612 UART: [rt]cmd =0x434b4558, len=80
30,750,710 >>> mbox cmd response data (6280 bytes)
30,784,122 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,814,458 UART: [rt]cmd =0x414c544e, len=41
30,816,872 >>> mbox cmd response data (8 bytes)
30,817,442 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,847,660 UART: [rt]cmd =0x434b4558, len=80
35,186,987 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,144 UART:
192,515 UART: Running Caliptra ROM ...
193,705 UART:
603,240 UART: [state] CFI Enabled
616,934 UART: [state] LifecycleState = Unprovisioned
619,320 UART: [state] DebugLocked = No
621,354 UART: [state] WD Timer not started. Device not locked for debugging
626,558 UART: [kat] SHA2-256
816,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,176 UART: [kat] ++
827,786 UART: [kat] sha1
838,954 UART: [kat] SHA2-256
841,971 UART: [kat] SHA2-384
848,250 UART: [kat] SHA2-512-ACC
850,841 UART: [kat] ECC-384
3,293,561 UART: [kat] HMAC-384Kdf
3,306,735 UART: [kat] LMS
3,838,530 UART: [kat] --
3,842,383 UART: [cold-reset] ++
3,844,317 UART: [fht] FHT @ 0x50003400
3,857,002 UART: [idev] ++
3,857,718 UART: [idev] CDI.KEYID = 6
3,858,646 UART: [idev] SUBJECT.KEYID = 7
3,859,841 UART: [idev] UDS.KEYID = 0
3,860,824 ready_for_fw is high
3,861,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,332 UART: [idev] Erasing UDS.KEYID = 0
6,336,521 UART: [idev] Sha1 KeyId Algorithm
6,359,038 UART: [idev] --
6,362,877 UART: [ldev] ++
6,363,555 UART: [ldev] CDI.KEYID = 6
6,364,470 UART: [ldev] SUBJECT.KEYID = 5
6,365,684 UART: [ldev] AUTHORITY.KEYID = 7
6,366,867 UART: [ldev] FE.KEYID = 1
6,377,785 UART: [ldev] Erasing FE.KEYID = 1
8,854,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,860 UART: [ldev] --
10,642,977 UART: [fwproc] Wait for Commands...
10,646,106 UART: [fwproc] Recv command 0x46574c44
10,648,421 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,948 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,540 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,731 >>> mbox cmd response: success
14,922,379 UART: [afmc] ++
14,923,110 UART: [afmc] CDI.KEYID = 6
14,924,313 UART: [afmc] SUBJECT.KEYID = 7
14,925,763 UART: [afmc] AUTHORITY.KEYID = 5
17,423,895 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,839 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,964 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,065 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,981 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,217,665 UART: [afmc] --
19,221,649 UART: [cold-reset] --
19,225,415 UART: [state] Locking Datavault
19,229,497 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,725 UART: [state] Locking ICCM
19,233,781 UART: [exit] Launching FMC @ 0x40000130
19,242,425 UART:
19,242,660 UART: Running Caliptra FMC ...
19,243,695 UART:
19,243,846 UART: [state] CFI Enabled
19,252,275 UART: [fht] FMC Alias Private Key: 7
21,018,324 UART: [art] Extend RT PCRs Done
21,019,557 UART: [art] Lock RT PCRs Done
21,021,432 UART: [art] Populate DV Done
21,026,639 UART: [fht] FMC Alias Private Key: 7
21,028,185 UART: [art] Derive CDI
21,029,008 UART: [art] Store in slot 0x4
21,071,778 UART: [art] Derive Key Pair
21,072,824 UART: [art] Store priv key in slot 0x5
23,499,561 UART: [art] Derive Key Pair - Done
23,512,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,423 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,933 UART: [art] PUB.X = 2922E5D33C819FACF0FEE6AEDCB158E49DB2580D833BC1765521AD693CAA3F4F589A98B7DF37182753389876A430B492
25,228,203 UART: [art] PUB.Y = 1E74A32DDA540AAD1F49842E17865A8FEC48E858D59E31A0FB64964244FACE104B5F92F03A5C915A8BDA27C2002CA385
25,235,458 UART: [art] SIG.R = 43456A538FEA15AE956DB49F017DFF8005E900C7DFB4F13D8D37360982A86276E22B5640242FBAD787A66788A4B2E8F9
25,242,811 UART: [art] SIG.S = 42A97C572AD1D031DAAC35240241CB632E749DC3FDF03DA7853EDFCFC4A8C123FC5A078E9DF7A57456D9BD741B5E4CBE
26,221,777 UART: Caliptra RT
26,222,465 UART: [state] CFI Enabled
26,356,437 UART: [rt] RT listening for mailbox commands...
26,358,359 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,388,991 UART: [rt]cmd =0x434b4558, len=80
30,660,343 >>> mbox cmd response data (6280 bytes)
30,693,709 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,723,975 UART: [rt]cmd =0x414c544e, len=41
30,726,238 >>> mbox cmd response data (8 bytes)
30,726,750 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,757,104 UART: [rt]cmd =0x434b4558, len=80
35,028,365 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,756,479 ready_for_fw is high
3,756,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,041,501 >>> mbox cmd response: success
19,293,281 UART:
19,293,696 UART: Running Caliptra FMC ...
19,294,835 UART:
19,295,006 UART: [state] CFI Enabled
19,302,637 UART: [fht] FMC Alias Private Key: 7
21,069,267 UART: [art] Extend RT PCRs Done
21,070,500 UART: [art] Lock RT PCRs Done
21,072,182 UART: [art] Populate DV Done
21,077,803 UART: [fht] FMC Alias Private Key: 7
21,079,466 UART: [art] Derive CDI
21,080,294 UART: [art] Store in slot 0x4
21,123,177 UART: [art] Derive Key Pair
21,124,224 UART: [art] Store priv key in slot 0x5
23,551,513 UART: [art] Derive Key Pair - Done
23,564,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,637 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,148 UART: [art] PUB.X = 6CBA3E49AC7960079B803E8E19860F6A08EE3AB1882959929A2A48483823A47C177A8619843A40AB17086FA0E986DEF4
25,279,364 UART: [art] PUB.Y = 62C06E74882E9EF8D3CF4B1863E0D493B11B93E3C8EC58FEA095655407F5E5EEAFBF40904A7EA4D867EE68CF37D24431
25,286,657 UART: [art] SIG.R = 81F0356933D76A6BD6DA94F82BDA49C58AE59CC6E3535AFF63AC94CCABBF245AE64817B6FC10FA2FCD2E46C6C2B6B8F8
25,294,091 UART: [art] SIG.S = D43521315275CC8C41EFD2B8628829027F485B376C708D353EE5296269CA16FDECE21805E15A2856F7A31BE2E36F36A0
26,272,992 UART: Caliptra RT
26,273,687 UART: [state] CFI Enabled
26,405,658 UART: [rt] RT listening for mailbox commands...
26,407,594 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,438,088 UART: [rt]cmd =0x434b4558, len=80
30,709,098 >>> mbox cmd response data (6280 bytes)
30,742,591 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,772,748 UART: [rt]cmd =0x414c544e, len=41
30,775,145 >>> mbox cmd response data (8 bytes)
30,775,740 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,806,297 UART: [rt]cmd =0x434b4558, len=80
35,077,107 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,709 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,377 UART: [kat] SHA2-256
882,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,423 UART: [kat] ++
886,575 UART: [kat] sha1
890,865 UART: [kat] SHA2-256
892,803 UART: [kat] SHA2-384
895,458 UART: [kat] SHA2-512-ACC
897,359 UART: [kat] ECC-384
902,526 UART: [kat] HMAC-384Kdf
907,000 UART: [kat] LMS
1,475,196 UART: [kat] --
1,476,191 UART: [cold-reset] ++
1,476,697 UART: [fht] Storing FHT @ 0x50003400
1,479,592 UART: [idev] ++
1,479,760 UART: [idev] CDI.KEYID = 6
1,480,120 UART: [idev] SUBJECT.KEYID = 7
1,480,544 UART: [idev] UDS.KEYID = 0
1,480,889 ready_for_fw is high
1,480,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,394 UART: [idev] Erasing UDS.KEYID = 0
1,505,252 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,884 UART: [idev] --
1,514,941 UART: [ldev] ++
1,515,109 UART: [ldev] CDI.KEYID = 6
1,515,472 UART: [ldev] SUBJECT.KEYID = 5
1,515,898 UART: [ldev] AUTHORITY.KEYID = 7
1,516,361 UART: [ldev] FE.KEYID = 1
1,521,257 UART: [ldev] Erasing FE.KEYID = 1
1,546,714 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,782 UART: [ldev] --
1,586,145 UART: [fwproc] Waiting for Commands...
1,586,866 UART: [fwproc] Received command 0x46574c44
1,587,657 UART: [fwproc] Received Image of size 118548 bytes
2,931,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,201 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,419 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,738 >>> mbox cmd response: success
3,130,818 UART: [afmc] ++
3,130,986 UART: [afmc] CDI.KEYID = 6
3,131,348 UART: [afmc] SUBJECT.KEYID = 7
3,131,773 UART: [afmc] AUTHORITY.KEYID = 5
3,166,462 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,630 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,410 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,119 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,002 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,685 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,527 UART: [afmc] --
3,209,605 UART: [cold-reset] --
3,210,559 UART: [state] Locking Datavault
3,211,386 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,990 UART: [state] Locking ICCM
3,212,658 UART: [exit] Launching FMC @ 0x40000130
3,217,988 UART:
3,218,004 UART: Running Caliptra FMC ...
3,218,412 UART:
3,218,466 UART: [state] CFI Enabled
3,228,774 UART: [fht] FMC Alias Private Key: 7
3,348,402 UART: [art] Extend RT PCRs Done
3,348,830 UART: [art] Lock RT PCRs Done
3,350,372 UART: [art] Populate DV Done
3,358,599 UART: [fht] FMC Alias Private Key: 7
3,359,537 UART: [art] Derive CDI
3,359,817 UART: [art] Store in slot 0x4
3,445,417 UART: [art] Derive Key Pair
3,445,777 UART: [art] Store priv key in slot 0x5
3,458,760 UART: [art] Derive Key Pair - Done
3,473,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,965 UART: [art] PUB.X = 0780B8C8A5C2F16AB347CDE0C69B1636BF4BB105DB7F580DEFAE22604C483438C2A1A120171F6F33B7CFA410207F7A45
3,496,736 UART: [art] PUB.Y = 3A23F62AACC4CA0B239B3D2F4FE6EA6DC417DB3781FD0B9227EBAF1B151B1DC2962BD4347E4E1948781C14392C9B3A86
3,503,696 UART: [art] SIG.R = DF644FDAFB0E27C4659B9ED08557FBE6E44E07B93D3C5E799459EAD88000A6D18392CBD84103DF0384DC74FC470F587C
3,510,441 UART: [art] SIG.S = 59C90C5F33720BB5C8EAD0CDB25CE3F3FBD00AFA69969A4B0CBE6695DCAE5669538261D3F67AAE8AAC92E3EB1B27721A
3,534,467 UART: Caliptra RT
3,534,718 UART: [state] CFI Enabled
3,655,806 UART: [rt] RT listening for mailbox commands...
3,656,476 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,782 UART: [rt]cmd =0x434b4558, len=80
3,856,675 >>> mbox cmd response data (6280 bytes)
3,856,676 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,338 UART: [rt]cmd =0x414c544e, len=41
3,888,171 >>> mbox cmd response data (8 bytes)
3,888,172 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,918,061 UART: [rt]cmd =0x434b4558, len=80
4,086,794 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,763 ready_for_fw is high
1,362,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,954 >>> mbox cmd response: success
3,042,079 UART:
3,042,095 UART: Running Caliptra FMC ...
3,042,503 UART:
3,042,557 UART: [state] CFI Enabled
3,053,123 UART: [fht] FMC Alias Private Key: 7
3,172,381 UART: [art] Extend RT PCRs Done
3,172,809 UART: [art] Lock RT PCRs Done
3,174,357 UART: [art] Populate DV Done
3,182,510 UART: [fht] FMC Alias Private Key: 7
3,183,456 UART: [art] Derive CDI
3,183,736 UART: [art] Store in slot 0x4
3,269,556 UART: [art] Derive Key Pair
3,269,916 UART: [art] Store priv key in slot 0x5
3,282,785 UART: [art] Derive Key Pair - Done
3,297,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,201 UART: [art] PUB.X = 403D58585C8C7322F1934B7C57E545691ECECD7ED69BD01F3D141A9FB1ACB40CE5594761F57960D22D25DC542D09853B
3,320,969 UART: [art] PUB.Y = F312ADFBA1CA339EDA8393D1D2909309218A6A0D368D9A12A28323FC55A3D17E36F9772F57242DC42D2E91EA41C8A6E3
3,327,921 UART: [art] SIG.R = EB9AB09D9D1C5EDA47988314C34E1FCDD8424247D5822466AE9F1E0E831B296064DB24ACFB1418D6DDEDB8036C63E665
3,334,697 UART: [art] SIG.S = 2BE19B23FCFE9E9FBBECB7C08920F5BB6589CD526F04E926AD73BFDA94DC52D9E6542DECB332E1180A6A48CBEC5BECCB
3,358,733 UART: Caliptra RT
3,358,984 UART: [state] CFI Enabled
3,479,490 UART: [rt] RT listening for mailbox commands...
3,480,160 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,266 UART: [rt]cmd =0x434b4558, len=80
3,680,257 >>> mbox cmd response data (6280 bytes)
3,680,258 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,709,886 UART: [rt]cmd =0x414c544e, len=41
3,711,951 >>> mbox cmd response data (8 bytes)
3,711,952 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,743 UART: [rt]cmd =0x434b4558, len=80
3,912,318 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,093 UART: [state] LifecycleState = Unprovisioned
86,748 UART: [state] DebugLocked = No
87,242 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,818 UART: [kat] SHA2-256
882,749 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,864 UART: [kat] ++
887,016 UART: [kat] sha1
891,198 UART: [kat] SHA2-256
893,136 UART: [kat] SHA2-384
895,985 UART: [kat] SHA2-512-ACC
897,886 UART: [kat] ECC-384
903,517 UART: [kat] HMAC-384Kdf
908,135 UART: [kat] LMS
1,476,331 UART: [kat] --
1,477,306 UART: [cold-reset] ++
1,477,784 UART: [fht] Storing FHT @ 0x50003400
1,480,523 UART: [idev] ++
1,480,691 UART: [idev] CDI.KEYID = 6
1,481,051 UART: [idev] SUBJECT.KEYID = 7
1,481,475 UART: [idev] UDS.KEYID = 0
1,481,820 ready_for_fw is high
1,481,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,585 UART: [idev] Erasing UDS.KEYID = 0
1,507,215 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,675 UART: [idev] --
1,516,756 UART: [ldev] ++
1,516,924 UART: [ldev] CDI.KEYID = 6
1,517,287 UART: [ldev] SUBJECT.KEYID = 5
1,517,713 UART: [ldev] AUTHORITY.KEYID = 7
1,518,176 UART: [ldev] FE.KEYID = 1
1,523,258 UART: [ldev] Erasing FE.KEYID = 1
1,548,821 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,329 UART: [ldev] --
1,588,746 UART: [fwproc] Waiting for Commands...
1,589,607 UART: [fwproc] Received command 0x46574c44
1,590,398 UART: [fwproc] Received Image of size 118548 bytes
2,935,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,963,534 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,994,752 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,134,965 >>> mbox cmd response: success
3,136,043 UART: [afmc] ++
3,136,211 UART: [afmc] CDI.KEYID = 6
3,136,573 UART: [afmc] SUBJECT.KEYID = 7
3,136,998 UART: [afmc] AUTHORITY.KEYID = 5
3,171,839 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,188,577 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,194,286 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,200,169 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,852 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,700 UART: [afmc] --
3,214,658 UART: [cold-reset] --
3,215,540 UART: [state] Locking Datavault
3,216,395 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,999 UART: [state] Locking ICCM
3,217,421 UART: [exit] Launching FMC @ 0x40000130
3,222,751 UART:
3,222,767 UART: Running Caliptra FMC ...
3,223,175 UART:
3,223,318 UART: [state] CFI Enabled
3,233,946 UART: [fht] FMC Alias Private Key: 7
3,352,488 UART: [art] Extend RT PCRs Done
3,352,916 UART: [art] Lock RT PCRs Done
3,353,988 UART: [art] Populate DV Done
3,362,355 UART: [fht] FMC Alias Private Key: 7
3,363,409 UART: [art] Derive CDI
3,363,689 UART: [art] Store in slot 0x4
3,449,473 UART: [art] Derive Key Pair
3,449,833 UART: [art] Store priv key in slot 0x5
3,463,330 UART: [art] Derive Key Pair - Done
3,477,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,031 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,796 UART: [art] PUB.X = 2F69958D5E54E7E5759B5D069E114A80A823BDDBE21657912C02371DB39CB368FAB4D69D88363B946586E81917080E26
3,500,548 UART: [art] PUB.Y = 30736AF363B7460F0920AF4E0E9A7EB2308B5364766245BB7DE538EAA89509D9717B89FF700506B5C0773DA5F4E93AEE
3,507,482 UART: [art] SIG.R = C807802CC6A9ED3B729F7ECEC63B69864191C992F01CB6AF85F63E2AA93FF635A701C40087A34365B885AC4310EE687E
3,514,230 UART: [art] SIG.S = 6742C7EDA656755F72EA78BDB7AC3DBBF90BAC8BD5DE567C2F56A9365DB120A59A586A2CF4E310AAF6C0676273B243F3
3,538,197 UART: Caliptra RT
3,538,540 UART: [state] CFI Enabled
3,658,956 UART: [rt] RT listening for mailbox commands...
3,659,626 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,858 UART: [rt]cmd =0x434b4558, len=80
3,859,418 >>> mbox cmd response data (6280 bytes)
3,859,419 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,889,049 UART: [rt]cmd =0x414c544e, len=41
3,891,090 >>> mbox cmd response data (8 bytes)
3,891,091 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,920,792 UART: [rt]cmd =0x434b4558, len=80
4,090,658 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,938 ready_for_fw is high
1,362,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,965 >>> mbox cmd response: success
3,044,152 UART:
3,044,168 UART: Running Caliptra FMC ...
3,044,576 UART:
3,044,719 UART: [state] CFI Enabled
3,055,135 UART: [fht] FMC Alias Private Key: 7
3,173,213 UART: [art] Extend RT PCRs Done
3,173,641 UART: [art] Lock RT PCRs Done
3,175,167 UART: [art] Populate DV Done
3,183,340 UART: [fht] FMC Alias Private Key: 7
3,184,364 UART: [art] Derive CDI
3,184,644 UART: [art] Store in slot 0x4
3,270,198 UART: [art] Derive Key Pair
3,270,558 UART: [art] Store priv key in slot 0x5
3,284,083 UART: [art] Derive Key Pair - Done
3,298,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,000 UART: [art] PUB.X = 56D694A6A97AF8706ABC9B558867CBD965C48B029DCA671B83A4AC62BD9C765D0B7B98F7D12E509CAFD0648E1ADE3BD5
3,321,782 UART: [art] PUB.Y = C78024692B61044800445786A7DD24CE829CA84B1301F3898C776DA013D7E0D3E4668CCC126A01634E4CF31EF9ADFD14
3,328,701 UART: [art] SIG.R = A035C63898786FED39F9497AD4AF114AF9818B53FF27FEAF2CEE73837CE739B231CED3AC2FF58E2F1B989925847B51F3
3,335,483 UART: [art] SIG.S = 85671DB693FC61FFDA394E060E38762172A205C4E33FD2F3AF38BE37B17C3815AF5E0CB81AA534FF594DDBAC83A5BD60
3,358,821 UART: Caliptra RT
3,359,164 UART: [state] CFI Enabled
3,478,999 UART: [rt] RT listening for mailbox commands...
3,479,669 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,047 UART: [rt]cmd =0x434b4558, len=80
3,680,056 >>> mbox cmd response data (6280 bytes)
3,680,057 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,709,693 UART: [rt]cmd =0x414c544e, len=41
3,711,462 >>> mbox cmd response data (8 bytes)
3,711,463 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,188 UART: [rt]cmd =0x434b4558, len=80
3,911,867 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Unprovisioned
86,189 UART: [state] DebugLocked = No
86,795 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,935 UART: [kat] SHA2-512-ACC
906,836 UART: [kat] ECC-384
916,467 UART: [kat] HMAC-384Kdf
920,921 UART: [kat] LMS
1,169,233 UART: [kat] --
1,170,252 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,238 UART: [idev] ++
1,173,406 UART: [idev] CDI.KEYID = 6
1,173,767 UART: [idev] SUBJECT.KEYID = 7
1,174,192 UART: [idev] UDS.KEYID = 0
1,174,538 ready_for_fw is high
1,174,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,213 UART: [idev] Erasing UDS.KEYID = 0
1,199,013 UART: [idev] Sha1 KeyId Algorithm
1,207,927 UART: [idev] --
1,208,800 UART: [ldev] ++
1,208,968 UART: [ldev] CDI.KEYID = 6
1,209,332 UART: [ldev] SUBJECT.KEYID = 5
1,209,759 UART: [ldev] AUTHORITY.KEYID = 7
1,210,222 UART: [ldev] FE.KEYID = 1
1,215,324 UART: [ldev] Erasing FE.KEYID = 1
1,241,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,140 UART: [ldev] --
1,280,405 UART: [fwproc] Wait for Commands...
1,281,226 UART: [fwproc] Recv command 0x46574c44
1,281,959 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,073 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,248 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,477 >>> mbox cmd response: success
2,825,689 UART: [afmc] ++
2,825,857 UART: [afmc] CDI.KEYID = 6
2,826,220 UART: [afmc] SUBJECT.KEYID = 7
2,826,646 UART: [afmc] AUTHORITY.KEYID = 5
2,862,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,581 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,291 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,172 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,873 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,738 UART: [afmc] --
2,905,749 UART: [cold-reset] --
2,906,297 UART: [state] Locking Datavault
2,907,582 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,186 UART: [state] Locking ICCM
2,908,698 UART: [exit] Launching FMC @ 0x40000130
2,914,028 UART:
2,914,044 UART: Running Caliptra FMC ...
2,914,452 UART:
2,914,506 UART: [state] CFI Enabled
2,925,004 UART: [fht] FMC Alias Private Key: 7
3,044,182 UART: [art] Extend RT PCRs Done
3,044,610 UART: [art] Lock RT PCRs Done
3,046,358 UART: [art] Populate DV Done
3,054,539 UART: [fht] FMC Alias Private Key: 7
3,055,697 UART: [art] Derive CDI
3,055,977 UART: [art] Store in slot 0x4
3,141,874 UART: [art] Derive Key Pair
3,142,234 UART: [art] Store priv key in slot 0x5
3,155,198 UART: [art] Derive Key Pair - Done
3,169,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,213 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,978 UART: [art] PUB.X = FEC1C6C490D630500E003DD5B486F43EA0B0C36C930E536976E19C9BD315AAB7821E037EC4581639D99417BBAEB43A61
3,192,723 UART: [art] PUB.Y = AE43A82AC3903788314DAF506D15DEBE5EAB5FF600C1F7D4543BA67538C621FDCD1E1D7F8EDB338836B9AAC0A26124AE
3,199,671 UART: [art] SIG.R = 56F9DB3CC5FFA35FE67B977EC9747AC7159B8D8FC23BE44F6B184A27FE352CF5729E8B06AAB623C6E90980F680459D6E
3,206,449 UART: [art] SIG.S = A1276F87E2CE2B0AD1F205E3B0BA096C6FA394213CF30F7BBA8269ADAF2BA888C695458F6C049588AE79072B4AF54D8F
3,229,639 UART: Caliptra RT
3,229,890 UART: [state] CFI Enabled
3,350,233 UART: [rt] RT listening for mailbox commands...
3,350,903 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,025 UART: [rt]cmd =0x434b4558, len=80
3,550,677 >>> mbox cmd response data (6280 bytes)
3,550,678 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,178 UART: [rt]cmd =0x414c544e, len=41
3,582,105 >>> mbox cmd response data (8 bytes)
3,582,106 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,937 UART: [rt]cmd =0x434b4558, len=80
3,781,805 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,588 ready_for_fw is high
1,059,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,360 >>> mbox cmd response: success
2,741,593 UART:
2,741,609 UART: Running Caliptra FMC ...
2,742,017 UART:
2,742,071 UART: [state] CFI Enabled
2,752,509 UART: [fht] FMC Alias Private Key: 7
2,871,555 UART: [art] Extend RT PCRs Done
2,871,983 UART: [art] Lock RT PCRs Done
2,873,261 UART: [art] Populate DV Done
2,881,312 UART: [fht] FMC Alias Private Key: 7
2,882,384 UART: [art] Derive CDI
2,882,664 UART: [art] Store in slot 0x4
2,968,309 UART: [art] Derive Key Pair
2,968,669 UART: [art] Store priv key in slot 0x5
2,981,729 UART: [art] Derive Key Pair - Done
2,996,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,992 UART: [art] PUB.X = D62C191381FFC11FFCF3111AE1B51E20686A4532120F0BAB4FB9BFD25586463F5B25BAA1FAB6B07A1BAB81CFEF415F56
3,019,776 UART: [art] PUB.Y = 542F9F1456E0E1B2FF55EC684ADA7731212A7D9B767620F6A11E2D645F968ABD0C55CDDC3490340FB8F2619BD8E726AB
3,026,730 UART: [art] SIG.R = 5AA9E6A2144AF2D09651B96B06588FFEC165554056A9AA8C165031E1AAF5D26D54121411B392B9B77D86E3F2DC84B7ED
3,033,503 UART: [art] SIG.S = 851FEEFDB7269FB80750340331EE7926C9170E3B10503436DC038EA50EDBEE5355F839FC14767DA954FDF2BB4ACAEC72
3,057,168 UART: Caliptra RT
3,057,419 UART: [state] CFI Enabled
3,176,232 UART: [rt] RT listening for mailbox commands...
3,176,902 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,354 UART: [rt]cmd =0x434b4558, len=80
3,376,854 >>> mbox cmd response data (6280 bytes)
3,376,855 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,247 UART: [rt]cmd =0x414c544e, len=41
3,408,310 >>> mbox cmd response data (8 bytes)
3,408,311 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,346 UART: [rt]cmd =0x434b4558, len=80
3,608,674 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,345 UART: [kat] SHA2-256
891,895 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,999 UART: [kat] ++
896,151 UART: [kat] sha1
900,465 UART: [kat] SHA2-256
902,405 UART: [kat] SHA2-384
905,116 UART: [kat] SHA2-512-ACC
907,017 UART: [kat] ECC-384
916,730 UART: [kat] HMAC-384Kdf
921,528 UART: [kat] LMS
1,169,840 UART: [kat] --
1,170,627 UART: [cold-reset] ++
1,171,109 UART: [fht] FHT @ 0x50003400
1,173,645 UART: [idev] ++
1,173,813 UART: [idev] CDI.KEYID = 6
1,174,174 UART: [idev] SUBJECT.KEYID = 7
1,174,599 UART: [idev] UDS.KEYID = 0
1,174,945 ready_for_fw is high
1,174,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,638 UART: [idev] Erasing UDS.KEYID = 0
1,199,720 UART: [idev] Sha1 KeyId Algorithm
1,208,636 UART: [idev] --
1,209,709 UART: [ldev] ++
1,209,877 UART: [ldev] CDI.KEYID = 6
1,210,241 UART: [ldev] SUBJECT.KEYID = 5
1,210,668 UART: [ldev] AUTHORITY.KEYID = 7
1,211,131 UART: [ldev] FE.KEYID = 1
1,216,333 UART: [ldev] Erasing FE.KEYID = 1
1,242,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,163 UART: [ldev] --
1,282,416 UART: [fwproc] Wait for Commands...
1,283,009 UART: [fwproc] Recv command 0x46574c44
1,283,742 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,220 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,395 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,698 >>> mbox cmd response: success
2,827,846 UART: [afmc] ++
2,828,014 UART: [afmc] CDI.KEYID = 6
2,828,377 UART: [afmc] SUBJECT.KEYID = 7
2,828,803 UART: [afmc] AUTHORITY.KEYID = 5
2,864,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,994 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,704 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,585 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,286 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,873 UART: [afmc] --
2,907,912 UART: [cold-reset] --
2,908,584 UART: [state] Locking Datavault
2,909,805 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,409 UART: [state] Locking ICCM
2,910,893 UART: [exit] Launching FMC @ 0x40000130
2,916,223 UART:
2,916,239 UART: Running Caliptra FMC ...
2,916,647 UART:
2,916,790 UART: [state] CFI Enabled
2,927,610 UART: [fht] FMC Alias Private Key: 7
3,046,430 UART: [art] Extend RT PCRs Done
3,046,858 UART: [art] Lock RT PCRs Done
3,048,362 UART: [art] Populate DV Done
3,056,757 UART: [fht] FMC Alias Private Key: 7
3,057,759 UART: [art] Derive CDI
3,058,039 UART: [art] Store in slot 0x4
3,144,114 UART: [art] Derive Key Pair
3,144,474 UART: [art] Store priv key in slot 0x5
3,157,548 UART: [art] Derive Key Pair - Done
3,172,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,869 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,634 UART: [art] PUB.X = D59F8475E13C2C7865583D35D1E52887AD11D97633256F1DD335FC483F41C01601D3D09E667D938FD7BE35F0A418A1DC
3,195,401 UART: [art] PUB.Y = 5CE165836B1DC7311DC06528FD812188B7748C406F03A7449A3F3D71B75BF0B0B216A13F64AFEE73DFDA0D22289F7A22
3,202,351 UART: [art] SIG.R = DA09DF2B11DC9C2F50CCF823A0DE7B2EBCBBD9D58EC103CA8B09BD72074BDDF1231475799573275FC6262F4ACF97F2CA
3,209,133 UART: [art] SIG.S = 5EDFDC952DEE7059E1E878D0A99BBCCE1BBCCF52273BD782CF7B8F80DE3EA99DCAE31973F7691B2FCD9E011FCB96D917
3,232,688 UART: Caliptra RT
3,233,031 UART: [state] CFI Enabled
3,352,236 UART: [rt] RT listening for mailbox commands...
3,352,906 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,250 UART: [rt]cmd =0x434b4558, len=80
3,554,003 >>> mbox cmd response data (6280 bytes)
3,554,004 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,810 UART: [rt]cmd =0x414c544e, len=41
3,585,881 >>> mbox cmd response data (8 bytes)
3,585,882 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,615,869 UART: [rt]cmd =0x434b4558, len=80
3,785,090 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,111 ready_for_fw is high
1,060,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,439 >>> mbox cmd response: success
2,740,816 UART:
2,740,832 UART: Running Caliptra FMC ...
2,741,240 UART:
2,741,383 UART: [state] CFI Enabled
2,752,269 UART: [fht] FMC Alias Private Key: 7
2,871,323 UART: [art] Extend RT PCRs Done
2,871,751 UART: [art] Lock RT PCRs Done
2,873,329 UART: [art] Populate DV Done
2,881,386 UART: [fht] FMC Alias Private Key: 7
2,882,476 UART: [art] Derive CDI
2,882,756 UART: [art] Store in slot 0x4
2,968,337 UART: [art] Derive Key Pair
2,968,697 UART: [art] Store priv key in slot 0x5
2,982,047 UART: [art] Derive Key Pair - Done
2,997,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,476 UART: [art] PUB.X = EE009EB690797E63B20236FD9EC763FDC15FFBC7BDA5DF19741F019378D012918F6DD498A43DC657FFF94F4A3B17C47D
3,020,232 UART: [art] PUB.Y = 62711FE1ADEF2BA63591A92482FC7B52F739DFFF646BBFD582782D95C8EDA3F0D230285500039BEC49D6A5392ECF3DE7
3,027,171 UART: [art] SIG.R = 3FE8A22AE77B88629FE2D4E9887BF5AA66DDF6984F789B6A938F6B3C6BD5B1342F1B88FFB70518A079F012AF97B0D713
3,033,950 UART: [art] SIG.S = 543037BAD58A07E158B6A87D34E844283FD021076E10334FFCF67849595571D678C71E138D2DEA32483A02AA0C57C0F7
3,057,440 UART: Caliptra RT
3,057,783 UART: [state] CFI Enabled
3,178,079 UART: [rt] RT listening for mailbox commands...
3,178,749 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,929 UART: [rt]cmd =0x434b4558, len=80
3,378,456 >>> mbox cmd response data (6280 bytes)
3,378,457 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,408,123 UART: [rt]cmd =0x414c544e, len=41
3,409,908 >>> mbox cmd response data (8 bytes)
3,409,909 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,772 UART: [rt]cmd =0x434b4558, len=80
3,610,701 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
893,494 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,619 UART: [kat] ++
897,771 UART: [kat] sha1
901,983 UART: [kat] SHA2-256
903,923 UART: [kat] SHA2-384
906,516 UART: [kat] SHA2-512-ACC
908,417 UART: [kat] ECC-384
918,266 UART: [kat] HMAC-384Kdf
922,952 UART: [kat] LMS
1,171,280 UART: [kat] --
1,172,159 UART: [cold-reset] ++
1,172,597 UART: [fht] FHT @ 0x50003400
1,175,224 UART: [idev] ++
1,175,392 UART: [idev] CDI.KEYID = 6
1,175,752 UART: [idev] SUBJECT.KEYID = 7
1,176,176 UART: [idev] UDS.KEYID = 0
1,176,521 ready_for_fw is high
1,176,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,344 UART: [idev] Erasing UDS.KEYID = 0
1,201,579 UART: [idev] Sha1 KeyId Algorithm
1,210,183 UART: [idev] --
1,211,139 UART: [ldev] ++
1,211,307 UART: [ldev] CDI.KEYID = 6
1,211,670 UART: [ldev] SUBJECT.KEYID = 5
1,212,096 UART: [ldev] AUTHORITY.KEYID = 7
1,212,559 UART: [ldev] FE.KEYID = 1
1,218,033 UART: [ldev] Erasing FE.KEYID = 1
1,244,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,449 UART: [ldev] --
1,283,924 UART: [fwproc] Wait for Commands...
1,284,674 UART: [fwproc] Recv command 0x46574c44
1,285,402 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,508 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,678 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,051 >>> mbox cmd response: success
2,828,087 UART: [afmc] ++
2,828,255 UART: [afmc] CDI.KEYID = 6
2,828,617 UART: [afmc] SUBJECT.KEYID = 7
2,829,042 UART: [afmc] AUTHORITY.KEYID = 5
2,865,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,758 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,467 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,350 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,051 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,861 UART: [afmc] --
2,908,785 UART: [cold-reset] --
2,909,543 UART: [state] Locking Datavault
2,910,732 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,336 UART: [state] Locking ICCM
2,911,758 UART: [exit] Launching FMC @ 0x40000130
2,917,088 UART:
2,917,104 UART: Running Caliptra FMC ...
2,917,512 UART:
2,917,566 UART: [state] CFI Enabled
2,927,886 UART: [fht] FMC Alias Private Key: 7
3,047,048 UART: [art] Extend RT PCRs Done
3,047,476 UART: [art] Lock RT PCRs Done
3,048,958 UART: [art] Populate DV Done
3,057,167 UART: [fht] FMC Alias Private Key: 7
3,058,161 UART: [art] Derive CDI
3,058,441 UART: [art] Store in slot 0x4
3,144,296 UART: [art] Derive Key Pair
3,144,656 UART: [art] Store priv key in slot 0x5
3,158,308 UART: [art] Derive Key Pair - Done
3,173,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,864 UART: [art] PUB.X = 56F3720E6BCBE13A4A8DCB110D22F29D75283724C58228A10F275D19996AC0D09B4B054B6D066B77DE413FB53C1A4824
3,195,621 UART: [art] PUB.Y = 06CF45622F910F2ED979BF75336CECDCEA7E6E017CCE096759D427AF1EDCE2A3DCACAA2926ACA41C505F5294BC72D6FD
3,202,585 UART: [art] SIG.R = 96660A2FE18B4CA0D968A50FB0E92F71B9C9A8BE91EA422472B5013077E720A2DD1524539B642D34F22B38D07BEA3628
3,209,348 UART: [art] SIG.S = 1951179D1931C00DC616BC1AD8292E0F9D9D82742B4B46423FD380BE2434A1E798B2364F425DB38C83A4D32A7AE0ED01
3,232,533 UART: Caliptra RT
3,232,784 UART: [state] CFI Enabled
3,352,881 UART: [rt] RT listening for mailbox commands...
3,353,551 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,085 UART: [rt]cmd =0x434b4558, len=80
3,553,837 >>> mbox cmd response data (6280 bytes)
3,553,838 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,558 UART: [rt]cmd =0x414c544e, len=41
3,585,483 >>> mbox cmd response data (8 bytes)
3,585,484 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,615,369 UART: [rt]cmd =0x434b4558, len=80
3,784,737 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,437 ready_for_fw is high
1,060,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,172 >>> mbox cmd response: success
2,740,607 UART:
2,740,623 UART: Running Caliptra FMC ...
2,741,031 UART:
2,741,085 UART: [state] CFI Enabled
2,751,405 UART: [fht] FMC Alias Private Key: 7
2,870,081 UART: [art] Extend RT PCRs Done
2,870,509 UART: [art] Lock RT PCRs Done
2,872,053 UART: [art] Populate DV Done
2,880,236 UART: [fht] FMC Alias Private Key: 7
2,881,368 UART: [art] Derive CDI
2,881,648 UART: [art] Store in slot 0x4
2,967,121 UART: [art] Derive Key Pair
2,967,481 UART: [art] Store priv key in slot 0x5
2,980,665 UART: [art] Derive Key Pair - Done
2,995,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,602 UART: [art] PUB.X = CED43E1C8C351CD88D7574A1EC52C29900BC761BE671311D28190EDCE1B3AADA2E9CDE437484E6E1E21169875F8E30D9
3,019,359 UART: [art] PUB.Y = 46327800C174093E4D981EDB940869C189EF4BE46281EC56AD4100E1796AC0D7BCF6919929C8EC7DCA5E405179E81E63
3,026,259 UART: [art] SIG.R = 0981D9A393A532E9441DAF889AE94AA332608DA740CC9EBEE2FD3BF5F6AF5C9F1D3478A6C8577886B98AC090C9F76E6C
3,033,040 UART: [art] SIG.S = D75A243A1D13F2BF558625258BB57111079A8CBE7496390515D0BEC3247E6E554F69F7CAEA027C4BBFF7AA69F76FEB16
3,056,931 UART: Caliptra RT
3,057,182 UART: [state] CFI Enabled
3,177,237 UART: [rt] RT listening for mailbox commands...
3,177,907 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,407 UART: [rt]cmd =0x434b4558, len=80
3,377,680 >>> mbox cmd response data (6280 bytes)
3,377,681 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,207 UART: [rt]cmd =0x414c544e, len=41
3,409,078 >>> mbox cmd response data (8 bytes)
3,409,079 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,712 UART: [rt]cmd =0x434b4558, len=80
3,608,783 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
902,058 UART: [kat] SHA2-256
903,998 UART: [kat] SHA2-384
906,591 UART: [kat] SHA2-512-ACC
908,492 UART: [kat] ECC-384
918,445 UART: [kat] HMAC-384Kdf
922,893 UART: [kat] LMS
1,171,221 UART: [kat] --
1,172,258 UART: [cold-reset] ++
1,172,700 UART: [fht] FHT @ 0x50003400
1,175,333 UART: [idev] ++
1,175,501 UART: [idev] CDI.KEYID = 6
1,175,861 UART: [idev] SUBJECT.KEYID = 7
1,176,285 UART: [idev] UDS.KEYID = 0
1,176,630 ready_for_fw is high
1,176,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,249 UART: [idev] Erasing UDS.KEYID = 0
1,201,144 UART: [idev] Sha1 KeyId Algorithm
1,209,676 UART: [idev] --
1,210,880 UART: [ldev] ++
1,211,048 UART: [ldev] CDI.KEYID = 6
1,211,411 UART: [ldev] SUBJECT.KEYID = 5
1,211,837 UART: [ldev] AUTHORITY.KEYID = 7
1,212,300 UART: [ldev] FE.KEYID = 1
1,217,622 UART: [ldev] Erasing FE.KEYID = 1
1,243,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,866 UART: [ldev] --
1,283,161 UART: [fwproc] Wait for Commands...
1,283,863 UART: [fwproc] Recv command 0x46574c44
1,284,591 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,817 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,987 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,242 >>> mbox cmd response: success
2,828,450 UART: [afmc] ++
2,828,618 UART: [afmc] CDI.KEYID = 6
2,828,980 UART: [afmc] SUBJECT.KEYID = 7
2,829,405 UART: [afmc] AUTHORITY.KEYID = 5
2,865,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,969 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,678 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,561 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,262 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,990 UART: [afmc] --
2,908,998 UART: [cold-reset] --
2,909,814 UART: [state] Locking Datavault
2,910,931 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,535 UART: [state] Locking ICCM
2,912,115 UART: [exit] Launching FMC @ 0x40000130
2,917,445 UART:
2,917,461 UART: Running Caliptra FMC ...
2,917,869 UART:
2,918,012 UART: [state] CFI Enabled
2,928,616 UART: [fht] FMC Alias Private Key: 7
3,047,402 UART: [art] Extend RT PCRs Done
3,047,830 UART: [art] Lock RT PCRs Done
3,049,172 UART: [art] Populate DV Done
3,057,325 UART: [fht] FMC Alias Private Key: 7
3,058,463 UART: [art] Derive CDI
3,058,743 UART: [art] Store in slot 0x4
3,144,680 UART: [art] Derive Key Pair
3,145,040 UART: [art] Store priv key in slot 0x5
3,157,972 UART: [art] Derive Key Pair - Done
3,173,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,275 UART: [art] PUB.X = 3C32D9DFE5FB899225E3ACF0766946ABC30E93B9BA4E799F3564323787A562CE27AB7DDE01B0681A68D17FCC1FB794EA
3,196,053 UART: [art] PUB.Y = 9115B9A9BD45C030407CC53ACA4C5B8AB87246703EAAC94B34B0A08316769881A0275115B2787D55699D78E754BCF6A2
3,203,001 UART: [art] SIG.R = ECAEB2C6E0C36ED1655AF5363F8CF8C37F2D7622191A8E359F85AB3EA52DA546BB62A28BB35CB680CD3C3F98B7320873
3,209,784 UART: [art] SIG.S = 2069E3D298D6B0AB4162F227DA655D88E2B153031A5B1A89ECBB22406C0ABF958D155DDFD4CA08365BF89FC833D1B439
3,233,833 UART: Caliptra RT
3,234,176 UART: [state] CFI Enabled
3,353,965 UART: [rt] RT listening for mailbox commands...
3,354,635 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,827 UART: [rt]cmd =0x434b4558, len=80
3,554,532 >>> mbox cmd response data (6280 bytes)
3,554,533 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,584,051 UART: [rt]cmd =0x414c544e, len=41
3,586,090 >>> mbox cmd response data (8 bytes)
3,586,091 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,615,926 UART: [rt]cmd =0x434b4558, len=80
3,786,143 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,880 ready_for_fw is high
1,059,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,243 >>> mbox cmd response: success
2,741,314 UART:
2,741,330 UART: Running Caliptra FMC ...
2,741,738 UART:
2,741,881 UART: [state] CFI Enabled
2,752,425 UART: [fht] FMC Alias Private Key: 7
2,871,539 UART: [art] Extend RT PCRs Done
2,871,967 UART: [art] Lock RT PCRs Done
2,873,585 UART: [art] Populate DV Done
2,881,668 UART: [fht] FMC Alias Private Key: 7
2,882,652 UART: [art] Derive CDI
2,882,932 UART: [art] Store in slot 0x4
2,968,273 UART: [art] Derive Key Pair
2,968,633 UART: [art] Store priv key in slot 0x5
2,982,059 UART: [art] Derive Key Pair - Done
2,996,713 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,671 UART: [art] PUB.X = E9107914B220BE769436BB7B46FC5B10229FD26887220FF8CD5E0417193715F659B2AC21243D1BC756111B1BD1482ACB
3,019,433 UART: [art] PUB.Y = C4F92E4A4C9C2D9BE3E48CA28DF674289915CB22B1FBA31EA72064DFD3D89C4B0E478C69A2408C54760159C5BEA50001
3,026,362 UART: [art] SIG.R = E28FA0A4A8A1BEA9C27CF0AF7E31FEA00B6D3B65A9D00F3DED9F2169A62F100B4B6CC9903673E9A0F7D71EDB317113E4
3,033,145 UART: [art] SIG.S = D2C6359BD3EB4925F2F9F85509E30AD758AF0876B7AD8829A05FF0521DDACCA1327E4B38B8A072CC3B14364868D24D0F
3,056,335 UART: Caliptra RT
3,056,678 UART: [state] CFI Enabled
3,176,566 UART: [rt] RT listening for mailbox commands...
3,177,236 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,544 UART: [rt]cmd =0x434b4558, len=80
3,377,565 >>> mbox cmd response data (6280 bytes)
3,377,566 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,330 UART: [rt]cmd =0x414c544e, len=41
3,409,153 >>> mbox cmd response data (8 bytes)
3,409,154 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,057 UART: [rt]cmd =0x434b4558, len=80
3,609,620 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,128 UART:
192,504 UART: Running Caliptra ROM ...
193,599 UART:
193,746 UART: [state] CFI Enabled
264,323 UART: [state] LifecycleState = Unprovisioned
266,254 UART: [state] DebugLocked = No
267,801 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,454 UART: [kat] SHA2-256
443,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,659 UART: [kat] ++
454,178 UART: [kat] sha1
464,482 UART: [kat] SHA2-256
467,200 UART: [kat] SHA2-384
473,117 UART: [kat] SHA2-512-ACC
475,481 UART: [kat] ECC-384
2,769,894 UART: [kat] HMAC-384Kdf
2,799,896 UART: [kat] LMS
3,990,214 UART: [kat] --
3,996,408 UART: [cold-reset] ++
3,998,268 UART: [fht] Storing FHT @ 0x50003400
4,010,671 UART: [idev] ++
4,011,236 UART: [idev] CDI.KEYID = 6
4,012,384 UART: [idev] SUBJECT.KEYID = 7
4,013,508 UART: [idev] UDS.KEYID = 0
4,014,478 ready_for_fw is high
4,014,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,592 UART: [idev] Erasing UDS.KEYID = 0
7,348,488 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,607 UART: [idev] --
7,375,847 UART: [ldev] ++
7,376,434 UART: [ldev] CDI.KEYID = 6
7,377,403 UART: [ldev] SUBJECT.KEYID = 5
7,378,620 UART: [ldev] AUTHORITY.KEYID = 7
7,379,847 UART: [ldev] FE.KEYID = 1
7,422,628 UART: [ldev] Erasing FE.KEYID = 1
10,756,593 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,026 UART: [ldev] --
13,116,448 UART: [fwproc] Waiting for Commands...
13,118,334 UART: [fwproc] Received command 0x46574c44
13,120,520 UART: [fwproc] Received Image of size 118548 bytes
17,227,255 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,309,594 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,382,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,710,821 >>> mbox cmd response: success
17,715,410 UART: [afmc] ++
17,716,031 UART: [afmc] CDI.KEYID = 6
17,716,953 UART: [afmc] SUBJECT.KEYID = 7
17,718,172 UART: [afmc] AUTHORITY.KEYID = 5
21,073,897 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,827 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,376,054 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,390,511 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,405,263 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,419,694 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,441,443 UART: [afmc] --
23,445,033 UART: [cold-reset] --
23,447,866 UART: [state] Locking Datavault
23,454,736 UART: [state] Locking PCR0, PCR1 and PCR31
23,456,543 UART: [state] Locking ICCM
23,459,218 UART: [exit] Launching FMC @ 0x40000130
23,467,614 UART:
23,467,850 UART: Running Caliptra FMC ...
23,468,878 UART:
23,469,024 UART: [state] CFI Enabled
23,535,265 UART: [fht] FMC Alias Private Key: 7
25,875,520 UART: [art] Extend RT PCRs Done
25,876,757 UART: [art] Lock RT PCRs Done
25,878,367 UART: [art] Populate DV Done
25,884,205 UART: [fht] FMC Alias Private Key: 7
25,885,740 UART: [art] Derive CDI
25,886,502 UART: [art] Store in slot 0x4
25,943,320 UART: [art] Derive Key Pair
25,944,354 UART: [art] Store priv key in slot 0x5
29,237,541 UART: [art] Derive Key Pair - Done
29,250,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,036 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,543 UART: [art] PUB.X = D7B7B3EAA77C44B441A256C78B353791A93979282D32A60469C1CADF16647AF849FC35EF36EF7384AE18304E82A66296
31,547,811 UART: [art] PUB.Y = F056FD80DB6AADFF325345EE757BC3B1AEDE8083D3AE633FDD8B3C24BCA4CA6A322A2E6C1FE8B12D782CA3C640471B83
31,555,111 UART: [art] SIG.R = 0034B2FB91C9F4A56998ACE0F0A1616BDFF3E338BF8B5EAFB5FFC3CF2F20358481775E85032C6776B68C82AF4C51990A
31,562,458 UART: [art] SIG.S = CB0D381BA6B456F610A29802AAF206D1149658732B3B3FE50B3E28C578B7C4A23C28FA04A14797504AC93460CF15B530
32,867,562 UART: Caliptra RT
32,868,262 UART: [state] CFI Enabled
33,046,100 UART: [rt] RT listening for mailbox commands...
33,048,001 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,078,157 UART: [rt]cmd =0x414c544e, len=41
33,080,516 >>> mbox cmd response data (8 bytes)
33,081,191 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,111,606 UART: [rt]cmd =0x434b4558, len=80
38,857,659 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
3,780,122 ready_for_fw is high
3,780,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,915,688 >>> mbox cmd response: success
23,630,293 UART:
23,630,704 UART: Running Caliptra FMC ...
23,631,836 UART:
23,632,012 UART: [state] CFI Enabled
23,702,074 UART: [fht] FMC Alias Private Key: 7
26,063,305 UART: [art] Extend RT PCRs Done
26,064,546 UART: [art] Lock RT PCRs Done
26,066,257 UART: [art] Populate DV Done
26,071,631 UART: [fht] FMC Alias Private Key: 7
26,073,339 UART: [art] Derive CDI
26,074,158 UART: [art] Store in slot 0x4
26,130,566 UART: [art] Derive Key Pair
26,131,566 UART: [art] Store priv key in slot 0x5
29,424,121 UART: [art] Derive Key Pair - Done
29,437,069 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,478 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,994 UART: [art] PUB.X = 64970081E9CA2764671239E650842BAF4307146CBC70EA0CADD22C85A3428C9FDBD99FAF7D519486B869F670A784C661
31,733,206 UART: [art] PUB.Y = 16037BBC52F6C5C3EBC7E3B3D4C16DA689255C3B07494A01E052B3007B41F227998C4261505383CAAD2FBBA690C877CE
31,740,439 UART: [art] SIG.R = F6A7978D5444D8B31D00942F707DB0F044CCD70A2F396B03FB30E7ED94B4A23BF69E9856057426F1C24B52B50A809BB3
31,747,821 UART: [art] SIG.S = DF1072204BCC054CD55D847C7EA411815F38CD4F3B5B9D5B19074FE61DC8CC8D51C34ECAAA92E3109BF4634C02AE21CF
33,053,049 UART: Caliptra RT
33,053,775 UART: [state] CFI Enabled
33,251,106 UART: [rt] RT listening for mailbox commands...
33,253,018 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,283,086 UART: [rt]cmd =0x414c544e, len=41
33,285,449 >>> mbox cmd response data (8 bytes)
33,286,241 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,316,730 UART: [rt]cmd =0x434b4558, len=80
39,060,481 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
192,296 UART:
192,670 UART: Running Caliptra ROM ...
193,806 UART:
603,457 UART: [state] CFI Enabled
616,586 UART: [state] LifecycleState = Unprovisioned
618,458 UART: [state] DebugLocked = No
621,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,981 UART: [kat] SHA2-256
796,789 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,313 UART: [kat] ++
807,790 UART: [kat] sha1
818,825 UART: [kat] SHA2-256
821,510 UART: [kat] SHA2-384
827,327 UART: [kat] SHA2-512-ACC
829,696 UART: [kat] ECC-384
3,111,999 UART: [kat] HMAC-384Kdf
3,122,385 UART: [kat] LMS
4,312,466 UART: [kat] --
4,316,992 UART: [cold-reset] ++
4,318,926 UART: [fht] Storing FHT @ 0x50003400
4,330,844 UART: [idev] ++
4,331,403 UART: [idev] CDI.KEYID = 6
4,332,427 UART: [idev] SUBJECT.KEYID = 7
4,333,596 UART: [idev] UDS.KEYID = 0
4,334,625 ready_for_fw is high
4,334,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,696 UART: [idev] Erasing UDS.KEYID = 0
7,620,329 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,486 UART: [idev] --
7,644,863 UART: [ldev] ++
7,645,483 UART: [ldev] CDI.KEYID = 6
7,646,447 UART: [ldev] SUBJECT.KEYID = 5
7,647,649 UART: [ldev] AUTHORITY.KEYID = 7
7,648,875 UART: [ldev] FE.KEYID = 1
7,658,058 UART: [ldev] Erasing FE.KEYID = 1
10,942,846 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,234,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,248,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,263,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,277,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,296,323 UART: [ldev] --
13,301,100 UART: [fwproc] Waiting for Commands...
13,303,291 UART: [fwproc] Received command 0x46574c44
13,305,530 UART: [fwproc] Received Image of size 118548 bytes
17,415,220 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,490,466 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,563,674 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,892,578 >>> mbox cmd response: success
17,897,541 UART: [afmc] ++
17,898,129 UART: [afmc] CDI.KEYID = 6
17,899,142 UART: [afmc] SUBJECT.KEYID = 7
17,900,297 UART: [afmc] AUTHORITY.KEYID = 5
21,212,462 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,507,832 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,084 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,524,474 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,539,224 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,553,671 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,574,405 UART: [afmc] --
23,578,916 UART: [cold-reset] --
23,584,389 UART: [state] Locking Datavault
23,590,599 UART: [state] Locking PCR0, PCR1 and PCR31
23,592,293 UART: [state] Locking ICCM
23,593,460 UART: [exit] Launching FMC @ 0x40000130
23,601,846 UART:
23,602,072 UART: Running Caliptra FMC ...
23,603,169 UART:
23,603,324 UART: [state] CFI Enabled
23,611,485 UART: [fht] FMC Alias Private Key: 7
25,952,363 UART: [art] Extend RT PCRs Done
25,953,579 UART: [art] Lock RT PCRs Done
25,955,199 UART: [art] Populate DV Done
25,960,494 UART: [fht] FMC Alias Private Key: 7
25,961,982 UART: [art] Derive CDI
25,962,754 UART: [art] Store in slot 0x4
26,005,402 UART: [art] Derive Key Pair
26,006,403 UART: [art] Store priv key in slot 0x5
29,249,044 UART: [art] Derive Key Pair - Done
29,262,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,542,093 UART: [art] Erasing AUTHORITY.KEYID = 7
31,543,601 UART: [art] PUB.X = B72BC54E4E04DD19D8682F93E42EBFB9088A04F563602A92C4A87A2615C097698B15EF6D2EBDBB7C9222C8817399D703
31,550,849 UART: [art] PUB.Y = 945C19A60EC439D9ABE1AC7693390419819B756048F1F82FC4EED09ADDEA2876B3BE14F16CB5A9D3C6FFB320EAD3DE0E
31,558,133 UART: [art] SIG.R = 89AB17F88F937FAB4BEBC9215551363187756F2EE4FC5435C6794C001ECA5DAD178BC33EBF7B578ED586CC2A6559863A
31,565,527 UART: [art] SIG.S = 690099F5901FBF7E2DB86980AE27663397EE0F8130BA54E1DA7917F78880C9562A725C6DAB9C11C23E9D6ECEFFE99504
32,870,667 UART: Caliptra RT
32,871,382 UART: [state] CFI Enabled
33,004,987 UART: [rt] RT listening for mailbox commands...
33,006,876 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,036,857 UART: [rt]cmd =0x414c544e, len=41
33,039,226 >>> mbox cmd response data (8 bytes)
33,040,228 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,070,749 UART: [rt]cmd =0x434b4558, len=80
38,734,110 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
4,133,599 ready_for_fw is high
4,134,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,932 >>> mbox cmd response: success
23,803,023 UART:
23,803,430 UART: Running Caliptra FMC ...
23,804,571 UART:
23,804,727 UART: [state] CFI Enabled
23,812,579 UART: [fht] FMC Alias Private Key: 7
26,152,987 UART: [art] Extend RT PCRs Done
26,154,217 UART: [art] Lock RT PCRs Done
26,155,947 UART: [art] Populate DV Done
26,161,477 UART: [fht] FMC Alias Private Key: 7
26,163,068 UART: [art] Derive CDI
26,163,901 UART: [art] Store in slot 0x4
26,206,354 UART: [art] Derive Key Pair
26,207,372 UART: [art] Store priv key in slot 0x5
29,449,301 UART: [art] Derive Key Pair - Done
29,462,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,998 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,502 UART: [art] PUB.X = 2A20FF7221367B49DFA8D06537D82333CF4BDF2994A49EE6C934341AFFF1C8FD330B67F85E8ED81813305C7A8A85C1E9
31,751,811 UART: [art] PUB.Y = FF3D30ADC5E7F8CD361578DD3E0783E2A54CE45397517815213D549258D4402C2807F41009E097E9F28C180C4947BA4F
31,758,994 UART: [art] SIG.R = DF24188E0694B079EA588357FAA1B3A808152FD0AB8C13EE611FD5C68242D6E3007D8B21DEC95E13AF93676B56F241E2
31,766,424 UART: [art] SIG.S = 913159AE06C3AAA2DA6075164E2008E9F5D5F51615BD66B6222459B94E21375AF3D321DAEEB5A8022E903EC072D32F23
33,071,638 UART: Caliptra RT
33,072,353 UART: [state] CFI Enabled
33,205,688 UART: [rt] RT listening for mailbox commands...
33,207,582 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,237,458 UART: [rt]cmd =0x414c544e, len=41
33,239,942 >>> mbox cmd response data (8 bytes)
33,240,892 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,271,268 UART: [rt]cmd =0x434b4558, len=80
38,935,256 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
191,968 UART:
192,324 UART: Running Caliptra ROM ...
193,466 UART:
193,612 UART: [state] CFI Enabled
268,541 UART: [state] LifecycleState = Unprovisioned
270,455 UART: [state] DebugLocked = No
271,706 UART: [state] WD Timer not started. Device not locked for debugging
276,187 UART: [kat] SHA2-256
455,872 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,605 UART: [kat] ++
467,151 UART: [kat] sha1
479,437 UART: [kat] SHA2-256
482,085 UART: [kat] SHA2-384
487,368 UART: [kat] SHA2-512-ACC
489,730 UART: [kat] ECC-384
2,946,727 UART: [kat] HMAC-384Kdf
2,972,840 UART: [kat] LMS
3,449,329 UART: [kat] --
3,453,542 UART: [cold-reset] ++
3,455,331 UART: [fht] FHT @ 0x50003400
3,465,548 UART: [idev] ++
3,466,161 UART: [idev] CDI.KEYID = 6
3,467,071 UART: [idev] SUBJECT.KEYID = 7
3,468,319 UART: [idev] UDS.KEYID = 0
3,469,242 ready_for_fw is high
3,469,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,358 UART: [idev] Erasing UDS.KEYID = 0
5,989,556 UART: [idev] Sha1 KeyId Algorithm
6,012,481 UART: [idev] --
6,018,858 UART: [ldev] ++
6,019,433 UART: [ldev] CDI.KEYID = 6
6,020,418 UART: [ldev] SUBJECT.KEYID = 5
6,021,735 UART: [ldev] AUTHORITY.KEYID = 7
6,022,927 UART: [ldev] FE.KEYID = 1
6,059,564 UART: [ldev] Erasing FE.KEYID = 1
8,565,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,459 UART: [ldev] --
10,374,670 UART: [fwproc] Wait for Commands...
10,377,622 UART: [fwproc] Recv command 0x46574c44
10,379,601 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,593 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,627 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,338,343 >>> mbox cmd response: success
14,343,296 UART: [afmc] ++
14,343,928 UART: [afmc] CDI.KEYID = 6
14,344,815 UART: [afmc] SUBJECT.KEYID = 7
14,346,035 UART: [afmc] AUTHORITY.KEYID = 5
16,873,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,661 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,615,456 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,558 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,647,107 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,670,848 UART: [afmc] --
18,674,507 UART: [cold-reset] --
18,678,849 UART: [state] Locking Datavault
18,685,275 UART: [state] Locking PCR0, PCR1 and PCR31
18,687,031 UART: [state] Locking ICCM
18,689,632 UART: [exit] Launching FMC @ 0x40000130
18,698,026 UART:
18,698,262 UART: Running Caliptra FMC ...
18,699,358 UART:
18,699,517 UART: [state] CFI Enabled
18,753,276 UART: [fht] FMC Alias Private Key: 7
20,519,781 UART: [art] Extend RT PCRs Done
20,520,995 UART: [art] Lock RT PCRs Done
20,522,856 UART: [art] Populate DV Done
20,528,151 UART: [fht] FMC Alias Private Key: 7
20,529,733 UART: [art] Derive CDI
20,530,543 UART: [art] Store in slot 0x4
20,586,603 UART: [art] Derive Key Pair
20,587,632 UART: [art] Store priv key in slot 0x5
23,050,361 UART: [art] Derive Key Pair - Done
23,063,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,702 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,198 UART: [art] PUB.X = 9B35F1F4D717A9DA668A12F10B5A70D343CE902723A98D2ACFA1CFB520E84B977849A16C0819EDEF61CB5E0FD14BC565
24,785,498 UART: [art] PUB.Y = B9262A5624FFA859F438F47D89F066047C7919B2646DC9DF2A695771AA230A45E6AC4BE4BD723797A82CE8CD98D74E95
24,792,739 UART: [art] SIG.R = 91BEDC951164AC65537D50E013BCFD1F3A43FE020E242AF411DEAAB721839EB17CB0AEC4AC97A72F65B8C03ABA487D87
24,800,132 UART: [art] SIG.S = 428A7B5C2560F671CF984AAC47EB568ACA8EC65F45A0CBDC958965943241AFC2968A25C09365FCA0E72DDEC80357E787
25,778,917 UART: Caliptra RT
25,779,622 UART: [state] CFI Enabled
25,959,526 UART: [rt] RT listening for mailbox commands...
25,961,422 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,991,566 UART: [rt]cmd =0x414c544e, len=41
25,994,056 >>> mbox cmd response data (8 bytes)
25,994,991 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,025,357 UART: [rt]cmd =0x434b4558, len=80
30,365,587 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,463,477 ready_for_fw is high
3,464,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,266,537 >>> mbox cmd response: success
18,562,051 UART:
18,562,429 UART: Running Caliptra FMC ...
18,563,615 UART:
18,563,775 UART: [state] CFI Enabled
18,628,842 UART: [fht] FMC Alias Private Key: 7
20,394,809 UART: [art] Extend RT PCRs Done
20,396,019 UART: [art] Lock RT PCRs Done
20,397,595 UART: [art] Populate DV Done
20,403,120 UART: [fht] FMC Alias Private Key: 7
20,404,659 UART: [art] Derive CDI
20,405,490 UART: [art] Store in slot 0x4
20,461,699 UART: [art] Derive Key Pair
20,462,759 UART: [art] Store priv key in slot 0x5
22,925,374 UART: [art] Derive Key Pair - Done
22,938,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,651,389 UART: [art] Erasing AUTHORITY.KEYID = 7
24,652,898 UART: [art] PUB.X = 5C748E108DE7C3E1DA8AD032B426A723112B4DFF39DF50D4B1FD81112B249A175B91F0BF10AA93753CE1616B93BD3FAB
24,660,205 UART: [art] PUB.Y = 33937B1B94D9FDC46D54E0A0B142D94E67B8F7F7B2F1B1C4121DDEFBE290A9E7B3536574FDFEDD0384D9047E6A037323
24,667,453 UART: [art] SIG.R = 0E6C12076B88F4654B87B6A74FBB5202194D3CBD62CD36C5CE2D2C42E73F59EC86850F206F3638748E11FC7665158252
24,674,855 UART: [art] SIG.S = 1FED43508EB40E5AA84F1EE4D688335665FDB354F480756E6CDE7B1A10228F6682C38EE2A0F93380D225A48F30BA2567
25,653,235 UART: Caliptra RT
25,653,941 UART: [state] CFI Enabled
25,836,292 UART: [rt] RT listening for mailbox commands...
25,838,187 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,868,317 UART: [rt]cmd =0x414c544e, len=41
25,870,793 >>> mbox cmd response data (8 bytes)
25,871,593 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,902,071 UART: [rt]cmd =0x434b4558, len=80
30,242,716 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
192,436 UART:
192,802 UART: Running Caliptra ROM ...
193,975 UART:
603,441 UART: [state] CFI Enabled
619,118 UART: [state] LifecycleState = Unprovisioned
621,064 UART: [state] DebugLocked = No
623,600 UART: [state] WD Timer not started. Device not locked for debugging
627,434 UART: [kat] SHA2-256
807,100 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,865 UART: [kat] ++
818,407 UART: [kat] sha1
829,387 UART: [kat] SHA2-256
832,081 UART: [kat] SHA2-384
839,076 UART: [kat] SHA2-512-ACC
841,452 UART: [kat] ECC-384
3,285,926 UART: [kat] HMAC-384Kdf
3,298,449 UART: [kat] LMS
3,774,964 UART: [kat] --
3,780,872 UART: [cold-reset] ++
3,781,950 UART: [fht] FHT @ 0x50003400
3,794,004 UART: [idev] ++
3,794,618 UART: [idev] CDI.KEYID = 6
3,795,538 UART: [idev] SUBJECT.KEYID = 7
3,796,790 UART: [idev] UDS.KEYID = 0
3,797,719 ready_for_fw is high
3,797,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,761 UART: [idev] Erasing UDS.KEYID = 0
6,267,751 UART: [idev] Sha1 KeyId Algorithm
6,292,237 UART: [idev] --
6,297,481 UART: [ldev] ++
6,298,101 UART: [ldev] CDI.KEYID = 6
6,299,016 UART: [ldev] SUBJECT.KEYID = 5
6,300,253 UART: [ldev] AUTHORITY.KEYID = 7
6,301,488 UART: [ldev] FE.KEYID = 1
6,314,240 UART: [ldev] Erasing FE.KEYID = 1
8,791,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,818 UART: [ldev] --
10,588,460 UART: [fwproc] Wait for Commands...
10,590,103 UART: [fwproc] Recv command 0x46574c44
10,592,098 UART: [fwproc] Recv'd Img size: 118548 bytes
14,080,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,463 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,464 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,560,595 >>> mbox cmd response: success
14,565,223 UART: [afmc] ++
14,565,817 UART: [afmc] CDI.KEYID = 6
14,566,762 UART: [afmc] SUBJECT.KEYID = 7
14,567,978 UART: [afmc] AUTHORITY.KEYID = 5
17,068,913 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,789,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,125 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,807,948 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,018 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,646 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,580 UART: [afmc] --
18,865,957 UART: [cold-reset] --
18,871,116 UART: [state] Locking Datavault
18,876,636 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,393 UART: [state] Locking ICCM
18,880,114 UART: [exit] Launching FMC @ 0x40000130
18,888,536 UART:
18,888,774 UART: Running Caliptra FMC ...
18,889,877 UART:
18,890,041 UART: [state] CFI Enabled
18,897,934 UART: [fht] FMC Alias Private Key: 7
20,664,336 UART: [art] Extend RT PCRs Done
20,666,020 UART: [art] Lock RT PCRs Done
20,667,093 UART: [art] Populate DV Done
20,672,667 UART: [fht] FMC Alias Private Key: 7
20,674,218 UART: [art] Derive CDI
20,674,955 UART: [art] Store in slot 0x4
20,718,033 UART: [art] Derive Key Pair
20,719,035 UART: [art] Store priv key in slot 0x5
23,145,781 UART: [art] Derive Key Pair - Done
23,158,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,351 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,873 UART: [art] PUB.X = F6536A8DEFFBBC3EAF09185E9C842C8A60B446157CE4DB4E5AD2275A7154E7689A58AFB79F652E3DB488DDA6A2D2CB2C
24,874,180 UART: [art] PUB.Y = 14EE7117261DEDB6BCE4B8AD3AC181F541A1A49C817FC7F667E8AF5887231E111B91CF66C4054949C82036ADE4091494
24,881,406 UART: [art] SIG.R = C6AD401D720A0E5A4C6950B569248BCB96CABFFAC01302CAA461A16F6B475F086F38705DE52F8010FE97B6985A56A32F
24,888,792 UART: [art] SIG.S = 0A04346186D7D4D7D72195E242A98768D5166D5784FFD5D943F1D748D13F3BB4DE19B019E8D0871DBBF2663B3F82D0EB
25,867,719 UART: Caliptra RT
25,868,449 UART: [state] CFI Enabled
26,000,644 UART: [rt] RT listening for mailbox commands...
26,002,539 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,032,707 UART: [rt]cmd =0x414c544e, len=41
26,034,898 >>> mbox cmd response data (8 bytes)
26,035,902 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,066,579 UART: [rt]cmd =0x434b4558, len=80
30,340,258 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,774,959 ready_for_fw is high
3,775,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,252 >>> mbox cmd response: success
18,704,848 UART:
18,705,229 UART: Running Caliptra FMC ...
18,706,387 UART:
18,706,550 UART: [state] CFI Enabled
18,714,211 UART: [fht] FMC Alias Private Key: 7
20,480,304 UART: [art] Extend RT PCRs Done
20,481,521 UART: [art] Lock RT PCRs Done
20,483,205 UART: [art] Populate DV Done
20,488,689 UART: [fht] FMC Alias Private Key: 7
20,490,397 UART: [art] Derive CDI
20,491,216 UART: [art] Store in slot 0x4
20,534,045 UART: [art] Derive Key Pair
20,535,093 UART: [art] Store priv key in slot 0x5
22,961,674 UART: [art] Derive Key Pair - Done
22,974,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,680,855 UART: [art] Erasing AUTHORITY.KEYID = 7
24,682,338 UART: [art] PUB.X = 1998AD855745FE52F334A40750D8F4B28A4FAB66265BAE0BAC3B26E3B4125C6B3BDE8D40D833E7FE30DF087DD19F4A97
24,689,650 UART: [art] PUB.Y = B4B7FD96BEC53549BF336630244C8CB8ABEB72625B9A95A232002A5691B92EBE9C6464FA6FCEF3E42632F40E1D30D0EB
24,696,917 UART: [art] SIG.R = 353E1D2F962DC116C783845342B3F160AA7D104E3E9A2005D25791AF193677A340C598831D1E4DBDD45A9F4C551FE485
24,704,274 UART: [art] SIG.S = 6ED292D345066DEA20A05BAC4D8233FF6BC82254D399367F89893B087168BF2F35E5CA492E9ADD6F8531F781C0335855
25,683,317 UART: Caliptra RT
25,684,031 UART: [state] CFI Enabled
25,816,700 UART: [rt] RT listening for mailbox commands...
25,818,609 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,848,701 UART: [rt]cmd =0x414c544e, len=41
25,851,184 >>> mbox cmd response data (8 bytes)
25,851,902 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,882,174 UART: [rt]cmd =0x434b4558, len=80
30,156,318 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
191,946 UART:
192,321 UART: Running Caliptra ROM ...
193,413 UART:
193,555 UART: [state] CFI Enabled
265,343 UART: [state] LifecycleState = Unprovisioned
267,700 UART: [state] DebugLocked = No
269,148 UART: [state] WD Timer not started. Device not locked for debugging
273,893 UART: [kat] SHA2-256
463,768 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,520 UART: [kat] ++
474,964 UART: [kat] sha1
486,049 UART: [kat] SHA2-256
489,061 UART: [kat] SHA2-384
496,327 UART: [kat] SHA2-512-ACC
498,902 UART: [kat] ECC-384
2,948,909 UART: [kat] HMAC-384Kdf
2,971,597 UART: [kat] LMS
3,503,347 UART: [kat] --
3,507,276 UART: [cold-reset] ++
3,508,564 UART: [fht] FHT @ 0x50003400
3,519,965 UART: [idev] ++
3,520,595 UART: [idev] CDI.KEYID = 6
3,521,623 UART: [idev] SUBJECT.KEYID = 7
3,522,794 UART: [idev] UDS.KEYID = 0
3,523,738 ready_for_fw is high
3,523,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,980 UART: [idev] Erasing UDS.KEYID = 0
6,029,775 UART: [idev] Sha1 KeyId Algorithm
6,052,887 UART: [idev] --
6,058,024 UART: [ldev] ++
6,058,710 UART: [ldev] CDI.KEYID = 6
6,059,620 UART: [ldev] SUBJECT.KEYID = 5
6,060,831 UART: [ldev] AUTHORITY.KEYID = 7
6,062,008 UART: [ldev] FE.KEYID = 1
6,100,528 UART: [ldev] Erasing FE.KEYID = 1
8,609,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,115 UART: [ldev] --
10,411,889 UART: [fwproc] Wait for Commands...
10,413,659 UART: [fwproc] Recv command 0x46574c44
10,415,963 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,069 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,108,679 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,668,183 >>> mbox cmd response: success
14,672,238 UART: [afmc] ++
14,672,981 UART: [afmc] CDI.KEYID = 6
14,674,178 UART: [afmc] SUBJECT.KEYID = 7
14,675,615 UART: [afmc] AUTHORITY.KEYID = 5
17,213,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,500 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,581 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,745 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,589 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,434 UART: [afmc] --
19,011,344 UART: [cold-reset] --
19,015,913 UART: [state] Locking Datavault
19,022,578 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,732 UART: [state] Locking ICCM
19,027,213 UART: [exit] Launching FMC @ 0x40000130
19,035,893 UART:
19,036,130 UART: Running Caliptra FMC ...
19,037,233 UART:
19,037,399 UART: [state] CFI Enabled
19,094,689 UART: [fht] FMC Alias Private Key: 7
20,861,153 UART: [art] Extend RT PCRs Done
20,862,373 UART: [art] Lock RT PCRs Done
20,863,949 UART: [art] Populate DV Done
20,869,160 UART: [fht] FMC Alias Private Key: 7
20,870,696 UART: [art] Derive CDI
20,871,510 UART: [art] Store in slot 0x4
20,927,848 UART: [art] Derive Key Pair
20,928,887 UART: [art] Store priv key in slot 0x5
23,392,010 UART: [art] Derive Key Pair - Done
23,405,016 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,743 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,261 UART: [art] PUB.X = E9B20C21ABBEE511CCD8D3DE465620D72C2F212B3CB4A091B624591EA3C5EEBDDFE5940E796E099F58B1E01B0008B3A9
25,126,538 UART: [art] PUB.Y = FD1249B4ECD938020E20B3639197AA964104C5E253CCFD6430052E54373A49969707D3DC3E9DD8604DAB665F6124EBF4
25,133,798 UART: [art] SIG.R = 7A7FFFC86C2AB4C4BDAAF94934324A1DD3EE0799B81B44E3700025437E9494707C0ED25929C74C80BC89B671007AFC1E
25,141,113 UART: [art] SIG.S = 948F815E2C00CC8ADEAFCD7034E644E20A8300F8E1D182D27DF50A3AC03EEA30AC75AF4073E50164D423697F10E1FE40
26,120,180 UART: Caliptra RT
26,120,905 UART: [state] CFI Enabled
26,301,058 UART: [rt] RT listening for mailbox commands...
26,302,938 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,332,962 UART: [rt]cmd =0x414c544e, len=41
26,335,231 >>> mbox cmd response data (8 bytes)
26,336,274 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,366,645 UART: [rt]cmd =0x434b4558, len=80
30,708,429 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,437,411 ready_for_fw is high
3,437,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,542 >>> mbox cmd response: success
19,123,055 UART:
19,123,548 UART: Running Caliptra FMC ...
19,124,663 UART:
19,124,814 UART: [state] CFI Enabled
19,191,653 UART: [fht] FMC Alias Private Key: 7
20,957,816 UART: [art] Extend RT PCRs Done
20,959,065 UART: [art] Lock RT PCRs Done
20,960,835 UART: [art] Populate DV Done
20,966,357 UART: [fht] FMC Alias Private Key: 7
20,967,840 UART: [art] Derive CDI
20,968,601 UART: [art] Store in slot 0x4
21,025,052 UART: [art] Derive Key Pair
21,026,101 UART: [art] Store priv key in slot 0x5
23,488,672 UART: [art] Derive Key Pair - Done
23,501,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,651 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,159 UART: [art] PUB.X = 9E550D3FFFD739DFE6A597B631190F40DE566B70FD8B111E99F3D62B5C12F4DA49D985011DDD7DDDE0EF96DEC714CA02
25,223,489 UART: [art] PUB.Y = F1FBB7813D54DAD7F00C2AAAB8720C1FBF586EF8CA592BC44F8ED0BF1139424235D2DE89DFCBDD9B4E550ECEACC201BD
25,230,780 UART: [art] SIG.R = EDBF83238F3AC484BD4E4327A8ED10CF3DB3540D82DF60B48FE761962455438BE6AE27BE9E35789F06E713D21461C27F
25,238,161 UART: [art] SIG.S = EA8C25F7802218C1DCC02AE2CC0334E8853CD3511ED68FF3838138C3048F1CAD336E0E56CDFEDF2396CC5ECB4C96CB7D
26,216,823 UART: Caliptra RT
26,217,534 UART: [state] CFI Enabled
26,399,660 UART: [rt] RT listening for mailbox commands...
26,401,555 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,431,664 UART: [rt]cmd =0x414c544e, len=41
26,434,011 >>> mbox cmd response data (8 bytes)
26,434,998 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,465,623 UART: [rt]cmd =0x434b4558, len=80
30,806,075 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,599 writing to cptra_bootfsm_go
192,863 UART:
193,235 UART: Running Caliptra ROM ...
194,434 UART:
603,867 UART: [state] CFI Enabled
617,975 UART: [state] LifecycleState = Unprovisioned
620,333 UART: [state] DebugLocked = No
623,225 UART: [state] WD Timer not started. Device not locked for debugging
627,439 UART: [kat] SHA2-256
817,334 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,140 UART: [kat] ++
828,617 UART: [kat] sha1
839,070 UART: [kat] SHA2-256
842,086 UART: [kat] SHA2-384
848,653 UART: [kat] SHA2-512-ACC
851,242 UART: [kat] ECC-384
3,293,134 UART: [kat] HMAC-384Kdf
3,306,574 UART: [kat] LMS
3,838,432 UART: [kat] --
3,843,847 UART: [cold-reset] ++
3,845,776 UART: [fht] FHT @ 0x50003400
3,857,395 UART: [idev] ++
3,858,113 UART: [idev] CDI.KEYID = 6
3,859,024 UART: [idev] SUBJECT.KEYID = 7
3,860,292 UART: [idev] UDS.KEYID = 0
3,861,274 ready_for_fw is high
3,861,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,795 UART: [idev] Erasing UDS.KEYID = 0
6,332,318 UART: [idev] Sha1 KeyId Algorithm
6,354,037 UART: [idev] --
6,358,579 UART: [ldev] ++
6,359,265 UART: [ldev] CDI.KEYID = 6
6,360,184 UART: [ldev] SUBJECT.KEYID = 5
6,361,288 UART: [ldev] AUTHORITY.KEYID = 7
6,362,573 UART: [ldev] FE.KEYID = 1
6,373,171 UART: [ldev] Erasing FE.KEYID = 1
8,852,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,284 UART: [ldev] --
10,646,044 UART: [fwproc] Wait for Commands...
10,648,259 UART: [fwproc] Recv command 0x46574c44
10,650,570 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,218,720 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,342,313 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,412 >>> mbox cmd response: success
14,907,785 UART: [afmc] ++
14,908,499 UART: [afmc] CDI.KEYID = 6
14,909,693 UART: [afmc] SUBJECT.KEYID = 7
14,911,199 UART: [afmc] AUTHORITY.KEYID = 5
17,416,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,503 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,612 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,755 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,649 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,208,546 UART: [afmc] --
19,212,574 UART: [cold-reset] --
19,216,934 UART: [state] Locking Datavault
19,223,498 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,669 UART: [state] Locking ICCM
19,227,664 UART: [exit] Launching FMC @ 0x40000130
19,236,359 UART:
19,236,595 UART: Running Caliptra FMC ...
19,237,700 UART:
19,237,859 UART: [state] CFI Enabled
19,245,853 UART: [fht] FMC Alias Private Key: 7
21,011,707 UART: [art] Extend RT PCRs Done
21,012,934 UART: [art] Lock RT PCRs Done
21,014,587 UART: [art] Populate DV Done
21,020,046 UART: [fht] FMC Alias Private Key: 7
21,021,408 UART: [art] Derive CDI
21,022,157 UART: [art] Store in slot 0x4
21,064,923 UART: [art] Derive Key Pair
21,065,927 UART: [art] Store priv key in slot 0x5
23,492,625 UART: [art] Derive Key Pair - Done
23,505,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,238 UART: [art] Erasing AUTHORITY.KEYID = 7
25,213,738 UART: [art] PUB.X = DDAABCFE485D57AF376E2572C8BA485F0B9C4C4AB882F80CC12CCDC6643B5B40703FB580B920BEF7524B5B56ABE2805D
25,221,071 UART: [art] PUB.Y = 2EEA1D9076B17DF266150DC052295E1CC48406B4501641B538B4D670EC92EF89B77477A93F24260BEB10863F6EF92FCC
25,228,270 UART: [art] SIG.R = 4871721FBCDA3D641B7DF03F5A700400325EADBCDB571F12225E0E8A935DB177D1F5DCC1CCF8A806455464D31C8983A3
25,235,691 UART: [art] SIG.S = 7C6D2823A52468C6E11BD08A4D6F3252D6FCC03573183AF39FB460FBD97341D5CB53A278F447CF6877E1DA4CA0BA10AB
26,214,848 UART: Caliptra RT
26,215,535 UART: [state] CFI Enabled
26,348,178 UART: [rt] RT listening for mailbox commands...
26,350,097 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,380,204 UART: [rt]cmd =0x414c544e, len=41
26,382,615 >>> mbox cmd response data (8 bytes)
26,383,633 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,414,249 UART: [rt]cmd =0x434b4558, len=80
30,688,139 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,023 writing to cptra_bootfsm_go
3,754,023 ready_for_fw is high
3,754,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,028,663 >>> mbox cmd response: success
19,284,225 UART:
19,284,626 UART: Running Caliptra FMC ...
19,285,833 UART:
19,286,042 UART: [state] CFI Enabled
19,294,071 UART: [fht] FMC Alias Private Key: 7
21,059,726 UART: [art] Extend RT PCRs Done
21,060,966 UART: [art] Lock RT PCRs Done
21,062,492 UART: [art] Populate DV Done
21,067,942 UART: [fht] FMC Alias Private Key: 7
21,069,608 UART: [art] Derive CDI
21,070,437 UART: [art] Store in slot 0x4
21,112,586 UART: [art] Derive Key Pair
21,113,588 UART: [art] Store priv key in slot 0x5
23,540,888 UART: [art] Derive Key Pair - Done
23,553,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,260,454 UART: [art] Erasing AUTHORITY.KEYID = 7
25,261,966 UART: [art] PUB.X = FBD2257538665791A1D67E81C4EFD07E3D50BBA0C75A439948A4B5BB06A3DA839463BCFC6D1416A2706C9A49BA744515
25,269,206 UART: [art] PUB.Y = 7470A275FA03DCA2680C146FB89B7342948B01300B6F5B441ECA8E75D2B31698085C916D6BEB102E82B9D7E1048F0521
25,276,443 UART: [art] SIG.R = 63402F2EB22728773E7E0C1E4417525843E87A843CF1FC669AD42D1765CAB23DFF0EC2E97368D5F6ACB1CABAB1A4BC09
25,283,890 UART: [art] SIG.S = 4D59F796745D04F94F282DBE8275468A098CA21BA77075481359608EC3364B0B4F9E39049A1C2AEFAA1607FD29776011
26,262,358 UART: Caliptra RT
26,263,058 UART: [state] CFI Enabled
26,395,296 UART: [rt] RT listening for mailbox commands...
26,397,186 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,427,505 UART: [rt]cmd =0x414c544e, len=41
26,430,080 >>> mbox cmd response data (8 bytes)
26,431,011 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,461,493 UART: [rt]cmd =0x434b4558, len=80
30,735,732 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,945 UART: [kat] SHA2-256
881,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,991 UART: [kat] ++
886,143 UART: [kat] sha1
890,443 UART: [kat] SHA2-256
892,381 UART: [kat] SHA2-384
895,184 UART: [kat] SHA2-512-ACC
897,085 UART: [kat] ECC-384
902,534 UART: [kat] HMAC-384Kdf
907,118 UART: [kat] LMS
1,475,314 UART: [kat] --
1,476,091 UART: [cold-reset] ++
1,476,593 UART: [fht] Storing FHT @ 0x50003400
1,479,584 UART: [idev] ++
1,479,752 UART: [idev] CDI.KEYID = 6
1,480,112 UART: [idev] SUBJECT.KEYID = 7
1,480,536 UART: [idev] UDS.KEYID = 0
1,480,881 ready_for_fw is high
1,480,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,812 UART: [idev] Erasing UDS.KEYID = 0
1,505,312 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,918 UART: [idev] --
1,514,859 UART: [ldev] ++
1,515,027 UART: [ldev] CDI.KEYID = 6
1,515,390 UART: [ldev] SUBJECT.KEYID = 5
1,515,816 UART: [ldev] AUTHORITY.KEYID = 7
1,516,279 UART: [ldev] FE.KEYID = 1
1,521,673 UART: [ldev] Erasing FE.KEYID = 1
1,546,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,760 UART: [ldev] --
1,586,107 UART: [fwproc] Waiting for Commands...
1,586,954 UART: [fwproc] Received command 0x46574c44
1,587,745 UART: [fwproc] Received Image of size 118548 bytes
2,931,519 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,209 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,427 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,824 >>> mbox cmd response: success
3,131,836 UART: [afmc] ++
3,132,004 UART: [afmc] CDI.KEYID = 6
3,132,366 UART: [afmc] SUBJECT.KEYID = 7
3,132,791 UART: [afmc] AUTHORITY.KEYID = 5
3,167,644 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,658 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,438 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,147 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,030 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,713 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,433 UART: [afmc] --
3,210,453 UART: [cold-reset] --
3,211,209 UART: [state] Locking Datavault
3,212,312 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,916 UART: [state] Locking ICCM
3,213,494 UART: [exit] Launching FMC @ 0x40000130
3,218,824 UART:
3,218,840 UART: Running Caliptra FMC ...
3,219,248 UART:
3,219,302 UART: [state] CFI Enabled
3,229,478 UART: [fht] FMC Alias Private Key: 7
3,348,088 UART: [art] Extend RT PCRs Done
3,348,516 UART: [art] Lock RT PCRs Done
3,350,006 UART: [art] Populate DV Done
3,358,199 UART: [fht] FMC Alias Private Key: 7
3,359,335 UART: [art] Derive CDI
3,359,615 UART: [art] Store in slot 0x4
3,445,585 UART: [art] Derive Key Pair
3,445,945 UART: [art] Store priv key in slot 0x5
3,459,242 UART: [art] Derive Key Pair - Done
3,473,909 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,519 UART: [art] PUB.X = BBACD9E4E7E2E169E65ED6F69125941B94AF382D254C2BDDECF1BAF2CBC65D5B7E3F5AF10325B89E322770E850A0564C
3,497,306 UART: [art] PUB.Y = E412DC7203F9EDEBF9BA14F525C19DDED0DF8371020F5DA13B728A838817754FB8F5036323933EEA2B2635D02E376BA9
3,504,252 UART: [art] SIG.R = 4B0CB3478C2546174B01DF1A46CE5B6E18CC47B1EB2CB414F56A5C70B92A370CBB25FEA5F156047E03BBE1652F88F0BF
3,511,023 UART: [art] SIG.S = BBC646BCB4AE946843B05754E05C19CFF68B8FBAC53108561D97133CE911D8689433ACE38FC1CA428B670AB2D42B4D93
3,534,747 UART: Caliptra RT
3,534,998 UART: [state] CFI Enabled
3,655,050 UART: [rt] RT listening for mailbox commands...
3,655,720 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,627 UART: [rt]cmd =0x414c544e, len=41
3,687,586 >>> mbox cmd response data (8 bytes)
3,687,587 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,642 UART: [rt]cmd =0x434b4558, len=80
3,889,917 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,881 ready_for_fw is high
1,362,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,822 >>> mbox cmd response: success
3,042,533 UART:
3,042,549 UART: Running Caliptra FMC ...
3,042,957 UART:
3,043,011 UART: [state] CFI Enabled
3,053,439 UART: [fht] FMC Alias Private Key: 7
3,172,671 UART: [art] Extend RT PCRs Done
3,173,099 UART: [art] Lock RT PCRs Done
3,174,773 UART: [art] Populate DV Done
3,182,784 UART: [fht] FMC Alias Private Key: 7
3,183,802 UART: [art] Derive CDI
3,184,082 UART: [art] Store in slot 0x4
3,269,612 UART: [art] Derive Key Pair
3,269,972 UART: [art] Store priv key in slot 0x5
3,283,125 UART: [art] Derive Key Pair - Done
3,298,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,420 UART: [art] PUB.X = 86C6E340A72E45BEB48FE9549E9AFCC4A430788C64D9196D4F4BAEC6B792899FC9EFE4A25DD8E0FA8A6945C0A3CA0544
3,321,205 UART: [art] PUB.Y = 84DE3D4DCF2C05655CA3AB6B7DAB6FC8794778212703191EE561FF134FEB5B59EA652FA5D7951A8E7367F8EE894112F3
3,328,159 UART: [art] SIG.R = 348D4B19790D8642BE19BADECA391838ECF5AFC4D53F7A110E1981A36FDBFAEE1DB3B52D96375DE1A998E8BDCFFA83A7
3,334,949 UART: [art] SIG.S = C28E1416D17478BCA08FE7B10EA52DB5058C7B2162B86E5E0BCC7F4263AA793AC1885DEBE8F591B6DBC860A7758BD476
3,358,958 UART: Caliptra RT
3,359,209 UART: [state] CFI Enabled
3,479,305 UART: [rt] RT listening for mailbox commands...
3,479,975 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,062 UART: [rt]cmd =0x414c544e, len=41
3,512,067 >>> mbox cmd response data (8 bytes)
3,512,068 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,027 UART: [rt]cmd =0x434b4558, len=80
3,713,668 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,396 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,934 UART: [kat] SHA2-256
881,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,980 UART: [kat] ++
886,132 UART: [kat] sha1
890,244 UART: [kat] SHA2-256
892,182 UART: [kat] SHA2-384
894,817 UART: [kat] SHA2-512-ACC
896,718 UART: [kat] ECC-384
902,119 UART: [kat] HMAC-384Kdf
906,799 UART: [kat] LMS
1,474,995 UART: [kat] --
1,475,696 UART: [cold-reset] ++
1,476,236 UART: [fht] Storing FHT @ 0x50003400
1,479,077 UART: [idev] ++
1,479,245 UART: [idev] CDI.KEYID = 6
1,479,605 UART: [idev] SUBJECT.KEYID = 7
1,480,029 UART: [idev] UDS.KEYID = 0
1,480,374 ready_for_fw is high
1,480,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,757 UART: [idev] Erasing UDS.KEYID = 0
1,504,579 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,225 UART: [idev] --
1,514,418 UART: [ldev] ++
1,514,586 UART: [ldev] CDI.KEYID = 6
1,514,949 UART: [ldev] SUBJECT.KEYID = 5
1,515,375 UART: [ldev] AUTHORITY.KEYID = 7
1,515,838 UART: [ldev] FE.KEYID = 1
1,521,238 UART: [ldev] Erasing FE.KEYID = 1
1,546,739 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,215 UART: [ldev] --
1,586,554 UART: [fwproc] Waiting for Commands...
1,587,325 UART: [fwproc] Received command 0x46574c44
1,588,116 UART: [fwproc] Received Image of size 118548 bytes
2,931,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,860 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,078 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,407 >>> mbox cmd response: success
3,132,519 UART: [afmc] ++
3,132,687 UART: [afmc] CDI.KEYID = 6
3,133,049 UART: [afmc] SUBJECT.KEYID = 7
3,133,474 UART: [afmc] AUTHORITY.KEYID = 5
3,169,665 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,913 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,693 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,402 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,285 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,968 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,986 UART: [afmc] --
3,212,886 UART: [cold-reset] --
3,213,942 UART: [state] Locking Datavault
3,215,015 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,619 UART: [state] Locking ICCM
3,216,237 UART: [exit] Launching FMC @ 0x40000130
3,221,567 UART:
3,221,583 UART: Running Caliptra FMC ...
3,221,991 UART:
3,222,134 UART: [state] CFI Enabled
3,232,718 UART: [fht] FMC Alias Private Key: 7
3,352,092 UART: [art] Extend RT PCRs Done
3,352,520 UART: [art] Lock RT PCRs Done
3,354,106 UART: [art] Populate DV Done
3,362,277 UART: [fht] FMC Alias Private Key: 7
3,363,391 UART: [art] Derive CDI
3,363,671 UART: [art] Store in slot 0x4
3,449,599 UART: [art] Derive Key Pair
3,449,959 UART: [art] Store priv key in slot 0x5
3,463,458 UART: [art] Derive Key Pair - Done
3,478,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,650 UART: [art] PUB.X = 9BE0E4DCA626AEF24BA62A40B83DE6AC0E642204A527B33F637C23E740678B9C415308DF5679651D8DCD9562EB8B5958
3,501,417 UART: [art] PUB.Y = 1965D62D88547F1EEA11068617D440D01BF9E9A5588976EF21FE17E22AB3D1A211422949A02B4915E82FD32BE9824352
3,508,358 UART: [art] SIG.R = 57599F29DDDB6601108E0D75F1D171B9DE7649E9CE4C101877912D39A6AF23A1D4F5BD205E7B509CDEF4871AFA09F68D
3,515,129 UART: [art] SIG.S = 0707D62F7CB3DC086243EB537CA10496CF01ED7DFB344A71E4A6F7C6018351489F92C8D192318A7C92FA393764733511
3,538,583 UART: Caliptra RT
3,538,926 UART: [state] CFI Enabled
3,658,153 UART: [rt] RT listening for mailbox commands...
3,658,823 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,134 UART: [rt]cmd =0x414c544e, len=41
3,691,127 >>> mbox cmd response data (8 bytes)
3,691,128 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,025 UART: [rt]cmd =0x434b4558, len=80
3,893,984 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,146 ready_for_fw is high
1,363,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,521 >>> mbox cmd response: success
3,044,640 UART:
3,044,656 UART: Running Caliptra FMC ...
3,045,064 UART:
3,045,207 UART: [state] CFI Enabled
3,055,793 UART: [fht] FMC Alias Private Key: 7
3,175,037 UART: [art] Extend RT PCRs Done
3,175,465 UART: [art] Lock RT PCRs Done
3,176,867 UART: [art] Populate DV Done
3,184,886 UART: [fht] FMC Alias Private Key: 7
3,186,054 UART: [art] Derive CDI
3,186,334 UART: [art] Store in slot 0x4
3,272,086 UART: [art] Derive Key Pair
3,272,446 UART: [art] Store priv key in slot 0x5
3,285,901 UART: [art] Derive Key Pair - Done
3,300,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,947 UART: [art] PUB.X = E76014DFB6F319C77909A98AED165C68DA13A60DECC4603108879FED24456D24A6E986931785A67EAB8AAF2EF0C879D9
3,323,716 UART: [art] PUB.Y = D0F1A0B799C7E91925A6FE0F6E64CBAA303FD2EA5061ACFF1ED8EF1C83F69731D84310090407FDF21E6823E73388BA59
3,330,666 UART: [art] SIG.R = 6F6CFC7ECD4723118329458D567E4E9A1B735D59F17FFBC3D707AE07D950224D444CC69C17C34896F004BA5114A50DA4
3,337,428 UART: [art] SIG.S = AF76900395532165479B0F813177559901D2485E0BFFEC7E1AD74E3A18218AEE3EE7D3C19C17D22712A8FDD5826602D3
3,361,019 UART: Caliptra RT
3,361,362 UART: [state] CFI Enabled
3,480,468 UART: [rt] RT listening for mailbox commands...
3,481,138 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,315 UART: [rt]cmd =0x414c544e, len=41
3,513,104 >>> mbox cmd response data (8 bytes)
3,513,105 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,978 UART: [rt]cmd =0x434b4558, len=80
3,714,324 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
891,414 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,518 UART: [kat] ++
895,670 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,455 UART: [kat] SHA2-512-ACC
906,356 UART: [kat] ECC-384
916,061 UART: [kat] HMAC-384Kdf
920,635 UART: [kat] LMS
1,168,947 UART: [kat] --
1,170,054 UART: [cold-reset] ++
1,170,624 UART: [fht] FHT @ 0x50003400
1,173,300 UART: [idev] ++
1,173,468 UART: [idev] CDI.KEYID = 6
1,173,829 UART: [idev] SUBJECT.KEYID = 7
1,174,254 UART: [idev] UDS.KEYID = 0
1,174,600 ready_for_fw is high
1,174,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,637 UART: [idev] Erasing UDS.KEYID = 0
1,199,415 UART: [idev] Sha1 KeyId Algorithm
1,208,235 UART: [idev] --
1,209,464 UART: [ldev] ++
1,209,632 UART: [ldev] CDI.KEYID = 6
1,209,996 UART: [ldev] SUBJECT.KEYID = 5
1,210,423 UART: [ldev] AUTHORITY.KEYID = 7
1,210,886 UART: [ldev] FE.KEYID = 1
1,216,156 UART: [ldev] Erasing FE.KEYID = 1
1,242,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,274 UART: [ldev] --
1,281,475 UART: [fwproc] Wait for Commands...
1,282,238 UART: [fwproc] Recv command 0x46574c44
1,282,971 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,373 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,548 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,865 >>> mbox cmd response: success
2,825,001 UART: [afmc] ++
2,825,169 UART: [afmc] CDI.KEYID = 6
2,825,532 UART: [afmc] SUBJECT.KEYID = 7
2,825,958 UART: [afmc] AUTHORITY.KEYID = 5
2,861,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,595 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,305 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,186 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,887 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,542 UART: [afmc] --
2,904,585 UART: [cold-reset] --
2,905,479 UART: [state] Locking Datavault
2,906,800 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,404 UART: [state] Locking ICCM
2,907,912 UART: [exit] Launching FMC @ 0x40000130
2,913,242 UART:
2,913,258 UART: Running Caliptra FMC ...
2,913,666 UART:
2,913,720 UART: [state] CFI Enabled
2,924,236 UART: [fht] FMC Alias Private Key: 7
3,043,500 UART: [art] Extend RT PCRs Done
3,043,928 UART: [art] Lock RT PCRs Done
3,045,670 UART: [art] Populate DV Done
3,053,785 UART: [fht] FMC Alias Private Key: 7
3,054,773 UART: [art] Derive CDI
3,055,053 UART: [art] Store in slot 0x4
3,140,898 UART: [art] Derive Key Pair
3,141,258 UART: [art] Store priv key in slot 0x5
3,155,262 UART: [art] Derive Key Pair - Done
3,169,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,084 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,849 UART: [art] PUB.X = CF7689D88D5017B78A4627ACDE9982A055DFF79EDFE3C8B533807DA283ECF0B0BA1D7429A02C62F2976949AC4E8C2CF4
3,192,633 UART: [art] PUB.Y = 97131FBAED633F698AE07553C9E5A1DD82AA8841708A8C01EC7619BBD535460C87214D16AD4470C262D4A65640530A68
3,199,572 UART: [art] SIG.R = 86A9C99A90D78A1A92AE8C3EE6F9BA276A300708763F175691BC6515612D86F932B3CB133AEA743F21914672325C1A22
3,206,332 UART: [art] SIG.S = 5DB12526B851E25183EDEF5EE74CEA32E487322E88A397BD7E1BDC145E53394C80E570770CD3D2F1B1ED6E02B14BF14B
3,230,134 UART: Caliptra RT
3,230,385 UART: [state] CFI Enabled
3,349,744 UART: [rt] RT listening for mailbox commands...
3,350,414 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,511 UART: [rt]cmd =0x414c544e, len=41
3,382,382 >>> mbox cmd response data (8 bytes)
3,382,383 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,316 UART: [rt]cmd =0x434b4558, len=80
3,585,223 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,368 ready_for_fw is high
1,059,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,636 >>> mbox cmd response: success
2,740,391 UART:
2,740,407 UART: Running Caliptra FMC ...
2,740,815 UART:
2,740,869 UART: [state] CFI Enabled
2,751,589 UART: [fht] FMC Alias Private Key: 7
2,871,093 UART: [art] Extend RT PCRs Done
2,871,521 UART: [art] Lock RT PCRs Done
2,873,205 UART: [art] Populate DV Done
2,881,494 UART: [fht] FMC Alias Private Key: 7
2,882,538 UART: [art] Derive CDI
2,882,818 UART: [art] Store in slot 0x4
2,968,849 UART: [art] Derive Key Pair
2,969,209 UART: [art] Store priv key in slot 0x5
2,982,331 UART: [art] Derive Key Pair - Done
2,996,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,910 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,675 UART: [art] PUB.X = 37981F7C92E17D49D946C6149ED405DC17B5313E0CB585D4C7558EAA2D99DF0E12F86DEC4612A0EC98540B53AE53A317
3,019,439 UART: [art] PUB.Y = BC3F00F13A35F7462CA99C0851BA5553C33D10DE96B0FFC01A249B77639354314D6DD16C6411D4EF0E8A7E87B36692C4
3,026,365 UART: [art] SIG.R = 04B96FA3347ECEA8BED75CE60846B8191A43B2CD973C72D32DC4AB11759CA6D764300B9E0FFEB78838039CC307D42BEA
3,033,131 UART: [art] SIG.S = BB081D1EABDD2B87B8EA1DFEA095AB8835E048DBBF39B6FE50A1727E2F3BE17169BAE41A4C56E26A6B338D99357150D9
3,057,262 UART: Caliptra RT
3,057,513 UART: [state] CFI Enabled
3,177,554 UART: [rt] RT listening for mailbox commands...
3,178,224 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,443 UART: [rt]cmd =0x414c544e, len=41
3,210,486 >>> mbox cmd response data (8 bytes)
3,210,487 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,376 UART: [rt]cmd =0x434b4558, len=80
3,412,391 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,335 UART: [kat] ++
895,487 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
916,154 UART: [kat] HMAC-384Kdf
920,560 UART: [kat] LMS
1,168,872 UART: [kat] --
1,169,761 UART: [cold-reset] ++
1,170,113 UART: [fht] FHT @ 0x50003400
1,172,889 UART: [idev] ++
1,173,057 UART: [idev] CDI.KEYID = 6
1,173,418 UART: [idev] SUBJECT.KEYID = 7
1,173,843 UART: [idev] UDS.KEYID = 0
1,174,189 ready_for_fw is high
1,174,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,178 UART: [idev] Erasing UDS.KEYID = 0
1,199,516 UART: [idev] Sha1 KeyId Algorithm
1,208,464 UART: [idev] --
1,209,303 UART: [ldev] ++
1,209,471 UART: [ldev] CDI.KEYID = 6
1,209,835 UART: [ldev] SUBJECT.KEYID = 5
1,210,262 UART: [ldev] AUTHORITY.KEYID = 7
1,210,725 UART: [ldev] FE.KEYID = 1
1,216,201 UART: [ldev] Erasing FE.KEYID = 1
1,242,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,845 UART: [ldev] --
1,282,242 UART: [fwproc] Wait for Commands...
1,282,999 UART: [fwproc] Recv command 0x46574c44
1,283,732 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,320 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,495 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,764 >>> mbox cmd response: success
2,828,912 UART: [afmc] ++
2,829,080 UART: [afmc] CDI.KEYID = 6
2,829,443 UART: [afmc] SUBJECT.KEYID = 7
2,829,869 UART: [afmc] AUTHORITY.KEYID = 5
2,865,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,760 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,470 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,351 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,052 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,809 UART: [afmc] --
2,908,858 UART: [cold-reset] --
2,909,756 UART: [state] Locking Datavault
2,910,875 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,479 UART: [state] Locking ICCM
2,911,933 UART: [exit] Launching FMC @ 0x40000130
2,917,263 UART:
2,917,279 UART: Running Caliptra FMC ...
2,917,687 UART:
2,917,830 UART: [state] CFI Enabled
2,928,282 UART: [fht] FMC Alias Private Key: 7
3,047,798 UART: [art] Extend RT PCRs Done
3,048,226 UART: [art] Lock RT PCRs Done
3,049,826 UART: [art] Populate DV Done
3,058,031 UART: [fht] FMC Alias Private Key: 7
3,059,077 UART: [art] Derive CDI
3,059,357 UART: [art] Store in slot 0x4
3,145,268 UART: [art] Derive Key Pair
3,145,628 UART: [art] Store priv key in slot 0x5
3,159,364 UART: [art] Derive Key Pair - Done
3,174,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,090 UART: [art] PUB.X = 67CE427DEBD7492E1B33C48591B9DF33AE2D2B07343B65AB5FE4CC444D652E2ADE3AEE727DF837368849D8387C945711
3,196,865 UART: [art] PUB.Y = 8A7D7433CA9D311C2C6867C847D583D75969001CF21341C5604270E6AE3653BA20B023FCDF7F6667F851AB25B21F118C
3,203,791 UART: [art] SIG.R = AD82C57FACC3530B48C9F8021B49EE52C6A356E665F883C92A64122AA0ACF6B55609E17071299803EFF0793BDD3E58BA
3,210,557 UART: [art] SIG.S = 8695C495FCDF572992FCB57A420BCF8195D47AD1E3FE27C76E2DCDE381C6DC7845104DFAA080F7D8A784E7E6677FC491
3,234,166 UART: Caliptra RT
3,234,509 UART: [state] CFI Enabled
3,353,291 UART: [rt] RT listening for mailbox commands...
3,353,961 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,350 UART: [rt]cmd =0x414c544e, len=41
3,386,297 >>> mbox cmd response data (8 bytes)
3,386,298 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,159 UART: [rt]cmd =0x434b4558, len=80
3,588,475 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,639 ready_for_fw is high
1,059,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,803 >>> mbox cmd response: success
2,741,456 UART:
2,741,472 UART: Running Caliptra FMC ...
2,741,880 UART:
2,742,023 UART: [state] CFI Enabled
2,752,707 UART: [fht] FMC Alias Private Key: 7
2,871,403 UART: [art] Extend RT PCRs Done
2,871,831 UART: [art] Lock RT PCRs Done
2,873,445 UART: [art] Populate DV Done
2,881,666 UART: [fht] FMC Alias Private Key: 7
2,882,646 UART: [art] Derive CDI
2,882,926 UART: [art] Store in slot 0x4
2,968,739 UART: [art] Derive Key Pair
2,969,099 UART: [art] Store priv key in slot 0x5
2,982,895 UART: [art] Derive Key Pair - Done
2,997,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,205 UART: [art] PUB.X = 4DD1B35378F78EF22758277D36E9508F71EE0710C96CE7F27563256DFFBCFB708B2C7ADF1BD46BC9F34067C3C7352DBE
3,020,984 UART: [art] PUB.Y = 3E4511C776100EE014D4386E7599E824A452AEC175401E6C31904CA05FCA4539FCD1665C51C7FA374EB976927A69ABBD
3,027,933 UART: [art] SIG.R = 2D4B1B8F089C61AFE2386FA95FAA6E98FBA5782E9ECA3892DC48B5A6BAE2BD97A4F383BD457830DBF2A9A9F895C03DE6
3,034,724 UART: [art] SIG.S = 0A472F4261DDBC9E788CFE3F589AD3196CFD409BA375A2CA0E5BE91FA1011BDC93F63D51376F8D66676D2D2057A2A370
3,058,535 UART: Caliptra RT
3,058,878 UART: [state] CFI Enabled
3,178,438 UART: [rt] RT listening for mailbox commands...
3,179,108 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,891 UART: [rt]cmd =0x414c544e, len=41
3,210,920 >>> mbox cmd response data (8 bytes)
3,210,921 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,594 UART: [rt]cmd =0x434b4558, len=80
3,413,265 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
893,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,339 UART: [kat] ++
897,491 UART: [kat] sha1
901,673 UART: [kat] SHA2-256
903,613 UART: [kat] SHA2-384
906,304 UART: [kat] SHA2-512-ACC
908,205 UART: [kat] ECC-384
918,070 UART: [kat] HMAC-384Kdf
922,684 UART: [kat] LMS
1,171,012 UART: [kat] --
1,171,817 UART: [cold-reset] ++
1,172,153 UART: [fht] FHT @ 0x50003400
1,174,830 UART: [idev] ++
1,174,998 UART: [idev] CDI.KEYID = 6
1,175,358 UART: [idev] SUBJECT.KEYID = 7
1,175,782 UART: [idev] UDS.KEYID = 0
1,176,127 ready_for_fw is high
1,176,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,738 UART: [idev] Erasing UDS.KEYID = 0
1,200,533 UART: [idev] Sha1 KeyId Algorithm
1,209,223 UART: [idev] --
1,210,329 UART: [ldev] ++
1,210,497 UART: [ldev] CDI.KEYID = 6
1,210,860 UART: [ldev] SUBJECT.KEYID = 5
1,211,286 UART: [ldev] AUTHORITY.KEYID = 7
1,211,749 UART: [ldev] FE.KEYID = 1
1,217,143 UART: [ldev] Erasing FE.KEYID = 1
1,243,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,661 UART: [ldev] --
1,282,956 UART: [fwproc] Wait for Commands...
1,283,526 UART: [fwproc] Recv command 0x46574c44
1,284,254 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,264 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,434 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,609 >>> mbox cmd response: success
2,828,715 UART: [afmc] ++
2,828,883 UART: [afmc] CDI.KEYID = 6
2,829,245 UART: [afmc] SUBJECT.KEYID = 7
2,829,670 UART: [afmc] AUTHORITY.KEYID = 5
2,865,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,198 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,946 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,655 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,538 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,239 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,039 UART: [afmc] --
2,908,143 UART: [cold-reset] --
2,909,001 UART: [state] Locking Datavault
2,910,186 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,790 UART: [state] Locking ICCM
2,911,422 UART: [exit] Launching FMC @ 0x40000130
2,916,752 UART:
2,916,768 UART: Running Caliptra FMC ...
2,917,176 UART:
2,917,230 UART: [state] CFI Enabled
2,927,850 UART: [fht] FMC Alias Private Key: 7
3,047,216 UART: [art] Extend RT PCRs Done
3,047,644 UART: [art] Lock RT PCRs Done
3,049,244 UART: [art] Populate DV Done
3,057,567 UART: [fht] FMC Alias Private Key: 7
3,058,569 UART: [art] Derive CDI
3,058,849 UART: [art] Store in slot 0x4
3,144,872 UART: [art] Derive Key Pair
3,145,232 UART: [art] Store priv key in slot 0x5
3,159,066 UART: [art] Derive Key Pair - Done
3,173,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,625 UART: [art] PUB.X = 904D1A06B4296E21CA1A9290FCB38AAED3C44A36C5673F5480283BA8FFB2BE293D806DFA04BA617AEA3442AE222F18A5
3,196,403 UART: [art] PUB.Y = A3FA777C8393ACF2AC4DF788C0F0BA49DE0000DDEE01756812F5CF7C456C407E85A36B85E0D0AE8BE1230867F81C4F17
3,203,317 UART: [art] SIG.R = D8E7F8AD91ED4FB52CE396CB5CC095361B82F60E324DF6BFC4C354A5C6A9D6740FB8461312E963A9F4E365488C9D7075
3,210,091 UART: [art] SIG.S = BE8EFBB3DB3E3CC2C8026022B8B5E83E96A02C8F63C2CCD08E4893247CD0B83EDABDEEEF10FF9B860D2520FA9A031950
3,233,454 UART: Caliptra RT
3,233,705 UART: [state] CFI Enabled
3,353,129 UART: [rt] RT listening for mailbox commands...
3,353,799 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,888 UART: [rt]cmd =0x414c544e, len=41
3,385,861 >>> mbox cmd response data (8 bytes)
3,385,862 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,767 UART: [rt]cmd =0x434b4558, len=80
3,587,647 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,393 ready_for_fw is high
1,060,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,714 >>> mbox cmd response: success
2,741,151 UART:
2,741,167 UART: Running Caliptra FMC ...
2,741,575 UART:
2,741,629 UART: [state] CFI Enabled
2,752,159 UART: [fht] FMC Alias Private Key: 7
2,870,443 UART: [art] Extend RT PCRs Done
2,870,871 UART: [art] Lock RT PCRs Done
2,872,389 UART: [art] Populate DV Done
2,880,288 UART: [fht] FMC Alias Private Key: 7
2,881,390 UART: [art] Derive CDI
2,881,670 UART: [art] Store in slot 0x4
2,967,695 UART: [art] Derive Key Pair
2,968,055 UART: [art] Store priv key in slot 0x5
2,981,527 UART: [art] Derive Key Pair - Done
2,996,712 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,405 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,170 UART: [art] PUB.X = 97C247C913067CA26772342A331FE0F9EF87F94174C4E484580E32436FA934CC06B2593D5D6106E9CF29285534288087
3,019,914 UART: [art] PUB.Y = 1AFA304B1B107C7FDAD55358FBD8283345EA62FC78BDA038706E84C516961E1E959DD932F3A34624BBA05909AAC9FF31
3,026,871 UART: [art] SIG.R = DEE69EF733A4D261C3A452EE71ACD7FADF354CA2DCDE8A968B3422024A82CEE941CA48C5B1B6B496FFBF2DD1C668266F
3,033,664 UART: [art] SIG.S = CEAA4DE609593BBEE5713F4CCC5AFE3BDB9C9E221040CA874A82B7FD1E3EBCFA51490443A2BD760B172678CC3A2F6A2D
3,057,411 UART: Caliptra RT
3,057,662 UART: [state] CFI Enabled
3,176,750 UART: [rt] RT listening for mailbox commands...
3,177,420 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,523 UART: [rt]cmd =0x414c544e, len=41
3,209,596 >>> mbox cmd response data (8 bytes)
3,209,597 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,238 UART: [rt]cmd =0x434b4558, len=80
3,410,884 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Unprovisioned
85,702 UART: [state] DebugLocked = No
86,194 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
893,203 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,328 UART: [kat] ++
897,480 UART: [kat] sha1
901,760 UART: [kat] SHA2-256
903,700 UART: [kat] SHA2-384
906,485 UART: [kat] SHA2-512-ACC
908,386 UART: [kat] ECC-384
918,341 UART: [kat] HMAC-384Kdf
923,061 UART: [kat] LMS
1,171,389 UART: [kat] --
1,172,288 UART: [cold-reset] ++
1,172,656 UART: [fht] FHT @ 0x50003400
1,175,341 UART: [idev] ++
1,175,509 UART: [idev] CDI.KEYID = 6
1,175,869 UART: [idev] SUBJECT.KEYID = 7
1,176,293 UART: [idev] UDS.KEYID = 0
1,176,638 ready_for_fw is high
1,176,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,501 UART: [idev] Erasing UDS.KEYID = 0
1,202,062 UART: [idev] Sha1 KeyId Algorithm
1,210,678 UART: [idev] --
1,211,826 UART: [ldev] ++
1,211,994 UART: [ldev] CDI.KEYID = 6
1,212,357 UART: [ldev] SUBJECT.KEYID = 5
1,212,783 UART: [ldev] AUTHORITY.KEYID = 7
1,213,246 UART: [ldev] FE.KEYID = 1
1,218,124 UART: [ldev] Erasing FE.KEYID = 1
1,243,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,404 UART: [ldev] --
1,282,699 UART: [fwproc] Wait for Commands...
1,283,477 UART: [fwproc] Recv command 0x46574c44
1,284,205 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,289 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,459 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,802 >>> mbox cmd response: success
2,828,822 UART: [afmc] ++
2,828,990 UART: [afmc] CDI.KEYID = 6
2,829,352 UART: [afmc] SUBJECT.KEYID = 7
2,829,777 UART: [afmc] AUTHORITY.KEYID = 5
2,865,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,881 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,590 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,473 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,174 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,998 UART: [afmc] --
2,909,050 UART: [cold-reset] --
2,909,954 UART: [state] Locking Datavault
2,911,193 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,797 UART: [state] Locking ICCM
2,912,383 UART: [exit] Launching FMC @ 0x40000130
2,917,713 UART:
2,917,729 UART: Running Caliptra FMC ...
2,918,137 UART:
2,918,280 UART: [state] CFI Enabled
2,928,638 UART: [fht] FMC Alias Private Key: 7
3,046,790 UART: [art] Extend RT PCRs Done
3,047,218 UART: [art] Lock RT PCRs Done
3,048,842 UART: [art] Populate DV Done
3,057,129 UART: [fht] FMC Alias Private Key: 7
3,058,267 UART: [art] Derive CDI
3,058,547 UART: [art] Store in slot 0x4
3,144,306 UART: [art] Derive Key Pair
3,144,666 UART: [art] Store priv key in slot 0x5
3,157,874 UART: [art] Derive Key Pair - Done
3,172,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,797 UART: [art] PUB.X = 4822F294F61858FCBB660644FCA4BDAF1355EE9C7F002528E227DECD03788B7B3C03BC2F32F9346D57EE85D26CCBA8A9
3,195,550 UART: [art] PUB.Y = D9695D2F3F088DED6675500485B6B282C5AC2F6F9708A10986315FCAA05D0A9A3E3B409D3AD1C49139F7F5C6BBDFF090
3,202,495 UART: [art] SIG.R = 4C252E1B71CCB876A234F7E0DC2E445E95D9A1D8168894865F205231BE62122BD79EAA8E141AE55FAB4F82ACB983F407
3,209,270 UART: [art] SIG.S = AC972A3165260F4DE42A9A2173C0CC78B9955B3BDF30584A151558259EC9386935311BBB92E1D807F65E1C67EA7D6B05
3,232,735 UART: Caliptra RT
3,233,078 UART: [state] CFI Enabled
3,352,067 UART: [rt] RT listening for mailbox commands...
3,352,737 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,586 UART: [rt]cmd =0x414c544e, len=41
3,384,575 >>> mbox cmd response data (8 bytes)
3,384,576 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,395 UART: [rt]cmd =0x434b4558, len=80
3,586,799 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,620 ready_for_fw is high
1,060,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,751 >>> mbox cmd response: success
2,743,010 UART:
2,743,026 UART: Running Caliptra FMC ...
2,743,434 UART:
2,743,577 UART: [state] CFI Enabled
2,754,213 UART: [fht] FMC Alias Private Key: 7
2,873,507 UART: [art] Extend RT PCRs Done
2,873,935 UART: [art] Lock RT PCRs Done
2,875,699 UART: [art] Populate DV Done
2,884,026 UART: [fht] FMC Alias Private Key: 7
2,885,128 UART: [art] Derive CDI
2,885,408 UART: [art] Store in slot 0x4
2,971,577 UART: [art] Derive Key Pair
2,971,937 UART: [art] Store priv key in slot 0x5
2,985,213 UART: [art] Derive Key Pair - Done
2,999,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,238 UART: [art] PUB.X = 0D7844930415E0B2398679BFD10695D98B40EC37CD8A63692F6B6C768E906E9CFC2C944622926D2B0FF609A6C5246D90
3,022,989 UART: [art] PUB.Y = 6EA3F69176912CE3605111A9E41008FB97F3A155B0505ECB0C21C0C59DF54762F5ED3A3490D87DC7AA1C9561E36416E4
3,029,935 UART: [art] SIG.R = 43912BCEBC3748E0DD182AE2E66C8ED6A2BDF7BE67187A4A898C0643418025FF837B3139C0336623F49B910AAF140AE9
3,036,702 UART: [art] SIG.S = 211E6E0072DE292FC6D6040DA915187CB1959FDE2573C3282E396436A2D13237E463768DE709FAAEB38142C917FEC7DE
3,060,421 UART: Caliptra RT
3,060,764 UART: [state] CFI Enabled
3,180,348 UART: [rt] RT listening for mailbox commands...
3,181,018 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,199 UART: [rt]cmd =0x414c544e, len=41
3,213,214 >>> mbox cmd response data (8 bytes)
3,213,215 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,242,814 UART: [rt]cmd =0x434b4558, len=80
3,415,296 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,861 writing to cptra_bootfsm_go
193,070 UART:
193,436 UART: Running Caliptra ROM ...
194,536 UART:
194,676 UART: [state] CFI Enabled
263,713 UART: [state] LifecycleState = Unprovisioned
265,613 UART: [state] DebugLocked = No
267,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,362 UART: [kat] SHA2-256
442,074 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,559 UART: [kat] ++
453,041 UART: [kat] sha1
462,785 UART: [kat] SHA2-256
465,448 UART: [kat] SHA2-384
471,512 UART: [kat] SHA2-512-ACC
473,879 UART: [kat] ECC-384
2,767,484 UART: [kat] HMAC-384Kdf
2,799,254 UART: [kat] LMS
3,989,524 UART: [kat] --
3,994,511 UART: [cold-reset] ++
3,996,718 UART: [fht] Storing FHT @ 0x50003400
4,007,290 UART: [idev] ++
4,007,910 UART: [idev] CDI.KEYID = 6
4,008,803 UART: [idev] SUBJECT.KEYID = 7
4,010,056 UART: [idev] UDS.KEYID = 0
4,011,038 ready_for_fw is high
4,011,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,185 UART: [idev] Erasing UDS.KEYID = 0
7,343,093 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,983 UART: [idev] --
7,368,094 UART: [ldev] ++
7,368,679 UART: [ldev] CDI.KEYID = 6
7,369,647 UART: [ldev] SUBJECT.KEYID = 5
7,370,871 UART: [ldev] AUTHORITY.KEYID = 7
7,372,102 UART: [ldev] FE.KEYID = 1
7,399,924 UART: [ldev] Erasing FE.KEYID = 1
10,732,424 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,386 UART: [ldev] --
13,113,935 UART: [fwproc] Waiting for Commands...
13,117,053 UART: [fwproc] Received command 0x46574c44
13,119,236 UART: [fwproc] Received Image of size 118548 bytes
17,221,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,294,829 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,002 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,695,700 >>> mbox cmd response: success
17,699,352 UART: [afmc] ++
17,699,966 UART: [afmc] CDI.KEYID = 6
17,700,856 UART: [afmc] SUBJECT.KEYID = 7
17,702,128 UART: [afmc] AUTHORITY.KEYID = 5
21,068,884 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,100 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,409 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,384,788 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,538 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,413,982 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,063 UART: [afmc] --
23,439,766 UART: [cold-reset] --
23,443,426 UART: [state] Locking Datavault
23,448,291 UART: [state] Locking PCR0, PCR1 and PCR31
23,450,063 UART: [state] Locking ICCM
23,451,302 UART: [exit] Launching FMC @ 0x40000130
23,459,706 UART:
23,459,939 UART: Running Caliptra FMC ...
23,461,036 UART:
23,461,195 UART: [state] CFI Enabled
23,528,864 UART: [fht] FMC Alias Private Key: 7
25,870,125 UART: [art] Extend RT PCRs Done
25,871,349 UART: [art] Lock RT PCRs Done
25,873,275 UART: [art] Populate DV Done
25,878,903 UART: [fht] FMC Alias Private Key: 7
25,880,510 UART: [art] Derive CDI
25,881,247 UART: [art] Store in slot 0x4
25,938,343 UART: [art] Derive Key Pair
25,939,380 UART: [art] Store priv key in slot 0x5
29,232,054 UART: [art] Derive Key Pair - Done
29,245,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,506 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,019 UART: [art] PUB.X = C69229CD31887A17B72881DFD66C16714E7F4220173118D4550AE638A6B737631104E772730C7B446ADAF271465AC585
31,542,231 UART: [art] PUB.Y = 53FFFDFC424F9A7BEFA62F2D8CBEA07788088163555B02FECC7F3D1820A655E01102298F7D838DA7A69D5DAB8D42B442
31,549,483 UART: [art] SIG.R = B63F407F79E6B422F15B146EE65C60EC6BDB0410DC26E3B54962423A8F42E20AF9D18285CE8028451ED4E89EB49789B6
31,556,893 UART: [art] SIG.S = 04B62608692D70C8DA7FAE0C98FA43190DB81DE83F09EACF44DDC5CAB15021693FCCF6B609F62C7369D92ABDDF30778B
32,862,113 UART: Caliptra RT
32,862,820 UART: [state] CFI Enabled
33,038,346 UART: [rt] RT listening for mailbox commands...
33,040,248 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,070,042 UART: [rt]cmd =0x414c544e, len=20
33,071,644 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,807,885 ready_for_fw is high
3,808,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,959,257 >>> mbox cmd response: success
23,651,646 UART:
23,652,053 UART: Running Caliptra FMC ...
23,653,204 UART:
23,653,367 UART: [state] CFI Enabled
23,718,218 UART: [fht] FMC Alias Private Key: 7
26,059,407 UART: [art] Extend RT PCRs Done
26,060,671 UART: [art] Lock RT PCRs Done
26,062,225 UART: [art] Populate DV Done
26,067,491 UART: [fht] FMC Alias Private Key: 7
26,069,087 UART: [art] Derive CDI
26,069,836 UART: [art] Store in slot 0x4
26,126,389 UART: [art] Derive Key Pair
26,127,429 UART: [art] Store priv key in slot 0x5
29,420,073 UART: [art] Derive Key Pair - Done
29,433,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,721,488 UART: [art] Erasing AUTHORITY.KEYID = 7
31,722,996 UART: [art] PUB.X = 20BD1ACF2DFBA70F85E3DBD3191A821825A2C706A427E0E9E45E0AA2183FA597E0A9C140BA69FEDF1953C1B55DA2AEDF
31,730,258 UART: [art] PUB.Y = D93022E523FA075DC83953CB3566923C41923D97A9D90646DC1A444FFC185A1EFD29197C2E588476312143F2948B727C
31,737,542 UART: [art] SIG.R = 9A6456FBDEFA9CE043500DC5CBE5F5ABEFBD1B1020E4493F6926B609F3B933D19B42805B348899953256E2B447B191E2
31,744,893 UART: [art] SIG.S = 7EF12FB75C4015FD8EA1925C9CDAC301357B3E6C6809DC710F4BAA3B21BCB4895C8BFCC9E99543A19677D02F3EB345AC
33,050,650 UART: Caliptra RT
33,051,362 UART: [state] CFI Enabled
33,246,889 UART: [rt] RT listening for mailbox commands...
33,248,796 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,278,652 UART: [rt]cmd =0x414c544e, len=20
33,280,358 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
192,426 UART:
192,788 UART: Running Caliptra ROM ...
193,915 UART:
603,403 UART: [state] CFI Enabled
619,295 UART: [state] LifecycleState = Unprovisioned
621,200 UART: [state] DebugLocked = No
622,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,793 UART: [kat] SHA2-256
797,515 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,100 UART: [kat] ++
808,558 UART: [kat] sha1
819,921 UART: [kat] SHA2-256
822,631 UART: [kat] SHA2-384
828,971 UART: [kat] SHA2-512-ACC
831,332 UART: [kat] ECC-384
3,115,603 UART: [kat] HMAC-384Kdf
3,128,554 UART: [kat] LMS
4,318,709 UART: [kat] --
4,322,193 UART: [cold-reset] ++
4,323,059 UART: [fht] Storing FHT @ 0x50003400
4,335,669 UART: [idev] ++
4,336,228 UART: [idev] CDI.KEYID = 6
4,337,175 UART: [idev] SUBJECT.KEYID = 7
4,338,407 UART: [idev] UDS.KEYID = 0
4,339,402 ready_for_fw is high
4,339,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,546 UART: [idev] Erasing UDS.KEYID = 0
7,625,032 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,912 UART: [idev] --
7,650,771 UART: [ldev] ++
7,651,332 UART: [ldev] CDI.KEYID = 6
7,652,266 UART: [ldev] SUBJECT.KEYID = 5
7,653,691 UART: [ldev] AUTHORITY.KEYID = 7
7,654,900 UART: [ldev] FE.KEYID = 1
7,665,359 UART: [ldev] Erasing FE.KEYID = 1
10,949,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,106 UART: [ldev] --
13,311,296 UART: [fwproc] Waiting for Commands...
13,313,061 UART: [fwproc] Received command 0x46574c44
13,315,243 UART: [fwproc] Received Image of size 118548 bytes
17,420,381 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,579 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,897,775 >>> mbox cmd response: success
17,901,247 UART: [afmc] ++
17,901,858 UART: [afmc] CDI.KEYID = 6
17,902,772 UART: [afmc] SUBJECT.KEYID = 7
17,904,037 UART: [afmc] AUTHORITY.KEYID = 5
21,220,096 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,143 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,394 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,826 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,579 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,933 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,581,720 UART: [afmc] --
23,585,488 UART: [cold-reset] --
23,589,075 UART: [state] Locking Datavault
23,595,178 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,921 UART: [state] Locking ICCM
23,598,687 UART: [exit] Launching FMC @ 0x40000130
23,607,075 UART:
23,607,326 UART: Running Caliptra FMC ...
23,608,422 UART:
23,608,577 UART: [state] CFI Enabled
23,616,811 UART: [fht] FMC Alias Private Key: 7
25,956,486 UART: [art] Extend RT PCRs Done
25,957,709 UART: [art] Lock RT PCRs Done
25,959,091 UART: [art] Populate DV Done
25,964,391 UART: [fht] FMC Alias Private Key: 7
25,966,030 UART: [art] Derive CDI
25,966,836 UART: [art] Store in slot 0x4
26,009,423 UART: [art] Derive Key Pair
26,010,469 UART: [art] Store priv key in slot 0x5
29,252,316 UART: [art] Derive Key Pair - Done
29,264,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,505 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,006 UART: [art] PUB.X = A5EAE9EAFF5D24652BDE1B1A99F998EC7964E2B81976B1D74C82F3E02F36C20BE0285FE7183B44EABA8DD82D2AE40F96
31,554,287 UART: [art] PUB.Y = 72E314BD2BBA08557D050A0C2F9436BD7F69DE8B8AEFD133D9CAC00A270FB7792A16E0191662B58745CABBA738FF28C6
31,561,577 UART: [art] SIG.R = 63F3208262AF01BA6D4F3A6214D5D048CE834AC54304162027E634990C795671B0A2E8DF531FB69156242099A0BCDDC8
31,568,908 UART: [art] SIG.S = 95BF356164B4FA0DB6A5123A28EB84D43EA72FBCF5CB9B9B118DBA38735AC3A3A4BC3A176AE8C807A4538FE5CA1418C8
32,874,067 UART: Caliptra RT
32,874,779 UART: [state] CFI Enabled
33,008,784 UART: [rt] RT listening for mailbox commands...
33,010,669 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,040,401 UART: [rt]cmd =0x414c544e, len=20
33,041,977 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,086 writing to cptra_bootfsm_go
4,132,240 ready_for_fw is high
4,132,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,166,998 >>> mbox cmd response: success
23,800,759 UART:
23,801,274 UART: Running Caliptra FMC ...
23,802,397 UART:
23,802,548 UART: [state] CFI Enabled
23,810,676 UART: [fht] FMC Alias Private Key: 7
26,151,066 UART: [art] Extend RT PCRs Done
26,152,299 UART: [art] Lock RT PCRs Done
26,154,092 UART: [art] Populate DV Done
26,159,458 UART: [fht] FMC Alias Private Key: 7
26,160,989 UART: [art] Derive CDI
26,161,731 UART: [art] Store in slot 0x4
26,204,753 UART: [art] Derive Key Pair
26,205,752 UART: [art] Store priv key in slot 0x5
29,447,738 UART: [art] Derive Key Pair - Done
29,460,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,758 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,257 UART: [art] PUB.X = 9159D75384B4F01CD59EE25DEAC78FC8D3C67977397568DD64242E864583ECA2AFAC2DC34E2BB50536057DE239B06F56
31,749,511 UART: [art] PUB.Y = 96971A81961B97716EFEC1F7B73D83586E1EAA51208836212CE528D90216F0C3F2F3F1005D91BDA1AC9C43779269DB7D
31,756,763 UART: [art] SIG.R = 7D239FA52B32B36DC348D1D349EF44E7318EE942E4431D16C83AB39A89BDE700A3D541F2A41CF44BA2D8B27DDE8A753D
31,764,142 UART: [art] SIG.S = 8416E71E240C891A66EBB4EA63F23F3AF04A80A5268ECE5AD1CB8F6F061FC5B3CA870BD5D891B2E33B09CB58C4C9ECEE
33,069,254 UART: Caliptra RT
33,069,971 UART: [state] CFI Enabled
33,203,307 UART: [rt] RT listening for mailbox commands...
33,205,198 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,234,979 UART: [rt]cmd =0x414c544e, len=20
33,236,733 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,227 UART:
192,592 UART: Running Caliptra ROM ...
193,775 UART:
193,927 UART: [state] CFI Enabled
263,128 UART: [state] LifecycleState = Unprovisioned
265,063 UART: [state] DebugLocked = No
266,888 UART: [state] WD Timer not started. Device not locked for debugging
270,854 UART: [kat] SHA2-256
450,502 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,319 UART: [kat] ++
461,868 UART: [kat] sha1
473,671 UART: [kat] SHA2-256
476,395 UART: [kat] SHA2-384
482,720 UART: [kat] SHA2-512-ACC
485,067 UART: [kat] ECC-384
2,944,941 UART: [kat] HMAC-384Kdf
2,970,511 UART: [kat] LMS
3,446,966 UART: [kat] --
3,451,192 UART: [cold-reset] ++
3,452,131 UART: [fht] FHT @ 0x50003400
3,463,740 UART: [idev] ++
3,464,299 UART: [idev] CDI.KEYID = 6
3,465,328 UART: [idev] SUBJECT.KEYID = 7
3,466,500 UART: [idev] UDS.KEYID = 0
3,467,437 ready_for_fw is high
3,467,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,778 UART: [idev] Erasing UDS.KEYID = 0
5,986,611 UART: [idev] Sha1 KeyId Algorithm
6,011,449 UART: [idev] --
6,016,491 UART: [ldev] ++
6,017,066 UART: [ldev] CDI.KEYID = 6
6,018,082 UART: [ldev] SUBJECT.KEYID = 5
6,019,190 UART: [ldev] AUTHORITY.KEYID = 7
6,020,476 UART: [ldev] FE.KEYID = 1
6,057,316 UART: [ldev] Erasing FE.KEYID = 1
8,564,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,409 UART: [ldev] --
10,373,583 UART: [fwproc] Wait for Commands...
10,375,420 UART: [fwproc] Recv command 0x46574c44
10,377,403 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,478 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,488 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,995 >>> mbox cmd response: success
14,352,971 UART: [afmc] ++
14,353,587 UART: [afmc] CDI.KEYID = 6
14,354,471 UART: [afmc] SUBJECT.KEYID = 7
14,355,691 UART: [afmc] AUTHORITY.KEYID = 5
16,893,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,659 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,455 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,529 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,081 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,384 UART: [afmc] --
18,695,672 UART: [cold-reset] --
18,700,012 UART: [state] Locking Datavault
18,706,283 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,979 UART: [state] Locking ICCM
18,709,483 UART: [exit] Launching FMC @ 0x40000130
18,717,926 UART:
18,718,167 UART: Running Caliptra FMC ...
18,719,433 UART:
18,719,619 UART: [state] CFI Enabled
18,775,991 UART: [fht] FMC Alias Private Key: 7
20,542,782 UART: [art] Extend RT PCRs Done
20,544,003 UART: [art] Lock RT PCRs Done
20,545,525 UART: [art] Populate DV Done
20,550,934 UART: [fht] FMC Alias Private Key: 7
20,552,578 UART: [art] Derive CDI
20,553,409 UART: [art] Store in slot 0x4
20,609,320 UART: [art] Derive Key Pair
20,610,359 UART: [art] Store priv key in slot 0x5
23,073,267 UART: [art] Derive Key Pair - Done
23,086,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,495 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,999 UART: [art] PUB.X = FFD45D523401534C25B25E38C92CCA0CB95BE5095CFA8DCC4AE8C94546B76E2C3EB91AFD90ABC4059C28E1C113A91658
24,808,253 UART: [art] PUB.Y = B09E2A96D30C6BC95F2892EB2464E7FFCD20BBE9BDE59FD229404886F2472C8EB89A8A1D521850C003D82F3EFE095F2C
24,815,542 UART: [art] SIG.R = 086B5DC7C20EB1B4274E69985C3CA38693C46DD09FCD4F1393BED0CBD2E5AD68E1E85FAE2FF4C7EB8D4A00BA5FB72CEA
24,822,936 UART: [art] SIG.S = 3AC5134428726BEBD9826A59A1D909DA20442E166275EC97CAFDCEC8F1F64876DFE9170836985553052E8562DDFE55AC
25,801,777 UART: Caliptra RT
25,802,492 UART: [state] CFI Enabled
25,982,216 UART: [rt] RT listening for mailbox commands...
25,984,104 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,013,992 UART: [rt]cmd =0x414c544e, len=20
26,015,789 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,460,033 ready_for_fw is high
3,460,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,268,041 >>> mbox cmd response: success
18,553,828 UART:
18,554,215 UART: Running Caliptra FMC ...
18,555,324 UART:
18,555,473 UART: [state] CFI Enabled
18,621,305 UART: [fht] FMC Alias Private Key: 7
20,387,967 UART: [art] Extend RT PCRs Done
20,389,189 UART: [art] Lock RT PCRs Done
20,391,076 UART: [art] Populate DV Done
20,396,467 UART: [fht] FMC Alias Private Key: 7
20,398,178 UART: [art] Derive CDI
20,398,917 UART: [art] Store in slot 0x4
20,454,271 UART: [art] Derive Key Pair
20,455,267 UART: [art] Store priv key in slot 0x5
22,918,181 UART: [art] Derive Key Pair - Done
22,931,173 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,644,782 UART: [art] Erasing AUTHORITY.KEYID = 7
24,646,300 UART: [art] PUB.X = 37B2045FACF1F16F81E3DE4FFA4A6E58520BD84BAFDEBA86F047A1875D33CB0D994560D1B406249E6C81B100A554A9FA
24,653,557 UART: [art] PUB.Y = B2F9ED970BEA877032D3E6813221617BEF5182549500637ED9FE3419C62F73E35FA43910A20C7914969407DDDB3045DC
24,660,754 UART: [art] SIG.R = 666025BFC7CE7B50D814BE0177BAFECF188E3E81082558247F921A21A342FAA217E03C6F371B6AEBB5D6AE8272F8F8A9
24,668,156 UART: [art] SIG.S = F9D532C60D5B5339351639C23A8B5D33100B333F77BE17F4AC724D97831320591394F7CE3A78729E043990350BAE42AA
25,646,967 UART: Caliptra RT
25,647,665 UART: [state] CFI Enabled
25,843,310 UART: [rt] RT listening for mailbox commands...
25,845,191 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,874,866 UART: [rt]cmd =0x414c544e, len=20
25,876,618 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,541 UART:
192,910 UART: Running Caliptra ROM ...
194,039 UART:
603,970 UART: [state] CFI Enabled
612,462 UART: [state] LifecycleState = Unprovisioned
614,408 UART: [state] DebugLocked = No
617,360 UART: [state] WD Timer not started. Device not locked for debugging
621,891 UART: [kat] SHA2-256
801,491 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,286 UART: [kat] ++
812,891 UART: [kat] sha1
823,845 UART: [kat] SHA2-256
826,502 UART: [kat] SHA2-384
832,565 UART: [kat] SHA2-512-ACC
834,955 UART: [kat] ECC-384
3,276,582 UART: [kat] HMAC-384Kdf
3,288,300 UART: [kat] LMS
3,764,751 UART: [kat] --
3,767,909 UART: [cold-reset] ++
3,770,481 UART: [fht] FHT @ 0x50003400
3,782,243 UART: [idev] ++
3,782,811 UART: [idev] CDI.KEYID = 6
3,783,842 UART: [idev] SUBJECT.KEYID = 7
3,785,014 UART: [idev] UDS.KEYID = 0
3,785,951 ready_for_fw is high
3,786,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,118 UART: [idev] Erasing UDS.KEYID = 0
6,264,716 UART: [idev] Sha1 KeyId Algorithm
6,286,904 UART: [idev] --
6,290,985 UART: [ldev] ++
6,291,581 UART: [ldev] CDI.KEYID = 6
6,292,495 UART: [ldev] SUBJECT.KEYID = 5
6,293,708 UART: [ldev] AUTHORITY.KEYID = 7
6,294,938 UART: [ldev] FE.KEYID = 1
6,305,696 UART: [ldev] Erasing FE.KEYID = 1
8,781,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,479 UART: [ldev] --
10,575,484 UART: [fwproc] Wait for Commands...
10,577,902 UART: [fwproc] Recv command 0x46574c44
10,579,896 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,758 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,796 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,322 >>> mbox cmd response: success
14,547,842 UART: [afmc] ++
14,548,459 UART: [afmc] CDI.KEYID = 6
14,549,356 UART: [afmc] SUBJECT.KEYID = 7
14,550,628 UART: [afmc] AUTHORITY.KEYID = 5
17,052,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,776,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,778,939 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,794,761 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,810,789 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,826,372 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,850,494 UART: [afmc] --
18,853,680 UART: [cold-reset] --
18,859,650 UART: [state] Locking Datavault
18,865,924 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,646 UART: [state] Locking ICCM
18,869,532 UART: [exit] Launching FMC @ 0x40000130
18,877,938 UART:
18,878,177 UART: Running Caliptra FMC ...
18,879,278 UART:
18,879,441 UART: [state] CFI Enabled
18,887,707 UART: [fht] FMC Alias Private Key: 7
20,653,903 UART: [art] Extend RT PCRs Done
20,655,119 UART: [art] Lock RT PCRs Done
20,656,471 UART: [art] Populate DV Done
20,661,785 UART: [fht] FMC Alias Private Key: 7
20,663,430 UART: [art] Derive CDI
20,664,250 UART: [art] Store in slot 0x4
20,707,125 UART: [art] Derive Key Pair
20,708,165 UART: [art] Store priv key in slot 0x5
23,135,411 UART: [art] Derive Key Pair - Done
23,148,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,854,216 UART: [art] Erasing AUTHORITY.KEYID = 7
24,855,701 UART: [art] PUB.X = 9A123686D3913CAB048553163C3F174D4EFAE3B849BA05F3ABCF91BC531F0C4EA9DA75FA188D611422111B0213C49E46
24,862,997 UART: [art] PUB.Y = 9A7377DCD98226433673DABC189C5827D6E7952AE3AD89246B925A2D3BF390DE82766A1818B7E622045264ACC78A5336
24,870,228 UART: [art] SIG.R = 108AC0E881F14D7E01B2B2888D1F195BFE4C9E06ECEEE4E36A82F1EF0DD13D024A543EDA9BE919AAB9DBCE57D1A23E9F
24,877,670 UART: [art] SIG.S = 1758A79319B9D48B39612D2AAFF2E9DA56B85286E9CA133C585E4723D60B987EDD04FC27CE1ECB86673E867BA0EC9946
25,856,638 UART: Caliptra RT
25,857,349 UART: [state] CFI Enabled
25,989,765 UART: [rt] RT listening for mailbox commands...
25,991,653 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,021,441 UART: [rt]cmd =0x414c544e, len=20
26,023,258 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,783,003 ready_for_fw is high
3,783,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,440,945 >>> mbox cmd response: success
18,697,801 UART:
18,698,202 UART: Running Caliptra FMC ...
18,699,394 UART:
18,699,570 UART: [state] CFI Enabled
18,707,345 UART: [fht] FMC Alias Private Key: 7
20,473,662 UART: [art] Extend RT PCRs Done
20,474,885 UART: [art] Lock RT PCRs Done
20,476,351 UART: [art] Populate DV Done
20,481,828 UART: [fht] FMC Alias Private Key: 7
20,483,428 UART: [art] Derive CDI
20,484,267 UART: [art] Store in slot 0x4
20,526,975 UART: [art] Derive Key Pair
20,527,973 UART: [art] Store priv key in slot 0x5
22,954,591 UART: [art] Derive Key Pair - Done
22,967,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,813 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,311 UART: [art] PUB.X = 2C24B2E9438B872C15AD2B618E68DDB64E180F249E45529C92A931B54BE6FC93FAE03396EF6EABF21CB3456B7178DBAA
24,682,566 UART: [art] PUB.Y = 15457BDD98BA88A779B4331B8D8A13911739763C4D058FE3207158D33377B594738EFC686AFDBA796E74677F8C97D027
24,689,828 UART: [art] SIG.R = B6CDB3F4E54B1F964F77B3AA8BD23A8B3503B2B736D589121B706B6211D5CF45D200D74B73A830C567B1B73A2D56F78D
24,697,234 UART: [art] SIG.S = 3A245C8B33489729F01A4D997537492E5528090A9BA69326E713199E20C8B943CD265CF291F73746436188CD7EDE26B2
25,676,046 UART: Caliptra RT
25,676,752 UART: [state] CFI Enabled
25,808,945 UART: [rt] RT listening for mailbox commands...
25,810,833 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,840,742 UART: [rt]cmd =0x414c544e, len=20
25,842,486 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,981 UART:
192,363 UART: Running Caliptra ROM ...
193,464 UART:
193,607 UART: [state] CFI Enabled
266,056 UART: [state] LifecycleState = Unprovisioned
268,472 UART: [state] DebugLocked = No
269,866 UART: [state] WD Timer not started. Device not locked for debugging
274,604 UART: [kat] SHA2-256
464,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,256 UART: [kat] ++
475,743 UART: [kat] sha1
487,824 UART: [kat] SHA2-256
490,832 UART: [kat] SHA2-384
496,104 UART: [kat] SHA2-512-ACC
498,674 UART: [kat] ECC-384
2,947,373 UART: [kat] HMAC-384Kdf
2,972,197 UART: [kat] LMS
3,503,942 UART: [kat] --
3,509,779 UART: [cold-reset] ++
3,510,991 UART: [fht] FHT @ 0x50003400
3,521,894 UART: [idev] ++
3,522,600 UART: [idev] CDI.KEYID = 6
3,523,482 UART: [idev] SUBJECT.KEYID = 7
3,524,719 UART: [idev] UDS.KEYID = 0
3,525,803 ready_for_fw is high
3,526,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,098 UART: [idev] Erasing UDS.KEYID = 0
6,032,880 UART: [idev] Sha1 KeyId Algorithm
6,054,644 UART: [idev] --
6,059,277 UART: [ldev] ++
6,059,958 UART: [ldev] CDI.KEYID = 6
6,060,841 UART: [ldev] SUBJECT.KEYID = 5
6,062,045 UART: [ldev] AUTHORITY.KEYID = 7
6,063,284 UART: [ldev] FE.KEYID = 1
6,100,692 UART: [ldev] Erasing FE.KEYID = 1
8,607,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,592 UART: [ldev] --
10,415,249 UART: [fwproc] Wait for Commands...
10,418,261 UART: [fwproc] Recv command 0x46574c44
10,420,570 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,931 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,115,549 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,479 >>> mbox cmd response: success
14,681,003 UART: [afmc] ++
14,681,732 UART: [afmc] CDI.KEYID = 6
14,682,920 UART: [afmc] SUBJECT.KEYID = 7
14,684,409 UART: [afmc] AUTHORITY.KEYID = 5
17,216,254 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,600 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,650 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,840 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,767 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,386 UART: [afmc] --
19,012,713 UART: [cold-reset] --
19,015,659 UART: [state] Locking Datavault
19,019,615 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,760 UART: [state] Locking ICCM
19,023,424 UART: [exit] Launching FMC @ 0x40000130
19,032,101 UART:
19,032,334 UART: Running Caliptra FMC ...
19,033,433 UART:
19,033,590 UART: [state] CFI Enabled
19,095,036 UART: [fht] FMC Alias Private Key: 7
20,861,459 UART: [art] Extend RT PCRs Done
20,862,677 UART: [art] Lock RT PCRs Done
20,864,166 UART: [art] Populate DV Done
20,869,463 UART: [fht] FMC Alias Private Key: 7
20,871,068 UART: [art] Derive CDI
20,871,809 UART: [art] Store in slot 0x4
20,927,442 UART: [art] Derive Key Pair
20,928,480 UART: [art] Store priv key in slot 0x5
23,391,166 UART: [art] Derive Key Pair - Done
23,404,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,058 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,557 UART: [art] PUB.X = 4A6FC6B4F0E1034A36B88A3080D6A5DB3E95A933FE2F951C0B3C152E3281B2DF554A52FD4D5F0AC59C56BAA16201933A
25,125,835 UART: [art] PUB.Y = 12CCE2FBF9CA1DDFA21B4E1BDB5165DD4B45EA655F583B8912BBC5BD29145EA4CC450AA7118728CD87516753444AEDDD
25,133,097 UART: [art] SIG.R = 58E4907BA6EEBFFE421F0F5260CDCB85E75E0C39C60A3AB0F77E80F42EC84EA0C64A4AD0832574077C46853E183ECA88
25,140,517 UART: [art] SIG.S = 7C4EB883FE0297CCDBA321A606822FB7EB678C4182793041010458B60083BBF903E9C47A54EF7F032502ADD7B16CDAC3
26,119,183 UART: Caliptra RT
26,119,897 UART: [state] CFI Enabled
26,299,653 UART: [rt] RT listening for mailbox commands...
26,301,546 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,331,285 UART: [rt]cmd =0x414c544e, len=20
26,332,949 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,437,200 ready_for_fw is high
3,437,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,810,440 >>> mbox cmd response: success
19,105,483 UART:
19,105,904 UART: Running Caliptra FMC ...
19,107,040 UART:
19,107,237 UART: [state] CFI Enabled
19,175,285 UART: [fht] FMC Alias Private Key: 7
20,941,695 UART: [art] Extend RT PCRs Done
20,942,919 UART: [art] Lock RT PCRs Done
20,944,162 UART: [art] Populate DV Done
20,949,637 UART: [fht] FMC Alias Private Key: 7
20,951,174 UART: [art] Derive CDI
20,951,983 UART: [art] Store in slot 0x4
21,007,458 UART: [art] Derive Key Pair
21,008,506 UART: [art] Store priv key in slot 0x5
23,471,139 UART: [art] Derive Key Pair - Done
23,484,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,196,215 UART: [art] Erasing AUTHORITY.KEYID = 7
25,197,875 UART: [art] PUB.X = D12952280B4C99023A4042ECB30E8F0CCA6FD012C10D0C8CB2E521DDC641E854C35C5498753C39DF0B553BC2F1D05739
25,205,017 UART: [art] PUB.Y = E3B7DA4CA674EEC73BE3FE15FCCA58C6296A98D69428125E12633E1DD445ACD22B46AA97FAE32CD400A62056FCD6E265
25,212,236 UART: [art] SIG.R = 3DFC06D02977F2093471E040F126EC5F779B9E7B2A6891374789ACE394AFBF710373782155DCB9ADDAF3EBA799ADAFD6
25,219,685 UART: [art] SIG.S = 08B4B9A991917E59230B147981A91638C79549BCBCB7C5DB879A78CB231E2FEBFDE1FAF9D1A5A4A231E514FA475368BC
26,198,451 UART: Caliptra RT
26,199,166 UART: [state] CFI Enabled
26,380,153 UART: [rt] RT listening for mailbox commands...
26,382,047 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,412,008 UART: [rt]cmd =0x414c544e, len=20
26,413,536 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,515 UART:
192,877 UART: Running Caliptra ROM ...
193,979 UART:
603,716 UART: [state] CFI Enabled
620,090 UART: [state] LifecycleState = Unprovisioned
622,478 UART: [state] DebugLocked = No
624,164 UART: [state] WD Timer not started. Device not locked for debugging
628,143 UART: [kat] SHA2-256
818,041 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,852 UART: [kat] ++
829,580 UART: [kat] sha1
840,750 UART: [kat] SHA2-256
843,774 UART: [kat] SHA2-384
849,913 UART: [kat] SHA2-512-ACC
852,499 UART: [kat] ECC-384
3,293,519 UART: [kat] HMAC-384Kdf
3,306,113 UART: [kat] LMS
3,837,930 UART: [kat] --
3,841,750 UART: [cold-reset] ++
3,842,765 UART: [fht] FHT @ 0x50003400
3,853,533 UART: [idev] ++
3,854,170 UART: [idev] CDI.KEYID = 6
3,855,175 UART: [idev] SUBJECT.KEYID = 7
3,856,354 UART: [idev] UDS.KEYID = 0
3,857,282 ready_for_fw is high
3,857,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,416 UART: [idev] Erasing UDS.KEYID = 0
6,337,404 UART: [idev] Sha1 KeyId Algorithm
6,360,472 UART: [idev] --
6,365,280 UART: [ldev] ++
6,365,965 UART: [ldev] CDI.KEYID = 6
6,366,881 UART: [ldev] SUBJECT.KEYID = 5
6,368,040 UART: [ldev] AUTHORITY.KEYID = 7
6,369,273 UART: [ldev] FE.KEYID = 1
6,378,298 UART: [ldev] Erasing FE.KEYID = 1
8,852,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,672 UART: [ldev] --
10,642,790 UART: [fwproc] Wait for Commands...
10,644,292 UART: [fwproc] Recv command 0x46574c44
10,646,603 UART: [fwproc] Recv'd Img size: 118548 bytes
14,142,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,424 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,023 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,898 >>> mbox cmd response: success
14,910,615 UART: [afmc] ++
14,911,349 UART: [afmc] CDI.KEYID = 6
14,912,552 UART: [afmc] SUBJECT.KEYID = 7
14,914,002 UART: [afmc] AUTHORITY.KEYID = 5
17,421,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,354 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,417 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,567 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,534 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,213,215 UART: [afmc] --
19,217,094 UART: [cold-reset] --
19,219,847 UART: [state] Locking Datavault
19,224,848 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,012 UART: [state] Locking ICCM
19,229,668 UART: [exit] Launching FMC @ 0x40000130
19,238,318 UART:
19,238,560 UART: Running Caliptra FMC ...
19,239,662 UART:
19,239,826 UART: [state] CFI Enabled
19,247,607 UART: [fht] FMC Alias Private Key: 7
21,013,795 UART: [art] Extend RT PCRs Done
21,015,038 UART: [art] Lock RT PCRs Done
21,016,381 UART: [art] Populate DV Done
21,021,973 UART: [fht] FMC Alias Private Key: 7
21,023,624 UART: [art] Derive CDI
21,024,366 UART: [art] Store in slot 0x4
21,067,066 UART: [art] Derive Key Pair
21,068,095 UART: [art] Store priv key in slot 0x5
23,494,917 UART: [art] Derive Key Pair - Done
23,507,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,084 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,606 UART: [art] PUB.X = 07A30617A963C9A5E8D19F5C3DEB19170F05CAF501986AB9637B3DBA3AC7B1A5CF8DB03B9393DBF03ABD2B4F9C6421A1
25,222,882 UART: [art] PUB.Y = D7E1CABE3B1D632FE3A0B5BFAC537D56C5967A65E3525A41FD53DC2420C45BC0D1280C210F87638A914CCB2323158F78
25,230,152 UART: [art] SIG.R = CC24E9A8C3D7C0AAD948B38A072DBEDE736D1A688CC7F5D961B2659CD3920E3E407B8AEB5603468156A406D8447B54EB
25,237,525 UART: [art] SIG.S = AC0E4BC6D75112B18D8A515B256A9602F8C0346BCF0B9FB40EB314E95D2D9DFF0029D6D54EB93C4A03C85CC3957AF516
26,216,312 UART: Caliptra RT
26,217,008 UART: [state] CFI Enabled
26,349,141 UART: [rt] RT listening for mailbox commands...
26,351,033 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,380,865 UART: [rt]cmd =0x414c544e, len=20
26,382,303 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,758,478 ready_for_fw is high
3,758,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,057,511 >>> mbox cmd response: success
19,306,456 UART:
19,306,871 UART: Running Caliptra FMC ...
19,308,027 UART:
19,308,200 UART: [state] CFI Enabled
19,316,234 UART: [fht] FMC Alias Private Key: 7
21,082,752 UART: [art] Extend RT PCRs Done
21,084,040 UART: [art] Lock RT PCRs Done
21,085,437 UART: [art] Populate DV Done
21,090,952 UART: [fht] FMC Alias Private Key: 7
21,092,509 UART: [art] Derive CDI
21,093,247 UART: [art] Store in slot 0x4
21,135,903 UART: [art] Derive Key Pair
21,136,904 UART: [art] Store priv key in slot 0x5
23,563,862 UART: [art] Derive Key Pair - Done
23,577,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,283,326 UART: [art] Erasing AUTHORITY.KEYID = 7
25,284,866 UART: [art] PUB.X = 9EB874728F26BAF478C5D43D4965CB6B228FBCC532E2EA7A7FDEAD0289EB9393BB83C9D9E36AD0884974A91ED436CFA6
25,292,144 UART: [art] PUB.Y = F53EEC8EC3B4C15EE31505ECC802F3F7B0781480579091F9D2ED090989ED8226AB1E372AA831796C7F22E056D9F78675
25,299,386 UART: [art] SIG.R = 984BEB753D0247E8294AF91D58E26A7EB9E284ABA2A42D143C3541CE8E9462334BB10497C94CA7904EA6AA9608CE32E3
25,306,771 UART: [art] SIG.S = 1A84DA9C3A17F4CBAD8B6E35105DF8810451B74CA87A45A5AAC60E2E661F267807219747DA95F93B2F95CD73F29A9C89
26,286,506 UART: Caliptra RT
26,287,217 UART: [state] CFI Enabled
26,419,578 UART: [rt] RT listening for mailbox commands...
26,421,508 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,451,390 UART: [rt]cmd =0x414c544e, len=20
26,452,972 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,621 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,345 UART: [kat] SHA2-256
882,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,391 UART: [kat] ++
886,543 UART: [kat] sha1
890,955 UART: [kat] SHA2-256
892,893 UART: [kat] SHA2-384
895,766 UART: [kat] SHA2-512-ACC
897,667 UART: [kat] ECC-384
903,048 UART: [kat] HMAC-384Kdf
907,656 UART: [kat] LMS
1,475,852 UART: [kat] --
1,476,925 UART: [cold-reset] ++
1,477,339 UART: [fht] Storing FHT @ 0x50003400
1,480,246 UART: [idev] ++
1,480,414 UART: [idev] CDI.KEYID = 6
1,480,774 UART: [idev] SUBJECT.KEYID = 7
1,481,198 UART: [idev] UDS.KEYID = 0
1,481,543 ready_for_fw is high
1,481,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,362 UART: [idev] Erasing UDS.KEYID = 0
1,505,972 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,704 UART: [idev] --
1,515,549 UART: [ldev] ++
1,515,717 UART: [ldev] CDI.KEYID = 6
1,516,080 UART: [ldev] SUBJECT.KEYID = 5
1,516,506 UART: [ldev] AUTHORITY.KEYID = 7
1,516,969 UART: [ldev] FE.KEYID = 1
1,522,247 UART: [ldev] Erasing FE.KEYID = 1
1,547,226 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,556 UART: [ldev] --
1,587,045 UART: [fwproc] Waiting for Commands...
1,587,890 UART: [fwproc] Received command 0x46574c44
1,588,681 UART: [fwproc] Received Image of size 118548 bytes
2,934,673 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,793 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,011 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,424 >>> mbox cmd response: success
3,134,440 UART: [afmc] ++
3,134,608 UART: [afmc] CDI.KEYID = 6
3,134,970 UART: [afmc] SUBJECT.KEYID = 7
3,135,395 UART: [afmc] AUTHORITY.KEYID = 5
3,170,766 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,110 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,890 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,599 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,482 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,165 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,865 UART: [afmc] --
3,213,773 UART: [cold-reset] --
3,214,617 UART: [state] Locking Datavault
3,215,582 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,186 UART: [state] Locking ICCM
3,216,688 UART: [exit] Launching FMC @ 0x40000130
3,222,018 UART:
3,222,034 UART: Running Caliptra FMC ...
3,222,442 UART:
3,222,496 UART: [state] CFI Enabled
3,233,196 UART: [fht] FMC Alias Private Key: 7
3,351,794 UART: [art] Extend RT PCRs Done
3,352,222 UART: [art] Lock RT PCRs Done
3,353,760 UART: [art] Populate DV Done
3,361,989 UART: [fht] FMC Alias Private Key: 7
3,363,043 UART: [art] Derive CDI
3,363,323 UART: [art] Store in slot 0x4
3,448,883 UART: [art] Derive Key Pair
3,449,243 UART: [art] Store priv key in slot 0x5
3,462,608 UART: [art] Derive Key Pair - Done
3,477,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,294 UART: [art] PUB.X = A53104CA0EEA9EDCC7E9F115E268DE14A8B5498119BF551318A277C356757837FCD347FB2EECC71C1CCA54E4D540D2B9
3,500,072 UART: [art] PUB.Y = 8922E9262ECFC83B6A56C16EF2AF4B6F36BD1E9275040E8B4D73C5DDC3035F52EE82AEA0AEB9EDF566A1F5AD4E04FD89
3,507,034 UART: [art] SIG.R = 599BF76EC37C129412CBA35C6454736BE384ED3F3746EFFE3D7B376F7C5295E470BBDC96D673FF072959C6FA3ABD88E0
3,513,813 UART: [art] SIG.S = B60BA46E9811EE213E2E94668F84DF38743919C916F94F332C6C87D709A96DF307A32A8E10A8D88CCCBF6F4B05119BB7
3,537,365 UART: Caliptra RT
3,537,616 UART: [state] CFI Enabled
3,657,576 UART: [rt] RT listening for mailbox commands...
3,658,246 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,910 UART: [rt]cmd =0x414c544e, len=20
3,689,278 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,015 ready_for_fw is high
1,362,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,760 >>> mbox cmd response: success
3,040,259 UART:
3,040,275 UART: Running Caliptra FMC ...
3,040,683 UART:
3,040,737 UART: [state] CFI Enabled
3,051,121 UART: [fht] FMC Alias Private Key: 7
3,170,243 UART: [art] Extend RT PCRs Done
3,170,671 UART: [art] Lock RT PCRs Done
3,172,007 UART: [art] Populate DV Done
3,180,330 UART: [fht] FMC Alias Private Key: 7
3,181,434 UART: [art] Derive CDI
3,181,714 UART: [art] Store in slot 0x4
3,267,038 UART: [art] Derive Key Pair
3,267,398 UART: [art] Store priv key in slot 0x5
3,280,499 UART: [art] Derive Key Pair - Done
3,295,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,478 UART: [art] PUB.X = 97828AC664C66BF9050A9B209199BA738C1B4FC0AB1E027D9C3707381F5D1BF2B2B4331111284B080D37CF6A18C8EB33
3,318,232 UART: [art] PUB.Y = F2DC78D1D98B8A3FB05132AB2D4B79B2F0ECE12D682A93BD31DADA4C4949055A4940949D48CE84C61E19C57A9AD2DB6E
3,325,197 UART: [art] SIG.R = 2E0F2190B6A01F3CBC7FD0206F098DF9289EC8A0CE28C616E5B4EF21EF515CB88F71EF7009EB2B2CDE689DA40F71E592
3,331,973 UART: [art] SIG.S = 0D7156425AA8F848525DB505F6175349AEAB6AEAD881DC4CF7F153C60F16D95F1E8DA59DD9007B42E404C72C3CCE17D0
3,355,637 UART: Caliptra RT
3,355,888 UART: [state] CFI Enabled
3,476,119 UART: [rt] RT listening for mailbox commands...
3,476,789 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,679 UART: [rt]cmd =0x414c544e, len=20
3,507,793 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
87,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,500 UART: [kat] SHA2-256
882,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,546 UART: [kat] ++
886,698 UART: [kat] sha1
890,980 UART: [kat] SHA2-256
892,918 UART: [kat] SHA2-384
895,535 UART: [kat] SHA2-512-ACC
897,436 UART: [kat] ECC-384
902,905 UART: [kat] HMAC-384Kdf
907,519 UART: [kat] LMS
1,475,715 UART: [kat] --
1,476,588 UART: [cold-reset] ++
1,477,116 UART: [fht] Storing FHT @ 0x50003400
1,480,003 UART: [idev] ++
1,480,171 UART: [idev] CDI.KEYID = 6
1,480,531 UART: [idev] SUBJECT.KEYID = 7
1,480,955 UART: [idev] UDS.KEYID = 0
1,481,300 ready_for_fw is high
1,481,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,003 UART: [idev] Erasing UDS.KEYID = 0
1,506,179 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,745 UART: [idev] --
1,515,780 UART: [ldev] ++
1,515,948 UART: [ldev] CDI.KEYID = 6
1,516,311 UART: [ldev] SUBJECT.KEYID = 5
1,516,737 UART: [ldev] AUTHORITY.KEYID = 7
1,517,200 UART: [ldev] FE.KEYID = 1
1,522,810 UART: [ldev] Erasing FE.KEYID = 1
1,548,907 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,815 UART: [ldev] --
1,588,264 UART: [fwproc] Waiting for Commands...
1,589,063 UART: [fwproc] Received command 0x46574c44
1,589,854 UART: [fwproc] Received Image of size 118548 bytes
2,933,918 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,818 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,036 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,329 >>> mbox cmd response: success
3,134,401 UART: [afmc] ++
3,134,569 UART: [afmc] CDI.KEYID = 6
3,134,931 UART: [afmc] SUBJECT.KEYID = 7
3,135,356 UART: [afmc] AUTHORITY.KEYID = 5
3,171,075 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,361 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,188,141 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,850 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,733 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,416 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,290 UART: [afmc] --
3,214,332 UART: [cold-reset] --
3,215,074 UART: [state] Locking Datavault
3,216,421 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,025 UART: [state] Locking ICCM
3,217,563 UART: [exit] Launching FMC @ 0x40000130
3,222,893 UART:
3,222,909 UART: Running Caliptra FMC ...
3,223,317 UART:
3,223,460 UART: [state] CFI Enabled
3,234,358 UART: [fht] FMC Alias Private Key: 7
3,353,072 UART: [art] Extend RT PCRs Done
3,353,500 UART: [art] Lock RT PCRs Done
3,354,606 UART: [art] Populate DV Done
3,362,555 UART: [fht] FMC Alias Private Key: 7
3,363,523 UART: [art] Derive CDI
3,363,803 UART: [art] Store in slot 0x4
3,450,023 UART: [art] Derive Key Pair
3,450,383 UART: [art] Store priv key in slot 0x5
3,464,014 UART: [art] Derive Key Pair - Done
3,478,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,660 UART: [art] PUB.X = 4A545D30C46697ED7C493DC0AA2031690EA8025AE513DEC9B161680FD5763D3FA4E2CE8D97D8CB548B3296616864AEA4
3,501,427 UART: [art] PUB.Y = D3D4DEC8A25EAD9BADEAE8F551C2254EE3DA17473304803FF438FE128811331B5C5732A4F96B9BBC7D8C7F123FBB1ABE
3,508,396 UART: [art] SIG.R = B8F3DE5E1F7E7223168F7988AF2189FA80395F57C5968AD9E10E36C00906EF8E6392B9003B433322DC7D2DB38A07BC50
3,515,134 UART: [art] SIG.S = FF1F1192B1B01285DF1CFAAA263A2BB45FED40AF0848E6D0094C17360F16EEE9389C131CDEA5CBDAB0926C4C1B3BD644
3,538,665 UART: Caliptra RT
3,539,008 UART: [state] CFI Enabled
3,659,209 UART: [rt] RT listening for mailbox commands...
3,659,879 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,805 UART: [rt]cmd =0x414c544e, len=20
3,691,193 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,532 ready_for_fw is high
1,363,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,229 >>> mbox cmd response: success
3,042,798 UART:
3,042,814 UART: Running Caliptra FMC ...
3,043,222 UART:
3,043,365 UART: [state] CFI Enabled
3,054,031 UART: [fht] FMC Alias Private Key: 7
3,173,417 UART: [art] Extend RT PCRs Done
3,173,845 UART: [art] Lock RT PCRs Done
3,175,379 UART: [art] Populate DV Done
3,183,636 UART: [fht] FMC Alias Private Key: 7
3,184,640 UART: [art] Derive CDI
3,184,920 UART: [art] Store in slot 0x4
3,270,592 UART: [art] Derive Key Pair
3,270,952 UART: [art] Store priv key in slot 0x5
3,285,035 UART: [art] Derive Key Pair - Done
3,299,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,270 UART: [art] PUB.X = 527CD58AF11E53C91865F1E2F1CE4D842C5E01435A20308980A81BBA0D876BCF2E2D7FB85FD16A2FF155A6EF903B4208
3,323,041 UART: [art] PUB.Y = 6B9FA52C8CFDFAF47722EBB2ED2720AA3CCC4FAA68BD69D4F1FD98D09D95D78DF5232B92ED2FD7F485ADDB8AC0BE4339
3,330,025 UART: [art] SIG.R = C3BAFFA0D2DFC1214523878C3D828CCFC41243049512040A26BC213858E0027E436BAC77F4BFBA155257725E6B84A76A
3,336,787 UART: [art] SIG.S = B5DD6410E7AE97EE382DC41BBA15ABBFB32DF926235D71CE9242DD7E9A33B4CD3B58A9BF36BF26CF64E6569C9D97ADF3
3,360,927 UART: Caliptra RT
3,361,270 UART: [state] CFI Enabled
3,481,347 UART: [rt] RT listening for mailbox commands...
3,482,017 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,855 UART: [rt]cmd =0x414c544e, len=20
3,513,099 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,254 UART: [kat] ++
895,406 UART: [kat] sha1
899,556 UART: [kat] SHA2-256
901,496 UART: [kat] SHA2-384
904,307 UART: [kat] SHA2-512-ACC
906,208 UART: [kat] ECC-384
915,875 UART: [kat] HMAC-384Kdf
920,559 UART: [kat] LMS
1,168,871 UART: [kat] --
1,169,702 UART: [cold-reset] ++
1,170,158 UART: [fht] FHT @ 0x50003400
1,172,838 UART: [idev] ++
1,173,006 UART: [idev] CDI.KEYID = 6
1,173,367 UART: [idev] SUBJECT.KEYID = 7
1,173,792 UART: [idev] UDS.KEYID = 0
1,174,138 ready_for_fw is high
1,174,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,193 UART: [idev] Sha1 KeyId Algorithm
1,206,883 UART: [idev] --
1,207,978 UART: [ldev] ++
1,208,146 UART: [ldev] CDI.KEYID = 6
1,208,510 UART: [ldev] SUBJECT.KEYID = 5
1,208,937 UART: [ldev] AUTHORITY.KEYID = 7
1,209,400 UART: [ldev] FE.KEYID = 1
1,214,198 UART: [ldev] Erasing FE.KEYID = 1
1,240,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,334 UART: [ldev] --
1,279,717 UART: [fwproc] Wait for Commands...
1,280,382 UART: [fwproc] Recv command 0x46574c44
1,281,115 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,003 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,178 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,513 >>> mbox cmd response: success
2,824,677 UART: [afmc] ++
2,824,845 UART: [afmc] CDI.KEYID = 6
2,825,208 UART: [afmc] SUBJECT.KEYID = 7
2,825,634 UART: [afmc] AUTHORITY.KEYID = 5
2,861,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,163 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,873 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,754 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,455 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,204 UART: [afmc] --
2,905,055 UART: [cold-reset] --
2,905,883 UART: [state] Locking Datavault
2,906,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,572 UART: [state] Locking ICCM
2,908,038 UART: [exit] Launching FMC @ 0x40000130
2,913,368 UART:
2,913,384 UART: Running Caliptra FMC ...
2,913,792 UART:
2,913,846 UART: [state] CFI Enabled
2,924,572 UART: [fht] FMC Alias Private Key: 7
3,043,572 UART: [art] Extend RT PCRs Done
3,044,000 UART: [art] Lock RT PCRs Done
3,045,920 UART: [art] Populate DV Done
3,054,421 UART: [fht] FMC Alias Private Key: 7
3,055,571 UART: [art] Derive CDI
3,055,851 UART: [art] Store in slot 0x4
3,141,420 UART: [art] Derive Key Pair
3,141,780 UART: [art] Store priv key in slot 0x5
3,155,144 UART: [art] Derive Key Pair - Done
3,170,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,541 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,306 UART: [art] PUB.X = 6AA00665E174063130C1021BD86D54A2249FE2529D83329768348318FEBD48993628A65A58E846A1FBDCF3F033C0AE50
3,193,061 UART: [art] PUB.Y = B38F2F928C08DA33D8BA6D43B740457F7B3F2A50641100E48448B83B3706447870891FC95C2DEACC847D5D24218E74A3
3,199,981 UART: [art] SIG.R = EA7E6E800D53F62EAA9828AF8F4A5491974E8E9EBC94B87F71CEC8D160DB1230EAB77F4054666D83A488C8BAD13CC454
3,206,762 UART: [art] SIG.S = 2FC81A3B8822C585A18DDBA5A447535303587386F2A7D6868075D53DF8DA12369816E99D96D323A7A0BD19EAF8CAA78A
3,230,731 UART: Caliptra RT
3,230,982 UART: [state] CFI Enabled
3,350,759 UART: [rt] RT listening for mailbox commands...
3,351,429 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,187 UART: [rt]cmd =0x414c544e, len=20
3,382,571 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,418 ready_for_fw is high
1,058,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,820 >>> mbox cmd response: success
2,740,999 UART:
2,741,015 UART: Running Caliptra FMC ...
2,741,423 UART:
2,741,477 UART: [state] CFI Enabled
2,751,851 UART: [fht] FMC Alias Private Key: 7
2,870,269 UART: [art] Extend RT PCRs Done
2,870,697 UART: [art] Lock RT PCRs Done
2,872,363 UART: [art] Populate DV Done
2,880,634 UART: [fht] FMC Alias Private Key: 7
2,881,796 UART: [art] Derive CDI
2,882,076 UART: [art] Store in slot 0x4
2,967,973 UART: [art] Derive Key Pair
2,968,333 UART: [art] Store priv key in slot 0x5
2,981,741 UART: [art] Derive Key Pair - Done
2,996,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,162 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,927 UART: [art] PUB.X = D4C9C0A7E29A036FD081ECBA4D70A210098C62785FD176934CD3251797ADEFAACFC4BC3A78D03BA583DA122D79DE3759
3,019,707 UART: [art] PUB.Y = E126709AF9FD525B0A9D1657CBF15620E4A6793CA5322A5E68DD41DA5A67AE422E1AC8231CBB74C375E2E5C6750745D0
3,026,659 UART: [art] SIG.R = 1D75783FF75B6B2D80D21AAA139F7CFC0F56C92AD83C6E2FC249FD88CF3F80BB34C2692812781E4A28F5BAFF7C60DF50
3,033,444 UART: [art] SIG.S = A604ED3037A6DF9C77AEC21BFCF4B2E35A6E1322683C0782E8DA36485E6D9383ACB4912715049201DBE15E7FDE695C90
3,057,412 UART: Caliptra RT
3,057,663 UART: [state] CFI Enabled
3,176,820 UART: [rt] RT listening for mailbox commands...
3,177,490 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,626 UART: [rt]cmd =0x414c544e, len=20
3,208,942 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,565 UART: [kat] ++
895,717 UART: [kat] sha1
900,017 UART: [kat] SHA2-256
901,957 UART: [kat] SHA2-384
904,784 UART: [kat] SHA2-512-ACC
906,685 UART: [kat] ECC-384
916,426 UART: [kat] HMAC-384Kdf
920,948 UART: [kat] LMS
1,169,260 UART: [kat] --
1,170,195 UART: [cold-reset] ++
1,170,739 UART: [fht] FHT @ 0x50003400
1,173,177 UART: [idev] ++
1,173,345 UART: [idev] CDI.KEYID = 6
1,173,706 UART: [idev] SUBJECT.KEYID = 7
1,174,131 UART: [idev] UDS.KEYID = 0
1,174,477 ready_for_fw is high
1,174,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,234 UART: [idev] Erasing UDS.KEYID = 0
1,199,550 UART: [idev] Sha1 KeyId Algorithm
1,208,224 UART: [idev] --
1,209,229 UART: [ldev] ++
1,209,397 UART: [ldev] CDI.KEYID = 6
1,209,761 UART: [ldev] SUBJECT.KEYID = 5
1,210,188 UART: [ldev] AUTHORITY.KEYID = 7
1,210,651 UART: [ldev] FE.KEYID = 1
1,216,149 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,703 UART: [ldev] --
1,282,104 UART: [fwproc] Wait for Commands...
1,282,819 UART: [fwproc] Recv command 0x46574c44
1,283,552 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,560 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,735 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,116 >>> mbox cmd response: success
2,828,300 UART: [afmc] ++
2,828,468 UART: [afmc] CDI.KEYID = 6
2,828,831 UART: [afmc] SUBJECT.KEYID = 7
2,829,257 UART: [afmc] AUTHORITY.KEYID = 5
2,864,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,048 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,758 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,639 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,340 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,013 UART: [afmc] --
2,907,914 UART: [cold-reset] --
2,908,834 UART: [state] Locking Datavault
2,910,059 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,663 UART: [state] Locking ICCM
2,911,265 UART: [exit] Launching FMC @ 0x40000130
2,916,595 UART:
2,916,611 UART: Running Caliptra FMC ...
2,917,019 UART:
2,917,162 UART: [state] CFI Enabled
2,927,896 UART: [fht] FMC Alias Private Key: 7
3,046,954 UART: [art] Extend RT PCRs Done
3,047,382 UART: [art] Lock RT PCRs Done
3,048,768 UART: [art] Populate DV Done
3,056,861 UART: [fht] FMC Alias Private Key: 7
3,057,909 UART: [art] Derive CDI
3,058,189 UART: [art] Store in slot 0x4
3,143,880 UART: [art] Derive Key Pair
3,144,240 UART: [art] Store priv key in slot 0x5
3,157,542 UART: [art] Derive Key Pair - Done
3,172,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,314 UART: [art] PUB.X = 079131AB38E5A7F933E86F978925DD49D25890D93659F69725D967D50C455975AA3552D1D1CAC71297050B93200C1FD8
3,195,059 UART: [art] PUB.Y = 79238DE1DCC7A2B1E6F156D5FEADD6DF69AF15FFF785520CD4C89A8D53A6C723DB14208043D25A321FD1297AB8A75B52
3,202,022 UART: [art] SIG.R = 67A68805329995E1A69ACF503424BED5C4C419ECD2FC6001F5B7822C8E8BBCD9A9F731104790E2D088F20FA85E19952A
3,208,787 UART: [art] SIG.S = 994D8BDA8EC00B071D6EAD295F6B6BAE033CF8F2B3EF320C6B43119AF0F6A2A5FD74230F142AC97A59E4A413B516F9D3
3,233,344 UART: Caliptra RT
3,233,687 UART: [state] CFI Enabled
3,354,490 UART: [rt] RT listening for mailbox commands...
3,355,160 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,846 UART: [rt]cmd =0x414c544e, len=20
3,385,914 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,267 ready_for_fw is high
1,060,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,133 >>> mbox cmd response: success
2,741,896 UART:
2,741,912 UART: Running Caliptra FMC ...
2,742,320 UART:
2,742,463 UART: [state] CFI Enabled
2,753,067 UART: [fht] FMC Alias Private Key: 7
2,872,297 UART: [art] Extend RT PCRs Done
2,872,725 UART: [art] Lock RT PCRs Done
2,874,159 UART: [art] Populate DV Done
2,882,514 UART: [fht] FMC Alias Private Key: 7
2,883,486 UART: [art] Derive CDI
2,883,766 UART: [art] Store in slot 0x4
2,969,397 UART: [art] Derive Key Pair
2,969,757 UART: [art] Store priv key in slot 0x5
2,983,649 UART: [art] Derive Key Pair - Done
2,998,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,749 UART: [art] PUB.X = D18A09D361F3B9FB7EDCE920CDFF0E54F4E1ED1BA14298AF47608F2BC072E5317F74638DF1B41834AC7C70CC13E74482
3,021,527 UART: [art] PUB.Y = B41ECBE1B521A83482F9638A1BF30AC8601FABD4E3B7E39110D291CA1393A9E827BC2531F4C547AA87F7BD69732FF7FB
3,028,488 UART: [art] SIG.R = F567FC68A02689C42C88BB9568100353C5FDDCB952BDFEDC21C3B566A32BFFB03C625BEF44A520FA78E9A9E3FE38E7B2
3,035,275 UART: [art] SIG.S = BC2E793A30B97D813403ABF4EF2FAE91B1AC72F69D019A95DF5884671FD4F86EEA158FB520431C370C9B8084E688954B
3,058,924 UART: Caliptra RT
3,059,267 UART: [state] CFI Enabled
3,178,885 UART: [rt] RT listening for mailbox commands...
3,179,555 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,529 UART: [rt]cmd =0x414c544e, len=20
3,210,895 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
893,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,449 UART: [kat] ++
897,601 UART: [kat] sha1
901,821 UART: [kat] SHA2-256
903,761 UART: [kat] SHA2-384
906,640 UART: [kat] SHA2-512-ACC
908,541 UART: [kat] ECC-384
918,234 UART: [kat] HMAC-384Kdf
922,772 UART: [kat] LMS
1,171,100 UART: [kat] --
1,171,935 UART: [cold-reset] ++
1,172,367 UART: [fht] FHT @ 0x50003400
1,174,946 UART: [idev] ++
1,175,114 UART: [idev] CDI.KEYID = 6
1,175,474 UART: [idev] SUBJECT.KEYID = 7
1,175,898 UART: [idev] UDS.KEYID = 0
1,176,243 ready_for_fw is high
1,176,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,460 UART: [idev] Erasing UDS.KEYID = 0
1,200,375 UART: [idev] Sha1 KeyId Algorithm
1,208,993 UART: [idev] --
1,210,055 UART: [ldev] ++
1,210,223 UART: [ldev] CDI.KEYID = 6
1,210,586 UART: [ldev] SUBJECT.KEYID = 5
1,211,012 UART: [ldev] AUTHORITY.KEYID = 7
1,211,475 UART: [ldev] FE.KEYID = 1
1,216,865 UART: [ldev] Erasing FE.KEYID = 1
1,243,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,627 UART: [ldev] --
1,283,142 UART: [fwproc] Wait for Commands...
1,283,942 UART: [fwproc] Recv command 0x46574c44
1,284,670 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,024 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,194 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,371 >>> mbox cmd response: success
2,829,615 UART: [afmc] ++
2,829,783 UART: [afmc] CDI.KEYID = 6
2,830,145 UART: [afmc] SUBJECT.KEYID = 7
2,830,570 UART: [afmc] AUTHORITY.KEYID = 5
2,865,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,198 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,946 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,655 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,538 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,239 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,921 UART: [afmc] --
2,908,839 UART: [cold-reset] --
2,909,773 UART: [state] Locking Datavault
2,910,946 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,550 UART: [state] Locking ICCM
2,912,080 UART: [exit] Launching FMC @ 0x40000130
2,917,410 UART:
2,917,426 UART: Running Caliptra FMC ...
2,917,834 UART:
2,917,888 UART: [state] CFI Enabled
2,928,442 UART: [fht] FMC Alias Private Key: 7
3,047,424 UART: [art] Extend RT PCRs Done
3,047,852 UART: [art] Lock RT PCRs Done
3,049,482 UART: [art] Populate DV Done
3,057,341 UART: [fht] FMC Alias Private Key: 7
3,058,425 UART: [art] Derive CDI
3,058,705 UART: [art] Store in slot 0x4
3,144,760 UART: [art] Derive Key Pair
3,145,120 UART: [art] Store priv key in slot 0x5
3,158,538 UART: [art] Derive Key Pair - Done
3,173,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,555 UART: [art] PUB.X = D607AF9A399DD8F98CF6D348D1B9873A9535D6F36CD3F8FA5AC8F7E39343AEC47E53BCA1CDDE5FDCE55BC92DEF8A4A9A
3,196,354 UART: [art] PUB.Y = A4403A1D43A8FA7A11E319FFD05B41365FD5B0A8F6235BF83BCBE652DDA2C0CF83982B957EF88164B66C417B46D8B73B
3,203,318 UART: [art] SIG.R = 2E7B58E58C2114AA8812EBE6223E1F3ED50BA9BE526AFE3A491E9844D866C6469DFBC82C45710121346378D20ACCECDC
3,210,091 UART: [art] SIG.S = 6B5D9B7E2F07F9DA8679A13104475DAF788B98FB26C88CD39A87ACDAD27D40B5343A73A0A1F26F043FAF6E83746B5A56
3,233,756 UART: Caliptra RT
3,234,007 UART: [state] CFI Enabled
3,354,123 UART: [rt] RT listening for mailbox commands...
3,354,793 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,817 UART: [rt]cmd =0x414c544e, len=20
3,385,959 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,389 ready_for_fw is high
1,060,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,858 >>> mbox cmd response: success
2,743,163 UART:
2,743,179 UART: Running Caliptra FMC ...
2,743,587 UART:
2,743,641 UART: [state] CFI Enabled
2,753,683 UART: [fht] FMC Alias Private Key: 7
2,872,217 UART: [art] Extend RT PCRs Done
2,872,645 UART: [art] Lock RT PCRs Done
2,874,329 UART: [art] Populate DV Done
2,882,470 UART: [fht] FMC Alias Private Key: 7
2,883,400 UART: [art] Derive CDI
2,883,680 UART: [art] Store in slot 0x4
2,969,623 UART: [art] Derive Key Pair
2,969,983 UART: [art] Store priv key in slot 0x5
2,983,113 UART: [art] Derive Key Pair - Done
2,998,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,094 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,859 UART: [art] PUB.X = DB6D23610CD649CE815B1C941F6FCFDAE547CDBAA8541D359D3697FC1CA60D9AC95CE87BEFF592E8635251343127F3E6
3,021,639 UART: [art] PUB.Y = C48E4F95163F9F98331D9F7F2038A02AB4240CCA6EF44AAEBCA9BCA321E318EDACBE3BAFA39406342518D28EAD98A3FA
3,028,607 UART: [art] SIG.R = C335E35B20EBF0AE92E950F539BD79B808054DC722AE2C019896350B906939DB7C740239FFC774BCB9E6591B23B7786C
3,035,364 UART: [art] SIG.S = 532542078EBC97E6E349E36042124E31B98D09BE06E8815D933370A8A98E178F708E5770FC4F3AF300B606D434A08087
3,058,732 UART: Caliptra RT
3,058,983 UART: [state] CFI Enabled
3,178,608 UART: [rt] RT listening for mailbox commands...
3,179,278 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,040 UART: [rt]cmd =0x414c544e, len=20
3,210,184 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,905 UART: [state] LifecycleState = Unprovisioned
86,560 UART: [state] DebugLocked = No
87,050 UART: [state] WD Timer not started. Device not locked for debugging
88,323 UART: [kat] SHA2-256
893,973 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,098 UART: [kat] ++
898,250 UART: [kat] sha1
902,534 UART: [kat] SHA2-256
904,474 UART: [kat] SHA2-384
907,087 UART: [kat] SHA2-512-ACC
908,988 UART: [kat] ECC-384
919,013 UART: [kat] HMAC-384Kdf
923,713 UART: [kat] LMS
1,172,041 UART: [kat] --
1,172,984 UART: [cold-reset] ++
1,173,550 UART: [fht] FHT @ 0x50003400
1,176,177 UART: [idev] ++
1,176,345 UART: [idev] CDI.KEYID = 6
1,176,705 UART: [idev] SUBJECT.KEYID = 7
1,177,129 UART: [idev] UDS.KEYID = 0
1,177,474 ready_for_fw is high
1,177,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,145 UART: [idev] Erasing UDS.KEYID = 0
1,202,140 UART: [idev] Sha1 KeyId Algorithm
1,210,484 UART: [idev] --
1,211,494 UART: [ldev] ++
1,211,662 UART: [ldev] CDI.KEYID = 6
1,212,025 UART: [ldev] SUBJECT.KEYID = 5
1,212,451 UART: [ldev] AUTHORITY.KEYID = 7
1,212,914 UART: [ldev] FE.KEYID = 1
1,218,048 UART: [ldev] Erasing FE.KEYID = 1
1,244,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,196 UART: [ldev] --
1,284,631 UART: [fwproc] Wait for Commands...
1,285,239 UART: [fwproc] Recv command 0x46574c44
1,285,967 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,061 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,231 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,490 >>> mbox cmd response: success
2,830,680 UART: [afmc] ++
2,830,848 UART: [afmc] CDI.KEYID = 6
2,831,210 UART: [afmc] SUBJECT.KEYID = 7
2,831,635 UART: [afmc] AUTHORITY.KEYID = 5
2,867,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,153 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,862 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,745 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,446 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,342 UART: [afmc] --
2,911,360 UART: [cold-reset] --
2,912,110 UART: [state] Locking Datavault
2,913,507 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,111 UART: [state] Locking ICCM
2,914,565 UART: [exit] Launching FMC @ 0x40000130
2,919,895 UART:
2,919,911 UART: Running Caliptra FMC ...
2,920,319 UART:
2,920,462 UART: [state] CFI Enabled
2,930,788 UART: [fht] FMC Alias Private Key: 7
3,049,194 UART: [art] Extend RT PCRs Done
3,049,622 UART: [art] Lock RT PCRs Done
3,051,124 UART: [art] Populate DV Done
3,059,465 UART: [fht] FMC Alias Private Key: 7
3,060,569 UART: [art] Derive CDI
3,060,849 UART: [art] Store in slot 0x4
3,146,730 UART: [art] Derive Key Pair
3,147,090 UART: [art] Store priv key in slot 0x5
3,160,676 UART: [art] Derive Key Pair - Done
3,175,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,789 UART: [art] PUB.X = DF2A4F88E81F44A4ADB894BBE0D485BB08F66F07BF2DFA642F3BF02D309F1024D11FB05715E19329E1FC04CAF3881CCA
3,198,570 UART: [art] PUB.Y = 622B5F0E52AEBFF424AEA719B4F3FDE25BB32A176A0088E0288910F94AF69275BCFA508E1C332D651852539BEBE9193F
3,205,505 UART: [art] SIG.R = ABF2A8A16171D6D28EAE41937BAC4E67C00CAD76160BDF8C7C4896DAEA5D4E962D8620986926B6CBA83F69C15FBD2287
3,212,285 UART: [art] SIG.S = 0BC63434234FE1F6FCE576632AC7852E13D85ABAC6366459DA4D1C793CB78A2A1A64124E0F87A18EB34CDD4D05D7F47B
3,235,724 UART: Caliptra RT
3,236,067 UART: [state] CFI Enabled
3,356,062 UART: [rt] RT listening for mailbox commands...
3,356,732 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,796 UART: [rt]cmd =0x414c544e, len=20
3,388,108 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,324 ready_for_fw is high
1,061,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,797 >>> mbox cmd response: success
2,742,364 UART:
2,742,380 UART: Running Caliptra FMC ...
2,742,788 UART:
2,742,931 UART: [state] CFI Enabled
2,753,879 UART: [fht] FMC Alias Private Key: 7
2,872,819 UART: [art] Extend RT PCRs Done
2,873,247 UART: [art] Lock RT PCRs Done
2,874,773 UART: [art] Populate DV Done
2,883,006 UART: [fht] FMC Alias Private Key: 7
2,883,956 UART: [art] Derive CDI
2,884,236 UART: [art] Store in slot 0x4
2,970,187 UART: [art] Derive Key Pair
2,970,547 UART: [art] Store priv key in slot 0x5
2,983,291 UART: [art] Derive Key Pair - Done
2,998,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,339 UART: [art] PUB.X = ADB0ADD5A7BAFC429A805FA9B2EB361860EA0FE962BD3848C48EA549B9096BD29587AE9BC908B526F0A1B0D584C38332
3,021,116 UART: [art] PUB.Y = FC72BDD78694159AE25BADA86BC9CD11C0CC1D2D1E92B84D47431C11196687CF48BDAB77E254CDF76DC56A3BFB7A4E4C
3,028,090 UART: [art] SIG.R = 9DBE189B2CBA25452D339C977087F73FC0D0659F8BC18A5DF130B04D2C0FF7C1C033F974BB36133448C9D01D018E58AE
3,034,862 UART: [art] SIG.S = 84D660D81D6934CE7ABFB0882ED518433371E421A6D798EADA0F697D79F6F531836785024096F233E9090297A2C3C259
3,058,690 UART: Caliptra RT
3,059,033 UART: [state] CFI Enabled
3,179,089 UART: [rt] RT listening for mailbox commands...
3,179,759 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,803 UART: [rt]cmd =0x414c544e, len=20
3,211,337 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
Truncated 3992 bytes from beginning
EE5B2D241C0658C744D3C7FB6407
23,602,267 UART: [afmc] --
23,606,451 UART: [cold-reset] --
23,610,709 UART: [state] Locking Datavault
23,615,963 UART: [state] Locking PCR0, PCR1 and PCR31
23,617,715 UART: [state] Locking ICCM
23,619,376 UART: [exit] Launching FMC @ 0x40000130
23,627,773 UART:
23,628,007 UART: Running Caliptra FMC ...
23,629,115 UART:
23,629,274 UART: [state] CFI Enabled
23,693,821 UART: [fht] FMC Alias Private Key: 7
26,034,011 UART: [art] Extend RT PCRs Done
26,035,237 UART: [art] Lock RT PCRs Done
26,036,871 UART: [art] Populate DV Done
26,042,339 UART: [fht] FMC Alias Private Key: 7
26,043,942 UART: [art] Derive CDI
26,044,761 UART: [art] Store in slot 0x4
26,101,560 UART: [art] Derive Key Pair
26,102,625 UART: [art] Store priv key in slot 0x5
29,394,880 UART: [art] Derive Key Pair - Done
29,407,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,696,253 UART: [art] Erasing AUTHORITY.KEYID = 7
31,697,793 UART: [art] PUB.X = A2DC525A595A36649CDBAAE0F9A7FA9B62467DA766D98A9CE3E9A334BA88E1ECE7F0D34783D56036BD8BCB976E7FF807
31,705,067 UART: [art] PUB.Y = 606E859681B56DE6A0024FB32DED6FA5681E40DD0E42D9F11BFEDC943AA44332E77B5202A31D72B8038EA0B3DECB8922
31,712,325 UART: [art] SIG.R = 2FDB1051B8326C9AD56908234A7A96DEEE0D04E1BEBD4A44EA6011D8033942C1B8720F8F424A35B13615B9DF1AB4C5A1
31,719,735 UART: [art] SIG.S = D1B49837B0081EF14C1F8AEEF2E7EC0D4DB9E74D9E870660A95FCD6F5CCFADE1B3A56C71D59DAE2308EC458F4E290862
33,024,589 UART: Caliptra RT
33,025,318 UART: [state] CFI Enabled
33,212,831 UART: [rt] RT listening for mailbox commands...
33,244,675 UART: [rt]cmd =0x44504543, len=92
39,006,349 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,103 writing to cptra_bootfsm_go
190,182 UART:
190,498 UART: Running Caliptra ROM ...
191,613 UART:
191,773 UART: [state] CFI Enabled
252,663 UART: [state] LifecycleState = Unprovisioned
254,591 UART: [state] DebugLocked = No
255,917 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
260,179 UART: [kat] SHA2-256
429,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
440,381 UART: [kat] ++
440,856 UART: [kat] sha1
452,371 UART: [kat] SHA2-256
455,028 UART: [kat] SHA2-384
460,953 UART: [kat] SHA2-512-ACC
463,318 UART: [kat] ECC-384
2,755,423 UART: [kat] HMAC-384Kdf
2,788,122 UART: [kat] LMS
3,978,440 UART: [kat] --
3,983,851 UART: [cold-reset] ++
3,984,684 UART: [fht] Storing FHT @ 0x50003400
3,994,755 UART: [idev] ++
3,995,331 UART: [idev] CDI.KEYID = 6
3,996,240 UART: [idev] SUBJECT.KEYID = 7
3,997,487 UART: [idev] UDS.KEYID = 0
3,998,537 ready_for_fw is high
3,998,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,147,721 UART: [idev] Erasing UDS.KEYID = 0
7,335,739 UART: [idev] Using Sha1 for KeyId Algorithm
7,357,116 UART: [idev] --
7,361,418 UART: [ldev] ++
7,361,995 UART: [ldev] CDI.KEYID = 6
7,362,938 UART: [ldev] SUBJECT.KEYID = 5
7,364,209 UART: [ldev] AUTHORITY.KEYID = 7
7,365,379 UART: [ldev] FE.KEYID = 1
7,410,129 UART: [ldev] Erasing FE.KEYID = 1
10,746,479 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,057,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,072,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,087,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,101,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,120,740 UART: [ldev] --
13,126,013 UART: [fwproc] Waiting for Commands...
13,128,548 UART: [fwproc] Received command 0x46574c44
13,130,737 UART: [fwproc] Received Image of size 118548 bytes
17,237,085 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,480 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,380,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,708,856 >>> mbox cmd response: success
17,709,231 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,712,466 UART: [afmc] ++
17,713,087 UART: [afmc] CDI.KEYID = 6
17,713,969 UART: [afmc] SUBJECT.KEYID = 7
17,715,234 UART: [afmc] AUTHORITY.KEYID = 5
21,081,738 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,380,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,382,397 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,396,797 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,411,551 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,425,983 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,446,965 UART: [afmc] --
23,450,236 UART: [cold-reset] --
23,453,934 UART: [state] Locking Datavault
23,458,107 UART: [state] Locking PCR0, PCR1 and PCR31
23,459,860 UART: [state] Locking ICCM
23,461,853 UART: [exit] Launching FMC @ 0x40000130
23,470,219 UART:
23,470,456 UART: Running Caliptra FMC ...
23,471,558 UART:
23,471,713 UART: [state] CFI Enabled
23,540,637 UART: [fht] FMC Alias Private Key: 7
25,880,534 UART: [art] Extend RT PCRs Done
25,881,770 UART: [art] Lock RT PCRs Done
25,883,190 UART: [art] Populate DV Done
25,888,606 UART: [fht] FMC Alias Private Key: 7
25,890,201 UART: [art] Derive CDI
25,891,015 UART: [art] Store in slot 0x4
25,949,770 UART: [art] Derive Key Pair
25,950,814 UART: [art] Store priv key in slot 0x5
29,243,715 UART: [art] Derive Key Pair - Done
29,256,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,402 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,945 UART: [art] PUB.X = A2DC525A595A36649CDBAAE0F9A7FA9B62467DA766D98A9CE3E9A334BA88E1ECE7F0D34783D56036BD8BCB976E7FF807
31,553,217 UART: [art] PUB.Y = 606E859681B56DE6A0024FB32DED6FA5681E40DD0E42D9F11BFEDC943AA44332E77B5202A31D72B8038EA0B3DECB8922
31,560,466 UART: [art] SIG.R = 2FDB1051B8326C9AD56908234A7A96DEEE0D04E1BEBD4A44EA6011D8033942C1B8720F8F424A35B13615B9DF1AB4C5A1
31,567,872 UART: [art] SIG.S = D1B49837B0081EF14C1F8AEEF2E7EC0D4DB9E74D9E870660A95FCD6F5CCFADE1B3A56C71D59DAE2308EC458F4E290862
32,872,645 UART: Caliptra RT
32,873,366 UART: [state] CFI Enabled
33,051,769 UART: [rt] RT listening for mailbox commands...
33,084,184 UART: [rt]cmd =0x4d454153, len=108
33,103,253 >>> mbox cmd response data (12 bytes)
33,103,841 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,134,487 UART: [rt]cmd =0x44504543, len=92
38,897,540 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,035 writing to cptra_bootfsm_go
190,145 UART:
190,443 UART: Running Caliptra ROM ...
191,523 UART:
191,673 UART: [state] CFI Enabled
253,913 UART: [state] LifecycleState = Unprovisioned
255,886 UART: [state] DebugLocked = No
257,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
262,317 UART: [kat] SHA2-256
432,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
442,527 UART: [kat] ++
443,050 UART: [kat] sha1
453,592 UART: [kat] SHA2-256
456,249 UART: [kat] SHA2-384
463,373 UART: [kat] SHA2-512-ACC
465,750 UART: [kat] ECC-384
2,757,478 UART: [kat] HMAC-384Kdf
2,769,434 UART: [kat] LMS
3,959,771 UART: [kat] --
3,964,601 UART: [cold-reset] ++
3,965,754 UART: [fht] Storing FHT @ 0x50003400
3,977,243 UART: [idev] ++
3,977,804 UART: [idev] CDI.KEYID = 6
3,978,689 UART: [idev] SUBJECT.KEYID = 7
3,980,007 UART: [idev] UDS.KEYID = 0
3,980,912 ready_for_fw is high
3,981,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,130,077 UART: [idev] Erasing UDS.KEYID = 0
7,315,018 UART: [idev] Using Sha1 for KeyId Algorithm
7,337,040 UART: [idev] --
7,340,819 UART: [ldev] ++
7,341,384 UART: [ldev] CDI.KEYID = 6
7,342,318 UART: [ldev] SUBJECT.KEYID = 5
7,343,586 UART: [ldev] AUTHORITY.KEYID = 7
7,344,819 UART: [ldev] FE.KEYID = 1
7,390,799 UART: [ldev] Erasing FE.KEYID = 1
10,722,718 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,037,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,081,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,762 UART: [ldev] --
13,104,837 UART: [fwproc] Waiting for Commands...
13,107,908 UART: [fwproc] Received command 0x46574c44
13,110,105 UART: [fwproc] Received Image of size 118548 bytes
17,216,283 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,299,041 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,372,228 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,701,312 >>> mbox cmd response: success
17,701,783 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,705,491 UART: [afmc] ++
17,706,088 UART: [afmc] CDI.KEYID = 6
17,707,112 UART: [afmc] SUBJECT.KEYID = 7
17,708,273 UART: [afmc] AUTHORITY.KEYID = 5
21,082,923 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,379,862 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,382,123 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,396,567 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,411,317 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,425,694 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,447,084 UART: [afmc] --
23,451,700 UART: [cold-reset] --
23,455,886 UART: [state] Locking Datavault
23,461,441 UART: [state] Locking PCR0, PCR1 and PCR31
23,463,205 UART: [state] Locking ICCM
23,465,088 UART: [exit] Launching FMC @ 0x40000130
23,473,444 UART:
23,473,709 UART: Running Caliptra FMC ...
23,474,815 UART:
23,474,976 UART: [state] CFI Enabled
23,539,704 UART: [fht] FMC Alias Private Key: 7
25,880,271 UART: [art] Extend RT PCRs Done
25,881,509 UART: [art] Lock RT PCRs Done
25,882,860 UART: [art] Populate DV Done
25,888,117 UART: [fht] FMC Alias Private Key: 7
25,889,602 UART: [art] Derive CDI
25,890,340 UART: [art] Store in slot 0x4
25,947,844 UART: [art] Derive Key Pair
25,948,888 UART: [art] Store priv key in slot 0x5
29,241,484 UART: [art] Derive Key Pair - Done
29,254,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,542,460 UART: [art] Erasing AUTHORITY.KEYID = 7
31,543,997 UART: [art] PUB.X = A2DC525A595A36649CDBAAE0F9A7FA9B62467DA766D98A9CE3E9A334BA88E1ECE7F0D34783D56036BD8BCB976E7FF807
31,551,862 UART: [art] PUB.Y = 606E859681B56DE6A0024FB32DED6FA5681E40DD0E42D9F11BFEDC943AA44332E77B5202A31D72B8038EA0B3DECB8922
31,558,520 UART: [art] SIG.R = 2FDB1051B8326C9AD56908234A7A96DEEE0D04E1BEBD4A44EA6011D8033942C1B8720F8F424A35B13615B9DF1AB4C5A1
31,565,945 UART: [art] SIG.S = D1B49837B0081EF14C1F8AEEF2E7EC0D4DB9E74D9E870660A95FCD6F5CCFADE1B3A56C71D59DAE2308EC458F4E290862
32,871,405 UART: Caliptra RT
32,872,135 UART: [state] CFI Enabled
33,048,225 UART: [rt] RT listening for mailbox commands...
33,080,514 UART: [rt]cmd =0x44504543, len=96
33,112,630 >>> mbox cmd response data (56 bytes)
33,113,564 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,144,157 UART: [rt]cmd =0x44504543, len=92
38,894,237 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,888 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,850,074 >>> mbox cmd response data (12 bytes)
12,851,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,125,045 >>> mbox cmd response: success
18,125,533 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,820,854 UART:
23,821,258 UART: Running Caliptra FMC ...
23,822,531 UART:
23,822,700 UART: [state] CFI Enabled
23,889,028 UART: [fht] FMC Alias Private Key: 7
26,229,799 UART: [art] Extend RT PCRs Done
26,231,029 UART: [art] Lock RT PCRs Done
26,232,555 UART: [art] Populate DV Done
26,238,078 UART: [fht] FMC Alias Private Key: 7
26,239,572 UART: [art] Derive CDI
26,240,339 UART: [art] Store in slot 0x4
26,297,787 UART: [art] Derive Key Pair
26,298,825 UART: [art] Store priv key in slot 0x5
29,590,735 UART: [art] Derive Key Pair - Done
29,603,629 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,892,207 UART: [art] Erasing AUTHORITY.KEYID = 7
31,893,737 UART: [art] PUB.X = 87838BD9A4156A1F7ADEC47989C9087D15EFB53FB0066A9BD913FF822BB99A3FC5EB9EAC9DFEFCBD470B4794D6EFDE5D
31,900,994 UART: [art] PUB.Y = ADF204F35B7582C136306F2170D5206B59776C400FDD8C542442BD46E431BB3110C8BA46ABBE2F00730DB9796663A139
31,908,213 UART: [art] SIG.R = E7DAD2309708F5ACAEEE4E541812004C0F9013B539E2598AD19D069F0A280D8EF838BB17A7779BBE25B2392849D4FF7B
31,915,556 UART: [art] SIG.S = C0340F996E6CAEA4F291C194D48146D05CF2A5855223A43F4C64134E091C534834DA1253C5D4DF437A3C8DC23CC01DD1
33,221,436 UART: Caliptra RT
33,222,159 UART: [state] CFI Enabled
33,430,508 UART: [rt] RT listening for mailbox commands...
33,462,945 UART: [rt]cmd =0x44504543, len=92
39,222,679 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,087 writing to cptra_bootfsm_go
3,795,435 ready_for_fw is high
3,795,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,953,307 >>> mbox cmd response: success
17,953,733 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,645,256 UART:
23,645,617 UART: Running Caliptra FMC ...
23,646,683 UART:
23,646,845 UART: [state] CFI Enabled
23,715,051 UART: [fht] FMC Alias Private Key: 7
26,056,485 UART: [art] Extend RT PCRs Done
26,057,796 UART: [art] Lock RT PCRs Done
26,059,483 UART: [art] Populate DV Done
26,064,685 UART: [fht] FMC Alias Private Key: 7
26,066,332 UART: [art] Derive CDI
26,067,149 UART: [art] Store in slot 0x4
26,124,470 UART: [art] Derive Key Pair
26,125,509 UART: [art] Store priv key in slot 0x5
29,418,368 UART: [art] Derive Key Pair - Done
29,431,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,720,461 UART: [art] Erasing AUTHORITY.KEYID = 7
31,721,967 UART: [art] PUB.X = 87838BD9A4156A1F7ADEC47989C9087D15EFB53FB0066A9BD913FF822BB99A3FC5EB9EAC9DFEFCBD470B4794D6EFDE5D
31,729,302 UART: [art] PUB.Y = ADF204F35B7582C136306F2170D5206B59776C400FDD8C542442BD46E431BB3110C8BA46ABBE2F00730DB9796663A139
31,736,484 UART: [art] SIG.R = E7DAD2309708F5ACAEEE4E541812004C0F9013B539E2598AD19D069F0A280D8EF838BB17A7779BBE25B2392849D4FF7B
31,743,896 UART: [art] SIG.S = C0340F996E6CAEA4F291C194D48146D05CF2A5855223A43F4C64134E091C534834DA1253C5D4DF437A3C8DC23CC01DD1
33,049,196 UART: Caliptra RT
33,049,915 UART: [state] CFI Enabled
33,227,193 UART: [rt] RT listening for mailbox commands...
33,259,255 UART: [rt]cmd =0x4d454153, len=108
33,278,052 >>> mbox cmd response data (12 bytes)
33,278,576 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,308,891 UART: [rt]cmd =0x44504543, len=92
39,074,398 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,062 writing to cptra_bootfsm_go
3,775,128 ready_for_fw is high
3,775,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,948,847 >>> mbox cmd response: success
17,949,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,640,041 UART:
23,640,401 UART: Running Caliptra FMC ...
23,641,446 UART:
23,641,595 UART: [state] CFI Enabled
23,710,787 UART: [fht] FMC Alias Private Key: 7
26,051,370 UART: [art] Extend RT PCRs Done
26,052,600 UART: [art] Lock RT PCRs Done
26,054,364 UART: [art] Populate DV Done
26,059,987 UART: [fht] FMC Alias Private Key: 7
26,061,605 UART: [art] Derive CDI
26,062,343 UART: [art] Store in slot 0x4
26,119,029 UART: [art] Derive Key Pair
26,120,027 UART: [art] Store priv key in slot 0x5
29,412,572 UART: [art] Derive Key Pair - Done
29,425,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,715,215 UART: [art] Erasing AUTHORITY.KEYID = 7
31,716,756 UART: [art] PUB.X = 87838BD9A4156A1F7ADEC47989C9087D15EFB53FB0066A9BD913FF822BB99A3FC5EB9EAC9DFEFCBD470B4794D6EFDE5D
31,723,964 UART: [art] PUB.Y = ADF204F35B7582C136306F2170D5206B59776C400FDD8C542442BD46E431BB3110C8BA46ABBE2F00730DB9796663A139
31,731,219 UART: [art] SIG.R = E7DAD2309708F5ACAEEE4E541812004C0F9013B539E2598AD19D069F0A280D8EF838BB17A7779BBE25B2392849D4FF7B
31,738,592 UART: [art] SIG.S = C0340F996E6CAEA4F291C194D48146D05CF2A5855223A43F4C64134E091C534834DA1253C5D4DF437A3C8DC23CC01DD1
33,043,195 UART: Caliptra RT
33,043,904 UART: [state] CFI Enabled
33,220,089 UART: [rt] RT listening for mailbox commands...
33,251,998 UART: [rt]cmd =0x44504543, len=96
33,283,371 >>> mbox cmd response data (56 bytes)
33,284,278 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,314,928 UART: [rt]cmd =0x44504543, len=92
39,066,063 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.99s
Truncated 3992 bytes from beginning
EE5B2D241C0658C744D3C7FB6407
23,733,536 UART: [afmc] --
23,736,872 UART: [cold-reset] --
23,740,136 UART: [state] Locking Datavault
23,746,723 UART: [state] Locking PCR0, PCR1 and PCR31
23,748,470 UART: [state] Locking ICCM
23,750,807 UART: [exit] Launching FMC @ 0x40000130
23,759,200 UART:
23,759,448 UART: Running Caliptra FMC ...
23,760,547 UART:
23,760,700 UART: [state] CFI Enabled
23,768,634 UART: [fht] FMC Alias Private Key: 7
26,109,298 UART: [art] Extend RT PCRs Done
26,110,516 UART: [art] Lock RT PCRs Done
26,112,028 UART: [art] Populate DV Done
26,117,438 UART: [fht] FMC Alias Private Key: 7
26,119,130 UART: [art] Derive CDI
26,119,936 UART: [art] Store in slot 0x4
26,162,423 UART: [art] Derive Key Pair
26,163,456 UART: [art] Store priv key in slot 0x5
29,405,975 UART: [art] Derive Key Pair - Done
29,419,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,699,147 UART: [art] Erasing AUTHORITY.KEYID = 7
31,700,652 UART: [art] PUB.X = 8043A94694A485B0FE077F4BFE7E11B8343B9A73ADA2BE96B7C9BCC016CF4BE5DBD6AAEAC6251AAC678408BCB6BC361A
31,707,971 UART: [art] PUB.Y = 80E848C9EF88FEE4ECE0DEEE2498849324380FB349BF3CE438718DA66EF0F77162E7B238AABDC554CDEF51165A1FB163
31,715,200 UART: [art] SIG.R = 2665CC1322A60FD0A86AFE1D1D49440105C675F0618272B9D93937A1D159E34613CF5D4D69CDE476A5D1E4D98EC581F1
31,722,601 UART: [art] SIG.S = 1D20158613A1C552A3B8A61F6E9EBA9E76EFFA3598D173DC6E74EF2180146F2DE2EC89798C1DCCE3E1D62D155F41B7F7
33,028,146 UART: Caliptra RT
33,028,859 UART: [state] CFI Enabled
33,174,615 UART: [rt] RT listening for mailbox commands...
33,206,574 UART: [rt]cmd =0x44504543, len=92
38,888,251 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,078 writing to cptra_bootfsm_go
190,178 UART:
190,473 UART: Running Caliptra ROM ...
191,499 UART:
1,618,545 UART: [state] CFI Enabled
1,635,095 UART: [state] LifecycleState = Unprovisioned
1,637,014 UART: [state] DebugLocked = No
1,638,858 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,643,261 UART: [kat] SHA2-256
1,813,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,823,531 UART: [kat] ++
1,824,061 UART: [kat] sha1
1,834,879 UART: [kat] SHA2-256
1,837,598 UART: [kat] SHA2-384
1,843,166 UART: [kat] SHA2-512-ACC
1,845,574 UART: [kat] ECC-384
4,130,117 UART: [kat] HMAC-384Kdf
4,142,693 UART: [kat] LMS
5,332,766 UART: [kat] --
5,337,918 UART: [cold-reset] ++
5,340,560 UART: [fht] Storing FHT @ 0x50003400
5,353,167 UART: [idev] ++
5,353,804 UART: [idev] CDI.KEYID = 6
5,354,727 UART: [idev] SUBJECT.KEYID = 7
5,355,974 UART: [idev] UDS.KEYID = 0
5,356,893 ready_for_fw is high
5,357,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,505,846 UART: [idev] Erasing UDS.KEYID = 0
8,648,115 UART: [idev] Using Sha1 for KeyId Algorithm
8,670,205 UART: [idev] --
8,674,197 UART: [ldev] ++
8,674,817 UART: [ldev] CDI.KEYID = 6
8,675,829 UART: [ldev] SUBJECT.KEYID = 5
8,676,985 UART: [ldev] AUTHORITY.KEYID = 7
8,678,210 UART: [ldev] FE.KEYID = 1
8,687,606 UART: [ldev] Erasing FE.KEYID = 1
11,977,702 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,270,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,284,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,299,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,313,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,333,361 UART: [ldev] --
14,338,209 UART: [fwproc] Waiting for Commands...
14,341,115 UART: [fwproc] Received command 0x46574c44
14,343,305 UART: [fwproc] Received Image of size 118548 bytes
18,448,034 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,523,146 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
18,596,278 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
18,925,560 >>> mbox cmd response: success
18,925,936 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,929,755 UART: [afmc] ++
18,930,321 UART: [afmc] CDI.KEYID = 6
18,931,275 UART: [afmc] SUBJECT.KEYID = 7
18,932,536 UART: [afmc] AUTHORITY.KEYID = 5
22,248,464 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,543,702 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,545,954 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
24,560,401 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
24,575,120 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
24,589,496 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
24,611,683 UART: [afmc] --
24,615,589 UART: [cold-reset] --
24,620,141 UART: [state] Locking Datavault
24,625,160 UART: [state] Locking PCR0, PCR1 and PCR31
24,626,851 UART: [state] Locking ICCM
24,628,235 UART: [exit] Launching FMC @ 0x40000130
24,636,618 UART:
24,636,849 UART: Running Caliptra FMC ...
24,637,942 UART:
24,638,092 UART: [state] CFI Enabled
24,646,379 UART: [fht] FMC Alias Private Key: 7
26,986,266 UART: [art] Extend RT PCRs Done
26,987,493 UART: [art] Lock RT PCRs Done
26,988,950 UART: [art] Populate DV Done
26,994,139 UART: [fht] FMC Alias Private Key: 7
26,995,618 UART: [art] Derive CDI
26,996,370 UART: [art] Store in slot 0x4
27,039,115 UART: [art] Derive Key Pair
27,040,109 UART: [art] Store priv key in slot 0x5
30,282,168 UART: [art] Derive Key Pair - Done
30,294,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
32,574,722 UART: [art] Erasing AUTHORITY.KEYID = 7
32,576,227 UART: [art] PUB.X = 8043A94694A485B0FE077F4BFE7E11B8343B9A73ADA2BE96B7C9BCC016CF4BE5DBD6AAEAC6251AAC678408BCB6BC361A
32,583,526 UART: [art] PUB.Y = 80E848C9EF88FEE4ECE0DEEE2498849324380FB349BF3CE438718DA66EF0F77162E7B238AABDC554CDEF51165A1FB163
32,590,817 UART: [art] SIG.R = 2665CC1322A60FD0A86AFE1D1D49440105C675F0618272B9D93937A1D159E34613CF5D4D69CDE476A5D1E4D98EC581F1
32,598,203 UART: [art] SIG.S = 1D20158613A1C552A3B8A61F6E9EBA9E76EFFA3598D173DC6E74EF2180146F2DE2EC89798C1DCCE3E1D62D155F41B7F7
33,903,192 UART: Caliptra RT
33,903,923 UART: [state] CFI Enabled
34,037,470 UART: [rt] RT listening for mailbox commands...
34,069,494 UART: [rt]cmd =0x4d454153, len=108
34,088,098 >>> mbox cmd response data (12 bytes)
34,088,672 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,119,101 UART: [rt]cmd =0x44504543, len=92
39,800,721 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,058 writing to cptra_bootfsm_go
190,145 UART:
190,440 UART: Running Caliptra ROM ...
191,490 UART:
1,909,525 UART: [state] CFI Enabled
1,926,462 UART: [state] LifecycleState = Unprovisioned
1,928,377 UART: [state] DebugLocked = No
1,930,837 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,936,069 UART: [kat] SHA2-256
2,105,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,116,340 UART: [kat] ++
2,116,817 UART: [kat] sha1
2,127,628 UART: [kat] SHA2-256
2,130,353 UART: [kat] SHA2-384
2,135,928 UART: [kat] SHA2-512-ACC
2,138,299 UART: [kat] ECC-384
4,420,680 UART: [kat] HMAC-384Kdf
4,431,413 UART: [kat] LMS
5,621,517 UART: [kat] --
5,624,241 UART: [cold-reset] ++
5,626,877 UART: [fht] Storing FHT @ 0x50003400
5,638,203 UART: [idev] ++
5,638,768 UART: [idev] CDI.KEYID = 6
5,639,674 UART: [idev] SUBJECT.KEYID = 7
5,640,931 UART: [idev] UDS.KEYID = 0
5,641,937 ready_for_fw is high
5,642,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,791,003 UART: [idev] Erasing UDS.KEYID = 0
8,927,802 UART: [idev] Using Sha1 for KeyId Algorithm
8,949,564 UART: [idev] --
8,953,335 UART: [ldev] ++
8,953,893 UART: [ldev] CDI.KEYID = 6
8,954,822 UART: [ldev] SUBJECT.KEYID = 5
8,956,080 UART: [ldev] AUTHORITY.KEYID = 7
8,957,285 UART: [ldev] FE.KEYID = 1
8,970,919 UART: [ldev] Erasing FE.KEYID = 1
12,259,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,550,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,565,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,580,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,594,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,614,547 UART: [ldev] --
14,618,613 UART: [fwproc] Waiting for Commands...
14,620,753 UART: [fwproc] Received command 0x46574c44
14,622,982 UART: [fwproc] Received Image of size 118548 bytes
18,727,446 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,805,733 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
18,878,914 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,207,994 >>> mbox cmd response: success
19,208,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,212,649 UART: [afmc] ++
19,213,217 UART: [afmc] CDI.KEYID = 6
19,214,093 UART: [afmc] SUBJECT.KEYID = 7
19,215,488 UART: [afmc] AUTHORITY.KEYID = 5
22,530,537 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,824,350 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,826,620 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
24,841,054 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
24,855,746 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
24,870,220 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
24,891,332 UART: [afmc] --
24,894,751 UART: [cold-reset] --
24,899,991 UART: [state] Locking Datavault
24,905,083 UART: [state] Locking PCR0, PCR1 and PCR31
24,906,842 UART: [state] Locking ICCM
24,909,014 UART: [exit] Launching FMC @ 0x40000130
24,917,401 UART:
24,917,628 UART: Running Caliptra FMC ...
24,918,647 UART:
24,918,786 UART: [state] CFI Enabled
24,926,821 UART: [fht] FMC Alias Private Key: 7
27,266,645 UART: [art] Extend RT PCRs Done
27,267,888 UART: [art] Lock RT PCRs Done
27,269,810 UART: [art] Populate DV Done
27,275,163 UART: [fht] FMC Alias Private Key: 7
27,276,864 UART: [art] Derive CDI
27,277,597 UART: [art] Store in slot 0x4
27,319,921 UART: [art] Derive Key Pair
27,320,954 UART: [art] Store priv key in slot 0x5
30,563,072 UART: [art] Derive Key Pair - Done
30,575,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
32,855,734 UART: [art] Erasing AUTHORITY.KEYID = 7
32,857,234 UART: [art] PUB.X = 8043A94694A485B0FE077F4BFE7E11B8343B9A73ADA2BE96B7C9BCC016CF4BE5DBD6AAEAC6251AAC678408BCB6BC361A
32,864,532 UART: [art] PUB.Y = 80E848C9EF88FEE4ECE0DEEE2498849324380FB349BF3CE438718DA66EF0F77162E7B238AABDC554CDEF51165A1FB163
32,871,814 UART: [art] SIG.R = 2665CC1322A60FD0A86AFE1D1D49440105C675F0618272B9D93937A1D159E34613CF5D4D69CDE476A5D1E4D98EC581F1
32,879,209 UART: [art] SIG.S = 1D20158613A1C552A3B8A61F6E9EBA9E76EFFA3598D173DC6E74EF2180146F2DE2EC89798C1DCCE3E1D62D155F41B7F7
34,185,018 UART: Caliptra RT
34,185,722 UART: [state] CFI Enabled
34,320,784 UART: [rt] RT listening for mailbox commands...
34,352,938 UART: [rt]cmd =0x44504543, len=96
34,384,656 >>> mbox cmd response data (56 bytes)
34,385,495 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,416,043 UART: [rt]cmd =0x44504543, len=92
40,097,928 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 6.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
4,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,059,352 >>> mbox cmd response data (12 bytes)
13,060,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,328,612 >>> mbox cmd response: success
18,329,080 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,964,966 UART:
23,965,364 UART: Running Caliptra FMC ...
23,966,558 UART:
23,966,731 UART: [state] CFI Enabled
23,974,828 UART: [fht] FMC Alias Private Key: 7
26,314,263 UART: [art] Extend RT PCRs Done
26,315,481 UART: [art] Lock RT PCRs Done
26,317,103 UART: [art] Populate DV Done
26,322,519 UART: [fht] FMC Alias Private Key: 7
26,324,117 UART: [art] Derive CDI
26,324,927 UART: [art] Store in slot 0x4
26,367,846 UART: [art] Derive Key Pair
26,368,886 UART: [art] Store priv key in slot 0x5
29,610,603 UART: [art] Derive Key Pair - Done
29,623,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,903,916 UART: [art] Erasing AUTHORITY.KEYID = 7
31,905,420 UART: [art] PUB.X = 5F1AFDCE735EE8579F8BCFC5208C4EBECA3F98EE800402DF1D505619BE1D8F978B2A24BDC87DF3292802227DEF388BF7
31,912,718 UART: [art] PUB.Y = 7CB0D62E4F2B8E1422BDD986924E96E7782E1FCD6BD4252EF1B53A592BB3775194F170584EC9C5EFD2684D6FC1EA204B
31,920,029 UART: [art] SIG.R = 1231D89E252A699AA04DF07FD9F90EE30948A8993A9CC8F1E40EC7BFD10B9208E30EEDAA8B55D3E2BFC42F76553323D3
31,927,389 UART: [art] SIG.S = E9BEAFD3BA2306686DE1A764D5066C54D6438D65D1C312294948D4AA00736F3EFFAE593292AFDAA91004E20DE1F06D9D
33,232,534 UART: Caliptra RT
33,233,232 UART: [state] CFI Enabled
33,378,436 UART: [rt] RT listening for mailbox commands...
33,410,324 UART: [rt]cmd =0x44504543, len=92
39,091,187 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,076 writing to cptra_bootfsm_go
4,934,210 ready_for_fw is high
4,934,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,970,025 >>> mbox cmd response: success
18,970,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
24,605,992 UART:
24,606,347 UART: Running Caliptra FMC ...
24,607,385 UART:
24,607,533 UART: [state] CFI Enabled
24,615,614 UART: [fht] FMC Alias Private Key: 7
26,955,583 UART: [art] Extend RT PCRs Done
26,956,913 UART: [art] Lock RT PCRs Done
26,958,512 UART: [art] Populate DV Done
26,963,813 UART: [fht] FMC Alias Private Key: 7
26,965,405 UART: [art] Derive CDI
26,966,214 UART: [art] Store in slot 0x4
27,008,869 UART: [art] Derive Key Pair
27,009,920 UART: [art] Store priv key in slot 0x5
30,252,464 UART: [art] Derive Key Pair - Done
30,265,300 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
32,545,520 UART: [art] Erasing AUTHORITY.KEYID = 7
32,547,026 UART: [art] PUB.X = 5F1AFDCE735EE8579F8BCFC5208C4EBECA3F98EE800402DF1D505619BE1D8F978B2A24BDC87DF3292802227DEF388BF7
32,554,318 UART: [art] PUB.Y = 7CB0D62E4F2B8E1422BDD986924E96E7782E1FCD6BD4252EF1B53A592BB3775194F170584EC9C5EFD2684D6FC1EA204B
32,561,602 UART: [art] SIG.R = 1231D89E252A699AA04DF07FD9F90EE30948A8993A9CC8F1E40EC7BFD10B9208E30EEDAA8B55D3E2BFC42F76553323D3
32,568,979 UART: [art] SIG.S = E9BEAFD3BA2306686DE1A764D5066C54D6438D65D1C312294948D4AA00736F3EFFAE593292AFDAA91004E20DE1F06D9D
33,874,148 UART: Caliptra RT
33,874,849 UART: [state] CFI Enabled
34,008,389 UART: [rt] RT listening for mailbox commands...
34,041,020 UART: [rt]cmd =0x4d454153, len=108
34,059,775 >>> mbox cmd response data (12 bytes)
34,060,290 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,090,875 UART: [rt]cmd =0x44504543, len=92
39,772,084 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,073 writing to cptra_bootfsm_go
5,254,928 ready_for_fw is high
5,255,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,274,711 >>> mbox cmd response: success
19,275,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,909,583 UART:
24,910,245 UART: Running Caliptra FMC ...
24,911,333 UART:
24,911,484 UART: [state] CFI Enabled
24,919,070 UART: [fht] FMC Alias Private Key: 7
27,258,732 UART: [art] Extend RT PCRs Done
27,259,961 UART: [art] Lock RT PCRs Done
27,261,506 UART: [art] Populate DV Done
27,267,073 UART: [fht] FMC Alias Private Key: 7
27,268,744 UART: [art] Derive CDI
27,269,479 UART: [art] Store in slot 0x4
27,312,130 UART: [art] Derive Key Pair
27,313,170 UART: [art] Store priv key in slot 0x5
30,554,865 UART: [art] Derive Key Pair - Done
30,567,974 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
32,848,379 UART: [art] Erasing AUTHORITY.KEYID = 7
32,849,892 UART: [art] PUB.X = 5F1AFDCE735EE8579F8BCFC5208C4EBECA3F98EE800402DF1D505619BE1D8F978B2A24BDC87DF3292802227DEF388BF7
32,857,203 UART: [art] PUB.Y = 7CB0D62E4F2B8E1422BDD986924E96E7782E1FCD6BD4252EF1B53A592BB3775194F170584EC9C5EFD2684D6FC1EA204B
32,864,445 UART: [art] SIG.R = 1231D89E252A699AA04DF07FD9F90EE30948A8993A9CC8F1E40EC7BFD10B9208E30EEDAA8B55D3E2BFC42F76553323D3
32,871,831 UART: [art] SIG.S = E9BEAFD3BA2306686DE1A764D5066C54D6438D65D1C312294948D4AA00736F3EFFAE593292AFDAA91004E20DE1F06D9D
34,177,490 UART: Caliptra RT
34,178,210 UART: [state] CFI Enabled
34,310,874 UART: [rt] RT listening for mailbox commands...
34,342,699 UART: [rt]cmd =0x44504543, len=96
34,374,063 >>> mbox cmd response data (56 bytes)
34,375,015 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,405,521 UART: [rt]cmd =0x44504543, len=92
40,087,516 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 6.07s
Truncated 3769 bytes from beginning
C2054496BBC57652E17DE254731722A293751A54846D
18,830,607 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,251 UART: [afmc] --
18,858,826 UART: [cold-reset] --
18,864,369 UART: [state] Locking Datavault
18,869,029 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,786 UART: [state] Locking ICCM
18,873,498 UART: [exit] Launching FMC @ 0x40000130
18,881,889 UART:
18,882,119 UART: Running Caliptra FMC ...
18,883,216 UART:
18,883,369 UART: [state] CFI Enabled
18,938,564 UART: [fht] FMC Alias Private Key: 7
20,705,033 UART: [art] Extend RT PCRs Done
20,706,252 UART: [art] Lock RT PCRs Done
20,707,766 UART: [art] Populate DV Done
20,713,022 UART: [fht] FMC Alias Private Key: 7
20,714,559 UART: [art] Derive CDI
20,715,367 UART: [art] Store in slot 0x4
20,772,105 UART: [art] Derive Key Pair
20,773,141 UART: [art] Store priv key in slot 0x5
23,235,997 UART: [art] Derive Key Pair - Done
23,248,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,961,163 UART: [art] Erasing AUTHORITY.KEYID = 7
24,962,675 UART: [art] PUB.X = 92FB0CEDDA354403996C2FB77E5BCD9453766AF5A028FE6E4E5204186CBFBDAEFBD4F4F281D02168D34BD26847558712
24,969,928 UART: [art] PUB.Y = 6B2CCA7F59CAEA0EB049FC764D159916D361B90A66DA2380D2029BC34C76C5DD3A84A7C8DA6FD18F4CA4969A4872C7A2
24,977,219 UART: [art] SIG.R = 481214B19DA0ED81F2919ADB159674BCE94CB96F1D51916864A034E062313E331B5851B19D13E011899A3A388CC02E87
24,984,602 UART: [art] SIG.S = CB448EEFE1DC987E23DE43D9511A1CB81024D249016CCDA5210BF6FB88CC378BFE05AA0952B245D39C60CB9CF393F3EC
25,963,716 UART: Caliptra RT
25,964,427 UART: [state] CFI Enabled
26,155,894 UART: [rt] RT listening for mailbox commands...
26,187,791 UART: [rt]cmd =0x44504543, len=92
30,543,635 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,100 writing to cptra_bootfsm_go
190,228 UART:
190,531 UART: Running Caliptra ROM ...
191,582 UART:
191,723 UART: [state] CFI Enabled
250,213 UART: [state] LifecycleState = Unprovisioned
252,144 UART: [state] DebugLocked = No
254,740 UART: [state] WD Timer not started. Device not locked for debugging
259,294 UART: [kat] SHA2-256
438,972 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
449,740 UART: [kat] ++
450,199 UART: [kat] sha1
461,564 UART: [kat] SHA2-256
464,285 UART: [kat] SHA2-384
469,206 UART: [kat] SHA2-512-ACC
471,565 UART: [kat] ECC-384
2,936,244 UART: [kat] HMAC-384Kdf
2,956,717 UART: [kat] LMS
3,433,200 UART: [kat] --
3,439,960 UART: [cold-reset] ++
3,442,593 UART: [fht] FHT @ 0x50003400
3,454,134 UART: [idev] ++
3,454,700 UART: [idev] CDI.KEYID = 6
3,455,604 UART: [idev] SUBJECT.KEYID = 7
3,456,844 UART: [idev] UDS.KEYID = 0
3,457,892 ready_for_fw is high
3,458,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,607,109 UART: [idev] Erasing UDS.KEYID = 0
5,974,566 UART: [idev] Sha1 KeyId Algorithm
5,998,340 UART: [idev] --
6,003,520 UART: [ldev] ++
6,004,090 UART: [ldev] CDI.KEYID = 6
6,005,005 UART: [ldev] SUBJECT.KEYID = 5
6,006,224 UART: [ldev] AUTHORITY.KEYID = 7
6,007,458 UART: [ldev] FE.KEYID = 1
6,043,073 UART: [ldev] Erasing FE.KEYID = 1
8,550,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,284,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,300,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,316,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,331,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,353,637 UART: [ldev] --
10,359,177 UART: [fwproc] Wait for Commands...
10,362,036 UART: [fwproc] Recv command 0x46574c44
10,364,033 UART: [fwproc] Recv'd Img size: 118548 bytes
13,847,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,927,738 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,000,754 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,328,809 >>> mbox cmd response: success
14,329,184 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,332,456 UART: [afmc] ++
14,333,030 UART: [afmc] CDI.KEYID = 6
14,334,045 UART: [afmc] SUBJECT.KEYID = 7
14,335,207 UART: [afmc] AUTHORITY.KEYID = 5
16,882,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,622,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,624,265 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,640,057 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,656,148 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,671,716 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,695,939 UART: [afmc] --
18,699,160 UART: [cold-reset] --
18,703,446 UART: [state] Locking Datavault
18,708,741 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,491 UART: [state] Locking ICCM
18,712,740 UART: [exit] Launching FMC @ 0x40000130
18,721,184 UART:
18,721,423 UART: Running Caliptra FMC ...
18,722,519 UART:
18,722,676 UART: [state] CFI Enabled
18,780,954 UART: [fht] FMC Alias Private Key: 7
20,547,414 UART: [art] Extend RT PCRs Done
20,548,616 UART: [art] Lock RT PCRs Done
20,550,164 UART: [art] Populate DV Done
20,555,844 UART: [fht] FMC Alias Private Key: 7
20,557,447 UART: [art] Derive CDI
20,558,184 UART: [art] Store in slot 0x4
20,613,902 UART: [art] Derive Key Pair
20,614,964 UART: [art] Store priv key in slot 0x5
23,077,646 UART: [art] Derive Key Pair - Done
23,090,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,356 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,856 UART: [art] PUB.X = 92FB0CEDDA354403996C2FB77E5BCD9453766AF5A028FE6E4E5204186CBFBDAEFBD4F4F281D02168D34BD26847558712
24,826,112 UART: [art] PUB.Y = 6B2CCA7F59CAEA0EB049FC764D159916D361B90A66DA2380D2029BC34C76C5DD3A84A7C8DA6FD18F4CA4969A4872C7A2
24,833,401 UART: [art] SIG.R = 481214B19DA0ED81F2919ADB159674BCE94CB96F1D51916864A034E062313E331B5851B19D13E011899A3A388CC02E87
24,840,833 UART: [art] SIG.S = CB448EEFE1DC987E23DE43D9511A1CB81024D249016CCDA5210BF6FB88CC378BFE05AA0952B245D39C60CB9CF393F3EC
25,819,532 UART: Caliptra RT
25,820,222 UART: [state] CFI Enabled
26,000,313 UART: [rt] RT listening for mailbox commands...
26,032,428 UART: [rt]cmd =0x4d454153, len=108
26,051,616 >>> mbox cmd response data (12 bytes)
26,052,221 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,082,807 UART: [rt]cmd =0x44504543, len=92
30,441,368 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,099 writing to cptra_bootfsm_go
190,176 UART:
190,494 UART: Running Caliptra ROM ...
191,601 UART:
191,761 UART: [state] CFI Enabled
251,233 UART: [state] LifecycleState = Unprovisioned
253,165 UART: [state] DebugLocked = No
254,840 UART: [state] WD Timer not started. Device not locked for debugging
259,607 UART: [kat] SHA2-256
439,262 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
450,020 UART: [kat] ++
450,554 UART: [kat] sha1
462,449 UART: [kat] SHA2-256
465,175 UART: [kat] SHA2-384
471,653 UART: [kat] SHA2-512-ACC
474,018 UART: [kat] ECC-384
2,935,001 UART: [kat] HMAC-384Kdf
2,957,119 UART: [kat] LMS
3,433,607 UART: [kat] --
3,437,675 UART: [cold-reset] ++
3,439,817 UART: [fht] FHT @ 0x50003400
3,450,650 UART: [idev] ++
3,451,209 UART: [idev] CDI.KEYID = 6
3,452,246 UART: [idev] SUBJECT.KEYID = 7
3,453,419 UART: [idev] UDS.KEYID = 0
3,454,465 ready_for_fw is high
3,454,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,603,751 UART: [idev] Erasing UDS.KEYID = 0
5,971,820 UART: [idev] Sha1 KeyId Algorithm
5,994,935 UART: [idev] --
5,999,734 UART: [ldev] ++
6,000,353 UART: [ldev] CDI.KEYID = 6
6,001,239 UART: [ldev] SUBJECT.KEYID = 5
6,002,451 UART: [ldev] AUTHORITY.KEYID = 7
6,003,740 UART: [ldev] FE.KEYID = 1
6,043,092 UART: [ldev] Erasing FE.KEYID = 1
8,547,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,284,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,300,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,316,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,331,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,354,833 UART: [ldev] --
10,360,633 UART: [fwproc] Wait for Commands...
10,363,808 UART: [fwproc] Recv command 0x46574c44
10,365,866 UART: [fwproc] Recv'd Img size: 118548 bytes
13,843,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,920,705 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,993,726 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,322,004 >>> mbox cmd response: success
14,322,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,326,736 UART: [afmc] ++
14,327,313 UART: [afmc] CDI.KEYID = 6
14,328,248 UART: [afmc] SUBJECT.KEYID = 7
14,329,456 UART: [afmc] AUTHORITY.KEYID = 5
16,860,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,600,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,602,320 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,618,176 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,634,171 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,649,771 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,673,985 UART: [afmc] --
18,678,061 UART: [cold-reset] --
18,682,039 UART: [state] Locking Datavault
18,687,942 UART: [state] Locking PCR0, PCR1 and PCR31
18,689,733 UART: [state] Locking ICCM
18,690,751 UART: [exit] Launching FMC @ 0x40000130
18,699,193 UART:
18,699,435 UART: Running Caliptra FMC ...
18,700,531 UART:
18,700,686 UART: [state] CFI Enabled
18,755,764 UART: [fht] FMC Alias Private Key: 7
20,522,502 UART: [art] Extend RT PCRs Done
20,523,711 UART: [art] Lock RT PCRs Done
20,525,392 UART: [art] Populate DV Done
20,530,579 UART: [fht] FMC Alias Private Key: 7
20,532,314 UART: [art] Derive CDI
20,533,071 UART: [art] Store in slot 0x4
20,588,420 UART: [art] Derive Key Pair
20,589,417 UART: [art] Store priv key in slot 0x5
23,052,261 UART: [art] Derive Key Pair - Done
23,065,251 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,777,706 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,207 UART: [art] PUB.X = 92FB0CEDDA354403996C2FB77E5BCD9453766AF5A028FE6E4E5204186CBFBDAEFBD4F4F281D02168D34BD26847558712
24,786,504 UART: [art] PUB.Y = 6B2CCA7F59CAEA0EB049FC764D159916D361B90A66DA2380D2029BC34C76C5DD3A84A7C8DA6FD18F4CA4969A4872C7A2
24,793,790 UART: [art] SIG.R = 481214B19DA0ED81F2919ADB159674BCE94CB96F1D51916864A034E062313E331B5851B19D13E011899A3A388CC02E87
24,801,121 UART: [art] SIG.S = CB448EEFE1DC987E23DE43D9511A1CB81024D249016CCDA5210BF6FB88CC378BFE05AA0952B245D39C60CB9CF393F3EC
25,780,356 UART: Caliptra RT
25,781,061 UART: [state] CFI Enabled
25,961,251 UART: [rt] RT listening for mailbox commands...
25,993,429 UART: [rt]cmd =0x44504543, len=96
26,025,157 >>> mbox cmd response data (56 bytes)
26,025,976 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,056,382 UART: [rt]cmd =0x44504543, len=92
30,401,930 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
3,768 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,292,595 >>> mbox cmd response data (12 bytes)
10,293,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,398,870 >>> mbox cmd response: success
14,399,335 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,682,341 UART:
18,682,717 UART: Running Caliptra FMC ...
18,683,908 UART:
18,684,063 UART: [state] CFI Enabled
18,752,186 UART: [fht] FMC Alias Private Key: 7
20,519,879 UART: [art] Extend RT PCRs Done
20,521,099 UART: [art] Lock RT PCRs Done
20,522,926 UART: [art] Populate DV Done
20,528,393 UART: [fht] FMC Alias Private Key: 7
20,529,983 UART: [art] Derive CDI
20,530,721 UART: [art] Store in slot 0x4
20,584,829 UART: [art] Derive Key Pair
20,585,891 UART: [art] Store priv key in slot 0x5
23,048,798 UART: [art] Derive Key Pair - Done
23,061,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,773,420 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,922 UART: [art] PUB.X = 69F8D28F2A17EEA97C25895DBBDFB965731D32CDDE03695BFCE758A76440BCF0288D25FBA53F0128092A559230F83959
24,782,184 UART: [art] PUB.Y = 10B7F707FA2B2A175346C1E6C33F9965934D0A3A8490AEBC81DC4D6526BAB9EFFC4750649D6E61A85D46EA2BFC8E6B21
24,789,455 UART: [art] SIG.R = 4E0464C91F812928921A5BCE959B3EA936A47F50162DA8C5FB541263C33618706E43316E16576900E846E78C6D35A4F0
24,796,800 UART: [art] SIG.S = 37DA598D9D60E4516E72CA2BEF45A120ECF8AF9D2C71D03515B05D59E23FCC31417255D1448676E742FA3722B4D35031
25,775,259 UART: Caliptra RT
25,775,962 UART: [state] CFI Enabled
25,968,486 UART: [rt] RT listening for mailbox commands...
26,000,496 UART: [rt]cmd =0x44504543, len=92
30,355,072 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,067 writing to cptra_bootfsm_go
3,444,302 ready_for_fw is high
3,444,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,206,957 >>> mbox cmd response: success
14,207,428 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,500,369 UART:
18,500,715 UART: Running Caliptra FMC ...
18,501,756 UART:
18,501,906 UART: [state] CFI Enabled
18,567,480 UART: [fht] FMC Alias Private Key: 7
20,334,100 UART: [art] Extend RT PCRs Done
20,335,431 UART: [art] Lock RT PCRs Done
20,336,942 UART: [art] Populate DV Done
20,342,409 UART: [fht] FMC Alias Private Key: 7
20,344,052 UART: [art] Derive CDI
20,344,872 UART: [art] Store in slot 0x4
20,400,753 UART: [art] Derive Key Pair
20,401,797 UART: [art] Store priv key in slot 0x5
22,864,274 UART: [art] Derive Key Pair - Done
22,877,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,590,207 UART: [art] Erasing AUTHORITY.KEYID = 7
24,591,709 UART: [art] PUB.X = 69F8D28F2A17EEA97C25895DBBDFB965731D32CDDE03695BFCE758A76440BCF0288D25FBA53F0128092A559230F83959
24,598,985 UART: [art] PUB.Y = 10B7F707FA2B2A175346C1E6C33F9965934D0A3A8490AEBC81DC4D6526BAB9EFFC4750649D6E61A85D46EA2BFC8E6B21
24,606,222 UART: [art] SIG.R = 4E0464C91F812928921A5BCE959B3EA936A47F50162DA8C5FB541263C33618706E43316E16576900E846E78C6D35A4F0
24,613,552 UART: [art] SIG.S = 37DA598D9D60E4516E72CA2BEF45A120ECF8AF9D2C71D03515B05D59E23FCC31417255D1448676E742FA3722B4D35031
25,592,555 UART: Caliptra RT
25,593,256 UART: [state] CFI Enabled
25,772,822 UART: [rt] RT listening for mailbox commands...
25,805,248 UART: [rt]cmd =0x4d454153, len=108
25,822,964 >>> mbox cmd response data (12 bytes)
25,823,491 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,854,233 UART: [rt]cmd =0x44504543, len=92
30,212,464 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,080 writing to cptra_bootfsm_go
3,445,368 ready_for_fw is high
3,445,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,204,888 >>> mbox cmd response: success
14,205,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,499,717 UART:
18,500,050 UART: Running Caliptra FMC ...
18,501,296 UART:
18,501,455 UART: [state] CFI Enabled
18,565,515 UART: [fht] FMC Alias Private Key: 7
20,332,371 UART: [art] Extend RT PCRs Done
20,333,591 UART: [art] Lock RT PCRs Done
20,335,429 UART: [art] Populate DV Done
20,340,947 UART: [fht] FMC Alias Private Key: 7
20,342,480 UART: [art] Derive CDI
20,343,239 UART: [art] Store in slot 0x4
20,398,546 UART: [art] Derive Key Pair
20,399,595 UART: [art] Store priv key in slot 0x5
22,862,694 UART: [art] Derive Key Pair - Done
22,875,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,588,631 UART: [art] Erasing AUTHORITY.KEYID = 7
24,590,140 UART: [art] PUB.X = 69F8D28F2A17EEA97C25895DBBDFB965731D32CDDE03695BFCE758A76440BCF0288D25FBA53F0128092A559230F83959
24,597,427 UART: [art] PUB.Y = 10B7F707FA2B2A175346C1E6C33F9965934D0A3A8490AEBC81DC4D6526BAB9EFFC4750649D6E61A85D46EA2BFC8E6B21
24,604,672 UART: [art] SIG.R = 4E0464C91F812928921A5BCE959B3EA936A47F50162DA8C5FB541263C33618706E43316E16576900E846E78C6D35A4F0
24,612,017 UART: [art] SIG.S = 37DA598D9D60E4516E72CA2BEF45A120ECF8AF9D2C71D03515B05D59E23FCC31417255D1448676E742FA3722B4D35031
25,591,288 UART: Caliptra RT
25,591,973 UART: [state] CFI Enabled
25,770,268 UART: [rt] RT listening for mailbox commands...
25,802,264 UART: [rt]cmd =0x44504543, len=96
25,833,595 >>> mbox cmd response data (56 bytes)
25,834,426 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,864,953 UART: [rt]cmd =0x44504543, len=92
30,213,572 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.66s
Truncated 3769 bytes from beginning
C2054496BBC57652E17DE254731722A293751A54846D
18,995,255 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,018,592 UART: [afmc] --
19,022,375 UART: [cold-reset] --
19,026,569 UART: [state] Locking Datavault
19,031,432 UART: [state] Locking PCR0, PCR1 and PCR31
19,033,198 UART: [state] Locking ICCM
19,035,980 UART: [exit] Launching FMC @ 0x40000130
19,044,446 UART:
19,044,689 UART: Running Caliptra FMC ...
19,045,793 UART:
19,045,956 UART: [state] CFI Enabled
19,054,336 UART: [fht] FMC Alias Private Key: 7
20,819,793 UART: [art] Extend RT PCRs Done
20,821,013 UART: [art] Lock RT PCRs Done
20,822,612 UART: [art] Populate DV Done
20,828,292 UART: [fht] FMC Alias Private Key: 7
20,829,827 UART: [art] Derive CDI
20,830,562 UART: [art] Store in slot 0x4
20,873,229 UART: [art] Derive Key Pair
20,874,269 UART: [art] Store priv key in slot 0x5
23,300,994 UART: [art] Derive Key Pair - Done
23,314,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,020,588 UART: [art] Erasing AUTHORITY.KEYID = 7
25,022,093 UART: [art] PUB.X = 06CF52EB20F4FD9549204586AF14EA26E88583B037FEDC98860C29050FBB43F6E76A8E05FC298491CD551A54E53E9938
25,029,411 UART: [art] PUB.Y = 7AD29F1FEEE2EEE845F2436A5C2FD6D7C1BD9749F6A69C2B7673A3A1FC9AD49AE8D4F9BD770B5F9F16D47F9C5B5ED92F
25,036,649 UART: [art] SIG.R = 20555480146FD37EE4385696F88203D820A43B3E16C0CE91C8D4D3782B82FF3BFDF06F6B3CB3121B90EC8570B71E3341
25,044,038 UART: [art] SIG.S = 99746987D6358EA82E33F5FC85A63606D185A7BC38F9256A80C99CE9A3BE49A92C584438F0E33218D80FA837F5CB69C6
26,023,100 UART: Caliptra RT
26,023,811 UART: [state] CFI Enabled
26,167,209 UART: [rt] RT listening for mailbox commands...
26,199,048 UART: [rt]cmd =0x44504543, len=92
30,491,798 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,082 writing to cptra_bootfsm_go
190,209 UART:
190,505 UART: Running Caliptra ROM ...
191,535 UART:
9,997,956 UART: [state] CFI Enabled
10,010,976 UART: [state] LifecycleState = Unprovisioned
10,012,907 UART: [state] DebugLocked = No
10,014,653 UART: [state] WD Timer not started. Device not locked for debugging
10,019,290 UART: [kat] SHA2-256
10,198,944 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,209,723 UART: [kat] ++
10,210,178 UART: [kat] sha1
10,221,061 UART: [kat] SHA2-256
10,223,728 UART: [kat] SHA2-384
10,228,162 UART: [kat] SHA2-512-ACC
10,230,539 UART: [kat] ECC-384
12,675,222 UART: [kat] HMAC-384Kdf
12,687,747 UART: [kat] LMS
13,164,267 UART: [kat] --
13,170,030 UART: [cold-reset] ++
13,172,667 UART: [fht] FHT @ 0x50003400
13,183,928 UART: [idev] ++
13,184,498 UART: [idev] CDI.KEYID = 6
13,185,527 UART: [idev] SUBJECT.KEYID = 7
13,186,705 UART: [idev] UDS.KEYID = 0
13,187,753 ready_for_fw is high
13,187,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,336,730 UART: [idev] Erasing UDS.KEYID = 0
15,666,891 UART: [idev] Sha1 KeyId Algorithm
15,690,777 UART: [idev] --
15,694,605 UART: [ldev] ++
15,695,171 UART: [ldev] CDI.KEYID = 6
15,696,108 UART: [ldev] SUBJECT.KEYID = 5
15,697,341 UART: [ldev] AUTHORITY.KEYID = 7
15,698,577 UART: [ldev] FE.KEYID = 1
15,709,501 UART: [ldev] Erasing FE.KEYID = 1
18,182,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,903,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,919,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,934,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,950,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,971,862 UART: [ldev] --
19,976,806 UART: [fwproc] Wait for Commands...
19,979,668 UART: [fwproc] Recv command 0x46574c44
19,981,657 UART: [fwproc] Recv'd Img size: 118548 bytes
23,467,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,544,121 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,617,134 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,944,564 >>> mbox cmd response: success
23,944,972 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,948,745 UART: [afmc] ++
23,949,320 UART: [afmc] CDI.KEYID = 6
23,950,289 UART: [afmc] SUBJECT.KEYID = 7
23,951,504 UART: [afmc] AUTHORITY.KEYID = 5
26,455,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,175,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,178,152 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
28,193,981 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
28,210,006 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
28,225,587 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
28,249,320 UART: [afmc] --
28,253,344 UART: [cold-reset] --
28,256,932 UART: [state] Locking Datavault
28,261,270 UART: [state] Locking PCR0, PCR1 and PCR31
28,263,025 UART: [state] Locking ICCM
28,264,830 UART: [exit] Launching FMC @ 0x40000130
28,273,023 UART:
28,273,276 UART: Running Caliptra FMC ...
28,274,382 UART:
28,274,540 UART: [state] CFI Enabled
28,282,428 UART: [fht] FMC Alias Private Key: 7
30,048,028 UART: [art] Extend RT PCRs Done
30,049,246 UART: [art] Lock RT PCRs Done
30,050,929 UART: [art] Populate DV Done
30,056,398 UART: [fht] FMC Alias Private Key: 7
30,057,868 UART: [art] Derive CDI
30,058,618 UART: [art] Store in slot 0x4
30,101,325 UART: [art] Derive Key Pair
30,102,328 UART: [art] Store priv key in slot 0x5
32,529,037 UART: [art] Derive Key Pair - Done
32,542,251 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,248,408 UART: [art] Erasing AUTHORITY.KEYID = 7
34,249,901 UART: [art] PUB.X = 06CF52EB20F4FD9549204586AF14EA26E88583B037FEDC98860C29050FBB43F6E76A8E05FC298491CD551A54E53E9938
34,257,202 UART: [art] PUB.Y = 7AD29F1FEEE2EEE845F2436A5C2FD6D7C1BD9749F6A69C2B7673A3A1FC9AD49AE8D4F9BD770B5F9F16D47F9C5B5ED92F
34,264,627 UART: [art] SIG.R = 20555480146FD37EE4385696F88203D820A43B3E16C0CE91C8D4D3782B82FF3BFDF06F6B3CB3121B90EC8570B71E3341
34,271,876 UART: [art] SIG.S = 99746987D6358EA82E33F5FC85A63606D185A7BC38F9256A80C99CE9A3BE49A92C584438F0E33218D80FA837F5CB69C6
35,250,670 UART: Caliptra RT
35,251,381 UART: [state] CFI Enabled
35,385,136 UART: [rt] RT listening for mailbox commands...
35,417,357 UART: [rt]cmd =0x4d454153, len=108
35,435,910 >>> mbox cmd response data (12 bytes)
35,436,497 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,467,095 UART: [rt]cmd =0x44504543, len=92
39,759,754 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,086 writing to cptra_bootfsm_go
190,209 UART:
190,513 UART: Running Caliptra ROM ...
191,623 UART:
10,327,285 UART: [state] CFI Enabled
10,342,070 UART: [state] LifecycleState = Unprovisioned
10,343,995 UART: [state] DebugLocked = No
10,345,675 UART: [state] WD Timer not started. Device not locked for debugging
10,348,966 UART: [kat] SHA2-256
10,528,645 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,539,419 UART: [kat] ++
10,539,876 UART: [kat] sha1
10,550,971 UART: [kat] SHA2-256
10,553,637 UART: [kat] SHA2-384
10,558,523 UART: [kat] SHA2-512-ACC
10,560,945 UART: [kat] ECC-384
13,003,274 UART: [kat] HMAC-384Kdf
13,015,863 UART: [kat] LMS
13,492,369 UART: [kat] --
13,496,800 UART: [cold-reset] ++
13,498,803 UART: [fht] FHT @ 0x50003400
13,510,061 UART: [idev] ++
13,510,635 UART: [idev] CDI.KEYID = 6
13,511,667 UART: [idev] SUBJECT.KEYID = 7
13,512,841 UART: [idev] UDS.KEYID = 0
13,513,766 ready_for_fw is high
13,513,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,662,727 UART: [idev] Erasing UDS.KEYID = 0
15,990,207 UART: [idev] Sha1 KeyId Algorithm
16,013,436 UART: [idev] --
16,018,600 UART: [ldev] ++
16,019,235 UART: [ldev] CDI.KEYID = 6
16,020,151 UART: [ldev] SUBJECT.KEYID = 5
16,021,232 UART: [ldev] AUTHORITY.KEYID = 7
16,022,590 UART: [ldev] FE.KEYID = 1
16,032,192 UART: [ldev] Erasing FE.KEYID = 1
18,512,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,231,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,247,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,263,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,279,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,301,099 UART: [ldev] --
20,306,527 UART: [fwproc] Wait for Commands...
20,309,552 UART: [fwproc] Recv command 0x46574c44
20,311,544 UART: [fwproc] Recv'd Img size: 118548 bytes
23,802,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,883,897 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,956,930 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,284,397 >>> mbox cmd response: success
24,284,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,288,300 UART: [afmc] ++
24,288,890 UART: [afmc] CDI.KEYID = 6
24,289,858 UART: [afmc] SUBJECT.KEYID = 7
24,291,011 UART: [afmc] AUTHORITY.KEYID = 5
26,794,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,515,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,517,504 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
28,533,318 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
28,549,390 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
28,564,983 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
28,589,366 UART: [afmc] --
28,593,452 UART: [cold-reset] --
28,596,667 UART: [state] Locking Datavault
28,603,533 UART: [state] Locking PCR0, PCR1 and PCR31
28,605,283 UART: [state] Locking ICCM
28,606,354 UART: [exit] Launching FMC @ 0x40000130
28,614,779 UART:
28,615,020 UART: Running Caliptra FMC ...
28,616,132 UART:
28,616,290 UART: [state] CFI Enabled
28,624,443 UART: [fht] FMC Alias Private Key: 7
30,390,462 UART: [art] Extend RT PCRs Done
30,391,678 UART: [art] Lock RT PCRs Done
30,393,467 UART: [art] Populate DV Done
30,398,821 UART: [fht] FMC Alias Private Key: 7
30,400,450 UART: [art] Derive CDI
30,401,274 UART: [art] Store in slot 0x4
30,443,759 UART: [art] Derive Key Pair
30,444,752 UART: [art] Store priv key in slot 0x5
32,871,956 UART: [art] Derive Key Pair - Done
32,884,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,591,081 UART: [art] Erasing AUTHORITY.KEYID = 7
34,592,608 UART: [art] PUB.X = 06CF52EB20F4FD9549204586AF14EA26E88583B037FEDC98860C29050FBB43F6E76A8E05FC298491CD551A54E53E9938
34,599,854 UART: [art] PUB.Y = 7AD29F1FEEE2EEE845F2436A5C2FD6D7C1BD9749F6A69C2B7673A3A1FC9AD49AE8D4F9BD770B5F9F16D47F9C5B5ED92F
34,607,136 UART: [art] SIG.R = 20555480146FD37EE4385696F88203D820A43B3E16C0CE91C8D4D3782B82FF3BFDF06F6B3CB3121B90EC8570B71E3341
34,614,523 UART: [art] SIG.S = 99746987D6358EA82E33F5FC85A63606D185A7BC38F9256A80C99CE9A3BE49A92C584438F0E33218D80FA837F5CB69C6
35,593,403 UART: Caliptra RT
35,594,091 UART: [state] CFI Enabled
35,727,253 UART: [rt] RT listening for mailbox commands...
35,759,245 UART: [rt]cmd =0x44504543, len=96
35,790,369 >>> mbox cmd response data (56 bytes)
35,791,171 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,821,920 UART: [rt]cmd =0x44504543, len=92
40,114,218 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
4,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,493,190 >>> mbox cmd response data (12 bytes)
10,494,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,596,195 >>> mbox cmd response: success
14,596,673 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,846,757 UART:
18,847,142 UART: Running Caliptra FMC ...
18,848,390 UART:
18,848,561 UART: [state] CFI Enabled
18,856,337 UART: [fht] FMC Alias Private Key: 7
20,622,127 UART: [art] Extend RT PCRs Done
20,623,343 UART: [art] Lock RT PCRs Done
20,625,078 UART: [art] Populate DV Done
20,630,286 UART: [fht] FMC Alias Private Key: 7
20,631,787 UART: [art] Derive CDI
20,632,549 UART: [art] Store in slot 0x4
20,675,227 UART: [art] Derive Key Pair
20,676,236 UART: [art] Store priv key in slot 0x5
23,103,215 UART: [art] Derive Key Pair - Done
23,116,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,823,098 UART: [art] Erasing AUTHORITY.KEYID = 7
24,824,600 UART: [art] PUB.X = 3BF35998C66293DD87A66FE07EAF915D83BAA040F7D6E574E87C80AAD489305249663389399F1ADD4918A4D99B500D1D
24,831,851 UART: [art] PUB.Y = A148D8588C8707F0CB763360E67904804D77BD75DAA77ADDBA3FB318966D46EDF38233F03821854FCB7AE749950E1BF9
24,839,120 UART: [art] SIG.R = F20BA75E2CEF3621855927C8543589FD528CC9C9E1FA8C306F485FA0F50E9ADE605DD553F66FF348B1B7DFA1E1EDBBE0
24,846,563 UART: [art] SIG.S = 7AAB6B06B0EEF3FEDACD32D86E216B76EEEDC85A5C2F56B625A045B3C96A922FBAC10089EF9119595AF5D19D8C5F01B6
25,825,525 UART: Caliptra RT
25,826,231 UART: [state] CFI Enabled
25,970,779 UART: [rt] RT listening for mailbox commands...
26,002,838 UART: [rt]cmd =0x44504543, len=92
30,294,711 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,084 writing to cptra_bootfsm_go
13,376,069 ready_for_fw is high
13,376,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,038,513 >>> mbox cmd response: success
24,038,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,285,750 UART:
28,286,085 UART: Running Caliptra FMC ...
28,287,161 UART:
28,287,318 UART: [state] CFI Enabled
28,295,376 UART: [fht] FMC Alias Private Key: 7
30,061,627 UART: [art] Extend RT PCRs Done
30,062,935 UART: [art] Lock RT PCRs Done
30,064,676 UART: [art] Populate DV Done
30,070,197 UART: [fht] FMC Alias Private Key: 7
30,071,740 UART: [art] Derive CDI
30,072,563 UART: [art] Store in slot 0x4
30,115,343 UART: [art] Derive Key Pair
30,116,342 UART: [art] Store priv key in slot 0x5
32,543,199 UART: [art] Derive Key Pair - Done
32,556,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,262,954 UART: [art] Erasing AUTHORITY.KEYID = 7
34,264,504 UART: [art] PUB.X = 3BF35998C66293DD87A66FE07EAF915D83BAA040F7D6E574E87C80AAD489305249663389399F1ADD4918A4D99B500D1D
34,271,714 UART: [art] PUB.Y = A148D8588C8707F0CB763360E67904804D77BD75DAA77ADDBA3FB318966D46EDF38233F03821854FCB7AE749950E1BF9
34,278,949 UART: [art] SIG.R = F20BA75E2CEF3621855927C8543589FD528CC9C9E1FA8C306F485FA0F50E9ADE605DD553F66FF348B1B7DFA1E1EDBBE0
34,286,446 UART: [art] SIG.S = 7AAB6B06B0EEF3FEDACD32D86E216B76EEEDC85A5C2F56B625A045B3C96A922FBAC10089EF9119595AF5D19D8C5F01B6
35,265,216 UART: Caliptra RT
35,265,924 UART: [state] CFI Enabled
35,398,247 UART: [rt] RT listening for mailbox commands...
35,430,567 UART: [rt]cmd =0x4d454153, len=108
35,448,661 >>> mbox cmd response data (12 bytes)
35,449,149 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,479,956 UART: [rt]cmd =0x44504543, len=92
39,772,777 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,042 writing to cptra_bootfsm_go
13,693,813 ready_for_fw is high
13,694,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,353,353 >>> mbox cmd response: success
24,353,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,607,402 UART:
28,607,743 UART: Running Caliptra FMC ...
28,608,787 UART:
28,608,939 UART: [state] CFI Enabled
28,617,315 UART: [fht] FMC Alias Private Key: 7
30,383,015 UART: [art] Extend RT PCRs Done
30,384,229 UART: [art] Lock RT PCRs Done
30,385,664 UART: [art] Populate DV Done
30,390,856 UART: [fht] FMC Alias Private Key: 7
30,392,526 UART: [art] Derive CDI
30,393,347 UART: [art] Store in slot 0x4
30,436,487 UART: [art] Derive Key Pair
30,437,533 UART: [art] Store priv key in slot 0x5
32,864,167 UART: [art] Derive Key Pair - Done
32,877,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,583,264 UART: [art] Erasing AUTHORITY.KEYID = 7
34,584,758 UART: [art] PUB.X = 3BF35998C66293DD87A66FE07EAF915D83BAA040F7D6E574E87C80AAD489305249663389399F1ADD4918A4D99B500D1D
34,592,010 UART: [art] PUB.Y = A148D8588C8707F0CB763360E67904804D77BD75DAA77ADDBA3FB318966D46EDF38233F03821854FCB7AE749950E1BF9
34,599,259 UART: [art] SIG.R = F20BA75E2CEF3621855927C8543589FD528CC9C9E1FA8C306F485FA0F50E9ADE605DD553F66FF348B1B7DFA1E1EDBBE0
34,606,658 UART: [art] SIG.S = 7AAB6B06B0EEF3FEDACD32D86E216B76EEEDC85A5C2F56B625A045B3C96A922FBAC10089EF9119595AF5D19D8C5F01B6
35,585,127 UART: Caliptra RT
35,585,828 UART: [state] CFI Enabled
35,718,883 UART: [rt] RT listening for mailbox commands...
35,750,943 UART: [rt]cmd =0x44504543, len=96
35,783,269 >>> mbox cmd response data (56 bytes)
35,784,112 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,814,592 UART: [rt]cmd =0x44504543, len=92
40,107,360 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.63s
Truncated 3769 bytes from beginning
C2054496BBC57652E17DE254731722A293751A54846D
19,154,498 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,179,595 UART: [afmc] --
19,182,808 UART: [cold-reset] --
19,185,477 UART: [state] Locking Datavault
19,189,711 UART: [state] Locking PCR0, PCR1 and PCR31
19,191,841 UART: [state] Locking ICCM
19,194,742 UART: [exit] Launching FMC @ 0x40000130
19,203,405 UART:
19,203,637 UART: Running Caliptra FMC ...
19,204,735 UART:
19,204,889 UART: [state] CFI Enabled
19,263,329 UART: [fht] FMC Alias Private Key: 7
21,029,660 UART: [art] Extend RT PCRs Done
21,030,886 UART: [art] Lock RT PCRs Done
21,032,515 UART: [art] Populate DV Done
21,037,976 UART: [fht] FMC Alias Private Key: 7
21,039,524 UART: [art] Derive CDI
21,040,286 UART: [art] Store in slot 0x4
21,096,328 UART: [art] Derive Key Pair
21,097,371 UART: [art] Store priv key in slot 0x5
23,560,249 UART: [art] Derive Key Pair - Done
23,573,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,286,341 UART: [art] Erasing AUTHORITY.KEYID = 7
25,287,839 UART: [art] PUB.X = AFEFDEB544653904A22C6C72DAC52AA2D70AD5C13E8FE9DAF8B8B44D1819C8D3D064ACCB6579F8B4B100D841E9B9181D
25,295,102 UART: [art] PUB.Y = 4323F1D61DE18B268C2297408781248D06666132FB5CE567603526647238EF39D6E301C3F3E295E59021A1E7B1621945
25,302,296 UART: [art] SIG.R = A5FD24682CAEDD9C2D3949A06941A0C88896F5F0306D594F942A19C1A667B5D93B66F8B46FE0656F4F0569F2F2F015CD
25,309,797 UART: [art] SIG.S = F4F07E53ABFABB03976B0EEB2F9D84D54225701E79C0E3A1A78D707570342A84FFBF30EF488BCAC76E42444C572B0D98
26,288,992 UART: Caliptra RT
26,289,702 UART: [state] CFI Enabled
26,483,471 UART: [rt] RT listening for mailbox commands...
26,515,683 UART: [rt]cmd =0x44504543, len=92
30,869,777 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,089 writing to cptra_bootfsm_go
190,185 UART:
190,477 UART: Running Caliptra ROM ...
191,560 UART:
191,707 UART: [state] CFI Enabled
255,163 UART: [state] LifecycleState = Unprovisioned
257,588 UART: [state] DebugLocked = No
260,184 UART: [state] WD Timer not started. Device not locked for debugging
264,174 UART: [kat] SHA2-256
454,058 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,825 UART: [kat] ++
465,299 UART: [kat] sha1
475,678 UART: [kat] SHA2-256
478,754 UART: [kat] SHA2-384
485,388 UART: [kat] SHA2-512-ACC
488,037 UART: [kat] ECC-384
2,937,400 UART: [kat] HMAC-384Kdf
2,960,217 UART: [kat] LMS
3,492,037 UART: [kat] --
3,497,071 UART: [cold-reset] ++
3,498,793 UART: [fht] FHT @ 0x50003400
3,510,046 UART: [idev] ++
3,510,682 UART: [idev] CDI.KEYID = 6
3,511,637 UART: [idev] SUBJECT.KEYID = 7
3,512,875 UART: [idev] UDS.KEYID = 0
3,513,774 ready_for_fw is high
3,513,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,662,939 UART: [idev] Erasing UDS.KEYID = 0
6,021,255 UART: [idev] Sha1 KeyId Algorithm
6,043,626 UART: [idev] --
6,048,165 UART: [ldev] ++
6,048,846 UART: [ldev] CDI.KEYID = 6
6,049,758 UART: [ldev] SUBJECT.KEYID = 5
6,050,918 UART: [ldev] AUTHORITY.KEYID = 7
6,052,151 UART: [ldev] FE.KEYID = 1
6,088,470 UART: [ldev] Erasing FE.KEYID = 1
8,592,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,840 UART: [ldev] --
10,401,426 UART: [fwproc] Wait for Commands...
10,403,577 UART: [fwproc] Recv command 0x46574c44
10,405,838 UART: [fwproc] Recv'd Img size: 118548 bytes
13,899,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,979,316 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,102,967 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,662,977 >>> mbox cmd response: success
14,663,347 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,666,189 UART: [afmc] ++
14,666,893 UART: [afmc] CDI.KEYID = 6
14,668,129 UART: [afmc] SUBJECT.KEYID = 7
14,669,557 UART: [afmc] AUTHORITY.KEYID = 5
17,200,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,927,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,929,253 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,944,365 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,959,517 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,974,428 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,997,686 UART: [afmc] --
19,000,797 UART: [cold-reset] --
19,003,423 UART: [state] Locking Datavault
19,009,752 UART: [state] Locking PCR0, PCR1 and PCR31
19,011,941 UART: [state] Locking ICCM
19,013,656 UART: [exit] Launching FMC @ 0x40000130
19,022,318 UART:
19,022,576 UART: Running Caliptra FMC ...
19,023,679 UART:
19,023,838 UART: [state] CFI Enabled
19,084,648 UART: [fht] FMC Alias Private Key: 7
20,851,264 UART: [art] Extend RT PCRs Done
20,852,479 UART: [art] Lock RT PCRs Done
20,854,209 UART: [art] Populate DV Done
20,859,837 UART: [fht] FMC Alias Private Key: 7
20,861,371 UART: [art] Derive CDI
20,862,181 UART: [art] Store in slot 0x4
20,917,899 UART: [art] Derive Key Pair
20,918,983 UART: [art] Store priv key in slot 0x5
23,382,518 UART: [art] Derive Key Pair - Done
23,395,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,107,972 UART: [art] Erasing AUTHORITY.KEYID = 7
25,109,480 UART: [art] PUB.X = AFEFDEB544653904A22C6C72DAC52AA2D70AD5C13E8FE9DAF8B8B44D1819C8D3D064ACCB6579F8B4B100D841E9B9181D
25,116,768 UART: [art] PUB.Y = 4323F1D61DE18B268C2297408781248D06666132FB5CE567603526647238EF39D6E301C3F3E295E59021A1E7B1621945
25,123,976 UART: [art] SIG.R = A5FD24682CAEDD9C2D3949A06941A0C88896F5F0306D594F942A19C1A667B5D93B66F8B46FE0656F4F0569F2F2F015CD
25,131,366 UART: [art] SIG.S = F4F07E53ABFABB03976B0EEB2F9D84D54225701E79C0E3A1A78D707570342A84FFBF30EF488BCAC76E42444C572B0D98
26,110,184 UART: Caliptra RT
26,110,890 UART: [state] CFI Enabled
26,291,610 UART: [rt] RT listening for mailbox commands...
26,323,786 UART: [rt]cmd =0x4d454153, len=108
26,341,961 >>> mbox cmd response data (12 bytes)
26,342,502 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,373,136 UART: [rt]cmd =0x44504543, len=92
30,734,057 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,037 writing to cptra_bootfsm_go
190,147 UART:
190,430 UART: Running Caliptra ROM ...
191,535 UART:
191,703 UART: [state] CFI Enabled
254,582 UART: [state] LifecycleState = Unprovisioned
256,933 UART: [state] DebugLocked = No
258,749 UART: [state] WD Timer not started. Device not locked for debugging
263,663 UART: [kat] SHA2-256
453,536 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,306 UART: [kat] ++
464,780 UART: [kat] sha1
476,083 UART: [kat] SHA2-256
479,091 UART: [kat] SHA2-384
485,093 UART: [kat] SHA2-512-ACC
487,676 UART: [kat] ECC-384
2,935,239 UART: [kat] HMAC-384Kdf
2,959,841 UART: [kat] LMS
3,491,612 UART: [kat] --
3,495,771 UART: [cold-reset] ++
3,498,007 UART: [fht] FHT @ 0x50003400
3,510,624 UART: [idev] ++
3,511,325 UART: [idev] CDI.KEYID = 6
3,512,354 UART: [idev] SUBJECT.KEYID = 7
3,513,523 UART: [idev] UDS.KEYID = 0
3,514,445 ready_for_fw is high
3,514,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,663,612 UART: [idev] Erasing UDS.KEYID = 0
6,016,144 UART: [idev] Sha1 KeyId Algorithm
6,039,383 UART: [idev] --
6,045,113 UART: [ldev] ++
6,045,793 UART: [ldev] CDI.KEYID = 6
6,046,859 UART: [ldev] SUBJECT.KEYID = 5
6,048,175 UART: [ldev] AUTHORITY.KEYID = 7
6,049,307 UART: [ldev] FE.KEYID = 1
6,088,603 UART: [ldev] Erasing FE.KEYID = 1
8,590,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,396,113 UART: [ldev] --
10,401,000 UART: [fwproc] Wait for Commands...
10,403,157 UART: [fwproc] Recv command 0x46574c44
10,405,415 UART: [fwproc] Recv'd Img size: 118548 bytes
13,903,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,979,731 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,103,348 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,662,789 >>> mbox cmd response: success
14,663,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,667,080 UART: [afmc] ++
14,667,820 UART: [afmc] CDI.KEYID = 6
14,669,026 UART: [afmc] SUBJECT.KEYID = 7
14,670,462 UART: [afmc] AUTHORITY.KEYID = 5
17,202,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,926,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,928,129 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,943,191 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,958,396 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,973,259 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,996,887 UART: [afmc] --
19,001,280 UART: [cold-reset] --
19,004,869 UART: [state] Locking Datavault
19,009,848 UART: [state] Locking PCR0, PCR1 and PCR31
19,012,023 UART: [state] Locking ICCM
19,014,596 UART: [exit] Launching FMC @ 0x40000130
19,023,264 UART:
19,023,497 UART: Running Caliptra FMC ...
19,024,549 UART:
19,024,701 UART: [state] CFI Enabled
19,084,543 UART: [fht] FMC Alias Private Key: 7
20,871,318 UART: [art] Extend RT PCRs Done
20,872,537 UART: [art] Lock RT PCRs Done
20,873,759 UART: [art] Populate DV Done
20,879,063 UART: [fht] FMC Alias Private Key: 7
20,880,654 UART: [art] Derive CDI
20,881,391 UART: [art] Store in slot 0x4
20,939,699 UART: [art] Derive Key Pair
20,940,738 UART: [art] Store priv key in slot 0x5
23,403,463 UART: [art] Derive Key Pair - Done
23,416,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,129,456 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,959 UART: [art] PUB.X = AFEFDEB544653904A22C6C72DAC52AA2D70AD5C13E8FE9DAF8B8B44D1819C8D3D064ACCB6579F8B4B100D841E9B9181D
25,138,233 UART: [art] PUB.Y = 4323F1D61DE18B268C2297408781248D06666132FB5CE567603526647238EF39D6E301C3F3E295E59021A1E7B1621945
25,145,413 UART: [art] SIG.R = A5FD24682CAEDD9C2D3949A06941A0C88896F5F0306D594F942A19C1A667B5D93B66F8B46FE0656F4F0569F2F2F015CD
25,152,825 UART: [art] SIG.S = F4F07E53ABFABB03976B0EEB2F9D84D54225701E79C0E3A1A78D707570342A84FFBF30EF488BCAC76E42444C572B0D98
26,131,938 UART: Caliptra RT
26,132,638 UART: [state] CFI Enabled
26,312,360 UART: [rt] RT listening for mailbox commands...
26,344,587 UART: [rt]cmd =0x44504543, len=96
26,376,237 >>> mbox cmd response data (56 bytes)
26,377,093 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,407,787 UART: [rt]cmd =0x44504543, len=92
30,754,327 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,458 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,252,857 >>> mbox cmd response data (12 bytes)
10,254,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,980,161 >>> mbox cmd response: success
14,980,651 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,261,801 UART:
19,262,178 UART: Running Caliptra FMC ...
19,263,432 UART:
19,263,606 UART: [state] CFI Enabled
19,329,507 UART: [fht] FMC Alias Private Key: 7
21,095,806 UART: [art] Extend RT PCRs Done
21,097,042 UART: [art] Lock RT PCRs Done
21,098,842 UART: [art] Populate DV Done
21,104,113 UART: [fht] FMC Alias Private Key: 7
21,105,817 UART: [art] Derive CDI
21,106,634 UART: [art] Store in slot 0x4
21,162,198 UART: [art] Derive Key Pair
21,163,243 UART: [art] Store priv key in slot 0x5
23,626,220 UART: [art] Derive Key Pair - Done
23,639,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,352,633 UART: [art] Erasing AUTHORITY.KEYID = 7
25,354,143 UART: [art] PUB.X = 0A3E9E37B7784AD71C25B29FFF03A29452E0765EBEFD833B6338FD87ACA322673944226B6206745157EA0A9B03746467
25,361,408 UART: [art] PUB.Y = 15F310439DB9D4D6A1D60E47077CC70052759337004B7ECB090F652591AA51299EE792528901263EF18BAF133A3A4525
25,368,593 UART: [art] SIG.R = 47E64E6451836F6A296AC148747691E4153C546C5E25B874F6AD1833A776C37C1969EC52C0A26EF40944A36A5392A873
25,375,955 UART: [art] SIG.S = 7BBC7A27CF79874170356E9240FEE347D49B6382D929DDBEFEC58CA19735E26B22679830146E11E76F6DBEF5A1E12CA3
26,354,832 UART: Caliptra RT
26,355,544 UART: [state] CFI Enabled
26,548,803 UART: [rt] RT listening for mailbox commands...
26,580,860 UART: [rt]cmd =0x44504543, len=92
30,936,883 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,096 writing to cptra_bootfsm_go
3,402,580 ready_for_fw is high
3,402,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,809,210 >>> mbox cmd response: success
14,809,630 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
19,102,368 UART:
19,102,696 UART: Running Caliptra FMC ...
19,103,766 UART:
19,103,917 UART: [state] CFI Enabled
19,166,756 UART: [fht] FMC Alias Private Key: 7
20,954,646 UART: [art] Extend RT PCRs Done
20,955,947 UART: [art] Lock RT PCRs Done
20,957,837 UART: [art] Populate DV Done
20,963,172 UART: [fht] FMC Alias Private Key: 7
20,964,847 UART: [art] Derive CDI
20,965,585 UART: [art] Store in slot 0x4
21,021,079 UART: [art] Derive Key Pair
21,022,086 UART: [art] Store priv key in slot 0x5
23,484,576 UART: [art] Derive Key Pair - Done
23,497,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,210,837 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,354 UART: [art] PUB.X = 0A3E9E37B7784AD71C25B29FFF03A29452E0765EBEFD833B6338FD87ACA322673944226B6206745157EA0A9B03746467
25,219,611 UART: [art] PUB.Y = 15F310439DB9D4D6A1D60E47077CC70052759337004B7ECB090F652591AA51299EE792528901263EF18BAF133A3A4525
25,226,788 UART: [art] SIG.R = 47E64E6451836F6A296AC148747691E4153C546C5E25B874F6AD1833A776C37C1969EC52C0A26EF40944A36A5392A873
25,234,124 UART: [art] SIG.S = 7BBC7A27CF79874170356E9240FEE347D49B6382D929DDBEFEC58CA19735E26B22679830146E11E76F6DBEF5A1E12CA3
26,213,256 UART: Caliptra RT
26,213,949 UART: [state] CFI Enabled
26,394,115 UART: [rt] RT listening for mailbox commands...
26,426,309 UART: [rt]cmd =0x4d454153, len=108
26,444,568 >>> mbox cmd response data (12 bytes)
26,445,128 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,475,716 UART: [rt]cmd =0x44504543, len=92
30,836,099 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,050 writing to cptra_bootfsm_go
3,425,431 ready_for_fw is high
3,425,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,811,742 >>> mbox cmd response: success
14,812,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,120,205 UART:
19,120,537 UART: Running Caliptra FMC ...
19,121,579 UART:
19,121,727 UART: [state] CFI Enabled
19,188,493 UART: [fht] FMC Alias Private Key: 7
20,955,579 UART: [art] Extend RT PCRs Done
20,956,843 UART: [art] Lock RT PCRs Done
20,958,305 UART: [art] Populate DV Done
20,963,612 UART: [fht] FMC Alias Private Key: 7
20,965,085 UART: [art] Derive CDI
20,965,833 UART: [art] Store in slot 0x4
21,022,629 UART: [art] Derive Key Pair
21,023,675 UART: [art] Store priv key in slot 0x5
23,486,382 UART: [art] Derive Key Pair - Done
23,499,708 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,846 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,498 UART: [art] PUB.X = 0A3E9E37B7784AD71C25B29FFF03A29452E0765EBEFD833B6338FD87ACA322673944226B6206745157EA0A9B03746467
25,221,602 UART: [art] PUB.Y = 15F310439DB9D4D6A1D60E47077CC70052759337004B7ECB090F652591AA51299EE792528901263EF18BAF133A3A4525
25,228,793 UART: [art] SIG.R = 47E64E6451836F6A296AC148747691E4153C546C5E25B874F6AD1833A776C37C1969EC52C0A26EF40944A36A5392A873
25,236,131 UART: [art] SIG.S = 7BBC7A27CF79874170356E9240FEE347D49B6382D929DDBEFEC58CA19735E26B22679830146E11E76F6DBEF5A1E12CA3
26,215,564 UART: Caliptra RT
26,216,251 UART: [state] CFI Enabled
26,395,759 UART: [rt] RT listening for mailbox commands...
26,427,553 UART: [rt]cmd =0x44504543, len=96
26,458,724 >>> mbox cmd response data (56 bytes)
26,459,502 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,489,978 UART: [rt]cmd =0x44504543, len=92
30,838,239 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.75s
Truncated 3769 bytes from beginning
C2054496BBC57652E17DE254731722A293751A54846D
19,366,836 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,389,982 UART: [afmc] --
19,393,693 UART: [cold-reset] --
19,397,401 UART: [state] Locking Datavault
19,403,637 UART: [state] Locking PCR0, PCR1 and PCR31
19,405,794 UART: [state] Locking ICCM
19,408,546 UART: [exit] Launching FMC @ 0x40000130
19,417,225 UART:
19,417,460 UART: Running Caliptra FMC ...
19,418,565 UART:
19,418,728 UART: [state] CFI Enabled
19,426,940 UART: [fht] FMC Alias Private Key: 7
21,193,468 UART: [art] Extend RT PCRs Done
21,194,700 UART: [art] Lock RT PCRs Done
21,196,114 UART: [art] Populate DV Done
21,201,266 UART: [fht] FMC Alias Private Key: 7
21,202,750 UART: [art] Derive CDI
21,203,512 UART: [art] Store in slot 0x4
21,246,322 UART: [art] Derive Key Pair
21,247,365 UART: [art] Store priv key in slot 0x5
23,673,999 UART: [art] Derive Key Pair - Done
23,687,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,393,902 UART: [art] Erasing AUTHORITY.KEYID = 7
25,395,406 UART: [art] PUB.X = F6207B1C6754539867E5D09710ABE9ABCB116AFE3669BF4F652AF4CBC89299026E37815F888A92D14D636DBF9D87F422
25,402,682 UART: [art] PUB.Y = 9A1D47321BFEDB0641DE758B95C3CBCC1001ABF1B0A12934280C2D6A51883C089B7727ACFC6E534EF3653136543A4CC1
25,409,986 UART: [art] SIG.R = 1F6716DF016CF57835425676A860D034A0DF446B905EB30621BAC958A9956A5B12CAC41F6342954A18BD3088E3FEB5EA
25,417,347 UART: [art] SIG.S = 7F8C4139B29634A2815B7610A9D7E2E5BA52D269DBC8671DCFE09DEE9F980BC51748661B4629E1EDE38C0B15B84824C1
26,396,062 UART: Caliptra RT
26,396,776 UART: [state] CFI Enabled
26,542,132 UART: [rt] RT listening for mailbox commands...
26,574,247 UART: [rt]cmd =0x44504543, len=92
30,866,655 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,076 writing to cptra_bootfsm_go
190,178 UART:
190,470 UART: Running Caliptra ROM ...
191,504 UART:
9,633,741 UART: [state] CFI Enabled
9,649,741 UART: [state] LifecycleState = Unprovisioned
9,652,098 UART: [state] DebugLocked = No
9,654,483 UART: [state] WD Timer not started. Device not locked for debugging
9,658,644 UART: [kat] SHA2-256
9,848,519 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,859,300 UART: [kat] ++
9,859,855 UART: [kat] sha1
9,870,529 UART: [kat] SHA2-256
9,873,547 UART: [kat] SHA2-384
9,878,059 UART: [kat] SHA2-512-ACC
9,880,588 UART: [kat] ECC-384
12,320,485 UART: [kat] HMAC-384Kdf
12,333,643 UART: [kat] LMS
12,865,434 UART: [kat] --
12,871,695 UART: [cold-reset] ++
12,873,204 UART: [fht] FHT @ 0x50003400
12,885,767 UART: [idev] ++
12,886,510 UART: [idev] CDI.KEYID = 6
12,887,424 UART: [idev] SUBJECT.KEYID = 7
12,888,669 UART: [idev] UDS.KEYID = 0
12,889,594 ready_for_fw is high
12,889,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,038,800 UART: [idev] Erasing UDS.KEYID = 0
15,366,886 UART: [idev] Sha1 KeyId Algorithm
15,390,617 UART: [idev] --
15,396,668 UART: [ldev] ++
15,397,399 UART: [ldev] CDI.KEYID = 6
15,398,279 UART: [ldev] SUBJECT.KEYID = 5
15,399,491 UART: [ldev] AUTHORITY.KEYID = 7
15,400,666 UART: [ldev] FE.KEYID = 1
15,411,886 UART: [ldev] Erasing FE.KEYID = 1
17,891,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,611,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,626,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,641,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,657,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,677,881 UART: [ldev] --
19,683,517 UART: [fwproc] Wait for Commands...
19,685,909 UART: [fwproc] Recv command 0x46574c44
19,688,219 UART: [fwproc] Recv'd Img size: 118548 bytes
23,180,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,259,557 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,383,150 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,943,850 >>> mbox cmd response: success
23,944,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,948,308 UART: [afmc] ++
23,948,994 UART: [afmc] CDI.KEYID = 6
23,950,157 UART: [afmc] SUBJECT.KEYID = 7
23,951,701 UART: [afmc] AUTHORITY.KEYID = 5
26,455,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,177,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,178,989 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
28,194,081 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
28,209,220 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
28,224,148 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
28,247,914 UART: [afmc] --
28,252,369 UART: [cold-reset] --
28,256,461 UART: [state] Locking Datavault
28,263,235 UART: [state] Locking PCR0, PCR1 and PCR31
28,265,382 UART: [state] Locking ICCM
28,267,267 UART: [exit] Launching FMC @ 0x40000130
28,275,946 UART:
28,276,182 UART: Running Caliptra FMC ...
28,277,290 UART:
28,277,454 UART: [state] CFI Enabled
28,285,284 UART: [fht] FMC Alias Private Key: 7
30,051,670 UART: [art] Extend RT PCRs Done
30,052,904 UART: [art] Lock RT PCRs Done
30,054,402 UART: [art] Populate DV Done
30,059,767 UART: [fht] FMC Alias Private Key: 7
30,061,383 UART: [art] Derive CDI
30,062,130 UART: [art] Store in slot 0x4
30,104,947 UART: [art] Derive Key Pair
30,105,986 UART: [art] Store priv key in slot 0x5
32,532,861 UART: [art] Derive Key Pair - Done
32,546,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,252,609 UART: [art] Erasing AUTHORITY.KEYID = 7
34,254,124 UART: [art] PUB.X = F6207B1C6754539867E5D09710ABE9ABCB116AFE3669BF4F652AF4CBC89299026E37815F888A92D14D636DBF9D87F422
34,261,388 UART: [art] PUB.Y = 9A1D47321BFEDB0641DE758B95C3CBCC1001ABF1B0A12934280C2D6A51883C089B7727ACFC6E534EF3653136543A4CC1
34,268,649 UART: [art] SIG.R = 1F6716DF016CF57835425676A860D034A0DF446B905EB30621BAC958A9956A5B12CAC41F6342954A18BD3088E3FEB5EA
34,276,005 UART: [art] SIG.S = 7F8C4139B29634A2815B7610A9D7E2E5BA52D269DBC8671DCFE09DEE9F980BC51748661B4629E1EDE38C0B15B84824C1
35,254,884 UART: Caliptra RT
35,255,573 UART: [state] CFI Enabled
35,387,766 UART: [rt] RT listening for mailbox commands...
35,420,206 UART: [rt]cmd =0x4d454153, len=108
35,438,969 >>> mbox cmd response data (12 bytes)
35,439,579 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,470,124 UART: [rt]cmd =0x44504543, len=92
39,763,124 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,063 writing to cptra_bootfsm_go
190,193 UART:
190,480 UART: Running Caliptra ROM ...
191,595 UART:
9,955,744 UART: [state] CFI Enabled
9,970,748 UART: [state] LifecycleState = Unprovisioned
9,973,630 UART: [state] DebugLocked = No
9,974,785 UART: [state] WD Timer not started. Device not locked for debugging
9,978,806 UART: [kat] SHA2-256
10,168,732 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,179,516 UART: [kat] ++
10,180,000 UART: [kat] sha1
10,190,846 UART: [kat] SHA2-256
10,193,875 UART: [kat] SHA2-384
10,200,875 UART: [kat] SHA2-512-ACC
10,203,476 UART: [kat] ECC-384
12,646,384 UART: [kat] HMAC-384Kdf
12,658,963 UART: [kat] LMS
13,190,783 UART: [kat] --
13,195,219 UART: [cold-reset] ++
13,196,590 UART: [fht] FHT @ 0x50003400
13,207,721 UART: [idev] ++
13,208,429 UART: [idev] CDI.KEYID = 6
13,209,459 UART: [idev] SUBJECT.KEYID = 7
13,210,560 UART: [idev] UDS.KEYID = 0
13,211,610 ready_for_fw is high
13,211,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,360,590 UART: [idev] Erasing UDS.KEYID = 0
15,692,744 UART: [idev] Sha1 KeyId Algorithm
15,715,060 UART: [idev] --
15,720,568 UART: [ldev] ++
15,721,247 UART: [ldev] CDI.KEYID = 6
15,722,155 UART: [ldev] SUBJECT.KEYID = 5
15,723,316 UART: [ldev] AUTHORITY.KEYID = 7
15,724,549 UART: [ldev] FE.KEYID = 1
15,736,605 UART: [ldev] Erasing FE.KEYID = 1
18,212,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,930,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,945,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,960,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,975,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,996,347 UART: [ldev] --
20,002,489 UART: [fwproc] Wait for Commands...
20,005,410 UART: [fwproc] Recv command 0x46574c44
20,007,709 UART: [fwproc] Recv'd Img size: 118548 bytes
23,508,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,581,851 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,705,428 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,266,080 >>> mbox cmd response: success
24,266,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,269,561 UART: [afmc] ++
24,270,256 UART: [afmc] CDI.KEYID = 6
24,271,499 UART: [afmc] SUBJECT.KEYID = 7
24,272,939 UART: [afmc] AUTHORITY.KEYID = 5
26,774,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,497,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,499,107 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
28,514,209 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
28,529,353 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
28,544,290 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
28,567,438 UART: [afmc] --
28,570,546 UART: [cold-reset] --
28,574,527 UART: [state] Locking Datavault
28,579,027 UART: [state] Locking PCR0, PCR1 and PCR31
28,581,176 UART: [state] Locking ICCM
28,583,278 UART: [exit] Launching FMC @ 0x40000130
28,591,903 UART:
28,592,144 UART: Running Caliptra FMC ...
28,593,248 UART:
28,593,410 UART: [state] CFI Enabled
28,601,566 UART: [fht] FMC Alias Private Key: 7
30,367,357 UART: [art] Extend RT PCRs Done
30,368,583 UART: [art] Lock RT PCRs Done
30,369,760 UART: [art] Populate DV Done
30,375,123 UART: [fht] FMC Alias Private Key: 7
30,376,601 UART: [art] Derive CDI
30,377,554 UART: [art] Store in slot 0x4
30,420,318 UART: [art] Derive Key Pair
30,421,320 UART: [art] Store priv key in slot 0x5
32,848,512 UART: [art] Derive Key Pair - Done
32,861,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,567,685 UART: [art] Erasing AUTHORITY.KEYID = 7
34,569,192 UART: [art] PUB.X = F6207B1C6754539867E5D09710ABE9ABCB116AFE3669BF4F652AF4CBC89299026E37815F888A92D14D636DBF9D87F422
34,576,451 UART: [art] PUB.Y = 9A1D47321BFEDB0641DE758B95C3CBCC1001ABF1B0A12934280C2D6A51883C089B7727ACFC6E534EF3653136543A4CC1
34,583,701 UART: [art] SIG.R = 1F6716DF016CF57835425676A860D034A0DF446B905EB30621BAC958A9956A5B12CAC41F6342954A18BD3088E3FEB5EA
34,591,064 UART: [art] SIG.S = 7F8C4139B29634A2815B7610A9D7E2E5BA52D269DBC8671DCFE09DEE9F980BC51748661B4629E1EDE38C0B15B84824C1
35,569,176 UART: Caliptra RT
35,569,869 UART: [state] CFI Enabled
35,703,179 UART: [rt] RT listening for mailbox commands...
35,735,354 UART: [rt]cmd =0x44504543, len=96
35,766,540 >>> mbox cmd response data (56 bytes)
35,767,366 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,798,027 UART: [rt]cmd =0x44504543, len=92
40,089,897 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
4,339 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,470,410 >>> mbox cmd response data (12 bytes)
10,471,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,202,731 >>> mbox cmd response: success
15,203,216 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,454,884 UART:
19,455,278 UART: Running Caliptra FMC ...
19,456,479 UART:
19,456,641 UART: [state] CFI Enabled
19,464,582 UART: [fht] FMC Alias Private Key: 7
21,230,899 UART: [art] Extend RT PCRs Done
21,232,122 UART: [art] Lock RT PCRs Done
21,233,881 UART: [art] Populate DV Done
21,239,250 UART: [fht] FMC Alias Private Key: 7
21,240,907 UART: [art] Derive CDI
21,241,730 UART: [art] Store in slot 0x4
21,284,393 UART: [art] Derive Key Pair
21,285,433 UART: [art] Store priv key in slot 0x5
23,712,210 UART: [art] Derive Key Pair - Done
23,725,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,431,187 UART: [art] Erasing AUTHORITY.KEYID = 7
25,432,695 UART: [art] PUB.X = ACCCEEDC6C3DC1B146FE1157A2F80BFDA3B2AACBDEA56928B5CFF0E01217ACE6BF876530B266E2A95B337927A84F448A
25,440,023 UART: [art] PUB.Y = 53300F5DDE03ED504BE15A660092701F446B338A5B7146A47C0E55E22C8FB6D43E0212916E120FE6C6457FFA458FE6E3
25,447,196 UART: [art] SIG.R = D58D8D9CE740C931E8B0B3C1D8FFFAC88D18027C8BDF5D3E6FF7A56C3547160DCCD868BA9F4444885C08DB759706F79D
25,454,604 UART: [art] SIG.S = D9521222A25D7D1F8601B4619BA11FDDDEB0634F5B066FF6754FCDD582FE9CCDC50116887FBD85EAB52D076FC76FD9A2
26,433,323 UART: Caliptra RT
26,434,014 UART: [state] CFI Enabled
26,577,767 UART: [rt] RT listening for mailbox commands...
26,609,854 UART: [rt]cmd =0x44504543, len=92
30,902,446 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,066 writing to cptra_bootfsm_go
12,757,376 ready_for_fw is high
12,757,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,045,107 >>> mbox cmd response: success
24,045,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,301,157 UART:
28,301,518 UART: Running Caliptra FMC ...
28,302,764 UART:
28,302,942 UART: [state] CFI Enabled
28,310,573 UART: [fht] FMC Alias Private Key: 7
30,076,450 UART: [art] Extend RT PCRs Done
30,077,794 UART: [art] Lock RT PCRs Done
30,079,213 UART: [art] Populate DV Done
30,084,548 UART: [fht] FMC Alias Private Key: 7
30,086,047 UART: [art] Derive CDI
30,086,821 UART: [art] Store in slot 0x4
30,129,648 UART: [art] Derive Key Pair
30,130,697 UART: [art] Store priv key in slot 0x5
32,557,637 UART: [art] Derive Key Pair - Done
32,570,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,277,093 UART: [art] Erasing AUTHORITY.KEYID = 7
34,278,606 UART: [art] PUB.X = ACCCEEDC6C3DC1B146FE1157A2F80BFDA3B2AACBDEA56928B5CFF0E01217ACE6BF876530B266E2A95B337927A84F448A
34,285,909 UART: [art] PUB.Y = 53300F5DDE03ED504BE15A660092701F446B338A5B7146A47C0E55E22C8FB6D43E0212916E120FE6C6457FFA458FE6E3
34,293,151 UART: [art] SIG.R = D58D8D9CE740C931E8B0B3C1D8FFFAC88D18027C8BDF5D3E6FF7A56C3547160DCCD868BA9F4444885C08DB759706F79D
34,300,550 UART: [art] SIG.S = D9521222A25D7D1F8601B4619BA11FDDDEB0634F5B066FF6754FCDD582FE9CCDC50116887FBD85EAB52D076FC76FD9A2
35,279,352 UART: Caliptra RT
35,280,048 UART: [state] CFI Enabled
35,412,946 UART: [rt] RT listening for mailbox commands...
35,445,391 UART: [rt]cmd =0x4d454153, len=108
35,464,561 >>> mbox cmd response data (12 bytes)
35,465,083 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,495,748 UART: [rt]cmd =0x44504543, len=92
39,788,202 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,095 writing to cptra_bootfsm_go
13,061,276 ready_for_fw is high
13,061,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,357,001 >>> mbox cmd response: success
24,357,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,615,089 UART:
28,615,436 UART: Running Caliptra FMC ...
28,616,710 UART:
28,616,874 UART: [state] CFI Enabled
28,624,827 UART: [fht] FMC Alias Private Key: 7
30,391,481 UART: [art] Extend RT PCRs Done
30,392,727 UART: [art] Lock RT PCRs Done
30,394,527 UART: [art] Populate DV Done
30,399,839 UART: [fht] FMC Alias Private Key: 7
30,401,574 UART: [art] Derive CDI
30,402,401 UART: [art] Store in slot 0x4
30,444,949 UART: [art] Derive Key Pair
30,445,956 UART: [art] Store priv key in slot 0x5
32,872,541 UART: [art] Derive Key Pair - Done
32,885,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,591,708 UART: [art] Erasing AUTHORITY.KEYID = 7
34,593,216 UART: [art] PUB.X = ACCCEEDC6C3DC1B146FE1157A2F80BFDA3B2AACBDEA56928B5CFF0E01217ACE6BF876530B266E2A95B337927A84F448A
34,600,472 UART: [art] PUB.Y = 53300F5DDE03ED504BE15A660092701F446B338A5B7146A47C0E55E22C8FB6D43E0212916E120FE6C6457FFA458FE6E3
34,607,708 UART: [art] SIG.R = D58D8D9CE740C931E8B0B3C1D8FFFAC88D18027C8BDF5D3E6FF7A56C3547160DCCD868BA9F4444885C08DB759706F79D
34,615,149 UART: [art] SIG.S = D9521222A25D7D1F8601B4619BA11FDDDEB0634F5B066FF6754FCDD582FE9CCDC50116887FBD85EAB52D076FC76FD9A2
35,594,340 UART: Caliptra RT
35,595,051 UART: [state] CFI Enabled
35,728,516 UART: [rt] RT listening for mailbox commands...
35,760,422 UART: [rt]cmd =0x44504543, len=96
35,792,556 >>> mbox cmd response data (56 bytes)
35,793,372 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,823,644 UART: [rt]cmd =0x44504543, len=92
40,115,751 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.66s
Truncated 4904 bytes from beginning
PUB.X = 61EF6AF689E4538289C2B4DF815C45EFDB4E5BF71981A9A0D5F6FE5D58A886DE77625EF43DA79D17ED5F867A36A662E0
3,501,878 UART: [art] PUB.Y = A65BC2A677DFEFD791B49619C6F099E7D92E64FEFCAD5034A20B47C831F6DE61442BC2D2BA7039BCD75063C12B0175C6
3,508,836 UART: [art] SIG.R = 4AE520278A0D88A3E32E7D9EC88D0C35ADF87F7FF2D2FBBCB6803D82C068B2009129BC6E6D9EAAEE624F69DAD5458FA6
3,515,600 UART: [art] SIG.S = C3526EFFE2338AECBDDCA11A07D344F466A550647A51EA73283B13725D7F8714FF90DF9064F8529CFB89E2369660B91D
3,539,577 UART: Caliptra RT
3,539,828 UART: [state] CFI Enabled
3,671,910 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,703,060 UART: [rt]cmd =0x44504543, len=92
3,895,513 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,825 UART: [kat] SHA2-256
881,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,871 UART: [kat] ++
886,023 UART: [kat] sha1
890,057 UART: [kat] SHA2-256
891,995 UART: [kat] SHA2-384
894,824 UART: [kat] SHA2-512-ACC
896,725 UART: [kat] ECC-384
902,664 UART: [kat] HMAC-384Kdf
907,200 UART: [kat] LMS
1,475,396 UART: [kat] --
1,476,275 UART: [cold-reset] ++
1,476,789 UART: [fht] Storing FHT @ 0x50003400
1,479,604 UART: [idev] ++
1,479,772 UART: [idev] CDI.KEYID = 6
1,480,132 UART: [idev] SUBJECT.KEYID = 7
1,480,556 UART: [idev] UDS.KEYID = 0
1,480,901 ready_for_fw is high
1,480,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,432 UART: [idev] Erasing UDS.KEYID = 0
1,505,268 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,698 UART: [idev] --
1,514,637 UART: [ldev] ++
1,514,805 UART: [ldev] CDI.KEYID = 6
1,515,168 UART: [ldev] SUBJECT.KEYID = 5
1,515,594 UART: [ldev] AUTHORITY.KEYID = 7
1,516,057 UART: [ldev] FE.KEYID = 1
1,521,163 UART: [ldev] Erasing FE.KEYID = 1
1,546,324 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,164 UART: [ldev] --
1,585,561 UART: [fwproc] Waiting for Commands...
1,586,236 UART: [fwproc] Received command 0x46574c44
1,587,027 UART: [fwproc] Received Image of size 118548 bytes
2,931,327 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,037 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,255 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,488 >>> mbox cmd response: success
3,130,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,131,540 UART: [afmc] ++
3,131,708 UART: [afmc] CDI.KEYID = 6
3,132,070 UART: [afmc] SUBJECT.KEYID = 7
3,132,495 UART: [afmc] AUTHORITY.KEYID = 5
3,167,376 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,392 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,172 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,881 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,764 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,447 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,275 UART: [afmc] --
3,210,331 UART: [cold-reset] --
3,211,097 UART: [state] Locking Datavault
3,212,092 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,696 UART: [state] Locking ICCM
3,213,294 UART: [exit] Launching FMC @ 0x40000130
3,218,624 UART:
3,218,640 UART: Running Caliptra FMC ...
3,219,048 UART:
3,219,102 UART: [state] CFI Enabled
3,229,864 UART: [fht] FMC Alias Private Key: 7
3,348,700 UART: [art] Extend RT PCRs Done
3,349,128 UART: [art] Lock RT PCRs Done
3,350,376 UART: [art] Populate DV Done
3,358,519 UART: [fht] FMC Alias Private Key: 7
3,359,687 UART: [art] Derive CDI
3,359,967 UART: [art] Store in slot 0x4
3,445,359 UART: [art] Derive Key Pair
3,445,719 UART: [art] Store priv key in slot 0x5
3,459,164 UART: [art] Derive Key Pair - Done
3,473,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,481 UART: [art] PUB.X = 61EF6AF689E4538289C2B4DF815C45EFDB4E5BF71981A9A0D5F6FE5D58A886DE77625EF43DA79D17ED5F867A36A662E0
3,497,265 UART: [art] PUB.Y = A65BC2A677DFEFD791B49619C6F099E7D92E64FEFCAD5034A20B47C831F6DE61442BC2D2BA7039BCD75063C12B0175C6
3,504,223 UART: [art] SIG.R = 4AE520278A0D88A3E32E7D9EC88D0C35ADF87F7FF2D2FBBCB6803D82C068B2009129BC6E6D9EAAEE624F69DAD5458FA6
3,510,987 UART: [art] SIG.S = C3526EFFE2338AECBDDCA11A07D344F466A550647A51EA73283B13725D7F8714FF90DF9064F8529CFB89E2369660B91D
3,535,542 UART: Caliptra RT
3,535,793 UART: [state] CFI Enabled
3,655,789 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,957 UART: [rt]cmd =0x4d454153, len=108
3,707,569 >>> mbox cmd response data (12 bytes)
3,707,570 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,737,335 UART: [rt]cmd =0x44504543, len=92
3,929,086 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,271 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,941 UART: [kat] SHA2-256
881,872 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,987 UART: [kat] ++
886,139 UART: [kat] sha1
890,371 UART: [kat] SHA2-256
892,309 UART: [kat] SHA2-384
895,084 UART: [kat] SHA2-512-ACC
896,985 UART: [kat] ECC-384
902,498 UART: [kat] HMAC-384Kdf
907,128 UART: [kat] LMS
1,475,324 UART: [kat] --
1,476,135 UART: [cold-reset] ++
1,476,541 UART: [fht] Storing FHT @ 0x50003400
1,479,448 UART: [idev] ++
1,479,616 UART: [idev] CDI.KEYID = 6
1,479,976 UART: [idev] SUBJECT.KEYID = 7
1,480,400 UART: [idev] UDS.KEYID = 0
1,480,745 ready_for_fw is high
1,480,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,652 UART: [idev] Erasing UDS.KEYID = 0
1,505,250 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,904 UART: [idev] --
1,514,755 UART: [ldev] ++
1,514,923 UART: [ldev] CDI.KEYID = 6
1,515,286 UART: [ldev] SUBJECT.KEYID = 5
1,515,712 UART: [ldev] AUTHORITY.KEYID = 7
1,516,175 UART: [ldev] FE.KEYID = 1
1,521,527 UART: [ldev] Erasing FE.KEYID = 1
1,547,052 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,278 UART: [ldev] --
1,586,721 UART: [fwproc] Waiting for Commands...
1,587,484 UART: [fwproc] Received command 0x46574c44
1,588,275 UART: [fwproc] Received Image of size 118548 bytes
2,932,507 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,287 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,505 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,796 >>> mbox cmd response: success
3,131,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,958 UART: [afmc] ++
3,133,126 UART: [afmc] CDI.KEYID = 6
3,133,488 UART: [afmc] SUBJECT.KEYID = 7
3,133,913 UART: [afmc] AUTHORITY.KEYID = 5
3,169,780 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,068 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,848 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,557 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,440 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,123 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,051 UART: [afmc] --
3,213,135 UART: [cold-reset] --
3,213,895 UART: [state] Locking Datavault
3,215,102 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,706 UART: [state] Locking ICCM
3,216,254 UART: [exit] Launching FMC @ 0x40000130
3,221,584 UART:
3,221,600 UART: Running Caliptra FMC ...
3,222,008 UART:
3,222,062 UART: [state] CFI Enabled
3,232,228 UART: [fht] FMC Alias Private Key: 7
3,351,372 UART: [art] Extend RT PCRs Done
3,351,800 UART: [art] Lock RT PCRs Done
3,353,344 UART: [art] Populate DV Done
3,361,569 UART: [fht] FMC Alias Private Key: 7
3,362,695 UART: [art] Derive CDI
3,362,975 UART: [art] Store in slot 0x4
3,448,753 UART: [art] Derive Key Pair
3,449,113 UART: [art] Store priv key in slot 0x5
3,461,780 UART: [art] Derive Key Pair - Done
3,476,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,345 UART: [art] PUB.X = 61EF6AF689E4538289C2B4DF815C45EFDB4E5BF71981A9A0D5F6FE5D58A886DE77625EF43DA79D17ED5F867A36A662E0
3,500,129 UART: [art] PUB.Y = A65BC2A677DFEFD791B49619C6F099E7D92E64FEFCAD5034A20B47C831F6DE61442BC2D2BA7039BCD75063C12B0175C6
3,507,087 UART: [art] SIG.R = 4AE520278A0D88A3E32E7D9EC88D0C35ADF87F7FF2D2FBBCB6803D82C068B2009129BC6E6D9EAAEE624F69DAD5458FA6
3,513,851 UART: [art] SIG.S = C3526EFFE2338AECBDDCA11A07D344F466A550647A51EA73283B13725D7F8714FF90DF9064F8529CFB89E2369660B91D
3,537,184 UART: Caliptra RT
3,537,435 UART: [state] CFI Enabled
3,658,073 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,013 UART: [rt]cmd =0x44504543, len=96
3,722,793 >>> mbox cmd response data (56 bytes)
3,722,794 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,752,573 UART: [rt]cmd =0x44504543, len=92
3,945,020 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,639 >>> mbox cmd response data (12 bytes)
1,444,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,985,649 >>> mbox cmd response: success
2,985,649 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,047,362 UART:
3,047,378 UART: Running Caliptra FMC ...
3,047,786 UART:
3,047,840 UART: [state] CFI Enabled
3,058,438 UART: [fht] FMC Alias Private Key: 7
3,176,804 UART: [art] Extend RT PCRs Done
3,177,232 UART: [art] Lock RT PCRs Done
3,178,780 UART: [art] Populate DV Done
3,187,043 UART: [fht] FMC Alias Private Key: 7
3,188,113 UART: [art] Derive CDI
3,188,393 UART: [art] Store in slot 0x4
3,273,947 UART: [art] Derive Key Pair
3,274,307 UART: [art] Store priv key in slot 0x5
3,287,552 UART: [art] Derive Key Pair - Done
3,302,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,318,405 UART: [art] Erasing AUTHORITY.KEYID = 7
3,319,170 UART: [art] PUB.X = 30739DA011032A410E0EFA64D9CA14FFD9A324C5BE9FA142BE1905CB1FB7801CC30FD17D0966FBE96CF6D8F8D0CB4CDE
3,325,946 UART: [art] PUB.Y = 702091CAFDD8827E56D56B54DC60D0E49537F38ECD6A3B30317759EE3A87B06BE43BE5FA4E2CB8D74C595E0B979712E3
3,332,903 UART: [art] SIG.R = 6D5882858A56FDC6DC71DE8747254CD65F5AA19F8C90FB5DF7885C8F39833DA24F8DEDD335E6E0162C3CA3AEDEA434D1
3,339,691 UART: [art] SIG.S = 97F3961949A89F99FDA9EAFDC0F240B6CB9179ACDF0498A6280E835E222B71AB7C2767E07E561B2FE8609D78A383502C
3,364,251 UART: Caliptra RT
3,364,502 UART: [state] CFI Enabled
3,497,344 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,528,460 UART: [rt]cmd =0x44504543, len=92
3,720,496 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,339 ready_for_fw is high
1,363,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,282 >>> mbox cmd response: success
2,982,282 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,043,631 UART:
3,043,647 UART: Running Caliptra FMC ...
3,044,055 UART:
3,044,109 UART: [state] CFI Enabled
3,054,905 UART: [fht] FMC Alias Private Key: 7
3,173,533 UART: [art] Extend RT PCRs Done
3,173,961 UART: [art] Lock RT PCRs Done
3,175,619 UART: [art] Populate DV Done
3,183,428 UART: [fht] FMC Alias Private Key: 7
3,184,386 UART: [art] Derive CDI
3,184,666 UART: [art] Store in slot 0x4
3,270,316 UART: [art] Derive Key Pair
3,270,676 UART: [art] Store priv key in slot 0x5
3,283,967 UART: [art] Derive Key Pair - Done
3,298,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,543 UART: [art] PUB.X = 30739DA011032A410E0EFA64D9CA14FFD9A324C5BE9FA142BE1905CB1FB7801CC30FD17D0966FBE96CF6D8F8D0CB4CDE
3,321,319 UART: [art] PUB.Y = 702091CAFDD8827E56D56B54DC60D0E49537F38ECD6A3B30317759EE3A87B06BE43BE5FA4E2CB8D74C595E0B979712E3
3,328,276 UART: [art] SIG.R = 6D5882858A56FDC6DC71DE8747254CD65F5AA19F8C90FB5DF7885C8F39833DA24F8DEDD335E6E0162C3CA3AEDEA434D1
3,335,064 UART: [art] SIG.S = 97F3961949A89F99FDA9EAFDC0F240B6CB9179ACDF0498A6280E835E222B71AB7C2767E07E561B2FE8609D78A383502C
3,359,308 UART: Caliptra RT
3,359,559 UART: [state] CFI Enabled
3,479,173 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,419 UART: [rt]cmd =0x4d454153, len=108
3,531,055 >>> mbox cmd response data (12 bytes)
3,531,056 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,560,793 UART: [rt]cmd =0x44504543, len=92
3,753,569 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,499 ready_for_fw is high
1,362,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,314 >>> mbox cmd response: success
2,980,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,417 UART:
3,042,433 UART: Running Caliptra FMC ...
3,042,841 UART:
3,042,895 UART: [state] CFI Enabled
3,053,351 UART: [fht] FMC Alias Private Key: 7
3,172,519 UART: [art] Extend RT PCRs Done
3,172,947 UART: [art] Lock RT PCRs Done
3,174,321 UART: [art] Populate DV Done
3,182,610 UART: [fht] FMC Alias Private Key: 7
3,183,592 UART: [art] Derive CDI
3,183,872 UART: [art] Store in slot 0x4
3,269,550 UART: [art] Derive Key Pair
3,269,910 UART: [art] Store priv key in slot 0x5
3,283,417 UART: [art] Derive Key Pair - Done
3,298,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,664 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,429 UART: [art] PUB.X = 30739DA011032A410E0EFA64D9CA14FFD9A324C5BE9FA142BE1905CB1FB7801CC30FD17D0966FBE96CF6D8F8D0CB4CDE
3,321,205 UART: [art] PUB.Y = 702091CAFDD8827E56D56B54DC60D0E49537F38ECD6A3B30317759EE3A87B06BE43BE5FA4E2CB8D74C595E0B979712E3
3,328,162 UART: [art] SIG.R = 6D5882858A56FDC6DC71DE8747254CD65F5AA19F8C90FB5DF7885C8F39833DA24F8DEDD335E6E0162C3CA3AEDEA434D1
3,334,950 UART: [art] SIG.S = 97F3961949A89F99FDA9EAFDC0F240B6CB9179ACDF0498A6280E835E222B71AB7C2767E07E561B2FE8609D78A383502C
3,359,140 UART: Caliptra RT
3,359,391 UART: [state] CFI Enabled
3,479,381 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,419 UART: [rt]cmd =0x44504543, len=96
3,543,713 >>> mbox cmd response data (56 bytes)
3,543,714 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,709 UART: [rt]cmd =0x44504543, len=92
3,765,095 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.98s
Truncated 4904 bytes from beginning
PUB.X = CE2AFCAF729431D73CB592F62A9AD83DD0729C6456F69FA109C507C06E66DFC80AE7C8C8999726261EBE1119905B9A59
3,501,966 UART: [art] PUB.Y = EDA8944F026E274F67B8FC249AF0CB681DF4E035594C2D4607CDA488E25A8EAECC5CF368EA67EDF6C57D7258C982BC4E
3,508,930 UART: [art] SIG.R = 852C2315535920B659EF3B3E6614E46A686720D5D955FE7F4E25E997904D38367B14187132BC40342322A7FF0797DBED
3,515,687 UART: [art] SIG.S = FAC4047990823F9C79D53DFC99355C480A1BDC6F56579E1B20F2B1492AAEAE97747374CDCB8AFDCAFCCBCAB7E331B3FE
3,539,793 UART: Caliptra RT
3,540,136 UART: [state] CFI Enabled
3,672,713 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,703,695 UART: [rt]cmd =0x44504543, len=92
3,895,208 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,692 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,370 UART: [kat] SHA2-256
882,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,416 UART: [kat] ++
886,568 UART: [kat] sha1
890,934 UART: [kat] SHA2-256
892,872 UART: [kat] SHA2-384
895,709 UART: [kat] SHA2-512-ACC
897,610 UART: [kat] ECC-384
903,137 UART: [kat] HMAC-384Kdf
907,797 UART: [kat] LMS
1,475,993 UART: [kat] --
1,476,778 UART: [cold-reset] ++
1,477,144 UART: [fht] Storing FHT @ 0x50003400
1,480,005 UART: [idev] ++
1,480,173 UART: [idev] CDI.KEYID = 6
1,480,533 UART: [idev] SUBJECT.KEYID = 7
1,480,957 UART: [idev] UDS.KEYID = 0
1,481,302 ready_for_fw is high
1,481,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,121 UART: [idev] Erasing UDS.KEYID = 0
1,505,633 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,225 UART: [idev] --
1,515,246 UART: [ldev] ++
1,515,414 UART: [ldev] CDI.KEYID = 6
1,515,777 UART: [ldev] SUBJECT.KEYID = 5
1,516,203 UART: [ldev] AUTHORITY.KEYID = 7
1,516,666 UART: [ldev] FE.KEYID = 1
1,521,964 UART: [ldev] Erasing FE.KEYID = 1
1,547,827 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,969 UART: [ldev] --
1,587,446 UART: [fwproc] Waiting for Commands...
1,588,159 UART: [fwproc] Received command 0x46574c44
1,588,950 UART: [fwproc] Received Image of size 118548 bytes
2,933,520 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,908 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,126 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,509 >>> mbox cmd response: success
3,132,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,133,605 UART: [afmc] ++
3,133,773 UART: [afmc] CDI.KEYID = 6
3,134,135 UART: [afmc] SUBJECT.KEYID = 7
3,134,560 UART: [afmc] AUTHORITY.KEYID = 5
3,170,121 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,405 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,185 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,894 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,777 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,460 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,338 UART: [afmc] --
3,213,262 UART: [cold-reset] --
3,214,014 UART: [state] Locking Datavault
3,214,983 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,587 UART: [state] Locking ICCM
3,216,083 UART: [exit] Launching FMC @ 0x40000130
3,221,413 UART:
3,221,429 UART: Running Caliptra FMC ...
3,221,837 UART:
3,221,980 UART: [state] CFI Enabled
3,232,390 UART: [fht] FMC Alias Private Key: 7
3,351,354 UART: [art] Extend RT PCRs Done
3,351,782 UART: [art] Lock RT PCRs Done
3,353,090 UART: [art] Populate DV Done
3,361,399 UART: [fht] FMC Alias Private Key: 7
3,362,509 UART: [art] Derive CDI
3,362,789 UART: [art] Store in slot 0x4
3,448,875 UART: [art] Derive Key Pair
3,449,235 UART: [art] Store priv key in slot 0x5
3,462,706 UART: [art] Derive Key Pair - Done
3,477,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,326 UART: [art] PUB.X = CE2AFCAF729431D73CB592F62A9AD83DD0729C6456F69FA109C507C06E66DFC80AE7C8C8999726261EBE1119905B9A59
3,500,095 UART: [art] PUB.Y = EDA8944F026E274F67B8FC249AF0CB681DF4E035594C2D4607CDA488E25A8EAECC5CF368EA67EDF6C57D7258C982BC4E
3,507,059 UART: [art] SIG.R = 852C2315535920B659EF3B3E6614E46A686720D5D955FE7F4E25E997904D38367B14187132BC40342322A7FF0797DBED
3,513,816 UART: [art] SIG.S = FAC4047990823F9C79D53DFC99355C480A1BDC6F56579E1B20F2B1492AAEAE97747374CDCB8AFDCAFCCBCAB7E331B3FE
3,538,088 UART: Caliptra RT
3,538,431 UART: [state] CFI Enabled
3,658,764 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,224 UART: [rt]cmd =0x4d454153, len=108
3,710,892 >>> mbox cmd response data (12 bytes)
3,710,893 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,042 UART: [rt]cmd =0x44504543, len=92
3,932,685 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,031 UART: [state] LifecycleState = Unprovisioned
85,686 UART: [state] DebugLocked = No
86,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,928 UART: [kat] SHA2-256
881,859 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,974 UART: [kat] ++
886,126 UART: [kat] sha1
890,434 UART: [kat] SHA2-256
892,372 UART: [kat] SHA2-384
895,005 UART: [kat] SHA2-512-ACC
896,906 UART: [kat] ECC-384
902,273 UART: [kat] HMAC-384Kdf
907,123 UART: [kat] LMS
1,475,319 UART: [kat] --
1,476,356 UART: [cold-reset] ++
1,476,802 UART: [fht] Storing FHT @ 0x50003400
1,479,783 UART: [idev] ++
1,479,951 UART: [idev] CDI.KEYID = 6
1,480,311 UART: [idev] SUBJECT.KEYID = 7
1,480,735 UART: [idev] UDS.KEYID = 0
1,481,080 ready_for_fw is high
1,481,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,751 UART: [idev] Erasing UDS.KEYID = 0
1,505,375 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,023 UART: [idev] --
1,515,102 UART: [ldev] ++
1,515,270 UART: [ldev] CDI.KEYID = 6
1,515,633 UART: [ldev] SUBJECT.KEYID = 5
1,516,059 UART: [ldev] AUTHORITY.KEYID = 7
1,516,522 UART: [ldev] FE.KEYID = 1
1,521,726 UART: [ldev] Erasing FE.KEYID = 1
1,547,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,269 UART: [ldev] --
1,586,568 UART: [fwproc] Waiting for Commands...
1,587,319 UART: [fwproc] Received command 0x46574c44
1,588,110 UART: [fwproc] Received Image of size 118548 bytes
2,932,850 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,546 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,764 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,995 >>> mbox cmd response: success
3,131,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,133,241 UART: [afmc] ++
3,133,409 UART: [afmc] CDI.KEYID = 6
3,133,771 UART: [afmc] SUBJECT.KEYID = 7
3,134,196 UART: [afmc] AUTHORITY.KEYID = 5
3,169,501 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,847 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,627 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,336 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,219 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,902 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,816 UART: [afmc] --
3,212,694 UART: [cold-reset] --
3,213,584 UART: [state] Locking Datavault
3,214,873 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,477 UART: [state] Locking ICCM
3,215,973 UART: [exit] Launching FMC @ 0x40000130
3,221,303 UART:
3,221,319 UART: Running Caliptra FMC ...
3,221,727 UART:
3,221,870 UART: [state] CFI Enabled
3,231,918 UART: [fht] FMC Alias Private Key: 7
3,350,664 UART: [art] Extend RT PCRs Done
3,351,092 UART: [art] Lock RT PCRs Done
3,352,736 UART: [art] Populate DV Done
3,360,863 UART: [fht] FMC Alias Private Key: 7
3,361,947 UART: [art] Derive CDI
3,362,227 UART: [art] Store in slot 0x4
3,447,645 UART: [art] Derive Key Pair
3,448,005 UART: [art] Store priv key in slot 0x5
3,461,432 UART: [art] Derive Key Pair - Done
3,476,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,132 UART: [art] PUB.X = CE2AFCAF729431D73CB592F62A9AD83DD0729C6456F69FA109C507C06E66DFC80AE7C8C8999726261EBE1119905B9A59
3,498,901 UART: [art] PUB.Y = EDA8944F026E274F67B8FC249AF0CB681DF4E035594C2D4607CDA488E25A8EAECC5CF368EA67EDF6C57D7258C982BC4E
3,505,865 UART: [art] SIG.R = 852C2315535920B659EF3B3E6614E46A686720D5D955FE7F4E25E997904D38367B14187132BC40342322A7FF0797DBED
3,512,622 UART: [art] SIG.S = FAC4047990823F9C79D53DFC99355C480A1BDC6F56579E1B20F2B1492AAEAE97747374CDCB8AFDCAFCCBCAB7E331B3FE
3,536,842 UART: Caliptra RT
3,537,185 UART: [state] CFI Enabled
3,657,762 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,018 UART: [rt]cmd =0x44504543, len=96
3,721,134 >>> mbox cmd response data (56 bytes)
3,721,135 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,102 UART: [rt]cmd =0x44504543, len=92
3,943,809 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,398 >>> mbox cmd response data (12 bytes)
1,444,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,742 >>> mbox cmd response: success
2,983,742 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,045,453 UART:
3,045,469 UART: Running Caliptra FMC ...
3,045,877 UART:
3,046,020 UART: [state] CFI Enabled
3,056,906 UART: [fht] FMC Alias Private Key: 7
3,175,608 UART: [art] Extend RT PCRs Done
3,176,036 UART: [art] Lock RT PCRs Done
3,177,692 UART: [art] Populate DV Done
3,185,895 UART: [fht] FMC Alias Private Key: 7
3,186,971 UART: [art] Derive CDI
3,187,251 UART: [art] Store in slot 0x4
3,273,123 UART: [art] Derive Key Pair
3,273,483 UART: [art] Store priv key in slot 0x5
3,286,764 UART: [art] Derive Key Pair - Done
3,301,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,517 UART: [art] PUB.X = 576528B928E7D0A15479D90A29E00A5C8F2B9336F12CD43936F4A49BA385442D8B0E5374B815E8C80F8C670FD6A14891
3,324,268 UART: [art] PUB.Y = ACEED4DB87C3C3C90E2B573CB54D029477AFC9E8D6F07982BC0DE3F8F7480DF41AAA934C914766390252DA485205D462
3,331,210 UART: [art] SIG.R = 8F0A1B82E8C7DF63FEDAE5C363459CC29D862AD01A482BAC310CDF1996F419592C31EB5F5B2EDE7A2BC4B9A9BA54C259
3,337,996 UART: [art] SIG.S = 88728011EF52D05A41695B11FCD5D2F1B3C28666238059CEFF7A947BAD405099439DDBD9A24D52CC166BC4082665B91F
3,361,837 UART: Caliptra RT
3,362,180 UART: [state] CFI Enabled
3,494,843 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,937 UART: [rt]cmd =0x44504543, len=92
3,717,592 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,684 ready_for_fw is high
1,363,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,679 >>> mbox cmd response: success
2,981,679 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,043,350 UART:
3,043,366 UART: Running Caliptra FMC ...
3,043,774 UART:
3,043,917 UART: [state] CFI Enabled
3,054,507 UART: [fht] FMC Alias Private Key: 7
3,173,215 UART: [art] Extend RT PCRs Done
3,173,643 UART: [art] Lock RT PCRs Done
3,174,833 UART: [art] Populate DV Done
3,183,162 UART: [fht] FMC Alias Private Key: 7
3,184,178 UART: [art] Derive CDI
3,184,458 UART: [art] Store in slot 0x4
3,270,050 UART: [art] Derive Key Pair
3,270,410 UART: [art] Store priv key in slot 0x5
3,284,055 UART: [art] Derive Key Pair - Done
3,298,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,268 UART: [art] PUB.X = 576528B928E7D0A15479D90A29E00A5C8F2B9336F12CD43936F4A49BA385442D8B0E5374B815E8C80F8C670FD6A14891
3,322,019 UART: [art] PUB.Y = ACEED4DB87C3C3C90E2B573CB54D029477AFC9E8D6F07982BC0DE3F8F7480DF41AAA934C914766390252DA485205D462
3,328,961 UART: [art] SIG.R = 8F0A1B82E8C7DF63FEDAE5C363459CC29D862AD01A482BAC310CDF1996F419592C31EB5F5B2EDE7A2BC4B9A9BA54C259
3,335,747 UART: [art] SIG.S = 88728011EF52D05A41695B11FCD5D2F1B3C28666238059CEFF7A947BAD405099439DDBD9A24D52CC166BC4082665B91F
3,359,886 UART: Caliptra RT
3,360,229 UART: [state] CFI Enabled
3,480,348 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,650 UART: [rt]cmd =0x4d454153, len=108
3,532,278 >>> mbox cmd response data (12 bytes)
3,532,279 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,562,160 UART: [rt]cmd =0x44504543, len=92
3,754,427 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,340 ready_for_fw is high
1,363,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,601 >>> mbox cmd response: success
2,980,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,910 UART:
3,042,926 UART: Running Caliptra FMC ...
3,043,334 UART:
3,043,477 UART: [state] CFI Enabled
3,054,419 UART: [fht] FMC Alias Private Key: 7
3,174,183 UART: [art] Extend RT PCRs Done
3,174,611 UART: [art] Lock RT PCRs Done
3,175,887 UART: [art] Populate DV Done
3,184,208 UART: [fht] FMC Alias Private Key: 7
3,185,236 UART: [art] Derive CDI
3,185,516 UART: [art] Store in slot 0x4
3,271,672 UART: [art] Derive Key Pair
3,272,032 UART: [art] Store priv key in slot 0x5
3,284,749 UART: [art] Derive Key Pair - Done
3,299,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,696 UART: [art] PUB.X = 576528B928E7D0A15479D90A29E00A5C8F2B9336F12CD43936F4A49BA385442D8B0E5374B815E8C80F8C670FD6A14891
3,322,447 UART: [art] PUB.Y = ACEED4DB87C3C3C90E2B573CB54D029477AFC9E8D6F07982BC0DE3F8F7480DF41AAA934C914766390252DA485205D462
3,329,389 UART: [art] SIG.R = 8F0A1B82E8C7DF63FEDAE5C363459CC29D862AD01A482BAC310CDF1996F419592C31EB5F5B2EDE7A2BC4B9A9BA54C259
3,336,175 UART: [art] SIG.S = 88728011EF52D05A41695B11FCD5D2F1B3C28666238059CEFF7A947BAD405099439DDBD9A24D52CC166BC4082665B91F
3,360,130 UART: Caliptra RT
3,360,473 UART: [state] CFI Enabled
3,481,252 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,516 UART: [rt]cmd =0x44504543, len=96
3,545,640 >>> mbox cmd response data (56 bytes)
3,545,641 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,575,814 UART: [rt]cmd =0x44504543, len=92
3,768,153 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.08s
Truncated 4681 bytes from beginning
r - Done
3,173,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,703 UART: [art] PUB.X = B6CE6EB45E22F57E7B9001D71DA74231422FBF001057DCC5C6E57DAB5024E2C205B2C172BE00EC25BADED20C0725C28F
3,196,433 UART: [art] PUB.Y = 315762D8A78E5F11EF66EE1416FED4D5699702D50381E2494889FC3AC2D004D63266CD6062D2766BAD676376D00D3763
3,203,365 UART: [art] SIG.R = F1ADF27166071C3E61D51F0726B3C428202E55642F67D9B632EA1735102A87C51D546337F9E0FD6FD5411552E944E635
3,210,121 UART: [art] SIG.S = 1ADFA9BC8DC54321CA92F349A46A5ECE820792D7C8B3F2C1FD14BD9CA3ACDC1A503AE248FE68800FC88603A88146B98F
3,234,104 UART: Caliptra RT
3,234,355 UART: [state] CFI Enabled
3,366,708 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,720 UART: [rt]cmd =0x44504543, len=92
3,590,470 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,678 UART: [state] LifecycleState = Unprovisioned
86,333 UART: [state] DebugLocked = No
86,935 UART: [state] WD Timer not started. Device not locked for debugging
88,236 UART: [kat] SHA2-256
891,786 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,890 UART: [kat] ++
896,042 UART: [kat] sha1
900,342 UART: [kat] SHA2-256
902,282 UART: [kat] SHA2-384
905,125 UART: [kat] SHA2-512-ACC
907,026 UART: [kat] ECC-384
916,889 UART: [kat] HMAC-384Kdf
921,369 UART: [kat] LMS
1,169,681 UART: [kat] --
1,170,596 UART: [cold-reset] ++
1,171,152 UART: [fht] FHT @ 0x50003400
1,173,856 UART: [idev] ++
1,174,024 UART: [idev] CDI.KEYID = 6
1,174,385 UART: [idev] SUBJECT.KEYID = 7
1,174,810 UART: [idev] UDS.KEYID = 0
1,175,156 ready_for_fw is high
1,175,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,581 UART: [idev] Erasing UDS.KEYID = 0
1,198,969 UART: [idev] Sha1 KeyId Algorithm
1,207,933 UART: [idev] --
1,209,134 UART: [ldev] ++
1,209,302 UART: [ldev] CDI.KEYID = 6
1,209,666 UART: [ldev] SUBJECT.KEYID = 5
1,210,093 UART: [ldev] AUTHORITY.KEYID = 7
1,210,556 UART: [ldev] FE.KEYID = 1
1,216,076 UART: [ldev] Erasing FE.KEYID = 1
1,242,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,888 UART: [ldev] --
1,281,175 UART: [fwproc] Wait for Commands...
1,281,912 UART: [fwproc] Recv command 0x46574c44
1,282,645 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,335 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,510 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,763 >>> mbox cmd response: success
2,826,763 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,827,869 UART: [afmc] ++
2,828,037 UART: [afmc] CDI.KEYID = 6
2,828,400 UART: [afmc] SUBJECT.KEYID = 7
2,828,826 UART: [afmc] AUTHORITY.KEYID = 5
2,864,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,973 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,683 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,564 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,265 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,166 UART: [afmc] --
2,908,197 UART: [cold-reset] --
2,909,199 UART: [state] Locking Datavault
2,910,470 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,074 UART: [state] Locking ICCM
2,911,692 UART: [exit] Launching FMC @ 0x40000130
2,917,022 UART:
2,917,038 UART: Running Caliptra FMC ...
2,917,446 UART:
2,917,500 UART: [state] CFI Enabled
2,927,662 UART: [fht] FMC Alias Private Key: 7
3,046,598 UART: [art] Extend RT PCRs Done
3,047,026 UART: [art] Lock RT PCRs Done
3,048,618 UART: [art] Populate DV Done
3,056,821 UART: [fht] FMC Alias Private Key: 7
3,057,799 UART: [art] Derive CDI
3,058,079 UART: [art] Store in slot 0x4
3,143,810 UART: [art] Derive Key Pair
3,144,170 UART: [art] Store priv key in slot 0x5
3,157,226 UART: [art] Derive Key Pair - Done
3,172,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,408 UART: [art] PUB.X = B6CE6EB45E22F57E7B9001D71DA74231422FBF001057DCC5C6E57DAB5024E2C205B2C172BE00EC25BADED20C0725C28F
3,195,138 UART: [art] PUB.Y = 315762D8A78E5F11EF66EE1416FED4D5699702D50381E2494889FC3AC2D004D63266CD6062D2766BAD676376D00D3763
3,202,070 UART: [art] SIG.R = F1ADF27166071C3E61D51F0726B3C428202E55642F67D9B632EA1735102A87C51D546337F9E0FD6FD5411552E944E635
3,208,826 UART: [art] SIG.S = 1ADFA9BC8DC54321CA92F349A46A5ECE820792D7C8B3F2C1FD14BD9CA3ACDC1A503AE248FE68800FC88603A88146B98F
3,232,815 UART: Caliptra RT
3,233,066 UART: [state] CFI Enabled
3,352,667 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,915 UART: [rt]cmd =0x4d454153, len=108
3,404,703 >>> mbox cmd response data (12 bytes)
3,404,704 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,707 UART: [rt]cmd =0x44504543, len=92
3,627,499 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,672 UART: [state] LifecycleState = Unprovisioned
85,327 UART: [state] DebugLocked = No
85,873 UART: [state] WD Timer not started. Device not locked for debugging
87,194 UART: [kat] SHA2-256
890,744 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,848 UART: [kat] ++
895,000 UART: [kat] sha1
899,298 UART: [kat] SHA2-256
901,238 UART: [kat] SHA2-384
904,181 UART: [kat] SHA2-512-ACC
906,082 UART: [kat] ECC-384
916,229 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,169,914 UART: [cold-reset] ++
1,170,382 UART: [fht] FHT @ 0x50003400
1,173,264 UART: [idev] ++
1,173,432 UART: [idev] CDI.KEYID = 6
1,173,793 UART: [idev] SUBJECT.KEYID = 7
1,174,218 UART: [idev] UDS.KEYID = 0
1,174,564 ready_for_fw is high
1,174,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,441 UART: [idev] Erasing UDS.KEYID = 0
1,199,247 UART: [idev] Sha1 KeyId Algorithm
1,208,181 UART: [idev] --
1,209,390 UART: [ldev] ++
1,209,558 UART: [ldev] CDI.KEYID = 6
1,209,922 UART: [ldev] SUBJECT.KEYID = 5
1,210,349 UART: [ldev] AUTHORITY.KEYID = 7
1,210,812 UART: [ldev] FE.KEYID = 1
1,216,118 UART: [ldev] Erasing FE.KEYID = 1
1,242,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,284 UART: [ldev] --
1,281,611 UART: [fwproc] Wait for Commands...
1,282,388 UART: [fwproc] Recv command 0x46574c44
1,283,121 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,313 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,488 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,743 >>> mbox cmd response: success
2,826,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,803 UART: [afmc] ++
2,827,971 UART: [afmc] CDI.KEYID = 6
2,828,334 UART: [afmc] SUBJECT.KEYID = 7
2,828,760 UART: [afmc] AUTHORITY.KEYID = 5
2,863,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,133 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,843 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,724 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,425 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,192 UART: [afmc] --
2,907,205 UART: [cold-reset] --
2,907,907 UART: [state] Locking Datavault
2,909,336 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,940 UART: [state] Locking ICCM
2,910,508 UART: [exit] Launching FMC @ 0x40000130
2,915,838 UART:
2,915,854 UART: Running Caliptra FMC ...
2,916,262 UART:
2,916,316 UART: [state] CFI Enabled
2,926,914 UART: [fht] FMC Alias Private Key: 7
3,045,640 UART: [art] Extend RT PCRs Done
3,046,068 UART: [art] Lock RT PCRs Done
3,047,522 UART: [art] Populate DV Done
3,055,609 UART: [fht] FMC Alias Private Key: 7
3,056,641 UART: [art] Derive CDI
3,056,921 UART: [art] Store in slot 0x4
3,142,870 UART: [art] Derive Key Pair
3,143,230 UART: [art] Store priv key in slot 0x5
3,156,470 UART: [art] Derive Key Pair - Done
3,171,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,427 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,192 UART: [art] PUB.X = B6CE6EB45E22F57E7B9001D71DA74231422FBF001057DCC5C6E57DAB5024E2C205B2C172BE00EC25BADED20C0725C28F
3,193,922 UART: [art] PUB.Y = 315762D8A78E5F11EF66EE1416FED4D5699702D50381E2494889FC3AC2D004D63266CD6062D2766BAD676376D00D3763
3,200,854 UART: [art] SIG.R = F1ADF27166071C3E61D51F0726B3C428202E55642F67D9B632EA1735102A87C51D546337F9E0FD6FD5411552E944E635
3,207,610 UART: [art] SIG.S = 1ADFA9BC8DC54321CA92F349A46A5ECE820792D7C8B3F2C1FD14BD9CA3ACDC1A503AE248FE68800FC88603A88146B98F
3,230,775 UART: Caliptra RT
3,231,026 UART: [state] CFI Enabled
3,350,771 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,131 UART: [rt]cmd =0x44504543, len=96
3,414,495 >>> mbox cmd response data (56 bytes)
3,414,496 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,444,417 UART: [rt]cmd =0x44504543, len=92
3,637,155 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,338 >>> mbox cmd response data (12 bytes)
1,141,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,279 >>> mbox cmd response: success
2,680,279 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,741,858 UART:
2,741,874 UART: Running Caliptra FMC ...
2,742,282 UART:
2,742,336 UART: [state] CFI Enabled
2,752,988 UART: [fht] FMC Alias Private Key: 7
2,872,332 UART: [art] Extend RT PCRs Done
2,872,760 UART: [art] Lock RT PCRs Done
2,874,304 UART: [art] Populate DV Done
2,882,877 UART: [fht] FMC Alias Private Key: 7
2,883,885 UART: [art] Derive CDI
2,884,165 UART: [art] Store in slot 0x4
2,969,540 UART: [art] Derive Key Pair
2,969,900 UART: [art] Store priv key in slot 0x5
2,983,394 UART: [art] Derive Key Pair - Done
2,998,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,387 UART: [art] PUB.X = EA9EBB6D170C1550E5A00B4AC9CA517AB6FEAB5A53B9C8125AEB88637C51C25BD53610045CF01AFC402EDE01154A6D1D
3,021,165 UART: [art] PUB.Y = 0BC220F4A4A375560CDDDD6D21CEC88A8FD75F9B0D55D4D28D3F6992198AB934DD8BE776562573482752B89059916E4A
3,028,110 UART: [art] SIG.R = 2D26177BE8524172BA38477BCDBE80F9A8C4259CE41ED895D5528D92F0AD231C8401F4108BCEF2F80F944A3E57B6B53F
3,034,882 UART: [art] SIG.S = 6F696F92FA9BC5EF3A1D6654708ADB1A8CDB38E0FBCAD61D900A3FD30BF111061B2FCE79319316A9114FEA68CF1A0024
3,059,001 UART: Caliptra RT
3,059,252 UART: [state] CFI Enabled
3,192,056 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,178 UART: [rt]cmd =0x44504543, len=92
3,416,136 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,506 ready_for_fw is high
1,058,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,948 >>> mbox cmd response: success
2,674,948 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,736,495 UART:
2,736,511 UART: Running Caliptra FMC ...
2,736,919 UART:
2,736,973 UART: [state] CFI Enabled
2,747,351 UART: [fht] FMC Alias Private Key: 7
2,866,139 UART: [art] Extend RT PCRs Done
2,866,567 UART: [art] Lock RT PCRs Done
2,867,985 UART: [art] Populate DV Done
2,876,272 UART: [fht] FMC Alias Private Key: 7
2,877,216 UART: [art] Derive CDI
2,877,496 UART: [art] Store in slot 0x4
2,963,131 UART: [art] Derive Key Pair
2,963,491 UART: [art] Store priv key in slot 0x5
2,976,755 UART: [art] Derive Key Pair - Done
2,991,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,009 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,774 UART: [art] PUB.X = EA9EBB6D170C1550E5A00B4AC9CA517AB6FEAB5A53B9C8125AEB88637C51C25BD53610045CF01AFC402EDE01154A6D1D
3,014,552 UART: [art] PUB.Y = 0BC220F4A4A375560CDDDD6D21CEC88A8FD75F9B0D55D4D28D3F6992198AB934DD8BE776562573482752B89059916E4A
3,021,497 UART: [art] SIG.R = 2D26177BE8524172BA38477BCDBE80F9A8C4259CE41ED895D5528D92F0AD231C8401F4108BCEF2F80F944A3E57B6B53F
3,028,269 UART: [art] SIG.S = 6F696F92FA9BC5EF3A1D6654708ADB1A8CDB38E0FBCAD61D900A3FD30BF111061B2FCE79319316A9114FEA68CF1A0024
3,051,830 UART: Caliptra RT
3,052,081 UART: [state] CFI Enabled
3,171,709 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,265 UART: [rt]cmd =0x4d454153, len=108
3,224,433 >>> mbox cmd response data (12 bytes)
3,224,434 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,254,355 UART: [rt]cmd =0x44504543, len=92
3,446,929 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,444 ready_for_fw is high
1,058,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,552 >>> mbox cmd response: success
2,676,552 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,738,865 UART:
2,738,881 UART: Running Caliptra FMC ...
2,739,289 UART:
2,739,343 UART: [state] CFI Enabled
2,750,167 UART: [fht] FMC Alias Private Key: 7
2,869,613 UART: [art] Extend RT PCRs Done
2,870,041 UART: [art] Lock RT PCRs Done
2,871,697 UART: [art] Populate DV Done
2,879,960 UART: [fht] FMC Alias Private Key: 7
2,880,888 UART: [art] Derive CDI
2,881,168 UART: [art] Store in slot 0x4
2,967,015 UART: [art] Derive Key Pair
2,967,375 UART: [art] Store priv key in slot 0x5
2,980,563 UART: [art] Derive Key Pair - Done
2,995,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,603 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,368 UART: [art] PUB.X = EA9EBB6D170C1550E5A00B4AC9CA517AB6FEAB5A53B9C8125AEB88637C51C25BD53610045CF01AFC402EDE01154A6D1D
3,018,146 UART: [art] PUB.Y = 0BC220F4A4A375560CDDDD6D21CEC88A8FD75F9B0D55D4D28D3F6992198AB934DD8BE776562573482752B89059916E4A
3,025,091 UART: [art] SIG.R = 2D26177BE8524172BA38477BCDBE80F9A8C4259CE41ED895D5528D92F0AD231C8401F4108BCEF2F80F944A3E57B6B53F
3,031,863 UART: [art] SIG.S = 6F696F92FA9BC5EF3A1D6654708ADB1A8CDB38E0FBCAD61D900A3FD30BF111061B2FCE79319316A9114FEA68CF1A0024
3,055,790 UART: Caliptra RT
3,056,041 UART: [state] CFI Enabled
3,176,117 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,055 UART: [rt]cmd =0x44504543, len=96
3,240,179 >>> mbox cmd response data (56 bytes)
3,240,180 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,270,181 UART: [rt]cmd =0x44504543, len=92
3,462,661 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.00s
Truncated 4681 bytes from beginning
r - Done
3,177,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,193,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,830 UART: [art] PUB.X = 672F537283768A9E4B2163CCE7DD2EBBE389ADB608E6A638534F174D3C1200FE3DC02FE306C888CCB0B9CF841A7C6078
3,200,582 UART: [art] PUB.Y = 74196722954A30C1539B34929B778811B1970617858032948AFC620B42F94F76F58FA943B027B7F828919A746B64CB31
3,207,506 UART: [art] SIG.R = 92691BE36505121045E50FE4BF73255FC81DE1F6333AAA18659473B5ABE7733C1D764DE78F190DC848050911DD8D87F5
3,214,259 UART: [art] SIG.S = 3B9F38F1E877E39D5366C61F38C349AD019107146095B13EE4A1BD6E75CD7829CC0F7547112463879B83E83446215E10
3,237,308 UART: Caliptra RT
3,237,651 UART: [state] CFI Enabled
3,370,390 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,401,512 UART: [rt]cmd =0x44504543, len=92
3,594,206 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [kat] SHA2-256
891,743 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,847 UART: [kat] ++
895,999 UART: [kat] sha1
900,081 UART: [kat] SHA2-256
902,021 UART: [kat] SHA2-384
904,718 UART: [kat] SHA2-512-ACC
906,619 UART: [kat] ECC-384
916,708 UART: [kat] HMAC-384Kdf
921,376 UART: [kat] LMS
1,169,688 UART: [kat] --
1,170,473 UART: [cold-reset] ++
1,170,827 UART: [fht] FHT @ 0x50003400
1,173,531 UART: [idev] ++
1,173,699 UART: [idev] CDI.KEYID = 6
1,174,060 UART: [idev] SUBJECT.KEYID = 7
1,174,485 UART: [idev] UDS.KEYID = 0
1,174,831 ready_for_fw is high
1,174,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,590 UART: [idev] Erasing UDS.KEYID = 0
1,199,442 UART: [idev] Sha1 KeyId Algorithm
1,208,430 UART: [idev] --
1,209,529 UART: [ldev] ++
1,209,697 UART: [ldev] CDI.KEYID = 6
1,210,061 UART: [ldev] SUBJECT.KEYID = 5
1,210,488 UART: [ldev] AUTHORITY.KEYID = 7
1,210,951 UART: [ldev] FE.KEYID = 1
1,215,943 UART: [ldev] Erasing FE.KEYID = 1
1,242,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,237 UART: [ldev] --
1,281,606 UART: [fwproc] Wait for Commands...
1,282,263 UART: [fwproc] Recv command 0x46574c44
1,282,996 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,064 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,239 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,448 >>> mbox cmd response: success
2,826,448 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,827,546 UART: [afmc] ++
2,827,714 UART: [afmc] CDI.KEYID = 6
2,828,077 UART: [afmc] SUBJECT.KEYID = 7
2,828,503 UART: [afmc] AUTHORITY.KEYID = 5
2,863,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,060 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,770 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,651 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,352 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,209 UART: [afmc] --
2,907,094 UART: [cold-reset] --
2,907,706 UART: [state] Locking Datavault
2,909,087 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,691 UART: [state] Locking ICCM
2,910,169 UART: [exit] Launching FMC @ 0x40000130
2,915,499 UART:
2,915,515 UART: Running Caliptra FMC ...
2,915,923 UART:
2,916,066 UART: [state] CFI Enabled
2,926,404 UART: [fht] FMC Alias Private Key: 7
3,046,178 UART: [art] Extend RT PCRs Done
3,046,606 UART: [art] Lock RT PCRs Done
3,047,862 UART: [art] Populate DV Done
3,055,941 UART: [fht] FMC Alias Private Key: 7
3,057,079 UART: [art] Derive CDI
3,057,359 UART: [art] Store in slot 0x4
3,143,220 UART: [art] Derive Key Pair
3,143,580 UART: [art] Store priv key in slot 0x5
3,156,976 UART: [art] Derive Key Pair - Done
3,171,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,129 UART: [art] PUB.X = 672F537283768A9E4B2163CCE7DD2EBBE389ADB608E6A638534F174D3C1200FE3DC02FE306C888CCB0B9CF841A7C6078
3,194,881 UART: [art] PUB.Y = 74196722954A30C1539B34929B778811B1970617858032948AFC620B42F94F76F58FA943B027B7F828919A746B64CB31
3,201,805 UART: [art] SIG.R = 92691BE36505121045E50FE4BF73255FC81DE1F6333AAA18659473B5ABE7733C1D764DE78F190DC848050911DD8D87F5
3,208,558 UART: [art] SIG.S = 3B9F38F1E877E39D5366C61F38C349AD019107146095B13EE4A1BD6E75CD7829CC0F7547112463879B83E83446215E10
3,232,115 UART: Caliptra RT
3,232,458 UART: [state] CFI Enabled
3,351,233 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,793 UART: [rt]cmd =0x4d454153, len=108
3,403,573 >>> mbox cmd response data (12 bytes)
3,403,574 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,603 UART: [rt]cmd =0x44504543, len=92
3,626,199 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
891,211 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
916,150 UART: [kat] HMAC-384Kdf
920,610 UART: [kat] LMS
1,168,922 UART: [kat] --
1,169,829 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,172,995 UART: [idev] ++
1,173,163 UART: [idev] CDI.KEYID = 6
1,173,524 UART: [idev] SUBJECT.KEYID = 7
1,173,949 UART: [idev] UDS.KEYID = 0
1,174,295 ready_for_fw is high
1,174,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,550 UART: [idev] Erasing UDS.KEYID = 0
1,198,672 UART: [idev] Sha1 KeyId Algorithm
1,207,588 UART: [idev] --
1,208,603 UART: [ldev] ++
1,208,771 UART: [ldev] CDI.KEYID = 6
1,209,135 UART: [ldev] SUBJECT.KEYID = 5
1,209,562 UART: [ldev] AUTHORITY.KEYID = 7
1,210,025 UART: [ldev] FE.KEYID = 1
1,215,431 UART: [ldev] Erasing FE.KEYID = 1
1,242,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,613 UART: [ldev] --
1,282,066 UART: [fwproc] Wait for Commands...
1,282,653 UART: [fwproc] Recv command 0x46574c44
1,283,386 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,792 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,967 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,298 >>> mbox cmd response: success
2,826,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,350 UART: [afmc] ++
2,827,518 UART: [afmc] CDI.KEYID = 6
2,827,881 UART: [afmc] SUBJECT.KEYID = 7
2,828,307 UART: [afmc] AUTHORITY.KEYID = 5
2,864,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,536 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,246 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,127 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,828 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,401 UART: [afmc] --
2,907,392 UART: [cold-reset] --
2,908,214 UART: [state] Locking Datavault
2,909,435 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,039 UART: [state] Locking ICCM
2,910,709 UART: [exit] Launching FMC @ 0x40000130
2,916,039 UART:
2,916,055 UART: Running Caliptra FMC ...
2,916,463 UART:
2,916,606 UART: [state] CFI Enabled
2,927,140 UART: [fht] FMC Alias Private Key: 7
3,046,322 UART: [art] Extend RT PCRs Done
3,046,750 UART: [art] Lock RT PCRs Done
3,048,646 UART: [art] Populate DV Done
3,056,919 UART: [fht] FMC Alias Private Key: 7
3,058,001 UART: [art] Derive CDI
3,058,281 UART: [art] Store in slot 0x4
3,144,052 UART: [art] Derive Key Pair
3,144,412 UART: [art] Store priv key in slot 0x5
3,157,840 UART: [art] Derive Key Pair - Done
3,172,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,705 UART: [art] PUB.X = 672F537283768A9E4B2163CCE7DD2EBBE389ADB608E6A638534F174D3C1200FE3DC02FE306C888CCB0B9CF841A7C6078
3,195,457 UART: [art] PUB.Y = 74196722954A30C1539B34929B778811B1970617858032948AFC620B42F94F76F58FA943B027B7F828919A746B64CB31
3,202,381 UART: [art] SIG.R = 92691BE36505121045E50FE4BF73255FC81DE1F6333AAA18659473B5ABE7733C1D764DE78F190DC848050911DD8D87F5
3,209,134 UART: [art] SIG.S = 3B9F38F1E877E39D5366C61F38C349AD019107146095B13EE4A1BD6E75CD7829CC0F7547112463879B83E83446215E10
3,232,343 UART: Caliptra RT
3,232,686 UART: [state] CFI Enabled
3,352,501 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,681 UART: [rt]cmd =0x44504543, len=96
3,416,281 >>> mbox cmd response data (56 bytes)
3,416,282 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,446,399 UART: [rt]cmd =0x44504543, len=92
3,639,611 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,287 >>> mbox cmd response data (12 bytes)
1,142,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,084 >>> mbox cmd response: success
2,681,084 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,743,189 UART:
2,743,205 UART: Running Caliptra FMC ...
2,743,613 UART:
2,743,756 UART: [state] CFI Enabled
2,754,512 UART: [fht] FMC Alias Private Key: 7
2,873,024 UART: [art] Extend RT PCRs Done
2,873,452 UART: [art] Lock RT PCRs Done
2,875,002 UART: [art] Populate DV Done
2,883,315 UART: [fht] FMC Alias Private Key: 7
2,884,291 UART: [art] Derive CDI
2,884,571 UART: [art] Store in slot 0x4
2,970,364 UART: [art] Derive Key Pair
2,970,724 UART: [art] Store priv key in slot 0x5
2,983,602 UART: [art] Derive Key Pair - Done
2,998,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,582 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,347 UART: [art] PUB.X = 90F6F27C8D71798718BA531471053C4DF3FC82308474BBD5EA2097F40AA7F892414122BEFD84F213F452EEBA2F25517B
3,021,113 UART: [art] PUB.Y = FA345C6091EC66CD9DD6BF8CCC08589A4FA6DFB14CAF7B063041A1BB0A616712E020D7606068CCEE68B81D8841A70C9D
3,028,067 UART: [art] SIG.R = 0B22DC419CFDB90CBC469C332B76853CE6BB1778EF54F9870F5A6494B26A17A675A094060F782B3A83C957E89953D0FD
3,034,826 UART: [art] SIG.S = C0D01DF1D7FE36EFF821A023551FD0F636C760FC0E8C6E2E8744A6BA2337EEC27AA6893094864A05E0260D9A2AA5F198
3,058,601 UART: Caliptra RT
3,058,944 UART: [state] CFI Enabled
3,190,871 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,777 UART: [rt]cmd =0x44504543, len=92
3,414,271 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,887 ready_for_fw is high
1,059,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,115 >>> mbox cmd response: success
2,679,115 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,740,926 UART:
2,740,942 UART: Running Caliptra FMC ...
2,741,350 UART:
2,741,493 UART: [state] CFI Enabled
2,752,123 UART: [fht] FMC Alias Private Key: 7
2,871,483 UART: [art] Extend RT PCRs Done
2,871,911 UART: [art] Lock RT PCRs Done
2,873,757 UART: [art] Populate DV Done
2,881,844 UART: [fht] FMC Alias Private Key: 7
2,882,892 UART: [art] Derive CDI
2,883,172 UART: [art] Store in slot 0x4
2,969,095 UART: [art] Derive Key Pair
2,969,455 UART: [art] Store priv key in slot 0x5
2,982,701 UART: [art] Derive Key Pair - Done
2,997,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,140 UART: [art] PUB.X = 90F6F27C8D71798718BA531471053C4DF3FC82308474BBD5EA2097F40AA7F892414122BEFD84F213F452EEBA2F25517B
3,020,906 UART: [art] PUB.Y = FA345C6091EC66CD9DD6BF8CCC08589A4FA6DFB14CAF7B063041A1BB0A616712E020D7606068CCEE68B81D8841A70C9D
3,027,860 UART: [art] SIG.R = 0B22DC419CFDB90CBC469C332B76853CE6BB1778EF54F9870F5A6494B26A17A675A094060F782B3A83C957E89953D0FD
3,034,619 UART: [art] SIG.S = C0D01DF1D7FE36EFF821A023551FD0F636C760FC0E8C6E2E8744A6BA2337EEC27AA6893094864A05E0260D9A2AA5F198
3,058,496 UART: Caliptra RT
3,058,839 UART: [state] CFI Enabled
3,178,922 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,128 UART: [rt]cmd =0x4d454153, len=108
3,230,282 >>> mbox cmd response data (12 bytes)
3,230,283 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,260,262 UART: [rt]cmd =0x44504543, len=92
3,453,500 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,889 ready_for_fw is high
1,058,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,757 >>> mbox cmd response: success
2,681,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,744,556 UART:
2,744,572 UART: Running Caliptra FMC ...
2,744,980 UART:
2,745,123 UART: [state] CFI Enabled
2,755,895 UART: [fht] FMC Alias Private Key: 7
2,874,205 UART: [art] Extend RT PCRs Done
2,874,633 UART: [art] Lock RT PCRs Done
2,876,273 UART: [art] Populate DV Done
2,884,494 UART: [fht] FMC Alias Private Key: 7
2,885,602 UART: [art] Derive CDI
2,885,882 UART: [art] Store in slot 0x4
2,972,009 UART: [art] Derive Key Pair
2,972,369 UART: [art] Store priv key in slot 0x5
2,985,865 UART: [art] Derive Key Pair - Done
3,000,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,388 UART: [art] PUB.X = 90F6F27C8D71798718BA531471053C4DF3FC82308474BBD5EA2097F40AA7F892414122BEFD84F213F452EEBA2F25517B
3,024,154 UART: [art] PUB.Y = FA345C6091EC66CD9DD6BF8CCC08589A4FA6DFB14CAF7B063041A1BB0A616712E020D7606068CCEE68B81D8841A70C9D
3,031,108 UART: [art] SIG.R = 0B22DC419CFDB90CBC469C332B76853CE6BB1778EF54F9870F5A6494B26A17A675A094060F782B3A83C957E89953D0FD
3,037,867 UART: [art] SIG.S = C0D01DF1D7FE36EFF821A023551FD0F636C760FC0E8C6E2E8744A6BA2337EEC27AA6893094864A05E0260D9A2AA5F198
3,061,326 UART: Caliptra RT
3,061,669 UART: [state] CFI Enabled
3,181,728 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,213,048 UART: [rt]cmd =0x44504543, len=96
3,245,938 >>> mbox cmd response data (56 bytes)
3,245,939 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,275,890 UART: [rt]cmd =0x44504543, len=92
3,468,740 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.92s
Truncated 4681 bytes from beginning
r - Done
3,174,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,582 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,347 UART: [art] PUB.X = CAD00843A7AA1370FD404ED91E84ADA059F2FBAE2947F21716B5AA0AFCF8F2C4610B39511B00881C83AC01967F6D717B
3,197,095 UART: [art] PUB.Y = 72C64E622156E64BC4E086C007AD92BFA954F8270C141F210840AC0965E0AF227291919BD391138EB9428D9CD9A1F8F3
3,204,031 UART: [art] SIG.R = 6E4F6BE3E0FC6B9C4D9BE841D80AD5F9EA2D3F8334E873C3678A77E01E9C9983619A09124322097BC35DA115B1A56CDC
3,210,802 UART: [art] SIG.S = 8B4C5711DA51CFCB78F574AE1B1BDD4D83DBC441A095D8A766A6D55BCF58ED0CE64F0CDEC0FBBBECECA1A32EB11B13E7
3,234,604 UART: Caliptra RT
3,234,855 UART: [state] CFI Enabled
3,368,218 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,399,234 UART: [rt]cmd =0x44504543, len=92
3,591,834 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
893,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,545 UART: [kat] ++
897,697 UART: [kat] sha1
901,939 UART: [kat] SHA2-256
903,879 UART: [kat] SHA2-384
906,738 UART: [kat] SHA2-512-ACC
908,639 UART: [kat] ECC-384
918,306 UART: [kat] HMAC-384Kdf
922,772 UART: [kat] LMS
1,171,100 UART: [kat] --
1,171,667 UART: [cold-reset] ++
1,172,247 UART: [fht] FHT @ 0x50003400
1,174,962 UART: [idev] ++
1,175,130 UART: [idev] CDI.KEYID = 6
1,175,490 UART: [idev] SUBJECT.KEYID = 7
1,175,914 UART: [idev] UDS.KEYID = 0
1,176,259 ready_for_fw is high
1,176,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,964 UART: [idev] Erasing UDS.KEYID = 0
1,201,147 UART: [idev] Sha1 KeyId Algorithm
1,209,477 UART: [idev] --
1,210,677 UART: [ldev] ++
1,210,845 UART: [ldev] CDI.KEYID = 6
1,211,208 UART: [ldev] SUBJECT.KEYID = 5
1,211,634 UART: [ldev] AUTHORITY.KEYID = 7
1,212,097 UART: [ldev] FE.KEYID = 1
1,217,525 UART: [ldev] Erasing FE.KEYID = 1
1,243,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,079 UART: [ldev] --
1,282,478 UART: [fwproc] Wait for Commands...
1,283,212 UART: [fwproc] Recv command 0x46574c44
1,283,940 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,224 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,394 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,555 >>> mbox cmd response: success
2,827,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,828,733 UART: [afmc] ++
2,828,901 UART: [afmc] CDI.KEYID = 6
2,829,263 UART: [afmc] SUBJECT.KEYID = 7
2,829,688 UART: [afmc] AUTHORITY.KEYID = 5
2,865,021 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,031 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,914 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,615 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,493 UART: [afmc] --
2,908,509 UART: [cold-reset] --
2,909,119 UART: [state] Locking Datavault
2,910,346 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,950 UART: [state] Locking ICCM
2,911,554 UART: [exit] Launching FMC @ 0x40000130
2,916,884 UART:
2,916,900 UART: Running Caliptra FMC ...
2,917,308 UART:
2,917,362 UART: [state] CFI Enabled
2,927,742 UART: [fht] FMC Alias Private Key: 7
3,047,492 UART: [art] Extend RT PCRs Done
3,047,920 UART: [art] Lock RT PCRs Done
3,049,390 UART: [art] Populate DV Done
3,057,765 UART: [fht] FMC Alias Private Key: 7
3,058,923 UART: [art] Derive CDI
3,059,203 UART: [art] Store in slot 0x4
3,145,272 UART: [art] Derive Key Pair
3,145,632 UART: [art] Store priv key in slot 0x5
3,158,394 UART: [art] Derive Key Pair - Done
3,173,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,090 UART: [art] PUB.X = CAD00843A7AA1370FD404ED91E84ADA059F2FBAE2947F21716B5AA0AFCF8F2C4610B39511B00881C83AC01967F6D717B
3,195,838 UART: [art] PUB.Y = 72C64E622156E64BC4E086C007AD92BFA954F8270C141F210840AC0965E0AF227291919BD391138EB9428D9CD9A1F8F3
3,202,774 UART: [art] SIG.R = 6E4F6BE3E0FC6B9C4D9BE841D80AD5F9EA2D3F8334E873C3678A77E01E9C9983619A09124322097BC35DA115B1A56CDC
3,209,545 UART: [art] SIG.S = 8B4C5711DA51CFCB78F574AE1B1BDD4D83DBC441A095D8A766A6D55BCF58ED0CE64F0CDEC0FBBBECECA1A32EB11B13E7
3,232,635 UART: Caliptra RT
3,232,886 UART: [state] CFI Enabled
3,352,585 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,535 UART: [rt]cmd =0x4d454153, len=108
3,404,441 >>> mbox cmd response data (12 bytes)
3,404,442 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,477 UART: [rt]cmd =0x44504543, len=92
3,626,761 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,688 UART: [state] LifecycleState = Unprovisioned
86,343 UART: [state] DebugLocked = No
86,935 UART: [state] WD Timer not started. Device not locked for debugging
88,124 UART: [kat] SHA2-256
893,774 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,899 UART: [kat] ++
898,051 UART: [kat] sha1
902,301 UART: [kat] SHA2-256
904,241 UART: [kat] SHA2-384
906,882 UART: [kat] SHA2-512-ACC
908,783 UART: [kat] ECC-384
918,424 UART: [kat] HMAC-384Kdf
922,996 UART: [kat] LMS
1,171,324 UART: [kat] --
1,172,057 UART: [cold-reset] ++
1,172,487 UART: [fht] FHT @ 0x50003400
1,175,160 UART: [idev] ++
1,175,328 UART: [idev] CDI.KEYID = 6
1,175,688 UART: [idev] SUBJECT.KEYID = 7
1,176,112 UART: [idev] UDS.KEYID = 0
1,176,457 ready_for_fw is high
1,176,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,106 UART: [idev] Erasing UDS.KEYID = 0
1,200,691 UART: [idev] Sha1 KeyId Algorithm
1,209,121 UART: [idev] --
1,210,259 UART: [ldev] ++
1,210,427 UART: [ldev] CDI.KEYID = 6
1,210,790 UART: [ldev] SUBJECT.KEYID = 5
1,211,216 UART: [ldev] AUTHORITY.KEYID = 7
1,211,679 UART: [ldev] FE.KEYID = 1
1,216,745 UART: [ldev] Erasing FE.KEYID = 1
1,243,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,795 UART: [ldev] --
1,283,244 UART: [fwproc] Wait for Commands...
1,284,044 UART: [fwproc] Recv command 0x46574c44
1,284,772 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,244 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,414 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,715 >>> mbox cmd response: success
2,828,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,829,905 UART: [afmc] ++
2,830,073 UART: [afmc] CDI.KEYID = 6
2,830,435 UART: [afmc] SUBJECT.KEYID = 7
2,830,860 UART: [afmc] AUTHORITY.KEYID = 5
2,865,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,612 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,321 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,204 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,905 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,919 UART: [afmc] --
2,908,879 UART: [cold-reset] --
2,909,615 UART: [state] Locking Datavault
2,911,020 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,624 UART: [state] Locking ICCM
2,912,152 UART: [exit] Launching FMC @ 0x40000130
2,917,482 UART:
2,917,498 UART: Running Caliptra FMC ...
2,917,906 UART:
2,917,960 UART: [state] CFI Enabled
2,928,314 UART: [fht] FMC Alias Private Key: 7
3,048,246 UART: [art] Extend RT PCRs Done
3,048,674 UART: [art] Lock RT PCRs Done
3,050,388 UART: [art] Populate DV Done
3,058,467 UART: [fht] FMC Alias Private Key: 7
3,059,509 UART: [art] Derive CDI
3,059,789 UART: [art] Store in slot 0x4
3,145,546 UART: [art] Derive Key Pair
3,145,906 UART: [art] Store priv key in slot 0x5
3,159,086 UART: [art] Derive Key Pair - Done
3,173,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,756 UART: [art] PUB.X = CAD00843A7AA1370FD404ED91E84ADA059F2FBAE2947F21716B5AA0AFCF8F2C4610B39511B00881C83AC01967F6D717B
3,196,504 UART: [art] PUB.Y = 72C64E622156E64BC4E086C007AD92BFA954F8270C141F210840AC0965E0AF227291919BD391138EB9428D9CD9A1F8F3
3,203,440 UART: [art] SIG.R = 6E4F6BE3E0FC6B9C4D9BE841D80AD5F9EA2D3F8334E873C3678A77E01E9C9983619A09124322097BC35DA115B1A56CDC
3,210,211 UART: [art] SIG.S = 8B4C5711DA51CFCB78F574AE1B1BDD4D83DBC441A095D8A766A6D55BCF58ED0CE64F0CDEC0FBBBECECA1A32EB11B13E7
3,233,779 UART: Caliptra RT
3,234,030 UART: [state] CFI Enabled
3,352,573 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,661 UART: [rt]cmd =0x44504543, len=96
3,417,173 >>> mbox cmd response data (56 bytes)
3,417,174 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,221 UART: [rt]cmd =0x44504543, len=92
3,639,269 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 5.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,275 >>> mbox cmd response data (12 bytes)
1,142,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,772 >>> mbox cmd response: success
2,680,772 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,742,949 UART:
2,742,965 UART: Running Caliptra FMC ...
2,743,373 UART:
2,743,427 UART: [state] CFI Enabled
2,753,835 UART: [fht] FMC Alias Private Key: 7
2,872,635 UART: [art] Extend RT PCRs Done
2,873,063 UART: [art] Lock RT PCRs Done
2,874,311 UART: [art] Populate DV Done
2,882,704 UART: [fht] FMC Alias Private Key: 7
2,883,654 UART: [art] Derive CDI
2,883,934 UART: [art] Store in slot 0x4
2,969,923 UART: [art] Derive Key Pair
2,970,283 UART: [art] Store priv key in slot 0x5
2,983,375 UART: [art] Derive Key Pair - Done
2,997,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,797 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,562 UART: [art] PUB.X = 8543B12084ECB8A5D2002AB794D66219B4D7BD08A20A58B09FE791299BF890282EC5FFA428728064912D9F4094E5770D
3,021,297 UART: [art] PUB.Y = 34E27218CE279B0F37AC30ED415E88514D8D3E63AAE958A2E2C9F9269126A084665C90A2038FC87837C9FAB318F40F1C
3,028,240 UART: [art] SIG.R = BA6B909A01CC099D076BF6E3819F2B575BF3A95280EEF391C58B44993089646F95517287C73210710E9C63C93CDFB4AC
3,034,998 UART: [art] SIG.S = AE1F4655C24849957057CBA4D3A3AABA166659B0C594331E54C312EFC38C365BEE2F3B1A5EC45005E5AF136D71D32D80
3,059,003 UART: Caliptra RT
3,059,254 UART: [state] CFI Enabled
3,191,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,440 UART: [rt]cmd =0x44504543, len=92
3,414,670 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,085 ready_for_fw is high
1,060,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,227 >>> mbox cmd response: success
2,677,227 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,740,120 UART:
2,740,136 UART: Running Caliptra FMC ...
2,740,544 UART:
2,740,598 UART: [state] CFI Enabled
2,750,808 UART: [fht] FMC Alias Private Key: 7
2,868,720 UART: [art] Extend RT PCRs Done
2,869,148 UART: [art] Lock RT PCRs Done
2,870,470 UART: [art] Populate DV Done
2,878,793 UART: [fht] FMC Alias Private Key: 7
2,879,889 UART: [art] Derive CDI
2,880,169 UART: [art] Store in slot 0x4
2,966,106 UART: [art] Derive Key Pair
2,966,466 UART: [art] Store priv key in slot 0x5
2,979,290 UART: [art] Derive Key Pair - Done
2,994,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,722 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,487 UART: [art] PUB.X = 8543B12084ECB8A5D2002AB794D66219B4D7BD08A20A58B09FE791299BF890282EC5FFA428728064912D9F4094E5770D
3,017,222 UART: [art] PUB.Y = 34E27218CE279B0F37AC30ED415E88514D8D3E63AAE958A2E2C9F9269126A084665C90A2038FC87837C9FAB318F40F1C
3,024,165 UART: [art] SIG.R = BA6B909A01CC099D076BF6E3819F2B575BF3A95280EEF391C58B44993089646F95517287C73210710E9C63C93CDFB4AC
3,030,923 UART: [art] SIG.S = AE1F4655C24849957057CBA4D3A3AABA166659B0C594331E54C312EFC38C365BEE2F3B1A5EC45005E5AF136D71D32D80
3,054,458 UART: Caliptra RT
3,054,709 UART: [state] CFI Enabled
3,174,303 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,373 UART: [rt]cmd =0x4d454153, len=108
3,226,481 >>> mbox cmd response data (12 bytes)
3,226,482 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,256,343 UART: [rt]cmd =0x44504543, len=92
3,448,331 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,341 ready_for_fw is high
1,060,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,319 >>> mbox cmd response: success
2,679,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,088 UART:
2,741,104 UART: Running Caliptra FMC ...
2,741,512 UART:
2,741,566 UART: [state] CFI Enabled
2,752,046 UART: [fht] FMC Alias Private Key: 7
2,871,272 UART: [art] Extend RT PCRs Done
2,871,700 UART: [art] Lock RT PCRs Done
2,873,134 UART: [art] Populate DV Done
2,881,385 UART: [fht] FMC Alias Private Key: 7
2,882,361 UART: [art] Derive CDI
2,882,641 UART: [art] Store in slot 0x4
2,968,522 UART: [art] Derive Key Pair
2,968,882 UART: [art] Store priv key in slot 0x5
2,981,998 UART: [art] Derive Key Pair - Done
2,996,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,555 UART: [art] PUB.X = 8543B12084ECB8A5D2002AB794D66219B4D7BD08A20A58B09FE791299BF890282EC5FFA428728064912D9F4094E5770D
3,019,290 UART: [art] PUB.Y = 34E27218CE279B0F37AC30ED415E88514D8D3E63AAE958A2E2C9F9269126A084665C90A2038FC87837C9FAB318F40F1C
3,026,233 UART: [art] SIG.R = BA6B909A01CC099D076BF6E3819F2B575BF3A95280EEF391C58B44993089646F95517287C73210710E9C63C93CDFB4AC
3,032,991 UART: [art] SIG.S = AE1F4655C24849957057CBA4D3A3AABA166659B0C594331E54C312EFC38C365BEE2F3B1A5EC45005E5AF136D71D32D80
3,056,860 UART: Caliptra RT
3,057,111 UART: [state] CFI Enabled
3,177,909 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,133 UART: [rt]cmd =0x44504543, len=96
3,242,405 >>> mbox cmd response data (56 bytes)
3,242,406 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,272,327 UART: [rt]cmd =0x44504543, len=92
3,464,501 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.00s
Truncated 4681 bytes from beginning
r - Done
3,179,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,195,413 UART: [art] Erasing AUTHORITY.KEYID = 7
3,196,178 UART: [art] PUB.X = B9E8AF1A07597CEE7ABA3ABC57DD3440D2672EF8263361B3DA2F4B13C21BD46444ABD26706272E1A6B468CBAEFA3FEB5
3,202,964 UART: [art] PUB.Y = A855C3EDFBF731FDDF92D07A0DA3812898C7FEEABFC2A2502997CFF18DB8E4C3AC4D24761AA0B721934A3CB06F54188A
3,209,933 UART: [art] SIG.R = DDE5ACDC18225EEA1AF83EAECF4756B23AC1A03B516C49493B83010A95968F73F02C2125C9292DDA9D33C0BBF10A4201
3,216,705 UART: [art] SIG.S = DDF3EF36698F79AAA4776C9B130F9ECFCC7E305E243C5BC01C74952B09D91CF2E94E1B3C5C34FF004DEB442542030A81
3,240,675 UART: Caliptra RT
3,241,018 UART: [state] CFI Enabled
3,372,672 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,403,826 UART: [rt]cmd =0x44504543, len=92
3,596,194 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
893,555 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,680 UART: [kat] ++
897,832 UART: [kat] sha1
902,170 UART: [kat] SHA2-256
904,110 UART: [kat] SHA2-384
906,887 UART: [kat] SHA2-512-ACC
908,788 UART: [kat] ECC-384
918,439 UART: [kat] HMAC-384Kdf
923,029 UART: [kat] LMS
1,171,357 UART: [kat] --
1,172,488 UART: [cold-reset] ++
1,172,864 UART: [fht] FHT @ 0x50003400
1,175,355 UART: [idev] ++
1,175,523 UART: [idev] CDI.KEYID = 6
1,175,883 UART: [idev] SUBJECT.KEYID = 7
1,176,307 UART: [idev] UDS.KEYID = 0
1,176,652 ready_for_fw is high
1,176,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,519 UART: [idev] Erasing UDS.KEYID = 0
1,201,668 UART: [idev] Sha1 KeyId Algorithm
1,210,198 UART: [idev] --
1,211,256 UART: [ldev] ++
1,211,424 UART: [ldev] CDI.KEYID = 6
1,211,787 UART: [ldev] SUBJECT.KEYID = 5
1,212,213 UART: [ldev] AUTHORITY.KEYID = 7
1,212,676 UART: [ldev] FE.KEYID = 1
1,217,800 UART: [ldev] Erasing FE.KEYID = 1
1,244,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,346 UART: [ldev] --
1,283,621 UART: [fwproc] Wait for Commands...
1,284,225 UART: [fwproc] Recv command 0x46574c44
1,284,953 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,143 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,313 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,494 >>> mbox cmd response: success
2,825,494 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,826,694 UART: [afmc] ++
2,826,862 UART: [afmc] CDI.KEYID = 6
2,827,224 UART: [afmc] SUBJECT.KEYID = 7
2,827,649 UART: [afmc] AUTHORITY.KEYID = 5
2,863,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,041 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,750 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,633 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,334 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,108 UART: [afmc] --
2,907,054 UART: [cold-reset] --
2,907,786 UART: [state] Locking Datavault
2,909,117 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,721 UART: [state] Locking ICCM
2,910,141 UART: [exit] Launching FMC @ 0x40000130
2,915,471 UART:
2,915,487 UART: Running Caliptra FMC ...
2,915,895 UART:
2,916,038 UART: [state] CFI Enabled
2,926,842 UART: [fht] FMC Alias Private Key: 7
3,046,056 UART: [art] Extend RT PCRs Done
3,046,484 UART: [art] Lock RT PCRs Done
3,048,052 UART: [art] Populate DV Done
3,056,165 UART: [fht] FMC Alias Private Key: 7
3,057,127 UART: [art] Derive CDI
3,057,407 UART: [art] Store in slot 0x4
3,143,600 UART: [art] Derive Key Pair
3,143,960 UART: [art] Store priv key in slot 0x5
3,157,206 UART: [art] Derive Key Pair - Done
3,171,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,209 UART: [art] PUB.X = B9E8AF1A07597CEE7ABA3ABC57DD3440D2672EF8263361B3DA2F4B13C21BD46444ABD26706272E1A6B468CBAEFA3FEB5
3,194,995 UART: [art] PUB.Y = A855C3EDFBF731FDDF92D07A0DA3812898C7FEEABFC2A2502997CFF18DB8E4C3AC4D24761AA0B721934A3CB06F54188A
3,201,964 UART: [art] SIG.R = DDE5ACDC18225EEA1AF83EAECF4756B23AC1A03B516C49493B83010A95968F73F02C2125C9292DDA9D33C0BBF10A4201
3,208,736 UART: [art] SIG.S = DDF3EF36698F79AAA4776C9B130F9ECFCC7E305E243C5BC01C74952B09D91CF2E94E1B3C5C34FF004DEB442542030A81
3,232,704 UART: Caliptra RT
3,233,047 UART: [state] CFI Enabled
3,352,735 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,781 UART: [rt]cmd =0x4d454153, len=108
3,404,643 >>> mbox cmd response data (12 bytes)
3,404,644 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,669 UART: [rt]cmd =0x44504543, len=92
3,628,029 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
893,503 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,628 UART: [kat] ++
897,780 UART: [kat] sha1
902,154 UART: [kat] SHA2-256
904,094 UART: [kat] SHA2-384
906,885 UART: [kat] SHA2-512-ACC
908,786 UART: [kat] ECC-384
918,435 UART: [kat] HMAC-384Kdf
923,037 UART: [kat] LMS
1,171,365 UART: [kat] --
1,171,930 UART: [cold-reset] ++
1,172,352 UART: [fht] FHT @ 0x50003400
1,175,009 UART: [idev] ++
1,175,177 UART: [idev] CDI.KEYID = 6
1,175,537 UART: [idev] SUBJECT.KEYID = 7
1,175,961 UART: [idev] UDS.KEYID = 0
1,176,306 ready_for_fw is high
1,176,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,777 UART: [idev] Erasing UDS.KEYID = 0
1,200,722 UART: [idev] Sha1 KeyId Algorithm
1,209,150 UART: [idev] --
1,210,246 UART: [ldev] ++
1,210,414 UART: [ldev] CDI.KEYID = 6
1,210,777 UART: [ldev] SUBJECT.KEYID = 5
1,211,203 UART: [ldev] AUTHORITY.KEYID = 7
1,211,666 UART: [ldev] FE.KEYID = 1
1,216,626 UART: [ldev] Erasing FE.KEYID = 1
1,242,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,428 UART: [ldev] --
1,281,835 UART: [fwproc] Wait for Commands...
1,282,407 UART: [fwproc] Recv command 0x46574c44
1,283,135 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,829 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,999 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,360 >>> mbox cmd response: success
2,827,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,592 UART: [afmc] ++
2,828,760 UART: [afmc] CDI.KEYID = 6
2,829,122 UART: [afmc] SUBJECT.KEYID = 7
2,829,547 UART: [afmc] AUTHORITY.KEYID = 5
2,864,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,145 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,854 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,737 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,438 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,096 UART: [afmc] --
2,908,040 UART: [cold-reset] --
2,909,140 UART: [state] Locking Datavault
2,910,065 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,669 UART: [state] Locking ICCM
2,911,149 UART: [exit] Launching FMC @ 0x40000130
2,916,479 UART:
2,916,495 UART: Running Caliptra FMC ...
2,916,903 UART:
2,917,046 UART: [state] CFI Enabled
2,927,892 UART: [fht] FMC Alias Private Key: 7
3,047,324 UART: [art] Extend RT PCRs Done
3,047,752 UART: [art] Lock RT PCRs Done
3,049,258 UART: [art] Populate DV Done
3,057,683 UART: [fht] FMC Alias Private Key: 7
3,058,627 UART: [art] Derive CDI
3,058,907 UART: [art] Store in slot 0x4
3,144,764 UART: [art] Derive Key Pair
3,145,124 UART: [art] Store priv key in slot 0x5
3,158,328 UART: [art] Derive Key Pair - Done
3,172,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,132 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,897 UART: [art] PUB.X = B9E8AF1A07597CEE7ABA3ABC57DD3440D2672EF8263361B3DA2F4B13C21BD46444ABD26706272E1A6B468CBAEFA3FEB5
3,195,683 UART: [art] PUB.Y = A855C3EDFBF731FDDF92D07A0DA3812898C7FEEABFC2A2502997CFF18DB8E4C3AC4D24761AA0B721934A3CB06F54188A
3,202,652 UART: [art] SIG.R = DDE5ACDC18225EEA1AF83EAECF4756B23AC1A03B516C49493B83010A95968F73F02C2125C9292DDA9D33C0BBF10A4201
3,209,424 UART: [art] SIG.S = DDF3EF36698F79AAA4776C9B130F9ECFCC7E305E243C5BC01C74952B09D91CF2E94E1B3C5C34FF004DEB442542030A81
3,233,624 UART: Caliptra RT
3,233,967 UART: [state] CFI Enabled
3,354,205 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,277 UART: [rt]cmd =0x44504543, len=96
3,417,813 >>> mbox cmd response data (56 bytes)
3,417,814 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,851 UART: [rt]cmd =0x44504543, len=92
3,639,915 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,488 >>> mbox cmd response data (12 bytes)
1,143,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,684,056 >>> mbox cmd response: success
2,684,056 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,746,289 UART:
2,746,305 UART: Running Caliptra FMC ...
2,746,713 UART:
2,746,856 UART: [state] CFI Enabled
2,757,482 UART: [fht] FMC Alias Private Key: 7
2,875,806 UART: [art] Extend RT PCRs Done
2,876,234 UART: [art] Lock RT PCRs Done
2,877,994 UART: [art] Populate DV Done
2,886,359 UART: [fht] FMC Alias Private Key: 7
2,887,387 UART: [art] Derive CDI
2,887,667 UART: [art] Store in slot 0x4
2,973,810 UART: [art] Derive Key Pair
2,974,170 UART: [art] Store priv key in slot 0x5
2,987,446 UART: [art] Derive Key Pair - Done
3,002,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,018,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,019,125 UART: [art] PUB.X = F9AAF0A675CACD5AC5CE32DB19DD65A6BCFA35BDD10E486E344298CCA01C006BA5D15D7B8D00133B5CA4159A5E1C966C
3,025,874 UART: [art] PUB.Y = EEB6EDE2E4762750B6AEDFE4AA61A6EC44BE9E6C77266D848532D7D63265E43357420D4C9E3E0C6CA708BF932EFE3E3B
3,032,833 UART: [art] SIG.R = C409360AAA5318BECFA39154AEEA5C8D0D653EEA958C772382F0AF8E49841A43F5569E149B87943633D271921C099DF8
3,039,593 UART: [art] SIG.S = 8E542FCAEE5901CB25C80DC49660CFAEDD48A1A0CB0CA42BCEF4BC6F096E5B4E8B293785F440BF6AA8D36CA625B4E797
3,064,213 UART: Caliptra RT
3,064,556 UART: [state] CFI Enabled
3,196,084 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,186 UART: [rt]cmd =0x44504543, len=92
3,420,280 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,452 ready_for_fw is high
1,060,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,213 >>> mbox cmd response: success
2,678,213 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,740,738 UART:
2,740,754 UART: Running Caliptra FMC ...
2,741,162 UART:
2,741,305 UART: [state] CFI Enabled
2,751,791 UART: [fht] FMC Alias Private Key: 7
2,871,249 UART: [art] Extend RT PCRs Done
2,871,677 UART: [art] Lock RT PCRs Done
2,873,199 UART: [art] Populate DV Done
2,881,404 UART: [fht] FMC Alias Private Key: 7
2,882,374 UART: [art] Derive CDI
2,882,654 UART: [art] Store in slot 0x4
2,968,423 UART: [art] Derive Key Pair
2,968,783 UART: [art] Store priv key in slot 0x5
2,982,743 UART: [art] Derive Key Pair - Done
2,997,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,120 UART: [art] PUB.X = F9AAF0A675CACD5AC5CE32DB19DD65A6BCFA35BDD10E486E344298CCA01C006BA5D15D7B8D00133B5CA4159A5E1C966C
3,020,869 UART: [art] PUB.Y = EEB6EDE2E4762750B6AEDFE4AA61A6EC44BE9E6C77266D848532D7D63265E43357420D4C9E3E0C6CA708BF932EFE3E3B
3,027,828 UART: [art] SIG.R = C409360AAA5318BECFA39154AEEA5C8D0D653EEA958C772382F0AF8E49841A43F5569E149B87943633D271921C099DF8
3,034,588 UART: [art] SIG.S = 8E542FCAEE5901CB25C80DC49660CFAEDD48A1A0CB0CA42BCEF4BC6F096E5B4E8B293785F440BF6AA8D36CA625B4E797
3,057,976 UART: Caliptra RT
3,058,319 UART: [state] CFI Enabled
3,177,809 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,103 UART: [rt]cmd =0x4d454153, len=108
3,229,965 >>> mbox cmd response data (12 bytes)
3,229,966 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,259,809 UART: [rt]cmd =0x44504543, len=92
3,452,917 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,696 ready_for_fw is high
1,061,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,745 >>> mbox cmd response: success
2,679,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,508 UART:
2,742,524 UART: Running Caliptra FMC ...
2,742,932 UART:
2,743,075 UART: [state] CFI Enabled
2,753,525 UART: [fht] FMC Alias Private Key: 7
2,872,419 UART: [art] Extend RT PCRs Done
2,872,847 UART: [art] Lock RT PCRs Done
2,874,633 UART: [art] Populate DV Done
2,882,764 UART: [fht] FMC Alias Private Key: 7
2,883,698 UART: [art] Derive CDI
2,883,978 UART: [art] Store in slot 0x4
2,969,609 UART: [art] Derive Key Pair
2,969,969 UART: [art] Store priv key in slot 0x5
2,983,403 UART: [art] Derive Key Pair - Done
2,998,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,524 UART: [art] PUB.X = F9AAF0A675CACD5AC5CE32DB19DD65A6BCFA35BDD10E486E344298CCA01C006BA5D15D7B8D00133B5CA4159A5E1C966C
3,021,273 UART: [art] PUB.Y = EEB6EDE2E4762750B6AEDFE4AA61A6EC44BE9E6C77266D848532D7D63265E43357420D4C9E3E0C6CA708BF932EFE3E3B
3,028,232 UART: [art] SIG.R = C409360AAA5318BECFA39154AEEA5C8D0D653EEA958C772382F0AF8E49841A43F5569E149B87943633D271921C099DF8
3,034,992 UART: [art] SIG.S = 8E542FCAEE5901CB25C80DC49660CFAEDD48A1A0CB0CA42BCEF4BC6F096E5B4E8B293785F440BF6AA8D36CA625B4E797
3,059,120 UART: Caliptra RT
3,059,463 UART: [state] CFI Enabled
3,179,569 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,521 UART: [rt]cmd =0x44504543, len=96
3,243,775 >>> mbox cmd response data (56 bytes)
3,243,776 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,833 UART: [rt]cmd =0x44504543, len=92
3,466,545 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,005 UART:
192,357 UART: Running Caliptra ROM ...
193,548 UART:
193,707 UART: [state] CFI Enabled
262,412 UART: [state] LifecycleState = Unprovisioned
264,345 UART: [state] DebugLocked = No
266,170 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,199 UART: [kat] SHA2-256
439,907 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,370 UART: [kat] ++
450,975 UART: [kat] sha1
462,450 UART: [kat] SHA2-256
465,140 UART: [kat] SHA2-384
471,202 UART: [kat] SHA2-512-ACC
473,570 UART: [kat] ECC-384
2,765,028 UART: [kat] HMAC-384Kdf
2,777,912 UART: [kat] LMS
3,968,203 UART: [kat] --
3,973,423 UART: [cold-reset] ++
3,975,069 UART: [fht] Storing FHT @ 0x50003400
3,987,763 UART: [idev] ++
3,988,371 UART: [idev] CDI.KEYID = 6
3,989,288 UART: [idev] SUBJECT.KEYID = 7
3,990,539 UART: [idev] UDS.KEYID = 0
3,991,593 ready_for_fw is high
3,991,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,893 UART: [idev] Erasing UDS.KEYID = 0
7,325,486 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,129 UART: [idev] --
7,352,452 UART: [ldev] ++
7,353,035 UART: [ldev] CDI.KEYID = 6
7,354,006 UART: [ldev] SUBJECT.KEYID = 5
7,355,174 UART: [ldev] AUTHORITY.KEYID = 7
7,356,468 UART: [ldev] FE.KEYID = 1
7,401,734 UART: [ldev] Erasing FE.KEYID = 1
10,736,175 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,461 UART: [ldev] --
13,116,090 UART: [fwproc] Waiting for Commands...
13,119,323 UART: [fwproc] Received command 0x46574c44
13,121,513 UART: [fwproc] Received Image of size 118548 bytes
17,223,782 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,229 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,373,390 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,702,673 >>> mbox cmd response: success
17,703,663 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,706,093 UART: [afmc] ++
17,706,682 UART: [afmc] CDI.KEYID = 6
17,707,699 UART: [afmc] SUBJECT.KEYID = 7
17,708,879 UART: [afmc] AUTHORITY.KEYID = 5
21,070,855 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,611 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,924 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,361 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,060 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,492 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,559 UART: [afmc] --
23,444,008 UART: [cold-reset] --
23,447,764 UART: [state] Locking Datavault
23,453,119 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,817 UART: [state] Locking ICCM
23,457,234 UART: [exit] Launching FMC @ 0x40000130
23,465,584 UART:
23,465,816 UART: Running Caliptra FMC ...
23,466,919 UART:
23,467,097 UART: [state] CFI Enabled
23,533,585 UART: [fht] FMC Alias Private Key: 7
25,874,173 UART: [art] Extend RT PCRs Done
25,875,395 UART: [art] Lock RT PCRs Done
25,877,286 UART: [art] Populate DV Done
25,882,965 UART: [fht] FMC Alias Private Key: 7
25,884,554 UART: [art] Derive CDI
25,885,293 UART: [art] Store in slot 0x4
25,942,515 UART: [art] Derive Key Pair
25,943,557 UART: [art] Store priv key in slot 0x5
29,236,054 UART: [art] Derive Key Pair - Done
29,249,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,550 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,062 UART: [art] PUB.X = BCBA546CB151CFB8D4AE4BA9602B9379BA6DE4839C1A14CBF72A63B8A64CC7929FC79FEF3CEEA68F002F072C9BF91710
31,546,328 UART: [art] PUB.Y = 2FAD4F7B37F8919A6243ADE76C8D20499A707665F31F38B8E1E9CA01845D237E9EB7D2B1E8E8797B44BF4923B1F8865B
31,553,582 UART: [art] SIG.R = 07B35A0F4D47F955413D21CCB13CEDEBE363C51694AC6FEAEB5CEFC080A6A54CC2303661AC6826119D2F2E7447D4E573
31,561,016 UART: [art] SIG.S = D53B9F7C722F653A807F2EFE1A519D9EBD1C00A7DE4ECFEBF631B56108E10FF415C65AA5BADA33DCB669F17E7A358A86
32,866,122 UART: Caliptra RT
32,866,845 UART: [state] CFI Enabled
33,043,341 UART: [rt] RT listening for mailbox commands...
33,074,765 UART: [rt]cmd =0x43455252, len=4
33,086,289 >>> mbox cmd response data (783 bytes)
33,130,146 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,160,881 UART: [rt]cmd =0x44504543, len=92
38,911,452 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,785,053 ready_for_fw is high
3,785,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,939,971 >>> mbox cmd response: success
17,941,246 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,630,998 UART:
23,631,410 UART: Running Caliptra FMC ...
23,632,550 UART:
23,632,708 UART: [state] CFI Enabled
23,699,507 UART: [fht] FMC Alias Private Key: 7
26,040,267 UART: [art] Extend RT PCRs Done
26,041,496 UART: [art] Lock RT PCRs Done
26,042,935 UART: [art] Populate DV Done
26,048,577 UART: [fht] FMC Alias Private Key: 7
26,050,073 UART: [art] Derive CDI
26,050,810 UART: [art] Store in slot 0x4
26,108,423 UART: [art] Derive Key Pair
26,109,469 UART: [art] Store priv key in slot 0x5
29,402,050 UART: [art] Derive Key Pair - Done
29,414,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,702,582 UART: [art] Erasing AUTHORITY.KEYID = 7
31,704,086 UART: [art] PUB.X = 023CA29CBB25B186141B6ABF98BCF06704099DF6723F0350215B26B9363B107AD204B1A2499DBDE7F1B7E37E7235FC46
31,711,350 UART: [art] PUB.Y = 90DDA03BEEFC4B7A0493D1E6BD09DC8996BC1C3931D4CC5A940B64BC39538470EA0B598324FFDA0FEC8D8E10C94DC935
31,718,624 UART: [art] SIG.R = FC4E48932CF24AEEF39959CA90BEA7B3364E4BF2C58D2F433E297321B759B0413CCBC65DD5F40B933B6577A00B58BF1B
31,726,023 UART: [art] SIG.S = 8CA1294A8BCB57622EBB7D87DB1665FB0CF632C5F4432654B92DDD190B5617E39E1BB1972E1332E7CE281E2915311195
33,031,081 UART: Caliptra RT
33,031,810 UART: [state] CFI Enabled
33,206,931 UART: [rt] RT listening for mailbox commands...
33,238,016 UART: [rt]cmd =0x43455252, len=4
33,249,430 >>> mbox cmd response data (784 bytes)
33,293,358 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,324,261 UART: [rt]cmd =0x44504543, len=92
39,073,956 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
192,434 UART:
192,799 UART: Running Caliptra ROM ...
193,896 UART:
603,754 UART: [state] CFI Enabled
616,805 UART: [state] LifecycleState = Unprovisioned
618,787 UART: [state] DebugLocked = No
620,455 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,674 UART: [kat] SHA2-256
795,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,995 UART: [kat] ++
806,438 UART: [kat] sha1
818,514 UART: [kat] SHA2-256
821,224 UART: [kat] SHA2-384
828,344 UART: [kat] SHA2-512-ACC
830,712 UART: [kat] ECC-384
3,115,084 UART: [kat] HMAC-384Kdf
3,127,395 UART: [kat] LMS
4,317,497 UART: [kat] --
4,322,061 UART: [cold-reset] ++
4,323,210 UART: [fht] Storing FHT @ 0x50003400
4,333,830 UART: [idev] ++
4,334,422 UART: [idev] CDI.KEYID = 6
4,335,333 UART: [idev] SUBJECT.KEYID = 7
4,336,570 UART: [idev] UDS.KEYID = 0
4,337,614 ready_for_fw is high
4,337,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,179 UART: [idev] Erasing UDS.KEYID = 0
7,621,742 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,610 UART: [idev] --
7,648,876 UART: [ldev] ++
7,649,441 UART: [ldev] CDI.KEYID = 6
7,650,669 UART: [ldev] SUBJECT.KEYID = 5
7,651,801 UART: [ldev] AUTHORITY.KEYID = 7
7,652,894 UART: [ldev] FE.KEYID = 1
7,664,901 UART: [ldev] Erasing FE.KEYID = 1
10,951,598 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,225 UART: [ldev] --
13,313,639 UART: [fwproc] Waiting for Commands...
13,315,400 UART: [fwproc] Received command 0x46574c44
13,317,575 UART: [fwproc] Received Image of size 118548 bytes
17,423,831 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,507,647 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,832 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,909,694 >>> mbox cmd response: success
17,910,823 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,913,066 UART: [afmc] ++
17,913,650 UART: [afmc] CDI.KEYID = 6
17,914,564 UART: [afmc] SUBJECT.KEYID = 7
17,915,826 UART: [afmc] AUTHORITY.KEYID = 5
21,225,681 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,115 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,381 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,815 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,556 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,933 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,753 UART: [afmc] --
23,590,465 UART: [cold-reset] --
23,595,834 UART: [state] Locking Datavault
23,600,694 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,394 UART: [state] Locking ICCM
23,604,090 UART: [exit] Launching FMC @ 0x40000130
23,612,486 UART:
23,612,715 UART: Running Caliptra FMC ...
23,613,810 UART:
23,613,966 UART: [state] CFI Enabled
23,622,136 UART: [fht] FMC Alias Private Key: 7
25,962,563 UART: [art] Extend RT PCRs Done
25,963,788 UART: [art] Lock RT PCRs Done
25,965,240 UART: [art] Populate DV Done
25,970,896 UART: [fht] FMC Alias Private Key: 7
25,972,281 UART: [art] Derive CDI
25,973,027 UART: [art] Store in slot 0x4
26,015,629 UART: [art] Derive Key Pair
26,016,676 UART: [art] Store priv key in slot 0x5
29,258,707 UART: [art] Derive Key Pair - Done
29,271,977 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,090 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,603 UART: [art] PUB.X = D50BADC7BC70A717082FE8C13967C9328DBF39F476C4687B35958C5F877DFC4A8D8D7708B63C602273918A6865D1DE80
31,560,798 UART: [art] PUB.Y = 3DE8CA71EF84AC7AF7C61591E465B06EB7FCF3D72448FEE2E68053556AABF6A315E145B03B1762BB01E44DB2BA6F7BD6
31,568,085 UART: [art] SIG.R = C91BE55F01A120D3065F2E05DD72F88CB616D159276ACEE1980C95F8F21EA2681B9DA7B4A84CCA20CF35A5BB17318676
31,575,529 UART: [art] SIG.S = 8A846782A02A8086AAA16A3F38A927E8AAB2F0E5FD81796C5E163A3C95CE364EBBCD83FC76C2755FA6764AE0F8EB668B
32,881,109 UART: Caliptra RT
32,881,821 UART: [state] CFI Enabled
33,014,987 UART: [rt] RT listening for mailbox commands...
33,046,304 UART: [rt]cmd =0x43455252, len=4
33,057,603 >>> mbox cmd response data (784 bytes)
33,101,841 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,132,931 UART: [rt]cmd =0x44504543, len=92
38,809,122 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
4,128,588 ready_for_fw is high
4,129,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,197 >>> mbox cmd response: success
18,164,410 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,804,738 UART:
23,805,145 UART: Running Caliptra FMC ...
23,806,245 UART:
23,806,421 UART: [state] CFI Enabled
23,814,425 UART: [fht] FMC Alias Private Key: 7
26,153,790 UART: [art] Extend RT PCRs Done
26,155,011 UART: [art] Lock RT PCRs Done
26,156,401 UART: [art] Populate DV Done
26,161,760 UART: [fht] FMC Alias Private Key: 7
26,163,359 UART: [art] Derive CDI
26,164,095 UART: [art] Store in slot 0x4
26,206,469 UART: [art] Derive Key Pair
26,207,663 UART: [art] Store priv key in slot 0x5
29,449,789 UART: [art] Derive Key Pair - Done
29,462,629 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,258 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,758 UART: [art] PUB.X = 226DE1B73ECDAEDB1C06F2FCE47A912F792B8A513F435E7C3C02371545EC5217BB908A91FBCC6AB1B382401DC41BC515
31,752,049 UART: [art] PUB.Y = FE88D8A28375A84D145A2C57A5929C7B70BAA31157794BEBD10E73B53D3B653DD50763FA303DCC8D111EB7C1FB60B9A0
31,759,348 UART: [art] SIG.R = F8AD4B0E018210ED684C8D7DF0D2733B4395C15BA8158EE951B9DE2DA7EC42B0C35A4684FA12257F5DB0EB3AA0123BF8
31,766,755 UART: [art] SIG.S = EAA6922921D015EFE79BD6AF3371B0FAB4D6B3F4C5916E2677558DCDDBE1240A12B788CE4767EA06E1345EFB3D9A2DD0
33,071,050 UART: Caliptra RT
33,071,757 UART: [state] CFI Enabled
33,204,926 UART: [rt] RT listening for mailbox commands...
33,236,229 UART: [rt]cmd =0x43455252, len=4
33,247,680 >>> mbox cmd response data (784 bytes)
33,291,577 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,322,457 UART: [rt]cmd =0x44504543, len=92
38,998,800 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,975 writing to cptra_bootfsm_go
193,105 UART:
193,456 UART: Running Caliptra ROM ...
194,649 UART:
194,799 UART: [state] CFI Enabled
265,800 UART: [state] LifecycleState = Unprovisioned
267,703 UART: [state] DebugLocked = No
270,370 UART: [state] WD Timer not started. Device not locked for debugging
274,832 UART: [kat] SHA2-256
454,517 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,268 UART: [kat] ++
465,811 UART: [kat] sha1
476,543 UART: [kat] SHA2-256
479,190 UART: [kat] SHA2-384
484,796 UART: [kat] SHA2-512-ACC
487,213 UART: [kat] ECC-384
2,950,922 UART: [kat] HMAC-384Kdf
2,972,814 UART: [kat] LMS
3,449,267 UART: [kat] --
3,453,979 UART: [cold-reset] ++
3,455,547 UART: [fht] FHT @ 0x50003400
3,466,384 UART: [idev] ++
3,466,952 UART: [idev] CDI.KEYID = 6
3,467,980 UART: [idev] SUBJECT.KEYID = 7
3,469,156 UART: [idev] UDS.KEYID = 0
3,470,076 ready_for_fw is high
3,470,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,311 UART: [idev] Erasing UDS.KEYID = 0
5,989,921 UART: [idev] Sha1 KeyId Algorithm
6,013,889 UART: [idev] --
6,019,123 UART: [ldev] ++
6,019,712 UART: [ldev] CDI.KEYID = 6
6,020,628 UART: [ldev] SUBJECT.KEYID = 5
6,021,839 UART: [ldev] AUTHORITY.KEYID = 7
6,023,121 UART: [ldev] FE.KEYID = 1
6,059,260 UART: [ldev] Erasing FE.KEYID = 1
8,566,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,428 UART: [ldev] --
10,374,360 UART: [fwproc] Wait for Commands...
10,375,960 UART: [fwproc] Recv command 0x46574c44
10,377,993 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,807 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,812 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,268 >>> mbox cmd response: success
14,351,293 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,354,835 UART: [afmc] ++
14,355,411 UART: [afmc] CDI.KEYID = 6
14,356,422 UART: [afmc] SUBJECT.KEYID = 7
14,357,577 UART: [afmc] AUTHORITY.KEYID = 5
16,893,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,038 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,824 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,853 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,470 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,752 UART: [afmc] --
18,697,558 UART: [cold-reset] --
18,699,921 UART: [state] Locking Datavault
18,706,245 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,002 UART: [state] Locking ICCM
18,710,398 UART: [exit] Launching FMC @ 0x40000130
18,718,844 UART:
18,719,074 UART: Running Caliptra FMC ...
18,720,102 UART:
18,720,247 UART: [state] CFI Enabled
18,774,064 UART: [fht] FMC Alias Private Key: 7
20,540,445 UART: [art] Extend RT PCRs Done
20,541,665 UART: [art] Lock RT PCRs Done
20,543,534 UART: [art] Populate DV Done
20,549,266 UART: [fht] FMC Alias Private Key: 7
20,550,854 UART: [art] Derive CDI
20,551,599 UART: [art] Store in slot 0x4
20,606,720 UART: [art] Derive Key Pair
20,607,776 UART: [art] Store priv key in slot 0x5
23,070,603 UART: [art] Derive Key Pair - Done
23,083,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,866 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,370 UART: [art] PUB.X = 05E92B83C8B1D504FB526C4FB1AE8B42E85CC048502D728C44237AA7ABD4C959531AD61752BEEB41859A3C88E2B96713
24,804,650 UART: [art] PUB.Y = 3163E7E337A3FBCD9A7800462C5A2FB3A21BEA711D60AC9ACB31A03F940DA35B5B0CF3050E21C12816EE1AE3378E8241
24,811,902 UART: [art] SIG.R = 627F4520FB11B22579CA07CD46D3FECD1F26A3400759CF6908A324B3D934FCFE2451B06C092BE923A9ED2CA7957BBB77
24,819,299 UART: [art] SIG.S = 0D51006486873301CE67596300863C5D543070C95088E9F6ED59FABE057B5ED1FC3608196DC6C767F823C100CDF2079A
25,798,727 UART: Caliptra RT
25,799,413 UART: [state] CFI Enabled
25,980,736 UART: [rt] RT listening for mailbox commands...
26,011,903 UART: [rt]cmd =0x43455252, len=4
26,023,404 >>> mbox cmd response data (782 bytes)
26,065,876 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,096,819 UART: [rt]cmd =0x44504543, len=92
30,442,940 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,463,926 ready_for_fw is high
3,464,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,238,039 >>> mbox cmd response: success
14,239,496 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,534,441 UART:
18,534,818 UART: Running Caliptra FMC ...
18,535,999 UART:
18,536,166 UART: [state] CFI Enabled
18,604,211 UART: [fht] FMC Alias Private Key: 7
20,371,062 UART: [art] Extend RT PCRs Done
20,372,281 UART: [art] Lock RT PCRs Done
20,373,692 UART: [art] Populate DV Done
20,379,266 UART: [fht] FMC Alias Private Key: 7
20,380,909 UART: [art] Derive CDI
20,381,718 UART: [art] Store in slot 0x4
20,437,391 UART: [art] Derive Key Pair
20,438,429 UART: [art] Store priv key in slot 0x5
22,901,154 UART: [art] Derive Key Pair - Done
22,914,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,997 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,491 UART: [art] PUB.X = F48A34C15F3057AC721C243759777AAB3BCC904758ECF525A463A78169B28DF8983D9B979E1647E60105B0B99EDCD8DA
24,635,739 UART: [art] PUB.Y = B8EF33905649AB9D76696CB9FBCAB47C633E3E367A8922F631F4D72F72DC6B1E2457606B46DBB25CF59513C9CB43381D
24,643,040 UART: [art] SIG.R = D3016BFAB3E58DED2AA67FBA9533FE395344AC513EB44A8626589508EB6C2B2E732368060BF4D4356DFB4111DF1E0FC5
24,650,429 UART: [art] SIG.S = 7A88D705A5A7ECF3DDF7A133FF15BBEFAC1A7F3BD4B5B4441FE050039B0E16E047371FC93150BC719401ACBB2A5DE539
25,629,665 UART: Caliptra RT
25,630,384 UART: [state] CFI Enabled
25,811,188 UART: [rt] RT listening for mailbox commands...
25,842,223 UART: [rt]cmd =0x43455252, len=4
25,853,570 >>> mbox cmd response data (783 bytes)
25,896,493 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,927,361 UART: [rt]cmd =0x44504543, len=92
30,275,562 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
192,517 UART:
192,884 UART: Running Caliptra ROM ...
194,075 UART:
603,573 UART: [state] CFI Enabled
619,594 UART: [state] LifecycleState = Unprovisioned
621,548 UART: [state] DebugLocked = No
623,940 UART: [state] WD Timer not started. Device not locked for debugging
627,909 UART: [kat] SHA2-256
807,526 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,332 UART: [kat] ++
818,781 UART: [kat] sha1
828,803 UART: [kat] SHA2-256
831,523 UART: [kat] SHA2-384
837,014 UART: [kat] SHA2-512-ACC
839,385 UART: [kat] ECC-384
3,280,154 UART: [kat] HMAC-384Kdf
3,293,895 UART: [kat] LMS
3,770,412 UART: [kat] --
3,774,903 UART: [cold-reset] ++
3,777,266 UART: [fht] FHT @ 0x50003400
3,787,747 UART: [idev] ++
3,788,314 UART: [idev] CDI.KEYID = 6
3,789,368 UART: [idev] SUBJECT.KEYID = 7
3,790,544 UART: [idev] UDS.KEYID = 0
3,791,475 ready_for_fw is high
3,791,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,971 UART: [idev] Erasing UDS.KEYID = 0
6,272,929 UART: [idev] Sha1 KeyId Algorithm
6,297,228 UART: [idev] --
6,303,276 UART: [ldev] ++
6,303,850 UART: [ldev] CDI.KEYID = 6
6,304,873 UART: [ldev] SUBJECT.KEYID = 5
6,305,980 UART: [ldev] AUTHORITY.KEYID = 7
6,307,268 UART: [ldev] FE.KEYID = 1
6,316,127 UART: [ldev] Erasing FE.KEYID = 1
8,792,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,206 UART: [ldev] --
10,590,500 UART: [fwproc] Wait for Commands...
10,593,354 UART: [fwproc] Recv command 0x46574c44
10,595,397 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,892 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,900 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,877 >>> mbox cmd response: success
14,552,997 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,555,678 UART: [afmc] ++
14,556,271 UART: [afmc] CDI.KEYID = 6
14,557,182 UART: [afmc] SUBJECT.KEYID = 7
14,558,394 UART: [afmc] AUTHORITY.KEYID = 5
17,064,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,026 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,847 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,924 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,452 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,259 UART: [afmc] --
18,866,874 UART: [cold-reset] --
18,870,954 UART: [state] Locking Datavault
18,876,513 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,284 UART: [state] Locking ICCM
18,880,273 UART: [exit] Launching FMC @ 0x40000130
18,888,667 UART:
18,888,905 UART: Running Caliptra FMC ...
18,890,007 UART:
18,890,171 UART: [state] CFI Enabled
18,898,302 UART: [fht] FMC Alias Private Key: 7
20,664,590 UART: [art] Extend RT PCRs Done
20,665,806 UART: [art] Lock RT PCRs Done
20,667,567 UART: [art] Populate DV Done
20,673,192 UART: [fht] FMC Alias Private Key: 7
20,674,734 UART: [art] Derive CDI
20,675,549 UART: [art] Store in slot 0x4
20,718,036 UART: [art] Derive Key Pair
20,719,071 UART: [art] Store priv key in slot 0x5
23,145,906 UART: [art] Derive Key Pair - Done
23,158,780 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,336 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,851 UART: [art] PUB.X = F0549262790043C8FEA39AC0126F6AAC756C74BEEFE79235BD90502D81CCAF2380195FBD5FE76F0F7645E4FA450746CC
24,874,122 UART: [art] PUB.Y = EE3537910360E3E19240063D8C86040DACCF7473D1FC582BD41B56F657237B190E82D8E4AD24DB405F1630733625162A
24,881,354 UART: [art] SIG.R = D11322CBD42CAB4066F5E9A065D41C2A74D29F579F24B438DCDD91B02E29E1FB0B241AD00A83F4A6588AEFB8710FB59B
24,888,736 UART: [art] SIG.S = 5C6E4E4A3EE9CFE3BE672E30CD00F2F7B0D1A947F63676DCE1443A0BF1B2841291A820D0183333AF3A870367BF1CCDDA
25,867,770 UART: Caliptra RT
25,868,488 UART: [state] CFI Enabled
26,001,006 UART: [rt] RT listening for mailbox commands...
26,032,374 UART: [rt]cmd =0x43455252, len=4
26,043,890 >>> mbox cmd response data (783 bytes)
26,086,686 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,117,483 UART: [rt]cmd =0x44504543, len=92
30,404,397 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,781,171 ready_for_fw is high
3,781,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,443 >>> mbox cmd response: success
14,450,825 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,699,506 UART:
18,699,900 UART: Running Caliptra FMC ...
18,701,107 UART:
18,701,283 UART: [state] CFI Enabled
18,709,077 UART: [fht] FMC Alias Private Key: 7
20,475,897 UART: [art] Extend RT PCRs Done
20,477,117 UART: [art] Lock RT PCRs Done
20,479,020 UART: [art] Populate DV Done
20,484,288 UART: [fht] FMC Alias Private Key: 7
20,485,985 UART: [art] Derive CDI
20,486,799 UART: [art] Store in slot 0x4
20,529,722 UART: [art] Derive Key Pair
20,530,765 UART: [art] Store priv key in slot 0x5
22,957,541 UART: [art] Derive Key Pair - Done
22,969,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,184 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,685 UART: [art] PUB.X = 80B5A1E3BD351952A72C794E32D5976A39012D3BB07B1AC6CA70F2937F619C428FB841B3AB903A598042DCCAD6BDFC5C
24,684,989 UART: [art] PUB.Y = 1ADDD08ABBB27DC6CED80F04AEAA4A1802157750BABE8F6A15ADB7F4DABDB9ED7EB527CD504ABDCA68C0A90BB3390354
24,692,293 UART: [art] SIG.R = 40A2F276DCD19259816F7E2E7154A667C12D0F8CF4C245DCC34FEBE58A6EF527088D898836478EDBDDB953453C04A423
24,699,697 UART: [art] SIG.S = 789F8E6A627F6A6F74F06F71F96D5EC454B5953F4CEC8630DA4984584A92F20159B1DAE30D278343DDE76025E16C8336
25,678,365 UART: Caliptra RT
25,679,059 UART: [state] CFI Enabled
25,811,238 UART: [rt] RT listening for mailbox commands...
25,842,541 UART: [rt]cmd =0x43455252, len=4
25,854,003 >>> mbox cmd response data (782 bytes)
25,896,749 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,927,686 UART: [rt]cmd =0x44504543, len=92
30,214,367 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,001 writing to cptra_bootfsm_go
193,105 UART:
193,473 UART: Running Caliptra ROM ...
194,646 UART:
194,798 UART: [state] CFI Enabled
262,940 UART: [state] LifecycleState = Unprovisioned
265,377 UART: [state] DebugLocked = No
267,199 UART: [state] WD Timer not started. Device not locked for debugging
272,296 UART: [kat] SHA2-256
462,146 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,879 UART: [kat] ++
473,328 UART: [kat] sha1
484,717 UART: [kat] SHA2-256
487,768 UART: [kat] SHA2-384
493,690 UART: [kat] SHA2-512-ACC
496,272 UART: [kat] ECC-384
2,949,220 UART: [kat] HMAC-384Kdf
2,972,279 UART: [kat] LMS
3,504,028 UART: [kat] --
3,509,260 UART: [cold-reset] ++
3,510,407 UART: [fht] FHT @ 0x50003400
3,521,616 UART: [idev] ++
3,522,262 UART: [idev] CDI.KEYID = 6
3,523,344 UART: [idev] SUBJECT.KEYID = 7
3,524,467 UART: [idev] UDS.KEYID = 0
3,525,366 ready_for_fw is high
3,525,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,464 UART: [idev] Erasing UDS.KEYID = 0
6,029,912 UART: [idev] Sha1 KeyId Algorithm
6,051,413 UART: [idev] --
6,056,541 UART: [ldev] ++
6,057,214 UART: [ldev] CDI.KEYID = 6
6,058,122 UART: [ldev] SUBJECT.KEYID = 5
6,059,329 UART: [ldev] AUTHORITY.KEYID = 7
6,060,562 UART: [ldev] FE.KEYID = 1
6,099,350 UART: [ldev] Erasing FE.KEYID = 1
8,601,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,364 UART: [ldev] --
10,413,612 UART: [fwproc] Wait for Commands...
10,415,383 UART: [fwproc] Recv command 0x46574c44
10,417,687 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,035 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,657 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,458 >>> mbox cmd response: success
14,680,936 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,685,330 UART: [afmc] ++
14,686,017 UART: [afmc] CDI.KEYID = 6
14,687,177 UART: [afmc] SUBJECT.KEYID = 7
14,688,713 UART: [afmc] AUTHORITY.KEYID = 5
17,233,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,956,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,958,527 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,600 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,988,774 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,656 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,637 UART: [afmc] --
19,031,498 UART: [cold-reset] --
19,035,302 UART: [state] Locking Datavault
19,040,980 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,324 UART: [state] Locking ICCM
19,045,282 UART: [exit] Launching FMC @ 0x40000130
19,053,907 UART:
19,054,145 UART: Running Caliptra FMC ...
19,055,245 UART:
19,055,403 UART: [state] CFI Enabled
19,114,939 UART: [fht] FMC Alias Private Key: 7
20,881,173 UART: [art] Extend RT PCRs Done
20,882,396 UART: [art] Lock RT PCRs Done
20,884,147 UART: [art] Populate DV Done
20,889,573 UART: [fht] FMC Alias Private Key: 7
20,891,276 UART: [art] Derive CDI
20,892,011 UART: [art] Store in slot 0x4
20,947,780 UART: [art] Derive Key Pair
20,948,770 UART: [art] Store priv key in slot 0x5
23,411,759 UART: [art] Derive Key Pair - Done
23,424,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,669 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,178 UART: [art] PUB.X = 45CA399ECDD6D1CB4A763150ADD5FD82ACC1234532B793CB51A968351F5706562A06629469DEA71DBB0D8626FBBF6DA9
25,146,453 UART: [art] PUB.Y = DF6D40BC9DC6ABD159124C98A41C76FC3424F1D4699294D7A9DABD71594DABD763395AD57A2CA79EC07E1B2AD3ACBA71
25,153,763 UART: [art] SIG.R = 1D1D766A384BC06E714C807D305C8A387A2EA74B235FD3A8CDB239A3A37522A14C4BC94C01F1D21C36EF7A58528E0983
25,161,115 UART: [art] SIG.S = B06CAAFA1EE85039C03B952081B22EBC4A3337CAD9C14A8E4514B01A7FEAC78B99B1AE3107411C1E6173B69F9CB36C06
26,140,235 UART: Caliptra RT
26,140,939 UART: [state] CFI Enabled
26,322,516 UART: [rt] RT listening for mailbox commands...
26,353,854 UART: [rt]cmd =0x43455252, len=4
26,365,379 >>> mbox cmd response data (783 bytes)
26,408,129 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,438,836 UART: [rt]cmd =0x44504543, len=92
30,785,173 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,416,909 ready_for_fw is high
3,417,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,806,387 >>> mbox cmd response: success
14,807,161 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,090,300 UART:
19,090,719 UART: Running Caliptra FMC ...
19,091,840 UART:
19,091,998 UART: [state] CFI Enabled
19,160,824 UART: [fht] FMC Alias Private Key: 7
20,926,981 UART: [art] Extend RT PCRs Done
20,928,210 UART: [art] Lock RT PCRs Done
20,930,167 UART: [art] Populate DV Done
20,935,495 UART: [fht] FMC Alias Private Key: 7
20,936,981 UART: [art] Derive CDI
20,937,745 UART: [art] Store in slot 0x4
20,993,214 UART: [art] Derive Key Pair
20,994,219 UART: [art] Store priv key in slot 0x5
23,456,629 UART: [art] Derive Key Pair - Done
23,469,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,182,538 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,050 UART: [art] PUB.X = 5B9FDDD1521C94DBB2ADA33DE3A9D566F581C4E9A15C2E23436D3BFBAF6071742F9302F4CE76D4D83DF395DC1C70A4FA
25,191,365 UART: [art] PUB.Y = FA1762F7BB7B6CEC0D29BA6A68F1B9853756E8A57F18A148369CA1BB79B2AE18F5D0C7747A4144EDB749BE7D63C8CF50
25,198,606 UART: [art] SIG.R = 2556DB9B326F9DEC9230124F35904C10FBC0521EF8B850DE714801742C3C0291D8AC747D97EE62036924D0EB30A2044D
25,206,009 UART: [art] SIG.S = 9FBFEF29778F6B0D221C28B9CD73CA63C7ABC99A0F2548DC652D0E910514DEE98E8B1BB145C5CAD62B0D564E594C5308
26,185,170 UART: Caliptra RT
26,185,860 UART: [state] CFI Enabled
26,365,878 UART: [rt] RT listening for mailbox commands...
26,397,359 UART: [rt]cmd =0x43455252, len=4
26,408,744 >>> mbox cmd response data (783 bytes)
26,451,682 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,482,447 UART: [rt]cmd =0x44504543, len=92
30,827,550 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,395 UART:
192,757 UART: Running Caliptra ROM ...
193,899 UART:
603,751 UART: [state] CFI Enabled
619,279 UART: [state] LifecycleState = Unprovisioned
621,675 UART: [state] DebugLocked = No
623,699 UART: [state] WD Timer not started. Device not locked for debugging
628,600 UART: [kat] SHA2-256
818,494 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,294 UART: [kat] ++
829,827 UART: [kat] sha1
842,523 UART: [kat] SHA2-256
845,507 UART: [kat] SHA2-384
850,238 UART: [kat] SHA2-512-ACC
852,839 UART: [kat] ECC-384
3,293,291 UART: [kat] HMAC-384Kdf
3,306,728 UART: [kat] LMS
3,838,547 UART: [kat] --
3,841,053 UART: [cold-reset] ++
3,842,425 UART: [fht] FHT @ 0x50003400
3,853,971 UART: [idev] ++
3,854,688 UART: [idev] CDI.KEYID = 6
3,855,578 UART: [idev] SUBJECT.KEYID = 7
3,856,821 UART: [idev] UDS.KEYID = 0
3,857,755 ready_for_fw is high
3,857,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,912 UART: [idev] Erasing UDS.KEYID = 0
6,332,092 UART: [idev] Sha1 KeyId Algorithm
6,355,425 UART: [idev] --
6,361,119 UART: [ldev] ++
6,361,811 UART: [ldev] CDI.KEYID = 6
6,362,699 UART: [ldev] SUBJECT.KEYID = 5
6,363,909 UART: [ldev] AUTHORITY.KEYID = 7
6,365,089 UART: [ldev] FE.KEYID = 1
6,375,771 UART: [ldev] Erasing FE.KEYID = 1
8,857,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,848 UART: [ldev] --
10,648,687 UART: [fwproc] Wait for Commands...
10,650,242 UART: [fwproc] Recv command 0x46574c44
10,652,518 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,230,454 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,056 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,757 >>> mbox cmd response: success
14,915,986 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,918,290 UART: [afmc] ++
14,918,997 UART: [afmc] CDI.KEYID = 6
14,920,248 UART: [afmc] SUBJECT.KEYID = 7
14,921,690 UART: [afmc] AUTHORITY.KEYID = 5
17,425,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,417 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,539 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,684 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,541 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,326 UART: [afmc] --
19,225,733 UART: [cold-reset] --
19,231,005 UART: [state] Locking Datavault
19,235,083 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,273 UART: [state] Locking ICCM
19,238,822 UART: [exit] Launching FMC @ 0x40000130
19,247,509 UART:
19,247,749 UART: Running Caliptra FMC ...
19,248,781 UART:
19,248,931 UART: [state] CFI Enabled
19,257,305 UART: [fht] FMC Alias Private Key: 7
21,023,927 UART: [art] Extend RT PCRs Done
21,025,159 UART: [art] Lock RT PCRs Done
21,026,764 UART: [art] Populate DV Done
21,032,072 UART: [fht] FMC Alias Private Key: 7
21,033,782 UART: [art] Derive CDI
21,034,547 UART: [art] Store in slot 0x4
21,077,201 UART: [art] Derive Key Pair
21,078,248 UART: [art] Store priv key in slot 0x5
23,505,083 UART: [art] Derive Key Pair - Done
23,518,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,160 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,670 UART: [art] PUB.X = 5A3AAD0E9056B22D15764FED0D722105856B5F19D79A6010F019149F616E11D65FCAB54B86B140039DAC509F576BC090
25,232,937 UART: [art] PUB.Y = F556190DA5DF9F6150A04BBD6ED0B90E5D6575FDD9094B082DAAD2BFF2341AAD34FDC6B0F757A6ABD5AA874DE9779F76
25,240,225 UART: [art] SIG.R = EFA296F721DFCBFBAA6F322C8B06521E4A600641C78824D2EF055E5EDE4D6EF6E3F169E288E397A2CCA8EFD79AD32329
25,247,651 UART: [art] SIG.S = 78FF47771E9D499592BF5C3386B1C76FA8C3EC3C600C0CE18D04BFDD5535092A01829981715A8AF98F88ECB004F18787
26,226,406 UART: Caliptra RT
26,227,114 UART: [state] CFI Enabled
26,360,157 UART: [rt] RT listening for mailbox commands...
26,391,188 UART: [rt]cmd =0x43455252, len=4
26,402,706 >>> mbox cmd response data (783 bytes)
26,447,957 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,478,695 UART: [rt]cmd =0x44504543, len=92
30,764,789 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,748,102 ready_for_fw is high
3,748,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,034,204 >>> mbox cmd response: success
15,035,691 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,283,982 UART:
19,284,375 UART: Running Caliptra FMC ...
19,285,586 UART:
19,285,767 UART: [state] CFI Enabled
19,293,779 UART: [fht] FMC Alias Private Key: 7
21,060,117 UART: [art] Extend RT PCRs Done
21,061,351 UART: [art] Lock RT PCRs Done
21,062,988 UART: [art] Populate DV Done
21,068,579 UART: [fht] FMC Alias Private Key: 7
21,070,179 UART: [art] Derive CDI
21,070,927 UART: [art] Store in slot 0x4
21,113,637 UART: [art] Derive Key Pair
21,114,681 UART: [art] Store priv key in slot 0x5
23,541,739 UART: [art] Derive Key Pair - Done
23,554,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,260,581 UART: [art] Erasing AUTHORITY.KEYID = 7
25,262,089 UART: [art] PUB.X = D8EDD840E486ED2E882E46A1604C7F4D213FE898FC3AF0AF5616628BDE443088F96B9C828DA623A6E7D72AABFD2C6C9C
25,269,534 UART: [art] PUB.Y = 9D005BA05C0EB6BDF52199EC3B56C13F251EFE3DB3E11387E2924A3B62AAE1D13C480D0B31A5FBBBBEAB8FFA7AE677C7
25,276,645 UART: [art] SIG.R = 04AA31E2B54E14B6D9E74FBD28A91CCFC3FF2058973BB4FB3E0309D10217C7768493F694D1B09FDBD2ADEED43DCB1352
25,284,054 UART: [art] SIG.S = 04CE5568738347BC832B32B29A70B9FB1A9B08844CE9A9F6CEECAD799DF862E08C8B7BDF201B5C5746C68D08F97EB331
26,263,594 UART: Caliptra RT
26,264,292 UART: [state] CFI Enabled
26,396,434 UART: [rt] RT listening for mailbox commands...
26,427,963 UART: [rt]cmd =0x43455252, len=4
26,439,598 >>> mbox cmd response data (782 bytes)
26,484,375 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,514,969 UART: [rt]cmd =0x44504543, len=92
30,801,554 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,051 UART: [kat] SHA2-256
881,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,097 UART: [kat] ++
886,249 UART: [kat] sha1
890,547 UART: [kat] SHA2-256
892,485 UART: [kat] SHA2-384
895,350 UART: [kat] SHA2-512-ACC
897,251 UART: [kat] ECC-384
902,732 UART: [kat] HMAC-384Kdf
907,188 UART: [kat] LMS
1,475,384 UART: [kat] --
1,476,133 UART: [cold-reset] ++
1,476,691 UART: [fht] Storing FHT @ 0x50003400
1,479,316 UART: [idev] ++
1,479,484 UART: [idev] CDI.KEYID = 6
1,479,844 UART: [idev] SUBJECT.KEYID = 7
1,480,268 UART: [idev] UDS.KEYID = 0
1,480,613 ready_for_fw is high
1,480,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,264 UART: [idev] Erasing UDS.KEYID = 0
1,505,164 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,806 UART: [idev] --
1,514,995 UART: [ldev] ++
1,515,163 UART: [ldev] CDI.KEYID = 6
1,515,526 UART: [ldev] SUBJECT.KEYID = 5
1,515,952 UART: [ldev] AUTHORITY.KEYID = 7
1,516,415 UART: [ldev] FE.KEYID = 1
1,521,449 UART: [ldev] Erasing FE.KEYID = 1
1,546,784 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,844 UART: [ldev] --
1,586,147 UART: [fwproc] Waiting for Commands...
1,586,962 UART: [fwproc] Received command 0x46574c44
1,587,753 UART: [fwproc] Received Image of size 118548 bytes
2,932,525 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,879 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,097 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,396 >>> mbox cmd response: success
3,131,396 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,132,520 UART: [afmc] ++
3,132,688 UART: [afmc] CDI.KEYID = 6
3,133,050 UART: [afmc] SUBJECT.KEYID = 7
3,133,475 UART: [afmc] AUTHORITY.KEYID = 5
3,168,732 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,954 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,734 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,443 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,326 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,009 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,921 UART: [afmc] --
3,211,827 UART: [cold-reset] --
3,212,591 UART: [state] Locking Datavault
3,214,028 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,632 UART: [state] Locking ICCM
3,215,286 UART: [exit] Launching FMC @ 0x40000130
3,220,616 UART:
3,220,632 UART: Running Caliptra FMC ...
3,221,040 UART:
3,221,094 UART: [state] CFI Enabled
3,231,566 UART: [fht] FMC Alias Private Key: 7
3,350,636 UART: [art] Extend RT PCRs Done
3,351,064 UART: [art] Lock RT PCRs Done
3,352,804 UART: [art] Populate DV Done
3,361,055 UART: [fht] FMC Alias Private Key: 7
3,362,075 UART: [art] Derive CDI
3,362,355 UART: [art] Store in slot 0x4
3,448,153 UART: [art] Derive Key Pair
3,448,513 UART: [art] Store priv key in slot 0x5
3,462,468 UART: [art] Derive Key Pair - Done
3,477,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,439 UART: [art] PUB.X = DEF8697EF3D02E38F653BC589426A623DF7F217504BD0953190972065543E7F07BF8BD3F48EF3F731A63A6C4E57CE789
3,500,199 UART: [art] PUB.Y = 1315CB47F01D710DF7C82F8547B0964CE171D17BD58870D2D8BB3368C2F31A04FF955B40D699D12EB8FB3F50921C795C
3,507,147 UART: [art] SIG.R = 0E252F5437D510985E7DAFA872F938B97BA2BD2B6608F8ECA8A6D165896E7E4C970982F5F9B795E10FE2050B3EA5FEF1
3,513,909 UART: [art] SIG.S = 4D2B6F9419EB1C09DFF35D7C3D42024B4679657673F89A6EB4CDCFBC686464CAB51D82F62460AB6DCA8B62A970B9F3F3
3,537,771 UART: Caliptra RT
3,538,022 UART: [state] CFI Enabled
3,657,827 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,511 UART: [rt]cmd =0x43455252, len=4
3,699,220 >>> mbox cmd response data (782 bytes)
3,699,221 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,729,112 UART: [rt]cmd =0x44504543, len=92
3,913,448 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,209 ready_for_fw is high
1,362,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,634 >>> mbox cmd response: success
2,979,634 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,040,871 UART:
3,040,887 UART: Running Caliptra FMC ...
3,041,295 UART:
3,041,349 UART: [state] CFI Enabled
3,052,003 UART: [fht] FMC Alias Private Key: 7
3,170,857 UART: [art] Extend RT PCRs Done
3,171,285 UART: [art] Lock RT PCRs Done
3,172,623 UART: [art] Populate DV Done
3,180,934 UART: [fht] FMC Alias Private Key: 7
3,182,032 UART: [art] Derive CDI
3,182,312 UART: [art] Store in slot 0x4
3,268,556 UART: [art] Derive Key Pair
3,268,916 UART: [art] Store priv key in slot 0x5
3,282,469 UART: [art] Derive Key Pair - Done
3,297,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,745 UART: [art] PUB.X = A442442081600CCE4E2F8E6FD678E2DBE9909A206845CECC9667346079C1DA50605CF876A4A568F4FA88DC56F5F8CB5F
3,320,520 UART: [art] PUB.Y = 6FC42F0AFFD2079D11C140FA3CD6E871A5B648FD20FB3E9F37B228EC35D178C4DD2E0B2E56B7F77AEC96F3A56785B5D4
3,327,481 UART: [art] SIG.R = CDF957255089F01A247125588DA8A0D14791EAF69CF1EBD9FB84AEAFA22A01FD7C7E9FCECED09C27ED1EA453B9EC7266
3,334,272 UART: [art] SIG.S = FAEDE0D2F80B537C181C12F10B4239DD972897A3D58C0BF84DB0FF100F27349EDB7498DC23B5E01ACF5378278AEA18D3
3,357,996 UART: Caliptra RT
3,358,247 UART: [state] CFI Enabled
3,478,964 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,512 UART: [rt]cmd =0x43455252, len=4
3,520,142 >>> mbox cmd response data (784 bytes)
3,520,143 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,142 UART: [rt]cmd =0x44504543, len=92
3,733,915 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,452 UART: [kat] SHA2-256
882,383 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,498 UART: [kat] ++
886,650 UART: [kat] sha1
891,002 UART: [kat] SHA2-256
892,940 UART: [kat] SHA2-384
895,499 UART: [kat] SHA2-512-ACC
897,400 UART: [kat] ECC-384
903,017 UART: [kat] HMAC-384Kdf
907,739 UART: [kat] LMS
1,475,935 UART: [kat] --
1,476,890 UART: [cold-reset] ++
1,477,270 UART: [fht] Storing FHT @ 0x50003400
1,480,145 UART: [idev] ++
1,480,313 UART: [idev] CDI.KEYID = 6
1,480,673 UART: [idev] SUBJECT.KEYID = 7
1,481,097 UART: [idev] UDS.KEYID = 0
1,481,442 ready_for_fw is high
1,481,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,273 UART: [idev] Erasing UDS.KEYID = 0
1,505,943 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,713 UART: [idev] --
1,515,878 UART: [ldev] ++
1,516,046 UART: [ldev] CDI.KEYID = 6
1,516,409 UART: [ldev] SUBJECT.KEYID = 5
1,516,835 UART: [ldev] AUTHORITY.KEYID = 7
1,517,298 UART: [ldev] FE.KEYID = 1
1,522,686 UART: [ldev] Erasing FE.KEYID = 1
1,548,129 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,813 UART: [ldev] --
1,587,142 UART: [fwproc] Waiting for Commands...
1,587,761 UART: [fwproc] Received command 0x46574c44
1,588,552 UART: [fwproc] Received Image of size 118548 bytes
2,933,906 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,104 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,322 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,657 >>> mbox cmd response: success
3,132,657 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,133,881 UART: [afmc] ++
3,134,049 UART: [afmc] CDI.KEYID = 6
3,134,411 UART: [afmc] SUBJECT.KEYID = 7
3,134,836 UART: [afmc] AUTHORITY.KEYID = 5
3,170,567 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,645 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,425 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,134 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,017 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,700 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,614 UART: [afmc] --
3,213,702 UART: [cold-reset] --
3,214,538 UART: [state] Locking Datavault
3,215,987 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,591 UART: [state] Locking ICCM
3,217,031 UART: [exit] Launching FMC @ 0x40000130
3,222,361 UART:
3,222,377 UART: Running Caliptra FMC ...
3,222,785 UART:
3,222,928 UART: [state] CFI Enabled
3,233,640 UART: [fht] FMC Alias Private Key: 7
3,352,938 UART: [art] Extend RT PCRs Done
3,353,366 UART: [art] Lock RT PCRs Done
3,354,908 UART: [art] Populate DV Done
3,363,159 UART: [fht] FMC Alias Private Key: 7
3,364,109 UART: [art] Derive CDI
3,364,389 UART: [art] Store in slot 0x4
3,450,495 UART: [art] Derive Key Pair
3,450,855 UART: [art] Store priv key in slot 0x5
3,464,174 UART: [art] Derive Key Pair - Done
3,478,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,447 UART: [art] PUB.X = 8FFA3F9BA4FB730080D19517BB1F5FDCE9A953B77864F5DCD556E943A108DE3B05149AEF5C5D398BE3F584B6F02BA1FE
3,502,209 UART: [art] PUB.Y = 9A17485EBECBB80816CCC52BB313D859B63F4DE446E0EA0678CEDD8E30FFD94D07BDC4CCAD875EE808F1087FCA29F522
3,509,168 UART: [art] SIG.R = CA15D8ABA928FA8C564522F8E31EC6492EEF32F25B24CAD54B7D8FCB7405B71379E9E840C66B19DF5608C3272B09760A
3,515,936 UART: [art] SIG.S = 5C937B9A9B6D4404BF1F8CD3029D2392CFF243F67A7F145FEB0AEBB5D9ABADCD5E7999CDBAE02D9A22991D9F1FD52046
3,540,039 UART: Caliptra RT
3,540,382 UART: [state] CFI Enabled
3,660,724 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,408 UART: [rt]cmd =0x43455252, len=4
3,702,195 >>> mbox cmd response data (783 bytes)
3,702,196 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,732,147 UART: [rt]cmd =0x44504543, len=92
3,916,884 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,734 ready_for_fw is high
1,362,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,091 >>> mbox cmd response: success
2,981,091 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,043,228 UART:
3,043,244 UART: Running Caliptra FMC ...
3,043,652 UART:
3,043,795 UART: [state] CFI Enabled
3,054,489 UART: [fht] FMC Alias Private Key: 7
3,173,763 UART: [art] Extend RT PCRs Done
3,174,191 UART: [art] Lock RT PCRs Done
3,175,669 UART: [art] Populate DV Done
3,183,790 UART: [fht] FMC Alias Private Key: 7
3,184,838 UART: [art] Derive CDI
3,185,118 UART: [art] Store in slot 0x4
3,270,838 UART: [art] Derive Key Pair
3,271,198 UART: [art] Store priv key in slot 0x5
3,284,255 UART: [art] Derive Key Pair - Done
3,299,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,302 UART: [art] PUB.X = C958712B052D7AA70CD0F082C16E60F9609ACA945287D5D6C76A9B4B216A878EA88144FB6B7ECB2B7F9C52178F27B97A
3,322,074 UART: [art] PUB.Y = DC2C80221C940D910A7EB235A03F973573BE85A7AA1E431083EB9C9DAE5C4571A1CE8DC39ED43C390854AD6A418F29B0
3,329,025 UART: [art] SIG.R = E8977B36BAD29FFE1466A0C8F0FA192E11172DE19AE2501FE87EF2998BF76A83CC3E5CD3BA05EE09CCCC35412BE0D096
3,335,809 UART: [art] SIG.S = D982223390DD41605A7EAE506C654B32077472D9B293A96E636E7AB9900F851F8BB4C0409FE167BFF48392EA9B4213A3
3,360,057 UART: Caliptra RT
3,360,400 UART: [state] CFI Enabled
3,480,329 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,699 UART: [rt]cmd =0x43455252, len=4
3,521,391 >>> mbox cmd response data (784 bytes)
3,521,392 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,551,245 UART: [rt]cmd =0x44504543, len=92
3,735,150 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,254 UART: [kat] ++
895,406 UART: [kat] sha1
899,606 UART: [kat] SHA2-256
901,546 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
916,011 UART: [kat] HMAC-384Kdf
920,459 UART: [kat] LMS
1,168,771 UART: [kat] --
1,169,888 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,173,094 UART: [idev] ++
1,173,262 UART: [idev] CDI.KEYID = 6
1,173,623 UART: [idev] SUBJECT.KEYID = 7
1,174,048 UART: [idev] UDS.KEYID = 0
1,174,394 ready_for_fw is high
1,174,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,019 UART: [idev] Erasing UDS.KEYID = 0
1,199,077 UART: [idev] Sha1 KeyId Algorithm
1,207,915 UART: [idev] --
1,208,838 UART: [ldev] ++
1,209,006 UART: [ldev] CDI.KEYID = 6
1,209,370 UART: [ldev] SUBJECT.KEYID = 5
1,209,797 UART: [ldev] AUTHORITY.KEYID = 7
1,210,260 UART: [ldev] FE.KEYID = 1
1,215,466 UART: [ldev] Erasing FE.KEYID = 1
1,241,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,756 UART: [ldev] --
1,280,967 UART: [fwproc] Wait for Commands...
1,281,746 UART: [fwproc] Recv command 0x46574c44
1,282,479 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,545 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,720 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,887 >>> mbox cmd response: success
2,825,887 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,827,063 UART: [afmc] ++
2,827,231 UART: [afmc] CDI.KEYID = 6
2,827,594 UART: [afmc] SUBJECT.KEYID = 7
2,828,020 UART: [afmc] AUTHORITY.KEYID = 5
2,863,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,411 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,121 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,002 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,703 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,390 UART: [afmc] --
2,906,253 UART: [cold-reset] --
2,906,923 UART: [state] Locking Datavault
2,907,986 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,590 UART: [state] Locking ICCM
2,909,180 UART: [exit] Launching FMC @ 0x40000130
2,914,510 UART:
2,914,526 UART: Running Caliptra FMC ...
2,914,934 UART:
2,914,988 UART: [state] CFI Enabled
2,925,648 UART: [fht] FMC Alias Private Key: 7
3,045,096 UART: [art] Extend RT PCRs Done
3,045,524 UART: [art] Lock RT PCRs Done
3,047,052 UART: [art] Populate DV Done
3,055,441 UART: [fht] FMC Alias Private Key: 7
3,056,561 UART: [art] Derive CDI
3,056,841 UART: [art] Store in slot 0x4
3,142,582 UART: [art] Derive Key Pair
3,142,942 UART: [art] Store priv key in slot 0x5
3,156,392 UART: [art] Derive Key Pair - Done
3,171,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,388 UART: [art] PUB.X = 01E0BBB19662D28620E43C61F43E044D10733874B322F5619D4F57A24DBC4048438DAB83058E06522EB430E41A9C0E99
3,194,137 UART: [art] PUB.Y = C784649E7663ADB7CD4091A9D9284E243174AB0957B88FD61AC2FC4FF925F51330B8E91825266A00A959B3CD1926062C
3,201,057 UART: [art] SIG.R = 212ADD320633F2FB3685E7C7AE962BB3D9ADADCFA42FC1FBBB03687182B7E1AAA0AE5184E83C2097FBDBBB98EA03EB41
3,207,846 UART: [art] SIG.S = 76314E47A667D902FD18BF4EF3430C8F905FAC335B497D69C0E0AB3AF2100AF501A00FF2B06BD9F77B8227546524D6D8
3,231,793 UART: Caliptra RT
3,232,044 UART: [state] CFI Enabled
3,352,662 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,938 UART: [rt]cmd =0x43455252, len=4
3,393,807 >>> mbox cmd response data (782 bytes)
3,393,808 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,799 UART: [rt]cmd =0x44504543, len=92
3,607,472 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,460 ready_for_fw is high
1,058,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,977 >>> mbox cmd response: success
2,676,977 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,739,886 UART:
2,739,902 UART: Running Caliptra FMC ...
2,740,310 UART:
2,740,364 UART: [state] CFI Enabled
2,751,202 UART: [fht] FMC Alias Private Key: 7
2,870,190 UART: [art] Extend RT PCRs Done
2,870,618 UART: [art] Lock RT PCRs Done
2,872,210 UART: [art] Populate DV Done
2,880,377 UART: [fht] FMC Alias Private Key: 7
2,881,521 UART: [art] Derive CDI
2,881,801 UART: [art] Store in slot 0x4
2,967,922 UART: [art] Derive Key Pair
2,968,282 UART: [art] Store priv key in slot 0x5
2,981,642 UART: [art] Derive Key Pair - Done
2,996,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,868 UART: [art] PUB.X = 7D26DC01DCCB2DA274E04505824BD2D8F96E80A5AF80C45238991AD66FC10BA6EC0E0B00D2112C93A1483DD1B1AFFB73
3,019,617 UART: [art] PUB.Y = 1B41E6C1B548B92708DE8607368232690C98409433C32878565520DDAE1C669C1B5D42D3E8F6B26125A58C2D5F95A342
3,026,548 UART: [art] SIG.R = 40FA86B9AD9757470D4702C06AE65157269F16705806AF9A52352133ED8FC036D382C4869696CDFB582FBA75CADA1232
3,033,307 UART: [art] SIG.S = 62CF30B82F1080CE5CBF4F67439972E794AC73854537878C3A98DC4559C46C3BBC0333B1F7F4F93E8881F059E7A446C6
3,056,662 UART: Caliptra RT
3,056,913 UART: [state] CFI Enabled
3,176,905 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,417 UART: [rt]cmd =0x43455252, len=4
3,218,322 >>> mbox cmd response data (782 bytes)
3,218,323 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,248,140 UART: [rt]cmd =0x44504543, len=92
3,432,970 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
921,030 UART: [kat] LMS
1,169,342 UART: [kat] --
1,170,203 UART: [cold-reset] ++
1,170,671 UART: [fht] FHT @ 0x50003400
1,173,415 UART: [idev] ++
1,173,583 UART: [idev] CDI.KEYID = 6
1,173,944 UART: [idev] SUBJECT.KEYID = 7
1,174,369 UART: [idev] UDS.KEYID = 0
1,174,715 ready_for_fw is high
1,174,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,966 UART: [idev] Erasing UDS.KEYID = 0
1,198,554 UART: [idev] Sha1 KeyId Algorithm
1,207,348 UART: [idev] --
1,208,429 UART: [ldev] ++
1,208,597 UART: [ldev] CDI.KEYID = 6
1,208,961 UART: [ldev] SUBJECT.KEYID = 5
1,209,388 UART: [ldev] AUTHORITY.KEYID = 7
1,209,851 UART: [ldev] FE.KEYID = 1
1,214,825 UART: [ldev] Erasing FE.KEYID = 1
1,241,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,499 UART: [ldev] --
1,280,898 UART: [fwproc] Wait for Commands...
1,281,713 UART: [fwproc] Recv command 0x46574c44
1,282,446 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,623 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,002 >>> mbox cmd response: success
2,826,002 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,827,072 UART: [afmc] ++
2,827,240 UART: [afmc] CDI.KEYID = 6
2,827,603 UART: [afmc] SUBJECT.KEYID = 7
2,828,029 UART: [afmc] AUTHORITY.KEYID = 5
2,863,396 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,566 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,276 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,157 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,858 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,701 UART: [afmc] --
2,906,560 UART: [cold-reset] --
2,907,402 UART: [state] Locking Datavault
2,908,687 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,291 UART: [state] Locking ICCM
2,909,815 UART: [exit] Launching FMC @ 0x40000130
2,915,145 UART:
2,915,161 UART: Running Caliptra FMC ...
2,915,569 UART:
2,915,712 UART: [state] CFI Enabled
2,926,464 UART: [fht] FMC Alias Private Key: 7
3,044,938 UART: [art] Extend RT PCRs Done
3,045,366 UART: [art] Lock RT PCRs Done
3,046,858 UART: [art] Populate DV Done
3,055,005 UART: [fht] FMC Alias Private Key: 7
3,055,947 UART: [art] Derive CDI
3,056,227 UART: [art] Store in slot 0x4
3,142,092 UART: [art] Derive Key Pair
3,142,452 UART: [art] Store priv key in slot 0x5
3,156,496 UART: [art] Derive Key Pair - Done
3,171,070 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,793 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,558 UART: [art] PUB.X = 342D23F9D5AEB721B18CBFED7596705F6544F21269280D8EF50EA7C78D2ADD26EF47BACF48E803422CFC92EE4902D568
3,194,328 UART: [art] PUB.Y = E08C3DA54E161DC4606255C8BB57A2D6AE8ADFF81D0ED535799EB3EBFABE66DD99E2711D47B3D99F0D57CCEB548F8998
3,201,294 UART: [art] SIG.R = EE34ACB4F76CBE42B5EE19A0A7A0955AEBAC9B0C867E96DD53212F7A3F52636FBDEE5B1A9D95F240E34EBB0663F9FED7
3,208,086 UART: [art] SIG.S = D61F745CD36CE968ACB75D2B7050A7C322D493BE1B0A7B0644D78A86FE340F58210B862E40AE7B288ECA722ED8125B8A
3,231,868 UART: Caliptra RT
3,232,211 UART: [state] CFI Enabled
3,351,175 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,743 UART: [rt]cmd =0x43455252, len=4
3,392,631 >>> mbox cmd response data (784 bytes)
3,392,632 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,439 UART: [rt]cmd =0x44504543, len=92
3,606,064 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,009 ready_for_fw is high
1,060,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,725 >>> mbox cmd response: success
2,678,725 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,741,298 UART:
2,741,314 UART: Running Caliptra FMC ...
2,741,722 UART:
2,741,865 UART: [state] CFI Enabled
2,752,081 UART: [fht] FMC Alias Private Key: 7
2,871,229 UART: [art] Extend RT PCRs Done
2,871,657 UART: [art] Lock RT PCRs Done
2,873,531 UART: [art] Populate DV Done
2,881,494 UART: [fht] FMC Alias Private Key: 7
2,882,632 UART: [art] Derive CDI
2,882,912 UART: [art] Store in slot 0x4
2,968,785 UART: [art] Derive Key Pair
2,969,145 UART: [art] Store priv key in slot 0x5
2,982,645 UART: [art] Derive Key Pair - Done
2,997,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,248 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,013 UART: [art] PUB.X = 22BDC51FC674835877579EDE7A882A07E3708C0DD6A84ED2C7B6C5BC448C159AC5448B758A340C8DEADF70FF21D55B6B
3,020,788 UART: [art] PUB.Y = 49843569A30E4A02652F6C7C91A9A07F2F1BBF94013BAE3C91061636B153A3D7EBBBAE87134266B7A33D0124435D5C0E
3,027,722 UART: [art] SIG.R = 980149D932787F37D969C85EF6C8D96DC285AC15831E4E0D2BF405C5B92FB368AD113A480571AD1F71A5B6C00DE5FAF7
3,034,485 UART: [art] SIG.S = 8196B5A4FE9AD0712CB56B57B3C3941F00B6EFA1BD1A0CB868D8D14563944D23618248C6AA320F3934ECFEB860C2F0C8
3,057,879 UART: Caliptra RT
3,058,222 UART: [state] CFI Enabled
3,177,784 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,220 UART: [rt]cmd =0x43455252, len=4
3,218,852 >>> mbox cmd response data (784 bytes)
3,218,853 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,249,074 UART: [rt]cmd =0x44504543, len=92
3,433,937 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
893,392 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,517 UART: [kat] ++
897,669 UART: [kat] sha1
902,015 UART: [kat] SHA2-256
903,955 UART: [kat] SHA2-384
906,716 UART: [kat] SHA2-512-ACC
908,617 UART: [kat] ECC-384
918,384 UART: [kat] HMAC-384Kdf
922,970 UART: [kat] LMS
1,171,298 UART: [kat] --
1,172,185 UART: [cold-reset] ++
1,172,743 UART: [fht] FHT @ 0x50003400
1,175,214 UART: [idev] ++
1,175,382 UART: [idev] CDI.KEYID = 6
1,175,742 UART: [idev] SUBJECT.KEYID = 7
1,176,166 UART: [idev] UDS.KEYID = 0
1,176,511 ready_for_fw is high
1,176,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,390 UART: [idev] Erasing UDS.KEYID = 0
1,201,041 UART: [idev] Sha1 KeyId Algorithm
1,209,485 UART: [idev] --
1,210,487 UART: [ldev] ++
1,210,655 UART: [ldev] CDI.KEYID = 6
1,211,018 UART: [ldev] SUBJECT.KEYID = 5
1,211,444 UART: [ldev] AUTHORITY.KEYID = 7
1,211,907 UART: [ldev] FE.KEYID = 1
1,217,267 UART: [ldev] Erasing FE.KEYID = 1
1,243,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,017 UART: [ldev] --
1,282,460 UART: [fwproc] Wait for Commands...
1,283,124 UART: [fwproc] Recv command 0x46574c44
1,283,852 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,322 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,492 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,733 >>> mbox cmd response: success
2,826,733 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,827,781 UART: [afmc] ++
2,827,949 UART: [afmc] CDI.KEYID = 6
2,828,311 UART: [afmc] SUBJECT.KEYID = 7
2,828,736 UART: [afmc] AUTHORITY.KEYID = 5
2,864,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,824 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,533 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,416 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,117 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,849 UART: [afmc] --
2,907,965 UART: [cold-reset] --
2,908,733 UART: [state] Locking Datavault
2,910,024 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,628 UART: [state] Locking ICCM
2,911,150 UART: [exit] Launching FMC @ 0x40000130
2,916,480 UART:
2,916,496 UART: Running Caliptra FMC ...
2,916,904 UART:
2,916,958 UART: [state] CFI Enabled
2,927,478 UART: [fht] FMC Alias Private Key: 7
3,047,604 UART: [art] Extend RT PCRs Done
3,048,032 UART: [art] Lock RT PCRs Done
3,049,574 UART: [art] Populate DV Done
3,057,617 UART: [fht] FMC Alias Private Key: 7
3,058,569 UART: [art] Derive CDI
3,058,849 UART: [art] Store in slot 0x4
3,144,528 UART: [art] Derive Key Pair
3,144,888 UART: [art] Store priv key in slot 0x5
3,157,858 UART: [art] Derive Key Pair - Done
3,172,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,625 UART: [art] PUB.X = 5A09891354404AF793ACC9DF914D616D9096CD2368462DFBD610E12F390A0810DD169EB231E847B8F53E47F3C1440440
3,195,379 UART: [art] PUB.Y = 3EFB7E615F038D14531336FE9BB99FBF80F219776EE47AFC253A7B70ED504E9A48E07EC59D858B01F7941AB9CBD3FFAF
3,202,341 UART: [art] SIG.R = DFCA0A82323E880409F4D6A794284434A605F267C5545100A0B2776C2FA42E0C58869BA6A5EA4FB916AF55BC41044331
3,209,069 UART: [art] SIG.S = 54F37188D8C2B4053B330E40E365F661013451846D1BEB187C330679CC7321158E2FAE587129D7BA4FF73114DE40364F
3,232,779 UART: Caliptra RT
3,233,030 UART: [state] CFI Enabled
3,352,423 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,999 UART: [rt]cmd =0x43455252, len=4
3,393,774 >>> mbox cmd response data (783 bytes)
3,393,775 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,888 UART: [rt]cmd =0x44504543, len=92
3,608,408 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,967 ready_for_fw is high
1,059,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,926 >>> mbox cmd response: success
2,678,926 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,740,893 UART:
2,740,909 UART: Running Caliptra FMC ...
2,741,317 UART:
2,741,371 UART: [state] CFI Enabled
2,751,981 UART: [fht] FMC Alias Private Key: 7
2,870,265 UART: [art] Extend RT PCRs Done
2,870,693 UART: [art] Lock RT PCRs Done
2,872,075 UART: [art] Populate DV Done
2,880,244 UART: [fht] FMC Alias Private Key: 7
2,881,188 UART: [art] Derive CDI
2,881,468 UART: [art] Store in slot 0x4
2,967,417 UART: [art] Derive Key Pair
2,967,777 UART: [art] Store priv key in slot 0x5
2,981,071 UART: [art] Derive Key Pair - Done
2,995,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,949 UART: [art] PUB.X = 604766CD56D6121076C5B96A387AE84F1C83D98131F8E7B97DA61C42F2B3C824746719DAD1A8268375CD652711D64D95
3,018,713 UART: [art] PUB.Y = 3CB4FD3E9A1053B3438688C3BFC0C1A5087A5711E588E3117055B2643509CC5695AB7241074714CB1FEADFBCDA04DBB4
3,025,659 UART: [art] SIG.R = 4E165BDD64B2B8EA3A8E779D93415273D0AECFD6F6E41474EE42E386028691D8FEE5723855B13C643325D0901921D902
3,032,421 UART: [art] SIG.S = 5394DDBBF65B89A35BF426423F8D254249DE975C40AC3744F8B965F26D56155FE496FCDBCA47C2A856E734D40F9CDAD6
3,056,602 UART: Caliptra RT
3,056,853 UART: [state] CFI Enabled
3,176,633 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,107 UART: [rt]cmd =0x43455252, len=4
3,217,890 >>> mbox cmd response data (782 bytes)
3,217,891 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,688 UART: [rt]cmd =0x44504543, len=92
3,432,322 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
893,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,626 UART: [kat] ++
897,778 UART: [kat] sha1
901,822 UART: [kat] SHA2-256
903,762 UART: [kat] SHA2-384
906,503 UART: [kat] SHA2-512-ACC
908,404 UART: [kat] ECC-384
917,925 UART: [kat] HMAC-384Kdf
922,545 UART: [kat] LMS
1,170,873 UART: [kat] --
1,171,954 UART: [cold-reset] ++
1,172,376 UART: [fht] FHT @ 0x50003400
1,175,219 UART: [idev] ++
1,175,387 UART: [idev] CDI.KEYID = 6
1,175,747 UART: [idev] SUBJECT.KEYID = 7
1,176,171 UART: [idev] UDS.KEYID = 0
1,176,516 ready_for_fw is high
1,176,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,495 UART: [idev] Erasing UDS.KEYID = 0
1,201,432 UART: [idev] Sha1 KeyId Algorithm
1,209,978 UART: [idev] --
1,210,944 UART: [ldev] ++
1,211,112 UART: [ldev] CDI.KEYID = 6
1,211,475 UART: [ldev] SUBJECT.KEYID = 5
1,211,901 UART: [ldev] AUTHORITY.KEYID = 7
1,212,364 UART: [ldev] FE.KEYID = 1
1,217,362 UART: [ldev] Erasing FE.KEYID = 1
1,244,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,998 UART: [ldev] --
1,283,471 UART: [fwproc] Wait for Commands...
1,284,061 UART: [fwproc] Recv command 0x46574c44
1,284,789 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,075 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,245 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,434 >>> mbox cmd response: success
2,828,434 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,829,584 UART: [afmc] ++
2,829,752 UART: [afmc] CDI.KEYID = 6
2,830,114 UART: [afmc] SUBJECT.KEYID = 7
2,830,539 UART: [afmc] AUTHORITY.KEYID = 5
2,866,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,857 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,566 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,449 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,150 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,054 UART: [afmc] --
2,909,970 UART: [cold-reset] --
2,910,998 UART: [state] Locking Datavault
2,912,067 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,671 UART: [state] Locking ICCM
2,913,283 UART: [exit] Launching FMC @ 0x40000130
2,918,613 UART:
2,918,629 UART: Running Caliptra FMC ...
2,919,037 UART:
2,919,180 UART: [state] CFI Enabled
2,929,806 UART: [fht] FMC Alias Private Key: 7
3,048,746 UART: [art] Extend RT PCRs Done
3,049,174 UART: [art] Lock RT PCRs Done
3,050,866 UART: [art] Populate DV Done
3,059,399 UART: [fht] FMC Alias Private Key: 7
3,060,379 UART: [art] Derive CDI
3,060,659 UART: [art] Store in slot 0x4
3,146,134 UART: [art] Derive Key Pair
3,146,494 UART: [art] Store priv key in slot 0x5
3,159,912 UART: [art] Derive Key Pair - Done
3,174,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,000 UART: [art] PUB.X = 02315999CDFE379B18FC2D4ACBC56A257F2FA0F4F887509F4AF5F1E82CC0BF961EF8AC35A0A6A5A56D76D68729B6BAB5
3,197,787 UART: [art] PUB.Y = A207B2A83A5A2EF165A04BB9BD67932C6FEA7CD7DFAE137F7DABF38C87BC8807296E61E3E74A80ABE06384F61AE039BE
3,204,753 UART: [art] SIG.R = 6572F840F46296FA9F6BDBB54EFEC97F679D85798F564CE8049D6B51F48676D54B3F87B3AA087C521991B7D52B4F3ABE
3,211,525 UART: [art] SIG.S = A591937246E604B5CB1DAE2B574C2B93836072318F0791950E2B1992E61FAE9529901F1AC451E479532AFBB9A6A39BB0
3,235,246 UART: Caliptra RT
3,235,589 UART: [state] CFI Enabled
3,356,596 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,208 UART: [rt]cmd =0x43455252, len=4
3,398,097 >>> mbox cmd response data (783 bytes)
3,398,098 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,428,109 UART: [rt]cmd =0x44504543, len=92
3,613,266 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,652 ready_for_fw is high
1,061,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,919 >>> mbox cmd response: success
2,679,919 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,742,484 UART:
2,742,500 UART: Running Caliptra FMC ...
2,742,908 UART:
2,743,051 UART: [state] CFI Enabled
2,753,687 UART: [fht] FMC Alias Private Key: 7
2,872,773 UART: [art] Extend RT PCRs Done
2,873,201 UART: [art] Lock RT PCRs Done
2,874,759 UART: [art] Populate DV Done
2,883,066 UART: [fht] FMC Alias Private Key: 7
2,884,224 UART: [art] Derive CDI
2,884,504 UART: [art] Store in slot 0x4
2,969,773 UART: [art] Derive Key Pair
2,970,133 UART: [art] Store priv key in slot 0x5
2,983,139 UART: [art] Derive Key Pair - Done
2,997,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,430 UART: [art] PUB.X = 38826C628FC82BB332C43696BE1B95E242C7009E968E8009BED5FFB84403E7F577D633A1170A8EE28324F757F4E52829
3,021,165 UART: [art] PUB.Y = DDA6568E6DADB3DB68B0EA0BE4D5B7B69D3C3CED80998D20C95FACAE59673CC66734821189E5737522982E0BA56F39FF
3,028,125 UART: [art] SIG.R = CA0296588CDE143F1FB7E11C8053EE477F2952CDFD33A6C5B679E7346ED39EFB1997FC2B903E4BAD88D513E91C2CF143
3,034,906 UART: [art] SIG.S = ACDACCF7BC255C3E6E189A4456A0421DA729939D7B09E48BE60F0B61A1AF440672EEE0AD7EF4C8B0C28E39B72F35B935
3,058,838 UART: Caliptra RT
3,059,181 UART: [state] CFI Enabled
3,177,657 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,363 UART: [rt]cmd =0x43455252, len=4
3,219,207 >>> mbox cmd response data (784 bytes)
3,219,208 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,249,219 UART: [rt]cmd =0x44504543, len=92
3,433,684 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
191,996 UART:
192,357 UART: Running Caliptra ROM ...
193,468 UART:
193,614 UART: [state] CFI Enabled
268,154 UART: [state] LifecycleState = Unprovisioned
270,151 UART: [state] DebugLocked = No
271,680 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,560 UART: [kat] SHA2-256
446,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,763 UART: [kat] ++
457,212 UART: [kat] sha1
468,580 UART: [kat] SHA2-256
471,302 UART: [kat] SHA2-384
477,644 UART: [kat] SHA2-512-ACC
480,030 UART: [kat] ECC-384
2,768,620 UART: [kat] HMAC-384Kdf
2,801,385 UART: [kat] LMS
3,991,665 UART: [kat] --
3,995,188 UART: [cold-reset] ++
3,997,120 UART: [fht] Storing FHT @ 0x50003400
4,008,523 UART: [idev] ++
4,009,174 UART: [idev] CDI.KEYID = 6
4,010,064 UART: [idev] SUBJECT.KEYID = 7
4,011,311 UART: [idev] UDS.KEYID = 0
4,012,277 ready_for_fw is high
4,012,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,559 UART: [idev] Erasing UDS.KEYID = 0
7,346,019 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,838 UART: [idev] --
7,371,351 UART: [ldev] ++
7,371,945 UART: [ldev] CDI.KEYID = 6
7,372,962 UART: [ldev] SUBJECT.KEYID = 5
7,374,213 UART: [ldev] AUTHORITY.KEYID = 7
7,375,410 UART: [ldev] FE.KEYID = 1
7,421,548 UART: [ldev] Erasing FE.KEYID = 1
10,755,026 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,547 UART: [ldev] --
13,138,856 UART: [fwproc] Waiting for Commands...
13,142,144 UART: [fwproc] Received command 0x46574c44
13,144,329 UART: [fwproc] Received Image of size 118548 bytes
17,251,992 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,329,097 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,402,241 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,731,139 >>> mbox cmd response: success
17,732,202 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,734,552 UART: [afmc] ++
17,735,133 UART: [afmc] CDI.KEYID = 6
17,736,043 UART: [afmc] SUBJECT.KEYID = 7
17,737,316 UART: [afmc] AUTHORITY.KEYID = 5
21,093,131 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,391,289 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,553 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,407,951 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,700 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,437,121 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,120 UART: [afmc] --
23,462,349 UART: [cold-reset] --
23,467,134 UART: [state] Locking Datavault
23,473,278 UART: [state] Locking PCR0, PCR1 and PCR31
23,475,036 UART: [state] Locking ICCM
23,477,031 UART: [exit] Launching FMC @ 0x40000130
23,485,377 UART:
23,485,612 UART: Running Caliptra FMC ...
23,486,720 UART:
23,486,880 UART: [state] CFI Enabled
23,550,831 UART: [fht] FMC Alias Private Key: 7
25,890,897 UART: [art] Extend RT PCRs Done
25,892,121 UART: [art] Lock RT PCRs Done
25,893,694 UART: [art] Populate DV Done
25,899,327 UART: [fht] FMC Alias Private Key: 7
25,900,926 UART: [art] Derive CDI
25,901,743 UART: [art] Store in slot 0x4
25,960,161 UART: [art] Derive Key Pair
25,961,200 UART: [art] Store priv key in slot 0x5
29,254,262 UART: [art] Derive Key Pair - Done
29,267,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,954 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,472 UART: [art] PUB.X = 728FF2B32FDC33DB156EB6B03CA2C0F279E97C963D94A71A338D5D30D72CFBF30DCDF6376BB3AFAB388CA4A7F9848DBA
31,564,801 UART: [art] PUB.Y = 60FE2A7592FF5743060443FF5F9A2FF86D65DDAC46242091CF5A3FE4BD84E24017234EAF3D4CBE0099736990F39B7DC4
31,572,047 UART: [art] SIG.R = E3024FB1BE5A8E5FB9D418D8526AA75F11F4EC6CBA7DA147997EAABD693641DCF9E2FD27D3A04928AF35D85A2C77D4F1
31,579,460 UART: [art] SIG.S = 137236949DA3953FCE85AC11D6FF15C040297F2696AB123D16A00C43925A2ADC1039F309865CB0F8918F3DACBF229821
32,884,228 UART: Caliptra RT
32,884,944 UART: [state] CFI Enabled
33,060,905 UART: [rt] RT listening for mailbox commands...
33,092,374 UART: [rt]cmd =0x4c444556, len=4
33,103,517 >>> mbox cmd response data (687 bytes)
33,145,225 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,175,384 UART: [rt]cmd =0x43455246, len=4
33,188,307 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
3,783,861 ready_for_fw is high
3,784,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,949,825 >>> mbox cmd response: success
17,951,103 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,652,095 UART:
23,652,512 UART: Running Caliptra FMC ...
23,653,626 UART:
23,653,788 UART: [state] CFI Enabled
23,720,731 UART: [fht] FMC Alias Private Key: 7
26,060,752 UART: [art] Extend RT PCRs Done
26,061,978 UART: [art] Lock RT PCRs Done
26,063,500 UART: [art] Populate DV Done
26,069,037 UART: [fht] FMC Alias Private Key: 7
26,070,750 UART: [art] Derive CDI
26,071,524 UART: [art] Store in slot 0x4
26,128,410 UART: [art] Derive Key Pair
26,129,461 UART: [art] Store priv key in slot 0x5
29,422,456 UART: [art] Derive Key Pair - Done
29,435,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,512 UART: [art] Erasing AUTHORITY.KEYID = 7
31,726,040 UART: [art] PUB.X = 8D04D820E1796C74C80FC31E9C1028804B45C11A3E3BB74360513C253E36C4D2713C7BFC92F42765EB88A9EEE16EA6F7
31,733,251 UART: [art] PUB.Y = 88700123A950A83B701C266B37699FCD428402EBDC96B21A4D0C687209FADCBD1B1B9889882A33D01B2504B141C740A3
31,740,496 UART: [art] SIG.R = 9960BE8EF421DAB0D28E7FED5BF5CB91B283A3110C3A2020E4D46BDF26F37A9C952B9E891DA3A15C30B2284D7AA2A59C
31,747,956 UART: [art] SIG.S = AF24153E1B8DD84A766C68A3C1DFBD53D440EF55BB963F141760BDC306726D2E01A7DFA7C99D4BE0784A11F6F126AC16
33,052,140 UART: Caliptra RT
33,052,862 UART: [state] CFI Enabled
33,231,463 UART: [rt] RT listening for mailbox commands...
33,262,759 UART: [rt]cmd =0x4c444556, len=4
33,273,820 >>> mbox cmd response data (687 bytes)
33,315,058 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,344,829 UART: [rt]cmd =0x43455246, len=4
33,357,711 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,390 UART:
192,762 UART: Running Caliptra ROM ...
193,860 UART:
603,710 UART: [state] CFI Enabled
618,162 UART: [state] LifecycleState = Unprovisioned
620,101 UART: [state] DebugLocked = No
621,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,612 UART: [kat] SHA2-256
796,342 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,929 UART: [kat] ++
807,374 UART: [kat] sha1
818,099 UART: [kat] SHA2-256
820,816 UART: [kat] SHA2-384
826,435 UART: [kat] SHA2-512-ACC
828,766 UART: [kat] ECC-384
3,113,227 UART: [kat] HMAC-384Kdf
3,125,102 UART: [kat] LMS
4,315,259 UART: [kat] --
4,321,544 UART: [cold-reset] ++
4,323,117 UART: [fht] Storing FHT @ 0x50003400
4,335,083 UART: [idev] ++
4,335,727 UART: [idev] CDI.KEYID = 6
4,336,639 UART: [idev] SUBJECT.KEYID = 7
4,337,881 UART: [idev] UDS.KEYID = 0
4,338,912 ready_for_fw is high
4,339,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,037 UART: [idev] Erasing UDS.KEYID = 0
7,620,202 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,680 UART: [idev] --
7,645,534 UART: [ldev] ++
7,646,101 UART: [ldev] CDI.KEYID = 6
7,647,033 UART: [ldev] SUBJECT.KEYID = 5
7,648,297 UART: [ldev] AUTHORITY.KEYID = 7
7,649,500 UART: [ldev] FE.KEYID = 1
7,660,811 UART: [ldev] Erasing FE.KEYID = 1
10,947,006 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,768 UART: [ldev] --
13,311,235 UART: [fwproc] Waiting for Commands...
13,314,034 UART: [fwproc] Received command 0x46574c44
13,316,219 UART: [fwproc] Received Image of size 118548 bytes
17,428,402 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,505,268 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,450 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,258 >>> mbox cmd response: success
17,907,335 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,909,736 UART: [afmc] ++
17,910,322 UART: [afmc] CDI.KEYID = 6
17,911,204 UART: [afmc] SUBJECT.KEYID = 7
17,912,469 UART: [afmc] AUTHORITY.KEYID = 5
21,223,231 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,577 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,835 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,275 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,002 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,384 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,674 UART: [afmc] --
23,586,753 UART: [cold-reset] --
23,590,787 UART: [state] Locking Datavault
23,595,815 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,562 UART: [state] Locking ICCM
23,599,118 UART: [exit] Launching FMC @ 0x40000130
23,607,513 UART:
23,607,741 UART: Running Caliptra FMC ...
23,608,835 UART:
23,608,988 UART: [state] CFI Enabled
23,617,188 UART: [fht] FMC Alias Private Key: 7
25,957,048 UART: [art] Extend RT PCRs Done
25,958,269 UART: [art] Lock RT PCRs Done
25,959,750 UART: [art] Populate DV Done
25,965,051 UART: [fht] FMC Alias Private Key: 7
25,966,585 UART: [art] Derive CDI
25,967,388 UART: [art] Store in slot 0x4
26,010,297 UART: [art] Derive Key Pair
26,011,313 UART: [art] Store priv key in slot 0x5
29,253,526 UART: [art] Derive Key Pair - Done
29,266,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,449 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,215 UART: [art] PUB.X = DA8F670CACC1DC20DD67387CA910E7917FF38F0C2A0BD9427F1519E31E5C2010868E2B1BFB6D97656DB92BF94617B975
31,555,209 UART: [art] PUB.Y = B51F36921FE60C915BBA46725F81229A1F230A341AECCC68157D1A60C016CFBC974DA7ED1F77E149D06C9CD9B16A7E63
31,562,489 UART: [art] SIG.R = E70CFA78F67599B40C2DAF148EBC8785F2B9303C54DE1A550508848E8D9D946197441FC119B2636B4D73BB04DD96208C
31,569,884 UART: [art] SIG.S = 9908C4F821F503F7D42DF0BC961C637699E6B75C48720FFF2FFF8A880C5813B867B0764ED06E2F9B9A5784C8908F4B35
32,874,968 UART: Caliptra RT
32,876,153 UART: [state] CFI Enabled
33,010,281 UART: [rt] RT listening for mailbox commands...
33,041,770 UART: [rt]cmd =0x4c444556, len=4
33,052,746 >>> mbox cmd response data (687 bytes)
33,096,258 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,126,802 UART: [rt]cmd =0x43455246, len=4
33,139,711 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
4,120,505 ready_for_fw is high
4,120,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,152,116 >>> mbox cmd response: success
18,153,584 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,795,888 UART:
23,796,338 UART: Running Caliptra FMC ...
23,797,446 UART:
23,797,597 UART: [state] CFI Enabled
23,805,298 UART: [fht] FMC Alias Private Key: 7
26,145,079 UART: [art] Extend RT PCRs Done
26,146,308 UART: [art] Lock RT PCRs Done
26,147,693 UART: [art] Populate DV Done
26,152,859 UART: [fht] FMC Alias Private Key: 7
26,154,411 UART: [art] Derive CDI
26,155,156 UART: [art] Store in slot 0x4
26,197,641 UART: [art] Derive Key Pair
26,198,641 UART: [art] Store priv key in slot 0x5
29,441,088 UART: [art] Derive Key Pair - Done
29,454,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,685 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,190 UART: [art] PUB.X = 9C16147EFD5F78C606899D8F0165C9CC21DF09602D45A55C2AB418E8C2A27E2E5543789A72A284A9299C1D8970ECCA9C
31,743,452 UART: [art] PUB.Y = BD26B026815834B4DA18ACE98F4E0AF301BB65A3AF3A1E91919D6419FD6E9F1FF7A323DFD834272A6A72E8B90A113344
31,750,690 UART: [art] SIG.R = 29B2AB8811C91F82FA43CFAA5CFB602156BA8C9DB0CABE954F4BCA27EAF2FB7CDAF6C931061B2C4B8879431B6DB1D519
31,758,165 UART: [art] SIG.S = B66CC0304D458531433DF41996349B935AA661724A3B2BE70508690DDD9F66C5A62B584D7F6E79AF81E3968594DAC023
33,062,897 UART: Caliptra RT
33,063,598 UART: [state] CFI Enabled
33,196,641 UART: [rt] RT listening for mailbox commands...
33,228,019 UART: [rt]cmd =0x4c444556, len=4
33,239,000 >>> mbox cmd response data (687 bytes)
33,281,016 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,311,241 UART: [rt]cmd =0x43455246, len=4
33,324,144 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,266 UART:
192,647 UART: Running Caliptra ROM ...
193,841 UART:
193,993 UART: [state] CFI Enabled
264,602 UART: [state] LifecycleState = Unprovisioned
266,592 UART: [state] DebugLocked = No
268,837 UART: [state] WD Timer not started. Device not locked for debugging
272,728 UART: [kat] SHA2-256
452,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,180 UART: [kat] ++
463,628 UART: [kat] sha1
474,642 UART: [kat] SHA2-256
477,365 UART: [kat] SHA2-384
482,715 UART: [kat] SHA2-512-ACC
485,078 UART: [kat] ECC-384
2,949,194 UART: [kat] HMAC-384Kdf
2,972,025 UART: [kat] LMS
3,448,461 UART: [kat] --
3,454,729 UART: [cold-reset] ++
3,456,803 UART: [fht] FHT @ 0x50003400
3,469,193 UART: [idev] ++
3,469,749 UART: [idev] CDI.KEYID = 6
3,470,699 UART: [idev] SUBJECT.KEYID = 7
3,471,940 UART: [idev] UDS.KEYID = 0
3,472,901 ready_for_fw is high
3,473,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,132 UART: [idev] Erasing UDS.KEYID = 0
5,988,023 UART: [idev] Sha1 KeyId Algorithm
6,012,267 UART: [idev] --
6,016,733 UART: [ldev] ++
6,017,307 UART: [ldev] CDI.KEYID = 6
6,018,262 UART: [ldev] SUBJECT.KEYID = 5
6,019,474 UART: [ldev] AUTHORITY.KEYID = 7
6,020,699 UART: [ldev] FE.KEYID = 1
6,067,938 UART: [ldev] Erasing FE.KEYID = 1
8,572,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,310,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,326,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,342,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,358,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,378,905 UART: [ldev] --
10,383,513 UART: [fwproc] Wait for Commands...
10,385,489 UART: [fwproc] Recv command 0x46574c44
10,387,519 UART: [fwproc] Recv'd Img size: 118548 bytes
13,870,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,664 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,675 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,351,699 >>> mbox cmd response: success
14,352,804 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,355,041 UART: [afmc] ++
14,355,625 UART: [afmc] CDI.KEYID = 6
14,356,642 UART: [afmc] SUBJECT.KEYID = 7
14,357,795 UART: [afmc] AUTHORITY.KEYID = 5
16,883,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,626,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,628,325 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,644,132 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,660,192 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,675,743 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,700,992 UART: [afmc] --
18,704,313 UART: [cold-reset] --
18,707,519 UART: [state] Locking Datavault
18,713,948 UART: [state] Locking PCR0, PCR1 and PCR31
18,715,921 UART: [state] Locking ICCM
18,717,626 UART: [exit] Launching FMC @ 0x40000130
18,726,033 UART:
18,726,280 UART: Running Caliptra FMC ...
18,727,381 UART:
18,727,537 UART: [state] CFI Enabled
18,782,513 UART: [fht] FMC Alias Private Key: 7
20,549,505 UART: [art] Extend RT PCRs Done
20,550,735 UART: [art] Lock RT PCRs Done
20,552,411 UART: [art] Populate DV Done
20,557,877 UART: [fht] FMC Alias Private Key: 7
20,559,509 UART: [art] Derive CDI
20,560,328 UART: [art] Store in slot 0x4
20,615,618 UART: [art] Derive Key Pair
20,616,618 UART: [art] Store priv key in slot 0x5
23,079,072 UART: [art] Derive Key Pair - Done
23,091,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,805,395 UART: [art] Erasing AUTHORITY.KEYID = 7
24,806,896 UART: [art] PUB.X = C8FE3BDF23F689C7FD2325F64C9B4950634315317F46816645C2EBE78CEFCAA4DF48FD0D3C08B162AC160176200FF2DB
24,814,153 UART: [art] PUB.Y = D4F90F484202A2BCB871150298A2513B3491C5AE14BCC97A19982EAAE94E4387E96A2B97B807FEB064453BBC2CD4819D
24,821,435 UART: [art] SIG.R = 22A940FE1D7E113A15EED03659EDA2FAEA2606FD6F221E7C4CBA87DE359EF2A57CDBDCFBEC5B2311AFADACBBE50E5327
24,828,833 UART: [art] SIG.S = 7E8155F8F63A9C515FBC97479D87769CBC54032AFA3264304DCFFC7A5DA38D1F6E2F200E4BC6FB30E9CECDEAF0238DFD
25,808,339 UART: Caliptra RT
25,809,049 UART: [state] CFI Enabled
25,990,359 UART: [rt] RT listening for mailbox commands...
26,021,609 UART: [rt]cmd =0x4c444556, len=4
26,032,722 >>> mbox cmd response data (687 bytes)
26,073,581 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,103,316 UART: [rt]cmd =0x43455246, len=4
26,115,825 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,454,595 ready_for_fw is high
3,455,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,216,988 >>> mbox cmd response: success
14,218,220 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,506,048 UART:
18,506,432 UART: Running Caliptra FMC ...
18,507,629 UART:
18,507,815 UART: [state] CFI Enabled
18,575,768 UART: [fht] FMC Alias Private Key: 7
20,363,153 UART: [art] Extend RT PCRs Done
20,364,381 UART: [art] Lock RT PCRs Done
20,365,955 UART: [art] Populate DV Done
20,371,267 UART: [fht] FMC Alias Private Key: 7
20,372,814 UART: [art] Derive CDI
20,373,575 UART: [art] Store in slot 0x4
20,429,193 UART: [art] Derive Key Pair
20,430,235 UART: [art] Store priv key in slot 0x5
22,892,754 UART: [art] Derive Key Pair - Done
22,905,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,617,664 UART: [art] Erasing AUTHORITY.KEYID = 7
24,619,150 UART: [art] PUB.X = 2992524B41CFD3731F1179BF075B1D4E011EDEEC15F78467738DFE1C7DEDA9273C9FB19A8DE12990D65E6B7C619E198F
24,626,443 UART: [art] PUB.Y = 4762E66FB6AA6177EF0A702B9FBFE8F40E2F3B3D68C4A689CE20BC32F1F32ADF292C702D99D8C9C9E65F7615EAB8617B
24,633,749 UART: [art] SIG.R = CA9B0340BF6EA1AAE3684F67BD60E2A6F8177DBDB644EBD29CD1A5ACCEFD3A317C869B3DE6EB38F1885EBAEA9D9546E9
24,641,219 UART: [art] SIG.S = 2420B92301D8F8952E48178A5F0B137010CEAF285964B8700FFC86E23C697215EE393ECEEFEF64476BDC0EFFEB2FB0A6
25,620,296 UART: Caliptra RT
25,621,014 UART: [state] CFI Enabled
25,800,000 UART: [rt] RT listening for mailbox commands...
25,831,477 UART: [rt]cmd =0x4c444556, len=4
25,842,725 >>> mbox cmd response data (687 bytes)
25,883,861 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,913,770 UART: [rt]cmd =0x43455246, len=4
25,926,290 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,348 UART:
192,706 UART: Running Caliptra ROM ...
193,798 UART:
603,426 UART: [state] CFI Enabled
616,405 UART: [state] LifecycleState = Unprovisioned
618,282 UART: [state] DebugLocked = No
620,656 UART: [state] WD Timer not started. Device not locked for debugging
625,047 UART: [kat] SHA2-256
804,724 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,535 UART: [kat] ++
815,984 UART: [kat] sha1
826,094 UART: [kat] SHA2-256
828,809 UART: [kat] SHA2-384
833,817 UART: [kat] SHA2-512-ACC
836,197 UART: [kat] ECC-384
3,275,601 UART: [kat] HMAC-384Kdf
3,287,404 UART: [kat] LMS
3,763,939 UART: [kat] --
3,768,572 UART: [cold-reset] ++
3,769,644 UART: [fht] FHT @ 0x50003400
3,780,763 UART: [idev] ++
3,781,396 UART: [idev] CDI.KEYID = 6
3,782,307 UART: [idev] SUBJECT.KEYID = 7
3,783,551 UART: [idev] UDS.KEYID = 0
3,784,597 ready_for_fw is high
3,784,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,933,716 UART: [idev] Erasing UDS.KEYID = 0
6,264,524 UART: [idev] Sha1 KeyId Algorithm
6,288,443 UART: [idev] --
6,291,687 UART: [ldev] ++
6,292,255 UART: [ldev] CDI.KEYID = 6
6,293,170 UART: [ldev] SUBJECT.KEYID = 5
6,294,382 UART: [ldev] AUTHORITY.KEYID = 7
6,295,664 UART: [ldev] FE.KEYID = 1
6,308,525 UART: [ldev] Erasing FE.KEYID = 1
8,785,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,649 UART: [ldev] --
10,579,886 UART: [fwproc] Wait for Commands...
10,582,089 UART: [fwproc] Recv command 0x46574c44
10,584,080 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,983 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,984 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,978 >>> mbox cmd response: success
14,545,508 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,549,851 UART: [afmc] ++
14,550,491 UART: [afmc] CDI.KEYID = 6
14,551,374 UART: [afmc] SUBJECT.KEYID = 7
14,552,642 UART: [afmc] AUTHORITY.KEYID = 5
17,056,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,776,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,019 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,794,837 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,810,901 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,826,508 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,850,401 UART: [afmc] --
18,854,182 UART: [cold-reset] --
18,858,591 UART: [state] Locking Datavault
18,864,755 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,507 UART: [state] Locking ICCM
18,868,579 UART: [exit] Launching FMC @ 0x40000130
18,876,976 UART:
18,877,213 UART: Running Caliptra FMC ...
18,878,317 UART:
18,878,482 UART: [state] CFI Enabled
18,886,701 UART: [fht] FMC Alias Private Key: 7
20,652,809 UART: [art] Extend RT PCRs Done
20,654,028 UART: [art] Lock RT PCRs Done
20,655,361 UART: [art] Populate DV Done
20,660,828 UART: [fht] FMC Alias Private Key: 7
20,662,534 UART: [art] Derive CDI
20,663,347 UART: [art] Store in slot 0x4
20,706,154 UART: [art] Derive Key Pair
20,707,190 UART: [art] Store priv key in slot 0x5
23,133,940 UART: [art] Derive Key Pair - Done
23,146,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,006 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,516 UART: [art] PUB.X = A06771187F7168CE0A0D9350347989E8C8CFF17FA8A01A3B4DC12B2787783EDAB8871C0A3716639673E6AA8FDDC80B56
24,861,756 UART: [art] PUB.Y = A841BC1F9A2AB51383BBD12C131971A569C488399B4297A7DDFC8F4EA131B423F46BDF67179BC225D11F298528EDA700
24,868,983 UART: [art] SIG.R = EBCE3D04B0B53C8B80D7E219851E045B8AA8B88071492A881AF34DBDE9CDB57FE88E711DE4A7A9211A606E03945D7118
24,876,422 UART: [art] SIG.S = C12C6B97D7215522EAE7FBD39B03E0193FA88D67D0D9A1D4227A2CC5D06D2954B7E8C8AB119B95283B1607393E4C0C6B
25,855,602 UART: Caliptra RT
25,856,313 UART: [state] CFI Enabled
25,990,291 UART: [rt] RT listening for mailbox commands...
26,021,870 UART: [rt]cmd =0x4c444556, len=4
26,032,953 >>> mbox cmd response data (687 bytes)
26,073,756 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,103,640 UART: [rt]cmd =0x43455246, len=4
26,116,451 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
3,780,053 ready_for_fw is high
3,780,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,452 >>> mbox cmd response: success
14,449,222 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,692,071 UART:
18,692,450 UART: Running Caliptra FMC ...
18,693,646 UART:
18,693,816 UART: [state] CFI Enabled
18,701,556 UART: [fht] FMC Alias Private Key: 7
20,468,019 UART: [art] Extend RT PCRs Done
20,469,245 UART: [art] Lock RT PCRs Done
20,471,028 UART: [art] Populate DV Done
20,476,507 UART: [fht] FMC Alias Private Key: 7
20,478,211 UART: [art] Derive CDI
20,479,028 UART: [art] Store in slot 0x4
20,521,810 UART: [art] Derive Key Pair
20,522,854 UART: [art] Store priv key in slot 0x5
22,950,460 UART: [art] Derive Key Pair - Done
22,963,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,635 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,141 UART: [art] PUB.X = 50E8E295174D6168208D85D6EE4A00987A286A8E030D574E96501A365F1D4E2BDDC2453509642048B7F4C145E26BAAFE
24,678,405 UART: [art] PUB.Y = 59A7B082695C53B77BAA6269EC83924D8A8696E0CDF883E9456573BA3ABFA593A4BC13AEDFE5AD7583D8BEAFB3D5B1D4
24,685,661 UART: [art] SIG.R = 892F44C50E695CAC0155573D8808D62CBC5F5AF7D7D0C3CB4C55F0486B0063F5819967E2B62738FADE0A72FB903F1DFB
24,693,060 UART: [art] SIG.S = E578016B902AED8BB0B827B3F82F68C9B318B0ADCA2F1643C0960FE3D6D7E18E83BF718735DF2EB118DA50257B28707B
25,672,024 UART: Caliptra RT
25,672,730 UART: [state] CFI Enabled
25,805,951 UART: [rt] RT listening for mailbox commands...
25,837,361 UART: [rt]cmd =0x4c444556, len=4
25,848,335 >>> mbox cmd response data (687 bytes)
25,889,187 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,919,051 UART: [rt]cmd =0x43455246, len=4
25,931,806 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,115 UART:
192,496 UART: Running Caliptra ROM ...
193,579 UART:
193,719 UART: [state] CFI Enabled
265,000 UART: [state] LifecycleState = Unprovisioned
267,420 UART: [state] DebugLocked = No
268,738 UART: [state] WD Timer not started. Device not locked for debugging
272,771 UART: [kat] SHA2-256
462,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,426 UART: [kat] ++
473,871 UART: [kat] sha1
485,185 UART: [kat] SHA2-256
488,258 UART: [kat] SHA2-384
493,673 UART: [kat] SHA2-512-ACC
496,312 UART: [kat] ECC-384
2,948,339 UART: [kat] HMAC-384Kdf
2,972,143 UART: [kat] LMS
3,503,934 UART: [kat] --
3,508,088 UART: [cold-reset] ++
3,510,303 UART: [fht] FHT @ 0x50003400
3,522,065 UART: [idev] ++
3,522,769 UART: [idev] CDI.KEYID = 6
3,523,795 UART: [idev] SUBJECT.KEYID = 7
3,524,963 UART: [idev] UDS.KEYID = 0
3,525,896 ready_for_fw is high
3,526,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,154 UART: [idev] Erasing UDS.KEYID = 0
6,031,670 UART: [idev] Sha1 KeyId Algorithm
6,053,113 UART: [idev] --
6,058,834 UART: [ldev] ++
6,059,512 UART: [ldev] CDI.KEYID = 6
6,060,420 UART: [ldev] SUBJECT.KEYID = 5
6,061,633 UART: [ldev] AUTHORITY.KEYID = 7
6,062,809 UART: [ldev] FE.KEYID = 1
6,102,566 UART: [ldev] Erasing FE.KEYID = 1
8,610,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,740 UART: [ldev] --
10,415,709 UART: [fwproc] Wait for Commands...
10,417,464 UART: [fwproc] Recv command 0x46574c44
10,419,798 UART: [fwproc] Recv'd Img size: 118548 bytes
13,923,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,139 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,841 >>> mbox cmd response: success
14,678,951 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,682,658 UART: [afmc] ++
14,683,404 UART: [afmc] CDI.KEYID = 6
14,684,581 UART: [afmc] SUBJECT.KEYID = 7
14,686,062 UART: [afmc] AUTHORITY.KEYID = 5
17,217,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,941,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,943,309 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,958,428 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,973,584 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,988,501 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,538 UART: [afmc] --
19,014,439 UART: [cold-reset] --
19,018,512 UART: [state] Locking Datavault
19,023,758 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,942 UART: [state] Locking ICCM
19,027,776 UART: [exit] Launching FMC @ 0x40000130
19,036,445 UART:
19,036,682 UART: Running Caliptra FMC ...
19,037,784 UART:
19,037,946 UART: [state] CFI Enabled
19,098,233 UART: [fht] FMC Alias Private Key: 7
20,865,337 UART: [art] Extend RT PCRs Done
20,866,555 UART: [art] Lock RT PCRs Done
20,868,394 UART: [art] Populate DV Done
20,873,694 UART: [fht] FMC Alias Private Key: 7
20,875,235 UART: [art] Derive CDI
20,876,067 UART: [art] Store in slot 0x4
20,930,872 UART: [art] Derive Key Pair
20,931,910 UART: [art] Store priv key in slot 0x5
23,395,148 UART: [art] Derive Key Pair - Done
23,408,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,458 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,973 UART: [art] PUB.X = 1035A491742D29841E4152815C01A8EAB8DD899136A699A695C08AA85DACF26E81231908BAA93DD6084BBE75A837F3F6
25,129,192 UART: [art] PUB.Y = 70BE54B3D9E27F3B301D645E7EAC8C3063A0B6EB22ADCF6D431612A5E22CAFB11C847DD89E6DD87DAF7DB5027B941D15
25,136,487 UART: [art] SIG.R = CB171C9C7AB2D02001528B279E4405FBB8B9A0BD9E780F75205E47C3EEAA6229BE673D2CA630678DC4BDC749E4F2B9F8
25,143,915 UART: [art] SIG.S = 5D08391007B1FF6094A3382C2018818E00F38D7114AEBA186BA983175B26EBEDF69E169E3BC7A716C30761E987539A44
26,122,901 UART: Caliptra RT
26,123,588 UART: [state] CFI Enabled
26,303,665 UART: [rt] RT listening for mailbox commands...
26,334,897 UART: [rt]cmd =0x4c444556, len=4
26,346,085 >>> mbox cmd response data (687 bytes)
26,386,798 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,416,759 UART: [rt]cmd =0x43455246, len=4
26,429,423 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,440,260 ready_for_fw is high
3,440,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,935 >>> mbox cmd response: success
14,826,148 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,116,518 UART:
19,116,914 UART: Running Caliptra FMC ...
19,118,112 UART:
19,118,276 UART: [state] CFI Enabled
19,183,214 UART: [fht] FMC Alias Private Key: 7
20,949,617 UART: [art] Extend RT PCRs Done
20,950,836 UART: [art] Lock RT PCRs Done
20,952,607 UART: [art] Populate DV Done
20,957,778 UART: [fht] FMC Alias Private Key: 7
20,959,384 UART: [art] Derive CDI
20,960,126 UART: [art] Store in slot 0x4
21,016,494 UART: [art] Derive Key Pair
21,017,540 UART: [art] Store priv key in slot 0x5
23,480,589 UART: [art] Derive Key Pair - Done
23,493,535 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,206,207 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,726 UART: [art] PUB.X = 383173B9E11CFBE1DAA444F40C3E5CB1135A292E5FF8C85D8FB1819EA46043992FEB07123777864EF1D852A4D9D4506F
25,214,989 UART: [art] PUB.Y = 85BBC9D0C01DB938560D02AEFE38A0A4456467365481BF109504E4D3AF1B3212C7D33A79749D54888F1DB7A76DA3AE7D
25,222,229 UART: [art] SIG.R = 7C910A9E04442D6CA37A6264535708B2DDFAAC92F0AE5BDB27186689072FCA67273BE35B42417EB09D3308CAACB76484
25,229,638 UART: [art] SIG.S = 5586CCDDF13C7C3C1791D559AF28497D59D0FCB7A3EEB3D828DA8852D501AF246597A60A10F86B96F35AECC9CB1A0A0F
26,208,561 UART: Caliptra RT
26,209,269 UART: [state] CFI Enabled
26,389,597 UART: [rt] RT listening for mailbox commands...
26,421,061 UART: [rt]cmd =0x4c444556, len=4
26,432,039 >>> mbox cmd response data (687 bytes)
26,472,404 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,502,488 UART: [rt]cmd =0x43455246, len=4
26,515,156 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,382 UART:
192,746 UART: Running Caliptra ROM ...
193,848 UART:
603,590 UART: [state] CFI Enabled
617,727 UART: [state] LifecycleState = Unprovisioned
620,137 UART: [state] DebugLocked = No
622,672 UART: [state] WD Timer not started. Device not locked for debugging
627,575 UART: [kat] SHA2-256
817,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,232 UART: [kat] ++
828,839 UART: [kat] sha1
839,726 UART: [kat] SHA2-256
842,740 UART: [kat] SHA2-384
847,811 UART: [kat] SHA2-512-ACC
850,466 UART: [kat] ECC-384
3,294,369 UART: [kat] HMAC-384Kdf
3,307,098 UART: [kat] LMS
3,838,973 UART: [kat] --
3,842,682 UART: [cold-reset] ++
3,843,552 UART: [fht] FHT @ 0x50003400
3,855,174 UART: [idev] ++
3,855,811 UART: [idev] CDI.KEYID = 6
3,856,842 UART: [idev] SUBJECT.KEYID = 7
3,858,020 UART: [idev] UDS.KEYID = 0
3,858,978 ready_for_fw is high
3,859,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,043 UART: [idev] Erasing UDS.KEYID = 0
6,339,011 UART: [idev] Sha1 KeyId Algorithm
6,359,919 UART: [idev] --
6,363,917 UART: [ldev] ++
6,364,654 UART: [ldev] CDI.KEYID = 6
6,365,573 UART: [ldev] SUBJECT.KEYID = 5
6,366,736 UART: [ldev] AUTHORITY.KEYID = 7
6,367,864 UART: [ldev] FE.KEYID = 1
6,378,301 UART: [ldev] Erasing FE.KEYID = 1
8,860,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,663 UART: [ldev] --
10,652,963 UART: [fwproc] Wait for Commands...
10,655,598 UART: [fwproc] Recv command 0x46574c44
10,657,906 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,385 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,994 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,554 >>> mbox cmd response: success
14,911,696 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,915,511 UART: [afmc] ++
14,916,209 UART: [afmc] CDI.KEYID = 6
14,917,396 UART: [afmc] SUBJECT.KEYID = 7
14,918,887 UART: [afmc] AUTHORITY.KEYID = 5
17,425,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,268 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,380 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,557 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,422 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,269 UART: [afmc] --
19,223,913 UART: [cold-reset] --
19,227,183 UART: [state] Locking Datavault
19,234,923 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,074 UART: [state] Locking ICCM
19,240,044 UART: [exit] Launching FMC @ 0x40000130
19,248,729 UART:
19,248,965 UART: Running Caliptra FMC ...
19,250,068 UART:
19,250,235 UART: [state] CFI Enabled
19,258,450 UART: [fht] FMC Alias Private Key: 7
21,024,932 UART: [art] Extend RT PCRs Done
21,026,149 UART: [art] Lock RT PCRs Done
21,028,150 UART: [art] Populate DV Done
21,033,572 UART: [fht] FMC Alias Private Key: 7
21,035,058 UART: [art] Derive CDI
21,035,800 UART: [art] Store in slot 0x4
21,078,738 UART: [art] Derive Key Pair
21,079,743 UART: [art] Store priv key in slot 0x5
23,506,910 UART: [art] Derive Key Pair - Done
23,519,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,723 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,225 UART: [art] PUB.X = 6D6FEFBE238DA64005A5F9FDBCDA66A3BD6B4A2A27AD51F2394779D34C8093A74D7EED447855A86520744B16A79129A0
25,234,542 UART: [art] PUB.Y = A2FDE9D7A8D35C75EBFDEADD7D9FEB0F42B22F3B794FE1FB07E95B3408F196614F78E94693638748A90B76294E768B9C
25,241,791 UART: [art] SIG.R = 1009085D32334663134DA4E0CE5F7B23F0EE422B64A458233185FEF545536A4CF56FC60912ACFC9D427CA70039DBD166
25,249,158 UART: [art] SIG.S = FFEE34874FCC2066080C544C73F017688BBA44279FB2741EF494B7E6177A544118F6F1C8DDD4AE7EA4C0EDD227ABDFA2
26,227,936 UART: Caliptra RT
26,228,629 UART: [state] CFI Enabled
26,361,566 UART: [rt] RT listening for mailbox commands...
26,392,871 UART: [rt]cmd =0x4c444556, len=4
26,404,042 >>> mbox cmd response data (687 bytes)
26,446,073 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,476,021 UART: [rt]cmd =0x43455246, len=4
26,488,477 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,754,226 ready_for_fw is high
3,754,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,562 >>> mbox cmd response: success
15,046,359 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,300,922 UART:
19,301,329 UART: Running Caliptra FMC ...
19,302,479 UART:
19,302,658 UART: [state] CFI Enabled
19,310,662 UART: [fht] FMC Alias Private Key: 7
21,076,521 UART: [art] Extend RT PCRs Done
21,077,761 UART: [art] Lock RT PCRs Done
21,079,292 UART: [art] Populate DV Done
21,084,620 UART: [fht] FMC Alias Private Key: 7
21,086,179 UART: [art] Derive CDI
21,086,957 UART: [art] Store in slot 0x4
21,129,488 UART: [art] Derive Key Pair
21,130,499 UART: [art] Store priv key in slot 0x5
23,557,017 UART: [art] Derive Key Pair - Done
23,570,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,363 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,894 UART: [art] PUB.X = 892331726B5439B7DAA76F1EEE86C46728A3D9DB1A8DC93872DE56C8A129FC1F549A37FA7A7C1E0C44D768B37D0E199A
25,285,162 UART: [art] PUB.Y = 6A42A95F797D0C261853FA9000968971B164F281E516E4E1BB4046B22CE36F80DDEE78CE637B0AD546A497ACB3CCC14B
25,292,366 UART: [art] SIG.R = 6EBB2623BAA85F81F08F06A84C79E0D4B54E1DF190241CE7C70C7F7F85B4CC3446B6A1AD06E72DE3C45BEB666EA1B219
25,299,839 UART: [art] SIG.S = C8F64E666EE3C8AA26C0D607AD5A39F1272F095B3274990CBF5AC1855A4FE06A069F2E950D0821250F357FDAA7C222C7
26,278,596 UART: Caliptra RT
26,279,295 UART: [state] CFI Enabled
26,412,009 UART: [rt] RT listening for mailbox commands...
26,443,434 UART: [rt]cmd =0x4c444556, len=4
26,454,679 >>> mbox cmd response data (687 bytes)
26,496,937 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,526,989 UART: [rt]cmd =0x43455246, len=4
26,539,611 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,135 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,825 UART: [kat] SHA2-256
881,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,871 UART: [kat] ++
886,023 UART: [kat] sha1
890,263 UART: [kat] SHA2-256
892,201 UART: [kat] SHA2-384
894,812 UART: [kat] SHA2-512-ACC
896,713 UART: [kat] ECC-384
902,164 UART: [kat] HMAC-384Kdf
906,776 UART: [kat] LMS
1,474,972 UART: [kat] --
1,475,917 UART: [cold-reset] ++
1,476,335 UART: [fht] Storing FHT @ 0x50003400
1,478,904 UART: [idev] ++
1,479,072 UART: [idev] CDI.KEYID = 6
1,479,432 UART: [idev] SUBJECT.KEYID = 7
1,479,856 UART: [idev] UDS.KEYID = 0
1,480,201 ready_for_fw is high
1,480,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,804 UART: [idev] Erasing UDS.KEYID = 0
1,504,190 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,942 UART: [idev] --
1,513,907 UART: [ldev] ++
1,514,075 UART: [ldev] CDI.KEYID = 6
1,514,438 UART: [ldev] SUBJECT.KEYID = 5
1,514,864 UART: [ldev] AUTHORITY.KEYID = 7
1,515,327 UART: [ldev] FE.KEYID = 1
1,520,591 UART: [ldev] Erasing FE.KEYID = 1
1,546,044 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,774 UART: [ldev] --
1,585,057 UART: [fwproc] Waiting for Commands...
1,585,804 UART: [fwproc] Received command 0x46574c44
1,586,595 UART: [fwproc] Received Image of size 118548 bytes
2,931,583 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,329 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,547 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,910 >>> mbox cmd response: success
3,130,910 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,132,148 UART: [afmc] ++
3,132,316 UART: [afmc] CDI.KEYID = 6
3,132,678 UART: [afmc] SUBJECT.KEYID = 7
3,133,103 UART: [afmc] AUTHORITY.KEYID = 5
3,168,144 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,324 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,104 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,813 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,696 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,379 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,247 UART: [afmc] --
3,211,271 UART: [cold-reset] --
3,212,023 UART: [state] Locking Datavault
3,213,108 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,712 UART: [state] Locking ICCM
3,214,226 UART: [exit] Launching FMC @ 0x40000130
3,219,556 UART:
3,219,572 UART: Running Caliptra FMC ...
3,219,980 UART:
3,220,034 UART: [state] CFI Enabled
3,230,818 UART: [fht] FMC Alias Private Key: 7
3,349,158 UART: [art] Extend RT PCRs Done
3,349,586 UART: [art] Lock RT PCRs Done
3,351,118 UART: [art] Populate DV Done
3,359,137 UART: [fht] FMC Alias Private Key: 7
3,360,091 UART: [art] Derive CDI
3,360,371 UART: [art] Store in slot 0x4
3,445,991 UART: [art] Derive Key Pair
3,446,351 UART: [art] Store priv key in slot 0x5
3,459,236 UART: [art] Derive Key Pair - Done
3,474,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,326 UART: [art] PUB.X = EEE8E7FE71DE37DD0383EB6686D01CDCC998EB67011AC44CFBF0B453AD91F74BFA8096ABA06082D44768D753BA4E0F7D
3,497,109 UART: [art] PUB.Y = 6DC35C4C8C3D56B1CC3FD773F2FA1BF3D3C60BD4CA2049441A99F347A8B78F524F7A134D479419DCE0A8E54EF40FCD4E
3,504,073 UART: [art] SIG.R = 15C10B33C92D49BC2F8F84937FCC79149D1203A98A000770A24FDAE2CC12A0B44CA92D3543900D649DD42ECBC987C4EF
3,510,819 UART: [art] SIG.S = 6230D79ACC2F18E40ED61105CD11928D0B7C06874F77C287D5B5E2E789B4BE69EC42ADB3F994B6B88BCE525979BE990E
3,534,564 UART: Caliptra RT
3,534,815 UART: [state] CFI Enabled
3,654,674 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,974 UART: [rt]cmd =0x4c444556, len=4
3,695,342 >>> mbox cmd response data (687 bytes)
3,695,343 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,724,680 UART: [rt]cmd =0x43455246, len=4
3,737,202 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,471 ready_for_fw is high
1,361,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,842 >>> mbox cmd response: success
2,978,842 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,040,623 UART:
3,040,639 UART: Running Caliptra FMC ...
3,041,047 UART:
3,041,101 UART: [state] CFI Enabled
3,051,363 UART: [fht] FMC Alias Private Key: 7
3,170,019 UART: [art] Extend RT PCRs Done
3,170,447 UART: [art] Lock RT PCRs Done
3,171,847 UART: [art] Populate DV Done
3,180,160 UART: [fht] FMC Alias Private Key: 7
3,181,152 UART: [art] Derive CDI
3,181,432 UART: [art] Store in slot 0x4
3,267,306 UART: [art] Derive Key Pair
3,267,666 UART: [art] Store priv key in slot 0x5
3,280,711 UART: [art] Derive Key Pair - Done
3,295,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,894 UART: [art] PUB.X = BE7A33A3B19DEF2475538DE10772A4D6D4D60B59EC2869638B61D9EFCAE9BB0623D648523D31ADEB16F085EB78492241
3,318,663 UART: [art] PUB.Y = 6E6F39553268AF388AEFE2ABF09422BD1DA35A81BF8D34C8A94A7DAC34BAB741BD7B76EDA144043FA9929B65F5105338
3,325,624 UART: [art] SIG.R = F7AE637003F95A7B492BC367310B2C71DFB0B535EDAA0FCCFC99B1D05B48111C956203376D6C3D7138525DD7ACACEE30
3,332,396 UART: [art] SIG.S = 0A14DCA4307FEA68AECFEF55C317BA36D1AE47B6ACB904A10B19893EA640E0C6D7E21571FDF5190466CF934AB2CA0B1B
3,356,043 UART: Caliptra RT
3,356,294 UART: [state] CFI Enabled
3,476,242 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,494 UART: [rt]cmd =0x4c444556, len=4
3,516,780 >>> mbox cmd response data (687 bytes)
3,516,781 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,546,090 UART: [rt]cmd =0x43455246, len=4
3,558,512 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,372 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,008 UART: [kat] SHA2-256
881,939 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,054 UART: [kat] ++
886,206 UART: [kat] sha1
890,534 UART: [kat] SHA2-256
892,472 UART: [kat] SHA2-384
895,397 UART: [kat] SHA2-512-ACC
897,298 UART: [kat] ECC-384
902,819 UART: [kat] HMAC-384Kdf
907,345 UART: [kat] LMS
1,475,541 UART: [kat] --
1,476,790 UART: [cold-reset] ++
1,477,194 UART: [fht] Storing FHT @ 0x50003400
1,479,993 UART: [idev] ++
1,480,161 UART: [idev] CDI.KEYID = 6
1,480,521 UART: [idev] SUBJECT.KEYID = 7
1,480,945 UART: [idev] UDS.KEYID = 0
1,481,290 ready_for_fw is high
1,481,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,085 UART: [idev] Erasing UDS.KEYID = 0
1,505,861 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,471 UART: [idev] --
1,515,520 UART: [ldev] ++
1,515,688 UART: [ldev] CDI.KEYID = 6
1,516,051 UART: [ldev] SUBJECT.KEYID = 5
1,516,477 UART: [ldev] AUTHORITY.KEYID = 7
1,516,940 UART: [ldev] FE.KEYID = 1
1,522,436 UART: [ldev] Erasing FE.KEYID = 1
1,547,561 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,821 UART: [ldev] --
1,587,256 UART: [fwproc] Waiting for Commands...
1,588,051 UART: [fwproc] Received command 0x46574c44
1,588,842 UART: [fwproc] Received Image of size 118548 bytes
2,934,314 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,492 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,710 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,005 >>> mbox cmd response: success
3,133,005 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,134,181 UART: [afmc] ++
3,134,349 UART: [afmc] CDI.KEYID = 6
3,134,711 UART: [afmc] SUBJECT.KEYID = 7
3,135,136 UART: [afmc] AUTHORITY.KEYID = 5
3,169,997 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,111 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,891 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,600 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,483 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,166 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,186 UART: [afmc] --
3,213,090 UART: [cold-reset] --
3,213,790 UART: [state] Locking Datavault
3,215,047 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,651 UART: [state] Locking ICCM
3,216,175 UART: [exit] Launching FMC @ 0x40000130
3,221,505 UART:
3,221,521 UART: Running Caliptra FMC ...
3,221,929 UART:
3,222,072 UART: [state] CFI Enabled
3,232,900 UART: [fht] FMC Alias Private Key: 7
3,352,668 UART: [art] Extend RT PCRs Done
3,353,096 UART: [art] Lock RT PCRs Done
3,354,798 UART: [art] Populate DV Done
3,362,899 UART: [fht] FMC Alias Private Key: 7
3,364,027 UART: [art] Derive CDI
3,364,307 UART: [art] Store in slot 0x4
3,449,841 UART: [art] Derive Key Pair
3,450,201 UART: [art] Store priv key in slot 0x5
3,463,972 UART: [art] Derive Key Pair - Done
3,478,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,152 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,917 UART: [art] PUB.X = 22C95B3EC84D523160F9E34E9443DA87CDE560B0A1405DC381747DEC6E0BAB73C23D974CC75D1E1E155439902C55CFD4
3,501,692 UART: [art] PUB.Y = 0900029CB802C73CB14C0FC1CDE10BA95288DF864C04DD51A97B02B2B318F7BDED5BBE6314FCAC13592C2BF92A6340C5
3,508,615 UART: [art] SIG.R = EC2DEC365E8C25D6EDBA5B41BF00164112689F2FAB58CF6F942959D4230CE8F0BF087870BB8618F64F29D6C8C9D5C448
3,515,369 UART: [art] SIG.S = 38E0E620A36F02D7884A61E5ED4BFE627FDD3FD8475A4338357BDE6B23038B29FB8D145892D65EFE566EE0F46F28FA4E
3,539,259 UART: Caliptra RT
3,539,602 UART: [state] CFI Enabled
3,659,972 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,554 UART: [rt]cmd =0x4c444556, len=4
3,700,936 >>> mbox cmd response data (687 bytes)
3,700,937 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,310 UART: [rt]cmd =0x43455246, len=4
3,742,810 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,076 ready_for_fw is high
1,363,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,693 >>> mbox cmd response: success
2,980,693 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,042,052 UART:
3,042,068 UART: Running Caliptra FMC ...
3,042,476 UART:
3,042,619 UART: [state] CFI Enabled
3,053,313 UART: [fht] FMC Alias Private Key: 7
3,172,833 UART: [art] Extend RT PCRs Done
3,173,261 UART: [art] Lock RT PCRs Done
3,174,519 UART: [art] Populate DV Done
3,182,710 UART: [fht] FMC Alias Private Key: 7
3,183,856 UART: [art] Derive CDI
3,184,136 UART: [art] Store in slot 0x4
3,269,752 UART: [art] Derive Key Pair
3,270,112 UART: [art] Store priv key in slot 0x5
3,283,243 UART: [art] Derive Key Pair - Done
3,297,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,434 UART: [art] PUB.X = 45E01F4558F728109669E8D48B8548205C109B980589379EE31DCE3A1740FE4CBA6F392C762E2741157F878068C52F98
3,321,189 UART: [art] PUB.Y = 93C08F67BFD7176720BCBA03D5D039D3C1B8136555B8F01C99D1CBD5FCCF02064659FEB73CB25A9DAF68CFFEE8E3FCCB
3,328,156 UART: [art] SIG.R = 4918B02896127037314553839D4235A3490A1D4094C6BF75A81A41661D14CE23CDDED6250577B5244AB29AD80A34C4AA
3,334,909 UART: [art] SIG.S = 6F39F4CA6043F87B1B53916547A5E0583A93D9809CBC8D3F863A9F0165328E0BFA6EB59A6D9B49180E5D3595C3F5EF91
3,358,946 UART: Caliptra RT
3,359,289 UART: [state] CFI Enabled
3,479,256 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,936 UART: [rt]cmd =0x4c444556, len=4
3,520,534 >>> mbox cmd response data (687 bytes)
3,520,535 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,014 UART: [rt]cmd =0x43455246, len=4
3,562,156 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,134 UART: [kat] ++
895,286 UART: [kat] sha1
899,538 UART: [kat] SHA2-256
901,478 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
915,707 UART: [kat] HMAC-384Kdf
920,285 UART: [kat] LMS
1,168,597 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,172,854 UART: [idev] ++
1,173,022 UART: [idev] CDI.KEYID = 6
1,173,383 UART: [idev] SUBJECT.KEYID = 7
1,173,808 UART: [idev] UDS.KEYID = 0
1,174,154 ready_for_fw is high
1,174,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,737 UART: [idev] Erasing UDS.KEYID = 0
1,198,695 UART: [idev] Sha1 KeyId Algorithm
1,207,379 UART: [idev] --
1,208,428 UART: [ldev] ++
1,208,596 UART: [ldev] CDI.KEYID = 6
1,208,960 UART: [ldev] SUBJECT.KEYID = 5
1,209,387 UART: [ldev] AUTHORITY.KEYID = 7
1,209,850 UART: [ldev] FE.KEYID = 1
1,215,316 UART: [ldev] Erasing FE.KEYID = 1
1,240,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,678 UART: [ldev] --
1,279,901 UART: [fwproc] Wait for Commands...
1,280,514 UART: [fwproc] Recv command 0x46574c44
1,281,247 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,215 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,390 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,691 >>> mbox cmd response: success
2,824,691 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,825,889 UART: [afmc] ++
2,826,057 UART: [afmc] CDI.KEYID = 6
2,826,420 UART: [afmc] SUBJECT.KEYID = 7
2,826,846 UART: [afmc] AUTHORITY.KEYID = 5
2,862,565 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,731 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,441 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,322 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,023 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,788 UART: [afmc] --
2,905,753 UART: [cold-reset] --
2,906,591 UART: [state] Locking Datavault
2,907,786 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,390 UART: [state] Locking ICCM
2,908,982 UART: [exit] Launching FMC @ 0x40000130
2,914,312 UART:
2,914,328 UART: Running Caliptra FMC ...
2,914,736 UART:
2,914,790 UART: [state] CFI Enabled
2,925,416 UART: [fht] FMC Alias Private Key: 7
3,044,652 UART: [art] Extend RT PCRs Done
3,045,080 UART: [art] Lock RT PCRs Done
3,046,518 UART: [art] Populate DV Done
3,054,751 UART: [fht] FMC Alias Private Key: 7
3,055,733 UART: [art] Derive CDI
3,056,013 UART: [art] Store in slot 0x4
3,141,784 UART: [art] Derive Key Pair
3,142,144 UART: [art] Store priv key in slot 0x5
3,154,948 UART: [art] Derive Key Pair - Done
3,169,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,641 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,406 UART: [art] PUB.X = 20D1E74490D8FE0ABE5BC8F7CE4026F1B8449D84232038B4FB2A4CE2394289868DC1D7EBD6A29193E8DE8092CC952894
3,192,179 UART: [art] PUB.Y = BE1E0616B68B53F2B924E378453C234623C8FE2B56CA76BB5FC6122F152B0F60452A0DAC4A785E18800B6D75C105F1A4
3,199,118 UART: [art] SIG.R = 8F2B76C9B52B2A381BBECDFD46ED35754C910BD3778CDD5938BA210E80C18399F24C65B799EB143A33B8E10777785BD1
3,205,887 UART: [art] SIG.S = 1B51A8BA96003495E9F392F2196D109554D9D06512123C83411AD25D7C681AE8EFDB524A5131C16B3954F4D0A0385EA4
3,229,537 UART: Caliptra RT
3,229,788 UART: [state] CFI Enabled
3,349,537 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,961 UART: [rt]cmd =0x4c444556, len=4
3,390,375 >>> mbox cmd response data (687 bytes)
3,390,376 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,419,763 UART: [rt]cmd =0x43455246, len=4
3,431,992 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,922 ready_for_fw is high
1,058,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,328 >>> mbox cmd response: success
2,679,328 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,741,377 UART:
2,741,393 UART: Running Caliptra FMC ...
2,741,801 UART:
2,741,855 UART: [state] CFI Enabled
2,752,281 UART: [fht] FMC Alias Private Key: 7
2,871,345 UART: [art] Extend RT PCRs Done
2,871,773 UART: [art] Lock RT PCRs Done
2,873,005 UART: [art] Populate DV Done
2,880,874 UART: [fht] FMC Alias Private Key: 7
2,881,936 UART: [art] Derive CDI
2,882,216 UART: [art] Store in slot 0x4
2,967,481 UART: [art] Derive Key Pair
2,967,841 UART: [art] Store priv key in slot 0x5
2,981,091 UART: [art] Derive Key Pair - Done
2,995,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,504 UART: [art] PUB.X = 8A5D5A8B62A65A042EAB3F2ECC46BF40CE9830C70ACF3109B7E38B0101C71AD09385ECB6DE71CEB18DEED850296DBEB0
3,019,283 UART: [art] PUB.Y = C3403CC085BD0CC5BB369608ACB7EF846EF43A081B1D46A2E364646E457CD3021270E8F5BFC5DA031C80345FA4CBA6E6
3,026,232 UART: [art] SIG.R = 4143163398F507395110D51EEEF72E4A845C9B97AB5FCE724D2DE2FC311CB85B9CEDF8A4C4D700A39F7CFD9C63DA472F
3,032,993 UART: [art] SIG.S = E5642E5BA08F9DD2AB1C7B731ECA9EBB19A1D286DF1850D5FE0E6345F855E56D96E27738D7A6377650D7836C4615814E
3,056,880 UART: Caliptra RT
3,057,131 UART: [state] CFI Enabled
3,176,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,338 UART: [rt]cmd =0x4c444556, len=4
3,216,552 >>> mbox cmd response data (687 bytes)
3,216,553 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,245,702 UART: [rt]cmd =0x43455246, len=4
3,257,773 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,257 UART: [kat] SHA2-256
891,807 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,911 UART: [kat] ++
896,063 UART: [kat] sha1
900,163 UART: [kat] SHA2-256
902,103 UART: [kat] SHA2-384
904,848 UART: [kat] SHA2-512-ACC
906,749 UART: [kat] ECC-384
916,294 UART: [kat] HMAC-384Kdf
921,140 UART: [kat] LMS
1,169,452 UART: [kat] --
1,170,303 UART: [cold-reset] ++
1,170,679 UART: [fht] FHT @ 0x50003400
1,173,423 UART: [idev] ++
1,173,591 UART: [idev] CDI.KEYID = 6
1,173,952 UART: [idev] SUBJECT.KEYID = 7
1,174,377 UART: [idev] UDS.KEYID = 0
1,174,723 ready_for_fw is high
1,174,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,632 UART: [idev] Erasing UDS.KEYID = 0
1,199,664 UART: [idev] Sha1 KeyId Algorithm
1,208,460 UART: [idev] --
1,209,537 UART: [ldev] ++
1,209,705 UART: [ldev] CDI.KEYID = 6
1,210,069 UART: [ldev] SUBJECT.KEYID = 5
1,210,496 UART: [ldev] AUTHORITY.KEYID = 7
1,210,959 UART: [ldev] FE.KEYID = 1
1,216,263 UART: [ldev] Erasing FE.KEYID = 1
1,242,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,769 UART: [ldev] --
1,282,010 UART: [fwproc] Wait for Commands...
1,282,815 UART: [fwproc] Recv command 0x46574c44
1,283,548 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,290 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,465 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,782 >>> mbox cmd response: success
2,827,782 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,828,798 UART: [afmc] ++
2,828,966 UART: [afmc] CDI.KEYID = 6
2,829,329 UART: [afmc] SUBJECT.KEYID = 7
2,829,755 UART: [afmc] AUTHORITY.KEYID = 5
2,865,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,452 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,162 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,043 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,744 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,527 UART: [afmc] --
2,908,394 UART: [cold-reset] --
2,909,448 UART: [state] Locking Datavault
2,910,363 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,967 UART: [state] Locking ICCM
2,911,517 UART: [exit] Launching FMC @ 0x40000130
2,916,847 UART:
2,916,863 UART: Running Caliptra FMC ...
2,917,271 UART:
2,917,414 UART: [state] CFI Enabled
2,928,256 UART: [fht] FMC Alias Private Key: 7
3,047,124 UART: [art] Extend RT PCRs Done
3,047,552 UART: [art] Lock RT PCRs Done
3,049,062 UART: [art] Populate DV Done
3,057,413 UART: [fht] FMC Alias Private Key: 7
3,058,477 UART: [art] Derive CDI
3,058,757 UART: [art] Store in slot 0x4
3,144,282 UART: [art] Derive Key Pair
3,144,642 UART: [art] Store priv key in slot 0x5
3,158,162 UART: [art] Derive Key Pair - Done
3,172,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,002 UART: [art] PUB.X = 686544AAB75B4DF432736C1D4E6563452E1D5C3B10AA3D55F01B60469BCBF7C46C0E3AD0CC94495B8C6A717C252BD9F3
3,195,779 UART: [art] PUB.Y = 2DCA0818E349BB6D7D3857E4F1A59FF321794CBDD7E33C3E315E9AA8087CFD9BD1613584ACA9AF2A10214AACF0D57D9C
3,202,743 UART: [art] SIG.R = 80F5CAECB5BD9285CFFF9237E2B54FC581C2936E5E745D74AFC41DF77F62C8ABD7C8D39C3FA2F94398BD67072B804FAC
3,209,532 UART: [art] SIG.S = 2974E2FA0C3A8CB867973683F36653B04E1BBD1440310AD206E9790FAFAD7BCAD49E9FFF2170AD6E39DD582CABA596D3
3,233,240 UART: Caliptra RT
3,233,583 UART: [state] CFI Enabled
3,353,812 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,534 UART: [rt]cmd =0x4c444556, len=4
3,395,104 >>> mbox cmd response data (687 bytes)
3,395,105 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,424,580 UART: [rt]cmd =0x43455246, len=4
3,436,647 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,263 ready_for_fw is high
1,058,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,099 >>> mbox cmd response: success
2,680,099 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,742,264 UART:
2,742,280 UART: Running Caliptra FMC ...
2,742,688 UART:
2,742,831 UART: [state] CFI Enabled
2,753,359 UART: [fht] FMC Alias Private Key: 7
2,872,617 UART: [art] Extend RT PCRs Done
2,873,045 UART: [art] Lock RT PCRs Done
2,874,671 UART: [art] Populate DV Done
2,882,838 UART: [fht] FMC Alias Private Key: 7
2,883,870 UART: [art] Derive CDI
2,884,150 UART: [art] Store in slot 0x4
2,970,193 UART: [art] Derive Key Pair
2,970,553 UART: [art] Store priv key in slot 0x5
2,983,737 UART: [art] Derive Key Pair - Done
2,998,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,735 UART: [art] PUB.X = 09D128E04C91DB9A487E8C5A2D2B410BF18D4E91C90D2DFE8A4E1F7D0EC7F36079E24BB8BB7CF43FE9904C305738D7DD
3,021,511 UART: [art] PUB.Y = 1BDF2C514ABD472FD648E94BA02988B0C958BBB2FB8FF021CB86F17F1DEA2A9A74413C4E887097754081BC1606FC1769
3,028,468 UART: [art] SIG.R = 7F0ED24A429721EF91242DAF77C28EEC1F1727884AF321B4823DEC51B0907ABD4562C6E5159A38F53CB7DB9E217B2B9C
3,035,245 UART: [art] SIG.S = 98F6F523F2259C99F09F7BD05F3F9D15545EA66ABD2EF5AAF8F56B68EA8DB4C870F2C4359674A025C82E91919E25AB6B
3,058,565 UART: Caliptra RT
3,058,908 UART: [state] CFI Enabled
3,178,851 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,083 UART: [rt]cmd =0x4c444556, len=4
3,219,557 >>> mbox cmd response data (687 bytes)
3,219,558 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,248,853 UART: [rt]cmd =0x43455246, len=4
3,260,894 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
893,384 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,509 UART: [kat] ++
897,661 UART: [kat] sha1
902,009 UART: [kat] SHA2-256
903,949 UART: [kat] SHA2-384
906,944 UART: [kat] SHA2-512-ACC
908,845 UART: [kat] ECC-384
918,748 UART: [kat] HMAC-384Kdf
923,396 UART: [kat] LMS
1,171,724 UART: [kat] --
1,172,425 UART: [cold-reset] ++
1,172,903 UART: [fht] FHT @ 0x50003400
1,175,694 UART: [idev] ++
1,175,862 UART: [idev] CDI.KEYID = 6
1,176,222 UART: [idev] SUBJECT.KEYID = 7
1,176,646 UART: [idev] UDS.KEYID = 0
1,176,991 ready_for_fw is high
1,176,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,614 UART: [idev] Erasing UDS.KEYID = 0
1,202,023 UART: [idev] Sha1 KeyId Algorithm
1,210,503 UART: [idev] --
1,211,635 UART: [ldev] ++
1,211,803 UART: [ldev] CDI.KEYID = 6
1,212,166 UART: [ldev] SUBJECT.KEYID = 5
1,212,592 UART: [ldev] AUTHORITY.KEYID = 7
1,213,055 UART: [ldev] FE.KEYID = 1
1,218,499 UART: [ldev] Erasing FE.KEYID = 1
1,244,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,295 UART: [ldev] --
1,283,584 UART: [fwproc] Wait for Commands...
1,284,206 UART: [fwproc] Recv command 0x46574c44
1,284,934 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,136 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,306 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,663 >>> mbox cmd response: success
2,827,663 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,828,901 UART: [afmc] ++
2,829,069 UART: [afmc] CDI.KEYID = 6
2,829,431 UART: [afmc] SUBJECT.KEYID = 7
2,829,856 UART: [afmc] AUTHORITY.KEYID = 5
2,865,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,496 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,205 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,088 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,789 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,491 UART: [afmc] --
2,908,511 UART: [cold-reset] --
2,909,455 UART: [state] Locking Datavault
2,910,748 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,352 UART: [state] Locking ICCM
2,911,940 UART: [exit] Launching FMC @ 0x40000130
2,917,270 UART:
2,917,286 UART: Running Caliptra FMC ...
2,917,694 UART:
2,917,748 UART: [state] CFI Enabled
2,928,032 UART: [fht] FMC Alias Private Key: 7
3,047,174 UART: [art] Extend RT PCRs Done
3,047,602 UART: [art] Lock RT PCRs Done
3,048,942 UART: [art] Populate DV Done
3,057,293 UART: [fht] FMC Alias Private Key: 7
3,058,307 UART: [art] Derive CDI
3,058,587 UART: [art] Store in slot 0x4
3,144,418 UART: [art] Derive Key Pair
3,144,778 UART: [art] Store priv key in slot 0x5
3,158,646 UART: [art] Derive Key Pair - Done
3,173,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,626 UART: [art] PUB.X = 5D03355FE11327B4E4E19D8214BE392AF799950392DF503B8E425392FF203C7B5BC8C17D8B987C43C3CD44A1F298BAB6
3,196,394 UART: [art] PUB.Y = 59F6DE706497BAFC62335D8D24839C48EAFF42994FA0711A30C3AA09F9931F8738D76C7FED281295DA24668E0D2174F9
3,203,340 UART: [art] SIG.R = 18138CC915BFAE41FED728DE932F9DE2818978D39E9800EEE3F9E5799CA1DDAE210E1C6962EEA8E870469D7D631AF9D3
3,210,099 UART: [art] SIG.S = 0693FD8C9C49DB8F016DF3192463151342A26DCE796536D7E3325EEAF8DD0B2529B8379FBBB235FD1AD5779190691477
3,233,480 UART: Caliptra RT
3,233,731 UART: [state] CFI Enabled
3,352,667 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,089 UART: [rt]cmd =0x4c444556, len=4
3,393,419 >>> mbox cmd response data (687 bytes)
3,393,420 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,755 UART: [rt]cmd =0x43455246, len=4
3,434,630 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,211 ready_for_fw is high
1,060,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,288 >>> mbox cmd response: success
2,679,288 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,741,077 UART:
2,741,093 UART: Running Caliptra FMC ...
2,741,501 UART:
2,741,555 UART: [state] CFI Enabled
2,751,565 UART: [fht] FMC Alias Private Key: 7
2,870,335 UART: [art] Extend RT PCRs Done
2,870,763 UART: [art] Lock RT PCRs Done
2,872,331 UART: [art] Populate DV Done
2,880,670 UART: [fht] FMC Alias Private Key: 7
2,881,688 UART: [art] Derive CDI
2,881,968 UART: [art] Store in slot 0x4
2,967,715 UART: [art] Derive Key Pair
2,968,075 UART: [art] Store priv key in slot 0x5
2,980,767 UART: [art] Derive Key Pair - Done
2,995,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,346 UART: [art] PUB.X = 8828C208B1ABF07196EE18E7EB1C8BF1665F181EE01A0A01CEB794ECE606AC4F26005F166E25D5EC5D3F81C97C77EFFE
3,018,100 UART: [art] PUB.Y = D6CD0950B8059C09483FA776500944427062B95D0E27D805F061A85A90FC3E7C11BA921CD14D7A9CDE1D2206262B64AD
3,025,029 UART: [art] SIG.R = EE92C91A3578912EBD9A26D4E1E447F1C6D1B0A83CFC28412E50A6DD5D4D6C3350B03F3256861CA2B0B03459873360BA
3,031,805 UART: [art] SIG.S = 543023B9577F02D49E4BA7A462677358CF2DB1E95FFFBD162CC7F3C6A0DC32DBE10762EB891AC39F6AA70A5E7B95F010
3,055,332 UART: Caliptra RT
3,055,583 UART: [state] CFI Enabled
3,174,880 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,554 UART: [rt]cmd =0x4c444556, len=4
3,216,074 >>> mbox cmd response data (687 bytes)
3,216,075 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,245,258 UART: [rt]cmd =0x43455246, len=4
3,257,269 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,927 UART: [state] LifecycleState = Unprovisioned
85,582 UART: [state] DebugLocked = No
86,242 UART: [state] WD Timer not started. Device not locked for debugging
87,357 UART: [kat] SHA2-256
893,007 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,132 UART: [kat] ++
897,284 UART: [kat] sha1
901,454 UART: [kat] SHA2-256
903,394 UART: [kat] SHA2-384
906,117 UART: [kat] SHA2-512-ACC
908,018 UART: [kat] ECC-384
917,843 UART: [kat] HMAC-384Kdf
922,433 UART: [kat] LMS
1,170,761 UART: [kat] --
1,171,504 UART: [cold-reset] ++
1,171,952 UART: [fht] FHT @ 0x50003400
1,174,781 UART: [idev] ++
1,174,949 UART: [idev] CDI.KEYID = 6
1,175,309 UART: [idev] SUBJECT.KEYID = 7
1,175,733 UART: [idev] UDS.KEYID = 0
1,176,078 ready_for_fw is high
1,176,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,035 UART: [idev] Erasing UDS.KEYID = 0
1,201,056 UART: [idev] Sha1 KeyId Algorithm
1,209,448 UART: [idev] --
1,210,478 UART: [ldev] ++
1,210,646 UART: [ldev] CDI.KEYID = 6
1,211,009 UART: [ldev] SUBJECT.KEYID = 5
1,211,435 UART: [ldev] AUTHORITY.KEYID = 7
1,211,898 UART: [ldev] FE.KEYID = 1
1,217,168 UART: [ldev] Erasing FE.KEYID = 1
1,243,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,808 UART: [ldev] --
1,283,249 UART: [fwproc] Wait for Commands...
1,283,919 UART: [fwproc] Recv command 0x46574c44
1,284,647 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,225 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,395 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,746 >>> mbox cmd response: success
2,827,746 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,828,946 UART: [afmc] ++
2,829,114 UART: [afmc] CDI.KEYID = 6
2,829,476 UART: [afmc] SUBJECT.KEYID = 7
2,829,901 UART: [afmc] AUTHORITY.KEYID = 5
2,866,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,811 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,520 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,403 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,104 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,984 UART: [afmc] --
2,910,076 UART: [cold-reset] --
2,910,820 UART: [state] Locking Datavault
2,912,115 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,719 UART: [state] Locking ICCM
2,913,171 UART: [exit] Launching FMC @ 0x40000130
2,918,501 UART:
2,918,517 UART: Running Caliptra FMC ...
2,918,925 UART:
2,919,068 UART: [state] CFI Enabled
2,929,812 UART: [fht] FMC Alias Private Key: 7
3,048,718 UART: [art] Extend RT PCRs Done
3,049,146 UART: [art] Lock RT PCRs Done
3,050,500 UART: [art] Populate DV Done
3,058,669 UART: [fht] FMC Alias Private Key: 7
3,059,749 UART: [art] Derive CDI
3,060,029 UART: [art] Store in slot 0x4
3,145,580 UART: [art] Derive Key Pair
3,145,940 UART: [art] Store priv key in slot 0x5
3,159,072 UART: [art] Derive Key Pair - Done
3,173,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,831 UART: [art] PUB.X = 6F606D4E51A80C97B5151206E16F8D3EAE3A7EC0D3602B1B91F4453A0CDC0CA0B1F028B92A8B1578E4000544E5E8969D
3,196,570 UART: [art] PUB.Y = 510399F981F712660DDAD57B22B77858E41D14B73AAD39A304B4F792C0C2FC649329AB44E2FBA839D76AF46C33264BE7
3,203,515 UART: [art] SIG.R = C7E186261E57319C5B32A2AD6F69D95E3B7CD949D5D8271A547911EF7C87CF7F8D901B9A5C77074823478361304B53FD
3,210,280 UART: [art] SIG.S = 61DEAF8230547CEFB75B9CF582D68AF08E1435DB8783E5BB3E48BD105DAE9DFC51E269370EC5BCFDCA1531E84F0AE0DC
3,233,994 UART: Caliptra RT
3,234,337 UART: [state] CFI Enabled
3,355,176 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,698 UART: [rt]cmd =0x4c444556, len=4
3,395,938 >>> mbox cmd response data (687 bytes)
3,395,939 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,425,202 UART: [rt]cmd =0x43455246, len=4
3,437,191 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,348 ready_for_fw is high
1,061,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,083 >>> mbox cmd response: success
2,682,083 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,744,642 UART:
2,744,658 UART: Running Caliptra FMC ...
2,745,066 UART:
2,745,209 UART: [state] CFI Enabled
2,755,799 UART: [fht] FMC Alias Private Key: 7
2,874,865 UART: [art] Extend RT PCRs Done
2,875,293 UART: [art] Lock RT PCRs Done
2,876,813 UART: [art] Populate DV Done
2,885,146 UART: [fht] FMC Alias Private Key: 7
2,886,090 UART: [art] Derive CDI
2,886,370 UART: [art] Store in slot 0x4
2,971,705 UART: [art] Derive Key Pair
2,972,065 UART: [art] Store priv key in slot 0x5
2,985,649 UART: [art] Derive Key Pair - Done
3,000,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,856 UART: [art] PUB.X = 5D04348D60AF9132EE08446A215161A565D26F565AFAE050EFAAF28C463A2C9AB2A682848806A2E878DA5DC14E50555D
3,023,621 UART: [art] PUB.Y = 6B055EDFB3D185753F485048948F58DAA182F57A4647ABC4EE26FBCB916A806211119D2E867B56AB76D583E720D1228E
3,030,570 UART: [art] SIG.R = 6148271FDF5C7B8A97CC3F7C2C44B8D7B90D70137907B029B0872E033A13745C82F872B9B3FA72DF7F56577F9F73ACFB
3,037,337 UART: [art] SIG.S = 14781E33352E18C4936C5AD0B797B2A8B50ABE2D971969B9A5F6088CC866EE005D19899C79EAB64186E86BEA977C8FCA
3,061,081 UART: Caliptra RT
3,061,424 UART: [state] CFI Enabled
3,180,766 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,284 UART: [rt]cmd =0x4c444556, len=4
3,221,768 >>> mbox cmd response data (687 bytes)
3,221,769 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,251,052 UART: [rt]cmd =0x43455246, len=4
3,263,069 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,115 UART:
192,473 UART: Running Caliptra ROM ...
193,598 UART:
193,746 UART: [state] CFI Enabled
267,123 UART: [state] LifecycleState = Unprovisioned
269,102 UART: [state] DebugLocked = No
270,924 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,757 UART: [kat] SHA2-256
445,760 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,228 UART: [kat] ++
456,834 UART: [kat] sha1
467,933 UART: [kat] SHA2-256
470,653 UART: [kat] SHA2-384
477,360 UART: [kat] SHA2-512-ACC
479,730 UART: [kat] ECC-384
2,768,622 UART: [kat] HMAC-384Kdf
2,801,270 UART: [kat] LMS
3,991,585 UART: [kat] --
3,996,320 UART: [cold-reset] ++
3,998,605 UART: [fht] Storing FHT @ 0x50003400
4,009,511 UART: [idev] ++
4,010,075 UART: [idev] CDI.KEYID = 6
4,011,007 UART: [idev] SUBJECT.KEYID = 7
4,012,258 UART: [idev] UDS.KEYID = 0
4,013,371 ready_for_fw is high
4,013,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,771 UART: [idev] Erasing UDS.KEYID = 0
7,346,416 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,872 UART: [idev] --
7,373,674 UART: [ldev] ++
7,374,243 UART: [ldev] CDI.KEYID = 6
7,375,210 UART: [ldev] SUBJECT.KEYID = 5
7,376,422 UART: [ldev] AUTHORITY.KEYID = 7
7,377,652 UART: [ldev] FE.KEYID = 1
7,424,486 UART: [ldev] Erasing FE.KEYID = 1
10,757,188 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,044 UART: [ldev] --
13,118,822 UART: [fwproc] Waiting for Commands...
13,121,188 UART: [fwproc] Received command 0x46574c44
13,123,370 UART: [fwproc] Received Image of size 118548 bytes
17,229,862 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,305,720 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,896 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,707,565 >>> mbox cmd response: success
17,708,655 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,712,184 UART: [afmc] ++
17,712,760 UART: [afmc] CDI.KEYID = 6
17,713,777 UART: [afmc] SUBJECT.KEYID = 7
17,714,936 UART: [afmc] AUTHORITY.KEYID = 5
21,073,825 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,376,008 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,378,266 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,392,745 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,407,416 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,421,853 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,444,536 UART: [afmc] --
23,448,676 UART: [cold-reset] --
23,451,506 UART: [state] Locking Datavault
23,457,291 UART: [state] Locking PCR0, PCR1 and PCR31
23,459,044 UART: [state] Locking ICCM
23,460,364 UART: [exit] Launching FMC @ 0x40000130
23,468,755 UART:
23,468,990 UART: Running Caliptra FMC ...
23,470,026 UART:
23,470,179 UART: [state] CFI Enabled
23,534,822 UART: [fht] FMC Alias Private Key: 7
25,875,652 UART: [art] Extend RT PCRs Done
25,876,877 UART: [art] Lock RT PCRs Done
25,878,581 UART: [art] Populate DV Done
25,883,999 UART: [fht] FMC Alias Private Key: 7
25,885,591 UART: [art] Derive CDI
25,886,410 UART: [art] Store in slot 0x4
25,943,098 UART: [art] Derive Key Pair
25,944,100 UART: [art] Store priv key in slot 0x5
29,236,481 UART: [art] Derive Key Pair - Done
29,249,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,438 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,947 UART: [art] PUB.X = 3C9A0E3AECD5F678770353C1F40B81964D1861297190AC6F10B032293DC0D08514CF91B5F9E128ACA129C33157327DDA
31,546,206 UART: [art] PUB.Y = 2000FDEE45C8FA7E3A5A04B50EEBF57DEB9124AE3E764A84DC4AC9779A506B4AF911694D86D0916DEBB51C48E952FC19
31,553,458 UART: [art] SIG.R = DDAC25805B0B5519C0D6A878BAAF683064919B4B77DC06CA1DE702A6DC40C8F4FCE686379E66C2BB051EBED75A25EA39
31,560,900 UART: [art] SIG.S = 8A142C2ADFE613862541E04BDDC9D9B86B6116B479C77E14929088E235AD11FC952073EBA7B13CCF618663A9FAA20C8C
32,865,793 UART: Caliptra RT
32,866,511 UART: [state] CFI Enabled
33,042,132 UART: [rt] RT listening for mailbox commands...
33,073,355 UART: [rt]cmd =0x4c444556, len=4
33,084,674 >>> mbox cmd response data (687 bytes)
33,126,240 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,156,199 UART: [rt]cmd =0x43455246, len=4
33,169,255 >>> mbox cmd response data (920 bytes)
33,186,066 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,215,933 UART: [rt]cmd =0x43455252, len=4
33,227,432 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,802,983 ready_for_fw is high
3,803,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,956,963 >>> mbox cmd response: success
17,958,327 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,651,608 UART:
23,652,023 UART: Running Caliptra FMC ...
23,653,149 UART:
23,653,303 UART: [state] CFI Enabled
23,721,656 UART: [fht] FMC Alias Private Key: 7
26,061,903 UART: [art] Extend RT PCRs Done
26,063,148 UART: [art] Lock RT PCRs Done
26,064,827 UART: [art] Populate DV Done
26,070,357 UART: [fht] FMC Alias Private Key: 7
26,071,903 UART: [art] Derive CDI
26,072,651 UART: [art] Store in slot 0x4
26,129,784 UART: [art] Derive Key Pair
26,130,827 UART: [art] Store priv key in slot 0x5
29,423,550 UART: [art] Derive Key Pair - Done
29,436,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,925 UART: [art] Erasing AUTHORITY.KEYID = 7
31,726,451 UART: [art] PUB.X = A80BF4FD387B5A604F58D21FE2EE2B1E4C28B2E41F79ED8F54EDF9134E1DE734C8E5A991BF781FE2BBD1B7B58604B3DF
31,733,798 UART: [art] PUB.Y = B87CD8D5EC1B41743C8DFC6879FD5747A847E7BA5A2F2895542A091EA2105B70472927DC41079558170A33B9C9DC38B1
31,741,022 UART: [art] SIG.R = 50D8C12FB8D0DDD12654CDD12F666DE698E906B22A9A706BC0CE3DF50E57533BDE51B52FE5BDC37EB990C25071C4D929
31,748,420 UART: [art] SIG.S = 9A80C0CF5B914DB782E94FD83C79C60DCB2198CE6C32671394F65F135607C23266B003BD92BDB16C8924C9E8C81A44A5
33,053,633 UART: Caliptra RT
33,054,367 UART: [state] CFI Enabled
33,229,401 UART: [rt] RT listening for mailbox commands...
33,261,004 UART: [rt]cmd =0x4c444556, len=4
33,272,121 >>> mbox cmd response data (687 bytes)
33,313,349 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,343,205 UART: [rt]cmd =0x43455246, len=4
33,356,148 >>> mbox cmd response data (920 bytes)
33,372,954 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,403,195 UART: [rt]cmd =0x43455252, len=4
33,414,545 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,384 UART:
192,740 UART: Running Caliptra ROM ...
193,849 UART:
603,427 UART: [state] CFI Enabled
619,532 UART: [state] LifecycleState = Unprovisioned
621,435 UART: [state] DebugLocked = No
624,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,722 UART: [kat] SHA2-256
799,520 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,030 UART: [kat] ++
810,478 UART: [kat] sha1
820,993 UART: [kat] SHA2-256
823,728 UART: [kat] SHA2-384
829,995 UART: [kat] SHA2-512-ACC
832,367 UART: [kat] ECC-384
3,114,767 UART: [kat] HMAC-384Kdf
3,126,489 UART: [kat] LMS
4,316,603 UART: [kat] --
4,321,610 UART: [cold-reset] ++
4,322,898 UART: [fht] Storing FHT @ 0x50003400
4,335,220 UART: [idev] ++
4,335,783 UART: [idev] CDI.KEYID = 6
4,336,763 UART: [idev] SUBJECT.KEYID = 7
4,337,999 UART: [idev] UDS.KEYID = 0
4,338,984 ready_for_fw is high
4,339,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,014 UART: [idev] Erasing UDS.KEYID = 0
7,622,785 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,370 UART: [idev] --
7,647,262 UART: [ldev] ++
7,647,830 UART: [ldev] CDI.KEYID = 6
7,648,793 UART: [ldev] SUBJECT.KEYID = 5
7,649,998 UART: [ldev] AUTHORITY.KEYID = 7
7,651,275 UART: [ldev] FE.KEYID = 1
7,662,623 UART: [ldev] Erasing FE.KEYID = 1
10,952,200 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,964 UART: [ldev] --
13,313,063 UART: [fwproc] Waiting for Commands...
13,315,424 UART: [fwproc] Received command 0x46574c44
13,317,596 UART: [fwproc] Received Image of size 118548 bytes
17,424,615 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,041 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,171 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,804 >>> mbox cmd response: success
17,899,298 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,903,578 UART: [afmc] ++
17,904,151 UART: [afmc] CDI.KEYID = 6
17,905,080 UART: [afmc] SUBJECT.KEYID = 7
17,906,337 UART: [afmc] AUTHORITY.KEYID = 5
21,223,001 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,245 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,546 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,927 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,670 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,086 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,375 UART: [afmc] --
23,587,592 UART: [cold-reset] --
23,590,539 UART: [state] Locking Datavault
23,596,427 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,171 UART: [state] Locking ICCM
23,600,423 UART: [exit] Launching FMC @ 0x40000130
23,608,802 UART:
23,609,030 UART: Running Caliptra FMC ...
23,610,127 UART:
23,610,282 UART: [state] CFI Enabled
23,617,943 UART: [fht] FMC Alias Private Key: 7
25,957,794 UART: [art] Extend RT PCRs Done
25,959,019 UART: [art] Lock RT PCRs Done
25,960,781 UART: [art] Populate DV Done
25,966,344 UART: [fht] FMC Alias Private Key: 7
25,967,871 UART: [art] Derive CDI
25,968,601 UART: [art] Store in slot 0x4
26,011,263 UART: [art] Derive Key Pair
26,012,302 UART: [art] Store priv key in slot 0x5
29,254,247 UART: [art] Derive Key Pair - Done
29,267,315 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,921 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,425 UART: [art] PUB.X = 5E8CD3E98CB860ACDD437796A9B325B77B749076C97D22589640A7204A34CF095FB4D2AD66E04F435D66A3466588684B
31,556,680 UART: [art] PUB.Y = 09EB727D55B984C93AEB254ED433C81301FD7F51F6255EE4C5F2BE13F86AFD23BF0EB85B27267B1731B63355277084D4
31,563,968 UART: [art] SIG.R = 149E56467BB225E2D45D8A339F1D19D7AFB6CC2E36C74739B24161C3E8F2785D134796737C3AAEB8C3B504774ED80AE6
31,571,358 UART: [art] SIG.S = B333B3E8C11C995149F7B2B62A679A557542BCD9D660A5EC9FE5A839B8B8DE20C508CFFC660DD313F5CF19C7AADDEFDF
32,876,623 UART: Caliptra RT
32,877,335 UART: [state] CFI Enabled
33,010,407 UART: [rt] RT listening for mailbox commands...
33,042,028 UART: [rt]cmd =0x4c444556, len=4
33,052,987 >>> mbox cmd response data (687 bytes)
33,094,424 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,124,550 UART: [rt]cmd =0x43455246, len=4
33,137,485 >>> mbox cmd response data (920 bytes)
33,154,266 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,184,449 UART: [rt]cmd =0x43455252, len=4
33,195,706 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
4,129,734 ready_for_fw is high
4,130,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,052 >>> mbox cmd response: success
18,162,747 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,799,958 UART:
23,800,412 UART: Running Caliptra FMC ...
23,801,535 UART:
23,801,690 UART: [state] CFI Enabled
23,809,747 UART: [fht] FMC Alias Private Key: 7
26,149,762 UART: [art] Extend RT PCRs Done
26,150,987 UART: [art] Lock RT PCRs Done
26,152,236 UART: [art] Populate DV Done
26,157,705 UART: [fht] FMC Alias Private Key: 7
26,159,298 UART: [art] Derive CDI
26,160,109 UART: [art] Store in slot 0x4
26,202,693 UART: [art] Derive Key Pair
26,203,690 UART: [art] Store priv key in slot 0x5
29,446,075 UART: [art] Derive Key Pair - Done
29,458,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,969 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,501 UART: [art] PUB.X = 2639BE865C8E00EB6D4F61F6521228BE023F801326F1E61A8A8A6F6F7F0B31B5FDF31A9160A774BDE6A495B8F9A30247
31,747,790 UART: [art] PUB.Y = 2FF35E327C852CB12B40C1158197DE2E8F57A86BFB6FB982FF3662A026AD33DBB67DA1D71B04AC7E220BBF6288A8DE4F
31,754,997 UART: [art] SIG.R = ED80C735C1A3C195629DDC9A9A5EDA4206DABBB3F2304141DA2D14E5914E2113B06F15B2C1473F6B7C2D56B5655BF659
31,762,387 UART: [art] SIG.S = 157106C80F5B6533DCBD74F1938CEF12BF068A66520F3B4785144F06A03EAD7391BB55E1A2405B8DC2E9C2A56A8F9C8C
33,067,451 UART: Caliptra RT
33,068,202 UART: [state] CFI Enabled
33,201,041 UART: [rt] RT listening for mailbox commands...
33,232,552 UART: [rt]cmd =0x4c444556, len=4
33,243,734 >>> mbox cmd response data (687 bytes)
33,285,773 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,315,874 UART: [rt]cmd =0x43455246, len=4
33,328,751 >>> mbox cmd response data (920 bytes)
33,345,797 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,375,703 UART: [rt]cmd =0x43455252, len=4
33,387,037 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,014 UART:
192,378 UART: Running Caliptra ROM ...
193,561 UART:
193,713 UART: [state] CFI Enabled
264,222 UART: [state] LifecycleState = Unprovisioned
266,140 UART: [state] DebugLocked = No
267,601 UART: [state] WD Timer not started. Device not locked for debugging
271,207 UART: [kat] SHA2-256
450,829 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,650 UART: [kat] ++
462,126 UART: [kat] sha1
474,705 UART: [kat] SHA2-256
477,424 UART: [kat] SHA2-384
482,839 UART: [kat] SHA2-512-ACC
485,208 UART: [kat] ECC-384
2,949,299 UART: [kat] HMAC-384Kdf
2,971,334 UART: [kat] LMS
3,447,843 UART: [kat] --
3,451,789 UART: [cold-reset] ++
3,452,656 UART: [fht] FHT @ 0x50003400
3,464,835 UART: [idev] ++
3,465,473 UART: [idev] CDI.KEYID = 6
3,466,529 UART: [idev] SUBJECT.KEYID = 7
3,467,631 UART: [idev] UDS.KEYID = 0
3,468,573 ready_for_fw is high
3,468,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,797 UART: [idev] Erasing UDS.KEYID = 0
5,988,175 UART: [idev] Sha1 KeyId Algorithm
6,012,368 UART: [idev] --
6,017,492 UART: [ldev] ++
6,018,061 UART: [ldev] CDI.KEYID = 6
6,019,025 UART: [ldev] SUBJECT.KEYID = 5
6,020,239 UART: [ldev] AUTHORITY.KEYID = 7
6,021,467 UART: [ldev] FE.KEYID = 1
6,059,072 UART: [ldev] Erasing FE.KEYID = 1
8,566,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,374,373 UART: [ldev] --
10,379,539 UART: [fwproc] Wait for Commands...
10,381,191 UART: [fwproc] Recv command 0x46574c44
10,383,168 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,103 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,129 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,518 >>> mbox cmd response: success
14,342,640 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,345,163 UART: [afmc] ++
14,345,758 UART: [afmc] CDI.KEYID = 6
14,346,694 UART: [afmc] SUBJECT.KEYID = 7
14,347,848 UART: [afmc] AUTHORITY.KEYID = 5
16,879,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,473 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,656 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,513 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,560 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,670,110 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,694,119 UART: [afmc] --
18,698,149 UART: [cold-reset] --
18,703,625 UART: [state] Locking Datavault
18,708,383 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,085 UART: [state] Locking ICCM
18,712,206 UART: [exit] Launching FMC @ 0x40000130
18,720,648 UART:
18,720,880 UART: Running Caliptra FMC ...
18,721,977 UART:
18,722,129 UART: [state] CFI Enabled
18,775,762 UART: [fht] FMC Alias Private Key: 7
20,542,747 UART: [art] Extend RT PCRs Done
20,543,965 UART: [art] Lock RT PCRs Done
20,545,470 UART: [art] Populate DV Done
20,550,776 UART: [fht] FMC Alias Private Key: 7
20,552,466 UART: [art] Derive CDI
20,553,199 UART: [art] Store in slot 0x4
20,608,354 UART: [art] Derive Key Pair
20,609,382 UART: [art] Store priv key in slot 0x5
23,072,153 UART: [art] Derive Key Pair - Done
23,085,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,824 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,332 UART: [art] PUB.X = 4B1FFC8A214D6079ED620AFE15F7176B78B17451D49A4D69CB8FD0950080C06DB0F6105C7795A8EE2CB93AC364FD7EF7
24,807,579 UART: [art] PUB.Y = 03CF80D3AEFB10E23A3779A8926A822D47EE5FAF545D9023C9ABEA15F7F7F64D626A67CA65B404F9FAC076FA264AA433
24,814,869 UART: [art] SIG.R = 145F4DA226926B9C2815079AD1E6573E4219F8F86402E69D3614F2EC758B38F80D4E4D450F786E4D72D8BCD19BC93345
24,822,263 UART: [art] SIG.S = 0E086B43CB457673E27C07734B7C12F4438C6366C141D5046EF2C88FCD3AB5EC99AB5CBD391E36BF8886AE26ED3ED7DF
25,800,780 UART: Caliptra RT
25,801,468 UART: [state] CFI Enabled
25,982,927 UART: [rt] RT listening for mailbox commands...
26,014,579 UART: [rt]cmd =0x4c444556, len=4
26,025,563 >>> mbox cmd response data (687 bytes)
26,066,587 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,096,624 UART: [rt]cmd =0x43455246, len=4
26,109,149 >>> mbox cmd response data (888 bytes)
26,126,487 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,156,677 UART: [rt]cmd =0x43455252, len=4
26,168,116 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,457,725 ready_for_fw is high
3,458,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,216,216 >>> mbox cmd response: success
14,217,468 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,510,536 UART:
18,510,919 UART: Running Caliptra FMC ...
18,512,018 UART:
18,512,173 UART: [state] CFI Enabled
18,581,698 UART: [fht] FMC Alias Private Key: 7
20,348,003 UART: [art] Extend RT PCRs Done
20,349,229 UART: [art] Lock RT PCRs Done
20,351,038 UART: [art] Populate DV Done
20,356,463 UART: [fht] FMC Alias Private Key: 7
20,358,171 UART: [art] Derive CDI
20,358,993 UART: [art] Store in slot 0x4
20,413,845 UART: [art] Derive Key Pair
20,414,848 UART: [art] Store priv key in slot 0x5
22,877,589 UART: [art] Derive Key Pair - Done
22,890,582 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,199 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,690 UART: [art] PUB.X = 8A48073BF913F57A6E0F80F7649AF1735B67565E3C5F85FCC3D9E9A0D6517D249AAF197BA978D01BD611CF654CD1828C
24,610,990 UART: [art] PUB.Y = 3D73E950A8DE056B112A578CF467B6A2E71DE43C142B0E0EDB4A4B70ED5C181E13E012F31CCAA42F0CE50E04C85AFAB2
24,618,242 UART: [art] SIG.R = 9AF5C52067915B49D2CA1013F16F33A8C8DF0DC7B5E57814DCEF057E5D3E855CC2BC57F3804601650BEC412DDEF8FFC1
24,625,627 UART: [art] SIG.S = EF87E6866DCBEE2DB4CAEAD21BD42452027796E367D7B50CF7372793FB45CFB04FBA5F8536813D0F693E2E944447B559
25,605,006 UART: Caliptra RT
25,605,706 UART: [state] CFI Enabled
25,784,461 UART: [rt] RT listening for mailbox commands...
25,815,909 UART: [rt]cmd =0x4c444556, len=4
25,827,283 >>> mbox cmd response data (687 bytes)
25,867,864 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,898,012 UART: [rt]cmd =0x43455246, len=4
25,910,689 >>> mbox cmd response data (888 bytes)
25,927,148 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,957,069 UART: [rt]cmd =0x43455252, len=4
25,968,592 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,550 UART:
192,915 UART: Running Caliptra ROM ...
194,017 UART:
603,843 UART: [state] CFI Enabled
617,797 UART: [state] LifecycleState = Unprovisioned
619,743 UART: [state] DebugLocked = No
622,409 UART: [state] WD Timer not started. Device not locked for debugging
625,717 UART: [kat] SHA2-256
805,396 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,128 UART: [kat] ++
816,732 UART: [kat] sha1
827,544 UART: [kat] SHA2-256
830,267 UART: [kat] SHA2-384
836,680 UART: [kat] SHA2-512-ACC
839,055 UART: [kat] ECC-384
3,281,770 UART: [kat] HMAC-384Kdf
3,294,221 UART: [kat] LMS
3,770,679 UART: [kat] --
3,775,166 UART: [cold-reset] ++
3,777,502 UART: [fht] FHT @ 0x50003400
3,788,563 UART: [idev] ++
3,789,132 UART: [idev] CDI.KEYID = 6
3,790,116 UART: [idev] SUBJECT.KEYID = 7
3,791,380 UART: [idev] UDS.KEYID = 0
3,792,307 ready_for_fw is high
3,792,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,353 UART: [idev] Erasing UDS.KEYID = 0
6,270,880 UART: [idev] Sha1 KeyId Algorithm
6,293,528 UART: [idev] --
6,297,147 UART: [ldev] ++
6,297,718 UART: [ldev] CDI.KEYID = 6
6,298,629 UART: [ldev] SUBJECT.KEYID = 5
6,299,846 UART: [ldev] AUTHORITY.KEYID = 7
6,301,077 UART: [ldev] FE.KEYID = 1
6,312,544 UART: [ldev] Erasing FE.KEYID = 1
8,793,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,481 UART: [ldev] --
10,585,532 UART: [fwproc] Wait for Commands...
10,587,366 UART: [fwproc] Recv command 0x46574c44
10,589,407 UART: [fwproc] Recv'd Img size: 118548 bytes
14,082,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,609 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,614 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,563,695 >>> mbox cmd response: success
14,564,731 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,567,461 UART: [afmc] ++
14,568,098 UART: [afmc] CDI.KEYID = 6
14,569,013 UART: [afmc] SUBJECT.KEYID = 7
14,570,233 UART: [afmc] AUTHORITY.KEYID = 5
17,074,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,796,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,798,256 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,814,083 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,830,161 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,845,686 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,242 UART: [afmc] --
18,874,859 UART: [cold-reset] --
18,877,381 UART: [state] Locking Datavault
18,884,901 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,656 UART: [state] Locking ICCM
18,888,458 UART: [exit] Launching FMC @ 0x40000130
18,896,858 UART:
18,897,097 UART: Running Caliptra FMC ...
18,898,207 UART:
18,898,378 UART: [state] CFI Enabled
18,906,210 UART: [fht] FMC Alias Private Key: 7
20,672,142 UART: [art] Extend RT PCRs Done
20,673,378 UART: [art] Lock RT PCRs Done
20,674,679 UART: [art] Populate DV Done
20,679,982 UART: [fht] FMC Alias Private Key: 7
20,681,631 UART: [art] Derive CDI
20,682,448 UART: [art] Store in slot 0x4
20,725,299 UART: [art] Derive Key Pair
20,726,334 UART: [art] Store priv key in slot 0x5
23,153,394 UART: [art] Derive Key Pair - Done
23,166,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,872,835 UART: [art] Erasing AUTHORITY.KEYID = 7
24,874,318 UART: [art] PUB.X = F5DEE47660A8FBD1A57A1DFA49582B027E8CA88E3F68EAEF61D7A92794E92FBB5A688F5814C78C2C3EB2A27D5275F681
24,881,611 UART: [art] PUB.Y = 5499642791879E4D4DF9939FA3C1A98F5DFDEFF246EF65EE3EF4C29FBEB31FDDF937CF2CC7D2311E8876438AE9B2D4F9
24,888,900 UART: [art] SIG.R = 45A742A031E01F5D65651FD48DE4AB9FDA97B3D802F6DBADECF424B4AF9077B9B62C936468E32957579FDE91C62538A1
24,896,291 UART: [art] SIG.S = E86FE3EA46F363703BD10928B14EFD9B72D3E899B773F430F2E06B1F1BEA200A7A26A19F1DCE9495D3C311724D9CCD74
25,874,786 UART: Caliptra RT
25,875,499 UART: [state] CFI Enabled
26,007,553 UART: [rt] RT listening for mailbox commands...
26,039,087 UART: [rt]cmd =0x4c444556, len=4
26,050,296 >>> mbox cmd response data (687 bytes)
26,091,130 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,121,129 UART: [rt]cmd =0x43455246, len=4
26,133,812 >>> mbox cmd response data (888 bytes)
26,150,761 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,180,636 UART: [rt]cmd =0x43455252, len=4
26,192,185 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,777,861 ready_for_fw is high
3,778,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,366 >>> mbox cmd response: success
14,445,529 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,691,060 UART:
18,691,442 UART: Running Caliptra FMC ...
18,692,590 UART:
18,692,748 UART: [state] CFI Enabled
18,700,528 UART: [fht] FMC Alias Private Key: 7
20,466,923 UART: [art] Extend RT PCRs Done
20,468,145 UART: [art] Lock RT PCRs Done
20,469,718 UART: [art] Populate DV Done
20,475,167 UART: [fht] FMC Alias Private Key: 7
20,476,719 UART: [art] Derive CDI
20,477,455 UART: [art] Store in slot 0x4
20,520,319 UART: [art] Derive Key Pair
20,521,319 UART: [art] Store priv key in slot 0x5
22,948,325 UART: [art] Derive Key Pair - Done
22,961,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,694 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,220 UART: [art] PUB.X = 06DCE66EEBECE4ABE3998E0F71A24B28E0390A03A78B69C78C304ED4C9A9EF1FF4D3AB150AF9760764558BA31B8A79DD
24,676,533 UART: [art] PUB.Y = 0BF3BAEA1C2B1D7E8408957BE4C06DE95ECF133D03B5F8538F269E3721A18CDD45C05159DD71D621B63074DB62C4A178
24,683,791 UART: [art] SIG.R = 04895793442426E84757D05B1DA5F67EF3747C0CB0A3083D210111CB9EF22A45A0EA245F1281B0CE31D7595E08FB6077
24,691,140 UART: [art] SIG.S = 707B7C1B47E2C54E441E39D521FBE68EAA12C15DB9D3FDE650CC286363EEC69B2D14ACB07C45A2B143F78EB8E9C27963
25,670,216 UART: Caliptra RT
25,670,917 UART: [state] CFI Enabled
25,803,916 UART: [rt] RT listening for mailbox commands...
25,835,374 UART: [rt]cmd =0x4c444556, len=4
25,846,264 >>> mbox cmd response data (687 bytes)
25,886,643 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,916,625 UART: [rt]cmd =0x43455246, len=4
25,929,241 >>> mbox cmd response data (888 bytes)
25,945,753 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,975,816 UART: [rt]cmd =0x43455252, len=4
25,987,166 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,029 UART:
192,416 UART: Running Caliptra ROM ...
193,547 UART:
193,700 UART: [state] CFI Enabled
266,052 UART: [state] LifecycleState = Unprovisioned
268,464 UART: [state] DebugLocked = No
270,425 UART: [state] WD Timer not started. Device not locked for debugging
274,244 UART: [kat] SHA2-256
464,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,875 UART: [kat] ++
475,352 UART: [kat] sha1
486,294 UART: [kat] SHA2-256
489,363 UART: [kat] SHA2-384
495,556 UART: [kat] SHA2-512-ACC
498,130 UART: [kat] ECC-384
2,948,632 UART: [kat] HMAC-384Kdf
2,975,087 UART: [kat] LMS
3,506,896 UART: [kat] --
3,512,452 UART: [cold-reset] ++
3,515,092 UART: [fht] FHT @ 0x50003400
3,526,779 UART: [idev] ++
3,527,482 UART: [idev] CDI.KEYID = 6
3,528,386 UART: [idev] SUBJECT.KEYID = 7
3,529,625 UART: [idev] UDS.KEYID = 0
3,530,547 ready_for_fw is high
3,530,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,679,818 UART: [idev] Erasing UDS.KEYID = 0
6,050,889 UART: [idev] Sha1 KeyId Algorithm
6,073,533 UART: [idev] --
6,078,450 UART: [ldev] ++
6,079,128 UART: [ldev] CDI.KEYID = 6
6,080,057 UART: [ldev] SUBJECT.KEYID = 5
6,081,219 UART: [ldev] AUTHORITY.KEYID = 7
6,082,456 UART: [ldev] FE.KEYID = 1
6,123,730 UART: [ldev] Erasing FE.KEYID = 1
8,631,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,380,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,395,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,410,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,431,196 UART: [ldev] --
10,436,582 UART: [fwproc] Wait for Commands...
10,439,322 UART: [fwproc] Recv command 0x46574c44
10,441,624 UART: [fwproc] Recv'd Img size: 118548 bytes
13,948,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,026,637 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,150,282 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,710,503 >>> mbox cmd response: success
14,711,637 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,715,224 UART: [afmc] ++
14,715,922 UART: [afmc] CDI.KEYID = 6
14,717,105 UART: [afmc] SUBJECT.KEYID = 7
14,718,582 UART: [afmc] AUTHORITY.KEYID = 5
17,260,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,002,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,004,818 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,019,882 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,035,037 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,049,912 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,072,580 UART: [afmc] --
19,076,949 UART: [cold-reset] --
19,081,297 UART: [state] Locking Datavault
19,085,517 UART: [state] Locking PCR0, PCR1 and PCR31
19,087,726 UART: [state] Locking ICCM
19,090,035 UART: [exit] Launching FMC @ 0x40000130
19,098,715 UART:
19,098,951 UART: Running Caliptra FMC ...
19,100,051 UART:
19,100,209 UART: [state] CFI Enabled
19,158,440 UART: [fht] FMC Alias Private Key: 7
20,925,418 UART: [art] Extend RT PCRs Done
20,926,636 UART: [art] Lock RT PCRs Done
20,928,790 UART: [art] Populate DV Done
20,934,302 UART: [fht] FMC Alias Private Key: 7
20,935,993 UART: [art] Derive CDI
20,936,805 UART: [art] Store in slot 0x4
20,991,404 UART: [art] Derive Key Pair
20,992,441 UART: [art] Store priv key in slot 0x5
23,455,731 UART: [art] Derive Key Pair - Done
23,468,469 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,181,320 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,828 UART: [art] PUB.X = 0E00C02D40C2DBB7FAC07D472628E4FC0081E2DE12FF236CB583E29D43A1F8DA722819316478769BE857011DF5801862
25,190,052 UART: [art] PUB.Y = D160E23EB829A9ADAB741FEACFB80DEA94A3AFE44C9630A5CB3091A29EFE83955A1356D745EE127ED5B29BBD4EF52C96
25,197,327 UART: [art] SIG.R = C1D51B4E76279A6BC92979CED2A8C13D6A5125061314A8C1397342B9CC486466E4310B5C9ED0D1736E93BEE832F2FDA0
25,204,746 UART: [art] SIG.S = E80A134C345B55FA58EFC19A860A674C9D799E5746501F35ED563A5D769630B17F77A8F23B787BAED22925848A5EEB92
26,184,124 UART: Caliptra RT
26,184,845 UART: [state] CFI Enabled
26,364,357 UART: [rt] RT listening for mailbox commands...
26,396,043 UART: [rt]cmd =0x4c444556, len=4
26,407,246 >>> mbox cmd response data (687 bytes)
26,448,000 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,477,899 UART: [rt]cmd =0x43455246, len=4
26,490,338 >>> mbox cmd response data (888 bytes)
26,507,166 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,537,041 UART: [rt]cmd =0x43455252, len=4
26,548,480 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
3,437,930 ready_for_fw is high
3,438,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,830,329 >>> mbox cmd response: success
14,831,498 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,108,836 UART:
19,109,216 UART: Running Caliptra FMC ...
19,110,321 UART:
19,110,474 UART: [state] CFI Enabled
19,177,895 UART: [fht] FMC Alias Private Key: 7
20,965,529 UART: [art] Extend RT PCRs Done
20,966,762 UART: [art] Lock RT PCRs Done
20,968,287 UART: [art] Populate DV Done
20,973,709 UART: [fht] FMC Alias Private Key: 7
20,975,248 UART: [art] Derive CDI
20,976,065 UART: [art] Store in slot 0x4
21,032,125 UART: [art] Derive Key Pair
21,033,173 UART: [art] Store priv key in slot 0x5
23,495,654 UART: [art] Derive Key Pair - Done
23,508,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,420 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,060 UART: [art] PUB.X = 435D109C2FD024D6AD63D5E7304D9230CD39CEED85BC2BBDA60CEA60133A5702E0B4460151347C0EB26E470AA47A379F
25,231,209 UART: [art] PUB.Y = CBEE8C5EC848C5DA1F06257C949BE2F37DB7D7EECC76FA63388B4830CAEF4CFD6DDFC3084227A88016650157476E6987
25,238,465 UART: [art] SIG.R = 35DBC6DF274EFED70AC86FDD4F38BD310523C6794064412BD887CAECE2CD99A045D342D6B40F82D82D893A5A1420C516
25,245,868 UART: [art] SIG.S = 827026FAD9D7FAA1E05E07345B727D96676E6A7088E12735E499DD80DE4F9B1B4B7471267232757F7B2928566830F5AD
26,224,760 UART: Caliptra RT
26,225,489 UART: [state] CFI Enabled
26,407,104 UART: [rt] RT listening for mailbox commands...
26,438,627 UART: [rt]cmd =0x4c444556, len=4
26,449,676 >>> mbox cmd response data (687 bytes)
26,490,392 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,520,498 UART: [rt]cmd =0x43455246, len=4
26,533,160 >>> mbox cmd response data (888 bytes)
26,549,879 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,579,745 UART: [rt]cmd =0x43455252, len=4
26,591,125 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,547 UART:
192,919 UART: Running Caliptra ROM ...
194,012 UART:
603,541 UART: [state] CFI Enabled
620,123 UART: [state] LifecycleState = Unprovisioned
622,502 UART: [state] DebugLocked = No
625,299 UART: [state] WD Timer not started. Device not locked for debugging
630,480 UART: [kat] SHA2-256
820,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,151 UART: [kat] ++
831,675 UART: [kat] sha1
841,621 UART: [kat] SHA2-256
844,644 UART: [kat] SHA2-384
851,002 UART: [kat] SHA2-512-ACC
853,597 UART: [kat] ECC-384
3,296,384 UART: [kat] HMAC-384Kdf
3,308,545 UART: [kat] LMS
3,840,410 UART: [kat] --
3,844,194 UART: [cold-reset] ++
3,846,053 UART: [fht] FHT @ 0x50003400
3,857,535 UART: [idev] ++
3,858,249 UART: [idev] CDI.KEYID = 6
3,859,249 UART: [idev] SUBJECT.KEYID = 7
3,860,420 UART: [idev] UDS.KEYID = 0
3,861,364 ready_for_fw is high
3,861,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,435 UART: [idev] Erasing UDS.KEYID = 0
6,338,987 UART: [idev] Sha1 KeyId Algorithm
6,362,876 UART: [idev] --
6,368,009 UART: [ldev] ++
6,368,698 UART: [ldev] CDI.KEYID = 6
6,369,611 UART: [ldev] SUBJECT.KEYID = 5
6,370,770 UART: [ldev] AUTHORITY.KEYID = 7
6,372,001 UART: [ldev] FE.KEYID = 1
6,381,092 UART: [ldev] Erasing FE.KEYID = 1
8,860,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,046 UART: [ldev] --
10,650,437 UART: [fwproc] Wait for Commands...
10,653,454 UART: [fwproc] Recv command 0x46574c44
10,655,711 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,975 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,236,080 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,359,679 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,920,072 >>> mbox cmd response: success
14,921,079 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,924,163 UART: [afmc] ++
14,924,865 UART: [afmc] CDI.KEYID = 6
14,926,116 UART: [afmc] SUBJECT.KEYID = 7
14,927,562 UART: [afmc] AUTHORITY.KEYID = 5
17,434,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,155,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,157,898 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,173,011 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,188,151 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,203,040 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,227,235 UART: [afmc] --
19,229,911 UART: [cold-reset] --
19,233,506 UART: [state] Locking Datavault
19,237,682 UART: [state] Locking PCR0, PCR1 and PCR31
19,239,823 UART: [state] Locking ICCM
19,241,359 UART: [exit] Launching FMC @ 0x40000130
19,250,037 UART:
19,250,284 UART: Running Caliptra FMC ...
19,251,314 UART:
19,251,464 UART: [state] CFI Enabled
19,259,785 UART: [fht] FMC Alias Private Key: 7
21,026,313 UART: [art] Extend RT PCRs Done
21,027,541 UART: [art] Lock RT PCRs Done
21,029,273 UART: [art] Populate DV Done
21,034,647 UART: [fht] FMC Alias Private Key: 7
21,036,343 UART: [art] Derive CDI
21,037,096 UART: [art] Store in slot 0x4
21,079,972 UART: [art] Derive Key Pair
21,080,978 UART: [art] Store priv key in slot 0x5
23,508,042 UART: [art] Derive Key Pair - Done
23,521,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,391 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,914 UART: [art] PUB.X = 57D758DAED18239A6C711899ADB93FCB6FE8DC55804F278B9030C6B5BA90F4A754A7349C18755794A7A111B5F25193DE
25,236,125 UART: [art] PUB.Y = 66804D92D034023DAB904DEB559CB8D1E441E502B2F010C8150B48F13FBA494A4FDC7A3026C2ED7186738F8B5D401D27
25,243,379 UART: [art] SIG.R = EF9D1655B5AF015B96E70F26A267F2D01920F47C2180959E01850BBE5DF5353CC46F2310DED68684CC71E8D6BE947F7A
25,250,800 UART: [art] SIG.S = E9C80B86DC3E81774E25F915E44EC9A1F947FFC0FFFB4FCD4CFF14EA5BDEB59AC0EABFB6A3F4E074D859CF18E07C2B8E
26,229,458 UART: Caliptra RT
26,230,173 UART: [state] CFI Enabled
26,362,857 UART: [rt] RT listening for mailbox commands...
26,394,228 UART: [rt]cmd =0x4c444556, len=4
26,405,352 >>> mbox cmd response data (687 bytes)
26,447,265 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,477,186 UART: [rt]cmd =0x43455246, len=4
26,489,692 >>> mbox cmd response data (888 bytes)
26,506,519 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,536,428 UART: [rt]cmd =0x43455252, len=4
26,547,553 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,750,959 ready_for_fw is high
3,751,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,029,001 >>> mbox cmd response: success
15,030,223 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,285,711 UART:
19,286,102 UART: Running Caliptra FMC ...
19,287,225 UART:
19,287,404 UART: [state] CFI Enabled
19,295,540 UART: [fht] FMC Alias Private Key: 7
21,062,224 UART: [art] Extend RT PCRs Done
21,063,468 UART: [art] Lock RT PCRs Done
21,065,346 UART: [art] Populate DV Done
21,070,781 UART: [fht] FMC Alias Private Key: 7
21,072,333 UART: [art] Derive CDI
21,073,075 UART: [art] Store in slot 0x4
21,116,107 UART: [art] Derive Key Pair
21,117,106 UART: [art] Store priv key in slot 0x5
23,543,687 UART: [art] Derive Key Pair - Done
23,556,526 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,263,407 UART: [art] Erasing AUTHORITY.KEYID = 7
25,264,929 UART: [art] PUB.X = 2EC138924AD7350A1DE19D80DECD08168FCEF812E09073FFE64FF76DB2260A94E62C21BFB3DDC98B842204BCEBB2FB62
25,272,187 UART: [art] PUB.Y = 208EA6BC9839725E3E3AA42886A3E9D4B38A94D0E00A5E2A4B92D15BB184B7E1654A80685E8C5A28B22BE4EF15EB6A35
25,279,502 UART: [art] SIG.R = A691F5B0EEDCA75CECB79D6CC20741FBBC1AD548DC1BBF9669B710F25C950803BA212713BCFF979846AD98F0231F7EFF
25,286,930 UART: [art] SIG.S = A66B8603A5A4A29826F7DA0227067658490A24CDD7EF8CEFA57F59D34B0736D45902C3BB852370E64521A3CA780B0F53
26,265,793 UART: Caliptra RT
26,266,490 UART: [state] CFI Enabled
26,398,378 UART: [rt] RT listening for mailbox commands...
26,429,887 UART: [rt]cmd =0x4c444556, len=4
26,441,113 >>> mbox cmd response data (687 bytes)
26,482,932 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,512,726 UART: [rt]cmd =0x43455246, len=4
26,525,445 >>> mbox cmd response data (888 bytes)
26,542,035 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,572,164 UART: [rt]cmd =0x43455252, len=4
26,583,483 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,777 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,361 UART: [kat] SHA2-256
882,292 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,407 UART: [kat] ++
886,559 UART: [kat] sha1
890,835 UART: [kat] SHA2-256
892,773 UART: [kat] SHA2-384
895,522 UART: [kat] SHA2-512-ACC
897,423 UART: [kat] ECC-384
903,238 UART: [kat] HMAC-384Kdf
907,964 UART: [kat] LMS
1,476,160 UART: [kat] --
1,476,965 UART: [cold-reset] ++
1,477,479 UART: [fht] Storing FHT @ 0x50003400
1,480,272 UART: [idev] ++
1,480,440 UART: [idev] CDI.KEYID = 6
1,480,800 UART: [idev] SUBJECT.KEYID = 7
1,481,224 UART: [idev] UDS.KEYID = 0
1,481,569 ready_for_fw is high
1,481,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,986 UART: [idev] Erasing UDS.KEYID = 0
1,506,110 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,840 UART: [idev] --
1,515,879 UART: [ldev] ++
1,516,047 UART: [ldev] CDI.KEYID = 6
1,516,410 UART: [ldev] SUBJECT.KEYID = 5
1,516,836 UART: [ldev] AUTHORITY.KEYID = 7
1,517,299 UART: [ldev] FE.KEYID = 1
1,522,869 UART: [ldev] Erasing FE.KEYID = 1
1,548,310 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,060 UART: [ldev] --
1,587,521 UART: [fwproc] Waiting for Commands...
1,588,372 UART: [fwproc] Received command 0x46574c44
1,589,163 UART: [fwproc] Received Image of size 118548 bytes
2,934,077 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,327 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,545 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,854 >>> mbox cmd response: success
3,133,854 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,134,946 UART: [afmc] ++
3,135,114 UART: [afmc] CDI.KEYID = 6
3,135,476 UART: [afmc] SUBJECT.KEYID = 7
3,135,901 UART: [afmc] AUTHORITY.KEYID = 5
3,170,664 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,192 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,972 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,681 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,564 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,247 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,101 UART: [afmc] --
3,213,981 UART: [cold-reset] --
3,214,785 UART: [state] Locking Datavault
3,215,830 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,434 UART: [state] Locking ICCM
3,217,058 UART: [exit] Launching FMC @ 0x40000130
3,222,388 UART:
3,222,404 UART: Running Caliptra FMC ...
3,222,812 UART:
3,222,866 UART: [state] CFI Enabled
3,233,526 UART: [fht] FMC Alias Private Key: 7
3,352,652 UART: [art] Extend RT PCRs Done
3,353,080 UART: [art] Lock RT PCRs Done
3,354,524 UART: [art] Populate DV Done
3,362,843 UART: [fht] FMC Alias Private Key: 7
3,363,937 UART: [art] Derive CDI
3,364,217 UART: [art] Store in slot 0x4
3,449,903 UART: [art] Derive Key Pair
3,450,263 UART: [art] Store priv key in slot 0x5
3,462,998 UART: [art] Derive Key Pair - Done
3,477,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,652 UART: [art] PUB.X = 13A809B4FDF079886F8370C0E37B2007917150FC722B8A2061EA6F9EDC8FE07CA1AC7D168274460C688BBCC774B2BC3B
3,500,421 UART: [art] PUB.Y = 640E7000E9640BEFEC54D0A40A7DC3C540E487D47F2E7295006190AE87DB91C7FDBA3311CA82D0FC8F0B5B5794DDB67B
3,507,329 UART: [art] SIG.R = 929F2B341B1A1573CB1D9EE0D178A9905512C10DBD6C0BF0C9AF109F1FC5179C9D0B92996889F22E6D6DA78B60D113B7
3,514,098 UART: [art] SIG.S = 697BB62FF580C3D12F70C4F67C215599288668C5772381E3A6C8C35B80571AD4FB96D769CA1E0002B03B028ED789737E
3,537,770 UART: Caliptra RT
3,538,021 UART: [state] CFI Enabled
3,658,015 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,475 UART: [rt]cmd =0x4c444556, len=4
3,698,851 >>> mbox cmd response data (687 bytes)
3,698,852 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,728,451 UART: [rt]cmd =0x43455246, len=4
3,740,927 >>> mbox cmd response data (920 bytes)
3,740,928 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,770,269 UART: [rt]cmd =0x43455252, len=4
3,781,120 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,085 ready_for_fw is high
1,363,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,730 >>> mbox cmd response: success
2,980,730 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,041,789 UART:
3,041,805 UART: Running Caliptra FMC ...
3,042,213 UART:
3,042,267 UART: [state] CFI Enabled
3,052,529 UART: [fht] FMC Alias Private Key: 7
3,172,063 UART: [art] Extend RT PCRs Done
3,172,491 UART: [art] Lock RT PCRs Done
3,174,093 UART: [art] Populate DV Done
3,182,078 UART: [fht] FMC Alias Private Key: 7
3,183,166 UART: [art] Derive CDI
3,183,446 UART: [art] Store in slot 0x4
3,269,270 UART: [art] Derive Key Pair
3,269,630 UART: [art] Store priv key in slot 0x5
3,282,445 UART: [art] Derive Key Pair - Done
3,297,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,912 UART: [art] PUB.X = CFDE4FA0917FFA055C445480E2FBD190F5779094611F16203E9E4335A90EF592F74AC06F316B8FE22B70DCEB61C41A9A
3,320,686 UART: [art] PUB.Y = E94730FC9E093F831BFA7017C9D6624E2529D1F43D68742A9193E9C91CF4F548575D68551B9562546F89CFCC0071AE98
3,327,607 UART: [art] SIG.R = B023836309E7DBB80F4B81CFF332B614B0BC3413624E8B876EF65172BAECBC7F27D19F9BDFBC11155D933D71628EE17B
3,334,383 UART: [art] SIG.S = 207BE3273DBBD10F9922B331B4A4F63E8FA132D2E97521B05B58FC3AD8497FA502631E8F311B77F4C8A76A777AD983C1
3,358,229 UART: Caliptra RT
3,358,480 UART: [state] CFI Enabled
3,478,794 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,384 UART: [rt]cmd =0x4c444556, len=4
3,519,690 >>> mbox cmd response data (687 bytes)
3,519,691 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,126 UART: [rt]cmd =0x43455246, len=4
3,561,616 >>> mbox cmd response data (920 bytes)
3,561,617 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,590,914 UART: [rt]cmd =0x43455252, len=4
3,601,651 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,582 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,284 UART: [kat] SHA2-256
882,215 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,330 UART: [kat] ++
886,482 UART: [kat] sha1
890,628 UART: [kat] SHA2-256
892,566 UART: [kat] SHA2-384
895,445 UART: [kat] SHA2-512-ACC
897,346 UART: [kat] ECC-384
902,827 UART: [kat] HMAC-384Kdf
907,277 UART: [kat] LMS
1,475,473 UART: [kat] --
1,476,526 UART: [cold-reset] ++
1,476,952 UART: [fht] Storing FHT @ 0x50003400
1,479,739 UART: [idev] ++
1,479,907 UART: [idev] CDI.KEYID = 6
1,480,267 UART: [idev] SUBJECT.KEYID = 7
1,480,691 UART: [idev] UDS.KEYID = 0
1,481,036 ready_for_fw is high
1,481,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,769 UART: [idev] Erasing UDS.KEYID = 0
1,505,467 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,281 UART: [idev] --
1,515,316 UART: [ldev] ++
1,515,484 UART: [ldev] CDI.KEYID = 6
1,515,847 UART: [ldev] SUBJECT.KEYID = 5
1,516,273 UART: [ldev] AUTHORITY.KEYID = 7
1,516,736 UART: [ldev] FE.KEYID = 1
1,522,026 UART: [ldev] Erasing FE.KEYID = 1
1,547,349 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,435 UART: [ldev] --
1,586,830 UART: [fwproc] Waiting for Commands...
1,587,625 UART: [fwproc] Received command 0x46574c44
1,588,416 UART: [fwproc] Received Image of size 118548 bytes
2,933,128 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,174 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,392 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,649 >>> mbox cmd response: success
3,131,649 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,132,803 UART: [afmc] ++
3,132,971 UART: [afmc] CDI.KEYID = 6
3,133,333 UART: [afmc] SUBJECT.KEYID = 7
3,133,758 UART: [afmc] AUTHORITY.KEYID = 5
3,168,791 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,205 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,985 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,694 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,577 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,260 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,048 UART: [afmc] --
3,211,934 UART: [cold-reset] --
3,212,974 UART: [state] Locking Datavault
3,214,229 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,833 UART: [state] Locking ICCM
3,215,305 UART: [exit] Launching FMC @ 0x40000130
3,220,635 UART:
3,220,651 UART: Running Caliptra FMC ...
3,221,059 UART:
3,221,202 UART: [state] CFI Enabled
3,231,734 UART: [fht] FMC Alias Private Key: 7
3,351,092 UART: [art] Extend RT PCRs Done
3,351,520 UART: [art] Lock RT PCRs Done
3,352,940 UART: [art] Populate DV Done
3,361,509 UART: [fht] FMC Alias Private Key: 7
3,362,545 UART: [art] Derive CDI
3,362,825 UART: [art] Store in slot 0x4
3,448,521 UART: [art] Derive Key Pair
3,448,881 UART: [art] Store priv key in slot 0x5
3,462,012 UART: [art] Derive Key Pair - Done
3,476,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,310 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,075 UART: [art] PUB.X = CE37E897CAB6EE632A5C7999C1CE5869DAA55F638659204060EA68E08AA1AA03F2AEE4017C04739229D6AB9D49994A94
3,499,842 UART: [art] PUB.Y = C38E8CD3C105A4C1149A8FF55AFEB20C4CC1B85706DE4DBACCFAB03FBA7748FCA41A96D3E4B0598D4845D0F9650166DF
3,506,804 UART: [art] SIG.R = FDBA23D4F7C213FE5765E1D2FACC025FAFA6EDBCD00C246DE87E6A014CF88D49BDA6ED563A80F9792EDF8D9F2D0CAED9
3,513,598 UART: [art] SIG.S = EEB627DE79552C764523678BD63EA1ED08C6B6CB951542DF434D44F23D1BFA890C6503709F34433408F60ECC2E3B34A9
3,537,023 UART: Caliptra RT
3,537,366 UART: [state] CFI Enabled
3,656,701 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,069 UART: [rt]cmd =0x4c444556, len=4
3,697,457 >>> mbox cmd response data (687 bytes)
3,697,458 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,777 UART: [rt]cmd =0x43455246, len=4
3,739,107 >>> mbox cmd response data (920 bytes)
3,739,108 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,768,637 UART: [rt]cmd =0x43455252, len=4
3,779,411 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,076 ready_for_fw is high
1,363,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,049 >>> mbox cmd response: success
2,981,049 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,043,642 UART:
3,043,658 UART: Running Caliptra FMC ...
3,044,066 UART:
3,044,209 UART: [state] CFI Enabled
3,055,075 UART: [fht] FMC Alias Private Key: 7
3,174,159 UART: [art] Extend RT PCRs Done
3,174,587 UART: [art] Lock RT PCRs Done
3,176,189 UART: [art] Populate DV Done
3,184,256 UART: [fht] FMC Alias Private Key: 7
3,185,406 UART: [art] Derive CDI
3,185,686 UART: [art] Store in slot 0x4
3,271,176 UART: [art] Derive Key Pair
3,271,536 UART: [art] Store priv key in slot 0x5
3,284,965 UART: [art] Derive Key Pair - Done
3,299,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,325 UART: [art] PUB.X = 1C5F4C3B2643E4303EE9D469A590763ACDAD46B8CC6951D2E2EEA88372C11AE77DF1655A627BC0F950E1711EAB0F3AAF
3,322,108 UART: [art] PUB.Y = E582307EBFECB1B23B8D0AAAC9E5FFDA3320AD03B71748712A480EFB43F7E21635C17E63D79CA5993945CDA353F60D13
3,329,060 UART: [art] SIG.R = 62AFB5525EEC7D07B308721019AEA83D801BB80E8400EC8AED0395DAB3225D5B36D58E269964367D8522C7692656CF9F
3,335,798 UART: [art] SIG.S = C80B1A7C4AB8691BDA97C72E0CDDF7EAA13FA8205512C7BCC0A361DF46429467D8789D6BC4238FFFDC273D2E44757A2E
3,359,602 UART: Caliptra RT
3,359,945 UART: [state] CFI Enabled
3,480,841 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,225 UART: [rt]cmd =0x4c444556, len=4
3,521,653 >>> mbox cmd response data (687 bytes)
3,521,654 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,997 UART: [rt]cmd =0x43455246, len=4
3,563,507 >>> mbox cmd response data (920 bytes)
3,563,508 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,592,937 UART: [rt]cmd =0x43455252, len=4
3,603,706 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,194 UART: [kat] ++
895,346 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,273 UART: [kat] SHA2-512-ACC
906,174 UART: [kat] ECC-384
916,035 UART: [kat] HMAC-384Kdf
920,441 UART: [kat] LMS
1,168,753 UART: [kat] --
1,169,476 UART: [cold-reset] ++
1,169,944 UART: [fht] FHT @ 0x50003400
1,172,464 UART: [idev] ++
1,172,632 UART: [idev] CDI.KEYID = 6
1,172,993 UART: [idev] SUBJECT.KEYID = 7
1,173,418 UART: [idev] UDS.KEYID = 0
1,173,764 ready_for_fw is high
1,173,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,475 UART: [idev] Erasing UDS.KEYID = 0
1,198,761 UART: [idev] Sha1 KeyId Algorithm
1,207,625 UART: [idev] --
1,208,880 UART: [ldev] ++
1,209,048 UART: [ldev] CDI.KEYID = 6
1,209,412 UART: [ldev] SUBJECT.KEYID = 5
1,209,839 UART: [ldev] AUTHORITY.KEYID = 7
1,210,302 UART: [ldev] FE.KEYID = 1
1,215,156 UART: [ldev] Erasing FE.KEYID = 1
1,241,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,669 UART: [fwproc] Wait for Commands...
1,281,408 UART: [fwproc] Recv command 0x46574c44
1,282,141 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,203 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,378 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,759 >>> mbox cmd response: success
2,824,759 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,825,873 UART: [afmc] ++
2,826,041 UART: [afmc] CDI.KEYID = 6
2,826,404 UART: [afmc] SUBJECT.KEYID = 7
2,826,830 UART: [afmc] AUTHORITY.KEYID = 5
2,861,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,143 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,853 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,734 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,435 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,264 UART: [afmc] --
2,905,145 UART: [cold-reset] --
2,905,987 UART: [state] Locking Datavault
2,907,374 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,978 UART: [state] Locking ICCM
2,908,550 UART: [exit] Launching FMC @ 0x40000130
2,913,880 UART:
2,913,896 UART: Running Caliptra FMC ...
2,914,304 UART:
2,914,358 UART: [state] CFI Enabled
2,924,804 UART: [fht] FMC Alias Private Key: 7
3,043,406 UART: [art] Extend RT PCRs Done
3,043,834 UART: [art] Lock RT PCRs Done
3,045,520 UART: [art] Populate DV Done
3,053,861 UART: [fht] FMC Alias Private Key: 7
3,054,895 UART: [art] Derive CDI
3,055,175 UART: [art] Store in slot 0x4
3,140,740 UART: [art] Derive Key Pair
3,141,100 UART: [art] Store priv key in slot 0x5
3,154,228 UART: [art] Derive Key Pair - Done
3,168,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,269 UART: [art] PUB.X = 74C13DBFB2F606CE57611CE63B91D6E0DCE06AAE781CA58828354EAB8F65C986CC1AD8FBBEC0FF9DB64397E9DB162D47
3,192,060 UART: [art] PUB.Y = 9281F89E71A0A6A218B123DBC49BE42C5590E1BD8ED0F6B7C1750CEECADDCF363B2FF099EE7B0A6C301F856A5D8D8F74
3,199,026 UART: [art] SIG.R = 0531AA490076303734D1607AA190719D97C08594787B47D0E93EC69DC746275E8BEA1D26628AAB9DF5A80DC05E547449
3,205,762 UART: [art] SIG.S = F2633C66A8F2CAF40ED2002ADF38A85260DA681480CF6D36477343729582EAC2CAEB02203FC747C86CC64F3EA1136280
3,229,634 UART: Caliptra RT
3,229,885 UART: [state] CFI Enabled
3,348,462 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,824 UART: [rt]cmd =0x4c444556, len=4
3,389,272 >>> mbox cmd response data (687 bytes)
3,389,273 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,856 UART: [rt]cmd =0x43455246, len=4
3,430,829 >>> mbox cmd response data (888 bytes)
3,430,830 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,483 UART: [rt]cmd =0x43455252, len=4
3,471,300 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,836 ready_for_fw is high
1,058,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,190 >>> mbox cmd response: success
2,676,190 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,737,989 UART:
2,738,005 UART: Running Caliptra FMC ...
2,738,413 UART:
2,738,467 UART: [state] CFI Enabled
2,748,805 UART: [fht] FMC Alias Private Key: 7
2,867,851 UART: [art] Extend RT PCRs Done
2,868,279 UART: [art] Lock RT PCRs Done
2,869,723 UART: [art] Populate DV Done
2,878,018 UART: [fht] FMC Alias Private Key: 7
2,879,094 UART: [art] Derive CDI
2,879,374 UART: [art] Store in slot 0x4
2,965,021 UART: [art] Derive Key Pair
2,965,381 UART: [art] Store priv key in slot 0x5
2,978,763 UART: [art] Derive Key Pair - Done
2,993,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,038 UART: [art] PUB.X = BCFA0E1BE60E91C656642D9F0A3DA91F577DF7185C90024F25A67273CBB9C9432E856D736E8450B3145A9C3268E46DBA
3,015,802 UART: [art] PUB.Y = A429AD6FFF9F683294D9AB8E133E920DFEC564E6BCD51BFF2475D2BAD7488F59E9A7B05CD56718B5ED53984BF0682FEB
3,022,769 UART: [art] SIG.R = D4282095B7436170DF8D5315968CAABD74E1D294496FAE306CB8E68D98DF157A80C12AA734AACA2DBE559512FB509C83
3,029,547 UART: [art] SIG.S = 1183F3D0B36C95334110BD5CC0349E8CB61390C418DBB7E2BE13E6BB58219FCBB034DA72744002002AE146944C7D489E
3,052,918 UART: Caliptra RT
3,053,169 UART: [state] CFI Enabled
3,173,600 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,246 UART: [rt]cmd =0x4c444556, len=4
3,214,576 >>> mbox cmd response data (687 bytes)
3,214,577 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,243,956 UART: [rt]cmd =0x43455246, len=4
3,255,981 >>> mbox cmd response data (888 bytes)
3,255,982 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,285,189 UART: [rt]cmd =0x43455252, len=4
3,295,928 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,929 UART: [state] LifecycleState = Unprovisioned
86,584 UART: [state] DebugLocked = No
87,292 UART: [state] WD Timer not started. Device not locked for debugging
88,531 UART: [kat] SHA2-256
892,081 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,185 UART: [kat] ++
896,337 UART: [kat] sha1
900,635 UART: [kat] SHA2-256
902,575 UART: [kat] SHA2-384
905,240 UART: [kat] SHA2-512-ACC
907,141 UART: [kat] ECC-384
917,126 UART: [kat] HMAC-384Kdf
921,820 UART: [kat] LMS
1,170,132 UART: [kat] --
1,171,129 UART: [cold-reset] ++
1,171,665 UART: [fht] FHT @ 0x50003400
1,174,159 UART: [idev] ++
1,174,327 UART: [idev] CDI.KEYID = 6
1,174,688 UART: [idev] SUBJECT.KEYID = 7
1,175,113 UART: [idev] UDS.KEYID = 0
1,175,459 ready_for_fw is high
1,175,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,938 UART: [idev] Erasing UDS.KEYID = 0
1,200,562 UART: [idev] Sha1 KeyId Algorithm
1,209,452 UART: [idev] --
1,210,447 UART: [ldev] ++
1,210,615 UART: [ldev] CDI.KEYID = 6
1,210,979 UART: [ldev] SUBJECT.KEYID = 5
1,211,406 UART: [ldev] AUTHORITY.KEYID = 7
1,211,869 UART: [ldev] FE.KEYID = 1
1,217,139 UART: [ldev] Erasing FE.KEYID = 1
1,243,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,273 UART: [ldev] --
1,282,666 UART: [fwproc] Wait for Commands...
1,283,387 UART: [fwproc] Recv command 0x46574c44
1,284,120 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,988 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,163 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,500 >>> mbox cmd response: success
2,827,500 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,828,600 UART: [afmc] ++
2,828,768 UART: [afmc] CDI.KEYID = 6
2,829,131 UART: [afmc] SUBJECT.KEYID = 7
2,829,557 UART: [afmc] AUTHORITY.KEYID = 5
2,865,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,810 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,520 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,401 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,102 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,943 UART: [afmc] --
2,908,822 UART: [cold-reset] --
2,909,496 UART: [state] Locking Datavault
2,910,513 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,117 UART: [state] Locking ICCM
2,911,601 UART: [exit] Launching FMC @ 0x40000130
2,916,931 UART:
2,916,947 UART: Running Caliptra FMC ...
2,917,355 UART:
2,917,498 UART: [state] CFI Enabled
2,928,278 UART: [fht] FMC Alias Private Key: 7
3,047,808 UART: [art] Extend RT PCRs Done
3,048,236 UART: [art] Lock RT PCRs Done
3,050,020 UART: [art] Populate DV Done
3,058,095 UART: [fht] FMC Alias Private Key: 7
3,059,135 UART: [art] Derive CDI
3,059,415 UART: [art] Store in slot 0x4
3,145,206 UART: [art] Derive Key Pair
3,145,566 UART: [art] Store priv key in slot 0x5
3,159,532 UART: [art] Derive Key Pair - Done
3,174,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,827 UART: [art] PUB.X = CD7452AA5082E30A71CAA917FDBC9C8F27AFD172C19013F49AE743732A761CAE79325C47445E491EE36725D468DF1275
3,197,598 UART: [art] PUB.Y = 78FA0F2C74054534018920055210269D4B2790533ADA45D702B0CD1EF7B5F8B72BDA5CA0DAC7144CF5D049109218A011
3,204,531 UART: [art] SIG.R = 2F0B535EE275DD095C5589C822E809D0A46A6424435885607274B509EF3F494517CC3C2B93FBF8A58C0460DB3FFE1A2F
3,211,288 UART: [art] SIG.S = 09BF265E12196AD2EF54C91FB3EC518F5AAEC8850E920135CA40AE39A93D262D32A134A07C6B44296005563B712F525E
3,235,412 UART: Caliptra RT
3,235,755 UART: [state] CFI Enabled
3,356,351 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,953 UART: [rt]cmd =0x4c444556, len=4
3,397,367 >>> mbox cmd response data (687 bytes)
3,397,368 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,426,643 UART: [rt]cmd =0x43455246, len=4
3,438,798 >>> mbox cmd response data (888 bytes)
3,438,799 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,467,892 UART: [rt]cmd =0x43455252, len=4
3,478,849 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,967 ready_for_fw is high
1,059,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,917 >>> mbox cmd response: success
2,680,917 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,743,262 UART:
2,743,278 UART: Running Caliptra FMC ...
2,743,686 UART:
2,743,829 UART: [state] CFI Enabled
2,754,581 UART: [fht] FMC Alias Private Key: 7
2,873,233 UART: [art] Extend RT PCRs Done
2,873,661 UART: [art] Lock RT PCRs Done
2,875,103 UART: [art] Populate DV Done
2,883,378 UART: [fht] FMC Alias Private Key: 7
2,884,354 UART: [art] Derive CDI
2,884,634 UART: [art] Store in slot 0x4
2,970,443 UART: [art] Derive Key Pair
2,970,803 UART: [art] Store priv key in slot 0x5
2,984,269 UART: [art] Derive Key Pair - Done
2,999,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,028 UART: [art] PUB.X = 16B9A5A14377E8174FFCD5B9478E33C828CF7364A3EC87AEC5048400C7A0231237083E6E8191C2E512D1D3C7FC65E471
3,022,770 UART: [art] PUB.Y = E5E7F914E2BA75F32DFAA0ECED1715DCAEFA21A6705DFEE5B96645152A34F761ADDD4D78693DBCCC57720B2F72BD14E3
3,029,743 UART: [art] SIG.R = 87FEB00A88073C52F1CA9DF90A41D3F56B0350745D00BA46D827CA9439582C9AFE0D92BD63C29D8E3EBEB4157312D77A
3,036,486 UART: [art] SIG.S = B13CBA4CA04A4335DE0B5BB9C3FBB78DE5503C088622BD0E47D43C010CF52D584A10B230CF4C87493E41BC411D3AAD86
3,060,225 UART: Caliptra RT
3,060,568 UART: [state] CFI Enabled
3,179,574 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,924 UART: [rt]cmd =0x4c444556, len=4
3,220,484 >>> mbox cmd response data (687 bytes)
3,220,485 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,249,752 UART: [rt]cmd =0x43455246, len=4
3,261,601 >>> mbox cmd response data (888 bytes)
3,261,602 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,291,073 UART: [rt]cmd =0x43455252, len=4
3,301,925 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
893,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,355 UART: [kat] ++
897,507 UART: [kat] sha1
901,719 UART: [kat] SHA2-256
903,659 UART: [kat] SHA2-384
906,492 UART: [kat] SHA2-512-ACC
908,393 UART: [kat] ECC-384
917,880 UART: [kat] HMAC-384Kdf
922,514 UART: [kat] LMS
1,170,842 UART: [kat] --
1,171,593 UART: [cold-reset] ++
1,172,065 UART: [fht] FHT @ 0x50003400
1,174,608 UART: [idev] ++
1,174,776 UART: [idev] CDI.KEYID = 6
1,175,136 UART: [idev] SUBJECT.KEYID = 7
1,175,560 UART: [idev] UDS.KEYID = 0
1,175,905 ready_for_fw is high
1,175,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,340 UART: [idev] Erasing UDS.KEYID = 0
1,200,631 UART: [idev] Sha1 KeyId Algorithm
1,209,119 UART: [idev] --
1,210,019 UART: [ldev] ++
1,210,187 UART: [ldev] CDI.KEYID = 6
1,210,550 UART: [ldev] SUBJECT.KEYID = 5
1,210,976 UART: [ldev] AUTHORITY.KEYID = 7
1,211,439 UART: [ldev] FE.KEYID = 1
1,216,305 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,673 UART: [ldev] --
1,282,126 UART: [fwproc] Wait for Commands...
1,282,758 UART: [fwproc] Recv command 0x46574c44
1,283,486 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,792 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,962 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,255 >>> mbox cmd response: success
2,826,255 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,827,331 UART: [afmc] ++
2,827,499 UART: [afmc] CDI.KEYID = 6
2,827,861 UART: [afmc] SUBJECT.KEYID = 7
2,828,286 UART: [afmc] AUTHORITY.KEYID = 5
2,863,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,476 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,185 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,068 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,769 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,695 UART: [afmc] --
2,906,823 UART: [cold-reset] --
2,907,681 UART: [state] Locking Datavault
2,908,742 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,346 UART: [state] Locking ICCM
2,909,908 UART: [exit] Launching FMC @ 0x40000130
2,915,238 UART:
2,915,254 UART: Running Caliptra FMC ...
2,915,662 UART:
2,915,716 UART: [state] CFI Enabled
2,926,202 UART: [fht] FMC Alias Private Key: 7
3,045,472 UART: [art] Extend RT PCRs Done
3,045,900 UART: [art] Lock RT PCRs Done
3,047,382 UART: [art] Populate DV Done
3,055,733 UART: [fht] FMC Alias Private Key: 7
3,056,799 UART: [art] Derive CDI
3,057,079 UART: [art] Store in slot 0x4
3,142,800 UART: [art] Derive Key Pair
3,143,160 UART: [art] Store priv key in slot 0x5
3,155,788 UART: [art] Derive Key Pair - Done
3,170,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,298 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,063 UART: [art] PUB.X = 157E4B33E9DA980E363AFD0F525F413116AD1C8F50BE0DBCB92293B68B0E33E8523D9CC12A6F5E1D79D2BC2065D35D04
3,193,830 UART: [art] PUB.Y = A67B1554E0E1AEF9CC18B021568A33F4A7F181A4937002CD1E7AE0BDB50DC48094DCA9C509CC156E4E419C72A034E37F
3,200,783 UART: [art] SIG.R = 747D40CA7DFF05842AFA53F434253AAEA0251AFD08DB758E1658DAF71EA8DF9402A69D0B6A8D679614C595F168627D3D
3,207,551 UART: [art] SIG.S = 92D7CC2DAD87F69B890E4D655B65D0D0EB51B4656A4E3C4C398922C421A2B39AEDC44DD9E10959B5509A38246C1D7433
3,231,363 UART: Caliptra RT
3,231,614 UART: [state] CFI Enabled
3,350,997 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,591 UART: [rt]cmd =0x4c444556, len=4
3,392,063 >>> mbox cmd response data (687 bytes)
3,392,064 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,503 UART: [rt]cmd =0x43455246, len=4
3,433,624 >>> mbox cmd response data (888 bytes)
3,433,625 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,462,832 UART: [rt]cmd =0x43455252, len=4
3,473,685 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,705 ready_for_fw is high
1,060,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,448 >>> mbox cmd response: success
2,679,448 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,740,723 UART:
2,740,739 UART: Running Caliptra FMC ...
2,741,147 UART:
2,741,201 UART: [state] CFI Enabled
2,751,719 UART: [fht] FMC Alias Private Key: 7
2,870,805 UART: [art] Extend RT PCRs Done
2,871,233 UART: [art] Lock RT PCRs Done
2,872,755 UART: [art] Populate DV Done
2,881,170 UART: [fht] FMC Alias Private Key: 7
2,882,338 UART: [art] Derive CDI
2,882,618 UART: [art] Store in slot 0x4
2,968,499 UART: [art] Derive Key Pair
2,968,859 UART: [art] Store priv key in slot 0x5
2,981,875 UART: [art] Derive Key Pair - Done
2,996,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,268 UART: [art] PUB.X = 5B849A1E8DFEA719FDDFCF4F206B8EB6F84C92C15FD68C65BD18447EC578ECAD2C12CDA6E3E518FA237EE0E7999A5FDD
3,020,068 UART: [art] PUB.Y = 38A8AFC11E1F6D4B8463E2A27CC55C957BAA143A2364BB8988527225F9FB638B08B068D9306AC36E358482BA18812437
3,027,013 UART: [art] SIG.R = 7A91222F61B443B0F5C2C9F7061FD46546E8B79AE350CEF65B24999605A6B71E0B4748378FE292C2FED99FCADFDE469E
3,033,784 UART: [art] SIG.S = ECEB5F6D431BF0093C1C0632D8FDC2CED0B03B732D5B03486427E2BC675A06DDDEF3DD864C58FF2DD7ED04153F684A70
3,057,767 UART: Caliptra RT
3,058,018 UART: [state] CFI Enabled
3,177,397 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,901 UART: [rt]cmd =0x4c444556, len=4
3,218,195 >>> mbox cmd response data (687 bytes)
3,218,196 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,437 UART: [rt]cmd =0x43455246, len=4
3,259,526 >>> mbox cmd response data (888 bytes)
3,259,527 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,288,732 UART: [rt]cmd =0x43455252, len=4
3,299,799 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
893,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,502 UART: [kat] ++
897,654 UART: [kat] sha1
901,860 UART: [kat] SHA2-256
903,800 UART: [kat] SHA2-384
906,431 UART: [kat] SHA2-512-ACC
908,332 UART: [kat] ECC-384
918,189 UART: [kat] HMAC-384Kdf
922,743 UART: [kat] LMS
1,171,071 UART: [kat] --
1,172,182 UART: [cold-reset] ++
1,172,662 UART: [fht] FHT @ 0x50003400
1,175,381 UART: [idev] ++
1,175,549 UART: [idev] CDI.KEYID = 6
1,175,909 UART: [idev] SUBJECT.KEYID = 7
1,176,333 UART: [idev] UDS.KEYID = 0
1,176,678 ready_for_fw is high
1,176,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,237 UART: [idev] Erasing UDS.KEYID = 0
1,201,534 UART: [idev] Sha1 KeyId Algorithm
1,210,048 UART: [idev] --
1,211,290 UART: [ldev] ++
1,211,458 UART: [ldev] CDI.KEYID = 6
1,211,821 UART: [ldev] SUBJECT.KEYID = 5
1,212,247 UART: [ldev] AUTHORITY.KEYID = 7
1,212,710 UART: [ldev] FE.KEYID = 1
1,217,802 UART: [ldev] Erasing FE.KEYID = 1
1,244,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,184 UART: [ldev] --
1,283,555 UART: [fwproc] Wait for Commands...
1,284,183 UART: [fwproc] Recv command 0x46574c44
1,284,911 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,921 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,091 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,346 >>> mbox cmd response: success
2,828,346 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,829,402 UART: [afmc] ++
2,829,570 UART: [afmc] CDI.KEYID = 6
2,829,932 UART: [afmc] SUBJECT.KEYID = 7
2,830,357 UART: [afmc] AUTHORITY.KEYID = 5
2,866,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,139 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,848 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,731 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,432 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,332 UART: [afmc] --
2,909,384 UART: [cold-reset] --
2,910,136 UART: [state] Locking Datavault
2,911,385 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,989 UART: [state] Locking ICCM
2,912,467 UART: [exit] Launching FMC @ 0x40000130
2,917,797 UART:
2,917,813 UART: Running Caliptra FMC ...
2,918,221 UART:
2,918,364 UART: [state] CFI Enabled
2,928,484 UART: [fht] FMC Alias Private Key: 7
3,047,388 UART: [art] Extend RT PCRs Done
3,047,816 UART: [art] Lock RT PCRs Done
3,049,646 UART: [art] Populate DV Done
3,058,119 UART: [fht] FMC Alias Private Key: 7
3,059,169 UART: [art] Derive CDI
3,059,449 UART: [art] Store in slot 0x4
3,145,088 UART: [art] Derive Key Pair
3,145,448 UART: [art] Store priv key in slot 0x5
3,158,252 UART: [art] Derive Key Pair - Done
3,172,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,775 UART: [art] PUB.X = 0128E42DEA6A4A8F0267E22A10270A5342120F5E0B8D9417174040E663A5B93AD2750653BF801FCB473869E7F765104F
3,195,519 UART: [art] PUB.Y = B2AC1DDB1F218097393E12F324D48F627CD4E03C5987FF39E1806984A11283011AA2E71165A46787A0A0D8B4CC7F945E
3,202,466 UART: [art] SIG.R = 646B5EDD195B8480782C3C25FA423375FEE0F3CA02D3B12CDB2C4ED11CC53F45B252715B1C67FAF2DBE3F8B1871C20AE
3,209,251 UART: [art] SIG.S = 561CFFB240C7730435B1292A8B8B79E48C8E883504B73B1281895B57C3B921F3FE2F2304B96AC5EC7D60896F3FBE3BC6
3,233,544 UART: Caliptra RT
3,233,887 UART: [state] CFI Enabled
3,353,267 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,989 UART: [rt]cmd =0x4c444556, len=4
3,394,373 >>> mbox cmd response data (687 bytes)
3,394,374 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,775 UART: [rt]cmd =0x43455246, len=4
3,435,810 >>> mbox cmd response data (888 bytes)
3,435,811 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,465,160 UART: [rt]cmd =0x43455252, len=4
3,476,123 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,488 ready_for_fw is high
1,060,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,321 >>> mbox cmd response: success
2,679,321 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,740,914 UART:
2,740,930 UART: Running Caliptra FMC ...
2,741,338 UART:
2,741,481 UART: [state] CFI Enabled
2,751,897 UART: [fht] FMC Alias Private Key: 7
2,871,291 UART: [art] Extend RT PCRs Done
2,871,719 UART: [art] Lock RT PCRs Done
2,873,483 UART: [art] Populate DV Done
2,881,750 UART: [fht] FMC Alias Private Key: 7
2,882,718 UART: [art] Derive CDI
2,882,998 UART: [art] Store in slot 0x4
2,968,735 UART: [art] Derive Key Pair
2,969,095 UART: [art] Store priv key in slot 0x5
2,982,121 UART: [art] Derive Key Pair - Done
2,996,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,208 UART: [art] PUB.X = 84F83143D2CE109847214C8C574A24FDA55C822EF8CA98697211E0E2B90D8DA5B42F1DFF3523085F27C51F73A9D174A7
3,019,974 UART: [art] PUB.Y = 3152EF88D965F8C9B1CBB67177F257F1A53F525AF7354606E0565FF4293EF69C563A2410189C9B367C200B84CF1A4A27
3,026,916 UART: [art] SIG.R = 83A830D49624E4F13CF1521B802930B48D1CDD5384ECBD1F02C4BEF5530E6ED46F1684A3E35F981F13E93BFD2B4AB4EB
3,033,694 UART: [art] SIG.S = 921088C01BFE2C270605509C3FD069953E0D04C4391CAFC4C8B389BD3CCC461D24676019C14E53D4FFEDF6E01A9F6B54
3,057,606 UART: Caliptra RT
3,057,949 UART: [state] CFI Enabled
3,178,359 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,069 UART: [rt]cmd =0x4c444556, len=4
3,219,511 >>> mbox cmd response data (687 bytes)
3,219,512 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,248,705 UART: [rt]cmd =0x43455246, len=4
3,260,746 >>> mbox cmd response data (888 bytes)
3,260,747 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,290,262 UART: [rt]cmd =0x43455252, len=4
3,301,132 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,049 UART:
192,409 UART: Running Caliptra ROM ...
193,608 UART:
193,765 UART: [state] CFI Enabled
266,477 UART: [state] LifecycleState = Unprovisioned
268,460 UART: [state] DebugLocked = No
269,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,577 UART: [kat] SHA2-256
445,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,765 UART: [kat] ++
456,371 UART: [kat] sha1
467,111 UART: [kat] SHA2-256
469,828 UART: [kat] SHA2-384
475,977 UART: [kat] SHA2-512-ACC
478,281 UART: [kat] ECC-384
2,766,868 UART: [kat] HMAC-384Kdf
2,779,171 UART: [kat] LMS
3,969,522 UART: [kat] --
3,975,311 UART: [cold-reset] ++
3,976,540 UART: [fht] Storing FHT @ 0x50003400
3,989,300 UART: [idev] ++
3,989,866 UART: [idev] CDI.KEYID = 6
3,990,898 UART: [idev] SUBJECT.KEYID = 7
3,992,071 UART: [idev] UDS.KEYID = 0
3,993,119 ready_for_fw is high
3,993,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,385 UART: [idev] Erasing UDS.KEYID = 0
7,326,651 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,283 UART: [idev] --
7,350,866 UART: [ldev] ++
7,351,444 UART: [ldev] CDI.KEYID = 6
7,352,428 UART: [ldev] SUBJECT.KEYID = 5
7,353,533 UART: [ldev] AUTHORITY.KEYID = 7
7,354,874 UART: [ldev] FE.KEYID = 1
7,400,941 UART: [ldev] Erasing FE.KEYID = 1
10,735,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,864 UART: [ldev] --
13,095,225 UART: [fwproc] Waiting for Commands...
13,098,402 UART: [fwproc] Received command 0x46574c44
13,100,638 UART: [fwproc] Received Image of size 118548 bytes
17,208,344 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,283,673 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,356,844 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,685,438 >>> mbox cmd response: success
18,149,266 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,150,339 UART: [afmc] ++
18,150,874 UART: [afmc] CDI.KEYID = 6
18,151,795 UART: [afmc] SUBJECT.KEYID = 7
18,152,842 UART: [afmc] AUTHORITY.KEYID = 5
21,050,940 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,352,126 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,354,399 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,368,849 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,383,558 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,397,982 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,419,266 UART: [afmc] --
23,423,096 UART: [cold-reset] --
23,426,749 UART: [state] Locking Datavault
23,431,458 UART: [state] Locking PCR0, PCR1 and PCR31
23,433,235 UART: [state] Locking ICCM
23,435,279 UART: [exit] Launching FMC @ 0x40000130
23,443,681 UART:
23,443,918 UART: Running Caliptra FMC ...
23,445,022 UART:
23,445,192 UART: [state] CFI Enabled
23,510,598 UART: [fht] FMC Alias Private Key: 7
25,851,827 UART: [art] Extend RT PCRs Done
25,853,052 UART: [art] Lock RT PCRs Done
25,855,061 UART: [art] Populate DV Done
25,860,526 UART: [fht] FMC Alias Private Key: 7
25,862,058 UART: [art] Derive CDI
25,862,875 UART: [art] Store in slot 0x4
25,918,589 UART: [art] Derive Key Pair
25,919,632 UART: [art] Store priv key in slot 0x5
29,212,394 UART: [art] Derive Key Pair - Done
29,225,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,513,450 UART: [art] Erasing AUTHORITY.KEYID = 7
31,514,958 UART: [art] PUB.X = 0EB000E9DB36B0D435DAA12E0CD017FA407E7AFDBF0A1557987342DDF5DA31052CCE483A6D700C5B5969928AA29608ED
31,522,225 UART: [art] PUB.Y = 8579BBF62500AFE60E06D6D7B1992C46947C7A5A98E8BEFF5106380EB1A577D5CF6B7BBE57FF717584EE40B9DCF0379E
31,529,470 UART: [art] SIG.R = B7E3C12E3A27C1CDCD4D3D81F2D4B3269447452FFB0A2685E0C74F076195CD3F2F35DFF2D276EFF43DA40AF5FAE29197
31,536,886 UART: [art] SIG.S = 55985214F10F44BC421BEC114EAF0A16A3484DDD29DE68AED880AA2B36EF5DB6DCCDDD8ABE1888508993832D9FBD9083
32,842,169 UART: Caliptra RT
32,842,995 UART: [state] CFI Enabled
33,019,169 UART: [rt] RT listening for mailbox commands...
33,052,932 UART: [rt]cmd =0x49444543, len=327
33,062,044 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,804,833 ready_for_fw is high
3,805,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,961,421 >>> mbox cmd response: success
18,424,478 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,656,280 UART:
23,656,721 UART: Running Caliptra FMC ...
23,657,833 UART:
23,658,000 UART: [state] CFI Enabled
23,722,392 UART: [fht] FMC Alias Private Key: 7
26,062,638 UART: [art] Extend RT PCRs Done
26,063,884 UART: [art] Lock RT PCRs Done
26,065,430 UART: [art] Populate DV Done
26,071,265 UART: [fht] FMC Alias Private Key: 7
26,072,755 UART: [art] Derive CDI
26,073,517 UART: [art] Store in slot 0x4
26,131,186 UART: [art] Derive Key Pair
26,132,226 UART: [art] Store priv key in slot 0x5
29,425,380 UART: [art] Derive Key Pair - Done
29,438,173 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,058 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,584 UART: [art] PUB.X = 047C64E5BC843B97E9BCB42FBF304A9D44AEC00F043F84B34316EEE42D8C43BFFA39F25C25BC1D5F686C30FADE72D7F5
31,735,834 UART: [art] PUB.Y = 3EC2A701C02DAAD010DFAD00DA9CC39304250EAE37675504164DF48DA07136901D46503A52B5F13DF082AB2350D6FD2E
31,743,111 UART: [art] SIG.R = 7C551A6A10CAB2AA24A3B933E4D33207D5138F9853B46C805EE8482BCE9BA8EECBFD0085D8EDA2E8FF92432D6021B515
31,750,463 UART: [art] SIG.S = B8BCF25B6C3B0FF02F85360338AADB0CC3470FC95BACDC616B4D9C78135A7B03544176DAAD28ACE61C94D68421403BB4
33,054,935 UART: Caliptra RT
33,055,641 UART: [state] CFI Enabled
33,231,596 UART: [rt] RT listening for mailbox commands...
33,265,481 UART: [rt]cmd =0x49444543, len=327
33,274,640 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,414 UART:
192,781 UART: Running Caliptra ROM ...
193,959 UART:
603,458 UART: [state] CFI Enabled
621,748 UART: [state] LifecycleState = Unprovisioned
623,678 UART: [state] DebugLocked = No
625,556 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,048 UART: [kat] SHA2-256
800,787 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,310 UART: [kat] ++
811,750 UART: [kat] sha1
823,005 UART: [kat] SHA2-256
825,702 UART: [kat] SHA2-384
833,250 UART: [kat] SHA2-512-ACC
835,605 UART: [kat] ECC-384
3,118,303 UART: [kat] HMAC-384Kdf
3,129,320 UART: [kat] LMS
4,319,427 UART: [kat] --
4,324,149 UART: [cold-reset] ++
4,325,727 UART: [fht] Storing FHT @ 0x50003400
4,337,928 UART: [idev] ++
4,338,598 UART: [idev] CDI.KEYID = 6
4,339,478 UART: [idev] SUBJECT.KEYID = 7
4,340,721 UART: [idev] UDS.KEYID = 0
4,341,703 ready_for_fw is high
4,341,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,726 UART: [idev] Erasing UDS.KEYID = 0
7,630,198 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,755 UART: [idev] --
7,656,811 UART: [ldev] ++
7,657,388 UART: [ldev] CDI.KEYID = 6
7,658,424 UART: [ldev] SUBJECT.KEYID = 5
7,659,580 UART: [ldev] AUTHORITY.KEYID = 7
7,660,801 UART: [ldev] FE.KEYID = 1
7,670,524 UART: [ldev] Erasing FE.KEYID = 1
10,956,711 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,885 UART: [ldev] --
13,316,991 UART: [fwproc] Waiting for Commands...
13,320,218 UART: [fwproc] Received command 0x46574c44
13,322,466 UART: [fwproc] Received Image of size 118548 bytes
17,432,830 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,651 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,818 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,911,890 >>> mbox cmd response: success
18,374,179 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,375,236 UART: [afmc] ++
18,375,752 UART: [afmc] CDI.KEYID = 6
18,376,669 UART: [afmc] SUBJECT.KEYID = 7
18,377,684 UART: [afmc] AUTHORITY.KEYID = 5
21,235,845 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,615 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,530,873 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,337 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,560,045 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,418 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,512 UART: [afmc] --
23,600,489 UART: [cold-reset] --
23,604,668 UART: [state] Locking Datavault
23,609,903 UART: [state] Locking PCR0, PCR1 and PCR31
23,611,591 UART: [state] Locking ICCM
23,614,254 UART: [exit] Launching FMC @ 0x40000130
23,622,608 UART:
23,622,860 UART: Running Caliptra FMC ...
23,623,956 UART:
23,624,108 UART: [state] CFI Enabled
23,632,042 UART: [fht] FMC Alias Private Key: 7
25,971,754 UART: [art] Extend RT PCRs Done
25,972,978 UART: [art] Lock RT PCRs Done
25,974,786 UART: [art] Populate DV Done
25,980,084 UART: [fht] FMC Alias Private Key: 7
25,981,617 UART: [art] Derive CDI
25,982,346 UART: [art] Store in slot 0x4
26,024,937 UART: [art] Derive Key Pair
26,025,974 UART: [art] Store priv key in slot 0x5
29,269,146 UART: [art] Derive Key Pair - Done
29,281,934 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,562,615 UART: [art] Erasing AUTHORITY.KEYID = 7
31,564,191 UART: [art] PUB.X = 62154FD3D3E0CF2C2262971C9C4DF577F1449C7C85F996D3F9DA98B421AB937AEF583CDA4AB1DA95DED9CB22B16BC9D9
31,571,401 UART: [art] PUB.Y = 9B4BE523FDAC68116F9E4DA5EBE926C6B59AAEF9CDE553ACE7366717414D9014FD7D7A897F1DEBBBCF77F537A674AB9E
31,578,693 UART: [art] SIG.R = 1F9070B320B84EEC32269CC8DAC1DBA6925CE7FF182494ECD436433E49EAC202B33C97F802DD5E399E75AED2A5ACFE15
31,586,146 UART: [art] SIG.S = EB353ED062374D03963107638D1D10CDFD71BE942EDF8A9C039D43ABCE191B69228BC4A28EA5566D8425E2D7F26D2BA5
32,891,162 UART: Caliptra RT
32,891,889 UART: [state] CFI Enabled
33,023,909 UART: [rt] RT listening for mailbox commands...
33,057,701 UART: [rt]cmd =0x49444543, len=327
33,066,679 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
4,124,139 ready_for_fw is high
4,124,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,152,354 >>> mbox cmd response: success
18,616,137 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,795,683 UART:
23,796,115 UART: Running Caliptra FMC ...
23,797,204 UART:
23,797,366 UART: [state] CFI Enabled
23,805,159 UART: [fht] FMC Alias Private Key: 7
26,145,087 UART: [art] Extend RT PCRs Done
26,146,346 UART: [art] Lock RT PCRs Done
26,147,836 UART: [art] Populate DV Done
26,153,224 UART: [fht] FMC Alias Private Key: 7
26,154,926 UART: [art] Derive CDI
26,155,736 UART: [art] Store in slot 0x4
26,198,183 UART: [art] Derive Key Pair
26,199,185 UART: [art] Store priv key in slot 0x5
29,442,030 UART: [art] Derive Key Pair - Done
29,454,871 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,505 UART: [art] PUB.X = 4D749426EA72E4A63D8D42DC10389ACEC5A764855979277A971FAB1B81074F77FB862BB5320620F55351EB8FA0A863EB
31,743,810 UART: [art] PUB.Y = 8D8F25B6B3CBDA63A7465AD49143D62DB7443DD89335801472F5EB6E5D7594CA0E06CB29C920761B28A21D82A28D961D
31,751,012 UART: [art] SIG.R = 4FBC2720B1109FC916D722689B44CEBC6C8B674114BD85EBFA8C890CEE7552A24EB06035B962D21B3816A8018F07067B
31,758,404 UART: [art] SIG.S = AB4A06911D44F503636D92B37EEEB9C208E92B5E62B9B329D6C7A8BE8A90D37884D1072778EAC3251C5EEA18FDC7AD3C
33,063,403 UART: Caliptra RT
33,064,126 UART: [state] CFI Enabled
33,198,170 UART: [rt] RT listening for mailbox commands...
33,232,128 UART: [rt]cmd =0x49444543, len=327
33,241,443 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,047 UART:
192,415 UART: Running Caliptra ROM ...
193,609 UART:
193,760 UART: [state] CFI Enabled
268,817 UART: [state] LifecycleState = Unprovisioned
270,800 UART: [state] DebugLocked = No
273,757 UART: [state] WD Timer not started. Device not locked for debugging
276,740 UART: [kat] SHA2-256
456,375 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
467,177 UART: [kat] ++
467,710 UART: [kat] sha1
480,220 UART: [kat] SHA2-256
482,946 UART: [kat] SHA2-384
489,568 UART: [kat] SHA2-512-ACC
491,937 UART: [kat] ECC-384
2,950,138 UART: [kat] HMAC-384Kdf
2,973,960 UART: [kat] LMS
3,450,372 UART: [kat] --
3,454,748 UART: [cold-reset] ++
3,456,327 UART: [fht] FHT @ 0x50003400
3,466,955 UART: [idev] ++
3,467,524 UART: [idev] CDI.KEYID = 6
3,468,502 UART: [idev] SUBJECT.KEYID = 7
3,469,670 UART: [idev] UDS.KEYID = 0
3,470,711 ready_for_fw is high
3,470,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,924 UART: [idev] Erasing UDS.KEYID = 0
5,990,322 UART: [idev] Sha1 KeyId Algorithm
6,012,918 UART: [idev] --
6,018,807 UART: [ldev] ++
6,019,376 UART: [ldev] CDI.KEYID = 6
6,020,286 UART: [ldev] SUBJECT.KEYID = 5
6,021,497 UART: [ldev] AUTHORITY.KEYID = 7
6,022,783 UART: [ldev] FE.KEYID = 1
6,060,866 UART: [ldev] Erasing FE.KEYID = 1
8,570,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,477 UART: [ldev] --
10,379,395 UART: [fwproc] Wait for Commands...
10,382,458 UART: [fwproc] Recv command 0x46574c44
10,384,502 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,925 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,992 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,348,689 >>> mbox cmd response: success
14,810,579 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
14,811,638 UART: [afmc] ++
14,812,163 UART: [afmc] CDI.KEYID = 6
14,813,083 UART: [afmc] SUBJECT.KEYID = 7
14,814,108 UART: [afmc] AUTHORITY.KEYID = 5
16,899,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,431 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,222 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,272 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,872 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,064 UART: [afmc] --
18,716,019 UART: [cold-reset] --
18,720,477 UART: [state] Locking Datavault
18,725,036 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,734 UART: [state] Locking ICCM
18,728,720 UART: [exit] Launching FMC @ 0x40000130
18,737,118 UART:
18,737,350 UART: Running Caliptra FMC ...
18,738,449 UART:
18,738,627 UART: [state] CFI Enabled
18,795,992 UART: [fht] FMC Alias Private Key: 7
20,562,755 UART: [art] Extend RT PCRs Done
20,563,975 UART: [art] Lock RT PCRs Done
20,565,817 UART: [art] Populate DV Done
20,571,285 UART: [fht] FMC Alias Private Key: 7
20,572,928 UART: [art] Derive CDI
20,573,740 UART: [art] Store in slot 0x4
20,628,119 UART: [art] Derive Key Pair
20,629,164 UART: [art] Store priv key in slot 0x5
23,092,103 UART: [art] Derive Key Pair - Done
23,105,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,111 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,623 UART: [art] PUB.X = 4031E5BD6B9B6CCCF7A03001D171ADCCCB59D706E63FEA1BFF80B634C0201E14B8E7527940B34C60502859505EB8EE2A
24,826,921 UART: [art] PUB.Y = 096153E15F9A64535BAA53BDFFE5AEE541BAA73A08CBC0C5A8022D2AD0F1F5AAEE830E5B2FC2427A3A7C71C95D9C1697
24,834,216 UART: [art] SIG.R = 2E966F6990739908DC106A87BFEE043DE297E4354F9E8480F09BC2B6506DFDAD0F163B72C43D93B9BAB21882139263E2
24,841,640 UART: [art] SIG.S = 9F25515AB8F97C2777CDCFB84BA3614FE7B984C1E726080A885E3749C866BFD2795F794AFA9CF6FEDF6277786CD67475
25,820,415 UART: Caliptra RT
25,821,116 UART: [state] CFI Enabled
26,001,817 UART: [rt] RT listening for mailbox commands...
26,035,911 UART: [rt]cmd =0x49444543, len=327
26,044,779 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,463,351 ready_for_fw is high
3,463,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,244,485 >>> mbox cmd response: success
14,706,688 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,536,228 UART:
18,536,630 UART: Running Caliptra FMC ...
18,537,732 UART:
18,537,882 UART: [state] CFI Enabled
18,604,083 UART: [fht] FMC Alias Private Key: 7
20,371,018 UART: [art] Extend RT PCRs Done
20,372,240 UART: [art] Lock RT PCRs Done
20,374,051 UART: [art] Populate DV Done
20,379,497 UART: [fht] FMC Alias Private Key: 7
20,381,088 UART: [art] Derive CDI
20,381,826 UART: [art] Store in slot 0x4
20,437,554 UART: [art] Derive Key Pair
20,438,595 UART: [art] Store priv key in slot 0x5
22,901,295 UART: [art] Derive Key Pair - Done
22,914,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,310 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,813 UART: [art] PUB.X = FE990204200BC9E1F13B7E5596AC78CD8D06A1B819197AC0F605B8CB9CC230544BA638C7A3C2D9FE795AD4F3ED476DC4
24,636,063 UART: [art] PUB.Y = 99A75A623862F9B28DB67550101B3C61DCC313EB013921C4D7156AE54A05CB955D515579F496C0126B68E14393CA0BAC
24,643,325 UART: [art] SIG.R = CE30C1A558E2C099A082417A01181673232501BCB888E9C93D7070922FE74E8F151E1031FB8D55237A74266DDE81203D
24,650,727 UART: [art] SIG.S = 0577497B7DEA1869BFE922A21688A0EEEE361F6BAED9EA4175D28DD48F140E9B46316C69521B8AADF68DBFEBFF578708
25,629,588 UART: Caliptra RT
25,630,300 UART: [state] CFI Enabled
25,810,474 UART: [rt] RT listening for mailbox commands...
25,843,942 UART: [rt]cmd =0x49444543, len=327
25,853,041 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
192,499 UART:
192,868 UART: Running Caliptra ROM ...
194,066 UART:
603,616 UART: [state] CFI Enabled
618,213 UART: [state] LifecycleState = Unprovisioned
620,118 UART: [state] DebugLocked = No
622,788 UART: [state] WD Timer not started. Device not locked for debugging
627,391 UART: [kat] SHA2-256
807,055 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,858 UART: [kat] ++
818,305 UART: [kat] sha1
828,258 UART: [kat] SHA2-256
830,976 UART: [kat] SHA2-384
837,318 UART: [kat] SHA2-512-ACC
839,684 UART: [kat] ECC-384
3,283,619 UART: [kat] HMAC-384Kdf
3,296,203 UART: [kat] LMS
3,772,701 UART: [kat] --
3,778,191 UART: [cold-reset] ++
3,780,123 UART: [fht] FHT @ 0x50003400
3,792,018 UART: [idev] ++
3,792,595 UART: [idev] CDI.KEYID = 6
3,793,577 UART: [idev] SUBJECT.KEYID = 7
3,794,819 UART: [idev] UDS.KEYID = 0
3,795,747 ready_for_fw is high
3,795,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,782 UART: [idev] Erasing UDS.KEYID = 0
6,277,028 UART: [idev] Sha1 KeyId Algorithm
6,299,873 UART: [idev] --
6,304,068 UART: [ldev] ++
6,304,657 UART: [ldev] CDI.KEYID = 6
6,305,592 UART: [ldev] SUBJECT.KEYID = 5
6,306,761 UART: [ldev] AUTHORITY.KEYID = 7
6,307,997 UART: [ldev] FE.KEYID = 1
6,316,806 UART: [ldev] Erasing FE.KEYID = 1
8,798,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,958 UART: [ldev] --
10,591,634 UART: [fwproc] Wait for Commands...
10,593,352 UART: [fwproc] Recv command 0x46574c44
10,595,339 UART: [fwproc] Recv'd Img size: 118548 bytes
14,082,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,666 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,667 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,564,031 >>> mbox cmd response: success
15,026,888 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,028,001 UART: [afmc] ++
15,028,539 UART: [afmc] CDI.KEYID = 6
15,029,431 UART: [afmc] SUBJECT.KEYID = 7
15,030,454 UART: [afmc] AUTHORITY.KEYID = 5
17,075,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,799,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,802,160 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,817,989 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,834,064 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,849,598 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,875,057 UART: [afmc] --
18,879,481 UART: [cold-reset] --
18,883,024 UART: [state] Locking Datavault
18,888,708 UART: [state] Locking PCR0, PCR1 and PCR31
18,890,472 UART: [state] Locking ICCM
18,892,841 UART: [exit] Launching FMC @ 0x40000130
18,901,259 UART:
18,901,504 UART: Running Caliptra FMC ...
18,902,612 UART:
18,902,775 UART: [state] CFI Enabled
18,910,786 UART: [fht] FMC Alias Private Key: 7
20,676,637 UART: [art] Extend RT PCRs Done
20,677,850 UART: [art] Lock RT PCRs Done
20,679,525 UART: [art] Populate DV Done
20,685,150 UART: [fht] FMC Alias Private Key: 7
20,686,685 UART: [art] Derive CDI
20,687,502 UART: [art] Store in slot 0x4
20,730,365 UART: [art] Derive Key Pair
20,731,409 UART: [art] Store priv key in slot 0x5
23,158,113 UART: [art] Derive Key Pair - Done
23,170,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,877,642 UART: [art] Erasing AUTHORITY.KEYID = 7
24,879,140 UART: [art] PUB.X = CA9AA5C1A59B91ABD3EE493B477D965176EBDC1EA59C061E06D9D521AD54E3129EB4FCF9DCF6E2EEBAFDFA695BE78B23
24,886,495 UART: [art] PUB.Y = 7B01B4B68C8A486ACD2D87C52EF7312BD06E08F998408C703802469CAE2DC688E57689A85F750AF65588B2A245EB440F
24,893,723 UART: [art] SIG.R = 13A58DBA9FCAAFAD5B5BCA1EF0EBDDAF288B72357322BE1F3BE3C8319CD279391C509DDC1DA3F4EBB74564D0A9B20C4C
24,901,157 UART: [art] SIG.S = 726DFC1ABCE9FA5827C3B529B2B034CBCAC24356EE52A4201AC280EE3B9C0B8B0AB12C8214CD546FDB874DC73DEAC8AD
25,879,725 UART: Caliptra RT
25,880,437 UART: [state] CFI Enabled
26,012,526 UART: [rt] RT listening for mailbox commands...
26,046,210 UART: [rt]cmd =0x49444543, len=327
26,055,377 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
3,777,777 ready_for_fw is high
3,778,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,382 >>> mbox cmd response: success
14,898,519 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,684,384 UART:
18,684,766 UART: Running Caliptra FMC ...
18,685,889 UART:
18,686,055 UART: [state] CFI Enabled
18,693,955 UART: [fht] FMC Alias Private Key: 7
20,460,036 UART: [art] Extend RT PCRs Done
20,461,267 UART: [art] Lock RT PCRs Done
20,463,173 UART: [art] Populate DV Done
20,468,670 UART: [fht] FMC Alias Private Key: 7
20,470,218 UART: [art] Derive CDI
20,471,039 UART: [art] Store in slot 0x4
20,513,539 UART: [art] Derive Key Pair
20,514,581 UART: [art] Store priv key in slot 0x5
22,941,492 UART: [art] Derive Key Pair - Done
22,954,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,660,938 UART: [art] Erasing AUTHORITY.KEYID = 7
24,662,589 UART: [art] PUB.X = 615453AE1E5378817C2A08AB133F6E477EF41FE6F4CC81E9CD7C693F81DB7B3F4137028DAE9A0E30D201FDCB06A7A36F
24,669,689 UART: [art] PUB.Y = B25F8B14B894B338280090DFA2BB7D9AA89A6B7EECE559975405C9626C9171CFAD02A4F24AB1360E4459B81DBD176B4A
24,676,953 UART: [art] SIG.R = 9691643A4FB125FB27260A3EB0F9C39070F0F4F7A9E5313DB9533FC98A3BD144D8E84C46BFD96DFCD4AA1B7E7640EB79
24,684,355 UART: [art] SIG.S = 0D87939F37D0391697AEBE5D107CAC258F8FDE44817352D02A6194CE29021C21E3E23839D7110DE2F76DF11D1743371E
25,662,406 UART: Caliptra RT
25,663,107 UART: [state] CFI Enabled
25,797,025 UART: [rt] RT listening for mailbox commands...
25,831,142 UART: [rt]cmd =0x49444543, len=327
25,840,127 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
192,276 UART:
192,629 UART: Running Caliptra ROM ...
193,811 UART:
193,962 UART: [state] CFI Enabled
264,040 UART: [state] LifecycleState = Unprovisioned
266,393 UART: [state] DebugLocked = No
268,356 UART: [state] WD Timer not started. Device not locked for debugging
273,241 UART: [kat] SHA2-256
463,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,954 UART: [kat] ++
474,431 UART: [kat] sha1
485,173 UART: [kat] SHA2-256
488,185 UART: [kat] SHA2-384
494,030 UART: [kat] SHA2-512-ACC
496,608 UART: [kat] ECC-384
2,948,083 UART: [kat] HMAC-384Kdf
2,972,126 UART: [kat] LMS
3,503,953 UART: [kat] --
3,509,249 UART: [cold-reset] ++
3,510,265 UART: [fht] FHT @ 0x50003400
3,520,688 UART: [idev] ++
3,521,360 UART: [idev] CDI.KEYID = 6
3,522,395 UART: [idev] SUBJECT.KEYID = 7
3,523,497 UART: [idev] UDS.KEYID = 0
3,524,571 ready_for_fw is high
3,524,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,677 UART: [idev] Erasing UDS.KEYID = 0
6,026,050 UART: [idev] Sha1 KeyId Algorithm
6,048,796 UART: [idev] --
6,053,226 UART: [ldev] ++
6,053,962 UART: [ldev] CDI.KEYID = 6
6,054,894 UART: [ldev] SUBJECT.KEYID = 5
6,056,057 UART: [ldev] AUTHORITY.KEYID = 7
6,057,235 UART: [ldev] FE.KEYID = 1
6,102,175 UART: [ldev] Erasing FE.KEYID = 1
8,609,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,877 UART: [ldev] --
10,415,235 UART: [fwproc] Wait for Commands...
10,417,546 UART: [fwproc] Recv command 0x46574c44
10,419,849 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,465 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,076 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,682,632 >>> mbox cmd response: success
15,145,135 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,146,215 UART: [afmc] ++
15,146,735 UART: [afmc] CDI.KEYID = 6
15,147,719 UART: [afmc] SUBJECT.KEYID = 7
15,148,830 UART: [afmc] AUTHORITY.KEYID = 5
17,234,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,479 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,385 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,507 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,658 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,533 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,079 UART: [afmc] --
19,035,128 UART: [cold-reset] --
19,038,819 UART: [state] Locking Datavault
19,045,043 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,191 UART: [state] Locking ICCM
19,050,161 UART: [exit] Launching FMC @ 0x40000130
19,058,849 UART:
19,059,086 UART: Running Caliptra FMC ...
19,060,195 UART:
19,060,360 UART: [state] CFI Enabled
19,119,159 UART: [fht] FMC Alias Private Key: 7
20,885,667 UART: [art] Extend RT PCRs Done
20,886,887 UART: [art] Lock RT PCRs Done
20,888,888 UART: [art] Populate DV Done
20,894,299 UART: [fht] FMC Alias Private Key: 7
20,895,843 UART: [art] Derive CDI
20,896,653 UART: [art] Store in slot 0x4
20,952,208 UART: [art] Derive Key Pair
20,953,198 UART: [art] Store priv key in slot 0x5
23,415,894 UART: [art] Derive Key Pair - Done
23,428,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,881 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,410 UART: [art] PUB.X = 6E1EF46E8498A89866514EB3BAE9AEB178955F143270285DEA915377DFBCDC7828B38CD7561903FB7DAA4639D7BEFC70
25,150,633 UART: [art] PUB.Y = 1FB091F31055DE0EA6BA200BF24694D867B3F949EFBED9327F09DAD5D887C8850207FB938BA64FCFFC13D68B4640B49B
25,157,893 UART: [art] SIG.R = 43868ED01B25E18132346B626932362CDEEB8B3495EB36AA90E05A7DBC4EA73C50721737A922EC38AA30E1624F542B8E
25,165,305 UART: [art] SIG.S = 6E5BD76A8BB36480E9D07FA09D75A77C645EBAE44B01800B12573253F24EA105DBB85DD9CCCE7ED3895674F1D2828DE8
26,144,609 UART: Caliptra RT
26,145,322 UART: [state] CFI Enabled
26,326,891 UART: [rt] RT listening for mailbox commands...
26,360,420 UART: [rt]cmd =0x49444543, len=327
26,369,687 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,440,633 ready_for_fw is high
3,441,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,771 >>> mbox cmd response: success
15,290,325 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,111,667 UART:
19,112,070 UART: Running Caliptra FMC ...
19,113,226 UART:
19,113,394 UART: [state] CFI Enabled
19,180,430 UART: [fht] FMC Alias Private Key: 7
20,946,577 UART: [art] Extend RT PCRs Done
20,947,795 UART: [art] Lock RT PCRs Done
20,949,204 UART: [art] Populate DV Done
20,954,473 UART: [fht] FMC Alias Private Key: 7
20,956,064 UART: [art] Derive CDI
20,956,878 UART: [art] Store in slot 0x4
21,013,247 UART: [art] Derive Key Pair
21,014,283 UART: [art] Store priv key in slot 0x5
23,477,327 UART: [art] Derive Key Pair - Done
23,490,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,643 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,151 UART: [art] PUB.X = 4E444997CB328AC03B7B09EB5FE180B0CFDA9D2F0A53F9C7BC6F3D6FBD2DB9F2DCBE2B28197FEC50E6CBAA886356E6C5
25,211,402 UART: [art] PUB.Y = 679562D2890B6724822841C985764F2D199073DAB8C367DF345D513A96721452F38434FD76AFAB5C95F94979634341E2
25,218,638 UART: [art] SIG.R = DD3431338DBB68BD096AFBE8097C705006FA0A50D99C15C3373BA7158C0672247B87679537AA2204BAFEB8DF6681619B
25,226,040 UART: [art] SIG.S = 99586107C0FF0948E8AD6F39BEB0D96FC32EDD57E9017A28E48B025E5D051B2348BB97394D725C93213E270A79DC6CDF
26,204,833 UART: Caliptra RT
26,205,545 UART: [state] CFI Enabled
26,385,328 UART: [rt] RT listening for mailbox commands...
26,419,179 UART: [rt]cmd =0x49444543, len=327
26,428,280 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,395 UART:
192,764 UART: Running Caliptra ROM ...
193,868 UART:
603,596 UART: [state] CFI Enabled
614,794 UART: [state] LifecycleState = Unprovisioned
617,135 UART: [state] DebugLocked = No
618,807 UART: [state] WD Timer not started. Device not locked for debugging
623,871 UART: [kat] SHA2-256
813,728 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,558 UART: [kat] ++
825,012 UART: [kat] sha1
836,179 UART: [kat] SHA2-256
839,190 UART: [kat] SHA2-384
845,831 UART: [kat] SHA2-512-ACC
848,420 UART: [kat] ECC-384
3,292,355 UART: [kat] HMAC-384Kdf
3,305,449 UART: [kat] LMS
3,837,261 UART: [kat] --
3,842,600 UART: [cold-reset] ++
3,845,174 UART: [fht] FHT @ 0x50003400
3,858,495 UART: [idev] ++
3,859,203 UART: [idev] CDI.KEYID = 6
3,860,234 UART: [idev] SUBJECT.KEYID = 7
3,861,362 UART: [idev] UDS.KEYID = 0
3,862,347 ready_for_fw is high
3,862,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,376 UART: [idev] Erasing UDS.KEYID = 0
6,338,680 UART: [idev] Sha1 KeyId Algorithm
6,360,614 UART: [idev] --
6,365,098 UART: [ldev] ++
6,365,782 UART: [ldev] CDI.KEYID = 6
6,366,668 UART: [ldev] SUBJECT.KEYID = 5
6,367,883 UART: [ldev] AUTHORITY.KEYID = 7
6,369,013 UART: [ldev] FE.KEYID = 1
6,381,923 UART: [ldev] Erasing FE.KEYID = 1
8,863,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,951 UART: [ldev] --
10,654,812 UART: [fwproc] Wait for Commands...
10,657,235 UART: [fwproc] Recv command 0x46574c44
10,659,543 UART: [fwproc] Recv'd Img size: 118548 bytes
14,156,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,234,837 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,358,429 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,918,611 >>> mbox cmd response: success
15,382,068 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,383,111 UART: [afmc] ++
15,383,647 UART: [afmc] CDI.KEYID = 6
15,384,533 UART: [afmc] SUBJECT.KEYID = 7
15,385,589 UART: [afmc] AUTHORITY.KEYID = 5
17,426,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,356 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,441 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,581 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,509 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,910 UART: [afmc] --
19,223,189 UART: [cold-reset] --
19,228,517 UART: [state] Locking Datavault
19,233,938 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,092 UART: [state] Locking ICCM
19,238,960 UART: [exit] Launching FMC @ 0x40000130
19,247,638 UART:
19,247,876 UART: Running Caliptra FMC ...
19,248,980 UART:
19,249,148 UART: [state] CFI Enabled
19,257,227 UART: [fht] FMC Alias Private Key: 7
21,023,387 UART: [art] Extend RT PCRs Done
21,024,618 UART: [art] Lock RT PCRs Done
21,026,036 UART: [art] Populate DV Done
21,031,365 UART: [fht] FMC Alias Private Key: 7
21,033,074 UART: [art] Derive CDI
21,033,896 UART: [art] Store in slot 0x4
21,076,766 UART: [art] Derive Key Pair
21,077,775 UART: [art] Store priv key in slot 0x5
23,505,247 UART: [art] Derive Key Pair - Done
23,518,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,222 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,732 UART: [art] PUB.X = 2D8EB62C3663A16C70BDAF4AA313F9DD36270B9B6BB9340375AB5E9001D903A019F2807EB2122DD6E12DA9F1DE22D909
25,233,011 UART: [art] PUB.Y = E030BDC35FBCC3174721F011C41C07F21554A20CEB5176A44138BC074E1FF41DAD86A40A88CBAA884479196337475C05
25,240,268 UART: [art] SIG.R = E1D5EA9C68B9C51812176296A3D2ECB5B255CAB3AC06EBC82BB02A448AF416ABA7DB1FF068079F0BE1A46228634C6872
25,247,680 UART: [art] SIG.S = 356B9233F2E3044BA7AFD52107F43013E6AC8BB526C7049CA4F7395E3B5125DA89FA6B26E3A8CC77BCE44C989752A50E
26,226,892 UART: Caliptra RT
26,227,597 UART: [state] CFI Enabled
26,361,073 UART: [rt] RT listening for mailbox commands...
26,395,018 UART: [rt]cmd =0x49444543, len=327
26,404,069 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,760,290 ready_for_fw is high
3,760,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,059,635 >>> mbox cmd response: success
15,522,500 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,309,282 UART:
19,309,706 UART: Running Caliptra FMC ...
19,310,857 UART:
19,311,027 UART: [state] CFI Enabled
19,318,848 UART: [fht] FMC Alias Private Key: 7
21,084,889 UART: [art] Extend RT PCRs Done
21,086,121 UART: [art] Lock RT PCRs Done
21,087,626 UART: [art] Populate DV Done
21,092,755 UART: [fht] FMC Alias Private Key: 7
21,094,312 UART: [art] Derive CDI
21,095,138 UART: [art] Store in slot 0x4
21,137,740 UART: [art] Derive Key Pair
21,138,744 UART: [art] Store priv key in slot 0x5
23,565,739 UART: [art] Derive Key Pair - Done
23,578,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,285,141 UART: [art] Erasing AUTHORITY.KEYID = 7
25,286,662 UART: [art] PUB.X = 16D75BE1243073136BB6E590E93832F5E688452F4A42821EA8E456EDD84EB339BD61ADF423FC073769B2ADBF50F6237B
25,293,920 UART: [art] PUB.Y = 85394E22D8259CB5D77B092D4D82C92D43FA22A3755A56BCA2B27058D6996BF19AA0E600A8C3A41D0858EEA66CBEB755
25,301,185 UART: [art] SIG.R = 9D4D5DA4C10EDD6A454E45889C5D9EAF340333586C760097C8618DCA636B6A0D2665325AA4419DDB942C9892A2CA8AF4
25,308,574 UART: [art] SIG.S = 5ACD69971F3E697E86301EFF1A93801EE7FDF067D743DAB70061845192B8E6469001896CC53DE9256E2F8AE98C30C906
26,287,227 UART: Caliptra RT
26,287,962 UART: [state] CFI Enabled
26,420,920 UART: [rt] RT listening for mailbox commands...
26,455,075 UART: [rt]cmd =0x49444543, len=327
26,464,118 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,705 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,253 UART: [kat] SHA2-256
882,184 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,299 UART: [kat] ++
886,451 UART: [kat] sha1
890,585 UART: [kat] SHA2-256
892,523 UART: [kat] SHA2-384
895,256 UART: [kat] SHA2-512-ACC
897,157 UART: [kat] ECC-384
902,588 UART: [kat] HMAC-384Kdf
907,258 UART: [kat] LMS
1,475,454 UART: [kat] --
1,476,319 UART: [cold-reset] ++
1,476,837 UART: [fht] Storing FHT @ 0x50003400
1,479,544 UART: [idev] ++
1,479,712 UART: [idev] CDI.KEYID = 6
1,480,072 UART: [idev] SUBJECT.KEYID = 7
1,480,496 UART: [idev] UDS.KEYID = 0
1,480,841 ready_for_fw is high
1,480,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,632 UART: [idev] Erasing UDS.KEYID = 0
1,504,978 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,478 UART: [idev] --
1,514,555 UART: [ldev] ++
1,514,723 UART: [ldev] CDI.KEYID = 6
1,515,086 UART: [ldev] SUBJECT.KEYID = 5
1,515,512 UART: [ldev] AUTHORITY.KEYID = 7
1,515,975 UART: [ldev] FE.KEYID = 1
1,521,229 UART: [ldev] Erasing FE.KEYID = 1
1,546,408 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,376 UART: [ldev] --
1,585,819 UART: [fwproc] Waiting for Commands...
1,586,602 UART: [fwproc] Received command 0x46574c44
1,587,393 UART: [fwproc] Received Image of size 118548 bytes
2,931,593 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,531 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,749 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,176 >>> mbox cmd response: success
3,131,176 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,132,210 UART: [afmc] ++
3,132,378 UART: [afmc] CDI.KEYID = 6
3,132,740 UART: [afmc] SUBJECT.KEYID = 7
3,133,165 UART: [afmc] AUTHORITY.KEYID = 5
3,167,862 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,956 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,736 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,445 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,328 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,011 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,785 UART: [afmc] --
3,210,731 UART: [cold-reset] --
3,211,657 UART: [state] Locking Datavault
3,213,036 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,640 UART: [state] Locking ICCM
3,214,270 UART: [exit] Launching FMC @ 0x40000130
3,219,600 UART:
3,219,616 UART: Running Caliptra FMC ...
3,220,024 UART:
3,220,078 UART: [state] CFI Enabled
3,231,064 UART: [fht] FMC Alias Private Key: 7
3,350,298 UART: [art] Extend RT PCRs Done
3,350,726 UART: [art] Lock RT PCRs Done
3,352,090 UART: [art] Populate DV Done
3,360,235 UART: [fht] FMC Alias Private Key: 7
3,361,213 UART: [art] Derive CDI
3,361,493 UART: [art] Store in slot 0x4
3,447,085 UART: [art] Derive Key Pair
3,447,445 UART: [art] Store priv key in slot 0x5
3,460,450 UART: [art] Derive Key Pair - Done
3,475,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,310 UART: [art] PUB.X = 62A0BB960382B80EA99D64FFD5BAEAC81EF5B81C377FD4313D9FDC9BFE56311650057A91B73B9B380603D47FCD9C7382
3,498,077 UART: [art] PUB.Y = B7954EA5FD56F1E7D0E4C8A90994CB383F1F73ECC8685407413CFFBC300DC43E0F29155480CE76D5991BA74B6E37153A
3,505,023 UART: [art] SIG.R = 8ECA914E62472F0ADD8B422F9E053610BC062E78FACDEBF83A96B99A30C3BCACB62153943E997B9739DA06CEE7904D04
3,511,792 UART: [art] SIG.S = 910CCE75FAB852C74C69E9F2A4DE912439A9DA29BC8DB3BA317E9691D4381127746252AC2ADD646B23BC0767E68F5EA8
3,535,354 UART: Caliptra RT
3,535,605 UART: [state] CFI Enabled
3,657,092 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,843 UART: [rt]cmd =0x49444543, len=327
3,698,180 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,399 ready_for_fw is high
1,362,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,290 >>> mbox cmd response: success
2,981,290 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,042,099 UART:
3,042,115 UART: Running Caliptra FMC ...
3,042,523 UART:
3,042,577 UART: [state] CFI Enabled
3,052,765 UART: [fht] FMC Alias Private Key: 7
3,171,585 UART: [art] Extend RT PCRs Done
3,172,013 UART: [art] Lock RT PCRs Done
3,173,461 UART: [art] Populate DV Done
3,181,692 UART: [fht] FMC Alias Private Key: 7
3,182,754 UART: [art] Derive CDI
3,183,034 UART: [art] Store in slot 0x4
3,268,618 UART: [art] Derive Key Pair
3,268,978 UART: [art] Store priv key in slot 0x5
3,282,009 UART: [art] Derive Key Pair - Done
3,297,077 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,127 UART: [art] PUB.X = 177E41BE1120436652576E50F2310BE3B667D73B650857E0A71353ACA5F7F6F43934224317A6B06AC6D1A190D6A1DCE2
3,319,887 UART: [art] PUB.Y = B6024072C5AD1A6FD7DA9902826593CD94D3529B23D3E344536ECC69E000EA4A1C73D3CE18AE96DBFCDA46F59EB2F7D3
3,326,825 UART: [art] SIG.R = 9C9E5FA76FEF05E63EC076E908EB55229A6ECDA5E8A57093A44D3F514F281D6DC0C69CB7BF58953D9700C727A8EF91CD
3,333,583 UART: [art] SIG.S = 4E721F3426F6406CFF4B4E5B0DDD0D109530A35B85DCFA5C0EB489A9A7384D2359F1CB579F718A6AA30BC67DE622E771
3,357,001 UART: Caliptra RT
3,357,252 UART: [state] CFI Enabled
3,476,654 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,549 UART: [rt]cmd =0x49444543, len=327
3,517,803 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,348 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,074 UART: [kat] SHA2-256
882,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,120 UART: [kat] ++
886,272 UART: [kat] sha1
890,528 UART: [kat] SHA2-256
892,466 UART: [kat] SHA2-384
895,243 UART: [kat] SHA2-512-ACC
897,144 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,409 UART: [kat] LMS
1,475,605 UART: [kat] --
1,476,520 UART: [cold-reset] ++
1,477,044 UART: [fht] Storing FHT @ 0x50003400
1,479,919 UART: [idev] ++
1,480,087 UART: [idev] CDI.KEYID = 6
1,480,447 UART: [idev] SUBJECT.KEYID = 7
1,480,871 UART: [idev] UDS.KEYID = 0
1,481,216 ready_for_fw is high
1,481,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,601 UART: [idev] Erasing UDS.KEYID = 0
1,505,651 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,059 UART: [idev] --
1,515,100 UART: [ldev] ++
1,515,268 UART: [ldev] CDI.KEYID = 6
1,515,631 UART: [ldev] SUBJECT.KEYID = 5
1,516,057 UART: [ldev] AUTHORITY.KEYID = 7
1,516,520 UART: [ldev] FE.KEYID = 1
1,521,768 UART: [ldev] Erasing FE.KEYID = 1
1,547,181 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,251 UART: [ldev] --
1,586,728 UART: [fwproc] Waiting for Commands...
1,587,533 UART: [fwproc] Received command 0x46574c44
1,588,324 UART: [fwproc] Received Image of size 118548 bytes
2,933,200 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,986 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,204 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,579 >>> mbox cmd response: success
3,132,579 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,133,613 UART: [afmc] ++
3,133,781 UART: [afmc] CDI.KEYID = 6
3,134,143 UART: [afmc] SUBJECT.KEYID = 7
3,134,568 UART: [afmc] AUTHORITY.KEYID = 5
3,169,835 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,017 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,797 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,506 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,389 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,072 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,904 UART: [afmc] --
3,212,864 UART: [cold-reset] --
3,213,558 UART: [state] Locking Datavault
3,214,969 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,573 UART: [state] Locking ICCM
3,216,183 UART: [exit] Launching FMC @ 0x40000130
3,221,513 UART:
3,221,529 UART: Running Caliptra FMC ...
3,221,937 UART:
3,222,080 UART: [state] CFI Enabled
3,232,482 UART: [fht] FMC Alias Private Key: 7
3,351,648 UART: [art] Extend RT PCRs Done
3,352,076 UART: [art] Lock RT PCRs Done
3,353,582 UART: [art] Populate DV Done
3,361,959 UART: [fht] FMC Alias Private Key: 7
3,363,057 UART: [art] Derive CDI
3,363,337 UART: [art] Store in slot 0x4
3,449,277 UART: [art] Derive Key Pair
3,449,637 UART: [art] Store priv key in slot 0x5
3,462,904 UART: [art] Derive Key Pair - Done
3,477,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,306 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,071 UART: [art] PUB.X = 106F5081FBD5A1F48490AF0DBE36DA9F2A76375162DBBE96CDAA6E922A80A0E3E780275A24DBD228F304D127C3772BB4
3,500,847 UART: [art] PUB.Y = A60C9AABD5455A622105D57F9724C082B7926A47FE3196134E8A773C0F9EF64B38BD6B0F646147491B730B161B6ADDDA
3,507,786 UART: [art] SIG.R = 9E91CB1753BBD5CED64959C37FE119E4D0CE3F0DB9420C8E1CE5D5F754328D58108E5CC4845FE47D288A03D93F97C1AB
3,514,561 UART: [art] SIG.S = C72983F20B17565808A69FE53679911BAA2403123E084919439CFD7D2AB926FA6CF604B8A5DF1F2DC9339C2984326AAD
3,538,714 UART: Caliptra RT
3,539,057 UART: [state] CFI Enabled
3,658,966 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,863 UART: [rt]cmd =0x49444543, len=327
3,700,236 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,790 ready_for_fw is high
1,362,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,763 >>> mbox cmd response: success
2,982,763 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,043,980 UART:
3,043,996 UART: Running Caliptra FMC ...
3,044,404 UART:
3,044,547 UART: [state] CFI Enabled
3,055,097 UART: [fht] FMC Alias Private Key: 7
3,173,675 UART: [art] Extend RT PCRs Done
3,174,103 UART: [art] Lock RT PCRs Done
3,175,377 UART: [art] Populate DV Done
3,183,592 UART: [fht] FMC Alias Private Key: 7
3,184,540 UART: [art] Derive CDI
3,184,820 UART: [art] Store in slot 0x4
3,270,822 UART: [art] Derive Key Pair
3,271,182 UART: [art] Store priv key in slot 0x5
3,283,837 UART: [art] Derive Key Pair - Done
3,298,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,633 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,398 UART: [art] PUB.X = 57438E37ED72C0471173270FF89B9B7354223F836CFF3FC5095472E0F982C12A028B2F1F2E30DE8331FDCA6C372F2C83
3,321,159 UART: [art] PUB.Y = 720427760618263B8E2CBF841DD8B2E05A29C89AC46E63F7794C3F33CB477E3B06F978CA75F318337545F192C0D2FD45
3,328,098 UART: [art] SIG.R = 2E6822A085AD82D7BC6DB9FDD294A56D670548920352ED6A71554F5D663A5731BB7045BE02C458A15C359599E39CF6A5
3,334,859 UART: [art] SIG.S = B5519D30548551ED386A85A0DA838A198A6B6D709C4DF6DCEDD0D5D340415B19BBF3E3ABC6000CA59BEBA019A94034C4
3,359,024 UART: Caliptra RT
3,359,367 UART: [state] CFI Enabled
3,480,423 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,106 UART: [rt]cmd =0x49444543, len=327
3,521,321 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,423 UART: [kat] SHA2-512-ACC
906,324 UART: [kat] ECC-384
915,803 UART: [kat] HMAC-384Kdf
920,525 UART: [kat] LMS
1,168,837 UART: [kat] --
1,169,594 UART: [cold-reset] ++
1,169,990 UART: [fht] FHT @ 0x50003400
1,172,828 UART: [idev] ++
1,172,996 UART: [idev] CDI.KEYID = 6
1,173,357 UART: [idev] SUBJECT.KEYID = 7
1,173,782 UART: [idev] UDS.KEYID = 0
1,174,128 ready_for_fw is high
1,174,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,463 UART: [idev] Erasing UDS.KEYID = 0
1,198,329 UART: [idev] Sha1 KeyId Algorithm
1,207,199 UART: [idev] --
1,208,200 UART: [ldev] ++
1,208,368 UART: [ldev] CDI.KEYID = 6
1,208,732 UART: [ldev] SUBJECT.KEYID = 5
1,209,159 UART: [ldev] AUTHORITY.KEYID = 7
1,209,622 UART: [ldev] FE.KEYID = 1
1,214,996 UART: [ldev] Erasing FE.KEYID = 1
1,240,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,012 UART: [ldev] --
1,280,245 UART: [fwproc] Wait for Commands...
1,281,062 UART: [fwproc] Recv command 0x46574c44
1,281,795 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,881 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,056 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,417 >>> mbox cmd response: success
2,824,417 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,825,487 UART: [afmc] ++
2,825,655 UART: [afmc] CDI.KEYID = 6
2,826,018 UART: [afmc] SUBJECT.KEYID = 7
2,826,444 UART: [afmc] AUTHORITY.KEYID = 5
2,862,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,238 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,987 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,697 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,578 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,279 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,148 UART: [afmc] --
2,905,985 UART: [cold-reset] --
2,906,539 UART: [state] Locking Datavault
2,907,340 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,944 UART: [state] Locking ICCM
2,908,560 UART: [exit] Launching FMC @ 0x40000130
2,913,890 UART:
2,913,906 UART: Running Caliptra FMC ...
2,914,314 UART:
2,914,368 UART: [state] CFI Enabled
2,924,704 UART: [fht] FMC Alias Private Key: 7
3,043,930 UART: [art] Extend RT PCRs Done
3,044,358 UART: [art] Lock RT PCRs Done
3,045,840 UART: [art] Populate DV Done
3,054,185 UART: [fht] FMC Alias Private Key: 7
3,055,347 UART: [art] Derive CDI
3,055,627 UART: [art] Store in slot 0x4
3,141,232 UART: [art] Derive Key Pair
3,141,592 UART: [art] Store priv key in slot 0x5
3,154,660 UART: [art] Derive Key Pair - Done
3,169,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,945 UART: [art] PUB.X = 0D7BCB2FACB46D05A4303D9BD5EAEAA3A4D70F6B3953934AA17AAB5B6F7839B0E84CB6EDA86051B2CA6B018BDE9DF069
3,191,731 UART: [art] PUB.Y = CFBECCA2AD9E33A2E0A0F6D64EF73627B7A4949797B9BA59E77ECA362F3F4A6F63A3CAE96347B05A4D53D7D915B199DB
3,198,703 UART: [art] SIG.R = C1F6544CB7073423E9000E9BC54217A4ACCC1C84A7753557906A84F32D21A8B25E9E305C33556FA4B872D78EDB2EE707
3,205,444 UART: [art] SIG.S = F6F6A4559D990C439356B150A23F96CBEF888BACD6D9FDE1A83D36F4DEDFD207CA6FF688DC87B9652D3768B4A398F235
3,229,620 UART: Caliptra RT
3,229,871 UART: [state] CFI Enabled
3,349,937 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,582 UART: [rt]cmd =0x49444543, len=327
3,391,194 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,554 ready_for_fw is high
1,059,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,094 >>> mbox cmd response: success
2,679,094 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,741,501 UART:
2,741,517 UART: Running Caliptra FMC ...
2,741,925 UART:
2,741,979 UART: [state] CFI Enabled
2,752,575 UART: [fht] FMC Alias Private Key: 7
2,871,595 UART: [art] Extend RT PCRs Done
2,872,023 UART: [art] Lock RT PCRs Done
2,873,497 UART: [art] Populate DV Done
2,881,834 UART: [fht] FMC Alias Private Key: 7
2,882,810 UART: [art] Derive CDI
2,883,090 UART: [art] Store in slot 0x4
2,969,105 UART: [art] Derive Key Pair
2,969,465 UART: [art] Store priv key in slot 0x5
2,982,627 UART: [art] Derive Key Pair - Done
2,997,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,504 UART: [art] PUB.X = 1D99AD2F8A232488BDE03084354B8ABCC5F8468EC2C1A1E99D7A857FA29AE37C049DACF4E98E14911165AE84EB48BA56
3,020,285 UART: [art] PUB.Y = F7B2BE99CB5F823C030B8FF24CCF9530FD131C9ED67DD5A460451F95412540AB7EBD145C7D8BE338DFCA4763AF6E78A9
3,027,247 UART: [art] SIG.R = 0967612968A16C0469A6B29315F84E27F24F31E021C4E1ABA908F518F1C6D1CDB5FCCB2874007796CB42D10BEB06F0DA
3,033,986 UART: [art] SIG.S = 961DD5DF8FABAFCFD4AD77C3077DE8C377C78F38A632FDA2FFDEAA9ABA5A1FA33EBF2C3DF56C83E2EE32652DE1A8DDEC
3,057,675 UART: Caliptra RT
3,057,926 UART: [state] CFI Enabled
3,178,571 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,030 UART: [rt]cmd =0x49444543, len=327
3,219,501 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,296 UART: [state] WD Timer not started. Device not locked for debugging
87,609 UART: [kat] SHA2-256
891,159 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,783 UART: [kat] SHA2-256
901,723 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,169,797 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,173,029 UART: [idev] ++
1,173,197 UART: [idev] CDI.KEYID = 6
1,173,558 UART: [idev] SUBJECT.KEYID = 7
1,173,983 UART: [idev] UDS.KEYID = 0
1,174,329 ready_for_fw is high
1,174,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,792 UART: [idev] Erasing UDS.KEYID = 0
1,198,686 UART: [idev] Sha1 KeyId Algorithm
1,207,516 UART: [idev] --
1,208,637 UART: [ldev] ++
1,208,805 UART: [ldev] CDI.KEYID = 6
1,209,169 UART: [ldev] SUBJECT.KEYID = 5
1,209,596 UART: [ldev] AUTHORITY.KEYID = 7
1,210,059 UART: [ldev] FE.KEYID = 1
1,215,701 UART: [ldev] Erasing FE.KEYID = 1
1,242,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,029 UART: [ldev] --
1,281,284 UART: [fwproc] Wait for Commands...
1,281,999 UART: [fwproc] Recv command 0x46574c44
1,282,732 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,538 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,713 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,894 >>> mbox cmd response: success
2,824,894 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,826,116 UART: [afmc] ++
2,826,284 UART: [afmc] CDI.KEYID = 6
2,826,647 UART: [afmc] SUBJECT.KEYID = 7
2,827,073 UART: [afmc] AUTHORITY.KEYID = 5
2,862,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,008 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,718 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,599 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,300 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,135 UART: [afmc] --
2,905,982 UART: [cold-reset] --
2,906,776 UART: [state] Locking Datavault
2,908,051 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,655 UART: [state] Locking ICCM
2,909,293 UART: [exit] Launching FMC @ 0x40000130
2,914,623 UART:
2,914,639 UART: Running Caliptra FMC ...
2,915,047 UART:
2,915,190 UART: [state] CFI Enabled
2,925,672 UART: [fht] FMC Alias Private Key: 7
3,044,694 UART: [art] Extend RT PCRs Done
3,045,122 UART: [art] Lock RT PCRs Done
3,046,578 UART: [art] Populate DV Done
3,054,747 UART: [fht] FMC Alias Private Key: 7
3,055,813 UART: [art] Derive CDI
3,056,093 UART: [art] Store in slot 0x4
3,142,486 UART: [art] Derive Key Pair
3,142,846 UART: [art] Store priv key in slot 0x5
3,156,008 UART: [art] Derive Key Pair - Done
3,170,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,835 UART: [art] PUB.X = F4DCAABD43A32C8292ECF166DA79AEF4CEF7E7429529C2C1E4439CDCCE2E23616EF64D0FFAB1C388DB6323FE7708CCF0
3,193,627 UART: [art] PUB.Y = 92EBD0F35929B09C3B0CD59946A7D4914D38E7336675B2D3807255D14C2D67787104537D2D576BE3287B854A641146D5
3,200,559 UART: [art] SIG.R = 5136EF8BE0E12773CAE111ADB5B11F374335DC003A8782515700C946DCBF68C279410CD200BA5B02A5AD92A8471B7885
3,207,259 UART: [art] SIG.S = 893FB2A07914A5F9E1CCB6E564605A4CD801B306E51E6209C7C69842EB85AE6DAD1F6BD15735EDE4EA5537135AA69551
3,230,694 UART: Caliptra RT
3,231,037 UART: [state] CFI Enabled
3,352,056 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,749 UART: [rt]cmd =0x49444543, len=327
3,393,141 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,249 ready_for_fw is high
1,059,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,035 >>> mbox cmd response: success
2,678,035 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,740,818 UART:
2,740,834 UART: Running Caliptra FMC ...
2,741,242 UART:
2,741,385 UART: [state] CFI Enabled
2,752,329 UART: [fht] FMC Alias Private Key: 7
2,871,587 UART: [art] Extend RT PCRs Done
2,872,015 UART: [art] Lock RT PCRs Done
2,873,493 UART: [art] Populate DV Done
2,881,528 UART: [fht] FMC Alias Private Key: 7
2,882,684 UART: [art] Derive CDI
2,882,964 UART: [art] Store in slot 0x4
2,968,285 UART: [art] Derive Key Pair
2,968,645 UART: [art] Store priv key in slot 0x5
2,982,343 UART: [art] Derive Key Pair - Done
2,997,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,767 UART: [art] PUB.X = D0A6A2427C71E16B14E9CA1D40060B22E940209F953C4F543D916BF360D67073D5ECD016A3680527913339A91BBEF3F3
3,020,526 UART: [art] PUB.Y = E72A183A0BB55BBC213CF9C19A63D55D4175B85B37A421400B5534CDC70593F80F3A7C5D304E29904534C5000500F4D8
3,027,415 UART: [art] SIG.R = B8E1156977C821DF99F096E0A4D5AB0F97FD37C720273B0FC6762F16B666D4CF4513B992BD55CD966DBF0884FF2FFDB7
3,034,188 UART: [art] SIG.S = 8C2A406E6E64E62D24D0F6994122DC2DCBD255064E97C5F74A7043BE4928C6517FBF7CC56A80A2F8740D93C432FCBF9E
3,057,632 UART: Caliptra RT
3,057,975 UART: [state] CFI Enabled
3,179,359 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,866 UART: [rt]cmd =0x49444543, len=327
3,220,319 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,773 UART: [state] WD Timer not started. Device not locked for debugging
88,036 UART: [kat] SHA2-256
893,686 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,811 UART: [kat] ++
897,963 UART: [kat] sha1
902,343 UART: [kat] SHA2-256
904,283 UART: [kat] SHA2-384
906,886 UART: [kat] SHA2-512-ACC
908,787 UART: [kat] ECC-384
918,554 UART: [kat] HMAC-384Kdf
923,132 UART: [kat] LMS
1,171,460 UART: [kat] --
1,172,393 UART: [cold-reset] ++
1,172,913 UART: [fht] FHT @ 0x50003400
1,175,458 UART: [idev] ++
1,175,626 UART: [idev] CDI.KEYID = 6
1,175,986 UART: [idev] SUBJECT.KEYID = 7
1,176,410 UART: [idev] UDS.KEYID = 0
1,176,755 ready_for_fw is high
1,176,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,620 UART: [idev] Erasing UDS.KEYID = 0
1,201,013 UART: [idev] Sha1 KeyId Algorithm
1,209,547 UART: [idev] --
1,210,723 UART: [ldev] ++
1,210,891 UART: [ldev] CDI.KEYID = 6
1,211,254 UART: [ldev] SUBJECT.KEYID = 5
1,211,680 UART: [ldev] AUTHORITY.KEYID = 7
1,212,143 UART: [ldev] FE.KEYID = 1
1,217,217 UART: [ldev] Erasing FE.KEYID = 1
1,243,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,785 UART: [ldev] --
1,283,234 UART: [fwproc] Wait for Commands...
1,284,010 UART: [fwproc] Recv command 0x46574c44
1,284,738 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,016 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,186 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,377 >>> mbox cmd response: success
2,828,377 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,829,551 UART: [afmc] ++
2,829,719 UART: [afmc] CDI.KEYID = 6
2,830,081 UART: [afmc] SUBJECT.KEYID = 7
2,830,506 UART: [afmc] AUTHORITY.KEYID = 5
2,865,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,926 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,635 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,518 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,219 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,207 UART: [afmc] --
2,909,303 UART: [cold-reset] --
2,910,119 UART: [state] Locking Datavault
2,911,248 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,852 UART: [state] Locking ICCM
2,912,412 UART: [exit] Launching FMC @ 0x40000130
2,917,742 UART:
2,917,758 UART: Running Caliptra FMC ...
2,918,166 UART:
2,918,220 UART: [state] CFI Enabled
2,928,972 UART: [fht] FMC Alias Private Key: 7
3,047,330 UART: [art] Extend RT PCRs Done
3,047,758 UART: [art] Lock RT PCRs Done
3,049,340 UART: [art] Populate DV Done
3,057,551 UART: [fht] FMC Alias Private Key: 7
3,058,663 UART: [art] Derive CDI
3,058,943 UART: [art] Store in slot 0x4
3,144,738 UART: [art] Derive Key Pair
3,145,098 UART: [art] Store priv key in slot 0x5
3,158,528 UART: [art] Derive Key Pair - Done
3,173,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,194 UART: [art] PUB.X = 8C98711BCE84B3B4CE6B6A369466DA3ECA6C72B3A74AA21AE3D3AF425C6D55A2E9377C0F7ED53A047661B470172A5E7C
3,195,972 UART: [art] PUB.Y = 94B8EB899E903798CF7154E823A3F02C6A2F246639BF5DD564593A5971094E6858934603217739E89BC4DB4D7D39D781
3,202,906 UART: [art] SIG.R = 19615B51EEB8DE39D14FFBF6275DD665A30649EF8C2F13582AA045DC13146850ABDD6EB6A5B636E14309A5B281B52B90
3,209,678 UART: [art] SIG.S = C56350AB415DD965F22C38BEF9614BFC0F09CD3A9BBC5E45348ED3CC02BB7B22F332DC24AB0AF9870CB35890202D8A1C
3,233,617 UART: Caliptra RT
3,233,868 UART: [state] CFI Enabled
3,352,453 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,850 UART: [rt]cmd =0x49444543, len=327
3,393,417 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,791 ready_for_fw is high
1,060,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,926 >>> mbox cmd response: success
2,678,926 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,740,909 UART:
2,740,925 UART: Running Caliptra FMC ...
2,741,333 UART:
2,741,387 UART: [state] CFI Enabled
2,751,875 UART: [fht] FMC Alias Private Key: 7
2,871,483 UART: [art] Extend RT PCRs Done
2,871,911 UART: [art] Lock RT PCRs Done
2,873,519 UART: [art] Populate DV Done
2,881,828 UART: [fht] FMC Alias Private Key: 7
2,882,760 UART: [art] Derive CDI
2,883,040 UART: [art] Store in slot 0x4
2,968,793 UART: [art] Derive Key Pair
2,969,153 UART: [art] Store priv key in slot 0x5
2,982,577 UART: [art] Derive Key Pair - Done
2,997,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,594 UART: [art] PUB.X = A6BFF29D77AEF2CB31D75B653B7E06E484ECCFE5EDDA2DD306F17B49E9B46ECA578D56AE5E3FD71E99C793055071ECC3
3,020,381 UART: [art] PUB.Y = F83278F9CBBADC900A7B883701722DFE8C337395A405685FF299CB74D6EF9A0B3ED419AC0EAC9CDF8DD3B26D15B73C61
3,027,334 UART: [art] SIG.R = 2E101498A7070C2EEE1F7ED8815FBEE762F543493AF28EE2D4CA0F9C7E3B6445F859782724B113D1114D25C2884A02E9
3,034,094 UART: [art] SIG.S = E8B005ABCD691842FAF8B4E76701B4AC5A4F38336F2A96A90080597F7FD2EC390C134CAA4A2AE79502E5FFE95632C147
3,058,290 UART: Caliptra RT
3,058,541 UART: [state] CFI Enabled
3,178,816 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,377 UART: [rt]cmd =0x49444543, len=327
3,219,610 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,855 UART: [state] LifecycleState = Unprovisioned
85,510 UART: [state] DebugLocked = No
86,160 UART: [state] WD Timer not started. Device not locked for debugging
87,495 UART: [kat] SHA2-256
893,145 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,270 UART: [kat] ++
897,422 UART: [kat] sha1
901,708 UART: [kat] SHA2-256
903,648 UART: [kat] SHA2-384
906,539 UART: [kat] SHA2-512-ACC
908,440 UART: [kat] ECC-384
917,883 UART: [kat] HMAC-384Kdf
922,269 UART: [kat] LMS
1,170,597 UART: [kat] --
1,171,586 UART: [cold-reset] ++
1,171,946 UART: [fht] FHT @ 0x50003400
1,174,505 UART: [idev] ++
1,174,673 UART: [idev] CDI.KEYID = 6
1,175,033 UART: [idev] SUBJECT.KEYID = 7
1,175,457 UART: [idev] UDS.KEYID = 0
1,175,802 ready_for_fw is high
1,175,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,639 UART: [idev] Erasing UDS.KEYID = 0
1,200,706 UART: [idev] Sha1 KeyId Algorithm
1,209,298 UART: [idev] --
1,210,480 UART: [ldev] ++
1,210,648 UART: [ldev] CDI.KEYID = 6
1,211,011 UART: [ldev] SUBJECT.KEYID = 5
1,211,437 UART: [ldev] AUTHORITY.KEYID = 7
1,211,900 UART: [ldev] FE.KEYID = 1
1,217,248 UART: [ldev] Erasing FE.KEYID = 1
1,243,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,816 UART: [ldev] --
1,283,139 UART: [fwproc] Wait for Commands...
1,283,737 UART: [fwproc] Recv command 0x46574c44
1,284,465 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,765 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,935 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,208 >>> mbox cmd response: success
2,826,208 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,827,242 UART: [afmc] ++
2,827,410 UART: [afmc] CDI.KEYID = 6
2,827,772 UART: [afmc] SUBJECT.KEYID = 7
2,828,197 UART: [afmc] AUTHORITY.KEYID = 5
2,864,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,857 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,566 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,449 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,150 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,928 UART: [afmc] --
2,907,904 UART: [cold-reset] --
2,908,688 UART: [state] Locking Datavault
2,910,135 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,739 UART: [state] Locking ICCM
2,911,163 UART: [exit] Launching FMC @ 0x40000130
2,916,493 UART:
2,916,509 UART: Running Caliptra FMC ...
2,916,917 UART:
2,917,060 UART: [state] CFI Enabled
2,927,626 UART: [fht] FMC Alias Private Key: 7
3,046,308 UART: [art] Extend RT PCRs Done
3,046,736 UART: [art] Lock RT PCRs Done
3,048,456 UART: [art] Populate DV Done
3,056,907 UART: [fht] FMC Alias Private Key: 7
3,057,863 UART: [art] Derive CDI
3,058,143 UART: [art] Store in slot 0x4
3,143,812 UART: [art] Derive Key Pair
3,144,172 UART: [art] Store priv key in slot 0x5
3,157,688 UART: [art] Derive Key Pair - Done
3,172,448 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,364 UART: [art] PUB.X = 44F04C05D3B9A0BAFD75C6D5EB3F5FDDEFDDAFA1D3098E1EA3C8789B5EC0A8CFCBE2EA857ED9A50946BDDA99E603AD6B
3,196,162 UART: [art] PUB.Y = 3F639414140710608120CD91B3BF030C74F1A88B81995CD73B405A8F35D0B5BF417DBB2AF52FAFD3F8B53A50264274C6
3,203,105 UART: [art] SIG.R = E2DF65EAB23C00E98A75A66CBB79EC1FBE21EC95C811433D12145F97735DEAC828320505E24B321E9C1BEB9F04A69A50
3,209,856 UART: [art] SIG.S = C22A99E2D75C5C8459A36C807E75EE992696964A5379D265EA3B9228093E1966F5689F519CB64A3DB825D7EF00057BDD
3,233,704 UART: Caliptra RT
3,234,047 UART: [state] CFI Enabled
3,353,907 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,470 UART: [rt]cmd =0x49444543, len=327
3,394,823 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,204 ready_for_fw is high
1,061,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,595 >>> mbox cmd response: success
2,679,595 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,742,000 UART:
2,742,016 UART: Running Caliptra FMC ...
2,742,424 UART:
2,742,567 UART: [state] CFI Enabled
2,753,075 UART: [fht] FMC Alias Private Key: 7
2,872,445 UART: [art] Extend RT PCRs Done
2,872,873 UART: [art] Lock RT PCRs Done
2,874,531 UART: [art] Populate DV Done
2,882,450 UART: [fht] FMC Alias Private Key: 7
2,883,446 UART: [art] Derive CDI
2,883,726 UART: [art] Store in slot 0x4
2,969,673 UART: [art] Derive Key Pair
2,970,033 UART: [art] Store priv key in slot 0x5
2,983,587 UART: [art] Derive Key Pair - Done
2,998,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,497 UART: [art] PUB.X = 707FDBFD9F29C526F09DFA454CBD0EBC6A170DEF4277ED546D3F82B6B4783FDBEAEE949B3F6A36263995865224AD6208
3,021,274 UART: [art] PUB.Y = D77F88AC7C6C02DAD8A13A7F0F6829D18C4153554BDED60A1701500389E8E3AD64112AE8F52AE796BB86A97EC9BDBE06
3,028,220 UART: [art] SIG.R = 6EA90618D20E51EC3582BC272A280F9CFA64362F18CC9BDC31AEC79192D850A17B302FF45621201D9F397F0384B1BB97
3,034,982 UART: [art] SIG.S = B678CCC617D4B294BD623067E852F1CB3FBB8C9637AAFB5F0EA424CE817A4F0F1DDFDFB93F7DF185B51AF951BD9AA117
3,058,526 UART: Caliptra RT
3,058,869 UART: [state] CFI Enabled
3,178,476 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,213 UART: [rt]cmd =0x49444543, len=327
3,219,740 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
191,971 UART:
192,375 UART: Running Caliptra ROM ...
193,586 UART:
193,761 UART: [state] CFI Enabled
263,158 UART: [state] LifecycleState = Unprovisioned
265,084 UART: [state] DebugLocked = No
267,465 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,837 UART: [kat] SHA2-256
442,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,051 UART: [kat] ++
453,656 UART: [kat] sha1
464,112 UART: [kat] SHA2-256
466,763 UART: [kat] SHA2-384
471,727 UART: [kat] SHA2-512-ACC
474,100 UART: [kat] ECC-384
2,769,860 UART: [kat] HMAC-384Kdf
2,802,935 UART: [kat] LMS
3,993,305 UART: [kat] --
3,998,807 UART: [cold-reset] ++
4,000,963 UART: [fht] Storing FHT @ 0x50003400
4,012,447 UART: [idev] ++
4,013,091 UART: [idev] CDI.KEYID = 6
4,014,007 UART: [idev] SUBJECT.KEYID = 7
4,015,255 UART: [idev] UDS.KEYID = 0
4,016,313 ready_for_fw is high
4,016,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,165,609 UART: [idev] Erasing UDS.KEYID = 0
7,348,846 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,652 UART: [idev] --
7,373,125 UART: [ldev] ++
7,373,693 UART: [ldev] CDI.KEYID = 6
7,374,708 UART: [ldev] SUBJECT.KEYID = 5
7,375,866 UART: [ldev] AUTHORITY.KEYID = 7
7,377,170 UART: [ldev] FE.KEYID = 1
7,403,814 UART: [ldev] Erasing FE.KEYID = 1
10,736,864 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,416 UART: [ldev] --
13,097,602 UART: [fwproc] Waiting for Commands...
13,100,668 UART: [fwproc] Received command 0x46574c44
13,102,847 UART: [fwproc] Received Image of size 118548 bytes
17,204,881 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,947 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,351,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,679,958 >>> mbox cmd response: success
17,681,020 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,684,736 UART: [afmc] ++
17,685,318 UART: [afmc] CDI.KEYID = 6
17,686,288 UART: [afmc] SUBJECT.KEYID = 7
17,687,502 UART: [afmc] AUTHORITY.KEYID = 5
21,055,581 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,352,921 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,355,188 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,369,640 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,384,337 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,398,802 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,420,673 UART: [afmc] --
23,423,680 UART: [cold-reset] --
23,426,349 UART: [state] Locking Datavault
23,432,189 UART: [state] Locking PCR0, PCR1 and PCR31
23,433,937 UART: [state] Locking ICCM
23,436,733 UART: [exit] Launching FMC @ 0x40000130
23,445,097 UART:
23,445,336 UART: Running Caliptra FMC ...
23,446,438 UART:
23,446,595 UART: [state] CFI Enabled
23,514,003 UART: [fht] FMC Alias Private Key: 7
25,855,215 UART: [art] Extend RT PCRs Done
25,856,455 UART: [art] Lock RT PCRs Done
25,857,920 UART: [art] Populate DV Done
25,863,712 UART: [fht] FMC Alias Private Key: 7
25,865,193 UART: [art] Derive CDI
25,865,954 UART: [art] Store in slot 0x4
25,923,070 UART: [art] Derive Key Pair
25,924,100 UART: [art] Store priv key in slot 0x5
29,216,495 UART: [art] Derive Key Pair - Done
29,229,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,519,138 UART: [art] Erasing AUTHORITY.KEYID = 7
31,520,665 UART: [art] PUB.X = 5E5D4AE524BAAF45086758578CC5BE1DA6DB764FF8FF033A66C0E8B9875E512F7A0A9C0A7CC0EA9703CEF56D6BCD6810
31,527,986 UART: [art] PUB.Y = 39F534223CC2EEDD8690A1346AEFEE665038456388D442205DCE58F20BBA66427F8BD827AA4AA8492104252746189330
31,535,235 UART: [art] SIG.R = F840C889E170DB99574430C22637454950B3CA04C3B185754E8DDC3FADCFA9339CDB59E729227D6CE6A9F8433BD91CAD
31,542,592 UART: [art] SIG.S = 736D8340BE0E1A3C509DC9A380F895C6C942A6C03BA7527F121CDE3A412630593D17FE9C77C62E15FDE146B7B4EE9B70
32,847,874 UART: Caliptra RT
32,848,601 UART: [state] CFI Enabled
33,026,344 UART: [rt] RT listening for mailbox commands...
33,057,654 UART: [rt]cmd =0x4c444556, len=4
33,068,583 >>> mbox cmd response data (687 bytes)
33,109,873 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,139,703 UART: [rt]cmd =0x49444549, len=4
33,142,722 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,782,569 ready_for_fw is high
3,783,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,938,086 >>> mbox cmd response: success
17,939,524 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,628,969 UART:
23,629,368 UART: Running Caliptra FMC ...
23,630,518 UART:
23,630,684 UART: [state] CFI Enabled
23,700,709 UART: [fht] FMC Alias Private Key: 7
26,062,043 UART: [art] Extend RT PCRs Done
26,063,273 UART: [art] Lock RT PCRs Done
26,065,011 UART: [art] Populate DV Done
26,070,226 UART: [fht] FMC Alias Private Key: 7
26,071,693 UART: [art] Derive CDI
26,072,619 UART: [art] Store in slot 0x4
26,130,558 UART: [art] Derive Key Pair
26,131,597 UART: [art] Store priv key in slot 0x5
29,424,364 UART: [art] Derive Key Pair - Done
29,437,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,726,541 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,042 UART: [art] PUB.X = 3712DA6C017BFDCAED6FCDA6C9CF8F15AE676401F1723DCA6EE7383B96E75688853EC8A174B8BD5B87BD810FAEF79CFF
31,735,408 UART: [art] PUB.Y = ECE6791AB47C95BB5840EB4EDF8408BAF33C449E14A385A62B374ECC1E2E1B322EC2AC6EF60DD316E1B3A49BCDA90E6B
31,742,685 UART: [art] SIG.R = 2255F1C01718B0455C0FD53A30D7AA2DE4EB48A1F4B34B39BEF0F5883334F63938EFAE1C2F4E771D1891973CF3BDBE02
31,750,086 UART: [art] SIG.S = 6E203CCE1B9204051758712D0608EE5A3D1E4DC2BF270A4F10A0E818F330F59E7FABE7726DECCAFF01D160EB1477FE62
33,055,453 UART: Caliptra RT
33,056,177 UART: [state] CFI Enabled
33,233,054 UART: [rt] RT listening for mailbox commands...
33,264,261 UART: [rt]cmd =0x4c444556, len=4
33,275,406 >>> mbox cmd response data (687 bytes)
33,316,994 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,346,995 UART: [rt]cmd =0x49444549, len=4
33,349,794 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,515 UART:
192,873 UART: Running Caliptra ROM ...
194,065 UART:
603,684 UART: [state] CFI Enabled
614,228 UART: [state] LifecycleState = Unprovisioned
616,160 UART: [state] DebugLocked = No
617,465 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,533 UART: [kat] SHA2-256
792,251 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
802,839 UART: [kat] ++
803,284 UART: [kat] sha1
815,216 UART: [kat] SHA2-256
817,928 UART: [kat] SHA2-384
824,050 UART: [kat] SHA2-512-ACC
826,421 UART: [kat] ECC-384
3,111,337 UART: [kat] HMAC-384Kdf
3,123,000 UART: [kat] LMS
4,313,089 UART: [kat] --
4,316,580 UART: [cold-reset] ++
4,318,361 UART: [fht] Storing FHT @ 0x50003400
4,328,692 UART: [idev] ++
4,329,259 UART: [idev] CDI.KEYID = 6
4,330,235 UART: [idev] SUBJECT.KEYID = 7
4,331,476 UART: [idev] UDS.KEYID = 0
4,332,459 ready_for_fw is high
4,332,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,484 UART: [idev] Erasing UDS.KEYID = 0
7,619,609 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,744 UART: [idev] --
7,647,389 UART: [ldev] ++
7,648,053 UART: [ldev] CDI.KEYID = 6
7,648,957 UART: [ldev] SUBJECT.KEYID = 5
7,650,166 UART: [ldev] AUTHORITY.KEYID = 7
7,651,391 UART: [ldev] FE.KEYID = 1
7,660,548 UART: [ldev] Erasing FE.KEYID = 1
10,953,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,885 UART: [ldev] --
13,313,816 UART: [fwproc] Waiting for Commands...
13,316,064 UART: [fwproc] Received command 0x46574c44
13,318,242 UART: [fwproc] Received Image of size 118548 bytes
17,419,290 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,700 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,878 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,897,035 >>> mbox cmd response: success
17,897,601 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,901,783 UART: [afmc] ++
17,902,365 UART: [afmc] CDI.KEYID = 6
17,903,447 UART: [afmc] SUBJECT.KEYID = 7
17,904,566 UART: [afmc] AUTHORITY.KEYID = 5
21,217,277 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,511 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,511,764 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,200 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,540,938 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,337 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,318 UART: [afmc] --
23,579,476 UART: [cold-reset] --
23,583,388 UART: [state] Locking Datavault
23,590,720 UART: [state] Locking PCR0, PCR1 and PCR31
23,592,495 UART: [state] Locking ICCM
23,594,863 UART: [exit] Launching FMC @ 0x40000130
23,603,251 UART:
23,603,484 UART: Running Caliptra FMC ...
23,604,577 UART:
23,604,732 UART: [state] CFI Enabled
23,613,203 UART: [fht] FMC Alias Private Key: 7
25,953,218 UART: [art] Extend RT PCRs Done
25,954,440 UART: [art] Lock RT PCRs Done
25,956,223 UART: [art] Populate DV Done
25,961,516 UART: [fht] FMC Alias Private Key: 7
25,963,045 UART: [art] Derive CDI
25,963,858 UART: [art] Store in slot 0x4
26,006,246 UART: [art] Derive Key Pair
26,007,291 UART: [art] Store priv key in slot 0x5
29,249,518 UART: [art] Derive Key Pair - Done
29,262,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,542,738 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,234 UART: [art] PUB.X = 1005FE0F18D7C35A1E180BE4AA6D75D43A5387A5AD09D4CD1ADBDCE374FCF9D5E96283999025AE4F94A00DAA6FDF5629
31,551,531 UART: [art] PUB.Y = 87C323F86F412263CCDB4C87EA749D219B28DBA1443EA0A523FB588AE65FE503B7529EEAB6936229008053451C73963B
31,558,814 UART: [art] SIG.R = 99130CDABD48E2CD5586BE4EB14BA571D42F03825D92D525457911807B776F9FC60B91AF33E08CE2C111712120395689
31,566,145 UART: [art] SIG.S = 1CAA657107BF8D9B35D380FB5DCCBCD074515B5A565336193A584BFF41BBBC2E61523211036F1273F15DCC11C596AA84
32,871,297 UART: Caliptra RT
32,872,016 UART: [state] CFI Enabled
33,004,960 UART: [rt] RT listening for mailbox commands...
33,036,581 UART: [rt]cmd =0x4c444556, len=4
33,047,803 >>> mbox cmd response data (687 bytes)
33,089,442 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,119,428 UART: [rt]cmd =0x49444549, len=4
33,122,161 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,126,407 ready_for_fw is high
4,127,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,775 >>> mbox cmd response: success
18,161,464 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,804,044 UART:
23,804,441 UART: Running Caliptra FMC ...
23,805,603 UART:
23,805,764 UART: [state] CFI Enabled
23,813,629 UART: [fht] FMC Alias Private Key: 7
26,153,754 UART: [art] Extend RT PCRs Done
26,154,981 UART: [art] Lock RT PCRs Done
26,156,905 UART: [art] Populate DV Done
26,162,321 UART: [fht] FMC Alias Private Key: 7
26,163,962 UART: [art] Derive CDI
26,164,693 UART: [art] Store in slot 0x4
26,207,125 UART: [art] Derive Key Pair
26,208,163 UART: [art] Store priv key in slot 0x5
29,450,655 UART: [art] Derive Key Pair - Done
29,463,871 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,169 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,681 UART: [art] PUB.X = 87FB1862B5662F36CFE63A7E3F22FA509E6F7C7AE6C0E17F75810AFE21C0A8AE8BCABB4C09B61C8AA5E5592B4829B05C
31,752,990 UART: [art] PUB.Y = F62FEC952B0833300044946DB9AC02C5A690B267694529654280877A4A430D0330D220B185C5ED6B59ECF4AA4B99909A
31,760,202 UART: [art] SIG.R = 46FDAE2879C3EEF8BD00A5EA91FD31ADF8207472DD813CC020A55EB39F682AC78E702992C267E717A07265FBDED3B26F
31,767,591 UART: [art] SIG.S = 275CB0BE2B0B4B10A4505D6FC071A622672E98F21FC9ED7F750A74AC75639D49E2B7A29F6C63E8BA4891849846B2218C
33,072,970 UART: Caliptra RT
33,073,692 UART: [state] CFI Enabled
33,207,829 UART: [rt] RT listening for mailbox commands...
33,239,227 UART: [rt]cmd =0x4c444556, len=4
33,250,399 >>> mbox cmd response data (687 bytes)
33,292,211 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,322,387 UART: [rt]cmd =0x49444549, len=4
33,325,124 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,019 UART:
192,375 UART: Running Caliptra ROM ...
193,472 UART:
193,609 UART: [state] CFI Enabled
262,746 UART: [state] LifecycleState = Unprovisioned
264,665 UART: [state] DebugLocked = No
266,751 UART: [state] WD Timer not started. Device not locked for debugging
271,356 UART: [kat] SHA2-256
451,004 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,812 UART: [kat] ++
462,347 UART: [kat] sha1
472,658 UART: [kat] SHA2-256
475,301 UART: [kat] SHA2-384
481,280 UART: [kat] SHA2-512-ACC
483,720 UART: [kat] ECC-384
2,947,864 UART: [kat] HMAC-384Kdf
2,969,246 UART: [kat] LMS
3,445,725 UART: [kat] --
3,452,013 UART: [cold-reset] ++
3,453,382 UART: [fht] FHT @ 0x50003400
3,463,665 UART: [idev] ++
3,464,236 UART: [idev] CDI.KEYID = 6
3,465,264 UART: [idev] SUBJECT.KEYID = 7
3,466,440 UART: [idev] UDS.KEYID = 0
3,467,373 ready_for_fw is high
3,467,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,589 UART: [idev] Erasing UDS.KEYID = 0
5,985,555 UART: [idev] Sha1 KeyId Algorithm
6,009,049 UART: [idev] --
6,015,366 UART: [ldev] ++
6,015,993 UART: [ldev] CDI.KEYID = 6
6,016,904 UART: [ldev] SUBJECT.KEYID = 5
6,018,117 UART: [ldev] AUTHORITY.KEYID = 7
6,019,351 UART: [ldev] FE.KEYID = 1
6,056,945 UART: [ldev] Erasing FE.KEYID = 1
8,564,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,993 UART: [ldev] --
10,373,549 UART: [fwproc] Wait for Commands...
10,376,715 UART: [fwproc] Recv command 0x46574c44
10,378,743 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,762 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,773 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,688 >>> mbox cmd response: success
14,345,673 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,348,226 UART: [afmc] ++
14,348,805 UART: [afmc] CDI.KEYID = 6
14,349,825 UART: [afmc] SUBJECT.KEYID = 7
14,351,008 UART: [afmc] AUTHORITY.KEYID = 5
16,895,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,007 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,098 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,653 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,034 UART: [afmc] --
18,715,893 UART: [cold-reset] --
18,720,568 UART: [state] Locking Datavault
18,725,540 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,289 UART: [state] Locking ICCM
18,729,187 UART: [exit] Launching FMC @ 0x40000130
18,737,579 UART:
18,737,806 UART: Running Caliptra FMC ...
18,738,900 UART:
18,739,076 UART: [state] CFI Enabled
18,796,175 UART: [fht] FMC Alias Private Key: 7
20,562,842 UART: [art] Extend RT PCRs Done
20,564,053 UART: [art] Lock RT PCRs Done
20,565,359 UART: [art] Populate DV Done
20,570,715 UART: [fht] FMC Alias Private Key: 7
20,572,361 UART: [art] Derive CDI
20,573,172 UART: [art] Store in slot 0x4
20,628,937 UART: [art] Derive Key Pair
20,629,969 UART: [art] Store priv key in slot 0x5
23,092,567 UART: [art] Derive Key Pair - Done
23,105,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,816 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,329 UART: [art] PUB.X = 727A5C4517D619D9DFE352AF6F46452195B3E4C875DEE3D17698E32E114D134F25E48B3B0CE95BF1740827C5D645D187
24,827,586 UART: [art] PUB.Y = DFCF27AAD0C3FBD23BCA9DAD8A75B42C23EAC006F361B03109EC8B6E9E9AF3259B705929228E8201FB96A607C6EAF210
24,834,870 UART: [art] SIG.R = 9B33F1647C62295D03C4D8A28AF40321C29374C1495878856FAD0044B6CB081754A6C67A47A2D599FF30A282E5912B58
24,842,223 UART: [art] SIG.S = 054A143E70E34868B3117FA32C09B226F8E97684BD7D3B5D49D4BDA34897C59EC6FAE34E6E73A69B6A584FA7DC8F9641
25,820,920 UART: Caliptra RT
25,821,617 UART: [state] CFI Enabled
26,014,503 UART: [rt] RT listening for mailbox commands...
26,045,838 UART: [rt]cmd =0x4c444556, len=4
26,056,871 >>> mbox cmd response data (687 bytes)
26,097,655 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,127,756 UART: [rt]cmd =0x49444549, len=4
26,130,496 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,059 writing to cptra_bootfsm_go
3,461,159 ready_for_fw is high
3,461,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,221,744 >>> mbox cmd response: success
14,223,080 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,518,184 UART:
18,518,562 UART: Running Caliptra FMC ...
18,519,696 UART:
18,519,847 UART: [state] CFI Enabled
18,585,368 UART: [fht] FMC Alias Private Key: 7
20,351,784 UART: [art] Extend RT PCRs Done
20,352,982 UART: [art] Lock RT PCRs Done
20,354,724 UART: [art] Populate DV Done
20,360,094 UART: [fht] FMC Alias Private Key: 7
20,361,687 UART: [art] Derive CDI
20,362,499 UART: [art] Store in slot 0x4
20,418,325 UART: [art] Derive Key Pair
20,419,366 UART: [art] Store priv key in slot 0x5
22,882,301 UART: [art] Derive Key Pair - Done
22,895,470 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,608,117 UART: [art] Erasing AUTHORITY.KEYID = 7
24,609,609 UART: [art] PUB.X = 32732BE2FCFCF85694BB600DA83411F8AABB2F90EFFB65DEDF112A33B2C6B0572756CFE233DE5499CD3AC428F5439497
24,616,865 UART: [art] PUB.Y = 19878B8FAD7134A2E94234C9E10C0EF345020C25D4171BAB82436969BECBC8939853F8583B2F47EC573BD29E7CC62AD6
24,624,170 UART: [art] SIG.R = 29BA2E4C9E12547C177DAF947964C169F3AFA544C824C424EDE32A4683A76EB916185A215DA29EA2ABA52FB348289FBB
24,631,561 UART: [art] SIG.S = 8D5ED2934D7CDBF5540FA3505BD9F0382368D561270AE0D047A406397C6D5F10C5260F5F31BD9FE246FA3FD28EDA4E36
25,610,041 UART: Caliptra RT
25,610,763 UART: [state] CFI Enabled
25,793,107 UART: [rt] RT listening for mailbox commands...
25,824,437 UART: [rt]cmd =0x4c444556, len=4
25,835,405 >>> mbox cmd response data (687 bytes)
25,876,705 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,906,538 UART: [rt]cmd =0x49444549, len=4
25,909,174 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,536 UART:
192,903 UART: Running Caliptra ROM ...
194,087 UART:
603,694 UART: [state] CFI Enabled
617,704 UART: [state] LifecycleState = Unprovisioned
619,656 UART: [state] DebugLocked = No
622,180 UART: [state] WD Timer not started. Device not locked for debugging
625,156 UART: [kat] SHA2-256
804,823 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,630 UART: [kat] ++
816,078 UART: [kat] sha1
827,386 UART: [kat] SHA2-256
830,108 UART: [kat] SHA2-384
835,528 UART: [kat] SHA2-512-ACC
837,896 UART: [kat] ECC-384
3,280,813 UART: [kat] HMAC-384Kdf
3,293,616 UART: [kat] LMS
3,770,153 UART: [kat] --
3,774,928 UART: [cold-reset] ++
3,776,431 UART: [fht] FHT @ 0x50003400
3,786,629 UART: [idev] ++
3,787,264 UART: [idev] CDI.KEYID = 6
3,788,147 UART: [idev] SUBJECT.KEYID = 7
3,789,390 UART: [idev] UDS.KEYID = 0
3,790,406 ready_for_fw is high
3,790,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,518 UART: [idev] Erasing UDS.KEYID = 0
6,265,043 UART: [idev] Sha1 KeyId Algorithm
6,288,167 UART: [idev] --
6,292,650 UART: [ldev] ++
6,293,274 UART: [ldev] CDI.KEYID = 6
6,294,156 UART: [ldev] SUBJECT.KEYID = 5
6,295,369 UART: [ldev] AUTHORITY.KEYID = 7
6,296,678 UART: [ldev] FE.KEYID = 1
6,307,044 UART: [ldev] Erasing FE.KEYID = 1
8,789,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,187 UART: [ldev] --
10,581,754 UART: [fwproc] Wait for Commands...
10,584,063 UART: [fwproc] Recv command 0x46574c44
10,586,062 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,657 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,675 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,275 >>> mbox cmd response: success
14,549,810 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,553,036 UART: [afmc] ++
14,553,622 UART: [afmc] CDI.KEYID = 6
14,554,558 UART: [afmc] SUBJECT.KEYID = 7
14,555,772 UART: [afmc] AUTHORITY.KEYID = 5
17,060,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,567 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,800,388 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,463 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,051 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,984 UART: [afmc] --
18,859,629 UART: [cold-reset] --
18,863,117 UART: [state] Locking Datavault
18,867,537 UART: [state] Locking PCR0, PCR1 and PCR31
18,869,253 UART: [state] Locking ICCM
18,870,595 UART: [exit] Launching FMC @ 0x40000130
18,879,010 UART:
18,879,253 UART: Running Caliptra FMC ...
18,880,356 UART:
18,880,513 UART: [state] CFI Enabled
18,888,451 UART: [fht] FMC Alias Private Key: 7
20,654,605 UART: [art] Extend RT PCRs Done
20,655,812 UART: [art] Lock RT PCRs Done
20,657,626 UART: [art] Populate DV Done
20,662,764 UART: [fht] FMC Alias Private Key: 7
20,664,410 UART: [art] Derive CDI
20,665,149 UART: [art] Store in slot 0x4
20,707,744 UART: [art] Derive Key Pair
20,708,785 UART: [art] Store priv key in slot 0x5
23,135,867 UART: [art] Derive Key Pair - Done
23,149,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,855,688 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,211 UART: [art] PUB.X = DB9CEDA44CC8B7DBEB92BE49A76C18B907E47A2D19E5BCBB8AF877EF87F2E832D25672458B8F54F3004B94D276C174E0
24,864,525 UART: [art] PUB.Y = EB0F6A284C1167A1A8DA1D5336E1C1B1D8638CDCD14D6B9BAA685C8AC5518B291A7ED8AA3126A481A6252AF113EF2213
24,871,765 UART: [art] SIG.R = 578F5FEC31B1673C7A902E4185FCA13E75BE5DE8252A9CEC84B54E1FD9AFA2D10A1AD440343C1C1AB88EE99DF29612D7
24,879,151 UART: [art] SIG.S = B8E76D406E18851D255A080D6A9D714359C0FAC1133784FCF47DE191220C020DFE3CB6F250AC9A761C571462E9D754BC
25,857,800 UART: Caliptra RT
25,858,511 UART: [state] CFI Enabled
25,991,792 UART: [rt] RT listening for mailbox commands...
26,023,099 UART: [rt]cmd =0x4c444556, len=4
26,034,306 >>> mbox cmd response data (687 bytes)
26,075,313 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,105,318 UART: [rt]cmd =0x49444549, len=4
26,107,912 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,169 writing to cptra_bootfsm_go
3,781,364 ready_for_fw is high
3,781,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,441,712 >>> mbox cmd response: success
14,442,467 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,683,199 UART:
18,683,582 UART: Running Caliptra FMC ...
18,684,689 UART:
18,684,848 UART: [state] CFI Enabled
18,693,027 UART: [fht] FMC Alias Private Key: 7
20,459,067 UART: [art] Extend RT PCRs Done
20,460,291 UART: [art] Lock RT PCRs Done
20,462,107 UART: [art] Populate DV Done
20,467,529 UART: [fht] FMC Alias Private Key: 7
20,469,181 UART: [art] Derive CDI
20,469,999 UART: [art] Store in slot 0x4
20,513,156 UART: [art] Derive Key Pair
20,514,196 UART: [art] Store priv key in slot 0x5
22,940,447 UART: [art] Derive Key Pair - Done
22,953,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,659,704 UART: [art] Erasing AUTHORITY.KEYID = 7
24,661,211 UART: [art] PUB.X = 27D232C45C21C83126AC6DB23D3578C361DA891B11E2061B17212AA78E4CD5CB784C09CD9CDD5403BE665992ABE6C1FD
24,668,472 UART: [art] PUB.Y = 4D9294C855C8CFB8AC29A6790538AC962274E91040D0945421D4E6AA33D1315F682686DF537F6DC0AECA666848A9D184
24,675,689 UART: [art] SIG.R = 84C86844265CAFEB8063B4F2FEF570F5EC6AB6AC121FEDC7D3B4D06C1EB3AB909C040DD3AAE8EC7584B0C2318FE84A62
24,683,145 UART: [art] SIG.S = 3766C2FAA196A0727FFEB53C5EDCCFBCCAE13CCAC42F1C198F1DE09AB264DAE809D0C13FC088DF46102D719E4A38892B
25,661,878 UART: Caliptra RT
25,662,573 UART: [state] CFI Enabled
25,795,851 UART: [rt] RT listening for mailbox commands...
25,827,155 UART: [rt]cmd =0x4c444556, len=4
25,838,239 >>> mbox cmd response data (687 bytes)
25,879,272 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,909,083 UART: [rt]cmd =0x49444549, len=4
25,911,836 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
191,969 UART:
192,324 UART: Running Caliptra ROM ...
193,457 UART:
193,604 UART: [state] CFI Enabled
263,935 UART: [state] LifecycleState = Unprovisioned
266,055 UART: [state] DebugLocked = No
268,318 UART: [state] WD Timer not started. Device not locked for debugging
272,656 UART: [kat] SHA2-256
462,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,333 UART: [kat] ++
473,808 UART: [kat] sha1
483,969 UART: [kat] SHA2-256
486,977 UART: [kat] SHA2-384
491,972 UART: [kat] SHA2-512-ACC
494,615 UART: [kat] ECC-384
2,947,486 UART: [kat] HMAC-384Kdf
2,972,223 UART: [kat] LMS
3,503,966 UART: [kat] --
3,508,391 UART: [cold-reset] ++
3,509,393 UART: [fht] FHT @ 0x50003400
3,520,078 UART: [idev] ++
3,520,713 UART: [idev] CDI.KEYID = 6
3,521,737 UART: [idev] SUBJECT.KEYID = 7
3,522,931 UART: [idev] UDS.KEYID = 0
3,523,852 ready_for_fw is high
3,524,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,106 UART: [idev] Erasing UDS.KEYID = 0
6,028,771 UART: [idev] Sha1 KeyId Algorithm
6,050,060 UART: [idev] --
6,054,686 UART: [ldev] ++
6,055,375 UART: [ldev] CDI.KEYID = 6
6,056,282 UART: [ldev] SUBJECT.KEYID = 5
6,057,491 UART: [ldev] AUTHORITY.KEYID = 7
6,058,723 UART: [ldev] FE.KEYID = 1
6,099,461 UART: [ldev] Erasing FE.KEYID = 1
8,605,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,876 UART: [ldev] --
10,413,240 UART: [fwproc] Wait for Commands...
10,416,192 UART: [fwproc] Recv command 0x46574c44
10,418,494 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,318 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,920 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,007 >>> mbox cmd response: success
14,674,020 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,677,789 UART: [afmc] ++
14,678,492 UART: [afmc] CDI.KEYID = 6
14,679,677 UART: [afmc] SUBJECT.KEYID = 7
14,681,156 UART: [afmc] AUTHORITY.KEYID = 5
17,215,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,987 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,095 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,250 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,129 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,496 UART: [afmc] --
19,013,186 UART: [cold-reset] --
19,017,435 UART: [state] Locking Datavault
19,022,952 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,139 UART: [state] Locking ICCM
19,028,151 UART: [exit] Launching FMC @ 0x40000130
19,036,814 UART:
19,037,049 UART: Running Caliptra FMC ...
19,038,152 UART:
19,038,311 UART: [state] CFI Enabled
19,094,784 UART: [fht] FMC Alias Private Key: 7
20,861,748 UART: [art] Extend RT PCRs Done
20,862,986 UART: [art] Lock RT PCRs Done
20,864,207 UART: [art] Populate DV Done
20,869,400 UART: [fht] FMC Alias Private Key: 7
20,870,988 UART: [art] Derive CDI
20,871,794 UART: [art] Store in slot 0x4
20,928,050 UART: [art] Derive Key Pair
20,929,094 UART: [art] Store priv key in slot 0x5
23,391,762 UART: [art] Derive Key Pair - Done
23,404,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,554 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,052 UART: [art] PUB.X = 24B8140FCCC61D7883E9C3D39BBE917FEB851B202603C5F66AB5ED2CAC53B6E3ED1A871C166FEA926BDB9285B65A23A8
25,126,387 UART: [art] PUB.Y = D0471574B5848008E436D8720574698852C40BF9D089343843BC605FBE662F62EC04BD9647CE5FE08C92F191C42134D0
25,133,587 UART: [art] SIG.R = B09DECBC831EAD1D02B1D1DDBD555E8519E7A32B4213F1D2E89C4CF7CA792981DE9F8E932E31B6B7A2C500AF70276298
25,140,998 UART: [art] SIG.S = F82FBFDCC6A9D138EA4FCE084882BB5445ABC6E2DFED127B2D3B7001454A89587DCAA74D5B4512C46653F683CF576079
26,119,995 UART: Caliptra RT
26,120,703 UART: [state] CFI Enabled
26,300,468 UART: [rt] RT listening for mailbox commands...
26,331,914 UART: [rt]cmd =0x4c444556, len=4
26,342,898 >>> mbox cmd response data (687 bytes)
26,383,718 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,413,716 UART: [rt]cmd =0x49444549, len=4
26,416,630 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,438,952 ready_for_fw is high
3,439,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,839,257 >>> mbox cmd response: success
14,840,743 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,128,949 UART:
19,129,342 UART: Running Caliptra FMC ...
19,130,500 UART:
19,130,657 UART: [state] CFI Enabled
19,194,544 UART: [fht] FMC Alias Private Key: 7
20,960,941 UART: [art] Extend RT PCRs Done
20,962,172 UART: [art] Lock RT PCRs Done
20,963,502 UART: [art] Populate DV Done
20,968,867 UART: [fht] FMC Alias Private Key: 7
20,970,460 UART: [art] Derive CDI
20,971,270 UART: [art] Store in slot 0x4
21,027,317 UART: [art] Derive Key Pair
21,028,368 UART: [art] Store priv key in slot 0x5
23,491,238 UART: [art] Derive Key Pair - Done
23,504,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,610 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,123 UART: [art] PUB.X = 13DE38600B58A447F8DBA75A0A79EC6BD4E11720224D28ABA7AD875995609D22FAE5226AD94B688A127367E05A5E256C
25,226,382 UART: [art] PUB.Y = C5DB646ED2AFA78D427E745CE0D1293C76D9B7BF47065D947681F5B1FA6682C445C5D519D55D201D413806E038CA8FA6
25,233,621 UART: [art] SIG.R = 926114FADF9D94D2F8881E02723582FF400500A1B42B5C460BECE06759201780974A7790E1F1921B4B7BA4E78AFC5FF8
25,241,037 UART: [art] SIG.S = 8A99A325075958BDB395AFD318D9B42DB4F8A9777AB4D634FDBBDD488D5DA41922EFC3E59F305132DD9E6866838DC618
26,219,811 UART: Caliptra RT
26,220,506 UART: [state] CFI Enabled
26,401,688 UART: [rt] RT listening for mailbox commands...
26,433,327 UART: [rt]cmd =0x4c444556, len=4
26,444,554 >>> mbox cmd response data (687 bytes)
26,485,146 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,515,009 UART: [rt]cmd =0x49444549, len=4
26,517,859 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
192,567 UART:
192,922 UART: Running Caliptra ROM ...
194,122 UART:
603,718 UART: [state] CFI Enabled
616,052 UART: [state] LifecycleState = Unprovisioned
618,359 UART: [state] DebugLocked = No
620,377 UART: [state] WD Timer not started. Device not locked for debugging
624,169 UART: [kat] SHA2-256
814,057 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,873 UART: [kat] ++
825,393 UART: [kat] sha1
836,285 UART: [kat] SHA2-256
839,301 UART: [kat] SHA2-384
845,368 UART: [kat] SHA2-512-ACC
847,955 UART: [kat] ECC-384
3,287,882 UART: [kat] HMAC-384Kdf
3,300,189 UART: [kat] LMS
3,832,053 UART: [kat] --
3,836,263 UART: [cold-reset] ++
3,837,708 UART: [fht] FHT @ 0x50003400
3,848,827 UART: [idev] ++
3,849,533 UART: [idev] CDI.KEYID = 6
3,850,449 UART: [idev] SUBJECT.KEYID = 7
3,851,626 UART: [idev] UDS.KEYID = 0
3,852,551 ready_for_fw is high
3,852,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,001,611 UART: [idev] Erasing UDS.KEYID = 0
6,333,993 UART: [idev] Sha1 KeyId Algorithm
6,356,418 UART: [idev] --
6,361,175 UART: [ldev] ++
6,361,852 UART: [ldev] CDI.KEYID = 6
6,362,768 UART: [ldev] SUBJECT.KEYID = 5
6,363,929 UART: [ldev] AUTHORITY.KEYID = 7
6,365,164 UART: [ldev] FE.KEYID = 1
6,375,109 UART: [ldev] Erasing FE.KEYID = 1
8,856,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,684 UART: [ldev] --
10,651,248 UART: [fwproc] Wait for Commands...
10,654,159 UART: [fwproc] Recv command 0x46574c44
10,656,489 UART: [fwproc] Recv'd Img size: 118548 bytes
14,155,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,410 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,015 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,624 >>> mbox cmd response: success
14,918,618 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,922,374 UART: [afmc] ++
14,923,078 UART: [afmc] CDI.KEYID = 6
14,924,251 UART: [afmc] SUBJECT.KEYID = 7
14,925,749 UART: [afmc] AUTHORITY.KEYID = 5
17,429,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,153,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,155,828 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,170,924 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,186,106 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,200,973 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,224,648 UART: [afmc] --
19,227,330 UART: [cold-reset] --
19,230,926 UART: [state] Locking Datavault
19,235,863 UART: [state] Locking PCR0, PCR1 and PCR31
19,238,006 UART: [state] Locking ICCM
19,239,983 UART: [exit] Launching FMC @ 0x40000130
19,248,605 UART:
19,248,840 UART: Running Caliptra FMC ...
19,249,871 UART:
19,250,020 UART: [state] CFI Enabled
19,258,258 UART: [fht] FMC Alias Private Key: 7
21,024,356 UART: [art] Extend RT PCRs Done
21,025,594 UART: [art] Lock RT PCRs Done
21,027,470 UART: [art] Populate DV Done
21,032,733 UART: [fht] FMC Alias Private Key: 7
21,034,230 UART: [art] Derive CDI
21,035,020 UART: [art] Store in slot 0x4
21,078,103 UART: [art] Derive Key Pair
21,079,108 UART: [art] Store priv key in slot 0x5
23,506,066 UART: [art] Derive Key Pair - Done
23,519,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,744 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,259 UART: [art] PUB.X = 8E423605C75E2108EB244819CCB38668B2A1056D87DBD63EF334F07B185FC2D05047E2C6A454980564CE25D4A53D5E84
25,234,532 UART: [art] PUB.Y = CF0BBA00DDFE0D8FAF9E63B97D16CA8A9E0CF5251D912190BEDA4CC330C87D6F7C2BF0448DFE49F843A2D8C2AA6A0023
25,241,778 UART: [art] SIG.R = 7671CA2B5297D7991C6E2A28F3CE99A89527B60170385ED950E01C2A59EE751C9F57198E6A35D85B54BB4CE139FFA8BF
25,249,198 UART: [art] SIG.S = AE774640E0593F9E06288409BB1D7189D4CE99964D98151F602157061739B72F6E4D7204A3C195D322DF8CC05C23949E
26,228,093 UART: Caliptra RT
26,228,790 UART: [state] CFI Enabled
26,361,344 UART: [rt] RT listening for mailbox commands...
26,392,721 UART: [rt]cmd =0x4c444556, len=4
26,403,773 >>> mbox cmd response data (687 bytes)
26,445,929 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,475,960 UART: [rt]cmd =0x49444549, len=4
26,478,530 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,757,653 ready_for_fw is high
3,758,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,048,151 >>> mbox cmd response: success
15,049,556 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,299,764 UART:
19,300,164 UART: Running Caliptra FMC ...
19,301,326 UART:
19,301,492 UART: [state] CFI Enabled
19,309,297 UART: [fht] FMC Alias Private Key: 7
21,076,050 UART: [art] Extend RT PCRs Done
21,077,290 UART: [art] Lock RT PCRs Done
21,079,151 UART: [art] Populate DV Done
21,084,476 UART: [fht] FMC Alias Private Key: 7
21,086,027 UART: [art] Derive CDI
21,086,852 UART: [art] Store in slot 0x4
21,129,786 UART: [art] Derive Key Pair
21,130,832 UART: [art] Store priv key in slot 0x5
23,557,324 UART: [art] Derive Key Pair - Done
23,570,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,319 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,830 UART: [art] PUB.X = 27386CFA3910FF182D4D4BEBEFE0377A03C5051669CE0D21696FE1A909D9FF4859A209732C52AEC418F82D6C9F477C9D
25,285,081 UART: [art] PUB.Y = 64471F1334E71F5724D423D14F567058090097C266CFF643658CFBD86D7B01886D2EF656E0CBAA9912BDF4DCE296B961
25,292,339 UART: [art] SIG.R = 3FC4C95D57B2489E2DE84F239FFBCF63861FB023E34BF3F0AD2C43F41E802F27A7ACCAB81EAD99AF03AE18795ABC0B33
25,299,741 UART: [art] SIG.S = 4FC85E134998221D507894CB83F79405E95608674CFECEE4E600B11481E2BC1123DE3F22FA53948E6B570B89B192F5A9
26,278,988 UART: Caliptra RT
26,279,721 UART: [state] CFI Enabled
26,412,432 UART: [rt] RT listening for mailbox commands...
26,443,952 UART: [rt]cmd =0x4c444556, len=4
26,455,042 >>> mbox cmd response data (687 bytes)
26,497,379 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,527,439 UART: [rt]cmd =0x49444549, len=4
26,530,090 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,951 UART: [kat] SHA2-256
881,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,997 UART: [kat] ++
886,149 UART: [kat] sha1
890,311 UART: [kat] SHA2-256
892,249 UART: [kat] SHA2-384
895,032 UART: [kat] SHA2-512-ACC
896,933 UART: [kat] ECC-384
902,400 UART: [kat] HMAC-384Kdf
907,068 UART: [kat] LMS
1,475,264 UART: [kat] --
1,475,951 UART: [cold-reset] ++
1,476,417 UART: [fht] Storing FHT @ 0x50003400
1,479,168 UART: [idev] ++
1,479,336 UART: [idev] CDI.KEYID = 6
1,479,696 UART: [idev] SUBJECT.KEYID = 7
1,480,120 UART: [idev] UDS.KEYID = 0
1,480,465 ready_for_fw is high
1,480,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,084 UART: [idev] Erasing UDS.KEYID = 0
1,505,114 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,656 UART: [idev] --
1,514,597 UART: [ldev] ++
1,514,765 UART: [ldev] CDI.KEYID = 6
1,515,128 UART: [ldev] SUBJECT.KEYID = 5
1,515,554 UART: [ldev] AUTHORITY.KEYID = 7
1,516,017 UART: [ldev] FE.KEYID = 1
1,521,391 UART: [ldev] Erasing FE.KEYID = 1
1,546,590 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,630 UART: [ldev] --
1,586,027 UART: [fwproc] Waiting for Commands...
1,586,738 UART: [fwproc] Received command 0x46574c44
1,587,529 UART: [fwproc] Received Image of size 118548 bytes
2,933,229 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,833 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,051 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,306 >>> mbox cmd response: success
3,132,306 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,133,424 UART: [afmc] ++
3,133,592 UART: [afmc] CDI.KEYID = 6
3,133,954 UART: [afmc] SUBJECT.KEYID = 7
3,134,379 UART: [afmc] AUTHORITY.KEYID = 5
3,169,478 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,894 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,674 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,383 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,266 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,949 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,685 UART: [afmc] --
3,212,781 UART: [cold-reset] --
3,213,489 UART: [state] Locking Datavault
3,214,798 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,402 UART: [state] Locking ICCM
3,215,950 UART: [exit] Launching FMC @ 0x40000130
3,221,280 UART:
3,221,296 UART: Running Caliptra FMC ...
3,221,704 UART:
3,221,758 UART: [state] CFI Enabled
3,232,096 UART: [fht] FMC Alias Private Key: 7
3,350,760 UART: [art] Extend RT PCRs Done
3,351,188 UART: [art] Lock RT PCRs Done
3,352,606 UART: [art] Populate DV Done
3,360,931 UART: [fht] FMC Alias Private Key: 7
3,361,883 UART: [art] Derive CDI
3,362,163 UART: [art] Store in slot 0x4
3,447,833 UART: [art] Derive Key Pair
3,448,193 UART: [art] Store priv key in slot 0x5
3,460,968 UART: [art] Derive Key Pair - Done
3,475,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,787 UART: [art] PUB.X = FB08DD345A4756B4676FFB7D41B96EC8A18820180DF2C734B278EE5E436D34FCF24A791512D6F57AC50B3A77D3F1A9EC
3,498,560 UART: [art] PUB.Y = EC415EEAB41973717D3767182C31DFA00BD0E6043C5ECFE8BD48004D4F1406E680B2B26ED21A246D5FB9C37B5EFD0E6B
3,505,492 UART: [art] SIG.R = 55818AAFF7EA9C8593938EAD8E0A3842D95ABD5DB0855FA69B478890316512D57A0D44D19F5C421F7ABA547C35A01305
3,512,257 UART: [art] SIG.S = 4FB3834E1CCB6F5A7E2E4F466F142796D432687570587A8D48D4BEFFCF6A7F69198312631440B124206EACC9FAA599FD
3,535,525 UART: Caliptra RT
3,535,776 UART: [state] CFI Enabled
3,655,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,265 UART: [rt]cmd =0x4c444556, len=4
3,696,725 >>> mbox cmd response data (687 bytes)
3,696,726 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,095 UART: [rt]cmd =0x49444549, len=4
3,728,614 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,199 ready_for_fw is high
1,362,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,084 >>> mbox cmd response: success
2,980,084 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,041,437 UART:
3,041,453 UART: Running Caliptra FMC ...
3,041,861 UART:
3,041,915 UART: [state] CFI Enabled
3,052,849 UART: [fht] FMC Alias Private Key: 7
3,172,269 UART: [art] Extend RT PCRs Done
3,172,697 UART: [art] Lock RT PCRs Done
3,174,291 UART: [art] Populate DV Done
3,182,438 UART: [fht] FMC Alias Private Key: 7
3,183,380 UART: [art] Derive CDI
3,183,660 UART: [art] Store in slot 0x4
3,269,572 UART: [art] Derive Key Pair
3,269,932 UART: [art] Store priv key in slot 0x5
3,283,117 UART: [art] Derive Key Pair - Done
3,297,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,492 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,257 UART: [art] PUB.X = FEE4BD4631068280C5BB2162644533043DE22C74E3F1E445E2E1DA91EE1D4FE674CAAD2FF1853FB4B92479DAFC960643
3,321,028 UART: [art] PUB.Y = A61091D6A743BD22E6946539CD0C6F116E79075FAB813043096EDEC193E7D967646A1E291B40B419432300E1C644CB76
3,327,941 UART: [art] SIG.R = C6C56CE49CBEA9FED9B48550AF54C3554B3E43A6EC3F427CAC8A2254FD889D12FC703917BF69801D69BCE7A3027C35C1
3,334,724 UART: [art] SIG.S = 8CFF96BAD3E7A9FD822845B64A52635370F87009EE2EC6DF900BC9A951C84E23B1D3074426075DFEA247BD14BAEAEEFF
3,358,566 UART: Caliptra RT
3,358,817 UART: [state] CFI Enabled
3,478,144 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,814 UART: [rt]cmd =0x4c444556, len=4
3,519,298 >>> mbox cmd response data (687 bytes)
3,519,299 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,776 UART: [rt]cmd =0x49444549, len=4
3,551,035 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,218 UART: [kat] SHA2-256
882,149 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,264 UART: [kat] ++
886,416 UART: [kat] sha1
890,628 UART: [kat] SHA2-256
892,566 UART: [kat] SHA2-384
895,191 UART: [kat] SHA2-512-ACC
897,092 UART: [kat] ECC-384
902,471 UART: [kat] HMAC-384Kdf
906,991 UART: [kat] LMS
1,475,187 UART: [kat] --
1,476,362 UART: [cold-reset] ++
1,476,928 UART: [fht] Storing FHT @ 0x50003400
1,479,659 UART: [idev] ++
1,479,827 UART: [idev] CDI.KEYID = 6
1,480,187 UART: [idev] SUBJECT.KEYID = 7
1,480,611 UART: [idev] UDS.KEYID = 0
1,480,956 ready_for_fw is high
1,480,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,719 UART: [idev] Erasing UDS.KEYID = 0
1,505,171 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,741 UART: [idev] --
1,514,756 UART: [ldev] ++
1,514,924 UART: [ldev] CDI.KEYID = 6
1,515,287 UART: [ldev] SUBJECT.KEYID = 5
1,515,713 UART: [ldev] AUTHORITY.KEYID = 7
1,516,176 UART: [ldev] FE.KEYID = 1
1,521,270 UART: [ldev] Erasing FE.KEYID = 1
1,546,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,943 UART: [ldev] --
1,586,342 UART: [fwproc] Waiting for Commands...
1,587,191 UART: [fwproc] Received command 0x46574c44
1,587,982 UART: [fwproc] Received Image of size 118548 bytes
2,932,914 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,258 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,476 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,713 >>> mbox cmd response: success
3,131,713 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,132,889 UART: [afmc] ++
3,133,057 UART: [afmc] CDI.KEYID = 6
3,133,419 UART: [afmc] SUBJECT.KEYID = 7
3,133,844 UART: [afmc] AUTHORITY.KEYID = 5
3,168,993 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,779 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,559 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,268 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,151 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,834 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,780 UART: [afmc] --
3,211,842 UART: [cold-reset] --
3,212,530 UART: [state] Locking Datavault
3,213,771 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,375 UART: [state] Locking ICCM
3,214,877 UART: [exit] Launching FMC @ 0x40000130
3,220,207 UART:
3,220,223 UART: Running Caliptra FMC ...
3,220,631 UART:
3,220,774 UART: [state] CFI Enabled
3,231,372 UART: [fht] FMC Alias Private Key: 7
3,350,116 UART: [art] Extend RT PCRs Done
3,350,544 UART: [art] Lock RT PCRs Done
3,352,142 UART: [art] Populate DV Done
3,360,297 UART: [fht] FMC Alias Private Key: 7
3,361,397 UART: [art] Derive CDI
3,361,677 UART: [art] Store in slot 0x4
3,447,313 UART: [art] Derive Key Pair
3,447,673 UART: [art] Store priv key in slot 0x5
3,460,792 UART: [art] Derive Key Pair - Done
3,475,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,009 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,774 UART: [art] PUB.X = 8B275253CFBFAA51B5133BEDAB6167A1BCED5A25E254D404770B64E216668EA5C383182BAB3C41E03130F82785EEE615
3,498,546 UART: [art] PUB.Y = C0EE90C9F4CC2504D06DD9EC34F921B93E99D144DF0810C73466FD9E40A5BA37A1FAEB31CACBC5BE7C6EACA2DEEA518F
3,505,522 UART: [art] SIG.R = 00D70A14CB1FFAD7689ABE720942B2F1F5B8AA164596049B43AD15221E4975FFC0CBB0F08CD3CC22B49638397CC547EF
3,512,273 UART: [art] SIG.S = 620CD3D86B5D6DA6B9DBE6BD12E2B9543F9D503176852A4E1281C533F48E8D7F3C2ABDA72C306ECDAE24225B86A423C2
3,535,924 UART: Caliptra RT
3,536,267 UART: [state] CFI Enabled
3,656,709 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,451 UART: [rt]cmd =0x4c444556, len=4
3,697,793 >>> mbox cmd response data (687 bytes)
3,697,794 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,125 UART: [rt]cmd =0x49444549, len=4
3,729,412 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,688 ready_for_fw is high
1,362,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,069 >>> mbox cmd response: success
2,981,069 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,042,188 UART:
3,042,204 UART: Running Caliptra FMC ...
3,042,612 UART:
3,042,755 UART: [state] CFI Enabled
3,053,411 UART: [fht] FMC Alias Private Key: 7
3,172,851 UART: [art] Extend RT PCRs Done
3,173,279 UART: [art] Lock RT PCRs Done
3,174,533 UART: [art] Populate DV Done
3,182,676 UART: [fht] FMC Alias Private Key: 7
3,183,806 UART: [art] Derive CDI
3,184,086 UART: [art] Store in slot 0x4
3,269,910 UART: [art] Derive Key Pair
3,270,270 UART: [art] Store priv key in slot 0x5
3,282,781 UART: [art] Derive Key Pair - Done
3,297,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,363 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,128 UART: [art] PUB.X = 356706B790C98115E301B37B2D765A66F23A7A8790FD93CA799388D2FDA1BC0D5B24E68148852873119ABFBAECD073A1
3,320,891 UART: [art] PUB.Y = 82A484EFDBB9F810BF362F5260F98B02E6998FC5682117410B2792B0858F8628C90E60B88F09F9876A40E794A7DA8C33
3,327,825 UART: [art] SIG.R = 673B21E0BB07D9FB6F478FC8E97217F52EF56ED6DB46EE4B3F5BEFAC068B4F07AD99CF888F9B2D451F1CE9A67F14B1B4
3,334,610 UART: [art] SIG.S = 7627790A11F0BB219E494013CD6BB55517E0FE708467B557B6F5E9EA05469BC60706F28464679FACE15566147905B2AF
3,358,327 UART: Caliptra RT
3,358,670 UART: [state] CFI Enabled
3,478,967 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,625 UART: [rt]cmd =0x4c444556, len=4
3,520,103 >>> mbox cmd response data (687 bytes)
3,520,104 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,345 UART: [rt]cmd =0x49444549, len=4
3,551,546 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [kat] SHA2-256
891,258 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,362 UART: [kat] ++
895,514 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
915,739 UART: [kat] HMAC-384Kdf
920,275 UART: [kat] LMS
1,168,587 UART: [kat] --
1,169,262 UART: [cold-reset] ++
1,169,622 UART: [fht] FHT @ 0x50003400
1,172,226 UART: [idev] ++
1,172,394 UART: [idev] CDI.KEYID = 6
1,172,755 UART: [idev] SUBJECT.KEYID = 7
1,173,180 UART: [idev] UDS.KEYID = 0
1,173,526 ready_for_fw is high
1,173,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,065 UART: [idev] Erasing UDS.KEYID = 0
1,198,137 UART: [idev] Sha1 KeyId Algorithm
1,207,189 UART: [idev] --
1,208,208 UART: [ldev] ++
1,208,376 UART: [ldev] CDI.KEYID = 6
1,208,740 UART: [ldev] SUBJECT.KEYID = 5
1,209,167 UART: [ldev] AUTHORITY.KEYID = 7
1,209,630 UART: [ldev] FE.KEYID = 1
1,214,748 UART: [ldev] Erasing FE.KEYID = 1
1,241,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,940 UART: [ldev] --
1,280,289 UART: [fwproc] Wait for Commands...
1,280,890 UART: [fwproc] Recv command 0x46574c44
1,281,623 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,261 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,436 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,799 >>> mbox cmd response: success
2,824,799 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,825,911 UART: [afmc] ++
2,826,079 UART: [afmc] CDI.KEYID = 6
2,826,442 UART: [afmc] SUBJECT.KEYID = 7
2,826,868 UART: [afmc] AUTHORITY.KEYID = 5
2,862,927 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,263 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,973 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,854 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,555 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,352 UART: [afmc] --
2,906,241 UART: [cold-reset] --
2,906,955 UART: [state] Locking Datavault
2,907,970 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,574 UART: [state] Locking ICCM
2,909,194 UART: [exit] Launching FMC @ 0x40000130
2,914,524 UART:
2,914,540 UART: Running Caliptra FMC ...
2,914,948 UART:
2,915,002 UART: [state] CFI Enabled
2,925,988 UART: [fht] FMC Alias Private Key: 7
3,045,268 UART: [art] Extend RT PCRs Done
3,045,696 UART: [art] Lock RT PCRs Done
3,047,246 UART: [art] Populate DV Done
3,055,587 UART: [fht] FMC Alias Private Key: 7
3,056,675 UART: [art] Derive CDI
3,056,955 UART: [art] Store in slot 0x4
3,142,996 UART: [art] Derive Key Pair
3,143,356 UART: [art] Store priv key in slot 0x5
3,156,374 UART: [art] Derive Key Pair - Done
3,171,131 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,998 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,763 UART: [art] PUB.X = 0ECB1044342AD0798563A406072CECA2699BCF58C8DEACB82F0C485F1C3BEA10AD85CD9115C764C833B317942AB4D8C1
3,193,533 UART: [art] PUB.Y = 04D7C03AF29DF37CABFAFDE5AE5ECF7A4D0844A2F637D470CABC778DA66BE20492A4D869160C8E54DDAA72E9716FC8C4
3,200,497 UART: [art] SIG.R = CAF2A3B2E914C5E1B30EC33A62F7782C1C26760C152922353ACF3898BB41F0DF8B93C1E9F013FE3071F15E5E17785395
3,207,265 UART: [art] SIG.S = A47B09DFCF579A02316675CCE0F6095F41FDD4D1A84F24C4D7A666C6EB347BBFA354D4F29BBEAC616548E306998DB2FC
3,230,519 UART: Caliptra RT
3,230,770 UART: [state] CFI Enabled
3,350,834 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,232 UART: [rt]cmd =0x4c444556, len=4
3,391,646 >>> mbox cmd response data (687 bytes)
3,391,647 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,114 UART: [rt]cmd =0x49444549, len=4
3,423,355 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,322 ready_for_fw is high
1,059,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,684 >>> mbox cmd response: success
2,677,684 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,740,139 UART:
2,740,155 UART: Running Caliptra FMC ...
2,740,563 UART:
2,740,617 UART: [state] CFI Enabled
2,750,781 UART: [fht] FMC Alias Private Key: 7
2,870,099 UART: [art] Extend RT PCRs Done
2,870,527 UART: [art] Lock RT PCRs Done
2,871,825 UART: [art] Populate DV Done
2,880,092 UART: [fht] FMC Alias Private Key: 7
2,881,032 UART: [art] Derive CDI
2,881,312 UART: [art] Store in slot 0x4
2,967,511 UART: [art] Derive Key Pair
2,967,871 UART: [art] Store priv key in slot 0x5
2,981,299 UART: [art] Derive Key Pair - Done
2,995,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,530 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,295 UART: [art] PUB.X = 6025EC074247498CB5FC02293C1CD54CB4A6EC30BC1C7C1374EDBA091EFC258464AD2DD043BA57EB5A5F797EF105681E
3,019,067 UART: [art] PUB.Y = 08AD84E7FAFD306B7F939278E110800953F19F5509D1B4EFC13A2FCC5133DFFC43A855FF8443CC530F8B1A44444B414D
3,026,013 UART: [art] SIG.R = C57AA7FEA40FCE85F1A7845E8B287F43451C841000E452F5E14ACB8AB1D54B352212F5965D265A84508832C330CC06C4
3,032,757 UART: [art] SIG.S = AEBECA260F3AC4ED66CB4462C692CFC0EF5A273E21D2093B00079F0241A75DF7800AE7E9A097D386E965D119C39F63F6
3,056,928 UART: Caliptra RT
3,057,179 UART: [state] CFI Enabled
3,175,479 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,921 UART: [rt]cmd =0x4c444556, len=4
3,216,377 >>> mbox cmd response data (687 bytes)
3,216,378 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,245,727 UART: [rt]cmd =0x49444549, len=4
3,248,222 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,765 UART: [state] LifecycleState = Unprovisioned
85,420 UART: [state] DebugLocked = No
85,910 UART: [state] WD Timer not started. Device not locked for debugging
87,205 UART: [kat] SHA2-256
890,755 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,859 UART: [kat] ++
895,011 UART: [kat] sha1
899,371 UART: [kat] SHA2-256
901,311 UART: [kat] SHA2-384
903,994 UART: [kat] SHA2-512-ACC
905,895 UART: [kat] ECC-384
915,816 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,593 UART: [cold-reset] ++
1,169,975 UART: [fht] FHT @ 0x50003400
1,172,587 UART: [idev] ++
1,172,755 UART: [idev] CDI.KEYID = 6
1,173,116 UART: [idev] SUBJECT.KEYID = 7
1,173,541 UART: [idev] UDS.KEYID = 0
1,173,887 ready_for_fw is high
1,173,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,528 UART: [idev] Erasing UDS.KEYID = 0
1,198,798 UART: [idev] Sha1 KeyId Algorithm
1,207,552 UART: [idev] --
1,208,645 UART: [ldev] ++
1,208,813 UART: [ldev] CDI.KEYID = 6
1,209,177 UART: [ldev] SUBJECT.KEYID = 5
1,209,604 UART: [ldev] AUTHORITY.KEYID = 7
1,210,067 UART: [ldev] FE.KEYID = 1
1,215,299 UART: [ldev] Erasing FE.KEYID = 1
1,241,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,423 UART: [ldev] --
1,280,642 UART: [fwproc] Wait for Commands...
1,281,303 UART: [fwproc] Recv command 0x46574c44
1,282,036 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,362 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,537 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,694 >>> mbox cmd response: success
2,825,694 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,826,920 UART: [afmc] ++
2,827,088 UART: [afmc] CDI.KEYID = 6
2,827,451 UART: [afmc] SUBJECT.KEYID = 7
2,827,877 UART: [afmc] AUTHORITY.KEYID = 5
2,863,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,566 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,276 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,157 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,858 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,625 UART: [afmc] --
2,906,620 UART: [cold-reset] --
2,907,716 UART: [state] Locking Datavault
2,908,875 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,479 UART: [state] Locking ICCM
2,909,989 UART: [exit] Launching FMC @ 0x40000130
2,915,319 UART:
2,915,335 UART: Running Caliptra FMC ...
2,915,743 UART:
2,915,886 UART: [state] CFI Enabled
2,926,708 UART: [fht] FMC Alias Private Key: 7
3,045,684 UART: [art] Extend RT PCRs Done
3,046,112 UART: [art] Lock RT PCRs Done
3,047,738 UART: [art] Populate DV Done
3,055,975 UART: [fht] FMC Alias Private Key: 7
3,057,121 UART: [art] Derive CDI
3,057,401 UART: [art] Store in slot 0x4
3,143,314 UART: [art] Derive Key Pair
3,143,674 UART: [art] Store priv key in slot 0x5
3,157,266 UART: [art] Derive Key Pair - Done
3,172,223 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,317 UART: [art] PUB.X = DF16C5FD688F9150864F9F6D039DBCF4462035EFB5FBEC1E8A335E2A5FD70C70959B12E42271DEEE8441DBD41A75C0F1
3,195,097 UART: [art] PUB.Y = 44B2D31E12F8D530D568375C37BD509E5E4DC4E4549030FFC469A107B2179E06CE57FD62F70F16D235F393A6AF93E456
3,202,040 UART: [art] SIG.R = 7FC1F1774E38C1B896180CA479A5C57F386BE06FF3199A8CD42EBC326D3765CA0D5ACB3F4C6F5F9815E8DA33E638EEB4
3,208,820 UART: [art] SIG.S = 7328DA0FCD02FF71E7DEC4D93B64B7146783B11A51F3453DD234985F5BAF3FB57634F0BCDDAB795F05D82E0162FF22DE
3,232,316 UART: Caliptra RT
3,232,659 UART: [state] CFI Enabled
3,352,637 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,259 UART: [rt]cmd =0x4c444556, len=4
3,393,643 >>> mbox cmd response data (687 bytes)
3,393,644 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,263 UART: [rt]cmd =0x49444549, len=4
3,425,760 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,465 ready_for_fw is high
1,059,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,275 >>> mbox cmd response: success
2,679,275 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,741,388 UART:
2,741,404 UART: Running Caliptra FMC ...
2,741,812 UART:
2,741,955 UART: [state] CFI Enabled
2,752,743 UART: [fht] FMC Alias Private Key: 7
2,871,431 UART: [art] Extend RT PCRs Done
2,871,859 UART: [art] Lock RT PCRs Done
2,873,631 UART: [art] Populate DV Done
2,881,908 UART: [fht] FMC Alias Private Key: 7
2,882,946 UART: [art] Derive CDI
2,883,226 UART: [art] Store in slot 0x4
2,969,189 UART: [art] Derive Key Pair
2,969,549 UART: [art] Store priv key in slot 0x5
2,982,431 UART: [art] Derive Key Pair - Done
2,997,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,797 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,562 UART: [art] PUB.X = 64BEF59B5EDDB20FDE122D91484AEC0E922BB4FC2BF1FA6A21A1D578EF5AB5B2494D7B30C88CB6503B34393C2999AC19
3,020,346 UART: [art] PUB.Y = AAC256278B7CD2E43CED79A89348EE0BA06D0FC3AEA5C3190A9FCAF793C0B7E6CB9DA048D45F9F19D297EF5A8899C13E
3,027,311 UART: [art] SIG.R = 1EB8028866C1ADC86A51E7320B91C6F99D211ECF025366D93846666A2B3505A5D874E17D9EEADDE5E5169035B4B6E917
3,034,071 UART: [art] SIG.S = BB4C2F0F59EECDFAC66D0A52B702FA8BFD2E676356CFE221B769390585BCEB8EC29133471082B31CC5FB2865A6C33E2E
3,057,457 UART: Caliptra RT
3,057,800 UART: [state] CFI Enabled
3,177,635 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,769 UART: [rt]cmd =0x4c444556, len=4
3,218,085 >>> mbox cmd response data (687 bytes)
3,218,086 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,573 UART: [rt]cmd =0x49444549, len=4
3,249,746 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
893,380 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,505 UART: [kat] ++
897,657 UART: [kat] sha1
901,949 UART: [kat] SHA2-256
903,889 UART: [kat] SHA2-384
906,514 UART: [kat] SHA2-512-ACC
908,415 UART: [kat] ECC-384
917,818 UART: [kat] HMAC-384Kdf
922,458 UART: [kat] LMS
1,170,786 UART: [kat] --
1,171,617 UART: [cold-reset] ++
1,172,097 UART: [fht] FHT @ 0x50003400
1,174,790 UART: [idev] ++
1,174,958 UART: [idev] CDI.KEYID = 6
1,175,318 UART: [idev] SUBJECT.KEYID = 7
1,175,742 UART: [idev] UDS.KEYID = 0
1,176,087 ready_for_fw is high
1,176,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,792 UART: [idev] Erasing UDS.KEYID = 0
1,200,469 UART: [idev] Sha1 KeyId Algorithm
1,208,981 UART: [idev] --
1,210,071 UART: [ldev] ++
1,210,239 UART: [ldev] CDI.KEYID = 6
1,210,602 UART: [ldev] SUBJECT.KEYID = 5
1,211,028 UART: [ldev] AUTHORITY.KEYID = 7
1,211,491 UART: [ldev] FE.KEYID = 1
1,216,587 UART: [ldev] Erasing FE.KEYID = 1
1,243,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,431 UART: [ldev] --
1,282,782 UART: [fwproc] Wait for Commands...
1,283,396 UART: [fwproc] Recv command 0x46574c44
1,284,124 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,298 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,468 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,693 >>> mbox cmd response: success
2,828,693 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,829,773 UART: [afmc] ++
2,829,941 UART: [afmc] CDI.KEYID = 6
2,830,303 UART: [afmc] SUBJECT.KEYID = 7
2,830,728 UART: [afmc] AUTHORITY.KEYID = 5
2,866,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,274 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,983 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,866 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,567 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,441 UART: [afmc] --
2,909,365 UART: [cold-reset] --
2,910,363 UART: [state] Locking Datavault
2,911,634 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,238 UART: [state] Locking ICCM
2,912,836 UART: [exit] Launching FMC @ 0x40000130
2,918,166 UART:
2,918,182 UART: Running Caliptra FMC ...
2,918,590 UART:
2,918,644 UART: [state] CFI Enabled
2,929,342 UART: [fht] FMC Alias Private Key: 7
3,047,994 UART: [art] Extend RT PCRs Done
3,048,422 UART: [art] Lock RT PCRs Done
3,049,716 UART: [art] Populate DV Done
3,057,789 UART: [fht] FMC Alias Private Key: 7
3,058,761 UART: [art] Derive CDI
3,059,041 UART: [art] Store in slot 0x4
3,144,592 UART: [art] Derive Key Pair
3,144,952 UART: [art] Store priv key in slot 0x5
3,157,672 UART: [art] Derive Key Pair - Done
3,172,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,132 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,897 UART: [art] PUB.X = 0486C545461AEFA0409184A363C26367A0B2247D6D8E525EE993188B93FA25DAF6B4A9855BE91DB1FA348B4231B0E5B7
3,195,666 UART: [art] PUB.Y = 59036416ACB6BBD77927D4CEFE5EB12DC46A1FEDF7FFCE5FC7E9FEF053BE94FFE887C07DB2190E3E97AEA0010DD34781
3,202,632 UART: [art] SIG.R = EBC1958618940F2E54A492A2C1B98F0DFEE3926E1C0DFAAF0D15D9905BD2D8AD7BFF41F4A5CF210F675A26B03F180B7F
3,209,404 UART: [art] SIG.S = D7DDE449E727E55A5D57A26318820D6998C7D8C646C669E9CB8047A90ECB26D45262361BAFA82DE0BCB5E89A6F10E973
3,233,422 UART: Caliptra RT
3,233,673 UART: [state] CFI Enabled
3,353,181 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,359 UART: [rt]cmd =0x4c444556, len=4
3,393,691 >>> mbox cmd response data (687 bytes)
3,393,692 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,017 UART: [rt]cmd =0x49444549, len=4
3,425,330 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,539 ready_for_fw is high
1,060,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,192 >>> mbox cmd response: success
2,679,192 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,741,333 UART:
2,741,349 UART: Running Caliptra FMC ...
2,741,757 UART:
2,741,811 UART: [state] CFI Enabled
2,752,099 UART: [fht] FMC Alias Private Key: 7
2,871,463 UART: [art] Extend RT PCRs Done
2,871,891 UART: [art] Lock RT PCRs Done
2,873,099 UART: [art] Populate DV Done
2,881,414 UART: [fht] FMC Alias Private Key: 7
2,882,394 UART: [art] Derive CDI
2,882,674 UART: [art] Store in slot 0x4
2,968,533 UART: [art] Derive Key Pair
2,968,893 UART: [art] Store priv key in slot 0x5
2,982,221 UART: [art] Derive Key Pair - Done
2,997,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,303 UART: [art] PUB.X = EF20E785D4DCE7B0EFC763511BB19449F1558F4D809F960879C018C8F8D8CDE0AE0E1261008C58A0E9A6FD7DE9FF8C19
3,020,059 UART: [art] PUB.Y = 3ABC0FA3B7CA4A2188FB83D77CA778A025646FA45D205E39B6C57E6D65C4EBBC82A9A9135FA85DEBD209B52F49023253
3,027,014 UART: [art] SIG.R = 88CF56D7DB93346BCFD5E47244D32E2ECFC07A16810D90A4F89B432942EBC6705F988A86E63649B028116C7B039417BC
3,033,780 UART: [art] SIG.S = 8FA7D1EB52EDA27C9EF4CD754C9523C9EE1A48D3C577BF19A501BA5BBC131E32A3BF179AD1C890AE160EF18E21AE2BDB
3,057,462 UART: Caliptra RT
3,057,713 UART: [state] CFI Enabled
3,177,345 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,699 UART: [rt]cmd =0x4c444556, len=4
3,218,361 >>> mbox cmd response data (687 bytes)
3,218,362 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,767 UART: [rt]cmd =0x49444549, len=4
3,250,256 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
893,901 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,026 UART: [kat] ++
898,178 UART: [kat] sha1
902,428 UART: [kat] SHA2-256
904,368 UART: [kat] SHA2-384
907,277 UART: [kat] SHA2-512-ACC
909,178 UART: [kat] ECC-384
918,999 UART: [kat] HMAC-384Kdf
923,689 UART: [kat] LMS
1,172,017 UART: [kat] --
1,172,788 UART: [cold-reset] ++
1,173,228 UART: [fht] FHT @ 0x50003400
1,175,901 UART: [idev] ++
1,176,069 UART: [idev] CDI.KEYID = 6
1,176,429 UART: [idev] SUBJECT.KEYID = 7
1,176,853 UART: [idev] UDS.KEYID = 0
1,177,198 ready_for_fw is high
1,177,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,567 UART: [idev] Erasing UDS.KEYID = 0
1,201,958 UART: [idev] Sha1 KeyId Algorithm
1,210,560 UART: [idev] --
1,211,546 UART: [ldev] ++
1,211,714 UART: [ldev] CDI.KEYID = 6
1,212,077 UART: [ldev] SUBJECT.KEYID = 5
1,212,503 UART: [ldev] AUTHORITY.KEYID = 7
1,212,966 UART: [ldev] FE.KEYID = 1
1,218,174 UART: [ldev] Erasing FE.KEYID = 1
1,244,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,276 UART: [ldev] --
1,283,707 UART: [fwproc] Wait for Commands...
1,284,319 UART: [fwproc] Recv command 0x46574c44
1,285,047 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,909 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,079 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,418 >>> mbox cmd response: success
2,829,418 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,830,558 UART: [afmc] ++
2,830,726 UART: [afmc] CDI.KEYID = 6
2,831,088 UART: [afmc] SUBJECT.KEYID = 7
2,831,513 UART: [afmc] AUTHORITY.KEYID = 5
2,867,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,611 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,359 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,068 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,951 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,652 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,446 UART: [afmc] --
2,910,492 UART: [cold-reset] --
2,911,364 UART: [state] Locking Datavault
2,912,853 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,457 UART: [state] Locking ICCM
2,914,073 UART: [exit] Launching FMC @ 0x40000130
2,919,403 UART:
2,919,419 UART: Running Caliptra FMC ...
2,919,827 UART:
2,919,970 UART: [state] CFI Enabled
2,930,392 UART: [fht] FMC Alias Private Key: 7
3,049,668 UART: [art] Extend RT PCRs Done
3,050,096 UART: [art] Lock RT PCRs Done
3,051,542 UART: [art] Populate DV Done
3,059,945 UART: [fht] FMC Alias Private Key: 7
3,061,005 UART: [art] Derive CDI
3,061,285 UART: [art] Store in slot 0x4
3,147,018 UART: [art] Derive Key Pair
3,147,378 UART: [art] Store priv key in slot 0x5
3,161,100 UART: [art] Derive Key Pair - Done
3,175,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,696 UART: [art] PUB.X = A433D10153BB9087E120E53F3718250B21BCD78B2A545B3616D33FC9E9C3C6366354728735AE1A9323F49CEE38C1B5F6
3,198,458 UART: [art] PUB.Y = 1786743297B04F6639EFAE5B9A560AA040B6DE3758EF7D57EE17B92B11E3DAD972B97D33BEE562CCD50B52A156CAFB31
3,205,416 UART: [art] SIG.R = C717CBC980AC8960700867287F4D5E6F43D48E2D4FEA22352B2155AFB657E669CF78CA1A5BE520AD2D68C83B165EA99D
3,212,193 UART: [art] SIG.S = 285BB12AA8D78BDE88F690B1CD60405EEE765437C02D3C25E9BF38735D4EA733F7E346D49105F036C3EAE0A8A345DA06
3,236,083 UART: Caliptra RT
3,236,426 UART: [state] CFI Enabled
3,355,657 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,087 UART: [rt]cmd =0x4c444556, len=4
3,396,425 >>> mbox cmd response data (687 bytes)
3,396,426 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,425,723 UART: [rt]cmd =0x49444549, len=4
3,427,908 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,836 ready_for_fw is high
1,060,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,795 >>> mbox cmd response: success
2,680,795 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,743,410 UART:
2,743,426 UART: Running Caliptra FMC ...
2,743,834 UART:
2,743,977 UART: [state] CFI Enabled
2,754,141 UART: [fht] FMC Alias Private Key: 7
2,873,259 UART: [art] Extend RT PCRs Done
2,873,687 UART: [art] Lock RT PCRs Done
2,875,147 UART: [art] Populate DV Done
2,883,614 UART: [fht] FMC Alias Private Key: 7
2,884,690 UART: [art] Derive CDI
2,884,970 UART: [art] Store in slot 0x4
2,970,991 UART: [art] Derive Key Pair
2,971,351 UART: [art] Store priv key in slot 0x5
2,984,529 UART: [art] Derive Key Pair - Done
2,999,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,179 UART: [art] PUB.X = 784AACC8DA846031B227AE0D91FE234B304C4E89714F8B115BBE55FCB787F9BD2AF29B5B1AF763D3D83C217C74E0279C
3,021,960 UART: [art] PUB.Y = FF071F93105E445411794A13F81EEEB35C6469E330ACFFFC5D37EE964CD66219C274C578A25FAC2E461D46C0F81F68B2
3,028,915 UART: [art] SIG.R = 5F107263B9A4675F9565C4CF8688A3C8586A1546207EAEE5F58902DD74E5666E856F1C0D1E03DA02E637666BC5520CFA
3,035,670 UART: [art] SIG.S = 290C22F37F2485795744C4040540E9C76F5A579DFA9978B3B524A1A33862963485AFF2FF2A53C41D45C1C3793099EEEB
3,059,391 UART: Caliptra RT
3,059,734 UART: [state] CFI Enabled
3,178,646 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,314 UART: [rt]cmd =0x4c444556, len=4
3,219,724 >>> mbox cmd response data (687 bytes)
3,219,725 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,249,152 UART: [rt]cmd =0x49444549, len=4
3,251,471 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
191,990 UART:
192,349 UART: Running Caliptra ROM ...
193,486 UART:
193,636 UART: [state] CFI Enabled
264,180 UART: [state] LifecycleState = Unprovisioned
266,185 UART: [state] DebugLocked = No
268,719 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,305 UART: [kat] SHA2-256
442,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,516 UART: [kat] ++
453,966 UART: [kat] sha1
465,638 UART: [kat] SHA2-256
468,362 UART: [kat] SHA2-384
473,861 UART: [kat] SHA2-512-ACC
476,225 UART: [kat] ECC-384
2,765,751 UART: [kat] HMAC-384Kdf
2,778,766 UART: [kat] LMS
3,969,058 UART: [kat] --
3,971,752 UART: [cold-reset] ++
3,972,701 UART: [fht] Storing FHT @ 0x50003400
3,984,767 UART: [idev] ++
3,985,325 UART: [idev] CDI.KEYID = 6
3,986,280 UART: [idev] SUBJECT.KEYID = 7
3,987,519 UART: [idev] UDS.KEYID = 0
3,988,533 ready_for_fw is high
3,988,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,137,928 UART: [idev] Erasing UDS.KEYID = 0
7,324,134 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,713 UART: [idev] --
7,350,056 UART: [ldev] ++
7,350,638 UART: [ldev] CDI.KEYID = 6
7,351,654 UART: [ldev] SUBJECT.KEYID = 5
7,352,807 UART: [ldev] AUTHORITY.KEYID = 7
7,354,086 UART: [ldev] FE.KEYID = 1
7,399,646 UART: [ldev] Erasing FE.KEYID = 1
10,733,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,476 UART: [ldev] --
13,113,847 UART: [fwproc] Waiting for Commands...
13,116,266 UART: [fwproc] Received command 0x46574c44
13,118,501 UART: [fwproc] Received Image of size 118548 bytes
17,224,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,930 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,114 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,208 >>> mbox cmd response: success
17,704,297 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,708,054 UART: [afmc] ++
17,708,653 UART: [afmc] CDI.KEYID = 6
17,709,589 UART: [afmc] SUBJECT.KEYID = 7
17,710,881 UART: [afmc] AUTHORITY.KEYID = 5
21,069,051 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,786 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,041 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,510 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,225 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,597 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,069 UART: [afmc] --
23,439,126 UART: [cold-reset] --
23,443,961 UART: [state] Locking Datavault
23,450,284 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,037 UART: [state] Locking ICCM
23,453,117 UART: [exit] Launching FMC @ 0x40000130
23,461,481 UART:
23,461,725 UART: Running Caliptra FMC ...
23,462,753 UART:
23,462,922 UART: [state] CFI Enabled
23,527,786 UART: [fht] FMC Alias Private Key: 7
25,867,969 UART: [art] Extend RT PCRs Done
25,869,201 UART: [art] Lock RT PCRs Done
25,870,862 UART: [art] Populate DV Done
25,876,220 UART: [fht] FMC Alias Private Key: 7
25,877,809 UART: [art] Derive CDI
25,878,546 UART: [art] Store in slot 0x4
25,936,210 UART: [art] Derive Key Pair
25,937,252 UART: [art] Store priv key in slot 0x5
29,229,543 UART: [art] Derive Key Pair - Done
29,242,432 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,531,107 UART: [art] Erasing AUTHORITY.KEYID = 7
31,532,621 UART: [art] PUB.X = 05433004BB6DCC77BE51718B5B085C8BDDD3733B4F8E4DE718305B3534ADA4841DD75D5B5D00EE408B6910D6D34E6ACA
31,539,889 UART: [art] PUB.Y = 505F7E620B5755A22860CEC478106AE5A2B0E48529A154EEA4885651EE8C3F20633FAA825EFC6DC53A8FDDB3C0E72DD0
31,547,100 UART: [art] SIG.R = 118A7E8C7A1B06284184E88C1FDE4DF1CE0F0C85C46FE707D282875EC1E7772F4C5DA1B21775F392F2D6C50F6D6CB06B
31,554,549 UART: [art] SIG.S = 9DFAB1DF553F638347C349E29D7CC768C1395C06CE8E448F4E1598BC8A7E3013B49E2B8487E54D2329C5F96452264786
32,859,008 UART: Caliptra RT
32,859,726 UART: [state] CFI Enabled
33,038,266 UART: [rt] RT listening for mailbox commands...
33,069,901 UART: [rt]cmd =0x43455246, len=4
33,082,968 >>> mbox cmd response data (920 bytes)
33,125,353 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,155,473 UART: [rt]cmd =0x43455252, len=4
33,167,114 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,805,838 ready_for_fw is high
3,806,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,969,966 >>> mbox cmd response: success
17,971,540 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,671,325 UART:
23,671,777 UART: Running Caliptra FMC ...
23,672,898 UART:
23,673,060 UART: [state] CFI Enabled
23,741,821 UART: [fht] FMC Alias Private Key: 7
26,082,457 UART: [art] Extend RT PCRs Done
26,083,688 UART: [art] Lock RT PCRs Done
26,085,562 UART: [art] Populate DV Done
26,091,319 UART: [fht] FMC Alias Private Key: 7
26,092,872 UART: [art] Derive CDI
26,093,619 UART: [art] Store in slot 0x4
26,149,630 UART: [art] Derive Key Pair
26,150,682 UART: [art] Store priv key in slot 0x5
29,443,885 UART: [art] Derive Key Pair - Done
29,456,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,731 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,238 UART: [art] PUB.X = 56AA8392DD8AF9680BBBCAAD0B70024545C58E6A326770D95788DC0D97D43752E8729797F70AF6FA4E11BF167C03D821
31,754,486 UART: [art] PUB.Y = D8DF16CB93E6D1552C5522EDB2F08F336091B77257F959E5208098351A061C296013774DA5DBD3B186B5A957E0486920
31,761,730 UART: [art] SIG.R = EE3FFC8A89F32EC37E26A96623925AFE50FE58B412BC0B39EE693ACB16A6100900EDFDFAAB095E98FF7E19F5009216CB
31,769,087 UART: [art] SIG.S = 76C7B92135239DB5D443B428B495134D65ACC6A291B480F7C36093329915F7B13A57730B885D2926E90E23F024A22DC1
33,074,597 UART: Caliptra RT
33,075,302 UART: [state] CFI Enabled
33,265,441 UART: [rt] RT listening for mailbox commands...
33,296,807 UART: [rt]cmd =0x43455246, len=4
33,309,735 >>> mbox cmd response data (920 bytes)
33,352,252 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,382,256 UART: [rt]cmd =0x43455252, len=4
33,393,541 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
192,338 UART:
192,778 UART: Running Caliptra ROM ...
193,917 UART:
603,590 UART: [state] CFI Enabled
616,649 UART: [state] LifecycleState = Unprovisioned
618,527 UART: [state] DebugLocked = No
620,338 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,278 UART: [kat] SHA2-256
795,028 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,559 UART: [kat] ++
806,042 UART: [kat] sha1
817,057 UART: [kat] SHA2-256
819,778 UART: [kat] SHA2-384
824,698 UART: [kat] SHA2-512-ACC
827,068 UART: [kat] ECC-384
3,112,066 UART: [kat] HMAC-384Kdf
3,123,899 UART: [kat] LMS
4,313,987 UART: [kat] --
4,318,431 UART: [cold-reset] ++
4,319,277 UART: [fht] Storing FHT @ 0x50003400
4,331,971 UART: [idev] ++
4,332,534 UART: [idev] CDI.KEYID = 6
4,333,505 UART: [idev] SUBJECT.KEYID = 7
4,334,741 UART: [idev] UDS.KEYID = 0
4,335,715 ready_for_fw is high
4,335,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,833 UART: [idev] Erasing UDS.KEYID = 0
7,627,874 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,357 UART: [idev] --
7,652,972 UART: [ldev] ++
7,653,543 UART: [ldev] CDI.KEYID = 6
7,654,503 UART: [ldev] SUBJECT.KEYID = 5
7,655,706 UART: [ldev] AUTHORITY.KEYID = 7
7,656,989 UART: [ldev] FE.KEYID = 1
7,669,516 UART: [ldev] Erasing FE.KEYID = 1
10,956,164 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,511 UART: [ldev] --
13,314,768 UART: [fwproc] Waiting for Commands...
13,317,989 UART: [fwproc] Received command 0x46574c44
13,320,220 UART: [fwproc] Received Image of size 118548 bytes
17,420,484 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,146 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,354 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,482 >>> mbox cmd response: success
17,905,530 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,908,253 UART: [afmc] ++
17,908,891 UART: [afmc] CDI.KEYID = 6
17,909,789 UART: [afmc] SUBJECT.KEYID = 7
17,911,054 UART: [afmc] AUTHORITY.KEYID = 5
21,223,677 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,979 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,439 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,683 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,392 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,812 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,332 UART: [afmc] --
23,587,247 UART: [cold-reset] --
23,592,126 UART: [state] Locking Datavault
23,595,800 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,543 UART: [state] Locking ICCM
23,598,652 UART: [exit] Launching FMC @ 0x40000130
23,607,071 UART:
23,607,308 UART: Running Caliptra FMC ...
23,608,346 UART:
23,608,492 UART: [state] CFI Enabled
23,616,318 UART: [fht] FMC Alias Private Key: 7
25,956,972 UART: [art] Extend RT PCRs Done
25,958,191 UART: [art] Lock RT PCRs Done
25,960,106 UART: [art] Populate DV Done
25,965,348 UART: [fht] FMC Alias Private Key: 7
25,966,988 UART: [art] Derive CDI
25,967,795 UART: [art] Store in slot 0x4
26,010,169 UART: [art] Derive Key Pair
26,011,208 UART: [art] Store priv key in slot 0x5
29,253,170 UART: [art] Derive Key Pair - Done
29,266,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,439 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,939 UART: [art] PUB.X = A566626A65B6AC7ED37645F0FA865809B36DC74825C950D1ACBA6879773398166B584532EDF2D50341E85E3914D85CE3
31,555,196 UART: [art] PUB.Y = 69EEC14CE2799C743E7630012023371B50F930B33F50AE4F086665B2E01A362CD99055562EB37DFCE6C71FE1075DD3F0
31,562,450 UART: [art] SIG.R = C4F1F07CAFF67B2D0B2ECB41419AAD502BC855DAA1EC7F37B9217E517892F15A67286EF9C81340EAE873808503BE7A08
31,569,853 UART: [art] SIG.S = DFADC706998DD1191B824C8BFC911FE7C93FB3755349AE2769C14B88B1F0F1711B7C21B5A358B04C5A492BBCA07EE668
32,874,687 UART: Caliptra RT
32,875,379 UART: [state] CFI Enabled
33,007,784 UART: [rt] RT listening for mailbox commands...
33,039,283 UART: [rt]cmd =0x43455246, len=4
33,052,135 >>> mbox cmd response data (920 bytes)
33,094,655 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,124,851 UART: [rt]cmd =0x43455252, len=4
33,136,069 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
4,123,808 ready_for_fw is high
4,124,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,136 >>> mbox cmd response: success
18,156,559 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,791,125 UART:
23,791,519 UART: Running Caliptra FMC ...
23,792,722 UART:
23,792,892 UART: [state] CFI Enabled
23,800,612 UART: [fht] FMC Alias Private Key: 7
26,141,264 UART: [art] Extend RT PCRs Done
26,142,512 UART: [art] Lock RT PCRs Done
26,144,250 UART: [art] Populate DV Done
26,149,473 UART: [fht] FMC Alias Private Key: 7
26,151,069 UART: [art] Derive CDI
26,151,884 UART: [art] Store in slot 0x4
26,194,146 UART: [art] Derive Key Pair
26,195,144 UART: [art] Store priv key in slot 0x5
29,438,190 UART: [art] Derive Key Pair - Done
29,451,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,965 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,472 UART: [art] PUB.X = 0777806A0AC3C6A6B3FBA015165E2D39D43D589DC0134A7AEBACDD7876EF039BF4E729D950B537A0E2CB26C5787152FD
31,740,709 UART: [art] PUB.Y = E4ABCA7A80E9AA7B0E9DDDB4F5241B1869F93496A01C56A0271B88393AF2E55A38E54CC30CACF17F9F35CA51D4676CDD
31,748,036 UART: [art] SIG.R = 940F755704B5D3F1059CADD83AC5F9BA4DD2E320FF452343D6F11C1AFF202AF0EF431521A2D716DC6019F36D294B3D1D
31,755,448 UART: [art] SIG.S = E02771D2714C55A2C5BC8EBB8E64B6961D67A6C52275A1F5EBB45B7FADE9FB461E5A87F789278B2E9B436D0143B02314
33,061,186 UART: Caliptra RT
33,061,916 UART: [state] CFI Enabled
33,195,166 UART: [rt] RT listening for mailbox commands...
33,226,626 UART: [rt]cmd =0x43455246, len=4
33,239,499 >>> mbox cmd response data (920 bytes)
33,282,432 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,312,358 UART: [rt]cmd =0x43455252, len=4
33,323,574 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,197 UART:
192,557 UART: Running Caliptra ROM ...
193,767 UART:
193,918 UART: [state] CFI Enabled
264,154 UART: [state] LifecycleState = Unprovisioned
266,073 UART: [state] DebugLocked = No
267,964 UART: [state] WD Timer not started. Device not locked for debugging
271,532 UART: [kat] SHA2-256
451,213 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,024 UART: [kat] ++
462,475 UART: [kat] sha1
474,018 UART: [kat] SHA2-256
476,716 UART: [kat] SHA2-384
482,280 UART: [kat] SHA2-512-ACC
484,644 UART: [kat] ECC-384
2,948,902 UART: [kat] HMAC-384Kdf
2,971,226 UART: [kat] LMS
3,447,682 UART: [kat] --
3,450,485 UART: [cold-reset] ++
3,452,635 UART: [fht] FHT @ 0x50003400
3,463,179 UART: [idev] ++
3,463,736 UART: [idev] CDI.KEYID = 6
3,464,762 UART: [idev] SUBJECT.KEYID = 7
3,465,950 UART: [idev] UDS.KEYID = 0
3,466,878 ready_for_fw is high
3,467,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,715 UART: [idev] Erasing UDS.KEYID = 0
5,986,026 UART: [idev] Sha1 KeyId Algorithm
6,009,810 UART: [idev] --
6,015,702 UART: [ldev] ++
6,016,273 UART: [ldev] CDI.KEYID = 6
6,017,182 UART: [ldev] SUBJECT.KEYID = 5
6,018,395 UART: [ldev] AUTHORITY.KEYID = 7
6,019,680 UART: [ldev] FE.KEYID = 1
6,057,059 UART: [ldev] Erasing FE.KEYID = 1
8,564,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,783 UART: [ldev] --
10,374,631 UART: [fwproc] Wait for Commands...
10,376,234 UART: [fwproc] Recv command 0x46574c44
10,378,273 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,413 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,469 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,929 >>> mbox cmd response: success
14,338,990 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,341,983 UART: [afmc] ++
14,342,614 UART: [afmc] CDI.KEYID = 6
14,343,517 UART: [afmc] SUBJECT.KEYID = 7
14,344,730 UART: [afmc] AUTHORITY.KEYID = 5
16,869,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,707 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,613,493 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,629,567 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,645,125 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,670,500 UART: [afmc] --
18,674,848 UART: [cold-reset] --
18,679,897 UART: [state] Locking Datavault
18,683,574 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,319 UART: [state] Locking ICCM
18,687,679 UART: [exit] Launching FMC @ 0x40000130
18,696,064 UART:
18,696,308 UART: Running Caliptra FMC ...
18,697,409 UART:
18,697,568 UART: [state] CFI Enabled
18,751,423 UART: [fht] FMC Alias Private Key: 7
20,517,654 UART: [art] Extend RT PCRs Done
20,518,900 UART: [art] Lock RT PCRs Done
20,520,789 UART: [art] Populate DV Done
20,526,362 UART: [fht] FMC Alias Private Key: 7
20,528,057 UART: [art] Derive CDI
20,528,871 UART: [art] Store in slot 0x4
20,583,628 UART: [art] Derive Key Pair
20,584,667 UART: [art] Store priv key in slot 0x5
23,047,247 UART: [art] Derive Key Pair - Done
23,060,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,772,437 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,948 UART: [art] PUB.X = 5D0B9E0E89C445F468298D848573DC2B24EF4089BF66D89003D09D4C1BA518CF8EBC0B65C4450BC276B3A6B708288ADE
24,781,197 UART: [art] PUB.Y = 17A580BCB65E70CF8451724EC9942E472D6F84BFB09CDBCB801F27B4991FBDAE87FFEFC93B1299984CEF29F5B6CAC81E
24,788,520 UART: [art] SIG.R = 5A73BAF16CB33854E69A9C8F0A4789E00E94DD563646F827E58AD1FD17E651B28F1E6FE483892983D3A6A17F9DFCAABA
24,795,920 UART: [art] SIG.S = 20B334CD3A95095C72936C7FB5D5BB321C831BA0629892F4363E0FC3D4A9315A5C372E92D8B8EA5AB90B9AEABF2DCEC5
25,775,300 UART: Caliptra RT
25,775,995 UART: [state] CFI Enabled
25,955,188 UART: [rt] RT listening for mailbox commands...
25,986,435 UART: [rt]cmd =0x43455246, len=4
25,999,025 >>> mbox cmd response data (888 bytes)
26,040,710 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,070,709 UART: [rt]cmd =0x43455252, len=4
26,082,191 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,458,909 ready_for_fw is high
3,459,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,238,884 >>> mbox cmd response: success
14,240,276 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,530,976 UART:
18,531,370 UART: Running Caliptra FMC ...
18,532,468 UART:
18,532,619 UART: [state] CFI Enabled
18,600,622 UART: [fht] FMC Alias Private Key: 7
20,366,943 UART: [art] Extend RT PCRs Done
20,368,167 UART: [art] Lock RT PCRs Done
20,369,816 UART: [art] Populate DV Done
20,375,136 UART: [fht] FMC Alias Private Key: 7
20,376,783 UART: [art] Derive CDI
20,377,535 UART: [art] Store in slot 0x4
20,433,370 UART: [art] Derive Key Pair
20,434,411 UART: [art] Store priv key in slot 0x5
22,896,784 UART: [art] Derive Key Pair - Done
22,909,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,622,559 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,063 UART: [art] PUB.X = A948F8AE972B861E6C2DD6BC6E0CEE16D537095FCFEBAE61894BA8D0383DB3134911B50925E88E183A0B99CBFBBD4B42
24,631,319 UART: [art] PUB.Y = BB44F0E6FBC4149AB328DC3B1A3E419E585BA6CB9183D6C6824781670C55405F67DEC6A323E73C169CF8DB0AF6DD14EB
24,638,610 UART: [art] SIG.R = D5FEBC64BB0A1B22AD814A392E0257EFC69880229D187C58A7FAE8F5BA5D7091213FE842CC1CB6DF1DC09D63F808A892
24,646,029 UART: [art] SIG.S = F34B4D11870DCED8B6AF97BF310EACA667D2D363F07D2834B8091531877C58B551807EB185F31CA666B8A82B6E4B4A62
25,625,024 UART: Caliptra RT
25,625,729 UART: [state] CFI Enabled
25,805,234 UART: [rt] RT listening for mailbox commands...
25,836,485 UART: [rt]cmd =0x43455246, len=4
25,849,256 >>> mbox cmd response data (888 bytes)
25,890,903 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,920,768 UART: [rt]cmd =0x43455252, len=4
25,931,921 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,525 UART:
192,887 UART: Running Caliptra ROM ...
194,024 UART:
603,723 UART: [state] CFI Enabled
616,474 UART: [state] LifecycleState = Unprovisioned
618,416 UART: [state] DebugLocked = No
620,432 UART: [state] WD Timer not started. Device not locked for debugging
624,816 UART: [kat] SHA2-256
804,453 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,288 UART: [kat] ++
815,736 UART: [kat] sha1
825,571 UART: [kat] SHA2-256
828,268 UART: [kat] SHA2-384
833,487 UART: [kat] SHA2-512-ACC
835,813 UART: [kat] ECC-384
3,277,992 UART: [kat] HMAC-384Kdf
3,290,730 UART: [kat] LMS
3,767,262 UART: [kat] --
3,771,823 UART: [cold-reset] ++
3,774,185 UART: [fht] FHT @ 0x50003400
3,785,319 UART: [idev] ++
3,785,921 UART: [idev] CDI.KEYID = 6
3,786,851 UART: [idev] SUBJECT.KEYID = 7
3,788,100 UART: [idev] UDS.KEYID = 0
3,789,031 ready_for_fw is high
3,789,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,062 UART: [idev] Erasing UDS.KEYID = 0
6,264,533 UART: [idev] Sha1 KeyId Algorithm
6,288,954 UART: [idev] --
6,294,246 UART: [ldev] ++
6,294,896 UART: [ldev] CDI.KEYID = 6
6,295,808 UART: [ldev] SUBJECT.KEYID = 5
6,296,968 UART: [ldev] AUTHORITY.KEYID = 7
6,298,255 UART: [ldev] FE.KEYID = 1
6,310,036 UART: [ldev] Erasing FE.KEYID = 1
8,790,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,257 UART: [ldev] --
10,583,909 UART: [fwproc] Wait for Commands...
10,586,581 UART: [fwproc] Recv command 0x46574c44
10,588,627 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,260 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,715 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,738 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,278 >>> mbox cmd response: success
14,555,362 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,558,532 UART: [afmc] ++
14,559,115 UART: [afmc] CDI.KEYID = 6
14,560,134 UART: [afmc] SUBJECT.KEYID = 7
14,561,241 UART: [afmc] AUTHORITY.KEYID = 5
17,062,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,675 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,496 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,571 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,140 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,567 UART: [afmc] --
18,864,270 UART: [cold-reset] --
18,868,077 UART: [state] Locking Datavault
18,871,995 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,753 UART: [state] Locking ICCM
18,874,911 UART: [exit] Launching FMC @ 0x40000130
18,883,303 UART:
18,883,538 UART: Running Caliptra FMC ...
18,884,643 UART:
18,884,806 UART: [state] CFI Enabled
18,892,909 UART: [fht] FMC Alias Private Key: 7
20,659,365 UART: [art] Extend RT PCRs Done
20,660,723 UART: [art] Lock RT PCRs Done
20,662,064 UART: [art] Populate DV Done
20,667,382 UART: [fht] FMC Alias Private Key: 7
20,669,088 UART: [art] Derive CDI
20,669,828 UART: [art] Store in slot 0x4
20,712,797 UART: [art] Derive Key Pair
20,713,799 UART: [art] Store priv key in slot 0x5
23,140,436 UART: [art] Derive Key Pair - Done
23,153,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,477 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,980 UART: [art] PUB.X = 9B74DD6DD93F99CB4CBD3ED1C047E906FFC67B02DDF8A778D1E37E1F47A1E1E1B6B06A96BE2F06083E66F0B3B4E95A03
24,868,223 UART: [art] PUB.Y = 2ECCDB21C0B477963C40F0C64E952C8E5C4E06C5D8A5CB47B3D240E79AADECB985BA8E75F9FDBF40D2E5EAC902F51028
24,875,500 UART: [art] SIG.R = FE2B638E9BF0E2A39540C70C7942F157E786E4523354FD9CD614CD73B5B0EF86CF02C775F92191061C5BA6F641B76EA8
24,882,896 UART: [art] SIG.S = 36285B84D53BE93B407D64D6F10B6CF70695E7B86B8F38A8C89AF0FEF7C4E88292098B374D135AFF630FEC8686875A22
25,861,275 UART: Caliptra RT
25,861,988 UART: [state] CFI Enabled
25,995,786 UART: [rt] RT listening for mailbox commands...
26,027,237 UART: [rt]cmd =0x43455246, len=4
26,039,817 >>> mbox cmd response data (888 bytes)
26,081,187 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,111,299 UART: [rt]cmd =0x43455252, len=4
26,122,630 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,782,729 ready_for_fw is high
3,783,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,910 >>> mbox cmd response: success
14,450,348 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,702,310 UART:
18,702,695 UART: Running Caliptra FMC ...
18,703,907 UART:
18,704,081 UART: [state] CFI Enabled
18,711,965 UART: [fht] FMC Alias Private Key: 7
20,478,347 UART: [art] Extend RT PCRs Done
20,479,564 UART: [art] Lock RT PCRs Done
20,481,623 UART: [art] Populate DV Done
20,487,355 UART: [fht] FMC Alias Private Key: 7
20,488,987 UART: [art] Derive CDI
20,489,816 UART: [art] Store in slot 0x4
20,532,232 UART: [art] Derive Key Pair
20,533,241 UART: [art] Store priv key in slot 0x5
22,960,101 UART: [art] Derive Key Pair - Done
22,972,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,118 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,611 UART: [art] PUB.X = 2656F3101FA7946960DFD31F38046E638E81BAC6947D0781DD70CDA303BA38722DF86DC1860197ED38ED6384BD109981
24,687,865 UART: [art] PUB.Y = 25CD17928ECAB58A987687F9C534CB6AD8E6D58477542BE51CF218FC7C8ACCFD5A7966CD2D238B3A5D2EEC80FB8526D6
24,695,122 UART: [art] SIG.R = 7CDCFF1F0430D243739194E299A815C1107994CF6C9F516F32762117F91E353E7D7BD4F75D6579464B49E79369506673
24,702,472 UART: [art] SIG.S = 28AE4C47B73388AD190B9C26A8B324DFAA6FE67D9C5B26C6C4AD087349202659E28757E2BD28E57E2DFE822D770448E6
25,680,987 UART: Caliptra RT
25,681,698 UART: [state] CFI Enabled
25,815,260 UART: [rt] RT listening for mailbox commands...
25,846,845 UART: [rt]cmd =0x43455246, len=4
25,859,632 >>> mbox cmd response data (888 bytes)
25,901,284 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,931,049 UART: [rt]cmd =0x43455252, len=4
25,942,220 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,010 UART:
192,402 UART: Running Caliptra ROM ...
193,592 UART:
193,771 UART: [state] CFI Enabled
262,857 UART: [state] LifecycleState = Unprovisioned
265,258 UART: [state] DebugLocked = No
267,077 UART: [state] WD Timer not started. Device not locked for debugging
271,254 UART: [kat] SHA2-256
461,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,842 UART: [kat] ++
472,325 UART: [kat] sha1
483,770 UART: [kat] SHA2-256
486,847 UART: [kat] SHA2-384
493,117 UART: [kat] SHA2-512-ACC
495,698 UART: [kat] ECC-384
2,949,316 UART: [kat] HMAC-384Kdf
2,972,138 UART: [kat] LMS
3,503,965 UART: [kat] --
3,508,596 UART: [cold-reset] ++
3,510,046 UART: [fht] FHT @ 0x50003400
3,522,309 UART: [idev] ++
3,523,009 UART: [idev] CDI.KEYID = 6
3,523,965 UART: [idev] SUBJECT.KEYID = 7
3,525,076 UART: [idev] UDS.KEYID = 0
3,526,063 ready_for_fw is high
3,526,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,334 UART: [idev] Erasing UDS.KEYID = 0
6,026,315 UART: [idev] Sha1 KeyId Algorithm
6,048,836 UART: [idev] --
6,054,530 UART: [ldev] ++
6,055,221 UART: [ldev] CDI.KEYID = 6
6,056,108 UART: [ldev] SUBJECT.KEYID = 5
6,057,316 UART: [ldev] AUTHORITY.KEYID = 7
6,058,545 UART: [ldev] FE.KEYID = 1
6,100,194 UART: [ldev] Erasing FE.KEYID = 1
8,606,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,593 UART: [ldev] --
10,416,740 UART: [fwproc] Wait for Commands...
10,418,558 UART: [fwproc] Recv command 0x46574c44
10,420,862 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,447 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,051 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,674,271 >>> mbox cmd response: success
14,675,210 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,679,105 UART: [afmc] ++
14,679,737 UART: [afmc] CDI.KEYID = 6
14,680,641 UART: [afmc] SUBJECT.KEYID = 7
14,681,972 UART: [afmc] AUTHORITY.KEYID = 5
17,217,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,194 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,117 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,181 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,340 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,261 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,160 UART: [afmc] --
19,031,889 UART: [cold-reset] --
19,036,624 UART: [state] Locking Datavault
19,040,845 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,033 UART: [state] Locking ICCM
19,045,994 UART: [exit] Launching FMC @ 0x40000130
19,054,666 UART:
19,054,909 UART: Running Caliptra FMC ...
19,056,029 UART:
19,056,191 UART: [state] CFI Enabled
19,114,471 UART: [fht] FMC Alias Private Key: 7
20,881,350 UART: [art] Extend RT PCRs Done
20,882,559 UART: [art] Lock RT PCRs Done
20,884,345 UART: [art] Populate DV Done
20,889,696 UART: [fht] FMC Alias Private Key: 7
20,891,389 UART: [art] Derive CDI
20,892,202 UART: [art] Store in slot 0x4
20,946,915 UART: [art] Derive Key Pair
20,947,981 UART: [art] Store priv key in slot 0x5
23,411,055 UART: [art] Derive Key Pair - Done
23,424,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,876 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,378 UART: [art] PUB.X = B3654606B3C9AE4F144B5058613B4437D2105B90EB7588C3427C3E86E121DE2BA83F47CEB1F526D0A9F1835B154D2D6F
25,145,651 UART: [art] PUB.Y = B6C3C287B8A36C4178785F96376A32F96845A16522B6DA2E84532AE85E0F7C20492B854E23A05E6730D1AB653BB95DC7
25,152,872 UART: [art] SIG.R = B84958A3FF1F37DBEBEEE1269EA932EB8858598B2671B31BF38CDA3A20B0A39314C01D455802B86E228B415A4585AE54
25,160,344 UART: [art] SIG.S = D41E552C8988FCAB7375F029C30815F0DD1816834246984CD651E8416146C9EA24512E94BA2889DD304202C70FCA5891
26,139,255 UART: Caliptra RT
26,139,944 UART: [state] CFI Enabled
26,319,333 UART: [rt] RT listening for mailbox commands...
26,350,584 UART: [rt]cmd =0x43455246, len=4
26,363,171 >>> mbox cmd response data (888 bytes)
26,404,775 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,434,790 UART: [rt]cmd =0x43455252, len=4
26,445,951 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,440,207 ready_for_fw is high
3,440,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,814,700 >>> mbox cmd response: success
14,816,058 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,109,350 UART:
19,109,723 UART: Running Caliptra FMC ...
19,110,865 UART:
19,111,045 UART: [state] CFI Enabled
19,178,166 UART: [fht] FMC Alias Private Key: 7
20,944,177 UART: [art] Extend RT PCRs Done
20,945,391 UART: [art] Lock RT PCRs Done
20,946,906 UART: [art] Populate DV Done
20,952,532 UART: [fht] FMC Alias Private Key: 7
20,954,127 UART: [art] Derive CDI
20,954,940 UART: [art] Store in slot 0x4
21,010,774 UART: [art] Derive Key Pair
21,011,825 UART: [art] Store priv key in slot 0x5
23,474,923 UART: [art] Derive Key Pair - Done
23,487,929 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,914 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,411 UART: [art] PUB.X = 62B84F82CFB315B5AC7F036770CDE6B77A91A6CB3D3A1673EF552BD8B96D019930E59929891BDE6A906ADA3786606059
25,208,722 UART: [art] PUB.Y = 2203C6837FA1472084A611E7A5E524654A489F8DA9AA44ED7C1BDD70AAFBE19B66126F6E28517184F013CDEDFAD0FFED
25,215,972 UART: [art] SIG.R = 1B61F798C9D228A2DEAFB42317FB915A518E7EB678566A3FDB0F522EA7CBC1813AA90C6CA4022874AFFA62A2C8441DA5
25,223,406 UART: [art] SIG.S = 52FF87B578E59732AC44D044A955CCC6882CC1A80A17E205D72DFEE36CCD98A5225B78533BE713A36D6A01D2FD907C32
26,202,140 UART: Caliptra RT
26,202,833 UART: [state] CFI Enabled
26,383,044 UART: [rt] RT listening for mailbox commands...
26,414,453 UART: [rt]cmd =0x43455246, len=4
26,427,081 >>> mbox cmd response data (888 bytes)
26,468,558 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,498,771 UART: [rt]cmd =0x43455252, len=4
26,510,154 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,350 UART:
192,720 UART: Running Caliptra ROM ...
193,854 UART:
603,553 UART: [state] CFI Enabled
615,885 UART: [state] LifecycleState = Unprovisioned
618,263 UART: [state] DebugLocked = No
619,587 UART: [state] WD Timer not started. Device not locked for debugging
625,066 UART: [kat] SHA2-256
814,973 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,711 UART: [kat] ++
826,312 UART: [kat] sha1
836,912 UART: [kat] SHA2-256
839,920 UART: [kat] SHA2-384
846,550 UART: [kat] SHA2-512-ACC
849,135 UART: [kat] ECC-384
3,292,166 UART: [kat] HMAC-384Kdf
3,305,833 UART: [kat] LMS
3,837,673 UART: [kat] --
3,841,145 UART: [cold-reset] ++
3,843,087 UART: [fht] FHT @ 0x50003400
3,854,573 UART: [idev] ++
3,855,288 UART: [idev] CDI.KEYID = 6
3,856,177 UART: [idev] SUBJECT.KEYID = 7
3,857,424 UART: [idev] UDS.KEYID = 0
3,858,377 ready_for_fw is high
3,858,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,531 UART: [idev] Erasing UDS.KEYID = 0
6,337,474 UART: [idev] Sha1 KeyId Algorithm
6,360,912 UART: [idev] --
6,364,794 UART: [ldev] ++
6,365,472 UART: [ldev] CDI.KEYID = 6
6,366,387 UART: [ldev] SUBJECT.KEYID = 5
6,367,596 UART: [ldev] AUTHORITY.KEYID = 7
6,368,775 UART: [ldev] FE.KEYID = 1
6,378,666 UART: [ldev] Erasing FE.KEYID = 1
8,858,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,247 UART: [ldev] --
10,651,160 UART: [fwproc] Wait for Commands...
10,653,855 UART: [fwproc] Recv command 0x46574c44
10,656,111 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,236,112 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,359,732 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,920,784 >>> mbox cmd response: success
14,921,890 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,924,173 UART: [afmc] ++
14,924,883 UART: [afmc] CDI.KEYID = 6
14,926,130 UART: [afmc] SUBJECT.KEYID = 7
14,927,573 UART: [afmc] AUTHORITY.KEYID = 5
17,427,902 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,319 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,285 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,403 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,538 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,470 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,319 UART: [afmc] --
19,224,160 UART: [cold-reset] --
19,227,979 UART: [state] Locking Datavault
19,231,780 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,923 UART: [state] Locking ICCM
19,236,511 UART: [exit] Launching FMC @ 0x40000130
19,245,187 UART:
19,245,429 UART: Running Caliptra FMC ...
19,246,531 UART:
19,246,699 UART: [state] CFI Enabled
19,254,777 UART: [fht] FMC Alias Private Key: 7
21,020,673 UART: [art] Extend RT PCRs Done
21,021,911 UART: [art] Lock RT PCRs Done
21,023,133 UART: [art] Populate DV Done
21,028,500 UART: [fht] FMC Alias Private Key: 7
21,029,995 UART: [art] Derive CDI
21,030,764 UART: [art] Store in slot 0x4
21,073,143 UART: [art] Derive Key Pair
21,074,185 UART: [art] Store priv key in slot 0x5
23,501,012 UART: [art] Derive Key Pair - Done
23,513,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,051 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,561 UART: [art] PUB.X = BF090381DC5848F263CF82E5E363FBE742CBE5A79B120D5ADEA03F03FF343D07A3AF1C901F4BB6E7500B680365C7D6C9
25,228,827 UART: [art] PUB.Y = EBCF3C8601D375EAC5C020CB9E1072FF0F8D71412DD88E5F5AA67EEA2A234ADA9F1DDC56D3E9E6E217CD1A88B0AE2330
25,236,125 UART: [art] SIG.R = 88C8A42D9A5C5A6F4469F4201CCA68415369711D382F61DA5B5A114E1849FF65EEF79D22BB602D49F9E733E4FC80ABFD
25,243,537 UART: [art] SIG.S = DD0969E9298C262472A0939AD6716A45E044B64442331CEAFA097B3D4B411CD9FB2CB6C660ACD8772CE224F843615012
26,222,468 UART: Caliptra RT
26,223,155 UART: [state] CFI Enabled
26,356,194 UART: [rt] RT listening for mailbox commands...
26,387,462 UART: [rt]cmd =0x43455246, len=4
26,400,323 >>> mbox cmd response data (888 bytes)
26,443,248 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,473,255 UART: [rt]cmd =0x43455252, len=4
26,484,457 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,752,359 ready_for_fw is high
3,752,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,999 >>> mbox cmd response: success
15,048,265 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,299,452 UART:
19,300,135 UART: Running Caliptra FMC ...
19,301,260 UART:
19,301,425 UART: [state] CFI Enabled
19,308,777 UART: [fht] FMC Alias Private Key: 7
21,074,963 UART: [art] Extend RT PCRs Done
21,076,213 UART: [art] Lock RT PCRs Done
21,078,096 UART: [art] Populate DV Done
21,083,458 UART: [fht] FMC Alias Private Key: 7
21,085,173 UART: [art] Derive CDI
21,085,997 UART: [art] Store in slot 0x4
21,128,386 UART: [art] Derive Key Pair
21,129,388 UART: [art] Store priv key in slot 0x5
23,556,573 UART: [art] Derive Key Pair - Done
23,569,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,275,991 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,500 UART: [art] PUB.X = 0C2BEBCB50B84E1D87A74D550C5EAE30C92FE60D6A19D8DC0290E2902BC53407A5AF7EACAAE1FA49F4C8EC99F8D5E7E3
25,284,804 UART: [art] PUB.Y = EAF2C9DA5EEDB33A01899FD8B88FAC7BC02E936332A31505496B8E40A2F6EF9B6357531D60662F7E7CD90CAB3F6AFCBC
25,292,058 UART: [art] SIG.R = 8D8A6AF0BB8E55535A3F8142AD8B27266DC169AE5918F83A6B95F02D2FCE7D59A2B48DFB570AE501D8CEFA8D487BC903
25,299,467 UART: [art] SIG.S = 34FB7F2BCDAAE66653743511D3235EF29604B6B873BC855CD1BE9F4C4B66DAFC306D5F18563DEEA57A1979F351E04568
26,278,317 UART: Caliptra RT
26,279,013 UART: [state] CFI Enabled
26,410,602 UART: [rt] RT listening for mailbox commands...
26,442,054 UART: [rt]cmd =0x43455246, len=4
26,454,877 >>> mbox cmd response data (888 bytes)
26,498,098 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,528,105 UART: [rt]cmd =0x43455252, len=4
26,539,422 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,415 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,953 UART: [kat] SHA2-256
881,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,999 UART: [kat] ++
886,151 UART: [kat] sha1
890,435 UART: [kat] SHA2-256
892,373 UART: [kat] SHA2-384
895,106 UART: [kat] SHA2-512-ACC
897,007 UART: [kat] ECC-384
902,640 UART: [kat] HMAC-384Kdf
907,142 UART: [kat] LMS
1,475,338 UART: [kat] --
1,476,309 UART: [cold-reset] ++
1,476,873 UART: [fht] Storing FHT @ 0x50003400
1,479,668 UART: [idev] ++
1,479,836 UART: [idev] CDI.KEYID = 6
1,480,196 UART: [idev] SUBJECT.KEYID = 7
1,480,620 UART: [idev] UDS.KEYID = 0
1,480,965 ready_for_fw is high
1,480,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,552 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,036 UART: [idev] --
1,513,997 UART: [ldev] ++
1,514,165 UART: [ldev] CDI.KEYID = 6
1,514,528 UART: [ldev] SUBJECT.KEYID = 5
1,514,954 UART: [ldev] AUTHORITY.KEYID = 7
1,515,417 UART: [ldev] FE.KEYID = 1
1,520,467 UART: [ldev] Erasing FE.KEYID = 1
1,545,856 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,414 UART: [ldev] --
1,584,757 UART: [fwproc] Waiting for Commands...
1,585,408 UART: [fwproc] Received command 0x46574c44
1,586,199 UART: [fwproc] Received Image of size 118548 bytes
2,931,159 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,441 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,659 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,952 >>> mbox cmd response: success
3,129,952 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,131,202 UART: [afmc] ++
3,131,370 UART: [afmc] CDI.KEYID = 6
3,131,732 UART: [afmc] SUBJECT.KEYID = 7
3,132,157 UART: [afmc] AUTHORITY.KEYID = 5
3,167,384 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,514 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,294 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,003 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,886 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,569 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,289 UART: [afmc] --
3,210,337 UART: [cold-reset] --
3,211,187 UART: [state] Locking Datavault
3,212,220 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,824 UART: [state] Locking ICCM
3,213,392 UART: [exit] Launching FMC @ 0x40000130
3,218,722 UART:
3,218,738 UART: Running Caliptra FMC ...
3,219,146 UART:
3,219,200 UART: [state] CFI Enabled
3,229,822 UART: [fht] FMC Alias Private Key: 7
3,348,968 UART: [art] Extend RT PCRs Done
3,349,396 UART: [art] Lock RT PCRs Done
3,351,194 UART: [art] Populate DV Done
3,359,419 UART: [fht] FMC Alias Private Key: 7
3,360,445 UART: [art] Derive CDI
3,360,725 UART: [art] Store in slot 0x4
3,446,189 UART: [art] Derive Key Pair
3,446,549 UART: [art] Store priv key in slot 0x5
3,459,596 UART: [art] Derive Key Pair - Done
3,474,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,315 UART: [art] PUB.X = C3BF154C168BD77C28E4C7BC0AC11610FDDF177D79DD64E02B83486A86860C04DE8058DD468AE03BF0A1695741D56741
3,498,082 UART: [art] PUB.Y = 0B7991FC163FB726EE113D4307FB75551CDB4A633E0B89B0CF9C4674AC07C3D1B316507463398CD099383568781A5A2C
3,505,018 UART: [art] SIG.R = 0E91FE9763BF3A9CFBB648584BFD228B0B90DCCC24B52B1429BA67B4F04353F0F430E98F405E93866670FCA330F0ADD0
3,511,794 UART: [art] SIG.S = EE1F5C693CF40612D5C4793BA0C3E69350FA1829A533765A2FD39B088AEEB013BA58A0D25C9F232374898401DB8E223B
3,535,443 UART: Caliptra RT
3,535,694 UART: [state] CFI Enabled
3,655,240 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,508 UART: [rt]cmd =0x43455246, len=4
3,697,808 >>> mbox cmd response data (920 bytes)
3,697,809 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,274 UART: [rt]cmd =0x43455252, len=4
3,738,167 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,699 ready_for_fw is high
1,362,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,760 >>> mbox cmd response: success
2,978,760 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,040,751 UART:
3,040,767 UART: Running Caliptra FMC ...
3,041,175 UART:
3,041,229 UART: [state] CFI Enabled
3,051,661 UART: [fht] FMC Alias Private Key: 7
3,170,517 UART: [art] Extend RT PCRs Done
3,170,945 UART: [art] Lock RT PCRs Done
3,172,527 UART: [art] Populate DV Done
3,180,810 UART: [fht] FMC Alias Private Key: 7
3,181,906 UART: [art] Derive CDI
3,182,186 UART: [art] Store in slot 0x4
3,267,802 UART: [art] Derive Key Pair
3,268,162 UART: [art] Store priv key in slot 0x5
3,281,343 UART: [art] Derive Key Pair - Done
3,296,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,582 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,347 UART: [art] PUB.X = 03A86CF8002321D8518209A7F76A6D787CD04B4DA9F00A45FE9F2E61004DBCB20BC09223398FCE46AD3B0188A4F6F98D
3,319,066 UART: [art] PUB.Y = 7B599BD137329ECE2AE2870F319D3AB27F5C7F353AAB66A23DCF5675F4F91E41BBE9E9E5968A817CFE31A7596FEA28AA
3,326,031 UART: [art] SIG.R = A82397CFF37C3D722047978710648D4DFDB0D2ED277DC750834DF8D4C9524F01D09E1A755AE102A734E760AE2CEA8688
3,332,799 UART: [art] SIG.S = DCA0668348DCD0404A18E0F58D22861A1866C3264881B242EE5A65DED65F2FE599237715CC1AD75FCBCA35E77DC64F20
3,356,781 UART: Caliptra RT
3,357,032 UART: [state] CFI Enabled
3,476,213 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,705 UART: [rt]cmd =0x43455246, len=4
3,518,951 >>> mbox cmd response data (920 bytes)
3,518,952 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,271 UART: [rt]cmd =0x43455252, len=4
3,559,033 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,276 UART: [kat] SHA2-256
882,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,322 UART: [kat] ++
886,474 UART: [kat] sha1
890,552 UART: [kat] SHA2-256
892,490 UART: [kat] SHA2-384
895,265 UART: [kat] SHA2-512-ACC
897,166 UART: [kat] ECC-384
902,933 UART: [kat] HMAC-384Kdf
907,669 UART: [kat] LMS
1,475,865 UART: [kat] --
1,476,590 UART: [cold-reset] ++
1,477,064 UART: [fht] Storing FHT @ 0x50003400
1,479,865 UART: [idev] ++
1,480,033 UART: [idev] CDI.KEYID = 6
1,480,393 UART: [idev] SUBJECT.KEYID = 7
1,480,817 UART: [idev] UDS.KEYID = 0
1,481,162 ready_for_fw is high
1,481,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,899 UART: [idev] Erasing UDS.KEYID = 0
1,505,755 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,235 UART: [idev] --
1,515,394 UART: [ldev] ++
1,515,562 UART: [ldev] CDI.KEYID = 6
1,515,925 UART: [ldev] SUBJECT.KEYID = 5
1,516,351 UART: [ldev] AUTHORITY.KEYID = 7
1,516,814 UART: [ldev] FE.KEYID = 1
1,521,914 UART: [ldev] Erasing FE.KEYID = 1
1,547,217 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,431 UART: [ldev] --
1,586,812 UART: [fwproc] Waiting for Commands...
1,587,585 UART: [fwproc] Received command 0x46574c44
1,588,376 UART: [fwproc] Received Image of size 118548 bytes
2,933,412 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,438 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,656 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,051 >>> mbox cmd response: success
3,132,051 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,133,233 UART: [afmc] ++
3,133,401 UART: [afmc] CDI.KEYID = 6
3,133,763 UART: [afmc] SUBJECT.KEYID = 7
3,134,188 UART: [afmc] AUTHORITY.KEYID = 5
3,169,235 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,571 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,351 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,060 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,943 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,626 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,690 UART: [afmc] --
3,212,662 UART: [cold-reset] --
3,213,496 UART: [state] Locking Datavault
3,214,803 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,407 UART: [state] Locking ICCM
3,215,847 UART: [exit] Launching FMC @ 0x40000130
3,221,177 UART:
3,221,193 UART: Running Caliptra FMC ...
3,221,601 UART:
3,221,744 UART: [state] CFI Enabled
3,232,230 UART: [fht] FMC Alias Private Key: 7
3,351,478 UART: [art] Extend RT PCRs Done
3,351,906 UART: [art] Lock RT PCRs Done
3,353,514 UART: [art] Populate DV Done
3,361,587 UART: [fht] FMC Alias Private Key: 7
3,362,751 UART: [art] Derive CDI
3,363,031 UART: [art] Store in slot 0x4
3,448,473 UART: [art] Derive Key Pair
3,448,833 UART: [art] Store priv key in slot 0x5
3,462,224 UART: [art] Derive Key Pair - Done
3,477,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,094 UART: [art] PUB.X = 8EB076B94CCEA279E589B87C8A738850BC0605B21C32BCD4B211DB21EAF1B49F39A44CC2AE9F93E1A69755192C5F2D76
3,499,870 UART: [art] PUB.Y = F8861AC1C069461B6213B953E8C5B6825812139338DD1CFE05965928F653D21DAE1CEA5A28E4A755D737A4766D28C627
3,506,813 UART: [art] SIG.R = B39133018D6295B9682236DD9E45E27885E4058115763AC2FEFE79A06A31E8C0C6E6E8E188AD97C6824CAE573E0AC593
3,513,574 UART: [art] SIG.S = EAB61CE1C6C62B52E70DF5B49ADFCFBA11ACD5BFE0ADC5D7F7F4E371ACDB2EB0F16BE550AFF9C9BE8BFF53D6055582EB
3,537,862 UART: Caliptra RT
3,538,205 UART: [state] CFI Enabled
3,657,962 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,604 UART: [rt]cmd =0x43455246, len=4
3,700,792 >>> mbox cmd response data (920 bytes)
3,700,793 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,256 UART: [rt]cmd =0x43455252, len=4
3,740,950 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,296 ready_for_fw is high
1,363,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,009 >>> mbox cmd response: success
2,983,009 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,045,070 UART:
3,045,086 UART: Running Caliptra FMC ...
3,045,494 UART:
3,045,637 UART: [state] CFI Enabled
3,056,319 UART: [fht] FMC Alias Private Key: 7
3,175,015 UART: [art] Extend RT PCRs Done
3,175,443 UART: [art] Lock RT PCRs Done
3,177,199 UART: [art] Populate DV Done
3,185,444 UART: [fht] FMC Alias Private Key: 7
3,186,392 UART: [art] Derive CDI
3,186,672 UART: [art] Store in slot 0x4
3,272,440 UART: [art] Derive Key Pair
3,272,800 UART: [art] Store priv key in slot 0x5
3,286,087 UART: [art] Derive Key Pair - Done
3,300,470 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,506 UART: [art] PUB.X = E6A9C2D07071B705D8CDB10E5F1213E8F2A1EC9D7A91B4ED8673693E9A6B7D1B7E07EEF8CBBBC743F9EF8AB207020094
3,323,257 UART: [art] PUB.Y = C4DF5DD2E9A2C760E6AC9D489C4884FEC2691FF09FDAFC5EC7F1903B13A1DC855E93CDAA576B145FD7EA7A4A23496B1F
3,330,233 UART: [art] SIG.R = A257668D73D2190F785C3B49BBF86262988D4AE900D0E785B7F1D3863DA9ACA8F9084F23FCDDC33A1276C7F26DEB33C8
3,336,985 UART: [art] SIG.S = 2BE987B5F4D0393E4A3DB0E164ED67674B672CEF9188AEEC90574C5068EEF32BFF51233AA1E2A9633C915303125FB5CF
3,360,248 UART: Caliptra RT
3,360,591 UART: [state] CFI Enabled
3,480,961 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,373 UART: [rt]cmd =0x43455246, len=4
3,523,851 >>> mbox cmd response data (920 bytes)
3,523,852 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,045 UART: [rt]cmd =0x43455252, len=4
3,563,658 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,872 UART: [kat] SHA2-256
901,812 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
915,581 UART: [kat] HMAC-384Kdf
920,251 UART: [kat] LMS
1,168,563 UART: [kat] --
1,169,576 UART: [cold-reset] ++
1,170,054 UART: [fht] FHT @ 0x50003400
1,172,734 UART: [idev] ++
1,172,902 UART: [idev] CDI.KEYID = 6
1,173,263 UART: [idev] SUBJECT.KEYID = 7
1,173,688 UART: [idev] UDS.KEYID = 0
1,174,034 ready_for_fw is high
1,174,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,198,477 UART: [idev] Sha1 KeyId Algorithm
1,207,281 UART: [idev] --
1,208,188 UART: [ldev] ++
1,208,356 UART: [ldev] CDI.KEYID = 6
1,208,720 UART: [ldev] SUBJECT.KEYID = 5
1,209,147 UART: [ldev] AUTHORITY.KEYID = 7
1,209,610 UART: [ldev] FE.KEYID = 1
1,214,556 UART: [ldev] Erasing FE.KEYID = 1
1,240,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,952 UART: [ldev] --
1,279,191 UART: [fwproc] Wait for Commands...
1,279,820 UART: [fwproc] Recv command 0x46574c44
1,280,553 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,509 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,684 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,979 >>> mbox cmd response: success
2,823,979 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,825,097 UART: [afmc] ++
2,825,265 UART: [afmc] CDI.KEYID = 6
2,825,628 UART: [afmc] SUBJECT.KEYID = 7
2,826,054 UART: [afmc] AUTHORITY.KEYID = 5
2,861,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,875 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,585 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,466 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,167 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,870 UART: [afmc] --
2,904,909 UART: [cold-reset] --
2,905,639 UART: [state] Locking Datavault
2,906,750 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,354 UART: [state] Locking ICCM
2,907,826 UART: [exit] Launching FMC @ 0x40000130
2,913,156 UART:
2,913,172 UART: Running Caliptra FMC ...
2,913,580 UART:
2,913,634 UART: [state] CFI Enabled
2,924,284 UART: [fht] FMC Alias Private Key: 7
3,043,966 UART: [art] Extend RT PCRs Done
3,044,394 UART: [art] Lock RT PCRs Done
3,046,118 UART: [art] Populate DV Done
3,054,725 UART: [fht] FMC Alias Private Key: 7
3,055,655 UART: [art] Derive CDI
3,055,935 UART: [art] Store in slot 0x4
3,141,678 UART: [art] Derive Key Pair
3,142,038 UART: [art] Store priv key in slot 0x5
3,154,704 UART: [art] Derive Key Pair - Done
3,169,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,745 UART: [art] PUB.X = BE6AF50E2772016F54FFA61A0943547CB12BEAC919DFB102C1A4871C052B1FE6DC76D0956F26EA31FD45D8FAB480118A
3,192,514 UART: [art] PUB.Y = 279611662B62A6610D641E147524B76BA5D0C0222A5FCDD09BFE38EA2826E820D656BC232DE40DC331013D2369AB79B2
3,199,455 UART: [art] SIG.R = 0019710EE38E1455D22766006A67F4286B5F2B1D35A452B330470EBCCB892FF82EB2E41F81A0E2F19FBB09E96D7A7D93
3,206,176 UART: [art] SIG.S = BDE1A0C13E5985954C38C8982C31C798C53884EAF98B5E3C4C64D23CB3F21354E6C227BC95DB89DC8FA444FDBC92D306
3,229,907 UART: Caliptra RT
3,230,158 UART: [state] CFI Enabled
3,349,021 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,533 UART: [rt]cmd =0x43455246, len=4
3,391,502 >>> mbox cmd response data (888 bytes)
3,391,503 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,420,754 UART: [rt]cmd =0x43455252, len=4
3,431,684 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,712 ready_for_fw is high
1,059,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,592 >>> mbox cmd response: success
2,676,592 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,738,075 UART:
2,738,091 UART: Running Caliptra FMC ...
2,738,499 UART:
2,738,553 UART: [state] CFI Enabled
2,748,963 UART: [fht] FMC Alias Private Key: 7
2,868,061 UART: [art] Extend RT PCRs Done
2,868,489 UART: [art] Lock RT PCRs Done
2,870,017 UART: [art] Populate DV Done
2,878,226 UART: [fht] FMC Alias Private Key: 7
2,879,194 UART: [art] Derive CDI
2,879,474 UART: [art] Store in slot 0x4
2,965,563 UART: [art] Derive Key Pair
2,965,923 UART: [art] Store priv key in slot 0x5
2,979,405 UART: [art] Derive Key Pair - Done
2,994,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,014 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,779 UART: [art] PUB.X = 90A665E95BBB32A4CCA08A5731113B11C730E578B146AE004CE8D1C3ECE68720826C0AB175C44782BB04CCB028910E56
3,016,522 UART: [art] PUB.Y = A79B717B9F57855C3221B317DCEF80808216AE0434C70285E8A08A4A423BC61F578A7F608C413A924EF2B6C7CDF041D4
3,023,468 UART: [art] SIG.R = 4E870C35FBF75CC1C660154482F1889B915A05DAC82354CDB0E5A6A361E323A4E9E8EA7D8C43EDBEBB176173DCC06760
3,030,244 UART: [art] SIG.S = 43753321FAA0D6FACB693E6D51187649D0B182237DE14155DE91F52EFF470B48809C64C2EB165F40041202A1968BD5E6
3,054,435 UART: Caliptra RT
3,054,686 UART: [state] CFI Enabled
3,174,302 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,528 UART: [rt]cmd =0x43455246, len=4
3,216,525 >>> mbox cmd response data (888 bytes)
3,216,526 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,245,735 UART: [rt]cmd =0x43455252, len=4
3,256,584 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Unprovisioned
85,718 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,563 UART: [kat] SHA2-256
891,113 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,716 UART: [kat] LMS
1,169,028 UART: [kat] --
1,169,803 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,172,863 UART: [idev] ++
1,173,031 UART: [idev] CDI.KEYID = 6
1,173,392 UART: [idev] SUBJECT.KEYID = 7
1,173,817 UART: [idev] UDS.KEYID = 0
1,174,163 ready_for_fw is high
1,174,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,912 UART: [idev] Erasing UDS.KEYID = 0
1,199,136 UART: [idev] Sha1 KeyId Algorithm
1,208,090 UART: [idev] --
1,209,147 UART: [ldev] ++
1,209,315 UART: [ldev] CDI.KEYID = 6
1,209,679 UART: [ldev] SUBJECT.KEYID = 5
1,210,106 UART: [ldev] AUTHORITY.KEYID = 7
1,210,569 UART: [ldev] FE.KEYID = 1
1,215,883 UART: [ldev] Erasing FE.KEYID = 1
1,242,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,219 UART: [ldev] --
1,281,596 UART: [fwproc] Wait for Commands...
1,282,223 UART: [fwproc] Recv command 0x46574c44
1,282,956 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,140 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,315 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,682 >>> mbox cmd response: success
2,826,682 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,827,776 UART: [afmc] ++
2,827,944 UART: [afmc] CDI.KEYID = 6
2,828,307 UART: [afmc] SUBJECT.KEYID = 7
2,828,733 UART: [afmc] AUTHORITY.KEYID = 5
2,864,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,372 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,082 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,963 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,664 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,497 UART: [afmc] --
2,907,332 UART: [cold-reset] --
2,908,180 UART: [state] Locking Datavault
2,909,143 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,747 UART: [state] Locking ICCM
2,910,391 UART: [exit] Launching FMC @ 0x40000130
2,915,721 UART:
2,915,737 UART: Running Caliptra FMC ...
2,916,145 UART:
2,916,288 UART: [state] CFI Enabled
2,926,880 UART: [fht] FMC Alias Private Key: 7
3,046,564 UART: [art] Extend RT PCRs Done
3,046,992 UART: [art] Lock RT PCRs Done
3,048,410 UART: [art] Populate DV Done
3,056,693 UART: [fht] FMC Alias Private Key: 7
3,057,799 UART: [art] Derive CDI
3,058,079 UART: [art] Store in slot 0x4
3,143,972 UART: [art] Derive Key Pair
3,144,332 UART: [art] Store priv key in slot 0x5
3,157,896 UART: [art] Derive Key Pair - Done
3,172,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,844 UART: [art] PUB.X = 65C603EDAA2F39ACDF78886608E97D8D31E874098DD9020FC5140147A039C4D6BE41D654E66DF22BD0948CE837690D1C
3,195,597 UART: [art] PUB.Y = 817EDC4BF3971CD61C8E4BA57BB8480FE1B117CE12CE60F1FCF00EB3FF0B798BEF2E88E1668CBFD4CB8F029A68B38414
3,202,559 UART: [art] SIG.R = 1C3E6294EC559051693886E7B424F82D3E871C171EC449CE29F86E55D8CEE8ECBD2A0C6C27CA5785DFDA9D1AC502BE22
3,209,337 UART: [art] SIG.S = D717E2965B6A6C339D8505E1AB9246EF08135CABCCF92DEB340A3D04F84855CD6C1AFB63B147C6A712B37396732F79A7
3,232,947 UART: Caliptra RT
3,233,290 UART: [state] CFI Enabled
3,353,239 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,757 UART: [rt]cmd =0x43455246, len=4
3,395,692 >>> mbox cmd response data (888 bytes)
3,395,693 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,425,154 UART: [rt]cmd =0x43455252, len=4
3,436,087 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,001 ready_for_fw is high
1,059,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,961 >>> mbox cmd response: success
2,679,961 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,741,880 UART:
2,741,896 UART: Running Caliptra FMC ...
2,742,304 UART:
2,742,447 UART: [state] CFI Enabled
2,753,059 UART: [fht] FMC Alias Private Key: 7
2,872,137 UART: [art] Extend RT PCRs Done
2,872,565 UART: [art] Lock RT PCRs Done
2,874,039 UART: [art] Populate DV Done
2,882,178 UART: [fht] FMC Alias Private Key: 7
2,883,276 UART: [art] Derive CDI
2,883,556 UART: [art] Store in slot 0x4
2,969,205 UART: [art] Derive Key Pair
2,969,565 UART: [art] Store priv key in slot 0x5
2,981,961 UART: [art] Derive Key Pair - Done
2,996,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,140 UART: [art] PUB.X = 9F8A83F5A928DB120336631E5AEBC7F0BE0DBC09E5FBF19E5FE38B68847EFDD50A992554DAB14C4042A644C5D2921C72
3,019,912 UART: [art] PUB.Y = CD5492F2EBC37C93EC69030A7A873E6FB21AE3540D3DFC12BA35B22C112F921E2649CACC3FA8BA889CCBBC86D8E50FFA
3,026,876 UART: [art] SIG.R = 56A1C6B184529B4DF3386E95A53BDF276CAB8848CA8A77D1D0DFFE2084E57F5A4F2840C5BC9515BFB9979C1CD0231EE2
3,033,660 UART: [art] SIG.S = 376E7AAFB91E0883A5587E8BC668AEE8037A9F651F34820006C3E1CC7C8A0AFEB1EA1EF86547B1FEA293764130BEA19D
3,057,138 UART: Caliptra RT
3,057,481 UART: [state] CFI Enabled
3,178,545 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,919 UART: [rt]cmd =0x43455246, len=4
3,221,054 >>> mbox cmd response data (888 bytes)
3,221,055 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,250,612 UART: [rt]cmd =0x43455252, len=4
3,261,391 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,532 UART: [state] LifecycleState = Unprovisioned
86,187 UART: [state] DebugLocked = No
86,829 UART: [state] WD Timer not started. Device not locked for debugging
88,156 UART: [kat] SHA2-256
893,806 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,931 UART: [kat] ++
898,083 UART: [kat] sha1
902,355 UART: [kat] SHA2-256
904,295 UART: [kat] SHA2-384
907,032 UART: [kat] SHA2-512-ACC
908,933 UART: [kat] ECC-384
918,908 UART: [kat] HMAC-384Kdf
923,668 UART: [kat] LMS
1,171,996 UART: [kat] --
1,173,071 UART: [cold-reset] ++
1,173,411 UART: [fht] FHT @ 0x50003400
1,176,192 UART: [idev] ++
1,176,360 UART: [idev] CDI.KEYID = 6
1,176,720 UART: [idev] SUBJECT.KEYID = 7
1,177,144 UART: [idev] UDS.KEYID = 0
1,177,489 ready_for_fw is high
1,177,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,092 UART: [idev] Erasing UDS.KEYID = 0
1,201,721 UART: [idev] Sha1 KeyId Algorithm
1,210,199 UART: [idev] --
1,211,225 UART: [ldev] ++
1,211,393 UART: [ldev] CDI.KEYID = 6
1,211,756 UART: [ldev] SUBJECT.KEYID = 5
1,212,182 UART: [ldev] AUTHORITY.KEYID = 7
1,212,645 UART: [ldev] FE.KEYID = 1
1,217,849 UART: [ldev] Erasing FE.KEYID = 1
1,244,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,051 UART: [ldev] --
1,283,434 UART: [fwproc] Wait for Commands...
1,284,228 UART: [fwproc] Recv command 0x46574c44
1,284,956 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,940 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,110 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,419 >>> mbox cmd response: success
2,827,419 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,828,433 UART: [afmc] ++
2,828,601 UART: [afmc] CDI.KEYID = 6
2,828,963 UART: [afmc] SUBJECT.KEYID = 7
2,829,388 UART: [afmc] AUTHORITY.KEYID = 5
2,864,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,554 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,263 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,146 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,847 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,723 UART: [afmc] --
2,907,835 UART: [cold-reset] --
2,908,433 UART: [state] Locking Datavault
2,909,546 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,150 UART: [state] Locking ICCM
2,910,638 UART: [exit] Launching FMC @ 0x40000130
2,915,968 UART:
2,915,984 UART: Running Caliptra FMC ...
2,916,392 UART:
2,916,446 UART: [state] CFI Enabled
2,926,894 UART: [fht] FMC Alias Private Key: 7
3,046,116 UART: [art] Extend RT PCRs Done
3,046,544 UART: [art] Lock RT PCRs Done
3,048,262 UART: [art] Populate DV Done
3,056,499 UART: [fht] FMC Alias Private Key: 7
3,057,559 UART: [art] Derive CDI
3,057,839 UART: [art] Store in slot 0x4
3,144,000 UART: [art] Derive Key Pair
3,144,360 UART: [art] Store priv key in slot 0x5
3,157,760 UART: [art] Derive Key Pair - Done
3,172,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,262 UART: [art] PUB.X = E2D3C9543FB9F516A483F17D5FD6C104CA2492A7AC14CAA493D624C8A0E84B00D3E5BA5FC3BEAB4A70EA53E2BDA71F41
3,195,031 UART: [art] PUB.Y = CEC632AA9B26FF5ACC3F8D70D5696908A6BDFB75A5D721B0DA0855E06F5E5ACC94514F348CE8726701BB2DE4C57CD342
3,201,990 UART: [art] SIG.R = E16238B67F1A7EB0224F7C1D88C6B396774198E84F65982A1832B3DC1BBFCFBD124130EA37B46ACABD847FBEFAD09BEF
3,208,780 UART: [art] SIG.S = EA5E3E9BC8AB84EB8A990FF8B6166A5037AC33EDAC05C39170475845EC0B31D87ACC1F936239E5C00AB8494B47EECB1F
3,232,092 UART: Caliptra RT
3,232,343 UART: [state] CFI Enabled
3,352,287 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,963 UART: [rt]cmd =0x43455246, len=4
3,394,908 >>> mbox cmd response data (888 bytes)
3,394,909 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,424,308 UART: [rt]cmd =0x43455252, len=4
3,435,178 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,827 ready_for_fw is high
1,059,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,568 >>> mbox cmd response: success
2,679,568 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,741,293 UART:
2,741,309 UART: Running Caliptra FMC ...
2,741,717 UART:
2,741,771 UART: [state] CFI Enabled
2,752,147 UART: [fht] FMC Alias Private Key: 7
2,870,821 UART: [art] Extend RT PCRs Done
2,871,249 UART: [art] Lock RT PCRs Done
2,872,659 UART: [art] Populate DV Done
2,880,618 UART: [fht] FMC Alias Private Key: 7
2,881,594 UART: [art] Derive CDI
2,881,874 UART: [art] Store in slot 0x4
2,967,511 UART: [art] Derive Key Pair
2,967,871 UART: [art] Store priv key in slot 0x5
2,980,923 UART: [art] Derive Key Pair - Done
2,995,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,326 UART: [art] PUB.X = 99DBC3A8BADEFF25A87B376B31A3F38AFF51E60B923A95FABE0696B395E173F8FB27DFE2D07F87E9141FE3FE1011C30B
3,019,109 UART: [art] PUB.Y = 232B35800D4FF13305FAD25E2EDF3A097A03641C83A5EB4E4D41E236E51A2186A1475306597A6BFD360CA42BD135BDC2
3,026,047 UART: [art] SIG.R = 5EC432DD01428D55C7D5296B5712878334024A525B5997D1A4EF9BB3E4161A26A3BDA61F70CDDBD9F935FAFB3484E950
3,032,817 UART: [art] SIG.S = CE0440EBF909744BB361A20FB0EC2D0826CEA12C53DE89B6740EB28956FB9A045CE8FF974475B12244EB7115B972C3B6
3,056,847 UART: Caliptra RT
3,057,098 UART: [state] CFI Enabled
3,176,349 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,843 UART: [rt]cmd =0x43455246, len=4
3,218,688 >>> mbox cmd response data (888 bytes)
3,218,689 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,870 UART: [rt]cmd =0x43455252, len=4
3,258,723 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,377 UART: [kat] SHA2-256
894,027 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,152 UART: [kat] ++
898,304 UART: [kat] sha1
902,660 UART: [kat] SHA2-256
904,600 UART: [kat] SHA2-384
907,367 UART: [kat] SHA2-512-ACC
909,268 UART: [kat] ECC-384
919,437 UART: [kat] HMAC-384Kdf
923,981 UART: [kat] LMS
1,172,309 UART: [kat] --
1,173,266 UART: [cold-reset] ++
1,173,822 UART: [fht] FHT @ 0x50003400
1,176,449 UART: [idev] ++
1,176,617 UART: [idev] CDI.KEYID = 6
1,176,977 UART: [idev] SUBJECT.KEYID = 7
1,177,401 UART: [idev] UDS.KEYID = 0
1,177,746 ready_for_fw is high
1,177,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,807 UART: [idev] Erasing UDS.KEYID = 0
1,202,804 UART: [idev] Sha1 KeyId Algorithm
1,211,350 UART: [idev] --
1,212,410 UART: [ldev] ++
1,212,578 UART: [ldev] CDI.KEYID = 6
1,212,941 UART: [ldev] SUBJECT.KEYID = 5
1,213,367 UART: [ldev] AUTHORITY.KEYID = 7
1,213,830 UART: [ldev] FE.KEYID = 1
1,218,956 UART: [ldev] Erasing FE.KEYID = 1
1,245,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,672 UART: [ldev] --
1,285,181 UART: [fwproc] Wait for Commands...
1,285,751 UART: [fwproc] Recv command 0x46574c44
1,286,479 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,839 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,009 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,250 >>> mbox cmd response: success
2,829,250 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,830,444 UART: [afmc] ++
2,830,612 UART: [afmc] CDI.KEYID = 6
2,830,974 UART: [afmc] SUBJECT.KEYID = 7
2,831,399 UART: [afmc] AUTHORITY.KEYID = 5
2,867,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,045 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,754 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,637 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,338 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,252 UART: [afmc] --
2,911,276 UART: [cold-reset] --
2,911,952 UART: [state] Locking Datavault
2,913,069 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,673 UART: [state] Locking ICCM
2,914,249 UART: [exit] Launching FMC @ 0x40000130
2,919,579 UART:
2,919,595 UART: Running Caliptra FMC ...
2,920,003 UART:
2,920,146 UART: [state] CFI Enabled
2,930,514 UART: [fht] FMC Alias Private Key: 7
3,049,400 UART: [art] Extend RT PCRs Done
3,049,828 UART: [art] Lock RT PCRs Done
3,051,262 UART: [art] Populate DV Done
3,059,287 UART: [fht] FMC Alias Private Key: 7
3,060,269 UART: [art] Derive CDI
3,060,549 UART: [art] Store in slot 0x4
3,146,636 UART: [art] Derive Key Pair
3,146,996 UART: [art] Store priv key in slot 0x5
3,160,510 UART: [art] Derive Key Pair - Done
3,175,438 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,413 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,178 UART: [art] PUB.X = B9A488C8AA8DAB3D6D0FD71914D0775CEF8DBDC0BE97F2C04EFDA4851E7AAA4B4D9F35605476D79DBD7A77B1B2B21CF3
3,197,973 UART: [art] PUB.Y = 586DA4E7D395F869FE61379476458D05EA0AD96E8DC7DD5B89A9F11072EDB53169C7C409ACF05AB78C62F412F7871F26
3,204,920 UART: [art] SIG.R = 389F3AB4E2AA502ED82BFC1AD4D27FE7BE1BECC06028B4840B4735E9CDD970AEBF2590DABC53A76D225AA24E1DDB28C2
3,211,715 UART: [art] SIG.S = 87BD07CB53D15CE6C0B2B18F481E2C0AAB3492D8C33A26B1C1BFB237E160539EF8AB6D1CB0034EBFB0D98DFDF652F375
3,235,390 UART: Caliptra RT
3,235,733 UART: [state] CFI Enabled
3,355,768 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,266 UART: [rt]cmd =0x43455246, len=4
3,398,295 >>> mbox cmd response data (888 bytes)
3,398,296 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,427,541 UART: [rt]cmd =0x43455252, len=4
3,438,414 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,810 ready_for_fw is high
1,060,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,981 >>> mbox cmd response: success
2,680,981 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,742,950 UART:
2,742,966 UART: Running Caliptra FMC ...
2,743,374 UART:
2,743,517 UART: [state] CFI Enabled
2,754,443 UART: [fht] FMC Alias Private Key: 7
2,873,147 UART: [art] Extend RT PCRs Done
2,873,575 UART: [art] Lock RT PCRs Done
2,875,137 UART: [art] Populate DV Done
2,883,572 UART: [fht] FMC Alias Private Key: 7
2,884,626 UART: [art] Derive CDI
2,884,906 UART: [art] Store in slot 0x4
2,970,437 UART: [art] Derive Key Pair
2,970,797 UART: [art] Store priv key in slot 0x5
2,984,227 UART: [art] Derive Key Pair - Done
2,998,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,072 UART: [art] PUB.X = 6E93BCA19A9EF5B56AE644E5BA64FB23A51A6BD0D9A8359FC367CA270B1AEA5AA5F1A980F5EB1D27725A060735131A26
3,021,849 UART: [art] PUB.Y = 8DEEB5F42E8BD3AB02E2792199950D45F0AAEFFE2F38C5C04431328C5D9F390C94DA90CFE3629123A89AE1639AC880B9
3,028,802 UART: [art] SIG.R = A2F5C00DA663DD310DAA555AC392634DD363CA3147A74D0789567BE3D4D407AA1348016CC31D1E2D9BC56F63241076D3
3,035,561 UART: [art] SIG.S = 31F3465EC97463174B18244E1C301CA7DDAB0ACC4F66B5D66AEEFB0C472EE578B649A1DCD2C1FDEB3ECFDEB259CF1383
3,059,433 UART: Caliptra RT
3,059,776 UART: [state] CFI Enabled
3,179,111 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,597 UART: [rt]cmd =0x43455246, len=4
3,221,548 >>> mbox cmd response data (888 bytes)
3,221,549 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,250,794 UART: [rt]cmd =0x43455252, len=4
3,261,537 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,206 UART:
192,554 UART: Running Caliptra ROM ...
193,741 UART:
193,888 UART: [state] CFI Enabled
264,785 UART: [state] LifecycleState = Unprovisioned
266,698 UART: [state] DebugLocked = No
268,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,034 UART: [kat] SHA2-256
442,765 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,313 UART: [kat] ++
453,767 UART: [kat] sha1
465,208 UART: [kat] SHA2-256
467,874 UART: [kat] SHA2-384
473,435 UART: [kat] SHA2-512-ACC
475,810 UART: [kat] ECC-384
2,768,424 UART: [kat] HMAC-384Kdf
2,799,849 UART: [kat] LMS
3,990,164 UART: [kat] --
3,995,937 UART: [cold-reset] ++
3,998,587 UART: [fht] Storing FHT @ 0x50003400
4,011,485 UART: [idev] ++
4,012,120 UART: [idev] CDI.KEYID = 6
4,013,232 UART: [idev] SUBJECT.KEYID = 7
4,014,364 UART: [idev] UDS.KEYID = 0
4,015,420 ready_for_fw is high
4,015,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,165,057 UART: [idev] Erasing UDS.KEYID = 0
7,342,587 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,394 UART: [idev] --
7,367,552 UART: [ldev] ++
7,368,125 UART: [ldev] CDI.KEYID = 6
7,369,092 UART: [ldev] SUBJECT.KEYID = 5
7,370,321 UART: [ldev] AUTHORITY.KEYID = 7
7,371,554 UART: [ldev] FE.KEYID = 1
7,399,481 UART: [ldev] Erasing FE.KEYID = 1
10,735,022 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,509 UART: [ldev] --
13,114,999 UART: [fwproc] Waiting for Commands...
13,117,360 UART: [fwproc] Received command 0x46574c44
13,119,551 UART: [fwproc] Received Image of size 118548 bytes
17,222,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,909 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,369,079 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,697,180 >>> mbox cmd response: success
17,698,147 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,703,010 UART: [afmc] ++
17,703,597 UART: [afmc] CDI.KEYID = 6
17,704,562 UART: [afmc] SUBJECT.KEYID = 7
17,705,781 UART: [afmc] AUTHORITY.KEYID = 5
21,070,970 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,366,466 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,368,732 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,383,187 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,397,941 UART: [afmc] SIG.R = 0496C67BA7F71B1EA67BC9CCC915CDE3B7CF2D8D7E9589CB4461368121C369C4E0507A673BC18CF45B9B56D5322CAF64
23,412,253 UART: [afmc] SIG.S = CA7A6A2F55E6ABA1AD199668B52DD658A1318D57261ACBD6263AF71182980DF771B529238ABD43C2EA0A7535D0A3BB03
23,434,427 UART: [afmc] --
23,438,210 UART: [cold-reset] --
23,441,162 UART: [state] Locking Datavault
23,444,952 UART: [state] Locking PCR0, PCR1 and PCR31
23,446,705 UART: [state] Locking ICCM
23,448,369 UART: [exit] Launching FMC @ 0x40000130
23,456,764 UART:
23,457,000 UART: Running Caliptra FMC ...
23,458,110 UART:
23,458,273 UART: [state] CFI Enabled
23,526,545 UART: [fht] FMC Alias Private Key: 7
25,866,852 UART: [art] Extend RT PCRs Done
25,868,090 UART: [art] Lock RT PCRs Done
25,869,671 UART: [art] Populate DV Done
25,875,149 UART: [fht] FMC Alias Private Key: 7
25,876,686 UART: [art] Derive CDI
25,877,498 UART: [art] Store in slot 0x4
25,935,027 UART: [art] Derive Key Pair
25,936,079 UART: [art] Store priv key in slot 0x5
29,229,020 UART: [art] Derive Key Pair - Done
29,242,077 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,529,666 UART: [art] Erasing AUTHORITY.KEYID = 7
31,531,182 UART: [art] PUB.X = 3B12BD3C8B44CDC1383F51A35A3F1BDF4BAA057EA359403DB5C7178C62F9E343A227376C6945355C518E03D9288BEF2C
31,538,440 UART: [art] PUB.Y = 7FBFAC5980D0EFDDD26942BA0177D173326AA4C421A5CD39EEC953839EA0F5F1CCB0DF058DDEBC995A53A1D09FD78D21
31,545,744 UART: [art] SIG.R = B1AD8460E0041F84F97D0198C7996010F920CDE0F489B2E9BCC102C5935802CCA65DD68FDAFED2FD2A34045507B64A09
31,553,108 UART: [art] SIG.S = BCC1D885F48DC26DC29A9572E8CA13913B1016F8FAA81046BAAFF1747AFF77530A62328A755FB18704BFAD35457178BA
32,858,827 UART: Caliptra RT
32,859,533 UART: [state] CFI Enabled
33,034,713 UART: [rt] RT listening for mailbox commands...
33,066,234 UART: [rt]cmd =0x43455252, len=4
33,077,707 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,801,412 ready_for_fw is high
3,801,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,961,459 >>> mbox cmd response: success
17,962,701 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,649,020 UART:
23,649,413 UART: Running Caliptra FMC ...
23,650,548 UART:
23,650,715 UART: [state] CFI Enabled
23,717,522 UART: [fht] FMC Alias Private Key: 7
26,058,075 UART: [art] Extend RT PCRs Done
26,059,309 UART: [art] Lock RT PCRs Done
26,060,723 UART: [art] Populate DV Done
26,066,209 UART: [fht] FMC Alias Private Key: 7
26,067,755 UART: [art] Derive CDI
26,068,572 UART: [art] Store in slot 0x4
26,125,853 UART: [art] Derive Key Pair
26,126,915 UART: [art] Store priv key in slot 0x5
29,419,274 UART: [art] Derive Key Pair - Done
29,432,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,720,564 UART: [art] Erasing AUTHORITY.KEYID = 7
31,722,077 UART: [art] PUB.X = E3185B70A4289CAF2DD8CC92F3ECFD65C49E55A646E636C59478F033F314B72F09B486F45ED86F23BCA04857B238CCDC
31,729,400 UART: [art] PUB.Y = 1892BDEE1C87B6FEF38D5AD34311A388F22736480DDA9F86FACB8B50033E69BE4ED54E12586A38FCAA40E2F75C4E5838
31,736,669 UART: [art] SIG.R = 44D83F8F64DE35C2C625A27A152BA9035D2B92B147F292E9AB8B2548BAA813CA599420D1AB0AC643265731ABEDC86ADF
31,744,065 UART: [art] SIG.S = B3D6DBC3F4E6FF6698097E58938494550AEEF189ECFB183D766C876364AC7029F41370F6E2CED4E70C019B230EB34C69
33,049,857 UART: Caliptra RT
33,050,580 UART: [state] CFI Enabled
33,246,349 UART: [rt] RT listening for mailbox commands...
33,277,556 UART: [rt]cmd =0x43455252, len=4
33,289,015 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,385 UART:
192,748 UART: Running Caliptra ROM ...
193,945 UART:
603,542 UART: [state] CFI Enabled
619,633 UART: [state] LifecycleState = Unprovisioned
621,576 UART: [state] DebugLocked = No
623,246 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,476 UART: [kat] SHA2-256
798,259 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,769 UART: [kat] ++
809,285 UART: [kat] sha1
820,007 UART: [kat] SHA2-256
822,725 UART: [kat] SHA2-384
828,709 UART: [kat] SHA2-512-ACC
831,071 UART: [kat] ECC-384
3,116,658 UART: [kat] HMAC-384Kdf
3,128,606 UART: [kat] LMS
4,318,724 UART: [kat] --
4,323,196 UART: [cold-reset] ++
4,324,776 UART: [fht] Storing FHT @ 0x50003400
4,336,891 UART: [idev] ++
4,337,449 UART: [idev] CDI.KEYID = 6
4,338,399 UART: [idev] SUBJECT.KEYID = 7
4,339,649 UART: [idev] UDS.KEYID = 0
4,340,677 ready_for_fw is high
4,340,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,793 UART: [idev] Erasing UDS.KEYID = 0
7,627,418 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,087 UART: [idev] --
7,652,896 UART: [ldev] ++
7,653,461 UART: [ldev] CDI.KEYID = 6
7,654,421 UART: [ldev] SUBJECT.KEYID = 5
7,655,624 UART: [ldev] AUTHORITY.KEYID = 7
7,656,903 UART: [ldev] FE.KEYID = 1
7,666,208 UART: [ldev] Erasing FE.KEYID = 1
10,948,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,652 UART: [ldev] --
13,310,277 UART: [fwproc] Waiting for Commands...
13,312,970 UART: [fwproc] Received command 0x46574c44
13,315,147 UART: [fwproc] Received Image of size 118548 bytes
17,426,024 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,505,648 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,804 >>> mbox cmd response: success
17,907,861 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,911,179 UART: [afmc] ++
17,911,818 UART: [afmc] CDI.KEYID = 6
17,912,696 UART: [afmc] SUBJECT.KEYID = 7
17,914,159 UART: [afmc] AUTHORITY.KEYID = 5
21,227,882 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,777 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,997 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,448 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,552,190 UART: [afmc] SIG.R = 0496C67BA7F71B1EA67BC9CCC915CDE3B7CF2D8D7E9589CB4461368121C369C4E0507A673BC18CF45B9B56D5322CAF64
23,566,496 UART: [afmc] SIG.S = CA7A6A2F55E6ABA1AD199668B52DD658A1318D57261ACBD6263AF71182980DF771B529238ABD43C2EA0A7535D0A3BB03
23,586,835 UART: [afmc] --
23,591,123 UART: [cold-reset] --
23,595,093 UART: [state] Locking Datavault
23,600,647 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,408 UART: [state] Locking ICCM
23,604,988 UART: [exit] Launching FMC @ 0x40000130
23,613,374 UART:
23,613,607 UART: Running Caliptra FMC ...
23,614,700 UART:
23,614,851 UART: [state] CFI Enabled
23,623,106 UART: [fht] FMC Alias Private Key: 7
25,963,262 UART: [art] Extend RT PCRs Done
25,964,501 UART: [art] Lock RT PCRs Done
25,966,608 UART: [art] Populate DV Done
25,972,118 UART: [fht] FMC Alias Private Key: 7
25,973,819 UART: [art] Derive CDI
25,974,626 UART: [art] Store in slot 0x4
26,016,836 UART: [art] Derive Key Pair
26,017,876 UART: [art] Store priv key in slot 0x5
29,259,855 UART: [art] Derive Key Pair - Done
29,272,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,475 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,980 UART: [art] PUB.X = 46D7D56B982E18228827C2D006BA68FDC4E2F2BD18D38A5FD7E47E77ED0FFB28EB3DB4FA045411AD760B67BB78642FD1
31,562,292 UART: [art] PUB.Y = C79BBA377764925F069887CD09F13A0E358CD11E72864A0BBD6879749A2A808AB30FB0506F3BA2920DFAF8730AB365C7
31,569,528 UART: [art] SIG.R = B6D95D42FDEEF02FD98863DF9924B7ABAE78166007A76E9AF4DBC27201E134DF2176E13B97831D8F9F457B335B2857FB
31,576,923 UART: [art] SIG.S = AB7D7AC34DC4A50C305ED5DF497123D94E8EBE7FEACDE22A86FEC77E2DBB896AA0989C88995B232D565046CED3D142B2
32,882,132 UART: Caliptra RT
32,882,839 UART: [state] CFI Enabled
33,016,775 UART: [rt] RT listening for mailbox commands...
33,048,029 UART: [rt]cmd =0x43455252, len=4
33,059,206 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
4,128,942 ready_for_fw is high
4,129,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,805 >>> mbox cmd response: success
18,160,929 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,806,108 UART:
23,806,473 UART: Running Caliptra FMC ...
23,807,614 UART:
23,807,767 UART: [state] CFI Enabled
23,815,553 UART: [fht] FMC Alias Private Key: 7
26,155,272 UART: [art] Extend RT PCRs Done
26,156,506 UART: [art] Lock RT PCRs Done
26,158,135 UART: [art] Populate DV Done
26,163,514 UART: [fht] FMC Alias Private Key: 7
26,165,063 UART: [art] Derive CDI
26,165,881 UART: [art] Store in slot 0x4
26,208,050 UART: [art] Derive Key Pair
26,209,091 UART: [art] Store priv key in slot 0x5
29,450,944 UART: [art] Derive Key Pair - Done
29,464,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,966 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,466 UART: [art] PUB.X = E87FC78F120D08DB32FF1470684BE827A54AD54BD6FEA3707874714B8ABA9EBAC31F8F7EC08AAB86BA32B9CB61CC4CCE
31,753,711 UART: [art] PUB.Y = CEBAA11D3FEE8D54DFE375AA68630D39793E6F5831A2920250FFB5B742DAA9F35F57002B2517B093C60E1C3FFD08E4D5
31,760,997 UART: [art] SIG.R = 6D99BB0AAFE53A4EE0BE2193C3F7A372B185D9D4237E5C7004BAADBC9D8426CFA9D86868030E1C359525B3AB7F0D2790
31,768,381 UART: [art] SIG.S = 4B237841B89385656AD470AD22557C5E030B22A37298311B9E561E857A32DE808FC67172488F3AB33D8D840AD52E9EA6
33,074,156 UART: Caliptra RT
33,074,869 UART: [state] CFI Enabled
33,208,731 UART: [rt] RT listening for mailbox commands...
33,240,253 UART: [rt]cmd =0x43455252, len=4
33,251,718 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,078 UART:
192,454 UART: Running Caliptra ROM ...
193,555 UART:
193,695 UART: [state] CFI Enabled
262,427 UART: [state] LifecycleState = Unprovisioned
264,426 UART: [state] DebugLocked = No
266,016 UART: [state] WD Timer not started. Device not locked for debugging
270,699 UART: [kat] SHA2-256
450,367 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,109 UART: [kat] ++
461,625 UART: [kat] sha1
472,638 UART: [kat] SHA2-256
475,289 UART: [kat] SHA2-384
480,777 UART: [kat] SHA2-512-ACC
483,140 UART: [kat] ECC-384
2,947,746 UART: [kat] HMAC-384Kdf
2,970,290 UART: [kat] LMS
3,446,799 UART: [kat] --
3,451,358 UART: [cold-reset] ++
3,452,506 UART: [fht] FHT @ 0x50003400
3,463,760 UART: [idev] ++
3,464,338 UART: [idev] CDI.KEYID = 6
3,465,257 UART: [idev] SUBJECT.KEYID = 7
3,466,497 UART: [idev] UDS.KEYID = 0
3,467,542 ready_for_fw is high
3,467,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,887 UART: [idev] Erasing UDS.KEYID = 0
5,984,106 UART: [idev] Sha1 KeyId Algorithm
6,008,059 UART: [idev] --
6,012,115 UART: [ldev] ++
6,012,736 UART: [ldev] CDI.KEYID = 6
6,013,618 UART: [ldev] SUBJECT.KEYID = 5
6,014,830 UART: [ldev] AUTHORITY.KEYID = 7
6,016,115 UART: [ldev] FE.KEYID = 1
6,055,616 UART: [ldev] Erasing FE.KEYID = 1
8,562,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,972 UART: [ldev] --
10,371,206 UART: [fwproc] Wait for Commands...
10,372,751 UART: [fwproc] Recv command 0x46574c44
10,374,695 UART: [fwproc] Recv'd Img size: 118548 bytes
13,848,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,926,758 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,999,822 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,328,255 >>> mbox cmd response: success
14,329,311 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,332,380 UART: [afmc] ++
14,332,973 UART: [afmc] CDI.KEYID = 6
14,333,851 UART: [afmc] SUBJECT.KEYID = 7
14,335,120 UART: [afmc] AUTHORITY.KEYID = 5
16,873,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,789 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,582 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,670 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
18,666,111 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
18,690,647 UART: [afmc] --
18,695,194 UART: [cold-reset] --
18,699,497 UART: [state] Locking Datavault
18,703,170 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,918 UART: [state] Locking ICCM
18,707,116 UART: [exit] Launching FMC @ 0x40000130
18,715,507 UART:
18,715,747 UART: Running Caliptra FMC ...
18,716,846 UART:
18,717,000 UART: [state] CFI Enabled
18,774,307 UART: [fht] FMC Alias Private Key: 7
20,540,874 UART: [art] Extend RT PCRs Done
20,542,093 UART: [art] Lock RT PCRs Done
20,543,746 UART: [art] Populate DV Done
20,549,046 UART: [fht] FMC Alias Private Key: 7
20,550,744 UART: [art] Derive CDI
20,551,479 UART: [art] Store in slot 0x4
20,607,558 UART: [art] Derive Key Pair
20,608,594 UART: [art] Store priv key in slot 0x5
23,071,625 UART: [art] Derive Key Pair - Done
23,084,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,155 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,663 UART: [art] PUB.X = C1FB42AF53274A81EF06BE6B713D9C6B62F1990EF18D963A8D24E319001EB419705BC3FA71B92FBEB24A7382DF9F2CE3
24,805,911 UART: [art] PUB.Y = 505C9E7D74656C1270C0A9EDACF5B4478644096AC693A5A2821DB9473CA33A8B3F6EE42EF9F32471C6BE277D3F04BFB5
24,813,198 UART: [art] SIG.R = CE8B344CF0335CCDE957C0B40002B474B1F1B9D0391DBEDD4C75E361ACD424AEF1D0C354AB600C04284DC1E3711DC355
24,820,598 UART: [art] SIG.S = A96EB4F3E6CAF53720A915145EB6116CE35A00E8E703C70BEBA6C58E4BB8E899B20C6ADD7876337250782D2C6F36D2BC
25,799,728 UART: Caliptra RT
25,800,426 UART: [state] CFI Enabled
25,981,336 UART: [rt] RT listening for mailbox commands...
26,012,795 UART: [rt]cmd =0x43455252, len=4
26,024,311 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
3,460,242 ready_for_fw is high
3,460,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,224,874 >>> mbox cmd response: success
14,225,921 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,512,144 UART:
18,512,515 UART: Running Caliptra FMC ...
18,513,612 UART:
18,513,760 UART: [state] CFI Enabled
18,581,877 UART: [fht] FMC Alias Private Key: 7
20,348,661 UART: [art] Extend RT PCRs Done
20,349,876 UART: [art] Lock RT PCRs Done
20,351,413 UART: [art] Populate DV Done
20,356,660 UART: [fht] FMC Alias Private Key: 7
20,358,358 UART: [art] Derive CDI
20,359,094 UART: [art] Store in slot 0x4
20,414,352 UART: [art] Derive Key Pair
20,415,392 UART: [art] Store priv key in slot 0x5
22,878,265 UART: [art] Derive Key Pair - Done
22,891,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,360 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,845 UART: [art] PUB.X = FA822BF39AE5FF9864696E803D7A5230BE7658171B30D2E5B0C9EE6B5D56A5F1F11F21CE61B48BF9BE0DA140284D2BF2
24,613,155 UART: [art] PUB.Y = E67E639A8F0B7D33F9E9C2785F486E89CBDE6881DAFCB747B4CA781D665914C5102CB7708C2A8F7588915820E7665156
24,620,404 UART: [art] SIG.R = 5F858AF8D37DE616387D0BBE71C604042C0DA49E73E4CC50DE329A3FE2389784CBCCA6D9E01EEBB0E475C62F40595F22
24,627,796 UART: [art] SIG.S = 10B3C9C9541EE8FD9EB53763F3F6C8A9F25C113F130811D5330118E80207BCF8784BB143305B2CAC632ACB5F0F5A61DC
25,606,550 UART: Caliptra RT
25,607,252 UART: [state] CFI Enabled
25,788,648 UART: [rt] RT listening for mailbox commands...
25,820,112 UART: [rt]cmd =0x43455252, len=4
25,831,513 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,328 UART:
192,701 UART: Running Caliptra ROM ...
193,822 UART:
603,514 UART: [state] CFI Enabled
618,482 UART: [state] LifecycleState = Unprovisioned
620,354 UART: [state] DebugLocked = No
623,304 UART: [state] WD Timer not started. Device not locked for debugging
626,358 UART: [kat] SHA2-256
806,036 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,774 UART: [kat] ++
817,252 UART: [kat] sha1
826,972 UART: [kat] SHA2-256
829,626 UART: [kat] SHA2-384
835,477 UART: [kat] SHA2-512-ACC
837,782 UART: [kat] ECC-384
3,276,772 UART: [kat] HMAC-384Kdf
3,290,445 UART: [kat] LMS
3,766,970 UART: [kat] --
3,770,040 UART: [cold-reset] ++
3,772,424 UART: [fht] FHT @ 0x50003400
3,784,470 UART: [idev] ++
3,785,035 UART: [idev] CDI.KEYID = 6
3,785,924 UART: [idev] SUBJECT.KEYID = 7
3,787,242 UART: [idev] UDS.KEYID = 0
3,788,144 ready_for_fw is high
3,788,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,277 UART: [idev] Erasing UDS.KEYID = 0
6,266,534 UART: [idev] Sha1 KeyId Algorithm
6,289,596 UART: [idev] --
6,295,135 UART: [ldev] ++
6,295,767 UART: [ldev] CDI.KEYID = 6
6,296,651 UART: [ldev] SUBJECT.KEYID = 5
6,297,864 UART: [ldev] AUTHORITY.KEYID = 7
6,299,157 UART: [ldev] FE.KEYID = 1
6,311,505 UART: [ldev] Erasing FE.KEYID = 1
8,788,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,201 UART: [ldev] --
10,586,058 UART: [fwproc] Wait for Commands...
10,588,434 UART: [fwproc] Recv command 0x46574c44
10,590,415 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,394 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,457 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,022 >>> mbox cmd response: success
14,556,109 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,560,402 UART: [afmc] ++
14,560,993 UART: [afmc] CDI.KEYID = 6
14,561,897 UART: [afmc] SUBJECT.KEYID = 7
14,563,126 UART: [afmc] AUTHORITY.KEYID = 5
17,069,289 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,700 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,529 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,594 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
18,841,102 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
18,865,426 UART: [afmc] --
18,868,637 UART: [cold-reset] --
18,872,279 UART: [state] Locking Datavault
18,875,906 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,662 UART: [state] Locking ICCM
18,880,296 UART: [exit] Launching FMC @ 0x40000130
18,888,692 UART:
18,888,930 UART: Running Caliptra FMC ...
18,890,054 UART:
18,890,215 UART: [state] CFI Enabled
18,898,327 UART: [fht] FMC Alias Private Key: 7
20,664,109 UART: [art] Extend RT PCRs Done
20,665,332 UART: [art] Lock RT PCRs Done
20,667,035 UART: [art] Populate DV Done
20,672,719 UART: [fht] FMC Alias Private Key: 7
20,674,428 UART: [art] Derive CDI
20,675,169 UART: [art] Store in slot 0x4
20,717,924 UART: [art] Derive Key Pair
20,718,961 UART: [art] Store priv key in slot 0x5
23,145,673 UART: [art] Derive Key Pair - Done
23,158,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,221 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,714 UART: [art] PUB.X = C0393D8E5CB7ED87485F6CFFDC208A13BE68F5FC85A8DE22DCA6BC4DF820175F6197B2115CD3525BF5474F3707C328ED
24,873,953 UART: [art] PUB.Y = 82C770CC42117FF3FB5ED8038204001BC5DA9DC37F93B207117317E4585488345B43843FA7F9DAEFC30F54DEF2DA6273
24,881,254 UART: [art] SIG.R = 1C9D71B71202BE7FDEB481005C79505145F18E8F62ADB332ED4D96825DF92A8D472943B31224D9D34E34560DB1B8BB42
24,888,587 UART: [art] SIG.S = F3C7ACC4B693F87511180C497ACEBF7F9D9B7C3FF6334055B2891B54D86C86212DBB55933690CF3A719D760F6956F020
25,867,927 UART: Caliptra RT
25,868,641 UART: [state] CFI Enabled
26,001,055 UART: [rt] RT listening for mailbox commands...
26,032,536 UART: [rt]cmd =0x43455252, len=4
26,043,890 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
3,781,621 ready_for_fw is high
3,782,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,237 >>> mbox cmd response: success
14,448,580 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,697,455 UART:
18,697,847 UART: Running Caliptra FMC ...
18,698,988 UART:
18,699,148 UART: [state] CFI Enabled
18,706,838 UART: [fht] FMC Alias Private Key: 7
20,472,639 UART: [art] Extend RT PCRs Done
20,473,864 UART: [art] Lock RT PCRs Done
20,475,272 UART: [art] Populate DV Done
20,480,852 UART: [fht] FMC Alias Private Key: 7
20,482,342 UART: [art] Derive CDI
20,483,107 UART: [art] Store in slot 0x4
20,525,994 UART: [art] Derive Key Pair
20,526,998 UART: [art] Store priv key in slot 0x5
22,954,228 UART: [art] Derive Key Pair - Done
22,967,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,725 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,230 UART: [art] PUB.X = 6E13B5FAC2E5176B79A0D2BF4F9252D8D1BD07C951626C49C0DCCA1DEF76A02AAF18D473C2AC6FFC54F262B333E08164
24,682,489 UART: [art] PUB.Y = B06314B18E40BC30E95C3B47B9ADB17330CB31B936A409F676E9D4C8DAA4193D5B12A5E787F14E452F316F920BE1021D
24,689,755 UART: [art] SIG.R = 25DA0E301FDD88951122A9BBB0197E208B4481DCAAB697E6EF0902DA8E2F4758C812A8321E1D935D9E2D3AE29E7FEF0F
24,697,158 UART: [art] SIG.S = FCC47831103D866D79F23C7D9CDE006C592C2F7CF29DA1803253E1588C80CDA69BC5D647122F2164A65DEB7ED02AA8A4
25,676,135 UART: Caliptra RT
25,676,850 UART: [state] CFI Enabled
25,810,062 UART: [rt] RT listening for mailbox commands...
25,841,390 UART: [rt]cmd =0x43455252, len=4
25,852,736 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,986 UART:
192,350 UART: Running Caliptra ROM ...
193,505 UART:
193,650 UART: [state] CFI Enabled
263,383 UART: [state] LifecycleState = Unprovisioned
265,747 UART: [state] DebugLocked = No
268,052 UART: [state] WD Timer not started. Device not locked for debugging
273,522 UART: [kat] SHA2-256
463,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,176 UART: [kat] ++
474,654 UART: [kat] sha1
485,667 UART: [kat] SHA2-256
488,696 UART: [kat] SHA2-384
495,393 UART: [kat] SHA2-512-ACC
497,979 UART: [kat] ECC-384
2,950,475 UART: [kat] HMAC-384Kdf
2,972,376 UART: [kat] LMS
3,504,138 UART: [kat] --
3,510,262 UART: [cold-reset] ++
3,512,756 UART: [fht] FHT @ 0x50003400
3,523,372 UART: [idev] ++
3,524,005 UART: [idev] CDI.KEYID = 6
3,524,986 UART: [idev] SUBJECT.KEYID = 7
3,526,225 UART: [idev] UDS.KEYID = 0
3,527,146 ready_for_fw is high
3,527,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,415 UART: [idev] Erasing UDS.KEYID = 0
6,029,264 UART: [idev] Sha1 KeyId Algorithm
6,052,401 UART: [idev] --
6,056,497 UART: [ldev] ++
6,057,173 UART: [ldev] CDI.KEYID = 6
6,058,083 UART: [ldev] SUBJECT.KEYID = 5
6,059,299 UART: [ldev] AUTHORITY.KEYID = 7
6,060,475 UART: [ldev] FE.KEYID = 1
6,100,282 UART: [ldev] Erasing FE.KEYID = 1
8,604,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,543 UART: [ldev] --
10,414,291 UART: [fwproc] Wait for Commands...
10,417,144 UART: [fwproc] Recv command 0x46574c44
10,419,450 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,171 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,115,794 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,142 >>> mbox cmd response: success
14,677,168 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,681,013 UART: [afmc] ++
14,681,717 UART: [afmc] CDI.KEYID = 6
14,682,963 UART: [afmc] SUBJECT.KEYID = 7
14,684,393 UART: [afmc] AUTHORITY.KEYID = 5
17,214,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,102 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,212 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,365 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
18,986,342 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
19,009,132 UART: [afmc] --
19,012,058 UART: [cold-reset] --
19,016,142 UART: [state] Locking Datavault
19,022,415 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,547 UART: [state] Locking ICCM
19,026,859 UART: [exit] Launching FMC @ 0x40000130
19,035,525 UART:
19,035,769 UART: Running Caliptra FMC ...
19,036,873 UART:
19,037,035 UART: [state] CFI Enabled
19,097,597 UART: [fht] FMC Alias Private Key: 7
20,864,357 UART: [art] Extend RT PCRs Done
20,865,576 UART: [art] Lock RT PCRs Done
20,867,415 UART: [art] Populate DV Done
20,872,713 UART: [fht] FMC Alias Private Key: 7
20,874,244 UART: [art] Derive CDI
20,875,146 UART: [art] Store in slot 0x4
20,930,763 UART: [art] Derive Key Pair
20,931,799 UART: [art] Store priv key in slot 0x5
23,394,547 UART: [art] Derive Key Pair - Done
23,408,185 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,281 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,774 UART: [art] PUB.X = A9CB6437623DF98E08A799D396C8F1684FD0EF57A1949CBA1D117C26A8BD5D66E5811F0E0B1CEB2039EC8A0694F36113
25,129,096 UART: [art] PUB.Y = 67F7BB2374A8FA20E9979C0254DF63397CCF1E72FBB40A49F79B93FBB8F56CC01919A17145227F6D033B111811EF5673
25,136,355 UART: [art] SIG.R = 8C2E3F0B19A9319B67672C36A825367775C46950368CA7E67190E137305CCA6BAA6CB22BFCA6CF384D0CBE8F7B180CDA
25,143,721 UART: [art] SIG.S = 2436F92311EBA673052B19CD9B94E055A367BEDA56CFFF95F8A9D4E24D17ED4753DBA7F473192305FCDDBCBF31030EB3
26,122,764 UART: Caliptra RT
26,123,469 UART: [state] CFI Enabled
26,305,142 UART: [rt] RT listening for mailbox commands...
26,336,610 UART: [rt]cmd =0x43455252, len=4
26,348,069 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,425,285 ready_for_fw is high
3,425,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,810,840 >>> mbox cmd response: success
14,812,228 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,100,113 UART:
19,100,527 UART: Running Caliptra FMC ...
19,101,653 UART:
19,101,813 UART: [state] CFI Enabled
19,165,936 UART: [fht] FMC Alias Private Key: 7
20,932,081 UART: [art] Extend RT PCRs Done
20,933,315 UART: [art] Lock RT PCRs Done
20,934,671 UART: [art] Populate DV Done
20,939,927 UART: [fht] FMC Alias Private Key: 7
20,941,576 UART: [art] Derive CDI
20,942,390 UART: [art] Store in slot 0x4
20,998,335 UART: [art] Derive Key Pair
20,999,378 UART: [art] Store priv key in slot 0x5
23,462,127 UART: [art] Derive Key Pair - Done
23,475,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,188,272 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,784 UART: [art] PUB.X = E3B6B09192B3278A6390B4A69E7AE9059623D10900AB7020832EADCB79464434A0C28F27894A4C9FD9EB69274E9066DB
25,197,057 UART: [art] PUB.Y = 6A5A0CF80445AEE4722A493E7213B752CF27A4F013C524E0E88233F789999EC53FBBFFB0DC08292E0640E03CE21940F5
25,204,266 UART: [art] SIG.R = 378703E348B3689CF4E38E93DB4B4A2363453E4AFF7708A0D48AEE9BCF0DD21FB07E2EE32B82B80181FED39997B49296
25,211,664 UART: [art] SIG.S = A57A59A9EA7126056DDB70560899D9153F13843B1EBAE847F3510F012C796A740B7BFA00D6E32368AA19612845233670
26,190,560 UART: Caliptra RT
26,191,252 UART: [state] CFI Enabled
26,371,072 UART: [rt] RT listening for mailbox commands...
26,402,432 UART: [rt]cmd =0x43455252, len=4
26,413,894 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,419 UART:
192,800 UART: Running Caliptra ROM ...
193,930 UART:
603,555 UART: [state] CFI Enabled
618,364 UART: [state] LifecycleState = Unprovisioned
620,771 UART: [state] DebugLocked = No
623,095 UART: [state] WD Timer not started. Device not locked for debugging
628,454 UART: [kat] SHA2-256
818,335 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,146 UART: [kat] ++
829,756 UART: [kat] sha1
841,283 UART: [kat] SHA2-256
844,300 UART: [kat] SHA2-384
850,153 UART: [kat] SHA2-512-ACC
852,739 UART: [kat] ECC-384
3,297,512 UART: [kat] HMAC-384Kdf
3,311,810 UART: [kat] LMS
3,843,677 UART: [kat] --
3,850,080 UART: [cold-reset] ++
3,851,950 UART: [fht] FHT @ 0x50003400
3,863,367 UART: [idev] ++
3,864,078 UART: [idev] CDI.KEYID = 6
3,865,159 UART: [idev] SUBJECT.KEYID = 7
3,866,286 UART: [idev] UDS.KEYID = 0
3,867,219 ready_for_fw is high
3,867,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,016,564 UART: [idev] Erasing UDS.KEYID = 0
6,347,746 UART: [idev] Sha1 KeyId Algorithm
6,368,759 UART: [idev] --
6,374,372 UART: [ldev] ++
6,375,107 UART: [ldev] CDI.KEYID = 6
6,376,021 UART: [ldev] SUBJECT.KEYID = 5
6,377,181 UART: [ldev] AUTHORITY.KEYID = 7
6,378,433 UART: [ldev] FE.KEYID = 1
6,388,434 UART: [ldev] Erasing FE.KEYID = 1
8,867,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,120 UART: [ldev] --
10,658,225 UART: [fwproc] Wait for Commands...
10,660,697 UART: [fwproc] Recv command 0x46574c44
10,662,952 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,760 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,375 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,348 >>> mbox cmd response: success
14,917,405 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,921,671 UART: [afmc] ++
14,922,376 UART: [afmc] CDI.KEYID = 6
14,923,484 UART: [afmc] SUBJECT.KEYID = 7
14,925,034 UART: [afmc] AUTHORITY.KEYID = 5
17,425,975 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,148,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,150,487 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,165,634 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,180,757 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
19,195,783 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
19,218,938 UART: [afmc] --
19,222,538 UART: [cold-reset] --
19,226,954 UART: [state] Locking Datavault
19,234,256 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,413 UART: [state] Locking ICCM
19,238,357 UART: [exit] Launching FMC @ 0x40000130
19,247,000 UART:
19,247,252 UART: Running Caliptra FMC ...
19,248,358 UART:
19,248,517 UART: [state] CFI Enabled
19,256,868 UART: [fht] FMC Alias Private Key: 7
21,022,436 UART: [art] Extend RT PCRs Done
21,023,674 UART: [art] Lock RT PCRs Done
21,025,387 UART: [art] Populate DV Done
21,030,922 UART: [fht] FMC Alias Private Key: 7
21,032,525 UART: [art] Derive CDI
21,033,348 UART: [art] Store in slot 0x4
21,075,469 UART: [art] Derive Key Pair
21,076,513 UART: [art] Store priv key in slot 0x5
23,503,384 UART: [art] Derive Key Pair - Done
23,516,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,274 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,796 UART: [art] PUB.X = 05A06A9487A9F3EB85607888F5F6836CD22E60953A6683C1D66D5EC926C1C85EBD22442B46CF4B37C01FB61FE83BED75
25,232,030 UART: [art] PUB.Y = A0522DB5227E1D68EE282DA6BF8136A199B08D928EC6CB1A3D4FCFCF2309CFB7818553A2512B318489A5C72B7CA66600
25,239,295 UART: [art] SIG.R = 754A12CC5D62CB46BA8427EC44B860D0E64DAECAAA82401A208FFBEAAC9EDCD10E852C538C77487B36A333BBAF5CF61F
25,246,716 UART: [art] SIG.S = 42756733323CE2332E49C71B90DEEA9B225889D1FF50240B789A03E86DB445A2818E7F84F0B051C9E385C2B481F42D13
26,225,391 UART: Caliptra RT
26,226,081 UART: [state] CFI Enabled
26,359,260 UART: [rt] RT listening for mailbox commands...
26,390,892 UART: [rt]cmd =0x43455252, len=4
26,402,297 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,753,070 ready_for_fw is high
3,753,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,285 >>> mbox cmd response: success
15,038,481 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,288,512 UART:
19,288,894 UART: Running Caliptra FMC ...
19,290,007 UART:
19,290,169 UART: [state] CFI Enabled
19,297,919 UART: [fht] FMC Alias Private Key: 7
21,064,346 UART: [art] Extend RT PCRs Done
21,065,581 UART: [art] Lock RT PCRs Done
21,067,186 UART: [art] Populate DV Done
21,072,394 UART: [fht] FMC Alias Private Key: 7
21,074,052 UART: [art] Derive CDI
21,074,877 UART: [art] Store in slot 0x4
21,117,246 UART: [art] Derive Key Pair
21,118,287 UART: [art] Store priv key in slot 0x5
23,545,282 UART: [art] Derive Key Pair - Done
23,558,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,264,734 UART: [art] Erasing AUTHORITY.KEYID = 7
25,266,247 UART: [art] PUB.X = 36BBD6878DAC52F62C1D187770D7748A39156C323D479F4F053C6DE88480DFA5DD93D1F29065CA7D614C32949643B93F
25,273,519 UART: [art] PUB.Y = 41E740EA85AA79E163F9788E0CC519381C2373D07C4CB5ED7BA70B93B45EAC9698C16CD5B34762F14E83C02C022C4B71
25,280,790 UART: [art] SIG.R = 9E2891CE631EEFFF90CBBE82A1F9F3449938A72CA56A3891D3F54D007A8CC89AEE57EE942A948C9EC3BFE51CF46E6A35
25,288,140 UART: [art] SIG.S = 0875154163E09C6B9D8851495F3BB19E7DF65F00199B5983854DDB3243E8F5B1585482A0B964F94C51D483EFCE294A4D
26,267,214 UART: Caliptra RT
26,267,908 UART: [state] CFI Enabled
26,401,351 UART: [rt] RT listening for mailbox commands...
26,432,555 UART: [rt]cmd =0x43455252, len=4
26,444,082 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,171 UART: [kat] SHA2-256
882,102 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,217 UART: [kat] ++
886,369 UART: [kat] sha1
890,797 UART: [kat] SHA2-256
892,735 UART: [kat] SHA2-384
895,632 UART: [kat] SHA2-512-ACC
897,533 UART: [kat] ECC-384
903,194 UART: [kat] HMAC-384Kdf
907,666 UART: [kat] LMS
1,475,862 UART: [kat] --
1,476,925 UART: [cold-reset] ++
1,477,419 UART: [fht] Storing FHT @ 0x50003400
1,480,214 UART: [idev] ++
1,480,382 UART: [idev] CDI.KEYID = 6
1,480,742 UART: [idev] SUBJECT.KEYID = 7
1,481,166 UART: [idev] UDS.KEYID = 0
1,481,511 ready_for_fw is high
1,481,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,860 UART: [idev] Erasing UDS.KEYID = 0
1,505,290 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,894 UART: [idev] --
1,515,001 UART: [ldev] ++
1,515,169 UART: [ldev] CDI.KEYID = 6
1,515,532 UART: [ldev] SUBJECT.KEYID = 5
1,515,958 UART: [ldev] AUTHORITY.KEYID = 7
1,516,421 UART: [ldev] FE.KEYID = 1
1,521,297 UART: [ldev] Erasing FE.KEYID = 1
1,547,126 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,248 UART: [ldev] --
1,586,657 UART: [fwproc] Waiting for Commands...
1,587,340 UART: [fwproc] Received command 0x46574c44
1,588,131 UART: [fwproc] Received Image of size 118548 bytes
2,932,065 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,773 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,991 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,198 >>> mbox cmd response: success
3,131,198 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,132,566 UART: [afmc] ++
3,132,734 UART: [afmc] CDI.KEYID = 6
3,133,096 UART: [afmc] SUBJECT.KEYID = 7
3,133,521 UART: [afmc] AUTHORITY.KEYID = 5
3,168,808 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,828 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,608 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,317 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,200 UART: [afmc] SIG.R = 0496C67BA7F71B1EA67BC9CCC915CDE3B7CF2D8D7E9589CB4461368121C369C4E0507A673BC18CF45B9B56D5322CAF64
3,202,915 UART: [afmc] SIG.S = CA7A6A2F55E6ABA1AD199668B52DD658A1318D57261ACBD6263AF71182980DF771B529238ABD43C2EA0A7535D0A3BB03
3,210,628 UART: [afmc] --
3,211,506 UART: [cold-reset] --
3,212,514 UART: [state] Locking Datavault
3,213,951 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,555 UART: [state] Locking ICCM
3,214,999 UART: [exit] Launching FMC @ 0x40000130
3,220,329 UART:
3,220,345 UART: Running Caliptra FMC ...
3,220,753 UART:
3,220,807 UART: [state] CFI Enabled
3,231,579 UART: [fht] FMC Alias Private Key: 7
3,349,827 UART: [art] Extend RT PCRs Done
3,350,255 UART: [art] Lock RT PCRs Done
3,351,953 UART: [art] Populate DV Done
3,360,308 UART: [fht] FMC Alias Private Key: 7
3,361,484 UART: [art] Derive CDI
3,361,764 UART: [art] Store in slot 0x4
3,447,534 UART: [art] Derive Key Pair
3,447,894 UART: [art] Store priv key in slot 0x5
3,461,533 UART: [art] Derive Key Pair - Done
3,476,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,822 UART: [art] PUB.X = C65CB4319A415BB6B168E0B587748A103A62768F60243E692F1F11ADA8E20E8F574E4715C5E9AB184F815B3BEDA1831C
3,499,593 UART: [art] PUB.Y = 19EFD7C9310A0840E3C4E60C254750221BF57F2D31AD4B1C30CAC474D3C59B6259474BA8811A77005A973172AD7BC751
3,506,512 UART: [art] SIG.R = 5556E2AD3EAD7D69EB0E59C7591664D60467EB8402DA5D54CB73B40DB999125AE88FB9B29B49ADB081E42959612484AE
3,513,276 UART: [art] SIG.S = A5F28086B570196DDB7471A0B7C5E189EBE9E3B4AAEA233C4AE8A4F3AE16979D632AB9A0A39E8FB207DB54D90C5A0986
3,536,349 UART: Caliptra RT
3,536,600 UART: [state] CFI Enabled
3,658,555 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,995 UART: [rt]cmd =0x43455252, len=4
3,700,090 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,241 ready_for_fw is high
1,362,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,200 >>> mbox cmd response: success
2,981,200 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,043,615 UART:
3,043,631 UART: Running Caliptra FMC ...
3,044,039 UART:
3,044,093 UART: [state] CFI Enabled
3,054,633 UART: [fht] FMC Alias Private Key: 7
3,173,361 UART: [art] Extend RT PCRs Done
3,173,789 UART: [art] Lock RT PCRs Done
3,175,465 UART: [art] Populate DV Done
3,183,664 UART: [fht] FMC Alias Private Key: 7
3,184,716 UART: [art] Derive CDI
3,184,996 UART: [art] Store in slot 0x4
3,270,812 UART: [art] Derive Key Pair
3,271,172 UART: [art] Store priv key in slot 0x5
3,284,325 UART: [art] Derive Key Pair - Done
3,299,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,195 UART: [art] PUB.X = DD9AF1CA96E6C555E9519AEC8A88667AEB8648E84FA88B8C0A5E14012A4E174F70109532D8C048EA0D4CEC71ECA7C644
3,321,970 UART: [art] PUB.Y = 607CA03AF249401DCD1BA0AE3C2416D24C3B2DB455A4BFCFC992203B00576CEA9DD8823BF6A238CD4DE0A06889580B26
3,328,909 UART: [art] SIG.R = 310472E66CA173BC07F8C99264CA7581ED5E20DB198BF867ABA6A79EEEA3418441FD29270DBE96047F3A3934F1D1F8B2
3,335,675 UART: [art] SIG.S = DF4AD02D7EB8BBAA2A007BB1F00CBA41767CF2E1E05C0404F14F29452B30083FA6328B76759C0F868CE8401DB30C0FA7
3,359,364 UART: Caliptra RT
3,359,615 UART: [state] CFI Enabled
3,479,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,458 UART: [rt]cmd =0x43455252, len=4
3,521,269 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
86,942 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,496 UART: [kat] SHA2-256
882,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,542 UART: [kat] ++
886,694 UART: [kat] sha1
890,970 UART: [kat] SHA2-256
892,908 UART: [kat] SHA2-384
895,659 UART: [kat] SHA2-512-ACC
897,560 UART: [kat] ECC-384
903,247 UART: [kat] HMAC-384Kdf
908,119 UART: [kat] LMS
1,476,315 UART: [kat] --
1,477,392 UART: [cold-reset] ++
1,477,758 UART: [fht] Storing FHT @ 0x50003400
1,480,593 UART: [idev] ++
1,480,761 UART: [idev] CDI.KEYID = 6
1,481,121 UART: [idev] SUBJECT.KEYID = 7
1,481,545 UART: [idev] UDS.KEYID = 0
1,481,890 ready_for_fw is high
1,481,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,385 UART: [idev] Erasing UDS.KEYID = 0
1,506,475 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,881 UART: [idev] --
1,515,906 UART: [ldev] ++
1,516,074 UART: [ldev] CDI.KEYID = 6
1,516,437 UART: [ldev] SUBJECT.KEYID = 5
1,516,863 UART: [ldev] AUTHORITY.KEYID = 7
1,517,326 UART: [ldev] FE.KEYID = 1
1,522,758 UART: [ldev] Erasing FE.KEYID = 1
1,548,209 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,381 UART: [ldev] --
1,587,894 UART: [fwproc] Waiting for Commands...
1,588,517 UART: [fwproc] Received command 0x46574c44
1,589,308 UART: [fwproc] Received Image of size 118548 bytes
2,933,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,536 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,754 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,115 >>> mbox cmd response: success
3,132,115 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,133,343 UART: [afmc] ++
3,133,511 UART: [afmc] CDI.KEYID = 6
3,133,873 UART: [afmc] SUBJECT.KEYID = 7
3,134,298 UART: [afmc] AUTHORITY.KEYID = 5
3,169,857 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,973 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,753 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,462 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,345 UART: [afmc] SIG.R = 0496C67BA7F71B1EA67BC9CCC915CDE3B7CF2D8D7E9589CB4461368121C369C4E0507A673BC18CF45B9B56D5322CAF64
3,204,060 UART: [afmc] SIG.S = CA7A6A2F55E6ABA1AD199668B52DD658A1318D57261ACBD6263AF71182980DF771B529238ABD43C2EA0A7535D0A3BB03
3,211,873 UART: [afmc] --
3,212,859 UART: [cold-reset] --
3,213,971 UART: [state] Locking Datavault
3,214,970 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,574 UART: [state] Locking ICCM
3,216,236 UART: [exit] Launching FMC @ 0x40000130
3,221,566 UART:
3,221,582 UART: Running Caliptra FMC ...
3,221,990 UART:
3,222,133 UART: [state] CFI Enabled
3,232,987 UART: [fht] FMC Alias Private Key: 7
3,351,685 UART: [art] Extend RT PCRs Done
3,352,113 UART: [art] Lock RT PCRs Done
3,353,495 UART: [art] Populate DV Done
3,361,714 UART: [fht] FMC Alias Private Key: 7
3,362,812 UART: [art] Derive CDI
3,363,092 UART: [art] Store in slot 0x4
3,448,728 UART: [art] Derive Key Pair
3,449,088 UART: [art] Store priv key in slot 0x5
3,462,409 UART: [art] Derive Key Pair - Done
3,477,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,349 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,114 UART: [art] PUB.X = 8231ED279FB83DD8FC5A2DD3F0412B00A03D3E5D70866799CE77EEF342F9AF39A0D444749008D970D5EEF46BCE922E01
3,499,866 UART: [art] PUB.Y = 7A1C8B584F0FCFB851A1EEF43999B8E0190DA97DBCE128D44F6E60DFADA501F7C9044F29E43C1D34C821EE1C3C73E5EA
3,506,826 UART: [art] SIG.R = FB87322414AF4230EAD067451C65102733393AB8034589650CA41E20CE027531653C3B2EAA288701CCABA8701EEE9209
3,513,575 UART: [art] SIG.S = DD2C5C93726E45CFAB99897FB03F936DAB583747D8E28DA39F8C72B1F512E4C227A66C341181CEB8C8FB02E9FD3839D2
3,537,792 UART: Caliptra RT
3,538,135 UART: [state] CFI Enabled
3,658,553 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,295 UART: [rt]cmd =0x43455252, len=4
3,700,013 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,338 ready_for_fw is high
1,363,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,285 >>> mbox cmd response: success
2,981,285 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,043,412 UART:
3,043,428 UART: Running Caliptra FMC ...
3,043,836 UART:
3,043,979 UART: [state] CFI Enabled
3,054,673 UART: [fht] FMC Alias Private Key: 7
3,173,727 UART: [art] Extend RT PCRs Done
3,174,155 UART: [art] Lock RT PCRs Done
3,175,893 UART: [art] Populate DV Done
3,184,008 UART: [fht] FMC Alias Private Key: 7
3,185,006 UART: [art] Derive CDI
3,185,286 UART: [art] Store in slot 0x4
3,270,890 UART: [art] Derive Key Pair
3,271,250 UART: [art] Store priv key in slot 0x5
3,284,529 UART: [art] Derive Key Pair - Done
3,299,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,343 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,108 UART: [art] PUB.X = A0327EA6DD3DF822C841B0C67FBA6902268F0C5EA338C3CDCDC1B9B273DCEE6CBEEC3AADC942CD6F5BDBED6759031705
3,322,896 UART: [art] PUB.Y = 9566720AAD8A831926C256DC219C22D61346467D5BE120A42C4297E5A9849F6857B74F3E9AA9B9B71C1A259EA9187269
3,329,837 UART: [art] SIG.R = 646F68C912E30D71AE635D09BBCF34AAA697322612B8C087357971CB9A9466317E2E57CEF4F72137141D2DA24E3D80CD
3,336,603 UART: [art] SIG.S = F4B504CC0F403698629C00A7E006F20D0893914EB8EF12CBDF99A0CC2F771CF99B7B661BB81998EFC52F20F59CD09852
3,359,690 UART: Caliptra RT
3,360,033 UART: [state] CFI Enabled
3,479,998 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,392 UART: [rt]cmd =0x43455252, len=4
3,521,261 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
890,972 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,076 UART: [kat] ++
895,228 UART: [kat] sha1
899,340 UART: [kat] SHA2-256
901,280 UART: [kat] SHA2-384
904,063 UART: [kat] SHA2-512-ACC
905,964 UART: [kat] ECC-384
915,507 UART: [kat] HMAC-384Kdf
920,179 UART: [kat] LMS
1,168,491 UART: [kat] --
1,169,128 UART: [cold-reset] ++
1,169,594 UART: [fht] FHT @ 0x50003400
1,172,304 UART: [idev] ++
1,172,472 UART: [idev] CDI.KEYID = 6
1,172,833 UART: [idev] SUBJECT.KEYID = 7
1,173,258 UART: [idev] UDS.KEYID = 0
1,173,604 ready_for_fw is high
1,173,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,421 UART: [idev] Erasing UDS.KEYID = 0
1,198,429 UART: [idev] Sha1 KeyId Algorithm
1,207,487 UART: [idev] --
1,208,590 UART: [ldev] ++
1,208,758 UART: [ldev] CDI.KEYID = 6
1,209,122 UART: [ldev] SUBJECT.KEYID = 5
1,209,549 UART: [ldev] AUTHORITY.KEYID = 7
1,210,012 UART: [ldev] FE.KEYID = 1
1,215,290 UART: [ldev] Erasing FE.KEYID = 1
1,242,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,162 UART: [ldev] --
1,281,481 UART: [fwproc] Wait for Commands...
1,282,224 UART: [fwproc] Recv command 0x46574c44
1,282,957 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,177 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,352 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,605 >>> mbox cmd response: success
2,825,605 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,827,005 UART: [afmc] ++
2,827,173 UART: [afmc] CDI.KEYID = 6
2,827,536 UART: [afmc] SUBJECT.KEYID = 7
2,827,962 UART: [afmc] AUTHORITY.KEYID = 5
2,862,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,019 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,729 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,610 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
2,897,311 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
2,905,274 UART: [afmc] --
2,906,311 UART: [cold-reset] --
2,906,997 UART: [state] Locking Datavault
2,908,002 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,606 UART: [state] Locking ICCM
2,909,200 UART: [exit] Launching FMC @ 0x40000130
2,914,530 UART:
2,914,546 UART: Running Caliptra FMC ...
2,914,954 UART:
2,915,008 UART: [state] CFI Enabled
2,926,194 UART: [fht] FMC Alias Private Key: 7
3,045,450 UART: [art] Extend RT PCRs Done
3,045,878 UART: [art] Lock RT PCRs Done
3,047,546 UART: [art] Populate DV Done
3,055,581 UART: [fht] FMC Alias Private Key: 7
3,056,563 UART: [art] Derive CDI
3,056,843 UART: [art] Store in slot 0x4
3,142,214 UART: [art] Derive Key Pair
3,142,574 UART: [art] Store priv key in slot 0x5
3,155,850 UART: [art] Derive Key Pair - Done
3,170,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,207 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,972 UART: [art] PUB.X = 5A0457D6EC55079B070B809B0057D8722CAF6DC67BF1B99F950C3F02DB28D6BFBD853470D66EB0D90FD21FAA6CBDD369
3,193,715 UART: [art] PUB.Y = 530438EDAF0797FB7DA92EFE1CF663AC54678941F0089011694AAC5506F3C213A86105908FC00F5AB55899ED5D421451
3,200,645 UART: [art] SIG.R = 4FB4F3EC7E28362EED82C35C26F717C69EC528303521D21B54E56166EDC1EF4693E30B59C96D9F088AF8166BDE619677
3,207,413 UART: [art] SIG.S = 8EA788CBEF93475C4AE366E66A93CC4F541D393BDEF553BD9EF74CC84A0590464533DC84ADAB5CD7C60AAE36E6B658D5
3,231,409 UART: Caliptra RT
3,231,660 UART: [state] CFI Enabled
3,351,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,336 UART: [rt]cmd =0x43455252, len=4
3,393,355 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,444 ready_for_fw is high
1,059,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,418 >>> mbox cmd response: success
2,677,418 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,738,825 UART:
2,738,841 UART: Running Caliptra FMC ...
2,739,249 UART:
2,739,303 UART: [state] CFI Enabled
2,750,107 UART: [fht] FMC Alias Private Key: 7
2,869,003 UART: [art] Extend RT PCRs Done
2,869,431 UART: [art] Lock RT PCRs Done
2,870,633 UART: [art] Populate DV Done
2,878,984 UART: [fht] FMC Alias Private Key: 7
2,880,032 UART: [art] Derive CDI
2,880,312 UART: [art] Store in slot 0x4
2,965,857 UART: [art] Derive Key Pair
2,966,217 UART: [art] Store priv key in slot 0x5
2,979,379 UART: [art] Derive Key Pair - Done
2,994,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,598 UART: [art] PUB.X = D05C0155DEB7C05080BC3A0D72ED3D1633048D087F5D8CE642923DE2D280B897E98B7B2DD8E46985C260BDC6A592D0DD
3,017,366 UART: [art] PUB.Y = C61D52F0B54BE909B5618FC098797D60CE57B50D1D152F2B3FB92E3B6777E93A36AA024AAA3F7F5B679C28B0F84099AD
3,024,317 UART: [art] SIG.R = 8892416DDCB56C14484A043B25A5D6F02F185129E82D0A53C449F56F90F7719F6C0706501AEB61EE900638FFA3CD08B9
3,031,069 UART: [art] SIG.S = 9CFAB3CA3EE0A1796ECE1A74D88F8232080523442CF395749BD76652A875C64DF922283F57DB79B7F5195DD0CA02121F
3,054,332 UART: Caliptra RT
3,054,583 UART: [state] CFI Enabled
3,173,966 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,468 UART: [rt]cmd =0x43455252, len=4
3,215,304 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,921 UART: [state] LifecycleState = Unprovisioned
85,576 UART: [state] DebugLocked = No
86,212 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
891,085 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,189 UART: [kat] ++
895,341 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
915,938 UART: [kat] HMAC-384Kdf
920,638 UART: [kat] LMS
1,168,950 UART: [kat] --
1,169,799 UART: [cold-reset] ++
1,170,219 UART: [fht] FHT @ 0x50003400
1,172,787 UART: [idev] ++
1,172,955 UART: [idev] CDI.KEYID = 6
1,173,316 UART: [idev] SUBJECT.KEYID = 7
1,173,741 UART: [idev] UDS.KEYID = 0
1,174,087 ready_for_fw is high
1,174,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,584 UART: [idev] Erasing UDS.KEYID = 0
1,198,590 UART: [idev] Sha1 KeyId Algorithm
1,207,388 UART: [idev] --
1,208,527 UART: [ldev] ++
1,208,695 UART: [ldev] CDI.KEYID = 6
1,209,059 UART: [ldev] SUBJECT.KEYID = 5
1,209,486 UART: [ldev] AUTHORITY.KEYID = 7
1,209,949 UART: [ldev] FE.KEYID = 1
1,215,331 UART: [ldev] Erasing FE.KEYID = 1
1,242,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,403 UART: [ldev] --
1,281,816 UART: [fwproc] Wait for Commands...
1,282,463 UART: [fwproc] Recv command 0x46574c44
1,283,196 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,630 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,805 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,988 >>> mbox cmd response: success
2,825,988 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,827,354 UART: [afmc] ++
2,827,522 UART: [afmc] CDI.KEYID = 6
2,827,885 UART: [afmc] SUBJECT.KEYID = 7
2,828,311 UART: [afmc] AUTHORITY.KEYID = 5
2,863,410 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,662 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,372 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,253 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
2,897,954 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
2,905,737 UART: [afmc] --
2,906,584 UART: [cold-reset] --
2,907,658 UART: [state] Locking Datavault
2,909,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,649 UART: [state] Locking ICCM
2,910,299 UART: [exit] Launching FMC @ 0x40000130
2,915,629 UART:
2,915,645 UART: Running Caliptra FMC ...
2,916,053 UART:
2,916,196 UART: [state] CFI Enabled
2,926,886 UART: [fht] FMC Alias Private Key: 7
3,046,128 UART: [art] Extend RT PCRs Done
3,046,556 UART: [art] Lock RT PCRs Done
3,047,936 UART: [art] Populate DV Done
3,056,235 UART: [fht] FMC Alias Private Key: 7
3,057,333 UART: [art] Derive CDI
3,057,613 UART: [art] Store in slot 0x4
3,144,070 UART: [art] Derive Key Pair
3,144,430 UART: [art] Store priv key in slot 0x5
3,157,884 UART: [art] Derive Key Pair - Done
3,173,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,211 UART: [art] PUB.X = B9802912413E0FCED53E7F321A33B8AF57721796D88E4C5B5683C108CD468D862CD061D20C32063436975FCD53E0A9F7
3,195,967 UART: [art] PUB.Y = A572AEC86F7BE761506F8A4247AEBCB78D85BB9CF2F9B12AC5D292EC1E1F48E4C211C2A81974C676110E0A641E7671D7
3,202,923 UART: [art] SIG.R = BB49901EF8D5E19F7AF32A722251E5860BF97875CB18E10387DC32C5B03F26C67A428884205A399270D8DA33921B3AFF
3,209,687 UART: [art] SIG.S = 47D69CFD5760922571B8FBEB40C4897F6E6E3CFD19342E40D9375E5975F8FD83EA5576BFBE9CCBBAE43045AE7448238A
3,233,867 UART: Caliptra RT
3,234,210 UART: [state] CFI Enabled
3,354,450 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,972 UART: [rt]cmd =0x43455252, len=4
3,395,857 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,195 ready_for_fw is high
1,060,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,797 >>> mbox cmd response: success
2,680,797 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,743,876 UART:
2,743,892 UART: Running Caliptra FMC ...
2,744,300 UART:
2,744,443 UART: [state] CFI Enabled
2,755,175 UART: [fht] FMC Alias Private Key: 7
2,874,271 UART: [art] Extend RT PCRs Done
2,874,699 UART: [art] Lock RT PCRs Done
2,876,663 UART: [art] Populate DV Done
2,884,886 UART: [fht] FMC Alias Private Key: 7
2,885,946 UART: [art] Derive CDI
2,886,226 UART: [art] Store in slot 0x4
2,971,987 UART: [art] Derive Key Pair
2,972,347 UART: [art] Store priv key in slot 0x5
2,986,007 UART: [art] Derive Key Pair - Done
3,000,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,625 UART: [art] PUB.X = 123AFEB9957EB9693A3FE3D5206890C0EAD1BEF8EB021C93894C292CF5B0EBF08D2A379CBBF9F47B41717E88FCAC4FC2
3,024,414 UART: [art] PUB.Y = 2FAC84A3B7796D02ACE0F013300752726D7B33D5FB0A92177E0EF52798DB7D254A9A22F589BBBB388D752943B9983885
3,031,352 UART: [art] SIG.R = 8A132CB5124F6BA929A6941F71A8E0DFD358B277DF5044AE0FE7CFDD0C2798824EACDC6E42D4B09D1997217734DD922B
3,038,128 UART: [art] SIG.S = 6E2AB6B397BA81953A843D0AA937D458ADFA2F4283B801EDD09E54CC4391F0DB83962495B95077915D8B6E0561EC69CB
3,061,751 UART: Caliptra RT
3,062,094 UART: [state] CFI Enabled
3,181,076 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,628 UART: [rt]cmd =0x43455252, len=4
3,222,621 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
893,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,543 UART: [kat] ++
897,695 UART: [kat] sha1
902,117 UART: [kat] SHA2-256
904,057 UART: [kat] SHA2-384
906,838 UART: [kat] SHA2-512-ACC
908,739 UART: [kat] ECC-384
918,332 UART: [kat] HMAC-384Kdf
923,130 UART: [kat] LMS
1,171,458 UART: [kat] --
1,172,265 UART: [cold-reset] ++
1,172,759 UART: [fht] FHT @ 0x50003400
1,175,424 UART: [idev] ++
1,175,592 UART: [idev] CDI.KEYID = 6
1,175,952 UART: [idev] SUBJECT.KEYID = 7
1,176,376 UART: [idev] UDS.KEYID = 0
1,176,721 ready_for_fw is high
1,176,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,576 UART: [idev] Erasing UDS.KEYID = 0
1,201,673 UART: [idev] Sha1 KeyId Algorithm
1,210,167 UART: [idev] --
1,211,243 UART: [ldev] ++
1,211,411 UART: [ldev] CDI.KEYID = 6
1,211,774 UART: [ldev] SUBJECT.KEYID = 5
1,212,200 UART: [ldev] AUTHORITY.KEYID = 7
1,212,663 UART: [ldev] FE.KEYID = 1
1,217,791 UART: [ldev] Erasing FE.KEYID = 1
1,243,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,493 UART: [ldev] --
1,282,988 UART: [fwproc] Wait for Commands...
1,283,792 UART: [fwproc] Recv command 0x46574c44
1,284,520 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,400 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,570 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,779 >>> mbox cmd response: success
2,827,779 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,829,067 UART: [afmc] ++
2,829,235 UART: [afmc] CDI.KEYID = 6
2,829,597 UART: [afmc] SUBJECT.KEYID = 7
2,830,022 UART: [afmc] AUTHORITY.KEYID = 5
2,866,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,228 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,976 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,685 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,568 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
2,900,269 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
2,907,995 UART: [afmc] --
2,909,113 UART: [cold-reset] --
2,910,123 UART: [state] Locking Datavault
2,911,230 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,834 UART: [state] Locking ICCM
2,912,412 UART: [exit] Launching FMC @ 0x40000130
2,917,742 UART:
2,917,758 UART: Running Caliptra FMC ...
2,918,166 UART:
2,918,220 UART: [state] CFI Enabled
2,928,840 UART: [fht] FMC Alias Private Key: 7
3,047,626 UART: [art] Extend RT PCRs Done
3,048,054 UART: [art] Lock RT PCRs Done
3,049,110 UART: [art] Populate DV Done
3,057,303 UART: [fht] FMC Alias Private Key: 7
3,058,455 UART: [art] Derive CDI
3,058,735 UART: [art] Store in slot 0x4
3,144,344 UART: [art] Derive Key Pair
3,144,704 UART: [art] Store priv key in slot 0x5
3,158,138 UART: [art] Derive Key Pair - Done
3,173,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,083 UART: [art] PUB.X = E68ABF3066EE17082237464F7D6F92A7B4B5D561DE08786D95D3B991FB76BC53DC8FFC781DC51E2982705130C916C32C
3,195,851 UART: [art] PUB.Y = 106CA8E838D2E02D53325AAC4AE162B3B1D1ABF35D50F318D5055BBCCE0E83F7923997894AC72FD7EBD381DE78019726
3,202,802 UART: [art] SIG.R = 05295EADE5041BE93A9270456C234090A47876963543C20D4961D7D03B5E3FC26819541C0331C90E1DE2B984618CCD26
3,209,547 UART: [art] SIG.S = 68F6A1DB786627F19F082A7D08CDF1C39552CE4699562E37E37630F74D8102CE5DE634C7C4CE8FA9511F390DA72FA418
3,232,939 UART: Caliptra RT
3,233,190 UART: [state] CFI Enabled
3,352,865 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,281 UART: [rt]cmd =0x43455252, len=4
3,394,028 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,277 ready_for_fw is high
1,060,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,768 >>> mbox cmd response: success
2,680,768 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,742,905 UART:
2,742,921 UART: Running Caliptra FMC ...
2,743,329 UART:
2,743,383 UART: [state] CFI Enabled
2,754,133 UART: [fht] FMC Alias Private Key: 7
2,872,205 UART: [art] Extend RT PCRs Done
2,872,633 UART: [art] Lock RT PCRs Done
2,874,343 UART: [art] Populate DV Done
2,882,568 UART: [fht] FMC Alias Private Key: 7
2,883,670 UART: [art] Derive CDI
2,883,950 UART: [art] Store in slot 0x4
2,969,791 UART: [art] Derive Key Pair
2,970,151 UART: [art] Store priv key in slot 0x5
2,983,517 UART: [art] Derive Key Pair - Done
2,998,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,356 UART: [art] PUB.X = 2354978B9321E6C91063874A3814D5B02B35A95DAD94242624397E6C649596E636B815E533E004A9C2420E5648FFF3AC
3,021,108 UART: [art] PUB.Y = 0BA7D2506BF44FBBEF673DD565486401DB16C177A1383E6EC2DBC2A155C966F78C68BD6566F823CA855E8F273BAA5F35
3,028,064 UART: [art] SIG.R = 5238A47DBFD49ED526475DBEFA4F95BA4292104515F8D46BF54307DD72C254C39A34B89D9AE50B6E89E86F0840311C1A
3,034,831 UART: [art] SIG.S = 1A0D702B848E90B3A6226DF089466714FB1FDC6448E0CB3976CB25F263F37B56CCDBC7A8D6A03873FA81F86D5A4C6A69
3,058,162 UART: Caliptra RT
3,058,413 UART: [state] CFI Enabled
3,178,660 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,118 UART: [rt]cmd =0x43455252, len=4
3,220,005 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
893,453 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,578 UART: [kat] ++
897,730 UART: [kat] sha1
901,952 UART: [kat] SHA2-256
903,892 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
918,543 UART: [kat] HMAC-384Kdf
923,047 UART: [kat] LMS
1,171,375 UART: [kat] --
1,172,354 UART: [cold-reset] ++
1,172,732 UART: [fht] FHT @ 0x50003400
1,175,289 UART: [idev] ++
1,175,457 UART: [idev] CDI.KEYID = 6
1,175,817 UART: [idev] SUBJECT.KEYID = 7
1,176,241 UART: [idev] UDS.KEYID = 0
1,176,586 ready_for_fw is high
1,176,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,373 UART: [idev] Erasing UDS.KEYID = 0
1,201,146 UART: [idev] Sha1 KeyId Algorithm
1,209,486 UART: [idev] --
1,210,572 UART: [ldev] ++
1,210,740 UART: [ldev] CDI.KEYID = 6
1,211,103 UART: [ldev] SUBJECT.KEYID = 5
1,211,529 UART: [ldev] AUTHORITY.KEYID = 7
1,211,992 UART: [ldev] FE.KEYID = 1
1,216,972 UART: [ldev] Erasing FE.KEYID = 1
1,243,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,722 UART: [ldev] --
1,283,061 UART: [fwproc] Wait for Commands...
1,283,719 UART: [fwproc] Recv command 0x46574c44
1,284,447 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,149 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,319 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,626 >>> mbox cmd response: success
2,827,626 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,829,024 UART: [afmc] ++
2,829,192 UART: [afmc] CDI.KEYID = 6
2,829,554 UART: [afmc] SUBJECT.KEYID = 7
2,829,979 UART: [afmc] AUTHORITY.KEYID = 5
2,865,724 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,315 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,063 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,772 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,655 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
2,900,356 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
2,908,176 UART: [afmc] --
2,909,086 UART: [cold-reset] --
2,910,000 UART: [state] Locking Datavault
2,911,277 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,881 UART: [state] Locking ICCM
2,912,321 UART: [exit] Launching FMC @ 0x40000130
2,917,651 UART:
2,917,667 UART: Running Caliptra FMC ...
2,918,075 UART:
2,918,218 UART: [state] CFI Enabled
2,928,502 UART: [fht] FMC Alias Private Key: 7
3,047,612 UART: [art] Extend RT PCRs Done
3,048,040 UART: [art] Lock RT PCRs Done
3,049,636 UART: [art] Populate DV Done
3,057,891 UART: [fht] FMC Alias Private Key: 7
3,059,049 UART: [art] Derive CDI
3,059,329 UART: [art] Store in slot 0x4
3,145,682 UART: [art] Derive Key Pair
3,146,042 UART: [art] Store priv key in slot 0x5
3,159,580 UART: [art] Derive Key Pair - Done
3,174,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,725 UART: [art] PUB.X = 6C53EDCA5DFBDEC0826D6440B64F9F7BC8C3B1974FB7DC01F7B78C093CCE3C4365949950530FAB20168DDCAB8E9A4824
3,197,504 UART: [art] PUB.Y = 55F9479C4D9F2092FA5297DBB06D514CA58E859EA94D0138D1861D9C3D9449ED9F8E5F30554FCE4C68458374BA27573B
3,204,453 UART: [art] SIG.R = DAAA88E5E49CC0CDF41F13A930724529160AEB709AFCFAC07D8608088AE914259E389F4BF594E2DCF6E3683A4010C254
3,211,224 UART: [art] SIG.S = FBC7DD877AD609F085A5F304AE23A5948F09EDDF29E34AC6EC0A18F4854BA0EBC9D4EBF163772A855F23E6D07ECB0F25
3,234,521 UART: Caliptra RT
3,234,864 UART: [state] CFI Enabled
3,354,859 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,139 UART: [rt]cmd =0x43455252, len=4
3,396,041 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,670 ready_for_fw is high
1,060,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,161 >>> mbox cmd response: success
2,678,161 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,740,702 UART:
2,740,718 UART: Running Caliptra FMC ...
2,741,126 UART:
2,741,269 UART: [state] CFI Enabled
2,752,079 UART: [fht] FMC Alias Private Key: 7
2,870,139 UART: [art] Extend RT PCRs Done
2,870,567 UART: [art] Lock RT PCRs Done
2,872,177 UART: [art] Populate DV Done
2,880,346 UART: [fht] FMC Alias Private Key: 7
2,881,298 UART: [art] Derive CDI
2,881,578 UART: [art] Store in slot 0x4
2,967,325 UART: [art] Derive Key Pair
2,967,685 UART: [art] Store priv key in slot 0x5
2,980,505 UART: [art] Derive Key Pair - Done
2,995,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,014 UART: [art] PUB.X = CF04D0267D87B531073AAA100DFEC76D7E6F715758F1D5DF1C6437FF5AC9E7D7C8578727FEF9127CD5ECA46DD3A19A32
3,018,791 UART: [art] PUB.Y = 6111440435B8C668584A87A231A63D46CDE564831D84339D7870DBB1734C0B6C591B57DF0BDD4A686C66141E957C42FC
3,025,728 UART: [art] SIG.R = 3BA5CC8669EB31F046DD749C002DD33EDD6F8B50C8068666A717E12219BAE8D7E68D58614B031EB663E23CDF181D146C
3,032,478 UART: [art] SIG.S = 5D47FA5D12F7A22218F3258DF97FACB134636B5C68F095FD6AF31B458395E4AFAF6E06A5DE27E46BBDE3D840EADAA555
3,055,817 UART: Caliptra RT
3,056,160 UART: [state] CFI Enabled
3,176,161 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,827 UART: [rt]cmd =0x43455252, len=4
3,217,642 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
192,164 UART:
192,547 UART: Running Caliptra ROM ...
193,724 UART:
193,875 UART: [state] CFI Enabled
263,747 UART: [state] LifecycleState = Unprovisioned
265,663 UART: [state] DebugLocked = No
267,623 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,207 UART: [kat] SHA2-256
442,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,460 UART: [kat] ++
453,914 UART: [kat] sha1
465,075 UART: [kat] SHA2-256
467,814 UART: [kat] SHA2-384
473,307 UART: [kat] SHA2-512-ACC
475,668 UART: [kat] ECC-384
2,766,298 UART: [kat] HMAC-384Kdf
2,777,500 UART: [kat] LMS
3,967,759 UART: [kat] --
3,972,346 UART: [cold-reset] ++
3,974,915 UART: [fht] Storing FHT @ 0x50003400
3,987,169 UART: [idev] ++
3,987,731 UART: [idev] CDI.KEYID = 6
3,988,612 UART: [idev] SUBJECT.KEYID = 7
3,989,932 UART: [idev] UDS.KEYID = 0
3,990,971 ready_for_fw is high
3,991,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,338 UART: [idev] Erasing UDS.KEYID = 0
7,326,323 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,474 UART: [idev] --
7,352,795 UART: [ldev] ++
7,353,366 UART: [ldev] CDI.KEYID = 6
7,354,336 UART: [ldev] SUBJECT.KEYID = 5
7,355,552 UART: [ldev] AUTHORITY.KEYID = 7
7,356,801 UART: [ldev] FE.KEYID = 1
7,399,743 UART: [ldev] Erasing FE.KEYID = 1
10,733,358 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,314 UART: [ldev] --
13,093,354 UART: [fwproc] Waiting for Commands...
13,094,972 UART: [fwproc] Received command 0x46574c44
13,097,218 UART: [fwproc] Received Image of size 118548 bytes
17,202,203 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,995 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,351,167 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,680,297 >>> mbox cmd response: success
17,681,371 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,684,888 UART: [afmc] ++
17,685,474 UART: [afmc] CDI.KEYID = 6
17,686,357 UART: [afmc] SUBJECT.KEYID = 7
17,687,628 UART: [afmc] AUTHORITY.KEYID = 5
21,048,267 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,345,442 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,347,704 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,362,152 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,376,902 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,391,277 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,413,735 UART: [afmc] --
23,417,469 UART: [cold-reset] --
23,421,222 UART: [state] Locking Datavault
23,426,579 UART: [state] Locking PCR0, PCR1 and PCR31
23,428,329 UART: [state] Locking ICCM
23,429,965 UART: [exit] Launching FMC @ 0x40000130
23,438,320 UART:
23,438,554 UART: Running Caliptra FMC ...
23,439,583 UART:
23,439,729 UART: [state] CFI Enabled
23,505,723 UART: [fht] FMC Alias Private Key: 7
25,845,849 UART: [art] Extend RT PCRs Done
25,847,072 UART: [art] Lock RT PCRs Done
25,848,781 UART: [art] Populate DV Done
25,854,250 UART: [fht] FMC Alias Private Key: 7
25,855,889 UART: [art] Derive CDI
25,856,621 UART: [art] Store in slot 0x4
25,914,232 UART: [art] Derive Key Pair
25,915,269 UART: [art] Store priv key in slot 0x5
29,208,370 UART: [art] Derive Key Pair - Done
29,221,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,510,326 UART: [art] Erasing AUTHORITY.KEYID = 7
31,511,854 UART: [art] PUB.X = AE0F57CEC553457D1B0D3E9EC0AA09C7344AF41AFD30AFA9516B9A8FA2AA3A1A526EA472C85E3750EF3928CD2E66D540
31,519,119 UART: [art] PUB.Y = D2C716DD931E377851C55785C8D03DF5E78283430E2877B11535F50193E7DF3AF09BC07CA611706B2471958AE9487FE8
31,526,372 UART: [art] SIG.R = 5AAC6D814CB5B5287B5888E7C70508F175EF968C2714EFB45DB64DA709C4580422012708FDA0B9658C8FE15DE7E038EE
31,533,784 UART: [art] SIG.S = DA8B3DAEB7C7E6CF12C97A55717034154E994DD0AE808928B71EAD17C45A87699FC2EA90F454209EA7CFBA2779746A3E
32,839,109 UART: Caliptra RT
32,839,822 UART: [state] CFI Enabled
33,016,255 UART: [rt] RT listening for mailbox commands...
33,047,838 UART: [rt]cmd =0x4453424c, len=4
36,354,740 >>> mbox cmd response data (8 bytes)
38,427,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
38,577,981 UART:
38,578,373 UART: Running Caliptra ROM ...
38,579,422 UART:
38,579,574 UART: [state] CFI Enabled
38,639,870 UART: [state] LifecycleState = Unprovisioned
38,641,812 UART: [state] DebugLocked = No
38,643,336 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,647,379 UART: [kat] SHA2-256
38,817,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,827,632 UART: [kat] ++
38,828,089 UART: [kat] sha1
38,838,873 UART: [kat] SHA2-256
38,841,565 UART: [kat] SHA2-384
38,846,523 UART: [kat] SHA2-512-ACC
38,848,917 UART: [kat] ECC-384
41,137,925 UART: [kat] HMAC-384Kdf
41,150,266 UART: [kat] LMS
42,340,606 UART: [kat] --
42,343,092 UART: [update-reset] ++
46,534,561 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,538,821 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
46,936,607 >>> mbox cmd response: success
46,936,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,937,460 UART: [update-reset] Copying MAN_2 To MAN_1
46,959,840 UART: [update-reset Success] --
46,963,210 UART: [state] Locking Datavault
46,966,462 UART: [state] Locking PCR0, PCR1 and PCR31
46,968,220 UART: [state] Locking ICCM
46,969,943 UART: [exit] Launching FMC @ 0x40000130
46,978,341 UART:
46,978,577 UART: Running Caliptra FMC ...
46,979,681 UART:
46,979,839 UART: [state] CFI Enabled
47,068,720 UART: [art] Extend RT PCRs Done
47,069,934 UART: [art] Lock RT PCRs Done
47,071,398 UART: [art] Populate DV Done
47,076,805 UART: [fht] FMC Alias Private Key: 7
47,078,290 UART: [art] Derive CDI
47,079,164 UART: [art] Store in slot 0x4
47,137,605 UART: [art] Derive Key Pair
47,138,649 UART: [art] Store priv key in slot 0x5
50,431,285 UART: [art] Derive Key Pair - Done
50,444,223 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
52,732,694 UART: [art] Erasing AUTHORITY.KEYID = 7
52,734,200 UART: [art] PUB.X = FDBC4979EF025A6C758E6FFE5182D1DE90A6597BB8806225763687E577974CA760713C8BAE44E67A621F14A834A25D35
52,741,511 UART: [art] PUB.Y = DA206B78B68A830282FAAFC251F0222703369AEE646E7EAF5F172F0E856F64D32758C8CFD5EF79EB69FC3A0A870355A0
52,748,719 UART: [art] SIG.R = C1806FA7611B1B59DA152B20FA21BBA3B7EC7895A46A75A1044C2C4746564D2D64D0F42C6583191002A578C619BF6F93
52,756,135 UART: [art] SIG.S = 01E5C3696041B00F2C6D505EBA8F142F40761BD59C4A21A7B73987D6E23225694CA459B3929813E0C17F35F5E07FA13E
54,061,548 UART: Caliptra RT
54,062,295 UART: [state] CFI Enabled
57,783,696 UART: [rt] RT listening for mailbox commands...
57,814,759 UART: [rt]cmd =0x494e464f, len=4
57,819,133 >>> mbox cmd response data (312 bytes)
57,821,007 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,850,640 UART: [rt]cmd =0x43455252, len=4
57,862,048 >>> mbox cmd response data (783 bytes)
57,903,640 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,934,375 UART: [rt]cmd =0x44504543, len=92
63,690,293 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,802,488 ready_for_fw is high
3,802,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,963,402 >>> mbox cmd response: success
17,964,786 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,652,217 UART:
23,652,620 UART: Running Caliptra FMC ...
23,653,733 UART:
23,653,889 UART: [state] CFI Enabled
23,722,291 UART: [fht] FMC Alias Private Key: 7
26,062,322 UART: [art] Extend RT PCRs Done
26,063,573 UART: [art] Lock RT PCRs Done
26,065,448 UART: [art] Populate DV Done
26,071,138 UART: [fht] FMC Alias Private Key: 7
26,072,728 UART: [art] Derive CDI
26,073,465 UART: [art] Store in slot 0x4
26,130,978 UART: [art] Derive Key Pair
26,132,020 UART: [art] Store priv key in slot 0x5
29,424,974 UART: [art] Derive Key Pair - Done
29,438,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,726,601 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,117 UART: [art] PUB.X = F7612E212282D181FD4ACD2A4F012CFFE98B2A16DFF8483524FB3C3B19952D9E88FD4D2BBA59C690EB81308EBDE34E78
31,735,374 UART: [art] PUB.Y = 873A1E7BF95EF7E218144A921D265E26C368B907100235ED289F7E4BF09E3FABC7B02F3BCE80EF34E3D93F6D9E8B2924
31,742,657 UART: [art] SIG.R = F4B74734FBB1B1C0904105ABAFF00030E1637B363F6E4576AFCCECC2BE48B6239799D054C3BC48390D9843C01DFC9473
31,750,008 UART: [art] SIG.S = 3A09AC55109099D3FAF7894CDAB2E422D0EE2F1F1352BE6EAC2AEE03399EC138DA31ADA54EDF89AF850D75E4F4B58D90
33,055,206 UART: Caliptra RT
33,055,915 UART: [state] CFI Enabled
33,233,106 UART: [rt] RT listening for mailbox commands...
33,264,218 UART: [rt]cmd =0x4453424c, len=4
36,572,183 >>> mbox cmd response data (8 bytes)
38,642,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,454,016 >>> mbox cmd response: success
47,454,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,487,854 UART:
47,488,177 UART: Running Caliptra FMC ...
47,489,218 UART:
47,489,367 UART: [state] CFI Enabled
47,585,296 UART: [art] Extend RT PCRs Done
47,586,510 UART: [art] Lock RT PCRs Done
47,587,957 UART: [art] Populate DV Done
47,593,532 UART: [fht] FMC Alias Private Key: 7
47,595,287 UART: [art] Derive CDI
47,596,021 UART: [art] Store in slot 0x4
47,654,176 UART: [art] Derive Key Pair
47,655,216 UART: [art] Store priv key in slot 0x5
50,948,216 UART: [art] Derive Key Pair - Done
50,961,262 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,251,569 UART: [art] Erasing AUTHORITY.KEYID = 7
53,253,077 UART: [art] PUB.X = 4B32723E067E6490367B7042476AC23BFD13523EB24F5BAF692AC1F178C58B52C527CE708BB217094E90034422CCFC97
53,260,357 UART: [art] PUB.Y = 0F50069F3A6097665FA3F1E0538CBC43270D8AEEACB605DD88182C88DE7BACC4FD302927605C4B7F9E70768A3BB97359
53,267,598 UART: [art] SIG.R = D01C20CDE31FB4AAA2BDE241DA0CC8C20D553E222C6573BDF8DE1347A3D5F6F55762B005CDBACFD239701DD1E81C8CBE
53,274,990 UART: [art] SIG.S = EBA8B31A22E53EAB93407E67DD0E4E22A9175772E428A95FDA60B4E3CAD726955F39A30B2184A65AE1DC13BE28714AD6
54,580,612 UART: Caliptra RT
54,581,322 UART: [state] CFI Enabled
58,318,799 UART: [rt] RT listening for mailbox commands...
58,349,755 UART: [rt]cmd =0x494e464f, len=4
58,354,019 >>> mbox cmd response data (312 bytes)
58,355,902 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
58,385,923 UART: [rt]cmd =0x43455252, len=4
58,397,099 >>> mbox cmd response data (784 bytes)
58,438,916 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
58,469,539 UART: [rt]cmd =0x44504543, len=92
64,232,548 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,451 UART:
192,843 UART: Running Caliptra ROM ...
193,939 UART:
603,627 UART: [state] CFI Enabled
616,593 UART: [state] LifecycleState = Unprovisioned
618,537 UART: [state] DebugLocked = No
621,551 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,259 UART: [kat] SHA2-256
796,989 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,581 UART: [kat] ++
808,108 UART: [kat] sha1
818,843 UART: [kat] SHA2-256
821,509 UART: [kat] SHA2-384
827,106 UART: [kat] SHA2-512-ACC
829,418 UART: [kat] ECC-384
3,115,651 UART: [kat] HMAC-384Kdf
3,127,744 UART: [kat] LMS
4,317,839 UART: [kat] --
4,322,495 UART: [cold-reset] ++
4,324,141 UART: [fht] Storing FHT @ 0x50003400
4,335,330 UART: [idev] ++
4,335,885 UART: [idev] CDI.KEYID = 6
4,336,758 UART: [idev] SUBJECT.KEYID = 7
4,338,065 UART: [idev] UDS.KEYID = 0
4,339,056 ready_for_fw is high
4,339,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,125 UART: [idev] Erasing UDS.KEYID = 0
7,630,065 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,935 UART: [idev] --
7,655,875 UART: [ldev] ++
7,656,439 UART: [ldev] CDI.KEYID = 6
7,657,368 UART: [ldev] SUBJECT.KEYID = 5
7,658,622 UART: [ldev] AUTHORITY.KEYID = 7
7,659,790 UART: [ldev] FE.KEYID = 1
7,672,078 UART: [ldev] Erasing FE.KEYID = 1
10,958,823 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,160 UART: [ldev] --
13,320,566 UART: [fwproc] Waiting for Commands...
13,323,411 UART: [fwproc] Received command 0x46574c44
13,325,596 UART: [fwproc] Received Image of size 118548 bytes
17,425,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,751 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,907 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,729 >>> mbox cmd response: success
17,902,212 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,905,321 UART: [afmc] ++
17,905,899 UART: [afmc] CDI.KEYID = 6
17,906,832 UART: [afmc] SUBJECT.KEYID = 7
17,908,032 UART: [afmc] AUTHORITY.KEYID = 5
21,221,837 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,275 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,577 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,951 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,679 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,107 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,761 UART: [afmc] --
23,587,408 UART: [cold-reset] --
23,590,994 UART: [state] Locking Datavault
23,596,936 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,627 UART: [state] Locking ICCM
23,600,391 UART: [exit] Launching FMC @ 0x40000130
23,608,751 UART:
23,608,985 UART: Running Caliptra FMC ...
23,610,077 UART:
23,610,235 UART: [state] CFI Enabled
23,618,332 UART: [fht] FMC Alias Private Key: 7
25,958,377 UART: [art] Extend RT PCRs Done
25,959,603 UART: [art] Lock RT PCRs Done
25,961,659 UART: [art] Populate DV Done
25,967,283 UART: [fht] FMC Alias Private Key: 7
25,969,030 UART: [art] Derive CDI
25,969,840 UART: [art] Store in slot 0x4
26,012,381 UART: [art] Derive Key Pair
26,013,376 UART: [art] Store priv key in slot 0x5
29,255,749 UART: [art] Derive Key Pair - Done
29,268,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,673 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,195 UART: [art] PUB.X = 2E6E46197F9CA49D5DB79160392B8C33F8570E7945C284FAEEE514280B00AC28324B8484C2821301944117AC6941893B
31,557,397 UART: [art] PUB.Y = 07FEA1D0190B168B3B1EF0CE4C3D36AF89630D3DA901C76B04EB4B5E000978CC96C522B5B6E575CF967CF43C5B8C497E
31,564,684 UART: [art] SIG.R = A6E7B7640A4EA0B7FCD750C346AF1AD0A889BDF593391E67E005B35924167618C35567FF1316279ED1C58980E20041ED
31,572,026 UART: [art] SIG.S = 3086D904AFF8C0C7C5FDB470A0F06616FE05E436D9BD3A87C1A51AE601ECDE45A1EFC15C576D8A3B11FD507D1986ADE6
32,877,570 UART: Caliptra RT
32,878,281 UART: [state] CFI Enabled
33,010,208 UART: [rt] RT listening for mailbox commands...
33,041,518 UART: [rt]cmd =0x4453424c, len=4
36,287,960 >>> mbox cmd response data (8 bytes)
38,358,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
38,508,768 UART:
38,509,195 UART: Running Caliptra ROM ...
38,510,273 UART:
38,510,429 UART: [state] CFI Enabled
38,524,702 UART: [state] LifecycleState = Unprovisioned
38,526,585 UART: [state] DebugLocked = No
38,528,661 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,533,923 UART: [kat] SHA2-256
38,703,617 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,714,178 UART: [kat] ++
38,714,629 UART: [kat] sha1
38,725,618 UART: [kat] SHA2-256
38,728,307 UART: [kat] SHA2-384
38,734,450 UART: [kat] SHA2-512-ACC
38,736,794 UART: [kat] ECC-384
41,022,801 UART: [kat] HMAC-384Kdf
41,034,609 UART: [kat] LMS
42,224,683 UART: [kat] --
42,226,912 UART: [update-reset] ++
46,417,661 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,420,534 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
46,818,274 >>> mbox cmd response: success
46,818,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,819,292 UART: [update-reset] Copying MAN_2 To MAN_1
46,841,696 UART: [update-reset Success] --
46,846,318 UART: [state] Locking Datavault
46,849,027 UART: [state] Locking PCR0, PCR1 and PCR31
46,850,779 UART: [state] Locking ICCM
46,852,870 UART: [exit] Launching FMC @ 0x40000130
46,861,260 UART:
46,861,501 UART: Running Caliptra FMC ...
46,862,601 UART:
46,862,752 UART: [state] CFI Enabled
46,906,649 UART: [art] Extend RT PCRs Done
46,907,859 UART: [art] Lock RT PCRs Done
46,909,398 UART: [art] Populate DV Done
46,914,805 UART: [fht] FMC Alias Private Key: 7
46,916,336 UART: [art] Derive CDI
46,917,132 UART: [art] Store in slot 0x4
46,960,040 UART: [art] Derive Key Pair
46,961,035 UART: [art] Store priv key in slot 0x5
50,203,356 UART: [art] Derive Key Pair - Done
50,216,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
52,497,359 UART: [art] Erasing AUTHORITY.KEYID = 7
52,498,869 UART: [art] PUB.X = 3405BA589120C8D8D3C85F269B6B3EDFC60E8CABD5591E826A12F09F2D3FE6CE44BA5A1D990769CD3D91EF4E65562013
52,506,149 UART: [art] PUB.Y = 91185CD568F934BC459B604040B8EB46721B40B6A43A8B6E217F9797862E860FD6D8BB2B8B91BAF009E8DD5A9CB97158
52,513,398 UART: [art] SIG.R = 83ADC0785D7A8E6FE0990E577326B1EDB5BB8C9AB9CDD997A6CCC778A6AE7D96213CDB7D040A2D875B985307A07F5035
52,520,786 UART: [art] SIG.S = CA58D2B88178B7CAE86BC169F05C3B89D9B56F3088F77E7B2C2596821EAAB75CCC62E69C5D803AD360F8D48A96395C99
53,825,258 UART: Caliptra RT
53,825,990 UART: [state] CFI Enabled
57,445,436 UART: [rt] RT listening for mailbox commands...
57,476,613 UART: [rt]cmd =0x494e464f, len=4
57,480,926 >>> mbox cmd response data (312 bytes)
57,482,783 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,512,439 UART: [rt]cmd =0x43455252, len=4
57,523,732 >>> mbox cmd response data (784 bytes)
57,565,490 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,596,231 UART: [rt]cmd =0x44504543, len=92
63,271,981 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,131,005 ready_for_fw is high
4,131,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,165,696 >>> mbox cmd response: success
18,166,426 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,808,383 UART:
23,808,778 UART: Running Caliptra FMC ...
23,809,917 UART:
23,810,071 UART: [state] CFI Enabled
23,818,315 UART: [fht] FMC Alias Private Key: 7
26,158,286 UART: [art] Extend RT PCRs Done
26,159,512 UART: [art] Lock RT PCRs Done
26,161,031 UART: [art] Populate DV Done
26,166,714 UART: [fht] FMC Alias Private Key: 7
26,168,357 UART: [art] Derive CDI
26,169,166 UART: [art] Store in slot 0x4
26,212,033 UART: [art] Derive Key Pair
26,213,072 UART: [art] Store priv key in slot 0x5
29,455,390 UART: [art] Derive Key Pair - Done
29,467,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,683 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,196 UART: [art] PUB.X = 573A4A4B9EDF09449A67CD512CC093A32CCC1D543FB06ADE800EC9EF2AE7E04DEDEC111DFD82038CED3D23CB4680F2BA
31,757,493 UART: [art] PUB.Y = 83D139A3BAD331439B0C2F57CD1D50079D963E64AEAC769ADD21655F93363D7BFDF53CDFE5C24BD452890F76B588307B
31,764,766 UART: [art] SIG.R = B0DF9B958C1CC71614B51AF84E5CB99C651044C68FFAC6D6ABD00868920D67D1A230BBC2114DD84421BB2380FB911920
31,772,150 UART: [art] SIG.S = 0CD24978AD9BB69659D472D35C77E3B8D3FF29C8E6048FAE09D3EC4C4D014F27A0E9BD245989209F81E2A4707D8D6ED3
33,077,146 UART: Caliptra RT
33,077,862 UART: [state] CFI Enabled
33,211,123 UART: [rt] RT listening for mailbox commands...
33,242,838 UART: [rt]cmd =0x4453424c, len=4
36,489,926 >>> mbox cmd response data (8 bytes)
38,558,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,299,588 >>> mbox cmd response: success
47,300,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,336,300 UART:
47,336,630 UART: Running Caliptra FMC ...
47,337,755 UART:
47,337,915 UART: [state] CFI Enabled
47,382,467 UART: [art] Extend RT PCRs Done
47,383,608 UART: [art] Lock RT PCRs Done
47,385,135 UART: [art] Populate DV Done
47,390,602 UART: [fht] FMC Alias Private Key: 7
47,392,288 UART: [art] Derive CDI
47,393,061 UART: [art] Store in slot 0x4
47,435,765 UART: [art] Derive Key Pair
47,436,761 UART: [art] Store priv key in slot 0x5
50,679,155 UART: [art] Derive Key Pair - Done
50,692,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
52,973,020 UART: [art] Erasing AUTHORITY.KEYID = 7
52,974,554 UART: [art] PUB.X = 83A9360D2A669363BD2977400A1FBFBA3FA7E06CC1391815A96D836F5A170923E645BABB22A99B8A5D8F9EE25F47D260
52,981,798 UART: [art] PUB.Y = 9BB324683EEE88488D2E62FE9DEA4F1C56AF3389030E2EA2B42DA849F6B90E496964DA21A30BEF83692BB5618C59600F
52,989,050 UART: [art] SIG.R = 60F4BC01C8A4CC2585E33001DAE6A7C7AAFE43791105A15E58BCFEA0ABA17717156800CC62AE65B2798CA67631F031CD
52,996,480 UART: [art] SIG.S = 2A6AC73A15CB3B5B497DD63FF715A1CD54FA60466B8C5210F0910D2ECA32E8FCE79C5F0884EF12C133F7D5592EE6D8A1
54,301,725 UART: Caliptra RT
54,302,409 UART: [state] CFI Enabled
57,923,957 UART: [rt] RT listening for mailbox commands...
57,954,909 UART: [rt]cmd =0x494e464f, len=4
57,959,224 >>> mbox cmd response data (312 bytes)
57,961,091 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,990,946 UART: [rt]cmd =0x43455252, len=4
58,002,286 >>> mbox cmd response data (782 bytes)
58,044,651 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
58,075,516 UART: [rt]cmd =0x44504543, len=92
63,750,858 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,235 UART:
192,624 UART: Running Caliptra ROM ...
193,837 UART:
194,009 UART: [state] CFI Enabled
265,070 UART: [state] LifecycleState = Unprovisioned
266,992 UART: [state] DebugLocked = No
268,666 UART: [state] WD Timer not started. Device not locked for debugging
272,276 UART: [kat] SHA2-256
451,944 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,674 UART: [kat] ++
463,273 UART: [kat] sha1
473,512 UART: [kat] SHA2-256
476,152 UART: [kat] SHA2-384
482,063 UART: [kat] SHA2-512-ACC
484,424 UART: [kat] ECC-384
2,947,180 UART: [kat] HMAC-384Kdf
2,969,951 UART: [kat] LMS
3,446,442 UART: [kat] --
3,451,074 UART: [cold-reset] ++
3,453,095 UART: [fht] FHT @ 0x50003400
3,465,763 UART: [idev] ++
3,466,393 UART: [idev] CDI.KEYID = 6
3,467,329 UART: [idev] SUBJECT.KEYID = 7
3,468,577 UART: [idev] UDS.KEYID = 0
3,469,499 ready_for_fw is high
3,469,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,765 UART: [idev] Erasing UDS.KEYID = 0
5,986,765 UART: [idev] Sha1 KeyId Algorithm
6,010,443 UART: [idev] --
6,016,116 UART: [ldev] ++
6,016,693 UART: [ldev] CDI.KEYID = 6
6,017,577 UART: [ldev] SUBJECT.KEYID = 5
6,018,843 UART: [ldev] AUTHORITY.KEYID = 7
6,020,075 UART: [ldev] FE.KEYID = 1
6,056,974 UART: [ldev] Erasing FE.KEYID = 1
8,564,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,924 UART: [ldev] --
10,375,882 UART: [fwproc] Wait for Commands...
10,379,002 UART: [fwproc] Recv command 0x46574c44
10,380,991 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,513 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,509 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,058 >>> mbox cmd response: success
14,340,115 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,343,715 UART: [afmc] ++
14,344,512 UART: [afmc] CDI.KEYID = 6
14,345,427 UART: [afmc] SUBJECT.KEYID = 7
14,346,478 UART: [afmc] AUTHORITY.KEYID = 5
16,875,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,560 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,399 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,649,441 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,031 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,689,163 UART: [afmc] --
18,693,559 UART: [cold-reset] --
18,696,495 UART: [state] Locking Datavault
18,702,222 UART: [state] Locking PCR0, PCR1 and PCR31
18,703,977 UART: [state] Locking ICCM
18,705,392 UART: [exit] Launching FMC @ 0x40000130
18,713,777 UART:
18,714,004 UART: Running Caliptra FMC ...
18,715,051 UART:
18,715,202 UART: [state] CFI Enabled
18,773,107 UART: [fht] FMC Alias Private Key: 7
20,539,342 UART: [art] Extend RT PCRs Done
20,540,557 UART: [art] Lock RT PCRs Done
20,542,319 UART: [art] Populate DV Done
20,547,997 UART: [fht] FMC Alias Private Key: 7
20,549,647 UART: [art] Derive CDI
20,550,383 UART: [art] Store in slot 0x4
20,606,040 UART: [art] Derive Key Pair
20,607,082 UART: [art] Store priv key in slot 0x5
23,070,361 UART: [art] Derive Key Pair - Done
23,083,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,281 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,782 UART: [art] PUB.X = 1CE8682EBF5B0F2A3C22186B6F844B45C1F7F2C273EF3E11BBFA316EED30DCDBA43BF7A2AAE6F558467EDF0599FC7FA6
24,805,081 UART: [art] PUB.Y = 287830A0832B03D14C96085B4663F02BC8D7B22873EEBD47D58C0B1BA924F39D9CDCA4591B8E33494C1E82B231750429
24,812,333 UART: [art] SIG.R = AFF7039160014AAB152549CB562B6908D57FAD745E7FC2BA14C33C0977261E13810927DE27D48476596CED49A3F48E27
24,819,728 UART: [art] SIG.S = 20F59921611A2878647A2EFF8AC32E1170828FEE080EAB182CE185CD9F3A6CE04D8420BCB2E6DF0F5D78E3653EEA9DDC
25,799,079 UART: Caliptra RT
25,799,778 UART: [state] CFI Enabled
25,980,639 UART: [rt] RT listening for mailbox commands...
26,011,778 UART: [rt]cmd =0x4453424c, len=4
28,489,710 >>> mbox cmd response data (8 bytes)
30,561,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,712,025 UART:
30,712,413 UART: Running Caliptra ROM ...
30,713,547 UART:
30,713,708 UART: [state] CFI Enabled
30,766,196 UART: [state] LifecycleState = Unprovisioned
30,768,135 UART: [state] DebugLocked = No
30,769,900 UART: [state] WD Timer not started. Device not locked for debugging
30,773,851 UART: [kat] SHA2-256
30,953,518 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
30,964,289 UART: [kat] ++
30,964,736 UART: [kat] sha1
30,976,859 UART: [kat] SHA2-256
30,979,602 UART: [kat] SHA2-384
30,985,203 UART: [kat] SHA2-512-ACC
30,987,534 UART: [kat] ECC-384
33,432,490 UART: [kat] HMAC-384Kdf
33,455,796 UART: [kat] LMS
33,932,232 UART: [kat] --
33,936,542 UART: [update-reset] ++
37,431,401 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,435,012 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
37,832,633 >>> mbox cmd response: success
37,833,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,834,052 UART: [update-reset] Copying MAN_2 To MAN_1
37,871,179 UART: [update-reset Success] --
37,875,769 UART: [state] Locking Datavault
37,879,187 UART: [state] Locking PCR0, PCR1 and PCR31
37,880,935 UART: [state] Locking ICCM
37,882,792 UART: [exit] Launching FMC @ 0x40000130
37,891,183 UART:
37,891,415 UART: Running Caliptra FMC ...
37,892,514 UART:
37,892,670 UART: [state] CFI Enabled
37,988,420 UART: [art] Extend RT PCRs Done
37,989,601 UART: [art] Lock RT PCRs Done
37,990,834 UART: [art] Populate DV Done
37,996,370 UART: [fht] FMC Alias Private Key: 7
37,998,075 UART: [art] Derive CDI
37,998,894 UART: [art] Store in slot 0x4
38,057,704 UART: [art] Derive Key Pair
38,058,746 UART: [art] Store priv key in slot 0x5
40,521,681 UART: [art] Derive Key Pair - Done
40,535,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,247,223 UART: [art] Erasing AUTHORITY.KEYID = 7
42,248,731 UART: [art] PUB.X = 02D4569836941D27B50147720FDCF0F04D080FE9C5D8E391E7B3D8B16CD49D5F56B087417EB30B66292482EB89B62302
42,255,988 UART: [art] PUB.Y = 821C348C122311E56BC3DD24A8F45CEAD980E8B1A4C0EB2B654105C0801CE3897E2228927A5E2A63EA500470A736BCAF
42,263,223 UART: [art] SIG.R = B26681435B5F2FFD4D8771C9243EDDAED60C82F1607227491C8AFA37AA545C5C8573C2C8A894C47B50F9CA8F3265B711
42,270,705 UART: [art] SIG.S = 74569AAB55B2CF55A713D6A4648DBB6EFC21D0D33B1BDD7594CDBD2111F9E0B78E8C0C929B2074A597FFF145875C2DA5
43,249,510 UART: Caliptra RT
43,250,222 UART: [state] CFI Enabled
46,148,414 UART: [rt] RT listening for mailbox commands...
46,179,426 UART: [rt]cmd =0x494e464f, len=4
46,183,835 >>> mbox cmd response data (312 bytes)
46,185,865 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,215,803 UART: [rt]cmd =0x43455252, len=4
46,227,161 >>> mbox cmd response data (783 bytes)
46,268,716 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,299,274 UART: [rt]cmd =0x44504543, len=92
50,643,644 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,459,456 ready_for_fw is high
3,459,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,228,993 >>> mbox cmd response: success
14,230,081 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,508,504 UART:
18,508,874 UART: Running Caliptra FMC ...
18,509,982 UART:
18,510,130 UART: [state] CFI Enabled
18,577,906 UART: [fht] FMC Alias Private Key: 7
20,344,519 UART: [art] Extend RT PCRs Done
20,345,739 UART: [art] Lock RT PCRs Done
20,347,443 UART: [art] Populate DV Done
20,353,024 UART: [fht] FMC Alias Private Key: 7
20,354,619 UART: [art] Derive CDI
20,355,349 UART: [art] Store in slot 0x4
20,411,059 UART: [art] Derive Key Pair
20,412,056 UART: [art] Store priv key in slot 0x5
22,874,876 UART: [art] Derive Key Pair - Done
22,887,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,600,877 UART: [art] Erasing AUTHORITY.KEYID = 7
24,602,409 UART: [art] PUB.X = 7E5AE2FFB899789C4725B85985104DF7F9427CE4A90A6C5E6917DFA55AA27D60268334D77B05AEA228192B1786CFCDFB
24,609,612 UART: [art] PUB.Y = 1ABD61A015851B28639A0E4B0891EACAB3CBE3590F80C35C2022C1FC09FCEE1AB02FBDD612D18FCAF80DD4CEABB47BB9
24,616,924 UART: [art] SIG.R = 970392318A12E0483AB4AD8F5F1C42402F3669F43FF394EAA78859BC548FAA3A0B709F19D460A9AF28954F561964D43E
24,624,313 UART: [art] SIG.S = 27A5A33F21744E62D4EAA862E9FAABC7AC27B2B9F76F0B2D320D8EB00B1AD4EDC2B4142C6C98B990BD89A9D0B151A178
25,603,469 UART: Caliptra RT
25,604,168 UART: [state] CFI Enabled
25,782,769 UART: [rt] RT listening for mailbox commands...
25,814,138 UART: [rt]cmd =0x4453424c, len=4
28,292,491 >>> mbox cmd response data (8 bytes)
30,356,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,653,067 >>> mbox cmd response: success
37,653,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,688,733 UART:
37,689,019 UART: Running Caliptra FMC ...
37,690,053 UART:
37,690,202 UART: [state] CFI Enabled
37,787,117 UART: [art] Extend RT PCRs Done
37,788,320 UART: [art] Lock RT PCRs Done
37,789,451 UART: [art] Populate DV Done
37,795,033 UART: [fht] FMC Alias Private Key: 7
37,796,572 UART: [art] Derive CDI
37,797,301 UART: [art] Store in slot 0x4
37,856,526 UART: [art] Derive Key Pair
37,857,569 UART: [art] Store priv key in slot 0x5
40,320,486 UART: [art] Derive Key Pair - Done
40,333,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,046,568 UART: [art] Erasing AUTHORITY.KEYID = 7
42,048,081 UART: [art] PUB.X = A67962553A65FF38A3A3ACC232C2F69015AB051B6C7B682919B33A6878E7C7944090E0C11E612435C986717A64CFE7A3
42,055,354 UART: [art] PUB.Y = AA8E6B2320F42D7B2D7BC681C356028A2D6209209619837100884EACCBDF17F337730D6D9E06E7C1544CC92A8D5EBD9F
42,062,594 UART: [art] SIG.R = 2C35F5DE0049C0CADEB0955A340FF518E561C1FC68F270787C4A88DD2DEDBFE5C7F4FD0AA05C0DCD5E36B8198499B511
42,069,984 UART: [art] SIG.S = 8A63D1A14D2A6D737A3A2400553CFD418CABFC88F042C96EA4D57108711F1969CFBBC3FCBE094C27120E85D189DA3A55
43,048,948 UART: Caliptra RT
43,049,669 UART: [state] CFI Enabled
45,942,278 UART: [rt] RT listening for mailbox commands...
45,973,297 UART: [rt]cmd =0x494e464f, len=4
45,977,532 >>> mbox cmd response data (312 bytes)
45,979,372 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,009,048 UART: [rt]cmd =0x43455252, len=4
46,020,639 >>> mbox cmd response data (783 bytes)
46,061,868 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,092,651 UART: [rt]cmd =0x44504543, len=92
50,446,351 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,590 UART:
192,946 UART: Running Caliptra ROM ...
194,130 UART:
603,770 UART: [state] CFI Enabled
616,321 UART: [state] LifecycleState = Unprovisioned
618,272 UART: [state] DebugLocked = No
621,081 UART: [state] WD Timer not started. Device not locked for debugging
624,916 UART: [kat] SHA2-256
804,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,357 UART: [kat] ++
815,979 UART: [kat] sha1
826,936 UART: [kat] SHA2-256
829,665 UART: [kat] SHA2-384
835,515 UART: [kat] SHA2-512-ACC
837,883 UART: [kat] ECC-384
3,282,744 UART: [kat] HMAC-384Kdf
3,294,555 UART: [kat] LMS
3,771,022 UART: [kat] --
3,774,825 UART: [cold-reset] ++
3,777,397 UART: [fht] FHT @ 0x50003400
3,788,726 UART: [idev] ++
3,789,297 UART: [idev] CDI.KEYID = 6
3,790,256 UART: [idev] SUBJECT.KEYID = 7
3,791,504 UART: [idev] UDS.KEYID = 0
3,792,476 ready_for_fw is high
3,792,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,623 UART: [idev] Erasing UDS.KEYID = 0
6,270,691 UART: [idev] Sha1 KeyId Algorithm
6,293,984 UART: [idev] --
6,299,979 UART: [ldev] ++
6,300,608 UART: [ldev] CDI.KEYID = 6
6,301,527 UART: [ldev] SUBJECT.KEYID = 5
6,302,689 UART: [ldev] AUTHORITY.KEYID = 7
6,303,977 UART: [ldev] FE.KEYID = 1
6,316,134 UART: [ldev] Erasing FE.KEYID = 1
8,799,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,520,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,536,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,552,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,567,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,591,064 UART: [ldev] --
10,595,952 UART: [fwproc] Wait for Commands...
10,598,990 UART: [fwproc] Recv command 0x46574c44
10,600,974 UART: [fwproc] Recv'd Img size: 118548 bytes
14,088,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,161,954 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,234,971 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,563,437 >>> mbox cmd response: success
14,564,566 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,567,684 UART: [afmc] ++
14,568,329 UART: [afmc] CDI.KEYID = 6
14,569,214 UART: [afmc] SUBJECT.KEYID = 7
14,570,486 UART: [afmc] AUTHORITY.KEYID = 5
17,075,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,799,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,801,736 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,817,557 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,833,625 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,849,224 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,873,977 UART: [afmc] --
18,878,601 UART: [cold-reset] --
18,884,119 UART: [state] Locking Datavault
18,888,292 UART: [state] Locking PCR0, PCR1 and PCR31
18,890,045 UART: [state] Locking ICCM
18,892,281 UART: [exit] Launching FMC @ 0x40000130
18,900,728 UART:
18,900,969 UART: Running Caliptra FMC ...
18,902,080 UART:
18,902,244 UART: [state] CFI Enabled
18,910,236 UART: [fht] FMC Alias Private Key: 7
20,676,395 UART: [art] Extend RT PCRs Done
20,677,612 UART: [art] Lock RT PCRs Done
20,679,537 UART: [art] Populate DV Done
20,684,893 UART: [fht] FMC Alias Private Key: 7
20,686,574 UART: [art] Derive CDI
20,687,394 UART: [art] Store in slot 0x4
20,730,151 UART: [art] Derive Key Pair
20,731,190 UART: [art] Store priv key in slot 0x5
23,157,619 UART: [art] Derive Key Pair - Done
23,170,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,876,522 UART: [art] Erasing AUTHORITY.KEYID = 7
24,878,175 UART: [art] PUB.X = ACC00F87AD8D874D71E66643FFD11194E44ED2E4EDC6FCE3F06EF9B8F4766404C486D6F5E5C685523CCEAE0E48DEA08B
24,885,330 UART: [art] PUB.Y = CF1D68BE7C928EEFE40CC3164FB5A8BB1A32A861A194AC99ED58F0740EE6AFE5805AD3654134840BC4D029206D5F963E
24,892,614 UART: [art] SIG.R = 93498045E781111769D7B9624A75BAB44A733EB2C920137D881D2B1A5EBD3130DE346E98FD6D68AF3777A9EDA6821AFA
24,900,009 UART: [art] SIG.S = F065B89F73856FAE11D9135AB1CD9BB38F2EBB4F5B4C537D6C8EE4AC4E59F0B30580611908F1F27281AB7BB15654073E
25,878,791 UART: Caliptra RT
25,879,479 UART: [state] CFI Enabled
26,012,546 UART: [rt] RT listening for mailbox commands...
26,043,710 UART: [rt]cmd =0x4453424c, len=4
28,475,354 >>> mbox cmd response data (8 bytes)
30,533,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,684,538 UART:
30,684,885 UART: Running Caliptra ROM ...
30,686,024 UART:
30,686,198 UART: [state] CFI Enabled
30,697,949 UART: [state] LifecycleState = Unprovisioned
30,699,833 UART: [state] DebugLocked = No
30,702,648 UART: [state] WD Timer not started. Device not locked for debugging
30,706,224 UART: [kat] SHA2-256
30,885,897 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
30,896,698 UART: [kat] ++
30,897,157 UART: [kat] sha1
30,907,522 UART: [kat] SHA2-256
30,910,211 UART: [kat] SHA2-384
30,915,280 UART: [kat] SHA2-512-ACC
30,917,626 UART: [kat] ECC-384
33,359,373 UART: [kat] HMAC-384Kdf
33,370,467 UART: [kat] LMS
33,846,898 UART: [kat] --
33,852,671 UART: [update-reset] ++
37,350,362 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,353,607 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
37,751,216 >>> mbox cmd response: success
37,751,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,752,433 UART: [update-reset] Copying MAN_2 To MAN_1
37,789,554 UART: [update-reset Success] --
37,794,525 UART: [state] Locking Datavault
37,798,756 UART: [state] Locking PCR0, PCR1 and PCR31
37,800,544 UART: [state] Locking ICCM
37,801,947 UART: [exit] Launching FMC @ 0x40000130
37,810,342 UART:
37,810,578 UART: Running Caliptra FMC ...
37,811,686 UART:
37,811,844 UART: [state] CFI Enabled
37,855,589 UART: [art] Extend RT PCRs Done
37,856,776 UART: [art] Lock RT PCRs Done
37,858,395 UART: [art] Populate DV Done
37,863,859 UART: [fht] FMC Alias Private Key: 7
37,865,555 UART: [art] Derive CDI
37,866,370 UART: [art] Store in slot 0x4
37,909,178 UART: [art] Derive Key Pair
37,910,186 UART: [art] Store priv key in slot 0x5
40,337,054 UART: [art] Derive Key Pair - Done
40,350,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,056,245 UART: [art] Erasing AUTHORITY.KEYID = 7
42,057,761 UART: [art] PUB.X = AA836DF6C87455C9AC9F654C15AFFEC4068D7812903C17DB0F3FEB3F0D7856BA69A9E3E8E176CD2E0411D499E7E50F21
42,065,069 UART: [art] PUB.Y = 118EEA37811E6F99A2F6377F62DF14AD6FCB5CFF09D227716D49306CBC74BE4574A86D6066EA3CDA18B63DD1F02DC30A
42,072,351 UART: [art] SIG.R = B8DBA3E3A53E403B393B3C5771A1B3FC04FB3822D0E83657CDE492F07BF49CC18A003E431410624BDE15469B7868A0FB
42,079,773 UART: [art] SIG.S = EE4F9D2027043D4A8BD6184EB73A3D6338B454FDF46FACB01323B5ACA484172685E072871D1A6DD8F0B4192800CEE5F6
43,059,420 UART: Caliptra RT
43,060,131 UART: [state] CFI Enabled
45,864,265 UART: [rt] RT listening for mailbox commands...
45,895,437 UART: [rt]cmd =0x494e464f, len=4
45,899,723 >>> mbox cmd response data (312 bytes)
45,901,603 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,931,161 UART: [rt]cmd =0x43455252, len=4
45,942,444 >>> mbox cmd response data (784 bytes)
45,983,932 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,014,757 UART: [rt]cmd =0x44504543, len=92
50,301,981 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,782,003 ready_for_fw is high
3,782,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,290 >>> mbox cmd response: success
14,450,363 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,699,500 UART:
18,699,912 UART: Running Caliptra FMC ...
18,701,012 UART:
18,701,171 UART: [state] CFI Enabled
18,708,528 UART: [fht] FMC Alias Private Key: 7
20,474,477 UART: [art] Extend RT PCRs Done
20,475,827 UART: [art] Lock RT PCRs Done
20,477,537 UART: [art] Populate DV Done
20,482,640 UART: [fht] FMC Alias Private Key: 7
20,484,239 UART: [art] Derive CDI
20,484,977 UART: [art] Store in slot 0x4
20,527,787 UART: [art] Derive Key Pair
20,528,790 UART: [art] Store priv key in slot 0x5
22,956,042 UART: [art] Derive Key Pair - Done
22,968,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,575 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,077 UART: [art] PUB.X = 59E494DCFC4DEF75E78F69C25D3CAA9ACC13DDA934CE77D14E8CC3112C6993F0024975C4474B60AE72947D77E1E54DEA
24,684,342 UART: [art] PUB.Y = 24BD8357B1FE02F2CE2BEABC84FAAE1F71EA53573CCF6AD8E3950B68AE3F43230FA9373160C400F9E9BA2B3B68AB2AFF
24,691,651 UART: [art] SIG.R = 9378B224440603DC54D73E58D466585D615E11133BFB7780C53A7292D39096B486291859964FFAB6D7315EAA2403FFCD
24,698,994 UART: [art] SIG.S = D5664B43E4F2137C36E3AEFDD85D59EAE2BE2C67A6E537F8EF282168A2D3D6D4485BF922D8FD4934CD5EE46ADA9CDA8F
25,677,463 UART: Caliptra RT
25,678,195 UART: [state] CFI Enabled
25,810,588 UART: [rt] RT listening for mailbox commands...
25,841,940 UART: [rt]cmd =0x4453424c, len=4
28,273,434 >>> mbox cmd response data (8 bytes)
30,335,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,556,436 >>> mbox cmd response: success
37,556,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,589,037 UART:
37,589,323 UART: Running Caliptra FMC ...
37,590,357 UART:
37,590,507 UART: [state] CFI Enabled
37,635,027 UART: [art] Extend RT PCRs Done
37,636,239 UART: [art] Lock RT PCRs Done
37,637,380 UART: [art] Populate DV Done
37,642,911 UART: [fht] FMC Alias Private Key: 7
37,644,453 UART: [art] Derive CDI
37,645,189 UART: [art] Store in slot 0x4
37,687,683 UART: [art] Derive Key Pair
37,688,723 UART: [art] Store priv key in slot 0x5
40,115,208 UART: [art] Derive Key Pair - Done
40,128,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,834,763 UART: [art] Erasing AUTHORITY.KEYID = 7
41,836,370 UART: [art] PUB.X = D26AF2D33DA31E8F2C95FB620A429964C1B5BE877A7E2C228BD5407A4AF16318DE1EFFA53EAB655E27417A0ADAFF9460
41,843,524 UART: [art] PUB.Y = 05BA5A07771095CC0BEB72097951B8EB5B3CDE8B32CC1C2D111491AEAD9CF0615BC9BEA8014C61E0BFA432AAB0EE2782
41,850,823 UART: [art] SIG.R = 956144BBF3AB7E84C5DB0A7A422F5B6618D0B7D097A9BA9457AF6B4F40541F09CE7D2E6F9EFFD167C0A5153425DC188A
41,858,215 UART: [art] SIG.S = 030C8C3A2B8FEC26BFF94C6C7700771FC631244BCCFFA054CED8FC7C56DCCAF31C2155F6FC3ECDF31281C75D706554A6
42,837,328 UART: Caliptra RT
42,838,037 UART: [state] CFI Enabled
45,639,380 UART: [rt] RT listening for mailbox commands...
45,670,393 UART: [rt]cmd =0x494e464f, len=4
45,674,776 >>> mbox cmd response data (312 bytes)
45,676,799 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,706,907 UART: [rt]cmd =0x43455252, len=4
45,718,152 >>> mbox cmd response data (783 bytes)
45,759,377 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,790,262 UART: [rt]cmd =0x44504543, len=92
50,076,796 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
192,055 UART:
192,417 UART: Running Caliptra ROM ...
193,594 UART:
193,766 UART: [state] CFI Enabled
265,398 UART: [state] LifecycleState = Unprovisioned
267,799 UART: [state] DebugLocked = No
269,045 UART: [state] WD Timer not started. Device not locked for debugging
274,000 UART: [kat] SHA2-256
463,882 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,630 UART: [kat] ++
475,117 UART: [kat] sha1
486,880 UART: [kat] SHA2-256
489,891 UART: [kat] SHA2-384
495,596 UART: [kat] SHA2-512-ACC
498,244 UART: [kat] ECC-384
2,945,822 UART: [kat] HMAC-384Kdf
2,972,397 UART: [kat] LMS
3,504,156 UART: [kat] --
3,508,387 UART: [cold-reset] ++
3,510,341 UART: [fht] FHT @ 0x50003400
3,522,382 UART: [idev] ++
3,523,094 UART: [idev] CDI.KEYID = 6
3,524,129 UART: [idev] SUBJECT.KEYID = 7
3,525,232 UART: [idev] UDS.KEYID = 0
3,526,168 ready_for_fw is high
3,526,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,514 UART: [idev] Erasing UDS.KEYID = 0
6,028,526 UART: [idev] Sha1 KeyId Algorithm
6,051,152 UART: [idev] --
6,054,473 UART: [ldev] ++
6,055,162 UART: [ldev] CDI.KEYID = 6
6,056,075 UART: [ldev] SUBJECT.KEYID = 5
6,057,290 UART: [ldev] AUTHORITY.KEYID = 7
6,058,464 UART: [ldev] FE.KEYID = 1
6,101,351 UART: [ldev] Erasing FE.KEYID = 1
8,612,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,980 UART: [ldev] --
10,416,076 UART: [fwproc] Wait for Commands...
10,419,147 UART: [fwproc] Recv command 0x46574c44
10,421,448 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,176 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,789 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,674,616 >>> mbox cmd response: success
14,675,682 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,678,424 UART: [afmc] ++
14,679,119 UART: [afmc] CDI.KEYID = 6
14,680,375 UART: [afmc] SUBJECT.KEYID = 7
14,681,806 UART: [afmc] AUTHORITY.KEYID = 5
17,212,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,263 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,380 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,530 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,406 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,626 UART: [afmc] --
19,011,529 UART: [cold-reset] --
19,015,453 UART: [state] Locking Datavault
19,021,146 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,286 UART: [state] Locking ICCM
19,026,025 UART: [exit] Launching FMC @ 0x40000130
19,034,694 UART:
19,034,930 UART: Running Caliptra FMC ...
19,036,049 UART:
19,036,215 UART: [state] CFI Enabled
19,093,764 UART: [fht] FMC Alias Private Key: 7
20,860,812 UART: [art] Extend RT PCRs Done
20,862,036 UART: [art] Lock RT PCRs Done
20,863,637 UART: [art] Populate DV Done
20,869,097 UART: [fht] FMC Alias Private Key: 7
20,870,688 UART: [art] Derive CDI
20,871,497 UART: [art] Store in slot 0x4
20,926,890 UART: [art] Derive Key Pair
20,927,924 UART: [art] Store priv key in slot 0x5
23,391,086 UART: [art] Derive Key Pair - Done
23,403,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,927 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,425 UART: [art] PUB.X = 477B70581D54E5228BB6E2071E33E6769678CE9B5692DDD9D360300FFED34F33B261C4EE8F655CBF45D3036530DCB459
25,125,696 UART: [art] PUB.Y = 4B1BFA71BC5FCBA5A5BCFE547A729177A637C2B9E5CA508184623D22E436999AE7D2AF175117380E02FBA1251A0F707C
25,132,965 UART: [art] SIG.R = 1C2C1645BD600A96ABEC472A006E07BEC1B74B5C784C7F4BA4B68DF25CFB62EC74FFC1462F8597FBAE0CE20D6085C337
25,140,336 UART: [art] SIG.S = 5E49A2D6CE87AC7EF848F3C15C81F3F2DC44F13534453524CEE00DEEEA8D38165D21DF1878272FB871395BF8E4957DAB
26,119,210 UART: Caliptra RT
26,119,925 UART: [state] CFI Enabled
26,300,636 UART: [rt] RT listening for mailbox commands...
26,331,946 UART: [rt]cmd =0x4453424c, len=4
28,809,952 >>> mbox cmd response data (8 bytes)
30,876,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,027,144 UART:
31,027,509 UART: Running Caliptra ROM ...
31,028,646 UART:
31,028,841 UART: [state] CFI Enabled
31,088,382 UART: [state] LifecycleState = Unprovisioned
31,090,483 UART: [state] DebugLocked = No
31,092,085 UART: [state] WD Timer not started. Device not locked for debugging
31,097,032 UART: [kat] SHA2-256
31,286,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,297,664 UART: [kat] ++
31,298,153 UART: [kat] sha1
31,309,687 UART: [kat] SHA2-256
31,312,704 UART: [kat] SHA2-384
31,319,989 UART: [kat] SHA2-512-ACC
31,322,551 UART: [kat] ECC-384
33,772,678 UART: [kat] HMAC-384Kdf
33,796,843 UART: [kat] LMS
34,328,401 UART: [kat] --
34,332,680 UART: [update-reset] ++
37,837,378 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,840,321 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
38,470,072 >>> mbox cmd response: success
38,470,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,470,734 UART: [update-reset] Copying MAN_2 To MAN_1
38,508,185 UART: [update-reset Success] --
38,512,525 UART: [state] Locking Datavault
38,514,853 UART: [state] Locking PCR0, PCR1 and PCR31
38,516,981 UART: [state] Locking ICCM
38,519,397 UART: [exit] Launching FMC @ 0x40000130
38,528,104 UART:
38,528,410 UART: Running Caliptra FMC ...
38,529,528 UART:
38,529,699 UART: [state] CFI Enabled
38,629,003 UART: [art] Extend RT PCRs Done
38,630,201 UART: [art] Lock RT PCRs Done
38,631,241 UART: [art] Populate DV Done
38,637,073 UART: [fht] FMC Alias Private Key: 7
38,638,718 UART: [art] Derive CDI
38,639,531 UART: [art] Store in slot 0x4
38,697,959 UART: [art] Derive Key Pair
38,698,999 UART: [art] Store priv key in slot 0x5
41,161,485 UART: [art] Derive Key Pair - Done
41,174,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,887,960 UART: [art] Erasing AUTHORITY.KEYID = 7
42,889,472 UART: [art] PUB.X = F57E251831ACD8E7DDF3FD126D0588109C91180B0BAA337CDDBDF16D686D291F537E2337E4957789CD6F90065FD7773F
42,896,745 UART: [art] PUB.Y = 3DC2D47548FAFF7B23D6A4EFF3296DC265417130D24D90C55C66639F9293F8D6C1FCF57F191722D086F3FE969A4FBF60
42,904,006 UART: [art] SIG.R = 55ADAE01AA591C29A90721DC3E6AC77A1949E4BC46B3FA5D31FE55B0DA849055A7F16C787B36B25F8A5882DE66C0D420
42,911,430 UART: [art] SIG.S = 1F158427D2B2F921ED2F7CA4D9A5B7E203585371ADE2AC3A8FCE80412D2500997682FB467B2B79478E444E2D2A018131
43,890,527 UART: Caliptra RT
43,891,215 UART: [state] CFI Enabled
46,786,576 UART: [rt] RT listening for mailbox commands...
46,817,665 UART: [rt]cmd =0x494e464f, len=4
46,821,739 >>> mbox cmd response data (312 bytes)
46,823,580 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,853,719 UART: [rt]cmd =0x43455252, len=4
46,865,041 >>> mbox cmd response data (782 bytes)
46,905,296 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,936,019 UART: [rt]cmd =0x44504543, len=92
51,289,871 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,416,934 ready_for_fw is high
3,417,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,800,062 >>> mbox cmd response: success
14,801,408 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,087,640 UART:
19,088,208 UART: Running Caliptra FMC ...
19,089,331 UART:
19,089,490 UART: [state] CFI Enabled
19,158,781 UART: [fht] FMC Alias Private Key: 7
20,925,587 UART: [art] Extend RT PCRs Done
20,926,821 UART: [art] Lock RT PCRs Done
20,928,449 UART: [art] Populate DV Done
20,934,000 UART: [fht] FMC Alias Private Key: 7
20,935,507 UART: [art] Derive CDI
20,936,248 UART: [art] Store in slot 0x4
20,992,266 UART: [art] Derive Key Pair
20,993,265 UART: [art] Store priv key in slot 0x5
23,456,883 UART: [art] Derive Key Pair - Done
23,469,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,182,053 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,565 UART: [art] PUB.X = BDEF8E44E5E2875D7FAA43910F4D2D20B699AE51C267A111945478380AE4B9E9270411CBCC1183C31218E2B7DA63251D
25,190,842 UART: [art] PUB.Y = D767106BEE211729D91EFDBF5C33D083B36D10BE5B055F77F9A9CDF7D6FF461CF9740AC26AD3BB915491F576FAD4FB3D
25,198,106 UART: [art] SIG.R = 6DECE16BB2EDF74AA297431BEAA93E519C01C50F35E4F3B21381F64645690BDA7A06DF7A8398157ED48FBAE451ECB751
25,205,508 UART: [art] SIG.S = A0D01A79A9FFCF36EFC6E0856F3511392483B35CD4425F9F63830D72EF0583B55EC3CCD27A0559D2D6E5D9A9E368574B
26,184,201 UART: Caliptra RT
26,184,893 UART: [state] CFI Enabled
26,365,100 UART: [rt] RT listening for mailbox commands...
26,396,669 UART: [rt]cmd =0x4453424c, len=4
28,874,184 >>> mbox cmd response data (8 bytes)
30,935,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
38,841,533 >>> mbox cmd response: success
38,842,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,877,597 UART:
38,877,935 UART: Running Caliptra FMC ...
38,879,062 UART:
38,879,233 UART: [state] CFI Enabled
38,967,004 UART: [art] Extend RT PCRs Done
38,968,196 UART: [art] Lock RT PCRs Done
38,969,620 UART: [art] Populate DV Done
38,975,098 UART: [fht] FMC Alias Private Key: 7
38,976,649 UART: [art] Derive CDI
38,977,384 UART: [art] Store in slot 0x4
39,036,234 UART: [art] Derive Key Pair
39,037,278 UART: [art] Store priv key in slot 0x5
41,499,811 UART: [art] Derive Key Pair - Done
41,512,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,225,251 UART: [art] Erasing AUTHORITY.KEYID = 7
43,226,755 UART: [art] PUB.X = 270AE359F9A85E9586CBB3F2EDFCA3565E50A9587AF3CADE3BA493ECEFBC8261FC59A4646873FB2E055764FF38A75EF2
43,234,093 UART: [art] PUB.Y = 2C754E9F89F895631AA19FFDD74E393C6F711741B7B1BF6644B01E65AC067B7CDE76F9C72C7108623F40210B3048C6B9
43,241,280 UART: [art] SIG.R = AEC0594B1A1B29DE582B6D4F9FFD077F971ABDE7D4D7CC5F6C7FC73F774914A1C32069C0A310A9A7224ACBA2E5956FC6
43,249,106 UART: [art] SIG.S = 2A5DD04D1AF9B064A2B48EA1864E05339CEDB8BA3E70143D8D27F43505F1D601C174A44A10412F62E1319514B9A8A126
44,227,857 UART: Caliptra RT
44,228,556 UART: [state] CFI Enabled
47,120,832 UART: [rt] RT listening for mailbox commands...
47,151,957 UART: [rt]cmd =0x494e464f, len=4
47,156,242 >>> mbox cmd response data (312 bytes)
47,158,077 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
47,187,891 UART: [rt]cmd =0x43455252, len=4
47,199,228 >>> mbox cmd response data (783 bytes)
47,240,266 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
47,271,034 UART: [rt]cmd =0x44504543, len=92
51,622,460 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
192,507 UART:
192,872 UART: Running Caliptra ROM ...
194,074 UART:
603,880 UART: [state] CFI Enabled
622,261 UART: [state] LifecycleState = Unprovisioned
624,665 UART: [state] DebugLocked = No
625,987 UART: [state] WD Timer not started. Device not locked for debugging
630,251 UART: [kat] SHA2-256
820,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,963 UART: [kat] ++
831,500 UART: [kat] sha1
842,030 UART: [kat] SHA2-256
845,052 UART: [kat] SHA2-384
850,556 UART: [kat] SHA2-512-ACC
853,144 UART: [kat] ECC-384
3,292,803 UART: [kat] HMAC-384Kdf
3,305,816 UART: [kat] LMS
3,837,623 UART: [kat] --
3,844,133 UART: [cold-reset] ++
3,846,214 UART: [fht] FHT @ 0x50003400
3,857,620 UART: [idev] ++
3,858,337 UART: [idev] CDI.KEYID = 6
3,859,249 UART: [idev] SUBJECT.KEYID = 7
3,860,429 UART: [idev] UDS.KEYID = 0
3,861,355 ready_for_fw is high
3,861,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,484 UART: [idev] Erasing UDS.KEYID = 0
6,339,286 UART: [idev] Sha1 KeyId Algorithm
6,360,570 UART: [idev] --
6,365,694 UART: [ldev] ++
6,366,429 UART: [ldev] CDI.KEYID = 6
6,367,342 UART: [ldev] SUBJECT.KEYID = 5
6,368,498 UART: [ldev] AUTHORITY.KEYID = 7
6,369,728 UART: [ldev] FE.KEYID = 1
6,380,812 UART: [ldev] Erasing FE.KEYID = 1
8,856,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,900 UART: [ldev] --
10,646,970 UART: [fwproc] Wait for Commands...
10,650,042 UART: [fwproc] Recv command 0x46574c44
10,652,305 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,899 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,501 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,353 >>> mbox cmd response: success
14,911,428 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,913,847 UART: [afmc] ++
14,914,547 UART: [afmc] CDI.KEYID = 6
14,915,651 UART: [afmc] SUBJECT.KEYID = 7
14,917,197 UART: [afmc] AUTHORITY.KEYID = 5
17,417,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,920 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,019 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,179 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,074 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,296 UART: [afmc] --
19,213,685 UART: [cold-reset] --
19,218,523 UART: [state] Locking Datavault
19,224,000 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,209 UART: [state] Locking ICCM
19,228,636 UART: [exit] Launching FMC @ 0x40000130
19,237,327 UART:
19,237,559 UART: Running Caliptra FMC ...
19,238,585 UART:
19,238,736 UART: [state] CFI Enabled
19,246,788 UART: [fht] FMC Alias Private Key: 7
21,013,006 UART: [art] Extend RT PCRs Done
21,014,245 UART: [art] Lock RT PCRs Done
21,015,880 UART: [art] Populate DV Done
21,021,212 UART: [fht] FMC Alias Private Key: 7
21,022,741 UART: [art] Derive CDI
21,023,515 UART: [art] Store in slot 0x4
21,066,706 UART: [art] Derive Key Pair
21,067,714 UART: [art] Store priv key in slot 0x5
23,495,087 UART: [art] Derive Key Pair - Done
23,508,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,397 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,903 UART: [art] PUB.X = C4C24876DD950406E56766C62E1F1CD294A24BBA07F0492FE0BF789AA8BA0B02DF332C11B2D3F250D717FAE78C138177
25,223,164 UART: [art] PUB.Y = 3F39050603499F5CB6C6C7E921C2610FA330190C1C0EC811E72EE1F67669C43B3A92F7D1CE0C22464A0EB730F38F96B9
25,230,424 UART: [art] SIG.R = A31A96080E624B96FA53A8F3E6879658EC0F0C1D9B39870C3C67DE49A1B18B61F0E5771882F010EC53A6FA287819B8E5
25,237,791 UART: [art] SIG.S = 24F5568964BDA9542CDC4754C1CEEE964727BE55A64C8AC0F1DC5831FD154C02F15A3285BC72E0397E157960300561D4
26,216,923 UART: Caliptra RT
26,217,614 UART: [state] CFI Enabled
26,349,689 UART: [rt] RT listening for mailbox commands...
26,380,962 UART: [rt]cmd =0x4453424c, len=4
28,811,532 >>> mbox cmd response data (8 bytes)
30,875,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,026,267 UART:
31,026,638 UART: Running Caliptra ROM ...
31,027,781 UART:
31,027,957 UART: [state] CFI Enabled
31,038,399 UART: [state] LifecycleState = Unprovisioned
31,040,245 UART: [state] DebugLocked = No
31,041,688 UART: [state] WD Timer not started. Device not locked for debugging
31,045,888 UART: [kat] SHA2-256
31,235,784 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,246,507 UART: [kat] ++
31,247,108 UART: [kat] sha1
31,259,410 UART: [kat] SHA2-256
31,262,431 UART: [kat] SHA2-384
31,267,651 UART: [kat] SHA2-512-ACC
31,270,243 UART: [kat] ECC-384
33,710,494 UART: [kat] HMAC-384Kdf
33,723,870 UART: [kat] LMS
34,255,487 UART: [kat] --
34,259,805 UART: [update-reset] ++
37,769,454 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,772,903 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
38,402,107 >>> mbox cmd response: success
38,402,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,402,871 UART: [update-reset] Copying MAN_2 To MAN_1
38,440,387 UART: [update-reset Success] --
38,445,622 UART: [state] Locking Datavault
38,447,965 UART: [state] Locking PCR0, PCR1 and PCR31
38,450,112 UART: [state] Locking ICCM
38,452,030 UART: [exit] Launching FMC @ 0x40000130
38,460,709 UART:
38,461,156 UART: Running Caliptra FMC ...
38,462,189 UART:
38,462,343 UART: [state] CFI Enabled
38,507,071 UART: [art] Extend RT PCRs Done
38,508,223 UART: [art] Lock RT PCRs Done
38,509,650 UART: [art] Populate DV Done
38,514,946 UART: [fht] FMC Alias Private Key: 7
38,516,538 UART: [art] Derive CDI
38,517,354 UART: [art] Store in slot 0x4
38,559,890 UART: [art] Derive Key Pair
38,560,926 UART: [art] Store priv key in slot 0x5
40,987,596 UART: [art] Derive Key Pair - Done
41,000,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,706,924 UART: [art] Erasing AUTHORITY.KEYID = 7
42,708,450 UART: [art] PUB.X = 615B337FBE92F7994314B2FE534A0C7E6CBD79FD3BAF32DFF02607D517ED3901512D2471523B5CC99E630E0CEEC79B4F
42,715,724 UART: [art] PUB.Y = D11DAAA66D5A9804602470EE2329E73BFDB0D5FD91F1062864C9F7D24D624A73F7A18E0B475108DEBA0A0B5B0BB730F4
42,722,978 UART: [art] SIG.R = C99B45A2BFBCD58E24F3C63FE4CD58F1694FF2B7C30997B6BC47C572F267D09371464A54BAAB5A20D93C4CB43CBE817F
42,730,392 UART: [art] SIG.S = 46581FDCFD5538B92AB8A73FF09F3C8BF75F0503CE0C5DAE7FE4167E9D4F429B5BB759CB19B8B4877795810AC170DD96
43,709,707 UART: Caliptra RT
43,710,424 UART: [state] CFI Enabled
46,509,629 UART: [rt] RT listening for mailbox commands...
46,540,586 UART: [rt]cmd =0x494e464f, len=4
46,545,108 >>> mbox cmd response data (312 bytes)
46,546,987 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,576,956 UART: [rt]cmd =0x43455252, len=4
46,588,467 >>> mbox cmd response data (783 bytes)
46,630,799 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,661,479 UART: [rt]cmd =0x44504543, len=92
50,948,522 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
3,758,834 ready_for_fw is high
3,759,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,057,225 >>> mbox cmd response: success
15,058,665 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,312,613 UART:
19,313,005 UART: Running Caliptra FMC ...
19,314,213 UART:
19,314,409 UART: [state] CFI Enabled
19,322,576 UART: [fht] FMC Alias Private Key: 7
21,088,827 UART: [art] Extend RT PCRs Done
21,090,051 UART: [art] Lock RT PCRs Done
21,091,473 UART: [art] Populate DV Done
21,096,902 UART: [fht] FMC Alias Private Key: 7
21,098,408 UART: [art] Derive CDI
21,099,198 UART: [art] Store in slot 0x4
21,142,243 UART: [art] Derive Key Pair
21,143,290 UART: [art] Store priv key in slot 0x5
23,570,295 UART: [art] Derive Key Pair - Done
23,583,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,289,442 UART: [art] Erasing AUTHORITY.KEYID = 7
25,290,946 UART: [art] PUB.X = 1197A0D20EECBA2F923283E9A17D405B7C1FFCB96DF86A0B583E7BC8EB2E3DB8C890036E96A70E41CA792967C09844A1
25,298,191 UART: [art] PUB.Y = 773F47090187391C4387463CD6CCC90E429FAAE8913BE8FA92F512ABD4326FF4DEB3FFB736E3FE68FA78E70083ECB46B
25,305,449 UART: [art] SIG.R = 5F3F71FADB0019B9BABEBCECC5DB64988034E55DB5EDE7E8AC4019340380B86BD2D3064210D58793152D0939F5F3DFF2
25,312,860 UART: [art] SIG.S = 9D2CF81D77E6B53310FC7ED93B5AC74BBDA723BB0A36C54D901C7FDCBD7EDC8B8724B2901B1E2D3A22801D04023AF367
26,291,810 UART: Caliptra RT
26,292,522 UART: [state] CFI Enabled
26,424,937 UART: [rt] RT listening for mailbox commands...
26,456,733 UART: [rt]cmd =0x4453424c, len=4
28,888,076 >>> mbox cmd response data (8 bytes)
30,951,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
38,783,316 >>> mbox cmd response: success
38,783,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,820,332 UART:
38,820,657 UART: Running Caliptra FMC ...
38,821,793 UART:
38,821,956 UART: [state] CFI Enabled
38,866,248 UART: [art] Extend RT PCRs Done
38,867,399 UART: [art] Lock RT PCRs Done
38,868,704 UART: [art] Populate DV Done
38,874,185 UART: [fht] FMC Alias Private Key: 7
38,875,820 UART: [art] Derive CDI
38,876,669 UART: [art] Store in slot 0x4
38,919,218 UART: [art] Derive Key Pair
38,920,227 UART: [art] Store priv key in slot 0x5
41,347,126 UART: [art] Derive Key Pair - Done
41,359,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,066,613 UART: [art] Erasing AUTHORITY.KEYID = 7
43,068,130 UART: [art] PUB.X = 7D539255988F5F1CABFF5E1A565F0ADCC4B858B43922155D9F8EC2D22182EA31FA090296A5B1CDF57C052777767611E7
43,075,402 UART: [art] PUB.Y = 2687AAD83F1C69D362E3116FBFCDD630774BD34EF3996B9066B61AABD14C1DF23E7841D1CCB6CC199D56C35E23B91255
43,082,644 UART: [art] SIG.R = 741D59AF29979F106AA8FE29155DDEA9B64C7CBDCE6AE04661673DC277BEFE4C128285979F3E7BC2D95E47ED72F1E6BF
43,090,043 UART: [art] SIG.S = 5BA603A5A6C1AC44F5066940084F94DDE733C9A6E1CBE362997B9797FF3C606AC696FDB3BCBB7E010B65507A1A3A9D1F
44,068,885 UART: Caliptra RT
44,069,582 UART: [state] CFI Enabled
46,869,008 UART: [rt] RT listening for mailbox commands...
46,899,946 UART: [rt]cmd =0x494e464f, len=4
46,904,400 >>> mbox cmd response data (312 bytes)
46,906,275 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,936,213 UART: [rt]cmd =0x43455252, len=4
46,947,520 >>> mbox cmd response data (782 bytes)
46,990,327 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
47,020,987 UART: [rt]cmd =0x44504543, len=92
51,307,988 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,925 UART: [kat] SHA2-256
881,856 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,971 UART: [kat] ++
886,123 UART: [kat] sha1
890,321 UART: [kat] SHA2-256
892,259 UART: [kat] SHA2-384
894,978 UART: [kat] SHA2-512-ACC
896,879 UART: [kat] ECC-384
902,528 UART: [kat] HMAC-384Kdf
906,970 UART: [kat] LMS
1,475,166 UART: [kat] --
1,475,883 UART: [cold-reset] ++
1,476,325 UART: [fht] Storing FHT @ 0x50003400
1,479,030 UART: [idev] ++
1,479,198 UART: [idev] CDI.KEYID = 6
1,479,558 UART: [idev] SUBJECT.KEYID = 7
1,479,982 UART: [idev] UDS.KEYID = 0
1,480,327 ready_for_fw is high
1,480,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,820 UART: [idev] Erasing UDS.KEYID = 0
1,504,992 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,690 UART: [idev] --
1,514,799 UART: [ldev] ++
1,514,967 UART: [ldev] CDI.KEYID = 6
1,515,330 UART: [ldev] SUBJECT.KEYID = 5
1,515,756 UART: [ldev] AUTHORITY.KEYID = 7
1,516,219 UART: [ldev] FE.KEYID = 1
1,521,231 UART: [ldev] Erasing FE.KEYID = 1
1,547,034 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,266 UART: [ldev] --
1,586,683 UART: [fwproc] Waiting for Commands...
1,587,392 UART: [fwproc] Received command 0x46574c44
1,588,183 UART: [fwproc] Received Image of size 118548 bytes
2,933,007 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,593 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,811 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,074 >>> mbox cmd response: success
3,132,074 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,133,214 UART: [afmc] ++
3,133,382 UART: [afmc] CDI.KEYID = 6
3,133,744 UART: [afmc] SUBJECT.KEYID = 7
3,134,169 UART: [afmc] AUTHORITY.KEYID = 5
3,168,726 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,994 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,774 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,483 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,366 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,049 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,897 UART: [afmc] --
3,212,021 UART: [cold-reset] --
3,212,847 UART: [state] Locking Datavault
3,213,956 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,560 UART: [state] Locking ICCM
3,215,086 UART: [exit] Launching FMC @ 0x40000130
3,220,416 UART:
3,220,432 UART: Running Caliptra FMC ...
3,220,840 UART:
3,220,894 UART: [state] CFI Enabled
3,231,298 UART: [fht] FMC Alias Private Key: 7
3,350,766 UART: [art] Extend RT PCRs Done
3,351,194 UART: [art] Lock RT PCRs Done
3,352,330 UART: [art] Populate DV Done
3,360,635 UART: [fht] FMC Alias Private Key: 7
3,361,603 UART: [art] Derive CDI
3,361,883 UART: [art] Store in slot 0x4
3,447,255 UART: [art] Derive Key Pair
3,447,615 UART: [art] Store priv key in slot 0x5
3,460,880 UART: [art] Derive Key Pair - Done
3,475,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,838 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,603 UART: [art] PUB.X = F4901A6496D835B3240BF7922D488E88D1CF86ACF6606E84760199A789AA3F63B5EBF054B6CBBE1F9C21FABD6F5BE924
3,499,379 UART: [art] PUB.Y = 6EE6EEBF27A73B42D861F51831ED53085995D937BC7D84E49F13689363697016A950A98FFF667DBCB7BC8B3DF01516A1
3,506,330 UART: [art] SIG.R = 6FEDA343DF6F0FA07EABCEE03F03BCFE7C3AC5311E5BB628DFFC549203F992D488142CCCE2065CA05BE760ACE6F12CA2
3,513,118 UART: [art] SIG.S = ACC9434A5E1A97D1BEF2B505FC812984B66D576A9882C7BC7DF135156E9882C25B034B26405C91D68F4A0933F8767752
3,537,069 UART: Caliptra RT
3,537,320 UART: [state] CFI Enabled
3,656,882 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,212 UART: [rt]cmd =0x4453424c, len=4
3,704,808 >>> mbox cmd response data (8 bytes)
3,704,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,705,405 UART:
3,705,421 UART: Running Caliptra ROM ...
3,705,829 UART:
3,705,883 UART: [state] CFI Enabled
3,708,537 UART: [state] LifecycleState = Unprovisioned
3,709,192 UART: [state] DebugLocked = No
3,709,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,711,371 UART: [kat] SHA2-256
4,505,302 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,509,417 UART: [kat] ++
4,509,569 UART: [kat] sha1
4,513,911 UART: [kat] SHA2-256
4,515,849 UART: [kat] SHA2-384
4,518,568 UART: [kat] SHA2-512-ACC
4,520,468 UART: [kat] ECC-384
4,526,249 UART: [kat] HMAC-384Kdf
4,530,743 UART: [kat] LMS
5,098,939 UART: [kat] --
5,100,170 UART: [update-reset] ++
6,481,818 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,482,940 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,638,207 >>> mbox cmd response: success
6,638,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,638,546 UART: [update-reset] Copying MAN_2 To MAN_1
6,646,560 UART: [update-reset Success] --
6,647,455 UART: [state] Locking Datavault
6,648,123 UART: [state] Locking PCR0, PCR1 and PCR31
6,648,727 UART: [state] Locking ICCM
6,649,349 UART: [exit] Launching FMC @ 0x40000130
6,654,679 UART:
6,654,695 UART: Running Caliptra FMC ...
6,655,103 UART:
6,655,157 UART: [state] CFI Enabled
6,744,934 UART: [art] Extend RT PCRs Done
6,745,362 UART: [art] Lock RT PCRs Done
6,746,433 UART: [art] Populate DV Done
6,754,924 UART: [fht] FMC Alias Private Key: 7
6,756,076 UART: [art] Derive CDI
6,756,356 UART: [art] Store in slot 0x4
6,842,782 UART: [art] Derive Key Pair
6,843,142 UART: [art] Store priv key in slot 0x5
6,856,527 UART: [art] Derive Key Pair - Done
6,871,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,886,929 UART: [art] Erasing AUTHORITY.KEYID = 7
6,887,694 UART: [art] PUB.X = 6B84874790BEB6C86979E8957F36DEF20BD73F7619245D698158DBD4F9945F9CD007CCAAD1A886F06121F53242DB30A2
6,894,460 UART: [art] PUB.Y = 798E74F1A833A75990EA52B6ACC3ECE0B6F647DEEF7E20391363E26FC663E6A6A76CB67EA9A327EC2F3E57193C32D1E2
6,901,424 UART: [art] SIG.R = 47E4B22CDC5E2FD29C4C0B38752AAC61F0D80E306B7C9D426C44203B3FE20445A601B377BC03AFCD7FF79BCDB7455A0A
6,908,194 UART: [art] SIG.S = 2155B2CBDF3F55B8CEC526883E4EF65BB44AEB17DF6384881C5811F7C66DF4C74152C339F5B3B59F5609B9A7CEDE56E0
6,932,177 UART: Caliptra RT
6,932,428 UART: [state] CFI Enabled
7,313,723 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,344,132 UART: [rt]cmd =0x494e464f, len=4
7,347,872 >>> mbox cmd response data (312 bytes)
7,347,873 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,377,358 UART: [rt]cmd =0x43455252, len=4
7,388,097 >>> mbox cmd response data (782 bytes)
7,388,098 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,418,301 UART: [rt]cmd =0x44504543, len=92
7,603,273 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,697 ready_for_fw is high
1,362,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,048 >>> mbox cmd response: success
2,981,048 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,042,655 UART:
3,042,671 UART: Running Caliptra FMC ...
3,043,079 UART:
3,043,133 UART: [state] CFI Enabled
3,053,489 UART: [fht] FMC Alias Private Key: 7
3,172,579 UART: [art] Extend RT PCRs Done
3,173,007 UART: [art] Lock RT PCRs Done
3,174,579 UART: [art] Populate DV Done
3,182,800 UART: [fht] FMC Alias Private Key: 7
3,183,874 UART: [art] Derive CDI
3,184,154 UART: [art] Store in slot 0x4
3,270,032 UART: [art] Derive Key Pair
3,270,392 UART: [art] Store priv key in slot 0x5
3,283,715 UART: [art] Derive Key Pair - Done
3,298,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,004 UART: [art] PUB.X = 60F1CF865321091575FA73452B91BE2A53569D7899E47D5B2AFA28D7A7C2F371F64C10158F1C4CEEE749B6564C81DE10
3,321,773 UART: [art] PUB.Y = 3E8516086BA83EE4CD021B9CFC132C8FD8FCB59C4843BD38379F3656610C409DF4BEDD9723A1DD134731DD8DBCF96C55
3,328,728 UART: [art] SIG.R = A9F09053898C78B6EBE395D9652EED89B171752C8DEFBE7D5AE03BC3962B65D352C438A392954AE808E2ED77ED8BD724
3,335,505 UART: [art] SIG.S = 8B224D08CB205DA97CDB738BE447662507E6ED3ADBEB44E57F31862E6421CE2646CB3ADC93EC9A459E15F03D8DBADC38
3,359,407 UART: Caliptra RT
3,359,658 UART: [state] CFI Enabled
3,479,573 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,331 UART: [rt]cmd =0x4453424c, len=4
3,526,499 >>> mbox cmd response data (8 bytes)
3,526,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,340,308 >>> mbox cmd response: success
6,340,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,353,806 UART:
6,353,822 UART: Running Caliptra FMC ...
6,354,230 UART:
6,354,284 UART: [state] CFI Enabled
6,443,585 UART: [art] Extend RT PCRs Done
6,444,013 UART: [art] Lock RT PCRs Done
6,445,284 UART: [art] Populate DV Done
6,453,543 UART: [fht] FMC Alias Private Key: 7
6,454,549 UART: [art] Derive CDI
6,454,829 UART: [art] Store in slot 0x4
6,540,321 UART: [art] Derive Key Pair
6,540,681 UART: [art] Store priv key in slot 0x5
6,553,954 UART: [art] Derive Key Pair - Done
6,568,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,584,339 UART: [art] Erasing AUTHORITY.KEYID = 7
6,585,104 UART: [art] PUB.X = B6B82B9954C99FD66031DEA8B533A7DF51BEC7A329838B93AACA93C51D7DB0A2550BE382B1233587DFDC36A0F4C5FD6B
6,591,889 UART: [art] PUB.Y = 739AE16575E8D343559A3835953BE9BD4BBF4D9A2CF68EDE2A36E973CD36C9566DB6FAA2750F459875265E99D2D9448B
6,598,842 UART: [art] SIG.R = 4F3047566DDAE27FBA0B66BA515DE621CE6171A0C1596FC94E43E525EF8AFDFFCC95499D8AEDEA258716271B1D048951
6,605,620 UART: [art] SIG.S = CD1FCE387FBA0AC95DDFBEC8293D3624715F87A903FF6724979333448AD0B2B3132085CEF17512FA6C8EA7A90B90FDC9
6,629,769 UART: Caliptra RT
6,630,020 UART: [state] CFI Enabled
7,013,118 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,043,455 UART: [rt]cmd =0x494e464f, len=4
7,047,213 >>> mbox cmd response data (312 bytes)
7,047,214 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,076,569 UART: [rt]cmd =0x43455252, len=4
7,087,444 >>> mbox cmd response data (783 bytes)
7,087,445 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,117,300 UART: [rt]cmd =0x44504543, len=92
7,301,494 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,066 UART: [kat] SHA2-256
881,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,112 UART: [kat] ++
886,264 UART: [kat] sha1
890,424 UART: [kat] SHA2-256
892,362 UART: [kat] SHA2-384
895,183 UART: [kat] SHA2-512-ACC
897,084 UART: [kat] ECC-384
902,789 UART: [kat] HMAC-384Kdf
907,467 UART: [kat] LMS
1,475,663 UART: [kat] --
1,476,406 UART: [cold-reset] ++
1,476,798 UART: [fht] Storing FHT @ 0x50003400
1,479,651 UART: [idev] ++
1,479,819 UART: [idev] CDI.KEYID = 6
1,480,179 UART: [idev] SUBJECT.KEYID = 7
1,480,603 UART: [idev] UDS.KEYID = 0
1,480,948 ready_for_fw is high
1,480,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,081 UART: [idev] Erasing UDS.KEYID = 0
1,506,429 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,211 UART: [idev] --
1,516,362 UART: [ldev] ++
1,516,530 UART: [ldev] CDI.KEYID = 6
1,516,893 UART: [ldev] SUBJECT.KEYID = 5
1,517,319 UART: [ldev] AUTHORITY.KEYID = 7
1,517,782 UART: [ldev] FE.KEYID = 1
1,523,126 UART: [ldev] Erasing FE.KEYID = 1
1,548,669 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,885 UART: [ldev] --
1,588,210 UART: [fwproc] Waiting for Commands...
1,588,909 UART: [fwproc] Received command 0x46574c44
1,589,700 UART: [fwproc] Received Image of size 118548 bytes
2,933,446 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,692 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,910 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,135 >>> mbox cmd response: success
3,132,135 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,133,217 UART: [afmc] ++
3,133,385 UART: [afmc] CDI.KEYID = 6
3,133,747 UART: [afmc] SUBJECT.KEYID = 7
3,134,172 UART: [afmc] AUTHORITY.KEYID = 5
3,169,465 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,753 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,533 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,242 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,125 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,808 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,656 UART: [afmc] --
3,212,632 UART: [cold-reset] --
3,213,300 UART: [state] Locking Datavault
3,214,415 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,019 UART: [state] Locking ICCM
3,215,683 UART: [exit] Launching FMC @ 0x40000130
3,221,013 UART:
3,221,029 UART: Running Caliptra FMC ...
3,221,437 UART:
3,221,580 UART: [state] CFI Enabled
3,232,276 UART: [fht] FMC Alias Private Key: 7
3,351,812 UART: [art] Extend RT PCRs Done
3,352,240 UART: [art] Lock RT PCRs Done
3,354,014 UART: [art] Populate DV Done
3,362,193 UART: [fht] FMC Alias Private Key: 7
3,363,171 UART: [art] Derive CDI
3,363,451 UART: [art] Store in slot 0x4
3,449,147 UART: [art] Derive Key Pair
3,449,507 UART: [art] Store priv key in slot 0x5
3,463,222 UART: [art] Derive Key Pair - Done
3,477,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,065 UART: [art] PUB.X = C2C5339DD73CD0184CAAD097994109D4DD659B514AD0FF4F169BF7A126D00F9099F80ED2A29137B3802EB38F831C7E0C
3,500,831 UART: [art] PUB.Y = 9885BA14404CDEBE67D9E9FFDC7F1ED137A06457D6D3AABE64700F7A9A9766AFB01EFC9E295252F3D6C0B97A45CEBDEE
3,507,804 UART: [art] SIG.R = 764539F2DE01C6305622059DEAB9D9AEA119601DF8F6C00EBB0ABCC67866419352F33F79DC408FE5B189943A61F3CAE9
3,514,570 UART: [art] SIG.S = 0C81622092FE45FF7F2B13EF2FDBB7415DF27A5A375CC0D450EE80C20ABC03541620B683FDCE26A020F3F8CD8BADA427
3,538,157 UART: Caliptra RT
3,538,500 UART: [state] CFI Enabled
3,659,253 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,647 UART: [rt]cmd =0x4453424c, len=4
3,707,599 >>> mbox cmd response data (8 bytes)
3,707,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,708,408 UART:
3,708,424 UART: Running Caliptra ROM ...
3,708,832 UART:
3,708,973 UART: [state] CFI Enabled
3,711,717 UART: [state] LifecycleState = Unprovisioned
3,712,372 UART: [state] DebugLocked = No
3,712,922 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,714,447 UART: [kat] SHA2-256
4,508,378 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,512,493 UART: [kat] ++
4,512,645 UART: [kat] sha1
4,516,981 UART: [kat] SHA2-256
4,518,919 UART: [kat] SHA2-384
4,521,634 UART: [kat] SHA2-512-ACC
4,523,534 UART: [kat] ECC-384
4,529,429 UART: [kat] HMAC-384Kdf
4,534,141 UART: [kat] LMS
5,102,337 UART: [kat] --
5,103,014 UART: [update-reset] ++
6,483,898 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,485,042 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,640,309 >>> mbox cmd response: success
6,640,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,640,662 UART: [update-reset] Copying MAN_2 To MAN_1
6,648,676 UART: [update-reset Success] --
6,649,711 UART: [state] Locking Datavault
6,650,531 UART: [state] Locking PCR0, PCR1 and PCR31
6,651,135 UART: [state] Locking ICCM
6,651,677 UART: [exit] Launching FMC @ 0x40000130
6,657,007 UART:
6,657,023 UART: Running Caliptra FMC ...
6,657,431 UART:
6,657,574 UART: [state] CFI Enabled
6,746,945 UART: [art] Extend RT PCRs Done
6,747,373 UART: [art] Lock RT PCRs Done
6,748,692 UART: [art] Populate DV Done
6,756,793 UART: [fht] FMC Alias Private Key: 7
6,757,919 UART: [art] Derive CDI
6,758,199 UART: [art] Store in slot 0x4
6,844,353 UART: [art] Derive Key Pair
6,844,713 UART: [art] Store priv key in slot 0x5
6,857,812 UART: [art] Derive Key Pair - Done
6,872,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,887,844 UART: [art] Erasing AUTHORITY.KEYID = 7
6,888,609 UART: [art] PUB.X = 847B6A531173AFA8255994831ED04DE8BC6A8C6004FA3DEB548BF6379B68BF3BE01F9002D75C2068B2D34E796215F413
6,895,375 UART: [art] PUB.Y = 2907F023807A24FEFD7393CF4163836F304D30556F5669E4C7C1C197804FB0BFDA91209CD04B87FEE764044B79B47DBE
6,902,321 UART: [art] SIG.R = 4D15008DD549E6812A26E7DDF59E8F4544EBB1F1B88FD98C4D9E00A281B6F9CB6C8921648E865659C764F8F82F50587A
6,909,051 UART: [art] SIG.S = BA7089E0CC044D26A10040CC063241D3230409A2D4D29F64FD81B3A5EE6B8F4A0718A12F432ECD529DC6914E10BC3F66
6,932,732 UART: Caliptra RT
6,933,075 UART: [state] CFI Enabled
7,316,817 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,347,154 UART: [rt]cmd =0x494e464f, len=4
7,350,702 >>> mbox cmd response data (312 bytes)
7,350,703 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,380,096 UART: [rt]cmd =0x43455252, len=4
7,390,765 >>> mbox cmd response data (783 bytes)
7,390,766 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,420,763 UART: [rt]cmd =0x44504543, len=92
7,605,698 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,828 ready_for_fw is high
1,362,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,939 >>> mbox cmd response: success
2,980,939 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,043,014 UART:
3,043,030 UART: Running Caliptra FMC ...
3,043,438 UART:
3,043,581 UART: [state] CFI Enabled
3,054,241 UART: [fht] FMC Alias Private Key: 7
3,173,695 UART: [art] Extend RT PCRs Done
3,174,123 UART: [art] Lock RT PCRs Done
3,175,593 UART: [art] Populate DV Done
3,184,184 UART: [fht] FMC Alias Private Key: 7
3,185,128 UART: [art] Derive CDI
3,185,408 UART: [art] Store in slot 0x4
3,270,704 UART: [art] Derive Key Pair
3,271,064 UART: [art] Store priv key in slot 0x5
3,284,329 UART: [art] Derive Key Pair - Done
3,299,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,527 UART: [art] PUB.X = ED991F818B0476EA5ACE3E5F7ABF833D07EB78701F09544FCA5946B589218A940269A7E037FD269EA4F3C0F5ADEFE34C
3,322,299 UART: [art] PUB.Y = 9715FC57D134749B8D32883C4A0F65A39662AF8D96DD272824649F4039343E4A17A61763A2362F7A34B8CF7CFAAE3F48
3,329,244 UART: [art] SIG.R = 0D67CD0EB7DF5A4065E0DEE7896A6A124359EE0D901C524467BC20816E1C15B9529993E1B83C165B282974C7174FA2CC
3,336,007 UART: [art] SIG.S = 537DAB5313D978035209C72B8400669B0BA0B711A5356B38A1D7092B48E2DBA79979F06730A533E6E4DA7C3FD112878A
3,360,115 UART: Caliptra RT
3,360,458 UART: [state] CFI Enabled
3,479,823 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,413 UART: [rt]cmd =0x4453424c, len=4
3,527,627 >>> mbox cmd response data (8 bytes)
3,527,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,341,409 >>> mbox cmd response: success
6,341,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,354,985 UART:
6,355,001 UART: Running Caliptra FMC ...
6,355,409 UART:
6,355,552 UART: [state] CFI Enabled
6,444,367 UART: [art] Extend RT PCRs Done
6,444,795 UART: [art] Lock RT PCRs Done
6,446,186 UART: [art] Populate DV Done
6,454,459 UART: [fht] FMC Alias Private Key: 7
6,455,459 UART: [art] Derive CDI
6,455,739 UART: [art] Store in slot 0x4
6,541,685 UART: [art] Derive Key Pair
6,542,045 UART: [art] Store priv key in slot 0x5
6,555,204 UART: [art] Derive Key Pair - Done
6,570,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,585,285 UART: [art] Erasing AUTHORITY.KEYID = 7
6,586,050 UART: [art] PUB.X = 7EA9627614709FA17AA834C9F9CF0A984D080F88B06E2D68A1239FDCCCE0F21F7553D922DF530A646E49A5C354D7165B
6,592,814 UART: [art] PUB.Y = 82AB24C92E5E66A735665169A270DFD984B64032FB55FBE0D9E5007D42A8FA2B579436C6EDDFC2546243DBB81686D0ED
6,599,750 UART: [art] SIG.R = A3F40918854EC659254555915FD4D44732125FA598001A80BAFDD7E329BD4543D93A019186791C5BCB94B79F62566BBB
6,606,488 UART: [art] SIG.S = 459B89DEC2CF6B7CFFE65560E5DD2354A38EF0C175D630681AAD03F880FF2AA6A99F1DD6C2456B6EB79E7A05C08399F7
6,630,246 UART: Caliptra RT
6,630,589 UART: [state] CFI Enabled
7,016,497 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,046,622 UART: [rt]cmd =0x494e464f, len=4
7,050,396 >>> mbox cmd response data (312 bytes)
7,050,397 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,079,618 UART: [rt]cmd =0x43455252, len=4
7,090,583 >>> mbox cmd response data (783 bytes)
7,090,584 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,120,595 UART: [rt]cmd =0x44504543, len=92
7,305,185 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,234 UART: [kat] ++
895,386 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
915,767 UART: [kat] HMAC-384Kdf
920,191 UART: [kat] LMS
1,168,503 UART: [kat] --
1,169,578 UART: [cold-reset] ++
1,170,158 UART: [fht] FHT @ 0x50003400
1,172,888 UART: [idev] ++
1,173,056 UART: [idev] CDI.KEYID = 6
1,173,417 UART: [idev] SUBJECT.KEYID = 7
1,173,842 UART: [idev] UDS.KEYID = 0
1,174,188 ready_for_fw is high
1,174,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,017 UART: [idev] Erasing UDS.KEYID = 0
1,198,931 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,209,136 UART: [ldev] ++
1,209,304 UART: [ldev] CDI.KEYID = 6
1,209,668 UART: [ldev] SUBJECT.KEYID = 5
1,210,095 UART: [ldev] AUTHORITY.KEYID = 7
1,210,558 UART: [ldev] FE.KEYID = 1
1,215,842 UART: [ldev] Erasing FE.KEYID = 1
1,242,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,830 UART: [ldev] --
1,281,043 UART: [fwproc] Wait for Commands...
1,281,654 UART: [fwproc] Recv command 0x46574c44
1,282,387 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,413 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,588 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,947 >>> mbox cmd response: success
2,825,947 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,827,047 UART: [afmc] ++
2,827,215 UART: [afmc] CDI.KEYID = 6
2,827,578 UART: [afmc] SUBJECT.KEYID = 7
2,828,004 UART: [afmc] AUTHORITY.KEYID = 5
2,863,139 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,385 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,095 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,976 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,677 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,572 UART: [afmc] --
2,906,507 UART: [cold-reset] --
2,907,371 UART: [state] Locking Datavault
2,908,742 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,346 UART: [state] Locking ICCM
2,909,906 UART: [exit] Launching FMC @ 0x40000130
2,915,236 UART:
2,915,252 UART: Running Caliptra FMC ...
2,915,660 UART:
2,915,714 UART: [state] CFI Enabled
2,926,432 UART: [fht] FMC Alias Private Key: 7
3,045,140 UART: [art] Extend RT PCRs Done
3,045,568 UART: [art] Lock RT PCRs Done
3,047,380 UART: [art] Populate DV Done
3,055,669 UART: [fht] FMC Alias Private Key: 7
3,056,775 UART: [art] Derive CDI
3,057,055 UART: [art] Store in slot 0x4
3,142,794 UART: [art] Derive Key Pair
3,143,154 UART: [art] Store priv key in slot 0x5
3,156,354 UART: [art] Derive Key Pair - Done
3,171,283 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,011 UART: [art] PUB.X = 5D19EEFA640096C3C7456C0FC2E2CB7D2625F3841660F7A60F64DA5A6D19308F0CA1EE5D3F3410B077EAACE514894A27
3,194,760 UART: [art] PUB.Y = D777888FF965E16CDA0142525B1FAA9DBAFBEBE6B8BE57A3813A3A5191C36EB052E9DE28DBF9AEEFB8D4F911FE16F9D5
3,201,735 UART: [art] SIG.R = D10AE66FACC9586F18A900F3507FC46DAD9A193423FF534970077944AE3146264CDDC8F65CD43EDE6DE5EF6493F4892F
3,208,487 UART: [art] SIG.S = 3C90F8D3A5F9FE7F37D1D5CD7BF993C065B581C1B7506CDEED04AD440FF074609943199D5AEACE624229C1C60C4A2C6A
3,232,886 UART: Caliptra RT
3,233,137 UART: [state] CFI Enabled
3,352,222 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,872 UART: [rt]cmd =0x4453424c, len=4
3,399,922 >>> mbox cmd response data (8 bytes)
3,399,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,400,830 UART:
3,400,846 UART: Running Caliptra ROM ...
3,401,254 UART:
3,401,309 UART: [state] CFI Enabled
3,403,803 UART: [state] LifecycleState = Unprovisioned
3,404,458 UART: [state] DebugLocked = No
3,405,148 UART: [state] WD Timer not started. Device not locked for debugging
3,406,364 UART: [kat] SHA2-256
4,209,914 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,214,018 UART: [kat] ++
4,214,170 UART: [kat] sha1
4,218,354 UART: [kat] SHA2-256
4,220,294 UART: [kat] SHA2-384
4,223,105 UART: [kat] SHA2-512-ACC
4,225,005 UART: [kat] ECC-384
4,234,598 UART: [kat] HMAC-384Kdf
4,239,368 UART: [kat] LMS
4,487,680 UART: [kat] --
4,488,392 UART: [update-reset] ++
5,848,105 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,849,316 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,004,531 >>> mbox cmd response: success
6,004,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,004,716 UART: [update-reset] Copying MAN_2 To MAN_1
6,012,730 UART: [update-reset Success] --
6,013,877 UART: [state] Locking Datavault
6,014,609 UART: [state] Locking PCR0, PCR1 and PCR31
6,015,213 UART: [state] Locking ICCM
6,015,747 UART: [exit] Launching FMC @ 0x40000130
6,021,077 UART:
6,021,093 UART: Running Caliptra FMC ...
6,021,501 UART:
6,021,555 UART: [state] CFI Enabled
6,110,986 UART: [art] Extend RT PCRs Done
6,111,414 UART: [art] Lock RT PCRs Done
6,113,099 UART: [art] Populate DV Done
6,121,196 UART: [fht] FMC Alias Private Key: 7
6,122,372 UART: [art] Derive CDI
6,122,652 UART: [art] Store in slot 0x4
6,208,771 UART: [art] Derive Key Pair
6,209,131 UART: [art] Store priv key in slot 0x5
6,222,669 UART: [art] Derive Key Pair - Done
6,237,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,253,265 UART: [art] Erasing AUTHORITY.KEYID = 7
6,254,030 UART: [art] PUB.X = D20163114CC9FF08BCB23061A280D9E57F7F27E66542B66248172628CEEDC627F3205696BC947E3FCB6C6EC8584DDB5D
6,260,800 UART: [art] PUB.Y = A4105861EDC5AA945AE811908B560E847750ADD1D466F0DD26984C42896634149C0621D6CEC5D437B37E771A134AAE2D
6,267,744 UART: [art] SIG.R = 850BC277E84C653DCF6428F03B0008D406A0ACB4EB6B3EB7F3B1085FCB59C846DD79B3B8C7006AB62C42D69003BF6118
6,274,465 UART: [art] SIG.S = 10841215CAB4A5D94AC2B03690650E363CDC772E4607C172C4A6F24C4BBBC88CFECD0AB76CD0734989973729CBDAA9AA
6,297,768 UART: Caliptra RT
6,298,019 UART: [state] CFI Enabled
6,678,792 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,709,075 UART: [rt]cmd =0x494e464f, len=4
6,712,899 >>> mbox cmd response data (312 bytes)
6,712,900 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,742,223 UART: [rt]cmd =0x43455252, len=4
6,753,002 >>> mbox cmd response data (783 bytes)
6,753,003 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,782,856 UART: [rt]cmd =0x44504543, len=92
6,966,922 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,394 ready_for_fw is high
1,059,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,216 >>> mbox cmd response: success
2,680,216 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,742,581 UART:
2,742,597 UART: Running Caliptra FMC ...
2,743,005 UART:
2,743,059 UART: [state] CFI Enabled
2,753,341 UART: [fht] FMC Alias Private Key: 7
2,871,897 UART: [art] Extend RT PCRs Done
2,872,325 UART: [art] Lock RT PCRs Done
2,874,071 UART: [art] Populate DV Done
2,882,338 UART: [fht] FMC Alias Private Key: 7
2,883,304 UART: [art] Derive CDI
2,883,584 UART: [art] Store in slot 0x4
2,969,007 UART: [art] Derive Key Pair
2,969,367 UART: [art] Store priv key in slot 0x5
2,982,637 UART: [art] Derive Key Pair - Done
2,996,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,147 UART: [art] PUB.X = 34110027DF001D7D40DC65EF66159E7F3B726E46CC14D09A470928DAE809E52A2C255D7D5735C8B16359FA64F7E605C1
3,019,864 UART: [art] PUB.Y = BD3707669C198E2682B212C538F54630F3AC1C10D81BF786D2D10A1EFE18E89DC1058C0D8D8769AFD08EBBE890CFCF42
3,026,814 UART: [art] SIG.R = E2786D031AF2FC826D391C6B2B057DB2375A96C5AEF363312092E48F2633A36D7298524C3C2AA8BC9572A80392394935
3,033,569 UART: [art] SIG.S = DF39520A3A394A6DFEDD3E4DC8A9806E506E35FDADFA88679B3B3ABB2A667FD7ABA0CB1C8710E3BD64455F04216BFC5F
3,057,651 UART: Caliptra RT
3,057,902 UART: [state] CFI Enabled
3,177,512 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,034 UART: [rt]cmd =0x4453424c, len=4
3,225,174 >>> mbox cmd response data (8 bytes)
3,225,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,712,011 >>> mbox cmd response: success
5,712,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,725,488 UART:
5,725,504 UART: Running Caliptra FMC ...
5,725,912 UART:
5,725,966 UART: [state] CFI Enabled
5,815,375 UART: [art] Extend RT PCRs Done
5,815,803 UART: [art] Lock RT PCRs Done
5,817,186 UART: [art] Populate DV Done
5,825,383 UART: [fht] FMC Alias Private Key: 7
5,826,517 UART: [art] Derive CDI
5,826,797 UART: [art] Store in slot 0x4
5,912,296 UART: [art] Derive Key Pair
5,912,656 UART: [art] Store priv key in slot 0x5
5,926,010 UART: [art] Derive Key Pair - Done
5,940,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,956,554 UART: [art] Erasing AUTHORITY.KEYID = 7
5,957,319 UART: [art] PUB.X = C275F559D3628B4C6EB29A93DCFED73497D3164C1B3AD4F5C8D48F70C7B529989F71A376F141154A68ABF3223DB6960E
5,964,092 UART: [art] PUB.Y = C798BB20F6EFA1087EFCEE33744230A130476E3DE0A06FF45F3670C9A09FD5971BE5D2052C2BC304D68293EFE564BA5D
5,971,045 UART: [art] SIG.R = F2C1D023675AB05EC13B3B0E2BA83625AD4175767BB647C7DD649C6D1685FB170DD5DF9E537E08351F6CE47407D7A02B
5,977,811 UART: [art] SIG.S = 1D7C259D9D2DBE8FD80A01E6B10E3D7361E2EA32B6B3C4B1D53486424559A80D722EDEEC8D8272FC8175750886EFD442
6,001,458 UART: Caliptra RT
6,001,709 UART: [state] CFI Enabled
6,386,728 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,416,891 UART: [rt]cmd =0x494e464f, len=4
6,420,587 >>> mbox cmd response data (312 bytes)
6,420,588 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,450,153 UART: [rt]cmd =0x43455252, len=4
6,460,794 >>> mbox cmd response data (783 bytes)
6,460,795 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,490,636 UART: [rt]cmd =0x44504543, len=92
6,674,886 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,739 UART: [kat] SHA2-256
901,679 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
915,954 UART: [kat] HMAC-384Kdf
920,494 UART: [kat] LMS
1,168,806 UART: [kat] --
1,169,829 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,172,943 UART: [idev] ++
1,173,111 UART: [idev] CDI.KEYID = 6
1,173,472 UART: [idev] SUBJECT.KEYID = 7
1,173,897 UART: [idev] UDS.KEYID = 0
1,174,243 ready_for_fw is high
1,174,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,804 UART: [idev] Sha1 KeyId Algorithm
1,208,696 UART: [idev] --
1,209,889 UART: [ldev] ++
1,210,057 UART: [ldev] CDI.KEYID = 6
1,210,421 UART: [ldev] SUBJECT.KEYID = 5
1,210,848 UART: [ldev] AUTHORITY.KEYID = 7
1,211,311 UART: [ldev] FE.KEYID = 1
1,216,531 UART: [ldev] Erasing FE.KEYID = 1
1,242,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,375 UART: [ldev] --
1,282,802 UART: [fwproc] Wait for Commands...
1,283,429 UART: [fwproc] Recv command 0x46574c44
1,284,162 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,874 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,049 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,384 >>> mbox cmd response: success
2,827,384 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,828,474 UART: [afmc] ++
2,828,642 UART: [afmc] CDI.KEYID = 6
2,829,005 UART: [afmc] SUBJECT.KEYID = 7
2,829,431 UART: [afmc] AUTHORITY.KEYID = 5
2,865,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,637 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,386 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,096 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,977 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,678 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,401 UART: [afmc] --
2,908,356 UART: [cold-reset] --
2,909,210 UART: [state] Locking Datavault
2,910,171 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,775 UART: [state] Locking ICCM
2,911,271 UART: [exit] Launching FMC @ 0x40000130
2,916,601 UART:
2,916,617 UART: Running Caliptra FMC ...
2,917,025 UART:
2,917,168 UART: [state] CFI Enabled
2,927,880 UART: [fht] FMC Alias Private Key: 7
3,046,880 UART: [art] Extend RT PCRs Done
3,047,308 UART: [art] Lock RT PCRs Done
3,049,000 UART: [art] Populate DV Done
3,057,287 UART: [fht] FMC Alias Private Key: 7
3,058,229 UART: [art] Derive CDI
3,058,509 UART: [art] Store in slot 0x4
3,144,208 UART: [art] Derive Key Pair
3,144,568 UART: [art] Store priv key in slot 0x5
3,157,490 UART: [art] Derive Key Pair - Done
3,172,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,916 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,681 UART: [art] PUB.X = E913122A583EB80BAC1934706B0EF20F4146A86686779B868920F3A3AA3DC04EF76E8EE5B62B2632AE434B046F3E0CD7
3,195,440 UART: [art] PUB.Y = 5A0F288060B41BCD8AE2020C1F4E3AC6A56CA58759FBA63C93D6ED811360D5F2F544724E2E89595AA0130C35015FC135
3,202,379 UART: [art] SIG.R = 460B271A6C8C36289E44661DD778181CA6139F2E36D533A3DB52EF7475A6DB8A285B6B27EB261D5DFBD247050C6B27FF
3,209,146 UART: [art] SIG.S = 9122454493BDAAE0C5371FF6639AFD2CFA4BB5C62DDFE566B8D7E8747BEC037E6A2FFE75F58A7ECF69FF7F217389192C
3,233,069 UART: Caliptra RT
3,233,412 UART: [state] CFI Enabled
3,353,623 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,311 UART: [rt]cmd =0x4453424c, len=4
3,401,667 >>> mbox cmd response data (8 bytes)
3,401,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,402,407 UART:
3,402,423 UART: Running Caliptra ROM ...
3,402,831 UART:
3,402,973 UART: [state] CFI Enabled
3,405,861 UART: [state] LifecycleState = Unprovisioned
3,406,516 UART: [state] DebugLocked = No
3,407,072 UART: [state] WD Timer not started. Device not locked for debugging
3,408,224 UART: [kat] SHA2-256
4,211,774 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,215,878 UART: [kat] ++
4,216,030 UART: [kat] sha1
4,220,362 UART: [kat] SHA2-256
4,222,302 UART: [kat] SHA2-384
4,224,951 UART: [kat] SHA2-512-ACC
4,226,851 UART: [kat] ECC-384
4,236,478 UART: [kat] HMAC-384Kdf
4,241,060 UART: [kat] LMS
4,489,372 UART: [kat] --
4,490,056 UART: [update-reset] ++
5,847,651 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,848,858 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,004,073 >>> mbox cmd response: success
6,004,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,004,408 UART: [update-reset] Copying MAN_2 To MAN_1
6,012,422 UART: [update-reset Success] --
6,013,473 UART: [state] Locking Datavault
6,014,215 UART: [state] Locking PCR0, PCR1 and PCR31
6,014,819 UART: [state] Locking ICCM
6,015,287 UART: [exit] Launching FMC @ 0x40000130
6,020,617 UART:
6,020,633 UART: Running Caliptra FMC ...
6,021,041 UART:
6,021,184 UART: [state] CFI Enabled
6,110,203 UART: [art] Extend RT PCRs Done
6,110,631 UART: [art] Lock RT PCRs Done
6,111,984 UART: [art] Populate DV Done
6,120,205 UART: [fht] FMC Alias Private Key: 7
6,121,283 UART: [art] Derive CDI
6,121,563 UART: [art] Store in slot 0x4
6,207,386 UART: [art] Derive Key Pair
6,207,746 UART: [art] Store priv key in slot 0x5
6,221,490 UART: [art] Derive Key Pair - Done
6,236,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,251,519 UART: [art] Erasing AUTHORITY.KEYID = 7
6,252,284 UART: [art] PUB.X = ED71EAF159C60D9A5FFDE4936A8D574C37F8E64662884D093CA94D182F6AB49C118B57307DF13DA2BA7A290F7B20626F
6,259,055 UART: [art] PUB.Y = A760B1A0DF57462375E11ACA33C8BFB2A5BD69D9FE6DFFECBF963C427168ECEC921FC3B2167EFABA907D4EC025B3C012
6,266,031 UART: [art] SIG.R = DB07F144D68EED7C40EC0CCE0D71EC04E9AAA9D18585CC5DE10ADABE4A8EB336E0D9161BAA7072E12B87C549D2384133
6,272,808 UART: [art] SIG.S = B033B66953B3BB71AF4BF294BD57456589953E5D3CB89BDC1663446130DFF63E3F30A53E7F5B093F4F80DBCA98157A28
6,296,575 UART: Caliptra RT
6,296,918 UART: [state] CFI Enabled
6,677,850 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,707,951 UART: [rt]cmd =0x494e464f, len=4
6,711,611 >>> mbox cmd response data (312 bytes)
6,711,612 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,740,961 UART: [rt]cmd =0x43455252, len=4
6,751,795 >>> mbox cmd response data (784 bytes)
6,751,796 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,781,473 UART: [rt]cmd =0x44504543, len=92
6,966,721 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,445 ready_for_fw is high
1,059,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,471 >>> mbox cmd response: success
2,676,471 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,738,186 UART:
2,738,202 UART: Running Caliptra FMC ...
2,738,610 UART:
2,738,753 UART: [state] CFI Enabled
2,749,321 UART: [fht] FMC Alias Private Key: 7
2,868,319 UART: [art] Extend RT PCRs Done
2,868,747 UART: [art] Lock RT PCRs Done
2,870,107 UART: [art] Populate DV Done
2,878,424 UART: [fht] FMC Alias Private Key: 7
2,879,462 UART: [art] Derive CDI
2,879,742 UART: [art] Store in slot 0x4
2,965,515 UART: [art] Derive Key Pair
2,965,875 UART: [art] Store priv key in slot 0x5
2,979,237 UART: [art] Derive Key Pair - Done
2,993,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,766 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,531 UART: [art] PUB.X = 5D184C430EBE29F45F87CB04CBE6D043A0609915E6D3B882FCC4D55D18C31E5CE3462C1D6A4BDBCC9156146064165A22
3,017,303 UART: [art] PUB.Y = BA010BB26F4079DD21126D050AE1364575CB51F41F0E8BC7C62B693AB3B18E6A95EA4AC36B1516BCB755EDED838FE772
3,024,252 UART: [art] SIG.R = 46B00D9C62ED60EE2BA474C2658116913899F237E5E4F8D7F485A78C3F8DA82E98B0DB96C0F7BD4DED7D6F7D45BD387E
3,031,033 UART: [art] SIG.S = 010254CE24697E3A7379B85130850B20281ED5999CB68F8713557224632D5B88B1696993B52FA55607A8CFF81583BCE3
3,054,899 UART: Caliptra RT
3,055,242 UART: [state] CFI Enabled
3,175,064 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,724 UART: [rt]cmd =0x4453424c, len=4
3,223,216 >>> mbox cmd response data (8 bytes)
3,223,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,711,420 >>> mbox cmd response: success
5,711,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,724,769 UART:
5,724,785 UART: Running Caliptra FMC ...
5,725,193 UART:
5,725,336 UART: [state] CFI Enabled
5,814,923 UART: [art] Extend RT PCRs Done
5,815,351 UART: [art] Lock RT PCRs Done
5,816,776 UART: [art] Populate DV Done
5,825,231 UART: [fht] FMC Alias Private Key: 7
5,826,285 UART: [art] Derive CDI
5,826,565 UART: [art] Store in slot 0x4
5,912,604 UART: [art] Derive Key Pair
5,912,964 UART: [art] Store priv key in slot 0x5
5,926,150 UART: [art] Derive Key Pair - Done
5,940,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,955,821 UART: [art] Erasing AUTHORITY.KEYID = 7
5,956,586 UART: [art] PUB.X = 013A577E1DD6A09180135534310C579227B216CFE1821DB8FB44146A294DF5EDB929B0C3D59A1A1C2921A8C980EC2A09
5,963,347 UART: [art] PUB.Y = 8CBF017093B9C91D619D7ADD0E64F83F6427DDF39F149F340A0709AF7B57DDCD37C8C55F27D6B30502D9E8F8F31DF820
5,970,288 UART: [art] SIG.R = 3DC9A111C015837409C60ABB252DDA4CD0DEE2C32448CBDB959CA334D54FB8DC58C77D6C9F566E468BB04383AFABE55B
5,977,072 UART: [art] SIG.S = F289243CDCF50971ECA87E554BDFC293C8BD732B6DE86CDE6B5F3318861187F42CAA011E3F57C7C37382E63D72210A73
6,000,789 UART: Caliptra RT
6,001,132 UART: [state] CFI Enabled
6,380,729 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,410,936 UART: [rt]cmd =0x494e464f, len=4
6,414,796 >>> mbox cmd response data (312 bytes)
6,414,797 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,443,984 UART: [rt]cmd =0x43455252, len=4
6,454,761 >>> mbox cmd response data (783 bytes)
6,454,762 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,484,781 UART: [rt]cmd =0x44504543, len=92
6,669,037 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
893,334 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,459 UART: [kat] ++
897,611 UART: [kat] sha1
901,727 UART: [kat] SHA2-256
903,667 UART: [kat] SHA2-384
906,544 UART: [kat] SHA2-512-ACC
908,445 UART: [kat] ECC-384
918,002 UART: [kat] HMAC-384Kdf
922,524 UART: [kat] LMS
1,170,852 UART: [kat] --
1,171,481 UART: [cold-reset] ++
1,172,045 UART: [fht] FHT @ 0x50003400
1,174,690 UART: [idev] ++
1,174,858 UART: [idev] CDI.KEYID = 6
1,175,218 UART: [idev] SUBJECT.KEYID = 7
1,175,642 UART: [idev] UDS.KEYID = 0
1,175,987 ready_for_fw is high
1,175,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,500 UART: [idev] Erasing UDS.KEYID = 0
1,200,739 UART: [idev] Sha1 KeyId Algorithm
1,209,227 UART: [idev] --
1,210,223 UART: [ldev] ++
1,210,391 UART: [ldev] CDI.KEYID = 6
1,210,754 UART: [ldev] SUBJECT.KEYID = 5
1,211,180 UART: [ldev] AUTHORITY.KEYID = 7
1,211,643 UART: [ldev] FE.KEYID = 1
1,216,947 UART: [ldev] Erasing FE.KEYID = 1
1,242,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,321 UART: [ldev] --
1,281,708 UART: [fwproc] Wait for Commands...
1,282,316 UART: [fwproc] Recv command 0x46574c44
1,283,044 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,740 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,910 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,077 >>> mbox cmd response: success
2,826,077 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,827,195 UART: [afmc] ++
2,827,363 UART: [afmc] CDI.KEYID = 6
2,827,725 UART: [afmc] SUBJECT.KEYID = 7
2,828,150 UART: [afmc] AUTHORITY.KEYID = 5
2,863,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,076 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,785 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,668 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,369 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,371 UART: [afmc] --
2,907,393 UART: [cold-reset] --
2,908,143 UART: [state] Locking Datavault
2,909,132 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,736 UART: [state] Locking ICCM
2,910,208 UART: [exit] Launching FMC @ 0x40000130
2,915,538 UART:
2,915,554 UART: Running Caliptra FMC ...
2,915,962 UART:
2,916,016 UART: [state] CFI Enabled
2,926,246 UART: [fht] FMC Alias Private Key: 7
3,045,156 UART: [art] Extend RT PCRs Done
3,045,584 UART: [art] Lock RT PCRs Done
3,047,182 UART: [art] Populate DV Done
3,055,411 UART: [fht] FMC Alias Private Key: 7
3,056,391 UART: [art] Derive CDI
3,056,671 UART: [art] Store in slot 0x4
3,142,076 UART: [art] Derive Key Pair
3,142,436 UART: [art] Store priv key in slot 0x5
3,155,720 UART: [art] Derive Key Pair - Done
3,170,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,214 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,979 UART: [art] PUB.X = B87C265AAB9ACBCFD6719703AF344B7306D15384B5C1AEB2761576EBFA5DD08DD0A839606FAE7AA211ED1E88E4C7EE5D
3,193,765 UART: [art] PUB.Y = 34A7CDB36F5DDCC59EC8FB96D42DFB1BE8E77523E954236A05B6C601CEBD2E73B1255A8FE39AAC857F3952D6801807F4
3,200,722 UART: [art] SIG.R = CCDD6BED509BA45AA02267582A4BB0475834F360E8EB02EDC9944DD1C7C718D4FCFF25DF80AD00C4445D270BD06F54F9
3,207,482 UART: [art] SIG.S = AD0F139C8260B7DB409A9C748E841155AA0D402D073C80BD46A4E30E704A8E276F679FEC5BD72E4852E9554A069A5464
3,231,131 UART: Caliptra RT
3,231,382 UART: [state] CFI Enabled
3,350,110 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,600 UART: [rt]cmd =0x4453424c, len=4
3,398,478 >>> mbox cmd response data (8 bytes)
3,398,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,399,260 UART:
3,399,276 UART: Running Caliptra ROM ...
3,399,684 UART:
3,399,739 UART: [state] CFI Enabled
3,402,397 UART: [state] LifecycleState = Unprovisioned
3,403,052 UART: [state] DebugLocked = No
3,403,780 UART: [state] WD Timer not started. Device not locked for debugging
3,404,968 UART: [kat] SHA2-256
4,210,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,214,743 UART: [kat] ++
4,214,895 UART: [kat] sha1
4,219,091 UART: [kat] SHA2-256
4,221,031 UART: [kat] SHA2-384
4,223,798 UART: [kat] SHA2-512-ACC
4,225,698 UART: [kat] ECC-384
4,236,001 UART: [kat] HMAC-384Kdf
4,240,753 UART: [kat] LMS
4,489,081 UART: [kat] --
4,489,867 UART: [update-reset] ++
5,847,921 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,848,948 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,004,163 >>> mbox cmd response: success
6,004,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,004,486 UART: [update-reset] Copying MAN_2 To MAN_1
6,012,500 UART: [update-reset Success] --
6,013,305 UART: [state] Locking Datavault
6,013,949 UART: [state] Locking PCR0, PCR1 and PCR31
6,014,553 UART: [state] Locking ICCM
6,015,123 UART: [exit] Launching FMC @ 0x40000130
6,020,453 UART:
6,020,469 UART: Running Caliptra FMC ...
6,020,877 UART:
6,020,931 UART: [state] CFI Enabled
6,110,008 UART: [art] Extend RT PCRs Done
6,110,436 UART: [art] Lock RT PCRs Done
6,111,709 UART: [art] Populate DV Done
6,119,834 UART: [fht] FMC Alias Private Key: 7
6,120,952 UART: [art] Derive CDI
6,121,232 UART: [art] Store in slot 0x4
6,207,059 UART: [art] Derive Key Pair
6,207,419 UART: [art] Store priv key in slot 0x5
6,220,711 UART: [art] Derive Key Pair - Done
6,235,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,250,704 UART: [art] Erasing AUTHORITY.KEYID = 7
6,251,469 UART: [art] PUB.X = ED8CDBC4E449575D887357080088FBB6614FC493D8B5FDAC505DB0FA4B642659BBE1D5A5A5A5F5B4F7A67AA87E8BFFED
6,258,238 UART: [art] PUB.Y = 5789002FBAB2947FEE59C99AF1E2B943EC90709D093E8366BF1376751602765DEDBD048C8BFC1F1CE7C440043EFEFFD9
6,265,166 UART: [art] SIG.R = A0F4D27DE5A154A6BF5D4953E464AAEFE0232C32997461294D86B2BA295BDE886B07311DB42AE1F820F74E489885B2D9
6,271,939 UART: [art] SIG.S = 7D054524A5416441551967EDC11538A8E469FEC1862CAA552BEFEAAA9B558FFE9364713E9F97A767F344EEF880FC1557
6,296,254 UART: Caliptra RT
6,296,505 UART: [state] CFI Enabled
6,680,644 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,710,869 UART: [rt]cmd =0x494e464f, len=4
6,714,587 >>> mbox cmd response data (312 bytes)
6,714,588 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,743,923 UART: [rt]cmd =0x43455252, len=4
6,754,680 >>> mbox cmd response data (783 bytes)
6,754,681 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,784,616 UART: [rt]cmd =0x44504543, len=92
6,969,224 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,545 ready_for_fw is high
1,060,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,548 >>> mbox cmd response: success
2,679,548 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,741,077 UART:
2,741,093 UART: Running Caliptra FMC ...
2,741,501 UART:
2,741,555 UART: [state] CFI Enabled
2,752,059 UART: [fht] FMC Alias Private Key: 7
2,870,635 UART: [art] Extend RT PCRs Done
2,871,063 UART: [art] Lock RT PCRs Done
2,872,779 UART: [art] Populate DV Done
2,881,000 UART: [fht] FMC Alias Private Key: 7
2,882,076 UART: [art] Derive CDI
2,882,356 UART: [art] Store in slot 0x4
2,968,117 UART: [art] Derive Key Pair
2,968,477 UART: [art] Store priv key in slot 0x5
2,981,569 UART: [art] Derive Key Pair - Done
2,996,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,042 UART: [art] PUB.X = 4AA7E3CE54E34E2B6F2AF90C5D9AA7463D2E927A66988ED8E7734C14784DE4100AB3DA1E79A635EBA5143D5FAC4AB307
3,019,819 UART: [art] PUB.Y = A0DAA24CEB65C1D7119C0F90F3A373F0AC8B99BBBD799A4906360E7385030FCB5FB21690E14B357A71CC02C20C476B5D
3,026,760 UART: [art] SIG.R = 1E557335E84B2411DE95CD01E689C1E0CC3A07B4A1D445499F1CF332D94C56CCA8AB1E17B18490410A153756A135C7EC
3,033,525 UART: [art] SIG.S = 24A8E119A4653AD5203987BCB601BE64A439D569DE25D480C5B58459BEBECE70DB0B592A3A26AA78F6C0C3F2B2EA7293
3,056,889 UART: Caliptra RT
3,057,140 UART: [state] CFI Enabled
3,175,566 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,158 UART: [rt]cmd =0x4453424c, len=4
3,223,570 >>> mbox cmd response data (8 bytes)
3,223,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,713,402 >>> mbox cmd response: success
5,713,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,726,887 UART:
5,726,903 UART: Running Caliptra FMC ...
5,727,311 UART:
5,727,365 UART: [state] CFI Enabled
5,816,910 UART: [art] Extend RT PCRs Done
5,817,338 UART: [art] Lock RT PCRs Done
5,818,437 UART: [art] Populate DV Done
5,826,554 UART: [fht] FMC Alias Private Key: 7
5,827,704 UART: [art] Derive CDI
5,827,984 UART: [art] Store in slot 0x4
5,914,083 UART: [art] Derive Key Pair
5,914,443 UART: [art] Store priv key in slot 0x5
5,928,075 UART: [art] Derive Key Pair - Done
5,942,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,958,153 UART: [art] Erasing AUTHORITY.KEYID = 7
5,958,918 UART: [art] PUB.X = 45AD6F2D0E07DC2CBA48C70F484C44B313D79BF52FBC93FD057F60595CD28D54EB68F6BDC710EA0FBD2692F821B47F1C
5,965,693 UART: [art] PUB.Y = E09CA6BDF8A6DC4DCF819BE4DCF3496E2D50D66EF6684D190B1DA9FD3437453592220AD0EE5A89B3D058A642A5ED06A4
5,972,652 UART: [art] SIG.R = 961AD5306FE1B4C474756AFFFC160A615FFE8BF37973F530F9FA8C15C94232873A3D5950E5AB7FB4B72596AA8199B498
5,979,425 UART: [art] SIG.S = 82DBE0E17D282F4A4013615664D825E81334C331299A099D5A328A05A7D4534A0A32510B89115CF1B2E1199971E6406E
6,002,897 UART: Caliptra RT
6,003,148 UART: [state] CFI Enabled
6,383,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,413,795 UART: [rt]cmd =0x494e464f, len=4
6,417,517 >>> mbox cmd response data (312 bytes)
6,417,518 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,447,137 UART: [rt]cmd =0x43455252, len=4
6,457,901 >>> mbox cmd response data (784 bytes)
6,457,902 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,487,761 UART: [rt]cmd =0x44504543, len=92
6,672,474 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,935 UART: [state] LifecycleState = Unprovisioned
86,590 UART: [state] DebugLocked = No
87,088 UART: [state] WD Timer not started. Device not locked for debugging
88,423 UART: [kat] SHA2-256
894,073 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,198 UART: [kat] ++
898,350 UART: [kat] sha1
902,750 UART: [kat] SHA2-256
904,690 UART: [kat] SHA2-384
907,603 UART: [kat] SHA2-512-ACC
909,504 UART: [kat] ECC-384
919,107 UART: [kat] HMAC-384Kdf
923,863 UART: [kat] LMS
1,172,191 UART: [kat] --
1,173,076 UART: [cold-reset] ++
1,173,558 UART: [fht] FHT @ 0x50003400
1,176,153 UART: [idev] ++
1,176,321 UART: [idev] CDI.KEYID = 6
1,176,681 UART: [idev] SUBJECT.KEYID = 7
1,177,105 UART: [idev] UDS.KEYID = 0
1,177,450 ready_for_fw is high
1,177,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,363 UART: [idev] Erasing UDS.KEYID = 0
1,202,632 UART: [idev] Sha1 KeyId Algorithm
1,210,998 UART: [idev] --
1,211,924 UART: [ldev] ++
1,212,092 UART: [ldev] CDI.KEYID = 6
1,212,455 UART: [ldev] SUBJECT.KEYID = 5
1,212,881 UART: [ldev] AUTHORITY.KEYID = 7
1,213,344 UART: [ldev] FE.KEYID = 1
1,218,572 UART: [ldev] Erasing FE.KEYID = 1
1,245,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,472 UART: [ldev] --
1,284,987 UART: [fwproc] Wait for Commands...
1,285,609 UART: [fwproc] Recv command 0x46574c44
1,286,337 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,659,133 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,303 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,460 >>> mbox cmd response: success
2,830,460 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,831,702 UART: [afmc] ++
2,831,870 UART: [afmc] CDI.KEYID = 6
2,832,232 UART: [afmc] SUBJECT.KEYID = 7
2,832,657 UART: [afmc] AUTHORITY.KEYID = 5
2,868,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,443 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,191 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,900 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,783 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,484 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,452 UART: [afmc] --
2,911,368 UART: [cold-reset] --
2,912,110 UART: [state] Locking Datavault
2,913,129 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,733 UART: [state] Locking ICCM
2,914,357 UART: [exit] Launching FMC @ 0x40000130
2,919,687 UART:
2,919,703 UART: Running Caliptra FMC ...
2,920,111 UART:
2,920,254 UART: [state] CFI Enabled
2,930,756 UART: [fht] FMC Alias Private Key: 7
3,049,450 UART: [art] Extend RT PCRs Done
3,049,878 UART: [art] Lock RT PCRs Done
3,051,234 UART: [art] Populate DV Done
3,059,451 UART: [fht] FMC Alias Private Key: 7
3,060,413 UART: [art] Derive CDI
3,060,693 UART: [art] Store in slot 0x4
3,146,230 UART: [art] Derive Key Pair
3,146,590 UART: [art] Store priv key in slot 0x5
3,160,182 UART: [art] Derive Key Pair - Done
3,175,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,566 UART: [art] PUB.X = D4B93E72988E33A1B863C9048F10EE9335DCC10C866E17CE2A7A2956FBF64259C9C0D7057A44601C43BA1D3126743037
3,198,325 UART: [art] PUB.Y = 66B6C6240C6C644E0C5A3BBE581FC65E11621DEF031530F9E76F64A8BA8EF6455F854935B95F97546707B1901CB8ABDC
3,205,269 UART: [art] SIG.R = A5E1ACC304D6E2FA1C31F577FF10CB55293AEF2EC39CB5681020F62906D928DFC0861FCC08EB65F1215C7634E160AC59
3,212,042 UART: [art] SIG.S = E64B9FF13683A4BAFB826566C5BE1FBE0A84B079C6FAE7F6250F027F66851A3B124C80BA0B4246AEFA30C422301AC32F
3,236,148 UART: Caliptra RT
3,236,491 UART: [state] CFI Enabled
3,357,081 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,775 UART: [rt]cmd =0x4453424c, len=4
3,405,333 >>> mbox cmd response data (8 bytes)
3,405,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,127 UART:
3,406,143 UART: Running Caliptra ROM ...
3,406,551 UART:
3,406,693 UART: [state] CFI Enabled
3,409,691 UART: [state] LifecycleState = Unprovisioned
3,410,346 UART: [state] DebugLocked = No
3,411,022 UART: [state] WD Timer not started. Device not locked for debugging
3,412,218 UART: [kat] SHA2-256
4,217,868 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,221,993 UART: [kat] ++
4,222,145 UART: [kat] sha1
4,226,617 UART: [kat] SHA2-256
4,228,557 UART: [kat] SHA2-384
4,231,250 UART: [kat] SHA2-512-ACC
4,233,150 UART: [kat] ECC-384
4,242,959 UART: [kat] HMAC-384Kdf
4,247,509 UART: [kat] LMS
4,495,837 UART: [kat] --
4,496,631 UART: [update-reset] ++
5,856,287 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,857,414 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,012,629 >>> mbox cmd response: success
6,012,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,012,758 UART: [update-reset] Copying MAN_2 To MAN_1
6,020,772 UART: [update-reset Success] --
6,021,685 UART: [state] Locking Datavault
6,022,579 UART: [state] Locking PCR0, PCR1 and PCR31
6,023,183 UART: [state] Locking ICCM
6,023,773 UART: [exit] Launching FMC @ 0x40000130
6,029,103 UART:
6,029,119 UART: Running Caliptra FMC ...
6,029,527 UART:
6,029,670 UART: [state] CFI Enabled
6,118,751 UART: [art] Extend RT PCRs Done
6,119,179 UART: [art] Lock RT PCRs Done
6,120,464 UART: [art] Populate DV Done
6,128,921 UART: [fht] FMC Alias Private Key: 7
6,129,995 UART: [art] Derive CDI
6,130,275 UART: [art] Store in slot 0x4
6,216,470 UART: [art] Derive Key Pair
6,216,830 UART: [art] Store priv key in slot 0x5
6,230,594 UART: [art] Derive Key Pair - Done
6,245,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,260,842 UART: [art] Erasing AUTHORITY.KEYID = 7
6,261,607 UART: [art] PUB.X = 22C107AEA386362E0DF320442542EC28A6302570EE6F16C7F8C7E6D6F62838FC15F9AAA8D9651D1BA3A93D2A3DC2EEDC
6,268,385 UART: [art] PUB.Y = 6A469CBF5A604222AAA1C25C25D760F0F627350BD4AA06972EFBF6B3AB8AA13658E04B42C352E0EEC18826191BB25822
6,275,337 UART: [art] SIG.R = 45A32E75D5A4334952096CDB5859DF6B8922E66B4392FCBD596D1528B06D376A48754F8C6B8B8BADE3E1AD5283318C0F
6,282,105 UART: [art] SIG.S = AA6934F6D73F9F1BEB8B7C22C8F6894978D7C1A01585AC850FFB9FB4A1326CA489E03BEBE6462512919F91AE5DC52C1A
6,305,576 UART: Caliptra RT
6,305,919 UART: [state] CFI Enabled
6,686,826 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,717,065 UART: [rt]cmd =0x494e464f, len=4
6,720,769 >>> mbox cmd response data (312 bytes)
6,720,770 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,750,071 UART: [rt]cmd =0x43455252, len=4
6,761,038 >>> mbox cmd response data (783 bytes)
6,761,039 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,790,934 UART: [rt]cmd =0x44504543, len=92
6,976,376 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,028 ready_for_fw is high
1,061,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,113 >>> mbox cmd response: success
2,681,113 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,743,288 UART:
2,743,304 UART: Running Caliptra FMC ...
2,743,712 UART:
2,743,855 UART: [state] CFI Enabled
2,754,383 UART: [fht] FMC Alias Private Key: 7
2,873,267 UART: [art] Extend RT PCRs Done
2,873,695 UART: [art] Lock RT PCRs Done
2,875,047 UART: [art] Populate DV Done
2,883,222 UART: [fht] FMC Alias Private Key: 7
2,884,316 UART: [art] Derive CDI
2,884,596 UART: [art] Store in slot 0x4
2,970,619 UART: [art] Derive Key Pair
2,970,979 UART: [art] Store priv key in slot 0x5
2,983,807 UART: [art] Derive Key Pair - Done
2,998,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,597 UART: [art] PUB.X = 135FB4D5A218B3FD1E4049583E6092997FC01577A306834E5A14EDDC059457234ED80B5F28C71AB6CF07A6F5E4D62324
3,021,355 UART: [art] PUB.Y = BBEECA86687CF873BA587078EA2EB879104E3DF39BF39B52B8817DAB05096B19009C4C18F59CB5F34878043C1D739CF9
3,028,282 UART: [art] SIG.R = 9B7BE9877A37A064920805734EEE944F07DEC2ED313EF75A618EA372DE7A0490C24C4191A1EEE3A521E6F1258ED459A9
3,035,046 UART: [art] SIG.S = 1AAD307D65E8332EA7FB1D5866754DF441F81DCA37A811CACBF5F2F81C69BF33FE025E713FF3E3A9E1E70F7097D6E6BC
3,058,906 UART: Caliptra RT
3,059,249 UART: [state] CFI Enabled
3,178,874 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,330 UART: [rt]cmd =0x4453424c, len=4
3,227,342 >>> mbox cmd response data (8 bytes)
3,227,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,718,041 >>> mbox cmd response: success
5,718,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,731,338 UART:
5,731,354 UART: Running Caliptra FMC ...
5,731,762 UART:
5,731,905 UART: [state] CFI Enabled
5,821,178 UART: [art] Extend RT PCRs Done
5,821,606 UART: [art] Lock RT PCRs Done
5,822,895 UART: [art] Populate DV Done
5,831,100 UART: [fht] FMC Alias Private Key: 7
5,832,186 UART: [art] Derive CDI
5,832,466 UART: [art] Store in slot 0x4
5,918,575 UART: [art] Derive Key Pair
5,918,935 UART: [art] Store priv key in slot 0x5
5,931,913 UART: [art] Derive Key Pair - Done
5,946,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,962,184 UART: [art] Erasing AUTHORITY.KEYID = 7
5,962,949 UART: [art] PUB.X = CA9FB533C24109444928C696522235F319D517282706AD1BD2E56DA9D3857A3F9D88B0524892195093887D0596065C7E
5,969,691 UART: [art] PUB.Y = 32FCC36F766C17921192DC56D0E65B87AF2F7048D2CBA04B443EF39865101D42B8638ABDCFAAD383CD6D7CFC689C2DE5
5,976,657 UART: [art] SIG.R = A06A3B9BBDCF5D8B8B077BF7BC3D3184AF07E09E938E403ED4869F0ABA2986307D389024C15C516D4574DB6B70D93C26
5,983,428 UART: [art] SIG.S = 8C6D7E4984694F0586C9353536C835E666F2DB3CA6F22EC545F11190AD2D214F69C50F886911AFB537EC06437128FC9C
6,007,415 UART: Caliptra RT
6,007,758 UART: [state] CFI Enabled
6,387,978 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,418,131 UART: [rt]cmd =0x494e464f, len=4
6,421,877 >>> mbox cmd response data (312 bytes)
6,421,878 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,451,145 UART: [rt]cmd =0x43455252, len=4
6,461,955 >>> mbox cmd response data (784 bytes)
6,461,956 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,491,801 UART: [rt]cmd =0x44504543, len=92
6,676,382 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,159 UART:
192,522 UART: Running Caliptra ROM ...
193,719 UART:
193,876 UART: [state] CFI Enabled
262,752 UART: [state] LifecycleState = Unprovisioned
265,047 UART: [state] DebugLocked = No
266,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,399 UART: [kat] SHA2-256
441,148 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,605 UART: [kat] ++
452,209 UART: [kat] sha1
463,517 UART: [kat] SHA2-256
466,244 UART: [kat] SHA2-384
471,383 UART: [kat] SHA2-512-ACC
473,770 UART: [kat] ECC-384
2,768,789 UART: [kat] HMAC-384Kdf
2,799,969 UART: [kat] LMS
3,990,291 UART: [kat] --
3,994,372 UART: [cold-reset] ++
3,995,810 UART: [fht] Storing FHT @ 0x50003400
4,007,927 UART: [idev] ++
4,008,498 UART: [idev] CDI.KEYID = 6
4,009,559 UART: [idev] SUBJECT.KEYID = 7
4,010,667 UART: [idev] UDS.KEYID = 0
4,011,718 ready_for_fw is high
4,011,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,379 UART: [idev] Erasing UDS.KEYID = 0
7,345,279 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,949 UART: [idev] --
7,371,057 UART: [ldev] ++
7,371,649 UART: [ldev] CDI.KEYID = 6
7,372,621 UART: [ldev] SUBJECT.KEYID = 5
7,373,783 UART: [ldev] AUTHORITY.KEYID = 7
7,375,067 UART: [ldev] FE.KEYID = 1
7,402,345 UART: [ldev] Erasing FE.KEYID = 1
10,734,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,325 UART: [ldev] --
13,097,321 UART: [fwproc] Waiting for Commands...
13,099,796 UART: [fwproc] Received command 0x46574c44
13,101,981 UART: [fwproc] Received Image of size 118548 bytes
17,210,435 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,290,850 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,363,997 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,693,043 >>> mbox cmd response: success
17,693,657 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,696,547 UART: [afmc] ++
17,697,130 UART: [afmc] CDI.KEYID = 6
17,698,150 UART: [afmc] SUBJECT.KEYID = 7
17,699,308 UART: [afmc] AUTHORITY.KEYID = 5
21,072,011 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,426 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,682 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,390,162 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,816 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,419,243 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,023 UART: [afmc] --
23,443,893 UART: [cold-reset] --
23,448,294 UART: [state] Locking Datavault
23,452,323 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,023 UART: [state] Locking ICCM
23,455,903 UART: [exit] Launching FMC @ 0x40000130
23,464,307 UART:
23,464,593 UART: Running Caliptra FMC ...
23,465,709 UART:
23,465,866 UART: [state] CFI Enabled
23,535,156 UART: [fht] FMC Alias Private Key: 7
25,875,775 UART: [art] Extend RT PCRs Done
25,877,003 UART: [art] Lock RT PCRs Done
25,878,793 UART: [art] Populate DV Done
25,884,148 UART: [fht] FMC Alias Private Key: 7
25,885,739 UART: [art] Derive CDI
25,886,552 UART: [art] Store in slot 0x4
25,944,162 UART: [art] Derive Key Pair
25,945,191 UART: [art] Store priv key in slot 0x5
29,238,329 UART: [art] Derive Key Pair - Done
29,251,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,665 UART: [art] Erasing AUTHORITY.KEYID = 7
31,542,193 UART: [art] PUB.X = A8B49F815C28D7B3CBC944324A8DC326E2B2AEC5C19B26E158A8F56DCA92301D702F5A3120E8F1AAB122E265EBF7A2FD
31,549,483 UART: [art] PUB.Y = B539F37FCD46A57A010DD1799CB887A27F21C192BA8970C02E96C94920BABEE387054198BBCCB9C4AF67F8B8B8C8941B
31,556,687 UART: [art] SIG.R = A0D09C2606DC191E28FFF53894CF177F2112F03BA7FB4AA87CA3F782BCC6AE9CC5EB0C8BE7398927BE3112BA1DD1110B
31,564,163 UART: [art] SIG.S = 4806827ACFEEBF024E3C1A85994337E8B90BD78FDE8DAA4FB189BFDBC272CA28EA0E784A75F794C85148A67F6AEF33BA
32,869,554 UART: Caliptra RT
32,870,273 UART: [state] CFI Enabled
33,049,127 UART: [rt] RT listening for mailbox commands...
33,081,573 UART: [rt]cmd =0x44504543, len=136
38,707,955 >>> mbox cmd response data (136 bytes)
38,709,318 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,739,164 UART: [rt]cmd =0x4453424c, len=4
42,058,735 >>> mbox cmd response data (8 bytes)
42,059,299 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,089,980 UART: [rt]cmd =0x44504543, len=92
47,851,317 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,785,745 ready_for_fw is high
3,786,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,224 >>> mbox cmd response: success
17,959,180 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,651,575 UART:
23,652,032 UART: Running Caliptra FMC ...
23,653,166 UART:
23,653,323 UART: [state] CFI Enabled
23,719,983 UART: [fht] FMC Alias Private Key: 7
26,060,143 UART: [art] Extend RT PCRs Done
26,061,389 UART: [art] Lock RT PCRs Done
26,062,997 UART: [art] Populate DV Done
26,068,201 UART: [fht] FMC Alias Private Key: 7
26,069,926 UART: [art] Derive CDI
26,070,670 UART: [art] Store in slot 0x4
26,128,661 UART: [art] Derive Key Pair
26,129,707 UART: [art] Store priv key in slot 0x5
29,422,248 UART: [art] Derive Key Pair - Done
29,435,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,408 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,930 UART: [art] PUB.X = 9B15BE1115BF687F45302C4BB12B17C5EDF2788B82EA59846E5DAD45BF7AAFF8D68E49561F875A97204C071873A7B5D3
31,732,142 UART: [art] PUB.Y = FAA2677E826B2743FE2D247F07C15DDFA79C82E6BC10A30FD09043A2D0485E15BF642B299A86742FD1080C7FF7199138
31,739,411 UART: [art] SIG.R = EDE4556E7A9B970AA98A6C9110686F418B68B9A3FD3DD5A7DC538C08AE1DD0FF7CA75B573FFE9ED7676BE34EF2229E88
31,746,811 UART: [art] SIG.S = 2FD2CB8F39121B97E1D14EFCA53F00BC0F0EC5A885F464C22705177E1B767924AEF3EE215C246628CB76F77A3173380E
33,052,062 UART: Caliptra RT
33,052,779 UART: [state] CFI Enabled
33,228,627 UART: [rt] RT listening for mailbox commands...
33,261,013 UART: [rt]cmd =0x44504543, len=136
38,890,036 >>> mbox cmd response data (136 bytes)
38,891,389 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,921,311 UART: [rt]cmd =0x4453424c, len=4
42,241,173 >>> mbox cmd response data (8 bytes)
42,241,721 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,272,168 UART: [rt]cmd =0x44504543, len=92
48,026,715 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,426 UART:
192,802 UART: Running Caliptra ROM ...
193,910 UART:
603,803 UART: [state] CFI Enabled
619,046 UART: [state] LifecycleState = Unprovisioned
620,991 UART: [state] DebugLocked = No
623,925 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,637 UART: [kat] SHA2-256
798,372 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,952 UART: [kat] ++
809,481 UART: [kat] sha1
820,570 UART: [kat] SHA2-256
823,283 UART: [kat] SHA2-384
828,587 UART: [kat] SHA2-512-ACC
830,922 UART: [kat] ECC-384
3,116,063 UART: [kat] HMAC-384Kdf
3,126,560 UART: [kat] LMS
4,316,666 UART: [kat] --
4,321,118 UART: [cold-reset] ++
4,323,614 UART: [fht] Storing FHT @ 0x50003400
4,334,941 UART: [idev] ++
4,335,506 UART: [idev] CDI.KEYID = 6
4,336,456 UART: [idev] SUBJECT.KEYID = 7
4,337,692 UART: [idev] UDS.KEYID = 0
4,338,912 ready_for_fw is high
4,339,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,105 UART: [idev] Erasing UDS.KEYID = 0
7,627,618 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,661 UART: [idev] --
7,652,271 UART: [ldev] ++
7,652,836 UART: [ldev] CDI.KEYID = 6
7,653,849 UART: [ldev] SUBJECT.KEYID = 5
7,655,019 UART: [ldev] AUTHORITY.KEYID = 7
7,656,248 UART: [ldev] FE.KEYID = 1
7,667,806 UART: [ldev] Erasing FE.KEYID = 1
10,954,504 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,343 UART: [ldev] --
13,314,938 UART: [fwproc] Waiting for Commands...
13,317,081 UART: [fwproc] Received command 0x46574c44
13,319,318 UART: [fwproc] Received Image of size 118548 bytes
17,421,353 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,835 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,029 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,816 >>> mbox cmd response: success
17,896,427 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,900,774 UART: [afmc] ++
17,901,358 UART: [afmc] CDI.KEYID = 6
17,902,322 UART: [afmc] SUBJECT.KEYID = 7
17,903,662 UART: [afmc] AUTHORITY.KEYID = 5
21,220,393 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,703 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,966 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,408 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,089 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,524 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,303 UART: [afmc] --
23,585,780 UART: [cold-reset] --
23,590,506 UART: [state] Locking Datavault
23,595,803 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,493 UART: [state] Locking ICCM
23,598,771 UART: [exit] Launching FMC @ 0x40000130
23,607,163 UART:
23,607,401 UART: Running Caliptra FMC ...
23,608,498 UART:
23,608,655 UART: [state] CFI Enabled
23,616,372 UART: [fht] FMC Alias Private Key: 7
25,956,332 UART: [art] Extend RT PCRs Done
25,957,552 UART: [art] Lock RT PCRs Done
25,959,230 UART: [art] Populate DV Done
25,964,743 UART: [fht] FMC Alias Private Key: 7
25,966,222 UART: [art] Derive CDI
25,966,977 UART: [art] Store in slot 0x4
26,009,937 UART: [art] Derive Key Pair
26,010,934 UART: [art] Store priv key in slot 0x5
29,252,980 UART: [art] Derive Key Pair - Done
29,266,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,290 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,801 UART: [art] PUB.X = 84EC23412E196F532DA9EB45A4ACB1A2AE5699BC1638B72C719A2DC26787F1E5AF861A91EA7715220206059DB6D19393
31,555,052 UART: [art] PUB.Y = 836E0036C263AC76DE5849D649DC8D7A3EE12395DB27FE21BC9228C1A55DC44053E99A26D4858E518CD99933F4ED7967
31,562,287 UART: [art] SIG.R = 1A8C2998C9ACA01CFBEBB50BFD2029364AEE5AED777B03D82A59DB9C5926D0ED303F1536F0E5149064E8E7D99F1EDCEC
31,569,675 UART: [art] SIG.S = E9AD44C7053004CF849F849145D2776AC1ADC7B51EFCEDE99EA3BAF88E8E0B50FE00E77D2B87F032EC04F4D09377690C
32,874,711 UART: Caliptra RT
32,875,412 UART: [state] CFI Enabled
33,009,011 UART: [rt] RT listening for mailbox commands...
33,041,406 UART: [rt]cmd =0x44504543, len=136
38,600,202 >>> mbox cmd response data (136 bytes)
38,602,092 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,631,875 UART: [rt]cmd =0x4453424c, len=4
41,877,157 >>> mbox cmd response data (8 bytes)
41,877,768 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,908,416 UART: [rt]cmd =0x44504543, len=92
47,583,975 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
4,123,561 ready_for_fw is high
4,123,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,582 >>> mbox cmd response: success
18,160,441 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,797,541 UART:
23,797,923 UART: Running Caliptra FMC ...
23,799,047 UART:
23,799,210 UART: [state] CFI Enabled
23,806,723 UART: [fht] FMC Alias Private Key: 7
26,146,397 UART: [art] Extend RT PCRs Done
26,147,618 UART: [art] Lock RT PCRs Done
26,149,415 UART: [art] Populate DV Done
26,154,665 UART: [fht] FMC Alias Private Key: 7
26,156,311 UART: [art] Derive CDI
26,157,122 UART: [art] Store in slot 0x4
26,199,716 UART: [art] Derive Key Pair
26,200,755 UART: [art] Store priv key in slot 0x5
29,442,693 UART: [art] Derive Key Pair - Done
29,455,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,834 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,337 UART: [art] PUB.X = 831B235D567B7F271DB123694713725262053BE1A64920AD5C570FCC2ED17D1305CA72C95A723270DBDA59496BD956D0
31,744,577 UART: [art] PUB.Y = 16D51A93EFF01BAA1ED686195F2C06EABA1734C523A64669348EE6720A1FE7C5998C1F180ABF08D8770D2A0C4403B9B9
31,751,892 UART: [art] SIG.R = 8FA802C157AC58CF1B122011C583A7B1782B0E8A9D246D9ADD921EDB2A975D50A09E98734E2766B7B9520BA770827708
31,759,231 UART: [art] SIG.S = ED7EFCA9FC17D7D90EA203E0644FE41DF58486427D6AC1D1DDBA6CF378F7B9836552F33877A9F25D3A02F8736B92ED8D
33,064,229 UART: Caliptra RT
33,064,949 UART: [state] CFI Enabled
33,198,177 UART: [rt] RT listening for mailbox commands...
33,230,681 UART: [rt]cmd =0x44504543, len=136
38,789,617 >>> mbox cmd response data (136 bytes)
38,790,905 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,820,664 UART: [rt]cmd =0x4453424c, len=4
42,065,974 >>> mbox cmd response data (8 bytes)
42,066,484 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,097,178 UART: [rt]cmd =0x44504543, len=92
47,772,768 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,198 UART:
192,547 UART: Running Caliptra ROM ...
193,730 UART:
193,878 UART: [state] CFI Enabled
261,315 UART: [state] LifecycleState = Unprovisioned
263,242 UART: [state] DebugLocked = No
265,719 UART: [state] WD Timer not started. Device not locked for debugging
269,272 UART: [kat] SHA2-256
448,866 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,670 UART: [kat] ++
460,119 UART: [kat] sha1
471,736 UART: [kat] SHA2-256
474,427 UART: [kat] SHA2-384
481,271 UART: [kat] SHA2-512-ACC
483,633 UART: [kat] ECC-384
2,949,509 UART: [kat] HMAC-384Kdf
2,971,704 UART: [kat] LMS
3,448,253 UART: [kat] --
3,451,892 UART: [cold-reset] ++
3,454,175 UART: [fht] FHT @ 0x50003400
3,465,283 UART: [idev] ++
3,465,837 UART: [idev] CDI.KEYID = 6
3,466,809 UART: [idev] SUBJECT.KEYID = 7
3,468,048 UART: [idev] UDS.KEYID = 0
3,468,975 ready_for_fw is high
3,469,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,205 UART: [idev] Erasing UDS.KEYID = 0
5,987,395 UART: [idev] Sha1 KeyId Algorithm
6,009,973 UART: [idev] --
6,013,753 UART: [ldev] ++
6,014,330 UART: [ldev] CDI.KEYID = 6
6,015,238 UART: [ldev] SUBJECT.KEYID = 5
6,016,454 UART: [ldev] AUTHORITY.KEYID = 7
6,017,682 UART: [ldev] FE.KEYID = 1
6,057,767 UART: [ldev] Erasing FE.KEYID = 1
8,564,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,726 UART: [ldev] --
10,373,037 UART: [fwproc] Wait for Commands...
10,374,758 UART: [fwproc] Recv command 0x46574c44
10,376,745 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,102 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,166 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,775 >>> mbox cmd response: success
14,343,830 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,347,693 UART: [afmc] ++
14,348,265 UART: [afmc] CDI.KEYID = 6
14,349,206 UART: [afmc] SUBJECT.KEYID = 7
14,350,414 UART: [afmc] AUTHORITY.KEYID = 5
16,896,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,470 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,340 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,339 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,889 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,695,725 UART: [afmc] --
18,699,745 UART: [cold-reset] --
18,703,552 UART: [state] Locking Datavault
18,708,330 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,122 UART: [state] Locking ICCM
18,712,840 UART: [exit] Launching FMC @ 0x40000130
18,721,228 UART:
18,721,471 UART: Running Caliptra FMC ...
18,722,573 UART:
18,722,729 UART: [state] CFI Enabled
18,776,843 UART: [fht] FMC Alias Private Key: 7
20,563,916 UART: [art] Extend RT PCRs Done
20,565,119 UART: [art] Lock RT PCRs Done
20,566,710 UART: [art] Populate DV Done
20,572,140 UART: [fht] FMC Alias Private Key: 7
20,573,671 UART: [art] Derive CDI
20,574,430 UART: [art] Store in slot 0x4
20,630,732 UART: [art] Derive Key Pair
20,631,771 UART: [art] Store priv key in slot 0x5
23,093,881 UART: [art] Derive Key Pair - Done
23,107,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,652 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,131 UART: [art] PUB.X = AED19858AAE2630E913F9AC87DD40AB6FB0C0C69BEC812CF806DBC66D256B937556A7B977BB8F3B5339BAAEFED3395F0
24,829,432 UART: [art] PUB.Y = C8E65E21069955287E1EFAA9154ABC56CD041104F4764889038A0EEBE3116B931431A00F3121245C1B42F22BE58E0A0C
24,836,721 UART: [art] SIG.R = 3A49B433FA07D482E4F889BF738A2FC5D72A19E28DACFE60269E98E54AD72F447A532A6001ABE63BFDC724435B237044
24,844,110 UART: [art] SIG.S = 12E0F37D95B3558A3796A822086FC9CAFE89111CA50A707CD54116CD5AA3D139AE36FE0BCED65FAE21446FCE64EC5B29
25,822,648 UART: Caliptra RT
25,823,379 UART: [state] CFI Enabled
26,004,754 UART: [rt] RT listening for mailbox commands...
26,037,043 UART: [rt]cmd =0x44504543, len=136
30,261,460 >>> mbox cmd response data (136 bytes)
30,262,754 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,292,482 UART: [rt]cmd =0x4453424c, len=4
32,779,805 >>> mbox cmd response data (8 bytes)
32,780,320 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,810,908 UART: [rt]cmd =0x44504543, len=92
37,164,611 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,461,097 ready_for_fw is high
3,461,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,691 >>> mbox cmd response: success
14,241,119 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,539,591 UART:
18,539,999 UART: Running Caliptra FMC ...
18,541,105 UART:
18,541,255 UART: [state] CFI Enabled
18,605,467 UART: [fht] FMC Alias Private Key: 7
20,371,624 UART: [art] Extend RT PCRs Done
20,372,839 UART: [art] Lock RT PCRs Done
20,374,626 UART: [art] Populate DV Done
20,379,930 UART: [fht] FMC Alias Private Key: 7
20,381,580 UART: [art] Derive CDI
20,382,419 UART: [art] Store in slot 0x4
20,439,497 UART: [art] Derive Key Pair
20,440,535 UART: [art] Store priv key in slot 0x5
22,903,323 UART: [art] Derive Key Pair - Done
22,916,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,562 UART: [art] Erasing AUTHORITY.KEYID = 7
24,630,067 UART: [art] PUB.X = 0ED347F536782929D8970AC383C1A84F9EF2306F8E2BB7E95DBF4F306C1D6B7C3046630EB2CD92831F55AC9D48344914
24,637,319 UART: [art] PUB.Y = 8566A754FDE9C9552F1726D4E187FA8EF2A1A1431D7F303716AF414E7704F4FBFE93B3A7759CB67815D410BBE48B97EA
24,644,575 UART: [art] SIG.R = 14C3384D8F47D8F60DD998C4B7E5155B5E2EC63C81793DBBC678E9B02123D9B8E32CAA2F6DA235F51EB5C29937887C36
24,651,966 UART: [art] SIG.S = 426B45FD4F2DDFD8682B3829285491D859ACEE1F25490CA102D0F6DEDAFEE6F4EA5CD475134107FE1213FFC3FD3A4361
25,631,278 UART: Caliptra RT
25,631,980 UART: [state] CFI Enabled
25,813,751 UART: [rt] RT listening for mailbox commands...
25,846,031 UART: [rt]cmd =0x44504543, len=136
30,068,645 >>> mbox cmd response data (136 bytes)
30,069,922 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,099,785 UART: [rt]cmd =0x4453424c, len=4
32,588,060 >>> mbox cmd response data (8 bytes)
32,588,587 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,618,956 UART: [rt]cmd =0x44504543, len=92
36,989,398 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
192,566 UART:
192,942 UART: Running Caliptra ROM ...
194,096 UART:
603,716 UART: [state] CFI Enabled
617,399 UART: [state] LifecycleState = Unprovisioned
619,314 UART: [state] DebugLocked = No
621,053 UART: [state] WD Timer not started. Device not locked for debugging
625,328 UART: [kat] SHA2-256
804,941 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,742 UART: [kat] ++
816,209 UART: [kat] sha1
828,361 UART: [kat] SHA2-256
831,087 UART: [kat] SHA2-384
836,230 UART: [kat] SHA2-512-ACC
838,601 UART: [kat] ECC-384
3,283,574 UART: [kat] HMAC-384Kdf
3,297,011 UART: [kat] LMS
3,773,459 UART: [kat] --
3,778,301 UART: [cold-reset] ++
3,780,662 UART: [fht] FHT @ 0x50003400
3,791,707 UART: [idev] ++
3,792,274 UART: [idev] CDI.KEYID = 6
3,793,306 UART: [idev] SUBJECT.KEYID = 7
3,794,480 UART: [idev] UDS.KEYID = 0
3,795,415 ready_for_fw is high
3,795,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,139 UART: [idev] Erasing UDS.KEYID = 0
6,266,437 UART: [idev] Sha1 KeyId Algorithm
6,289,611 UART: [idev] --
6,295,600 UART: [ldev] ++
6,296,265 UART: [ldev] CDI.KEYID = 6
6,297,160 UART: [ldev] SUBJECT.KEYID = 5
6,298,269 UART: [ldev] AUTHORITY.KEYID = 7
6,299,618 UART: [ldev] FE.KEYID = 1
6,310,240 UART: [ldev] Erasing FE.KEYID = 1
8,786,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,860 UART: [ldev] --
10,579,401 UART: [fwproc] Wait for Commands...
10,581,030 UART: [fwproc] Recv command 0x46574c44
10,583,022 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,140,854 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,213,888 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,542,150 >>> mbox cmd response: success
14,543,316 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,545,629 UART: [afmc] ++
14,546,273 UART: [afmc] CDI.KEYID = 6
14,547,157 UART: [afmc] SUBJECT.KEYID = 7
14,548,429 UART: [afmc] AUTHORITY.KEYID = 5
17,054,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,294 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,118 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,188 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,792 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,430 UART: [afmc] --
18,857,163 UART: [cold-reset] --
18,860,500 UART: [state] Locking Datavault
18,866,937 UART: [state] Locking PCR0, PCR1 and PCR31
18,868,687 UART: [state] Locking ICCM
18,870,812 UART: [exit] Launching FMC @ 0x40000130
18,879,209 UART:
18,879,453 UART: Running Caliptra FMC ...
18,880,479 UART:
18,880,629 UART: [state] CFI Enabled
18,888,215 UART: [fht] FMC Alias Private Key: 7
20,654,302 UART: [art] Extend RT PCRs Done
20,655,520 UART: [art] Lock RT PCRs Done
20,657,099 UART: [art] Populate DV Done
20,662,408 UART: [fht] FMC Alias Private Key: 7
20,663,974 UART: [art] Derive CDI
20,664,797 UART: [art] Store in slot 0x4
20,707,535 UART: [art] Derive Key Pair
20,708,567 UART: [art] Store priv key in slot 0x5
23,135,517 UART: [art] Derive Key Pair - Done
23,148,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,855,354 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,861 UART: [art] PUB.X = A4048482B903BD939E3F554E612ACDF9EE844CEB1377C646EDCCD104A54F3A5C214DE8E92487381015C22E93E6605D20
24,864,156 UART: [art] PUB.Y = F71BB510416A5B0CBC7782917C87981C99A4AC1CEFC714DA711B9CC76B167A85E63FC8A8E75C802789E7C8C11B4CF415
24,871,433 UART: [art] SIG.R = 0D14DB7B8BDCF575014D430E14C32C378ED8349DD0EBF9A2CE4CD72D317BC1F97995FA8E309B2646D15AE7AE215A3B7A
24,878,826 UART: [art] SIG.S = EC045517186E91039690BCADB6E7A8908E36AE97B76993B6ABDB493AD52B4F57CA4A4893CCB002FE37CEE7822DD1DF18
25,857,441 UART: Caliptra RT
25,858,130 UART: [state] CFI Enabled
25,991,336 UART: [rt] RT listening for mailbox commands...
26,023,933 UART: [rt]cmd =0x44504543, len=136
30,194,712 >>> mbox cmd response data (136 bytes)
30,196,040 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,225,897 UART: [rt]cmd =0x4453424c, len=4
32,656,888 >>> mbox cmd response data (8 bytes)
32,657,411 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,687,936 UART: [rt]cmd =0x44504543, len=92
36,973,681 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,778,527 ready_for_fw is high
3,778,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,126 >>> mbox cmd response: success
14,447,664 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,690,899 UART:
18,691,288 UART: Running Caliptra FMC ...
18,692,430 UART:
18,692,591 UART: [state] CFI Enabled
18,700,490 UART: [fht] FMC Alias Private Key: 7
20,466,323 UART: [art] Extend RT PCRs Done
20,467,572 UART: [art] Lock RT PCRs Done
20,469,116 UART: [art] Populate DV Done
20,474,590 UART: [fht] FMC Alias Private Key: 7
20,476,239 UART: [art] Derive CDI
20,476,976 UART: [art] Store in slot 0x4
20,519,836 UART: [art] Derive Key Pair
20,520,839 UART: [art] Store priv key in slot 0x5
22,947,857 UART: [art] Derive Key Pair - Done
22,961,120 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,837 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,333 UART: [art] PUB.X = 1E6EBDF09DD2494EFC38D40EAFB32079769765A55997F36FFD013CFCBB924F247417B0887F60BE41E9EC8C413152B058
24,676,642 UART: [art] PUB.Y = F6706440B89FD11AA3FC0A102ED423FD62243F44315EDFA6D7AB3C9F1C027819F271BEDBC2EC6121F957FBC63C3B9EF7
24,683,951 UART: [art] SIG.R = 4FC30609292B2F43CFF1568CC81C9843733C04A4EF47D99AC874A0307F172CFB2263102B50FCAF914BF308A24513D329
24,691,341 UART: [art] SIG.S = 9D801B04081200A67ABD7690046D37DDE7B7DA11F5410A7D8420796E2322E263EF2474303DA5D9D042DC72CDC4CC0F53
25,670,433 UART: Caliptra RT
25,671,132 UART: [state] CFI Enabled
25,803,652 UART: [rt] RT listening for mailbox commands...
25,835,848 UART: [rt]cmd =0x44504543, len=136
30,007,166 >>> mbox cmd response data (136 bytes)
30,008,430 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,038,371 UART: [rt]cmd =0x4453424c, len=4
32,469,202 >>> mbox cmd response data (8 bytes)
32,469,712 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,500,080 UART: [rt]cmd =0x44504543, len=92
36,785,791 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,050 UART:
192,428 UART: Running Caliptra ROM ...
193,554 UART:
193,697 UART: [state] CFI Enabled
266,401 UART: [state] LifecycleState = Unprovisioned
268,809 UART: [state] DebugLocked = No
271,693 UART: [state] WD Timer not started. Device not locked for debugging
276,930 UART: [kat] SHA2-256
466,794 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,556 UART: [kat] ++
478,036 UART: [kat] sha1
488,134 UART: [kat] SHA2-256
491,159 UART: [kat] SHA2-384
496,725 UART: [kat] SHA2-512-ACC
499,316 UART: [kat] ECC-384
2,950,750 UART: [kat] HMAC-384Kdf
2,973,355 UART: [kat] LMS
3,505,100 UART: [kat] --
3,508,811 UART: [cold-reset] ++
3,510,029 UART: [fht] FHT @ 0x50003400
3,521,721 UART: [idev] ++
3,522,431 UART: [idev] CDI.KEYID = 6
3,523,380 UART: [idev] SUBJECT.KEYID = 7
3,524,545 UART: [idev] UDS.KEYID = 0
3,525,467 ready_for_fw is high
3,525,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,713 UART: [idev] Erasing UDS.KEYID = 0
6,027,528 UART: [idev] Sha1 KeyId Algorithm
6,050,075 UART: [idev] --
6,054,971 UART: [ldev] ++
6,055,716 UART: [ldev] CDI.KEYID = 6
6,056,600 UART: [ldev] SUBJECT.KEYID = 5
6,057,700 UART: [ldev] AUTHORITY.KEYID = 7
6,058,988 UART: [ldev] FE.KEYID = 1
6,101,469 UART: [ldev] Erasing FE.KEYID = 1
8,606,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,529 UART: [ldev] --
10,415,711 UART: [fwproc] Wait for Commands...
10,418,136 UART: [fwproc] Recv command 0x46574c44
10,420,442 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,867 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,467 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,067 >>> mbox cmd response: success
14,682,270 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,684,730 UART: [afmc] ++
14,685,419 UART: [afmc] CDI.KEYID = 6
14,686,650 UART: [afmc] SUBJECT.KEYID = 7
14,688,079 UART: [afmc] AUTHORITY.KEYID = 5
17,218,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,413 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,522 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,666 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,573 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,471 UART: [afmc] --
19,035,679 UART: [cold-reset] --
19,040,524 UART: [state] Locking Datavault
19,045,987 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,117 UART: [state] Locking ICCM
19,049,618 UART: [exit] Launching FMC @ 0x40000130
19,058,283 UART:
19,058,527 UART: Running Caliptra FMC ...
19,059,634 UART:
19,059,793 UART: [state] CFI Enabled
19,115,838 UART: [fht] FMC Alias Private Key: 7
20,882,762 UART: [art] Extend RT PCRs Done
20,883,981 UART: [art] Lock RT PCRs Done
20,885,742 UART: [art] Populate DV Done
20,891,199 UART: [fht] FMC Alias Private Key: 7
20,892,786 UART: [art] Derive CDI
20,893,595 UART: [art] Store in slot 0x4
20,948,902 UART: [art] Derive Key Pair
20,949,946 UART: [art] Store priv key in slot 0x5
23,412,981 UART: [art] Derive Key Pair - Done
23,426,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,134 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,643 UART: [art] PUB.X = 0A0905A5493D648052F47428B417B662EF7583872C604A0D363280118C0EC7E350EC434EE832679D0FE2482005112AD5
25,146,852 UART: [art] PUB.Y = 7D88ABF6459F558DE3DD4D394A8684E1BA3FDC78335ED179B766F7A09985241C26E7CAF8DD74BBAE77FF08C067B7982C
25,154,106 UART: [art] SIG.R = 5DA472BE0417ABC9F4ED14DFB161EE71E23121B9B39392A4E656C1D532DE3E75CB35DFDDEBF40757B6D9FCECD747981D
25,161,570 UART: [art] SIG.S = 4F1B3CE6DB8D28B0A76E20A51756D6E454E8CDF7E126288B10EE3D33238076BEBB6428D98D861062B5AF0291CE62068E
26,140,877 UART: Caliptra RT
26,141,584 UART: [state] CFI Enabled
26,321,962 UART: [rt] RT listening for mailbox commands...
26,354,461 UART: [rt]cmd =0x44504543, len=136
30,578,271 >>> mbox cmd response data (136 bytes)
30,579,579 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,609,534 UART: [rt]cmd =0x4453424c, len=4
33,098,099 >>> mbox cmd response data (8 bytes)
33,098,641 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,129,069 UART: [rt]cmd =0x44504543, len=92
37,484,379 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,441,893 ready_for_fw is high
3,442,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,006 >>> mbox cmd response: success
14,825,327 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,108,971 UART:
19,109,363 UART: Running Caliptra FMC ...
19,110,516 UART:
19,110,672 UART: [state] CFI Enabled
19,178,741 UART: [fht] FMC Alias Private Key: 7
20,945,191 UART: [art] Extend RT PCRs Done
20,946,415 UART: [art] Lock RT PCRs Done
20,948,254 UART: [art] Populate DV Done
20,953,780 UART: [fht] FMC Alias Private Key: 7
20,955,319 UART: [art] Derive CDI
20,956,132 UART: [art] Store in slot 0x4
21,011,800 UART: [art] Derive Key Pair
21,012,846 UART: [art] Store priv key in slot 0x5
23,475,413 UART: [art] Derive Key Pair - Done
23,488,406 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,732 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,256 UART: [art] PUB.X = 4FF84B183410AB94CA4C2551F8BBE4088C43BA404DB3A249CCBDB7F387D4BE604A1DF19302F1499D8570609F1093A5E2
25,211,510 UART: [art] PUB.Y = F4E487CDEDE4A86127E70733B70835BD57BDFE05AFE632605CADF0BEB3E6CCC8704C074BB17116E0F241576988D9F983
25,218,770 UART: [art] SIG.R = C8BDA89C2F551425C271E70028D9F9B04E5C709FD65A3E2667DE1301F8EF1E579B31C36B5BCF2C491F77BBAADBF515A8
25,226,180 UART: [art] SIG.S = 55791D691B02DB7D90C80D1BD9DD6E616562EA1B802D6DA0FE1F8D53441D4DE315E050FFCCD0A1CC7F523AA120B11430
26,205,088 UART: Caliptra RT
26,205,812 UART: [state] CFI Enabled
26,385,976 UART: [rt] RT listening for mailbox commands...
26,418,309 UART: [rt]cmd =0x44504543, len=136
30,642,448 >>> mbox cmd response data (136 bytes)
30,643,738 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,673,734 UART: [rt]cmd =0x4453424c, len=4
33,161,043 >>> mbox cmd response data (8 bytes)
33,161,596 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,192,124 UART: [rt]cmd =0x44504543, len=92
37,547,214 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,687 UART:
193,043 UART: Running Caliptra ROM ...
194,241 UART:
603,654 UART: [state] CFI Enabled
618,760 UART: [state] LifecycleState = Unprovisioned
621,269 UART: [state] DebugLocked = No
622,733 UART: [state] WD Timer not started. Device not locked for debugging
626,581 UART: [kat] SHA2-256
816,478 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,218 UART: [kat] ++
827,745 UART: [kat] sha1
839,688 UART: [kat] SHA2-256
842,698 UART: [kat] SHA2-384
848,340 UART: [kat] SHA2-512-ACC
850,958 UART: [kat] ECC-384
3,290,394 UART: [kat] HMAC-384Kdf
3,304,402 UART: [kat] LMS
3,836,278 UART: [kat] --
3,840,632 UART: [cold-reset] ++
3,841,855 UART: [fht] FHT @ 0x50003400
3,852,296 UART: [idev] ++
3,852,941 UART: [idev] CDI.KEYID = 6
3,853,897 UART: [idev] SUBJECT.KEYID = 7
3,855,149 UART: [idev] UDS.KEYID = 0
3,856,059 ready_for_fw is high
3,856,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,619 UART: [idev] Erasing UDS.KEYID = 0
6,330,666 UART: [idev] Sha1 KeyId Algorithm
6,354,224 UART: [idev] --
6,359,781 UART: [ldev] ++
6,360,485 UART: [ldev] CDI.KEYID = 6
6,361,372 UART: [ldev] SUBJECT.KEYID = 5
6,362,590 UART: [ldev] AUTHORITY.KEYID = 7
6,363,775 UART: [ldev] FE.KEYID = 1
6,373,911 UART: [ldev] Erasing FE.KEYID = 1
8,851,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,396 UART: [ldev] --
10,644,698 UART: [fwproc] Wait for Commands...
10,647,332 UART: [fwproc] Recv command 0x46574c44
10,649,592 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,220,390 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,344,000 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,904,120 >>> mbox cmd response: success
14,905,202 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,907,353 UART: [afmc] ++
14,908,116 UART: [afmc] CDI.KEYID = 6
14,909,226 UART: [afmc] SUBJECT.KEYID = 7
14,910,771 UART: [afmc] AUTHORITY.KEYID = 5
17,412,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,137,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,139,575 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,154,661 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,169,804 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,184,767 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,826 UART: [afmc] --
19,213,805 UART: [cold-reset] --
19,217,669 UART: [state] Locking Datavault
19,223,870 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,017 UART: [state] Locking ICCM
19,228,970 UART: [exit] Launching FMC @ 0x40000130
19,237,648 UART:
19,237,884 UART: Running Caliptra FMC ...
19,238,986 UART:
19,239,146 UART: [state] CFI Enabled
19,247,357 UART: [fht] FMC Alias Private Key: 7
21,013,717 UART: [art] Extend RT PCRs Done
21,014,941 UART: [art] Lock RT PCRs Done
21,016,488 UART: [art] Populate DV Done
21,021,966 UART: [fht] FMC Alias Private Key: 7
21,023,661 UART: [art] Derive CDI
21,024,415 UART: [art] Store in slot 0x4
21,066,859 UART: [art] Derive Key Pair
21,067,867 UART: [art] Store priv key in slot 0x5
23,494,459 UART: [art] Derive Key Pair - Done
23,507,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,695 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,212 UART: [art] PUB.X = 57F7935FB09C71B0AE6E7B7A8F9A12CEFF186C75C2C9759DC07B444D3DB951C54759A0ADB8350AA58156A61D870C5054
25,222,478 UART: [art] PUB.Y = FCC59EC23DD3C319F4F2BD0982F96368A9A8357A906F0B226F1D079AE4EEFF69B2E5DC98D64101C9498DBA95C0128211
25,229,737 UART: [art] SIG.R = 2DCA4251D8F31B4CA421586F9141DBA6BB7358237F6CFC5B2E17E6427A72414FE5AE9A54A9CE9183C22D793EC1835BA4
25,237,163 UART: [art] SIG.S = BEC27788314DEA0E6F7A1F975556C7168A575012C00F7F4C26165402197DFD7402E5BC86E2DCA4D3BB3AAF2AB970F75A
26,215,985 UART: Caliptra RT
26,216,673 UART: [state] CFI Enabled
26,349,631 UART: [rt] RT listening for mailbox commands...
26,381,737 UART: [rt]cmd =0x44504543, len=136
30,552,018 >>> mbox cmd response data (136 bytes)
30,553,325 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,583,113 UART: [rt]cmd =0x4453424c, len=4
33,014,407 >>> mbox cmd response data (8 bytes)
33,014,937 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,045,389 UART: [rt]cmd =0x44504543, len=92
37,330,952 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,753,787 ready_for_fw is high
3,754,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,023 >>> mbox cmd response: success
15,044,300 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,302,397 UART:
19,302,798 UART: Running Caliptra FMC ...
19,303,933 UART:
19,304,096 UART: [state] CFI Enabled
19,312,318 UART: [fht] FMC Alias Private Key: 7
21,078,919 UART: [art] Extend RT PCRs Done
21,080,130 UART: [art] Lock RT PCRs Done
21,082,026 UART: [art] Populate DV Done
21,087,586 UART: [fht] FMC Alias Private Key: 7
21,089,241 UART: [art] Derive CDI
21,090,062 UART: [art] Store in slot 0x4
21,132,609 UART: [art] Derive Key Pair
21,133,614 UART: [art] Store priv key in slot 0x5
23,560,937 UART: [art] Derive Key Pair - Done
23,573,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,342 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,842 UART: [art] PUB.X = 90D18D62E46B660A37992B355DDC82A706A6C03C9FEABD422DED4403383BF18AE58214D8166B6BACF912ADEAD88BE26E
25,289,100 UART: [art] PUB.Y = BBE7BE183DB9A45883E2EC97D08F79E7C8912E20E9EB74C1458C673D1736FAD7E40BE8169DB803078139679783F29997
25,296,358 UART: [art] SIG.R = B7263384A35F9CFDE2C412FBA09E946EF74D03C81D898BF61141DC22D9C6E5E294A2F9AB5F3C14FFD9742AA985FB14DA
25,303,756 UART: [art] SIG.S = 74D18E7825C7B7AEF50ECFC9DE14ACFF19CADA20D2AC9DE689C0E9EC3DC5CEA4E78D6A42CBFC1EBEF32C0EAD66C93D0F
26,283,392 UART: Caliptra RT
26,284,091 UART: [state] CFI Enabled
26,416,660 UART: [rt] RT listening for mailbox commands...
26,449,038 UART: [rt]cmd =0x44504543, len=136
30,620,030 >>> mbox cmd response data (136 bytes)
30,621,309 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,651,092 UART: [rt]cmd =0x4453424c, len=4
33,082,105 >>> mbox cmd response data (8 bytes)
33,082,624 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,113,106 UART: [rt]cmd =0x44504543, len=92
37,399,232 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,025 UART: [kat] SHA2-256
881,956 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,071 UART: [kat] ++
886,223 UART: [kat] sha1
890,399 UART: [kat] SHA2-256
892,337 UART: [kat] SHA2-384
895,144 UART: [kat] SHA2-512-ACC
897,045 UART: [kat] ECC-384
902,260 UART: [kat] HMAC-384Kdf
906,952 UART: [kat] LMS
1,475,148 UART: [kat] --
1,475,947 UART: [cold-reset] ++
1,476,391 UART: [fht] Storing FHT @ 0x50003400
1,479,256 UART: [idev] ++
1,479,424 UART: [idev] CDI.KEYID = 6
1,479,784 UART: [idev] SUBJECT.KEYID = 7
1,480,208 UART: [idev] UDS.KEYID = 0
1,480,553 ready_for_fw is high
1,480,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,592 UART: [idev] Erasing UDS.KEYID = 0
1,505,170 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,848 UART: [idev] --
1,514,901 UART: [ldev] ++
1,515,069 UART: [ldev] CDI.KEYID = 6
1,515,432 UART: [ldev] SUBJECT.KEYID = 5
1,515,858 UART: [ldev] AUTHORITY.KEYID = 7
1,516,321 UART: [ldev] FE.KEYID = 1
1,521,233 UART: [ldev] Erasing FE.KEYID = 1
1,546,788 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,548 UART: [ldev] --
1,585,955 UART: [fwproc] Waiting for Commands...
1,586,678 UART: [fwproc] Received command 0x46574c44
1,587,469 UART: [fwproc] Received Image of size 118548 bytes
2,932,231 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,285 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,503 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,716 >>> mbox cmd response: success
3,130,716 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,131,746 UART: [afmc] ++
3,131,914 UART: [afmc] CDI.KEYID = 6
3,132,276 UART: [afmc] SUBJECT.KEYID = 7
3,132,701 UART: [afmc] AUTHORITY.KEYID = 5
3,168,162 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,340 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,120 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,829 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,712 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,395 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,091 UART: [afmc] --
3,211,013 UART: [cold-reset] --
3,211,905 UART: [state] Locking Datavault
3,213,146 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,750 UART: [state] Locking ICCM
3,214,176 UART: [exit] Launching FMC @ 0x40000130
3,219,506 UART:
3,219,522 UART: Running Caliptra FMC ...
3,219,930 UART:
3,219,984 UART: [state] CFI Enabled
3,230,486 UART: [fht] FMC Alias Private Key: 7
3,349,608 UART: [art] Extend RT PCRs Done
3,350,036 UART: [art] Lock RT PCRs Done
3,351,712 UART: [art] Populate DV Done
3,359,855 UART: [fht] FMC Alias Private Key: 7
3,360,833 UART: [art] Derive CDI
3,361,113 UART: [art] Store in slot 0x4
3,446,487 UART: [art] Derive Key Pair
3,446,847 UART: [art] Store priv key in slot 0x5
3,460,174 UART: [art] Derive Key Pair - Done
3,475,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,216 UART: [art] PUB.X = 9CF63E4C31F936065030A787EAF9389CEF1C4055CA065CEC61A3FE2132B20C335B585193BFCFED47CBC999FA3DAE6643
3,497,991 UART: [art] PUB.Y = 19E28ED3E6BA25F354700BD934B78E0B949D564AAA4A513DCA1134E240EE3804D736191330957FB1434493C6ED1E2622
3,504,930 UART: [art] SIG.R = FF1BD407DA9AFE54A4793B1DD0D33193D8320E25AE7D7EB975CFA75438F024FA06490844C89A6E23F2DCE8748391A992
3,511,696 UART: [art] SIG.S = F825CC0C222A20459C01379A405ABDDE75513A7E3869BBE7D161FF108538782BDC59DE9DD1CADBBD43E32A38465953C8
3,535,486 UART: Caliptra RT
3,535,737 UART: [state] CFI Enabled
3,656,014 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,218 UART: [rt]cmd =0x44504543, len=136
3,750,782 >>> mbox cmd response data (136 bytes)
3,750,783 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,058 UART: [rt]cmd =0x4453424c, len=4
3,797,110 >>> mbox cmd response data (8 bytes)
3,797,111 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,827,140 UART: [rt]cmd =0x44504543, len=92
4,010,176 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,959 ready_for_fw is high
1,362,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,556 >>> mbox cmd response: success
2,981,556 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,043,077 UART:
3,043,093 UART: Running Caliptra FMC ...
3,043,501 UART:
3,043,555 UART: [state] CFI Enabled
3,053,825 UART: [fht] FMC Alias Private Key: 7
3,173,051 UART: [art] Extend RT PCRs Done
3,173,479 UART: [art] Lock RT PCRs Done
3,175,293 UART: [art] Populate DV Done
3,183,384 UART: [fht] FMC Alias Private Key: 7
3,184,366 UART: [art] Derive CDI
3,184,646 UART: [art] Store in slot 0x4
3,270,506 UART: [art] Derive Key Pair
3,270,866 UART: [art] Store priv key in slot 0x5
3,283,653 UART: [art] Derive Key Pair - Done
3,298,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,468 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,233 UART: [art] PUB.X = 26D5F39432D41B297008A74D96F26A6AA97D26C1F6FFD644FFC751C08D48DA172F31CB6A08100AEFDF76B91F468065BC
3,321,004 UART: [art] PUB.Y = 628B7958770084B609A86574CE3EC92C92482F2BCB145AA214D69DF1DF12DD711EF3E929FF75175C1173DBE8DCFEB3F2
3,327,939 UART: [art] SIG.R = AF762296843F21FBEB13028C5EF6E82D49167340D3E6D1682EBE6C90D685C905CE1593377C6F2A41E1AE54C1D234BAF9
3,334,709 UART: [art] SIG.S = 5FCB3AD6362327EAA797AE224069FB9290BCDC673998C725198F070D056CD09F843EA645BD3CD4F9F78D9D5E3EA1240C
3,358,403 UART: Caliptra RT
3,358,654 UART: [state] CFI Enabled
3,479,388 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,946 UART: [rt]cmd =0x44504543, len=136
3,574,308 >>> mbox cmd response data (136 bytes)
3,574,309 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,630 UART: [rt]cmd =0x4453424c, len=4
3,620,260 >>> mbox cmd response data (8 bytes)
3,620,261 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,650,078 UART: [rt]cmd =0x44504543, len=92
3,834,084 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,084 UART: [kat] SHA2-256
882,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,130 UART: [kat] ++
886,282 UART: [kat] sha1
890,330 UART: [kat] SHA2-256
892,268 UART: [kat] SHA2-384
895,029 UART: [kat] SHA2-512-ACC
896,930 UART: [kat] ECC-384
902,359 UART: [kat] HMAC-384Kdf
907,029 UART: [kat] LMS
1,475,225 UART: [kat] --
1,476,032 UART: [cold-reset] ++
1,476,522 UART: [fht] Storing FHT @ 0x50003400
1,479,487 UART: [idev] ++
1,479,655 UART: [idev] CDI.KEYID = 6
1,480,015 UART: [idev] SUBJECT.KEYID = 7
1,480,439 UART: [idev] UDS.KEYID = 0
1,480,784 ready_for_fw is high
1,480,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,065 UART: [idev] Erasing UDS.KEYID = 0
1,504,261 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,853 UART: [idev] --
1,513,834 UART: [ldev] ++
1,514,002 UART: [ldev] CDI.KEYID = 6
1,514,365 UART: [ldev] SUBJECT.KEYID = 5
1,514,791 UART: [ldev] AUTHORITY.KEYID = 7
1,515,254 UART: [ldev] FE.KEYID = 1
1,520,634 UART: [ldev] Erasing FE.KEYID = 1
1,546,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,427 UART: [ldev] --
1,585,926 UART: [fwproc] Waiting for Commands...
1,586,601 UART: [fwproc] Received command 0x46574c44
1,587,392 UART: [fwproc] Received Image of size 118548 bytes
2,932,504 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,076 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,294 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,507 >>> mbox cmd response: success
3,131,507 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,132,747 UART: [afmc] ++
3,132,915 UART: [afmc] CDI.KEYID = 6
3,133,277 UART: [afmc] SUBJECT.KEYID = 7
3,133,702 UART: [afmc] AUTHORITY.KEYID = 5
3,168,987 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,193 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,973 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,682 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,565 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,248 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,100 UART: [afmc] --
3,212,044 UART: [cold-reset] --
3,212,836 UART: [state] Locking Datavault
3,213,747 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,351 UART: [state] Locking ICCM
3,214,837 UART: [exit] Launching FMC @ 0x40000130
3,220,167 UART:
3,220,183 UART: Running Caliptra FMC ...
3,220,591 UART:
3,220,734 UART: [state] CFI Enabled
3,231,098 UART: [fht] FMC Alias Private Key: 7
3,349,820 UART: [art] Extend RT PCRs Done
3,350,248 UART: [art] Lock RT PCRs Done
3,351,948 UART: [art] Populate DV Done
3,360,191 UART: [fht] FMC Alias Private Key: 7
3,361,263 UART: [art] Derive CDI
3,361,543 UART: [art] Store in slot 0x4
3,447,437 UART: [art] Derive Key Pair
3,447,797 UART: [art] Store priv key in slot 0x5
3,460,952 UART: [art] Derive Key Pair - Done
3,475,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,799 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,564 UART: [art] PUB.X = FB5BEA9F6B9992B6F48A7DD1E42071DC53CE138445F1762A70151B8863BC68B86F8964D8B6233A448B6B7827705AC354
3,498,334 UART: [art] PUB.Y = 67323799590F0EA095BA08550D2B428D79F19CC713B797C21D8F23D771B08877F52A64F4FF30B2BFBF87D2940EDF3EDE
3,505,275 UART: [art] SIG.R = A91A0B00426C5BD8684A8D8B83A973B0474EAA9BB0D6815E9F7F54A39E716A471CCB2B7A82A7A70AAF0CE0E2623BBE61
3,512,030 UART: [art] SIG.S = D8A1FA3A7462CAC07BCE7BC90FA469D06A05DEF780BD4A5255147ADFF3725F9F1C3A92C27B964F729A487E6BD5ECD0F5
3,535,554 UART: Caliptra RT
3,535,897 UART: [state] CFI Enabled
3,656,218 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,562 UART: [rt]cmd =0x44504543, len=136
3,750,972 >>> mbox cmd response data (136 bytes)
3,750,973 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,188 UART: [rt]cmd =0x4453424c, len=4
3,796,968 >>> mbox cmd response data (8 bytes)
3,796,969 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,826,694 UART: [rt]cmd =0x44504543, len=92
4,010,838 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,238 ready_for_fw is high
1,363,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,901 >>> mbox cmd response: success
2,980,901 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,041,930 UART:
3,041,946 UART: Running Caliptra FMC ...
3,042,354 UART:
3,042,497 UART: [state] CFI Enabled
3,052,973 UART: [fht] FMC Alias Private Key: 7
3,171,829 UART: [art] Extend RT PCRs Done
3,172,257 UART: [art] Lock RT PCRs Done
3,173,571 UART: [art] Populate DV Done
3,181,736 UART: [fht] FMC Alias Private Key: 7
3,182,740 UART: [art] Derive CDI
3,183,020 UART: [art] Store in slot 0x4
3,269,058 UART: [art] Derive Key Pair
3,269,418 UART: [art] Store priv key in slot 0x5
3,282,707 UART: [art] Derive Key Pair - Done
3,297,142 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,254 UART: [art] PUB.X = 38495A6B441A66C2C23DF10E691E8FB5731C4C7E478E08F92A5590F7864069C5E21C9597359BE8ECA4C3DB1DE535F757
3,320,020 UART: [art] PUB.Y = 8A46B735C8E8C391408C2CAD31394003B2D6FE1A1047922D20C8D609844F4409FB98AC7E912977836449E551FA9490E6
3,326,953 UART: [art] SIG.R = A1EBC30B19D70C39DBE189FD67B70288CA0FA11FC02D9B74C29B1B73D80501DA1AFAC8C46B6EE3938EA95AC297177811
3,333,721 UART: [art] SIG.S = E172C9DBBF481F846D872D994D831D5A570A3D4DC912D898F286921A7361B1AB910B0E24A9EEB51C4B5EB1566F6A7B11
3,357,060 UART: Caliptra RT
3,357,403 UART: [state] CFI Enabled
3,477,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,828 UART: [rt]cmd =0x44504543, len=136
3,572,554 >>> mbox cmd response data (136 bytes)
3,572,555 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,910 UART: [rt]cmd =0x4453424c, len=4
3,619,824 >>> mbox cmd response data (8 bytes)
3,619,825 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,684 UART: [rt]cmd =0x44504543, len=92
3,834,146 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
88,028 UART: [kat] SHA2-256
891,578 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,841 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,169,940 UART: [cold-reset] ++
1,170,326 UART: [fht] FHT @ 0x50003400
1,173,060 UART: [idev] ++
1,173,228 UART: [idev] CDI.KEYID = 6
1,173,589 UART: [idev] SUBJECT.KEYID = 7
1,174,014 UART: [idev] UDS.KEYID = 0
1,174,360 ready_for_fw is high
1,174,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,919 UART: [idev] Erasing UDS.KEYID = 0
1,198,507 UART: [idev] Sha1 KeyId Algorithm
1,207,289 UART: [idev] --
1,208,556 UART: [ldev] ++
1,208,724 UART: [ldev] CDI.KEYID = 6
1,209,088 UART: [ldev] SUBJECT.KEYID = 5
1,209,515 UART: [ldev] AUTHORITY.KEYID = 7
1,209,978 UART: [ldev] FE.KEYID = 1
1,215,076 UART: [ldev] Erasing FE.KEYID = 1
1,241,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,516 UART: [ldev] --
1,280,923 UART: [fwproc] Wait for Commands...
1,281,532 UART: [fwproc] Recv command 0x46574c44
1,282,265 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,947 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,122 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,377 >>> mbox cmd response: success
2,825,377 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,826,523 UART: [afmc] ++
2,826,691 UART: [afmc] CDI.KEYID = 6
2,827,054 UART: [afmc] SUBJECT.KEYID = 7
2,827,480 UART: [afmc] AUTHORITY.KEYID = 5
2,863,543 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,645 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,355 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,236 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,937 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,624 UART: [afmc] --
2,906,435 UART: [cold-reset] --
2,907,461 UART: [state] Locking Datavault
2,908,952 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,556 UART: [state] Locking ICCM
2,910,038 UART: [exit] Launching FMC @ 0x40000130
2,915,368 UART:
2,915,384 UART: Running Caliptra FMC ...
2,915,792 UART:
2,915,846 UART: [state] CFI Enabled
2,926,448 UART: [fht] FMC Alias Private Key: 7
3,045,078 UART: [art] Extend RT PCRs Done
3,045,506 UART: [art] Lock RT PCRs Done
3,047,050 UART: [art] Populate DV Done
3,055,479 UART: [fht] FMC Alias Private Key: 7
3,056,517 UART: [art] Derive CDI
3,056,797 UART: [art] Store in slot 0x4
3,142,766 UART: [art] Derive Key Pair
3,143,126 UART: [art] Store priv key in slot 0x5
3,156,052 UART: [art] Derive Key Pair - Done
3,170,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,080 UART: [art] PUB.X = 8591E61E4F1CADFB347D33E51275970C253FECDA8A78EA2AD1E2F4BD4AF3E79C81293910925E3F2A023C984CAF894380
3,193,854 UART: [art] PUB.Y = D90C708FAF695094E95BFFBCB63C3CA15FB335CB42F871115A4E8A23890FEA9239670C137ACEBAF16C7B0FAB3E558F0F
3,200,809 UART: [art] SIG.R = E9E8328F32D53AF758FDA1C6178702C8B628935440F5D1B2D86C335D3A53252B35A322977300624020980D28E3046D27
3,207,534 UART: [art] SIG.S = 149805A21BDFBE4A9DA9079E8D5D0E6E9DABC9F73925AEF97270B60796C381B7CB8B2D646ED3D6439131C65DCA622924
3,231,122 UART: Caliptra RT
3,231,373 UART: [state] CFI Enabled
3,351,168 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,700 UART: [rt]cmd =0x44504543, len=136
3,446,540 >>> mbox cmd response data (136 bytes)
3,446,541 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,870 UART: [rt]cmd =0x4453424c, len=4
3,493,820 >>> mbox cmd response data (8 bytes)
3,493,821 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,812 UART: [rt]cmd =0x44504543, len=92
3,708,285 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,932 ready_for_fw is high
1,058,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,456 >>> mbox cmd response: success
2,677,456 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,739,545 UART:
2,739,561 UART: Running Caliptra FMC ...
2,739,969 UART:
2,740,023 UART: [state] CFI Enabled
2,750,509 UART: [fht] FMC Alias Private Key: 7
2,869,335 UART: [art] Extend RT PCRs Done
2,869,763 UART: [art] Lock RT PCRs Done
2,871,173 UART: [art] Populate DV Done
2,879,390 UART: [fht] FMC Alias Private Key: 7
2,880,560 UART: [art] Derive CDI
2,880,840 UART: [art] Store in slot 0x4
2,966,605 UART: [art] Derive Key Pair
2,966,965 UART: [art] Store priv key in slot 0x5
2,980,257 UART: [art] Derive Key Pair - Done
2,995,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,339 UART: [art] PUB.X = D750B1CEFB778A021B02065FEAB7922E7930A8ECCD5706B817E36CE757781EF57EDF501BC9E997E681DA349DB96B57B4
3,018,109 UART: [art] PUB.Y = 363BB48A8E519A9901398253BC27A2E8482DC358008916AC4698786AB1B0074E1C556B1477C2185F801DD461B126F5CB
3,025,023 UART: [art] SIG.R = 1CFD81039EC6A521327594CDA51274BD38FCFE33490C86AD862CC3C88D6E3CEDA9EEB1F4C827E1C0F73101CF9BD1CB1E
3,031,806 UART: [art] SIG.S = 04F3E6BD572FD423BE8E803E8D0B99AA6A8ECCD3C7998C1261EF61A10D7A573FF49C69B6844E4D2408DD2532DDB59B09
3,056,233 UART: Caliptra RT
3,056,484 UART: [state] CFI Enabled
3,175,980 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,342 UART: [rt]cmd =0x44504543, len=136
3,271,220 >>> mbox cmd response data (136 bytes)
3,271,221 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,552 UART: [rt]cmd =0x4453424c, len=4
3,318,008 >>> mbox cmd response data (8 bytes)
3,318,009 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,347,986 UART: [rt]cmd =0x44504543, len=92
3,533,491 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,179 UART: [kat] SHA2-256
902,119 UART: [kat] SHA2-384
904,972 UART: [kat] SHA2-512-ACC
906,873 UART: [kat] ECC-384
916,630 UART: [kat] HMAC-384Kdf
921,118 UART: [kat] LMS
1,169,430 UART: [kat] --
1,170,373 UART: [cold-reset] ++
1,170,771 UART: [fht] FHT @ 0x50003400
1,173,447 UART: [idev] ++
1,173,615 UART: [idev] CDI.KEYID = 6
1,173,976 UART: [idev] SUBJECT.KEYID = 7
1,174,401 UART: [idev] UDS.KEYID = 0
1,174,747 ready_for_fw is high
1,174,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,022 UART: [idev] Erasing UDS.KEYID = 0
1,199,026 UART: [idev] Sha1 KeyId Algorithm
1,207,694 UART: [idev] --
1,208,845 UART: [ldev] ++
1,209,013 UART: [ldev] CDI.KEYID = 6
1,209,377 UART: [ldev] SUBJECT.KEYID = 5
1,209,804 UART: [ldev] AUTHORITY.KEYID = 7
1,210,267 UART: [ldev] FE.KEYID = 1
1,215,485 UART: [ldev] Erasing FE.KEYID = 1
1,242,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,203 UART: [ldev] --
1,281,636 UART: [fwproc] Wait for Commands...
1,282,327 UART: [fwproc] Recv command 0x46574c44
1,283,060 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,730 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,905 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,280 >>> mbox cmd response: success
2,827,280 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,828,422 UART: [afmc] ++
2,828,590 UART: [afmc] CDI.KEYID = 6
2,828,953 UART: [afmc] SUBJECT.KEYID = 7
2,829,379 UART: [afmc] AUTHORITY.KEYID = 5
2,864,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,828 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,538 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,419 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,120 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,965 UART: [afmc] --
2,907,784 UART: [cold-reset] --
2,908,582 UART: [state] Locking Datavault
2,909,539 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,143 UART: [state] Locking ICCM
2,910,575 UART: [exit] Launching FMC @ 0x40000130
2,915,905 UART:
2,915,921 UART: Running Caliptra FMC ...
2,916,329 UART:
2,916,472 UART: [state] CFI Enabled
2,926,928 UART: [fht] FMC Alias Private Key: 7
3,045,814 UART: [art] Extend RT PCRs Done
3,046,242 UART: [art] Lock RT PCRs Done
3,047,504 UART: [art] Populate DV Done
3,055,581 UART: [fht] FMC Alias Private Key: 7
3,056,727 UART: [art] Derive CDI
3,057,007 UART: [art] Store in slot 0x4
3,142,954 UART: [art] Derive Key Pair
3,143,314 UART: [art] Store priv key in slot 0x5
3,156,534 UART: [art] Derive Key Pair - Done
3,171,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,041 UART: [art] PUB.X = F5AAB7878463579FE6D52DD65049449BF9ABB26D03EF8DC7CC41A2B1A2F6C818C1D7852A6C24DF061D1BEBC1FF827DFC
3,193,827 UART: [art] PUB.Y = F54226F1020B03CBA99AEB037DD91A46F6DDAE00666BF5A9398D13895FF25F8F42945A376EC0E9E2172C37A49E5BC5D9
3,200,753 UART: [art] SIG.R = 8E43338D3C3729F69225E7840125848B7FCC99B959440D60186E6DFD542A73CDACD3693714AAA5211474E4397B2AEE4B
3,207,515 UART: [art] SIG.S = A5900C3452021B84C4DBCFFC8A924E8AFC8D79A37AFA3D9BA7AE8FF4B051996A2D4872B0ED85315D45D82EE0E7CB45C7
3,231,811 UART: Caliptra RT
3,232,154 UART: [state] CFI Enabled
3,351,934 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,342 UART: [rt]cmd =0x44504543, len=136
3,447,148 >>> mbox cmd response data (136 bytes)
3,447,149 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,596 UART: [rt]cmd =0x4453424c, len=4
3,494,036 >>> mbox cmd response data (8 bytes)
3,494,037 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,888 UART: [rt]cmd =0x44504543, len=92
3,707,888 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,253 ready_for_fw is high
1,059,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,105 >>> mbox cmd response: success
2,677,105 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,738,610 UART:
2,738,626 UART: Running Caliptra FMC ...
2,739,034 UART:
2,739,177 UART: [state] CFI Enabled
2,749,555 UART: [fht] FMC Alias Private Key: 7
2,868,299 UART: [art] Extend RT PCRs Done
2,868,727 UART: [art] Lock RT PCRs Done
2,870,145 UART: [art] Populate DV Done
2,878,552 UART: [fht] FMC Alias Private Key: 7
2,879,544 UART: [art] Derive CDI
2,879,824 UART: [art] Store in slot 0x4
2,965,787 UART: [art] Derive Key Pair
2,966,147 UART: [art] Store priv key in slot 0x5
2,979,217 UART: [art] Derive Key Pair - Done
2,994,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,764 UART: [art] PUB.X = 73059B21722658E77021668B9005BBF20B317DF2A6E051AF9A5290BF1E8A464C2DCE33EC9C4714167BD5BC7A8572B5DC
3,017,529 UART: [art] PUB.Y = A22B8FA2669C4576967B367C72AB3271FA75855505AF4D4E5B1868301149145B38897ADB7E1155E35791E8B5DA1BFFE8
3,024,474 UART: [art] SIG.R = D6800385C479154B9CA82DE460561D8B1ABAD4C3AD9A2DC9F1CDEDA3D907CB2FC9F02C1A709193FDA761E11FF13AE445
3,031,258 UART: [art] SIG.S = 0A14A502D86BCCE394E79141BBFF6FED97475D5BB8B297E7BF1836914D05898EBEEF9B7884BC484F843109008F0E4870
3,055,295 UART: Caliptra RT
3,055,638 UART: [state] CFI Enabled
3,175,451 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,147 UART: [rt]cmd =0x44504543, len=136
3,271,117 >>> mbox cmd response data (136 bytes)
3,271,118 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,525 UART: [rt]cmd =0x4453424c, len=4
3,317,847 >>> mbox cmd response data (8 bytes)
3,317,848 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,347,725 UART: [rt]cmd =0x44504543, len=92
3,532,905 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
893,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,453 UART: [kat] ++
897,605 UART: [kat] sha1
901,883 UART: [kat] SHA2-256
903,823 UART: [kat] SHA2-384
906,348 UART: [kat] SHA2-512-ACC
908,249 UART: [kat] ECC-384
918,208 UART: [kat] HMAC-384Kdf
922,680 UART: [kat] LMS
1,171,008 UART: [kat] --
1,172,023 UART: [cold-reset] ++
1,172,537 UART: [fht] FHT @ 0x50003400
1,175,340 UART: [idev] ++
1,175,508 UART: [idev] CDI.KEYID = 6
1,175,868 UART: [idev] SUBJECT.KEYID = 7
1,176,292 UART: [idev] UDS.KEYID = 0
1,176,637 ready_for_fw is high
1,176,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,106 UART: [idev] Erasing UDS.KEYID = 0
1,200,983 UART: [idev] Sha1 KeyId Algorithm
1,209,585 UART: [idev] --
1,210,827 UART: [ldev] ++
1,210,995 UART: [ldev] CDI.KEYID = 6
1,211,358 UART: [ldev] SUBJECT.KEYID = 5
1,211,784 UART: [ldev] AUTHORITY.KEYID = 7
1,212,247 UART: [ldev] FE.KEYID = 1
1,217,421 UART: [ldev] Erasing FE.KEYID = 1
1,243,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,403 UART: [ldev] --
1,282,752 UART: [fwproc] Wait for Commands...
1,283,576 UART: [fwproc] Recv command 0x46574c44
1,284,304 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,234 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,404 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,689 >>> mbox cmd response: success
2,826,689 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,827,699 UART: [afmc] ++
2,827,867 UART: [afmc] CDI.KEYID = 6
2,828,229 UART: [afmc] SUBJECT.KEYID = 7
2,828,654 UART: [afmc] AUTHORITY.KEYID = 5
2,864,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,156 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,865 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,748 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,449 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,353 UART: [afmc] --
2,907,445 UART: [cold-reset] --
2,908,261 UART: [state] Locking Datavault
2,909,670 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,274 UART: [state] Locking ICCM
2,910,914 UART: [exit] Launching FMC @ 0x40000130
2,916,244 UART:
2,916,260 UART: Running Caliptra FMC ...
2,916,668 UART:
2,916,722 UART: [state] CFI Enabled
2,927,432 UART: [fht] FMC Alias Private Key: 7
3,046,044 UART: [art] Extend RT PCRs Done
3,046,472 UART: [art] Lock RT PCRs Done
3,047,690 UART: [art] Populate DV Done
3,055,723 UART: [fht] FMC Alias Private Key: 7
3,056,789 UART: [art] Derive CDI
3,057,069 UART: [art] Store in slot 0x4
3,142,560 UART: [art] Derive Key Pair
3,142,920 UART: [art] Store priv key in slot 0x5
3,156,136 UART: [art] Derive Key Pair - Done
3,171,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,076 UART: [art] PUB.X = 49159FE289991C7591A84928351791652BAD084C157F35D176AB9F933A056EC5146DBFE80D3F81F994B0C7DD616E71F4
3,193,833 UART: [art] PUB.Y = 8A08D2B8EAFC885EDFB90D495A8FDC880A90EB2F1B4621E3DAC81A98112EED0C007136AF3F73878CDA16C3F67511E94F
3,200,767 UART: [art] SIG.R = 7055989803B49AD17CF73187A4CCC0043392B75E71748AAEA8D486692E4DC7D886066C8EA2B4A0B3C7E6B559FFEEA368
3,207,534 UART: [art] SIG.S = 58F30CA4E7B0D672729FE5C187C3B3D24D7BBC78597A2B30477BB830521E9F8110970E9B58CA23A781CA4EAF6212562B
3,231,330 UART: Caliptra RT
3,231,581 UART: [state] CFI Enabled
3,352,603 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,043 UART: [rt]cmd =0x44504543, len=136
3,448,101 >>> mbox cmd response data (136 bytes)
3,448,102 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,261 UART: [rt]cmd =0x4453424c, len=4
3,493,831 >>> mbox cmd response data (8 bytes)
3,493,832 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,627 UART: [rt]cmd =0x44504543, len=92
3,708,614 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,125 ready_for_fw is high
1,060,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,624 >>> mbox cmd response: success
2,679,624 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,741,177 UART:
2,741,193 UART: Running Caliptra FMC ...
2,741,601 UART:
2,741,655 UART: [state] CFI Enabled
2,752,071 UART: [fht] FMC Alias Private Key: 7
2,870,513 UART: [art] Extend RT PCRs Done
2,870,941 UART: [art] Lock RT PCRs Done
2,872,375 UART: [art] Populate DV Done
2,880,686 UART: [fht] FMC Alias Private Key: 7
2,881,682 UART: [art] Derive CDI
2,881,962 UART: [art] Store in slot 0x4
2,967,965 UART: [art] Derive Key Pair
2,968,325 UART: [art] Store priv key in slot 0x5
2,981,491 UART: [art] Derive Key Pair - Done
2,996,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,770 UART: [art] PUB.X = 486DD55BD313654B1DF56B00F339FA9C935AC0E71B638F1391C757FD1F6F764B4A71DCA172FB49CF3834E4222CB4DB69
3,019,528 UART: [art] PUB.Y = A19CF43506B20DCD1FD3CD6B1F98F29F7810BEFBFBA561FEA6E572AFC0AFCE438BF6FDA99EBF2B2B3809E85095E19307
3,026,494 UART: [art] SIG.R = C9CD9075889529006837C356C1F1D67C9E2E428449A5E543F3D5B2BA75532EEADABED0A3FD0B7700D24C5420EDEAD9AF
3,033,231 UART: [art] SIG.S = D5179BBE86285CF326EB2429BD18594F8AE33533DA1D15F640CDD1F6BDFA940A60B892A6566EE77A18582CD85079CDB5
3,056,888 UART: Caliptra RT
3,057,139 UART: [state] CFI Enabled
3,176,025 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,629 UART: [rt]cmd =0x44504543, len=136
3,271,715 >>> mbox cmd response data (136 bytes)
3,271,716 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,009 UART: [rt]cmd =0x4453424c, len=4
3,317,825 >>> mbox cmd response data (8 bytes)
3,317,826 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,347,897 UART: [rt]cmd =0x44504543, len=92
3,532,373 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,819 UART: [state] LifecycleState = Unprovisioned
86,474 UART: [state] DebugLocked = No
87,136 UART: [state] WD Timer not started. Device not locked for debugging
88,375 UART: [kat] SHA2-256
894,025 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,150 UART: [kat] ++
898,302 UART: [kat] sha1
902,334 UART: [kat] SHA2-256
904,274 UART: [kat] SHA2-384
907,223 UART: [kat] SHA2-512-ACC
909,124 UART: [kat] ECC-384
919,279 UART: [kat] HMAC-384Kdf
923,863 UART: [kat] LMS
1,172,191 UART: [kat] --
1,173,352 UART: [cold-reset] ++
1,173,686 UART: [fht] FHT @ 0x50003400
1,176,251 UART: [idev] ++
1,176,419 UART: [idev] CDI.KEYID = 6
1,176,779 UART: [idev] SUBJECT.KEYID = 7
1,177,203 UART: [idev] UDS.KEYID = 0
1,177,548 ready_for_fw is high
1,177,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,071 UART: [idev] Erasing UDS.KEYID = 0
1,202,114 UART: [idev] Sha1 KeyId Algorithm
1,210,542 UART: [idev] --
1,211,572 UART: [ldev] ++
1,211,740 UART: [ldev] CDI.KEYID = 6
1,212,103 UART: [ldev] SUBJECT.KEYID = 5
1,212,529 UART: [ldev] AUTHORITY.KEYID = 7
1,212,992 UART: [ldev] FE.KEYID = 1
1,218,336 UART: [ldev] Erasing FE.KEYID = 1
1,245,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,380 UART: [ldev] --
1,284,789 UART: [fwproc] Wait for Commands...
1,285,505 UART: [fwproc] Recv command 0x46574c44
1,286,233 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,911 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,081 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,346 >>> mbox cmd response: success
2,830,346 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,831,494 UART: [afmc] ++
2,831,662 UART: [afmc] CDI.KEYID = 6
2,832,024 UART: [afmc] SUBJECT.KEYID = 7
2,832,449 UART: [afmc] AUTHORITY.KEYID = 5
2,868,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,949 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,697 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,891,406 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,897,289 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,990 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,880 UART: [afmc] --
2,911,992 UART: [cold-reset] --
2,913,144 UART: [state] Locking Datavault
2,914,297 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,901 UART: [state] Locking ICCM
2,915,401 UART: [exit] Launching FMC @ 0x40000130
2,920,731 UART:
2,920,747 UART: Running Caliptra FMC ...
2,921,155 UART:
2,921,298 UART: [state] CFI Enabled
2,931,700 UART: [fht] FMC Alias Private Key: 7
3,050,958 UART: [art] Extend RT PCRs Done
3,051,386 UART: [art] Lock RT PCRs Done
3,053,166 UART: [art] Populate DV Done
3,061,553 UART: [fht] FMC Alias Private Key: 7
3,062,673 UART: [art] Derive CDI
3,062,953 UART: [art] Store in slot 0x4
3,149,502 UART: [art] Derive Key Pair
3,149,862 UART: [art] Store priv key in slot 0x5
3,162,172 UART: [art] Derive Key Pair - Done
3,177,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,344 UART: [art] PUB.X = 19E0DCDAC1DED784A30F7A97C5D7664D19FF8E12BFC1FCB189B693E6DFE02B4B0611B30C696D828BFE3B03C989B40C43
3,200,119 UART: [art] PUB.Y = 8D54C15EA2B53CCB6EA7C6E5239DC9E3D42607711F5A1C45D10401747956C3D338B1AE940974CFC2F7D9FC2D6A33219F
3,207,065 UART: [art] SIG.R = 1241F2F6C3B79335B4F03CD97646269C4E719AE34774E77B7A5755E7F58175189B66C780A749AB659666263117B7C2ED
3,213,825 UART: [art] SIG.S = 58552D65FF166DC65464EBE3DA3F129873DA8112CDAECA760B92EFE38BA93AA61269CBC4EBBFAB3C9CE1EDB96ECEC922
3,237,674 UART: Caliptra RT
3,238,017 UART: [state] CFI Enabled
3,358,411 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,389,657 UART: [rt]cmd =0x44504543, len=136
3,453,953 >>> mbox cmd response data (136 bytes)
3,453,954 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,483,333 UART: [rt]cmd =0x4453424c, len=4
3,501,497 >>> mbox cmd response data (8 bytes)
3,501,498 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,531,305 UART: [rt]cmd =0x44504543, len=92
3,716,404 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,126 ready_for_fw is high
1,061,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,535 >>> mbox cmd response: success
2,680,535 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,742,442 UART:
2,742,458 UART: Running Caliptra FMC ...
2,742,866 UART:
2,743,009 UART: [state] CFI Enabled
2,753,307 UART: [fht] FMC Alias Private Key: 7
2,871,709 UART: [art] Extend RT PCRs Done
2,872,137 UART: [art] Lock RT PCRs Done
2,874,087 UART: [art] Populate DV Done
2,882,584 UART: [fht] FMC Alias Private Key: 7
2,883,672 UART: [art] Derive CDI
2,883,952 UART: [art] Store in slot 0x4
2,969,753 UART: [art] Derive Key Pair
2,970,113 UART: [art] Store priv key in slot 0x5
2,983,527 UART: [art] Derive Key Pair - Done
2,998,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,419 UART: [art] PUB.X = F3608D1D3BDA61AFD78AEA0AA83247CDE1C2FF7FA7426F08DF8F03FDF1ED1ACF4A4F06EB3EE2794744A5F53CA123B8FC
3,021,209 UART: [art] PUB.Y = 987966FD0AC8E96FDADABD9A257F8A64CE6F4597D02FCE1474138C79C7BD6E899A8D196451EE82705B7A7562296E41AD
3,028,166 UART: [art] SIG.R = 4B6EF3F0E0D5F95A956A335BC6723F37C38742AAF42219A897C97C1381A0C95F813D387E9E0ABBB3B1F44CE91B6EE566
3,034,943 UART: [art] SIG.S = C78D2E78788B286ABB0338AF4F102365DA99709C1DFF65CC2F48168E6BF3C6E7248935897AA4847DFA7BE4BA551D0236
3,058,037 UART: Caliptra RT
3,058,380 UART: [state] CFI Enabled
3,176,623 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,211 UART: [rt]cmd =0x44504543, len=136
3,272,243 >>> mbox cmd response data (136 bytes)
3,272,244 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,635 UART: [rt]cmd =0x4453424c, len=4
3,319,471 >>> mbox cmd response data (8 bytes)
3,319,472 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,349,179 UART: [rt]cmd =0x44504543, len=92
3,534,565 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
Truncated 38189 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 10.29s
Truncated 34815 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 10.30s
Truncated 38189 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 10.29s
Truncated 34815 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 10.30s
Truncated 38115 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.86s
Truncated 34814 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.86s
Truncated 38115 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.86s
Truncated 34814 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.85s
Truncated 38115 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.88s
Truncated 34814 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.88s
Truncated 38115 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.88s
Truncated 34814 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.88s
Truncated 47748 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.74s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.57s
Truncated 47748 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 5.75s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.60s
Truncated 47675 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.80s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 5.57s
Truncated 47675 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.65s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.63s
Truncated 47675 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.55s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.53s
Truncated 47675 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.86s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
192,015 UART:
192,384 UART: Running Caliptra ROM ...
193,481 UART:
193,626 UART: [state] CFI Enabled
264,075 UART: [state] LifecycleState = Unprovisioned
266,026 UART: [state] DebugLocked = No
267,904 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,543 UART: [kat] SHA2-256
443,258 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,784 UART: [kat] ++
454,319 UART: [kat] sha1
465,414 UART: [kat] SHA2-256
468,137 UART: [kat] SHA2-384
473,343 UART: [kat] SHA2-512-ACC
475,711 UART: [kat] ECC-384
2,767,924 UART: [kat] HMAC-384Kdf
2,779,148 UART: [kat] LMS
3,969,417 UART: [kat] --
3,973,859 UART: [cold-reset] ++
3,975,439 UART: [fht] Storing FHT @ 0x50003400
3,986,489 UART: [idev] ++
3,987,135 UART: [idev] CDI.KEYID = 6
3,988,022 UART: [idev] SUBJECT.KEYID = 7
3,989,267 UART: [idev] UDS.KEYID = 0
3,990,323 ready_for_fw is high
3,990,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,655 UART: [idev] Erasing UDS.KEYID = 0
7,324,031 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,451 UART: [idev] --
7,349,958 UART: [ldev] ++
7,350,525 UART: [ldev] CDI.KEYID = 6
7,351,494 UART: [ldev] SUBJECT.KEYID = 5
7,352,709 UART: [ldev] AUTHORITY.KEYID = 7
7,353,996 UART: [ldev] FE.KEYID = 1
7,381,847 UART: [ldev] Erasing FE.KEYID = 1
10,717,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,969 UART: [ldev] --
13,097,558 UART: [fwproc] Waiting for Commands...
13,099,975 UART: [fwproc] Received command 0x46574c44
13,102,157 UART: [fwproc] Received Image of size 118548 bytes
17,216,352 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,293,070 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,366,201 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,694,009 >>> mbox cmd response: success
17,695,199 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,699,028 UART: [afmc] ++
17,699,617 UART: [afmc] CDI.KEYID = 6
17,700,632 UART: [afmc] SUBJECT.KEYID = 7
17,701,788 UART: [afmc] AUTHORITY.KEYID = 5
21,074,070 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,874 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,135 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,617 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,320 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,695 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,246 UART: [afmc] --
23,443,781 UART: [cold-reset] --
23,448,773 UART: [state] Locking Datavault
23,453,593 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,368 UART: [state] Locking ICCM
23,456,386 UART: [exit] Launching FMC @ 0x40000130
23,464,790 UART:
23,465,025 UART: Running Caliptra FMC ...
23,466,127 UART:
23,466,285 UART: [state] CFI Enabled
23,531,885 UART: [fht] FMC Alias Private Key: 7
25,872,445 UART: [art] Extend RT PCRs Done
25,873,671 UART: [art] Lock RT PCRs Done
25,875,185 UART: [art] Populate DV Done
25,880,547 UART: [fht] FMC Alias Private Key: 7
25,882,089 UART: [art] Derive CDI
25,882,907 UART: [art] Store in slot 0x4
25,940,349 UART: [art] Derive Key Pair
25,941,347 UART: [art] Store priv key in slot 0x5
29,234,052 UART: [art] Derive Key Pair - Done
29,247,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,535,122 UART: [art] Erasing AUTHORITY.KEYID = 7
31,536,668 UART: [art] PUB.X = 7B586CC53EAEEAC7EE5E8F1D649A8CC11A166A4433B38875CCAB37051BE9E7954F6DF10679FF36CF7E8DBB763D0E2EC6
31,543,889 UART: [art] PUB.Y = 402A20EA0876E2EAA74ABBF25481927DE0D4CC6702D686EEBC161C1C570B74255867D0025490F77E0BD50E5F7A14B198
31,551,177 UART: [art] SIG.R = FF9045FB5E022A5903A956AD781DFAECE4989BB0C86E79B43F0C095F3C086F5AC407FB9861625BC64E532B6063130FA5
31,558,547 UART: [art] SIG.S = B3E371CF8F4B3143FE03D691791A5AF60E8919CBF304B459F760A522F99270C7A756EC2795BF4BE82D1254E0FB17CEFB
32,864,204 UART: Caliptra RT
32,864,929 UART: [state] CFI Enabled
33,060,754 UART: [rt] RT listening for mailbox commands...
33,093,787 UART: [rt]cmd =0x53494756, len=196
33,098,316 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,805,961 ready_for_fw is high
3,806,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,969,314 >>> mbox cmd response: success
17,971,265 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,657,869 UART:
23,658,263 UART: Running Caliptra FMC ...
23,659,497 UART:
23,659,668 UART: [state] CFI Enabled
23,726,326 UART: [fht] FMC Alias Private Key: 7
26,066,827 UART: [art] Extend RT PCRs Done
26,068,060 UART: [art] Lock RT PCRs Done
26,069,578 UART: [art] Populate DV Done
26,074,914 UART: [fht] FMC Alias Private Key: 7
26,076,459 UART: [art] Derive CDI
26,077,278 UART: [art] Store in slot 0x4
26,135,439 UART: [art] Derive Key Pair
26,136,495 UART: [art] Store priv key in slot 0x5
29,428,717 UART: [art] Derive Key Pair - Done
29,441,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,414 UART: [art] Erasing AUTHORITY.KEYID = 7
31,731,920 UART: [art] PUB.X = 78869039BC1342F5E0A67E347031576783B893A64565095D28BB6FD2A366D7B9B22B30E99D551AF3D3374A233733E8D0
31,739,183 UART: [art] PUB.Y = 278455CBD363F4ED9E94508C533E3A7E1FC1AFE4C2BDF434E78139B732C4E8E17FF517EF7A1EB16F93547CDAF9279D9B
31,746,466 UART: [art] SIG.R = 833D92BB893123C8BE35A09369DE77564EB836EE862AAF3E6A71D2EFC2FD76CBDFF037E4ACEB0C93771687726946EDD6
31,753,865 UART: [art] SIG.S = 9C53B097DC942D9831E60579B77711492FBFAC7C3643811307E2DA43960BF634E6CCD6498612DE89257211412744BC10
33,059,312 UART: Caliptra RT
33,060,030 UART: [state] CFI Enabled
33,235,743 UART: [rt] RT listening for mailbox commands...
33,268,624 UART: [rt]cmd =0x53494756, len=196
33,273,189 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,426 UART:
192,778 UART: Running Caliptra ROM ...
193,905 UART:
603,646 UART: [state] CFI Enabled
615,548 UART: [state] LifecycleState = Unprovisioned
617,483 UART: [state] DebugLocked = No
620,139 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,419 UART: [kat] SHA2-256
794,120 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,702 UART: [kat] ++
805,179 UART: [kat] sha1
816,261 UART: [kat] SHA2-256
818,985 UART: [kat] SHA2-384
824,331 UART: [kat] SHA2-512-ACC
826,690 UART: [kat] ECC-384
3,112,444 UART: [kat] HMAC-384Kdf
3,123,614 UART: [kat] LMS
4,313,704 UART: [kat] --
4,318,426 UART: [cold-reset] ++
4,320,306 UART: [fht] Storing FHT @ 0x50003400
4,331,425 UART: [idev] ++
4,332,055 UART: [idev] CDI.KEYID = 6
4,333,122 UART: [idev] SUBJECT.KEYID = 7
4,334,222 UART: [idev] UDS.KEYID = 0
4,335,261 ready_for_fw is high
4,335,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,323 UART: [idev] Erasing UDS.KEYID = 0
7,622,865 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,866 UART: [idev] --
7,649,279 UART: [ldev] ++
7,649,864 UART: [ldev] CDI.KEYID = 6
7,650,748 UART: [ldev] SUBJECT.KEYID = 5
7,652,009 UART: [ldev] AUTHORITY.KEYID = 7
7,653,240 UART: [ldev] FE.KEYID = 1
7,664,741 UART: [ldev] Erasing FE.KEYID = 1
10,951,804 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,185 UART: [ldev] --
13,311,148 UART: [fwproc] Waiting for Commands...
13,313,997 UART: [fwproc] Received command 0x46574c44
13,316,174 UART: [fwproc] Received Image of size 118548 bytes
17,420,200 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,545 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,714 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,709 >>> mbox cmd response: success
17,901,836 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,905,340 UART: [afmc] ++
17,905,932 UART: [afmc] CDI.KEYID = 6
17,906,854 UART: [afmc] SUBJECT.KEYID = 7
17,908,068 UART: [afmc] AUTHORITY.KEYID = 5
21,220,964 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,291 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,593 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,980 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,729 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,169 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,149 UART: [afmc] --
23,588,738 UART: [cold-reset] --
23,592,706 UART: [state] Locking Datavault
23,598,424 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,165 UART: [state] Locking ICCM
23,601,750 UART: [exit] Launching FMC @ 0x40000130
23,610,134 UART:
23,610,366 UART: Running Caliptra FMC ...
23,611,407 UART:
23,611,555 UART: [state] CFI Enabled
23,619,489 UART: [fht] FMC Alias Private Key: 7
25,959,179 UART: [art] Extend RT PCRs Done
25,960,404 UART: [art] Lock RT PCRs Done
25,961,887 UART: [art] Populate DV Done
25,967,219 UART: [fht] FMC Alias Private Key: 7
25,968,766 UART: [art] Derive CDI
25,969,575 UART: [art] Store in slot 0x4
26,012,378 UART: [art] Derive Key Pair
26,013,377 UART: [art] Store priv key in slot 0x5
29,255,758 UART: [art] Derive Key Pair - Done
29,268,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,095 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,603 UART: [art] PUB.X = C79364B64F88AEEF84B4D9E7A80879F55581C5043DDEEBD183CAAA0AD926AAD8C949BEE32B7F22934EADB48BA1FC0D3D
31,557,919 UART: [art] PUB.Y = 73E64B869F3F2FE3078B44E5309692D678E76387EDC656A7F5C554BF0E6CBA290903FC72F9BB04CA3D22457C56498267
31,565,199 UART: [art] SIG.R = 8B47C69FAB73049167505F5E04E3F9734AAB519017994DBE27C2F30DDF37323669A267FFACE48EA213EFB0118F47BF04
31,572,553 UART: [art] SIG.S = 1EF8FCBEA8967F26C06D6F0A56E94EF7739070AD7E1BFD6165906BBBB526E7DA543E18984E88A70B5366F446CA55488E
32,877,622 UART: Caliptra RT
32,878,329 UART: [state] CFI Enabled
33,011,979 UART: [rt] RT listening for mailbox commands...
33,044,423 UART: [rt]cmd =0x53494756, len=196
33,049,084 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
4,126,193 ready_for_fw is high
4,126,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,327 >>> mbox cmd response: success
18,158,609 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,797,307 UART:
23,797,723 UART: Running Caliptra FMC ...
23,798,873 UART:
23,799,029 UART: [state] CFI Enabled
23,807,308 UART: [fht] FMC Alias Private Key: 7
26,147,310 UART: [art] Extend RT PCRs Done
26,148,542 UART: [art] Lock RT PCRs Done
26,149,947 UART: [art] Populate DV Done
26,155,420 UART: [fht] FMC Alias Private Key: 7
26,156,905 UART: [art] Derive CDI
26,157,662 UART: [art] Store in slot 0x4
26,200,371 UART: [art] Derive Key Pair
26,201,369 UART: [art] Store priv key in slot 0x5
29,442,371 UART: [art] Derive Key Pair - Done
29,455,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,394 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,901 UART: [art] PUB.X = B05DAE4E5EEFB6F60EBAD794FB1D5F1B63906CA32C7317E0F4D97D1C80545FEBEDB9E23C4B73CE45C8E548E03EBB92C0
31,744,202 UART: [art] PUB.Y = AAC00258805964DDDEEC37486264D5BD765044764B59D6B459935059B87C93651D4A17716443534EA6846715382BA8AA
31,751,399 UART: [art] SIG.R = BE9E15AA97C3F82FFF3225994A08BEFA953BFEDBC750D70A01A5824934D1AE1DD35C1E347FB1DE1E713461D7B751A2C6
31,758,838 UART: [art] SIG.S = 1669A08EB6E91C0E34E536C9066F62B7B1A30F55B45CF0C07141C2E93C1DC17C87EF8953F559B49D97A31B53DA8C7B7E
33,064,115 UART: Caliptra RT
33,064,816 UART: [state] CFI Enabled
33,197,444 UART: [rt] RT listening for mailbox commands...
33,230,257 UART: [rt]cmd =0x53494756, len=196
33,234,796 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,082 UART:
192,449 UART: Running Caliptra ROM ...
193,628 UART:
193,778 UART: [state] CFI Enabled
267,209 UART: [state] LifecycleState = Unprovisioned
269,199 UART: [state] DebugLocked = No
271,515 UART: [state] WD Timer not started. Device not locked for debugging
275,774 UART: [kat] SHA2-256
455,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,199 UART: [kat] ++
466,738 UART: [kat] sha1
478,059 UART: [kat] SHA2-256
480,710 UART: [kat] SHA2-384
486,091 UART: [kat] SHA2-512-ACC
488,479 UART: [kat] ECC-384
2,950,559 UART: [kat] HMAC-384Kdf
2,969,973 UART: [kat] LMS
3,446,468 UART: [kat] --
3,449,468 UART: [cold-reset] ++
3,451,749 UART: [fht] FHT @ 0x50003400
3,462,936 UART: [idev] ++
3,463,505 UART: [idev] CDI.KEYID = 6
3,464,413 UART: [idev] SUBJECT.KEYID = 7
3,465,657 UART: [idev] UDS.KEYID = 0
3,466,703 ready_for_fw is high
3,466,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,053 UART: [idev] Erasing UDS.KEYID = 0
5,987,088 UART: [idev] Sha1 KeyId Algorithm
6,011,878 UART: [idev] --
6,017,415 UART: [ldev] ++
6,017,990 UART: [ldev] CDI.KEYID = 6
6,018,872 UART: [ldev] SUBJECT.KEYID = 5
6,020,137 UART: [ldev] AUTHORITY.KEYID = 7
6,021,368 UART: [ldev] FE.KEYID = 1
6,056,295 UART: [ldev] Erasing FE.KEYID = 1
8,565,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,296 UART: [ldev] --
10,373,099 UART: [fwproc] Wait for Commands...
10,375,894 UART: [fwproc] Recv command 0x46574c44
10,377,946 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,658 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,663 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,527 >>> mbox cmd response: success
14,346,642 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,349,775 UART: [afmc] ++
14,350,354 UART: [afmc] CDI.KEYID = 6
14,351,316 UART: [afmc] SUBJECT.KEYID = 7
14,352,524 UART: [afmc] AUTHORITY.KEYID = 5
16,893,044 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,614,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,616,771 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,632,561 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,648,640 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,664,199 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,689,635 UART: [afmc] --
18,694,150 UART: [cold-reset] --
18,699,463 UART: [state] Locking Datavault
18,705,947 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,642 UART: [state] Locking ICCM
18,709,732 UART: [exit] Launching FMC @ 0x40000130
18,718,120 UART:
18,718,348 UART: Running Caliptra FMC ...
18,719,657 UART:
18,719,827 UART: [state] CFI Enabled
18,771,597 UART: [fht] FMC Alias Private Key: 7
20,537,905 UART: [art] Extend RT PCRs Done
20,539,137 UART: [art] Lock RT PCRs Done
20,540,704 UART: [art] Populate DV Done
20,546,219 UART: [fht] FMC Alias Private Key: 7
20,547,754 UART: [art] Derive CDI
20,548,584 UART: [art] Store in slot 0x4
20,603,981 UART: [art] Derive Key Pair
20,605,019 UART: [art] Store priv key in slot 0x5
23,068,067 UART: [art] Derive Key Pair - Done
23,081,450 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,793,826 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,325 UART: [art] PUB.X = F15C4B7B2E6380C16C40977339779A047649ADCF8BE702BB32036AB42A0CC9E4B55A22039EE8512E2761F77FDBB7B1B5
24,802,645 UART: [art] PUB.Y = 6F651CDDE2D25861B1A647FB5FAA6AF06F1B73B1CA4FC6DA91CF08DF38EFB5D9BD66F2ACEF02B34144E16FF09894947F
24,809,887 UART: [art] SIG.R = E59045A7B8FA78B58413E10EF2B7F1332FA2F53108C7D0BC7B1D7A2E89A889931312D909C2931717077BC1BE20C7E9F5
24,817,289 UART: [art] SIG.S = 1CDF41AA987F22DC9DF1232286ECEB845A767D33CFF05B9E578F5CDC34468891246AFA8FE3105ADE480644C681923393
25,796,495 UART: Caliptra RT
25,797,203 UART: [state] CFI Enabled
25,976,665 UART: [rt] RT listening for mailbox commands...
26,009,471 UART: [rt]cmd =0x53494756, len=196
26,014,110 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,461,811 ready_for_fw is high
3,462,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,245,684 >>> mbox cmd response: success
14,246,816 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,535,251 UART:
18,535,629 UART: Running Caliptra FMC ...
18,536,759 UART:
18,536,911 UART: [state] CFI Enabled
18,600,313 UART: [fht] FMC Alias Private Key: 7
20,366,709 UART: [art] Extend RT PCRs Done
20,367,925 UART: [art] Lock RT PCRs Done
20,369,603 UART: [art] Populate DV Done
20,375,073 UART: [fht] FMC Alias Private Key: 7
20,376,722 UART: [art] Derive CDI
20,377,534 UART: [art] Store in slot 0x4
20,433,357 UART: [art] Derive Key Pair
20,434,356 UART: [art] Store priv key in slot 0x5
22,897,524 UART: [art] Derive Key Pair - Done
22,910,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,622,939 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,454 UART: [art] PUB.X = E95CC5D403EEACC7F38D5044DBC554EE5C29F76F0CF13FD41C8039B193064106C31409453A14D0EDE4F103C5AAEC53E6
24,631,702 UART: [art] PUB.Y = 68038164CCA3CF1DE9F7CAE9D07A7325CA02774A628080A9B9A5EB0BC4E108099C03AAFD228C5758AF0807EF856C38C4
24,638,957 UART: [art] SIG.R = 08E922F38CDAB0E81C6D71B8AAA1F4C1BD832D0EFBD49B751F8EA1BE7C9F9FA7D2835514F76BDCDA938F7338BBF5764D
24,646,415 UART: [art] SIG.S = FEB5A5239E599B08EFF9F15139A43F883B28DBCFE4A11568DAA706F474687F65C12AC99BB479F32E497B32ABD3DDB6F6
25,625,361 UART: Caliptra RT
25,626,077 UART: [state] CFI Enabled
25,806,960 UART: [rt] RT listening for mailbox commands...
25,839,731 UART: [rt]cmd =0x53494756, len=196
25,844,391 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,453 UART:
192,838 UART: Running Caliptra ROM ...
194,035 UART:
603,534 UART: [state] CFI Enabled
619,769 UART: [state] LifecycleState = Unprovisioned
621,645 UART: [state] DebugLocked = No
623,520 UART: [state] WD Timer not started. Device not locked for debugging
626,767 UART: [kat] SHA2-256
806,430 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,220 UART: [kat] ++
817,673 UART: [kat] sha1
828,406 UART: [kat] SHA2-256
831,065 UART: [kat] SHA2-384
836,211 UART: [kat] SHA2-512-ACC
838,579 UART: [kat] ECC-384
3,279,062 UART: [kat] HMAC-384Kdf
3,291,045 UART: [kat] LMS
3,767,611 UART: [kat] --
3,772,104 UART: [cold-reset] ++
3,773,925 UART: [fht] FHT @ 0x50003400
3,785,051 UART: [idev] ++
3,785,707 UART: [idev] CDI.KEYID = 6
3,786,627 UART: [idev] SUBJECT.KEYID = 7
3,787,877 UART: [idev] UDS.KEYID = 0
3,788,808 ready_for_fw is high
3,789,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,932 UART: [idev] Erasing UDS.KEYID = 0
6,266,542 UART: [idev] Sha1 KeyId Algorithm
6,290,470 UART: [idev] --
6,296,036 UART: [ldev] ++
6,296,613 UART: [ldev] CDI.KEYID = 6
6,297,546 UART: [ldev] SUBJECT.KEYID = 5
6,298,707 UART: [ldev] AUTHORITY.KEYID = 7
6,299,996 UART: [ldev] FE.KEYID = 1
6,312,804 UART: [ldev] Erasing FE.KEYID = 1
8,786,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,214 UART: [ldev] --
10,580,489 UART: [fwproc] Wait for Commands...
10,583,731 UART: [fwproc] Recv command 0x46574c44
10,585,719 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,766 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,771 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,630 >>> mbox cmd response: success
14,550,740 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,553,383 UART: [afmc] ++
14,553,961 UART: [afmc] CDI.KEYID = 6
14,554,927 UART: [afmc] SUBJECT.KEYID = 7
14,556,141 UART: [afmc] AUTHORITY.KEYID = 5
17,057,007 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,016 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,834 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,918 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,452 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,184 UART: [afmc] --
18,855,185 UART: [cold-reset] --
18,858,776 UART: [state] Locking Datavault
18,862,400 UART: [state] Locking PCR0, PCR1 and PCR31
18,864,129 UART: [state] Locking ICCM
18,865,685 UART: [exit] Launching FMC @ 0x40000130
18,874,082 UART:
18,874,324 UART: Running Caliptra FMC ...
18,875,376 UART:
18,875,530 UART: [state] CFI Enabled
18,883,843 UART: [fht] FMC Alias Private Key: 7
20,649,878 UART: [art] Extend RT PCRs Done
20,651,214 UART: [art] Lock RT PCRs Done
20,652,462 UART: [art] Populate DV Done
20,657,765 UART: [fht] FMC Alias Private Key: 7
20,659,302 UART: [art] Derive CDI
20,660,118 UART: [art] Store in slot 0x4
20,702,820 UART: [art] Derive Key Pair
20,703,824 UART: [art] Store priv key in slot 0x5
23,130,600 UART: [art] Derive Key Pair - Done
23,142,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,849,678 UART: [art] Erasing AUTHORITY.KEYID = 7
24,851,176 UART: [art] PUB.X = 6886592CEE4404F8EE3215EA776FD40942A90FEE6EE7D6A1AF86831154ADEFE39CB15297DFE01CF50DFB40D8745B5382
24,858,481 UART: [art] PUB.Y = A01F7D825147857041FADCAD35FAE79B4A4C901C34CCAE68A2AB86D8E3AAD40DB641F84B0DC8E87F99AC76B905AAA844
24,865,717 UART: [art] SIG.R = F221CBD417D5318FD28850F0BD43B34439276DA78FA643B897716F7E599FEA1D3AB4E7781791EF0848C9C02BD7CC9D10
24,873,108 UART: [art] SIG.S = B0188A710A32C9BC76932A7E959E47FA4B7B2FA3A7DA4C3CD7DD66833890D59F816F35F1C1E34ED2D9D5036F5C33308C
25,851,672 UART: Caliptra RT
25,852,386 UART: [state] CFI Enabled
25,984,948 UART: [rt] RT listening for mailbox commands...
26,017,650 UART: [rt]cmd =0x53494756, len=196
26,022,074 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,777,261 ready_for_fw is high
3,777,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,435,721 >>> mbox cmd response: success
14,436,837 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,688,608 UART:
18,688,990 UART: Running Caliptra FMC ...
18,690,129 UART:
18,690,290 UART: [state] CFI Enabled
18,698,280 UART: [fht] FMC Alias Private Key: 7
20,463,959 UART: [art] Extend RT PCRs Done
20,465,213 UART: [art] Lock RT PCRs Done
20,466,905 UART: [art] Populate DV Done
20,472,271 UART: [fht] FMC Alias Private Key: 7
20,473,810 UART: [art] Derive CDI
20,474,628 UART: [art] Store in slot 0x4
20,517,278 UART: [art] Derive Key Pair
20,518,285 UART: [art] Store priv key in slot 0x5
22,945,605 UART: [art] Derive Key Pair - Done
22,958,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,420 UART: [art] Erasing AUTHORITY.KEYID = 7
24,666,921 UART: [art] PUB.X = 7028B9560DC89A10643D623181BA67BF27E873E5FA19F21C95786ED5160234189E0E33AC2C461C8BB82A67A678A4981D
24,674,191 UART: [art] PUB.Y = E7776C8589AA637A44E8020AE829F8F75B436F82CA28D48140879BFE010FD2AD53AC9635C9078536210FD9015405BDFA
24,681,395 UART: [art] SIG.R = 269E547614F6CCB504D1B31F46D8BBAD203320ACC022820DA5AE300DBB3442FAC83E156CFAFD6CD1C0CAB0297A126686
24,688,794 UART: [art] SIG.S = 7FAB641D726CF3F4917555C9409410487ECFC4983C89A4E104C28C951805DB4E8F7BFD4A196644B10F813A9A76565F3C
25,668,222 UART: Caliptra RT
25,668,934 UART: [state] CFI Enabled
25,801,193 UART: [rt] RT listening for mailbox commands...
25,834,202 UART: [rt]cmd =0x53494756, len=196
25,839,043 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,148 writing to cptra_bootfsm_go
193,387 UART:
193,741 UART: Running Caliptra ROM ...
194,831 UART:
194,975 UART: [state] CFI Enabled
263,252 UART: [state] LifecycleState = Unprovisioned
265,667 UART: [state] DebugLocked = No
266,973 UART: [state] WD Timer not started. Device not locked for debugging
270,803 UART: [kat] SHA2-256
460,644 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,445 UART: [kat] ++
471,895 UART: [kat] sha1
484,134 UART: [kat] SHA2-256
487,109 UART: [kat] SHA2-384
492,199 UART: [kat] SHA2-512-ACC
494,846 UART: [kat] ECC-384
2,947,506 UART: [kat] HMAC-384Kdf
2,972,751 UART: [kat] LMS
3,504,542 UART: [kat] --
3,509,242 UART: [cold-reset] ++
3,511,024 UART: [fht] FHT @ 0x50003400
3,521,878 UART: [idev] ++
3,522,626 UART: [idev] CDI.KEYID = 6
3,523,509 UART: [idev] SUBJECT.KEYID = 7
3,524,750 UART: [idev] UDS.KEYID = 0
3,525,669 ready_for_fw is high
3,525,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,753 UART: [idev] Erasing UDS.KEYID = 0
6,028,084 UART: [idev] Sha1 KeyId Algorithm
6,051,373 UART: [idev] --
6,056,415 UART: [ldev] ++
6,057,095 UART: [ldev] CDI.KEYID = 6
6,058,006 UART: [ldev] SUBJECT.KEYID = 5
6,059,220 UART: [ldev] AUTHORITY.KEYID = 7
6,060,396 UART: [ldev] FE.KEYID = 1
6,100,383 UART: [ldev] Erasing FE.KEYID = 1
8,600,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,328 UART: [ldev] --
10,412,058 UART: [fwproc] Wait for Commands...
10,414,319 UART: [fwproc] Recv command 0x46574c44
10,416,574 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,096 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,720 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,479 >>> mbox cmd response: success
14,676,526 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,679,906 UART: [afmc] ++
14,680,611 UART: [afmc] CDI.KEYID = 6
14,681,855 UART: [afmc] SUBJECT.KEYID = 7
14,683,295 UART: [afmc] AUTHORITY.KEYID = 5
17,214,345 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,900 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,965 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,972,125 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,987,011 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,383 UART: [afmc] --
19,014,271 UART: [cold-reset] --
19,018,584 UART: [state] Locking Datavault
19,023,948 UART: [state] Locking PCR0, PCR1 and PCR31
19,026,135 UART: [state] Locking ICCM
19,027,421 UART: [exit] Launching FMC @ 0x40000130
19,035,762 UART:
19,035,997 UART: Running Caliptra FMC ...
19,037,099 UART:
19,037,266 UART: [state] CFI Enabled
19,097,066 UART: [fht] FMC Alias Private Key: 7
20,863,812 UART: [art] Extend RT PCRs Done
20,865,037 UART: [art] Lock RT PCRs Done
20,866,500 UART: [art] Populate DV Done
20,871,742 UART: [fht] FMC Alias Private Key: 7
20,873,220 UART: [art] Derive CDI
20,873,980 UART: [art] Store in slot 0x4
20,930,186 UART: [art] Derive Key Pair
20,931,242 UART: [art] Store priv key in slot 0x5
23,394,356 UART: [art] Derive Key Pair - Done
23,407,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,133,805 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,308 UART: [art] PUB.X = 7A1CCE06E6F8C2DB2511E1A201888C0366D45394599EC95408A9464A70750491AD1632066F699561299541B77682E1D9
25,142,527 UART: [art] PUB.Y = 685B7544D4FEC87DA7B95545C3547608D34D5B6EA7E81D2A35EA02A76448317A42D6906D3B1A02029F99EAD48D4B5DD2
25,149,777 UART: [art] SIG.R = BD2F2BD8AF7AB84D414B666FCBE800187FA2F8415632DAA7FE39130492D59CCF8CB952AE256D81B0E06679197647B98A
25,157,141 UART: [art] SIG.S = EA55FE03FA20136817E5A7EAAD55E9F32109A2C6A17C730D603461A646846796983D4AA3E6A672D136A350A11DFC6648
26,136,152 UART: Caliptra RT
26,136,841 UART: [state] CFI Enabled
26,319,152 UART: [rt] RT listening for mailbox commands...
26,352,235 UART: [rt]cmd =0x53494756, len=196
26,357,081 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,436,086 ready_for_fw is high
3,436,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,931 >>> mbox cmd response: success
14,819,235 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,109,112 UART:
19,109,496 UART: Running Caliptra FMC ...
19,110,613 UART:
19,110,764 UART: [state] CFI Enabled
19,176,853 UART: [fht] FMC Alias Private Key: 7
20,942,861 UART: [art] Extend RT PCRs Done
20,944,087 UART: [art] Lock RT PCRs Done
20,945,747 UART: [art] Populate DV Done
20,951,110 UART: [fht] FMC Alias Private Key: 7
20,952,722 UART: [art] Derive CDI
20,953,462 UART: [art] Store in slot 0x4
21,009,770 UART: [art] Derive Key Pair
21,010,772 UART: [art] Store priv key in slot 0x5
23,473,281 UART: [art] Derive Key Pair - Done
23,486,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,416 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,924 UART: [art] PUB.X = EFD277BB88EC99B6A6C09292441385DAC6BA4C198E9537A25D3E277177EACAB3682EF8DA87976EEDEC40CF70B4D5864B
25,208,239 UART: [art] PUB.Y = 77840056DB951182F8F1719099FA723DC71B181DCE67368EB297F61AEED5E1DA62474E78E43C2939CF7D1EE22CEDEA9A
25,215,501 UART: [art] SIG.R = C82C9883A6EDA5590E2C1FC7C29DE39958FD12D9946BB079E27A21E2C33CD5DAF958B49AB46A4C764BEF17E9BBC69EA8
25,222,899 UART: [art] SIG.S = E9D12B82F1079F2941B0EDE83E3EA7D8677D4E226CEA69EF0F7EA03C52620448FAAD9720F8C6E3DFAE2D27F1044DA13A
26,202,222 UART: Caliptra RT
26,202,948 UART: [state] CFI Enabled
26,383,499 UART: [rt] RT listening for mailbox commands...
26,416,432 UART: [rt]cmd =0x53494756, len=196
26,420,926 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,435 UART:
192,797 UART: Running Caliptra ROM ...
193,949 UART:
603,812 UART: [state] CFI Enabled
619,073 UART: [state] LifecycleState = Unprovisioned
621,485 UART: [state] DebugLocked = No
624,007 UART: [state] WD Timer not started. Device not locked for debugging
628,279 UART: [kat] SHA2-256
818,167 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,967 UART: [kat] ++
829,529 UART: [kat] sha1
841,288 UART: [kat] SHA2-256
844,260 UART: [kat] SHA2-384
849,709 UART: [kat] SHA2-512-ACC
852,332 UART: [kat] ECC-384
3,292,565 UART: [kat] HMAC-384Kdf
3,305,941 UART: [kat] LMS
3,837,758 UART: [kat] --
3,843,480 UART: [cold-reset] ++
3,845,562 UART: [fht] FHT @ 0x50003400
3,857,040 UART: [idev] ++
3,857,764 UART: [idev] CDI.KEYID = 6
3,858,681 UART: [idev] SUBJECT.KEYID = 7
3,859,930 UART: [idev] UDS.KEYID = 0
3,860,855 ready_for_fw is high
3,861,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,933 UART: [idev] Erasing UDS.KEYID = 0
6,340,878 UART: [idev] Sha1 KeyId Algorithm
6,362,566 UART: [idev] --
6,366,514 UART: [ldev] ++
6,367,408 UART: [ldev] CDI.KEYID = 6
6,368,306 UART: [ldev] SUBJECT.KEYID = 5
6,369,358 UART: [ldev] AUTHORITY.KEYID = 7
6,370,539 UART: [ldev] FE.KEYID = 1
6,381,136 UART: [ldev] Erasing FE.KEYID = 1
8,858,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,094 UART: [ldev] --
10,649,094 UART: [fwproc] Wait for Commands...
10,651,517 UART: [fwproc] Recv command 0x46574c44
10,653,824 UART: [fwproc] Recv'd Img size: 118548 bytes
14,156,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,236,634 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,360,219 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,920,461 >>> mbox cmd response: success
14,921,506 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,924,368 UART: [afmc] ++
14,925,084 UART: [afmc] CDI.KEYID = 6
14,926,197 UART: [afmc] SUBJECT.KEYID = 7
14,927,801 UART: [afmc] AUTHORITY.KEYID = 5
17,431,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,155,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,157,011 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,172,136 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,187,286 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,202,140 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,226,525 UART: [afmc] --
19,229,548 UART: [cold-reset] --
19,233,848 UART: [state] Locking Datavault
19,237,643 UART: [state] Locking PCR0, PCR1 and PCR31
19,239,843 UART: [state] Locking ICCM
19,242,407 UART: [exit] Launching FMC @ 0x40000130
19,251,086 UART:
19,251,367 UART: Running Caliptra FMC ...
19,252,405 UART:
19,252,557 UART: [state] CFI Enabled
19,260,425 UART: [fht] FMC Alias Private Key: 7
21,026,074 UART: [art] Extend RT PCRs Done
21,027,300 UART: [art] Lock RT PCRs Done
21,029,012 UART: [art] Populate DV Done
21,034,487 UART: [fht] FMC Alias Private Key: 7
21,036,134 UART: [art] Derive CDI
21,036,876 UART: [art] Store in slot 0x4
21,079,652 UART: [art] Derive Key Pair
21,080,657 UART: [art] Store priv key in slot 0x5
23,507,760 UART: [art] Derive Key Pair - Done
23,520,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,923 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,440 UART: [art] PUB.X = 30A1966B962477CAC50C04C47CFE41E34B179856183655448679AE1C42C2DB03AD71CCB3616EAADD9E2EFD9DC2DC0E5E
25,235,710 UART: [art] PUB.Y = 155C41DCB43BB67EFABB4FBC627763521763AAC137308013BF758DF4505833B684BED78CD4B5C69C86F1C00CB09D7C42
25,242,969 UART: [art] SIG.R = B582A25DAAAEA3A71C5551B8C14CD9EE3B72E65EB1D64A939D2620EBDB07168F19ECB84A770E30FDF14F92A0932E502F
25,250,380 UART: [art] SIG.S = C2CE3DD40F2A790A325496D1A6C02F08D929D8B6D2A875E2C3EE888EC5FA1EAA840CC0B72877A5B37100EC214CEF21BC
26,228,915 UART: Caliptra RT
26,229,606 UART: [state] CFI Enabled
26,363,076 UART: [rt] RT listening for mailbox commands...
26,396,260 UART: [rt]cmd =0x53494756, len=196
26,400,621 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,754,077 ready_for_fw is high
3,754,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,051,040 >>> mbox cmd response: success
15,052,250 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,311,719 UART:
19,312,097 UART: Running Caliptra FMC ...
19,313,310 UART:
19,313,485 UART: [state] CFI Enabled
19,321,349 UART: [fht] FMC Alias Private Key: 7
21,086,430 UART: [art] Extend RT PCRs Done
21,087,663 UART: [art] Lock RT PCRs Done
21,089,113 UART: [art] Populate DV Done
21,094,656 UART: [fht] FMC Alias Private Key: 7
21,096,208 UART: [art] Derive CDI
21,096,982 UART: [art] Store in slot 0x4
21,139,218 UART: [art] Derive Key Pair
21,140,261 UART: [art] Store priv key in slot 0x5
23,567,008 UART: [art] Derive Key Pair - Done
23,579,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,286,017 UART: [art] Erasing AUTHORITY.KEYID = 7
25,287,553 UART: [art] PUB.X = 72B18D8869FC2C4EC2ACD48CD0E45489D833CEC6D3BE1B9697603A204242ED74AFE4446A3D66D7FE08274C4DAE0C2820
25,294,804 UART: [art] PUB.Y = 9450CF4DF9C0B8E3928FA5DF620D75143BF6A83AFB65A0F38991BF6253C9C713863D6C352A9063D2CC8C8D9CB00E3EE3
25,302,057 UART: [art] SIG.R = 285EF085381AAB52FF6A7D1E86E1BAAD263A47BFAC8EB1C2D0914DD2681B922C39C2AA14FA6C57E3CA627695FB02B52E
25,309,510 UART: [art] SIG.S = B69B7A3FA6AB50793B8F6294D1FB0448E27CA7FA9687E5E3C4DFB97CC53C8F5F1D92847121FC592559B895A6E134A2FE
26,288,488 UART: Caliptra RT
26,289,203 UART: [state] CFI Enabled
26,422,645 UART: [rt] RT listening for mailbox commands...
26,455,575 UART: [rt]cmd =0x53494756, len=196
26,460,274 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,070 UART:
192,435 UART: Running Caliptra ROM ...
193,618 UART:
193,772 UART: [state] CFI Enabled
265,591 UART: [state] LifecycleState = Unprovisioned
267,501 UART: [state] DebugLocked = No
269,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,127 UART: [kat] SHA2-256
443,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,386 UART: [kat] ++
454,918 UART: [kat] sha1
466,135 UART: [kat] SHA2-256
468,844 UART: [kat] SHA2-384
474,842 UART: [kat] SHA2-512-ACC
477,208 UART: [kat] ECC-384
2,769,105 UART: [kat] HMAC-384Kdf
2,800,475 UART: [kat] LMS
3,990,784 UART: [kat] --
3,994,295 UART: [cold-reset] ++
3,995,238 UART: [fht] Storing FHT @ 0x50003400
4,005,939 UART: [idev] ++
4,006,516 UART: [idev] CDI.KEYID = 6
4,007,410 UART: [idev] SUBJECT.KEYID = 7
4,008,728 UART: [idev] UDS.KEYID = 0
4,009,823 ready_for_fw is high
4,010,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,188 UART: [idev] Erasing UDS.KEYID = 0
7,345,982 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,256 UART: [idev] --
7,371,513 UART: [ldev] ++
7,372,119 UART: [ldev] CDI.KEYID = 6
7,373,007 UART: [ldev] SUBJECT.KEYID = 5
7,374,232 UART: [ldev] AUTHORITY.KEYID = 7
7,375,521 UART: [ldev] FE.KEYID = 1
7,424,606 UART: [ldev] Erasing FE.KEYID = 1
10,742,826 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,042,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,057,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,086,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,104,929 UART: [ldev] --
13,110,459 UART: [fwproc] Waiting for Commands...
13,113,261 UART: [fwproc] Received command 0x46574c44
13,115,463 UART: [fwproc] Received Image of size 118548 bytes
17,222,256 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,294,968 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,695,775 >>> mbox cmd response: success
17,697,012 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,699,408 UART: [afmc] ++
17,700,001 UART: [afmc] CDI.KEYID = 6
17,700,923 UART: [afmc] SUBJECT.KEYID = 7
17,702,194 UART: [afmc] AUTHORITY.KEYID = 5
21,068,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,956 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,224 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,620 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,375 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,798 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,171 UART: [afmc] --
23,439,615 UART: [cold-reset] --
23,444,718 UART: [state] Locking Datavault
23,450,449 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,202 UART: [state] Locking ICCM
23,454,999 UART: [exit] Launching FMC @ 0x40000130
23,463,397 UART:
23,463,643 UART: Running Caliptra FMC ...
23,464,746 UART:
23,464,904 UART: [state] CFI Enabled
23,528,201 UART: [fht] FMC Alias Private Key: 7
25,889,259 UART: [art] Extend RT PCRs Done
25,890,498 UART: [art] Lock RT PCRs Done
25,892,152 UART: [art] Populate DV Done
25,897,615 UART: [fht] FMC Alias Private Key: 7
25,899,163 UART: [art] Derive CDI
25,899,998 UART: [art] Store in slot 0x4
25,958,146 UART: [art] Derive Key Pair
25,959,190 UART: [art] Store priv key in slot 0x5
29,252,075 UART: [art] Derive Key Pair - Done
29,265,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,092 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,600 UART: [art] PUB.X = 4CACA22303281DE47CDFAC1FC1CFFBD0B2DB31E4315F774097CE3DF9973B66E280B7D3952331DFBE4D645D957E753307
31,562,865 UART: [art] PUB.Y = 8152E7A910EA6297AB5F015EB7DA7F5C24F78B19435216E4710DBE4E76CE63EDA0DDB78B8DC82D72216A70D3992655A5
31,570,170 UART: [art] SIG.R = B45F0B6F1D39E1DA76447840286E676B6C3DEBB777B5F7116EB9EF0AC5196A5D0714EE2ECDB15050E2114C6E57D33358
31,577,522 UART: [art] SIG.S = E50AB97CBC84812BB932344121081EDAAEC7448D7C0F9F96EDB8755F3122D7DC58552C0F12E8CDA7999C9837111AE228
32,882,920 UART: Caliptra RT
32,883,643 UART: [state] CFI Enabled
33,060,938 UART: [rt] RT listening for mailbox commands...
33,076,091 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,782,141 ready_for_fw is high
3,782,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,939,202 >>> mbox cmd response: success
17,940,483 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,627,447 UART:
23,627,844 UART: Running Caliptra FMC ...
23,628,989 UART:
23,629,152 UART: [state] CFI Enabled
23,697,385 UART: [fht] FMC Alias Private Key: 7
26,037,833 UART: [art] Extend RT PCRs Done
26,039,068 UART: [art] Lock RT PCRs Done
26,040,694 UART: [art] Populate DV Done
26,046,003 UART: [fht] FMC Alias Private Key: 7
26,047,603 UART: [art] Derive CDI
26,048,420 UART: [art] Store in slot 0x4
26,105,557 UART: [art] Derive Key Pair
26,106,621 UART: [art] Store priv key in slot 0x5
29,399,699 UART: [art] Derive Key Pair - Done
29,412,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,694,359 UART: [art] Erasing AUTHORITY.KEYID = 7
31,695,870 UART: [art] PUB.X = 1A238541D435246B4030AD6CB4F8ABF92FAD3FC4D8085E5853DD6C97A21046B5B58A6DF1CE759016ED632A2F96B6EEE4
31,703,135 UART: [art] PUB.Y = 265B01DB9E963C0A1B6D871C6DDDE2C52F2C42A91C190F3414EB0761A3CE2CAB8A6A8D163D48BD1D87F6321F78CEE37A
31,710,444 UART: [art] SIG.R = 2DD1E314F1EB504E48B9672890525B80264F125340D5D46CC3FDC9BCEA441D7D36BAD8A5E43F896B2797F4F5ADCDB1BA
31,717,848 UART: [art] SIG.S = EA84F75CCE95B2D3E9F998D7569A97FBF8C043FB7E75EF2A23422E8E324902AE09BF8910735AE1B77C460305B6FBE112
33,022,866 UART: Caliptra RT
33,023,587 UART: [state] CFI Enabled
33,201,104 UART: [rt] RT listening for mailbox commands...
33,216,415 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
192,398 UART:
192,894 UART: Running Caliptra ROM ...
194,038 UART:
603,591 UART: [state] CFI Enabled
616,295 UART: [state] LifecycleState = Unprovisioned
618,254 UART: [state] DebugLocked = No
619,927 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,998 UART: [kat] SHA2-256
793,689 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,274 UART: [kat] ++
804,746 UART: [kat] sha1
815,471 UART: [kat] SHA2-256
818,183 UART: [kat] SHA2-384
824,304 UART: [kat] SHA2-512-ACC
826,676 UART: [kat] ECC-384
3,110,187 UART: [kat] HMAC-384Kdf
3,120,993 UART: [kat] LMS
4,311,077 UART: [kat] --
4,315,216 UART: [cold-reset] ++
4,316,715 UART: [fht] Storing FHT @ 0x50003400
4,329,104 UART: [idev] ++
4,329,665 UART: [idev] CDI.KEYID = 6
4,330,569 UART: [idev] SUBJECT.KEYID = 7
4,331,807 UART: [idev] UDS.KEYID = 0
4,332,791 ready_for_fw is high
4,333,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,951 UART: [idev] Erasing UDS.KEYID = 0
7,622,215 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,847 UART: [idev] --
7,648,322 UART: [ldev] ++
7,648,896 UART: [ldev] CDI.KEYID = 6
7,649,858 UART: [ldev] SUBJECT.KEYID = 5
7,651,062 UART: [ldev] AUTHORITY.KEYID = 7
7,652,367 UART: [ldev] FE.KEYID = 1
7,665,303 UART: [ldev] Erasing FE.KEYID = 1
10,946,793 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,995 UART: [ldev] --
13,308,502 UART: [fwproc] Waiting for Commands...
13,311,615 UART: [fwproc] Received command 0x46574c44
13,313,789 UART: [fwproc] Received Image of size 118548 bytes
17,425,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,505,172 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,360 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,746 >>> mbox cmd response: success
17,908,797 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,911,701 UART: [afmc] ++
17,912,288 UART: [afmc] CDI.KEYID = 6
17,913,196 UART: [afmc] SUBJECT.KEYID = 7
17,914,464 UART: [afmc] AUTHORITY.KEYID = 5
21,229,287 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,263 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,527 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,538,970 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,553,711 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,120 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,039 UART: [afmc] --
23,593,197 UART: [cold-reset] --
23,597,482 UART: [state] Locking Datavault
23,600,828 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,578 UART: [state] Locking ICCM
23,604,992 UART: [exit] Launching FMC @ 0x40000130
23,613,394 UART:
23,613,623 UART: Running Caliptra FMC ...
23,614,718 UART:
23,614,869 UART: [state] CFI Enabled
23,622,959 UART: [fht] FMC Alias Private Key: 7
25,962,818 UART: [art] Extend RT PCRs Done
25,964,038 UART: [art] Lock RT PCRs Done
25,965,986 UART: [art] Populate DV Done
25,971,603 UART: [fht] FMC Alias Private Key: 7
25,973,247 UART: [art] Derive CDI
25,974,056 UART: [art] Store in slot 0x4
26,017,022 UART: [art] Derive Key Pair
26,018,022 UART: [art] Store priv key in slot 0x5
29,260,121 UART: [art] Derive Key Pair - Done
29,273,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,578 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,106 UART: [art] PUB.X = 4165065A814F7B5B6E66383BA46F70F08E24A17322BC795DA1B0587FA3A1153056C2ECA0A5D55D1E09A642CED784D1DA
31,562,391 UART: [art] PUB.Y = EE903C36A2AFAD921EC923DB90935437D856910B336B13894EB1132E6AC764B790A17BD1AB012963C482D91B33462B6B
31,569,591 UART: [art] SIG.R = 0E3CA16859EBCED1444C0774892D182B5339B232BF6DA1416539CCF9FC7924961F2AEAD3339312CB73FE7E39DBF969A7
31,576,990 UART: [art] SIG.S = 7C6A0ECC26E46E9EC125975345224CB7F4EAF542026E7679CC138CB4C19F72EC4EC42C83FAE18396E279DD78BD218BA7
32,882,175 UART: Caliptra RT
32,882,890 UART: [state] CFI Enabled
33,016,653 UART: [rt] RT listening for mailbox commands...
33,031,591 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
4,126,260 ready_for_fw is high
4,126,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,148,549 >>> mbox cmd response: success
18,149,793 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,790,850 UART:
23,791,237 UART: Running Caliptra FMC ...
23,792,340 UART:
23,792,486 UART: [state] CFI Enabled
23,800,221 UART: [fht] FMC Alias Private Key: 7
26,139,545 UART: [art] Extend RT PCRs Done
26,140,765 UART: [art] Lock RT PCRs Done
26,142,178 UART: [art] Populate DV Done
26,147,434 UART: [fht] FMC Alias Private Key: 7
26,148,927 UART: [art] Derive CDI
26,149,698 UART: [art] Store in slot 0x4
26,192,334 UART: [art] Derive Key Pair
26,193,348 UART: [art] Store priv key in slot 0x5
29,435,239 UART: [art] Derive Key Pair - Done
29,447,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,722 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,226 UART: [art] PUB.X = 3330677E51F5B2D10F1D9DFD94651AA3A5ACFB857B97575D59504DBCDB5FF75F931646C2C959AE12A0F58B77A6FF0075
31,736,465 UART: [art] PUB.Y = 18DD4601D04BF0595FE0C7F1D9D6A849BFD8187E5446A11EF86A6FCBB438BF92101673CBF489EF04254C2442BBEBCC20
31,743,757 UART: [art] SIG.R = A65309D92371BA447C485A2ABCF98177AC5218A4DC2FB9B6C86FD6A4E1381D712EBB5FAB52AA77303BEDAECD922DD206
31,751,150 UART: [art] SIG.S = C430E2AA3AF40DABFBF5B66567C785004C49C432F29CCC6CC2047463C326131C567F07AB337AD98BDDE481B55C6DF313
33,056,026 UART: Caliptra RT
33,056,744 UART: [state] CFI Enabled
33,189,743 UART: [rt] RT listening for mailbox commands...
33,204,999 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
192,184 UART:
192,543 UART: Running Caliptra ROM ...
193,640 UART:
193,782 UART: [state] CFI Enabled
259,911 UART: [state] LifecycleState = Unprovisioned
261,833 UART: [state] DebugLocked = No
264,348 UART: [state] WD Timer not started. Device not locked for debugging
268,972 UART: [kat] SHA2-256
448,624 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,367 UART: [kat] ++
459,819 UART: [kat] sha1
470,258 UART: [kat] SHA2-256
472,984 UART: [kat] SHA2-384
478,833 UART: [kat] SHA2-512-ACC
481,194 UART: [kat] ECC-384
2,948,294 UART: [kat] HMAC-384Kdf
2,968,841 UART: [kat] LMS
3,445,294 UART: [kat] --
3,451,226 UART: [cold-reset] ++
3,452,586 UART: [fht] FHT @ 0x50003400
3,464,096 UART: [idev] ++
3,464,664 UART: [idev] CDI.KEYID = 6
3,465,615 UART: [idev] SUBJECT.KEYID = 7
3,466,874 UART: [idev] UDS.KEYID = 0
3,467,849 ready_for_fw is high
3,468,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,187 UART: [idev] Erasing UDS.KEYID = 0
5,981,909 UART: [idev] Sha1 KeyId Algorithm
6,006,386 UART: [idev] --
6,011,468 UART: [ldev] ++
6,012,039 UART: [ldev] CDI.KEYID = 6
6,012,948 UART: [ldev] SUBJECT.KEYID = 5
6,014,159 UART: [ldev] AUTHORITY.KEYID = 7
6,015,446 UART: [ldev] FE.KEYID = 1
6,055,792 UART: [ldev] Erasing FE.KEYID = 1
8,562,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,726 UART: [ldev] --
10,370,984 UART: [fwproc] Wait for Commands...
10,373,408 UART: [fwproc] Recv command 0x46574c44
10,375,388 UART: [fwproc] Recv'd Img size: 118548 bytes
13,855,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,627 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,007,643 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,336,739 >>> mbox cmd response: success
14,337,760 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,339,961 UART: [afmc] ++
14,340,598 UART: [afmc] CDI.KEYID = 6
14,341,503 UART: [afmc] SUBJECT.KEYID = 7
14,342,714 UART: [afmc] AUTHORITY.KEYID = 5
16,873,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,733 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,600 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,649,601 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,206 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,688,572 UART: [afmc] --
18,691,451 UART: [cold-reset] --
18,694,707 UART: [state] Locking Datavault
18,700,392 UART: [state] Locking PCR0, PCR1 and PCR31
18,702,126 UART: [state] Locking ICCM
18,704,118 UART: [exit] Launching FMC @ 0x40000130
18,712,558 UART:
18,712,789 UART: Running Caliptra FMC ...
18,713,884 UART:
18,714,040 UART: [state] CFI Enabled
18,771,313 UART: [fht] FMC Alias Private Key: 7
20,537,843 UART: [art] Extend RT PCRs Done
20,539,214 UART: [art] Lock RT PCRs Done
20,540,681 UART: [art] Populate DV Done
20,545,931 UART: [fht] FMC Alias Private Key: 7
20,547,464 UART: [art] Derive CDI
20,548,274 UART: [art] Store in slot 0x4
20,603,881 UART: [art] Derive Key Pair
20,604,876 UART: [art] Store priv key in slot 0x5
23,067,107 UART: [art] Derive Key Pair - Done
23,080,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,792,465 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,970 UART: [art] PUB.X = 860FF67DAC9480696C6A691AB12C31F7C96B675911B492C0063BF77F00AFE2C43F473DEC46446443DC21BC83D3493EA4
24,801,221 UART: [art] PUB.Y = 335CC989F7A933F6BF70E59DEB115F966077CAB71305BF612474B077FB00656431D27FAE23338C4FA08EFB61A16CE84E
24,808,455 UART: [art] SIG.R = D6FD07AD687D36DF70F8F3ED6AA1B9654580A13F1247E9CE5145A9A8104801CB8B9FFC354CEDA876AE7351AEEABC4516
24,815,896 UART: [art] SIG.S = 3FA2D101A458B0450D629CB14A3900AEF43097C8B2796BBD9438756FCC7C6F41A6FBB0FA64D79EA1F10CAB228A8A0CEA
25,795,280 UART: Caliptra RT
25,795,989 UART: [state] CFI Enabled
25,975,590 UART: [rt] RT listening for mailbox commands...
25,991,119 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,459,586 ready_for_fw is high
3,460,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,253,144 >>> mbox cmd response: success
14,254,321 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,532,304 UART:
18,532,685 UART: Running Caliptra FMC ...
18,533,784 UART:
18,533,939 UART: [state] CFI Enabled
18,600,212 UART: [fht] FMC Alias Private Key: 7
20,366,946 UART: [art] Extend RT PCRs Done
20,368,166 UART: [art] Lock RT PCRs Done
20,370,142 UART: [art] Populate DV Done
20,375,829 UART: [fht] FMC Alias Private Key: 7
20,377,477 UART: [art] Derive CDI
20,378,295 UART: [art] Store in slot 0x4
20,432,020 UART: [art] Derive Key Pair
20,433,035 UART: [art] Store priv key in slot 0x5
22,896,730 UART: [art] Derive Key Pair - Done
22,909,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,622,210 UART: [art] Erasing AUTHORITY.KEYID = 7
24,623,717 UART: [art] PUB.X = 16FB96113F1DB405E72C2318A170E55B1E219978F70019B71E159B1556946A2C87B4421D6C330A6D44B91CBF4598CCEC
24,630,920 UART: [art] PUB.Y = 057674E66B4FE1C261EDD6EE98396181F88398044D7E3DBA7BD413A6356F7B509EF46CCB9DB9FBB451A118FD4416DA67
24,638,187 UART: [art] SIG.R = 337D12B961142C142928C89939B4CB98476CE9955F82748191725BFFF7E008889F829BEABFEFFC257006237FFFFEA80F
24,645,585 UART: [art] SIG.S = A94A5D988575D617D5AA568265A025A8AB905D0CE3943223B098C34C115335482AE53F81F42310A682BC9A0F2B06C52F
25,624,364 UART: Caliptra RT
25,625,065 UART: [state] CFI Enabled
25,807,869 UART: [rt] RT listening for mailbox commands...
25,822,958 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,376 UART:
192,735 UART: Running Caliptra ROM ...
193,923 UART:
603,468 UART: [state] CFI Enabled
618,964 UART: [state] LifecycleState = Unprovisioned
620,875 UART: [state] DebugLocked = No
623,332 UART: [state] WD Timer not started. Device not locked for debugging
626,951 UART: [kat] SHA2-256
806,662 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,394 UART: [kat] ++
817,841 UART: [kat] sha1
828,101 UART: [kat] SHA2-256
830,756 UART: [kat] SHA2-384
836,676 UART: [kat] SHA2-512-ACC
839,045 UART: [kat] ECC-384
3,279,300 UART: [kat] HMAC-384Kdf
3,290,885 UART: [kat] LMS
3,767,406 UART: [kat] --
3,772,463 UART: [cold-reset] ++
3,773,617 UART: [fht] FHT @ 0x50003400
3,784,811 UART: [idev] ++
3,785,377 UART: [idev] CDI.KEYID = 6
3,786,408 UART: [idev] SUBJECT.KEYID = 7
3,787,585 UART: [idev] UDS.KEYID = 0
3,788,516 ready_for_fw is high
3,788,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,549 UART: [idev] Erasing UDS.KEYID = 0
6,262,850 UART: [idev] Sha1 KeyId Algorithm
6,286,290 UART: [idev] --
6,291,284 UART: [ldev] ++
6,291,866 UART: [ldev] CDI.KEYID = 6
6,292,752 UART: [ldev] SUBJECT.KEYID = 5
6,293,965 UART: [ldev] AUTHORITY.KEYID = 7
6,295,259 UART: [ldev] FE.KEYID = 1
6,307,319 UART: [ldev] Erasing FE.KEYID = 1
8,788,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,111 UART: [ldev] --
10,583,808 UART: [fwproc] Wait for Commands...
10,586,395 UART: [fwproc] Recv command 0x46574c44
10,588,403 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,462 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,472 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,171 >>> mbox cmd response: success
14,549,327 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,551,597 UART: [afmc] ++
14,552,180 UART: [afmc] CDI.KEYID = 6
14,553,197 UART: [afmc] SUBJECT.KEYID = 7
14,554,358 UART: [afmc] AUTHORITY.KEYID = 5
17,056,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,666 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,489 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,559 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,830,140 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,037 UART: [afmc] --
18,858,164 UART: [cold-reset] --
18,862,359 UART: [state] Locking Datavault
18,866,739 UART: [state] Locking PCR0, PCR1 and PCR31
18,868,448 UART: [state] Locking ICCM
18,869,953 UART: [exit] Launching FMC @ 0x40000130
18,878,346 UART:
18,878,584 UART: Running Caliptra FMC ...
18,879,683 UART:
18,879,846 UART: [state] CFI Enabled
18,887,568 UART: [fht] FMC Alias Private Key: 7
20,653,405 UART: [art] Extend RT PCRs Done
20,654,622 UART: [art] Lock RT PCRs Done
20,655,904 UART: [art] Populate DV Done
20,661,487 UART: [fht] FMC Alias Private Key: 7
20,663,022 UART: [art] Derive CDI
20,663,858 UART: [art] Store in slot 0x4
20,706,723 UART: [art] Derive Key Pair
20,707,765 UART: [art] Store priv key in slot 0x5
23,134,497 UART: [art] Derive Key Pair - Done
23,147,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,433 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,936 UART: [art] PUB.X = 1B57F9E9494AF7965CE682A3CF4952952B9A9C4884BE921D1552ED5C488FBDE6D0FC47ABD833FF308FD47385F08E05BD
24,862,231 UART: [art] PUB.Y = 30CEC7D3FBAF6D8DA03FA6D7F7415E862FDB8906ED463A921696DD08941F3B257E3AF2BA900B4152851B5FFED1CC1EA4
24,869,518 UART: [art] SIG.R = 3ADA3BEF5D239869067ADA6AAE74472E12BE2352E350C3EB35CC173F09BC37C1F617800386CA3ED64935CE45528893A3
24,876,899 UART: [art] SIG.S = A463C006B6A196098F17829B97683BD5E29864C9ACAC083B8F7283228D61031D993624E0E1206CCB34E8CBE362B2C7C0
25,855,687 UART: Caliptra RT
25,856,392 UART: [state] CFI Enabled
25,988,638 UART: [rt] RT listening for mailbox commands...
26,004,000 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,784,447 ready_for_fw is high
3,784,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,379 >>> mbox cmd response: success
14,443,661 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,695,692 UART:
18,696,121 UART: Running Caliptra FMC ...
18,697,242 UART:
18,697,412 UART: [state] CFI Enabled
18,705,200 UART: [fht] FMC Alias Private Key: 7
20,471,660 UART: [art] Extend RT PCRs Done
20,472,880 UART: [art] Lock RT PCRs Done
20,474,278 UART: [art] Populate DV Done
20,479,591 UART: [fht] FMC Alias Private Key: 7
20,481,295 UART: [art] Derive CDI
20,482,112 UART: [art] Store in slot 0x4
20,524,549 UART: [art] Derive Key Pair
20,525,543 UART: [art] Store priv key in slot 0x5
22,952,709 UART: [art] Derive Key Pair - Done
22,965,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,239 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,738 UART: [art] PUB.X = 46EE2B2C5EB12B43F2C0AB71D63015B4908A81E85E2CB6F13E7C6E7FD76953907550075081C0413936EA9B19E485457E
24,680,995 UART: [art] PUB.Y = A453FF4469EC4BE5C3A3EF2984A5227E730ABEF8D619F57A19F4C4693B3FC07CBFB92E3447679B39024A426C4FC416E0
24,688,258 UART: [art] SIG.R = 7A9D44B6EA6C3455200F9DF1B2F524F8325B11FD01F76F4D743DA7B6109E037BEFC2FC8449D4101E866BEBD2B3FF70CF
24,695,852 UART: [art] SIG.S = 262688DB6A6FA411F5FE18224E32ED23E2FC5BB2BD592487A3FEC4771BB82A981324851E540377FEC453B16490E45BAF
25,674,794 UART: Caliptra RT
25,675,484 UART: [state] CFI Enabled
25,808,089 UART: [rt] RT listening for mailbox commands...
25,823,650 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,047 UART:
192,426 UART: Running Caliptra ROM ...
193,608 UART:
193,757 UART: [state] CFI Enabled
262,693 UART: [state] LifecycleState = Unprovisioned
265,100 UART: [state] DebugLocked = No
267,431 UART: [state] WD Timer not started. Device not locked for debugging
271,684 UART: [kat] SHA2-256
461,598 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,348 UART: [kat] ++
472,886 UART: [kat] sha1
485,135 UART: [kat] SHA2-256
488,139 UART: [kat] SHA2-384
494,759 UART: [kat] SHA2-512-ACC
497,338 UART: [kat] ECC-384
2,944,713 UART: [kat] HMAC-384Kdf
2,972,174 UART: [kat] LMS
3,503,969 UART: [kat] --
3,507,391 UART: [cold-reset] ++
3,509,250 UART: [fht] FHT @ 0x50003400
3,520,413 UART: [idev] ++
3,521,128 UART: [idev] CDI.KEYID = 6
3,522,176 UART: [idev] SUBJECT.KEYID = 7
3,523,277 UART: [idev] UDS.KEYID = 0
3,524,199 ready_for_fw is high
3,524,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,443 UART: [idev] Erasing UDS.KEYID = 0
6,030,205 UART: [idev] Sha1 KeyId Algorithm
6,052,084 UART: [idev] --
6,057,597 UART: [ldev] ++
6,058,330 UART: [ldev] CDI.KEYID = 6
6,059,242 UART: [ldev] SUBJECT.KEYID = 5
6,060,403 UART: [ldev] AUTHORITY.KEYID = 7
6,061,628 UART: [ldev] FE.KEYID = 1
6,098,472 UART: [ldev] Erasing FE.KEYID = 1
8,606,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,424 UART: [ldev] --
10,410,375 UART: [fwproc] Wait for Commands...
10,413,224 UART: [fwproc] Recv command 0x46574c44
10,415,481 UART: [fwproc] Recv'd Img size: 118548 bytes
13,908,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,983,138 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,106,744 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,667,340 >>> mbox cmd response: success
14,668,331 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,671,176 UART: [afmc] ++
14,671,870 UART: [afmc] CDI.KEYID = 6
14,673,112 UART: [afmc] SUBJECT.KEYID = 7
14,674,543 UART: [afmc] AUTHORITY.KEYID = 5
17,218,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,877 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,940 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,089 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,012 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,331 UART: [afmc] --
19,035,022 UART: [cold-reset] --
19,038,948 UART: [state] Locking Datavault
19,043,710 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,891 UART: [state] Locking ICCM
19,047,536 UART: [exit] Launching FMC @ 0x40000130
19,056,195 UART:
19,056,427 UART: Running Caliptra FMC ...
19,057,450 UART:
19,057,599 UART: [state] CFI Enabled
19,117,758 UART: [fht] FMC Alias Private Key: 7
20,883,468 UART: [art] Extend RT PCRs Done
20,884,670 UART: [art] Lock RT PCRs Done
20,886,426 UART: [art] Populate DV Done
20,891,996 UART: [fht] FMC Alias Private Key: 7
20,893,580 UART: [art] Derive CDI
20,894,316 UART: [art] Store in slot 0x4
20,950,402 UART: [art] Derive Key Pair
20,951,466 UART: [art] Store priv key in slot 0x5
23,414,612 UART: [art] Derive Key Pair - Done
23,427,711 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,140,576 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,075 UART: [art] PUB.X = EDA47D4ACEEA016C00872B3C3EC8CD3204F594576051FB2E5CC5EC2C83D5A0B8B3F11CBE6D6685BEEE42FE5A2E6EB49B
25,149,349 UART: [art] PUB.Y = 5C47FF45826701F63447E79201893CF0550F9CBAC69B0C0773E181D57FE0321D7AE629CD20112506458BABBF328C2D3A
25,156,562 UART: [art] SIG.R = BD9D7A83D5FCBB23F3F6CDDC9E6C64CB1B1F0AB7B69B5A290B40A4EF83F1703AC9F91E5A2D39C741FDFC9F38776A3DFC
25,164,031 UART: [art] SIG.S = C786D0FEF154729B657CCDE057A0B90F275F0FCA43793BA883CDEA204B1E21A0561A2DCAD06DA051EF607C8BA2550A7E
26,142,396 UART: Caliptra RT
26,143,110 UART: [state] CFI Enabled
26,323,652 UART: [rt] RT listening for mailbox commands...
26,338,528 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,438,390 ready_for_fw is high
3,438,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,816,919 >>> mbox cmd response: success
14,818,250 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,108,906 UART:
19,109,295 UART: Running Caliptra FMC ...
19,110,396 UART:
19,110,548 UART: [state] CFI Enabled
19,178,831 UART: [fht] FMC Alias Private Key: 7
20,944,640 UART: [art] Extend RT PCRs Done
20,945,870 UART: [art] Lock RT PCRs Done
20,947,465 UART: [art] Populate DV Done
20,953,039 UART: [fht] FMC Alias Private Key: 7
20,954,526 UART: [art] Derive CDI
20,955,257 UART: [art] Store in slot 0x4
21,011,410 UART: [art] Derive Key Pair
21,012,415 UART: [art] Store priv key in slot 0x5
23,474,880 UART: [art] Derive Key Pair - Done
23,487,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,098 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,619 UART: [art] PUB.X = EE3EE6765F044EA1A40E0646E1F49D0D5F447C1C67F4CFA961F90DE14CA663AC37AD0A20CFBA7984826221F1EE9460E2
25,209,888 UART: [art] PUB.Y = 3DB6D96A776EB3D8F83E6F8423E210D53779B93AAE13A2FF3806ED3A07D93405271F4453E6E337BDFFAB44598089C89E
25,217,134 UART: [art] SIG.R = 4338F13CD0A176CFD903B16CB8BB77EC30A0434961A615051B518C23DA769E53537C37E527B39C47E51AD72DEFA60F89
25,224,540 UART: [art] SIG.S = 0F4B8B8A704DEB21CE2915E4B39AB56F6AF3D8FFAC39583020417BBDD547FAA178211AC1989B012FB70FD4388633F929
26,203,008 UART: Caliptra RT
26,203,731 UART: [state] CFI Enabled
26,384,517 UART: [rt] RT listening for mailbox commands...
26,399,346 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,487 UART:
192,888 UART: Running Caliptra ROM ...
194,077 UART:
603,537 UART: [state] CFI Enabled
618,454 UART: [state] LifecycleState = Unprovisioned
620,810 UART: [state] DebugLocked = No
622,558 UART: [state] WD Timer not started. Device not locked for debugging
626,754 UART: [kat] SHA2-256
816,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,383 UART: [kat] ++
827,915 UART: [kat] sha1
838,577 UART: [kat] SHA2-256
841,587 UART: [kat] SHA2-384
848,940 UART: [kat] SHA2-512-ACC
851,522 UART: [kat] ECC-384
3,296,311 UART: [kat] HMAC-384Kdf
3,309,413 UART: [kat] LMS
3,841,249 UART: [kat] --
3,845,398 UART: [cold-reset] ++
3,847,830 UART: [fht] FHT @ 0x50003400
3,860,443 UART: [idev] ++
3,861,162 UART: [idev] CDI.KEYID = 6
3,862,048 UART: [idev] SUBJECT.KEYID = 7
3,863,299 UART: [idev] UDS.KEYID = 0
3,864,244 ready_for_fw is high
3,864,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,410 UART: [idev] Erasing UDS.KEYID = 0
6,342,481 UART: [idev] Sha1 KeyId Algorithm
6,364,251 UART: [idev] --
6,367,870 UART: [ldev] ++
6,368,553 UART: [ldev] CDI.KEYID = 6
6,369,465 UART: [ldev] SUBJECT.KEYID = 5
6,370,626 UART: [ldev] AUTHORITY.KEYID = 7
6,371,880 UART: [ldev] FE.KEYID = 1
6,384,031 UART: [ldev] Erasing FE.KEYID = 1
8,861,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,744 UART: [ldev] --
10,651,476 UART: [fwproc] Wait for Commands...
10,654,165 UART: [fwproc] Recv command 0x46574c44
10,656,423 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,245 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,899 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,348 >>> mbox cmd response: success
14,916,451 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,919,657 UART: [afmc] ++
14,920,352 UART: [afmc] CDI.KEYID = 6
14,921,516 UART: [afmc] SUBJECT.KEYID = 7
14,923,002 UART: [afmc] AUTHORITY.KEYID = 5
17,427,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,815 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,915 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,031 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,960 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,222,469 UART: [afmc] --
19,226,721 UART: [cold-reset] --
19,230,477 UART: [state] Locking Datavault
19,236,758 UART: [state] Locking PCR0, PCR1 and PCR31
19,238,911 UART: [state] Locking ICCM
19,240,747 UART: [exit] Launching FMC @ 0x40000130
19,249,449 UART:
19,249,688 UART: Running Caliptra FMC ...
19,250,792 UART:
19,250,952 UART: [state] CFI Enabled
19,258,522 UART: [fht] FMC Alias Private Key: 7
21,024,424 UART: [art] Extend RT PCRs Done
21,025,651 UART: [art] Lock RT PCRs Done
21,027,550 UART: [art] Populate DV Done
21,032,807 UART: [fht] FMC Alias Private Key: 7
21,034,455 UART: [art] Derive CDI
21,035,198 UART: [art] Store in slot 0x4
21,077,952 UART: [art] Derive Key Pair
21,078,956 UART: [art] Store priv key in slot 0x5
23,505,918 UART: [art] Derive Key Pair - Done
23,518,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,075 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,612 UART: [art] PUB.X = 4066FBF8B5F35DAF469A6C87AD9C050EC54708DA9EF5D2BA77C48AE5324BE749563662D02255720066E80AAEE60DC15A
25,233,889 UART: [art] PUB.Y = 1C7B09E2245E5781659BBD5440AE63AF11C3C477F3769D15F08E28557885F1C88D56840EF4FE25BBD40F15703448990D
25,241,090 UART: [art] SIG.R = BD8F7C75D3E8C6A7EF04AD7C2E35FB1DD0BB109BF80939D6D405B531C3078616EA676DF1D7CDFBF9A10E3F4AE61BF31E
25,248,510 UART: [art] SIG.S = 1B78EE86147FA0EA6FDE510B47F4D921E3A12E7C4930CC4047BB1AF8B3146D443A24EA05D4B8A058A1C70F649B805EA2
26,227,583 UART: Caliptra RT
26,228,271 UART: [state] CFI Enabled
26,361,964 UART: [rt] RT listening for mailbox commands...
26,377,147 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,673 writing to cptra_bootfsm_go
3,757,735 ready_for_fw is high
3,758,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,891 >>> mbox cmd response: success
15,049,180 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,301,569 UART:
19,301,948 UART: Running Caliptra FMC ...
19,303,058 UART:
19,303,220 UART: [state] CFI Enabled
19,311,247 UART: [fht] FMC Alias Private Key: 7
21,077,744 UART: [art] Extend RT PCRs Done
21,078,976 UART: [art] Lock RT PCRs Done
21,080,479 UART: [art] Populate DV Done
21,085,857 UART: [fht] FMC Alias Private Key: 7
21,087,477 UART: [art] Derive CDI
21,088,223 UART: [art] Store in slot 0x4
21,130,503 UART: [art] Derive Key Pair
21,131,548 UART: [art] Store priv key in slot 0x5
23,558,416 UART: [art] Derive Key Pair - Done
23,571,359 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,832 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,334 UART: [art] PUB.X = 42190C42549443C860CF00E08ECB65F1489871B5E7A21BFDC978BCAC85529C64A2F268A2EC217AF4FC3DF28FD973A2C0
25,286,612 UART: [art] PUB.Y = DC81BC871B448A5AFD11F93F0F563D941CDCB938BE6EFBD8AD90AFEC09A8EBA546A5F9E3B583DB9D4AA6E1939B404607
25,293,873 UART: [art] SIG.R = E3929BDFB8BCCE2F5D790A7516E83799B629D215C5149F3F796525C3EC42A772D8D8A533E89D8496E3609CB18EFE2148
25,301,275 UART: [art] SIG.S = 8129643C4A98A5EB2BD8D06D0421694D11D611EE1ADD70611A1887A2C36926053CEEAF65043CED471ED89E2ACA4E390E
26,279,674 UART: Caliptra RT
26,280,364 UART: [state] CFI Enabled
26,412,991 UART: [rt] RT listening for mailbox commands...
26,427,920 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,518 UART: [state] LifecycleState = Unprovisioned
86,173 UART: [state] DebugLocked = No
86,737 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,431 UART: [kat] SHA2-256
882,362 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,477 UART: [kat] ++
886,629 UART: [kat] sha1
890,799 UART: [kat] SHA2-256
892,737 UART: [kat] SHA2-384
895,296 UART: [kat] SHA2-512-ACC
897,197 UART: [kat] ECC-384
902,980 UART: [kat] HMAC-384Kdf
907,540 UART: [kat] LMS
1,475,736 UART: [kat] --
1,476,343 UART: [cold-reset] ++
1,476,669 UART: [fht] Storing FHT @ 0x50003400
1,479,256 UART: [idev] ++
1,479,424 UART: [idev] CDI.KEYID = 6
1,479,784 UART: [idev] SUBJECT.KEYID = 7
1,480,208 UART: [idev] UDS.KEYID = 0
1,480,553 ready_for_fw is high
1,480,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,034 UART: [idev] Erasing UDS.KEYID = 0
1,504,678 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,380 UART: [idev] --
1,514,417 UART: [ldev] ++
1,514,585 UART: [ldev] CDI.KEYID = 6
1,514,948 UART: [ldev] SUBJECT.KEYID = 5
1,515,374 UART: [ldev] AUTHORITY.KEYID = 7
1,515,837 UART: [ldev] FE.KEYID = 1
1,521,129 UART: [ldev] Erasing FE.KEYID = 1
1,545,946 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,924 UART: [ldev] --
1,585,301 UART: [fwproc] Waiting for Commands...
1,586,156 UART: [fwproc] Received command 0x46574c44
1,586,947 UART: [fwproc] Received Image of size 118548 bytes
2,931,959 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,075 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,293 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,658 >>> mbox cmd response: success
3,130,658 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,131,874 UART: [afmc] ++
3,132,042 UART: [afmc] CDI.KEYID = 6
3,132,404 UART: [afmc] SUBJECT.KEYID = 7
3,132,829 UART: [afmc] AUTHORITY.KEYID = 5
3,168,094 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,134 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,914 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,623 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,506 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,189 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,889 UART: [afmc] --
3,210,889 UART: [cold-reset] --
3,211,673 UART: [state] Locking Datavault
3,212,944 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,548 UART: [state] Locking ICCM
3,214,174 UART: [exit] Launching FMC @ 0x40000130
3,219,504 UART:
3,219,520 UART: Running Caliptra FMC ...
3,219,928 UART:
3,219,982 UART: [state] CFI Enabled
3,230,738 UART: [fht] FMC Alias Private Key: 7
3,350,046 UART: [art] Extend RT PCRs Done
3,350,474 UART: [art] Lock RT PCRs Done
3,351,972 UART: [art] Populate DV Done
3,360,161 UART: [fht] FMC Alias Private Key: 7
3,361,105 UART: [art] Derive CDI
3,361,385 UART: [art] Store in slot 0x4
3,447,093 UART: [art] Derive Key Pair
3,447,453 UART: [art] Store priv key in slot 0x5
3,461,030 UART: [art] Derive Key Pair - Done
3,475,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,735 UART: [art] PUB.X = 31CEEE3A139237815D21839634BD2E57711B0740D5B15023A67355FACC4BFA656CB235BBCD59F68BC0F8B9A202AC8BF8
3,498,509 UART: [art] PUB.Y = C60DD871ACD2E4416D196CF84FDF9225162F7C1DB1A3F3F30C29DD059BC098CF5F0A097BFA0B54EA63E8650BCF7C8928
3,505,456 UART: [art] SIG.R = 474CAFCA1363594114DF3D3588CE66BD2F23C48E5AF82142F7829103A3965201835BEE6915456FF01FC14854E2A95010
3,512,214 UART: [art] SIG.S = 956611E1451A76E5072BCE7BDFD1C5A1C92B455F5B83751A8E8E7195ECC12FD027CD103F4C566AE57CA8E0AD4B630DFF
3,535,818 UART: Caliptra RT
3,536,069 UART: [state] CFI Enabled
3,657,143 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,671,140 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,721 ready_for_fw is high
1,362,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,798 >>> mbox cmd response: success
2,981,798 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,042,859 UART:
3,042,875 UART: Running Caliptra FMC ...
3,043,283 UART:
3,043,337 UART: [state] CFI Enabled
3,053,665 UART: [fht] FMC Alias Private Key: 7
3,172,831 UART: [art] Extend RT PCRs Done
3,173,259 UART: [art] Lock RT PCRs Done
3,175,091 UART: [art] Populate DV Done
3,183,302 UART: [fht] FMC Alias Private Key: 7
3,184,268 UART: [art] Derive CDI
3,184,548 UART: [art] Store in slot 0x4
3,269,908 UART: [art] Derive Key Pair
3,270,268 UART: [art] Store priv key in slot 0x5
3,283,449 UART: [art] Derive Key Pair - Done
3,298,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,068 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,833 UART: [art] PUB.X = 2B3DFA57C6299A87A535ADAAEB87693560688F66461172F6D7CAAFEDF7A7A376A6856429C68C09DAB720795F951CC2CD
3,320,610 UART: [art] PUB.Y = EE59E4DE49828799DE9084388C271D93A1C7ED1EAC5B70052F7420D10DB841FEC9D3954BE982026357BE3BE1FD0D24BD
3,327,558 UART: [art] SIG.R = 6D116CA0E197BB6A1947C766C51B210BFFE3A77387A5ECB9D9A1E54DB574BE2C08481A5FEF3F5B8B5AB52F13302C2DEB
3,334,342 UART: [art] SIG.S = 6DDD4296A86D84CE61A1E041401E25ADCB0CDF174C12D5648A468CF2BBC0CDB60839367CFAE4E47113806EE2626F9F1B
3,358,056 UART: Caliptra RT
3,358,307 UART: [state] CFI Enabled
3,478,372 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,492,521 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,244 UART: [kat] SHA2-256
882,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,290 UART: [kat] ++
886,442 UART: [kat] sha1
890,648 UART: [kat] SHA2-256
892,586 UART: [kat] SHA2-384
895,239 UART: [kat] SHA2-512-ACC
897,140 UART: [kat] ECC-384
902,437 UART: [kat] HMAC-384Kdf
906,947 UART: [kat] LMS
1,475,143 UART: [kat] --
1,475,882 UART: [cold-reset] ++
1,476,424 UART: [fht] Storing FHT @ 0x50003400
1,479,319 UART: [idev] ++
1,479,487 UART: [idev] CDI.KEYID = 6
1,479,847 UART: [idev] SUBJECT.KEYID = 7
1,480,271 UART: [idev] UDS.KEYID = 0
1,480,616 ready_for_fw is high
1,480,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,313 UART: [idev] Erasing UDS.KEYID = 0
1,504,759 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,251 UART: [idev] --
1,514,136 UART: [ldev] ++
1,514,304 UART: [ldev] CDI.KEYID = 6
1,514,667 UART: [ldev] SUBJECT.KEYID = 5
1,515,093 UART: [ldev] AUTHORITY.KEYID = 7
1,515,556 UART: [ldev] FE.KEYID = 1
1,520,666 UART: [ldev] Erasing FE.KEYID = 1
1,546,091 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,081 UART: [ldev] --
1,585,362 UART: [fwproc] Waiting for Commands...
1,586,229 UART: [fwproc] Received command 0x46574c44
1,587,020 UART: [fwproc] Received Image of size 118548 bytes
2,931,002 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,686 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,333 >>> mbox cmd response: success
3,130,333 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,131,409 UART: [afmc] ++
3,131,577 UART: [afmc] CDI.KEYID = 6
3,131,939 UART: [afmc] SUBJECT.KEYID = 7
3,132,364 UART: [afmc] AUTHORITY.KEYID = 5
3,167,653 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,965 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,745 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,454 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,337 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,020 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,804 UART: [afmc] --
3,210,712 UART: [cold-reset] --
3,211,550 UART: [state] Locking Datavault
3,212,795 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,399 UART: [state] Locking ICCM
3,213,933 UART: [exit] Launching FMC @ 0x40000130
3,219,263 UART:
3,219,279 UART: Running Caliptra FMC ...
3,219,687 UART:
3,219,830 UART: [state] CFI Enabled
3,230,368 UART: [fht] FMC Alias Private Key: 7
3,348,814 UART: [art] Extend RT PCRs Done
3,349,242 UART: [art] Lock RT PCRs Done
3,350,668 UART: [art] Populate DV Done
3,358,847 UART: [fht] FMC Alias Private Key: 7
3,359,953 UART: [art] Derive CDI
3,360,233 UART: [art] Store in slot 0x4
3,446,123 UART: [art] Derive Key Pair
3,446,483 UART: [art] Store priv key in slot 0x5
3,459,072 UART: [art] Derive Key Pair - Done
3,473,794 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,291 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,056 UART: [art] PUB.X = CBED9805C5EDD9894BC3ED707E75AAABE3932DA49369E4C4847E63AAAC6CA7F9ED794E2B33DACB47AEA4A270851537D5
3,496,847 UART: [art] PUB.Y = 0F0E5EB1F4A70D5BB701D2B3BCE98C699BE6BBE16B92B713A93B7D7F43126E7128D7B201C060C46A3636B7A7AC86DA57
3,503,796 UART: [art] SIG.R = 2658C7C18324E486FEE4348D9B1A2BFC01BA0FA18D0781BB7BC8D73049D5DB34E294BFD8512744D8792CA61D67BD1354
3,510,565 UART: [art] SIG.S = DC0F8AE3F5535844C3E2EA7F144C0BCD79DADFF0FF1975D24B4DF482B4FD8E15DBDF3318F47FA1B28DFB6C94C6C5AAF0
3,534,179 UART: Caliptra RT
3,534,522 UART: [state] CFI Enabled
3,654,614 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,891 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,140 ready_for_fw is high
1,363,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,519 >>> mbox cmd response: success
2,982,519 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,044,432 UART:
3,044,448 UART: Running Caliptra FMC ...
3,044,856 UART:
3,044,999 UART: [state] CFI Enabled
3,055,617 UART: [fht] FMC Alias Private Key: 7
3,175,375 UART: [art] Extend RT PCRs Done
3,175,803 UART: [art] Lock RT PCRs Done
3,177,479 UART: [art] Populate DV Done
3,185,776 UART: [fht] FMC Alias Private Key: 7
3,186,958 UART: [art] Derive CDI
3,187,238 UART: [art] Store in slot 0x4
3,272,774 UART: [art] Derive Key Pair
3,273,134 UART: [art] Store priv key in slot 0x5
3,287,105 UART: [art] Derive Key Pair - Done
3,301,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,318,109 UART: [art] PUB.X = 16FD3F6B936B3B397CECCE162DBB155DAFF25DDEB42E958F0D434B60FA40DB207B64A44B32E1E714C9431141EAB2B4FC
3,324,898 UART: [art] PUB.Y = 2852298441CC6F365AE1908533331068315B8F184BC5CDE6F274D42F251691FF0697B9D18D504D53E39DEB5506E774F8
3,331,834 UART: [art] SIG.R = C0C2EC3AD9E89CCA05B5CB32D1C973A63F07D57D76C40B9BE49AA2EECD66EB012DABB6A4D6EDBE071E62D5D42962FB42
3,338,619 UART: [art] SIG.S = 0A9E8F52EABF6B7A811CAEB0357C0C5E4C55C829E0F85B480511526015FC0276454C96EE4E3AE5DB2430C72A15876A5C
3,362,329 UART: Caliptra RT
3,362,672 UART: [state] CFI Enabled
3,482,742 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,497,251 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
891,006 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,110 UART: [kat] ++
895,262 UART: [kat] sha1
899,350 UART: [kat] SHA2-256
901,290 UART: [kat] SHA2-384
904,205 UART: [kat] SHA2-512-ACC
906,106 UART: [kat] ECC-384
915,803 UART: [kat] HMAC-384Kdf
920,585 UART: [kat] LMS
1,168,897 UART: [kat] --
1,169,824 UART: [cold-reset] ++
1,170,180 UART: [fht] FHT @ 0x50003400
1,172,802 UART: [idev] ++
1,172,970 UART: [idev] CDI.KEYID = 6
1,173,331 UART: [idev] SUBJECT.KEYID = 7
1,173,756 UART: [idev] UDS.KEYID = 0
1,174,102 ready_for_fw is high
1,174,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,669 UART: [idev] Erasing UDS.KEYID = 0
1,199,073 UART: [idev] Sha1 KeyId Algorithm
1,208,067 UART: [idev] --
1,209,218 UART: [ldev] ++
1,209,386 UART: [ldev] CDI.KEYID = 6
1,209,750 UART: [ldev] SUBJECT.KEYID = 5
1,210,177 UART: [ldev] AUTHORITY.KEYID = 7
1,210,640 UART: [ldev] FE.KEYID = 1
1,215,760 UART: [ldev] Erasing FE.KEYID = 1
1,241,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,492 UART: [ldev] --
1,280,721 UART: [fwproc] Wait for Commands...
1,281,478 UART: [fwproc] Recv command 0x46574c44
1,282,211 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,635 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,810 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,103 >>> mbox cmd response: success
2,825,103 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,826,287 UART: [afmc] ++
2,826,455 UART: [afmc] CDI.KEYID = 6
2,826,818 UART: [afmc] SUBJECT.KEYID = 7
2,827,244 UART: [afmc] AUTHORITY.KEYID = 5
2,862,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,531 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,241 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,122 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,823 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,480 UART: [afmc] --
2,905,361 UART: [cold-reset] --
2,906,137 UART: [state] Locking Datavault
2,907,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,912 UART: [state] Locking ICCM
2,908,354 UART: [exit] Launching FMC @ 0x40000130
2,913,684 UART:
2,913,700 UART: Running Caliptra FMC ...
2,914,108 UART:
2,914,162 UART: [state] CFI Enabled
2,924,764 UART: [fht] FMC Alias Private Key: 7
3,043,682 UART: [art] Extend RT PCRs Done
3,044,110 UART: [art] Lock RT PCRs Done
3,045,344 UART: [art] Populate DV Done
3,053,595 UART: [fht] FMC Alias Private Key: 7
3,054,675 UART: [art] Derive CDI
3,054,955 UART: [art] Store in slot 0x4
3,140,708 UART: [art] Derive Key Pair
3,141,068 UART: [art] Store priv key in slot 0x5
3,154,448 UART: [art] Derive Key Pair - Done
3,169,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,651 UART: [art] PUB.X = 477D2A2178DC013BC58475366A351E7649B3F1FCE72207DFD22B8C760CC9F7DCA57069222216E13CD1DF6C231EEFE12A
3,192,420 UART: [art] PUB.Y = 723FF28987DACCC206B0430FC72164D6B0659C8D685EA41C1FFE4658BAD6892BE2E39594C226C3D54909DF889D007DBC
3,199,347 UART: [art] SIG.R = D1E19D3230B25F9498D20737E1D1F0BC929D50B17D74CD4467CF972DFF7135CF34872D2126459A69562DEE4A8E33A591
3,206,114 UART: [art] SIG.S = 5CD4D985C4A25EDAF31D72CB28FED124F805307DEF1731D8964FC731DD8FBA7E3BE1765AC531D9AB622C2AB18D02FE2B
3,229,954 UART: Caliptra RT
3,230,205 UART: [state] CFI Enabled
3,350,224 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,364,085 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,992 ready_for_fw is high
1,058,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,228 >>> mbox cmd response: success
2,678,228 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,740,257 UART:
2,740,273 UART: Running Caliptra FMC ...
2,740,681 UART:
2,740,735 UART: [state] CFI Enabled
2,751,113 UART: [fht] FMC Alias Private Key: 7
2,870,479 UART: [art] Extend RT PCRs Done
2,870,907 UART: [art] Lock RT PCRs Done
2,872,193 UART: [art] Populate DV Done
2,880,092 UART: [fht] FMC Alias Private Key: 7
2,881,126 UART: [art] Derive CDI
2,881,406 UART: [art] Store in slot 0x4
2,967,313 UART: [art] Derive Key Pair
2,967,673 UART: [art] Store priv key in slot 0x5
2,981,107 UART: [art] Derive Key Pair - Done
2,995,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,856 UART: [art] PUB.X = 09BE090CF369F0817B1FA53EB2C07D0BCB0FD70E7C95E04C8D5FE040168E1E1E3A0E7DE9625EA21E0FEBF354ABAE6163
3,018,624 UART: [art] PUB.Y = 68D04DE4A0D7AB3264D2532965AB8D6954762C687831503E47D3CCD131D60E02B16E3AD36F8623C1103F203B0FFE794C
3,025,565 UART: [art] SIG.R = 4FB1961E4D17BB5C35BDFDA3F5713FA6480A141C47F473889291836844016F606AAF9C7B137B627A380FB481CCEE7F20
3,032,330 UART: [art] SIG.S = D454ADBD963D113A96821529CDA1F39690574802803221AD8D592866CAAF3F24F711E2EA9568D349AADA79800ECED17F
3,056,658 UART: Caliptra RT
3,056,909 UART: [state] CFI Enabled
3,177,110 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,191,237 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
891,377 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
899,741 UART: [kat] SHA2-256
901,681 UART: [kat] SHA2-384
904,458 UART: [kat] SHA2-512-ACC
906,359 UART: [kat] ECC-384
916,130 UART: [kat] HMAC-384Kdf
920,656 UART: [kat] LMS
1,168,968 UART: [kat] --
1,169,987 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,173,161 UART: [idev] ++
1,173,329 UART: [idev] CDI.KEYID = 6
1,173,690 UART: [idev] SUBJECT.KEYID = 7
1,174,115 UART: [idev] UDS.KEYID = 0
1,174,461 ready_for_fw is high
1,174,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,904 UART: [idev] Erasing UDS.KEYID = 0
1,198,626 UART: [idev] Sha1 KeyId Algorithm
1,207,582 UART: [idev] --
1,208,625 UART: [ldev] ++
1,208,793 UART: [ldev] CDI.KEYID = 6
1,209,157 UART: [ldev] SUBJECT.KEYID = 5
1,209,584 UART: [ldev] AUTHORITY.KEYID = 7
1,210,047 UART: [ldev] FE.KEYID = 1
1,215,165 UART: [ldev] Erasing FE.KEYID = 1
1,241,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,553 UART: [ldev] --
1,280,922 UART: [fwproc] Wait for Commands...
1,281,733 UART: [fwproc] Recv command 0x46574c44
1,282,466 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,228 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,403 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,678 >>> mbox cmd response: success
2,825,678 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,826,752 UART: [afmc] ++
2,826,920 UART: [afmc] CDI.KEYID = 6
2,827,283 UART: [afmc] SUBJECT.KEYID = 7
2,827,709 UART: [afmc] AUTHORITY.KEYID = 5
2,863,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,212 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,922 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,803 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,504 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,303 UART: [afmc] --
2,906,282 UART: [cold-reset] --
2,907,006 UART: [state] Locking Datavault
2,908,301 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,905 UART: [state] Locking ICCM
2,909,355 UART: [exit] Launching FMC @ 0x40000130
2,914,685 UART:
2,914,701 UART: Running Caliptra FMC ...
2,915,109 UART:
2,915,252 UART: [state] CFI Enabled
2,925,698 UART: [fht] FMC Alias Private Key: 7
3,044,710 UART: [art] Extend RT PCRs Done
3,045,138 UART: [art] Lock RT PCRs Done
3,046,694 UART: [art] Populate DV Done
3,054,839 UART: [fht] FMC Alias Private Key: 7
3,055,867 UART: [art] Derive CDI
3,056,147 UART: [art] Store in slot 0x4
3,142,634 UART: [art] Derive Key Pair
3,142,994 UART: [art] Store priv key in slot 0x5
3,156,688 UART: [art] Derive Key Pair - Done
3,171,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,132 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,897 UART: [art] PUB.X = B43A586285B96841D94DDB6FB5B58FBFBE6C994CE420D94D1A3C5A462848A22ACCA5F7C52601F30D1A9A46125DCF7891
3,194,673 UART: [art] PUB.Y = 4B9AE536EF977708821E2E9D686D155E3F712378EF8FF8019D1DC085A8B836CFF228A20CC2AA527D120DD41DFFFD36FF
3,201,625 UART: [art] SIG.R = 89A5360D6C63DC63E4706A288901B6EE0080957AACAB15014B0164DBF81424868259DC46C819023BCBA3DE780A8C02B8
3,208,352 UART: [art] SIG.S = 50BB3A38613EF7BECB27FE3F363C8BD895C7C99D51509930F70684B05A7F83F84BB8E764BDB8ABA1059296873344C7B0
3,231,938 UART: Caliptra RT
3,232,281 UART: [state] CFI Enabled
3,352,340 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,366,033 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,685 ready_for_fw is high
1,059,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,645 >>> mbox cmd response: success
2,679,645 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,742,196 UART:
2,742,212 UART: Running Caliptra FMC ...
2,742,620 UART:
2,742,763 UART: [state] CFI Enabled
2,753,561 UART: [fht] FMC Alias Private Key: 7
2,872,789 UART: [art] Extend RT PCRs Done
2,873,217 UART: [art] Lock RT PCRs Done
2,874,895 UART: [art] Populate DV Done
2,882,910 UART: [fht] FMC Alias Private Key: 7
2,883,974 UART: [art] Derive CDI
2,884,254 UART: [art] Store in slot 0x4
2,970,045 UART: [art] Derive Key Pair
2,970,405 UART: [art] Store priv key in slot 0x5
2,983,891 UART: [art] Derive Key Pair - Done
2,999,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,892 UART: [art] PUB.X = 38B4157A89765F47318B30D8EA1B1C8D3F764982736956444C81CF42F7DB0795559B551E69FAC27D3EC102DE758E6E4E
3,022,654 UART: [art] PUB.Y = 8CF27CB237B999AF80AD361C0FFDDDD86667F26534F3303A21F13865526C3800A8142323D24EE7FEF554CE60C7950D10
3,029,578 UART: [art] SIG.R = C59CBCF544A66263EEC46FFF54B701571F6C5B60197F6ACDAE675C091385E5C04CF056F06CEDCB432789732E08F79562
3,036,347 UART: [art] SIG.S = B788F0D50CFB32200E465437B88F6B6DC6E931D0CB547ADCCF927842B016F1AFE16988CAF2DAF54192C5E75CA4182320
3,059,751 UART: Caliptra RT
3,060,094 UART: [state] CFI Enabled
3,180,050 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,194,165 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,687 UART: [kat] SHA2-256
903,627 UART: [kat] SHA2-384
906,488 UART: [kat] SHA2-512-ACC
908,389 UART: [kat] ECC-384
917,808 UART: [kat] HMAC-384Kdf
922,442 UART: [kat] LMS
1,170,770 UART: [kat] --
1,171,635 UART: [cold-reset] ++
1,172,215 UART: [fht] FHT @ 0x50003400
1,174,858 UART: [idev] ++
1,175,026 UART: [idev] CDI.KEYID = 6
1,175,386 UART: [idev] SUBJECT.KEYID = 7
1,175,810 UART: [idev] UDS.KEYID = 0
1,176,155 ready_for_fw is high
1,176,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,902 UART: [idev] Erasing UDS.KEYID = 0
1,201,001 UART: [idev] Sha1 KeyId Algorithm
1,209,471 UART: [idev] --
1,210,559 UART: [ldev] ++
1,210,727 UART: [ldev] CDI.KEYID = 6
1,211,090 UART: [ldev] SUBJECT.KEYID = 5
1,211,516 UART: [ldev] AUTHORITY.KEYID = 7
1,211,979 UART: [ldev] FE.KEYID = 1
1,217,169 UART: [ldev] Erasing FE.KEYID = 1
1,243,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,407 UART: [ldev] --
1,282,862 UART: [fwproc] Wait for Commands...
1,283,582 UART: [fwproc] Recv command 0x46574c44
1,284,310 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,424 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,594 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,945 >>> mbox cmd response: success
2,827,945 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,829,067 UART: [afmc] ++
2,829,235 UART: [afmc] CDI.KEYID = 6
2,829,597 UART: [afmc] SUBJECT.KEYID = 7
2,830,022 UART: [afmc] AUTHORITY.KEYID = 5
2,864,735 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,892 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,601 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,484 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,185 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,983 UART: [afmc] --
2,907,909 UART: [cold-reset] --
2,908,859 UART: [state] Locking Datavault
2,909,982 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,586 UART: [state] Locking ICCM
2,911,130 UART: [exit] Launching FMC @ 0x40000130
2,916,460 UART:
2,916,476 UART: Running Caliptra FMC ...
2,916,884 UART:
2,916,938 UART: [state] CFI Enabled
2,927,426 UART: [fht] FMC Alias Private Key: 7
3,046,192 UART: [art] Extend RT PCRs Done
3,046,620 UART: [art] Lock RT PCRs Done
3,048,098 UART: [art] Populate DV Done
3,056,359 UART: [fht] FMC Alias Private Key: 7
3,057,407 UART: [art] Derive CDI
3,057,687 UART: [art] Store in slot 0x4
3,143,370 UART: [art] Derive Key Pair
3,143,730 UART: [art] Store priv key in slot 0x5
3,157,308 UART: [art] Derive Key Pair - Done
3,172,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,468 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,233 UART: [art] PUB.X = 01367653729F17E7A5BC701F900AF12E350C99A4FF2F1C80B8E41BD1B1248293D2B9982DF28E7EB161C2844698076E35
3,194,987 UART: [art] PUB.Y = 227B9627A789324BEFA546379A94D0C16BEBBDD93875DB4742B0EFC819E117B32DBD93028972F4DB0D392D19C240DD46
3,201,937 UART: [art] SIG.R = 840E213D07690C244C3BAED260214F8B61CEF550F60CC4FBB6A89DD229BADB47CF554CE1C2E5F634287B8F34DC01E188
3,208,706 UART: [art] SIG.S = C867ED0AC2B34E3B24A152FF68E28CFDCD7E8C5B7149A23C4BEF25A4326F6181D509707332DF623833493DECDDA05DDF
3,232,878 UART: Caliptra RT
3,233,129 UART: [state] CFI Enabled
3,352,167 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,366,242 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,643 ready_for_fw is high
1,060,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,820 >>> mbox cmd response: success
2,678,820 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,740,267 UART:
2,740,283 UART: Running Caliptra FMC ...
2,740,691 UART:
2,740,745 UART: [state] CFI Enabled
2,751,219 UART: [fht] FMC Alias Private Key: 7
2,870,637 UART: [art] Extend RT PCRs Done
2,871,065 UART: [art] Lock RT PCRs Done
2,872,557 UART: [art] Populate DV Done
2,880,608 UART: [fht] FMC Alias Private Key: 7
2,881,736 UART: [art] Derive CDI
2,882,016 UART: [art] Store in slot 0x4
2,967,423 UART: [art] Derive Key Pair
2,967,783 UART: [art] Store priv key in slot 0x5
2,981,113 UART: [art] Derive Key Pair - Done
2,995,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,300 UART: [art] PUB.X = CB7A01E640FB59E781671FDAFB9B08D4A0E77534DC692E14D9B7096DEAAD4486C301290A33BA4D52BA05736E23FC4AE0
3,019,066 UART: [art] PUB.Y = 825FCE4F29701D3D61E0976877EA546FFE415A52692DC0B23BAFBD0C6409E2FFB9A2C5D75D09A9B92FEE5B4EF3176D99
3,026,023 UART: [art] SIG.R = D382F827F1F784A5C6B2F934D6BB9607B3ADD11DB1BECA590D267189CDA05DDECB6430B8C37206C42B1724E801288065
3,032,789 UART: [art] SIG.S = AF766683B8307B79A9847ED1AC7C74B1E830B9D735F749149AEB93537E3FE885A9ECAC3B0B47BFD13BA067D7F03B77EF
3,055,986 UART: Caliptra RT
3,056,237 UART: [state] CFI Enabled
3,175,099 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,188,998 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [kat] SHA2-256
893,421 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,546 UART: [kat] ++
897,698 UART: [kat] sha1
901,792 UART: [kat] SHA2-256
903,732 UART: [kat] SHA2-384
906,517 UART: [kat] SHA2-512-ACC
908,418 UART: [kat] ECC-384
917,905 UART: [kat] HMAC-384Kdf
922,685 UART: [kat] LMS
1,171,013 UART: [kat] --
1,171,752 UART: [cold-reset] ++
1,172,206 UART: [fht] FHT @ 0x50003400
1,174,757 UART: [idev] ++
1,174,925 UART: [idev] CDI.KEYID = 6
1,175,285 UART: [idev] SUBJECT.KEYID = 7
1,175,709 UART: [idev] UDS.KEYID = 0
1,176,054 ready_for_fw is high
1,176,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,961 UART: [idev] Erasing UDS.KEYID = 0
1,201,494 UART: [idev] Sha1 KeyId Algorithm
1,209,962 UART: [idev] --
1,210,976 UART: [ldev] ++
1,211,144 UART: [ldev] CDI.KEYID = 6
1,211,507 UART: [ldev] SUBJECT.KEYID = 5
1,211,933 UART: [ldev] AUTHORITY.KEYID = 7
1,212,396 UART: [ldev] FE.KEYID = 1
1,217,622 UART: [ldev] Erasing FE.KEYID = 1
1,244,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,186 UART: [ldev] --
1,283,573 UART: [fwproc] Wait for Commands...
1,284,317 UART: [fwproc] Recv command 0x46574c44
1,285,045 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,651 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,821 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,082 >>> mbox cmd response: success
2,829,082 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,830,340 UART: [afmc] ++
2,830,508 UART: [afmc] CDI.KEYID = 6
2,830,870 UART: [afmc] SUBJECT.KEYID = 7
2,831,295 UART: [afmc] AUTHORITY.KEYID = 5
2,867,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,659 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,368 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,251 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,952 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,614 UART: [afmc] --
2,910,582 UART: [cold-reset] --
2,911,346 UART: [state] Locking Datavault
2,912,603 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,207 UART: [state] Locking ICCM
2,913,663 UART: [exit] Launching FMC @ 0x40000130
2,918,993 UART:
2,919,009 UART: Running Caliptra FMC ...
2,919,417 UART:
2,919,560 UART: [state] CFI Enabled
2,930,128 UART: [fht] FMC Alias Private Key: 7
3,048,682 UART: [art] Extend RT PCRs Done
3,049,110 UART: [art] Lock RT PCRs Done
3,050,668 UART: [art] Populate DV Done
3,058,615 UART: [fht] FMC Alias Private Key: 7
3,059,709 UART: [art] Derive CDI
3,059,989 UART: [art] Store in slot 0x4
3,145,840 UART: [art] Derive Key Pair
3,146,200 UART: [art] Store priv key in slot 0x5
3,159,280 UART: [art] Derive Key Pair - Done
3,174,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,851 UART: [art] PUB.X = B9B66A30B488F31989C8E168C0DC54B727A479F3FE758E5A1D435C08362CCD9155DC5753259F5697E623DCBF192D6713
3,197,618 UART: [art] PUB.Y = C1335C9DAE1B13D0EA02506966BF8FD3CF28EA937E1549CCFDF4655E1BEBEB21FC37788F1D0A946F2BAA60B987B060B9
3,204,582 UART: [art] SIG.R = D6EF28CCFC27EBC497367708E42CB3F524B5D224C1B3679F1B6AAC277FB9A47BB6D2A225EB03A6674057D2742181C8AD
3,211,358 UART: [art] SIG.S = 85C010C0432839EE5497E9BD9CB3FA359ADE948358D7755DA7F05B25F5D6153D39CE97E5FC05423D5685E524E82EA5ED
3,235,155 UART: Caliptra RT
3,235,498 UART: [state] CFI Enabled
3,355,352 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,369,185 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,722 ready_for_fw is high
1,060,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,073 >>> mbox cmd response: success
2,682,073 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,744,478 UART:
2,744,494 UART: Running Caliptra FMC ...
2,744,902 UART:
2,745,045 UART: [state] CFI Enabled
2,755,775 UART: [fht] FMC Alias Private Key: 7
2,875,155 UART: [art] Extend RT PCRs Done
2,875,583 UART: [art] Lock RT PCRs Done
2,877,287 UART: [art] Populate DV Done
2,885,824 UART: [fht] FMC Alias Private Key: 7
2,886,764 UART: [art] Derive CDI
2,887,044 UART: [art] Store in slot 0x4
2,972,701 UART: [art] Derive Key Pair
2,973,061 UART: [art] Store priv key in slot 0x5
2,986,029 UART: [art] Derive Key Pair - Done
3,001,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,109 UART: [art] PUB.X = A96E54ED056FEDABB306CD25C3DC7EDBC64E6B55FCF49A61D5884C582ED71E2B7D2ADF78E1F023868864BACEAC6B13FC
3,023,903 UART: [art] PUB.Y = BCE586C5EC79D7CA7ECDB8EBF0D86CD8069F1415651E64A6FFA3E284E9F08DF97CCDF38691A7C5690F3EC560CF09555D
3,030,866 UART: [art] SIG.R = 89C85BE129D71E5DB90D58D7B5A05C8EC3DA28D04150D4FE17B11D140A3B6FA1428CF5E74CBFCCF758AC38078385BEC1
3,037,645 UART: [art] SIG.S = 6AF2AE1BACBA8AC45BE0AB1918D508591F58FF9584DFF809677E0343BE0887C6A9F9EED64EF70CA0E4AD347DCB921520
3,061,920 UART: Caliptra RT
3,062,263 UART: [state] CFI Enabled
3,181,528 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,195,653 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,052 UART:
192,443 UART: Running Caliptra ROM ...
193,587 UART:
193,733 UART: [state] CFI Enabled
264,318 UART: [state] LifecycleState = Unprovisioned
266,229 UART: [state] DebugLocked = No
268,476 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,425 UART: [kat] SHA2-256
443,140 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,677 UART: [kat] ++
454,158 UART: [kat] sha1
465,817 UART: [kat] SHA2-256
468,467 UART: [kat] SHA2-384
474,169 UART: [kat] SHA2-512-ACC
476,538 UART: [kat] ECC-384
2,766,978 UART: [kat] HMAC-384Kdf
2,779,428 UART: [kat] LMS
3,969,684 UART: [kat] --
3,973,987 UART: [cold-reset] ++
3,976,139 UART: [fht] Storing FHT @ 0x50003400
3,986,839 UART: [idev] ++
3,987,410 UART: [idev] CDI.KEYID = 6
3,988,392 UART: [idev] SUBJECT.KEYID = 7
3,989,567 UART: [idev] UDS.KEYID = 0
3,990,562 ready_for_fw is high
3,990,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,835 UART: [idev] Erasing UDS.KEYID = 0
7,325,422 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,884 UART: [idev] --
7,351,622 UART: [ldev] ++
7,352,197 UART: [ldev] CDI.KEYID = 6
7,353,163 UART: [ldev] SUBJECT.KEYID = 5
7,354,323 UART: [ldev] AUTHORITY.KEYID = 7
7,355,633 UART: [ldev] FE.KEYID = 1
7,402,038 UART: [ldev] Erasing FE.KEYID = 1
10,736,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,186 UART: [ldev] --
13,117,799 UART: [fwproc] Waiting for Commands...
13,120,594 UART: [fwproc] Received command 0x46574c44
13,122,776 UART: [fwproc] Received Image of size 118548 bytes
17,227,687 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,804 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,377,983 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,689 >>> mbox cmd response: success
17,709,665 UART: [afmc] ++
17,710,310 UART: [afmc] CDI.KEYID = 6
17,711,231 UART: [afmc] SUBJECT.KEYID = 7
17,712,402 UART: [afmc] AUTHORITY.KEYID = 5
21,070,204 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,367,825 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,085 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,384,540 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,269 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,413,664 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,435,548 UART: [afmc] --
23,439,217 UART: [cold-reset] --
23,444,003 UART: [state] Locking Datavault
23,449,203 UART: [state] Locking PCR0, PCR1 and PCR31
23,450,966 UART: [state] Locking ICCM
23,452,363 UART: [exit] Launching FMC @ 0x40000130
23,460,756 UART:
23,461,010 UART: Running Caliptra FMC ...
23,462,126 UART:
23,462,290 UART: [state] CFI Enabled
23,528,940 UART: [fht] FMC Alias Private Key: 7
25,869,186 UART: [art] Extend RT PCRs Done
25,870,404 UART: [art] Lock RT PCRs Done
25,872,004 UART: [art] Populate DV Done
25,877,522 UART: [fht] FMC Alias Private Key: 7
25,879,203 UART: [art] Derive CDI
25,879,947 UART: [art] Store in slot 0x4
25,936,663 UART: [art] Derive Key Pair
25,937,659 UART: [art] Store priv key in slot 0x5
29,230,694 UART: [art] Derive Key Pair - Done
29,243,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,404 UART: [art] Erasing AUTHORITY.KEYID = 7
31,533,901 UART: [art] PUB.X = 895B1215C38D1C26C75A8AF91B4C6DDA0A3419B0DDEC526DFBE731D021C6076B36CA755846607F1EE535A55D5EA5226A
31,541,241 UART: [art] PUB.Y = DC80DE8C324A9C40C3936367629E85AAD247C45185307558256C025B80A7418354107E07DFF75C8B7FEE1907800B4672
31,548,444 UART: [art] SIG.R = 619ADD3C182A695B03CBE5E3AA7C8EB76C2ED4D76042358EEE61DBBE3DD8DEB216BF858DB3984541F7224BEE47B3DE6B
31,555,858 UART: [art] SIG.S = CF9D2C00B18BD91A4C0B41C277ED8A35B878048915E6836D0FFEA2AFC095615938FD8FE64A9D719FEF139F8C6DCE638D
32,861,147 UART: Caliptra RT
32,861,867 UART: [state] CFI Enabled
33,058,281 UART: [rt] RT listening for mailbox commands...
33,061,057 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,092,338 UART: [rt]cmd =0x53494756, len=196
34,384,454 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,808,118 ready_for_fw is high
3,808,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,972,839 >>> mbox cmd response: success
23,674,350 UART:
23,674,810 UART: Running Caliptra FMC ...
23,675,941 UART:
23,676,097 UART: [state] CFI Enabled
23,745,415 UART: [fht] FMC Alias Private Key: 7
26,085,716 UART: [art] Extend RT PCRs Done
26,086,947 UART: [art] Lock RT PCRs Done
26,088,713 UART: [art] Populate DV Done
26,094,032 UART: [fht] FMC Alias Private Key: 7
26,095,543 UART: [art] Derive CDI
26,096,309 UART: [art] Store in slot 0x4
26,153,849 UART: [art] Derive Key Pair
26,154,898 UART: [art] Store priv key in slot 0x5
29,447,826 UART: [art] Derive Key Pair - Done
29,460,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,802 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,323 UART: [art] PUB.X = 845345638AF4F593A4FE0EC26B57BFEE1A644407C915B3DBD00435A0719772EC06796BC638D0E12615C026A0C3384B14
31,758,598 UART: [art] PUB.Y = 9549C5AA921B580F6D6C6FFACCB1C97A302331E3BD7A0FCC75B4BDA9404D86E195E65D0BFABCB4CB1DCD4F3B72B65B13
31,765,873 UART: [art] SIG.R = F40FA03842A44902959DC2FABC50F3383C21C752DC637424347BDCAB4FB0095F17FFD92475B35F2B71643B95761F1667
31,773,278 UART: [art] SIG.S = F98DC0057216684999A1ABB78FEF6A2A411E0DDB868B7978CA35D0F2968AE6852D6CA19587122E48AF61698CE4CFBA60
33,078,548 UART: Caliptra RT
33,079,257 UART: [state] CFI Enabled
33,255,732 UART: [rt] RT listening for mailbox commands...
33,258,494 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,289,972 UART: [rt]cmd =0x53494756, len=196
34,581,729 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,415 UART:
192,773 UART: Running Caliptra ROM ...
193,963 UART:
603,458 UART: [state] CFI Enabled
620,766 UART: [state] LifecycleState = Unprovisioned
622,674 UART: [state] DebugLocked = No
624,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,626 UART: [kat] SHA2-256
799,392 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,931 UART: [kat] ++
810,376 UART: [kat] sha1
821,528 UART: [kat] SHA2-256
824,243 UART: [kat] SHA2-384
828,895 UART: [kat] SHA2-512-ACC
831,256 UART: [kat] ECC-384
3,117,100 UART: [kat] HMAC-384Kdf
3,128,839 UART: [kat] LMS
4,318,946 UART: [kat] --
4,324,440 UART: [cold-reset] ++
4,326,652 UART: [fht] Storing FHT @ 0x50003400
4,338,978 UART: [idev] ++
4,339,546 UART: [idev] CDI.KEYID = 6
4,340,575 UART: [idev] SUBJECT.KEYID = 7
4,341,740 UART: [idev] UDS.KEYID = 0
4,342,776 ready_for_fw is high
4,342,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,225 UART: [idev] Erasing UDS.KEYID = 0
7,630,777 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,998 UART: [idev] --
7,656,858 UART: [ldev] ++
7,657,465 UART: [ldev] CDI.KEYID = 6
7,658,349 UART: [ldev] SUBJECT.KEYID = 5
7,659,532 UART: [ldev] AUTHORITY.KEYID = 7
7,660,871 UART: [ldev] FE.KEYID = 1
7,672,839 UART: [ldev] Erasing FE.KEYID = 1
10,957,590 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,494 UART: [ldev] --
13,319,695 UART: [fwproc] Waiting for Commands...
13,321,400 UART: [fwproc] Received command 0x46574c44
13,323,586 UART: [fwproc] Received Image of size 118548 bytes
17,437,197 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,520,900 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,594,073 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,922,006 >>> mbox cmd response: success
17,926,505 UART: [afmc] ++
17,927,094 UART: [afmc] CDI.KEYID = 6
17,928,061 UART: [afmc] SUBJECT.KEYID = 7
17,929,269 UART: [afmc] AUTHORITY.KEYID = 5
21,239,394 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,535,521 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,537,767 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,552,215 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,566,911 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,581,350 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,602,308 UART: [afmc] --
23,606,654 UART: [cold-reset] --
23,611,488 UART: [state] Locking Datavault
23,616,153 UART: [state] Locking PCR0, PCR1 and PCR31
23,617,903 UART: [state] Locking ICCM
23,620,485 UART: [exit] Launching FMC @ 0x40000130
23,628,855 UART:
23,629,100 UART: Running Caliptra FMC ...
23,630,196 UART:
23,630,348 UART: [state] CFI Enabled
23,637,960 UART: [fht] FMC Alias Private Key: 7
25,977,898 UART: [art] Extend RT PCRs Done
25,979,133 UART: [art] Lock RT PCRs Done
25,980,597 UART: [art] Populate DV Done
25,986,114 UART: [fht] FMC Alias Private Key: 7
25,987,599 UART: [art] Derive CDI
25,988,356 UART: [art] Store in slot 0x4
26,031,105 UART: [art] Derive Key Pair
26,032,106 UART: [art] Store priv key in slot 0x5
29,273,595 UART: [art] Derive Key Pair - Done
29,286,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,566,247 UART: [art] Erasing AUTHORITY.KEYID = 7
31,567,751 UART: [art] PUB.X = 13C3EECC6AEB6249D254FC9E604C75137B2A1C18CA8DEF6B825654D266B99FDB9C41CC166261A1983553CFED74486FFF
31,575,001 UART: [art] PUB.Y = 1525FCACFC5D3E21928928ADD0C02AACA2247BD839B827EB99EABA8CA270038A0BF17B143AFE2F4C1072730CC892C12D
31,582,352 UART: [art] SIG.R = 093D51B97085621FF50A350CE73A5CE2142412D633C799A8E0071CFDD86BC456FD1687AE92D3D4F9E5D1A5FB492299B4
31,589,711 UART: [art] SIG.S = C510D05B01C087A7816F660E3DD56DF93F0C251F9276E690C9B61DB92C72C43F850BF9E0871F251C793A9444BF377DB1
32,894,707 UART: Caliptra RT
32,895,416 UART: [state] CFI Enabled
33,028,957 UART: [rt] RT listening for mailbox commands...
33,031,760 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,063,136 UART: [rt]cmd =0x53494756, len=196
34,354,940 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
4,130,857 ready_for_fw is high
4,131,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,707 >>> mbox cmd response: success
23,802,958 UART:
23,803,422 UART: Running Caliptra FMC ...
23,804,573 UART:
23,804,733 UART: [state] CFI Enabled
23,812,416 UART: [fht] FMC Alias Private Key: 7
26,152,827 UART: [art] Extend RT PCRs Done
26,154,073 UART: [art] Lock RT PCRs Done
26,155,640 UART: [art] Populate DV Done
26,161,072 UART: [fht] FMC Alias Private Key: 7
26,162,666 UART: [art] Derive CDI
26,163,396 UART: [art] Store in slot 0x4
26,206,317 UART: [art] Derive Key Pair
26,207,388 UART: [art] Store priv key in slot 0x5
29,449,958 UART: [art] Derive Key Pair - Done
29,462,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,383 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,897 UART: [art] PUB.X = D2427C2B5DF04BD79221575FEDAACC234EEAABFD6C44B6E0035552F8C9F2CE9359C7C5B17215C1BBB42D3BC04A346974
31,752,141 UART: [art] PUB.Y = 6A6520E3437A61CA1C39C52414EC0DDB89D4ADD3A91F4ACBC172535312770EC05E6581E6F015580A7D975A7A55AF4E83
31,759,405 UART: [art] SIG.R = 955958257983FDB878CCF1680A7A3818C0F196C47B1DE35B34095EB73BE77FE3BB4315FD99212357E6BBFD963C1825A8
31,766,808 UART: [art] SIG.S = 26BBB666478521069EE4973B2073AD38AF4AB3932551564A42A8CC9C3EC872932981C35ED7CCD7BA47743208562E2EC7
33,071,987 UART: Caliptra RT
33,072,728 UART: [state] CFI Enabled
33,206,831 UART: [rt] RT listening for mailbox commands...
33,209,683 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,241,398 UART: [rt]cmd =0x53494756, len=196
34,532,833 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
191,996 UART:
192,353 UART: Running Caliptra ROM ...
193,553 UART:
193,705 UART: [state] CFI Enabled
267,511 UART: [state] LifecycleState = Unprovisioned
269,512 UART: [state] DebugLocked = No
271,321 UART: [state] WD Timer not started. Device not locked for debugging
274,810 UART: [kat] SHA2-256
454,490 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,245 UART: [kat] ++
465,694 UART: [kat] sha1
476,354 UART: [kat] SHA2-256
479,079 UART: [kat] SHA2-384
486,354 UART: [kat] SHA2-512-ACC
488,714 UART: [kat] ECC-384
2,950,365 UART: [kat] HMAC-384Kdf
2,973,685 UART: [kat] LMS
3,450,237 UART: [kat] --
3,454,156 UART: [cold-reset] ++
3,456,655 UART: [fht] FHT @ 0x50003400
3,468,336 UART: [idev] ++
3,468,906 UART: [idev] CDI.KEYID = 6
3,469,902 UART: [idev] SUBJECT.KEYID = 7
3,471,143 UART: [idev] UDS.KEYID = 0
3,472,062 ready_for_fw is high
3,472,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,959 UART: [idev] Erasing UDS.KEYID = 0
5,991,765 UART: [idev] Sha1 KeyId Algorithm
6,015,588 UART: [idev] --
6,019,321 UART: [ldev] ++
6,019,886 UART: [ldev] CDI.KEYID = 6
6,020,822 UART: [ldev] SUBJECT.KEYID = 5
6,022,031 UART: [ldev] AUTHORITY.KEYID = 7
6,023,265 UART: [ldev] FE.KEYID = 1
6,063,493 UART: [ldev] Erasing FE.KEYID = 1
8,570,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,776 UART: [ldev] --
10,377,591 UART: [fwproc] Wait for Commands...
10,379,307 UART: [fwproc] Recv command 0x46574c44
10,381,347 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,788 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,025,846 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,353,392 >>> mbox cmd response: success
14,356,774 UART: [afmc] ++
14,357,388 UART: [afmc] CDI.KEYID = 6
14,358,363 UART: [afmc] SUBJECT.KEYID = 7
14,359,523 UART: [afmc] AUTHORITY.KEYID = 5
16,900,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,642,359 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,644,507 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,660,348 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,676,396 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,691,971 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,715,514 UART: [afmc] --
18,718,571 UART: [cold-reset] --
18,721,506 UART: [state] Locking Datavault
18,725,506 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,252 UART: [state] Locking ICCM
18,729,160 UART: [exit] Launching FMC @ 0x40000130
18,737,545 UART:
18,737,783 UART: Running Caliptra FMC ...
18,738,880 UART:
18,739,035 UART: [state] CFI Enabled
18,799,721 UART: [fht] FMC Alias Private Key: 7
20,587,025 UART: [art] Extend RT PCRs Done
20,588,265 UART: [art] Lock RT PCRs Done
20,589,646 UART: [art] Populate DV Done
20,595,056 UART: [fht] FMC Alias Private Key: 7
20,596,697 UART: [art] Derive CDI
20,597,509 UART: [art] Store in slot 0x4
20,653,683 UART: [art] Derive Key Pair
20,654,724 UART: [art] Store priv key in slot 0x5
23,117,394 UART: [art] Derive Key Pair - Done
23,130,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,842,734 UART: [art] Erasing AUTHORITY.KEYID = 7
24,844,236 UART: [art] PUB.X = DFEC13D1C5B3A81CFAFB75326954475D40C6E01952035041A04693B222E1A184AE748228D3C4E49E6D261A37A281E6C7
24,851,570 UART: [art] PUB.Y = 38C1A55799AD862A05A76AB9217D30EC32CC65BC1318220264B7E804D3AE8F7EBEC70E5833FB0074640802A3848DF8F1
24,858,773 UART: [art] SIG.R = 90B233D1298499CB1DB640C63C01A234614B9AC5E00F766EB37D877BD55EE34C1A19EDA97B3DFFE60FD7547B098A8949
24,866,164 UART: [art] SIG.S = C40890A2A46B21B74A5B6E2AEB030BF00C89E976272F0B0A8F2723F2F8B250F145824DA200962754D04E18AE6980C820
25,845,506 UART: Caliptra RT
25,846,191 UART: [state] CFI Enabled
26,025,693 UART: [rt] RT listening for mailbox commands...
26,028,448 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,059,830 UART: [rt]cmd =0x53494756, len=196
27,025,296 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,453,035 ready_for_fw is high
3,453,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,639 >>> mbox cmd response: success
18,528,555 UART:
18,528,950 UART: Running Caliptra FMC ...
18,530,063 UART:
18,530,216 UART: [state] CFI Enabled
18,596,365 UART: [fht] FMC Alias Private Key: 7
20,362,289 UART: [art] Extend RT PCRs Done
20,363,513 UART: [art] Lock RT PCRs Done
20,365,151 UART: [art] Populate DV Done
20,370,747 UART: [fht] FMC Alias Private Key: 7
20,372,427 UART: [art] Derive CDI
20,373,163 UART: [art] Store in slot 0x4
20,428,916 UART: [art] Derive Key Pair
20,429,914 UART: [art] Store priv key in slot 0x5
22,892,533 UART: [art] Derive Key Pair - Done
22,905,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,619,058 UART: [art] Erasing AUTHORITY.KEYID = 7
24,620,571 UART: [art] PUB.X = 465AD4C095CB687C218E00A60E688A911533E86CE4CB943F5364285A945EAD8BEFA642A0098E46611BA1CF9E01085CB2
24,627,768 UART: [art] PUB.Y = 83C409E27F13CE83834C359E8C33CF3FD1FE38129ACD1F9597416EB889EF527DC0D9C6E94A13CB35464E4C70AA4886CC
24,635,063 UART: [art] SIG.R = 4A383BCE616537FCE6772925C5F2112ED6586B0AE595BD40CFEA434637B4E47D4300EB30022795EFC3B910B03A017E6E
24,642,404 UART: [art] SIG.S = D296CB7A0B34600A7D25076E1736CC6C68EB93A4644255D8722FD26093D6A00A6BC0CB75363FBE47CEE6070B88517064
25,621,198 UART: Caliptra RT
25,621,902 UART: [state] CFI Enabled
25,803,210 UART: [rt] RT listening for mailbox commands...
25,805,934 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,837,873 UART: [rt]cmd =0x53494756, len=196
26,803,318 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,557 UART:
192,939 UART: Running Caliptra ROM ...
194,068 UART:
603,700 UART: [state] CFI Enabled
617,873 UART: [state] LifecycleState = Unprovisioned
619,817 UART: [state] DebugLocked = No
622,622 UART: [state] WD Timer not started. Device not locked for debugging
627,086 UART: [kat] SHA2-256
806,738 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,542 UART: [kat] ++
818,026 UART: [kat] sha1
829,261 UART: [kat] SHA2-256
831,985 UART: [kat] SHA2-384
839,182 UART: [kat] SHA2-512-ACC
841,574 UART: [kat] ECC-384
3,285,576 UART: [kat] HMAC-384Kdf
3,297,756 UART: [kat] LMS
3,774,250 UART: [kat] --
3,777,331 UART: [cold-reset] ++
3,778,225 UART: [fht] FHT @ 0x50003400
3,790,121 UART: [idev] ++
3,790,688 UART: [idev] CDI.KEYID = 6
3,791,641 UART: [idev] SUBJECT.KEYID = 7
3,792,891 UART: [idev] UDS.KEYID = 0
3,793,867 ready_for_fw is high
3,794,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,922 UART: [idev] Erasing UDS.KEYID = 0
6,268,875 UART: [idev] Sha1 KeyId Algorithm
6,292,865 UART: [idev] --
6,298,050 UART: [ldev] ++
6,298,655 UART: [ldev] CDI.KEYID = 6
6,299,570 UART: [ldev] SUBJECT.KEYID = 5
6,300,733 UART: [ldev] AUTHORITY.KEYID = 7
6,302,024 UART: [ldev] FE.KEYID = 1
6,314,516 UART: [ldev] Erasing FE.KEYID = 1
8,795,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,697 UART: [ldev] --
10,588,649 UART: [fwproc] Wait for Commands...
10,590,959 UART: [fwproc] Recv command 0x46574c44
10,592,942 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,723 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,705 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,628 >>> mbox cmd response: success
14,563,114 UART: [afmc] ++
14,563,724 UART: [afmc] CDI.KEYID = 6
14,564,612 UART: [afmc] SUBJECT.KEYID = 7
14,565,885 UART: [afmc] AUTHORITY.KEYID = 5
17,070,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,737 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,560 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,610 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,204 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,549 UART: [afmc] --
18,870,091 UART: [cold-reset] --
18,874,120 UART: [state] Locking Datavault
18,878,879 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,651 UART: [state] Locking ICCM
18,882,693 UART: [exit] Launching FMC @ 0x40000130
18,891,094 UART:
18,891,348 UART: Running Caliptra FMC ...
18,892,399 UART:
18,892,552 UART: [state] CFI Enabled
18,901,148 UART: [fht] FMC Alias Private Key: 7
20,667,898 UART: [art] Extend RT PCRs Done
20,669,120 UART: [art] Lock RT PCRs Done
20,670,910 UART: [art] Populate DV Done
20,676,325 UART: [fht] FMC Alias Private Key: 7
20,677,864 UART: [art] Derive CDI
20,678,684 UART: [art] Store in slot 0x4
20,721,337 UART: [art] Derive Key Pair
20,722,339 UART: [art] Store priv key in slot 0x5
23,149,726 UART: [art] Derive Key Pair - Done
23,162,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,197 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,700 UART: [art] PUB.X = 3E0DDE064EB09371D26D87D197D16F252FD6BF050B747AE9759FD93C7E5F2FD72687648E0FD94DB52145284D2769C229
24,877,995 UART: [art] PUB.Y = 22DDF3EE8106E7C826CA5E59897F22E88231F48B8CF92C4FD0DDAA0D76B5261B83F76964D3A5CAFC404E7CBC3172EA3E
24,885,284 UART: [art] SIG.R = 207AD8460692E2E319B0C66A12EE9F40818E08164D19FFACAD1D6DE4B73559170FC8035BEBFF51A8D023F7D19169E87D
24,892,675 UART: [art] SIG.S = 0F71C2D486E3F14EB17800E21032F231BE8026811C13731C99033221D2478D077C5FA3F14CA284391669DD5B74E3B5DC
25,871,015 UART: Caliptra RT
25,871,711 UART: [state] CFI Enabled
26,005,311 UART: [rt] RT listening for mailbox commands...
26,008,074 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,039,779 UART: [rt]cmd =0x53494756, len=196
27,005,808 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,782,659 ready_for_fw is high
3,783,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,036 >>> mbox cmd response: success
18,693,553 UART:
18,693,931 UART: Running Caliptra FMC ...
18,695,138 UART:
18,695,309 UART: [state] CFI Enabled
18,703,513 UART: [fht] FMC Alias Private Key: 7
20,469,652 UART: [art] Extend RT PCRs Done
20,470,880 UART: [art] Lock RT PCRs Done
20,472,562 UART: [art] Populate DV Done
20,478,352 UART: [fht] FMC Alias Private Key: 7
20,479,999 UART: [art] Derive CDI
20,480,839 UART: [art] Store in slot 0x4
20,523,763 UART: [art] Derive Key Pair
20,524,801 UART: [art] Store priv key in slot 0x5
22,951,818 UART: [art] Derive Key Pair - Done
22,964,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,670,982 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,474 UART: [art] PUB.X = D8060CD9A4C77DBC6737CE31B320CEEB01014391395B84CC78CD40DA73FBD8A5393B05892A1651D84F791720BE7B7A80
24,679,803 UART: [art] PUB.Y = 55822B7EA48C7DC217EA24A144A5D90081F6E055B5B0CE846187D8C49F04636CD356E9AE1F114AE0690B24CE98D5A0B9
24,687,020 UART: [art] SIG.R = DA10772CACA950480F24E96C6997ED805004233A1659D9901B5941C0DD6C60A083B67864480B97F80726B97EFAE1ECE6
24,694,380 UART: [art] SIG.S = BA85F260E3395EEF419DF09BFBD473ABD166EC99F4A244627EFBCC8AE91E0AD5CB766785064ACDD67B55B595B26CA5D2
25,673,325 UART: Caliptra RT
25,674,033 UART: [state] CFI Enabled
25,807,039 UART: [rt] RT listening for mailbox commands...
25,809,753 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,841,377 UART: [rt]cmd =0x53494756, len=196
26,807,010 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,166 UART:
192,521 UART: Running Caliptra ROM ...
193,703 UART:
193,873 UART: [state] CFI Enabled
262,652 UART: [state] LifecycleState = Unprovisioned
265,084 UART: [state] DebugLocked = No
267,761 UART: [state] WD Timer not started. Device not locked for debugging
271,864 UART: [kat] SHA2-256
461,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,516 UART: [kat] ++
472,965 UART: [kat] sha1
484,756 UART: [kat] SHA2-256
487,828 UART: [kat] SHA2-384
492,616 UART: [kat] SHA2-512-ACC
495,197 UART: [kat] ECC-384
2,948,265 UART: [kat] HMAC-384Kdf
2,970,882 UART: [kat] LMS
3,502,668 UART: [kat] --
3,507,944 UART: [cold-reset] ++
3,510,425 UART: [fht] FHT @ 0x50003400
3,521,902 UART: [idev] ++
3,522,604 UART: [idev] CDI.KEYID = 6
3,523,554 UART: [idev] SUBJECT.KEYID = 7
3,524,720 UART: [idev] UDS.KEYID = 0
3,525,618 ready_for_fw is high
3,525,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,946 UART: [idev] Erasing UDS.KEYID = 0
6,029,092 UART: [idev] Sha1 KeyId Algorithm
6,051,685 UART: [idev] --
6,057,029 UART: [ldev] ++
6,057,713 UART: [ldev] CDI.KEYID = 6
6,058,639 UART: [ldev] SUBJECT.KEYID = 5
6,059,796 UART: [ldev] AUTHORITY.KEYID = 7
6,061,025 UART: [ldev] FE.KEYID = 1
6,098,252 UART: [ldev] Erasing FE.KEYID = 1
8,605,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,624 UART: [ldev] --
10,408,417 UART: [fwproc] Wait for Commands...
10,410,898 UART: [fwproc] Recv command 0x46574c44
10,413,151 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,980,540 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,104,202 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,665,002 >>> mbox cmd response: success
14,669,096 UART: [afmc] ++
14,669,825 UART: [afmc] CDI.KEYID = 6
14,671,019 UART: [afmc] SUBJECT.KEYID = 7
14,672,477 UART: [afmc] AUTHORITY.KEYID = 5
17,212,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,933,836 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,935,797 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,950,927 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,966,045 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,980,919 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,003,552 UART: [afmc] --
19,007,416 UART: [cold-reset] --
19,012,963 UART: [state] Locking Datavault
19,018,600 UART: [state] Locking PCR0, PCR1 and PCR31
19,020,749 UART: [state] Locking ICCM
19,023,280 UART: [exit] Launching FMC @ 0x40000130
19,031,905 UART:
19,032,166 UART: Running Caliptra FMC ...
19,033,220 UART:
19,033,394 UART: [state] CFI Enabled
19,091,703 UART: [fht] FMC Alias Private Key: 7
20,857,539 UART: [art] Extend RT PCRs Done
20,858,743 UART: [art] Lock RT PCRs Done
20,860,548 UART: [art] Populate DV Done
20,865,952 UART: [fht] FMC Alias Private Key: 7
20,867,521 UART: [art] Derive CDI
20,868,336 UART: [art] Store in slot 0x4
20,924,340 UART: [art] Derive Key Pair
20,925,334 UART: [art] Store priv key in slot 0x5
23,388,678 UART: [art] Derive Key Pair - Done
23,401,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,114,743 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,237 UART: [art] PUB.X = 90D66C6C6BE96BBBD7EA047B292B3519EBD3E8A91A7B7532C1D3F7D8B6CC73A2EBBA8922805AF85A8AA49849518F4F91
25,123,509 UART: [art] PUB.Y = 99DDDE7A3E0B29BCC0DF5DCCEDFA538FE8148701B08BB988D622C19992E926D7EBE16B61D88466F008C2143E342E74BD
25,130,775 UART: [art] SIG.R = E506D2D14188D98444C7DA025CDEEDAC24E39D6EA2FABD464515D5553AD485E4FF3ED80F37EED84991B20C1CD19667B9
25,138,218 UART: [art] SIG.S = 73CE32CD14FC12EB3CCBDF00474635B02D15AC1C99817379DC660954B8B3D666E67CAC6CA97211D8798B9F5283AB5C3A
26,117,327 UART: Caliptra RT
26,118,035 UART: [state] CFI Enabled
26,297,738 UART: [rt] RT listening for mailbox commands...
26,300,464 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,331,902 UART: [rt]cmd =0x53494756, len=196
27,297,501 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,438,336 ready_for_fw is high
3,438,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,361 >>> mbox cmd response: success
19,101,132 UART:
19,101,602 UART: Running Caliptra FMC ...
19,102,711 UART:
19,102,875 UART: [state] CFI Enabled
19,168,868 UART: [fht] FMC Alias Private Key: 7
20,935,429 UART: [art] Extend RT PCRs Done
20,936,656 UART: [art] Lock RT PCRs Done
20,938,235 UART: [art] Populate DV Done
20,943,653 UART: [fht] FMC Alias Private Key: 7
20,945,247 UART: [art] Derive CDI
20,946,060 UART: [art] Store in slot 0x4
21,001,810 UART: [art] Derive Key Pair
21,002,856 UART: [art] Store priv key in slot 0x5
23,465,606 UART: [art] Derive Key Pair - Done
23,478,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,191,671 UART: [art] Erasing AUTHORITY.KEYID = 7
25,193,179 UART: [art] PUB.X = 4D5676F745F91D5EF7BC83DBF40A3BFDB5CD23E30BC4644D1A2DB7ABF49BEDF4AC2E71525B92986EA5E6639B6BC05AA6
25,200,506 UART: [art] PUB.Y = 69A7683D00044EF864C777A45C0970C6DC18C92095BB297E287D763023CFAC09ECE2517B731380BBC1D736821C7A297B
25,207,726 UART: [art] SIG.R = 279497BCE2ADDF5354A9F02AFEC905EF87D7D4D3726C4BE3BFF7C5261CEA99E2DF9D82E3260764FB42239BF82000CD0F
25,215,097 UART: [art] SIG.S = 37635F7F6C5A0D44B0266CA26B27A00BD92AE1BF006C83145DD19699F05543BB4C7CD987D2B16E3AFF42F7E8B1B4E4AA
26,194,305 UART: Caliptra RT
26,195,021 UART: [state] CFI Enabled
26,375,123 UART: [rt] RT listening for mailbox commands...
26,377,900 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,409,552 UART: [rt]cmd =0x53494756, len=196
27,375,199 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,367 UART:
192,751 UART: Running Caliptra ROM ...
193,857 UART:
603,588 UART: [state] CFI Enabled
616,641 UART: [state] LifecycleState = Unprovisioned
619,029 UART: [state] DebugLocked = No
620,430 UART: [state] WD Timer not started. Device not locked for debugging
625,832 UART: [kat] SHA2-256
815,709 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,513 UART: [kat] ++
827,120 UART: [kat] sha1
838,931 UART: [kat] SHA2-256
841,949 UART: [kat] SHA2-384
848,724 UART: [kat] SHA2-512-ACC
851,307 UART: [kat] ECC-384
3,295,393 UART: [kat] HMAC-384Kdf
3,309,337 UART: [kat] LMS
3,841,166 UART: [kat] --
3,846,593 UART: [cold-reset] ++
3,848,483 UART: [fht] FHT @ 0x50003400
3,861,050 UART: [idev] ++
3,861,780 UART: [idev] CDI.KEYID = 6
3,862,816 UART: [idev] SUBJECT.KEYID = 7
3,863,918 UART: [idev] UDS.KEYID = 0
3,864,852 ready_for_fw is high
3,865,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,062 UART: [idev] Erasing UDS.KEYID = 0
6,338,387 UART: [idev] Sha1 KeyId Algorithm
6,360,651 UART: [idev] --
6,365,681 UART: [ldev] ++
6,366,418 UART: [ldev] CDI.KEYID = 6
6,367,335 UART: [ldev] SUBJECT.KEYID = 5
6,368,497 UART: [ldev] AUTHORITY.KEYID = 7
6,369,728 UART: [ldev] FE.KEYID = 1
6,382,863 UART: [ldev] Erasing FE.KEYID = 1
8,862,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,703 UART: [ldev] --
10,653,112 UART: [fwproc] Wait for Commands...
10,655,175 UART: [fwproc] Recv command 0x46574c44
10,657,491 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,371 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,988 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,255 >>> mbox cmd response: success
14,912,141 UART: [afmc] ++
14,912,854 UART: [afmc] CDI.KEYID = 6
14,914,055 UART: [afmc] SUBJECT.KEYID = 7
14,915,507 UART: [afmc] AUTHORITY.KEYID = 5
17,420,130 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,598 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,717 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,858 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,739 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,355 UART: [afmc] --
19,214,671 UART: [cold-reset] --
19,218,284 UART: [state] Locking Datavault
19,223,064 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,228 UART: [state] Locking ICCM
19,226,667 UART: [exit] Launching FMC @ 0x40000130
19,235,357 UART:
19,235,593 UART: Running Caliptra FMC ...
19,236,624 UART:
19,236,776 UART: [state] CFI Enabled
19,244,685 UART: [fht] FMC Alias Private Key: 7
21,011,162 UART: [art] Extend RT PCRs Done
21,012,386 UART: [art] Lock RT PCRs Done
21,013,827 UART: [art] Populate DV Done
21,019,080 UART: [fht] FMC Alias Private Key: 7
21,020,735 UART: [art] Derive CDI
21,021,559 UART: [art] Store in slot 0x4
21,063,985 UART: [art] Derive Key Pair
21,065,018 UART: [art] Store priv key in slot 0x5
23,492,177 UART: [art] Derive Key Pair - Done
23,505,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,989 UART: [art] Erasing AUTHORITY.KEYID = 7
25,213,494 UART: [art] PUB.X = DF464919084448DA5C5C62BA020BC4091B09E8402B7F163693E83345147D3C7C249989937CCDD35F6F5B6D5C0606A83C
25,220,762 UART: [art] PUB.Y = 2E396F25FA566E928B10A0D455AD9FAE347F23BBEA7FF6CDE8C3A020CF896C93207BD019D523C97E81045628D22C55D6
25,228,017 UART: [art] SIG.R = 90BB326E21E24DC3021237C01C77CBA36CFD09A395111413253EDCE31859178265B0CB251467E98B00EF235584597E7F
25,235,338 UART: [art] SIG.S = 6ED2DBC5E30985113AD3428C06FDE402EE6932ECD27F7CEE430B1C1D23EB583C113C4BD645F1A502CEDF9B6892F54EE8
26,214,520 UART: Caliptra RT
26,215,210 UART: [state] CFI Enabled
26,347,564 UART: [rt] RT listening for mailbox commands...
26,350,349 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,381,949 UART: [rt]cmd =0x53494756, len=196
27,347,392 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,755,333 ready_for_fw is high
3,755,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,418 >>> mbox cmd response: success
19,288,165 UART:
19,288,577 UART: Running Caliptra FMC ...
19,289,793 UART:
19,289,977 UART: [state] CFI Enabled
19,297,623 UART: [fht] FMC Alias Private Key: 7
21,064,093 UART: [art] Extend RT PCRs Done
21,065,330 UART: [art] Lock RT PCRs Done
21,066,803 UART: [art] Populate DV Done
21,072,236 UART: [fht] FMC Alias Private Key: 7
21,073,846 UART: [art] Derive CDI
21,074,692 UART: [art] Store in slot 0x4
21,117,786 UART: [art] Derive Key Pair
21,118,827 UART: [art] Store priv key in slot 0x5
23,545,738 UART: [art] Derive Key Pair - Done
23,558,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,265,486 UART: [art] Erasing AUTHORITY.KEYID = 7
25,266,995 UART: [art] PUB.X = 17C46B3CE1B903E9C1BF3C1D47223B31950F41E88EA7DFDCCE5E82C572502490C1028F368A2494F07DAB63AD1D70B94A
25,274,238 UART: [art] PUB.Y = 2DCD99E778C6B026927CDA934E06CE6F0FDE0E1B7C9B80C34E37DC8D94E575685EE8DD1AAF10A20CABF4CA980BE48A59
25,281,512 UART: [art] SIG.R = 68033BC6EBC78A7859EF75A66E79E7AC587542F3E59F69600CE1C5DA179DBCE10A856146A808C529DD804ED4C722517B
25,288,967 UART: [art] SIG.S = 9864DE9ADE452FB3E6E792508A5C9F1AE4C80FF020A151AA5B9733EB0F3D8FC1E492E326BF0E591259CFF83281B84063
26,268,096 UART: Caliptra RT
26,268,818 UART: [state] CFI Enabled
26,401,288 UART: [rt] RT listening for mailbox commands...
26,404,162 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,435,601 UART: [rt]cmd =0x53494756, len=196
27,401,021 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,343 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,053 UART: [kat] SHA2-256
881,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,099 UART: [kat] ++
886,251 UART: [kat] sha1
890,309 UART: [kat] SHA2-256
892,247 UART: [kat] SHA2-384
894,976 UART: [kat] SHA2-512-ACC
896,877 UART: [kat] ECC-384
902,638 UART: [kat] HMAC-384Kdf
907,242 UART: [kat] LMS
1,475,438 UART: [kat] --
1,476,295 UART: [cold-reset] ++
1,476,677 UART: [fht] Storing FHT @ 0x50003400
1,479,556 UART: [idev] ++
1,479,724 UART: [idev] CDI.KEYID = 6
1,480,084 UART: [idev] SUBJECT.KEYID = 7
1,480,508 UART: [idev] UDS.KEYID = 0
1,480,853 ready_for_fw is high
1,480,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,664 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,172 UART: [idev] --
1,514,281 UART: [ldev] ++
1,514,449 UART: [ldev] CDI.KEYID = 6
1,514,812 UART: [ldev] SUBJECT.KEYID = 5
1,515,238 UART: [ldev] AUTHORITY.KEYID = 7
1,515,701 UART: [ldev] FE.KEYID = 1
1,520,843 UART: [ldev] Erasing FE.KEYID = 1
1,546,776 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,594 UART: [ldev] --
1,585,881 UART: [fwproc] Waiting for Commands...
1,586,524 UART: [fwproc] Received command 0x46574c44
1,587,315 UART: [fwproc] Received Image of size 118548 bytes
2,932,137 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,621 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,839 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,094 >>> mbox cmd response: success
3,132,336 UART: [afmc] ++
3,132,504 UART: [afmc] CDI.KEYID = 6
3,132,866 UART: [afmc] SUBJECT.KEYID = 7
3,133,291 UART: [afmc] AUTHORITY.KEYID = 5
3,168,176 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,254 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,034 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,743 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,626 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,309 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,141 UART: [afmc] --
3,211,169 UART: [cold-reset] --
3,211,997 UART: [state] Locking Datavault
3,213,138 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,742 UART: [state] Locking ICCM
3,214,254 UART: [exit] Launching FMC @ 0x40000130
3,219,584 UART:
3,219,600 UART: Running Caliptra FMC ...
3,220,008 UART:
3,220,062 UART: [state] CFI Enabled
3,230,712 UART: [fht] FMC Alias Private Key: 7
3,350,136 UART: [art] Extend RT PCRs Done
3,350,564 UART: [art] Lock RT PCRs Done
3,352,234 UART: [art] Populate DV Done
3,360,417 UART: [fht] FMC Alias Private Key: 7
3,361,487 UART: [art] Derive CDI
3,361,767 UART: [art] Store in slot 0x4
3,447,699 UART: [art] Derive Key Pair
3,448,059 UART: [art] Store priv key in slot 0x5
3,461,062 UART: [art] Derive Key Pair - Done
3,475,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,227 UART: [art] PUB.X = A4F843C31B4DDD832C8A558B4D7594AD4A73D9C639DA16756EBBA0EB79533E4ACAC5390B7601D77BEC08FC7E9A300F5E
3,499,003 UART: [art] PUB.Y = 3FFBCBBD252F3CCCF3AD4E3749A1C1D1EF3DD4EEB2C89E1D1EB79EC5B4FACD758BA5497870B58672DC7B217FFACC149E
3,505,989 UART: [art] SIG.R = 57DE91A3ACA60F71217025D17E0A4256EEA4E980FFD1C7029E9E6C11B848E487BA04FC81A580CD47D81C515E2D7904D2
3,512,752 UART: [art] SIG.S = F0F92A76E0119070CB5BF00A59E8647A6E35F1B92E306A987C7A77E670AF6D29ACCE61FEF809EB8BA12F46D870FAD052
3,536,762 UART: Caliptra RT
3,537,013 UART: [state] CFI Enabled
3,657,257 UART: [rt] RT listening for mailbox commands...
3,657,927 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,767 UART: [rt]cmd =0x53494756, len=196
3,693,793 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,811 ready_for_fw is high
1,361,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,190 >>> mbox cmd response: success
3,040,457 UART:
3,040,473 UART: Running Caliptra FMC ...
3,040,881 UART:
3,040,935 UART: [state] CFI Enabled
3,051,479 UART: [fht] FMC Alias Private Key: 7
3,169,877 UART: [art] Extend RT PCRs Done
3,170,305 UART: [art] Lock RT PCRs Done
3,171,821 UART: [art] Populate DV Done
3,180,012 UART: [fht] FMC Alias Private Key: 7
3,181,036 UART: [art] Derive CDI
3,181,316 UART: [art] Store in slot 0x4
3,266,988 UART: [art] Derive Key Pair
3,267,348 UART: [art] Store priv key in slot 0x5
3,280,911 UART: [art] Derive Key Pair - Done
3,295,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,928 UART: [art] PUB.X = 14702C65E81FAE64E93EC34C3A1B459A9C1A8EDF2629796D0067C651240C34B1D4E7B8C8A269D16BFE6AF1DD4BC19F66
3,318,685 UART: [art] PUB.Y = EF94E36C190EF44EF7A1F04FA1270FAC27159AF3AC9AE6EF1A90381875F2B8473E279711A9D42D7F698529CCB3121981
3,325,635 UART: [art] SIG.R = 7FFDB84F2635D083AC416D9F9DE6F7B58E37F5B070D18DB22D0B61A642A38651B55BC709817C8C493741912716D43424
3,332,397 UART: [art] SIG.S = 9AA870FC729DD6BAB29A116A4D4CE4DF7D876C2D6B87823A3F8C732661CE895CBF7B98669D2FF3F050C4AA9C8D342332
3,355,771 UART: Caliptra RT
3,356,022 UART: [state] CFI Enabled
3,477,602 UART: [rt] RT listening for mailbox commands...
3,478,272 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,370 UART: [rt]cmd =0x53494756, len=196
3,515,084 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,156 UART: [kat] SHA2-256
882,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,202 UART: [kat] ++
886,354 UART: [kat] sha1
890,560 UART: [kat] SHA2-256
892,498 UART: [kat] SHA2-384
895,261 UART: [kat] SHA2-512-ACC
897,162 UART: [kat] ECC-384
902,847 UART: [kat] HMAC-384Kdf
907,555 UART: [kat] LMS
1,475,751 UART: [kat] --
1,476,576 UART: [cold-reset] ++
1,476,970 UART: [fht] Storing FHT @ 0x50003400
1,479,945 UART: [idev] ++
1,480,113 UART: [idev] CDI.KEYID = 6
1,480,473 UART: [idev] SUBJECT.KEYID = 7
1,480,897 UART: [idev] UDS.KEYID = 0
1,481,242 ready_for_fw is high
1,481,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,681 UART: [idev] Erasing UDS.KEYID = 0
1,505,451 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,959 UART: [idev] --
1,514,978 UART: [ldev] ++
1,515,146 UART: [ldev] CDI.KEYID = 6
1,515,509 UART: [ldev] SUBJECT.KEYID = 5
1,515,935 UART: [ldev] AUTHORITY.KEYID = 7
1,516,398 UART: [ldev] FE.KEYID = 1
1,521,814 UART: [ldev] Erasing FE.KEYID = 1
1,546,967 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,229 UART: [ldev] --
1,586,494 UART: [fwproc] Waiting for Commands...
1,587,173 UART: [fwproc] Received command 0x46574c44
1,587,964 UART: [fwproc] Received Image of size 118548 bytes
2,933,324 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,780 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,998 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,257 >>> mbox cmd response: success
3,133,407 UART: [afmc] ++
3,133,575 UART: [afmc] CDI.KEYID = 6
3,133,937 UART: [afmc] SUBJECT.KEYID = 7
3,134,362 UART: [afmc] AUTHORITY.KEYID = 5
3,169,691 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,927 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,707 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,416 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,299 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,982 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,916 UART: [afmc] --
3,212,976 UART: [cold-reset] --
3,213,862 UART: [state] Locking Datavault
3,215,033 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,637 UART: [state] Locking ICCM
3,216,283 UART: [exit] Launching FMC @ 0x40000130
3,221,613 UART:
3,221,629 UART: Running Caliptra FMC ...
3,222,037 UART:
3,222,180 UART: [state] CFI Enabled
3,232,742 UART: [fht] FMC Alias Private Key: 7
3,351,548 UART: [art] Extend RT PCRs Done
3,351,976 UART: [art] Lock RT PCRs Done
3,353,626 UART: [art] Populate DV Done
3,361,957 UART: [fht] FMC Alias Private Key: 7
3,362,997 UART: [art] Derive CDI
3,363,277 UART: [art] Store in slot 0x4
3,449,481 UART: [art] Derive Key Pair
3,449,841 UART: [art] Store priv key in slot 0x5
3,462,706 UART: [art] Derive Key Pair - Done
3,477,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,670 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,435 UART: [art] PUB.X = 690B741B2FC4FEF479BDF3D34F023DE0297E2FCD5DD1ABD2A71E36DFDAC5FA9A4FF0AC709D6EE6C7D71668029C44CCC3
3,500,226 UART: [art] PUB.Y = F711590ACAD53BF035A1E336382C2F093F01E67659A181FFD8822E263B0A28CE982EDCAB87AAD5E07D347A5798F67444
3,507,170 UART: [art] SIG.R = 6663970C0C86F468C9BD24492614D52CCDAB1896075AB8EA8CA1186D6830A7ABEDC5A9040EB2229865A8A790527B37B1
3,513,927 UART: [art] SIG.S = 5EAD3E67E09F0E064B368B6AF8349EBEFFC87050C4D0897BE6CCBBA0A4859ED8E8D11D1F4C178BD75F15AAADEDCA59B8
3,537,951 UART: Caliptra RT
3,538,294 UART: [state] CFI Enabled
3,658,331 UART: [rt] RT listening for mailbox commands...
3,659,001 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,147 UART: [rt]cmd =0x53494756, len=196
3,695,671 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,724 ready_for_fw is high
1,363,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,539 >>> mbox cmd response: success
3,044,074 UART:
3,044,090 UART: Running Caliptra FMC ...
3,044,498 UART:
3,044,641 UART: [state] CFI Enabled
3,055,313 UART: [fht] FMC Alias Private Key: 7
3,173,637 UART: [art] Extend RT PCRs Done
3,174,065 UART: [art] Lock RT PCRs Done
3,175,763 UART: [art] Populate DV Done
3,183,798 UART: [fht] FMC Alias Private Key: 7
3,184,978 UART: [art] Derive CDI
3,185,258 UART: [art] Store in slot 0x4
3,270,732 UART: [art] Derive Key Pair
3,271,092 UART: [art] Store priv key in slot 0x5
3,283,921 UART: [art] Derive Key Pair - Done
3,298,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,986 UART: [art] PUB.X = C63C3970C702406A0879947E387FA9C25A7694941983E50CD110D1C1FC1CF67BC6FB38C9010F30B36F9F645813B9BF4A
3,321,741 UART: [art] PUB.Y = 385C67D86E5513D77EA9AE8737983E7BCA1AC994E11A5269F6E8669B2618071EBD607879864C0086D26CD2F142F22FB9
3,328,664 UART: [art] SIG.R = A6CBAFEA2706499F6593370EEA8FBF4628C8B24B55CA34798A9D54549B8C9B73759DD54FBF622FE3F1A50DB518E2ECF9
3,335,441 UART: [art] SIG.S = CB35382B8C532E4A2E5CAFFFAC0081D4C48F7E67E6F4C8BFCFB9C66F431B10D04C18FADFB02BFBD9FABB54DBBA429E14
3,359,059 UART: Caliptra RT
3,359,402 UART: [state] CFI Enabled
3,479,437 UART: [rt] RT listening for mailbox commands...
3,480,107 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,085 UART: [rt]cmd =0x53494756, len=196
3,516,785 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,518 UART: [kat] SHA2-256
901,458 UART: [kat] SHA2-384
904,213 UART: [kat] SHA2-512-ACC
906,114 UART: [kat] ECC-384
916,149 UART: [kat] HMAC-384Kdf
920,755 UART: [kat] LMS
1,169,067 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,390 UART: [fht] FHT @ 0x50003400
1,173,042 UART: [idev] ++
1,173,210 UART: [idev] CDI.KEYID = 6
1,173,571 UART: [idev] SUBJECT.KEYID = 7
1,173,996 UART: [idev] UDS.KEYID = 0
1,174,342 ready_for_fw is high
1,174,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,969 UART: [idev] Erasing UDS.KEYID = 0
1,199,091 UART: [idev] Sha1 KeyId Algorithm
1,207,929 UART: [idev] --
1,208,842 UART: [ldev] ++
1,209,010 UART: [ldev] CDI.KEYID = 6
1,209,374 UART: [ldev] SUBJECT.KEYID = 5
1,209,801 UART: [ldev] AUTHORITY.KEYID = 7
1,210,264 UART: [ldev] FE.KEYID = 1
1,215,442 UART: [ldev] Erasing FE.KEYID = 1
1,241,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,312 UART: [ldev] --
1,280,537 UART: [fwproc] Wait for Commands...
1,281,234 UART: [fwproc] Recv command 0x46574c44
1,281,967 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,631 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,806 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,201 >>> mbox cmd response: success
2,827,291 UART: [afmc] ++
2,827,459 UART: [afmc] CDI.KEYID = 6
2,827,822 UART: [afmc] SUBJECT.KEYID = 7
2,828,248 UART: [afmc] AUTHORITY.KEYID = 5
2,863,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,719 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,429 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,310 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,011 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,742 UART: [afmc] --
2,906,763 UART: [cold-reset] --
2,907,677 UART: [state] Locking Datavault
2,908,568 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,172 UART: [state] Locking ICCM
2,909,832 UART: [exit] Launching FMC @ 0x40000130
2,915,162 UART:
2,915,178 UART: Running Caliptra FMC ...
2,915,586 UART:
2,915,640 UART: [state] CFI Enabled
2,926,420 UART: [fht] FMC Alias Private Key: 7
3,044,880 UART: [art] Extend RT PCRs Done
3,045,308 UART: [art] Lock RT PCRs Done
3,046,834 UART: [art] Populate DV Done
3,054,883 UART: [fht] FMC Alias Private Key: 7
3,055,815 UART: [art] Derive CDI
3,056,095 UART: [art] Store in slot 0x4
3,142,166 UART: [art] Derive Key Pair
3,142,526 UART: [art] Store priv key in slot 0x5
3,155,504 UART: [art] Derive Key Pair - Done
3,170,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,514 UART: [art] PUB.X = 4DDB1D89ECDB60137A8D2CA6B20F387A9DC644E4D6B8616AEA255A847AD094FDEE871B1D60D8A592D7C9F58FA1FFD676
3,193,303 UART: [art] PUB.Y = 7059AB288F505524952FC3202E7A00B2A57F1F904ECBBC21ACB71EAC659AF21A8FD8B8FEF7C25743C3F6E3B915800FC4
3,200,242 UART: [art] SIG.R = DF9C11216267A891D59C71C79D167681291EA54EE44A60BF59D50939CB35F60729252DBBAA1B328572963687973EFE34
3,207,000 UART: [art] SIG.S = 224E6EFDCFCA25A6295B4AEFE99EB04CF87C4299F7D3F1C7CDB8207F8B050720FDEDFD01B24858D18E303F2ACD48C3CD
3,230,935 UART: Caliptra RT
3,231,186 UART: [state] CFI Enabled
3,350,957 UART: [rt] RT listening for mailbox commands...
3,351,627 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,737 UART: [rt]cmd =0x53494756, len=196
3,387,955 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,978 ready_for_fw is high
1,058,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,386 >>> mbox cmd response: success
2,738,611 UART:
2,738,627 UART: Running Caliptra FMC ...
2,739,035 UART:
2,739,089 UART: [state] CFI Enabled
2,749,447 UART: [fht] FMC Alias Private Key: 7
2,868,905 UART: [art] Extend RT PCRs Done
2,869,333 UART: [art] Lock RT PCRs Done
2,870,531 UART: [art] Populate DV Done
2,878,694 UART: [fht] FMC Alias Private Key: 7
2,879,822 UART: [art] Derive CDI
2,880,102 UART: [art] Store in slot 0x4
2,965,895 UART: [art] Derive Key Pair
2,966,255 UART: [art] Store priv key in slot 0x5
2,979,593 UART: [art] Derive Key Pair - Done
2,994,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,213 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,978 UART: [art] PUB.X = 35D6B8A491A03E06B7B46CEF65B678CBA4B14CDEB70B858E2143CBE1CFB191DD0F762BD43750E12B38FB1AE3C9806A18
3,017,757 UART: [art] PUB.Y = 8B443C3A79B218A7463F843B49F8BF303235B525C5268C4B1C351192CCF65276389C4DE6C0109B9F3E9FFE65E468826F
3,024,705 UART: [art] SIG.R = 51C04AF48C5C7991B0C368124BC9F7AE0175D0156F6ED2D965BB949E82C61EAA2D5376C24784D99D2E33B026DF031A2A
3,031,475 UART: [art] SIG.S = 150AE07D059D6080426BEB91DF07665A5DFD22F5E2BDC097E0B9416D61A5CC15D9EC35298655AC8646FD97872BF00432
3,055,515 UART: Caliptra RT
3,055,766 UART: [state] CFI Enabled
3,175,834 UART: [rt] RT listening for mailbox commands...
3,176,504 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,598 UART: [rt]cmd =0x53494756, len=196
3,212,906 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,821 UART: [state] LifecycleState = Unprovisioned
85,476 UART: [state] DebugLocked = No
85,974 UART: [state] WD Timer not started. Device not locked for debugging
87,101 UART: [kat] SHA2-256
890,651 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,755 UART: [kat] ++
894,907 UART: [kat] sha1
899,217 UART: [kat] SHA2-256
901,157 UART: [kat] SHA2-384
903,870 UART: [kat] SHA2-512-ACC
905,771 UART: [kat] ECC-384
915,528 UART: [kat] HMAC-384Kdf
919,930 UART: [kat] LMS
1,168,242 UART: [kat] --
1,169,115 UART: [cold-reset] ++
1,169,557 UART: [fht] FHT @ 0x50003400
1,172,229 UART: [idev] ++
1,172,397 UART: [idev] CDI.KEYID = 6
1,172,758 UART: [idev] SUBJECT.KEYID = 7
1,173,183 UART: [idev] UDS.KEYID = 0
1,173,529 ready_for_fw is high
1,173,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,256 UART: [idev] Erasing UDS.KEYID = 0
1,198,262 UART: [idev] Sha1 KeyId Algorithm
1,207,128 UART: [idev] --
1,208,301 UART: [ldev] ++
1,208,469 UART: [ldev] CDI.KEYID = 6
1,208,833 UART: [ldev] SUBJECT.KEYID = 5
1,209,260 UART: [ldev] AUTHORITY.KEYID = 7
1,209,723 UART: [ldev] FE.KEYID = 1
1,214,923 UART: [ldev] Erasing FE.KEYID = 1
1,241,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,785 UART: [ldev] --
1,280,014 UART: [fwproc] Wait for Commands...
1,280,619 UART: [fwproc] Recv command 0x46574c44
1,281,352 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,038 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,213 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,394 >>> mbox cmd response: success
2,825,622 UART: [afmc] ++
2,825,790 UART: [afmc] CDI.KEYID = 6
2,826,153 UART: [afmc] SUBJECT.KEYID = 7
2,826,579 UART: [afmc] AUTHORITY.KEYID = 5
2,863,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,342 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,052 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,933 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,634 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,437 UART: [afmc] --
2,906,344 UART: [cold-reset] --
2,907,180 UART: [state] Locking Datavault
2,908,463 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,067 UART: [state] Locking ICCM
2,909,509 UART: [exit] Launching FMC @ 0x40000130
2,914,839 UART:
2,914,855 UART: Running Caliptra FMC ...
2,915,263 UART:
2,915,406 UART: [state] CFI Enabled
2,926,138 UART: [fht] FMC Alias Private Key: 7
3,045,712 UART: [art] Extend RT PCRs Done
3,046,140 UART: [art] Lock RT PCRs Done
3,047,398 UART: [art] Populate DV Done
3,055,703 UART: [fht] FMC Alias Private Key: 7
3,056,677 UART: [art] Derive CDI
3,056,957 UART: [art] Store in slot 0x4
3,142,722 UART: [art] Derive Key Pair
3,143,082 UART: [art] Store priv key in slot 0x5
3,156,488 UART: [art] Derive Key Pair - Done
3,171,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,458 UART: [art] PUB.X = B9CAE87FFCF3BA837A8523E1F84BFFCFD22E8F43AB104D5C844389AD89F7931C66E8D84F6D759E3CB05C5285039B28D0
3,194,241 UART: [art] PUB.Y = BF56FC3B618D93A4690EBA678EB80520C7B1FA0F36D3F47C28E3E4A49F36BB131A34BD22AC575ADC5009B2E93B4F5862
3,201,193 UART: [art] SIG.R = 9EA27284C120E21691F06E51399EB2FAA2A76F3E8AD208002C655071C306FB1F12E3CDDFB4F2CBFFA29B8069A8BF66C4
3,207,949 UART: [art] SIG.S = DE4719A2735FD5CC190362C382EB9ED0C635CF9362C471740C1479F60B38030BB235B9CE6A3D9C075C62DC9231B60ADE
3,231,718 UART: Caliptra RT
3,232,061 UART: [state] CFI Enabled
3,351,757 UART: [rt] RT listening for mailbox commands...
3,352,427 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,481 UART: [rt]cmd =0x53494756, len=196
3,388,951 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,175 ready_for_fw is high
1,060,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,523 >>> mbox cmd response: success
2,742,082 UART:
2,742,098 UART: Running Caliptra FMC ...
2,742,506 UART:
2,742,649 UART: [state] CFI Enabled
2,753,121 UART: [fht] FMC Alias Private Key: 7
2,872,727 UART: [art] Extend RT PCRs Done
2,873,155 UART: [art] Lock RT PCRs Done
2,874,847 UART: [art] Populate DV Done
2,883,068 UART: [fht] FMC Alias Private Key: 7
2,884,192 UART: [art] Derive CDI
2,884,472 UART: [art] Store in slot 0x4
2,970,137 UART: [art] Derive Key Pair
2,970,497 UART: [art] Store priv key in slot 0x5
2,984,343 UART: [art] Derive Key Pair - Done
2,999,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,871 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,636 UART: [art] PUB.X = 5CC4A3C23D9F05E67825CC63053926109340FF44B8CCC313ACC5E36E7A549B22A9A3B5CBC32C4E0D18D5357F03BB4096
3,022,402 UART: [art] PUB.Y = 2321264CCC66FD502330FBA86BD618CF491DB78BC130798ABA39A68A6F09083D656EB11297FAA09773C7819C00314C5E
3,029,326 UART: [art] SIG.R = BA5F525150AC378A1978C5068E9DAF764314F7D2F58F43FA93B0CF357722C2D5FEA7D2E63C26E8324BF7150B06FEAB5A
3,036,099 UART: [art] SIG.S = 6A37F0BB7CF33EA4C40AECB6A0734739ABC420D1E175D854D487E50245D1198EC9B2B9E9CEEF4649B64C8D0B65034104
3,060,020 UART: Caliptra RT
3,060,363 UART: [state] CFI Enabled
3,180,052 UART: [rt] RT listening for mailbox commands...
3,180,722 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,908 UART: [rt]cmd =0x53494756, len=196
3,217,560 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
893,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,545 UART: [kat] ++
897,697 UART: [kat] sha1
902,021 UART: [kat] SHA2-256
903,961 UART: [kat] SHA2-384
906,646 UART: [kat] SHA2-512-ACC
908,547 UART: [kat] ECC-384
918,550 UART: [kat] HMAC-384Kdf
923,076 UART: [kat] LMS
1,171,404 UART: [kat] --
1,172,463 UART: [cold-reset] ++
1,173,031 UART: [fht] FHT @ 0x50003400
1,175,742 UART: [idev] ++
1,175,910 UART: [idev] CDI.KEYID = 6
1,176,270 UART: [idev] SUBJECT.KEYID = 7
1,176,694 UART: [idev] UDS.KEYID = 0
1,177,039 ready_for_fw is high
1,177,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,524 UART: [idev] Erasing UDS.KEYID = 0
1,201,153 UART: [idev] Sha1 KeyId Algorithm
1,209,689 UART: [idev] --
1,210,679 UART: [ldev] ++
1,210,847 UART: [ldev] CDI.KEYID = 6
1,211,210 UART: [ldev] SUBJECT.KEYID = 5
1,211,636 UART: [ldev] AUTHORITY.KEYID = 7
1,212,099 UART: [ldev] FE.KEYID = 1
1,217,305 UART: [ldev] Erasing FE.KEYID = 1
1,243,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,673 UART: [ldev] --
1,282,176 UART: [fwproc] Wait for Commands...
1,282,928 UART: [fwproc] Recv command 0x46574c44
1,283,656 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,464 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,634 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,031 >>> mbox cmd response: success
2,828,147 UART: [afmc] ++
2,828,315 UART: [afmc] CDI.KEYID = 6
2,828,677 UART: [afmc] SUBJECT.KEYID = 7
2,829,102 UART: [afmc] AUTHORITY.KEYID = 5
2,864,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,752 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,461 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,344 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,045 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,995 UART: [afmc] --
2,907,955 UART: [cold-reset] --
2,908,807 UART: [state] Locking Datavault
2,909,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,534 UART: [state] Locking ICCM
2,911,198 UART: [exit] Launching FMC @ 0x40000130
2,916,528 UART:
2,916,544 UART: Running Caliptra FMC ...
2,916,952 UART:
2,917,006 UART: [state] CFI Enabled
2,927,418 UART: [fht] FMC Alias Private Key: 7
3,046,826 UART: [art] Extend RT PCRs Done
3,047,254 UART: [art] Lock RT PCRs Done
3,048,682 UART: [art] Populate DV Done
3,057,031 UART: [fht] FMC Alias Private Key: 7
3,058,149 UART: [art] Derive CDI
3,058,429 UART: [art] Store in slot 0x4
3,144,320 UART: [art] Derive Key Pair
3,144,680 UART: [art] Store priv key in slot 0x5
3,158,630 UART: [art] Derive Key Pair - Done
3,173,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,797 UART: [art] PUB.X = 311505F8AB1248660C523A2ECEFCEF9387166A4429326F1441551C85F7200A77B935C0F3E3C7DC1DF7E028AA75DA76BC
3,196,562 UART: [art] PUB.Y = 1BD54E0E6074EDA1AED6845E1DC98030A103E86E3488C019332A023B28185F946BF2EC83C5681F6648EA0865B4BF7DA3
3,203,504 UART: [art] SIG.R = 7317053812F04C4F7C8245791C25CAE741CA47FFAD2F9FF76F50233D66EA0A25A60D0F74030A7FDCA12192C287E4045D
3,210,257 UART: [art] SIG.S = DFB54702A25C59E025460BDDBE08F603179C1B087E890583AA82452C248FF337542CF01D96DAFD5620EDD5F738D1D8B4
3,234,249 UART: Caliptra RT
3,234,500 UART: [state] CFI Enabled
3,353,387 UART: [rt] RT listening for mailbox commands...
3,354,057 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,049 UART: [rt]cmd =0x53494756, len=196
3,390,561 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,431 ready_for_fw is high
1,059,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,996 >>> mbox cmd response: success
2,742,391 UART:
2,742,407 UART: Running Caliptra FMC ...
2,742,815 UART:
2,742,869 UART: [state] CFI Enabled
2,753,325 UART: [fht] FMC Alias Private Key: 7
2,872,685 UART: [art] Extend RT PCRs Done
2,873,113 UART: [art] Lock RT PCRs Done
2,874,447 UART: [art] Populate DV Done
2,882,968 UART: [fht] FMC Alias Private Key: 7
2,883,980 UART: [art] Derive CDI
2,884,260 UART: [art] Store in slot 0x4
2,969,807 UART: [art] Derive Key Pair
2,970,167 UART: [art] Store priv key in slot 0x5
2,983,311 UART: [art] Derive Key Pair - Done
2,998,096 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,611 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,376 UART: [art] PUB.X = C6084B2746D2B211D7EA6730602E986B88F6065D343CFBB94654163E925FF0A64D9E6170E1B70ADDEDEEE003E2AC4AB0
3,021,144 UART: [art] PUB.Y = C5A2758F403F859F9871CAD1B0F4132FBEE8544BBA38E18CB5CD6C53E61EE4FAF841820128E7AF4B57D2922134ECBEEA
3,028,109 UART: [art] SIG.R = 0B23392BB6CF2C919191D9F6933503CA9D94B051AA621C6E5B6C2ED95471078BE620B7089B96449ADE7A9DD73068C807
3,034,864 UART: [art] SIG.S = 9ECEEDCC8A20CA15D1C7623808C0B25D9BD13A04594D6DFF1160F2D24697514432191FA4F65A6768683227C93CAB8DCC
3,058,752 UART: Caliptra RT
3,059,003 UART: [state] CFI Enabled
3,177,660 UART: [rt] RT listening for mailbox commands...
3,178,330 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,280 UART: [rt]cmd =0x53494756, len=196
3,214,900 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,911 UART: [state] LifecycleState = Unprovisioned
86,566 UART: [state] DebugLocked = No
87,070 UART: [state] WD Timer not started. Device not locked for debugging
88,341 UART: [kat] SHA2-256
893,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,116 UART: [kat] ++
898,268 UART: [kat] sha1
902,394 UART: [kat] SHA2-256
904,334 UART: [kat] SHA2-384
906,861 UART: [kat] SHA2-512-ACC
908,762 UART: [kat] ECC-384
918,601 UART: [kat] HMAC-384Kdf
923,191 UART: [kat] LMS
1,171,519 UART: [kat] --
1,172,372 UART: [cold-reset] ++
1,172,904 UART: [fht] FHT @ 0x50003400
1,175,583 UART: [idev] ++
1,175,751 UART: [idev] CDI.KEYID = 6
1,176,111 UART: [idev] SUBJECT.KEYID = 7
1,176,535 UART: [idev] UDS.KEYID = 0
1,176,880 ready_for_fw is high
1,176,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,717 UART: [idev] Erasing UDS.KEYID = 0
1,201,964 UART: [idev] Sha1 KeyId Algorithm
1,210,600 UART: [idev] --
1,211,766 UART: [ldev] ++
1,211,934 UART: [ldev] CDI.KEYID = 6
1,212,297 UART: [ldev] SUBJECT.KEYID = 5
1,212,723 UART: [ldev] AUTHORITY.KEYID = 7
1,213,186 UART: [ldev] FE.KEYID = 1
1,218,284 UART: [ldev] Erasing FE.KEYID = 1
1,245,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,824 UART: [ldev] --
1,284,335 UART: [fwproc] Wait for Commands...
1,285,025 UART: [fwproc] Recv command 0x46574c44
1,285,753 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,931 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,101 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,400 >>> mbox cmd response: success
2,830,510 UART: [afmc] ++
2,830,678 UART: [afmc] CDI.KEYID = 6
2,831,040 UART: [afmc] SUBJECT.KEYID = 7
2,831,465 UART: [afmc] AUTHORITY.KEYID = 5
2,866,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,687 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,435 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,144 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,027 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,728 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,534 UART: [afmc] --
2,910,604 UART: [cold-reset] --
2,911,678 UART: [state] Locking Datavault
2,912,915 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,519 UART: [state] Locking ICCM
2,914,107 UART: [exit] Launching FMC @ 0x40000130
2,919,437 UART:
2,919,453 UART: Running Caliptra FMC ...
2,919,861 UART:
2,920,004 UART: [state] CFI Enabled
2,930,768 UART: [fht] FMC Alias Private Key: 7
3,050,408 UART: [art] Extend RT PCRs Done
3,050,836 UART: [art] Lock RT PCRs Done
3,052,464 UART: [art] Populate DV Done
3,060,713 UART: [fht] FMC Alias Private Key: 7
3,061,749 UART: [art] Derive CDI
3,062,029 UART: [art] Store in slot 0x4
3,147,806 UART: [art] Derive Key Pair
3,148,166 UART: [art] Store priv key in slot 0x5
3,161,460 UART: [art] Derive Key Pair - Done
3,175,974 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,926 UART: [art] PUB.X = 5E7D82DDCAB6ADDF698138697AF3BDE1B09C4D58F39916375C07468C5EC27E0A7650E61D51526DC3B532F90A8A807F9C
3,198,697 UART: [art] PUB.Y = 2D72F8E3048982AAFDFF370C0DFF876B7C8200EAFEE0668BEF0FDA1779C04EDF5C26EDAED6FDE7F0142F04B6C7A44AEC
3,205,642 UART: [art] SIG.R = 6BD0068D806B53DCE15C0F831D78BA713C67C00A2E5DE86B7BD06BD05AA09E495A8D09DA2812A047B02CF605A9982B73
3,212,407 UART: [art] SIG.S = 5ECE4F45006CD07E7E996BDD1B84F56DB21700ACC8EB59F2D2BE0E9EFD6A34346E63C00D325041C113B2D0F42AC51317
3,236,823 UART: Caliptra RT
3,237,166 UART: [state] CFI Enabled
3,357,004 UART: [rt] RT listening for mailbox commands...
3,357,674 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,714 UART: [rt]cmd =0x53494756, len=196
3,393,908 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,568 ready_for_fw is high
1,060,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,621 >>> mbox cmd response: success
2,740,972 UART:
2,740,988 UART: Running Caliptra FMC ...
2,741,396 UART:
2,741,539 UART: [state] CFI Enabled
2,752,141 UART: [fht] FMC Alias Private Key: 7
2,870,087 UART: [art] Extend RT PCRs Done
2,870,515 UART: [art] Lock RT PCRs Done
2,872,065 UART: [art] Populate DV Done
2,880,272 UART: [fht] FMC Alias Private Key: 7
2,881,424 UART: [art] Derive CDI
2,881,704 UART: [art] Store in slot 0x4
2,967,565 UART: [art] Derive Key Pair
2,967,925 UART: [art] Store priv key in slot 0x5
2,981,373 UART: [art] Derive Key Pair - Done
2,996,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,148 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,913 UART: [art] PUB.X = 8B23A4BE044D291C8C716E8710FAD5F7DF6EFE811DA0D3CED6D6CDB6D9B2E2A0882778C2F71E9AC59041D3DD640690D5
3,018,695 UART: [art] PUB.Y = A2C015226E8DE8773025EB4D8C056B20035FB806EDC204E87ADA9B36ED409CC39A72513DD185B1BCCDDC5C49B3C9ED7E
3,025,651 UART: [art] SIG.R = 44EFBD771F288D3087AE4014B70456D4A7C326C7355DAAEEA7CC4F346FDAD13546982E744891D1BC5D95C63F875F3D16
3,032,426 UART: [art] SIG.S = 6B2E345FF1CA2B7925EE3EE4B1DBE3E241762479C19FF8DCF2A76A8D9282753D26AA63EE28A93FE73FE52AEE1EC87192
3,056,116 UART: Caliptra RT
3,056,459 UART: [state] CFI Enabled
3,176,123 UART: [rt] RT listening for mailbox commands...
3,176,793 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,901 UART: [rt]cmd =0x53494756, len=196
3,213,291 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
192,235 UART:
192,580 UART: Running Caliptra ROM ...
193,778 UART:
193,953 UART: [state] CFI Enabled
265,422 UART: [state] LifecycleState = Unprovisioned
267,340 UART: [state] DebugLocked = No
270,222 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,235 UART: [kat] SHA2-256
444,919 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,437 UART: [kat] ++
455,889 UART: [kat] sha1
466,835 UART: [kat] SHA2-256
469,532 UART: [kat] SHA2-384
475,389 UART: [kat] SHA2-512-ACC
477,757 UART: [kat] ECC-384
2,778,061 UART: [kat] HMAC-384Kdf
2,790,412 UART: [kat] LMS
3,980,732 UART: [kat] --
3,986,676 UART: [cold-reset] ++
3,988,288 UART: [fht] Storing FHT @ 0x50003400
3,999,841 UART: [idev] ++
4,000,399 UART: [idev] CDI.KEYID = 6
4,001,360 UART: [idev] SUBJECT.KEYID = 7
4,002,607 UART: [idev] UDS.KEYID = 0
4,003,598 ready_for_fw is high
4,003,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,152,983 UART: [idev] Erasing UDS.KEYID = 0
7,337,215 UART: [idev] Using Sha1 for KeyId Algorithm
7,357,521 UART: [idev] --
7,361,867 UART: [ldev] ++
7,362,451 UART: [ldev] CDI.KEYID = 6
7,363,423 UART: [ldev] SUBJECT.KEYID = 5
7,364,583 UART: [ldev] AUTHORITY.KEYID = 7
7,365,867 UART: [ldev] FE.KEYID = 1
7,412,869 UART: [ldev] Erasing FE.KEYID = 1
10,746,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,040,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,055,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,070,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,084,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,104,326 UART: [ldev] --
13,108,548 UART: [fwproc] Waiting for Commands...
13,110,338 UART: [fwproc] Received command 0x46574c44
13,112,580 UART: [fwproc] Received Image of size 118548 bytes
17,217,615 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,293,852 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,367,045 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,695,477 >>> mbox cmd response: success
17,696,648 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,700,209 UART: [afmc] ++
17,700,805 UART: [afmc] CDI.KEYID = 6
17,701,739 UART: [afmc] SUBJECT.KEYID = 7
17,702,962 UART: [afmc] AUTHORITY.KEYID = 5
21,063,947 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,361,885 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,364,151 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,378,599 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,393,348 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,407,722 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,428,803 UART: [afmc] --
23,432,038 UART: [cold-reset] --
23,437,143 UART: [state] Locking Datavault
23,441,791 UART: [state] Locking PCR0, PCR1 and PCR31
23,443,490 UART: [state] Locking ICCM
23,446,338 UART: [exit] Launching FMC @ 0x40000130
23,454,693 UART:
23,454,928 UART: Running Caliptra FMC ...
23,456,049 UART:
23,456,214 UART: [state] CFI Enabled
23,523,247 UART: [fht] FMC Alias Private Key: 7
25,863,762 UART: [art] Extend RT PCRs Done
25,864,982 UART: [art] Lock RT PCRs Done
25,866,850 UART: [art] Populate DV Done
25,872,096 UART: [fht] FMC Alias Private Key: 7
25,873,639 UART: [art] Derive CDI
25,874,449 UART: [art] Store in slot 0x4
25,931,956 UART: [art] Derive Key Pair
25,932,997 UART: [art] Store priv key in slot 0x5
29,225,815 UART: [art] Derive Key Pair - Done
29,238,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,528,060 UART: [art] Erasing AUTHORITY.KEYID = 7
31,529,580 UART: [art] PUB.X = BCB17B94579C5930B2DDC742329DC0A1BFD1776E3B9B3848108C6CCC55C5A1960D1117814C1ADCB75EFD8245C6C6F650
31,536,847 UART: [art] PUB.Y = 69E642A6F47D923C6827F1B481E46BB33076140DD1AE340D6D9CDE8EF29BDE0629701C534320B8F21A40069327976558
31,544,058 UART: [art] SIG.R = 21A29828ADB4F9B2C8074B0A60D4FC426B724CE0F7B8073A58944A5D1533A526FBC654ACA8212275617A090CF23F95EE
31,551,425 UART: [art] SIG.S = BB6622782D54EC662AEB7965517FBB07298C274634CC4C3A345579E0418D57D5EC6C37C10A8D69CAF099439155B23A16
32,856,666 UART: Caliptra RT
32,857,392 UART: [state] CFI Enabled
33,034,119 UART: [rt] RT listening for mailbox commands...
33,065,438 UART: [rt]cmd =0x46505344, len=4
33,175,939 >>> mbox cmd response data (8 bytes)
33,176,484 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,176,767 UART: Fatal Error: 0x000E0008
33,177,902 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,808,335 ready_for_fw is high
3,808,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,955,286 >>> mbox cmd response: success
17,956,551 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,649,491 UART:
23,649,885 UART: Running Caliptra FMC ...
23,650,995 UART:
23,651,150 UART: [state] CFI Enabled
23,720,045 UART: [fht] FMC Alias Private Key: 7
26,060,986 UART: [art] Extend RT PCRs Done
26,062,215 UART: [art] Lock RT PCRs Done
26,064,036 UART: [art] Populate DV Done
26,069,751 UART: [fht] FMC Alias Private Key: 7
26,071,418 UART: [art] Derive CDI
26,072,239 UART: [art] Store in slot 0x4
26,129,105 UART: [art] Derive Key Pair
26,130,150 UART: [art] Store priv key in slot 0x5
29,422,825 UART: [art] Derive Key Pair - Done
29,435,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,534 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,045 UART: [art] PUB.X = 3F6136B7EBD88A728D26751B37A83464D5F49582F4D4ED7A13573252C9A9AC0934F9B9BFE6473AA09702332BD581F8E2
31,734,315 UART: [art] PUB.Y = 89B0ABD6A6FBFFAD10C94220AF27B55C635C22D18F5B0529F8E542B1F833C9A1D4A92B045560D4C2A736467691709C40
31,741,564 UART: [art] SIG.R = 70433B6BEB039EE14428DD8B583D65FE285998779682C43AF04CF8DCBEEF2FD117CC7D0161038CA8BEE68B7194FA26CD
31,748,970 UART: [art] SIG.S = C874F399095949DF13AD4B8D44A78170429970C12EDD001B5A923BAF679B29CC6C2DC005C50817E90CB92768FE4716AE
33,054,069 UART: Caliptra RT
33,054,787 UART: [state] CFI Enabled
33,231,980 UART: [rt] RT listening for mailbox commands...
33,263,723 UART: [rt]cmd =0x46505344, len=4
33,373,968 >>> mbox cmd response data (8 bytes)
33,374,505 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,374,797 UART: Fatal Error: 0x000E0008
33,375,970 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
192,452 UART:
192,819 UART: Running Caliptra ROM ...
193,918 UART:
603,617 UART: [state] CFI Enabled
618,279 UART: [state] LifecycleState = Unprovisioned
620,232 UART: [state] DebugLocked = No
623,172 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,319 UART: [kat] SHA2-256
797,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,614 UART: [kat] ++
808,084 UART: [kat] sha1
817,749 UART: [kat] SHA2-256
820,462 UART: [kat] SHA2-384
826,973 UART: [kat] SHA2-512-ACC
829,339 UART: [kat] ECC-384
3,113,000 UART: [kat] HMAC-384Kdf
3,123,889 UART: [kat] LMS
4,313,949 UART: [kat] --
4,319,668 UART: [cold-reset] ++
4,320,749 UART: [fht] Storing FHT @ 0x50003400
4,332,303 UART: [idev] ++
4,332,863 UART: [idev] CDI.KEYID = 6
4,333,767 UART: [idev] SUBJECT.KEYID = 7
4,335,001 UART: [idev] UDS.KEYID = 0
4,336,041 ready_for_fw is high
4,336,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,111 UART: [idev] Erasing UDS.KEYID = 0
7,623,186 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,606 UART: [idev] --
7,648,584 UART: [ldev] ++
7,649,152 UART: [ldev] CDI.KEYID = 6
7,650,082 UART: [ldev] SUBJECT.KEYID = 5
7,651,289 UART: [ldev] AUTHORITY.KEYID = 7
7,652,565 UART: [ldev] FE.KEYID = 1
7,663,830 UART: [ldev] Erasing FE.KEYID = 1
10,953,809 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,919 UART: [ldev] --
13,316,947 UART: [fwproc] Waiting for Commands...
13,320,120 UART: [fwproc] Received command 0x46574c44
13,322,293 UART: [fwproc] Received Image of size 118548 bytes
17,426,789 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,505,746 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,921 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,662 >>> mbox cmd response: success
17,907,723 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,911,358 UART: [afmc] ++
17,911,999 UART: [afmc] CDI.KEYID = 6
17,912,905 UART: [afmc] SUBJECT.KEYID = 7
17,914,166 UART: [afmc] AUTHORITY.KEYID = 5
21,229,370 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,738 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,983 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,420 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,556,155 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,582 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,592,053 UART: [afmc] --
23,595,317 UART: [cold-reset] --
23,599,469 UART: [state] Locking Datavault
23,604,982 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,730 UART: [state] Locking ICCM
23,608,928 UART: [exit] Launching FMC @ 0x40000130
23,617,315 UART:
23,617,551 UART: Running Caliptra FMC ...
23,618,646 UART:
23,618,800 UART: [state] CFI Enabled
23,626,783 UART: [fht] FMC Alias Private Key: 7
25,966,981 UART: [art] Extend RT PCRs Done
25,968,202 UART: [art] Lock RT PCRs Done
25,969,877 UART: [art] Populate DV Done
25,975,330 UART: [fht] FMC Alias Private Key: 7
25,977,076 UART: [art] Derive CDI
25,977,887 UART: [art] Store in slot 0x4
26,020,308 UART: [art] Derive Key Pair
26,021,322 UART: [art] Store priv key in slot 0x5
29,263,231 UART: [art] Derive Key Pair - Done
29,276,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,700 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,205 UART: [art] PUB.X = 82309F9AC9FD817B6D86EDCE81652935CC63E58D7186930A758130ECF3F7A81EA481D19083887B4BBD792FC79D1523B1
31,565,469 UART: [art] PUB.Y = 0516185DE7FDCF6300C0B3F50BC69979C602699DAE77325F94C73A5272F854B950604D1A703FF510D64C89E3DFAC6150
31,572,645 UART: [art] SIG.R = C2E364D4F008C24B8ACF502D5F3E6391C4D42B08281B74180EF417CA85FF314D8EC338A02739F477E5264892D765B839
31,580,035 UART: [art] SIG.S = 020E641F04C428AFBD862FF8591754565300A22813CB9523F9CA4A6C1DE4FB2D3E00ECAD4972A8BAE8BA039722B2E5C8
32,885,031 UART: Caliptra RT
32,885,740 UART: [state] CFI Enabled
33,019,603 UART: [rt] RT listening for mailbox commands...
33,051,282 UART: [rt]cmd =0x46505344, len=4
33,161,258 >>> mbox cmd response data (8 bytes)
33,161,777 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,162,060 UART: Fatal Error: 0x000E0008
33,163,238 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
4,127,990 ready_for_fw is high
4,128,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,151,808 >>> mbox cmd response: success
18,153,135 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,788,471 UART:
23,788,862 UART: Running Caliptra FMC ...
23,790,078 UART:
23,790,247 UART: [state] CFI Enabled
23,798,076 UART: [fht] FMC Alias Private Key: 7
26,137,803 UART: [art] Extend RT PCRs Done
26,139,027 UART: [art] Lock RT PCRs Done
26,140,443 UART: [art] Populate DV Done
26,145,751 UART: [fht] FMC Alias Private Key: 7
26,147,461 UART: [art] Derive CDI
26,148,274 UART: [art] Store in slot 0x4
26,191,093 UART: [art] Derive Key Pair
26,192,134 UART: [art] Store priv key in slot 0x5
29,434,154 UART: [art] Derive Key Pair - Done
29,446,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,726,688 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,196 UART: [art] PUB.X = 69D2639456D283475B3D9DE12B3F97A3FE6EBF7384D81D3BED359404816751998E148E9FB807D589A924DAAA0BC9E72E
31,735,439 UART: [art] PUB.Y = 94FDD20020E06A3CC561C6B12263EBFFA352552939F0489C6156FCF800205367955C74AC74C4DF483515083A523F4F70
31,742,658 UART: [art] SIG.R = 0B69D480381073E80478F47E72D502BFF83EF20911DA9A1699DFF762C830B693FC6103BC12A57A212F3F1AEC5BD6E3C8
31,750,051 UART: [art] SIG.S = DC84FA28A10E8090191CE01310C720052F1953ECA78AF0AFAEE50234A24FAA6DBC526E7987B6F1515AB2817FAE8CB894
33,055,301 UART: Caliptra RT
33,056,009 UART: [state] CFI Enabled
33,190,087 UART: [rt] RT listening for mailbox commands...
33,221,366 UART: [rt]cmd =0x46505344, len=4
33,331,560 >>> mbox cmd response data (8 bytes)
33,332,086 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,332,383 UART: Fatal Error: 0x000E0008
33,333,557 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,103 UART:
192,465 UART: Running Caliptra ROM ...
193,559 UART:
193,698 UART: [state] CFI Enabled
259,087 UART: [state] LifecycleState = Unprovisioned
261,062 UART: [state] DebugLocked = No
263,435 UART: [state] WD Timer not started. Device not locked for debugging
267,966 UART: [kat] SHA2-256
447,619 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,427 UART: [kat] ++
458,927 UART: [kat] sha1
469,156 UART: [kat] SHA2-256
471,880 UART: [kat] SHA2-384
478,722 UART: [kat] SHA2-512-ACC
481,156 UART: [kat] ECC-384
2,926,817 UART: [kat] HMAC-384Kdf
2,950,420 UART: [kat] LMS
3,426,880 UART: [kat] --
3,431,444 UART: [cold-reset] ++
3,432,301 UART: [fht] FHT @ 0x50003400
3,443,337 UART: [idev] ++
3,443,883 UART: [idev] CDI.KEYID = 6
3,444,833 UART: [idev] SUBJECT.KEYID = 7
3,446,066 UART: [idev] UDS.KEYID = 0
3,447,112 ready_for_fw is high
3,447,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,783 UART: [idev] Erasing UDS.KEYID = 0
5,966,717 UART: [idev] Sha1 KeyId Algorithm
5,990,698 UART: [idev] --
5,995,019 UART: [ldev] ++
5,995,643 UART: [ldev] CDI.KEYID = 6
5,996,525 UART: [ldev] SUBJECT.KEYID = 5
5,997,735 UART: [ldev] AUTHORITY.KEYID = 7
5,999,017 UART: [ldev] FE.KEYID = 1
6,036,745 UART: [ldev] Erasing FE.KEYID = 1
8,545,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,305 UART: [ldev] --
10,350,965 UART: [fwproc] Wait for Commands...
10,353,561 UART: [fwproc] Recv command 0x46574c44
10,355,594 UART: [fwproc] Recv'd Img size: 118548 bytes
13,842,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,916,281 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,989,290 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,318,453 >>> mbox cmd response: success
14,319,593 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,321,732 UART: [afmc] ++
14,322,308 UART: [afmc] CDI.KEYID = 6
14,323,274 UART: [afmc] SUBJECT.KEYID = 7
14,324,482 UART: [afmc] AUTHORITY.KEYID = 5
16,851,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,429 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,591,217 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,607,316 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,622,889 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,646,804 UART: [afmc] --
18,651,095 UART: [cold-reset] --
18,654,520 UART: [state] Locking Datavault
18,658,583 UART: [state] Locking PCR0, PCR1 and PCR31
18,660,276 UART: [state] Locking ICCM
18,661,406 UART: [exit] Launching FMC @ 0x40000130
18,669,849 UART:
18,670,078 UART: Running Caliptra FMC ...
18,671,174 UART:
18,671,348 UART: [state] CFI Enabled
18,730,817 UART: [fht] FMC Alias Private Key: 7
20,496,832 UART: [art] Extend RT PCRs Done
20,498,065 UART: [art] Lock RT PCRs Done
20,499,943 UART: [art] Populate DV Done
20,505,250 UART: [fht] FMC Alias Private Key: 7
20,507,024 UART: [art] Derive CDI
20,507,764 UART: [art] Store in slot 0x4
20,563,698 UART: [art] Derive Key Pair
20,564,732 UART: [art] Store priv key in slot 0x5
23,027,959 UART: [art] Derive Key Pair - Done
23,041,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,753,092 UART: [art] Erasing AUTHORITY.KEYID = 7
24,754,599 UART: [art] PUB.X = 286A6B290EDC7032E82622B9BA789F22A13FB78B75EC8A4BE72604A498A80A1B6C0AE916F1C5EFF301E2EBA672DD1F1D
24,761,927 UART: [art] PUB.Y = ECEF448BDFB6F5BD1179CE39900130B49AA7A9DF346791CBCA20F9C5E766C05F68BB8257104B6E077960ADBA5F78465A
24,769,182 UART: [art] SIG.R = 26D6FA66EEB6DA8DCAEAE0120FE88C683D61F451C65E12D1490DD8E9830E2669B2A65D062679BDF1BDDBF60772E36D17
24,776,567 UART: [art] SIG.S = A2E153EBBAAEEECF877F76D7B5E06E05DAB8F8779AC7F8E472B37AA380C92A028957A381CA45C72A4E4FABFAFCB86565
25,755,780 UART: Caliptra RT
25,756,468 UART: [state] CFI Enabled
25,937,316 UART: [rt] RT listening for mailbox commands...
25,968,392 UART: [rt]cmd =0x46505344, len=4
26,078,469 >>> mbox cmd response data (8 bytes)
26,079,074 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,079,379 UART: Fatal Error: 0x000E0008
26,080,499 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,460,519 ready_for_fw is high
3,461,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,215,510 >>> mbox cmd response: success
14,216,805 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,492,245 UART:
18,492,637 UART: Running Caliptra FMC ...
18,493,838 UART:
18,494,000 UART: [state] CFI Enabled
18,561,919 UART: [fht] FMC Alias Private Key: 7
20,327,563 UART: [art] Extend RT PCRs Done
20,328,806 UART: [art] Lock RT PCRs Done
20,330,456 UART: [art] Populate DV Done
20,336,040 UART: [fht] FMC Alias Private Key: 7
20,337,527 UART: [art] Derive CDI
20,338,260 UART: [art] Store in slot 0x4
20,394,198 UART: [art] Derive Key Pair
20,395,237 UART: [art] Store priv key in slot 0x5
22,857,993 UART: [art] Derive Key Pair - Done
22,871,151 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,584,502 UART: [art] Erasing AUTHORITY.KEYID = 7
24,586,002 UART: [art] PUB.X = BECD6E2F95C3CA264B5F468EE5B9B7D88D796EFE1BA90C5AEF860099D09EF4C4954C15BF757B9BA08F54CC3F1852C257
24,593,262 UART: [art] PUB.Y = ED97E100F52A3165C781F8F383988BE068795B9B2F7E5CFC0CBE0AC1EA7422B7F1DB4711418F542B6C0D76E4B6E03E7F
24,600,521 UART: [art] SIG.R = 16E4B219EE29FEA7E0B537DBFD2F5FE25C2865AF280DC00FE382670711FEF5467E389810D0E6ACE220756816D88C51DB
24,607,910 UART: [art] SIG.S = 72C9CB59F964C5FF396249956509993CFB6CA2CA3DCCD25C703A089042E440BC31F865DC0921899624683D098C607201
25,586,785 UART: Caliptra RT
25,587,503 UART: [state] CFI Enabled
25,767,856 UART: [rt] RT listening for mailbox commands...
25,799,426 UART: [rt]cmd =0x46505344, len=4
25,909,559 >>> mbox cmd response data (8 bytes)
25,910,079 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,910,370 UART: Fatal Error: 0x000E0008
25,911,541 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,390 UART:
192,764 UART: Running Caliptra ROM ...
193,893 UART:
603,362 UART: [state] CFI Enabled
617,431 UART: [state] LifecycleState = Unprovisioned
619,386 UART: [state] DebugLocked = No
621,557 UART: [state] WD Timer not started. Device not locked for debugging
624,744 UART: [kat] SHA2-256
804,367 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,163 UART: [kat] ++
815,641 UART: [kat] sha1
825,240 UART: [kat] SHA2-256
827,891 UART: [kat] SHA2-384
834,808 UART: [kat] SHA2-512-ACC
837,177 UART: [kat] ECC-384
3,278,018 UART: [kat] HMAC-384Kdf
3,289,758 UART: [kat] LMS
3,766,284 UART: [kat] --
3,771,766 UART: [cold-reset] ++
3,774,193 UART: [fht] FHT @ 0x50003400
3,785,685 UART: [idev] ++
3,786,257 UART: [idev] CDI.KEYID = 6
3,787,290 UART: [idev] SUBJECT.KEYID = 7
3,788,466 UART: [idev] UDS.KEYID = 0
3,789,393 ready_for_fw is high
3,789,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,434 UART: [idev] Erasing UDS.KEYID = 0
6,267,278 UART: [idev] Sha1 KeyId Algorithm
6,289,974 UART: [idev] --
6,295,721 UART: [ldev] ++
6,296,301 UART: [ldev] CDI.KEYID = 6
6,297,218 UART: [ldev] SUBJECT.KEYID = 5
6,298,432 UART: [ldev] AUTHORITY.KEYID = 7
6,299,667 UART: [ldev] FE.KEYID = 1
6,309,210 UART: [ldev] Erasing FE.KEYID = 1
8,787,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,301 UART: [ldev] --
10,580,293 UART: [fwproc] Wait for Commands...
10,583,254 UART: [fwproc] Recv command 0x46574c44
10,585,299 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,321 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,337 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,831 >>> mbox cmd response: success
14,552,379 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,556,243 UART: [afmc] ++
14,556,823 UART: [afmc] CDI.KEYID = 6
14,557,848 UART: [afmc] SUBJECT.KEYID = 7
14,558,969 UART: [afmc] AUTHORITY.KEYID = 5
17,061,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,478 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,306 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,378 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,967 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,103 UART: [afmc] --
18,861,568 UART: [cold-reset] --
18,866,889 UART: [state] Locking Datavault
18,873,171 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,928 UART: [state] Locking ICCM
18,876,809 UART: [exit] Launching FMC @ 0x40000130
18,885,203 UART:
18,885,448 UART: Running Caliptra FMC ...
18,886,553 UART:
18,886,739 UART: [state] CFI Enabled
18,894,686 UART: [fht] FMC Alias Private Key: 7
20,661,183 UART: [art] Extend RT PCRs Done
20,662,405 UART: [art] Lock RT PCRs Done
20,664,033 UART: [art] Populate DV Done
20,669,664 UART: [fht] FMC Alias Private Key: 7
20,671,214 UART: [art] Derive CDI
20,672,032 UART: [art] Store in slot 0x4
20,714,529 UART: [art] Derive Key Pair
20,715,571 UART: [art] Store priv key in slot 0x5
23,142,583 UART: [art] Derive Key Pair - Done
23,155,251 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,785 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,286 UART: [art] PUB.X = 60A9E2E2FAC7FAD148781034A07267715ED7DE765BA4D3AEA20DD25FF9712696DBC929D98577769E2B9FC2BC19E64755
24,870,528 UART: [art] PUB.Y = 7B47BF0DC627E622CB21DC827C5C6DFC834D16859E592F7346DEFE8E0EBC9D49354C4FCEDAC0A03602C3EF047553B5C5
24,877,808 UART: [art] SIG.R = A8FF8A9DF9B1B338E227BC95E1FFEA2851CA9D9E7935A4C11FBF09D18DDEA34FC75D32AC4E19F102D9206A84EEEB63E7
24,885,280 UART: [art] SIG.S = 802956CD6FDF1CA30A61EC01EE56E8802623E774EE010C2C3490373673F17E0255BD360C1F8D296C8B59DBCC1038C913
25,864,085 UART: Caliptra RT
25,864,803 UART: [state] CFI Enabled
25,998,217 UART: [rt] RT listening for mailbox commands...
26,029,473 UART: [rt]cmd =0x46505344, len=4
26,139,832 >>> mbox cmd response data (8 bytes)
26,140,380 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,140,674 UART: Fatal Error: 0x000E0008
26,141,794 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,782,431 ready_for_fw is high
3,783,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,080 >>> mbox cmd response: success
14,446,796 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,696,179 UART:
18,696,558 UART: Running Caliptra FMC ...
18,697,899 UART:
18,698,064 UART: [state] CFI Enabled
18,705,865 UART: [fht] FMC Alias Private Key: 7
20,471,849 UART: [art] Extend RT PCRs Done
20,473,068 UART: [art] Lock RT PCRs Done
20,475,025 UART: [art] Populate DV Done
20,480,399 UART: [fht] FMC Alias Private Key: 7
20,481,950 UART: [art] Derive CDI
20,482,719 UART: [art] Store in slot 0x4
20,525,275 UART: [art] Derive Key Pair
20,526,316 UART: [art] Store priv key in slot 0x5
22,952,652 UART: [art] Derive Key Pair - Done
22,965,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,155 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,657 UART: [art] PUB.X = DA3C0A239F6EAC1CD9F098F3276AD46CC95D2F3C354B933F0D62EB46EAF7F3F852E0E1BEAB5B6E32ACE49F09EC727666
24,680,911 UART: [art] PUB.Y = D3E1AC1C09BA7F934464AFA768FF5DE8C093EB44668877B336461001BE2FB272E7BC3C37C9ACB011914B1FE921FDE2AE
24,688,217 UART: [art] SIG.R = 217D531B03CC49538C9708D50D131FD8A6E8D3920FD9F9F568A2108E5B618A680164AF3D55B4913F451AA67C882C0393
24,695,615 UART: [art] SIG.S = 072AADE7DD1CAC6E7AA774772F2143F169A1FD04C6DA5EBFB0F122B72562B0A693DAF708C0BF6275991D8EFCFA0B236C
25,674,534 UART: Caliptra RT
25,675,237 UART: [state] CFI Enabled
25,808,461 UART: [rt] RT listening for mailbox commands...
25,839,929 UART: [rt]cmd =0x46505344, len=4
25,950,003 >>> mbox cmd response data (8 bytes)
25,950,531 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,950,816 UART: Fatal Error: 0x000E0008
25,951,939 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,013 UART:
192,382 UART: Running Caliptra ROM ...
193,504 UART:
193,655 UART: [state] CFI Enabled
264,997 UART: [state] LifecycleState = Unprovisioned
267,407 UART: [state] DebugLocked = No
270,063 UART: [state] WD Timer not started. Device not locked for debugging
273,747 UART: [kat] SHA2-256
463,638 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,423 UART: [kat] ++
474,873 UART: [kat] sha1
485,887 UART: [kat] SHA2-256
488,908 UART: [kat] SHA2-384
493,549 UART: [kat] SHA2-512-ACC
496,126 UART: [kat] ECC-384
2,946,730 UART: [kat] HMAC-384Kdf
2,972,108 UART: [kat] LMS
3,503,848 UART: [kat] --
3,507,359 UART: [cold-reset] ++
3,508,928 UART: [fht] FHT @ 0x50003400
3,520,608 UART: [idev] ++
3,521,240 UART: [idev] CDI.KEYID = 6
3,522,268 UART: [idev] SUBJECT.KEYID = 7
3,523,436 UART: [idev] UDS.KEYID = 0
3,524,366 ready_for_fw is high
3,524,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,698 UART: [idev] Erasing UDS.KEYID = 0
6,028,862 UART: [idev] Sha1 KeyId Algorithm
6,052,465 UART: [idev] --
6,057,304 UART: [ldev] ++
6,057,991 UART: [ldev] CDI.KEYID = 6
6,058,877 UART: [ldev] SUBJECT.KEYID = 5
6,060,086 UART: [ldev] AUTHORITY.KEYID = 7
6,061,324 UART: [ldev] FE.KEYID = 1
6,098,758 UART: [ldev] Erasing FE.KEYID = 1
8,601,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,043 UART: [ldev] --
10,414,842 UART: [fwproc] Wait for Commands...
10,417,360 UART: [fwproc] Recv command 0x46574c44
10,419,659 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,407 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,013 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,269 >>> mbox cmd response: success
14,672,367 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,676,172 UART: [afmc] ++
14,676,880 UART: [afmc] CDI.KEYID = 6
14,678,059 UART: [afmc] SUBJECT.KEYID = 7
14,679,546 UART: [afmc] AUTHORITY.KEYID = 5
17,216,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,614 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,670 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,827 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,755 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,238 UART: [afmc] --
19,032,327 UART: [cold-reset] --
19,035,491 UART: [state] Locking Datavault
19,042,620 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,760 UART: [state] Locking ICCM
19,047,450 UART: [exit] Launching FMC @ 0x40000130
19,056,118 UART:
19,056,368 UART: Running Caliptra FMC ...
19,057,469 UART:
19,057,622 UART: [state] CFI Enabled
19,115,845 UART: [fht] FMC Alias Private Key: 7
20,903,683 UART: [art] Extend RT PCRs Done
20,904,901 UART: [art] Lock RT PCRs Done
20,906,685 UART: [art] Populate DV Done
20,911,987 UART: [fht] FMC Alias Private Key: 7
20,913,521 UART: [art] Derive CDI
20,914,329 UART: [art] Store in slot 0x4
20,969,609 UART: [art] Derive Key Pair
20,970,651 UART: [art] Store priv key in slot 0x5
23,433,670 UART: [art] Derive Key Pair - Done
23,446,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,577 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,085 UART: [art] PUB.X = 2F0C85CDF4CCCF811F4147598C68D65644C7F578D0B6F05BE0642F217B46FFEAE41A06BCC491784FB24F16989690F0C4
25,168,388 UART: [art] PUB.Y = 985011A59D4563D6BDA8A36D0A5D417002BDADC444842CFA7F8A25F99F65A048EF7A56A8DD2A7A2C0CF3C6C120384F1F
25,175,621 UART: [art] SIG.R = BA2B6527301950489A793A38F8ACB7747F549FF18699072576820D2D8ECF6096450534828F6EDD5F33EB71E4EA29A0AA
25,182,997 UART: [art] SIG.S = 9C9D589C01D6576961392F888E12D8C6FBBBD9986F37062CAB3543ACFC7B8FA3FD82675027696736A8EB1867F6C86BA6
26,161,825 UART: Caliptra RT
26,162,513 UART: [state] CFI Enabled
26,344,220 UART: [rt] RT listening for mailbox commands...
26,375,719 UART: [rt]cmd =0x46505344, len=4
26,486,231 >>> mbox cmd response data (8 bytes)
26,486,758 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,487,041 UART: Fatal Error: 0x000E0008
26,488,160 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,436,738 ready_for_fw is high
3,437,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,848 >>> mbox cmd response: success
14,828,177 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,110,448 UART:
19,110,833 UART: Running Caliptra FMC ...
19,111,938 UART:
19,112,089 UART: [state] CFI Enabled
19,177,881 UART: [fht] FMC Alias Private Key: 7
20,944,053 UART: [art] Extend RT PCRs Done
20,945,272 UART: [art] Lock RT PCRs Done
20,946,867 UART: [art] Populate DV Done
20,952,126 UART: [fht] FMC Alias Private Key: 7
20,953,678 UART: [art] Derive CDI
20,954,417 UART: [art] Store in slot 0x4
21,010,241 UART: [art] Derive Key Pair
21,011,244 UART: [art] Store priv key in slot 0x5
23,474,102 UART: [art] Derive Key Pair - Done
23,487,156 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,180 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,693 UART: [art] PUB.X = 0EAAD7467643B4B2C8E618F5CF4891390CA1965568BE0651F85252AE37CB27CF73EB83605A1811146ED222C3FAEFB485
25,207,958 UART: [art] PUB.Y = D5DE23F9D51D495739B8B8749F2BE8567EADC960BF62D11A96AA61808F171E49B8F66D4D4896DBBFD39F770F900EE00D
25,215,213 UART: [art] SIG.R = 26AE3FECA5E3742AC5A7E38F071CF0BC10319F4DB11AB881B034191E8F156E157DFAFB43DA932CA7C11DC454AF7D781A
25,222,662 UART: [art] SIG.S = 15B401003B6885AD944E821C4EAF80D46E9BEFD657CB58782B1B7530DA9D1430F8A165128E2E5B402378EB1E4AEAC575
26,201,802 UART: Caliptra RT
26,202,497 UART: [state] CFI Enabled
26,382,495 UART: [rt] RT listening for mailbox commands...
26,413,956 UART: [rt]cmd =0x46505344, len=4
26,524,439 >>> mbox cmd response data (8 bytes)
26,524,966 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,525,252 UART: Fatal Error: 0x000E0008
26,526,392 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,320 UART:
192,689 UART: Running Caliptra ROM ...
193,821 UART:
603,640 UART: [state] CFI Enabled
618,178 UART: [state] LifecycleState = Unprovisioned
620,581 UART: [state] DebugLocked = No
623,333 UART: [state] WD Timer not started. Device not locked for debugging
627,315 UART: [kat] SHA2-256
817,213 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,950 UART: [kat] ++
828,476 UART: [kat] sha1
839,156 UART: [kat] SHA2-256
842,208 UART: [kat] SHA2-384
847,148 UART: [kat] SHA2-512-ACC
849,739 UART: [kat] ECC-384
3,291,278 UART: [kat] HMAC-384Kdf
3,305,143 UART: [kat] LMS
3,836,925 UART: [kat] --
3,842,365 UART: [cold-reset] ++
3,843,805 UART: [fht] FHT @ 0x50003400
3,856,287 UART: [idev] ++
3,856,943 UART: [idev] CDI.KEYID = 6
3,857,980 UART: [idev] SUBJECT.KEYID = 7
3,859,098 UART: [idev] UDS.KEYID = 0
3,860,037 ready_for_fw is high
3,860,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,227 UART: [idev] Erasing UDS.KEYID = 0
6,336,317 UART: [idev] Sha1 KeyId Algorithm
6,358,158 UART: [idev] --
6,361,760 UART: [ldev] ++
6,362,453 UART: [ldev] CDI.KEYID = 6
6,363,345 UART: [ldev] SUBJECT.KEYID = 5
6,364,508 UART: [ldev] AUTHORITY.KEYID = 7
6,365,741 UART: [ldev] FE.KEYID = 1
6,378,227 UART: [ldev] Erasing FE.KEYID = 1
8,857,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,525 UART: [ldev] --
10,646,740 UART: [fwproc] Wait for Commands...
10,649,321 UART: [fwproc] Recv command 0x46574c44
10,651,636 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,819 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,433 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,268 >>> mbox cmd response: success
14,915,360 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,918,759 UART: [afmc] ++
14,919,487 UART: [afmc] CDI.KEYID = 6
14,920,690 UART: [afmc] SUBJECT.KEYID = 7
14,922,078 UART: [afmc] AUTHORITY.KEYID = 5
17,426,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,536 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,669 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,776 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,692 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,217,307 UART: [afmc] --
19,221,012 UART: [cold-reset] --
19,226,291 UART: [state] Locking Datavault
19,232,900 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,109 UART: [state] Locking ICCM
19,238,087 UART: [exit] Launching FMC @ 0x40000130
19,246,760 UART:
19,247,011 UART: Running Caliptra FMC ...
19,248,122 UART:
19,248,287 UART: [state] CFI Enabled
19,256,360 UART: [fht] FMC Alias Private Key: 7
21,021,914 UART: [art] Extend RT PCRs Done
21,023,140 UART: [art] Lock RT PCRs Done
21,024,992 UART: [art] Populate DV Done
21,030,467 UART: [fht] FMC Alias Private Key: 7
21,032,120 UART: [art] Derive CDI
21,032,943 UART: [art] Store in slot 0x4
21,075,543 UART: [art] Derive Key Pair
21,076,546 UART: [art] Store priv key in slot 0x5
23,503,217 UART: [art] Derive Key Pair - Done
23,515,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,265 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,777 UART: [art] PUB.X = F238AD9A2643D3E965AE8809A4C6AE0281F30A7A8EFF3C1FD1CD2408CF8940FB62444235E206A0EAF318A5DA3154A4F1
25,231,050 UART: [art] PUB.Y = 8E2397A0C57C62930304C8477BDBAC5E605E068D39E2ED9BF45A5B2E9C2650B0382803CA19CB2B4A03C54E399F7D61C8
25,238,342 UART: [art] SIG.R = A2DDBFB8D72E7B0D1E564850FBA1B112A20004852A4D79C6EDADB16313270EF29BE8A75B913F895F29CF0407F28105FF
25,245,713 UART: [art] SIG.S = 9DC468FE4D9E154E1AE578C4C40D14F4F5783D7C47EB7442E3C690CB838ECA97FEC03967BF89CB602452897B61B9A487
26,224,158 UART: Caliptra RT
26,224,842 UART: [state] CFI Enabled
26,357,793 UART: [rt] RT listening for mailbox commands...
26,389,261 UART: [rt]cmd =0x46505344, len=4
26,499,474 >>> mbox cmd response data (8 bytes)
26,500,052 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,500,349 UART: Fatal Error: 0x000E0008
26,501,437 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
3,757,588 ready_for_fw is high
3,758,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,720 >>> mbox cmd response: success
15,040,170 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,293,971 UART:
19,294,378 UART: Running Caliptra FMC ...
19,295,520 UART:
19,295,682 UART: [state] CFI Enabled
19,303,837 UART: [fht] FMC Alias Private Key: 7
21,070,011 UART: [art] Extend RT PCRs Done
21,071,234 UART: [art] Lock RT PCRs Done
21,072,585 UART: [art] Populate DV Done
21,078,193 UART: [fht] FMC Alias Private Key: 7
21,079,756 UART: [art] Derive CDI
21,080,524 UART: [art] Store in slot 0x4
21,123,252 UART: [art] Derive Key Pair
21,124,260 UART: [art] Store priv key in slot 0x5
23,550,520 UART: [art] Derive Key Pair - Done
23,563,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,991 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,492 UART: [art] PUB.X = 8423E03E3D7F487D35201CCD0983A2F0AD0B4ECD4354DC7C3769E7463810A6EE9584D296A12F69B584F9F993BF10574D
25,278,814 UART: [art] PUB.Y = 2378463B54548A526DB4711397C5C34302E1A9610D83712A90A6537B390986DCD58F22E587018BA0ABF9AB26BE0AC36B
25,286,003 UART: [art] SIG.R = F7780C7597CD9CEF5E09D5C71CE0276B6490EFB8A129AFA37C0C0E8A057A6656EFB87FB70495880D93F38B0DD5F64790
25,293,413 UART: [art] SIG.S = AA18F3468E3679BD748AEE5BC215FAD9B8B14F7A12F6C6DD5440B89E4BDAEFD9938DB77CCCACE2480D60E4E795B3D68B
26,272,281 UART: Caliptra RT
26,272,964 UART: [state] CFI Enabled
26,405,902 UART: [rt] RT listening for mailbox commands...
26,437,518 UART: [rt]cmd =0x46505344, len=4
26,547,810 >>> mbox cmd response data (8 bytes)
26,548,360 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,548,650 UART: Fatal Error: 0x000E0008
26,549,759 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,545 UART: [kat] SHA2-256
892,483 UART: [kat] SHA2-384
895,332 UART: [kat] SHA2-512-ACC
897,233 UART: [kat] ECC-384
902,710 UART: [kat] HMAC-384Kdf
907,308 UART: [kat] LMS
1,475,504 UART: [kat] --
1,476,369 UART: [cold-reset] ++
1,476,729 UART: [fht] Storing FHT @ 0x50003400
1,479,662 UART: [idev] ++
1,479,830 UART: [idev] CDI.KEYID = 6
1,480,190 UART: [idev] SUBJECT.KEYID = 7
1,480,614 UART: [idev] UDS.KEYID = 0
1,480,959 ready_for_fw is high
1,480,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,458 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,056 UART: [idev] --
1,513,881 UART: [ldev] ++
1,514,049 UART: [ldev] CDI.KEYID = 6
1,514,412 UART: [ldev] SUBJECT.KEYID = 5
1,514,838 UART: [ldev] AUTHORITY.KEYID = 7
1,515,301 UART: [ldev] FE.KEYID = 1
1,520,399 UART: [ldev] Erasing FE.KEYID = 1
1,546,708 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,614 UART: [ldev] --
1,586,103 UART: [fwproc] Waiting for Commands...
1,586,964 UART: [fwproc] Received command 0x46574c44
1,587,755 UART: [fwproc] Received Image of size 118548 bytes
2,931,697 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,045 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,263 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,476 >>> mbox cmd response: success
3,130,476 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,131,602 UART: [afmc] ++
3,131,770 UART: [afmc] CDI.KEYID = 6
3,132,132 UART: [afmc] SUBJECT.KEYID = 7
3,132,557 UART: [afmc] AUTHORITY.KEYID = 5
3,167,588 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,220 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,000 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,709 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,592 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,275 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,207 UART: [afmc] --
3,211,215 UART: [cold-reset] --
3,212,233 UART: [state] Locking Datavault
3,213,464 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,068 UART: [state] Locking ICCM
3,214,720 UART: [exit] Launching FMC @ 0x40000130
3,220,050 UART:
3,220,066 UART: Running Caliptra FMC ...
3,220,474 UART:
3,220,528 UART: [state] CFI Enabled
3,231,400 UART: [fht] FMC Alias Private Key: 7
3,350,752 UART: [art] Extend RT PCRs Done
3,351,180 UART: [art] Lock RT PCRs Done
3,352,904 UART: [art] Populate DV Done
3,360,893 UART: [fht] FMC Alias Private Key: 7
3,361,963 UART: [art] Derive CDI
3,362,243 UART: [art] Store in slot 0x4
3,448,293 UART: [art] Derive Key Pair
3,448,653 UART: [art] Store priv key in slot 0x5
3,461,660 UART: [art] Derive Key Pair - Done
3,476,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,290 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,055 UART: [art] PUB.X = D201A91B70A91D5049B9F93889F3B7141400CFF6EC36FD925B823997D2E99BB0D58F136502CADE0FAC91C7B2897E8A79
3,499,800 UART: [art] PUB.Y = CA007C75CD4CB5B59E13D3964895E6227D7E8EA3C0CF6E998684C56EA89BF79E853D88B0AA261BC1BE3894B9110A7E08
3,506,732 UART: [art] SIG.R = D5CFE43ADFCC867A040402443D51A2640162C21BE55439B43ABB92FC416B81A5F691FE2C682660FDA179A8BEF2C7C2CE
3,513,504 UART: [art] SIG.S = BAB9742392ED1104EDB1490A4C84F5837F0A3EA356219C58E595F1E2EA3B10D19CD0C02C229033BFB432FA8036CE4420
3,538,017 UART: Caliptra RT
3,538,268 UART: [state] CFI Enabled
3,658,591 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,187 UART: [rt]cmd =0x46505344, len=4
3,797,546 >>> mbox cmd response data (8 bytes)
3,797,547 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,797,583 UART: Fatal Error: 0x000E0008
3,798,706 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,101 ready_for_fw is high
1,362,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,748 >>> mbox cmd response: success
2,979,748 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,041,899 UART:
3,041,915 UART: Running Caliptra FMC ...
3,042,323 UART:
3,042,377 UART: [state] CFI Enabled
3,052,973 UART: [fht] FMC Alias Private Key: 7
3,172,341 UART: [art] Extend RT PCRs Done
3,172,769 UART: [art] Lock RT PCRs Done
3,174,127 UART: [art] Populate DV Done
3,182,286 UART: [fht] FMC Alias Private Key: 7
3,183,388 UART: [art] Derive CDI
3,183,668 UART: [art] Store in slot 0x4
3,269,384 UART: [art] Derive Key Pair
3,269,744 UART: [art] Store priv key in slot 0x5
3,283,283 UART: [art] Derive Key Pair - Done
3,298,120 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,410 UART: [art] PUB.X = 1F9F92401891DA854903BE17ED749096B388401AF159F2D55D3D9378A73C7C894D63B18551C51FEE2D991FDB7C0CAEE0
3,321,178 UART: [art] PUB.Y = 8F22DD20D9A745AFED0C3BA2B975804A5062265987982AEC4BC98682B4F56BEDA4D4266CFDE194018E37F68503EFDFEF
3,328,133 UART: [art] SIG.R = 6850AB11AB34D895F6256C86355A326D054E86259CF393B273230BB8ACAF34DF25D89022E375CE564824B5ECFE63B5C9
3,334,899 UART: [art] SIG.S = 4F5D6EB0DC8374540BD0ED3E8FEAAB5F3AD6982976114EADB40586166DA9B6148E7A11BAE8BD38AA8D0792AEC58240F8
3,359,076 UART: Caliptra RT
3,359,327 UART: [state] CFI Enabled
3,480,274 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,830 UART: [rt]cmd =0x46505344, len=4
3,619,791 >>> mbox cmd response data (8 bytes)
3,619,792 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,619,828 UART: Fatal Error: 0x000E0008
3,620,951 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,450 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,992 UART: [kat] SHA2-256
881,923 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,038 UART: [kat] ++
886,190 UART: [kat] sha1
890,452 UART: [kat] SHA2-256
892,390 UART: [kat] SHA2-384
895,161 UART: [kat] SHA2-512-ACC
897,062 UART: [kat] ECC-384
902,759 UART: [kat] HMAC-384Kdf
907,411 UART: [kat] LMS
1,475,607 UART: [kat] --
1,476,358 UART: [cold-reset] ++
1,476,792 UART: [fht] Storing FHT @ 0x50003400
1,479,691 UART: [idev] ++
1,479,859 UART: [idev] CDI.KEYID = 6
1,480,219 UART: [idev] SUBJECT.KEYID = 7
1,480,643 UART: [idev] UDS.KEYID = 0
1,480,988 ready_for_fw is high
1,480,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,391 UART: [idev] Erasing UDS.KEYID = 0
1,504,777 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,363 UART: [idev] --
1,514,562 UART: [ldev] ++
1,514,730 UART: [ldev] CDI.KEYID = 6
1,515,093 UART: [ldev] SUBJECT.KEYID = 5
1,515,519 UART: [ldev] AUTHORITY.KEYID = 7
1,515,982 UART: [ldev] FE.KEYID = 1
1,521,366 UART: [ldev] Erasing FE.KEYID = 1
1,546,987 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,989 UART: [ldev] --
1,586,380 UART: [fwproc] Waiting for Commands...
1,587,163 UART: [fwproc] Received command 0x46574c44
1,587,954 UART: [fwproc] Received Image of size 118548 bytes
2,931,916 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,370 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,588 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,783 >>> mbox cmd response: success
3,130,783 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,131,937 UART: [afmc] ++
3,132,105 UART: [afmc] CDI.KEYID = 6
3,132,467 UART: [afmc] SUBJECT.KEYID = 7
3,132,892 UART: [afmc] AUTHORITY.KEYID = 5
3,168,279 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,831 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,611 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,320 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,203 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,886 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,686 UART: [afmc] --
3,211,662 UART: [cold-reset] --
3,212,438 UART: [state] Locking Datavault
3,213,611 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,215 UART: [state] Locking ICCM
3,214,859 UART: [exit] Launching FMC @ 0x40000130
3,220,189 UART:
3,220,205 UART: Running Caliptra FMC ...
3,220,613 UART:
3,220,756 UART: [state] CFI Enabled
3,231,260 UART: [fht] FMC Alias Private Key: 7
3,350,490 UART: [art] Extend RT PCRs Done
3,350,918 UART: [art] Lock RT PCRs Done
3,352,462 UART: [art] Populate DV Done
3,360,827 UART: [fht] FMC Alias Private Key: 7
3,361,771 UART: [art] Derive CDI
3,362,051 UART: [art] Store in slot 0x4
3,447,745 UART: [art] Derive Key Pair
3,448,105 UART: [art] Store priv key in slot 0x5
3,461,672 UART: [art] Derive Key Pair - Done
3,476,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,671 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,436 UART: [art] PUB.X = BECDD975DF4545799ACDBA562AC576D716C61FB473CF1AFD72324390C7B026C03C1974678F62205DD5D6B4D25DA051E0
3,500,216 UART: [art] PUB.Y = 5DACA4857B2D34241B6507BD90733248866CE2EDCB34F32C280E63AC501BC094EDBE46D3AEB115F9A567976EE35A6E1E
3,507,172 UART: [art] SIG.R = 71A3474F88FC83C63CD2100CABD2FA0F2BBFB9F86D59967BBB248C6441715F741E877B83757C9EB06BB6B1C4227D945F
3,513,946 UART: [art] SIG.S = 25D409759126F9FDD7BD98D5821841F85114DBCE4B1C527EAD115A07BBF0E1F102DE71809433A4B29051A55C4E5D5548
3,537,879 UART: Caliptra RT
3,538,222 UART: [state] CFI Enabled
3,658,713 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,143 UART: [rt]cmd =0x46505344, len=4
3,798,014 >>> mbox cmd response data (8 bytes)
3,798,015 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,798,051 UART: Fatal Error: 0x000E0008
3,799,174 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,630 ready_for_fw is high
1,361,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,745 >>> mbox cmd response: success
2,979,745 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,042,324 UART:
3,042,340 UART: Running Caliptra FMC ...
3,042,748 UART:
3,042,891 UART: [state] CFI Enabled
3,053,709 UART: [fht] FMC Alias Private Key: 7
3,172,563 UART: [art] Extend RT PCRs Done
3,172,991 UART: [art] Lock RT PCRs Done
3,174,289 UART: [art] Populate DV Done
3,182,558 UART: [fht] FMC Alias Private Key: 7
3,183,576 UART: [art] Derive CDI
3,183,856 UART: [art] Store in slot 0x4
3,269,388 UART: [art] Derive Key Pair
3,269,748 UART: [art] Store priv key in slot 0x5
3,282,459 UART: [art] Derive Key Pair - Done
3,297,286 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,776 UART: [art] PUB.X = 0E392546187ACC0AABA5060354BADA7E1CBFD9DC34FF7B5D09E3C70A5FAEF75C347C3D8EC3EBDE14D83A773129856AA4
3,320,552 UART: [art] PUB.Y = 649EEA69F6507004929D401EB2DCEFD505E7BC9D2BD0694E3B0DB37AAA30134222758ED097D2155236680F2C1075B195
3,327,490 UART: [art] SIG.R = 976AC5CC8ED8BA1043AC4546A9C15BC348590C189F86C31E543971EEE40AD84912198B701558F8130F6F21DA9035C4FE
3,334,253 UART: [art] SIG.S = 10CA3594CC4F0BC2F16AA5E56963CD7780B18060B2AF668E62CCD7C8A16FE44C3273F9AAEC2ADDFAE95E2A2650924A18
3,358,134 UART: Caliptra RT
3,358,477 UART: [state] CFI Enabled
3,478,737 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,333 UART: [rt]cmd =0x46505344, len=4
3,617,724 >>> mbox cmd response data (8 bytes)
3,617,725 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,617,761 UART: Fatal Error: 0x000E0008
3,618,884 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,376 UART: [kat] SHA2-256
890,926 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,030 UART: [kat] ++
895,182 UART: [kat] sha1
899,460 UART: [kat] SHA2-256
901,400 UART: [kat] SHA2-384
904,239 UART: [kat] SHA2-512-ACC
906,140 UART: [kat] ECC-384
915,773 UART: [kat] HMAC-384Kdf
920,389 UART: [kat] LMS
1,168,701 UART: [kat] --
1,169,824 UART: [cold-reset] ++
1,170,294 UART: [fht] FHT @ 0x50003400
1,173,064 UART: [idev] ++
1,173,232 UART: [idev] CDI.KEYID = 6
1,173,593 UART: [idev] SUBJECT.KEYID = 7
1,174,018 UART: [idev] UDS.KEYID = 0
1,174,364 ready_for_fw is high
1,174,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,963 UART: [idev] Erasing UDS.KEYID = 0
1,199,383 UART: [idev] Sha1 KeyId Algorithm
1,208,155 UART: [idev] --
1,209,030 UART: [ldev] ++
1,209,198 UART: [ldev] CDI.KEYID = 6
1,209,562 UART: [ldev] SUBJECT.KEYID = 5
1,209,989 UART: [ldev] AUTHORITY.KEYID = 7
1,210,452 UART: [ldev] FE.KEYID = 1
1,215,420 UART: [ldev] Erasing FE.KEYID = 1
1,241,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,497 UART: [fwproc] Wait for Commands...
1,281,270 UART: [fwproc] Recv command 0x46574c44
1,282,003 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,565 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,740 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,963 >>> mbox cmd response: success
2,824,963 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,826,027 UART: [afmc] ++
2,826,195 UART: [afmc] CDI.KEYID = 6
2,826,558 UART: [afmc] SUBJECT.KEYID = 7
2,826,984 UART: [afmc] AUTHORITY.KEYID = 5
2,862,735 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,025 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,735 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,616 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,317 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,152 UART: [afmc] --
2,906,213 UART: [cold-reset] --
2,907,027 UART: [state] Locking Datavault
2,908,334 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,938 UART: [state] Locking ICCM
2,909,502 UART: [exit] Launching FMC @ 0x40000130
2,914,832 UART:
2,914,848 UART: Running Caliptra FMC ...
2,915,256 UART:
2,915,310 UART: [state] CFI Enabled
2,925,722 UART: [fht] FMC Alias Private Key: 7
3,044,686 UART: [art] Extend RT PCRs Done
3,045,114 UART: [art] Lock RT PCRs Done
3,046,624 UART: [art] Populate DV Done
3,054,653 UART: [fht] FMC Alias Private Key: 7
3,055,659 UART: [art] Derive CDI
3,055,939 UART: [art] Store in slot 0x4
3,142,158 UART: [art] Derive Key Pair
3,142,518 UART: [art] Store priv key in slot 0x5
3,156,058 UART: [art] Derive Key Pair - Done
3,170,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,723 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,488 UART: [art] PUB.X = FCEF36D7056C16FA518EFAD1128CE7D80ED805DE15F8FE4FB020EFC76BAE36A4F74EECE70E63747CF0B327CAB57A16E7
3,193,274 UART: [art] PUB.Y = 3F52ED4698FC00C22B3CAE45A8C34B8A6F4360DC26567B52E161CBFC9FC35172448476A1515623ED00312F466839835B
3,200,178 UART: [art] SIG.R = 7D4D9AB68C93196D46447F3F03B309BC0610EE7D1EBB1CA0DA07D03C5EE1D23582F527CE779D7B6424589E5605175993
3,206,935 UART: [art] SIG.S = 8C060BD4187812F1A3E04530DAEA251DFC975D32B63FC2F90137613E8C6646CFABA3E70E5D184E448B2369854BBCDED8
3,231,003 UART: Caliptra RT
3,231,254 UART: [state] CFI Enabled
3,350,879 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,579 UART: [rt]cmd =0x46505344, len=4
3,490,226 >>> mbox cmd response data (8 bytes)
3,490,227 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,490,263 UART: Fatal Error: 0x000E0008
3,491,386 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,536 ready_for_fw is high
1,059,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,146 >>> mbox cmd response: success
2,678,146 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,739,985 UART:
2,740,001 UART: Running Caliptra FMC ...
2,740,409 UART:
2,740,463 UART: [state] CFI Enabled
2,750,951 UART: [fht] FMC Alias Private Key: 7
2,870,049 UART: [art] Extend RT PCRs Done
2,870,477 UART: [art] Lock RT PCRs Done
2,872,177 UART: [art] Populate DV Done
2,880,224 UART: [fht] FMC Alias Private Key: 7
2,881,304 UART: [art] Derive CDI
2,881,584 UART: [art] Store in slot 0x4
2,967,351 UART: [art] Derive Key Pair
2,967,711 UART: [art] Store priv key in slot 0x5
2,981,287 UART: [art] Derive Key Pair - Done
2,996,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,472 UART: [art] PUB.X = 2046C94EBEB6CCF1F3F0E67E57556907D340122D3FD8A6C057C7968759C3646CAF0C18D87BBACE47AC4B39FB6C3D0E09
3,019,244 UART: [art] PUB.Y = 374C348593FFA71AB2A02403B7D86DD6AB232E3C50342AC1B130ABE9A5734DE0327411625A5C4EA563AA41BAB3479A68
3,026,197 UART: [art] SIG.R = 52865F48F5640D2708A117A5A222CFC469AAC2DFD1B5A325FEE9BF514828AFDD440FB7D08A5E4D2E9C8F09760F87753A
3,032,964 UART: [art] SIG.S = 55F184AB0470E9EDED2F029AB3CA4FA722D395B99DB7BEAD8B5E2CC35D514CCA054479B585DE13533401A3195585B4E8
3,057,018 UART: Caliptra RT
3,057,269 UART: [state] CFI Enabled
3,177,345 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,699 UART: [rt]cmd =0x46505344, len=4
3,316,174 >>> mbox cmd response data (8 bytes)
3,316,175 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,316,211 UART: Fatal Error: 0x000E0008
3,317,334 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,447 UART: [kat] ++
895,599 UART: [kat] sha1
899,913 UART: [kat] SHA2-256
901,853 UART: [kat] SHA2-384
904,748 UART: [kat] SHA2-512-ACC
906,649 UART: [kat] ECC-384
916,670 UART: [kat] HMAC-384Kdf
921,240 UART: [kat] LMS
1,169,552 UART: [kat] --
1,170,393 UART: [cold-reset] ++
1,170,859 UART: [fht] FHT @ 0x50003400
1,173,491 UART: [idev] ++
1,173,659 UART: [idev] CDI.KEYID = 6
1,174,020 UART: [idev] SUBJECT.KEYID = 7
1,174,445 UART: [idev] UDS.KEYID = 0
1,174,791 ready_for_fw is high
1,174,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,198,950 UART: [idev] Sha1 KeyId Algorithm
1,207,934 UART: [idev] --
1,208,823 UART: [ldev] ++
1,208,991 UART: [ldev] CDI.KEYID = 6
1,209,355 UART: [ldev] SUBJECT.KEYID = 5
1,209,782 UART: [ldev] AUTHORITY.KEYID = 7
1,210,245 UART: [ldev] FE.KEYID = 1
1,215,715 UART: [ldev] Erasing FE.KEYID = 1
1,242,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,179 UART: [ldev] --
1,281,608 UART: [fwproc] Wait for Commands...
1,282,215 UART: [fwproc] Recv command 0x46574c44
1,282,948 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,068 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,243 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,514 >>> mbox cmd response: success
2,825,514 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,826,554 UART: [afmc] ++
2,826,722 UART: [afmc] CDI.KEYID = 6
2,827,085 UART: [afmc] SUBJECT.KEYID = 7
2,827,511 UART: [afmc] AUTHORITY.KEYID = 5
2,863,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,670 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,380 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,261 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,962 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,735 UART: [afmc] --
2,906,794 UART: [cold-reset] --
2,907,742 UART: [state] Locking Datavault
2,908,911 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,515 UART: [state] Locking ICCM
2,910,001 UART: [exit] Launching FMC @ 0x40000130
2,915,331 UART:
2,915,347 UART: Running Caliptra FMC ...
2,915,755 UART:
2,915,898 UART: [state] CFI Enabled
2,926,788 UART: [fht] FMC Alias Private Key: 7
3,045,356 UART: [art] Extend RT PCRs Done
3,045,784 UART: [art] Lock RT PCRs Done
3,047,028 UART: [art] Populate DV Done
3,055,439 UART: [fht] FMC Alias Private Key: 7
3,056,409 UART: [art] Derive CDI
3,056,689 UART: [art] Store in slot 0x4
3,142,998 UART: [art] Derive Key Pair
3,143,358 UART: [art] Store priv key in slot 0x5
3,156,888 UART: [art] Derive Key Pair - Done
3,171,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,687 UART: [art] PUB.X = 7080BE3ED92A0DE1CD3C99E2D6DD8D45F5557D3BD1D9D6470FF2C79B67FFD1528A9243D056F5039BAEF578B53DCD6E9D
3,194,468 UART: [art] PUB.Y = 3C202FA8C8F61FA487E480F568F83137B383BC413E90491B20C1426AB610721A9DB49023F5C7B584931E03EC4A1718F2
3,201,411 UART: [art] SIG.R = 50F3CC9427FF4BFDDAB89771567AFAF5D4E6BBD658B5DB440DE8FF48085F87B2E8665B97FD2119D59ED1C962016A9194
3,208,186 UART: [art] SIG.S = ECC80BB567A7BF43D39DA2096AEC6CB08A8AD6D6BE75F20B886965080DD16D3F6506C230FB72511CA63585929FF730FE
3,231,844 UART: Caliptra RT
3,232,187 UART: [state] CFI Enabled
3,351,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,268 UART: [rt]cmd =0x46505344, len=4
3,491,041 >>> mbox cmd response data (8 bytes)
3,491,042 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,491,078 UART: Fatal Error: 0x000E0008
3,492,201 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,967 ready_for_fw is high
1,058,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,115 >>> mbox cmd response: success
2,679,115 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,741,362 UART:
2,741,378 UART: Running Caliptra FMC ...
2,741,786 UART:
2,741,929 UART: [state] CFI Enabled
2,752,449 UART: [fht] FMC Alias Private Key: 7
2,871,195 UART: [art] Extend RT PCRs Done
2,871,623 UART: [art] Lock RT PCRs Done
2,873,227 UART: [art] Populate DV Done
2,881,332 UART: [fht] FMC Alias Private Key: 7
2,882,506 UART: [art] Derive CDI
2,882,786 UART: [art] Store in slot 0x4
2,968,517 UART: [art] Derive Key Pair
2,968,877 UART: [art] Store priv key in slot 0x5
2,982,329 UART: [art] Derive Key Pair - Done
2,997,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,822 UART: [art] PUB.X = B2326606E3D62111CC48FDAB9AC0A9DA07187469580517548EFA9787167CF94745503E1273F9255C471507878A8AEDDF
3,020,574 UART: [art] PUB.Y = 6D7365E1D6CE98EF314113CDD6D41D4B47AC1AA99A612BC302AC43F1C06E84C2D94E5E8A0699B7C191EEAA3BAD540973
3,027,531 UART: [art] SIG.R = 485C024670633894B4DF1E67D3086AABA243DAF702B6FFBEABCCE816F5188FAF219AAB645DA0A8BA60E2AA31E4E053E3
3,034,312 UART: [art] SIG.S = D6CBEF1E93E61C64123C843860D310E9DE08D0F179356760DE8D5B4EFDC62A74226DCFC2353B8F7821685D6E775458B1
3,058,153 UART: Caliptra RT
3,058,496 UART: [state] CFI Enabled
3,178,711 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,981 UART: [rt]cmd =0x46505344, len=4
3,317,430 >>> mbox cmd response data (8 bytes)
3,317,431 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,317,467 UART: Fatal Error: 0x000E0008
3,318,590 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,650 UART: [state] LifecycleState = Unprovisioned
86,305 UART: [state] DebugLocked = No
87,017 UART: [state] WD Timer not started. Device not locked for debugging
88,240 UART: [kat] SHA2-256
893,890 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,015 UART: [kat] ++
898,167 UART: [kat] sha1
902,485 UART: [kat] SHA2-256
904,425 UART: [kat] SHA2-384
907,230 UART: [kat] SHA2-512-ACC
909,131 UART: [kat] ECC-384
918,494 UART: [kat] HMAC-384Kdf
923,100 UART: [kat] LMS
1,171,428 UART: [kat] --
1,172,227 UART: [cold-reset] ++
1,172,667 UART: [fht] FHT @ 0x50003400
1,175,310 UART: [idev] ++
1,175,478 UART: [idev] CDI.KEYID = 6
1,175,838 UART: [idev] SUBJECT.KEYID = 7
1,176,262 UART: [idev] UDS.KEYID = 0
1,176,607 ready_for_fw is high
1,176,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,026 UART: [idev] Erasing UDS.KEYID = 0
1,200,765 UART: [idev] Sha1 KeyId Algorithm
1,209,141 UART: [idev] --
1,210,111 UART: [ldev] ++
1,210,279 UART: [ldev] CDI.KEYID = 6
1,210,642 UART: [ldev] SUBJECT.KEYID = 5
1,211,068 UART: [ldev] AUTHORITY.KEYID = 7
1,211,531 UART: [ldev] FE.KEYID = 1
1,216,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,693 UART: [ldev] --
1,282,026 UART: [fwproc] Wait for Commands...
1,282,718 UART: [fwproc] Recv command 0x46574c44
1,283,446 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,120 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,290 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,507 >>> mbox cmd response: success
2,826,507 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,827,761 UART: [afmc] ++
2,827,929 UART: [afmc] CDI.KEYID = 6
2,828,291 UART: [afmc] SUBJECT.KEYID = 7
2,828,716 UART: [afmc] AUTHORITY.KEYID = 5
2,863,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,812 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,521 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,404 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,105 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,781 UART: [afmc] --
2,906,849 UART: [cold-reset] --
2,907,865 UART: [state] Locking Datavault
2,908,852 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,456 UART: [state] Locking ICCM
2,909,882 UART: [exit] Launching FMC @ 0x40000130
2,915,212 UART:
2,915,228 UART: Running Caliptra FMC ...
2,915,636 UART:
2,915,690 UART: [state] CFI Enabled
2,926,142 UART: [fht] FMC Alias Private Key: 7
3,044,922 UART: [art] Extend RT PCRs Done
3,045,350 UART: [art] Lock RT PCRs Done
3,046,772 UART: [art] Populate DV Done
3,054,913 UART: [fht] FMC Alias Private Key: 7
3,056,013 UART: [art] Derive CDI
3,056,293 UART: [art] Store in slot 0x4
3,141,834 UART: [art] Derive Key Pair
3,142,194 UART: [art] Store priv key in slot 0x5
3,155,950 UART: [art] Derive Key Pair - Done
3,170,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,918 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,683 UART: [art] PUB.X = C9F3588650DA6BEF5834ED063494D7806BE6B7EA239CD941700F9BF303A4FA8C729D53D4C88D0621B7403F6B20295FC6
3,193,445 UART: [art] PUB.Y = 4540E4E96FA89DB962A06699923F50857AED7635C17A8FD99D3C832567BC0D7F1A108E976BB37DDFB3C7DD087B57CA88
3,200,397 UART: [art] SIG.R = DE8E5BFE996092E5653C58E3F3B0A6987E7A95FD1712FFE1AC049D5D57E7F5D528DAA0DED0470CE7D2340F663076FA1B
3,207,174 UART: [art] SIG.S = 6A047967E98315B04725FE2C484EEFCB8ED91D00BF0084A19DB9C8C632FDD2B12F2D8EFF9983D1B59072DF9026D873EC
3,230,785 UART: Caliptra RT
3,231,036 UART: [state] CFI Enabled
3,352,035 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,413 UART: [rt]cmd =0x46505344, len=4
3,490,804 >>> mbox cmd response data (8 bytes)
3,490,805 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,490,841 UART: Fatal Error: 0x000E0008
3,491,964 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,959 ready_for_fw is high
1,060,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,700 >>> mbox cmd response: success
2,679,700 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,742,567 UART:
2,742,583 UART: Running Caliptra FMC ...
2,742,991 UART:
2,743,045 UART: [state] CFI Enabled
2,753,665 UART: [fht] FMC Alias Private Key: 7
2,872,311 UART: [art] Extend RT PCRs Done
2,872,739 UART: [art] Lock RT PCRs Done
2,874,085 UART: [art] Populate DV Done
2,882,342 UART: [fht] FMC Alias Private Key: 7
2,883,284 UART: [art] Derive CDI
2,883,564 UART: [art] Store in slot 0x4
2,969,843 UART: [art] Derive Key Pair
2,970,203 UART: [art] Store priv key in slot 0x5
2,983,451 UART: [art] Derive Key Pair - Done
2,998,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,434 UART: [art] PUB.X = BC3B2EF88807D94B3B7C73F3D014D8C78A1B4739255E892794ADB16F83954EBB590649B6C755D234EF40125F9E51FC50
3,021,200 UART: [art] PUB.Y = 4859846BE05B3B555EA1D93481AF770DD38311C4888A692543C8BC996B4085C5E05940304502E5CC4BB0F192D5EE02F6
3,028,137 UART: [art] SIG.R = D59EF8227443A4230FFBD7ED2313EBB68060DBBDF3AB620BA5B2D19506DD3C262B9D096A18C430A8FF367B76029DC5FC
3,034,908 UART: [art] SIG.S = 85A3AC2D79B5AB953B0381576034912D922C31E981B3BAD91A888D6DEF41684872EB7DAB446D06B97F5649F6E3D3C918
3,058,844 UART: Caliptra RT
3,059,095 UART: [state] CFI Enabled
3,178,011 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,607 UART: [rt]cmd =0x46505344, len=4
3,317,400 >>> mbox cmd response data (8 bytes)
3,317,401 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,317,437 UART: Fatal Error: 0x000E0008
3,318,560 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,539 UART: [kat] SHA2-256
893,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,314 UART: [kat] ++
897,466 UART: [kat] sha1
901,854 UART: [kat] SHA2-256
903,794 UART: [kat] SHA2-384
906,617 UART: [kat] SHA2-512-ACC
908,518 UART: [kat] ECC-384
918,455 UART: [kat] HMAC-384Kdf
922,953 UART: [kat] LMS
1,171,281 UART: [kat] --
1,172,470 UART: [cold-reset] ++
1,172,970 UART: [fht] FHT @ 0x50003400
1,175,675 UART: [idev] ++
1,175,843 UART: [idev] CDI.KEYID = 6
1,176,203 UART: [idev] SUBJECT.KEYID = 7
1,176,627 UART: [idev] UDS.KEYID = 0
1,176,972 ready_for_fw is high
1,176,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,665 UART: [idev] Erasing UDS.KEYID = 0
1,201,704 UART: [idev] Sha1 KeyId Algorithm
1,210,232 UART: [idev] --
1,211,350 UART: [ldev] ++
1,211,518 UART: [ldev] CDI.KEYID = 6
1,211,881 UART: [ldev] SUBJECT.KEYID = 5
1,212,307 UART: [ldev] AUTHORITY.KEYID = 7
1,212,770 UART: [ldev] FE.KEYID = 1
1,218,106 UART: [ldev] Erasing FE.KEYID = 1
1,244,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,098 UART: [ldev] --
1,284,575 UART: [fwproc] Wait for Commands...
1,285,399 UART: [fwproc] Recv command 0x46574c44
1,286,127 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,423 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,593 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,926 >>> mbox cmd response: success
2,829,926 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,830,952 UART: [afmc] ++
2,831,120 UART: [afmc] CDI.KEYID = 6
2,831,482 UART: [afmc] SUBJECT.KEYID = 7
2,831,907 UART: [afmc] AUTHORITY.KEYID = 5
2,867,694 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,831 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,540 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,423 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,124 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,948 UART: [afmc] --
2,910,932 UART: [cold-reset] --
2,911,816 UART: [state] Locking Datavault
2,913,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,665 UART: [state] Locking ICCM
2,914,279 UART: [exit] Launching FMC @ 0x40000130
2,919,609 UART:
2,919,625 UART: Running Caliptra FMC ...
2,920,033 UART:
2,920,176 UART: [state] CFI Enabled
2,931,070 UART: [fht] FMC Alias Private Key: 7
3,049,600 UART: [art] Extend RT PCRs Done
3,050,028 UART: [art] Lock RT PCRs Done
3,051,494 UART: [art] Populate DV Done
3,059,737 UART: [fht] FMC Alias Private Key: 7
3,060,787 UART: [art] Derive CDI
3,061,067 UART: [art] Store in slot 0x4
3,146,684 UART: [art] Derive Key Pair
3,147,044 UART: [art] Store priv key in slot 0x5
3,161,052 UART: [art] Derive Key Pair - Done
3,176,077 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,069 UART: [art] PUB.X = A1D0584024AFC1D099E17350A2CE4A7D2F89450337A9E94A52DD610F7ECF67B6B8D58F65372F44B6B1205E51C12E829E
3,198,837 UART: [art] PUB.Y = 1038F35E4B8B2657C03404643C01CC69F3C6F1D9326D1BC456A2D9B3BD8AADB95FCDD8B5FE243204FBF862CC17665277
3,205,788 UART: [art] SIG.R = EAA2480AC74942371FECC513E7F1F397609D8949A1518BAD031E7776846386E567C554CAAAD960C9F106E2E32233804A
3,212,547 UART: [art] SIG.S = 05EE9EB4D182C5B974114A426680CFE9DF3F5327E02B0428EDCA4E10BA29DA25EAA9E5BA5BD938DD00DBC43259AEC864
3,235,965 UART: Caliptra RT
3,236,308 UART: [state] CFI Enabled
3,356,273 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,837 UART: [rt]cmd =0x46505344, len=4
3,495,612 >>> mbox cmd response data (8 bytes)
3,495,613 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,495,649 UART: Fatal Error: 0x000E0008
3,496,772 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,020 ready_for_fw is high
1,060,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,735 >>> mbox cmd response: success
2,677,735 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,739,026 UART:
2,739,042 UART: Running Caliptra FMC ...
2,739,450 UART:
2,739,593 UART: [state] CFI Enabled
2,750,235 UART: [fht] FMC Alias Private Key: 7
2,869,419 UART: [art] Extend RT PCRs Done
2,869,847 UART: [art] Lock RT PCRs Done
2,871,507 UART: [art] Populate DV Done
2,879,900 UART: [fht] FMC Alias Private Key: 7
2,881,060 UART: [art] Derive CDI
2,881,340 UART: [art] Store in slot 0x4
2,967,139 UART: [art] Derive Key Pair
2,967,499 UART: [art] Store priv key in slot 0x5
2,980,641 UART: [art] Derive Key Pair - Done
2,995,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,727 UART: [art] PUB.X = 7F00602AB83865A556DE10159CC3B3A54D818D5CD6059272BDE2FB955D5522569FDCC6C92403C38876CA573C99EF3CA4
3,018,473 UART: [art] PUB.Y = F50182CB75991257A3D461EB40D23DA4F12D3698ABF9FD6B8C918C5DCA1A597A60F73160B283D0A132F88B8582F7BD6C
3,025,428 UART: [art] SIG.R = 36350F53BEB954549112232987AD1A1C3C6D9D8F06E6DDABD13864774E91F679B31D3E7F171FB9182179FA0E80137260
3,032,185 UART: [art] SIG.S = 06C523F62CED6AA9C13677996665D49F1F339DB92CAC11EF9D7606AD8AD07759EC6C2DB0D699A2266A4368C518359BFF
3,055,193 UART: Caliptra RT
3,055,536 UART: [state] CFI Enabled
3,175,102 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,424 UART: [rt]cmd =0x46505344, len=4
3,314,073 >>> mbox cmd response data (8 bytes)
3,314,074 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,314,110 UART: Fatal Error: 0x000E0008
3,315,233 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
192,004 UART:
192,373 UART: Running Caliptra ROM ...
193,510 UART:
193,659 UART: [state] CFI Enabled
265,078 UART: [state] LifecycleState = Unprovisioned
267,016 UART: [state] DebugLocked = No
268,352 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,445 UART: [kat] SHA2-256
442,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,637 UART: [kat] ++
453,111 UART: [kat] sha1
464,628 UART: [kat] SHA2-256
467,288 UART: [kat] SHA2-384
473,706 UART: [kat] SHA2-512-ACC
476,075 UART: [kat] ECC-384
2,769,116 UART: [kat] HMAC-384Kdf
2,801,532 UART: [kat] LMS
3,991,890 UART: [kat] --
3,994,753 UART: [cold-reset] ++
3,996,395 UART: [fht] Storing FHT @ 0x50003400
4,007,943 UART: [idev] ++
4,008,529 UART: [idev] CDI.KEYID = 6
4,009,489 UART: [idev] SUBJECT.KEYID = 7
4,010,738 UART: [idev] UDS.KEYID = 0
4,011,696 ready_for_fw is high
4,011,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,939 UART: [idev] Erasing UDS.KEYID = 0
7,350,745 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,498 UART: [idev] --
7,377,897 UART: [ldev] ++
7,378,519 UART: [ldev] CDI.KEYID = 6
7,379,415 UART: [ldev] SUBJECT.KEYID = 5
7,380,636 UART: [ldev] AUTHORITY.KEYID = 7
7,381,867 UART: [ldev] FE.KEYID = 1
7,425,352 UART: [ldev] Erasing FE.KEYID = 1
10,755,899 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,133 UART: [ldev] --
13,119,852 UART: [fwproc] Waiting for Commands...
13,122,914 UART: [fwproc] Received command 0x46574c44
13,125,102 UART: [fwproc] Received Image of size 118548 bytes
17,228,500 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,119 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,295 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,702,680 >>> mbox cmd response: success
17,703,821 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,706,777 UART: [afmc] ++
17,707,365 UART: [afmc] CDI.KEYID = 6
17,708,250 UART: [afmc] SUBJECT.KEYID = 7
17,709,524 UART: [afmc] AUTHORITY.KEYID = 5
21,075,991 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,921 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,181 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,635 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,351 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,774 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,274 UART: [afmc] --
23,443,783 UART: [cold-reset] --
23,447,641 UART: [state] Locking Datavault
23,453,051 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,813 UART: [state] Locking ICCM
23,456,103 UART: [exit] Launching FMC @ 0x40000130
23,464,467 UART:
23,464,732 UART: Running Caliptra FMC ...
23,465,842 UART:
23,465,998 UART: [state] CFI Enabled
23,534,236 UART: [fht] FMC Alias Private Key: 7
25,874,031 UART: [art] Extend RT PCRs Done
25,875,254 UART: [art] Lock RT PCRs Done
25,876,770 UART: [art] Populate DV Done
25,882,182 UART: [fht] FMC Alias Private Key: 7
25,883,826 UART: [art] Derive CDI
25,884,641 UART: [art] Store in slot 0x4
25,943,713 UART: [art] Derive Key Pair
25,944,749 UART: [art] Store priv key in slot 0x5
29,237,039 UART: [art] Derive Key Pair - Done
29,249,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,906 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,413 UART: [art] PUB.X = F7579ECC88407CF15BCAF1A212945B6B6FC3DD6519322E034232DF41099E2DC9238D32B74C1FD4EF10B7D6AB3699D5A3
31,546,678 UART: [art] PUB.Y = 9C109862A91D6C3DC9F831F5DBB7C809EAEBBCCD4A61BD17631D1B6587BC9F30F0D3730369E132C6DD92D3C842363A8F
31,553,975 UART: [art] SIG.R = 691B0B28253C5B72294316847CED0A3DA830E659864AB1622283896180829040E4900648FA26501443187518E970CB68
31,561,338 UART: [art] SIG.S = 833E38798B7F779A6E79541D522E3F07898C271F649FC7C66BDA1B23A4F75BD1736D71CEE3667334418A51372622A462
32,866,499 UART: Caliptra RT
32,867,217 UART: [state] CFI Enabled
33,062,913 UART: [rt] RT listening for mailbox commands...
33,094,504 UART: [rt]cmd =0x46505652, len=4
33,095,753 UART: [rt] FIPS Version
33,096,866 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,787,368 ready_for_fw is high
3,787,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,960,080 >>> mbox cmd response: success
17,961,494 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,654,323 UART:
23,654,717 UART: Running Caliptra FMC ...
23,655,864 UART:
23,656,031 UART: [state] CFI Enabled
23,723,310 UART: [fht] FMC Alias Private Key: 7
26,064,140 UART: [art] Extend RT PCRs Done
26,065,369 UART: [art] Lock RT PCRs Done
26,066,944 UART: [art] Populate DV Done
26,072,477 UART: [fht] FMC Alias Private Key: 7
26,073,985 UART: [art] Derive CDI
26,074,804 UART: [art] Store in slot 0x4
26,131,934 UART: [art] Derive Key Pair
26,132,978 UART: [art] Store priv key in slot 0x5
29,425,614 UART: [art] Derive Key Pair - Done
29,438,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,726,960 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,472 UART: [art] PUB.X = 7CECAD5F1404C6F852B0F324B042C164D933804B56473FF21765530E86B8329301B7AFEA84381F5B37C8F24F83F4E4AF
31,735,787 UART: [art] PUB.Y = 0697FF0450F9F3F504FD4748CD29978A273AA2D222BB97CD507CC5DE0E215F77ED3AFBD87114B57FF431494A77316792
31,743,034 UART: [art] SIG.R = D1D767F260636D6B084678FCB6DC391CFEF3D26BDD36098856EA80027E46E7AB023FBD348CC8D535E64E4A16B68BDEF6
31,750,435 UART: [art] SIG.S = 9ECE563704EC6E3D4C8B8ADFE2EF85C7BAEFB98DACBAE5CAF4E18B16280857E5E4440B8059FCD7AF9951EC3D535634EC
33,056,130 UART: Caliptra RT
33,056,838 UART: [state] CFI Enabled
33,252,796 UART: [rt] RT listening for mailbox commands...
33,284,121 UART: [rt]cmd =0x46505652, len=4
33,285,376 UART: [rt] FIPS Version
33,286,558 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
193,378 UART:
193,738 UART: Running Caliptra ROM ...
194,935 UART:
604,800 UART: [state] CFI Enabled
617,614 UART: [state] LifecycleState = Unprovisioned
619,477 UART: [state] DebugLocked = No
621,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,014 UART: [kat] SHA2-256
795,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,263 UART: [kat] ++
806,790 UART: [kat] sha1
817,448 UART: [kat] SHA2-256
820,174 UART: [kat] SHA2-384
825,807 UART: [kat] SHA2-512-ACC
828,168 UART: [kat] ECC-384
3,112,573 UART: [kat] HMAC-384Kdf
3,124,683 UART: [kat] LMS
4,314,803 UART: [kat] --
4,320,574 UART: [cold-reset] ++
4,321,579 UART: [fht] Storing FHT @ 0x50003400
4,332,376 UART: [idev] ++
4,333,032 UART: [idev] CDI.KEYID = 6
4,333,955 UART: [idev] SUBJECT.KEYID = 7
4,335,131 UART: [idev] UDS.KEYID = 0
4,336,205 ready_for_fw is high
4,336,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,369 UART: [idev] Erasing UDS.KEYID = 0
7,621,233 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,362 UART: [idev] --
7,647,890 UART: [ldev] ++
7,648,518 UART: [ldev] CDI.KEYID = 6
7,649,439 UART: [ldev] SUBJECT.KEYID = 5
7,650,648 UART: [ldev] AUTHORITY.KEYID = 7
7,651,930 UART: [ldev] FE.KEYID = 1
7,664,833 UART: [ldev] Erasing FE.KEYID = 1
10,954,769 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,445 UART: [ldev] --
13,314,364 UART: [fwproc] Waiting for Commands...
13,316,776 UART: [fwproc] Received command 0x46574c44
13,319,005 UART: [fwproc] Received Image of size 118548 bytes
17,422,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,371 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,510 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,414 >>> mbox cmd response: success
17,907,458 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,910,067 UART: [afmc] ++
17,910,644 UART: [afmc] CDI.KEYID = 6
17,911,602 UART: [afmc] SUBJECT.KEYID = 7
17,912,870 UART: [afmc] AUTHORITY.KEYID = 5
21,228,050 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,650 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,894 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,336 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,087 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,507 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,381 UART: [afmc] --
23,592,020 UART: [cold-reset] --
23,595,171 UART: [state] Locking Datavault
23,601,113 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,824 UART: [state] Locking ICCM
23,604,122 UART: [exit] Launching FMC @ 0x40000130
23,612,489 UART:
23,612,727 UART: Running Caliptra FMC ...
23,613,747 UART:
23,613,892 UART: [state] CFI Enabled
23,621,879 UART: [fht] FMC Alias Private Key: 7
25,962,492 UART: [art] Extend RT PCRs Done
25,963,720 UART: [art] Lock RT PCRs Done
25,965,234 UART: [art] Populate DV Done
25,970,587 UART: [fht] FMC Alias Private Key: 7
25,972,172 UART: [art] Derive CDI
25,972,981 UART: [art] Store in slot 0x4
26,015,786 UART: [art] Derive Key Pair
26,016,824 UART: [art] Store priv key in slot 0x5
29,258,819 UART: [art] Derive Key Pair - Done
29,271,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,507 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,009 UART: [art] PUB.X = F28A9B9369A0A0063A0712DF56020DBD1D6893C1FCE2D2296DFB89C5536FCED94BAD05DE91D5859813992EEF548B3B9B
31,561,323 UART: [art] PUB.Y = D882FA2555B37DC2D7E77371C92BEBC405C7063B346E539284F9218A688A05991F74F8CDCB53827D484FB5C01E26F67C
31,568,562 UART: [art] SIG.R = 9F3F85E497B4C8560BA2D168E5465E759F6C630388FCB6EAD693EA959A5BE5AFDF6238C71CB10ECDAB589D4E41B3CFE5
31,575,965 UART: [art] SIG.S = 398C1327CDC948F2E4E51D813F6A01AE0319077936E98A807A3498C299404024339729CB03FB1A3D488A350F2E48DCAC
32,880,936 UART: Caliptra RT
32,881,650 UART: [state] CFI Enabled
33,015,572 UART: [rt] RT listening for mailbox commands...
33,046,816 UART: [rt]cmd =0x46505652, len=4
33,048,117 UART: [rt] FIPS Version
33,049,556 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
4,130,245 ready_for_fw is high
4,130,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,166,437 >>> mbox cmd response: success
18,167,774 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,807,081 UART:
23,807,498 UART: Running Caliptra FMC ...
23,808,606 UART:
23,808,762 UART: [state] CFI Enabled
23,816,870 UART: [fht] FMC Alias Private Key: 7
26,156,758 UART: [art] Extend RT PCRs Done
26,157,997 UART: [art] Lock RT PCRs Done
26,159,411 UART: [art] Populate DV Done
26,164,993 UART: [fht] FMC Alias Private Key: 7
26,166,596 UART: [art] Derive CDI
26,167,329 UART: [art] Store in slot 0x4
26,210,180 UART: [art] Derive Key Pair
26,211,166 UART: [art] Store priv key in slot 0x5
29,452,796 UART: [art] Derive Key Pair - Done
29,465,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,796 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,310 UART: [art] PUB.X = 8C827DB649C415CCE6CEBC87C6FA83117041516D2DEF0065FF02A66D25B49B96168A2F8D54F6077F540095C80734DAF1
31,754,557 UART: [art] PUB.Y = 469F4A3177A0C5F183DDEDB78D1177420370FFEB3977493D6B628EB2CBDD6CEE80D68332424E197AF731096CFEBACE21
31,761,804 UART: [art] SIG.R = AC00872C99F782B8AAE36A092C0A15EC2D69577D799EE08AA17EB43BDF2E4917FC4C5DEDAA7617A8EC2A6682F7116C1A
31,769,193 UART: [art] SIG.S = C9D802FA593332318421EFDC4B2C4BEC4AC7841386354B71A091C3C0299852E3B110465C1B396ACDFBC8C9A27418551A
33,074,457 UART: Caliptra RT
33,075,185 UART: [state] CFI Enabled
33,209,517 UART: [rt] RT listening for mailbox commands...
33,240,680 UART: [rt]cmd =0x46505652, len=4
33,241,983 UART: [rt] FIPS Version
33,243,256 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,376 UART:
193,312 UART: Running Caliptra ROM ...
194,450 UART:
194,622 UART: [state] CFI Enabled
266,427 UART: [state] LifecycleState = Unprovisioned
268,439 UART: [state] DebugLocked = No
270,548 UART: [state] WD Timer not started. Device not locked for debugging
275,035 UART: [kat] SHA2-256
454,702 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,435 UART: [kat] ++
465,909 UART: [kat] sha1
477,636 UART: [kat] SHA2-256
480,294 UART: [kat] SHA2-384
485,926 UART: [kat] SHA2-512-ACC
488,302 UART: [kat] ECC-384
2,952,193 UART: [kat] HMAC-384Kdf
2,973,464 UART: [kat] LMS
3,450,004 UART: [kat] --
3,454,288 UART: [cold-reset] ++
3,456,800 UART: [fht] FHT @ 0x50003400
3,467,044 UART: [idev] ++
3,467,632 UART: [idev] CDI.KEYID = 6
3,468,620 UART: [idev] SUBJECT.KEYID = 7
3,469,793 UART: [idev] UDS.KEYID = 0
3,470,837 ready_for_fw is high
3,471,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,212 UART: [idev] Erasing UDS.KEYID = 0
5,986,413 UART: [idev] Sha1 KeyId Algorithm
6,010,670 UART: [idev] --
6,015,918 UART: [ldev] ++
6,016,491 UART: [ldev] CDI.KEYID = 6
6,017,611 UART: [ldev] SUBJECT.KEYID = 5
6,018,784 UART: [ldev] AUTHORITY.KEYID = 7
6,019,946 UART: [ldev] FE.KEYID = 1
6,064,536 UART: [ldev] Erasing FE.KEYID = 1
8,572,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,307,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,323,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,338,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,354,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,376,384 UART: [ldev] --
10,381,211 UART: [fwproc] Wait for Commands...
10,382,821 UART: [fwproc] Recv command 0x46574c44
10,384,800 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,383 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,398 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,062 >>> mbox cmd response: success
14,342,217 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,346,030 UART: [afmc] ++
14,346,624 UART: [afmc] CDI.KEYID = 6
14,347,606 UART: [afmc] SUBJECT.KEYID = 7
14,348,764 UART: [afmc] AUTHORITY.KEYID = 5
16,879,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,604,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,606,527 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,622,311 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,638,393 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,653,938 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,677,507 UART: [afmc] --
18,681,918 UART: [cold-reset] --
18,685,502 UART: [state] Locking Datavault
18,690,268 UART: [state] Locking PCR0, PCR1 and PCR31
18,692,018 UART: [state] Locking ICCM
18,693,413 UART: [exit] Launching FMC @ 0x40000130
18,701,802 UART:
18,702,034 UART: Running Caliptra FMC ...
18,703,153 UART:
18,703,317 UART: [state] CFI Enabled
18,760,898 UART: [fht] FMC Alias Private Key: 7
20,528,049 UART: [art] Extend RT PCRs Done
20,529,279 UART: [art] Lock RT PCRs Done
20,531,117 UART: [art] Populate DV Done
20,536,418 UART: [fht] FMC Alias Private Key: 7
20,538,111 UART: [art] Derive CDI
20,538,921 UART: [art] Store in slot 0x4
20,593,884 UART: [art] Derive Key Pair
20,594,925 UART: [art] Store priv key in slot 0x5
23,057,667 UART: [art] Derive Key Pair - Done
23,070,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,783,727 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,227 UART: [art] PUB.X = 72E40FDF252E64DF51FAA23EDDE6D49FD5BE63ECB63C64B3E5FB9BF290101D86499B309A27DCAF9ED9087747FEC86EE1
24,792,529 UART: [art] PUB.Y = 4D3BE2460E9A4FAD4B7ACFCCC5E8E641AAEA1D1DD95C1031EDC4D30C67F76A033CA5F180F4B0E54ED2728C11CB430B55
24,799,779 UART: [art] SIG.R = 6A73D011E11963C91375E066E097D873CB1A24BAB13D121CD8B3D78390448CB6B5AD8B4359772B4511421407F77EC137
24,807,171 UART: [art] SIG.S = 6B52D24ED59091D5FA58B2BBF227459208C5A66CE696DE501705C39DCCB15057D3CFE92572EFEB0252E3359C0A02520E
25,786,033 UART: Caliptra RT
25,786,749 UART: [state] CFI Enabled
25,966,322 UART: [rt] RT listening for mailbox commands...
25,997,626 UART: [rt]cmd =0x46505652, len=4
25,998,865 UART: [rt] FIPS Version
26,000,129 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,459,394 ready_for_fw is high
3,459,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,242,445 >>> mbox cmd response: success
14,243,947 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,536,913 UART:
18,537,301 UART: Running Caliptra FMC ...
18,538,508 UART:
18,538,671 UART: [state] CFI Enabled
18,602,670 UART: [fht] FMC Alias Private Key: 7
20,369,509 UART: [art] Extend RT PCRs Done
20,370,794 UART: [art] Lock RT PCRs Done
20,372,369 UART: [art] Populate DV Done
20,377,623 UART: [fht] FMC Alias Private Key: 7
20,379,268 UART: [art] Derive CDI
20,380,083 UART: [art] Store in slot 0x4
20,434,571 UART: [art] Derive Key Pair
20,435,605 UART: [art] Store priv key in slot 0x5
22,897,925 UART: [art] Derive Key Pair - Done
22,910,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,673 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,178 UART: [art] PUB.X = 5C7ACBBB2317C75DACFEBE3E643E6D3B7B029AC5997689BE223635CC02A74B9D5D36CCB6E0ADDC527A97B96541D8F9FA
24,632,428 UART: [art] PUB.Y = 6BDBC2857421DC0FFF421969234DA9DCE69D4BAC0BFE1BDBCF0D869BEEC71BE2F7E1583844DA4BDAFA87712B50734165
24,639,736 UART: [art] SIG.R = F33E630384EF941A316BBE2FC0971F797E09EA90F69A7DD188DC53D472DE6E24C4F81E86DAF925D2B08F480ABCAE554B
24,647,125 UART: [art] SIG.S = AF4AFECBEA6B193D0FE41A97F95DF49578289ABC62EB347B5BB3D35B9AE6C25B14EE6B7D45BE910F7421C592C4A3B4C1
25,625,457 UART: Caliptra RT
25,626,161 UART: [state] CFI Enabled
25,806,863 UART: [rt] RT listening for mailbox commands...
25,838,219 UART: [rt]cmd =0x46505652, len=4
25,839,461 UART: [rt] FIPS Version
25,840,675 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
192,217 UART:
192,581 UART: Running Caliptra ROM ...
193,715 UART:
603,417 UART: [state] CFI Enabled
614,742 UART: [state] LifecycleState = Unprovisioned
616,687 UART: [state] DebugLocked = No
618,715 UART: [state] WD Timer not started. Device not locked for debugging
621,981 UART: [kat] SHA2-256
801,652 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,406 UART: [kat] ++
812,909 UART: [kat] sha1
824,215 UART: [kat] SHA2-256
826,870 UART: [kat] SHA2-384
832,262 UART: [kat] SHA2-512-ACC
834,611 UART: [kat] ECC-384
3,275,757 UART: [kat] HMAC-384Kdf
3,288,815 UART: [kat] LMS
3,765,265 UART: [kat] --
3,769,757 UART: [cold-reset] ++
3,771,339 UART: [fht] FHT @ 0x50003400
3,782,243 UART: [idev] ++
3,782,809 UART: [idev] CDI.KEYID = 6
3,783,718 UART: [idev] SUBJECT.KEYID = 7
3,784,969 UART: [idev] UDS.KEYID = 0
3,786,021 ready_for_fw is high
3,786,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,117 UART: [idev] Erasing UDS.KEYID = 0
6,263,856 UART: [idev] Sha1 KeyId Algorithm
6,287,178 UART: [idev] --
6,293,303 UART: [ldev] ++
6,293,914 UART: [ldev] CDI.KEYID = 6
6,294,806 UART: [ldev] SUBJECT.KEYID = 5
6,296,022 UART: [ldev] AUTHORITY.KEYID = 7
6,297,261 UART: [ldev] FE.KEYID = 1
6,307,049 UART: [ldev] Erasing FE.KEYID = 1
8,784,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,021 UART: [ldev] --
10,579,913 UART: [fwproc] Wait for Commands...
10,582,515 UART: [fwproc] Recv command 0x46574c44
10,584,511 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,979 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,992 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,505 >>> mbox cmd response: success
14,554,668 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,556,755 UART: [afmc] ++
14,557,344 UART: [afmc] CDI.KEYID = 6
14,558,363 UART: [afmc] SUBJECT.KEYID = 7
14,559,525 UART: [afmc] AUTHORITY.KEYID = 5
17,064,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,659 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,475 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,547 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,187 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,600 UART: [afmc] --
18,865,843 UART: [cold-reset] --
18,868,888 UART: [state] Locking Datavault
18,874,140 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,842 UART: [state] Locking ICCM
18,877,077 UART: [exit] Launching FMC @ 0x40000130
18,885,475 UART:
18,885,719 UART: Running Caliptra FMC ...
18,886,819 UART:
18,886,984 UART: [state] CFI Enabled
18,894,757 UART: [fht] FMC Alias Private Key: 7
20,660,891 UART: [art] Extend RT PCRs Done
20,662,113 UART: [art] Lock RT PCRs Done
20,663,793 UART: [art] Populate DV Done
20,668,988 UART: [fht] FMC Alias Private Key: 7
20,670,521 UART: [art] Derive CDI
20,671,271 UART: [art] Store in slot 0x4
20,714,430 UART: [art] Derive Key Pair
20,715,438 UART: [art] Store priv key in slot 0x5
23,141,941 UART: [art] Derive Key Pair - Done
23,154,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,010 UART: [art] Erasing AUTHORITY.KEYID = 7
24,862,518 UART: [art] PUB.X = BE65ECE944C54DB09E875A30C9DED404618E15E0228334A433C43CC74FB6171E7373AC25BC4CCE4597D8EFF7722FEA92
24,869,827 UART: [art] PUB.Y = 7112B87BF50CEC85A00D1BEE417DF5453B0670794D4C5ED6FA209DA31951D76E36F62440C69C6FA349A97652C4F4B166
24,877,054 UART: [art] SIG.R = 15635B964278CA49E3D7DB4DC03E3E5DF2945F18CB939D85D9AF5F81E2FD73CBC769E3A147F466F5B0E7C6675258F94F
24,884,504 UART: [art] SIG.S = 8C356F5EBE13BB61FE6344190793AC64C03D815ED9C88F6E7E19A5A9CBDEBC0EED3D6EB54BBBA943BC24BE1438862517
25,863,627 UART: Caliptra RT
25,864,340 UART: [state] CFI Enabled
25,996,848 UART: [rt] RT listening for mailbox commands...
26,028,103 UART: [rt]cmd =0x46505652, len=4
26,029,358 UART: [rt] FIPS Version
26,030,741 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,779,852 ready_for_fw is high
3,780,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,457,628 >>> mbox cmd response: success
14,458,841 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,708,743 UART:
18,709,128 UART: Running Caliptra FMC ...
18,710,325 UART:
18,710,491 UART: [state] CFI Enabled
18,718,538 UART: [fht] FMC Alias Private Key: 7
20,484,823 UART: [art] Extend RT PCRs Done
20,486,071 UART: [art] Lock RT PCRs Done
20,487,768 UART: [art] Populate DV Done
20,493,022 UART: [fht] FMC Alias Private Key: 7
20,494,730 UART: [art] Derive CDI
20,495,550 UART: [art] Store in slot 0x4
20,538,092 UART: [art] Derive Key Pair
20,539,137 UART: [art] Store priv key in slot 0x5
22,965,480 UART: [art] Derive Key Pair - Done
22,978,361 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,684,773 UART: [art] Erasing AUTHORITY.KEYID = 7
24,686,415 UART: [art] PUB.X = AB23B5B24053ED42D4E555C84C300BE22FBB89C76E2B085C89879B2199FEE2FB4604E29101B91AB67D5245C507FEFCAF
24,693,575 UART: [art] PUB.Y = 88515690E0925399667D8A0B27705544ECF66E6E96F6BFE98B6EC7F75524226E24E21D074BC82C5050C22D4E2BFEDBA8
24,700,835 UART: [art] SIG.R = A59D3B770B4F2ED2F87C398193ED2131A321C39B1E184EF769DE6D9B61550306B0F7EC7ED31127974482E62D502C5C74
24,708,181 UART: [art] SIG.S = D2B81DA0067527F7C7632DEAD84F4A569FE2DD7D04C5C729AEED027676910A54BE40FBEDBAE49FA70F5C538930E7B8C7
25,687,484 UART: Caliptra RT
25,688,196 UART: [state] CFI Enabled
25,819,712 UART: [rt] RT listening for mailbox commands...
25,851,078 UART: [rt]cmd =0x46505652, len=4
25,852,326 UART: [rt] FIPS Version
25,853,534 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
192,015 UART:
192,377 UART: Running Caliptra ROM ...
193,482 UART:
193,627 UART: [state] CFI Enabled
260,888 UART: [state] LifecycleState = Unprovisioned
263,306 UART: [state] DebugLocked = No
264,546 UART: [state] WD Timer not started. Device not locked for debugging
268,508 UART: [kat] SHA2-256
458,373 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,173 UART: [kat] ++
469,622 UART: [kat] sha1
481,840 UART: [kat] SHA2-256
484,919 UART: [kat] SHA2-384
489,416 UART: [kat] SHA2-512-ACC
491,991 UART: [kat] ECC-384
2,947,782 UART: [kat] HMAC-384Kdf
2,971,095 UART: [kat] LMS
3,502,875 UART: [kat] --
3,506,752 UART: [cold-reset] ++
3,509,138 UART: [fht] FHT @ 0x50003400
3,520,471 UART: [idev] ++
3,521,103 UART: [idev] CDI.KEYID = 6
3,522,131 UART: [idev] SUBJECT.KEYID = 7
3,523,309 UART: [idev] UDS.KEYID = 0
3,524,239 ready_for_fw is high
3,524,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,056 UART: [idev] Erasing UDS.KEYID = 0
6,029,067 UART: [idev] Sha1 KeyId Algorithm
6,051,055 UART: [idev] --
6,057,048 UART: [ldev] ++
6,057,724 UART: [ldev] CDI.KEYID = 6
6,058,615 UART: [ldev] SUBJECT.KEYID = 5
6,059,823 UART: [ldev] AUTHORITY.KEYID = 7
6,060,998 UART: [ldev] FE.KEYID = 1
6,105,190 UART: [ldev] Erasing FE.KEYID = 1
8,608,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,184 UART: [ldev] --
10,416,392 UART: [fwproc] Wait for Commands...
10,419,618 UART: [fwproc] Recv command 0x46574c44
10,421,922 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,569 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,150 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,721 >>> mbox cmd response: success
14,680,787 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,683,375 UART: [afmc] ++
14,684,089 UART: [afmc] CDI.KEYID = 6
14,685,332 UART: [afmc] SUBJECT.KEYID = 7
14,686,771 UART: [afmc] AUTHORITY.KEYID = 5
17,216,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,312 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,388 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,543 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,422 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,982 UART: [afmc] --
19,012,735 UART: [cold-reset] --
19,017,784 UART: [state] Locking Datavault
19,023,736 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,906 UART: [state] Locking ICCM
19,027,449 UART: [exit] Launching FMC @ 0x40000130
19,036,117 UART:
19,036,373 UART: Running Caliptra FMC ...
19,037,521 UART:
19,037,687 UART: [state] CFI Enabled
19,097,133 UART: [fht] FMC Alias Private Key: 7
20,863,095 UART: [art] Extend RT PCRs Done
20,864,322 UART: [art] Lock RT PCRs Done
20,865,756 UART: [art] Populate DV Done
20,871,406 UART: [fht] FMC Alias Private Key: 7
20,873,053 UART: [art] Derive CDI
20,873,794 UART: [art] Store in slot 0x4
20,929,394 UART: [art] Derive Key Pair
20,930,393 UART: [art] Store priv key in slot 0x5
23,393,461 UART: [art] Derive Key Pair - Done
23,406,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,537 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,043 UART: [art] PUB.X = 19EA70981B7D744AA43E589EF2AA72CB22BC7923D0A799082BDA1C55CD5A9E46EC30F892D8FC8AB0D235376E2839020C
25,128,349 UART: [art] PUB.Y = 4ED8CB315CEF01ECA097FE7C167074600AE1A2207834B21FE5A86FFDD40BAE994D6F807FFA5C4D87DEE222044648EBD0
25,135,604 UART: [art] SIG.R = 52D565D90FA5DDC9DACCD2B57EBE11181C701CE09C8F134C4C225161E3AD27CAA75571B94D7829F40DC9D36D85E679CE
25,142,970 UART: [art] SIG.S = 43C30C5A4E1799DA19CDF3E4F5C90293A12791C20AD5B47967D6859259E7BC92C5144E301D80C902EAFF58B765CEE9FE
26,121,811 UART: Caliptra RT
26,122,501 UART: [state] CFI Enabled
26,303,026 UART: [rt] RT listening for mailbox commands...
26,334,692 UART: [rt]cmd =0x46505652, len=4
26,335,965 UART: [rt] FIPS Version
26,337,072 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,437,590 ready_for_fw is high
3,437,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,843,900 >>> mbox cmd response: success
14,845,267 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,132,212 UART:
19,132,598 UART: Running Caliptra FMC ...
19,133,740 UART:
19,133,897 UART: [state] CFI Enabled
19,201,227 UART: [fht] FMC Alias Private Key: 7
20,967,208 UART: [art] Extend RT PCRs Done
20,968,441 UART: [art] Lock RT PCRs Done
20,969,717 UART: [art] Populate DV Done
20,975,093 UART: [fht] FMC Alias Private Key: 7
20,976,807 UART: [art] Derive CDI
20,977,570 UART: [art] Store in slot 0x4
21,033,898 UART: [art] Derive Key Pair
21,034,947 UART: [art] Store priv key in slot 0x5
23,498,600 UART: [art] Derive Key Pair - Done
23,511,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,198 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,718 UART: [art] PUB.X = A663EC04969E31648A6A9E5CFA45825355AA2B31705955C2E75D1A27DF1548992CD9940323017D3DD85091EE5828E153
25,232,919 UART: [art] PUB.Y = 66995CA66C90ABC0C47B6FFA43DA7CE341E7024007CC78DB62AEE40D4623577241AA67B59673ABCD19BE1DE0E3573A3B
25,240,219 UART: [art] SIG.R = 4DA6DEFC35D239CB55C79AAF83BC21CD3AAB83E51C3AD4B75B6708BEB1C84C597F0D448C514D9D1BD8B84D65EEBC3D2C
25,247,669 UART: [art] SIG.S = 88B00059CCC3FCFEA530E03AC39964F04AE4EA0C3520E2FD094C77DB74E494C84F78AD96B895671CF5D7B53F14E5AB23
26,226,079 UART: Caliptra RT
26,226,777 UART: [state] CFI Enabled
26,408,874 UART: [rt] RT listening for mailbox commands...
26,440,293 UART: [rt]cmd =0x46505652, len=4
26,441,594 UART: [rt] FIPS Version
26,442,860 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,446 UART:
192,814 UART: Running Caliptra ROM ...
194,120 UART:
603,654 UART: [state] CFI Enabled
619,099 UART: [state] LifecycleState = Unprovisioned
621,509 UART: [state] DebugLocked = No
623,456 UART: [state] WD Timer not started. Device not locked for debugging
627,719 UART: [kat] SHA2-256
817,614 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,349 UART: [kat] ++
828,872 UART: [kat] sha1
839,979 UART: [kat] SHA2-256
843,029 UART: [kat] SHA2-384
849,963 UART: [kat] SHA2-512-ACC
852,494 UART: [kat] ECC-384
3,292,633 UART: [kat] HMAC-384Kdf
3,307,033 UART: [kat] LMS
3,838,876 UART: [kat] --
3,844,671 UART: [cold-reset] ++
3,847,109 UART: [fht] FHT @ 0x50003400
3,858,375 UART: [idev] ++
3,859,102 UART: [idev] CDI.KEYID = 6
3,860,070 UART: [idev] SUBJECT.KEYID = 7
3,861,246 UART: [idev] UDS.KEYID = 0
3,862,151 ready_for_fw is high
3,862,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,307 UART: [idev] Erasing UDS.KEYID = 0
6,338,327 UART: [idev] Sha1 KeyId Algorithm
6,359,758 UART: [idev] --
6,363,940 UART: [ldev] ++
6,364,636 UART: [ldev] CDI.KEYID = 6
6,365,524 UART: [ldev] SUBJECT.KEYID = 5
6,366,739 UART: [ldev] AUTHORITY.KEYID = 7
6,367,973 UART: [ldev] FE.KEYID = 1
6,377,442 UART: [ldev] Erasing FE.KEYID = 1
8,855,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,399 UART: [ldev] --
10,648,156 UART: [fwproc] Wait for Commands...
10,650,733 UART: [fwproc] Recv command 0x46574c44
10,653,043 UART: [fwproc] Recv'd Img size: 118548 bytes
14,157,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,238,811 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,362,435 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,922,901 >>> mbox cmd response: success
14,923,993 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,926,467 UART: [afmc] ++
14,927,221 UART: [afmc] CDI.KEYID = 6
14,928,326 UART: [afmc] SUBJECT.KEYID = 7
14,929,872 UART: [afmc] AUTHORITY.KEYID = 5
17,436,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,159,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,161,372 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,176,461 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,191,589 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,206,503 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,230,464 UART: [afmc] --
19,234,273 UART: [cold-reset] --
19,237,060 UART: [state] Locking Datavault
19,241,941 UART: [state] Locking PCR0, PCR1 and PCR31
19,244,154 UART: [state] Locking ICCM
19,245,625 UART: [exit] Launching FMC @ 0x40000130
19,254,311 UART:
19,254,553 UART: Running Caliptra FMC ...
19,255,610 UART:
19,255,764 UART: [state] CFI Enabled
19,263,703 UART: [fht] FMC Alias Private Key: 7
21,030,208 UART: [art] Extend RT PCRs Done
21,031,424 UART: [art] Lock RT PCRs Done
21,033,376 UART: [art] Populate DV Done
21,038,472 UART: [fht] FMC Alias Private Key: 7
21,040,179 UART: [art] Derive CDI
21,041,002 UART: [art] Store in slot 0x4
21,083,560 UART: [art] Derive Key Pair
21,084,607 UART: [art] Store priv key in slot 0x5
23,511,528 UART: [art] Derive Key Pair - Done
23,524,414 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,231,160 UART: [art] Erasing AUTHORITY.KEYID = 7
25,232,667 UART: [art] PUB.X = D422B0702C3429327DC51689CFE504F410BBC9D422C6CF0D00CF0E317C030BE8662463A8843A7C10274B026E8D508FB6
25,239,962 UART: [art] PUB.Y = D9CF77A2D96620E29C756E6646E229C38B57F8C14FA5DFEE8BF833161083F5B3A5C0A32FD3E74632A396BA31B387BD09
25,247,170 UART: [art] SIG.R = 6C7296C497B5EBD8BB4E01C5F97E69B114BFAB8E19C9D9FC2FA033454526D45C23AC9793D516DE12F953CC979532468B
25,254,583 UART: [art] SIG.S = 8A8BD41CB63E3BA4983D3C236E70BB6C26C65C85B3E0888350F37369E0D86E83EA7D0C74E2F2E79D8B306343954311A6
26,233,771 UART: Caliptra RT
26,234,460 UART: [state] CFI Enabled
26,368,230 UART: [rt] RT listening for mailbox commands...
26,399,830 UART: [rt]cmd =0x46505652, len=4
26,401,083 UART: [rt] FIPS Version
26,402,471 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,751,688 ready_for_fw is high
3,752,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,025,739 >>> mbox cmd response: success
15,027,451 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,275,835 UART:
19,276,238 UART: Running Caliptra FMC ...
19,277,353 UART:
19,277,511 UART: [state] CFI Enabled
19,285,324 UART: [fht] FMC Alias Private Key: 7
21,051,506 UART: [art] Extend RT PCRs Done
21,052,725 UART: [art] Lock RT PCRs Done
21,054,541 UART: [art] Populate DV Done
21,059,804 UART: [fht] FMC Alias Private Key: 7
21,061,406 UART: [art] Derive CDI
21,062,229 UART: [art] Store in slot 0x4
21,104,829 UART: [art] Derive Key Pair
21,105,872 UART: [art] Store priv key in slot 0x5
23,532,253 UART: [art] Derive Key Pair - Done
23,545,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,251,579 UART: [art] Erasing AUTHORITY.KEYID = 7
25,253,082 UART: [art] PUB.X = 61FD4D1AD2C258BDB5211407125E89D908F14954A62CA4F92BA3139AD47589718FBEB3A4A57E03C70A2780491255F379
25,260,331 UART: [art] PUB.Y = E84DFE76E74AAD2B1EDE0E39DBBBFAFBB83F5702E9D1E14EE98733CC8C69EFBD461E52365CA55F3143AB0FDC0A27C9C4
25,267,657 UART: [art] SIG.R = E49C83FA55AFC295413A4908E77F5AD3BCA6226F0E75F03095324A190BB67ACFC206CC2004F26A5FC7D60D436C8EA1E7
25,275,059 UART: [art] SIG.S = 9B35F75D6335C290A733E879981678A6908A08E40679B84F7D942A1EC0BA98070BE39EA84A8FF7AF801B9524BA73F89E
26,253,581 UART: Caliptra RT
26,254,293 UART: [state] CFI Enabled
26,387,729 UART: [rt] RT listening for mailbox commands...
26,418,822 UART: [rt]cmd =0x46505652, len=4
26,420,070 UART: [rt] FIPS Version
26,421,399 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,606 UART: [state] LifecycleState = Unprovisioned
85,261 UART: [state] DebugLocked = No
85,751 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,325 UART: [kat] SHA2-256
881,256 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,371 UART: [kat] ++
885,523 UART: [kat] sha1
889,757 UART: [kat] SHA2-256
891,695 UART: [kat] SHA2-384
894,244 UART: [kat] SHA2-512-ACC
896,145 UART: [kat] ECC-384
901,840 UART: [kat] HMAC-384Kdf
906,594 UART: [kat] LMS
1,474,790 UART: [kat] --
1,475,409 UART: [cold-reset] ++
1,475,857 UART: [fht] Storing FHT @ 0x50003400
1,478,560 UART: [idev] ++
1,478,728 UART: [idev] CDI.KEYID = 6
1,479,088 UART: [idev] SUBJECT.KEYID = 7
1,479,512 UART: [idev] UDS.KEYID = 0
1,479,857 ready_for_fw is high
1,479,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,874 UART: [idev] Erasing UDS.KEYID = 0
1,503,944 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,526 UART: [idev] --
1,513,571 UART: [ldev] ++
1,513,739 UART: [ldev] CDI.KEYID = 6
1,514,102 UART: [ldev] SUBJECT.KEYID = 5
1,514,528 UART: [ldev] AUTHORITY.KEYID = 7
1,514,991 UART: [ldev] FE.KEYID = 1
1,520,593 UART: [ldev] Erasing FE.KEYID = 1
1,546,072 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,938 UART: [ldev] --
1,585,353 UART: [fwproc] Waiting for Commands...
1,586,084 UART: [fwproc] Received command 0x46574c44
1,586,875 UART: [fwproc] Received Image of size 118548 bytes
2,931,905 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,357 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,575 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,892 >>> mbox cmd response: success
3,130,892 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,131,996 UART: [afmc] ++
3,132,164 UART: [afmc] CDI.KEYID = 6
3,132,526 UART: [afmc] SUBJECT.KEYID = 7
3,132,951 UART: [afmc] AUTHORITY.KEYID = 5
3,168,036 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,574 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,354 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,063 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,946 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,629 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,485 UART: [afmc] --
3,211,449 UART: [cold-reset] --
3,212,099 UART: [state] Locking Datavault
3,213,286 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,890 UART: [state] Locking ICCM
3,214,360 UART: [exit] Launching FMC @ 0x40000130
3,219,690 UART:
3,219,706 UART: Running Caliptra FMC ...
3,220,114 UART:
3,220,168 UART: [state] CFI Enabled
3,230,688 UART: [fht] FMC Alias Private Key: 7
3,350,304 UART: [art] Extend RT PCRs Done
3,350,732 UART: [art] Lock RT PCRs Done
3,352,232 UART: [art] Populate DV Done
3,360,661 UART: [fht] FMC Alias Private Key: 7
3,361,837 UART: [art] Derive CDI
3,362,117 UART: [art] Store in slot 0x4
3,448,003 UART: [art] Derive Key Pair
3,448,363 UART: [art] Store priv key in slot 0x5
3,461,526 UART: [art] Derive Key Pair - Done
3,476,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,068 UART: [art] PUB.X = C8AEFE54F3F652E2F0E53409CF2FC5D7260C357493C4B706398B2FCBFA4E80E1F122CED10A74FB1A2F32AD207A423582
3,499,840 UART: [art] PUB.Y = 957ECC7D7B3C263F43D1827F824EE1D1271FDE1F9233C07F55F723EA1F8CCA9D15988F559BC0198AB8F5D01657FA5F3E
3,506,802 UART: [art] SIG.R = 8CB3681BA0337FEB7DA3AE5B8B6FD555C476B5E062901E6AB4515B6CCEDDBFDF0F41BEC51DF4F28F66DF22F75DBCD648
3,513,599 UART: [art] SIG.S = 6C175134458AD4FA112B1E9970F52F5EFAF1D75924052614255837E34996D05389EB8CE8761C6D39E11D8603AF4A8FEC
3,536,779 UART: Caliptra RT
3,537,030 UART: [state] CFI Enabled
3,657,738 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,010 UART: [rt]cmd =0x46505652, len=4
3,688,670 UART: [rt] FIPS Version
3,689,597 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,817 ready_for_fw is high
1,362,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,868 >>> mbox cmd response: success
2,980,868 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,041,761 UART:
3,041,777 UART: Running Caliptra FMC ...
3,042,185 UART:
3,042,239 UART: [state] CFI Enabled
3,052,295 UART: [fht] FMC Alias Private Key: 7
3,171,305 UART: [art] Extend RT PCRs Done
3,171,733 UART: [art] Lock RT PCRs Done
3,173,227 UART: [art] Populate DV Done
3,181,328 UART: [fht] FMC Alias Private Key: 7
3,182,356 UART: [art] Derive CDI
3,182,636 UART: [art] Store in slot 0x4
3,268,298 UART: [art] Derive Key Pair
3,268,658 UART: [art] Store priv key in slot 0x5
3,282,037 UART: [art] Derive Key Pair - Done
3,296,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,783 UART: [art] PUB.X = 21E482EA37366A6FAAFB7D8E2CCDB419AB3548112D20D41FFB70DFCDC8393C5ACF92D98268A4237B7D6FA597AF1F9330
3,319,571 UART: [art] PUB.Y = 1AB8E65042C91A6854B55EE468770CD427FCA929D61E2A47901EF0A06E9E1F548AB85EB4B61112CE334C275038383A72
3,326,518 UART: [art] SIG.R = 2788AAC9132B8E0AE95606B51FB931EB38CA6C13ECF8DD244408A524915CE7A9D70FEB778145B5EF244191358F35BCA1
3,333,284 UART: [art] SIG.S = 7F08B934629DAA64D571B6E3F636D98C81E165C2A76F3A844D403798E50A708D465FD3890609B253C4ACDFD41D9D5AF6
3,357,528 UART: Caliptra RT
3,357,779 UART: [state] CFI Enabled
3,477,840 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,320 UART: [rt]cmd =0x46505652, len=4
3,508,980 UART: [rt] FIPS Version
3,510,117 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,756 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,382 UART: [kat] SHA2-256
882,313 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,428 UART: [kat] ++
886,580 UART: [kat] sha1
890,774 UART: [kat] SHA2-256
892,712 UART: [kat] SHA2-384
895,489 UART: [kat] SHA2-512-ACC
897,390 UART: [kat] ECC-384
903,241 UART: [kat] HMAC-384Kdf
907,947 UART: [kat] LMS
1,476,143 UART: [kat] --
1,477,192 UART: [cold-reset] ++
1,477,708 UART: [fht] Storing FHT @ 0x50003400
1,480,345 UART: [idev] ++
1,480,513 UART: [idev] CDI.KEYID = 6
1,480,873 UART: [idev] SUBJECT.KEYID = 7
1,481,297 UART: [idev] UDS.KEYID = 0
1,481,642 ready_for_fw is high
1,481,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,269 UART: [idev] Erasing UDS.KEYID = 0
1,506,149 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,807 UART: [idev] --
1,515,840 UART: [ldev] ++
1,516,008 UART: [ldev] CDI.KEYID = 6
1,516,371 UART: [ldev] SUBJECT.KEYID = 5
1,516,797 UART: [ldev] AUTHORITY.KEYID = 7
1,517,260 UART: [ldev] FE.KEYID = 1
1,522,700 UART: [ldev] Erasing FE.KEYID = 1
1,548,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,025 UART: [ldev] --
1,587,512 UART: [fwproc] Waiting for Commands...
1,588,249 UART: [fwproc] Received command 0x46574c44
1,589,040 UART: [fwproc] Received Image of size 118548 bytes
2,934,086 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,818 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,036 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,481 >>> mbox cmd response: success
3,132,481 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,133,525 UART: [afmc] ++
3,133,693 UART: [afmc] CDI.KEYID = 6
3,134,055 UART: [afmc] SUBJECT.KEYID = 7
3,134,480 UART: [afmc] AUTHORITY.KEYID = 5
3,169,363 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,871 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,651 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,360 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,243 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,926 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,614 UART: [afmc] --
3,212,594 UART: [cold-reset] --
3,213,450 UART: [state] Locking Datavault
3,214,495 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,099 UART: [state] Locking ICCM
3,215,553 UART: [exit] Launching FMC @ 0x40000130
3,220,883 UART:
3,220,899 UART: Running Caliptra FMC ...
3,221,307 UART:
3,221,450 UART: [state] CFI Enabled
3,232,210 UART: [fht] FMC Alias Private Key: 7
3,351,106 UART: [art] Extend RT PCRs Done
3,351,534 UART: [art] Lock RT PCRs Done
3,352,996 UART: [art] Populate DV Done
3,361,033 UART: [fht] FMC Alias Private Key: 7
3,362,189 UART: [art] Derive CDI
3,362,469 UART: [art] Store in slot 0x4
3,448,177 UART: [art] Derive Key Pair
3,448,537 UART: [art] Store priv key in slot 0x5
3,462,158 UART: [art] Derive Key Pair - Done
3,476,651 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,687 UART: [art] PUB.X = C66A53D0A24CAA8748FECC798C4EE9AE1FA5688D98A5B4108769631D3E02D05788CB85C71DDA9DC3A6E3A84675295951
3,499,462 UART: [art] PUB.Y = CA22468ECF5E446B999E8BD2BE5BFD44A94A4D7AB7FEAC909FBC45064DB90B3A7D36F20B5676F0595B7BF48DE39158FD
3,506,425 UART: [art] SIG.R = E692B7FA741C22CAAB3CE4B14C76B46A909C99150C95857EEC9454D8F360AF7F014305A552D2B82B69395A4C2817827C
3,513,188 UART: [art] SIG.S = 92DCEB341678B7AD8028725556B5649EC44EC05ADEEC15DC1A2C7CA904D5C5CCCAC0EFF0A9C06BAB56D331834C7C5426
3,536,681 UART: Caliptra RT
3,537,024 UART: [state] CFI Enabled
3,657,103 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,457 UART: [rt]cmd =0x46505652, len=4
3,688,117 UART: [rt] FIPS Version
3,689,030 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,846 ready_for_fw is high
1,362,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,542 >>> mbox cmd response: success
2,981,542 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,043,787 UART:
3,043,803 UART: Running Caliptra FMC ...
3,044,211 UART:
3,044,354 UART: [state] CFI Enabled
3,055,108 UART: [fht] FMC Alias Private Key: 7
3,174,194 UART: [art] Extend RT PCRs Done
3,174,622 UART: [art] Lock RT PCRs Done
3,176,246 UART: [art] Populate DV Done
3,184,621 UART: [fht] FMC Alias Private Key: 7
3,185,783 UART: [art] Derive CDI
3,186,063 UART: [art] Store in slot 0x4
3,271,987 UART: [art] Derive Key Pair
3,272,347 UART: [art] Store priv key in slot 0x5
3,285,620 UART: [art] Derive Key Pair - Done
3,300,533 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,705 UART: [art] PUB.X = 7282A374EDE2356221D5F87EF30501F621A27B7701FF691A0A9A5BD31308F937E9D47A63DA22B94BA47DFF39B13117C5
3,323,462 UART: [art] PUB.Y = A4AEB08644C13E4577EB01D90E49F62BE0B1873223DF596D88167CE445E8B944BBF09895DCAC95390905F7D93B2B7DC7
3,330,406 UART: [art] SIG.R = 0D59108220E5ACDF19AE917F4475EF8D33FC82A8C62090B795D4FB0CB22312BECDEFCDF671B9052CD60606531BEF4EFE
3,337,179 UART: [art] SIG.S = 1D3B76D3E52AA756236BC1E83851BC00039F656D18956EF8BC9121025424CC7963F32CDB662A91CE40A7E3865BDD61D9
3,360,861 UART: Caliptra RT
3,361,204 UART: [state] CFI Enabled
3,480,743 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,645 UART: [rt]cmd =0x46505652, len=4
3,512,305 UART: [rt] FIPS Version
3,513,344 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,712 UART: [state] LifecycleState = Unprovisioned
85,367 UART: [state] DebugLocked = No
85,871 UART: [state] WD Timer not started. Device not locked for debugging
87,090 UART: [kat] SHA2-256
890,640 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,744 UART: [kat] ++
894,896 UART: [kat] sha1
899,066 UART: [kat] SHA2-256
901,006 UART: [kat] SHA2-384
903,889 UART: [kat] SHA2-512-ACC
905,790 UART: [kat] ECC-384
915,381 UART: [kat] HMAC-384Kdf
919,923 UART: [kat] LMS
1,168,235 UART: [kat] --
1,169,228 UART: [cold-reset] ++
1,169,638 UART: [fht] FHT @ 0x50003400
1,172,426 UART: [idev] ++
1,172,594 UART: [idev] CDI.KEYID = 6
1,172,955 UART: [idev] SUBJECT.KEYID = 7
1,173,380 UART: [idev] UDS.KEYID = 0
1,173,726 ready_for_fw is high
1,173,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,333 UART: [idev] Erasing UDS.KEYID = 0
1,198,561 UART: [idev] Sha1 KeyId Algorithm
1,207,397 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,214,818 UART: [ldev] Erasing FE.KEYID = 1
1,241,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,774 UART: [ldev] --
1,280,155 UART: [fwproc] Wait for Commands...
1,280,756 UART: [fwproc] Recv command 0x46574c44
1,281,489 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,889 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,064 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,271 >>> mbox cmd response: success
2,824,271 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,825,357 UART: [afmc] ++
2,825,525 UART: [afmc] CDI.KEYID = 6
2,825,888 UART: [afmc] SUBJECT.KEYID = 7
2,826,314 UART: [afmc] AUTHORITY.KEYID = 5
2,861,349 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,667 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,377 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,258 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,959 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,678 UART: [afmc] --
2,904,629 UART: [cold-reset] --
2,905,301 UART: [state] Locking Datavault
2,906,554 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,158 UART: [state] Locking ICCM
2,907,780 UART: [exit] Launching FMC @ 0x40000130
2,913,110 UART:
2,913,126 UART: Running Caliptra FMC ...
2,913,534 UART:
2,913,588 UART: [state] CFI Enabled
2,923,928 UART: [fht] FMC Alias Private Key: 7
3,043,230 UART: [art] Extend RT PCRs Done
3,043,658 UART: [art] Lock RT PCRs Done
3,045,120 UART: [art] Populate DV Done
3,053,567 UART: [fht] FMC Alias Private Key: 7
3,054,523 UART: [art] Derive CDI
3,054,803 UART: [art] Store in slot 0x4
3,140,352 UART: [art] Derive Key Pair
3,140,712 UART: [art] Store priv key in slot 0x5
3,154,222 UART: [art] Derive Key Pair - Done
3,169,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,529 UART: [art] PUB.X = 5A0BFD1C81F6581D00E0246FC5FC4E0A1866274E71AE3607415D93B6BDA405C37F18BCAF9796C63F7073ECABD9BE4370
3,192,277 UART: [art] PUB.Y = 1C99F5DA4F51DE89A7CDB5B877253220DD2E8B81D8AFE43497AE236B64440BBE30C7F08A698CCCB8EB4D8E1513F43880
3,199,238 UART: [art] SIG.R = 71776FB0158D552FA6CC2FDE3BC34F6135123B1D40E0B9662775B40F330597060C25C89884D54013352C2DA33B8F9E7D
3,205,992 UART: [art] SIG.S = DEA408C274989B6716E3AF085CF2A1D9C6911DC4B7979D5D16896E1CB867C4B9A59CEBC6D52C7D7ED994FB4FCCCC21A2
3,229,638 UART: Caliptra RT
3,229,889 UART: [state] CFI Enabled
3,349,216 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,296 UART: [rt]cmd =0x46505652, len=4
3,379,956 UART: [rt] FIPS Version
3,380,815 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,200 ready_for_fw is high
1,059,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,424 >>> mbox cmd response: success
2,678,424 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,740,519 UART:
2,740,535 UART: Running Caliptra FMC ...
2,740,943 UART:
2,740,997 UART: [state] CFI Enabled
2,751,033 UART: [fht] FMC Alias Private Key: 7
2,869,845 UART: [art] Extend RT PCRs Done
2,870,273 UART: [art] Lock RT PCRs Done
2,871,801 UART: [art] Populate DV Done
2,879,784 UART: [fht] FMC Alias Private Key: 7
2,880,886 UART: [art] Derive CDI
2,881,166 UART: [art] Store in slot 0x4
2,966,919 UART: [art] Derive Key Pair
2,967,279 UART: [art] Store priv key in slot 0x5
2,981,057 UART: [art] Derive Key Pair - Done
2,996,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,375 UART: [art] PUB.X = ABB007CC454326F1970CA890EF9BED6E6C9A616934D987505DE9E8AF38CE11D6BE2F9E6A934148B64064E47AA8FCD7D6
3,019,153 UART: [art] PUB.Y = 26EB5C64A78661398B73BCEEF35B12C0F0C7B27019303EB8CCC871E78921733118FC85C31A66EF77F395BA53112C0D22
3,026,102 UART: [art] SIG.R = C18AFC641342E37A3CF8CA6E31750DCDA5FF640A1E50DB2FA5ECF97417AA61CC595D04E9917FDD393E8E4577CAD8DB90
3,032,885 UART: [art] SIG.S = A45D1E4F94CECDD71C8DF3538BD811936285F044D83992DBAADB2E9DA951D029F24FCE463B80D5C60568ABD0D6E9A592
3,057,138 UART: Caliptra RT
3,057,389 UART: [state] CFI Enabled
3,176,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,403 UART: [rt]cmd =0x46505652, len=4
3,208,063 UART: [rt] FIPS Version
3,209,066 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,249 UART: [kat] SHA2-256
891,799 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,903 UART: [kat] ++
896,055 UART: [kat] sha1
900,255 UART: [kat] SHA2-256
902,195 UART: [kat] SHA2-384
904,740 UART: [kat] SHA2-512-ACC
906,641 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
1,169,110 UART: [kat] --
1,169,975 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,172,973 UART: [idev] ++
1,173,141 UART: [idev] CDI.KEYID = 6
1,173,502 UART: [idev] SUBJECT.KEYID = 7
1,173,927 UART: [idev] UDS.KEYID = 0
1,174,273 ready_for_fw is high
1,174,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,912 UART: [idev] Erasing UDS.KEYID = 0
1,198,998 UART: [idev] Sha1 KeyId Algorithm
1,207,888 UART: [idev] --
1,208,783 UART: [ldev] ++
1,208,951 UART: [ldev] CDI.KEYID = 6
1,209,315 UART: [ldev] SUBJECT.KEYID = 5
1,209,742 UART: [ldev] AUTHORITY.KEYID = 7
1,210,205 UART: [ldev] FE.KEYID = 1
1,215,481 UART: [ldev] Erasing FE.KEYID = 1
1,241,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,777 UART: [ldev] --
1,281,056 UART: [fwproc] Wait for Commands...
1,281,637 UART: [fwproc] Recv command 0x46574c44
1,282,370 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,890 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,065 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,330 >>> mbox cmd response: success
2,825,330 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,826,384 UART: [afmc] ++
2,826,552 UART: [afmc] CDI.KEYID = 6
2,826,915 UART: [afmc] SUBJECT.KEYID = 7
2,827,341 UART: [afmc] AUTHORITY.KEYID = 5
2,862,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,464 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,174 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,055 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,756 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,471 UART: [afmc] --
2,905,344 UART: [cold-reset] --
2,906,094 UART: [state] Locking Datavault
2,907,375 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,979 UART: [state] Locking ICCM
2,908,487 UART: [exit] Launching FMC @ 0x40000130
2,913,817 UART:
2,913,833 UART: Running Caliptra FMC ...
2,914,241 UART:
2,914,384 UART: [state] CFI Enabled
2,924,600 UART: [fht] FMC Alias Private Key: 7
3,043,430 UART: [art] Extend RT PCRs Done
3,043,858 UART: [art] Lock RT PCRs Done
3,045,430 UART: [art] Populate DV Done
3,053,699 UART: [fht] FMC Alias Private Key: 7
3,054,755 UART: [art] Derive CDI
3,055,035 UART: [art] Store in slot 0x4
3,140,812 UART: [art] Derive Key Pair
3,141,172 UART: [art] Store priv key in slot 0x5
3,154,224 UART: [art] Derive Key Pair - Done
3,168,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,868 UART: [art] PUB.X = 2A5CB314033AE71326CFEA391DE2DBD352DFF7EA4A0DF3C4C7FD09F29166E7D20F32B8B853A6C756AAAE0BEC5694881F
3,191,645 UART: [art] PUB.Y = F0FD00C7843CAB4DCD4A70E7E340011860149A4E9263B089B3BBFCF1C86C127E312E46C364FFB1E995429AD96AD393A6
3,198,580 UART: [art] SIG.R = BE9F3B440538E1FBCF84173468D0F864676F68FD130EF8485915D2419402D9008A4DFE52A92694187C0F723F6EF9A3E4
3,205,314 UART: [art] SIG.S = 92949DB8ADEC00D4A2FF6602D6CEB64E43D5FE36A15FBE3819B95C367B54393DBA5C3367846112304EB515A36EE32363
3,229,043 UART: Caliptra RT
3,229,386 UART: [state] CFI Enabled
3,348,704 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,302 UART: [rt]cmd =0x46505652, len=4
3,379,962 UART: [rt] FIPS Version
3,380,931 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,013 ready_for_fw is high
1,060,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,163 >>> mbox cmd response: success
2,681,163 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,742,912 UART:
2,742,928 UART: Running Caliptra FMC ...
2,743,336 UART:
2,743,479 UART: [state] CFI Enabled
2,754,205 UART: [fht] FMC Alias Private Key: 7
2,872,677 UART: [art] Extend RT PCRs Done
2,873,105 UART: [art] Lock RT PCRs Done
2,874,609 UART: [art] Populate DV Done
2,882,604 UART: [fht] FMC Alias Private Key: 7
2,883,534 UART: [art] Derive CDI
2,883,814 UART: [art] Store in slot 0x4
2,969,213 UART: [art] Derive Key Pair
2,969,573 UART: [art] Store priv key in slot 0x5
2,982,261 UART: [art] Derive Key Pair - Done
2,996,984 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,613 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,378 UART: [art] PUB.X = E393D4A935C4D95BDC98C133E20DD2AC30228DF3F35498A3C27687A718BE69710797894951AB6B3088F3CFA0423814FF
3,020,142 UART: [art] PUB.Y = 2CF1CAB0CE9A3A08818C360F2158A9283C5184E2D28378F38D74BFD4B6D5B8846AADC0D12E8D6E147555A3650D24E56C
3,027,091 UART: [art] SIG.R = F267CDC8BBF63328A7CB1C5C1E7B4F5A4FD547AD2940632017C817A5F56CCAA1FAE92AB471B9D7DC2650764654273B04
3,033,870 UART: [art] SIG.S = 3EB90B53B42266ABBF1691BC3043B7C62BC9F1CD78A0ABFE5CDD8532603F7A162B6B3A80E06942752C58001FABAB8002
3,057,514 UART: Caliptra RT
3,057,857 UART: [state] CFI Enabled
3,178,878 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,718 UART: [rt]cmd =0x46505652, len=4
3,210,378 UART: [rt] FIPS Version
3,211,435 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
893,398 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,523 UART: [kat] ++
897,675 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,466 UART: [kat] SHA2-512-ACC
908,367 UART: [kat] ECC-384
918,484 UART: [kat] HMAC-384Kdf
923,082 UART: [kat] LMS
1,171,410 UART: [kat] --
1,172,339 UART: [cold-reset] ++
1,172,877 UART: [fht] FHT @ 0x50003400
1,175,520 UART: [idev] ++
1,175,688 UART: [idev] CDI.KEYID = 6
1,176,048 UART: [idev] SUBJECT.KEYID = 7
1,176,472 UART: [idev] UDS.KEYID = 0
1,176,817 ready_for_fw is high
1,176,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,696 UART: [idev] Erasing UDS.KEYID = 0
1,201,233 UART: [idev] Sha1 KeyId Algorithm
1,209,763 UART: [idev] --
1,210,765 UART: [ldev] ++
1,210,933 UART: [ldev] CDI.KEYID = 6
1,211,296 UART: [ldev] SUBJECT.KEYID = 5
1,211,722 UART: [ldev] AUTHORITY.KEYID = 7
1,212,185 UART: [ldev] FE.KEYID = 1
1,217,469 UART: [ldev] Erasing FE.KEYID = 1
1,243,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,391 UART: [ldev] --
1,282,712 UART: [fwproc] Wait for Commands...
1,283,414 UART: [fwproc] Recv command 0x46574c44
1,284,142 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,458 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,628 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,807 >>> mbox cmd response: success
2,827,807 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,828,961 UART: [afmc] ++
2,829,129 UART: [afmc] CDI.KEYID = 6
2,829,491 UART: [afmc] SUBJECT.KEYID = 7
2,829,916 UART: [afmc] AUTHORITY.KEYID = 5
2,865,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,078 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,787 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,670 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,371 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,059 UART: [afmc] --
2,908,951 UART: [cold-reset] --
2,909,935 UART: [state] Locking Datavault
2,910,980 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,584 UART: [state] Locking ICCM
2,912,134 UART: [exit] Launching FMC @ 0x40000130
2,917,464 UART:
2,917,480 UART: Running Caliptra FMC ...
2,917,888 UART:
2,917,942 UART: [state] CFI Enabled
2,928,320 UART: [fht] FMC Alias Private Key: 7
3,047,016 UART: [art] Extend RT PCRs Done
3,047,444 UART: [art] Lock RT PCRs Done
3,048,976 UART: [art] Populate DV Done
3,056,985 UART: [fht] FMC Alias Private Key: 7
3,057,997 UART: [art] Derive CDI
3,058,277 UART: [art] Store in slot 0x4
3,143,824 UART: [art] Derive Key Pair
3,144,184 UART: [art] Store priv key in slot 0x5
3,157,974 UART: [art] Derive Key Pair - Done
3,172,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,801 UART: [art] PUB.X = 0B56DAE8231DDC472D75361DBBC9D282322D0EE91499CE39CDFFED2C4172167E6B5519B0C6D11A4BC2554FF446C10FBC
3,195,578 UART: [art] PUB.Y = DA17D9E84E4B0D21C35CE5F894127797D960225501C564257D5B0F024B00A528C9E3D3009C63C14312EB2363BD6965E5
3,202,466 UART: [art] SIG.R = 26AA1E346CFA2AE1FE532DEC9B9526E0476A26E8E32373BA72D5B32F87CE72F6FE04E84491CCA6AEAFD7C5147EE26555
3,209,251 UART: [art] SIG.S = 73A982F44FE345250455D99BA96FCCC2C7EE67F3203E9257B9172FD0B796D0116960E69F06D8CE5EDD2587116A40650C
3,232,690 UART: Caliptra RT
3,232,941 UART: [state] CFI Enabled
3,352,659 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,327 UART: [rt]cmd =0x46505652, len=4
3,383,987 UART: [rt] FIPS Version
3,384,888 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 ready_for_fw is high
1,060,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,784 >>> mbox cmd response: success
2,677,784 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,740,011 UART:
2,740,027 UART: Running Caliptra FMC ...
2,740,435 UART:
2,740,489 UART: [state] CFI Enabled
2,751,193 UART: [fht] FMC Alias Private Key: 7
2,869,701 UART: [art] Extend RT PCRs Done
2,870,129 UART: [art] Lock RT PCRs Done
2,871,837 UART: [art] Populate DV Done
2,879,858 UART: [fht] FMC Alias Private Key: 7
2,880,966 UART: [art] Derive CDI
2,881,246 UART: [art] Store in slot 0x4
2,967,245 UART: [art] Derive Key Pair
2,967,605 UART: [art] Store priv key in slot 0x5
2,980,789 UART: [art] Derive Key Pair - Done
2,995,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,982 UART: [art] PUB.X = F4A9E3F2A46173C494AE720711FF2D29B7E857785C4D8E384194B7EB3B250C7730622BCBEEDC7396D418442F379C0B84
3,018,745 UART: [art] PUB.Y = A8A98FECC60F820029955F089457EED803CFFCEB4A5D645B8C36A3E16A41AF98188B7149243908B56CEC75C130BA8B25
3,025,669 UART: [art] SIG.R = 83EBC205D36BDD1F20EE44A164395526CDE6E065716E479AA0E0F78407C2B4D9DBE753553F6A1082E88C2AF37C5DB8E7
3,032,443 UART: [art] SIG.S = 4FBCE77BF925A1E5A2C84FA1EB096C789B65589A5186EE0816865014676BC5F2589A2545B902131DE91F274A1D20210D
3,055,877 UART: Caliptra RT
3,056,128 UART: [state] CFI Enabled
3,175,351 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,221 UART: [rt]cmd =0x46505652, len=4
3,206,881 UART: [rt] FIPS Version
3,207,830 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
893,733 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,858 UART: [kat] ++
898,010 UART: [kat] sha1
902,310 UART: [kat] SHA2-256
904,250 UART: [kat] SHA2-384
906,977 UART: [kat] SHA2-512-ACC
908,878 UART: [kat] ECC-384
918,735 UART: [kat] HMAC-384Kdf
923,395 UART: [kat] LMS
1,171,723 UART: [kat] --
1,172,964 UART: [cold-reset] ++
1,173,394 UART: [fht] FHT @ 0x50003400
1,175,915 UART: [idev] ++
1,176,083 UART: [idev] CDI.KEYID = 6
1,176,443 UART: [idev] SUBJECT.KEYID = 7
1,176,867 UART: [idev] UDS.KEYID = 0
1,177,212 ready_for_fw is high
1,177,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,819 UART: [idev] Erasing UDS.KEYID = 0
1,202,056 UART: [idev] Sha1 KeyId Algorithm
1,210,636 UART: [idev] --
1,211,838 UART: [ldev] ++
1,212,006 UART: [ldev] CDI.KEYID = 6
1,212,369 UART: [ldev] SUBJECT.KEYID = 5
1,212,795 UART: [ldev] AUTHORITY.KEYID = 7
1,213,258 UART: [ldev] FE.KEYID = 1
1,218,578 UART: [ldev] Erasing FE.KEYID = 1
1,245,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,306 UART: [ldev] --
1,284,581 UART: [fwproc] Wait for Commands...
1,285,153 UART: [fwproc] Recv command 0x46574c44
1,285,881 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,607 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,777 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,028 >>> mbox cmd response: success
2,830,028 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,831,092 UART: [afmc] ++
2,831,260 UART: [afmc] CDI.KEYID = 6
2,831,622 UART: [afmc] SUBJECT.KEYID = 7
2,832,047 UART: [afmc] AUTHORITY.KEYID = 5
2,867,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,275 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,984 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,867 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,568 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,416 UART: [afmc] --
2,911,372 UART: [cold-reset] --
2,912,340 UART: [state] Locking Datavault
2,913,293 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,897 UART: [state] Locking ICCM
2,914,479 UART: [exit] Launching FMC @ 0x40000130
2,919,809 UART:
2,919,825 UART: Running Caliptra FMC ...
2,920,233 UART:
2,920,376 UART: [state] CFI Enabled
2,930,948 UART: [fht] FMC Alias Private Key: 7
3,049,436 UART: [art] Extend RT PCRs Done
3,049,864 UART: [art] Lock RT PCRs Done
3,051,180 UART: [art] Populate DV Done
3,059,623 UART: [fht] FMC Alias Private Key: 7
3,060,551 UART: [art] Derive CDI
3,060,831 UART: [art] Store in slot 0x4
3,146,658 UART: [art] Derive Key Pair
3,147,018 UART: [art] Store priv key in slot 0x5
3,159,720 UART: [art] Derive Key Pair - Done
3,174,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,732 UART: [art] PUB.X = 20E7A2B3392DAA727D67586B26C7091F56787974F6496A31DD91B5A39926BD5DEEE305BAB9B8B3CBC4B10673783731F9
3,197,495 UART: [art] PUB.Y = 4610E69F6EB23E185A289BA1AA0AC0E8F9C5EFCB2079F52A3D2112F1E3FAA00120FA45B3BEA5A6824029F345D4EB5690
3,204,453 UART: [art] SIG.R = 6D2518CD9DA6B362D8313E77A8C384D8FB733E6C41130310FD81B40E91D7421DC5C794E1AD6D90C34CFD71710AE6CBD6
3,211,224 UART: [art] SIG.S = E0BACF719B2B4D9C3507CE9D61C174A00FD3C8896DC3456D263DB99CF528DF44066321EE884E6D44AECAD18034EA443E
3,234,813 UART: Caliptra RT
3,235,156 UART: [state] CFI Enabled
3,354,253 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,889 UART: [rt]cmd =0x46505652, len=4
3,385,549 UART: [rt] FIPS Version
3,386,564 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,146 ready_for_fw is high
1,060,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,475 >>> mbox cmd response: success
2,679,475 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,828 UART:
2,741,844 UART: Running Caliptra FMC ...
2,742,252 UART:
2,742,395 UART: [state] CFI Enabled
2,752,725 UART: [fht] FMC Alias Private Key: 7
2,871,637 UART: [art] Extend RT PCRs Done
2,872,065 UART: [art] Lock RT PCRs Done
2,873,827 UART: [art] Populate DV Done
2,882,088 UART: [fht] FMC Alias Private Key: 7
2,883,108 UART: [art] Derive CDI
2,883,388 UART: [art] Store in slot 0x4
2,969,067 UART: [art] Derive Key Pair
2,969,427 UART: [art] Store priv key in slot 0x5
2,982,309 UART: [art] Derive Key Pair - Done
2,997,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,269 UART: [art] PUB.X = F57D68285B776544F1FA0A2D769BFAAD58F0CF0B2AB0E1DF7E7697F2FB7602B429E792ADE4E32237CBC913F1CD274B08
3,020,043 UART: [art] PUB.Y = FB627E45A0EDB2C0E5A9B093731F9D337CC31BA83E84E518D798165B4CC73ED27F2FDFFE28178FAA561BAFF9FA4FAB5B
3,027,019 UART: [art] SIG.R = 466034980809C732B8A2DB2E6F3ADF8504A170AB72382CE1981DDF4DDB768A2556017E4F9DF3F8679FB9ED3A4A88E9C0
3,033,785 UART: [art] SIG.S = C2EDB72B0726323CB7F744B9C60170D8F5AA630D2AC8B7F0FD3B96E787C785A31ECE0C3A4F3746FD34B0727B188A7006
3,057,394 UART: Caliptra RT
3,057,737 UART: [state] CFI Enabled
3,177,478 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,990 UART: [rt]cmd =0x46505652, len=4
3,208,650 UART: [rt] FIPS Version
3,209,661 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
191,985 UART:
192,345 UART: Running Caliptra ROM ...
193,491 UART:
193,639 UART: [state] CFI Enabled
265,462 UART: [state] LifecycleState = Unprovisioned
267,453 UART: [state] DebugLocked = No
268,775 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,724 UART: [kat] SHA2-256
443,428 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,919 UART: [kat] ++
454,399 UART: [kat] sha1
466,480 UART: [kat] SHA2-256
469,210 UART: [kat] SHA2-384
475,981 UART: [kat] SHA2-512-ACC
478,348 UART: [kat] ECC-384
2,770,813 UART: [kat] HMAC-384Kdf
2,800,849 UART: [kat] LMS
3,991,191 UART: [kat] --
3,995,474 UART: [cold-reset] ++
3,996,692 UART: [fht] Storing FHT @ 0x50003400
4,008,377 UART: [idev] ++
4,009,021 UART: [idev] CDI.KEYID = 6
4,009,938 UART: [idev] SUBJECT.KEYID = 7
4,011,193 UART: [idev] UDS.KEYID = 0
4,012,253 ready_for_fw is high
4,012,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,542 UART: [idev] Erasing UDS.KEYID = 0
7,348,552 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,174 UART: [idev] --
7,373,659 UART: [ldev] ++
7,374,286 UART: [ldev] CDI.KEYID = 6
7,375,195 UART: [ldev] SUBJECT.KEYID = 5
7,376,429 UART: [ldev] AUTHORITY.KEYID = 7
7,377,662 UART: [ldev] FE.KEYID = 1
7,424,170 UART: [ldev] Erasing FE.KEYID = 1
10,758,017 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,386 UART: [ldev] --
13,137,644 UART: [fwproc] Waiting for Commands...
13,139,515 UART: [fwproc] Received command 0x46574c44
13,141,692 UART: [fwproc] Received Image of size 118548 bytes
17,245,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,329,693 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,402,838 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,731,090 >>> mbox cmd response: success
17,732,191 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,735,295 UART: [afmc] ++
17,735,949 UART: [afmc] CDI.KEYID = 6
17,736,861 UART: [afmc] SUBJECT.KEYID = 7
17,738,079 UART: [afmc] AUTHORITY.KEYID = 5
21,094,892 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,991 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,258 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,410,735 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,439 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,812 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,461,582 UART: [afmc] --
23,465,498 UART: [cold-reset] --
23,469,462 UART: [state] Locking Datavault
23,475,415 UART: [state] Locking PCR0, PCR1 and PCR31
23,477,172 UART: [state] Locking ICCM
23,479,776 UART: [exit] Launching FMC @ 0x40000130
23,488,130 UART:
23,488,427 UART: Running Caliptra FMC ...
23,489,544 UART:
23,489,699 UART: [state] CFI Enabled
23,555,264 UART: [fht] FMC Alias Private Key: 7
25,916,995 UART: [art] Extend RT PCRs Done
25,918,849 UART: [art] Lock RT PCRs Done
25,919,911 UART: [art] Populate DV Done
25,925,180 UART: [fht] FMC Alias Private Key: 7
25,926,880 UART: [art] Derive CDI
25,927,701 UART: [art] Store in slot 0x4
25,986,014 UART: [art] Derive Key Pair
25,987,396 UART: [art] Store priv key in slot 0x5
29,281,956 UART: [art] Derive Key Pair - Done
29,294,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,581,851 UART: [art] Erasing AUTHORITY.KEYID = 7
31,583,385 UART: [art] PUB.X = C105FD3E55782786DDAEAFC757E4A9E11FF40EA9EB236880A4D146A8571C45D8E6FD577DD04BD5B459EBBECD7F59BFBD
31,590,663 UART: [art] PUB.Y = C55CADFE751CE176622EF1FB90409B0C3F067FD9AA41C1D3957F1A4122383F9115AA86AA1ED6366C4999931E91EB991D
31,597,914 UART: [art] SIG.R = EF5EE7E80BCB2BEDC3B15F25DB6BF8EBAE86F869F941E9614F9CF85A8CE3C0DBE457DB88BE87FCB05FA0EF13DD291E30
31,605,327 UART: [art] SIG.S = 5C69B1DD44B4E0BB59D5533D56C2A2C8DA30A6CB21E026A0B554DC0C97264657C5A931B3EC7216D0101F3DEE52294A33
32,910,974 UART: Caliptra RT
32,911,708 UART: [state] CFI Enabled
33,086,217 UART: [rt] RT listening for mailbox commands...
33,117,835 UART: [rt]cmd =0x464d4352, len=4
33,128,231 >>> mbox cmd response data (780 bytes)
33,299,342 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,329,356 UART: [rt]cmd =0x43455252, len=4
33,340,726 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,784,276 ready_for_fw is high
3,784,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,959,486 >>> mbox cmd response: success
17,960,626 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,646,397 UART:
23,646,784 UART: Running Caliptra FMC ...
23,647,878 UART:
23,648,028 UART: [state] CFI Enabled
23,717,902 UART: [fht] FMC Alias Private Key: 7
26,057,687 UART: [art] Extend RT PCRs Done
26,058,916 UART: [art] Lock RT PCRs Done
26,060,765 UART: [art] Populate DV Done
26,066,294 UART: [fht] FMC Alias Private Key: 7
26,067,782 UART: [art] Derive CDI
26,068,549 UART: [art] Store in slot 0x4
26,126,299 UART: [art] Derive Key Pair
26,127,345 UART: [art] Store priv key in slot 0x5
29,419,531 UART: [art] Derive Key Pair - Done
29,432,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,287 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,839 UART: [art] PUB.X = 04A63C57FC0DB1589D2BC4FF83714A578F837F05937DFDB14D339680D6FF3C765B2B020E77F93D0095E49C0AABF72342
31,732,050 UART: [art] PUB.Y = 17F0C29A1E6E54BD04CD6F34BC1B275FC63EA99F65E0C0C0108FBC391696AC82C57588A91024CDCE84EB20BBCFCCF267
31,739,327 UART: [art] SIG.R = 174C7A723A5F26CB51C8B6E89B1B90C0E7CAAA0AACBA05D03BDA8BAA009577EADEE027406A2369DFEEC6CE7173F97972
31,746,722 UART: [art] SIG.S = 43B550B9C1D1DF8ECC9F09E4B6731B1FFFB76551752D893D4D9B9D31F152B797836CEF42924C34DC0AFB4106048EAC0D
33,051,960 UART: Caliptra RT
33,052,670 UART: [state] CFI Enabled
33,228,637 UART: [rt] RT listening for mailbox commands...
33,260,435 UART: [rt]cmd =0x464d4352, len=4
33,270,768 >>> mbox cmd response data (780 bytes)
33,441,340 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,471,429 UART: [rt]cmd =0x43455252, len=4
33,482,683 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,597 UART:
192,955 UART: Running Caliptra ROM ...
194,153 UART:
603,862 UART: [state] CFI Enabled
617,957 UART: [state] LifecycleState = Unprovisioned
619,818 UART: [state] DebugLocked = No
621,344 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,545 UART: [kat] SHA2-256
796,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,834 UART: [kat] ++
807,311 UART: [kat] sha1
818,342 UART: [kat] SHA2-256
821,070 UART: [kat] SHA2-384
827,201 UART: [kat] SHA2-512-ACC
829,562 UART: [kat] ECC-384
3,112,783 UART: [kat] HMAC-384Kdf
3,126,051 UART: [kat] LMS
4,316,217 UART: [kat] --
4,320,697 UART: [cold-reset] ++
4,321,918 UART: [fht] Storing FHT @ 0x50003400
4,334,240 UART: [idev] ++
4,334,869 UART: [idev] CDI.KEYID = 6
4,335,773 UART: [idev] SUBJECT.KEYID = 7
4,337,007 UART: [idev] UDS.KEYID = 0
4,338,051 ready_for_fw is high
4,338,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,094 UART: [idev] Erasing UDS.KEYID = 0
7,622,344 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,623 UART: [idev] --
7,648,993 UART: [ldev] ++
7,649,551 UART: [ldev] CDI.KEYID = 6
7,650,535 UART: [ldev] SUBJECT.KEYID = 5
7,651,734 UART: [ldev] AUTHORITY.KEYID = 7
7,653,009 UART: [ldev] FE.KEYID = 1
7,665,680 UART: [ldev] Erasing FE.KEYID = 1
10,952,278 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,511 UART: [ldev] --
13,314,121 UART: [fwproc] Waiting for Commands...
13,316,161 UART: [fwproc] Received command 0x46574c44
13,318,352 UART: [fwproc] Received Image of size 118548 bytes
17,423,513 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,291 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,897,348 >>> mbox cmd response: success
17,897,872 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,901,242 UART: [afmc] ++
17,901,822 UART: [afmc] CDI.KEYID = 6
17,902,786 UART: [afmc] SUBJECT.KEYID = 7
17,903,992 UART: [afmc] AUTHORITY.KEYID = 5
21,226,383 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,667 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,971 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,396 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,087 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,497 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,589,887 UART: [afmc] --
23,593,369 UART: [cold-reset] --
23,596,232 UART: [state] Locking Datavault
23,600,755 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,508 UART: [state] Locking ICCM
23,604,812 UART: [exit] Launching FMC @ 0x40000130
23,613,200 UART:
23,613,436 UART: Running Caliptra FMC ...
23,614,531 UART:
23,614,684 UART: [state] CFI Enabled
23,622,670 UART: [fht] FMC Alias Private Key: 7
25,962,443 UART: [art] Extend RT PCRs Done
25,963,662 UART: [art] Lock RT PCRs Done
25,965,172 UART: [art] Populate DV Done
25,970,797 UART: [fht] FMC Alias Private Key: 7
25,972,492 UART: [art] Derive CDI
25,973,317 UART: [art] Store in slot 0x4
26,015,978 UART: [art] Derive Key Pair
26,017,018 UART: [art] Store priv key in slot 0x5
29,259,345 UART: [art] Derive Key Pair - Done
29,272,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,724 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,230 UART: [art] PUB.X = D4243231174CB3F5A2B8E259406D1181EF5F1412F058AFB2DD41C8C01FECC72C64D55423739B552A08E076B19D2E3770
31,561,483 UART: [art] PUB.Y = 7982A3CB8C5195FEBD1161991D0ACB7B6B05F3518584B86DED5304C9D63EBE92D700E10464196E7102AA8991C32AEAD3
31,568,716 UART: [art] SIG.R = 1CF3DCBB968780E414A986D12D1D9A8CAB12CA5E1AF10E674D0315F0EBAF39C4FD7FF60E750FC6B34EAB39FF7A1EB4E6
31,576,161 UART: [art] SIG.S = 13955A823897498172BCDFA5E46C538E15E240F8EAF54AA04CE5607F1565BE7C31BC1B9AF68B1A82FCA9E9D11C7F2362
32,881,555 UART: Caliptra RT
32,882,270 UART: [state] CFI Enabled
33,015,475 UART: [rt] RT listening for mailbox commands...
33,046,990 UART: [rt]cmd =0x464d4352, len=4
33,057,353 >>> mbox cmd response data (780 bytes)
33,228,350 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,258,454 UART: [rt]cmd =0x43455252, len=4
33,269,955 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
4,127,958 ready_for_fw is high
4,128,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,171 >>> mbox cmd response: success
18,156,779 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,791,983 UART:
23,792,348 UART: Running Caliptra FMC ...
23,793,486 UART:
23,793,638 UART: [state] CFI Enabled
23,801,478 UART: [fht] FMC Alias Private Key: 7
26,140,938 UART: [art] Extend RT PCRs Done
26,142,175 UART: [art] Lock RT PCRs Done
26,143,614 UART: [art] Populate DV Done
26,149,048 UART: [fht] FMC Alias Private Key: 7
26,150,637 UART: [art] Derive CDI
26,151,444 UART: [art] Store in slot 0x4
26,193,666 UART: [art] Derive Key Pair
26,194,709 UART: [art] Store priv key in slot 0x5
29,437,042 UART: [art] Derive Key Pair - Done
29,449,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,116 UART: [art] Erasing AUTHORITY.KEYID = 7
31,731,621 UART: [art] PUB.X = 7575F1FDE5445B6B4E5BB698ACB2EBEF0D3084772F1E0F021D9C0FD619E093D81B6E937C28E2C5302155B6F004CA9A1F
31,738,861 UART: [art] PUB.Y = 992432D80E2E43238530A60963372206ED82192AAA59146B521767260CF1378DEAAA5FB2DCD6809DA4FD791777D12E2D
31,746,110 UART: [art] SIG.R = EEA518E774FE9C1917A94F1150202666AA78AF2D924CD1EB23F5E2D2DC6FA6C9C9E03C7D61CEBE71E45C5F95652064C5
31,753,553 UART: [art] SIG.S = 43953F655E137284118DB997F98799A54BBD06504C5FD27E35BBD97EB5BDA5EDE12B422D22C7BC0271167439294FE6EC
33,058,118 UART: Caliptra RT
33,058,838 UART: [state] CFI Enabled
33,192,827 UART: [rt] RT listening for mailbox commands...
33,224,448 UART: [rt]cmd =0x464d4352, len=4
33,234,860 >>> mbox cmd response data (780 bytes)
33,405,987 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,436,121 UART: [rt]cmd =0x43455252, len=4
33,447,492 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,979 writing to cptra_bootfsm_go
193,263 UART:
193,622 UART: Running Caliptra ROM ...
194,807 UART:
194,955 UART: [state] CFI Enabled
263,993 UART: [state] LifecycleState = Unprovisioned
265,930 UART: [state] DebugLocked = No
268,746 UART: [state] WD Timer not started. Device not locked for debugging
272,362 UART: [kat] SHA2-256
452,020 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,830 UART: [kat] ++
463,281 UART: [kat] sha1
473,442 UART: [kat] SHA2-256
476,090 UART: [kat] SHA2-384
481,604 UART: [kat] SHA2-512-ACC
483,969 UART: [kat] ECC-384
2,946,595 UART: [kat] HMAC-384Kdf
2,971,349 UART: [kat] LMS
3,447,908 UART: [kat] --
3,451,610 UART: [cold-reset] ++
3,453,749 UART: [fht] FHT @ 0x50003400
3,465,005 UART: [idev] ++
3,465,573 UART: [idev] CDI.KEYID = 6
3,466,601 UART: [idev] SUBJECT.KEYID = 7
3,467,771 UART: [idev] UDS.KEYID = 0
3,468,668 ready_for_fw is high
3,468,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,902 UART: [idev] Erasing UDS.KEYID = 0
5,986,995 UART: [idev] Sha1 KeyId Algorithm
6,011,079 UART: [idev] --
6,015,322 UART: [ldev] ++
6,015,924 UART: [ldev] CDI.KEYID = 6
6,016,856 UART: [ldev] SUBJECT.KEYID = 5
6,018,019 UART: [ldev] AUTHORITY.KEYID = 7
6,019,307 UART: [ldev] FE.KEYID = 1
6,059,274 UART: [ldev] Erasing FE.KEYID = 1
8,566,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,465 UART: [ldev] --
10,376,001 UART: [fwproc] Wait for Commands...
10,378,367 UART: [fwproc] Recv command 0x46574c44
10,380,401 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,729 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,763 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,322 >>> mbox cmd response: success
14,343,393 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,346,669 UART: [afmc] ++
14,347,318 UART: [afmc] CDI.KEYID = 6
14,348,199 UART: [afmc] SUBJECT.KEYID = 7
14,349,465 UART: [afmc] AUTHORITY.KEYID = 5
16,897,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,641,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,643,998 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,659,783 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,675,822 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,691,372 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,715,758 UART: [afmc] --
18,719,341 UART: [cold-reset] --
18,722,844 UART: [state] Locking Datavault
18,729,498 UART: [state] Locking PCR0, PCR1 and PCR31
18,731,202 UART: [state] Locking ICCM
18,732,648 UART: [exit] Launching FMC @ 0x40000130
18,741,095 UART:
18,741,341 UART: Running Caliptra FMC ...
18,742,439 UART:
18,742,593 UART: [state] CFI Enabled
18,798,056 UART: [fht] FMC Alias Private Key: 7
20,564,640 UART: [art] Extend RT PCRs Done
20,565,858 UART: [art] Lock RT PCRs Done
20,567,448 UART: [art] Populate DV Done
20,572,747 UART: [fht] FMC Alias Private Key: 7
20,574,275 UART: [art] Derive CDI
20,575,007 UART: [art] Store in slot 0x4
20,629,969 UART: [art] Derive Key Pair
20,630,965 UART: [art] Store priv key in slot 0x5
23,094,099 UART: [art] Derive Key Pair - Done
23,107,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,348 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,850 UART: [art] PUB.X = A314CAFB3AF373A35927396A06356B1EBDC94110EEE0C7EF7CBA6B118F19D5CDA272564B6DF89E444389B97DC8BC5AA0
24,829,096 UART: [art] PUB.Y = A78AE50BCB4399A4036C9BBCE53F3590B0986DFCC14025730CF12122F0162C9E61608E9674BC4B00E6DF2AD04BF8D506
24,836,385 UART: [art] SIG.R = 15E9CAA6692CB55D036F6ADEA1C1F0F29C982B6A9EA43E0CC8F179AAC2A37EDF4EFFB9E937020194332202FBE6DA7BF0
24,843,782 UART: [art] SIG.S = 5F5025F7A5EF55B0FF8546B74D947936350735D5541EB2AB5853C692E0378B08B6E40D1DBFE4BC4A3B6B29EF177F962E
25,823,009 UART: Caliptra RT
25,823,719 UART: [state] CFI Enabled
26,003,239 UART: [rt] RT listening for mailbox commands...
26,034,659 UART: [rt]cmd =0x464d4352, len=4
26,045,103 >>> mbox cmd response data (780 bytes)
26,214,737 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,244,805 UART: [rt]cmd =0x43455252, len=4
26,256,087 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,464,188 ready_for_fw is high
3,464,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,217,006 >>> mbox cmd response: success
14,218,363 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,497,529 UART:
18,497,911 UART: Running Caliptra FMC ...
18,499,021 UART:
18,499,177 UART: [state] CFI Enabled
18,561,945 UART: [fht] FMC Alias Private Key: 7
20,327,586 UART: [art] Extend RT PCRs Done
20,328,807 UART: [art] Lock RT PCRs Done
20,330,456 UART: [art] Populate DV Done
20,335,822 UART: [fht] FMC Alias Private Key: 7
20,337,574 UART: [art] Derive CDI
20,338,392 UART: [art] Store in slot 0x4
20,394,372 UART: [art] Derive Key Pair
20,395,418 UART: [art] Store priv key in slot 0x5
22,857,845 UART: [art] Derive Key Pair - Done
22,870,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,583,795 UART: [art] Erasing AUTHORITY.KEYID = 7
24,585,288 UART: [art] PUB.X = EE6BAF96F0B2D8A00DFA89D225BF00D143929CDBE5B6F04E925AAB5F5BAB35DBF88AA37814BFFBFC31173FE98DA36272
24,592,589 UART: [art] PUB.Y = 38BF244229365A5EE9C4225A9359C17A1F316C8A2F944BD86C60071865B586C2C3A3E65DFEF3ED78B7F4432F36CF67E9
24,599,832 UART: [art] SIG.R = ADBBD8891B3108D1F4F3BB4A562C555B6216E25812D3C4CB5085C0EE17F33C0C30BBEB8945647DF56C318D222B03439F
24,607,227 UART: [art] SIG.S = C59F9C70D6C4F233698C963E12964E68A9B6A8DAE155EED99E87F29C025938F2040AAF2D8A28C8D46E2326D7FC90D847
25,586,536 UART: Caliptra RT
25,587,232 UART: [state] CFI Enabled
25,767,652 UART: [rt] RT listening for mailbox commands...
25,799,223 UART: [rt]cmd =0x464d4352, len=4
25,809,464 >>> mbox cmd response data (780 bytes)
25,979,345 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,009,397 UART: [rt]cmd =0x43455252, len=4
26,020,785 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,420 UART:
192,773 UART: Running Caliptra ROM ...
193,864 UART:
603,629 UART: [state] CFI Enabled
620,437 UART: [state] LifecycleState = Unprovisioned
622,408 UART: [state] DebugLocked = No
624,358 UART: [state] WD Timer not started. Device not locked for debugging
628,185 UART: [kat] SHA2-256
807,860 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,591 UART: [kat] ++
819,196 UART: [kat] sha1
831,143 UART: [kat] SHA2-256
833,876 UART: [kat] SHA2-384
841,148 UART: [kat] SHA2-512-ACC
843,499 UART: [kat] ECC-384
3,287,061 UART: [kat] HMAC-384Kdf
3,298,327 UART: [kat] LMS
3,774,814 UART: [kat] --
3,778,877 UART: [cold-reset] ++
3,781,160 UART: [fht] FHT @ 0x50003400
3,791,786 UART: [idev] ++
3,792,425 UART: [idev] CDI.KEYID = 6
3,793,312 UART: [idev] SUBJECT.KEYID = 7
3,794,556 UART: [idev] UDS.KEYID = 0
3,795,531 ready_for_fw is high
3,795,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,584 UART: [idev] Erasing UDS.KEYID = 0
6,275,200 UART: [idev] Sha1 KeyId Algorithm
6,297,718 UART: [idev] --
6,302,064 UART: [ldev] ++
6,302,646 UART: [ldev] CDI.KEYID = 6
6,303,572 UART: [ldev] SUBJECT.KEYID = 5
6,304,809 UART: [ldev] AUTHORITY.KEYID = 7
6,305,991 UART: [ldev] FE.KEYID = 1
6,320,098 UART: [ldev] Erasing FE.KEYID = 1
8,800,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,521,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,537,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,553,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,568,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,088 UART: [ldev] --
10,594,199 UART: [fwproc] Wait for Commands...
10,596,294 UART: [fwproc] Recv command 0x46574c44
10,598,338 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,560 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,600 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,561,101 >>> mbox cmd response: success
14,561,649 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,564,426 UART: [afmc] ++
14,565,007 UART: [afmc] CDI.KEYID = 6
14,565,923 UART: [afmc] SUBJECT.KEYID = 7
14,567,140 UART: [afmc] AUTHORITY.KEYID = 5
17,069,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,796,031 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,861 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,934 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,843,519 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,869,640 UART: [afmc] --
18,873,081 UART: [cold-reset] --
18,876,896 UART: [state] Locking Datavault
18,884,736 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,497 UART: [state] Locking ICCM
18,887,592 UART: [exit] Launching FMC @ 0x40000130
18,895,996 UART:
18,896,233 UART: Running Caliptra FMC ...
18,897,334 UART:
18,897,496 UART: [state] CFI Enabled
18,905,166 UART: [fht] FMC Alias Private Key: 7
20,670,595 UART: [art] Extend RT PCRs Done
20,671,820 UART: [art] Lock RT PCRs Done
20,673,499 UART: [art] Populate DV Done
20,679,019 UART: [fht] FMC Alias Private Key: 7
20,680,720 UART: [art] Derive CDI
20,681,540 UART: [art] Store in slot 0x4
20,724,311 UART: [art] Derive Key Pair
20,725,355 UART: [art] Store priv key in slot 0x5
23,152,409 UART: [art] Derive Key Pair - Done
23,165,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,872,045 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,554 UART: [art] PUB.X = DBA6E6A7B037213E74B09B215CE7FA1D921589AC69934A1F1E16A3561416725488B3AB509B571C6A88B8D799F97DFE12
24,880,807 UART: [art] PUB.Y = CB6587CE418666F136AF96F4B37E9BAE7F0E153700F56011972618C1835A5C4C59F97FCDFFF35FD8F6DDCD2CE0EF7BFD
24,888,087 UART: [art] SIG.R = 0DA944B240385475BF43D220F73C70995BA11AC3FC93AA253704CBB072FD1FDC441731BBB478D6A97D0A5ACD66BAD358
24,895,478 UART: [art] SIG.S = 6B01E5A3192030B3B970D565D74592BF4624BB47DD5880119005BA6EE30FBB2A894B0DBD8AB4432FD7782FD6C4F08467
25,874,502 UART: Caliptra RT
25,875,192 UART: [state] CFI Enabled
26,008,391 UART: [rt] RT listening for mailbox commands...
26,039,652 UART: [rt]cmd =0x464d4352, len=4
26,050,038 >>> mbox cmd response data (780 bytes)
26,220,332 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,250,412 UART: [rt]cmd =0x43455252, len=4
26,261,648 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
3,781,271 ready_for_fw is high
3,781,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,437 >>> mbox cmd response: success
14,446,187 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,697,115 UART:
18,697,485 UART: Running Caliptra FMC ...
18,698,598 UART:
18,698,752 UART: [state] CFI Enabled
18,707,032 UART: [fht] FMC Alias Private Key: 7
20,473,516 UART: [art] Extend RT PCRs Done
20,474,759 UART: [art] Lock RT PCRs Done
20,476,305 UART: [art] Populate DV Done
20,481,772 UART: [fht] FMC Alias Private Key: 7
20,483,269 UART: [art] Derive CDI
20,484,007 UART: [art] Store in slot 0x4
20,526,769 UART: [art] Derive Key Pair
20,527,811 UART: [art] Store priv key in slot 0x5
22,954,622 UART: [art] Derive Key Pair - Done
22,967,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,760 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,265 UART: [art] PUB.X = EE64B8F01B729B735F33A5CA9FF32E1DCCC95BF11AC131B477671A686C257D5FB5C0913AD4966C725D02A1D4FD382B08
24,682,572 UART: [art] PUB.Y = DACF9A0A77DFD189112B1BF5798298DEAA6A2A0E140CAA534716354DDEA00EDD6035C2C38AB196BF267533E3D7B93CAC
24,689,824 UART: [art] SIG.R = F6A1A9FB0BE6406DB27DB96F39FBCA6E81E338458E302BBC30BF4F5B8AA8845B0C830D830588F053AF3F50672EB76FAD
24,697,234 UART: [art] SIG.S = C5AE2950DF6E6F0740838BA3F05948786AD33F40F3B6B632110A48F85A5CB09DFE58A741FB95251DE6901029FF0BD30C
25,676,414 UART: Caliptra RT
25,677,112 UART: [state] CFI Enabled
25,810,192 UART: [rt] RT listening for mailbox commands...
25,841,938 UART: [rt]cmd =0x464d4352, len=4
25,852,490 >>> mbox cmd response data (780 bytes)
26,022,136 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,052,403 UART: [rt]cmd =0x43455252, len=4
26,063,690 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,175 UART:
192,531 UART: Running Caliptra ROM ...
193,710 UART:
193,882 UART: [state] CFI Enabled
264,832 UART: [state] LifecycleState = Unprovisioned
267,247 UART: [state] DebugLocked = No
268,930 UART: [state] WD Timer not started. Device not locked for debugging
273,603 UART: [kat] SHA2-256
463,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,210 UART: [kat] ++
474,703 UART: [kat] sha1
487,140 UART: [kat] SHA2-256
490,218 UART: [kat] SHA2-384
496,560 UART: [kat] SHA2-512-ACC
499,136 UART: [kat] ECC-384
2,950,254 UART: [kat] HMAC-384Kdf
2,972,658 UART: [kat] LMS
3,504,378 UART: [kat] --
3,508,170 UART: [cold-reset] ++
3,509,156 UART: [fht] FHT @ 0x50003400
3,520,990 UART: [idev] ++
3,521,623 UART: [idev] CDI.KEYID = 6
3,522,604 UART: [idev] SUBJECT.KEYID = 7
3,523,778 UART: [idev] UDS.KEYID = 0
3,524,700 ready_for_fw is high
3,524,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,004 UART: [idev] Erasing UDS.KEYID = 0
6,030,946 UART: [idev] Sha1 KeyId Algorithm
6,053,322 UART: [idev] --
6,059,535 UART: [ldev] ++
6,060,217 UART: [ldev] CDI.KEYID = 6
6,061,125 UART: [ldev] SUBJECT.KEYID = 5
6,062,339 UART: [ldev] AUTHORITY.KEYID = 7
6,063,511 UART: [ldev] FE.KEYID = 1
6,100,079 UART: [ldev] Erasing FE.KEYID = 1
8,611,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,201 UART: [ldev] --
10,416,272 UART: [fwproc] Wait for Commands...
10,418,578 UART: [fwproc] Recv command 0x46574c44
10,420,827 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,322 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,929 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,444 >>> mbox cmd response: success
14,683,959 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,686,962 UART: [afmc] ++
14,687,650 UART: [afmc] CDI.KEYID = 6
14,688,904 UART: [afmc] SUBJECT.KEYID = 7
14,690,336 UART: [afmc] AUTHORITY.KEYID = 5
17,217,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,952,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,954,205 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,969,318 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,984,471 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,999,341 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,022,301 UART: [afmc] --
19,025,739 UART: [cold-reset] --
19,029,206 UART: [state] Locking Datavault
19,034,685 UART: [state] Locking PCR0, PCR1 and PCR31
19,036,874 UART: [state] Locking ICCM
19,038,379 UART: [exit] Launching FMC @ 0x40000130
19,047,049 UART:
19,047,300 UART: Running Caliptra FMC ...
19,048,422 UART:
19,048,583 UART: [state] CFI Enabled
19,109,824 UART: [fht] FMC Alias Private Key: 7
20,876,083 UART: [art] Extend RT PCRs Done
20,877,329 UART: [art] Lock RT PCRs Done
20,878,601 UART: [art] Populate DV Done
20,883,979 UART: [fht] FMC Alias Private Key: 7
20,885,625 UART: [art] Derive CDI
20,886,444 UART: [art] Store in slot 0x4
20,942,439 UART: [art] Derive Key Pair
20,943,440 UART: [art] Store priv key in slot 0x5
23,406,244 UART: [art] Derive Key Pair - Done
23,418,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,132,117 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,624 UART: [art] PUB.X = A557B1526CF8227F8DD3B37D876A7149D0A96F909458193B8D9DBF5E08D0F7682520541DA795379DB7ECB4821AEF08BC
25,140,847 UART: [art] PUB.Y = BB11E0D0F2E0BB3C1A036AFA012571556706BD4C87DA6389078B25CCF96C9F0D83A0A7F02FAEE9D9213345AD4E8D7A4C
25,148,131 UART: [art] SIG.R = 071422EEC9818D1163B91FC5305EC99C22714830BF3789F7C16C57335C81947F35BE036502A9CF4D5B9D473BD61A2166
25,155,495 UART: [art] SIG.S = 29E09F6AA342B92D5C095C05FEB66A6890CB2F045AD7C3A3E2C1041D3DAC1393D711C43031F9FABA99C238CBA4D9B053
26,134,174 UART: Caliptra RT
26,134,863 UART: [state] CFI Enabled
26,314,594 UART: [rt] RT listening for mailbox commands...
26,346,114 UART: [rt]cmd =0x464d4352, len=4
26,356,279 >>> mbox cmd response data (780 bytes)
26,525,656 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,555,811 UART: [rt]cmd =0x43455252, len=4
26,567,015 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,416,921 ready_for_fw is high
3,417,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,805,062 >>> mbox cmd response: success
14,805,984 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,093,428 UART:
19,093,831 UART: Running Caliptra FMC ...
19,094,967 UART:
19,095,125 UART: [state] CFI Enabled
19,161,697 UART: [fht] FMC Alias Private Key: 7
20,928,490 UART: [art] Extend RT PCRs Done
20,929,700 UART: [art] Lock RT PCRs Done
20,930,964 UART: [art] Populate DV Done
20,936,280 UART: [fht] FMC Alias Private Key: 7
20,937,877 UART: [art] Derive CDI
20,938,614 UART: [art] Store in slot 0x4
20,994,134 UART: [art] Derive Key Pair
20,995,196 UART: [art] Store priv key in slot 0x5
23,457,951 UART: [art] Derive Key Pair - Done
23,470,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,182,983 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,487 UART: [art] PUB.X = 60EACD7295AE210195A09C4858CC688967A7C307A96398E8424820073DCB830C3D38FEBA2CF8365FAAC6E2BFA4BC3486
25,191,792 UART: [art] PUB.Y = 104CA0CDA4467750E1C4C12F316C7CF1C09812FD9F12E8A8D1E9688984F78BA7B5EA00524AA2F1D9D42F01D61871CD96
25,199,018 UART: [art] SIG.R = 4C9F3F0C8D52438081CD346B3773512F9EEAF7C30B5A0DFE3D4A3D44F254C584D2904ED2F3E144E377607512C3EC8043
25,206,429 UART: [art] SIG.S = C66B35F2ECD364B159A65BB23979DC50EA12EADEE878FD18A177C1DF8DFD9B5FEBB390B274632B62973428A2A5C25254
26,185,067 UART: Caliptra RT
26,185,766 UART: [state] CFI Enabled
26,365,211 UART: [rt] RT listening for mailbox commands...
26,396,509 UART: [rt]cmd =0x464d4352, len=4
26,406,675 >>> mbox cmd response data (780 bytes)
26,575,812 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,605,844 UART: [rt]cmd =0x43455252, len=4
26,617,319 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,495 UART:
192,864 UART: Running Caliptra ROM ...
193,967 UART:
603,520 UART: [state] CFI Enabled
617,843 UART: [state] LifecycleState = Unprovisioned
620,229 UART: [state] DebugLocked = No
622,108 UART: [state] WD Timer not started. Device not locked for debugging
627,360 UART: [kat] SHA2-256
817,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,983 UART: [kat] ++
828,500 UART: [kat] sha1
839,804 UART: [kat] SHA2-256
842,821 UART: [kat] SHA2-384
847,695 UART: [kat] SHA2-512-ACC
850,297 UART: [kat] ECC-384
3,290,686 UART: [kat] HMAC-384Kdf
3,302,926 UART: [kat] LMS
3,834,806 UART: [kat] --
3,838,526 UART: [cold-reset] ++
3,840,542 UART: [fht] FHT @ 0x50003400
3,852,164 UART: [idev] ++
3,852,873 UART: [idev] CDI.KEYID = 6
3,853,833 UART: [idev] SUBJECT.KEYID = 7
3,855,005 UART: [idev] UDS.KEYID = 0
3,855,945 ready_for_fw is high
3,856,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,111 UART: [idev] Erasing UDS.KEYID = 0
6,330,368 UART: [idev] Sha1 KeyId Algorithm
6,352,636 UART: [idev] --
6,357,458 UART: [ldev] ++
6,358,197 UART: [ldev] CDI.KEYID = 6
6,359,082 UART: [ldev] SUBJECT.KEYID = 5
6,360,189 UART: [ldev] AUTHORITY.KEYID = 7
6,361,476 UART: [ldev] FE.KEYID = 1
6,375,345 UART: [ldev] Erasing FE.KEYID = 1
8,851,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,671 UART: [ldev] --
10,645,612 UART: [fwproc] Wait for Commands...
10,648,461 UART: [fwproc] Recv command 0x46574c44
10,650,767 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,266 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,874 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,745 >>> mbox cmd response: success
14,911,811 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,914,709 UART: [afmc] ++
14,915,418 UART: [afmc] CDI.KEYID = 6
14,916,530 UART: [afmc] SUBJECT.KEYID = 7
14,918,074 UART: [afmc] AUTHORITY.KEYID = 5
17,419,514 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,082 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,144,055 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,156 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,174,327 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,200 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,920 UART: [afmc] --
19,215,681 UART: [cold-reset] --
19,218,866 UART: [state] Locking Datavault
19,225,639 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,785 UART: [state] Locking ICCM
19,229,347 UART: [exit] Launching FMC @ 0x40000130
19,238,032 UART:
19,238,270 UART: Running Caliptra FMC ...
19,239,372 UART:
19,239,532 UART: [state] CFI Enabled
19,247,565 UART: [fht] FMC Alias Private Key: 7
21,013,607 UART: [art] Extend RT PCRs Done
21,014,844 UART: [art] Lock RT PCRs Done
21,016,240 UART: [art] Populate DV Done
21,021,821 UART: [fht] FMC Alias Private Key: 7
21,023,473 UART: [art] Derive CDI
21,024,218 UART: [art] Store in slot 0x4
21,067,087 UART: [art] Derive Key Pair
21,068,111 UART: [art] Store priv key in slot 0x5
23,494,409 UART: [art] Derive Key Pair - Done
23,507,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,133 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,644 UART: [art] PUB.X = 5945F3844DB96DB9273A7DF6CC054938D16E6467FBA5BFE6BF890EDFD948D8464E1F4A68121E5956CA82E3A3226286DC
25,222,908 UART: [art] PUB.Y = EEB3C49439B37F8DF57FC3C2C069C61FCA44E5F2556A06807D9C8F5CFFA3AE28D678F0AF73EB64A0BD4C4ABBE96A1C1B
25,230,218 UART: [art] SIG.R = 5CAD958637D79EB392332373E680CE0740B7AB7607ABD4B9C62B89BE34E2B56208543872D2EC42CF0551E45BCD7D1479
25,237,571 UART: [art] SIG.S = 5F1539CF2AA7788A477144DD8AF40073890232C77C31AC0C2D0A9B4E15657251CA9497987A9791DB6B10249EC5E70415
26,216,248 UART: Caliptra RT
26,216,938 UART: [state] CFI Enabled
26,348,663 UART: [rt] RT listening for mailbox commands...
26,379,731 UART: [rt]cmd =0x464d4352, len=4
26,389,926 >>> mbox cmd response data (780 bytes)
26,560,954 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,590,985 UART: [rt]cmd =0x43455252, len=4
26,602,500 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,755,769 ready_for_fw is high
3,756,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,052,432 >>> mbox cmd response: success
15,053,870 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,307,252 UART:
19,307,651 UART: Running Caliptra FMC ...
19,308,876 UART:
19,309,069 UART: [state] CFI Enabled
19,316,753 UART: [fht] FMC Alias Private Key: 7
21,082,631 UART: [art] Extend RT PCRs Done
21,083,854 UART: [art] Lock RT PCRs Done
21,085,765 UART: [art] Populate DV Done
21,091,359 UART: [fht] FMC Alias Private Key: 7
21,092,857 UART: [art] Derive CDI
21,093,603 UART: [art] Store in slot 0x4
21,136,310 UART: [art] Derive Key Pair
21,137,306 UART: [art] Store priv key in slot 0x5
23,564,436 UART: [art] Derive Key Pair - Done
23,577,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,284,228 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,739 UART: [art] PUB.X = 4A65EDF0460B390A1D6F1C6A3F4FBB616B9EAF47F0040ED00CA0C92E1EF04749358EB0E48D98461E174D321B5003A42A
25,292,997 UART: [art] PUB.Y = 921801BB9058B1A876F859508B7FD17B440687BF685BC3A3AEA6D72BCE7A92588F9BEC6866A8BFB9B82F9F81F05F7E8E
25,300,248 UART: [art] SIG.R = 6B3BBCE5E6081C7EE2056E5F4561D0B7A63E117D6CF62935E35F573F48A5D13E9BE0E13BFEF90A3BFD8A1C63715550F6
25,307,670 UART: [art] SIG.S = E01C31B0CED41C01413A4ECE81C01BBD986EA66B61FDA94A92BA775E8C82EE59753A7F25A6A1A35F145B4C100B64CBEF
26,286,690 UART: Caliptra RT
26,287,403 UART: [state] CFI Enabled
26,419,823 UART: [rt] RT listening for mailbox commands...
26,451,285 UART: [rt]cmd =0x464d4352, len=4
26,461,388 >>> mbox cmd response data (780 bytes)
26,632,081 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,662,206 UART: [rt]cmd =0x43455252, len=4
26,673,652 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,489 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,137 UART: [kat] SHA2-256
882,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,183 UART: [kat] ++
886,335 UART: [kat] sha1
890,501 UART: [kat] SHA2-256
892,439 UART: [kat] SHA2-384
895,412 UART: [kat] SHA2-512-ACC
897,313 UART: [kat] ECC-384
902,920 UART: [kat] HMAC-384Kdf
907,526 UART: [kat] LMS
1,475,722 UART: [kat] --
1,476,627 UART: [cold-reset] ++
1,477,055 UART: [fht] Storing FHT @ 0x50003400
1,479,784 UART: [idev] ++
1,479,952 UART: [idev] CDI.KEYID = 6
1,480,312 UART: [idev] SUBJECT.KEYID = 7
1,480,736 UART: [idev] UDS.KEYID = 0
1,481,081 ready_for_fw is high
1,481,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,802 UART: [idev] Erasing UDS.KEYID = 0
1,505,658 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,248 UART: [idev] --
1,515,177 UART: [ldev] ++
1,515,345 UART: [ldev] CDI.KEYID = 6
1,515,708 UART: [ldev] SUBJECT.KEYID = 5
1,516,134 UART: [ldev] AUTHORITY.KEYID = 7
1,516,597 UART: [ldev] FE.KEYID = 1
1,521,733 UART: [ldev] Erasing FE.KEYID = 1
1,546,894 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,006 UART: [ldev] --
1,586,433 UART: [fwproc] Waiting for Commands...
1,587,166 UART: [fwproc] Received command 0x46574c44
1,587,957 UART: [fwproc] Received Image of size 118548 bytes
2,933,095 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,137 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,355 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,730 >>> mbox cmd response: success
3,131,730 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,132,974 UART: [afmc] ++
3,133,142 UART: [afmc] CDI.KEYID = 6
3,133,504 UART: [afmc] SUBJECT.KEYID = 7
3,133,929 UART: [afmc] AUTHORITY.KEYID = 5
3,168,764 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,978 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,758 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,467 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,350 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,033 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,935 UART: [afmc] --
3,211,937 UART: [cold-reset] --
3,212,575 UART: [state] Locking Datavault
3,213,928 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,532 UART: [state] Locking ICCM
3,214,986 UART: [exit] Launching FMC @ 0x40000130
3,220,316 UART:
3,220,332 UART: Running Caliptra FMC ...
3,220,740 UART:
3,220,794 UART: [state] CFI Enabled
3,231,252 UART: [fht] FMC Alias Private Key: 7
3,350,518 UART: [art] Extend RT PCRs Done
3,350,946 UART: [art] Lock RT PCRs Done
3,352,558 UART: [art] Populate DV Done
3,360,715 UART: [fht] FMC Alias Private Key: 7
3,361,815 UART: [art] Derive CDI
3,362,095 UART: [art] Store in slot 0x4
3,447,289 UART: [art] Derive Key Pair
3,447,649 UART: [art] Store priv key in slot 0x5
3,460,820 UART: [art] Derive Key Pair - Done
3,475,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,464 UART: [art] PUB.X = 43837F2CE3ED0C716232CF71FAD73C3511F7E7643CFE93DC34D37AA8CBAF4077C63150A5E7B8397BF094F99F6715FCB0
3,498,243 UART: [art] PUB.Y = 4D7E4D11F36D7EA9C10C18ECA99CA13A56D0B1DFFD49A4DDDAA10050A03835A75A208F98177281E9A3CEC7E1BB46CDBC
3,505,192 UART: [art] SIG.R = F7887746E4F4086CF93208FC64B70DEDB585C4B64A9919F3F7342299015CEF8FBC1D54EEB10DF1423D00595364D8F59C
3,511,929 UART: [art] SIG.S = E712E7CD2E578B59062F7B3E2BD0EB70AC1D78B9471192633B130AC1C5CEDC22628FA65518BB57A99D72E20A8C6AECEB
3,535,896 UART: Caliptra RT
3,536,147 UART: [state] CFI Enabled
3,656,310 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,018 UART: [rt]cmd =0x464d4352, len=4
3,696,691 >>> mbox cmd response data (780 bytes)
3,696,692 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,211 UART: [rt]cmd =0x43455252, len=4
3,737,221 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,037 ready_for_fw is high
1,363,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,396 >>> mbox cmd response: success
2,981,396 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,043,129 UART:
3,043,145 UART: Running Caliptra FMC ...
3,043,553 UART:
3,043,607 UART: [state] CFI Enabled
3,053,623 UART: [fht] FMC Alias Private Key: 7
3,172,715 UART: [art] Extend RT PCRs Done
3,173,143 UART: [art] Lock RT PCRs Done
3,174,635 UART: [art] Populate DV Done
3,182,882 UART: [fht] FMC Alias Private Key: 7
3,183,972 UART: [art] Derive CDI
3,184,252 UART: [art] Store in slot 0x4
3,270,112 UART: [art] Derive Key Pair
3,270,472 UART: [art] Store priv key in slot 0x5
3,283,855 UART: [art] Derive Key Pair - Done
3,298,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,198 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,963 UART: [art] PUB.X = 5DBC1D6E12B02272C2951C740707C1ED89EEBEA8D57676B05689AE713621EC1347827704D69021ED94F9EEA5196BDFB6
3,321,728 UART: [art] PUB.Y = 266AB75F5C1C0236CB9D73E59F69AD786509CEB6123C2F7941D1FC87152C76082E19141E87C5130A4AEE471878C005A8
3,328,661 UART: [art] SIG.R = 973F3BF3AF5627D908F35DA2C0114495922C13124DCFED75545F895B46BB35B9ABE7A560C8DBE7A14FE11E1A22BA6AAA
3,335,444 UART: [art] SIG.S = 6F46F81D151222147859C10BDE79DC3733513E8CFF90D8F72B64A061E97EE2608CC489631CE999AB9C1B0065966DAEFB
3,359,149 UART: Caliptra RT
3,359,400 UART: [state] CFI Enabled
3,479,490 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,922 UART: [rt]cmd =0x464d4352, len=4
3,519,661 >>> mbox cmd response data (780 bytes)
3,519,662 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,939 UART: [rt]cmd =0x43455252, len=4
3,559,720 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,504 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,012 UART: [kat] SHA2-256
881,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,058 UART: [kat] ++
886,210 UART: [kat] sha1
890,564 UART: [kat] SHA2-256
892,502 UART: [kat] SHA2-384
895,201 UART: [kat] SHA2-512-ACC
897,102 UART: [kat] ECC-384
902,877 UART: [kat] HMAC-384Kdf
907,585 UART: [kat] LMS
1,475,781 UART: [kat] --
1,476,616 UART: [cold-reset] ++
1,476,990 UART: [fht] Storing FHT @ 0x50003400
1,479,923 UART: [idev] ++
1,480,091 UART: [idev] CDI.KEYID = 6
1,480,451 UART: [idev] SUBJECT.KEYID = 7
1,480,875 UART: [idev] UDS.KEYID = 0
1,481,220 ready_for_fw is high
1,481,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,635 UART: [idev] Erasing UDS.KEYID = 0
1,505,861 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,531 UART: [idev] --
1,515,626 UART: [ldev] ++
1,515,794 UART: [ldev] CDI.KEYID = 6
1,516,157 UART: [ldev] SUBJECT.KEYID = 5
1,516,583 UART: [ldev] AUTHORITY.KEYID = 7
1,517,046 UART: [ldev] FE.KEYID = 1
1,522,114 UART: [ldev] Erasing FE.KEYID = 1
1,547,441 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,543 UART: [ldev] --
1,586,874 UART: [fwproc] Waiting for Commands...
1,587,535 UART: [fwproc] Received command 0x46574c44
1,588,326 UART: [fwproc] Received Image of size 118548 bytes
2,932,252 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,978 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,196 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,439 >>> mbox cmd response: success
3,130,439 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,131,517 UART: [afmc] ++
3,131,685 UART: [afmc] CDI.KEYID = 6
3,132,047 UART: [afmc] SUBJECT.KEYID = 7
3,132,472 UART: [afmc] AUTHORITY.KEYID = 5
3,167,483 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,859 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,639 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,348 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,231 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,914 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,734 UART: [afmc] --
3,210,630 UART: [cold-reset] --
3,211,484 UART: [state] Locking Datavault
3,212,865 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,469 UART: [state] Locking ICCM
3,213,913 UART: [exit] Launching FMC @ 0x40000130
3,219,243 UART:
3,219,259 UART: Running Caliptra FMC ...
3,219,667 UART:
3,219,810 UART: [state] CFI Enabled
3,230,628 UART: [fht] FMC Alias Private Key: 7
3,350,406 UART: [art] Extend RT PCRs Done
3,350,834 UART: [art] Lock RT PCRs Done
3,352,392 UART: [art] Populate DV Done
3,360,597 UART: [fht] FMC Alias Private Key: 7
3,361,655 UART: [art] Derive CDI
3,361,935 UART: [art] Store in slot 0x4
3,447,761 UART: [art] Derive Key Pair
3,448,121 UART: [art] Store priv key in slot 0x5
3,461,390 UART: [art] Derive Key Pair - Done
3,476,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,747 UART: [art] PUB.X = CE1294FAA756182BF07FB3F58E21A1E310D6B949C0FD3AE5550D95BFDBE12D46B31E0779A1AEF5CBCBA3BB4CA14914DD
3,499,537 UART: [art] PUB.Y = 30B4BBD1A73D8B41D75E8B79DE9B5D1BC5DD34B901F25FFE72A5F6303E55C62FF0323CE95B7AE07433B9C9FCC750398E
3,506,502 UART: [art] SIG.R = 1B19E917470CEB0D5A5AC85F78EC47DD2FCFB88C599C73356E4AC138BE74E3A578A0A564EA671D9499E1BFCA0C2A24BE
3,513,283 UART: [art] SIG.S = 6A3D511035ABC57B29DFE121EDEE51504CDDECD3CB4FD06E10D9AA5662B186D8175217173336B16314BF4F623A4CF44E
3,536,993 UART: Caliptra RT
3,537,336 UART: [state] CFI Enabled
3,658,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,405 UART: [rt]cmd =0x464d4352, len=4
3,699,090 >>> mbox cmd response data (780 bytes)
3,699,091 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,728,322 UART: [rt]cmd =0x43455252, len=4
3,739,193 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,352 ready_for_fw is high
1,362,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,295 >>> mbox cmd response: success
2,980,295 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,042,322 UART:
3,042,338 UART: Running Caliptra FMC ...
3,042,746 UART:
3,042,889 UART: [state] CFI Enabled
3,053,111 UART: [fht] FMC Alias Private Key: 7
3,172,101 UART: [art] Extend RT PCRs Done
3,172,529 UART: [art] Lock RT PCRs Done
3,174,389 UART: [art] Populate DV Done
3,182,862 UART: [fht] FMC Alias Private Key: 7
3,183,936 UART: [art] Derive CDI
3,184,216 UART: [art] Store in slot 0x4
3,269,730 UART: [art] Derive Key Pair
3,270,090 UART: [art] Store priv key in slot 0x5
3,283,841 UART: [art] Derive Key Pair - Done
3,298,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,034 UART: [art] PUB.X = 0CE35601082B40DB09C1A6560FF1C92B0B72978C4BD79A8F9CE1A86A96D2E8053B82102F1666AE22C29435141F58BFBC
3,321,787 UART: [art] PUB.Y = 5997BA0DE5C61EBD9E4947BA3256DD77EE230A368D2E728FA55D41CFF7C92238B398ADAFB9010863F059E88EFA9F8755
3,328,737 UART: [art] SIG.R = 2F14D15D5FC01D73557A19DB8A8EA239AC79A6D81B2CDFC7F98438C9ABCF85C8FEB1831A858F3B1B4B8570A6356D2150
3,335,521 UART: [art] SIG.S = 716A4A7EAEDCFA0DC2E962BE710CA0A810BB50B837DDC1B8A13A4EF204272CAFFE0255D0A25610563072303FC2E683F1
3,359,117 UART: Caliptra RT
3,359,460 UART: [state] CFI Enabled
3,480,435 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,705 UART: [rt]cmd =0x464d4352, len=4
3,520,678 >>> mbox cmd response data (780 bytes)
3,520,679 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,080 UART: [rt]cmd =0x43455252, len=4
3,560,925 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,116 UART: [kat] ++
895,268 UART: [kat] sha1
899,498 UART: [kat] SHA2-256
901,438 UART: [kat] SHA2-384
904,111 UART: [kat] SHA2-512-ACC
906,012 UART: [kat] ECC-384
915,785 UART: [kat] HMAC-384Kdf
920,461 UART: [kat] LMS
1,168,773 UART: [kat] --
1,169,520 UART: [cold-reset] ++
1,169,990 UART: [fht] FHT @ 0x50003400
1,172,440 UART: [idev] ++
1,172,608 UART: [idev] CDI.KEYID = 6
1,172,969 UART: [idev] SUBJECT.KEYID = 7
1,173,394 UART: [idev] UDS.KEYID = 0
1,173,740 ready_for_fw is high
1,173,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,227 UART: [idev] Erasing UDS.KEYID = 0
1,198,241 UART: [idev] Sha1 KeyId Algorithm
1,207,015 UART: [idev] --
1,208,142 UART: [ldev] ++
1,208,310 UART: [ldev] CDI.KEYID = 6
1,208,674 UART: [ldev] SUBJECT.KEYID = 5
1,209,101 UART: [ldev] AUTHORITY.KEYID = 7
1,209,564 UART: [ldev] FE.KEYID = 1
1,214,872 UART: [ldev] Erasing FE.KEYID = 1
1,240,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,564 UART: [ldev] --
1,279,789 UART: [fwproc] Wait for Commands...
1,280,438 UART: [fwproc] Recv command 0x46574c44
1,281,171 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,027 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,202 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,585 >>> mbox cmd response: success
2,823,585 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,824,763 UART: [afmc] ++
2,824,931 UART: [afmc] CDI.KEYID = 6
2,825,294 UART: [afmc] SUBJECT.KEYID = 7
2,825,720 UART: [afmc] AUTHORITY.KEYID = 5
2,861,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,238 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,987 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,697 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,578 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,279 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,012 UART: [afmc] --
2,904,907 UART: [cold-reset] --
2,905,795 UART: [state] Locking Datavault
2,906,790 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,394 UART: [state] Locking ICCM
2,908,042 UART: [exit] Launching FMC @ 0x40000130
2,913,372 UART:
2,913,388 UART: Running Caliptra FMC ...
2,913,796 UART:
2,913,850 UART: [state] CFI Enabled
2,924,306 UART: [fht] FMC Alias Private Key: 7
3,043,302 UART: [art] Extend RT PCRs Done
3,043,730 UART: [art] Lock RT PCRs Done
3,045,174 UART: [art] Populate DV Done
3,053,179 UART: [fht] FMC Alias Private Key: 7
3,054,125 UART: [art] Derive CDI
3,054,405 UART: [art] Store in slot 0x4
3,140,168 UART: [art] Derive Key Pair
3,140,528 UART: [art] Store priv key in slot 0x5
3,153,508 UART: [art] Derive Key Pair - Done
3,168,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,415 UART: [art] PUB.X = DB8C9AFED46E1F7DE0259426C5A277FC05AC506A52E31DA092CA7FE8B188C21F7D485BFF79607EA5BC50AC6AD45B068C
3,191,201 UART: [art] PUB.Y = 19CBED593A314133CF1F153320B0BC0C3F19D2589BCC84519B3942D4ECA37230CC013E70FCB2341B784578B84FD52DE0
3,198,151 UART: [art] SIG.R = 15719065C17C99E04B53624CCB9F0CA10021163FCBE0FF96B5DF84A1B2145F6372A5DA996BED3729EAF910FEA399DA75
3,204,906 UART: [art] SIG.S = 25DB8C8BC612B03EC5356077D74C011E885F8FDA8A2459CFFC1128711E41796B26FBF450F7F7D6F9324DCBB1A76993F7
3,228,945 UART: Caliptra RT
3,229,196 UART: [state] CFI Enabled
3,347,958 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,208 UART: [rt]cmd =0x464d4352, len=4
3,388,003 >>> mbox cmd response data (780 bytes)
3,388,004 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,553 UART: [rt]cmd =0x43455252, len=4
3,428,404 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,652 ready_for_fw is high
1,059,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,736 >>> mbox cmd response: success
2,677,736 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,739,723 UART:
2,739,739 UART: Running Caliptra FMC ...
2,740,147 UART:
2,740,201 UART: [state] CFI Enabled
2,750,799 UART: [fht] FMC Alias Private Key: 7
2,869,713 UART: [art] Extend RT PCRs Done
2,870,141 UART: [art] Lock RT PCRs Done
2,871,985 UART: [art] Populate DV Done
2,880,102 UART: [fht] FMC Alias Private Key: 7
2,881,134 UART: [art] Derive CDI
2,881,414 UART: [art] Store in slot 0x4
2,966,981 UART: [art] Derive Key Pair
2,967,341 UART: [art] Store priv key in slot 0x5
2,980,933 UART: [art] Derive Key Pair - Done
2,996,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,179 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,944 UART: [art] PUB.X = 29F6D16CFF98F7DB467CC17EEF3721839CE7ACA564DAB76E3181E4FC50D035081FCA52A0BCAAC78A8EB2312C766852E8
3,018,729 UART: [art] PUB.Y = 2509639D8FD7BE5F20A6F8BEDD256EB48A7D92AE4810987DAC85949400A247497EEF3B8A3EA07F82383604DB45FD232C
3,025,659 UART: [art] SIG.R = E52DF704D2249B5738520B288F274176B2447A02FF87B471E6D6C40739DE58CD264D9C4FEF5AF762A34DF18C2D3BCDF7
3,032,425 UART: [art] SIG.S = 4F11DACA866B3D1165176086D89FBA1E0C6112E5E5ACA64BA62AB51EDA1B0AA09228E321844C0C1D129E339D12EE0E57
3,056,011 UART: Caliptra RT
3,056,262 UART: [state] CFI Enabled
3,175,707 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,283 UART: [rt]cmd =0x464d4352, len=4
3,215,928 >>> mbox cmd response data (780 bytes)
3,215,929 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,245,276 UART: [rt]cmd =0x43455252, len=4
3,256,027 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,604 UART: [kat] SHA2-512-ACC
906,505 UART: [kat] ECC-384
916,380 UART: [kat] HMAC-384Kdf
921,004 UART: [kat] LMS
1,169,316 UART: [kat] --
1,170,383 UART: [cold-reset] ++
1,170,919 UART: [fht] FHT @ 0x50003400
1,173,647 UART: [idev] ++
1,173,815 UART: [idev] CDI.KEYID = 6
1,174,176 UART: [idev] SUBJECT.KEYID = 7
1,174,601 UART: [idev] UDS.KEYID = 0
1,174,947 ready_for_fw is high
1,174,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,800 UART: [idev] Erasing UDS.KEYID = 0
1,199,760 UART: [idev] Sha1 KeyId Algorithm
1,208,648 UART: [idev] --
1,209,495 UART: [ldev] ++
1,209,663 UART: [ldev] CDI.KEYID = 6
1,210,027 UART: [ldev] SUBJECT.KEYID = 5
1,210,454 UART: [ldev] AUTHORITY.KEYID = 7
1,210,917 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,242,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,035 UART: [ldev] --
1,282,476 UART: [fwproc] Wait for Commands...
1,283,289 UART: [fwproc] Recv command 0x46574c44
1,284,022 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,490 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,665 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,048 >>> mbox cmd response: success
2,826,048 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,827,316 UART: [afmc] ++
2,827,484 UART: [afmc] CDI.KEYID = 6
2,827,847 UART: [afmc] SUBJECT.KEYID = 7
2,828,273 UART: [afmc] AUTHORITY.KEYID = 5
2,863,732 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,376 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,086 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,967 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,668 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,515 UART: [afmc] --
2,907,358 UART: [cold-reset] --
2,908,122 UART: [state] Locking Datavault
2,909,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,827 UART: [state] Locking ICCM
2,910,429 UART: [exit] Launching FMC @ 0x40000130
2,915,759 UART:
2,915,775 UART: Running Caliptra FMC ...
2,916,183 UART:
2,916,326 UART: [state] CFI Enabled
2,927,300 UART: [fht] FMC Alias Private Key: 7
3,045,764 UART: [art] Extend RT PCRs Done
3,046,192 UART: [art] Lock RT PCRs Done
3,047,668 UART: [art] Populate DV Done
3,055,897 UART: [fht] FMC Alias Private Key: 7
3,056,967 UART: [art] Derive CDI
3,057,247 UART: [art] Store in slot 0x4
3,142,642 UART: [art] Derive Key Pair
3,143,002 UART: [art] Store priv key in slot 0x5
3,156,216 UART: [art] Derive Key Pair - Done
3,170,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,942 UART: [art] PUB.X = F3FE50EA8EAF806192124C6BF8684281133091FC1B0C5F59D86DF26B426D4A2DC58551781A7529FD0722C6763ED209BE
3,193,705 UART: [art] PUB.Y = ED542DE4324EE24B32C310E1DC281AB231CC67F670F5C0FCCE7B926221712D500992DDE2577D179CBA51E613DD94EB97
3,200,662 UART: [art] SIG.R = DF24EBA1651701631672CF477FBA63CE29E7CF1D2CAB0287140D14A311998538C4A830377AB6D00C63524C1310A959BD
3,207,420 UART: [art] SIG.S = 791D5987E9BC4DA9CCE16BC53556986E36414B4838687E189ACF9C7499A200DC9E2D98E3C78F2EDD642E2361EC54F8C8
3,230,776 UART: Caliptra RT
3,231,119 UART: [state] CFI Enabled
3,351,112 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,696 UART: [rt]cmd =0x464d4352, len=4
3,391,229 >>> mbox cmd response data (780 bytes)
3,391,230 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,420,489 UART: [rt]cmd =0x43455252, len=4
3,431,108 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,175 ready_for_fw is high
1,059,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,861 >>> mbox cmd response: success
2,678,861 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,740,768 UART:
2,740,784 UART: Running Caliptra FMC ...
2,741,192 UART:
2,741,335 UART: [state] CFI Enabled
2,751,787 UART: [fht] FMC Alias Private Key: 7
2,870,719 UART: [art] Extend RT PCRs Done
2,871,147 UART: [art] Lock RT PCRs Done
2,872,405 UART: [art] Populate DV Done
2,880,426 UART: [fht] FMC Alias Private Key: 7
2,881,578 UART: [art] Derive CDI
2,881,858 UART: [art] Store in slot 0x4
2,967,319 UART: [art] Derive Key Pair
2,967,679 UART: [art] Store priv key in slot 0x5
2,981,023 UART: [art] Derive Key Pair - Done
2,995,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,008 UART: [art] PUB.X = 765A02CD756AAC1F560B1F6587CC2C44151EADA96EFE357E73D75BEC1DE9EEDB4E63284090D5589E9350F9BAD8E7E764
3,018,788 UART: [art] PUB.Y = 1E76372F5AF5BB8EA52CB256E1B332F01E7E77495FEB89172414A24E43C7C51305F794CE8C46FA53021A8DC784405143
3,025,732 UART: [art] SIG.R = D8A2E95C92A417F0905E989E7C78AB327EDF434099626A2AFC336D7D923634ECBFB34CEAC2E5F66BF3AA4F5C6183C713
3,032,516 UART: [art] SIG.S = C5D5A34B1BABB69C6E18C2A535E9E0C4B8E24E151B319392B7A2DC2F5563D4C7A8927D859C5195B2ED8BABF49B43B036
3,056,028 UART: Caliptra RT
3,056,371 UART: [state] CFI Enabled
3,176,883 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,153 UART: [rt]cmd =0x464d4352, len=4
3,216,818 >>> mbox cmd response data (780 bytes)
3,216,819 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,246,288 UART: [rt]cmd =0x43455252, len=4
3,257,074 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
893,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,233 UART: [kat] ++
897,385 UART: [kat] sha1
901,585 UART: [kat] SHA2-256
903,525 UART: [kat] SHA2-384
906,236 UART: [kat] SHA2-512-ACC
908,137 UART: [kat] ECC-384
917,826 UART: [kat] HMAC-384Kdf
922,462 UART: [kat] LMS
1,170,790 UART: [kat] --
1,171,889 UART: [cold-reset] ++
1,172,345 UART: [fht] FHT @ 0x50003400
1,174,994 UART: [idev] ++
1,175,162 UART: [idev] CDI.KEYID = 6
1,175,522 UART: [idev] SUBJECT.KEYID = 7
1,175,946 UART: [idev] UDS.KEYID = 0
1,176,291 ready_for_fw is high
1,176,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,116 UART: [idev] Erasing UDS.KEYID = 0
1,201,075 UART: [idev] Sha1 KeyId Algorithm
1,209,659 UART: [idev] --
1,210,741 UART: [ldev] ++
1,210,909 UART: [ldev] CDI.KEYID = 6
1,211,272 UART: [ldev] SUBJECT.KEYID = 5
1,211,698 UART: [ldev] AUTHORITY.KEYID = 7
1,212,161 UART: [ldev] FE.KEYID = 1
1,217,183 UART: [ldev] Erasing FE.KEYID = 1
1,243,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,701 UART: [ldev] --
1,283,102 UART: [fwproc] Wait for Commands...
1,283,796 UART: [fwproc] Recv command 0x46574c44
1,284,524 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,136 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,306 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,537 >>> mbox cmd response: success
2,827,537 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,828,745 UART: [afmc] ++
2,828,913 UART: [afmc] CDI.KEYID = 6
2,829,275 UART: [afmc] SUBJECT.KEYID = 7
2,829,700 UART: [afmc] AUTHORITY.KEYID = 5
2,864,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,722 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,431 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,314 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,015 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,929 UART: [afmc] --
2,907,973 UART: [cold-reset] --
2,908,839 UART: [state] Locking Datavault
2,910,064 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,668 UART: [state] Locking ICCM
2,911,164 UART: [exit] Launching FMC @ 0x40000130
2,916,494 UART:
2,916,510 UART: Running Caliptra FMC ...
2,916,918 UART:
2,916,972 UART: [state] CFI Enabled
2,927,308 UART: [fht] FMC Alias Private Key: 7
3,046,402 UART: [art] Extend RT PCRs Done
3,046,830 UART: [art] Lock RT PCRs Done
3,048,816 UART: [art] Populate DV Done
3,056,785 UART: [fht] FMC Alias Private Key: 7
3,057,855 UART: [art] Derive CDI
3,058,135 UART: [art] Store in slot 0x4
3,143,454 UART: [art] Derive Key Pair
3,143,814 UART: [art] Store priv key in slot 0x5
3,157,110 UART: [art] Derive Key Pair - Done
3,171,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,778 UART: [art] PUB.X = 9BD61F33340C7E39BD4F5D005196DF684B6E33E73856685EE3B59DD69A1D310D235190F2809E9254C99DFC1D91DA3B1F
3,194,524 UART: [art] PUB.Y = 5841973BA1B0BCD1F8E09FB265CEEFB2EB0DDD3D18DF8EC53915728E109B910870F0B4E22FA1C637523AE0E5202C62FF
3,201,484 UART: [art] SIG.R = E61BBE587ADF8930EF2E8AD03DEF5A41F862B8347AD6689DE422F45B11EC14E344C31CF5EB2ADB534ABA033B08BAC2BB
3,208,274 UART: [art] SIG.S = 7F05450D31EB60AB35EF9BAAB83E32395440C540CC1754B86EB2B87972246C5CA4E10626836122D3EC4EC78B31CA0D7D
3,232,468 UART: Caliptra RT
3,232,719 UART: [state] CFI Enabled
3,352,436 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,686 UART: [rt]cmd =0x464d4352, len=4
3,392,377 >>> mbox cmd response data (780 bytes)
3,392,378 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,617 UART: [rt]cmd =0x43455252, len=4
3,432,574 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,141 ready_for_fw is high
1,060,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,784 >>> mbox cmd response: success
2,680,784 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,741,795 UART:
2,741,811 UART: Running Caliptra FMC ...
2,742,219 UART:
2,742,273 UART: [state] CFI Enabled
2,752,767 UART: [fht] FMC Alias Private Key: 7
2,871,583 UART: [art] Extend RT PCRs Done
2,872,011 UART: [art] Lock RT PCRs Done
2,873,937 UART: [art] Populate DV Done
2,882,090 UART: [fht] FMC Alias Private Key: 7
2,883,040 UART: [art] Derive CDI
2,883,320 UART: [art] Store in slot 0x4
2,969,383 UART: [art] Derive Key Pair
2,969,743 UART: [art] Store priv key in slot 0x5
2,983,261 UART: [art] Derive Key Pair - Done
2,998,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,285 UART: [art] PUB.X = 31E53EFFD2D539113FB2FC3FE5309F6B977C5D835AE65D691756DFC929A33E9FC11117444E5DB5C4A185E601FC724543
3,021,058 UART: [art] PUB.Y = C78309840DA5DED907DB7FA93C5D4A6A435057299013EB92D34F05C2DC54B988D24037A85CC8896012BB1E0DFAFEF6C2
3,028,003 UART: [art] SIG.R = 8255BD203F9BBB6301870E041B537087F95673D738140DEDEF38E39282356B818AADB22B328501590E55A538A1B63420
3,034,745 UART: [art] SIG.S = 67F0835BA71055FFD16E0D1B565FA8D9827BD88A5F5AAA79144C0ECCCB023FE1EA9C278DF69DE7E915DDE2FAB0B8B856
3,058,434 UART: Caliptra RT
3,058,685 UART: [state] CFI Enabled
3,177,556 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,202 UART: [rt]cmd =0x464d4352, len=4
3,217,723 >>> mbox cmd response data (780 bytes)
3,217,724 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,345 UART: [rt]cmd =0x43455252, len=4
3,258,072 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
893,687 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,812 UART: [kat] ++
897,964 UART: [kat] sha1
902,082 UART: [kat] SHA2-256
904,022 UART: [kat] SHA2-384
906,977 UART: [kat] SHA2-512-ACC
908,878 UART: [kat] ECC-384
919,035 UART: [kat] HMAC-384Kdf
923,705 UART: [kat] LMS
1,172,033 UART: [kat] --
1,173,056 UART: [cold-reset] ++
1,173,506 UART: [fht] FHT @ 0x50003400
1,176,143 UART: [idev] ++
1,176,311 UART: [idev] CDI.KEYID = 6
1,176,671 UART: [idev] SUBJECT.KEYID = 7
1,177,095 UART: [idev] UDS.KEYID = 0
1,177,440 ready_for_fw is high
1,177,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,057 UART: [idev] Erasing UDS.KEYID = 0
1,202,056 UART: [idev] Sha1 KeyId Algorithm
1,210,436 UART: [idev] --
1,211,330 UART: [ldev] ++
1,211,498 UART: [ldev] CDI.KEYID = 6
1,211,861 UART: [ldev] SUBJECT.KEYID = 5
1,212,287 UART: [ldev] AUTHORITY.KEYID = 7
1,212,750 UART: [ldev] FE.KEYID = 1
1,217,866 UART: [ldev] Erasing FE.KEYID = 1
1,244,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,806 UART: [ldev] --
1,284,143 UART: [fwproc] Wait for Commands...
1,284,867 UART: [fwproc] Recv command 0x46574c44
1,285,595 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,995 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,165 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,482 >>> mbox cmd response: success
2,828,482 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,829,626 UART: [afmc] ++
2,829,794 UART: [afmc] CDI.KEYID = 6
2,830,156 UART: [afmc] SUBJECT.KEYID = 7
2,830,581 UART: [afmc] AUTHORITY.KEYID = 5
2,866,354 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,977 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,686 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,569 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,270 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,982 UART: [afmc] --
2,910,028 UART: [cold-reset] --
2,910,802 UART: [state] Locking Datavault
2,912,255 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,859 UART: [state] Locking ICCM
2,913,525 UART: [exit] Launching FMC @ 0x40000130
2,918,855 UART:
2,918,871 UART: Running Caliptra FMC ...
2,919,279 UART:
2,919,422 UART: [state] CFI Enabled
2,929,906 UART: [fht] FMC Alias Private Key: 7
3,049,044 UART: [art] Extend RT PCRs Done
3,049,472 UART: [art] Lock RT PCRs Done
3,050,798 UART: [art] Populate DV Done
3,059,123 UART: [fht] FMC Alias Private Key: 7
3,060,091 UART: [art] Derive CDI
3,060,371 UART: [art] Store in slot 0x4
3,146,074 UART: [art] Derive Key Pair
3,146,434 UART: [art] Store priv key in slot 0x5
3,159,656 UART: [art] Derive Key Pair - Done
3,174,610 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,340 UART: [art] PUB.X = 822C985890B186D52EA3FEAA7B7E4D97566D97A8CB041A914563A4A63FB4FEBD4B1DE0F7AC94FD9242E7115567B89D6B
3,198,119 UART: [art] PUB.Y = C243BF313A5FFFA08FD63C952B812D16649EAD5E818FE116E9974D286F72BE0829EDE0849A860B1A070DDCF0792D12E6
3,205,067 UART: [art] SIG.R = 691A5D6AE0E049CA43AE5D57D27145668E02552D32BBEC07FFE6B0D3FF942D4FCF087BFFB63BEDF57A5889B47D422D2A
3,211,848 UART: [art] SIG.S = A05CC9EC86E700E683B9F9534AE449CE57EACD171EDF539552B197F8BBD5B1E2537F4F1B1882F43C74580918BC1E4BE4
3,235,469 UART: Caliptra RT
3,235,812 UART: [state] CFI Enabled
3,356,529 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,985 UART: [rt]cmd =0x464d4352, len=4
3,396,852 >>> mbox cmd response data (780 bytes)
3,396,853 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,426,156 UART: [rt]cmd =0x43455252, len=4
3,437,093 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,044 ready_for_fw is high
1,061,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,499 >>> mbox cmd response: success
2,679,499 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,742,516 UART:
2,742,532 UART: Running Caliptra FMC ...
2,742,940 UART:
2,743,083 UART: [state] CFI Enabled
2,753,559 UART: [fht] FMC Alias Private Key: 7
2,872,489 UART: [art] Extend RT PCRs Done
2,872,917 UART: [art] Lock RT PCRs Done
2,874,619 UART: [art] Populate DV Done
2,882,682 UART: [fht] FMC Alias Private Key: 7
2,883,654 UART: [art] Derive CDI
2,883,934 UART: [art] Store in slot 0x4
2,969,489 UART: [art] Derive Key Pair
2,969,849 UART: [art] Store priv key in slot 0x5
2,983,163 UART: [art] Derive Key Pair - Done
2,997,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,955 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,720 UART: [art] PUB.X = 611CC897E5AE01936D251EC5FD918A3A9C483C302CDD9C32D72C628BD8E48188C6F5D50F585259BF2C98F67CD0FDF1F4
3,021,496 UART: [art] PUB.Y = 54CEF04299E2EC8ED61A842C8B6FD519E6269ACFC310EB5ED3BA0868A1F74932CDCA5DF87231C37775CE4C122307CE09
3,028,451 UART: [art] SIG.R = B065C40256D348EDC177E243BB5001EF855383F24E89C496132E5ABA732E211D0BDCC6B749AD146ACBCF5781E161CC22
3,035,220 UART: [art] SIG.S = 0A0973B93F9E6B1DEBE53F4DFFF5AD20F65430C3DE9D791E22A2D174D1C9801EABAD9BCAA00DF7BCCEEBE036B8CDE240
3,059,337 UART: Caliptra RT
3,059,680 UART: [state] CFI Enabled
3,179,513 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,939 UART: [rt]cmd =0x464d4352, len=4
3,219,684 >>> mbox cmd response data (780 bytes)
3,219,685 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,249,026 UART: [rt]cmd =0x43455252, len=4
3,259,835 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,014 UART:
192,374 UART: Running Caliptra ROM ...
193,485 UART:
193,632 UART: [state] CFI Enabled
262,972 UART: [state] LifecycleState = Unprovisioned
264,963 UART: [state] DebugLocked = No
266,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,143 UART: [kat] SHA2-256
440,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,416 UART: [kat] ++
451,870 UART: [kat] sha1
463,307 UART: [kat] SHA2-256
465,989 UART: [kat] SHA2-384
471,203 UART: [kat] SHA2-512-ACC
473,570 UART: [kat] ECC-384
2,767,009 UART: [kat] HMAC-384Kdf
2,780,109 UART: [kat] LMS
3,970,404 UART: [kat] --
3,974,371 UART: [cold-reset] ++
3,976,792 UART: [fht] Storing FHT @ 0x50003400
3,988,412 UART: [idev] ++
3,988,980 UART: [idev] CDI.KEYID = 6
3,989,866 UART: [idev] SUBJECT.KEYID = 7
3,991,108 UART: [idev] UDS.KEYID = 0
4,013,621 UART: [idev] Erasing UDS.KEYID = 0
7,326,448 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,951 UART: [idev] CSR upload requested
7,352,100 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,656,224 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,670,867 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,685,428 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,699,817 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
9,722,727 UART: [idev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
9,846,702 UART: [idev] CSR uploaded
9,859,925 ready_for_fw is high
9,860,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,009,364 UART: [idev] --
10,010,025 UART: [ldev] ++
10,010,525 UART: [ldev] CDI.KEYID = 6
10,011,404 UART: [ldev] SUBJECT.KEYID = 5
10,012,472 UART: [ldev] AUTHORITY.KEYID = 7
10,013,568 UART: [ldev] FE.KEYID = 1
10,014,614 UART: [ldev] Erasing FE.KEYID = 1
13,251,307 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,554,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,569,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,583,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,598,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,617,422 UART: [ldev] --
15,622,667 UART: [fwproc] Waiting for Commands...
15,624,551 UART: [fwproc] Received command 0x46574c44
15,626,788 UART: [fwproc] Received Image of size 118548 bytes
19,732,264 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,806,976 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,880,164 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,207,838 >>> mbox cmd response: success
20,208,949 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,212,598 UART: [afmc] ++
20,213,179 UART: [afmc] CDI.KEYID = 6
20,214,103 UART: [afmc] SUBJECT.KEYID = 7
20,215,335 UART: [afmc] AUTHORITY.KEYID = 5
23,574,623 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,876,702 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,878,965 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
25,893,409 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
25,908,107 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
25,922,529 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
25,943,792 UART: [afmc] --
25,948,211 UART: [cold-reset] --
25,952,399 UART: [state] Locking Datavault
25,957,806 UART: [state] Locking PCR0, PCR1 and PCR31
25,959,559 UART: [state] Locking ICCM
25,961,282 UART: [exit] Launching FMC @ 0x40000130
25,969,678 UART:
25,969,911 UART: Running Caliptra FMC ...
25,971,007 UART:
25,971,194 UART: [state] CFI Enabled
26,037,241 UART: [fht] FMC Alias Private Key: 7
28,377,141 UART: [art] Extend RT PCRs Done
28,378,365 UART: [art] Lock RT PCRs Done
28,379,831 UART: [art] Populate DV Done
28,385,080 UART: [fht] FMC Alias Private Key: 7
28,386,564 UART: [art] Derive CDI
28,387,328 UART: [art] Store in slot 0x4
28,446,009 UART: [art] Derive Key Pair
28,447,057 UART: [art] Store priv key in slot 0x5
31,740,039 UART: [art] Derive Key Pair - Done
31,753,042 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,041,410 UART: [art] Erasing AUTHORITY.KEYID = 7
34,042,999 UART: [art] PUB.X = 75309A791F53D818C76B784FC6C8B1D914CDD6C1AFB8050B2AE6724469F22827521C8DE01A4EA5189AE20E4687B0C22D
34,050,208 UART: [art] PUB.Y = 185C7C4E71019812C08EDE518DC72B4790BBA61A36BD3A8B251458F2C6ABFF52AA9A599C60999AACB4F3482E4424E4DA
34,057,456 UART: [art] SIG.R = 9DB6E536D999B39AF6294447952EB7A816B231279B26A38C101A6B85B913AA12E9CBDE9CC76810345696BCB5F9CB2515
34,064,897 UART: [art] SIG.S = C6E72BE41AF3C14311B12370E4C1CA57A998A7E56B1C55A31B882A27C1E83CFDD80056960730E3881C7978724BC173CF
35,370,397 UART: Caliptra RT
35,371,144 UART: [state] CFI Enabled
35,567,445 UART: [rt] RT listening for mailbox commands...
35,599,050 UART: [rt]cmd =0x49444352, len=4
35,600,729 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
9,505,159 ready_for_fw is high
9,505,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,332,914 >>> mbox cmd response: success
20,334,153 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,017,376 UART:
26,017,839 UART: Running Caliptra FMC ...
26,018,991 UART:
26,019,161 UART: [state] CFI Enabled
26,088,920 UART: [fht] FMC Alias Private Key: 7
28,428,990 UART: [art] Extend RT PCRs Done
28,430,234 UART: [art] Lock RT PCRs Done
28,432,021 UART: [art] Populate DV Done
28,437,663 UART: [fht] FMC Alias Private Key: 7
28,439,326 UART: [art] Derive CDI
28,440,148 UART: [art] Store in slot 0x4
28,496,898 UART: [art] Derive Key Pair
28,497,946 UART: [art] Store priv key in slot 0x5
31,790,311 UART: [art] Derive Key Pair - Done
31,803,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,091,164 UART: [art] Erasing AUTHORITY.KEYID = 7
34,092,695 UART: [art] PUB.X = 2B1CCB17615517AC033213F9517E91C0705F2D335AC6E3A5B7E446E91904B120ED67F7345F7873FB828AD18C267E27EE
34,099,953 UART: [art] PUB.Y = 27AB870A11B265074527B7BDC397A84C72ED0296ABFB903920F7B614A432A63F37AEC60B7C0314C06A9D06719A6C356B
34,107,175 UART: [art] SIG.R = B05F466B577F835AE93A3B934C572E11856469F8466D72C0BAF8B1B00FA04AC1B39E527340B5EC774DF655965F05EE28
34,114,582 UART: [art] SIG.S = FC2CFAFD30BBC8F84B67D6CBB003E49A112C430081A237B504F2E6371012B70B39C1269C1FFE406C971A31193F86B64B
35,419,515 UART: Caliptra RT
35,420,221 UART: [state] CFI Enabled
35,595,876 UART: [rt] RT listening for mailbox commands...
35,627,245 UART: [rt]cmd =0x49444352, len=4
35,629,188 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
192,714 UART:
193,102 UART: Running Caliptra ROM ...
194,234 UART:
604,026 UART: [state] CFI Enabled
619,273 UART: [state] LifecycleState = Unprovisioned
621,211 UART: [state] DebugLocked = No
623,433 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,597 UART: [kat] SHA2-256
798,338 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,927 UART: [kat] ++
809,457 UART: [kat] sha1
819,774 UART: [kat] SHA2-256
822,522 UART: [kat] SHA2-384
828,405 UART: [kat] SHA2-512-ACC
830,775 UART: [kat] ECC-384
3,114,282 UART: [kat] HMAC-384Kdf
3,126,226 UART: [kat] LMS
4,316,373 UART: [kat] --
4,320,032 UART: [cold-reset] ++
4,322,250 UART: [fht] Storing FHT @ 0x50003400
4,334,434 UART: [idev] ++
4,335,069 UART: [idev] CDI.KEYID = 6
4,336,132 UART: [idev] SUBJECT.KEYID = 7
4,337,249 UART: [idev] UDS.KEYID = 0
4,352,215 UART: [idev] Erasing UDS.KEYID = 0
7,621,820 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,362 UART: [idev] CSR upload requested
7,647,567 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,939,353 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,953,988 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,968,536 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,982,927 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,005,848 UART: [idev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
10,129,854 UART: [idev] CSR uploaded
10,143,091 ready_for_fw is high
10,143,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,292,249 UART: [idev] --
10,292,920 UART: [ldev] ++
10,293,412 UART: [ldev] CDI.KEYID = 6
10,294,302 UART: [ldev] SUBJECT.KEYID = 5
10,295,401 UART: [ldev] AUTHORITY.KEYID = 7
10,296,568 UART: [ldev] FE.KEYID = 1
10,297,434 UART: [ldev] Erasing FE.KEYID = 1
13,453,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,745,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,759,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,774,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,789,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,807,228 UART: [ldev] --
15,812,763 UART: [fwproc] Waiting for Commands...
15,814,960 UART: [fwproc] Received command 0x46574c44
15,817,136 UART: [fwproc] Received Image of size 118548 bytes
19,915,564 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,999,237 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,072,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,400,386 >>> mbox cmd response: success
20,401,472 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,404,207 UART: [afmc] ++
20,404,790 UART: [afmc] CDI.KEYID = 6
20,405,666 UART: [afmc] SUBJECT.KEYID = 7
20,406,982 UART: [afmc] AUTHORITY.KEYID = 5
23,719,882 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
26,015,415 UART: [afmc] Erasing AUTHORITY.KEYID = 5
26,017,669 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
26,032,224 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
26,046,932 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
26,061,200 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
26,083,179 UART: [afmc] --
26,087,305 UART: [cold-reset] --
26,091,588 UART: [state] Locking Datavault
26,097,964 UART: [state] Locking PCR0, PCR1 and PCR31
26,099,727 UART: [state] Locking ICCM
26,102,077 UART: [exit] Launching FMC @ 0x40000130
26,110,467 UART:
26,110,704 UART: Running Caliptra FMC ...
26,111,725 UART:
26,111,869 UART: [state] CFI Enabled
26,120,560 UART: [fht] FMC Alias Private Key: 7
28,461,085 UART: [art] Extend RT PCRs Done
28,462,316 UART: [art] Lock RT PCRs Done
28,464,181 UART: [art] Populate DV Done
28,469,529 UART: [fht] FMC Alias Private Key: 7
28,471,219 UART: [art] Derive CDI
28,471,949 UART: [art] Store in slot 0x4
28,514,429 UART: [art] Derive Key Pair
28,515,467 UART: [art] Store priv key in slot 0x5
31,758,000 UART: [art] Derive Key Pair - Done
31,770,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,050,555 UART: [art] Erasing AUTHORITY.KEYID = 7
34,052,097 UART: [art] PUB.X = FF849ADFE1577FB1523C8A3ACF4491044431BE4476F30738E1536598A550098F1C8E46769AF5984FBE9F8E68A71C354F
34,059,297 UART: [art] PUB.Y = B4051B621CB005931483DB886CADE9A38A627C7E55235530838C73B64C159B57CD35BDC9DD9E475A1B0A482A656AB4C9
34,066,579 UART: [art] SIG.R = CAEB577DE041D31FB86E6A6342F0F4348FE54C996DF75C3261C7A3739016D1563DFF2BC0D25CC0B959DA49275841461D
34,073,978 UART: [art] SIG.S = 89EC7CAC975F692C7526BB5B2CD0CD5BB9E66AFEBE2BBA7CFBA936B9857DC3EB90660FD98D3B19A28B477CD056D7C9AD
35,379,552 UART: Caliptra RT
35,380,263 UART: [state] CFI Enabled
35,513,933 UART: [rt] RT listening for mailbox commands...
35,545,338 UART: [rt]cmd =0x49444352, len=4
35,547,194 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
9,751,964 ready_for_fw is high
9,752,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,457,865 >>> mbox cmd response: success
20,459,262 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,099,172 UART:
26,099,562 UART: Running Caliptra FMC ...
26,100,704 UART:
26,100,861 UART: [state] CFI Enabled
26,108,617 UART: [fht] FMC Alias Private Key: 7
28,448,374 UART: [art] Extend RT PCRs Done
28,449,606 UART: [art] Lock RT PCRs Done
28,451,094 UART: [art] Populate DV Done
28,456,576 UART: [fht] FMC Alias Private Key: 7
28,458,272 UART: [art] Derive CDI
28,459,080 UART: [art] Store in slot 0x4
28,502,247 UART: [art] Derive Key Pair
28,503,232 UART: [art] Store priv key in slot 0x5
31,745,558 UART: [art] Derive Key Pair - Done
31,758,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,038,892 UART: [art] Erasing AUTHORITY.KEYID = 7
34,040,514 UART: [art] PUB.X = 349E20C411817B6344BA5B17A631508B84617B91AC3F5A9458A97BB1DABC1BE0168B597998AC6C27F3DFC65E7544FAB1
34,047,659 UART: [art] PUB.Y = F8AB641D99FBDAAA209AFE899AA32BB71F64EC4597F593CF1F724C9974843DC0BE1AEC94A5360ADE8D991A096CDF7C5E
34,054,970 UART: [art] SIG.R = 9EA9B4780BC023F893521B762E48634E21AB078DCD6FA594B5073D430D8DA1575C0D60DA3ED09386BAA75D5279E167F1
34,062,302 UART: [art] SIG.S = 19FD33BF2E7F6FD0DEB84C94FEEFBE0B62554DF43BBC0CEB654F9049D4E2AA8ED8010AA30E1DB5A7B18ECD8A4BC69928
35,367,498 UART: Caliptra RT
35,368,200 UART: [state] CFI Enabled
35,502,232 UART: [rt] RT listening for mailbox commands...
35,533,692 UART: [rt]cmd =0x49444352, len=4
35,535,658 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,063 UART:
192,430 UART: Running Caliptra ROM ...
193,618 UART:
193,767 UART: [state] CFI Enabled
263,763 UART: [state] LifecycleState = Unprovisioned
265,668 UART: [state] DebugLocked = No
267,555 UART: [state] WD Timer not started. Device not locked for debugging
270,593 UART: [kat] SHA2-256
450,265 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,087 UART: [kat] ++
461,639 UART: [kat] sha1
472,219 UART: [kat] SHA2-256
474,907 UART: [kat] SHA2-384
480,680 UART: [kat] SHA2-512-ACC
483,038 UART: [kat] ECC-384
2,948,944 UART: [kat] HMAC-384Kdf
2,970,284 UART: [kat] LMS
3,446,765 UART: [kat] --
3,450,823 UART: [cold-reset] ++
3,451,687 UART: [fht] FHT @ 0x50003400
3,464,785 UART: [idev] ++
3,465,352 UART: [idev] CDI.KEYID = 6
3,466,257 UART: [idev] SUBJECT.KEYID = 7
3,467,498 UART: [idev] UDS.KEYID = 0
3,500,845 UART: [idev] Erasing UDS.KEYID = 0
5,986,440 UART: [idev] Sha1 KeyId Algorithm
6,010,195 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,739,868 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,755,759 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,771,749 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,787,278 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,813,383 UART: [idev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
7,965,186 ready_for_fw is high
7,965,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,114,614 UART: [idev] --
8,115,255 UART: [ldev] ++
8,115,748 UART: [ldev] CDI.KEYID = 6
8,116,668 UART: [ldev] SUBJECT.KEYID = 5
8,117,714 UART: [ldev] AUTHORITY.KEYID = 7
8,118,800 UART: [ldev] FE.KEYID = 1
8,119,695 UART: [ldev] Erasing FE.KEYID = 1
10,528,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,261,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,276,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,292,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,308,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,331,155 UART: [ldev] --
12,336,206 UART: [fwproc] Wait for Commands...
12,338,623 UART: [fwproc] Recv command 0x46574c44
12,340,657 UART: [fwproc] Recv'd Img size: 118548 bytes
15,824,452 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,900,485 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,973,476 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,301,093 >>> mbox cmd response: success
16,302,092 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,304,594 UART: [afmc] ++
16,305,212 UART: [afmc] CDI.KEYID = 6
16,306,120 UART: [afmc] SUBJECT.KEYID = 7
16,307,356 UART: [afmc] AUTHORITY.KEYID = 5
18,838,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,560,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,562,762 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,578,542 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,594,589 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,610,189 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,636,017 UART: [afmc] --
20,640,493 UART: [cold-reset] --
20,644,458 UART: [state] Locking Datavault
20,649,592 UART: [state] Locking PCR0, PCR1 and PCR31
20,651,345 UART: [state] Locking ICCM
20,653,974 UART: [exit] Launching FMC @ 0x40000130
20,662,365 UART:
20,662,596 UART: Running Caliptra FMC ...
20,663,694 UART:
20,663,873 UART: [state] CFI Enabled
20,717,995 UART: [fht] FMC Alias Private Key: 7
22,484,238 UART: [art] Extend RT PCRs Done
22,485,456 UART: [art] Lock RT PCRs Done
22,486,865 UART: [art] Populate DV Done
22,492,114 UART: [fht] FMC Alias Private Key: 7
22,493,697 UART: [art] Derive CDI
22,494,506 UART: [art] Store in slot 0x4
22,551,034 UART: [art] Derive Key Pair
22,552,072 UART: [art] Store priv key in slot 0x5
25,015,236 UART: [art] Derive Key Pair - Done
25,028,185 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,740,794 UART: [art] Erasing AUTHORITY.KEYID = 7
26,742,284 UART: [art] PUB.X = A1E08C3CF320A9FD03860AFC0FD6CB2E1279A1D592D2991CD19F9C6F204933CE516C231F5D80A3C078EFD533D00487A7
26,749,586 UART: [art] PUB.Y = 6016D8BF8B715C329BE9D50D7FEDAF97EC8DA105929A469FEDEEA1A23848D6A8B69A8DA382089708A7EFB7D22D5DF9CB
26,756,862 UART: [art] SIG.R = 1EF74C68490C18BFC04B44EEB1941A9610F34E14E54D243DFF2B10F48C65FEF9480D2DD4C1EA9759EA112CA63FD45C69
26,764,279 UART: [art] SIG.S = 526E96FD92ECEE3D1C38A82C126F8971EE6CFC84894AE03E59955A1FB49EBC878B7F2D9079B79D7A933AC45BB1B906C5
27,743,126 UART: Caliptra RT
27,743,848 UART: [state] CFI Enabled
27,925,040 UART: [rt] RT listening for mailbox commands...
27,956,399 UART: [rt]cmd =0x49444352, len=4
27,963,805 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
7,740,150 ready_for_fw is high
7,740,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,983,305 >>> mbox cmd response: success
15,985,019 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,265,195 UART:
20,265,599 UART: Running Caliptra FMC ...
20,266,745 UART:
20,266,906 UART: [state] CFI Enabled
20,331,496 UART: [fht] FMC Alias Private Key: 7
22,098,173 UART: [art] Extend RT PCRs Done
22,099,394 UART: [art] Lock RT PCRs Done
22,101,291 UART: [art] Populate DV Done
22,106,599 UART: [fht] FMC Alias Private Key: 7
22,108,247 UART: [art] Derive CDI
22,109,056 UART: [art] Store in slot 0x4
22,164,998 UART: [art] Derive Key Pair
22,166,019 UART: [art] Store priv key in slot 0x5
24,628,917 UART: [art] Derive Key Pair - Done
24,641,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,354,873 UART: [art] Erasing AUTHORITY.KEYID = 7
26,356,377 UART: [art] PUB.X = 3F81CC0554BC737B88682A235D9090510026A97EE4E9D6C9030F875F61642F12BEAE0ECD152471C9D3F39322FA5BB1C2
26,363,626 UART: [art] PUB.Y = 53146EEEA5EAA2C398B11E1D74EA116551008770F9DFF4672B84461F82FE4505D8DE898BD1045245EB1DD58FCD558864
26,370,877 UART: [art] SIG.R = D286C0DCAAF13C34CD063014B21776DC0FDB279AD89A1A36D500541FE17C1237E8B99645B6B489BCB4BF9A1136C30925
26,378,212 UART: [art] SIG.S = 70625FBCCABA279C8B77012FCDA434519E436B559ED6B74F94FABE5CC45B13F72808946E63C64425C56FB42EB295FE29
27,357,053 UART: Caliptra RT
27,357,746 UART: [state] CFI Enabled
27,539,069 UART: [rt] RT listening for mailbox commands...
27,570,346 UART: [rt]cmd =0x49444352, len=4
27,577,925 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,437 UART:
192,797 UART: Running Caliptra ROM ...
193,904 UART:
603,755 UART: [state] CFI Enabled
621,266 UART: [state] LifecycleState = Unprovisioned
623,211 UART: [state] DebugLocked = No
626,161 UART: [state] WD Timer not started. Device not locked for debugging
630,346 UART: [kat] SHA2-256
810,018 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,758 UART: [kat] ++
821,293 UART: [kat] sha1
833,043 UART: [kat] SHA2-256
835,759 UART: [kat] SHA2-384
842,685 UART: [kat] SHA2-512-ACC
844,989 UART: [kat] ECC-384
3,289,610 UART: [kat] HMAC-384Kdf
3,302,906 UART: [kat] LMS
3,779,409 UART: [kat] --
3,783,709 UART: [cold-reset] ++
3,786,001 UART: [fht] FHT @ 0x50003400
3,797,886 UART: [idev] ++
3,798,460 UART: [idev] CDI.KEYID = 6
3,799,415 UART: [idev] SUBJECT.KEYID = 7
3,800,660 UART: [idev] UDS.KEYID = 0
3,816,310 UART: [idev] Erasing UDS.KEYID = 0
6,279,369 UART: [idev] Sha1 KeyId Algorithm
6,305,512 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,023,362 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,039,265 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,055,240 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,070,859 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,096,904 UART: [idev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
8,248,721 ready_for_fw is high
8,249,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,397,888 UART: [idev] --
8,398,520 UART: [ldev] ++
8,399,014 UART: [ldev] CDI.KEYID = 6
8,399,896 UART: [ldev] SUBJECT.KEYID = 5
8,401,006 UART: [ldev] AUTHORITY.KEYID = 7
8,402,195 UART: [ldev] FE.KEYID = 1
8,403,102 UART: [ldev] Erasing FE.KEYID = 1
10,755,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,476,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,492,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,508,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,523,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,544,352 UART: [ldev] --
12,549,830 UART: [fwproc] Wait for Commands...
12,552,147 UART: [fwproc] Recv command 0x46574c44
12,554,128 UART: [fwproc] Recv'd Img size: 118548 bytes
16,034,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,113,519 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,186,537 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,513,959 >>> mbox cmd response: success
16,515,047 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,517,196 UART: [afmc] ++
16,517,794 UART: [afmc] CDI.KEYID = 6
16,518,681 UART: [afmc] SUBJECT.KEYID = 7
16,519,961 UART: [afmc] AUTHORITY.KEYID = 5
19,024,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,745,843 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,748,050 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,763,826 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,779,905 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,795,484 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,819,593 UART: [afmc] --
20,823,235 UART: [cold-reset] --
20,828,886 UART: [state] Locking Datavault
20,834,231 UART: [state] Locking PCR0, PCR1 and PCR31
20,836,004 UART: [state] Locking ICCM
20,838,549 UART: [exit] Launching FMC @ 0x40000130
20,846,948 UART:
20,847,185 UART: Running Caliptra FMC ...
20,848,290 UART:
20,848,451 UART: [state] CFI Enabled
20,856,012 UART: [fht] FMC Alias Private Key: 7
22,622,315 UART: [art] Extend RT PCRs Done
22,623,534 UART: [art] Lock RT PCRs Done
22,625,586 UART: [art] Populate DV Done
22,630,941 UART: [fht] FMC Alias Private Key: 7
22,632,482 UART: [art] Derive CDI
22,633,297 UART: [art] Store in slot 0x4
22,676,276 UART: [art] Derive Key Pair
22,677,315 UART: [art] Store priv key in slot 0x5
25,104,544 UART: [art] Derive Key Pair - Done
25,117,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,824,006 UART: [art] Erasing AUTHORITY.KEYID = 7
26,825,512 UART: [art] PUB.X = F6E674997A4B6ACBF20ACE42D5EAFBAA4CF2621A8D190EFBFD6284E88EE21DB0B4954D50251A0C7CC574F842ED69F02F
26,832,858 UART: [art] PUB.Y = FDB52A43489330EE08152B4603EE060ED443809C8186AF3A8CB93215F02CC4530E05FB239B07CC6FB4CAEA6B8A973CDD
26,840,085 UART: [art] SIG.R = F7200C3267F3B0D8E0F8A88FC3F7103830BB9F6F1FB0B83C60FEB10C9A71EB9F58E930E0C9A2571585D1103580DFFCAB
26,847,478 UART: [art] SIG.S = 384699C69AA615FC1E9EF3C18332BCE4365317B2930AA0C7FDC5B0152911377205E2A5A213E3BBA95CFAC70618B0F3A6
27,826,937 UART: Caliptra RT
27,827,656 UART: [state] CFI Enabled
27,959,995 UART: [rt] RT listening for mailbox commands...
27,991,353 UART: [rt]cmd =0x49444352, len=4
27,998,923 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
8,013,269 ready_for_fw is high
8,013,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,181,583 >>> mbox cmd response: success
16,182,781 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,432,359 UART:
20,432,739 UART: Running Caliptra FMC ...
20,433,845 UART:
20,434,000 UART: [state] CFI Enabled
20,442,069 UART: [fht] FMC Alias Private Key: 7
22,208,133 UART: [art] Extend RT PCRs Done
22,209,333 UART: [art] Lock RT PCRs Done
22,211,250 UART: [art] Populate DV Done
22,216,673 UART: [fht] FMC Alias Private Key: 7
22,218,322 UART: [art] Derive CDI
22,219,062 UART: [art] Store in slot 0x4
22,261,765 UART: [art] Derive Key Pair
22,262,765 UART: [art] Store priv key in slot 0x5
24,689,358 UART: [art] Derive Key Pair - Done
24,702,299 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,409,008 UART: [art] Erasing AUTHORITY.KEYID = 7
26,410,528 UART: [art] PUB.X = 5E9DD4A928561B6D70A74A517EC74F88BC704D7769326E6ED48D0CE5B485CF7170C29536C6867CD3672BD17AA1C6F199
26,417,779 UART: [art] PUB.Y = 0E80FBDF4DD0917414582357A92ACDF0D8F7C90344685FC75E7FC77E77E462D907507CB922B41FB1CAD32265EA7B85E1
26,425,023 UART: [art] SIG.R = 326C87E754559A9DD2C55ED6B3FD231BF00315B038AF7BC9D82A510F68C83C77B204C90499443B09482C756A0FAA4B62
26,432,427 UART: [art] SIG.S = 3674FD12927CF775413F96EA41EFEF48D7F9EC00CEE1ECD96DC2E1EFCDF1E7FBE369DDDFF186D2C19BD8CCC326643184
27,411,136 UART: Caliptra RT
27,411,843 UART: [state] CFI Enabled
27,545,108 UART: [rt] RT listening for mailbox commands...
27,576,398 UART: [rt]cmd =0x49444352, len=4
27,584,057 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,055 UART:
192,429 UART: Running Caliptra ROM ...
193,607 UART:
193,764 UART: [state] CFI Enabled
265,265 UART: [state] LifecycleState = Unprovisioned
267,656 UART: [state] DebugLocked = No
270,038 UART: [state] WD Timer not started. Device not locked for debugging
274,084 UART: [kat] SHA2-256
463,949 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,699 UART: [kat] ++
475,147 UART: [kat] sha1
486,390 UART: [kat] SHA2-256
489,395 UART: [kat] SHA2-384
496,782 UART: [kat] SHA2-512-ACC
499,353 UART: [kat] ECC-384
2,946,468 UART: [kat] HMAC-384Kdf
2,971,491 UART: [kat] LMS
3,503,235 UART: [kat] --
3,506,967 UART: [cold-reset] ++
3,508,751 UART: [fht] FHT @ 0x50003400
3,520,853 UART: [idev] ++
3,521,561 UART: [idev] CDI.KEYID = 6
3,522,486 UART: [idev] SUBJECT.KEYID = 7
3,523,655 UART: [idev] UDS.KEYID = 0
3,542,979 UART: [idev] Erasing UDS.KEYID = 0
6,026,360 UART: [idev] Sha1 KeyId Algorithm
6,048,756 UART: [idev] CSR upload begun
6,053,471 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,783,745 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,798,982 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,814,033 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,829,068 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,854,197 UART: [idev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
7,983,875 UART: [idev] CSR uploaded
7,991,938 ready_for_fw is high
7,992,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,141,481 UART: [idev] --
8,142,128 UART: [ldev] ++
8,142,621 UART: [ldev] CDI.KEYID = 6
8,143,495 UART: [ldev] SUBJECT.KEYID = 5
8,144,628 UART: [ldev] AUTHORITY.KEYID = 7
8,145,827 UART: [ldev] FE.KEYID = 1
8,146,697 UART: [ldev] Erasing FE.KEYID = 1
10,547,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,284,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,299,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,314,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,329,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,351,238 UART: [ldev] --
12,356,295 UART: [fwproc] Wait for Commands...
12,358,387 UART: [fwproc] Recv command 0x46574c44
12,360,691 UART: [fwproc] Recv'd Img size: 118548 bytes
15,857,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,934,814 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,058,449 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,619,410 >>> mbox cmd response: success
16,620,475 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,623,222 UART: [afmc] ++
16,623,927 UART: [afmc] CDI.KEYID = 6
16,625,165 UART: [afmc] SUBJECT.KEYID = 7
16,626,604 UART: [afmc] AUTHORITY.KEYID = 5
19,154,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,879,123 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,881,087 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,896,173 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,911,282 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,926,165 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,950,215 UART: [afmc] --
20,953,849 UART: [cold-reset] --
20,958,082 UART: [state] Locking Datavault
20,964,841 UART: [state] Locking PCR0, PCR1 and PCR31
20,967,017 UART: [state] Locking ICCM
20,968,549 UART: [exit] Launching FMC @ 0x40000130
20,977,226 UART:
20,977,501 UART: Running Caliptra FMC ...
20,978,531 UART:
20,978,675 UART: [state] CFI Enabled
21,035,007 UART: [fht] FMC Alias Private Key: 7
22,821,820 UART: [art] Extend RT PCRs Done
22,823,044 UART: [art] Lock RT PCRs Done
22,824,696 UART: [art] Populate DV Done
22,830,214 UART: [fht] FMC Alias Private Key: 7
22,831,918 UART: [art] Derive CDI
22,832,730 UART: [art] Store in slot 0x4
22,890,441 UART: [art] Derive Key Pair
22,891,438 UART: [art] Store priv key in slot 0x5
25,354,279 UART: [art] Derive Key Pair - Done
25,366,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,080,411 UART: [art] Erasing AUTHORITY.KEYID = 7
27,081,949 UART: [art] PUB.X = FD9E3DC0F95AC8B855470A6F48D6CF7E12EBDCBE0584C2E7E7BFACAF706B4A1168087B4AEBFE4B2001477258ED2E9A66
27,089,236 UART: [art] PUB.Y = 44492AAC7D90AA118524F3DE2DBE43F6D746010680F08DFC49901D1F63BA6550349DAD87B9895E68DB574E9298BBD800
27,096,497 UART: [art] SIG.R = DD8D67C4A82B22C78B144B10F9287DD439D3889D3ABD45DE08B0F252197907CC267116C8DDA23706555D468AF4303AEE
27,103,853 UART: [art] SIG.S = AD09689D4326B48F058238DDD12238EB8D11B4A0FBF71C99D3363556961B6FEF33EB761E921F67888E32DB6AB28552AE
28,083,172 UART: Caliptra RT
28,083,874 UART: [state] CFI Enabled
28,264,526 UART: [rt] RT listening for mailbox commands...
28,295,995 UART: [rt]cmd =0x49444352, len=4
28,297,658 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,811 writing to cptra_bootfsm_go
7,712,912 ready_for_fw is high
7,713,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,579,470 >>> mbox cmd response: success
16,580,572 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,860,498 UART:
20,861,378 UART: Running Caliptra FMC ...
20,862,510 UART:
20,862,663 UART: [state] CFI Enabled
20,928,484 UART: [fht] FMC Alias Private Key: 7
22,694,530 UART: [art] Extend RT PCRs Done
22,695,759 UART: [art] Lock RT PCRs Done
22,697,529 UART: [art] Populate DV Done
22,702,632 UART: [fht] FMC Alias Private Key: 7
22,704,230 UART: [art] Derive CDI
22,705,045 UART: [art] Store in slot 0x4
22,761,306 UART: [art] Derive Key Pair
22,762,344 UART: [art] Store priv key in slot 0x5
25,224,951 UART: [art] Derive Key Pair - Done
25,237,727 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,953,578 UART: [art] Erasing AUTHORITY.KEYID = 7
26,955,114 UART: [art] PUB.X = BEF5EC1DE1D0475CF3FECADF1BE1C214CAAE1355709F571BD5BD9BF2BD7DB7B18EC7D6E343FC898E7F13A9109701785B
26,962,397 UART: [art] PUB.Y = B36679DAB087BD3F35A36EBC8A5D00AE4051AB4877EB6D794C7CB3A83BD8D0821FD6EDF4D1B2AC0B9B59B871D1A9C7A7
26,969,640 UART: [art] SIG.R = D7EA6E2BEB61F35B6AC3DDA5601769823F7D5039EA10F32A5B1C26369D6EF5E3399C618A0443D8E894B4A440194AF5D0
26,977,049 UART: [art] SIG.S = 94DBC555AAEC434B610C56EC3B886AAF76BFDBD246DC18288F785CA4C6B310A944449BAC9D075CD8CFA641D6D415EE87
27,956,463 UART: Caliptra RT
27,957,172 UART: [state] CFI Enabled
28,135,937 UART: [rt] RT listening for mailbox commands...
28,167,414 UART: [rt]cmd =0x49444352, len=4
28,169,117 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,465 UART:
192,844 UART: Running Caliptra ROM ...
193,975 UART:
603,670 UART: [state] CFI Enabled
619,629 UART: [state] LifecycleState = Unprovisioned
622,014 UART: [state] DebugLocked = No
623,347 UART: [state] WD Timer not started. Device not locked for debugging
627,267 UART: [kat] SHA2-256
817,103 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,910 UART: [kat] ++
828,518 UART: [kat] sha1
840,716 UART: [kat] SHA2-256
843,764 UART: [kat] SHA2-384
849,336 UART: [kat] SHA2-512-ACC
851,930 UART: [kat] ECC-384
3,293,730 UART: [kat] HMAC-384Kdf
3,306,952 UART: [kat] LMS
3,838,803 UART: [kat] --
3,843,459 UART: [cold-reset] ++
3,845,606 UART: [fht] FHT @ 0x50003400
3,856,946 UART: [idev] ++
3,857,655 UART: [idev] CDI.KEYID = 6
3,858,538 UART: [idev] SUBJECT.KEYID = 7
3,859,780 UART: [idev] UDS.KEYID = 0
3,875,531 UART: [idev] Erasing UDS.KEYID = 0
6,335,438 UART: [idev] Sha1 KeyId Algorithm
6,356,222 UART: [idev] CSR upload begun
6,360,985 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,079,504 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,094,778 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,109,767 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,124,866 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,149,973 UART: [idev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
8,279,657 UART: [idev] CSR uploaded
8,287,790 ready_for_fw is high
8,288,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,437,063 UART: [idev] --
8,437,705 UART: [ldev] ++
8,438,205 UART: [ldev] CDI.KEYID = 6
8,439,086 UART: [ldev] SUBJECT.KEYID = 5
8,440,142 UART: [ldev] AUTHORITY.KEYID = 7
8,441,327 UART: [ldev] FE.KEYID = 1
8,442,175 UART: [ldev] Erasing FE.KEYID = 1
10,790,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,508,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,523,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,538,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,553,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,575,063 UART: [ldev] --
12,580,715 UART: [fwproc] Wait for Commands...
12,583,463 UART: [fwproc] Recv command 0x46574c44
12,585,771 UART: [fwproc] Recv'd Img size: 118548 bytes
16,087,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,162,623 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,286,242 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,846,265 >>> mbox cmd response: success
16,847,327 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,849,960 UART: [afmc] ++
16,850,676 UART: [afmc] CDI.KEYID = 6
16,851,810 UART: [afmc] SUBJECT.KEYID = 7
16,853,362 UART: [afmc] AUTHORITY.KEYID = 5
19,354,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,079,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,081,004 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
21,096,055 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,111,197 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,126,053 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,149,718 UART: [afmc] --
21,153,098 UART: [cold-reset] --
21,156,249 UART: [state] Locking Datavault
21,160,383 UART: [state] Locking PCR0, PCR1 and PCR31
21,162,586 UART: [state] Locking ICCM
21,165,226 UART: [exit] Launching FMC @ 0x40000130
21,173,910 UART:
21,174,156 UART: Running Caliptra FMC ...
21,175,285 UART:
21,175,450 UART: [state] CFI Enabled
21,183,340 UART: [fht] FMC Alias Private Key: 7
22,949,425 UART: [art] Extend RT PCRs Done
22,950,645 UART: [art] Lock RT PCRs Done
22,952,137 UART: [art] Populate DV Done
22,957,338 UART: [fht] FMC Alias Private Key: 7
22,959,094 UART: [art] Derive CDI
22,959,839 UART: [art] Store in slot 0x4
23,002,871 UART: [art] Derive Key Pair
23,003,918 UART: [art] Store priv key in slot 0x5
25,430,769 UART: [art] Derive Key Pair - Done
25,443,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,149,780 UART: [art] Erasing AUTHORITY.KEYID = 7
27,151,279 UART: [art] PUB.X = 715F5F3BC97D5D859404DF8492E41D51E8F2CC148BB63F17082995508F2A862FD47CBE6A65BFB49524ADA756BBB20262
27,158,541 UART: [art] PUB.Y = D500EB863CDF05F402A9C894BBF90E94CF131C695CEC389A70BED3AE7C84777367CEFBE559A7ED64AAAF187E20E8FD24
27,165,820 UART: [art] SIG.R = 904F79C1CE676B1F26A6A3C23CAF256D63E5ED7A4628446A350E51D07B8D2BF8F63B7401FF0407924E65B2AF36AF492F
27,173,185 UART: [art] SIG.S = BFB1B7F59B3AC95BBAE15F2084A334EEA3AEDC3E283274BE918E4CC6CDFC78BF26B048100066ACC25311762F5B7FD057
28,151,963 UART: Caliptra RT
28,152,664 UART: [state] CFI Enabled
28,284,604 UART: [rt] RT listening for mailbox commands...
28,316,197 UART: [rt]cmd =0x49444352, len=4
28,318,087 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
7,984,767 ready_for_fw is high
7,985,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,786,620 >>> mbox cmd response: success
16,787,873 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
21,037,296 UART:
21,037,686 UART: Running Caliptra FMC ...
21,038,899 UART:
21,039,076 UART: [state] CFI Enabled
21,047,022 UART: [fht] FMC Alias Private Key: 7
22,813,356 UART: [art] Extend RT PCRs Done
22,814,588 UART: [art] Lock RT PCRs Done
22,816,386 UART: [art] Populate DV Done
22,821,814 UART: [fht] FMC Alias Private Key: 7
22,823,457 UART: [art] Derive CDI
22,824,208 UART: [art] Store in slot 0x4
22,866,967 UART: [art] Derive Key Pair
22,867,976 UART: [art] Store priv key in slot 0x5
25,294,348 UART: [art] Derive Key Pair - Done
25,307,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,013,861 UART: [art] Erasing AUTHORITY.KEYID = 7
27,015,376 UART: [art] PUB.X = FBD9FB7491366CF81831C26601592C6E5B2152DA41D021C322CC63C12D4D95BF4AEC93DD3919BCA38271564D55F68678
27,022,582 UART: [art] PUB.Y = 5AB02DE5281781073AF33794B2CC5D9D1970C1C1A37F3CA960A6BA62582882D0DDCBB26A632E92A57DF2C6CC824AFCE5
27,029,850 UART: [art] SIG.R = 05FB265C0C461B69BC56F6DFE7D04679ADAE8F01A2EC99429A81367B0D06AF04ED203DBBFEEC646BA500D59E2D70CA4E
27,037,310 UART: [art] SIG.S = 1F212F247983238B39EC49D2A31AE0954968F807BB91FCAAF96F5AC5C588AC130A887C13A7CD31695A061E496D316285
28,016,186 UART: Caliptra RT
28,016,897 UART: [state] CFI Enabled
28,150,396 UART: [rt] RT listening for mailbox commands...
28,181,918 UART: [rt]cmd =0x49444352, len=4
28,183,650 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,155 UART: [kat] SHA2-256
882,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,201 UART: [kat] ++
886,353 UART: [kat] sha1
890,419 UART: [kat] SHA2-256
892,357 UART: [kat] SHA2-384
894,928 UART: [kat] SHA2-512-ACC
896,829 UART: [kat] ECC-384
902,472 UART: [kat] HMAC-384Kdf
907,102 UART: [kat] LMS
1,475,298 UART: [kat] --
1,476,107 UART: [cold-reset] ++
1,476,669 UART: [fht] Storing FHT @ 0x50003400
1,479,420 UART: [idev] ++
1,479,588 UART: [idev] CDI.KEYID = 6
1,479,948 UART: [idev] SUBJECT.KEYID = 7
1,480,372 UART: [idev] UDS.KEYID = 0
1,488,104 UART: [idev] Erasing UDS.KEYID = 0
1,504,264 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,847 UART: [idev] CSR upload requested
1,514,693 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,525,364 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,531,071 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,536,953 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,542,658 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,551,078 UART: [idev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
1,601,226 UART: [idev] CSR uploaded
1,603,607 ready_for_fw is high
1,603,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,603,778 UART: [idev] --
1,604,761 UART: [ldev] ++
1,604,929 UART: [ldev] CDI.KEYID = 6
1,605,292 UART: [ldev] SUBJECT.KEYID = 5
1,605,718 UART: [ldev] AUTHORITY.KEYID = 7
1,606,181 UART: [ldev] FE.KEYID = 1
1,611,125 UART: [ldev] Erasing FE.KEYID = 1
1,636,510 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,650,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,655,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,661,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,667,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,674,720 UART: [ldev] --
1,676,111 UART: [fwproc] Waiting for Commands...
1,676,914 UART: [fwproc] Received command 0x46574c44
1,677,705 UART: [fwproc] Received Image of size 118548 bytes
3,022,279 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,049,057 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,080,275 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,220,572 >>> mbox cmd response: success
3,220,572 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,221,692 UART: [afmc] ++
3,221,860 UART: [afmc] CDI.KEYID = 6
3,222,222 UART: [afmc] SUBJECT.KEYID = 7
3,222,647 UART: [afmc] AUTHORITY.KEYID = 5
3,257,308 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,273,620 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,274,400 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,280,109 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,285,992 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,291,675 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,299,533 UART: [afmc] --
3,300,619 UART: [cold-reset] --
3,301,245 UART: [state] Locking Datavault
3,302,612 UART: [state] Locking PCR0, PCR1 and PCR31
3,303,216 UART: [state] Locking ICCM
3,303,830 UART: [exit] Launching FMC @ 0x40000130
3,309,160 UART:
3,309,176 UART: Running Caliptra FMC ...
3,309,584 UART:
3,309,638 UART: [state] CFI Enabled
3,319,632 UART: [fht] FMC Alias Private Key: 7
3,438,664 UART: [art] Extend RT PCRs Done
3,439,092 UART: [art] Lock RT PCRs Done
3,440,562 UART: [art] Populate DV Done
3,448,651 UART: [fht] FMC Alias Private Key: 7
3,449,599 UART: [art] Derive CDI
3,449,879 UART: [art] Store in slot 0x4
3,535,695 UART: [art] Derive Key Pair
3,536,055 UART: [art] Store priv key in slot 0x5
3,549,574 UART: [art] Derive Key Pair - Done
3,564,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,579,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,580,361 UART: [art] PUB.X = 79D7FAEB108BA9C10C4D58AB25229D8E1A3A0A1B950D683ABDB336CFF5DD7E83C5A18856F4A87637D5CA874ECBEE2374
3,587,142 UART: [art] PUB.Y = ED31A050BC5082AEAF906104D03461193A1FB4195C4A15A7B3F48D7DBD214939759FD1F532BB153CA305C8144AE863F4
3,594,090 UART: [art] SIG.R = FAFC4496A2E99FAF333967BF20C3CC3C98F6FF4CCC5BCB486F51DC63180E5746AF250C334D0A1E792DE560A5F0D24516
3,600,867 UART: [art] SIG.S = 63D4A1A724A6D6E62A08FA5EE528CFAE1C9DE37FF9838D5A70E3EBF030942494F38BD2718889B70E7EB954F5E7051528
3,624,530 UART: Caliptra RT
3,624,781 UART: [state] CFI Enabled
3,744,871 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,775,513 UART: [rt]cmd =0x49444352, len=4
3,776,518 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,411,516 ready_for_fw is high
1,411,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,997,649 >>> mbox cmd response: success
2,997,649 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,059,358 UART:
3,059,374 UART: Running Caliptra FMC ...
3,059,782 UART:
3,059,836 UART: [state] CFI Enabled
3,070,408 UART: [fht] FMC Alias Private Key: 7
3,189,922 UART: [art] Extend RT PCRs Done
3,190,350 UART: [art] Lock RT PCRs Done
3,191,876 UART: [art] Populate DV Done
3,200,139 UART: [fht] FMC Alias Private Key: 7
3,201,285 UART: [art] Derive CDI
3,201,565 UART: [art] Store in slot 0x4
3,287,203 UART: [art] Derive Key Pair
3,287,563 UART: [art] Store priv key in slot 0x5
3,300,830 UART: [art] Derive Key Pair - Done
3,315,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,331,302 UART: [art] Erasing AUTHORITY.KEYID = 7
3,332,067 UART: [art] PUB.X = FEC5D43BF62F381EE2D352FB175AA75744021750D472999CD8C4B677F1E9A235B9BB4D72C8CB93A3DA2FEE699B814152
3,338,844 UART: [art] PUB.Y = EB0F96F668214E01E6C9B50D3597F4657BDA17ED2CD6AA1DF5656E7DAC239D6EC4E69C1880856B3C192A3E2A654B86C0
3,345,797 UART: [art] SIG.R = 0E71FEBA4886982B45B1239BC9CD0754A54277970C9708FDADE6A09FBCF9D9AAFFB61702464A0B8B862116D86C44653F
3,352,557 UART: [art] SIG.S = 8B448C2BE2CD9FECAE122CD223288D6716288A5552B9352CB222C3B56BBE7038DE7E883B57755BEFEAF0F0F3B935ECC5
3,376,455 UART: Caliptra RT
3,376,706 UART: [state] CFI Enabled
3,496,762 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,527,152 UART: [rt]cmd =0x49444352, len=4
3,528,569 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,978 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,646 UART: [kat] SHA2-256
882,577 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,692 UART: [kat] ++
886,844 UART: [kat] sha1
890,906 UART: [kat] SHA2-256
892,844 UART: [kat] SHA2-384
895,773 UART: [kat] SHA2-512-ACC
897,674 UART: [kat] ECC-384
903,065 UART: [kat] HMAC-384Kdf
907,805 UART: [kat] LMS
1,476,001 UART: [kat] --
1,476,918 UART: [cold-reset] ++
1,477,348 UART: [fht] Storing FHT @ 0x50003400
1,480,075 UART: [idev] ++
1,480,243 UART: [idev] CDI.KEYID = 6
1,480,603 UART: [idev] SUBJECT.KEYID = 7
1,481,027 UART: [idev] UDS.KEYID = 0
1,489,061 UART: [idev] Erasing UDS.KEYID = 0
1,506,045 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,640 UART: [idev] CSR upload requested
1,516,486 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,527,083 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,532,790 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,538,672 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,544,377 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,552,797 UART: [idev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
1,602,945 UART: [idev] CSR uploaded
1,605,326 ready_for_fw is high
1,605,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,605,497 UART: [idev] --
1,606,730 UART: [ldev] ++
1,606,898 UART: [ldev] CDI.KEYID = 6
1,607,261 UART: [ldev] SUBJECT.KEYID = 5
1,607,687 UART: [ldev] AUTHORITY.KEYID = 7
1,608,150 UART: [ldev] FE.KEYID = 1
1,613,356 UART: [ldev] Erasing FE.KEYID = 1
1,638,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,652,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,658,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,663,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,669,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,676,879 UART: [ldev] --
1,678,330 UART: [fwproc] Waiting for Commands...
1,678,985 UART: [fwproc] Received command 0x46574c44
1,679,776 UART: [fwproc] Received Image of size 118548 bytes
3,025,296 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,053,402 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,084,620 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,225,019 >>> mbox cmd response: success
3,225,019 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,226,205 UART: [afmc] ++
3,226,373 UART: [afmc] CDI.KEYID = 6
3,226,735 UART: [afmc] SUBJECT.KEYID = 7
3,227,160 UART: [afmc] AUTHORITY.KEYID = 5
3,262,021 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,278,279 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,279,059 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,284,768 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,290,651 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,296,334 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,304,452 UART: [afmc] --
3,305,446 UART: [cold-reset] --
3,306,182 UART: [state] Locking Datavault
3,307,321 UART: [state] Locking PCR0, PCR1 and PCR31
3,307,925 UART: [state] Locking ICCM
3,308,593 UART: [exit] Launching FMC @ 0x40000130
3,313,923 UART:
3,313,939 UART: Running Caliptra FMC ...
3,314,347 UART:
3,314,490 UART: [state] CFI Enabled
3,324,960 UART: [fht] FMC Alias Private Key: 7
3,443,916 UART: [art] Extend RT PCRs Done
3,444,344 UART: [art] Lock RT PCRs Done
3,446,088 UART: [art] Populate DV Done
3,454,391 UART: [fht] FMC Alias Private Key: 7
3,455,461 UART: [art] Derive CDI
3,455,741 UART: [art] Store in slot 0x4
3,541,763 UART: [art] Derive Key Pair
3,542,123 UART: [art] Store priv key in slot 0x5
3,555,194 UART: [art] Derive Key Pair - Done
3,569,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,585,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,585,908 UART: [art] PUB.X = 563E8C102F4397D5CCEE06E40E090D534923CD3D137BCB4832C5DCA00EC57C8C060E2EEBA029481894B034E88B7E808C
3,592,665 UART: [art] PUB.Y = D4AABD281AD7766CE9DF76C82386D105D3F4C2BD0C913FA9B8D53CF3F34A47F63FBD46138CF928B612E26632F2C73DE8
3,599,625 UART: [art] SIG.R = 539ECE2A14EB8B10700F6A2F319843F659A3E39F62545203FFC6E14B2C82967CCF24654A3C86818CBFF4856E783D64BC
3,606,393 UART: [art] SIG.S = A08AE70DB71D9B6545290094A69AB933B6896DFAD78FFD3A3891DD611197F6309461829CA3AB64CC2B63A147C6F68CB5
3,630,274 UART: Caliptra RT
3,630,617 UART: [state] CFI Enabled
3,749,795 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,127 UART: [rt]cmd =0x49444352, len=4
3,781,474 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,410,899 ready_for_fw is high
1,410,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,996,306 >>> mbox cmd response: success
2,996,306 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,057,151 UART:
3,057,167 UART: Running Caliptra FMC ...
3,057,575 UART:
3,057,718 UART: [state] CFI Enabled
3,068,256 UART: [fht] FMC Alias Private Key: 7
3,187,400 UART: [art] Extend RT PCRs Done
3,187,828 UART: [art] Lock RT PCRs Done
3,189,628 UART: [art] Populate DV Done
3,197,803 UART: [fht] FMC Alias Private Key: 7
3,198,837 UART: [art] Derive CDI
3,199,117 UART: [art] Store in slot 0x4
3,284,971 UART: [art] Derive Key Pair
3,285,331 UART: [art] Store priv key in slot 0x5
3,298,882 UART: [art] Derive Key Pair - Done
3,313,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,329,146 UART: [art] Erasing AUTHORITY.KEYID = 7
3,329,911 UART: [art] PUB.X = FDB68B2E891220ED84FB5010C86FE23B1EAD97B404D2AEB88ABA322319551C0B5ACECF8883AFF2B14F03CEBEA1FB7320
3,336,696 UART: [art] PUB.Y = DE54B8E75AA184007492EA824E2A7F8B4F436A29EAAD4CF98221F010EFB9DDDE2B2F8A55125611B893CDC4329740E81C
3,343,636 UART: [art] SIG.R = 76E834344F31D205BBA3004AA15CE9F7BEAB480035D8B85C8AEB06EFC265FE817CF403ED4B3B7D711541454C255EC3B5
3,350,365 UART: [art] SIG.S = 5905696B608275E879A4E4554EAE0D4E96AC86E6929CC71B65EC30BF28A66D4E959D7EE450AEAD5FD6E99BAEFAA69C25
3,373,493 UART: Caliptra RT
3,373,836 UART: [state] CFI Enabled
3,494,333 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,851 UART: [rt]cmd =0x49444352, len=4
3,526,470 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,934 UART: [state] LifecycleState = Unprovisioned
86,589 UART: [state] DebugLocked = No
87,225 UART: [state] WD Timer not started. Device not locked for debugging
88,344 UART: [kat] SHA2-256
891,894 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,998 UART: [kat] ++
896,150 UART: [kat] sha1
900,370 UART: [kat] SHA2-256
902,310 UART: [kat] SHA2-384
905,019 UART: [kat] SHA2-512-ACC
906,920 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
921,217 UART: [kat] LMS
1,169,529 UART: [kat] --
1,170,410 UART: [cold-reset] ++
1,170,814 UART: [fht] FHT @ 0x50003400
1,173,684 UART: [idev] ++
1,173,852 UART: [idev] CDI.KEYID = 6
1,174,213 UART: [idev] SUBJECT.KEYID = 7
1,174,638 UART: [idev] UDS.KEYID = 0
1,182,637 UART: [idev] Erasing UDS.KEYID = 0
1,200,013 UART: [idev] Sha1 KeyId Algorithm
1,209,921 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,639 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,347 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,232 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,938 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,367 UART: [idev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
1,300,573 ready_for_fw is high
1,300,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,742 UART: [idev] --
1,301,717 UART: [ldev] ++
1,301,885 UART: [ldev] CDI.KEYID = 6
1,302,249 UART: [ldev] SUBJECT.KEYID = 5
1,302,676 UART: [ldev] AUTHORITY.KEYID = 7
1,303,139 UART: [ldev] FE.KEYID = 1
1,308,185 UART: [ldev] Erasing FE.KEYID = 1
1,335,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,161 UART: [ldev] --
1,374,408 UART: [fwproc] Wait for Commands...
1,375,205 UART: [fwproc] Recv command 0x46574c44
1,375,938 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,850 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,778,025 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,918,206 >>> mbox cmd response: success
2,918,206 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,919,302 UART: [afmc] ++
2,919,470 UART: [afmc] CDI.KEYID = 6
2,919,833 UART: [afmc] SUBJECT.KEYID = 7
2,920,259 UART: [afmc] AUTHORITY.KEYID = 5
2,955,834 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,521 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,270 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,980 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,861 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,562 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,379 UART: [afmc] --
2,999,382 UART: [cold-reset] --
3,000,462 UART: [state] Locking Datavault
3,001,721 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,325 UART: [state] Locking ICCM
3,002,775 UART: [exit] Launching FMC @ 0x40000130
3,008,105 UART:
3,008,121 UART: Running Caliptra FMC ...
3,008,529 UART:
3,008,583 UART: [state] CFI Enabled
3,018,733 UART: [fht] FMC Alias Private Key: 7
3,137,431 UART: [art] Extend RT PCRs Done
3,137,859 UART: [art] Lock RT PCRs Done
3,139,149 UART: [art] Populate DV Done
3,147,254 UART: [fht] FMC Alias Private Key: 7
3,148,240 UART: [art] Derive CDI
3,148,520 UART: [art] Store in slot 0x4
3,234,249 UART: [art] Derive Key Pair
3,234,609 UART: [art] Store priv key in slot 0x5
3,247,913 UART: [art] Derive Key Pair - Done
3,262,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,191 UART: [art] Erasing AUTHORITY.KEYID = 7
3,278,956 UART: [art] PUB.X = 7226CDD221620DBCD26E72594572578F3007C741EB02E5AA1BD05D3ED117005E017A8C02CC28BB204A326B93207A6B1A
3,285,691 UART: [art] PUB.Y = 04AA00C58A6D729C6794A8A28BB423336F6A4E073B5B57E6BB8CFE93DFFB61F6DBA83DEBD75D9C3658B077FEBF689C99
3,292,633 UART: [art] SIG.R = 99A7422B30DFD4B6D658BAB7673C5E28FA107EBC02ED05F7904B1640FAD4B5AC8B1B625A74AACD3DA549797DEA961CEE
3,299,419 UART: [art] SIG.S = 3BADC5E17001A51F60FB56DC19F3F02A5FF6F080A0AFE442BF006B10EE98A98A925DB4D70B500309DEB88ADDFDC21E67
3,323,179 UART: Caliptra RT
3,323,430 UART: [state] CFI Enabled
3,442,997 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,375 UART: [rt]cmd =0x49444352, len=4
3,480,313 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,246 ready_for_fw is high
1,110,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,841 >>> mbox cmd response: success
2,697,841 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,760,112 UART:
2,760,128 UART: Running Caliptra FMC ...
2,760,536 UART:
2,760,590 UART: [state] CFI Enabled
2,771,232 UART: [fht] FMC Alias Private Key: 7
2,890,258 UART: [art] Extend RT PCRs Done
2,890,686 UART: [art] Lock RT PCRs Done
2,892,198 UART: [art] Populate DV Done
2,900,367 UART: [fht] FMC Alias Private Key: 7
2,901,497 UART: [art] Derive CDI
2,901,777 UART: [art] Store in slot 0x4
2,988,102 UART: [art] Derive Key Pair
2,988,462 UART: [art] Store priv key in slot 0x5
3,001,978 UART: [art] Derive Key Pair - Done
3,017,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,106 UART: [art] PUB.X = A3FEC73FBBA75C7CC12711939EB10FFDAFBB48284895BABD4ED6070530807DC25FAED6357BBCCBD226F241F6DF89FB04
3,039,890 UART: [art] PUB.Y = F9BFDD1DEBA4889875ECE0E4323679F03F26C8E58798AA49815395ACE7702BFF42F02FA289A1B450FBC524044A41509D
3,046,845 UART: [art] SIG.R = DA016895D6F1495DD52C531B5A6DD40421D312B1F793C81830627C194E097D1E51F517F339D40EFC0A388625FCEC0A76
3,053,597 UART: [art] SIG.S = D5612A2B38B8D23E9305929B3A0C2051D78D7B81DA064A1E70A65F25FE5F4F62B7275825CD171126AC793A39CCA6E283
3,077,948 UART: Caliptra RT
3,078,199 UART: [state] CFI Enabled
3,198,157 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,228,853 UART: [rt]cmd =0x49444352, len=4
3,235,777 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
891,277 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,381 UART: [kat] ++
895,533 UART: [kat] sha1
899,707 UART: [kat] SHA2-256
901,647 UART: [kat] SHA2-384
904,316 UART: [kat] SHA2-512-ACC
906,217 UART: [kat] ECC-384
915,752 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,431 UART: [cold-reset] ++
1,169,875 UART: [fht] FHT @ 0x50003400
1,172,559 UART: [idev] ++
1,172,727 UART: [idev] CDI.KEYID = 6
1,173,088 UART: [idev] SUBJECT.KEYID = 7
1,173,513 UART: [idev] UDS.KEYID = 0
1,181,302 UART: [idev] Erasing UDS.KEYID = 0
1,198,184 UART: [idev] Sha1 KeyId Algorithm
1,207,876 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,642 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,350 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,235 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,941 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,370 UART: [idev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
1,298,576 ready_for_fw is high
1,298,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,745 UART: [idev] --
1,299,642 UART: [ldev] ++
1,299,810 UART: [ldev] CDI.KEYID = 6
1,300,174 UART: [ldev] SUBJECT.KEYID = 5
1,300,601 UART: [ldev] AUTHORITY.KEYID = 7
1,301,064 UART: [ldev] FE.KEYID = 1
1,306,366 UART: [ldev] Erasing FE.KEYID = 1
1,332,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,740 UART: [ldev] --
1,372,141 UART: [fwproc] Wait for Commands...
1,372,862 UART: [fwproc] Recv command 0x46574c44
1,373,595 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,744,237 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,775,412 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,915,627 >>> mbox cmd response: success
2,915,627 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,916,763 UART: [afmc] ++
2,916,931 UART: [afmc] CDI.KEYID = 6
2,917,294 UART: [afmc] SUBJECT.KEYID = 7
2,917,720 UART: [afmc] AUTHORITY.KEYID = 5
2,952,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,969,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,970,151 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,975,861 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,981,742 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,987,443 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,995,160 UART: [afmc] --
2,996,043 UART: [cold-reset] --
2,996,821 UART: [state] Locking Datavault
2,998,072 UART: [state] Locking PCR0, PCR1 and PCR31
2,998,676 UART: [state] Locking ICCM
2,999,260 UART: [exit] Launching FMC @ 0x40000130
3,004,590 UART:
3,004,606 UART: Running Caliptra FMC ...
3,005,014 UART:
3,005,157 UART: [state] CFI Enabled
3,015,701 UART: [fht] FMC Alias Private Key: 7
3,134,463 UART: [art] Extend RT PCRs Done
3,134,891 UART: [art] Lock RT PCRs Done
3,136,041 UART: [art] Populate DV Done
3,144,110 UART: [fht] FMC Alias Private Key: 7
3,145,232 UART: [art] Derive CDI
3,145,512 UART: [art] Store in slot 0x4
3,231,103 UART: [art] Derive Key Pair
3,231,463 UART: [art] Store priv key in slot 0x5
3,244,577 UART: [art] Derive Key Pair - Done
3,259,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,274,700 UART: [art] Erasing AUTHORITY.KEYID = 7
3,275,465 UART: [art] PUB.X = 59C62982D5E0C3184425B810C118A506495796327ADB54ED931F707B8F1E8AE39E60E03E9536DAED9C282E787E2B506D
3,282,230 UART: [art] PUB.Y = 8BD56BD8B68AB817EA7EA6D7E35C66169C46A48148B3D8862F1C306644E01ED0D3D36BE85F7A69F4D018138B55DD7836
3,289,186 UART: [art] SIG.R = 042FC4009A88F666EDD437265B02742AAA703C4BD989AB540ECF902FBEE23279226E0F1C10D03A871DBAE937876AF443
3,295,928 UART: [art] SIG.S = F48BAF7F49AB9CC3B96954E436CBE6BE0D422926A497C8B8820034BD0B9866C6FAB8C1DEBBFAA747D3293D67864807B9
3,319,583 UART: Caliptra RT
3,319,926 UART: [state] CFI Enabled
3,439,093 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,470,009 UART: [rt]cmd =0x49444352, len=4
3,476,925 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,112,217 ready_for_fw is high
1,112,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,699,980 >>> mbox cmd response: success
2,699,980 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,762,753 UART:
2,762,769 UART: Running Caliptra FMC ...
2,763,177 UART:
2,763,320 UART: [state] CFI Enabled
2,773,878 UART: [fht] FMC Alias Private Key: 7
2,892,768 UART: [art] Extend RT PCRs Done
2,893,196 UART: [art] Lock RT PCRs Done
2,894,942 UART: [art] Populate DV Done
2,903,359 UART: [fht] FMC Alias Private Key: 7
2,904,453 UART: [art] Derive CDI
2,904,733 UART: [art] Store in slot 0x4
2,990,672 UART: [art] Derive Key Pair
2,991,032 UART: [art] Store priv key in slot 0x5
3,004,438 UART: [art] Derive Key Pair - Done
3,019,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,034,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,035,401 UART: [art] PUB.X = 28D00F4F8C7EC5C5231BAC371E71FF5380ECB34420EC74E70C3D0F9B5193DCA158CAAC819592B5FFD3026C384A35DB2D
3,042,175 UART: [art] PUB.Y = 80453A337F03A63707A4438C949E66D9207DCC1793DAE2DD0C659C1944A8E986A317BC0DB7F9A45E8DE7F88F098813E7
3,049,112 UART: [art] SIG.R = 4A2EA8EC56B92B61098DB3C6213B5B3FCBC865739DFE222B25488916CBEE00BF62E8F124D12D90C03511D03E7626E6E3
3,055,865 UART: [art] SIG.S = 83F0140516D2282DDBA927EB1A2380C124277D1BDFAAE3809A791870F50672BF505A86BD211E84F450C74C74ACDB64E5
3,080,485 UART: Caliptra RT
3,080,828 UART: [state] CFI Enabled
3,200,273 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,230,899 UART: [rt]cmd =0x49444352, len=4
3,238,045 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,446 UART: [state] LifecycleState = Unprovisioned
86,101 UART: [state] DebugLocked = No
86,835 UART: [state] WD Timer not started. Device not locked for debugging
88,006 UART: [kat] SHA2-256
893,656 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,781 UART: [kat] ++
897,933 UART: [kat] sha1
902,065 UART: [kat] SHA2-256
904,005 UART: [kat] SHA2-384
906,824 UART: [kat] SHA2-512-ACC
908,725 UART: [kat] ECC-384
918,570 UART: [kat] HMAC-384Kdf
923,090 UART: [kat] LMS
1,171,418 UART: [kat] --
1,172,443 UART: [cold-reset] ++
1,172,813 UART: [fht] FHT @ 0x50003400
1,175,430 UART: [idev] ++
1,175,598 UART: [idev] CDI.KEYID = 6
1,175,958 UART: [idev] SUBJECT.KEYID = 7
1,176,382 UART: [idev] UDS.KEYID = 0
1,184,270 UART: [idev] Erasing UDS.KEYID = 0
1,201,537 UART: [idev] Sha1 KeyId Algorithm
1,209,713 UART: [idev] CSR upload begun
1,211,494 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,870 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,227,577 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,233,459 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,239,164 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,247,584 UART: [idev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
1,297,732 UART: [idev] CSR uploaded
1,300,111 ready_for_fw is high
1,300,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,282 UART: [idev] --
1,301,430 UART: [ldev] ++
1,301,598 UART: [ldev] CDI.KEYID = 6
1,301,961 UART: [ldev] SUBJECT.KEYID = 5
1,302,387 UART: [ldev] AUTHORITY.KEYID = 7
1,302,850 UART: [ldev] FE.KEYID = 1
1,308,038 UART: [ldev] Erasing FE.KEYID = 1
1,333,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,416 UART: [ldev] --
1,372,743 UART: [fwproc] Wait for Commands...
1,373,489 UART: [fwproc] Recv command 0x46574c44
1,374,217 UART: [fwproc] Recv'd Img size: 118548 bytes
2,720,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,747,623 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,778,793 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,919,000 >>> mbox cmd response: success
2,919,000 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,920,090 UART: [afmc] ++
2,920,258 UART: [afmc] CDI.KEYID = 6
2,920,620 UART: [afmc] SUBJECT.KEYID = 7
2,921,045 UART: [afmc] AUTHORITY.KEYID = 5
2,956,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,973,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,974,125 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,979,834 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,985,717 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,991,418 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,999,228 UART: [afmc] --
3,000,360 UART: [cold-reset] --
3,001,314 UART: [state] Locking Datavault
3,002,403 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,007 UART: [state] Locking ICCM
3,003,681 UART: [exit] Launching FMC @ 0x40000130
3,009,011 UART:
3,009,027 UART: Running Caliptra FMC ...
3,009,435 UART:
3,009,489 UART: [state] CFI Enabled
3,019,927 UART: [fht] FMC Alias Private Key: 7
3,138,805 UART: [art] Extend RT PCRs Done
3,139,233 UART: [art] Lock RT PCRs Done
3,140,567 UART: [art] Populate DV Done
3,148,790 UART: [fht] FMC Alias Private Key: 7
3,149,754 UART: [art] Derive CDI
3,150,034 UART: [art] Store in slot 0x4
3,235,509 UART: [art] Derive Key Pair
3,235,869 UART: [art] Store priv key in slot 0x5
3,248,895 UART: [art] Derive Key Pair - Done
3,263,453 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,191 UART: [art] PUB.X = 02E6C0BB6000F45B89486D7A4389FE8C07E9949E3EE9DF70035E0648E77FF2F30F840CF9FD8319F20325DE548E89E8AF
3,285,924 UART: [art] PUB.Y = 40038C21A49994838D3959AB212F635C301723245BB8A311EF3EB943F2BAB3869CAF0E1789571E94AA6D10BCF65ADBC4
3,292,872 UART: [art] SIG.R = 06C07213EF42A53A75FC8A6052457E0DCA5663982B5C7DD3712A69062845039D868501857E498C7716FE649934ED4527
3,299,613 UART: [art] SIG.S = 010037FB865A8055A04F0887E9B1D59FB13834A0242AC549721FCD830FC5F82C4ABA0D41590310F2B12D2D4406FA35DD
3,323,375 UART: Caliptra RT
3,323,626 UART: [state] CFI Enabled
3,444,154 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,638 UART: [rt]cmd =0x49444352, len=4
3,476,391 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,354 ready_for_fw is high
1,109,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,022 >>> mbox cmd response: success
2,696,022 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,759,083 UART:
2,759,099 UART: Running Caliptra FMC ...
2,759,507 UART:
2,759,561 UART: [state] CFI Enabled
2,770,267 UART: [fht] FMC Alias Private Key: 7
2,889,697 UART: [art] Extend RT PCRs Done
2,890,125 UART: [art] Lock RT PCRs Done
2,891,581 UART: [art] Populate DV Done
2,899,628 UART: [fht] FMC Alias Private Key: 7
2,900,730 UART: [art] Derive CDI
2,901,010 UART: [art] Store in slot 0x4
2,986,773 UART: [art] Derive Key Pair
2,987,133 UART: [art] Store priv key in slot 0x5
3,000,295 UART: [art] Derive Key Pair - Done
3,014,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,742 UART: [art] PUB.X = 4402F9EE4F89D47BBAAEF329C7499DB453E0D8BE5A5571A6FEA6CD3D71087D64F88E6DF207E07C97CE7E28264C361886
3,038,515 UART: [art] PUB.Y = 1283C41E9EE715991DFA7C38C210D0B5FB0A4F2222A88F943ACB61BC7F303484B84F4D4FC37BB73878C27D35BFBF54D3
3,045,474 UART: [art] SIG.R = 1EE9D0080F35EEB71569D0BF52857E0667F8EB74B5048F74FF773E4CA60A4706DA8AA1F2ECD48ABB9B9FC6EA4AA510DA
3,052,248 UART: [art] SIG.S = F468232D7847D8600B27AE0487B23D8CCF7E7F7A6976E7B9B344055D59E1A08601E3381DF9B5EBA41B047A469209450E
3,075,997 UART: Caliptra RT
3,076,248 UART: [state] CFI Enabled
3,196,017 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,475 UART: [rt]cmd =0x49444352, len=4
3,228,028 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,204 UART: [state] WD Timer not started. Device not locked for debugging
87,447 UART: [kat] SHA2-256
893,097 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,222 UART: [kat] ++
897,374 UART: [kat] sha1
901,834 UART: [kat] SHA2-256
903,774 UART: [kat] SHA2-384
906,451 UART: [kat] SHA2-512-ACC
908,352 UART: [kat] ECC-384
917,815 UART: [kat] HMAC-384Kdf
922,365 UART: [kat] LMS
1,170,693 UART: [kat] --
1,171,510 UART: [cold-reset] ++
1,171,960 UART: [fht] FHT @ 0x50003400
1,174,523 UART: [idev] ++
1,174,691 UART: [idev] CDI.KEYID = 6
1,175,051 UART: [idev] SUBJECT.KEYID = 7
1,175,475 UART: [idev] UDS.KEYID = 0
1,183,517 UART: [idev] Erasing UDS.KEYID = 0
1,200,802 UART: [idev] Sha1 KeyId Algorithm
1,209,164 UART: [idev] CSR upload begun
1,210,945 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,179 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,886 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,768 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,473 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,893 UART: [idev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
1,297,041 UART: [idev] CSR uploaded
1,299,420 ready_for_fw is high
1,299,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,591 UART: [idev] --
1,300,755 UART: [ldev] ++
1,300,923 UART: [ldev] CDI.KEYID = 6
1,301,286 UART: [ldev] SUBJECT.KEYID = 5
1,301,712 UART: [ldev] AUTHORITY.KEYID = 7
1,302,175 UART: [ldev] FE.KEYID = 1
1,307,431 UART: [ldev] Erasing FE.KEYID = 1
1,333,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,125 UART: [ldev] --
1,372,424 UART: [fwproc] Wait for Commands...
1,373,108 UART: [fwproc] Recv command 0x46574c44
1,373,836 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,744,312 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,775,482 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,915,809 >>> mbox cmd response: success
2,915,809 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,917,025 UART: [afmc] ++
2,917,193 UART: [afmc] CDI.KEYID = 6
2,917,555 UART: [afmc] SUBJECT.KEYID = 7
2,917,980 UART: [afmc] AUTHORITY.KEYID = 5
2,953,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,970,940 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,649 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,532 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,233 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,161 UART: [afmc] --
2,997,131 UART: [cold-reset] --
2,997,913 UART: [state] Locking Datavault
2,999,138 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,742 UART: [state] Locking ICCM
3,000,332 UART: [exit] Launching FMC @ 0x40000130
3,005,662 UART:
3,005,678 UART: Running Caliptra FMC ...
3,006,086 UART:
3,006,229 UART: [state] CFI Enabled
3,016,915 UART: [fht] FMC Alias Private Key: 7
3,136,355 UART: [art] Extend RT PCRs Done
3,136,783 UART: [art] Lock RT PCRs Done
3,138,267 UART: [art] Populate DV Done
3,146,720 UART: [fht] FMC Alias Private Key: 7
3,147,702 UART: [art] Derive CDI
3,147,982 UART: [art] Store in slot 0x4
3,233,819 UART: [art] Derive Key Pair
3,234,179 UART: [art] Store priv key in slot 0x5
3,247,493 UART: [art] Derive Key Pair - Done
3,261,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,276,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,602 UART: [art] PUB.X = BD927F694D4CF114A5406560E06018527AB1793AD317574BEDC86889064EFC142B84255E197F03FC0193B2E35245462A
3,284,355 UART: [art] PUB.Y = 56510D6AAB3AC26B5A28E2558F60F03FE5C481B7333C94CF3910508E7A34D39F7A11308A6277B4C8C956A1172D284D32
3,291,300 UART: [art] SIG.R = E590B1D275589B99F02BAEB674688E83290C007168F8C37854BC204D442C4AAD69F1267B4686DA04CDD87B9481DAFBA3
3,298,046 UART: [art] SIG.S = 5A173687DE3A3B02B4A80F351CA1A0747F8408746D967338D33206BF3EC7C151A70CECC123B5E72A8313C7719A126C58
3,322,059 UART: Caliptra RT
3,322,402 UART: [state] CFI Enabled
3,441,569 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,803 UART: [rt]cmd =0x49444352, len=4
3,472,866 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,145 ready_for_fw is high
1,109,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,607 >>> mbox cmd response: success
2,697,607 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,759,202 UART:
2,759,218 UART: Running Caliptra FMC ...
2,759,626 UART:
2,759,769 UART: [state] CFI Enabled
2,770,459 UART: [fht] FMC Alias Private Key: 7
2,889,589 UART: [art] Extend RT PCRs Done
2,890,017 UART: [art] Lock RT PCRs Done
2,891,711 UART: [art] Populate DV Done
2,899,986 UART: [fht] FMC Alias Private Key: 7
2,901,076 UART: [art] Derive CDI
2,901,356 UART: [art] Store in slot 0x4
2,986,853 UART: [art] Derive Key Pair
2,987,213 UART: [art] Store priv key in slot 0x5
3,000,701 UART: [art] Derive Key Pair - Done
3,015,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,553 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,318 UART: [art] PUB.X = B0DE51891EAEDD2636BB7723120268B08C1EAA6395E95F1539C1E980BA7967EE5F02DFA6D5E1E5E0CEF94B8CA1E8B124
3,038,098 UART: [art] PUB.Y = 5AB4D04203B90AD1FA6DD3346435B019F8F811A9F0A2608D9D3BD148ABE6CE81E2860A6C8AD30405E992799759A2409C
3,045,037 UART: [art] SIG.R = 3A2B44163A2B8008DB2932B16AC96F678903DAE6FBC82ADEEF2ADCE0BEC0FF71D557D5AACECFCCBB597548E3650E6C7F
3,051,828 UART: [art] SIG.S = 5B8CE1063747D8D1A0BBCD565188F125A54F5649921879955C776A32AB36F08D39DB1BA1DA9520587F9BB117F53E7E77
3,076,163 UART: Caliptra RT
3,076,506 UART: [state] CFI Enabled
3,195,552 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,364 UART: [rt]cmd =0x49444352, len=4
3,228,003 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,077 UART:
192,470 UART: Running Caliptra ROM ...
193,665 UART:
193,823 UART: [state] CFI Enabled
267,715 UART: [state] LifecycleState = Unprovisioned
269,637 UART: [state] DebugLocked = No
272,452 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,965 UART: [kat] SHA2-256
446,611 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,164 UART: [kat] ++
457,655 UART: [kat] sha1
469,171 UART: [kat] SHA2-256
471,827 UART: [kat] SHA2-384
477,552 UART: [kat] SHA2-512-ACC
479,920 UART: [kat] ECC-384
2,768,314 UART: [kat] HMAC-384Kdf
2,800,603 UART: [kat] LMS
3,990,903 UART: [kat] --
3,994,991 UART: [cold-reset] ++
3,996,925 UART: [fht] Storing FHT @ 0x50003400
4,008,471 UART: [idev] ++
4,009,048 UART: [idev] CDI.KEYID = 6
4,010,087 UART: [idev] SUBJECT.KEYID = 7
4,011,263 UART: [idev] UDS.KEYID = 0
4,012,309 ready_for_fw is high
4,012,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,589 UART: [idev] Erasing UDS.KEYID = 0
7,345,932 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,950 UART: [idev] --
7,371,130 UART: [ldev] ++
7,371,704 UART: [ldev] CDI.KEYID = 6
7,372,721 UART: [ldev] SUBJECT.KEYID = 5
7,373,881 UART: [ldev] AUTHORITY.KEYID = 7
7,375,110 UART: [ldev] FE.KEYID = 1
7,421,046 UART: [ldev] Erasing FE.KEYID = 1
10,753,199 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,132 UART: [ldev] --
13,137,063 UART: [fwproc] Waiting for Commands...
13,140,563 UART: [fwproc] Received command 0x46574c44
13,142,623 UART: [fwproc] Received Image of size 118548 bytes
17,255,741 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,333,854 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,407,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,734,715 >>> mbox cmd response: success
17,738,524 UART: [afmc] ++
17,739,141 UART: [afmc] CDI.KEYID = 6
17,740,058 UART: [afmc] SUBJECT.KEYID = 7
17,741,278 UART: [afmc] AUTHORITY.KEYID = 5
21,112,287 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,407,726 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,409,988 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,424,389 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,439,147 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,453,578 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,473,547 UART: [afmc] --
23,477,800 UART: [cold-reset] --
23,481,285 UART: [state] Locking Datavault
23,485,364 UART: [state] Locking PCR0, PCR1 and PCR31
23,487,071 UART: [state] Locking ICCM
23,489,715 UART: [exit] Launching FMC @ 0x40000130
23,498,113 UART:
23,498,349 UART: Running Caliptra FMC ...
23,499,447 UART:
23,499,606 UART: [state] CFI Enabled
23,569,102 UART: [fht] FMC Alias Private Key: 7
25,909,065 UART: [art] Extend RT PCRs Done
25,910,305 UART: [art] Lock RT PCRs Done
25,911,911 UART: [art] Populate DV Done
25,917,649 UART: [fht] FMC Alias Private Key: 7
25,919,293 UART: [art] Derive CDI
25,920,026 UART: [art] Store in slot 0x4
25,977,286 UART: [art] Derive Key Pair
25,978,322 UART: [art] Store priv key in slot 0x5
29,271,233 UART: [art] Derive Key Pair - Done
29,284,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,572,207 UART: [art] Erasing AUTHORITY.KEYID = 7
31,573,714 UART: [art] PUB.X = 84C44D1291002171B8A86ED39E523CAF51A9EB7BB8C4F3DA9ABA797459FA26BAFA3A2F12EF84D5CC7F3529C4C05801F1
31,580,983 UART: [art] PUB.Y = FF3D081E68394F0BF32ED99A1332BDBBBE5769633A7C84DE76A8F371BD21F247F18495E7CC1E657A74B004A398414896
31,588,234 UART: [art] SIG.R = D1442436D901D86150CCDF51E2992C04257E5D6121939208F79A540731239293D0C2632A25C0C259938BD1DC56464CB5
31,595,588 UART: [art] SIG.S = EC63E2CE7D9C3B4E76084E26DCBE01DD7F3DA6205FA8BF741907F0F712EE74F5DAFA73F16DB09FF19923D7B5092254AB
32,900,916 UART: Caliptra RT
32,901,652 UART: [state] CFI Enabled
33,077,243 UART: [rt] RT listening for mailbox commands...
33,079,115 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,109,061 UART: [rt]cmd =0x49444352, len=4
33,110,898 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,783,244 ready_for_fw is high
3,783,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,947,605 >>> mbox cmd response: success
23,633,320 UART:
23,633,740 UART: Running Caliptra FMC ...
23,634,894 UART:
23,635,066 UART: [state] CFI Enabled
23,701,314 UART: [fht] FMC Alias Private Key: 7
26,041,745 UART: [art] Extend RT PCRs Done
26,042,976 UART: [art] Lock RT PCRs Done
26,044,658 UART: [art] Populate DV Done
26,050,133 UART: [fht] FMC Alias Private Key: 7
26,051,796 UART: [art] Derive CDI
26,052,574 UART: [art] Store in slot 0x4
26,109,785 UART: [art] Derive Key Pair
26,110,789 UART: [art] Store priv key in slot 0x5
29,403,200 UART: [art] Derive Key Pair - Done
29,416,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,704,481 UART: [art] Erasing AUTHORITY.KEYID = 7
31,705,987 UART: [art] PUB.X = A063A2840F752E584420EE29EBBDDB840E844E6DD9B06706499500D2703214519A5DAFCF889742974BFCD26433878175
31,713,201 UART: [art] PUB.Y = E59E057D41AD0A68B8D48E02CEB40E1AED1673A3C5425301C405EC9FD7A04524C879F1A16E9ECA742725645DBF5DBEC5
31,720,466 UART: [art] SIG.R = 7272801F82F40937EDB84DC09855BED8403D9076ABA1BD9DB3B6931A673A2FAD44326F3A11BCED469815489AD33630F1
31,727,880 UART: [art] SIG.S = E4AB48CA2DD903885F2794D66383935A64D9474F9776174DDB7B048DE9DC9908F9DAB4B509724AAD1835D121749D524C
33,033,231 UART: Caliptra RT
33,033,946 UART: [state] CFI Enabled
33,210,435 UART: [rt] RT listening for mailbox commands...
33,212,283 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,242,161 UART: [rt]cmd =0x49444352, len=4
33,243,990 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,315 UART:
192,682 UART: Running Caliptra ROM ...
193,777 UART:
603,413 UART: [state] CFI Enabled
618,284 UART: [state] LifecycleState = Unprovisioned
620,226 UART: [state] DebugLocked = No
622,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,381 UART: [kat] SHA2-256
796,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,683 UART: [kat] ++
807,130 UART: [kat] sha1
818,567 UART: [kat] SHA2-256
821,209 UART: [kat] SHA2-384
827,760 UART: [kat] SHA2-512-ACC
830,132 UART: [kat] ECC-384
3,112,422 UART: [kat] HMAC-384Kdf
3,125,687 UART: [kat] LMS
4,315,820 UART: [kat] --
4,320,670 UART: [cold-reset] ++
4,323,093 UART: [fht] Storing FHT @ 0x50003400
4,334,089 UART: [idev] ++
4,334,691 UART: [idev] CDI.KEYID = 6
4,335,644 UART: [idev] SUBJECT.KEYID = 7
4,336,888 UART: [idev] UDS.KEYID = 0
4,337,873 ready_for_fw is high
4,338,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,999 UART: [idev] Erasing UDS.KEYID = 0
7,625,752 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,972 UART: [idev] --
7,651,344 UART: [ldev] ++
7,651,910 UART: [ldev] CDI.KEYID = 6
7,652,903 UART: [ldev] SUBJECT.KEYID = 5
7,654,112 UART: [ldev] AUTHORITY.KEYID = 7
7,655,338 UART: [ldev] FE.KEYID = 1
7,665,811 UART: [ldev] Erasing FE.KEYID = 1
10,955,260 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,596 UART: [ldev] --
13,313,529 UART: [fwproc] Waiting for Commands...
13,315,563 UART: [fwproc] Received command 0x46574c44
13,317,795 UART: [fwproc] Received Image of size 118548 bytes
17,427,556 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,655 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,816 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,667 >>> mbox cmd response: success
17,910,476 UART: [afmc] ++
17,911,068 UART: [afmc] CDI.KEYID = 6
17,911,981 UART: [afmc] SUBJECT.KEYID = 7
17,913,246 UART: [afmc] AUTHORITY.KEYID = 5
21,229,193 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,523,980 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,249 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,540,626 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,372 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,569,775 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,490 UART: [afmc] --
23,593,798 UART: [cold-reset] --
23,598,725 UART: [state] Locking Datavault
23,602,360 UART: [state] Locking PCR0, PCR1 and PCR31
23,604,112 UART: [state] Locking ICCM
23,606,542 UART: [exit] Launching FMC @ 0x40000130
23,614,915 UART:
23,615,147 UART: Running Caliptra FMC ...
23,616,167 UART:
23,616,311 UART: [state] CFI Enabled
23,624,242 UART: [fht] FMC Alias Private Key: 7
25,964,486 UART: [art] Extend RT PCRs Done
25,965,706 UART: [art] Lock RT PCRs Done
25,967,516 UART: [art] Populate DV Done
25,973,135 UART: [fht] FMC Alias Private Key: 7
25,974,772 UART: [art] Derive CDI
25,975,502 UART: [art] Store in slot 0x4
26,018,414 UART: [art] Derive Key Pair
26,019,457 UART: [art] Store priv key in slot 0x5
29,261,530 UART: [art] Derive Key Pair - Done
29,274,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,322 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,827 UART: [art] PUB.X = 8BBDBDB0D9B39338220B8895708760D779E7985ED83DF286844C1CF7FAC7FECA8D6640A1525B0F067945B8ADAA95F401
31,563,077 UART: [art] PUB.Y = FFFCF3015D1A837A14C1546123F8F798EEFDB87DAF325B00A6F3213F7BA0219B710D326DC3A00FDA9BC3DA4DC5CED345
31,570,371 UART: [art] SIG.R = 4C1438143B22666B4129D49EAD1543628D4F87C798732AF7710DFAF3EEBB40F2E7B5D389B18C3E67107E0AAB0620B1D0
31,577,714 UART: [art] SIG.S = 99A0FB25C81916DC5E77A4F8A3CD9A1811DA791A09CA5EC8FD32CE85CF45BC998226A7E129B6D51E71C6A2F53AD2C573
32,882,597 UART: Caliptra RT
32,883,306 UART: [state] CFI Enabled
33,016,922 UART: [rt] RT listening for mailbox commands...
33,018,776 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,048,320 UART: [rt]cmd =0x49444352, len=4
33,049,971 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
4,127,779 ready_for_fw is high
4,128,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,283 >>> mbox cmd response: success
23,794,414 UART:
23,794,798 UART: Running Caliptra FMC ...
23,795,937 UART:
23,796,092 UART: [state] CFI Enabled
23,804,279 UART: [fht] FMC Alias Private Key: 7
26,144,058 UART: [art] Extend RT PCRs Done
26,145,826 UART: [art] Lock RT PCRs Done
26,146,895 UART: [art] Populate DV Done
26,152,346 UART: [fht] FMC Alias Private Key: 7
26,154,000 UART: [art] Derive CDI
26,154,825 UART: [art] Store in slot 0x4
26,197,790 UART: [art] Derive Key Pair
26,198,830 UART: [art] Store priv key in slot 0x5
29,440,768 UART: [art] Derive Key Pair - Done
29,453,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,525 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,031 UART: [art] PUB.X = E26DF1B9CBA780F965270C01B722945C4C503044DD96CBEAE112BD7408E49F89052C34DDBEDC4038896F34E2DA976159
31,743,338 UART: [art] PUB.Y = E2217603808AAD17B05245C03BE7979CC3A7C3E57F2806A77C57557E441D994C4F815A74980B2F329490B0144D057A9C
31,750,540 UART: [art] SIG.R = 7E906864AE0E72953B037988B3B97974E4E6853CD3453CEA19CD09E31A48CE43A35B392BBAA215129D5BF11BA365AB60
31,757,938 UART: [art] SIG.S = 54A1B267920C8F15DE6E1C3F3908DA11B67E491933E3B7E8579D6170B6BC385F7A9F5234724400B03AAC12E60F5FF632
33,063,333 UART: Caliptra RT
33,064,045 UART: [state] CFI Enabled
33,198,296 UART: [rt] RT listening for mailbox commands...
33,200,149 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,230,040 UART: [rt]cmd =0x49444352, len=4
33,231,806 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,024 UART:
192,391 UART: Running Caliptra ROM ...
193,581 UART:
193,738 UART: [state] CFI Enabled
265,340 UART: [state] LifecycleState = Unprovisioned
267,244 UART: [state] DebugLocked = No
269,644 UART: [state] WD Timer not started. Device not locked for debugging
273,894 UART: [kat] SHA2-256
453,521 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,333 UART: [kat] ++
464,781 UART: [kat] sha1
476,716 UART: [kat] SHA2-256
479,431 UART: [kat] SHA2-384
485,342 UART: [kat] SHA2-512-ACC
487,705 UART: [kat] ECC-384
2,948,911 UART: [kat] HMAC-384Kdf
2,970,113 UART: [kat] LMS
3,446,591 UART: [kat] --
3,449,449 UART: [cold-reset] ++
3,452,010 UART: [fht] FHT @ 0x50003400
3,464,406 UART: [idev] ++
3,464,965 UART: [idev] CDI.KEYID = 6
3,465,969 UART: [idev] SUBJECT.KEYID = 7
3,467,140 UART: [idev] UDS.KEYID = 0
3,468,061 ready_for_fw is high
3,468,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,311 UART: [idev] Erasing UDS.KEYID = 0
5,988,349 UART: [idev] Sha1 KeyId Algorithm
6,010,767 UART: [idev] --
6,015,949 UART: [ldev] ++
6,016,518 UART: [ldev] CDI.KEYID = 6
6,017,431 UART: [ldev] SUBJECT.KEYID = 5
6,018,643 UART: [ldev] AUTHORITY.KEYID = 7
6,019,876 UART: [ldev] FE.KEYID = 1
6,057,207 UART: [ldev] Erasing FE.KEYID = 1
8,576,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,312,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,328,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,359,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,381,605 UART: [ldev] --
10,386,295 UART: [fwproc] Wait for Commands...
10,388,078 UART: [fwproc] Recv command 0x46574c44
10,390,066 UART: [fwproc] Recv'd Img size: 118548 bytes
13,877,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,958,166 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,031,227 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,359,543 >>> mbox cmd response: success
14,364,286 UART: [afmc] ++
14,364,906 UART: [afmc] CDI.KEYID = 6
14,365,815 UART: [afmc] SUBJECT.KEYID = 7
14,367,027 UART: [afmc] AUTHORITY.KEYID = 5
16,907,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,632,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,634,707 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,650,500 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,666,589 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,682,143 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,706,184 UART: [afmc] --
18,709,795 UART: [cold-reset] --
18,713,605 UART: [state] Locking Datavault
18,720,629 UART: [state] Locking PCR0, PCR1 and PCR31
18,722,322 UART: [state] Locking ICCM
18,724,683 UART: [exit] Launching FMC @ 0x40000130
18,733,129 UART:
18,733,371 UART: Running Caliptra FMC ...
18,734,467 UART:
18,734,629 UART: [state] CFI Enabled
18,788,299 UART: [fht] FMC Alias Private Key: 7
20,554,425 UART: [art] Extend RT PCRs Done
20,555,648 UART: [art] Lock RT PCRs Done
20,557,430 UART: [art] Populate DV Done
20,563,109 UART: [fht] FMC Alias Private Key: 7
20,564,749 UART: [art] Derive CDI
20,565,556 UART: [art] Store in slot 0x4
20,621,079 UART: [art] Derive Key Pair
20,622,118 UART: [art] Store priv key in slot 0x5
23,085,183 UART: [art] Derive Key Pair - Done
23,098,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,811,013 UART: [art] Erasing AUTHORITY.KEYID = 7
24,812,507 UART: [art] PUB.X = 506A6AD64DE40B6BADC35FC5A8A7AC746C9434BDCD46C062D83A63EFB4BBEA63CE524BCBB9D3EAB2AED1F932D8BEA81C
24,819,801 UART: [art] PUB.Y = 5674270211D1B4A2C6D3A35BA2E79B9FBA9583029CD15FB13B20EE46C85426F1A1519D5737A0E16819374926BACA4846
24,827,089 UART: [art] SIG.R = 409A7FFB858102286DD2338890D33B7A1933CD70FDCCD082B7FED795220C223D5C10F76D38059BD3D9F4280F8B73530C
24,834,430 UART: [art] SIG.S = 6A779FE64BB8DEA95910D4703D852BC668D070FAD06B48C74CC93B8FA04BB35950F5B28A0D6E2D26A058A9390650AF84
25,813,413 UART: Caliptra RT
25,814,115 UART: [state] CFI Enabled
25,994,563 UART: [rt] RT listening for mailbox commands...
25,996,414 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,026,179 UART: [rt]cmd =0x49444352, len=4
26,028,008 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
3,459,606 ready_for_fw is high
3,459,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,227,184 >>> mbox cmd response: success
18,514,170 UART:
18,514,575 UART: Running Caliptra FMC ...
18,515,721 UART:
18,515,882 UART: [state] CFI Enabled
18,581,324 UART: [fht] FMC Alias Private Key: 7
20,347,639 UART: [art] Extend RT PCRs Done
20,348,861 UART: [art] Lock RT PCRs Done
20,350,732 UART: [art] Populate DV Done
20,356,256 UART: [fht] FMC Alias Private Key: 7
20,357,974 UART: [art] Derive CDI
20,358,712 UART: [art] Store in slot 0x4
20,413,908 UART: [art] Derive Key Pair
20,414,950 UART: [art] Store priv key in slot 0x5
22,877,693 UART: [art] Derive Key Pair - Done
22,890,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,279 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,782 UART: [art] PUB.X = C9DDDDAFED177444F3261051A7AD7B9C1FD6C74973A8DE24A805F6E1A66BCE01B279EDBA0F1072315C98E0AB9A27FBA8
24,613,030 UART: [art] PUB.Y = B5FDE6609757E2FA24F1FADCAD8B1162896C3E69AB3E63CF22E6321A90431093984475151C056CB802E8FC578AD7815E
24,620,307 UART: [art] SIG.R = 22E2E57C23A35115A92131F1D08D673D22F77A8F92BBC5E959D5AEE3DCD8891E31B4AD0200F5C122D90401A6DF89AF06
24,627,704 UART: [art] SIG.S = A9A7F0423F310FDDE3DAB83213E1B9FAA6EFD06CA7BF1D4C47F0CCE335367BB7FD692CD0E1705A6C5338BF2BCEDF6074
25,606,987 UART: Caliptra RT
25,607,702 UART: [state] CFI Enabled
25,788,160 UART: [rt] RT listening for mailbox commands...
25,790,008 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,819,849 UART: [rt]cmd =0x49444352, len=4
25,821,919 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,375 UART:
192,730 UART: Running Caliptra ROM ...
193,922 UART:
603,455 UART: [state] CFI Enabled
615,707 UART: [state] LifecycleState = Unprovisioned
617,651 UART: [state] DebugLocked = No
620,265 UART: [state] WD Timer not started. Device not locked for debugging
624,878 UART: [kat] SHA2-256
804,557 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,288 UART: [kat] ++
815,893 UART: [kat] sha1
826,987 UART: [kat] SHA2-256
829,642 UART: [kat] SHA2-384
836,418 UART: [kat] SHA2-512-ACC
838,807 UART: [kat] ECC-384
3,281,539 UART: [kat] HMAC-384Kdf
3,293,650 UART: [kat] LMS
3,770,096 UART: [kat] --
3,773,762 UART: [cold-reset] ++
3,776,125 UART: [fht] FHT @ 0x50003400
3,788,240 UART: [idev] ++
3,788,805 UART: [idev] CDI.KEYID = 6
3,789,858 UART: [idev] SUBJECT.KEYID = 7
3,790,966 UART: [idev] UDS.KEYID = 0
3,792,016 ready_for_fw is high
3,792,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,450 UART: [idev] Erasing UDS.KEYID = 0
6,269,378 UART: [idev] Sha1 KeyId Algorithm
6,292,002 UART: [idev] --
6,298,144 UART: [ldev] ++
6,298,724 UART: [ldev] CDI.KEYID = 6
6,299,639 UART: [ldev] SUBJECT.KEYID = 5
6,300,854 UART: [ldev] AUTHORITY.KEYID = 7
6,302,064 UART: [ldev] FE.KEYID = 1
6,311,607 UART: [ldev] Erasing FE.KEYID = 1
8,792,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,104 UART: [ldev] --
10,585,426 UART: [fwproc] Wait for Commands...
10,587,843 UART: [fwproc] Recv command 0x46574c44
10,589,882 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,374 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,406 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,561,555 >>> mbox cmd response: success
14,565,577 UART: [afmc] ++
14,566,187 UART: [afmc] CDI.KEYID = 6
14,567,107 UART: [afmc] SUBJECT.KEYID = 7
14,568,333 UART: [afmc] AUTHORITY.KEYID = 5
17,067,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,789,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,791,273 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,807,095 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,823,170 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,733 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,742 UART: [afmc] --
18,866,389 UART: [cold-reset] --
18,871,500 UART: [state] Locking Datavault
18,878,153 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,919 UART: [state] Locking ICCM
18,882,266 UART: [exit] Launching FMC @ 0x40000130
18,890,717 UART:
18,890,955 UART: Running Caliptra FMC ...
18,892,057 UART:
18,892,221 UART: [state] CFI Enabled
18,899,838 UART: [fht] FMC Alias Private Key: 7
20,666,244 UART: [art] Extend RT PCRs Done
20,667,484 UART: [art] Lock RT PCRs Done
20,669,008 UART: [art] Populate DV Done
20,674,323 UART: [fht] FMC Alias Private Key: 7
20,676,024 UART: [art] Derive CDI
20,676,844 UART: [art] Store in slot 0x4
20,719,655 UART: [art] Derive Key Pair
20,720,670 UART: [art] Store priv key in slot 0x5
23,147,135 UART: [art] Derive Key Pair - Done
23,159,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,021 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,529 UART: [art] PUB.X = 7AA7CE7BFA6C9501FC122DC84903A3020A93FEB859050F28AA4796C8CA1C5360F2155AAB0AFFE6BAF03B2897A74C069E
24,874,842 UART: [art] PUB.Y = A01C5F3D65BB24CDE60FDA094C4CF4EE7F9BB3829FFE6CD2548628C25C10E060C61C58990DBB7DADE8673FA5DCCE52D9
24,882,127 UART: [art] SIG.R = F889541E0A2EFCEDCC52C18E90B2B3D91FF285214D233E66590DEA5744EF8F6DF9B4CE10B56B4FE39D8A19AF06498614
24,889,518 UART: [art] SIG.S = 9AD094F9D815BE443D2D0547D9FAAC5B677350586234D0A27F4393C8307BDA74C59C3DEB1688F902A04CB8DB53CA8C90
25,868,572 UART: Caliptra RT
25,869,272 UART: [state] CFI Enabled
26,002,040 UART: [rt] RT listening for mailbox commands...
26,003,905 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,033,573 UART: [rt]cmd =0x49444352, len=4
26,035,348 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,781,647 ready_for_fw is high
3,782,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,020 >>> mbox cmd response: success
18,699,968 UART:
18,700,393 UART: Running Caliptra FMC ...
18,701,507 UART:
18,701,666 UART: [state] CFI Enabled
18,709,450 UART: [fht] FMC Alias Private Key: 7
20,475,688 UART: [art] Extend RT PCRs Done
20,476,915 UART: [art] Lock RT PCRs Done
20,478,734 UART: [art] Populate DV Done
20,484,110 UART: [fht] FMC Alias Private Key: 7
20,485,730 UART: [art] Derive CDI
20,486,482 UART: [art] Store in slot 0x4
20,529,628 UART: [art] Derive Key Pair
20,530,635 UART: [art] Store priv key in slot 0x5
22,957,670 UART: [art] Derive Key Pair - Done
22,970,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,903 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,408 UART: [art] PUB.X = 2C56BF11F9F48E6378C9C7A72C1B79272F03B0D23782FBA10CE9496A564CEBA299B7864EF09F800E38CA5031BF9955C8
24,685,666 UART: [art] PUB.Y = 6E4C320A724C20E80EA150C68E2FE72D1EED3231A51EA7947A4E58C49CB9F208A2BE25C83F9BC0B1C2B9C9309ADFC2C0
24,692,925 UART: [art] SIG.R = CFCDDC66E48A29C2D9C544124F759FC3DFBF8A4C6125A3E59162D8D0CA55328D84A3AFA927EB702B95F73AC30274AC6A
24,700,338 UART: [art] SIG.S = EF83F364429A61007AB2CD39BC172CCCA363DCF8EA850F587A01AF77DA594558B5AAB5E76A4A8690BE9DC9561ED1A970
25,679,885 UART: Caliptra RT
25,680,580 UART: [state] CFI Enabled
25,813,205 UART: [rt] RT listening for mailbox commands...
25,815,046 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,844,655 UART: [rt]cmd =0x49444352, len=4
25,846,261 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,201 UART:
192,573 UART: Running Caliptra ROM ...
193,764 UART:
193,921 UART: [state] CFI Enabled
263,760 UART: [state] LifecycleState = Unprovisioned
266,183 UART: [state] DebugLocked = No
268,640 UART: [state] WD Timer not started. Device not locked for debugging
272,818 UART: [kat] SHA2-256
462,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,517 UART: [kat] ++
474,014 UART: [kat] sha1
484,041 UART: [kat] SHA2-256
487,052 UART: [kat] SHA2-384
494,187 UART: [kat] SHA2-512-ACC
496,786 UART: [kat] ECC-384
2,948,311 UART: [kat] HMAC-384Kdf
2,972,252 UART: [kat] LMS
3,504,016 UART: [kat] --
3,507,471 UART: [cold-reset] ++
3,508,844 UART: [fht] FHT @ 0x50003400
3,521,382 UART: [idev] ++
3,522,085 UART: [idev] CDI.KEYID = 6
3,523,002 UART: [idev] SUBJECT.KEYID = 7
3,524,244 UART: [idev] UDS.KEYID = 0
3,525,164 ready_for_fw is high
3,525,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,476 UART: [idev] Erasing UDS.KEYID = 0
6,033,570 UART: [idev] Sha1 KeyId Algorithm
6,056,265 UART: [idev] --
6,062,685 UART: [ldev] ++
6,063,421 UART: [ldev] CDI.KEYID = 6
6,064,311 UART: [ldev] SUBJECT.KEYID = 5
6,065,468 UART: [ldev] AUTHORITY.KEYID = 7
6,066,645 UART: [ldev] FE.KEYID = 1
6,100,173 UART: [ldev] Erasing FE.KEYID = 1
8,608,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,163 UART: [ldev] --
10,414,484 UART: [fwproc] Wait for Commands...
10,416,627 UART: [fwproc] Recv command 0x46574c44
10,418,935 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,540 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,487 >>> mbox cmd response: success
14,677,354 UART: [afmc] ++
14,678,077 UART: [afmc] CDI.KEYID = 6
14,679,274 UART: [afmc] SUBJECT.KEYID = 7
14,680,711 UART: [afmc] AUTHORITY.KEYID = 5
17,213,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,829 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,862 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,974 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,871 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,462 UART: [afmc] --
19,011,325 UART: [cold-reset] --
19,016,108 UART: [state] Locking Datavault
19,020,987 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,194 UART: [state] Locking ICCM
19,024,901 UART: [exit] Launching FMC @ 0x40000130
19,033,586 UART:
19,033,823 UART: Running Caliptra FMC ...
19,034,925 UART:
19,035,080 UART: [state] CFI Enabled
19,095,662 UART: [fht] FMC Alias Private Key: 7
20,862,154 UART: [art] Extend RT PCRs Done
20,863,373 UART: [art] Lock RT PCRs Done
20,865,296 UART: [art] Populate DV Done
20,870,597 UART: [fht] FMC Alias Private Key: 7
20,872,295 UART: [art] Derive CDI
20,873,105 UART: [art] Store in slot 0x4
20,928,352 UART: [art] Derive Key Pair
20,929,346 UART: [art] Store priv key in slot 0x5
23,392,339 UART: [art] Derive Key Pair - Done
23,405,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,118,525 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,040 UART: [art] PUB.X = 9406A86313DED6DFFFDA5F7862B528248106A52D4D5210F5C210FA3A1D62FD79CEFACC2504868D1A569D0112BB447E8E
25,127,302 UART: [art] PUB.Y = 778A568145127500841D728AF14C66EB745975B503F6A6BFCD0B982EB778B1E46A3B0A46EFE9D072EACD13231F010AEE
25,134,572 UART: [art] SIG.R = 13C5E67AD36C3754627F0F39D173BE8A5D5E8F7F9B7A4193D2A4E5F26951D04C6BBEA8773F4F256C1AF0CB48A12F7547
25,141,944 UART: [art] SIG.S = BE744EEE4E74AE629EFCCB85230A6FDFA9A149C3FC3CB36BF41B0869D827F38E299E50E684DBEBCDDD024C51D11BB1E9
26,120,761 UART: Caliptra RT
26,121,456 UART: [state] CFI Enabled
26,302,000 UART: [rt] RT listening for mailbox commands...
26,303,857 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,333,899 UART: [rt]cmd =0x49444352, len=4
26,335,885 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,439,129 ready_for_fw is high
3,439,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,815,235 >>> mbox cmd response: success
19,111,475 UART:
19,111,870 UART: Running Caliptra FMC ...
19,113,019 UART:
19,113,185 UART: [state] CFI Enabled
19,176,209 UART: [fht] FMC Alias Private Key: 7
20,942,032 UART: [art] Extend RT PCRs Done
20,943,268 UART: [art] Lock RT PCRs Done
20,945,190 UART: [art] Populate DV Done
20,950,753 UART: [fht] FMC Alias Private Key: 7
20,952,242 UART: [art] Derive CDI
20,953,007 UART: [art] Store in slot 0x4
21,009,083 UART: [art] Derive Key Pair
21,010,137 UART: [art] Store priv key in slot 0x5
23,472,777 UART: [art] Derive Key Pair - Done
23,485,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,197,939 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,446 UART: [art] PUB.X = A00A3DCCA7D372E371B7292978AFA6B3032A3B0F6931588DCBAAB051BE9CCDB3A349B280DBFDC11845FECBF4148CD536
25,206,777 UART: [art] PUB.Y = 0ADD0F1CEC9259E8BA7A22EFC6B826E6CEFA92A6E0D3C86977D8BC05A15AC9A002C489FFE4955F8979B3D4A8D7E0FDBA
25,214,032 UART: [art] SIG.R = ECDCB58F533FE24A8F1CE8C2B9EC4137DBE272D99AA97D63D1EAEB338C8856828A007C7B548A37F4E3A205A46E6E8CE7
25,221,412 UART: [art] SIG.S = 0A7A21A7AAE7FD27A079860698EF9BE6F771233CBD6F683C1B72FC5233E875CF4FC17D4D6938ABF4BAFAFC8380A55596
26,200,421 UART: Caliptra RT
26,201,129 UART: [state] CFI Enabled
26,380,171 UART: [rt] RT listening for mailbox commands...
26,382,017 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,411,932 UART: [rt]cmd =0x49444352, len=4
26,413,704 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,521 UART:
192,893 UART: Running Caliptra ROM ...
194,090 UART:
603,648 UART: [state] CFI Enabled
615,918 UART: [state] LifecycleState = Unprovisioned
618,301 UART: [state] DebugLocked = No
620,815 UART: [state] WD Timer not started. Device not locked for debugging
625,709 UART: [kat] SHA2-256
815,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,348 UART: [kat] ++
826,872 UART: [kat] sha1
837,605 UART: [kat] SHA2-256
840,640 UART: [kat] SHA2-384
846,026 UART: [kat] SHA2-512-ACC
848,624 UART: [kat] ECC-384
3,289,611 UART: [kat] HMAC-384Kdf
3,301,968 UART: [kat] LMS
3,833,846 UART: [kat] --
3,838,977 UART: [cold-reset] ++
3,840,629 UART: [fht] FHT @ 0x50003400
3,851,622 UART: [idev] ++
3,852,339 UART: [idev] CDI.KEYID = 6
3,853,302 UART: [idev] SUBJECT.KEYID = 7
3,854,477 UART: [idev] UDS.KEYID = 0
3,855,423 ready_for_fw is high
3,855,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,576 UART: [idev] Erasing UDS.KEYID = 0
6,327,665 UART: [idev] Sha1 KeyId Algorithm
6,348,966 UART: [idev] --
6,355,567 UART: [ldev] ++
6,356,246 UART: [ldev] CDI.KEYID = 6
6,357,190 UART: [ldev] SUBJECT.KEYID = 5
6,358,350 UART: [ldev] AUTHORITY.KEYID = 7
6,359,741 UART: [ldev] FE.KEYID = 1
6,371,186 UART: [ldev] Erasing FE.KEYID = 1
8,847,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,198 UART: [ldev] --
10,638,388 UART: [fwproc] Wait for Commands...
10,641,566 UART: [fwproc] Recv command 0x46574c44
10,643,883 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,172 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,044 >>> mbox cmd response: success
14,913,207 UART: [afmc] ++
14,913,945 UART: [afmc] CDI.KEYID = 6
14,915,144 UART: [afmc] SUBJECT.KEYID = 7
14,916,591 UART: [afmc] AUTHORITY.KEYID = 5
17,417,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,967 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,102 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,174,204 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,124 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,397 UART: [afmc] --
19,215,564 UART: [cold-reset] --
19,219,327 UART: [state] Locking Datavault
19,225,056 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,226 UART: [state] Locking ICCM
19,229,605 UART: [exit] Launching FMC @ 0x40000130
19,238,308 UART:
19,238,738 UART: Running Caliptra FMC ...
19,239,788 UART:
19,239,950 UART: [state] CFI Enabled
19,247,761 UART: [fht] FMC Alias Private Key: 7
21,013,721 UART: [art] Extend RT PCRs Done
21,014,954 UART: [art] Lock RT PCRs Done
21,016,536 UART: [art] Populate DV Done
21,022,121 UART: [fht] FMC Alias Private Key: 7
21,023,834 UART: [art] Derive CDI
21,024,660 UART: [art] Store in slot 0x4
21,067,111 UART: [art] Derive Key Pair
21,068,117 UART: [art] Store priv key in slot 0x5
23,494,964 UART: [art] Derive Key Pair - Done
23,507,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,453 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,959 UART: [art] PUB.X = 519EA5A013BB6F4E9DE5533B9119801FB8FF4EB841FC846CAD1634004BAEBE3EB9591B1D5A9637B48459586A0A387ADB
25,223,228 UART: [art] PUB.Y = CEF4D5B098D7A77F126A9BD9F1D08157500DE624B23877DA1E180DF8B18E37BF5DDFAD26CC5E00F5342CF47D6284A05D
25,230,488 UART: [art] SIG.R = DEB539D3FE71EA91375AC6FB8319E6537D657E35D8D2BF9D48879F0F37BD495FFAD5459E4711046615F3D257878BD01A
25,237,916 UART: [art] SIG.S = BF818A789FDFDF49C0691F3F49CF272D838499E7C5BE2B331E8CB22EF948351EE5AE48A1CD741298BD390D6A08DABF4F
26,216,621 UART: Caliptra RT
26,217,333 UART: [state] CFI Enabled
26,349,948 UART: [rt] RT listening for mailbox commands...
26,351,788 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,381,461 UART: [rt]cmd =0x49444352, len=4
26,382,897 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,099 writing to cptra_bootfsm_go
3,755,843 ready_for_fw is high
3,756,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,035,880 >>> mbox cmd response: success
19,284,805 UART:
19,285,243 UART: Running Caliptra FMC ...
19,286,362 UART:
19,286,518 UART: [state] CFI Enabled
19,294,121 UART: [fht] FMC Alias Private Key: 7
21,060,492 UART: [art] Extend RT PCRs Done
21,061,714 UART: [art] Lock RT PCRs Done
21,063,746 UART: [art] Populate DV Done
21,069,286 UART: [fht] FMC Alias Private Key: 7
21,070,786 UART: [art] Derive CDI
21,071,556 UART: [art] Store in slot 0x4
21,114,820 UART: [art] Derive Key Pair
21,115,825 UART: [art] Store priv key in slot 0x5
23,542,937 UART: [art] Derive Key Pair - Done
23,555,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,262,057 UART: [art] Erasing AUTHORITY.KEYID = 7
25,263,556 UART: [art] PUB.X = 4D816C47323BFA8904DB1E7B39CD1F88CF146862D8B89391112826A71D561E42F3C94F33E46B02DB6B58F238C7A6442A
25,270,835 UART: [art] PUB.Y = AE7F47A7857C07C56764FD9364BE8C192D44DDE90378002BA12D1E5ACB114323A77E4080755C02387BC74E671A784E57
25,278,065 UART: [art] SIG.R = D70522D966B70DF30637934354059A418FBBB0ADB04C8883D6F79E121CC3FD6077E9273757F3A033612F2F5E321E749B
25,285,441 UART: [art] SIG.S = DD4B019F92E7D51796A556C67E7457523D6BC2C50EEB2A9BADBFC2BD2D227AB7FAF9C463FDD38ECD4C006120674EAB9D
26,264,024 UART: Caliptra RT
26,264,735 UART: [state] CFI Enabled
26,397,271 UART: [rt] RT listening for mailbox commands...
26,399,114 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,428,829 UART: [rt]cmd =0x49444352, len=4
26,430,812 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,747 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,307 UART: [kat] SHA2-256
882,238 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,353 UART: [kat] ++
886,505 UART: [kat] sha1
890,759 UART: [kat] SHA2-256
892,697 UART: [kat] SHA2-384
895,584 UART: [kat] SHA2-512-ACC
897,485 UART: [kat] ECC-384
903,184 UART: [kat] HMAC-384Kdf
907,972 UART: [kat] LMS
1,476,168 UART: [kat] --
1,476,897 UART: [cold-reset] ++
1,477,383 UART: [fht] Storing FHT @ 0x50003400
1,479,920 UART: [idev] ++
1,480,088 UART: [idev] CDI.KEYID = 6
1,480,448 UART: [idev] SUBJECT.KEYID = 7
1,480,872 UART: [idev] UDS.KEYID = 0
1,481,217 ready_for_fw is high
1,481,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,476 UART: [idev] Erasing UDS.KEYID = 0
1,504,974 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,526 UART: [idev] --
1,514,689 UART: [ldev] ++
1,514,857 UART: [ldev] CDI.KEYID = 6
1,515,220 UART: [ldev] SUBJECT.KEYID = 5
1,515,646 UART: [ldev] AUTHORITY.KEYID = 7
1,516,109 UART: [ldev] FE.KEYID = 1
1,521,299 UART: [ldev] Erasing FE.KEYID = 1
1,546,838 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,900 UART: [ldev] --
1,586,287 UART: [fwproc] Waiting for Commands...
1,587,058 UART: [fwproc] Received command 0x46574c44
1,587,849 UART: [fwproc] Received Image of size 118548 bytes
2,931,719 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,809 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,027 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,446 >>> mbox cmd response: success
3,131,666 UART: [afmc] ++
3,131,834 UART: [afmc] CDI.KEYID = 6
3,132,196 UART: [afmc] SUBJECT.KEYID = 7
3,132,621 UART: [afmc] AUTHORITY.KEYID = 5
3,167,948 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,912 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,621 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,504 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,187 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,979 UART: [afmc] --
3,210,927 UART: [cold-reset] --
3,211,729 UART: [state] Locking Datavault
3,212,996 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,600 UART: [state] Locking ICCM
3,214,146 UART: [exit] Launching FMC @ 0x40000130
3,219,476 UART:
3,219,492 UART: Running Caliptra FMC ...
3,219,900 UART:
3,219,954 UART: [state] CFI Enabled
3,230,596 UART: [fht] FMC Alias Private Key: 7
3,349,490 UART: [art] Extend RT PCRs Done
3,349,918 UART: [art] Lock RT PCRs Done
3,351,364 UART: [art] Populate DV Done
3,359,767 UART: [fht] FMC Alias Private Key: 7
3,360,811 UART: [art] Derive CDI
3,361,091 UART: [art] Store in slot 0x4
3,446,943 UART: [art] Derive Key Pair
3,447,303 UART: [art] Store priv key in slot 0x5
3,460,172 UART: [art] Derive Key Pair - Done
3,475,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,177 UART: [art] PUB.X = 41D918878E4A9AFB5FEE3680383176CF688944CAFB3BA7B4268EFC1FFD881182785D27BCDFD6741D5C52FA699324F094
3,497,955 UART: [art] PUB.Y = D3C50AAA224DE6F7535896DAA08C52FE33B6A4884A8F7D93E547C3605D8D267F92FF8728C7715E3D68CB0FEF67D1BA49
3,504,911 UART: [art] SIG.R = DA9D33C61F06F5782F6C862F50F9DBB16C8627ADF8178F97375B10889503D60F91BBC008482891A44168774A8E3416FC
3,511,665 UART: [art] SIG.S = 5550DFFC9040A88BEC99BFE7B358F5D7619EB70BFD69F00AB6CE0AC559691D727C93E658BFFFBD2D386F399497D7B94B
3,535,918 UART: Caliptra RT
3,536,169 UART: [state] CFI Enabled
3,655,427 UART: [rt] RT listening for mailbox commands...
3,656,097 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,753 UART: [rt]cmd =0x49444352, len=4
3,687,000 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,951 ready_for_fw is high
1,362,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,510 >>> mbox cmd response: success
3,042,275 UART:
3,042,291 UART: Running Caliptra FMC ...
3,042,699 UART:
3,042,753 UART: [state] CFI Enabled
3,053,373 UART: [fht] FMC Alias Private Key: 7
3,173,059 UART: [art] Extend RT PCRs Done
3,173,487 UART: [art] Lock RT PCRs Done
3,174,929 UART: [art] Populate DV Done
3,182,704 UART: [fht] FMC Alias Private Key: 7
3,183,682 UART: [art] Derive CDI
3,183,962 UART: [art] Store in slot 0x4
3,269,692 UART: [art] Derive Key Pair
3,270,052 UART: [art] Store priv key in slot 0x5
3,282,847 UART: [art] Derive Key Pair - Done
3,297,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,928 UART: [art] PUB.X = 9E27BF06F175C5FD74E89A8E6FE9A2B00B02E34D378F7A6C555168447728C7F2015B7D135A4A13C7235EE695725498CD
3,320,686 UART: [art] PUB.Y = B74C32551531E2FB87845A0741988210048A0415A12C351087A7E5CE0F113CA3C910FDA4CED342C0920FD67B27EC7533
3,327,617 UART: [art] SIG.R = 7E655189642CB4A5DE2779F3915895B8749B181FC6ABCD1E25C686728B36A7C7B2FB44E858B01C453BDE56EF8214BFAB
3,334,395 UART: [art] SIG.S = CDAF015112E8E6BD41B977ED462AC650C6CA91F795926B9BAF07A21A5F145FEE99775BE5E05C6F27DF03615A212333FA
3,358,210 UART: Caliptra RT
3,358,461 UART: [state] CFI Enabled
3,477,823 UART: [rt] RT listening for mailbox commands...
3,478,493 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,395 UART: [rt]cmd =0x49444352, len=4
3,509,916 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
86,904 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,448 UART: [kat] SHA2-256
882,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,494 UART: [kat] ++
886,646 UART: [kat] sha1
890,756 UART: [kat] SHA2-256
892,694 UART: [kat] SHA2-384
895,363 UART: [kat] SHA2-512-ACC
897,264 UART: [kat] ECC-384
903,101 UART: [kat] HMAC-384Kdf
907,487 UART: [kat] LMS
1,475,683 UART: [kat] --
1,476,544 UART: [cold-reset] ++
1,476,946 UART: [fht] Storing FHT @ 0x50003400
1,479,583 UART: [idev] ++
1,479,751 UART: [idev] CDI.KEYID = 6
1,480,111 UART: [idev] SUBJECT.KEYID = 7
1,480,535 UART: [idev] UDS.KEYID = 0
1,480,880 ready_for_fw is high
1,480,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,829 UART: [idev] Erasing UDS.KEYID = 0
1,505,795 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,567 UART: [idev] --
1,515,620 UART: [ldev] ++
1,515,788 UART: [ldev] CDI.KEYID = 6
1,516,151 UART: [ldev] SUBJECT.KEYID = 5
1,516,577 UART: [ldev] AUTHORITY.KEYID = 7
1,517,040 UART: [ldev] FE.KEYID = 1
1,522,398 UART: [ldev] Erasing FE.KEYID = 1
1,547,911 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,865 UART: [ldev] --
1,587,146 UART: [fwproc] Waiting for Commands...
1,587,853 UART: [fwproc] Received command 0x46574c44
1,588,644 UART: [fwproc] Received Image of size 118548 bytes
2,933,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,768 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,986 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,329 >>> mbox cmd response: success
3,134,359 UART: [afmc] ++
3,134,527 UART: [afmc] CDI.KEYID = 6
3,134,889 UART: [afmc] SUBJECT.KEYID = 7
3,135,314 UART: [afmc] AUTHORITY.KEYID = 5
3,170,099 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,405 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,185 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,894 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,777 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,460 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,324 UART: [afmc] --
3,213,364 UART: [cold-reset] --
3,214,246 UART: [state] Locking Datavault
3,215,191 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,795 UART: [state] Locking ICCM
3,216,393 UART: [exit] Launching FMC @ 0x40000130
3,221,723 UART:
3,221,739 UART: Running Caliptra FMC ...
3,222,147 UART:
3,222,290 UART: [state] CFI Enabled
3,233,022 UART: [fht] FMC Alias Private Key: 7
3,352,710 UART: [art] Extend RT PCRs Done
3,353,138 UART: [art] Lock RT PCRs Done
3,354,802 UART: [art] Populate DV Done
3,362,965 UART: [fht] FMC Alias Private Key: 7
3,364,097 UART: [art] Derive CDI
3,364,377 UART: [art] Store in slot 0x4
3,449,699 UART: [art] Derive Key Pair
3,450,059 UART: [art] Store priv key in slot 0x5
3,463,318 UART: [art] Derive Key Pair - Done
3,478,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,631 UART: [art] PUB.X = 8FAF5D96077E73863FF47865423CA04DCD1B39A2300694A672307A18E29A93AB555B8E04C8A59C1C8B6CE5CF26A9A22E
3,501,398 UART: [art] PUB.Y = 5C19CE779C266714DFDF3875574611A842C29BF5E5C7AED89FA51C30000271525B6DB26C0E4C34FC7E0658E16FCAB660
3,508,323 UART: [art] SIG.R = 305194E3727AAD9307ACB1714DFBC7DC5CFFF61ED47FC737661D0EA3F6AECD8E33E1379FC0BC019F62A2F72D4758126B
3,515,102 UART: [art] SIG.S = A286DF8C9A704BD0E98404F100CB9D074D453B7EFCF1C08DCB82CB9E26D783E167819FC8767CBE7F632290B55084D991
3,538,484 UART: Caliptra RT
3,538,827 UART: [state] CFI Enabled
3,658,663 UART: [rt] RT listening for mailbox commands...
3,659,333 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,315 UART: [rt]cmd =0x49444352, len=4
3,690,874 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,338 ready_for_fw is high
1,362,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,711 >>> mbox cmd response: success
3,042,850 UART:
3,042,866 UART: Running Caliptra FMC ...
3,043,274 UART:
3,043,417 UART: [state] CFI Enabled
3,053,865 UART: [fht] FMC Alias Private Key: 7
3,172,619 UART: [art] Extend RT PCRs Done
3,173,047 UART: [art] Lock RT PCRs Done
3,174,089 UART: [art] Populate DV Done
3,182,172 UART: [fht] FMC Alias Private Key: 7
3,183,222 UART: [art] Derive CDI
3,183,502 UART: [art] Store in slot 0x4
3,269,374 UART: [art] Derive Key Pair
3,269,734 UART: [art] Store priv key in slot 0x5
3,282,509 UART: [art] Derive Key Pair - Done
3,297,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,599 UART: [art] PUB.X = 504984694561B31D99DBB0C460EDF90F8D7D22428398D4FAA6AA799664318115E809BAA601C6FB1B6D54BA892C3ED973
3,320,362 UART: [art] PUB.Y = 880B6C8C305FF3568157332B98F03C153E327BE455AB80537DD484922EB48F722125370031A545E86E270747CF634FDA
3,327,274 UART: [art] SIG.R = D10880680E1D5A801364713E9CC1D9527C6EB19CD3319E8752B432E6D07616157AC291B5EC040AF7420A008221A02F1E
3,334,001 UART: [art] SIG.S = F97DDF7188F2E9C15B3C9EC87FC2939A3C3FA6AFC42DDC5F74883DCAC92CEC2A47D3634679FF345C3D864815ED5ED52E
3,358,059 UART: Caliptra RT
3,358,402 UART: [state] CFI Enabled
3,478,463 UART: [rt] RT listening for mailbox commands...
3,479,133 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,019 UART: [rt]cmd =0x49444352, len=4
3,510,464 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,280 UART: [kat] ++
895,432 UART: [kat] sha1
899,466 UART: [kat] SHA2-256
901,406 UART: [kat] SHA2-384
904,185 UART: [kat] SHA2-512-ACC
906,086 UART: [kat] ECC-384
915,607 UART: [kat] HMAC-384Kdf
920,241 UART: [kat] LMS
1,168,553 UART: [kat] --
1,169,610 UART: [cold-reset] ++
1,170,168 UART: [fht] FHT @ 0x50003400
1,172,820 UART: [idev] ++
1,172,988 UART: [idev] CDI.KEYID = 6
1,173,349 UART: [idev] SUBJECT.KEYID = 7
1,173,774 UART: [idev] UDS.KEYID = 0
1,174,120 ready_for_fw is high
1,174,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,725 UART: [idev] Erasing UDS.KEYID = 0
1,198,229 UART: [idev] Sha1 KeyId Algorithm
1,206,915 UART: [idev] --
1,208,058 UART: [ldev] ++
1,208,226 UART: [ldev] CDI.KEYID = 6
1,208,590 UART: [ldev] SUBJECT.KEYID = 5
1,209,017 UART: [ldev] AUTHORITY.KEYID = 7
1,209,480 UART: [ldev] FE.KEYID = 1
1,214,576 UART: [ldev] Erasing FE.KEYID = 1
1,241,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,906 UART: [ldev] --
1,280,343 UART: [fwproc] Wait for Commands...
1,280,956 UART: [fwproc] Recv command 0x46574c44
1,281,689 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,855 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,030 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,231 >>> mbox cmd response: success
2,824,309 UART: [afmc] ++
2,824,477 UART: [afmc] CDI.KEYID = 6
2,824,840 UART: [afmc] SUBJECT.KEYID = 7
2,825,266 UART: [afmc] AUTHORITY.KEYID = 5
2,860,359 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,917 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,627 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,508 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,209 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,980 UART: [afmc] --
2,903,817 UART: [cold-reset] --
2,904,685 UART: [state] Locking Datavault
2,905,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,542 UART: [state] Locking ICCM
2,907,056 UART: [exit] Launching FMC @ 0x40000130
2,912,386 UART:
2,912,402 UART: Running Caliptra FMC ...
2,912,810 UART:
2,912,864 UART: [state] CFI Enabled
2,923,272 UART: [fht] FMC Alias Private Key: 7
3,042,032 UART: [art] Extend RT PCRs Done
3,042,460 UART: [art] Lock RT PCRs Done
3,044,014 UART: [art] Populate DV Done
3,052,283 UART: [fht] FMC Alias Private Key: 7
3,053,241 UART: [art] Derive CDI
3,053,521 UART: [art] Store in slot 0x4
3,139,382 UART: [art] Derive Key Pair
3,139,742 UART: [art] Store priv key in slot 0x5
3,152,662 UART: [art] Derive Key Pair - Done
3,167,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,812 UART: [art] PUB.X = 78E77440391B2AD15F79B00FF597A2E4163DDFAE5979DD09029A937A99B78B7815DD039D918C22640E60E00C30C92F36
3,190,562 UART: [art] PUB.Y = B948138AA313335ABC893695BC20601CB97160DE10AE7370E96CA659F67A901508E5E109782EFCE8DBBD025E586919F8
3,197,503 UART: [art] SIG.R = 3556B2169CD2C5431C530FE3A87BA2D28768217904CB0DDDC81F9FCF3A7532C6A9161C1F6849CE9C3A7EFF0E156E8EA9
3,204,273 UART: [art] SIG.S = D524CC1DD45F9B1E189571CF6E094138F9D6C9114E665399857D5FC5B70EC2511152DB27BF847CBEFB9DF2A446F5F51B
3,228,143 UART: Caliptra RT
3,228,394 UART: [state] CFI Enabled
3,348,043 UART: [rt] RT listening for mailbox commands...
3,348,713 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,571 UART: [rt]cmd =0x49444352, len=4
3,379,794 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,084 ready_for_fw is high
1,059,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,654 >>> mbox cmd response: success
2,742,613 UART:
2,742,629 UART: Running Caliptra FMC ...
2,743,037 UART:
2,743,091 UART: [state] CFI Enabled
2,753,855 UART: [fht] FMC Alias Private Key: 7
2,873,061 UART: [art] Extend RT PCRs Done
2,873,489 UART: [art] Lock RT PCRs Done
2,874,861 UART: [art] Populate DV Done
2,883,030 UART: [fht] FMC Alias Private Key: 7
2,883,990 UART: [art] Derive CDI
2,884,270 UART: [art] Store in slot 0x4
2,970,009 UART: [art] Derive Key Pair
2,970,369 UART: [art] Store priv key in slot 0x5
2,983,579 UART: [art] Derive Key Pair - Done
2,998,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,768 UART: [art] PUB.X = 2995050A7CCA0ECEF020BD8F57CC4BDF861F58E4EA0DDFB288BF553A1EE7FBDC2AB3EC1D2B932A112C9AF6691EB366D5
3,021,556 UART: [art] PUB.Y = C489A53DEB559F3109DB40500792DC80A383B9FBB87D040F87D6A5CF332E3F60CF184AF0BF9CF4806C3E1E8737BF34DF
3,028,508 UART: [art] SIG.R = 8D3D0161FF3945246D93129979E70327097AFC178467A698C5EFFFDAC9BA31B7960B890091891F50DD91561DFE5F0913
3,035,237 UART: [art] SIG.S = 1B561B069A3D5D8E9F1B622DEBAAEF5A9F699612210EC2E4E5FC07F5D2419E4267E700DD7541FE62755556A440E944B1
3,059,408 UART: Caliptra RT
3,059,659 UART: [state] CFI Enabled
3,179,724 UART: [rt] RT listening for mailbox commands...
3,180,394 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,354 UART: [rt]cmd =0x49444352, len=4
3,211,665 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
87,062 UART: [state] WD Timer not started. Device not locked for debugging
88,309 UART: [kat] SHA2-256
891,859 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,963 UART: [kat] ++
896,115 UART: [kat] sha1
900,299 UART: [kat] SHA2-256
902,239 UART: [kat] SHA2-384
905,154 UART: [kat] SHA2-512-ACC
907,055 UART: [kat] ECC-384
917,392 UART: [kat] HMAC-384Kdf
922,108 UART: [kat] LMS
1,170,420 UART: [kat] --
1,171,355 UART: [cold-reset] ++
1,171,837 UART: [fht] FHT @ 0x50003400
1,174,479 UART: [idev] ++
1,174,647 UART: [idev] CDI.KEYID = 6
1,175,008 UART: [idev] SUBJECT.KEYID = 7
1,175,433 UART: [idev] UDS.KEYID = 0
1,175,779 ready_for_fw is high
1,175,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,620 UART: [idev] Erasing UDS.KEYID = 0
1,200,592 UART: [idev] Sha1 KeyId Algorithm
1,209,442 UART: [idev] --
1,210,535 UART: [ldev] ++
1,210,703 UART: [ldev] CDI.KEYID = 6
1,211,067 UART: [ldev] SUBJECT.KEYID = 5
1,211,494 UART: [ldev] AUTHORITY.KEYID = 7
1,211,957 UART: [ldev] FE.KEYID = 1
1,217,023 UART: [ldev] Erasing FE.KEYID = 1
1,243,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,351 UART: [ldev] --
1,282,768 UART: [fwproc] Wait for Commands...
1,283,579 UART: [fwproc] Recv command 0x46574c44
1,284,312 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,876 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,051 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,344 >>> mbox cmd response: success
2,827,534 UART: [afmc] ++
2,827,702 UART: [afmc] CDI.KEYID = 6
2,828,065 UART: [afmc] SUBJECT.KEYID = 7
2,828,491 UART: [afmc] AUTHORITY.KEYID = 5
2,864,444 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,778 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,488 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,369 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,070 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,789 UART: [afmc] --
2,907,754 UART: [cold-reset] --
2,908,504 UART: [state] Locking Datavault
2,909,849 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,453 UART: [state] Locking ICCM
2,910,987 UART: [exit] Launching FMC @ 0x40000130
2,916,317 UART:
2,916,333 UART: Running Caliptra FMC ...
2,916,741 UART:
2,916,884 UART: [state] CFI Enabled
2,927,456 UART: [fht] FMC Alias Private Key: 7
3,047,062 UART: [art] Extend RT PCRs Done
3,047,490 UART: [art] Lock RT PCRs Done
3,048,900 UART: [art] Populate DV Done
3,057,091 UART: [fht] FMC Alias Private Key: 7
3,058,241 UART: [art] Derive CDI
3,058,521 UART: [art] Store in slot 0x4
3,144,036 UART: [art] Derive Key Pair
3,144,396 UART: [art] Store priv key in slot 0x5
3,157,788 UART: [art] Derive Key Pair - Done
3,172,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,566 UART: [art] PUB.X = C8C9D9CDA87060A0D27DE0E50368B01DB7E887A7E63AFB195254CB8C5424781BB29E6FBAFEAEB31608340FC855F370BB
3,195,343 UART: [art] PUB.Y = 49A5E2DEA9C9339BBB97AA0DFE54DD4863A799CBBAB8C5B705A82A2754F4E8267364523E855D0CEBD7A03DEDF7C6A6CF
3,202,308 UART: [art] SIG.R = EE975B7BE3EEBCB6F6648CA7D86959D5AAC7DC6A2B85FFC42D0ACEE67E72B8DCD4CE2EC613E088B4D5EF314F7E41DB06
3,209,106 UART: [art] SIG.S = C4664EDCB7464481C0B5CE1D382E910AA2DEBD28AE167CF904D698999E9B620A9C2DFA2FEE98B3B11E7116629C8FD923
3,231,875 UART: Caliptra RT
3,232,218 UART: [state] CFI Enabled
3,351,626 UART: [rt] RT listening for mailbox commands...
3,352,296 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,944 UART: [rt]cmd =0x49444352, len=4
3,383,343 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,771 ready_for_fw is high
1,059,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,551 >>> mbox cmd response: success
2,741,694 UART:
2,741,710 UART: Running Caliptra FMC ...
2,742,118 UART:
2,742,261 UART: [state] CFI Enabled
2,752,475 UART: [fht] FMC Alias Private Key: 7
2,870,967 UART: [art] Extend RT PCRs Done
2,871,395 UART: [art] Lock RT PCRs Done
2,873,015 UART: [art] Populate DV Done
2,881,114 UART: [fht] FMC Alias Private Key: 7
2,882,274 UART: [art] Derive CDI
2,882,554 UART: [art] Store in slot 0x4
2,968,233 UART: [art] Derive Key Pair
2,968,593 UART: [art] Store priv key in slot 0x5
2,981,477 UART: [art] Derive Key Pair - Done
2,996,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,714 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,479 UART: [art] PUB.X = 1C1B2E6C169AA5644CE8EAD688EFC82288BE93D47172CC966A4BCA4A30EF26E19FDD4F094D6646A17A810098545C1168
3,019,232 UART: [art] PUB.Y = 8599DA499E13CFF6973C162A6F68A5A8B625A2C2C45CB47C6F7AEC200D34E4E3066CBF99B9FA043FF885864EB7A17AB6
3,026,187 UART: [art] SIG.R = EEA12E9DBD5F7936D6310F39FA23B126323D6485E7480F3DBF171B88A7ECE480E7107E3863D74C5041D80D64825D1331
3,032,948 UART: [art] SIG.S = 7DDF12F0C7EAA12BC38C524E8F447B88822B07D89EB3748B00A4A5FDA6D41AA9611287022B37729CA7D51C6EE3ADE92C
3,056,598 UART: Caliptra RT
3,056,941 UART: [state] CFI Enabled
3,176,150 UART: [rt] RT listening for mailbox commands...
3,176,820 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,696 UART: [rt]cmd =0x49444352, len=4
3,208,137 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,783 UART: [state] WD Timer not started. Device not locked for debugging
87,956 UART: [kat] SHA2-256
893,606 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,731 UART: [kat] ++
897,883 UART: [kat] sha1
902,211 UART: [kat] SHA2-256
904,151 UART: [kat] SHA2-384
906,914 UART: [kat] SHA2-512-ACC
908,815 UART: [kat] ECC-384
918,700 UART: [kat] HMAC-384Kdf
923,190 UART: [kat] LMS
1,171,518 UART: [kat] --
1,172,649 UART: [cold-reset] ++
1,173,117 UART: [fht] FHT @ 0x50003400
1,175,698 UART: [idev] ++
1,175,866 UART: [idev] CDI.KEYID = 6
1,176,226 UART: [idev] SUBJECT.KEYID = 7
1,176,650 UART: [idev] UDS.KEYID = 0
1,176,995 ready_for_fw is high
1,176,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,528 UART: [idev] Erasing UDS.KEYID = 0
1,201,267 UART: [idev] Sha1 KeyId Algorithm
1,209,721 UART: [idev] --
1,210,877 UART: [ldev] ++
1,211,045 UART: [ldev] CDI.KEYID = 6
1,211,408 UART: [ldev] SUBJECT.KEYID = 5
1,211,834 UART: [ldev] AUTHORITY.KEYID = 7
1,212,297 UART: [ldev] FE.KEYID = 1
1,217,219 UART: [ldev] Erasing FE.KEYID = 1
1,243,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,383 UART: [ldev] --
1,282,706 UART: [fwproc] Wait for Commands...
1,283,368 UART: [fwproc] Recv command 0x46574c44
1,284,096 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,858 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,028 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,315 >>> mbox cmd response: success
2,827,513 UART: [afmc] ++
2,827,681 UART: [afmc] CDI.KEYID = 6
2,828,043 UART: [afmc] SUBJECT.KEYID = 7
2,828,468 UART: [afmc] AUTHORITY.KEYID = 5
2,863,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,014 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,723 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,606 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,307 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,063 UART: [afmc] --
2,907,061 UART: [cold-reset] --
2,908,209 UART: [state] Locking Datavault
2,909,070 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,674 UART: [state] Locking ICCM
2,910,158 UART: [exit] Launching FMC @ 0x40000130
2,915,488 UART:
2,915,504 UART: Running Caliptra FMC ...
2,915,912 UART:
2,915,966 UART: [state] CFI Enabled
2,926,424 UART: [fht] FMC Alias Private Key: 7
3,045,342 UART: [art] Extend RT PCRs Done
3,045,770 UART: [art] Lock RT PCRs Done
3,047,358 UART: [art] Populate DV Done
3,055,707 UART: [fht] FMC Alias Private Key: 7
3,056,755 UART: [art] Derive CDI
3,057,035 UART: [art] Store in slot 0x4
3,142,672 UART: [art] Derive Key Pair
3,143,032 UART: [art] Store priv key in slot 0x5
3,156,082 UART: [art] Derive Key Pair - Done
3,170,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,914 UART: [art] PUB.X = 51133686FC3405A436BD99037BE0A0DFCFE1DFB0F5F27D2F99420A8DCD87AC12EABBF23BA6F80E08992942DD24154AD0
3,193,685 UART: [art] PUB.Y = E009DE44CC07639346008D48D4CBBD5EEB1F0B36068F90AE09568AB9F3804FFDD07E7F0C685F5F68A935586BF3A28ADF
3,200,609 UART: [art] SIG.R = 532D582FB58089EA39338E4B32DFBFB63DDBFE6514B3AA54D77BE1B99DB22D30F71D915AD08147D07C18874FACA39D3A
3,207,395 UART: [art] SIG.S = 5F7524B114183E7CAB2E2F6DA978397F31E1AA92F4A297C548ACA48DB8BA16D0D983C1060A41A7999C892ABADE5F44D1
3,231,259 UART: Caliptra RT
3,231,510 UART: [state] CFI Enabled
3,350,340 UART: [rt] RT listening for mailbox commands...
3,351,010 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,654 UART: [rt]cmd =0x49444352, len=4
3,381,937 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,665 ready_for_fw is high
1,059,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,566 >>> mbox cmd response: success
2,742,629 UART:
2,742,645 UART: Running Caliptra FMC ...
2,743,053 UART:
2,743,107 UART: [state] CFI Enabled
2,753,693 UART: [fht] FMC Alias Private Key: 7
2,873,097 UART: [art] Extend RT PCRs Done
2,873,525 UART: [art] Lock RT PCRs Done
2,875,217 UART: [art] Populate DV Done
2,883,532 UART: [fht] FMC Alias Private Key: 7
2,884,660 UART: [art] Derive CDI
2,884,940 UART: [art] Store in slot 0x4
2,970,191 UART: [art] Derive Key Pair
2,970,551 UART: [art] Store priv key in slot 0x5
2,983,197 UART: [art] Derive Key Pair - Done
2,998,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,969 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,734 UART: [art] PUB.X = 1D251867CA67850FD3AEC99BCE16A51C6698109E9771F9DDB626178E9BEE718B73DDE1CC7DE58338D0CE8FB38CF01775
3,021,513 UART: [art] PUB.Y = 168CF1856C62321FAB844BEA2E1F8F24B69C6EBE7183372C898E2B041714F43B952BB90DDDBB0562F3E4F4412DF90C4D
3,028,461 UART: [art] SIG.R = 5C29AE96ADB8815A4A4662F2970F2BD4428EF59D9FBB712312D18566585CDDDDDE808E41AFED5A23F1EDDD2665885D0B
3,035,241 UART: [art] SIG.S = 84BD2B063291D2E0798CAA23B122DC3894D50CF26E0EBCBB40D83D4090CEF701A2F90F0A85A8F858B3B887B04FC01EDB
3,059,193 UART: Caliptra RT
3,059,444 UART: [state] CFI Enabled
3,178,329 UART: [rt] RT listening for mailbox commands...
3,178,999 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,745 UART: [rt]cmd =0x49444352, len=4
3,210,192 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
87,034 UART: [state] WD Timer not started. Device not locked for debugging
88,309 UART: [kat] SHA2-256
893,959 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,084 UART: [kat] ++
898,236 UART: [kat] sha1
902,410 UART: [kat] SHA2-256
904,350 UART: [kat] SHA2-384
907,219 UART: [kat] SHA2-512-ACC
909,120 UART: [kat] ECC-384
918,475 UART: [kat] HMAC-384Kdf
923,207 UART: [kat] LMS
1,171,535 UART: [kat] --
1,172,466 UART: [cold-reset] ++
1,172,966 UART: [fht] FHT @ 0x50003400
1,175,837 UART: [idev] ++
1,176,005 UART: [idev] CDI.KEYID = 6
1,176,365 UART: [idev] SUBJECT.KEYID = 7
1,176,789 UART: [idev] UDS.KEYID = 0
1,177,134 ready_for_fw is high
1,177,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,881 UART: [idev] Erasing UDS.KEYID = 0
1,202,368 UART: [idev] Sha1 KeyId Algorithm
1,210,852 UART: [idev] --
1,211,928 UART: [ldev] ++
1,212,096 UART: [ldev] CDI.KEYID = 6
1,212,459 UART: [ldev] SUBJECT.KEYID = 5
1,212,885 UART: [ldev] AUTHORITY.KEYID = 7
1,213,348 UART: [ldev] FE.KEYID = 1
1,218,580 UART: [ldev] Erasing FE.KEYID = 1
1,244,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,794 UART: [ldev] --
1,284,145 UART: [fwproc] Wait for Commands...
1,284,829 UART: [fwproc] Recv command 0x46574c44
1,285,557 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,863 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,033 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,246 >>> mbox cmd response: success
2,830,352 UART: [afmc] ++
2,830,520 UART: [afmc] CDI.KEYID = 6
2,830,882 UART: [afmc] SUBJECT.KEYID = 7
2,831,307 UART: [afmc] AUTHORITY.KEYID = 5
2,867,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,873 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,582 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,465 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,166 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,138 UART: [afmc] --
2,910,196 UART: [cold-reset] --
2,910,974 UART: [state] Locking Datavault
2,912,249 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,853 UART: [state] Locking ICCM
2,913,447 UART: [exit] Launching FMC @ 0x40000130
2,918,777 UART:
2,918,793 UART: Running Caliptra FMC ...
2,919,201 UART:
2,919,344 UART: [state] CFI Enabled
2,929,832 UART: [fht] FMC Alias Private Key: 7
3,048,372 UART: [art] Extend RT PCRs Done
3,048,800 UART: [art] Lock RT PCRs Done
3,050,426 UART: [art] Populate DV Done
3,058,735 UART: [fht] FMC Alias Private Key: 7
3,059,785 UART: [art] Derive CDI
3,060,065 UART: [art] Store in slot 0x4
3,146,024 UART: [art] Derive Key Pair
3,146,384 UART: [art] Store priv key in slot 0x5
3,160,020 UART: [art] Derive Key Pair - Done
3,175,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,250 UART: [art] PUB.X = 0B9D2483CE323C6BDA7FE00412CEB5FEC48F11AC627241F86343E3BEBA51B31AB0F4D2F825E95DD4325F92B267D69F63
3,198,028 UART: [art] PUB.Y = 43CB245F2D53A43F69C116B5A89E0088B68F97A8DE659398741886C9F39867515A40EB2DB98BD7B57C4793AA790F3BC0
3,204,953 UART: [art] SIG.R = 0235E637735CCDA92BD7316C0C2E756CD7C92C732F4B32016E67AFACFD06E6CD6A2AF08679EEFE67F018EC6F7C3BB253
3,211,729 UART: [art] SIG.S = 980222069C5D50F966BB8E7238AE6041FD3E488144D9C7E9F9594F664714C564B6DE4DDC776C140B7941135F45E43940
3,235,436 UART: Caliptra RT
3,235,779 UART: [state] CFI Enabled
3,355,842 UART: [rt] RT listening for mailbox commands...
3,356,512 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,378 UART: [rt]cmd =0x49444352, len=4
3,387,911 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,978 ready_for_fw is high
1,060,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,137 >>> mbox cmd response: success
2,742,944 UART:
2,742,960 UART: Running Caliptra FMC ...
2,743,368 UART:
2,743,511 UART: [state] CFI Enabled
2,754,247 UART: [fht] FMC Alias Private Key: 7
2,872,815 UART: [art] Extend RT PCRs Done
2,873,243 UART: [art] Lock RT PCRs Done
2,874,489 UART: [art] Populate DV Done
2,882,636 UART: [fht] FMC Alias Private Key: 7
2,883,622 UART: [art] Derive CDI
2,883,902 UART: [art] Store in slot 0x4
2,969,235 UART: [art] Derive Key Pair
2,969,595 UART: [art] Store priv key in slot 0x5
2,983,395 UART: [art] Derive Key Pair - Done
2,998,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,334 UART: [art] PUB.X = 13D7060DE6187D45B1575E470FC68CC7CA7B3B581D29A9581AB6076DE63289D88F0F121361E2FF9DF3A6AB31E64609CE
3,021,092 UART: [art] PUB.Y = 74D3091BC4011C65DB62B467B1C3B01A51F331A3F1B4F3CE54B52B85C9B9DC69C8862A2B3D839892BE6609771DF76578
3,028,035 UART: [art] SIG.R = 253727E081289C7E04D1E7C6FC93266CACFCC94CBDC95833A9E9B6962A97A6E83637D40FE0E3A23E39010ED90E4B0C52
3,034,795 UART: [art] SIG.S = 6A8092BEA8D5322010385C78294DB1D68ECC1F44069013AB44767FF0453C724E60CFA8C3A61A68F8ECEB471555A15696
3,057,972 UART: Caliptra RT
3,058,315 UART: [state] CFI Enabled
3,178,329 UART: [rt] RT listening for mailbox commands...
3,178,999 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,849 UART: [rt]cmd =0x49444352, len=4
3,210,378 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,119 UART:
192,487 UART: Running Caliptra ROM ...
193,661 UART:
193,819 UART: [state] CFI Enabled
267,156 UART: [state] LifecycleState = Unprovisioned
269,093 UART: [state] DebugLocked = No
271,370 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,968 UART: [kat] SHA2-256
445,705 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,190 UART: [kat] ++
456,693 UART: [kat] sha1
466,931 UART: [kat] SHA2-256
469,584 UART: [kat] SHA2-384
476,778 UART: [kat] SHA2-512-ACC
479,147 UART: [kat] ECC-384
2,767,304 UART: [kat] HMAC-384Kdf
2,800,782 UART: [kat] LMS
3,991,096 UART: [kat] --
3,994,618 UART: [cold-reset] ++
3,997,122 UART: [fht] Storing FHT @ 0x50003400
4,009,382 UART: [idev] ++
4,009,960 UART: [idev] CDI.KEYID = 6
4,011,016 UART: [idev] SUBJECT.KEYID = 7
4,012,131 UART: [idev] UDS.KEYID = 0
4,013,194 ready_for_fw is high
4,013,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,495 UART: [idev] Erasing UDS.KEYID = 0
7,344,759 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,110 UART: [idev] --
7,371,804 UART: [ldev] ++
7,372,372 UART: [ldev] CDI.KEYID = 6
7,373,315 UART: [ldev] SUBJECT.KEYID = 5
7,374,525 UART: [ldev] AUTHORITY.KEYID = 7
7,375,809 UART: [ldev] FE.KEYID = 1
7,422,031 UART: [ldev] Erasing FE.KEYID = 1
10,754,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,632 UART: [ldev] --
13,137,462 UART: [fwproc] Waiting for Commands...
13,140,688 UART: [fwproc] Received command 0x46574c44
13,142,866 UART: [fwproc] Received Image of size 118548 bytes
17,255,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,331,416 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,404,565 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,733,259 >>> mbox cmd response: success
17,734,309 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,736,726 UART: [afmc] ++
17,737,299 UART: [afmc] CDI.KEYID = 6
17,738,238 UART: [afmc] SUBJECT.KEYID = 7
17,739,503 UART: [afmc] AUTHORITY.KEYID = 5
21,110,992 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,411,154 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,413,419 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,427,873 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,442,572 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,456,992 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,478,372 UART: [afmc] --
23,482,777 UART: [cold-reset] --
23,488,241 UART: [state] Locking Datavault
23,493,548 UART: [state] Locking PCR0, PCR1 and PCR31
23,495,252 UART: [state] Locking ICCM
23,497,136 UART: [exit] Launching FMC @ 0x40000130
23,505,534 UART:
23,505,776 UART: Running Caliptra FMC ...
23,506,879 UART:
23,507,038 UART: [state] CFI Enabled
23,571,204 UART: [fht] FMC Alias Private Key: 7
25,912,263 UART: [art] Extend RT PCRs Done
25,913,487 UART: [art] Lock RT PCRs Done
25,915,035 UART: [art] Populate DV Done
25,920,612 UART: [fht] FMC Alias Private Key: 7
25,922,309 UART: [art] Derive CDI
25,923,050 UART: [art] Store in slot 0x4
25,980,007 UART: [art] Derive Key Pair
25,981,054 UART: [art] Store priv key in slot 0x5
29,273,345 UART: [art] Derive Key Pair - Done
29,286,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,574,775 UART: [art] Erasing AUTHORITY.KEYID = 7
31,576,284 UART: [art] PUB.X = 62B7355DFE96A38B32C32E0287261913921B0371FEC7093A746426BABEC3517A3E23B71ADFC1FC0F7FCCAAD1D0780A68
31,583,562 UART: [art] PUB.Y = 6641A2C696BDB391C70D2D592C3584A12825B284CFEBB6F6283DAFA64BA4D96553E51DA36C3C126B1E54792046CA2563
31,590,806 UART: [art] SIG.R = B1541110369D2FA580B919E0BF2A56EB3AD75DA0318F6CA514C211B8D326FCD48338B99E838C27FF1140305955B53A41
31,598,216 UART: [art] SIG.S = 42384074878D13E24C407524E731A753A60ED4D933100A026DC565AC06663DF79C8DDCAF1A593B7762E1FA88973B4E13
32,903,280 UART: Caliptra RT
32,904,003 UART: [state] CFI Enabled
33,080,539 UART: [rt] RT listening for mailbox commands...
33,111,976 UART: [rt]cmd =0x43415053, len=4
33,113,611 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,784,434 ready_for_fw is high
3,784,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,950,501 >>> mbox cmd response: success
17,951,880 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,651,928 UART:
23,652,341 UART: Running Caliptra FMC ...
23,653,457 UART:
23,653,620 UART: [state] CFI Enabled
23,718,890 UART: [fht] FMC Alias Private Key: 7
26,059,223 UART: [art] Extend RT PCRs Done
26,060,461 UART: [art] Lock RT PCRs Done
26,062,016 UART: [art] Populate DV Done
26,067,449 UART: [fht] FMC Alias Private Key: 7
26,068,998 UART: [art] Derive CDI
26,069,822 UART: [art] Store in slot 0x4
26,127,987 UART: [art] Derive Key Pair
26,129,036 UART: [art] Store priv key in slot 0x5
29,422,257 UART: [art] Derive Key Pair - Done
29,435,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,784 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,311 UART: [art] PUB.X = 044C8AFCBE7270DFBDEA25339270CA0E28D8C32023A7D33521178F94E9FDB2E1E090CE33F7D915810E5EF63F3AA40082
31,731,571 UART: [art] PUB.Y = 6D159ADD053556EAF52F9006EA7CD849E89F32D25C3B4B4C0C3CA20B038BCFED5D139B872FD2A541C6A8CB202E195802
31,738,833 UART: [art] SIG.R = 8DBFBB07527F4F360204A0ED491FC3421E396572CBFEB809C3ECDDE0BF85922F1CED367CA5DD1FE3214A06C2F8A53F0A
31,746,238 UART: [art] SIG.S = D931BB0BED8B6354AFDF415AE232AE35A1928F90C622BC1784DB2DB1A27C4FE9CC845DDE4734ACFEA76CFE529410EA12
33,051,714 UART: Caliptra RT
33,052,442 UART: [state] CFI Enabled
33,248,163 UART: [rt] RT listening for mailbox commands...
33,279,853 UART: [rt]cmd =0x43415053, len=4
33,281,537 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
192,686 UART:
193,046 UART: Running Caliptra ROM ...
194,236 UART:
603,871 UART: [state] CFI Enabled
618,761 UART: [state] LifecycleState = Unprovisioned
620,633 UART: [state] DebugLocked = No
623,589 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,736 UART: [kat] SHA2-256
797,500 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,015 UART: [kat] ++
808,464 UART: [kat] sha1
819,115 UART: [kat] SHA2-256
821,828 UART: [kat] SHA2-384
828,021 UART: [kat] SHA2-512-ACC
830,391 UART: [kat] ECC-384
3,112,769 UART: [kat] HMAC-384Kdf
3,124,002 UART: [kat] LMS
4,314,089 UART: [kat] --
4,318,246 UART: [cold-reset] ++
4,319,893 UART: [fht] Storing FHT @ 0x50003400
4,332,425 UART: [idev] ++
4,332,984 UART: [idev] CDI.KEYID = 6
4,333,950 UART: [idev] SUBJECT.KEYID = 7
4,335,189 UART: [idev] UDS.KEYID = 0
4,336,144 ready_for_fw is high
4,336,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,187 UART: [idev] Erasing UDS.KEYID = 0
7,624,346 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,418 UART: [idev] --
7,650,407 UART: [ldev] ++
7,651,026 UART: [ldev] CDI.KEYID = 6
7,651,916 UART: [ldev] SUBJECT.KEYID = 5
7,653,170 UART: [ldev] AUTHORITY.KEYID = 7
7,654,377 UART: [ldev] FE.KEYID = 1
7,664,592 UART: [ldev] Erasing FE.KEYID = 1
10,953,871 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,334 UART: [ldev] --
13,313,266 UART: [fwproc] Waiting for Commands...
13,314,863 UART: [fwproc] Received command 0x46574c44
13,317,034 UART: [fwproc] Received Image of size 118548 bytes
17,428,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,070 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,283 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,632 >>> mbox cmd response: success
17,904,776 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,907,290 UART: [afmc] ++
17,907,868 UART: [afmc] CDI.KEYID = 6
17,908,829 UART: [afmc] SUBJECT.KEYID = 7
17,910,029 UART: [afmc] AUTHORITY.KEYID = 5
21,225,384 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,962 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,264 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,638 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,367 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,774 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,298 UART: [afmc] --
23,589,988 UART: [cold-reset] --
23,593,143 UART: [state] Locking Datavault
23,597,836 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,601 UART: [state] Locking ICCM
23,601,749 UART: [exit] Launching FMC @ 0x40000130
23,610,139 UART:
23,610,368 UART: Running Caliptra FMC ...
23,611,467 UART:
23,611,637 UART: [state] CFI Enabled
23,619,897 UART: [fht] FMC Alias Private Key: 7
25,960,568 UART: [art] Extend RT PCRs Done
25,961,788 UART: [art] Lock RT PCRs Done
25,963,365 UART: [art] Populate DV Done
25,969,047 UART: [fht] FMC Alias Private Key: 7
25,970,805 UART: [art] Derive CDI
25,971,540 UART: [art] Store in slot 0x4
26,014,348 UART: [art] Derive Key Pair
26,015,388 UART: [art] Store priv key in slot 0x5
29,257,484 UART: [art] Derive Key Pair - Done
29,270,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,852 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,358 UART: [art] PUB.X = C277306EDB4446C5A52431F2BDBE24550FD2CEF7F89FE98150B1D8ABCB5EAA6B0BD28FD8413515CB99B8F15C6726DD2A
31,559,660 UART: [art] PUB.Y = 32FA61277DBCAE7AADDD1A2A2F72C8AF5B6308BEF59D8611A9F7F2848D035C05C3EE2DC1DF6AE5AF9D3F4B17CCEDAF7E
31,566,941 UART: [art] SIG.R = CDBAF3C0AA20A9B3D6D44671EF7B7BE4329A01379BBE4870535A77978CC366EFEB11B447AFA7062C8023A157EF2581E7
31,574,339 UART: [art] SIG.S = 4861E73E19F3610CE342E1820B79D8318353AEA3C0D591A79D8299EC91D74FFD9F4A043051A9AC39AD9BB09C423B42B9
32,879,257 UART: Caliptra RT
32,879,998 UART: [state] CFI Enabled
33,013,648 UART: [rt] RT listening for mailbox commands...
33,044,740 UART: [rt]cmd =0x43415053, len=4
33,046,462 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
4,128,271 ready_for_fw is high
4,128,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,618 >>> mbox cmd response: success
18,159,783 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,801,144 UART:
23,801,536 UART: Running Caliptra FMC ...
23,802,727 UART:
23,802,891 UART: [state] CFI Enabled
23,810,826 UART: [fht] FMC Alias Private Key: 7
26,150,721 UART: [art] Extend RT PCRs Done
26,151,962 UART: [art] Lock RT PCRs Done
26,153,540 UART: [art] Populate DV Done
26,159,154 UART: [fht] FMC Alias Private Key: 7
26,160,784 UART: [art] Derive CDI
26,161,608 UART: [art] Store in slot 0x4
26,204,686 UART: [art] Derive Key Pair
26,205,683 UART: [art] Store priv key in slot 0x5
29,448,040 UART: [art] Derive Key Pair - Done
29,461,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,875 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,428 UART: [art] PUB.X = EE4711F463E67B784D20B54FF699E6A30477D255B316B616CCFFF073C309589DBDFC8ADCCC02EE1B69281378329423E6
31,750,678 UART: [art] PUB.Y = 7D0412742953FA289994EF8A3B179A487DCE308590E203A0638313E628637401419D0009FCC1135362862988992C683E
31,758,021 UART: [art] SIG.R = 1A9AEE18DFC9CEC9E83F5E0B3DA3A6F7A3F7B312DC9AB3815BFDF863FACA1CFC8C773EB2B06925E9E4267C81ED23D324
31,765,264 UART: [art] SIG.S = 775C4164C35830A17F03C2F249C61FF421F868E5D5FF585293731DADC0F84DCB560672D5EE6F7A364973EC3637CCC748
33,070,992 UART: Caliptra RT
33,071,708 UART: [state] CFI Enabled
33,204,985 UART: [rt] RT listening for mailbox commands...
33,236,416 UART: [rt]cmd =0x43415053, len=4
33,238,177 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
191,983 UART:
192,357 UART: Running Caliptra ROM ...
193,546 UART:
193,702 UART: [state] CFI Enabled
265,744 UART: [state] LifecycleState = Unprovisioned
267,664 UART: [state] DebugLocked = No
270,125 UART: [state] WD Timer not started. Device not locked for debugging
274,518 UART: [kat] SHA2-256
454,177 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,919 UART: [kat] ++
465,409 UART: [kat] sha1
476,987 UART: [kat] SHA2-256
479,643 UART: [kat] SHA2-384
484,703 UART: [kat] SHA2-512-ACC
487,067 UART: [kat] ECC-384
2,950,511 UART: [kat] HMAC-384Kdf
2,972,705 UART: [kat] LMS
3,449,241 UART: [kat] --
3,453,819 UART: [cold-reset] ++
3,454,909 UART: [fht] FHT @ 0x50003400
3,466,664 UART: [idev] ++
3,467,222 UART: [idev] CDI.KEYID = 6
3,468,247 UART: [idev] SUBJECT.KEYID = 7
3,469,417 UART: [idev] UDS.KEYID = 0
3,470,458 ready_for_fw is high
3,470,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,739 UART: [idev] Erasing UDS.KEYID = 0
5,987,593 UART: [idev] Sha1 KeyId Algorithm
6,011,300 UART: [idev] --
6,016,891 UART: [ldev] ++
6,017,467 UART: [ldev] CDI.KEYID = 6
6,018,354 UART: [ldev] SUBJECT.KEYID = 5
6,019,622 UART: [ldev] AUTHORITY.KEYID = 7
6,020,856 UART: [ldev] FE.KEYID = 1
6,059,155 UART: [ldev] Erasing FE.KEYID = 1
8,561,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,839 UART: [ldev] --
10,353,964 UART: [fwproc] Wait for Commands...
10,356,433 UART: [fwproc] Recv command 0x46574c44
10,358,415 UART: [fwproc] Recv'd Img size: 118548 bytes
13,844,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,923,913 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,996,921 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,325,772 >>> mbox cmd response: success
14,326,778 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,329,820 UART: [afmc] ++
14,330,433 UART: [afmc] CDI.KEYID = 6
14,331,340 UART: [afmc] SUBJECT.KEYID = 7
14,332,552 UART: [afmc] AUTHORITY.KEYID = 5
16,876,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,602,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,605,068 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,620,860 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,636,925 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,652,513 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,677,791 UART: [afmc] --
18,681,112 UART: [cold-reset] --
18,685,558 UART: [state] Locking Datavault
18,691,496 UART: [state] Locking PCR0, PCR1 and PCR31
18,693,188 UART: [state] Locking ICCM
18,694,717 UART: [exit] Launching FMC @ 0x40000130
18,703,104 UART:
18,703,334 UART: Running Caliptra FMC ...
18,704,358 UART:
18,704,502 UART: [state] CFI Enabled
18,757,512 UART: [fht] FMC Alias Private Key: 7
20,524,846 UART: [art] Extend RT PCRs Done
20,526,066 UART: [art] Lock RT PCRs Done
20,527,719 UART: [art] Populate DV Done
20,533,311 UART: [fht] FMC Alias Private Key: 7
20,534,792 UART: [art] Derive CDI
20,535,524 UART: [art] Store in slot 0x4
20,590,752 UART: [art] Derive Key Pair
20,591,790 UART: [art] Store priv key in slot 0x5
23,054,519 UART: [art] Derive Key Pair - Done
23,067,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,780,807 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,370 UART: [art] PUB.X = 6D94092E72D8A7392471D4D8001E0EDE4CB21476F352E60C510F0755A644767ECB863F9C98066C901C78375A953075F2
24,789,519 UART: [art] PUB.Y = 08A18CC8F3BDA50204EB61980B5EF0A4060F302862D6FD0E6BDBC6D19DFE17FDE535CEA7D165FE41C710F9EA592208A7
24,796,809 UART: [art] SIG.R = E1DBDBC69730E29FFD280B1F43D2A89CC0585B93E39462A196DD1C8ABB60B3702848871EEAB7ECFBF93A80596F470CF7
24,804,208 UART: [art] SIG.S = E859864624CFEC269720F878762363ACA77E2DD6705CBE8F678E200E28EAC96FC61841F5018A498E4EF6D3442FA1EEF5
25,783,558 UART: Caliptra RT
25,784,257 UART: [state] CFI Enabled
25,964,572 UART: [rt] RT listening for mailbox commands...
25,995,679 UART: [rt]cmd =0x43415053, len=4
25,997,445 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,463,128 ready_for_fw is high
3,463,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,655 >>> mbox cmd response: success
14,220,765 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,514,962 UART:
18,515,331 UART: Running Caliptra FMC ...
18,516,460 UART:
18,516,613 UART: [state] CFI Enabled
18,582,330 UART: [fht] FMC Alias Private Key: 7
20,348,472 UART: [art] Extend RT PCRs Done
20,349,688 UART: [art] Lock RT PCRs Done
20,351,256 UART: [art] Populate DV Done
20,356,747 UART: [fht] FMC Alias Private Key: 7
20,358,341 UART: [art] Derive CDI
20,359,151 UART: [art] Store in slot 0x4
20,415,249 UART: [art] Derive Key Pair
20,416,290 UART: [art] Store priv key in slot 0x5
22,878,861 UART: [art] Derive Key Pair - Done
22,892,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,153 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,661 UART: [art] PUB.X = 05A3B47ED5F41877C6729481C2AB845CFEA810A4A75D83324A889738AD79178CAB06D21580398BF34EE66DDC1E3C2E52
24,613,917 UART: [art] PUB.Y = 1F07D1607EAACC6BD04B6666E16302FEDCB2CE48D742817166EC61D12CAE154D35D2D8D7A8C1AB61D46FAD2DC06FF7CC
24,621,170 UART: [art] SIG.R = E7A0BF6E8C834E39371A26F01F9F19832BFDC085180D306F912D5746B6D4287483D061F9C68DA13937809F55FD113E8F
24,628,564 UART: [art] SIG.S = C6F86C87B4FA027433403B5D430870A562A7A4AE7FCDB695D7255CCF1BDEA8C9EC909343525AACD2274BFAAD485EDC23
25,608,297 UART: Caliptra RT
25,609,004 UART: [state] CFI Enabled
25,789,070 UART: [rt] RT listening for mailbox commands...
25,820,194 UART: [rt]cmd =0x43415053, len=4
25,821,961 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,549 writing to cptra_bootfsm_go
192,638 UART:
193,131 UART: Running Caliptra ROM ...
194,265 UART:
604,019 UART: [state] CFI Enabled
616,568 UART: [state] LifecycleState = Unprovisioned
618,441 UART: [state] DebugLocked = No
620,851 UART: [state] WD Timer not started. Device not locked for debugging
625,142 UART: [kat] SHA2-256
804,809 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,547 UART: [kat] ++
815,998 UART: [kat] sha1
826,943 UART: [kat] SHA2-256
829,592 UART: [kat] SHA2-384
835,445 UART: [kat] SHA2-512-ACC
837,836 UART: [kat] ECC-384
3,280,581 UART: [kat] HMAC-384Kdf
3,292,746 UART: [kat] LMS
3,769,270 UART: [kat] --
3,773,901 UART: [cold-reset] ++
3,775,689 UART: [fht] FHT @ 0x50003400
3,786,383 UART: [idev] ++
3,786,948 UART: [idev] CDI.KEYID = 6
3,787,979 UART: [idev] SUBJECT.KEYID = 7
3,789,155 UART: [idev] UDS.KEYID = 0
3,790,202 ready_for_fw is high
3,790,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,324 UART: [idev] Erasing UDS.KEYID = 0
6,270,004 UART: [idev] Sha1 KeyId Algorithm
6,293,453 UART: [idev] --
6,297,284 UART: [ldev] ++
6,297,927 UART: [ldev] CDI.KEYID = 6
6,298,838 UART: [ldev] SUBJECT.KEYID = 5
6,300,526 UART: [ldev] AUTHORITY.KEYID = 7
6,301,758 UART: [ldev] FE.KEYID = 1
6,312,652 UART: [ldev] Erasing FE.KEYID = 1
8,791,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,767 UART: [ldev] --
10,587,415 UART: [fwproc] Wait for Commands...
10,589,076 UART: [fwproc] Recv command 0x46574c44
10,591,064 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,666 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,700 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,605 >>> mbox cmd response: success
14,547,702 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,550,535 UART: [afmc] ++
14,551,126 UART: [afmc] CDI.KEYID = 6
14,552,094 UART: [afmc] SUBJECT.KEYID = 7
14,553,319 UART: [afmc] AUTHORITY.KEYID = 5
17,057,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,207 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,445 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,331 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,859 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,981 UART: [afmc] --
18,857,085 UART: [cold-reset] --
18,862,204 UART: [state] Locking Datavault
18,868,371 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,142 UART: [state] Locking ICCM
18,872,399 UART: [exit] Launching FMC @ 0x40000130
18,880,800 UART:
18,881,035 UART: Running Caliptra FMC ...
18,882,138 UART:
18,882,298 UART: [state] CFI Enabled
18,890,457 UART: [fht] FMC Alias Private Key: 7
20,657,004 UART: [art] Extend RT PCRs Done
20,658,225 UART: [art] Lock RT PCRs Done
20,659,495 UART: [art] Populate DV Done
20,665,340 UART: [fht] FMC Alias Private Key: 7
20,667,038 UART: [art] Derive CDI
20,667,859 UART: [art] Store in slot 0x4
20,710,345 UART: [art] Derive Key Pair
20,711,382 UART: [art] Store priv key in slot 0x5
23,138,335 UART: [art] Derive Key Pair - Done
23,151,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,605 UART: [art] Erasing AUTHORITY.KEYID = 7
24,859,095 UART: [art] PUB.X = 3554E456048B03E6F2BA90EEE0DBC27EB65EC7BB25AD83D4C82D7E9EE6B567A5983F685A5D60E1B32104D444ED31B1BA
24,866,471 UART: [art] PUB.Y = 908EB437E96633DF2E9578AD701EBEE6BC23CD1B47A74C887F13F3AC1914097F215922B1169FE6B1EB64F01D23837E52
24,873,706 UART: [art] SIG.R = 0547F85CC32EE6022F375C4AE81D72EF9861254AFFC6F7EE49F30887F153E07997859535E5683AA9D9C4845923C45B85
24,881,093 UART: [art] SIG.S = 8D7FCEF43766754464EA4B3FCC2BD185D60C9BFD5BF92E365BEF6B0D2381F4A05A8A83474BB0854F3CE4F7EAEF8073EC
25,859,911 UART: Caliptra RT
25,860,624 UART: [state] CFI Enabled
25,993,090 UART: [rt] RT listening for mailbox commands...
26,024,451 UART: [rt]cmd =0x43415053, len=4
26,026,199 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
3,781,762 ready_for_fw is high
3,782,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,863 >>> mbox cmd response: success
14,446,507 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,692,972 UART:
18,693,359 UART: Running Caliptra FMC ...
18,694,502 UART:
18,694,682 UART: [state] CFI Enabled
18,702,582 UART: [fht] FMC Alias Private Key: 7
20,468,707 UART: [art] Extend RT PCRs Done
20,469,932 UART: [art] Lock RT PCRs Done
20,471,692 UART: [art] Populate DV Done
20,477,057 UART: [fht] FMC Alias Private Key: 7
20,478,560 UART: [art] Derive CDI
20,479,326 UART: [art] Store in slot 0x4
20,522,126 UART: [art] Derive Key Pair
20,523,126 UART: [art] Store priv key in slot 0x5
22,949,857 UART: [art] Derive Key Pair - Done
22,962,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,036 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,546 UART: [art] PUB.X = 2A51FF3804EC80E660D456056A3EA2935AAABA1F6BE4F494952B44CB28A94A6432B90F2ADC43FA585C36393E4EC102F4
24,677,852 UART: [art] PUB.Y = CF3C08B77EEB4C41D18C7BD9E78C989A4986F3B16020E04E19A9FA5EAEC44D501DCBA38879ABE8F4E3D5D59AC43B7203
24,685,110 UART: [art] SIG.R = 10B5500E251A66E64F6935A0AE5F352C5F263034B70197694D2D0BEBD397EAFEBDFD5C0BA9D8CD54EAD5319263429FF2
24,692,536 UART: [art] SIG.S = 92E86585D1C4CEF554EA4ECE9662C561295D2918221A8137C6EFECE345801FE152942B04BE1B61E4573C843CFA5911C7
25,671,438 UART: Caliptra RT
25,672,152 UART: [state] CFI Enabled
25,803,899 UART: [rt] RT listening for mailbox commands...
25,835,188 UART: [rt]cmd =0x43415053, len=4
25,837,012 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
192,237 UART:
192,607 UART: Running Caliptra ROM ...
193,796 UART:
193,954 UART: [state] CFI Enabled
267,685 UART: [state] LifecycleState = Unprovisioned
270,099 UART: [state] DebugLocked = No
272,989 UART: [state] WD Timer not started. Device not locked for debugging
277,457 UART: [kat] SHA2-256
467,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,065 UART: [kat] ++
478,523 UART: [kat] sha1
489,674 UART: [kat] SHA2-256
492,677 UART: [kat] SHA2-384
499,449 UART: [kat] SHA2-512-ACC
502,027 UART: [kat] ECC-384
2,950,020 UART: [kat] HMAC-384Kdf
2,971,908 UART: [kat] LMS
3,503,665 UART: [kat] --
3,507,475 UART: [cold-reset] ++
3,509,897 UART: [fht] FHT @ 0x50003400
3,521,083 UART: [idev] ++
3,521,725 UART: [idev] CDI.KEYID = 6
3,522,755 UART: [idev] SUBJECT.KEYID = 7
3,523,925 UART: [idev] UDS.KEYID = 0
3,524,890 ready_for_fw is high
3,525,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,247 UART: [idev] Erasing UDS.KEYID = 0
6,027,537 UART: [idev] Sha1 KeyId Algorithm
6,050,127 UART: [idev] --
6,055,893 UART: [ldev] ++
6,056,625 UART: [ldev] CDI.KEYID = 6
6,057,537 UART: [ldev] SUBJECT.KEYID = 5
6,058,693 UART: [ldev] AUTHORITY.KEYID = 7
6,059,920 UART: [ldev] FE.KEYID = 1
6,100,005 UART: [ldev] Erasing FE.KEYID = 1
8,609,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,097 UART: [ldev] --
10,414,639 UART: [fwproc] Wait for Commands...
10,417,118 UART: [fwproc] Recv command 0x46574c44
10,419,420 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,984,203 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,107,810 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,668,550 >>> mbox cmd response: success
14,669,647 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,671,835 UART: [afmc] ++
14,672,537 UART: [afmc] CDI.KEYID = 6
14,673,768 UART: [afmc] SUBJECT.KEYID = 7
14,675,194 UART: [afmc] AUTHORITY.KEYID = 5
17,214,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,110 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,239 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,344 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,273 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,507 UART: [afmc] --
19,011,911 UART: [cold-reset] --
19,015,780 UART: [state] Locking Datavault
19,021,188 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,476 UART: [state] Locking ICCM
19,025,211 UART: [exit] Launching FMC @ 0x40000130
19,033,876 UART:
19,034,124 UART: Running Caliptra FMC ...
19,035,230 UART:
19,035,390 UART: [state] CFI Enabled
19,094,802 UART: [fht] FMC Alias Private Key: 7
20,860,617 UART: [art] Extend RT PCRs Done
20,861,834 UART: [art] Lock RT PCRs Done
20,863,325 UART: [art] Populate DV Done
20,868,779 UART: [fht] FMC Alias Private Key: 7
20,870,264 UART: [art] Derive CDI
20,871,076 UART: [art] Store in slot 0x4
20,927,439 UART: [art] Derive Key Pair
20,928,437 UART: [art] Store priv key in slot 0x5
23,391,483 UART: [art] Derive Key Pair - Done
23,404,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,769 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,274 UART: [art] PUB.X = 6EC69DA6DB13AA685581BB1A0CE28A7A55F8033C4986AB9118BDBA400F91388A423ED414CC923D46D551EF5B23EAB03F
25,126,563 UART: [art] PUB.Y = 973A68F4BEA12848ADB693489419B914CE90302DFDA3C980ED3D92DAC65959D482C5FF04EE705366BEAFEAC4BD7279D9
25,133,810 UART: [art] SIG.R = 6306AA6E1315AA8D858B2CA2D1389348DC97A180EA71B8CA351DEAD2591B67A7D286D49A9A31BFCB657F8D20C0C33064
25,141,221 UART: [art] SIG.S = D195E93E96754532A4B953D27CD97AFE5DE77CCD490E07DE8B7952DB3012CFCF5A6BB15627BAD3F201CDCC929F59EB8E
26,120,149 UART: Caliptra RT
26,120,842 UART: [state] CFI Enabled
26,301,875 UART: [rt] RT listening for mailbox commands...
26,333,335 UART: [rt]cmd =0x43415053, len=4
26,335,240 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,440,676 ready_for_fw is high
3,441,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,800,598 >>> mbox cmd response: success
14,801,706 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,093,014 UART:
19,093,401 UART: Running Caliptra FMC ...
19,094,538 UART:
19,094,697 UART: [state] CFI Enabled
19,160,721 UART: [fht] FMC Alias Private Key: 7
20,927,555 UART: [art] Extend RT PCRs Done
20,928,787 UART: [art] Lock RT PCRs Done
20,930,713 UART: [art] Populate DV Done
20,936,076 UART: [fht] FMC Alias Private Key: 7
20,937,671 UART: [art] Derive CDI
20,938,410 UART: [art] Store in slot 0x4
20,993,054 UART: [art] Derive Key Pair
20,994,118 UART: [art] Store priv key in slot 0x5
23,457,181 UART: [art] Derive Key Pair - Done
23,470,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,183,044 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,563 UART: [art] PUB.X = AE6FB840E06369307082D2A19DD467130900DA0115FD651802D5F307B460EADA31DF27BC12479D5C2EDAFE95B11C901D
25,191,824 UART: [art] PUB.Y = EEEA302F032A6CD958A1CDC35FA68590353B10FF55395C8BED2148A6684D92B8D485008BB7AA65953174A2183973FCD2
25,199,017 UART: [art] SIG.R = 2C8E2FCEA661D36B7241DAF8096EB207394C70BBA8543179DC9ECE183BC5EC5B73D928CEBFCD8D647BA27A224D01D7FE
25,206,485 UART: [art] SIG.S = 175A36AC3829D4C4B57CA16FAF8471F76F23EA876FB40AA2372CD71DEC8E7AFEC4AA11F3DC666E883F8B4BED841F0403
26,185,026 UART: Caliptra RT
26,185,745 UART: [state] CFI Enabled
26,366,352 UART: [rt] RT listening for mailbox commands...
26,397,662 UART: [rt]cmd =0x43415053, len=4
26,399,348 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,479 UART:
192,847 UART: Running Caliptra ROM ...
194,057 UART:
603,597 UART: [state] CFI Enabled
618,915 UART: [state] LifecycleState = Unprovisioned
621,294 UART: [state] DebugLocked = No
622,693 UART: [state] WD Timer not started. Device not locked for debugging
626,606 UART: [kat] SHA2-256
816,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,286 UART: [kat] ++
827,889 UART: [kat] sha1
839,979 UART: [kat] SHA2-256
843,018 UART: [kat] SHA2-384
850,436 UART: [kat] SHA2-512-ACC
853,021 UART: [kat] ECC-384
3,293,691 UART: [kat] HMAC-384Kdf
3,306,562 UART: [kat] LMS
3,838,361 UART: [kat] --
3,842,519 UART: [cold-reset] ++
3,844,525 UART: [fht] FHT @ 0x50003400
3,857,211 UART: [idev] ++
3,857,930 UART: [idev] CDI.KEYID = 6
3,858,842 UART: [idev] SUBJECT.KEYID = 7
3,860,089 UART: [idev] UDS.KEYID = 0
3,861,021 ready_for_fw is high
3,861,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,066 UART: [idev] Erasing UDS.KEYID = 0
6,340,048 UART: [idev] Sha1 KeyId Algorithm
6,362,961 UART: [idev] --
6,368,096 UART: [ldev] ++
6,368,786 UART: [ldev] CDI.KEYID = 6
6,369,707 UART: [ldev] SUBJECT.KEYID = 5
6,370,872 UART: [ldev] AUTHORITY.KEYID = 7
6,372,105 UART: [ldev] FE.KEYID = 1
6,382,648 UART: [ldev] Erasing FE.KEYID = 1
8,858,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,309 UART: [ldev] --
10,649,978 UART: [fwproc] Wait for Commands...
10,652,458 UART: [fwproc] Recv command 0x46574c44
10,654,714 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,572 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,163 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,343 >>> mbox cmd response: success
14,916,441 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,920,032 UART: [afmc] ++
14,920,732 UART: [afmc] CDI.KEYID = 6
14,921,921 UART: [afmc] SUBJECT.KEYID = 7
14,923,418 UART: [afmc] AUTHORITY.KEYID = 5
17,430,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,152,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,154,366 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,169,466 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,184,634 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,199,554 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,223,730 UART: [afmc] --
19,227,618 UART: [cold-reset] --
19,230,954 UART: [state] Locking Datavault
19,235,244 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,448 UART: [state] Locking ICCM
19,238,793 UART: [exit] Launching FMC @ 0x40000130
19,247,471 UART:
19,247,707 UART: Running Caliptra FMC ...
19,248,817 UART:
19,248,977 UART: [state] CFI Enabled
19,256,700 UART: [fht] FMC Alias Private Key: 7
21,022,424 UART: [art] Extend RT PCRs Done
21,023,648 UART: [art] Lock RT PCRs Done
21,025,359 UART: [art] Populate DV Done
21,030,992 UART: [fht] FMC Alias Private Key: 7
21,032,489 UART: [art] Derive CDI
21,033,229 UART: [art] Store in slot 0x4
21,075,899 UART: [art] Derive Key Pair
21,076,903 UART: [art] Store priv key in slot 0x5
23,503,835 UART: [art] Derive Key Pair - Done
23,516,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,021 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,546 UART: [art] PUB.X = E3C9755F0866F0D985F85B660ADB0FC04B27BFF0D90A33DC07C28ED8FBA1C8D48C1A2A517474CCAE7F096698818C997D
25,231,817 UART: [art] PUB.Y = 6ED02652BA9127A6692C1388E4ED7D91A4C1B43A8AB89C264725B15C38446C5AE6AF29B1384CA809E2252CAE65756811
25,239,068 UART: [art] SIG.R = 14BF3AD428AA271921BAD24ADA83A71D6929621AD1507D58AD7CE49A54337C5B2FC07A52F727542CE999B02862F091DD
25,246,441 UART: [art] SIG.S = 3182173EB5C6E3E58405C5F3362E56069379A97F8F985EEC99A99C3C6D5E9850906A704C7B1FE0EA435C9E1C933E6332
26,225,548 UART: Caliptra RT
26,226,240 UART: [state] CFI Enabled
26,358,469 UART: [rt] RT listening for mailbox commands...
26,389,706 UART: [rt]cmd =0x43415053, len=4
26,391,424 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,756,975 ready_for_fw is high
3,757,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,073 >>> mbox cmd response: success
15,045,483 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,295,500 UART:
19,295,887 UART: Running Caliptra FMC ...
19,297,007 UART:
19,297,169 UART: [state] CFI Enabled
19,305,027 UART: [fht] FMC Alias Private Key: 7
21,071,102 UART: [art] Extend RT PCRs Done
21,072,344 UART: [art] Lock RT PCRs Done
21,073,843 UART: [art] Populate DV Done
21,079,008 UART: [fht] FMC Alias Private Key: 7
21,080,667 UART: [art] Derive CDI
21,081,413 UART: [art] Store in slot 0x4
21,124,469 UART: [art] Derive Key Pair
21,125,515 UART: [art] Store priv key in slot 0x5
23,552,559 UART: [art] Derive Key Pair - Done
23,565,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,516 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,043 UART: [art] PUB.X = B4B562AA02D0EE2FEF3C3943A1679A2C6137823A8BF34BFD770813F129F54668DF52E6B0F6B2F0674289A3F015742BB5
25,280,302 UART: [art] PUB.Y = A7A8EAD0E602292AAEC7389788A97ABBF6F0CBB15583C4F77F1CE6556C2754EACB26C5A5E9E8056F3566215CEA4FF498
25,287,563 UART: [art] SIG.R = 4764B1C88A619DA61A6E7C78B9F999E1FFB5875DEBE445E76B07A05D9710053470BAF763C6E0B91D0E86CFA5D70C96D6
25,294,965 UART: [art] SIG.S = 28284BEBE9F127A8CA68938413018767F5CF17D892DD325560AE93EE44328A798EDE52EE6E397F32811FD67043F82F5F
26,273,692 UART: Caliptra RT
26,274,415 UART: [state] CFI Enabled
26,407,170 UART: [rt] RT listening for mailbox commands...
26,438,326 UART: [rt]cmd =0x43415053, len=4
26,440,000 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
87,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,709 UART: [kat] SHA2-256
882,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,755 UART: [kat] ++
886,907 UART: [kat] sha1
891,113 UART: [kat] SHA2-256
893,051 UART: [kat] SHA2-384
895,814 UART: [kat] SHA2-512-ACC
897,715 UART: [kat] ECC-384
903,454 UART: [kat] HMAC-384Kdf
908,022 UART: [kat] LMS
1,476,218 UART: [kat] --
1,476,821 UART: [cold-reset] ++
1,477,363 UART: [fht] Storing FHT @ 0x50003400
1,480,090 UART: [idev] ++
1,480,258 UART: [idev] CDI.KEYID = 6
1,480,618 UART: [idev] SUBJECT.KEYID = 7
1,481,042 UART: [idev] UDS.KEYID = 0
1,481,387 ready_for_fw is high
1,481,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,850 UART: [idev] Erasing UDS.KEYID = 0
1,505,010 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,738 UART: [idev] --
1,514,827 UART: [ldev] ++
1,514,995 UART: [ldev] CDI.KEYID = 6
1,515,358 UART: [ldev] SUBJECT.KEYID = 5
1,515,784 UART: [ldev] AUTHORITY.KEYID = 7
1,516,247 UART: [ldev] FE.KEYID = 1
1,521,453 UART: [ldev] Erasing FE.KEYID = 1
1,546,912 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,216 UART: [ldev] --
1,586,695 UART: [fwproc] Waiting for Commands...
1,587,472 UART: [fwproc] Received command 0x46574c44
1,588,263 UART: [fwproc] Received Image of size 118548 bytes
2,933,507 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,739 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,957 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,174 >>> mbox cmd response: success
3,132,174 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,133,398 UART: [afmc] ++
3,133,566 UART: [afmc] CDI.KEYID = 6
3,133,928 UART: [afmc] SUBJECT.KEYID = 7
3,134,353 UART: [afmc] AUTHORITY.KEYID = 5
3,169,000 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,156 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,936 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,645 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,528 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,211 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,059 UART: [afmc] --
3,212,079 UART: [cold-reset] --
3,212,977 UART: [state] Locking Datavault
3,214,086 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,690 UART: [state] Locking ICCM
3,215,234 UART: [exit] Launching FMC @ 0x40000130
3,220,564 UART:
3,220,580 UART: Running Caliptra FMC ...
3,220,988 UART:
3,221,042 UART: [state] CFI Enabled
3,231,954 UART: [fht] FMC Alias Private Key: 7
3,350,464 UART: [art] Extend RT PCRs Done
3,350,892 UART: [art] Lock RT PCRs Done
3,352,332 UART: [art] Populate DV Done
3,360,555 UART: [fht] FMC Alias Private Key: 7
3,361,527 UART: [art] Derive CDI
3,361,807 UART: [art] Store in slot 0x4
3,447,431 UART: [art] Derive Key Pair
3,447,791 UART: [art] Store priv key in slot 0x5
3,461,690 UART: [art] Derive Key Pair - Done
3,476,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,000 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,765 UART: [art] PUB.X = A77EF2C47107E461948B0BC8AE5556C4A2BBF976802919B33BC116D920A2ABD99D89ADF3AFCF24DDE72483220B0E398D
3,499,535 UART: [art] PUB.Y = DF1699D9F5A6E18B3F53437D5FCBBCD2B0BBCDD5269E19A54CC314A4BCF4CEF17958DABF8AC566BDB2BFD8593E2CFA74
3,506,519 UART: [art] SIG.R = DFB7AE4C590461D87DD8DB1744ECFA948635929F88D68297D802733134E6710876ABEE58A703CEEA9AE363307D36A39D
3,513,281 UART: [art] SIG.S = C67E02580DB4D361EE4B54E2D1AB007012C51758234CE4E23CED7CC8264A520937CABD93F7048D58D4A1769824E28933
3,537,245 UART: Caliptra RT
3,537,496 UART: [state] CFI Enabled
3,657,731 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,507 UART: [rt]cmd =0x43415053, len=4
3,689,938 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,473 ready_for_fw is high
1,362,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,676 >>> mbox cmd response: success
2,981,676 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,043,051 UART:
3,043,067 UART: Running Caliptra FMC ...
3,043,475 UART:
3,043,529 UART: [state] CFI Enabled
3,053,909 UART: [fht] FMC Alias Private Key: 7
3,173,135 UART: [art] Extend RT PCRs Done
3,173,563 UART: [art] Lock RT PCRs Done
3,175,215 UART: [art] Populate DV Done
3,183,584 UART: [fht] FMC Alias Private Key: 7
3,184,718 UART: [art] Derive CDI
3,184,998 UART: [art] Store in slot 0x4
3,270,778 UART: [art] Derive Key Pair
3,271,138 UART: [art] Store priv key in slot 0x5
3,284,233 UART: [art] Derive Key Pair - Done
3,299,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,530 UART: [art] PUB.X = 3E59CD393EDF8A6FB2E3F95C002964484384391D66AA14BBBB3E7BB96C71986C6E8C070D4DFD57CE7FBAC2BB330850A0
3,322,285 UART: [art] PUB.Y = 62485B8C73CD8FC15BCF9B3112FB10BAFD1BD4F76359798453E5EA745DD8392D3B3E610DEEEAB6171C9A5CC7B75C0529
3,329,245 UART: [art] SIG.R = C7FA3E4E4E199DBCE72365ED2CB3144674A29C382E5C5CD72600F43EC13515930C6CE39057773551D42F551AB71E0C5C
3,335,991 UART: [art] SIG.S = 68E31912BE1EA7FC7CD4770B2B4CE69FB854DB958B2F85A5466154DF90B42DC0C9CBBE798D583E5C8328FD434AD70071
3,359,818 UART: Caliptra RT
3,360,069 UART: [state] CFI Enabled
3,480,833 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,353 UART: [rt]cmd =0x43415053, len=4
3,512,670 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,526 UART: [kat] SHA2-256
882,457 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,572 UART: [kat] ++
886,724 UART: [kat] sha1
890,986 UART: [kat] SHA2-256
892,924 UART: [kat] SHA2-384
895,677 UART: [kat] SHA2-512-ACC
897,578 UART: [kat] ECC-384
903,411 UART: [kat] HMAC-384Kdf
908,029 UART: [kat] LMS
1,476,225 UART: [kat] --
1,477,140 UART: [cold-reset] ++
1,477,484 UART: [fht] Storing FHT @ 0x50003400
1,480,233 UART: [idev] ++
1,480,401 UART: [idev] CDI.KEYID = 6
1,480,761 UART: [idev] SUBJECT.KEYID = 7
1,481,185 UART: [idev] UDS.KEYID = 0
1,481,530 ready_for_fw is high
1,481,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,073 UART: [idev] Erasing UDS.KEYID = 0
1,505,537 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,075 UART: [idev] --
1,515,188 UART: [ldev] ++
1,515,356 UART: [ldev] CDI.KEYID = 6
1,515,719 UART: [ldev] SUBJECT.KEYID = 5
1,516,145 UART: [ldev] AUTHORITY.KEYID = 7
1,516,608 UART: [ldev] FE.KEYID = 1
1,521,620 UART: [ldev] Erasing FE.KEYID = 1
1,547,081 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,889 UART: [ldev] --
1,586,320 UART: [fwproc] Waiting for Commands...
1,587,111 UART: [fwproc] Received command 0x46574c44
1,587,902 UART: [fwproc] Received Image of size 118548 bytes
2,933,320 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,686 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,333 >>> mbox cmd response: success
3,132,333 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,133,417 UART: [afmc] ++
3,133,585 UART: [afmc] CDI.KEYID = 6
3,133,947 UART: [afmc] SUBJECT.KEYID = 7
3,134,372 UART: [afmc] AUTHORITY.KEYID = 5
3,169,545 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,605 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,385 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,094 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,977 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,660 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,412 UART: [afmc] --
3,212,438 UART: [cold-reset] --
3,213,184 UART: [state] Locking Datavault
3,214,325 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,929 UART: [state] Locking ICCM
3,215,503 UART: [exit] Launching FMC @ 0x40000130
3,220,833 UART:
3,220,849 UART: Running Caliptra FMC ...
3,221,257 UART:
3,221,400 UART: [state] CFI Enabled
3,232,120 UART: [fht] FMC Alias Private Key: 7
3,350,496 UART: [art] Extend RT PCRs Done
3,350,924 UART: [art] Lock RT PCRs Done
3,352,654 UART: [art] Populate DV Done
3,361,005 UART: [fht] FMC Alias Private Key: 7
3,362,157 UART: [art] Derive CDI
3,362,437 UART: [art] Store in slot 0x4
3,448,623 UART: [art] Derive Key Pair
3,448,983 UART: [art] Store priv key in slot 0x5
3,462,704 UART: [art] Derive Key Pair - Done
3,477,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,871 UART: [art] PUB.X = 624BBFA444C9B71EFF7BB5542A37C108947EEBF44CA94B70E5424C1D32EAB0B3DDE32F93DBD255D3E8EE8A3A931CAC86
3,500,662 UART: [art] PUB.Y = 931E86ABFEF191B40D3EF5C765FF1EBE1EA0E3594553B02CFC46213D42D2999D9579D9E88F472DF45F18BED868E17289
3,507,619 UART: [art] SIG.R = 3B0489611913016440D9EB263E2BD604269065DFDFEDFD912FC3BFA2ADDE37EE14589668D3174429F1B9A3971B8F4B06
3,514,381 UART: [art] SIG.S = 693D4C55D6D1C8D5BCB68418C15EFDAF464397CE1861390A7A5B11886369A895DD97BAA36605282AD218E0914C4A1772
3,538,725 UART: Caliptra RT
3,539,068 UART: [state] CFI Enabled
3,659,357 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,025 UART: [rt]cmd =0x43415053, len=4
3,691,210 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,728 ready_for_fw is high
1,362,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,907 >>> mbox cmd response: success
2,980,907 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,042,230 UART:
3,042,246 UART: Running Caliptra FMC ...
3,042,654 UART:
3,042,797 UART: [state] CFI Enabled
3,053,471 UART: [fht] FMC Alias Private Key: 7
3,172,651 UART: [art] Extend RT PCRs Done
3,173,079 UART: [art] Lock RT PCRs Done
3,174,375 UART: [art] Populate DV Done
3,182,526 UART: [fht] FMC Alias Private Key: 7
3,183,564 UART: [art] Derive CDI
3,183,844 UART: [art] Store in slot 0x4
3,269,674 UART: [art] Derive Key Pair
3,270,034 UART: [art] Store priv key in slot 0x5
3,283,265 UART: [art] Derive Key Pair - Done
3,297,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,407 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,172 UART: [art] PUB.X = 8C98ACB121B9472662E25A2F024938BF8AEA601D9FE2A236B8751B9F00B3726D991095D06426BA1118399290F0CEB20E
3,320,912 UART: [art] PUB.Y = AD50D80C7C8CB8B6141C1DFD2533554FAF49549F6CAE13704901381F1B0FB4EAF52682548E3B9E87BDF3BB852CB7FEF0
3,327,869 UART: [art] SIG.R = FF9A2C99CB1F795F2706D252DE83A31AFDCB482B6F93FB989ACD36ACFC1B96E01E7E43BD4FE05CF90C892FA751D8C199
3,334,657 UART: [art] SIG.S = AD4333773E3BBCD0335344DA00E94389783A1597A94527B74253F35E10CE1BC7D9B8EAF4A5900064C487F3B74358C025
3,358,457 UART: Caliptra RT
3,358,800 UART: [state] CFI Enabled
3,479,055 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,693 UART: [rt]cmd =0x43415053, len=4
3,511,014 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,130 UART: [kat] ++
895,282 UART: [kat] sha1
899,444 UART: [kat] SHA2-256
901,384 UART: [kat] SHA2-384
904,095 UART: [kat] SHA2-512-ACC
905,996 UART: [kat] ECC-384
915,639 UART: [kat] HMAC-384Kdf
920,343 UART: [kat] LMS
1,168,655 UART: [kat] --
1,169,614 UART: [cold-reset] ++
1,170,126 UART: [fht] FHT @ 0x50003400
1,172,706 UART: [idev] ++
1,172,874 UART: [idev] CDI.KEYID = 6
1,173,235 UART: [idev] SUBJECT.KEYID = 7
1,173,660 UART: [idev] UDS.KEYID = 0
1,174,006 ready_for_fw is high
1,174,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,493 UART: [idev] Erasing UDS.KEYID = 0
1,198,229 UART: [idev] Sha1 KeyId Algorithm
1,207,289 UART: [idev] --
1,208,276 UART: [ldev] ++
1,208,444 UART: [ldev] CDI.KEYID = 6
1,208,808 UART: [ldev] SUBJECT.KEYID = 5
1,209,235 UART: [ldev] AUTHORITY.KEYID = 7
1,209,698 UART: [ldev] FE.KEYID = 1
1,214,912 UART: [ldev] Erasing FE.KEYID = 1
1,241,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,948 UART: [ldev] --
1,280,149 UART: [fwproc] Wait for Commands...
1,280,786 UART: [fwproc] Recv command 0x46574c44
1,281,519 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,695 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,870 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,205 >>> mbox cmd response: success
2,824,205 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,825,467 UART: [afmc] ++
2,825,635 UART: [afmc] CDI.KEYID = 6
2,825,998 UART: [afmc] SUBJECT.KEYID = 7
2,826,424 UART: [afmc] AUTHORITY.KEYID = 5
2,862,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,451 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,161 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,042 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,743 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,512 UART: [afmc] --
2,905,371 UART: [cold-reset] --
2,906,409 UART: [state] Locking Datavault
2,907,586 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,190 UART: [state] Locking ICCM
2,908,732 UART: [exit] Launching FMC @ 0x40000130
2,914,062 UART:
2,914,078 UART: Running Caliptra FMC ...
2,914,486 UART:
2,914,540 UART: [state] CFI Enabled
2,925,334 UART: [fht] FMC Alias Private Key: 7
3,044,692 UART: [art] Extend RT PCRs Done
3,045,120 UART: [art] Lock RT PCRs Done
3,046,538 UART: [art] Populate DV Done
3,054,599 UART: [fht] FMC Alias Private Key: 7
3,055,657 UART: [art] Derive CDI
3,055,937 UART: [art] Store in slot 0x4
3,141,798 UART: [art] Derive Key Pair
3,142,158 UART: [art] Store priv key in slot 0x5
3,155,710 UART: [art] Derive Key Pair - Done
3,170,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,020 UART: [art] PUB.X = 870BA480DD79A8844F672DA4DA399F99C01D9DBE996C72F6ABE1FBB187455DA77851E005AA749277F746AF960F0FAD31
3,192,788 UART: [art] PUB.Y = C598DAD3A9A028D1EA51561A91AD2DD214A6AEA9A26415312A34B41BB2657E5E5509DF08F9B34149EBDA733E899915F5
3,199,740 UART: [art] SIG.R = BBED4869A4CCB31B06C62AD73399CED1808EA851E48863B5B846E4BCA1DEEE8498C5EAA1307E679E191E8D020BA99452
3,206,515 UART: [art] SIG.S = 625D931A7AFE2D326783229770EDC8D4A308DC9DF8A51F4D97E841C5C9F4530C73F90ACEFBF329B1091EBBFC0E5C616C
3,229,506 UART: Caliptra RT
3,229,757 UART: [state] CFI Enabled
3,348,732 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,082 UART: [rt]cmd =0x43415053, len=4
3,380,523 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,158 ready_for_fw is high
1,058,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,050 >>> mbox cmd response: success
2,675,050 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,736,621 UART:
2,736,637 UART: Running Caliptra FMC ...
2,737,045 UART:
2,737,099 UART: [state] CFI Enabled
2,747,251 UART: [fht] FMC Alias Private Key: 7
2,866,983 UART: [art] Extend RT PCRs Done
2,867,411 UART: [art] Lock RT PCRs Done
2,868,959 UART: [art] Populate DV Done
2,877,006 UART: [fht] FMC Alias Private Key: 7
2,877,988 UART: [art] Derive CDI
2,878,268 UART: [art] Store in slot 0x4
2,964,501 UART: [art] Derive Key Pair
2,964,861 UART: [art] Store priv key in slot 0x5
2,977,885 UART: [art] Derive Key Pair - Done
2,992,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,038 UART: [art] PUB.X = 57B635E788FF2FC1FDC54C47B854120E03130FD71E0802E9F177C9E413B0E86919537C5746E0F351BF347F40AB4C1779
3,015,791 UART: [art] PUB.Y = 05B14565AC9ACCDDD18BF03AD97496D1ED8E73202B440A2B208A08C7BE3BC2BC786F4D246264344BB37EC8F073BCE477
3,022,746 UART: [art] SIG.R = 9440F3CE81C6C67EF4D69F1BDD46D155D3CB7C48BAE5295DBC15E03D25C1C6EB6003DE8EF1285C9E2CAF6DD0CD847F13
3,029,537 UART: [art] SIG.S = A2D457C9B8642B70D54C47B9FBF5C9BA20A290394824C21623B60514CB3DC6C286019F821D9AA06F57BFD54C107F752A
3,053,437 UART: Caliptra RT
3,053,688 UART: [state] CFI Enabled
3,172,982 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,476 UART: [rt]cmd =0x43415053, len=4
3,204,763 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
900,159 UART: [kat] SHA2-256
902,099 UART: [kat] SHA2-384
904,720 UART: [kat] SHA2-512-ACC
906,621 UART: [kat] ECC-384
916,606 UART: [kat] HMAC-384Kdf
921,186 UART: [kat] LMS
1,169,498 UART: [kat] --
1,170,647 UART: [cold-reset] ++
1,171,009 UART: [fht] FHT @ 0x50003400
1,173,587 UART: [idev] ++
1,173,755 UART: [idev] CDI.KEYID = 6
1,174,116 UART: [idev] SUBJECT.KEYID = 7
1,174,541 UART: [idev] UDS.KEYID = 0
1,174,887 ready_for_fw is high
1,174,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,466 UART: [idev] Erasing UDS.KEYID = 0
1,199,732 UART: [idev] Sha1 KeyId Algorithm
1,208,526 UART: [idev] --
1,209,629 UART: [ldev] ++
1,209,797 UART: [ldev] CDI.KEYID = 6
1,210,161 UART: [ldev] SUBJECT.KEYID = 5
1,210,588 UART: [ldev] AUTHORITY.KEYID = 7
1,211,051 UART: [ldev] FE.KEYID = 1
1,216,501 UART: [ldev] Erasing FE.KEYID = 1
1,243,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,417 UART: [ldev] --
1,282,734 UART: [fwproc] Wait for Commands...
1,283,347 UART: [fwproc] Recv command 0x46574c44
1,284,080 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,212 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,387 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,590 >>> mbox cmd response: success
2,825,590 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,826,718 UART: [afmc] ++
2,826,886 UART: [afmc] CDI.KEYID = 6
2,827,249 UART: [afmc] SUBJECT.KEYID = 7
2,827,675 UART: [afmc] AUTHORITY.KEYID = 5
2,863,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,402 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,112 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,993 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,694 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,487 UART: [afmc] --
2,906,496 UART: [cold-reset] --
2,907,310 UART: [state] Locking Datavault
2,908,477 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,081 UART: [state] Locking ICCM
2,909,515 UART: [exit] Launching FMC @ 0x40000130
2,914,845 UART:
2,914,861 UART: Running Caliptra FMC ...
2,915,269 UART:
2,915,412 UART: [state] CFI Enabled
2,925,664 UART: [fht] FMC Alias Private Key: 7
3,045,348 UART: [art] Extend RT PCRs Done
3,045,776 UART: [art] Lock RT PCRs Done
3,047,820 UART: [art] Populate DV Done
3,056,049 UART: [fht] FMC Alias Private Key: 7
3,057,193 UART: [art] Derive CDI
3,057,473 UART: [art] Store in slot 0x4
3,143,184 UART: [art] Derive Key Pair
3,143,544 UART: [art] Store priv key in slot 0x5
3,157,260 UART: [art] Derive Key Pair - Done
3,171,838 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,190 UART: [art] PUB.X = DA75298B008B9CAD4E05E1CB366B7D899F57F37B852B969B0AE8F2BDF1A8A852693CBE33FEED88C69FFCCDFADFE9515A
3,194,960 UART: [art] PUB.Y = 0A389C84F96EB056404B5066B815DED4C2D577D096F8643128C7F2B5E7F2F7BC2C10F6E63C73E6E995E2E6483461F23C
3,201,909 UART: [art] SIG.R = 31D7E6198D0E54A258D7F9CA83E9169C120C346407F9462D15E8FAE2F8C3607DA3FCC5DB696836EDF3EF11C5BD219A91
3,208,680 UART: [art] SIG.S = 630250670F011D1645B41F2E26926BC1AFBD503217A32DBC4EAC5097926D24C50C63589DBB7AF9BBEF5C71DA590F0A88
3,232,500 UART: Caliptra RT
3,232,843 UART: [state] CFI Enabled
3,353,113 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,403 UART: [rt]cmd =0x43415053, len=4
3,384,734 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,341 ready_for_fw is high
1,059,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,239 >>> mbox cmd response: success
2,679,239 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,741,400 UART:
2,741,416 UART: Running Caliptra FMC ...
2,741,824 UART:
2,741,967 UART: [state] CFI Enabled
2,752,603 UART: [fht] FMC Alias Private Key: 7
2,871,407 UART: [art] Extend RT PCRs Done
2,871,835 UART: [art] Lock RT PCRs Done
2,873,381 UART: [art] Populate DV Done
2,881,856 UART: [fht] FMC Alias Private Key: 7
2,882,948 UART: [art] Derive CDI
2,883,228 UART: [art] Store in slot 0x4
2,969,135 UART: [art] Derive Key Pair
2,969,495 UART: [art] Store priv key in slot 0x5
2,983,303 UART: [art] Derive Key Pair - Done
2,998,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,996 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,761 UART: [art] PUB.X = 41CC5F3FFA8F37BDFEA4261F7D51F9FBA151340D3A42607AFAB415DBD19D15EDCD92398A27E35F36CA461B40418F4A47
3,021,546 UART: [art] PUB.Y = ACB1BBCC935BBBF881C38E324678E54C7BF6BB3256B1FB6277875757730B51D29B4A62D5A17902F07D0A1B16773B0425
3,028,488 UART: [art] SIG.R = 983B3B8E82D08ED703E55AA3C90CBB0FB53874567EF85D0AFDDE88278E0C99225F3E862E9714C18C83AB29F1B9A278CE
3,035,255 UART: [art] SIG.S = 9D7DF4A1BBCD3B67330F467C976FF792FE5A79F1D0517A82753A0F3366ED88ABE1F03870B6067F4E3D355EBA2FCCC9AA
3,058,948 UART: Caliptra RT
3,059,291 UART: [state] CFI Enabled
3,178,983 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,291 UART: [rt]cmd =0x43415053, len=4
3,210,480 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,501 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
892,906 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,031 UART: [kat] ++
897,183 UART: [kat] sha1
901,387 UART: [kat] SHA2-256
903,327 UART: [kat] SHA2-384
906,124 UART: [kat] SHA2-512-ACC
908,025 UART: [kat] ECC-384
917,758 UART: [kat] HMAC-384Kdf
922,378 UART: [kat] LMS
1,170,706 UART: [kat] --
1,171,681 UART: [cold-reset] ++
1,172,213 UART: [fht] FHT @ 0x50003400
1,174,800 UART: [idev] ++
1,174,968 UART: [idev] CDI.KEYID = 6
1,175,328 UART: [idev] SUBJECT.KEYID = 7
1,175,752 UART: [idev] UDS.KEYID = 0
1,176,097 ready_for_fw is high
1,176,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,778 UART: [idev] Erasing UDS.KEYID = 0
1,200,309 UART: [idev] Sha1 KeyId Algorithm
1,208,669 UART: [idev] --
1,209,893 UART: [ldev] ++
1,210,061 UART: [ldev] CDI.KEYID = 6
1,210,424 UART: [ldev] SUBJECT.KEYID = 5
1,210,850 UART: [ldev] AUTHORITY.KEYID = 7
1,211,313 UART: [ldev] FE.KEYID = 1
1,216,575 UART: [ldev] Erasing FE.KEYID = 1
1,243,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,439 UART: [ldev] --
1,282,930 UART: [fwproc] Wait for Commands...
1,283,694 UART: [fwproc] Recv command 0x46574c44
1,284,422 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,564 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,734 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,049 >>> mbox cmd response: success
2,828,049 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,829,251 UART: [afmc] ++
2,829,419 UART: [afmc] CDI.KEYID = 6
2,829,781 UART: [afmc] SUBJECT.KEYID = 7
2,830,206 UART: [afmc] AUTHORITY.KEYID = 5
2,865,539 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,936 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,684 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,393 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,276 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,977 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,877 UART: [afmc] --
2,908,911 UART: [cold-reset] --
2,909,497 UART: [state] Locking Datavault
2,910,574 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,178 UART: [state] Locking ICCM
2,911,824 UART: [exit] Launching FMC @ 0x40000130
2,917,154 UART:
2,917,170 UART: Running Caliptra FMC ...
2,917,578 UART:
2,917,632 UART: [state] CFI Enabled
2,928,064 UART: [fht] FMC Alias Private Key: 7
3,046,652 UART: [art] Extend RT PCRs Done
3,047,080 UART: [art] Lock RT PCRs Done
3,048,686 UART: [art] Populate DV Done
3,056,927 UART: [fht] FMC Alias Private Key: 7
3,057,867 UART: [art] Derive CDI
3,058,147 UART: [art] Store in slot 0x4
3,143,680 UART: [art] Derive Key Pair
3,144,040 UART: [art] Store priv key in slot 0x5
3,157,072 UART: [art] Derive Key Pair - Done
3,171,838 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,029 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,794 UART: [art] PUB.X = E7FE9D7C369F380CEAA2F9C036F47AD2AABF3CADF87D31F717D38BEAD863DF5DD1AC7E62B476AA4A90377B4150F69435
3,194,585 UART: [art] PUB.Y = FB5CCBB6DB7B48727435FDB2233E824064C9AD62721B703773281C32C1F3301AE65EBBDFADF909BE180FCD20E1CECF65
3,201,547 UART: [art] SIG.R = B93F58D26A71FDFB2C77FF01A4AD4C928903506122207C727FD19C2254AF945B008453C3F9045C5EB873ED846FEC6C6E
3,208,292 UART: [art] SIG.S = 2CE4B5AF8B3179EBA5213F6B6E9DFA93D0B921415E3A3CD1230D1F06C0BC3C7BBA9D4487D2BD319A8BAC34D08FC5B16E
3,232,948 UART: Caliptra RT
3,233,199 UART: [state] CFI Enabled
3,353,106 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,944 UART: [rt]cmd =0x43415053, len=4
3,385,275 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,971 ready_for_fw is high
1,059,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,110 >>> mbox cmd response: success
2,677,110 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,739,561 UART:
2,739,577 UART: Running Caliptra FMC ...
2,739,985 UART:
2,740,039 UART: [state] CFI Enabled
2,750,463 UART: [fht] FMC Alias Private Key: 7
2,869,209 UART: [art] Extend RT PCRs Done
2,869,637 UART: [art] Lock RT PCRs Done
2,871,033 UART: [art] Populate DV Done
2,879,210 UART: [fht] FMC Alias Private Key: 7
2,880,296 UART: [art] Derive CDI
2,880,576 UART: [art] Store in slot 0x4
2,966,433 UART: [art] Derive Key Pair
2,966,793 UART: [art] Store priv key in slot 0x5
2,979,765 UART: [art] Derive Key Pair - Done
2,994,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,686 UART: [art] PUB.X = C5F98FE8F5871C5230004336C76D239028CBDB14310FD8AAF196D05E039C6460D531A1A26C48C2AB8C9582F18A616B17
3,017,428 UART: [art] PUB.Y = F13F85F23B72FFBC4879617A046CA803398B6B6FB4B262C77162CA36BB3EF0F5A37627AD86524E8665621E095AB0B2E2
3,024,373 UART: [art] SIG.R = 6DA4B76DA933EFA277B62B37FD47FADB2DE1A64BDBFFCF53E91772EEE15578FE45069539C89C9A26B11E45AD98853620
3,031,156 UART: [art] SIG.S = 827DE94653D92A978FB29C1BAE8C61D425B1C517FCD97498BE51C5FF7EA16FAB4446337FF52FE9EC07EC24A30DA2D125
3,055,084 UART: Caliptra RT
3,055,335 UART: [state] CFI Enabled
3,174,410 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,784 UART: [rt]cmd =0x43415053, len=4
3,205,979 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
893,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,526 UART: [kat] ++
897,678 UART: [kat] sha1
902,020 UART: [kat] SHA2-256
903,960 UART: [kat] SHA2-384
906,665 UART: [kat] SHA2-512-ACC
908,566 UART: [kat] ECC-384
918,483 UART: [kat] HMAC-384Kdf
923,021 UART: [kat] LMS
1,171,349 UART: [kat] --
1,172,156 UART: [cold-reset] ++
1,172,482 UART: [fht] FHT @ 0x50003400
1,175,297 UART: [idev] ++
1,175,465 UART: [idev] CDI.KEYID = 6
1,175,825 UART: [idev] SUBJECT.KEYID = 7
1,176,249 UART: [idev] UDS.KEYID = 0
1,176,594 ready_for_fw is high
1,176,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,971 UART: [idev] Erasing UDS.KEYID = 0
1,200,986 UART: [idev] Sha1 KeyId Algorithm
1,209,676 UART: [idev] --
1,210,700 UART: [ldev] ++
1,210,868 UART: [ldev] CDI.KEYID = 6
1,211,231 UART: [ldev] SUBJECT.KEYID = 5
1,211,657 UART: [ldev] AUTHORITY.KEYID = 7
1,212,120 UART: [ldev] FE.KEYID = 1
1,217,252 UART: [ldev] Erasing FE.KEYID = 1
1,243,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,450 UART: [ldev] --
1,282,813 UART: [fwproc] Wait for Commands...
1,283,443 UART: [fwproc] Recv command 0x46574c44
1,284,171 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,178 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,348 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,567 >>> mbox cmd response: success
2,826,567 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,827,739 UART: [afmc] ++
2,827,907 UART: [afmc] CDI.KEYID = 6
2,828,269 UART: [afmc] SUBJECT.KEYID = 7
2,828,694 UART: [afmc] AUTHORITY.KEYID = 5
2,864,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,786 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,534 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,243 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,126 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,827 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,517 UART: [afmc] --
2,907,495 UART: [cold-reset] --
2,908,283 UART: [state] Locking Datavault
2,909,520 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,124 UART: [state] Locking ICCM
2,910,692 UART: [exit] Launching FMC @ 0x40000130
2,916,022 UART:
2,916,038 UART: Running Caliptra FMC ...
2,916,446 UART:
2,916,589 UART: [state] CFI Enabled
2,927,291 UART: [fht] FMC Alias Private Key: 7
3,046,743 UART: [art] Extend RT PCRs Done
3,047,171 UART: [art] Lock RT PCRs Done
3,048,873 UART: [art] Populate DV Done
3,056,970 UART: [fht] FMC Alias Private Key: 7
3,057,934 UART: [art] Derive CDI
3,058,214 UART: [art] Store in slot 0x4
3,143,923 UART: [art] Derive Key Pair
3,144,283 UART: [art] Store priv key in slot 0x5
3,157,275 UART: [art] Derive Key Pair - Done
3,171,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,188 UART: [art] PUB.X = 81D0CED5932F276446F918A6C314A3FE9063AD3FECA2392C037F5CBD6746801B1C37DA56FE8649A50ACC9FE98A026BCF
3,194,963 UART: [art] PUB.Y = CA1FB4E85DE962155FC73D313ACBDF76F6BE7974D4BF64F80BFC22C0863A8A539E0507F5C5B22D4EA89496A143C35B13
3,201,918 UART: [art] SIG.R = 1A9AC7BC9240A39EFE83AF4A1191F771D99AC66CC40949E958EE8B42F562DB2FCC42B50CC85EDEE78AA1819826BA48A5
3,208,700 UART: [art] SIG.S = 45C9FFE9070BDDA9D44813156E50A6DB196349DB9AFE26B641ABA4024AE1D190A43AC611A2D981356F2F2D17E3DE92D9
3,232,813 UART: Caliptra RT
3,233,156 UART: [state] CFI Enabled
3,354,208 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,484 UART: [rt]cmd =0x43415053, len=4
3,385,631 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,340 ready_for_fw is high
1,060,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,839 >>> mbox cmd response: success
2,681,839 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,742,860 UART:
2,742,876 UART: Running Caliptra FMC ...
2,743,284 UART:
2,743,427 UART: [state] CFI Enabled
2,754,115 UART: [fht] FMC Alias Private Key: 7
2,873,027 UART: [art] Extend RT PCRs Done
2,873,455 UART: [art] Lock RT PCRs Done
2,874,663 UART: [art] Populate DV Done
2,882,614 UART: [fht] FMC Alias Private Key: 7
2,883,780 UART: [art] Derive CDI
2,884,060 UART: [art] Store in slot 0x4
2,970,161 UART: [art] Derive Key Pair
2,970,521 UART: [art] Store priv key in slot 0x5
2,984,215 UART: [art] Derive Key Pair - Done
2,999,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,250 UART: [art] PUB.X = 676940D0E5E3D43B868838D80F8C7B0A9D87CD2D462EB972F50173D7509C952734F5589DEA7E4C7BF8B04BAD88D58C13
3,022,015 UART: [art] PUB.Y = 4D84E459B2EEE25D6066BB793E0E4C31BE29E30A1E3FFE1156E7E2E60990EB9A2EBDC7588BB25560E3A7C510032A399E
3,028,965 UART: [art] SIG.R = B70C35E34680B6129185295F7F4EC0A777D0952E65D0349F6F454E4B10B9ADFA9897C7E3B7C45C361F2788DF420C83F2
3,035,729 UART: [art] SIG.S = B758C953183CCC77EBACEFAEA18C0735441F097B2118C401112406ADB9BAF49DC91138C57F6ECADE0DFCEDDE9580FC02
3,059,273 UART: Caliptra RT
3,059,616 UART: [state] CFI Enabled
3,178,960 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,130 UART: [rt]cmd =0x43415053, len=4
3,210,279 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
Truncated 1664 bytes from beginning
7,321,991 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,345 UART: [idev] --
7,347,319 UART: [ldev] ++
7,347,898 UART: [ldev] CDI.KEYID = 6
7,348,807 UART: [ldev] SUBJECT.KEYID = 5
7,350,026 UART: [ldev] AUTHORITY.KEYID = 7
7,351,324 UART: [ldev] FE.KEYID = 1
7,380,281 UART: [ldev] Erasing FE.KEYID = 1
10,714,487 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,051 UART: [ldev] --
13,096,452 UART: [fwproc] Waiting for Commands...
13,099,078 UART: [fwproc] Received command 0x46574c44
13,101,314 UART: [fwproc] Received Image of size 118548 bytes
17,202,567 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,271,641 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,344,874 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,672,610 >>> mbox cmd response: success
17,673,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,676,000 UART: [afmc] ++
17,676,596 UART: [afmc] CDI.KEYID = 6
17,677,500 UART: [afmc] SUBJECT.KEYID = 7
17,678,775 UART: [afmc] AUTHORITY.KEYID = 5
21,052,202 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,353,173 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,355,433 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
23,370,031 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
23,384,887 UART: [afmc] SIG.R = E21B3E2F88872E28E080554D658AD7E626F9FEED98F63A03BBD7CF380CFE29BD7402877A3E435E89E93AD42D1668D374
23,399,257 UART: [afmc] SIG.S = C260A0FF06FACF46D92E1C7E317797ECC51DB2B0AC539D860ED47B7266E741A3AE4C5F92187DEFE45611AD41FCFCF319
23,421,036 UART: [afmc] --
23,425,105 UART: [cold-reset] --
23,428,699 UART: [state] Locking Datavault
23,434,592 UART: [state] Locking PCR0, PCR1 and PCR31
23,436,352 UART: [state] Locking ICCM
23,437,504 UART: [exit] Launching FMC @ 0x40000130
23,445,900 UART:
23,446,132 UART: Running Caliptra FMC ...
23,447,248 UART:
23,447,408 UART: [state] CFI Enabled
23,511,788 UART: [fht] FMC Alias Private Key: 7
25,851,827 UART: [art] Extend RT PCRs Done
25,853,056 UART: [art] Lock RT PCRs Done
25,854,443 UART: [art] Populate DV Done
25,859,751 UART: [fht] FMC Alias Private Key: 7
25,861,232 UART: [art] Derive CDI
25,861,967 UART: [art] Store in slot 0x4
25,920,741 UART: [art] Derive Key Pair
25,921,783 UART: [art] Store priv key in slot 0x5
29,214,461 UART: [art] Derive Key Pair - Done
29,227,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,516,581 UART: [art] Erasing AUTHORITY.KEYID = 7
31,518,094 UART: [art] PUB.X = 02231582C1D3C4E8A9254046B1A0D7FC77D308D1B9AF6E079B1C14C34AED3E9E1B9CE4CA391250686626E1DEBC1DD79E
31,525,365 UART: [art] PUB.Y = 4695E0D98D5976864D5823DA8CF1AB4DE7815122996096543555C751DA45C5AF9201C6FC2E22ABEB842F689CB539D725
31,532,637 UART: [art] SIG.R = 3FF70A86D575B4A0687787BE0306966BB2423FE77C5E61FE7CB9F4423D01782537B91FE91B7C9B2684AAAEA07A680FE8
31,539,993 UART: [art] SIG.S = 12A7F35A7C43A887697D6A7AC3A270FAC7A9EF8C677CD7BA8B94065FD0CCB708A86BF61FCA7271C8BF0E5476D20AD4AE
32,844,957 UART: Caliptra RT
32,845,693 UART: [state] CFI Enabled
33,022,314 UART: [rt] RT listening for mailbox commands...
33,053,586 UART: [rt]cmd =0x494e464f, len=4
33,057,718 >>> mbox cmd response data (312 bytes)
35,135,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,286,272 UART:
35,286,674 UART: Running Caliptra ROM ...
35,287,740 UART:
35,287,893 UART: [state] CFI Enabled
35,359,321 UART: [state] LifecycleState = Unprovisioned
35,361,262 UART: [state] DebugLocked = No
35,362,791 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,368,131 UART: [kat] SHA2-256
35,537,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,548,370 UART: [kat] ++
35,548,829 UART: [kat] sha1
35,561,609 UART: [kat] SHA2-256
35,564,301 UART: [kat] SHA2-384
35,569,310 UART: [kat] SHA2-512-ACC
35,571,660 UART: [kat] ECC-384
37,860,880 UART: [kat] HMAC-384Kdf
37,892,179 UART: [kat] LMS
39,082,498 UART: [kat] --
39,087,673 UART: [update-reset] ++
43,280,271 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,284,427 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,682,194 >>> mbox cmd response: success
43,682,586 UART: [update-reset] Copying MAN_2 To MAN_1
43,704,871 UART: [update-reset Success] --
43,710,132 UART: [state] Locking Datavault
43,713,001 UART: [state] Locking PCR0, PCR1 and PCR31
43,714,712 UART: [state] Locking ICCM
43,717,293 UART: [exit] Launching FMC @ 0x40000130
43,725,689 UART:
43,725,919 UART: Running Caliptra FMC ...
43,727,020 UART:
43,727,179 UART: [state] CFI Enabled
43,833,585 UART: [art] Extend RT PCRs Done
43,834,797 UART: [art] Lock RT PCRs Done
43,836,252 UART: [art] Populate DV Done
43,841,712 UART: [fht] FMC Alias Private Key: 7
43,843,416 UART: [art] Derive CDI
43,844,308 UART: [art] Store in slot 0x4
43,902,479 UART: [art] Derive Key Pair
43,903,522 UART: [art] Store priv key in slot 0x5
47,196,175 UART: [art] Derive Key Pair - Done
47,209,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,496,970 UART: [art] Erasing AUTHORITY.KEYID = 7
49,498,484 UART: [art] PUB.X = E1BE1A57C91B152767B4C9935660190CBA0E65DFB153046203C8E03CD28133F33639334543A7E2CBB26ABCA3A87AF8B3
49,505,802 UART: [art] PUB.Y = 59A2E10E313C8441CAF1EEAD8657CCB61D03C80F25C33AD540546D0C07775F3E1FB952083BD2FEF357DBE51DC1471F83
49,513,015 UART: [art] SIG.R = 441D0682633631C39AF5B14BFA159226B481DD2F1C621C7FAFDE3C582BF459F349158B70CB05881993CD67E9292D7428
49,520,388 UART: [art] SIG.S = 9BCF048996261B3E0A24BC02603977F467FFE04CE327A1F2E1547529754C0B5149DC9FCED16674D754F680E53D531BDD
50,825,752 UART: Caliptra RT
50,826,463 UART: [state] CFI Enabled
51,263,539 UART: [rt] RT listening for mailbox commands...
51,265,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,295,135 UART: [rt]cmd =0x494e464f, len=4
51,299,573 >>> mbox cmd response data (312 bytes)
53,374,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
53,525,076 UART:
53,525,461 UART: Running Caliptra ROM ...
53,526,510 UART:
53,526,659 UART: [state] CFI Enabled
53,590,419 UART: [state] LifecycleState = Unprovisioned
53,592,363 UART: [state] DebugLocked = No
53,593,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
53,599,439 UART: [kat] SHA2-256
53,769,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,779,616 UART: [kat] ++
53,780,274 UART: [kat] sha1
53,791,708 UART: [kat] SHA2-256
53,794,396 UART: [kat] SHA2-384
53,799,134 UART: [kat] SHA2-512-ACC
53,801,479 UART: [kat] ECC-384
56,094,743 UART: [kat] HMAC-384Kdf
56,127,290 UART: [kat] LMS
57,317,635 UART: [kat] --
57,323,455 UART: [update-reset] ++
61,517,301 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,521,208 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
61,918,899 >>> mbox cmd response: success
61,920,603 UART: [update-reset] Copying MAN_2 To MAN_1
61,943,014 UART: [update-reset Success] --
61,947,369 UART: [state] Locking Datavault
61,950,794 UART: [state] Locking PCR0, PCR1 and PCR31
61,952,498 UART: [state] Locking ICCM
61,954,166 UART: [exit] Launching FMC @ 0x40000130
61,962,621 UART:
61,962,864 UART: Running Caliptra FMC ...
61,963,962 UART:
61,964,120 UART: [state] CFI Enabled
62,069,503 UART: [art] Extend RT PCRs Done
62,070,704 UART: [art] Lock RT PCRs Done
62,071,787 UART: [art] Populate DV Done
62,077,197 UART: [fht] FMC Alias Private Key: 7
62,078,841 UART: [art] Derive CDI
62,079,655 UART: [art] Store in slot 0x4
62,138,209 UART: [art] Derive Key Pair
62,139,528 UART: [art] Store priv key in slot 0x5
65,432,120 UART: [art] Derive Key Pair - Done
65,445,406 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,732,304 UART: [art] Erasing AUTHORITY.KEYID = 7
67,733,823 UART: [art] PUB.X = A676D8BC4B05E1D5456440D529B75602352AC9BFD5F47E8CC55F09ED6AE3AD923B11FA5162AD5A66003F763A797C0076
67,741,124 UART: [art] PUB.Y = 66477900A6A7F6FD7440C4054AF7B5D4FAF35839A5A796085FB5CE6CD1F2C3416FDC551E8269B6113AD494E3147673F7
67,748,287 UART: [art] SIG.R = E0862B3FE68E7644E42101997B52DB9EA226307929066BF41C787E21184B8C014C77CA05106B1C62B70E123F925241B2
67,755,648 UART: [art] SIG.S = 5F5BA81418548630C3927FA3D75738403AC6245C4112BE7BB5B892212234A0C714FDA2FDE65D3671E04C6E151A284AFF
69,061,180 UART: Caliptra RT
69,061,877 UART: [state] CFI Enabled
69,499,407 UART: [rt] RT listening for mailbox commands...
69,501,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,531,164 UART: [rt]cmd =0x494e464f, len=4
69,535,390 >>> mbox cmd response data (312 bytes)
69,537,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
69,687,241 UART:
69,687,580 UART: Running Caliptra ROM ...
69,688,630 UART:
69,688,781 UART: [state] CFI Enabled
69,756,153 UART: [state] LifecycleState = Unprovisioned
69,758,089 UART: [state] DebugLocked = No
69,760,216 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
69,765,017 UART: [kat] SHA2-256
69,934,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
69,945,192 UART: [kat] ++
69,945,684 UART: [kat] sha1
69,957,764 UART: [kat] SHA2-256
69,960,472 UART: [kat] SHA2-384
69,966,027 UART: [kat] SHA2-512-ACC
69,968,378 UART: [kat] ECC-384
72,261,175 UART: [kat] HMAC-384Kdf
72,291,988 UART: [kat] LMS
73,482,300 UART: [kat] --
73,486,218 UART: [update-reset] ++
77,681,633 UART: [update-reset] Image verified using Vendor ECC Key Index 0
77,685,318 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
78,083,047 >>> mbox cmd response: success
78,084,463 UART: [update-reset] Copying MAN_2 To MAN_1
78,106,874 UART: [update-reset Success] --
78,112,614 UART: [state] Locking Datavault
78,115,218 UART: [state] Locking PCR0, PCR1 and PCR31
78,116,973 UART: [state] Locking ICCM
78,118,074 UART: [exit] Launching FMC @ 0x40000130
78,126,471 UART:
78,126,701 UART: Running Caliptra FMC ...
78,127,803 UART:
78,127,958 UART: [state] CFI Enabled
78,235,455 UART: [art] Extend RT PCRs Done
78,236,668 UART: [art] Lock RT PCRs Done
78,238,071 UART: [art] Populate DV Done
78,243,645 UART: [fht] FMC Alias Private Key: 7
78,245,346 UART: [art] Derive CDI
78,246,159 UART: [art] Store in slot 0x4
78,304,654 UART: [art] Derive Key Pair
78,305,687 UART: [art] Store priv key in slot 0x5
81,598,030 UART: [art] Derive Key Pair - Done
81,611,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
83,901,299 UART: [art] Erasing AUTHORITY.KEYID = 7
83,902,813 UART: [art] PUB.X = E1BE1A57C91B152767B4C9935660190CBA0E65DFB153046203C8E03CD28133F33639334543A7E2CBB26ABCA3A87AF8B3
83,910,029 UART: [art] PUB.Y = 59A2E10E313C8441CAF1EEAD8657CCB61D03C80F25C33AD540546D0C07775F3E1FB952083BD2FEF357DBE51DC1471F83
83,917,338 UART: [art] SIG.R = 441D0682633631C39AF5B14BFA159226B481DD2F1C621C7FAFDE3C582BF459F349158B70CB05881993CD67E9292D7428
83,924,694 UART: [art] SIG.S = 9BCF048996261B3E0A24BC02603977F467FFE04CE327A1F2E1547529754C0B5149DC9FCED16674D754F680E53D531BDD
85,230,152 UART: Caliptra RT
85,230,929 UART: [state] CFI Enabled
85,647,505 UART: [rt] RT listening for mailbox commands...
85,649,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,679,210 UART: [rt]cmd =0x494e464f, len=4
85,683,716 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,807,135 ready_for_fw is high
3,807,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,957,197 >>> mbox cmd response: success
17,958,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,652,949 UART:
23,653,381 UART: Running Caliptra FMC ...
23,654,492 UART:
23,654,652 UART: [state] CFI Enabled
23,718,991 UART: [fht] FMC Alias Private Key: 7
26,059,286 UART: [art] Extend RT PCRs Done
26,060,511 UART: [art] Lock RT PCRs Done
26,061,988 UART: [art] Populate DV Done
26,067,473 UART: [fht] FMC Alias Private Key: 7
26,069,120 UART: [art] Derive CDI
26,069,936 UART: [art] Store in slot 0x4
26,126,808 UART: [art] Derive Key Pair
26,127,850 UART: [art] Store priv key in slot 0x5
29,420,044 UART: [art] Derive Key Pair - Done
29,432,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,721,275 UART: [art] Erasing AUTHORITY.KEYID = 7
31,722,789 UART: [art] PUB.X = 11B7C6E8ED063FD45CEF593DF2777B7F8124B99A56DF78671A847137300FCF8FAFC345F8E0207E33D415953ED392D7A7
31,729,999 UART: [art] PUB.Y = ED9AEBAEB2006195215B0B6C8FB9D3711ADE10A5ABE4908F311344621C4D7977F203344A8149C939396D27371CA713C4
31,737,258 UART: [art] SIG.R = 01C00BE8AA02CF1013B0ACBE351E2A0C290E8DFD84B48EC2D6881482AC74CDBD52FD7DB0712322DAA129D4230D6D92CB
31,744,661 UART: [art] SIG.S = E242885C5D43E4089F0BD5B0FBE59E9C360BF6CECE64401320F722EE434E2FF0F9CE04434C1F208B1ADE11163CE0E1F0
33,050,114 UART: Caliptra RT
33,050,854 UART: [state] CFI Enabled
33,246,077 UART: [rt] RT listening for mailbox commands...
33,277,230 UART: [rt]cmd =0x494e464f, len=4
33,281,617 >>> mbox cmd response data (312 bytes)
35,358,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,191,811 >>> mbox cmd response: success
44,225,333 UART:
44,225,640 UART: Running Caliptra FMC ...
44,226,706 UART:
44,226,860 UART: [state] CFI Enabled
44,331,855 UART: [art] Extend RT PCRs Done
44,333,047 UART: [art] Lock RT PCRs Done
44,334,825 UART: [art] Populate DV Done
44,340,298 UART: [fht] FMC Alias Private Key: 7
44,341,992 UART: [art] Derive CDI
44,342,737 UART: [art] Store in slot 0x4
44,400,855 UART: [art] Derive Key Pair
44,401,854 UART: [art] Store priv key in slot 0x5
47,694,655 UART: [art] Derive Key Pair - Done
47,707,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,996,870 UART: [art] Erasing AUTHORITY.KEYID = 7
49,998,382 UART: [art] PUB.X = BD56E512AF41BE24F7E34CB5650A1B87C1C209772B3818327B001F1CAE7D02D7F61786D58CB5703197B144271EC58D73
50,005,603 UART: [art] PUB.Y = E2F6AC22EE4D1E86B07D61364A8DD3C67666096626B05491D51D5021C4DAE0819BCD50D62671738DA1A7327A02BD510E
50,012,854 UART: [art] SIG.R = B96472C647857E82535B1B007CA4C4297096C04ED2833CFB48B392CDCFFD09273E58F540F815CEC0D6F3DC7AE40D342A
50,020,248 UART: [art] SIG.S = 7272E12B042A6EB671BE51272E98514E55573705D059B15FB89DEF4A52CE26DD7595BBBBC44EC128079A38EC689F3E2C
51,325,275 UART: Caliptra RT
51,325,983 UART: [state] CFI Enabled
51,743,720 UART: [rt] RT listening for mailbox commands...
51,745,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,775,314 UART: [rt]cmd =0x494e464f, len=4
51,779,567 >>> mbox cmd response data (312 bytes)
53,854,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
62,672,931 >>> mbox cmd response: success
62,708,137 UART:
62,708,436 UART: Running Caliptra FMC ...
62,709,483 UART:
62,709,637 UART: [state] CFI Enabled
62,800,435 UART: [art] Extend RT PCRs Done
62,801,630 UART: [art] Lock RT PCRs Done
62,802,955 UART: [art] Populate DV Done
62,808,478 UART: [fht] FMC Alias Private Key: 7
62,810,173 UART: [art] Derive CDI
62,810,910 UART: [art] Store in slot 0x4
62,869,165 UART: [art] Derive Key Pair
62,870,204 UART: [art] Store priv key in slot 0x5
66,162,971 UART: [art] Derive Key Pair - Done
66,176,171 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
68,464,308 UART: [art] Erasing AUTHORITY.KEYID = 7
68,465,816 UART: [art] PUB.X = 0E262AF18ED4BE3A8751166D51FC093AA4BA11EB5EB91F560F943905793A65522BF9DC6E16FA3D2012C6930AB7B50BD7
68,473,083 UART: [art] PUB.Y = D092B6776734BCC15D9F23813FFE2D130CD7F70CC50314E9CB4B6B3FE8FF579BB7855A09454068BBC6E91C7C90348945
68,480,333 UART: [art] SIG.R = 59AE586858B305D45FD98C7F53B5DC3AB6BA36EEB21F34757EAFBD0F8025236B481D15317B123D9B0242DDF869FB28DD
68,487,731 UART: [art] SIG.S = C19FA66454E4BA8970A666F32199AF65A9547EDF9CD532828BFD00F69ECDE9A330CA083E0C686EA421BB64907EE7A542
69,793,336 UART: Caliptra RT
69,794,132 UART: [state] CFI Enabled
70,212,955 UART: [rt] RT listening for mailbox commands...
70,214,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,244,614 UART: [rt]cmd =0x494e464f, len=4
70,248,994 >>> mbox cmd response data (312 bytes)
70,250,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
79,085,583 >>> mbox cmd response: success
79,120,660 UART:
79,120,939 UART: Running Caliptra FMC ...
79,122,055 UART:
79,122,231 UART: [state] CFI Enabled
79,224,535 UART: [art] Extend RT PCRs Done
79,225,738 UART: [art] Lock RT PCRs Done
79,227,087 UART: [art] Populate DV Done
79,232,614 UART: [fht] FMC Alias Private Key: 7
79,234,090 UART: [art] Derive CDI
79,234,878 UART: [art] Store in slot 0x4
79,293,214 UART: [art] Derive Key Pair
79,294,214 UART: [art] Store priv key in slot 0x5
82,586,824 UART: [art] Derive Key Pair - Done
82,599,561 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
84,888,480 UART: [art] Erasing AUTHORITY.KEYID = 7
84,890,058 UART: [art] PUB.X = BD56E512AF41BE24F7E34CB5650A1B87C1C209772B3818327B001F1CAE7D02D7F61786D58CB5703197B144271EC58D73
84,897,254 UART: [art] PUB.Y = E2F6AC22EE4D1E86B07D61364A8DD3C67666096626B05491D51D5021C4DAE0819BCD50D62671738DA1A7327A02BD510E
84,904,460 UART: [art] SIG.R = B96472C647857E82535B1B007CA4C4297096C04ED2833CFB48B392CDCFFD09273E58F540F815CEC0D6F3DC7AE40D342A
84,911,863 UART: [art] SIG.S = 7272E12B042A6EB671BE51272E98514E55573705D059B15FB89DEF4A52CE26DD7595BBBBC44EC128079A38EC689F3E2C
86,216,586 UART: Caliptra RT
86,217,307 UART: [state] CFI Enabled
86,634,299 UART: [rt] RT listening for mailbox commands...
86,636,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
86,666,113 UART: [rt]cmd =0x494e464f, len=4
86,670,422 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.45s
Truncated 1664 bytes from beginning
7,622,148 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,107 UART: [idev] --
7,648,417 UART: [ldev] ++
7,649,037 UART: [ldev] CDI.KEYID = 6
7,649,974 UART: [ldev] SUBJECT.KEYID = 5
7,651,181 UART: [ldev] AUTHORITY.KEYID = 7
7,652,461 UART: [ldev] FE.KEYID = 1
7,664,862 UART: [ldev] Erasing FE.KEYID = 1
10,954,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,514 UART: [ldev] --
13,315,804 UART: [fwproc] Waiting for Commands...
13,317,832 UART: [fwproc] Received command 0x46574c44
13,320,003 UART: [fwproc] Received Image of size 118548 bytes
17,427,617 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,508,979 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,155 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,911,039 >>> mbox cmd response: success
17,912,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,914,915 UART: [afmc] ++
17,915,548 UART: [afmc] CDI.KEYID = 6
17,916,447 UART: [afmc] SUBJECT.KEYID = 7
17,917,707 UART: [afmc] AUTHORITY.KEYID = 5
21,234,078 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,952 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,528,205 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
23,542,799 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
23,557,649 UART: [afmc] SIG.R = E21B3E2F88872E28E080554D658AD7E626F9FEED98F63A03BBD7CF380CFE29BD7402877A3E435E89E93AD42D1668D374
23,572,010 UART: [afmc] SIG.S = C260A0FF06FACF46D92E1C7E317797ECC51DB2B0AC539D860ED47B7266E741A3AE4C5F92187DEFE45611AD41FCFCF319
23,594,640 UART: [afmc] --
23,599,346 UART: [cold-reset] --
23,601,904 UART: [state] Locking Datavault
23,606,599 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,349 UART: [state] Locking ICCM
23,610,329 UART: [exit] Launching FMC @ 0x40000130
23,618,709 UART:
23,618,936 UART: Running Caliptra FMC ...
23,619,975 UART:
23,620,117 UART: [state] CFI Enabled
23,628,315 UART: [fht] FMC Alias Private Key: 7
25,968,383 UART: [art] Extend RT PCRs Done
25,969,599 UART: [art] Lock RT PCRs Done
25,971,275 UART: [art] Populate DV Done
25,976,833 UART: [fht] FMC Alias Private Key: 7
25,978,582 UART: [art] Derive CDI
25,979,385 UART: [art] Store in slot 0x4
26,021,702 UART: [art] Derive Key Pair
26,022,744 UART: [art] Store priv key in slot 0x5
29,264,058 UART: [art] Derive Key Pair - Done
29,277,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,431 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,931 UART: [art] PUB.X = E076351585CF43F371988915F47FA612FF30F46842438C27478F6128B6D309169D3A20219F38378008BB323A112FFC00
31,566,131 UART: [art] PUB.Y = 574DC2D171FA492909E8CA2367ECE89488BA743E92E49E6D8161DCFA8D00DD9D11CE4D4E3AFD12DA041161D7A3D7CA25
31,573,423 UART: [art] SIG.R = 66774E7EFEBF24EA9DAD090530C08E874B6E5BA3233C34A0BFF99B536264B18FDACF3816B9DDF4DF5E9923F5F9CF030D
31,580,815 UART: [art] SIG.S = B35DEF93A3C0BF077BC9CC4CC673C3C356068254BB2CFFD48F1FF9492E0AE41845025E60F0A115E3F4D8CB06E5ED702C
32,885,873 UART: Caliptra RT
32,886,585 UART: [state] CFI Enabled
33,019,574 UART: [rt] RT listening for mailbox commands...
33,051,031 UART: [rt]cmd =0x494e464f, len=4
33,055,399 >>> mbox cmd response data (312 bytes)
35,135,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,286,361 UART:
35,286,757 UART: Running Caliptra ROM ...
35,287,881 UART:
35,288,047 UART: [state] CFI Enabled
35,305,195 UART: [state] LifecycleState = Unprovisioned
35,307,076 UART: [state] DebugLocked = No
35,309,047 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,314,105 UART: [kat] SHA2-256
35,483,795 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,494,354 UART: [kat] ++
35,494,884 UART: [kat] sha1
35,505,881 UART: [kat] SHA2-256
35,508,586 UART: [kat] SHA2-384
35,513,965 UART: [kat] SHA2-512-ACC
35,516,368 UART: [kat] ECC-384
37,800,816 UART: [kat] HMAC-384Kdf
37,812,624 UART: [kat] LMS
39,002,672 UART: [kat] --
39,005,586 UART: [update-reset] ++
43,191,963 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,196,193 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,593,956 >>> mbox cmd response: success
43,594,887 UART: [update-reset] Copying MAN_2 To MAN_1
43,617,321 UART: [update-reset Success] --
43,621,705 UART: [state] Locking Datavault
43,625,537 UART: [state] Locking PCR0, PCR1 and PCR31
43,627,282 UART: [state] Locking ICCM
43,628,860 UART: [exit] Launching FMC @ 0x40000130
43,637,298 UART:
43,637,532 UART: Running Caliptra FMC ...
43,638,554 UART:
43,638,696 UART: [state] CFI Enabled
43,683,030 UART: [art] Extend RT PCRs Done
43,684,212 UART: [art] Lock RT PCRs Done
43,685,539 UART: [art] Populate DV Done
43,691,211 UART: [fht] FMC Alias Private Key: 7
43,692,814 UART: [art] Derive CDI
43,693,685 UART: [art] Store in slot 0x4
43,735,624 UART: [art] Derive Key Pair
43,736,615 UART: [art] Store priv key in slot 0x5
46,979,035 UART: [art] Derive Key Pair - Done
46,992,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,272,649 UART: [art] Erasing AUTHORITY.KEYID = 7
49,274,147 UART: [art] PUB.X = 20383825B63A399B0F3EB07910E55D67F5184F7C9FF184D999EC7D29E20B917DB154AC2C42C5865B2817D671F8AD4D0C
49,281,461 UART: [art] PUB.Y = BAF8E0DA84982FC83B892F7BF291D2C3AC52BBA9538E278A2BE8AD0A4BF214893ADD4B2DA7840B8E63C7F0A54B6A5117
49,288,701 UART: [art] SIG.R = F379456A173D0C83961DBE75BC664A08F5EA3B3E4032746D39A0D3A787E9403B9EB6729100D4048F1B52E1B0FC5A1616
49,296,092 UART: [art] SIG.S = E367194B503F70346C2787E7B11E63CB9E3FC390C95E19A48A93A7F9780D90573A5D063C9174335008A4C440CDACAC0E
50,601,382 UART: Caliptra RT
50,602,094 UART: [state] CFI Enabled
50,976,442 UART: [rt] RT listening for mailbox commands...
50,978,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,007,964 UART: [rt]cmd =0x494e464f, len=4
51,012,151 >>> mbox cmd response data (312 bytes)
53,083,407 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
53,234,185 UART:
53,234,567 UART: Running Caliptra ROM ...
53,235,650 UART:
53,235,807 UART: [state] CFI Enabled
53,250,134 UART: [state] LifecycleState = Unprovisioned
53,252,020 UART: [state] DebugLocked = No
53,254,242 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
53,259,290 UART: [kat] SHA2-256
53,428,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,439,543 UART: [kat] ++
53,440,017 UART: [kat] sha1
53,450,474 UART: [kat] SHA2-256
53,453,167 UART: [kat] SHA2-384
53,459,364 UART: [kat] SHA2-512-ACC
53,461,760 UART: [kat] ECC-384
55,746,848 UART: [kat] HMAC-384Kdf
55,757,967 UART: [kat] LMS
56,948,003 UART: [kat] --
56,952,565 UART: [update-reset] ++
61,144,686 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,147,590 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
61,545,395 >>> mbox cmd response: success
61,546,005 UART: [update-reset] Copying MAN_2 To MAN_1
61,568,447 UART: [update-reset Success] --
61,573,702 UART: [state] Locking Datavault
61,577,754 UART: [state] Locking PCR0, PCR1 and PCR31
61,579,518 UART: [state] Locking ICCM
61,581,908 UART: [exit] Launching FMC @ 0x40000130
61,590,352 UART:
61,590,627 UART: Running Caliptra FMC ...
61,591,654 UART:
61,591,798 UART: [state] CFI Enabled
61,636,230 UART: [art] Extend RT PCRs Done
61,637,362 UART: [art] Lock RT PCRs Done
61,638,887 UART: [art] Populate DV Done
61,644,223 UART: [fht] FMC Alias Private Key: 7
61,645,749 UART: [art] Derive CDI
61,646,475 UART: [art] Store in slot 0x4
61,689,165 UART: [art] Derive Key Pair
61,690,199 UART: [art] Store priv key in slot 0x5
64,932,194 UART: [art] Derive Key Pair - Done
64,944,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,225,074 UART: [art] Erasing AUTHORITY.KEYID = 7
67,226,581 UART: [art] PUB.X = A27F9B1BE80398051B0115EF2AA2BB2C0B81D3ECCE755DBC99CE299C8277548AADD50B9AA15BDD6C7DBC9A30B2FE22B8
67,233,892 UART: [art] PUB.Y = D80D4313E5384566EADCEDEBFEAB2C5D6C5373C09C23B107A4B8159E3BEC8C14BBE35C258416DBBF1E72B3CF0C6C439A
67,241,184 UART: [art] SIG.R = C44D4C665BA72FBA963C8E40E768C14CEEB75C15DEBCA285D7C90C0E02E9F2B709C4DA67A4679C632D3488916227CC9F
67,248,575 UART: [art] SIG.S = 0228D95FE7C94F4FB42D567F0F0EBD4CFE3DC8F1558F0A2B8EC9340D5143E7E57BD2C4AC23D08B704567B0616EB087D7
68,553,739 UART: Caliptra RT
68,554,424 UART: [state] CFI Enabled
68,926,711 UART: [rt] RT listening for mailbox commands...
68,928,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,958,300 UART: [rt]cmd =0x494e464f, len=4
68,962,615 >>> mbox cmd response data (312 bytes)
68,964,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
69,114,616 UART:
69,114,922 UART: Running Caliptra ROM ...
69,116,036 UART:
69,116,252 UART: [state] CFI Enabled
69,133,337 UART: [state] LifecycleState = Unprovisioned
69,135,269 UART: [state] DebugLocked = No
69,137,880 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
69,143,029 UART: [kat] SHA2-256
69,312,767 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
69,323,267 UART: [kat] ++
69,323,802 UART: [kat] sha1
69,334,095 UART: [kat] SHA2-256
69,336,838 UART: [kat] SHA2-384
69,342,976 UART: [kat] SHA2-512-ACC
69,345,370 UART: [kat] ECC-384
71,627,811 UART: [kat] HMAC-384Kdf
71,640,249 UART: [kat] LMS
72,830,317 UART: [kat] --
72,835,450 UART: [update-reset] ++
77,031,735 UART: [update-reset] Image verified using Vendor ECC Key Index 0
77,036,017 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
77,433,789 >>> mbox cmd response: success
77,434,407 UART: [update-reset] Copying MAN_2 To MAN_1
77,456,796 UART: [update-reset Success] --
77,461,672 UART: [state] Locking Datavault
77,465,132 UART: [state] Locking PCR0, PCR1 and PCR31
77,466,879 UART: [state] Locking ICCM
77,469,323 UART: [exit] Launching FMC @ 0x40000130
77,477,761 UART:
77,477,988 UART: Running Caliptra FMC ...
77,479,079 UART:
77,479,235 UART: [state] CFI Enabled
77,523,624 UART: [art] Extend RT PCRs Done
77,524,802 UART: [art] Lock RT PCRs Done
77,526,034 UART: [art] Populate DV Done
77,531,655 UART: [fht] FMC Alias Private Key: 7
77,533,149 UART: [art] Derive CDI
77,533,960 UART: [art] Store in slot 0x4
77,576,548 UART: [art] Derive Key Pair
77,577,542 UART: [art] Store priv key in slot 0x5
80,819,976 UART: [art] Derive Key Pair - Done
80,832,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
83,113,376 UART: [art] Erasing AUTHORITY.KEYID = 7
83,114,890 UART: [art] PUB.X = 20383825B63A399B0F3EB07910E55D67F5184F7C9FF184D999EC7D29E20B917DB154AC2C42C5865B2817D671F8AD4D0C
83,122,147 UART: [art] PUB.Y = BAF8E0DA84982FC83B892F7BF291D2C3AC52BBA9538E278A2BE8AD0A4BF214893ADD4B2DA7840B8E63C7F0A54B6A5117
83,129,399 UART: [art] SIG.R = F379456A173D0C83961DBE75BC664A08F5EA3B3E4032746D39A0D3A787E9403B9EB6729100D4048F1B52E1B0FC5A1616
83,136,794 UART: [art] SIG.S = E367194B503F70346C2787E7B11E63CB9E3FC390C95E19A48A93A7F9780D90573A5D063C9174335008A4C440CDACAC0E
84,441,847 UART: Caliptra RT
84,442,553 UART: [state] CFI Enabled
84,809,127 UART: [rt] RT listening for mailbox commands...
84,810,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
84,840,638 UART: [rt]cmd =0x494e464f, len=4
84,844,882 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.36s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
4,130,700 ready_for_fw is high
4,131,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,232 >>> mbox cmd response: success
18,158,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,796,654 UART:
23,797,057 UART: Running Caliptra FMC ...
23,798,166 UART:
23,798,318 UART: [state] CFI Enabled
23,806,353 UART: [fht] FMC Alias Private Key: 7
26,146,111 UART: [art] Extend RT PCRs Done
26,147,338 UART: [art] Lock RT PCRs Done
26,148,772 UART: [art] Populate DV Done
26,153,982 UART: [fht] FMC Alias Private Key: 7
26,155,680 UART: [art] Derive CDI
26,156,492 UART: [art] Store in slot 0x4
26,199,251 UART: [art] Derive Key Pair
26,200,291 UART: [art] Store priv key in slot 0x5
29,442,919 UART: [art] Derive Key Pair - Done
29,455,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,133 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,647 UART: [art] PUB.X = E417BEDD8FE94263E32208C06797FC2358E3436CFB17FD49C0227EC87AF7BEE015B2C93219BC3AE7E33E1AE631A87CFC
31,744,952 UART: [art] PUB.Y = DAA0DB83F6670FBB1E14142EF1B04F02F6545E7EC5DA9FA4E00FF720F3EAA2EE8492B906C641D82F20E681CDED0D6F88
31,752,249 UART: [art] SIG.R = E4B02DB2BB257B00C7EDA0BF0E79FC4AA803E1EBF0DAA27D9D386B813F1F1C1CD5E382DE21CD2C78248D178318D234AF
31,759,641 UART: [art] SIG.S = 0363FBAF03A2A2288D0C3F92A0E3068571F13FB64A4FF9A66D8EB5FBB0EC552668B299D0D8855157F8AFDD34EDA95BD7
33,064,689 UART: Caliptra RT
33,065,396 UART: [state] CFI Enabled
33,197,702 UART: [rt] RT listening for mailbox commands...
33,229,279 UART: [rt]cmd =0x494e464f, len=4
33,233,881 >>> mbox cmd response data (312 bytes)
35,310,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,066,233 >>> mbox cmd response: success
44,101,234 UART:
44,101,533 UART: Running Caliptra FMC ...
44,102,649 UART:
44,102,815 UART: [state] CFI Enabled
44,146,954 UART: [art] Extend RT PCRs Done
44,148,145 UART: [art] Lock RT PCRs Done
44,149,621 UART: [art] Populate DV Done
44,154,870 UART: [fht] FMC Alias Private Key: 7
44,156,562 UART: [art] Derive CDI
44,157,367 UART: [art] Store in slot 0x4
44,199,887 UART: [art] Derive Key Pair
44,200,937 UART: [art] Store priv key in slot 0x5
47,442,690 UART: [art] Derive Key Pair - Done
47,455,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,736,005 UART: [art] Erasing AUTHORITY.KEYID = 7
49,737,508 UART: [art] PUB.X = B5356E68C8BE67CBDA16BBF9C4360183258CDFF65C8E66DC62AB409F043DC290B3738B7A89EB352FB624AEB7EC023BF3
49,744,811 UART: [art] PUB.Y = 6F43B57EDC124C8F5E5E42EAF76A3796FF8CD045DFBF4868AF2885A47489ED2B056B184BC9B88B04238CC12764D56B3E
49,752,091 UART: [art] SIG.R = 14A291F5FB3820CF97771F6F3DF3C88A46C5C4EEEB9758F301B3237B9185334037CFB0A2911C80893C1D26818F0C1E7F
49,759,479 UART: [art] SIG.S = 577C9EF10AD9CB37C51B95C40EA53AE280D3C43CAC095AC5EE5A178BDAD1B2A377B2A84E61D70930591DDE0BE0D30F68
51,064,964 UART: Caliptra RT
51,065,680 UART: [state] CFI Enabled
51,435,213 UART: [rt] RT listening for mailbox commands...
51,437,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,466,661 UART: [rt]cmd =0x494e464f, len=4
51,470,832 >>> mbox cmd response data (312 bytes)
53,552,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
62,301,053 >>> mbox cmd response: success
62,335,281 UART:
62,335,577 UART: Running Caliptra FMC ...
62,336,624 UART:
62,336,772 UART: [state] CFI Enabled
62,380,907 UART: [art] Extend RT PCRs Done
62,382,097 UART: [art] Lock RT PCRs Done
62,383,544 UART: [art] Populate DV Done
62,389,059 UART: [fht] FMC Alias Private Key: 7
62,390,615 UART: [art] Derive CDI
62,391,347 UART: [art] Store in slot 0x4
62,434,096 UART: [art] Derive Key Pair
62,435,092 UART: [art] Store priv key in slot 0x5
65,677,165 UART: [art] Derive Key Pair - Done
65,690,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,970,494 UART: [art] Erasing AUTHORITY.KEYID = 7
67,972,004 UART: [art] PUB.X = AC1F00539BDD321A48430FFD035738286F3525B67F621AC40FCAA3CB93A6098B9EAC9A524A5B1EDEE8C9FB964FAA9D1C
67,979,312 UART: [art] PUB.Y = 85CD5DC460BD83B37E864B8039B7A8AB71206B535ABF67473C029D39774244BB3FA53C6BDFA7E22BAF0909369670D449
67,986,532 UART: [art] SIG.R = 3A855E1E5C7AA3B8C335D703CC3D52AB8B903DD96B5DAA4892A177EF26D53FBB3E1C1F998799CC221C479B4AAA21CDF1
67,993,916 UART: [art] SIG.S = 629CFFA9681EB0641DCC82C07C7E85FC9F7712460457AA54B3361F6E1A0E952FBACE66873C1628C113A58A4E6DF28A33
69,299,809 UART: Caliptra RT
69,300,516 UART: [state] CFI Enabled
69,669,991 UART: [rt] RT listening for mailbox commands...
69,671,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,701,578 UART: [rt]cmd =0x494e464f, len=4
69,705,745 >>> mbox cmd response data (312 bytes)
69,707,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
78,456,977 >>> mbox cmd response: success
78,491,918 UART:
78,492,211 UART: Running Caliptra FMC ...
78,493,239 UART:
78,493,385 UART: [state] CFI Enabled
78,537,790 UART: [art] Extend RT PCRs Done
78,538,978 UART: [art] Lock RT PCRs Done
78,540,241 UART: [art] Populate DV Done
78,545,812 UART: [fht] FMC Alias Private Key: 7
78,547,449 UART: [art] Derive CDI
78,548,177 UART: [art] Store in slot 0x4
78,590,869 UART: [art] Derive Key Pair
78,591,862 UART: [art] Store priv key in slot 0x5
81,834,243 UART: [art] Derive Key Pair - Done
81,846,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
84,127,393 UART: [art] Erasing AUTHORITY.KEYID = 7
84,128,900 UART: [art] PUB.X = B5356E68C8BE67CBDA16BBF9C4360183258CDFF65C8E66DC62AB409F043DC290B3738B7A89EB352FB624AEB7EC023BF3
84,136,155 UART: [art] PUB.Y = 6F43B57EDC124C8F5E5E42EAF76A3796FF8CD045DFBF4868AF2885A47489ED2B056B184BC9B88B04238CC12764D56B3E
84,143,455 UART: [art] SIG.R = 14A291F5FB3820CF97771F6F3DF3C88A46C5C4EEEB9758F301B3237B9185334037CFB0A2911C80893C1D26818F0C1E7F
84,150,842 UART: [art] SIG.S = 577C9EF10AD9CB37C51B95C40EA53AE280D3C43CAC095AC5EE5A178BDAD1B2A377B2A84E61D70930591DDE0BE0D30F68
85,456,222 UART: Caliptra RT
85,456,922 UART: [state] CFI Enabled
85,829,345 UART: [rt] RT listening for mailbox commands...
85,831,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,860,960 UART: [rt]cmd =0x494e464f, len=4
85,865,188 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.41s
Truncated 1498 bytes from beginning
_for_fw is high
3,469,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,686 UART: [idev] Erasing UDS.KEYID = 0
5,986,603 UART: [idev] Sha1 KeyId Algorithm
6,010,971 UART: [idev] --
6,015,995 UART: [ldev] ++
6,016,575 UART: [ldev] CDI.KEYID = 6
6,017,485 UART: [ldev] SUBJECT.KEYID = 5
6,018,697 UART: [ldev] AUTHORITY.KEYID = 7
6,019,978 UART: [ldev] FE.KEYID = 1
6,057,304 UART: [ldev] Erasing FE.KEYID = 1
8,566,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,282 UART: [ldev] --
10,373,173 UART: [fwproc] Wait for Commands...
10,374,995 UART: [fwproc] Recv command 0x46574c44
10,377,027 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,870 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,877 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,326 >>> mbox cmd response: success
14,341,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,344,153 UART: [afmc] ++
14,344,744 UART: [afmc] CDI.KEYID = 6
14,345,624 UART: [afmc] SUBJECT.KEYID = 7
14,346,897 UART: [afmc] AUTHORITY.KEYID = 5
16,874,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,600,042 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
18,615,752 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
18,631,796 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
18,647,497 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
18,671,486 UART: [afmc] --
18,675,466 UART: [cold-reset] --
18,678,897 UART: [state] Locking Datavault
18,683,386 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,133 UART: [state] Locking ICCM
18,687,739 UART: [exit] Launching FMC @ 0x40000130
18,696,179 UART:
18,696,417 UART: Running Caliptra FMC ...
18,697,451 UART:
18,697,595 UART: [state] CFI Enabled
18,752,722 UART: [fht] FMC Alias Private Key: 7
20,519,232 UART: [art] Extend RT PCRs Done
20,520,442 UART: [art] Lock RT PCRs Done
20,522,004 UART: [art] Populate DV Done
20,527,315 UART: [fht] FMC Alias Private Key: 7
20,528,846 UART: [art] Derive CDI
20,529,575 UART: [art] Store in slot 0x4
20,584,693 UART: [art] Derive Key Pair
20,585,736 UART: [art] Store priv key in slot 0x5
23,048,443 UART: [art] Derive Key Pair - Done
23,061,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,774,025 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,533 UART: [art] PUB.X = 14AFEE991EEE7EA1D10113E6609E9725CEDD4AEA8DDED82E6BC7B2D9CCC7226706CD56D6B6BD7900D801C1308B1C8F25
24,782,785 UART: [art] PUB.Y = 6999D41A7FB2F8395C1BF0C1B946AD9C560FAC10DA7FC1A337824E1892CEFBD13DE0AD622DC7205D6698FEBE41F0CD17
24,790,123 UART: [art] SIG.R = 6B06C46FA43CC84F0C85CBE239C074D2FD2C4E271AD92EDFE005AC610AA7CF311914E48E8F1A151C9A47A9C87A696BCE
24,797,558 UART: [art] SIG.S = 7A00D8CB02396D263E2AAAB8C3B6EEEF67ABFD7373C7DF274E5C1801C42793298752471628F381AFE1BE44FAC071A2D6
25,776,360 UART: Caliptra RT
25,777,084 UART: [state] CFI Enabled
25,957,059 UART: [rt] RT listening for mailbox commands...
25,988,555 UART: [rt]cmd =0x494e464f, len=4
25,993,054 >>> mbox cmd response data (312 bytes)
28,053,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,203,838 UART:
28,204,203 UART: Running Caliptra ROM ...
28,205,297 UART:
28,205,458 UART: [state] CFI Enabled
28,274,662 UART: [state] LifecycleState = Unprovisioned
28,276,596 UART: [state] DebugLocked = No
28,279,467 UART: [state] WD Timer not started. Device not locked for debugging
28,283,854 UART: [kat] SHA2-256
28,463,523 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,474,297 UART: [kat] ++
28,474,834 UART: [kat] sha1
28,486,410 UART: [kat] SHA2-256
28,489,141 UART: [kat] SHA2-384
28,495,348 UART: [kat] SHA2-512-ACC
28,497,748 UART: [kat] ECC-384
30,953,202 UART: [kat] HMAC-384Kdf
30,975,536 UART: [kat] LMS
31,451,993 UART: [kat] --
31,455,626 UART: [update-reset] ++
34,949,303 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,952,678 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,350,273 >>> mbox cmd response: success
35,351,465 UART: [update-reset] Copying MAN_2 To MAN_1
35,388,554 UART: [update-reset Success] --
35,391,800 UART: [state] Locking Datavault
35,395,486 UART: [state] Locking PCR0, PCR1 and PCR31
35,397,236 UART: [state] Locking ICCM
35,398,873 UART: [exit] Launching FMC @ 0x40000130
35,407,269 UART:
35,407,511 UART: Running Caliptra FMC ...
35,408,534 UART:
35,408,679 UART: [state] CFI Enabled
35,508,950 UART: [art] Extend RT PCRs Done
35,510,138 UART: [art] Lock RT PCRs Done
35,511,672 UART: [art] Populate DV Done
35,517,127 UART: [fht] FMC Alias Private Key: 7
35,518,862 UART: [art] Derive CDI
35,519,605 UART: [art] Store in slot 0x4
35,577,685 UART: [art] Derive Key Pair
35,578,685 UART: [art] Store priv key in slot 0x5
38,041,421 UART: [art] Derive Key Pair - Done
38,054,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,766,699 UART: [art] Erasing AUTHORITY.KEYID = 7
39,768,215 UART: [art] PUB.X = 5F5AAFED899CF49F2C4087EEC35A1DC6F9FD93444FF06BD79486D28B714A4F5995DECE1E7E80EB53FF91BF8400969C00
39,775,502 UART: [art] PUB.Y = AB090461938DAC8865B587D412FDF104D273A3511DD12740C73A96679A307B3309C117F2D12F5D3BEB2C3CC41EAD2838
39,782,714 UART: [art] SIG.R = B59A04207089B3A161E9F62F0F5F3DCD6F4F0375D280B2C36CFE0A493CDC49602C9FA6A0A1AA8C45E8289D8DD72559EE
39,790,144 UART: [art] SIG.S = 795A1565D8FD62CE15D033151338ADCEC1C31035BC21A3D21B818985E1BA3B88C7413DF86425EAAF992984202F9DFF85
40,769,200 UART: Caliptra RT
40,769,894 UART: [state] CFI Enabled
41,188,431 UART: [rt] RT listening for mailbox commands...
41,190,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,220,065 UART: [rt]cmd =0x494e464f, len=4
41,224,484 >>> mbox cmd response data (312 bytes)
43,281,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,432,510 UART:
43,432,881 UART: Running Caliptra ROM ...
43,434,012 UART:
43,434,189 UART: [state] CFI Enabled
43,494,439 UART: [state] LifecycleState = Unprovisioned
43,496,367 UART: [state] DebugLocked = No
43,498,785 UART: [state] WD Timer not started. Device not locked for debugging
43,503,495 UART: [kat] SHA2-256
43,683,173 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
43,693,927 UART: [kat] ++
43,694,412 UART: [kat] sha1
43,704,269 UART: [kat] SHA2-256
43,706,975 UART: [kat] SHA2-384
43,712,747 UART: [kat] SHA2-512-ACC
43,715,105 UART: [kat] ECC-384
46,160,839 UART: [kat] HMAC-384Kdf
46,182,681 UART: [kat] LMS
46,659,097 UART: [kat] --
46,664,058 UART: [update-reset] ++
50,156,469 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,160,568 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
50,558,181 >>> mbox cmd response: success
50,558,798 UART: [update-reset] Copying MAN_2 To MAN_1
50,595,925 UART: [update-reset Success] --
50,600,480 UART: [state] Locking Datavault
50,602,426 UART: [state] Locking PCR0, PCR1 and PCR31
50,604,175 UART: [state] Locking ICCM
50,605,885 UART: [exit] Launching FMC @ 0x40000130
50,614,242 UART:
50,614,484 UART: Running Caliptra FMC ...
50,615,584 UART:
50,615,740 UART: [state] CFI Enabled
50,718,311 UART: [art] Extend RT PCRs Done
50,719,493 UART: [art] Lock RT PCRs Done
50,721,108 UART: [art] Populate DV Done
50,726,780 UART: [fht] FMC Alias Private Key: 7
50,728,365 UART: [art] Derive CDI
50,729,173 UART: [art] Store in slot 0x4
50,787,829 UART: [art] Derive Key Pair
50,788,818 UART: [art] Store priv key in slot 0x5
53,251,069 UART: [art] Derive Key Pair - Done
53,264,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,977,147 UART: [art] Erasing AUTHORITY.KEYID = 7
54,978,656 UART: [art] PUB.X = FA041F150962D307108F862AC17A2813B0CDE16C26B03DA5F297708F133610D9A4DB44BFABBC56600364C2C6F3965B5B
54,985,893 UART: [art] PUB.Y = 8651F65DACA405E04FE56084ED79F32861DB6CE49BD6E30F34EF7CAA896F2BD79017DC193A38AD68BE95C7E2B026A78F
54,993,202 UART: [art] SIG.R = E72AA6C3AC9319724BC86639247886F8FCB72AF5C3051CD8786F825F5460E13A22D5E53A2A23E2D8A7502230F8D6653A
55,000,573 UART: [art] SIG.S = 1362C00CA3F8CB880763860E335C51915C07D459D5B29417B76DF04E9A2F512376BC4085356A572C04010B02B9FFC104
55,979,630 UART: Caliptra RT
55,980,321 UART: [state] CFI Enabled
56,402,953 UART: [rt] RT listening for mailbox commands...
56,404,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,434,603 UART: [rt]cmd =0x494e464f, len=4
56,438,771 >>> mbox cmd response data (312 bytes)
56,440,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
56,590,594 UART:
56,590,904 UART: Running Caliptra ROM ...
56,592,020 UART:
56,592,183 UART: [state] CFI Enabled
56,660,411 UART: [state] LifecycleState = Unprovisioned
56,662,337 UART: [state] DebugLocked = No
56,665,033 UART: [state] WD Timer not started. Device not locked for debugging
56,668,940 UART: [kat] SHA2-256
56,848,612 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
56,859,385 UART: [kat] ++
56,859,841 UART: [kat] sha1
56,870,506 UART: [kat] SHA2-256
56,873,188 UART: [kat] SHA2-384
56,877,979 UART: [kat] SHA2-512-ACC
56,880,312 UART: [kat] ECC-384
59,324,091 UART: [kat] HMAC-384Kdf
59,346,153 UART: [kat] LMS
59,822,626 UART: [kat] --
59,827,171 UART: [update-reset] ++
63,315,029 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,318,778 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
63,716,387 >>> mbox cmd response: success
63,717,977 UART: [update-reset] Copying MAN_2 To MAN_1
63,755,106 UART: [update-reset Success] --
63,759,715 UART: [state] Locking Datavault
63,763,204 UART: [state] Locking PCR0, PCR1 and PCR31
63,764,974 UART: [state] Locking ICCM
63,767,236 UART: [exit] Launching FMC @ 0x40000130
63,775,627 UART:
63,775,858 UART: Running Caliptra FMC ...
63,776,956 UART:
63,777,109 UART: [state] CFI Enabled
63,881,136 UART: [art] Extend RT PCRs Done
63,882,323 UART: [art] Lock RT PCRs Done
63,883,781 UART: [art] Populate DV Done
63,889,025 UART: [fht] FMC Alias Private Key: 7
63,890,626 UART: [art] Derive CDI
63,891,440 UART: [art] Store in slot 0x4
63,949,958 UART: [art] Derive Key Pair
63,951,002 UART: [art] Store priv key in slot 0x5
66,413,467 UART: [art] Derive Key Pair - Done
66,426,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
68,140,098 UART: [art] Erasing AUTHORITY.KEYID = 7
68,141,607 UART: [art] PUB.X = 5F5AAFED899CF49F2C4087EEC35A1DC6F9FD93444FF06BD79486D28B714A4F5995DECE1E7E80EB53FF91BF8400969C00
68,148,883 UART: [art] PUB.Y = AB090461938DAC8865B587D412FDF104D273A3511DD12740C73A96679A307B3309C117F2D12F5D3BEB2C3CC41EAD2838
68,156,130 UART: [art] SIG.R = B59A04207089B3A161E9F62F0F5F3DCD6F4F0375D280B2C36CFE0A493CDC49602C9FA6A0A1AA8C45E8289D8DD72559EE
68,163,533 UART: [art] SIG.S = 795A1565D8FD62CE15D033151338ADCEC1C31035BC21A3D21B818985E1BA3B88C7413DF86425EAAF992984202F9DFF85
69,142,449 UART: Caliptra RT
69,143,158 UART: [state] CFI Enabled
69,565,047 UART: [rt] RT listening for mailbox commands...
69,566,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,596,339 UART: [rt]cmd =0x494e464f, len=4
69,600,666 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
3,462,994 ready_for_fw is high
3,463,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,048 >>> mbox cmd response: success
14,221,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,518,201 UART:
18,518,580 UART: Running Caliptra FMC ...
18,519,721 UART:
18,519,876 UART: [state] CFI Enabled
18,584,715 UART: [fht] FMC Alias Private Key: 7
20,351,162 UART: [art] Extend RT PCRs Done
20,352,389 UART: [art] Lock RT PCRs Done
20,354,124 UART: [art] Populate DV Done
20,359,644 UART: [fht] FMC Alias Private Key: 7
20,361,284 UART: [art] Derive CDI
20,362,040 UART: [art] Store in slot 0x4
20,417,817 UART: [art] Derive Key Pair
20,418,855 UART: [art] Store priv key in slot 0x5
22,881,779 UART: [art] Derive Key Pair - Done
22,894,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,705 UART: [art] Erasing AUTHORITY.KEYID = 7
24,609,209 UART: [art] PUB.X = F92BC1276D2D4B0261D6205EA4EF77B8F50B8E26BE54DE953F2F39FC5792F9A5898ED4DBB67CD72C65996FDB59E0228D
24,616,460 UART: [art] PUB.Y = 2DC1C8941179B35D6304A5C6EF767CFC52B9D37D8636EA04E62BEC43D1FC37B20928CC68CDE1B18FA2023FCE773965BF
24,623,765 UART: [art] SIG.R = 1EB6CF6A779C1ED2A69B925B80C8604EA5ABB750EFD333CECB18E429F9DFC458ED2FEC71666F84DD4DEA0A7AA7EB2EA4
24,631,157 UART: [art] SIG.S = 059E0EDA90886F662359ED47510A37D194EFEC2BDB654CB01ADFA69A98D35B568692C0FA39E1B319432A1566DEF8698B
25,610,562 UART: Caliptra RT
25,611,272 UART: [state] CFI Enabled
25,790,847 UART: [rt] RT listening for mailbox commands...
25,821,999 UART: [rt]cmd =0x494e464f, len=4
25,826,432 >>> mbox cmd response data (312 bytes)
27,887,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,204,103 >>> mbox cmd response: success
35,238,972 UART:
35,239,337 UART: Running Caliptra FMC ...
35,240,540 UART:
35,240,710 UART: [state] CFI Enabled
35,347,458 UART: [art] Extend RT PCRs Done
35,348,650 UART: [art] Lock RT PCRs Done
35,350,119 UART: [art] Populate DV Done
35,355,720 UART: [fht] FMC Alias Private Key: 7
35,357,422 UART: [art] Derive CDI
35,358,157 UART: [art] Store in slot 0x4
35,417,142 UART: [art] Derive Key Pair
35,418,183 UART: [art] Store priv key in slot 0x5
37,881,246 UART: [art] Derive Key Pair - Done
37,894,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,606,528 UART: [art] Erasing AUTHORITY.KEYID = 7
39,608,038 UART: [art] PUB.X = C7EAB1100DF942DE8E90C5BBF2A25C3B0AB5BD12D997C9EAFA0CBBD2ED74135561B29922D831E1B27888EE57E366A07F
39,615,306 UART: [art] PUB.Y = 3F429277899A7B8082DA83E627BF2FAB85F7CA438D361B152B7C8C0F962BD6390F9F28CCB1302AC8E8F0E626CD3E94E1
39,622,602 UART: [art] SIG.R = 4CEFDB2582966CB819894DA50F21F48C67C6A808C2650F378B3ECBE742B725F495D93C1E454A62DA556884987134AB80
39,629,966 UART: [art] SIG.S = F4C5D831883E80DEF72E609A0B71BD25DD24F37CC7F97A437CA41D019FC7F4B670BB3E70692EE89AF383AE01A0085888
40,608,377 UART: Caliptra RT
40,609,079 UART: [state] CFI Enabled
41,030,389 UART: [rt] RT listening for mailbox commands...
41,032,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,061,907 UART: [rt]cmd =0x494e464f, len=4
41,066,383 >>> mbox cmd response data (312 bytes)
43,124,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
50,435,521 >>> mbox cmd response: success
50,468,962 UART:
50,469,257 UART: Running Caliptra FMC ...
50,470,296 UART:
50,470,447 UART: [state] CFI Enabled
50,558,127 UART: [art] Extend RT PCRs Done
50,559,321 UART: [art] Lock RT PCRs Done
50,560,856 UART: [art] Populate DV Done
50,566,316 UART: [fht] FMC Alias Private Key: 7
50,567,797 UART: [art] Derive CDI
50,568,547 UART: [art] Store in slot 0x4
50,626,749 UART: [art] Derive Key Pair
50,627,786 UART: [art] Store priv key in slot 0x5
53,090,489 UART: [art] Derive Key Pair - Done
53,103,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,816,721 UART: [art] Erasing AUTHORITY.KEYID = 7
54,818,367 UART: [art] PUB.X = E8DD5EDD99208E421507ED9EBFE02CF5B85589F016E32B577ADD99668F88A60E881FD2CD58547CCED99EB7217EA29E46
54,825,518 UART: [art] PUB.Y = A3C4B2F02B15E936ADF6B524C09B8374B7565D906F334CF59FB11A828D225ABB6A31796A5752F01D3900CDB32C1FE22A
54,832,756 UART: [art] SIG.R = 4A3ED764CA658F1896D99E71EA63C8E888A861677225A654BAD79C31029B4D16D39AD283E19CA431B12D4F27145CE0F9
54,840,157 UART: [art] SIG.S = 4EAC62892D72AEDFBE996B4E59DE8DD36F237D105FBF97FA305C81E98FFB959F8C510417DBB613061ECC2DDD24ADD5EF
55,819,349 UART: Caliptra RT
55,820,050 UART: [state] CFI Enabled
56,240,714 UART: [rt] RT listening for mailbox commands...
56,242,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,272,289 UART: [rt]cmd =0x494e464f, len=4
56,276,674 >>> mbox cmd response data (312 bytes)
56,278,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
63,599,014 >>> mbox cmd response: success
63,633,711 UART:
63,634,007 UART: Running Caliptra FMC ...
63,635,044 UART:
63,635,197 UART: [state] CFI Enabled
63,721,522 UART: [art] Extend RT PCRs Done
63,722,706 UART: [art] Lock RT PCRs Done
63,724,216 UART: [art] Populate DV Done
63,729,462 UART: [fht] FMC Alias Private Key: 7
63,731,002 UART: [art] Derive CDI
63,731,819 UART: [art] Store in slot 0x4
63,790,697 UART: [art] Derive Key Pair
63,791,736 UART: [art] Store priv key in slot 0x5
66,254,705 UART: [art] Derive Key Pair - Done
66,267,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,980,321 UART: [art] Erasing AUTHORITY.KEYID = 7
67,981,832 UART: [art] PUB.X = C7EAB1100DF942DE8E90C5BBF2A25C3B0AB5BD12D997C9EAFA0CBBD2ED74135561B29922D831E1B27888EE57E366A07F
67,989,152 UART: [art] PUB.Y = 3F429277899A7B8082DA83E627BF2FAB85F7CA438D361B152B7C8C0F962BD6390F9F28CCB1302AC8E8F0E626CD3E94E1
67,996,389 UART: [art] SIG.R = 4CEFDB2582966CB819894DA50F21F48C67C6A808C2650F378B3ECBE742B725F495D93C1E454A62DA556884987134AB80
68,003,781 UART: [art] SIG.S = F4C5D831883E80DEF72E609A0B71BD25DD24F37CC7F97A437CA41D019FC7F4B670BB3E70692EE89AF383AE01A0085888
68,982,488 UART: Caliptra RT
68,983,193 UART: [state] CFI Enabled
69,407,631 UART: [rt] RT listening for mailbox commands...
69,409,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,439,178 UART: [rt]cmd =0x494e464f, len=4
69,443,667 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.59s
Truncated 1498 bytes from beginning
_for_fw is high
3,787,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,014 UART: [idev] Erasing UDS.KEYID = 0
6,262,830 UART: [idev] Sha1 KeyId Algorithm
6,286,240 UART: [idev] --
6,290,835 UART: [ldev] ++
6,291,410 UART: [ldev] CDI.KEYID = 6
6,292,296 UART: [ldev] SUBJECT.KEYID = 5
6,293,566 UART: [ldev] AUTHORITY.KEYID = 7
6,294,802 UART: [ldev] FE.KEYID = 1
6,307,340 UART: [ldev] Erasing FE.KEYID = 1
8,782,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,499,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,515,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,546,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,375 UART: [ldev] --
10,575,541 UART: [fwproc] Wait for Commands...
10,578,637 UART: [fwproc] Recv command 0x46574c44
10,580,689 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,492 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,495 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,543,196 >>> mbox cmd response: success
14,543,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,546,987 UART: [afmc] ++
14,547,576 UART: [afmc] CDI.KEYID = 6
14,548,513 UART: [afmc] SUBJECT.KEYID = 7
14,549,734 UART: [afmc] AUTHORITY.KEYID = 5
17,051,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,776,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,778,330 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
18,794,043 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
18,810,157 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
18,825,767 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
18,850,025 UART: [afmc] --
18,853,360 UART: [cold-reset] --
18,857,224 UART: [state] Locking Datavault
18,862,038 UART: [state] Locking PCR0, PCR1 and PCR31
18,863,798 UART: [state] Locking ICCM
18,865,407 UART: [exit] Launching FMC @ 0x40000130
18,873,805 UART:
18,874,042 UART: Running Caliptra FMC ...
18,875,147 UART:
18,875,308 UART: [state] CFI Enabled
18,883,490 UART: [fht] FMC Alias Private Key: 7
20,649,064 UART: [art] Extend RT PCRs Done
20,650,413 UART: [art] Lock RT PCRs Done
20,651,975 UART: [art] Populate DV Done
20,657,334 UART: [fht] FMC Alias Private Key: 7
20,658,998 UART: [art] Derive CDI
20,659,736 UART: [art] Store in slot 0x4
20,702,762 UART: [art] Derive Key Pair
20,703,765 UART: [art] Store priv key in slot 0x5
23,130,412 UART: [art] Derive Key Pair - Done
23,143,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,849,634 UART: [art] Erasing AUTHORITY.KEYID = 7
24,851,140 UART: [art] PUB.X = 58DD73500C1EC1EDEFDEBE5AFE8798F0F07D0455E1BFC582ADC7703BACD26CD36E03E6B9A7C25B6C526B0D275BACE383
24,858,437 UART: [art] PUB.Y = 7C6F84CC7984A56388BD8F739D0BB90C3952DE156CA3895100B6782C275CB7F2F5DC903B4541180955D44DB4D21D26D0
24,865,667 UART: [art] SIG.R = B4750234CA182D7551A2B05B326E7D9CC13902C31D8EDB81A91CD38CCB93D7CB1AB55A032D37489DA87D34D544B3F379
24,873,108 UART: [art] SIG.S = 116FBFBAF96B0582A539EDD0CCA5AE3024EC226F09F8A167030DD6F24BD5871EFB61AA7AAC784A041A726AB685E95E37
25,852,251 UART: Caliptra RT
25,852,951 UART: [state] CFI Enabled
25,985,298 UART: [rt] RT listening for mailbox commands...
26,016,539 UART: [rt]cmd =0x494e464f, len=4
26,020,854 >>> mbox cmd response data (312 bytes)
28,088,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,239,401 UART:
28,239,787 UART: Running Caliptra ROM ...
28,240,925 UART:
28,241,101 UART: [state] CFI Enabled
28,255,221 UART: [state] LifecycleState = Unprovisioned
28,257,205 UART: [state] DebugLocked = No
28,259,299 UART: [state] WD Timer not started. Device not locked for debugging
28,262,517 UART: [kat] SHA2-256
28,442,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,453,016 UART: [kat] ++
28,453,481 UART: [kat] sha1
28,464,890 UART: [kat] SHA2-256
28,467,587 UART: [kat] SHA2-384
28,473,143 UART: [kat] SHA2-512-ACC
28,475,548 UART: [kat] ECC-384
30,915,486 UART: [kat] HMAC-384Kdf
30,929,384 UART: [kat] LMS
31,405,873 UART: [kat] --
31,411,481 UART: [update-reset] ++
34,903,268 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,906,697 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,304,343 >>> mbox cmd response: success
35,304,726 UART: [update-reset] Copying MAN_2 To MAN_1
35,341,752 UART: [update-reset Success] --
35,344,821 UART: [state] Locking Datavault
35,347,862 UART: [state] Locking PCR0, PCR1 and PCR31
35,349,572 UART: [state] Locking ICCM
35,351,406 UART: [exit] Launching FMC @ 0x40000130
35,359,808 UART:
35,360,043 UART: Running Caliptra FMC ...
35,361,153 UART:
35,361,320 UART: [state] CFI Enabled
35,405,612 UART: [art] Extend RT PCRs Done
35,406,801 UART: [art] Lock RT PCRs Done
35,408,100 UART: [art] Populate DV Done
35,413,567 UART: [fht] FMC Alias Private Key: 7
35,415,119 UART: [art] Derive CDI
35,415,938 UART: [art] Store in slot 0x4
35,458,705 UART: [art] Derive Key Pair
35,459,746 UART: [art] Store priv key in slot 0x5
37,886,168 UART: [art] Derive Key Pair - Done
37,898,963 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,605,223 UART: [art] Erasing AUTHORITY.KEYID = 7
39,606,728 UART: [art] PUB.X = 7D5BE2B239844BC3B44EC44F9C71FBA37D262121EAC2AA74B0CDC1C8E42905BEA512E7EE10E0E50E113011A0C5CBB8DD
39,614,033 UART: [art] PUB.Y = 1B8919EFDF030593165F27C1EA55336DA751307BDC25D387FD86F90E27AEA4CB1B87B6328146D18223E2A56015E33813
39,621,282 UART: [art] SIG.R = 788C16B3CEE252BFDD6DB089CB47111FFA3916F4D6451CF1C3C5D795BF5B67C82A784459E8B4475E620A8A475AD36802
39,628,678 UART: [art] SIG.S = 5902217C62BBA894EAFB7B6552CE9BD0A0DCEE599269E37BB22B0727B99144651B27571EF5E8726B78B3ECF2F4905088
40,607,486 UART: Caliptra RT
40,608,198 UART: [state] CFI Enabled
40,980,618 UART: [rt] RT listening for mailbox commands...
40,982,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,012,194 UART: [rt]cmd =0x494e464f, len=4
41,016,372 >>> mbox cmd response data (312 bytes)
43,074,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,224,878 UART:
43,225,255 UART: Running Caliptra ROM ...
43,226,339 UART:
43,226,501 UART: [state] CFI Enabled
43,242,239 UART: [state] LifecycleState = Unprovisioned
43,244,133 UART: [state] DebugLocked = No
43,245,628 UART: [state] WD Timer not started. Device not locked for debugging
43,249,862 UART: [kat] SHA2-256
43,429,540 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
43,440,343 UART: [kat] ++
43,440,798 UART: [kat] sha1
43,451,839 UART: [kat] SHA2-256
43,454,570 UART: [kat] SHA2-384
43,459,160 UART: [kat] SHA2-512-ACC
43,461,476 UART: [kat] ECC-384
45,902,063 UART: [kat] HMAC-384Kdf
45,914,848 UART: [kat] LMS
46,391,324 UART: [kat] --
46,394,049 UART: [update-reset] ++
49,885,376 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,889,138 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
50,286,735 >>> mbox cmd response: success
50,288,164 UART: [update-reset] Copying MAN_2 To MAN_1
50,325,242 UART: [update-reset Success] --
50,329,368 UART: [state] Locking Datavault
50,331,963 UART: [state] Locking PCR0, PCR1 and PCR31
50,333,730 UART: [state] Locking ICCM
50,336,320 UART: [exit] Launching FMC @ 0x40000130
50,344,718 UART:
50,344,962 UART: Running Caliptra FMC ...
50,346,087 UART:
50,346,252 UART: [state] CFI Enabled
50,390,540 UART: [art] Extend RT PCRs Done
50,391,686 UART: [art] Lock RT PCRs Done
50,392,978 UART: [art] Populate DV Done
50,398,441 UART: [fht] FMC Alias Private Key: 7
50,400,195 UART: [art] Derive CDI
50,401,011 UART: [art] Store in slot 0x4
50,443,934 UART: [art] Derive Key Pair
50,444,973 UART: [art] Store priv key in slot 0x5
52,872,144 UART: [art] Derive Key Pair - Done
52,885,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,591,139 UART: [art] Erasing AUTHORITY.KEYID = 7
54,592,637 UART: [art] PUB.X = B84620307AE97F2B7BD413FFFBB415A3F4315A2ADA5EDE2423273D5FAA71A6DEE8D81494A4120BFB8CBFCF1680474D5F
54,599,946 UART: [art] PUB.Y = 6696895CD102DA872B69923C01C327AD24B0D67A3AB0FF798CA290FB7DAD83249F93D25CAE4BFEE82E8B7E9D9F790FFA
54,607,234 UART: [art] SIG.R = F1F72E98F9C8AD9CE9AA702965FB46127296E40F6D7999414E600396F88FB21C7FA63D85AF7769EF533636A09DE1660E
54,614,642 UART: [art] SIG.S = F7E9FDE8F5516F2386FAEFB665CA2BEE4EDFC64CDD5C736A2C06FF93240484684E81E162DE1643CD4D8257ADE3FF9F51
55,593,366 UART: Caliptra RT
55,594,075 UART: [state] CFI Enabled
55,965,354 UART: [rt] RT listening for mailbox commands...
55,967,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,996,992 UART: [rt]cmd =0x494e464f, len=4
56,001,374 >>> mbox cmd response data (312 bytes)
56,003,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
56,153,191 UART:
56,153,499 UART: Running Caliptra ROM ...
56,154,538 UART:
56,154,799 UART: [state] CFI Enabled
56,169,015 UART: [state] LifecycleState = Unprovisioned
56,170,948 UART: [state] DebugLocked = No
56,172,878 UART: [state] WD Timer not started. Device not locked for debugging
56,177,379 UART: [kat] SHA2-256
56,357,121 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
56,367,908 UART: [kat] ++
56,368,449 UART: [kat] sha1
56,380,313 UART: [kat] SHA2-256
56,383,004 UART: [kat] SHA2-384
56,388,788 UART: [kat] SHA2-512-ACC
56,391,137 UART: [kat] ECC-384
58,833,521 UART: [kat] HMAC-384Kdf
58,845,742 UART: [kat] LMS
59,322,224 UART: [kat] --
59,327,242 UART: [update-reset] ++
62,824,302 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
62,827,516 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
63,225,119 >>> mbox cmd response: success
63,226,868 UART: [update-reset] Copying MAN_2 To MAN_1
63,264,004 UART: [update-reset Success] --
63,267,560 UART: [state] Locking Datavault
63,270,981 UART: [state] Locking PCR0, PCR1 and PCR31
63,272,737 UART: [state] Locking ICCM
63,275,134 UART: [exit] Launching FMC @ 0x40000130
63,283,532 UART:
63,283,775 UART: Running Caliptra FMC ...
63,284,803 UART:
63,284,955 UART: [state] CFI Enabled
63,329,246 UART: [art] Extend RT PCRs Done
63,330,430 UART: [art] Lock RT PCRs Done
63,331,808 UART: [art] Populate DV Done
63,337,540 UART: [fht] FMC Alias Private Key: 7
63,339,080 UART: [art] Derive CDI
63,339,818 UART: [art] Store in slot 0x4
63,382,466 UART: [art] Derive Key Pair
63,383,504 UART: [art] Store priv key in slot 0x5
65,810,215 UART: [art] Derive Key Pair - Done
65,822,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,529,381 UART: [art] Erasing AUTHORITY.KEYID = 7
67,530,900 UART: [art] PUB.X = 7D5BE2B239844BC3B44EC44F9C71FBA37D262121EAC2AA74B0CDC1C8E42905BEA512E7EE10E0E50E113011A0C5CBB8DD
67,538,093 UART: [art] PUB.Y = 1B8919EFDF030593165F27C1EA55336DA751307BDC25D387FD86F90E27AEA4CB1B87B6328146D18223E2A56015E33813
67,545,329 UART: [art] SIG.R = 788C16B3CEE252BFDD6DB089CB47111FFA3916F4D6451CF1C3C5D795BF5B67C82A784459E8B4475E620A8A475AD36802
67,552,715 UART: [art] SIG.S = 5902217C62BBA894EAFB7B6552CE9BD0A0DCEE599269E37BB22B0727B99144651B27571EF5E8726B78B3ECF2F4905088
68,531,751 UART: Caliptra RT
68,532,444 UART: [state] CFI Enabled
68,906,305 UART: [rt] RT listening for mailbox commands...
68,908,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,937,908 UART: [rt]cmd =0x494e464f, len=4
68,942,239 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,778,588 ready_for_fw is high
3,779,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,453,461 >>> mbox cmd response: success
14,454,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,696,778 UART:
18,697,154 UART: Running Caliptra FMC ...
18,698,292 UART:
18,698,450 UART: [state] CFI Enabled
18,706,180 UART: [fht] FMC Alias Private Key: 7
20,472,044 UART: [art] Extend RT PCRs Done
20,473,270 UART: [art] Lock RT PCRs Done
20,475,003 UART: [art] Populate DV Done
20,480,221 UART: [fht] FMC Alias Private Key: 7
20,481,982 UART: [art] Derive CDI
20,482,800 UART: [art] Store in slot 0x4
20,525,469 UART: [art] Derive Key Pair
20,526,468 UART: [art] Store priv key in slot 0x5
22,953,622 UART: [art] Derive Key Pair - Done
22,966,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,332 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,830 UART: [art] PUB.X = 15E1D8DB00C64DF4083E915E2DC83BCB3B3F897F3CCFD557B550BD1F51453EA8CC49F0A965B44FFA13A19577A23FBACD
24,681,139 UART: [art] PUB.Y = A3E9F891F3A5D6E2D0B955EBC8F688DBE8F077C1DB820D9872A02F443D5CCE14F5AE06E3C344E9B0033CA10E51964E1D
24,688,389 UART: [art] SIG.R = 4F91B4483C3EEC0A484F740A01C9A8996269C9690C4382D2D237B19C676877C77C92148BB3E0625B0B2841F685A13417
24,695,782 UART: [art] SIG.S = BDDC8D9C5839F1911498561B2954381621C85BB67C3701EF467483C7E6A3E980C98DAFF92DC38428F26164B6479A8002
25,674,596 UART: Caliptra RT
25,675,294 UART: [state] CFI Enabled
25,807,955 UART: [rt] RT listening for mailbox commands...
25,839,309 UART: [rt]cmd =0x494e464f, len=4
25,843,839 >>> mbox cmd response data (312 bytes)
27,904,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,122,604 >>> mbox cmd response: success
35,159,990 UART:
35,160,301 UART: Running Caliptra FMC ...
35,161,422 UART:
35,161,593 UART: [state] CFI Enabled
35,205,784 UART: [art] Extend RT PCRs Done
35,206,973 UART: [art] Lock RT PCRs Done
35,208,307 UART: [art] Populate DV Done
35,213,717 UART: [fht] FMC Alias Private Key: 7
35,215,333 UART: [art] Derive CDI
35,216,112 UART: [art] Store in slot 0x4
35,258,690 UART: [art] Derive Key Pair
35,259,731 UART: [art] Store priv key in slot 0x5
37,687,138 UART: [art] Derive Key Pair - Done
37,700,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,406,943 UART: [art] Erasing AUTHORITY.KEYID = 7
39,408,459 UART: [art] PUB.X = DDF84070C7C0DB49D78207FCCB292B4B44F3EADF5C267B7F5C46EFD44474EE3BC2DC3AB9ACBD9D72897777FCB3CF3A08
39,415,746 UART: [art] PUB.Y = 7FE81FAE49FDC5326AF7B7E66DDBAE528A2445F43A6AC964E67264470E4886284B8DD17793BD5D829BD1F8E276C80213
39,423,002 UART: [art] SIG.R = C6DED6774267CC459058CF369F31B4E91939BA0ACB68B1358052BF1E64CADD451C3A13B4FE717D7CA4635577B408D16D
39,430,421 UART: [art] SIG.S = 6680152468540A6D440DFC0B4959DF40A550F8BDC41D2A5A4A1F4257F02CE3B7FCBCF3D16C6A604ADBA375BA70B06573
40,409,177 UART: Caliptra RT
40,409,876 UART: [state] CFI Enabled
40,781,665 UART: [rt] RT listening for mailbox commands...
40,783,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,813,338 UART: [rt]cmd =0x494e464f, len=4
40,817,690 >>> mbox cmd response data (312 bytes)
42,881,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
50,107,440 >>> mbox cmd response: success
50,142,818 UART:
50,143,145 UART: Running Caliptra FMC ...
50,144,281 UART:
50,144,462 UART: [state] CFI Enabled
50,188,166 UART: [art] Extend RT PCRs Done
50,189,318 UART: [art] Lock RT PCRs Done
50,190,630 UART: [art] Populate DV Done
50,196,032 UART: [fht] FMC Alias Private Key: 7
50,197,738 UART: [art] Derive CDI
50,198,551 UART: [art] Store in slot 0x4
50,241,065 UART: [art] Derive Key Pair
50,242,115 UART: [art] Store priv key in slot 0x5
52,668,855 UART: [art] Derive Key Pair - Done
52,681,801 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,388,486 UART: [art] Erasing AUTHORITY.KEYID = 7
54,389,987 UART: [art] PUB.X = 9AA3C8BF848996395FD8FDDB049BAD31CDD56FDD2F0EDA6DE6244A81228769BD9175B02BFCB8B3D2608164C1BB6FE8CC
54,397,243 UART: [art] PUB.Y = 88E074EFB8E8F5155A2C6CB623D562FCBB59A80C4FAD2A6C60F7A5468DA430D8768C94BD48F38150C67DF08B561E5436
54,404,551 UART: [art] SIG.R = EA351130AC9FED246ED5272A6C1D1DBE3B8E1A5669DBF9F95D4D590F59921B1CE66138267E8D4AA54503D016F98C3941
54,411,900 UART: [art] SIG.S = ACDFB44384BAA63B89518F4C48293C3B3F1AFA7348F728178D84650E8FDF464DF0545364BBC9736F3A0D0A6B0FBDD4EE
55,390,721 UART: Caliptra RT
55,391,436 UART: [state] CFI Enabled
55,758,378 UART: [rt] RT listening for mailbox commands...
55,760,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,789,961 UART: [rt]cmd =0x494e464f, len=4
55,794,346 >>> mbox cmd response data (312 bytes)
55,796,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
63,014,553 >>> mbox cmd response: success
63,050,131 UART:
63,050,407 UART: Running Caliptra FMC ...
63,051,528 UART:
63,051,697 UART: [state] CFI Enabled
63,095,617 UART: [art] Extend RT PCRs Done
63,096,803 UART: [art] Lock RT PCRs Done
63,098,050 UART: [art] Populate DV Done
63,103,523 UART: [fht] FMC Alias Private Key: 7
63,105,070 UART: [art] Derive CDI
63,105,889 UART: [art] Store in slot 0x4
63,148,646 UART: [art] Derive Key Pair
63,149,649 UART: [art] Store priv key in slot 0x5
65,576,773 UART: [art] Derive Key Pair - Done
65,589,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,296,387 UART: [art] Erasing AUTHORITY.KEYID = 7
67,297,890 UART: [art] PUB.X = DDF84070C7C0DB49D78207FCCB292B4B44F3EADF5C267B7F5C46EFD44474EE3BC2DC3AB9ACBD9D72897777FCB3CF3A08
67,305,213 UART: [art] PUB.Y = 7FE81FAE49FDC5326AF7B7E66DDBAE528A2445F43A6AC964E67264470E4886284B8DD17793BD5D829BD1F8E276C80213
67,312,514 UART: [art] SIG.R = C6DED6774267CC459058CF369F31B4E91939BA0ACB68B1358052BF1E64CADD451C3A13B4FE717D7CA4635577B408D16D
67,319,911 UART: [art] SIG.S = 6680152468540A6D440DFC0B4959DF40A550F8BDC41D2A5A4A1F4257F02CE3B7FCBCF3D16C6A604ADBA375BA70B06573
68,298,342 UART: Caliptra RT
68,299,046 UART: [state] CFI Enabled
68,670,848 UART: [rt] RT listening for mailbox commands...
68,672,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,702,668 UART: [rt]cmd =0x494e464f, len=4
68,706,860 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.55s
Truncated 1498 bytes from beginning
_for_fw is high
3,525,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,265 UART: [idev] Erasing UDS.KEYID = 0
6,027,545 UART: [idev] Sha1 KeyId Algorithm
6,050,006 UART: [idev] --
6,054,926 UART: [ldev] ++
6,055,661 UART: [ldev] CDI.KEYID = 6
6,056,551 UART: [ldev] SUBJECT.KEYID = 5
6,057,734 UART: [ldev] AUTHORITY.KEYID = 7
6,058,969 UART: [ldev] FE.KEYID = 1
6,099,393 UART: [ldev] Erasing FE.KEYID = 1
8,607,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,166 UART: [ldev] --
10,413,007 UART: [fwproc] Wait for Commands...
10,414,941 UART: [fwproc] Recv command 0x46574c44
10,417,247 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,172 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,786 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,369 >>> mbox cmd response: success
14,677,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,680,936 UART: [afmc] ++
14,681,622 UART: [afmc] CDI.KEYID = 6
14,682,855 UART: [afmc] SUBJECT.KEYID = 7
14,684,284 UART: [afmc] AUTHORITY.KEYID = 5
17,215,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,882 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
18,975,037 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
18,990,183 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
19,005,111 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
19,029,110 UART: [afmc] --
19,033,393 UART: [cold-reset] --
19,036,930 UART: [state] Locking Datavault
19,042,455 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,642 UART: [state] Locking ICCM
19,047,011 UART: [exit] Launching FMC @ 0x40000130
19,055,677 UART:
19,055,909 UART: Running Caliptra FMC ...
19,056,949 UART:
19,057,105 UART: [state] CFI Enabled
19,115,793 UART: [fht] FMC Alias Private Key: 7
20,882,040 UART: [art] Extend RT PCRs Done
20,883,261 UART: [art] Lock RT PCRs Done
20,885,180 UART: [art] Populate DV Done
20,890,531 UART: [fht] FMC Alias Private Key: 7
20,892,227 UART: [art] Derive CDI
20,893,038 UART: [art] Store in slot 0x4
20,948,479 UART: [art] Derive Key Pair
20,949,506 UART: [art] Store priv key in slot 0x5
23,411,696 UART: [art] Derive Key Pair - Done
23,424,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,803 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,306 UART: [art] PUB.X = 4EBB6FEAF8493DC49622147B9EA08BA797D1F110CB5AD92A96D5DE291AF08C003CF860B952550652447CBD579BF4E588
25,145,591 UART: [art] PUB.Y = 2307ABD1BDE31E9AF67072239924C84B0CC6C3C8079FF43C43F906256289C4D623DD5E9E1FF72A121F4855F4330877E0
25,152,783 UART: [art] SIG.R = 7BC5342C84FD9AE992D3FC3FCD3D9FD7C36AE964E8506785A85F2F847F4050E378F3A7078A6BB7F648D2AC868589907F
25,160,193 UART: [art] SIG.S = 8C7B3888EE8160F2F32838A87F7C90BF0CFC116AE1D8ECC7283229F65B674A652231943236114092B11633DB59456684
26,138,688 UART: Caliptra RT
26,139,398 UART: [state] CFI Enabled
26,320,809 UART: [rt] RT listening for mailbox commands...
26,352,442 UART: [rt]cmd =0x494e464f, len=4
26,356,718 >>> mbox cmd response data (312 bytes)
28,423,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,574,701 UART:
28,575,069 UART: Running Caliptra ROM ...
28,576,130 UART:
28,576,281 UART: [state] CFI Enabled
28,651,686 UART: [state] LifecycleState = Unprovisioned
28,653,788 UART: [state] DebugLocked = No
28,654,937 UART: [state] WD Timer not started. Device not locked for debugging
28,658,410 UART: [kat] SHA2-256
28,848,223 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,859,013 UART: [kat] ++
28,859,472 UART: [kat] sha1
28,870,850 UART: [kat] SHA2-256
28,873,864 UART: [kat] SHA2-384
28,879,756 UART: [kat] SHA2-512-ACC
28,882,345 UART: [kat] ECC-384
31,333,999 UART: [kat] HMAC-384Kdf
31,359,089 UART: [kat] LMS
31,890,657 UART: [kat] --
31,895,587 UART: [update-reset] ++
35,400,892 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,403,731 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,033,526 >>> mbox cmd response: success
36,035,518 UART: [update-reset] Copying MAN_2 To MAN_1
36,073,045 UART: [update-reset Success] --
36,077,698 UART: [state] Locking Datavault
36,082,366 UART: [state] Locking PCR0, PCR1 and PCR31
36,084,505 UART: [state] Locking ICCM
36,087,360 UART: [exit] Launching FMC @ 0x40000130
36,095,987 UART:
36,096,220 UART: Running Caliptra FMC ...
36,097,264 UART:
36,097,413 UART: [state] CFI Enabled
36,190,563 UART: [art] Extend RT PCRs Done
36,191,749 UART: [art] Lock RT PCRs Done
36,193,515 UART: [art] Populate DV Done
36,198,978 UART: [fht] FMC Alias Private Key: 7
36,200,510 UART: [art] Derive CDI
36,201,242 UART: [art] Store in slot 0x4
36,259,735 UART: [art] Derive Key Pair
36,260,775 UART: [art] Store priv key in slot 0x5
38,723,361 UART: [art] Derive Key Pair - Done
38,736,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,449,176 UART: [art] Erasing AUTHORITY.KEYID = 7
40,450,682 UART: [art] PUB.X = E0D5D5FD6190C8929D7D58AAC1546BC558355443F81960099F99DC53C2A6FEFBCEB538CD7E9AA10403A129C142E9836A
40,457,930 UART: [art] PUB.Y = B5387392457391C82429E4489143CF33468B02CA47F12187FAA6913BDE81075A508E26EAAF2C27DAB0CBBD50EA58A3EC
40,465,215 UART: [art] SIG.R = F6F66D5ABCA41F05C74FE47F4427B71E63F2539FFCCE18E1E482688D630ACA6E3E8AC8F0910A852FEDB29F3EA1FCDB74
40,472,656 UART: [art] SIG.S = AB24AE0E63AE96095EB2602CCF8DF4D8EAB15A584FB35798179B830233075636FEF8C8F6C54839F4590BD0C84F637547
41,451,937 UART: Caliptra RT
41,452,637 UART: [state] CFI Enabled
41,870,543 UART: [rt] RT listening for mailbox commands...
41,872,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,902,009 UART: [rt]cmd =0x494e464f, len=4
41,906,287 >>> mbox cmd response data (312 bytes)
43,971,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,121,903 UART:
44,122,293 UART: Running Caliptra ROM ...
44,123,396 UART:
44,123,559 UART: [state] CFI Enabled
44,177,020 UART: [state] LifecycleState = Unprovisioned
44,179,159 UART: [state] DebugLocked = No
44,181,789 UART: [state] WD Timer not started. Device not locked for debugging
44,187,124 UART: [kat] SHA2-256
44,376,972 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
44,387,767 UART: [kat] ++
44,388,251 UART: [kat] sha1
44,400,316 UART: [kat] SHA2-256
44,403,309 UART: [kat] SHA2-384
44,409,731 UART: [kat] SHA2-512-ACC
44,412,294 UART: [kat] ECC-384
46,871,250 UART: [kat] HMAC-384Kdf
46,895,094 UART: [kat] LMS
47,426,647 UART: [kat] --
47,432,049 UART: [update-reset] ++
50,938,954 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,943,055 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
51,572,782 >>> mbox cmd response: success
51,573,458 UART: [update-reset] Copying MAN_2 To MAN_1
51,611,032 UART: [update-reset Success] --
51,615,735 UART: [state] Locking Datavault
51,619,103 UART: [state] Locking PCR0, PCR1 and PCR31
51,621,289 UART: [state] Locking ICCM
51,624,140 UART: [exit] Launching FMC @ 0x40000130
51,632,807 UART:
51,633,045 UART: Running Caliptra FMC ...
51,634,151 UART:
51,634,309 UART: [state] CFI Enabled
51,727,447 UART: [art] Extend RT PCRs Done
51,728,624 UART: [art] Lock RT PCRs Done
51,729,912 UART: [art] Populate DV Done
51,735,264 UART: [fht] FMC Alias Private Key: 7
51,736,932 UART: [art] Derive CDI
51,737,746 UART: [art] Store in slot 0x4
51,796,457 UART: [art] Derive Key Pair
51,797,492 UART: [art] Store priv key in slot 0x5
54,260,243 UART: [art] Derive Key Pair - Done
54,273,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,985,798 UART: [art] Erasing AUTHORITY.KEYID = 7
55,987,784 UART: [art] PUB.X = 8576A28E4D7FA400A4D488C68109B2DD01D794C7F883E336279BB47D62C7EC1E298DB7810D06D4FE5CDD3B2DCE4B1C79
55,994,595 UART: [art] PUB.Y = 5223F501AFB7E9FAC6C6A68D44CA9932491A4EF2B904DBD85DA5480D6713656328B311BBE93085D0D03543C320045244
56,001,843 UART: [art] SIG.R = 1F79841DF322DD6F77D8F3A4E56AACECC372702575A336E828AE0023FB78AFDF166354D949B2D86C11905B5B75BF8562
56,009,187 UART: [art] SIG.S = 805CD4DB3FFCDC772DB12266D6FA9A2EE51D08841A1D78BDCDD1462B7B7669FD10860B60AE1E7F9E7AB8351006D52F82
56,988,026 UART: Caliptra RT
56,988,744 UART: [state] CFI Enabled
57,412,835 UART: [rt] RT listening for mailbox commands...
57,414,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,444,627 UART: [rt]cmd =0x494e464f, len=4
57,449,016 >>> mbox cmd response data (312 bytes)
57,450,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
57,601,082 UART:
57,601,399 UART: Running Caliptra ROM ...
57,602,518 UART:
57,602,682 UART: [state] CFI Enabled
57,672,418 UART: [state] LifecycleState = Unprovisioned
57,674,502 UART: [state] DebugLocked = No
57,677,339 UART: [state] WD Timer not started. Device not locked for debugging
57,681,133 UART: [kat] SHA2-256
57,870,950 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
57,881,739 UART: [kat] ++
57,882,273 UART: [kat] sha1
57,894,187 UART: [kat] SHA2-256
57,897,192 UART: [kat] SHA2-384
57,902,633 UART: [kat] SHA2-512-ACC
57,905,219 UART: [kat] ECC-384
60,359,127 UART: [kat] HMAC-384Kdf
60,380,750 UART: [kat] LMS
60,912,336 UART: [kat] --
60,916,562 UART: [update-reset] ++
64,422,140 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
64,424,712 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
65,054,465 >>> mbox cmd response: success
65,056,325 UART: [update-reset] Copying MAN_2 To MAN_1
65,093,904 UART: [update-reset Success] --
65,099,221 UART: [state] Locking Datavault
65,103,017 UART: [state] Locking PCR0, PCR1 and PCR31
65,105,216 UART: [state] Locking ICCM
65,107,635 UART: [exit] Launching FMC @ 0x40000130
65,116,298 UART:
65,116,553 UART: Running Caliptra FMC ...
65,117,676 UART:
65,117,832 UART: [state] CFI Enabled
65,213,026 UART: [art] Extend RT PCRs Done
65,214,214 UART: [art] Lock RT PCRs Done
65,215,339 UART: [art] Populate DV Done
65,221,118 UART: [fht] FMC Alias Private Key: 7
65,222,698 UART: [art] Derive CDI
65,223,440 UART: [art] Store in slot 0x4
65,281,882 UART: [art] Derive Key Pair
65,282,923 UART: [art] Store priv key in slot 0x5
67,745,767 UART: [art] Derive Key Pair - Done
67,758,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
69,471,768 UART: [art] Erasing AUTHORITY.KEYID = 7
69,473,270 UART: [art] PUB.X = E0D5D5FD6190C8929D7D58AAC1546BC558355443F81960099F99DC53C2A6FEFBCEB538CD7E9AA10403A129C142E9836A
69,480,517 UART: [art] PUB.Y = B5387392457391C82429E4489143CF33468B02CA47F12187FAA6913BDE81075A508E26EAAF2C27DAB0CBBD50EA58A3EC
69,487,762 UART: [art] SIG.R = F6F66D5ABCA41F05C74FE47F4427B71E63F2539FFCCE18E1E482688D630ACA6E3E8AC8F0910A852FEDB29F3EA1FCDB74
69,495,226 UART: [art] SIG.S = AB24AE0E63AE96095EB2602CCF8DF4D8EAB15A584FB35798179B830233075636FEF8C8F6C54839F4590BD0C84F637547
70,474,058 UART: Caliptra RT
70,474,759 UART: [state] CFI Enabled
70,897,697 UART: [rt] RT listening for mailbox commands...
70,899,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,929,138 UART: [rt]cmd =0x494e464f, len=4
70,933,407 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
3,438,997 ready_for_fw is high
3,439,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,849,087 >>> mbox cmd response: success
14,849,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,132,743 UART:
19,133,169 UART: Running Caliptra FMC ...
19,134,311 UART:
19,134,466 UART: [state] CFI Enabled
19,199,875 UART: [fht] FMC Alias Private Key: 7
20,965,798 UART: [art] Extend RT PCRs Done
20,967,033 UART: [art] Lock RT PCRs Done
20,968,824 UART: [art] Populate DV Done
20,974,162 UART: [fht] FMC Alias Private Key: 7
20,975,712 UART: [art] Derive CDI
20,976,526 UART: [art] Store in slot 0x4
21,033,063 UART: [art] Derive Key Pair
21,034,111 UART: [art] Store priv key in slot 0x5
23,496,991 UART: [art] Derive Key Pair - Done
23,510,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,993 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,499 UART: [art] PUB.X = 67AD3CB285DA42E2F41F9F5525BD4C02AC54ED25FF5621C9E05AB88D01E67ADB59075141A8A1D983F4E1F66BEC42A1F5
25,231,824 UART: [art] PUB.Y = 1F57501EDBF865A4DCB50033AE266E076649626DB08061443AD507A64807FB28BA28EB7EB0C365F11A8BCB4525CD1502
25,239,017 UART: [art] SIG.R = 21C3BE44F38F7292F099DFB9F1DA141A65A8D14A9287C9ECAF25A4464E03A5BD4C755E1FA3E85ED25237EFA396ED4EBD
25,246,478 UART: [art] SIG.S = 120167EA39F422582E53811AF96990ED5ACCD3834BE2A1A24617FB5D94DD191AAA49480A2C036030BCF2449773C14795
26,226,484 UART: Caliptra RT
26,227,188 UART: [state] CFI Enabled
26,406,882 UART: [rt] RT listening for mailbox commands...
26,438,143 UART: [rt]cmd =0x494e464f, len=4
26,442,435 >>> mbox cmd response data (312 bytes)
28,507,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,404,755 >>> mbox cmd response: success
36,440,930 UART:
36,441,368 UART: Running Caliptra FMC ...
36,442,441 UART:
36,442,602 UART: [state] CFI Enabled
36,537,844 UART: [art] Extend RT PCRs Done
36,539,054 UART: [art] Lock RT PCRs Done
36,540,338 UART: [art] Populate DV Done
36,545,909 UART: [fht] FMC Alias Private Key: 7
36,547,548 UART: [art] Derive CDI
36,548,356 UART: [art] Store in slot 0x4
36,606,971 UART: [art] Derive Key Pair
36,608,038 UART: [art] Store priv key in slot 0x5
39,070,429 UART: [art] Derive Key Pair - Done
39,083,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,796,266 UART: [art] Erasing AUTHORITY.KEYID = 7
40,797,773 UART: [art] PUB.X = FE250526645385070A0026453101CBF80C47B596BCC3E681B28F0E56C4FEC3B3F87E6A7A4E73B587C762A69EC0D94EF8
40,805,007 UART: [art] PUB.Y = BBC2F2892E24EAA41051953FB3AE37EB58EB6CCAFAC1A1F02F92AF4FD2CFB6E14397571996951A05CC9E866989D9BE0C
40,812,315 UART: [art] SIG.R = 988B0ACEC86D4BE3B21DDEFDB08F7E59BAE1E8BE4779FAA3DED0A9F207A72BFE2D93C93254F609411E5025F98A9B0B18
40,819,688 UART: [art] SIG.S = E3409AA9D35A55B09E1F8D4FA2FCAC8E843424264187BAFC45E95E2761E70FBB5D0957215F6FABEFEF3DDE4C7BC6E321
41,798,872 UART: Caliptra RT
41,799,564 UART: [state] CFI Enabled
42,214,252 UART: [rt] RT listening for mailbox commands...
42,216,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,245,776 UART: [rt]cmd =0x494e464f, len=4
42,249,997 >>> mbox cmd response data (312 bytes)
44,315,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
52,219,496 >>> mbox cmd response: success
52,255,147 UART:
52,255,447 UART: Running Caliptra FMC ...
52,256,559 UART:
52,256,733 UART: [state] CFI Enabled
52,362,287 UART: [art] Extend RT PCRs Done
52,363,476 UART: [art] Lock RT PCRs Done
52,364,771 UART: [art] Populate DV Done
52,370,142 UART: [fht] FMC Alias Private Key: 7
52,371,676 UART: [art] Derive CDI
52,372,455 UART: [art] Store in slot 0x4
52,431,698 UART: [art] Derive Key Pair
52,432,692 UART: [art] Store priv key in slot 0x5
54,895,736 UART: [art] Derive Key Pair - Done
54,908,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
56,621,196 UART: [art] Erasing AUTHORITY.KEYID = 7
56,622,696 UART: [art] PUB.X = 80607BCF4B5849304F506B75A8072BDF3EE739EEAB8755F7862F16BA3EA71F03AFF25A0C9AEA740BC626288CE84E48F7
56,630,026 UART: [art] PUB.Y = 17A8DBF2C0B4B2225465CF4A420F19ABF8E1193A2713E5E861C8D5371A2F61DF36FE186C05B2D3A4C25C8FDE8DC7CE3E
56,637,279 UART: [art] SIG.R = 74AEB25CD9524D63D6F451E16FD8917DF2B60FD9E1EDDB5E3E01B586712A5C243D38106715F37FD618BC74DF4990FE91
56,644,700 UART: [art] SIG.S = 69976824F6260E9A5F19D92C52ED7D53DA072D97437F81BA0389F251944FCC00BF0BCE6EC03AF8E2FE59D400A6F7BA37
57,623,401 UART: Caliptra RT
57,624,113 UART: [state] CFI Enabled
58,047,800 UART: [rt] RT listening for mailbox commands...
58,049,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
58,079,576 UART: [rt]cmd =0x494e464f, len=4
58,083,862 >>> mbox cmd response data (312 bytes)
58,085,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
65,998,205 >>> mbox cmd response: success
66,032,001 UART:
66,032,278 UART: Running Caliptra FMC ...
66,033,394 UART:
66,033,554 UART: [state] CFI Enabled
66,121,686 UART: [art] Extend RT PCRs Done
66,122,883 UART: [art] Lock RT PCRs Done
66,124,502 UART: [art] Populate DV Done
66,129,903 UART: [fht] FMC Alias Private Key: 7
66,131,594 UART: [art] Derive CDI
66,132,403 UART: [art] Store in slot 0x4
66,191,004 UART: [art] Derive Key Pair
66,192,003 UART: [art] Store priv key in slot 0x5
68,655,070 UART: [art] Derive Key Pair - Done
68,667,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
70,381,104 UART: [art] Erasing AUTHORITY.KEYID = 7
70,382,614 UART: [art] PUB.X = FE250526645385070A0026453101CBF80C47B596BCC3E681B28F0E56C4FEC3B3F87E6A7A4E73B587C762A69EC0D94EF8
70,389,854 UART: [art] PUB.Y = BBC2F2892E24EAA41051953FB3AE37EB58EB6CCAFAC1A1F02F92AF4FD2CFB6E14397571996951A05CC9E866989D9BE0C
70,397,120 UART: [art] SIG.R = 988B0ACEC86D4BE3B21DDEFDB08F7E59BAE1E8BE4779FAA3DED0A9F207A72BFE2D93C93254F609411E5025F98A9B0B18
70,404,552 UART: [art] SIG.S = E3409AA9D35A55B09E1F8D4FA2FCAC8E843424264187BAFC45E95E2761E70FBB5D0957215F6FABEFEF3DDE4C7BC6E321
71,383,570 UART: Caliptra RT
71,384,265 UART: [state] CFI Enabled
71,806,597 UART: [rt] RT listening for mailbox commands...
71,808,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
71,838,452 UART: [rt]cmd =0x494e464f, len=4
71,842,725 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.71s
Truncated 1498 bytes from beginning
_for_fw is high
3,859,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,447 UART: [idev] Erasing UDS.KEYID = 0
6,336,535 UART: [idev] Sha1 KeyId Algorithm
6,359,495 UART: [idev] --
6,364,472 UART: [ldev] ++
6,365,157 UART: [ldev] CDI.KEYID = 6
6,366,073 UART: [ldev] SUBJECT.KEYID = 5
6,367,260 UART: [ldev] AUTHORITY.KEYID = 7
6,368,496 UART: [ldev] FE.KEYID = 1
6,380,768 UART: [ldev] Erasing FE.KEYID = 1
8,857,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,743 UART: [ldev] --
10,650,228 UART: [fwproc] Wait for Commands...
10,651,823 UART: [fwproc] Recv command 0x46574c44
10,654,084 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,279 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,906 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,930 >>> mbox cmd response: success
14,912,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,915,295 UART: [afmc] ++
14,915,994 UART: [afmc] CDI.KEYID = 6
14,917,182 UART: [afmc] SUBJECT.KEYID = 7
14,918,674 UART: [afmc] AUTHORITY.KEYID = 5
17,421,660 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,892 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
19,162,090 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
19,177,229 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
19,192,138 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
19,214,500 UART: [afmc] --
19,218,243 UART: [cold-reset] --
19,222,500 UART: [state] Locking Datavault
19,229,919 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,062 UART: [state] Locking ICCM
19,234,766 UART: [exit] Launching FMC @ 0x40000130
19,243,445 UART:
19,243,690 UART: Running Caliptra FMC ...
19,244,799 UART:
19,244,959 UART: [state] CFI Enabled
19,253,039 UART: [fht] FMC Alias Private Key: 7
21,019,381 UART: [art] Extend RT PCRs Done
21,020,608 UART: [art] Lock RT PCRs Done
21,021,890 UART: [art] Populate DV Done
21,027,207 UART: [fht] FMC Alias Private Key: 7
21,028,807 UART: [art] Derive CDI
21,029,551 UART: [art] Store in slot 0x4
21,072,630 UART: [art] Derive Key Pair
21,073,677 UART: [art] Store priv key in slot 0x5
23,500,147 UART: [art] Derive Key Pair - Done
23,512,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,077 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,591 UART: [art] PUB.X = 5D5AFEDD4213B641135D5965DAF3916D301EC7940D7749B6D6A1DD8CBB525A8F34009A1C001237CCA40FDEE2C5FA7DFD
25,227,856 UART: [art] PUB.Y = 62242613E599727CDC8EBA2A842E61817F3145226E2E3DF50F168894C8CC54D02AFAC56F21175DB9FB0EC81393BE982F
25,235,109 UART: [art] SIG.R = 0B0654C13E347DCEDB4FEB1D2AD14949B596F6DDBAC886E63960260ED1F10120B7DA4B9B25A7E4BA26321DD6146D1395
25,242,521 UART: [art] SIG.S = AA0C9289FA35C8546843ACB4D15B07F59BA701E041763D8C2E5F286734E67BF730773A1C00832A54ECA3C0073CF05735
26,220,995 UART: Caliptra RT
26,221,684 UART: [state] CFI Enabled
26,354,636 UART: [rt] RT listening for mailbox commands...
26,386,212 UART: [rt]cmd =0x494e464f, len=4
26,390,654 >>> mbox cmd response data (312 bytes)
28,457,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,608,289 UART:
28,608,668 UART: Running Caliptra ROM ...
28,609,811 UART:
28,609,977 UART: [state] CFI Enabled
28,624,570 UART: [state] LifecycleState = Unprovisioned
28,626,417 UART: [state] DebugLocked = No
28,628,768 UART: [state] WD Timer not started. Device not locked for debugging
28,632,806 UART: [kat] SHA2-256
28,822,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,833,398 UART: [kat] ++
28,833,969 UART: [kat] sha1
28,845,347 UART: [kat] SHA2-256
28,848,326 UART: [kat] SHA2-384
28,854,493 UART: [kat] SHA2-512-ACC
28,857,086 UART: [kat] ECC-384
31,298,597 UART: [kat] HMAC-384Kdf
31,310,628 UART: [kat] LMS
31,842,239 UART: [kat] --
31,846,979 UART: [update-reset] ++
35,351,719 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,355,323 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,985,057 >>> mbox cmd response: success
35,986,282 UART: [update-reset] Copying MAN_2 To MAN_1
36,023,856 UART: [update-reset Success] --
36,027,762 UART: [state] Locking Datavault
36,032,168 UART: [state] Locking PCR0, PCR1 and PCR31
36,034,320 UART: [state] Locking ICCM
36,036,646 UART: [exit] Launching FMC @ 0x40000130
36,045,340 UART:
36,045,580 UART: Running Caliptra FMC ...
36,046,705 UART:
36,046,872 UART: [state] CFI Enabled
36,090,570 UART: [art] Extend RT PCRs Done
36,091,750 UART: [art] Lock RT PCRs Done
36,093,051 UART: [art] Populate DV Done
36,098,462 UART: [fht] FMC Alias Private Key: 7
36,100,109 UART: [art] Derive CDI
36,100,924 UART: [art] Store in slot 0x4
36,143,683 UART: [art] Derive Key Pair
36,144,685 UART: [art] Store priv key in slot 0x5
38,571,891 UART: [art] Derive Key Pair - Done
38,585,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,291,117 UART: [art] Erasing AUTHORITY.KEYID = 7
40,292,628 UART: [art] PUB.X = 8C035D50583D8AAF6DD0257ABCC53AD7ED5B4A48737D750A1449E3614D24604A5ACC594E9EEEF53EB13A1EB0940F3CD4
40,299,903 UART: [art] PUB.Y = A0F9C17120C0FD5C5A6AA983B4B7111333120A33501245FDFECD0ED77C1CCA61793E176F34E8917F5A6DF36B8862224D
40,307,154 UART: [art] SIG.R = 840F00C29EB75A6A17C8BEEBA34495D59759E99BE6AC41AD2EDDDE5643784496B5DADBED184115EBC9E113BCA363D6B0
40,314,586 UART: [art] SIG.S = 04143713C11AEB446EDEE755735EC6B30ADCE507ADCB07E3AABDECE66A67F666E75A59DDFF7685C1F7216EA5691B6152
41,293,201 UART: Caliptra RT
41,293,919 UART: [state] CFI Enabled
41,664,484 UART: [rt] RT listening for mailbox commands...
41,666,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,696,195 UART: [rt]cmd =0x494e464f, len=4
41,700,560 >>> mbox cmd response data (312 bytes)
43,769,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,920,155 UART:
43,920,508 UART: Running Caliptra ROM ...
43,921,640 UART:
43,921,822 UART: [state] CFI Enabled
43,937,900 UART: [state] LifecycleState = Unprovisioned
43,939,781 UART: [state] DebugLocked = No
43,941,149 UART: [state] WD Timer not started. Device not locked for debugging
43,945,628 UART: [kat] SHA2-256
44,135,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
44,146,279 UART: [kat] ++
44,146,796 UART: [kat] sha1
44,157,313 UART: [kat] SHA2-256
44,160,290 UART: [kat] SHA2-384
44,166,448 UART: [kat] SHA2-512-ACC
44,169,025 UART: [kat] ECC-384
46,610,378 UART: [kat] HMAC-384Kdf
46,623,527 UART: [kat] LMS
47,155,139 UART: [kat] --
47,159,722 UART: [update-reset] ++
50,663,949 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,667,782 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
51,297,543 >>> mbox cmd response: success
51,299,453 UART: [update-reset] Copying MAN_2 To MAN_1
51,337,032 UART: [update-reset Success] --
51,341,877 UART: [state] Locking Datavault
51,344,977 UART: [state] Locking PCR0, PCR1 and PCR31
51,347,188 UART: [state] Locking ICCM
51,350,079 UART: [exit] Launching FMC @ 0x40000130
51,358,759 UART:
51,358,993 UART: Running Caliptra FMC ...
51,360,024 UART:
51,360,177 UART: [state] CFI Enabled
51,404,680 UART: [art] Extend RT PCRs Done
51,405,861 UART: [art] Lock RT PCRs Done
51,407,345 UART: [art] Populate DV Done
51,412,969 UART: [fht] FMC Alias Private Key: 7
51,414,534 UART: [art] Derive CDI
51,415,309 UART: [art] Store in slot 0x4
51,457,797 UART: [art] Derive Key Pair
51,458,842 UART: [art] Store priv key in slot 0x5
53,886,299 UART: [art] Derive Key Pair - Done
53,899,198 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,605,844 UART: [art] Erasing AUTHORITY.KEYID = 7
55,607,332 UART: [art] PUB.X = 1715EFE363572DC43EDFE8ADC2919D5E4FF073EFD5112989D01EB30F45DA6F58F8E5BC6B0AF2BAC8E59E2B04310F0933
55,614,681 UART: [art] PUB.Y = 14F6DCDC0A57F32ED005E56DDE957D07D9233F1A4EDD942477DDF3673DDFA25774AB6EDAB844C927B83095BD5FA79A4C
55,621,958 UART: [art] SIG.R = 71357B40434FA018F653695092F79B1B9DA478B5DE5EC9D03CEF09FBC03E901E0E8AF7C13BDD83AEF1CA675E0906A4B5
55,629,342 UART: [art] SIG.S = 09EECB764A813222B9B088E2E188579F4B273FA3429AC571F076899E63EDF2394717EE6B0138239B52FA3BB5EC8E3999
56,608,464 UART: Caliptra RT
56,609,170 UART: [state] CFI Enabled
56,981,683 UART: [rt] RT listening for mailbox commands...
56,983,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,013,379 UART: [rt]cmd =0x494e464f, len=4
57,017,679 >>> mbox cmd response data (312 bytes)
57,019,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
57,169,469 UART:
57,169,776 UART: Running Caliptra ROM ...
57,170,899 UART:
57,171,113 UART: [state] CFI Enabled
57,187,379 UART: [state] LifecycleState = Unprovisioned
57,189,219 UART: [state] DebugLocked = No
57,192,005 UART: [state] WD Timer not started. Device not locked for debugging
57,196,967 UART: [kat] SHA2-256
57,386,862 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
57,397,627 UART: [kat] ++
57,398,228 UART: [kat] sha1
57,409,178 UART: [kat] SHA2-256
57,412,199 UART: [kat] SHA2-384
57,418,406 UART: [kat] SHA2-512-ACC
57,420,998 UART: [kat] ECC-384
59,864,529 UART: [kat] HMAC-384Kdf
59,878,277 UART: [kat] LMS
60,409,859 UART: [kat] --
60,413,173 UART: [update-reset] ++
63,921,708 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,925,145 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
64,554,855 >>> mbox cmd response: success
64,556,286 UART: [update-reset] Copying MAN_2 To MAN_1
64,593,876 UART: [update-reset Success] --
64,599,348 UART: [state] Locking Datavault
64,604,191 UART: [state] Locking PCR0, PCR1 and PCR31
64,606,342 UART: [state] Locking ICCM
64,607,852 UART: [exit] Launching FMC @ 0x40000130
64,616,480 UART:
64,616,716 UART: Running Caliptra FMC ...
64,617,843 UART:
64,618,004 UART: [state] CFI Enabled
64,662,201 UART: [art] Extend RT PCRs Done
64,663,399 UART: [art] Lock RT PCRs Done
64,664,967 UART: [art] Populate DV Done
64,670,489 UART: [fht] FMC Alias Private Key: 7
64,672,141 UART: [art] Derive CDI
64,672,954 UART: [art] Store in slot 0x4
64,715,607 UART: [art] Derive Key Pair
64,716,610 UART: [art] Store priv key in slot 0x5
67,144,165 UART: [art] Derive Key Pair - Done
67,157,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
68,863,319 UART: [art] Erasing AUTHORITY.KEYID = 7
68,864,823 UART: [art] PUB.X = 8C035D50583D8AAF6DD0257ABCC53AD7ED5B4A48737D750A1449E3614D24604A5ACC594E9EEEF53EB13A1EB0940F3CD4
68,872,102 UART: [art] PUB.Y = A0F9C17120C0FD5C5A6AA983B4B7111333120A33501245FDFECD0ED77C1CCA61793E176F34E8917F5A6DF36B8862224D
68,879,373 UART: [art] SIG.R = 840F00C29EB75A6A17C8BEEBA34495D59759E99BE6AC41AD2EDDDE5643784496B5DADBED184115EBC9E113BCA363D6B0
68,886,824 UART: [art] SIG.S = 04143713C11AEB446EDEE755735EC6B30ADCE507ADCB07E3AABDECE66A67F666E75A59DDFF7685C1F7216EA5691B6152
69,866,019 UART: Caliptra RT
69,866,725 UART: [state] CFI Enabled
70,236,047 UART: [rt] RT listening for mailbox commands...
70,237,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,267,645 UART: [rt]cmd =0x494e464f, len=4
70,271,817 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,758,109 ready_for_fw is high
3,758,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,052,140 >>> mbox cmd response: success
15,053,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,304,415 UART:
19,304,842 UART: Running Caliptra FMC ...
19,305,961 UART:
19,306,116 UART: [state] CFI Enabled
19,314,440 UART: [fht] FMC Alias Private Key: 7
21,080,553 UART: [art] Extend RT PCRs Done
21,081,783 UART: [art] Lock RT PCRs Done
21,083,229 UART: [art] Populate DV Done
21,089,054 UART: [fht] FMC Alias Private Key: 7
21,090,603 UART: [art] Derive CDI
21,091,347 UART: [art] Store in slot 0x4
21,134,103 UART: [art] Derive Key Pair
21,135,124 UART: [art] Store priv key in slot 0x5
23,562,511 UART: [art] Derive Key Pair - Done
23,575,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,282,016 UART: [art] Erasing AUTHORITY.KEYID = 7
25,283,525 UART: [art] PUB.X = 981FFFB104AE51C66B76876C0195C40B68CBDDFB9CD243EEBFB7EFA68612764072F567041E625F707A136E9109E00689
25,290,784 UART: [art] PUB.Y = 34438AA6263DFEE1F39A558D619829D67116C6233DE3497C9CBF6C5DCE2514A01F7DFA8FD70CEC104DA648FACC106553
25,298,020 UART: [art] SIG.R = F40962F4A097B7045675C5EFAB47173B7A0483378FAE3A3FE22AC206F2AF9CF5A54CD501F41F2F3670C2B3573D50D871
25,305,426 UART: [art] SIG.S = 7B0631C5557270F284433617BEB2E34A063DF918DBCE622867FBFF6C00C178ED064C3CC62C4A9E614235F9DC253143A0
26,284,432 UART: Caliptra RT
26,285,144 UART: [state] CFI Enabled
26,418,299 UART: [rt] RT listening for mailbox commands...
26,449,647 UART: [rt]cmd =0x494e464f, len=4
26,453,907 >>> mbox cmd response data (312 bytes)
28,524,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,344,985 >>> mbox cmd response: success
36,379,937 UART:
36,380,272 UART: Running Caliptra FMC ...
36,381,324 UART:
36,381,479 UART: [state] CFI Enabled
36,425,565 UART: [art] Extend RT PCRs Done
36,426,717 UART: [art] Lock RT PCRs Done
36,428,080 UART: [art] Populate DV Done
36,433,506 UART: [fht] FMC Alias Private Key: 7
36,434,997 UART: [art] Derive CDI
36,435,758 UART: [art] Store in slot 0x4
36,478,534 UART: [art] Derive Key Pair
36,479,581 UART: [art] Store priv key in slot 0x5
38,906,106 UART: [art] Derive Key Pair - Done
38,918,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,625,345 UART: [art] Erasing AUTHORITY.KEYID = 7
40,626,854 UART: [art] PUB.X = EC3095BE88F05C3F9914E4C8FAA5533510778A4D09695C6D749EBDEB86BD9C71279BB0619573917A1A9D28D7A4A3FD9D
40,634,113 UART: [art] PUB.Y = C85C22527D476C848004A387807F037AE2D576D0BA3F1C87956BAEB969AD40C41DA1F6AF47F7E7D0299542F047E16AE8
40,641,354 UART: [art] SIG.R = B73FDD4FBDC71262E0FC43E8436E2C0216C6CFC6AA1E7357E08B22DB7EA78382F7324A70A1C3183C0A7E71463DC6BBCE
40,648,757 UART: [art] SIG.S = 3EBBF0646E732887CCDCE940AF4E483099CD4CE3358B142BBB6E864E845430A80DAB1DE7CEE8DD79F9FA5EFC6B274D00
41,627,724 UART: Caliptra RT
41,628,474 UART: [state] CFI Enabled
42,000,978 UART: [rt] RT listening for mailbox commands...
42,002,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,032,459 UART: [rt]cmd =0x494e464f, len=4
42,036,742 >>> mbox cmd response data (312 bytes)
44,105,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
51,927,489 >>> mbox cmd response: success
51,962,823 UART:
51,963,155 UART: Running Caliptra FMC ...
51,964,208 UART:
51,964,360 UART: [state] CFI Enabled
52,008,283 UART: [art] Extend RT PCRs Done
52,009,443 UART: [art] Lock RT PCRs Done
52,010,819 UART: [art] Populate DV Done
52,016,339 UART: [fht] FMC Alias Private Key: 7
52,017,933 UART: [art] Derive CDI
52,018,677 UART: [art] Store in slot 0x4
52,061,660 UART: [art] Derive Key Pair
52,062,725 UART: [art] Store priv key in slot 0x5
54,489,270 UART: [art] Derive Key Pair - Done
54,502,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
56,208,763 UART: [art] Erasing AUTHORITY.KEYID = 7
56,210,283 UART: [art] PUB.X = 3BA08D208714C437ED4519F2A11E4946093027F0E7F7BF59EB951849DDBAF3C2D842BBED66623D2220FC93889A6ACC07
56,217,568 UART: [art] PUB.Y = 58B1521A75C1D07AA4E542900EF7290E93FBBD37F7421EC27E118434AA9CFFB47A2803B63DFDA5058500BA8C9562798D
56,224,790 UART: [art] SIG.R = 8A09D95BC8CC381EB7036E5372A1A53B4593F204295AB714FEC07DCD59361848E905ACB83DD0FB958C9589E31F106897
56,232,140 UART: [art] SIG.S = BD497B5E404C3B54EFC3BC8F4797C1FCCF91457284A157510570BBC5EFB4EC44D0A21C3DF8D1F6C0C4302C801D247017
57,211,183 UART: Caliptra RT
57,211,926 UART: [state] CFI Enabled
57,583,527 UART: [rt] RT listening for mailbox commands...
57,585,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,614,918 UART: [rt]cmd =0x494e464f, len=4
57,619,146 >>> mbox cmd response data (312 bytes)
57,621,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
65,449,744 >>> mbox cmd response: success
65,484,048 UART:
65,484,350 UART: Running Caliptra FMC ...
65,485,479 UART:
65,485,644 UART: [state] CFI Enabled
65,529,666 UART: [art] Extend RT PCRs Done
65,530,814 UART: [art] Lock RT PCRs Done
65,532,316 UART: [art] Populate DV Done
65,537,613 UART: [fht] FMC Alias Private Key: 7
65,539,204 UART: [art] Derive CDI
65,540,020 UART: [art] Store in slot 0x4
65,583,001 UART: [art] Derive Key Pair
65,584,049 UART: [art] Store priv key in slot 0x5
68,010,494 UART: [art] Derive Key Pair - Done
68,023,497 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
69,729,844 UART: [art] Erasing AUTHORITY.KEYID = 7
69,731,358 UART: [art] PUB.X = EC3095BE88F05C3F9914E4C8FAA5533510778A4D09695C6D749EBDEB86BD9C71279BB0619573917A1A9D28D7A4A3FD9D
69,738,629 UART: [art] PUB.Y = C85C22527D476C848004A387807F037AE2D576D0BA3F1C87956BAEB969AD40C41DA1F6AF47F7E7D0299542F047E16AE8
69,745,917 UART: [art] SIG.R = B73FDD4FBDC71262E0FC43E8436E2C0216C6CFC6AA1E7357E08B22DB7EA78382F7324A70A1C3183C0A7E71463DC6BBCE
69,753,321 UART: [art] SIG.S = 3EBBF0646E732887CCDCE940AF4E483099CD4CE3358B142BBB6E864E845430A80DAB1DE7CEE8DD79F9FA5EFC6B274D00
70,732,286 UART: Caliptra RT
70,732,982 UART: [state] CFI Enabled
71,103,008 UART: [rt] RT listening for mailbox commands...
71,104,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
71,134,676 UART: [rt]cmd =0x494e464f, len=4
71,138,956 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.67s
Truncated 1984 bytes from beginning
1,559,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,786 UART: [ldev] --
1,585,133 UART: [fwproc] Waiting for Commands...
1,585,902 UART: [fwproc] Received command 0x46574c44
1,586,693 UART: [fwproc] Received Image of size 118548 bytes
2,930,526 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,462 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,680 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,075 >>> mbox cmd response: success
3,129,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,130,083 UART: [afmc] ++
3,130,251 UART: [afmc] CDI.KEYID = 6
3,130,613 UART: [afmc] SUBJECT.KEYID = 7
3,131,038 UART: [afmc] AUTHORITY.KEYID = 5
3,166,436 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,540 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,320 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
3,189,047 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
3,194,946 UART: [afmc] SIG.R = E21B3E2F88872E28E080554D658AD7E626F9FEED98F63A03BBD7CF380CFE29BD7402877A3E435E89E93AD42D1668D374
3,200,653 UART: [afmc] SIG.S = C260A0FF06FACF46D92E1C7E317797ECC51DB2B0AC539D860ED47B7266E741A3AE4C5F92187DEFE45611AD41FCFCF319
3,208,510 UART: [afmc] --
3,209,516 UART: [cold-reset] --
3,210,454 UART: [state] Locking Datavault
3,211,347 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,951 UART: [state] Locking ICCM
3,212,455 UART: [exit] Launching FMC @ 0x40000130
3,217,785 UART:
3,217,801 UART: Running Caliptra FMC ...
3,218,209 UART:
3,218,263 UART: [state] CFI Enabled
3,228,894 UART: [fht] FMC Alias Private Key: 7
3,347,133 UART: [art] Extend RT PCRs Done
3,347,561 UART: [art] Lock RT PCRs Done
3,349,271 UART: [art] Populate DV Done
3,357,617 UART: [fht] FMC Alias Private Key: 7
3,358,561 UART: [art] Derive CDI
3,358,841 UART: [art] Store in slot 0x4
3,444,897 UART: [art] Derive Key Pair
3,445,257 UART: [art] Store priv key in slot 0x5
3,458,954 UART: [art] Derive Key Pair - Done
3,473,548 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,926 UART: [art] PUB.X = 2709140916F97E2542A784AE5ACDDD07C2B8B8D915181A55C64A4C70DE1009F70E21CB0E1BB2D456BD7707482FF85BEA
3,496,683 UART: [art] PUB.Y = 9770E74993FF5AC36F2D479A03E3459FF0ECC7D88CAE152605E602D9DF05A648FC84FC080644F9988C0FB36F3C1D16C6
3,503,620 UART: [art] SIG.R = AFE3CA50D59296331D50FEB70B1EBBC73BFD6DCBBCCF00FB9BD2CB7116394DE597233F4430A91BF8F3B91F695EF69982
3,510,387 UART: [art] SIG.S = 919C8C02DC6AAFB8D25947AC3A832DEFD2BF60FD34DAE17DB275FC8B28A26B45BB3A1E639C13070A014075AB3421E878
3,534,065 UART: Caliptra RT
3,534,316 UART: [state] CFI Enabled
3,653,874 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,520 UART: [rt]cmd =0x494e464f, len=4
3,688,456 >>> mbox cmd response data (312 bytes)
3,688,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,285 UART:
3,689,301 UART: Running Caliptra ROM ...
3,689,709 UART:
3,689,763 UART: [state] CFI Enabled
3,692,143 UART: [state] LifecycleState = Unprovisioned
3,692,798 UART: [state] DebugLocked = No
3,693,452 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,695,075 UART: [kat] SHA2-256
4,489,006 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,493,121 UART: [kat] ++
4,493,273 UART: [kat] sha1
4,497,397 UART: [kat] SHA2-256
4,499,335 UART: [kat] SHA2-384
4,502,162 UART: [kat] SHA2-512-ACC
4,504,062 UART: [kat] ECC-384
4,509,581 UART: [kat] HMAC-384Kdf
4,514,287 UART: [kat] LMS
5,082,483 UART: [kat] --
5,083,484 UART: [update-reset] ++
6,464,429 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,465,483 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,620,750 >>> mbox cmd response: success
6,620,895 UART: [update-reset] Copying MAN_2 To MAN_1
6,628,909 UART: [update-reset Success] --
6,630,010 UART: [state] Locking Datavault
6,630,714 UART: [state] Locking PCR0, PCR1 and PCR31
6,631,318 UART: [state] Locking ICCM
6,631,944 UART: [exit] Launching FMC @ 0x40000130
6,637,274 UART:
6,637,290 UART: Running Caliptra FMC ...
6,637,698 UART:
6,637,752 UART: [state] CFI Enabled
6,727,163 UART: [art] Extend RT PCRs Done
6,727,591 UART: [art] Lock RT PCRs Done
6,728,866 UART: [art] Populate DV Done
6,737,112 UART: [fht] FMC Alias Private Key: 7
6,738,086 UART: [art] Derive CDI
6,738,366 UART: [art] Store in slot 0x4
6,824,168 UART: [art] Derive Key Pair
6,824,528 UART: [art] Store priv key in slot 0x5
6,837,461 UART: [art] Derive Key Pair - Done
6,852,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,867,829 UART: [art] Erasing AUTHORITY.KEYID = 7
6,868,594 UART: [art] PUB.X = E578C997E7FC38F9D1643FFEA15B09B264BABFE98C26DA7E8621A70D72F11A15F114BA21D68E521E1349BB90E6F690D4
6,875,370 UART: [art] PUB.Y = BC27B716A014652AFBB170C2E3BB25E3B832052DE81C896D7BB56CF78155BE8413E7FB89B14C5B23233D12AB5A52B135
6,882,325 UART: [art] SIG.R = A9AB06E63F8D46F524A42925AAAB0775BDFBE7BE465F9F1B26B8EF32DD2EC03C2E4214451A0B39837BD32E03B224B3C3
6,889,099 UART: [art] SIG.S = 8E90C327310AD670A94E21CB70170FC4A821B6612108783C3BFB462EAEBC1FCB3F7DD94D6DF5E04C13A8DC9077D38CB2
6,912,810 UART: Caliptra RT
6,913,061 UART: [state] CFI Enabled
7,278,238 UART: [rt] RT listening for mailbox commands...
7,278,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,308,215 UART: [rt]cmd =0x494e464f, len=4
7,311,995 >>> mbox cmd response data (312 bytes)
7,311,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,312,466 UART:
7,312,482 UART: Running Caliptra ROM ...
7,312,890 UART:
7,312,944 UART: [state] CFI Enabled
7,315,414 UART: [state] LifecycleState = Unprovisioned
7,316,069 UART: [state] DebugLocked = No
7,316,663 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,318,322 UART: [kat] SHA2-256
8,112,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,116,368 UART: [kat] ++
8,116,520 UART: [kat] sha1
8,120,632 UART: [kat] SHA2-256
8,122,570 UART: [kat] SHA2-384
8,125,139 UART: [kat] SHA2-512-ACC
8,127,039 UART: [kat] ECC-384
8,132,494 UART: [kat] HMAC-384Kdf
8,137,028 UART: [kat] LMS
8,705,224 UART: [kat] --
8,706,123 UART: [update-reset] ++
10,087,910 UART: [update-reset] Image verified using Vendor ECC Key Index 0
10,089,058 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
10,244,325 >>> mbox cmd response: success
10,244,592 UART: [update-reset] Copying MAN_2 To MAN_1
10,252,606 UART: [update-reset Success] --
10,253,775 UART: [state] Locking Datavault
10,254,757 UART: [state] Locking PCR0, PCR1 and PCR31
10,255,361 UART: [state] Locking ICCM
10,255,869 UART: [exit] Launching FMC @ 0x40000130
10,261,199 UART:
10,261,215 UART: Running Caliptra FMC ...
10,261,623 UART:
10,261,677 UART: [state] CFI Enabled
10,350,790 UART: [art] Extend RT PCRs Done
10,351,218 UART: [art] Lock RT PCRs Done
10,352,453 UART: [art] Populate DV Done
10,360,759 UART: [fht] FMC Alias Private Key: 7
10,361,843 UART: [art] Derive CDI
10,362,123 UART: [art] Store in slot 0x4
10,447,679 UART: [art] Derive Key Pair
10,448,039 UART: [art] Store priv key in slot 0x5
10,461,014 UART: [art] Derive Key Pair - Done
10,475,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,491,075 UART: [art] Erasing AUTHORITY.KEYID = 7
10,491,840 UART: [art] PUB.X = E3033ABF8FA7940856F1E9960D2EA3D71F8051EDBAB1BAE64E4C20363078B75D1BEEE9BFF13B53D308B219F5B0C6C07D
10,498,616 UART: [art] PUB.Y = 87D66017B132EBFBBA2D204E90E61B6D76DC7BFD4C549F5F0FD03AE1B212B0E5521FC63B39AC09BEF2A70EC8009E7A35
10,505,555 UART: [art] SIG.R = 15DB2FCC10A6F245C8C7E8E36DB9ADEE96265B2429EB0504B979B885811B4D03DB5FFEE9DFD1BC3100F19B9445293195
10,512,306 UART: [art] SIG.S = D50568B08DC094A05174B6CE36AABD10252210AF098A5FE2254A9D5F0CBE236AEA0A5A825E636D353CC4F00CE4EFA6CD
10,535,865 UART: Caliptra RT
10,536,116 UART: [state] CFI Enabled
10,898,712 UART: [rt] RT listening for mailbox commands...
10,899,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,928,625 UART: [rt]cmd =0x494e464f, len=4
10,932,243 >>> mbox cmd response data (312 bytes)
10,932,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,932,996 UART:
10,933,012 UART: Running Caliptra ROM ...
10,933,420 UART:
10,933,474 UART: [state] CFI Enabled
10,936,076 UART: [state] LifecycleState = Unprovisioned
10,936,731 UART: [state] DebugLocked = No
10,937,379 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,939,090 UART: [kat] SHA2-256
11,733,021 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,737,136 UART: [kat] ++
11,737,288 UART: [kat] sha1
11,741,504 UART: [kat] SHA2-256
11,743,442 UART: [kat] SHA2-384
11,746,375 UART: [kat] SHA2-512-ACC
11,748,275 UART: [kat] ECC-384
11,753,782 UART: [kat] HMAC-384Kdf
11,758,308 UART: [kat] LMS
12,326,504 UART: [kat] --
12,327,645 UART: [update-reset] ++
13,707,628 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,708,816 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
13,864,083 >>> mbox cmd response: success
13,864,212 UART: [update-reset] Copying MAN_2 To MAN_1
13,872,226 UART: [update-reset Success] --
13,873,373 UART: [state] Locking Datavault
13,874,341 UART: [state] Locking PCR0, PCR1 and PCR31
13,874,945 UART: [state] Locking ICCM
13,875,609 UART: [exit] Launching FMC @ 0x40000130
13,880,939 UART:
13,880,955 UART: Running Caliptra FMC ...
13,881,363 UART:
13,881,417 UART: [state] CFI Enabled
13,970,552 UART: [art] Extend RT PCRs Done
13,970,980 UART: [art] Lock RT PCRs Done
13,972,257 UART: [art] Populate DV Done
13,980,325 UART: [fht] FMC Alias Private Key: 7
13,981,257 UART: [art] Derive CDI
13,981,537 UART: [art] Store in slot 0x4
14,066,863 UART: [art] Derive Key Pair
14,067,223 UART: [art] Store priv key in slot 0x5
14,081,182 UART: [art] Derive Key Pair - Done
14,095,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
14,111,656 UART: [art] Erasing AUTHORITY.KEYID = 7
14,112,421 UART: [art] PUB.X = E578C997E7FC38F9D1643FFEA15B09B264BABFE98C26DA7E8621A70D72F11A15F114BA21D68E521E1349BB90E6F690D4
14,119,197 UART: [art] PUB.Y = BC27B716A014652AFBB170C2E3BB25E3B832052DE81C896D7BB56CF78155BE8413E7FB89B14C5B23233D12AB5A52B135
14,126,152 UART: [art] SIG.R = A9AB06E63F8D46F524A42925AAAB0775BDFBE7BE465F9F1B26B8EF32DD2EC03C2E4214451A0B39837BD32E03B224B3C3
14,132,926 UART: [art] SIG.S = 8E90C327310AD670A94E21CB70170FC4A821B6612108783C3BFB462EAEBC1FCB3F7DD94D6DF5E04C13A8DC9077D38CB2
14,156,375 UART: Caliptra RT
14,156,626 UART: [state] CFI Enabled
14,526,277 UART: [rt] RT listening for mailbox commands...
14,526,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
14,556,284 UART: [rt]cmd =0x494e464f, len=4
14,560,052 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,325 ready_for_fw is high
1,363,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,581 >>> mbox cmd response: success
2,981,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,043,125 UART:
3,043,141 UART: Running Caliptra FMC ...
3,043,549 UART:
3,043,603 UART: [state] CFI Enabled
3,054,154 UART: [fht] FMC Alias Private Key: 7
3,172,915 UART: [art] Extend RT PCRs Done
3,173,343 UART: [art] Lock RT PCRs Done
3,174,565 UART: [art] Populate DV Done
3,182,655 UART: [fht] FMC Alias Private Key: 7
3,183,683 UART: [art] Derive CDI
3,183,963 UART: [art] Store in slot 0x4
3,269,615 UART: [art] Derive Key Pair
3,269,975 UART: [art] Store priv key in slot 0x5
3,282,938 UART: [art] Derive Key Pair - Done
3,298,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,194 UART: [art] PUB.X = 851080EEAC36570CC35E0D06EB34314E7367909EEE314B13AB7FC9DF3DB15A3CB77D289458C164A8D903DA630DC1ABC9
3,320,961 UART: [art] PUB.Y = 9348E04A901E9BEBCB03943D4A650A4C6DAD814FE5C5FAE5FF1BB9C3C4E3F7E42ED09AD14953AC02CE76DF6E9BC16985
3,327,926 UART: [art] SIG.R = 737B2F4EF06B0CBC66FEC3CBF53F72B8A45174D70A92AB8ED9B2AE9A90B4976DCA8DE9BBC53063D6F0CDF50D1BC416F1
3,334,715 UART: [art] SIG.S = B3137F47459C9B508DF3A598EF1218EDF1FBD69E02FAAD87064F4A279DBC1C704C7F4578C396152BB72576F51ED8A471
3,358,433 UART: Caliptra RT
3,358,684 UART: [state] CFI Enabled
3,478,415 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,129 UART: [rt]cmd =0x494e464f, len=4
3,512,705 >>> mbox cmd response data (312 bytes)
3,512,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,326,055 >>> mbox cmd response: success
6,339,695 UART:
6,339,711 UART: Running Caliptra FMC ...
6,340,119 UART:
6,340,173 UART: [state] CFI Enabled
6,428,484 UART: [art] Extend RT PCRs Done
6,428,912 UART: [art] Lock RT PCRs Done
6,430,143 UART: [art] Populate DV Done
6,438,413 UART: [fht] FMC Alias Private Key: 7
6,439,377 UART: [art] Derive CDI
6,439,657 UART: [art] Store in slot 0x4
6,525,595 UART: [art] Derive Key Pair
6,525,955 UART: [art] Store priv key in slot 0x5
6,539,476 UART: [art] Derive Key Pair - Done
6,554,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,569,547 UART: [art] Erasing AUTHORITY.KEYID = 7
6,570,312 UART: [art] PUB.X = CEB12575951428CDF715BF02737D3236AF99E60831D73B5C4E80BFDAFF18AC75A8E9EA46A73B9C1DA8041FECCF3F31EB
6,577,093 UART: [art] PUB.Y = F7AD2919DE7E4DFC2F4EC404CBD008849D339BA39A9562E85E33C2B8EE3D2F0D3F5B2DD71D63FE308C46286EC8B28BFB
6,584,056 UART: [art] SIG.R = 1D7933B90D8C9E2227687D0A7002E58ECB6FCC7DC011582A89CC06075E77706F04EEBFD89DB7413000FAD636AC993D3F
6,590,794 UART: [art] SIG.S = 578CA1742DD0621ABC62F0D6EB521D54B215A331E8122616983E64535A1B2B1A2072FA730568BE4B28BFE94CF26F1322
6,614,555 UART: Caliptra RT
6,614,806 UART: [state] CFI Enabled
6,980,589 UART: [rt] RT listening for mailbox commands...
6,981,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,010,612 UART: [rt]cmd =0x494e464f, len=4
7,014,216 >>> mbox cmd response data (312 bytes)
7,014,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,827,302 >>> mbox cmd response: success
9,840,626 UART:
9,840,642 UART: Running Caliptra FMC ...
9,841,050 UART:
9,841,104 UART: [state] CFI Enabled
9,930,075 UART: [art] Extend RT PCRs Done
9,930,503 UART: [art] Lock RT PCRs Done
9,931,572 UART: [art] Populate DV Done
9,939,902 UART: [fht] FMC Alias Private Key: 7
9,940,928 UART: [art] Derive CDI
9,941,208 UART: [art] Store in slot 0x4
10,026,748 UART: [art] Derive Key Pair
10,027,108 UART: [art] Store priv key in slot 0x5
10,040,629 UART: [art] Derive Key Pair - Done
10,055,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,070,471 UART: [art] Erasing AUTHORITY.KEYID = 7
10,071,236 UART: [art] PUB.X = 4D0EEB731206D560CBBCCB1F47002CFDC161526F12CB090E41E9E197904B5B7410CC0F32C09BCA92C01C0A8E7A70835A
10,077,978 UART: [art] PUB.Y = 0D92C4B82C24DC88AE2235706A5AEAE74CE7B9283C1E1F9E8DDEBCE0B8692051B94E3E3EBA0D16B9D1937B7DCAA7280B
10,084,941 UART: [art] SIG.R = 87AD99DB0C0836A102B606BF8F9431E7B39E00D1501C9CC1265E3F3A43FA9DFF420A51C1D01726C91E6FD70A416EDA9F
10,091,683 UART: [art] SIG.S = 550BE65525A312B34402E9DAA10625EC058CD146CC8B905E97665049984E5904341D2D20FAB36A4EA271455D4C611DFA
10,115,062 UART: Caliptra RT
10,115,313 UART: [state] CFI Enabled
10,476,023 UART: [rt] RT listening for mailbox commands...
10,476,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,506,326 UART: [rt]cmd =0x494e464f, len=4
10,509,972 >>> mbox cmd response data (312 bytes)
10,509,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,322,178 >>> mbox cmd response: success
13,335,500 UART:
13,335,516 UART: Running Caliptra FMC ...
13,335,924 UART:
13,335,978 UART: [state] CFI Enabled
13,424,565 UART: [art] Extend RT PCRs Done
13,424,993 UART: [art] Lock RT PCRs Done
13,426,326 UART: [art] Populate DV Done
13,434,896 UART: [fht] FMC Alias Private Key: 7
13,435,872 UART: [art] Derive CDI
13,436,152 UART: [art] Store in slot 0x4
13,522,292 UART: [art] Derive Key Pair
13,522,652 UART: [art] Store priv key in slot 0x5
13,535,733 UART: [art] Derive Key Pair - Done
13,550,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
13,565,836 UART: [art] Erasing AUTHORITY.KEYID = 7
13,566,601 UART: [art] PUB.X = CEB12575951428CDF715BF02737D3236AF99E60831D73B5C4E80BFDAFF18AC75A8E9EA46A73B9C1DA8041FECCF3F31EB
13,573,382 UART: [art] PUB.Y = F7AD2919DE7E4DFC2F4EC404CBD008849D339BA39A9562E85E33C2B8EE3D2F0D3F5B2DD71D63FE308C46286EC8B28BFB
13,580,345 UART: [art] SIG.R = 1D7933B90D8C9E2227687D0A7002E58ECB6FCC7DC011582A89CC06075E77706F04EEBFD89DB7413000FAD636AC993D3F
13,587,083 UART: [art] SIG.S = 578CA1742DD0621ABC62F0D6EB521D54B215A331E8122616983E64535A1B2B1A2072FA730568BE4B28BFE94CF26F1322
13,611,666 UART: Caliptra RT
13,611,917 UART: [state] CFI Enabled
13,977,314 UART: [rt] RT listening for mailbox commands...
13,977,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
14,007,393 UART: [rt]cmd =0x494e464f, len=4
14,011,131 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.07s
Truncated 1984 bytes from beginning
1,561,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,053 UART: [ldev] --
1,587,554 UART: [fwproc] Waiting for Commands...
1,588,367 UART: [fwproc] Received command 0x46574c44
1,589,158 UART: [fwproc] Received Image of size 118548 bytes
2,933,419 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,269 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,756 >>> mbox cmd response: success
3,131,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,132,988 UART: [afmc] ++
3,133,156 UART: [afmc] CDI.KEYID = 6
3,133,518 UART: [afmc] SUBJECT.KEYID = 7
3,133,943 UART: [afmc] AUTHORITY.KEYID = 5
3,168,777 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,097 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,877 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
3,191,604 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
3,197,503 UART: [afmc] SIG.R = E21B3E2F88872E28E080554D658AD7E626F9FEED98F63A03BBD7CF380CFE29BD7402877A3E435E89E93AD42D1668D374
3,203,210 UART: [afmc] SIG.S = C260A0FF06FACF46D92E1C7E317797ECC51DB2B0AC539D860ED47B7266E741A3AE4C5F92187DEFE45611AD41FCFCF319
3,211,027 UART: [afmc] --
3,212,059 UART: [cold-reset] --
3,212,953 UART: [state] Locking Datavault
3,214,420 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,024 UART: [state] Locking ICCM
3,215,604 UART: [exit] Launching FMC @ 0x40000130
3,220,934 UART:
3,220,950 UART: Running Caliptra FMC ...
3,221,358 UART:
3,221,501 UART: [state] CFI Enabled
3,232,162 UART: [fht] FMC Alias Private Key: 7
3,351,457 UART: [art] Extend RT PCRs Done
3,351,885 UART: [art] Lock RT PCRs Done
3,353,405 UART: [art] Populate DV Done
3,361,461 UART: [fht] FMC Alias Private Key: 7
3,362,455 UART: [art] Derive CDI
3,362,735 UART: [art] Store in slot 0x4
3,448,645 UART: [art] Derive Key Pair
3,449,005 UART: [art] Store priv key in slot 0x5
3,462,540 UART: [art] Derive Key Pair - Done
3,477,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,748 UART: [art] PUB.X = 8A4751E4AF1F70E8F58E518C17623F631344EC50F082FE8D681B6731C924EF2DFC6603EFE72A256B7972B6DF321B00F9
3,500,497 UART: [art] PUB.Y = 97EA120E5E139C7B42D84BB7CCCD88026434208B3B8F9011ED7CB6AFC636A411D318FE190CC6416494B676AC1856D3D9
3,507,444 UART: [art] SIG.R = 46E84866613F45632C36989468C86E74EF6CE4901E0E4F60009BB9534C919952210A08536529765E47D16BAF37DDE429
3,514,169 UART: [art] SIG.S = EDC897A3C14DACC0DE4B99CE176039890821CC319124255EE717249F3C7C401B0C56E1D0DEF2BA32FF8E09FC4727218F
3,538,020 UART: Caliptra RT
3,538,363 UART: [state] CFI Enabled
3,657,606 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,796 UART: [rt]cmd =0x494e464f, len=4
3,691,280 >>> mbox cmd response data (312 bytes)
3,691,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,845 UART:
3,691,861 UART: Running Caliptra ROM ...
3,692,269 UART:
3,692,410 UART: [state] CFI Enabled
3,694,792 UART: [state] LifecycleState = Unprovisioned
3,695,447 UART: [state] DebugLocked = No
3,695,953 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,697,656 UART: [kat] SHA2-256
4,491,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,495,702 UART: [kat] ++
4,495,854 UART: [kat] sha1
4,500,080 UART: [kat] SHA2-256
4,502,018 UART: [kat] SHA2-384
4,504,717 UART: [kat] SHA2-512-ACC
4,506,617 UART: [kat] ECC-384
4,511,996 UART: [kat] HMAC-384Kdf
4,516,726 UART: [kat] LMS
5,084,922 UART: [kat] --
5,085,779 UART: [update-reset] ++
6,467,140 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,468,266 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,623,533 >>> mbox cmd response: success
6,623,702 UART: [update-reset] Copying MAN_2 To MAN_1
6,631,716 UART: [update-reset Success] --
6,632,533 UART: [state] Locking Datavault
6,633,295 UART: [state] Locking PCR0, PCR1 and PCR31
6,633,899 UART: [state] Locking ICCM
6,634,357 UART: [exit] Launching FMC @ 0x40000130
6,639,687 UART:
6,639,703 UART: Running Caliptra FMC ...
6,640,111 UART:
6,640,254 UART: [state] CFI Enabled
6,729,411 UART: [art] Extend RT PCRs Done
6,729,839 UART: [art] Lock RT PCRs Done
6,731,208 UART: [art] Populate DV Done
6,739,310 UART: [fht] FMC Alias Private Key: 7
6,740,290 UART: [art] Derive CDI
6,740,570 UART: [art] Store in slot 0x4
6,826,492 UART: [art] Derive Key Pair
6,826,852 UART: [art] Store priv key in slot 0x5
6,839,943 UART: [art] Derive Key Pair - Done
6,855,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,870,371 UART: [art] Erasing AUTHORITY.KEYID = 7
6,871,136 UART: [art] PUB.X = A62437627E88EDC94B4354494C96D643D43D4DD33CB407E9128D723DB8830C85FA286B362789B718FE8557CF38823F6F
6,877,896 UART: [art] PUB.Y = ECDC47B02DD73F654C276D36683FB03C7DB0816D9793CF813FAED12643D81592DBD1C6284C93CBF3DF35336119726C93
6,884,852 UART: [art] SIG.R = 3A5094C04F93AA013161EA2DAFDB39C5F56C59E8B9C9BE8E1DCF362BD6427D16407FAF939FA9EF50CC0E3C34D336F3C0
6,891,636 UART: [art] SIG.S = 02222B46D132B6CF68ADD5D8293CB0B15D1FE0600FB91EDBCF246B011D38228C9DC774E5CF76F98F6E1917979ACAEFFF
6,915,449 UART: Caliptra RT
6,915,792 UART: [state] CFI Enabled
7,287,263 UART: [rt] RT listening for mailbox commands...
7,287,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,317,388 UART: [rt]cmd =0x494e464f, len=4
7,320,970 >>> mbox cmd response data (312 bytes)
7,320,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,321,741 UART:
7,321,757 UART: Running Caliptra ROM ...
7,322,165 UART:
7,322,306 UART: [state] CFI Enabled
7,325,472 UART: [state] LifecycleState = Unprovisioned
7,326,127 UART: [state] DebugLocked = No
7,326,787 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,328,504 UART: [kat] SHA2-256
8,122,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,126,550 UART: [kat] ++
8,126,702 UART: [kat] sha1
8,130,942 UART: [kat] SHA2-256
8,132,880 UART: [kat] SHA2-384
8,135,569 UART: [kat] SHA2-512-ACC
8,137,469 UART: [kat] ECC-384
8,143,204 UART: [kat] HMAC-384Kdf
8,147,824 UART: [kat] LMS
8,716,020 UART: [kat] --
8,716,763 UART: [update-reset] ++
10,097,828 UART: [update-reset] Image verified using Vendor ECC Key Index 0
10,098,912 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
10,254,179 >>> mbox cmd response: success
10,254,414 UART: [update-reset] Copying MAN_2 To MAN_1
10,262,428 UART: [update-reset Success] --
10,263,343 UART: [state] Locking Datavault
10,264,083 UART: [state] Locking PCR0, PCR1 and PCR31
10,264,687 UART: [state] Locking ICCM
10,265,129 UART: [exit] Launching FMC @ 0x40000130
10,270,459 UART:
10,270,475 UART: Running Caliptra FMC ...
10,270,883 UART:
10,271,026 UART: [state] CFI Enabled
10,359,917 UART: [art] Extend RT PCRs Done
10,360,345 UART: [art] Lock RT PCRs Done
10,361,480 UART: [art] Populate DV Done
10,369,538 UART: [fht] FMC Alias Private Key: 7
10,370,518 UART: [art] Derive CDI
10,370,798 UART: [art] Store in slot 0x4
10,456,302 UART: [art] Derive Key Pair
10,456,662 UART: [art] Store priv key in slot 0x5
10,470,505 UART: [art] Derive Key Pair - Done
10,485,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,500,627 UART: [art] Erasing AUTHORITY.KEYID = 7
10,501,392 UART: [art] PUB.X = E34B6304205917717F905419EC142C26825685AD597FE7AEF4171291C4FCEF9EBC1358B4FEB2B958DA0D882B87D49E9A
10,508,160 UART: [art] PUB.Y = 5807B34A3CBAD09AA47C01B2B4A3C19F632174AF1DAB5324E934E9C131E7990DDE308540E31E86037E2DDA350F5B97F8
10,515,103 UART: [art] SIG.R = 797D071A8AAD5B94A636CB25B5F13848340D5F3E25687E87E6F42659A38A1F999C8BE0D78E681566BEA3CD560BCEFA54
10,521,872 UART: [art] SIG.S = 7D66F1B90A9F4B0CAAA137CF40BD3D61F9C951FFD8C56B5677985390188805332D357F9D0B737DBCB623D5C2A538AD7A
10,545,368 UART: Caliptra RT
10,545,711 UART: [state] CFI Enabled
10,911,386 UART: [rt] RT listening for mailbox commands...
10,912,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,941,547 UART: [rt]cmd =0x494e464f, len=4
10,945,421 >>> mbox cmd response data (312 bytes)
10,945,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,946,418 UART:
10,946,434 UART: Running Caliptra ROM ...
10,946,842 UART:
10,946,983 UART: [state] CFI Enabled
10,949,527 UART: [state] LifecycleState = Unprovisioned
10,950,182 UART: [state] DebugLocked = No
10,950,690 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,952,303 UART: [kat] SHA2-256
11,746,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,750,349 UART: [kat] ++
11,750,501 UART: [kat] sha1
11,754,673 UART: [kat] SHA2-256
11,756,611 UART: [kat] SHA2-384
11,759,382 UART: [kat] SHA2-512-ACC
11,761,282 UART: [kat] ECC-384
11,766,469 UART: [kat] HMAC-384Kdf
11,771,249 UART: [kat] LMS
12,339,445 UART: [kat] --
12,340,330 UART: [update-reset] ++
13,720,503 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,721,713 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
13,876,980 >>> mbox cmd response: success
13,877,187 UART: [update-reset] Copying MAN_2 To MAN_1
13,885,201 UART: [update-reset Success] --
13,886,282 UART: [state] Locking Datavault
13,887,214 UART: [state] Locking PCR0, PCR1 and PCR31
13,887,818 UART: [state] Locking ICCM
13,888,262 UART: [exit] Launching FMC @ 0x40000130
13,893,592 UART:
13,893,608 UART: Running Caliptra FMC ...
13,894,016 UART:
13,894,159 UART: [state] CFI Enabled
13,983,540 UART: [art] Extend RT PCRs Done
13,983,968 UART: [art] Lock RT PCRs Done
13,985,119 UART: [art] Populate DV Done
13,993,319 UART: [fht] FMC Alias Private Key: 7
13,994,297 UART: [art] Derive CDI
13,994,577 UART: [art] Store in slot 0x4
14,080,449 UART: [art] Derive Key Pair
14,080,809 UART: [art] Store priv key in slot 0x5
14,094,490 UART: [art] Derive Key Pair - Done
14,109,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
14,124,574 UART: [art] Erasing AUTHORITY.KEYID = 7
14,125,339 UART: [art] PUB.X = A62437627E88EDC94B4354494C96D643D43D4DD33CB407E9128D723DB8830C85FA286B362789B718FE8557CF38823F6F
14,132,099 UART: [art] PUB.Y = ECDC47B02DD73F654C276D36683FB03C7DB0816D9793CF813FAED12643D81592DBD1C6284C93CBF3DF35336119726C93
14,139,055 UART: [art] SIG.R = 3A5094C04F93AA013161EA2DAFDB39C5F56C59E8B9C9BE8E1DCF362BD6427D16407FAF939FA9EF50CC0E3C34D336F3C0
14,145,839 UART: [art] SIG.S = 02222B46D132B6CF68ADD5D8293CB0B15D1FE0600FB91EDBCF246B011D38228C9DC774E5CF76F98F6E1917979ACAEFFF
14,169,626 UART: Caliptra RT
14,169,969 UART: [state] CFI Enabled
14,536,482 UART: [rt] RT listening for mailbox commands...
14,537,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
14,566,685 UART: [rt]cmd =0x494e464f, len=4
14,570,481 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,818 ready_for_fw is high
1,362,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,710 >>> mbox cmd response: success
2,981,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,043,140 UART:
3,043,156 UART: Running Caliptra FMC ...
3,043,564 UART:
3,043,707 UART: [state] CFI Enabled
3,054,316 UART: [fht] FMC Alias Private Key: 7
3,173,347 UART: [art] Extend RT PCRs Done
3,173,775 UART: [art] Lock RT PCRs Done
3,175,387 UART: [art] Populate DV Done
3,183,731 UART: [fht] FMC Alias Private Key: 7
3,184,901 UART: [art] Derive CDI
3,185,181 UART: [art] Store in slot 0x4
3,270,921 UART: [art] Derive Key Pair
3,271,281 UART: [art] Store priv key in slot 0x5
3,284,972 UART: [art] Derive Key Pair - Done
3,299,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,290 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,055 UART: [art] PUB.X = BCC6D7C37227B63AFF37DC865DF5119603C25A36CFA06D80150A82540CC5A94FD306C130963C638E29C1DA0E0ED54018
3,322,813 UART: [art] PUB.Y = F1B97EC5FCAA922393C2E73698944A1628B53B89BEB75D8C3EB7AA29034875D60A2FAF8EC9BF5CB321898F2B79995BC6
3,329,769 UART: [art] SIG.R = E3D54514FF922FF5E2FF880E0D480F852297CFD755675C6AC14580FA1A1B2818D5A97A91E85BE9FBB3DC2E5F3FDB19FF
3,336,548 UART: [art] SIG.S = 356AEE4A99EBA24652D92589C79AADFA19E24794C0F3DD7ECF8F9A34885C664F1C6FD8BE3D9EADFFDFD4C8FE9B15F192
3,360,992 UART: Caliptra RT
3,361,335 UART: [state] CFI Enabled
3,480,840 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,048 UART: [rt]cmd =0x494e464f, len=4
3,514,756 >>> mbox cmd response data (312 bytes)
3,514,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,328,697 >>> mbox cmd response: success
6,342,445 UART:
6,342,461 UART: Running Caliptra FMC ...
6,342,869 UART:
6,343,012 UART: [state] CFI Enabled
6,432,613 UART: [art] Extend RT PCRs Done
6,433,041 UART: [art] Lock RT PCRs Done
6,434,340 UART: [art] Populate DV Done
6,442,714 UART: [fht] FMC Alias Private Key: 7
6,443,746 UART: [art] Derive CDI
6,444,026 UART: [art] Store in slot 0x4
6,529,968 UART: [art] Derive Key Pair
6,530,328 UART: [art] Store priv key in slot 0x5
6,543,089 UART: [art] Derive Key Pair - Done
6,557,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,572,884 UART: [art] Erasing AUTHORITY.KEYID = 7
6,573,649 UART: [art] PUB.X = DADD9FDD22E359049976EFC748993700D58622188D76055C23F89564A0D0CE458FFFD81C070278575AFBEB2B1D05F594
6,580,384 UART: [art] PUB.Y = 1D890BB939FC2AF648575064AA965F06F537C824444CD753E272F7BA85582867421809459EE3242F6B1F6BEFAF604DE5
6,587,323 UART: [art] SIG.R = 4BF85A677D10D10453924934887D8A4533EEC75F1C5DE59E1A2F11D97C98852CF6B0F67EA865BDF2DBB16AA5BBD95283
6,594,100 UART: [art] SIG.S = ED3A94E09D450B93D2325E5CC4C2968B7B74FFA155A963ACCAEA6658A01A86F2ACD872A1FA09DDC9676BBBCF3786160A
6,617,701 UART: Caliptra RT
6,618,044 UART: [state] CFI Enabled
6,987,186 UART: [rt] RT listening for mailbox commands...
6,987,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,017,265 UART: [rt]cmd =0x494e464f, len=4
7,020,967 >>> mbox cmd response data (312 bytes)
7,020,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,836,694 >>> mbox cmd response: success
9,849,862 UART:
9,849,878 UART: Running Caliptra FMC ...
9,850,286 UART:
9,850,429 UART: [state] CFI Enabled
9,939,658 UART: [art] Extend RT PCRs Done
9,940,086 UART: [art] Lock RT PCRs Done
9,941,073 UART: [art] Populate DV Done
9,949,419 UART: [fht] FMC Alias Private Key: 7
9,950,475 UART: [art] Derive CDI
9,950,755 UART: [art] Store in slot 0x4
10,036,233 UART: [art] Derive Key Pair
10,036,593 UART: [art] Store priv key in slot 0x5
10,049,724 UART: [art] Derive Key Pair - Done
10,064,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,080,409 UART: [art] Erasing AUTHORITY.KEYID = 7
10,081,174 UART: [art] PUB.X = 0EA42077D55623F44E05EE31064237C3D0C824CFAC28F9741ECD518B291826E7E2275F5EFFE07C26AFF4902EF44E9A75
10,087,941 UART: [art] PUB.Y = B4AA82544BE0F9C8B6480B2C14466B34C11F33719A047C78CF6BD34961F13C10DD6870415F16BA45DEE5F7C04E7E2F83
10,094,891 UART: [art] SIG.R = FDF16E238E81E7F11E19602829AB6D5F35E9A5FE01D6EE40B5530AD70614C72B9F760981D9B6D3ECB2D2F361AB770C1F
10,101,658 UART: [art] SIG.S = 89A3316282D240B7E60ABA90428008CC4E4C0CAF909648AC1A8DF3B4F6EA2DCEBDF1F16539EEE53E277E12D28973E53B
10,125,863 UART: Caliptra RT
10,126,206 UART: [state] CFI Enabled
10,496,513 UART: [rt] RT listening for mailbox commands...
10,497,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,526,688 UART: [rt]cmd =0x494e464f, len=4
10,530,392 >>> mbox cmd response data (312 bytes)
10,530,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,344,373 >>> mbox cmd response: success
13,357,919 UART:
13,357,935 UART: Running Caliptra FMC ...
13,358,343 UART:
13,358,486 UART: [state] CFI Enabled
13,447,453 UART: [art] Extend RT PCRs Done
13,447,881 UART: [art] Lock RT PCRs Done
13,449,066 UART: [art] Populate DV Done
13,457,244 UART: [fht] FMC Alias Private Key: 7
13,458,402 UART: [art] Derive CDI
13,458,682 UART: [art] Store in slot 0x4
13,544,274 UART: [art] Derive Key Pair
13,544,634 UART: [art] Store priv key in slot 0x5
13,557,765 UART: [art] Derive Key Pair - Done
13,572,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
13,588,108 UART: [art] Erasing AUTHORITY.KEYID = 7
13,588,873 UART: [art] PUB.X = DADD9FDD22E359049976EFC748993700D58622188D76055C23F89564A0D0CE458FFFD81C070278575AFBEB2B1D05F594
13,595,608 UART: [art] PUB.Y = 1D890BB939FC2AF648575064AA965F06F537C824444CD753E272F7BA85582867421809459EE3242F6B1F6BEFAF604DE5
13,602,547 UART: [art] SIG.R = 4BF85A677D10D10453924934887D8A4533EEC75F1C5DE59E1A2F11D97C98852CF6B0F67EA865BDF2DBB16AA5BBD95283
13,609,324 UART: [art] SIG.S = ED3A94E09D450B93D2325E5CC4C2968B7B74FFA155A963ACCAEA6658A01A86F2ACD872A1FA09DDC9676BBBCF3786160A
13,633,803 UART: Caliptra RT
13,634,146 UART: [state] CFI Enabled
13,996,824 UART: [rt] RT listening for mailbox commands...
13,997,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
14,026,761 UART: [rt]cmd =0x494e464f, len=4
14,030,487 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.23s
Truncated 1818 bytes from beginning
] FE.KEYID = 1
1,215,408 UART: [ldev] Erasing FE.KEYID = 1
1,241,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,494 UART: [ldev] --
1,280,909 UART: [fwproc] Wait for Commands...
1,281,608 UART: [fwproc] Recv command 0x46574c44
1,282,341 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,344 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,519 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,896 >>> mbox cmd response: success
2,825,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,826,940 UART: [afmc] ++
2,827,108 UART: [afmc] CDI.KEYID = 6
2,827,471 UART: [afmc] SUBJECT.KEYID = 7
2,827,897 UART: [afmc] AUTHORITY.KEYID = 5
2,862,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,923 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
2,885,651 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
2,891,548 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
2,897,250 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
2,904,992 UART: [afmc] --
2,905,825 UART: [cold-reset] --
2,906,559 UART: [state] Locking Datavault
2,907,668 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,272 UART: [state] Locking ICCM
2,908,782 UART: [exit] Launching FMC @ 0x40000130
2,914,112 UART:
2,914,128 UART: Running Caliptra FMC ...
2,914,536 UART:
2,914,590 UART: [state] CFI Enabled
2,925,149 UART: [fht] FMC Alias Private Key: 7
3,044,538 UART: [art] Extend RT PCRs Done
3,044,966 UART: [art] Lock RT PCRs Done
3,046,462 UART: [art] Populate DV Done
3,054,778 UART: [fht] FMC Alias Private Key: 7
3,055,770 UART: [art] Derive CDI
3,056,050 UART: [art] Store in slot 0x4
3,142,019 UART: [art] Derive Key Pair
3,142,379 UART: [art] Store priv key in slot 0x5
3,155,067 UART: [art] Derive Key Pair - Done
3,169,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,924 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,689 UART: [art] PUB.X = 79106E62E8ED29049389F65C50293CA7C9D9679ED3DEDCB623C132526A35C0A43D76B565330EDFA5C96226AC0441BF3C
3,192,454 UART: [art] PUB.Y = DFD8F555F42CFCAF9C262A1F5545457BE7CF0E62D1888E2E61B83837423B9D662C56FE4561A80C02898E6D21BDBA6B26
3,199,405 UART: [art] SIG.R = 8B93EB22C5C384406A20CB6A0D6042CDD13D119AA21B88002C2E58FD07DD1192298CDFCB7C8AA021BAAA7F1D77A77EFB
3,206,167 UART: [art] SIG.S = BE0CD2B48C476B8602D151D402CCAA8BD62343BE50CC830C114C306B91D2A325FAC3FD211C89F615B5181DE91FC895AC
3,229,969 UART: Caliptra RT
3,230,220 UART: [state] CFI Enabled
3,350,066 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,786 UART: [rt]cmd =0x494e464f, len=4
3,384,532 >>> mbox cmd response data (312 bytes)
3,384,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,240 UART:
3,385,256 UART: Running Caliptra ROM ...
3,385,664 UART:
3,385,719 UART: [state] CFI Enabled
3,388,415 UART: [state] LifecycleState = Unprovisioned
3,389,070 UART: [state] DebugLocked = No
3,389,772 UART: [state] WD Timer not started. Device not locked for debugging
3,391,130 UART: [kat] SHA2-256
4,194,680 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,198,784 UART: [kat] ++
4,198,936 UART: [kat] sha1
4,202,956 UART: [kat] SHA2-256
4,204,896 UART: [kat] SHA2-384
4,207,679 UART: [kat] SHA2-512-ACC
4,209,579 UART: [kat] ECC-384
4,219,200 UART: [kat] HMAC-384Kdf
4,223,600 UART: [kat] LMS
4,471,912 UART: [kat] --
4,472,718 UART: [update-reset] ++
5,831,260 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,832,293 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,987,508 >>> mbox cmd response: success
5,987,691 UART: [update-reset] Copying MAN_2 To MAN_1
5,995,705 UART: [update-reset Success] --
5,996,634 UART: [state] Locking Datavault
5,997,490 UART: [state] Locking PCR0, PCR1 and PCR31
5,998,094 UART: [state] Locking ICCM
5,998,726 UART: [exit] Launching FMC @ 0x40000130
6,004,056 UART:
6,004,072 UART: Running Caliptra FMC ...
6,004,480 UART:
6,004,534 UART: [state] CFI Enabled
6,093,481 UART: [art] Extend RT PCRs Done
6,093,909 UART: [art] Lock RT PCRs Done
6,095,130 UART: [art] Populate DV Done
6,103,276 UART: [fht] FMC Alias Private Key: 7
6,104,248 UART: [art] Derive CDI
6,104,528 UART: [art] Store in slot 0x4
6,190,139 UART: [art] Derive Key Pair
6,190,499 UART: [art] Store priv key in slot 0x5
6,203,711 UART: [art] Derive Key Pair - Done
6,218,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,233,772 UART: [art] Erasing AUTHORITY.KEYID = 7
6,234,537 UART: [art] PUB.X = 3F944BF3BC89F72933826B7132884E55D0C3A42BC5722C603898A2FFF7520FB65674A6B137B96B3D764316BD31945522
6,241,296 UART: [art] PUB.Y = 140A812CD44A3AA469EE806E3C241906CFF8FD97EF395EFD87DE8A783BD9D429B9EB96307517D24D3AF2256DF4F77C8F
6,248,254 UART: [art] SIG.R = 7BA9917C76CBAD7B05B811DD82B0540ED1BCC1265EFE6BA003D251EDC477CE162B4E6175CCF4E38850C2AE22376503BD
6,255,028 UART: [art] SIG.S = A761339B6BFE6EC4C27C3D761E101CEDA4954B407CB15CA0DD02E771B199FC204750BCE7E366B00F5B2897C04E6E00D7
6,278,654 UART: Caliptra RT
6,278,905 UART: [state] CFI Enabled
6,644,651 UART: [rt] RT listening for mailbox commands...
6,645,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,674,966 UART: [rt]cmd =0x494e464f, len=4
6,678,640 >>> mbox cmd response data (312 bytes)
6,678,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,679,446 UART:
6,679,462 UART: Running Caliptra ROM ...
6,679,870 UART:
6,679,925 UART: [state] CFI Enabled
6,682,263 UART: [state] LifecycleState = Unprovisioned
6,682,918 UART: [state] DebugLocked = No
6,683,600 UART: [state] WD Timer not started. Device not locked for debugging
6,684,748 UART: [kat] SHA2-256
7,488,298 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,492,402 UART: [kat] ++
7,492,554 UART: [kat] sha1
7,496,938 UART: [kat] SHA2-256
7,498,878 UART: [kat] SHA2-384
7,501,819 UART: [kat] SHA2-512-ACC
7,503,719 UART: [kat] ECC-384
7,513,188 UART: [kat] HMAC-384Kdf
7,517,764 UART: [kat] LMS
7,766,076 UART: [kat] --
7,766,942 UART: [update-reset] ++
9,125,806 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
9,126,925 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
9,282,140 >>> mbox cmd response: success
9,282,255 UART: [update-reset] Copying MAN_2 To MAN_1
9,290,269 UART: [update-reset Success] --
9,291,322 UART: [state] Locking Datavault
9,292,142 UART: [state] Locking PCR0, PCR1 and PCR31
9,292,746 UART: [state] Locking ICCM
9,293,230 UART: [exit] Launching FMC @ 0x40000130
9,298,560 UART:
9,298,576 UART: Running Caliptra FMC ...
9,298,984 UART:
9,299,038 UART: [state] CFI Enabled
9,387,955 UART: [art] Extend RT PCRs Done
9,388,383 UART: [art] Lock RT PCRs Done
9,389,668 UART: [art] Populate DV Done
9,397,900 UART: [fht] FMC Alias Private Key: 7
9,398,876 UART: [art] Derive CDI
9,399,156 UART: [art] Store in slot 0x4
9,484,937 UART: [art] Derive Key Pair
9,485,297 UART: [art] Store priv key in slot 0x5
9,498,867 UART: [art] Derive Key Pair - Done
9,513,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,528,972 UART: [art] Erasing AUTHORITY.KEYID = 7
9,529,737 UART: [art] PUB.X = 9583D3AC47AB5A52BE7C633363671840A5576A75C089E55538C2653C75051C26A8820734F5E296F20A7E4977F0A063E5
9,536,486 UART: [art] PUB.Y = 7F5D12347CBFD28A1EE707AF33F94B454CF7ED9B158EFF37284D2E28F48A9B71EBD0E02C3A22449A3A8EA29E0225DC21
9,543,446 UART: [art] SIG.R = FA2100786AC822AAA4705FC64D02021C1C6FBA6577684F9E1CFEAD7C5F8E20A18CB495DE95A40877B7C5EDB1423AAC44
9,550,201 UART: [art] SIG.S = E99F558A1C8FF11A42EC46A9A188C2F15B94F55665FF4168498AE6FB6EC2DEA08D2C45AF84CC3CA6A1664B084F5AB4B8
9,574,316 UART: Caliptra RT
9,574,567 UART: [state] CFI Enabled
9,944,494 UART: [rt] RT listening for mailbox commands...
9,945,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,974,437 UART: [rt]cmd =0x494e464f, len=4
9,978,279 >>> mbox cmd response data (312 bytes)
9,978,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,978,837 UART:
9,978,853 UART: Running Caliptra ROM ...
9,979,261 UART:
9,979,316 UART: [state] CFI Enabled
9,981,680 UART: [state] LifecycleState = Unprovisioned
9,982,335 UART: [state] DebugLocked = No
9,982,945 UART: [state] WD Timer not started. Device not locked for debugging
9,984,113 UART: [kat] SHA2-256
10,787,663 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,791,767 UART: [kat] ++
10,791,919 UART: [kat] sha1
10,796,113 UART: [kat] SHA2-256
10,798,053 UART: [kat] SHA2-384
10,800,654 UART: [kat] SHA2-512-ACC
10,802,554 UART: [kat] ECC-384
10,812,275 UART: [kat] HMAC-384Kdf
10,816,709 UART: [kat] LMS
11,065,021 UART: [kat] --
11,065,863 UART: [update-reset] ++
12,424,587 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,425,640 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
12,580,855 >>> mbox cmd response: success
12,580,982 UART: [update-reset] Copying MAN_2 To MAN_1
12,588,996 UART: [update-reset Success] --
12,589,757 UART: [state] Locking Datavault
12,590,719 UART: [state] Locking PCR0, PCR1 and PCR31
12,591,323 UART: [state] Locking ICCM
12,591,949 UART: [exit] Launching FMC @ 0x40000130
12,597,279 UART:
12,597,295 UART: Running Caliptra FMC ...
12,597,703 UART:
12,597,757 UART: [state] CFI Enabled
12,686,868 UART: [art] Extend RT PCRs Done
12,687,296 UART: [art] Lock RT PCRs Done
12,688,377 UART: [art] Populate DV Done
12,696,497 UART: [fht] FMC Alias Private Key: 7
12,697,465 UART: [art] Derive CDI
12,697,745 UART: [art] Store in slot 0x4
12,783,828 UART: [art] Derive Key Pair
12,784,188 UART: [art] Store priv key in slot 0x5
12,797,302 UART: [art] Derive Key Pair - Done
12,812,042 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,827,415 UART: [art] Erasing AUTHORITY.KEYID = 7
12,828,180 UART: [art] PUB.X = 3F944BF3BC89F72933826B7132884E55D0C3A42BC5722C603898A2FFF7520FB65674A6B137B96B3D764316BD31945522
12,834,939 UART: [art] PUB.Y = 140A812CD44A3AA469EE806E3C241906CFF8FD97EF395EFD87DE8A783BD9D429B9EB96307517D24D3AF2256DF4F77C8F
12,841,897 UART: [art] SIG.R = 7BA9917C76CBAD7B05B811DD82B0540ED1BCC1265EFE6BA003D251EDC477CE162B4E6175CCF4E38850C2AE22376503BD
12,848,671 UART: [art] SIG.S = A761339B6BFE6EC4C27C3D761E101CEDA4954B407CB15CA0DD02E771B199FC204750BCE7E366B00F5B2897C04E6E00D7
12,872,795 UART: Caliptra RT
12,873,046 UART: [state] CFI Enabled
13,240,262 UART: [rt] RT listening for mailbox commands...
13,240,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,270,315 UART: [rt]cmd =0x494e464f, len=4
13,274,031 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,260 ready_for_fw is high
1,059,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,669 >>> mbox cmd response: success
2,677,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,739,073 UART:
2,739,089 UART: Running Caliptra FMC ...
2,739,497 UART:
2,739,551 UART: [state] CFI Enabled
2,750,044 UART: [fht] FMC Alias Private Key: 7
2,868,755 UART: [art] Extend RT PCRs Done
2,869,183 UART: [art] Lock RT PCRs Done
2,870,647 UART: [art] Populate DV Done
2,878,727 UART: [fht] FMC Alias Private Key: 7
2,879,817 UART: [art] Derive CDI
2,880,097 UART: [art] Store in slot 0x4
2,965,988 UART: [art] Derive Key Pair
2,966,348 UART: [art] Store priv key in slot 0x5
2,979,730 UART: [art] Derive Key Pair - Done
2,994,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,982 UART: [art] PUB.X = F52F21B294D85676ADB070BC5BB1AF82A33CF2F4EA1FC7F4B4CCA1127412B68315CDB01DCFAFDBE31E5FF46971AE86EC
3,017,780 UART: [art] PUB.Y = F07940522E4258B031CE59D19C4E8FD6FFFE7307DDE6FE606BC04B72BB77EE339E912B0FE07284D546ACA26FE598CF40
3,024,738 UART: [art] SIG.R = B9A7BFDA0CE78B2941F6867A2EF2DC7AE523516CA523EC0CC3F00839289D7A32E2623736736FFE2D5B59F7C35DA0C0B1
3,031,513 UART: [art] SIG.S = 22AFEFCEEBB04295FC90ECEE0E4CEA6E2829D47ACB0FA1056E9F70E2377E2C645576660DA45F940923827C862A32A5AB
3,055,330 UART: Caliptra RT
3,055,581 UART: [state] CFI Enabled
3,174,710 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,142 UART: [rt]cmd =0x494e464f, len=4
3,208,700 >>> mbox cmd response data (312 bytes)
3,208,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,697,617 >>> mbox cmd response: success
5,711,272 UART:
5,711,288 UART: Running Caliptra FMC ...
5,711,696 UART:
5,711,750 UART: [state] CFI Enabled
5,801,679 UART: [art] Extend RT PCRs Done
5,802,107 UART: [art] Lock RT PCRs Done
5,803,588 UART: [art] Populate DV Done
5,811,726 UART: [fht] FMC Alias Private Key: 7
5,812,670 UART: [art] Derive CDI
5,812,950 UART: [art] Store in slot 0x4
5,898,519 UART: [art] Derive Key Pair
5,898,879 UART: [art] Store priv key in slot 0x5
5,911,915 UART: [art] Derive Key Pair - Done
5,926,429 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,941,816 UART: [art] Erasing AUTHORITY.KEYID = 7
5,942,581 UART: [art] PUB.X = 4309BDC83624FDD523583E54DB44F6BDC074ECC4829E7EB44D91A49E146FF21CD3A70459A51B3889B2BBD6F1DF6447B9
5,949,357 UART: [art] PUB.Y = 7DAFE23F3EB40787FAFE61E4C6C1702841682342D520412E7EB69278666326212409E1267841CE4D48BC07DBE18688C6
5,956,292 UART: [art] SIG.R = 34717EA26EBE2CB06C7148DA203228658BDC724894AC278BA66ED09D10525FAAF44D8F16021ED9F74962552EB0CDEBF9
5,963,069 UART: [art] SIG.S = 7F5733E4B28DB09ABF69BDE65CC95FC79FA63C63F2098061CF5E2A5F1F9C9EF035F9C14405158FCFEF862C8FF6C744FF
5,986,543 UART: Caliptra RT
5,986,794 UART: [state] CFI Enabled
6,352,881 UART: [rt] RT listening for mailbox commands...
6,353,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,383,152 UART: [rt]cmd =0x494e464f, len=4
6,387,084 >>> mbox cmd response data (312 bytes)
6,387,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,876,218 >>> mbox cmd response: success
8,889,459 UART:
8,889,475 UART: Running Caliptra FMC ...
8,889,883 UART:
8,889,937 UART: [state] CFI Enabled
8,979,494 UART: [art] Extend RT PCRs Done
8,979,922 UART: [art] Lock RT PCRs Done
8,981,039 UART: [art] Populate DV Done
8,989,173 UART: [fht] FMC Alias Private Key: 7
8,990,163 UART: [art] Derive CDI
8,990,443 UART: [art] Store in slot 0x4
9,076,544 UART: [art] Derive Key Pair
9,076,904 UART: [art] Store priv key in slot 0x5
9,090,682 UART: [art] Derive Key Pair - Done
9,105,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,120,891 UART: [art] Erasing AUTHORITY.KEYID = 7
9,121,656 UART: [art] PUB.X = 45394C8FF5740657BFB36C81622E9A338CF619C6D04393DF50E9255BC0927B5B5B6F05C0EF30330B38AA0BC1BC2416E6
9,128,418 UART: [art] PUB.Y = 6DAB10958CAA7208216E6AA397B7633F4FDC310ACD0110918858930D5268ABD6224DA349DFD5790BB539AB15298AE9A3
9,135,357 UART: [art] SIG.R = 7E2B52DCE537B8CB3DB5BCD5DC593C48E85959D6762A30128B7C38F9B462ECF4915F5F8330133BBC75F69F20F1CD50E7
9,142,139 UART: [art] SIG.S = C30D6AF98F5BFE0499DD62F1D423A4B20DDFE8C1D19797ABB9992D6DAA2223733F140CA77C9C68B047D892DF026F2C8F
9,166,084 UART: Caliptra RT
9,166,335 UART: [state] CFI Enabled
9,529,339 UART: [rt] RT listening for mailbox commands...
9,530,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,559,762 UART: [rt]cmd =0x494e464f, len=4
9,563,452 >>> mbox cmd response data (312 bytes)
9,563,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,051,481 >>> mbox cmd response: success
12,064,618 UART:
12,064,634 UART: Running Caliptra FMC ...
12,065,042 UART:
12,065,096 UART: [state] CFI Enabled
12,154,035 UART: [art] Extend RT PCRs Done
12,154,463 UART: [art] Lock RT PCRs Done
12,155,466 UART: [art] Populate DV Done
12,163,550 UART: [fht] FMC Alias Private Key: 7
12,164,642 UART: [art] Derive CDI
12,164,922 UART: [art] Store in slot 0x4
12,250,751 UART: [art] Derive Key Pair
12,251,111 UART: [art] Store priv key in slot 0x5
12,264,559 UART: [art] Derive Key Pair - Done
12,279,475 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,294,752 UART: [art] Erasing AUTHORITY.KEYID = 7
12,295,517 UART: [art] PUB.X = 4309BDC83624FDD523583E54DB44F6BDC074ECC4829E7EB44D91A49E146FF21CD3A70459A51B3889B2BBD6F1DF6447B9
12,302,293 UART: [art] PUB.Y = 7DAFE23F3EB40787FAFE61E4C6C1702841682342D520412E7EB69278666326212409E1267841CE4D48BC07DBE18688C6
12,309,228 UART: [art] SIG.R = 34717EA26EBE2CB06C7148DA203228658BDC724894AC278BA66ED09D10525FAAF44D8F16021ED9F74962552EB0CDEBF9
12,316,005 UART: [art] SIG.S = 7F5733E4B28DB09ABF69BDE65CC95FC79FA63C63F2098061CF5E2A5F1F9C9EF035F9C14405158FCFEF862C8FF6C744FF
12,339,975 UART: Caliptra RT
12,340,226 UART: [state] CFI Enabled
12,706,449 UART: [rt] RT listening for mailbox commands...
12,707,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,736,690 UART: [rt]cmd =0x494e464f, len=4
12,740,328 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.04s
Truncated 1818 bytes from beginning
] FE.KEYID = 1
1,215,795 UART: [ldev] Erasing FE.KEYID = 1
1,242,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,631 UART: [ldev] --
1,281,942 UART: [fwproc] Wait for Commands...
1,282,761 UART: [fwproc] Recv command 0x46574c44
1,283,494 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,361 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,536 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,771 >>> mbox cmd response: success
2,826,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,827,967 UART: [afmc] ++
2,828,135 UART: [afmc] CDI.KEYID = 6
2,828,498 UART: [afmc] SUBJECT.KEYID = 7
2,828,924 UART: [afmc] AUTHORITY.KEYID = 5
2,864,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,426 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
2,887,154 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
2,893,051 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
2,898,753 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
2,906,381 UART: [afmc] --
2,907,220 UART: [cold-reset] --
2,908,060 UART: [state] Locking Datavault
2,909,279 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,883 UART: [state] Locking ICCM
2,910,457 UART: [exit] Launching FMC @ 0x40000130
2,915,787 UART:
2,915,803 UART: Running Caliptra FMC ...
2,916,211 UART:
2,916,354 UART: [state] CFI Enabled
2,927,079 UART: [fht] FMC Alias Private Key: 7
3,045,744 UART: [art] Extend RT PCRs Done
3,046,172 UART: [art] Lock RT PCRs Done
3,047,854 UART: [art] Populate DV Done
3,056,180 UART: [fht] FMC Alias Private Key: 7
3,057,226 UART: [art] Derive CDI
3,057,506 UART: [art] Store in slot 0x4
3,143,647 UART: [art] Derive Key Pair
3,144,007 UART: [art] Store priv key in slot 0x5
3,157,637 UART: [art] Derive Key Pair - Done
3,172,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,724 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,489 UART: [art] PUB.X = 1393EF5E2B615C6A39D8CBF99B921AD60B04402139D55EB867347E3554B7EFA5B3677DD69566F5F26CD86B6280AD367B
3,195,257 UART: [art] PUB.Y = 8CEB60D4BEE3E9E534F46893493C484AFD3930FB9D3C00C4F641005A12423F2E54D850EE622DA181EA56BE13B9201266
3,202,167 UART: [art] SIG.R = 925839685B0EA3F7436F2B7B9D1BFB3E54628640FEE886DDE6F5685B1B20B96D05D24AFA3F4A4CDD7B8D6D39229ED659
3,208,943 UART: [art] SIG.S = 9409AD7F98BC0A1A52951FD4D26AD04E7AF9C036C2E17E5A5A2C2A627CC5D0D35255F5670A3628693A0A148A17112B69
3,232,919 UART: Caliptra RT
3,233,262 UART: [state] CFI Enabled
3,352,554 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,000 UART: [rt]cmd =0x494e464f, len=4
3,386,576 >>> mbox cmd response data (312 bytes)
3,386,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,386 UART:
3,387,402 UART: Running Caliptra ROM ...
3,387,810 UART:
3,387,952 UART: [state] CFI Enabled
3,390,842 UART: [state] LifecycleState = Unprovisioned
3,391,497 UART: [state] DebugLocked = No
3,392,019 UART: [state] WD Timer not started. Device not locked for debugging
3,393,357 UART: [kat] SHA2-256
4,196,907 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,201,011 UART: [kat] ++
4,201,163 UART: [kat] sha1
4,205,577 UART: [kat] SHA2-256
4,207,517 UART: [kat] SHA2-384
4,210,318 UART: [kat] SHA2-512-ACC
4,212,218 UART: [kat] ECC-384
4,222,389 UART: [kat] HMAC-384Kdf
4,227,037 UART: [kat] LMS
4,475,349 UART: [kat] --
4,476,283 UART: [update-reset] ++
5,835,761 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,836,826 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,992,041 >>> mbox cmd response: success
5,992,382 UART: [update-reset] Copying MAN_2 To MAN_1
6,000,396 UART: [update-reset Success] --
6,001,471 UART: [state] Locking Datavault
6,002,211 UART: [state] Locking PCR0, PCR1 and PCR31
6,002,815 UART: [state] Locking ICCM
6,003,321 UART: [exit] Launching FMC @ 0x40000130
6,008,651 UART:
6,008,667 UART: Running Caliptra FMC ...
6,009,075 UART:
6,009,218 UART: [state] CFI Enabled
6,098,101 UART: [art] Extend RT PCRs Done
6,098,529 UART: [art] Lock RT PCRs Done
6,099,722 UART: [art] Populate DV Done
6,107,930 UART: [fht] FMC Alias Private Key: 7
6,108,950 UART: [art] Derive CDI
6,109,230 UART: [art] Store in slot 0x4
6,194,691 UART: [art] Derive Key Pair
6,195,051 UART: [art] Store priv key in slot 0x5
6,208,531 UART: [art] Derive Key Pair - Done
6,222,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,238,124 UART: [art] Erasing AUTHORITY.KEYID = 7
6,238,889 UART: [art] PUB.X = D339E482C05F50F72A432F7BA70DB6E6D0D16BE4E0757FA69E26146299A68C03865FE61F62C036F54354BAED5BCD1383
6,245,659 UART: [art] PUB.Y = D238DC415DC18E7FC1CA17F1A0CF9DF193624772152C541805C8B12CCB137E66DC8CC49FA7C1EEAD78CEE4006332A2A0
6,252,600 UART: [art] SIG.R = BE293373CCAC8719399312A4CA0145A7B62D7F99577A57F3D985F0D9EACEEA2FFD774F0176D4BE1394F0FA8935D981B5
6,259,374 UART: [art] SIG.S = 545A58FB3639E3DA9B67E2AE44A9C295CF19FEFEFED8FD97B10BC60E8004A190DAC688B0FF9A0963BD376CA2FBF7FF3A
6,282,748 UART: Caliptra RT
6,283,091 UART: [state] CFI Enabled
6,652,801 UART: [rt] RT listening for mailbox commands...
6,653,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,682,982 UART: [rt]cmd =0x494e464f, len=4
6,686,786 >>> mbox cmd response data (312 bytes)
6,686,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,687,616 UART:
6,687,632 UART: Running Caliptra ROM ...
6,688,040 UART:
6,688,182 UART: [state] CFI Enabled
6,691,104 UART: [state] LifecycleState = Unprovisioned
6,691,759 UART: [state] DebugLocked = No
6,692,351 UART: [state] WD Timer not started. Device not locked for debugging
6,693,523 UART: [kat] SHA2-256
7,497,073 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,501,177 UART: [kat] ++
7,501,329 UART: [kat] sha1
7,505,567 UART: [kat] SHA2-256
7,507,507 UART: [kat] SHA2-384
7,510,164 UART: [kat] SHA2-512-ACC
7,512,064 UART: [kat] ECC-384
7,521,837 UART: [kat] HMAC-384Kdf
7,526,411 UART: [kat] LMS
7,774,723 UART: [kat] --
7,775,655 UART: [update-reset] ++
9,134,481 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
9,135,458 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
9,290,673 >>> mbox cmd response: success
9,290,994 UART: [update-reset] Copying MAN_2 To MAN_1
9,299,008 UART: [update-reset Success] --
9,299,779 UART: [state] Locking Datavault
9,300,597 UART: [state] Locking PCR0, PCR1 and PCR31
9,301,201 UART: [state] Locking ICCM
9,301,637 UART: [exit] Launching FMC @ 0x40000130
9,306,967 UART:
9,306,983 UART: Running Caliptra FMC ...
9,307,391 UART:
9,307,534 UART: [state] CFI Enabled
9,396,931 UART: [art] Extend RT PCRs Done
9,397,359 UART: [art] Lock RT PCRs Done
9,398,504 UART: [art] Populate DV Done
9,406,764 UART: [fht] FMC Alias Private Key: 7
9,407,694 UART: [art] Derive CDI
9,407,974 UART: [art] Store in slot 0x4
9,493,997 UART: [art] Derive Key Pair
9,494,357 UART: [art] Store priv key in slot 0x5
9,507,503 UART: [art] Derive Key Pair - Done
9,522,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,537,628 UART: [art] Erasing AUTHORITY.KEYID = 7
9,538,393 UART: [art] PUB.X = FC488F0647123B673FE85331B867238F134AB6AFC15508942C6BE153F6AE8C29BAFE80F34A60E37AC422A52A43D63DED
9,545,165 UART: [art] PUB.Y = 6B81FFBDAC6199A5A1BBD32B8EEA01CBA9AE3BF9334112889394C806A84E59BDBF36C9BE579C10C4ED14F3AF6A4894B1
9,552,131 UART: [art] SIG.R = 8FEDD91585C42B64A209C3E16F46787E92C86407582EF8A7E80D7E2157A1FD95895E25A0D28584A88A5300E9A20D130C
9,558,862 UART: [art] SIG.S = 630AE179A64F5D7A0661D605D10D1735EE7F98559EC4441F66FB213AC888DA9A8C31FBAC3519C42AA942DA1F15E37AED
9,583,162 UART: Caliptra RT
9,583,505 UART: [state] CFI Enabled
9,951,017 UART: [rt] RT listening for mailbox commands...
9,951,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,981,342 UART: [rt]cmd =0x494e464f, len=4
9,985,116 >>> mbox cmd response data (312 bytes)
9,985,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,986,032 UART:
9,986,048 UART: Running Caliptra ROM ...
9,986,456 UART:
9,986,598 UART: [state] CFI Enabled
9,989,532 UART: [state] LifecycleState = Unprovisioned
9,990,187 UART: [state] DebugLocked = No
9,990,781 UART: [state] WD Timer not started. Device not locked for debugging
9,991,969 UART: [kat] SHA2-256
10,795,519 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,799,623 UART: [kat] ++
10,799,775 UART: [kat] sha1
10,804,083 UART: [kat] SHA2-256
10,806,023 UART: [kat] SHA2-384
10,808,776 UART: [kat] SHA2-512-ACC
10,810,676 UART: [kat] ECC-384
10,820,673 UART: [kat] HMAC-384Kdf
10,825,507 UART: [kat] LMS
11,073,819 UART: [kat] --
11,074,727 UART: [update-reset] ++
12,432,463 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,433,660 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
12,588,875 >>> mbox cmd response: success
12,589,070 UART: [update-reset] Copying MAN_2 To MAN_1
12,597,084 UART: [update-reset Success] --
12,598,271 UART: [state] Locking Datavault
12,599,281 UART: [state] Locking PCR0, PCR1 and PCR31
12,599,885 UART: [state] Locking ICCM
12,600,439 UART: [exit] Launching FMC @ 0x40000130
12,605,769 UART:
12,605,785 UART: Running Caliptra FMC ...
12,606,193 UART:
12,606,336 UART: [state] CFI Enabled
12,695,387 UART: [art] Extend RT PCRs Done
12,695,815 UART: [art] Lock RT PCRs Done
12,696,988 UART: [art] Populate DV Done
12,705,212 UART: [fht] FMC Alias Private Key: 7
12,706,302 UART: [art] Derive CDI
12,706,582 UART: [art] Store in slot 0x4
12,792,619 UART: [art] Derive Key Pair
12,792,979 UART: [art] Store priv key in slot 0x5
12,806,231 UART: [art] Derive Key Pair - Done
12,820,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,836,532 UART: [art] Erasing AUTHORITY.KEYID = 7
12,837,297 UART: [art] PUB.X = D339E482C05F50F72A432F7BA70DB6E6D0D16BE4E0757FA69E26146299A68C03865FE61F62C036F54354BAED5BCD1383
12,844,067 UART: [art] PUB.Y = D238DC415DC18E7FC1CA17F1A0CF9DF193624772152C541805C8B12CCB137E66DC8CC49FA7C1EEAD78CEE4006332A2A0
12,851,008 UART: [art] SIG.R = BE293373CCAC8719399312A4CA0145A7B62D7F99577A57F3D985F0D9EACEEA2FFD774F0176D4BE1394F0FA8935D981B5
12,857,782 UART: [art] SIG.S = 545A58FB3639E3DA9B67E2AE44A9C295CF19FEFEFED8FD97B10BC60E8004A190DAC688B0FF9A0963BD376CA2FBF7FF3A
12,881,296 UART: Caliptra RT
12,881,639 UART: [state] CFI Enabled
13,242,373 UART: [rt] RT listening for mailbox commands...
13,243,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,272,566 UART: [rt]cmd =0x494e464f, len=4
13,276,308 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,901 ready_for_fw is high
1,059,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,904 >>> mbox cmd response: success
2,679,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,742,416 UART:
2,742,432 UART: Running Caliptra FMC ...
2,742,840 UART:
2,742,983 UART: [state] CFI Enabled
2,753,198 UART: [fht] FMC Alias Private Key: 7
2,871,673 UART: [art] Extend RT PCRs Done
2,872,101 UART: [art] Lock RT PCRs Done
2,873,403 UART: [art] Populate DV Done
2,881,759 UART: [fht] FMC Alias Private Key: 7
2,882,759 UART: [art] Derive CDI
2,883,039 UART: [art] Store in slot 0x4
2,968,966 UART: [art] Derive Key Pair
2,969,326 UART: [art] Store priv key in slot 0x5
2,983,116 UART: [art] Derive Key Pair - Done
2,997,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,401 UART: [art] PUB.X = BC3838AEEC97911D43DB8C41B846717C57761051E237457C8EFD0D5A8DE2289A36BD0ED21BF1AE93BDADACEC562AAF34
3,021,185 UART: [art] PUB.Y = 809CF5C7AEE2C85808EAFD460C652E861A45DC2356D3192DF10206FB00165CC6AA6964E78D6E3D62F0FC56A61A09E0C1
3,028,108 UART: [art] SIG.R = 69C8CC1D43B4FE1C5B36A581531242B9070F4215D2C63DB5EEB211F77BD13B8EA91FF699AD341DC58FA9C1E53F7A3754
3,034,884 UART: [art] SIG.S = 2CB8CC8A812C72F47452C3ADAEDD1B9AEC890BE53325ABE9ABBBB8C2E8224CA4285CD9BFAAAAF21953892196EB4F2C06
3,059,168 UART: Caliptra RT
3,059,511 UART: [state] CFI Enabled
3,178,669 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,233 UART: [rt]cmd =0x494e464f, len=4
3,213,105 >>> mbox cmd response data (312 bytes)
3,213,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,702,502 >>> mbox cmd response: success
5,715,831 UART:
5,715,847 UART: Running Caliptra FMC ...
5,716,255 UART:
5,716,398 UART: [state] CFI Enabled
5,805,869 UART: [art] Extend RT PCRs Done
5,806,297 UART: [art] Lock RT PCRs Done
5,807,726 UART: [art] Populate DV Done
5,816,112 UART: [fht] FMC Alias Private Key: 7
5,817,194 UART: [art] Derive CDI
5,817,474 UART: [art] Store in slot 0x4
5,903,221 UART: [art] Derive Key Pair
5,903,581 UART: [art] Store priv key in slot 0x5
5,916,493 UART: [art] Derive Key Pair - Done
5,930,975 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,946,370 UART: [art] Erasing AUTHORITY.KEYID = 7
5,947,135 UART: [art] PUB.X = 77ECA08335756CAC74386EF35C231D58ADBF6EEDE428CDB5F2B7CFECA40A22928A548EA1588A00BCEDB19766D6528D42
5,953,898 UART: [art] PUB.Y = 63A130E0266D2F7BC97D9D2120D7942AD46ED127CB723CA78732DEFC134D77D9C8AF852FC7CD04D6622C76929900A89D
5,960,829 UART: [art] SIG.R = AA34DA93FC9D6935D3B31B2688A33C20D29D1389FC081B0581398CEAA3A61D5BC635AEC38496B1A19723A45F325F016B
5,967,596 UART: [art] SIG.S = 39315BCE642C472C540142AA7FE9919A5FE80BF5BA560F905EE35F54B8507298C76532438572D71E5A427D1CCBC986F1
5,990,925 UART: Caliptra RT
5,991,268 UART: [state] CFI Enabled
6,355,378 UART: [rt] RT listening for mailbox commands...
6,356,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,385,489 UART: [rt]cmd =0x494e464f, len=4
6,389,053 >>> mbox cmd response data (312 bytes)
6,389,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,876,880 >>> mbox cmd response: success
8,890,335 UART:
8,890,351 UART: Running Caliptra FMC ...
8,890,759 UART:
8,890,902 UART: [state] CFI Enabled
8,980,349 UART: [art] Extend RT PCRs Done
8,980,777 UART: [art] Lock RT PCRs Done
8,981,930 UART: [art] Populate DV Done
8,989,834 UART: [fht] FMC Alias Private Key: 7
8,990,784 UART: [art] Derive CDI
8,991,064 UART: [art] Store in slot 0x4
9,077,095 UART: [art] Derive Key Pair
9,077,455 UART: [art] Store priv key in slot 0x5
9,090,897 UART: [art] Derive Key Pair - Done
9,105,915 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,120,972 UART: [art] Erasing AUTHORITY.KEYID = 7
9,121,737 UART: [art] PUB.X = 63251DC73B90A49E8355F58DB9D302BF6BF4912C0A43E59B0370B71DA84FBF5C3687DF9EBE1536357139D076C16F9968
9,128,500 UART: [art] PUB.Y = 73DCE76FC2BB050B41D13B2EBB158CB811B80D19D65A77CEDECCBCE7A3327F6ADBA7D1531DE5D83BC5D9105841D0BCCD
9,135,471 UART: [art] SIG.R = AA43D0E064A64D3C786633237035905523498A74F5EA03F7C0C81C8DA48F6C49DAB069FF50E925159061ADE323B0FB5E
9,142,240 UART: [art] SIG.S = E9C8F46AF66458F013CD7A5FB25323CC13696B15617A1F5705677D6F6CAAEFD95EFFD512899D8E070A3A20D5B1910932
9,166,336 UART: Caliptra RT
9,166,679 UART: [state] CFI Enabled
9,534,826 UART: [rt] RT listening for mailbox commands...
9,535,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,564,767 UART: [rt]cmd =0x494e464f, len=4
9,568,611 >>> mbox cmd response data (312 bytes)
9,568,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,056,446 >>> mbox cmd response: success
12,069,897 UART:
12,069,913 UART: Running Caliptra FMC ...
12,070,321 UART:
12,070,464 UART: [state] CFI Enabled
12,159,551 UART: [art] Extend RT PCRs Done
12,159,979 UART: [art] Lock RT PCRs Done
12,161,126 UART: [art] Populate DV Done
12,169,352 UART: [fht] FMC Alias Private Key: 7
12,170,286 UART: [art] Derive CDI
12,170,566 UART: [art] Store in slot 0x4
12,256,515 UART: [art] Derive Key Pair
12,256,875 UART: [art] Store priv key in slot 0x5
12,270,989 UART: [art] Derive Key Pair - Done
12,285,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,301,284 UART: [art] Erasing AUTHORITY.KEYID = 7
12,302,049 UART: [art] PUB.X = 77ECA08335756CAC74386EF35C231D58ADBF6EEDE428CDB5F2B7CFECA40A22928A548EA1588A00BCEDB19766D6528D42
12,308,812 UART: [art] PUB.Y = 63A130E0266D2F7BC97D9D2120D7942AD46ED127CB723CA78732DEFC134D77D9C8AF852FC7CD04D6622C76929900A89D
12,315,743 UART: [art] SIG.R = AA34DA93FC9D6935D3B31B2688A33C20D29D1389FC081B0581398CEAA3A61D5BC635AEC38496B1A19723A45F325F016B
12,322,510 UART: [art] SIG.S = 39315BCE642C472C540142AA7FE9919A5FE80BF5BA560F905EE35F54B8507298C76532438572D71E5A427D1CCBC986F1
12,346,759 UART: Caliptra RT
12,347,102 UART: [state] CFI Enabled
12,715,880 UART: [rt] RT listening for mailbox commands...
12,716,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,746,041 UART: [rt]cmd =0x494e464f, len=4
12,749,645 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.06s
Truncated 1818 bytes from beginning
] FE.KEYID = 1
1,218,197 UART: [ldev] Erasing FE.KEYID = 1
1,244,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,435 UART: [ldev] --
1,283,740 UART: [fwproc] Wait for Commands...
1,284,392 UART: [fwproc] Recv command 0x46574c44
1,285,120 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,899 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,069 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,298 >>> mbox cmd response: success
2,828,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,829,504 UART: [afmc] ++
2,829,672 UART: [afmc] CDI.KEYID = 6
2,830,034 UART: [afmc] SUBJECT.KEYID = 7
2,830,459 UART: [afmc] AUTHORITY.KEYID = 5
2,865,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,916 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
2,888,643 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
2,894,542 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
2,900,244 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
2,908,147 UART: [afmc] --
2,909,275 UART: [cold-reset] --
2,910,069 UART: [state] Locking Datavault
2,911,424 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,028 UART: [state] Locking ICCM
2,912,464 UART: [exit] Launching FMC @ 0x40000130
2,917,794 UART:
2,917,810 UART: Running Caliptra FMC ...
2,918,218 UART:
2,918,272 UART: [state] CFI Enabled
2,928,969 UART: [fht] FMC Alias Private Key: 7
3,048,266 UART: [art] Extend RT PCRs Done
3,048,694 UART: [art] Lock RT PCRs Done
3,050,372 UART: [art] Populate DV Done
3,058,598 UART: [fht] FMC Alias Private Key: 7
3,059,538 UART: [art] Derive CDI
3,059,818 UART: [art] Store in slot 0x4
3,145,137 UART: [art] Derive Key Pair
3,145,497 UART: [art] Store priv key in slot 0x5
3,158,753 UART: [art] Derive Key Pair - Done
3,173,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,369 UART: [art] PUB.X = 6A0E595F981C4A80155CEED428BECE402D7633495EE3E8239A837F1C2F26D5D76389D460D66DA5CA51A9B9B10D097B33
3,196,136 UART: [art] PUB.Y = EF147D488EEE6D566C05D72DF64C570B9DD789DB02C0EF0C726E55BA435F89FF341E6F3FC21FE99B6793FF948BD931BA
3,203,092 UART: [art] SIG.R = 01739BEE80A9B86F64B334A5B8483477F1C22AC626E2528E5569A2DDD5B64181044C38418D6B320F30346E43A3674F38
3,209,845 UART: [art] SIG.S = 931364D1C12DCB6B842D4EF2ED8F6C26F1D76EC67C1FF458FCEEC68D949DB58DAAEB395C4481BF51E381E42AF0BF0656
3,233,880 UART: Caliptra RT
3,234,131 UART: [state] CFI Enabled
3,353,526 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,864 UART: [rt]cmd =0x494e464f, len=4
3,387,632 >>> mbox cmd response data (312 bytes)
3,387,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,468 UART:
3,388,484 UART: Running Caliptra ROM ...
3,388,892 UART:
3,388,947 UART: [state] CFI Enabled
3,391,507 UART: [state] LifecycleState = Unprovisioned
3,392,162 UART: [state] DebugLocked = No
3,392,892 UART: [state] WD Timer not started. Device not locked for debugging
3,394,028 UART: [kat] SHA2-256
4,199,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,203,803 UART: [kat] ++
4,203,955 UART: [kat] sha1
4,208,275 UART: [kat] SHA2-256
4,210,215 UART: [kat] SHA2-384
4,212,876 UART: [kat] SHA2-512-ACC
4,214,776 UART: [kat] ECC-384
4,224,613 UART: [kat] HMAC-384Kdf
4,229,097 UART: [kat] LMS
4,477,425 UART: [kat] --
4,478,371 UART: [update-reset] ++
5,837,070 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,838,237 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,993,452 >>> mbox cmd response: success
5,993,731 UART: [update-reset] Copying MAN_2 To MAN_1
6,001,745 UART: [update-reset Success] --
6,002,796 UART: [state] Locking Datavault
6,003,516 UART: [state] Locking PCR0, PCR1 and PCR31
6,004,120 UART: [state] Locking ICCM
6,004,720 UART: [exit] Launching FMC @ 0x40000130
6,010,050 UART:
6,010,066 UART: Running Caliptra FMC ...
6,010,474 UART:
6,010,528 UART: [state] CFI Enabled
6,099,605 UART: [art] Extend RT PCRs Done
6,100,033 UART: [art] Lock RT PCRs Done
6,101,172 UART: [art] Populate DV Done
6,109,298 UART: [fht] FMC Alias Private Key: 7
6,110,424 UART: [art] Derive CDI
6,110,704 UART: [art] Store in slot 0x4
6,195,773 UART: [art] Derive Key Pair
6,196,133 UART: [art] Store priv key in slot 0x5
6,209,613 UART: [art] Derive Key Pair - Done
6,224,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,239,872 UART: [art] Erasing AUTHORITY.KEYID = 7
6,240,637 UART: [art] PUB.X = DCDE13C620C770DBB6DAF406F6D8FC03E27F47DED90A4F66B30A81889C2517852385FB055DA797160D1E740D5435B472
6,247,392 UART: [art] PUB.Y = A5AD66C568170FDF39336C75D97FD443F13306298E6659ABA326C746E3951D8D8605B1EA2BA08327DE5FB2D06CDE6947
6,254,337 UART: [art] SIG.R = 5209E1D9AD6E3708BCD8CCD3029E4B3F718D595F163C6E69F0084A86177B726DE8481D1EFFB2E47BD3325D18CE49B6D0
6,261,105 UART: [art] SIG.S = 8A4D0B9411F69A0A38E7EB98988BB04E475902364D6E06823DAFFC93E0402041FEA371A77EDDB09D0F738E48580876FA
6,285,299 UART: Caliptra RT
6,285,550 UART: [state] CFI Enabled
6,651,602 UART: [rt] RT listening for mailbox commands...
6,652,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,681,793 UART: [rt]cmd =0x494e464f, len=4
6,685,495 >>> mbox cmd response data (312 bytes)
6,685,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,686,401 UART:
6,686,417 UART: Running Caliptra ROM ...
6,686,825 UART:
6,686,880 UART: [state] CFI Enabled
6,689,704 UART: [state] LifecycleState = Unprovisioned
6,690,359 UART: [state] DebugLocked = No
6,690,903 UART: [state] WD Timer not started. Device not locked for debugging
6,692,161 UART: [kat] SHA2-256
7,497,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,501,936 UART: [kat] ++
7,502,088 UART: [kat] sha1
7,506,298 UART: [kat] SHA2-256
7,508,238 UART: [kat] SHA2-384
7,510,997 UART: [kat] SHA2-512-ACC
7,512,897 UART: [kat] ECC-384
7,522,694 UART: [kat] HMAC-384Kdf
7,527,316 UART: [kat] LMS
7,775,644 UART: [kat] --
7,776,496 UART: [update-reset] ++
9,135,587 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
9,136,658 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
9,291,873 >>> mbox cmd response: success
9,292,098 UART: [update-reset] Copying MAN_2 To MAN_1
9,300,112 UART: [update-reset Success] --
9,300,983 UART: [state] Locking Datavault
9,301,905 UART: [state] Locking PCR0, PCR1 and PCR31
9,302,509 UART: [state] Locking ICCM
9,302,997 UART: [exit] Launching FMC @ 0x40000130
9,308,327 UART:
9,308,343 UART: Running Caliptra FMC ...
9,308,751 UART:
9,308,805 UART: [state] CFI Enabled
9,397,796 UART: [art] Extend RT PCRs Done
9,398,224 UART: [art] Lock RT PCRs Done
9,399,735 UART: [art] Populate DV Done
9,408,065 UART: [fht] FMC Alias Private Key: 7
9,409,105 UART: [art] Derive CDI
9,409,385 UART: [art] Store in slot 0x4
9,495,236 UART: [art] Derive Key Pair
9,495,596 UART: [art] Store priv key in slot 0x5
9,509,056 UART: [art] Derive Key Pair - Done
9,524,135 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,539,686 UART: [art] Erasing AUTHORITY.KEYID = 7
9,540,451 UART: [art] PUB.X = 736DF17F75CF8F84045339A3231913AEA0C47E4028986ED66495D271AA4CDDF17FD998F41B6A120D5B11A48DB72ED50A
9,547,218 UART: [art] PUB.Y = 3E8F5E89ED6841AD798684045A22EC3020A6DBE137CAC809C77CD826E146CDFE5F48F8826D99971B6A4EB120DC8995A8
9,554,170 UART: [art] SIG.R = 02E0E63DB8AD59E79FCF887B0423F3A1AAB121B0676171D3420C31F26D5E2F65F453266E92736236E4776EFCB68F232B
9,560,933 UART: [art] SIG.S = 279D94BEA8D60D31CCC2F80E686BDA1097767F496EADEEECF0847B005810A31B3C8334F5388E90C34B01A2CA6BA5966F
9,584,594 UART: Caliptra RT
9,584,845 UART: [state] CFI Enabled
9,946,544 UART: [rt] RT listening for mailbox commands...
9,947,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,976,651 UART: [rt]cmd =0x494e464f, len=4
9,980,365 >>> mbox cmd response data (312 bytes)
9,980,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,980,931 UART:
9,980,947 UART: Running Caliptra ROM ...
9,981,355 UART:
9,981,410 UART: [state] CFI Enabled
9,983,814 UART: [state] LifecycleState = Unprovisioned
9,984,469 UART: [state] DebugLocked = No
9,985,157 UART: [state] WD Timer not started. Device not locked for debugging
9,986,285 UART: [kat] SHA2-256
10,791,935 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,796,060 UART: [kat] ++
10,796,212 UART: [kat] sha1
10,800,560 UART: [kat] SHA2-256
10,802,500 UART: [kat] SHA2-384
10,805,205 UART: [kat] SHA2-512-ACC
10,807,105 UART: [kat] ECC-384
10,816,974 UART: [kat] HMAC-384Kdf
10,821,490 UART: [kat] LMS
11,069,818 UART: [kat] --
11,070,828 UART: [update-reset] ++
12,429,437 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,430,466 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
12,585,681 >>> mbox cmd response: success
12,585,902 UART: [update-reset] Copying MAN_2 To MAN_1
12,593,916 UART: [update-reset Success] --
12,594,757 UART: [state] Locking Datavault
12,595,797 UART: [state] Locking PCR0, PCR1 and PCR31
12,596,401 UART: [state] Locking ICCM
12,597,073 UART: [exit] Launching FMC @ 0x40000130
12,602,403 UART:
12,602,419 UART: Running Caliptra FMC ...
12,602,827 UART:
12,602,881 UART: [state] CFI Enabled
12,691,576 UART: [art] Extend RT PCRs Done
12,692,004 UART: [art] Lock RT PCRs Done
12,693,085 UART: [art] Populate DV Done
12,701,209 UART: [fht] FMC Alias Private Key: 7
12,702,293 UART: [art] Derive CDI
12,702,573 UART: [art] Store in slot 0x4
12,788,542 UART: [art] Derive Key Pair
12,788,902 UART: [art] Store priv key in slot 0x5
12,802,032 UART: [art] Derive Key Pair - Done
12,816,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,832,175 UART: [art] Erasing AUTHORITY.KEYID = 7
12,832,940 UART: [art] PUB.X = DCDE13C620C770DBB6DAF406F6D8FC03E27F47DED90A4F66B30A81889C2517852385FB055DA797160D1E740D5435B472
12,839,695 UART: [art] PUB.Y = A5AD66C568170FDF39336C75D97FD443F13306298E6659ABA326C746E3951D8D8605B1EA2BA08327DE5FB2D06CDE6947
12,846,640 UART: [art] SIG.R = 5209E1D9AD6E3708BCD8CCD3029E4B3F718D595F163C6E69F0084A86177B726DE8481D1EFFB2E47BD3325D18CE49B6D0
12,853,408 UART: [art] SIG.S = 8A4D0B9411F69A0A38E7EB98988BB04E475902364D6E06823DAFFC93E0402041FEA371A77EDDB09D0F738E48580876FA
12,876,960 UART: Caliptra RT
12,877,211 UART: [state] CFI Enabled
13,244,459 UART: [rt] RT listening for mailbox commands...
13,245,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,274,602 UART: [rt]cmd =0x494e464f, len=4
13,278,186 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,537 ready_for_fw is high
1,060,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,171 >>> mbox cmd response: success
2,679,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,740,635 UART:
2,740,651 UART: Running Caliptra FMC ...
2,741,059 UART:
2,741,113 UART: [state] CFI Enabled
2,751,622 UART: [fht] FMC Alias Private Key: 7
2,870,241 UART: [art] Extend RT PCRs Done
2,870,669 UART: [art] Lock RT PCRs Done
2,871,863 UART: [art] Populate DV Done
2,880,241 UART: [fht] FMC Alias Private Key: 7
2,881,405 UART: [art] Derive CDI
2,881,685 UART: [art] Store in slot 0x4
2,967,220 UART: [art] Derive Key Pair
2,967,580 UART: [art] Store priv key in slot 0x5
2,981,340 UART: [art] Derive Key Pair - Done
2,995,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,769 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,534 UART: [art] PUB.X = A50EFEF61B25450334BB811769598A2D1D2FE3AE2E122125E2334576E0748AF0F198D4B743E274D4A7C2955CFD5287F1
3,019,298 UART: [art] PUB.Y = 6B3B7E3C196A24589CBFD7BB36FEA489CE5596233755829F7D2A81DE4A875CA953E701EA87A342D32754E34B8516222F
3,026,247 UART: [art] SIG.R = 17B1844E857B88F33F597F863C656456E90A9D2C28765558D0B1DEC6F2DE2B8D32759AF8D2B1A999373FFA117CD4F6C6
3,033,018 UART: [art] SIG.S = DF324E0F1FAD7942C7C21E5AA3DCF7D1FC186570C88B181156C43B205AA34A07F78BE7DC37564FDE96709FD8DD8D4EF5
3,056,836 UART: Caliptra RT
3,057,087 UART: [state] CFI Enabled
3,177,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,504 UART: [rt]cmd =0x494e464f, len=4
3,211,288 >>> mbox cmd response data (312 bytes)
3,211,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,700,103 >>> mbox cmd response: success
5,713,244 UART:
5,713,260 UART: Running Caliptra FMC ...
5,713,668 UART:
5,713,722 UART: [state] CFI Enabled
5,802,593 UART: [art] Extend RT PCRs Done
5,803,021 UART: [art] Lock RT PCRs Done
5,804,452 UART: [art] Populate DV Done
5,812,824 UART: [fht] FMC Alias Private Key: 7
5,813,970 UART: [art] Derive CDI
5,814,250 UART: [art] Store in slot 0x4
5,899,993 UART: [art] Derive Key Pair
5,900,353 UART: [art] Store priv key in slot 0x5
5,913,191 UART: [art] Derive Key Pair - Done
5,928,114 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,943,495 UART: [art] Erasing AUTHORITY.KEYID = 7
5,944,260 UART: [art] PUB.X = 71584E5FB8DDF483E8ED9A156F3CC86C2D08552F8D6D1A79B97FCD3A864F612E348C3F784AAFD0E41EB7BA50DC4AA8F4
5,951,049 UART: [art] PUB.Y = 50F7ACA11B1D16E0B7BED94ECF068417AA5DD1EC20CC94AB436D77C8425603F7B369DAD4F5A46907FF28F80D1A08D97C
5,958,002 UART: [art] SIG.R = F96D2B7FDA2763725F485C1C954B38484C061F99F5A2C2E4210D730F1A010F905D3DC8BB32DB112F3A89C0A0AC79918D
5,964,763 UART: [art] SIG.S = 2EF3E22934F19AC114DE91B15AFAF358C9AD690BA2304D2BF6B8D1D3D4516BBD94B7416C35E713691D4B76879AE8F635
5,988,420 UART: Caliptra RT
5,988,671 UART: [state] CFI Enabled
6,353,965 UART: [rt] RT listening for mailbox commands...
6,354,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,384,378 UART: [rt]cmd =0x494e464f, len=4
6,388,050 >>> mbox cmd response data (312 bytes)
6,388,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,877,539 >>> mbox cmd response: success
8,891,222 UART:
8,891,238 UART: Running Caliptra FMC ...
8,891,646 UART:
8,891,700 UART: [state] CFI Enabled
8,980,729 UART: [art] Extend RT PCRs Done
8,981,157 UART: [art] Lock RT PCRs Done
8,982,510 UART: [art] Populate DV Done
8,990,700 UART: [fht] FMC Alias Private Key: 7
8,991,848 UART: [art] Derive CDI
8,992,128 UART: [art] Store in slot 0x4
9,077,585 UART: [art] Derive Key Pair
9,077,945 UART: [art] Store priv key in slot 0x5
9,090,995 UART: [art] Derive Key Pair - Done
9,105,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,121,084 UART: [art] Erasing AUTHORITY.KEYID = 7
9,121,849 UART: [art] PUB.X = 0B2375E8133B031C9773C41C8A2D369BD5F8F2F6A493AB44FDBCB9910E99506446177B623F590F4B82140323DFDC5899
9,128,602 UART: [art] PUB.Y = A6EA925226A15891F5474DEDA784792784397B84B1CF1CADB2EA3B503BC5BA5C9036E96BDC6CC6E633DB13F35CB190B4
9,135,566 UART: [art] SIG.R = 6EA6D815936E8556B0CF7B5A302F1345F1072F9316C1C10BB6AF8150ECACC6FB7E21AA6F0CD57EF10FD5DA8348724BBC
9,142,342 UART: [art] SIG.S = 2B992DCBBF0055AA105EB9283E189549AC3D7DA48ADA58C0A453D5C1AF88F949E87141E72D4BE62EAE5928EDEE0981F8
9,166,297 UART: Caliptra RT
9,166,548 UART: [state] CFI Enabled
9,536,341 UART: [rt] RT listening for mailbox commands...
9,537,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,566,562 UART: [rt]cmd =0x494e464f, len=4
9,570,336 >>> mbox cmd response data (312 bytes)
9,570,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,058,893 >>> mbox cmd response: success
12,072,398 UART:
12,072,414 UART: Running Caliptra FMC ...
12,072,822 UART:
12,072,876 UART: [state] CFI Enabled
12,161,737 UART: [art] Extend RT PCRs Done
12,162,165 UART: [art] Lock RT PCRs Done
12,163,390 UART: [art] Populate DV Done
12,171,648 UART: [fht] FMC Alias Private Key: 7
12,172,776 UART: [art] Derive CDI
12,173,056 UART: [art] Store in slot 0x4
12,259,057 UART: [art] Derive Key Pair
12,259,417 UART: [art] Store priv key in slot 0x5
12,272,843 UART: [art] Derive Key Pair - Done
12,287,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,303,085 UART: [art] Erasing AUTHORITY.KEYID = 7
12,303,850 UART: [art] PUB.X = 71584E5FB8DDF483E8ED9A156F3CC86C2D08552F8D6D1A79B97FCD3A864F612E348C3F784AAFD0E41EB7BA50DC4AA8F4
12,310,639 UART: [art] PUB.Y = 50F7ACA11B1D16E0B7BED94ECF068417AA5DD1EC20CC94AB436D77C8425603F7B369DAD4F5A46907FF28F80D1A08D97C
12,317,592 UART: [art] SIG.R = F96D2B7FDA2763725F485C1C954B38484C061F99F5A2C2E4210D730F1A010F905D3DC8BB32DB112F3A89C0A0AC79918D
12,324,353 UART: [art] SIG.S = 2EF3E22934F19AC114DE91B15AFAF358C9AD690BA2304D2BF6B8D1D3D4516BBD94B7416C35E713691D4B76879AE8F635
12,347,934 UART: Caliptra RT
12,348,185 UART: [state] CFI Enabled
12,711,489 UART: [rt] RT listening for mailbox commands...
12,712,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,741,824 UART: [rt]cmd =0x494e464f, len=4
12,745,656 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.95s
Truncated 1818 bytes from beginning
] FE.KEYID = 1
1,218,528 UART: [ldev] Erasing FE.KEYID = 1
1,244,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,624 UART: [ldev] --
1,283,909 UART: [fwproc] Wait for Commands...
1,284,545 UART: [fwproc] Recv command 0x46574c44
1,285,273 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,646 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,816 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,121 >>> mbox cmd response: success
2,828,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,829,141 UART: [afmc] ++
2,829,309 UART: [afmc] CDI.KEYID = 6
2,829,671 UART: [afmc] SUBJECT.KEYID = 7
2,830,096 UART: [afmc] AUTHORITY.KEYID = 5
2,865,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,661 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
2,888,388 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
2,894,287 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
2,899,989 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
2,907,692 UART: [afmc] --
2,908,606 UART: [cold-reset] --
2,909,346 UART: [state] Locking Datavault
2,910,471 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,075 UART: [state] Locking ICCM
2,911,499 UART: [exit] Launching FMC @ 0x40000130
2,916,829 UART:
2,916,845 UART: Running Caliptra FMC ...
2,917,253 UART:
2,917,396 UART: [state] CFI Enabled
2,927,739 UART: [fht] FMC Alias Private Key: 7
3,046,106 UART: [art] Extend RT PCRs Done
3,046,534 UART: [art] Lock RT PCRs Done
3,047,926 UART: [art] Populate DV Done
3,056,518 UART: [fht] FMC Alias Private Key: 7
3,057,570 UART: [art] Derive CDI
3,057,850 UART: [art] Store in slot 0x4
3,143,927 UART: [art] Derive Key Pair
3,144,287 UART: [art] Store priv key in slot 0x5
3,157,573 UART: [art] Derive Key Pair - Done
3,172,237 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,772 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,537 UART: [art] PUB.X = 5241709E5BEAD2E60AC47601507A35E18A029B955B7D676DF1318097BFDEE479BECF81A3D546B91B52A08561FBCD215C
3,195,306 UART: [art] PUB.Y = B7032CC7AA4770CDA43BB1D108D82786057AD5FDEF234326BDE3E21B85090E157B7A3A184A84A88170DB5B6F69C33828
3,202,247 UART: [art] SIG.R = 3C66906400668B9AAFC2BC7C407D89892BB39506D16C748F239E3372183A808CFF514442104B5F3C7BE935BF9D57DD6A
3,208,992 UART: [art] SIG.S = E95EA545B663B24D43B84376CF30F89E966A5412C0FF5D2E21BF6E9261ADFEFB9BB26A3C30E00148B822687C4E5C32AE
3,232,709 UART: Caliptra RT
3,233,052 UART: [state] CFI Enabled
3,352,169 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,749 UART: [rt]cmd =0x494e464f, len=4
3,386,615 >>> mbox cmd response data (312 bytes)
3,386,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,495 UART:
3,387,511 UART: Running Caliptra ROM ...
3,387,919 UART:
3,388,061 UART: [state] CFI Enabled
3,390,775 UART: [state] LifecycleState = Unprovisioned
3,391,430 UART: [state] DebugLocked = No
3,392,126 UART: [state] WD Timer not started. Device not locked for debugging
3,393,426 UART: [kat] SHA2-256
4,199,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,203,201 UART: [kat] ++
4,203,353 UART: [kat] sha1
4,207,527 UART: [kat] SHA2-256
4,209,467 UART: [kat] SHA2-384
4,212,438 UART: [kat] SHA2-512-ACC
4,214,338 UART: [kat] ECC-384
4,223,915 UART: [kat] HMAC-384Kdf
4,228,567 UART: [kat] LMS
4,476,895 UART: [kat] --
4,477,757 UART: [update-reset] ++
5,835,300 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,836,269 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,991,484 >>> mbox cmd response: success
5,991,731 UART: [update-reset] Copying MAN_2 To MAN_1
5,999,745 UART: [update-reset Success] --
6,000,778 UART: [state] Locking Datavault
6,001,682 UART: [state] Locking PCR0, PCR1 and PCR31
6,002,286 UART: [state] Locking ICCM
6,002,960 UART: [exit] Launching FMC @ 0x40000130
6,008,290 UART:
6,008,306 UART: Running Caliptra FMC ...
6,008,714 UART:
6,008,857 UART: [state] CFI Enabled
6,098,122 UART: [art] Extend RT PCRs Done
6,098,550 UART: [art] Lock RT PCRs Done
6,100,015 UART: [art] Populate DV Done
6,108,415 UART: [fht] FMC Alias Private Key: 7
6,109,477 UART: [art] Derive CDI
6,109,757 UART: [art] Store in slot 0x4
6,195,858 UART: [art] Derive Key Pair
6,196,218 UART: [art] Store priv key in slot 0x5
6,209,514 UART: [art] Derive Key Pair - Done
6,224,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,240,092 UART: [art] Erasing AUTHORITY.KEYID = 7
6,240,857 UART: [art] PUB.X = 9626D4285BE0140D8392C24BFCEB123C9A5ACE484E6D0C7FA0902A83B5035AEE4CCCF758053AA47BBEF42DAB2EE98998
6,247,633 UART: [art] PUB.Y = EF631FFA74816DF96610EF3C4F9AE8A857981D1B7B776254D597FCC1C50AE832271837FE93C621E9B73D1F62882CB722
6,254,584 UART: [art] SIG.R = B5653FE963256AFC3E5832F91259369D128F38521569876ADE7C8F2B49ACAF0D89EF64E7A1B9986BFCC39DCD46BA7C80
6,261,361 UART: [art] SIG.S = 4977EC287A7CB4A3FF822C7C92603C6F6E1CAC63E68A4599F7E6EE4FB104EAC3102EEAD63CFF3EB6FA9E3A52FE62663E
6,285,364 UART: Caliptra RT
6,285,707 UART: [state] CFI Enabled
6,647,309 UART: [rt] RT listening for mailbox commands...
6,647,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,677,514 UART: [rt]cmd =0x494e464f, len=4
6,681,328 >>> mbox cmd response data (312 bytes)
6,681,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,682,146 UART:
6,682,162 UART: Running Caliptra ROM ...
6,682,570 UART:
6,682,712 UART: [state] CFI Enabled
6,685,608 UART: [state] LifecycleState = Unprovisioned
6,686,263 UART: [state] DebugLocked = No
6,686,917 UART: [state] WD Timer not started. Device not locked for debugging
6,688,029 UART: [kat] SHA2-256
7,493,679 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,497,804 UART: [kat] ++
7,497,956 UART: [kat] sha1
7,502,022 UART: [kat] SHA2-256
7,503,962 UART: [kat] SHA2-384
7,506,713 UART: [kat] SHA2-512-ACC
7,508,613 UART: [kat] ECC-384
7,518,268 UART: [kat] HMAC-384Kdf
7,523,032 UART: [kat] LMS
7,771,360 UART: [kat] --
7,772,254 UART: [update-reset] ++
9,129,825 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
9,130,914 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
9,286,129 >>> mbox cmd response: success
9,286,382 UART: [update-reset] Copying MAN_2 To MAN_1
9,294,396 UART: [update-reset Success] --
9,295,447 UART: [state] Locking Datavault
9,296,327 UART: [state] Locking PCR0, PCR1 and PCR31
9,296,931 UART: [state] Locking ICCM
9,297,505 UART: [exit] Launching FMC @ 0x40000130
9,302,835 UART:
9,302,851 UART: Running Caliptra FMC ...
9,303,259 UART:
9,303,402 UART: [state] CFI Enabled
9,392,975 UART: [art] Extend RT PCRs Done
9,393,403 UART: [art] Lock RT PCRs Done
9,394,724 UART: [art] Populate DV Done
9,402,814 UART: [fht] FMC Alias Private Key: 7
9,403,778 UART: [art] Derive CDI
9,404,058 UART: [art] Store in slot 0x4
9,489,221 UART: [art] Derive Key Pair
9,489,581 UART: [art] Store priv key in slot 0x5
9,503,289 UART: [art] Derive Key Pair - Done
9,518,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,533,675 UART: [art] Erasing AUTHORITY.KEYID = 7
9,534,440 UART: [art] PUB.X = 7C96E8B4EAAEA3053D4CB94C98F246F590DAEC11D5E3F86D1869B119838259800F24BD50DCCA74A24652F5B56446C5EF
9,541,214 UART: [art] PUB.Y = EC4F3E17A647EB67115E80E63B191445196302ECCFE6AA4C24FE6198E80AF92AB0F698C844F4448CA05789D52772D9BC
9,548,164 UART: [art] SIG.R = 3073660FF3A2158B26724972B9F9D827067048B1F30726EE6790539B0F31B652D2D89D1E523B9B57BCBCCCE0F7803FE0
9,554,920 UART: [art] SIG.S = BFC03DA5D87A50389DB3BC4DCB791A99906FDB370D5DB59407979EEB920F02BA711BB2550A9613ED8DCEA610E0124496
9,578,263 UART: Caliptra RT
9,578,606 UART: [state] CFI Enabled
9,945,486 UART: [rt] RT listening for mailbox commands...
9,946,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,975,581 UART: [rt]cmd =0x494e464f, len=4
9,979,137 >>> mbox cmd response data (312 bytes)
9,979,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,980,027 UART:
9,980,043 UART: Running Caliptra ROM ...
9,980,451 UART:
9,980,593 UART: [state] CFI Enabled
9,983,723 UART: [state] LifecycleState = Unprovisioned
9,984,378 UART: [state] DebugLocked = No
9,985,056 UART: [state] WD Timer not started. Device not locked for debugging
9,986,356 UART: [kat] SHA2-256
10,792,006 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,796,131 UART: [kat] ++
10,796,283 UART: [kat] sha1
10,800,507 UART: [kat] SHA2-256
10,802,447 UART: [kat] SHA2-384
10,805,056 UART: [kat] SHA2-512-ACC
10,806,956 UART: [kat] ECC-384
10,816,723 UART: [kat] HMAC-384Kdf
10,821,309 UART: [kat] LMS
11,069,637 UART: [kat] --
11,070,337 UART: [update-reset] ++
12,428,904 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,430,007 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
12,585,222 >>> mbox cmd response: success
12,585,513 UART: [update-reset] Copying MAN_2 To MAN_1
12,593,527 UART: [update-reset Success] --
12,594,442 UART: [state] Locking Datavault
12,595,218 UART: [state] Locking PCR0, PCR1 and PCR31
12,595,822 UART: [state] Locking ICCM
12,596,398 UART: [exit] Launching FMC @ 0x40000130
12,601,728 UART:
12,601,744 UART: Running Caliptra FMC ...
12,602,152 UART:
12,602,295 UART: [state] CFI Enabled
12,691,316 UART: [art] Extend RT PCRs Done
12,691,744 UART: [art] Lock RT PCRs Done
12,693,005 UART: [art] Populate DV Done
12,701,125 UART: [fht] FMC Alias Private Key: 7
12,702,155 UART: [art] Derive CDI
12,702,435 UART: [art] Store in slot 0x4
12,788,044 UART: [art] Derive Key Pair
12,788,404 UART: [art] Store priv key in slot 0x5
12,802,122 UART: [art] Derive Key Pair - Done
12,817,341 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,833,120 UART: [art] Erasing AUTHORITY.KEYID = 7
12,833,885 UART: [art] PUB.X = 9626D4285BE0140D8392C24BFCEB123C9A5ACE484E6D0C7FA0902A83B5035AEE4CCCF758053AA47BBEF42DAB2EE98998
12,840,661 UART: [art] PUB.Y = EF631FFA74816DF96610EF3C4F9AE8A857981D1B7B776254D597FCC1C50AE832271837FE93C621E9B73D1F62882CB722
12,847,612 UART: [art] SIG.R = B5653FE963256AFC3E5832F91259369D128F38521569876ADE7C8F2B49ACAF0D89EF64E7A1B9986BFCC39DCD46BA7C80
12,854,389 UART: [art] SIG.S = 4977EC287A7CB4A3FF822C7C92603C6F6E1CAC63E68A4599F7E6EE4FB104EAC3102EEAD63CFF3EB6FA9E3A52FE62663E
12,877,588 UART: Caliptra RT
12,877,931 UART: [state] CFI Enabled
13,241,829 UART: [rt] RT listening for mailbox commands...
13,242,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,271,804 UART: [rt]cmd =0x494e464f, len=4
13,275,458 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,616 ready_for_fw is high
1,060,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,284 >>> mbox cmd response: success
2,679,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,741,852 UART:
2,741,868 UART: Running Caliptra FMC ...
2,742,276 UART:
2,742,419 UART: [state] CFI Enabled
2,753,174 UART: [fht] FMC Alias Private Key: 7
2,871,671 UART: [art] Extend RT PCRs Done
2,872,099 UART: [art] Lock RT PCRs Done
2,873,595 UART: [art] Populate DV Done
2,881,873 UART: [fht] FMC Alias Private Key: 7
2,882,841 UART: [art] Derive CDI
2,883,121 UART: [art] Store in slot 0x4
2,968,828 UART: [art] Derive Key Pair
2,969,188 UART: [art] Store priv key in slot 0x5
2,982,208 UART: [art] Derive Key Pair - Done
2,997,023 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,558 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,323 UART: [art] PUB.X = 89C98A0D7EF18A3FBB7F22FEA104D187942865DDC3B3708B10CC2F31B228E4877EB8489C1D2DE9F12D1E55F7D0832952
3,020,095 UART: [art] PUB.Y = B418BED090DC8D0EA32DFAB2E381483E19776B3F15E6E7F798A5CEC82A0F7BE281D04B0EA0C7C8AA29372C031DB48DC9
3,027,053 UART: [art] SIG.R = 789D547B7DC3B5C725FDD29D3CF39131B4588B47AC0F3086FF3E6C52BCA8486C53F0056344C30A27700CBECC73233190
3,033,815 UART: [art] SIG.S = 35540BF7A1C4CDEFE7BD9C2D5DF188DA3EEC8FC9B6664617EDB13910A090EC0984B3A66AD63966D31ACC4C2C268D2FAF
3,057,269 UART: Caliptra RT
3,057,612 UART: [state] CFI Enabled
3,176,860 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,160 UART: [rt]cmd =0x494e464f, len=4
3,211,056 >>> mbox cmd response data (312 bytes)
3,211,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,701,362 >>> mbox cmd response: success
5,714,887 UART:
5,714,903 UART: Running Caliptra FMC ...
5,715,311 UART:
5,715,454 UART: [state] CFI Enabled
5,804,449 UART: [art] Extend RT PCRs Done
5,804,877 UART: [art] Lock RT PCRs Done
5,806,004 UART: [art] Populate DV Done
5,814,286 UART: [fht] FMC Alias Private Key: 7
5,815,278 UART: [art] Derive CDI
5,815,558 UART: [art] Store in slot 0x4
5,901,449 UART: [art] Derive Key Pair
5,901,809 UART: [art] Store priv key in slot 0x5
5,914,789 UART: [art] Derive Key Pair - Done
5,929,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,945,175 UART: [art] Erasing AUTHORITY.KEYID = 7
5,945,940 UART: [art] PUB.X = D0A7C00D267EB32BED38D5281CFCA1E8299D9C2D1A3C2EB382819F26FF6B43BA2990B113C266D15917EDB4AC6357B8C6
5,952,721 UART: [art] PUB.Y = B08D6F6A6A6B04536937E8F134DC8B0FA9C58631936E9688D99050985B9EFF08095AD2A49AEBCA6F699AD32F68E771FC
5,959,667 UART: [art] SIG.R = A8FB5CCCC72F4D75A62D6F27A07E360B268B1F2044F20A5A7F5BBB2E4B9ADADA43CA023D965D0F327D027E1BDB43D1D5
5,966,446 UART: [art] SIG.S = 036C05BEEB362D8D0039499C31F05EAEFB42BF71933B954C6F198F25F867816A78C5B74645CDF1D558DFE8B8975DB5AD
5,989,794 UART: Caliptra RT
5,990,137 UART: [state] CFI Enabled
6,362,295 UART: [rt] RT listening for mailbox commands...
6,362,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,392,420 UART: [rt]cmd =0x494e464f, len=4
6,396,174 >>> mbox cmd response data (312 bytes)
6,396,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,886,850 >>> mbox cmd response: success
8,900,131 UART:
8,900,147 UART: Running Caliptra FMC ...
8,900,555 UART:
8,900,698 UART: [state] CFI Enabled
8,990,343 UART: [art] Extend RT PCRs Done
8,990,771 UART: [art] Lock RT PCRs Done
8,991,888 UART: [art] Populate DV Done
9,000,228 UART: [fht] FMC Alias Private Key: 7
9,001,298 UART: [art] Derive CDI
9,001,578 UART: [art] Store in slot 0x4
9,087,737 UART: [art] Derive Key Pair
9,088,097 UART: [art] Store priv key in slot 0x5
9,101,643 UART: [art] Derive Key Pair - Done
9,116,098 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,131,679 UART: [art] Erasing AUTHORITY.KEYID = 7
9,132,444 UART: [art] PUB.X = 43BC117350BEF7A4E279BE76DF61C99A30E72DD459E04AACF0B8A4D3D1743857FE0D1830D6C9958E6930F56BD1CC47B7
9,139,223 UART: [art] PUB.Y = 944D62823389C6CD5D3E71FE818F0D4C6FCEA62DFA72C729D7CA143348843229C2908BFC464622304A997985C167BFBC
9,146,172 UART: [art] SIG.R = 8AFCFF23DCC71B067B8C10B1799ECCC683DA1833714CDCC76BCFB27DEF0CFE459F2E2A6139D92E48102125B63F1BB5F3
9,152,958 UART: [art] SIG.S = B89C40524868D7051951F43D3F49C07A2DC8D1B3AA9D267E7F815B4840FE6AA8D03C1173BDDD787B172B001802C08FFA
9,176,882 UART: Caliptra RT
9,177,225 UART: [state] CFI Enabled
9,538,586 UART: [rt] RT listening for mailbox commands...
9,539,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,568,771 UART: [rt]cmd =0x494e464f, len=4
9,572,399 >>> mbox cmd response data (312 bytes)
9,572,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,062,553 >>> mbox cmd response: success
12,075,880 UART:
12,075,896 UART: Running Caliptra FMC ...
12,076,304 UART:
12,076,447 UART: [state] CFI Enabled
12,165,000 UART: [art] Extend RT PCRs Done
12,165,428 UART: [art] Lock RT PCRs Done
12,166,877 UART: [art] Populate DV Done
12,175,091 UART: [fht] FMC Alias Private Key: 7
12,176,105 UART: [art] Derive CDI
12,176,385 UART: [art] Store in slot 0x4
12,262,010 UART: [art] Derive Key Pair
12,262,370 UART: [art] Store priv key in slot 0x5
12,276,144 UART: [art] Derive Key Pair - Done
12,291,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,306,636 UART: [art] Erasing AUTHORITY.KEYID = 7
12,307,401 UART: [art] PUB.X = D0A7C00D267EB32BED38D5281CFCA1E8299D9C2D1A3C2EB382819F26FF6B43BA2990B113C266D15917EDB4AC6357B8C6
12,314,182 UART: [art] PUB.Y = B08D6F6A6A6B04536937E8F134DC8B0FA9C58631936E9688D99050985B9EFF08095AD2A49AEBCA6F699AD32F68E771FC
12,321,128 UART: [art] SIG.R = A8FB5CCCC72F4D75A62D6F27A07E360B268B1F2044F20A5A7F5BBB2E4B9ADADA43CA023D965D0F327D027E1BDB43D1D5
12,327,907 UART: [art] SIG.S = 036C05BEEB362D8D0039499C31F05EAEFB42BF71933B954C6F198F25F867816A78C5B74645CDF1D558DFE8B8975DB5AD
12,352,149 UART: Caliptra RT
12,352,492 UART: [state] CFI Enabled
12,717,010 UART: [rt] RT listening for mailbox commands...
12,717,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,747,221 UART: [rt]cmd =0x494e464f, len=4
12,751,075 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,107 UART:
192,470 UART: Running Caliptra ROM ...
193,611 UART:
193,761 UART: [state] CFI Enabled
264,452 UART: [state] LifecycleState = Unprovisioned
266,376 UART: [state] DebugLocked = No
269,122 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,429 UART: [kat] SHA2-256
443,124 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,601 UART: [kat] ++
454,071 UART: [kat] sha1
465,028 UART: [kat] SHA2-256
467,753 UART: [kat] SHA2-384
472,037 UART: [kat] SHA2-512-ACC
474,414 UART: [kat] ECC-384
2,768,509 UART: [kat] HMAC-384Kdf
2,801,055 UART: [kat] LMS
3,991,345 UART: [kat] --
3,994,852 UART: [cold-reset] ++
3,996,933 UART: [fht] Storing FHT @ 0x50003400
4,009,048 UART: [idev] ++
4,009,617 UART: [idev] CDI.KEYID = 6
4,010,574 UART: [idev] SUBJECT.KEYID = 7
4,011,821 UART: [idev] UDS.KEYID = 0
4,012,803 ready_for_fw is high
4,012,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,422 UART: [idev] Erasing UDS.KEYID = 0
7,349,455 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,679 UART: [idev] --
7,375,570 UART: [ldev] ++
7,376,141 UART: [ldev] CDI.KEYID = 6
7,377,121 UART: [ldev] SUBJECT.KEYID = 5
7,378,226 UART: [ldev] AUTHORITY.KEYID = 7
7,379,572 UART: [ldev] FE.KEYID = 1
7,423,333 UART: [ldev] Erasing FE.KEYID = 1
10,756,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,920 UART: [ldev] --
13,140,239 UART: [fwproc] Waiting for Commands...
13,143,491 UART: [fwproc] Received command 0x46574c44
13,145,675 UART: [fwproc] Received Image of size 118548 bytes
17,248,084 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,326,937 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,400,063 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,728,593 >>> mbox cmd response: success
17,729,704 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,732,382 UART: [afmc] ++
17,732,976 UART: [afmc] CDI.KEYID = 6
17,733,998 UART: [afmc] SUBJECT.KEYID = 7
17,735,155 UART: [afmc] AUTHORITY.KEYID = 5
21,096,009 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,391,465 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,720 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,408,166 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,893 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,437,353 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,813 UART: [afmc] --
23,461,924 UART: [cold-reset] --
23,466,052 UART: [state] Locking Datavault
23,469,682 UART: [state] Locking PCR0, PCR1 and PCR31
23,471,431 UART: [state] Locking ICCM
23,473,579 UART: [exit] Launching FMC @ 0x40000130
23,481,982 UART:
23,482,224 UART: Running Caliptra FMC ...
23,483,324 UART:
23,483,487 UART: [state] CFI Enabled
23,551,541 UART: [fht] FMC Alias Private Key: 7
25,891,989 UART: [art] Extend RT PCRs Done
25,893,202 UART: [art] Lock RT PCRs Done
25,895,101 UART: [art] Populate DV Done
25,900,401 UART: [fht] FMC Alias Private Key: 7
25,902,116 UART: [art] Derive CDI
25,902,931 UART: [art] Store in slot 0x4
25,960,648 UART: [art] Derive Key Pair
25,961,639 UART: [art] Store priv key in slot 0x5
29,254,423 UART: [art] Derive Key Pair - Done
29,267,422 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,801 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,311 UART: [art] PUB.X = 8A35C974C365670BA8ED7C5F88887B393965B2BBD899A86D328751B86A69F840537260BF5E1A8B26F19541311D845D81
31,564,575 UART: [art] PUB.Y = 5AA23C2EDC149645D8626B44B88CE7E96BF5BB17E58C32963D1DA814A33AE531FBFCBDE84A8510B8958D61F7442EC2E0
31,571,852 UART: [art] SIG.R = 6B4DF1662A24C2158FD46451B702E704B019EAE7D933B0E3F4FC225F53FF08DD97168E75FB180C551A2EFFE95EE3A463
31,579,233 UART: [art] SIG.S = 1472EFEAD0D211DF00E0437658E6F68A10CBBAFA58EFABAAF11F044590E24286B5D71FCD213D7689622E012545F1E52D
32,884,663 UART: Caliptra RT
32,885,361 UART: [state] CFI Enabled
33,062,055 UART: [rt] RT listening for mailbox commands...
33,093,469 UART: [rt]cmd =0x49444549, len=4
33,096,487 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,806,782 ready_for_fw is high
3,807,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,969,693 >>> mbox cmd response: success
17,971,006 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,653,958 UART:
23,654,359 UART: Running Caliptra FMC ...
23,655,503 UART:
23,655,670 UART: [state] CFI Enabled
23,723,953 UART: [fht] FMC Alias Private Key: 7
26,064,666 UART: [art] Extend RT PCRs Done
26,065,895 UART: [art] Lock RT PCRs Done
26,067,691 UART: [art] Populate DV Done
26,073,208 UART: [fht] FMC Alias Private Key: 7
26,074,910 UART: [art] Derive CDI
26,075,746 UART: [art] Store in slot 0x4
26,132,557 UART: [art] Derive Key Pair
26,133,556 UART: [art] Store priv key in slot 0x5
29,426,002 UART: [art] Derive Key Pair - Done
29,439,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,162 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,667 UART: [art] PUB.X = CAF0BBF59CE7F6FCDFE42B396C65469B2701EDEF8C7ED3C777385F1C4E26F68DC078D85B3F269EF528709D4EA8419DA6
31,736,994 UART: [art] PUB.Y = EAC7FBEFBB82C49CAA8FF5D9A7D209C1B40EEE59F2C8CA40B2E9EC13D6CB939FA07A83D55B290E04389F9C051348CF26
31,744,228 UART: [art] SIG.R = 2B8CB3FD33ACE74DF4D845C7781D4B1A8506B1409690D1E485A9499C522BE4E44DC75F969E4C9435CDB0579DA2BF2C39
31,751,635 UART: [art] SIG.S = 8A25CF5EB1F46CCA12B21B26F08389EB5BFF39C699FC017037629F874521FDE4DF3B96B0D61FC6B3F8BEA9D28FA571DD
33,056,985 UART: Caliptra RT
33,057,745 UART: [state] CFI Enabled
33,233,434 UART: [rt] RT listening for mailbox commands...
33,264,928 UART: [rt]cmd =0x49444549, len=4
33,267,723 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,378 UART:
192,754 UART: Running Caliptra ROM ...
193,883 UART:
603,741 UART: [state] CFI Enabled
616,841 UART: [state] LifecycleState = Unprovisioned
618,788 UART: [state] DebugLocked = No
621,167 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,176 UART: [kat] SHA2-256
794,925 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,460 UART: [kat] ++
805,910 UART: [kat] sha1
815,786 UART: [kat] SHA2-256
818,504 UART: [kat] SHA2-384
824,934 UART: [kat] SHA2-512-ACC
827,341 UART: [kat] ECC-384
3,111,593 UART: [kat] HMAC-384Kdf
3,121,998 UART: [kat] LMS
4,312,114 UART: [kat] --
4,317,822 UART: [cold-reset] ++
4,318,827 UART: [fht] Storing FHT @ 0x50003400
4,329,801 UART: [idev] ++
4,330,373 UART: [idev] CDI.KEYID = 6
4,331,325 UART: [idev] SUBJECT.KEYID = 7
4,332,563 UART: [idev] UDS.KEYID = 0
4,333,566 ready_for_fw is high
4,333,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,735 UART: [idev] Erasing UDS.KEYID = 0
7,620,802 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,721 UART: [idev] --
7,647,802 UART: [ldev] ++
7,648,377 UART: [ldev] CDI.KEYID = 6
7,649,335 UART: [ldev] SUBJECT.KEYID = 5
7,650,543 UART: [ldev] AUTHORITY.KEYID = 7
7,651,824 UART: [ldev] FE.KEYID = 1
7,663,543 UART: [ldev] Erasing FE.KEYID = 1
10,955,183 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,758 UART: [ldev] --
13,318,452 UART: [fwproc] Waiting for Commands...
13,320,392 UART: [fwproc] Received command 0x46574c44
13,322,571 UART: [fwproc] Received Image of size 118548 bytes
17,427,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,184 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,330 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,431 >>> mbox cmd response: success
17,905,933 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,908,973 UART: [afmc] ++
17,909,605 UART: [afmc] CDI.KEYID = 6
17,910,508 UART: [afmc] SUBJECT.KEYID = 7
17,911,767 UART: [afmc] AUTHORITY.KEYID = 5
21,221,881 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,207 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,459 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,891 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,630 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,995 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,876 UART: [afmc] --
23,587,084 UART: [cold-reset] --
23,591,216 UART: [state] Locking Datavault
23,596,560 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,313 UART: [state] Locking ICCM
23,599,491 UART: [exit] Launching FMC @ 0x40000130
23,607,927 UART:
23,608,154 UART: Running Caliptra FMC ...
23,609,246 UART:
23,609,398 UART: [state] CFI Enabled
23,617,869 UART: [fht] FMC Alias Private Key: 7
25,958,052 UART: [art] Extend RT PCRs Done
25,959,272 UART: [art] Lock RT PCRs Done
25,961,326 UART: [art] Populate DV Done
25,966,802 UART: [fht] FMC Alias Private Key: 7
25,968,399 UART: [art] Derive CDI
25,969,209 UART: [art] Store in slot 0x4
26,011,957 UART: [art] Derive Key Pair
26,012,956 UART: [art] Store priv key in slot 0x5
29,254,536 UART: [art] Derive Key Pair - Done
29,267,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,111 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,618 UART: [art] PUB.X = 28372C5C57ED5DB9ABD1D36307A027005E5472864994F7C3ADC7216BA9E70885910CE243E64E9D05E561DABA70A19A1F
31,555,875 UART: [art] PUB.Y = 86AD8DB4988BF6680645000344A4050BA8EB293AD64BC33C6264A7745EF4BBBBCC56DEF7C6DCE94F0ABC8DE7F58DB50A
31,563,105 UART: [art] SIG.R = 8A18446C59B3B5BF26D71F79DEE4D7969B2A542284E8262489009DEBAFC75073C2781EAD2E2EED5E9DBFFDC25618D6CA
31,570,503 UART: [art] SIG.S = 42C411523FAB8FF33E7151465BC185DB0DB657D91E02E4FA47503B6BC62BEF6643883332B80B1B8EA08D9A122D168126
32,875,778 UART: Caliptra RT
32,876,478 UART: [state] CFI Enabled
33,009,482 UART: [rt] RT listening for mailbox commands...
33,040,746 UART: [rt]cmd =0x49444549, len=4
33,043,381 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,671 writing to cptra_bootfsm_go
4,126,824 ready_for_fw is high
4,127,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,166,844 >>> mbox cmd response: success
18,167,718 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,805,867 UART:
23,806,295 UART: Running Caliptra FMC ...
23,807,419 UART:
23,807,570 UART: [state] CFI Enabled
23,815,580 UART: [fht] FMC Alias Private Key: 7
26,155,946 UART: [art] Extend RT PCRs Done
26,157,176 UART: [art] Lock RT PCRs Done
26,158,904 UART: [art] Populate DV Done
26,164,220 UART: [fht] FMC Alias Private Key: 7
26,165,853 UART: [art] Derive CDI
26,166,675 UART: [art] Store in slot 0x4
26,209,321 UART: [art] Derive Key Pair
26,210,329 UART: [art] Store priv key in slot 0x5
29,452,356 UART: [art] Derive Key Pair - Done
29,465,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,578 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,078 UART: [art] PUB.X = E2874D453022659D7B954CA9A2A4E8340B8AD4E90EDBEBFDD012D73161B4A1CF99BDA0C0B6DA82D06686E25283AE2B79
31,754,374 UART: [art] PUB.Y = C3139E61925B81BC06B6851FA56DF49361B650F30723B8755BBA38B0900AEBE8C40AEA7D1EF7001C6659F2EB7E90984D
31,761,625 UART: [art] SIG.R = 3E451FD05333235D308103D4BFA259747BB3C668E09FB4580B278D6E7E7B62D5822D12763B719EE87FEA7568B2A0040F
31,768,999 UART: [art] SIG.S = 36500B9EF0DB79A797AF7CBBB9F1C210EB8B42326B19347D3A69F48AD6E24F3C7C13CAC0F07AC07212B914D81FACA44F
33,073,835 UART: Caliptra RT
33,074,548 UART: [state] CFI Enabled
33,208,198 UART: [rt] RT listening for mailbox commands...
33,239,565 UART: [rt]cmd =0x49444549, len=4
33,242,339 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,014 UART:
192,393 UART: Running Caliptra ROM ...
193,491 UART:
193,631 UART: [state] CFI Enabled
263,464 UART: [state] LifecycleState = Unprovisioned
265,383 UART: [state] DebugLocked = No
268,191 UART: [state] WD Timer not started. Device not locked for debugging
271,448 UART: [kat] SHA2-256
451,117 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,869 UART: [kat] ++
462,314 UART: [kat] sha1
472,124 UART: [kat] SHA2-256
474,842 UART: [kat] SHA2-384
481,535 UART: [kat] SHA2-512-ACC
483,893 UART: [kat] ECC-384
2,948,526 UART: [kat] HMAC-384Kdf
2,971,787 UART: [kat] LMS
3,448,333 UART: [kat] --
3,452,540 UART: [cold-reset] ++
3,454,103 UART: [fht] FHT @ 0x50003400
3,466,921 UART: [idev] ++
3,467,480 UART: [idev] CDI.KEYID = 6
3,468,360 UART: [idev] SUBJECT.KEYID = 7
3,469,669 UART: [idev] UDS.KEYID = 0
3,470,566 ready_for_fw is high
3,470,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,818 UART: [idev] Erasing UDS.KEYID = 0
5,985,463 UART: [idev] Sha1 KeyId Algorithm
6,008,652 UART: [idev] --
6,012,711 UART: [ldev] ++
6,013,282 UART: [ldev] CDI.KEYID = 6
6,014,250 UART: [ldev] SUBJECT.KEYID = 5
6,015,410 UART: [ldev] AUTHORITY.KEYID = 7
6,016,692 UART: [ldev] FE.KEYID = 1
6,056,947 UART: [ldev] Erasing FE.KEYID = 1
8,562,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,784 UART: [ldev] --
10,373,138 UART: [fwproc] Wait for Commands...
10,376,189 UART: [fwproc] Recv command 0x46574c44
10,378,227 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,298 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,518 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,529 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,417 >>> mbox cmd response: success
14,350,565 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,353,838 UART: [afmc] ++
14,354,433 UART: [afmc] CDI.KEYID = 6
14,355,503 UART: [afmc] SUBJECT.KEYID = 7
14,356,607 UART: [afmc] AUTHORITY.KEYID = 5
16,891,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,925 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,712 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,649,767 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,368 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,246 UART: [afmc] --
18,694,550 UART: [cold-reset] --
18,698,210 UART: [state] Locking Datavault
18,702,480 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,227 UART: [state] Locking ICCM
18,706,643 UART: [exit] Launching FMC @ 0x40000130
18,715,086 UART:
18,715,325 UART: Running Caliptra FMC ...
18,716,422 UART:
18,716,581 UART: [state] CFI Enabled
18,772,941 UART: [fht] FMC Alias Private Key: 7
20,539,626 UART: [art] Extend RT PCRs Done
20,540,843 UART: [art] Lock RT PCRs Done
20,542,202 UART: [art] Populate DV Done
20,547,690 UART: [fht] FMC Alias Private Key: 7
20,549,335 UART: [art] Derive CDI
20,550,144 UART: [art] Store in slot 0x4
20,605,967 UART: [art] Derive Key Pair
20,606,963 UART: [art] Store priv key in slot 0x5
23,069,334 UART: [art] Derive Key Pair - Done
23,082,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,785 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,291 UART: [art] PUB.X = D9AC5D301DCF812E0CD04548295AF41F15EC5E9CD038226AD76C8B3558BDAE90143D8803F18D1E14AE650C064D3B00D2
24,804,537 UART: [art] PUB.Y = C3E521B15B9A0C13521B4C5BACD74FA5FA5A43AFE958796F9D3C98F826519C4B96D0953652A6731BBD932A8A362CB6FB
24,811,824 UART: [art] SIG.R = CC349898260FBA07EDD339D094CB89AA499F16CF82596130612FFFB43266D6043F1FDDEB62FE2FD0E66CDAC88FAC859A
24,819,219 UART: [art] SIG.S = 87E5C3477367F52605559D47B2DEFA11685B2688F6985475ED80A96F1E891890D2DF1AC22D753133FCF4B37C5E2B166C
25,797,544 UART: Caliptra RT
25,798,247 UART: [state] CFI Enabled
25,980,921 UART: [rt] RT listening for mailbox commands...
26,012,386 UART: [rt]cmd =0x49444549, len=4
26,015,393 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,459,509 ready_for_fw is high
3,459,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,834 >>> mbox cmd response: success
14,221,178 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,514,941 UART:
18,515,325 UART: Running Caliptra FMC ...
18,516,467 UART:
18,516,624 UART: [state] CFI Enabled
18,580,377 UART: [fht] FMC Alias Private Key: 7
20,346,803 UART: [art] Extend RT PCRs Done
20,348,014 UART: [art] Lock RT PCRs Done
20,349,586 UART: [art] Populate DV Done
20,354,899 UART: [fht] FMC Alias Private Key: 7
20,356,545 UART: [art] Derive CDI
20,357,357 UART: [art] Store in slot 0x4
20,413,346 UART: [art] Derive Key Pair
20,414,385 UART: [art] Store priv key in slot 0x5
22,877,378 UART: [art] Derive Key Pair - Done
22,890,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,983 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,467 UART: [art] PUB.X = 7A4DC4405D3B3C4120CE3723F04B45B933E38DDB86E6CA91105E6ABC505BC336C00F83F28D12B268895FAF0389D19DF8
24,611,774 UART: [art] PUB.Y = 75A9DEFF5EBA1CEF28CFD137BC8AE05482819D3EEE110B5A8B078C6EBD750F01A9E1104FA8AB9EDB84A61ED9076410AE
24,619,025 UART: [art] SIG.R = 3B02A96A0A2E32C311E78B87C76FC1920B384A0CF273A78F0D440207D6A76BA49706D78E1C852D85FF372645EED32B47
24,626,426 UART: [art] SIG.S = E43E30C081DF478403695CD73C37EFDAD608827A260CE150995CBF20AB595F8ADF6F07A523EF7B9471813C4C9B4387AF
25,605,410 UART: Caliptra RT
25,606,118 UART: [state] CFI Enabled
25,785,795 UART: [rt] RT listening for mailbox commands...
25,817,267 UART: [rt]cmd =0x49444549, len=4
25,819,920 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
192,401 UART:
192,767 UART: Running Caliptra ROM ...
193,979 UART:
603,644 UART: [state] CFI Enabled
617,810 UART: [state] LifecycleState = Unprovisioned
619,681 UART: [state] DebugLocked = No
621,923 UART: [state] WD Timer not started. Device not locked for debugging
625,688 UART: [kat] SHA2-256
805,329 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,155 UART: [kat] ++
816,692 UART: [kat] sha1
826,937 UART: [kat] SHA2-256
829,584 UART: [kat] SHA2-384
836,504 UART: [kat] SHA2-512-ACC
838,870 UART: [kat] ECC-384
3,281,545 UART: [kat] HMAC-384Kdf
3,295,127 UART: [kat] LMS
3,771,642 UART: [kat] --
3,776,983 UART: [cold-reset] ++
3,779,622 UART: [fht] FHT @ 0x50003400
3,792,158 UART: [idev] ++
3,792,798 UART: [idev] CDI.KEYID = 6
3,793,711 UART: [idev] SUBJECT.KEYID = 7
3,794,956 UART: [idev] UDS.KEYID = 0
3,795,882 ready_for_fw is high
3,796,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,969 UART: [idev] Erasing UDS.KEYID = 0
6,273,475 UART: [idev] Sha1 KeyId Algorithm
6,295,666 UART: [idev] --
6,300,463 UART: [ldev] ++
6,301,033 UART: [ldev] CDI.KEYID = 6
6,301,947 UART: [ldev] SUBJECT.KEYID = 5
6,303,160 UART: [ldev] AUTHORITY.KEYID = 7
6,304,448 UART: [ldev] FE.KEYID = 1
6,314,616 UART: [ldev] Erasing FE.KEYID = 1
8,795,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,918 UART: [ldev] --
10,592,854 UART: [fwproc] Wait for Commands...
10,595,170 UART: [fwproc] Recv command 0x46574c44
10,597,208 UART: [fwproc] Recv'd Img size: 118548 bytes
14,086,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,627 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,236,680 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,564,657 >>> mbox cmd response: success
14,565,686 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,568,837 UART: [afmc] ++
14,569,419 UART: [afmc] CDI.KEYID = 6
14,570,362 UART: [afmc] SUBJECT.KEYID = 7
14,571,579 UART: [afmc] AUTHORITY.KEYID = 5
17,071,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,826 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,592 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,652 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,182 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,906 UART: [afmc] --
18,870,128 UART: [cold-reset] --
18,874,334 UART: [state] Locking Datavault
18,878,759 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,463 UART: [state] Locking ICCM
18,881,911 UART: [exit] Launching FMC @ 0x40000130
18,890,305 UART:
18,890,548 UART: Running Caliptra FMC ...
18,891,651 UART:
18,891,812 UART: [state] CFI Enabled
18,899,919 UART: [fht] FMC Alias Private Key: 7
20,666,174 UART: [art] Extend RT PCRs Done
20,667,384 UART: [art] Lock RT PCRs Done
20,668,777 UART: [art] Populate DV Done
20,673,994 UART: [fht] FMC Alias Private Key: 7
20,675,642 UART: [art] Derive CDI
20,676,385 UART: [art] Store in slot 0x4
20,718,975 UART: [art] Derive Key Pair
20,720,015 UART: [art] Store priv key in slot 0x5
23,146,560 UART: [art] Derive Key Pair - Done
23,159,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,818 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,300 UART: [art] PUB.X = F6654034D7BD8C551F8E0575B4D1C79F2944D45E46332005B4BF88814FC7974054D1788DA41A1D2CBF485E9B9FEB99FF
24,874,601 UART: [art] PUB.Y = 91A6FE8F4FC86A5F7A6E765D63C1B8F6CF73D0999125E58F18A46CB46983FE92B51E9123B0DF6AE626D8EA484B65FA02
24,881,836 UART: [art] SIG.R = C2A4E13BAF0C98671BDF1A1AF71BB894987AA83C57B99654ED3C2424AC553770017F282BB0F646A76C1454DCAA61E7F2
24,889,231 UART: [art] SIG.S = A8A2E4BA6D169D96B357091875E7B3962BA9F2227C1F06BB226A06C650D3E3679654030C8C7CAA5AFBD6A11F7CAD3F00
25,868,246 UART: Caliptra RT
25,868,953 UART: [state] CFI Enabled
26,001,690 UART: [rt] RT listening for mailbox commands...
26,033,220 UART: [rt]cmd =0x49444549, len=4
26,035,961 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
3,782,042 ready_for_fw is high
3,782,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,461,002 >>> mbox cmd response: success
14,462,079 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,713,472 UART:
18,713,845 UART: Running Caliptra FMC ...
18,714,993 UART:
18,715,151 UART: [state] CFI Enabled
18,723,094 UART: [fht] FMC Alias Private Key: 7
20,488,796 UART: [art] Extend RT PCRs Done
20,490,022 UART: [art] Lock RT PCRs Done
20,491,441 UART: [art] Populate DV Done
20,496,808 UART: [fht] FMC Alias Private Key: 7
20,498,363 UART: [art] Derive CDI
20,499,102 UART: [art] Store in slot 0x4
20,541,564 UART: [art] Derive Key Pair
20,542,604 UART: [art] Store priv key in slot 0x5
22,968,968 UART: [art] Derive Key Pair - Done
22,982,069 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,688,383 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,866 UART: [art] PUB.X = 5A2870CD8738BDCE703A93DF8202C68E98301035063D32660D55F20C3AA0D195B72B8B67F7B3F45DE8285B8B207C59AB
24,697,189 UART: [art] PUB.Y = 72EA78668821174001B9EA2433260FF9F4CD9C42008ABF1D94F134388B57099E88CA88D8614E695DC1EF8012C5A0CC01
24,704,402 UART: [art] SIG.R = 19625D2FAC7082502B031835DB960DD4C6FA30207C7E093C69FBBD91116BCC7D5BAC1D33BD2473CD30F7093BB56C5BEE
24,711,812 UART: [art] SIG.S = C86B66113093CAA53175ECD5CAF4EA639816B9CC7A4953DB8CEA0BD909427B822A6964EFDD56F9E627DB63F6C4589FEC
25,690,947 UART: Caliptra RT
25,691,678 UART: [state] CFI Enabled
25,825,015 UART: [rt] RT listening for mailbox commands...
25,856,274 UART: [rt]cmd =0x49444549, len=4
25,858,878 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
192,005 UART:
192,390 UART: Running Caliptra ROM ...
193,534 UART:
193,687 UART: [state] CFI Enabled
264,336 UART: [state] LifecycleState = Unprovisioned
266,750 UART: [state] DebugLocked = No
268,709 UART: [state] WD Timer not started. Device not locked for debugging
273,166 UART: [kat] SHA2-256
463,079 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,812 UART: [kat] ++
474,285 UART: [kat] sha1
486,576 UART: [kat] SHA2-256
489,580 UART: [kat] SHA2-384
495,918 UART: [kat] SHA2-512-ACC
498,492 UART: [kat] ECC-384
2,949,631 UART: [kat] HMAC-384Kdf
2,973,472 UART: [kat] LMS
3,505,213 UART: [kat] --
3,510,084 UART: [cold-reset] ++
3,511,807 UART: [fht] FHT @ 0x50003400
3,523,062 UART: [idev] ++
3,523,772 UART: [idev] CDI.KEYID = 6
3,524,758 UART: [idev] SUBJECT.KEYID = 7
3,525,930 UART: [idev] UDS.KEYID = 0
3,526,854 ready_for_fw is high
3,527,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,198 UART: [idev] Erasing UDS.KEYID = 0
6,029,943 UART: [idev] Sha1 KeyId Algorithm
6,051,765 UART: [idev] --
6,056,510 UART: [ldev] ++
6,057,192 UART: [ldev] CDI.KEYID = 6
6,058,079 UART: [ldev] SUBJECT.KEYID = 5
6,059,290 UART: [ldev] AUTHORITY.KEYID = 7
6,060,468 UART: [ldev] FE.KEYID = 1
6,102,359 UART: [ldev] Erasing FE.KEYID = 1
8,609,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,885 UART: [ldev] --
10,415,466 UART: [fwproc] Wait for Commands...
10,418,313 UART: [fwproc] Recv command 0x46574c44
10,420,616 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,292 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,942 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,674,308 >>> mbox cmd response: success
14,675,398 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,678,895 UART: [afmc] ++
14,679,619 UART: [afmc] CDI.KEYID = 6
14,680,809 UART: [afmc] SUBJECT.KEYID = 7
14,682,239 UART: [afmc] AUTHORITY.KEYID = 5
17,219,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,942,413 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,944,326 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,959,386 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,974,585 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,989,485 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,014,242 UART: [afmc] --
19,018,592 UART: [cold-reset] --
19,022,731 UART: [state] Locking Datavault
19,029,058 UART: [state] Locking PCR0, PCR1 and PCR31
19,031,193 UART: [state] Locking ICCM
19,034,150 UART: [exit] Launching FMC @ 0x40000130
19,042,813 UART:
19,043,073 UART: Running Caliptra FMC ...
19,044,178 UART:
19,044,336 UART: [state] CFI Enabled
19,098,931 UART: [fht] FMC Alias Private Key: 7
20,887,277 UART: [art] Extend RT PCRs Done
20,888,493 UART: [art] Lock RT PCRs Done
20,890,112 UART: [art] Populate DV Done
20,895,734 UART: [fht] FMC Alias Private Key: 7
20,897,431 UART: [art] Derive CDI
20,898,238 UART: [art] Store in slot 0x4
20,952,491 UART: [art] Derive Key Pair
20,953,533 UART: [art] Store priv key in slot 0x5
23,416,821 UART: [art] Derive Key Pair - Done
23,429,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,777 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,280 UART: [art] PUB.X = 492133C1BCED7EA944B1872065AA539AA7CD8624F3CCF502FC27A3AFE59047DAB74AEABAF53EB04539178FBF4034B22A
25,150,624 UART: [art] PUB.Y = 3F01FA7802527D781901DFDB55E31CDB9E0D83A30EA8372175DF2F6503169FC771149BC686B9C138E9F2E48E86B09205
25,157,869 UART: [art] SIG.R = 19C4E27D96C546B639EDF61094DB0561B76DFCE389C9A5BC879A121E655157FD1F830AB0D096FE6E13F29BF23EB03A9A
25,165,287 UART: [art] SIG.S = D6A287AD9A77545D3E2B02FF56135463BC26A013E8966F69B215C78FB9656505A440A2618F143A2774388A161B955EF0
26,144,451 UART: Caliptra RT
26,145,140 UART: [state] CFI Enabled
26,325,730 UART: [rt] RT listening for mailbox commands...
26,356,858 UART: [rt]cmd =0x49444549, len=4
26,359,762 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,440,585 ready_for_fw is high
3,440,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,815,175 >>> mbox cmd response: success
14,816,552 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,111,272 UART:
19,111,668 UART: Running Caliptra FMC ...
19,112,777 UART:
19,112,925 UART: [state] CFI Enabled
19,180,302 UART: [fht] FMC Alias Private Key: 7
20,967,140 UART: [art] Extend RT PCRs Done
20,968,364 UART: [art] Lock RT PCRs Done
20,969,873 UART: [art] Populate DV Done
20,975,347 UART: [fht] FMC Alias Private Key: 7
20,977,045 UART: [art] Derive CDI
20,977,786 UART: [art] Store in slot 0x4
21,033,936 UART: [art] Derive Key Pair
21,034,984 UART: [art] Store priv key in slot 0x5
23,498,585 UART: [art] Derive Key Pair - Done
23,511,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,554 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,067 UART: [art] PUB.X = 7D4F8252DE98E360AD187FDC7670528077F87D2ECCC024476BB92248A81CA476C09CB9F584DB507129311B61DD544247
25,232,405 UART: [art] PUB.Y = 0F27798028614B8DD854EC032758685A1991A4F9BF8648074279CC9B8C47774B08932744C6A8F7618135CD8038975DD1
25,239,515 UART: [art] SIG.R = EDD646A554F6278585CE858C5CF87307362097A9E1FD02ABD7F4A409B852D8F047D5AB8A84CD0F0CF90E902B13373B6F
25,246,919 UART: [art] SIG.S = 43B1B6A4DD211ABF844C87DE313AF0B2560EAB1B831A20AC5082A82F74CBA7AA3443568E724CEFAA66959C5A2DEDABFC
26,226,243 UART: Caliptra RT
26,226,959 UART: [state] CFI Enabled
26,404,854 UART: [rt] RT listening for mailbox commands...
26,436,173 UART: [rt]cmd =0x49444549, len=4
26,439,028 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,460 writing to cptra_bootfsm_go
192,582 UART:
192,946 UART: Running Caliptra ROM ...
194,150 UART:
603,706 UART: [state] CFI Enabled
617,543 UART: [state] LifecycleState = Unprovisioned
619,951 UART: [state] DebugLocked = No
621,258 UART: [state] WD Timer not started. Device not locked for debugging
625,245 UART: [kat] SHA2-256
815,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,868 UART: [kat] ++
826,391 UART: [kat] sha1
837,547 UART: [kat] SHA2-256
840,557 UART: [kat] SHA2-384
846,620 UART: [kat] SHA2-512-ACC
849,216 UART: [kat] ECC-384
3,289,640 UART: [kat] HMAC-384Kdf
3,302,584 UART: [kat] LMS
3,834,413 UART: [kat] --
3,839,278 UART: [cold-reset] ++
3,841,639 UART: [fht] FHT @ 0x50003400
3,853,043 UART: [idev] ++
3,853,763 UART: [idev] CDI.KEYID = 6
3,854,656 UART: [idev] SUBJECT.KEYID = 7
3,855,900 UART: [idev] UDS.KEYID = 0
3,856,806 ready_for_fw is high
3,857,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,874 UART: [idev] Erasing UDS.KEYID = 0
6,332,792 UART: [idev] Sha1 KeyId Algorithm
6,355,238 UART: [idev] --
6,360,046 UART: [ldev] ++
6,360,730 UART: [ldev] CDI.KEYID = 6
6,361,613 UART: [ldev] SUBJECT.KEYID = 5
6,362,824 UART: [ldev] AUTHORITY.KEYID = 7
6,364,006 UART: [ldev] FE.KEYID = 1
6,374,821 UART: [ldev] Erasing FE.KEYID = 1
8,857,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,432 UART: [ldev] --
10,648,758 UART: [fwproc] Wait for Commands...
10,651,497 UART: [fwproc] Recv command 0x46574c44
10,653,749 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,058 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,669 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,218 >>> mbox cmd response: success
14,912,735 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,915,952 UART: [afmc] ++
14,916,669 UART: [afmc] CDI.KEYID = 6
14,917,860 UART: [afmc] SUBJECT.KEYID = 7
14,919,305 UART: [afmc] AUTHORITY.KEYID = 5
17,422,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,848 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,948 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,109 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,968 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,163 UART: [afmc] --
19,219,354 UART: [cold-reset] --
19,223,717 UART: [state] Locking Datavault
19,229,089 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,237 UART: [state] Locking ICCM
19,233,661 UART: [exit] Launching FMC @ 0x40000130
19,242,339 UART:
19,242,600 UART: Running Caliptra FMC ...
19,243,709 UART:
19,243,869 UART: [state] CFI Enabled
19,252,283 UART: [fht] FMC Alias Private Key: 7
21,018,036 UART: [art] Extend RT PCRs Done
21,019,262 UART: [art] Lock RT PCRs Done
21,020,789 UART: [art] Populate DV Done
21,026,162 UART: [fht] FMC Alias Private Key: 7
21,027,867 UART: [art] Derive CDI
21,028,611 UART: [art] Store in slot 0x4
21,071,209 UART: [art] Derive Key Pair
21,072,211 UART: [art] Store priv key in slot 0x5
23,499,470 UART: [art] Derive Key Pair - Done
23,512,415 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,649 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,156 UART: [art] PUB.X = C8C3C77765322C50D8A1F59B1E3D20378797AEBB2527F63D1942143E4D0CBB093C50035E8F8A45BA725200158657F1C2
25,227,438 UART: [art] PUB.Y = F44D18D9A4F3AB0C4BC146A1DEFDF930F7082BD6D4C65140B44E7967D34FAA2D8E6CEC1B34EA1933C09C89B6B909BF14
25,234,687 UART: [art] SIG.R = 782FF44FB7288C281F9312B3B6FD0BF23D2218F9895549FD7FA3301C1E062A3B5084B942D016A4257932AB130F53311F
25,242,055 UART: [art] SIG.S = 90B88170E7649EBC02342234A7FA33DEAF389ACC4B8A4249440F1872B4FFFD91CF2A524F0D724E7FB3F27937F51CD4D5
26,220,885 UART: Caliptra RT
26,221,573 UART: [state] CFI Enabled
26,353,863 UART: [rt] RT listening for mailbox commands...
26,385,102 UART: [rt]cmd =0x49444549, len=4
26,387,734 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,753,916 ready_for_fw is high
3,754,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,034,361 >>> mbox cmd response: success
15,034,998 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,286,810 UART:
19,287,198 UART: Running Caliptra FMC ...
19,288,348 UART:
19,288,528 UART: [state] CFI Enabled
19,296,587 UART: [fht] FMC Alias Private Key: 7
21,062,950 UART: [art] Extend RT PCRs Done
21,064,188 UART: [art] Lock RT PCRs Done
21,065,688 UART: [art] Populate DV Done
21,071,284 UART: [fht] FMC Alias Private Key: 7
21,072,737 UART: [art] Derive CDI
21,073,478 UART: [art] Store in slot 0x4
21,116,591 UART: [art] Derive Key Pair
21,117,593 UART: [art] Store priv key in slot 0x5
23,544,052 UART: [art] Derive Key Pair - Done
23,557,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,263,514 UART: [art] Erasing AUTHORITY.KEYID = 7
25,265,027 UART: [art] PUB.X = F664FF2F948426F6FDAF8CAEA1FC49FD6CEF82521181FBB56F1BE2E7FCBC9FAE0E17744F4831BFB5A1CCD25F46AB720C
25,272,343 UART: [art] PUB.Y = AC4FCFA157A104D65B85B16F49496F2AD401B6FFF854006D0289434C6D16EE12AC14DBBDFB58C2CD911480E1508CEB4F
25,279,603 UART: [art] SIG.R = 508886B699F0F24EF1F7856298A78736C4BA68805C66EF11C559DF0FCF34352CB5EE37FF92CC8BE4C38B806869AB3849
25,287,038 UART: [art] SIG.S = 14A3EF45A8D6570AF95E863091CEAE49ECD24991E544D5A9B76D2AD667C348A627F620AC7F7FAB23492B63E898EE57E2
26,265,903 UART: Caliptra RT
26,266,626 UART: [state] CFI Enabled
26,400,256 UART: [rt] RT listening for mailbox commands...
26,431,604 UART: [rt]cmd =0x49444549, len=4
26,434,620 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,641 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,229 UART: [kat] SHA2-256
882,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,275 UART: [kat] ++
886,427 UART: [kat] sha1
890,685 UART: [kat] SHA2-256
892,623 UART: [kat] SHA2-384
895,334 UART: [kat] SHA2-512-ACC
897,235 UART: [kat] ECC-384
902,932 UART: [kat] HMAC-384Kdf
907,460 UART: [kat] LMS
1,475,656 UART: [kat] --
1,476,703 UART: [cold-reset] ++
1,477,253 UART: [fht] Storing FHT @ 0x50003400
1,480,190 UART: [idev] ++
1,480,358 UART: [idev] CDI.KEYID = 6
1,480,718 UART: [idev] SUBJECT.KEYID = 7
1,481,142 UART: [idev] UDS.KEYID = 0
1,481,487 ready_for_fw is high
1,481,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,190 UART: [idev] Erasing UDS.KEYID = 0
1,505,768 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,314 UART: [idev] --
1,515,369 UART: [ldev] ++
1,515,537 UART: [ldev] CDI.KEYID = 6
1,515,900 UART: [ldev] SUBJECT.KEYID = 5
1,516,326 UART: [ldev] AUTHORITY.KEYID = 7
1,516,789 UART: [ldev] FE.KEYID = 1
1,522,111 UART: [ldev] Erasing FE.KEYID = 1
1,547,588 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,622 UART: [ldev] --
1,586,939 UART: [fwproc] Waiting for Commands...
1,587,710 UART: [fwproc] Received command 0x46574c44
1,588,501 UART: [fwproc] Received Image of size 118548 bytes
2,933,585 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,613 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,831 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,182 >>> mbox cmd response: success
3,132,182 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,133,366 UART: [afmc] ++
3,133,534 UART: [afmc] CDI.KEYID = 6
3,133,896 UART: [afmc] SUBJECT.KEYID = 7
3,134,321 UART: [afmc] AUTHORITY.KEYID = 5
3,169,172 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,268 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,048 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,757 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,640 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,323 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,181 UART: [afmc] --
3,212,231 UART: [cold-reset] --
3,213,025 UART: [state] Locking Datavault
3,214,310 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,914 UART: [state] Locking ICCM
3,215,338 UART: [exit] Launching FMC @ 0x40000130
3,220,668 UART:
3,220,684 UART: Running Caliptra FMC ...
3,221,092 UART:
3,221,146 UART: [state] CFI Enabled
3,231,922 UART: [fht] FMC Alias Private Key: 7
3,351,338 UART: [art] Extend RT PCRs Done
3,351,766 UART: [art] Lock RT PCRs Done
3,353,186 UART: [art] Populate DV Done
3,361,561 UART: [fht] FMC Alias Private Key: 7
3,362,537 UART: [art] Derive CDI
3,362,817 UART: [art] Store in slot 0x4
3,448,367 UART: [art] Derive Key Pair
3,448,727 UART: [art] Store priv key in slot 0x5
3,462,250 UART: [art] Derive Key Pair - Done
3,476,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,725 UART: [art] PUB.X = F59380B38B865F072BE79CDA63F63F8A812AAD558E080BC4FF6FD8B4D34E83E68069AF757FE2C336C12AFFCE17523F17
3,499,500 UART: [art] PUB.Y = 066D460A040AB06B24A62332D5462DF9C37D3DA8B0FED5E0A338C75ECD7F656B6DE65B50878335F170A1712F79BFA32C
3,506,446 UART: [art] SIG.R = E241C78C1519EFCCDE42E1E948E461FE31974930E300B96D71D82B814D83831D74D3FAE1974F2AE1ADAA293B23524720
3,513,198 UART: [art] SIG.S = 8C5B06C3B96A19977D0F25BDD212A9B279FADA861835FE5A40DC12835B75B056FD1DEA5C7AC2D0F8E338BA230D289D8A
3,536,623 UART: Caliptra RT
3,536,874 UART: [state] CFI Enabled
3,656,863 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,347 UART: [rt]cmd =0x49444549, len=4
3,689,892 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,213 ready_for_fw is high
1,362,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,816 >>> mbox cmd response: success
2,979,816 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,041,953 UART:
3,041,969 UART: Running Caliptra FMC ...
3,042,377 UART:
3,042,431 UART: [state] CFI Enabled
3,052,859 UART: [fht] FMC Alias Private Key: 7
3,171,891 UART: [art] Extend RT PCRs Done
3,172,319 UART: [art] Lock RT PCRs Done
3,174,099 UART: [art] Populate DV Done
3,182,536 UART: [fht] FMC Alias Private Key: 7
3,183,530 UART: [art] Derive CDI
3,183,810 UART: [art] Store in slot 0x4
3,269,532 UART: [art] Derive Key Pair
3,269,892 UART: [art] Store priv key in slot 0x5
3,282,883 UART: [art] Derive Key Pair - Done
3,297,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,130 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,895 UART: [art] PUB.X = A2E208EECD86DE166DACDEF7BDEF657EF7FB2550B2A17BFFAC42F1313869244E37AE96B1D9F8F1CC3D6F68A10DC876B5
3,320,687 UART: [art] PUB.Y = BBB8875C123B912130030DAD121D11930BEF383CAE1213FF7E796A2B0C76233C9F51C784509907635747A259EBCCCEC4
3,327,624 UART: [art] SIG.R = 38041E2C1D16E52797032BAEF8DC5C82B3416F57BA38C9676789C14294140779928B61628DF944F15981C303933CEEF0
3,334,372 UART: [art] SIG.S = 24CEE11D68B90CFC71E02FCA64EE790C08E71C5B044F47C0212DE0E114080E2FB1012C99EB7F8EB8F476E276E89D28F5
3,357,759 UART: Caliptra RT
3,358,010 UART: [state] CFI Enabled
3,478,567 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,077 UART: [rt]cmd =0x49444549, len=4
3,511,548 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,166 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,692 UART: [kat] SHA2-256
882,623 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,738 UART: [kat] ++
886,890 UART: [kat] sha1
891,006 UART: [kat] SHA2-256
892,944 UART: [kat] SHA2-384
895,799 UART: [kat] SHA2-512-ACC
897,700 UART: [kat] ECC-384
903,337 UART: [kat] HMAC-384Kdf
907,931 UART: [kat] LMS
1,476,127 UART: [kat] --
1,477,126 UART: [cold-reset] ++
1,477,460 UART: [fht] Storing FHT @ 0x50003400
1,480,067 UART: [idev] ++
1,480,235 UART: [idev] CDI.KEYID = 6
1,480,595 UART: [idev] SUBJECT.KEYID = 7
1,481,019 UART: [idev] UDS.KEYID = 0
1,481,364 ready_for_fw is high
1,481,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,747 UART: [idev] Erasing UDS.KEYID = 0
1,505,561 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,179 UART: [idev] --
1,515,198 UART: [ldev] ++
1,515,366 UART: [ldev] CDI.KEYID = 6
1,515,729 UART: [ldev] SUBJECT.KEYID = 5
1,516,155 UART: [ldev] AUTHORITY.KEYID = 7
1,516,618 UART: [ldev] FE.KEYID = 1
1,521,922 UART: [ldev] Erasing FE.KEYID = 1
1,547,675 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,473 UART: [ldev] --
1,586,786 UART: [fwproc] Waiting for Commands...
1,587,561 UART: [fwproc] Received command 0x46574c44
1,588,352 UART: [fwproc] Received Image of size 118548 bytes
2,933,446 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,570 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,227 >>> mbox cmd response: success
3,132,227 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,133,443 UART: [afmc] ++
3,133,611 UART: [afmc] CDI.KEYID = 6
3,133,973 UART: [afmc] SUBJECT.KEYID = 7
3,134,398 UART: [afmc] AUTHORITY.KEYID = 5
3,169,711 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,133 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,913 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,622 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,505 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,188 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,040 UART: [afmc] --
3,213,144 UART: [cold-reset] --
3,214,100 UART: [state] Locking Datavault
3,215,375 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,979 UART: [state] Locking ICCM
3,216,513 UART: [exit] Launching FMC @ 0x40000130
3,221,843 UART:
3,221,859 UART: Running Caliptra FMC ...
3,222,267 UART:
3,222,410 UART: [state] CFI Enabled
3,232,988 UART: [fht] FMC Alias Private Key: 7
3,352,552 UART: [art] Extend RT PCRs Done
3,352,980 UART: [art] Lock RT PCRs Done
3,354,690 UART: [art] Populate DV Done
3,362,977 UART: [fht] FMC Alias Private Key: 7
3,363,983 UART: [art] Derive CDI
3,364,263 UART: [art] Store in slot 0x4
3,450,155 UART: [art] Derive Key Pair
3,450,515 UART: [art] Store priv key in slot 0x5
3,463,996 UART: [art] Derive Key Pair - Done
3,478,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,951 UART: [art] PUB.X = 0E67530AB7BD08E6B272655C4386A177831DC65F6FC5DD958EA71967EBD7310AE3BBB6A373EF377E5BFEF8BFD1F7D6E4
3,501,727 UART: [art] PUB.Y = BEF2E6FFCD5C3B0CDA892F40F84F15495DD2A73D6E3628E8D9FFCCCF6CE722E68A02A80EA14D9E7042B1E962C1DD686F
3,508,694 UART: [art] SIG.R = 705DBE225F687F603A60C56F91B7FF309A4454AE59104F8E20BC23D6087CB794BB83B12B70DF60E8D99E4AA5D3227B4C
3,515,469 UART: [art] SIG.S = 8987C0F9B8502971C867DAC70643A438AA861193BB2C343F1BA2902D366D2C721C999D4129BB7F98CA73308CEA6469A6
3,538,968 UART: Caliptra RT
3,539,311 UART: [state] CFI Enabled
3,660,935 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,533 UART: [rt]cmd =0x49444549, len=4
3,694,088 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,436 ready_for_fw is high
1,362,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,919 >>> mbox cmd response: success
2,979,919 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,040,982 UART:
3,040,998 UART: Running Caliptra FMC ...
3,041,406 UART:
3,041,549 UART: [state] CFI Enabled
3,052,059 UART: [fht] FMC Alias Private Key: 7
3,171,375 UART: [art] Extend RT PCRs Done
3,171,803 UART: [art] Lock RT PCRs Done
3,173,475 UART: [art] Populate DV Done
3,181,670 UART: [fht] FMC Alias Private Key: 7
3,182,720 UART: [art] Derive CDI
3,183,000 UART: [art] Store in slot 0x4
3,268,682 UART: [art] Derive Key Pair
3,269,042 UART: [art] Store priv key in slot 0x5
3,282,941 UART: [art] Derive Key Pair - Done
3,297,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,903 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,668 UART: [art] PUB.X = C97899593D019B84EAFDA7088E90FCA506BDC44AE9E493451E9360E3759EC3B76B183DFE49D90109C7C8F88D90A6DCE9
3,320,433 UART: [art] PUB.Y = 789ABD3EA8C03B091D0018EFDB08421480B89CB556C14E8B2568D0EBC38CA234C2790E600D1E6ABACAFEB3D3AC5C51E8
3,327,369 UART: [art] SIG.R = 52CC14BAFE5965E551DAF6CBC79D0D5401DB035794756CAF0305B28F3CBAF0AA7BF0E6FDA53FBD77778AF46F6DFB108C
3,334,150 UART: [art] SIG.S = 57F695F78BA068DB3177D5F4039F085EF9C18F1AA112795C900007E97372FA869B66F89AFF8D2C1BF623831C4E131C22
3,357,957 UART: Caliptra RT
3,358,300 UART: [state] CFI Enabled
3,478,365 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,657 UART: [rt]cmd =0x49444549, len=4
3,510,818 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
890,774 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,878 UART: [kat] ++
895,030 UART: [kat] sha1
899,176 UART: [kat] SHA2-256
901,116 UART: [kat] SHA2-384
903,915 UART: [kat] SHA2-512-ACC
905,816 UART: [kat] ECC-384
915,525 UART: [kat] HMAC-384Kdf
919,881 UART: [kat] LMS
1,168,193 UART: [kat] --
1,169,252 UART: [cold-reset] ++
1,169,728 UART: [fht] FHT @ 0x50003400
1,172,454 UART: [idev] ++
1,172,622 UART: [idev] CDI.KEYID = 6
1,172,983 UART: [idev] SUBJECT.KEYID = 7
1,173,408 UART: [idev] UDS.KEYID = 0
1,173,754 ready_for_fw is high
1,173,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,485 UART: [idev] Erasing UDS.KEYID = 0
1,198,161 UART: [idev] Sha1 KeyId Algorithm
1,207,017 UART: [idev] --
1,207,928 UART: [ldev] ++
1,208,096 UART: [ldev] CDI.KEYID = 6
1,208,460 UART: [ldev] SUBJECT.KEYID = 5
1,208,887 UART: [ldev] AUTHORITY.KEYID = 7
1,209,350 UART: [ldev] FE.KEYID = 1
1,214,484 UART: [ldev] Erasing FE.KEYID = 1
1,240,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,064 UART: [ldev] --
1,280,355 UART: [fwproc] Wait for Commands...
1,281,130 UART: [fwproc] Recv command 0x46574c44
1,281,863 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,047 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,222 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,557 >>> mbox cmd response: success
2,824,557 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,825,571 UART: [afmc] ++
2,825,739 UART: [afmc] CDI.KEYID = 6
2,826,102 UART: [afmc] SUBJECT.KEYID = 7
2,826,528 UART: [afmc] AUTHORITY.KEYID = 5
2,861,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,928 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,677 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,387 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,268 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,969 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,732 UART: [afmc] --
2,904,623 UART: [cold-reset] --
2,905,591 UART: [state] Locking Datavault
2,906,700 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,304 UART: [state] Locking ICCM
2,907,790 UART: [exit] Launching FMC @ 0x40000130
2,913,120 UART:
2,913,136 UART: Running Caliptra FMC ...
2,913,544 UART:
2,913,598 UART: [state] CFI Enabled
2,923,636 UART: [fht] FMC Alias Private Key: 7
3,042,734 UART: [art] Extend RT PCRs Done
3,043,162 UART: [art] Lock RT PCRs Done
3,044,910 UART: [art] Populate DV Done
3,052,971 UART: [fht] FMC Alias Private Key: 7
3,054,115 UART: [art] Derive CDI
3,054,395 UART: [art] Store in slot 0x4
3,140,278 UART: [art] Derive Key Pair
3,140,638 UART: [art] Store priv key in slot 0x5
3,153,898 UART: [art] Derive Key Pair - Done
3,168,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,137 UART: [art] PUB.X = BB781798BE96350F19EA6ADACEFC5BC1640FAC3E2E21BC7C038E9B333D5B66E542B3AFD528D228AE39B239623DB0F108
3,191,913 UART: [art] PUB.Y = 1874A7F175B2230E687B16BEC7999FDCA394D158C17B9748A546C9E48BE7062A608D704C393DE7A2CA78EA0D6ECD6501
3,198,857 UART: [art] SIG.R = D626CC3BE7B22A0C33D6B4186D66A71CCC097A3874BD06C5BF5584BE83111B4B435474BB27AD77B0DC5D562889FB1CA1
3,205,630 UART: [art] SIG.S = EEB3D9453CE98FD635C055F0329D01656D5D419C57BB26B834F4ACA36862FFE939B3F7B2A826C2FD9A03565606E313A3
3,229,593 UART: Caliptra RT
3,229,844 UART: [state] CFI Enabled
3,349,058 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,432 UART: [rt]cmd =0x49444549, len=4
3,381,665 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,084 ready_for_fw is high
1,059,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,662 >>> mbox cmd response: success
2,677,662 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,739,643 UART:
2,739,659 UART: Running Caliptra FMC ...
2,740,067 UART:
2,740,121 UART: [state] CFI Enabled
2,750,811 UART: [fht] FMC Alias Private Key: 7
2,869,375 UART: [art] Extend RT PCRs Done
2,869,803 UART: [art] Lock RT PCRs Done
2,871,457 UART: [art] Populate DV Done
2,879,802 UART: [fht] FMC Alias Private Key: 7
2,880,842 UART: [art] Derive CDI
2,881,122 UART: [art] Store in slot 0x4
2,966,629 UART: [art] Derive Key Pair
2,966,989 UART: [art] Store priv key in slot 0x5
2,980,611 UART: [art] Derive Key Pair - Done
2,995,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,272 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,037 UART: [art] PUB.X = F5DC901DFB50F24F1526D39F78146511438D4015CC903C0568186B8F4BFD7D404EDF682BCCD987FD86F039F270F9DD15
3,017,810 UART: [art] PUB.Y = 8539FBE1BD3DA3CBF15BE9963D85E0E012DE513C2AEB4BA12D3143945C73613EC6225BD416A8DBEA03FA84E08E7B43CD
3,024,777 UART: [art] SIG.R = 978F775A9C88D810F005B554B2A5D097E7D78FE7FA349F2CF897D970CF964E60CAE26BD335DB9C4060A8F9BB54E331E4
3,031,554 UART: [art] SIG.S = B6B83F69A490286304A57D87FAB22C28FE408EBCCCEC25E6546D51BD96CFB9ABD42BE75DD3B89394DADB807DEED4B333
3,055,761 UART: Caliptra RT
3,056,012 UART: [state] CFI Enabled
3,175,416 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,178 UART: [rt]cmd =0x49444549, len=4
3,208,497 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
916,346 UART: [kat] HMAC-384Kdf
920,926 UART: [kat] LMS
1,169,238 UART: [kat] --
1,170,057 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,174,511 ready_for_fw is high
1,174,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,004 UART: [idev] Erasing UDS.KEYID = 0
1,199,328 UART: [idev] Sha1 KeyId Algorithm
1,208,138 UART: [idev] --
1,209,053 UART: [ldev] ++
1,209,221 UART: [ldev] CDI.KEYID = 6
1,209,585 UART: [ldev] SUBJECT.KEYID = 5
1,210,012 UART: [ldev] AUTHORITY.KEYID = 7
1,210,475 UART: [ldev] FE.KEYID = 1
1,215,879 UART: [ldev] Erasing FE.KEYID = 1
1,241,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,037 UART: [ldev] --
1,280,282 UART: [fwproc] Wait for Commands...
1,281,105 UART: [fwproc] Recv command 0x46574c44
1,281,838 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,673 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,914 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,089 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,434 >>> mbox cmd response: success
2,825,434 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,826,502 UART: [afmc] ++
2,826,670 UART: [afmc] CDI.KEYID = 6
2,827,033 UART: [afmc] SUBJECT.KEYID = 7
2,827,459 UART: [afmc] AUTHORITY.KEYID = 5
2,862,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,790 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,500 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,381 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,082 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,885 UART: [afmc] --
2,905,710 UART: [cold-reset] --
2,906,604 UART: [state] Locking Datavault
2,907,859 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,463 UART: [state] Locking ICCM
2,908,905 UART: [exit] Launching FMC @ 0x40000130
2,914,235 UART:
2,914,251 UART: Running Caliptra FMC ...
2,914,659 UART:
2,914,802 UART: [state] CFI Enabled
2,925,392 UART: [fht] FMC Alias Private Key: 7
3,044,330 UART: [art] Extend RT PCRs Done
3,044,758 UART: [art] Lock RT PCRs Done
3,046,310 UART: [art] Populate DV Done
3,054,487 UART: [fht] FMC Alias Private Key: 7
3,055,621 UART: [art] Derive CDI
3,055,901 UART: [art] Store in slot 0x4
3,141,880 UART: [art] Derive Key Pair
3,142,240 UART: [art] Store priv key in slot 0x5
3,155,928 UART: [art] Derive Key Pair - Done
3,170,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,354 UART: [art] PUB.X = 7559F5B9D2C66E4E098250EAB5F81462B29628CA079C302330E6AAC66D3189D472E6054522F87A04CA059580D7C9AF33
3,193,105 UART: [art] PUB.Y = BB21A29C09D910462D3818B15F1DBBC0AB38616452B363CDD3E891A68B48FB40EC91FB276738FEF20D2BF42FAE8F5242
3,200,061 UART: [art] SIG.R = 121B3E4E5E35F8F9058F62CB1120B3050B0EB766AFA52021ABD173BBF4DAD3F9BA1F9B1270140BD2E6A9829C3BE2A01D
3,206,832 UART: [art] SIG.S = F87442030B77C30C5F6D0C10B6DCAD08C3C82F2767A59AF5C15CD77B0A517759A4A176CC6197F01B83B0392839FDD975
3,230,720 UART: Caliptra RT
3,231,063 UART: [state] CFI Enabled
3,351,532 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,808 UART: [rt]cmd =0x49444549, len=4
3,384,063 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,441 ready_for_fw is high
1,059,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,245 >>> mbox cmd response: success
2,680,245 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,741,910 UART:
2,741,926 UART: Running Caliptra FMC ...
2,742,334 UART:
2,742,477 UART: [state] CFI Enabled
2,753,149 UART: [fht] FMC Alias Private Key: 7
2,871,891 UART: [art] Extend RT PCRs Done
2,872,319 UART: [art] Lock RT PCRs Done
2,873,763 UART: [art] Populate DV Done
2,882,002 UART: [fht] FMC Alias Private Key: 7
2,882,996 UART: [art] Derive CDI
2,883,276 UART: [art] Store in slot 0x4
2,969,067 UART: [art] Derive Key Pair
2,969,427 UART: [art] Store priv key in slot 0x5
2,982,935 UART: [art] Derive Key Pair - Done
2,997,803 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,131 UART: [art] PUB.X = 8890E449871182EDD9D0D924DC9F905A4F05BD807828A235A6BB2C8FC7D4BC77AEC916F5A7B13E0F6E573F83AE896EF2
3,020,907 UART: [art] PUB.Y = 7B3FDA6461AA79EFED31625B90FF0057C685ACDDB155ADFC841D7817D43CFC8410E9F979663F3CC1D2D37EE579706244
3,027,847 UART: [art] SIG.R = 476DECE3A8A89C26DF7116952B33B0147CF14FCB6EE6667E7BB0909DBD105687F41D7954DAAACF18DE64AF8BDCE3BC68
3,034,639 UART: [art] SIG.S = 582AC03CC2434664444BDB101F4AD6B3D9B5FEAA18D0E6C5448B0CA7CFAE13719B57CAECE3AD22490234A45C0CAECE94
3,058,660 UART: Caliptra RT
3,059,003 UART: [state] CFI Enabled
3,178,935 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,303 UART: [rt]cmd =0x49444549, len=4
3,211,650 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,953 UART: [kat] SHA2-256
903,893 UART: [kat] SHA2-384
906,648 UART: [kat] SHA2-512-ACC
908,549 UART: [kat] ECC-384
918,610 UART: [kat] HMAC-384Kdf
922,982 UART: [kat] LMS
1,171,310 UART: [kat] --
1,171,965 UART: [cold-reset] ++
1,172,319 UART: [fht] FHT @ 0x50003400
1,175,046 UART: [idev] ++
1,175,214 UART: [idev] CDI.KEYID = 6
1,175,574 UART: [idev] SUBJECT.KEYID = 7
1,175,998 UART: [idev] UDS.KEYID = 0
1,176,343 ready_for_fw is high
1,176,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,720 UART: [idev] Erasing UDS.KEYID = 0
1,200,685 UART: [idev] Sha1 KeyId Algorithm
1,209,125 UART: [idev] --
1,210,413 UART: [ldev] ++
1,210,581 UART: [ldev] CDI.KEYID = 6
1,210,944 UART: [ldev] SUBJECT.KEYID = 5
1,211,370 UART: [ldev] AUTHORITY.KEYID = 7
1,211,833 UART: [ldev] FE.KEYID = 1
1,216,857 UART: [ldev] Erasing FE.KEYID = 1
1,243,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,075 UART: [ldev] --
1,282,458 UART: [fwproc] Wait for Commands...
1,283,202 UART: [fwproc] Recv command 0x46574c44
1,283,930 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,992 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,162 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,503 >>> mbox cmd response: success
2,826,503 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,827,539 UART: [afmc] ++
2,827,707 UART: [afmc] CDI.KEYID = 6
2,828,069 UART: [afmc] SUBJECT.KEYID = 7
2,828,494 UART: [afmc] AUTHORITY.KEYID = 5
2,864,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,476 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,185 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,068 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,769 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,457 UART: [afmc] --
2,907,363 UART: [cold-reset] --
2,908,163 UART: [state] Locking Datavault
2,909,510 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,114 UART: [state] Locking ICCM
2,910,738 UART: [exit] Launching FMC @ 0x40000130
2,916,068 UART:
2,916,084 UART: Running Caliptra FMC ...
2,916,492 UART:
2,916,546 UART: [state] CFI Enabled
2,926,648 UART: [fht] FMC Alias Private Key: 7
3,045,046 UART: [art] Extend RT PCRs Done
3,045,474 UART: [art] Lock RT PCRs Done
3,046,698 UART: [art] Populate DV Done
3,054,645 UART: [fht] FMC Alias Private Key: 7
3,055,583 UART: [art] Derive CDI
3,055,863 UART: [art] Store in slot 0x4
3,141,866 UART: [art] Derive Key Pair
3,142,226 UART: [art] Store priv key in slot 0x5
3,155,386 UART: [art] Derive Key Pair - Done
3,170,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,085 UART: [art] PUB.X = 75EF7F598A17288C3A46FC10C7E3F6D274FE88DC8545A939DBFEF40193302856789863CF84A6E40DE50E47E5563ADCE8
3,192,852 UART: [art] PUB.Y = 935476425666E99125C65D23DF65574F2D566C1CCE5411A1386428AD272915929B95F90CDA9DB6E743FC1AF227B9739E
3,199,793 UART: [art] SIG.R = 195F00BC61F4486230ADE806B72E8BDFACD8467A6908F4E7BAC91268884F57A24BE8E27594F9254EF35889E95E0DA772
3,206,536 UART: [art] SIG.S = 947753FA599C0AE547D3A64C243F7B46796B81EE3EF3328C8C59C658BAF9980AFB27A3ED0AD4E9D42388980EC452FC0D
3,230,145 UART: Caliptra RT
3,230,396 UART: [state] CFI Enabled
3,349,967 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,643 UART: [rt]cmd =0x49444549, len=4
3,382,968 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,665 ready_for_fw is high
1,060,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,706 >>> mbox cmd response: success
2,678,706 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,740,465 UART:
2,740,481 UART: Running Caliptra FMC ...
2,740,889 UART:
2,740,943 UART: [state] CFI Enabled
2,751,223 UART: [fht] FMC Alias Private Key: 7
2,870,167 UART: [art] Extend RT PCRs Done
2,870,595 UART: [art] Lock RT PCRs Done
2,872,033 UART: [art] Populate DV Done
2,880,386 UART: [fht] FMC Alias Private Key: 7
2,881,482 UART: [art] Derive CDI
2,881,762 UART: [art] Store in slot 0x4
2,967,625 UART: [art] Derive Key Pair
2,967,985 UART: [art] Store priv key in slot 0x5
2,981,277 UART: [art] Derive Key Pair - Done
2,996,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,380 UART: [art] PUB.X = 157B59198B745875DBB467760A322476764CC821F3E81183FA1274DA562F4A4AAE48BC09723C54749D3538EA464035AB
3,019,136 UART: [art] PUB.Y = 405B86589B267D4ECA8B03D42D1721C1B9293C0B9207963926516C14FB4DB09D4E4CEAC16D2F584ABA297C95394B7BD6
3,026,081 UART: [art] SIG.R = F11313C8E06474FF74B2CB74653C93485CF7B5DF76EDA4BB31FB7D0CD2864BEB7EDF0EF92DEC62D681B02385EC29C63C
3,032,865 UART: [art] SIG.S = 8A3FACBD0AF3FEBF74C00DDCB214DED131C809E8B19434B36D336589B43139676FD0A7BB8F18CEEACED0CA4FFDE60C8D
3,056,467 UART: Caliptra RT
3,056,718 UART: [state] CFI Enabled
3,175,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,898 UART: [rt]cmd =0x49444549, len=4
3,208,161 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
893,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,836 UART: [kat] ++
897,988 UART: [kat] sha1
902,264 UART: [kat] SHA2-256
904,204 UART: [kat] SHA2-384
907,107 UART: [kat] SHA2-512-ACC
909,008 UART: [kat] ECC-384
918,791 UART: [kat] HMAC-384Kdf
923,637 UART: [kat] LMS
1,171,965 UART: [kat] --
1,173,032 UART: [cold-reset] ++
1,173,522 UART: [fht] FHT @ 0x50003400
1,176,215 UART: [idev] ++
1,176,383 UART: [idev] CDI.KEYID = 6
1,176,743 UART: [idev] SUBJECT.KEYID = 7
1,177,167 UART: [idev] UDS.KEYID = 0
1,177,512 ready_for_fw is high
1,177,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,941 UART: [idev] Erasing UDS.KEYID = 0
1,202,012 UART: [idev] Sha1 KeyId Algorithm
1,210,416 UART: [idev] --
1,211,394 UART: [ldev] ++
1,211,562 UART: [ldev] CDI.KEYID = 6
1,211,925 UART: [ldev] SUBJECT.KEYID = 5
1,212,351 UART: [ldev] AUTHORITY.KEYID = 7
1,212,814 UART: [ldev] FE.KEYID = 1
1,217,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,716 UART: [ldev] --
1,284,187 UART: [fwproc] Wait for Commands...
1,284,761 UART: [fwproc] Recv command 0x46574c44
1,285,489 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,075 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,360 >>> mbox cmd response: success
2,829,360 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,830,512 UART: [afmc] ++
2,830,680 UART: [afmc] CDI.KEYID = 6
2,831,042 UART: [afmc] SUBJECT.KEYID = 7
2,831,467 UART: [afmc] AUTHORITY.KEYID = 5
2,867,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,579 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,288 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,171 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,872 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,794 UART: [afmc] --
2,910,698 UART: [cold-reset] --
2,911,706 UART: [state] Locking Datavault
2,913,065 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,669 UART: [state] Locking ICCM
2,914,301 UART: [exit] Launching FMC @ 0x40000130
2,919,631 UART:
2,919,647 UART: Running Caliptra FMC ...
2,920,055 UART:
2,920,198 UART: [state] CFI Enabled
2,931,270 UART: [fht] FMC Alias Private Key: 7
3,051,214 UART: [art] Extend RT PCRs Done
3,051,642 UART: [art] Lock RT PCRs Done
3,053,016 UART: [art] Populate DV Done
3,061,155 UART: [fht] FMC Alias Private Key: 7
3,062,277 UART: [art] Derive CDI
3,062,557 UART: [art] Store in slot 0x4
3,147,980 UART: [art] Derive Key Pair
3,148,340 UART: [art] Store priv key in slot 0x5
3,162,256 UART: [art] Derive Key Pair - Done
3,177,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,292 UART: [art] PUB.X = BB6AA8F12CBE052B577CE9E799DE3961D7ABA6A0C19EFE8D84A62A0B70B68EA3482B509ABDC5875B721DDAF7BC928E6F
3,200,082 UART: [art] PUB.Y = 8F1A11DA0E44AF9AE763EDACDECAB57F3018E6CF9EB4329BB7E3B2333C996B9F9D976C4BCBA7059A3AFF02027FB7C204
3,207,043 UART: [art] SIG.R = D8B4048DB25D3DE17A81CA0934CFDBA29AD2446CC5612C5EBC49174EED76C65603EDAB44F9EE40944D9EFC2EEE197526
3,213,824 UART: [art] SIG.S = 02B746077344B725D050B36A78B77B8EC36296244DC074DC2A84E119F3CA775005B1F50FA9DDCE3AFB777FA6714D5AE8
3,237,836 UART: Caliptra RT
3,238,179 UART: [state] CFI Enabled
3,358,040 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,578 UART: [rt]cmd =0x49444549, len=4
3,390,859 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,542 ready_for_fw is high
1,060,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,069 >>> mbox cmd response: success
2,681,069 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,743,032 UART:
2,743,048 UART: Running Caliptra FMC ...
2,743,456 UART:
2,743,599 UART: [state] CFI Enabled
2,754,385 UART: [fht] FMC Alias Private Key: 7
2,873,751 UART: [art] Extend RT PCRs Done
2,874,179 UART: [art] Lock RT PCRs Done
2,875,889 UART: [art] Populate DV Done
2,884,192 UART: [fht] FMC Alias Private Key: 7
2,885,244 UART: [art] Derive CDI
2,885,524 UART: [art] Store in slot 0x4
2,971,395 UART: [art] Derive Key Pair
2,971,755 UART: [art] Store priv key in slot 0x5
2,984,829 UART: [art] Derive Key Pair - Done
2,999,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,192 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,957 UART: [art] PUB.X = F78FFB5B958A4CFC46A2103DCE0CA3C9A08109CF4130ACEB34CF79556545511E6490F17203727F6E2DB3FCB19207F61E
3,022,725 UART: [art] PUB.Y = DFA4AF4CFA8B9B76DD13CBF3FE7BC3F7C95947861BE718BCA2DA1B333B5DC33FCDF073EF583DC6FDD9BD326F690680C7
3,029,704 UART: [art] SIG.R = E6ABA5E324F9E93913E6B469FC014EB5816D61331640ECBC21EE6C42CC774CA84737E8603A2F962471E3CBE4AA135B83
3,036,479 UART: [art] SIG.S = DA82774FBCB7C9E42AFFB1CED61E667B63DD443217D8014B89D308BBB72CDC4CCC735BA4818CCC7E31DD776654C1A01E
3,060,619 UART: Caliptra RT
3,060,962 UART: [state] CFI Enabled
3,181,070 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,590 UART: [rt]cmd =0x49444549, len=4
3,213,959 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,090 UART:
192,462 UART: Running Caliptra ROM ...
193,649 UART:
193,804 UART: [state] CFI Enabled
262,000 UART: [state] LifecycleState = Unprovisioned
263,978 UART: [state] DebugLocked = No
265,731 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,233 UART: [kat] SHA2-256
440,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,428 UART: [kat] ++
451,914 UART: [kat] sha1
463,358 UART: [kat] SHA2-256
466,015 UART: [kat] SHA2-384
472,861 UART: [kat] SHA2-512-ACC
475,229 UART: [kat] ECC-384
2,767,649 UART: [kat] HMAC-384Kdf
2,780,601 UART: [kat] LMS
3,970,946 UART: [kat] --
3,974,412 UART: [cold-reset] ++
3,976,061 UART: [fht] Storing FHT @ 0x50003400
3,988,617 UART: [idev] ++
3,989,182 UART: [idev] CDI.KEYID = 6
3,990,097 UART: [idev] SUBJECT.KEYID = 7
3,991,344 UART: [idev] UDS.KEYID = 0
3,992,436 ready_for_fw is high
3,992,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,787 UART: [idev] Erasing UDS.KEYID = 0
7,326,511 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,766 UART: [idev] --
7,351,887 UART: [ldev] ++
7,352,454 UART: [ldev] CDI.KEYID = 6
7,353,436 UART: [ldev] SUBJECT.KEYID = 5
7,354,654 UART: [ldev] AUTHORITY.KEYID = 7
7,355,882 UART: [ldev] FE.KEYID = 1
7,383,109 UART: [ldev] Erasing FE.KEYID = 1
10,713,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,009,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,024,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,039,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,053,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,072,915 UART: [ldev] --
13,077,473 UART: [fwproc] Waiting for Commands...
13,080,607 UART: [fwproc] Received command 0x46574c44
13,082,729 UART: [fwproc] Received Image of size 118548 bytes
17,201,404 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,276,283 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,349,449 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,678,167 >>> mbox cmd response: success
17,678,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,683,050 UART: [afmc] ++
17,683,636 UART: [afmc] CDI.KEYID = 6
17,684,550 UART: [afmc] SUBJECT.KEYID = 7
17,685,772 UART: [afmc] AUTHORITY.KEYID = 5
21,055,088 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,356,030 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,358,345 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,372,745 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,387,497 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,401,925 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,422,762 UART: [afmc] --
23,425,870 UART: [cold-reset] --
23,430,597 UART: [state] Locking Datavault
23,435,088 UART: [state] Locking PCR0, PCR1 and PCR31
23,436,810 UART: [state] Locking ICCM
23,439,394 UART: [exit] Launching FMC @ 0x40000130
23,447,798 UART:
23,448,031 UART: Running Caliptra FMC ...
23,449,136 UART:
23,449,299 UART: [state] CFI Enabled
23,515,186 UART: [fht] FMC Alias Private Key: 7
25,855,481 UART: [art] Extend RT PCRs Done
25,856,701 UART: [art] Lock RT PCRs Done
25,858,594 UART: [art] Populate DV Done
25,863,849 UART: [fht] FMC Alias Private Key: 7
25,865,386 UART: [art] Derive CDI
25,866,148 UART: [art] Store in slot 0x4
25,923,490 UART: [art] Derive Key Pair
25,924,528 UART: [art] Store priv key in slot 0x5
29,217,506 UART: [art] Derive Key Pair - Done
29,230,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,519,346 UART: [art] Erasing AUTHORITY.KEYID = 7
31,520,863 UART: [art] PUB.X = 76A6BB9C31613D03C58E2088B6E54C0DC30018FF7D04821D3C6D55E3C10FABC500623F19C3649AC18AC56952F9FBB00C
31,528,071 UART: [art] PUB.Y = 05420BFF5A0C0A91F63E96BF574054896872F6877A40969E3C55A1718E641AD626C78DB40732F2E5E6D035F5DE3CF167
31,535,331 UART: [art] SIG.R = 501F878C4F70B4B513744C96D84D1284662A8DB39F6E846C95EF8B769F5F4BCC578CB3BFD1747A4D9E8032EB83CED1B6
31,542,748 UART: [art] SIG.S = AFB66B2B0D177E16307CAB35728618C14D753DC033E051993D86C3418AE8F6650757ED93D87536C66F72C02CCBEEE1C0
32,848,297 UART: Caliptra RT
32,849,011 UART: [state] CFI Enabled
33,026,957 UART: [rt] RT listening for mailbox commands...
33,058,971 UART: [rt]cmd =0x44504543, len=96
38,829,016 >>> mbox cmd response data (6236 bytes)
40,932,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,082,978 UART:
41,083,418 UART: Running Caliptra ROM ...
41,084,480 UART:
41,084,636 UART: [state] CFI Enabled
41,160,059 UART: [state] LifecycleState = Unprovisioned
41,162,001 UART: [state] DebugLocked = No
41,163,813 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
41,169,103 UART: [kat] SHA2-256
41,338,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,349,346 UART: [kat] ++
41,349,799 UART: [kat] sha1
41,360,791 UART: [kat] SHA2-256
41,363,478 UART: [kat] SHA2-384
41,369,516 UART: [kat] SHA2-512-ACC
41,371,869 UART: [kat] ECC-384
43,666,035 UART: [kat] HMAC-384Kdf
43,696,904 UART: [kat] LMS
44,887,203 UART: [kat] --
44,894,173 UART: [update-reset] ++
49,095,441 UART: [update-reset] Image verified using Vendor ECC Key Index 0
49,099,398 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,497,185 >>> mbox cmd response: success
49,497,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,498,085 UART: [update-reset] Copying MAN_2 To MAN_1
49,520,483 UART: [update-reset Success] --
49,525,697 UART: [state] Locking Datavault
49,529,009 UART: [state] Locking PCR0, PCR1 and PCR31
49,530,775 UART: [state] Locking ICCM
49,533,200 UART: [exit] Launching FMC @ 0x40000130
49,541,601 UART:
49,541,835 UART: Running Caliptra FMC ...
49,542,957 UART:
49,543,114 UART: [state] CFI Enabled
49,636,768 UART: [art] Extend RT PCRs Done
49,637,958 UART: [art] Lock RT PCRs Done
49,639,249 UART: [art] Populate DV Done
49,644,876 UART: [fht] FMC Alias Private Key: 7
49,646,615 UART: [art] Derive CDI
49,647,496 UART: [art] Store in slot 0x4
49,706,409 UART: [art] Derive Key Pair
49,707,410 UART: [art] Store priv key in slot 0x5
52,999,825 UART: [art] Derive Key Pair - Done
53,012,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,301,114 UART: [art] Erasing AUTHORITY.KEYID = 7
55,302,638 UART: [art] PUB.X = B5BA4ADCE73782EF06F6AB632FCE7D824011BD6D334AA521E9C79ED89D77FDC89780732F05E7DCBD0EE51D3A90283782
55,309,903 UART: [art] PUB.Y = D298FB73CBC2E944135BBBEE1FBB8ACD8D46EE1CC313B383E084356BEC1D3A5267280A593136B962B19FAEE90D650EC6
55,317,161 UART: [art] SIG.R = 809D438274DACF1ED1BD396C45F7B95A66AD8F11139C6899E137FD4FA6B5F24F2E36085C41135A2502CBE4F19152395B
55,324,627 UART: [art] SIG.S = 5FF8CE6CEF107119E0BAB2CF2C0DD91D7B2A8ADD722FC7190820E384C8DD8A7532921410D7D41F9CEF5EE2D2513C02DB
56,629,391 UART: Caliptra RT
56,630,109 UART: [state] CFI Enabled
57,051,343 UART: [rt] RT listening for mailbox commands...
57,082,439 UART: [rt]cmd =0x494e464f, len=4
57,086,859 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
3,785,395 ready_for_fw is high
3,785,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,960,883 >>> mbox cmd response: success
17,961,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,651,138 UART:
23,651,547 UART: Running Caliptra FMC ...
23,652,670 UART:
23,652,827 UART: [state] CFI Enabled
23,719,134 UART: [fht] FMC Alias Private Key: 7
26,059,167 UART: [art] Extend RT PCRs Done
26,060,402 UART: [art] Lock RT PCRs Done
26,062,200 UART: [art] Populate DV Done
26,067,255 UART: [fht] FMC Alias Private Key: 7
26,068,962 UART: [art] Derive CDI
26,069,703 UART: [art] Store in slot 0x4
26,127,163 UART: [art] Derive Key Pair
26,128,208 UART: [art] Store priv key in slot 0x5
29,421,056 UART: [art] Derive Key Pair - Done
29,433,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,721,941 UART: [art] Erasing AUTHORITY.KEYID = 7
31,723,495 UART: [art] PUB.X = C7D73D852B0A0A56118B6718EACF9786E486F4B904305B49C5DBC0F1554E21B900F1D639EFDA68A0D1FDB778BCCC44B6
31,730,700 UART: [art] PUB.Y = 809E26B14AC068283CC779ACBB7782BB1F7C8E69828E2567806C51FF720B7CFA8471FA104DB0564CD0C641364B0062F4
31,737,951 UART: [art] SIG.R = F6E5792C2A87D7E4369DBB790F522D2F541C755EDB4A0402B1E34E674A7807115AC02BD45B4E3C91EBFB6B2CEC11CA6D
31,745,358 UART: [art] SIG.S = 5177AC4FE30AD2C01462DD82D23D103BC9F20F67DBAB619D973EF00318C39A47F3ECF93D14AB1ECF2A9FF7BCFF22D621
33,051,038 UART: Caliptra RT
33,051,751 UART: [state] CFI Enabled
33,227,379 UART: [rt] RT listening for mailbox commands...
33,259,286 UART: [rt]cmd =0x44504543, len=96
39,029,389 >>> mbox cmd response data (6236 bytes)
41,132,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,961,602 >>> mbox cmd response: success
49,962,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,997,291 UART:
49,997,618 UART: Running Caliptra FMC ...
49,998,751 UART:
49,998,915 UART: [state] CFI Enabled
50,093,051 UART: [art] Extend RT PCRs Done
50,094,269 UART: [art] Lock RT PCRs Done
50,095,613 UART: [art] Populate DV Done
50,101,095 UART: [fht] FMC Alias Private Key: 7
50,102,691 UART: [art] Derive CDI
50,103,502 UART: [art] Store in slot 0x4
50,161,188 UART: [art] Derive Key Pair
50,162,222 UART: [art] Store priv key in slot 0x5
53,454,995 UART: [art] Derive Key Pair - Done
53,468,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,756,067 UART: [art] Erasing AUTHORITY.KEYID = 7
55,757,613 UART: [art] PUB.X = 92F535D53D8F1D22C248B632B8BA96CE64259762FC772D3DF266A28FFA94E9FDD156AC2A68E33F0F8ABCD99005460CC4
55,764,866 UART: [art] PUB.Y = C02C7292655BD8BAC35024A1DB246832670EA0C0803B836A5697028476173ADEFD2D83ACC8D0A9BE692828E0E0D18C52
55,772,064 UART: [art] SIG.R = 5CC11405025EDE7C94F37A0908260E5E435B51AAE2F09155EEB7B8A28C765B360868BEA218B49BF898AC1B85FC0DA704
55,779,475 UART: [art] SIG.S = E0886967C03B065DB61327988BCD806C2ECF093B44D987D247349389E13F5EF6E3C17C43C46B24556CD4D51018C45C32
57,084,054 UART: Caliptra RT
57,084,784 UART: [state] CFI Enabled
57,500,927 UART: [rt] RT listening for mailbox commands...
57,532,140 UART: [rt]cmd =0x494e464f, len=4
57,536,449 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,436 UART:
192,802 UART: Running Caliptra ROM ...
193,926 UART:
603,778 UART: [state] CFI Enabled
618,164 UART: [state] LifecycleState = Unprovisioned
620,114 UART: [state] DebugLocked = No
621,414 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,049 UART: [kat] SHA2-256
795,849 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,365 UART: [kat] ++
806,808 UART: [kat] sha1
817,532 UART: [kat] SHA2-256
820,268 UART: [kat] SHA2-384
826,716 UART: [kat] SHA2-512-ACC
829,082 UART: [kat] ECC-384
3,111,668 UART: [kat] HMAC-384Kdf
3,122,167 UART: [kat] LMS
4,312,290 UART: [kat] --
4,316,892 UART: [cold-reset] ++
4,319,532 UART: [fht] Storing FHT @ 0x50003400
4,330,997 UART: [idev] ++
4,331,554 UART: [idev] CDI.KEYID = 6
4,332,533 UART: [idev] SUBJECT.KEYID = 7
4,333,768 UART: [idev] UDS.KEYID = 0
4,334,865 ready_for_fw is high
4,335,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,090 UART: [idev] Erasing UDS.KEYID = 0
7,622,309 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,574 UART: [idev] --
7,647,241 UART: [ldev] ++
7,647,805 UART: [ldev] CDI.KEYID = 6
7,648,817 UART: [ldev] SUBJECT.KEYID = 5
7,649,989 UART: [ldev] AUTHORITY.KEYID = 7
7,651,271 UART: [ldev] FE.KEYID = 1
7,663,371 UART: [ldev] Erasing FE.KEYID = 1
10,952,305 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,843 UART: [ldev] --
13,313,847 UART: [fwproc] Waiting for Commands...
13,316,259 UART: [fwproc] Received command 0x46574c44
13,318,435 UART: [fwproc] Received Image of size 118548 bytes
17,425,729 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,505,374 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,576 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,893 >>> mbox cmd response: success
17,908,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,910,973 UART: [afmc] ++
17,911,554 UART: [afmc] CDI.KEYID = 6
17,912,461 UART: [afmc] SUBJECT.KEYID = 7
17,913,723 UART: [afmc] AUTHORITY.KEYID = 5
21,229,595 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,046 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,527,359 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,776 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,556,488 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,907 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,592,772 UART: [afmc] --
23,596,626 UART: [cold-reset] --
23,602,700 UART: [state] Locking Datavault
23,609,613 UART: [state] Locking PCR0, PCR1 and PCR31
23,611,356 UART: [state] Locking ICCM
23,612,441 UART: [exit] Launching FMC @ 0x40000130
23,620,838 UART:
23,621,119 UART: Running Caliptra FMC ...
23,622,225 UART:
23,622,387 UART: [state] CFI Enabled
23,630,379 UART: [fht] FMC Alias Private Key: 7
25,970,434 UART: [art] Extend RT PCRs Done
25,971,664 UART: [art] Lock RT PCRs Done
25,973,291 UART: [art] Populate DV Done
25,978,693 UART: [fht] FMC Alias Private Key: 7
25,980,386 UART: [art] Derive CDI
25,981,116 UART: [art] Store in slot 0x4
26,023,598 UART: [art] Derive Key Pair
26,024,636 UART: [art] Store priv key in slot 0x5
29,266,442 UART: [art] Derive Key Pair - Done
29,279,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,867 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,371 UART: [art] PUB.X = 1D242D92689534532CB50DA3D5AED2E5FF64C55DE1F1FD74569016508667B5859D98540B2F37709884A20904D567A47E
31,568,627 UART: [art] PUB.Y = 36EC76C9F244D2F90A39AAEBF617E0129A73A940986BA704BA94AA1FF189B9DBEB384BDF12A49B53A865ACB139987B2C
31,575,914 UART: [art] SIG.R = B586BA991CA5DA6E6AA6FEE7454CCB314163CD6AA5F6F6B9AE97A1C6C470D93DF0A4A9E6F359608306CE8A08784EFC23
31,583,298 UART: [art] SIG.S = 0787978C2D6C2CC11165AEB4ED174462FB17CA43CA64AA9D43A2645D0425A5CEE1D2CF4BBC221CC9669D5F4DF91BD6E3
32,888,966 UART: Caliptra RT
32,889,676 UART: [state] CFI Enabled
33,023,275 UART: [rt] RT listening for mailbox commands...
33,055,287 UART: [rt]cmd =0x44504543, len=96
38,729,093 >>> mbox cmd response data (6236 bytes)
40,831,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,982,666 UART:
40,983,044 UART: Running Caliptra ROM ...
40,984,176 UART:
40,984,347 UART: [state] CFI Enabled
40,998,069 UART: [state] LifecycleState = Unprovisioned
40,999,951 UART: [state] DebugLocked = No
41,001,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
41,005,740 UART: [kat] SHA2-256
41,175,415 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,185,945 UART: [kat] ++
41,186,541 UART: [kat] sha1
41,198,345 UART: [kat] SHA2-256
41,201,026 UART: [kat] SHA2-384
41,207,171 UART: [kat] SHA2-512-ACC
41,209,510 UART: [kat] ECC-384
43,492,263 UART: [kat] HMAC-384Kdf
43,502,883 UART: [kat] LMS
44,692,951 UART: [kat] --
44,697,266 UART: [update-reset] ++
48,889,217 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,892,832 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,290,593 >>> mbox cmd response: success
49,290,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,291,829 UART: [update-reset] Copying MAN_2 To MAN_1
49,314,206 UART: [update-reset Success] --
49,317,989 UART: [state] Locking Datavault
49,321,721 UART: [state] Locking PCR0, PCR1 and PCR31
49,323,471 UART: [state] Locking ICCM
49,325,996 UART: [exit] Launching FMC @ 0x40000130
49,334,388 UART:
49,334,626 UART: Running Caliptra FMC ...
49,335,673 UART:
49,335,842 UART: [state] CFI Enabled
49,380,403 UART: [art] Extend RT PCRs Done
49,381,608 UART: [art] Lock RT PCRs Done
49,383,279 UART: [art] Populate DV Done
49,388,898 UART: [fht] FMC Alias Private Key: 7
49,390,590 UART: [art] Derive CDI
49,391,459 UART: [art] Store in slot 0x4
49,434,138 UART: [art] Derive Key Pair
49,435,129 UART: [art] Store priv key in slot 0x5
52,676,619 UART: [art] Derive Key Pair - Done
52,689,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,969,828 UART: [art] Erasing AUTHORITY.KEYID = 7
54,971,331 UART: [art] PUB.X = C030604DB0A4CCB1E5FB192FA6EB534D2626221B2CE0CF5DF7F6358BAA152F9B3FF6D22BAADA9A12CC0932379C82206C
54,978,633 UART: [art] PUB.Y = A75C97CDFFACB9CA7B020712DE1EA19191E5F15105350B06C96C1D01E09647A338220DDB8F0A4419101E13E6CDE4347A
54,985,900 UART: [art] SIG.R = 496D97CFF1B56EFF4B1B6DDE7D604D2253693B2886B6E555C36BEFA3AA5D24A1D3875EAF09C4CA6BC1AA06BF602DD619
54,993,369 UART: [art] SIG.S = BFBAAD1290A6551E50ECB012EB6ABB1E46B04F1AD89E3F14468321DD80667D2782AF6783248D58E592D90EA1B8DD8B5A
56,298,905 UART: Caliptra RT
56,299,615 UART: [state] CFI Enabled
56,677,286 UART: [rt] RT listening for mailbox commands...
56,708,592 UART: [rt]cmd =0x494e464f, len=4
56,712,753 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
4,129,501 ready_for_fw is high
4,130,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,081 >>> mbox cmd response: success
18,162,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,800,306 UART:
23,800,693 UART: Running Caliptra FMC ...
23,801,837 UART:
23,801,988 UART: [state] CFI Enabled
23,810,047 UART: [fht] FMC Alias Private Key: 7
26,149,931 UART: [art] Extend RT PCRs Done
26,151,153 UART: [art] Lock RT PCRs Done
26,152,861 UART: [art] Populate DV Done
26,158,153 UART: [fht] FMC Alias Private Key: 7
26,159,637 UART: [art] Derive CDI
26,160,404 UART: [art] Store in slot 0x4
26,203,427 UART: [art] Derive Key Pair
26,204,426 UART: [art] Store priv key in slot 0x5
29,446,897 UART: [art] Derive Key Pair - Done
29,459,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,048 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,569 UART: [art] PUB.X = 1CC7ACE3ECF18931CC2634C729D33B6D0554E3422F5451767470F50886B6B01A071652BE05F7BF7272031B53633EE494
31,748,813 UART: [art] PUB.Y = 4BE290B82F0A4D06CF53C64EE60028676BA8DA2362AEA5B8F07DC98895DE51EB0017A3FD4A613060BAF5965E7137E53F
31,756,036 UART: [art] SIG.R = 5150E751F26BF96A6DC88193C3153AE69B0A60F4419A64D6E6CBA4B6E81232C2AF020A55BD722F36276440E4CF074AF9
31,763,386 UART: [art] SIG.S = A3E91C192B9860CEE4896A3A748BE5753923EDE19277A9665E49EEE041AEC2553A9DD867589DD6AFBD370532082008C5
33,068,587 UART: Caliptra RT
33,069,341 UART: [state] CFI Enabled
33,202,311 UART: [rt] RT listening for mailbox commands...
33,234,590 UART: [rt]cmd =0x44504543, len=96
38,909,046 >>> mbox cmd response data (6236 bytes)
41,010,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,767,008 >>> mbox cmd response: success
49,767,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,802,320 UART:
49,802,604 UART: Running Caliptra FMC ...
49,803,715 UART:
49,803,866 UART: [state] CFI Enabled
49,848,116 UART: [art] Extend RT PCRs Done
49,849,300 UART: [art] Lock RT PCRs Done
49,850,664 UART: [art] Populate DV Done
49,856,182 UART: [fht] FMC Alias Private Key: 7
49,857,881 UART: [art] Derive CDI
49,858,691 UART: [art] Store in slot 0x4
49,901,177 UART: [art] Derive Key Pair
49,902,172 UART: [art] Store priv key in slot 0x5
53,144,404 UART: [art] Derive Key Pair - Done
53,157,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,438,208 UART: [art] Erasing AUTHORITY.KEYID = 7
55,439,718 UART: [art] PUB.X = 7072987E9F0BD89C298E0673BD7F683B4712F0624F23F02CB9BD9E0B2CEB6966245CF1BB2C50F6A6B5B5FC45FF7F5D42
55,447,017 UART: [art] PUB.Y = B8AE9DA536466E5C323899A81A4F1B7602223D620AD38290A8EF5CB664E8D24761A47028C8867CE9C895A9C1BC2BCF5F
55,454,247 UART: [art] SIG.R = 56AE406A69DB442B9231822A98AD297488AE160010DC2CB436241D71EA830BABB8F0B29BC749202A30A4E6170E889267
55,461,631 UART: [art] SIG.S = C071FAEB4BDA1A6C6AD6AC71C85631F99CE9C07C702FBC098D8CD52C03098C94098B7FBF4335C2CB417692251275D07D
56,767,328 UART: Caliptra RT
56,768,072 UART: [state] CFI Enabled
57,140,836 UART: [rt] RT listening for mailbox commands...
57,171,869 UART: [rt]cmd =0x494e464f, len=4
57,176,193 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,116 UART:
192,471 UART: Running Caliptra ROM ...
193,584 UART:
193,728 UART: [state] CFI Enabled
264,507 UART: [state] LifecycleState = Unprovisioned
266,523 UART: [state] DebugLocked = No
268,612 UART: [state] WD Timer not started. Device not locked for debugging
272,074 UART: [kat] SHA2-256
451,685 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,489 UART: [kat] ++
462,935 UART: [kat] sha1
475,084 UART: [kat] SHA2-256
477,813 UART: [kat] SHA2-384
483,939 UART: [kat] SHA2-512-ACC
486,300 UART: [kat] ECC-384
2,946,683 UART: [kat] HMAC-384Kdf
2,972,636 UART: [kat] LMS
3,449,117 UART: [kat] --
3,455,731 UART: [cold-reset] ++
3,456,731 UART: [fht] FHT @ 0x50003400
3,468,042 UART: [idev] ++
3,468,639 UART: [idev] CDI.KEYID = 6
3,469,555 UART: [idev] SUBJECT.KEYID = 7
3,470,801 UART: [idev] UDS.KEYID = 0
3,471,723 ready_for_fw is high
3,471,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,985 UART: [idev] Erasing UDS.KEYID = 0
5,986,917 UART: [idev] Sha1 KeyId Algorithm
6,010,413 UART: [idev] --
6,015,214 UART: [ldev] ++
6,015,779 UART: [ldev] CDI.KEYID = 6
6,016,739 UART: [ldev] SUBJECT.KEYID = 5
6,017,952 UART: [ldev] AUTHORITY.KEYID = 7
6,019,350 UART: [ldev] FE.KEYID = 1
6,059,331 UART: [ldev] Erasing FE.KEYID = 1
8,565,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,688 UART: [ldev] --
10,376,161 UART: [fwproc] Wait for Commands...
10,379,225 UART: [fwproc] Recv command 0x46574c44
10,381,202 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,811 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,829 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,689 >>> mbox cmd response: success
14,345,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,349,353 UART: [afmc] ++
14,349,940 UART: [afmc] CDI.KEYID = 6
14,350,847 UART: [afmc] SUBJECT.KEYID = 7
14,352,062 UART: [afmc] AUTHORITY.KEYID = 5
16,896,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,641,217 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,643,448 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,659,266 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,675,311 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,690,864 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,716,062 UART: [afmc] --
18,719,822 UART: [cold-reset] --
18,724,710 UART: [state] Locking Datavault
18,730,708 UART: [state] Locking PCR0, PCR1 and PCR31
18,732,406 UART: [state] Locking ICCM
18,734,259 UART: [exit] Launching FMC @ 0x40000130
18,742,650 UART:
18,742,931 UART: Running Caliptra FMC ...
18,744,043 UART:
18,744,205 UART: [state] CFI Enabled
18,799,256 UART: [fht] FMC Alias Private Key: 7
20,565,785 UART: [art] Extend RT PCRs Done
20,567,006 UART: [art] Lock RT PCRs Done
20,568,685 UART: [art] Populate DV Done
20,574,095 UART: [fht] FMC Alias Private Key: 7
20,575,579 UART: [art] Derive CDI
20,576,336 UART: [art] Store in slot 0x4
20,632,007 UART: [art] Derive Key Pair
20,633,060 UART: [art] Store priv key in slot 0x5
23,096,002 UART: [art] Derive Key Pair - Done
23,109,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,822,360 UART: [art] Erasing AUTHORITY.KEYID = 7
24,823,867 UART: [art] PUB.X = C21EB3C0FEB0D1AC33EF2A122126CDFD3390DE6DD31C40252ACAE26076950BE6943957ECE925077D44181F2536D4A794
24,831,116 UART: [art] PUB.Y = 4C2F102475C9C5BB115187EC293A2D8BFB2F08F52E233DF05F00C6498C332E48462C011981162A5564A717098559BA94
24,838,353 UART: [art] SIG.R = 75E8BE54CC36554BFAB9CB511B5FBD84D9634864A851EEFF7D90AD07DAA628F4ABC086F25284FAB728C4146977DC8380
24,845,747 UART: [art] SIG.S = 8F120DEED5EA723B71C388EBF2A1144C5127F30A6A0FAA8A8E5358B64920B692799E28A157E29F70CB926E7515DAD542
25,824,955 UART: Caliptra RT
25,825,666 UART: [state] CFI Enabled
26,005,192 UART: [rt] RT listening for mailbox commands...
26,037,367 UART: [rt]cmd =0x44504543, len=96
30,403,815 >>> mbox cmd response data (6236 bytes)
32,489,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,640,064 UART:
32,640,446 UART: Running Caliptra ROM ...
32,641,488 UART:
32,641,642 UART: [state] CFI Enabled
32,713,622 UART: [state] LifecycleState = Unprovisioned
32,715,555 UART: [state] DebugLocked = No
32,717,206 UART: [state] WD Timer not started. Device not locked for debugging
32,721,542 UART: [kat] SHA2-256
32,901,193 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,912,018 UART: [kat] ++
32,912,477 UART: [kat] sha1
32,923,088 UART: [kat] SHA2-256
32,925,786 UART: [kat] SHA2-384
32,930,363 UART: [kat] SHA2-512-ACC
32,932,703 UART: [kat] ECC-384
35,376,373 UART: [kat] HMAC-384Kdf
35,399,896 UART: [kat] LMS
35,876,303 UART: [kat] --
35,882,666 UART: [update-reset] ++
39,383,977 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,387,199 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,784,824 >>> mbox cmd response: success
39,785,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,785,516 UART: [update-reset] Copying MAN_2 To MAN_1
39,822,362 UART: [update-reset Success] --
39,825,575 UART: [state] Locking Datavault
39,828,902 UART: [state] Locking PCR0, PCR1 and PCR31
39,830,664 UART: [state] Locking ICCM
39,833,272 UART: [exit] Launching FMC @ 0x40000130
39,841,663 UART:
39,841,901 UART: Running Caliptra FMC ...
39,842,951 UART:
39,843,103 UART: [state] CFI Enabled
39,937,028 UART: [art] Extend RT PCRs Done
39,938,212 UART: [art] Lock RT PCRs Done
39,939,431 UART: [art] Populate DV Done
39,944,845 UART: [fht] FMC Alias Private Key: 7
39,946,397 UART: [art] Derive CDI
39,947,180 UART: [art] Store in slot 0x4
40,006,186 UART: [art] Derive Key Pair
40,007,187 UART: [art] Store priv key in slot 0x5
42,470,017 UART: [art] Derive Key Pair - Done
42,483,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,195,501 UART: [art] Erasing AUTHORITY.KEYID = 7
44,197,015 UART: [art] PUB.X = CF53A89CA70DEF3D826A5B5E2D5D1208D41A97CDE5FD41D496F1430E4A4D56ACB01928D598E58F09E6967EF9887D856B
44,204,276 UART: [art] PUB.Y = 2ECB24AB49A39ECCEDD7F2FC71F0BC21A02F80D73EDD44F5DB80FFFB69E83BEC3021F56586FE3F23FE014CB16E41C2FD
44,211,614 UART: [art] SIG.R = 697314A4CAF402EF457C6BC655285B214BBA494CAD4B54BE61240FC75E9255BBDED2F849DEF7CC950438B2C651D87B54
44,219,003 UART: [art] SIG.S = C86600B9968D2781A4DEE3E70976EE1CB73B5300A8155F5035812FD291710CAE579971D52AB0F486C9E1B270932B0F80
45,197,370 UART: Caliptra RT
45,198,080 UART: [state] CFI Enabled
45,620,187 UART: [rt] RT listening for mailbox commands...
45,651,113 UART: [rt]cmd =0x494e464f, len=4
45,655,441 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,452,868 ready_for_fw is high
3,453,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,223,040 >>> mbox cmd response: success
14,224,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,509,653 UART:
18,510,034 UART: Running Caliptra FMC ...
18,511,233 UART:
18,511,394 UART: [state] CFI Enabled
18,576,965 UART: [fht] FMC Alias Private Key: 7
20,343,198 UART: [art] Extend RT PCRs Done
20,344,422 UART: [art] Lock RT PCRs Done
20,346,153 UART: [art] Populate DV Done
20,351,465 UART: [fht] FMC Alias Private Key: 7
20,353,059 UART: [art] Derive CDI
20,353,876 UART: [art] Store in slot 0x4
20,410,351 UART: [art] Derive Key Pair
20,411,398 UART: [art] Store priv key in slot 0x5
22,873,920 UART: [art] Derive Key Pair - Done
22,887,022 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,600,087 UART: [art] Erasing AUTHORITY.KEYID = 7
24,601,777 UART: [art] PUB.X = 1C827985AC591314F8983E01587288EDC28569DD062544721BD4E14D4CFE611BE2AAAAD5D9067D9E3555B859667F6CD8
24,608,900 UART: [art] PUB.Y = C7F1A1EAFB24D740B8CE422245E5A924DFBE2E721B5E7C96FE504AEF515729A9FC275B940909241D5FFDAC36660D98FA
24,616,151 UART: [art] SIG.R = F8D4FA5B30CED716C010D49D874EFF1B07F8AA08C8D00D34E05AF2B0B3ACFF9BBCA6FF3215F787239F0681ABCA274B45
24,623,551 UART: [art] SIG.S = D6C0BB6E26777C852EFFE56D569C0F9DA3F9897143025C256401E9B7736AA3E54C3E1FA3962BC69F5C0836E04BF7AD3A
25,602,100 UART: Caliptra RT
25,602,817 UART: [state] CFI Enabled
25,784,011 UART: [rt] RT listening for mailbox commands...
25,816,231 UART: [rt]cmd =0x44504543, len=96
30,181,743 >>> mbox cmd response data (6236 bytes)
32,271,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,583,196 >>> mbox cmd response: success
39,583,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,617,033 UART:
39,617,321 UART: Running Caliptra FMC ...
39,618,437 UART:
39,618,596 UART: [state] CFI Enabled
39,710,418 UART: [art] Extend RT PCRs Done
39,711,597 UART: [art] Lock RT PCRs Done
39,713,065 UART: [art] Populate DV Done
39,718,651 UART: [fht] FMC Alias Private Key: 7
39,720,129 UART: [art] Derive CDI
39,720,858 UART: [art] Store in slot 0x4
39,779,852 UART: [art] Derive Key Pair
39,780,874 UART: [art] Store priv key in slot 0x5
42,244,156 UART: [art] Derive Key Pair - Done
42,256,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,969,514 UART: [art] Erasing AUTHORITY.KEYID = 7
43,971,034 UART: [art] PUB.X = 1CA132CFCF35A5260C91DEA9CBEE5CE240BF668B2133DEF70932EFC778C4985C385406F301755EAC3D13D5565FED70C0
43,978,317 UART: [art] PUB.Y = A60E0D79ABFAA1DB4A7BBBD9137FB19C80C1EFF19D59F89CB690DA3904990D33576A22D2D65899C4018BC86B56F87230
43,985,553 UART: [art] SIG.R = 62D5405603B499DC6F37AD65E911A2710BFA95C37E497DFFFDBEF6F9146869C2728C916D329D192FAB65581EA3C539C2
43,992,945 UART: [art] SIG.S = F0C5DAAAD172F107623ABF2BBBF11489515387A796678FDB53797524166F442F8F4BED4D7279154968DFDABBA3CA4FAB
44,971,767 UART: Caliptra RT
44,972,481 UART: [state] CFI Enabled
45,393,500 UART: [rt] RT listening for mailbox commands...
45,424,482 UART: [rt]cmd =0x494e464f, len=4
45,428,960 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,449 UART:
192,815 UART: Running Caliptra ROM ...
194,019 UART:
603,548 UART: [state] CFI Enabled
618,948 UART: [state] LifecycleState = Unprovisioned
620,833 UART: [state] DebugLocked = No
623,273 UART: [state] WD Timer not started. Device not locked for debugging
626,524 UART: [kat] SHA2-256
806,204 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,000 UART: [kat] ++
817,455 UART: [kat] sha1
827,975 UART: [kat] SHA2-256
830,702 UART: [kat] SHA2-384
836,055 UART: [kat] SHA2-512-ACC
838,424 UART: [kat] ECC-384
3,280,957 UART: [kat] HMAC-384Kdf
3,294,170 UART: [kat] LMS
3,770,640 UART: [kat] --
3,775,064 UART: [cold-reset] ++
3,776,646 UART: [fht] FHT @ 0x50003400
3,789,044 UART: [idev] ++
3,789,619 UART: [idev] CDI.KEYID = 6
3,790,650 UART: [idev] SUBJECT.KEYID = 7
3,791,822 UART: [idev] UDS.KEYID = 0
3,792,873 ready_for_fw is high
3,793,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,046 UART: [idev] Erasing UDS.KEYID = 0
6,267,875 UART: [idev] Sha1 KeyId Algorithm
6,292,612 UART: [idev] --
6,295,906 UART: [ldev] ++
6,296,473 UART: [ldev] CDI.KEYID = 6
6,297,399 UART: [ldev] SUBJECT.KEYID = 5
6,298,634 UART: [ldev] AUTHORITY.KEYID = 7
6,299,870 UART: [ldev] FE.KEYID = 1
6,310,518 UART: [ldev] Erasing FE.KEYID = 1
8,788,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,940 UART: [ldev] --
10,584,750 UART: [fwproc] Wait for Commands...
10,586,361 UART: [fwproc] Recv command 0x46574c44
10,588,403 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,140,483 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,213,485 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,541,557 >>> mbox cmd response: success
14,542,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,545,315 UART: [afmc] ++
14,545,898 UART: [afmc] CDI.KEYID = 6
14,546,918 UART: [afmc] SUBJECT.KEYID = 7
14,548,078 UART: [afmc] AUTHORITY.KEYID = 5
17,055,651 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,020 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,839 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,952 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,491 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,685 UART: [afmc] --
18,856,359 UART: [cold-reset] --
18,860,219 UART: [state] Locking Datavault
18,864,391 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,147 UART: [state] Locking ICCM
18,867,345 UART: [exit] Launching FMC @ 0x40000130
18,875,757 UART:
18,875,996 UART: Running Caliptra FMC ...
18,877,105 UART:
18,877,272 UART: [state] CFI Enabled
18,884,842 UART: [fht] FMC Alias Private Key: 7
20,651,153 UART: [art] Extend RT PCRs Done
20,652,377 UART: [art] Lock RT PCRs Done
20,654,206 UART: [art] Populate DV Done
20,659,721 UART: [fht] FMC Alias Private Key: 7
20,661,363 UART: [art] Derive CDI
20,662,102 UART: [art] Store in slot 0x4
20,704,862 UART: [art] Derive Key Pair
20,705,863 UART: [art] Store priv key in slot 0x5
23,132,680 UART: [art] Derive Key Pair - Done
23,145,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,851,730 UART: [art] Erasing AUTHORITY.KEYID = 7
24,853,228 UART: [art] PUB.X = 0D3D74D7D179F74399C94BC1FB933E88144FE1393721E2AA189D873DBA48A1543F7C2A4C0776B1DE01E3DBAE538B56CF
24,860,471 UART: [art] PUB.Y = EBBB6CE5E47CCF59245CB40754C104E3F354ECCC9E211651336FAF09DA0B3CC6486EB99922F72078CE81E15F71E8BF4A
24,867,753 UART: [art] SIG.R = D559F2A8E7868A7B4E013B3FC275EF9598E581875B7942F56A850867CDA17E8952764CE8DB6D9E4B4DF25A247805261B
24,875,136 UART: [art] SIG.S = E5EA5F893E80209371F9A45A8E3FA954663A742950E468EA3DAA2279495046892A49AC4D8D0AD1254280ADA9F2297AD5
25,854,609 UART: Caliptra RT
25,855,316 UART: [state] CFI Enabled
25,987,931 UART: [rt] RT listening for mailbox commands...
26,020,065 UART: [rt]cmd =0x44504543, len=96
30,305,340 >>> mbox cmd response data (6236 bytes)
32,391,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,542,644 UART:
32,543,077 UART: Running Caliptra ROM ...
32,544,132 UART:
32,544,294 UART: [state] CFI Enabled
32,559,000 UART: [state] LifecycleState = Unprovisioned
32,560,908 UART: [state] DebugLocked = No
32,562,290 UART: [state] WD Timer not started. Device not locked for debugging
32,566,416 UART: [kat] SHA2-256
32,746,123 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,756,922 UART: [kat] ++
32,757,464 UART: [kat] sha1
32,767,926 UART: [kat] SHA2-256
32,770,620 UART: [kat] SHA2-384
32,776,660 UART: [kat] SHA2-512-ACC
32,779,012 UART: [kat] ECC-384
35,221,513 UART: [kat] HMAC-384Kdf
35,234,835 UART: [kat] LMS
35,711,322 UART: [kat] --
35,715,042 UART: [update-reset] ++
39,210,615 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,214,435 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,612,023 >>> mbox cmd response: success
39,612,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,613,215 UART: [update-reset] Copying MAN_2 To MAN_1
39,650,338 UART: [update-reset Success] --
39,653,545 UART: [state] Locking Datavault
39,657,336 UART: [state] Locking PCR0, PCR1 and PCR31
39,659,090 UART: [state] Locking ICCM
39,660,982 UART: [exit] Launching FMC @ 0x40000130
39,669,329 UART:
39,669,569 UART: Running Caliptra FMC ...
39,670,677 UART:
39,670,837 UART: [state] CFI Enabled
39,714,503 UART: [art] Extend RT PCRs Done
39,715,692 UART: [art] Lock RT PCRs Done
39,717,525 UART: [art] Populate DV Done
39,722,991 UART: [fht] FMC Alias Private Key: 7
39,724,581 UART: [art] Derive CDI
39,725,395 UART: [art] Store in slot 0x4
39,768,411 UART: [art] Derive Key Pair
39,769,465 UART: [art] Store priv key in slot 0x5
42,196,447 UART: [art] Derive Key Pair - Done
42,209,448 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,915,612 UART: [art] Erasing AUTHORITY.KEYID = 7
43,917,113 UART: [art] PUB.X = C69ABA339457AF04B7090D8DCD6E72201FE54E3DEC3E3415C04715DE5F622AED9CA03D41F20E18293C2C82283E525478
43,924,418 UART: [art] PUB.Y = 1A71825808E7AE36FE700340210155570F43C198AA28B246FB4D26E8679AA70ECF994C9C90C8D003D2AAE9AF18B71FC4
43,931,666 UART: [art] SIG.R = 0A635496C7AAFC024E8ABB6328280C4EE658B3E28ABD88D05D2958CFE5FAEFF47402E8D4044E1DE75554A39DB27AEFB8
43,939,063 UART: [art] SIG.S = BFE6E8E600610C1A37DC5E8692764E89C2E04849556F9AB3736049ECB5B32C89D0A8DC29C115D79D63FBF98E1A4785D6
44,918,332 UART: Caliptra RT
44,919,062 UART: [state] CFI Enabled
45,291,635 UART: [rt] RT listening for mailbox commands...
45,322,458 UART: [rt]cmd =0x494e464f, len=4
45,326,896 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,777,189 ready_for_fw is high
3,777,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,441,818 >>> mbox cmd response: success
14,443,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,694,786 UART:
18,695,176 UART: Running Caliptra FMC ...
18,696,315 UART:
18,696,472 UART: [state] CFI Enabled
18,704,359 UART: [fht] FMC Alias Private Key: 7
20,470,626 UART: [art] Extend RT PCRs Done
20,471,852 UART: [art] Lock RT PCRs Done
20,473,875 UART: [art] Populate DV Done
20,479,360 UART: [fht] FMC Alias Private Key: 7
20,480,937 UART: [art] Derive CDI
20,481,709 UART: [art] Store in slot 0x4
20,524,685 UART: [art] Derive Key Pair
20,525,690 UART: [art] Store priv key in slot 0x5
22,952,590 UART: [art] Derive Key Pair - Done
22,965,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,299 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,800 UART: [art] PUB.X = 27BF8844740357C79201F44D2D0FC838E532915985A4B395C03E2C613B5561A3D02AF18B82430AB50F54923897BD5A38
24,681,060 UART: [art] PUB.Y = 70800D90429881FA5E1E32CACFC51F2C8C8483A03934C34EB305D27C63BCD9D23BDA4CFBB47666613A0121648C3DD6AA
24,688,275 UART: [art] SIG.R = 3B4C5EE4901856A25967C55024B0621049FDF46D43CD548632467D101E3115613F009D4812D31358FAE9B907205FAEA0
24,695,623 UART: [art] SIG.S = 5FB1485E90FAD3A535B6082AF880352A481A8758C43B4AF209A534A43EC1F9EFD857DEF913C28CBC03B09BEEBF15DDE4
25,674,744 UART: Caliptra RT
25,675,450 UART: [state] CFI Enabled
25,806,947 UART: [rt] RT listening for mailbox commands...
25,839,082 UART: [rt]cmd =0x44504543, len=96
30,124,074 >>> mbox cmd response data (6236 bytes)
32,213,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,442,785 >>> mbox cmd response: success
39,443,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,477,297 UART:
39,477,580 UART: Running Caliptra FMC ...
39,478,617 UART:
39,478,767 UART: [state] CFI Enabled
39,522,961 UART: [art] Extend RT PCRs Done
39,524,151 UART: [art] Lock RT PCRs Done
39,525,624 UART: [art] Populate DV Done
39,531,167 UART: [fht] FMC Alias Private Key: 7
39,532,762 UART: [art] Derive CDI
39,533,498 UART: [art] Store in slot 0x4
39,576,303 UART: [art] Derive Key Pair
39,577,310 UART: [art] Store priv key in slot 0x5
42,004,277 UART: [art] Derive Key Pair - Done
42,016,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,723,182 UART: [art] Erasing AUTHORITY.KEYID = 7
43,724,689 UART: [art] PUB.X = 5972118C268701515DF1F779E53CA29D3B8AD7485FD6F63C8B685A5FC26CCE6D13CEF8C244D6FD9C2DA6AB0B4C9CA0AE
43,731,999 UART: [art] PUB.Y = 3FB6AD898A365C8366456326393DD86BE3C53BA4F7940A79286D3800F105CBCD876B45AE28A976E482C94503B9ED592E
43,739,248 UART: [art] SIG.R = 37743940106005EC1C93D9932121B03A12B77CE1240B1443A3143619BCBD53E70024D0099242DD7D3BED30FC842435FB
43,746,587 UART: [art] SIG.S = 6ED2DC28D060AA0DE55C3CEDE16000CB879200436595481493091BA9FE0FA99CB557B8055CBC7C015EE6BBCB57FA5117
44,725,674 UART: Caliptra RT
44,726,363 UART: [state] CFI Enabled
45,097,133 UART: [rt] RT listening for mailbox commands...
45,128,032 UART: [rt]cmd =0x494e464f, len=4
45,132,154 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,220 UART:
192,568 UART: Running Caliptra ROM ...
193,742 UART:
193,894 UART: [state] CFI Enabled
261,724 UART: [state] LifecycleState = Unprovisioned
264,074 UART: [state] DebugLocked = No
265,964 UART: [state] WD Timer not started. Device not locked for debugging
270,493 UART: [kat] SHA2-256
460,384 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,124 UART: [kat] ++
471,601 UART: [kat] sha1
482,191 UART: [kat] SHA2-256
485,194 UART: [kat] SHA2-384
491,117 UART: [kat] SHA2-512-ACC
493,695 UART: [kat] ECC-384
2,952,236 UART: [kat] HMAC-384Kdf
2,976,991 UART: [kat] LMS
3,508,799 UART: [kat] --
3,514,646 UART: [cold-reset] ++
3,516,499 UART: [fht] FHT @ 0x50003400
3,529,602 UART: [idev] ++
3,530,241 UART: [idev] CDI.KEYID = 6
3,531,276 UART: [idev] SUBJECT.KEYID = 7
3,532,449 UART: [idev] UDS.KEYID = 0
3,533,392 ready_for_fw is high
3,533,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,682,795 UART: [idev] Erasing UDS.KEYID = 0
6,054,038 UART: [idev] Sha1 KeyId Algorithm
6,077,838 UART: [idev] --
6,082,307 UART: [ldev] ++
6,082,998 UART: [ldev] CDI.KEYID = 6
6,083,921 UART: [ldev] SUBJECT.KEYID = 5
6,085,078 UART: [ldev] AUTHORITY.KEYID = 7
6,086,311 UART: [ldev] FE.KEYID = 1
6,126,013 UART: [ldev] Erasing FE.KEYID = 1
8,632,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,368,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,383,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,399,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,414,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,435,620 UART: [ldev] --
10,441,957 UART: [fwproc] Wait for Commands...
10,443,955 UART: [fwproc] Recv command 0x46574c44
10,446,217 UART: [fwproc] Recv'd Img size: 118548 bytes
13,946,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,027,139 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,150,762 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,710,804 >>> mbox cmd response: success
14,711,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,715,365 UART: [afmc] ++
14,716,066 UART: [afmc] CDI.KEYID = 6
14,717,171 UART: [afmc] SUBJECT.KEYID = 7
14,718,707 UART: [afmc] AUTHORITY.KEYID = 5
17,259,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,984,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,986,820 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,001,928 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,017,074 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,032,019 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,055,823 UART: [afmc] --
19,059,900 UART: [cold-reset] --
19,063,980 UART: [state] Locking Datavault
19,070,474 UART: [state] Locking PCR0, PCR1 and PCR31
19,072,663 UART: [state] Locking ICCM
19,074,009 UART: [exit] Launching FMC @ 0x40000130
19,082,691 UART:
19,082,923 UART: Running Caliptra FMC ...
19,083,949 UART:
19,084,096 UART: [state] CFI Enabled
19,139,350 UART: [fht] FMC Alias Private Key: 7
20,906,319 UART: [art] Extend RT PCRs Done
20,907,523 UART: [art] Lock RT PCRs Done
20,909,165 UART: [art] Populate DV Done
20,914,516 UART: [fht] FMC Alias Private Key: 7
20,916,015 UART: [art] Derive CDI
20,916,751 UART: [art] Store in slot 0x4
20,971,870 UART: [art] Derive Key Pair
20,972,912 UART: [art] Store priv key in slot 0x5
23,435,569 UART: [art] Derive Key Pair - Done
23,448,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,161,276 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,767 UART: [art] PUB.X = 4E354BB020B8CE1E8FCC848FDED8E4D962F28643BF26C26D83805E06C916A4BD44577541267A88772B88E21DFA987FB3
25,170,027 UART: [art] PUB.Y = 6E3E5C8F6D070C4E92187A1A882A4E4722AB7AA70E0A9541D61B379B62C66C9521664693E1BD1F84F7765EDFED3B1811
25,177,280 UART: [art] SIG.R = 501246990677B458446FB8A121FAF039DF8646B4EF8986BC72563B081F468047AB66327A4CD511E9B224BBC143A7BEC8
25,184,689 UART: [art] SIG.S = F0EBA64A05FF665D378D98526E4EFB7A151823A7E04B064BDAC52D1A25356F85E8AE760BC2865931909AFEBD3C5A2219
26,164,059 UART: Caliptra RT
26,164,758 UART: [state] CFI Enabled
26,344,156 UART: [rt] RT listening for mailbox commands...
26,376,000 UART: [rt]cmd =0x44504543, len=96
30,740,550 >>> mbox cmd response data (6236 bytes)
32,835,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,985,614 UART:
32,986,061 UART: Running Caliptra ROM ...
32,987,152 UART:
32,987,314 UART: [state] CFI Enabled
33,051,401 UART: [state] LifecycleState = Unprovisioned
33,053,455 UART: [state] DebugLocked = No
33,055,758 UART: [state] WD Timer not started. Device not locked for debugging
33,059,430 UART: [kat] SHA2-256
33,249,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,260,061 UART: [kat] ++
33,260,628 UART: [kat] sha1
33,272,338 UART: [kat] SHA2-256
33,275,345 UART: [kat] SHA2-384
33,281,876 UART: [kat] SHA2-512-ACC
33,284,491 UART: [kat] ECC-384
35,733,360 UART: [kat] HMAC-384Kdf
35,757,307 UART: [kat] LMS
36,288,907 UART: [kat] --
36,291,384 UART: [update-reset] ++
39,811,730 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,815,267 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,445,017 >>> mbox cmd response: success
40,445,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,445,687 UART: [update-reset] Copying MAN_2 To MAN_1
40,483,253 UART: [update-reset Success] --
40,487,513 UART: [state] Locking Datavault
40,489,595 UART: [state] Locking PCR0, PCR1 and PCR31
40,491,732 UART: [state] Locking ICCM
40,493,934 UART: [exit] Launching FMC @ 0x40000130
40,502,600 UART:
40,502,844 UART: Running Caliptra FMC ...
40,503,951 UART:
40,504,111 UART: [state] CFI Enabled
40,609,418 UART: [art] Extend RT PCRs Done
40,610,599 UART: [art] Lock RT PCRs Done
40,612,104 UART: [art] Populate DV Done
40,617,509 UART: [fht] FMC Alias Private Key: 7
40,619,041 UART: [art] Derive CDI
40,619,855 UART: [art] Store in slot 0x4
40,678,378 UART: [art] Derive Key Pair
40,679,415 UART: [art] Store priv key in slot 0x5
43,142,020 UART: [art] Derive Key Pair - Done
43,154,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,867,293 UART: [art] Erasing AUTHORITY.KEYID = 7
44,868,805 UART: [art] PUB.X = 0C8B27A399002ADD08233D91939ABAE9B4D1E6F3687D67F096666AC0EAEDBF65B22FBB3332D8B7C02193A5A60A87CDEF
44,876,082 UART: [art] PUB.Y = 845A1929BD9DD6D21D0F7A2D1108E1863C32EB163B612EDCE38F9B4E87ED485DE3BD9215D14ED6593B6E1EDA46A949A1
44,883,351 UART: [art] SIG.R = E23E13C6DBE5D73EB191842667B761DA2DCD4587DD589A50BE1D7AB095E7AAF57DB8A8B693F40761081D1CC90AD0B697
44,890,772 UART: [art] SIG.S = F5D50F047617279F1B986B688FE7AAE9CAE071519D6CB322F6D127EAB5055705207D684343B929C9EAC612C3B3F1F7B4
45,870,377 UART: Caliptra RT
45,871,073 UART: [state] CFI Enabled
46,296,646 UART: [rt] RT listening for mailbox commands...
46,327,428 UART: [rt]cmd =0x494e464f, len=4
46,331,793 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,442,330 ready_for_fw is high
3,443,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,443 >>> mbox cmd response: success
14,827,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,116,829 UART:
19,117,221 UART: Running Caliptra FMC ...
19,118,511 UART:
19,118,677 UART: [state] CFI Enabled
19,181,621 UART: [fht] FMC Alias Private Key: 7
20,948,154 UART: [art] Extend RT PCRs Done
20,949,390 UART: [art] Lock RT PCRs Done
20,951,236 UART: [art] Populate DV Done
20,956,607 UART: [fht] FMC Alias Private Key: 7
20,958,369 UART: [art] Derive CDI
20,959,167 UART: [art] Store in slot 0x4
21,013,723 UART: [art] Derive Key Pair
21,014,731 UART: [art] Store priv key in slot 0x5
23,477,741 UART: [art] Derive Key Pair - Done
23,490,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,191 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,718 UART: [art] PUB.X = FA6C5573499FED7AE079FE03503FEBFB7BA066D23DD6D7B94E58872CEDA00145385E435E3E077CC7D68A2BC58175EE1B
25,211,987 UART: [art] PUB.Y = 92A6DE1889308CCD6192F8B33CF3A5223E9CC64E2CEA427CDF08BFDB9D07F195EF3812331F615EC23EB5B352EE3D6C5A
25,219,245 UART: [art] SIG.R = D63B26685B4BE89513F5ABE1E8456197B4706D602975A37E08D59E4EB18BDBAF213A8FBE5F149751F2590ABC79BD89D2
25,226,642 UART: [art] SIG.S = 9C011FC075724D9C7DF4146773539EE66C45EB72924B92D93A0E32B6FE6BB8598DBD377E0B7B8EE24835677A10B647F6
26,205,887 UART: Caliptra RT
26,206,608 UART: [state] CFI Enabled
26,386,375 UART: [rt] RT listening for mailbox commands...
26,418,707 UART: [rt]cmd =0x44504543, len=96
30,783,912 >>> mbox cmd response data (6236 bytes)
32,875,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,780,325 >>> mbox cmd response: success
40,780,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,814,218 UART:
40,814,546 UART: Running Caliptra FMC ...
40,815,672 UART:
40,815,836 UART: [state] CFI Enabled
40,911,693 UART: [art] Extend RT PCRs Done
40,912,870 UART: [art] Lock RT PCRs Done
40,914,272 UART: [art] Populate DV Done
40,919,746 UART: [fht] FMC Alias Private Key: 7
40,921,393 UART: [art] Derive CDI
40,922,204 UART: [art] Store in slot 0x4
40,980,903 UART: [art] Derive Key Pair
40,981,941 UART: [art] Store priv key in slot 0x5
43,444,987 UART: [art] Derive Key Pair - Done
43,457,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,170,255 UART: [art] Erasing AUTHORITY.KEYID = 7
45,171,783 UART: [art] PUB.X = 18FACDF6E8CF089279B9602314EFDAE07CC0DDC9E7E464D84C7B131A8BEC9C656014295AD29B8F196EA5A14DBCEAD1C9
45,179,102 UART: [art] PUB.Y = E02AACEA2E6AB62F9CC9A287DB9E9AD92190CB7AEA52657DE7975EAAE6DEE79A566DE99DE85D30E2EF01CAE7167F6065
45,186,391 UART: [art] SIG.R = C8550FDE57C5ADC4B13242F57E6291DC7E83D56EFDDEDF262E3574A65DF6CECE9ED755FA56680253FE8918E72C5D69E2
45,193,841 UART: [art] SIG.S = 110B54857819521511C706F1F5EE1D29B28CC21EF22CD305A2C9EC2DB0BEA97D1BE6778AF97EEE3F7306F999018DE3BA
46,173,044 UART: Caliptra RT
46,173,732 UART: [state] CFI Enabled
46,598,998 UART: [rt] RT listening for mailbox commands...
46,630,141 UART: [rt]cmd =0x494e464f, len=4
46,634,470 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,484 UART:
192,836 UART: Running Caliptra ROM ...
194,032 UART:
603,488 UART: [state] CFI Enabled
613,906 UART: [state] LifecycleState = Unprovisioned
616,292 UART: [state] DebugLocked = No
618,974 UART: [state] WD Timer not started. Device not locked for debugging
624,192 UART: [kat] SHA2-256
814,086 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,893 UART: [kat] ++
825,345 UART: [kat] sha1
837,149 UART: [kat] SHA2-256
840,158 UART: [kat] SHA2-384
847,146 UART: [kat] SHA2-512-ACC
849,740 UART: [kat] ECC-384
3,289,840 UART: [kat] HMAC-384Kdf
3,304,485 UART: [kat] LMS
3,836,304 UART: [kat] --
3,842,363 UART: [cold-reset] ++
3,843,734 UART: [fht] FHT @ 0x50003400
3,854,077 UART: [idev] ++
3,854,720 UART: [idev] CDI.KEYID = 6
3,855,752 UART: [idev] SUBJECT.KEYID = 7
3,856,928 UART: [idev] UDS.KEYID = 0
3,857,877 ready_for_fw is high
3,858,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,912 UART: [idev] Erasing UDS.KEYID = 0
6,333,169 UART: [idev] Sha1 KeyId Algorithm
6,356,628 UART: [idev] --
6,361,426 UART: [ldev] ++
6,362,113 UART: [ldev] CDI.KEYID = 6
6,363,059 UART: [ldev] SUBJECT.KEYID = 5
6,364,172 UART: [ldev] AUTHORITY.KEYID = 7
6,365,408 UART: [ldev] FE.KEYID = 1
6,373,462 UART: [ldev] Erasing FE.KEYID = 1
8,855,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,123 UART: [ldev] --
10,645,794 UART: [fwproc] Wait for Commands...
10,647,403 UART: [fwproc] Recv command 0x46574c44
10,649,710 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,753 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,349 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,725 >>> mbox cmd response: success
14,909,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,913,576 UART: [afmc] ++
14,914,271 UART: [afmc] CDI.KEYID = 6
14,915,516 UART: [afmc] SUBJECT.KEYID = 7
14,916,952 UART: [afmc] AUTHORITY.KEYID = 5
17,424,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,148,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,150,295 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,165,384 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,180,503 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,195,430 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,681 UART: [afmc] --
19,223,037 UART: [cold-reset] --
19,226,256 UART: [state] Locking Datavault
19,232,658 UART: [state] Locking PCR0, PCR1 and PCR31
19,234,827 UART: [state] Locking ICCM
19,237,158 UART: [exit] Launching FMC @ 0x40000130
19,245,843 UART:
19,246,082 UART: Running Caliptra FMC ...
19,247,190 UART:
19,247,356 UART: [state] CFI Enabled
19,255,464 UART: [fht] FMC Alias Private Key: 7
21,021,844 UART: [art] Extend RT PCRs Done
21,023,063 UART: [art] Lock RT PCRs Done
21,024,759 UART: [art] Populate DV Done
21,030,231 UART: [fht] FMC Alias Private Key: 7
21,031,934 UART: [art] Derive CDI
21,032,753 UART: [art] Store in slot 0x4
21,075,567 UART: [art] Derive Key Pair
21,076,573 UART: [art] Store priv key in slot 0x5
23,503,970 UART: [art] Derive Key Pair - Done
23,517,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,384 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,891 UART: [art] PUB.X = 11D4ED5AB5C772DE32F05C7B902017324A1432C8045A399FB0A17A4DF989E7F7A2901F1725AE2D560CD4457F14F35B78
25,232,155 UART: [art] PUB.Y = A2C25392A76260DE1404D2CE93033B2B91F679090EC2376AF008B775432E2D31A54E561B805175859FEF99F26255230A
25,239,365 UART: [art] SIG.R = 413E080823ECC6EDDE354DDD715866DC7F5F4CF03CA26917AE055D9B58D4646D04C474F4581D5FA703C936622F4D042D
25,246,771 UART: [art] SIG.S = A4BE72BF4638FE5EAA3523E1A073E834404238507230DAC50CA4273CF65A42660D0924F716CC0EE83DE8506335011785
26,225,646 UART: Caliptra RT
26,226,357 UART: [state] CFI Enabled
26,358,910 UART: [rt] RT listening for mailbox commands...
26,391,177 UART: [rt]cmd =0x44504543, len=96
30,676,489 >>> mbox cmd response data (6236 bytes)
32,773,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,924,313 UART:
32,924,695 UART: Running Caliptra ROM ...
32,925,792 UART:
32,925,955 UART: [state] CFI Enabled
32,939,657 UART: [state] LifecycleState = Unprovisioned
32,941,545 UART: [state] DebugLocked = No
32,943,123 UART: [state] WD Timer not started. Device not locked for debugging
32,947,698 UART: [kat] SHA2-256
33,137,590 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,148,343 UART: [kat] ++
33,148,861 UART: [kat] sha1
33,160,401 UART: [kat] SHA2-256
33,163,428 UART: [kat] SHA2-384
33,169,101 UART: [kat] SHA2-512-ACC
33,171,678 UART: [kat] ECC-384
35,613,551 UART: [kat] HMAC-384Kdf
35,626,501 UART: [kat] LMS
36,158,098 UART: [kat] --
36,161,836 UART: [update-reset] ++
39,669,517 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,673,002 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,302,747 >>> mbox cmd response: success
40,303,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,304,573 UART: [update-reset] Copying MAN_2 To MAN_1
40,342,142 UART: [update-reset Success] --
40,346,385 UART: [state] Locking Datavault
40,350,620 UART: [state] Locking PCR0, PCR1 and PCR31
40,352,825 UART: [state] Locking ICCM
40,354,766 UART: [exit] Launching FMC @ 0x40000130
40,363,445 UART:
40,363,680 UART: Running Caliptra FMC ...
40,364,806 UART:
40,364,968 UART: [state] CFI Enabled
40,409,150 UART: [art] Extend RT PCRs Done
40,410,342 UART: [art] Lock RT PCRs Done
40,411,856 UART: [art] Populate DV Done
40,417,423 UART: [fht] FMC Alias Private Key: 7
40,418,966 UART: [art] Derive CDI
40,419,785 UART: [art] Store in slot 0x4
40,462,382 UART: [art] Derive Key Pair
40,463,426 UART: [art] Store priv key in slot 0x5
42,890,281 UART: [art] Derive Key Pair - Done
42,903,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,610,299 UART: [art] Erasing AUTHORITY.KEYID = 7
44,611,803 UART: [art] PUB.X = 1CC23EBD135383328BA7A7B9CBBE27E26090F2150792BAB3171DFBFA8DC251B52B485189F996CA86BBF1619908D97455
44,619,071 UART: [art] PUB.Y = 3803787A75F3E073B318AF9D10B9DBD287B57BAAF412C2F989C192EAEDFD921CD6032E185E1616234A1B32FF54FFA366
44,626,355 UART: [art] SIG.R = 69C280C3CA429E9B98661A881024D416F7B1A861AB542BE4644FC54E0421C7BC8D811523B916D6E972736A5179C857EB
44,633,748 UART: [art] SIG.S = A958A0EEDFFB2D3846CA0224B05837A140DF57263095919ECA90E44BB7C060591FF413EBF9F68FD1E5A880313093618C
45,612,675 UART: Caliptra RT
45,613,377 UART: [state] CFI Enabled
45,987,462 UART: [rt] RT listening for mailbox commands...
46,018,632 UART: [rt]cmd =0x494e464f, len=4
46,022,974 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,755,717 ready_for_fw is high
3,756,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,032,658 >>> mbox cmd response: success
15,033,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,290,005 UART:
19,290,394 UART: Running Caliptra FMC ...
19,291,501 UART:
19,291,656 UART: [state] CFI Enabled
19,299,568 UART: [fht] FMC Alias Private Key: 7
21,065,550 UART: [art] Extend RT PCRs Done
21,066,786 UART: [art] Lock RT PCRs Done
21,068,479 UART: [art] Populate DV Done
21,073,860 UART: [fht] FMC Alias Private Key: 7
21,075,544 UART: [art] Derive CDI
21,076,295 UART: [art] Store in slot 0x4
21,119,145 UART: [art] Derive Key Pair
21,120,148 UART: [art] Store priv key in slot 0x5
23,547,067 UART: [art] Derive Key Pair - Done
23,559,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,265,767 UART: [art] Erasing AUTHORITY.KEYID = 7
25,267,281 UART: [art] PUB.X = 0970266A6AF654E97FBC45AC569015129B49AB4C50F3E57C0B81FF2B5880E5CAD35D6DC70C579EEBE48DCFCF005A708F
25,274,535 UART: [art] PUB.Y = 7708CCFA4EBF59AE61F9124C1A8136BE6447B4652C1C58F719FA49E8364E2F300798636B919F3104656A6F537428F7D2
25,281,800 UART: [art] SIG.R = 25B884092EB9E4C1D2A397E55B7D6A859CC7DC9D65D36D51A3BCBAAC2908FD05A473049721F5B424698A1AB461D11238
25,289,198 UART: [art] SIG.S = 4D93F76F2EA5F50546C2AFB53A08E9CFB4FBAD38F70E93AC281AD81B510BA10452DD5DE3CF0B41E812CB7298213C617C
26,268,536 UART: Caliptra RT
26,269,232 UART: [state] CFI Enabled
26,401,898 UART: [rt] RT listening for mailbox commands...
26,433,944 UART: [rt]cmd =0x44504543, len=96
30,719,639 >>> mbox cmd response data (6236 bytes)
32,815,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,641,151 >>> mbox cmd response: success
40,641,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,674,435 UART:
40,674,765 UART: Running Caliptra FMC ...
40,675,904 UART:
40,676,090 UART: [state] CFI Enabled
40,720,337 UART: [art] Extend RT PCRs Done
40,721,491 UART: [art] Lock RT PCRs Done
40,722,920 UART: [art] Populate DV Done
40,728,367 UART: [fht] FMC Alias Private Key: 7
40,730,011 UART: [art] Derive CDI
40,730,833 UART: [art] Store in slot 0x4
40,773,330 UART: [art] Derive Key Pair
40,774,411 UART: [art] Store priv key in slot 0x5
43,201,071 UART: [art] Derive Key Pair - Done
43,214,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,920,787 UART: [art] Erasing AUTHORITY.KEYID = 7
44,922,324 UART: [art] PUB.X = 0D6141E6AF8CDDD43A02AA282ED10693DDE8D9FC9D7E30865A56553FF4DB836C1ECCD3A73BB7723C287CC6323ED6A836
44,929,587 UART: [art] PUB.Y = 32416DBD7F217E0EB407DA28AED0464686E15267E2736889D37EE7D8D2E57CA6188437F10213E3CBFFBE1ECBD109BE2C
44,936,887 UART: [art] SIG.R = C51E2C7ACD3EC7FDB8A52CED28A0B35FB33E43A50024AD5D377CDD4E8E510A02D350D3281748350D35A3D0B484281983
44,944,227 UART: [art] SIG.S = 5676C94C77F540DE38E75CA14CF9E15BF6F6146F8B557594C5674357CF540F803F05D4D49F8DB796557444CBAA584C71
45,923,256 UART: Caliptra RT
45,923,966 UART: [state] CFI Enabled
46,293,356 UART: [rt] RT listening for mailbox commands...
46,324,449 UART: [rt]cmd =0x494e464f, len=4
46,328,569 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,577 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,293 UART: [kat] SHA2-256
882,224 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,339 UART: [kat] ++
886,491 UART: [kat] sha1
890,741 UART: [kat] SHA2-256
892,679 UART: [kat] SHA2-384
895,524 UART: [kat] SHA2-512-ACC
897,425 UART: [kat] ECC-384
902,858 UART: [kat] HMAC-384Kdf
907,350 UART: [kat] LMS
1,475,546 UART: [kat] --
1,476,531 UART: [cold-reset] ++
1,476,957 UART: [fht] Storing FHT @ 0x50003400
1,479,762 UART: [idev] ++
1,479,930 UART: [idev] CDI.KEYID = 6
1,480,290 UART: [idev] SUBJECT.KEYID = 7
1,480,714 UART: [idev] UDS.KEYID = 0
1,481,059 ready_for_fw is high
1,481,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,854 UART: [idev] Erasing UDS.KEYID = 0
1,505,216 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,800 UART: [idev] --
1,515,059 UART: [ldev] ++
1,515,227 UART: [ldev] CDI.KEYID = 6
1,515,590 UART: [ldev] SUBJECT.KEYID = 5
1,516,016 UART: [ldev] AUTHORITY.KEYID = 7
1,516,479 UART: [ldev] FE.KEYID = 1
1,521,779 UART: [ldev] Erasing FE.KEYID = 1
1,546,804 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,812 UART: [ldev] --
1,586,253 UART: [fwproc] Waiting for Commands...
1,587,114 UART: [fwproc] Received command 0x46574c44
1,587,905 UART: [fwproc] Received Image of size 118548 bytes
2,933,115 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,847 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,065 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,506 >>> mbox cmd response: success
3,131,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,622 UART: [afmc] ++
3,132,790 UART: [afmc] CDI.KEYID = 6
3,133,152 UART: [afmc] SUBJECT.KEYID = 7
3,133,577 UART: [afmc] AUTHORITY.KEYID = 5
3,168,686 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,972 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,752 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,461 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,344 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,027 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,859 UART: [afmc] --
3,211,795 UART: [cold-reset] --
3,212,519 UART: [state] Locking Datavault
3,213,886 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,490 UART: [state] Locking ICCM
3,214,956 UART: [exit] Launching FMC @ 0x40000130
3,220,286 UART:
3,220,302 UART: Running Caliptra FMC ...
3,220,710 UART:
3,220,764 UART: [state] CFI Enabled
3,230,930 UART: [fht] FMC Alias Private Key: 7
3,349,634 UART: [art] Extend RT PCRs Done
3,350,062 UART: [art] Lock RT PCRs Done
3,351,468 UART: [art] Populate DV Done
3,359,591 UART: [fht] FMC Alias Private Key: 7
3,360,605 UART: [art] Derive CDI
3,360,885 UART: [art] Store in slot 0x4
3,446,763 UART: [art] Derive Key Pair
3,447,123 UART: [art] Store priv key in slot 0x5
3,460,606 UART: [art] Derive Key Pair - Done
3,475,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,513 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,278 UART: [art] PUB.X = 8F7D34F9B3E99C0702CCF7A0FDB07FBCF86E310A246EDC71A64DEE66ED9A13DD891A8C7E77B336C596B689DAA9CBE1C3
3,498,065 UART: [art] PUB.Y = 30849D8F60AEB58FA40821D19149E95166FBEDFEEDB2EDFA853F5A4A296F7E03AA334D2F45141DF53F368914DBE988B9
3,505,023 UART: [art] SIG.R = 913EBE5FE85ED100352805A23CB7816C634DE7DF3E80EF00A8A2C8E4636E4AD7FC5D51235034406270E63A40F44BD275
3,511,750 UART: [art] SIG.S = 8F5B48A489628B05A9CF24F13ADC9ADA6DE64D643307417EA759AC0BA6BE2B34E2C9BEE39C25781264A5D34D4AAC98B5
3,535,345 UART: Caliptra RT
3,535,596 UART: [state] CFI Enabled
3,656,425 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,397 UART: [rt]cmd =0x44504543, len=96
3,868,572 >>> mbox cmd response data (6236 bytes)
3,868,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,869,541 UART:
3,869,557 UART: Running Caliptra ROM ...
3,869,965 UART:
3,870,019 UART: [state] CFI Enabled
3,872,565 UART: [state] LifecycleState = Unprovisioned
3,873,220 UART: [state] DebugLocked = No
3,873,736 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,875,409 UART: [kat] SHA2-256
4,669,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,673,455 UART: [kat] ++
4,673,607 UART: [kat] sha1
4,677,685 UART: [kat] SHA2-256
4,679,623 UART: [kat] SHA2-384
4,682,200 UART: [kat] SHA2-512-ACC
4,684,100 UART: [kat] ECC-384
4,689,657 UART: [kat] HMAC-384Kdf
4,694,257 UART: [kat] LMS
5,262,453 UART: [kat] --
5,263,114 UART: [update-reset] ++
6,644,088 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,645,206 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,800,473 >>> mbox cmd response: success
6,800,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,800,778 UART: [update-reset] Copying MAN_2 To MAN_1
6,808,792 UART: [update-reset Success] --
6,809,873 UART: [state] Locking Datavault
6,810,711 UART: [state] Locking PCR0, PCR1 and PCR31
6,811,315 UART: [state] Locking ICCM
6,811,761 UART: [exit] Launching FMC @ 0x40000130
6,817,091 UART:
6,817,107 UART: Running Caliptra FMC ...
6,817,515 UART:
6,817,569 UART: [state] CFI Enabled
6,906,706 UART: [art] Extend RT PCRs Done
6,907,134 UART: [art] Lock RT PCRs Done
6,908,657 UART: [art] Populate DV Done
6,917,212 UART: [fht] FMC Alias Private Key: 7
6,918,214 UART: [art] Derive CDI
6,918,494 UART: [art] Store in slot 0x4
7,003,724 UART: [art] Derive Key Pair
7,004,084 UART: [art] Store priv key in slot 0x5
7,017,367 UART: [art] Derive Key Pair - Done
7,032,286 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,047,643 UART: [art] Erasing AUTHORITY.KEYID = 7
7,048,408 UART: [art] PUB.X = 1443A49FBB84A14661031804176184F79B7D6471FF48754ED09884B24A55D5BAF9E6501A679478A027283BABB27E8EB0
7,055,166 UART: [art] PUB.Y = 1FC5A32D743B4CE9A8BFE465B6825BD10018EA275A7BF98FCC1B4C2C3265021F701CD0524209E1CB8D87833869F21A1F
7,062,096 UART: [art] SIG.R = EB94C3D12A126AB0D00665C150469F1A04097BADC47EC7CFBDDE6E35DE2985D90958C9BD6F9CF4098573D81A2A4D2C38
7,068,865 UART: [art] SIG.S = 5828BAA438CB8EFDF40AAC9E2FF4E043A487F93798BE76F156A61C09E28C80C4022081E586260483F0FCD10C3EE24372
7,093,280 UART: Caliptra RT
7,093,531 UART: [state] CFI Enabled
7,455,552 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,485,955 UART: [rt]cmd =0x494e464f, len=4
7,489,517 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,723 ready_for_fw is high
1,361,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,738 >>> mbox cmd response: success
2,980,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,835 UART:
3,042,851 UART: Running Caliptra FMC ...
3,043,259 UART:
3,043,313 UART: [state] CFI Enabled
3,054,099 UART: [fht] FMC Alias Private Key: 7
3,173,215 UART: [art] Extend RT PCRs Done
3,173,643 UART: [art] Lock RT PCRs Done
3,174,947 UART: [art] Populate DV Done
3,183,114 UART: [fht] FMC Alias Private Key: 7
3,184,142 UART: [art] Derive CDI
3,184,422 UART: [art] Store in slot 0x4
3,270,734 UART: [art] Derive Key Pair
3,271,094 UART: [art] Store priv key in slot 0x5
3,284,427 UART: [art] Derive Key Pair - Done
3,299,237 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,576 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,341 UART: [art] PUB.X = 0D7A6B5ADE8A36E2FAB5E125FE8CEB532AB64448029EB880D817F9E6A74BD52FE88813A9A74ECAA405FF76F1BD9294EC
3,322,124 UART: [art] PUB.Y = 09E623A3CAB5DB300FF5195550A2552BEDCBB010F04125BF81455555E0EF51EA40C3D8D2BD72A4EBFD7323FEE2631DE6
3,329,084 UART: [art] SIG.R = 9CAC135BAFB7C0D7E5B69033CA20EBD6002845E74EF34F24653A94FBD6787668205FA9AA4B86503952F947CA5C5E7A06
3,335,837 UART: [art] SIG.S = 5BC5B8D85D9730EF412BA241ECEFBFEA311E4AE260F39D61A8B9D61DA4F225873AE71ADC33CB62DA1BE7F615388A1942
3,359,871 UART: Caliptra RT
3,360,122 UART: [state] CFI Enabled
3,480,294 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,270 UART: [rt]cmd =0x44504543, len=96
3,692,670 >>> mbox cmd response data (6236 bytes)
3,692,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,506,839 >>> mbox cmd response: success
6,506,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,519,987 UART:
6,520,003 UART: Running Caliptra FMC ...
6,520,411 UART:
6,520,465 UART: [state] CFI Enabled
6,609,658 UART: [art] Extend RT PCRs Done
6,610,086 UART: [art] Lock RT PCRs Done
6,611,355 UART: [art] Populate DV Done
6,619,586 UART: [fht] FMC Alias Private Key: 7
6,620,626 UART: [art] Derive CDI
6,620,906 UART: [art] Store in slot 0x4
6,706,458 UART: [art] Derive Key Pair
6,706,818 UART: [art] Store priv key in slot 0x5
6,719,663 UART: [art] Derive Key Pair - Done
6,734,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,750,232 UART: [art] Erasing AUTHORITY.KEYID = 7
6,750,997 UART: [art] PUB.X = EDF58DFD94C4097790737F9E6BD683B21634CC4268E215B10C56AD07C122BCFA7AE12EF3AF4C8F21800911B7C54F9029
6,757,763 UART: [art] PUB.Y = 951F54EB49905D32C0F8652631C086972B74DE00E70943A9D5B52E1B8099C48AE7F1D515C6D2966195D8315E0FE52CE2
6,764,681 UART: [art] SIG.R = 0B4A6FDF260C1BF9B13D349FB80EB6CDA194F88EF374EBBEFA13FDF80CB8B701AD079BF940BF9316BDA9DD030895ECAA
6,771,459 UART: [art] SIG.S = 227AA25B4EA2E75361B6321A51596374AA49D4767C10DECC49209B525BA132785A6F08CD20B3051F75D823B28C2638A8
6,795,287 UART: Caliptra RT
6,795,538 UART: [state] CFI Enabled
7,160,152 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,190,367 UART: [rt]cmd =0x494e464f, len=4
7,193,913 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,955 UART: [state] LifecycleState = Unprovisioned
86,610 UART: [state] DebugLocked = No
87,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,660 UART: [kat] SHA2-256
882,591 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,706 UART: [kat] ++
886,858 UART: [kat] sha1
891,294 UART: [kat] SHA2-256
893,232 UART: [kat] SHA2-384
896,099 UART: [kat] SHA2-512-ACC
898,000 UART: [kat] ECC-384
903,295 UART: [kat] HMAC-384Kdf
907,887 UART: [kat] LMS
1,476,083 UART: [kat] --
1,477,028 UART: [cold-reset] ++
1,477,556 UART: [fht] Storing FHT @ 0x50003400
1,480,253 UART: [idev] ++
1,480,421 UART: [idev] CDI.KEYID = 6
1,480,781 UART: [idev] SUBJECT.KEYID = 7
1,481,205 UART: [idev] UDS.KEYID = 0
1,481,550 ready_for_fw is high
1,481,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,407 UART: [idev] Erasing UDS.KEYID = 0
1,506,517 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,307 UART: [idev] --
1,516,438 UART: [ldev] ++
1,516,606 UART: [ldev] CDI.KEYID = 6
1,516,969 UART: [ldev] SUBJECT.KEYID = 5
1,517,395 UART: [ldev] AUTHORITY.KEYID = 7
1,517,858 UART: [ldev] FE.KEYID = 1
1,523,062 UART: [ldev] Erasing FE.KEYID = 1
1,549,105 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,821 UART: [ldev] --
1,588,126 UART: [fwproc] Waiting for Commands...
1,588,923 UART: [fwproc] Received command 0x46574c44
1,589,714 UART: [fwproc] Received Image of size 118548 bytes
2,933,784 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,894 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,112 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,505 >>> mbox cmd response: success
3,133,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,134,521 UART: [afmc] ++
3,134,689 UART: [afmc] CDI.KEYID = 6
3,135,051 UART: [afmc] SUBJECT.KEYID = 7
3,135,476 UART: [afmc] AUTHORITY.KEYID = 5
3,170,635 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,001 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,781 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,490 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,373 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,056 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,958 UART: [afmc] --
3,213,884 UART: [cold-reset] --
3,214,544 UART: [state] Locking Datavault
3,215,387 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,991 UART: [state] Locking ICCM
3,216,549 UART: [exit] Launching FMC @ 0x40000130
3,221,879 UART:
3,221,895 UART: Running Caliptra FMC ...
3,222,303 UART:
3,222,446 UART: [state] CFI Enabled
3,233,198 UART: [fht] FMC Alias Private Key: 7
3,352,404 UART: [art] Extend RT PCRs Done
3,352,832 UART: [art] Lock RT PCRs Done
3,354,584 UART: [art] Populate DV Done
3,362,737 UART: [fht] FMC Alias Private Key: 7
3,363,673 UART: [art] Derive CDI
3,363,953 UART: [art] Store in slot 0x4
3,449,549 UART: [art] Derive Key Pair
3,449,909 UART: [art] Store priv key in slot 0x5
3,463,006 UART: [art] Derive Key Pair - Done
3,477,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,002 UART: [art] PUB.X = 5F695AB5D40E9302C60DD8E2057A4FCFE2069C966A2B66FB671D13CFA7323D557346F1A6123733F7072CD9CE7BAF369D
3,500,762 UART: [art] PUB.Y = 2BCB8060EE011E5D1BE6EC0104486279A761A3C966659CB30EEAE6FC9AE8F8217874A8275487209658CF022384152265
3,507,691 UART: [art] SIG.R = 61107A4F597AD8642708F1C4E04E652651F250BFBD64D6A5C3BB9CC3876C4175D4861C97D09EEB1E62345F6FABB3DE93
3,514,466 UART: [art] SIG.S = 6D11BCC478D8BB9AF470FE3A8D8B720EF4991CB9DE09B5517E136E1CA249DAF6EF036EF0C0B65F303D976E37436FE8E6
3,537,923 UART: Caliptra RT
3,538,266 UART: [state] CFI Enabled
3,658,131 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,105 UART: [rt]cmd =0x44504543, len=96
3,871,463 >>> mbox cmd response data (6236 bytes)
3,871,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,872,092 UART:
3,872,108 UART: Running Caliptra ROM ...
3,872,516 UART:
3,872,657 UART: [state] CFI Enabled
3,875,411 UART: [state] LifecycleState = Unprovisioned
3,876,066 UART: [state] DebugLocked = No
3,876,556 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,878,273 UART: [kat] SHA2-256
4,672,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,676,319 UART: [kat] ++
4,676,471 UART: [kat] sha1
4,680,691 UART: [kat] SHA2-256
4,682,629 UART: [kat] SHA2-384
4,685,446 UART: [kat] SHA2-512-ACC
4,687,346 UART: [kat] ECC-384
4,692,675 UART: [kat] HMAC-384Kdf
4,697,391 UART: [kat] LMS
5,265,587 UART: [kat] --
5,266,548 UART: [update-reset] ++
6,647,074 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,648,200 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,803,467 >>> mbox cmd response: success
6,803,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,803,612 UART: [update-reset] Copying MAN_2 To MAN_1
6,811,626 UART: [update-reset Success] --
6,812,609 UART: [state] Locking Datavault
6,813,223 UART: [state] Locking PCR0, PCR1 and PCR31
6,813,827 UART: [state] Locking ICCM
6,814,263 UART: [exit] Launching FMC @ 0x40000130
6,819,593 UART:
6,819,609 UART: Running Caliptra FMC ...
6,820,017 UART:
6,820,160 UART: [state] CFI Enabled
6,909,319 UART: [art] Extend RT PCRs Done
6,909,747 UART: [art] Lock RT PCRs Done
6,911,136 UART: [art] Populate DV Done
6,919,283 UART: [fht] FMC Alias Private Key: 7
6,920,331 UART: [art] Derive CDI
6,920,611 UART: [art] Store in slot 0x4
7,006,419 UART: [art] Derive Key Pair
7,006,779 UART: [art] Store priv key in slot 0x5
7,020,462 UART: [art] Derive Key Pair - Done
7,035,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,050,898 UART: [art] Erasing AUTHORITY.KEYID = 7
7,051,663 UART: [art] PUB.X = 32C8E24A9544EAB31943032629DC7AADB93440072E8654DA54B16A49EF9FC1EEC10AB46DCF54A49C258089A7C4026754
7,058,425 UART: [art] PUB.Y = 3727C91CA9C4E483BEF5C711FAD463F648144D02845CD42863136C1DED07F165BA800DA66473A6422D769E701ABC102D
7,065,368 UART: [art] SIG.R = 3841A80A9446C66456C36E7CB437645D74F8C0C3F3078B6E81FC803B38F548C5F1142C61CBB1E87AE9870FF7CA6C4A09
7,072,130 UART: [art] SIG.S = 39D1B8C97D029A2CEC44B0B2281B648D7079D5F559DA80965F4C49E71A6027B4B193085DF1C566D0FA759B3918D6BED5
7,096,000 UART: Caliptra RT
7,096,343 UART: [state] CFI Enabled
7,464,977 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,495,036 UART: [rt]cmd =0x494e464f, len=4
7,498,786 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,346 ready_for_fw is high
1,362,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,919 >>> mbox cmd response: success
2,980,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,970 UART:
3,042,986 UART: Running Caliptra FMC ...
3,043,394 UART:
3,043,537 UART: [state] CFI Enabled
3,054,563 UART: [fht] FMC Alias Private Key: 7
3,173,861 UART: [art] Extend RT PCRs Done
3,174,289 UART: [art] Lock RT PCRs Done
3,175,993 UART: [art] Populate DV Done
3,184,364 UART: [fht] FMC Alias Private Key: 7
3,185,486 UART: [art] Derive CDI
3,185,766 UART: [art] Store in slot 0x4
3,271,396 UART: [art] Derive Key Pair
3,271,756 UART: [art] Store priv key in slot 0x5
3,284,847 UART: [art] Derive Key Pair - Done
3,299,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,652 UART: [art] PUB.X = 4D530464CE63ED1D65242E91B2949244FD470A119B1F01F7393F27BF883FAEB56CB70D093E9D33CF8062F3EC2CD94EEA
3,322,417 UART: [art] PUB.Y = F84DBCB872758F62C478F4A84FB8CA17368959E2C15D2FE33ACAB562732DCB4684E402895FC73666A05D6334FE44668D
3,329,368 UART: [art] SIG.R = CAD3A37605A23C8386FC113BCB5CD0F5C2D7A61B02DBAD65087ED02FA2F89ADDB0CFFF0C29D26A418BBBBA8394283BFB
3,336,156 UART: [art] SIG.S = 630018659A807A4A67BAD675A93E01AA6F48C94C41FEC8EA4336C22D8BCF77E22499FA9CE8772E2D2A3DC8279BB1CE52
3,359,863 UART: Caliptra RT
3,360,206 UART: [state] CFI Enabled
3,481,896 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,118 UART: [rt]cmd =0x44504543, len=96
3,695,350 >>> mbox cmd response data (6236 bytes)
3,695,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,508,928 >>> mbox cmd response: success
6,508,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,522,318 UART:
6,522,334 UART: Running Caliptra FMC ...
6,522,742 UART:
6,522,885 UART: [state] CFI Enabled
6,611,830 UART: [art] Extend RT PCRs Done
6,612,258 UART: [art] Lock RT PCRs Done
6,613,481 UART: [art] Populate DV Done
6,621,848 UART: [fht] FMC Alias Private Key: 7
6,622,840 UART: [art] Derive CDI
6,623,120 UART: [art] Store in slot 0x4
6,708,870 UART: [art] Derive Key Pair
6,709,230 UART: [art] Store priv key in slot 0x5
6,722,385 UART: [art] Derive Key Pair - Done
6,737,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,752,426 UART: [art] Erasing AUTHORITY.KEYID = 7
6,753,191 UART: [art] PUB.X = BD21AAE91BEDBF49BA003EBE1612C9EA1B81F876ED714FDADC234575E648FF3B01F4E9782319AC6AD76F2A445D08E13F
6,759,955 UART: [art] PUB.Y = 2FF68220722556C7BC27B74870CA79B9A692272E10F947F55C7A146E70C2CD078CC994FE2772330F2F2AB43CF285DD50
6,766,899 UART: [art] SIG.R = 3C49757B09707D0C2D86BDD7144ECA8513AA3D1EF1928FE27C1A48442C9E379D4C1723C9D79ACE8E8B8F9C51D04DB758
6,773,673 UART: [art] SIG.S = DFC8A4465FBB965B1D08A3E5C8AC2442D071D13C42709A017EF43F9B7817425059A7B265B50F41CC3984F30F80179FE0
6,797,939 UART: Caliptra RT
6,798,282 UART: [state] CFI Enabled
7,162,781 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,193,096 UART: [rt]cmd =0x494e464f, len=4
7,196,732 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,950 UART: [kat] ++
895,102 UART: [kat] sha1
899,342 UART: [kat] SHA2-256
901,282 UART: [kat] SHA2-384
904,111 UART: [kat] SHA2-512-ACC
906,012 UART: [kat] ECC-384
915,865 UART: [kat] HMAC-384Kdf
920,447 UART: [kat] LMS
1,168,759 UART: [kat] --
1,169,548 UART: [cold-reset] ++
1,170,046 UART: [fht] FHT @ 0x50003400
1,172,660 UART: [idev] ++
1,172,828 UART: [idev] CDI.KEYID = 6
1,173,189 UART: [idev] SUBJECT.KEYID = 7
1,173,614 UART: [idev] UDS.KEYID = 0
1,173,960 ready_for_fw is high
1,173,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,317 UART: [idev] Sha1 KeyId Algorithm
1,207,161 UART: [idev] --
1,208,290 UART: [ldev] ++
1,208,458 UART: [ldev] CDI.KEYID = 6
1,208,822 UART: [ldev] SUBJECT.KEYID = 5
1,209,249 UART: [ldev] AUTHORITY.KEYID = 7
1,209,712 UART: [ldev] FE.KEYID = 1
1,214,640 UART: [ldev] Erasing FE.KEYID = 1
1,241,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,090 UART: [ldev] --
1,280,345 UART: [fwproc] Wait for Commands...
1,281,018 UART: [fwproc] Recv command 0x46574c44
1,281,751 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,021 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,196 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,529 >>> mbox cmd response: success
2,825,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,826,751 UART: [afmc] ++
2,826,919 UART: [afmc] CDI.KEYID = 6
2,827,282 UART: [afmc] SUBJECT.KEYID = 7
2,827,708 UART: [afmc] AUTHORITY.KEYID = 5
2,863,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,223 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,933 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,814 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,515 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,138 UART: [afmc] --
2,906,083 UART: [cold-reset] --
2,907,147 UART: [state] Locking Datavault
2,908,368 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,972 UART: [state] Locking ICCM
2,909,634 UART: [exit] Launching FMC @ 0x40000130
2,914,964 UART:
2,914,980 UART: Running Caliptra FMC ...
2,915,388 UART:
2,915,442 UART: [state] CFI Enabled
2,926,078 UART: [fht] FMC Alias Private Key: 7
3,045,914 UART: [art] Extend RT PCRs Done
3,046,342 UART: [art] Lock RT PCRs Done
3,048,044 UART: [art] Populate DV Done
3,056,297 UART: [fht] FMC Alias Private Key: 7
3,057,431 UART: [art] Derive CDI
3,057,711 UART: [art] Store in slot 0x4
3,143,328 UART: [art] Derive Key Pair
3,143,688 UART: [art] Store priv key in slot 0x5
3,157,006 UART: [art] Derive Key Pair - Done
3,171,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,787 UART: [art] PUB.X = 3B35489E8DB6250E69D57364C9E45759DCA7F9381B4995F73CB9BD0718602A70136B329123C41664E9B3BFD4E168CF01
3,194,544 UART: [art] PUB.Y = 7FD75278B5A72BF20D109EFC77B3AC2E4F4EB5F76E7BD6E710E42066B41AC624BE1F4D59DFB51769C5915D30C6361A27
3,201,503 UART: [art] SIG.R = 08D6CD25EF1860D6BDE55E6B777627715924BCF697C6E6EC8D009AF109C774D9093507D1554E40947EE6F200E678A08D
3,208,217 UART: [art] SIG.S = A36A10984BD6466D5CDF46DCD3BE144CEDC96B05A9AF7A5FDD0C059744289AB2EFED2BF35E3709F212E9AB76D75EBC24
3,231,729 UART: Caliptra RT
3,231,980 UART: [state] CFI Enabled
3,352,509 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,493 UART: [rt]cmd =0x44504543, len=96
3,565,559 >>> mbox cmd response data (6236 bytes)
3,565,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,463 UART:
3,566,479 UART: Running Caliptra ROM ...
3,566,887 UART:
3,566,942 UART: [state] CFI Enabled
3,569,520 UART: [state] LifecycleState = Unprovisioned
3,570,175 UART: [state] DebugLocked = No
3,570,799 UART: [state] WD Timer not started. Device not locked for debugging
3,571,929 UART: [kat] SHA2-256
4,375,479 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,379,583 UART: [kat] ++
4,379,735 UART: [kat] sha1
4,383,997 UART: [kat] SHA2-256
4,385,937 UART: [kat] SHA2-384
4,388,620 UART: [kat] SHA2-512-ACC
4,390,520 UART: [kat] ECC-384
4,400,319 UART: [kat] HMAC-384Kdf
4,404,809 UART: [kat] LMS
4,653,121 UART: [kat] --
4,653,985 UART: [update-reset] ++
6,011,614 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,012,813 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,168,028 >>> mbox cmd response: success
6,168,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,168,235 UART: [update-reset] Copying MAN_2 To MAN_1
6,176,249 UART: [update-reset Success] --
6,177,048 UART: [state] Locking Datavault
6,177,962 UART: [state] Locking PCR0, PCR1 and PCR31
6,178,566 UART: [state] Locking ICCM
6,179,014 UART: [exit] Launching FMC @ 0x40000130
6,184,344 UART:
6,184,360 UART: Running Caliptra FMC ...
6,184,768 UART:
6,184,822 UART: [state] CFI Enabled
6,273,995 UART: [art] Extend RT PCRs Done
6,274,423 UART: [art] Lock RT PCRs Done
6,275,858 UART: [art] Populate DV Done
6,284,107 UART: [fht] FMC Alias Private Key: 7
6,285,067 UART: [art] Derive CDI
6,285,347 UART: [art] Store in slot 0x4
6,370,682 UART: [art] Derive Key Pair
6,371,042 UART: [art] Store priv key in slot 0x5
6,384,518 UART: [art] Derive Key Pair - Done
6,399,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,414,674 UART: [art] Erasing AUTHORITY.KEYID = 7
6,415,439 UART: [art] PUB.X = FA911C0FA9570B1B885E3B585FB64DE77B316E89E67DD1532A2D4E12A00A1CE789E351D0354D1E8621F50DFFBFF7914A
6,422,209 UART: [art] PUB.Y = D3EB01E994D1B9604AE3CDEC801CB9D45AF537AD6C655908F252A3D1FE25E09D898766F2108DDC9E82BC16144154C32B
6,429,163 UART: [art] SIG.R = 175660C0394508D5215733D371B94585A6DEACF0F8E52C237776B7AFEBBEB29403934623841082711D02C7BDA8F9AE4F
6,435,922 UART: [art] SIG.S = 124B2183B649062EC8D13771E79B4E5F463B4B2174D74E242707EEA798D7B1732F510E647E551C1DA731BAA03123BD17
6,459,323 UART: Caliptra RT
6,459,574 UART: [state] CFI Enabled
6,818,061 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,848,342 UART: [rt]cmd =0x494e464f, len=4
6,852,022 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,762 ready_for_fw is high
1,058,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,484 >>> mbox cmd response: success
2,677,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,301 UART:
2,740,317 UART: Running Caliptra FMC ...
2,740,725 UART:
2,740,779 UART: [state] CFI Enabled
2,751,257 UART: [fht] FMC Alias Private Key: 7
2,869,931 UART: [art] Extend RT PCRs Done
2,870,359 UART: [art] Lock RT PCRs Done
2,871,979 UART: [art] Populate DV Done
2,880,486 UART: [fht] FMC Alias Private Key: 7
2,881,414 UART: [art] Derive CDI
2,881,694 UART: [art] Store in slot 0x4
2,967,567 UART: [art] Derive Key Pair
2,967,927 UART: [art] Store priv key in slot 0x5
2,980,975 UART: [art] Derive Key Pair - Done
2,996,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,993 UART: [art] PUB.X = 6C3A1ED495457EF1372C35D282FC4C7C6C94B12D6967D7B9B32BA667561FD89B6B499D01DD42A797DE3916390F8379F4
3,018,759 UART: [art] PUB.Y = 8ACE81CDD9B0EA9EC6258B5E60F445DD787B6BCFE4C67F417C67D05D4C691BFDCC0377AD988727F62417676C0B71C25E
3,025,719 UART: [art] SIG.R = 926BA898ADE4ED484923324B2CB272765E39D8D0C675A109F6301B58F60C080AC209C1680DCCF872CC130354574D29B8
3,032,466 UART: [art] SIG.S = ECD6B4BB017A7F67E7D5B5DE7576116BF0C67D40DC5CA67E39F5554AF905C3CF418BA437743A49E74E7D2EFDF639C9BC
3,056,080 UART: Caliptra RT
3,056,331 UART: [state] CFI Enabled
3,175,649 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,767 UART: [rt]cmd =0x44504543, len=96
3,388,526 >>> mbox cmd response data (6236 bytes)
3,388,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,876,007 >>> mbox cmd response: success
5,876,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,889,570 UART:
5,889,586 UART: Running Caliptra FMC ...
5,889,994 UART:
5,890,048 UART: [state] CFI Enabled
5,978,895 UART: [art] Extend RT PCRs Done
5,979,323 UART: [art] Lock RT PCRs Done
5,980,610 UART: [art] Populate DV Done
5,988,865 UART: [fht] FMC Alias Private Key: 7
5,989,897 UART: [art] Derive CDI
5,990,177 UART: [art] Store in slot 0x4
6,076,024 UART: [art] Derive Key Pair
6,076,384 UART: [art] Store priv key in slot 0x5
6,089,638 UART: [art] Derive Key Pair - Done
6,104,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,119,670 UART: [art] Erasing AUTHORITY.KEYID = 7
6,120,435 UART: [art] PUB.X = DEF4642F2087C84D1C5D3A0A39EB770A6080BA5C2F1062CAFC5C84EFEE2DCA96265C1B70930914A51C714E890515F18C
6,127,203 UART: [art] PUB.Y = 941DAF9695AE082995108241F423032FE14F2A5C280DDBF54D6B8F59066D697B70E01C5BCB1DF377FF1465FD76770E9B
6,134,142 UART: [art] SIG.R = 8DF0FD5E7919713F2398E427BFA317839A85EF5682EAE103EF82F8413B63D306F70FE50472E9B428643D5BE870BAA211
6,140,902 UART: [art] SIG.S = 2F50C68DE5B6C1AF1F03E6F77AE411749A511E379BA2287295FC225AECB5F840443D97F4726A0E086BDBB7A35A6765BF
6,164,405 UART: Caliptra RT
6,164,656 UART: [state] CFI Enabled
6,529,006 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,559,417 UART: [rt]cmd =0x494e464f, len=4
6,563,351 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,314 UART: [kat] SHA2-512-ACC
906,215 UART: [kat] ECC-384
915,790 UART: [kat] HMAC-384Kdf
920,588 UART: [kat] LMS
1,168,900 UART: [kat] --
1,169,663 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,549 UART: [idev] ++
1,172,717 UART: [idev] CDI.KEYID = 6
1,173,078 UART: [idev] SUBJECT.KEYID = 7
1,173,503 UART: [idev] UDS.KEYID = 0
1,173,849 ready_for_fw is high
1,173,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,150 UART: [idev] Erasing UDS.KEYID = 0
1,198,644 UART: [idev] Sha1 KeyId Algorithm
1,207,442 UART: [idev] --
1,208,595 UART: [ldev] ++
1,208,763 UART: [ldev] CDI.KEYID = 6
1,209,127 UART: [ldev] SUBJECT.KEYID = 5
1,209,554 UART: [ldev] AUTHORITY.KEYID = 7
1,210,017 UART: [ldev] FE.KEYID = 1
1,215,587 UART: [ldev] Erasing FE.KEYID = 1
1,242,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,439 UART: [ldev] --
1,281,832 UART: [fwproc] Wait for Commands...
1,282,513 UART: [fwproc] Recv command 0x46574c44
1,283,246 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,108 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,283 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,584 >>> mbox cmd response: success
2,824,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,825,670 UART: [afmc] ++
2,825,838 UART: [afmc] CDI.KEYID = 6
2,826,201 UART: [afmc] SUBJECT.KEYID = 7
2,826,627 UART: [afmc] AUTHORITY.KEYID = 5
2,861,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,976 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,686 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,567 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,268 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,959 UART: [afmc] --
2,904,922 UART: [cold-reset] --
2,905,582 UART: [state] Locking Datavault
2,906,597 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,201 UART: [state] Locking ICCM
2,907,805 UART: [exit] Launching FMC @ 0x40000130
2,913,135 UART:
2,913,151 UART: Running Caliptra FMC ...
2,913,559 UART:
2,913,702 UART: [state] CFI Enabled
2,924,198 UART: [fht] FMC Alias Private Key: 7
3,043,104 UART: [art] Extend RT PCRs Done
3,043,532 UART: [art] Lock RT PCRs Done
3,044,932 UART: [art] Populate DV Done
3,053,083 UART: [fht] FMC Alias Private Key: 7
3,054,119 UART: [art] Derive CDI
3,054,399 UART: [art] Store in slot 0x4
3,140,522 UART: [art] Derive Key Pair
3,140,882 UART: [art] Store priv key in slot 0x5
3,153,808 UART: [art] Derive Key Pair - Done
3,168,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,360 UART: [art] PUB.X = 6B8F298FDB10729CBEA663C843032D595BA3DB90D1ED382B5EED539FCD711FF78828D136B251E84F020FD09DB9BB8D5C
3,191,137 UART: [art] PUB.Y = C4FB23DFD93E1B6C4C4E9BE78F42B83EAA654FA77D2B5D06872CCDC034997B5D8E5662BE98114A10F69BAF94779AA569
3,198,100 UART: [art] SIG.R = 4E42AF14450520C55E5D76327D73C9B461CACA5177EE24235E0D49AE9E7ECE629AE4CD3244A7C6DE11EFEE8FA4297A6B
3,204,880 UART: [art] SIG.S = 7EF88CC371C4BDFFE7592F5F99F296102F7B7FF5B07CCF08B01AAA15D36DF11109083953D5276CCD4C3A6B9C30DE3C9D
3,229,095 UART: Caliptra RT
3,229,438 UART: [state] CFI Enabled
3,348,224 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,340 UART: [rt]cmd =0x44504543, len=96
3,561,299 >>> mbox cmd response data (6236 bytes)
3,561,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,561,953 UART:
3,561,969 UART: Running Caliptra ROM ...
3,562,377 UART:
3,562,519 UART: [state] CFI Enabled
3,565,501 UART: [state] LifecycleState = Unprovisioned
3,566,156 UART: [state] DebugLocked = No
3,566,640 UART: [state] WD Timer not started. Device not locked for debugging
3,567,786 UART: [kat] SHA2-256
4,371,336 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,375,440 UART: [kat] ++
4,375,592 UART: [kat] sha1
4,379,888 UART: [kat] SHA2-256
4,381,828 UART: [kat] SHA2-384
4,384,573 UART: [kat] SHA2-512-ACC
4,386,473 UART: [kat] ECC-384
4,396,160 UART: [kat] HMAC-384Kdf
4,400,948 UART: [kat] LMS
4,649,260 UART: [kat] --
4,649,860 UART: [update-reset] ++
6,007,867 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,008,882 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,164,097 >>> mbox cmd response: success
6,164,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,164,432 UART: [update-reset] Copying MAN_2 To MAN_1
6,172,446 UART: [update-reset Success] --
6,173,415 UART: [state] Locking Datavault
6,174,171 UART: [state] Locking PCR0, PCR1 and PCR31
6,174,775 UART: [state] Locking ICCM
6,175,425 UART: [exit] Launching FMC @ 0x40000130
6,180,755 UART:
6,180,771 UART: Running Caliptra FMC ...
6,181,179 UART:
6,181,322 UART: [state] CFI Enabled
6,270,583 UART: [art] Extend RT PCRs Done
6,271,011 UART: [art] Lock RT PCRs Done
6,272,228 UART: [art] Populate DV Done
6,280,337 UART: [fht] FMC Alias Private Key: 7
6,281,515 UART: [art] Derive CDI
6,281,795 UART: [art] Store in slot 0x4
6,367,376 UART: [art] Derive Key Pair
6,367,736 UART: [art] Store priv key in slot 0x5
6,381,704 UART: [art] Derive Key Pair - Done
6,396,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,411,151 UART: [art] Erasing AUTHORITY.KEYID = 7
6,411,916 UART: [art] PUB.X = 77F3DB65D6AE4138BD1F90151E50396A499D4B37B78C63E1695F3A25CE28669736193DAE60229EED1D76EA3C5BE734B5
6,418,690 UART: [art] PUB.Y = A6646D6AC940E740D5215E2908E5D816BE0D1867B4D8C71753542CA4F4961414EE7051CA26DE0D556D9E00BAAEB6585C
6,425,613 UART: [art] SIG.R = A83FD663EE22044B766899FF3DD88BFCA7491CCF81AD4642AEB2ABEDEBA2F5F53774925FCB9E319023D1674D812DB5C7
6,432,398 UART: [art] SIG.S = 0849847F6EED223B2B89C0D8A8163B7531EB4306A0B98F08DB68836499B32671667A7337D583D4E079BC1AC3C716552A
6,456,249 UART: Caliptra RT
6,456,592 UART: [state] CFI Enabled
6,822,018 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,852,035 UART: [rt]cmd =0x494e464f, len=4
6,855,953 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,023 ready_for_fw is high
1,060,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,855 >>> mbox cmd response: success
2,680,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,104 UART:
2,742,120 UART: Running Caliptra FMC ...
2,742,528 UART:
2,742,671 UART: [state] CFI Enabled
2,753,225 UART: [fht] FMC Alias Private Key: 7
2,871,999 UART: [art] Extend RT PCRs Done
2,872,427 UART: [art] Lock RT PCRs Done
2,873,879 UART: [art] Populate DV Done
2,881,872 UART: [fht] FMC Alias Private Key: 7
2,882,934 UART: [art] Derive CDI
2,883,214 UART: [art] Store in slot 0x4
2,969,019 UART: [art] Derive Key Pair
2,969,379 UART: [art] Store priv key in slot 0x5
2,982,611 UART: [art] Derive Key Pair - Done
2,997,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,747 UART: [art] PUB.X = 080A771D70F657B8CCAA68FEC800EFC70230830A8904A2266CD9AD59BC7A0131CC330AD33A1BBC41B8A57926B01BBDCD
3,020,490 UART: [art] PUB.Y = 7625E50859120853FED7F2019021DA99412F51EF7647309731542AC7EDD75406298034740FB6C84FDF355B89AF2763F1
3,027,413 UART: [art] SIG.R = 35053932100BFCB023A8915A6E7F8679CB9C7D92567AADBE2FA170C501BFEC5A7ECFA0A7BB3F185896838E15A1B83BD7
3,034,188 UART: [art] SIG.S = F83870D4DBA56186A80A09F26FAF6AAEB99D3AD6493170EB6070D9793DCAE3F3BE9BEBAE440229034B636D4FF8A0FE37
3,058,258 UART: Caliptra RT
3,058,601 UART: [state] CFI Enabled
3,177,592 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,682 UART: [rt]cmd =0x44504543, len=96
3,390,066 >>> mbox cmd response data (6236 bytes)
3,390,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,879,096 >>> mbox cmd response: success
5,879,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,892,553 UART:
5,892,569 UART: Running Caliptra FMC ...
5,892,977 UART:
5,893,120 UART: [state] CFI Enabled
5,982,353 UART: [art] Extend RT PCRs Done
5,982,781 UART: [art] Lock RT PCRs Done
5,984,014 UART: [art] Populate DV Done
5,992,559 UART: [fht] FMC Alias Private Key: 7
5,993,547 UART: [art] Derive CDI
5,993,827 UART: [art] Store in slot 0x4
6,080,062 UART: [art] Derive Key Pair
6,080,422 UART: [art] Store priv key in slot 0x5
6,093,926 UART: [art] Derive Key Pair - Done
6,108,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,124,175 UART: [art] Erasing AUTHORITY.KEYID = 7
6,124,940 UART: [art] PUB.X = FE355CB5CE811DA949A2DC5327B41D0CF178BB419F3FE56230D7D03B00364F87AAC465B23718965B750ED57F68DEF249
6,131,690 UART: [art] PUB.Y = 48D8A5F1430F9D7C23520F42BE6E18D3687F92A6E8AB30804C7C37637C1D39F65D923AA6FB3EFCB52723A606A454D344
6,138,635 UART: [art] SIG.R = 8DBBE6CDB511C1BF8FC5D6F052C584CCFB8D42554AD541415B74AFF861468415F674816BCD9C1F78099BD34250BE4B8C
6,145,416 UART: [art] SIG.S = 708ED2C6E1A85BEEDA3219C4D25E2C7B60A3577E4994ABBCFF16354FBB63C9098D3EFB19780422670FAE4E0AEA1817B0
6,169,958 UART: Caliptra RT
6,170,301 UART: [state] CFI Enabled
6,538,367 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,568,474 UART: [rt]cmd =0x494e464f, len=4
6,572,044 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
893,560 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,685 UART: [kat] ++
897,837 UART: [kat] sha1
902,211 UART: [kat] SHA2-256
904,151 UART: [kat] SHA2-384
906,956 UART: [kat] SHA2-512-ACC
908,857 UART: [kat] ECC-384
918,428 UART: [kat] HMAC-384Kdf
922,898 UART: [kat] LMS
1,171,226 UART: [kat] --
1,172,063 UART: [cold-reset] ++
1,172,583 UART: [fht] FHT @ 0x50003400
1,175,262 UART: [idev] ++
1,175,430 UART: [idev] CDI.KEYID = 6
1,175,790 UART: [idev] SUBJECT.KEYID = 7
1,176,214 UART: [idev] UDS.KEYID = 0
1,176,559 ready_for_fw is high
1,176,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,152 UART: [idev] Erasing UDS.KEYID = 0
1,200,757 UART: [idev] Sha1 KeyId Algorithm
1,209,241 UART: [idev] --
1,210,249 UART: [ldev] ++
1,210,417 UART: [ldev] CDI.KEYID = 6
1,210,780 UART: [ldev] SUBJECT.KEYID = 5
1,211,206 UART: [ldev] AUTHORITY.KEYID = 7
1,211,669 UART: [ldev] FE.KEYID = 1
1,216,993 UART: [ldev] Erasing FE.KEYID = 1
1,242,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,449 UART: [ldev] --
1,281,768 UART: [fwproc] Wait for Commands...
1,282,524 UART: [fwproc] Recv command 0x46574c44
1,283,252 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,010 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,180 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,385 >>> mbox cmd response: success
2,825,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,826,575 UART: [afmc] ++
2,826,743 UART: [afmc] CDI.KEYID = 6
2,827,105 UART: [afmc] SUBJECT.KEYID = 7
2,827,530 UART: [afmc] AUTHORITY.KEYID = 5
2,863,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,628 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,376 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,085 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,968 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,669 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,445 UART: [afmc] --
2,906,349 UART: [cold-reset] --
2,907,141 UART: [state] Locking Datavault
2,908,332 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,936 UART: [state] Locking ICCM
2,909,444 UART: [exit] Launching FMC @ 0x40000130
2,914,774 UART:
2,914,790 UART: Running Caliptra FMC ...
2,915,198 UART:
2,915,252 UART: [state] CFI Enabled
2,926,072 UART: [fht] FMC Alias Private Key: 7
3,044,518 UART: [art] Extend RT PCRs Done
3,044,946 UART: [art] Lock RT PCRs Done
3,046,734 UART: [art] Populate DV Done
3,055,063 UART: [fht] FMC Alias Private Key: 7
3,056,171 UART: [art] Derive CDI
3,056,451 UART: [art] Store in slot 0x4
3,142,232 UART: [art] Derive Key Pair
3,142,592 UART: [art] Store priv key in slot 0x5
3,155,724 UART: [art] Derive Key Pair - Done
3,170,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,081 UART: [art] PUB.X = F671B2549BBA56A5B2031FABF8356AE1E58E5D70D5F7442D0F8199D78DF78606ED21B488BC72E8A24136280679B01D72
3,193,841 UART: [art] PUB.Y = E715613ECA4A70383A028438618ED65323C9B9CDB7A4ADF3B67B1E0E4488298B1D014A2C7236CF36E1A9DE4CAD41E7A5
3,200,792 UART: [art] SIG.R = 7AE54FB17306BCB4FA60F6337FA8216D66DC932C6C423ECDF3352F92F085A2E70FCF27E9648AC6E6CD964FEAE0B9A051
3,207,574 UART: [art] SIG.S = 8BCDE235022FA75C3D1E66F4B6023B4EA80644CFD624008E74AA19F197B89F04B9A5FF0C1120E3F613D5CF20178F26E5
3,231,847 UART: Caliptra RT
3,232,098 UART: [state] CFI Enabled
3,352,291 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,499 UART: [rt]cmd =0x44504543, len=96
3,566,095 >>> mbox cmd response data (6236 bytes)
3,566,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,943 UART:
3,566,959 UART: Running Caliptra ROM ...
3,567,367 UART:
3,567,422 UART: [state] CFI Enabled
3,569,936 UART: [state] LifecycleState = Unprovisioned
3,570,591 UART: [state] DebugLocked = No
3,571,179 UART: [state] WD Timer not started. Device not locked for debugging
3,572,405 UART: [kat] SHA2-256
4,378,055 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,382,180 UART: [kat] ++
4,382,332 UART: [kat] sha1
4,386,668 UART: [kat] SHA2-256
4,388,608 UART: [kat] SHA2-384
4,391,347 UART: [kat] SHA2-512-ACC
4,393,247 UART: [kat] ECC-384
4,402,640 UART: [kat] HMAC-384Kdf
4,407,126 UART: [kat] LMS
4,655,454 UART: [kat] --
4,656,348 UART: [update-reset] ++
6,014,938 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,016,117 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,171,332 >>> mbox cmd response: success
6,171,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,171,633 UART: [update-reset] Copying MAN_2 To MAN_1
6,179,647 UART: [update-reset Success] --
6,180,504 UART: [state] Locking Datavault
6,181,172 UART: [state] Locking PCR0, PCR1 and PCR31
6,181,776 UART: [state] Locking ICCM
6,182,402 UART: [exit] Launching FMC @ 0x40000130
6,187,732 UART:
6,187,748 UART: Running Caliptra FMC ...
6,188,156 UART:
6,188,210 UART: [state] CFI Enabled
6,276,533 UART: [art] Extend RT PCRs Done
6,276,961 UART: [art] Lock RT PCRs Done
6,278,174 UART: [art] Populate DV Done
6,286,217 UART: [fht] FMC Alias Private Key: 7
6,287,157 UART: [art] Derive CDI
6,287,437 UART: [art] Store in slot 0x4
6,372,726 UART: [art] Derive Key Pair
6,373,086 UART: [art] Store priv key in slot 0x5
6,386,580 UART: [art] Derive Key Pair - Done
6,401,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,416,953 UART: [art] Erasing AUTHORITY.KEYID = 7
6,417,718 UART: [art] PUB.X = E832EDEB81F1EAFB0342DB7A52788222690E87043B9D4216E4B62247AD64394A4A4978A52C47462A632CBEA3A1B5A43A
6,424,483 UART: [art] PUB.Y = 8FB874EF7EF9F5730334CEADEE9432C02845127FEB94F0B02EB94820B3C7DD733BB91333ED814A8FCC01E99B396F7094
6,431,437 UART: [art] SIG.R = 4C33A349DAE42E08401E0479AA1F1AA9DEEA004AA7046023CE2ED3E0A64B2A0ECBBE8A65AEE3EB7B4654893789B71C5B
6,438,193 UART: [art] SIG.S = A526BDC3CDE7F0AFDC6CEF1DCF2E001CB4CB0AD5378BEE3E7E349764B9FAC434117EC5583A8C4BFA3E33088A761D4A2A
6,462,341 UART: Caliptra RT
6,462,592 UART: [state] CFI Enabled
6,829,416 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,859,683 UART: [rt]cmd =0x494e464f, len=4
6,863,523 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,721 ready_for_fw is high
1,059,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,310 >>> mbox cmd response: success
2,681,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,743,195 UART:
2,743,211 UART: Running Caliptra FMC ...
2,743,619 UART:
2,743,673 UART: [state] CFI Enabled
2,754,095 UART: [fht] FMC Alias Private Key: 7
2,873,013 UART: [art] Extend RT PCRs Done
2,873,441 UART: [art] Lock RT PCRs Done
2,874,615 UART: [art] Populate DV Done
2,883,114 UART: [fht] FMC Alias Private Key: 7
2,884,240 UART: [art] Derive CDI
2,884,520 UART: [art] Store in slot 0x4
2,970,197 UART: [art] Derive Key Pair
2,970,557 UART: [art] Store priv key in slot 0x5
2,983,203 UART: [art] Derive Key Pair - Done
2,998,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,540 UART: [art] PUB.X = 5D94C739983BA354C07DF4AF26BFC798815C2EB8AF74FF62F4758CE62502985DF56ED05BAB9BA9E3AEE7A97AE9B39F47
3,021,325 UART: [art] PUB.Y = A113459CFA45077E5D9C4970B2C6A0542A34AF02B1737DB541677D13BB9E978ECF7F26953DFBD2B546454225FAED98F8
3,028,275 UART: [art] SIG.R = 1880AD0F742ACCB5F9235D4B49CE13633E0EB9EC2B8E38691173F4748D702925EE56CE849EDA62CCA2AD711668B75170
3,035,045 UART: [art] SIG.S = 68C61B2CC07776364475C0B8F718C8571DD69D825D40C6ED919D3BE15A4F0D75F88FB958D0205993A9BDA1E1A61524A6
3,059,290 UART: Caliptra RT
3,059,541 UART: [state] CFI Enabled
3,178,805 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,661 UART: [rt]cmd =0x44504543, len=96
3,391,531 >>> mbox cmd response data (6236 bytes)
3,391,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,882,167 >>> mbox cmd response: success
5,882,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,895,568 UART:
5,895,584 UART: Running Caliptra FMC ...
5,895,992 UART:
5,896,046 UART: [state] CFI Enabled
5,985,045 UART: [art] Extend RT PCRs Done
5,985,473 UART: [art] Lock RT PCRs Done
5,986,644 UART: [art] Populate DV Done
5,994,789 UART: [fht] FMC Alias Private Key: 7
5,995,961 UART: [art] Derive CDI
5,996,241 UART: [art] Store in slot 0x4
6,082,000 UART: [art] Derive Key Pair
6,082,360 UART: [art] Store priv key in slot 0x5
6,095,342 UART: [art] Derive Key Pair - Done
6,110,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,125,651 UART: [art] Erasing AUTHORITY.KEYID = 7
6,126,416 UART: [art] PUB.X = 2570AC7FB984AE7A4C88ABBBDD0B2C4169663B8467C05DBE5BB2C7EC6F828C74404BB6F25AFBCC94E11608A4C4F03E19
6,133,200 UART: [art] PUB.Y = 0F0F6BFBA7A0B2D20B6E1ADEDB69789E04B5AFD9FA692C0DBEC8D91E81330D55C255D0507CEADD3FACADFFE3547415BA
6,140,166 UART: [art] SIG.R = 35E0B8473609A6BBDAF2A22869FDD695DD7EF74BE4D3E8211AF460B6BD71F24D5D634AD60A66553F1CF48E7C13404AF2
6,146,944 UART: [art] SIG.S = F6005846B75BE6E53D020D56E7CDC03AC8FA179ACB74138F76AB37FCD83309F69186BBF1D628E8911EE84FBC035EDA46
6,170,366 UART: Caliptra RT
6,170,617 UART: [state] CFI Enabled
6,535,975 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,566,046 UART: [rt]cmd =0x494e464f, len=4
6,569,582 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,557 UART: [kat] SHA2-256
893,207 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,332 UART: [kat] ++
897,484 UART: [kat] sha1
901,860 UART: [kat] SHA2-256
903,800 UART: [kat] SHA2-384
906,449 UART: [kat] SHA2-512-ACC
908,350 UART: [kat] ECC-384
918,103 UART: [kat] HMAC-384Kdf
922,587 UART: [kat] LMS
1,170,915 UART: [kat] --
1,171,840 UART: [cold-reset] ++
1,172,362 UART: [fht] FHT @ 0x50003400
1,175,119 UART: [idev] ++
1,175,287 UART: [idev] CDI.KEYID = 6
1,175,647 UART: [idev] SUBJECT.KEYID = 7
1,176,071 UART: [idev] UDS.KEYID = 0
1,176,416 ready_for_fw is high
1,176,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,055 UART: [idev] Erasing UDS.KEYID = 0
1,200,966 UART: [idev] Sha1 KeyId Algorithm
1,209,252 UART: [idev] --
1,210,318 UART: [ldev] ++
1,210,486 UART: [ldev] CDI.KEYID = 6
1,210,849 UART: [ldev] SUBJECT.KEYID = 5
1,211,275 UART: [ldev] AUTHORITY.KEYID = 7
1,211,738 UART: [ldev] FE.KEYID = 1
1,216,950 UART: [ldev] Erasing FE.KEYID = 1
1,243,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,724 UART: [ldev] --
1,283,069 UART: [fwproc] Wait for Commands...
1,283,755 UART: [fwproc] Recv command 0x46574c44
1,284,483 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,513 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,683 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,944 >>> mbox cmd response: success
2,826,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,180 UART: [afmc] ++
2,828,348 UART: [afmc] CDI.KEYID = 6
2,828,710 UART: [afmc] SUBJECT.KEYID = 7
2,829,135 UART: [afmc] AUTHORITY.KEYID = 5
2,864,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,951 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,660 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,543 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,244 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,084 UART: [afmc] --
2,908,172 UART: [cold-reset] --
2,908,966 UART: [state] Locking Datavault
2,910,189 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,793 UART: [state] Locking ICCM
2,911,411 UART: [exit] Launching FMC @ 0x40000130
2,916,741 UART:
2,916,757 UART: Running Caliptra FMC ...
2,917,165 UART:
2,917,308 UART: [state] CFI Enabled
2,928,032 UART: [fht] FMC Alias Private Key: 7
3,047,262 UART: [art] Extend RT PCRs Done
3,047,690 UART: [art] Lock RT PCRs Done
3,049,386 UART: [art] Populate DV Done
3,057,827 UART: [fht] FMC Alias Private Key: 7
3,058,777 UART: [art] Derive CDI
3,059,057 UART: [art] Store in slot 0x4
3,144,608 UART: [art] Derive Key Pair
3,144,968 UART: [art] Store priv key in slot 0x5
3,158,924 UART: [art] Derive Key Pair - Done
3,173,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,466 UART: [art] PUB.X = 70F31FAECCF4CF50D0D569F662F3CCA46AE2EC9EFDC35C566E8B0ED6C8121059E820405B445AE5413D30DC242E92F6D4
3,197,251 UART: [art] PUB.Y = 187C1CF5F1E680389F8CCB19D2180A5B0576E9C2B93DE19373E1FB3C1371B8AF66B9E54AF48C16C9B6481EBC052DCD0E
3,204,203 UART: [art] SIG.R = 5944C1850C60F0801A10501463E7CD5A3878666E033FDBBB8CC6CD47F82D3E46A09A86484A40B2A5DCB93EE57FE1C4FD
3,210,977 UART: [art] SIG.S = EEAB7C3F2F98627009D8A2A5FD63A4289810641E0AA6D1F1ABFE5DD17A1CD0E0E3B76644F3CF44DDCC581D2051C2EE04
3,234,808 UART: Caliptra RT
3,235,151 UART: [state] CFI Enabled
3,354,946 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,112 UART: [rt]cmd =0x44504543, len=96
3,568,794 >>> mbox cmd response data (6236 bytes)
3,568,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,569,464 UART:
3,569,480 UART: Running Caliptra ROM ...
3,569,888 UART:
3,570,030 UART: [state] CFI Enabled
3,572,684 UART: [state] LifecycleState = Unprovisioned
3,573,339 UART: [state] DebugLocked = No
3,574,049 UART: [state] WD Timer not started. Device not locked for debugging
3,575,299 UART: [kat] SHA2-256
4,380,949 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,385,074 UART: [kat] ++
4,385,226 UART: [kat] sha1
4,389,462 UART: [kat] SHA2-256
4,391,402 UART: [kat] SHA2-384
4,394,211 UART: [kat] SHA2-512-ACC
4,396,111 UART: [kat] ECC-384
4,405,878 UART: [kat] HMAC-384Kdf
4,410,652 UART: [kat] LMS
4,658,980 UART: [kat] --
4,659,700 UART: [update-reset] ++
6,017,916 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,018,991 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,174,206 >>> mbox cmd response: success
6,174,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,174,397 UART: [update-reset] Copying MAN_2 To MAN_1
6,182,411 UART: [update-reset Success] --
6,183,302 UART: [state] Locking Datavault
6,184,152 UART: [state] Locking PCR0, PCR1 and PCR31
6,184,756 UART: [state] Locking ICCM
6,185,372 UART: [exit] Launching FMC @ 0x40000130
6,190,702 UART:
6,190,718 UART: Running Caliptra FMC ...
6,191,126 UART:
6,191,269 UART: [state] CFI Enabled
6,280,938 UART: [art] Extend RT PCRs Done
6,281,366 UART: [art] Lock RT PCRs Done
6,282,827 UART: [art] Populate DV Done
6,291,068 UART: [fht] FMC Alias Private Key: 7
6,292,044 UART: [art] Derive CDI
6,292,324 UART: [art] Store in slot 0x4
6,378,263 UART: [art] Derive Key Pair
6,378,623 UART: [art] Store priv key in slot 0x5
6,391,945 UART: [art] Derive Key Pair - Done
6,406,450 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,422,121 UART: [art] Erasing AUTHORITY.KEYID = 7
6,422,886 UART: [art] PUB.X = DFECB7DC8B95140203E08AE9ABB94323CC8C5B98C91C3AA001D70A0413867F9B9677D226A953C85780B8F45842E769DE
6,429,647 UART: [art] PUB.Y = BD68B4BB05FB8AC635E3EC21625B0BD4D247044B431C12311A42869EB45FBE0724F1EEB418DA7C529CE50287B8C5E2B7
6,436,594 UART: [art] SIG.R = AED4EDCEFCFBF435F0EF30A5D7564E8037727B41D4EB5BF48D5C87BBDCA5D9014155875F589C017A5E4681074540D038
6,443,367 UART: [art] SIG.S = 3A0865DDFEDBB70CA121AF2711215CB4384A7483AF172B6B9A5332C1932553237379E3582B34860B54B7C940E03F5B3A
6,466,870 UART: Caliptra RT
6,467,213 UART: [state] CFI Enabled
6,835,529 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,865,766 UART: [rt]cmd =0x494e464f, len=4
6,869,352 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,866 ready_for_fw is high
1,060,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,235 >>> mbox cmd response: success
2,680,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,743,074 UART:
2,743,090 UART: Running Caliptra FMC ...
2,743,498 UART:
2,743,641 UART: [state] CFI Enabled
2,754,379 UART: [fht] FMC Alias Private Key: 7
2,874,027 UART: [art] Extend RT PCRs Done
2,874,455 UART: [art] Lock RT PCRs Done
2,875,977 UART: [art] Populate DV Done
2,884,112 UART: [fht] FMC Alias Private Key: 7
2,885,060 UART: [art] Derive CDI
2,885,340 UART: [art] Store in slot 0x4
2,971,137 UART: [art] Derive Key Pair
2,971,497 UART: [art] Store priv key in slot 0x5
2,984,431 UART: [art] Derive Key Pair - Done
2,999,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,032 UART: [art] PUB.X = 08A6D70EE2104E946DFB2FCC34DB244318A75AE3196FA572C315AF5BEA10B30F3714CD6EF3478701C479AF7F2B8CD088
3,021,802 UART: [art] PUB.Y = A753D45A7250BF1F7F985D0A588D1ABB27FCB7C61384ED9E15FBFBB71DCE30FA7BB45A1F36C758552F1640DE6614DF7D
3,028,769 UART: [art] SIG.R = 59D0CB07AEFBD2F58B3A38CD9E4FFF177FCCBEE87320DFD04833434114A23D6289C7D4AC38D37ABA34AB59DA7A03CA55
3,035,557 UART: [art] SIG.S = A0BEA6E7696C709060BB1C8611D0B9B7F579A574F0BCF15846EB8FD4DEBE716532BB2C706597228ACB84F63C8319A8BD
3,059,119 UART: Caliptra RT
3,059,462 UART: [state] CFI Enabled
3,178,439 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,595 UART: [rt]cmd =0x44504543, len=96
3,391,500 >>> mbox cmd response data (6236 bytes)
3,391,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,881,311 >>> mbox cmd response: success
5,881,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,894,724 UART:
5,894,740 UART: Running Caliptra FMC ...
5,895,148 UART:
5,895,291 UART: [state] CFI Enabled
5,984,716 UART: [art] Extend RT PCRs Done
5,985,144 UART: [art] Lock RT PCRs Done
5,986,495 UART: [art] Populate DV Done
5,994,738 UART: [fht] FMC Alias Private Key: 7
5,995,730 UART: [art] Derive CDI
5,996,010 UART: [art] Store in slot 0x4
6,081,637 UART: [art] Derive Key Pair
6,081,997 UART: [art] Store priv key in slot 0x5
6,094,471 UART: [art] Derive Key Pair - Done
6,108,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,123,942 UART: [art] Erasing AUTHORITY.KEYID = 7
6,124,707 UART: [art] PUB.X = 65F1BDB5B7A7559B0CC454A23C8B0E21C24878820011942B4838FB4B38F8D0D8BC8DF32083B93477619D92D236186F94
6,131,445 UART: [art] PUB.Y = 205F5C17FEBEDE06C4F15F8386B6C1C2EDD839274DA443BAEA2D9D0A23124E05768FABA8F7A7EE88B614F84D4E8C8518
6,138,404 UART: [art] SIG.R = 82D04DDAF2A9F3E31D955571BC8B9DEE4E3088362D718FE74FC5E22D203302BE4FD0EE60C79CB6E8DD51AB425A46618C
6,145,187 UART: [art] SIG.S = FED3688ABD297A80F4FDD046A3122F0B1F1C62E853C8FAC4A6068EC543372AA9F2C5D309D3FE94476AA881393E9615B4
6,169,252 UART: Caliptra RT
6,169,595 UART: [state] CFI Enabled
6,537,716 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,567,899 UART: [rt]cmd =0x494e464f, len=4
6,571,689 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,287 UART:
192,629 UART: Running Caliptra ROM ...
193,808 UART:
193,964 UART: [state] CFI Enabled
265,069 UART: [state] LifecycleState = Unprovisioned
267,000 UART: [state] DebugLocked = No
268,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,573 UART: [kat] SHA2-256
442,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,830 UART: [kat] ++
453,279 UART: [kat] sha1
464,940 UART: [kat] SHA2-256
467,666 UART: [kat] SHA2-384
473,377 UART: [kat] SHA2-512-ACC
475,702 UART: [kat] ECC-384
2,766,216 UART: [kat] HMAC-384Kdf
2,798,431 UART: [kat] LMS
3,988,667 UART: [kat] --
3,993,583 UART: [cold-reset] ++
3,995,611 UART: [fht] Storing FHT @ 0x50003400
4,006,559 UART: [idev] ++
4,007,145 UART: [idev] CDI.KEYID = 6
4,008,081 UART: [idev] SUBJECT.KEYID = 7
4,009,340 UART: [idev] UDS.KEYID = 0
4,010,443 ready_for_fw is high
4,010,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,840 UART: [idev] Erasing UDS.KEYID = 0
7,344,080 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,330 UART: [idev] --
7,370,255 UART: [ldev] ++
7,370,835 UART: [ldev] CDI.KEYID = 6
7,371,813 UART: [ldev] SUBJECT.KEYID = 5
7,372,977 UART: [ldev] AUTHORITY.KEYID = 7
7,374,264 UART: [ldev] FE.KEYID = 1
7,419,775 UART: [ldev] Erasing FE.KEYID = 1
10,753,386 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,304 UART: [ldev] --
13,113,667 UART: [fwproc] Waiting for Commands...
13,116,147 UART: [fwproc] Received command 0x46574c44
13,118,367 UART: [fwproc] Received Image of size 118548 bytes
17,223,390 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,294,004 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,367,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,378 >>> mbox cmd response: success
17,697,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,700,380 UART: [afmc] ++
17,700,969 UART: [afmc] CDI.KEYID = 6
17,701,883 UART: [afmc] SUBJECT.KEYID = 7
17,703,156 UART: [afmc] AUTHORITY.KEYID = 5
21,067,315 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,445 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,713 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,158 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,873 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,249 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,616 UART: [afmc] --
23,440,463 UART: [cold-reset] --
23,443,856 UART: [state] Locking Datavault
23,449,644 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,400 UART: [state] Locking ICCM
23,454,174 UART: [exit] Launching FMC @ 0x40000130
23,462,573 UART:
23,462,817 UART: Running Caliptra FMC ...
23,463,920 UART:
23,464,079 UART: [state] CFI Enabled
23,528,947 UART: [fht] FMC Alias Private Key: 7
25,869,555 UART: [art] Extend RT PCRs Done
25,870,781 UART: [art] Lock RT PCRs Done
25,872,601 UART: [art] Populate DV Done
25,878,095 UART: [fht] FMC Alias Private Key: 7
25,879,696 UART: [art] Derive CDI
25,880,514 UART: [art] Store in slot 0x4
25,937,323 UART: [art] Derive Key Pair
25,938,367 UART: [art] Store priv key in slot 0x5
29,230,408 UART: [art] Derive Key Pair - Done
29,243,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,988 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,496 UART: [art] PUB.X = 60A79BDDDFE431F6BDB909BDD91AC95EE11C61F77FB437E8B52172DC758C993ECBD10302A4C9A26CE0B081E06C4DA3DA
31,541,761 UART: [art] PUB.Y = A98CC319714BB917EC5DB7C50F30E622513D8CC6EEE379C6B660C4B84B47AAEF5EFA24B3FD777E416A5A3F9DDF3E6700
31,549,004 UART: [art] SIG.R = AD513C222568D4F66C2952AB117C6F11021BB08AA27392748A959D3E08025E32732EAE78CEA0ACC1B9181B0E6F43CD4C
31,556,434 UART: [art] SIG.S = 077021B80C9AAF6B25374A3B86B2EBD273B2F8E3CF32EA977A469EDE161672904FED59BCA5EAC00C408EE748D0324584
32,861,629 UART: Caliptra RT
32,862,344 UART: [state] CFI Enabled
33,038,418 UART: [rt] RT listening for mailbox commands...
33,070,706 UART: [rt]cmd =0x44504543, len=96
38,851,647 >>> mbox cmd response data (6236 bytes)
40,956,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,107,023 UART:
41,107,403 UART: Running Caliptra ROM ...
41,108,541 UART:
41,108,714 UART: [state] CFI Enabled
41,171,776 UART: [state] LifecycleState = Unprovisioned
41,173,721 UART: [state] DebugLocked = No
41,175,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
41,180,115 UART: [kat] SHA2-256
41,349,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,360,321 UART: [kat] ++
41,360,870 UART: [kat] sha1
41,373,055 UART: [kat] SHA2-256
41,375,756 UART: [kat] SHA2-384
41,382,875 UART: [kat] SHA2-512-ACC
41,385,274 UART: [kat] ECC-384
43,674,133 UART: [kat] HMAC-384Kdf
43,706,785 UART: [kat] LMS
44,897,142 UART: [kat] --
44,900,503 UART: [update-reset] ++
49,092,677 UART: [update-reset] Image verified using Vendor ECC Key Index 0
49,096,304 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,494,078 >>> mbox cmd response: success
49,494,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,495,913 UART: [update-reset] Copying MAN_2 To MAN_1
49,518,314 UART: [update-reset Success] --
49,523,321 UART: [state] Locking Datavault
49,525,720 UART: [state] Locking PCR0, PCR1 and PCR31
49,527,421 UART: [state] Locking ICCM
49,528,548 UART: [exit] Launching FMC @ 0x40000130
49,536,942 UART:
49,537,174 UART: Running Caliptra FMC ...
49,538,274 UART:
49,538,429 UART: [state] CFI Enabled
49,626,412 UART: [art] Extend RT PCRs Done
49,627,613 UART: [art] Lock RT PCRs Done
49,629,014 UART: [art] Populate DV Done
49,634,692 UART: [fht] FMC Alias Private Key: 7
49,636,396 UART: [art] Derive CDI
49,637,283 UART: [art] Store in slot 0x4
49,695,335 UART: [art] Derive Key Pair
49,696,382 UART: [art] Store priv key in slot 0x5
52,988,816 UART: [art] Derive Key Pair - Done
53,001,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,289,667 UART: [art] Erasing AUTHORITY.KEYID = 7
55,291,185 UART: [art] PUB.X = D1091AB90F64BA5F772B9C7186C720CECA75511FAA939C2D764E552513A2D9FB9ABC7F4EB5C150EC3593B25936AE5AF9
55,298,464 UART: [art] PUB.Y = E2F56975705FD4D0DF21FA25D49D92946B3FC495C0FC34DD5EC0EF9B7B1B4CB4279EB186B3AB336EC94C0021733D3AF9
55,305,769 UART: [art] SIG.R = 0B80518995B2C1D6D99538AD7C104ABBB8106BCD5B7C4EAF5B94C7DB02E177531142DFFF28D1D203ABF09E96A9378C04
55,313,127 UART: [art] SIG.S = 81E59A612EE5EE6892386052B545777C79647738B25553E8D99E1761C1828FEE975EDB3E38EC8F672977559CD569ACFB
56,618,481 UART: Caliptra RT
56,619,169 UART: [state] CFI Enabled
57,044,012 UART: [rt] RT failed reset flow
57,045,217 UART: Fatal Error: 0x000E0035
57,046,805 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,809,067 ready_for_fw is high
3,809,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,959,176 >>> mbox cmd response: success
17,960,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,655,880 UART:
23,656,261 UART: Running Caliptra FMC ...
23,657,462 UART:
23,657,635 UART: [state] CFI Enabled
23,725,249 UART: [fht] FMC Alias Private Key: 7
26,066,222 UART: [art] Extend RT PCRs Done
26,067,456 UART: [art] Lock RT PCRs Done
26,069,087 UART: [art] Populate DV Done
26,074,623 UART: [fht] FMC Alias Private Key: 7
26,076,271 UART: [art] Derive CDI
26,077,093 UART: [art] Store in slot 0x4
26,134,188 UART: [art] Derive Key Pair
26,135,267 UART: [art] Store priv key in slot 0x5
29,427,832 UART: [art] Derive Key Pair - Done
29,440,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,518 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,033 UART: [art] PUB.X = 829877665EC75F0E38BCAA45319CAB9418A69FA3C828A7B71F795CC16A64EC59484B3146DE9FFC816FD8962BA8A34FED
31,739,369 UART: [art] PUB.Y = 613872726BFF386312B0575B81348379C9932BDB6730A1FB82E1D9B4191FEC89DA67516E8AA95246F239ECC4B97925D2
31,746,584 UART: [art] SIG.R = 618ED23F6C0F162F917008DFDB4D0FC50E2C051D3569EB50DEE29517F4A8FDF3AAAB0D9073C66E74985676907A55FA23
31,753,989 UART: [art] SIG.S = 82E8128373C7F4457567D7F90E549014275D2D6CB97D57B4CCB1751D280297EA1DBA6CCF85628089D87CA4290BC4596A
33,059,066 UART: Caliptra RT
33,059,787 UART: [state] CFI Enabled
33,236,871 UART: [rt] RT listening for mailbox commands...
33,268,821 UART: [rt]cmd =0x44504543, len=96
39,049,607 >>> mbox cmd response data (6236 bytes)
41,151,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,956,746 >>> mbox cmd response: success
49,957,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,991,319 UART:
49,991,637 UART: Running Caliptra FMC ...
49,992,774 UART:
49,992,938 UART: [state] CFI Enabled
50,084,812 UART: [art] Extend RT PCRs Done
50,085,998 UART: [art] Lock RT PCRs Done
50,087,396 UART: [art] Populate DV Done
50,092,864 UART: [fht] FMC Alias Private Key: 7
50,094,566 UART: [art] Derive CDI
50,095,380 UART: [art] Store in slot 0x4
50,153,961 UART: [art] Derive Key Pair
50,155,018 UART: [art] Store priv key in slot 0x5
53,447,756 UART: [art] Derive Key Pair - Done
53,460,803 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,749,380 UART: [art] Erasing AUTHORITY.KEYID = 7
55,750,900 UART: [art] PUB.X = AA030A55830D837781179A46C41D94BA57A5764349506BBA18FB7474E1D31E1F8B9C9DCB4526A7018AE3431A86D3DAF0
55,758,107 UART: [art] PUB.Y = FFACEB4E4A398400C94E5BB546BCDFE7A2C2CF04964C7A461817B3A6E82A2C2B2E01D024DF2D77A305BED0AF5D819EB4
55,765,407 UART: [art] SIG.R = 760BB1BBE7A7CB109EEAD9A14D1BDD29BA77A7D421A09D5847DBF7781B386FCACBAAC115A0276B05B536AD02BA72D881
55,772,803 UART: [art] SIG.S = AD4F7C5D4DFC68E690829459FE5E2516D3BEBA5CF2CCF1AE7F37C163DFA4B544873ECDC7280CC24F4DE35E2B9A2AF425
57,077,714 UART: Caliptra RT
57,078,422 UART: [state] CFI Enabled
57,496,694 UART: [rt] RT failed reset flow
57,497,916 UART: Fatal Error: 0x000E0035
57,499,476 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,427 UART:
192,809 UART: Running Caliptra ROM ...
193,888 UART:
603,663 UART: [state] CFI Enabled
616,552 UART: [state] LifecycleState = Unprovisioned
618,498 UART: [state] DebugLocked = No
621,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,925 UART: [kat] SHA2-256
796,650 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,236 UART: [kat] ++
807,682 UART: [kat] sha1
818,568 UART: [kat] SHA2-256
821,289 UART: [kat] SHA2-384
826,563 UART: [kat] SHA2-512-ACC
828,922 UART: [kat] ECC-384
3,114,024 UART: [kat] HMAC-384Kdf
3,124,669 UART: [kat] LMS
4,314,804 UART: [kat] --
4,317,546 UART: [cold-reset] ++
4,319,973 UART: [fht] Storing FHT @ 0x50003400
4,330,739 UART: [idev] ++
4,331,307 UART: [idev] CDI.KEYID = 6
4,332,335 UART: [idev] SUBJECT.KEYID = 7
4,333,502 UART: [idev] UDS.KEYID = 0
4,334,571 ready_for_fw is high
4,334,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,710 UART: [idev] Erasing UDS.KEYID = 0
7,617,601 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,840 UART: [idev] --
7,642,778 UART: [ldev] ++
7,643,410 UART: [ldev] CDI.KEYID = 6
7,644,315 UART: [ldev] SUBJECT.KEYID = 5
7,645,573 UART: [ldev] AUTHORITY.KEYID = 7
7,646,797 UART: [ldev] FE.KEYID = 1
7,658,244 UART: [ldev] Erasing FE.KEYID = 1
10,951,204 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,862 UART: [ldev] --
13,312,290 UART: [fwproc] Waiting for Commands...
13,313,934 UART: [fwproc] Received command 0x46574c44
13,316,140 UART: [fwproc] Received Image of size 118548 bytes
17,415,996 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,492,475 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,565,660 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,656 >>> mbox cmd response: success
17,895,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,899,176 UART: [afmc] ++
17,899,757 UART: [afmc] CDI.KEYID = 6
17,900,721 UART: [afmc] SUBJECT.KEYID = 7
17,901,925 UART: [afmc] AUTHORITY.KEYID = 5
21,218,665 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,089 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,340 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,773 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,509 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,964 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,578,142 UART: [afmc] --
23,582,121 UART: [cold-reset] --
23,586,358 UART: [state] Locking Datavault
23,591,000 UART: [state] Locking PCR0, PCR1 and PCR31
23,592,752 UART: [state] Locking ICCM
23,594,547 UART: [exit] Launching FMC @ 0x40000130
23,602,983 UART:
23,603,209 UART: Running Caliptra FMC ...
23,604,230 UART:
23,604,370 UART: [state] CFI Enabled
23,612,406 UART: [fht] FMC Alias Private Key: 7
25,952,559 UART: [art] Extend RT PCRs Done
25,953,778 UART: [art] Lock RT PCRs Done
25,955,753 UART: [art] Populate DV Done
25,960,997 UART: [fht] FMC Alias Private Key: 7
25,962,633 UART: [art] Derive CDI
25,963,457 UART: [art] Store in slot 0x4
26,005,722 UART: [art] Derive Key Pair
26,006,719 UART: [art] Store priv key in slot 0x5
29,248,614 UART: [art] Derive Key Pair - Done
29,261,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,542,597 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,103 UART: [art] PUB.X = 663D0FBDBE57E002EDA996C205A96B525D27A270463A3BA3F8F865E7342A326F0FC7B341099377402ABA667D2B2FAD0C
31,551,385 UART: [art] PUB.Y = BEDF7262732E09999983D5B8185BCB7CE3066D0B0D1F6D42CB69B1C0A5E1FBC36EAE783597B89463E9FE3FE1F4807C10
31,558,632 UART: [art] SIG.R = 753CE0DB782615B63A3FF5F7B6D708455B8D013FE623DEAF5C6DC1867BE020FBCB4C08AE79BD9F77A46443439BFE5184
31,566,028 UART: [art] SIG.S = 4ABDCA26C88DB1C7D33A4E54FDA8CA69EA1715D1E5071AED59AB54D606434176E812097F8350C7CF78F4E99DE9A18495
32,871,227 UART: Caliptra RT
32,871,938 UART: [state] CFI Enabled
33,004,082 UART: [rt] RT listening for mailbox commands...
33,036,321 UART: [rt]cmd =0x44504543, len=96
38,721,225 >>> mbox cmd response data (6236 bytes)
40,824,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,976,038 UART:
40,976,435 UART: Running Caliptra ROM ...
40,977,513 UART:
40,977,668 UART: [state] CFI Enabled
40,991,144 UART: [state] LifecycleState = Unprovisioned
40,993,079 UART: [state] DebugLocked = No
40,996,089 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
41,000,219 UART: [kat] SHA2-256
41,169,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,180,457 UART: [kat] ++
41,180,904 UART: [kat] sha1
41,192,673 UART: [kat] SHA2-256
41,195,375 UART: [kat] SHA2-384
41,200,283 UART: [kat] SHA2-512-ACC
41,202,680 UART: [kat] ECC-384
43,488,979 UART: [kat] HMAC-384Kdf
43,500,230 UART: [kat] LMS
44,690,318 UART: [kat] --
44,695,063 UART: [update-reset] ++
48,896,033 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,900,456 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,298,199 >>> mbox cmd response: success
49,298,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,299,026 UART: [update-reset] Copying MAN_2 To MAN_1
49,321,460 UART: [update-reset Success] --
49,324,326 UART: [state] Locking Datavault
49,326,283 UART: [state] Locking PCR0, PCR1 and PCR31
49,328,051 UART: [state] Locking ICCM
49,330,364 UART: [exit] Launching FMC @ 0x40000130
49,338,753 UART:
49,338,978 UART: Running Caliptra FMC ...
49,340,072 UART:
49,340,228 UART: [state] CFI Enabled
49,384,497 UART: [art] Extend RT PCRs Done
49,385,636 UART: [art] Lock RT PCRs Done
49,387,020 UART: [art] Populate DV Done
49,392,479 UART: [fht] FMC Alias Private Key: 7
49,394,166 UART: [art] Derive CDI
49,395,033 UART: [art] Store in slot 0x4
49,437,679 UART: [art] Derive Key Pair
49,438,675 UART: [art] Store priv key in slot 0x5
52,681,324 UART: [art] Derive Key Pair - Done
52,694,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,974,711 UART: [art] Erasing AUTHORITY.KEYID = 7
54,976,227 UART: [art] PUB.X = 1E5060AC8353DE5D03285290F6239AF8263276A9B4F0185ECC00708E82CFF84417418B7B44C04EE5BAEA2EB8533E098B
54,983,489 UART: [art] PUB.Y = A99096B7D9B7266824154CAC11ACE0703E328CA21ACD85D9152DEBBB241D1009F1E6E58C4BDB027A6476ADF875610B6D
54,990,763 UART: [art] SIG.R = 40D0B0C7218B759DF8A690874ED980FCCCABABA6DF15A4067047CA1AA180E8F1ACC22E87B72B63645189F90D2C2CF997
54,998,173 UART: [art] SIG.S = 5C985C7E2456E518ABA925C302733394D05421FB4D4371AE687A3B1A7956AB0B135C57F9ACC99C0F1AEFC5A9669106DC
56,303,809 UART: Caliptra RT
56,304,518 UART: [state] CFI Enabled
56,677,141 UART: [rt] RT failed reset flow
56,678,333 UART: Fatal Error: 0x000E0035
56,679,934 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,123,241 ready_for_fw is high
4,123,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,330 >>> mbox cmd response: success
18,159,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,802,071 UART:
23,802,465 UART: Running Caliptra FMC ...
23,803,604 UART:
23,803,757 UART: [state] CFI Enabled
23,811,450 UART: [fht] FMC Alias Private Key: 7
26,152,187 UART: [art] Extend RT PCRs Done
26,153,415 UART: [art] Lock RT PCRs Done
26,154,985 UART: [art] Populate DV Done
26,160,133 UART: [fht] FMC Alias Private Key: 7
26,161,779 UART: [art] Derive CDI
26,162,594 UART: [art] Store in slot 0x4
26,205,308 UART: [art] Derive Key Pair
26,206,347 UART: [art] Store priv key in slot 0x5
29,448,557 UART: [art] Derive Key Pair - Done
29,461,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,270 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,779 UART: [art] PUB.X = E9F53C6FDA5E2B7094C2EF3E31B193EEE813FAB449A257F50373E12D6291BDD2DB55F080ED9487BFD21DD6846819F651
31,751,025 UART: [art] PUB.Y = BDC5A3C244EF929A7339CBC843BD2A523B70DD6A87856943533184475A1F8A0C95CFE575AE4EDDC983408CE0371CA508
31,758,274 UART: [art] SIG.R = 32FEEE802D22D87D4D43CA20602B925267F960EB3150B7836883E572E81D5D1E3B8522E3E7976BE9B1E7AE08477FAABA
31,765,672 UART: [art] SIG.S = A12472B8CE1F62995CA25B5680EC3CFE10E451C1A418723083216BA129567F7C262FB1F446ACA11F7EF3B0E62F54BA96
33,070,716 UART: Caliptra RT
33,071,436 UART: [state] CFI Enabled
33,204,736 UART: [rt] RT listening for mailbox commands...
33,237,062 UART: [rt]cmd =0x44504543, len=96
38,920,987 >>> mbox cmd response data (6236 bytes)
41,022,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,764,691 >>> mbox cmd response: success
49,765,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,799,682 UART:
49,799,993 UART: Running Caliptra FMC ...
49,801,112 UART:
49,801,297 UART: [state] CFI Enabled
49,844,667 UART: [art] Extend RT PCRs Done
49,845,811 UART: [art] Lock RT PCRs Done
49,847,607 UART: [art] Populate DV Done
49,853,177 UART: [fht] FMC Alias Private Key: 7
49,854,869 UART: [art] Derive CDI
49,855,678 UART: [art] Store in slot 0x4
49,898,129 UART: [art] Derive Key Pair
49,899,173 UART: [art] Store priv key in slot 0x5
53,141,342 UART: [art] Derive Key Pair - Done
53,154,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,434,795 UART: [art] Erasing AUTHORITY.KEYID = 7
55,436,304 UART: [art] PUB.X = 69A83D7BC5980BB286D83F41C9BAC67CE6A7A8048CF9E5B6A2878F0782A572180FE26084DDD06AC382001C43B49E532F
55,443,547 UART: [art] PUB.Y = BCA5F34EAEAF80C48066594EFF74CB53018CB7DF796DC8E6BB31FB6973D9AFDE0073F417D239D6A74794601BF9CD647D
55,450,768 UART: [art] SIG.R = FBC561118F8EAB3D9862B3949B48A4BE0E395B1D5E0BE67BB3B9F1E027CBE6CDC2CF875C7E8B5B01ACC2FF92A1E1A03A
55,458,197 UART: [art] SIG.S = F4FF6D0B81467BA2AFB9FCFA58297324E4A56E787E5189A397C80AD855161F5B9B99A481FBB4D12459FA1958E48EB4CD
56,763,281 UART: Caliptra RT
56,763,971 UART: [state] CFI Enabled
57,138,567 UART: [rt] RT failed reset flow
57,139,761 UART: Fatal Error: 0x000E0035
57,141,364 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,099 UART:
192,480 UART: Running Caliptra ROM ...
193,620 UART:
193,768 UART: [state] CFI Enabled
265,588 UART: [state] LifecycleState = Unprovisioned
267,506 UART: [state] DebugLocked = No
268,903 UART: [state] WD Timer not started. Device not locked for debugging
271,959 UART: [kat] SHA2-256
451,612 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,350 UART: [kat] ++
462,871 UART: [kat] sha1
473,882 UART: [kat] SHA2-256
476,624 UART: [kat] SHA2-384
482,617 UART: [kat] SHA2-512-ACC
484,981 UART: [kat] ECC-384
2,948,756 UART: [kat] HMAC-384Kdf
2,970,331 UART: [kat] LMS
3,446,856 UART: [kat] --
3,454,299 UART: [cold-reset] ++
3,456,616 UART: [fht] FHT @ 0x50003400
3,467,743 UART: [idev] ++
3,468,316 UART: [idev] CDI.KEYID = 6
3,469,295 UART: [idev] SUBJECT.KEYID = 7
3,470,545 UART: [idev] UDS.KEYID = 0
3,471,467 ready_for_fw is high
3,471,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,789 UART: [idev] Erasing UDS.KEYID = 0
5,986,845 UART: [idev] Sha1 KeyId Algorithm
6,011,121 UART: [idev] --
6,015,661 UART: [ldev] ++
6,016,273 UART: [ldev] CDI.KEYID = 6
6,017,193 UART: [ldev] SUBJECT.KEYID = 5
6,018,356 UART: [ldev] AUTHORITY.KEYID = 7
6,019,645 UART: [ldev] FE.KEYID = 1
6,058,031 UART: [ldev] Erasing FE.KEYID = 1
8,563,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,751 UART: [ldev] --
10,377,523 UART: [fwproc] Wait for Commands...
10,379,558 UART: [fwproc] Recv command 0x46574c44
10,381,534 UART: [fwproc] Recv'd Img size: 118548 bytes
13,872,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,553 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,561 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,619 >>> mbox cmd response: success
14,350,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,352,973 UART: [afmc] ++
14,353,553 UART: [afmc] CDI.KEYID = 6
14,354,488 UART: [afmc] SUBJECT.KEYID = 7
14,355,755 UART: [afmc] AUTHORITY.KEYID = 5
16,896,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,885 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,679 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,740 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,292 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,820 UART: [afmc] --
18,717,167 UART: [cold-reset] --
18,722,918 UART: [state] Locking Datavault
18,728,208 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,956 UART: [state] Locking ICCM
18,731,568 UART: [exit] Launching FMC @ 0x40000130
18,739,969 UART:
18,740,220 UART: Running Caliptra FMC ...
18,741,322 UART:
18,741,481 UART: [state] CFI Enabled
18,796,438 UART: [fht] FMC Alias Private Key: 7
20,562,343 UART: [art] Extend RT PCRs Done
20,563,562 UART: [art] Lock RT PCRs Done
20,565,202 UART: [art] Populate DV Done
20,570,665 UART: [fht] FMC Alias Private Key: 7
20,572,254 UART: [art] Derive CDI
20,573,262 UART: [art] Store in slot 0x4
20,628,797 UART: [art] Derive Key Pair
20,629,799 UART: [art] Store priv key in slot 0x5
23,092,756 UART: [art] Derive Key Pair - Done
23,105,593 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,566 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,066 UART: [art] PUB.X = 991CEE7319CD14BF3043E64B067626119C217A23C32CFA99C07A9431B889D438DAB1F70D6B3CB15CFA36AECC9355183E
24,827,316 UART: [art] PUB.Y = A691579194A9FD4FE529680BC2E79B650E51FB2C08F414F4E600B00DB95BB2A84F1F5B943E0DAC9C4E04754D5E17D481
24,834,598 UART: [art] SIG.R = 1CA8F5AD3227D38B79E7A09976EEC36C1FE11B9ED66EBC71F41E9BCF19836E439056A10B8EEE4A20663E3D313AD89371
24,842,001 UART: [art] SIG.S = 2815870BB1F92C998E0364E3B5A6AC68B8A224922867CF178E47B1B1B6397AB150FD3F840E98014EACE3833F49E8F2AA
25,820,569 UART: Caliptra RT
25,821,266 UART: [state] CFI Enabled
26,002,084 UART: [rt] RT listening for mailbox commands...
26,034,067 UART: [rt]cmd =0x44504543, len=96
30,409,079 >>> mbox cmd response data (6236 bytes)
32,501,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,652,523 UART:
32,652,902 UART: Running Caliptra ROM ...
32,654,183 UART:
32,654,357 UART: [state] CFI Enabled
32,730,675 UART: [state] LifecycleState = Unprovisioned
32,732,570 UART: [state] DebugLocked = No
32,734,745 UART: [state] WD Timer not started. Device not locked for debugging
32,739,045 UART: [kat] SHA2-256
32,918,716 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,929,491 UART: [kat] ++
32,930,026 UART: [kat] sha1
32,939,678 UART: [kat] SHA2-256
32,942,365 UART: [kat] SHA2-384
32,947,931 UART: [kat] SHA2-512-ACC
32,950,277 UART: [kat] ECC-384
35,413,260 UART: [kat] HMAC-384Kdf
35,437,651 UART: [kat] LMS
35,914,082 UART: [kat] --
35,920,234 UART: [update-reset] ++
39,421,448 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,424,602 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,822,207 >>> mbox cmd response: success
39,822,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,823,637 UART: [update-reset] Copying MAN_2 To MAN_1
39,860,755 UART: [update-reset Success] --
39,866,047 UART: [state] Locking Datavault
39,870,438 UART: [state] Locking PCR0, PCR1 and PCR31
39,872,188 UART: [state] Locking ICCM
39,873,743 UART: [exit] Launching FMC @ 0x40000130
39,882,102 UART:
39,882,338 UART: Running Caliptra FMC ...
39,883,436 UART:
39,883,591 UART: [state] CFI Enabled
39,972,666 UART: [art] Extend RT PCRs Done
39,973,858 UART: [art] Lock RT PCRs Done
39,975,368 UART: [art] Populate DV Done
39,980,453 UART: [fht] FMC Alias Private Key: 7
39,982,145 UART: [art] Derive CDI
39,982,883 UART: [art] Store in slot 0x4
40,041,776 UART: [art] Derive Key Pair
40,042,814 UART: [art] Store priv key in slot 0x5
42,505,720 UART: [art] Derive Key Pair - Done
42,518,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,231,451 UART: [art] Erasing AUTHORITY.KEYID = 7
44,232,933 UART: [art] PUB.X = 0B71EA10AC6181C72F11111D8F7C7C01CE049F3400CF80FC157040D467B2577102FCBA10A8BB60FA826665BB24337DF9
44,240,198 UART: [art] PUB.Y = 31A65B08D6F2607D7C4DB6B117A97EA5F31FB0C79966B1304B65883AAF06CB43C3EB0D4D75A222C75DEA0195D285DE4D
44,247,431 UART: [art] SIG.R = 0467CDC8CD8BB69D5899FAD824A3671F217AD71A21187D5F648511D863BFC852BE1910BC5AA5E3D5E6DB3DB124622985
44,254,856 UART: [art] SIG.S = 083794800316B7D1F9C6EE1DA595ECC828022936D42F828BC8325D959F29AC870711E40CF233F0A346FD1497DC639DE7
45,234,304 UART: Caliptra RT
45,235,019 UART: [state] CFI Enabled
45,654,681 UART: [rt] RT failed reset flow
45,655,872 UART: Fatal Error: 0x000E0035
45,657,478 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
3,444,690 ready_for_fw is high
3,445,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,202,412 >>> mbox cmd response: success
14,203,646 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,496,215 UART:
18,496,599 UART: Running Caliptra FMC ...
18,497,734 UART:
18,497,890 UART: [state] CFI Enabled
18,564,325 UART: [fht] FMC Alias Private Key: 7
20,330,966 UART: [art] Extend RT PCRs Done
20,332,188 UART: [art] Lock RT PCRs Done
20,333,926 UART: [art] Populate DV Done
20,339,559 UART: [fht] FMC Alias Private Key: 7
20,341,147 UART: [art] Derive CDI
20,341,882 UART: [art] Store in slot 0x4
20,398,416 UART: [art] Derive Key Pair
20,399,453 UART: [art] Store priv key in slot 0x5
22,862,503 UART: [art] Derive Key Pair - Done
22,875,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,588,167 UART: [art] Erasing AUTHORITY.KEYID = 7
24,589,671 UART: [art] PUB.X = 7C838817A165D56FC1A22DAED99A0F1F35CDEC9C3646BCADFE7E47FCA4A223FD649DD34CC018A4912197A0DECBCFDAE1
24,596,997 UART: [art] PUB.Y = E008CAB76DCB5A68078324D6661ADF5BFEDD20CD2AC87EB0268557A86AAAF7170A14D21DA4FAE26D2142D92316B0D0E0
24,604,308 UART: [art] SIG.R = 2D03B7066D33934DC1BF7F14EFD250F21CCB10981B20AEC778A5F6189D485FC1C7309A3ED561E6D4BADD1B9522BE3561
24,611,697 UART: [art] SIG.S = C508BE67BE576DD80D77DD0515A0EEB3D30EE6CE1D86FD13CDE92B1BE68D4809D0FA85174F5F5EEC7BD7CD8A545145F2
25,590,486 UART: Caliptra RT
25,591,181 UART: [state] CFI Enabled
25,771,808 UART: [rt] RT listening for mailbox commands...
25,804,051 UART: [rt]cmd =0x44504543, len=96
30,179,872 >>> mbox cmd response data (6236 bytes)
32,265,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,567,933 >>> mbox cmd response: success
39,568,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,604,685 UART:
39,604,969 UART: Running Caliptra FMC ...
39,606,082 UART:
39,606,251 UART: [state] CFI Enabled
39,696,888 UART: [art] Extend RT PCRs Done
39,698,081 UART: [art] Lock RT PCRs Done
39,699,555 UART: [art] Populate DV Done
39,705,181 UART: [fht] FMC Alias Private Key: 7
39,706,712 UART: [art] Derive CDI
39,707,521 UART: [art] Store in slot 0x4
39,766,108 UART: [art] Derive Key Pair
39,767,151 UART: [art] Store priv key in slot 0x5
42,229,827 UART: [art] Derive Key Pair - Done
42,243,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,955,855 UART: [art] Erasing AUTHORITY.KEYID = 7
43,957,359 UART: [art] PUB.X = A9A63B6AF7F5C30B388FBAF786A105B51244295A9BB9472F110CEFE7BBC0527550068DDFF29A36524C75E461E48CD145
43,964,664 UART: [art] PUB.Y = 54B93E45841C5F01C69FEAB7FC6ACCD1D78F41BC7D0C860445E6DB03152D3D865EC2B15A920AD9543A31CF78B8AF4609
43,971,945 UART: [art] SIG.R = E205A1B8773CD655BAD1A62CEDDBF13D810A40ADC4250DECB10691F3DC73B80B024742F4376AD70FC106BE527434E4A5
43,979,340 UART: [art] SIG.S = 32912EDBFE0104836775AC6A4BC7C634988196116141448B527884D73F6BDCEDC9526F3A5C2E97511291AC38D7B5A704
44,958,450 UART: Caliptra RT
44,959,168 UART: [state] CFI Enabled
45,383,851 UART: [rt] RT failed reset flow
45,385,046 UART: Fatal Error: 0x000E0035
45,386,646 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,394 UART:
192,767 UART: Running Caliptra ROM ...
193,956 UART:
603,451 UART: [state] CFI Enabled
618,124 UART: [state] LifecycleState = Unprovisioned
619,999 UART: [state] DebugLocked = No
621,598 UART: [state] WD Timer not started. Device not locked for debugging
625,351 UART: [kat] SHA2-256
805,021 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,848 UART: [kat] ++
816,387 UART: [kat] sha1
826,581 UART: [kat] SHA2-256
829,279 UART: [kat] SHA2-384
835,201 UART: [kat] SHA2-512-ACC
837,571 UART: [kat] ECC-384
3,279,520 UART: [kat] HMAC-384Kdf
3,293,165 UART: [kat] LMS
3,769,681 UART: [kat] --
3,774,235 UART: [cold-reset] ++
3,775,594 UART: [fht] FHT @ 0x50003400
3,786,935 UART: [idev] ++
3,787,537 UART: [idev] CDI.KEYID = 6
3,788,455 UART: [idev] SUBJECT.KEYID = 7
3,789,701 UART: [idev] UDS.KEYID = 0
3,790,623 ready_for_fw is high
3,790,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,572 UART: [idev] Erasing UDS.KEYID = 0
6,260,170 UART: [idev] Sha1 KeyId Algorithm
6,283,379 UART: [idev] --
6,288,372 UART: [ldev] ++
6,288,954 UART: [ldev] CDI.KEYID = 6
6,289,893 UART: [ldev] SUBJECT.KEYID = 5
6,291,056 UART: [ldev] AUTHORITY.KEYID = 7
6,292,343 UART: [ldev] FE.KEYID = 1
6,306,642 UART: [ldev] Erasing FE.KEYID = 1
8,785,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,555 UART: [ldev] --
10,578,515 UART: [fwproc] Wait for Commands...
10,580,562 UART: [fwproc] Recv command 0x46574c44
10,582,546 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,140,604 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,213,666 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,541,238 >>> mbox cmd response: success
14,542,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,545,423 UART: [afmc] ++
14,546,017 UART: [afmc] CDI.KEYID = 6
14,547,050 UART: [afmc] SUBJECT.KEYID = 7
14,548,157 UART: [afmc] AUTHORITY.KEYID = 5
17,053,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,774,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,777,231 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,792,990 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,809,066 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,824,650 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,847,597 UART: [afmc] --
18,851,957 UART: [cold-reset] --
18,856,142 UART: [state] Locking Datavault
18,860,688 UART: [state] Locking PCR0, PCR1 and PCR31
18,862,466 UART: [state] Locking ICCM
18,864,082 UART: [exit] Launching FMC @ 0x40000130
18,872,482 UART:
18,872,721 UART: Running Caliptra FMC ...
18,873,819 UART:
18,873,981 UART: [state] CFI Enabled
18,881,679 UART: [fht] FMC Alias Private Key: 7
20,647,944 UART: [art] Extend RT PCRs Done
20,649,164 UART: [art] Lock RT PCRs Done
20,650,600 UART: [art] Populate DV Done
20,656,065 UART: [fht] FMC Alias Private Key: 7
20,657,713 UART: [art] Derive CDI
20,658,449 UART: [art] Store in slot 0x4
20,701,044 UART: [art] Derive Key Pair
20,702,087 UART: [art] Store priv key in slot 0x5
23,129,348 UART: [art] Derive Key Pair - Done
23,142,198 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,848,469 UART: [art] Erasing AUTHORITY.KEYID = 7
24,849,959 UART: [art] PUB.X = C9828AB821B33980AEF246D8863BCFDF88CE839969741ADD1D8A151FD330167878D03F615CAFB5C7F812EEAFEF745EC2
24,857,255 UART: [art] PUB.Y = C2AFD29890FF7C470645FECE86A9371BFDCA8289A1145A0524CC771CAF698B48E021798CD9D7C70A8633AB522D299FD3
24,864,538 UART: [art] SIG.R = 12094C1DDF56CD7E5DAE5E841EF0A6F3DEBD6CDA7DA19AA7B7C0D4741526DC72B577FD3BF923DC5D14EFCD23AE12E67C
24,871,978 UART: [art] SIG.S = 3035748F2D6D285AF7C3B87D786E0A59F2215AC9C352DCE50B9096C39100992179AB72E960D2EE5C1F869EF662B398EE
25,851,281 UART: Caliptra RT
25,851,992 UART: [state] CFI Enabled
25,984,839 UART: [rt] RT listening for mailbox commands...
26,016,959 UART: [rt]cmd =0x44504543, len=96
30,313,232 >>> mbox cmd response data (6236 bytes)
32,405,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,557,135 UART:
32,557,529 UART: Running Caliptra ROM ...
32,558,600 UART:
32,558,754 UART: [state] CFI Enabled
32,575,617 UART: [state] LifecycleState = Unprovisioned
32,577,515 UART: [state] DebugLocked = No
32,579,249 UART: [state] WD Timer not started. Device not locked for debugging
32,583,423 UART: [kat] SHA2-256
32,763,146 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,773,954 UART: [kat] ++
32,774,410 UART: [kat] sha1
32,785,728 UART: [kat] SHA2-256
32,788,417 UART: [kat] SHA2-384
32,794,621 UART: [kat] SHA2-512-ACC
32,796,967 UART: [kat] ECC-384
35,236,479 UART: [kat] HMAC-384Kdf
35,248,852 UART: [kat] LMS
35,725,341 UART: [kat] --
35,727,982 UART: [update-reset] ++
39,224,035 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,228,298 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,625,948 >>> mbox cmd response: success
39,626,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,626,786 UART: [update-reset] Copying MAN_2 To MAN_1
39,663,760 UART: [update-reset Success] --
39,668,800 UART: [state] Locking Datavault
39,672,102 UART: [state] Locking PCR0, PCR1 and PCR31
39,673,855 UART: [state] Locking ICCM
39,675,412 UART: [exit] Launching FMC @ 0x40000130
39,683,758 UART:
39,683,994 UART: Running Caliptra FMC ...
39,685,099 UART:
39,685,282 UART: [state] CFI Enabled
39,729,536 UART: [art] Extend RT PCRs Done
39,730,726 UART: [art] Lock RT PCRs Done
39,731,860 UART: [art] Populate DV Done
39,737,376 UART: [fht] FMC Alias Private Key: 7
39,739,075 UART: [art] Derive CDI
39,739,892 UART: [art] Store in slot 0x4
39,782,376 UART: [art] Derive Key Pair
39,783,379 UART: [art] Store priv key in slot 0x5
42,210,246 UART: [art] Derive Key Pair - Done
42,223,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,930,332 UART: [art] Erasing AUTHORITY.KEYID = 7
43,931,835 UART: [art] PUB.X = C5ACDC472381A2E1201EDEB65B9042E62796D137805CD1909FB45270BDAFA6175ED57504AF61F78E8E38F2B6B3049666
43,939,141 UART: [art] PUB.Y = B422860C96805527CB06FF2847020C9C3A753A7AE4D92330F03C2E9B121C6B07A236FD9ED716A51654ECD4428E12B155
43,946,371 UART: [art] SIG.R = 79420E95BDA955ED4584B59CF4E82271FE38490756EDE4DE3E09A0AB12A4DC9DC779A5DED920F4CC89252B03F7651F11
43,953,804 UART: [art] SIG.S = D12B9C5DBAC3586AAB09C543D20BB4C5AF9CADC08DF770D55AD35C0C5AEF48384C734B098711A041F105446F653EA722
44,932,991 UART: Caliptra RT
44,933,709 UART: [state] CFI Enabled
45,311,882 UART: [rt] RT failed reset flow
45,313,074 UART: Fatal Error: 0x000E0035
45,314,654 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,781,713 ready_for_fw is high
3,782,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,721 >>> mbox cmd response: success
14,439,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,689,759 UART:
18,690,145 UART: Running Caliptra FMC ...
18,691,253 UART:
18,691,410 UART: [state] CFI Enabled
18,699,251 UART: [fht] FMC Alias Private Key: 7
20,465,348 UART: [art] Extend RT PCRs Done
20,466,575 UART: [art] Lock RT PCRs Done
20,468,118 UART: [art] Populate DV Done
20,473,440 UART: [fht] FMC Alias Private Key: 7
20,474,981 UART: [art] Derive CDI
20,475,717 UART: [art] Store in slot 0x4
20,518,496 UART: [art] Derive Key Pair
20,519,500 UART: [art] Store priv key in slot 0x5
22,946,190 UART: [art] Derive Key Pair - Done
22,959,300 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,394 UART: [art] Erasing AUTHORITY.KEYID = 7
24,666,903 UART: [art] PUB.X = C91DF6F3DBD234BC1197303B3D0C1BCC043675283542D42911F4EADF015DF82AEAFE220AFD84C347589D07DDD2FCA6D1
24,674,219 UART: [art] PUB.Y = AA5C7BDCC55A1D271EAAB9B738C3F238DC37AB470A6699A04BA9815E5AB5452D0AC7DD7315444CB9801F5F1A88E1FAC7
24,681,472 UART: [art] SIG.R = 7C877E4209562D73CB5C895B5A4BC630EB5320FC0413B72110376E87D320A458D4F196E7035979EEF76BD2C0923D44D9
24,688,866 UART: [art] SIG.S = 31D4E45290C2B396A08AE8C1DDA60017D30EF62C920C431E18569DCD7486ADF6394A19A691B76CA4C416964B7E64AE46
25,667,676 UART: Caliptra RT
25,668,388 UART: [state] CFI Enabled
25,801,093 UART: [rt] RT listening for mailbox commands...
25,833,043 UART: [rt]cmd =0x44504543, len=96
30,127,953 >>> mbox cmd response data (6236 bytes)
32,233,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,458,652 >>> mbox cmd response: success
39,459,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,493,218 UART:
39,493,540 UART: Running Caliptra FMC ...
39,494,580 UART:
39,494,731 UART: [state] CFI Enabled
39,538,705 UART: [art] Extend RT PCRs Done
39,539,853 UART: [art] Lock RT PCRs Done
39,541,429 UART: [art] Populate DV Done
39,546,736 UART: [fht] FMC Alias Private Key: 7
39,548,386 UART: [art] Derive CDI
39,549,124 UART: [art] Store in slot 0x4
39,591,837 UART: [art] Derive Key Pair
39,592,895 UART: [art] Store priv key in slot 0x5
42,019,822 UART: [art] Derive Key Pair - Done
42,032,936 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,739,198 UART: [art] Erasing AUTHORITY.KEYID = 7
43,740,709 UART: [art] PUB.X = 1093E3413F075DC4B7C9275857D97BE75EDF388D58C3900030781A5DBC52B8BDC5B25578B030A2B8D95BF8CA596E7C49
43,747,968 UART: [art] PUB.Y = B0BEEE1575F696B1E9821745850E9152129243B5C3421D5F1BCA0A62A1CA3AAF78067B714EE7967B0468C0DCB868D17A
43,755,208 UART: [art] SIG.R = 34E019D7D6B1DF8122BCCF4D20FE4B383E77268936E7C4DA5856B4EF4A65991EBCE1D8817DB369F99C3D3224579A6F45
43,762,614 UART: [art] SIG.S = 2C6073A2E29002B9E1BBA5D992A886F16C15EA503C9045CC5DF94EEB7F32A0687C137BDFAAB2244B7674EFEFE40FD518
44,741,286 UART: Caliptra RT
44,741,993 UART: [state] CFI Enabled
45,115,522 UART: [rt] RT failed reset flow
45,116,726 UART: Fatal Error: 0x000E0035
45,118,305 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,222 UART:
192,573 UART: Running Caliptra ROM ...
193,758 UART:
193,913 UART: [state] CFI Enabled
268,349 UART: [state] LifecycleState = Unprovisioned
270,760 UART: [state] DebugLocked = No
272,219 UART: [state] WD Timer not started. Device not locked for debugging
276,485 UART: [kat] SHA2-256
466,348 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,166 UART: [kat] ++
477,621 UART: [kat] sha1
489,842 UART: [kat] SHA2-256
492,843 UART: [kat] SHA2-384
498,683 UART: [kat] SHA2-512-ACC
501,268 UART: [kat] ECC-384
2,949,809 UART: [kat] HMAC-384Kdf
2,974,546 UART: [kat] LMS
3,506,361 UART: [kat] --
3,509,309 UART: [cold-reset] ++
3,511,958 UART: [fht] FHT @ 0x50003400
3,524,996 UART: [idev] ++
3,525,702 UART: [idev] CDI.KEYID = 6
3,526,696 UART: [idev] SUBJECT.KEYID = 7
3,527,827 UART: [idev] UDS.KEYID = 0
3,529,085 ready_for_fw is high
3,529,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,339 UART: [idev] Erasing UDS.KEYID = 0
6,028,271 UART: [idev] Sha1 KeyId Algorithm
6,051,770 UART: [idev] --
6,056,357 UART: [ldev] ++
6,057,099 UART: [ldev] CDI.KEYID = 6
6,057,988 UART: [ldev] SUBJECT.KEYID = 5
6,059,143 UART: [ldev] AUTHORITY.KEYID = 7
6,060,376 UART: [ldev] FE.KEYID = 1
6,103,355 UART: [ldev] Erasing FE.KEYID = 1
8,609,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,033 UART: [ldev] --
10,419,674 UART: [fwproc] Wait for Commands...
10,422,526 UART: [fwproc] Recv command 0x46574c44
10,424,830 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,105 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,754 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,987 >>> mbox cmd response: success
14,681,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,684,057 UART: [afmc] ++
14,684,752 UART: [afmc] CDI.KEYID = 6
14,685,929 UART: [afmc] SUBJECT.KEYID = 7
14,687,410 UART: [afmc] AUTHORITY.KEYID = 5
17,213,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,865 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,957,004 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,972,122 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,996 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,923 UART: [afmc] --
19,013,701 UART: [cold-reset] --
19,017,343 UART: [state] Locking Datavault
19,023,619 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,751 UART: [state] Locking ICCM
19,027,839 UART: [exit] Launching FMC @ 0x40000130
19,036,535 UART:
19,036,779 UART: Running Caliptra FMC ...
19,037,881 UART:
19,038,041 UART: [state] CFI Enabled
19,099,840 UART: [fht] FMC Alias Private Key: 7
20,886,865 UART: [art] Extend RT PCRs Done
20,888,103 UART: [art] Lock RT PCRs Done
20,889,785 UART: [art] Populate DV Done
20,895,144 UART: [fht] FMC Alias Private Key: 7
20,896,730 UART: [art] Derive CDI
20,897,541 UART: [art] Store in slot 0x4
20,954,008 UART: [art] Derive Key Pair
20,955,055 UART: [art] Store priv key in slot 0x5
23,417,646 UART: [art] Derive Key Pair - Done
23,430,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,143,604 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,110 UART: [art] PUB.X = 0F39DC4F4BCBD322FF942B13321654211EC37850B333D6AF76A98ABEC85209ED0BE6809835A802D77DB8B3F652E07CCF
25,152,372 UART: [art] PUB.Y = 32B1ED16EE478550F15B4E3356C9D557C1C1E9FCA9B24BA38C618197CCE62D0EAB726356C97F7394D6460F724D9A7188
25,159,667 UART: [art] SIG.R = 8DF1ADD37CE68ECA4FBA9C9EAF19285E62E06E46140C08EA20669516E651E23B34039EEDB09F9D0A40231BE2E123C3C4
25,167,036 UART: [art] SIG.S = 5ADEE2F9A25986D1363F53A7C32B80E349B5EA2CD20F1AC0CB952466A051B949D1D156C6E57FAE2BF2F76C4E5D0E4677
26,146,390 UART: Caliptra RT
26,147,257 UART: [state] CFI Enabled
26,328,410 UART: [rt] RT listening for mailbox commands...
26,360,372 UART: [rt]cmd =0x44504543, len=96
30,733,404 >>> mbox cmd response data (6236 bytes)
32,829,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,979,663 UART:
32,980,029 UART: Running Caliptra ROM ...
32,981,170 UART:
32,981,344 UART: [state] CFI Enabled
33,052,920 UART: [state] LifecycleState = Unprovisioned
33,055,013 UART: [state] DebugLocked = No
33,056,289 UART: [state] WD Timer not started. Device not locked for debugging
33,061,080 UART: [kat] SHA2-256
33,250,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,261,656 UART: [kat] ++
33,262,148 UART: [kat] sha1
33,272,875 UART: [kat] SHA2-256
33,275,874 UART: [kat] SHA2-384
33,282,194 UART: [kat] SHA2-512-ACC
33,284,756 UART: [kat] ECC-384
35,738,531 UART: [kat] HMAC-384Kdf
35,764,309 UART: [kat] LMS
36,295,867 UART: [kat] --
36,298,366 UART: [update-reset] ++
39,811,497 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,814,596 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,444,367 >>> mbox cmd response: success
40,444,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,446,360 UART: [update-reset] Copying MAN_2 To MAN_1
40,483,902 UART: [update-reset Success] --
40,487,196 UART: [state] Locking Datavault
40,490,556 UART: [state] Locking PCR0, PCR1 and PCR31
40,492,752 UART: [state] Locking ICCM
40,494,042 UART: [exit] Launching FMC @ 0x40000130
40,502,715 UART:
40,502,948 UART: Running Caliptra FMC ...
40,504,047 UART:
40,504,209 UART: [state] CFI Enabled
40,596,508 UART: [art] Extend RT PCRs Done
40,597,692 UART: [art] Lock RT PCRs Done
40,599,362 UART: [art] Populate DV Done
40,604,870 UART: [fht] FMC Alias Private Key: 7
40,606,562 UART: [art] Derive CDI
40,607,371 UART: [art] Store in slot 0x4
40,665,208 UART: [art] Derive Key Pair
40,666,255 UART: [art] Store priv key in slot 0x5
43,129,190 UART: [art] Derive Key Pair - Done
43,142,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,855,017 UART: [art] Erasing AUTHORITY.KEYID = 7
44,856,530 UART: [art] PUB.X = 1330E95D47ED0DFFC1664880AE48B7C379F8B60DF8F6D04DF568492C228DFED734AFE18D4E9D40831FB55F563FD8596B
44,863,762 UART: [art] PUB.Y = C5C4C41E3D192F3485C0FC0596BC8735693D2FDF63681B4DC29F9596D4C06256808061DBE5437DA80D8B0F6B318C96EF
44,871,051 UART: [art] SIG.R = 27D22C21524CBF12DE4FC859B42838B3092E224F00CC6C53D535F1AE1D69447DC18F1062671DF053A3F8FF00CE23AAAB
44,878,432 UART: [art] SIG.S = 1050EF90FD9C51C2CB72B1E365244A7040E8CAB06B66ACCF3EF6383B6A75C27F5135BC944FC6A64879DA43ED7A005E45
45,857,636 UART: Caliptra RT
45,858,326 UART: [state] CFI Enabled
46,281,877 UART: [rt] RT failed reset flow
46,283,063 UART: Fatal Error: 0x000E0035
46,284,723 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,439,728 ready_for_fw is high
3,440,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,196 >>> mbox cmd response: success
14,826,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,133,079 UART:
19,133,503 UART: Running Caliptra FMC ...
19,134,659 UART:
19,134,814 UART: [state] CFI Enabled
19,200,251 UART: [fht] FMC Alias Private Key: 7
20,965,597 UART: [art] Extend RT PCRs Done
20,966,810 UART: [art] Lock RT PCRs Done
20,968,374 UART: [art] Populate DV Done
20,974,012 UART: [fht] FMC Alias Private Key: 7
20,975,664 UART: [art] Derive CDI
20,976,710 UART: [art] Store in slot 0x4
21,032,504 UART: [art] Derive Key Pair
21,033,515 UART: [art] Store priv key in slot 0x5
23,496,416 UART: [art] Derive Key Pair - Done
23,509,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,456 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,953 UART: [art] PUB.X = 0C7F989E23ADDB0A5BC6B432F5E9C897BC925DE65D01F8FB1B0F6040FBB01856767840CB9D535409EFD70C238066EDDA
25,230,211 UART: [art] PUB.Y = C70065253E06A84D9FD9E27B1F2322C4246AEF20A969BC9F5D33157B4E627AD5C8C094EE954D9245237BA6548CB4362D
25,237,457 UART: [art] SIG.R = EE1ACC22A67F7648206DD55A3DC3535D58E30181ECB8FCE30E8987B7BEE7F537B84A9268856588662DFD76CD30B354B5
25,244,854 UART: [art] SIG.S = 38B9D3F865268865D7030E12356B60E860CFAEFC1A3F3BBA09FDC6E6F89980EBA22ADC69FA210E05EBC68FB9690E862A
26,223,536 UART: Caliptra RT
26,224,248 UART: [state] CFI Enabled
26,404,781 UART: [rt] RT listening for mailbox commands...
26,436,994 UART: [rt]cmd =0x44504543, len=96
30,812,626 >>> mbox cmd response data (6236 bytes)
32,905,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,821,685 >>> mbox cmd response: success
40,822,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,854,932 UART:
40,855,223 UART: Running Caliptra FMC ...
40,856,265 UART:
40,856,411 UART: [state] CFI Enabled
40,944,569 UART: [art] Extend RT PCRs Done
40,945,761 UART: [art] Lock RT PCRs Done
40,947,032 UART: [art] Populate DV Done
40,952,457 UART: [fht] FMC Alias Private Key: 7
40,954,100 UART: [art] Derive CDI
40,954,858 UART: [art] Store in slot 0x4
41,014,092 UART: [art] Derive Key Pair
41,015,145 UART: [art] Store priv key in slot 0x5
43,478,799 UART: [art] Derive Key Pair - Done
43,491,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,204,258 UART: [art] Erasing AUTHORITY.KEYID = 7
45,205,764 UART: [art] PUB.X = 442C6E622A4C484C69EFF41039FB1A917CBF339D56499EB82D86CFD810ACEDE80806D1B8E511E34FF7E3E337BB04B1D4
45,213,074 UART: [art] PUB.Y = 739EFFA64D44839F0F6259CF3F79F5933203D8595F7FDD6BE0E6CF2E2DAF9084CA74D7523614D40BEDF75C7672DD92A0
45,220,337 UART: [art] SIG.R = 3FE16F2721D7ED6FADB618668BB8AC1B40295BEAADCA8E87B2DA5259FA8FDAD79081581E0026A63264A4C5BC06D08794
45,227,739 UART: [art] SIG.S = 2DAF8124146361C57E825A0B742BB498D17A704CC18761C27CA7B84AEE5877760E9F0288C0589B1E2668EDD9C2741FB9
46,206,234 UART: Caliptra RT
46,206,943 UART: [state] CFI Enabled
46,631,252 UART: [rt] RT failed reset flow
46,632,436 UART: Fatal Error: 0x000E0035
46,634,089 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
192,547 UART:
192,924 UART: Running Caliptra ROM ...
194,075 UART:
603,902 UART: [state] CFI Enabled
618,873 UART: [state] LifecycleState = Unprovisioned
621,284 UART: [state] DebugLocked = No
624,159 UART: [state] WD Timer not started. Device not locked for debugging
628,140 UART: [kat] SHA2-256
818,024 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,764 UART: [kat] ++
829,285 UART: [kat] sha1
839,805 UART: [kat] SHA2-256
842,820 UART: [kat] SHA2-384
849,241 UART: [kat] SHA2-512-ACC
851,782 UART: [kat] ECC-384
3,292,129 UART: [kat] HMAC-384Kdf
3,305,254 UART: [kat] LMS
3,837,092 UART: [kat] --
3,840,990 UART: [cold-reset] ++
3,843,500 UART: [fht] FHT @ 0x50003400
3,855,696 UART: [idev] ++
3,856,339 UART: [idev] CDI.KEYID = 6
3,857,299 UART: [idev] SUBJECT.KEYID = 7
3,858,549 UART: [idev] UDS.KEYID = 0
3,859,451 ready_for_fw is high
3,859,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,571 UART: [idev] Erasing UDS.KEYID = 0
6,338,136 UART: [idev] Sha1 KeyId Algorithm
6,360,668 UART: [idev] --
6,364,288 UART: [ldev] ++
6,365,024 UART: [ldev] CDI.KEYID = 6
6,365,922 UART: [ldev] SUBJECT.KEYID = 5
6,367,030 UART: [ldev] AUTHORITY.KEYID = 7
6,368,320 UART: [ldev] FE.KEYID = 1
6,380,401 UART: [ldev] Erasing FE.KEYID = 1
8,854,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,721 UART: [ldev] --
10,644,149 UART: [fwproc] Wait for Commands...
10,646,085 UART: [fwproc] Recv command 0x46574c44
10,648,398 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,846 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,496 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,251 >>> mbox cmd response: success
14,914,440 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,917,089 UART: [afmc] ++
14,917,823 UART: [afmc] CDI.KEYID = 6
14,919,018 UART: [afmc] SUBJECT.KEYID = 7
14,920,516 UART: [afmc] AUTHORITY.KEYID = 5
17,426,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,123 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,212 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,384 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,253 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,265 UART: [afmc] --
19,223,975 UART: [cold-reset] --
19,228,059 UART: [state] Locking Datavault
19,234,997 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,195 UART: [state] Locking ICCM
19,240,110 UART: [exit] Launching FMC @ 0x40000130
19,248,735 UART:
19,248,990 UART: Running Caliptra FMC ...
19,250,099 UART:
19,250,268 UART: [state] CFI Enabled
19,258,033 UART: [fht] FMC Alias Private Key: 7
21,024,760 UART: [art] Extend RT PCRs Done
21,025,986 UART: [art] Lock RT PCRs Done
21,027,396 UART: [art] Populate DV Done
21,032,815 UART: [fht] FMC Alias Private Key: 7
21,034,518 UART: [art] Derive CDI
21,035,337 UART: [art] Store in slot 0x4
21,077,988 UART: [art] Derive Key Pair
21,078,995 UART: [art] Store priv key in slot 0x5
23,506,496 UART: [art] Derive Key Pair - Done
23,519,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,755 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,753 UART: [art] PUB.X = 36C77F4FA2AF5F9F5C8A061A3E210104510A8DD1148242E4672972246A7D142D9B2A71FA387841E028DE971CF431B94B
25,234,493 UART: [art] PUB.Y = CCF9EB8B5AA2B6773ADEDB70EABE97CA5F2F97085B7E855741D5DB1304B58D5251B610756585522BAD86839E1E8B87F4
25,241,753 UART: [art] SIG.R = 9BFD009BFEEE8EF16F1172DCC46DF04CFAB68F4E5DE3AC4F68CBD35EA49DE3C9B4906952050F75F44D334E35F1236375
25,249,109 UART: [art] SIG.S = FDA0BA83CD31BA54B0757D5E1B860957ACEB52A7F116015680ECC15A663510C55DA94EC49CBCC820121286F4F130F953
26,228,426 UART: Caliptra RT
26,229,133 UART: [state] CFI Enabled
26,362,114 UART: [rt] RT listening for mailbox commands...
26,394,279 UART: [rt]cmd =0x44504543, len=96
30,690,239 >>> mbox cmd response data (6236 bytes)
32,785,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,936,276 UART:
32,936,705 UART: Running Caliptra ROM ...
32,937,801 UART:
32,937,960 UART: [state] CFI Enabled
32,950,737 UART: [state] LifecycleState = Unprovisioned
32,952,585 UART: [state] DebugLocked = No
32,954,950 UART: [state] WD Timer not started. Device not locked for debugging
32,959,001 UART: [kat] SHA2-256
33,148,906 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,159,669 UART: [kat] ++
33,160,184 UART: [kat] sha1
33,172,853 UART: [kat] SHA2-256
33,175,866 UART: [kat] SHA2-384
33,181,328 UART: [kat] SHA2-512-ACC
33,183,960 UART: [kat] ECC-384
35,625,628 UART: [kat] HMAC-384Kdf
35,639,046 UART: [kat] LMS
36,170,656 UART: [kat] --
36,174,611 UART: [update-reset] ++
39,683,816 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,687,204 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,316,927 >>> mbox cmd response: success
40,317,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,318,122 UART: [update-reset] Copying MAN_2 To MAN_1
40,355,693 UART: [update-reset Success] --
40,360,477 UART: [state] Locking Datavault
40,364,611 UART: [state] Locking PCR0, PCR1 and PCR31
40,366,759 UART: [state] Locking ICCM
40,369,245 UART: [exit] Launching FMC @ 0x40000130
40,377,914 UART:
40,378,166 UART: Running Caliptra FMC ...
40,379,276 UART:
40,379,449 UART: [state] CFI Enabled
40,423,050 UART: [art] Extend RT PCRs Done
40,424,219 UART: [art] Lock RT PCRs Done
40,425,681 UART: [art] Populate DV Done
40,431,150 UART: [fht] FMC Alias Private Key: 7
40,432,690 UART: [art] Derive CDI
40,433,504 UART: [art] Store in slot 0x4
40,476,375 UART: [art] Derive Key Pair
40,477,417 UART: [art] Store priv key in slot 0x5
42,904,406 UART: [art] Derive Key Pair - Done
42,917,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,623,573 UART: [art] Erasing AUTHORITY.KEYID = 7
44,625,053 UART: [art] PUB.X = 7B88FEA6E0F9779AF0A605AC4F4D7CAB1C98474C59FDB44888ABC026F97FC383EEDF65B6398971893DF9E06EB019C5D1
44,632,317 UART: [art] PUB.Y = 97A3AC704007C8F82BCCD86CA95EEA253807F669317CC3ABC9517783803A18957FA5AC6EBF54C95A84D362DA52D19E69
44,639,633 UART: [art] SIG.R = FE7887C3C246B40EFA75FF0FC0DBAB8D88A8E73D3802BC48D5E3EDAB6FD3B8DCB219381F01F9F44DE758B679A1D7A70D
44,646,988 UART: [art] SIG.S = 263D81BFB7740B4E6078F4540B29DA053A1EC26CFD3B6883AB5C563893312D1870BB6595BF7AB4C9D2B8EC9067C694F8
45,625,802 UART: Caliptra RT
45,626,515 UART: [state] CFI Enabled
46,000,881 UART: [rt] RT failed reset flow
46,002,088 UART: Fatal Error: 0x000E0035
46,003,676 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,751,995 ready_for_fw is high
3,752,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,975 >>> mbox cmd response: success
15,038,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,281,102 UART:
19,281,475 UART: Running Caliptra FMC ...
19,282,614 UART:
19,282,800 UART: [state] CFI Enabled
19,290,870 UART: [fht] FMC Alias Private Key: 7
21,057,506 UART: [art] Extend RT PCRs Done
21,058,737 UART: [art] Lock RT PCRs Done
21,060,259 UART: [art] Populate DV Done
21,065,746 UART: [fht] FMC Alias Private Key: 7
21,067,351 UART: [art] Derive CDI
21,068,176 UART: [art] Store in slot 0x4
21,110,892 UART: [art] Derive Key Pair
21,111,896 UART: [art] Store priv key in slot 0x5
23,538,833 UART: [art] Derive Key Pair - Done
23,551,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,257,906 UART: [art] Erasing AUTHORITY.KEYID = 7
25,259,416 UART: [art] PUB.X = BCFA9CD0539136A89818A928B1F8E35720B58AC7951A1DD0B7D3CB391F61E0C6588EFDDFE6E7F9CB945555DA6D583EAA
25,266,673 UART: [art] PUB.Y = 93905A0431D94FC7E1AC565BF4E3B6DA3CA6728A7F2B0F3E872982A3CA43005247F0FBB5B7BB98E9CCA25605FB935ED0
25,273,929 UART: [art] SIG.R = F675DF0203D15E4A507D240834CBA716F172377BC3125484FD0BEC771E4A6DE7D3A1BDD62FCB7F104BB4FC7C31B21AF5
25,281,346 UART: [art] SIG.S = 74EDA51E183B467FAA686A9E18A542486D821101729EB803857F19A50C99C30E8155BD677DDD3CC7C30D3DD1BACF1A41
26,259,772 UART: Caliptra RT
26,260,486 UART: [state] CFI Enabled
26,393,162 UART: [rt] RT listening for mailbox commands...
26,425,164 UART: [rt]cmd =0x44504543, len=96
30,719,603 >>> mbox cmd response data (6236 bytes)
32,815,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,641,538 >>> mbox cmd response: success
40,642,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,676,241 UART:
40,676,570 UART: Running Caliptra FMC ...
40,677,719 UART:
40,677,886 UART: [state] CFI Enabled
40,722,182 UART: [art] Extend RT PCRs Done
40,723,338 UART: [art] Lock RT PCRs Done
40,724,851 UART: [art] Populate DV Done
40,730,594 UART: [fht] FMC Alias Private Key: 7
40,732,242 UART: [art] Derive CDI
40,733,059 UART: [art] Store in slot 0x4
40,775,966 UART: [art] Derive Key Pair
40,777,019 UART: [art] Store priv key in slot 0x5
43,203,933 UART: [art] Derive Key Pair - Done
43,216,826 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,923,592 UART: [art] Erasing AUTHORITY.KEYID = 7
44,925,104 UART: [art] PUB.X = 682D7D04A6BAB6D5BE7E0DA4296523F53E5471DDAE4B454750A0564DA903110DC7B3979DE6E7A4F8930D50070653B612
44,932,368 UART: [art] PUB.Y = 8F40B991CB68A790CD5AFE62D7ECAA988BA5D00DF7246EB0E1B32BF0211394816F670410A47D9F45DC4EB18F1455DC11
44,939,617 UART: [art] SIG.R = BDD9E0294D7D2B27D1A389E16627C8C773FD1FE4A0FA55A13D8E98A17FF7E9B37DCD0192527F4E01E37D650E990BC921
44,947,037 UART: [art] SIG.S = 6D494B24C5B60989E2ECB85D78FE37A5AD1D52D73FD2B386035F763C4FC369FA5AC1903B3C38D3CBF53BDCCB0E7B8D1A
45,925,851 UART: Caliptra RT
45,926,542 UART: [state] CFI Enabled
46,301,544 UART: [rt] RT failed reset flow
46,302,734 UART: Fatal Error: 0x000E0035
46,304,370 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,475 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,015 UART: [kat] SHA2-256
881,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,061 UART: [kat] ++
886,213 UART: [kat] sha1
890,521 UART: [kat] SHA2-256
892,459 UART: [kat] SHA2-384
895,154 UART: [kat] SHA2-512-ACC
897,055 UART: [kat] ECC-384
902,724 UART: [kat] HMAC-384Kdf
907,400 UART: [kat] LMS
1,475,596 UART: [kat] --
1,476,555 UART: [cold-reset] ++
1,477,085 UART: [fht] Storing FHT @ 0x50003400
1,479,810 UART: [idev] ++
1,479,978 UART: [idev] CDI.KEYID = 6
1,480,338 UART: [idev] SUBJECT.KEYID = 7
1,480,762 UART: [idev] UDS.KEYID = 0
1,481,107 ready_for_fw is high
1,481,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,570 UART: [idev] Erasing UDS.KEYID = 0
1,505,246 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,924 UART: [idev] --
1,515,035 UART: [ldev] ++
1,515,203 UART: [ldev] CDI.KEYID = 6
1,515,566 UART: [ldev] SUBJECT.KEYID = 5
1,515,992 UART: [ldev] AUTHORITY.KEYID = 7
1,516,455 UART: [ldev] FE.KEYID = 1
1,521,473 UART: [ldev] Erasing FE.KEYID = 1
1,546,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,262 UART: [ldev] --
1,585,767 UART: [fwproc] Waiting for Commands...
1,586,440 UART: [fwproc] Received command 0x46574c44
1,587,231 UART: [fwproc] Received Image of size 118548 bytes
2,931,497 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,357 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,575 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,856 >>> mbox cmd response: success
3,130,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,018 UART: [afmc] ++
3,132,186 UART: [afmc] CDI.KEYID = 6
3,132,548 UART: [afmc] SUBJECT.KEYID = 7
3,132,973 UART: [afmc] AUTHORITY.KEYID = 5
3,167,810 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,090 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,870 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,579 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,462 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,145 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,053 UART: [afmc] --
3,210,941 UART: [cold-reset] --
3,211,981 UART: [state] Locking Datavault
3,213,110 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,714 UART: [state] Locking ICCM
3,214,224 UART: [exit] Launching FMC @ 0x40000130
3,219,554 UART:
3,219,570 UART: Running Caliptra FMC ...
3,219,978 UART:
3,220,032 UART: [state] CFI Enabled
3,230,502 UART: [fht] FMC Alias Private Key: 7
3,349,204 UART: [art] Extend RT PCRs Done
3,349,632 UART: [art] Lock RT PCRs Done
3,351,020 UART: [art] Populate DV Done
3,359,149 UART: [fht] FMC Alias Private Key: 7
3,360,233 UART: [art] Derive CDI
3,360,513 UART: [art] Store in slot 0x4
3,445,927 UART: [art] Derive Key Pair
3,446,287 UART: [art] Store priv key in slot 0x5
3,459,230 UART: [art] Derive Key Pair - Done
3,473,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,365 UART: [art] PUB.X = E798D136B4E59F6177475C4B1416022BBD9FE3B4F8D6665F99B16A12C038F3CE5781B985F251CE714F70267FF29548B2
3,497,130 UART: [art] PUB.Y = 77E13FFF66BD94C211CAC294503BB94BDF3DBA692CA2C696091275F517CD4C6CD8B7DFB3D8205753D5557E7CA30A66F5
3,504,088 UART: [art] SIG.R = 0C8C4F60E8E326F9510A9AC5F1E331A512BE61C356F22C916C2BE34FAB98514B10ABFFCAF01F7F4365D0349E13DA85E6
3,510,866 UART: [art] SIG.S = 11322D29416E5FA8E7519B5190AF44F5162DAF78632EC42199C0339C69ED506E314BA09C44CC1C576BAFE7FEE2A82A75
3,534,318 UART: Caliptra RT
3,534,569 UART: [state] CFI Enabled
3,654,332 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,182 UART: [rt]cmd =0x44504543, len=96
3,877,704 >>> mbox cmd response data (6236 bytes)
3,877,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,878,447 UART:
3,878,463 UART: Running Caliptra ROM ...
3,878,871 UART:
3,878,925 UART: [state] CFI Enabled
3,881,475 UART: [state] LifecycleState = Unprovisioned
3,882,130 UART: [state] DebugLocked = No
3,882,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,884,457 UART: [kat] SHA2-256
4,678,388 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,682,503 UART: [kat] ++
4,682,655 UART: [kat] sha1
4,686,901 UART: [kat] SHA2-256
4,688,839 UART: [kat] SHA2-384
4,691,670 UART: [kat] SHA2-512-ACC
4,693,570 UART: [kat] ECC-384
4,699,329 UART: [kat] HMAC-384Kdf
4,703,993 UART: [kat] LMS
5,272,189 UART: [kat] --
5,273,124 UART: [update-reset] ++
6,654,778 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,656,046 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,811,313 >>> mbox cmd response: success
6,811,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,811,456 UART: [update-reset] Copying MAN_2 To MAN_1
6,819,470 UART: [update-reset Success] --
6,820,633 UART: [state] Locking Datavault
6,821,397 UART: [state] Locking PCR0, PCR1 and PCR31
6,822,001 UART: [state] Locking ICCM
6,822,459 UART: [exit] Launching FMC @ 0x40000130
6,827,789 UART:
6,827,805 UART: Running Caliptra FMC ...
6,828,213 UART:
6,828,267 UART: [state] CFI Enabled
6,917,520 UART: [art] Extend RT PCRs Done
6,917,948 UART: [art] Lock RT PCRs Done
6,919,123 UART: [art] Populate DV Done
6,927,446 UART: [fht] FMC Alias Private Key: 7
6,928,490 UART: [art] Derive CDI
6,928,770 UART: [art] Store in slot 0x4
7,014,566 UART: [art] Derive Key Pair
7,014,926 UART: [art] Store priv key in slot 0x5
7,028,017 UART: [art] Derive Key Pair - Done
7,042,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,058,248 UART: [art] Erasing AUTHORITY.KEYID = 7
7,059,013 UART: [art] PUB.X = 514B881FC38DF69915BA1DA6942A21EF09072B57A4D34934CA96CA5A031768B8D214DD1A45D53D87E18395EC1644013F
7,065,771 UART: [art] PUB.Y = E1E7E99D5BF44FDFD4FC7D4F43583D16A1F212124B111ED59C9FC735D4ED4A80138771174FC42A4245F483A88C5BACCE
7,072,735 UART: [art] SIG.R = B6EA5364FCE7B7434FD5BBD5DE34FF19E824E969EC742E3826BF811142207CAF8E1E33AEB580588187E2A088C9BA2553
7,079,515 UART: [art] SIG.S = F749A059BA281CD47421E0F3814C559DB15187C3514CDEF3C256DB8E1DC15556B9708980371455FD0B93D4B373EC98BA
7,103,596 UART: Caliptra RT
7,103,847 UART: [state] CFI Enabled
7,467,335 UART: [rt] RT failed reset flow
7,467,766 UART: Fatal Error: 0x000E0035
7,468,886 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,521 ready_for_fw is high
1,362,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,328 >>> mbox cmd response: success
2,979,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,040,515 UART:
3,040,531 UART: Running Caliptra FMC ...
3,040,939 UART:
3,040,993 UART: [state] CFI Enabled
3,051,455 UART: [fht] FMC Alias Private Key: 7
3,170,665 UART: [art] Extend RT PCRs Done
3,171,093 UART: [art] Lock RT PCRs Done
3,172,969 UART: [art] Populate DV Done
3,181,206 UART: [fht] FMC Alias Private Key: 7
3,182,274 UART: [art] Derive CDI
3,182,554 UART: [art] Store in slot 0x4
3,268,390 UART: [art] Derive Key Pair
3,268,750 UART: [art] Store priv key in slot 0x5
3,281,771 UART: [art] Derive Key Pair - Done
3,296,512 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,440 UART: [art] PUB.X = 48C9571F2CA84FCD89587C5512564B5BB2E3E2E2298C52EB56FDF9EE7E6509CD5551EE0EA89E511F0CF4CEE26B8C8C2F
3,319,219 UART: [art] PUB.Y = C838168E8CBE45DD31B7039DA2E74352A5B0438902395F7ADB5689651C3DD65180F0E50545F759F2529426737EB69B09
3,326,149 UART: [art] SIG.R = 543CD0EAE1A56A7EBC8C8757FDF11DFD04F56E5FDD3CDEB0BF5BA58D7DC8C51BD9F39475F16499372247C872A887F77A
3,332,938 UART: [art] SIG.S = 8E2DF00CEBC2954B6C0C7543A854E0EDAF223FE29E13A7E401295B75ABF6EDE6F6FBC5B6B0C60FF45736B7A76D5E7E10
3,356,776 UART: Caliptra RT
3,357,027 UART: [state] CFI Enabled
3,478,689 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,679 UART: [rt]cmd =0x44504543, len=96
3,701,935 >>> mbox cmd response data (6236 bytes)
3,701,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,516,140 >>> mbox cmd response: success
6,516,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,529,682 UART:
6,529,698 UART: Running Caliptra FMC ...
6,530,106 UART:
6,530,160 UART: [state] CFI Enabled
6,619,059 UART: [art] Extend RT PCRs Done
6,619,487 UART: [art] Lock RT PCRs Done
6,620,772 UART: [art] Populate DV Done
6,629,121 UART: [fht] FMC Alias Private Key: 7
6,630,209 UART: [art] Derive CDI
6,630,489 UART: [art] Store in slot 0x4
6,716,231 UART: [art] Derive Key Pair
6,716,591 UART: [art] Store priv key in slot 0x5
6,728,800 UART: [art] Derive Key Pair - Done
6,743,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,759,049 UART: [art] Erasing AUTHORITY.KEYID = 7
6,759,814 UART: [art] PUB.X = 785846741D2BCFB84EE8323E3D12AAAA81BD33F9A188499014B51C8B04F3013AC3B2BE973C721D8B48FCA51156F4E79E
6,766,586 UART: [art] PUB.Y = 763A6042D8EC4DE57886B7FBF5DC8DEC45D0702D5481897D34BD9AD773B640EEE4B2A6C86DAFA0A0642D4D7135F13EA2
6,773,552 UART: [art] SIG.R = 26925719ABCCA90F952F09A25BE7D2B9C71D5B2A7D421CAF5350F4E8BE4E14AD5DDB4AAF9E97E532055B83A18078D917
6,780,327 UART: [art] SIG.S = 5384AC010EE3E13BF3F27889E7390874FFF3064EAB461E6DE025C5C6BCFB2C53BF939BF6237F334A76D0858F9AF27A31
6,803,927 UART: Caliptra RT
6,804,178 UART: [state] CFI Enabled
7,170,958 UART: [rt] RT failed reset flow
7,171,389 UART: Fatal Error: 0x000E0035
7,172,509 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,796 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,294 UART: [kat] SHA2-256
882,225 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,340 UART: [kat] ++
886,492 UART: [kat] sha1
890,838 UART: [kat] SHA2-256
892,776 UART: [kat] SHA2-384
895,567 UART: [kat] SHA2-512-ACC
897,468 UART: [kat] ECC-384
903,157 UART: [kat] HMAC-384Kdf
907,737 UART: [kat] LMS
1,475,933 UART: [kat] --
1,477,040 UART: [cold-reset] ++
1,477,588 UART: [fht] Storing FHT @ 0x50003400
1,480,449 UART: [idev] ++
1,480,617 UART: [idev] CDI.KEYID = 6
1,480,977 UART: [idev] SUBJECT.KEYID = 7
1,481,401 UART: [idev] UDS.KEYID = 0
1,481,746 ready_for_fw is high
1,481,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,535 UART: [idev] Erasing UDS.KEYID = 0
1,506,995 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,793 UART: [idev] --
1,517,026 UART: [ldev] ++
1,517,194 UART: [ldev] CDI.KEYID = 6
1,517,557 UART: [ldev] SUBJECT.KEYID = 5
1,517,983 UART: [ldev] AUTHORITY.KEYID = 7
1,518,446 UART: [ldev] FE.KEYID = 1
1,523,718 UART: [ldev] Erasing FE.KEYID = 1
1,549,641 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,569,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,575,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,869 UART: [ldev] --
1,589,280 UART: [fwproc] Waiting for Commands...
1,590,133 UART: [fwproc] Received command 0x46574c44
1,590,924 UART: [fwproc] Received Image of size 118548 bytes
2,935,908 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,963,174 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,994,392 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,134,633 >>> mbox cmd response: success
3,134,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,135,867 UART: [afmc] ++
3,136,035 UART: [afmc] CDI.KEYID = 6
3,136,397 UART: [afmc] SUBJECT.KEYID = 7
3,136,822 UART: [afmc] AUTHORITY.KEYID = 5
3,171,805 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,188,311 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,189,091 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,194,800 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,200,683 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,206,366 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,214,172 UART: [afmc] --
3,215,186 UART: [cold-reset] --
3,216,016 UART: [state] Locking Datavault
3,217,469 UART: [state] Locking PCR0, PCR1 and PCR31
3,218,073 UART: [state] Locking ICCM
3,218,697 UART: [exit] Launching FMC @ 0x40000130
3,224,027 UART:
3,224,043 UART: Running Caliptra FMC ...
3,224,451 UART:
3,224,594 UART: [state] CFI Enabled
3,235,210 UART: [fht] FMC Alias Private Key: 7
3,354,354 UART: [art] Extend RT PCRs Done
3,354,782 UART: [art] Lock RT PCRs Done
3,356,464 UART: [art] Populate DV Done
3,364,459 UART: [fht] FMC Alias Private Key: 7
3,365,463 UART: [art] Derive CDI
3,365,743 UART: [art] Store in slot 0x4
3,451,521 UART: [art] Derive Key Pair
3,451,881 UART: [art] Store priv key in slot 0x5
3,465,002 UART: [art] Derive Key Pair - Done
3,479,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,495,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,129 UART: [art] PUB.X = 5431A557F5DDFC9674BC3B0255C0E41E45A092AFA19B3220E94CC1BC997474BF509DABE4B58B4C3B1E11B6DC053A3B31
3,502,907 UART: [art] PUB.Y = 73F9051317D794275006586806517C7A32D7C8292E6C455173F68F4793FB6993C31A721BC0E5887DEE07D5AC5F2AB994
3,509,835 UART: [art] SIG.R = 5684A91896789F0C9E2B906E7FB6BCE7309F04755A99DFD61E75B94F483E9358495A1445F5FE22618366FA0B04D7FD19
3,516,591 UART: [art] SIG.S = 92FDF86C2ED44087F25EC2C17E52F07F82F01F29A659AD73A48506A4317DD4EBAB50CED2054455E64D5B62CFF9ABB542
3,540,773 UART: Caliptra RT
3,541,116 UART: [state] CFI Enabled
3,660,870 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,692,028 UART: [rt]cmd =0x44504543, len=96
3,884,428 >>> mbox cmd response data (6236 bytes)
3,884,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,885,051 UART:
3,885,067 UART: Running Caliptra ROM ...
3,885,475 UART:
3,885,616 UART: [state] CFI Enabled
3,888,478 UART: [state] LifecycleState = Unprovisioned
3,889,133 UART: [state] DebugLocked = No
3,889,847 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,891,344 UART: [kat] SHA2-256
4,685,275 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,689,390 UART: [kat] ++
4,689,542 UART: [kat] sha1
4,693,770 UART: [kat] SHA2-256
4,695,708 UART: [kat] SHA2-384
4,698,633 UART: [kat] SHA2-512-ACC
4,700,533 UART: [kat] ECC-384
4,706,364 UART: [kat] HMAC-384Kdf
4,710,932 UART: [kat] LMS
5,279,128 UART: [kat] --
5,280,183 UART: [update-reset] ++
6,661,267 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,662,491 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,817,758 >>> mbox cmd response: success
6,817,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,817,875 UART: [update-reset] Copying MAN_2 To MAN_1
6,825,889 UART: [update-reset Success] --
6,826,930 UART: [state] Locking Datavault
6,827,852 UART: [state] Locking PCR0, PCR1 and PCR31
6,828,456 UART: [state] Locking ICCM
6,828,992 UART: [exit] Launching FMC @ 0x40000130
6,834,322 UART:
6,834,338 UART: Running Caliptra FMC ...
6,834,746 UART:
6,834,889 UART: [state] CFI Enabled
6,924,026 UART: [art] Extend RT PCRs Done
6,924,454 UART: [art] Lock RT PCRs Done
6,925,521 UART: [art] Populate DV Done
6,933,690 UART: [fht] FMC Alias Private Key: 7
6,934,752 UART: [art] Derive CDI
6,935,032 UART: [art] Store in slot 0x4
7,020,636 UART: [art] Derive Key Pair
7,020,996 UART: [art] Store priv key in slot 0x5
7,034,245 UART: [art] Derive Key Pair - Done
7,048,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,064,104 UART: [art] Erasing AUTHORITY.KEYID = 7
7,064,869 UART: [art] PUB.X = 3E7DA486A3598E6ED7018C51C3B30353D0DA27D9EDFF53872A0B62D10B0F3EFD6663A7D2852D0EF62C3286155A223E3C
7,071,629 UART: [art] PUB.Y = 59AD8D7BAD2ECF447579777505BC0AA067CA9A22529D8DE5EA6455D983FED696D9374565DA0ABEFA8E1C9064FABA72C8
7,078,588 UART: [art] SIG.R = 3DB6B0BFB1F9C58629139476837811399A38FF883D6399F6B74C12E7E7E30E36D25AA0DEE27078CE9E7AB3189078EF4E
7,085,359 UART: [art] SIG.S = D7A468E3F54580C64DFB8D7DF7B688C443CB9D49D98CC5391F052632F40BA28A72C1B7976EF59FAE6B9CF0E5DB39116F
7,108,915 UART: Caliptra RT
7,109,258 UART: [state] CFI Enabled
7,479,069 UART: [rt] RT failed reset flow
7,479,500 UART: Fatal Error: 0x000E0035
7,480,620 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,132 ready_for_fw is high
1,363,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,077 >>> mbox cmd response: success
2,983,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,044,534 UART:
3,044,550 UART: Running Caliptra FMC ...
3,044,958 UART:
3,045,101 UART: [state] CFI Enabled
3,055,547 UART: [fht] FMC Alias Private Key: 7
3,174,165 UART: [art] Extend RT PCRs Done
3,174,593 UART: [art] Lock RT PCRs Done
3,175,951 UART: [art] Populate DV Done
3,184,192 UART: [fht] FMC Alias Private Key: 7
3,185,312 UART: [art] Derive CDI
3,185,592 UART: [art] Store in slot 0x4
3,271,836 UART: [art] Derive Key Pair
3,272,196 UART: [art] Store priv key in slot 0x5
3,286,063 UART: [art] Derive Key Pair - Done
3,300,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,028 UART: [art] PUB.X = B85EF5D4B6C434CAEAFE0E8D40C11ABD53268704D1C03E4B82743F22AC8F8F56540B020F1951C5A688AE9B99490E9306
3,323,785 UART: [art] PUB.Y = 2E2F0D736EEEE3F76CEEA13A04ABC9AAD540916A6451F23EDDAB4B70A9324DC2E3E4199DC9E2B7B74C9D31EF08250578
3,330,743 UART: [art] SIG.R = BE82C0BB59B4259A6544E8EC84941D34295D9A6E2426E444021FB02E3A4B5AF190919208A2F0B7FCD645E87906B6B898
3,337,504 UART: [art] SIG.S = 501463139C64C8968BDD47C80176C04C2A0FC41A863A5F555221FE198D6C31F8B8F388F9E13C24346811BBE254DC51C7
3,361,396 UART: Caliptra RT
3,361,739 UART: [state] CFI Enabled
3,481,777 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,919 UART: [rt]cmd =0x44504543, len=96
3,704,264 >>> mbox cmd response data (6236 bytes)
3,704,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,518,154 >>> mbox cmd response: success
6,518,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,531,452 UART:
6,531,468 UART: Running Caliptra FMC ...
6,531,876 UART:
6,532,019 UART: [state] CFI Enabled
6,621,430 UART: [art] Extend RT PCRs Done
6,621,858 UART: [art] Lock RT PCRs Done
6,623,033 UART: [art] Populate DV Done
6,631,318 UART: [fht] FMC Alias Private Key: 7
6,632,436 UART: [art] Derive CDI
6,632,716 UART: [art] Store in slot 0x4
6,718,322 UART: [art] Derive Key Pair
6,718,682 UART: [art] Store priv key in slot 0x5
6,731,925 UART: [art] Derive Key Pair - Done
6,746,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,762,265 UART: [art] Erasing AUTHORITY.KEYID = 7
6,763,030 UART: [art] PUB.X = AF97671F39DC044E0CE24B8E1395F2FA154062F311015C838C6CE8EE894A9D2840F147D619EDDBEA5E8D16209D61CD53
6,769,799 UART: [art] PUB.Y = DA40067B756B58643394A945B4B50C2D241F757D7900F87F74DDA0359079BCA7887F607D146AE0A8C8DC3AAD6CF841CF
6,776,727 UART: [art] SIG.R = 2D0C42DBF5C973FD7B3FCDE5B4B21E36E2C323DE13B903AC62CF39272F7AEAFF511BABBFC9BFDD812D0117F34248BE2B
6,783,518 UART: [art] SIG.S = 255AE2F6E59E6D13C64275814B2DBF1F0C24B1E9F72F30B9A5AECF079D9B5A7771F062FA2F7E9274DA42D06236FE6309
6,807,573 UART: Caliptra RT
6,807,916 UART: [state] CFI Enabled
7,178,736 UART: [rt] RT failed reset flow
7,179,167 UART: Fatal Error: 0x000E0035
7,180,287 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,818 UART: [kat] SHA2-256
901,758 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,049 UART: [kat] HMAC-384Kdf
920,523 UART: [kat] LMS
1,168,835 UART: [kat] --
1,169,710 UART: [cold-reset] ++
1,170,248 UART: [fht] FHT @ 0x50003400
1,172,866 UART: [idev] ++
1,173,034 UART: [idev] CDI.KEYID = 6
1,173,395 UART: [idev] SUBJECT.KEYID = 7
1,173,820 UART: [idev] UDS.KEYID = 0
1,174,166 ready_for_fw is high
1,174,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,655 UART: [idev] Erasing UDS.KEYID = 0
1,198,711 UART: [idev] Sha1 KeyId Algorithm
1,207,693 UART: [idev] --
1,208,718 UART: [ldev] ++
1,208,886 UART: [ldev] CDI.KEYID = 6
1,209,250 UART: [ldev] SUBJECT.KEYID = 5
1,209,677 UART: [ldev] AUTHORITY.KEYID = 7
1,210,140 UART: [ldev] FE.KEYID = 1
1,215,314 UART: [ldev] Erasing FE.KEYID = 1
1,242,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,938 UART: [ldev] --
1,281,313 UART: [fwproc] Wait for Commands...
1,281,882 UART: [fwproc] Recv command 0x46574c44
1,282,615 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,139 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,314 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,611 >>> mbox cmd response: success
2,826,611 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,675 UART: [afmc] ++
2,827,843 UART: [afmc] CDI.KEYID = 6
2,828,206 UART: [afmc] SUBJECT.KEYID = 7
2,828,632 UART: [afmc] AUTHORITY.KEYID = 5
2,864,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,635 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,345 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,226 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,927 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,876 UART: [afmc] --
2,907,797 UART: [cold-reset] --
2,908,579 UART: [state] Locking Datavault
2,909,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,282 UART: [state] Locking ICCM
2,910,816 UART: [exit] Launching FMC @ 0x40000130
2,916,146 UART:
2,916,162 UART: Running Caliptra FMC ...
2,916,570 UART:
2,916,624 UART: [state] CFI Enabled
2,927,454 UART: [fht] FMC Alias Private Key: 7
3,045,764 UART: [art] Extend RT PCRs Done
3,046,192 UART: [art] Lock RT PCRs Done
3,047,778 UART: [art] Populate DV Done
3,055,855 UART: [fht] FMC Alias Private Key: 7
3,056,999 UART: [art] Derive CDI
3,057,279 UART: [art] Store in slot 0x4
3,143,114 UART: [art] Derive Key Pair
3,143,474 UART: [art] Store priv key in slot 0x5
3,156,868 UART: [art] Derive Key Pair - Done
3,171,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,871 UART: [art] PUB.X = 4F4614DBDD49CF75498B3CF84FE860FF42F6F3C57A7F529B783317F90FACB8733A3E7C8C391C0302BEEA4216FD603291
3,194,642 UART: [art] PUB.Y = F41393571076BF5426C9CED0DBF02D768B584B9A064F7F5A0C5827558EE62D662229346493AECA66FB4DAB94FCA4C0D8
3,201,594 UART: [art] SIG.R = E8E8AC38B3722D6C4F933068270ACC0396AB4A84F3E8D319D21A517E0BEDF2F77E80E7D41D032CF67C63A2D890E97711
3,208,360 UART: [art] SIG.S = EC9024BC2991DBE3E9E161E89F82E05EBD3F6A112238367ABE79985C82B58A017988948E5C37AF5EA41985E6FA828275
3,231,773 UART: Caliptra RT
3,232,024 UART: [state] CFI Enabled
3,350,974 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,962 UART: [rt]cmd =0x44504543, len=96
3,574,215 >>> mbox cmd response data (6236 bytes)
3,574,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,574,971 UART:
3,574,987 UART: Running Caliptra ROM ...
3,575,395 UART:
3,575,450 UART: [state] CFI Enabled
3,577,658 UART: [state] LifecycleState = Unprovisioned
3,578,313 UART: [state] DebugLocked = No
3,578,915 UART: [state] WD Timer not started. Device not locked for debugging
3,580,257 UART: [kat] SHA2-256
4,383,807 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,387,911 UART: [kat] ++
4,388,063 UART: [kat] sha1
4,392,475 UART: [kat] SHA2-256
4,394,415 UART: [kat] SHA2-384
4,397,062 UART: [kat] SHA2-512-ACC
4,398,962 UART: [kat] ECC-384
4,409,033 UART: [kat] HMAC-384Kdf
4,413,757 UART: [kat] LMS
4,662,069 UART: [kat] --
4,663,155 UART: [update-reset] ++
6,022,390 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,023,589 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,178,804 >>> mbox cmd response: success
6,178,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,179,033 UART: [update-reset] Copying MAN_2 To MAN_1
6,187,047 UART: [update-reset Success] --
6,188,180 UART: [state] Locking Datavault
6,188,916 UART: [state] Locking PCR0, PCR1 and PCR31
6,189,520 UART: [state] Locking ICCM
6,189,984 UART: [exit] Launching FMC @ 0x40000130
6,195,314 UART:
6,195,330 UART: Running Caliptra FMC ...
6,195,738 UART:
6,195,792 UART: [state] CFI Enabled
6,285,307 UART: [art] Extend RT PCRs Done
6,285,735 UART: [art] Lock RT PCRs Done
6,286,834 UART: [art] Populate DV Done
6,294,795 UART: [fht] FMC Alias Private Key: 7
6,295,835 UART: [art] Derive CDI
6,296,115 UART: [art] Store in slot 0x4
6,382,150 UART: [art] Derive Key Pair
6,382,510 UART: [art] Store priv key in slot 0x5
6,396,170 UART: [art] Derive Key Pair - Done
6,410,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,426,319 UART: [art] Erasing AUTHORITY.KEYID = 7
6,427,084 UART: [art] PUB.X = 2D36D4E2CC66FCC31DD359732F1FA202264DA510503A6236B1459C28BB121D7BC6A503F4D5F769A61DA041E9300CA48F
6,433,851 UART: [art] PUB.Y = 524DCF91EFB7419A2973E816051E178885B9D78403E2418E12CE02FB8CAF52DFF889741DDEC52B83AF6C1597828E87BB
6,440,798 UART: [art] SIG.R = 6EE81B3305974675E240F094672747C9F016A49BC1EF454F2955C1E2ED299F95CA3A63719A0B386F3A5E6C673B28CD25
6,447,560 UART: [art] SIG.S = FAA415184824A0A394267541F683DBAF1B5BF5E897501D8E7F07CB644031E8B8A8B395A1728A014A5328F35E178E52F6
6,471,056 UART: Caliptra RT
6,471,307 UART: [state] CFI Enabled
6,840,459 UART: [rt] RT failed reset flow
6,840,890 UART: Fatal Error: 0x000E0035
6,842,010 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,184 ready_for_fw is high
1,059,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,076 >>> mbox cmd response: success
2,678,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,739,449 UART:
2,739,465 UART: Running Caliptra FMC ...
2,739,873 UART:
2,739,927 UART: [state] CFI Enabled
2,750,607 UART: [fht] FMC Alias Private Key: 7
2,868,779 UART: [art] Extend RT PCRs Done
2,869,207 UART: [art] Lock RT PCRs Done
2,870,647 UART: [art] Populate DV Done
2,879,012 UART: [fht] FMC Alias Private Key: 7
2,879,970 UART: [art] Derive CDI
2,880,250 UART: [art] Store in slot 0x4
2,965,995 UART: [art] Derive Key Pair
2,966,355 UART: [art] Store priv key in slot 0x5
2,979,771 UART: [art] Derive Key Pair - Done
2,994,731 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,785 UART: [art] PUB.X = CF345EB15BA69FB06F075B3A2C46E138641DC14691E87F208D0AE7EC8346CFE953AF5DFEE3577FCE34292AEB55BA668F
3,017,567 UART: [art] PUB.Y = 8FD1558891C976FF2D2D530852B7682EE677824E3E19B8FC64999A5D88748919E0B05D049D8ECD66014E48A1C66210CA
3,024,504 UART: [art] SIG.R = F16917F6EFD2DE7802ED1DC1FA8EB8D254BFAB9C884E6C62B2405904F5304FD404FDECC91CC13F59A4ADDDAB55572F98
3,031,289 UART: [art] SIG.S = DD7C54C684B73DE2120EA5B93041F17F8F450629836F6CEE6B9B56F923E82B838BD692C5C325B07DF8866AA19BDF194B
3,054,991 UART: Caliptra RT
3,055,242 UART: [state] CFI Enabled
3,175,328 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,190 UART: [rt]cmd =0x44504543, len=96
3,398,418 >>> mbox cmd response data (6236 bytes)
3,398,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,887,851 >>> mbox cmd response: success
5,887,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,901,208 UART:
5,901,224 UART: Running Caliptra FMC ...
5,901,632 UART:
5,901,686 UART: [state] CFI Enabled
5,991,237 UART: [art] Extend RT PCRs Done
5,991,665 UART: [art] Lock RT PCRs Done
5,992,758 UART: [art] Populate DV Done
6,001,133 UART: [fht] FMC Alias Private Key: 7
6,002,111 UART: [art] Derive CDI
6,002,391 UART: [art] Store in slot 0x4
6,088,294 UART: [art] Derive Key Pair
6,088,654 UART: [art] Store priv key in slot 0x5
6,101,938 UART: [art] Derive Key Pair - Done
6,116,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,131,286 UART: [art] Erasing AUTHORITY.KEYID = 7
6,132,051 UART: [art] PUB.X = 69DA247AA4D648349D3EE04162771088363FDAEF2CCE5C0D406737094AE7A44C58A60294A563DA57B4DCDDE5124EF432
6,138,818 UART: [art] PUB.Y = EEEF47D1042CF3FB8B2C9E729656ABCE513904DA12A94E233C00628D4DEEC4965717D9687F6AE1F9F3A3812420E8EFBA
6,145,754 UART: [art] SIG.R = 1DA8800D73DDDE2943137A471507DFA9DFDFDB030E3E323E066D18821148E2AF772C128DC9D52C371A459A4D8CB5955E
6,152,517 UART: [art] SIG.S = 5E11A97A898F96ECB799531C403FD44CAF762A685E0FA8DF8EA8324C9AEEE13E4C7C73E9FAED3221988AB8FB8F7268D4
6,176,326 UART: Caliptra RT
6,176,577 UART: [state] CFI Enabled
6,545,614 UART: [rt] RT failed reset flow
6,546,045 UART: Fatal Error: 0x000E0035
6,547,165 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,711 UART: [kat] ++
895,863 UART: [kat] sha1
900,195 UART: [kat] SHA2-256
902,135 UART: [kat] SHA2-384
904,890 UART: [kat] SHA2-512-ACC
906,791 UART: [kat] ECC-384
916,544 UART: [kat] HMAC-384Kdf
920,998 UART: [kat] LMS
1,169,310 UART: [kat] --
1,170,213 UART: [cold-reset] ++
1,170,623 UART: [fht] FHT @ 0x50003400
1,173,261 UART: [idev] ++
1,173,429 UART: [idev] CDI.KEYID = 6
1,173,790 UART: [idev] SUBJECT.KEYID = 7
1,174,215 UART: [idev] UDS.KEYID = 0
1,174,561 ready_for_fw is high
1,174,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,588 UART: [idev] Erasing UDS.KEYID = 0
1,199,738 UART: [idev] Sha1 KeyId Algorithm
1,208,610 UART: [idev] --
1,209,645 UART: [ldev] ++
1,209,813 UART: [ldev] CDI.KEYID = 6
1,210,177 UART: [ldev] SUBJECT.KEYID = 5
1,210,604 UART: [ldev] AUTHORITY.KEYID = 7
1,211,067 UART: [ldev] FE.KEYID = 1
1,216,403 UART: [ldev] Erasing FE.KEYID = 1
1,242,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,649 UART: [ldev] --
1,281,972 UART: [fwproc] Wait for Commands...
1,282,779 UART: [fwproc] Recv command 0x46574c44
1,283,512 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,389 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,672 >>> mbox cmd response: success
2,826,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,904 UART: [afmc] ++
2,828,072 UART: [afmc] CDI.KEYID = 6
2,828,435 UART: [afmc] SUBJECT.KEYID = 7
2,828,861 UART: [afmc] AUTHORITY.KEYID = 5
2,864,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,821 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,570 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,280 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,161 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,862 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,653 UART: [afmc] --
2,907,682 UART: [cold-reset] --
2,908,436 UART: [state] Locking Datavault
2,909,355 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,959 UART: [state] Locking ICCM
2,910,437 UART: [exit] Launching FMC @ 0x40000130
2,915,767 UART:
2,915,783 UART: Running Caliptra FMC ...
2,916,191 UART:
2,916,334 UART: [state] CFI Enabled
2,926,658 UART: [fht] FMC Alias Private Key: 7
3,045,940 UART: [art] Extend RT PCRs Done
3,046,368 UART: [art] Lock RT PCRs Done
3,047,932 UART: [art] Populate DV Done
3,056,143 UART: [fht] FMC Alias Private Key: 7
3,057,193 UART: [art] Derive CDI
3,057,473 UART: [art] Store in slot 0x4
3,143,422 UART: [art] Derive Key Pair
3,143,782 UART: [art] Store priv key in slot 0x5
3,157,642 UART: [art] Derive Key Pair - Done
3,172,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,609 UART: [art] PUB.X = 8CFD44F85980A57F84F1F2A823654E57698AC660EF0A058FF017C017BF14715AA38F8A7AD7CEE92EE4AEE1BE67ABD973
3,195,389 UART: [art] PUB.Y = F42B0E51A1E477CE20DCD3579D3A04CA7E98940631313B32AD1EE73313D1281F3A9AFFDCEB7550B50A202E935AB53AA6
3,202,339 UART: [art] SIG.R = 7C08D9408D6208CA4D9DE5A726520DBAFB9BEBF21BC5C853225FEF91A862DE8139D804CCBED47AC9368A56B803856953
3,209,106 UART: [art] SIG.S = BDE8F0840CDBB65399B48451D2C2DE2C3A64F70C1C25B7E10F0AAF6A171BEF2A928E0449720FFEA1B216CD93C93C8EF3
3,233,274 UART: Caliptra RT
3,233,617 UART: [state] CFI Enabled
3,354,066 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,068 UART: [rt]cmd =0x44504543, len=96
3,577,696 >>> mbox cmd response data (6236 bytes)
3,577,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,578,550 UART:
3,578,566 UART: Running Caliptra ROM ...
3,578,974 UART:
3,579,116 UART: [state] CFI Enabled
3,581,526 UART: [state] LifecycleState = Unprovisioned
3,582,181 UART: [state] DebugLocked = No
3,582,701 UART: [state] WD Timer not started. Device not locked for debugging
3,583,833 UART: [kat] SHA2-256
4,387,383 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,391,487 UART: [kat] ++
4,391,639 UART: [kat] sha1
4,395,827 UART: [kat] SHA2-256
4,397,767 UART: [kat] SHA2-384
4,400,560 UART: [kat] SHA2-512-ACC
4,402,460 UART: [kat] ECC-384
4,412,279 UART: [kat] HMAC-384Kdf
4,417,109 UART: [kat] LMS
4,665,421 UART: [kat] --
4,666,251 UART: [update-reset] ++
6,025,572 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,026,609 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,181,824 >>> mbox cmd response: success
6,181,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,182,019 UART: [update-reset] Copying MAN_2 To MAN_1
6,190,033 UART: [update-reset Success] --
6,191,058 UART: [state] Locking Datavault
6,191,936 UART: [state] Locking PCR0, PCR1 and PCR31
6,192,540 UART: [state] Locking ICCM
6,193,126 UART: [exit] Launching FMC @ 0x40000130
6,198,456 UART:
6,198,472 UART: Running Caliptra FMC ...
6,198,880 UART:
6,199,023 UART: [state] CFI Enabled
6,288,044 UART: [art] Extend RT PCRs Done
6,288,472 UART: [art] Lock RT PCRs Done
6,289,885 UART: [art] Populate DV Done
6,298,180 UART: [fht] FMC Alias Private Key: 7
6,299,326 UART: [art] Derive CDI
6,299,606 UART: [art] Store in slot 0x4
6,385,053 UART: [art] Derive Key Pair
6,385,413 UART: [art] Store priv key in slot 0x5
6,398,653 UART: [art] Derive Key Pair - Done
6,413,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,429,162 UART: [art] Erasing AUTHORITY.KEYID = 7
6,429,927 UART: [art] PUB.X = 83C85DC36D66EE5AB1A30ACEBDF350618A90B0F478C5EFF7032C66810BEF2FD22284F4E5A717EBB916208D6F7748ABAE
6,436,706 UART: [art] PUB.Y = 8A9AACDA92F99CAC60AA8BF33779B89ED3C97031AA0D6A3A827F4089218FD1DC7CDC0DB4BB7606C5F0EE1905DED71781
6,443,666 UART: [art] SIG.R = 67C9D640365EF3E2C5B78D4BD981095F008FFEBA9FF95B7DC9BCA72B672CE07E052B0D41641F0481295793ECFAB02BE0
6,450,416 UART: [art] SIG.S = F2CB26221244F76873ED975FA38DC7845FDC0DBEE320B59FEDC02D2B6F2CD891974C5EA8F90BFFE404BEF08E38A7B091
6,474,233 UART: Caliptra RT
6,474,576 UART: [state] CFI Enabled
6,838,334 UART: [rt] RT failed reset flow
6,838,765 UART: Fatal Error: 0x000E0035
6,839,885 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,685 ready_for_fw is high
1,059,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,147 >>> mbox cmd response: success
2,679,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,304 UART:
2,741,320 UART: Running Caliptra FMC ...
2,741,728 UART:
2,741,871 UART: [state] CFI Enabled
2,752,941 UART: [fht] FMC Alias Private Key: 7
2,872,325 UART: [art] Extend RT PCRs Done
2,872,753 UART: [art] Lock RT PCRs Done
2,874,105 UART: [art] Populate DV Done
2,882,404 UART: [fht] FMC Alias Private Key: 7
2,883,556 UART: [art] Derive CDI
2,883,836 UART: [art] Store in slot 0x4
2,969,749 UART: [art] Derive Key Pair
2,970,109 UART: [art] Store priv key in slot 0x5
2,983,707 UART: [art] Derive Key Pair - Done
2,998,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,234 UART: [art] PUB.X = 3B83FA1D0E906E90EB5F7BF84F4B1C3A56F03AEDBF958C45CBA5D5FA5851CCC8429C53C29110D6ED35DE2544300090EC
3,020,997 UART: [art] PUB.Y = 2BDB7BD56C5058913F734F0A8AFAB4661AE8352BF9F7BA4528E19CA14F75C2EB7303FFE4A96449431FAFB1F6B094DB9B
3,027,959 UART: [art] SIG.R = FCD8E0492CDA1D539F642CD3D789EAF4F6D27E2F8B7C7888F6F4A1A0A0154EC2A50B64833C3516050112DAE1BD4DD9CF
3,034,738 UART: [art] SIG.S = 44B946DBD371B32C260E3B625B531C0C995B30B6E09ED0D7F2C9E11856698D9009676BD5AB138E7D7194120E3B5D7495
3,058,282 UART: Caliptra RT
3,058,625 UART: [state] CFI Enabled
3,177,810 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,104 UART: [rt]cmd =0x44504543, len=96
3,402,199 >>> mbox cmd response data (6236 bytes)
3,402,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,890,811 >>> mbox cmd response: success
5,890,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,904,148 UART:
5,904,164 UART: Running Caliptra FMC ...
5,904,572 UART:
5,904,715 UART: [state] CFI Enabled
5,994,424 UART: [art] Extend RT PCRs Done
5,994,852 UART: [art] Lock RT PCRs Done
5,996,113 UART: [art] Populate DV Done
6,004,346 UART: [fht] FMC Alias Private Key: 7
6,005,470 UART: [art] Derive CDI
6,005,750 UART: [art] Store in slot 0x4
6,091,721 UART: [art] Derive Key Pair
6,092,081 UART: [art] Store priv key in slot 0x5
6,104,965 UART: [art] Derive Key Pair - Done
6,119,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,134,840 UART: [art] Erasing AUTHORITY.KEYID = 7
6,135,605 UART: [art] PUB.X = 79FBACD39E3B4C4662C0D85BE23CD33639DA162086D3C9C0C34A7908C06214A14AF8B2B203A585AE23FC11982EC0C1CB
6,142,381 UART: [art] PUB.Y = 52998C0B8CBC2389C9FDE213E053BF8EBB5E839F48E77916527358F0D7732A0F912AD818D028BE509749396D95E8E949
6,149,323 UART: [art] SIG.R = 4B4F2F2E3BF3EF202C917F8434D8A533A2B2C531F7ABBE2CB4FC5408530558417DAB63524364774E3A23F4F0224682BC
6,156,091 UART: [art] SIG.S = CAF2B8C34C25EA5CD807BFC873D967232FE046D06E0E2AF30E449F5A87CEDBC4C19FDEF5FE23247CEC96AC9EA916AE63
6,179,528 UART: Caliptra RT
6,179,871 UART: [state] CFI Enabled
6,549,969 UART: [rt] RT failed reset flow
6,550,400 UART: Fatal Error: 0x000E0035
6,551,520 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
893,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,543 UART: [kat] ++
897,695 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,602 UART: [kat] SHA2-512-ACC
908,503 UART: [kat] ECC-384
918,066 UART: [kat] HMAC-384Kdf
922,736 UART: [kat] LMS
1,171,064 UART: [kat] --
1,171,869 UART: [cold-reset] ++
1,172,439 UART: [fht] FHT @ 0x50003400
1,175,034 UART: [idev] ++
1,175,202 UART: [idev] CDI.KEYID = 6
1,175,562 UART: [idev] SUBJECT.KEYID = 7
1,175,986 UART: [idev] UDS.KEYID = 0
1,176,331 ready_for_fw is high
1,176,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,218 UART: [idev] Erasing UDS.KEYID = 0
1,201,575 UART: [idev] Sha1 KeyId Algorithm
1,210,103 UART: [idev] --
1,211,207 UART: [ldev] ++
1,211,375 UART: [ldev] CDI.KEYID = 6
1,211,738 UART: [ldev] SUBJECT.KEYID = 5
1,212,164 UART: [ldev] AUTHORITY.KEYID = 7
1,212,627 UART: [ldev] FE.KEYID = 1
1,217,783 UART: [ldev] Erasing FE.KEYID = 1
1,243,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,627 UART: [ldev] --
1,283,116 UART: [fwproc] Wait for Commands...
1,283,854 UART: [fwproc] Recv command 0x46574c44
1,284,582 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,696 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,866 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,191 >>> mbox cmd response: success
2,828,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,829,207 UART: [afmc] ++
2,829,375 UART: [afmc] CDI.KEYID = 6
2,829,737 UART: [afmc] SUBJECT.KEYID = 7
2,830,162 UART: [afmc] AUTHORITY.KEYID = 5
2,865,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,722 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,470 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,179 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,062 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,763 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,735 UART: [afmc] --
2,909,797 UART: [cold-reset] --
2,910,697 UART: [state] Locking Datavault
2,911,926 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,530 UART: [state] Locking ICCM
2,913,066 UART: [exit] Launching FMC @ 0x40000130
2,918,396 UART:
2,918,412 UART: Running Caliptra FMC ...
2,918,820 UART:
2,918,874 UART: [state] CFI Enabled
2,929,282 UART: [fht] FMC Alias Private Key: 7
3,048,442 UART: [art] Extend RT PCRs Done
3,048,870 UART: [art] Lock RT PCRs Done
3,050,606 UART: [art] Populate DV Done
3,059,015 UART: [fht] FMC Alias Private Key: 7
3,060,055 UART: [art] Derive CDI
3,060,335 UART: [art] Store in slot 0x4
3,145,684 UART: [art] Derive Key Pair
3,146,044 UART: [art] Store priv key in slot 0x5
3,158,940 UART: [art] Derive Key Pair - Done
3,173,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,815 UART: [art] PUB.X = 5D9EAA2DAF056AA10710B7978FB6A930DB5CF40BEBFB5DFBF8D710FE0201E79A1F91A265A11D0E2C8A3B6CBEC9A0840F
3,196,592 UART: [art] PUB.Y = D2B28D7AE09459988F39364D0F4E73E2FCDE83BF0612EFD4D25B8B030A69B3B2A06D59733C5AA2A2BE6ED4BE2D44A3A1
3,203,548 UART: [art] SIG.R = 26DA5CC962A48D7FCB4DB9469E9A50D7098FC2758BAA465F34CE0A0160DA41CBF42B638578CAC05FEB25E14EE38E3321
3,210,325 UART: [art] SIG.S = A35C6A64C956920ABBDE35A63A22145675CB2CDB17CD30FAE4CA4B3890E6E9695C0D39C5438AA451E411F83D04A3E03B
3,233,920 UART: Caliptra RT
3,234,171 UART: [state] CFI Enabled
3,354,346 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,346 UART: [rt]cmd =0x44504543, len=96
3,576,341 >>> mbox cmd response data (6236 bytes)
3,576,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,577,157 UART:
3,577,173 UART: Running Caliptra ROM ...
3,577,581 UART:
3,577,636 UART: [state] CFI Enabled
3,580,314 UART: [state] LifecycleState = Unprovisioned
3,580,969 UART: [state] DebugLocked = No
3,581,531 UART: [state] WD Timer not started. Device not locked for debugging
3,582,847 UART: [kat] SHA2-256
4,388,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,392,622 UART: [kat] ++
4,392,774 UART: [kat] sha1
4,396,790 UART: [kat] SHA2-256
4,398,730 UART: [kat] SHA2-384
4,401,271 UART: [kat] SHA2-512-ACC
4,403,171 UART: [kat] ECC-384
4,412,798 UART: [kat] HMAC-384Kdf
4,417,262 UART: [kat] LMS
4,665,590 UART: [kat] --
4,666,310 UART: [update-reset] ++
6,026,198 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,027,341 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,182,556 >>> mbox cmd response: success
6,182,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,182,835 UART: [update-reset] Copying MAN_2 To MAN_1
6,190,849 UART: [update-reset Success] --
6,191,994 UART: [state] Locking Datavault
6,192,712 UART: [state] Locking PCR0, PCR1 and PCR31
6,193,316 UART: [state] Locking ICCM
6,193,768 UART: [exit] Launching FMC @ 0x40000130
6,199,098 UART:
6,199,114 UART: Running Caliptra FMC ...
6,199,522 UART:
6,199,576 UART: [state] CFI Enabled
6,288,865 UART: [art] Extend RT PCRs Done
6,289,293 UART: [art] Lock RT PCRs Done
6,290,470 UART: [art] Populate DV Done
6,298,581 UART: [fht] FMC Alias Private Key: 7
6,299,575 UART: [art] Derive CDI
6,299,855 UART: [art] Store in slot 0x4
6,385,856 UART: [art] Derive Key Pair
6,386,216 UART: [art] Store priv key in slot 0x5
6,399,246 UART: [art] Derive Key Pair - Done
6,414,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,429,592 UART: [art] Erasing AUTHORITY.KEYID = 7
6,430,357 UART: [art] PUB.X = 8AE253214944B3789527423EFF04FD11D1D82FBD184B636F6CEB4CD418F9EDFAA22A4C92EAE817B936B341205C3ECC0E
6,437,135 UART: [art] PUB.Y = BBC339CC790640853BF5F6F99A24188A0F9280E64B99FD985627B5BF058BFC9B4060322FA2FFF75FE9E462E884A6CBD3
6,444,086 UART: [art] SIG.R = C2401F84C5864B1EEB371FA214B011689E23DC0143E8046539CBA96A9E105CFD304BB2574B1AF2D9039AAE23999F00F1
6,450,829 UART: [art] SIG.S = 6595F338FDB1428E2C001CE3B59BCCC1837BFA88FAB0A58512C10ACB40DE5D72505772EE2182411023428F2F92754B55
6,474,720 UART: Caliptra RT
6,474,971 UART: [state] CFI Enabled
6,842,241 UART: [rt] RT failed reset flow
6,842,672 UART: Fatal Error: 0x000E0035
6,843,792 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,211 ready_for_fw is high
1,060,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,792 >>> mbox cmd response: success
2,680,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,365 UART:
2,742,381 UART: Running Caliptra FMC ...
2,742,789 UART:
2,742,843 UART: [state] CFI Enabled
2,753,363 UART: [fht] FMC Alias Private Key: 7
2,872,249 UART: [art] Extend RT PCRs Done
2,872,677 UART: [art] Lock RT PCRs Done
2,874,301 UART: [art] Populate DV Done
2,882,396 UART: [fht] FMC Alias Private Key: 7
2,883,328 UART: [art] Derive CDI
2,883,608 UART: [art] Store in slot 0x4
2,969,457 UART: [art] Derive Key Pair
2,969,817 UART: [art] Store priv key in slot 0x5
2,983,055 UART: [art] Derive Key Pair - Done
2,997,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,807 UART: [art] PUB.X = 42F9DDFB6034636B359EC5034166D48E0E12DB14B0351B13855F56121AFEC9063E70F6D8730EAC57FFE2DB28BDF54514
3,020,571 UART: [art] PUB.Y = A13A41F2A1ECAF23E1B66A77DA8D05ED3D7DADDF51F407808085681A606977332A3015D9D4217F4D24709D0E8C639FC2
3,027,518 UART: [art] SIG.R = CAFFDA2A12AA489264DEB9B75F7A478C7BF669DF30C8F31E9183D617DCA091995D237AE0804498B6CBFA6EFFCA044028
3,034,303 UART: [art] SIG.S = CFF4B72F5EBF843FDD7AD156983A161481F3CEB5EC297F40DB77AD55B76C1FE2E307EB963855C01A360ECE2EC0827E2F
3,058,885 UART: Caliptra RT
3,059,136 UART: [state] CFI Enabled
3,179,990 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,326 UART: [rt]cmd =0x44504543, len=96
3,403,492 >>> mbox cmd response data (6236 bytes)
3,403,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,892,640 >>> mbox cmd response: success
5,892,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,906,441 UART:
5,906,457 UART: Running Caliptra FMC ...
5,906,865 UART:
5,906,919 UART: [state] CFI Enabled
5,995,872 UART: [art] Extend RT PCRs Done
5,996,300 UART: [art] Lock RT PCRs Done
5,997,345 UART: [art] Populate DV Done
6,005,376 UART: [fht] FMC Alias Private Key: 7
6,006,326 UART: [art] Derive CDI
6,006,606 UART: [art] Store in slot 0x4
6,092,261 UART: [art] Derive Key Pair
6,092,621 UART: [art] Store priv key in slot 0x5
6,106,069 UART: [art] Derive Key Pair - Done
6,120,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,136,750 UART: [art] Erasing AUTHORITY.KEYID = 7
6,137,515 UART: [art] PUB.X = 69D18A8415449D0308BEA87F6384946293A0A61BD726DB5E1819A5E8BD26FE14D26A35B3A1F5CD49D4ACF40D209BD54A
6,144,284 UART: [art] PUB.Y = 193C23BB0417BBDDCE7348F695F395BA921E4610F7E4E4015CCF0E95C5C3C859DB5118B0689431C2A40D20936DF54510
6,151,224 UART: [art] SIG.R = 2E6C5AF55E65DF869941FB6DE4FD3A70677327339165BA421C821BCEBFC315D1B00F0E29EE1DE75B37C491754FA2CF71
6,158,000 UART: [art] SIG.S = 9FC9E21A89C0560439C14564B66DD319D633436575ECF93F62AE193A98ABFA68246C21AE5F57B49D0A02CC4D725655C2
6,181,791 UART: Caliptra RT
6,182,042 UART: [state] CFI Enabled
6,551,674 UART: [rt] RT failed reset flow
6,552,105 UART: Fatal Error: 0x000E0035
6,553,225 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,134 UART: [state] WD Timer not started. Device not locked for debugging
88,313 UART: [kat] SHA2-256
893,963 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,088 UART: [kat] ++
898,240 UART: [kat] sha1
902,412 UART: [kat] SHA2-256
904,352 UART: [kat] SHA2-384
907,189 UART: [kat] SHA2-512-ACC
909,090 UART: [kat] ECC-384
919,009 UART: [kat] HMAC-384Kdf
923,649 UART: [kat] LMS
1,171,977 UART: [kat] --
1,173,006 UART: [cold-reset] ++
1,173,442 UART: [fht] FHT @ 0x50003400
1,176,071 UART: [idev] ++
1,176,239 UART: [idev] CDI.KEYID = 6
1,176,599 UART: [idev] SUBJECT.KEYID = 7
1,177,023 UART: [idev] UDS.KEYID = 0
1,177,368 ready_for_fw is high
1,177,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,393 UART: [idev] Erasing UDS.KEYID = 0
1,202,552 UART: [idev] Sha1 KeyId Algorithm
1,210,996 UART: [idev] --
1,212,212 UART: [ldev] ++
1,212,380 UART: [ldev] CDI.KEYID = 6
1,212,743 UART: [ldev] SUBJECT.KEYID = 5
1,213,169 UART: [ldev] AUTHORITY.KEYID = 7
1,213,632 UART: [ldev] FE.KEYID = 1
1,218,558 UART: [ldev] Erasing FE.KEYID = 1
1,244,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,702 UART: [ldev] --
1,284,205 UART: [fwproc] Wait for Commands...
1,284,913 UART: [fwproc] Recv command 0x46574c44
1,285,641 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,589 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,759 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,036 >>> mbox cmd response: success
2,828,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,829,260 UART: [afmc] ++
2,829,428 UART: [afmc] CDI.KEYID = 6
2,829,790 UART: [afmc] SUBJECT.KEYID = 7
2,830,215 UART: [afmc] AUTHORITY.KEYID = 5
2,865,980 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,085 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,833 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,542 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,425 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,126 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,878 UART: [afmc] --
2,908,956 UART: [cold-reset] --
2,909,868 UART: [state] Locking Datavault
2,911,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,937 UART: [state] Locking ICCM
2,912,423 UART: [exit] Launching FMC @ 0x40000130
2,917,753 UART:
2,917,769 UART: Running Caliptra FMC ...
2,918,177 UART:
2,918,320 UART: [state] CFI Enabled
2,928,954 UART: [fht] FMC Alias Private Key: 7
3,047,864 UART: [art] Extend RT PCRs Done
3,048,292 UART: [art] Lock RT PCRs Done
3,049,914 UART: [art] Populate DV Done
3,057,865 UART: [fht] FMC Alias Private Key: 7
3,058,793 UART: [art] Derive CDI
3,059,073 UART: [art] Store in slot 0x4
3,144,834 UART: [art] Derive Key Pair
3,145,194 UART: [art] Store priv key in slot 0x5
3,159,090 UART: [art] Derive Key Pair - Done
3,173,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,374 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,139 UART: [art] PUB.X = 93012871E41E8F8A1F6060AC0B227FD4F2D80AFD63D2EE01333E2CBDA523D07635685A13F670A97C38BFB59AE93FDE77
3,196,907 UART: [art] PUB.Y = 890573A6A715FFE5CFCED2863BD2760D5DE4321A859212B0F99E6E1F6A66B6CA89F588BE61BD0EE8535154DF86D37C6B
3,203,860 UART: [art] SIG.R = 7EA664AA61CC518FE3DCD7CEAFD08B10B5D75463A4C865BEB07214AFB73D3B3CC6B8C2368F6E53BA4C8106871BE8AA73
3,210,649 UART: [art] SIG.S = 7EE7634C678FF05299455D82580B5391D823F9143DC43925B5C0C32AAA7F62C1376A19701BB769A6D32B2BAF6F48DED7
3,234,438 UART: Caliptra RT
3,234,781 UART: [state] CFI Enabled
3,354,779 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,921 UART: [rt]cmd =0x44504543, len=96
3,578,245 >>> mbox cmd response data (6236 bytes)
3,578,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,579,141 UART:
3,579,157 UART: Running Caliptra ROM ...
3,579,565 UART:
3,579,707 UART: [state] CFI Enabled
3,582,319 UART: [state] LifecycleState = Unprovisioned
3,582,974 UART: [state] DebugLocked = No
3,583,618 UART: [state] WD Timer not started. Device not locked for debugging
3,584,900 UART: [kat] SHA2-256
4,390,550 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,394,675 UART: [kat] ++
4,394,827 UART: [kat] sha1
4,399,125 UART: [kat] SHA2-256
4,401,065 UART: [kat] SHA2-384
4,404,014 UART: [kat] SHA2-512-ACC
4,405,914 UART: [kat] ECC-384
4,415,557 UART: [kat] HMAC-384Kdf
4,420,167 UART: [kat] LMS
4,668,495 UART: [kat] --
4,669,399 UART: [update-reset] ++
6,029,639 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,030,668 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,185,883 >>> mbox cmd response: success
6,185,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,186,110 UART: [update-reset] Copying MAN_2 To MAN_1
6,194,124 UART: [update-reset Success] --
6,195,241 UART: [state] Locking Datavault
6,196,091 UART: [state] Locking PCR0, PCR1 and PCR31
6,196,695 UART: [state] Locking ICCM
6,197,323 UART: [exit] Launching FMC @ 0x40000130
6,202,653 UART:
6,202,669 UART: Running Caliptra FMC ...
6,203,077 UART:
6,203,220 UART: [state] CFI Enabled
6,292,659 UART: [art] Extend RT PCRs Done
6,293,087 UART: [art] Lock RT PCRs Done
6,294,312 UART: [art] Populate DV Done
6,302,729 UART: [fht] FMC Alias Private Key: 7
6,303,901 UART: [art] Derive CDI
6,304,181 UART: [art] Store in slot 0x4
6,390,308 UART: [art] Derive Key Pair
6,390,668 UART: [art] Store priv key in slot 0x5
6,403,302 UART: [art] Derive Key Pair - Done
6,418,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,433,636 UART: [art] Erasing AUTHORITY.KEYID = 7
6,434,401 UART: [art] PUB.X = 0BBEC6B953A094F979DA29DDF93FEFCAEFF66F1B4362AB0C3F2DB681DB4FE53C608810A3029546EA76FDADCCBA79A8C0
6,441,192 UART: [art] PUB.Y = 93A2284AE2430A48B3497FE7673D0D329CD77221BB76FBAF429497B13C6DD644E1D661F138BD7F852FE2826B5251B794
6,448,136 UART: [art] SIG.R = 532A06F4922CCCEE7169C0AF92DAA8966EFF06FA65620FA519D9828B5A467B41336E41EA9D70A458709E94C3F3DF3592
6,454,903 UART: [art] SIG.S = E7352DA3EDBF2839A9C98E247E736891E564B292B851D2FC6E7DB7F020D73E50DF42689BD863896B7FDFB2EF69A5F755
6,478,347 UART: Caliptra RT
6,478,690 UART: [state] CFI Enabled
6,843,004 UART: [rt] RT failed reset flow
6,843,435 UART: Fatal Error: 0x000E0035
6,844,555 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,320 ready_for_fw is high
1,060,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,501 >>> mbox cmd response: success
2,680,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,864 UART:
2,742,880 UART: Running Caliptra FMC ...
2,743,288 UART:
2,743,431 UART: [state] CFI Enabled
2,753,999 UART: [fht] FMC Alias Private Key: 7
2,873,305 UART: [art] Extend RT PCRs Done
2,873,733 UART: [art] Lock RT PCRs Done
2,875,323 UART: [art] Populate DV Done
2,883,782 UART: [fht] FMC Alias Private Key: 7
2,884,832 UART: [art] Derive CDI
2,885,112 UART: [art] Store in slot 0x4
2,971,019 UART: [art] Derive Key Pair
2,971,379 UART: [art] Store priv key in slot 0x5
2,984,933 UART: [art] Derive Key Pair - Done
2,999,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,288 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,053 UART: [art] PUB.X = FDA4CC6783B71A7B3E2F38AFECD9F5E369401B304963401B9F7BC45F4F8EE6C88948003BD1B926AE89CB26C4FC0B4217
3,022,812 UART: [art] PUB.Y = BE5A3944219A0A1E0B457FEB4C4F22923CF8615CAF73DA5852153FDDAD82076B914C7510C604F65715A4D22C3CC9FF08
3,029,755 UART: [art] SIG.R = 82D7D1BFBC89408E05158714DEA24190757830F106E9796C3286B8A8C60CB5E1DEFDC3FD9C55184A996EC3AB0BE1BC14
3,036,523 UART: [art] SIG.S = 07FDF458ED78D4C911ABA1E93E481FC3A9E7CCC7FB64BEB6803B7BDBC7329A56B1F8ECEFD0F720E577355570FBEEFC8B
3,060,172 UART: Caliptra RT
3,060,515 UART: [state] CFI Enabled
3,180,396 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,430 UART: [rt]cmd =0x44504543, len=96
3,404,383 >>> mbox cmd response data (6236 bytes)
3,404,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,895,064 >>> mbox cmd response: success
5,895,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,908,457 UART:
5,908,473 UART: Running Caliptra FMC ...
5,908,881 UART:
5,909,024 UART: [state] CFI Enabled
5,998,543 UART: [art] Extend RT PCRs Done
5,998,971 UART: [art] Lock RT PCRs Done
6,000,276 UART: [art] Populate DV Done
6,008,413 UART: [fht] FMC Alias Private Key: 7
6,009,535 UART: [art] Derive CDI
6,009,815 UART: [art] Store in slot 0x4
6,095,784 UART: [art] Derive Key Pair
6,096,144 UART: [art] Store priv key in slot 0x5
6,109,906 UART: [art] Derive Key Pair - Done
6,124,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,139,933 UART: [art] Erasing AUTHORITY.KEYID = 7
6,140,698 UART: [art] PUB.X = 9E6AFC6C4B5E3C00A6940F518F814078FE4FC2B792207BD793DC7372DAD94FDF4685BBDCAD2E2ED5A20FB5250FF01D80
6,147,457 UART: [art] PUB.Y = E788AA773554BA793697FAC9C59AA39F0E240D92F4A44A1A1E42516EC8752D132810DEA29060D9DE49948895348F2E40
6,154,399 UART: [art] SIG.R = B8177910CEDA0BA024709A5321317710E5421B3A5E8C21DAA02BE95346990A9284D685059143FDD120009CEEDF49DC4E
6,161,138 UART: [art] SIG.S = 15BADEBD5D636B10F38830A49E9DAF319659246E5B7B621B384473C46BF84FCAFD945FC128CAF6F6D2DEAC7BD25B3373
6,184,824 UART: Caliptra RT
6,185,167 UART: [state] CFI Enabled
6,558,535 UART: [rt] RT failed reset flow
6,558,966 UART: Fatal Error: 0x000E0035
6,560,086 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,071 UART:
192,433 UART: Running Caliptra ROM ...
193,626 UART:
193,784 UART: [state] CFI Enabled
266,307 UART: [state] LifecycleState = Unprovisioned
268,320 UART: [state] DebugLocked = No
270,779 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,231 UART: [kat] SHA2-256
444,938 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,478 UART: [kat] ++
455,933 UART: [kat] sha1
467,491 UART: [kat] SHA2-256
470,226 UART: [kat] SHA2-384
477,152 UART: [kat] SHA2-512-ACC
479,523 UART: [kat] ECC-384
2,766,557 UART: [kat] HMAC-384Kdf
2,798,420 UART: [kat] LMS
3,988,699 UART: [kat] --
3,993,869 UART: [cold-reset] ++
3,996,019 UART: [fht] Storing FHT @ 0x50003400
4,007,432 UART: [idev] ++
4,007,999 UART: [idev] CDI.KEYID = 6
4,008,931 UART: [idev] SUBJECT.KEYID = 7
4,010,192 UART: [idev] UDS.KEYID = 0
4,011,283 ready_for_fw is high
4,011,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,692 UART: [idev] Erasing UDS.KEYID = 0
7,344,455 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,042 UART: [idev] --
7,372,013 UART: [ldev] ++
7,372,588 UART: [ldev] CDI.KEYID = 6
7,373,608 UART: [ldev] SUBJECT.KEYID = 5
7,374,850 UART: [ldev] AUTHORITY.KEYID = 7
7,375,957 UART: [ldev] FE.KEYID = 1
7,421,127 UART: [ldev] Erasing FE.KEYID = 1
10,752,651 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,868 UART: [ldev] --
13,133,327 UART: [fwproc] Waiting for Commands...
13,136,241 UART: [fwproc] Received command 0x46574c44
13,138,480 UART: [fwproc] Received Image of size 118548 bytes
17,241,276 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,316,543 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,389,726 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,717,369 >>> mbox cmd response: success
17,722,093 UART: [afmc] ++
17,722,720 UART: [afmc] CDI.KEYID = 6
17,723,639 UART: [afmc] SUBJECT.KEYID = 7
17,724,855 UART: [afmc] AUTHORITY.KEYID = 5
21,089,176 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,387,210 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,389,467 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,403,911 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,418,614 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,433,082 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,453,665 UART: [afmc] --
23,457,161 UART: [cold-reset] --
23,460,989 UART: [state] Locking Datavault
23,465,970 UART: [state] Locking PCR0, PCR1 and PCR31
23,467,727 UART: [state] Locking ICCM
23,470,040 UART: [exit] Launching FMC @ 0x40000130
23,478,443 UART:
23,478,686 UART: Running Caliptra FMC ...
23,479,793 UART:
23,479,955 UART: [state] CFI Enabled
23,546,788 UART: [fht] FMC Alias Private Key: 7
25,887,288 UART: [art] Extend RT PCRs Done
25,888,513 UART: [art] Lock RT PCRs Done
25,890,356 UART: [art] Populate DV Done
25,895,497 UART: [fht] FMC Alias Private Key: 7
25,897,085 UART: [art] Derive CDI
25,897,902 UART: [art] Store in slot 0x4
25,955,538 UART: [art] Derive Key Pair
25,956,602 UART: [art] Store priv key in slot 0x5
29,248,995 UART: [art] Derive Key Pair - Done
29,262,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,001 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,520 UART: [art] PUB.X = 7EB126898851867923DF7BD1B3ABEE80AEDD7743EFD15DEEE38A139F3A1F1BB840B95C95F716B18C73909768366E8BA1
31,558,787 UART: [art] PUB.Y = 11AC42203D7D7F29C4815D8732931B51E08DDB72D526A1A593AB7E843971ED96741C15D6F87033C4330ABE78C7ADD247
31,566,042 UART: [art] SIG.R = B56BFB65CEAAFB7938362801223C8243D111ADD4ACCE1FF0944B5184FE2F24749C4738BF82A936A7E1A829906DD086F8
31,573,467 UART: [art] SIG.S = F5724C9D0AE4F1375A46AF7938026C5FD164D3A3E2F7771469DC749E7C78E4170457D563D07CA0E2BCA3E7466AF571CA
32,878,208 UART: Caliptra RT
32,878,912 UART: [state] CFI Enabled
33,054,117 UART: [rt] RT listening for mailbox commands...
33,056,064 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,087,029 UART: [rt]cmd =0x44504543, len=136
38,714,260 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,806,372 ready_for_fw is high
3,806,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,967,752 >>> mbox cmd response: success
23,667,782 UART:
23,668,257 UART: Running Caliptra FMC ...
23,669,650 UART:
23,669,856 UART: [state] CFI Enabled
23,719,988 UART: [fht] FMC Alias Private Key: 7
26,081,097 UART: [art] Extend RT PCRs Done
26,082,325 UART: [art] Lock RT PCRs Done
26,083,980 UART: [art] Populate DV Done
26,089,354 UART: [fht] FMC Alias Private Key: 7
26,091,003 UART: [art] Derive CDI
26,091,746 UART: [art] Store in slot 0x4
26,149,049 UART: [art] Derive Key Pair
26,150,054 UART: [art] Store priv key in slot 0x5
29,442,976 UART: [art] Derive Key Pair - Done
29,455,975 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,583 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,103 UART: [art] PUB.X = 75C496B58C0792A4517B6AA4B2FF0472B536C9D6783BCCDF66FE07C4176D13D05E4E040B814D74C5EC69660763C06ABD
31,753,367 UART: [art] PUB.Y = 00E62E6BBD9BC478FA9AC8666F6F2902B21326392E906A1D54F41036AF6E5460132DBEA6522691F74C47396BB307B23A
31,760,595 UART: [art] SIG.R = 054EA043D0344AEFA84DFC97597BC4E5DC2F7CD9B3FB5814A07BDD26ECE5193324D82FA7012383D6D03516FA6FE447FD
31,768,035 UART: [art] SIG.S = 9F65612ABBA9A872564B890B1270714DEA8E14731B576FADAA4F86F21EBFA58FC01052D069B3822BF971B146DC22D65F
33,072,482 UART: Caliptra RT
33,073,200 UART: [state] CFI Enabled
33,249,220 UART: [rt] RT listening for mailbox commands...
33,251,141 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,282,220 UART: [rt]cmd =0x44504543, len=136
38,909,946 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,299 UART:
192,667 UART: Running Caliptra ROM ...
193,869 UART:
603,464 UART: [state] CFI Enabled
616,995 UART: [state] LifecycleState = Unprovisioned
619,145 UART: [state] DebugLocked = No
620,910 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,836 UART: [kat] SHA2-256
795,560 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,140 UART: [kat] ++
806,605 UART: [kat] sha1
817,613 UART: [kat] SHA2-256
820,329 UART: [kat] SHA2-384
825,811 UART: [kat] SHA2-512-ACC
828,166 UART: [kat] ECC-384
3,114,460 UART: [kat] HMAC-384Kdf
3,126,104 UART: [kat] LMS
4,316,220 UART: [kat] --
4,320,588 UART: [cold-reset] ++
4,321,899 UART: [fht] Storing FHT @ 0x50003400
4,332,808 UART: [idev] ++
4,333,364 UART: [idev] CDI.KEYID = 6
4,334,340 UART: [idev] SUBJECT.KEYID = 7
4,335,575 UART: [idev] UDS.KEYID = 0
4,336,647 ready_for_fw is high
4,336,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,756 UART: [idev] Erasing UDS.KEYID = 0
7,618,231 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,603 UART: [idev] --
7,643,104 UART: [ldev] ++
7,643,671 UART: [ldev] CDI.KEYID = 6
7,644,631 UART: [ldev] SUBJECT.KEYID = 5
7,645,892 UART: [ldev] AUTHORITY.KEYID = 7
7,647,119 UART: [ldev] FE.KEYID = 1
7,657,760 UART: [ldev] Erasing FE.KEYID = 1
10,947,653 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,358 UART: [ldev] --
13,309,700 UART: [fwproc] Waiting for Commands...
13,312,597 UART: [fwproc] Received command 0x46574c44
13,314,770 UART: [fwproc] Received Image of size 118548 bytes
17,419,390 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,700 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,897 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,628 >>> mbox cmd response: success
17,899,074 UART: [afmc] ++
17,899,709 UART: [afmc] CDI.KEYID = 6
17,900,623 UART: [afmc] SUBJECT.KEYID = 7
17,901,854 UART: [afmc] AUTHORITY.KEYID = 5
21,216,376 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,959 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,512,264 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,642 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,541,392 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,810 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,578,308 UART: [afmc] --
23,582,589 UART: [cold-reset] --
23,587,921 UART: [state] Locking Datavault
23,594,459 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,208 UART: [state] Locking ICCM
23,598,836 UART: [exit] Launching FMC @ 0x40000130
23,607,233 UART:
23,607,465 UART: Running Caliptra FMC ...
23,608,559 UART:
23,608,736 UART: [state] CFI Enabled
23,616,296 UART: [fht] FMC Alias Private Key: 7
25,956,163 UART: [art] Extend RT PCRs Done
25,957,384 UART: [art] Lock RT PCRs Done
25,958,873 UART: [art] Populate DV Done
25,963,957 UART: [fht] FMC Alias Private Key: 7
25,965,662 UART: [art] Derive CDI
25,966,394 UART: [art] Store in slot 0x4
26,009,036 UART: [art] Derive Key Pair
26,010,079 UART: [art] Store priv key in slot 0x5
29,252,292 UART: [art] Derive Key Pair - Done
29,265,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,423 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,541 UART: [art] PUB.X = D8BDB762E37CB6620593CA6300259F81D070870C3CC3BC131DAF262CC4E78EF09F828C7720EB8C94E33A1AB178F7692A
31,554,229 UART: [art] PUB.Y = 1B7D0B481104D01E3C0A1B3F651E2920B27D57D6FCB07E022BD8A6B14A9BE38C123743818E151792E5A0C97DBD795475
31,561,464 UART: [art] SIG.R = 4E76DE5C9E721DB17E8770B14C0BBF83FD8A72C6B01C7B89C87FE83A8F4A4776FA8E607852B80B0359E64E1B47C3A6BC
31,568,881 UART: [art] SIG.S = BD699CCFF89B2F3B0BCCF41FF7AF96E7809887E19351124854EB7C18C39586C9B4338B4872EBD1701273B44BD8C6C666
32,874,139 UART: Caliptra RT
32,875,247 UART: [state] CFI Enabled
33,007,755 UART: [rt] RT listening for mailbox commands...
33,009,711 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,040,599 UART: [rt]cmd =0x44504543, len=136
38,600,682 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
4,125,801 ready_for_fw is high
4,126,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,097 >>> mbox cmd response: success
23,807,020 UART:
23,807,465 UART: Running Caliptra FMC ...
23,808,583 UART:
23,808,738 UART: [state] CFI Enabled
23,816,856 UART: [fht] FMC Alias Private Key: 7
26,157,160 UART: [art] Extend RT PCRs Done
26,158,389 UART: [art] Lock RT PCRs Done
26,159,820 UART: [art] Populate DV Done
26,165,295 UART: [fht] FMC Alias Private Key: 7
26,166,939 UART: [art] Derive CDI
26,167,672 UART: [art] Store in slot 0x4
26,209,971 UART: [art] Derive Key Pair
26,211,004 UART: [art] Store priv key in slot 0x5
29,453,258 UART: [art] Derive Key Pair - Done
29,466,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,663 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,175 UART: [art] PUB.X = B4DEAAB38D6671F29F20008DB980B8EBACEEA652EECA64A721DC4D14F70B43047A07FEED7D36A318CAE8AC9ADF3AB8A1
31,755,498 UART: [art] PUB.Y = C172DD1FA50CE0260142FB930D0F62BE45E238D035658EE286ACD95718C63DA932F19D9EA2B3307C2654970CE0F7A326
31,762,685 UART: [art] SIG.R = 39FEB2A80614E2B4EBCA4C7EF7C9DDCD92BBCF69A26EA97F67F28F2E7B8D415436B11B3B1153D3B1C6136948277279AE
31,770,131 UART: [art] SIG.S = 6271C6B6633F95BD13F717135963564B1F60906336D9131902B8387EFD97F318073CEE5436E7B473FA543C448CA4A84E
33,075,670 UART: Caliptra RT
33,076,381 UART: [state] CFI Enabled
33,210,511 UART: [rt] RT listening for mailbox commands...
33,212,558 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,243,415 UART: [rt]cmd =0x44504543, len=136
38,802,932 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,143 UART:
192,491 UART: Running Caliptra ROM ...
193,661 UART:
193,817 UART: [state] CFI Enabled
264,196 UART: [state] LifecycleState = Unprovisioned
266,114 UART: [state] DebugLocked = No
268,922 UART: [state] WD Timer not started. Device not locked for debugging
272,813 UART: [kat] SHA2-256
452,502 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,309 UART: [kat] ++
463,844 UART: [kat] sha1
473,589 UART: [kat] SHA2-256
476,236 UART: [kat] SHA2-384
481,649 UART: [kat] SHA2-512-ACC
484,027 UART: [kat] ECC-384
2,946,386 UART: [kat] HMAC-384Kdf
2,970,345 UART: [kat] LMS
3,446,843 UART: [kat] --
3,450,000 UART: [cold-reset] ++
3,451,301 UART: [fht] FHT @ 0x50003400
3,462,564 UART: [idev] ++
3,463,126 UART: [idev] CDI.KEYID = 6
3,464,099 UART: [idev] SUBJECT.KEYID = 7
3,465,346 UART: [idev] UDS.KEYID = 0
3,466,246 ready_for_fw is high
3,466,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,539 UART: [idev] Erasing UDS.KEYID = 0
5,988,074 UART: [idev] Sha1 KeyId Algorithm
6,012,122 UART: [idev] --
6,016,603 UART: [ldev] ++
6,017,188 UART: [ldev] CDI.KEYID = 6
6,018,073 UART: [ldev] SUBJECT.KEYID = 5
6,019,341 UART: [ldev] AUTHORITY.KEYID = 7
6,020,495 UART: [ldev] FE.KEYID = 1
6,056,579 UART: [ldev] Erasing FE.KEYID = 1
8,564,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,990 UART: [ldev] --
10,372,785 UART: [fwproc] Wait for Commands...
10,374,770 UART: [fwproc] Recv command 0x46574c44
10,376,805 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,824 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,854 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,631 >>> mbox cmd response: success
14,354,097 UART: [afmc] ++
14,354,705 UART: [afmc] CDI.KEYID = 6
14,355,641 UART: [afmc] SUBJECT.KEYID = 7
14,356,856 UART: [afmc] AUTHORITY.KEYID = 5
16,897,095 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,722 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,515 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,562 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,690,116 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,105 UART: [afmc] --
18,716,710 UART: [cold-reset] --
18,719,603 UART: [state] Locking Datavault
18,724,364 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,133 UART: [state] Locking ICCM
18,727,586 UART: [exit] Launching FMC @ 0x40000130
18,735,974 UART:
18,736,206 UART: Running Caliptra FMC ...
18,737,305 UART:
18,737,458 UART: [state] CFI Enabled
18,809,554 UART: [fht] FMC Alias Private Key: 7
20,576,088 UART: [art] Extend RT PCRs Done
20,577,320 UART: [art] Lock RT PCRs Done
20,579,130 UART: [art] Populate DV Done
20,584,538 UART: [fht] FMC Alias Private Key: 7
20,586,248 UART: [art] Derive CDI
20,587,063 UART: [art] Store in slot 0x4
20,642,664 UART: [art] Derive Key Pair
20,643,705 UART: [art] Store priv key in slot 0x5
23,105,831 UART: [art] Derive Key Pair - Done
23,118,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,831,867 UART: [art] Erasing AUTHORITY.KEYID = 7
24,833,345 UART: [art] PUB.X = 9B6AD3B9CDAC6D413C3C4B3F3EE659EFEB3282A67FF26A0E21297CA5F5070C90ADAC50D3D33763D5D41504A5545076F0
24,840,637 UART: [art] PUB.Y = 362301BA61DDD8941BE424353C1B7C7D5EA8F1FB3F4A023783B75909BAFC93124DC684E68CEABCAB66188A0FB2ACEBB5
24,847,926 UART: [art] SIG.R = F9BA87FB8985AC40829654FEEBDAA992893C70F4B2BE1EE36CC8F59A006276E82F31FCEB811CFCE0F4995AD1B6A86B73
24,855,308 UART: [art] SIG.S = 6A4D920BF9BC57D3F2312D0CD7675B24209B26D69967F7537C24274918C784F4B1A64EB13F7789CDDA28D093D161D3F8
25,834,333 UART: Caliptra RT
25,835,047 UART: [state] CFI Enabled
26,014,433 UART: [rt] RT listening for mailbox commands...
26,016,348 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,047,209 UART: [rt]cmd =0x44504543, len=136
30,271,119 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
3,462,039 ready_for_fw is high
3,462,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,222,261 >>> mbox cmd response: success
18,516,066 UART:
18,516,463 UART: Running Caliptra FMC ...
18,517,614 UART:
18,517,771 UART: [state] CFI Enabled
18,584,980 UART: [fht] FMC Alias Private Key: 7
20,350,843 UART: [art] Extend RT PCRs Done
20,352,063 UART: [art] Lock RT PCRs Done
20,353,545 UART: [art] Populate DV Done
20,359,231 UART: [fht] FMC Alias Private Key: 7
20,360,764 UART: [art] Derive CDI
20,361,574 UART: [art] Store in slot 0x4
20,417,584 UART: [art] Derive Key Pair
20,418,614 UART: [art] Store priv key in slot 0x5
22,881,603 UART: [art] Derive Key Pair - Done
22,894,930 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,525 UART: [art] Erasing AUTHORITY.KEYID = 7
24,609,030 UART: [art] PUB.X = 465B36F89846969B86448CE44B81C893EA41B3B517100D319F7C8818E305CB469F76B9820AE492CFCD0EF656D6AF1167
24,616,285 UART: [art] PUB.Y = 209A9AD1D6AA5D2D4C35D5377C9F9555EF6E1C6F851C6F9E3FA490E382BE6530CBD83F7165E0831D2A7AD87BE476F10B
24,623,585 UART: [art] SIG.R = 64BC24006A68B5ABC0CF3F836C3A1990E0CCEC6308A2A551D9A6A24E3431F6C7FE7CFA27B67B2D34DE461DEF832F6CD4
24,630,976 UART: [art] SIG.S = 10F9B386EDA18055BA6445D5C38F449A6B45520A42C385F3F24E7DFF1BC30B21520EA42AE7DFAB429D71B0FD22E011A8
25,610,230 UART: Caliptra RT
25,610,940 UART: [state] CFI Enabled
25,791,885 UART: [rt] RT listening for mailbox commands...
25,793,819 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,824,836 UART: [rt]cmd =0x44504543, len=136
30,047,671 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,419 UART:
192,781 UART: Running Caliptra ROM ...
193,975 UART:
603,458 UART: [state] CFI Enabled
617,015 UART: [state] LifecycleState = Unprovisioned
618,973 UART: [state] DebugLocked = No
621,070 UART: [state] WD Timer not started. Device not locked for debugging
624,466 UART: [kat] SHA2-256
804,133 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,936 UART: [kat] ++
815,382 UART: [kat] sha1
826,186 UART: [kat] SHA2-256
828,916 UART: [kat] SHA2-384
835,476 UART: [kat] SHA2-512-ACC
837,847 UART: [kat] ECC-384
3,279,480 UART: [kat] HMAC-384Kdf
3,291,642 UART: [kat] LMS
3,768,144 UART: [kat] --
3,773,201 UART: [cold-reset] ++
3,774,580 UART: [fht] FHT @ 0x50003400
3,787,288 UART: [idev] ++
3,787,860 UART: [idev] CDI.KEYID = 6
3,788,769 UART: [idev] SUBJECT.KEYID = 7
3,790,018 UART: [idev] UDS.KEYID = 0
3,791,073 ready_for_fw is high
3,791,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,148 UART: [idev] Erasing UDS.KEYID = 0
6,270,338 UART: [idev] Sha1 KeyId Algorithm
6,293,121 UART: [idev] --
6,298,865 UART: [ldev] ++
6,299,442 UART: [ldev] CDI.KEYID = 6
6,300,331 UART: [ldev] SUBJECT.KEYID = 5
6,301,544 UART: [ldev] AUTHORITY.KEYID = 7
6,302,828 UART: [ldev] FE.KEYID = 1
6,313,964 UART: [ldev] Erasing FE.KEYID = 1
8,789,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,609 UART: [ldev] --
10,582,790 UART: [fwproc] Wait for Commands...
10,585,101 UART: [fwproc] Recv command 0x46574c44
10,587,138 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,161,985 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,234,992 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,564,153 >>> mbox cmd response: success
14,568,628 UART: [afmc] ++
14,569,237 UART: [afmc] CDI.KEYID = 6
14,570,182 UART: [afmc] SUBJECT.KEYID = 7
14,571,420 UART: [afmc] AUTHORITY.KEYID = 5
17,077,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,799,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,801,644 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,817,472 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,833,548 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,849,170 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,873,762 UART: [afmc] --
18,876,924 UART: [cold-reset] --
18,880,899 UART: [state] Locking Datavault
18,885,287 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,990 UART: [state] Locking ICCM
18,889,733 UART: [exit] Launching FMC @ 0x40000130
18,898,129 UART:
18,898,364 UART: Running Caliptra FMC ...
18,899,469 UART:
18,899,647 UART: [state] CFI Enabled
18,907,757 UART: [fht] FMC Alias Private Key: 7
20,674,247 UART: [art] Extend RT PCRs Done
20,675,474 UART: [art] Lock RT PCRs Done
20,677,129 UART: [art] Populate DV Done
20,682,795 UART: [fht] FMC Alias Private Key: 7
20,684,378 UART: [art] Derive CDI
20,685,207 UART: [art] Store in slot 0x4
20,727,857 UART: [art] Derive Key Pair
20,728,859 UART: [art] Store priv key in slot 0x5
23,155,655 UART: [art] Derive Key Pair - Done
23,168,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,875,053 UART: [art] Erasing AUTHORITY.KEYID = 7
24,876,565 UART: [art] PUB.X = 25EADF88FE775DCE7268B4AEC45A9F8F14248ACFF331D7B2830B8D6B10265C2CDC3C585BEB6BD2C5D06BB7A97ECE33DA
24,883,857 UART: [art] PUB.Y = CAFEB653A133571E90B08AD4C3F96AB8D5B0EA673A7D2DE10C9613CA2BBC7DDB8146CE17D67C88CE58235708D8AE2D5B
24,891,140 UART: [art] SIG.R = 492DC5572D000810C826F66CA1E4ED43972936FE6E4B117BB52F64DA2ADA39A635D3D015E3EF88A02E2A7D2F92D5A67D
24,898,554 UART: [art] SIG.S = 3FC23B8188D94802EB1B4AEB17943864BC380A660780186B841D92EFB8017E85BDCFD91FEB22C3D146829F93B222496E
25,877,044 UART: Caliptra RT
25,877,753 UART: [state] CFI Enabled
26,010,429 UART: [rt] RT listening for mailbox commands...
26,012,392 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,043,494 UART: [rt]cmd =0x44504543, len=136
30,214,087 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,771,813 ready_for_fw is high
3,772,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,143 >>> mbox cmd response: success
18,695,966 UART:
18,696,367 UART: Running Caliptra FMC ...
18,697,508 UART:
18,697,678 UART: [state] CFI Enabled
18,705,243 UART: [fht] FMC Alias Private Key: 7
20,471,346 UART: [art] Extend RT PCRs Done
20,472,571 UART: [art] Lock RT PCRs Done
20,474,054 UART: [art] Populate DV Done
20,479,597 UART: [fht] FMC Alias Private Key: 7
20,481,359 UART: [art] Derive CDI
20,482,174 UART: [art] Store in slot 0x4
20,524,450 UART: [art] Derive Key Pair
20,525,491 UART: [art] Store priv key in slot 0x5
22,952,635 UART: [art] Derive Key Pair - Done
22,965,470 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,619 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,161 UART: [art] PUB.X = 668FF3BBC424265E27F12A18008D1F9422816D018BBA674CB2AE11784BBD272E71E2026E5E8EEF46FAE532CE2882A3AD
24,680,371 UART: [art] PUB.Y = 9FA3E044B95AF10A35FBE67938722D2CA301F7D92CCB98E5FC82C4A4342A9833DF9DADF4ED0D7DE66F7399637F96FBC6
24,687,640 UART: [art] SIG.R = 0C8E162447F49DB8E0AE5915F91655CA297E5A37963C2CE5701F57F75905D9F4B6404161F19BBEFB87BA32AC33551984
24,695,044 UART: [art] SIG.S = 5526E07BA8381BB17B18F282D2621B41ED263C0801FCE27377C484284B9BF9ACDA4BB1E64BC312F4D076F8AE623162BB
25,674,053 UART: Caliptra RT
25,674,752 UART: [state] CFI Enabled
25,807,108 UART: [rt] RT listening for mailbox commands...
25,809,050 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,840,019 UART: [rt]cmd =0x44504543, len=136
30,010,014 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
191,993 UART:
192,359 UART: Running Caliptra ROM ...
193,549 UART:
193,706 UART: [state] CFI Enabled
263,610 UART: [state] LifecycleState = Unprovisioned
266,049 UART: [state] DebugLocked = No
268,089 UART: [state] WD Timer not started. Device not locked for debugging
272,129 UART: [kat] SHA2-256
461,966 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,718 UART: [kat] ++
473,194 UART: [kat] sha1
484,991 UART: [kat] SHA2-256
488,067 UART: [kat] SHA2-384
495,051 UART: [kat] SHA2-512-ACC
497,646 UART: [kat] ECC-384
2,951,310 UART: [kat] HMAC-384Kdf
2,973,212 UART: [kat] LMS
3,505,023 UART: [kat] --
3,510,221 UART: [cold-reset] ++
3,511,791 UART: [fht] FHT @ 0x50003400
3,523,421 UART: [idev] ++
3,524,051 UART: [idev] CDI.KEYID = 6
3,525,080 UART: [idev] SUBJECT.KEYID = 7
3,526,252 UART: [idev] UDS.KEYID = 0
3,527,173 ready_for_fw is high
3,527,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,427 UART: [idev] Erasing UDS.KEYID = 0
6,031,276 UART: [idev] Sha1 KeyId Algorithm
6,053,510 UART: [idev] --
6,058,944 UART: [ldev] ++
6,059,630 UART: [ldev] CDI.KEYID = 6
6,060,514 UART: [ldev] SUBJECT.KEYID = 5
6,061,727 UART: [ldev] AUTHORITY.KEYID = 7
6,062,883 UART: [ldev] FE.KEYID = 1
6,101,037 UART: [ldev] Erasing FE.KEYID = 1
8,608,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,882 UART: [ldev] --
10,416,584 UART: [fwproc] Wait for Commands...
10,419,433 UART: [fwproc] Recv command 0x46574c44
10,421,740 UART: [fwproc] Recv'd Img size: 118548 bytes
13,922,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,862 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,488 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,682,961 >>> mbox cmd response: success
14,687,334 UART: [afmc] ++
14,688,055 UART: [afmc] CDI.KEYID = 6
14,689,247 UART: [afmc] SUBJECT.KEYID = 7
14,690,735 UART: [afmc] AUTHORITY.KEYID = 5
17,235,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,099 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,022 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,144 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,251 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,175 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,668 UART: [afmc] --
19,033,674 UART: [cold-reset] --
19,038,513 UART: [state] Locking Datavault
19,042,796 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,943 UART: [state] Locking ICCM
19,046,397 UART: [exit] Launching FMC @ 0x40000130
19,055,030 UART:
19,055,281 UART: Running Caliptra FMC ...
19,056,387 UART:
19,056,547 UART: [state] CFI Enabled
19,118,777 UART: [fht] FMC Alias Private Key: 7
20,906,644 UART: [art] Extend RT PCRs Done
20,907,852 UART: [art] Lock RT PCRs Done
20,909,063 UART: [art] Populate DV Done
20,914,256 UART: [fht] FMC Alias Private Key: 7
20,915,758 UART: [art] Derive CDI
20,916,505 UART: [art] Store in slot 0x4
20,972,702 UART: [art] Derive Key Pair
20,973,695 UART: [art] Store priv key in slot 0x5
23,436,922 UART: [art] Derive Key Pair - Done
23,449,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,162,870 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,371 UART: [art] PUB.X = 946EC296BD73F939F3F9453BD63F8DDEEAF71EB36B24998249CE7F756DE51821A4CD8A86B7AAF72A3D8F48908E852F77
25,171,644 UART: [art] PUB.Y = F0F36548F606E7294CAE3CDA9D0FA119166F35BDA47A90E1D9C85135C29B961EF1CD8526EA91144B4604E5B77112775D
25,178,910 UART: [art] SIG.R = 15C937697178773389BE4AEED3697B230728777AD2350332B9EE9C7F0DB1C25BBAA3FD293406230C4ABFE0E4BB299BE5
25,186,339 UART: [art] SIG.S = 72F3CE208580FBEDCEC945FE0BD36B8C901AEF9087F77A581BB6F10DC2B1E1B899140975D4B1BC7B77557EA1BA06D182
26,165,300 UART: Caliptra RT
26,165,992 UART: [state] CFI Enabled
26,346,321 UART: [rt] RT listening for mailbox commands...
26,348,247 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,378,944 UART: [rt]cmd =0x44504543, len=136
30,602,458 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,442,814 ready_for_fw is high
3,443,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,006 >>> mbox cmd response: success
19,114,390 UART:
19,114,783 UART: Running Caliptra FMC ...
19,115,987 UART:
19,116,148 UART: [state] CFI Enabled
19,179,586 UART: [fht] FMC Alias Private Key: 7
20,946,031 UART: [art] Extend RT PCRs Done
20,947,270 UART: [art] Lock RT PCRs Done
20,948,901 UART: [art] Populate DV Done
20,954,373 UART: [fht] FMC Alias Private Key: 7
20,955,971 UART: [art] Derive CDI
20,956,804 UART: [art] Store in slot 0x4
21,012,611 UART: [art] Derive Key Pair
21,013,657 UART: [art] Store priv key in slot 0x5
23,476,443 UART: [art] Derive Key Pair - Done
23,489,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,655 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,152 UART: [art] PUB.X = 85EFD74FB5B2D9133C1D16337A5699389B44D09414CCD2F76B62895878369CE7267A7D2A76076558E20F56D9B223B106
25,211,426 UART: [art] PUB.Y = 105BE228428239BCAFBFE797E8A1596B5A98205A4305C957FA3F11C267F7F60F8DE1272C246D32D3AD5014FF281B0950
25,218,698 UART: [art] SIG.R = D852E9117898626F3B5EB66A68A75E0482C1BDC0BCDA9C16A56992EB102CFE4F4AC6ED72CD14E19F9DFC1A60618D6A75
25,226,076 UART: [art] SIG.S = 9541C78F4A5391BED4BA4F4F3E987F0760DD23C5D638019D53F1DEC4458C2BEF777B0F12C40AF268936C97D9293D87BB
26,205,287 UART: Caliptra RT
26,205,999 UART: [state] CFI Enabled
26,388,232 UART: [rt] RT listening for mailbox commands...
26,390,161 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,421,282 UART: [rt]cmd =0x44504543, len=136
30,643,067 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
192,551 UART:
192,924 UART: Running Caliptra ROM ...
194,117 UART:
603,804 UART: [state] CFI Enabled
617,316 UART: [state] LifecycleState = Unprovisioned
619,731 UART: [state] DebugLocked = No
620,899 UART: [state] WD Timer not started. Device not locked for debugging
625,292 UART: [kat] SHA2-256
815,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,002 UART: [kat] ++
826,462 UART: [kat] sha1
839,134 UART: [kat] SHA2-256
842,143 UART: [kat] SHA2-384
847,994 UART: [kat] SHA2-512-ACC
850,583 UART: [kat] ECC-384
3,292,885 UART: [kat] HMAC-384Kdf
3,305,970 UART: [kat] LMS
3,837,774 UART: [kat] --
3,841,481 UART: [cold-reset] ++
3,842,704 UART: [fht] FHT @ 0x50003400
3,854,037 UART: [idev] ++
3,854,679 UART: [idev] CDI.KEYID = 6
3,855,716 UART: [idev] SUBJECT.KEYID = 7
3,856,894 UART: [idev] UDS.KEYID = 0
3,857,826 ready_for_fw is high
3,858,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,887 UART: [idev] Erasing UDS.KEYID = 0
6,335,077 UART: [idev] Sha1 KeyId Algorithm
6,357,709 UART: [idev] --
6,363,376 UART: [ldev] ++
6,364,056 UART: [ldev] CDI.KEYID = 6
6,364,972 UART: [ldev] SUBJECT.KEYID = 5
6,366,136 UART: [ldev] AUTHORITY.KEYID = 7
6,367,367 UART: [ldev] FE.KEYID = 1
6,379,087 UART: [ldev] Erasing FE.KEYID = 1
8,857,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,838 UART: [ldev] --
10,648,806 UART: [fwproc] Wait for Commands...
10,651,119 UART: [fwproc] Recv command 0x46574c44
10,653,449 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,929 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,534 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,172 >>> mbox cmd response: success
14,917,674 UART: [afmc] ++
14,918,438 UART: [afmc] CDI.KEYID = 6
14,919,633 UART: [afmc] SUBJECT.KEYID = 7
14,921,074 UART: [afmc] AUTHORITY.KEYID = 5
17,421,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,746 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,857 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,984 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,918 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,628 UART: [afmc] --
19,218,549 UART: [cold-reset] --
19,222,217 UART: [state] Locking Datavault
19,226,407 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,568 UART: [state] Locking ICCM
19,230,731 UART: [exit] Launching FMC @ 0x40000130
19,239,427 UART:
19,239,669 UART: Running Caliptra FMC ...
19,240,706 UART:
19,240,857 UART: [state] CFI Enabled
19,249,344 UART: [fht] FMC Alias Private Key: 7
21,015,939 UART: [art] Extend RT PCRs Done
21,017,166 UART: [art] Lock RT PCRs Done
21,019,098 UART: [art] Populate DV Done
21,024,524 UART: [fht] FMC Alias Private Key: 7
21,026,124 UART: [art] Derive CDI
21,026,867 UART: [art] Store in slot 0x4
21,069,869 UART: [art] Derive Key Pair
21,070,874 UART: [art] Store priv key in slot 0x5
23,497,625 UART: [art] Derive Key Pair - Done
23,510,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,500 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,999 UART: [art] PUB.X = 8352F65AFFA150B64335BF5AC953A0752C1C2E3C9EE937EC28E2331FF628D4536DE5A37202D2C1EB5788F09675E47104
25,226,242 UART: [art] PUB.Y = D22546627B6FB7B3F503C5479045E7929C8226D718830B64CAA1B68EA1316EF47F8B57BCB4F44F98BDDE239A0CF45A03
25,233,498 UART: [art] SIG.R = DE82DEFBE6098D9BE794553384EEA3559FA5975588F03C5743D80F9A46CD996A50BC0EFE2BF2C0ADA158EA0E7CB6BC0A
25,240,916 UART: [art] SIG.S = 88299B648706DB76EF508779BE7CF6213D5E4628F345B30CCDB56737310F3E0D2532B35ED0E2B6413CDE0CB5168DB006
26,219,632 UART: Caliptra RT
26,220,342 UART: [state] CFI Enabled
26,353,966 UART: [rt] RT listening for mailbox commands...
26,355,891 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,386,767 UART: [rt]cmd =0x44504543, len=136
30,556,928 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,761,769 ready_for_fw is high
3,762,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,052,716 >>> mbox cmd response: success
19,301,801 UART:
19,302,751 UART: Running Caliptra FMC ...
19,303,887 UART:
19,304,049 UART: [state] CFI Enabled
19,311,700 UART: [fht] FMC Alias Private Key: 7
21,077,781 UART: [art] Extend RT PCRs Done
21,079,455 UART: [art] Lock RT PCRs Done
21,080,880 UART: [art] Populate DV Done
21,086,333 UART: [fht] FMC Alias Private Key: 7
21,087,947 UART: [art] Derive CDI
21,088,778 UART: [art] Store in slot 0x4
21,131,711 UART: [art] Derive Key Pair
21,132,717 UART: [art] Store priv key in slot 0x5
23,559,146 UART: [art] Derive Key Pair - Done
23,572,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,529 UART: [art] Erasing AUTHORITY.KEYID = 7
25,280,071 UART: [art] PUB.X = 08E962F4D849044FA6EFEB951B5B05A1E347C07F395C9D980B8E611B4E1B77DDD98C704C0758531B5E58DC8E17AF0D01
25,287,288 UART: [art] PUB.Y = 60B87FE5B07931B597522979C0CBA305C68DE65B4C1849263B63D83BBB55365E286BA229A4E0CB4DC8C7736375CD7098
25,294,546 UART: [art] SIG.R = 2402C382D3AB56D08AF6535ABA4CE0D8741209C1A93A052D638C4043810A590A4766E60391BF4BB1F3081A6434AF643D
25,301,928 UART: [art] SIG.S = B8117737F772E659C211F30C4656CC816FA693F5129AC82378745306AF9E845D114CE764E830279D18E2AB5440165991
26,280,387 UART: Caliptra RT
26,281,107 UART: [state] CFI Enabled
26,414,160 UART: [rt] RT listening for mailbox commands...
26,416,090 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,446,928 UART: [rt]cmd =0x44504543, len=136
30,616,437 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,607 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,203 UART: [kat] SHA2-256
882,134 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,249 UART: [kat] ++
886,401 UART: [kat] sha1
890,815 UART: [kat] SHA2-256
892,753 UART: [kat] SHA2-384
895,474 UART: [kat] SHA2-512-ACC
897,375 UART: [kat] ECC-384
903,074 UART: [kat] HMAC-384Kdf
907,856 UART: [kat] LMS
1,476,052 UART: [kat] --
1,476,563 UART: [cold-reset] ++
1,477,009 UART: [fht] Storing FHT @ 0x50003400
1,479,650 UART: [idev] ++
1,479,818 UART: [idev] CDI.KEYID = 6
1,480,178 UART: [idev] SUBJECT.KEYID = 7
1,480,602 UART: [idev] UDS.KEYID = 0
1,480,947 ready_for_fw is high
1,480,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,782 UART: [idev] Erasing UDS.KEYID = 0
1,505,516 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,066 UART: [idev] --
1,515,029 UART: [ldev] ++
1,515,197 UART: [ldev] CDI.KEYID = 6
1,515,560 UART: [ldev] SUBJECT.KEYID = 5
1,515,986 UART: [ldev] AUTHORITY.KEYID = 7
1,516,449 UART: [ldev] FE.KEYID = 1
1,521,623 UART: [ldev] Erasing FE.KEYID = 1
1,546,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,350 UART: [ldev] --
1,585,827 UART: [fwproc] Waiting for Commands...
1,586,566 UART: [fwproc] Received command 0x46574c44
1,587,357 UART: [fwproc] Received Image of size 118548 bytes
2,931,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,495 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,713 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,078 >>> mbox cmd response: success
3,131,222 UART: [afmc] ++
3,131,390 UART: [afmc] CDI.KEYID = 6
3,131,752 UART: [afmc] SUBJECT.KEYID = 7
3,132,177 UART: [afmc] AUTHORITY.KEYID = 5
3,167,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,678 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,458 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,167 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,050 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,733 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,533 UART: [afmc] --
3,210,665 UART: [cold-reset] --
3,211,723 UART: [state] Locking Datavault
3,213,000 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,604 UART: [state] Locking ICCM
3,214,248 UART: [exit] Launching FMC @ 0x40000130
3,219,578 UART:
3,219,594 UART: Running Caliptra FMC ...
3,220,002 UART:
3,220,056 UART: [state] CFI Enabled
3,230,344 UART: [fht] FMC Alias Private Key: 7
3,349,172 UART: [art] Extend RT PCRs Done
3,349,600 UART: [art] Lock RT PCRs Done
3,351,126 UART: [art] Populate DV Done
3,359,591 UART: [fht] FMC Alias Private Key: 7
3,360,591 UART: [art] Derive CDI
3,360,871 UART: [art] Store in slot 0x4
3,446,277 UART: [art] Derive Key Pair
3,446,637 UART: [art] Store priv key in slot 0x5
3,460,170 UART: [art] Derive Key Pair - Done
3,474,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,930 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,695 UART: [art] PUB.X = E618EEC18D8394E011F5CC16086967D08E68405B9DF86EB7D9FBFC168C1A8D370073A648B0C269781F9264E560465D5E
3,497,440 UART: [art] PUB.Y = EF0F9CF8637EA5BC8D8BED0DE2EE40E94193E9F8ED77211E233A9934096FBD3ACBCEB98500C60FDB12684C000D7F0A4A
3,504,350 UART: [art] SIG.R = 359BB0716F125A89E769045CB1894DFE63ABDCF31315D5918C3C98DC8DF7A2D7D89E6F55B2368B6E97ECB9EC55916F4F
3,511,129 UART: [art] SIG.S = D8EC9798FBFEF51360B70AF13BC8643F6DBC01CC4FF38CCFE79D3BFE0C8A888032939B8EF2617ECA4C07FADE8AE80C6A
3,534,922 UART: Caliptra RT
3,535,173 UART: [state] CFI Enabled
3,655,079 UART: [rt] RT listening for mailbox commands...
3,655,749 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,541 UART: [rt]cmd =0x44504543, len=136
3,749,381 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,501 ready_for_fw is high
1,362,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,524 >>> mbox cmd response: success
3,043,849 UART:
3,043,865 UART: Running Caliptra FMC ...
3,044,273 UART:
3,044,327 UART: [state] CFI Enabled
3,054,771 UART: [fht] FMC Alias Private Key: 7
3,173,675 UART: [art] Extend RT PCRs Done
3,174,103 UART: [art] Lock RT PCRs Done
3,175,697 UART: [art] Populate DV Done
3,183,994 UART: [fht] FMC Alias Private Key: 7
3,185,016 UART: [art] Derive CDI
3,185,296 UART: [art] Store in slot 0x4
3,271,472 UART: [art] Derive Key Pair
3,271,832 UART: [art] Store priv key in slot 0x5
3,285,225 UART: [art] Derive Key Pair - Done
3,300,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,486 UART: [art] PUB.X = EBB9DB653A2BE4603314690A17E9132FB3FBF467DA1562D16D30AFFE2AEF51C7C5830F852CD7BEC11A00EFEA66053C26
3,323,243 UART: [art] PUB.Y = EA2F3E9DD73231382BA1642E8BF8DF8ACB0A55219A266B5DB49112A2560C7831D42FC7E420F3C1FA4350818FE20339DA
3,330,192 UART: [art] SIG.R = 2914D0EAE62899899B5E3B82702BEF4BC318F69DBA263E4161C2E8AA1D79A04A4E77CF2C3497B4B9DDEDB274422C9D03
3,336,971 UART: [art] SIG.S = 410750D1F30776E95361B6A0BA46C728B46D3CC2E1BAC4EC1A7CCD990228FA38DF1FB49A737600E03056466E07ABAD72
3,360,553 UART: Caliptra RT
3,360,804 UART: [state] CFI Enabled
3,480,795 UART: [rt] RT listening for mailbox commands...
3,481,465 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,117 UART: [rt]cmd =0x44504543, len=136
3,574,791 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,656 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,348 UART: [kat] SHA2-256
882,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,394 UART: [kat] ++
886,546 UART: [kat] sha1
890,800 UART: [kat] SHA2-256
892,738 UART: [kat] SHA2-384
895,411 UART: [kat] SHA2-512-ACC
897,312 UART: [kat] ECC-384
903,051 UART: [kat] HMAC-384Kdf
907,493 UART: [kat] LMS
1,475,689 UART: [kat] --
1,476,510 UART: [cold-reset] ++
1,476,856 UART: [fht] Storing FHT @ 0x50003400
1,479,623 UART: [idev] ++
1,479,791 UART: [idev] CDI.KEYID = 6
1,480,151 UART: [idev] SUBJECT.KEYID = 7
1,480,575 UART: [idev] UDS.KEYID = 0
1,480,920 ready_for_fw is high
1,480,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,539 UART: [idev] Erasing UDS.KEYID = 0
1,505,207 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,677 UART: [idev] --
1,514,766 UART: [ldev] ++
1,514,934 UART: [ldev] CDI.KEYID = 6
1,515,297 UART: [ldev] SUBJECT.KEYID = 5
1,515,723 UART: [ldev] AUTHORITY.KEYID = 7
1,516,186 UART: [ldev] FE.KEYID = 1
1,521,454 UART: [ldev] Erasing FE.KEYID = 1
1,547,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,867 UART: [ldev] --
1,587,270 UART: [fwproc] Waiting for Commands...
1,588,011 UART: [fwproc] Received command 0x46574c44
1,588,802 UART: [fwproc] Received Image of size 118548 bytes
2,933,576 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,136 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,354 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,577 >>> mbox cmd response: success
3,133,775 UART: [afmc] ++
3,133,943 UART: [afmc] CDI.KEYID = 6
3,134,305 UART: [afmc] SUBJECT.KEYID = 7
3,134,730 UART: [afmc] AUTHORITY.KEYID = 5
3,170,333 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,947 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,727 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,436 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,319 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,002 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,872 UART: [afmc] --
3,213,984 UART: [cold-reset] --
3,214,682 UART: [state] Locking Datavault
3,216,149 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,753 UART: [state] Locking ICCM
3,217,299 UART: [exit] Launching FMC @ 0x40000130
3,222,629 UART:
3,222,645 UART: Running Caliptra FMC ...
3,223,053 UART:
3,223,196 UART: [state] CFI Enabled
3,233,814 UART: [fht] FMC Alias Private Key: 7
3,352,606 UART: [art] Extend RT PCRs Done
3,353,034 UART: [art] Lock RT PCRs Done
3,354,172 UART: [art] Populate DV Done
3,362,369 UART: [fht] FMC Alias Private Key: 7
3,363,483 UART: [art] Derive CDI
3,363,763 UART: [art] Store in slot 0x4
3,449,897 UART: [art] Derive Key Pair
3,450,257 UART: [art] Store priv key in slot 0x5
3,463,304 UART: [art] Derive Key Pair - Done
3,478,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,624 UART: [art] PUB.X = C7856E41872EB65F10C998C6BC49D90B748EA1E41B880C81AA5986B0498FA33DE8584C82EC55799852895FAD30CBFCD2
3,501,394 UART: [art] PUB.Y = 61162905B792A2A8A5AA9A3B815AA80BE9BC21DF29E97E80B1CA7A150FAFA875B3CE19867A034413A3820AB5D9F98362
3,508,337 UART: [art] SIG.R = 5725B09754A38FC6B39AFBCF8C85CCA886BF1CC3E110F3CE8FC4AAD19A32D09E39197CB85FA9B61AAAE4E1A16A030D09
3,515,122 UART: [art] SIG.S = 30F92BFC2F7541BB07CF1A3D836649C780CACDE18F9E15C19CDFEBDA9491FAC4AF5B39C43C8CD34CC48A5A7EF9B9AA8B
3,538,529 UART: Caliptra RT
3,538,872 UART: [state] CFI Enabled
3,659,221 UART: [rt] RT listening for mailbox commands...
3,659,891 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,459 UART: [rt]cmd =0x44504543, len=136
3,754,851 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,924 ready_for_fw is high
1,362,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,057 >>> mbox cmd response: success
3,042,640 UART:
3,042,656 UART: Running Caliptra FMC ...
3,043,064 UART:
3,043,207 UART: [state] CFI Enabled
3,053,969 UART: [fht] FMC Alias Private Key: 7
3,173,271 UART: [art] Extend RT PCRs Done
3,173,699 UART: [art] Lock RT PCRs Done
3,175,343 UART: [art] Populate DV Done
3,183,426 UART: [fht] FMC Alias Private Key: 7
3,184,422 UART: [art] Derive CDI
3,184,702 UART: [art] Store in slot 0x4
3,270,564 UART: [art] Derive Key Pair
3,270,924 UART: [art] Store priv key in slot 0x5
3,284,853 UART: [art] Derive Key Pair - Done
3,299,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,911 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,676 UART: [art] PUB.X = 922DC217DA3A99B062E8D4EED0706F81511146F924EF3327AA1CE9BE4CBB47FE9E87188C66FB31D82C645975002BF6EB
3,322,434 UART: [art] PUB.Y = 99B0623A14E7528D7AF69653B41E26C7C1052DC4E007D9398C71AD1783BB3DF06C9F4B1D6430CCA75CFE510D71C2E59C
3,329,383 UART: [art] SIG.R = EC40F2F25DD444055C7EE4313F7DF2B92B86B8AD3B5815D5A5ED9457FE0BB1349B2BCC60A5158332C7FA00553A3F4AF1
3,336,139 UART: [art] SIG.S = A11C4CD1A688E38ED2334E2D377E5EE32CD44E1D0C066184CA17DC08F13DD1D4614400B0DF6DD17A1546F2E2A7AA6E23
3,360,322 UART: Caliptra RT
3,360,665 UART: [state] CFI Enabled
3,480,694 UART: [rt] RT listening for mailbox commands...
3,481,364 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,064 UART: [rt]cmd =0x44504543, len=136
3,576,102 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,978 UART: [kat] ++
895,130 UART: [kat] sha1
899,442 UART: [kat] SHA2-256
901,382 UART: [kat] SHA2-384
904,057 UART: [kat] SHA2-512-ACC
905,958 UART: [kat] ECC-384
915,913 UART: [kat] HMAC-384Kdf
920,483 UART: [kat] LMS
1,168,795 UART: [kat] --
1,169,942 UART: [cold-reset] ++
1,170,504 UART: [fht] FHT @ 0x50003400
1,173,154 UART: [idev] ++
1,173,322 UART: [idev] CDI.KEYID = 6
1,173,683 UART: [idev] SUBJECT.KEYID = 7
1,174,108 UART: [idev] UDS.KEYID = 0
1,174,454 ready_for_fw is high
1,174,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,198,675 UART: [idev] Sha1 KeyId Algorithm
1,207,499 UART: [idev] --
1,208,368 UART: [ldev] ++
1,208,536 UART: [ldev] CDI.KEYID = 6
1,208,900 UART: [ldev] SUBJECT.KEYID = 5
1,209,327 UART: [ldev] AUTHORITY.KEYID = 7
1,209,790 UART: [ldev] FE.KEYID = 1
1,215,048 UART: [ldev] Erasing FE.KEYID = 1
1,241,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,598 UART: [ldev] --
1,280,817 UART: [fwproc] Wait for Commands...
1,281,624 UART: [fwproc] Recv command 0x46574c44
1,282,357 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,071 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,246 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,507 >>> mbox cmd response: success
2,825,541 UART: [afmc] ++
2,825,709 UART: [afmc] CDI.KEYID = 6
2,826,072 UART: [afmc] SUBJECT.KEYID = 7
2,826,498 UART: [afmc] AUTHORITY.KEYID = 5
2,862,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,836 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,585 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,295 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,176 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,877 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,668 UART: [afmc] --
2,905,685 UART: [cold-reset] --
2,906,465 UART: [state] Locking Datavault
2,907,612 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,216 UART: [state] Locking ICCM
2,908,878 UART: [exit] Launching FMC @ 0x40000130
2,914,208 UART:
2,914,224 UART: Running Caliptra FMC ...
2,914,632 UART:
2,914,686 UART: [state] CFI Enabled
2,924,876 UART: [fht] FMC Alias Private Key: 7
3,043,388 UART: [art] Extend RT PCRs Done
3,043,816 UART: [art] Lock RT PCRs Done
3,045,320 UART: [art] Populate DV Done
3,053,359 UART: [fht] FMC Alias Private Key: 7
3,054,505 UART: [art] Derive CDI
3,054,785 UART: [art] Store in slot 0x4
3,140,830 UART: [art] Derive Key Pair
3,141,190 UART: [art] Store priv key in slot 0x5
3,154,212 UART: [art] Derive Key Pair - Done
3,169,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,523 UART: [art] PUB.X = FB16868CF48B398FA0A9FEB4214A4FF34BEEA17263411ED5718BC7F21DCF3E49679597A18193280369803E1B4CF11552
3,192,292 UART: [art] PUB.Y = 673DDDCB69A0858F8CBEBD8D7F84FBFC80173107D1988CA66E22FB8B338F37D354E44D5C5B8BCC2EA56C30932635A4F1
3,199,255 UART: [art] SIG.R = 9CFE84C47E2A726AA83AAC241C3DCD5EC2EDA598064CE472BBD5698092E5B0DADCF218BA3A9D47E12AFAB11A8488FA1E
3,206,050 UART: [art] SIG.S = 495758505CB90439E26158CDEE5F553983C04A854963CC8C553380D6C819297E97B6AF80311AFB5608152830D0BAB84C
3,230,120 UART: Caliptra RT
3,230,371 UART: [state] CFI Enabled
3,349,764 UART: [rt] RT listening for mailbox commands...
3,350,434 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,898 UART: [rt]cmd =0x44504543, len=136
3,443,738 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,524 ready_for_fw is high
1,059,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,944 >>> mbox cmd response: success
2,738,357 UART:
2,738,373 UART: Running Caliptra FMC ...
2,738,781 UART:
2,738,835 UART: [state] CFI Enabled
2,749,505 UART: [fht] FMC Alias Private Key: 7
2,868,515 UART: [art] Extend RT PCRs Done
2,868,943 UART: [art] Lock RT PCRs Done
2,870,709 UART: [art] Populate DV Done
2,878,646 UART: [fht] FMC Alias Private Key: 7
2,879,716 UART: [art] Derive CDI
2,879,996 UART: [art] Store in slot 0x4
2,965,747 UART: [art] Derive Key Pair
2,966,107 UART: [art] Store priv key in slot 0x5
2,979,919 UART: [art] Derive Key Pair - Done
2,994,934 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,261 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,026 UART: [art] PUB.X = 4813FC6217FEC81EB6959D1EF19792139ED0F2D14CC8A9858AD21F120BB9FA612612FCB7AB11FE207B447FFC8E8217B3
3,017,805 UART: [art] PUB.Y = 6132361943CF65A5430625032C12768F3D9BEBBCBBE3B9AC937288403428901D540EAB3C3825BACF0B05EFE14B05C49E
3,024,741 UART: [art] SIG.R = F92217A8D480A862B3EE12762A655D30269314BF8E6A8DA06716B1246335C71CFD8E2D385940C02B6444030EB2B494E1
3,031,499 UART: [art] SIG.S = 35D7F19705170B336119E90115C190315C441CD8B5A37EDC22F67444F6A56EA75B3AA4AEE0027AEAFCF4D933F5D343FA
3,055,565 UART: Caliptra RT
3,055,816 UART: [state] CFI Enabled
3,174,937 UART: [rt] RT listening for mailbox commands...
3,175,607 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,367 UART: [rt]cmd =0x44504543, len=136
3,269,833 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,741 UART: [kat] ++
895,893 UART: [kat] sha1
900,157 UART: [kat] SHA2-256
902,097 UART: [kat] SHA2-384
904,802 UART: [kat] SHA2-512-ACC
906,703 UART: [kat] ECC-384
916,362 UART: [kat] HMAC-384Kdf
921,014 UART: [kat] LMS
1,169,326 UART: [kat] --
1,170,063 UART: [cold-reset] ++
1,170,539 UART: [fht] FHT @ 0x50003400
1,173,175 UART: [idev] ++
1,173,343 UART: [idev] CDI.KEYID = 6
1,173,704 UART: [idev] SUBJECT.KEYID = 7
1,174,129 UART: [idev] UDS.KEYID = 0
1,174,475 ready_for_fw is high
1,174,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,886 UART: [idev] Erasing UDS.KEYID = 0
1,198,280 UART: [idev] Sha1 KeyId Algorithm
1,207,178 UART: [idev] --
1,208,231 UART: [ldev] ++
1,208,399 UART: [ldev] CDI.KEYID = 6
1,208,763 UART: [ldev] SUBJECT.KEYID = 5
1,209,190 UART: [ldev] AUTHORITY.KEYID = 7
1,209,653 UART: [ldev] FE.KEYID = 1
1,214,805 UART: [ldev] Erasing FE.KEYID = 1
1,241,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,001 UART: [ldev] --
1,280,294 UART: [fwproc] Wait for Commands...
1,280,903 UART: [fwproc] Recv command 0x46574c44
1,281,636 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,274 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,449 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,636 >>> mbox cmd response: success
2,824,752 UART: [afmc] ++
2,824,920 UART: [afmc] CDI.KEYID = 6
2,825,283 UART: [afmc] SUBJECT.KEYID = 7
2,825,709 UART: [afmc] AUTHORITY.KEYID = 5
2,861,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,616 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,326 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,207 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,908 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,745 UART: [afmc] --
2,904,654 UART: [cold-reset] --
2,905,382 UART: [state] Locking Datavault
2,906,677 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,281 UART: [state] Locking ICCM
2,907,709 UART: [exit] Launching FMC @ 0x40000130
2,913,039 UART:
2,913,055 UART: Running Caliptra FMC ...
2,913,463 UART:
2,913,606 UART: [state] CFI Enabled
2,924,158 UART: [fht] FMC Alias Private Key: 7
3,043,132 UART: [art] Extend RT PCRs Done
3,043,560 UART: [art] Lock RT PCRs Done
3,045,044 UART: [art] Populate DV Done
3,053,177 UART: [fht] FMC Alias Private Key: 7
3,054,109 UART: [art] Derive CDI
3,054,389 UART: [art] Store in slot 0x4
3,140,384 UART: [art] Derive Key Pair
3,140,744 UART: [art] Store priv key in slot 0x5
3,153,800 UART: [art] Derive Key Pair - Done
3,168,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,835 UART: [art] PUB.X = AEC4B8730037B7A20ACD3355DA6A8D533B0472517B307867BBAEA8BD832B1B0B12F4AC647586C36EFE95107C99F80043
3,191,558 UART: [art] PUB.Y = 34278955991C6A902AA07909A1A238642AC3E4C1A0CDE11680A7F90FD9704D2A0D22DD0BB179F7E79B69C7611971A664
3,198,494 UART: [art] SIG.R = 62611138F0EC0ABD6FBDEB3515D18E5FE70BEC3E3183117C96AEEF6D0BB99646114262B939DE274C83004E8E5722348E
3,205,239 UART: [art] SIG.S = F583D4C432B4FC9E758D479348A4F9531467670925B04513F55DC54ECF9C35DBA06BF9F29355445FCD10488C3D8E37B7
3,228,566 UART: Caliptra RT
3,228,909 UART: [state] CFI Enabled
3,348,890 UART: [rt] RT listening for mailbox commands...
3,349,560 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,044 UART: [rt]cmd =0x44504543, len=136
3,443,522 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,861 ready_for_fw is high
1,059,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,791 >>> mbox cmd response: success
2,743,808 UART:
2,743,824 UART: Running Caliptra FMC ...
2,744,232 UART:
2,744,375 UART: [state] CFI Enabled
2,754,645 UART: [fht] FMC Alias Private Key: 7
2,874,197 UART: [art] Extend RT PCRs Done
2,874,625 UART: [art] Lock RT PCRs Done
2,876,041 UART: [art] Populate DV Done
2,884,178 UART: [fht] FMC Alias Private Key: 7
2,885,292 UART: [art] Derive CDI
2,885,572 UART: [art] Store in slot 0x4
2,971,363 UART: [art] Derive Key Pair
2,971,723 UART: [art] Store priv key in slot 0x5
2,985,869 UART: [art] Derive Key Pair - Done
3,000,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,852 UART: [art] PUB.X = 66D81EA7FB109E26E122300E453FE1EA8174C79DFFF5840680E54F3F191B5A19354F7D6268E20F6A04F0A52697C09B19
3,023,610 UART: [art] PUB.Y = D638624A3DD22B20F8E54E7456A14CF440ED2D2D4DFC0203949FF6FCACFDD735BA87CF59CC85DA0D9B28FFDE407A2DE8
3,030,577 UART: [art] SIG.R = 8F6AF8192A7B5715B72E59E2711E98816F706FE7D631B2F3E3CBAEACB523111D377567590B070864D9C311E4F616DDF7
3,037,340 UART: [art] SIG.S = 7BEF948288A6763D8206946329F3D33C690DF25FFA346EF2EDFAE2FED2FE5D83826EF47DF44EA2D1BF4F2655166158F0
3,061,348 UART: Caliptra RT
3,061,691 UART: [state] CFI Enabled
3,183,210 UART: [rt] RT listening for mailbox commands...
3,183,880 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,214,342 UART: [rt]cmd =0x44504543, len=136
3,278,252 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
893,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,635 UART: [kat] ++
897,787 UART: [kat] sha1
901,959 UART: [kat] SHA2-256
903,899 UART: [kat] SHA2-384
906,688 UART: [kat] SHA2-512-ACC
908,589 UART: [kat] ECC-384
918,148 UART: [kat] HMAC-384Kdf
922,674 UART: [kat] LMS
1,171,002 UART: [kat] --
1,171,771 UART: [cold-reset] ++
1,172,135 UART: [fht] FHT @ 0x50003400
1,174,766 UART: [idev] ++
1,174,934 UART: [idev] CDI.KEYID = 6
1,175,294 UART: [idev] SUBJECT.KEYID = 7
1,175,718 UART: [idev] UDS.KEYID = 0
1,176,063 ready_for_fw is high
1,176,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,182 UART: [idev] Erasing UDS.KEYID = 0
1,200,347 UART: [idev] Sha1 KeyId Algorithm
1,208,823 UART: [idev] --
1,209,691 UART: [ldev] ++
1,209,859 UART: [ldev] CDI.KEYID = 6
1,210,222 UART: [ldev] SUBJECT.KEYID = 5
1,210,648 UART: [ldev] AUTHORITY.KEYID = 7
1,211,111 UART: [ldev] FE.KEYID = 1
1,216,125 UART: [ldev] Erasing FE.KEYID = 1
1,242,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,737 UART: [ldev] --
1,282,112 UART: [fwproc] Wait for Commands...
1,282,878 UART: [fwproc] Recv command 0x46574c44
1,283,606 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,296 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,466 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,797 >>> mbox cmd response: success
2,826,835 UART: [afmc] ++
2,827,003 UART: [afmc] CDI.KEYID = 6
2,827,365 UART: [afmc] SUBJECT.KEYID = 7
2,827,790 UART: [afmc] AUTHORITY.KEYID = 5
2,862,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,922 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,631 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,514 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,215 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,011 UART: [afmc] --
2,905,951 UART: [cold-reset] --
2,906,701 UART: [state] Locking Datavault
2,907,912 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,516 UART: [state] Locking ICCM
2,908,982 UART: [exit] Launching FMC @ 0x40000130
2,914,312 UART:
2,914,328 UART: Running Caliptra FMC ...
2,914,736 UART:
2,914,790 UART: [state] CFI Enabled
2,925,596 UART: [fht] FMC Alias Private Key: 7
3,044,210 UART: [art] Extend RT PCRs Done
3,044,638 UART: [art] Lock RT PCRs Done
3,046,186 UART: [art] Populate DV Done
3,054,215 UART: [fht] FMC Alias Private Key: 7
3,055,299 UART: [art] Derive CDI
3,055,579 UART: [art] Store in slot 0x4
3,141,328 UART: [art] Derive Key Pair
3,141,688 UART: [art] Store priv key in slot 0x5
3,155,152 UART: [art] Derive Key Pair - Done
3,169,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,699 UART: [art] PUB.X = 20C0D09A2DC118671274AAF3CFD6479D6D396E3F7557C993F9B0FF84047A71503FF894CABC4F4CECFCDCF3C661748E66
3,192,480 UART: [art] PUB.Y = 0A565B3C1E11BA9CFB3A39FDBDADB56B05EB082834BEA7801EF2129B856A6E89EAA6DC3E9D170B56D9D82DB3A1A6ECD4
3,199,446 UART: [art] SIG.R = 1521781553FCE05B5806FFAE53FD81D0A0235D796415A6C18E0678F6ADEEFEE7FBE29EC30C2498A7D65D72D1223D9D26
3,206,217 UART: [art] SIG.S = 0542EB82295825A9811482BA6F3D6F584C8BBF9EF67056E89FC2F6DCD74F7D769255D08483C274F3D1C73CD0EAD1968E
3,229,478 UART: Caliptra RT
3,229,729 UART: [state] CFI Enabled
3,349,401 UART: [rt] RT listening for mailbox commands...
3,350,071 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,683 UART: [rt]cmd =0x44504543, len=136
3,444,649 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,147 ready_for_fw is high
1,060,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,698 >>> mbox cmd response: success
2,741,461 UART:
2,741,477 UART: Running Caliptra FMC ...
2,741,885 UART:
2,741,939 UART: [state] CFI Enabled
2,752,529 UART: [fht] FMC Alias Private Key: 7
2,871,327 UART: [art] Extend RT PCRs Done
2,871,755 UART: [art] Lock RT PCRs Done
2,873,353 UART: [art] Populate DV Done
2,881,614 UART: [fht] FMC Alias Private Key: 7
2,882,600 UART: [art] Derive CDI
2,882,880 UART: [art] Store in slot 0x4
2,968,365 UART: [art] Derive Key Pair
2,968,725 UART: [art] Store priv key in slot 0x5
2,981,613 UART: [art] Derive Key Pair - Done
2,996,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,425 UART: [art] PUB.X = E2857819F791E90D01C8934FA6B529BA24A20CF442D64345174B0BFE278AE05B44680DFBC73A55477B4A6B9606D2E52C
3,019,179 UART: [art] PUB.Y = D23878650D7DF590BD991D74643CAECB53D01AABCEB308447CA8D46AB0AB53D09BC977C02BB8C12A620DA509BDDF165F
3,026,137 UART: [art] SIG.R = 3677F9BAF3B60CDDC25ACC49892264711DDE4684046441F4EE0611CCF15020616EAE4EDC850D64C8EDC2E6BA84A72515
3,032,905 UART: [art] SIG.S = 58BC3B508AB0644E2E84AD71E40FFECBE9FBD9D29F2CA19B36BEC9DC7198AB142D3E93A53718935DC6A07FCF5487DE5D
3,056,738 UART: Caliptra RT
3,056,989 UART: [state] CFI Enabled
3,177,137 UART: [rt] RT listening for mailbox commands...
3,177,807 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,663 UART: [rt]cmd =0x44504543, len=136
3,271,545 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
893,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,998 UART: [kat] ++
898,150 UART: [kat] sha1
902,458 UART: [kat] SHA2-256
904,398 UART: [kat] SHA2-384
907,325 UART: [kat] SHA2-512-ACC
909,226 UART: [kat] ECC-384
918,551 UART: [kat] HMAC-384Kdf
923,239 UART: [kat] LMS
1,171,567 UART: [kat] --
1,172,356 UART: [cold-reset] ++
1,172,864 UART: [fht] FHT @ 0x50003400
1,175,531 UART: [idev] ++
1,175,699 UART: [idev] CDI.KEYID = 6
1,176,059 UART: [idev] SUBJECT.KEYID = 7
1,176,483 UART: [idev] UDS.KEYID = 0
1,176,828 ready_for_fw is high
1,176,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,579 UART: [idev] Erasing UDS.KEYID = 0
1,201,854 UART: [idev] Sha1 KeyId Algorithm
1,210,342 UART: [idev] --
1,211,440 UART: [ldev] ++
1,211,608 UART: [ldev] CDI.KEYID = 6
1,211,971 UART: [ldev] SUBJECT.KEYID = 5
1,212,397 UART: [ldev] AUTHORITY.KEYID = 7
1,212,860 UART: [ldev] FE.KEYID = 1
1,217,680 UART: [ldev] Erasing FE.KEYID = 1
1,243,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,170 UART: [ldev] --
1,282,461 UART: [fwproc] Wait for Commands...
1,283,215 UART: [fwproc] Recv command 0x46574c44
1,283,943 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,229 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,399 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,576 >>> mbox cmd response: success
2,826,610 UART: [afmc] ++
2,826,778 UART: [afmc] CDI.KEYID = 6
2,827,140 UART: [afmc] SUBJECT.KEYID = 7
2,827,565 UART: [afmc] AUTHORITY.KEYID = 5
2,863,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,347 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,056 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,939 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,640 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,502 UART: [afmc] --
2,906,586 UART: [cold-reset] --
2,907,448 UART: [state] Locking Datavault
2,908,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,981 UART: [state] Locking ICCM
2,909,607 UART: [exit] Launching FMC @ 0x40000130
2,914,937 UART:
2,914,953 UART: Running Caliptra FMC ...
2,915,361 UART:
2,915,504 UART: [state] CFI Enabled
2,925,972 UART: [fht] FMC Alias Private Key: 7
3,045,550 UART: [art] Extend RT PCRs Done
3,045,978 UART: [art] Lock RT PCRs Done
3,047,690 UART: [art] Populate DV Done
3,056,081 UART: [fht] FMC Alias Private Key: 7
3,057,063 UART: [art] Derive CDI
3,057,343 UART: [art] Store in slot 0x4
3,143,568 UART: [art] Derive Key Pair
3,143,928 UART: [art] Store priv key in slot 0x5
3,157,776 UART: [art] Derive Key Pair - Done
3,172,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,894 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,659 UART: [art] PUB.X = 752B19CC5CAC4E606EB90DF9BDEF310FF570FC0183215183FA873C77AC0652DAE74D19F80721C71839F9AE3E9F886F55
3,195,424 UART: [art] PUB.Y = 3EAA81597AA92EDA617EEE6C502009200C8DB4CF5AC20780EB1CB20168B6E6A742016605A90CEC2A318B968E2C95D88B
3,202,363 UART: [art] SIG.R = D76734709A493369DA38BC5D9407A890C0277139E4C23BAD6D75CA0E29EBD0F6CC669DDD9FC903F0E14E5E8D62F626ED
3,209,136 UART: [art] SIG.S = FB07A348DDF7FA3A99AF103F547E381C2225A5A54165E058BB5C0833803F9249C7A2CC7FC5FA35D7C3F983C320349DF6
3,232,870 UART: Caliptra RT
3,233,213 UART: [state] CFI Enabled
3,353,007 UART: [rt] RT listening for mailbox commands...
3,353,677 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,245 UART: [rt]cmd =0x44504543, len=136
3,448,367 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,206 ready_for_fw is high
1,059,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,017 >>> mbox cmd response: success
2,742,044 UART:
2,742,060 UART: Running Caliptra FMC ...
2,742,468 UART:
2,742,611 UART: [state] CFI Enabled
2,752,909 UART: [fht] FMC Alias Private Key: 7
2,871,561 UART: [art] Extend RT PCRs Done
2,871,989 UART: [art] Lock RT PCRs Done
2,873,671 UART: [art] Populate DV Done
2,881,982 UART: [fht] FMC Alias Private Key: 7
2,883,136 UART: [art] Derive CDI
2,883,416 UART: [art] Store in slot 0x4
2,969,217 UART: [art] Derive Key Pair
2,969,577 UART: [art] Store priv key in slot 0x5
2,983,751 UART: [art] Derive Key Pair - Done
2,998,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,109 UART: [art] PUB.X = 6C2EBCA2FE2F47EFE9BA11DFD63E406B0F3773D79F2C5F5D3AB91A555218BC2FF78C67277D97D2310A78A27BBAD3A0B6
3,021,895 UART: [art] PUB.Y = 1910C082B48B17C866A6DC76E681D054D5748A5990305E0D9187B9865E8F3E46B23D086AC28CE7B5A486848AA400F092
3,028,811 UART: [art] SIG.R = E67D592AD1427E3197D810AA1FC229B2057A07BA6A2025E0ADA28562EBD4D35B44F6AE999219D78A08BF29E65274BA60
3,035,578 UART: [art] SIG.S = 8622955D644B120126EED6CE801E4855B4C80D5F6BCA2A2336865766F8857294B2A4F656623FE20B9F907CC4CB5B33E9
3,059,387 UART: Caliptra RT
3,059,730 UART: [state] CFI Enabled
3,179,280 UART: [rt] RT listening for mailbox commands...
3,179,950 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,548 UART: [rt]cmd =0x44504543, len=136
3,274,392 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
192,292 UART:
192,638 UART: Running Caliptra ROM ...
193,827 UART:
193,977 UART: [state] CFI Enabled
262,454 UART: [state] LifecycleState = Unprovisioned
264,451 UART: [state] DebugLocked = No
266,555 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,593 UART: [kat] SHA2-256
440,243 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,767 UART: [kat] ++
451,241 UART: [kat] sha1
461,762 UART: [kat] SHA2-256
464,416 UART: [kat] SHA2-384
468,768 UART: [kat] SHA2-512-ACC
471,132 UART: [kat] ECC-384
2,769,480 UART: [kat] HMAC-384Kdf
2,799,932 UART: [kat] LMS
3,990,229 UART: [kat] --
3,995,325 UART: [cold-reset] ++
3,997,293 UART: [fht] Storing FHT @ 0x50003400
4,009,981 UART: [idev] ++
4,010,559 UART: [idev] CDI.KEYID = 6
4,011,545 UART: [idev] SUBJECT.KEYID = 7
4,012,794 UART: [idev] UDS.KEYID = 0
4,013,891 ready_for_fw is high
4,014,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,270 UART: [idev] Erasing UDS.KEYID = 0
7,349,006 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,660 UART: [idev] --
7,374,207 UART: [ldev] ++
7,374,791 UART: [ldev] CDI.KEYID = 6
7,375,780 UART: [ldev] SUBJECT.KEYID = 5
7,377,010 UART: [ldev] AUTHORITY.KEYID = 7
7,378,258 UART: [ldev] FE.KEYID = 1
7,423,773 UART: [ldev] Erasing FE.KEYID = 1
10,754,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,596 UART: [ldev] --
13,115,834 UART: [fwproc] Waiting for Commands...
13,117,968 UART: [fwproc] Received command 0x46574c44
13,120,162 UART: [fwproc] Received Image of size 118548 bytes
17,232,457 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,451 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,380,631 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,708,909 >>> mbox cmd response: success
17,713,763 UART: [afmc] ++
17,714,389 UART: [afmc] CDI.KEYID = 6
17,715,306 UART: [afmc] SUBJECT.KEYID = 7
17,716,533 UART: [afmc] AUTHORITY.KEYID = 5
21,072,642 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,027 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,290 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,739 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,440 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,859 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,720 UART: [afmc] --
23,442,863 UART: [cold-reset] --
23,446,409 UART: [state] Locking Datavault
23,453,058 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,821 UART: [state] Locking ICCM
23,456,884 UART: [exit] Launching FMC @ 0x40000130
23,465,285 UART:
23,465,527 UART: Running Caliptra FMC ...
23,466,631 UART:
23,466,799 UART: [state] CFI Enabled
23,531,177 UART: [fht] FMC Alias Private Key: 7
25,871,213 UART: [art] Extend RT PCRs Done
25,872,443 UART: [art] Lock RT PCRs Done
25,874,072 UART: [art] Populate DV Done
25,879,761 UART: [fht] FMC Alias Private Key: 7
25,881,243 UART: [art] Derive CDI
25,882,005 UART: [art] Store in slot 0x4
25,939,230 UART: [art] Derive Key Pair
25,940,273 UART: [art] Store priv key in slot 0x5
29,232,943 UART: [art] Derive Key Pair - Done
29,245,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,675 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,185 UART: [art] PUB.X = 71CB7B6CCF357A64DA1A55559E7792A0B10744F248480EB3C0A7BE8237C3667E3FE6AA2E6A7CA0AF2085FFE0837F9BE0
31,542,456 UART: [art] PUB.Y = 6C6693389C945683CF28340D215324B6F2EF7C0411D1D25E2A967D55859C09524F04DA490609F8129980A2297796D39F
31,549,643 UART: [art] SIG.R = DFF786A39308D79DF2AC6559AF03E52A6F94ECB24AB5621A4D950EDF005A3D72E5922E17EFEF9422EA8141E3E896617C
31,557,054 UART: [art] SIG.S = F8E33421E7CC7E7758CAF15A3A8D3E150AFE278EB404BC25A9A3BDF26FDA67E789C23BCE4712B9BACF7391991ABEE35D
32,862,891 UART: Caliptra RT
32,863,614 UART: [state] CFI Enabled
33,060,638 UART: [rt] RT listening for mailbox commands...
33,063,004 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,093,398 UART: [rt]cmd =0x44504543, len=92
41,130,574 >>> mbox cmd response data (6284 bytes)
41,159,974 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,189,661 UART: [rt]cmd =0x43455252, len=4
41,201,101 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,805,469 ready_for_fw is high
3,805,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,980,399 >>> mbox cmd response: success
23,664,890 UART:
23,665,575 UART: Running Caliptra FMC ...
23,666,697 UART:
23,666,849 UART: [state] CFI Enabled
23,736,012 UART: [fht] FMC Alias Private Key: 7
26,076,375 UART: [art] Extend RT PCRs Done
26,077,615 UART: [art] Lock RT PCRs Done
26,079,165 UART: [art] Populate DV Done
26,084,593 UART: [fht] FMC Alias Private Key: 7
26,086,219 UART: [art] Derive CDI
26,087,044 UART: [art] Store in slot 0x4
26,144,746 UART: [art] Derive Key Pair
26,145,789 UART: [art] Store priv key in slot 0x5
29,438,628 UART: [art] Derive Key Pair - Done
29,452,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,063 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,583 UART: [art] PUB.X = F2C1AA077904CDAF1BC2EA7CA9D4391AE950B9398858F445833979B983784F3D6E79D95A75DE2A4F56ED02AE5AB56E1E
31,748,858 UART: [art] PUB.Y = B95752A7C4E2DD34A21CF0E2B4D12AA2C24A17C72BA4347F5FE206020F6FBD2F2CCE0D1BEC6216E944D5BBDD4427923C
31,756,166 UART: [art] SIG.R = 1662C6570306F39228716050453B7FA1E2E4A6128F1D6730C851018582016FAD7475D862053B6BFB6BD7E02ABFC54194
31,763,516 UART: [art] SIG.S = 4094CAC516AB42F7F2A2807FCDED1C4F8933DE672C3D32D6A1DBE7748DDBA0514AD3028CA19BD9952FE0390E0A33B03B
33,069,071 UART: Caliptra RT
33,069,795 UART: [state] CFI Enabled
33,265,888 UART: [rt] RT listening for mailbox commands...
33,268,329 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,298,808 UART: [rt]cmd =0x44504543, len=92
41,334,923 >>> mbox cmd response data (6284 bytes)
41,364,393 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,394,429 UART: [rt]cmd =0x43455252, len=4
41,405,911 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,407 UART:
192,785 UART: Running Caliptra ROM ...
193,866 UART:
603,806 UART: [state] CFI Enabled
617,053 UART: [state] LifecycleState = Unprovisioned
618,941 UART: [state] DebugLocked = No
621,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,246 UART: [kat] SHA2-256
795,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,485 UART: [kat] ++
806,957 UART: [kat] sha1
818,465 UART: [kat] SHA2-256
821,177 UART: [kat] SHA2-384
825,663 UART: [kat] SHA2-512-ACC
828,020 UART: [kat] ECC-384
3,111,402 UART: [kat] HMAC-384Kdf
3,123,789 UART: [kat] LMS
4,313,910 UART: [kat] --
4,317,851 UART: [cold-reset] ++
4,318,802 UART: [fht] Storing FHT @ 0x50003400
4,329,420 UART: [idev] ++
4,330,056 UART: [idev] CDI.KEYID = 6
4,330,941 UART: [idev] SUBJECT.KEYID = 7
4,332,179 UART: [idev] UDS.KEYID = 0
4,333,169 ready_for_fw is high
4,333,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,330 UART: [idev] Erasing UDS.KEYID = 0
7,613,395 UART: [idev] Using Sha1 for KeyId Algorithm
7,634,876 UART: [idev] --
7,639,710 UART: [ldev] ++
7,640,290 UART: [ldev] CDI.KEYID = 6
7,641,222 UART: [ldev] SUBJECT.KEYID = 5
7,642,374 UART: [ldev] AUTHORITY.KEYID = 7
7,643,705 UART: [ldev] FE.KEYID = 1
7,653,884 UART: [ldev] Erasing FE.KEYID = 1
10,946,961 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,082 UART: [ldev] --
13,308,670 UART: [fwproc] Waiting for Commands...
13,311,403 UART: [fwproc] Received command 0x46574c44
13,313,611 UART: [fwproc] Received Image of size 118548 bytes
17,416,389 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,755 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,893 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,748 >>> mbox cmd response: success
17,898,919 UART: [afmc] ++
17,899,504 UART: [afmc] CDI.KEYID = 6
17,900,463 UART: [afmc] SUBJECT.KEYID = 7
17,901,689 UART: [afmc] AUTHORITY.KEYID = 5
21,216,095 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,546 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,802 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,528,233 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,987 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,557,385 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,174 UART: [afmc] --
23,583,336 UART: [cold-reset] --
23,586,760 UART: [state] Locking Datavault
23,592,916 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,604 UART: [state] Locking ICCM
23,597,070 UART: [exit] Launching FMC @ 0x40000130
23,605,467 UART:
23,605,695 UART: Running Caliptra FMC ...
23,606,785 UART:
23,606,954 UART: [state] CFI Enabled
23,615,047 UART: [fht] FMC Alias Private Key: 7
25,955,136 UART: [art] Extend RT PCRs Done
25,956,353 UART: [art] Lock RT PCRs Done
25,958,002 UART: [art] Populate DV Done
25,963,463 UART: [fht] FMC Alias Private Key: 7
25,964,992 UART: [art] Derive CDI
25,965,721 UART: [art] Store in slot 0x4
26,008,567 UART: [art] Derive Key Pair
26,009,558 UART: [art] Store priv key in slot 0x5
29,251,617 UART: [art] Derive Key Pair - Done
29,264,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,516 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,025 UART: [art] PUB.X = 9F2051371557B1EAC1B6C07BE95928A1F69EC6492110EA202872DD0551294A26E747B70FCD39B72207094B7B49A9ED3B
31,553,307 UART: [art] PUB.Y = BB6D68BCB53FFC3959FF9823EE168230AC502750FC120AB50E7ED5BAD952E63D67220E07E86FFB4A61750530996E6AE5
31,560,554 UART: [art] SIG.R = 8FC11C247432DF93A56A1A200494FF7BBA90229D3A7D451955D645395356433FA3E2964B12F05C55428647A8A3A9D2A8
31,567,923 UART: [art] SIG.S = F4555560FA66BDF3437BB88851A5EB5F71B56A9CCC950B88094AA52EAB7293D573F83352CD408721BFF5E87236000F5E
32,873,651 UART: Caliptra RT
32,874,349 UART: [state] CFI Enabled
33,007,996 UART: [rt] RT listening for mailbox commands...
33,010,397 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,040,991 UART: [rt]cmd =0x44504543, len=92
41,014,266 >>> mbox cmd response data (6284 bytes)
41,043,583 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,073,345 UART: [rt]cmd =0x43455252, len=4
41,084,848 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
4,126,680 ready_for_fw is high
4,127,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,848 >>> mbox cmd response: success
23,794,462 UART:
23,794,891 UART: Running Caliptra FMC ...
23,796,038 UART:
23,796,199 UART: [state] CFI Enabled
23,803,830 UART: [fht] FMC Alias Private Key: 7
26,143,880 UART: [art] Extend RT PCRs Done
26,145,105 UART: [art] Lock RT PCRs Done
26,147,056 UART: [art] Populate DV Done
26,152,263 UART: [fht] FMC Alias Private Key: 7
26,153,933 UART: [art] Derive CDI
26,154,671 UART: [art] Store in slot 0x4
26,197,379 UART: [art] Derive Key Pair
26,198,420 UART: [art] Store priv key in slot 0x5
29,440,686 UART: [art] Derive Key Pair - Done
29,453,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,712 UART: [art] Erasing AUTHORITY.KEYID = 7
31,735,220 UART: [art] PUB.X = 498C4E7BFA543CBB7245CC4C0A4C6BF3AA8B7B06C63457203584B9B2058DBF1561CCF32AF35E696E2C08A96B115B4DBF
31,742,514 UART: [art] PUB.Y = 8F5C75240CAE62470B43224297C00F1FFDC4B1C49D0ACCA7A12E6E5DCBC96A95FC27C81A8FD57A1BFCD8D77FBE690D57
31,749,768 UART: [art] SIG.R = 9670CA91EDD87459FA370D088E397D2FC16EDA28D6061337DF16B973B741566B3D96D5849209DC38E0F3606181008EEE
31,757,167 UART: [art] SIG.S = 50EFAC5E1A67EDC415614E7D874A52A82430382066984C6A1BFE37FB5D4D8536198764E831DF93B9AB610417CDBE7F84
33,062,421 UART: Caliptra RT
33,063,192 UART: [state] CFI Enabled
33,197,818 UART: [rt] RT listening for mailbox commands...
33,200,228 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,230,848 UART: [rt]cmd =0x44504543, len=92
41,203,614 >>> mbox cmd response data (6284 bytes)
41,233,182 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,262,851 UART: [rt]cmd =0x43455252, len=4
41,274,278 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,195 UART:
192,571 UART: Running Caliptra ROM ...
193,778 UART:
193,945 UART: [state] CFI Enabled
258,508 UART: [state] LifecycleState = Unprovisioned
260,488 UART: [state] DebugLocked = No
261,807 UART: [state] WD Timer not started. Device not locked for debugging
265,847 UART: [kat] SHA2-256
445,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
456,268 UART: [kat] ++
456,721 UART: [kat] sha1
468,725 UART: [kat] SHA2-256
471,369 UART: [kat] SHA2-384
476,998 UART: [kat] SHA2-512-ACC
479,358 UART: [kat] ECC-384
2,923,417 UART: [kat] HMAC-384Kdf
2,947,814 UART: [kat] LMS
3,424,285 UART: [kat] --
3,429,717 UART: [cold-reset] ++
3,431,151 UART: [fht] FHT @ 0x50003400
3,441,697 UART: [idev] ++
3,442,255 UART: [idev] CDI.KEYID = 6
3,443,281 UART: [idev] SUBJECT.KEYID = 7
3,444,448 UART: [idev] UDS.KEYID = 0
3,445,492 ready_for_fw is high
3,445,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,594,805 UART: [idev] Erasing UDS.KEYID = 0
5,963,477 UART: [idev] Sha1 KeyId Algorithm
5,988,301 UART: [idev] --
5,992,946 UART: [ldev] ++
5,993,514 UART: [ldev] CDI.KEYID = 6
5,994,439 UART: [ldev] SUBJECT.KEYID = 5
5,995,648 UART: [ldev] AUTHORITY.KEYID = 7
5,996,873 UART: [ldev] FE.KEYID = 1
6,034,750 UART: [ldev] Erasing FE.KEYID = 1
8,539,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,274,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,290,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,306,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,321,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,342,631 UART: [ldev] --
10,347,959 UART: [fwproc] Wait for Commands...
10,349,895 UART: [fwproc] Recv command 0x46574c44
10,351,875 UART: [fwproc] Recv'd Img size: 118548 bytes
13,829,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,905,369 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,978,382 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,307,440 >>> mbox cmd response: success
14,312,360 UART: [afmc] ++
14,312,979 UART: [afmc] CDI.KEYID = 6
14,313,915 UART: [afmc] SUBJECT.KEYID = 7
14,315,131 UART: [afmc] AUTHORITY.KEYID = 5
16,848,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,592,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,594,536 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,610,320 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,626,355 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,641,965 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,665,999 UART: [afmc] --
18,669,218 UART: [cold-reset] --
18,672,805 UART: [state] Locking Datavault
18,677,026 UART: [state] Locking PCR0, PCR1 and PCR31
18,678,775 UART: [state] Locking ICCM
18,680,134 UART: [exit] Launching FMC @ 0x40000130
18,688,573 UART:
18,688,800 UART: Running Caliptra FMC ...
18,689,844 UART:
18,689,994 UART: [state] CFI Enabled
18,751,334 UART: [fht] FMC Alias Private Key: 7
20,518,021 UART: [art] Extend RT PCRs Done
20,519,246 UART: [art] Lock RT PCRs Done
20,520,841 UART: [art] Populate DV Done
20,526,251 UART: [fht] FMC Alias Private Key: 7
20,527,889 UART: [art] Derive CDI
20,528,701 UART: [art] Store in slot 0x4
20,583,983 UART: [art] Derive Key Pair
20,585,015 UART: [art] Store priv key in slot 0x5
23,047,522 UART: [art] Derive Key Pair - Done
23,060,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,773,321 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,827 UART: [art] PUB.X = E9A3B8C36AB43B40C94ECEEA8D07ACE79A7DA0889C90387B919D9ECA1E0BADDEE7DBAA2100D0FD46248C51E5B9465124
24,782,071 UART: [art] PUB.Y = 08B0170D805E19FE98081E71D62B198712AF060FE90A8742A844A9FEAE7FE78CDD50E8BEAC02E67F859E043B8B41AD8C
24,789,325 UART: [art] SIG.R = 7279A03E43D99A140AC8B26D88B3421EB5C58BAAC5412297728415DC24C07AEA44AA296E3CBDB42B5DF10858569ADE92
24,796,722 UART: [art] SIG.S = 128ED8560C215FDBD76B0FC99FE68D3A82CA37E17D7BE193DEB6C3E10706AB9C82CB025A9DBB27889FF5E2DF74D069C3
25,775,601 UART: Caliptra RT
25,776,307 UART: [state] CFI Enabled
25,956,979 UART: [rt] RT listening for mailbox commands...
25,959,330 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,989,930 UART: [rt]cmd =0x44504543, len=92
32,047,025 >>> mbox cmd response data (6284 bytes)
32,076,349 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,106,342 UART: [rt]cmd =0x43455252, len=4
32,117,793 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
3,461,114 ready_for_fw is high
3,461,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,215,647 >>> mbox cmd response: success
18,514,527 UART:
18,514,932 UART: Running Caliptra FMC ...
18,516,037 UART:
18,516,191 UART: [state] CFI Enabled
18,582,755 UART: [fht] FMC Alias Private Key: 7
20,348,937 UART: [art] Extend RT PCRs Done
20,350,165 UART: [art] Lock RT PCRs Done
20,351,782 UART: [art] Populate DV Done
20,357,263 UART: [fht] FMC Alias Private Key: 7
20,358,963 UART: [art] Derive CDI
20,359,699 UART: [art] Store in slot 0x4
20,416,079 UART: [art] Derive Key Pair
20,417,079 UART: [art] Store priv key in slot 0x5
22,879,738 UART: [art] Derive Key Pair - Done
22,892,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,968 UART: [art] Erasing AUTHORITY.KEYID = 7
24,607,474 UART: [art] PUB.X = 4BB1156CE50FC6DF52013BBBCED88A3FC398B751E757CF26F0F29A6047F48E73C671040953FFEDB11700DB2838E332C2
24,614,726 UART: [art] PUB.Y = 11BF998F3A842418C6F8E38A5E9462BB41D71589EA2C0BED243700F4F5978CD705FE1B6E81EF4691D85AE866D2E533FC
24,621,970 UART: [art] SIG.R = D0255C964D78C54904AB5C271519DCF26019966391402551DE8EC4E2A2607F591A3EEABB072814C87E0C641CDE72D5EF
24,629,378 UART: [art] SIG.S = D5BABCBD6024632C5FBF5016C5C393CBF1FA2A12514BC0E69E5B061EC00547BF034F81C95B63EFE9361334C666C85F17
25,608,451 UART: Caliptra RT
25,609,165 UART: [state] CFI Enabled
25,789,791 UART: [rt] RT listening for mailbox commands...
25,792,137 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,822,702 UART: [rt]cmd =0x44504543, len=92
31,879,565 >>> mbox cmd response data (6284 bytes)
31,909,505 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,939,389 UART: [rt]cmd =0x43455252, len=4
31,950,685 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,423 UART:
192,783 UART: Running Caliptra ROM ...
194,070 UART:
603,720 UART: [state] CFI Enabled
614,496 UART: [state] LifecycleState = Unprovisioned
616,450 UART: [state] DebugLocked = No
617,772 UART: [state] WD Timer not started. Device not locked for debugging
621,812 UART: [kat] SHA2-256
801,492 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,287 UART: [kat] ++
812,767 UART: [kat] sha1
824,493 UART: [kat] SHA2-256
827,152 UART: [kat] SHA2-384
832,789 UART: [kat] SHA2-512-ACC
835,159 UART: [kat] ECC-384
3,278,272 UART: [kat] HMAC-384Kdf
3,289,882 UART: [kat] LMS
3,766,449 UART: [kat] --
3,769,998 UART: [cold-reset] ++
3,772,077 UART: [fht] FHT @ 0x50003400
3,783,839 UART: [idev] ++
3,784,412 UART: [idev] CDI.KEYID = 6
3,785,414 UART: [idev] SUBJECT.KEYID = 7
3,786,594 UART: [idev] UDS.KEYID = 0
3,787,644 ready_for_fw is high
3,787,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,774 UART: [idev] Erasing UDS.KEYID = 0
6,260,824 UART: [idev] Sha1 KeyId Algorithm
6,284,846 UART: [idev] --
6,288,712 UART: [ldev] ++
6,289,297 UART: [ldev] CDI.KEYID = 6
6,290,209 UART: [ldev] SUBJECT.KEYID = 5
6,291,446 UART: [ldev] AUTHORITY.KEYID = 7
6,292,679 UART: [ldev] FE.KEYID = 1
6,304,111 UART: [ldev] Erasing FE.KEYID = 1
8,781,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,567,823 UART: [ldev] --
10,572,816 UART: [fwproc] Wait for Commands...
10,575,775 UART: [fwproc] Recv command 0x46574c44
10,577,763 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,400 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,408 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,067 >>> mbox cmd response: success
14,550,860 UART: [afmc] ++
14,551,475 UART: [afmc] CDI.KEYID = 6
14,552,391 UART: [afmc] SUBJECT.KEYID = 7
14,553,609 UART: [afmc] AUTHORITY.KEYID = 5
17,057,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,312 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,127 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,205 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,797 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,333 UART: [afmc] --
18,856,779 UART: [cold-reset] --
18,859,941 UART: [state] Locking Datavault
18,864,335 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,036 UART: [state] Locking ICCM
18,868,301 UART: [exit] Launching FMC @ 0x40000130
18,876,717 UART:
18,876,957 UART: Running Caliptra FMC ...
18,878,058 UART:
18,878,221 UART: [state] CFI Enabled
18,886,539 UART: [fht] FMC Alias Private Key: 7
20,652,358 UART: [art] Extend RT PCRs Done
20,653,578 UART: [art] Lock RT PCRs Done
20,655,148 UART: [art] Populate DV Done
20,660,510 UART: [fht] FMC Alias Private Key: 7
20,662,106 UART: [art] Derive CDI
20,662,937 UART: [art] Store in slot 0x4
20,705,280 UART: [art] Derive Key Pair
20,706,322 UART: [art] Store priv key in slot 0x5
23,133,309 UART: [art] Derive Key Pair - Done
23,146,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,126 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,644 UART: [art] PUB.X = E37F72F30D754D4EA2AF9112E11BF350B6211E391ECDA9DB5A4113DE725083590C9F8B2B83AB160D91C16CBE9AD1A9DD
24,861,937 UART: [art] PUB.Y = AE0D7C8D877FCE9D263D00FA1C045499AD5122BD2C8C95CB5B6CC43B26236E8E09CEC3E14AE66003CB2A4C237A17007F
24,869,161 UART: [art] SIG.R = 997D57C2935DCF1077FD7A8F86BB80AFA69DDDC534BA5313C87755A10425E9AE5E67D7D98CE0FC87358A61A1EAD3DC14
24,876,545 UART: [art] SIG.S = 318951E1ABCC49EB7E1F1849EA66B031A1575262F97E74582CE718A7156BED6903AF2B3860CBA46ECCB4B90BA9D91A16
25,854,865 UART: Caliptra RT
25,855,568 UART: [state] CFI Enabled
25,987,820 UART: [rt] RT listening for mailbox commands...
25,990,133 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,020,563 UART: [rt]cmd =0x44504543, len=92
32,032,480 >>> mbox cmd response data (6284 bytes)
32,061,974 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,091,904 UART: [rt]cmd =0x43455252, len=4
32,103,441 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,779,236 ready_for_fw is high
3,779,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,114 >>> mbox cmd response: success
18,683,518 UART:
18,683,895 UART: Running Caliptra FMC ...
18,685,093 UART:
18,685,291 UART: [state] CFI Enabled
18,693,022 UART: [fht] FMC Alias Private Key: 7
20,459,244 UART: [art] Extend RT PCRs Done
20,460,456 UART: [art] Lock RT PCRs Done
20,462,219 UART: [art] Populate DV Done
20,467,746 UART: [fht] FMC Alias Private Key: 7
20,469,289 UART: [art] Derive CDI
20,470,027 UART: [art] Store in slot 0x4
20,513,224 UART: [art] Derive Key Pair
20,514,266 UART: [art] Store priv key in slot 0x5
22,941,438 UART: [art] Derive Key Pair - Done
22,954,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,660,692 UART: [art] Erasing AUTHORITY.KEYID = 7
24,662,179 UART: [art] PUB.X = 15E69FDC8DF6D2135AA5252AF8479EEA810901FEC60BF8CC4178054EBFB59C359F2564D3429C7883EFAB36E2D4BE9010
24,669,490 UART: [art] PUB.Y = E1992FD7B7E1D8489F5659BD32BC945ACF5268E0D025442B4FA6D28F5020F2FE2D846AAAA0235DD8CC41CE50731021DF
24,676,756 UART: [art] SIG.R = CE43F66B685B25DD6AF5D4477397228A4CCEB750A57E491DBA1BF8DDD8F79A6BE8966DFC9A20C15DB427A883B1EABD0E
24,684,187 UART: [art] SIG.S = 4708499080A42B6E6047445C24E783F72929F452891BCE74D500A0519A2D0D055C392AB339E40BA75EEF857EDB7B5D2F
25,663,012 UART: Caliptra RT
25,663,734 UART: [state] CFI Enabled
25,797,372 UART: [rt] RT listening for mailbox commands...
25,799,661 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,830,270 UART: [rt]cmd =0x44504543, len=92
31,841,620 >>> mbox cmd response data (6284 bytes)
31,870,899 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,900,853 UART: [rt]cmd =0x43455252, len=4
31,912,491 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,007 UART:
192,382 UART: Running Caliptra ROM ...
193,524 UART:
193,677 UART: [state] CFI Enabled
262,369 UART: [state] LifecycleState = Unprovisioned
264,786 UART: [state] DebugLocked = No
266,547 UART: [state] WD Timer not started. Device not locked for debugging
270,648 UART: [kat] SHA2-256
460,557 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,285 UART: [kat] ++
471,757 UART: [kat] sha1
483,267 UART: [kat] SHA2-256
486,337 UART: [kat] SHA2-384
491,894 UART: [kat] SHA2-512-ACC
494,477 UART: [kat] ECC-384
2,946,851 UART: [kat] HMAC-384Kdf
2,972,301 UART: [kat] LMS
3,504,080 UART: [kat] --
3,508,291 UART: [cold-reset] ++
3,509,868 UART: [fht] FHT @ 0x50003400
3,521,344 UART: [idev] ++
3,522,048 UART: [idev] CDI.KEYID = 6
3,523,078 UART: [idev] SUBJECT.KEYID = 7
3,524,184 UART: [idev] UDS.KEYID = 0
3,525,114 ready_for_fw is high
3,525,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,453 UART: [idev] Erasing UDS.KEYID = 0
6,027,732 UART: [idev] Sha1 KeyId Algorithm
6,051,348 UART: [idev] --
6,056,862 UART: [ldev] ++
6,057,564 UART: [ldev] CDI.KEYID = 6
6,058,476 UART: [ldev] SUBJECT.KEYID = 5
6,059,635 UART: [ldev] AUTHORITY.KEYID = 7
6,060,865 UART: [ldev] FE.KEYID = 1
6,100,185 UART: [ldev] Erasing FE.KEYID = 1
8,603,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,459 UART: [ldev] --
10,412,184 UART: [fwproc] Wait for Commands...
10,414,534 UART: [fwproc] Recv command 0x46574c44
10,416,801 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,035 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,669 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,440 >>> mbox cmd response: success
14,676,893 UART: [afmc] ++
14,677,622 UART: [afmc] CDI.KEYID = 6
14,678,813 UART: [afmc] SUBJECT.KEYID = 7
14,680,248 UART: [afmc] AUTHORITY.KEYID = 5
17,213,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,934,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,935,940 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,951,083 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,966,238 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,981,139 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,004,759 UART: [afmc] --
19,008,571 UART: [cold-reset] --
19,012,384 UART: [state] Locking Datavault
19,019,041 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,267 UART: [state] Locking ICCM
19,023,911 UART: [exit] Launching FMC @ 0x40000130
19,032,592 UART:
19,032,826 UART: Running Caliptra FMC ...
19,033,928 UART:
19,034,100 UART: [state] CFI Enabled
19,092,407 UART: [fht] FMC Alias Private Key: 7
20,858,647 UART: [art] Extend RT PCRs Done
20,859,873 UART: [art] Lock RT PCRs Done
20,861,556 UART: [art] Populate DV Done
20,867,179 UART: [fht] FMC Alias Private Key: 7
20,868,711 UART: [art] Derive CDI
20,869,525 UART: [art] Store in slot 0x4
20,925,966 UART: [art] Derive Key Pair
20,927,008 UART: [art] Store priv key in slot 0x5
23,389,711 UART: [art] Derive Key Pair - Done
23,402,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,548 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,065 UART: [art] PUB.X = 920342222779D33E150DFA8BB9EA732CED4E06CF3B227CF1B458A7DD30DA23C4BEEBC0BE2C7F8BBF140D1B89FF7C06DA
25,124,349 UART: [art] PUB.Y = 7540864C44346F48A69DFF57AD53917656A162413E707B5592F9C19634AC96AC03A571675381E00E968D18E387C01719
25,131,560 UART: [art] SIG.R = 62E54EF64E334AE3FAB086DF167669A99070DEBB760CF0453ACDC499F5731AE85AB9E175ABEC9C32B76B2996AE5802DD
25,138,996 UART: [art] SIG.S = 85F1291A46EB707D7F52E1DC68FF0553E238D567DCB94387C19E5BBE86DD4D7DA113B8F17D445903FA562F0D900B52B3
26,118,168 UART: Caliptra RT
26,118,855 UART: [state] CFI Enabled
26,297,674 UART: [rt] RT listening for mailbox commands...
26,299,961 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,330,834 UART: [rt]cmd =0x44504543, len=92
32,387,129 >>> mbox cmd response data (6284 bytes)
32,416,599 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,446,301 UART: [rt]cmd =0x43455252, len=4
32,457,827 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,437,269 ready_for_fw is high
3,437,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,878 >>> mbox cmd response: success
19,112,870 UART:
19,113,271 UART: Running Caliptra FMC ...
19,114,471 UART:
19,114,638 UART: [state] CFI Enabled
19,181,043 UART: [fht] FMC Alias Private Key: 7
20,946,993 UART: [art] Extend RT PCRs Done
20,948,219 UART: [art] Lock RT PCRs Done
20,950,178 UART: [art] Populate DV Done
20,955,435 UART: [fht] FMC Alias Private Key: 7
20,956,973 UART: [art] Derive CDI
20,957,784 UART: [art] Store in slot 0x4
21,013,865 UART: [art] Derive Key Pair
21,014,904 UART: [art] Store priv key in slot 0x5
23,477,534 UART: [art] Derive Key Pair - Done
23,490,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,902 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,432 UART: [art] PUB.X = BEC945275551DC8F98C06697F186DBB52BF1B8F3B91F646D5D0173AE9490473D4DE04DAFA4DC0E4A9F80A11359368E76
25,212,669 UART: [art] PUB.Y = 8D57DC858789EA6C3F7811A223A34EF0F82EB9B4898E90CD30E8048B3B4FCA176DC0BDD7D410D93288CC108FDD72A6CA
25,219,948 UART: [art] SIG.R = A4EFA77D2EB7A8F7CE06BC10447F3E057BC8364CE1AB300C0CB7834AAF26B1C9CF5A8C0C77C6AAD2C864F8D518A69DA9
25,227,376 UART: [art] SIG.S = 2D3ED8D53F7447BC18F63E384172E69C8A09BB5B4EA63C9C8C42215D54B977F46416D604B5C13CAAFAE063A4EFC4CA22
26,205,959 UART: Caliptra RT
26,206,674 UART: [state] CFI Enabled
26,386,952 UART: [rt] RT listening for mailbox commands...
26,389,235 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,419,893 UART: [rt]cmd =0x44504543, len=92
32,475,501 >>> mbox cmd response data (6284 bytes)
32,504,765 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,534,580 UART: [rt]cmd =0x43455252, len=4
32,545,983 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,548 UART:
192,908 UART: Running Caliptra ROM ...
194,095 UART:
603,738 UART: [state] CFI Enabled
619,281 UART: [state] LifecycleState = Unprovisioned
621,596 UART: [state] DebugLocked = No
624,002 UART: [state] WD Timer not started. Device not locked for debugging
628,032 UART: [kat] SHA2-256
817,954 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,759 UART: [kat] ++
829,241 UART: [kat] sha1
841,609 UART: [kat] SHA2-256
844,625 UART: [kat] SHA2-384
850,691 UART: [kat] SHA2-512-ACC
853,224 UART: [kat] ECC-384
3,292,648 UART: [kat] HMAC-384Kdf
3,304,743 UART: [kat] LMS
3,836,549 UART: [kat] --
3,841,982 UART: [cold-reset] ++
3,843,134 UART: [fht] FHT @ 0x50003400
3,855,814 UART: [idev] ++
3,856,529 UART: [idev] CDI.KEYID = 6
3,857,516 UART: [idev] SUBJECT.KEYID = 7
3,858,693 UART: [idev] UDS.KEYID = 0
3,859,620 ready_for_fw is high
3,859,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,739 UART: [idev] Erasing UDS.KEYID = 0
6,337,565 UART: [idev] Sha1 KeyId Algorithm
6,359,447 UART: [idev] --
6,365,548 UART: [ldev] ++
6,366,245 UART: [ldev] CDI.KEYID = 6
6,367,134 UART: [ldev] SUBJECT.KEYID = 5
6,368,342 UART: [ldev] AUTHORITY.KEYID = 7
6,369,572 UART: [ldev] FE.KEYID = 1
6,379,921 UART: [ldev] Erasing FE.KEYID = 1
8,856,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,366 UART: [ldev] --
10,645,588 UART: [fwproc] Wait for Commands...
10,647,476 UART: [fwproc] Recv command 0x46574c44
10,649,729 UART: [fwproc] Recv'd Img size: 118548 bytes
14,142,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,495 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,343,129 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,902,536 >>> mbox cmd response: success
14,906,168 UART: [afmc] ++
14,906,873 UART: [afmc] CDI.KEYID = 6
14,907,982 UART: [afmc] SUBJECT.KEYID = 7
14,909,537 UART: [afmc] AUTHORITY.KEYID = 5
17,413,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,137,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,139,014 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,154,070 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,169,218 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,184,206 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,206,896 UART: [afmc] --
19,210,399 UART: [cold-reset] --
19,215,784 UART: [state] Locking Datavault
19,219,917 UART: [state] Locking PCR0, PCR1 and PCR31
19,222,100 UART: [state] Locking ICCM
19,224,271 UART: [exit] Launching FMC @ 0x40000130
19,232,919 UART:
19,233,156 UART: Running Caliptra FMC ...
19,234,262 UART:
19,234,421 UART: [state] CFI Enabled
19,243,069 UART: [fht] FMC Alias Private Key: 7
21,009,446 UART: [art] Extend RT PCRs Done
21,010,688 UART: [art] Lock RT PCRs Done
21,012,220 UART: [art] Populate DV Done
21,017,526 UART: [fht] FMC Alias Private Key: 7
21,019,017 UART: [art] Derive CDI
21,019,837 UART: [art] Store in slot 0x4
21,062,600 UART: [art] Derive Key Pair
21,063,638 UART: [art] Store priv key in slot 0x5
23,490,947 UART: [art] Derive Key Pair - Done
23,504,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,210,300 UART: [art] Erasing AUTHORITY.KEYID = 7
25,211,799 UART: [art] PUB.X = 6F3CE2B94B991A7159C08C5A021ED2287DC6DFB9CFFEB08687B518C3EC35CAED71181F697D03AF964FED9C0512A4A2BC
25,219,113 UART: [art] PUB.Y = D66A9938B022BB0D36A06C9414220B875DEACB74E8D9C5868A3D47B659DCF1083D4E763CAEE9AD866B151305190A595A
25,226,365 UART: [art] SIG.R = 42712DF11660F5E240913E586E9C04CD1CD9E05738FE10557E654DC56A6327ED979AB6EE048FE47AA66AFB5F2D1DDFBE
25,233,785 UART: [art] SIG.S = 797444B134A1CD591DD5B7DAFFC1C98D28467B533C3508A8EC50C5B4DCFF9F45EA53097AA0E6302D17EFA19BA6DDAD74
26,213,236 UART: Caliptra RT
26,213,947 UART: [state] CFI Enabled
26,346,685 UART: [rt] RT listening for mailbox commands...
26,349,081 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,379,704 UART: [rt]cmd =0x44504543, len=92
32,389,738 >>> mbox cmd response data (6284 bytes)
32,419,058 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,449,021 UART: [rt]cmd =0x43455252, len=4
32,460,442 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,828 writing to cptra_bootfsm_go
3,756,984 ready_for_fw is high
3,757,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,954 >>> mbox cmd response: success
19,290,895 UART:
19,291,284 UART: Running Caliptra FMC ...
19,292,430 UART:
19,292,587 UART: [state] CFI Enabled
19,300,500 UART: [fht] FMC Alias Private Key: 7
21,066,432 UART: [art] Extend RT PCRs Done
21,067,665 UART: [art] Lock RT PCRs Done
21,069,384 UART: [art] Populate DV Done
21,074,493 UART: [fht] FMC Alias Private Key: 7
21,076,148 UART: [art] Derive CDI
21,076,893 UART: [art] Store in slot 0x4
21,119,761 UART: [art] Derive Key Pair
21,120,763 UART: [art] Store priv key in slot 0x5
23,548,184 UART: [art] Derive Key Pair - Done
23,561,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,267,592 UART: [art] Erasing AUTHORITY.KEYID = 7
25,269,103 UART: [art] PUB.X = 28511F48491135DC364DB69EA576CE6E55352B8E85A54BD7880D07BE69CA86ED1A6964622FC54D5299A30A8AC84EB3D6
25,276,366 UART: [art] PUB.Y = 7B79BB4AF9DFF2D2688975D871E8858C93A881A5C3BD869C0956F507A9EB7A6859F3AEA4906303C5DA5924FA09215114
25,283,649 UART: [art] SIG.R = 136D37A63A3C06B6D1DE0AA7C48C0A79AFDF93FD27F0965A3C87C1F1F0C313DF347306E0955078E1A9B26E1E84EA95A1
25,290,999 UART: [art] SIG.S = B7E24EA407A919A5E49B07F313A43BD3290C42422D168657B49E302F12F27606A4C150BD61E8957FF7EA10CC7165A514
26,269,885 UART: Caliptra RT
26,270,597 UART: [state] CFI Enabled
26,402,902 UART: [rt] RT listening for mailbox commands...
26,405,272 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,435,985 UART: [rt]cmd =0x44504543, len=92
32,446,191 >>> mbox cmd response data (6284 bytes)
32,475,460 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,505,227 UART: [rt]cmd =0x43455252, len=4
32,516,579 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,219 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,741 UART: [kat] SHA2-256
881,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,787 UART: [kat] ++
885,939 UART: [kat] sha1
890,067 UART: [kat] SHA2-256
892,005 UART: [kat] SHA2-384
894,896 UART: [kat] SHA2-512-ACC
896,797 UART: [kat] ECC-384
902,312 UART: [kat] HMAC-384Kdf
906,824 UART: [kat] LMS
1,475,020 UART: [kat] --
1,476,165 UART: [cold-reset] ++
1,476,681 UART: [fht] Storing FHT @ 0x50003400
1,479,400 UART: [idev] ++
1,479,568 UART: [idev] CDI.KEYID = 6
1,479,928 UART: [idev] SUBJECT.KEYID = 7
1,480,352 UART: [idev] UDS.KEYID = 0
1,480,697 ready_for_fw is high
1,480,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,198 UART: [idev] Erasing UDS.KEYID = 0
1,505,050 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,726 UART: [idev] --
1,514,631 UART: [ldev] ++
1,514,799 UART: [ldev] CDI.KEYID = 6
1,515,162 UART: [ldev] SUBJECT.KEYID = 5
1,515,588 UART: [ldev] AUTHORITY.KEYID = 7
1,516,051 UART: [ldev] FE.KEYID = 1
1,521,139 UART: [ldev] Erasing FE.KEYID = 1
1,546,330 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,008 UART: [ldev] --
1,585,461 UART: [fwproc] Waiting for Commands...
1,586,100 UART: [fwproc] Received command 0x46574c44
1,586,891 UART: [fwproc] Received Image of size 118548 bytes
2,932,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,743 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,961 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,396 >>> mbox cmd response: success
3,132,610 UART: [afmc] ++
3,132,778 UART: [afmc] CDI.KEYID = 6
3,133,140 UART: [afmc] SUBJECT.KEYID = 7
3,133,565 UART: [afmc] AUTHORITY.KEYID = 5
3,168,452 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,684 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,464 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,173 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,056 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,739 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,743 UART: [afmc] --
3,211,689 UART: [cold-reset] --
3,212,801 UART: [state] Locking Datavault
3,213,872 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,476 UART: [state] Locking ICCM
3,215,090 UART: [exit] Launching FMC @ 0x40000130
3,220,420 UART:
3,220,436 UART: Running Caliptra FMC ...
3,220,844 UART:
3,220,898 UART: [state] CFI Enabled
3,231,296 UART: [fht] FMC Alias Private Key: 7
3,350,798 UART: [art] Extend RT PCRs Done
3,351,226 UART: [art] Lock RT PCRs Done
3,352,676 UART: [art] Populate DV Done
3,360,779 UART: [fht] FMC Alias Private Key: 7
3,361,727 UART: [art] Derive CDI
3,362,007 UART: [art] Store in slot 0x4
3,447,681 UART: [art] Derive Key Pair
3,448,041 UART: [art] Store priv key in slot 0x5
3,461,894 UART: [art] Derive Key Pair - Done
3,476,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,137 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,902 UART: [art] PUB.X = 8FB80DCA16DCFA8C7DBC0619D4AEB0D76FDD49A6C852304F95EC05453DFAA87EB13FF59C3B5BB43EFCE84190CCEEA14A
3,499,697 UART: [art] PUB.Y = BF686818FC1F66EF2A4D4D1B4898893BC9AE2E6CD5BFCE3AB0093A0C54E12992640790F5C15014AF5AF39F35E640A904
3,506,645 UART: [art] SIG.R = 39F8019923BC1D66239B3E2C83F7A846D6942CCB1E997FACE42BAF1C26123944E4002B298D6D95EDACA63C9F8600864A
3,513,374 UART: [art] SIG.S = 72641D36CFB708F0B743BBB9B89C10CF2A8160FFB2C7431A5A20C9778322DA05A3014F8D5EACEE56A28FE3BCA844DCA4
3,536,875 UART: Caliptra RT
3,537,126 UART: [state] CFI Enabled
3,656,913 UART: [rt] RT listening for mailbox commands...
3,657,583 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,083 UART: [rt]cmd =0x44504543, len=92
3,905,734 >>> mbox cmd response data (6284 bytes)
3,905,735 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,935,082 UART: [rt]cmd =0x43455252, len=4
3,945,845 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,971 ready_for_fw is high
1,361,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,220 >>> mbox cmd response: success
3,041,853 UART:
3,041,869 UART: Running Caliptra FMC ...
3,042,277 UART:
3,042,331 UART: [state] CFI Enabled
3,052,747 UART: [fht] FMC Alias Private Key: 7
3,171,659 UART: [art] Extend RT PCRs Done
3,172,087 UART: [art] Lock RT PCRs Done
3,173,539 UART: [art] Populate DV Done
3,181,948 UART: [fht] FMC Alias Private Key: 7
3,183,020 UART: [art] Derive CDI
3,183,300 UART: [art] Store in slot 0x4
3,268,842 UART: [art] Derive Key Pair
3,269,202 UART: [art] Store priv key in slot 0x5
3,282,229 UART: [art] Derive Key Pair - Done
3,297,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,281 UART: [art] PUB.X = 4667A79CA474F63C8D11517C27077727E8E0FFCD599797F2EED829A116CAC15B803205F077DC692B37C3D827886B0FC1
3,320,042 UART: [art] PUB.Y = F2556FB68A2B577619BF5EB6C3C660F08280E7B626373002D350BC5CC5B3A6537B4B974CF01849570AF82116CA9B6033
3,326,984 UART: [art] SIG.R = B98AB41DFE45C2A0DA9C828C688FCBBF9097A64C7ADA4848F3B3B316300A20BEBF587CD2F4D4CD7F0D9734C8EF55D678
3,333,770 UART: [art] SIG.S = 5EAC1CCE19D06F05304660CF4268CA9C6DD643F547D858C94D69FDD6D2257467D382471792DF49B135BD2D77EE359010
3,357,383 UART: Caliptra RT
3,357,634 UART: [state] CFI Enabled
3,478,654 UART: [rt] RT listening for mailbox commands...
3,479,324 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,726 UART: [rt]cmd =0x44504543, len=92
3,726,647 >>> mbox cmd response data (6284 bytes)
3,726,648 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,755,895 UART: [rt]cmd =0x43455252, len=4
3,766,672 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,788 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,390 UART: [kat] SHA2-256
882,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,436 UART: [kat] ++
886,588 UART: [kat] sha1
890,892 UART: [kat] SHA2-256
892,830 UART: [kat] SHA2-384
895,469 UART: [kat] SHA2-512-ACC
897,370 UART: [kat] ECC-384
903,401 UART: [kat] HMAC-384Kdf
907,957 UART: [kat] LMS
1,476,153 UART: [kat] --
1,477,086 UART: [cold-reset] ++
1,477,484 UART: [fht] Storing FHT @ 0x50003400
1,480,321 UART: [idev] ++
1,480,489 UART: [idev] CDI.KEYID = 6
1,480,849 UART: [idev] SUBJECT.KEYID = 7
1,481,273 UART: [idev] UDS.KEYID = 0
1,481,618 ready_for_fw is high
1,481,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,449 UART: [idev] Erasing UDS.KEYID = 0
1,505,831 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,495 UART: [idev] --
1,515,418 UART: [ldev] ++
1,515,586 UART: [ldev] CDI.KEYID = 6
1,515,949 UART: [ldev] SUBJECT.KEYID = 5
1,516,375 UART: [ldev] AUTHORITY.KEYID = 7
1,516,838 UART: [ldev] FE.KEYID = 1
1,521,920 UART: [ldev] Erasing FE.KEYID = 1
1,547,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,607 UART: [ldev] --
1,586,920 UART: [fwproc] Waiting for Commands...
1,587,675 UART: [fwproc] Received command 0x46574c44
1,588,466 UART: [fwproc] Received Image of size 118548 bytes
2,932,036 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,592 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,810 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,201 >>> mbox cmd response: success
3,132,307 UART: [afmc] ++
3,132,475 UART: [afmc] CDI.KEYID = 6
3,132,837 UART: [afmc] SUBJECT.KEYID = 7
3,133,262 UART: [afmc] AUTHORITY.KEYID = 5
3,168,581 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,923 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,703 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,412 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,295 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,978 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,640 UART: [afmc] --
3,211,772 UART: [cold-reset] --
3,212,502 UART: [state] Locking Datavault
3,213,595 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,199 UART: [state] Locking ICCM
3,214,753 UART: [exit] Launching FMC @ 0x40000130
3,220,083 UART:
3,220,099 UART: Running Caliptra FMC ...
3,220,507 UART:
3,220,650 UART: [state] CFI Enabled
3,230,922 UART: [fht] FMC Alias Private Key: 7
3,349,574 UART: [art] Extend RT PCRs Done
3,350,002 UART: [art] Lock RT PCRs Done
3,351,658 UART: [art] Populate DV Done
3,359,899 UART: [fht] FMC Alias Private Key: 7
3,360,949 UART: [art] Derive CDI
3,361,229 UART: [art] Store in slot 0x4
3,447,113 UART: [art] Derive Key Pair
3,447,473 UART: [art] Store priv key in slot 0x5
3,460,688 UART: [art] Derive Key Pair - Done
3,475,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,050 UART: [art] PUB.X = FC0BEF7D158DF1BCFD7C0B302E47DB189EC42684DADF51F545F965919543D531DB1402A972ECBD79FAE6E7D868CE2079
3,497,829 UART: [art] PUB.Y = 7A826B3448C36D8039B19A31FD819BC7D5D09FF1EE71D09CAE41EF6C10C6827D0C831F582682F79E172A9822D451C3F6
3,504,780 UART: [art] SIG.R = 5049A00A6C4CDF27BC764FF2BFB8B216033158CC959DA773335F58573EE660C0C38BE1159281158F7F16D276E1341887
3,511,540 UART: [art] SIG.S = 79A1F53D8B14AACC5B614FA447EC55D817ACACA47E7183AAB0A5EC5E774C92BE1B476CA197637F8578E0D73A50D14A50
3,535,502 UART: Caliptra RT
3,535,845 UART: [state] CFI Enabled
3,656,038 UART: [rt] RT listening for mailbox commands...
3,656,708 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,006 UART: [rt]cmd =0x44504543, len=92
3,903,701 >>> mbox cmd response data (6284 bytes)
3,903,702 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,933,103 UART: [rt]cmd =0x43455252, len=4
3,944,062 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,686 ready_for_fw is high
1,362,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,875 >>> mbox cmd response: success
3,043,730 UART:
3,043,746 UART: Running Caliptra FMC ...
3,044,154 UART:
3,044,297 UART: [state] CFI Enabled
3,054,863 UART: [fht] FMC Alias Private Key: 7
3,173,731 UART: [art] Extend RT PCRs Done
3,174,159 UART: [art] Lock RT PCRs Done
3,175,885 UART: [art] Populate DV Done
3,184,198 UART: [fht] FMC Alias Private Key: 7
3,185,144 UART: [art] Derive CDI
3,185,424 UART: [art] Store in slot 0x4
3,271,188 UART: [art] Derive Key Pair
3,271,548 UART: [art] Store priv key in slot 0x5
3,285,027 UART: [art] Derive Key Pair - Done
3,299,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,550 UART: [art] PUB.X = 4C0D5755D357C61C59AB6AA1533E0444149BB2490E738A483E42BC22DCB4F1D7AF984793072EB45B378443AE5F0A9C28
3,322,307 UART: [art] PUB.Y = 0432E2D579FC7604391D34B0B7EC24C3F54876504D69D2323FBC90722DE00B676487E31E74F8B0ED31295EDF4CB36995
3,329,246 UART: [art] SIG.R = 270923EE5F8F4E0285C49E9BBE8F53B30FC14CEE4E4942C817AE8DBE4C78BFC5486F156CB4DB1F40A1FA10063BFCA93B
3,336,026 UART: [art] SIG.S = 5A85837162A78D6C5DCDD63B507802E30EEE91110AC4C53AF4BED5280950F75D121CA45DDCCB7E66F08588DA36517A19
3,360,146 UART: Caliptra RT
3,360,489 UART: [state] CFI Enabled
3,480,724 UART: [rt] RT listening for mailbox commands...
3,481,394 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,802 UART: [rt]cmd =0x44504543, len=92
3,728,815 >>> mbox cmd response data (6284 bytes)
3,728,816 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,758,099 UART: [rt]cmd =0x43455252, len=4
3,769,112 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
891,330 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,434 UART: [kat] ++
895,586 UART: [kat] sha1
899,944 UART: [kat] SHA2-256
901,884 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,109 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,170,020 UART: [cold-reset] ++
1,170,456 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,174,512 ready_for_fw is high
1,174,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,087 UART: [idev] Erasing UDS.KEYID = 0
1,198,855 UART: [idev] Sha1 KeyId Algorithm
1,207,957 UART: [idev] --
1,209,016 UART: [ldev] ++
1,209,184 UART: [ldev] CDI.KEYID = 6
1,209,548 UART: [ldev] SUBJECT.KEYID = 5
1,209,975 UART: [ldev] AUTHORITY.KEYID = 7
1,210,438 UART: [ldev] FE.KEYID = 1
1,215,492 UART: [ldev] Erasing FE.KEYID = 1
1,241,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,286 UART: [ldev] --
1,280,637 UART: [fwproc] Wait for Commands...
1,281,230 UART: [fwproc] Recv command 0x46574c44
1,281,963 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,681 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,856 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,153 >>> mbox cmd response: success
2,827,291 UART: [afmc] ++
2,827,459 UART: [afmc] CDI.KEYID = 6
2,827,822 UART: [afmc] SUBJECT.KEYID = 7
2,828,248 UART: [afmc] AUTHORITY.KEYID = 5
2,863,841 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,015 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,725 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,606 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,307 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,906 UART: [afmc] --
2,906,837 UART: [cold-reset] --
2,907,625 UART: [state] Locking Datavault
2,908,748 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,352 UART: [state] Locking ICCM
2,909,930 UART: [exit] Launching FMC @ 0x40000130
2,915,260 UART:
2,915,276 UART: Running Caliptra FMC ...
2,915,684 UART:
2,915,738 UART: [state] CFI Enabled
2,926,518 UART: [fht] FMC Alias Private Key: 7
3,045,380 UART: [art] Extend RT PCRs Done
3,045,808 UART: [art] Lock RT PCRs Done
3,047,072 UART: [art] Populate DV Done
3,055,325 UART: [fht] FMC Alias Private Key: 7
3,056,333 UART: [art] Derive CDI
3,056,613 UART: [art] Store in slot 0x4
3,142,214 UART: [art] Derive Key Pair
3,142,574 UART: [art] Store priv key in slot 0x5
3,155,538 UART: [art] Derive Key Pair - Done
3,170,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,407 UART: [art] PUB.X = 2F981C37FA8C90A148BB24126F32DF6463832AE1B9027730D7F71B335A8BB8F87F75702C709C31B589DD9C1A8937B4EA
3,193,176 UART: [art] PUB.Y = 6D7256508C33550AE2E99AD9F0C31AC1CDF2A2464BC668618EA5471A8051C6404CEC3080D840692B552EEC90376C7C46
3,200,123 UART: [art] SIG.R = DFDD77E3E2BDB47BB295D0788574476C59B3EFF24600F88F3900FA1200FAE9C755C95894C5189B2B7490725F6A1191A2
3,206,829 UART: [art] SIG.S = 8BC38B73AA7353E2503B22F7068E26E15F5AFB7C3D19CC4FED2F904A6058DE6A72746A18D5A69595E8C6D66D2C958584
3,230,778 UART: Caliptra RT
3,231,029 UART: [state] CFI Enabled
3,350,703 UART: [rt] RT listening for mailbox commands...
3,351,373 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,639 UART: [rt]cmd =0x44504543, len=92
3,598,200 >>> mbox cmd response data (6284 bytes)
3,598,201 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,627,768 UART: [rt]cmd =0x43455252, len=4
3,638,398 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,352 ready_for_fw is high
1,058,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,961 >>> mbox cmd response: success
2,739,716 UART:
2,739,732 UART: Running Caliptra FMC ...
2,740,140 UART:
2,740,194 UART: [state] CFI Enabled
2,750,452 UART: [fht] FMC Alias Private Key: 7
2,869,678 UART: [art] Extend RT PCRs Done
2,870,106 UART: [art] Lock RT PCRs Done
2,871,818 UART: [art] Populate DV Done
2,880,273 UART: [fht] FMC Alias Private Key: 7
2,881,281 UART: [art] Derive CDI
2,881,561 UART: [art] Store in slot 0x4
2,967,382 UART: [art] Derive Key Pair
2,967,742 UART: [art] Store priv key in slot 0x5
2,980,938 UART: [art] Derive Key Pair - Done
2,995,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,957 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,722 UART: [art] PUB.X = 9C319C97D52B97BA3C1940D4E0EE5A094318BF24EEB265DCEBD3F00F614B7CF36E1341E047083C7489EFE028F0825C3E
3,018,493 UART: [art] PUB.Y = 51D1DC9729B286EDB916716438E0279BD4E807EEFF98467251FAB2134B5F35B4AA82D4A9DF357B7B7FAA1EA8DAB1C60D
3,025,453 UART: [art] SIG.R = B7D002B3119432A8F562ADF206449A1C51FA0EBD7ADA6C94FB3E6691388E8DA5A098CED7994958AD3B9660116E3EB9E6
3,032,224 UART: [art] SIG.S = D7A1AB50364B0DE8B6F7030AA7BB2E94D31902CDC276F5F37DEEEE77AD183C65D4C876178DDDAA8FA719EC3B5F8B72D5
3,056,544 UART: Caliptra RT
3,056,795 UART: [state] CFI Enabled
3,176,433 UART: [rt] RT listening for mailbox commands...
3,177,103 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,383 UART: [rt]cmd =0x44504543, len=92
3,423,033 >>> mbox cmd response data (6284 bytes)
3,423,034 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,452,305 UART: [rt]cmd =0x43455252, len=4
3,463,263 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
891,305 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,550 UART: [kat] SHA2-512-ACC
906,451 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
921,072 UART: [kat] LMS
1,169,384 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,467 UART: [fht] FHT @ 0x50003400
1,173,005 UART: [idev] ++
1,173,173 UART: [idev] CDI.KEYID = 6
1,173,534 UART: [idev] SUBJECT.KEYID = 7
1,173,959 UART: [idev] UDS.KEYID = 0
1,174,305 ready_for_fw is high
1,174,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,199,602 UART: [idev] Sha1 KeyId Algorithm
1,208,456 UART: [idev] --
1,209,453 UART: [ldev] ++
1,209,621 UART: [ldev] CDI.KEYID = 6
1,209,985 UART: [ldev] SUBJECT.KEYID = 5
1,210,412 UART: [ldev] AUTHORITY.KEYID = 7
1,210,875 UART: [ldev] FE.KEYID = 1
1,216,541 UART: [ldev] Erasing FE.KEYID = 1
1,242,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,157 UART: [ldev] --
1,281,358 UART: [fwproc] Wait for Commands...
1,282,033 UART: [fwproc] Recv command 0x46574c44
1,282,766 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,862 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,037 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,342 >>> mbox cmd response: success
2,825,440 UART: [afmc] ++
2,825,608 UART: [afmc] CDI.KEYID = 6
2,825,971 UART: [afmc] SUBJECT.KEYID = 7
2,826,397 UART: [afmc] AUTHORITY.KEYID = 5
2,862,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,591 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,340 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,050 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,931 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,632 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,417 UART: [afmc] --
2,905,378 UART: [cold-reset] --
2,906,360 UART: [state] Locking Datavault
2,907,667 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,271 UART: [state] Locking ICCM
2,908,767 UART: [exit] Launching FMC @ 0x40000130
2,914,097 UART:
2,914,113 UART: Running Caliptra FMC ...
2,914,521 UART:
2,914,664 UART: [state] CFI Enabled
2,925,492 UART: [fht] FMC Alias Private Key: 7
3,044,272 UART: [art] Extend RT PCRs Done
3,044,700 UART: [art] Lock RT PCRs Done
3,046,258 UART: [art] Populate DV Done
3,054,659 UART: [fht] FMC Alias Private Key: 7
3,055,731 UART: [art] Derive CDI
3,056,011 UART: [art] Store in slot 0x4
3,141,480 UART: [art] Derive Key Pair
3,141,840 UART: [art] Store priv key in slot 0x5
3,155,496 UART: [art] Derive Key Pair - Done
3,170,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,822 UART: [art] PUB.X = 0ADE6E6E6654DEE0082487F8B2C8F43155D1B27AEF3463BB0D720E95A325FC630760416AAAED86B8398F7AA3F4B2C164
3,193,587 UART: [art] PUB.Y = AAE7FDB538D811C9D6200072ACAF86453D07E4B428F50314A9B19648D8D498F09D28A46E2B861B50D65EAF15A664E2D7
3,200,515 UART: [art] SIG.R = 51945EB40B6F3A8A8AEF41126974AB92533F8B1C3170D89A3675C188A1E12CE6CC9969ED1150EDD39456B1B8A4496115
3,207,282 UART: [art] SIG.S = 285D585222355D25B912CC536827B2213E789CD71CD918CAA0B07228699382802F136F6A0BAAAAC33104DF70A0E0264A
3,231,018 UART: Caliptra RT
3,231,361 UART: [state] CFI Enabled
3,350,893 UART: [rt] RT listening for mailbox commands...
3,351,563 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,959 UART: [rt]cmd =0x44504543, len=92
3,600,480 >>> mbox cmd response data (6284 bytes)
3,600,481 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,629,770 UART: [rt]cmd =0x43455252, len=4
3,640,473 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,743 ready_for_fw is high
1,059,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,053 >>> mbox cmd response: success
2,740,790 UART:
2,740,806 UART: Running Caliptra FMC ...
2,741,214 UART:
2,741,357 UART: [state] CFI Enabled
2,752,157 UART: [fht] FMC Alias Private Key: 7
2,870,869 UART: [art] Extend RT PCRs Done
2,871,297 UART: [art] Lock RT PCRs Done
2,872,781 UART: [art] Populate DV Done
2,881,020 UART: [fht] FMC Alias Private Key: 7
2,882,064 UART: [art] Derive CDI
2,882,344 UART: [art] Store in slot 0x4
2,968,181 UART: [art] Derive Key Pair
2,968,541 UART: [art] Store priv key in slot 0x5
2,982,049 UART: [art] Derive Key Pair - Done
2,996,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,973 UART: [art] PUB.X = F454DAE418E7DDD2340E58B58176F6C80D0D9E88E0F16D3358A18E9B8C08976443EA9E7D7B4F294CCE488CD84AE4F1D5
3,019,743 UART: [art] PUB.Y = 0B5BC651C49E2EC1CB8BAE835283858CF7CD80EAED4917B043180B87C3531FAB3706C68AB2903069A811B973E6D80FCE
3,026,691 UART: [art] SIG.R = E624D8139B7CFBDF2BCDF1E7912ECA7579124884A4E4CED26051F42F2C076942A9DA1333F0B1416EA1F151BD9A6AB8BD
3,033,474 UART: [art] SIG.S = EC51BFD63D44FC28B1241B2DF506762B2799DCA0600BC3AC4A6D93A5C1817D20CEE650BD75AEC05976578085CEB109EA
3,057,599 UART: Caliptra RT
3,057,942 UART: [state] CFI Enabled
3,177,170 UART: [rt] RT listening for mailbox commands...
3,177,840 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,288 UART: [rt]cmd =0x44504543, len=92
3,425,774 >>> mbox cmd response data (6284 bytes)
3,425,775 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,455,144 UART: [rt]cmd =0x43455252, len=4
3,465,818 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,777 UART: [state] WD Timer not started. Device not locked for debugging
88,100 UART: [kat] SHA2-256
893,750 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,875 UART: [kat] ++
898,027 UART: [kat] sha1
902,293 UART: [kat] SHA2-256
904,233 UART: [kat] SHA2-384
907,080 UART: [kat] SHA2-512-ACC
908,981 UART: [kat] ECC-384
918,800 UART: [kat] HMAC-384Kdf
923,304 UART: [kat] LMS
1,171,632 UART: [kat] --
1,172,729 UART: [cold-reset] ++
1,173,257 UART: [fht] FHT @ 0x50003400
1,175,816 UART: [idev] ++
1,175,984 UART: [idev] CDI.KEYID = 6
1,176,344 UART: [idev] SUBJECT.KEYID = 7
1,176,768 UART: [idev] UDS.KEYID = 0
1,177,113 ready_for_fw is high
1,177,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,838 UART: [idev] Erasing UDS.KEYID = 0
1,201,695 UART: [idev] Sha1 KeyId Algorithm
1,210,221 UART: [idev] --
1,211,195 UART: [ldev] ++
1,211,363 UART: [ldev] CDI.KEYID = 6
1,211,726 UART: [ldev] SUBJECT.KEYID = 5
1,212,152 UART: [ldev] AUTHORITY.KEYID = 7
1,212,615 UART: [ldev] FE.KEYID = 1
1,217,415 UART: [ldev] Erasing FE.KEYID = 1
1,243,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,151 UART: [ldev] --
1,282,628 UART: [fwproc] Wait for Commands...
1,283,356 UART: [fwproc] Recv command 0x46574c44
1,284,084 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,850 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,020 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,345 >>> mbox cmd response: success
2,829,585 UART: [afmc] ++
2,829,753 UART: [afmc] CDI.KEYID = 6
2,830,115 UART: [afmc] SUBJECT.KEYID = 7
2,830,540 UART: [afmc] AUTHORITY.KEYID = 5
2,866,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,752 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,461 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,344 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,045 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,775 UART: [afmc] --
2,909,835 UART: [cold-reset] --
2,910,613 UART: [state] Locking Datavault
2,911,806 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,410 UART: [state] Locking ICCM
2,912,940 UART: [exit] Launching FMC @ 0x40000130
2,918,270 UART:
2,918,286 UART: Running Caliptra FMC ...
2,918,694 UART:
2,918,748 UART: [state] CFI Enabled
2,928,964 UART: [fht] FMC Alias Private Key: 7
3,047,404 UART: [art] Extend RT PCRs Done
3,047,832 UART: [art] Lock RT PCRs Done
3,049,154 UART: [art] Populate DV Done
3,057,543 UART: [fht] FMC Alias Private Key: 7
3,058,687 UART: [art] Derive CDI
3,058,967 UART: [art] Store in slot 0x4
3,144,570 UART: [art] Derive Key Pair
3,144,930 UART: [art] Store priv key in slot 0x5
3,157,788 UART: [art] Derive Key Pair - Done
3,172,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,601 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,366 UART: [art] PUB.X = 96BE018C238C8151B057CE29888CEB38F02F35BCE9743BDEB5666D3F0D6CE2EA05FB06C3FF81E84E187CDC76B6560CF6
3,196,137 UART: [art] PUB.Y = 769F61F4EA6C28E94B67D5164EABDA53995439A30175C6B8C94B2F13B8FC76E761B8E99D8CA2C1006A91722AD62A0C88
3,203,065 UART: [art] SIG.R = 3A5F4546DD768FF3D0825E44632ECC374B9E8F45FB8BA88BFCABA55FB1D8BA840668A0D822E23CDFFF75895AC5C32DA9
3,209,854 UART: [art] SIG.S = BEFCEA9FFC5054C461D57D1FF35F9FFE41D608E3443077CEA9B2B8F64D36D440FBB77F9812C10EF2A3F6C8EA7253E511
3,233,890 UART: Caliptra RT
3,234,141 UART: [state] CFI Enabled
3,353,600 UART: [rt] RT listening for mailbox commands...
3,354,270 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,904 UART: [rt]cmd =0x44504543, len=92
3,601,754 >>> mbox cmd response data (6284 bytes)
3,601,755 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,631,148 UART: [rt]cmd =0x43455252, len=4
3,642,037 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,545 ready_for_fw is high
1,060,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,998 >>> mbox cmd response: success
2,743,105 UART:
2,743,121 UART: Running Caliptra FMC ...
2,743,529 UART:
2,743,583 UART: [state] CFI Enabled
2,754,069 UART: [fht] FMC Alias Private Key: 7
2,872,951 UART: [art] Extend RT PCRs Done
2,873,379 UART: [art] Lock RT PCRs Done
2,874,891 UART: [art] Populate DV Done
2,882,944 UART: [fht] FMC Alias Private Key: 7
2,884,086 UART: [art] Derive CDI
2,884,366 UART: [art] Store in slot 0x4
2,969,979 UART: [art] Derive Key Pair
2,970,339 UART: [art] Store priv key in slot 0x5
2,982,961 UART: [art] Derive Key Pair - Done
2,998,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,602 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,367 UART: [art] PUB.X = 01CD3B206696FBFEDE2DEB4379FAF307076323123D8A86AF1FE7413AC99F289E1933D3A753F962464069B9233C31C797
3,021,128 UART: [art] PUB.Y = 0FFEE4D1344087FB70ED74B9C924CFAF9D19CBBC96DEF97DF6BF754CBD61E593B8CB774BE1C31A2C672EA1253728CE9D
3,028,101 UART: [art] SIG.R = 6E645DF9B73B8C84CC410AF75D8D25108C9BE58AF2ABAF00516CB153BE03430305BFAF73508D9316CA60E7400A606D7F
3,034,844 UART: [art] SIG.S = 8896986903CE682A1A11D6CDE2984AEA8BB1BC7BFC2DC1B52BF25244EB99221C9D030BA4754B83569C45C4301905CD73
3,058,232 UART: Caliptra RT
3,058,483 UART: [state] CFI Enabled
3,177,812 UART: [rt] RT listening for mailbox commands...
3,178,482 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,828 UART: [rt]cmd =0x44504543, len=92
3,426,572 >>> mbox cmd response data (6284 bytes)
3,426,573 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,456,030 UART: [rt]cmd =0x43455252, len=4
3,466,967 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
893,581 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,706 UART: [kat] ++
897,858 UART: [kat] sha1
901,968 UART: [kat] SHA2-256
903,908 UART: [kat] SHA2-384
906,627 UART: [kat] SHA2-512-ACC
908,528 UART: [kat] ECC-384
918,347 UART: [kat] HMAC-384Kdf
922,987 UART: [kat] LMS
1,171,315 UART: [kat] --
1,172,100 UART: [cold-reset] ++
1,172,552 UART: [fht] FHT @ 0x50003400
1,175,323 UART: [idev] ++
1,175,491 UART: [idev] CDI.KEYID = 6
1,175,851 UART: [idev] SUBJECT.KEYID = 7
1,176,275 UART: [idev] UDS.KEYID = 0
1,176,620 ready_for_fw is high
1,176,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,337 UART: [idev] Erasing UDS.KEYID = 0
1,201,552 UART: [idev] Sha1 KeyId Algorithm
1,210,062 UART: [idev] --
1,211,060 UART: [ldev] ++
1,211,228 UART: [ldev] CDI.KEYID = 6
1,211,591 UART: [ldev] SUBJECT.KEYID = 5
1,212,017 UART: [ldev] AUTHORITY.KEYID = 7
1,212,480 UART: [ldev] FE.KEYID = 1
1,217,690 UART: [ldev] Erasing FE.KEYID = 1
1,244,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,066 UART: [ldev] --
1,283,363 UART: [fwproc] Wait for Commands...
1,284,083 UART: [fwproc] Recv command 0x46574c44
1,284,811 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,965 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,135 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,356 >>> mbox cmd response: success
2,828,436 UART: [afmc] ++
2,828,604 UART: [afmc] CDI.KEYID = 6
2,828,966 UART: [afmc] SUBJECT.KEYID = 7
2,829,391 UART: [afmc] AUTHORITY.KEYID = 5
2,865,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,629 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,338 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,221 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,922 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,862 UART: [afmc] --
2,908,862 UART: [cold-reset] --
2,909,698 UART: [state] Locking Datavault
2,910,689 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,293 UART: [state] Locking ICCM
2,911,745 UART: [exit] Launching FMC @ 0x40000130
2,917,075 UART:
2,917,091 UART: Running Caliptra FMC ...
2,917,499 UART:
2,917,642 UART: [state] CFI Enabled
2,928,004 UART: [fht] FMC Alias Private Key: 7
3,047,048 UART: [art] Extend RT PCRs Done
3,047,476 UART: [art] Lock RT PCRs Done
3,048,948 UART: [art] Populate DV Done
3,057,371 UART: [fht] FMC Alias Private Key: 7
3,058,433 UART: [art] Derive CDI
3,058,713 UART: [art] Store in slot 0x4
3,144,300 UART: [art] Derive Key Pair
3,144,660 UART: [art] Store priv key in slot 0x5
3,157,890 UART: [art] Derive Key Pair - Done
3,172,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,299 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,064 UART: [art] PUB.X = 8FC02CE3CA41644F304D2E0AA8212B02F45969AA3EB9EA63BAEFAF65E2A6E760AAA0146EF7363AE3058CC4DBFDE8773D
3,195,849 UART: [art] PUB.Y = FD40D80A5524AB7CEDE2041E7AEE73CD5A94686C50B59CF5926CDA1588473A905B984A285D784F5E7FFAA341F87ED894
3,202,805 UART: [art] SIG.R = EC1381FDA73D2B30CE1DB58F9B5D3DA63EA55E2966EA86AC2EB17BE46C898D474933A57B5D871C5CFF4743649C7BA9F6
3,209,593 UART: [art] SIG.S = 42A36343CC25BC43BF3732FC5D26B36A7E413D7754B12463BD6D6D6D60B7AAA05CCF9EC9C1D0B938EE140FB8B2F7F2A0
3,233,834 UART: Caliptra RT
3,234,177 UART: [state] CFI Enabled
3,354,664 UART: [rt] RT listening for mailbox commands...
3,355,334 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,468 UART: [rt]cmd =0x44504543, len=92
3,602,805 >>> mbox cmd response data (6284 bytes)
3,602,806 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,632,409 UART: [rt]cmd =0x43455252, len=4
3,643,092 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,712 ready_for_fw is high
1,060,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,089 >>> mbox cmd response: success
2,742,680 UART:
2,742,696 UART: Running Caliptra FMC ...
2,743,104 UART:
2,743,247 UART: [state] CFI Enabled
2,753,483 UART: [fht] FMC Alias Private Key: 7
2,871,581 UART: [art] Extend RT PCRs Done
2,872,009 UART: [art] Lock RT PCRs Done
2,873,531 UART: [art] Populate DV Done
2,881,888 UART: [fht] FMC Alias Private Key: 7
2,882,924 UART: [art] Derive CDI
2,883,204 UART: [art] Store in slot 0x4
2,968,813 UART: [art] Derive Key Pair
2,969,173 UART: [art] Store priv key in slot 0x5
2,982,841 UART: [art] Derive Key Pair - Done
2,997,544 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,486 UART: [art] PUB.X = E3D2AFB025FC74F70B4D19E9492536F06A65471694B00393D29DC14ADD1A4AECBAE4E68251822091B4552BD97C2D1749
3,020,254 UART: [art] PUB.Y = 8B326CEBFA9A516D9C90E640FAAA21EA68961361DE8AA915F06CDB6617F5AD0E8B808C4A13BB0A96F4835A3F70EE061C
3,027,213 UART: [art] SIG.R = 3C97744F0F14401EF9BC986B6DFE1A08AD8CC4E11C09A324D00CFDEC723B8BFCC7C7680C0456A94553F7C993A7B81E7B
3,033,981 UART: [art] SIG.S = 0201C06D6DEB194884520DF83A6FB249D2C3E9AAD962D708525336A9A207D7F76F271AF82CD3A544E3D52F7691CEEC02
3,057,483 UART: Caliptra RT
3,057,826 UART: [state] CFI Enabled
3,177,034 UART: [rt] RT listening for mailbox commands...
3,177,704 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,150 UART: [rt]cmd =0x44504543, len=92
3,424,869 >>> mbox cmd response data (6284 bytes)
3,424,870 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,454,407 UART: [rt]cmd =0x43455252, len=4
3,465,110 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,106 UART:
192,464 UART: Running Caliptra ROM ...
193,658 UART:
193,834 UART: [state] CFI Enabled
259,971 UART: [state] LifecycleState = Unprovisioned
261,967 UART: [state] DebugLocked = No
263,220 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,819 UART: [kat] SHA2-256
437,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,062 UART: [kat] ++
448,522 UART: [kat] sha1
460,333 UART: [kat] SHA2-256
463,046 UART: [kat] SHA2-384
468,485 UART: [kat] SHA2-512-ACC
470,857 UART: [kat] ECC-384
2,767,991 UART: [kat] HMAC-384Kdf
2,800,859 UART: [kat] LMS
3,991,225 UART: [kat] --
3,993,755 UART: [cold-reset] ++
3,994,995 UART: [fht] Storing FHT @ 0x50003400
4,006,472 UART: [idev] ++
4,007,050 UART: [idev] CDI.KEYID = 6
4,007,978 UART: [idev] SUBJECT.KEYID = 7
4,009,228 UART: [idev] UDS.KEYID = 0
4,010,280 ready_for_fw is high
4,010,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,599 UART: [idev] Erasing UDS.KEYID = 0
7,349,105 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,642 UART: [idev] --
7,374,362 UART: [ldev] ++
7,374,934 UART: [ldev] CDI.KEYID = 6
7,375,902 UART: [ldev] SUBJECT.KEYID = 5
7,377,059 UART: [ldev] AUTHORITY.KEYID = 7
7,378,404 UART: [ldev] FE.KEYID = 1
7,422,372 UART: [ldev] Erasing FE.KEYID = 1
10,755,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,780 UART: [ldev] --
13,116,760 UART: [fwproc] Waiting for Commands...
13,118,690 UART: [fwproc] Received command 0x46574c44
13,120,870 UART: [fwproc] Received Image of size 118548 bytes
17,226,106 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,143 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,309 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,530 >>> mbox cmd response: success
17,704,615 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,707,501 UART: [afmc] ++
17,708,084 UART: [afmc] CDI.KEYID = 6
17,709,127 UART: [afmc] SUBJECT.KEYID = 7
17,710,288 UART: [afmc] AUTHORITY.KEYID = 5
21,086,734 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,386,167 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,388,429 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,402,876 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,417,605 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,431,983 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,453,546 UART: [afmc] --
23,457,621 UART: [cold-reset] --
23,461,316 UART: [state] Locking Datavault
23,467,206 UART: [state] Locking PCR0, PCR1 and PCR31
23,468,903 UART: [state] Locking ICCM
23,470,729 UART: [exit] Launching FMC @ 0x40000130
23,479,125 UART:
23,479,356 UART: Running Caliptra FMC ...
23,480,470 UART:
23,480,629 UART: [state] CFI Enabled
23,543,687 UART: [fht] FMC Alias Private Key: 7
25,884,629 UART: [art] Extend RT PCRs Done
25,885,853 UART: [art] Lock RT PCRs Done
25,887,507 UART: [art] Populate DV Done
25,893,026 UART: [fht] FMC Alias Private Key: 7
25,894,557 UART: [art] Derive CDI
25,895,305 UART: [art] Store in slot 0x4
25,952,617 UART: [art] Derive Key Pair
25,953,613 UART: [art] Store priv key in slot 0x5
29,246,903 UART: [art] Derive Key Pair - Done
29,259,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,249 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,757 UART: [art] PUB.X = 627F5B5405B05BDE574418BFEF6017044F0C5EBB8875A3DA38650D00143F99A42E16A8CBB6CFA3AED090FFDC6F5ED889
31,558,020 UART: [art] PUB.Y = CFBFB5CD81BCFB3AE143CA0F9F289DD82358AE5470981DD5401F168ED642743D1E47B5F16B39F40A91B82017AEC524C5
31,565,293 UART: [art] SIG.R = 35E4BB377160360299F43A6A2174C393127D7046102A934E787055B87AA1661AEAB27441AAFA375B12729CBDFF0B809A
31,572,646 UART: [art] SIG.S = 863EF2772510E62BFEF8D17290A24C6A5221495CBF383133C45E3C8E0EEB21D13F1E9C9D08832A66A185C7075AC34DFF
32,878,468 UART: Caliptra RT
32,879,171 UART: [state] CFI Enabled
33,055,467 UART: [rt] RT listening for mailbox commands...
33,087,665 UART: [rt]cmd =0x44504543, len=92
38,838,753 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,785,601 ready_for_fw is high
3,786,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,960,445 >>> mbox cmd response: success
17,961,958 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,650,695 UART:
23,651,098 UART: Running Caliptra FMC ...
23,652,226 UART:
23,652,385 UART: [state] CFI Enabled
23,719,913 UART: [fht] FMC Alias Private Key: 7
26,060,010 UART: [art] Extend RT PCRs Done
26,061,251 UART: [art] Lock RT PCRs Done
26,063,120 UART: [art] Populate DV Done
26,068,500 UART: [fht] FMC Alias Private Key: 7
26,070,051 UART: [art] Derive CDI
26,070,795 UART: [art] Store in slot 0x4
26,128,631 UART: [art] Derive Key Pair
26,129,677 UART: [art] Store priv key in slot 0x5
29,422,629 UART: [art] Derive Key Pair - Done
29,435,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,425 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,936 UART: [art] PUB.X = E67CA0328DF0EEF81C479A29FA011E5B9B98BD81AC934D87C33D14404E8F55EB058B020743009A937CB9BBA85933C40D
31,733,198 UART: [art] PUB.Y = E6E343BDDE448E0C708F5ADBB45D86CE5D2D01723E6CE85A467FF5DF79D4C3518EC6AF361AAADF405E4F4C533637F54B
31,740,460 UART: [art] SIG.R = 125A49A0E68DEEEBB60BA358537F29648E9D312307DE59902D36FB511F753178AF89E238F5E6BC24686B7133A9D4072D
31,747,861 UART: [art] SIG.S = FA016051E637131870D6F3E04A3D3B2619FCFB1C895631CA7C72A69C07D49A52B8F81D837E4A6487CAF1E179A0B3A916
33,052,188 UART: Caliptra RT
33,052,900 UART: [state] CFI Enabled
33,230,733 UART: [rt] RT listening for mailbox commands...
33,262,793 UART: [rt]cmd =0x44504543, len=92
39,012,340 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,450 UART:
192,822 UART: Running Caliptra ROM ...
193,999 UART:
603,729 UART: [state] CFI Enabled
620,511 UART: [state] LifecycleState = Unprovisioned
622,424 UART: [state] DebugLocked = No
624,735 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,526 UART: [kat] SHA2-256
799,318 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,863 UART: [kat] ++
810,341 UART: [kat] sha1
820,852 UART: [kat] SHA2-256
823,575 UART: [kat] SHA2-384
830,057 UART: [kat] SHA2-512-ACC
832,494 UART: [kat] ECC-384
3,116,477 UART: [kat] HMAC-384Kdf
3,127,442 UART: [kat] LMS
4,317,552 UART: [kat] --
4,322,759 UART: [cold-reset] ++
4,324,186 UART: [fht] Storing FHT @ 0x50003400
4,335,593 UART: [idev] ++
4,336,149 UART: [idev] CDI.KEYID = 6
4,337,023 UART: [idev] SUBJECT.KEYID = 7
4,338,331 UART: [idev] UDS.KEYID = 0
4,339,309 ready_for_fw is high
4,339,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,314 UART: [idev] Erasing UDS.KEYID = 0
7,624,924 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,978 UART: [idev] --
7,650,363 UART: [ldev] ++
7,650,924 UART: [ldev] CDI.KEYID = 6
7,651,930 UART: [ldev] SUBJECT.KEYID = 5
7,653,318 UART: [ldev] AUTHORITY.KEYID = 7
7,654,504 UART: [ldev] FE.KEYID = 1
7,664,771 UART: [ldev] Erasing FE.KEYID = 1
10,954,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,236 UART: [ldev] --
13,314,903 UART: [fwproc] Waiting for Commands...
13,318,075 UART: [fwproc] Received command 0x46574c44
13,320,255 UART: [fwproc] Received Image of size 118548 bytes
17,434,986 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,510,044 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,583,220 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,911,894 >>> mbox cmd response: success
17,913,183 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,916,082 UART: [afmc] ++
17,916,669 UART: [afmc] CDI.KEYID = 6
17,917,554 UART: [afmc] SUBJECT.KEYID = 7
17,918,815 UART: [afmc] AUTHORITY.KEYID = 5
21,233,312 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,630 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,530,883 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,312 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,560,036 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,470 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,987 UART: [afmc] --
23,601,229 UART: [cold-reset] --
23,604,221 UART: [state] Locking Datavault
23,609,779 UART: [state] Locking PCR0, PCR1 and PCR31
23,611,524 UART: [state] Locking ICCM
23,613,528 UART: [exit] Launching FMC @ 0x40000130
23,621,920 UART:
23,622,149 UART: Running Caliptra FMC ...
23,623,168 UART:
23,623,326 UART: [state] CFI Enabled
23,631,584 UART: [fht] FMC Alias Private Key: 7
25,970,493 UART: [art] Extend RT PCRs Done
25,971,705 UART: [art] Lock RT PCRs Done
25,973,574 UART: [art] Populate DV Done
25,979,026 UART: [fht] FMC Alias Private Key: 7
25,980,626 UART: [art] Derive CDI
25,981,435 UART: [art] Store in slot 0x4
26,024,183 UART: [art] Derive Key Pair
26,025,178 UART: [art] Store priv key in slot 0x5
29,267,291 UART: [art] Derive Key Pair - Done
29,280,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,283 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,787 UART: [art] PUB.X = 7C734D886A2EFF3A6B8E94D6F44F467ABFD1B3CF8918DD63FEA39E2375317833B9870C31DAADD83E4ADC5F8F93026C24
31,570,028 UART: [art] PUB.Y = 02D5DE9409A4E40F091E36DBC05164432E39DF54605991E29BDE5E15793AEA137E91BD6D20D5CEB6FD5C80B3A40D399A
31,577,298 UART: [art] SIG.R = F09EEF813E12C6A3C8C52C027F4FC5EBC12032458765CBEF10A787D148AB23D7C80B44615026058B88668FB70FB3F861
31,584,710 UART: [art] SIG.S = 7452CFB894F74520B762E1DF6F08A65476380CB98E77D1DF99772CB6F3F3F2CDE400077490182D09740935114B0FB0C6
32,889,881 UART: Caliptra RT
32,890,593 UART: [state] CFI Enabled
33,023,600 UART: [rt] RT listening for mailbox commands...
33,055,774 UART: [rt]cmd =0x44504543, len=92
38,731,936 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
4,134,136 ready_for_fw is high
4,134,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,937 >>> mbox cmd response: success
18,164,441 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,806,828 UART:
23,807,227 UART: Running Caliptra FMC ...
23,808,336 UART:
23,808,488 UART: [state] CFI Enabled
23,816,273 UART: [fht] FMC Alias Private Key: 7
26,155,977 UART: [art] Extend RT PCRs Done
26,157,218 UART: [art] Lock RT PCRs Done
26,158,925 UART: [art] Populate DV Done
26,164,137 UART: [fht] FMC Alias Private Key: 7
26,165,782 UART: [art] Derive CDI
26,166,516 UART: [art] Store in slot 0x4
26,209,802 UART: [art] Derive Key Pair
26,210,797 UART: [art] Store priv key in slot 0x5
29,452,704 UART: [art] Derive Key Pair - Done
29,466,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,565 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,215 UART: [art] PUB.X = 37F8C6593D31123888C41C6FD5C48453242C2A33FBB4FC5AD857FE1C37B2ADFB95252A21187C037B497F70098E6F0366
31,755,363 UART: [art] PUB.Y = 74B9DFEE2013668E43BFFC25FF7F5D5B94DD2B48319225A994009D4D449A7E0CA7445016A2F6AA8CAB2B08B114312EBA
31,762,610 UART: [art] SIG.R = 9130568000A4D0B25432565AC457D41284791AA69AE10CABBCB89EC6C17B7BD8997AAEBB282B55A62E19364B31D69970
31,769,941 UART: [art] SIG.S = 0F9A269C77CF84CD876BE023D19954F8B2D0B953C99B9207A1DFF6ED318AFC9499AE95A6B67031E8E3915F176260A50C
33,075,246 UART: Caliptra RT
33,075,954 UART: [state] CFI Enabled
33,209,467 UART: [rt] RT listening for mailbox commands...
33,241,589 UART: [rt]cmd =0x44504543, len=92
38,916,237 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,010 UART:
192,401 UART: Running Caliptra ROM ...
193,508 UART:
193,654 UART: [state] CFI Enabled
264,351 UART: [state] LifecycleState = Unprovisioned
266,335 UART: [state] DebugLocked = No
269,066 UART: [state] WD Timer not started. Device not locked for debugging
273,027 UART: [kat] SHA2-256
452,692 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,424 UART: [kat] ++
463,867 UART: [kat] sha1
473,746 UART: [kat] SHA2-256
476,418 UART: [kat] SHA2-384
482,052 UART: [kat] SHA2-512-ACC
484,416 UART: [kat] ECC-384
2,948,693 UART: [kat] HMAC-384Kdf
2,971,251 UART: [kat] LMS
3,447,776 UART: [kat] --
3,453,483 UART: [cold-reset] ++
3,455,085 UART: [fht] FHT @ 0x50003400
3,467,564 UART: [idev] ++
3,468,129 UART: [idev] CDI.KEYID = 6
3,469,080 UART: [idev] SUBJECT.KEYID = 7
3,470,323 UART: [idev] UDS.KEYID = 0
3,471,218 ready_for_fw is high
3,471,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,472 UART: [idev] Erasing UDS.KEYID = 0
5,985,752 UART: [idev] Sha1 KeyId Algorithm
6,010,764 UART: [idev] --
6,016,141 UART: [ldev] ++
6,016,719 UART: [ldev] CDI.KEYID = 6
6,017,700 UART: [ldev] SUBJECT.KEYID = 5
6,018,955 UART: [ldev] AUTHORITY.KEYID = 7
6,020,137 UART: [ldev] FE.KEYID = 1
6,057,142 UART: [ldev] Erasing FE.KEYID = 1
8,567,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,081 UART: [ldev] --
10,376,051 UART: [fwproc] Wait for Commands...
10,377,982 UART: [fwproc] Recv command 0x46574c44
10,379,963 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,340 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,390 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,108 >>> mbox cmd response: success
14,344,265 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,347,706 UART: [afmc] ++
14,348,285 UART: [afmc] CDI.KEYID = 6
14,349,220 UART: [afmc] SUBJECT.KEYID = 7
14,350,434 UART: [afmc] AUTHORITY.KEYID = 5
16,895,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,706 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,521 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,570 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,109 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,714,584 UART: [afmc] --
18,718,624 UART: [cold-reset] --
18,721,831 UART: [state] Locking Datavault
18,726,750 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,494 UART: [state] Locking ICCM
18,730,863 UART: [exit] Launching FMC @ 0x40000130
18,739,230 UART:
18,739,470 UART: Running Caliptra FMC ...
18,740,565 UART:
18,740,719 UART: [state] CFI Enabled
18,794,831 UART: [fht] FMC Alias Private Key: 7
20,561,616 UART: [art] Extend RT PCRs Done
20,562,845 UART: [art] Lock RT PCRs Done
20,564,331 UART: [art] Populate DV Done
20,569,692 UART: [fht] FMC Alias Private Key: 7
20,571,318 UART: [art] Derive CDI
20,572,061 UART: [art] Store in slot 0x4
20,628,932 UART: [art] Derive Key Pair
20,629,928 UART: [art] Store priv key in slot 0x5
23,092,873 UART: [art] Derive Key Pair - Done
23,106,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,761 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,278 UART: [art] PUB.X = 36DA7E99328412256A82A8EC5CC14FC691DAEDAFDDB41E783D3B265AE61AD593CE47981E4A7C3371D147BB94FC0E4A15
24,826,529 UART: [art] PUB.Y = D35B825BBCEA6A8A681FDFF6441EB4FB0BFFACE229FA375FE7D35675DE6D86958DEFE37DFA9E13D0DAEDB8263792EAA4
24,833,863 UART: [art] SIG.R = B81DFC48473CB68204F53B47EECB7513EDE902E233BDBD731505917F034192705C518E604A43C670BDD856CF2B63F334
24,841,261 UART: [art] SIG.S = 7270C0E480A8F7FD83DA34DD142FA502534BCCF11D3CE5841E5A82F87AD3F4CE554404990B7A88BE021A54097C7D864C
25,820,263 UART: Caliptra RT
25,820,979 UART: [state] CFI Enabled
25,999,945 UART: [rt] RT listening for mailbox commands...
26,032,105 UART: [rt]cmd =0x44504543, len=92
30,376,955 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,440,710 ready_for_fw is high
3,441,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,198,189 >>> mbox cmd response: success
14,199,718 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,492,468 UART:
18,492,862 UART: Running Caliptra FMC ...
18,493,995 UART:
18,494,152 UART: [state] CFI Enabled
18,556,888 UART: [fht] FMC Alias Private Key: 7
20,323,808 UART: [art] Extend RT PCRs Done
20,325,018 UART: [art] Lock RT PCRs Done
20,326,624 UART: [art] Populate DV Done
20,331,927 UART: [fht] FMC Alias Private Key: 7
20,333,419 UART: [art] Derive CDI
20,334,153 UART: [art] Store in slot 0x4
20,390,012 UART: [art] Derive Key Pair
20,391,101 UART: [art] Store priv key in slot 0x5
22,853,658 UART: [art] Derive Key Pair - Done
22,866,930 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,579,725 UART: [art] Erasing AUTHORITY.KEYID = 7
24,581,226 UART: [art] PUB.X = 062B650A06CBA9B0E979C143A1ABA8823995018B83B98AAFEC200FE247565FACAAF8249400F774841912F05BA7DCF227
24,588,475 UART: [art] PUB.Y = 0D6278C27D86B5CDA5EEA12D8ADE059532C52F3AB309A157921BAA75E22AEB0FD5334C60AA3D45424DF0B10633132285
24,595,747 UART: [art] SIG.R = C75A2D32C9474FFFC609C630702D57641E75AFB25B3AC283705B8D5B6B993200A16171D383FD0CFCA5A642ADB7313137
24,603,104 UART: [art] SIG.S = 598B4B4D317023BE4D0CADA7EC1B629FB0A2F79B740A54A609DDA857A1D0FE86A9E0B6D8AD813048817EED106578750C
25,582,077 UART: Caliptra RT
25,582,786 UART: [state] CFI Enabled
25,762,513 UART: [rt] RT listening for mailbox commands...
25,794,298 UART: [rt]cmd =0x44504543, len=92
30,140,563 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,365 UART:
192,726 UART: Running Caliptra ROM ...
193,872 UART:
603,595 UART: [state] CFI Enabled
614,384 UART: [state] LifecycleState = Unprovisioned
616,358 UART: [state] DebugLocked = No
619,302 UART: [state] WD Timer not started. Device not locked for debugging
622,637 UART: [kat] SHA2-256
802,240 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,032 UART: [kat] ++
813,486 UART: [kat] sha1
824,645 UART: [kat] SHA2-256
827,372 UART: [kat] SHA2-384
832,513 UART: [kat] SHA2-512-ACC
834,880 UART: [kat] ECC-384
3,276,149 UART: [kat] HMAC-384Kdf
3,289,448 UART: [kat] LMS
3,765,985 UART: [kat] --
3,769,362 UART: [cold-reset] ++
3,771,014 UART: [fht] FHT @ 0x50003400
3,783,203 UART: [idev] ++
3,783,769 UART: [idev] CDI.KEYID = 6
3,784,651 UART: [idev] SUBJECT.KEYID = 7
3,785,965 UART: [idev] UDS.KEYID = 0
3,786,912 ready_for_fw is high
3,787,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,198 UART: [idev] Erasing UDS.KEYID = 0
6,263,019 UART: [idev] Sha1 KeyId Algorithm
6,286,251 UART: [idev] --
6,291,653 UART: [ldev] ++
6,292,422 UART: [ldev] CDI.KEYID = 6
6,293,344 UART: [ldev] SUBJECT.KEYID = 5
6,294,451 UART: [ldev] AUTHORITY.KEYID = 7
6,295,630 UART: [ldev] FE.KEYID = 1
6,304,872 UART: [ldev] Erasing FE.KEYID = 1
8,787,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,443 UART: [ldev] --
10,583,630 UART: [fwproc] Wait for Commands...
10,586,259 UART: [fwproc] Recv command 0x46574c44
10,588,250 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,711 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,775 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,835 >>> mbox cmd response: success
14,554,931 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,557,933 UART: [afmc] ++
14,558,575 UART: [afmc] CDI.KEYID = 6
14,559,488 UART: [afmc] SUBJECT.KEYID = 7
14,560,704 UART: [afmc] AUTHORITY.KEYID = 5
17,066,083 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,789,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,791,923 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,807,758 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,823,785 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,370 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,151 UART: [afmc] --
18,868,350 UART: [cold-reset] --
18,870,485 UART: [state] Locking Datavault
18,876,376 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,081 UART: [state] Locking ICCM
18,879,696 UART: [exit] Launching FMC @ 0x40000130
18,888,098 UART:
18,888,341 UART: Running Caliptra FMC ...
18,889,449 UART:
18,889,614 UART: [state] CFI Enabled
18,897,501 UART: [fht] FMC Alias Private Key: 7
20,663,747 UART: [art] Extend RT PCRs Done
20,664,966 UART: [art] Lock RT PCRs Done
20,666,562 UART: [art] Populate DV Done
20,672,030 UART: [fht] FMC Alias Private Key: 7
20,673,516 UART: [art] Derive CDI
20,674,280 UART: [art] Store in slot 0x4
20,716,823 UART: [art] Derive Key Pair
20,717,861 UART: [art] Store priv key in slot 0x5
23,144,489 UART: [art] Derive Key Pair - Done
23,157,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,043 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,548 UART: [art] PUB.X = 8407A6061623E498558FDDFDE470C68B88DAE1493A8C1785CD955BC6F6F1EF29FE029045506C653526262F555EAE541C
24,872,791 UART: [art] PUB.Y = 9B75D22765A9CF673FC454563BA320B41B63B97287BD46C1D5AED3B7F202181237588AFCC18906A5F2DD04FF771A6E94
24,880,018 UART: [art] SIG.R = BBE3D5AAED9323AFF8B9C73B038ADF8DFA268F6B15E2FF3C5DEC0F49F6AA4AA315D9F98AC29D408A2F5E497B9B5CAAB5
24,887,462 UART: [art] SIG.S = D63422E179A747D0AF0DE8C59E5E5A82B91AEFE0DD3ED710535FCC22BF7973BEB5D8B20B151E259C6E9970491E82BEEA
25,866,422 UART: Caliptra RT
25,867,108 UART: [state] CFI Enabled
25,999,735 UART: [rt] RT listening for mailbox commands...
26,031,700 UART: [rt]cmd =0x44504543, len=92
30,317,856 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,776,542 ready_for_fw is high
3,776,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,701 >>> mbox cmd response: success
14,447,902 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,697,062 UART:
18,697,452 UART: Running Caliptra FMC ...
18,698,589 UART:
18,698,752 UART: [state] CFI Enabled
18,706,850 UART: [fht] FMC Alias Private Key: 7
20,473,209 UART: [art] Extend RT PCRs Done
20,474,424 UART: [art] Lock RT PCRs Done
20,476,346 UART: [art] Populate DV Done
20,482,032 UART: [fht] FMC Alias Private Key: 7
20,483,632 UART: [art] Derive CDI
20,484,391 UART: [art] Store in slot 0x4
20,526,988 UART: [art] Derive Key Pair
20,527,992 UART: [art] Store priv key in slot 0x5
22,954,565 UART: [art] Derive Key Pair - Done
22,967,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,870 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,373 UART: [art] PUB.X = 150776DC8383CD73378BB7B2A9861B14B3F3448DBE2EAD9F1E0D04D8FF312B2A3F25584F7BF8D65FA284D904C2C2F984
24,682,689 UART: [art] PUB.Y = 9D140A082C5BDAB3FF51675A6D4A20A086279AAD5D58A6FF406E0A8EC14818EF93678B4CF374E2913FA08B4EBB6CF56C
24,689,936 UART: [art] SIG.R = F23CD31EE3DF3D12D28D164162987CAB68A9F09A8321F830207AD6C67E75402EDFFBC1AF2D18B3AA88DA28D4FB03B646
24,697,390 UART: [art] SIG.S = A8ECD4DF7E9EF0C30CA4E470EFC8CEA55E829DCE447437794732E22C377C8188A6CE2D2436D2F3589A086E71C1E9E9F5
25,676,170 UART: Caliptra RT
25,676,860 UART: [state] CFI Enabled
25,809,899 UART: [rt] RT listening for mailbox commands...
25,842,165 UART: [rt]cmd =0x44504543, len=92
30,128,140 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,086 UART:
192,453 UART: Running Caliptra ROM ...
193,637 UART:
193,789 UART: [state] CFI Enabled
266,415 UART: [state] LifecycleState = Unprovisioned
269,017 UART: [state] DebugLocked = No
271,553 UART: [state] WD Timer not started. Device not locked for debugging
275,730 UART: [kat] SHA2-256
465,648 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,372 UART: [kat] ++
476,839 UART: [kat] sha1
487,642 UART: [kat] SHA2-256
490,710 UART: [kat] SHA2-384
496,553 UART: [kat] SHA2-512-ACC
499,136 UART: [kat] ECC-384
2,950,465 UART: [kat] HMAC-384Kdf
2,972,164 UART: [kat] LMS
3,503,889 UART: [kat] --
3,508,600 UART: [cold-reset] ++
3,510,821 UART: [fht] FHT @ 0x50003400
3,522,443 UART: [idev] ++
3,523,157 UART: [idev] CDI.KEYID = 6
3,524,064 UART: [idev] SUBJECT.KEYID = 7
3,525,241 UART: [idev] UDS.KEYID = 0
3,526,326 ready_for_fw is high
3,526,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,609 UART: [idev] Erasing UDS.KEYID = 0
6,029,990 UART: [idev] Sha1 KeyId Algorithm
6,052,823 UART: [idev] --
6,059,406 UART: [ldev] ++
6,060,085 UART: [ldev] CDI.KEYID = 6
6,061,002 UART: [ldev] SUBJECT.KEYID = 5
6,062,165 UART: [ldev] AUTHORITY.KEYID = 7
6,063,395 UART: [ldev] FE.KEYID = 1
6,100,021 UART: [ldev] Erasing FE.KEYID = 1
8,605,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,958 UART: [ldev] --
10,416,921 UART: [fwproc] Wait for Commands...
10,419,577 UART: [fwproc] Recv command 0x46574c44
10,421,886 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,854 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,481 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,218 >>> mbox cmd response: success
14,673,827 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,676,575 UART: [afmc] ++
14,677,263 UART: [afmc] CDI.KEYID = 6
14,678,495 UART: [afmc] SUBJECT.KEYID = 7
14,679,918 UART: [afmc] AUTHORITY.KEYID = 5
17,215,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,315 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,234 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,346 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,492 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,388 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,280 UART: [afmc] --
19,012,729 UART: [cold-reset] --
19,015,996 UART: [state] Locking Datavault
19,020,658 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,793 UART: [state] Locking ICCM
19,025,587 UART: [exit] Launching FMC @ 0x40000130
19,034,253 UART:
19,034,487 UART: Running Caliptra FMC ...
19,035,585 UART:
19,035,750 UART: [state] CFI Enabled
19,097,293 UART: [fht] FMC Alias Private Key: 7
20,863,981 UART: [art] Extend RT PCRs Done
20,865,201 UART: [art] Lock RT PCRs Done
20,866,826 UART: [art] Populate DV Done
20,872,179 UART: [fht] FMC Alias Private Key: 7
20,873,839 UART: [art] Derive CDI
20,874,649 UART: [art] Store in slot 0x4
20,930,157 UART: [art] Derive Key Pair
20,931,195 UART: [art] Store priv key in slot 0x5
23,394,185 UART: [art] Derive Key Pair - Done
23,406,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,310 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,826 UART: [art] PUB.X = 0516493F3635563AFC850F3FB454BCAC69729CEB595799E7A90EEFE0C3D4853D12DF4DE133106477288BA2721ACCBCF0
25,129,108 UART: [art] PUB.Y = DAB01BD81DC6421A7A0B1C2CAAB8639773A54652FB7961846AB52E49F932599859B41913F10E0239B0784C1C448CB3E2
25,136,359 UART: [art] SIG.R = 8EB698401987AE59156115CF7A589B393F057A89418BC0458405378436D96C81761B991B46A5BA19E48F96AEA36A19EB
25,143,716 UART: [art] SIG.S = 6C7C482E13DC225736945C08056E3D152E7C01283892B8ED8D7443F56A7A67BC025452306DEB0118CD9BC699B2EA0151
26,122,510 UART: Caliptra RT
26,123,214 UART: [state] CFI Enabled
26,304,534 UART: [rt] RT listening for mailbox commands...
26,336,434 UART: [rt]cmd =0x44504543, len=92
30,682,325 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,438,791 ready_for_fw is high
3,439,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,281 >>> mbox cmd response: success
14,819,922 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,130,411 UART:
19,130,816 UART: Running Caliptra FMC ...
19,131,953 UART:
19,132,111 UART: [state] CFI Enabled
19,198,862 UART: [fht] FMC Alias Private Key: 7
20,965,970 UART: [art] Extend RT PCRs Done
20,967,186 UART: [art] Lock RT PCRs Done
20,968,811 UART: [art] Populate DV Done
20,974,124 UART: [fht] FMC Alias Private Key: 7
20,975,663 UART: [art] Derive CDI
20,976,478 UART: [art] Store in slot 0x4
21,031,929 UART: [art] Derive Key Pair
21,032,974 UART: [art] Store priv key in slot 0x5
23,495,418 UART: [art] Derive Key Pair - Done
23,508,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,726 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,220 UART: [art] PUB.X = 01DED27375375A0E2F1F3214EE32E5DC37E81533E0DC52D554D8B8A13A12F846C59FDCFDB43820FA0FA7BAEEE7443917
25,230,550 UART: [art] PUB.Y = 8DDE79D75BB394A1605327D473BD644C6EF08CE59D77F313C86177F7BAA5210087AFBA786D112CBB4EBA933A6313560A
25,237,746 UART: [art] SIG.R = 1735DD5AFCC50867FA2F6C91FEC8D7286AD310B110F71EFD9AA13EC6F3F5E63DFE0F05C8B57301522BFDBF974169EDE2
25,245,201 UART: [art] SIG.S = D0E68BD2720FC406614B15FA42EABB0054FC00885CF3B48928C1A9203D4AFF4A9B89FD2FF28F9566C62F17636CD82D1C
26,224,544 UART: Caliptra RT
26,225,260 UART: [state] CFI Enabled
26,406,983 UART: [rt] RT listening for mailbox commands...
26,439,052 UART: [rt]cmd =0x44504543, len=92
30,783,175 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
192,641 UART:
193,005 UART: Running Caliptra ROM ...
194,213 UART:
603,801 UART: [state] CFI Enabled
614,567 UART: [state] LifecycleState = Unprovisioned
616,952 UART: [state] DebugLocked = No
619,695 UART: [state] WD Timer not started. Device not locked for debugging
624,056 UART: [kat] SHA2-256
813,918 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,729 UART: [kat] ++
825,253 UART: [kat] sha1
837,351 UART: [kat] SHA2-256
840,360 UART: [kat] SHA2-384
845,076 UART: [kat] SHA2-512-ACC
847,673 UART: [kat] ECC-384
3,287,217 UART: [kat] HMAC-384Kdf
3,300,316 UART: [kat] LMS
3,832,127 UART: [kat] --
3,836,123 UART: [cold-reset] ++
3,838,127 UART: [fht] FHT @ 0x50003400
3,850,806 UART: [idev] ++
3,851,520 UART: [idev] CDI.KEYID = 6
3,852,403 UART: [idev] SUBJECT.KEYID = 7
3,853,649 UART: [idev] UDS.KEYID = 0
3,854,556 ready_for_fw is high
3,854,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,968 UART: [idev] Erasing UDS.KEYID = 0
6,328,315 UART: [idev] Sha1 KeyId Algorithm
6,350,308 UART: [idev] --
6,354,684 UART: [ldev] ++
6,355,363 UART: [ldev] CDI.KEYID = 6
6,356,294 UART: [ldev] SUBJECT.KEYID = 5
6,357,457 UART: [ldev] AUTHORITY.KEYID = 7
6,358,691 UART: [ldev] FE.KEYID = 1
6,368,639 UART: [ldev] Erasing FE.KEYID = 1
8,853,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,976 UART: [ldev] --
10,644,955 UART: [fwproc] Wait for Commands...
10,648,022 UART: [fwproc] Recv command 0x46574c44
10,650,357 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,798 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,103 >>> mbox cmd response: success
14,909,667 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,912,414 UART: [afmc] ++
14,913,110 UART: [afmc] CDI.KEYID = 6
14,914,356 UART: [afmc] SUBJECT.KEYID = 7
14,915,795 UART: [afmc] AUTHORITY.KEYID = 5
17,422,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,666 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,753 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,891 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,838 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,106 UART: [afmc] --
19,217,601 UART: [cold-reset] --
19,220,823 UART: [state] Locking Datavault
19,223,652 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,800 UART: [state] Locking ICCM
19,227,477 UART: [exit] Launching FMC @ 0x40000130
19,236,156 UART:
19,236,394 UART: Running Caliptra FMC ...
19,237,500 UART:
19,237,659 UART: [state] CFI Enabled
19,245,471 UART: [fht] FMC Alias Private Key: 7
21,012,029 UART: [art] Extend RT PCRs Done
21,013,255 UART: [art] Lock RT PCRs Done
21,014,889 UART: [art] Populate DV Done
21,020,415 UART: [fht] FMC Alias Private Key: 7
21,022,128 UART: [art] Derive CDI
21,022,973 UART: [art] Store in slot 0x4
21,065,889 UART: [art] Derive Key Pair
21,066,913 UART: [art] Store priv key in slot 0x5
23,493,811 UART: [art] Derive Key Pair - Done
23,506,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,439 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,960 UART: [art] PUB.X = 6E3C8375BE76930CB21F8341468C352D518B39FF0E1A1D2299B752B7CB0D1484B6ED26BC6EC201926EF13004F0C97FB4
25,222,177 UART: [art] PUB.Y = 3A15C11EDC781FAE0CC78651E673F7AB456F78D86A89783CDD4539536BE7E93489273F9CE87D90F46881E55AB3120877
25,229,431 UART: [art] SIG.R = 0B64D66161234D3421D8A767C6DBA0512E6287E07F2D676E7297CA9311CB4793D9E002EFAC948D5E5387309AB7AACE5B
25,236,849 UART: [art] SIG.S = 97904407E723B69F2E5586FC946D83C3205D53B5FE63002042C020C0D4B88AAB03F9E8F16DBF1C05C4F2FC4894C0D612
26,215,565 UART: Caliptra RT
26,216,256 UART: [state] CFI Enabled
26,348,774 UART: [rt] RT listening for mailbox commands...
26,380,941 UART: [rt]cmd =0x44504543, len=92
30,667,930 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
3,758,472 ready_for_fw is high
3,758,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,275 >>> mbox cmd response: success
15,051,006 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,299,757 UART:
19,300,159 UART: Running Caliptra FMC ...
19,301,277 UART:
19,301,439 UART: [state] CFI Enabled
19,309,622 UART: [fht] FMC Alias Private Key: 7
21,074,947 UART: [art] Extend RT PCRs Done
21,076,186 UART: [art] Lock RT PCRs Done
21,077,904 UART: [art] Populate DV Done
21,083,404 UART: [fht] FMC Alias Private Key: 7
21,084,957 UART: [art] Derive CDI
21,085,703 UART: [art] Store in slot 0x4
21,128,358 UART: [art] Derive Key Pair
21,129,361 UART: [art] Store priv key in slot 0x5
23,555,800 UART: [art] Derive Key Pair - Done
23,568,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,274,816 UART: [art] Erasing AUTHORITY.KEYID = 7
25,276,336 UART: [art] PUB.X = DDC739EF9F00212370ED9A7DA6AFDCE0C13D0EBC40CDBE0A924A650BEEE7D4B8E5D17D37A9EF7A7D5991631C876E0B30
25,283,595 UART: [art] PUB.Y = 88C664CDDCFA17210E1FC64E5451208EBEBAA01242FA3625489AA13DDBC1F476F608A2CA0F96BB3E8C0C3330275FD709
25,290,847 UART: [art] SIG.R = ADC4A8AD047B0483FB0CB8A6B3C3001E468D347D99611489AFC904FAD813B788F3F1B7B6FA042989E55D0C0ED9C736BB
25,298,192 UART: [art] SIG.S = 171BB3C7B40A9FD06C52162AEBC4F9AA2A401A091CE147B848B9A6C06DDEF5709242674F95D9C968098B9B6608045721
26,277,091 UART: Caliptra RT
26,277,809 UART: [state] CFI Enabled
26,411,018 UART: [rt] RT listening for mailbox commands...
26,442,708 UART: [rt]cmd =0x44504543, len=92
30,728,739 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,969 UART: [kat] SHA2-256
881,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,015 UART: [kat] ++
886,167 UART: [kat] sha1
890,505 UART: [kat] SHA2-256
892,443 UART: [kat] SHA2-384
895,182 UART: [kat] SHA2-512-ACC
897,083 UART: [kat] ECC-384
902,658 UART: [kat] HMAC-384Kdf
907,396 UART: [kat] LMS
1,475,592 UART: [kat] --
1,476,421 UART: [cold-reset] ++
1,476,789 UART: [fht] Storing FHT @ 0x50003400
1,479,668 UART: [idev] ++
1,479,836 UART: [idev] CDI.KEYID = 6
1,480,196 UART: [idev] SUBJECT.KEYID = 7
1,480,620 UART: [idev] UDS.KEYID = 0
1,480,965 ready_for_fw is high
1,480,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,088 UART: [idev] Erasing UDS.KEYID = 0
1,506,122 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,796 UART: [idev] --
1,515,887 UART: [ldev] ++
1,516,055 UART: [ldev] CDI.KEYID = 6
1,516,418 UART: [ldev] SUBJECT.KEYID = 5
1,516,844 UART: [ldev] AUTHORITY.KEYID = 7
1,517,307 UART: [ldev] FE.KEYID = 1
1,522,583 UART: [ldev] Erasing FE.KEYID = 1
1,548,128 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,100 UART: [ldev] --
1,587,545 UART: [fwproc] Waiting for Commands...
1,588,304 UART: [fwproc] Received command 0x46574c44
1,589,095 UART: [fwproc] Received Image of size 118548 bytes
2,932,911 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,541 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,759 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,060 >>> mbox cmd response: success
3,131,060 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,132,162 UART: [afmc] ++
3,132,330 UART: [afmc] CDI.KEYID = 6
3,132,692 UART: [afmc] SUBJECT.KEYID = 7
3,133,117 UART: [afmc] AUTHORITY.KEYID = 5
3,167,432 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,796 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,576 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,285 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,168 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,851 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,655 UART: [afmc] --
3,210,609 UART: [cold-reset] --
3,211,313 UART: [state] Locking Datavault
3,212,528 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,132 UART: [state] Locking ICCM
3,213,574 UART: [exit] Launching FMC @ 0x40000130
3,218,904 UART:
3,218,920 UART: Running Caliptra FMC ...
3,219,328 UART:
3,219,382 UART: [state] CFI Enabled
3,229,670 UART: [fht] FMC Alias Private Key: 7
3,348,158 UART: [art] Extend RT PCRs Done
3,348,586 UART: [art] Lock RT PCRs Done
3,350,138 UART: [art] Populate DV Done
3,358,329 UART: [fht] FMC Alias Private Key: 7
3,359,463 UART: [art] Derive CDI
3,359,743 UART: [art] Store in slot 0x4
3,445,105 UART: [art] Derive Key Pair
3,445,465 UART: [art] Store priv key in slot 0x5
3,458,352 UART: [art] Derive Key Pair - Done
3,472,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,267 UART: [art] PUB.X = 2228D4E01112E73195970652EDA9049415A964F2CE2E0C01BE042FF0FF766A8D329208BA8973837F597CDACA2D5139F0
3,496,017 UART: [art] PUB.Y = 18CEF48E8BF621B10EDC349E81A732128A770726F8227E88E85EE9CBF4C8E39900223A8F04633289A93E2640FD6F7ABC
3,502,940 UART: [art] SIG.R = 812DBAA77464D91EF6C203D3585E168E28A0F2C94F70CE6492AED9C4D8C2AC424DB1905910F756098C00016B485F3A14
3,509,681 UART: [art] SIG.S = A30A1DE7C646E827DAEA0032275ADDE3F2EDF1F8D55CD5F8D3B511AB1EB0771BD0CFF098F00FDE838AB25204CB143F97
3,532,926 UART: Caliptra RT
3,533,177 UART: [state] CFI Enabled
3,653,712 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,054 UART: [rt]cmd =0x44504543, len=92
3,868,883 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,499 ready_for_fw is high
1,362,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,688 >>> mbox cmd response: success
2,981,688 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,043,125 UART:
3,043,141 UART: Running Caliptra FMC ...
3,043,549 UART:
3,043,603 UART: [state] CFI Enabled
3,053,911 UART: [fht] FMC Alias Private Key: 7
3,173,375 UART: [art] Extend RT PCRs Done
3,173,803 UART: [art] Lock RT PCRs Done
3,175,393 UART: [art] Populate DV Done
3,183,530 UART: [fht] FMC Alias Private Key: 7
3,184,586 UART: [art] Derive CDI
3,184,866 UART: [art] Store in slot 0x4
3,270,718 UART: [art] Derive Key Pair
3,271,078 UART: [art] Store priv key in slot 0x5
3,284,539 UART: [art] Derive Key Pair - Done
3,299,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,291 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,056 UART: [art] PUB.X = 647D5F66545FFA718C93662678B959CC7FC039F5FFC1D6F96739FDD1D5B397869BA86F612508BA889824879FDC82DB9D
3,322,827 UART: [art] PUB.Y = 86C2295CC4F4ED44800EE4D4F906EF88E95AEC0F57040B2B471420C6B89652894173692FA48FB5737457672D02AD91B0
3,329,755 UART: [art] SIG.R = D67B4043A9F80EFA5184EFC96521868E86094F606F4C7353E69115F873E9DE764D618255A00388559E2F9B00A52DEF00
3,336,466 UART: [art] SIG.S = 1F76F088BAD3E1D46DA50046D3D4B1F8E3F13F24DF3195FA2CBF2841DB83EE01462AFB464C25461F7040BB1D567D235C
3,360,543 UART: Caliptra RT
3,360,794 UART: [state] CFI Enabled
3,480,622 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,640 UART: [rt]cmd =0x44504543, len=92
3,695,284 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,210 UART: [kat] SHA2-256
882,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,256 UART: [kat] ++
886,408 UART: [kat] sha1
890,562 UART: [kat] SHA2-256
892,500 UART: [kat] SHA2-384
895,129 UART: [kat] SHA2-512-ACC
897,030 UART: [kat] ECC-384
902,777 UART: [kat] HMAC-384Kdf
907,377 UART: [kat] LMS
1,475,573 UART: [kat] --
1,476,456 UART: [cold-reset] ++
1,476,852 UART: [fht] Storing FHT @ 0x50003400
1,479,585 UART: [idev] ++
1,479,753 UART: [idev] CDI.KEYID = 6
1,480,113 UART: [idev] SUBJECT.KEYID = 7
1,480,537 UART: [idev] UDS.KEYID = 0
1,480,882 ready_for_fw is high
1,480,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,573 UART: [idev] Erasing UDS.KEYID = 0
1,504,745 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,443 UART: [idev] --
1,514,304 UART: [ldev] ++
1,514,472 UART: [ldev] CDI.KEYID = 6
1,514,835 UART: [ldev] SUBJECT.KEYID = 5
1,515,261 UART: [ldev] AUTHORITY.KEYID = 7
1,515,724 UART: [ldev] FE.KEYID = 1
1,521,358 UART: [ldev] Erasing FE.KEYID = 1
1,546,713 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,475 UART: [ldev] --
1,585,932 UART: [fwproc] Waiting for Commands...
1,586,773 UART: [fwproc] Received command 0x46574c44
1,587,564 UART: [fwproc] Received Image of size 118548 bytes
2,932,966 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,140 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,358 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,609 >>> mbox cmd response: success
3,131,609 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,132,689 UART: [afmc] ++
3,132,857 UART: [afmc] CDI.KEYID = 6
3,133,219 UART: [afmc] SUBJECT.KEYID = 7
3,133,644 UART: [afmc] AUTHORITY.KEYID = 5
3,168,509 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,009 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,789 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,498 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,381 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,064 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,718 UART: [afmc] --
3,211,660 UART: [cold-reset] --
3,212,656 UART: [state] Locking Datavault
3,213,659 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,263 UART: [state] Locking ICCM
3,214,755 UART: [exit] Launching FMC @ 0x40000130
3,220,085 UART:
3,220,101 UART: Running Caliptra FMC ...
3,220,509 UART:
3,220,652 UART: [state] CFI Enabled
3,231,742 UART: [fht] FMC Alias Private Key: 7
3,350,828 UART: [art] Extend RT PCRs Done
3,351,256 UART: [art] Lock RT PCRs Done
3,352,916 UART: [art] Populate DV Done
3,360,967 UART: [fht] FMC Alias Private Key: 7
3,362,087 UART: [art] Derive CDI
3,362,367 UART: [art] Store in slot 0x4
3,448,001 UART: [art] Derive Key Pair
3,448,361 UART: [art] Store priv key in slot 0x5
3,462,164 UART: [art] Derive Key Pair - Done
3,476,974 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,756 UART: [art] PUB.X = 2B0022A078C549E996B6FAB90F240752482C588EBFB2640913DE17B9D88A8444DA0527531F5828CCE820D20FD04A843C
3,499,487 UART: [art] PUB.Y = 72993FC478D1A460ACB06F08D43FB6A451FFB5682BCF7889C7834EB3903F9B4F1621DBAB9F17A114E4B581C9DCF63EF6
3,506,448 UART: [art] SIG.R = F555F6DEE64B4FCA30B7062823531B34B047259C6E382271B97AD17101280945DA691C2A228A5E52A3D7936009DE69A5
3,513,200 UART: [art] SIG.S = 9EA05BDE24942D26E78B23F0AAFE02B42C8D88CE69B0C1C650388A1CA98818B61B954BF4A97DCD4AA6F904A2570DC1BD
3,537,301 UART: Caliptra RT
3,537,644 UART: [state] CFI Enabled
3,658,141 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,989 UART: [rt]cmd =0x44504543, len=92
3,873,984 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,868 ready_for_fw is high
1,362,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,605 >>> mbox cmd response: success
2,981,605 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,043,834 UART:
3,043,850 UART: Running Caliptra FMC ...
3,044,258 UART:
3,044,401 UART: [state] CFI Enabled
3,054,905 UART: [fht] FMC Alias Private Key: 7
3,174,173 UART: [art] Extend RT PCRs Done
3,174,601 UART: [art] Lock RT PCRs Done
3,176,219 UART: [art] Populate DV Done
3,184,592 UART: [fht] FMC Alias Private Key: 7
3,185,718 UART: [art] Derive CDI
3,185,998 UART: [art] Store in slot 0x4
3,271,556 UART: [art] Derive Key Pair
3,271,916 UART: [art] Store priv key in slot 0x5
3,285,335 UART: [art] Derive Key Pair - Done
3,300,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,396 UART: [art] PUB.X = 0FC63FBB5E73FC3EB0FB6C5741E70F62F9C7FD3B3652EF3397CC23E31C04CD50D3BBCE2B0FDC28ADC5F0CA89A48C5000
3,323,160 UART: [art] PUB.Y = 477DA2D9E1AEFEC69388007613E12AE41465CA6827661EF2EA9A2406A2522F85B7B02478594C55105D8663DA0890B778
3,330,076 UART: [art] SIG.R = BE3F89E3F591771BD2D8E24AD35237751BC5F24B52F05B28FB705668309DE48F3F6CC101336BD4EA9B7FCE46CDF2FC99
3,336,857 UART: [art] SIG.S = F2E8C12BA32814EB2A03D67654FBA9D28E57436538A5252B9F04F5D48F806729429428035F5A9A86A1EE432C188530CC
3,360,220 UART: Caliptra RT
3,360,563 UART: [state] CFI Enabled
3,481,760 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,116 UART: [rt]cmd =0x44504543, len=92
3,697,910 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,475 UART: [kat] SHA2-512-ACC
906,376 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,747 UART: [kat] LMS
1,169,059 UART: [kat] --
1,169,824 UART: [cold-reset] ++
1,170,282 UART: [fht] FHT @ 0x50003400
1,172,918 UART: [idev] ++
1,173,086 UART: [idev] CDI.KEYID = 6
1,173,447 UART: [idev] SUBJECT.KEYID = 7
1,173,872 UART: [idev] UDS.KEYID = 0
1,174,218 ready_for_fw is high
1,174,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,605 UART: [idev] Erasing UDS.KEYID = 0
1,198,497 UART: [idev] Sha1 KeyId Algorithm
1,207,359 UART: [idev] --
1,208,536 UART: [ldev] ++
1,208,704 UART: [ldev] CDI.KEYID = 6
1,209,068 UART: [ldev] SUBJECT.KEYID = 5
1,209,495 UART: [ldev] AUTHORITY.KEYID = 7
1,209,958 UART: [ldev] FE.KEYID = 1
1,215,034 UART: [ldev] Erasing FE.KEYID = 1
1,241,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,988 UART: [ldev] --
1,280,417 UART: [fwproc] Wait for Commands...
1,280,996 UART: [fwproc] Recv command 0x46574c44
1,281,729 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,339 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,514 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,751 >>> mbox cmd response: success
2,824,751 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,825,807 UART: [afmc] ++
2,825,975 UART: [afmc] CDI.KEYID = 6
2,826,338 UART: [afmc] SUBJECT.KEYID = 7
2,826,764 UART: [afmc] AUTHORITY.KEYID = 5
2,861,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,211 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,921 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,802 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,503 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,216 UART: [afmc] --
2,904,063 UART: [cold-reset] --
2,904,843 UART: [state] Locking Datavault
2,906,166 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,770 UART: [state] Locking ICCM
2,907,444 UART: [exit] Launching FMC @ 0x40000130
2,912,774 UART:
2,912,790 UART: Running Caliptra FMC ...
2,913,198 UART:
2,913,252 UART: [state] CFI Enabled
2,923,696 UART: [fht] FMC Alias Private Key: 7
3,042,538 UART: [art] Extend RT PCRs Done
3,042,966 UART: [art] Lock RT PCRs Done
3,044,452 UART: [art] Populate DV Done
3,052,557 UART: [fht] FMC Alias Private Key: 7
3,053,735 UART: [art] Derive CDI
3,054,015 UART: [art] Store in slot 0x4
3,139,720 UART: [art] Derive Key Pair
3,140,080 UART: [art] Store priv key in slot 0x5
3,153,668 UART: [art] Derive Key Pair - Done
3,168,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,498 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,263 UART: [art] PUB.X = CBE69B155784BF69B6CF3AC7111219DDE780F7D9E08F7F536F786535A8236AAA34D290B3E8BD774F32F99CC0BE45623D
3,191,043 UART: [art] PUB.Y = 9A4B1CFEB680267B6A66AF49469C465E749C62D2AEA2A6E2565A873FC5E74B31A1A2B6B7AF805E86AAA6A8D4FC460C19
3,198,006 UART: [art] SIG.R = BBFC48407BE3034D4DFA0ABCC97C12BD36BBF4F593DD445BC3BABDFC316BF4194A1C7AA0F4F932DD98FE1B8EC6C4FF73
3,204,806 UART: [art] SIG.S = F8F9D65B2B44D4F9CC166DA8F1815E788CDF0108BE76CB68F1A2334B3624E0C3358D959BD7B05117A3990EBCF157C949
3,227,795 UART: Caliptra RT
3,228,046 UART: [state] CFI Enabled
3,347,120 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,182 UART: [rt]cmd =0x44504543, len=92
3,562,368 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,034 ready_for_fw is high
1,059,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,724 >>> mbox cmd response: success
2,677,724 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,740,319 UART:
2,740,335 UART: Running Caliptra FMC ...
2,740,743 UART:
2,740,797 UART: [state] CFI Enabled
2,751,291 UART: [fht] FMC Alias Private Key: 7
2,869,389 UART: [art] Extend RT PCRs Done
2,869,817 UART: [art] Lock RT PCRs Done
2,871,203 UART: [art] Populate DV Done
2,879,232 UART: [fht] FMC Alias Private Key: 7
2,880,386 UART: [art] Derive CDI
2,880,666 UART: [art] Store in slot 0x4
2,966,487 UART: [art] Derive Key Pair
2,966,847 UART: [art] Store priv key in slot 0x5
2,979,569 UART: [art] Derive Key Pair - Done
2,994,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,945 UART: [art] PUB.X = 17CFDEB8A2279212636FAC44CCD800BA71B5B6559D7BE3728E7B3721B96DBAC315ED65B944C77C2214D253DF228FCA2B
3,016,707 UART: [art] PUB.Y = 2994E552800526686DB8738A93417B14869B9E285D969A8DA911CBF2D640EDA186C36D3D5DD0DAC5CD0287E71467FB0F
3,023,650 UART: [art] SIG.R = BBED14FB43F9E4DD65FF59446B3B8E1DCF089B4F018B4CF84C575859E10890EAA19872B7D37FB7BD879323DB4B42CFD2
3,030,429 UART: [art] SIG.S = D46886D7640E7853E4803644440764693D7DDF0E237ACD1A5AF01F31DE9714DF25A99B83663E3FCCAD95156A05BC6DBE
3,054,665 UART: Caliptra RT
3,054,916 UART: [state] CFI Enabled
3,175,140 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,280 UART: [rt]cmd =0x44504543, len=92
3,390,329 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
87,102 UART: [state] WD Timer not started. Device not locked for debugging
88,301 UART: [kat] SHA2-256
891,851 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,955 UART: [kat] ++
896,107 UART: [kat] sha1
900,395 UART: [kat] SHA2-256
902,335 UART: [kat] SHA2-384
905,054 UART: [kat] SHA2-512-ACC
906,955 UART: [kat] ECC-384
916,570 UART: [kat] HMAC-384Kdf
921,290 UART: [kat] LMS
1,169,602 UART: [kat] --
1,170,483 UART: [cold-reset] ++
1,170,977 UART: [fht] FHT @ 0x50003400
1,173,707 UART: [idev] ++
1,173,875 UART: [idev] CDI.KEYID = 6
1,174,236 UART: [idev] SUBJECT.KEYID = 7
1,174,661 UART: [idev] UDS.KEYID = 0
1,175,007 ready_for_fw is high
1,175,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,199,528 UART: [idev] Sha1 KeyId Algorithm
1,208,560 UART: [idev] --
1,209,607 UART: [ldev] ++
1,209,775 UART: [ldev] CDI.KEYID = 6
1,210,139 UART: [ldev] SUBJECT.KEYID = 5
1,210,566 UART: [ldev] AUTHORITY.KEYID = 7
1,211,029 UART: [ldev] FE.KEYID = 1
1,216,267 UART: [ldev] Erasing FE.KEYID = 1
1,242,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,987 UART: [ldev] --
1,281,432 UART: [fwproc] Wait for Commands...
1,282,033 UART: [fwproc] Recv command 0x46574c44
1,282,766 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,236 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,411 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,706 >>> mbox cmd response: success
2,825,706 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,826,824 UART: [afmc] ++
2,826,992 UART: [afmc] CDI.KEYID = 6
2,827,355 UART: [afmc] SUBJECT.KEYID = 7
2,827,781 UART: [afmc] AUTHORITY.KEYID = 5
2,863,750 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,348 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,058 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,939 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,640 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,429 UART: [afmc] --
2,907,460 UART: [cold-reset] --
2,908,404 UART: [state] Locking Datavault
2,909,583 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,187 UART: [state] Locking ICCM
2,910,745 UART: [exit] Launching FMC @ 0x40000130
2,916,075 UART:
2,916,091 UART: Running Caliptra FMC ...
2,916,499 UART:
2,916,642 UART: [state] CFI Enabled
2,927,244 UART: [fht] FMC Alias Private Key: 7
3,046,440 UART: [art] Extend RT PCRs Done
3,046,868 UART: [art] Lock RT PCRs Done
3,048,332 UART: [art] Populate DV Done
3,056,449 UART: [fht] FMC Alias Private Key: 7
3,057,619 UART: [art] Derive CDI
3,057,899 UART: [art] Store in slot 0x4
3,143,576 UART: [art] Derive Key Pair
3,143,936 UART: [art] Store priv key in slot 0x5
3,157,404 UART: [art] Derive Key Pair - Done
3,172,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,072 UART: [art] PUB.X = CCF0E6780D7AB6122F71B687962AAEF0D35479BA8080249CD6425F576AF34F08FC57C04EA66FA58E12222403A91318DC
3,194,837 UART: [art] PUB.Y = 4C561BC3AB03C22569A52958B60C029623DA355EDD3544218CB92DAA9C4ABD120897BB0A5EE3373C23DBD8EC01626A83
3,201,777 UART: [art] SIG.R = 38F75C105DF37861892588200948C1B866394935A65D4208E5234C2E2166EA416B18C39E6A99488C34BC19F163E84752
3,208,523 UART: [art] SIG.S = ED6C7CAD70737594C6EED10DF3D4B4CE6284B339719CC961E5283C8DE6BF759CC932EB56A893EEC903397D5B25F8A935
3,232,345 UART: Caliptra RT
3,232,688 UART: [state] CFI Enabled
3,351,877 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,745 UART: [rt]cmd =0x44504543, len=92
3,567,437 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,201 ready_for_fw is high
1,059,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,049 >>> mbox cmd response: success
2,679,049 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,741,222 UART:
2,741,238 UART: Running Caliptra FMC ...
2,741,646 UART:
2,741,789 UART: [state] CFI Enabled
2,752,405 UART: [fht] FMC Alias Private Key: 7
2,871,411 UART: [art] Extend RT PCRs Done
2,871,839 UART: [art] Lock RT PCRs Done
2,873,525 UART: [art] Populate DV Done
2,881,722 UART: [fht] FMC Alias Private Key: 7
2,882,756 UART: [art] Derive CDI
2,883,036 UART: [art] Store in slot 0x4
2,968,663 UART: [art] Derive Key Pair
2,969,023 UART: [art] Store priv key in slot 0x5
2,982,555 UART: [art] Derive Key Pair - Done
2,997,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,918 UART: [art] PUB.X = 1230DD467299F6B375C62E77A32030132503A68F3566CA137F8226ED97CFC3FC384BF2A386D400B1CFBB77378B3B4A1E
3,020,665 UART: [art] PUB.Y = EB9275D1C6AFD0EFC56726045C38A185AB480F3C6BFFF600578E303EDDDEBC5687B6B7F2549D6B7B3D9DE29E1626287A
3,027,603 UART: [art] SIG.R = DD3CF7B2FBD9FE6E7CDF34187685BF0A91E8438C17C74C8D9CF2625B8F2263D5086C5B308F991BE11206642B03B55BB3
3,034,371 UART: [art] SIG.S = 45849D0C022E431C7E45DA5AADA50848FBF0038E2AEC8A0BD2534BA7AD7852B8458CE2312D5F54CC71D91CB9F86723F9
3,058,320 UART: Caliptra RT
3,058,663 UART: [state] CFI Enabled
3,178,878 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,056 UART: [rt]cmd =0x44504543, len=92
3,394,221 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
893,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,147 UART: [kat] ++
897,299 UART: [kat] sha1
901,435 UART: [kat] SHA2-256
903,375 UART: [kat] SHA2-384
906,212 UART: [kat] SHA2-512-ACC
908,113 UART: [kat] ECC-384
917,974 UART: [kat] HMAC-384Kdf
922,674 UART: [kat] LMS
1,171,002 UART: [kat] --
1,171,833 UART: [cold-reset] ++
1,172,229 UART: [fht] FHT @ 0x50003400
1,174,994 UART: [idev] ++
1,175,162 UART: [idev] CDI.KEYID = 6
1,175,522 UART: [idev] SUBJECT.KEYID = 7
1,175,946 UART: [idev] UDS.KEYID = 0
1,176,291 ready_for_fw is high
1,176,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,336 UART: [idev] Erasing UDS.KEYID = 0
1,200,727 UART: [idev] Sha1 KeyId Algorithm
1,209,145 UART: [idev] --
1,210,293 UART: [ldev] ++
1,210,461 UART: [ldev] CDI.KEYID = 6
1,210,824 UART: [ldev] SUBJECT.KEYID = 5
1,211,250 UART: [ldev] AUTHORITY.KEYID = 7
1,211,713 UART: [ldev] FE.KEYID = 1
1,217,053 UART: [ldev] Erasing FE.KEYID = 1
1,244,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,383 UART: [ldev] --
1,283,692 UART: [fwproc] Wait for Commands...
1,284,336 UART: [fwproc] Recv command 0x46574c44
1,285,064 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,548 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,718 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,065 >>> mbox cmd response: success
2,829,065 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,830,281 UART: [afmc] ++
2,830,449 UART: [afmc] CDI.KEYID = 6
2,830,811 UART: [afmc] SUBJECT.KEYID = 7
2,831,236 UART: [afmc] AUTHORITY.KEYID = 5
2,867,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,788 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,497 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,380 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,081 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,045 UART: [afmc] --
2,911,107 UART: [cold-reset] --
2,912,073 UART: [state] Locking Datavault
2,913,226 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,830 UART: [state] Locking ICCM
2,914,374 UART: [exit] Launching FMC @ 0x40000130
2,919,704 UART:
2,919,720 UART: Running Caliptra FMC ...
2,920,128 UART:
2,920,182 UART: [state] CFI Enabled
2,930,996 UART: [fht] FMC Alias Private Key: 7
3,049,984 UART: [art] Extend RT PCRs Done
3,050,412 UART: [art] Lock RT PCRs Done
3,051,736 UART: [art] Populate DV Done
3,059,943 UART: [fht] FMC Alias Private Key: 7
3,060,879 UART: [art] Derive CDI
3,061,159 UART: [art] Store in slot 0x4
3,146,666 UART: [art] Derive Key Pair
3,147,026 UART: [art] Store priv key in slot 0x5
3,160,744 UART: [art] Derive Key Pair - Done
3,175,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,807 UART: [art] PUB.X = 765DC8258D1E9E1D93D54245BA3F60C81160B05EC946229BB78E37B42B83152EEDB0D21EBAB8180FC81F79841AE761A5
3,198,580 UART: [art] PUB.Y = 59B3BA81E9108EBD8749B84FB9AC063C7935700016619B68696BCDE620CB0FB5407AADD85B7A567F6434813C2EDA0FAC
3,205,509 UART: [art] SIG.R = 946BED295E405621D69D24AB357F1E3CDEDA3D0160024B583556DE286619D2EC2C529925834E755F30DF10E36AD1DF53
3,212,275 UART: [art] SIG.S = 219D027EB58BEEBC165AF87F895C157914336F015A71808F1425FE64FCC0859715D5047647867AF5B21F4B17DA31AA9B
3,236,572 UART: Caliptra RT
3,236,823 UART: [state] CFI Enabled
3,356,490 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,412 UART: [rt]cmd =0x44504543, len=92
3,572,102 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,091 ready_for_fw is high
1,060,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,538 >>> mbox cmd response: success
2,679,538 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,741,331 UART:
2,741,347 UART: Running Caliptra FMC ...
2,741,755 UART:
2,741,809 UART: [state] CFI Enabled
2,752,207 UART: [fht] FMC Alias Private Key: 7
2,871,701 UART: [art] Extend RT PCRs Done
2,872,129 UART: [art] Lock RT PCRs Done
2,873,369 UART: [art] Populate DV Done
2,881,478 UART: [fht] FMC Alias Private Key: 7
2,882,538 UART: [art] Derive CDI
2,882,818 UART: [art] Store in slot 0x4
2,968,501 UART: [art] Derive Key Pair
2,968,861 UART: [art] Store priv key in slot 0x5
2,981,915 UART: [art] Derive Key Pair - Done
2,997,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,299 UART: [art] PUB.X = 7718BF9549AFA84C0FCC9798E192B51D3FC0F69F470004380FAA4CACA25E04C8A3703FA46E330CFDC5E3E66ADB44B936
3,020,048 UART: [art] PUB.Y = 001E3EE6ADACAF58F55C6FD6E6679528E5225BAC3B667BFD2CB5319939D1A5F3783A810F35B93AE6489CB8B268A9A96F
3,026,987 UART: [art] SIG.R = A9C570666DD75B85568EE8FEF50773C18B2B42145E6ADE973FF89E7E7607CA7FEB8D7933F263B53B89FE75AC9FEE0CB8
3,033,764 UART: [art] SIG.S = 26DA4AB1E6503CCC1F8040040F9055CDB97751430A7B1E9D064702E86B87E06C2C40E2438046A12E519FB5D8482C6A33
3,058,017 UART: Caliptra RT
3,058,268 UART: [state] CFI Enabled
3,177,863 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,971 UART: [rt]cmd =0x44504543, len=92
3,394,010 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
893,691 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,816 UART: [kat] ++
897,968 UART: [kat] sha1
902,414 UART: [kat] SHA2-256
904,354 UART: [kat] SHA2-384
907,237 UART: [kat] SHA2-512-ACC
909,138 UART: [kat] ECC-384
918,967 UART: [kat] HMAC-384Kdf
923,681 UART: [kat] LMS
1,172,009 UART: [kat] --
1,172,890 UART: [cold-reset] ++
1,173,228 UART: [fht] FHT @ 0x50003400
1,175,989 UART: [idev] ++
1,176,157 UART: [idev] CDI.KEYID = 6
1,176,517 UART: [idev] SUBJECT.KEYID = 7
1,176,941 UART: [idev] UDS.KEYID = 0
1,177,286 ready_for_fw is high
1,177,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,877 UART: [idev] Erasing UDS.KEYID = 0
1,201,362 UART: [idev] Sha1 KeyId Algorithm
1,209,814 UART: [idev] --
1,210,968 UART: [ldev] ++
1,211,136 UART: [ldev] CDI.KEYID = 6
1,211,499 UART: [ldev] SUBJECT.KEYID = 5
1,211,925 UART: [ldev] AUTHORITY.KEYID = 7
1,212,388 UART: [ldev] FE.KEYID = 1
1,217,838 UART: [ldev] Erasing FE.KEYID = 1
1,244,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,118 UART: [ldev] --
1,283,391 UART: [fwproc] Wait for Commands...
1,284,203 UART: [fwproc] Recv command 0x46574c44
1,284,931 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,675 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,845 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,022 >>> mbox cmd response: success
2,828,022 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,829,190 UART: [afmc] ++
2,829,358 UART: [afmc] CDI.KEYID = 6
2,829,720 UART: [afmc] SUBJECT.KEYID = 7
2,830,145 UART: [afmc] AUTHORITY.KEYID = 5
2,865,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,655 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,364 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,247 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,948 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,724 UART: [afmc] --
2,908,680 UART: [cold-reset] --
2,909,392 UART: [state] Locking Datavault
2,910,615 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,219 UART: [state] Locking ICCM
2,911,789 UART: [exit] Launching FMC @ 0x40000130
2,917,119 UART:
2,917,135 UART: Running Caliptra FMC ...
2,917,543 UART:
2,917,686 UART: [state] CFI Enabled
2,928,694 UART: [fht] FMC Alias Private Key: 7
3,048,448 UART: [art] Extend RT PCRs Done
3,048,876 UART: [art] Lock RT PCRs Done
3,050,424 UART: [art] Populate DV Done
3,058,599 UART: [fht] FMC Alias Private Key: 7
3,059,723 UART: [art] Derive CDI
3,060,003 UART: [art] Store in slot 0x4
3,145,514 UART: [art] Derive Key Pair
3,145,874 UART: [art] Store priv key in slot 0x5
3,158,958 UART: [art] Derive Key Pair - Done
3,173,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,244 UART: [art] PUB.X = A8E99A06B804E2AE9F2DB87A4239A08BA08C745DC9D8945A31707174F697B0BC5DE77AC5B38F08B3172625C020490E0C
3,197,003 UART: [art] PUB.Y = 7D4E61873F14C15548356927A2DD93099A1E2B80F855BA9E91E670E0B0EA7BE0F7401C25A946C919F05D10D984EE783C
3,203,950 UART: [art] SIG.R = CCD503DD9645D439936A3811F68E028F80741A19A9915BF2F8C7CB812507C6A405C5A1CD27FC20241C5C8D9DE3E74F9C
3,210,714 UART: [art] SIG.S = 01DE4B7DCB7DC11D1D48B498E6B9483592ACC35CCF8A6DE589D8A9B82DE27A7627940D50342CF7EC4C00FB283319A37D
3,233,930 UART: Caliptra RT
3,234,273 UART: [state] CFI Enabled
3,353,556 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,638 UART: [rt]cmd =0x44504543, len=92
3,569,246 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,182 ready_for_fw is high
1,060,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,089 >>> mbox cmd response: success
2,681,089 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,743,768 UART:
2,743,784 UART: Running Caliptra FMC ...
2,744,192 UART:
2,744,335 UART: [state] CFI Enabled
2,754,979 UART: [fht] FMC Alias Private Key: 7
2,874,177 UART: [art] Extend RT PCRs Done
2,874,605 UART: [art] Lock RT PCRs Done
2,875,991 UART: [art] Populate DV Done
2,884,190 UART: [fht] FMC Alias Private Key: 7
2,885,206 UART: [art] Derive CDI
2,885,486 UART: [art] Store in slot 0x4
2,970,739 UART: [art] Derive Key Pair
2,971,099 UART: [art] Store priv key in slot 0x5
2,984,341 UART: [art] Derive Key Pair - Done
2,999,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,632 UART: [art] PUB.X = 46E636B00B3AB935A0F93304DC023AD79CBC61990A96AF3B849B4888536FBDE41487E78EB0ABCFB02D14F28A3292B9D3
3,022,400 UART: [art] PUB.Y = AC950B124E132F4C5FEF0EE47E1A9B3A63C419CD937F32252093B24E8F2E26300DF72B0FE530464CFC8D07C10A3EE1BE
3,029,346 UART: [art] SIG.R = 1A6AD0EED4A9A45B60F5095B89053162F7E1B5BBC03640034D477B7352C7753399A7525E8AC3FEA294D611228123652A
3,036,103 UART: [art] SIG.S = B1EFFF0C8AE22CE786DD8624D8BC29A5C8C8ED2156E3FC293C96126668EE057CF01CC8E1AC34C55BB0A25652655BF500
3,059,867 UART: Caliptra RT
3,060,210 UART: [state] CFI Enabled
3,179,303 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,235 UART: [rt]cmd =0x44504543, len=92
3,395,181 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,106 UART:
192,471 UART: Running Caliptra ROM ...
193,575 UART:
193,720 UART: [state] CFI Enabled
263,436 UART: [state] LifecycleState = Unprovisioned
265,416 UART: [state] DebugLocked = No
268,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,222 UART: [kat] SHA2-256
442,953 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,472 UART: [kat] ++
453,923 UART: [kat] sha1
464,298 UART: [kat] SHA2-256
466,952 UART: [kat] SHA2-384
473,725 UART: [kat] SHA2-512-ACC
476,086 UART: [kat] ECC-384
2,766,862 UART: [kat] HMAC-384Kdf
2,779,106 UART: [kat] LMS
3,969,447 UART: [kat] --
3,974,387 UART: [cold-reset] ++
3,976,891 UART: [fht] Storing FHT @ 0x50003400
3,988,051 UART: [idev] ++
3,988,622 UART: [idev] CDI.KEYID = 6
3,989,506 UART: [idev] SUBJECT.KEYID = 7
3,990,825 UART: [idev] UDS.KEYID = 0
3,991,990 ready_for_fw is high
3,992,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,100 UART: [idev] Erasing UDS.KEYID = 0
7,324,547 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,674 UART: [idev] --
7,350,151 UART: [ldev] ++
7,350,773 UART: [ldev] CDI.KEYID = 6
7,351,880 UART: [ldev] SUBJECT.KEYID = 5
7,353,005 UART: [ldev] AUTHORITY.KEYID = 7
7,354,190 UART: [ldev] FE.KEYID = 1
7,401,776 UART: [ldev] Erasing FE.KEYID = 1
10,731,475 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,381 UART: [ldev] --
13,094,565 UART: [fwproc] Waiting for Commands...
13,097,691 UART: [fwproc] Received command 0x46574c44
13,099,881 UART: [fwproc] Received Image of size 118548 bytes
17,203,856 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,173 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,350,312 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,679,384 >>> mbox cmd response: success
17,682,921 UART: [afmc] ++
17,683,545 UART: [afmc] CDI.KEYID = 6
17,684,437 UART: [afmc] SUBJECT.KEYID = 7
17,685,655 UART: [afmc] AUTHORITY.KEYID = 5
21,049,156 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,350,349 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,352,633 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,367,028 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,381,788 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,396,204 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,417,422 UART: [afmc] --
23,421,822 UART: [cold-reset] --
23,426,221 UART: [state] Locking Datavault
23,433,526 UART: [state] Locking PCR0, PCR1 and PCR31
23,435,264 UART: [state] Locking ICCM
23,437,395 UART: [exit] Launching FMC @ 0x40000130
23,445,747 UART:
23,445,979 UART: Running Caliptra FMC ...
23,447,008 UART:
23,447,163 UART: [state] CFI Enabled
23,510,974 UART: [fht] FMC Alias Private Key: 7
25,851,739 UART: [art] Extend RT PCRs Done
25,852,959 UART: [art] Lock RT PCRs Done
25,854,508 UART: [art] Populate DV Done
25,860,137 UART: [fht] FMC Alias Private Key: 7
25,861,833 UART: [art] Derive CDI
25,862,567 UART: [art] Store in slot 0x4
25,919,618 UART: [art] Derive Key Pair
25,920,658 UART: [art] Store priv key in slot 0x5
29,212,710 UART: [art] Derive Key Pair - Done
29,225,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,515,125 UART: [art] Erasing AUTHORITY.KEYID = 7
31,516,630 UART: [art] PUB.X = 3F060A354B456E6B4555095AE1E980A560EDD80480F58A87D75D76203B719437660160854B473DBFAE39345308EC04BB
31,523,895 UART: [art] PUB.Y = D0C53BEE42B420FA599A8CD55F1B4D5C2B132CCFFB0752E95FD85168B05C321991B0FD1530ADE699475B11E7E7D5A5B5
31,531,146 UART: [art] SIG.R = E9BA443044505B6C4308D77942080E0502698486640B912305A474E53D7580DB2C3795914D1314B93F1E0FB02A82A154
31,538,517 UART: [art] SIG.S = 6970B49AB63C1C9AC3ECBBC2CA8A7DB1078CE11D6BB123D2C8A062C0F66F223A86339FCCDEC5ACA17FD80D1553F07D5C
32,843,316 UART: Caliptra RT
32,844,032 UART: [state] CFI Enabled
33,019,745 UART: [rt] RT listening for mailbox commands...
33,021,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,052,140 UART: [rt]cmd =0x44504543, len=96
38,833,259 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,784,390 ready_for_fw is high
3,784,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,957,174 >>> mbox cmd response: success
23,649,853 UART:
23,650,240 UART: Running Caliptra FMC ...
23,651,439 UART:
23,651,636 UART: [state] CFI Enabled
23,718,847 UART: [fht] FMC Alias Private Key: 7
26,059,175 UART: [art] Extend RT PCRs Done
26,060,440 UART: [art] Lock RT PCRs Done
26,062,081 UART: [art] Populate DV Done
26,067,473 UART: [fht] FMC Alias Private Key: 7
26,069,177 UART: [art] Derive CDI
26,069,991 UART: [art] Store in slot 0x4
26,127,424 UART: [art] Derive Key Pair
26,128,460 UART: [art] Store priv key in slot 0x5
29,420,885 UART: [art] Derive Key Pair - Done
29,434,156 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,556 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,073 UART: [art] PUB.X = 25E3948AA9BE08C52C0C2E4A5D15F426E71A01BC1BBA05AA1CB06200CACE791D06740603900AF5B6EEBEC8B40C61D502
31,731,334 UART: [art] PUB.Y = 2AEAABBE87DDC0C6D3B8D64D7C0E04B5F2E829904DB9B1B1236020246F734F80AF3349DC3D2CEE76A86E07F192CFC901
31,738,592 UART: [art] SIG.R = 9E4C78C09F42476A3415D0610BA52CB6BECB134FC198BCC4920D9F7C246BDC5589CAE6E54613DCCA90D30AEA1BCA3E3A
31,746,076 UART: [art] SIG.S = E16812E147DFF321AD81677D06F79ECAB2C49DDC8806FA25DEC79DE023134F8211CEAC899E730BE48792E5FB8C7B0ED5
33,050,906 UART: Caliptra RT
33,051,625 UART: [state] CFI Enabled
33,227,914 UART: [rt] RT listening for mailbox commands...
33,229,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,260,392 UART: [rt]cmd =0x44504543, len=96
39,041,811 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,445 UART:
192,812 UART: Running Caliptra ROM ...
194,004 UART:
603,616 UART: [state] CFI Enabled
619,989 UART: [state] LifecycleState = Unprovisioned
621,881 UART: [state] DebugLocked = No
623,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,915 UART: [kat] SHA2-256
797,632 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,170 UART: [kat] ++
808,657 UART: [kat] sha1
818,819 UART: [kat] SHA2-256
821,533 UART: [kat] SHA2-384
827,938 UART: [kat] SHA2-512-ACC
830,296 UART: [kat] ECC-384
3,115,015 UART: [kat] HMAC-384Kdf
3,126,261 UART: [kat] LMS
4,316,414 UART: [kat] --
4,319,911 UART: [cold-reset] ++
4,321,620 UART: [fht] Storing FHT @ 0x50003400
4,333,462 UART: [idev] ++
4,334,080 UART: [idev] CDI.KEYID = 6
4,334,996 UART: [idev] SUBJECT.KEYID = 7
4,336,164 UART: [idev] UDS.KEYID = 0
4,337,120 ready_for_fw is high
4,337,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,055 UART: [idev] Erasing UDS.KEYID = 0
7,625,931 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,424 UART: [idev] --
7,653,315 UART: [ldev] ++
7,653,934 UART: [ldev] CDI.KEYID = 6
7,654,838 UART: [ldev] SUBJECT.KEYID = 5
7,656,093 UART: [ldev] AUTHORITY.KEYID = 7
7,657,268 UART: [ldev] FE.KEYID = 1
7,668,166 UART: [ldev] Erasing FE.KEYID = 1
10,954,930 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,488 UART: [ldev] --
13,316,591 UART: [fwproc] Waiting for Commands...
13,318,515 UART: [fwproc] Received command 0x46574c44
13,320,690 UART: [fwproc] Received Image of size 118548 bytes
17,415,087 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,492,125 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,565,303 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,401 >>> mbox cmd response: success
17,898,275 UART: [afmc] ++
17,898,888 UART: [afmc] CDI.KEYID = 6
17,899,796 UART: [afmc] SUBJECT.KEYID = 7
17,901,058 UART: [afmc] AUTHORITY.KEYID = 5
21,216,041 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,512,791 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,515,043 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,529,505 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,544,212 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,558,628 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,092 UART: [afmc] --
23,584,815 UART: [cold-reset] --
23,588,181 UART: [state] Locking Datavault
23,593,797 UART: [state] Locking PCR0, PCR1 and PCR31
23,595,543 UART: [state] Locking ICCM
23,596,713 UART: [exit] Launching FMC @ 0x40000130
23,605,101 UART:
23,605,339 UART: Running Caliptra FMC ...
23,606,388 UART:
23,606,536 UART: [state] CFI Enabled
23,614,764 UART: [fht] FMC Alias Private Key: 7
25,954,934 UART: [art] Extend RT PCRs Done
25,956,164 UART: [art] Lock RT PCRs Done
25,957,677 UART: [art] Populate DV Done
25,962,972 UART: [fht] FMC Alias Private Key: 7
25,964,664 UART: [art] Derive CDI
25,965,471 UART: [art] Store in slot 0x4
26,007,938 UART: [art] Derive Key Pair
26,008,976 UART: [art] Store priv key in slot 0x5
29,250,489 UART: [art] Derive Key Pair - Done
29,263,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,630 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,128 UART: [art] PUB.X = 7C3A827CC2144886519DBEDF1AE58819AAFECBE27CE29AE82AF377C6CA96280DEBEF93DA7AB90719C3A3DAD6C64731F8
31,552,378 UART: [art] PUB.Y = 1C01AF29FB187890398EE5AC9A8536841F4CEB0EB059A81D3840B6390B1B61F018999EC068899E4953DA9A7842FF9BE6
31,559,667 UART: [art] SIG.R = 346205018424B325A2FB5D128679532A5FC42E59147FEB97BB1D6C349473D5208F07DC40D7DDAA018DB15113ACB44D51
31,567,055 UART: [art] SIG.S = 345DAE749E6FCB08AEC49306020761AAA579489433939AC88D01F63E324518B0D78A937F50AE98579D1B96C41F48AA5E
32,872,265 UART: Caliptra RT
32,872,996 UART: [state] CFI Enabled
33,005,840 UART: [rt] RT listening for mailbox commands...
33,007,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,038,475 UART: [rt]cmd =0x44504543, len=96
38,721,668 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,125,683 ready_for_fw is high
4,126,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,171,125 >>> mbox cmd response: success
23,811,141 UART:
23,811,582 UART: Running Caliptra FMC ...
23,812,910 UART:
23,813,080 UART: [state] CFI Enabled
23,820,602 UART: [fht] FMC Alias Private Key: 7
26,160,449 UART: [art] Extend RT PCRs Done
26,161,680 UART: [art] Lock RT PCRs Done
26,163,358 UART: [art] Populate DV Done
26,168,933 UART: [fht] FMC Alias Private Key: 7
26,170,532 UART: [art] Derive CDI
26,171,344 UART: [art] Store in slot 0x4
26,213,939 UART: [art] Derive Key Pair
26,214,930 UART: [art] Store priv key in slot 0x5
29,456,670 UART: [art] Derive Key Pair - Done
29,469,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,450 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,962 UART: [art] PUB.X = A064BC1D01FFB7A9EA250F49B5CBE041D52CD4758F72B49E69DF3281C1A9D47F9AAD3750F9B53DEA6680B74CD7FC8266
31,758,278 UART: [art] PUB.Y = 967480538BB18E3FC694F7577AB6BA233E9D94616360BD41B8D2B417811E780C1F522B7562F677E29C675552F3A4C187
31,765,530 UART: [art] SIG.R = 1EB4BDE22AAF4BF9D2C78AF27C7EA22FC782201824D77756970ADF553533B5F74B94D94B96E4D967C3DB34CCA212E648
31,772,929 UART: [art] SIG.S = FD267A87276EEFE080BB685638FD37E9A54C949FC2608BD89C9ABC4E32AD7EF96931449A7644EC0E028EAD021E45E7C8
33,078,430 UART: Caliptra RT
33,079,148 UART: [state] CFI Enabled
33,212,874 UART: [rt] RT listening for mailbox commands...
33,214,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,245,443 UART: [rt]cmd =0x44504543, len=96
38,928,765 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,206 UART:
192,589 UART: Running Caliptra ROM ...
193,779 UART:
193,926 UART: [state] CFI Enabled
263,396 UART: [state] LifecycleState = Unprovisioned
265,373 UART: [state] DebugLocked = No
266,904 UART: [state] WD Timer not started. Device not locked for debugging
270,580 UART: [kat] SHA2-256
450,191 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,033 UART: [kat] ++
461,513 UART: [kat] sha1
471,357 UART: [kat] SHA2-256
474,026 UART: [kat] SHA2-384
479,878 UART: [kat] SHA2-512-ACC
482,310 UART: [kat] ECC-384
2,927,298 UART: [kat] HMAC-384Kdf
2,950,709 UART: [kat] LMS
3,427,218 UART: [kat] --
3,432,512 UART: [cold-reset] ++
3,434,653 UART: [fht] FHT @ 0x50003400
3,446,053 UART: [idev] ++
3,446,614 UART: [idev] CDI.KEYID = 6
3,447,590 UART: [idev] SUBJECT.KEYID = 7
3,448,843 UART: [idev] UDS.KEYID = 0
3,449,764 ready_for_fw is high
3,449,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,087 UART: [idev] Erasing UDS.KEYID = 0
5,969,325 UART: [idev] Sha1 KeyId Algorithm
5,994,174 UART: [idev] --
5,999,000 UART: [ldev] ++
5,999,575 UART: [ldev] CDI.KEYID = 6
6,000,456 UART: [ldev] SUBJECT.KEYID = 5
6,001,671 UART: [ldev] AUTHORITY.KEYID = 7
6,002,981 UART: [ldev] FE.KEYID = 1
6,037,044 UART: [ldev] Erasing FE.KEYID = 1
8,543,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,436 UART: [ldev] --
10,354,486 UART: [fwproc] Wait for Commands...
10,357,654 UART: [fwproc] Recv command 0x46574c44
10,359,628 UART: [fwproc] Recv'd Img size: 118548 bytes
13,838,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,919,317 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,992,324 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,320,150 >>> mbox cmd response: success
14,323,491 UART: [afmc] ++
14,324,119 UART: [afmc] CDI.KEYID = 6
14,325,002 UART: [afmc] SUBJECT.KEYID = 7
14,326,160 UART: [afmc] AUTHORITY.KEYID = 5
16,851,308 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,745 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,974 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,615,754 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,830 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,647,389 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,671,684 UART: [afmc] --
18,676,190 UART: [cold-reset] --
18,678,966 UART: [state] Locking Datavault
18,682,478 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,220 UART: [state] Locking ICCM
18,685,716 UART: [exit] Launching FMC @ 0x40000130
18,694,156 UART:
18,694,416 UART: Running Caliptra FMC ...
18,695,513 UART:
18,695,666 UART: [state] CFI Enabled
18,753,531 UART: [fht] FMC Alias Private Key: 7
20,520,095 UART: [art] Extend RT PCRs Done
20,521,313 UART: [art] Lock RT PCRs Done
20,522,898 UART: [art] Populate DV Done
20,528,464 UART: [fht] FMC Alias Private Key: 7
20,530,212 UART: [art] Derive CDI
20,530,944 UART: [art] Store in slot 0x4
20,586,085 UART: [art] Derive Key Pair
20,587,124 UART: [art] Store priv key in slot 0x5
23,050,053 UART: [art] Derive Key Pair - Done
23,062,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,775,460 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,951 UART: [art] PUB.X = 86D4D3E5910D4E85C6CB42EA3948B20BFB09820AB68E2E40D8208D30D5362980F8D810B25D41D99A6F98E09F22470300
24,784,239 UART: [art] PUB.Y = 6A2B1CFD0D08A956B82BDA5F7700B1B69EB4A740F35F65BEE97284C43FAE87F843E8CACEAB36D8E9CCC7F196AE188CD2
24,791,482 UART: [art] SIG.R = DF934A71C7286D213F602DCF25B1E01341A20D2E082D5A02EA3DD4C1DB71DAA4BBB6D9738E52042D647C318712366F5E
24,798,888 UART: [art] SIG.S = 9E178482606B14A16A899FEF95B0B7D32F25534513E9453A735049958C28E2300B39945A36678DE7AFF628F36DF2798B
25,777,391 UART: Caliptra RT
25,778,090 UART: [state] CFI Enabled
25,957,815 UART: [rt] RT listening for mailbox commands...
25,959,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,990,373 UART: [rt]cmd =0x44504543, len=96
30,365,954 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
3,463,520 ready_for_fw is high
3,463,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,249,298 >>> mbox cmd response: success
18,539,856 UART:
18,540,238 UART: Running Caliptra FMC ...
18,541,375 UART:
18,541,538 UART: [state] CFI Enabled
18,601,433 UART: [fht] FMC Alias Private Key: 7
20,368,570 UART: [art] Extend RT PCRs Done
20,369,791 UART: [art] Lock RT PCRs Done
20,371,361 UART: [art] Populate DV Done
20,376,984 UART: [fht] FMC Alias Private Key: 7
20,378,578 UART: [art] Derive CDI
20,379,392 UART: [art] Store in slot 0x4
20,434,745 UART: [art] Derive Key Pair
20,435,799 UART: [art] Store priv key in slot 0x5
22,898,664 UART: [art] Derive Key Pair - Done
22,911,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,432 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,927 UART: [art] PUB.X = 5AED36C2F042D9E9BDDBB431E86C086EEE526959A9A007DF520E9E47E53CDB8CB21E5FAFB0EB5D972CE013DCAD57C1D4
24,633,242 UART: [art] PUB.Y = 73B3A8DE775F6B8D357C1CBE23F915F6C8D99A80FF4AFDD0EE70E330B57B5E7A1B079665F8D55E8DAE971E9ED47B0623
24,640,546 UART: [art] SIG.R = 5AD844A3E1835826E0E9865EA2AB2175C8D2EB9026FD8188486C2BCF1AC35E3EE8D847CD78ABA11EEFB3A7CCA1B5C577
24,647,942 UART: [art] SIG.S = DA4C39786CFA962B94D6C7A14FD4E7F36C6C11B40E64D8805D62D0C32401AB72AD9A65AF4E257A89DFF54CBA976DADB4
25,626,747 UART: Caliptra RT
25,627,450 UART: [state] CFI Enabled
25,806,407 UART: [rt] RT listening for mailbox commands...
25,808,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,838,976 UART: [rt]cmd =0x44504543, len=96
30,215,223 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,386 UART:
192,753 UART: Running Caliptra ROM ...
193,941 UART:
603,752 UART: [state] CFI Enabled
619,128 UART: [state] LifecycleState = Unprovisioned
621,077 UART: [state] DebugLocked = No
623,826 UART: [state] WD Timer not started. Device not locked for debugging
627,993 UART: [kat] SHA2-256
807,615 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,412 UART: [kat] ++
818,859 UART: [kat] sha1
830,659 UART: [kat] SHA2-256
833,331 UART: [kat] SHA2-384
838,335 UART: [kat] SHA2-512-ACC
840,708 UART: [kat] ECC-384
3,283,690 UART: [kat] HMAC-384Kdf
3,296,281 UART: [kat] LMS
3,772,800 UART: [kat] --
3,778,307 UART: [cold-reset] ++
3,780,245 UART: [fht] FHT @ 0x50003400
3,791,935 UART: [idev] ++
3,792,500 UART: [idev] CDI.KEYID = 6
3,793,531 UART: [idev] SUBJECT.KEYID = 7
3,794,706 UART: [idev] UDS.KEYID = 0
3,795,634 ready_for_fw is high
3,795,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,718 UART: [idev] Erasing UDS.KEYID = 0
6,273,217 UART: [idev] Sha1 KeyId Algorithm
6,295,740 UART: [idev] --
6,302,013 UART: [ldev] ++
6,302,593 UART: [ldev] CDI.KEYID = 6
6,303,515 UART: [ldev] SUBJECT.KEYID = 5
6,304,732 UART: [ldev] AUTHORITY.KEYID = 7
6,306,120 UART: [ldev] FE.KEYID = 1
6,317,435 UART: [ldev] Erasing FE.KEYID = 1
8,796,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,309 UART: [ldev] --
10,591,411 UART: [fwproc] Wait for Commands...
10,594,646 UART: [fwproc] Recv command 0x46574c44
10,596,632 UART: [fwproc] Recv'd Img size: 118548 bytes
14,085,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,164,259 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,237,315 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,565,428 >>> mbox cmd response: success
14,569,087 UART: [afmc] ++
14,569,701 UART: [afmc] CDI.KEYID = 6
14,570,734 UART: [afmc] SUBJECT.KEYID = 7
14,571,841 UART: [afmc] AUTHORITY.KEYID = 5
17,076,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,797,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,799,252 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,815,072 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,831,152 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,846,735 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,872,068 UART: [afmc] --
18,874,946 UART: [cold-reset] --
18,879,812 UART: [state] Locking Datavault
18,885,172 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,926 UART: [state] Locking ICCM
18,888,300 UART: [exit] Launching FMC @ 0x40000130
18,896,694 UART:
18,896,928 UART: Running Caliptra FMC ...
18,897,961 UART:
18,898,111 UART: [state] CFI Enabled
18,906,217 UART: [fht] FMC Alias Private Key: 7
20,672,388 UART: [art] Extend RT PCRs Done
20,673,618 UART: [art] Lock RT PCRs Done
20,675,250 UART: [art] Populate DV Done
20,680,667 UART: [fht] FMC Alias Private Key: 7
20,682,328 UART: [art] Derive CDI
20,683,149 UART: [art] Store in slot 0x4
20,725,106 UART: [art] Derive Key Pair
20,726,164 UART: [art] Store priv key in slot 0x5
23,152,863 UART: [art] Derive Key Pair - Done
23,165,794 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,871,816 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,318 UART: [art] PUB.X = 3AE1EF04C66F9214A286AFD8E4A46F5C209DCC3B113FA76DDC84B2BD7A11A7CEC6D5B6C6CBCF96D3E21A22CCEDD7C5B2
24,880,628 UART: [art] PUB.Y = 91C61C0B89D1BABC4C5FAEBB17737D0743DFFF8CEB462974FEAB4D737D97033C5E8B49665D021840690B325805C0149B
24,887,859 UART: [art] SIG.R = 94863E5E59706E80B257C106D370AE1094EDE974AE3C1D29D1F7E5372B733408F843F25B0FC5128E9604BDF56762805A
24,895,242 UART: [art] SIG.S = D42ED51CC8832A0933BC40D44FE2689D1789410F6FA1B3B7C412CF61DAAA7C1FC5ADA30B4451041BB6563A0AF84184E2
25,874,062 UART: Caliptra RT
25,874,745 UART: [state] CFI Enabled
26,007,640 UART: [rt] RT listening for mailbox commands...
26,009,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,040,012 UART: [rt]cmd =0x44504543, len=96
30,335,196 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,784,617 ready_for_fw is high
3,785,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,712 >>> mbox cmd response: success
18,697,188 UART:
18,697,612 UART: Running Caliptra FMC ...
18,698,759 UART:
18,698,917 UART: [state] CFI Enabled
18,706,709 UART: [fht] FMC Alias Private Key: 7
20,472,706 UART: [art] Extend RT PCRs Done
20,473,927 UART: [art] Lock RT PCRs Done
20,475,556 UART: [art] Populate DV Done
20,481,092 UART: [fht] FMC Alias Private Key: 7
20,482,798 UART: [art] Derive CDI
20,483,618 UART: [art] Store in slot 0x4
20,526,505 UART: [art] Derive Key Pair
20,527,544 UART: [art] Store priv key in slot 0x5
22,954,677 UART: [art] Derive Key Pair - Done
22,967,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,358 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,859 UART: [art] PUB.X = 60C5634ACB2DE80746DA9A66903E8D5E41D34D21836500219E13D1AFE187EA0C1862EC232B7613EACC146DB3295B972F
24,683,125 UART: [art] PUB.Y = 964EE95432AE900CA75954D93E9B28A8E9B1782252FC4ADE3DA0AC9817686F72571D6B716459C46DDECEB23780418A6D
24,690,376 UART: [art] SIG.R = 87EC86EB62E0082D2B26E087807C959A9A34644D80FF19CB11CADF18DABB9C60134C055B202D225E2C96FC2A1D5C0348
24,697,788 UART: [art] SIG.S = 55C6F7E23A60D11342907DB09A0BD1F8A60783E956DEEDD5B7E6C7298A67677719B140C1BF16798E14DD629C1B99DFFA
25,677,039 UART: Caliptra RT
25,677,739 UART: [state] CFI Enabled
25,810,694 UART: [rt] RT listening for mailbox commands...
25,812,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,843,149 UART: [rt]cmd =0x44504543, len=96
30,139,959 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
192,080 UART:
192,451 UART: Running Caliptra ROM ...
193,640 UART:
193,796 UART: [state] CFI Enabled
266,420 UART: [state] LifecycleState = Unprovisioned
268,836 UART: [state] DebugLocked = No
270,085 UART: [state] WD Timer not started. Device not locked for debugging
274,981 UART: [kat] SHA2-256
464,859 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,629 UART: [kat] ++
476,130 UART: [kat] sha1
487,434 UART: [kat] SHA2-256
490,449 UART: [kat] SHA2-384
495,587 UART: [kat] SHA2-512-ACC
498,162 UART: [kat] ECC-384
2,949,466 UART: [kat] HMAC-384Kdf
2,971,563 UART: [kat] LMS
3,503,378 UART: [kat] --
3,506,894 UART: [cold-reset] ++
3,508,040 UART: [fht] FHT @ 0x50003400
3,519,600 UART: [idev] ++
3,520,305 UART: [idev] CDI.KEYID = 6
3,521,334 UART: [idev] SUBJECT.KEYID = 7
3,522,514 UART: [idev] UDS.KEYID = 0
3,523,452 ready_for_fw is high
3,523,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,800 UART: [idev] Erasing UDS.KEYID = 0
6,031,140 UART: [idev] Sha1 KeyId Algorithm
6,052,305 UART: [idev] --
6,058,295 UART: [ldev] ++
6,058,992 UART: [ldev] CDI.KEYID = 6
6,059,924 UART: [ldev] SUBJECT.KEYID = 5
6,061,106 UART: [ldev] AUTHORITY.KEYID = 7
6,062,339 UART: [ldev] FE.KEYID = 1
6,101,067 UART: [ldev] Erasing FE.KEYID = 1
8,608,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,793 UART: [ldev] --
10,415,947 UART: [fwproc] Wait for Commands...
10,418,690 UART: [fwproc] Recv command 0x46574c44
10,420,943 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,018 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,623 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,114 >>> mbox cmd response: success
14,685,690 UART: [afmc] ++
14,686,400 UART: [afmc] CDI.KEYID = 6
14,687,585 UART: [afmc] SUBJECT.KEYID = 7
14,689,073 UART: [afmc] AUTHORITY.KEYID = 5
17,229,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,953,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,954,959 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,970,062 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,985,211 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,000,133 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,022,340 UART: [afmc] --
19,026,337 UART: [cold-reset] --
19,029,507 UART: [state] Locking Datavault
19,035,897 UART: [state] Locking PCR0, PCR1 and PCR31
19,038,043 UART: [state] Locking ICCM
19,040,043 UART: [exit] Launching FMC @ 0x40000130
19,048,695 UART:
19,048,936 UART: Running Caliptra FMC ...
19,050,038 UART:
19,050,203 UART: [state] CFI Enabled
19,109,064 UART: [fht] FMC Alias Private Key: 7
20,895,747 UART: [art] Extend RT PCRs Done
20,896,984 UART: [art] Lock RT PCRs Done
20,898,773 UART: [art] Populate DV Done
20,904,022 UART: [fht] FMC Alias Private Key: 7
20,905,724 UART: [art] Derive CDI
20,906,535 UART: [art] Store in slot 0x4
20,962,869 UART: [art] Derive Key Pair
20,963,907 UART: [art] Store priv key in slot 0x5
23,426,552 UART: [art] Derive Key Pair - Done
23,439,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,152,352 UART: [art] Erasing AUTHORITY.KEYID = 7
25,153,863 UART: [art] PUB.X = 34BE4021F5844A69BF742D84A489F625CAF777BD2148DAE0696B4CCFA961052AF870088F29CF0B822A9C4BC45708595A
25,161,138 UART: [art] PUB.Y = DF136DD0E5DCA5CD28001628E94E672488CCFFAC51B64EE611979427384AC51CFE6C37F11D74C3A2594398FCC8D63A91
25,168,405 UART: [art] SIG.R = 6EB6D916EF548F2EB1A108339454FB1DA237EAE7DF52D8B77841F9D42E177CACC4B48D3B52F8DAFE2B6601E89286B11B
25,175,812 UART: [art] SIG.S = DB9C2B3322A5E33B16DE5F9E780E77A21B917A1DED6F23E851643E4706E906D94B9E52857EBAAD7E2EAE96622D1BEBD7
26,154,554 UART: Caliptra RT
26,155,267 UART: [state] CFI Enabled
26,336,791 UART: [rt] RT listening for mailbox commands...
26,338,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,369,320 UART: [rt]cmd =0x44504543, len=96
30,744,447 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,436,807 ready_for_fw is high
3,437,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,535 >>> mbox cmd response: success
19,135,995 UART:
19,136,377 UART: Running Caliptra FMC ...
19,137,491 UART:
19,137,661 UART: [state] CFI Enabled
19,203,057 UART: [fht] FMC Alias Private Key: 7
20,989,680 UART: [art] Extend RT PCRs Done
20,990,900 UART: [art] Lock RT PCRs Done
20,992,420 UART: [art] Populate DV Done
20,997,838 UART: [fht] FMC Alias Private Key: 7
20,999,547 UART: [art] Derive CDI
21,000,363 UART: [art] Store in slot 0x4
21,057,034 UART: [art] Derive Key Pair
21,058,076 UART: [art] Store priv key in slot 0x5
23,521,188 UART: [art] Derive Key Pair - Done
23,534,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,247,011 UART: [art] Erasing AUTHORITY.KEYID = 7
25,248,525 UART: [art] PUB.X = 797430B3A0C6070A7B5C78DD3EA97F65B6527685C7F26AEF0AF28451B3C9C00607C5492AEADB3B02A0E23A2D0A097364
25,255,799 UART: [art] PUB.Y = 72FDADFC2DDFB80DFD7AD3B91402FF88555990D60D295810EF322F4383900199A1FC7A4F052AEF3E4FED34FDD3A353AA
25,263,075 UART: [art] SIG.R = 693FFFEC22E54B4EB21A50FA8208A26B9EADB5C4B011A3882C66950BA5A2E143F2E48B2F097E41E075E362C00B2E2675
25,270,501 UART: [art] SIG.S = 8B7A2F65CCBBC37DCBCD01A16B7D1FA87BCDC90656857FFC2B4A8BCC15ED09EF601D3C235429202E0FB4DC4168DA2359
26,249,242 UART: Caliptra RT
26,249,956 UART: [state] CFI Enabled
26,431,866 UART: [rt] RT listening for mailbox commands...
26,433,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,464,749 UART: [rt]cmd =0x44504543, len=96
30,839,693 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,820 writing to cptra_bootfsm_go
194,122 UART:
194,474 UART: Running Caliptra ROM ...
195,571 UART:
605,244 UART: [state] CFI Enabled
619,716 UART: [state] LifecycleState = Unprovisioned
622,104 UART: [state] DebugLocked = No
624,849 UART: [state] WD Timer not started. Device not locked for debugging
630,323 UART: [kat] SHA2-256
820,187 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,994 UART: [kat] ++
831,547 UART: [kat] sha1
842,068 UART: [kat] SHA2-256
845,090 UART: [kat] SHA2-384
851,445 UART: [kat] SHA2-512-ACC
854,057 UART: [kat] ECC-384
3,296,482 UART: [kat] HMAC-384Kdf
3,308,288 UART: [kat] LMS
3,840,120 UART: [kat] --
3,845,402 UART: [cold-reset] ++
3,847,508 UART: [fht] FHT @ 0x50003400
3,859,771 UART: [idev] ++
3,860,483 UART: [idev] CDI.KEYID = 6
3,861,372 UART: [idev] SUBJECT.KEYID = 7
3,862,619 UART: [idev] UDS.KEYID = 0
3,863,547 ready_for_fw is high
3,863,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,581 UART: [idev] Erasing UDS.KEYID = 0
6,337,605 UART: [idev] Sha1 KeyId Algorithm
6,359,580 UART: [idev] --
6,364,440 UART: [ldev] ++
6,365,150 UART: [ldev] CDI.KEYID = 6
6,366,069 UART: [ldev] SUBJECT.KEYID = 5
6,367,238 UART: [ldev] AUTHORITY.KEYID = 7
6,368,415 UART: [ldev] FE.KEYID = 1
6,379,766 UART: [ldev] Erasing FE.KEYID = 1
8,857,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,151 UART: [ldev] --
10,649,081 UART: [fwproc] Wait for Commands...
10,651,189 UART: [fwproc] Recv command 0x46574c44
10,653,501 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,024 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,342,652 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,902,683 >>> mbox cmd response: success
14,907,172 UART: [afmc] ++
14,907,910 UART: [afmc] CDI.KEYID = 6
14,909,107 UART: [afmc] SUBJECT.KEYID = 7
14,910,555 UART: [afmc] AUTHORITY.KEYID = 5
17,412,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,134,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,136,192 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,151,299 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,166,474 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,181,343 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,205,646 UART: [afmc] --
19,209,794 UART: [cold-reset] --
19,214,062 UART: [state] Locking Datavault
19,220,099 UART: [state] Locking PCR0, PCR1 and PCR31
19,222,295 UART: [state] Locking ICCM
19,223,926 UART: [exit] Launching FMC @ 0x40000130
19,232,570 UART:
19,232,808 UART: Running Caliptra FMC ...
19,233,917 UART:
19,234,079 UART: [state] CFI Enabled
19,242,244 UART: [fht] FMC Alias Private Key: 7
21,008,869 UART: [art] Extend RT PCRs Done
21,010,091 UART: [art] Lock RT PCRs Done
21,011,753 UART: [art] Populate DV Done
21,017,062 UART: [fht] FMC Alias Private Key: 7
21,018,554 UART: [art] Derive CDI
21,019,323 UART: [art] Store in slot 0x4
21,061,980 UART: [art] Derive Key Pair
21,063,025 UART: [art] Store priv key in slot 0x5
23,489,071 UART: [art] Derive Key Pair - Done
23,501,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,208,562 UART: [art] Erasing AUTHORITY.KEYID = 7
25,210,061 UART: [art] PUB.X = 64F2F8C2B9285B26EFBA1312E29C28ABF207F3A504397BD5EB87CFBCF90C1C200CBF9845465219F7FC6F6C2B67B25216
25,217,318 UART: [art] PUB.Y = 0378598E29F07BA0DC6BEB13E74291D04EC239B64C98C578475DD9831B9C72C60FE37917794766823C5097E481D9881C
25,224,579 UART: [art] SIG.R = 6BB79D8E789CC3F38A5345D921787B8A7C5F9CADD93779728145B510AAB007CE92B518F7672370F1B136440070D052F1
25,231,898 UART: [art] SIG.S = 32E921863BE057E38FF7C98E9D4DA8FFF3DADEC1B84C14E806C33F0D160ABD2F0A28BE430966BBC0593E6AA75D760F10
26,210,983 UART: Caliptra RT
26,211,693 UART: [state] CFI Enabled
26,344,490 UART: [rt] RT listening for mailbox commands...
26,346,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,377,076 UART: [rt]cmd =0x44504543, len=96
30,672,356 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
3,753,520 ready_for_fw is high
3,753,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,336 >>> mbox cmd response: success
19,296,948 UART:
19,297,365 UART: Running Caliptra FMC ...
19,298,516 UART:
19,298,683 UART: [state] CFI Enabled
19,306,375 UART: [fht] FMC Alias Private Key: 7
21,072,451 UART: [art] Extend RT PCRs Done
21,073,674 UART: [art] Lock RT PCRs Done
21,074,877 UART: [art] Populate DV Done
21,080,207 UART: [fht] FMC Alias Private Key: 7
21,081,865 UART: [art] Derive CDI
21,082,689 UART: [art] Store in slot 0x4
21,124,981 UART: [art] Derive Key Pair
21,126,049 UART: [art] Store priv key in slot 0x5
23,552,716 UART: [art] Derive Key Pair - Done
23,565,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,269 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,782 UART: [art] PUB.X = 2A5F58BE9D85ED927703E85382E0E6403AD6F5BD3AADABFEB8F818405C77D1D9F14C2239217AAF2D046F7C6FDE4744A2
25,281,031 UART: [art] PUB.Y = B6CEBEBAD94156DC9923B01D5A2AE5F96EF2C2841B6E46C293213D90A29A1C9669D42F2157F06F5B8002F9A0984A2334
25,288,266 UART: [art] SIG.R = 63A0D816D025D51631574061CA9D0D7CF117AA8F39C5E1540E08264C32A76CA5DB70E8C1A2B02E32BFC17A34C232D327
25,295,658 UART: [art] SIG.S = 8FFAFF6822BE4C4E6DCC7EE1F0D3A4ECE4595CC452E6F400F32719FF74E049E0B075E3E4B671FFB762CB6C4695E375EB
26,275,624 UART: Caliptra RT
26,276,337 UART: [state] CFI Enabled
26,410,368 UART: [rt] RT listening for mailbox commands...
26,412,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,442,959 UART: [rt]cmd =0x44504543, len=96
30,738,806 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,899 UART: [kat] SHA2-256
881,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,945 UART: [kat] ++
886,097 UART: [kat] sha1
890,367 UART: [kat] SHA2-256
892,305 UART: [kat] SHA2-384
894,988 UART: [kat] SHA2-512-ACC
896,889 UART: [kat] ECC-384
902,592 UART: [kat] HMAC-384Kdf
907,294 UART: [kat] LMS
1,475,490 UART: [kat] --
1,476,339 UART: [cold-reset] ++
1,476,797 UART: [fht] Storing FHT @ 0x50003400
1,479,702 UART: [idev] ++
1,479,870 UART: [idev] CDI.KEYID = 6
1,480,230 UART: [idev] SUBJECT.KEYID = 7
1,480,654 UART: [idev] UDS.KEYID = 0
1,480,999 ready_for_fw is high
1,480,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,834 UART: [idev] Erasing UDS.KEYID = 0
1,505,686 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,282 UART: [idev] --
1,515,385 UART: [ldev] ++
1,515,553 UART: [ldev] CDI.KEYID = 6
1,515,916 UART: [ldev] SUBJECT.KEYID = 5
1,516,342 UART: [ldev] AUTHORITY.KEYID = 7
1,516,805 UART: [ldev] FE.KEYID = 1
1,521,911 UART: [ldev] Erasing FE.KEYID = 1
1,547,252 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,872 UART: [ldev] --
1,586,187 UART: [fwproc] Waiting for Commands...
1,586,858 UART: [fwproc] Received command 0x46574c44
1,587,649 UART: [fwproc] Received Image of size 118548 bytes
2,931,739 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,207 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,848 >>> mbox cmd response: success
3,132,084 UART: [afmc] ++
3,132,252 UART: [afmc] CDI.KEYID = 6
3,132,614 UART: [afmc] SUBJECT.KEYID = 7
3,133,039 UART: [afmc] AUTHORITY.KEYID = 5
3,168,374 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,608 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,388 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,097 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,980 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,663 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,537 UART: [afmc] --
3,211,647 UART: [cold-reset] --
3,212,743 UART: [state] Locking Datavault
3,213,846 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,450 UART: [state] Locking ICCM
3,214,924 UART: [exit] Launching FMC @ 0x40000130
3,220,254 UART:
3,220,270 UART: Running Caliptra FMC ...
3,220,678 UART:
3,220,732 UART: [state] CFI Enabled
3,231,318 UART: [fht] FMC Alias Private Key: 7
3,350,258 UART: [art] Extend RT PCRs Done
3,350,686 UART: [art] Lock RT PCRs Done
3,352,268 UART: [art] Populate DV Done
3,360,649 UART: [fht] FMC Alias Private Key: 7
3,361,577 UART: [art] Derive CDI
3,361,857 UART: [art] Store in slot 0x4
3,448,065 UART: [art] Derive Key Pair
3,448,425 UART: [art] Store priv key in slot 0x5
3,461,642 UART: [art] Derive Key Pair - Done
3,476,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,712 UART: [art] PUB.X = AA88E6AD1424F160E5DB0C994401F9B17C331ABA9D69266000086196A610F66D5ED45D7CBE8F368FF8CB8667DFE73B13
3,499,459 UART: [art] PUB.Y = 0ACDE02EAF0725743062E0E18829E90C2CD79085E471F0EE7730182828D1108889794F94834B0EE54BA46C6FE8E09E65
3,506,393 UART: [art] SIG.R = 6D1B9F50027E7A5E6EC781C231B819BDD500E00A577DB0116E098161F318AC1D68BB582DFC4AB7B1F7744D14E6B9FA86
3,513,142 UART: [art] SIG.S = 8BAD607C6AD91DB4AE0DA18E98778B89546159D6AF7B334B5D2C707B3B30EA3A41CDF33CDE67CD364C7B0C68DEDA3336
3,536,878 UART: Caliptra RT
3,537,129 UART: [state] CFI Enabled
3,657,187 UART: [rt] RT listening for mailbox commands...
3,657,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,069 UART: [rt]cmd =0x44504543, len=96
3,880,194 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,495 ready_for_fw is high
1,361,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,286 >>> mbox cmd response: success
3,041,319 UART:
3,041,335 UART: Running Caliptra FMC ...
3,041,743 UART:
3,041,797 UART: [state] CFI Enabled
3,052,235 UART: [fht] FMC Alias Private Key: 7
3,170,981 UART: [art] Extend RT PCRs Done
3,171,409 UART: [art] Lock RT PCRs Done
3,172,823 UART: [art] Populate DV Done
3,181,014 UART: [fht] FMC Alias Private Key: 7
3,182,150 UART: [art] Derive CDI
3,182,430 UART: [art] Store in slot 0x4
3,268,164 UART: [art] Derive Key Pair
3,268,524 UART: [art] Store priv key in slot 0x5
3,281,579 UART: [art] Derive Key Pair - Done
3,296,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,576 UART: [art] PUB.X = 3FF4735FC3AE3654F0A8DD21F905CB7808403A74E610827A873C3E98020BFE145E2989753B335DB34183D6D13A590099
3,319,306 UART: [art] PUB.Y = 6657E859F98274C1DD8F1336FA4B69525408C27E4FB403918EC698588A50025A4DE7D5BA67E3DC2610A36E752D202433
3,326,241 UART: [art] SIG.R = 96F8020680A1E293EA3714226B255292B84FFEC8B33BF125FD5E3C9024559D82729D7585C0CFE22ECD628B6944020E40
3,332,995 UART: [art] SIG.S = B535822A515CB2A7930976C53EF138A98E463DEF2420F4758D9476C678895C4DC055B9718E55C5CF1138131179F782BB
3,356,590 UART: Caliptra RT
3,356,841 UART: [state] CFI Enabled
3,477,796 UART: [rt] RT listening for mailbox commands...
3,478,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,152 UART: [rt]cmd =0x44504543, len=96
3,700,955 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,290 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,854 UART: [kat] SHA2-256
881,785 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,900 UART: [kat] ++
886,052 UART: [kat] sha1
890,186 UART: [kat] SHA2-256
892,124 UART: [kat] SHA2-384
894,851 UART: [kat] SHA2-512-ACC
896,752 UART: [kat] ECC-384
902,517 UART: [kat] HMAC-384Kdf
907,015 UART: [kat] LMS
1,475,211 UART: [kat] --
1,476,374 UART: [cold-reset] ++
1,476,878 UART: [fht] Storing FHT @ 0x50003400
1,479,637 UART: [idev] ++
1,479,805 UART: [idev] CDI.KEYID = 6
1,480,165 UART: [idev] SUBJECT.KEYID = 7
1,480,589 UART: [idev] UDS.KEYID = 0
1,480,934 ready_for_fw is high
1,480,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,451 UART: [idev] Erasing UDS.KEYID = 0
1,505,117 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,689 UART: [idev] --
1,514,640 UART: [ldev] ++
1,514,808 UART: [ldev] CDI.KEYID = 6
1,515,171 UART: [ldev] SUBJECT.KEYID = 5
1,515,597 UART: [ldev] AUTHORITY.KEYID = 7
1,516,060 UART: [ldev] FE.KEYID = 1
1,521,310 UART: [ldev] Erasing FE.KEYID = 1
1,546,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,187 UART: [ldev] --
1,586,694 UART: [fwproc] Waiting for Commands...
1,587,419 UART: [fwproc] Received command 0x46574c44
1,588,210 UART: [fwproc] Received Image of size 118548 bytes
2,932,960 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,634 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,852 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,145 >>> mbox cmd response: success
3,133,375 UART: [afmc] ++
3,133,543 UART: [afmc] CDI.KEYID = 6
3,133,905 UART: [afmc] SUBJECT.KEYID = 7
3,134,330 UART: [afmc] AUTHORITY.KEYID = 5
3,168,743 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,733 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,513 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,222 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,105 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,788 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,820 UART: [afmc] --
3,211,856 UART: [cold-reset] --
3,212,692 UART: [state] Locking Datavault
3,214,059 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,663 UART: [state] Locking ICCM
3,215,143 UART: [exit] Launching FMC @ 0x40000130
3,220,473 UART:
3,220,489 UART: Running Caliptra FMC ...
3,220,897 UART:
3,221,040 UART: [state] CFI Enabled
3,231,944 UART: [fht] FMC Alias Private Key: 7
3,350,698 UART: [art] Extend RT PCRs Done
3,351,126 UART: [art] Lock RT PCRs Done
3,352,326 UART: [art] Populate DV Done
3,360,539 UART: [fht] FMC Alias Private Key: 7
3,361,681 UART: [art] Derive CDI
3,361,961 UART: [art] Store in slot 0x4
3,447,451 UART: [art] Derive Key Pair
3,447,811 UART: [art] Store priv key in slot 0x5
3,461,748 UART: [art] Derive Key Pair - Done
3,476,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,543 UART: [art] PUB.X = 45D505FC1C4B715E12DD34F27194157464D44F4106668DF702CD70A2DF7F33C454D0915A154C222ADEB7228267020CA0
3,499,294 UART: [art] PUB.Y = 90F2BE61EA45979DDB7364672D31AFD314C7FB7085F6DA0FA3B3255D9B554A99CC0DB304A99A9A1162F3EEFD0B2EF7C9
3,506,250 UART: [art] SIG.R = 169119DEE0409FC106F076845FA21A0B37204AFEBE6D60F54E97ECD758F85936A02F89BEFCE2393108282C82BA908577
3,513,013 UART: [art] SIG.S = CBD7BC40A266C3801EB908D3529DB39D1EC4883C65F0DEFA5A0F6AD0EBB2C0111620578B37D237217D47B99CFDDD7DE6
3,536,779 UART: Caliptra RT
3,537,122 UART: [state] CFI Enabled
3,657,400 UART: [rt] RT listening for mailbox commands...
3,658,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,560 UART: [rt]cmd =0x44504543, len=96
3,880,514 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,442 ready_for_fw is high
1,362,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,955 >>> mbox cmd response: success
3,041,468 UART:
3,041,484 UART: Running Caliptra FMC ...
3,041,892 UART:
3,042,035 UART: [state] CFI Enabled
3,052,425 UART: [fht] FMC Alias Private Key: 7
3,171,429 UART: [art] Extend RT PCRs Done
3,171,857 UART: [art] Lock RT PCRs Done
3,173,751 UART: [art] Populate DV Done
3,181,946 UART: [fht] FMC Alias Private Key: 7
3,183,050 UART: [art] Derive CDI
3,183,330 UART: [art] Store in slot 0x4
3,268,914 UART: [art] Derive Key Pair
3,269,274 UART: [art] Store priv key in slot 0x5
3,282,995 UART: [art] Derive Key Pair - Done
3,297,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,915 UART: [art] PUB.X = 9DF13773A73B441BBC65C82EB5090D04E84D751294A667DCE7CE49E64FB71324E49DFC792500024D97C0BFB483ADDE23
3,320,659 UART: [art] PUB.Y = C839757227250A96E8A196205A555E9A53F6B71043EF3F2BB885CF4A42EEAED12D183FE200740C5C9E36793F0996E1F3
3,327,578 UART: [art] SIG.R = 0F9B0AF056973017A830F1FF7408E863E65E19789F0AB2F5C81432D10D2297EE4B251D1D00E24A35C165EE397A5F67D9
3,334,311 UART: [art] SIG.S = D57700935AF681729D05BC3E86027A6652A490953D37632B86A78F39AC788B855E618C955A64D19602516D0E855BC30C
3,357,926 UART: Caliptra RT
3,358,269 UART: [state] CFI Enabled
3,478,453 UART: [rt] RT listening for mailbox commands...
3,479,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,355 UART: [rt]cmd =0x44504543, len=96
3,700,316 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,284 UART: [kat] ++
895,436 UART: [kat] sha1
899,644 UART: [kat] SHA2-256
901,584 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
916,389 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,169,900 UART: [cold-reset] ++
1,170,440 UART: [fht] FHT @ 0x50003400
1,173,052 UART: [idev] ++
1,173,220 UART: [idev] CDI.KEYID = 6
1,173,581 UART: [idev] SUBJECT.KEYID = 7
1,174,006 UART: [idev] UDS.KEYID = 0
1,174,352 ready_for_fw is high
1,174,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,169 UART: [idev] Erasing UDS.KEYID = 0
1,198,989 UART: [idev] Sha1 KeyId Algorithm
1,207,751 UART: [idev] --
1,208,588 UART: [ldev] ++
1,208,756 UART: [ldev] CDI.KEYID = 6
1,209,120 UART: [ldev] SUBJECT.KEYID = 5
1,209,547 UART: [ldev] AUTHORITY.KEYID = 7
1,210,010 UART: [ldev] FE.KEYID = 1
1,214,980 UART: [ldev] Erasing FE.KEYID = 1
1,241,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,246 UART: [ldev] --
1,280,671 UART: [fwproc] Wait for Commands...
1,281,366 UART: [fwproc] Recv command 0x46574c44
1,282,099 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,643 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,818 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,021 >>> mbox cmd response: success
2,826,071 UART: [afmc] ++
2,826,239 UART: [afmc] CDI.KEYID = 6
2,826,602 UART: [afmc] SUBJECT.KEYID = 7
2,827,028 UART: [afmc] AUTHORITY.KEYID = 5
2,862,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,007 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,717 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,598 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,299 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,036 UART: [afmc] --
2,906,095 UART: [cold-reset] --
2,906,835 UART: [state] Locking Datavault
2,908,072 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,676 UART: [state] Locking ICCM
2,909,168 UART: [exit] Launching FMC @ 0x40000130
2,914,498 UART:
2,914,514 UART: Running Caliptra FMC ...
2,914,922 UART:
2,914,976 UART: [state] CFI Enabled
2,925,100 UART: [fht] FMC Alias Private Key: 7
3,043,994 UART: [art] Extend RT PCRs Done
3,044,422 UART: [art] Lock RT PCRs Done
3,045,866 UART: [art] Populate DV Done
3,054,249 UART: [fht] FMC Alias Private Key: 7
3,055,291 UART: [art] Derive CDI
3,055,571 UART: [art] Store in slot 0x4
3,141,862 UART: [art] Derive Key Pair
3,142,222 UART: [art] Store priv key in slot 0x5
3,155,602 UART: [art] Derive Key Pair - Done
3,170,554 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,658 UART: [art] PUB.X = 676B7C02B804F47DB6ADEAA19EB7252D70F2301FF98E53D2E1BE0BE94A02340F127209B7AC5E967136A2BE61FCC3A903
3,193,419 UART: [art] PUB.Y = 84071C5861A043E671E85D082AA5A9400785A55312A815A6067FF028163DC33C71C8B108093806A2E648CEEA4EFDE1AE
3,200,346 UART: [art] SIG.R = FBAB6211D4E7D5AD2E6B0D6C1D0BD4FFC97A1CBEED193472ACF8100ACE0EB5779620AEAE417788EE9A4FDAEC131FF6F4
3,207,138 UART: [art] SIG.S = 884F3302A190D9270287E434C9BC4A938E0E1EB745DEFAF3D74D2648F2C4765F64A1458E3C675781AA2B5ADAC26A4F5C
3,230,891 UART: Caliptra RT
3,231,142 UART: [state] CFI Enabled
3,350,742 UART: [rt] RT listening for mailbox commands...
3,351,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,898 UART: [rt]cmd =0x44504543, len=96
3,574,648 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,772 ready_for_fw is high
1,058,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,052 >>> mbox cmd response: success
2,739,315 UART:
2,739,331 UART: Running Caliptra FMC ...
2,739,739 UART:
2,739,793 UART: [state] CFI Enabled
2,750,453 UART: [fht] FMC Alias Private Key: 7
2,869,365 UART: [art] Extend RT PCRs Done
2,869,793 UART: [art] Lock RT PCRs Done
2,871,113 UART: [art] Populate DV Done
2,879,184 UART: [fht] FMC Alias Private Key: 7
2,880,298 UART: [art] Derive CDI
2,880,578 UART: [art] Store in slot 0x4
2,966,557 UART: [art] Derive Key Pair
2,966,917 UART: [art] Store priv key in slot 0x5
2,980,523 UART: [art] Derive Key Pair - Done
2,995,223 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,666 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,431 UART: [art] PUB.X = D403746C608411DDF742558034184EC352A286130314FDA5B22AAC518E54A66CE69A5A5905B2C034D6D8BE8207B6C75D
3,018,187 UART: [art] PUB.Y = ADF667B2DC821781DF19AFAF8CABC063703ED97F913E6A454A5B843E86918084C3E153E4C470F67506B8966B36FD3E46
3,025,140 UART: [art] SIG.R = EA504B53AAC30CAB1401F8FFB208AD3516BBA12BDE92A4C4B93ED56C7FD566B60C7A2DF58C7D835E781803439C490DF7
3,031,910 UART: [art] SIG.S = 1264E7BB0BC9109F1E8B82051345054BD8CC75684805BD1970CC0DE1BCE9F6C8FA9FD0FB9C77DFF2C410B2158B91BB20
3,056,117 UART: Caliptra RT
3,056,368 UART: [state] CFI Enabled
3,175,629 UART: [rt] RT listening for mailbox commands...
3,176,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,589 UART: [rt]cmd =0x44504543, len=96
3,398,730 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,359 UART: [kat] ++
895,511 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,290 UART: [kat] SHA2-512-ACC
906,191 UART: [kat] ECC-384
916,144 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,073 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,173,991 ready_for_fw is high
1,173,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,872 UART: [idev] Erasing UDS.KEYID = 0
1,199,336 UART: [idev] Sha1 KeyId Algorithm
1,208,180 UART: [idev] --
1,208,993 UART: [ldev] ++
1,209,161 UART: [ldev] CDI.KEYID = 6
1,209,525 UART: [ldev] SUBJECT.KEYID = 5
1,209,952 UART: [ldev] AUTHORITY.KEYID = 7
1,210,415 UART: [ldev] FE.KEYID = 1
1,215,727 UART: [ldev] Erasing FE.KEYID = 1
1,242,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,255 UART: [ldev] --
1,281,460 UART: [fwproc] Wait for Commands...
1,282,179 UART: [fwproc] Recv command 0x46574c44
1,282,912 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,154 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,329 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,550 >>> mbox cmd response: success
2,826,602 UART: [afmc] ++
2,826,770 UART: [afmc] CDI.KEYID = 6
2,827,133 UART: [afmc] SUBJECT.KEYID = 7
2,827,559 UART: [afmc] AUTHORITY.KEYID = 5
2,864,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,712 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,422 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,303 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,004 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,547 UART: [afmc] --
2,907,546 UART: [cold-reset] --
2,908,174 UART: [state] Locking Datavault
2,909,215 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,819 UART: [state] Locking ICCM
2,910,437 UART: [exit] Launching FMC @ 0x40000130
2,915,767 UART:
2,915,783 UART: Running Caliptra FMC ...
2,916,191 UART:
2,916,334 UART: [state] CFI Enabled
2,927,078 UART: [fht] FMC Alias Private Key: 7
3,046,796 UART: [art] Extend RT PCRs Done
3,047,224 UART: [art] Lock RT PCRs Done
3,048,660 UART: [art] Populate DV Done
3,057,053 UART: [fht] FMC Alias Private Key: 7
3,058,103 UART: [art] Derive CDI
3,058,383 UART: [art] Store in slot 0x4
3,144,154 UART: [art] Derive Key Pair
3,144,514 UART: [art] Store priv key in slot 0x5
3,157,756 UART: [art] Derive Key Pair - Done
3,172,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,038 UART: [art] PUB.X = 1E628F13E07FCFC8ED0B4E2443C3BCF59AC2238C637F0795F69DBAE38062C02D7ED79DB96B79E1EC86B4CDE78430236D
3,195,818 UART: [art] PUB.Y = A5E2FA9CD4D59431EFFA165FAD77B815CE53FF167901BC06BED685AB5244DA8340E3977E249151D1E7108A672DC71393
3,202,770 UART: [art] SIG.R = C93D9A54682A5847C266992808948C443314F1433FB63EAD252CE56B48EE132B649AFB2759DBC4E41354BB61EAD4E338
3,209,537 UART: [art] SIG.S = DE9D4B5C10F214D11B3423693DC55675B70EF21E38AC83A93FFB80FB839F881FD60879AD6992C099AFF124D97B866CAE
3,233,029 UART: Caliptra RT
3,233,372 UART: [state] CFI Enabled
3,354,012 UART: [rt] RT listening for mailbox commands...
3,354,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,032 UART: [rt]cmd =0x44504543, len=96
3,577,603 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,829 ready_for_fw is high
1,059,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,879 >>> mbox cmd response: success
2,744,706 UART:
2,744,722 UART: Running Caliptra FMC ...
2,745,130 UART:
2,745,273 UART: [state] CFI Enabled
2,755,885 UART: [fht] FMC Alias Private Key: 7
2,875,055 UART: [art] Extend RT PCRs Done
2,875,483 UART: [art] Lock RT PCRs Done
2,877,163 UART: [art] Populate DV Done
2,885,100 UART: [fht] FMC Alias Private Key: 7
2,886,194 UART: [art] Derive CDI
2,886,474 UART: [art] Store in slot 0x4
2,972,221 UART: [art] Derive Key Pair
2,972,581 UART: [art] Store priv key in slot 0x5
2,985,563 UART: [art] Derive Key Pair - Done
3,000,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,111 UART: [art] PUB.X = 7BC1485345150C2ADDDBAFFCF9F90B0B3632DD0E95F6D09BF806B031C98E92610454F938814FCBE88F2ED76A927C1CF4
3,022,877 UART: [art] PUB.Y = 4D0D4919AE93A81FEBB154CCD84F247E426EAC2940B2029F7E390C9AA360026207BE406F5082C5544CB9F55D1663BAA7
3,029,818 UART: [art] SIG.R = 5B7548D3E6ED7C4271EEA3771FCC2AAF5B6E305193F2AD5DE0E02672BD5CC7A5C0A4ED969541CB57BE6FBACC00D2C17E
3,036,592 UART: [art] SIG.S = F77F84F372B1978AA291CC81FB2B6E40910985300FB831BC5EED06B3C3E7FFF2B62E9CC00BD59A63396FAB59D009F090
3,060,563 UART: Caliptra RT
3,060,906 UART: [state] CFI Enabled
3,181,289 UART: [rt] RT listening for mailbox commands...
3,181,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,465 UART: [rt]cmd =0x44504543, len=96
3,404,126 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
893,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,513 UART: [kat] ++
897,665 UART: [kat] sha1
901,869 UART: [kat] SHA2-256
903,809 UART: [kat] SHA2-384
906,700 UART: [kat] SHA2-512-ACC
908,601 UART: [kat] ECC-384
918,106 UART: [kat] HMAC-384Kdf
922,666 UART: [kat] LMS
1,170,994 UART: [kat] --
1,171,821 UART: [cold-reset] ++
1,172,295 UART: [fht] FHT @ 0x50003400
1,175,156 UART: [idev] ++
1,175,324 UART: [idev] CDI.KEYID = 6
1,175,684 UART: [idev] SUBJECT.KEYID = 7
1,176,108 UART: [idev] UDS.KEYID = 0
1,176,453 ready_for_fw is high
1,176,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,056 UART: [idev] Erasing UDS.KEYID = 0
1,201,187 UART: [idev] Sha1 KeyId Algorithm
1,209,661 UART: [idev] --
1,210,541 UART: [ldev] ++
1,210,709 UART: [ldev] CDI.KEYID = 6
1,211,072 UART: [ldev] SUBJECT.KEYID = 5
1,211,498 UART: [ldev] AUTHORITY.KEYID = 7
1,211,961 UART: [ldev] FE.KEYID = 1
1,216,953 UART: [ldev] Erasing FE.KEYID = 1
1,242,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,336 UART: [fwproc] Wait for Commands...
1,282,976 UART: [fwproc] Recv command 0x46574c44
1,283,704 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,558 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,728 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,915 >>> mbox cmd response: success
2,827,053 UART: [afmc] ++
2,827,221 UART: [afmc] CDI.KEYID = 6
2,827,583 UART: [afmc] SUBJECT.KEYID = 7
2,828,008 UART: [afmc] AUTHORITY.KEYID = 5
2,863,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,222 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,931 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,814 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,515 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,361 UART: [afmc] --
2,907,397 UART: [cold-reset] --
2,908,243 UART: [state] Locking Datavault
2,909,372 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,976 UART: [state] Locking ICCM
2,910,448 UART: [exit] Launching FMC @ 0x40000130
2,915,778 UART:
2,915,794 UART: Running Caliptra FMC ...
2,916,202 UART:
2,916,256 UART: [state] CFI Enabled
2,926,918 UART: [fht] FMC Alias Private Key: 7
3,046,130 UART: [art] Extend RT PCRs Done
3,046,558 UART: [art] Lock RT PCRs Done
3,048,048 UART: [art] Populate DV Done
3,056,145 UART: [fht] FMC Alias Private Key: 7
3,057,289 UART: [art] Derive CDI
3,057,569 UART: [art] Store in slot 0x4
3,143,414 UART: [art] Derive Key Pair
3,143,774 UART: [art] Store priv key in slot 0x5
3,157,082 UART: [art] Derive Key Pair - Done
3,172,063 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,161 UART: [art] PUB.X = BE7E8EB903169754A1344A57D47AF37AB87F73F9B77E6120DC6AFD6BA28F977E96CCD0AEA1B93416A4C1B3E541999A86
3,194,940 UART: [art] PUB.Y = 9AB69708946BDCF0C641DDF0F9029B94DDD03A83428D8A9E0ECFBF9FEDEC5F778E200742C7B752404BFF1B7385B800BF
3,201,874 UART: [art] SIG.R = 9CBD499C9714C7F92A68F71A4DEB5D249F740EFE8B1552DD294A02DFBBE65F2C4D9B92C4D9A08BE72D445E788C394724
3,208,652 UART: [art] SIG.S = 35D0212C72FDAC9251F534289A50351C44B7F1FA89B9744D7F66CB9290B92ADC182E6B56AC7CEE94629FFF461A699B33
3,232,342 UART: Caliptra RT
3,232,593 UART: [state] CFI Enabled
3,352,340 UART: [rt] RT listening for mailbox commands...
3,353,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,342 UART: [rt]cmd =0x44504543, len=96
3,575,583 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,821 ready_for_fw is high
1,059,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,412 >>> mbox cmd response: success
2,739,751 UART:
2,739,767 UART: Running Caliptra FMC ...
2,740,175 UART:
2,740,229 UART: [state] CFI Enabled
2,750,929 UART: [fht] FMC Alias Private Key: 7
2,870,037 UART: [art] Extend RT PCRs Done
2,870,465 UART: [art] Lock RT PCRs Done
2,872,281 UART: [art] Populate DV Done
2,880,442 UART: [fht] FMC Alias Private Key: 7
2,881,488 UART: [art] Derive CDI
2,881,768 UART: [art] Store in slot 0x4
2,967,583 UART: [art] Derive Key Pair
2,967,943 UART: [art] Store priv key in slot 0x5
2,980,965 UART: [art] Derive Key Pair - Done
2,995,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,923 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,688 UART: [art] PUB.X = ED979E986727F3D6BE758AF02E0035CD96E1A37E2D4A124AADC0DCD90883E57C6075B328B748006E242A7845079BEC94
3,018,412 UART: [art] PUB.Y = 7A3102CE8277B821B5C8F633FBA62245D90ECAB1AEA2C58D1555D5B9029F79F89485791D1055D3884D5CB7AF0E10686E
3,025,354 UART: [art] SIG.R = EE1461E951ED996891E9F060D36B87C0CFA57095A66B19F0771F5514080D48AE3B2A9A1A33738CE74992D54A4F7E7E1F
3,032,120 UART: [art] SIG.S = D34BE28D7A06E7C34F5D7AB9E0D41CAC4897B3C7FFB492ECCB2729759689CDF13EB2B02950E0FC035B81045BC5C68D0E
3,056,102 UART: Caliptra RT
3,056,353 UART: [state] CFI Enabled
3,175,643 UART: [rt] RT listening for mailbox commands...
3,176,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,701 UART: [rt]cmd =0x44504543, len=96
3,397,694 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,809 UART: [kat] SHA2-512-ACC
908,710 UART: [kat] ECC-384
917,973 UART: [kat] HMAC-384Kdf
922,589 UART: [kat] LMS
1,170,917 UART: [kat] --
1,171,894 UART: [cold-reset] ++
1,172,254 UART: [fht] FHT @ 0x50003400
1,174,859 UART: [idev] ++
1,175,027 UART: [idev] CDI.KEYID = 6
1,175,387 UART: [idev] SUBJECT.KEYID = 7
1,175,811 UART: [idev] UDS.KEYID = 0
1,176,156 ready_for_fw is high
1,176,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,709 UART: [idev] Erasing UDS.KEYID = 0
1,200,952 UART: [idev] Sha1 KeyId Algorithm
1,209,424 UART: [idev] --
1,210,526 UART: [ldev] ++
1,210,694 UART: [ldev] CDI.KEYID = 6
1,211,057 UART: [ldev] SUBJECT.KEYID = 5
1,211,483 UART: [ldev] AUTHORITY.KEYID = 7
1,211,946 UART: [ldev] FE.KEYID = 1
1,216,990 UART: [ldev] Erasing FE.KEYID = 1
1,243,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,638 UART: [ldev] --
1,282,947 UART: [fwproc] Wait for Commands...
1,283,757 UART: [fwproc] Recv command 0x46574c44
1,284,485 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,991 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,161 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,548 >>> mbox cmd response: success
2,828,634 UART: [afmc] ++
2,828,802 UART: [afmc] CDI.KEYID = 6
2,829,164 UART: [afmc] SUBJECT.KEYID = 7
2,829,589 UART: [afmc] AUTHORITY.KEYID = 5
2,865,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,843 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,552 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,435 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,136 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,938 UART: [afmc] --
2,908,972 UART: [cold-reset] --
2,909,946 UART: [state] Locking Datavault
2,911,137 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,741 UART: [state] Locking ICCM
2,912,271 UART: [exit] Launching FMC @ 0x40000130
2,917,601 UART:
2,917,617 UART: Running Caliptra FMC ...
2,918,025 UART:
2,918,168 UART: [state] CFI Enabled
2,928,748 UART: [fht] FMC Alias Private Key: 7
3,047,874 UART: [art] Extend RT PCRs Done
3,048,302 UART: [art] Lock RT PCRs Done
3,049,758 UART: [art] Populate DV Done
3,057,899 UART: [fht] FMC Alias Private Key: 7
3,058,985 UART: [art] Derive CDI
3,059,265 UART: [art] Store in slot 0x4
3,145,198 UART: [art] Derive Key Pair
3,145,558 UART: [art] Store priv key in slot 0x5
3,158,960 UART: [art] Derive Key Pair - Done
3,173,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,830 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,595 UART: [art] PUB.X = 6768B20A58E124D08876C4E4D8124C76E734F185500564200C96AC94392A912DE41A4AF8A67A57416784132689B90482
3,196,335 UART: [art] PUB.Y = A2C980EB5DEF75FC3E2287C8AEC535CCE65F5A0F85D3D4F95020EED4AC94664C61F6CBB81482177113E90F90A1FEF910
3,203,295 UART: [art] SIG.R = 44B0C759BA489A94747C1BFFEDA59DE9EE5690E4A9B7B3B865DB643D417EAD7545E653A96EA74C4D5DF101DF859B1123
3,210,076 UART: [art] SIG.S = 0397DF5825DF9E03A7732D119E5A3D33E1C62AC2D92065209E363103DCCA62F8E979CE3F3A94A76AD21B7B572E1BD399
3,233,413 UART: Caliptra RT
3,233,756 UART: [state] CFI Enabled
3,352,526 UART: [rt] RT listening for mailbox commands...
3,353,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,672 UART: [rt]cmd =0x44504543, len=96
3,574,935 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,342 ready_for_fw is high
1,060,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,603 >>> mbox cmd response: success
2,742,860 UART:
2,742,876 UART: Running Caliptra FMC ...
2,743,284 UART:
2,743,427 UART: [state] CFI Enabled
2,754,203 UART: [fht] FMC Alias Private Key: 7
2,873,253 UART: [art] Extend RT PCRs Done
2,873,681 UART: [art] Lock RT PCRs Done
2,875,011 UART: [art] Populate DV Done
2,883,278 UART: [fht] FMC Alias Private Key: 7
2,884,238 UART: [art] Derive CDI
2,884,518 UART: [art] Store in slot 0x4
2,970,551 UART: [art] Derive Key Pair
2,970,911 UART: [art] Store priv key in slot 0x5
2,984,249 UART: [art] Derive Key Pair - Done
2,998,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,709 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,474 UART: [art] PUB.X = 6D0848442D6DBEFB01A13F86A283465CC4AE05C3BFCA734810ED8A31718EB0F2D31B59C5371F048CC1CA93571FBBCE4E
3,022,248 UART: [art] PUB.Y = 3DB907DA6B30291A1D12F92B60DA8C445C5B5500CA6C46CC10549325D77D9FB4C322E2DBFF45879D3CD9B2EAF2CED19E
3,029,191 UART: [art] SIG.R = F1BD052A518D5CB233F4A3014037B390037B39E9DB983B4296385E797D3326BE8A5CF0C6AE9F2423C453432258E3B5B8
3,035,950 UART: [art] SIG.S = 09E63C8E881207B09526CDC4D0594A2AD45E0586AD0F616B788AA341292C0B33CEC462AA8362DD2393F59CE95336E2D9
3,059,535 UART: Caliptra RT
3,059,878 UART: [state] CFI Enabled
3,180,617 UART: [rt] RT listening for mailbox commands...
3,181,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,613 UART: [rt]cmd =0x44504543, len=96
3,404,673 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,961 writing to cptra_bootfsm_go
193,152 UART:
193,498 UART: Running Caliptra ROM ...
194,688 UART:
194,845 UART: [state] CFI Enabled
263,875 UART: [state] LifecycleState = Unprovisioned
265,871 UART: [state] DebugLocked = No
267,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,998 UART: [kat] SHA2-256
442,649 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,175 UART: [kat] ++
453,665 UART: [kat] sha1
463,974 UART: [kat] SHA2-256
466,645 UART: [kat] SHA2-384
472,135 UART: [kat] SHA2-512-ACC
474,502 UART: [kat] ECC-384
2,770,420 UART: [kat] HMAC-384Kdf
2,802,132 UART: [kat] LMS
3,992,452 UART: [kat] --
3,997,036 UART: [cold-reset] ++
3,999,610 UART: [fht] Storing FHT @ 0x50003400
4,010,515 UART: [idev] ++
4,011,118 UART: [idev] CDI.KEYID = 6
4,012,037 UART: [idev] SUBJECT.KEYID = 7
4,013,219 UART: [idev] UDS.KEYID = 0
4,014,269 ready_for_fw is high
4,014,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,498 UART: [idev] Erasing UDS.KEYID = 0
7,346,836 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,839 UART: [idev] --
7,371,227 UART: [ldev] ++
7,371,810 UART: [ldev] CDI.KEYID = 6
7,372,783 UART: [ldev] SUBJECT.KEYID = 5
7,373,998 UART: [ldev] AUTHORITY.KEYID = 7
7,375,229 UART: [ldev] FE.KEYID = 1
7,402,403 UART: [ldev] Erasing FE.KEYID = 1
10,735,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,119 UART: [ldev] --
13,094,362 UART: [fwproc] Waiting for Commands...
13,096,792 UART: [fwproc] Received command 0x46574c44
13,098,979 UART: [fwproc] Received Image of size 118548 bytes
17,205,385 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,960 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,351,125 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,679,061 >>> mbox cmd response: success
17,683,220 UART: [afmc] ++
17,683,854 UART: [afmc] CDI.KEYID = 6
17,684,751 UART: [afmc] SUBJECT.KEYID = 7
17,685,971 UART: [afmc] AUTHORITY.KEYID = 5
21,051,940 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,350,849 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,353,107 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,367,578 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,382,288 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,396,666 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,417,973 UART: [afmc] --
23,422,106 UART: [cold-reset] --
23,426,208 UART: [state] Locking Datavault
23,432,160 UART: [state] Locking PCR0, PCR1 and PCR31
23,433,929 UART: [state] Locking ICCM
23,435,055 UART: [exit] Launching FMC @ 0x40000130
23,443,465 UART:
23,443,749 UART: Running Caliptra FMC ...
23,444,863 UART:
23,445,022 UART: [state] CFI Enabled
23,512,310 UART: [fht] FMC Alias Private Key: 7
25,852,953 UART: [art] Extend RT PCRs Done
25,854,248 UART: [art] Lock RT PCRs Done
25,856,015 UART: [art] Populate DV Done
25,861,312 UART: [fht] FMC Alias Private Key: 7
25,863,018 UART: [art] Derive CDI
25,863,876 UART: [art] Store in slot 0x4
25,914,950 UART: [art] Derive Key Pair
25,915,983 UART: [art] Store priv key in slot 0x5
29,209,122 UART: [art] Derive Key Pair - Done
29,222,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,510,579 UART: [art] Erasing AUTHORITY.KEYID = 7
31,512,090 UART: [art] PUB.X = 62B6E2975D888FA9171B4DDF3D7713C01F8709F91ACD9BF8EF9304FA6C0770FF5B3F8CF8D825AB489DA0B1A703DB2F56
31,519,411 UART: [art] PUB.Y = 0280974B80E3B1F41B08E774B3FD9A183ABAA1864591D5DE95B23371148774C7205950CED45B615DC14EC9D1BECCB4D8
31,526,639 UART: [art] SIG.R = 9ABF1605FAD2B92138F39203DEBC3AA6017F42A7FB17E57A3874C9958B84270D8DCD28F58C804F0CAEB2BAD512D7F544
31,534,065 UART: [art] SIG.S = C41AD6E232B46764F26DF2D2D1A1B10F81DCABB7717569DCBCD8129E85BCB481DA30C53E578DE9B24593C29A1F370241
32,838,945 UART: Caliptra RT
32,839,662 UART: [state] CFI Enabled
33,016,094 UART: [rt] RT listening for mailbox commands...
33,018,046 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,048,265 UART: [rt]cmd =0x44504543, len=28
33,091,085 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,785,770 ready_for_fw is high
3,786,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,966,808 >>> mbox cmd response: success
23,648,296 UART:
23,648,709 UART: Running Caliptra FMC ...
23,649,837 UART:
23,649,995 UART: [state] CFI Enabled
23,721,001 UART: [fht] FMC Alias Private Key: 7
26,061,258 UART: [art] Extend RT PCRs Done
26,062,497 UART: [art] Lock RT PCRs Done
26,064,055 UART: [art] Populate DV Done
26,069,239 UART: [fht] FMC Alias Private Key: 7
26,070,947 UART: [art] Derive CDI
26,071,691 UART: [art] Store in slot 0x4
26,129,814 UART: [art] Derive Key Pair
26,130,856 UART: [art] Store priv key in slot 0x5
29,423,381 UART: [art] Derive Key Pair - Done
29,436,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,755 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,295 UART: [art] PUB.X = A2D8AD37646E64E89D8A7439408B9684778212409CCB3B5D8CE4CC409C466E94C6B1815B80FE0D6BC9FCCE2ACC8F2DED
31,734,573 UART: [art] PUB.Y = 32CE6BD042CEFAA1462B0A909020BBC6D02B7517C0CBA915D045D177589A7B2C445C4C1F0967664541F7AFD6A5AD31A2
31,741,801 UART: [art] SIG.R = EB85DC0BB985B3B20FE7643ED9A7A6FA4C7000005EB49FB5FAF5F426FA323D7391EF23DD8174D0E545ACAAA65F0B118B
31,749,207 UART: [art] SIG.S = C0E6759DEDE872D0D1C460CB476E52FD552CE56AD9C22DF7BC2D479A0A5E3FAF434C98C93B77A554A813B7F36424FB92
33,054,188 UART: Caliptra RT
33,054,937 UART: [state] CFI Enabled
33,231,778 UART: [rt] RT listening for mailbox commands...
33,233,682 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,263,424 UART: [rt]cmd =0x44504543, len=28
33,306,187 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,324 UART:
192,686 UART: Running Caliptra ROM ...
193,811 UART:
603,662 UART: [state] CFI Enabled
618,334 UART: [state] LifecycleState = Unprovisioned
620,277 UART: [state] DebugLocked = No
621,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,229 UART: [kat] SHA2-256
795,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,461 UART: [kat] ++
807,054 UART: [kat] sha1
816,943 UART: [kat] SHA2-256
819,652 UART: [kat] SHA2-384
825,417 UART: [kat] SHA2-512-ACC
827,785 UART: [kat] ECC-384
3,111,812 UART: [kat] HMAC-384Kdf
3,124,678 UART: [kat] LMS
4,314,747 UART: [kat] --
4,318,413 UART: [cold-reset] ++
4,321,053 UART: [fht] Storing FHT @ 0x50003400
4,334,019 UART: [idev] ++
4,334,587 UART: [idev] CDI.KEYID = 6
4,335,614 UART: [idev] SUBJECT.KEYID = 7
4,336,779 UART: [idev] UDS.KEYID = 0
4,337,819 ready_for_fw is high
4,338,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,880 UART: [idev] Erasing UDS.KEYID = 0
7,625,179 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,990 UART: [idev] --
7,652,315 UART: [ldev] ++
7,652,958 UART: [ldev] CDI.KEYID = 6
7,653,907 UART: [ldev] SUBJECT.KEYID = 5
7,655,014 UART: [ldev] AUTHORITY.KEYID = 7
7,656,188 UART: [ldev] FE.KEYID = 1
7,666,204 UART: [ldev] Erasing FE.KEYID = 1
10,961,696 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,556 UART: [ldev] --
13,320,463 UART: [fwproc] Waiting for Commands...
13,323,844 UART: [fwproc] Received command 0x46574c44
13,326,026 UART: [fwproc] Received Image of size 118548 bytes
17,432,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,513,794 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,586,936 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,914,596 >>> mbox cmd response: success
17,918,136 UART: [afmc] ++
17,918,770 UART: [afmc] CDI.KEYID = 6
17,919,680 UART: [afmc] SUBJECT.KEYID = 7
17,920,894 UART: [afmc] AUTHORITY.KEYID = 5
21,235,508 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,208 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,530,457 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,544,886 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,559,641 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,052 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,973 UART: [afmc] --
23,601,058 UART: [cold-reset] --
23,606,113 UART: [state] Locking Datavault
23,612,486 UART: [state] Locking PCR0, PCR1 and PCR31
23,614,228 UART: [state] Locking ICCM
23,616,554 UART: [exit] Launching FMC @ 0x40000130
23,624,944 UART:
23,625,177 UART: Running Caliptra FMC ...
23,626,272 UART:
23,626,425 UART: [state] CFI Enabled
23,634,443 UART: [fht] FMC Alias Private Key: 7
25,974,934 UART: [art] Extend RT PCRs Done
25,976,154 UART: [art] Lock RT PCRs Done
25,977,883 UART: [art] Populate DV Done
25,983,455 UART: [fht] FMC Alias Private Key: 7
25,985,192 UART: [art] Derive CDI
25,986,029 UART: [art] Store in slot 0x4
26,028,677 UART: [art] Derive Key Pair
26,029,672 UART: [art] Store priv key in slot 0x5
29,272,292 UART: [art] Derive Key Pair - Done
29,285,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,565,454 UART: [art] Erasing AUTHORITY.KEYID = 7
31,566,960 UART: [art] PUB.X = 30625A184E68C64BC1756E46543DC9C9B5772EE32252D2A2F77A1AE659265D18CCC835392E3D5B9C7FD85D1392DC3757
31,574,215 UART: [art] PUB.Y = 5234EBD06A5CECC499BC8C59111DD5C0E190032673D0C649654ACCBF1AC858DCBDAC83883026ADFA828962A75BDEFDC2
31,581,508 UART: [art] SIG.R = 091D0F580CBC3EFA39D85E6C173023EC0AA6685D005D29D9F5D528B2CFF57CF60592F41CB6778386DA757619128714C5
31,588,888 UART: [art] SIG.S = E652950DF71914D103227B3E7F3F88E884A017FDB7F4455F7DADBF263C6D43272AC61C7B2113193B9360032F0CBA864A
32,894,224 UART: Caliptra RT
32,894,948 UART: [state] CFI Enabled
33,027,953 UART: [rt] RT listening for mailbox commands...
33,029,873 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,059,791 UART: [rt]cmd =0x44504543, len=28
33,102,508 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
4,125,389 ready_for_fw is high
4,125,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,709 >>> mbox cmd response: success
23,802,429 UART:
23,802,872 UART: Running Caliptra FMC ...
23,804,038 UART:
23,804,229 UART: [state] CFI Enabled
23,812,169 UART: [fht] FMC Alias Private Key: 7
26,152,126 UART: [art] Extend RT PCRs Done
26,153,356 UART: [art] Lock RT PCRs Done
26,154,982 UART: [art] Populate DV Done
26,160,427 UART: [fht] FMC Alias Private Key: 7
26,161,922 UART: [art] Derive CDI
26,162,686 UART: [art] Store in slot 0x4
26,205,440 UART: [art] Derive Key Pair
26,206,439 UART: [art] Store priv key in slot 0x5
29,449,033 UART: [art] Derive Key Pair - Done
29,461,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,540 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,050 UART: [art] PUB.X = 47BB441BED745807F4AE016C4F8065CE5C5D3D5224DAC54F9145B6B43669331BA251FA3154CC91A6A9AE77DD6892465C
31,750,307 UART: [art] PUB.Y = 30A9C8449DCFA6D8590C95D9A3288C238C4E1BE53F22E5D7D17A0DEDAC3CF96195B521201AFAC7E4016842B2FBF6EA0C
31,757,592 UART: [art] SIG.R = 70EDBEB161573DC1FA84E7F0DECA6076D34F1D729B5061AA1681FB7524DAF535BA5214607A32FBEA4D0B45B508100F6E
31,765,008 UART: [art] SIG.S = 6B3C8A9D1F1D9D910A4260442A7B7F39092376192254E56E943E7CAF87092ECE8EA9AF73BF0FC4AADE43BF114FA52265
33,069,884 UART: Caliptra RT
33,070,602 UART: [state] CFI Enabled
33,205,185 UART: [rt] RT listening for mailbox commands...
33,207,109 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,237,084 UART: [rt]cmd =0x44504543, len=28
33,279,686 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
192,159 UART:
192,519 UART: Running Caliptra ROM ...
193,710 UART:
193,859 UART: [state] CFI Enabled
264,248 UART: [state] LifecycleState = Unprovisioned
266,168 UART: [state] DebugLocked = No
267,988 UART: [state] WD Timer not started. Device not locked for debugging
272,542 UART: [kat] SHA2-256
452,188 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,960 UART: [kat] ++
463,438 UART: [kat] sha1
474,736 UART: [kat] SHA2-256
477,453 UART: [kat] SHA2-384
484,512 UART: [kat] SHA2-512-ACC
486,875 UART: [kat] ECC-384
2,947,549 UART: [kat] HMAC-384Kdf
2,971,506 UART: [kat] LMS
3,447,947 UART: [kat] --
3,452,030 UART: [cold-reset] ++
3,454,530 UART: [fht] FHT @ 0x50003400
3,465,016 UART: [idev] ++
3,465,648 UART: [idev] CDI.KEYID = 6
3,466,550 UART: [idev] SUBJECT.KEYID = 7
3,467,809 UART: [idev] UDS.KEYID = 0
3,468,732 ready_for_fw is high
3,468,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,981 UART: [idev] Erasing UDS.KEYID = 0
5,988,464 UART: [idev] Sha1 KeyId Algorithm
6,012,174 UART: [idev] --
6,018,383 UART: [ldev] ++
6,018,951 UART: [ldev] CDI.KEYID = 6
6,019,886 UART: [ldev] SUBJECT.KEYID = 5
6,021,093 UART: [ldev] AUTHORITY.KEYID = 7
6,022,383 UART: [ldev] FE.KEYID = 1
6,061,686 UART: [ldev] Erasing FE.KEYID = 1
8,570,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,017 UART: [ldev] --
10,378,616 UART: [fwproc] Wait for Commands...
10,380,920 UART: [fwproc] Recv command 0x46574c44
10,382,950 UART: [fwproc] Recv'd Img size: 118548 bytes
13,873,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,954,746 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,027,742 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,356,193 >>> mbox cmd response: success
14,359,522 UART: [afmc] ++
14,360,135 UART: [afmc] CDI.KEYID = 6
14,361,018 UART: [afmc] SUBJECT.KEYID = 7
14,362,295 UART: [afmc] AUTHORITY.KEYID = 5
16,898,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,622,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,624,777 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,640,636 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,656,677 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,672,230 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,697,357 UART: [afmc] --
18,700,797 UART: [cold-reset] --
18,706,661 UART: [state] Locking Datavault
18,712,012 UART: [state] Locking PCR0, PCR1 and PCR31
18,713,764 UART: [state] Locking ICCM
18,714,935 UART: [exit] Launching FMC @ 0x40000130
18,723,327 UART:
18,723,564 UART: Running Caliptra FMC ...
18,724,663 UART:
18,724,816 UART: [state] CFI Enabled
18,779,440 UART: [fht] FMC Alias Private Key: 7
20,545,760 UART: [art] Extend RT PCRs Done
20,546,980 UART: [art] Lock RT PCRs Done
20,548,784 UART: [art] Populate DV Done
20,554,351 UART: [fht] FMC Alias Private Key: 7
20,555,827 UART: [art] Derive CDI
20,556,555 UART: [art] Store in slot 0x4
20,612,934 UART: [art] Derive Key Pair
20,613,975 UART: [art] Store priv key in slot 0x5
23,076,556 UART: [art] Derive Key Pair - Done
23,089,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,803,050 UART: [art] Erasing AUTHORITY.KEYID = 7
24,804,552 UART: [art] PUB.X = 608A537D84173AE42786ED3BBB52B8868F92ADF46CAA25F4828C7AFDE3AAF57B7CFF101B7A53D8F7060140404BEDE020
24,811,796 UART: [art] PUB.Y = 489DCCE238471DF107FEB63430F6EA86AFEF6D539415A5397C0429A7B71D4DBC6F915C2AE6DD9544D06123A914CA7C89
24,819,081 UART: [art] SIG.R = 0CEDA80659F400FD19F2013FCFA35C6801504B304CFDEDD5AD8071E4691FBBB27407E4BB3B7941488CAF81A6B5C521F5
24,826,481 UART: [art] SIG.S = 759070BAAAFDF53094015934AC7C32987587F6E4704307EB98B3A2E45A9AB37BE6293250B75EFF94F0CA19C903E104E9
25,805,474 UART: Caliptra RT
25,806,163 UART: [state] CFI Enabled
25,987,309 UART: [rt] RT listening for mailbox commands...
25,989,238 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,018,996 UART: [rt]cmd =0x44504543, len=28
26,061,942 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,457,035 ready_for_fw is high
3,457,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,595 >>> mbox cmd response: success
18,538,750 UART:
18,539,133 UART: Running Caliptra FMC ...
18,540,328 UART:
18,540,491 UART: [state] CFI Enabled
18,603,246 UART: [fht] FMC Alias Private Key: 7
20,369,782 UART: [art] Extend RT PCRs Done
20,371,008 UART: [art] Lock RT PCRs Done
20,372,638 UART: [art] Populate DV Done
20,378,168 UART: [fht] FMC Alias Private Key: 7
20,379,761 UART: [art] Derive CDI
20,380,573 UART: [art] Store in slot 0x4
20,436,374 UART: [art] Derive Key Pair
20,437,413 UART: [art] Store priv key in slot 0x5
22,899,782 UART: [art] Derive Key Pair - Done
22,912,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,397 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,042 UART: [art] PUB.X = 5AD527D08BC0B12C009EA795C43B579AA2597BF4B2831B60E91C2ABF10B52E175F89D05614F905792AD2BE6032408375
24,635,147 UART: [art] PUB.Y = 722321BE25D1F488501F16824143B5B016F6BB43BE6F0238122F73BA5C6D2DBBED87F8B559FC9AFF56BFFF7DD3CC0F0E
24,642,389 UART: [art] SIG.R = 1F8E99C9ECA45193E93A7EF36407A15092E64717074869757FE9B7620272D129A382813C4636CFA1502D4986DAC5D0E8
24,649,784 UART: [art] SIG.S = 73A0F501DAF6A8A410868CFB483F91CB482FD56FE38B521BE4F3C0E5ADA1805B39E4577FBADF3A676FD6903200B75A84
25,628,270 UART: Caliptra RT
25,628,983 UART: [state] CFI Enabled
25,810,412 UART: [rt] RT listening for mailbox commands...
25,812,322 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,842,340 UART: [rt]cmd =0x44504543, len=28
25,885,303 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,596 UART:
192,954 UART: Running Caliptra ROM ...
194,050 UART:
603,758 UART: [state] CFI Enabled
618,429 UART: [state] LifecycleState = Unprovisioned
620,366 UART: [state] DebugLocked = No
623,306 UART: [state] WD Timer not started. Device not locked for debugging
626,423 UART: [kat] SHA2-256
806,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,876 UART: [kat] ++
817,325 UART: [kat] sha1
828,625 UART: [kat] SHA2-256
831,353 UART: [kat] SHA2-384
836,637 UART: [kat] SHA2-512-ACC
839,015 UART: [kat] ECC-384
3,280,779 UART: [kat] HMAC-384Kdf
3,294,187 UART: [kat] LMS
3,770,710 UART: [kat] --
3,776,569 UART: [cold-reset] ++
3,777,580 UART: [fht] FHT @ 0x50003400
3,788,066 UART: [idev] ++
3,788,634 UART: [idev] CDI.KEYID = 6
3,789,562 UART: [idev] SUBJECT.KEYID = 7
3,790,812 UART: [idev] UDS.KEYID = 0
3,791,740 ready_for_fw is high
3,791,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,825 UART: [idev] Erasing UDS.KEYID = 0
6,272,414 UART: [idev] Sha1 KeyId Algorithm
6,294,685 UART: [idev] --
6,299,117 UART: [ldev] ++
6,299,691 UART: [ldev] CDI.KEYID = 6
6,300,657 UART: [ldev] SUBJECT.KEYID = 5
6,301,840 UART: [ldev] AUTHORITY.KEYID = 7
6,303,076 UART: [ldev] FE.KEYID = 1
6,315,301 UART: [ldev] Erasing FE.KEYID = 1
8,792,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,752 UART: [ldev] --
10,587,992 UART: [fwproc] Wait for Commands...
10,590,428 UART: [fwproc] Recv command 0x46574c44
10,592,419 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,614 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,635 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,552 >>> mbox cmd response: success
14,558,929 UART: [afmc] ++
14,559,517 UART: [afmc] CDI.KEYID = 6
14,560,435 UART: [afmc] SUBJECT.KEYID = 7
14,561,649 UART: [afmc] AUTHORITY.KEYID = 5
17,067,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,712 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,951 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,763 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,840 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,365 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,737 UART: [afmc] --
18,866,138 UART: [cold-reset] --
18,869,735 UART: [state] Locking Datavault
18,875,895 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,606 UART: [state] Locking ICCM
18,880,351 UART: [exit] Launching FMC @ 0x40000130
18,888,766 UART:
18,889,005 UART: Running Caliptra FMC ...
18,890,111 UART:
18,890,280 UART: [state] CFI Enabled
18,898,010 UART: [fht] FMC Alias Private Key: 7
20,664,297 UART: [art] Extend RT PCRs Done
20,665,509 UART: [art] Lock RT PCRs Done
20,667,432 UART: [art] Populate DV Done
20,672,739 UART: [fht] FMC Alias Private Key: 7
20,674,445 UART: [art] Derive CDI
20,675,181 UART: [art] Store in slot 0x4
20,717,993 UART: [art] Derive Key Pair
20,719,031 UART: [art] Store priv key in slot 0x5
23,145,531 UART: [art] Derive Key Pair - Done
23,158,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,150 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,674 UART: [art] PUB.X = B33E0BD18B9955E26F4F49D2E47CAD9271821954152EE88242638B34222FE7B9A2712B23D3B9C57A83EBC7763B5D38F6
24,873,929 UART: [art] PUB.Y = 7E73DCC120910E2561723194F297AB28C465884AD7D76E694F8836A74712145300D01EF96DAFD1CB7ECC02C1B532CECF
24,881,165 UART: [art] SIG.R = C295BAEA21946B92CF07FBC359C9F761F02765A816312053639BE85742348BDF67370693BA0E4CBED922F7DE6CFD01DE
24,888,560 UART: [art] SIG.S = FF23314EB272CA321810526A2B2C8079D428B1252B9DFAC9AE32CA14934B891B3E08F5ED25DEDA4B55ED79C147BDBF35
25,867,325 UART: Caliptra RT
25,868,021 UART: [state] CFI Enabled
26,001,091 UART: [rt] RT listening for mailbox commands...
26,003,006 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,032,999 UART: [rt]cmd =0x44504543, len=28
26,075,787 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,778,635 ready_for_fw is high
3,779,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,908 >>> mbox cmd response: success
18,692,074 UART:
18,692,457 UART: Running Caliptra FMC ...
18,693,574 UART:
18,693,734 UART: [state] CFI Enabled
18,701,737 UART: [fht] FMC Alias Private Key: 7
20,467,360 UART: [art] Extend RT PCRs Done
20,468,629 UART: [art] Lock RT PCRs Done
20,470,613 UART: [art] Populate DV Done
20,475,883 UART: [fht] FMC Alias Private Key: 7
20,477,321 UART: [art] Derive CDI
20,478,092 UART: [art] Store in slot 0x4
20,520,128 UART: [art] Derive Key Pair
20,521,172 UART: [art] Store priv key in slot 0x5
22,947,556 UART: [art] Derive Key Pair - Done
22,960,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,666,564 UART: [art] Erasing AUTHORITY.KEYID = 7
24,668,067 UART: [art] PUB.X = BCAE576B1F0E32E4E51AA83F6028AAE61AD720AD9E14AF937B8BE00D04D755A98155AE30E540F9313A47F2104B6B1BA9
24,675,339 UART: [art] PUB.Y = 056D2FA8CE069AF6F537A45FD400D36C1BC1D577F72DF3D992993EB820D6FBA79892A9C01CCB3C754BC582CAF44CCCE8
24,682,608 UART: [art] SIG.R = EEEBA236DD9255655608C17A373074B0C61B842CD444BB36ACFB64B3848E8F3D571EDBB652C9D8A7A8BA7CFFEFF4BC9F
24,690,024 UART: [art] SIG.S = 82E28FBB2987503E08DD413C8CA19B1CBCF01700AFDEF8AC6F2143E592B2A950150D7C34E8B3D53498349AA5C0BEDA77
25,668,830 UART: Caliptra RT
25,669,542 UART: [state] CFI Enabled
25,801,694 UART: [rt] RT listening for mailbox commands...
25,803,608 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,833,633 UART: [rt]cmd =0x44504543, len=28
25,876,520 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,908 writing to cptra_bootfsm_go
192,982 UART:
193,346 UART: Running Caliptra ROM ...
194,479 UART:
194,627 UART: [state] CFI Enabled
265,856 UART: [state] LifecycleState = Unprovisioned
268,258 UART: [state] DebugLocked = No
270,658 UART: [state] WD Timer not started. Device not locked for debugging
276,043 UART: [kat] SHA2-256
465,975 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,707 UART: [kat] ++
477,178 UART: [kat] sha1
487,214 UART: [kat] SHA2-256
490,181 UART: [kat] SHA2-384
496,383 UART: [kat] SHA2-512-ACC
498,958 UART: [kat] ECC-384
2,948,801 UART: [kat] HMAC-384Kdf
2,970,782 UART: [kat] LMS
3,502,567 UART: [kat] --
3,506,988 UART: [cold-reset] ++
3,507,991 UART: [fht] FHT @ 0x50003400
3,518,963 UART: [idev] ++
3,519,662 UART: [idev] CDI.KEYID = 6
3,520,763 UART: [idev] SUBJECT.KEYID = 7
3,521,884 UART: [idev] UDS.KEYID = 0
3,522,784 ready_for_fw is high
3,522,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,880 UART: [idev] Erasing UDS.KEYID = 0
6,029,515 UART: [idev] Sha1 KeyId Algorithm
6,052,104 UART: [idev] --
6,057,505 UART: [ldev] ++
6,058,187 UART: [ldev] CDI.KEYID = 6
6,059,152 UART: [ldev] SUBJECT.KEYID = 5
6,060,301 UART: [ldev] AUTHORITY.KEYID = 7
6,061,532 UART: [ldev] FE.KEYID = 1
6,100,674 UART: [ldev] Erasing FE.KEYID = 1
8,610,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,814 UART: [ldev] --
10,416,409 UART: [fwproc] Wait for Commands...
10,419,361 UART: [fwproc] Recv command 0x46574c44
10,421,674 UART: [fwproc] Recv'd Img size: 118548 bytes
13,925,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,819 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,687,145 >>> mbox cmd response: success
14,690,374 UART: [afmc] ++
14,691,079 UART: [afmc] CDI.KEYID = 6
14,692,266 UART: [afmc] SUBJECT.KEYID = 7
14,693,759 UART: [afmc] AUTHORITY.KEYID = 5
17,234,814 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,207 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,290 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,489 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,384 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,265 UART: [afmc] --
19,036,448 UART: [cold-reset] --
19,040,255 UART: [state] Locking Datavault
19,046,466 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,631 UART: [state] Locking ICCM
19,051,005 UART: [exit] Launching FMC @ 0x40000130
19,059,687 UART:
19,059,919 UART: Running Caliptra FMC ...
19,061,018 UART:
19,061,180 UART: [state] CFI Enabled
19,118,077 UART: [fht] FMC Alias Private Key: 7
20,884,911 UART: [art] Extend RT PCRs Done
20,886,151 UART: [art] Lock RT PCRs Done
20,887,611 UART: [art] Populate DV Done
20,893,286 UART: [fht] FMC Alias Private Key: 7
20,894,933 UART: [art] Derive CDI
20,895,741 UART: [art] Store in slot 0x4
20,951,258 UART: [art] Derive Key Pair
20,952,251 UART: [art] Store priv key in slot 0x5
23,415,205 UART: [art] Derive Key Pair - Done
23,428,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,140,584 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,089 UART: [art] PUB.X = 6D48A474FBA2DDB088D6FD1A79EB3A68D16B7EA4DB01F8E3706ECB1D959E33F7372027FD9787DE59C9504E93FFAA69E8
25,149,419 UART: [art] PUB.Y = 20D8556C5B29FFB706354B2A3BB8880A57BA6CE673B47FDEEF48A782CC70CC2B977EC805A96F953728136003D1D08508
25,156,677 UART: [art] SIG.R = F04B3B4870111B549EA62A08D0858C931AB7517688D32406AE0C7FD74A1AE72730ED40688CDFD24B2BC945DB25E04B0E
25,164,052 UART: [art] SIG.S = 6B198F4151D05B7F10CC2EDEC939C21035419EABAB0E6916332ACCAD1A22C2B6885D9F1B2AAD947D623BE9D3DC144953
26,143,439 UART: Caliptra RT
26,144,121 UART: [state] CFI Enabled
26,324,001 UART: [rt] RT listening for mailbox commands...
26,325,921 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,355,837 UART: [rt]cmd =0x44504543, len=28
26,398,983 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,437,925 ready_for_fw is high
3,438,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,020 >>> mbox cmd response: success
19,130,177 UART:
19,130,550 UART: Running Caliptra FMC ...
19,131,682 UART:
19,131,835 UART: [state] CFI Enabled
19,200,758 UART: [fht] FMC Alias Private Key: 7
20,988,478 UART: [art] Extend RT PCRs Done
20,989,708 UART: [art] Lock RT PCRs Done
20,991,254 UART: [art] Populate DV Done
20,996,565 UART: [fht] FMC Alias Private Key: 7
20,998,268 UART: [art] Derive CDI
20,999,084 UART: [art] Store in slot 0x4
21,054,675 UART: [art] Derive Key Pair
21,055,719 UART: [art] Store priv key in slot 0x5
23,518,609 UART: [art] Derive Key Pair - Done
23,531,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,244,854 UART: [art] Erasing AUTHORITY.KEYID = 7
25,246,390 UART: [art] PUB.X = 1E6D2920D8FDC47CB7FCE7EB74C24AC2FF49C4193DA3B9F2F01203F2D96AA0F620472CFA9ECE35B62D4B411483895C88
25,253,610 UART: [art] PUB.Y = 6A522277AFABEF92EE7253FE4C03B42FBB899C21F603FBF883551A16134994280B891DED9606399720FE12340E08D3CE
25,260,884 UART: [art] SIG.R = 4E6FDA287878317358098C4644E06F6A7FDBEC414197ACFC3F68EBAB24E26FFE95EDE2F0DBC5F7DB872447CF9E2E309E
25,268,271 UART: [art] SIG.S = F712EC9CCD6F9C7D36EDB3E79BC78A3619580E01AFC38B482B35501D6387693D37420BFE3C1079C933AC715FC2222459
26,247,271 UART: Caliptra RT
26,247,958 UART: [state] CFI Enabled
26,427,867 UART: [rt] RT listening for mailbox commands...
26,429,772 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,459,790 UART: [rt]cmd =0x44504543, len=28
26,502,613 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,436 UART:
192,820 UART: Running Caliptra ROM ...
193,927 UART:
603,461 UART: [state] CFI Enabled
616,450 UART: [state] LifecycleState = Unprovisioned
618,768 UART: [state] DebugLocked = No
620,227 UART: [state] WD Timer not started. Device not locked for debugging
623,998 UART: [kat] SHA2-256
813,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,654 UART: [kat] ++
825,138 UART: [kat] sha1
837,648 UART: [kat] SHA2-256
840,665 UART: [kat] SHA2-384
846,948 UART: [kat] SHA2-512-ACC
849,533 UART: [kat] ECC-384
3,290,018 UART: [kat] HMAC-384Kdf
3,301,612 UART: [kat] LMS
3,833,463 UART: [kat] --
3,838,103 UART: [cold-reset] ++
3,839,256 UART: [fht] FHT @ 0x50003400
3,849,880 UART: [idev] ++
3,850,588 UART: [idev] CDI.KEYID = 6
3,851,546 UART: [idev] SUBJECT.KEYID = 7
3,852,797 UART: [idev] UDS.KEYID = 0
3,853,995 ready_for_fw is high
3,854,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,146 UART: [idev] Erasing UDS.KEYID = 0
6,325,251 UART: [idev] Sha1 KeyId Algorithm
6,346,735 UART: [idev] --
6,351,885 UART: [ldev] ++
6,352,570 UART: [ldev] CDI.KEYID = 6
6,353,482 UART: [ldev] SUBJECT.KEYID = 5
6,354,696 UART: [ldev] AUTHORITY.KEYID = 7
6,355,876 UART: [ldev] FE.KEYID = 1
6,366,903 UART: [ldev] Erasing FE.KEYID = 1
8,845,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,162 UART: [ldev] --
10,638,607 UART: [fwproc] Wait for Commands...
10,641,351 UART: [fwproc] Recv command 0x46574c44
10,643,608 UART: [fwproc] Recv'd Img size: 118548 bytes
14,137,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,211,339 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,334,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,895,213 >>> mbox cmd response: success
14,898,468 UART: [afmc] ++
14,899,194 UART: [afmc] CDI.KEYID = 6
14,900,391 UART: [afmc] SUBJECT.KEYID = 7
14,901,840 UART: [afmc] AUTHORITY.KEYID = 5
17,409,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,131,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,133,515 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,148,656 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,163,771 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,178,664 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,201,181 UART: [afmc] --
19,203,978 UART: [cold-reset] --
19,207,052 UART: [state] Locking Datavault
19,213,733 UART: [state] Locking PCR0, PCR1 and PCR31
19,215,895 UART: [state] Locking ICCM
19,218,706 UART: [exit] Launching FMC @ 0x40000130
19,227,419 UART:
19,227,703 UART: Running Caliptra FMC ...
19,228,818 UART:
19,228,981 UART: [state] CFI Enabled
19,236,764 UART: [fht] FMC Alias Private Key: 7
21,003,128 UART: [art] Extend RT PCRs Done
21,004,347 UART: [art] Lock RT PCRs Done
21,005,903 UART: [art] Populate DV Done
21,011,537 UART: [fht] FMC Alias Private Key: 7
21,013,156 UART: [art] Derive CDI
21,013,984 UART: [art] Store in slot 0x4
21,056,639 UART: [art] Derive Key Pair
21,057,644 UART: [art] Store priv key in slot 0x5
23,484,871 UART: [art] Derive Key Pair - Done
23,497,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,985 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,483 UART: [art] PUB.X = AA583324B97D3B6C0C7ED282D298A8BEDEF4E254D9BAB510D83E234BEC2050F79C294BFE7D80B523C8ADA6C14421303F
25,212,756 UART: [art] PUB.Y = 1C204B4AF3FC4A5BFB97E38DA68419DAEFCFDBD65691A080CF160839AB814C935C8FD90CC3F4C2850D80316F4F45E5C2
25,220,065 UART: [art] SIG.R = D6C9F26F7331A9C8DD53800CAB712D48DEF0780937811ED94074DFDC48BD97FCBFC809B85FE9E602536E3A3E9DBDD6BF
25,227,515 UART: [art] SIG.S = 517054C3E8FE621E168B8001421ACAEF2C97123C0FAFFDB7810195DA79D78DBD22B5E0E46E1D8B3DD2604EFC9F017BB5
26,206,341 UART: Caliptra RT
26,207,057 UART: [state] CFI Enabled
26,339,628 UART: [rt] RT listening for mailbox commands...
26,341,554 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,371,744 UART: [rt]cmd =0x44504543, len=28
26,414,743 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,758,568 ready_for_fw is high
3,759,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,061,728 >>> mbox cmd response: success
19,317,733 UART:
19,318,135 UART: Running Caliptra FMC ...
19,319,338 UART:
19,319,514 UART: [state] CFI Enabled
19,327,644 UART: [fht] FMC Alias Private Key: 7
21,093,351 UART: [art] Extend RT PCRs Done
21,094,585 UART: [art] Lock RT PCRs Done
21,095,840 UART: [art] Populate DV Done
21,101,058 UART: [fht] FMC Alias Private Key: 7
21,102,562 UART: [art] Derive CDI
21,103,349 UART: [art] Store in slot 0x4
21,145,688 UART: [art] Derive Key Pair
21,146,731 UART: [art] Store priv key in slot 0x5
23,573,720 UART: [art] Derive Key Pair - Done
23,586,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,293,131 UART: [art] Erasing AUTHORITY.KEYID = 7
25,294,640 UART: [art] PUB.X = D67F72FEE2FB64E273AB6AB3C5C97B31CD6A51EC64D8A6E190DCF51CCBE5A8119B730F3CD05473DDE32D6D9952AD7E2E
25,301,936 UART: [art] PUB.Y = 915BB4C50795B696C70F0FD8214AAB3B647805EA16D7EBF1040EE6A7F7370E8AE5596AD137167C65D0497EB3F2915DD9
25,309,201 UART: [art] SIG.R = 7C42E465067CE1F05106A17EC334F141979183060A3023E0C43F0CF701A46C3ECA7D14BABDD005BD4EDF259155EC26EE
25,316,553 UART: [art] SIG.S = 6C459EB5D1AF7890E721809AA664F44DE7B024F2284947AD9BECBBB882605454280E6E134FF27FBFC3C40925F6E18A0E
26,295,437 UART: Caliptra RT
26,296,147 UART: [state] CFI Enabled
26,429,811 UART: [rt] RT listening for mailbox commands...
26,431,736 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,461,767 UART: [rt]cmd =0x44504543, len=28
26,504,600 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,013 UART: [kat] SHA2-256
881,944 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,059 UART: [kat] ++
886,211 UART: [kat] sha1
890,685 UART: [kat] SHA2-256
892,623 UART: [kat] SHA2-384
895,254 UART: [kat] SHA2-512-ACC
897,155 UART: [kat] ECC-384
902,328 UART: [kat] HMAC-384Kdf
906,920 UART: [kat] LMS
1,475,116 UART: [kat] --
1,476,153 UART: [cold-reset] ++
1,476,697 UART: [fht] Storing FHT @ 0x50003400
1,479,318 UART: [idev] ++
1,479,486 UART: [idev] CDI.KEYID = 6
1,479,846 UART: [idev] SUBJECT.KEYID = 7
1,480,270 UART: [idev] UDS.KEYID = 0
1,480,615 ready_for_fw is high
1,480,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,254 UART: [idev] Erasing UDS.KEYID = 0
1,504,494 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,074 UART: [idev] --
1,514,125 UART: [ldev] ++
1,514,293 UART: [ldev] CDI.KEYID = 6
1,514,656 UART: [ldev] SUBJECT.KEYID = 5
1,515,082 UART: [ldev] AUTHORITY.KEYID = 7
1,515,545 UART: [ldev] FE.KEYID = 1
1,520,589 UART: [ldev] Erasing FE.KEYID = 1
1,546,006 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,096 UART: [ldev] --
1,585,507 UART: [fwproc] Waiting for Commands...
1,586,170 UART: [fwproc] Received command 0x46574c44
1,586,961 UART: [fwproc] Received Image of size 118548 bytes
2,932,369 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,617 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,835 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,084 >>> mbox cmd response: success
3,132,252 UART: [afmc] ++
3,132,420 UART: [afmc] CDI.KEYID = 6
3,132,782 UART: [afmc] SUBJECT.KEYID = 7
3,133,207 UART: [afmc] AUTHORITY.KEYID = 5
3,168,254 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,500 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,280 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,989 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,872 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,555 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,253 UART: [afmc] --
3,211,369 UART: [cold-reset] --
3,212,293 UART: [state] Locking Datavault
3,213,578 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,182 UART: [state] Locking ICCM
3,214,778 UART: [exit] Launching FMC @ 0x40000130
3,220,108 UART:
3,220,124 UART: Running Caliptra FMC ...
3,220,532 UART:
3,220,586 UART: [state] CFI Enabled
3,231,024 UART: [fht] FMC Alias Private Key: 7
3,350,128 UART: [art] Extend RT PCRs Done
3,350,556 UART: [art] Lock RT PCRs Done
3,352,176 UART: [art] Populate DV Done
3,360,463 UART: [fht] FMC Alias Private Key: 7
3,361,643 UART: [art] Derive CDI
3,361,923 UART: [art] Store in slot 0x4
3,447,495 UART: [art] Derive Key Pair
3,447,855 UART: [art] Store priv key in slot 0x5
3,461,516 UART: [art] Derive Key Pair - Done
3,475,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,125 UART: [art] PUB.X = E388E3F7F5C74D424CFAAF8BD1D47E1BAA06E1C6F86442AE3BB6A830B139E11E3C256F0D0F346B6A4F31EBFE1975612A
3,498,906 UART: [art] PUB.Y = BA515E159B4DFBFE0B6C058B6C237DA8AF8CF996DC69D918426139C2CFD98E3410324A3F31574103A475B10D5FD9A9FA
3,505,856 UART: [art] SIG.R = 7C00DE9B04BEEE3D4E0431366737BA0946135F8AAFD70A6EFFD1639CF5C7D2595E4CEEAA59FF1E90EA9C2675308E6F67
3,512,610 UART: [art] SIG.S = FBD17DCCB7EB12EC88A82C8E4425372C136F331780B01F922B6A6BADFB6606ECD7FE4AA521659C3F446431BA59C67550
3,536,467 UART: Caliptra RT
3,536,718 UART: [state] CFI Enabled
3,657,066 UART: [rt] RT listening for mailbox commands...
3,657,736 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,928 UART: [rt]cmd =0x44504543, len=28
3,731,189 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,971 ready_for_fw is high
1,362,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,762 >>> mbox cmd response: success
3,042,773 UART:
3,042,789 UART: Running Caliptra FMC ...
3,043,197 UART:
3,043,251 UART: [state] CFI Enabled
3,053,833 UART: [fht] FMC Alias Private Key: 7
3,172,903 UART: [art] Extend RT PCRs Done
3,173,331 UART: [art] Lock RT PCRs Done
3,174,947 UART: [art] Populate DV Done
3,183,142 UART: [fht] FMC Alias Private Key: 7
3,184,282 UART: [art] Derive CDI
3,184,562 UART: [art] Store in slot 0x4
3,270,288 UART: [art] Derive Key Pair
3,270,648 UART: [art] Store priv key in slot 0x5
3,284,261 UART: [art] Derive Key Pair - Done
3,299,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,463 UART: [art] PUB.X = 9CBC94DCA7E4B3D7C1E8E6A0D1056856A2115DA3E42F8783768F8DF7E149D5501706654BFF62E54B3BB9522D437D5D6F
3,322,235 UART: [art] PUB.Y = 16EF5B47876E69B1386B51E2CCDEF704EAF772E8A73ED4CF17A4BFCB6F3208742386AE7044AA1A396A9DE249DEB6AEB9
3,329,199 UART: [art] SIG.R = 6BF7EEDC01C4682AE0E186C90FC113EC0734CFE8FEAD87C7F393FA160CCC4688552C35CE58F5AE3E845A939F8EA067D0
3,335,977 UART: [art] SIG.S = CF861EE2D7653F3DD2301A23A3FC659842B335ADDA0D4537BF27EB03AF44A3CEBEC3E474DC006DFC2FB5FFEFACCE0011
3,359,971 UART: Caliptra RT
3,360,222 UART: [state] CFI Enabled
3,480,328 UART: [rt] RT listening for mailbox commands...
3,480,998 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,198 UART: [rt]cmd =0x44504543, len=28
3,554,329 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
87,014 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,678 UART: [kat] SHA2-256
882,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,724 UART: [kat] ++
886,876 UART: [kat] sha1
891,238 UART: [kat] SHA2-256
893,176 UART: [kat] SHA2-384
896,029 UART: [kat] SHA2-512-ACC
897,930 UART: [kat] ECC-384
903,451 UART: [kat] HMAC-384Kdf
908,323 UART: [kat] LMS
1,476,519 UART: [kat] --
1,477,498 UART: [cold-reset] ++
1,477,834 UART: [fht] Storing FHT @ 0x50003400
1,480,703 UART: [idev] ++
1,480,871 UART: [idev] CDI.KEYID = 6
1,481,231 UART: [idev] SUBJECT.KEYID = 7
1,481,655 UART: [idev] UDS.KEYID = 0
1,482,000 ready_for_fw is high
1,482,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,951 UART: [idev] Erasing UDS.KEYID = 0
1,506,345 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,907 UART: [idev] --
1,515,746 UART: [ldev] ++
1,515,914 UART: [ldev] CDI.KEYID = 6
1,516,277 UART: [ldev] SUBJECT.KEYID = 5
1,516,703 UART: [ldev] AUTHORITY.KEYID = 7
1,517,166 UART: [ldev] FE.KEYID = 1
1,522,262 UART: [ldev] Erasing FE.KEYID = 1
1,548,029 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,085 UART: [ldev] --
1,587,470 UART: [fwproc] Waiting for Commands...
1,588,145 UART: [fwproc] Received command 0x46574c44
1,588,936 UART: [fwproc] Received Image of size 118548 bytes
2,934,036 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,694 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,912 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,261 >>> mbox cmd response: success
3,134,377 UART: [afmc] ++
3,134,545 UART: [afmc] CDI.KEYID = 6
3,134,907 UART: [afmc] SUBJECT.KEYID = 7
3,135,332 UART: [afmc] AUTHORITY.KEYID = 5
3,169,617 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,805 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,585 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,294 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,177 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,860 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,564 UART: [afmc] --
3,212,574 UART: [cold-reset] --
3,213,714 UART: [state] Locking Datavault
3,215,095 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,699 UART: [state] Locking ICCM
3,216,217 UART: [exit] Launching FMC @ 0x40000130
3,221,547 UART:
3,221,563 UART: Running Caliptra FMC ...
3,221,971 UART:
3,222,114 UART: [state] CFI Enabled
3,232,648 UART: [fht] FMC Alias Private Key: 7
3,351,302 UART: [art] Extend RT PCRs Done
3,351,730 UART: [art] Lock RT PCRs Done
3,353,428 UART: [art] Populate DV Done
3,361,621 UART: [fht] FMC Alias Private Key: 7
3,362,617 UART: [art] Derive CDI
3,362,897 UART: [art] Store in slot 0x4
3,448,613 UART: [art] Derive Key Pair
3,448,973 UART: [art] Store priv key in slot 0x5
3,462,282 UART: [art] Derive Key Pair - Done
3,477,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,797 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,562 UART: [art] PUB.X = AA5AF2E6DEE9663190DE2AE9F7748EBAAEE0C439F8FFF0E30C25FE3CDB55F399DD1E5E1FEE89FB2C9A2ECAD7CE1C067E
3,500,366 UART: [art] PUB.Y = 495EE2E3C7874886644AB5A14AD3EEBC3665C8336AE39DCD75C84632FC6C2A9C85AE79FD88F892827E35778B05DEEC92
3,507,323 UART: [art] SIG.R = D778B282EF9045423559C4AC8DD84F1A4D1F5914E35D5F25EB34A153DA8168BB8581BE6476961DE7EC2C0FFF0028DFA9
3,514,078 UART: [art] SIG.S = 6693B894B6E7D098B5D7DDDC111CB8255A69661600DFF8FBD2ABA95CC3E382A9307448307468F528631275E9016DF778
3,538,207 UART: Caliptra RT
3,538,550 UART: [state] CFI Enabled
3,658,960 UART: [rt] RT listening for mailbox commands...
3,659,630 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,342 UART: [rt]cmd =0x44504543, len=28
3,732,645 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,408 ready_for_fw is high
1,362,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,279 >>> mbox cmd response: success
3,042,430 UART:
3,042,446 UART: Running Caliptra FMC ...
3,042,854 UART:
3,042,997 UART: [state] CFI Enabled
3,053,675 UART: [fht] FMC Alias Private Key: 7
3,172,671 UART: [art] Extend RT PCRs Done
3,173,099 UART: [art] Lock RT PCRs Done
3,174,309 UART: [art] Populate DV Done
3,182,646 UART: [fht] FMC Alias Private Key: 7
3,183,688 UART: [art] Derive CDI
3,183,968 UART: [art] Store in slot 0x4
3,269,958 UART: [art] Derive Key Pair
3,270,318 UART: [art] Store priv key in slot 0x5
3,283,345 UART: [art] Derive Key Pair - Done
3,297,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,137 UART: [art] PUB.X = 714FFA1E54C797E2DB83D158119664B5E09A05E9FFB5F3733B3C7D81E3326B491C923882C3DFECBF5DBFEA076E55F079
3,320,913 UART: [art] PUB.Y = F18DD9F6A307B3F4AC022C44311CDCC93BFF5069D5B0AC9EEF583E7692D81E4F748703437CDBAE9461D88686602036EB
3,327,864 UART: [art] SIG.R = E17E72772A28CE9B04997979319CD2D77D85547FDBAF170C065F8247C4392E2B405D6C8813651E15C457F806D90A4A32
3,334,613 UART: [art] SIG.S = E4B3971598E3CF3EACD4CA167C52ED971E2C9BD0226DCE26B6DEE5F33F58D98335EC0DECE32856DA8F1897411EBC2357
3,358,622 UART: Caliptra RT
3,358,965 UART: [state] CFI Enabled
3,479,344 UART: [rt] RT listening for mailbox commands...
3,480,014 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,960 UART: [rt]cmd =0x44504543, len=28
3,553,145 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
891,230 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,205 UART: [kat] SHA2-512-ACC
906,106 UART: [kat] ECC-384
915,573 UART: [kat] HMAC-384Kdf
920,333 UART: [kat] LMS
1,168,645 UART: [kat] --
1,169,532 UART: [cold-reset] ++
1,169,996 UART: [fht] FHT @ 0x50003400
1,172,732 UART: [idev] ++
1,172,900 UART: [idev] CDI.KEYID = 6
1,173,261 UART: [idev] SUBJECT.KEYID = 7
1,173,686 UART: [idev] UDS.KEYID = 0
1,174,032 ready_for_fw is high
1,174,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,923 UART: [idev] Erasing UDS.KEYID = 0
1,199,055 UART: [idev] Sha1 KeyId Algorithm
1,207,981 UART: [idev] --
1,209,170 UART: [ldev] ++
1,209,338 UART: [ldev] CDI.KEYID = 6
1,209,702 UART: [ldev] SUBJECT.KEYID = 5
1,210,129 UART: [ldev] AUTHORITY.KEYID = 7
1,210,592 UART: [ldev] FE.KEYID = 1
1,215,758 UART: [ldev] Erasing FE.KEYID = 1
1,242,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,832 UART: [ldev] --
1,281,219 UART: [fwproc] Wait for Commands...
1,281,894 UART: [fwproc] Recv command 0x46574c44
1,282,627 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,171 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,346 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,591 >>> mbox cmd response: success
2,827,719 UART: [afmc] ++
2,827,887 UART: [afmc] CDI.KEYID = 6
2,828,250 UART: [afmc] SUBJECT.KEYID = 7
2,828,676 UART: [afmc] AUTHORITY.KEYID = 5
2,864,189 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,985 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,695 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,576 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,277 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,106 UART: [afmc] --
2,907,115 UART: [cold-reset] --
2,907,971 UART: [state] Locking Datavault
2,908,988 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,592 UART: [state] Locking ICCM
2,910,092 UART: [exit] Launching FMC @ 0x40000130
2,915,422 UART:
2,915,438 UART: Running Caliptra FMC ...
2,915,846 UART:
2,915,900 UART: [state] CFI Enabled
2,926,516 UART: [fht] FMC Alias Private Key: 7
3,045,760 UART: [art] Extend RT PCRs Done
3,046,188 UART: [art] Lock RT PCRs Done
3,048,030 UART: [art] Populate DV Done
3,056,115 UART: [fht] FMC Alias Private Key: 7
3,057,081 UART: [art] Derive CDI
3,057,361 UART: [art] Store in slot 0x4
3,143,120 UART: [art] Derive Key Pair
3,143,480 UART: [art] Store priv key in slot 0x5
3,156,714 UART: [art] Derive Key Pair - Done
3,171,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,273 UART: [art] PUB.X = FA749AA4F8F33A61654B6DA4441E4F51B54BC95C8B780802EA20B0FC43EFDC2278615BB66651EBA641ADDC312AE93124
3,195,049 UART: [art] PUB.Y = AE6B622EC3FC54AA4A585ED804A297267DB91D74B2645954241E9BDCF179637C16624F21F5BAA05645A3A360ABB541EF
3,202,004 UART: [art] SIG.R = F75C720605FC94F6E1A82778BD3922010A109BC8964CED1B007B40C47008A2EEFF0E9A4AA5182C6C6E7A317ECA2B7114
3,208,742 UART: [art] SIG.S = B5F729EAFE20812B2358CF3BFE0CD0FE18F410FDBAA9FA1C4D2ABEF9D46233B85E1CFA703A11166B0C6BA50652868F90
3,232,857 UART: Caliptra RT
3,233,108 UART: [state] CFI Enabled
3,353,108 UART: [rt] RT listening for mailbox commands...
3,353,778 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,412 UART: [rt]cmd =0x44504543, len=28
3,427,371 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,576 ready_for_fw is high
1,058,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,408 >>> mbox cmd response: success
2,741,205 UART:
2,741,221 UART: Running Caliptra FMC ...
2,741,629 UART:
2,741,683 UART: [state] CFI Enabled
2,752,051 UART: [fht] FMC Alias Private Key: 7
2,870,999 UART: [art] Extend RT PCRs Done
2,871,427 UART: [art] Lock RT PCRs Done
2,873,087 UART: [art] Populate DV Done
2,881,202 UART: [fht] FMC Alias Private Key: 7
2,882,170 UART: [art] Derive CDI
2,882,450 UART: [art] Store in slot 0x4
2,968,149 UART: [art] Derive Key Pair
2,968,509 UART: [art] Store priv key in slot 0x5
2,981,733 UART: [art] Derive Key Pair - Done
2,996,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,094 UART: [art] PUB.X = B7F97C4C937F9294994A7EB5DD9E4CCDB40E2EEE397E1A4CD212C71B272B4FF9611D6F74DC1E08BC40DA3AF9AF255C3B
3,019,882 UART: [art] PUB.Y = BD57BE6ED7DA05A49726C52770B2F71DD879150465B574B2CF138EE29497688F3D6F478016576F44F0B4B5FC72735747
3,026,822 UART: [art] SIG.R = 948AE1C8EB7A8DB30AE1F01F5CE379A2BA45DDBE672F0EC49AD55C5754A67A1BFA63C2D2FCBE280D9E6E66A822432023
3,033,605 UART: [art] SIG.S = 609D7F1F7D32D2BE9D9304DDB745086BE94E60B0BBEE25BBB56247CD386B3CF935D419849CC803F8622C7018D26232AC
3,057,746 UART: Caliptra RT
3,057,997 UART: [state] CFI Enabled
3,177,696 UART: [rt] RT listening for mailbox commands...
3,178,366 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,312 UART: [rt]cmd =0x44504543, len=28
3,251,829 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,919 UART: [state] LifecycleState = Unprovisioned
85,574 UART: [state] DebugLocked = No
86,168 UART: [state] WD Timer not started. Device not locked for debugging
87,489 UART: [kat] SHA2-256
891,039 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,497 UART: [kat] SHA2-256
901,437 UART: [kat] SHA2-384
904,200 UART: [kat] SHA2-512-ACC
906,101 UART: [kat] ECC-384
915,934 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,169,959 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,173,161 UART: [idev] ++
1,173,329 UART: [idev] CDI.KEYID = 6
1,173,690 UART: [idev] SUBJECT.KEYID = 7
1,174,115 UART: [idev] UDS.KEYID = 0
1,174,461 ready_for_fw is high
1,174,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,010 UART: [idev] Erasing UDS.KEYID = 0
1,199,454 UART: [idev] Sha1 KeyId Algorithm
1,208,376 UART: [idev] --
1,209,249 UART: [ldev] ++
1,209,417 UART: [ldev] CDI.KEYID = 6
1,209,781 UART: [ldev] SUBJECT.KEYID = 5
1,210,208 UART: [ldev] AUTHORITY.KEYID = 7
1,210,671 UART: [ldev] FE.KEYID = 1
1,215,971 UART: [ldev] Erasing FE.KEYID = 1
1,242,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,807 UART: [ldev] --
1,282,258 UART: [fwproc] Wait for Commands...
1,282,915 UART: [fwproc] Recv command 0x46574c44
1,283,648 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,950 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,125 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,510 >>> mbox cmd response: success
2,827,604 UART: [afmc] ++
2,827,772 UART: [afmc] CDI.KEYID = 6
2,828,135 UART: [afmc] SUBJECT.KEYID = 7
2,828,561 UART: [afmc] AUTHORITY.KEYID = 5
2,864,508 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,701 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,450 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,160 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,041 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,742 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,501 UART: [afmc] --
2,907,458 UART: [cold-reset] --
2,908,434 UART: [state] Locking Datavault
2,909,753 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,357 UART: [state] Locking ICCM
2,910,811 UART: [exit] Launching FMC @ 0x40000130
2,916,141 UART:
2,916,157 UART: Running Caliptra FMC ...
2,916,565 UART:
2,916,708 UART: [state] CFI Enabled
2,927,160 UART: [fht] FMC Alias Private Key: 7
3,045,914 UART: [art] Extend RT PCRs Done
3,046,342 UART: [art] Lock RT PCRs Done
3,047,868 UART: [art] Populate DV Done
3,056,203 UART: [fht] FMC Alias Private Key: 7
3,057,337 UART: [art] Derive CDI
3,057,617 UART: [art] Store in slot 0x4
3,143,608 UART: [art] Derive Key Pair
3,143,968 UART: [art] Store priv key in slot 0x5
3,157,490 UART: [art] Derive Key Pair - Done
3,172,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,241 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,006 UART: [art] PUB.X = AE95ED73C420DD07CE1BE82013E920054E3BC129D17125E8605D22DB8BB4CD5A20A67F6C8D1C1164BBCE70F18B192FB4
3,195,784 UART: [art] PUB.Y = CCB0B4D9651397FE427CBC55D29CBEBCF9A4AA92883449748A5D0317B17176521C9F30C58DC41A72F5518331A9075770
3,202,728 UART: [art] SIG.R = 55443A416D69469CA0B3DECC10110A5B912946814EE621A66B64DBCA2168D68096919810B44F7FD39097A74D1C5AE70B
3,209,490 UART: [art] SIG.S = E81CDBB98D224C21CB7CA71FDFD89995EBCFFC61A814258646E9998F273700989ACE34D55EA6238EFA1E84606F9E55A1
3,233,682 UART: Caliptra RT
3,234,025 UART: [state] CFI Enabled
3,354,248 UART: [rt] RT listening for mailbox commands...
3,354,918 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,130 UART: [rt]cmd =0x44504543, len=28
3,428,595 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,791 ready_for_fw is high
1,059,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,797 >>> mbox cmd response: success
2,741,432 UART:
2,741,448 UART: Running Caliptra FMC ...
2,741,856 UART:
2,741,999 UART: [state] CFI Enabled
2,752,629 UART: [fht] FMC Alias Private Key: 7
2,871,475 UART: [art] Extend RT PCRs Done
2,871,903 UART: [art] Lock RT PCRs Done
2,873,727 UART: [art] Populate DV Done
2,881,884 UART: [fht] FMC Alias Private Key: 7
2,882,884 UART: [art] Derive CDI
2,883,164 UART: [art] Store in slot 0x4
2,969,095 UART: [art] Derive Key Pair
2,969,455 UART: [art] Store priv key in slot 0x5
2,982,827 UART: [art] Derive Key Pair - Done
2,997,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,940 UART: [art] PUB.X = 0CCD2F178AA66F24405C78DF3BE88BD702AF757A05990FF0BC86E4124025A0F3293AC2749A3C5EF5E0B8912BBB26F07A
3,020,710 UART: [art] PUB.Y = D095106A1B16A6C6215BFF27E49448DAFA80A03525ACA956E5492F9D4659949E05A97FA5725B121684F6A1C2A70C8684
3,027,652 UART: [art] SIG.R = 3365D8C5C2454FA10A5DB928FEC36E30CD3F96D695AB20C7BE3BE682F618DE472B8B076A22ADA37735BE0FEBD692C150
3,034,429 UART: [art] SIG.S = 72EC8886F8B46BA03E5502E2E208792C385C44F26F862E84B2BE9A4ED4344B937A34ECCC6E03A90081CBD897FF7AEFF6
3,058,192 UART: Caliptra RT
3,058,535 UART: [state] CFI Enabled
3,178,571 UART: [rt] RT listening for mailbox commands...
3,179,241 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,043 UART: [rt]cmd =0x44504543, len=28
3,252,496 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
893,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,547 UART: [kat] ++
897,699 UART: [kat] sha1
901,981 UART: [kat] SHA2-256
903,921 UART: [kat] SHA2-384
906,624 UART: [kat] SHA2-512-ACC
908,525 UART: [kat] ECC-384
918,058 UART: [kat] HMAC-384Kdf
922,796 UART: [kat] LMS
1,171,124 UART: [kat] --
1,171,797 UART: [cold-reset] ++
1,172,321 UART: [fht] FHT @ 0x50003400
1,175,044 UART: [idev] ++
1,175,212 UART: [idev] CDI.KEYID = 6
1,175,572 UART: [idev] SUBJECT.KEYID = 7
1,175,996 UART: [idev] UDS.KEYID = 0
1,176,341 ready_for_fw is high
1,176,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,742 UART: [idev] Erasing UDS.KEYID = 0
1,201,075 UART: [idev] Sha1 KeyId Algorithm
1,209,573 UART: [idev] --
1,210,465 UART: [ldev] ++
1,210,633 UART: [ldev] CDI.KEYID = 6
1,210,996 UART: [ldev] SUBJECT.KEYID = 5
1,211,422 UART: [ldev] AUTHORITY.KEYID = 7
1,211,885 UART: [ldev] FE.KEYID = 1
1,216,951 UART: [ldev] Erasing FE.KEYID = 1
1,242,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,273 UART: [ldev] --
1,282,732 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,626 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,796 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,101 >>> mbox cmd response: success
2,828,195 UART: [afmc] ++
2,828,363 UART: [afmc] CDI.KEYID = 6
2,828,725 UART: [afmc] SUBJECT.KEYID = 7
2,829,150 UART: [afmc] AUTHORITY.KEYID = 5
2,864,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,818 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,527 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,410 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,111 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,859 UART: [afmc] --
2,907,931 UART: [cold-reset] --
2,908,637 UART: [state] Locking Datavault
2,909,902 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,506 UART: [state] Locking ICCM
2,911,026 UART: [exit] Launching FMC @ 0x40000130
2,916,356 UART:
2,916,372 UART: Running Caliptra FMC ...
2,916,780 UART:
2,916,834 UART: [state] CFI Enabled
2,927,712 UART: [fht] FMC Alias Private Key: 7
3,046,324 UART: [art] Extend RT PCRs Done
3,046,752 UART: [art] Lock RT PCRs Done
3,048,114 UART: [art] Populate DV Done
3,056,529 UART: [fht] FMC Alias Private Key: 7
3,057,477 UART: [art] Derive CDI
3,057,757 UART: [art] Store in slot 0x4
3,143,936 UART: [art] Derive Key Pair
3,144,296 UART: [art] Store priv key in slot 0x5
3,157,880 UART: [art] Derive Key Pair - Done
3,172,674 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,940 UART: [art] PUB.X = 165F7AA895FF11F67FB003A06FED532D4319D3D7C1407FEEE7B76E20F8E641576FC3382B8689C6191D39A9787B9AD5C0
3,195,713 UART: [art] PUB.Y = D13C12B9E5B4ED8CD21A6BCDED2CB7F130C732D867DEBB7A3D19E3CAECDE044ED1D30FD07BE2943314CE12AA83C72F7A
3,202,689 UART: [art] SIG.R = 0AF579262C817D6C8AD9A809F1CEBB9C5F6761CC969F577BBD850FD44E46E1E9668C43F239DB65E4B251B559DAF72950
3,209,460 UART: [art] SIG.S = 805D310974FDE25DD8E7F327B783E4FFA1BBE7C281059ACE924A55DFEAD252A1F274C058FB8A65352DCA691059134DBB
3,233,152 UART: Caliptra RT
3,233,403 UART: [state] CFI Enabled
3,353,108 UART: [rt] RT listening for mailbox commands...
3,353,778 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,790 UART: [rt]cmd =0x44504543, len=28
3,427,073 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,493 ready_for_fw is high
1,060,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,478 >>> mbox cmd response: success
2,740,481 UART:
2,740,497 UART: Running Caliptra FMC ...
2,740,905 UART:
2,740,959 UART: [state] CFI Enabled
2,751,693 UART: [fht] FMC Alias Private Key: 7
2,870,397 UART: [art] Extend RT PCRs Done
2,870,825 UART: [art] Lock RT PCRs Done
2,872,285 UART: [art] Populate DV Done
2,880,468 UART: [fht] FMC Alias Private Key: 7
2,881,508 UART: [art] Derive CDI
2,881,788 UART: [art] Store in slot 0x4
2,967,729 UART: [art] Derive Key Pair
2,968,089 UART: [art] Store priv key in slot 0x5
2,981,233 UART: [art] Derive Key Pair - Done
2,996,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,216 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,981 UART: [art] PUB.X = 55B7CB116CB19045377656E80B46C025DAC100D7E5971A1A239C3E29E37910EE9DED2B3D8291B769B3A8831934B152C9
3,018,724 UART: [art] PUB.Y = 5ECA909AF39AF4777B62C352EF33C5A9D064A4FC0817939730B5BF0AFF59EEA848F5C3B8E89B8FF42117DC4EAF84B025
3,025,684 UART: [art] SIG.R = 1252849D9CF9A0B8AF116ADA05E72140BEDEAE7F1F7327DA5AE93AFBD0EF7A7297389B8457E697D4DB3C72B1CFB9E076
3,032,471 UART: [art] SIG.S = 3C56A42EE7271D6CA131C73BB14E561CFF8F4C03DC0952FD99F8C4DB4B08CA427ED0DCA2C7E03D72201D4A150F330DEB
3,056,320 UART: Caliptra RT
3,056,571 UART: [state] CFI Enabled
3,176,579 UART: [rt] RT listening for mailbox commands...
3,177,249 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,079 UART: [rt]cmd =0x44504543, len=28
3,250,280 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
893,389 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,514 UART: [kat] ++
897,666 UART: [kat] sha1
901,846 UART: [kat] SHA2-256
903,786 UART: [kat] SHA2-384
906,533 UART: [kat] SHA2-512-ACC
908,434 UART: [kat] ECC-384
918,123 UART: [kat] HMAC-384Kdf
922,557 UART: [kat] LMS
1,170,885 UART: [kat] --
1,171,516 UART: [cold-reset] ++
1,172,092 UART: [fht] FHT @ 0x50003400
1,174,597 UART: [idev] ++
1,174,765 UART: [idev] CDI.KEYID = 6
1,175,125 UART: [idev] SUBJECT.KEYID = 7
1,175,549 UART: [idev] UDS.KEYID = 0
1,175,894 ready_for_fw is high
1,175,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,233 UART: [idev] Erasing UDS.KEYID = 0
1,200,246 UART: [idev] Sha1 KeyId Algorithm
1,208,570 UART: [idev] --
1,209,702 UART: [ldev] ++
1,209,870 UART: [ldev] CDI.KEYID = 6
1,210,233 UART: [ldev] SUBJECT.KEYID = 5
1,210,659 UART: [ldev] AUTHORITY.KEYID = 7
1,211,122 UART: [ldev] FE.KEYID = 1
1,216,428 UART: [ldev] Erasing FE.KEYID = 1
1,242,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,650 UART: [ldev] --
1,282,159 UART: [fwproc] Wait for Commands...
1,282,745 UART: [fwproc] Recv command 0x46574c44
1,283,473 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,029 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,199 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,442 >>> mbox cmd response: success
2,826,468 UART: [afmc] ++
2,826,636 UART: [afmc] CDI.KEYID = 6
2,826,998 UART: [afmc] SUBJECT.KEYID = 7
2,827,423 UART: [afmc] AUTHORITY.KEYID = 5
2,863,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,075 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,784 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,667 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,368 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,138 UART: [afmc] --
2,906,154 UART: [cold-reset] --
2,906,876 UART: [state] Locking Datavault
2,908,233 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,837 UART: [state] Locking ICCM
2,909,493 UART: [exit] Launching FMC @ 0x40000130
2,914,823 UART:
2,914,839 UART: Running Caliptra FMC ...
2,915,247 UART:
2,915,390 UART: [state] CFI Enabled
2,925,888 UART: [fht] FMC Alias Private Key: 7
3,044,786 UART: [art] Extend RT PCRs Done
3,045,214 UART: [art] Lock RT PCRs Done
3,046,502 UART: [art] Populate DV Done
3,054,835 UART: [fht] FMC Alias Private Key: 7
3,055,845 UART: [art] Derive CDI
3,056,125 UART: [art] Store in slot 0x4
3,141,456 UART: [art] Derive Key Pair
3,141,816 UART: [art] Store priv key in slot 0x5
3,154,468 UART: [art] Derive Key Pair - Done
3,169,085 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,706 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,471 UART: [art] PUB.X = EEA52DC4B716414EE4E56D3C0F6616296BF1F67A9B7BC9460EC83F384FBC415D5627885BCB62C10A3AE5E10335D65CFA
3,192,243 UART: [art] PUB.Y = 272FA071827BC4AD4BF880FA731ED0B400DC022D35A1AA1F916C687FCE62D8275444253A4EFF157B811BEBF50DF00D10
3,199,174 UART: [art] SIG.R = C1B95AAEA152072CDE8ABF64DD3C0F898A0D75889BC8094743DBE6C3A4693B7CFC1820D1327B55637CDCC04DC422776C
3,205,946 UART: [art] SIG.S = 7426D2637556DA7493892BCCC3E0352C7F761DDD333309C2DFBD4D53AC41DBA3A4CDA8C57510575C3DFD4772C5E94EF9
3,229,965 UART: Caliptra RT
3,230,308 UART: [state] CFI Enabled
3,350,523 UART: [rt] RT listening for mailbox commands...
3,351,193 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,203 UART: [rt]cmd =0x44504543, len=28
3,424,304 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,058 ready_for_fw is high
1,061,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,707 >>> mbox cmd response: success
2,742,462 UART:
2,742,478 UART: Running Caliptra FMC ...
2,742,886 UART:
2,743,029 UART: [state] CFI Enabled
2,753,695 UART: [fht] FMC Alias Private Key: 7
2,872,777 UART: [art] Extend RT PCRs Done
2,873,205 UART: [art] Lock RT PCRs Done
2,874,505 UART: [art] Populate DV Done
2,882,718 UART: [fht] FMC Alias Private Key: 7
2,883,650 UART: [art] Derive CDI
2,883,930 UART: [art] Store in slot 0x4
2,969,915 UART: [art] Derive Key Pair
2,970,275 UART: [art] Store priv key in slot 0x5
2,984,025 UART: [art] Derive Key Pair - Done
2,998,830 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,842 UART: [art] PUB.X = CAD8D142A596F9634CCF8E397493A07D5A4B3A0489A642013CA3C522EA82EEEE74BDCF013FDF8D2CB1AC524FE8B622F0
3,021,623 UART: [art] PUB.Y = 76FC4F006EB933F753975C2D7CCF0A5079B006D79E1B6537354DDAE647520D2D56CE8A25820C50347FE6146CDDA32382
3,028,541 UART: [art] SIG.R = EDF9FD16754A537C1E1000D9879949BAC0428DD6D5C062517E1ADCC6FFCF7B64E7C1831454AAB0D825688D62F71F7E9F
3,035,301 UART: [art] SIG.S = AB1BCE8E1F4C1FCE04F7D7F65A3E84038BE620E512F3E23EF1D589C6ACF088B7650B13D1202D41B561B26A7BA6D8233B
3,058,394 UART: Caliptra RT
3,058,737 UART: [state] CFI Enabled
3,177,877 UART: [rt] RT listening for mailbox commands...
3,178,547 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,441 UART: [rt]cmd =0x44504543, len=28
3,251,708 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,010 UART:
192,379 UART: Running Caliptra ROM ...
193,533 UART:
193,682 UART: [state] CFI Enabled
261,278 UART: [state] LifecycleState = Unprovisioned
263,292 UART: [state] DebugLocked = No
265,538 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,413 UART: [kat] SHA2-256
440,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,623 UART: [kat] ++
451,076 UART: [kat] sha1
462,452 UART: [kat] SHA2-256
465,186 UART: [kat] SHA2-384
471,116 UART: [kat] SHA2-512-ACC
473,487 UART: [kat] ECC-384
2,766,392 UART: [kat] HMAC-384Kdf
2,800,021 UART: [kat] LMS
3,990,381 UART: [kat] --
3,995,607 UART: [cold-reset] ++
3,997,752 UART: [fht] Storing FHT @ 0x50003400
4,008,523 UART: [idev] ++
4,009,125 UART: [idev] CDI.KEYID = 6
4,010,096 UART: [idev] SUBJECT.KEYID = 7
4,011,279 UART: [idev] UDS.KEYID = 0
4,012,331 ready_for_fw is high
4,012,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,634 UART: [idev] Erasing UDS.KEYID = 0
7,347,462 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,333 UART: [idev] --
7,373,006 UART: [ldev] ++
7,373,580 UART: [ldev] CDI.KEYID = 6
7,374,545 UART: [ldev] SUBJECT.KEYID = 5
7,375,762 UART: [ldev] AUTHORITY.KEYID = 7
7,377,157 UART: [ldev] FE.KEYID = 1
7,422,441 UART: [ldev] Erasing FE.KEYID = 1
10,755,641 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,094 UART: [ldev] --
13,118,578 UART: [fwproc] Waiting for Commands...
13,121,208 UART: [fwproc] Received command 0x46574c44
13,123,389 UART: [fwproc] Received Image of size 118548 bytes
17,232,939 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,302,731 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,375,866 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,704,764 >>> mbox cmd response: success
17,709,610 UART: [afmc] ++
17,710,229 UART: [afmc] CDI.KEYID = 6
17,711,139 UART: [afmc] SUBJECT.KEYID = 7
17,712,414 UART: [afmc] AUTHORITY.KEYID = 5
21,068,493 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,525 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,796 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,222 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,939 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,367 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,438,644 UART: [afmc] --
23,442,345 UART: [cold-reset] --
23,446,854 UART: [state] Locking Datavault
23,452,048 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,808 UART: [state] Locking ICCM
23,455,797 UART: [exit] Launching FMC @ 0x40000130
23,464,190 UART:
23,464,443 UART: Running Caliptra FMC ...
23,465,546 UART:
23,465,706 UART: [state] CFI Enabled
23,532,560 UART: [fht] FMC Alias Private Key: 7
25,894,018 UART: [art] Extend RT PCRs Done
25,895,250 UART: [art] Lock RT PCRs Done
25,896,900 UART: [art] Populate DV Done
25,902,527 UART: [fht] FMC Alias Private Key: 7
25,904,008 UART: [art] Derive CDI
25,904,749 UART: [art] Store in slot 0x4
25,961,618 UART: [art] Derive Key Pair
25,962,659 UART: [art] Store priv key in slot 0x5
29,255,700 UART: [art] Derive Key Pair - Done
29,268,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,800 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,318 UART: [art] PUB.X = 9CEBB77A6DF238DB8343C38D9B11DBA4F9AB1B6AF1F4CB19C51320E2416B19395B6DCB770507A53A02D465F4720FF09B
31,565,598 UART: [art] PUB.Y = A2CD9EEDA586AD42363BA3799ECC367591D70479DD4F61868B5CAC73F9EE07D0432D3E314B0FF9695E2595F588172EEB
31,572,899 UART: [art] SIG.R = BFFD9113E0DC93DC9B08D73C4F3A3B781118A816ED13F66BDEA7D88A73C7AAF57AF6C47E1AF4460BC1299775A06E0069
31,580,253 UART: [art] SIG.S = 860C2B42036707B1FE8166BC171F0C538D1EB74337BD5A1916E2F00CCAD3987E3599D5003924A28377530A372CAF0B3B
32,885,703 UART: Caliptra RT
32,886,438 UART: [state] CFI Enabled
33,068,177 UART: [rt] RT listening for mailbox commands...
33,070,108 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,100,170 UART: [rt]cmd =0x44504543, len=20
33,120,582 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,786,213 ready_for_fw is high
3,787,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,944,529 >>> mbox cmd response: success
23,644,765 UART:
23,645,203 UART: Running Caliptra FMC ...
23,646,380 UART:
23,646,546 UART: [state] CFI Enabled
23,711,316 UART: [fht] FMC Alias Private Key: 7
26,052,178 UART: [art] Extend RT PCRs Done
26,053,410 UART: [art] Lock RT PCRs Done
26,055,094 UART: [art] Populate DV Done
26,060,414 UART: [fht] FMC Alias Private Key: 7
26,062,070 UART: [art] Derive CDI
26,062,888 UART: [art] Store in slot 0x4
26,120,044 UART: [art] Derive Key Pair
26,121,092 UART: [art] Store priv key in slot 0x5
29,413,782 UART: [art] Derive Key Pair - Done
29,426,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,716,253 UART: [art] Erasing AUTHORITY.KEYID = 7
31,717,767 UART: [art] PUB.X = 83B5F4943BBFEE0209F2D2547748E385443E6267216E89A757D0BE82BBD3033A6EEAA925DE52D3C5D2DDC252C5DDCC85
31,725,030 UART: [art] PUB.Y = C7F7F6E740F0B3901A680DA70261F4730DE3DA7A7FC1AF9A52B7C0DB256C508BC83EA2DF16C06D02D6FC4B8FB8781F08
31,732,352 UART: [art] SIG.R = E1C76DDB79B7E908E3CCBAC0815EFE3358F204EAEF0BE6DE72818B4BC1FBDEA6884B20482E33D8A634B46D7B764AE32D
31,739,760 UART: [art] SIG.S = BA021DF684A772ACB02D00B8E2D3506069AFA5ED9A0BC5F4A349516D8C64143865E2D05DF10B3432D90ECADA3BF95545
33,045,654 UART: Caliptra RT
33,046,378 UART: [state] CFI Enabled
33,222,563 UART: [rt] RT listening for mailbox commands...
33,224,478 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,254,601 UART: [rt]cmd =0x44504543, len=20
33,275,170 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,509 UART:
192,850 UART: Running Caliptra ROM ...
194,025 UART:
603,768 UART: [state] CFI Enabled
617,608 UART: [state] LifecycleState = Unprovisioned
619,554 UART: [state] DebugLocked = No
621,220 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,237 UART: [kat] SHA2-256
794,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,493 UART: [kat] ++
806,001 UART: [kat] sha1
816,672 UART: [kat] SHA2-256
819,327 UART: [kat] SHA2-384
825,311 UART: [kat] SHA2-512-ACC
827,674 UART: [kat] ECC-384
3,112,947 UART: [kat] HMAC-384Kdf
3,123,488 UART: [kat] LMS
4,313,604 UART: [kat] --
4,319,377 UART: [cold-reset] ++
4,321,471 UART: [fht] Storing FHT @ 0x50003400
4,333,655 UART: [idev] ++
4,334,214 UART: [idev] CDI.KEYID = 6
4,335,239 UART: [idev] SUBJECT.KEYID = 7
4,336,406 UART: [idev] UDS.KEYID = 0
4,337,439 ready_for_fw is high
4,337,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,521 UART: [idev] Erasing UDS.KEYID = 0
7,628,802 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,397 UART: [idev] --
7,653,741 UART: [ldev] ++
7,654,307 UART: [ldev] CDI.KEYID = 6
7,655,267 UART: [ldev] SUBJECT.KEYID = 5
7,656,471 UART: [ldev] AUTHORITY.KEYID = 7
7,657,750 UART: [ldev] FE.KEYID = 1
7,668,985 UART: [ldev] Erasing FE.KEYID = 1
10,957,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,039 UART: [ldev] --
13,319,099 UART: [fwproc] Waiting for Commands...
13,322,241 UART: [fwproc] Received command 0x46574c44
13,324,424 UART: [fwproc] Received Image of size 118548 bytes
17,428,140 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,496,382 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,569,556 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,778 >>> mbox cmd response: success
17,902,613 UART: [afmc] ++
17,903,226 UART: [afmc] CDI.KEYID = 6
17,904,108 UART: [afmc] SUBJECT.KEYID = 7
17,905,376 UART: [afmc] AUTHORITY.KEYID = 5
21,220,473 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,003 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,307 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,709 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,410 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,809 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,675 UART: [afmc] --
23,586,749 UART: [cold-reset] --
23,589,149 UART: [state] Locking Datavault
23,594,983 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,727 UART: [state] Locking ICCM
23,599,309 UART: [exit] Launching FMC @ 0x40000130
23,607,689 UART:
23,607,925 UART: Running Caliptra FMC ...
23,609,025 UART:
23,609,185 UART: [state] CFI Enabled
23,617,201 UART: [fht] FMC Alias Private Key: 7
25,957,209 UART: [art] Extend RT PCRs Done
25,958,425 UART: [art] Lock RT PCRs Done
25,960,399 UART: [art] Populate DV Done
25,965,799 UART: [fht] FMC Alias Private Key: 7
25,967,383 UART: [art] Derive CDI
25,968,139 UART: [art] Store in slot 0x4
26,010,779 UART: [art] Derive Key Pair
26,011,817 UART: [art] Store priv key in slot 0x5
29,253,825 UART: [art] Derive Key Pair - Done
29,266,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,258 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,763 UART: [art] PUB.X = C8CEBC2B469A61A8DFD677530279336EF7D391C745F2D51E88177E5CEABBD877166A897F51B9A5F6ADEF5A65F181EEB2
31,556,070 UART: [art] PUB.Y = 0EB64C40CF658C72304A7B5616D2EC1CAA001300AAF510FD2536168184043BA6FE9A8D432200A4FA4C5CCCE03AEE088A
31,563,265 UART: [art] SIG.R = 1C7218E7D1ACF0D42975440C66DFEAE7A519BDFA3AF1B7044FAD195DBB7B6725683041026ADFFB1F23F75CFB23E682E3
31,570,658 UART: [art] SIG.S = 7070B500AB60B4FE9531DB4B71B5EB821AB1C2CDCB7387A3370100F83FD0F50544D458C3D392904C8FC63914E48214D7
32,875,799 UART: Caliptra RT
32,876,516 UART: [state] CFI Enabled
33,009,036 UART: [rt] RT listening for mailbox commands...
33,010,960 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,040,858 UART: [rt]cmd =0x44504543, len=20
33,061,032 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,131 writing to cptra_bootfsm_go
4,135,759 ready_for_fw is high
4,136,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,173,341 >>> mbox cmd response: success
23,813,473 UART:
23,813,871 UART: Running Caliptra FMC ...
23,814,975 UART:
23,815,124 UART: [state] CFI Enabled
23,822,816 UART: [fht] FMC Alias Private Key: 7
26,162,787 UART: [art] Extend RT PCRs Done
26,164,012 UART: [art] Lock RT PCRs Done
26,165,674 UART: [art] Populate DV Done
26,171,224 UART: [fht] FMC Alias Private Key: 7
26,172,928 UART: [art] Derive CDI
26,173,737 UART: [art] Store in slot 0x4
26,216,707 UART: [art] Derive Key Pair
26,217,703 UART: [art] Store priv key in slot 0x5
29,459,811 UART: [art] Derive Key Pair - Done
29,472,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,752,754 UART: [art] Erasing AUTHORITY.KEYID = 7
31,754,259 UART: [art] PUB.X = 83516A6E6997ABE98B23DC2F1E6421FF3B90B9A55F33654A33FF27787F41E22008D7872B2664F6995ECFCCFE3215B1CA
31,761,579 UART: [art] PUB.Y = 3585BA5F6BAA68A2D067156E44FBB812B822493298B7B404149BE07BF9D9E1BECFB79FBA522CA5224B36A1C4B02E3BBF
31,768,838 UART: [art] SIG.R = 5E1C47FF88494987CFD502CF1F2F24DC10AB749E3BE802AC5EDFA182894BF17EDA2D21D155D404429EDB1342B979040C
31,776,229 UART: [art] SIG.S = 2278605F5D160CABB5670442FCCBC4CC4F2E4B061261B493A1F65FBE76CED068D5BB5C90227D67D76A73821ACC106302
33,081,383 UART: Caliptra RT
33,082,106 UART: [state] CFI Enabled
33,215,261 UART: [rt] RT listening for mailbox commands...
33,217,189 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,247,006 UART: [rt]cmd =0x44504543, len=20
33,267,806 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,181 UART:
192,558 UART: Running Caliptra ROM ...
193,700 UART:
193,843 UART: [state] CFI Enabled
266,118 UART: [state] LifecycleState = Unprovisioned
268,102 UART: [state] DebugLocked = No
270,911 UART: [state] WD Timer not started. Device not locked for debugging
275,453 UART: [kat] SHA2-256
455,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,863 UART: [kat] ++
466,384 UART: [kat] sha1
476,186 UART: [kat] SHA2-256
478,841 UART: [kat] SHA2-384
485,251 UART: [kat] SHA2-512-ACC
487,614 UART: [kat] ECC-384
2,952,528 UART: [kat] HMAC-384Kdf
2,973,675 UART: [kat] LMS
3,450,152 UART: [kat] --
3,454,574 UART: [cold-reset] ++
3,456,785 UART: [fht] FHT @ 0x50003400
3,468,114 UART: [idev] ++
3,468,695 UART: [idev] CDI.KEYID = 6
3,469,647 UART: [idev] SUBJECT.KEYID = 7
3,470,886 UART: [idev] UDS.KEYID = 0
3,471,784 ready_for_fw is high
3,471,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,485 UART: [idev] Erasing UDS.KEYID = 0
5,989,826 UART: [idev] Sha1 KeyId Algorithm
6,014,565 UART: [idev] --
6,019,167 UART: [ldev] ++
6,019,782 UART: [ldev] CDI.KEYID = 6
6,020,674 UART: [ldev] SUBJECT.KEYID = 5
6,021,889 UART: [ldev] AUTHORITY.KEYID = 7
6,023,177 UART: [ldev] FE.KEYID = 1
6,058,723 UART: [ldev] Erasing FE.KEYID = 1
8,565,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,202 UART: [ldev] --
10,377,523 UART: [fwproc] Wait for Commands...
10,379,181 UART: [fwproc] Recv command 0x46574c44
10,381,216 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,136 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,140 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,295 >>> mbox cmd response: success
14,345,777 UART: [afmc] ++
14,346,438 UART: [afmc] CDI.KEYID = 6
14,347,355 UART: [afmc] SUBJECT.KEYID = 7
14,348,571 UART: [afmc] AUTHORITY.KEYID = 5
16,875,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,599,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,602,108 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,617,903 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,633,950 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,649,550 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,673,173 UART: [afmc] --
18,677,378 UART: [cold-reset] --
18,680,488 UART: [state] Locking Datavault
18,686,653 UART: [state] Locking PCR0, PCR1 and PCR31
18,688,399 UART: [state] Locking ICCM
18,689,895 UART: [exit] Launching FMC @ 0x40000130
18,698,286 UART:
18,698,527 UART: Running Caliptra FMC ...
18,699,627 UART:
18,699,787 UART: [state] CFI Enabled
18,755,303 UART: [fht] FMC Alias Private Key: 7
20,521,574 UART: [art] Extend RT PCRs Done
20,522,783 UART: [art] Lock RT PCRs Done
20,524,782 UART: [art] Populate DV Done
20,530,079 UART: [fht] FMC Alias Private Key: 7
20,531,781 UART: [art] Derive CDI
20,532,595 UART: [art] Store in slot 0x4
20,587,848 UART: [art] Derive Key Pair
20,588,894 UART: [art] Store priv key in slot 0x5
23,051,530 UART: [art] Derive Key Pair - Done
23,064,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,777,537 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,046 UART: [art] PUB.X = F01480301B010BDACE8405168A9925E89AF65CF0129B20E1F89487BA1DE8A9BA1E6EF3E74387711BD2A5A01BFC0E11E4
24,786,302 UART: [art] PUB.Y = 64178A0BC362409E5BFBEBC88E72CAC575CED8FDDCC1E4E7537291FCAB556E1E7E9DF8EE3AA1BDAB3DD4EAB175E892B7
24,793,646 UART: [art] SIG.R = C2F2B4BD51270E474FBFC305CB801B181116F587E6F3FE2C04EA42D01FC1CD63BA40E37D58B439AF5900A9AD8943EA89
24,801,044 UART: [art] SIG.S = F09D970CC274B654E68E43196F3078CCE9D1CE60A96291D2DC8F4335C2FA38778B5F05F595763C06B008D3DA33731118
25,779,377 UART: Caliptra RT
25,780,071 UART: [state] CFI Enabled
25,958,586 UART: [rt] RT listening for mailbox commands...
25,960,495 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,990,175 UART: [rt]cmd =0x44504543, len=20
26,010,479 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
3,465,321 ready_for_fw is high
3,465,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,227,677 >>> mbox cmd response: success
18,517,435 UART:
18,517,822 UART: Running Caliptra FMC ...
18,518,957 UART:
18,519,114 UART: [state] CFI Enabled
18,587,358 UART: [fht] FMC Alias Private Key: 7
20,353,807 UART: [art] Extend RT PCRs Done
20,355,024 UART: [art] Lock RT PCRs Done
20,356,828 UART: [art] Populate DV Done
20,362,359 UART: [fht] FMC Alias Private Key: 7
20,363,905 UART: [art] Derive CDI
20,364,669 UART: [art] Store in slot 0x4
20,420,092 UART: [art] Derive Key Pair
20,421,128 UART: [art] Store priv key in slot 0x5
22,884,784 UART: [art] Derive Key Pair - Done
22,897,674 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,611,005 UART: [art] Erasing AUTHORITY.KEYID = 7
24,612,511 UART: [art] PUB.X = 8563C7C66FF1BA588EE5674A3695F579510FFECE218E295F7A398CC678F16EA4887B73F3999BC4D3D4D0F39E8C920D2A
24,619,773 UART: [art] PUB.Y = 4EFC06B50C10C5C62234813B2431E266DC9D1BEC6328213DE79A4C8AF172C064C4B8AB5DE9204899059A69B0EDECE43B
24,627,026 UART: [art] SIG.R = 4B8D0105C8184FAFFA071FB1F55501C09741ED52DA85092868D99F9423042257D1A198B8C4179CAC2A73C3EB7EE9C80A
24,634,461 UART: [art] SIG.S = D1F2BEBDF7B57A5EE99A4A96A94BA232E8094D686A28AF2C535850B6C34FAB8BCC2A59F2B67372FF1AF16EE33F7F28C7
25,613,230 UART: Caliptra RT
25,613,944 UART: [state] CFI Enabled
25,795,696 UART: [rt] RT listening for mailbox commands...
25,797,627 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,827,532 UART: [rt]cmd =0x44504543, len=20
25,848,330 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,425 UART:
192,785 UART: Running Caliptra ROM ...
193,925 UART:
603,698 UART: [state] CFI Enabled
619,674 UART: [state] LifecycleState = Unprovisioned
621,619 UART: [state] DebugLocked = No
623,434 UART: [state] WD Timer not started. Device not locked for debugging
626,483 UART: [kat] SHA2-256
806,161 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,898 UART: [kat] ++
817,344 UART: [kat] sha1
828,506 UART: [kat] SHA2-256
831,229 UART: [kat] SHA2-384
836,709 UART: [kat] SHA2-512-ACC
839,122 UART: [kat] ECC-384
3,279,428 UART: [kat] HMAC-384Kdf
3,291,447 UART: [kat] LMS
3,767,907 UART: [kat] --
3,770,815 UART: [cold-reset] ++
3,772,261 UART: [fht] FHT @ 0x50003400
3,784,091 UART: [idev] ++
3,784,660 UART: [idev] CDI.KEYID = 6
3,785,695 UART: [idev] SUBJECT.KEYID = 7
3,786,871 UART: [idev] UDS.KEYID = 0
3,787,796 ready_for_fw is high
3,787,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,855 UART: [idev] Erasing UDS.KEYID = 0
6,265,120 UART: [idev] Sha1 KeyId Algorithm
6,288,414 UART: [idev] --
6,293,220 UART: [ldev] ++
6,293,802 UART: [ldev] CDI.KEYID = 6
6,294,719 UART: [ldev] SUBJECT.KEYID = 5
6,295,934 UART: [ldev] AUTHORITY.KEYID = 7
6,297,219 UART: [ldev] FE.KEYID = 1
6,305,706 UART: [ldev] Erasing FE.KEYID = 1
8,785,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,094 UART: [ldev] --
10,580,307 UART: [fwproc] Wait for Commands...
10,583,161 UART: [fwproc] Recv command 0x46574c44
10,585,153 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,275 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,279 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,366 >>> mbox cmd response: success
14,554,918 UART: [afmc] ++
14,555,524 UART: [afmc] CDI.KEYID = 6
14,556,469 UART: [afmc] SUBJECT.KEYID = 7
14,557,685 UART: [afmc] AUTHORITY.KEYID = 5
17,060,826 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,778 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,964 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,787 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,868 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,582 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,858,433 UART: [afmc] --
18,862,518 UART: [cold-reset] --
18,866,115 UART: [state] Locking Datavault
18,871,066 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,774 UART: [state] Locking ICCM
18,874,282 UART: [exit] Launching FMC @ 0x40000130
18,882,682 UART:
18,882,921 UART: Running Caliptra FMC ...
18,884,026 UART:
18,884,191 UART: [state] CFI Enabled
18,892,620 UART: [fht] FMC Alias Private Key: 7
20,658,867 UART: [art] Extend RT PCRs Done
20,660,079 UART: [art] Lock RT PCRs Done
20,661,443 UART: [art] Populate DV Done
20,667,024 UART: [fht] FMC Alias Private Key: 7
20,668,670 UART: [art] Derive CDI
20,669,486 UART: [art] Store in slot 0x4
20,711,982 UART: [art] Derive Key Pair
20,713,020 UART: [art] Store priv key in slot 0x5
23,139,803 UART: [art] Derive Key Pair - Done
23,153,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,594 UART: [art] Erasing AUTHORITY.KEYID = 7
24,861,100 UART: [art] PUB.X = 376907B131DB34FD66B0B011DA3499C1A335F82EF0130898AC217E5C28FEC61451CCBA43000EB6F54D3269127ECB0B05
24,868,346 UART: [art] PUB.Y = B73CDAC54A7F0A2946861993350B4CD11178F3D3EF6EF145738C76FB39504B598EA3113FDFE98E3466A7A374262BA251
24,875,575 UART: [art] SIG.R = 32696EE6F7642FE397941EB295532523811394048040325F3FA98BA6E3402ECF9D2D20BA984665A0DE817ED8EFFC0A41
24,882,963 UART: [art] SIG.S = C481DE0AD05068C01E18F1BB3F7BA991C26977FC202E893A1ABF36DB86C60AD59DD6C51D7A03DD1522497483751CC8D0
25,861,526 UART: Caliptra RT
25,862,238 UART: [state] CFI Enabled
25,994,981 UART: [rt] RT listening for mailbox commands...
25,996,895 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,026,689 UART: [rt]cmd =0x44504543, len=20
26,047,048 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
3,778,761 ready_for_fw is high
3,779,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,507 >>> mbox cmd response: success
18,695,581 UART:
18,695,992 UART: Running Caliptra FMC ...
18,697,132 UART:
18,697,296 UART: [state] CFI Enabled
18,705,189 UART: [fht] FMC Alias Private Key: 7
20,471,752 UART: [art] Extend RT PCRs Done
20,472,977 UART: [art] Lock RT PCRs Done
20,474,665 UART: [art] Populate DV Done
20,480,089 UART: [fht] FMC Alias Private Key: 7
20,481,796 UART: [art] Derive CDI
20,482,632 UART: [art] Store in slot 0x4
20,524,696 UART: [art] Derive Key Pair
20,525,744 UART: [art] Store priv key in slot 0x5
22,952,248 UART: [art] Derive Key Pair - Done
22,965,085 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,526 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,027 UART: [art] PUB.X = 2823A440AE527F5B587D5915F5C5CB647354465333C76384B564A5CF5F30703F76A3F2BF8F611D887976CCBF01886A45
24,680,250 UART: [art] PUB.Y = D3F33787FF2A1F4DB5C4B2AFE3A937B7F7DBB4B4B9CB89AA8E3D720131292EDD5A7D34B9162B3F4811F5B0A9E546ECCC
24,687,562 UART: [art] SIG.R = A21BAA14EA86D304227EF6694F936A66F68F4D68F4E7BD7C54D0FCFCFBF4120F38F373FD764C06AAD75995B9AB569983
24,694,968 UART: [art] SIG.S = ED9A59BCF3B30BF07DF18ADC058A6CF1AA7B38106B6667FE883616B6C613F5CB2FE1E6F31BECD7645C795F32A2D9703C
25,673,972 UART: Caliptra RT
25,674,676 UART: [state] CFI Enabled
25,807,356 UART: [rt] RT listening for mailbox commands...
25,809,265 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,839,438 UART: [rt]cmd =0x44504543, len=20
25,860,169 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,127 UART:
192,487 UART: Running Caliptra ROM ...
193,667 UART:
193,821 UART: [state] CFI Enabled
264,920 UART: [state] LifecycleState = Unprovisioned
267,327 UART: [state] DebugLocked = No
269,006 UART: [state] WD Timer not started. Device not locked for debugging
273,889 UART: [kat] SHA2-256
463,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,589 UART: [kat] ++
475,083 UART: [kat] sha1
486,787 UART: [kat] SHA2-256
489,768 UART: [kat] SHA2-384
494,412 UART: [kat] SHA2-512-ACC
496,990 UART: [kat] ECC-384
2,947,675 UART: [kat] HMAC-384Kdf
2,971,342 UART: [kat] LMS
3,503,079 UART: [kat] --
3,507,719 UART: [cold-reset] ++
3,510,284 UART: [fht] FHT @ 0x50003400
3,521,203 UART: [idev] ++
3,521,875 UART: [idev] CDI.KEYID = 6
3,522,828 UART: [idev] SUBJECT.KEYID = 7
3,523,996 UART: [idev] UDS.KEYID = 0
3,524,916 ready_for_fw is high
3,525,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,102 UART: [idev] Erasing UDS.KEYID = 0
6,029,786 UART: [idev] Sha1 KeyId Algorithm
6,052,259 UART: [idev] --
6,056,525 UART: [ldev] ++
6,057,202 UART: [ldev] CDI.KEYID = 6
6,058,139 UART: [ldev] SUBJECT.KEYID = 5
6,059,292 UART: [ldev] AUTHORITY.KEYID = 7
6,060,521 UART: [ldev] FE.KEYID = 1
6,100,885 UART: [ldev] Erasing FE.KEYID = 1
8,608,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,306 UART: [ldev] --
10,414,035 UART: [fwproc] Wait for Commands...
10,415,640 UART: [fwproc] Recv command 0x46574c44
10,417,893 UART: [fwproc] Recv'd Img size: 118548 bytes
13,900,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,607 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,109,233 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,670,227 >>> mbox cmd response: success
14,673,612 UART: [afmc] ++
14,674,334 UART: [afmc] CDI.KEYID = 6
14,675,528 UART: [afmc] SUBJECT.KEYID = 7
14,676,965 UART: [afmc] AUTHORITY.KEYID = 5
17,210,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,634 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,719 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,843 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,791 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,680 UART: [afmc] --
19,011,334 UART: [cold-reset] --
19,016,118 UART: [state] Locking Datavault
19,020,621 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,776 UART: [state] Locking ICCM
19,024,934 UART: [exit] Launching FMC @ 0x40000130
19,033,563 UART:
19,033,797 UART: Running Caliptra FMC ...
19,034,898 UART:
19,035,061 UART: [state] CFI Enabled
19,094,930 UART: [fht] FMC Alias Private Key: 7
20,882,487 UART: [art] Extend RT PCRs Done
20,883,710 UART: [art] Lock RT PCRs Done
20,885,198 UART: [art] Populate DV Done
20,890,568 UART: [fht] FMC Alias Private Key: 7
20,892,059 UART: [art] Derive CDI
20,892,821 UART: [art] Store in slot 0x4
20,947,751 UART: [art] Derive Key Pair
20,948,745 UART: [art] Store priv key in slot 0x5
23,411,277 UART: [art] Derive Key Pair - Done
23,424,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,946 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,450 UART: [art] PUB.X = 957BB32D38D0B1D3A253F7BF9DABA620C6EDDCCE502031A5F99254C54ADF887F008E30ECD43EE2948848F0E4EE84293A
25,146,737 UART: [art] PUB.Y = EB523FD1E88B8A4025141F48384419C80A5D0E18273F4698CC847A6B22D8D5F67CE63FBF964FE5DB8EF35EA2D4BC40AE
25,154,032 UART: [art] SIG.R = 1A2879CE0B1B01B4DCE9A892F967D124D8F83200B690F015E6CAEFD1A82B218D9C22E19D1872EE68386053AE3F530132
25,161,402 UART: [art] SIG.S = D8F8DFDEE68D0E7C177EF5F285ADB3F92242F92C05434576C7ECEC54CCBEF40A0862382C088CDD094D49E969F062D99D
26,140,759 UART: Caliptra RT
26,141,465 UART: [state] CFI Enabled
26,322,027 UART: [rt] RT listening for mailbox commands...
26,323,960 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,353,951 UART: [rt]cmd =0x44504543, len=20
26,374,575 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,438,194 ready_for_fw is high
3,438,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,831,145 >>> mbox cmd response: success
19,114,766 UART:
19,115,154 UART: Running Caliptra FMC ...
19,116,284 UART:
19,116,443 UART: [state] CFI Enabled
19,181,373 UART: [fht] FMC Alias Private Key: 7
20,947,618 UART: [art] Extend RT PCRs Done
20,948,847 UART: [art] Lock RT PCRs Done
20,950,848 UART: [art] Populate DV Done
20,956,270 UART: [fht] FMC Alias Private Key: 7
20,957,917 UART: [art] Derive CDI
20,958,732 UART: [art] Store in slot 0x4
21,014,205 UART: [art] Derive Key Pair
21,015,257 UART: [art] Store priv key in slot 0x5
23,477,900 UART: [art] Derive Key Pair - Done
23,490,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,027 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,529 UART: [art] PUB.X = 71B48247C4B1908B6342F4E2B28B88364988AADE3F9717D8405A9C63CFF7FAFCC516F491B9B74ED5318D0034F3E81C95
25,212,794 UART: [art] PUB.Y = 7D482491C512EA7C909A0EDA340C599006946A3B6A2C892B45A64D7F5C1442AC2456AFA97069CC22076A2CE37C9174BB
25,220,009 UART: [art] SIG.R = B770317FD5E76D6452D560290EF90172D2E30AEF2370B3D9768A0A46D77E9767C4D6A0E0F079CAA20D43BBE971B097EF
25,227,387 UART: [art] SIG.S = 4A223A8476B5C400B88683FA721E9A7360BCAC857A5161D92867B5BAC76BCB95F2C82CB3B1DEC2888D2C60BA44161396
26,206,303 UART: Caliptra RT
26,207,015 UART: [state] CFI Enabled
26,388,777 UART: [rt] RT listening for mailbox commands...
26,390,694 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,420,646 UART: [rt]cmd =0x44504543, len=20
26,441,165 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,833 writing to cptra_bootfsm_go
194,188 UART:
194,539 UART: Running Caliptra ROM ...
195,731 UART:
605,469 UART: [state] CFI Enabled
617,287 UART: [state] LifecycleState = Unprovisioned
619,669 UART: [state] DebugLocked = No
622,555 UART: [state] WD Timer not started. Device not locked for debugging
626,893 UART: [kat] SHA2-256
816,781 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,544 UART: [kat] ++
828,087 UART: [kat] sha1
838,263 UART: [kat] SHA2-256
841,283 UART: [kat] SHA2-384
846,922 UART: [kat] SHA2-512-ACC
849,501 UART: [kat] ECC-384
3,290,472 UART: [kat] HMAC-384Kdf
3,304,312 UART: [kat] LMS
3,836,148 UART: [kat] --
3,839,458 UART: [cold-reset] ++
3,840,483 UART: [fht] FHT @ 0x50003400
3,850,656 UART: [idev] ++
3,851,410 UART: [idev] CDI.KEYID = 6
3,852,331 UART: [idev] SUBJECT.KEYID = 7
3,853,514 UART: [idev] UDS.KEYID = 0
3,854,444 ready_for_fw is high
3,854,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,609 UART: [idev] Erasing UDS.KEYID = 0
6,331,092 UART: [idev] Sha1 KeyId Algorithm
6,354,494 UART: [idev] --
6,359,677 UART: [ldev] ++
6,360,413 UART: [ldev] CDI.KEYID = 6
6,361,299 UART: [ldev] SUBJECT.KEYID = 5
6,362,405 UART: [ldev] AUTHORITY.KEYID = 7
6,363,698 UART: [ldev] FE.KEYID = 1
6,374,698 UART: [ldev] Erasing FE.KEYID = 1
8,849,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,111 UART: [ldev] --
10,642,358 UART: [fwproc] Wait for Commands...
10,643,872 UART: [fwproc] Recv command 0x46574c44
10,646,198 UART: [fwproc] Recv'd Img size: 118548 bytes
14,142,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,722 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,341 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,184 >>> mbox cmd response: success
14,909,624 UART: [afmc] ++
14,910,351 UART: [afmc] CDI.KEYID = 6
14,911,466 UART: [afmc] SUBJECT.KEYID = 7
14,913,022 UART: [afmc] AUTHORITY.KEYID = 5
17,416,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,173 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,268 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,411 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,331 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,622 UART: [afmc] --
19,216,748 UART: [cold-reset] --
19,221,170 UART: [state] Locking Datavault
19,227,092 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,260 UART: [state] Locking ICCM
19,231,582 UART: [exit] Launching FMC @ 0x40000130
19,240,283 UART:
19,240,517 UART: Running Caliptra FMC ...
19,241,621 UART:
19,241,780 UART: [state] CFI Enabled
19,249,941 UART: [fht] FMC Alias Private Key: 7
21,016,574 UART: [art] Extend RT PCRs Done
21,017,806 UART: [art] Lock RT PCRs Done
21,019,194 UART: [art] Populate DV Done
21,024,730 UART: [fht] FMC Alias Private Key: 7
21,026,377 UART: [art] Derive CDI
21,027,139 UART: [art] Store in slot 0x4
21,069,791 UART: [art] Derive Key Pair
21,070,834 UART: [art] Store priv key in slot 0x5
23,497,813 UART: [art] Derive Key Pair - Done
23,510,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,013 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,536 UART: [art] PUB.X = 011C044F7029BD2C97E9A5B25D5A3FCA9023D1C44DF7F9A35DEE23D8AF7AB78E4369717C849A4225D6AC7BFC889111A1
25,225,805 UART: [art] PUB.Y = 3E8492B1121B89170EACA1D3D9AC4C261FF1DC8B3048F427781BFBC6E1BB7B06550C12F2233AA61FA24638FFB34DCD59
25,233,066 UART: [art] SIG.R = 6904049F996883F44CAF5E90CFAABF7A80743CBA061D1637BC65C22A8ABA1A7867F8379797277096ACB412C9BAE2AD06
25,240,428 UART: [art] SIG.S = 6F84366016A9D55C96B5DA3737660B50A9447F7C0E1FFABACFAE559E0337F4838E01A8343507964E433663EE9F006B1B
26,219,394 UART: Caliptra RT
26,220,107 UART: [state] CFI Enabled
26,353,328 UART: [rt] RT listening for mailbox commands...
26,355,252 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,385,383 UART: [rt]cmd =0x44504543, len=20
26,405,800 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,758,777 ready_for_fw is high
3,759,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,039,248 >>> mbox cmd response: success
19,292,686 UART:
19,293,097 UART: Running Caliptra FMC ...
19,294,251 UART:
19,294,419 UART: [state] CFI Enabled
19,302,113 UART: [fht] FMC Alias Private Key: 7
21,068,464 UART: [art] Extend RT PCRs Done
21,069,725 UART: [art] Lock RT PCRs Done
21,071,170 UART: [art] Populate DV Done
21,076,872 UART: [fht] FMC Alias Private Key: 7
21,078,433 UART: [art] Derive CDI
21,079,261 UART: [art] Store in slot 0x4
21,121,864 UART: [art] Derive Key Pair
21,122,877 UART: [art] Store priv key in slot 0x5
23,549,717 UART: [art] Derive Key Pair - Done
23,562,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,268,870 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,385 UART: [art] PUB.X = A57B117BF5D7427ADD9D368BC9126EB5213F9AD414C9CF6B843FD20D0ACEBD5827325F45CF01822DF1A0EDC188602568
25,277,624 UART: [art] PUB.Y = 399F7A5940E7A424EEEB6AD2FDA5D71564786FA260C90BBE51C9F19A06B5A51EC630E6D4CD5AAFED71D0DABF7956E06A
25,284,918 UART: [art] SIG.R = C42172E30E7EDFBD6D9E4BE4A861C8584D6E282F196E98CF09FA689390B7E56875D31DD473EB273D0F8BB2183A36FA71
25,292,356 UART: [art] SIG.S = 1D9FB3DA185CFDCBF5214FAFA8063F868FD6E7FC5AC1DC2D121B2E1D5FE0738DB6EC1FA7BFDF06F4E5A880817B695C09
26,270,712 UART: Caliptra RT
26,271,425 UART: [state] CFI Enabled
26,405,284 UART: [rt] RT listening for mailbox commands...
26,407,224 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,437,206 UART: [rt]cmd =0x44504543, len=20
26,457,879 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,935 UART: [kat] SHA2-256
881,866 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,981 UART: [kat] ++
886,133 UART: [kat] sha1
890,203 UART: [kat] SHA2-256
892,141 UART: [kat] SHA2-384
894,996 UART: [kat] SHA2-512-ACC
896,897 UART: [kat] ECC-384
902,294 UART: [kat] HMAC-384Kdf
906,900 UART: [kat] LMS
1,475,096 UART: [kat] --
1,475,895 UART: [cold-reset] ++
1,476,267 UART: [fht] Storing FHT @ 0x50003400
1,479,020 UART: [idev] ++
1,479,188 UART: [idev] CDI.KEYID = 6
1,479,548 UART: [idev] SUBJECT.KEYID = 7
1,479,972 UART: [idev] UDS.KEYID = 0
1,480,317 ready_for_fw is high
1,480,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,022 UART: [idev] Erasing UDS.KEYID = 0
1,504,606 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,224 UART: [idev] --
1,514,255 UART: [ldev] ++
1,514,423 UART: [ldev] CDI.KEYID = 6
1,514,786 UART: [ldev] SUBJECT.KEYID = 5
1,515,212 UART: [ldev] AUTHORITY.KEYID = 7
1,515,675 UART: [ldev] FE.KEYID = 1
1,520,805 UART: [ldev] Erasing FE.KEYID = 1
1,546,358 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,288 UART: [ldev] --
1,585,753 UART: [fwproc] Waiting for Commands...
1,586,550 UART: [fwproc] Received command 0x46574c44
1,587,341 UART: [fwproc] Received Image of size 118548 bytes
2,931,833 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,003 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,221 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,648 >>> mbox cmd response: success
3,131,776 UART: [afmc] ++
3,131,944 UART: [afmc] CDI.KEYID = 6
3,132,306 UART: [afmc] SUBJECT.KEYID = 7
3,132,731 UART: [afmc] AUTHORITY.KEYID = 5
3,167,096 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,124 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,904 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,613 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,496 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,179 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,071 UART: [afmc] --
3,210,095 UART: [cold-reset] --
3,210,995 UART: [state] Locking Datavault
3,212,432 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,036 UART: [state] Locking ICCM
3,213,480 UART: [exit] Launching FMC @ 0x40000130
3,218,810 UART:
3,218,826 UART: Running Caliptra FMC ...
3,219,234 UART:
3,219,288 UART: [state] CFI Enabled
3,229,666 UART: [fht] FMC Alias Private Key: 7
3,348,656 UART: [art] Extend RT PCRs Done
3,349,084 UART: [art] Lock RT PCRs Done
3,350,682 UART: [art] Populate DV Done
3,358,915 UART: [fht] FMC Alias Private Key: 7
3,360,071 UART: [art] Derive CDI
3,360,351 UART: [art] Store in slot 0x4
3,446,397 UART: [art] Derive Key Pair
3,446,757 UART: [art] Store priv key in slot 0x5
3,460,452 UART: [art] Derive Key Pair - Done
3,475,079 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,376 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,141 UART: [art] PUB.X = E156F3A64C26A20D7F02B444EDD5D24CFB204E7E7B59CC93B85A1B7D5C0D6874F597CA66106A2EC33849E811B08A5D09
3,497,909 UART: [art] PUB.Y = 9C9D8E9C1506CD370401FA7CDDE690389B79506695F12878D5C2CF8D021D0A9A54E2E4725D7ACDD89F20604C8146D78F
3,504,848 UART: [art] SIG.R = 77F3D3BAC729C8CA7F9287D1DE4AC9ABF80DEB3CB981DEB81F80A5BAEFAA59572673302703C6C1B5FBC5B824518667D6
3,511,632 UART: [art] SIG.S = 9AA152D961375C7A9384F8A36D7F1A449B352B8F6911DA3DAAEF5303A852F63F091ACEA11F4D585BCDAB93EC2912C1CD
3,535,522 UART: Caliptra RT
3,535,773 UART: [state] CFI Enabled
3,656,057 UART: [rt] RT listening for mailbox commands...
3,656,727 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,699 UART: [rt]cmd =0x44504543, len=20
3,707,689 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,809 ready_for_fw is high
1,362,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,188 >>> mbox cmd response: success
3,040,641 UART:
3,040,657 UART: Running Caliptra FMC ...
3,041,065 UART:
3,041,119 UART: [state] CFI Enabled
3,051,701 UART: [fht] FMC Alias Private Key: 7
3,170,207 UART: [art] Extend RT PCRs Done
3,170,635 UART: [art] Lock RT PCRs Done
3,171,907 UART: [art] Populate DV Done
3,180,220 UART: [fht] FMC Alias Private Key: 7
3,181,370 UART: [art] Derive CDI
3,181,650 UART: [art] Store in slot 0x4
3,267,612 UART: [art] Derive Key Pair
3,267,972 UART: [art] Store priv key in slot 0x5
3,281,565 UART: [art] Derive Key Pair - Done
3,296,198 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,710 UART: [art] PUB.X = 5488E6561811D1A97518DB633BB9AF78EEA3B8742B8207F02908C9FA52F69DD82195CC00E8F890ECE8D4F8DAD81BF04D
3,319,462 UART: [art] PUB.Y = 6728DAF85D4592384A316BE9071C64152B40A80FB98E154A5DE468B3358735CB56BDF4FE47E835ADF48778E654153597
3,326,402 UART: [art] SIG.R = 8D95B2CCF1FDF6DC783C364BB7B5EFBFB5ACB3A9A27A0826EBADE88BDAC595EA6688D7FBAA9A0D24E720A84824CF5B13
3,333,200 UART: [art] SIG.S = 92C4DC73EA67BCC5828E19DDFCEFEEC071BE5A5E38537DF9FF66462FBDAE5EB7390A836C63741BB0A750381F20E820B2
3,356,903 UART: Caliptra RT
3,357,154 UART: [state] CFI Enabled
3,477,151 UART: [rt] RT listening for mailbox commands...
3,477,821 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,441 UART: [rt]cmd =0x44504543, len=20
3,528,557 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,134 UART: [kat] SHA2-256
882,065 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,180 UART: [kat] ++
886,332 UART: [kat] sha1
890,574 UART: [kat] SHA2-256
892,512 UART: [kat] SHA2-384
895,413 UART: [kat] SHA2-512-ACC
897,314 UART: [kat] ECC-384
902,641 UART: [kat] HMAC-384Kdf
907,327 UART: [kat] LMS
1,475,523 UART: [kat] --
1,476,452 UART: [cold-reset] ++
1,476,976 UART: [fht] Storing FHT @ 0x50003400
1,479,661 UART: [idev] ++
1,479,829 UART: [idev] CDI.KEYID = 6
1,480,189 UART: [idev] SUBJECT.KEYID = 7
1,480,613 UART: [idev] UDS.KEYID = 0
1,480,958 ready_for_fw is high
1,480,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,849 UART: [idev] Erasing UDS.KEYID = 0
1,505,595 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,091 UART: [idev] --
1,515,132 UART: [ldev] ++
1,515,300 UART: [ldev] CDI.KEYID = 6
1,515,663 UART: [ldev] SUBJECT.KEYID = 5
1,516,089 UART: [ldev] AUTHORITY.KEYID = 7
1,516,552 UART: [ldev] FE.KEYID = 1
1,521,806 UART: [ldev] Erasing FE.KEYID = 1
1,546,943 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,229 UART: [ldev] --
1,586,512 UART: [fwproc] Waiting for Commands...
1,587,285 UART: [fwproc] Received command 0x46574c44
1,588,076 UART: [fwproc] Received Image of size 118548 bytes
2,933,258 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,776 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,994 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,201 >>> mbox cmd response: success
3,133,413 UART: [afmc] ++
3,133,581 UART: [afmc] CDI.KEYID = 6
3,133,943 UART: [afmc] SUBJECT.KEYID = 7
3,134,368 UART: [afmc] AUTHORITY.KEYID = 5
3,169,679 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,415 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,195 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,904 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,787 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,470 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,448 UART: [afmc] --
3,213,478 UART: [cold-reset] --
3,214,354 UART: [state] Locking Datavault
3,215,443 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,047 UART: [state] Locking ICCM
3,216,717 UART: [exit] Launching FMC @ 0x40000130
3,222,047 UART:
3,222,063 UART: Running Caliptra FMC ...
3,222,471 UART:
3,222,614 UART: [state] CFI Enabled
3,233,148 UART: [fht] FMC Alias Private Key: 7
3,351,798 UART: [art] Extend RT PCRs Done
3,352,226 UART: [art] Lock RT PCRs Done
3,354,188 UART: [art] Populate DV Done
3,362,385 UART: [fht] FMC Alias Private Key: 7
3,363,385 UART: [art] Derive CDI
3,363,665 UART: [art] Store in slot 0x4
3,449,009 UART: [art] Derive Key Pair
3,449,369 UART: [art] Store priv key in slot 0x5
3,463,072 UART: [art] Derive Key Pair - Done
3,477,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,621 UART: [art] PUB.X = 91227FBC54BCBA53E77A4573A7BEEFDF7FE697A19D12DE1C860D2826D606F9C2620304FFCE61A2A0E7A82922FFF1935D
3,500,395 UART: [art] PUB.Y = 1196847483DE312B9AB137641DA13498385133CABDCABA0AA07CA34BB8FD4ADFC9285D5E641764539A49090F78AA6DBE
3,507,346 UART: [art] SIG.R = E8A99730D3A4E5DC31D7778642EAED26EF16BC09FD8CCD71E6BAA52FE8D9586466FDD4A6F0723068C9094085AC138CB3
3,514,124 UART: [art] SIG.S = CF9FD71EF9C709433F9EB1E6E39B06C676B6EC13283964D576DED3B9987CDD3DE472707662F6AF97DFCA45683AEB87F9
3,538,134 UART: Caliptra RT
3,538,477 UART: [state] CFI Enabled
3,658,756 UART: [rt] RT listening for mailbox commands...
3,659,426 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,302 UART: [rt]cmd =0x44504543, len=20
3,710,416 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,646 ready_for_fw is high
1,362,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,495 >>> mbox cmd response: success
3,041,734 UART:
3,041,750 UART: Running Caliptra FMC ...
3,042,158 UART:
3,042,301 UART: [state] CFI Enabled
3,053,277 UART: [fht] FMC Alias Private Key: 7
3,172,517 UART: [art] Extend RT PCRs Done
3,172,945 UART: [art] Lock RT PCRs Done
3,174,439 UART: [art] Populate DV Done
3,182,644 UART: [fht] FMC Alias Private Key: 7
3,183,612 UART: [art] Derive CDI
3,183,892 UART: [art] Store in slot 0x4
3,269,750 UART: [art] Derive Key Pair
3,270,110 UART: [art] Store priv key in slot 0x5
3,283,485 UART: [art] Derive Key Pair - Done
3,298,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,687 UART: [art] PUB.X = A9687E46264D776D348BEAA16D226AF38D1E2C2C236CD0620A4682FDDC30011F5656B1F79A387A046ED5B4047309052F
3,321,439 UART: [art] PUB.Y = 281C4D48A7669353A1B1FC16198C26A071865262CE2EAFA69FDEC05AF09AA73FF45B286875B45C01986EEBA6DE9F05B1
3,328,393 UART: [art] SIG.R = A41C099ACC918B656285E6EFEFB47539519A0F5D9CEF3B573052E9CC02735B98F5B8047B3DFED8F859C642F984EDE476
3,335,161 UART: [art] SIG.S = CB1EA3B0C0CAF1831A931249DF4169CF3EDD18D8CE9D4DBA991109571258DE31649537D411AF40870E855C31675BEEEC
3,358,565 UART: Caliptra RT
3,358,908 UART: [state] CFI Enabled
3,479,511 UART: [rt] RT listening for mailbox commands...
3,480,181 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,037 UART: [rt]cmd =0x44504543, len=20
3,530,931 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,161 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,169,754 UART: [cold-reset] ++
1,170,100 UART: [fht] FHT @ 0x50003400
1,172,956 UART: [idev] ++
1,173,124 UART: [idev] CDI.KEYID = 6
1,173,485 UART: [idev] SUBJECT.KEYID = 7
1,173,910 UART: [idev] UDS.KEYID = 0
1,174,256 ready_for_fw is high
1,174,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,739 UART: [idev] Erasing UDS.KEYID = 0
1,198,659 UART: [idev] Sha1 KeyId Algorithm
1,207,503 UART: [idev] --
1,208,630 UART: [ldev] ++
1,208,798 UART: [ldev] CDI.KEYID = 6
1,209,162 UART: [ldev] SUBJECT.KEYID = 5
1,209,589 UART: [ldev] AUTHORITY.KEYID = 7
1,210,052 UART: [ldev] FE.KEYID = 1
1,214,966 UART: [ldev] Erasing FE.KEYID = 1
1,240,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,508 UART: [ldev] --
1,279,815 UART: [fwproc] Wait for Commands...
1,280,624 UART: [fwproc] Recv command 0x46574c44
1,281,357 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,047 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,222 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,505 >>> mbox cmd response: success
2,825,621 UART: [afmc] ++
2,825,789 UART: [afmc] CDI.KEYID = 6
2,826,152 UART: [afmc] SUBJECT.KEYID = 7
2,826,578 UART: [afmc] AUTHORITY.KEYID = 5
2,862,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,499 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,209 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,090 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,791 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,560 UART: [afmc] --
2,905,473 UART: [cold-reset] --
2,906,199 UART: [state] Locking Datavault
2,907,370 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,974 UART: [state] Locking ICCM
2,908,424 UART: [exit] Launching FMC @ 0x40000130
2,913,754 UART:
2,913,770 UART: Running Caliptra FMC ...
2,914,178 UART:
2,914,232 UART: [state] CFI Enabled
2,924,862 UART: [fht] FMC Alias Private Key: 7
3,043,938 UART: [art] Extend RT PCRs Done
3,044,366 UART: [art] Lock RT PCRs Done
3,045,760 UART: [art] Populate DV Done
3,054,075 UART: [fht] FMC Alias Private Key: 7
3,055,231 UART: [art] Derive CDI
3,055,511 UART: [art] Store in slot 0x4
3,141,230 UART: [art] Derive Key Pair
3,141,590 UART: [art] Store priv key in slot 0x5
3,154,812 UART: [art] Derive Key Pair - Done
3,169,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,747 UART: [art] PUB.X = 9B74C280A68452DB98E1C41FB04C52F5D239E19CC26DAF883F96C25B7E59FDDA8D617521BC6A904B578CE9BA6BC94420
3,192,529 UART: [art] PUB.Y = B24F7A871A1448AED1C2955FC0A529FC9CB15E1EE53FED77A945A2D009736D442DE41BBBF2ABB446B8CAB03EA763A00C
3,199,495 UART: [art] SIG.R = 91ACA4C0818E4313E2324115E18A5E57F136B2AC5B7214E17598D09175072FC78DBD78FF7FA535A40E461F3335430237
3,206,250 UART: [art] SIG.S = 1DE3122BCFD664E9E114D50EA5DBBFF8F0DFD0BF3F38E0E5BADFC67818CDE41DE6CE2F44B035C042FF323ED1F0A82B34
3,229,945 UART: Caliptra RT
3,230,196 UART: [state] CFI Enabled
3,350,501 UART: [rt] RT listening for mailbox commands...
3,351,171 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,183 UART: [rt]cmd =0x44504543, len=20
3,402,233 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,102 ready_for_fw is high
1,059,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,124 >>> mbox cmd response: success
2,742,075 UART:
2,742,091 UART: Running Caliptra FMC ...
2,742,499 UART:
2,742,553 UART: [state] CFI Enabled
2,753,049 UART: [fht] FMC Alias Private Key: 7
2,872,493 UART: [art] Extend RT PCRs Done
2,872,921 UART: [art] Lock RT PCRs Done
2,874,281 UART: [art] Populate DV Done
2,882,708 UART: [fht] FMC Alias Private Key: 7
2,883,736 UART: [art] Derive CDI
2,884,016 UART: [art] Store in slot 0x4
2,969,859 UART: [art] Derive Key Pair
2,970,219 UART: [art] Store priv key in slot 0x5
2,983,721 UART: [art] Derive Key Pair - Done
2,998,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,768 UART: [art] PUB.X = 13CA71493CDD26FC3026575FB1B27543ADFE72EAF183DA9DD2982E212BBC400D2C5600D917D16481894EF03D0C90B8A5
3,021,518 UART: [art] PUB.Y = 281F5675D49CDF2A822D8F90E94214FA07B06C1F891473EE848FD96F90AD8776835DF0369EC4965BC296E919ABE44BE5
3,028,469 UART: [art] SIG.R = 62A7E2A3BF91CA94F31EBEF591B8B525686019435EDC3402150CEF40BE08E8202E43073F1AB9DBB685A14B278620435C
3,035,231 UART: [art] SIG.S = 9233393973F89C0271C83C14123F2129D45A3D6B9CA8CCCC8CDACE2A8B6562A7355716AFC69E8749E024C261763AD3D8
3,058,672 UART: Caliptra RT
3,058,923 UART: [state] CFI Enabled
3,179,364 UART: [rt] RT listening for mailbox commands...
3,180,034 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,960 UART: [rt]cmd =0x44504543, len=20
3,230,932 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,779 UART: [state] LifecycleState = Unprovisioned
86,434 UART: [state] DebugLocked = No
87,064 UART: [state] WD Timer not started. Device not locked for debugging
88,337 UART: [kat] SHA2-256
891,887 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,991 UART: [kat] ++
896,143 UART: [kat] sha1
900,407 UART: [kat] SHA2-256
902,347 UART: [kat] SHA2-384
905,212 UART: [kat] SHA2-512-ACC
907,113 UART: [kat] ECC-384
916,628 UART: [kat] HMAC-384Kdf
921,156 UART: [kat] LMS
1,169,468 UART: [kat] --
1,170,263 UART: [cold-reset] ++
1,170,725 UART: [fht] FHT @ 0x50003400
1,173,253 UART: [idev] ++
1,173,421 UART: [idev] CDI.KEYID = 6
1,173,782 UART: [idev] SUBJECT.KEYID = 7
1,174,207 UART: [idev] UDS.KEYID = 0
1,174,553 ready_for_fw is high
1,174,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,964 UART: [idev] Erasing UDS.KEYID = 0
1,199,076 UART: [idev] Sha1 KeyId Algorithm
1,208,018 UART: [idev] --
1,209,287 UART: [ldev] ++
1,209,455 UART: [ldev] CDI.KEYID = 6
1,209,819 UART: [ldev] SUBJECT.KEYID = 5
1,210,246 UART: [ldev] AUTHORITY.KEYID = 7
1,210,709 UART: [ldev] FE.KEYID = 1
1,215,899 UART: [ldev] Erasing FE.KEYID = 1
1,242,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,555 UART: [ldev] --
1,281,950 UART: [fwproc] Wait for Commands...
1,282,641 UART: [fwproc] Recv command 0x46574c44
1,283,374 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,124 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,299 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,458 >>> mbox cmd response: success
2,828,642 UART: [afmc] ++
2,828,810 UART: [afmc] CDI.KEYID = 6
2,829,173 UART: [afmc] SUBJECT.KEYID = 7
2,829,599 UART: [afmc] AUTHORITY.KEYID = 5
2,865,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,290 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,000 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,881 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,582 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,571 UART: [afmc] --
2,908,628 UART: [cold-reset] --
2,909,304 UART: [state] Locking Datavault
2,910,517 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,121 UART: [state] Locking ICCM
2,911,647 UART: [exit] Launching FMC @ 0x40000130
2,916,977 UART:
2,916,993 UART: Running Caliptra FMC ...
2,917,401 UART:
2,917,544 UART: [state] CFI Enabled
2,927,950 UART: [fht] FMC Alias Private Key: 7
3,047,112 UART: [art] Extend RT PCRs Done
3,047,540 UART: [art] Lock RT PCRs Done
3,048,784 UART: [art] Populate DV Done
3,056,841 UART: [fht] FMC Alias Private Key: 7
3,057,851 UART: [art] Derive CDI
3,058,131 UART: [art] Store in slot 0x4
3,143,878 UART: [art] Derive Key Pair
3,144,238 UART: [art] Store priv key in slot 0x5
3,157,676 UART: [art] Derive Key Pair - Done
3,172,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,407 UART: [art] PUB.X = 04DAA319340EC59248B442E6C4FABF2A346AD513F4F329334D34C55E2F6004A3A393F91383064BAD77493BA8D0A59FC0
3,195,169 UART: [art] PUB.Y = 9700B65A880492DBD593DFBFEC81787D5E9F7D6650FB331A98EA3F33F8DD1CAC056078F39CD1A42E8F27ADDFA86728B6
3,202,107 UART: [art] SIG.R = C2A40EF8474E5C35A14AAFAD08D95768C5029CD30E99A3229B374FF122F6C3675D85242934BE48079118B8E8DD1F75BA
3,208,866 UART: [art] SIG.S = C4ADBD8D55C93AFDE37FAEA1F25A050C10FD7B29771BC3C7FF07B35B0169A61A9CBA8A794C9A92CDDB83C48723AD8377
3,232,128 UART: Caliptra RT
3,232,471 UART: [state] CFI Enabled
3,351,985 UART: [rt] RT listening for mailbox commands...
3,352,655 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,737 UART: [rt]cmd =0x44504543, len=20
3,403,783 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,803 ready_for_fw is high
1,059,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,291 >>> mbox cmd response: success
2,741,810 UART:
2,741,826 UART: Running Caliptra FMC ...
2,742,234 UART:
2,742,377 UART: [state] CFI Enabled
2,753,141 UART: [fht] FMC Alias Private Key: 7
2,872,011 UART: [art] Extend RT PCRs Done
2,872,439 UART: [art] Lock RT PCRs Done
2,873,677 UART: [art] Populate DV Done
2,882,152 UART: [fht] FMC Alias Private Key: 7
2,883,086 UART: [art] Derive CDI
2,883,366 UART: [art] Store in slot 0x4
2,968,845 UART: [art] Derive Key Pair
2,969,205 UART: [art] Store priv key in slot 0x5
2,983,081 UART: [art] Derive Key Pair - Done
2,997,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,151 UART: [art] PUB.X = A2561BE4F882504B93D5C9945E073A811A91F6015323CC1816AC65509FCAC5ACB2C2B4A8A9EB475D76783FF07350811D
3,020,917 UART: [art] PUB.Y = F6534A21863060F33144A3214D405D74774B1C097D69102A870DAD2C170E00A506FBF72C097EB1F1383CD61012DAB483
3,027,824 UART: [art] SIG.R = 762BBF9DCCB001FABF7B0AFE1DFA857A0F04507056EBB9281DAB90EBC53D9D86CC9B446F6293A5D910AC1A3D07E0C26F
3,034,605 UART: [art] SIG.S = 62DBDADDAF39D4D08B07A59F761DF6854A2A716B16E9F729281474724F91BEF6A8E1B2E88339976CD99B588ED6641174
3,058,044 UART: Caliptra RT
3,058,387 UART: [state] CFI Enabled
3,178,229 UART: [rt] RT listening for mailbox commands...
3,178,899 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,685 UART: [rt]cmd =0x44504543, len=20
3,229,461 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
893,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,577 UART: [kat] ++
897,729 UART: [kat] sha1
901,931 UART: [kat] SHA2-256
903,871 UART: [kat] SHA2-384
906,520 UART: [kat] SHA2-512-ACC
908,421 UART: [kat] ECC-384
917,932 UART: [kat] HMAC-384Kdf
922,690 UART: [kat] LMS
1,171,018 UART: [kat] --
1,171,865 UART: [cold-reset] ++
1,172,395 UART: [fht] FHT @ 0x50003400
1,175,008 UART: [idev] ++
1,175,176 UART: [idev] CDI.KEYID = 6
1,175,536 UART: [idev] SUBJECT.KEYID = 7
1,175,960 UART: [idev] UDS.KEYID = 0
1,176,305 ready_for_fw is high
1,176,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,040 UART: [idev] Erasing UDS.KEYID = 0
1,200,823 UART: [idev] Sha1 KeyId Algorithm
1,209,209 UART: [idev] --
1,210,407 UART: [ldev] ++
1,210,575 UART: [ldev] CDI.KEYID = 6
1,210,938 UART: [ldev] SUBJECT.KEYID = 5
1,211,364 UART: [ldev] AUTHORITY.KEYID = 7
1,211,827 UART: [ldev] FE.KEYID = 1
1,216,957 UART: [ldev] Erasing FE.KEYID = 1
1,243,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,183 UART: [ldev] --
1,283,474 UART: [fwproc] Wait for Commands...
1,284,068 UART: [fwproc] Recv command 0x46574c44
1,284,796 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,338 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,508 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,789 >>> mbox cmd response: success
2,829,027 UART: [afmc] ++
2,829,195 UART: [afmc] CDI.KEYID = 6
2,829,557 UART: [afmc] SUBJECT.KEYID = 7
2,829,982 UART: [afmc] AUTHORITY.KEYID = 5
2,865,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,530 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,239 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,122 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,823 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,507 UART: [afmc] --
2,908,603 UART: [cold-reset] --
2,909,361 UART: [state] Locking Datavault
2,910,834 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,438 UART: [state] Locking ICCM
2,912,054 UART: [exit] Launching FMC @ 0x40000130
2,917,384 UART:
2,917,400 UART: Running Caliptra FMC ...
2,917,808 UART:
2,917,862 UART: [state] CFI Enabled
2,928,232 UART: [fht] FMC Alias Private Key: 7
3,046,638 UART: [art] Extend RT PCRs Done
3,047,066 UART: [art] Lock RT PCRs Done
3,048,478 UART: [art] Populate DV Done
3,056,843 UART: [fht] FMC Alias Private Key: 7
3,058,005 UART: [art] Derive CDI
3,058,285 UART: [art] Store in slot 0x4
3,144,304 UART: [art] Derive Key Pair
3,144,664 UART: [art] Store priv key in slot 0x5
3,157,774 UART: [art] Derive Key Pair - Done
3,172,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,541 UART: [art] PUB.X = 6E69E10D30CF902D7169F44FD2ED112E44AC750867A9F8BC182BED112B0DF152366B81DE09CA2E9AF4BED112C9DFAFCF
3,196,321 UART: [art] PUB.Y = 94C374CC1A5E75A380E5224BA8E9077816F6EF9CE8F86C3B4D0D924531E7A6F2D5AF528410919B4AE4C0BAA379DB196A
3,203,275 UART: [art] SIG.R = 821E35E0F03291C1906062FB86C68A0188A698327C47E51B7A9FF53EC091D0E631F76597D3DDB8BE54B7E2B28D593761
3,210,040 UART: [art] SIG.S = F7894F6912C2BA6B8BF8CCDB52E6D639961FD587ED94DA42AF2A798FB48EA3094CD58D849FE43DC56D4D66D138C09205
3,233,802 UART: Caliptra RT
3,234,053 UART: [state] CFI Enabled
3,353,789 UART: [rt] RT listening for mailbox commands...
3,354,459 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,237 UART: [rt]cmd =0x44504543, len=20
3,405,023 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,893 ready_for_fw is high
1,059,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,578 >>> mbox cmd response: success
2,741,131 UART:
2,741,147 UART: Running Caliptra FMC ...
2,741,555 UART:
2,741,609 UART: [state] CFI Enabled
2,751,773 UART: [fht] FMC Alias Private Key: 7
2,871,083 UART: [art] Extend RT PCRs Done
2,871,511 UART: [art] Lock RT PCRs Done
2,873,033 UART: [art] Populate DV Done
2,881,208 UART: [fht] FMC Alias Private Key: 7
2,882,346 UART: [art] Derive CDI
2,882,626 UART: [art] Store in slot 0x4
2,968,161 UART: [art] Derive Key Pair
2,968,521 UART: [art] Store priv key in slot 0x5
2,981,655 UART: [art] Derive Key Pair - Done
2,996,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,787 UART: [art] PUB.X = 76F96D55A85D08D82489686E55409496DDACF9380E93ECF27559BEA725CB92B6FF0677EA78FEAB38341B126DBCAD899E
3,019,558 UART: [art] PUB.Y = 65876C2DCF2420ABF6C8C14EFFCC61AAA2A87A6F893CB89C7CAA94AC3A407AC4D0F7A719341A7FD6B9722F555A3F81F6
3,026,530 UART: [art] SIG.R = F57D421B0835498724B779670E9D5EC33937F2BE1BC84D7CF8448309AD780A65F8229726B22B4C2A5391E5DC6388C4C7
3,033,284 UART: [art] SIG.S = BB33EAECB7591113C219156F7A5A7C4C482D4CE2B4AA7C6DC9B141821CED215E99B82939B2C4A1F42791FFA68AD16C44
3,056,942 UART: Caliptra RT
3,057,193 UART: [state] CFI Enabled
3,177,015 UART: [rt] RT listening for mailbox commands...
3,177,685 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,703 UART: [rt]cmd =0x44504543, len=20
3,228,289 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
893,721 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,846 UART: [kat] ++
897,998 UART: [kat] sha1
902,048 UART: [kat] SHA2-256
903,988 UART: [kat] SHA2-384
906,849 UART: [kat] SHA2-512-ACC
908,750 UART: [kat] ECC-384
918,301 UART: [kat] HMAC-384Kdf
923,129 UART: [kat] LMS
1,171,457 UART: [kat] --
1,172,570 UART: [cold-reset] ++
1,172,948 UART: [fht] FHT @ 0x50003400
1,175,453 UART: [idev] ++
1,175,621 UART: [idev] CDI.KEYID = 6
1,175,981 UART: [idev] SUBJECT.KEYID = 7
1,176,405 UART: [idev] UDS.KEYID = 0
1,176,750 ready_for_fw is high
1,176,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,845 UART: [idev] Erasing UDS.KEYID = 0
1,201,878 UART: [idev] Sha1 KeyId Algorithm
1,210,384 UART: [idev] --
1,211,290 UART: [ldev] ++
1,211,458 UART: [ldev] CDI.KEYID = 6
1,211,821 UART: [ldev] SUBJECT.KEYID = 5
1,212,247 UART: [ldev] AUTHORITY.KEYID = 7
1,212,710 UART: [ldev] FE.KEYID = 1
1,217,824 UART: [ldev] Erasing FE.KEYID = 1
1,244,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,764 UART: [ldev] --
1,284,233 UART: [fwproc] Wait for Commands...
1,284,977 UART: [fwproc] Recv command 0x46574c44
1,285,705 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,579 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,749 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,910 >>> mbox cmd response: success
2,829,128 UART: [afmc] ++
2,829,296 UART: [afmc] CDI.KEYID = 6
2,829,658 UART: [afmc] SUBJECT.KEYID = 7
2,830,083 UART: [afmc] AUTHORITY.KEYID = 5
2,865,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,821 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,569 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,278 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,161 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,862 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,558 UART: [afmc] --
2,908,544 UART: [cold-reset] --
2,909,528 UART: [state] Locking Datavault
2,910,915 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,519 UART: [state] Locking ICCM
2,911,965 UART: [exit] Launching FMC @ 0x40000130
2,917,295 UART:
2,917,311 UART: Running Caliptra FMC ...
2,917,719 UART:
2,917,862 UART: [state] CFI Enabled
2,928,614 UART: [fht] FMC Alias Private Key: 7
3,047,400 UART: [art] Extend RT PCRs Done
3,047,828 UART: [art] Lock RT PCRs Done
3,049,246 UART: [art] Populate DV Done
3,057,157 UART: [fht] FMC Alias Private Key: 7
3,058,127 UART: [art] Derive CDI
3,058,407 UART: [art] Store in slot 0x4
3,143,798 UART: [art] Derive Key Pair
3,144,158 UART: [art] Store priv key in slot 0x5
3,158,040 UART: [art] Derive Key Pair - Done
3,172,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,274 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,039 UART: [art] PUB.X = 9351E6439A9291A255D4CC1EFB443C9AE9E79147A2D12A87F6F46C1D634D913CDC3B5731616435B2D33DE463355F5BE8
3,195,811 UART: [art] PUB.Y = 805D9C3B529B89887D4ADB46F7CBA20795F8213469C3E4AD0985069299FC89BEDD2CDF2F57DEC76E109E9262CA2F8CA8
3,202,764 UART: [art] SIG.R = FEE5D2035F9A09EF5F32E350B782C9516225C26DAC715464A7B9E06BA7F4006A1CCA18C0B7C7C0BEA7D7B3F801358DEF
3,209,519 UART: [art] SIG.S = 9B5D3A2881265502DD6D11766FCA8397C2316AD62B26EC25B85C297D6486410F1262D0B7AECCE7362D5E980BC5483D45
3,233,650 UART: Caliptra RT
3,233,993 UART: [state] CFI Enabled
3,353,671 UART: [rt] RT listening for mailbox commands...
3,354,341 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,311 UART: [rt]cmd =0x44504543, len=20
3,405,417 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,994 ready_for_fw is high
1,059,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,343 >>> mbox cmd response: success
2,740,532 UART:
2,740,548 UART: Running Caliptra FMC ...
2,740,956 UART:
2,741,099 UART: [state] CFI Enabled
2,751,493 UART: [fht] FMC Alias Private Key: 7
2,870,355 UART: [art] Extend RT PCRs Done
2,870,783 UART: [art] Lock RT PCRs Done
2,871,995 UART: [art] Populate DV Done
2,880,098 UART: [fht] FMC Alias Private Key: 7
2,881,048 UART: [art] Derive CDI
2,881,328 UART: [art] Store in slot 0x4
2,966,805 UART: [art] Derive Key Pair
2,967,165 UART: [art] Store priv key in slot 0x5
2,980,727 UART: [art] Derive Key Pair - Done
2,995,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,585 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,350 UART: [art] PUB.X = 3CE4FE75ED0395AF201D3FF4F45608AFE2C89890FADB591E4B324BEBD4F99AA72B502BCBF3A93CBF93891326A4B34FDC
3,018,138 UART: [art] PUB.Y = A41E98583E2EDCE3B03C048E8410211CF5788D89C6CDA14157F79822FC5BF8B440B59472A33FF074F78B67D9D02FF820
3,025,089 UART: [art] SIG.R = BF035D2BEBE0927ACB6992C102AA4127FC3C96DC3544F84A7DA1DD0113D02252BC1678D85F495511D939FEA7B81C3588
3,031,858 UART: [art] SIG.S = D1AC714E6740C86D3EE50E8C24F4317BE4A2E2395698FA2FD1FA468D906DF86DC80BD464CB1DAC72289C597A7F2FF056
3,055,510 UART: Caliptra RT
3,055,853 UART: [state] CFI Enabled
3,175,059 UART: [rt] RT listening for mailbox commands...
3,175,729 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,779 UART: [rt]cmd =0x44504543, len=20
3,227,087 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,187 UART:
192,540 UART: Running Caliptra ROM ...
193,737 UART:
193,895 UART: [state] CFI Enabled
264,184 UART: [state] LifecycleState = Unprovisioned
266,556 UART: [state] DebugLocked = No
268,538 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,513 UART: [kat] SHA2-256
443,192 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,724 UART: [kat] ++
454,173 UART: [kat] sha1
463,983 UART: [kat] SHA2-256
466,712 UART: [kat] SHA2-384
472,273 UART: [kat] SHA2-512-ACC
474,638 UART: [kat] ECC-384
2,768,769 UART: [kat] HMAC-384Kdf
2,800,439 UART: [kat] LMS
3,990,773 UART: [kat] --
3,996,140 UART: [cold-reset] ++
3,998,428 UART: [fht] Storing FHT @ 0x50003400
4,009,480 UART: [idev] ++
4,010,053 UART: [idev] CDI.KEYID = 6
4,011,014 UART: [idev] SUBJECT.KEYID = 7
4,012,282 UART: [idev] UDS.KEYID = 0
4,013,259 ready_for_fw is high
4,013,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,556 UART: [idev] Erasing UDS.KEYID = 0
7,345,472 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,252 UART: [idev] --
7,370,757 UART: [ldev] ++
7,371,325 UART: [ldev] CDI.KEYID = 6
7,372,270 UART: [ldev] SUBJECT.KEYID = 5
7,373,484 UART: [ldev] AUTHORITY.KEYID = 7
7,374,772 UART: [ldev] FE.KEYID = 1
7,419,964 UART: [ldev] Erasing FE.KEYID = 1
10,754,373 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,387 UART: [ldev] --
13,113,350 UART: [fwproc] Waiting for Commands...
13,115,710 UART: [fwproc] Received command 0x46574c44
13,117,892 UART: [fwproc] Received Image of size 118548 bytes
17,222,047 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,294,298 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,367,484 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,695,560 >>> mbox cmd response: success
17,700,205 UART: [afmc] ++
17,700,806 UART: [afmc] CDI.KEYID = 6
17,701,775 UART: [afmc] SUBJECT.KEYID = 7
17,702,927 UART: [afmc] AUTHORITY.KEYID = 5
21,070,701 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,944 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,204 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,638 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,349 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,735 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,438,655 UART: [afmc] --
23,442,249 UART: [cold-reset] --
23,446,273 UART: [state] Locking Datavault
23,451,518 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,279 UART: [state] Locking ICCM
23,455,587 UART: [exit] Launching FMC @ 0x40000130
23,463,991 UART:
23,464,227 UART: Running Caliptra FMC ...
23,465,325 UART:
23,465,485 UART: [state] CFI Enabled
23,532,053 UART: [fht] FMC Alias Private Key: 7
25,871,878 UART: [art] Extend RT PCRs Done
25,873,115 UART: [art] Lock RT PCRs Done
25,874,683 UART: [art] Populate DV Done
25,880,207 UART: [fht] FMC Alias Private Key: 7
25,881,910 UART: [art] Derive CDI
25,882,726 UART: [art] Store in slot 0x4
25,939,553 UART: [art] Derive Key Pair
25,940,553 UART: [art] Store priv key in slot 0x5
29,233,323 UART: [art] Derive Key Pair - Done
29,246,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,934 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,443 UART: [art] PUB.X = 433A7D5E2B6B0804D3B9D234D89CFA7EE8CCFA9BA2E92271A78E1280A98392A7B44D2A579D6DEC750E35823E8D8F883C
31,542,720 UART: [art] PUB.Y = FA437A0F7ADC65F512F080A00985D77BAC4DD45D459F8B06D1507D7719FBB048B1846D436EEDB45988E205BCBCCE1AAB
31,550,010 UART: [art] SIG.R = BFD3EBC98D69A94D6469CA8D36881E385CCD03BA46E1358621DF82965D3639D3F2194976F7DD90444FDF8DBAC4321855
31,557,385 UART: [art] SIG.S = E7CB4E0AF3C41431E3D1C44DAC4D82DDCD7124042A58246AB225B5ECBF05BE9184AF7781CB42BE349AE94F2CFC5E4B4C
32,862,760 UART: Caliptra RT
32,863,480 UART: [state] CFI Enabled
33,059,595 UART: [rt] RT listening for mailbox commands...
33,061,545 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,091,616 UART: [rt]cmd =0x44504543, len=40
33,140,042 >>> mbox cmd response data (40 bytes)
33,141,349 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,171,568 UART: [rt]cmd =0x44504543, len=40
33,194,557 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,438 writing to cptra_bootfsm_go
3,785,518 ready_for_fw is high
3,786,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,949,700 >>> mbox cmd response: success
23,638,619 UART:
23,639,187 UART: Running Caliptra FMC ...
23,640,303 UART:
23,640,471 UART: [state] CFI Enabled
23,705,017 UART: [fht] FMC Alias Private Key: 7
26,045,721 UART: [art] Extend RT PCRs Done
26,046,954 UART: [art] Lock RT PCRs Done
26,048,860 UART: [art] Populate DV Done
26,054,282 UART: [fht] FMC Alias Private Key: 7
26,055,985 UART: [art] Derive CDI
26,056,820 UART: [art] Store in slot 0x4
26,113,546 UART: [art] Derive Key Pair
26,114,593 UART: [art] Store priv key in slot 0x5
29,406,835 UART: [art] Derive Key Pair - Done
29,419,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,708,565 UART: [art] Erasing AUTHORITY.KEYID = 7
31,710,081 UART: [art] PUB.X = 81DB19650EE2D0939C17D507FB60AA363E1F16142E86DA1C8FE5C5D12810CD61F981CB07C88EA3E54A56360B87A81BA2
31,717,351 UART: [art] PUB.Y = 6B3F12D36156AB97686FC23C30E67A8DB01216EF028C24061E701DFA1F216CE286E241F988E2A84848B8D3BDE594735A
31,724,601 UART: [art] SIG.R = 548ABC9E5BA11BA4743752A62A414B61EA47D2D032692EE54FA230C8DAF7494D91631C19962B3902F46B20639316CC8E
31,731,964 UART: [art] SIG.S = CE2ECC71F25AE9E9F8A217BAE5227688A90EB0F4155B87D0AB965FB7933B46231593A7EC9F5BF4A975AB6C2E605104F7
33,037,254 UART: Caliptra RT
33,037,983 UART: [state] CFI Enabled
33,213,912 UART: [rt] RT listening for mailbox commands...
33,215,833 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,246,005 UART: [rt]cmd =0x44504543, len=40
33,294,518 >>> mbox cmd response data (40 bytes)
33,295,898 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,326,059 UART: [rt]cmd =0x44504543, len=40
33,348,921 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,494 UART:
192,854 UART: Running Caliptra ROM ...
194,040 UART:
603,467 UART: [state] CFI Enabled
617,945 UART: [state] LifecycleState = Unprovisioned
619,882 UART: [state] DebugLocked = No
621,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,439 UART: [kat] SHA2-256
796,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,583 UART: [kat] ++
807,059 UART: [kat] sha1
817,864 UART: [kat] SHA2-256
820,591 UART: [kat] SHA2-384
825,083 UART: [kat] SHA2-512-ACC
827,466 UART: [kat] ECC-384
3,110,295 UART: [kat] HMAC-384Kdf
3,122,735 UART: [kat] LMS
4,312,795 UART: [kat] --
4,318,674 UART: [cold-reset] ++
4,319,609 UART: [fht] Storing FHT @ 0x50003400
4,329,585 UART: [idev] ++
4,330,133 UART: [idev] CDI.KEYID = 6
4,331,091 UART: [idev] SUBJECT.KEYID = 7
4,332,327 UART: [idev] UDS.KEYID = 0
4,333,299 ready_for_fw is high
4,333,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,432 UART: [idev] Erasing UDS.KEYID = 0
7,623,569 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,297 UART: [idev] --
7,650,053 UART: [ldev] ++
7,650,640 UART: [ldev] CDI.KEYID = 6
7,651,524 UART: [ldev] SUBJECT.KEYID = 5
7,652,782 UART: [ldev] AUTHORITY.KEYID = 7
7,654,056 UART: [ldev] FE.KEYID = 1
7,663,291 UART: [ldev] Erasing FE.KEYID = 1
10,953,436 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,962 UART: [ldev] --
13,315,111 UART: [fwproc] Waiting for Commands...
13,317,957 UART: [fwproc] Received command 0x46574c44
13,320,184 UART: [fwproc] Received Image of size 118548 bytes
17,427,185 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,852 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,707 >>> mbox cmd response: success
17,910,245 UART: [afmc] ++
17,910,931 UART: [afmc] CDI.KEYID = 6
17,911,828 UART: [afmc] SUBJECT.KEYID = 7
17,912,985 UART: [afmc] AUTHORITY.KEYID = 5
21,226,113 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,523,083 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,331 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,766 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,469 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,884 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,301 UART: [afmc] --
23,594,876 UART: [cold-reset] --
23,600,097 UART: [state] Locking Datavault
23,606,967 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,738 UART: [state] Locking ICCM
23,610,399 UART: [exit] Launching FMC @ 0x40000130
23,618,786 UART:
23,619,013 UART: Running Caliptra FMC ...
23,620,109 UART:
23,620,262 UART: [state] CFI Enabled
23,628,601 UART: [fht] FMC Alias Private Key: 7
25,968,774 UART: [art] Extend RT PCRs Done
25,970,014 UART: [art] Lock RT PCRs Done
25,971,783 UART: [art] Populate DV Done
25,977,189 UART: [fht] FMC Alias Private Key: 7
25,978,722 UART: [art] Derive CDI
25,979,450 UART: [art] Store in slot 0x4
26,022,120 UART: [art] Derive Key Pair
26,023,154 UART: [art] Store priv key in slot 0x5
29,264,886 UART: [art] Derive Key Pair - Done
29,277,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,394 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,911 UART: [art] PUB.X = 661BB267A698B2E6F3899AD25F4686A1CDF425B97593652A9E8796CC89E84A66D3990B4044C0581255B2F00CCE608327
31,567,174 UART: [art] PUB.Y = 9932F57004562E13350D32100C9CF1F9E9CD4F368CA5EAAF76C47F3E732C1A34A2D07234C9B2CFF63DC2377DEB915138
31,574,406 UART: [art] SIG.R = E73AAE179AF791861F79F6BFCA2C052821ACC89FB875146DB029A0D3A4B2414C73E52E4E56D42A4D40C85C392DBE11C5
31,581,862 UART: [art] SIG.S = 2B14F18E91524B1B1444777694A838BD1CD6E5590F34637196A8DBC2A8D490EFFB605DFD2E415B5ADBF935C6F5E8DDF2
32,887,465 UART: Caliptra RT
32,888,183 UART: [state] CFI Enabled
33,021,177 UART: [rt] RT listening for mailbox commands...
33,023,085 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,053,294 UART: [rt]cmd =0x44504543, len=40
33,080,861 >>> mbox cmd response data (40 bytes)
33,081,953 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,112,233 UART: [rt]cmd =0x44504543, len=40
33,135,270 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
4,129,853 ready_for_fw is high
4,130,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,804 >>> mbox cmd response: success
23,799,771 UART:
23,800,202 UART: Running Caliptra FMC ...
23,801,343 UART:
23,801,504 UART: [state] CFI Enabled
23,809,514 UART: [fht] FMC Alias Private Key: 7
26,149,614 UART: [art] Extend RT PCRs Done
26,150,834 UART: [art] Lock RT PCRs Done
26,152,673 UART: [art] Populate DV Done
26,157,983 UART: [fht] FMC Alias Private Key: 7
26,159,569 UART: [art] Derive CDI
26,160,333 UART: [art] Store in slot 0x4
26,203,040 UART: [art] Derive Key Pair
26,204,087 UART: [art] Store priv key in slot 0x5
29,445,810 UART: [art] Derive Key Pair - Done
29,458,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,225 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,735 UART: [art] PUB.X = 94F16218ED05F0FE649E2942D936F8EB0CCE04A6D8FECD6728EA8E55446DEBBA6155760CB03A3FAB11E4BD4156C5137D
31,748,034 UART: [art] PUB.Y = 5AFA80430A39B30A69AFCFCFE773F939CD67B40E78986344468856AAEAF6C8F6B418D023F0B1515306A804479FC26883
31,755,251 UART: [art] SIG.R = 4C19AEEE5DF3D217D6F93221936AB98F3D259321FDEE01415BEE3D5F49E2D05EC4774D613CF81058B18366AE9EC8928E
31,762,639 UART: [art] SIG.S = 393372A9F330BFA900FACCC9313979074F0DFB2EB5DC6ABC882A161F4227CFCAF1F86C25B367361DD837613F36FF1BEB
33,067,388 UART: Caliptra RT
33,068,116 UART: [state] CFI Enabled
33,201,983 UART: [rt] RT listening for mailbox commands...
33,203,898 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,233,939 UART: [rt]cmd =0x44504543, len=40
33,261,586 >>> mbox cmd response data (40 bytes)
33,262,888 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,293,137 UART: [rt]cmd =0x44504543, len=40
33,316,170 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,031 UART:
192,381 UART: Running Caliptra ROM ...
193,589 UART:
193,743 UART: [state] CFI Enabled
261,837 UART: [state] LifecycleState = Unprovisioned
263,822 UART: [state] DebugLocked = No
266,278 UART: [state] WD Timer not started. Device not locked for debugging
269,886 UART: [kat] SHA2-256
449,602 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,342 UART: [kat] ++
460,817 UART: [kat] sha1
470,199 UART: [kat] SHA2-256
472,942 UART: [kat] SHA2-384
478,292 UART: [kat] SHA2-512-ACC
480,658 UART: [kat] ECC-384
2,925,210 UART: [kat] HMAC-384Kdf
2,948,717 UART: [kat] LMS
3,425,221 UART: [kat] --
3,430,441 UART: [cold-reset] ++
3,433,086 UART: [fht] FHT @ 0x50003400
3,445,345 UART: [idev] ++
3,445,912 UART: [idev] CDI.KEYID = 6
3,446,939 UART: [idev] SUBJECT.KEYID = 7
3,448,109 UART: [idev] UDS.KEYID = 0
3,449,037 ready_for_fw is high
3,449,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,408 UART: [idev] Erasing UDS.KEYID = 0
5,963,615 UART: [idev] Sha1 KeyId Algorithm
5,987,359 UART: [idev] --
5,992,628 UART: [ldev] ++
5,993,206 UART: [ldev] CDI.KEYID = 6
5,994,115 UART: [ldev] SUBJECT.KEYID = 5
5,995,321 UART: [ldev] AUTHORITY.KEYID = 7
5,996,608 UART: [ldev] FE.KEYID = 1
6,034,065 UART: [ldev] Erasing FE.KEYID = 1
8,540,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,307,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,344,897 UART: [ldev] --
10,349,996 UART: [fwproc] Wait for Commands...
10,353,166 UART: [fwproc] Recv command 0x46574c44
10,355,190 UART: [fwproc] Recv'd Img size: 118548 bytes
13,835,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,908,923 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,981,925 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,309,901 >>> mbox cmd response: success
14,313,465 UART: [afmc] ++
14,314,073 UART: [afmc] CDI.KEYID = 6
14,315,009 UART: [afmc] SUBJECT.KEYID = 7
14,316,227 UART: [afmc] AUTHORITY.KEYID = 5
16,851,496 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,592,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,594,492 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,610,283 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,626,340 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,641,896 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,665,365 UART: [afmc] --
18,669,766 UART: [cold-reset] --
18,672,974 UART: [state] Locking Datavault
18,678,051 UART: [state] Locking PCR0, PCR1 and PCR31
18,679,802 UART: [state] Locking ICCM
18,681,784 UART: [exit] Launching FMC @ 0x40000130
18,690,225 UART:
18,690,457 UART: Running Caliptra FMC ...
18,691,575 UART:
18,691,734 UART: [state] CFI Enabled
18,749,767 UART: [fht] FMC Alias Private Key: 7
20,515,568 UART: [art] Extend RT PCRs Done
20,516,788 UART: [art] Lock RT PCRs Done
20,518,440 UART: [art] Populate DV Done
20,523,746 UART: [fht] FMC Alias Private Key: 7
20,525,441 UART: [art] Derive CDI
20,526,254 UART: [art] Store in slot 0x4
20,581,774 UART: [art] Derive Key Pair
20,582,819 UART: [art] Store priv key in slot 0x5
23,045,856 UART: [art] Derive Key Pair - Done
23,058,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,771,128 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,629 UART: [art] PUB.X = 3CC8BD686681329383A80049BD3238926DE4BCA2F04F934A432CA0E5C954F08CD5B1141E67ECDC7AE79B1234CF8215BD
24,779,878 UART: [art] PUB.Y = E7588B84092EAFD685DBF6C4475FEC076F0327B288E801C48A1DD3BF17969FB6FD14CACB1EBFAEEF49EB1823C979BE93
24,787,215 UART: [art] SIG.R = B49ADAA3F66F15AABB9A8118FE3013E424A273795FCC42437C433A410797F365308C231E667D0C8373BDD2F0C6D6D72B
24,794,573 UART: [art] SIG.S = 256B23DA24D379805D0683B2075C418FC683121620E3851AF1FC8C05323F9D64F81BF2B688D37CC4A7A0783E5271AC1F
25,773,455 UART: Caliptra RT
25,774,415 UART: [state] CFI Enabled
25,955,486 UART: [rt] RT listening for mailbox commands...
25,957,415 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,987,591 UART: [rt]cmd =0x44504543, len=40
26,015,331 >>> mbox cmd response data (40 bytes)
26,016,748 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,047,065 UART: [rt]cmd =0x44504543, len=40
26,069,608 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,459,142 ready_for_fw is high
3,459,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,216,616 >>> mbox cmd response: success
18,492,797 UART:
18,493,201 UART: Running Caliptra FMC ...
18,494,513 UART:
18,494,704 UART: [state] CFI Enabled
18,562,008 UART: [fht] FMC Alias Private Key: 7
20,328,063 UART: [art] Extend RT PCRs Done
20,329,289 UART: [art] Lock RT PCRs Done
20,331,076 UART: [art] Populate DV Done
20,336,229 UART: [fht] FMC Alias Private Key: 7
20,337,932 UART: [art] Derive CDI
20,338,750 UART: [art] Store in slot 0x4
20,394,395 UART: [art] Derive Key Pair
20,395,487 UART: [art] Store priv key in slot 0x5
22,858,459 UART: [art] Derive Key Pair - Done
22,871,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,584,347 UART: [art] Erasing AUTHORITY.KEYID = 7
24,585,850 UART: [art] PUB.X = B9DD97A505471ACE53B7685002C41DEF58F4C2B265F0740B2613E9FFAC43FABE6706DCDAE27E7AF369A543F5A7346FCE
24,593,103 UART: [art] PUB.Y = 61A815E489EC71F29F98ABCC33D714F1B946D82186D3BE42E61865480A63027CF33706E572268733A44EAEF4E02064E0
24,600,353 UART: [art] SIG.R = 0102AD4CC11DB2A132F225555AE000DB45A30D9D41BFC76C611C9D959279411F279D0B33B9CDCD8EAD8527F83F3A2AE7
24,607,766 UART: [art] SIG.S = C78FDA11BF9345B07470B053F0A49E6841298FF58F529DD126AA8A3C645D110FCF58A31E76AF04DDB06A0050DE3D8111
25,586,498 UART: Caliptra RT
25,587,199 UART: [state] CFI Enabled
25,768,854 UART: [rt] RT listening for mailbox commands...
25,770,764 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,800,754 UART: [rt]cmd =0x44504543, len=40
25,828,356 >>> mbox cmd response data (40 bytes)
25,829,521 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,859,838 UART: [rt]cmd =0x44504543, len=40
25,882,247 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
192,520 UART:
192,873 UART: Running Caliptra ROM ...
193,979 UART:
603,742 UART: [state] CFI Enabled
620,566 UART: [state] LifecycleState = Unprovisioned
622,536 UART: [state] DebugLocked = No
624,629 UART: [state] WD Timer not started. Device not locked for debugging
627,601 UART: [kat] SHA2-256
807,257 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,053 UART: [kat] ++
818,503 UART: [kat] sha1
828,403 UART: [kat] SHA2-256
831,123 UART: [kat] SHA2-384
837,823 UART: [kat] SHA2-512-ACC
840,262 UART: [kat] ECC-384
3,283,400 UART: [kat] HMAC-384Kdf
3,295,359 UART: [kat] LMS
3,771,830 UART: [kat] --
3,777,027 UART: [cold-reset] ++
3,778,753 UART: [fht] FHT @ 0x50003400
3,790,944 UART: [idev] ++
3,791,508 UART: [idev] CDI.KEYID = 6
3,792,460 UART: [idev] SUBJECT.KEYID = 7
3,793,705 UART: [idev] UDS.KEYID = 0
3,794,678 ready_for_fw is high
3,794,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,720 UART: [idev] Erasing UDS.KEYID = 0
6,270,464 UART: [idev] Sha1 KeyId Algorithm
6,294,194 UART: [idev] --
6,297,521 UART: [ldev] ++
6,298,099 UART: [ldev] CDI.KEYID = 6
6,299,030 UART: [ldev] SUBJECT.KEYID = 5
6,300,247 UART: [ldev] AUTHORITY.KEYID = 7
6,301,479 UART: [ldev] FE.KEYID = 1
6,311,427 UART: [ldev] Erasing FE.KEYID = 1
8,792,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,873 UART: [ldev] --
10,585,872 UART: [fwproc] Wait for Commands...
10,587,915 UART: [fwproc] Recv command 0x46574c44
10,589,920 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,549 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,553 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,957 >>> mbox cmd response: success
14,560,604 UART: [afmc] ++
14,561,215 UART: [afmc] CDI.KEYID = 6
14,562,105 UART: [afmc] SUBJECT.KEYID = 7
14,563,321 UART: [afmc] AUTHORITY.KEYID = 5
17,067,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,782 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,598 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,681 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,208 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,262 UART: [afmc] --
18,867,208 UART: [cold-reset] --
18,869,615 UART: [state] Locking Datavault
18,874,701 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,462 UART: [state] Locking ICCM
18,878,020 UART: [exit] Launching FMC @ 0x40000130
18,886,427 UART:
18,886,666 UART: Running Caliptra FMC ...
18,887,770 UART:
18,887,943 UART: [state] CFI Enabled
18,896,426 UART: [fht] FMC Alias Private Key: 7
20,662,496 UART: [art] Extend RT PCRs Done
20,663,715 UART: [art] Lock RT PCRs Done
20,665,280 UART: [art] Populate DV Done
20,670,797 UART: [fht] FMC Alias Private Key: 7
20,672,391 UART: [art] Derive CDI
20,673,205 UART: [art] Store in slot 0x4
20,715,775 UART: [art] Derive Key Pair
20,716,813 UART: [art] Store priv key in slot 0x5
23,143,254 UART: [art] Derive Key Pair - Done
23,156,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,305 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,803 UART: [art] PUB.X = 8C9ADA85B8223EA2B3CE96D63C595CA0F535E9F2301C7E0EE0E9347383D54A229EB3021915C9A78EE4D8E1082921574F
24,871,097 UART: [art] PUB.Y = 7EE186752E187B93FDFED4C3ED24DC946B46DF691EBC59D4464E0F8BC50292DC23E573672FE55A113458C1F2E3693952
24,878,332 UART: [art] SIG.R = 21DA1594A412DCFD44F5296F0A7B2F4B37658A11990BFA740C681E22BCF2B8B9C7320ADFE9B728A3CF2F33B10AC79578
24,885,721 UART: [art] SIG.S = 829D35281282191A237C4BDB5B1A56121F636E3C4A3978A98EA9FA63B00D7F3AF939A01E48F49478A807D1BAC45B4B3C
25,864,479 UART: Caliptra RT
25,865,176 UART: [state] CFI Enabled
25,997,573 UART: [rt] RT listening for mailbox commands...
25,999,489 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,029,689 UART: [rt]cmd =0x44504543, len=40
26,057,248 >>> mbox cmd response data (40 bytes)
26,058,472 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,088,749 UART: [rt]cmd =0x44504543, len=40
26,111,486 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,778,824 ready_for_fw is high
3,779,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,433,616 >>> mbox cmd response: success
18,687,882 UART:
18,688,283 UART: Running Caliptra FMC ...
18,689,420 UART:
18,689,584 UART: [state] CFI Enabled
18,697,148 UART: [fht] FMC Alias Private Key: 7
20,463,293 UART: [art] Extend RT PCRs Done
20,464,516 UART: [art] Lock RT PCRs Done
20,466,202 UART: [art] Populate DV Done
20,471,630 UART: [fht] FMC Alias Private Key: 7
20,473,171 UART: [art] Derive CDI
20,473,939 UART: [art] Store in slot 0x4
20,516,498 UART: [art] Derive Key Pair
20,517,580 UART: [art] Store priv key in slot 0x5
22,944,638 UART: [art] Derive Key Pair - Done
22,957,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,663,842 UART: [art] Erasing AUTHORITY.KEYID = 7
24,665,346 UART: [art] PUB.X = 924383AD9819A030988F5B8E041E823368E2AAED1C32E0F92342DF8DE256C568B1958EA2DFBB8867A0D7EBA179476C83
24,672,610 UART: [art] PUB.Y = A8B7430388D0254BA6AE8A076D0142AB185AA3E9562BA914CEE78066FED6F53A1B939365F787930E74763C1F7F588970
24,679,867 UART: [art] SIG.R = ACF4408DE01F85FE7F0F15DAA7E33E3A017F4ACBD9C7AD720EF3C2115D1878DF802D7695364F3B2DDCED3FD0FE5B3ECA
24,687,276 UART: [art] SIG.S = A1DE235BD4D31791B20D83D1A59C417F5D71C4DC8EA5C4448A20EDAA4344BD675E3039F7053B11A75E152D7BD3C3369A
25,666,220 UART: Caliptra RT
25,666,942 UART: [state] CFI Enabled
25,799,178 UART: [rt] RT listening for mailbox commands...
25,801,099 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,831,417 UART: [rt]cmd =0x44504543, len=40
25,859,171 >>> mbox cmd response data (40 bytes)
25,860,395 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,890,649 UART: [rt]cmd =0x44504543, len=40
25,913,134 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
191,988 UART:
192,366 UART: Running Caliptra ROM ...
193,462 UART:
193,608 UART: [state] CFI Enabled
266,512 UART: [state] LifecycleState = Unprovisioned
268,917 UART: [state] DebugLocked = No
270,437 UART: [state] WD Timer not started. Device not locked for debugging
275,174 UART: [kat] SHA2-256
465,105 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,854 UART: [kat] ++
476,385 UART: [kat] sha1
486,551 UART: [kat] SHA2-256
489,550 UART: [kat] SHA2-384
496,952 UART: [kat] SHA2-512-ACC
499,525 UART: [kat] ECC-384
2,948,612 UART: [kat] HMAC-384Kdf
2,971,464 UART: [kat] LMS
3,503,238 UART: [kat] --
3,506,807 UART: [cold-reset] ++
3,507,951 UART: [fht] FHT @ 0x50003400
3,518,273 UART: [idev] ++
3,518,828 UART: [idev] CDI.KEYID = 6
3,519,780 UART: [idev] SUBJECT.KEYID = 7
3,521,019 UART: [idev] UDS.KEYID = 0
3,521,922 ready_for_fw is high
3,522,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,266 UART: [idev] Erasing UDS.KEYID = 0
6,030,528 UART: [idev] Sha1 KeyId Algorithm
6,051,812 UART: [idev] --
6,057,184 UART: [ldev] ++
6,057,867 UART: [ldev] CDI.KEYID = 6
6,058,747 UART: [ldev] SUBJECT.KEYID = 5
6,059,956 UART: [ldev] AUTHORITY.KEYID = 7
6,061,191 UART: [ldev] FE.KEYID = 1
6,101,079 UART: [ldev] Erasing FE.KEYID = 1
8,607,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,622 UART: [ldev] --
10,414,854 UART: [fwproc] Wait for Commands...
10,417,541 UART: [fwproc] Recv command 0x46574c44
10,419,845 UART: [fwproc] Recv'd Img size: 118548 bytes
13,920,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,253 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,827 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,684,607 >>> mbox cmd response: success
14,689,508 UART: [afmc] ++
14,690,236 UART: [afmc] CDI.KEYID = 6
14,691,432 UART: [afmc] SUBJECT.KEYID = 7
14,692,874 UART: [afmc] AUTHORITY.KEYID = 5
17,237,342 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,908 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,988 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,140 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,086 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,581 UART: [afmc] --
19,034,370 UART: [cold-reset] --
19,038,613 UART: [state] Locking Datavault
19,044,674 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,817 UART: [state] Locking ICCM
19,049,294 UART: [exit] Launching FMC @ 0x40000130
19,057,981 UART:
19,058,215 UART: Running Caliptra FMC ...
19,059,316 UART:
19,059,474 UART: [state] CFI Enabled
19,116,883 UART: [fht] FMC Alias Private Key: 7
20,883,221 UART: [art] Extend RT PCRs Done
20,884,445 UART: [art] Lock RT PCRs Done
20,885,861 UART: [art] Populate DV Done
20,891,322 UART: [fht] FMC Alias Private Key: 7
20,892,854 UART: [art] Derive CDI
20,893,609 UART: [art] Store in slot 0x4
20,950,005 UART: [art] Derive Key Pair
20,951,051 UART: [art] Store priv key in slot 0x5
23,413,545 UART: [art] Derive Key Pair - Done
23,426,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,904 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,420 UART: [art] PUB.X = F504639B3E11AFE64F0C9A1B62477AC4CF689E9C0C9835747A61AB5C2688F6F3A8CF8AD3D5914045C602CBD87E3C370F
25,148,695 UART: [art] PUB.Y = D7B471368A51DDE03B1A69F7486BD897DD21162AC66D63D8CC8DFD792A8E0D470D8629B882B28656C7B999E6B35BF0AC
25,155,958 UART: [art] SIG.R = 04AFFE81A437FAF58341562C95645D82AF8B048635E5F668A7F5B79471050071740794A7D483D5E235053152DC211AC6
25,163,305 UART: [art] SIG.S = B5C82D8A20CF549238B1F3C551568DC77EDB1E5FE275CECE4DB08D6F8429328A7079227A13E5FF317F8C995A73B61257
26,142,178 UART: Caliptra RT
26,142,865 UART: [state] CFI Enabled
26,324,551 UART: [rt] RT listening for mailbox commands...
26,326,464 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,356,606 UART: [rt]cmd =0x44504543, len=40
26,405,039 >>> mbox cmd response data (40 bytes)
26,406,129 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,436,117 UART: [rt]cmd =0x44504543, len=40
26,458,929 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,439,166 ready_for_fw is high
3,439,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,323 >>> mbox cmd response: success
19,128,855 UART:
19,129,242 UART: Running Caliptra FMC ...
19,130,344 UART:
19,130,498 UART: [state] CFI Enabled
19,198,508 UART: [fht] FMC Alias Private Key: 7
20,964,467 UART: [art] Extend RT PCRs Done
20,965,693 UART: [art] Lock RT PCRs Done
20,967,337 UART: [art] Populate DV Done
20,972,809 UART: [fht] FMC Alias Private Key: 7
20,974,459 UART: [art] Derive CDI
20,975,196 UART: [art] Store in slot 0x4
21,029,825 UART: [art] Derive Key Pair
21,030,874 UART: [art] Store priv key in slot 0x5
23,493,388 UART: [art] Derive Key Pair - Done
23,506,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,304 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,806 UART: [art] PUB.X = 6A1EA8557FD46E55AB64D757690D339ECD7D5E9801D2EBFA087489AA465B6AB31EE0664C7E2FE06C463BCCA059D786BE
25,228,099 UART: [art] PUB.Y = 50A9F11EC0C2F6DDB0C4E0E97A31712301CEAF60F775FF9AF19CFBBC59F9FB5C9C2CB7C07EB4A06077A5BBE5DA9541A2
25,235,375 UART: [art] SIG.R = 8A05636CE2CA11E274071898B7B43DEA83D9593536658AE0145295A900399E76FA4CC77271550A7365FCF2F1C10F0051
25,242,685 UART: [art] SIG.S = 80BBA9B2A5BD59331CAB4BE951F178AFA0BCE51C4A2C4B3FD31D784E510B28F2840CB1B1B6AB34B15EE1D9D3F14FAAAC
26,221,611 UART: Caliptra RT
26,222,325 UART: [state] CFI Enabled
26,402,616 UART: [rt] RT listening for mailbox commands...
26,404,539 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,434,481 UART: [rt]cmd =0x44504543, len=40
26,463,459 >>> mbox cmd response data (40 bytes)
26,464,623 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,494,581 UART: [rt]cmd =0x44504543, len=40
26,517,074 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,264 writing to cptra_bootfsm_go
193,405 UART:
193,768 UART: Running Caliptra ROM ...
194,861 UART:
604,425 UART: [state] CFI Enabled
619,589 UART: [state] LifecycleState = Unprovisioned
621,979 UART: [state] DebugLocked = No
624,719 UART: [state] WD Timer not started. Device not locked for debugging
628,706 UART: [kat] SHA2-256
818,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,373 UART: [kat] ++
829,981 UART: [kat] sha1
842,452 UART: [kat] SHA2-256
845,461 UART: [kat] SHA2-384
852,309 UART: [kat] SHA2-512-ACC
854,891 UART: [kat] ECC-384
3,294,626 UART: [kat] HMAC-384Kdf
3,307,212 UART: [kat] LMS
3,838,999 UART: [kat] --
3,842,846 UART: [cold-reset] ++
3,843,749 UART: [fht] FHT @ 0x50003400
3,854,943 UART: [idev] ++
3,855,579 UART: [idev] CDI.KEYID = 6
3,856,618 UART: [idev] SUBJECT.KEYID = 7
3,857,791 UART: [idev] UDS.KEYID = 0
3,858,725 ready_for_fw is high
3,858,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,873 UART: [idev] Erasing UDS.KEYID = 0
6,331,523 UART: [idev] Sha1 KeyId Algorithm
6,354,376 UART: [idev] --
6,359,726 UART: [ldev] ++
6,360,410 UART: [ldev] CDI.KEYID = 6
6,361,330 UART: [ldev] SUBJECT.KEYID = 5
6,362,490 UART: [ldev] AUTHORITY.KEYID = 7
6,363,724 UART: [ldev] FE.KEYID = 1
6,375,938 UART: [ldev] Erasing FE.KEYID = 1
8,851,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,172 UART: [ldev] --
10,642,981 UART: [fwproc] Wait for Commands...
10,645,760 UART: [fwproc] Recv command 0x46574c44
10,648,043 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,339 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,957 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,740 >>> mbox cmd response: success
14,912,346 UART: [afmc] ++
14,913,080 UART: [afmc] CDI.KEYID = 6
14,914,282 UART: [afmc] SUBJECT.KEYID = 7
14,915,729 UART: [afmc] AUTHORITY.KEYID = 5
17,420,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,961 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,070 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,218 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,084 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,553 UART: [afmc] --
19,217,586 UART: [cold-reset] --
19,223,517 UART: [state] Locking Datavault
19,229,702 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,865 UART: [state] Locking ICCM
19,233,329 UART: [exit] Launching FMC @ 0x40000130
19,242,021 UART:
19,242,261 UART: Running Caliptra FMC ...
19,243,369 UART:
19,243,534 UART: [state] CFI Enabled
19,251,257 UART: [fht] FMC Alias Private Key: 7
21,017,933 UART: [art] Extend RT PCRs Done
21,019,165 UART: [art] Lock RT PCRs Done
21,020,824 UART: [art] Populate DV Done
21,026,244 UART: [fht] FMC Alias Private Key: 7
21,027,898 UART: [art] Derive CDI
21,028,721 UART: [art] Store in slot 0x4
21,071,347 UART: [art] Derive Key Pair
21,072,400 UART: [art] Store priv key in slot 0x5
23,499,432 UART: [art] Derive Key Pair - Done
23,512,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,588 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,096 UART: [art] PUB.X = 059A83A8479D47AB9477420DA325A9AE26C163EA93C69A7C55811A656ACF7DF51A1756D352FE1979CEAB119FE34BC975
25,227,366 UART: [art] PUB.Y = C98A35D275CD7FE6DC5A72FB2F105F0432C78AA68B2A596AD0963802B3EACFC1F51E860ADA5BECD0FAC4A712AE7C1F1B
25,234,627 UART: [art] SIG.R = 1D59EAAB0F82531F1BC02A472E7D26A1D6161FAC370534696B1C34D214C4A7DD2199E6F396D97CCB9C8EE5128D9326ED
25,242,045 UART: [art] SIG.S = 6ABFA3AC4D4C74450E7183A43E40EA2DA9A22AD15D89450EB367B759AB8EEE66EBB063A2362D3D59CFDCB444700CAD5D
26,221,067 UART: Caliptra RT
26,221,760 UART: [state] CFI Enabled
26,353,957 UART: [rt] RT listening for mailbox commands...
26,355,870 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,385,922 UART: [rt]cmd =0x44504543, len=40
26,413,415 >>> mbox cmd response data (40 bytes)
26,414,670 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,444,952 UART: [rt]cmd =0x44504543, len=40
26,467,705 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,750,589 ready_for_fw is high
3,751,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,031,088 >>> mbox cmd response: success
19,287,559 UART:
19,287,965 UART: Running Caliptra FMC ...
19,289,186 UART:
19,289,364 UART: [state] CFI Enabled
19,297,137 UART: [fht] FMC Alias Private Key: 7
21,064,348 UART: [art] Extend RT PCRs Done
21,065,570 UART: [art] Lock RT PCRs Done
21,067,316 UART: [art] Populate DV Done
21,072,885 UART: [fht] FMC Alias Private Key: 7
21,074,500 UART: [art] Derive CDI
21,075,328 UART: [art] Store in slot 0x4
21,118,092 UART: [art] Derive Key Pair
21,119,108 UART: [art] Store priv key in slot 0x5
23,546,238 UART: [art] Derive Key Pair - Done
23,559,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,265,230 UART: [art] Erasing AUTHORITY.KEYID = 7
25,266,751 UART: [art] PUB.X = 266177610C91038FA9FBD106C31245A98F19A66608ABA0C7C9A8B3D4969E25752652A787FA777A1F9600CE85D281D07E
25,273,934 UART: [art] PUB.Y = 53F644C1CE8B640F08F551B6A0CE800901CA703955C1C4BCFC01DCCCBF5415F095830094BEC0EC14251C02B0544D98D4
25,281,176 UART: [art] SIG.R = 2C295650C7D1582BE5B457CE7413FC9B2323FD50015B7C223C35610E9A5B6A369FDD7BA227A87BD4EE480D55059E45D8
25,288,565 UART: [art] SIG.S = 268FA5942AC50511F6A5BA419E38A41DE7AC16923817CEBE2B8B5AD31ABCCAFCA5209C4D9BBD3E7B653C86F1E532BC50
26,267,871 UART: Caliptra RT
26,268,565 UART: [state] CFI Enabled
26,401,566 UART: [rt] RT listening for mailbox commands...
26,403,479 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,433,772 UART: [rt]cmd =0x44504543, len=40
26,461,618 >>> mbox cmd response data (40 bytes)
26,462,999 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,493,212 UART: [rt]cmd =0x44504543, len=40
26,516,011 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,005 UART: [kat] SHA2-256
881,936 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,051 UART: [kat] ++
886,203 UART: [kat] sha1
890,379 UART: [kat] SHA2-256
892,317 UART: [kat] SHA2-384
894,968 UART: [kat] SHA2-512-ACC
896,869 UART: [kat] ECC-384
902,300 UART: [kat] HMAC-384Kdf
906,908 UART: [kat] LMS
1,475,104 UART: [kat] --
1,476,091 UART: [cold-reset] ++
1,476,421 UART: [fht] Storing FHT @ 0x50003400
1,479,100 UART: [idev] ++
1,479,268 UART: [idev] CDI.KEYID = 6
1,479,628 UART: [idev] SUBJECT.KEYID = 7
1,480,052 UART: [idev] UDS.KEYID = 0
1,480,397 ready_for_fw is high
1,480,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,964 UART: [idev] Erasing UDS.KEYID = 0
1,504,734 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,492 UART: [idev] --
1,514,645 UART: [ldev] ++
1,514,813 UART: [ldev] CDI.KEYID = 6
1,515,176 UART: [ldev] SUBJECT.KEYID = 5
1,515,602 UART: [ldev] AUTHORITY.KEYID = 7
1,516,065 UART: [ldev] FE.KEYID = 1
1,521,445 UART: [ldev] Erasing FE.KEYID = 1
1,546,880 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,756 UART: [ldev] --
1,586,259 UART: [fwproc] Waiting for Commands...
1,587,032 UART: [fwproc] Received command 0x46574c44
1,587,823 UART: [fwproc] Received Image of size 118548 bytes
2,932,721 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,507 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,725 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,112 >>> mbox cmd response: success
3,133,268 UART: [afmc] ++
3,133,436 UART: [afmc] CDI.KEYID = 6
3,133,798 UART: [afmc] SUBJECT.KEYID = 7
3,134,223 UART: [afmc] AUTHORITY.KEYID = 5
3,169,948 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,374 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,154 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,863 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,746 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,429 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,207 UART: [afmc] --
3,213,231 UART: [cold-reset] --
3,213,901 UART: [state] Locking Datavault
3,214,980 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,584 UART: [state] Locking ICCM
3,216,154 UART: [exit] Launching FMC @ 0x40000130
3,221,484 UART:
3,221,500 UART: Running Caliptra FMC ...
3,221,908 UART:
3,221,962 UART: [state] CFI Enabled
3,232,176 UART: [fht] FMC Alias Private Key: 7
3,351,666 UART: [art] Extend RT PCRs Done
3,352,094 UART: [art] Lock RT PCRs Done
3,353,738 UART: [art] Populate DV Done
3,361,707 UART: [fht] FMC Alias Private Key: 7
3,362,827 UART: [art] Derive CDI
3,363,107 UART: [art] Store in slot 0x4
3,448,733 UART: [art] Derive Key Pair
3,449,093 UART: [art] Store priv key in slot 0x5
3,462,068 UART: [art] Derive Key Pair - Done
3,476,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,894 UART: [art] PUB.X = 35531BB11E8A06F2ECB6ABAD8A922AE4D9B3E2E53A3B9B9103B25E7DCB3E42443E52C7D3CDE8479EF2B473C22DAA9234
3,499,678 UART: [art] PUB.Y = 53C74A908809B04C69630ED63BE7BFDA5F982FC2AC0B195EBDB3C475C6C53F09EA76817B1F158A38EF574AE6CC5B177E
3,506,632 UART: [art] SIG.R = C1F0A62AF87697E11C16CC78E88508600EAF503C6B3DC8B8D110EE651B62F7C86EC0DB147EDA89BD40107599105A07B5
3,513,401 UART: [art] SIG.S = 0BFD4FE71ED3DB72A251183B60F601DC37D444D0680642A6A529417814D77A75CFFC13D4CDFE44A6E4F59AC22D2CE01D
3,537,330 UART: Caliptra RT
3,537,581 UART: [state] CFI Enabled
3,657,245 UART: [rt] RT listening for mailbox commands...
3,657,915 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,969 UART: [rt]cmd =0x44504543, len=40
3,715,123 >>> mbox cmd response data (40 bytes)
3,715,124 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,744,755 UART: [rt]cmd =0x44504543, len=40
3,767,831 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,741 ready_for_fw is high
1,362,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,526 >>> mbox cmd response: success
3,042,781 UART:
3,042,797 UART: Running Caliptra FMC ...
3,043,205 UART:
3,043,259 UART: [state] CFI Enabled
3,053,673 UART: [fht] FMC Alias Private Key: 7
3,173,159 UART: [art] Extend RT PCRs Done
3,173,587 UART: [art] Lock RT PCRs Done
3,175,019 UART: [art] Populate DV Done
3,183,130 UART: [fht] FMC Alias Private Key: 7
3,184,264 UART: [art] Derive CDI
3,184,544 UART: [art] Store in slot 0x4
3,270,448 UART: [art] Derive Key Pair
3,270,808 UART: [art] Store priv key in slot 0x5
3,283,933 UART: [art] Derive Key Pair - Done
3,298,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,813 UART: [art] PUB.X = 4839F5DE24E3E6D355BBF1E523BB43BF66F5BA4A8EE1B6AF39BBD78BB7FFC0640977824B51CE01676A5F1196528DBE97
3,321,593 UART: [art] PUB.Y = 9EC5B7D3A6F6C83CD0B1A490E900723089299810A7BEDF42725A74547CB6E83E25199DEC5E4F05627BDA24664AE6C1EA
3,328,526 UART: [art] SIG.R = A41D065A68C4C9407EBAE3A13C8B0867114803F05BEB04E28623236EA0FFD947F8338ADABCA6EBED6770409A78AAF2BC
3,335,300 UART: [art] SIG.S = F92844605390582B8FBFEDFAB6B4F0E48E36999BB2EE8D64FAA17387805C2EF264B66E83EF0B5BBD51474998B383AA6A
3,358,863 UART: Caliptra RT
3,359,114 UART: [state] CFI Enabled
3,479,697 UART: [rt] RT listening for mailbox commands...
3,480,367 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,265 UART: [rt]cmd =0x44504543, len=40
3,537,747 >>> mbox cmd response data (40 bytes)
3,537,748 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,567,391 UART: [rt]cmd =0x44504543, len=40
3,590,509 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,034 UART: [kat] SHA2-256
881,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,080 UART: [kat] ++
886,232 UART: [kat] sha1
890,430 UART: [kat] SHA2-256
892,368 UART: [kat] SHA2-384
895,043 UART: [kat] SHA2-512-ACC
896,944 UART: [kat] ECC-384
902,553 UART: [kat] HMAC-384Kdf
907,201 UART: [kat] LMS
1,475,397 UART: [kat] --
1,476,382 UART: [cold-reset] ++
1,476,954 UART: [fht] Storing FHT @ 0x50003400
1,479,555 UART: [idev] ++
1,479,723 UART: [idev] CDI.KEYID = 6
1,480,083 UART: [idev] SUBJECT.KEYID = 7
1,480,507 UART: [idev] UDS.KEYID = 0
1,480,852 ready_for_fw is high
1,480,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,427 UART: [idev] Erasing UDS.KEYID = 0
1,505,345 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,053 UART: [idev] --
1,515,216 UART: [ldev] ++
1,515,384 UART: [ldev] CDI.KEYID = 6
1,515,747 UART: [ldev] SUBJECT.KEYID = 5
1,516,173 UART: [ldev] AUTHORITY.KEYID = 7
1,516,636 UART: [ldev] FE.KEYID = 1
1,522,072 UART: [ldev] Erasing FE.KEYID = 1
1,547,729 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,559 UART: [ldev] --
1,586,830 UART: [fwproc] Waiting for Commands...
1,587,501 UART: [fwproc] Received command 0x46574c44
1,588,292 UART: [fwproc] Received Image of size 118548 bytes
2,933,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,182 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,400 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,781 >>> mbox cmd response: success
3,132,937 UART: [afmc] ++
3,133,105 UART: [afmc] CDI.KEYID = 6
3,133,467 UART: [afmc] SUBJECT.KEYID = 7
3,133,892 UART: [afmc] AUTHORITY.KEYID = 5
3,169,541 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,161 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,941 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,650 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,533 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,216 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,238 UART: [afmc] --
3,213,120 UART: [cold-reset] --
3,214,222 UART: [state] Locking Datavault
3,215,241 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,845 UART: [state] Locking ICCM
3,216,275 UART: [exit] Launching FMC @ 0x40000130
3,221,605 UART:
3,221,621 UART: Running Caliptra FMC ...
3,222,029 UART:
3,222,172 UART: [state] CFI Enabled
3,232,402 UART: [fht] FMC Alias Private Key: 7
3,351,008 UART: [art] Extend RT PCRs Done
3,351,436 UART: [art] Lock RT PCRs Done
3,353,020 UART: [art] Populate DV Done
3,361,093 UART: [fht] FMC Alias Private Key: 7
3,362,127 UART: [art] Derive CDI
3,362,407 UART: [art] Store in slot 0x4
3,448,555 UART: [art] Derive Key Pair
3,448,915 UART: [art] Store priv key in slot 0x5
3,462,066 UART: [art] Derive Key Pair - Done
3,477,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,638 UART: [art] PUB.X = 2BACC8647458067E1E45B4089AA0B02A843D71E2BA8FAC605BC1B6AE5276CD235BD46020845BB193578D3B84533BDEE9
3,500,410 UART: [art] PUB.Y = 734266BEE11BC5A7E7F52BA8D490F0E5088E6651193E85F33955E6FC8C7513D6A9EAB137D2EF41E31464E6C6D2DC3988
3,507,363 UART: [art] SIG.R = 85E93E50612D48B4BDE1599A1EB0A661B22D2D6899CE049B9C9593372822C4B6C40C5CB6EC414D613D6DB3ACB8EDBB96
3,514,139 UART: [art] SIG.S = 9E43B2F429B6291C1C96FC389122C03DB6FD86D997FC424A4014DBD5FC782B1DB8A94D60FCFD42FEB75D9700296D7FAF
3,538,127 UART: Caliptra RT
3,538,470 UART: [state] CFI Enabled
3,658,775 UART: [rt] RT listening for mailbox commands...
3,659,445 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,387 UART: [rt]cmd =0x44504543, len=40
3,716,643 >>> mbox cmd response data (40 bytes)
3,716,644 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,746,161 UART: [rt]cmd =0x44504543, len=40
3,769,617 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,702 ready_for_fw is high
1,362,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,337 >>> mbox cmd response: success
3,045,426 UART:
3,045,442 UART: Running Caliptra FMC ...
3,045,850 UART:
3,045,993 UART: [state] CFI Enabled
3,056,771 UART: [fht] FMC Alias Private Key: 7
3,176,311 UART: [art] Extend RT PCRs Done
3,176,739 UART: [art] Lock RT PCRs Done
3,178,207 UART: [art] Populate DV Done
3,186,304 UART: [fht] FMC Alias Private Key: 7
3,187,276 UART: [art] Derive CDI
3,187,556 UART: [art] Store in slot 0x4
3,272,988 UART: [art] Derive Key Pair
3,273,348 UART: [art] Store priv key in slot 0x5
3,287,043 UART: [art] Derive Key Pair - Done
3,301,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,955 UART: [art] PUB.X = BBD4513AFF06532DD360ED8265B284DB56FC40403F8EE5E68D821F77AE3B00A1C77BA2E07A74F3FDE313FAFA4C2A26E9
3,324,720 UART: [art] PUB.Y = DF98377B751B8902AA084D52D7B518CE842D60B83EB00336B793F07FDFF87FF94F112B6C8A488F0D52B2E4C242738AA1
3,331,664 UART: [art] SIG.R = 54C11FDE90B88E8E387491E50064A241E60F269330B7234E7FC93EFAC9E29BDEA3BF2890730555094C6DAD6C73822668
3,338,403 UART: [art] SIG.S = BF774F239ABD68F586F3A13865F0C62019181DA38ACD97A2223DBCA56559948753E140F5259B8E8B6D68022B423831FE
3,362,236 UART: Caliptra RT
3,362,579 UART: [state] CFI Enabled
3,482,313 UART: [rt] RT listening for mailbox commands...
3,482,983 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,811 UART: [rt]cmd =0x44504543, len=40
3,540,361 >>> mbox cmd response data (40 bytes)
3,540,362 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,570,029 UART: [rt]cmd =0x44504543, len=40
3,593,401 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,250 UART: [kat] SHA2-256
890,800 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,904 UART: [kat] ++
895,056 UART: [kat] sha1
899,220 UART: [kat] SHA2-256
901,160 UART: [kat] SHA2-384
903,861 UART: [kat] SHA2-512-ACC
905,762 UART: [kat] ECC-384
915,309 UART: [kat] HMAC-384Kdf
919,953 UART: [kat] LMS
1,168,265 UART: [kat] --
1,169,080 UART: [cold-reset] ++
1,169,562 UART: [fht] FHT @ 0x50003400
1,172,310 UART: [idev] ++
1,172,478 UART: [idev] CDI.KEYID = 6
1,172,839 UART: [idev] SUBJECT.KEYID = 7
1,173,264 UART: [idev] UDS.KEYID = 0
1,173,610 ready_for_fw is high
1,173,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,349 UART: [idev] Erasing UDS.KEYID = 0
1,198,377 UART: [idev] Sha1 KeyId Algorithm
1,207,439 UART: [idev] --
1,208,352 UART: [ldev] ++
1,208,520 UART: [ldev] CDI.KEYID = 6
1,208,884 UART: [ldev] SUBJECT.KEYID = 5
1,209,311 UART: [ldev] AUTHORITY.KEYID = 7
1,209,774 UART: [ldev] FE.KEYID = 1
1,214,850 UART: [ldev] Erasing FE.KEYID = 1
1,241,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,236 UART: [ldev] --
1,280,483 UART: [fwproc] Wait for Commands...
1,281,116 UART: [fwproc] Recv command 0x46574c44
1,281,849 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,267 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,442 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,793 >>> mbox cmd response: success
2,826,891 UART: [afmc] ++
2,827,059 UART: [afmc] CDI.KEYID = 6
2,827,422 UART: [afmc] SUBJECT.KEYID = 7
2,827,848 UART: [afmc] AUTHORITY.KEYID = 5
2,863,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,235 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,945 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,826 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,527 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,290 UART: [afmc] --
2,906,111 UART: [cold-reset] --
2,906,921 UART: [state] Locking Datavault
2,908,364 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,968 UART: [state] Locking ICCM
2,909,634 UART: [exit] Launching FMC @ 0x40000130
2,914,964 UART:
2,914,980 UART: Running Caliptra FMC ...
2,915,388 UART:
2,915,442 UART: [state] CFI Enabled
2,925,878 UART: [fht] FMC Alias Private Key: 7
3,044,876 UART: [art] Extend RT PCRs Done
3,045,304 UART: [art] Lock RT PCRs Done
3,046,974 UART: [art] Populate DV Done
3,055,171 UART: [fht] FMC Alias Private Key: 7
3,056,249 UART: [art] Derive CDI
3,056,529 UART: [art] Store in slot 0x4
3,142,184 UART: [art] Derive Key Pair
3,142,544 UART: [art] Store priv key in slot 0x5
3,155,734 UART: [art] Derive Key Pair - Done
3,170,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,414 UART: [art] PUB.X = 08824937156E023CB142D2BD99EDD1885D9CACFC72F962CDE360DD27198FBB934064C516150B4A75ADE7BE976DE12865
3,193,181 UART: [art] PUB.Y = BAB2E3ADAEF5CA386A37C2EC28A2F7E7D110B7A3636040DE506FDEB601579FEC4122C63DA5635F18C229421FBD1BCAA0
3,200,150 UART: [art] SIG.R = A3C9D40605A2DBBF74ADE4A93943C8C876A08536A27D81C501770837BD9FE24A144D736DE0101CCB53FEF3CE99AF8E7C
3,206,922 UART: [art] SIG.S = 8A3E09CC16AA0AA5A5C94D3225C04B217B31FDA8FF74FCEF808CB270875C35A7CEBEB91BAE59EA679B3878964B193804
3,230,955 UART: Caliptra RT
3,231,206 UART: [state] CFI Enabled
3,351,378 UART: [rt] RT listening for mailbox commands...
3,352,048 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,988 UART: [rt]cmd =0x44504543, len=40
3,409,098 >>> mbox cmd response data (40 bytes)
3,409,099 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,756 UART: [rt]cmd =0x44504543, len=40
3,461,988 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,392 ready_for_fw is high
1,059,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,586 >>> mbox cmd response: success
2,738,331 UART:
2,738,347 UART: Running Caliptra FMC ...
2,738,755 UART:
2,738,809 UART: [state] CFI Enabled
2,749,265 UART: [fht] FMC Alias Private Key: 7
2,868,653 UART: [art] Extend RT PCRs Done
2,869,081 UART: [art] Lock RT PCRs Done
2,870,649 UART: [art] Populate DV Done
2,878,598 UART: [fht] FMC Alias Private Key: 7
2,879,618 UART: [art] Derive CDI
2,879,898 UART: [art] Store in slot 0x4
2,965,929 UART: [art] Derive Key Pair
2,966,289 UART: [art] Store priv key in slot 0x5
2,978,911 UART: [art] Derive Key Pair - Done
2,993,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,807 UART: [art] PUB.X = 47B1136AA3576A2E41583B79192F6A26B527CC068DFFF7691CDDB0DB7E1CC6696B2DA1FA9D07CB1EE8C2C86DFFCD42E2
3,016,593 UART: [art] PUB.Y = 01E07F6025A8F20121C407B79A842F6E20AA0FD5642F4406F05E076B1C36C5F7F12B6AEB57DB0569C6EA86437346DFC9
3,023,526 UART: [art] SIG.R = C1C3315A25307BD55A7F392CEFA298EFCB7A397E03FBCCE6A72279541E0017C4935A63B2452A345DBC8C7BE07F180340
3,030,276 UART: [art] SIG.S = 07B7234ED05F9B2066C14E3C97A8C767230DEF081ECA1354F4E0BFC309CD541D654B2DD2BAA411B0F0FC784371682C4A
3,054,308 UART: Caliptra RT
3,054,559 UART: [state] CFI Enabled
3,173,578 UART: [rt] RT listening for mailbox commands...
3,174,248 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,404 UART: [rt]cmd =0x44504543, len=40
3,232,386 >>> mbox cmd response data (40 bytes)
3,232,387 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,262,084 UART: [rt]cmd =0x44504543, len=40
3,285,188 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,442 UART: [kat] SHA2-512-ACC
906,343 UART: [kat] ECC-384
916,102 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,169,913 UART: [cold-reset] ++
1,170,319 UART: [fht] FHT @ 0x50003400
1,172,899 UART: [idev] ++
1,173,067 UART: [idev] CDI.KEYID = 6
1,173,428 UART: [idev] SUBJECT.KEYID = 7
1,173,853 UART: [idev] UDS.KEYID = 0
1,174,199 ready_for_fw is high
1,174,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,876 UART: [idev] Erasing UDS.KEYID = 0
1,199,530 UART: [idev] Sha1 KeyId Algorithm
1,208,354 UART: [idev] --
1,209,473 UART: [ldev] ++
1,209,641 UART: [ldev] CDI.KEYID = 6
1,210,005 UART: [ldev] SUBJECT.KEYID = 5
1,210,432 UART: [ldev] AUTHORITY.KEYID = 7
1,210,895 UART: [ldev] FE.KEYID = 1
1,216,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,781 UART: [ldev] --
1,281,058 UART: [fwproc] Wait for Commands...
1,281,649 UART: [fwproc] Recv command 0x46574c44
1,282,382 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,160 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,335 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,702 >>> mbox cmd response: success
2,827,784 UART: [afmc] ++
2,827,952 UART: [afmc] CDI.KEYID = 6
2,828,315 UART: [afmc] SUBJECT.KEYID = 7
2,828,741 UART: [afmc] AUTHORITY.KEYID = 5
2,864,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,710 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,420 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,301 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,002 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,657 UART: [afmc] --
2,907,470 UART: [cold-reset] --
2,908,160 UART: [state] Locking Datavault
2,909,225 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,829 UART: [state] Locking ICCM
2,910,485 UART: [exit] Launching FMC @ 0x40000130
2,915,815 UART:
2,915,831 UART: Running Caliptra FMC ...
2,916,239 UART:
2,916,382 UART: [state] CFI Enabled
2,926,582 UART: [fht] FMC Alias Private Key: 7
3,045,934 UART: [art] Extend RT PCRs Done
3,046,362 UART: [art] Lock RT PCRs Done
3,048,252 UART: [art] Populate DV Done
3,056,599 UART: [fht] FMC Alias Private Key: 7
3,057,585 UART: [art] Derive CDI
3,057,865 UART: [art] Store in slot 0x4
3,143,570 UART: [art] Derive Key Pair
3,143,930 UART: [art] Store priv key in slot 0x5
3,157,870 UART: [art] Derive Key Pair - Done
3,172,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,464 UART: [art] PUB.X = BC4B165D570A4D017693E9344DB5C10E2E51A2A9963B88B34737A8409F1C4DB286B3D9E9FE19823FB3ED3F2A7B0871F1
3,196,228 UART: [art] PUB.Y = 5AAF11437782CFB0BD87E8122B28314CE7A1F2BE458731B114C14602DE528234A7A89E654EC8F8C28DF7AF08DB86EDFA
3,203,184 UART: [art] SIG.R = A9C155DF4134918A51BE4B45F0383FA49B950AAD4F5E9B672B78F7719E1895BA0A51B3E2B428788D488ACCCAF5E5BDB4
3,209,962 UART: [art] SIG.S = AAEE2087C0C455AE36DF7FB1F361A01179D1245AD9FFB50FEFD0D63EC5B9D4759C9E5F54E9EC63B000CD7854AC64EAE2
3,233,835 UART: Caliptra RT
3,234,178 UART: [state] CFI Enabled
3,354,202 UART: [rt] RT listening for mailbox commands...
3,354,872 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,868 UART: [rt]cmd =0x44504543, len=40
3,412,270 >>> mbox cmd response data (40 bytes)
3,412,271 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,882 UART: [rt]cmd =0x44504543, len=40
3,464,654 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,155 ready_for_fw is high
1,060,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,775 >>> mbox cmd response: success
2,741,546 UART:
2,741,562 UART: Running Caliptra FMC ...
2,741,970 UART:
2,742,113 UART: [state] CFI Enabled
2,752,951 UART: [fht] FMC Alias Private Key: 7
2,871,645 UART: [art] Extend RT PCRs Done
2,872,073 UART: [art] Lock RT PCRs Done
2,873,547 UART: [art] Populate DV Done
2,881,970 UART: [fht] FMC Alias Private Key: 7
2,883,140 UART: [art] Derive CDI
2,883,420 UART: [art] Store in slot 0x4
2,969,343 UART: [art] Derive Key Pair
2,969,703 UART: [art] Store priv key in slot 0x5
2,982,947 UART: [art] Derive Key Pair - Done
2,997,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,762 UART: [art] PUB.X = 184247B9153FA8C1B6FFFE73C6C24A85573C2633DC9F0BEAFC0CF534898EE33BC4C4E7834F112BBD295D51EF7810DDEF
3,020,544 UART: [art] PUB.Y = FA8C4ED4CE0E7B2CDB6E0B46B1CF817BF0CD58A5F166E74D7D920CF5377DCD1284B1D31527ADADFD7C43A2CA79969EC7
3,027,513 UART: [art] SIG.R = 47DFC8ACE67F0B70A7F3EA9D165DFFDE99DE7297F68EA55E30355249936CE90C5245E6EF7AE7DCAE2A65631C7606DF23
3,034,292 UART: [art] SIG.S = 532CAD96FB960564439256EA625EFE308EF4FBF2144B883D55B913F3AB42416EF5577C9DC2F8CFA0E9330032852020D1
3,058,219 UART: Caliptra RT
3,058,562 UART: [state] CFI Enabled
3,179,236 UART: [rt] RT listening for mailbox commands...
3,179,906 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,840 UART: [rt]cmd =0x44504543, len=40
3,236,932 >>> mbox cmd response data (40 bytes)
3,236,933 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,380 UART: [rt]cmd =0x44504543, len=40
3,289,310 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
893,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,653 UART: [kat] ++
897,805 UART: [kat] sha1
902,101 UART: [kat] SHA2-256
904,041 UART: [kat] SHA2-384
906,788 UART: [kat] SHA2-512-ACC
908,689 UART: [kat] ECC-384
918,816 UART: [kat] HMAC-384Kdf
923,376 UART: [kat] LMS
1,171,704 UART: [kat] --
1,172,859 UART: [cold-reset] ++
1,173,313 UART: [fht] FHT @ 0x50003400
1,175,900 UART: [idev] ++
1,176,068 UART: [idev] CDI.KEYID = 6
1,176,428 UART: [idev] SUBJECT.KEYID = 7
1,176,852 UART: [idev] UDS.KEYID = 0
1,177,197 ready_for_fw is high
1,177,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,006 UART: [idev] Erasing UDS.KEYID = 0
1,201,661 UART: [idev] Sha1 KeyId Algorithm
1,209,973 UART: [idev] --
1,211,011 UART: [ldev] ++
1,211,179 UART: [ldev] CDI.KEYID = 6
1,211,542 UART: [ldev] SUBJECT.KEYID = 5
1,211,968 UART: [ldev] AUTHORITY.KEYID = 7
1,212,431 UART: [ldev] FE.KEYID = 1
1,217,429 UART: [ldev] Erasing FE.KEYID = 1
1,243,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,261 UART: [ldev] --
1,282,662 UART: [fwproc] Wait for Commands...
1,283,290 UART: [fwproc] Recv command 0x46574c44
1,284,018 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,962 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,132 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,309 >>> mbox cmd response: success
2,829,551 UART: [afmc] ++
2,829,719 UART: [afmc] CDI.KEYID = 6
2,830,081 UART: [afmc] SUBJECT.KEYID = 7
2,830,506 UART: [afmc] AUTHORITY.KEYID = 5
2,866,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,878 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,587 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,470 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,171 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,063 UART: [afmc] --
2,909,073 UART: [cold-reset] --
2,909,855 UART: [state] Locking Datavault
2,910,736 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,340 UART: [state] Locking ICCM
2,911,886 UART: [exit] Launching FMC @ 0x40000130
2,917,216 UART:
2,917,232 UART: Running Caliptra FMC ...
2,917,640 UART:
2,917,694 UART: [state] CFI Enabled
2,928,054 UART: [fht] FMC Alias Private Key: 7
3,047,202 UART: [art] Extend RT PCRs Done
3,047,630 UART: [art] Lock RT PCRs Done
3,049,104 UART: [art] Populate DV Done
3,057,367 UART: [fht] FMC Alias Private Key: 7
3,058,403 UART: [art] Derive CDI
3,058,683 UART: [art] Store in slot 0x4
3,144,130 UART: [art] Derive Key Pair
3,144,490 UART: [art] Store priv key in slot 0x5
3,157,826 UART: [art] Derive Key Pair - Done
3,172,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,034 UART: [art] PUB.X = 4419694829FA98A06CDB16406963D94F586BDA577DCF1BF7952CDB0E66CA37DB2537808F458B3F0509AF84F4BAEE9FAB
3,195,807 UART: [art] PUB.Y = E8270E5978825483B9267447EA80E7FF5153CA21766B63902503DF66EF1C0B24556E9461F634FBF655E52811A26E05CF
3,202,737 UART: [art] SIG.R = B74FC361799E4255FEFF79F59AEF1B1122C4B4E22CB72C61D8EA81E80397E1367AE99697708C414A3F6B467D4DD84CAD
3,209,514 UART: [art] SIG.S = AFF32F35517E1457E0EFDFAD04FB562328BC79E3225A0A08BCEAB7133666620F4398BFB1076DF081684AF83AABEA3B75
3,232,965 UART: Caliptra RT
3,233,216 UART: [state] CFI Enabled
3,353,380 UART: [rt] RT listening for mailbox commands...
3,354,050 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,056 UART: [rt]cmd =0x44504543, len=40
3,410,844 >>> mbox cmd response data (40 bytes)
3,410,845 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,566 UART: [rt]cmd =0x44504543, len=40
3,463,430 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,213 ready_for_fw is high
1,060,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,692 >>> mbox cmd response: success
2,741,957 UART:
2,741,973 UART: Running Caliptra FMC ...
2,742,381 UART:
2,742,435 UART: [state] CFI Enabled
2,752,999 UART: [fht] FMC Alias Private Key: 7
2,872,169 UART: [art] Extend RT PCRs Done
2,872,597 UART: [art] Lock RT PCRs Done
2,874,175 UART: [art] Populate DV Done
2,882,560 UART: [fht] FMC Alias Private Key: 7
2,883,612 UART: [art] Derive CDI
2,883,892 UART: [art] Store in slot 0x4
2,969,699 UART: [art] Derive Key Pair
2,970,059 UART: [art] Store priv key in slot 0x5
2,983,501 UART: [art] Derive Key Pair - Done
2,997,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,088 UART: [art] PUB.X = 9B9A98166FF0F0BF65838716AE614198A12F3BF13CDF830F1FF4B4DB54F1C3B2DC1A295232F912D236C8F38E8E5F092A
3,020,862 UART: [art] PUB.Y = DB912672757082DE7EAB665145E1CA42FFC0C0FBA7C6A00C50B673CEA5636DEE1DEBB3C642F439C27F102CFBD0945764
3,027,825 UART: [art] SIG.R = 1E84096FB3852210804430BB7C9F0748E9C6251AA5523B08BE92EF1BB31BA28E3E8089AEF117B2338BC8EDEFD26C0451
3,034,589 UART: [art] SIG.S = EDB2782CB16E7124501F94C3CAE2395857DCAAE2706EDE448FC222EB36C10ABB3790668BD0BE8EC6E0005B6E2841DA2B
3,058,646 UART: Caliptra RT
3,058,897 UART: [state] CFI Enabled
3,178,064 UART: [rt] RT listening for mailbox commands...
3,178,734 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,882 UART: [rt]cmd =0x44504543, len=40
3,236,568 >>> mbox cmd response data (40 bytes)
3,236,569 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,978 UART: [rt]cmd =0x44504543, len=40
3,288,624 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [kat] SHA2-256
893,411 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,536 UART: [kat] ++
897,688 UART: [kat] sha1
901,748 UART: [kat] SHA2-256
903,688 UART: [kat] SHA2-384
906,427 UART: [kat] SHA2-512-ACC
908,328 UART: [kat] ECC-384
918,581 UART: [kat] HMAC-384Kdf
923,089 UART: [kat] LMS
1,171,417 UART: [kat] --
1,172,622 UART: [cold-reset] ++
1,173,020 UART: [fht] FHT @ 0x50003400
1,175,915 UART: [idev] ++
1,176,083 UART: [idev] CDI.KEYID = 6
1,176,443 UART: [idev] SUBJECT.KEYID = 7
1,176,867 UART: [idev] UDS.KEYID = 0
1,177,212 ready_for_fw is high
1,177,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,605 UART: [idev] Erasing UDS.KEYID = 0
1,201,980 UART: [idev] Sha1 KeyId Algorithm
1,210,418 UART: [idev] --
1,211,550 UART: [ldev] ++
1,211,718 UART: [ldev] CDI.KEYID = 6
1,212,081 UART: [ldev] SUBJECT.KEYID = 5
1,212,507 UART: [ldev] AUTHORITY.KEYID = 7
1,212,970 UART: [ldev] FE.KEYID = 1
1,218,254 UART: [ldev] Erasing FE.KEYID = 1
1,245,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,970 UART: [ldev] --
1,284,421 UART: [fwproc] Wait for Commands...
1,284,995 UART: [fwproc] Recv command 0x46574c44
1,285,723 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,698 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,868 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,261 >>> mbox cmd response: success
2,829,335 UART: [afmc] ++
2,829,503 UART: [afmc] CDI.KEYID = 6
2,829,865 UART: [afmc] SUBJECT.KEYID = 7
2,830,290 UART: [afmc] AUTHORITY.KEYID = 5
2,865,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,464 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,173 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,056 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,757 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,607 UART: [afmc] --
2,908,517 UART: [cold-reset] --
2,909,251 UART: [state] Locking Datavault
2,910,674 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,278 UART: [state] Locking ICCM
2,911,852 UART: [exit] Launching FMC @ 0x40000130
2,917,182 UART:
2,917,198 UART: Running Caliptra FMC ...
2,917,606 UART:
2,917,749 UART: [state] CFI Enabled
2,928,493 UART: [fht] FMC Alias Private Key: 7
3,047,763 UART: [art] Extend RT PCRs Done
3,048,191 UART: [art] Lock RT PCRs Done
3,049,577 UART: [art] Populate DV Done
3,057,888 UART: [fht] FMC Alias Private Key: 7
3,058,882 UART: [art] Derive CDI
3,059,162 UART: [art] Store in slot 0x4
3,145,203 UART: [art] Derive Key Pair
3,145,563 UART: [art] Store priv key in slot 0x5
3,158,753 UART: [art] Derive Key Pair - Done
3,173,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,246 UART: [art] PUB.X = 462F2C55F094A725D992DED638242CAF96CDCEF02CEE4B250C8985C6F757F7AB77CE5F682BB54BA292A9DD1A36531CC4
3,196,029 UART: [art] PUB.Y = 475D069C5F4CF75A31A082D6988718D9744E3DA7EFB23689FBF25F53391E0EF309C1603AE08D209BCB24B16773571C64
3,202,970 UART: [art] SIG.R = 70E4E9DF7154E5651A32CC37D1B5BDD8DD8A486547F6DB18C40C246279E964A9E90679E813ECEDABE5BA361388B72CD0
3,209,746 UART: [art] SIG.S = 640B570F2F4A53E73B8F02035C5367FC263A164D1B306BD8EB05D09AB33FEF80F349AA0E06C6C9BB56B132C92E72C42B
3,233,015 UART: Caliptra RT
3,233,358 UART: [state] CFI Enabled
3,353,028 UART: [rt] RT listening for mailbox commands...
3,353,698 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,728 UART: [rt]cmd =0x44504543, len=40
3,410,954 >>> mbox cmd response data (40 bytes)
3,410,955 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,534 UART: [rt]cmd =0x44504543, len=40
3,463,364 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,230 ready_for_fw is high
1,061,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,473 >>> mbox cmd response: success
2,740,430 UART:
2,740,446 UART: Running Caliptra FMC ...
2,740,854 UART:
2,740,997 UART: [state] CFI Enabled
2,751,593 UART: [fht] FMC Alias Private Key: 7
2,871,003 UART: [art] Extend RT PCRs Done
2,871,431 UART: [art] Lock RT PCRs Done
2,872,781 UART: [art] Populate DV Done
2,880,968 UART: [fht] FMC Alias Private Key: 7
2,881,940 UART: [art] Derive CDI
2,882,220 UART: [art] Store in slot 0x4
2,968,523 UART: [art] Derive Key Pair
2,968,883 UART: [art] Store priv key in slot 0x5
2,982,681 UART: [art] Derive Key Pair - Done
2,997,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,194 UART: [art] PUB.X = DC602F78BA2682C2E0D590FE8792735CB49AE75B91514FE8861B9206134A6C8F47C680A4EAE7646A0A1B6F81E75D8C40
3,020,962 UART: [art] PUB.Y = 4731D503B529A646F07E9C179BB2B3D4845B72D3E9E1073093D1AC981757F443058106DA8DEA62068F5F461EF6441F9F
3,027,893 UART: [art] SIG.R = 8BA022666C8796DEBE6CC472F883ABD92E1811E400FCF72649A90947F228D15B22451A969714428B62A291478CDA5280
3,034,632 UART: [art] SIG.S = A2D71B411310ED00BCFC4C7FEE4C5A7AC49673A4C8879F9354703C2A3E4D80292959716A85B4E6F32FC441AD18816557
3,058,078 UART: Caliptra RT
3,058,421 UART: [state] CFI Enabled
3,178,987 UART: [rt] RT listening for mailbox commands...
3,179,657 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,705 UART: [rt]cmd =0x44504543, len=40
3,237,709 >>> mbox cmd response data (40 bytes)
3,237,710 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,199 UART: [rt]cmd =0x44504543, len=40
3,290,357 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,205 UART:
192,562 UART: Running Caliptra ROM ...
193,660 UART:
193,804 UART: [state] CFI Enabled
266,398 UART: [state] LifecycleState = Unprovisioned
268,348 UART: [state] DebugLocked = No
269,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,246 UART: [kat] SHA2-256
443,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,469 UART: [kat] ++
455,004 UART: [kat] sha1
465,750 UART: [kat] SHA2-256
468,419 UART: [kat] SHA2-384
473,770 UART: [kat] SHA2-512-ACC
476,079 UART: [kat] ECC-384
2,768,861 UART: [kat] HMAC-384Kdf
2,799,159 UART: [kat] LMS
3,989,453 UART: [kat] --
3,992,618 UART: [cold-reset] ++
3,995,261 UART: [fht] Storing FHT @ 0x50003400
4,006,605 UART: [idev] ++
4,007,175 UART: [idev] CDI.KEYID = 6
4,008,092 UART: [idev] SUBJECT.KEYID = 7
4,009,346 UART: [idev] UDS.KEYID = 0
4,010,397 ready_for_fw is high
4,010,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,683 UART: [idev] Erasing UDS.KEYID = 0
7,348,282 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,844 UART: [idev] --
7,373,458 UART: [ldev] ++
7,374,085 UART: [ldev] CDI.KEYID = 6
7,374,999 UART: [ldev] SUBJECT.KEYID = 5
7,376,213 UART: [ldev] AUTHORITY.KEYID = 7
7,377,500 UART: [ldev] FE.KEYID = 1
7,421,140 UART: [ldev] Erasing FE.KEYID = 1
10,755,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,331 UART: [ldev] --
13,114,598 UART: [fwproc] Waiting for Commands...
13,116,418 UART: [fwproc] Received command 0x46574c44
13,118,649 UART: [fwproc] Received Image of size 118548 bytes
17,223,923 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,302,614 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,375,739 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,704,891 >>> mbox cmd response: success
17,706,004 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,709,934 UART: [afmc] ++
17,710,519 UART: [afmc] CDI.KEYID = 6
17,711,488 UART: [afmc] SUBJECT.KEYID = 7
17,712,705 UART: [afmc] AUTHORITY.KEYID = 5
21,068,576 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,159 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,446 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,852 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,601 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,985 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,514 UART: [afmc] --
23,441,130 UART: [cold-reset] --
23,444,074 UART: [state] Locking Datavault
23,448,674 UART: [state] Locking PCR0, PCR1 and PCR31
23,450,372 UART: [state] Locking ICCM
23,451,447 UART: [exit] Launching FMC @ 0x40000130
23,459,844 UART:
23,460,085 UART: Running Caliptra FMC ...
23,461,195 UART:
23,461,359 UART: [state] CFI Enabled
23,531,558 UART: [fht] FMC Alias Private Key: 7
25,872,324 UART: [art] Extend RT PCRs Done
25,873,559 UART: [art] Lock RT PCRs Done
25,875,280 UART: [art] Populate DV Done
25,880,492 UART: [fht] FMC Alias Private Key: 7
25,882,244 UART: [art] Derive CDI
25,882,983 UART: [art] Store in slot 0x4
25,940,288 UART: [art] Derive Key Pair
25,941,295 UART: [art] Store priv key in slot 0x5
29,234,196 UART: [art] Derive Key Pair - Done
29,246,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,535,482 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,012 UART: [art] PUB.X = FB4E12B43E5DC8ED9E6B4347B8539AE26C32C82A2A65CD8A2B79053F54FB3AC594B8D59D5E42B7844A47D79D4475738F
31,544,241 UART: [art] PUB.Y = 74824FDF5067B194095E5303EB850F253B6BFD845D702F29A8130FACFB56E8A874F553008EE68DE255D0F674556A211D
31,551,497 UART: [art] SIG.R = C9D2D4460D5A515076B675B8DC3EADF8ABE88C68F7CC9CE748C2A070B623BB171B9E34213270DDB2CD59CE7B5EC5EA63
31,558,934 UART: [art] SIG.S = 8108C9D33E2C90A89D3FA1205AB9484142597E088AD026FE14AF26CF476683661CAF2E332183D3F23517FC3B24A219EC
32,864,269 UART: Caliptra RT
32,864,998 UART: [state] CFI Enabled
33,041,824 UART: [rt] RT listening for mailbox commands...
33,074,063 UART: [rt]cmd =0x44504543, len=136
38,703,122 >>> mbox cmd response data (136 bytes)
38,704,670 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,735,441 UART: [rt]cmd =0x44504543, len=92
44,499,334 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
3,783,456 ready_for_fw is high
3,783,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,927,858 >>> mbox cmd response: success
17,929,353 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,631,652 UART:
23,632,121 UART: Running Caliptra FMC ...
23,633,236 UART:
23,633,418 UART: [state] CFI Enabled
23,698,707 UART: [fht] FMC Alias Private Key: 7
26,038,921 UART: [art] Extend RT PCRs Done
26,040,168 UART: [art] Lock RT PCRs Done
26,042,153 UART: [art] Populate DV Done
26,047,306 UART: [fht] FMC Alias Private Key: 7
26,048,961 UART: [art] Derive CDI
26,049,701 UART: [art] Store in slot 0x4
26,106,877 UART: [art] Derive Key Pair
26,107,923 UART: [art] Store priv key in slot 0x5
29,400,642 UART: [art] Derive Key Pair - Done
29,413,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,700,953 UART: [art] Erasing AUTHORITY.KEYID = 7
31,702,469 UART: [art] PUB.X = 7E5955A7B30D8D76692513623806269B8D6CE1E0286467C6B562C931E46900A547FA08783F1E0E6FBACD16AB08DD47C9
31,709,667 UART: [art] PUB.Y = 0A2605B6E0F68450A14C533AA3DB50F61E302D8FDA6C0A019F41AB2CCA99252B2F09FD7CBE212F61535FAA5969BC0E59
31,716,980 UART: [art] SIG.R = C7FBA00D08F77FAF733FBB7D36051644DCFD5AFA8458728AB47DA468D3AB13B3CA3167DC353578B6262B7CAF154A5C02
31,724,396 UART: [art] SIG.S = 0D0CA41FB842527E7A4110274CAA580107401A543D11751B4A3098E967592A283196C93EA061A6A20B4360F23A48B413
33,029,666 UART: Caliptra RT
33,030,387 UART: [state] CFI Enabled
33,206,509 UART: [rt] RT listening for mailbox commands...
33,238,996 UART: [rt]cmd =0x44504543, len=136
38,866,073 >>> mbox cmd response data (136 bytes)
38,867,434 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,898,168 UART: [rt]cmd =0x44504543, len=92
44,659,654 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,400 UART:
192,762 UART: Running Caliptra ROM ...
193,890 UART:
603,780 UART: [state] CFI Enabled
613,098 UART: [state] LifecycleState = Unprovisioned
615,023 UART: [state] DebugLocked = No
617,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
621,583 UART: [kat] SHA2-256
791,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
801,903 UART: [kat] ++
802,430 UART: [kat] sha1
813,095 UART: [kat] SHA2-256
815,734 UART: [kat] SHA2-384
822,147 UART: [kat] SHA2-512-ACC
824,507 UART: [kat] ECC-384
3,107,816 UART: [kat] HMAC-384Kdf
3,119,904 UART: [kat] LMS
4,310,013 UART: [kat] --
4,314,384 UART: [cold-reset] ++
4,316,025 UART: [fht] Storing FHT @ 0x50003400
4,327,574 UART: [idev] ++
4,328,129 UART: [idev] CDI.KEYID = 6
4,329,108 UART: [idev] SUBJECT.KEYID = 7
4,330,361 UART: [idev] UDS.KEYID = 0
4,331,396 ready_for_fw is high
4,331,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,468 UART: [idev] Erasing UDS.KEYID = 0
7,621,212 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,967 UART: [idev] --
7,647,225 UART: [ldev] ++
7,647,785 UART: [ldev] CDI.KEYID = 6
7,648,713 UART: [ldev] SUBJECT.KEYID = 5
7,649,971 UART: [ldev] AUTHORITY.KEYID = 7
7,651,294 UART: [ldev] FE.KEYID = 1
7,662,621 UART: [ldev] Erasing FE.KEYID = 1
10,951,661 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,628 UART: [ldev] --
13,313,860 UART: [fwproc] Waiting for Commands...
13,315,677 UART: [fwproc] Received command 0x46574c44
13,317,859 UART: [fwproc] Received Image of size 118548 bytes
17,418,849 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,520 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,710 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,896,764 >>> mbox cmd response: success
17,897,857 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,900,511 UART: [afmc] ++
17,901,093 UART: [afmc] CDI.KEYID = 6
17,902,031 UART: [afmc] SUBJECT.KEYID = 7
17,903,301 UART: [afmc] AUTHORITY.KEYID = 5
21,215,509 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,341 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,511,607 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,540,729 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,138 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,673 UART: [afmc] --
23,580,303 UART: [cold-reset] --
23,584,648 UART: [state] Locking Datavault
23,589,721 UART: [state] Locking PCR0, PCR1 and PCR31
23,591,469 UART: [state] Locking ICCM
23,594,127 UART: [exit] Launching FMC @ 0x40000130
23,602,510 UART:
23,602,737 UART: Running Caliptra FMC ...
23,603,753 UART:
23,603,893 UART: [state] CFI Enabled
23,611,822 UART: [fht] FMC Alias Private Key: 7
25,952,498 UART: [art] Extend RT PCRs Done
25,953,747 UART: [art] Lock RT PCRs Done
25,955,451 UART: [art] Populate DV Done
25,960,646 UART: [fht] FMC Alias Private Key: 7
25,962,242 UART: [art] Derive CDI
25,963,055 UART: [art] Store in slot 0x4
26,005,924 UART: [art] Derive Key Pair
26,006,965 UART: [art] Store priv key in slot 0x5
29,249,343 UART: [art] Derive Key Pair - Done
29,262,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,542,596 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,101 UART: [art] PUB.X = DCF162F725AD2021D690FC380FFBF4D7C7DC29B05015EBBA392C85AC605F56BE58DA3D9AF32E3FFFD30365469FAC1DA9
31,551,356 UART: [art] PUB.Y = B13153282B97D85FB384EACAB7383845478601693819A4564D8548969A4055AF0C8CB6DB55F85C848CCA299340D3D150
31,558,643 UART: [art] SIG.R = F3EF46DEFFF5C9B594F047A4577BAEF117AFCD06F30D34F6954F6983F4D255212382AE1AFD0F7A530E056CC6B629251B
31,566,040 UART: [art] SIG.S = 95C22C77CC9CE458A8351902C7E341C161FFB938A27B51FBA203C7CB9471AC7CD72B47825783E53560015BF9B34260EB
32,871,500 UART: Caliptra RT
32,872,189 UART: [state] CFI Enabled
33,005,575 UART: [rt] RT listening for mailbox commands...
33,038,209 UART: [rt]cmd =0x44504543, len=136
38,597,666 >>> mbox cmd response data (136 bytes)
38,598,993 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,629,429 UART: [rt]cmd =0x44504543, len=92
44,305,338 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,123,756 ready_for_fw is high
4,124,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,587 >>> mbox cmd response: success
18,158,090 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,794,337 UART:
23,794,731 UART: Running Caliptra FMC ...
23,795,875 UART:
23,796,030 UART: [state] CFI Enabled
23,803,813 UART: [fht] FMC Alias Private Key: 7
26,143,818 UART: [art] Extend RT PCRs Done
26,145,172 UART: [art] Lock RT PCRs Done
26,146,257 UART: [art] Populate DV Done
26,151,781 UART: [fht] FMC Alias Private Key: 7
26,153,426 UART: [art] Derive CDI
26,154,234 UART: [art] Store in slot 0x4
26,196,713 UART: [art] Derive Key Pair
26,197,707 UART: [art] Store priv key in slot 0x5
29,439,732 UART: [art] Derive Key Pair - Done
29,452,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,841 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,368 UART: [art] PUB.X = 1A02C09368226332A28919805BF9802EFFB1798937C897F77D538C6CB6892D5555C073A05B008544049F026A327E4F92
31,741,564 UART: [art] PUB.Y = 4F0E27CF1C91C98B387F076233A9D45D66650EF54DD3CFDCF6491A4433E1FECB9CB925D25F34CF3F07703E4629FC594A
31,748,823 UART: [art] SIG.R = AB73CD43D0574A75B4A4A2F08DB0F1C9353847A2A208D1C114A03038CC13436BA608404D4844FE3964280615929629EC
31,756,171 UART: [art] SIG.S = 06952EE258990D4B913A1ED1C015CFFC7257D803050445ED7B215705F8B9C7B8FA84362DF0CD84B5A47E3A4B6867D8A1
33,061,482 UART: Caliptra RT
33,062,205 UART: [state] CFI Enabled
33,195,040 UART: [rt] RT listening for mailbox commands...
33,227,211 UART: [rt]cmd =0x44504543, len=136
38,785,935 >>> mbox cmd response data (136 bytes)
38,787,913 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,818,612 UART: [rt]cmd =0x44504543, len=92
44,494,195 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,043 UART:
192,422 UART: Running Caliptra ROM ...
193,541 UART:
193,684 UART: [state] CFI Enabled
263,366 UART: [state] LifecycleState = Unprovisioned
265,271 UART: [state] DebugLocked = No
266,732 UART: [state] WD Timer not started. Device not locked for debugging
271,343 UART: [kat] SHA2-256
450,990 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,792 UART: [kat] ++
462,272 UART: [kat] sha1
473,996 UART: [kat] SHA2-256
476,715 UART: [kat] SHA2-384
482,768 UART: [kat] SHA2-512-ACC
485,139 UART: [kat] ECC-384
2,947,773 UART: [kat] HMAC-384Kdf
2,971,444 UART: [kat] LMS
3,447,981 UART: [kat] --
3,453,196 UART: [cold-reset] ++
3,455,191 UART: [fht] FHT @ 0x50003400
3,466,591 UART: [idev] ++
3,467,160 UART: [idev] CDI.KEYID = 6
3,468,188 UART: [idev] SUBJECT.KEYID = 7
3,469,363 UART: [idev] UDS.KEYID = 0
3,470,291 ready_for_fw is high
3,470,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,648 UART: [idev] Erasing UDS.KEYID = 0
5,990,233 UART: [idev] Sha1 KeyId Algorithm
6,014,759 UART: [idev] --
6,020,100 UART: [ldev] ++
6,020,732 UART: [ldev] CDI.KEYID = 6
6,021,644 UART: [ldev] SUBJECT.KEYID = 5
6,022,805 UART: [ldev] AUTHORITY.KEYID = 7
6,024,108 UART: [ldev] FE.KEYID = 1
6,058,580 UART: [ldev] Erasing FE.KEYID = 1
8,565,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,888 UART: [ldev] --
10,375,173 UART: [fwproc] Wait for Commands...
10,378,219 UART: [fwproc] Recv command 0x46574c44
10,380,269 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,313 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,364 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,866 >>> mbox cmd response: success
14,351,005 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,354,410 UART: [afmc] ++
14,354,986 UART: [afmc] CDI.KEYID = 6
14,356,002 UART: [afmc] SUBJECT.KEYID = 7
14,357,167 UART: [afmc] AUTHORITY.KEYID = 5
16,895,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,614,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,040 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,632,824 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,648,919 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,664,471 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,379 UART: [afmc] --
18,693,868 UART: [cold-reset] --
18,698,355 UART: [state] Locking Datavault
18,704,198 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,957 UART: [state] Locking ICCM
18,707,401 UART: [exit] Launching FMC @ 0x40000130
18,715,813 UART:
18,716,049 UART: Running Caliptra FMC ...
18,717,149 UART:
18,717,305 UART: [state] CFI Enabled
18,774,876 UART: [fht] FMC Alias Private Key: 7
20,540,784 UART: [art] Extend RT PCRs Done
20,541,997 UART: [art] Lock RT PCRs Done
20,543,669 UART: [art] Populate DV Done
20,549,241 UART: [fht] FMC Alias Private Key: 7
20,550,930 UART: [art] Derive CDI
20,551,741 UART: [art] Store in slot 0x4
20,607,077 UART: [art] Derive Key Pair
20,608,069 UART: [art] Store priv key in slot 0x5
23,070,819 UART: [art] Derive Key Pair - Done
23,083,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,772 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,298 UART: [art] PUB.X = 02E8BE5B2958FDA853A84A69F1ADA6355A302E2F8F80D1DBE93A1A48B1EFDDCEA956E5A87822B228CE1FDBD623AF323D
24,805,600 UART: [art] PUB.Y = 3F6889A0FC73C6D31315D79F21AB52D2D5E001EE7E251B8570C33F0CEC9847B9026B938A2386BAEB1378885E5EA21492
24,812,836 UART: [art] SIG.R = 63125D9EC3DE135D859E66A42B759A2551131076FA9A9CBE0B2CFBDA70A0F3666CB46B46C9000A01C1EFB84128410F24
24,820,220 UART: [art] SIG.S = 236AE4F9743332B9DA47FFCE82CB2A8C77D9BBEDA3307BFF2D9E14F9B4287FECB575067151EB1807BB688CFCE16C7DDB
25,799,614 UART: Caliptra RT
25,800,325 UART: [state] CFI Enabled
25,980,690 UART: [rt] RT listening for mailbox commands...
26,012,913 UART: [rt]cmd =0x44504543, len=136
30,237,361 >>> mbox cmd response data (136 bytes)
30,238,714 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,269,095 UART: [rt]cmd =0x44504543, len=92
34,622,886 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,461,351 ready_for_fw is high
3,461,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,232,571 >>> mbox cmd response: success
14,234,042 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,516,093 UART:
18,516,508 UART: Running Caliptra FMC ...
18,517,610 UART:
18,517,767 UART: [state] CFI Enabled
18,581,297 UART: [fht] FMC Alias Private Key: 7
20,347,786 UART: [art] Extend RT PCRs Done
20,348,992 UART: [art] Lock RT PCRs Done
20,350,670 UART: [art] Populate DV Done
20,356,184 UART: [fht] FMC Alias Private Key: 7
20,357,779 UART: [art] Derive CDI
20,358,591 UART: [art] Store in slot 0x4
20,413,310 UART: [art] Derive Key Pair
20,414,343 UART: [art] Store priv key in slot 0x5
22,876,786 UART: [art] Derive Key Pair - Done
22,889,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,571 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,052 UART: [art] PUB.X = E17A8728AE3DD7B895B8963C918EA44B78609C6130A1D46B9617C753E40482FF682B0D1B0937E810FCBD64E653F425E8
24,611,300 UART: [art] PUB.Y = 2A8A002995E9E8B9C7FF236E3D14785B7ED9121D381D41DBD72AAA045B3FD16C0B36E32C2C56DD28572B753E07F9066F
24,618,596 UART: [art] SIG.R = 773ECD545353A8CB83A5DB6C1F583C80AD6DEA33F9016011DA200545E3D9516B50E5683CF70A0A4E9F7D2A87067B8B18
24,625,930 UART: [art] SIG.S = 9F17C29010CDDD153D777687BF8AAE014FE0D10DD66D1FA42B51B8A824717C73B7AFBB968BACEF55F83E5E91680E34E8
25,605,171 UART: Caliptra RT
25,606,046 UART: [state] CFI Enabled
25,785,730 UART: [rt] RT listening for mailbox commands...
25,818,442 UART: [rt]cmd =0x44504543, len=136
30,041,887 >>> mbox cmd response data (136 bytes)
30,043,213 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,074,075 UART: [rt]cmd =0x44504543, len=92
34,428,409 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,449 UART:
192,809 UART: Running Caliptra ROM ...
193,922 UART:
603,616 UART: [state] CFI Enabled
618,788 UART: [state] LifecycleState = Unprovisioned
620,657 UART: [state] DebugLocked = No
623,100 UART: [state] WD Timer not started. Device not locked for debugging
627,564 UART: [kat] SHA2-256
807,255 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,034 UART: [kat] ++
818,490 UART: [kat] sha1
828,017 UART: [kat] SHA2-256
830,687 UART: [kat] SHA2-384
836,252 UART: [kat] SHA2-512-ACC
838,625 UART: [kat] ECC-384
3,279,167 UART: [kat] HMAC-384Kdf
3,290,584 UART: [kat] LMS
3,767,075 UART: [kat] --
3,772,650 UART: [cold-reset] ++
3,774,254 UART: [fht] FHT @ 0x50003400
3,786,241 UART: [idev] ++
3,786,820 UART: [idev] CDI.KEYID = 6
3,787,854 UART: [idev] SUBJECT.KEYID = 7
3,789,033 UART: [idev] UDS.KEYID = 0
3,789,967 ready_for_fw is high
3,790,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,025 UART: [idev] Erasing UDS.KEYID = 0
6,268,947 UART: [idev] Sha1 KeyId Algorithm
6,292,499 UART: [idev] --
6,298,699 UART: [ldev] ++
6,299,282 UART: [ldev] CDI.KEYID = 6
6,300,253 UART: [ldev] SUBJECT.KEYID = 5
6,301,353 UART: [ldev] AUTHORITY.KEYID = 7
6,302,610 UART: [ldev] FE.KEYID = 1
6,314,626 UART: [ldev] Erasing FE.KEYID = 1
8,790,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,967 UART: [ldev] --
10,584,984 UART: [fwproc] Wait for Commands...
10,587,679 UART: [fwproc] Recv command 0x46574c44
10,589,720 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,436 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,436 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,037 >>> mbox cmd response: success
14,549,304 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,551,721 UART: [afmc] ++
14,552,310 UART: [afmc] CDI.KEYID = 6
14,553,332 UART: [afmc] SUBJECT.KEYID = 7
14,554,497 UART: [afmc] AUTHORITY.KEYID = 5
17,055,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,546 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,722 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,539 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,595 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,185 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,118 UART: [afmc] --
18,857,471 UART: [cold-reset] --
18,860,035 UART: [state] Locking Datavault
18,865,664 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,421 UART: [state] Locking ICCM
18,869,164 UART: [exit] Launching FMC @ 0x40000130
18,877,562 UART:
18,877,799 UART: Running Caliptra FMC ...
18,878,902 UART:
18,879,071 UART: [state] CFI Enabled
18,887,558 UART: [fht] FMC Alias Private Key: 7
20,653,375 UART: [art] Extend RT PCRs Done
20,654,593 UART: [art] Lock RT PCRs Done
20,656,329 UART: [art] Populate DV Done
20,661,746 UART: [fht] FMC Alias Private Key: 7
20,663,449 UART: [art] Derive CDI
20,664,186 UART: [art] Store in slot 0x4
20,707,154 UART: [art] Derive Key Pair
20,708,151 UART: [art] Store priv key in slot 0x5
23,134,996 UART: [art] Derive Key Pair - Done
23,147,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,854,506 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,006 UART: [art] PUB.X = 49EE945F3ADF607DA6229CA82EAAF574681394E055AF3E0827866C14570A53CD8A0659071B27DD1E7E0DB3A5D3288C40
24,863,309 UART: [art] PUB.Y = AB1E1BE222A66860C0699B217DB59317C455C69226E4EFF68764E6B0B7E12AA10B8FD2260708CE0F70F1F90E0B9171B1
24,870,533 UART: [art] SIG.R = 421F360720AD07F9385C4130D0AA64462EF98122BE984262C3541C6CF62C0EADF10B897DC9D0A70A8A8E377BDA6A9AA0
24,877,916 UART: [art] SIG.S = 8CC6BD84CA322F87E26C9B0D207B76384E61B041963DB2A697D057AE273BC53149E04FCF0E957CDC0356EE6664A88887
25,855,824 UART: Caliptra RT
25,856,525 UART: [state] CFI Enabled
25,988,719 UART: [rt] RT listening for mailbox commands...
26,021,259 UART: [rt]cmd =0x44504543, len=136
30,192,044 >>> mbox cmd response data (136 bytes)
30,193,381 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,223,845 UART: [rt]cmd =0x44504543, len=92
34,509,537 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,287 writing to cptra_bootfsm_go
3,782,828 ready_for_fw is high
3,783,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,053 >>> mbox cmd response: success
14,447,488 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,699,050 UART:
18,699,447 UART: Running Caliptra FMC ...
18,700,587 UART:
18,700,745 UART: [state] CFI Enabled
18,708,628 UART: [fht] FMC Alias Private Key: 7
20,474,960 UART: [art] Extend RT PCRs Done
20,476,178 UART: [art] Lock RT PCRs Done
20,477,913 UART: [art] Populate DV Done
20,483,220 UART: [fht] FMC Alias Private Key: 7
20,484,707 UART: [art] Derive CDI
20,485,477 UART: [art] Store in slot 0x4
20,527,906 UART: [art] Derive Key Pair
20,528,910 UART: [art] Store priv key in slot 0x5
22,955,848 UART: [art] Derive Key Pair - Done
22,968,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,452 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,954 UART: [art] PUB.X = 08F0C89D862B7C820EC34A136FD2AF6714F90DE2985E35608F1C90ADC39187EFDFD4975FFAD6777A327B1A4C38A4F87A
24,684,215 UART: [art] PUB.Y = 36B805D765CDD783503AF1D8E72F46B35296A9883259E1FB37575C3AA70BBEB3DC227CFD9FE5673BC70C85FD877F7992
24,691,524 UART: [art] SIG.R = 33F8182A04A5D6C43381E67C958DAAB0D419B24A6F26F9C6A4A305F7E2672B14422A8768EF155D99BD58035FA0F33A86
24,698,870 UART: [art] SIG.S = 21DC27CDA47BB787A43554A4474EE6D23EA7DABFAF5714073FF2C4E45A0A000121AADD1707943310DEB2DE0A6AA58334
25,677,529 UART: Caliptra RT
25,678,239 UART: [state] CFI Enabled
25,810,849 UART: [rt] RT listening for mailbox commands...
25,843,227 UART: [rt]cmd =0x44504543, len=136
30,013,526 >>> mbox cmd response data (136 bytes)
30,014,841 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,045,438 UART: [rt]cmd =0x44504543, len=92
34,331,543 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,170 UART:
192,546 UART: Running Caliptra ROM ...
193,729 UART:
193,881 UART: [state] CFI Enabled
264,332 UART: [state] LifecycleState = Unprovisioned
266,681 UART: [state] DebugLocked = No
268,358 UART: [state] WD Timer not started. Device not locked for debugging
273,522 UART: [kat] SHA2-256
463,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,155 UART: [kat] ++
474,632 UART: [kat] sha1
486,598 UART: [kat] SHA2-256
489,616 UART: [kat] SHA2-384
496,399 UART: [kat] SHA2-512-ACC
498,980 UART: [kat] ECC-384
2,949,352 UART: [kat] HMAC-384Kdf
2,972,773 UART: [kat] LMS
3,504,497 UART: [kat] --
3,508,702 UART: [cold-reset] ++
3,509,990 UART: [fht] FHT @ 0x50003400
3,522,042 UART: [idev] ++
3,522,715 UART: [idev] CDI.KEYID = 6
3,523,599 UART: [idev] SUBJECT.KEYID = 7
3,524,845 UART: [idev] UDS.KEYID = 0
3,525,769 ready_for_fw is high
3,525,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,972 UART: [idev] Erasing UDS.KEYID = 0
6,030,587 UART: [idev] Sha1 KeyId Algorithm
6,052,254 UART: [idev] --
6,057,383 UART: [ldev] ++
6,058,060 UART: [ldev] CDI.KEYID = 6
6,058,996 UART: [ldev] SUBJECT.KEYID = 5
6,060,154 UART: [ldev] AUTHORITY.KEYID = 7
6,061,384 UART: [ldev] FE.KEYID = 1
6,101,468 UART: [ldev] Erasing FE.KEYID = 1
8,609,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,835 UART: [ldev] --
10,414,165 UART: [fwproc] Wait for Commands...
10,415,782 UART: [fwproc] Recv command 0x46574c44
10,418,032 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,904 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,495 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,785 >>> mbox cmd response: success
14,678,373 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,682,126 UART: [afmc] ++
14,682,818 UART: [afmc] CDI.KEYID = 6
14,684,058 UART: [afmc] SUBJECT.KEYID = 7
14,685,493 UART: [afmc] AUTHORITY.KEYID = 5
17,211,000 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,940,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,173 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,957,334 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,972,448 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,987,318 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,138 UART: [afmc] --
19,015,058 UART: [cold-reset] --
19,020,326 UART: [state] Locking Datavault
19,026,435 UART: [state] Locking PCR0, PCR1 and PCR31
19,028,618 UART: [state] Locking ICCM
19,030,330 UART: [exit] Launching FMC @ 0x40000130
19,039,002 UART:
19,039,286 UART: Running Caliptra FMC ...
19,040,398 UART:
19,040,557 UART: [state] CFI Enabled
19,095,403 UART: [fht] FMC Alias Private Key: 7
20,862,621 UART: [art] Extend RT PCRs Done
20,863,840 UART: [art] Lock RT PCRs Done
20,865,644 UART: [art] Populate DV Done
20,871,162 UART: [fht] FMC Alias Private Key: 7
20,872,641 UART: [art] Derive CDI
20,873,395 UART: [art] Store in slot 0x4
20,927,923 UART: [art] Derive Key Pair
20,928,962 UART: [art] Store priv key in slot 0x5
23,391,329 UART: [art] Derive Key Pair - Done
23,404,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,640 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,143 UART: [art] PUB.X = 6166B5DAF165226FE772DAD16B37443323FAFE71A1476F51429F2ABEE33915C2C6936057B4203B51E792F6B390396DAA
25,125,423 UART: [art] PUB.Y = DEE131806FE3C00CB1C71681ABB3FADBBDC37CA7250ADEBC85C6D45E56B6CB8B9D33073F84580FCBC2F81DD0F9D78788
25,132,727 UART: [art] SIG.R = A73C529C9E85E384EFC8E057E093AB471246617209EEDEAC7EAD32109F17EC7052C4BE6FF5D7542203566405940D5861
25,140,079 UART: [art] SIG.S = 247BD9FF254572EFE2AD278843A79A9273D797A23BBE9E23FC5059AA0EEA89AF8B1B3213A27109B40ABA7A67F8D46A55
26,118,960 UART: Caliptra RT
26,119,670 UART: [state] CFI Enabled
26,299,502 UART: [rt] RT listening for mailbox commands...
26,331,788 UART: [rt]cmd =0x44504543, len=136
30,554,605 >>> mbox cmd response data (136 bytes)
30,555,937 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,586,675 UART: [rt]cmd =0x44504543, len=92
34,942,295 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,436,779 ready_for_fw is high
3,437,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,832,039 >>> mbox cmd response: success
14,832,887 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,127,513 UART:
19,127,927 UART: Running Caliptra FMC ...
19,129,033 UART:
19,129,189 UART: [state] CFI Enabled
19,197,583 UART: [fht] FMC Alias Private Key: 7
20,963,608 UART: [art] Extend RT PCRs Done
20,964,834 UART: [art] Lock RT PCRs Done
20,966,701 UART: [art] Populate DV Done
20,972,121 UART: [fht] FMC Alias Private Key: 7
20,973,607 UART: [art] Derive CDI
20,974,368 UART: [art] Store in slot 0x4
21,030,602 UART: [art] Derive Key Pair
21,031,652 UART: [art] Store priv key in slot 0x5
23,494,563 UART: [art] Derive Key Pair - Done
23,507,713 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,546 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,050 UART: [art] PUB.X = 8EDACBFEE1BB07639C6398A2A1A3CC7857219C1571B5B1BA89C74ABCB6846DC98DA1B48B79ACE0849AAA39F9189E4DCC
25,229,305 UART: [art] PUB.Y = 39253E5197E88EBDCC2CA7B26962025A768BB413D04203FBE4E9862BA080082A6A49AB953BE2B62D0B5F08D64D5365CD
25,236,564 UART: [art] SIG.R = EC8DF1C211C233F506FD3D3B31C0193AA6C30847F36D05E6A7E47F4FED4D891F79063CE1E0DC348AB3698B202847662A
25,243,967 UART: [art] SIG.S = 7861B6EFEAB264D39229A78F93B5703CC887B68E539D258E8447DB1C36FA9F6E048C4AB8B1A0D6020E7BD1E4C3BF8929
26,222,182 UART: Caliptra RT
26,222,888 UART: [state] CFI Enabled
26,405,319 UART: [rt] RT listening for mailbox commands...
26,437,807 UART: [rt]cmd =0x44504543, len=136
30,661,193 >>> mbox cmd response data (136 bytes)
30,662,499 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,693,151 UART: [rt]cmd =0x44504543, len=92
35,049,828 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,374 UART:
192,736 UART: Running Caliptra ROM ...
193,863 UART:
603,693 UART: [state] CFI Enabled
615,391 UART: [state] LifecycleState = Unprovisioned
617,774 UART: [state] DebugLocked = No
620,659 UART: [state] WD Timer not started. Device not locked for debugging
625,498 UART: [kat] SHA2-256
815,402 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,151 UART: [kat] ++
826,765 UART: [kat] sha1
838,645 UART: [kat] SHA2-256
841,658 UART: [kat] SHA2-384
846,726 UART: [kat] SHA2-512-ACC
849,313 UART: [kat] ECC-384
3,290,623 UART: [kat] HMAC-384Kdf
3,302,519 UART: [kat] LMS
3,834,297 UART: [kat] --
3,838,433 UART: [cold-reset] ++
3,840,158 UART: [fht] FHT @ 0x50003400
3,851,992 UART: [idev] ++
3,852,711 UART: [idev] CDI.KEYID = 6
3,853,599 UART: [idev] SUBJECT.KEYID = 7
3,854,853 UART: [idev] UDS.KEYID = 0
3,855,791 ready_for_fw is high
3,856,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,897 UART: [idev] Erasing UDS.KEYID = 0
6,332,345 UART: [idev] Sha1 KeyId Algorithm
6,355,066 UART: [idev] --
6,360,176 UART: [ldev] ++
6,360,862 UART: [ldev] CDI.KEYID = 6
6,361,781 UART: [ldev] SUBJECT.KEYID = 5
6,362,944 UART: [ldev] AUTHORITY.KEYID = 7
6,364,175 UART: [ldev] FE.KEYID = 1
6,376,224 UART: [ldev] Erasing FE.KEYID = 1
8,858,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,905 UART: [ldev] --
10,648,836 UART: [fwproc] Wait for Commands...
10,651,484 UART: [fwproc] Recv command 0x46574c44
10,653,740 UART: [fwproc] Recv'd Img size: 118548 bytes
14,142,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,217,193 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,340,789 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,901,156 >>> mbox cmd response: success
14,901,939 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,905,863 UART: [afmc] ++
14,906,615 UART: [afmc] CDI.KEYID = 6
14,907,806 UART: [afmc] SUBJECT.KEYID = 7
14,909,241 UART: [afmc] AUTHORITY.KEYID = 5
17,413,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,134,792 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,136,755 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,151,850 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,166,960 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,181,888 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,204,169 UART: [afmc] --
19,207,718 UART: [cold-reset] --
19,211,260 UART: [state] Locking Datavault
19,215,278 UART: [state] Locking PCR0, PCR1 and PCR31
19,217,479 UART: [state] Locking ICCM
19,219,094 UART: [exit] Launching FMC @ 0x40000130
19,227,719 UART:
19,227,981 UART: Running Caliptra FMC ...
19,229,208 UART:
19,229,370 UART: [state] CFI Enabled
19,237,370 UART: [fht] FMC Alias Private Key: 7
21,003,368 UART: [art] Extend RT PCRs Done
21,004,597 UART: [art] Lock RT PCRs Done
21,006,202 UART: [art] Populate DV Done
21,011,640 UART: [fht] FMC Alias Private Key: 7
21,013,238 UART: [art] Derive CDI
21,014,056 UART: [art] Store in slot 0x4
21,056,980 UART: [art] Derive Key Pair
21,057,986 UART: [art] Store priv key in slot 0x5
23,485,079 UART: [art] Derive Key Pair - Done
23,497,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,491 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,996 UART: [art] PUB.X = 5CBD76AA897D6BA4E806374463E3BB51B19C18AA37A51450F6475A59F6BFD7D45A18B091D2196AB43130241112629482
25,213,213 UART: [art] PUB.Y = 02005F2A391EDFDF5E441D2B0A6F03D279838F950E43E96C24036F3D07CAD8C8655448F480F4C306EF4ED1D8435E7327
25,220,462 UART: [art] SIG.R = 2181B592CAD00836CDBF469EA9B900432493B7A4107E409B4175FD323789A64451525FF99E75EEEAE986893B1703AE45
25,227,855 UART: [art] SIG.S = F1906F1F24123EB4FD75608857B513B70F1C099E2D004A2E3F7D1EB7B2DBCB450884973209C1A980C3CE0847F72137F2
26,206,753 UART: Caliptra RT
26,207,474 UART: [state] CFI Enabled
26,339,496 UART: [rt] RT listening for mailbox commands...
26,371,825 UART: [rt]cmd =0x44504543, len=136
30,542,446 >>> mbox cmd response data (136 bytes)
30,543,774 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,574,212 UART: [rt]cmd =0x44504543, len=92
34,859,855 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,761,746 ready_for_fw is high
3,762,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,860 >>> mbox cmd response: success
15,045,835 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,299,242 UART:
19,299,636 UART: Running Caliptra FMC ...
19,300,784 UART:
19,300,957 UART: [state] CFI Enabled
19,309,044 UART: [fht] FMC Alias Private Key: 7
21,075,415 UART: [art] Extend RT PCRs Done
21,076,644 UART: [art] Lock RT PCRs Done
21,078,495 UART: [art] Populate DV Done
21,083,871 UART: [fht] FMC Alias Private Key: 7
21,085,416 UART: [art] Derive CDI
21,086,185 UART: [art] Store in slot 0x4
21,128,893 UART: [art] Derive Key Pair
21,129,896 UART: [art] Store priv key in slot 0x5
23,557,218 UART: [art] Derive Key Pair - Done
23,570,069 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,324 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,833 UART: [art] PUB.X = D2B202AB6C4020EBE8198121FBC40A481BA7437FBBD79F51DE8537199569901D6F89B2009D837AB414D195F4C33E2B77
25,285,096 UART: [art] PUB.Y = EBCE43F69CF22A1D0FC55F05B9F5270F28B9540D51821BBF6A9DCD9739D2E31B2A241257EEAA2E9718C1C50CD76FD95E
25,292,338 UART: [art] SIG.R = E38B9233C3F1BCF933F250824216A0694D3F5233DE9A11770CFD57514EA99E3212F8687A6F26C58B3C4248C77AA8F14E
25,299,751 UART: [art] SIG.S = E368982651A9F7D6B2D88BF8CB7374ED9D2CB09E001EC29D6FAFE4C5D4DA32A1A0B5BE4B31591ECE568D91D7297ADE33
26,278,617 UART: Caliptra RT
26,279,308 UART: [state] CFI Enabled
26,411,914 UART: [rt] RT listening for mailbox commands...
26,444,330 UART: [rt]cmd =0x44504543, len=136
30,615,069 >>> mbox cmd response data (136 bytes)
30,616,369 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,646,806 UART: [rt]cmd =0x44504543, len=92
34,933,480 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,622 UART: [state] LifecycleState = Unprovisioned
86,277 UART: [state] DebugLocked = No
86,989 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,571 UART: [kat] SHA2-256
882,502 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,617 UART: [kat] ++
886,769 UART: [kat] sha1
890,963 UART: [kat] SHA2-256
892,901 UART: [kat] SHA2-384
895,648 UART: [kat] SHA2-512-ACC
897,549 UART: [kat] ECC-384
903,168 UART: [kat] HMAC-384Kdf
907,750 UART: [kat] LMS
1,475,946 UART: [kat] --
1,476,861 UART: [cold-reset] ++
1,477,213 UART: [fht] Storing FHT @ 0x50003400
1,480,204 UART: [idev] ++
1,480,372 UART: [idev] CDI.KEYID = 6
1,480,732 UART: [idev] SUBJECT.KEYID = 7
1,481,156 UART: [idev] UDS.KEYID = 0
1,481,501 ready_for_fw is high
1,481,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,282 UART: [idev] Erasing UDS.KEYID = 0
1,505,590 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,248 UART: [idev] --
1,515,351 UART: [ldev] ++
1,515,519 UART: [ldev] CDI.KEYID = 6
1,515,882 UART: [ldev] SUBJECT.KEYID = 5
1,516,308 UART: [ldev] AUTHORITY.KEYID = 7
1,516,771 UART: [ldev] FE.KEYID = 1
1,521,865 UART: [ldev] Erasing FE.KEYID = 1
1,547,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,538 UART: [ldev] --
1,586,987 UART: [fwproc] Waiting for Commands...
1,587,798 UART: [fwproc] Received command 0x46574c44
1,588,589 UART: [fwproc] Received Image of size 118548 bytes
2,932,571 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,099 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,317 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,550 >>> mbox cmd response: success
3,131,550 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,132,748 UART: [afmc] ++
3,132,916 UART: [afmc] CDI.KEYID = 6
3,133,278 UART: [afmc] SUBJECT.KEYID = 7
3,133,703 UART: [afmc] AUTHORITY.KEYID = 5
3,169,124 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,496 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,276 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,985 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,868 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,551 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,391 UART: [afmc] --
3,212,419 UART: [cold-reset] --
3,213,227 UART: [state] Locking Datavault
3,214,132 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,736 UART: [state] Locking ICCM
3,215,406 UART: [exit] Launching FMC @ 0x40000130
3,220,736 UART:
3,220,752 UART: Running Caliptra FMC ...
3,221,160 UART:
3,221,214 UART: [state] CFI Enabled
3,231,870 UART: [fht] FMC Alias Private Key: 7
3,351,304 UART: [art] Extend RT PCRs Done
3,351,732 UART: [art] Lock RT PCRs Done
3,353,216 UART: [art] Populate DV Done
3,361,513 UART: [fht] FMC Alias Private Key: 7
3,362,593 UART: [art] Derive CDI
3,362,873 UART: [art] Store in slot 0x4
3,448,547 UART: [art] Derive Key Pair
3,448,907 UART: [art] Store priv key in slot 0x5
3,461,916 UART: [art] Derive Key Pair - Done
3,476,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,789 UART: [art] PUB.X = 7E20D5EA1B993AC61A49FFC31E6A5AD56DE11A2D7E402A4988EED89DD11C4DD7E96450EA6217AAD2531A9CE6FD93A8BC
3,499,583 UART: [art] PUB.Y = DB2EBE1CDDEECB3B0EA227A27F61ED6FCA9E9F2D3696FA672026FA2A324CD21EBF5D01AB1D446AE5BD53E1292B3DE19D
3,506,561 UART: [art] SIG.R = 4424A9D14014E56C824227B56356FAD4320C6BDE3E37447BCA86C408FB5CB6A261692B319CA3F2098C97046AC06E112D
3,513,319 UART: [art] SIG.S = E0C6E0D9A9EAE2A90A8B6021E250F371CD5EB7C6657C5C50A8BA2BE6CB62D6368F869B6DA78BCA4854F311AE327E2102
3,537,681 UART: Caliptra RT
3,537,932 UART: [state] CFI Enabled
3,657,560 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,882 UART: [rt]cmd =0x44504543, len=136
3,752,336 >>> mbox cmd response data (136 bytes)
3,752,337 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,268 UART: [rt]cmd =0x44504543, len=92
3,966,471 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,575 ready_for_fw is high
1,362,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,574 >>> mbox cmd response: success
2,981,574 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,043,453 UART:
3,043,469 UART: Running Caliptra FMC ...
3,043,877 UART:
3,043,931 UART: [state] CFI Enabled
3,054,309 UART: [fht] FMC Alias Private Key: 7
3,173,361 UART: [art] Extend RT PCRs Done
3,173,789 UART: [art] Lock RT PCRs Done
3,175,143 UART: [art] Populate DV Done
3,183,404 UART: [fht] FMC Alias Private Key: 7
3,184,334 UART: [art] Derive CDI
3,184,614 UART: [art] Store in slot 0x4
3,270,198 UART: [art] Derive Key Pair
3,270,558 UART: [art] Store priv key in slot 0x5
3,283,833 UART: [art] Derive Key Pair - Done
3,298,797 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,855 UART: [art] PUB.X = 7A1CAC2FA2AA00205FC7147889E6980DB3D0D1971629A0C7477783A2194AE96A04C3123E8AE1B5EEF0E089889B88F27C
3,321,601 UART: [art] PUB.Y = F4AD927C5CD891CF459F4CA2A3225F831D61A25B0D5D8351AFE75A7832AF9A35CA0AE8493A507343287BA4ED43EB55C3
3,328,557 UART: [art] SIG.R = 597C97F62FF1515A7EA53ABB01C6E41334888D9832F7024FDD8F6612BD0F72EB59E7E3DC659D28011261FD157A8242C9
3,335,317 UART: [art] SIG.S = 05CAC978F8C84FD0EDBBD05876DA949C0173D226E3DC92A2C81D9FE662B0EBD5E72797A208AE46C05E24F7EDDFF99797
3,358,638 UART: Caliptra RT
3,358,889 UART: [state] CFI Enabled
3,479,114 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,402 UART: [rt]cmd =0x44504543, len=136
3,573,894 >>> mbox cmd response data (136 bytes)
3,573,895 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,776 UART: [rt]cmd =0x44504543, len=92
3,787,505 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,030 UART: [kat] SHA2-256
881,961 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,076 UART: [kat] ++
886,228 UART: [kat] sha1
890,330 UART: [kat] SHA2-256
892,268 UART: [kat] SHA2-384
894,855 UART: [kat] SHA2-512-ACC
896,756 UART: [kat] ECC-384
902,507 UART: [kat] HMAC-384Kdf
907,045 UART: [kat] LMS
1,475,241 UART: [kat] --
1,476,098 UART: [cold-reset] ++
1,476,474 UART: [fht] Storing FHT @ 0x50003400
1,479,379 UART: [idev] ++
1,479,547 UART: [idev] CDI.KEYID = 6
1,479,907 UART: [idev] SUBJECT.KEYID = 7
1,480,331 UART: [idev] UDS.KEYID = 0
1,480,676 ready_for_fw is high
1,480,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,137 UART: [idev] Erasing UDS.KEYID = 0
1,504,345 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,785 UART: [idev] --
1,513,680 UART: [ldev] ++
1,513,848 UART: [ldev] CDI.KEYID = 6
1,514,211 UART: [ldev] SUBJECT.KEYID = 5
1,514,637 UART: [ldev] AUTHORITY.KEYID = 7
1,515,100 UART: [ldev] FE.KEYID = 1
1,520,456 UART: [ldev] Erasing FE.KEYID = 1
1,546,755 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,395 UART: [ldev] --
1,585,694 UART: [fwproc] Waiting for Commands...
1,586,561 UART: [fwproc] Received command 0x46574c44
1,587,352 UART: [fwproc] Received Image of size 118548 bytes
2,932,732 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,302 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,811 >>> mbox cmd response: success
3,131,811 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,133,061 UART: [afmc] ++
3,133,229 UART: [afmc] CDI.KEYID = 6
3,133,591 UART: [afmc] SUBJECT.KEYID = 7
3,134,016 UART: [afmc] AUTHORITY.KEYID = 5
3,168,853 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,415 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,195 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,904 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,787 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,470 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,130 UART: [afmc] --
3,212,224 UART: [cold-reset] --
3,213,320 UART: [state] Locking Datavault
3,214,471 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,075 UART: [state] Locking ICCM
3,215,745 UART: [exit] Launching FMC @ 0x40000130
3,221,075 UART:
3,221,091 UART: Running Caliptra FMC ...
3,221,499 UART:
3,221,642 UART: [state] CFI Enabled
3,232,330 UART: [fht] FMC Alias Private Key: 7
3,351,488 UART: [art] Extend RT PCRs Done
3,351,916 UART: [art] Lock RT PCRs Done
3,353,320 UART: [art] Populate DV Done
3,361,725 UART: [fht] FMC Alias Private Key: 7
3,362,885 UART: [art] Derive CDI
3,363,165 UART: [art] Store in slot 0x4
3,449,121 UART: [art] Derive Key Pair
3,449,481 UART: [art] Store priv key in slot 0x5
3,463,188 UART: [art] Derive Key Pair - Done
3,478,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,358 UART: [art] PUB.X = C6164F482809A705C643883BBB3F10662E19D3AB0344A6136C346DD3D50485067A7664C8149711ADD81B344A449DF870
3,501,103 UART: [art] PUB.Y = 8D406084ABCF60E950E15195CA7C53D7FB33A22CD3523D25ED24322C81D6DAA911AD32BE79371595781463431F6EA50D
3,508,052 UART: [art] SIG.R = 40F9D7C15FEDF535511758AB485D436E7D86D4D461AEEE19EFDE1A694F141FED929A429645840E311919A76DAECE3E3D
3,514,831 UART: [art] SIG.S = ECA44E95A165E378CD6AEF03D96CAE9717FE44FA0AF0938178CBCAFA23EA2E706DEF7D201F936E7B0172742DA0FB6E9F
3,539,122 UART: Caliptra RT
3,539,465 UART: [state] CFI Enabled
3,658,723 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,873 UART: [rt]cmd =0x44504543, len=136
3,753,465 >>> mbox cmd response data (136 bytes)
3,753,466 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,499 UART: [rt]cmd =0x44504543, len=92
3,967,949 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,706 ready_for_fw is high
1,362,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,667 >>> mbox cmd response: success
2,980,667 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,042,564 UART:
3,042,580 UART: Running Caliptra FMC ...
3,042,988 UART:
3,043,131 UART: [state] CFI Enabled
3,053,949 UART: [fht] FMC Alias Private Key: 7
3,173,277 UART: [art] Extend RT PCRs Done
3,173,705 UART: [art] Lock RT PCRs Done
3,175,223 UART: [art] Populate DV Done
3,183,624 UART: [fht] FMC Alias Private Key: 7
3,184,628 UART: [art] Derive CDI
3,184,908 UART: [art] Store in slot 0x4
3,270,742 UART: [art] Derive Key Pair
3,271,102 UART: [art] Store priv key in slot 0x5
3,284,897 UART: [art] Derive Key Pair - Done
3,299,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,190 UART: [art] PUB.X = 3EAAFE681BD7AB2882FFD6849A0C19134883945306FED9745AEA20AA0ED6B00B0B380F945C47D2A323E9D4927F6DC4FE
3,322,956 UART: [art] PUB.Y = AB2CC2027AE81BB8E132E55665B9C67E79C10324A7F03F806F558FBF0D8527D0ED1DFB792959BD710C87682237AC211C
3,329,900 UART: [art] SIG.R = E9810B6D399712E9FF9011CCF0F3B4C3BECB998B0A5C8A02519A49AF94020DA920D892501311397014556603F6C453F5
3,336,648 UART: [art] SIG.S = 919CCE4E38ED63C345D9F29E9FAB6E0208A0B881D812F626EE456F3D879998B8E903A3DA9CBB121C185C40CE8333B485
3,360,597 UART: Caliptra RT
3,360,940 UART: [state] CFI Enabled
3,481,555 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,869 UART: [rt]cmd =0x44504543, len=136
3,576,685 >>> mbox cmd response data (136 bytes)
3,576,686 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,731 UART: [rt]cmd =0x44504543, len=92
3,791,669 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,037 UART: [kat] HMAC-384Kdf
920,553 UART: [kat] LMS
1,168,865 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,330 UART: [fht] FHT @ 0x50003400
1,172,946 UART: [idev] ++
1,173,114 UART: [idev] CDI.KEYID = 6
1,173,475 UART: [idev] SUBJECT.KEYID = 7
1,173,900 UART: [idev] UDS.KEYID = 0
1,174,246 ready_for_fw is high
1,174,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,767 UART: [idev] Erasing UDS.KEYID = 0
1,198,507 UART: [idev] Sha1 KeyId Algorithm
1,207,157 UART: [idev] --
1,208,116 UART: [ldev] ++
1,208,284 UART: [ldev] CDI.KEYID = 6
1,208,648 UART: [ldev] SUBJECT.KEYID = 5
1,209,075 UART: [ldev] AUTHORITY.KEYID = 7
1,209,538 UART: [ldev] FE.KEYID = 1
1,214,768 UART: [ldev] Erasing FE.KEYID = 1
1,241,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,170 UART: [ldev] --
1,280,509 UART: [fwproc] Wait for Commands...
1,281,104 UART: [fwproc] Recv command 0x46574c44
1,281,837 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,637 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,812 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,191 >>> mbox cmd response: success
2,825,191 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,826,377 UART: [afmc] ++
2,826,545 UART: [afmc] CDI.KEYID = 6
2,826,908 UART: [afmc] SUBJECT.KEYID = 7
2,827,334 UART: [afmc] AUTHORITY.KEYID = 5
2,862,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,721 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,431 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,312 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,013 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,926 UART: [afmc] --
2,905,743 UART: [cold-reset] --
2,906,417 UART: [state] Locking Datavault
2,907,412 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,016 UART: [state] Locking ICCM
2,908,596 UART: [exit] Launching FMC @ 0x40000130
2,913,926 UART:
2,913,942 UART: Running Caliptra FMC ...
2,914,350 UART:
2,914,404 UART: [state] CFI Enabled
2,925,176 UART: [fht] FMC Alias Private Key: 7
3,044,570 UART: [art] Extend RT PCRs Done
3,044,998 UART: [art] Lock RT PCRs Done
3,046,360 UART: [art] Populate DV Done
3,054,623 UART: [fht] FMC Alias Private Key: 7
3,055,681 UART: [art] Derive CDI
3,055,961 UART: [art] Store in slot 0x4
3,141,572 UART: [art] Derive Key Pair
3,141,932 UART: [art] Store priv key in slot 0x5
3,155,184 UART: [art] Derive Key Pair - Done
3,169,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,624 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,389 UART: [art] PUB.X = 9288966C5D38176E86A3796F54A1340A817AD083FFC84DE08F190E5A1704F82A79BEE2925B9AC256CD25B16ECFA619D6
3,193,154 UART: [art] PUB.Y = 88CEF48582A2F6E916D4EBC727EF5B3147166E64E1F203F5FA78DAB4F78D3F9BA45A35D6ABEA0D1F9CB6AED7F7496773
3,200,118 UART: [art] SIG.R = 5538829DA0AB870AD0B706D2CE19979372C4FA04021DC937954776F167CB68AE58097A05E01B7FE1AAF323EA175D159D
3,206,872 UART: [art] SIG.S = F9B51D44D9A8C1EE28D884FE19E640648D99469F3FCFA0D867B121E0D99BF1EE4306BB770556B2E7133C42BD9BF213BC
3,230,722 UART: Caliptra RT
3,230,973 UART: [state] CFI Enabled
3,350,752 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,078 UART: [rt]cmd =0x44504543, len=136
3,446,016 >>> mbox cmd response data (136 bytes)
3,446,017 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,018 UART: [rt]cmd =0x44504543, len=92
3,659,767 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,530 ready_for_fw is high
1,059,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,638 >>> mbox cmd response: success
2,679,638 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,741,865 UART:
2,741,881 UART: Running Caliptra FMC ...
2,742,289 UART:
2,742,343 UART: [state] CFI Enabled
2,752,573 UART: [fht] FMC Alias Private Key: 7
2,871,687 UART: [art] Extend RT PCRs Done
2,872,115 UART: [art] Lock RT PCRs Done
2,873,511 UART: [art] Populate DV Done
2,881,686 UART: [fht] FMC Alias Private Key: 7
2,882,798 UART: [art] Derive CDI
2,883,078 UART: [art] Store in slot 0x4
2,968,311 UART: [art] Derive Key Pair
2,968,671 UART: [art] Store priv key in slot 0x5
2,981,799 UART: [art] Derive Key Pair - Done
2,996,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,514 UART: [art] PUB.X = E9CFB27A231FD66F51A274CCFD41B32FE99A63200C04CDB4EF7A71D61B1DF0FA5CE569C938C0C12EE482628B2923CE0E
3,019,295 UART: [art] PUB.Y = 21A6C154C034A89165F67EFF7DABEF9883C535F0FF43004E1B04D8F24C272575210078CD139C30A55FE6146FC070E5D8
3,026,200 UART: [art] SIG.R = A9B2C508B84094187D73AD4FD98D07F386B14CD0E8B7CA42D3C218B94AC89C3E4EAB849432BEABC187C32EAF845EEB7B
3,032,984 UART: [art] SIG.S = A0F289F74174AC68E52DA7A80575629798C3D7C38D23802099B6578FF4F173A4DD51DC27ECC7F5C0B83C1ADFA426CB1C
3,057,253 UART: Caliptra RT
3,057,504 UART: [state] CFI Enabled
3,175,804 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,424 UART: [rt]cmd =0x44504543, len=136
3,270,890 >>> mbox cmd response data (136 bytes)
3,270,891 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,152 UART: [rt]cmd =0x44504543, len=92
3,485,272 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,273 UART: [kat] SHA2-256
891,823 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,927 UART: [kat] ++
896,079 UART: [kat] sha1
900,363 UART: [kat] SHA2-256
902,303 UART: [kat] SHA2-384
905,140 UART: [kat] SHA2-512-ACC
907,041 UART: [kat] ECC-384
917,312 UART: [kat] HMAC-384Kdf
921,996 UART: [kat] LMS
1,170,308 UART: [kat] --
1,171,223 UART: [cold-reset] ++
1,171,621 UART: [fht] FHT @ 0x50003400
1,174,455 UART: [idev] ++
1,174,623 UART: [idev] CDI.KEYID = 6
1,174,984 UART: [idev] SUBJECT.KEYID = 7
1,175,409 UART: [idev] UDS.KEYID = 0
1,175,755 ready_for_fw is high
1,175,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,266 UART: [idev] Erasing UDS.KEYID = 0
1,200,546 UART: [idev] Sha1 KeyId Algorithm
1,209,366 UART: [idev] --
1,210,389 UART: [ldev] ++
1,210,557 UART: [ldev] CDI.KEYID = 6
1,210,921 UART: [ldev] SUBJECT.KEYID = 5
1,211,348 UART: [ldev] AUTHORITY.KEYID = 7
1,211,811 UART: [ldev] FE.KEYID = 1
1,217,009 UART: [ldev] Erasing FE.KEYID = 1
1,243,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,895 UART: [ldev] --
1,282,290 UART: [fwproc] Wait for Commands...
1,283,087 UART: [fwproc] Recv command 0x46574c44
1,283,820 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,994 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,169 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,446 >>> mbox cmd response: success
2,827,446 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,828,472 UART: [afmc] ++
2,828,640 UART: [afmc] CDI.KEYID = 6
2,829,003 UART: [afmc] SUBJECT.KEYID = 7
2,829,429 UART: [afmc] AUTHORITY.KEYID = 5
2,865,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,618 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,328 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,209 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,910 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,845 UART: [afmc] --
2,908,724 UART: [cold-reset] --
2,909,458 UART: [state] Locking Datavault
2,910,605 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,209 UART: [state] Locking ICCM
2,911,855 UART: [exit] Launching FMC @ 0x40000130
2,917,185 UART:
2,917,201 UART: Running Caliptra FMC ...
2,917,609 UART:
2,917,752 UART: [state] CFI Enabled
2,928,446 UART: [fht] FMC Alias Private Key: 7
3,047,630 UART: [art] Extend RT PCRs Done
3,048,058 UART: [art] Lock RT PCRs Done
3,049,692 UART: [art] Populate DV Done
3,058,069 UART: [fht] FMC Alias Private Key: 7
3,059,075 UART: [art] Derive CDI
3,059,355 UART: [art] Store in slot 0x4
3,145,586 UART: [art] Derive Key Pair
3,145,946 UART: [art] Store priv key in slot 0x5
3,158,908 UART: [art] Derive Key Pair - Done
3,173,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,831 UART: [art] PUB.X = F6B41FE19EC383ADD80D5CCC7ABB6BAAC81D798494C46395870CDCDDD1050E58F81BC28C318956B8915E42D174552FC0
3,196,603 UART: [art] PUB.Y = 9A03016292DCEF80C5CDCD4CFD8823C8193A321AC3577B3DE9A9BC47BBD9F24FCCAACB2F86820FAD0C3C16467FB83400
3,203,541 UART: [art] SIG.R = 37B3A5933D4CDE8EB7E8CCB9642C191688A0C39ACC7CE20ACE1C7AF113040D2C411F0A080D47F23D0D3C12EA165B8324
3,210,304 UART: [art] SIG.S = EDA300A4F5B2ABADB188993BF06A41271C15C815AD425CEDF8DE2B4D40FC8B1831A3AB2631503B9654080A7A5BF28E07
3,234,197 UART: Caliptra RT
3,234,540 UART: [state] CFI Enabled
3,355,239 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,889 UART: [rt]cmd =0x44504543, len=136
3,451,743 >>> mbox cmd response data (136 bytes)
3,451,744 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,481,603 UART: [rt]cmd =0x44504543, len=92
3,665,560 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,779 ready_for_fw is high
1,059,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,849 >>> mbox cmd response: success
2,679,849 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,741,914 UART:
2,741,930 UART: Running Caliptra FMC ...
2,742,338 UART:
2,742,481 UART: [state] CFI Enabled
2,752,959 UART: [fht] FMC Alias Private Key: 7
2,871,625 UART: [art] Extend RT PCRs Done
2,872,053 UART: [art] Lock RT PCRs Done
2,873,885 UART: [art] Populate DV Done
2,882,058 UART: [fht] FMC Alias Private Key: 7
2,883,026 UART: [art] Derive CDI
2,883,306 UART: [art] Store in slot 0x4
2,969,005 UART: [art] Derive Key Pair
2,969,365 UART: [art] Store priv key in slot 0x5
2,982,857 UART: [art] Derive Key Pair - Done
2,997,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,912 UART: [art] PUB.X = A17A35ECB50198BB41107AB543A0ADF92BCC44B87D0C1F8B4253964ED465795536A50728DF812141B4B1454B173BEF5A
3,020,677 UART: [art] PUB.Y = B4673CB7B36F56BF07DC8BBD4E25C2710C999BCD457B3852172AFA353E5457E38DA951EFCF29AE68F3FD51E885297F1B
3,027,635 UART: [art] SIG.R = 69B8A29D1BB177CBA8BD510944851B5339981F4DE6437AA48CCA25C1232E4B0E1D1A2B34E7ECB514674A9B16FEB6FC75
3,034,411 UART: [art] SIG.S = ED1FCF65AF7B38C497246573F197E41F8FFE0233564021421FD4D286BC90B9E093986472D6A0614C9758F6698AFE9A1A
3,058,414 UART: Caliptra RT
3,058,757 UART: [state] CFI Enabled
3,178,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,314 UART: [rt]cmd =0x44504543, len=136
3,274,136 >>> mbox cmd response data (136 bytes)
3,274,137 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,128 UART: [rt]cmd =0x44504543, len=92
3,489,257 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
893,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,341 UART: [kat] ++
897,493 UART: [kat] sha1
901,927 UART: [kat] SHA2-256
903,867 UART: [kat] SHA2-384
906,454 UART: [kat] SHA2-512-ACC
908,355 UART: [kat] ECC-384
917,842 UART: [kat] HMAC-384Kdf
922,604 UART: [kat] LMS
1,170,932 UART: [kat] --
1,171,995 UART: [cold-reset] ++
1,172,465 UART: [fht] FHT @ 0x50003400
1,175,198 UART: [idev] ++
1,175,366 UART: [idev] CDI.KEYID = 6
1,175,726 UART: [idev] SUBJECT.KEYID = 7
1,176,150 UART: [idev] UDS.KEYID = 0
1,176,495 ready_for_fw is high
1,176,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,772 UART: [idev] Erasing UDS.KEYID = 0
1,200,255 UART: [idev] Sha1 KeyId Algorithm
1,208,709 UART: [idev] --
1,209,867 UART: [ldev] ++
1,210,035 UART: [ldev] CDI.KEYID = 6
1,210,398 UART: [ldev] SUBJECT.KEYID = 5
1,210,824 UART: [ldev] AUTHORITY.KEYID = 7
1,211,287 UART: [ldev] FE.KEYID = 1
1,216,129 UART: [ldev] Erasing FE.KEYID = 1
1,242,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,925 UART: [ldev] --
1,282,186 UART: [fwproc] Wait for Commands...
1,282,756 UART: [fwproc] Recv command 0x46574c44
1,283,484 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,856 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,026 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,285 >>> mbox cmd response: success
2,827,285 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,828,507 UART: [afmc] ++
2,828,675 UART: [afmc] CDI.KEYID = 6
2,829,037 UART: [afmc] SUBJECT.KEYID = 7
2,829,462 UART: [afmc] AUTHORITY.KEYID = 5
2,865,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,858 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,567 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,450 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,151 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,911 UART: [afmc] --
2,908,965 UART: [cold-reset] --
2,910,061 UART: [state] Locking Datavault
2,911,648 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,252 UART: [state] Locking ICCM
2,912,734 UART: [exit] Launching FMC @ 0x40000130
2,918,064 UART:
2,918,080 UART: Running Caliptra FMC ...
2,918,488 UART:
2,918,542 UART: [state] CFI Enabled
2,929,232 UART: [fht] FMC Alias Private Key: 7
3,048,696 UART: [art] Extend RT PCRs Done
3,049,124 UART: [art] Lock RT PCRs Done
3,050,506 UART: [art] Populate DV Done
3,058,669 UART: [fht] FMC Alias Private Key: 7
3,059,709 UART: [art] Derive CDI
3,059,989 UART: [art] Store in slot 0x4
3,145,656 UART: [art] Derive Key Pair
3,146,016 UART: [art] Store priv key in slot 0x5
3,159,604 UART: [art] Derive Key Pair - Done
3,174,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,190 UART: [art] PUB.X = C771CF21BE6CD444DA8C4D0BD6D93713E8005207F80448F581E9DE2A6AE6F5CB200098FC5F03813CCEFCB6E70992E5A2
3,196,915 UART: [art] PUB.Y = 28135BAA8B59C826F876098770E25AD5F5AE4E03E5A5153C8A09E1B7E73553274162670B1BB7546B626DD3004A6BE5AD
3,203,831 UART: [art] SIG.R = AADF3355374C2173283AE8387C4FF71BA5E3BFC6EAA8ADFBE3CD227F5EDFDE78A1D741BC63E8B2785F84D8107642D7F2
3,210,623 UART: [art] SIG.S = F1CF4BB4AEC5D343A82B640BA5030D147691B674FFDB886275E08AACCAD5EC2E17CEC9E3D1AABF06575585D0B655DEB5
3,234,851 UART: Caliptra RT
3,235,102 UART: [state] CFI Enabled
3,354,562 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,988 UART: [rt]cmd =0x44504543, len=136
3,450,258 >>> mbox cmd response data (136 bytes)
3,450,259 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,264 UART: [rt]cmd =0x44504543, len=92
3,664,046 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,075 ready_for_fw is high
1,061,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,176 >>> mbox cmd response: success
2,681,176 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,743,555 UART:
2,743,571 UART: Running Caliptra FMC ...
2,743,979 UART:
2,744,033 UART: [state] CFI Enabled
2,754,213 UART: [fht] FMC Alias Private Key: 7
2,872,913 UART: [art] Extend RT PCRs Done
2,873,341 UART: [art] Lock RT PCRs Done
2,874,797 UART: [art] Populate DV Done
2,883,124 UART: [fht] FMC Alias Private Key: 7
2,884,228 UART: [art] Derive CDI
2,884,508 UART: [art] Store in slot 0x4
2,969,773 UART: [art] Derive Key Pair
2,970,133 UART: [art] Store priv key in slot 0x5
2,983,171 UART: [art] Derive Key Pair - Done
2,997,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,355 UART: [art] PUB.X = 88954B06BE9CE7C4426C90DE1583D537B8C87115DD5F9804E2FBD65194D93405D5F043EF93230301FC41CDF700FDF7C3
3,021,092 UART: [art] PUB.Y = 8ADE10CD36867544056181E707EF715D8092100BCDA2E9D4394A3211CF950181D74D047BD1BF4A889D972D4FA0CD1E50
3,028,029 UART: [art] SIG.R = FF8EFC6AC808AED1A60A2F8FEB9E6C847E3A749E9FD31EB0CF5C47BB420F9C22D84C43070D36DC4BE4CC43B78CF58B08
3,034,809 UART: [art] SIG.S = 0ED794274F16C635C4FDD8F723423037BF5BA170D6743F8DDF63CC10A42A4FE23FA1B72D249097CF54FA044068C0C378
3,058,411 UART: Caliptra RT
3,058,662 UART: [state] CFI Enabled
3,177,745 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,037 UART: [rt]cmd =0x44504543, len=136
3,273,273 >>> mbox cmd response data (136 bytes)
3,273,274 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,317 UART: [rt]cmd =0x44504543, len=92
3,488,130 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
893,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,528 UART: [kat] ++
897,680 UART: [kat] sha1
902,040 UART: [kat] SHA2-256
903,980 UART: [kat] SHA2-384
906,729 UART: [kat] SHA2-512-ACC
908,630 UART: [kat] ECC-384
918,487 UART: [kat] HMAC-384Kdf
922,991 UART: [kat] LMS
1,171,319 UART: [kat] --
1,172,298 UART: [cold-reset] ++
1,172,814 UART: [fht] FHT @ 0x50003400
1,175,445 UART: [idev] ++
1,175,613 UART: [idev] CDI.KEYID = 6
1,175,973 UART: [idev] SUBJECT.KEYID = 7
1,176,397 UART: [idev] UDS.KEYID = 0
1,176,742 ready_for_fw is high
1,176,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,479 UART: [idev] Erasing UDS.KEYID = 0
1,202,086 UART: [idev] Sha1 KeyId Algorithm
1,210,564 UART: [idev] --
1,211,780 UART: [ldev] ++
1,211,948 UART: [ldev] CDI.KEYID = 6
1,212,311 UART: [ldev] SUBJECT.KEYID = 5
1,212,737 UART: [ldev] AUTHORITY.KEYID = 7
1,213,200 UART: [ldev] FE.KEYID = 1
1,218,382 UART: [ldev] Erasing FE.KEYID = 1
1,244,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,028 UART: [ldev] --
1,284,463 UART: [fwproc] Wait for Commands...
1,285,095 UART: [fwproc] Recv command 0x46574c44
1,285,823 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,583 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,753 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,006 >>> mbox cmd response: success
2,829,006 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,830,128 UART: [afmc] ++
2,830,296 UART: [afmc] CDI.KEYID = 6
2,830,658 UART: [afmc] SUBJECT.KEYID = 7
2,831,083 UART: [afmc] AUTHORITY.KEYID = 5
2,867,122 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,117 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,826 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,709 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,410 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,302 UART: [afmc] --
2,910,200 UART: [cold-reset] --
2,910,862 UART: [state] Locking Datavault
2,912,023 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,627 UART: [state] Locking ICCM
2,913,147 UART: [exit] Launching FMC @ 0x40000130
2,918,477 UART:
2,918,493 UART: Running Caliptra FMC ...
2,918,901 UART:
2,919,044 UART: [state] CFI Enabled
2,929,766 UART: [fht] FMC Alias Private Key: 7
3,049,078 UART: [art] Extend RT PCRs Done
3,049,506 UART: [art] Lock RT PCRs Done
3,051,120 UART: [art] Populate DV Done
3,059,619 UART: [fht] FMC Alias Private Key: 7
3,060,557 UART: [art] Derive CDI
3,060,837 UART: [art] Store in slot 0x4
3,146,382 UART: [art] Derive Key Pair
3,146,742 UART: [art] Store priv key in slot 0x5
3,160,376 UART: [art] Derive Key Pair - Done
3,175,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,459 UART: [art] PUB.X = AF572A0A2FA0958B3FE0F88552C932BE880526D2573C8CB13304E880854CDE7D2505F666D6DD80DB35F7A9215F66F2E4
3,198,221 UART: [art] PUB.Y = 9A7522C1FFAD588CE7C4CC3B8755179973EE601C1E84AD318F19EB646BF21A3B589E7D8FA773630F9D671A54C34B4571
3,205,174 UART: [art] SIG.R = C699417462B32B7CF32B81B2AB1D1B64552730EC11E1BAEC503EF377984729CC4DDF40086BD8F680D5F5192C9271C88C
3,211,945 UART: [art] SIG.S = 6AF2F3E10C21E4AECE3F3169B2F9D74E270A33B9B7479B6C53A7DC1D68CE835817651CF5F1454F7CEA2049C1ED11E60E
3,235,844 UART: Caliptra RT
3,236,187 UART: [state] CFI Enabled
3,356,128 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,192 UART: [rt]cmd =0x44504543, len=136
3,450,582 >>> mbox cmd response data (136 bytes)
3,450,583 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,516 UART: [rt]cmd =0x44504543, len=92
3,664,899 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,868 ready_for_fw is high
1,060,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,993 >>> mbox cmd response: success
2,679,993 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,742,442 UART:
2,742,458 UART: Running Caliptra FMC ...
2,742,866 UART:
2,743,009 UART: [state] CFI Enabled
2,753,793 UART: [fht] FMC Alias Private Key: 7
2,872,885 UART: [art] Extend RT PCRs Done
2,873,313 UART: [art] Lock RT PCRs Done
2,875,067 UART: [art] Populate DV Done
2,883,328 UART: [fht] FMC Alias Private Key: 7
2,884,322 UART: [art] Derive CDI
2,884,602 UART: [art] Store in slot 0x4
2,970,239 UART: [art] Derive Key Pair
2,970,599 UART: [art] Store priv key in slot 0x5
2,984,183 UART: [art] Derive Key Pair - Done
2,999,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,519 UART: [art] PUB.X = 681D414E85B2684C0AF26C48DCFFBAAF687135FC733979D6C82B62501145D310754DD6D8429A5B4AE5B83A21E8366816
3,022,286 UART: [art] PUB.Y = 475897E62A3ECBB923BF60C75E2893C44550F042E6FB142822CFDA4778D87CCECD330F0DCFCFF2BDA667379D036DC509
3,029,238 UART: [art] SIG.R = AE3FB67ACFAE13815683D571A5DEBD2A0B71C8F7240BEA783841504E9578DE4154EF29D31011EA25371CAC7BB594EFA8
3,036,016 UART: [art] SIG.S = 583EA9824F5DDF2EDBD52B7E735914C6D8F95B3A861BB427E807935B99523F2BE75E9D5A835E1491BC621F1A1DF36359
3,060,135 UART: Caliptra RT
3,060,478 UART: [state] CFI Enabled
3,180,935 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,405 UART: [rt]cmd =0x44504543, len=136
3,276,825 >>> mbox cmd response data (136 bytes)
3,276,826 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,851 UART: [rt]cmd =0x44504543, len=92
3,491,440 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
191,997 UART:
192,367 UART: Running Caliptra ROM ...
193,519 UART:
193,669 UART: [state] CFI Enabled
262,125 UART: [state] LifecycleState = Unprovisioned
264,087 UART: [state] DebugLocked = No
266,117 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,638 UART: [kat] SHA2-256
440,309 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,847 UART: [kat] ++
451,293 UART: [kat] sha1
463,086 UART: [kat] SHA2-256
465,824 UART: [kat] SHA2-384
470,753 UART: [kat] SHA2-512-ACC
473,120 UART: [kat] ECC-384
2,767,089 UART: [kat] HMAC-384Kdf
2,799,459 UART: [kat] LMS
3,989,804 UART: [kat] --
3,993,556 UART: [cold-reset] ++
3,994,926 UART: [fht] Storing FHT @ 0x50003400
4,006,545 UART: [idev] ++
4,007,139 UART: [idev] CDI.KEYID = 6
4,008,109 UART: [idev] SUBJECT.KEYID = 7
4,009,285 UART: [idev] UDS.KEYID = 0
4,010,377 ready_for_fw is high
4,010,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,800 UART: [idev] Erasing UDS.KEYID = 0
7,346,739 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,119 UART: [idev] --
7,371,842 UART: [ldev] ++
7,372,465 UART: [ldev] CDI.KEYID = 6
7,373,379 UART: [ldev] SUBJECT.KEYID = 5
7,374,591 UART: [ldev] AUTHORITY.KEYID = 7
7,375,882 UART: [ldev] FE.KEYID = 1
7,423,697 UART: [ldev] Erasing FE.KEYID = 1
10,755,322 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,071 UART: [ldev] --
13,118,228 UART: [fwproc] Waiting for Commands...
13,120,486 UART: [fwproc] Received command 0x46574c44
13,122,734 UART: [fwproc] Received Image of size 118548 bytes
17,227,591 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,308,104 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,287 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,708,961 >>> mbox cmd response: success
17,713,206 UART: [afmc] ++
17,713,825 UART: [afmc] CDI.KEYID = 6
17,714,737 UART: [afmc] SUBJECT.KEYID = 7
17,715,957 UART: [afmc] AUTHORITY.KEYID = 5
21,074,040 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,024 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,250 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,723 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,441 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,826 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,438,830 UART: [afmc] --
23,442,038 UART: [cold-reset] --
23,446,223 UART: [state] Locking Datavault
23,450,064 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,817 UART: [state] Locking ICCM
23,454,592 UART: [exit] Launching FMC @ 0x40000130
23,462,982 UART:
23,463,227 UART: Running Caliptra FMC ...
23,464,324 UART:
23,464,481 UART: [state] CFI Enabled
23,530,467 UART: [fht] FMC Alias Private Key: 7
25,871,502 UART: [art] Extend RT PCRs Done
25,872,732 UART: [art] Lock RT PCRs Done
25,873,950 UART: [art] Populate DV Done
25,879,144 UART: [fht] FMC Alias Private Key: 7
25,880,730 UART: [art] Derive CDI
25,881,469 UART: [art] Store in slot 0x4
25,938,717 UART: [art] Derive Key Pair
25,939,712 UART: [art] Store priv key in slot 0x5
29,232,679 UART: [art] Derive Key Pair - Done
29,245,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,522 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,036 UART: [art] PUB.X = 74E4CB497E5C57EEC968F7418058D06C23532A8CF763E9BFEC64A426A5EBAFAA9A5EC6B74800D56B19B75505D65173B1
31,542,249 UART: [art] PUB.Y = ABC37F68D6686AAC977AF5E3AC13E02901F5E90E92AE58B25A45E66FB9372E11BD270DFE66620F97343F4A3327EFFC7A
31,549,526 UART: [art] SIG.R = 26C565EA7E0DDDF85005F07DED6501113AB3D4FD5A2023370F1E67B3DA08F1627C6A7C22FE514E4A4EDCE5F319442D59
31,556,957 UART: [art] SIG.S = 1CCB29206A8E9DB37441292224DFA0379D34E9B200052467921AFC0DBB9714A19E0CD6CD5DA97B5F3E6710A266DD947C
32,861,865 UART: Caliptra RT
32,862,598 UART: [state] CFI Enabled
33,038,787 UART: [rt] RT listening for mailbox commands...
33,042,720 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,087,075 UART: [rt]cmd =0x4c4d5356, len=1672
34,299,234 >>> mbox cmd response data (8 bytes)
34,301,733 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,346,172 UART: [rt]cmd =0x4c4d5356, len=1672
35,116,989 >>> mbox cmd response data (8 bytes)
35,150,610 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,195,443 UART: [rt]cmd =0x4c4d5356, len=1672
35,940,067 >>> mbox cmd response data (8 bytes)
35,942,584 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,986,972 UART: [rt]cmd =0x4c4d5356, len=1672
36,757,618 >>> mbox cmd response data (8 bytes)
36,758,907 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,803,231 UART: [rt]cmd =0x4c4d5356, len=1672
37,651,466 >>> mbox cmd response data (8 bytes)
37,652,758 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,697,084 UART: [rt]cmd =0x4c4d5356, len=1672
38,441,856 >>> mbox cmd response data (8 bytes)
38,443,141 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,487,458 UART: [rt]cmd =0x4c4d5356, len=1672
39,284,107 >>> mbox cmd response data (8 bytes)
39,285,375 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,329,688 UART: [rt]cmd =0x4c4d5356, len=1672
40,152,173 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,804,501 ready_for_fw is high
3,804,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,994,438 >>> mbox cmd response: success
23,694,559 UART:
23,694,977 UART: Running Caliptra FMC ...
23,696,093 UART:
23,696,254 UART: [state] CFI Enabled
23,762,750 UART: [fht] FMC Alias Private Key: 7
26,103,252 UART: [art] Extend RT PCRs Done
26,104,488 UART: [art] Lock RT PCRs Done
26,106,079 UART: [art] Populate DV Done
26,111,570 UART: [fht] FMC Alias Private Key: 7
26,113,113 UART: [art] Derive CDI
26,113,929 UART: [art] Store in slot 0x4
26,170,537 UART: [art] Derive Key Pair
26,171,580 UART: [art] Store priv key in slot 0x5
29,464,218 UART: [art] Derive Key Pair - Done
29,477,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,764,773 UART: [art] Erasing AUTHORITY.KEYID = 7
31,766,279 UART: [art] PUB.X = 97B12ECB6EB8E4A6F697FA40F9720524541B8ACCEB398283C9ED47EC6A45971DC16BA86CE360F732625BFF379B681849
31,773,613 UART: [art] PUB.Y = C0808C6280475F480FE5B61B6A55C743D7DA5544BE401A12BBA3B6837D9C8BD9F53421417C7D39D722C116168744CCC2
31,780,830 UART: [art] SIG.R = DFC940C4081D4040052D91DDEDA79E33E2E7D2E05C33FDC8E2D8C5FE61054102A44704E0033F6E56898F2703487E3356
31,788,181 UART: [art] SIG.S = 8C37048AEB8C56D57DA5899B8CA04CEAF615D758384D202B380CAE9E8D6F0C01CAD8C83431D5C784E6BE4E9880A21D3D
33,093,299 UART: Caliptra RT
33,094,016 UART: [state] CFI Enabled
33,270,699 UART: [rt] RT listening for mailbox commands...
33,274,680 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,319,034 UART: [rt]cmd =0x4c4d5356, len=1672
34,530,869 >>> mbox cmd response data (8 bytes)
34,533,349 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,577,678 UART: [rt]cmd =0x4c4d5356, len=1672
35,348,101 >>> mbox cmd response data (8 bytes)
35,381,796 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,426,635 UART: [rt]cmd =0x4c4d5356, len=1672
36,171,524 >>> mbox cmd response data (8 bytes)
36,174,035 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,218,416 UART: [rt]cmd =0x4c4d5356, len=1672
36,989,097 >>> mbox cmd response data (8 bytes)
36,991,165 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,035,723 UART: [rt]cmd =0x4c4d5356, len=1672
37,883,806 >>> mbox cmd response data (8 bytes)
37,885,788 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,930,157 UART: [rt]cmd =0x4c4d5356, len=1672
38,674,935 >>> mbox cmd response data (8 bytes)
38,676,222 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,720,478 UART: [rt]cmd =0x4c4d5356, len=1672
39,517,262 >>> mbox cmd response data (8 bytes)
39,518,541 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,562,757 UART: [rt]cmd =0x4c4d5356, len=1672
40,385,147 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,349 UART:
192,717 UART: Running Caliptra ROM ...
193,836 UART:
603,654 UART: [state] CFI Enabled
620,709 UART: [state] LifecycleState = Unprovisioned
622,649 UART: [state] DebugLocked = No
624,681 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,187 UART: [kat] SHA2-256
798,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,449 UART: [kat] ++
809,989 UART: [kat] sha1
820,433 UART: [kat] SHA2-256
823,157 UART: [kat] SHA2-384
829,493 UART: [kat] SHA2-512-ACC
831,856 UART: [kat] ECC-384
3,116,031 UART: [kat] HMAC-384Kdf
3,128,352 UART: [kat] LMS
4,318,467 UART: [kat] --
4,324,589 UART: [cold-reset] ++
4,326,307 UART: [fht] Storing FHT @ 0x50003400
4,338,775 UART: [idev] ++
4,339,329 UART: [idev] CDI.KEYID = 6
4,340,347 UART: [idev] SUBJECT.KEYID = 7
4,341,516 UART: [idev] UDS.KEYID = 0
4,342,504 ready_for_fw is high
4,342,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,664 UART: [idev] Erasing UDS.KEYID = 0
7,634,199 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,653 UART: [idev] --
7,658,022 UART: [ldev] ++
7,658,652 UART: [ldev] CDI.KEYID = 6
7,659,557 UART: [ldev] SUBJECT.KEYID = 5
7,660,816 UART: [ldev] AUTHORITY.KEYID = 7
7,662,038 UART: [ldev] FE.KEYID = 1
7,673,275 UART: [ldev] Erasing FE.KEYID = 1
10,962,503 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,223 UART: [ldev] --
13,320,292 UART: [fwproc] Waiting for Commands...
13,321,921 UART: [fwproc] Received command 0x46574c44
13,324,161 UART: [fwproc] Received Image of size 118548 bytes
17,427,561 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,906 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,073 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,749 >>> mbox cmd response: success
17,907,361 UART: [afmc] ++
17,908,030 UART: [afmc] CDI.KEYID = 6
17,908,932 UART: [afmc] SUBJECT.KEYID = 7
17,910,096 UART: [afmc] AUTHORITY.KEYID = 5
21,222,632 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,427 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,680 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,082 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,832 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,209 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,805 UART: [afmc] --
23,588,436 UART: [cold-reset] --
23,592,941 UART: [state] Locking Datavault
23,595,868 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,617 UART: [state] Locking ICCM
23,598,828 UART: [exit] Launching FMC @ 0x40000130
23,607,225 UART:
23,607,455 UART: Running Caliptra FMC ...
23,608,549 UART:
23,608,710 UART: [state] CFI Enabled
23,616,970 UART: [fht] FMC Alias Private Key: 7
25,957,625 UART: [art] Extend RT PCRs Done
25,958,840 UART: [art] Lock RT PCRs Done
25,960,648 UART: [art] Populate DV Done
25,966,319 UART: [fht] FMC Alias Private Key: 7
25,967,857 UART: [art] Derive CDI
25,968,604 UART: [art] Store in slot 0x4
26,010,922 UART: [art] Derive Key Pair
26,011,961 UART: [art] Store priv key in slot 0x5
29,254,218 UART: [art] Derive Key Pair - Done
29,267,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,333 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,838 UART: [art] PUB.X = F2C2F50099F08791A37330113E3EFC59E353606BA18B6B390363F3C38FFE11635B59F6C3E3B78D42DCC74840CAA63BCF
31,556,091 UART: [art] PUB.Y = C9F806292935EAA4C738ABA24FD0AA54F15A21D7EF5ADD40C8B2499B36CE03AA6990B1FDCBA7D57FD043024F8B276F69
31,563,388 UART: [art] SIG.R = BD464F9B5856C9E2289E8ACA90A862EDFE2128B191C4A23A75C32EED19175913D2964B0FDD7B5EA80D13AD0D23A4C8C9
31,570,774 UART: [art] SIG.S = 1AE52E80157DD8ADD0899981F008E2F8B3241D94E9597F23FB2D53C793ABA98BC214EB3E4AD712E62F6E4F2C2F44A679
32,876,125 UART: Caliptra RT
32,876,836 UART: [state] CFI Enabled
33,010,746 UART: [rt] RT listening for mailbox commands...
33,014,853 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,059,412 UART: [rt]cmd =0x4c4d5356, len=1672
34,271,203 >>> mbox cmd response data (8 bytes)
34,273,735 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,318,435 UART: [rt]cmd =0x4c4d5356, len=1672
35,088,985 >>> mbox cmd response data (8 bytes)
35,122,671 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,167,398 UART: [rt]cmd =0x4c4d5356, len=1672
35,912,043 >>> mbox cmd response data (8 bytes)
35,914,557 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,958,938 UART: [rt]cmd =0x4c4d5356, len=1672
36,729,591 >>> mbox cmd response data (8 bytes)
36,730,876 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,775,584 UART: [rt]cmd =0x4c4d5356, len=1672
37,623,853 >>> mbox cmd response data (8 bytes)
37,625,142 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,669,325 UART: [rt]cmd =0x4c4d5356, len=1672
38,414,278 >>> mbox cmd response data (8 bytes)
38,415,554 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,459,845 UART: [rt]cmd =0x4c4d5356, len=1672
39,256,419 >>> mbox cmd response data (8 bytes)
39,257,677 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,301,918 UART: [rt]cmd =0x4c4d5356, len=1672
40,124,164 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
4,128,430 ready_for_fw is high
4,128,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,148,237 >>> mbox cmd response: success
23,792,524 UART:
23,792,930 UART: Running Caliptra FMC ...
23,794,040 UART:
23,794,195 UART: [state] CFI Enabled
23,802,207 UART: [fht] FMC Alias Private Key: 7
26,142,508 UART: [art] Extend RT PCRs Done
26,143,746 UART: [art] Lock RT PCRs Done
26,145,186 UART: [art] Populate DV Done
26,150,610 UART: [fht] FMC Alias Private Key: 7
26,152,201 UART: [art] Derive CDI
26,153,014 UART: [art] Store in slot 0x4
26,195,879 UART: [art] Derive Key Pair
26,196,881 UART: [art] Store priv key in slot 0x5
29,438,940 UART: [art] Derive Key Pair - Done
29,451,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,518 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,050 UART: [art] PUB.X = 9D4453F913A57235C7758FDC43D7B0A063234377F414F45D91D835B48D69DD1248CD6148CF3C506BEB4ABF546F6EF84E
31,741,251 UART: [art] PUB.Y = EA5BF86D74CD6C2D32DB318E56D481FAA11E6858FE3F8F657088B6CFAF3F19986E18C6DED1523288014CC1F1AA936E33
31,748,560 UART: [art] SIG.R = 313F9BB834DC32701BC27EEDAFE7782145A6A21B2DA0417162F2E228AB7BE11DC3C2C8FDD25595A860F2DAA6C9984F3D
31,755,953 UART: [art] SIG.S = 5A9CF448F491B4B5BA78B43A4291BD2FBF5528239F2E517C85894A1E47894D2A277C98CDA7E154D2F82C0EF2A4C3EF35
33,061,256 UART: Caliptra RT
33,061,977 UART: [state] CFI Enabled
33,196,176 UART: [rt] RT listening for mailbox commands...
33,200,122 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,244,703 UART: [rt]cmd =0x4c4d5356, len=1672
34,456,486 >>> mbox cmd response data (8 bytes)
34,458,956 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,503,184 UART: [rt]cmd =0x4c4d5356, len=1672
35,273,784 >>> mbox cmd response data (8 bytes)
35,306,741 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,351,770 UART: [rt]cmd =0x4c4d5356, len=1672
36,096,469 >>> mbox cmd response data (8 bytes)
36,099,073 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,143,504 UART: [rt]cmd =0x4c4d5356, len=1672
36,913,866 >>> mbox cmd response data (8 bytes)
36,915,180 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,959,679 UART: [rt]cmd =0x4c4d5356, len=1672
37,808,151 >>> mbox cmd response data (8 bytes)
37,809,453 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,853,932 UART: [rt]cmd =0x4c4d5356, len=1672
38,598,811 >>> mbox cmd response data (8 bytes)
38,600,088 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,644,604 UART: [rt]cmd =0x4c4d5356, len=1672
39,441,195 >>> mbox cmd response data (8 bytes)
39,442,454 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,486,727 UART: [rt]cmd =0x4c4d5356, len=1672
40,309,339 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
192,214 UART:
192,564 UART: Running Caliptra ROM ...
193,761 UART:
193,912 UART: [state] CFI Enabled
264,679 UART: [state] LifecycleState = Unprovisioned
266,651 UART: [state] DebugLocked = No
269,102 UART: [state] WD Timer not started. Device not locked for debugging
272,712 UART: [kat] SHA2-256
452,399 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,148 UART: [kat] ++
463,748 UART: [kat] sha1
475,546 UART: [kat] SHA2-256
478,193 UART: [kat] SHA2-384
484,102 UART: [kat] SHA2-512-ACC
486,483 UART: [kat] ECC-384
2,946,044 UART: [kat] HMAC-384Kdf
2,970,218 UART: [kat] LMS
3,446,717 UART: [kat] --
3,450,671 UART: [cold-reset] ++
3,452,392 UART: [fht] FHT @ 0x50003400
3,463,439 UART: [idev] ++
3,463,995 UART: [idev] CDI.KEYID = 6
3,464,943 UART: [idev] SUBJECT.KEYID = 7
3,466,181 UART: [idev] UDS.KEYID = 0
3,467,073 ready_for_fw is high
3,467,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,307 UART: [idev] Erasing UDS.KEYID = 0
5,987,008 UART: [idev] Sha1 KeyId Algorithm
6,011,270 UART: [idev] --
6,016,837 UART: [ldev] ++
6,017,425 UART: [ldev] CDI.KEYID = 6
6,018,347 UART: [ldev] SUBJECT.KEYID = 5
6,019,502 UART: [ldev] AUTHORITY.KEYID = 7
6,020,787 UART: [ldev] FE.KEYID = 1
6,056,992 UART: [ldev] Erasing FE.KEYID = 1
8,563,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,110 UART: [ldev] --
10,375,217 UART: [fwproc] Wait for Commands...
10,377,759 UART: [fwproc] Recv command 0x46574c44
10,379,810 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,932,244 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,005,280 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,333,498 >>> mbox cmd response: success
14,337,220 UART: [afmc] ++
14,337,838 UART: [afmc] CDI.KEYID = 6
14,338,760 UART: [afmc] SUBJECT.KEYID = 7
14,339,975 UART: [afmc] AUTHORITY.KEYID = 5
16,871,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,746 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,968 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,615,789 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,838 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,647,397 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,672,008 UART: [afmc] --
18,675,600 UART: [cold-reset] --
18,679,508 UART: [state] Locking Datavault
18,683,027 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,797 UART: [state] Locking ICCM
18,686,622 UART: [exit] Launching FMC @ 0x40000130
18,695,029 UART:
18,695,329 UART: Running Caliptra FMC ...
18,696,441 UART:
18,696,599 UART: [state] CFI Enabled
18,753,760 UART: [fht] FMC Alias Private Key: 7
20,541,453 UART: [art] Extend RT PCRs Done
20,542,660 UART: [art] Lock RT PCRs Done
20,543,923 UART: [art] Populate DV Done
20,549,273 UART: [fht] FMC Alias Private Key: 7
20,550,749 UART: [art] Derive CDI
20,551,508 UART: [art] Store in slot 0x4
20,607,615 UART: [art] Derive Key Pair
20,608,609 UART: [art] Store priv key in slot 0x5
23,071,551 UART: [art] Derive Key Pair - Done
23,084,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,742 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,226 UART: [art] PUB.X = 4A1FBAD55BBE650A04504113A37D3CC944E80D8D79184C591314321F83F32567E431184CB7671C2FBAF4C16845CED6A0
24,806,479 UART: [art] PUB.Y = DB045AE09A4579FDCE60CF6A413EE47AE70B8F4000805273930A8ECEE8CA7256DDEE69DD99A25DFAED3300E53676D37A
24,813,714 UART: [art] SIG.R = 1467EFCC932C9C258F995181B04663724BB2E1D046FC7BEA4FAC3BDA02014E2CCBA53F4FDB0F45685F7C7ACC5DB718D6
24,821,103 UART: [art] SIG.S = F9F9F5405A2C3A608E736DCD31438E9CF1257AC970226AFBC780A35CECA467F2D5B111B425275CCF720D265B2171AF30
25,800,120 UART: Caliptra RT
25,800,832 UART: [state] CFI Enabled
25,981,517 UART: [rt] RT listening for mailbox commands...
25,985,474 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,030,092 UART: [rt]cmd =0x4c4d5356, len=1672
26,468,089 >>> mbox cmd response data (8 bytes)
26,470,578 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,515,112 UART: [rt]cmd =0x4c4d5356, len=1672
26,746,359 >>> mbox cmd response data (8 bytes)
26,748,749 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,792,882 UART: [rt]cmd =0x4c4d5356, len=1672
27,023,027 >>> mbox cmd response data (8 bytes)
27,025,423 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,070,019 UART: [rt]cmd =0x4c4d5356, len=1672
27,297,843 >>> mbox cmd response data (8 bytes)
27,299,105 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,343,750 UART: [rt]cmd =0x4c4d5356, len=1672
27,574,414 >>> mbox cmd response data (8 bytes)
27,575,678 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,619,979 UART: [rt]cmd =0x4c4d5356, len=1672
27,848,298 >>> mbox cmd response data (8 bytes)
27,849,561 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,893,944 UART: [rt]cmd =0x4c4d5356, len=1672
28,122,809 >>> mbox cmd response data (8 bytes)
28,124,054 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,168,375 UART: [rt]cmd =0x4c4d5356, len=1672
28,400,074 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,460,405 ready_for_fw is high
3,460,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,214,742 >>> mbox cmd response: success
18,491,153 UART:
18,491,526 UART: Running Caliptra FMC ...
18,492,628 UART:
18,492,775 UART: [state] CFI Enabled
18,561,779 UART: [fht] FMC Alias Private Key: 7
20,349,650 UART: [art] Extend RT PCRs Done
20,350,865 UART: [art] Lock RT PCRs Done
20,352,677 UART: [art] Populate DV Done
20,358,254 UART: [fht] FMC Alias Private Key: 7
20,359,704 UART: [art] Derive CDI
20,360,441 UART: [art] Store in slot 0x4
20,415,208 UART: [art] Derive Key Pair
20,416,247 UART: [art] Store priv key in slot 0x5
22,879,204 UART: [art] Derive Key Pair - Done
22,892,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,581 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,086 UART: [art] PUB.X = BE006543E3BD515FBB7779142DEC1909E867B0D3F4276BEACE0C2F53A51AF8A66ECB3F3DAE23C3F884A790D06EEE9C16
24,613,364 UART: [art] PUB.Y = F9DF73E8545348B8A0008648ABA34A8135E09630EF5114BF02A995657AFCC84AD573524EDE084934B24E1CF8288CAF62
24,620,574 UART: [art] SIG.R = EE0D7371B8AE38F1D73A4DC79A2C0A98F68EEB4220F2DC559E6043197AEDAB9E18F14498456A268A9DB9103B0F44F727
24,627,972 UART: [art] SIG.S = 304E048B09E3219E43E0F11EEA6012BD5D17B07DD232F51514D7E9539B4F6ACEA611296B2A8EA87C58B9450F122EFA43
25,606,809 UART: Caliptra RT
25,607,514 UART: [state] CFI Enabled
25,787,689 UART: [rt] RT listening for mailbox commands...
25,791,570 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,836,179 UART: [rt]cmd =0x4c4d5356, len=1672
26,273,834 >>> mbox cmd response data (8 bytes)
26,276,297 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,321,005 UART: [rt]cmd =0x4c4d5356, len=1672
26,552,126 >>> mbox cmd response data (8 bytes)
26,554,505 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,599,040 UART: [rt]cmd =0x4c4d5356, len=1672
26,829,540 >>> mbox cmd response data (8 bytes)
26,831,933 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,876,247 UART: [rt]cmd =0x4c4d5356, len=1672
27,103,971 >>> mbox cmd response data (8 bytes)
27,105,223 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,149,584 UART: [rt]cmd =0x4c4d5356, len=1672
27,380,710 >>> mbox cmd response data (8 bytes)
27,381,983 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,426,577 UART: [rt]cmd =0x4c4d5356, len=1672
27,655,176 >>> mbox cmd response data (8 bytes)
27,656,439 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,700,876 UART: [rt]cmd =0x4c4d5356, len=1672
27,929,530 >>> mbox cmd response data (8 bytes)
27,930,808 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,975,185 UART: [rt]cmd =0x4c4d5356, len=1672
28,206,902 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,455 UART:
192,811 UART: Running Caliptra ROM ...
194,000 UART:
603,637 UART: [state] CFI Enabled
616,901 UART: [state] LifecycleState = Unprovisioned
618,780 UART: [state] DebugLocked = No
620,760 UART: [state] WD Timer not started. Device not locked for debugging
624,160 UART: [kat] SHA2-256
803,854 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,593 UART: [kat] ++
815,117 UART: [kat] sha1
826,415 UART: [kat] SHA2-256
829,096 UART: [kat] SHA2-384
833,571 UART: [kat] SHA2-512-ACC
835,880 UART: [kat] ECC-384
3,277,113 UART: [kat] HMAC-384Kdf
3,289,502 UART: [kat] LMS
3,766,046 UART: [kat] --
3,770,259 UART: [cold-reset] ++
3,772,263 UART: [fht] FHT @ 0x50003400
3,782,325 UART: [idev] ++
3,782,891 UART: [idev] CDI.KEYID = 6
3,783,829 UART: [idev] SUBJECT.KEYID = 7
3,785,080 UART: [idev] UDS.KEYID = 0
3,786,012 ready_for_fw is high
3,786,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,350 UART: [idev] Erasing UDS.KEYID = 0
6,262,162 UART: [idev] Sha1 KeyId Algorithm
6,286,625 UART: [idev] --
6,291,194 UART: [ldev] ++
6,291,777 UART: [ldev] CDI.KEYID = 6
6,292,663 UART: [ldev] SUBJECT.KEYID = 5
6,293,875 UART: [ldev] AUTHORITY.KEYID = 7
6,295,168 UART: [ldev] FE.KEYID = 1
6,307,299 UART: [ldev] Erasing FE.KEYID = 1
8,784,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,464 UART: [ldev] --
10,577,536 UART: [fwproc] Wait for Commands...
10,580,117 UART: [fwproc] Recv command 0x46574c44
10,582,101 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,667 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,728 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,575 >>> mbox cmd response: success
14,551,282 UART: [afmc] ++
14,551,909 UART: [afmc] CDI.KEYID = 6
14,552,826 UART: [afmc] SUBJECT.KEYID = 7
14,554,044 UART: [afmc] AUTHORITY.KEYID = 5
17,059,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,360 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,195 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,277 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,841 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,463 UART: [afmc] --
18,860,036 UART: [cold-reset] --
18,865,634 UART: [state] Locking Datavault
18,871,530 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,242 UART: [state] Locking ICCM
18,875,558 UART: [exit] Launching FMC @ 0x40000130
18,883,960 UART:
18,884,197 UART: Running Caliptra FMC ...
18,885,299 UART:
18,885,462 UART: [state] CFI Enabled
18,893,077 UART: [fht] FMC Alias Private Key: 7
20,659,229 UART: [art] Extend RT PCRs Done
20,660,464 UART: [art] Lock RT PCRs Done
20,662,007 UART: [art] Populate DV Done
20,667,319 UART: [fht] FMC Alias Private Key: 7
20,668,947 UART: [art] Derive CDI
20,669,722 UART: [art] Store in slot 0x4
20,712,526 UART: [art] Derive Key Pair
20,713,532 UART: [art] Store priv key in slot 0x5
23,140,183 UART: [art] Derive Key Pair - Done
23,153,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,803 UART: [art] Erasing AUTHORITY.KEYID = 7
24,861,314 UART: [art] PUB.X = 1A6CC6C26A3545645D665C09FA3BC995E7B0D9214CE2C8A3548DF60FC5A75790BD6DF4DB6A69D4F4C977600669AB5B06
24,868,562 UART: [art] PUB.Y = 2E6294362BFC95E841051DD5825D7C3C1EA94A21F4019F6170CB5018A90DA99CAA8B198B4F292690A12303E26A4B64A2
24,875,789 UART: [art] SIG.R = FE4D7F4B3F9A49D32E89AF523F2898D4285359FCFCF9948D5D517B1806EE0D85B1E6C78A7EAD65774D0EBAD9A49615D8
24,883,186 UART: [art] SIG.S = E82178CC8856F1F2D20F1E9A2A1FB362C153441D1E0D24EC2AB2B83C546CD51B6ACA4AF31C60506E5B1AD19497E8C4D5
25,861,700 UART: Caliptra RT
25,862,410 UART: [state] CFI Enabled
25,995,229 UART: [rt] RT listening for mailbox commands...
25,999,142 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,043,746 UART: [rt]cmd =0x4c4d5356, len=1672
26,481,866 >>> mbox cmd response data (8 bytes)
26,484,353 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,528,645 UART: [rt]cmd =0x4c4d5356, len=1672
26,760,161 >>> mbox cmd response data (8 bytes)
26,793,510 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,838,356 UART: [rt]cmd =0x4c4d5356, len=1672
27,068,712 >>> mbox cmd response data (8 bytes)
27,071,227 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,115,574 UART: [rt]cmd =0x4c4d5356, len=1672
27,343,250 >>> mbox cmd response data (8 bytes)
27,344,513 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,389,011 UART: [rt]cmd =0x4c4d5356, len=1672
27,619,948 >>> mbox cmd response data (8 bytes)
27,621,234 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,665,623 UART: [rt]cmd =0x4c4d5356, len=1672
27,894,158 >>> mbox cmd response data (8 bytes)
27,895,418 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,940,010 UART: [rt]cmd =0x4c4d5356, len=1672
28,169,059 >>> mbox cmd response data (8 bytes)
28,170,327 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,214,700 UART: [rt]cmd =0x4c4d5356, len=1672
28,446,209 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
3,778,470 ready_for_fw is high
3,778,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,881 >>> mbox cmd response: success
18,692,543 UART:
18,692,933 UART: Running Caliptra FMC ...
18,694,134 UART:
18,694,322 UART: [state] CFI Enabled
18,702,358 UART: [fht] FMC Alias Private Key: 7
20,468,738 UART: [art] Extend RT PCRs Done
20,469,975 UART: [art] Lock RT PCRs Done
20,471,560 UART: [art] Populate DV Done
20,476,930 UART: [fht] FMC Alias Private Key: 7
20,478,639 UART: [art] Derive CDI
20,479,458 UART: [art] Store in slot 0x4
20,522,654 UART: [art] Derive Key Pair
20,523,694 UART: [art] Store priv key in slot 0x5
22,950,183 UART: [art] Derive Key Pair - Done
22,963,620 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,670,141 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,657 UART: [art] PUB.X = 06BA7FF21DE5AB5C65AB36AD59A8F0AF98E232225995DE5140D9CCA2B95D2CE4EE6BC735140D0E543D3C2C6F291D2C47
24,678,937 UART: [art] PUB.Y = F423DE57AA4822EF50DE19F6E3E6E8937F2C31AE0988F70910E9BCAD7B487BD008CEBD2EAD99514427D48824C583BEF0
24,686,212 UART: [art] SIG.R = 5A624DEE7C2EDCF6910B559DF056400D34665EA8E06C4210B24C3B4E62C655318F97EE6E623360E83D89BC700DADA503
24,693,580 UART: [art] SIG.S = 8F8F9E2346D1F6825068F97E37965C3E868ABC04423769D6A4F7488A88AD8A6A7691C07F3121D75F8664B7A6D6884E3F
25,672,334 UART: Caliptra RT
25,673,058 UART: [state] CFI Enabled
25,805,855 UART: [rt] RT listening for mailbox commands...
25,809,820 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,854,580 UART: [rt]cmd =0x4c4d5356, len=1672
26,292,262 >>> mbox cmd response data (8 bytes)
26,294,704 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,339,126 UART: [rt]cmd =0x4c4d5356, len=1672
26,570,168 >>> mbox cmd response data (8 bytes)
26,604,549 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,649,261 UART: [rt]cmd =0x4c4d5356, len=1672
26,879,749 >>> mbox cmd response data (8 bytes)
26,882,231 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,926,581 UART: [rt]cmd =0x4c4d5356, len=1672
27,154,424 >>> mbox cmd response data (8 bytes)
27,155,712 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,200,811 UART: [rt]cmd =0x4c4d5356, len=1672
27,431,680 >>> mbox cmd response data (8 bytes)
27,432,991 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,477,277 UART: [rt]cmd =0x4c4d5356, len=1672
27,705,761 >>> mbox cmd response data (8 bytes)
27,707,015 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,751,246 UART: [rt]cmd =0x4c4d5356, len=1672
27,980,109 >>> mbox cmd response data (8 bytes)
27,981,365 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,025,368 UART: [rt]cmd =0x4c4d5356, len=1672
28,256,900 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,135 UART:
192,493 UART: Running Caliptra ROM ...
193,575 UART:
193,717 UART: [state] CFI Enabled
262,893 UART: [state] LifecycleState = Unprovisioned
265,328 UART: [state] DebugLocked = No
266,849 UART: [state] WD Timer not started. Device not locked for debugging
272,305 UART: [kat] SHA2-256
462,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,949 UART: [kat] ++
473,391 UART: [kat] sha1
485,040 UART: [kat] SHA2-256
488,066 UART: [kat] SHA2-384
494,128 UART: [kat] SHA2-512-ACC
496,705 UART: [kat] ECC-384
2,949,621 UART: [kat] HMAC-384Kdf
2,974,637 UART: [kat] LMS
3,506,440 UART: [kat] --
3,509,798 UART: [cold-reset] ++
3,511,934 UART: [fht] FHT @ 0x50003400
3,523,754 UART: [idev] ++
3,524,392 UART: [idev] CDI.KEYID = 6
3,525,390 UART: [idev] SUBJECT.KEYID = 7
3,526,502 UART: [idev] UDS.KEYID = 0
3,527,480 ready_for_fw is high
3,527,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,721 UART: [idev] Erasing UDS.KEYID = 0
6,033,538 UART: [idev] Sha1 KeyId Algorithm
6,055,011 UART: [idev] --
6,059,071 UART: [ldev] ++
6,059,757 UART: [ldev] CDI.KEYID = 6
6,060,777 UART: [ldev] SUBJECT.KEYID = 5
6,061,881 UART: [ldev] AUTHORITY.KEYID = 7
6,063,108 UART: [ldev] FE.KEYID = 1
6,104,569 UART: [ldev] Erasing FE.KEYID = 1
8,610,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,700 UART: [ldev] --
10,416,687 UART: [fwproc] Wait for Commands...
10,418,721 UART: [fwproc] Recv command 0x46574c44
10,421,034 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,958 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,540 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,674,295 >>> mbox cmd response: success
14,678,820 UART: [afmc] ++
14,679,558 UART: [afmc] CDI.KEYID = 6
14,680,758 UART: [afmc] SUBJECT.KEYID = 7
14,682,125 UART: [afmc] AUTHORITY.KEYID = 5
17,220,642 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,559 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,472 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,559 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,738 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,622 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,804 UART: [afmc] --
19,035,478 UART: [cold-reset] --
19,039,854 UART: [state] Locking Datavault
19,045,394 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,545 UART: [state] Locking ICCM
19,049,702 UART: [exit] Launching FMC @ 0x40000130
19,058,384 UART:
19,058,619 UART: Running Caliptra FMC ...
19,059,927 UART:
19,060,101 UART: [state] CFI Enabled
19,111,283 UART: [fht] FMC Alias Private Key: 7
20,877,978 UART: [art] Extend RT PCRs Done
20,879,197 UART: [art] Lock RT PCRs Done
20,880,872 UART: [art] Populate DV Done
20,886,275 UART: [fht] FMC Alias Private Key: 7
20,887,818 UART: [art] Derive CDI
20,888,632 UART: [art] Store in slot 0x4
20,943,940 UART: [art] Derive Key Pair
20,945,002 UART: [art] Store priv key in slot 0x5
23,408,372 UART: [art] Derive Key Pair - Done
23,420,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,134,828 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,336 UART: [art] PUB.X = 21CD756F8E176737109D7E44291A61EFD771756A9F71EC73226587A5541085BFF70AB9AC2BC60CE8FABA7E3D98F64544
25,143,611 UART: [art] PUB.Y = 8E3D171CA27627BCDC787519764CDA68412F59C3E2419B9C330613329753BCCD695EA4AD9FFB4DC238D626CB47454E8E
25,150,886 UART: [art] SIG.R = 5BD5308E3AE7F65A0E36564DE7AC7CDD9AD24C006467E45F46ACCD48FD7E210B520059812EF7C86F638A04BB3A33CDE2
25,158,260 UART: [art] SIG.S = 19D3631FCF1501B4769A7B4EE6C68B38DC0045BEAAB41EF0A7A990FFCD15528861480F64BD336F8FDEEDE8ED589AD1B8
26,137,099 UART: Caliptra RT
26,137,788 UART: [state] CFI Enabled
26,319,100 UART: [rt] RT listening for mailbox commands...
26,323,047 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,367,604 UART: [rt]cmd =0x4c4d5356, len=1672
26,805,544 >>> mbox cmd response data (8 bytes)
26,808,045 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,852,595 UART: [rt]cmd =0x4c4d5356, len=1672
27,083,918 >>> mbox cmd response data (8 bytes)
27,116,697 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,161,584 UART: [rt]cmd =0x4c4d5356, len=1672
27,391,987 >>> mbox cmd response data (8 bytes)
27,394,453 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,438,887 UART: [rt]cmd =0x4c4d5356, len=1672
27,666,608 >>> mbox cmd response data (8 bytes)
27,667,867 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,712,246 UART: [rt]cmd =0x4c4d5356, len=1672
27,943,223 >>> mbox cmd response data (8 bytes)
27,944,486 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,988,794 UART: [rt]cmd =0x4c4d5356, len=1672
28,217,423 >>> mbox cmd response data (8 bytes)
28,218,672 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,262,719 UART: [rt]cmd =0x4c4d5356, len=1672
28,491,897 >>> mbox cmd response data (8 bytes)
28,493,171 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,537,379 UART: [rt]cmd =0x4c4d5356, len=1672
28,769,265 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,440,482 ready_for_fw is high
3,440,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,850,601 >>> mbox cmd response: success
19,131,153 UART:
19,131,571 UART: Running Caliptra FMC ...
19,132,681 UART:
19,132,835 UART: [state] CFI Enabled
19,200,424 UART: [fht] FMC Alias Private Key: 7
20,965,964 UART: [art] Extend RT PCRs Done
20,967,200 UART: [art] Lock RT PCRs Done
20,968,752 UART: [art] Populate DV Done
20,974,170 UART: [fht] FMC Alias Private Key: 7
20,975,889 UART: [art] Derive CDI
20,976,625 UART: [art] Store in slot 0x4
21,033,180 UART: [art] Derive Key Pair
21,034,220 UART: [art] Store priv key in slot 0x5
23,496,644 UART: [art] Derive Key Pair - Done
23,509,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,134 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,642 UART: [art] PUB.X = 2443880CB650DB70AC8E8DAC1A0043CD06209B636AE94B5A8E9312A5701C5CF27F7E70B32DDC28BDE60896FF8ED55272
25,231,862 UART: [art] PUB.Y = 3D9CA52A8A853EFDE21D9D1A1FCC9E34DC41DDA98A3F1B796DD78D6DAFA2250C7949EFBE6116058247C8E0A2C45F3078
25,239,148 UART: [art] SIG.R = 57CC5B86A65B0084050A48A8D843505253C78AD1C111151D51A8B912B329C90741A0E1ED95DA5C511D3A34F07991A243
25,246,516 UART: [art] SIG.S = 0FCD23F3F1015A727E3EBAEC999C25C5691A22C8F6F4425B4F3320ED7E8D3410D7B3B2103DA50D32A6FD452B684220CE
26,225,053 UART: Caliptra RT
26,225,747 UART: [state] CFI Enabled
26,407,419 UART: [rt] RT listening for mailbox commands...
26,411,344 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,455,807 UART: [rt]cmd =0x4c4d5356, len=1672
26,893,940 >>> mbox cmd response data (8 bytes)
26,896,403 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,940,686 UART: [rt]cmd =0x4c4d5356, len=1672
27,172,004 >>> mbox cmd response data (8 bytes)
27,205,233 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,249,945 UART: [rt]cmd =0x4c4d5356, len=1672
27,480,094 >>> mbox cmd response data (8 bytes)
27,482,593 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,526,924 UART: [rt]cmd =0x4c4d5356, len=1672
27,754,824 >>> mbox cmd response data (8 bytes)
27,756,087 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,800,566 UART: [rt]cmd =0x4c4d5356, len=1672
28,031,320 >>> mbox cmd response data (8 bytes)
28,032,613 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,077,107 UART: [rt]cmd =0x4c4d5356, len=1672
28,305,803 >>> mbox cmd response data (8 bytes)
28,307,092 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,351,505 UART: [rt]cmd =0x4c4d5356, len=1672
28,580,359 >>> mbox cmd response data (8 bytes)
28,581,620 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,625,930 UART: [rt]cmd =0x4c4d5356, len=1672
28,857,628 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,459 UART:
192,820 UART: Running Caliptra ROM ...
194,015 UART:
603,653 UART: [state] CFI Enabled
612,879 UART: [state] LifecycleState = Unprovisioned
615,285 UART: [state] DebugLocked = No
617,873 UART: [state] WD Timer not started. Device not locked for debugging
622,138 UART: [kat] SHA2-256
812,027 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
822,832 UART: [kat] ++
823,354 UART: [kat] sha1
834,794 UART: [kat] SHA2-256
837,869 UART: [kat] SHA2-384
842,514 UART: [kat] SHA2-512-ACC
845,057 UART: [kat] ECC-384
3,287,172 UART: [kat] HMAC-384Kdf
3,301,679 UART: [kat] LMS
3,833,546 UART: [kat] --
3,837,556 UART: [cold-reset] ++
3,838,710 UART: [fht] FHT @ 0x50003400
3,850,469 UART: [idev] ++
3,851,183 UART: [idev] CDI.KEYID = 6
3,852,216 UART: [idev] SUBJECT.KEYID = 7
3,853,320 UART: [idev] UDS.KEYID = 0
3,854,255 ready_for_fw is high
3,854,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,350 UART: [idev] Erasing UDS.KEYID = 0
6,330,729 UART: [idev] Sha1 KeyId Algorithm
6,352,826 UART: [idev] --
6,358,713 UART: [ldev] ++
6,359,419 UART: [ldev] CDI.KEYID = 6
6,360,335 UART: [ldev] SUBJECT.KEYID = 5
6,361,500 UART: [ldev] AUTHORITY.KEYID = 7
6,362,736 UART: [ldev] FE.KEYID = 1
6,373,926 UART: [ldev] Erasing FE.KEYID = 1
8,854,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,296 UART: [ldev] --
10,648,422 UART: [fwproc] Wait for Commands...
10,651,164 UART: [fwproc] Recv command 0x46574c44
10,653,474 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,302 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,934 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,968 >>> mbox cmd response: success
14,910,377 UART: [afmc] ++
14,911,114 UART: [afmc] CDI.KEYID = 6
14,912,235 UART: [afmc] SUBJECT.KEYID = 7
14,913,738 UART: [afmc] AUTHORITY.KEYID = 5
17,418,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,888 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,002 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,174,133 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,062 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,747 UART: [afmc] --
19,216,048 UART: [cold-reset] --
19,218,955 UART: [state] Locking Datavault
19,224,276 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,459 UART: [state] Locking ICCM
19,227,866 UART: [exit] Launching FMC @ 0x40000130
19,236,508 UART:
19,236,753 UART: Running Caliptra FMC ...
19,237,858 UART:
19,238,025 UART: [state] CFI Enabled
19,246,190 UART: [fht] FMC Alias Private Key: 7
21,012,601 UART: [art] Extend RT PCRs Done
21,013,832 UART: [art] Lock RT PCRs Done
21,015,476 UART: [art] Populate DV Done
21,020,949 UART: [fht] FMC Alias Private Key: 7
21,022,657 UART: [art] Derive CDI
21,023,478 UART: [art] Store in slot 0x4
21,066,187 UART: [art] Derive Key Pair
21,067,194 UART: [art] Store priv key in slot 0x5
23,493,787 UART: [art] Derive Key Pair - Done
23,507,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,803 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,313 UART: [art] PUB.X = E35FC0B73AA2AE01F5D02345DE6C6191FF3B56996567B35A46D899F64C8981317A28E63210540369443C46B7B6BB45DF
25,222,556 UART: [art] PUB.Y = 80AA79BA378DE42E7E8D69FDDB0C3128A06CC42E25531ADE1485A998B8C68A6C2415F550E9289D7B1B43ABA348031091
25,229,815 UART: [art] SIG.R = F9BB89BC0AAACB2649268CA89E12BF35781405A844DEBE9E4823C3E6B6199E046DFE0E7AA118A9E5BB5F5E55F9850356
25,237,192 UART: [art] SIG.S = 6BCD7360D12CD2484BD8463FB3BCDA20AFC060FDC3BED42B25A1FFAB70A93060BA27DABBD12E24D83B85D086358F6BCF
26,216,785 UART: Caliptra RT
26,217,478 UART: [state] CFI Enabled
26,350,460 UART: [rt] RT listening for mailbox commands...
26,354,392 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,399,098 UART: [rt]cmd =0x4c4d5356, len=1672
26,837,115 >>> mbox cmd response data (8 bytes)
26,839,601 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,883,829 UART: [rt]cmd =0x4c4d5356, len=1672
27,115,287 >>> mbox cmd response data (8 bytes)
27,149,501 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,194,069 UART: [rt]cmd =0x4c4d5356, len=1672
27,424,290 >>> mbox cmd response data (8 bytes)
27,426,765 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,471,413 UART: [rt]cmd =0x4c4d5356, len=1672
27,698,991 >>> mbox cmd response data (8 bytes)
27,700,260 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,744,657 UART: [rt]cmd =0x4c4d5356, len=1672
27,975,415 >>> mbox cmd response data (8 bytes)
27,976,675 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,020,795 UART: [rt]cmd =0x4c4d5356, len=1672
28,249,486 >>> mbox cmd response data (8 bytes)
28,250,739 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,294,858 UART: [rt]cmd =0x4c4d5356, len=1672
28,523,689 >>> mbox cmd response data (8 bytes)
28,524,966 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,569,590 UART: [rt]cmd =0x4c4d5356, len=1672
28,801,350 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,754,588 ready_for_fw is high
3,754,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,890 >>> mbox cmd response: success
19,295,590 UART:
19,296,012 UART: Running Caliptra FMC ...
19,297,523 UART:
19,297,710 UART: [state] CFI Enabled
19,305,192 UART: [fht] FMC Alias Private Key: 7
21,070,892 UART: [art] Extend RT PCRs Done
21,072,144 UART: [art] Lock RT PCRs Done
21,073,812 UART: [art] Populate DV Done
21,079,412 UART: [fht] FMC Alias Private Key: 7
21,080,961 UART: [art] Derive CDI
21,081,736 UART: [art] Store in slot 0x4
21,124,338 UART: [art] Derive Key Pair
21,125,342 UART: [art] Store priv key in slot 0x5
23,552,081 UART: [art] Derive Key Pair - Done
23,565,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,773 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,312 UART: [art] PUB.X = 43F83B7C6811B57F67DFA5A75A86BB8D8E59126770B9101A185F37589C6078038910A076C327D3D3462ED81125336DD5
25,280,500 UART: [art] PUB.Y = 78015DC60F586C2CD4A79E99D7E9A1FD0A72E7B1F4B6423A6E063246C6EF93367AE85E1C22DA1E842475DF87F5368C6F
25,287,734 UART: [art] SIG.R = 9AA99B2AAC86F9D1845FB46F0881E2484F33053D7DEEE1453652F962DA947023EA6624B2316DF3E18A9D48A3A1E0777C
25,295,133 UART: [art] SIG.S = 77B387C3426D59D31439807F78869D498B1EBE48508A2E5E02A05891762A3D95692EB19573A24BD7ED12A3165AD9807D
26,273,867 UART: Caliptra RT
26,274,558 UART: [state] CFI Enabled
26,406,263 UART: [rt] RT listening for mailbox commands...
26,410,287 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,454,810 UART: [rt]cmd =0x4c4d5356, len=1672
26,892,926 >>> mbox cmd response data (8 bytes)
26,895,389 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,940,055 UART: [rt]cmd =0x4c4d5356, len=1672
27,171,247 >>> mbox cmd response data (8 bytes)
27,204,541 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,249,417 UART: [rt]cmd =0x4c4d5356, len=1672
27,479,764 >>> mbox cmd response data (8 bytes)
27,482,299 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,526,905 UART: [rt]cmd =0x4c4d5356, len=1672
27,754,859 >>> mbox cmd response data (8 bytes)
27,756,137 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,800,401 UART: [rt]cmd =0x4c4d5356, len=1672
28,031,391 >>> mbox cmd response data (8 bytes)
28,032,682 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,076,952 UART: [rt]cmd =0x4c4d5356, len=1672
28,305,704 >>> mbox cmd response data (8 bytes)
28,306,967 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,351,449 UART: [rt]cmd =0x4c4d5356, len=1672
28,580,472 >>> mbox cmd response data (8 bytes)
28,581,734 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,626,212 UART: [rt]cmd =0x4c4d5356, len=1672
28,857,847 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,915 UART: [kat] SHA2-256
881,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,961 UART: [kat] ++
886,113 UART: [kat] sha1
890,337 UART: [kat] SHA2-256
892,275 UART: [kat] SHA2-384
894,992 UART: [kat] SHA2-512-ACC
896,893 UART: [kat] ECC-384
902,374 UART: [kat] HMAC-384Kdf
906,868 UART: [kat] LMS
1,475,064 UART: [kat] --
1,475,809 UART: [cold-reset] ++
1,476,217 UART: [fht] Storing FHT @ 0x50003400
1,479,068 UART: [idev] ++
1,479,236 UART: [idev] CDI.KEYID = 6
1,479,596 UART: [idev] SUBJECT.KEYID = 7
1,480,020 UART: [idev] UDS.KEYID = 0
1,480,365 ready_for_fw is high
1,480,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,732 UART: [idev] Erasing UDS.KEYID = 0
1,504,282 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,898 UART: [idev] --
1,513,983 UART: [ldev] ++
1,514,151 UART: [ldev] CDI.KEYID = 6
1,514,514 UART: [ldev] SUBJECT.KEYID = 5
1,514,940 UART: [ldev] AUTHORITY.KEYID = 7
1,515,403 UART: [ldev] FE.KEYID = 1
1,520,779 UART: [ldev] Erasing FE.KEYID = 1
1,545,952 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,434 UART: [ldev] --
1,585,791 UART: [fwproc] Waiting for Commands...
1,586,614 UART: [fwproc] Received command 0x46574c44
1,587,405 UART: [fwproc] Received Image of size 118548 bytes
2,931,909 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,783 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,001 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,398 >>> mbox cmd response: success
3,131,410 UART: [afmc] ++
3,131,578 UART: [afmc] CDI.KEYID = 6
3,131,940 UART: [afmc] SUBJECT.KEYID = 7
3,132,365 UART: [afmc] AUTHORITY.KEYID = 5
3,167,390 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,652 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,432 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,141 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,024 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,707 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,477 UART: [afmc] --
3,210,571 UART: [cold-reset] --
3,211,573 UART: [state] Locking Datavault
3,212,956 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,560 UART: [state] Locking ICCM
3,214,162 UART: [exit] Launching FMC @ 0x40000130
3,219,492 UART:
3,219,508 UART: Running Caliptra FMC ...
3,219,916 UART:
3,219,970 UART: [state] CFI Enabled
3,230,246 UART: [fht] FMC Alias Private Key: 7
3,349,222 UART: [art] Extend RT PCRs Done
3,349,650 UART: [art] Lock RT PCRs Done
3,351,064 UART: [art] Populate DV Done
3,359,545 UART: [fht] FMC Alias Private Key: 7
3,360,473 UART: [art] Derive CDI
3,360,753 UART: [art] Store in slot 0x4
3,446,331 UART: [art] Derive Key Pair
3,446,691 UART: [art] Store priv key in slot 0x5
3,459,660 UART: [art] Derive Key Pair - Done
3,474,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,572 UART: [art] PUB.X = 7E875EBCC0BC0C5D1EA82D2533C9A6AAB7CC72C9BA361DD6273DA5956C6CAC4627EF3B8B37127D06F67E930F6090734E
3,497,349 UART: [art] PUB.Y = 20270BAC5EDFFF45DD7579F17AF2C21D1F6D399676DAB3E435B7138BCFD7D81ABF9115C3927FC29FB7A116A834D31B19
3,504,312 UART: [art] SIG.R = F88CC3BBD81971780FCC0E09B604D52AE077503CE84C93F9F5D4AA12C0B990792F0908C97982B5787FB88A8381485AB0
3,511,066 UART: [art] SIG.S = CAA292D7C6FD79EA435737ECA937E7ACE2D5B0090F1F06AC1BA630025873098387FADEFF2CBC8C10872D769E4CC4E481
3,534,935 UART: Caliptra RT
3,535,186 UART: [state] CFI Enabled
3,655,611 UART: [rt] RT listening for mailbox commands...
3,656,281 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,381 UART: [rt]cmd =0x4c4d5356, len=1672
5,421,666 >>> mbox cmd response data (8 bytes)
5,421,667 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,461,794 UART: [rt]cmd =0x4c4d5356, len=1672
6,573,216 >>> mbox cmd response data (8 bytes)
6,573,217 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,613,718 UART: [rt]cmd =0x4c4d5356, len=1672
7,687,076 >>> mbox cmd response data (8 bytes)
7,687,077 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,727,276 UART: [rt]cmd =0x4c4d5356, len=1672
8,838,592 >>> mbox cmd response data (8 bytes)
8,838,593 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,878,952 UART: [rt]cmd =0x4c4d5356, len=1672
10,103,648 >>> mbox cmd response data (8 bytes)
10,103,649 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,143,902 UART: [rt]cmd =0x4c4d5356, len=1672
11,217,005 >>> mbox cmd response data (8 bytes)
11,217,006 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,257,435 UART: [rt]cmd =0x4c4d5356, len=1672
12,406,449 >>> mbox cmd response data (8 bytes)
12,406,450 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,446,389 UART: [rt]cmd =0x4c4d5356, len=1672
13,633,316 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,481 ready_for_fw is high
1,361,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,016 >>> mbox cmd response: success
3,040,621 UART:
3,040,637 UART: Running Caliptra FMC ...
3,041,045 UART:
3,041,099 UART: [state] CFI Enabled
3,051,741 UART: [fht] FMC Alias Private Key: 7
3,170,939 UART: [art] Extend RT PCRs Done
3,171,367 UART: [art] Lock RT PCRs Done
3,173,161 UART: [art] Populate DV Done
3,181,304 UART: [fht] FMC Alias Private Key: 7
3,182,294 UART: [art] Derive CDI
3,182,574 UART: [art] Store in slot 0x4
3,268,342 UART: [art] Derive Key Pair
3,268,702 UART: [art] Store priv key in slot 0x5
3,281,889 UART: [art] Derive Key Pair - Done
3,296,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,758 UART: [art] PUB.X = 8DDCD6885534EDDBBD85EFA4D4CBEB067B66616EEF2C4B8229B3380D78ACE52508264F2A577DF5CD805DF519F48023DA
3,319,537 UART: [art] PUB.Y = B9FDA120B17059089E09A5B30EEFC6E89789E1DC6E0869E38D9147E2A1A581DACB88DAFC226C302BC75A031267B38CD2
3,326,484 UART: [art] SIG.R = C8D8F2DF2ACD1B3454CB6026DA17EB970D8C935F72E43F13C51A80D357DB8A789B2E2DF3EFDFC960932A473DF7704792
3,333,265 UART: [art] SIG.S = 4D79B079BF12EBDDED3B1A72A2EAD6D7E259499B4F0F7146BE4B17D110AB06B01F8C761D09EF68B1B16F5D7646E3EFB7
3,357,708 UART: Caliptra RT
3,357,959 UART: [state] CFI Enabled
3,477,361 UART: [rt] RT listening for mailbox commands...
3,478,031 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,559 UART: [rt]cmd =0x4c4d5356, len=1672
5,242,758 >>> mbox cmd response data (8 bytes)
5,242,759 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,282,910 UART: [rt]cmd =0x4c4d5356, len=1672
6,394,092 >>> mbox cmd response data (8 bytes)
6,394,093 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,434,134 UART: [rt]cmd =0x4c4d5356, len=1672
7,507,580 >>> mbox cmd response data (8 bytes)
7,507,581 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,547,820 UART: [rt]cmd =0x4c4d5356, len=1672
8,659,126 >>> mbox cmd response data (8 bytes)
8,659,127 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,699,262 UART: [rt]cmd =0x4c4d5356, len=1672
9,924,010 >>> mbox cmd response data (8 bytes)
9,924,011 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,964,096 UART: [rt]cmd =0x4c4d5356, len=1672
11,037,307 >>> mbox cmd response data (8 bytes)
11,037,308 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,077,535 UART: [rt]cmd =0x4c4d5356, len=1672
12,226,549 >>> mbox cmd response data (8 bytes)
12,226,550 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,266,691 UART: [rt]cmd =0x4c4d5356, len=1672
13,453,916 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,718 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,196 UART: [kat] SHA2-256
882,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,242 UART: [kat] ++
886,394 UART: [kat] sha1
890,784 UART: [kat] SHA2-256
892,722 UART: [kat] SHA2-384
895,387 UART: [kat] SHA2-512-ACC
897,288 UART: [kat] ECC-384
902,997 UART: [kat] HMAC-384Kdf
907,489 UART: [kat] LMS
1,475,685 UART: [kat] --
1,476,706 UART: [cold-reset] ++
1,477,146 UART: [fht] Storing FHT @ 0x50003400
1,480,043 UART: [idev] ++
1,480,211 UART: [idev] CDI.KEYID = 6
1,480,571 UART: [idev] SUBJECT.KEYID = 7
1,480,995 UART: [idev] UDS.KEYID = 0
1,481,340 ready_for_fw is high
1,481,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,999 UART: [idev] Erasing UDS.KEYID = 0
1,506,081 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,859 UART: [idev] --
1,515,810 UART: [ldev] ++
1,515,978 UART: [ldev] CDI.KEYID = 6
1,516,341 UART: [ldev] SUBJECT.KEYID = 5
1,516,767 UART: [ldev] AUTHORITY.KEYID = 7
1,517,230 UART: [ldev] FE.KEYID = 1
1,522,466 UART: [ldev] Erasing FE.KEYID = 1
1,548,067 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,865 UART: [ldev] --
1,587,134 UART: [fwproc] Waiting for Commands...
1,587,805 UART: [fwproc] Received command 0x46574c44
1,588,596 UART: [fwproc] Received Image of size 118548 bytes
2,933,624 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,394 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,612 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,815 >>> mbox cmd response: success
3,132,891 UART: [afmc] ++
3,133,059 UART: [afmc] CDI.KEYID = 6
3,133,421 UART: [afmc] SUBJECT.KEYID = 7
3,133,846 UART: [afmc] AUTHORITY.KEYID = 5
3,168,855 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,051 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,831 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,540 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,423 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,106 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,884 UART: [afmc] --
3,211,814 UART: [cold-reset] --
3,212,826 UART: [state] Locking Datavault
3,214,069 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,673 UART: [state] Locking ICCM
3,215,101 UART: [exit] Launching FMC @ 0x40000130
3,220,431 UART:
3,220,447 UART: Running Caliptra FMC ...
3,220,855 UART:
3,220,998 UART: [state] CFI Enabled
3,231,868 UART: [fht] FMC Alias Private Key: 7
3,351,086 UART: [art] Extend RT PCRs Done
3,351,514 UART: [art] Lock RT PCRs Done
3,353,168 UART: [art] Populate DV Done
3,361,463 UART: [fht] FMC Alias Private Key: 7
3,362,557 UART: [art] Derive CDI
3,362,837 UART: [art] Store in slot 0x4
3,449,077 UART: [art] Derive Key Pair
3,449,437 UART: [art] Store priv key in slot 0x5
3,462,596 UART: [art] Derive Key Pair - Done
3,477,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,324 UART: [art] PUB.X = D4BD8B5A8E6622FFCDE8D3C41247CEA18DD9E1937C92660DAFF693C97B941BFB977623BB655B9F9882319A87B0B471D3
3,500,103 UART: [art] PUB.Y = C0D464913AB000685CEEAB0D00BED5CEF29FF4E08C1C6756C542276BA2A8D7865F966299DFFD6B656E4A7EC68F328544
3,507,018 UART: [art] SIG.R = 9FADE90668F9C514556C939F202C114C7553FA6F9615DC83E32EEA39B12A6758124A52E8EC2EA67243FA2DA00393BDF6
3,513,788 UART: [art] SIG.S = D10BDA7FC9ED41944B0A9C6A9AA9E3FD16194846F9538216696763B28ACCCE18666BE70FEE9A3FA07700331EB4E6400A
3,537,774 UART: Caliptra RT
3,538,117 UART: [state] CFI Enabled
3,658,702 UART: [rt] RT listening for mailbox commands...
3,659,372 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,742 UART: [rt]cmd =0x4c4d5356, len=1672
5,423,797 >>> mbox cmd response data (8 bytes)
5,423,798 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,464,267 UART: [rt]cmd =0x4c4d5356, len=1672
6,575,529 >>> mbox cmd response data (8 bytes)
6,575,530 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,615,667 UART: [rt]cmd =0x4c4d5356, len=1672
7,688,721 >>> mbox cmd response data (8 bytes)
7,688,722 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,729,099 UART: [rt]cmd =0x4c4d5356, len=1672
8,840,325 >>> mbox cmd response data (8 bytes)
8,840,326 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,880,797 UART: [rt]cmd =0x4c4d5356, len=1672
10,105,653 >>> mbox cmd response data (8 bytes)
10,105,654 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,145,931 UART: [rt]cmd =0x4c4d5356, len=1672
11,219,468 >>> mbox cmd response data (8 bytes)
11,219,469 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,259,700 UART: [rt]cmd =0x4c4d5356, len=1672
12,408,630 >>> mbox cmd response data (8 bytes)
12,408,631 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,448,926 UART: [rt]cmd =0x4c4d5356, len=1672
13,635,821 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,810 ready_for_fw is high
1,362,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,965 >>> mbox cmd response: success
3,043,788 UART:
3,043,804 UART: Running Caliptra FMC ...
3,044,212 UART:
3,044,355 UART: [state] CFI Enabled
3,055,017 UART: [fht] FMC Alias Private Key: 7
3,174,489 UART: [art] Extend RT PCRs Done
3,174,917 UART: [art] Lock RT PCRs Done
3,176,675 UART: [art] Populate DV Done
3,185,184 UART: [fht] FMC Alias Private Key: 7
3,186,322 UART: [art] Derive CDI
3,186,602 UART: [art] Store in slot 0x4
3,272,404 UART: [art] Derive Key Pair
3,272,764 UART: [art] Store priv key in slot 0x5
3,286,767 UART: [art] Derive Key Pair - Done
3,301,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,867 UART: [art] PUB.X = 75BB3073B074EC53F6EB3373929F7368F15E23D56E3588CA5E96962DF260D6ECED740A8D3197AE71AD664AFE4992D569
3,324,638 UART: [art] PUB.Y = B57355B38590A3296962A6F5309809BC893C6378B1B50C50C342C0889B9AE8454573CE13A3801A855581130FABA3E770
3,331,567 UART: [art] SIG.R = 5B43AC7459B4EC115B3F0920B2B3D6E9CA77F2EA147333257B4A944E04D18B3F95A19AFCA9169C5E6A678DB7D6EB0910
3,338,338 UART: [art] SIG.S = 6BCD34558FA369A7AB074A1D051E97BCB0841CB1A6B4648A3E23D8AE55ABE97A256BE333003A86ABA77631BAC92BFC14
3,361,948 UART: Caliptra RT
3,362,291 UART: [state] CFI Enabled
3,481,614 UART: [rt] RT listening for mailbox commands...
3,482,284 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,860 UART: [rt]cmd =0x4c4d5356, len=1672
5,246,903 >>> mbox cmd response data (8 bytes)
5,246,904 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,287,201 UART: [rt]cmd =0x4c4d5356, len=1672
6,398,533 >>> mbox cmd response data (8 bytes)
6,398,534 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,438,819 UART: [rt]cmd =0x4c4d5356, len=1672
7,512,247 >>> mbox cmd response data (8 bytes)
7,512,248 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,552,511 UART: [rt]cmd =0x4c4d5356, len=1672
8,663,365 >>> mbox cmd response data (8 bytes)
8,663,366 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,703,351 UART: [rt]cmd =0x4c4d5356, len=1672
9,928,321 >>> mbox cmd response data (8 bytes)
9,928,322 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,968,597 UART: [rt]cmd =0x4c4d5356, len=1672
11,042,234 >>> mbox cmd response data (8 bytes)
11,042,235 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,082,328 UART: [rt]cmd =0x4c4d5356, len=1672
12,231,558 >>> mbox cmd response data (8 bytes)
12,231,559 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,271,634 UART: [rt]cmd =0x4c4d5356, len=1672
13,458,695 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,894 UART: [kat] SHA2-256
901,834 UART: [kat] SHA2-384
904,615 UART: [kat] SHA2-512-ACC
906,516 UART: [kat] ECC-384
916,061 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,169,706 UART: [cold-reset] ++
1,170,104 UART: [fht] FHT @ 0x50003400
1,172,830 UART: [idev] ++
1,172,998 UART: [idev] CDI.KEYID = 6
1,173,359 UART: [idev] SUBJECT.KEYID = 7
1,173,784 UART: [idev] UDS.KEYID = 0
1,174,130 ready_for_fw is high
1,174,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,983 UART: [idev] Erasing UDS.KEYID = 0
1,198,463 UART: [idev] Sha1 KeyId Algorithm
1,207,387 UART: [idev] --
1,208,500 UART: [ldev] ++
1,208,668 UART: [ldev] CDI.KEYID = 6
1,209,032 UART: [ldev] SUBJECT.KEYID = 5
1,209,459 UART: [ldev] AUTHORITY.KEYID = 7
1,209,922 UART: [ldev] FE.KEYID = 1
1,215,328 UART: [ldev] Erasing FE.KEYID = 1
1,242,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,164 UART: [ldev] --
1,281,395 UART: [fwproc] Wait for Commands...
1,282,188 UART: [fwproc] Recv command 0x46574c44
1,282,921 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,955 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,130 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,479 >>> mbox cmd response: success
2,826,597 UART: [afmc] ++
2,826,765 UART: [afmc] CDI.KEYID = 6
2,827,128 UART: [afmc] SUBJECT.KEYID = 7
2,827,554 UART: [afmc] AUTHORITY.KEYID = 5
2,864,069 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,104 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,853 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,563 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,444 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,145 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,066 UART: [afmc] --
2,907,035 UART: [cold-reset] --
2,907,839 UART: [state] Locking Datavault
2,909,040 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,644 UART: [state] Locking ICCM
2,910,192 UART: [exit] Launching FMC @ 0x40000130
2,915,522 UART:
2,915,538 UART: Running Caliptra FMC ...
2,915,946 UART:
2,916,000 UART: [state] CFI Enabled
2,926,744 UART: [fht] FMC Alias Private Key: 7
3,045,746 UART: [art] Extend RT PCRs Done
3,046,174 UART: [art] Lock RT PCRs Done
3,047,448 UART: [art] Populate DV Done
3,055,495 UART: [fht] FMC Alias Private Key: 7
3,056,565 UART: [art] Derive CDI
3,056,845 UART: [art] Store in slot 0x4
3,142,934 UART: [art] Derive Key Pair
3,143,294 UART: [art] Store priv key in slot 0x5
3,156,586 UART: [art] Derive Key Pair - Done
3,171,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,408 UART: [art] PUB.X = 1168807044134AD97E9EFAA3E066D8CC67B79D234045E6399B067D5B173B565823EF05BFB87DCFDA783BE5DA620639F8
3,194,173 UART: [art] PUB.Y = 54882BAC8B547274112221F87A1B0D0AC7DBB36736E417E11213DF437DECFDE99591897F4E12BB6B8187F2864AA4D6BC
3,201,123 UART: [art] SIG.R = 3BF887F127B875628A0E2EFA734AAEC5393576E8747C98195B8C002CBADE477C801E0E8E73C12D3CB2B6A37DF8792218
3,207,871 UART: [art] SIG.S = 1D5B6026A6E4BA52FA460502BA95DEF8E4D66545CA465617DC69DFF87A84B0D974DF0136217C50CD2C40E3177B900833
3,231,645 UART: Caliptra RT
3,231,896 UART: [state] CFI Enabled
3,352,914 UART: [rt] RT listening for mailbox commands...
3,353,584 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,280 UART: [rt]cmd =0x4c4d5356, len=1672
3,937,155 >>> mbox cmd response data (8 bytes)
3,937,156 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,977,385 UART: [rt]cmd =0x4c4d5356, len=1672
4,266,453 >>> mbox cmd response data (8 bytes)
4,266,454 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,306,765 UART: [rt]cmd =0x4c4d5356, len=1672
4,595,431 >>> mbox cmd response data (8 bytes)
4,595,432 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,635,637 UART: [rt]cmd =0x4c4d5356, len=1672
4,919,093 >>> mbox cmd response data (8 bytes)
4,919,094 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,959,385 UART: [rt]cmd =0x4c4d5356, len=1672
5,243,023 >>> mbox cmd response data (8 bytes)
5,243,024 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,283,231 UART: [rt]cmd =0x4c4d5356, len=1672
5,569,090 >>> mbox cmd response data (8 bytes)
5,569,091 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,609,426 UART: [rt]cmd =0x4c4d5356, len=1672
5,892,544 >>> mbox cmd response data (8 bytes)
5,892,545 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,932,666 UART: [rt]cmd =0x4c4d5356, len=1672
6,218,777 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,554 ready_for_fw is high
1,058,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,932 >>> mbox cmd response: success
2,741,451 UART:
2,741,467 UART: Running Caliptra FMC ...
2,741,875 UART:
2,741,929 UART: [state] CFI Enabled
2,752,421 UART: [fht] FMC Alias Private Key: 7
2,871,595 UART: [art] Extend RT PCRs Done
2,872,023 UART: [art] Lock RT PCRs Done
2,873,481 UART: [art] Populate DV Done
2,881,656 UART: [fht] FMC Alias Private Key: 7
2,882,796 UART: [art] Derive CDI
2,883,076 UART: [art] Store in slot 0x4
2,968,781 UART: [art] Derive Key Pair
2,969,141 UART: [art] Store priv key in slot 0x5
2,982,807 UART: [art] Derive Key Pair - Done
2,997,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,856 UART: [art] PUB.X = 44714E72092AF2DC1E5F65E07F8FDB1553FBE0355B18B7FC4B03A7FC0A73474A2BA13918168AEB2BBCDE96972DD896E8
3,020,631 UART: [art] PUB.Y = C046AFD647C85C3CD04C83B81C133A5057924E9A036945AECCB294CCE02918A8F49A22C3CF9E1583CDA17D1DEC2817F9
3,027,590 UART: [art] SIG.R = 01396A5E145F9A9F5F3CE02428B05377118C4E8C0EB07E629BFA48546469D04D6A9D7CF416F229808BA3B3C48CEDCBEB
3,034,364 UART: [art] SIG.S = 41E499E509894D140C7BF7442EB2DF1236D9870494C71576CEBC60EC0B85A5DA9C4F8586D448FF80C520C15D35AA1BE8
3,058,872 UART: Caliptra RT
3,059,123 UART: [state] CFI Enabled
3,178,411 UART: [rt] RT listening for mailbox commands...
3,179,081 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,201 UART: [rt]cmd =0x4c4d5356, len=1672
3,763,202 >>> mbox cmd response data (8 bytes)
3,763,203 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,803,360 UART: [rt]cmd =0x4c4d5356, len=1672
4,091,802 >>> mbox cmd response data (8 bytes)
4,091,803 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,132,006 UART: [rt]cmd =0x4c4d5356, len=1672
4,420,654 >>> mbox cmd response data (8 bytes)
4,420,655 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,460,754 UART: [rt]cmd =0x4c4d5356, len=1672
4,744,070 >>> mbox cmd response data (8 bytes)
4,744,071 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,784,424 UART: [rt]cmd =0x4c4d5356, len=1672
5,068,042 >>> mbox cmd response data (8 bytes)
5,068,043 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,268 UART: [rt]cmd =0x4c4d5356, len=1672
5,394,461 >>> mbox cmd response data (8 bytes)
5,394,462 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,434,531 UART: [rt]cmd =0x4c4d5356, len=1672
5,718,181 >>> mbox cmd response data (8 bytes)
5,718,182 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,758,597 UART: [rt]cmd =0x4c4d5356, len=1672
6,044,640 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,434 UART: [kat] HMAC-384Kdf
920,004 UART: [kat] LMS
1,168,316 UART: [kat] --
1,169,309 UART: [cold-reset] ++
1,169,755 UART: [fht] FHT @ 0x50003400
1,172,321 UART: [idev] ++
1,172,489 UART: [idev] CDI.KEYID = 6
1,172,850 UART: [idev] SUBJECT.KEYID = 7
1,173,275 UART: [idev] UDS.KEYID = 0
1,173,621 ready_for_fw is high
1,173,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,264 UART: [idev] Erasing UDS.KEYID = 0
1,198,402 UART: [idev] Sha1 KeyId Algorithm
1,207,296 UART: [idev] --
1,208,535 UART: [ldev] ++
1,208,703 UART: [ldev] CDI.KEYID = 6
1,209,067 UART: [ldev] SUBJECT.KEYID = 5
1,209,494 UART: [ldev] AUTHORITY.KEYID = 7
1,209,957 UART: [ldev] FE.KEYID = 1
1,215,199 UART: [ldev] Erasing FE.KEYID = 1
1,241,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,665 UART: [ldev] --
1,281,050 UART: [fwproc] Wait for Commands...
1,281,741 UART: [fwproc] Recv command 0x46574c44
1,282,474 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,698 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,873 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,146 >>> mbox cmd response: success
2,825,170 UART: [afmc] ++
2,825,338 UART: [afmc] CDI.KEYID = 6
2,825,701 UART: [afmc] SUBJECT.KEYID = 7
2,826,127 UART: [afmc] AUTHORITY.KEYID = 5
2,861,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,804 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,514 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,395 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,096 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,855 UART: [afmc] --
2,904,670 UART: [cold-reset] --
2,905,312 UART: [state] Locking Datavault
2,906,523 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,127 UART: [state] Locking ICCM
2,907,551 UART: [exit] Launching FMC @ 0x40000130
2,912,881 UART:
2,912,897 UART: Running Caliptra FMC ...
2,913,305 UART:
2,913,448 UART: [state] CFI Enabled
2,924,246 UART: [fht] FMC Alias Private Key: 7
3,043,558 UART: [art] Extend RT PCRs Done
3,043,986 UART: [art] Lock RT PCRs Done
3,045,764 UART: [art] Populate DV Done
3,053,985 UART: [fht] FMC Alias Private Key: 7
3,055,009 UART: [art] Derive CDI
3,055,289 UART: [art] Store in slot 0x4
3,140,876 UART: [art] Derive Key Pair
3,141,236 UART: [art] Store priv key in slot 0x5
3,154,532 UART: [art] Derive Key Pair - Done
3,169,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,757 UART: [art] PUB.X = D42510DE4A019807297EC38BB44034BC48BD736CCBB62579F69CB56EE6BE98548C635B79585C79716713E29B30E8B508
3,192,516 UART: [art] PUB.Y = F6806CF096EC3FD6C837D31AEBD64FFB5E674AF34E0BE1E3D62BB6FE0C6A8BCECF95B0E04D40B674742D6110C7509AAA
3,199,486 UART: [art] SIG.R = 14012EA89C80CD9CE78432B724304CDBF44227B88DC80E1CEE57A4EBBEFB34F801E21C235355C0406177F1245CCFD897
3,206,255 UART: [art] SIG.S = F8D70358CE34AB6ACAA110C91BFF0F264E558D3CA69305C9DF6CCFD82879F73C8A8B820B071146808A5B5ACA3C8B85B0
3,229,886 UART: Caliptra RT
3,230,229 UART: [state] CFI Enabled
3,349,576 UART: [rt] RT listening for mailbox commands...
3,350,246 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,390,728 UART: [rt]cmd =0x4c4d5356, len=1672
3,933,819 >>> mbox cmd response data (8 bytes)
3,933,820 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,973,981 UART: [rt]cmd =0x4c4d5356, len=1672
4,262,651 >>> mbox cmd response data (8 bytes)
4,262,652 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,302,911 UART: [rt]cmd =0x4c4d5356, len=1672
4,591,641 >>> mbox cmd response data (8 bytes)
4,591,642 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,631,529 UART: [rt]cmd =0x4c4d5356, len=1672
4,914,813 >>> mbox cmd response data (8 bytes)
4,914,814 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,954,845 UART: [rt]cmd =0x4c4d5356, len=1672
5,238,397 >>> mbox cmd response data (8 bytes)
5,238,398 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,278,763 UART: [rt]cmd =0x4c4d5356, len=1672
5,564,726 >>> mbox cmd response data (8 bytes)
5,564,727 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,604,750 UART: [rt]cmd =0x4c4d5356, len=1672
5,888,018 >>> mbox cmd response data (8 bytes)
5,888,019 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,928,078 UART: [rt]cmd =0x4c4d5356, len=1672
6,213,791 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,521 ready_for_fw is high
1,059,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,433 >>> mbox cmd response: success
2,741,224 UART:
2,741,240 UART: Running Caliptra FMC ...
2,741,648 UART:
2,741,791 UART: [state] CFI Enabled
2,752,401 UART: [fht] FMC Alias Private Key: 7
2,871,269 UART: [art] Extend RT PCRs Done
2,871,697 UART: [art] Lock RT PCRs Done
2,872,921 UART: [art] Populate DV Done
2,881,322 UART: [fht] FMC Alias Private Key: 7
2,882,458 UART: [art] Derive CDI
2,882,738 UART: [art] Store in slot 0x4
2,968,531 UART: [art] Derive Key Pair
2,968,891 UART: [art] Store priv key in slot 0x5
2,982,269 UART: [art] Derive Key Pair - Done
2,997,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,598 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,363 UART: [art] PUB.X = 52505826EC75D4BF220E78459560BC9B11127485ED4690B3427723DCB831276A4397750FEBF7E6C8AF041E2E63A05813
3,020,116 UART: [art] PUB.Y = 93A4B2C03D09FE113D7B4D6BD055498926F93EFD47E21C2C9A723A17FF8914C7184D8B17E4315584138D0D3D8B75B39B
3,027,062 UART: [art] SIG.R = 2410B7DE73CADCC5B6304AACE64876FF66FC2747540735F6E6C4DFF23129F035E5052CFE2836E571D4DB094CDAF54382
3,033,833 UART: [art] SIG.S = 06BEEF30200EB29ECA14F9DF297C0A33F1D83F5BE45BDDC7BC0B7375E7E3AECED549975EC4200A8DC5B4237C447ABE36
3,057,318 UART: Caliptra RT
3,057,661 UART: [state] CFI Enabled
3,176,729 UART: [rt] RT listening for mailbox commands...
3,177,399 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,151 UART: [rt]cmd =0x4c4d5356, len=1672
3,761,234 >>> mbox cmd response data (8 bytes)
3,761,235 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,801,402 UART: [rt]cmd =0x4c4d5356, len=1672
4,090,210 >>> mbox cmd response data (8 bytes)
4,090,211 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,130,560 UART: [rt]cmd =0x4c4d5356, len=1672
4,419,064 >>> mbox cmd response data (8 bytes)
4,419,065 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,459,262 UART: [rt]cmd =0x4c4d5356, len=1672
4,742,664 >>> mbox cmd response data (8 bytes)
4,742,665 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,782,754 UART: [rt]cmd =0x4c4d5356, len=1672
5,066,066 >>> mbox cmd response data (8 bytes)
5,066,067 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,106,140 UART: [rt]cmd =0x4c4d5356, len=1672
5,392,245 >>> mbox cmd response data (8 bytes)
5,392,246 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,432,437 UART: [rt]cmd =0x4c4d5356, len=1672
5,715,871 >>> mbox cmd response data (8 bytes)
5,715,872 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,756,075 UART: [rt]cmd =0x4c4d5356, len=1672
6,042,504 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
893,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,613 UART: [kat] ++
897,765 UART: [kat] sha1
902,177 UART: [kat] SHA2-256
904,117 UART: [kat] SHA2-384
906,960 UART: [kat] SHA2-512-ACC
908,861 UART: [kat] ECC-384
918,798 UART: [kat] HMAC-384Kdf
923,458 UART: [kat] LMS
1,171,786 UART: [kat] --
1,172,507 UART: [cold-reset] ++
1,173,065 UART: [fht] FHT @ 0x50003400
1,175,750 UART: [idev] ++
1,175,918 UART: [idev] CDI.KEYID = 6
1,176,278 UART: [idev] SUBJECT.KEYID = 7
1,176,702 UART: [idev] UDS.KEYID = 0
1,177,047 ready_for_fw is high
1,177,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,948 UART: [idev] Erasing UDS.KEYID = 0
1,201,779 UART: [idev] Sha1 KeyId Algorithm
1,210,333 UART: [idev] --
1,211,501 UART: [ldev] ++
1,211,669 UART: [ldev] CDI.KEYID = 6
1,212,032 UART: [ldev] SUBJECT.KEYID = 5
1,212,458 UART: [ldev] AUTHORITY.KEYID = 7
1,212,921 UART: [ldev] FE.KEYID = 1
1,217,753 UART: [ldev] Erasing FE.KEYID = 1
1,243,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,065 UART: [ldev] --
1,283,340 UART: [fwproc] Wait for Commands...
1,283,966 UART: [fwproc] Recv command 0x46574c44
1,284,694 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,698 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,868 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,035 >>> mbox cmd response: success
2,829,105 UART: [afmc] ++
2,829,273 UART: [afmc] CDI.KEYID = 6
2,829,635 UART: [afmc] SUBJECT.KEYID = 7
2,830,060 UART: [afmc] AUTHORITY.KEYID = 5
2,865,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,446 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,155 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,038 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,739 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,503 UART: [afmc] --
2,908,419 UART: [cold-reset] --
2,909,329 UART: [state] Locking Datavault
2,910,578 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,182 UART: [state] Locking ICCM
2,911,818 UART: [exit] Launching FMC @ 0x40000130
2,917,148 UART:
2,917,164 UART: Running Caliptra FMC ...
2,917,572 UART:
2,917,626 UART: [state] CFI Enabled
2,928,428 UART: [fht] FMC Alias Private Key: 7
3,047,086 UART: [art] Extend RT PCRs Done
3,047,514 UART: [art] Lock RT PCRs Done
3,049,304 UART: [art] Populate DV Done
3,057,501 UART: [fht] FMC Alias Private Key: 7
3,058,589 UART: [art] Derive CDI
3,058,869 UART: [art] Store in slot 0x4
3,144,428 UART: [art] Derive Key Pair
3,144,788 UART: [art] Store priv key in slot 0x5
3,158,002 UART: [art] Derive Key Pair - Done
3,173,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,088 UART: [art] PUB.X = 67CCF13A8300C46FCEB053719C47145181CCE743C840DE29BE5434ECA23F11499BD40F53B36EEF9732115F41889CE626
3,195,835 UART: [art] PUB.Y = 6D4FD11ACD542F649B441C064646F7F8B0B0EBB85DFBEEF6EB005BBB4534CDB275A93BC366960FBD5A6F77A7D39E8D80
3,202,779 UART: [art] SIG.R = 5424462AD70779620393B902F77C2DEE5A4493DEEB1521012D101684C1250BB14FDA3EDE5B6D960BF40A22A6587BAFA3
3,209,532 UART: [art] SIG.S = 850F5268082146130BDA0AF80A4B59C85754567AB461BE59BFBD45B01568A949E4A65FE45D04A2D227E1543C592F9964
3,233,832 UART: Caliptra RT
3,234,083 UART: [state] CFI Enabled
3,353,042 UART: [rt] RT listening for mailbox commands...
3,353,712 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,486 UART: [rt]cmd =0x4c4d5356, len=1672
3,937,651 >>> mbox cmd response data (8 bytes)
3,937,652 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,978,021 UART: [rt]cmd =0x4c4d5356, len=1672
4,266,897 >>> mbox cmd response data (8 bytes)
4,266,898 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,307,233 UART: [rt]cmd =0x4c4d5356, len=1672
4,595,689 >>> mbox cmd response data (8 bytes)
4,595,690 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,635,981 UART: [rt]cmd =0x4c4d5356, len=1672
4,919,681 >>> mbox cmd response data (8 bytes)
4,919,682 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,959,885 UART: [rt]cmd =0x4c4d5356, len=1672
5,243,455 >>> mbox cmd response data (8 bytes)
5,243,456 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,283,537 UART: [rt]cmd =0x4c4d5356, len=1672
5,569,446 >>> mbox cmd response data (8 bytes)
5,569,447 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,609,562 UART: [rt]cmd =0x4c4d5356, len=1672
5,892,964 >>> mbox cmd response data (8 bytes)
5,892,965 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,932,984 UART: [rt]cmd =0x4c4d5356, len=1672
6,219,021 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,235 ready_for_fw is high
1,060,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,408 >>> mbox cmd response: success
2,740,847 UART:
2,740,863 UART: Running Caliptra FMC ...
2,741,271 UART:
2,741,325 UART: [state] CFI Enabled
2,751,625 UART: [fht] FMC Alias Private Key: 7
2,870,865 UART: [art] Extend RT PCRs Done
2,871,293 UART: [art] Lock RT PCRs Done
2,872,979 UART: [art] Populate DV Done
2,881,458 UART: [fht] FMC Alias Private Key: 7
2,882,550 UART: [art] Derive CDI
2,882,830 UART: [art] Store in slot 0x4
2,968,653 UART: [art] Derive Key Pair
2,969,013 UART: [art] Store priv key in slot 0x5
2,982,071 UART: [art] Derive Key Pair - Done
2,996,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,213 UART: [art] PUB.X = 3FE46D668FDEC4BC5268076142CF13C7F5ECA18164A851CB0248AB3ED78D0E4B77E165B6DDDDFC5BCFD05015934B10CE
3,018,994 UART: [art] PUB.Y = 2D27B92DA843C937DEE9E225A05CCBB0EC6003E18DCB96F975C58751005C67C188D03DFBC15A9E6CF5DB4B448B43B897
3,025,933 UART: [art] SIG.R = 9F3436563A4F05092FFFB46B61B7FC36BF083BAE54C5EC795EC0A3E5C9A7B2FAAE9BF8190E1DC3C3E8D7B37343C70AE3
3,032,710 UART: [art] SIG.S = F2519DDF76564343B5123D53B44D2CEFA1D0F64CD23FC2DF813B16CCE5142524F0C6A7A9820BAC818A0750FE9C1586A3
3,056,238 UART: Caliptra RT
3,056,489 UART: [state] CFI Enabled
3,175,799 UART: [rt] RT listening for mailbox commands...
3,176,469 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,149 UART: [rt]cmd =0x4c4d5356, len=1672
3,760,062 >>> mbox cmd response data (8 bytes)
3,760,063 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,800,198 UART: [rt]cmd =0x4c4d5356, len=1672
4,088,730 >>> mbox cmd response data (8 bytes)
4,088,731 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,128,840 UART: [rt]cmd =0x4c4d5356, len=1672
4,417,478 >>> mbox cmd response data (8 bytes)
4,417,479 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,457,546 UART: [rt]cmd =0x4c4d5356, len=1672
4,740,826 >>> mbox cmd response data (8 bytes)
4,740,827 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,781,014 UART: [rt]cmd =0x4c4d5356, len=1672
5,064,370 >>> mbox cmd response data (8 bytes)
5,064,371 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,104,604 UART: [rt]cmd =0x4c4d5356, len=1672
5,390,729 >>> mbox cmd response data (8 bytes)
5,390,730 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,430,865 UART: [rt]cmd =0x4c4d5356, len=1672
5,714,059 >>> mbox cmd response data (8 bytes)
5,714,060 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,754,517 UART: [rt]cmd =0x4c4d5356, len=1672
6,040,820 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
893,901 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,026 UART: [kat] ++
898,178 UART: [kat] sha1
902,458 UART: [kat] SHA2-256
904,398 UART: [kat] SHA2-384
907,155 UART: [kat] SHA2-512-ACC
909,056 UART: [kat] ECC-384
918,863 UART: [kat] HMAC-384Kdf
923,525 UART: [kat] LMS
1,171,853 UART: [kat] --
1,172,836 UART: [cold-reset] ++
1,173,394 UART: [fht] FHT @ 0x50003400
1,175,991 UART: [idev] ++
1,176,159 UART: [idev] CDI.KEYID = 6
1,176,519 UART: [idev] SUBJECT.KEYID = 7
1,176,943 UART: [idev] UDS.KEYID = 0
1,177,288 ready_for_fw is high
1,177,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,163 UART: [idev] Erasing UDS.KEYID = 0
1,201,906 UART: [idev] Sha1 KeyId Algorithm
1,210,216 UART: [idev] --
1,211,284 UART: [ldev] ++
1,211,452 UART: [ldev] CDI.KEYID = 6
1,211,815 UART: [ldev] SUBJECT.KEYID = 5
1,212,241 UART: [ldev] AUTHORITY.KEYID = 7
1,212,704 UART: [ldev] FE.KEYID = 1
1,218,100 UART: [ldev] Erasing FE.KEYID = 1
1,244,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,892 UART: [ldev] --
1,284,263 UART: [fwproc] Wait for Commands...
1,285,013 UART: [fwproc] Recv command 0x46574c44
1,285,741 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,233 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,403 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,668 >>> mbox cmd response: success
2,830,800 UART: [afmc] ++
2,830,968 UART: [afmc] CDI.KEYID = 6
2,831,330 UART: [afmc] SUBJECT.KEYID = 7
2,831,755 UART: [afmc] AUTHORITY.KEYID = 5
2,866,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,189 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,898 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,781 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,482 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,206 UART: [afmc] --
2,910,214 UART: [cold-reset] --
2,911,024 UART: [state] Locking Datavault
2,912,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,745 UART: [state] Locking ICCM
2,913,393 UART: [exit] Launching FMC @ 0x40000130
2,918,723 UART:
2,918,739 UART: Running Caliptra FMC ...
2,919,147 UART:
2,919,290 UART: [state] CFI Enabled
2,930,116 UART: [fht] FMC Alias Private Key: 7
3,048,860 UART: [art] Extend RT PCRs Done
3,049,288 UART: [art] Lock RT PCRs Done
3,050,742 UART: [art] Populate DV Done
3,058,915 UART: [fht] FMC Alias Private Key: 7
3,060,035 UART: [art] Derive CDI
3,060,315 UART: [art] Store in slot 0x4
3,146,348 UART: [art] Derive Key Pair
3,146,708 UART: [art] Store priv key in slot 0x5
3,160,228 UART: [art] Derive Key Pair - Done
3,175,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,359 UART: [art] PUB.X = 88103B4DD5D08EBE246033D0555F7951353E959DEA6A7498E35114A12B0C00948E28ECB02B14997737B64494E4700236
3,198,089 UART: [art] PUB.Y = A3287A91225E5BA40FC9C47ACA17EB8E4E73F9475BD6E9DB0B82B29E15F025FF5685BFC63FBE26E9740580526F3F68EE
3,205,044 UART: [art] SIG.R = CEF16DE50E2C97FA48715F1BFE0FFA49823C1F465CE7037F5175F70DAF2DD5EC51646F66BE14FD81C2FC4C9C9D498AAC
3,211,826 UART: [art] SIG.S = E5D4D4A8B56BBF0832E324C5A40BBBE6FB4CAE8DFFB90834D1486E177A261B7140C32B6DD49BF9852D5B4D6B834B5E4B
3,235,557 UART: Caliptra RT
3,235,900 UART: [state] CFI Enabled
3,356,304 UART: [rt] RT listening for mailbox commands...
3,356,974 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,496 UART: [rt]cmd =0x4c4d5356, len=1672
3,940,579 >>> mbox cmd response data (8 bytes)
3,940,580 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,980,799 UART: [rt]cmd =0x4c4d5356, len=1672
4,269,337 >>> mbox cmd response data (8 bytes)
4,269,338 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,309,371 UART: [rt]cmd =0x4c4d5356, len=1672
4,597,915 >>> mbox cmd response data (8 bytes)
4,597,916 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,638,111 UART: [rt]cmd =0x4c4d5356, len=1672
4,921,833 >>> mbox cmd response data (8 bytes)
4,921,834 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,962,135 UART: [rt]cmd =0x4c4d5356, len=1672
5,245,547 >>> mbox cmd response data (8 bytes)
5,245,548 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,285,713 UART: [rt]cmd =0x4c4d5356, len=1672
5,572,054 >>> mbox cmd response data (8 bytes)
5,572,055 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,612,312 UART: [rt]cmd =0x4c4d5356, len=1672
5,895,598 >>> mbox cmd response data (8 bytes)
5,895,599 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,935,874 UART: [rt]cmd =0x4c4d5356, len=1672
6,221,985 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,278 ready_for_fw is high
1,061,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,421 >>> mbox cmd response: success
2,741,974 UART:
2,741,990 UART: Running Caliptra FMC ...
2,742,398 UART:
2,742,541 UART: [state] CFI Enabled
2,753,467 UART: [fht] FMC Alias Private Key: 7
2,872,929 UART: [art] Extend RT PCRs Done
2,873,357 UART: [art] Lock RT PCRs Done
2,874,785 UART: [art] Populate DV Done
2,882,864 UART: [fht] FMC Alias Private Key: 7
2,883,958 UART: [art] Derive CDI
2,884,238 UART: [art] Store in slot 0x4
2,970,043 UART: [art] Derive Key Pair
2,970,403 UART: [art] Store priv key in slot 0x5
2,983,727 UART: [art] Derive Key Pair - Done
2,998,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,766 UART: [art] PUB.X = 7086BEE0F587D720FABAF9AEBA590DF9789D27C1892AAD8C5E6A5AC5FED5709EABBAB449A53A9B614E6E26CF1CC25696
3,021,559 UART: [art] PUB.Y = 24938489A88D2D1E7B1B10B7D2C6B20B77252D0806EBED62456122A33530089E7E4FC5412D46F3EFFEC30FF3836CE4C9
3,028,498 UART: [art] SIG.R = 912D9DBCECE23C699E6FC9582DD7D612A0044E3F36C44DF32BE9CE999F2EAA48C2EE2D7F74827ABEB374EC4A91A3E772
3,035,287 UART: [art] SIG.S = AC1E6EE52414BD1071632440C06427509B6C3584F0295E21C06EA617A863255114EBFF0A642C93A07962E68385C7BA0D
3,059,045 UART: Caliptra RT
3,059,388 UART: [state] CFI Enabled
3,179,152 UART: [rt] RT listening for mailbox commands...
3,179,822 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,622 UART: [rt]cmd =0x4c4d5356, len=1672
3,764,039 >>> mbox cmd response data (8 bytes)
3,764,040 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,804,217 UART: [rt]cmd =0x4c4d5356, len=1672
4,092,611 >>> mbox cmd response data (8 bytes)
4,092,612 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,132,593 UART: [rt]cmd =0x4c4d5356, len=1672
4,421,121 >>> mbox cmd response data (8 bytes)
4,421,122 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,461,433 UART: [rt]cmd =0x4c4d5356, len=1672
4,744,817 >>> mbox cmd response data (8 bytes)
4,744,818 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,785,015 UART: [rt]cmd =0x4c4d5356, len=1672
5,068,753 >>> mbox cmd response data (8 bytes)
5,068,754 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,753 UART: [rt]cmd =0x4c4d5356, len=1672
5,395,036 >>> mbox cmd response data (8 bytes)
5,395,037 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,435,178 UART: [rt]cmd =0x4c4d5356, len=1672
5,718,738 >>> mbox cmd response data (8 bytes)
5,718,739 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,758,790 UART: [rt]cmd =0x4c4d5356, len=1672
6,044,731 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,125 UART:
192,482 UART: Running Caliptra ROM ...
193,633 UART:
193,784 UART: [state] CFI Enabled
265,219 UART: [state] LifecycleState = Unprovisioned
267,207 UART: [state] DebugLocked = No
269,727 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,447 UART: [kat] SHA2-256
444,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,675 UART: [kat] ++
455,126 UART: [kat] sha1
466,215 UART: [kat] SHA2-256
468,886 UART: [kat] SHA2-384
474,240 UART: [kat] SHA2-512-ACC
476,610 UART: [kat] ECC-384
2,768,515 UART: [kat] HMAC-384Kdf
2,799,930 UART: [kat] LMS
3,990,293 UART: [kat] --
3,995,162 UART: [cold-reset] ++
3,996,955 UART: [fht] Storing FHT @ 0x50003400
4,009,639 UART: [idev] ++
4,010,208 UART: [idev] CDI.KEYID = 6
4,011,191 UART: [idev] SUBJECT.KEYID = 7
4,012,439 UART: [idev] UDS.KEYID = 0
4,013,492 ready_for_fw is high
4,013,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,741 UART: [idev] Erasing UDS.KEYID = 0
7,347,573 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,074 UART: [idev] --
7,372,748 UART: [ldev] ++
7,373,375 UART: [ldev] CDI.KEYID = 6
7,374,256 UART: [ldev] SUBJECT.KEYID = 5
7,375,525 UART: [ldev] AUTHORITY.KEYID = 7
7,376,757 UART: [ldev] FE.KEYID = 1
7,422,423 UART: [ldev] Erasing FE.KEYID = 1
10,753,796 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,009 UART: [ldev] --
13,115,118 UART: [fwproc] Waiting for Commands...
13,117,859 UART: [fwproc] Received command 0x46574c44
13,120,101 UART: [fwproc] Received Image of size 118548 bytes
17,231,464 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,042 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,380,212 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,709,068 >>> mbox cmd response: success
17,712,918 UART: [afmc] ++
17,713,540 UART: [afmc] CDI.KEYID = 6
17,714,454 UART: [afmc] SUBJECT.KEYID = 7
17,715,671 UART: [afmc] AUTHORITY.KEYID = 5
21,067,215 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,366,746 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,369,012 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,383,463 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,398,165 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,412,620 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,434,885 UART: [afmc] --
23,438,102 UART: [cold-reset] --
23,443,769 UART: [state] Locking Datavault
23,450,854 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,551 UART: [state] Locking ICCM
23,454,049 UART: [exit] Launching FMC @ 0x40000130
23,462,452 UART:
23,462,693 UART: Running Caliptra FMC ...
23,463,793 UART:
23,463,953 UART: [state] CFI Enabled
23,527,704 UART: [fht] FMC Alias Private Key: 7
25,868,464 UART: [art] Extend RT PCRs Done
25,869,691 UART: [art] Lock RT PCRs Done
25,871,284 UART: [art] Populate DV Done
25,876,750 UART: [fht] FMC Alias Private Key: 7
25,878,289 UART: [art] Derive CDI
25,879,027 UART: [art] Store in slot 0x4
25,935,795 UART: [art] Derive Key Pair
25,936,853 UART: [art] Store priv key in slot 0x5
29,228,995 UART: [art] Derive Key Pair - Done
29,241,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,530,518 UART: [art] Erasing AUTHORITY.KEYID = 7
31,532,023 UART: [art] PUB.X = 946845751FBA9A50BC6D55212473BF1D803F05C1BF64E4697325A995635D21853875FB034BFB9711F0A7850437ACACB4
31,539,234 UART: [art] PUB.Y = F29CA5897602B451170067DC0BABBD2C6481AFAF396C84014C8400EB46C5DCF0387A2B41EC1856F0670D1FF7B4DA3F4F
31,546,476 UART: [art] SIG.R = 03BFD644401A2430E4BD823A84BB19205D1F6869DDD8896F186D244758C9545E6228B285BEC58301FC46FB680307328C
31,553,846 UART: [art] SIG.S = 32C445CE1FF2E44F5C26259A242F8C427FBA59CFF17445611281C13C056741EE03BCD71FECE9AAC80D54D3142708A401
32,859,629 UART: Caliptra RT
32,860,348 UART: [state] CFI Enabled
33,056,151 UART: [rt] RT listening for mailbox commands...
33,060,083 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,104,641 UART: [rt]cmd =0x4c4d5356, len=1672
34,367,927 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,810,397 ready_for_fw is high
3,810,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,988,205 >>> mbox cmd response: success
23,678,534 UART:
23,678,967 UART: Running Caliptra FMC ...
23,680,115 UART:
23,680,280 UART: [state] CFI Enabled
23,749,133 UART: [fht] FMC Alias Private Key: 7
26,111,014 UART: [art] Extend RT PCRs Done
26,112,249 UART: [art] Lock RT PCRs Done
26,113,984 UART: [art] Populate DV Done
26,119,415 UART: [fht] FMC Alias Private Key: 7
26,121,065 UART: [art] Derive CDI
26,121,885 UART: [art] Store in slot 0x4
26,179,416 UART: [art] Derive Key Pair
26,180,416 UART: [art] Store priv key in slot 0x5
29,472,727 UART: [art] Derive Key Pair - Done
29,485,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,774,971 UART: [art] Erasing AUTHORITY.KEYID = 7
31,776,475 UART: [art] PUB.X = EF832281724D3ECE13BB0AAD0F472C9519F40946EFE9AF4C352F055984717C7B71D218D9A08B556E839B8EAE32A91F2F
31,783,733 UART: [art] PUB.Y = 5E1E4511791D92CB19204A8393F3B341FA15910E7F5CFC691E780356CB907184F755242585E93DCCB2629A3042435EB8
31,790,965 UART: [art] SIG.R = 10B9E7761C5F842C881762EF7FCA032B46A27C1AD5CC86E5271DF6EEFB0BCA80E6624BEC441A685E396ABB3DCF29FB3F
31,798,386 UART: [art] SIG.S = CE498A3D7E016B9A1BC65365CE523A9101BA8B813D23570E42B70183B3FC8CCE14E79D2AD14DEA04AC5413765CE70173
33,103,806 UART: Caliptra RT
33,104,535 UART: [state] CFI Enabled
33,282,297 UART: [rt] RT listening for mailbox commands...
33,286,242 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,330,688 UART: [rt]cmd =0x4c4d5356, len=1672
34,594,252 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,568 UART:
192,937 UART: Running Caliptra ROM ...
194,119 UART:
603,612 UART: [state] CFI Enabled
616,194 UART: [state] LifecycleState = Unprovisioned
618,095 UART: [state] DebugLocked = No
619,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,098 UART: [kat] SHA2-256
793,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,348 UART: [kat] ++
804,835 UART: [kat] sha1
815,350 UART: [kat] SHA2-256
818,064 UART: [kat] SHA2-384
823,762 UART: [kat] SHA2-512-ACC
826,131 UART: [kat] ECC-384
3,107,603 UART: [kat] HMAC-384Kdf
3,118,345 UART: [kat] LMS
4,308,480 UART: [kat] --
4,313,116 UART: [cold-reset] ++
4,315,532 UART: [fht] Storing FHT @ 0x50003400
4,326,720 UART: [idev] ++
4,327,283 UART: [idev] CDI.KEYID = 6
4,328,277 UART: [idev] SUBJECT.KEYID = 7
4,329,444 UART: [idev] UDS.KEYID = 0
4,330,432 ready_for_fw is high
4,330,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,479,467 UART: [idev] Erasing UDS.KEYID = 0
7,616,412 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,522 UART: [idev] --
7,640,377 UART: [ldev] ++
7,640,946 UART: [ldev] CDI.KEYID = 6
7,641,903 UART: [ldev] SUBJECT.KEYID = 5
7,643,111 UART: [ldev] AUTHORITY.KEYID = 7
7,644,386 UART: [ldev] FE.KEYID = 1
7,654,927 UART: [ldev] Erasing FE.KEYID = 1
10,940,521 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,231,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,246,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,260,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,275,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,294,733 UART: [ldev] --
13,299,132 UART: [fwproc] Waiting for Commands...
13,300,849 UART: [fwproc] Received command 0x46574c44
13,303,079 UART: [fwproc] Received Image of size 118548 bytes
17,405,812 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,482,373 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,555,506 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,883,761 >>> mbox cmd response: success
17,888,369 UART: [afmc] ++
17,888,977 UART: [afmc] CDI.KEYID = 6
17,889,999 UART: [afmc] SUBJECT.KEYID = 7
17,891,149 UART: [afmc] AUTHORITY.KEYID = 5
21,204,506 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,499,668 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,501,942 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,516,384 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,531,132 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,545,546 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,568,594 UART: [afmc] --
23,572,121 UART: [cold-reset] --
23,575,096 UART: [state] Locking Datavault
23,582,680 UART: [state] Locking PCR0, PCR1 and PCR31
23,584,429 UART: [state] Locking ICCM
23,586,442 UART: [exit] Launching FMC @ 0x40000130
23,594,824 UART:
23,595,050 UART: Running Caliptra FMC ...
23,596,143 UART:
23,596,295 UART: [state] CFI Enabled
23,604,581 UART: [fht] FMC Alias Private Key: 7
25,944,294 UART: [art] Extend RT PCRs Done
25,945,531 UART: [art] Lock RT PCRs Done
25,947,452 UART: [art] Populate DV Done
25,952,743 UART: [fht] FMC Alias Private Key: 7
25,954,379 UART: [art] Derive CDI
25,955,185 UART: [art] Store in slot 0x4
25,997,666 UART: [art] Derive Key Pair
25,998,700 UART: [art] Store priv key in slot 0x5
29,241,069 UART: [art] Derive Key Pair - Done
29,253,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,294 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,797 UART: [art] PUB.X = 911910AD63B5809E33C79AA9D923276E1A3F22D400FD848F6927F548DDECC1B3609B60482D19DB713EE8417914570458
31,543,045 UART: [art] PUB.Y = 85D04470EE5BFD404E37B72016D3E06F27A24A950817CF54BA2D7EB66647280EAF609CCC04D5CF73C370DBF5C5FD68CD
31,550,343 UART: [art] SIG.R = E4C2A7317FE86D6328D10AE3084F32A1B19DB04C57F22D44161EEA2C16CD6DCD536850D45562CE662EB728572DE4EBCE
31,557,685 UART: [art] SIG.S = CE5B3864BB00E01193AE5EF0042FFF83E95D415C5B6B5AD4FC3A420837CE7B1A86711EC6B1C20E1FF22DD8667485E8B4
32,862,334 UART: Caliptra RT
32,863,046 UART: [state] CFI Enabled
32,996,388 UART: [rt] RT listening for mailbox commands...
33,000,300 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,044,727 UART: [rt]cmd =0x4c4d5356, len=1672
34,308,253 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
4,125,670 ready_for_fw is high
4,126,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,859 >>> mbox cmd response: success
23,792,145 UART:
23,792,557 UART: Running Caliptra FMC ...
23,793,692 UART:
23,793,847 UART: [state] CFI Enabled
23,801,809 UART: [fht] FMC Alias Private Key: 7
26,141,411 UART: [art] Extend RT PCRs Done
26,142,639 UART: [art] Lock RT PCRs Done
26,144,127 UART: [art] Populate DV Done
26,149,660 UART: [fht] FMC Alias Private Key: 7
26,151,144 UART: [art] Derive CDI
26,151,904 UART: [art] Store in slot 0x4
26,194,324 UART: [art] Derive Key Pair
26,195,317 UART: [art] Store priv key in slot 0x5
29,437,522 UART: [art] Derive Key Pair - Done
29,450,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,944 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,449 UART: [art] PUB.X = 7591D0EA11B09C4B3F756CA0D46FBDF13DA5031EF527B38696DEF24A91822E00BD7D8E7777B3F1506F23B22211571E0B
31,739,717 UART: [art] PUB.Y = 8A6E76DB5DCE684CF42FEBF51F2CEB481EBC49122ACC2A04447552D7E9AC3BABEB248CC9B2A9A5831210721BF1BFEF43
31,746,978 UART: [art] SIG.R = 2CE9ADBA1E65F0C02F2DE49AC7670450665F34A346D39C82B048E5BABC6EFCB8EC25739CAD446B12ADF9E39C884F6C8B
31,754,372 UART: [art] SIG.S = F580B3D980A6FB01B9A560A575FFEBE60F9405E089075C17AF6283AAEEB395A4278BA6D16F634239CCDF6BB1DA65A225
33,059,866 UART: Caliptra RT
33,060,588 UART: [state] CFI Enabled
33,193,546 UART: [rt] RT listening for mailbox commands...
33,197,491 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,242,262 UART: [rt]cmd =0x4c4d5356, len=1672
34,505,589 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,259 UART:
192,619 UART: Running Caliptra ROM ...
194,013 UART:
194,173 UART: [state] CFI Enabled
266,548 UART: [state] LifecycleState = Unprovisioned
268,412 UART: [state] DebugLocked = No
270,783 UART: [state] WD Timer not started. Device not locked for debugging
274,952 UART: [kat] SHA2-256
454,587 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,337 UART: [kat] ++
465,815 UART: [kat] sha1
477,538 UART: [kat] SHA2-256
480,269 UART: [kat] SHA2-384
487,178 UART: [kat] SHA2-512-ACC
489,543 UART: [kat] ECC-384
2,948,352 UART: [kat] HMAC-384Kdf
2,972,811 UART: [kat] LMS
3,449,283 UART: [kat] --
3,452,926 UART: [cold-reset] ++
3,453,869 UART: [fht] FHT @ 0x50003400
3,465,482 UART: [idev] ++
3,466,041 UART: [idev] CDI.KEYID = 6
3,466,955 UART: [idev] SUBJECT.KEYID = 7
3,468,198 UART: [idev] UDS.KEYID = 0
3,469,266 ready_for_fw is high
3,469,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,500 UART: [idev] Erasing UDS.KEYID = 0
5,987,206 UART: [idev] Sha1 KeyId Algorithm
6,009,649 UART: [idev] --
6,015,108 UART: [ldev] ++
6,015,674 UART: [ldev] CDI.KEYID = 6
6,016,606 UART: [ldev] SUBJECT.KEYID = 5
6,017,816 UART: [ldev] AUTHORITY.KEYID = 7
6,019,045 UART: [ldev] FE.KEYID = 1
6,058,724 UART: [ldev] Erasing FE.KEYID = 1
8,563,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,310 UART: [ldev] --
10,374,860 UART: [fwproc] Wait for Commands...
10,377,663 UART: [fwproc] Recv command 0x46574c44
10,379,697 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,930 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,936 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,863 >>> mbox cmd response: success
14,348,458 UART: [afmc] ++
14,349,070 UART: [afmc] CDI.KEYID = 6
14,350,041 UART: [afmc] SUBJECT.KEYID = 7
14,351,199 UART: [afmc] AUTHORITY.KEYID = 5
16,898,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,641,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,643,796 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,659,581 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,675,620 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,691,241 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,715,429 UART: [afmc] --
18,718,910 UART: [cold-reset] --
18,723,206 UART: [state] Locking Datavault
18,728,342 UART: [state] Locking PCR0, PCR1 and PCR31
18,730,088 UART: [state] Locking ICCM
18,732,455 UART: [exit] Launching FMC @ 0x40000130
18,740,901 UART:
18,741,143 UART: Running Caliptra FMC ...
18,742,242 UART:
18,742,403 UART: [state] CFI Enabled
18,797,729 UART: [fht] FMC Alias Private Key: 7
20,563,815 UART: [art] Extend RT PCRs Done
20,565,036 UART: [art] Lock RT PCRs Done
20,566,765 UART: [art] Populate DV Done
20,572,246 UART: [fht] FMC Alias Private Key: 7
20,573,887 UART: [art] Derive CDI
20,574,697 UART: [art] Store in slot 0x4
20,630,763 UART: [art] Derive Key Pair
20,631,807 UART: [art] Store priv key in slot 0x5
23,094,685 UART: [art] Derive Key Pair - Done
23,107,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,985 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,483 UART: [art] PUB.X = 3DCB74EDF7394846CC25219BE5E5439C59C403D88F713C252145CB1079D8793291DBFF5E2D52ED2C02852CAB9C219EAD
24,829,785 UART: [art] PUB.Y = 2E893751590462DBF78C4AEC4CB24F6960580C7601CC4FA95C3A8FACA546A4A6201F9FEB6AB576263AE01701536FA3B1
24,837,048 UART: [art] SIG.R = 8FBEB32F94557F6B37F17186548394BA6E4EBBF08F91CE3ACA07AF229679CABECEB2BC747D36DCB6938C08FABF7CB170
24,844,465 UART: [art] SIG.S = 468BEB9E0194651F552647D1DDE6CB2236650FEB38B687B2C568E2B03EDFF8007D8584B5257C1AEE9B76FBA6B5D779B8
25,823,115 UART: Caliptra RT
25,823,819 UART: [state] CFI Enabled
26,004,698 UART: [rt] RT listening for mailbox commands...
26,008,637 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,053,005 UART: [rt]cmd =0x4c4d5356, len=1672
26,499,182 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,462,657 ready_for_fw is high
3,463,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,238,433 >>> mbox cmd response: success
18,535,464 UART:
18,535,853 UART: Running Caliptra FMC ...
18,537,051 UART:
18,537,242 UART: [state] CFI Enabled
18,601,240 UART: [fht] FMC Alias Private Key: 7
20,368,374 UART: [art] Extend RT PCRs Done
20,369,575 UART: [art] Lock RT PCRs Done
20,371,101 UART: [art] Populate DV Done
20,376,564 UART: [fht] FMC Alias Private Key: 7
20,378,060 UART: [art] Derive CDI
20,378,823 UART: [art] Store in slot 0x4
20,433,807 UART: [art] Derive Key Pair
20,434,840 UART: [art] Store priv key in slot 0x5
22,897,911 UART: [art] Derive Key Pair - Done
22,910,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,325 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,809 UART: [art] PUB.X = 6E994C18138D853ED9A418B95DF8F88B6173819CBAAF3CB1453BD3D650B63F11BBADB721FAE4F36D99E8B7D749B037A2
24,632,111 UART: [art] PUB.Y = 2B7DBF56970FD5FF99785F8BE38FF91FFC1280BF980A9D6DB1C7BB9C6B196400DFBEDFC9B00F4E602687BFF74BE9A4A6
24,639,446 UART: [art] SIG.R = B35AF6E94D410B22FC492CDD2C4053B212E2F0C5ED36B2405F3A715A048EFC8F798753B522E56E857A1A549D5F0F9C17
24,646,820 UART: [art] SIG.S = 204D3F2F2FEBC2FEC4718F6216392A9FD812B2C980BDE4F14A60464EED1B567291EBA76BD1B279760FF9AF2A0A96350E
25,626,093 UART: Caliptra RT
25,626,808 UART: [state] CFI Enabled
25,806,401 UART: [rt] RT listening for mailbox commands...
25,810,311 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,855,082 UART: [rt]cmd =0x4c4d5356, len=1672
26,301,311 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,469 UART:
192,852 UART: Running Caliptra ROM ...
194,159 UART:
603,513 UART: [state] CFI Enabled
619,326 UART: [state] LifecycleState = Unprovisioned
621,203 UART: [state] DebugLocked = No
622,804 UART: [state] WD Timer not started. Device not locked for debugging
626,559 UART: [kat] SHA2-256
806,235 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,036 UART: [kat] ++
817,492 UART: [kat] sha1
829,100 UART: [kat] SHA2-256
831,799 UART: [kat] SHA2-384
836,376 UART: [kat] SHA2-512-ACC
838,769 UART: [kat] ECC-384
3,283,567 UART: [kat] HMAC-384Kdf
3,296,653 UART: [kat] LMS
3,773,214 UART: [kat] --
3,776,927 UART: [cold-reset] ++
3,778,009 UART: [fht] FHT @ 0x50003400
3,790,360 UART: [idev] ++
3,790,961 UART: [idev] CDI.KEYID = 6
3,791,850 UART: [idev] SUBJECT.KEYID = 7
3,793,098 UART: [idev] UDS.KEYID = 0
3,794,045 ready_for_fw is high
3,794,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,955 UART: [idev] Erasing UDS.KEYID = 0
6,274,480 UART: [idev] Sha1 KeyId Algorithm
6,298,512 UART: [idev] --
6,303,908 UART: [ldev] ++
6,304,554 UART: [ldev] CDI.KEYID = 6
6,305,438 UART: [ldev] SUBJECT.KEYID = 5
6,306,652 UART: [ldev] AUTHORITY.KEYID = 7
6,307,832 UART: [ldev] FE.KEYID = 1
6,318,524 UART: [ldev] Erasing FE.KEYID = 1
8,797,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,996 UART: [ldev] --
10,588,825 UART: [fwproc] Wait for Commands...
10,591,290 UART: [fwproc] Recv command 0x46574c44
10,593,289 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,752 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,783 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,828 >>> mbox cmd response: success
14,559,226 UART: [afmc] ++
14,559,842 UART: [afmc] CDI.KEYID = 6
14,560,760 UART: [afmc] SUBJECT.KEYID = 7
14,561,984 UART: [afmc] AUTHORITY.KEYID = 5
17,067,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,021 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,840 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,917 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,485 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,110 UART: [afmc] --
18,867,625 UART: [cold-reset] --
18,871,002 UART: [state] Locking Datavault
18,876,739 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,457 UART: [state] Locking ICCM
18,879,724 UART: [exit] Launching FMC @ 0x40000130
18,888,179 UART:
18,888,420 UART: Running Caliptra FMC ...
18,889,523 UART:
18,889,683 UART: [state] CFI Enabled
18,897,577 UART: [fht] FMC Alias Private Key: 7
20,663,863 UART: [art] Extend RT PCRs Done
20,665,083 UART: [art] Lock RT PCRs Done
20,666,742 UART: [art] Populate DV Done
20,672,175 UART: [fht] FMC Alias Private Key: 7
20,673,704 UART: [art] Derive CDI
20,674,531 UART: [art] Store in slot 0x4
20,716,968 UART: [art] Derive Key Pair
20,717,973 UART: [art] Store priv key in slot 0x5
23,144,465 UART: [art] Derive Key Pair - Done
23,157,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,619 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,124 UART: [art] PUB.X = 861EA455842FD1CF6AABEBCAF9B1DB6B2FC8091676F01D57BF8EDCA0457B77F2E2655B0F2EFFE38BAE84DF7B4DB5BCC6
24,872,486 UART: [art] PUB.Y = 0C92224AEBA736B9BA408DDA907C08444898971A3C5D93488C45A594D2BD5A4F475784A482C2B5E760BBA9CD829C9ACA
24,879,716 UART: [art] SIG.R = ABF7D7CCBEEC48E4DFD4CCC89490F584B9A484259F6D07D136C356032113836166DD9858177918B8C6131BA2B0F23685
24,887,104 UART: [art] SIG.S = 2FC01F5C8DECDE8EFB097AAAA29A3AD10E5764C98F0B2BD31DDF0C495CD1CC77DB52959B5AD87503B69F5F5D97FE686D
25,866,755 UART: Caliptra RT
25,867,452 UART: [state] CFI Enabled
26,000,256 UART: [rt] RT listening for mailbox commands...
26,004,208 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,048,730 UART: [rt]cmd =0x4c4d5356, len=1672
26,495,022 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,231 writing to cptra_bootfsm_go
3,778,356 ready_for_fw is high
3,778,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,915 >>> mbox cmd response: success
18,694,775 UART:
18,695,209 UART: Running Caliptra FMC ...
18,696,316 UART:
18,696,472 UART: [state] CFI Enabled
18,704,262 UART: [fht] FMC Alias Private Key: 7
20,470,280 UART: [art] Extend RT PCRs Done
20,471,508 UART: [art] Lock RT PCRs Done
20,473,265 UART: [art] Populate DV Done
20,478,522 UART: [fht] FMC Alias Private Key: 7
20,480,028 UART: [art] Derive CDI
20,480,774 UART: [art] Store in slot 0x4
20,523,432 UART: [art] Derive Key Pair
20,524,476 UART: [art] Store priv key in slot 0x5
22,950,983 UART: [art] Derive Key Pair - Done
22,963,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,743 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,241 UART: [art] PUB.X = 95710B535CBA6DDD75FA58E716D8724141AE61ECB42069FBDA717383C6C4FF80E849418E0396C72300205DC0BB8E3C43
24,678,510 UART: [art] PUB.Y = 7AB3CC858AC5F64045CA140479BCC3653202460181E098109B0AA756ECEE9029B1AB9C933CAB364468CD0BAAD01EFCB8
24,685,716 UART: [art] SIG.R = 42B64E2E20F160E2300980C8724C044389476A576CACB0E8A5DEFBF977BE5FC5525D5492A6C81F59EE2E5CA9E640B007
24,693,126 UART: [art] SIG.S = 6C2635399ACC3EC7A0EA9D475D6FCBFF1D243EE37C771758ABE51E933BE5D2E4FD7E516B9D6B4EFC4F39DA2E50BDE1FE
25,672,360 UART: Caliptra RT
25,673,063 UART: [state] CFI Enabled
25,805,523 UART: [rt] RT listening for mailbox commands...
25,809,448 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,853,969 UART: [rt]cmd =0x4c4d5356, len=1672
26,300,357 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,066 UART:
192,439 UART: Running Caliptra ROM ...
193,616 UART:
193,770 UART: [state] CFI Enabled
263,298 UART: [state] LifecycleState = Unprovisioned
265,359 UART: [state] DebugLocked = No
267,887 UART: [state] WD Timer not started. Device not locked for debugging
271,567 UART: [kat] SHA2-256
461,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,228 UART: [kat] ++
472,705 UART: [kat] sha1
483,654 UART: [kat] SHA2-256
486,662 UART: [kat] SHA2-384
493,415 UART: [kat] SHA2-512-ACC
496,013 UART: [kat] ECC-384
2,948,951 UART: [kat] HMAC-384Kdf
2,972,283 UART: [kat] LMS
3,504,011 UART: [kat] --
3,508,103 UART: [cold-reset] ++
3,509,261 UART: [fht] FHT @ 0x50003400
3,519,597 UART: [idev] ++
3,520,228 UART: [idev] CDI.KEYID = 6
3,521,213 UART: [idev] SUBJECT.KEYID = 7
3,522,380 UART: [idev] UDS.KEYID = 0
3,523,426 ready_for_fw is high
3,523,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,802 UART: [idev] Erasing UDS.KEYID = 0
6,029,590 UART: [idev] Sha1 KeyId Algorithm
6,051,075 UART: [idev] --
6,055,573 UART: [ldev] ++
6,056,298 UART: [ldev] CDI.KEYID = 6
6,057,221 UART: [ldev] SUBJECT.KEYID = 5
6,058,271 UART: [ldev] AUTHORITY.KEYID = 7
6,059,557 UART: [ldev] FE.KEYID = 1
6,100,555 UART: [ldev] Erasing FE.KEYID = 1
8,612,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,607 UART: [ldev] --
10,414,515 UART: [fwproc] Wait for Commands...
10,416,503 UART: [fwproc] Recv command 0x46574c44
10,418,809 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,429 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,013 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,632 >>> mbox cmd response: success
14,683,365 UART: [afmc] ++
14,684,098 UART: [afmc] CDI.KEYID = 6
14,685,298 UART: [afmc] SUBJECT.KEYID = 7
14,686,756 UART: [afmc] AUTHORITY.KEYID = 5
17,213,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,343 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,398 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,544 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,489 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,626 UART: [afmc] --
19,012,499 UART: [cold-reset] --
19,016,128 UART: [state] Locking Datavault
19,021,236 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,389 UART: [state] Locking ICCM
19,024,735 UART: [exit] Launching FMC @ 0x40000130
19,033,416 UART:
19,033,653 UART: Running Caliptra FMC ...
19,034,754 UART:
19,034,914 UART: [state] CFI Enabled
19,095,010 UART: [fht] FMC Alias Private Key: 7
20,861,529 UART: [art] Extend RT PCRs Done
20,862,749 UART: [art] Lock RT PCRs Done
20,864,342 UART: [art] Populate DV Done
20,869,693 UART: [fht] FMC Alias Private Key: 7
20,871,192 UART: [art] Derive CDI
20,871,927 UART: [art] Store in slot 0x4
20,928,139 UART: [art] Derive Key Pair
20,929,131 UART: [art] Store priv key in slot 0x5
23,391,167 UART: [art] Derive Key Pair - Done
23,404,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,947 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,456 UART: [art] PUB.X = 05826E64349FE62B98BE39C96F56517F18C9B270963FBBEA66C99785D09E979F68160BAF7C431B024D01A2478091DAE6
25,126,679 UART: [art] PUB.Y = DC4826F2CD2157786A240693E8597BE7174D95F1C359864D8A0BC22FDAEFAA6195A26341C99ACDEB92B0790C5403CAB9
25,133,897 UART: [art] SIG.R = 9475E93DE74F6FFF639BDA6FCD6B763247636583152E740232AFEB5B7A44299900B1F753021AB610E2F2A953CC2E9FD5
25,141,269 UART: [art] SIG.S = 97D3EEA0C28FC8C368944B7B8402C2CC41C05DE6CD74B15E5C4A01EF82B75C0E3831DC17E64D0C6E8403C92961FDFC0A
26,119,838 UART: Caliptra RT
26,120,531 UART: [state] CFI Enabled
26,299,900 UART: [rt] RT listening for mailbox commands...
26,303,800 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,348,399 UART: [rt]cmd =0x4c4d5356, len=1672
26,794,754 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,447,183 ready_for_fw is high
3,447,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,835,041 >>> mbox cmd response: success
19,119,343 UART:
19,119,770 UART: Running Caliptra FMC ...
19,120,892 UART:
19,121,044 UART: [state] CFI Enabled
19,186,887 UART: [fht] FMC Alias Private Key: 7
20,973,896 UART: [art] Extend RT PCRs Done
20,975,116 UART: [art] Lock RT PCRs Done
20,977,036 UART: [art] Populate DV Done
20,982,611 UART: [fht] FMC Alias Private Key: 7
20,984,233 UART: [art] Derive CDI
20,984,974 UART: [art] Store in slot 0x4
21,039,902 UART: [art] Derive Key Pair
21,040,908 UART: [art] Store priv key in slot 0x5
23,503,538 UART: [art] Derive Key Pair - Done
23,516,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,229,050 UART: [art] Erasing AUTHORITY.KEYID = 7
25,230,566 UART: [art] PUB.X = 48B91F46ED8821E56F8B102BAC6DA22885A47A63CE9C65A44F6DF03DE92807AC80E9B355F62F23219870BC12B305AF78
25,237,790 UART: [art] PUB.Y = 3360EDE879FE6ED120AB5B7E800A477759C1003F5D3FB989DD0A64FCDCCB9CEE1F1660AAC1BDA86B43E92C08E3DCE0C8
25,245,069 UART: [art] SIG.R = 7D44A5925BE4C6F07A26942226579F2242670AA5228EA075CFE2C994910657E592BD38A9E395CEECAA2EA18335963E71
25,252,445 UART: [art] SIG.S = 41665DE8767EE2A3AE9E22BB93C0FEE39D11BD11F046FE29117982A74408B212D60BD6613466E490AAD7B80335E468C6
26,231,495 UART: Caliptra RT
26,232,186 UART: [state] CFI Enabled
26,412,805 UART: [rt] RT listening for mailbox commands...
26,416,913 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,461,318 UART: [rt]cmd =0x4c4d5356, len=1672
26,907,806 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,499 UART:
192,865 UART: Running Caliptra ROM ...
193,973 UART:
603,850 UART: [state] CFI Enabled
619,174 UART: [state] LifecycleState = Unprovisioned
621,588 UART: [state] DebugLocked = No
623,112 UART: [state] WD Timer not started. Device not locked for debugging
626,884 UART: [kat] SHA2-256
816,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,362 UART: [kat] ++
827,883 UART: [kat] sha1
838,692 UART: [kat] SHA2-256
841,772 UART: [kat] SHA2-384
849,190 UART: [kat] SHA2-512-ACC
851,789 UART: [kat] ECC-384
3,291,657 UART: [kat] HMAC-384Kdf
3,305,809 UART: [kat] LMS
3,837,633 UART: [kat] --
3,841,419 UART: [cold-reset] ++
3,843,516 UART: [fht] FHT @ 0x50003400
3,854,714 UART: [idev] ++
3,855,423 UART: [idev] CDI.KEYID = 6
3,856,380 UART: [idev] SUBJECT.KEYID = 7
3,857,554 UART: [idev] UDS.KEYID = 0
3,858,463 ready_for_fw is high
3,858,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,496 UART: [idev] Erasing UDS.KEYID = 0
6,331,640 UART: [idev] Sha1 KeyId Algorithm
6,354,764 UART: [idev] --
6,359,734 UART: [ldev] ++
6,360,418 UART: [ldev] CDI.KEYID = 6
6,361,308 UART: [ldev] SUBJECT.KEYID = 5
6,362,523 UART: [ldev] AUTHORITY.KEYID = 7
6,363,756 UART: [ldev] FE.KEYID = 1
6,373,298 UART: [ldev] Erasing FE.KEYID = 1
8,852,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,335 UART: [ldev] --
10,640,967 UART: [fwproc] Wait for Commands...
10,643,019 UART: [fwproc] Recv command 0x46574c44
10,645,336 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,020 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,186 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,917 >>> mbox cmd response: success
14,915,942 UART: [afmc] ++
14,916,674 UART: [afmc] CDI.KEYID = 6
14,917,882 UART: [afmc] SUBJECT.KEYID = 7
14,919,358 UART: [afmc] AUTHORITY.KEYID = 5
17,422,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,946 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,066 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,214 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,110 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,504 UART: [afmc] --
19,218,106 UART: [cold-reset] --
19,222,301 UART: [state] Locking Datavault
19,228,702 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,863 UART: [state] Locking ICCM
19,233,565 UART: [exit] Launching FMC @ 0x40000130
19,242,207 UART:
19,242,450 UART: Running Caliptra FMC ...
19,243,557 UART:
19,243,741 UART: [state] CFI Enabled
19,252,172 UART: [fht] FMC Alias Private Key: 7
21,018,565 UART: [art] Extend RT PCRs Done
21,019,796 UART: [art] Lock RT PCRs Done
21,021,572 UART: [art] Populate DV Done
21,026,940 UART: [fht] FMC Alias Private Key: 7
21,028,596 UART: [art] Derive CDI
21,029,341 UART: [art] Store in slot 0x4
21,072,158 UART: [art] Derive Key Pair
21,073,168 UART: [art] Store priv key in slot 0x5
23,499,973 UART: [art] Derive Key Pair - Done
23,512,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,143 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,652 UART: [art] PUB.X = A54A3A219E4AA2E12C4C2E5BBEA6E71A5909E21545580A4611DFBE4A69706F9CA45567B5DB30102A1E413E23E18BC2E0
25,227,923 UART: [art] PUB.Y = 10A89C8AB60F554773243BFF0DFF2A9BBDAC21E15FA7323479BF0E2969A65A7971F9EFEC0CE046014BDFCF001E29FC31
25,235,176 UART: [art] SIG.R = 5BF350204033A551C6D54C65A18878FC234E54CF4BFC20BAB9880C5DE19837C3E5CE5BD336B57598C4B4BA480C905E3B
25,242,628 UART: [art] SIG.S = B38A6D1B698CB442214871DCB146C73066042EF3DC86B34C6D8CB313F45964CAAFCA109184F7B55BDF15AB5041975015
26,221,306 UART: Caliptra RT
26,222,002 UART: [state] CFI Enabled
26,353,919 UART: [rt] RT listening for mailbox commands...
26,357,850 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,402,105 UART: [rt]cmd =0x4c4d5356, len=1672
26,848,318 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,758,434 ready_for_fw is high
3,758,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,012 >>> mbox cmd response: success
19,296,458 UART:
19,296,870 UART: Running Caliptra FMC ...
19,297,978 UART:
19,298,140 UART: [state] CFI Enabled
19,305,520 UART: [fht] FMC Alias Private Key: 7
21,072,181 UART: [art] Extend RT PCRs Done
21,073,425 UART: [art] Lock RT PCRs Done
21,074,985 UART: [art] Populate DV Done
21,080,519 UART: [fht] FMC Alias Private Key: 7
21,082,070 UART: [art] Derive CDI
21,082,815 UART: [art] Store in slot 0x4
21,125,813 UART: [art] Derive Key Pair
21,126,858 UART: [art] Store priv key in slot 0x5
23,553,348 UART: [art] Derive Key Pair - Done
23,566,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,273,021 UART: [art] Erasing AUTHORITY.KEYID = 7
25,274,539 UART: [art] PUB.X = 798B1D9FB6DE7B81C0E2F18973E33F4851311BA6F6496BB653FE2316425E9876495F0D48D1D3385C9FF05A3ED213D3DA
25,281,807 UART: [art] PUB.Y = 14EC02B18C9344D50F5F40DAD0CD371859BE8BD20A1F0780DA8DFA65F9B223E609F33DF9DB1DF6F21B122D804FB80601
25,289,097 UART: [art] SIG.R = 6934D31757C61FFA6F6BCD6C005E00BE06CA199760981F4DEA8A69BC5A168B97F76E1FBD79B422EB975CB721DCEBE584
25,296,468 UART: [art] SIG.S = DAC7348737F814F0C259AA2711BEB4267FCC72DAD9B90212B7F4633D3DFCAC8BA8F44F07024B8D722375130A0B3CA956
26,274,907 UART: Caliptra RT
26,275,619 UART: [state] CFI Enabled
26,408,202 UART: [rt] RT listening for mailbox commands...
26,412,147 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,456,684 UART: [rt]cmd =0x4c4d5356, len=1672
26,903,119 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,141 UART: [kat] SHA2-256
882,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,187 UART: [kat] ++
886,339 UART: [kat] sha1
890,521 UART: [kat] SHA2-256
892,459 UART: [kat] SHA2-384
895,112 UART: [kat] SHA2-512-ACC
897,013 UART: [kat] ECC-384
902,530 UART: [kat] HMAC-384Kdf
907,280 UART: [kat] LMS
1,475,476 UART: [kat] --
1,476,391 UART: [cold-reset] ++
1,476,927 UART: [fht] Storing FHT @ 0x50003400
1,479,750 UART: [idev] ++
1,479,918 UART: [idev] CDI.KEYID = 6
1,480,278 UART: [idev] SUBJECT.KEYID = 7
1,480,702 UART: [idev] UDS.KEYID = 0
1,481,047 ready_for_fw is high
1,481,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,978 UART: [idev] Erasing UDS.KEYID = 0
1,505,612 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,232 UART: [idev] --
1,515,371 UART: [ldev] ++
1,515,539 UART: [ldev] CDI.KEYID = 6
1,515,902 UART: [ldev] SUBJECT.KEYID = 5
1,516,328 UART: [ldev] AUTHORITY.KEYID = 7
1,516,791 UART: [ldev] FE.KEYID = 1
1,521,979 UART: [ldev] Erasing FE.KEYID = 1
1,546,626 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,198 UART: [ldev] --
1,585,677 UART: [fwproc] Waiting for Commands...
1,586,526 UART: [fwproc] Received command 0x46574c44
1,587,317 UART: [fwproc] Received Image of size 118548 bytes
2,932,219 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,071 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,289 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,638 >>> mbox cmd response: success
3,132,774 UART: [afmc] ++
3,132,942 UART: [afmc] CDI.KEYID = 6
3,133,304 UART: [afmc] SUBJECT.KEYID = 7
3,133,729 UART: [afmc] AUTHORITY.KEYID = 5
3,168,524 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,200 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,980 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,689 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,572 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,255 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,105 UART: [afmc] --
3,212,109 UART: [cold-reset] --
3,213,135 UART: [state] Locking Datavault
3,214,080 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,684 UART: [state] Locking ICCM
3,215,280 UART: [exit] Launching FMC @ 0x40000130
3,220,610 UART:
3,220,626 UART: Running Caliptra FMC ...
3,221,034 UART:
3,221,088 UART: [state] CFI Enabled
3,231,706 UART: [fht] FMC Alias Private Key: 7
3,350,740 UART: [art] Extend RT PCRs Done
3,351,168 UART: [art] Lock RT PCRs Done
3,352,782 UART: [art] Populate DV Done
3,361,147 UART: [fht] FMC Alias Private Key: 7
3,362,121 UART: [art] Derive CDI
3,362,401 UART: [art] Store in slot 0x4
3,447,901 UART: [art] Derive Key Pair
3,448,261 UART: [art] Store priv key in slot 0x5
3,461,764 UART: [art] Derive Key Pair - Done
3,476,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,032 UART: [art] PUB.X = B08B629F825113E6350B7653577AB5824882ECDE185D8231C72F10F4657000C976C8F47097BB4592B0BF5C8A116022CA
3,499,769 UART: [art] PUB.Y = A0597C8C65DBF1FBBD344EFD505EEAA3CC8F7F66613B5D629459BDEECFC8A295209B6B9B5DF78BD68A31FE8CF1CFEE2E
3,506,753 UART: [art] SIG.R = EC978E9B751018083F100A0F023945DE1870BDD6311B694083C5FF833A17A9D49D0D0FDBB7736937F0C80470F0414242
3,513,496 UART: [art] SIG.S = F6FDA7D77A0043C34AD3D0084C44CBF29D874F2F05DA7D0AFB6C779A6FE01E6CAA3C524AF323FE11B8A3A5F657081FF6
3,536,526 UART: Caliptra RT
3,536,777 UART: [state] CFI Enabled
3,657,286 UART: [rt] RT listening for mailbox commands...
3,657,956 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,716 UART: [rt]cmd =0x4c4d5356, len=1672
5,498,230 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,273 ready_for_fw is high
1,363,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,881 >>> mbox cmd response: success
3,043,348 UART:
3,043,364 UART: Running Caliptra FMC ...
3,043,772 UART:
3,043,826 UART: [state] CFI Enabled
3,054,394 UART: [fht] FMC Alias Private Key: 7
3,173,208 UART: [art] Extend RT PCRs Done
3,173,636 UART: [art] Lock RT PCRs Done
3,174,918 UART: [art] Populate DV Done
3,183,289 UART: [fht] FMC Alias Private Key: 7
3,184,273 UART: [art] Derive CDI
3,184,553 UART: [art] Store in slot 0x4
3,270,761 UART: [art] Derive Key Pair
3,271,121 UART: [art] Store priv key in slot 0x5
3,283,692 UART: [art] Derive Key Pair - Done
3,298,173 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,708 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,473 UART: [art] PUB.X = 40223FE19AC3CD57A0747C695C53372AF0B89CE84CB72E43DBDCC233E55EA25573B9845BE8307F40CC3D2DBA4AFA156E
3,321,259 UART: [art] PUB.Y = 9DD639ADD07F4AED9C67FA7363811271D5E474C5868A6E0BCFA777EF9DBDEAAE0785A8E94CF92C66DA7241296A42F71B
3,328,221 UART: [art] SIG.R = 4942610BB5823189DB71C2D5EAA906952559566E620F3967C473F5A09BF61CA29351CCFFC9C142661685FFADF65E5887
3,334,980 UART: [art] SIG.S = 9739CC234293F922EE6084CDE9035B786D68DF69251B9654FF9D221A1EA466FAE772270A6A4FBF3B56DDE0626A156A84
3,358,928 UART: Caliptra RT
3,359,179 UART: [state] CFI Enabled
3,479,651 UART: [rt] RT listening for mailbox commands...
3,480,321 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,945 UART: [rt]cmd =0x4c4d5356, len=1672
5,320,531 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,428 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,072 UART: [kat] SHA2-256
882,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,118 UART: [kat] ++
886,270 UART: [kat] sha1
890,534 UART: [kat] SHA2-256
892,472 UART: [kat] SHA2-384
895,011 UART: [kat] SHA2-512-ACC
896,912 UART: [kat] ECC-384
902,683 UART: [kat] HMAC-384Kdf
907,423 UART: [kat] LMS
1,475,619 UART: [kat] --
1,476,168 UART: [cold-reset] ++
1,476,704 UART: [fht] Storing FHT @ 0x50003400
1,479,529 UART: [idev] ++
1,479,697 UART: [idev] CDI.KEYID = 6
1,480,057 UART: [idev] SUBJECT.KEYID = 7
1,480,481 UART: [idev] UDS.KEYID = 0
1,480,826 ready_for_fw is high
1,480,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,757 UART: [idev] Erasing UDS.KEYID = 0
1,505,313 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,983 UART: [idev] --
1,514,900 UART: [ldev] ++
1,515,068 UART: [ldev] CDI.KEYID = 6
1,515,431 UART: [ldev] SUBJECT.KEYID = 5
1,515,857 UART: [ldev] AUTHORITY.KEYID = 7
1,516,320 UART: [ldev] FE.KEYID = 1
1,521,434 UART: [ldev] Erasing FE.KEYID = 1
1,547,215 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,967 UART: [ldev] --
1,586,236 UART: [fwproc] Waiting for Commands...
1,587,095 UART: [fwproc] Received command 0x46574c44
1,587,886 UART: [fwproc] Received Image of size 118548 bytes
2,931,678 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,676 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,894 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,271 >>> mbox cmd response: success
3,132,527 UART: [afmc] ++
3,132,695 UART: [afmc] CDI.KEYID = 6
3,133,057 UART: [afmc] SUBJECT.KEYID = 7
3,133,482 UART: [afmc] AUTHORITY.KEYID = 5
3,169,233 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,525 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,305 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,014 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,897 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,580 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,538 UART: [afmc] --
3,212,648 UART: [cold-reset] --
3,213,222 UART: [state] Locking Datavault
3,214,607 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,211 UART: [state] Locking ICCM
3,215,739 UART: [exit] Launching FMC @ 0x40000130
3,221,069 UART:
3,221,085 UART: Running Caliptra FMC ...
3,221,493 UART:
3,221,636 UART: [state] CFI Enabled
3,232,056 UART: [fht] FMC Alias Private Key: 7
3,350,798 UART: [art] Extend RT PCRs Done
3,351,226 UART: [art] Lock RT PCRs Done
3,352,578 UART: [art] Populate DV Done
3,360,923 UART: [fht] FMC Alias Private Key: 7
3,361,891 UART: [art] Derive CDI
3,362,171 UART: [art] Store in slot 0x4
3,448,085 UART: [art] Derive Key Pair
3,448,445 UART: [art] Store priv key in slot 0x5
3,462,336 UART: [art] Derive Key Pair - Done
3,477,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,827 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,592 UART: [art] PUB.X = BFC6C0C0B30D363C2680B0F6299F825F8732C172C6D3196CA257B30E4131E3CDB8F6909F57D35D46157DD6D29FA077F8
3,500,360 UART: [art] PUB.Y = 95BC0E4124BDF64393F285F0AE3CD92A3C33257654CB9D004D3F9B22C613CB4C30E4D005B5409738C3490D68080FB7D0
3,507,275 UART: [art] SIG.R = 23535517269E312B9CD64CC408EDE46F6101C36492E56FC0B756B9DD45716528D91F075D5C82243907F422C198450830
3,514,016 UART: [art] SIG.S = AE724CC2342ED3F2A8223D09F86CDB96B2BCE3526BA7A1B49F54D129EE8ACEE7A966595CB5DD312BBA02285D5AE3C594
3,538,026 UART: Caliptra RT
3,538,369 UART: [state] CFI Enabled
3,659,097 UART: [rt] RT listening for mailbox commands...
3,659,767 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,501 UART: [rt]cmd =0x4c4d5356, len=1672
5,500,329 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,944 ready_for_fw is high
1,362,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,245 >>> mbox cmd response: success
3,045,380 UART:
3,045,396 UART: Running Caliptra FMC ...
3,045,804 UART:
3,045,947 UART: [state] CFI Enabled
3,056,791 UART: [fht] FMC Alias Private Key: 7
3,176,395 UART: [art] Extend RT PCRs Done
3,176,823 UART: [art] Lock RT PCRs Done
3,178,511 UART: [art] Populate DV Done
3,186,608 UART: [fht] FMC Alias Private Key: 7
3,187,782 UART: [art] Derive CDI
3,188,062 UART: [art] Store in slot 0x4
3,273,904 UART: [art] Derive Key Pair
3,274,264 UART: [art] Store priv key in slot 0x5
3,287,181 UART: [art] Derive Key Pair - Done
3,301,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,064 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,829 UART: [art] PUB.X = A64F8060C601CDEAC15906D00551C319BD92CA536C47B218228AC1158C2058A5255B2109D35EEC1AF74878FCCBD6012B
3,324,588 UART: [art] PUB.Y = DCCCB8C166BF340A18D0B5B4CCBD85B8C27C1D7C001775921153798F27E2BAF3024E51EA428BBA85109F749D5E76F126
3,331,520 UART: [art] SIG.R = A7CA064BA78F2A873367CF68CBC418EC4BAB0A5927D4F7F2FDD8E29538D63753744C93263A1C3BD53E4439FE249D03DC
3,338,293 UART: [art] SIG.S = AED5FB908184ADA873580509D320ED6F4E6D430502E9AFE9DE7D163B7860E694BE22333373602D37D5CDFB0BBE2C5400
3,362,410 UART: Caliptra RT
3,362,753 UART: [state] CFI Enabled
3,483,012 UART: [rt] RT listening for mailbox commands...
3,483,682 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,094 UART: [rt]cmd =0x4c4d5356, len=1672
5,323,624 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,680 UART: [kat] SHA2-256
901,620 UART: [kat] SHA2-384
904,339 UART: [kat] SHA2-512-ACC
906,240 UART: [kat] ECC-384
915,545 UART: [kat] HMAC-384Kdf
920,135 UART: [kat] LMS
1,168,447 UART: [kat] --
1,169,090 UART: [cold-reset] ++
1,169,502 UART: [fht] FHT @ 0x50003400
1,171,982 UART: [idev] ++
1,172,150 UART: [idev] CDI.KEYID = 6
1,172,511 UART: [idev] SUBJECT.KEYID = 7
1,172,936 UART: [idev] UDS.KEYID = 0
1,173,282 ready_for_fw is high
1,173,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,663 UART: [idev] Erasing UDS.KEYID = 0
1,197,061 UART: [idev] Sha1 KeyId Algorithm
1,205,939 UART: [idev] --
1,207,012 UART: [ldev] ++
1,207,180 UART: [ldev] CDI.KEYID = 6
1,207,544 UART: [ldev] SUBJECT.KEYID = 5
1,207,971 UART: [ldev] AUTHORITY.KEYID = 7
1,208,434 UART: [ldev] FE.KEYID = 1
1,213,630 UART: [ldev] Erasing FE.KEYID = 1
1,239,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,246 UART: [ldev] --
1,279,545 UART: [fwproc] Wait for Commands...
1,280,132 UART: [fwproc] Recv command 0x46574c44
1,280,865 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,055 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,230 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,822,563 >>> mbox cmd response: success
2,823,587 UART: [afmc] ++
2,823,755 UART: [afmc] CDI.KEYID = 6
2,824,118 UART: [afmc] SUBJECT.KEYID = 7
2,824,544 UART: [afmc] AUTHORITY.KEYID = 5
2,859,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,122 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,876,871 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,882,581 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,888,462 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,894,163 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,901,952 UART: [afmc] --
2,902,797 UART: [cold-reset] --
2,903,805 UART: [state] Locking Datavault
2,904,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,905,534 UART: [state] Locking ICCM
2,906,110 UART: [exit] Launching FMC @ 0x40000130
2,911,440 UART:
2,911,456 UART: Running Caliptra FMC ...
2,911,864 UART:
2,911,918 UART: [state] CFI Enabled
2,922,232 UART: [fht] FMC Alias Private Key: 7
3,041,596 UART: [art] Extend RT PCRs Done
3,042,024 UART: [art] Lock RT PCRs Done
3,043,564 UART: [art] Populate DV Done
3,051,823 UART: [fht] FMC Alias Private Key: 7
3,052,897 UART: [art] Derive CDI
3,053,177 UART: [art] Store in slot 0x4
3,138,698 UART: [art] Derive Key Pair
3,139,058 UART: [art] Store priv key in slot 0x5
3,152,356 UART: [art] Derive Key Pair - Done
3,167,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,007 UART: [art] PUB.X = A71C3353503079777259E66329D6717926AB97BCE7D0516E4F490EE93A6E4DD3870BA3EB032351C54394FF825BCC19D5
3,189,764 UART: [art] PUB.Y = 8146AA8162DCEA4E755075687DA491A8CA2FEEE2744377A645B861691502563F03D8EE689FDE56AD1B5C800F94B831C0
3,196,707 UART: [art] SIG.R = 268D2E688270974294AB00506EB582598086C167D6ABB34698EE724A20EF25F32AE9D19C5C4F2F07A54BBCFD333298B3
3,203,452 UART: [art] SIG.S = 6173268209D9CCC68C0CD90937A696765270E1D56E1A6BE61DF15A842CFCC909628EE482F5E8E6A10B6722786E52468A
3,226,935 UART: Caliptra RT
3,227,186 UART: [state] CFI Enabled
3,345,962 UART: [rt] RT listening for mailbox commands...
3,346,632 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,596 UART: [rt]cmd =0x4c4d5356, len=1672
3,940,794 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,828 ready_for_fw is high
1,058,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,808 >>> mbox cmd response: success
2,738,381 UART:
2,738,397 UART: Running Caliptra FMC ...
2,738,805 UART:
2,738,859 UART: [state] CFI Enabled
2,749,431 UART: [fht] FMC Alias Private Key: 7
2,868,539 UART: [art] Extend RT PCRs Done
2,868,967 UART: [art] Lock RT PCRs Done
2,870,657 UART: [art] Populate DV Done
2,878,710 UART: [fht] FMC Alias Private Key: 7
2,879,804 UART: [art] Derive CDI
2,880,084 UART: [art] Store in slot 0x4
2,966,327 UART: [art] Derive Key Pair
2,966,687 UART: [art] Store priv key in slot 0x5
2,979,529 UART: [art] Derive Key Pair - Done
2,994,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,650 UART: [art] PUB.X = F07019A30A84F4032A6D5F6B1AB1965E638E4641CCCC924D656EABE365966D764E52DA5DDFAA4DA49533502329C6EEA7
3,017,424 UART: [art] PUB.Y = 020D487B2C8604F101AC7B933926AEB0A6BEAE393332679AD4A8AF3808B00057D21C04438E04B0DA01946ED3708D8244
3,024,326 UART: [art] SIG.R = 8A27611A67B21B4BF501BEF149155623044BB398382AD3DA33A4403003B11552097AAD3FD22C4AD6325DFB917A53A1B2
3,031,084 UART: [art] SIG.S = 379A6814AA9B44EEE3F0190E27B3884BB0E72CC16A40CF9B166092F9BFFBC86C8829438C62A2D13D3B7E2A98F06D3835
3,054,947 UART: Caliptra RT
3,055,198 UART: [state] CFI Enabled
3,174,425 UART: [rt] RT listening for mailbox commands...
3,175,095 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,215,689 UART: [rt]cmd =0x4c4d5356, len=1672
3,768,699 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
899,743 UART: [kat] SHA2-256
901,683 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
915,702 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,729 UART: [cold-reset] ++
1,170,055 UART: [fht] FHT @ 0x50003400
1,172,745 UART: [idev] ++
1,172,913 UART: [idev] CDI.KEYID = 6
1,173,274 UART: [idev] SUBJECT.KEYID = 7
1,173,699 UART: [idev] UDS.KEYID = 0
1,174,045 ready_for_fw is high
1,174,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,062 UART: [idev] Erasing UDS.KEYID = 0
1,198,702 UART: [idev] Sha1 KeyId Algorithm
1,207,612 UART: [idev] --
1,208,677 UART: [ldev] ++
1,208,845 UART: [ldev] CDI.KEYID = 6
1,209,209 UART: [ldev] SUBJECT.KEYID = 5
1,209,636 UART: [ldev] AUTHORITY.KEYID = 7
1,210,099 UART: [ldev] FE.KEYID = 1
1,215,525 UART: [ldev] Erasing FE.KEYID = 1
1,242,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,363 UART: [ldev] --
1,281,698 UART: [fwproc] Wait for Commands...
1,282,415 UART: [fwproc] Recv command 0x46574c44
1,283,148 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,992 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,167 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,562 >>> mbox cmd response: success
2,827,626 UART: [afmc] ++
2,827,794 UART: [afmc] CDI.KEYID = 6
2,828,157 UART: [afmc] SUBJECT.KEYID = 7
2,828,583 UART: [afmc] AUTHORITY.KEYID = 5
2,864,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,506 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,097 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,798 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,503 UART: [afmc] --
2,907,496 UART: [cold-reset] --
2,908,300 UART: [state] Locking Datavault
2,909,701 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,305 UART: [state] Locking ICCM
2,910,845 UART: [exit] Launching FMC @ 0x40000130
2,916,175 UART:
2,916,191 UART: Running Caliptra FMC ...
2,916,599 UART:
2,916,742 UART: [state] CFI Enabled
2,927,414 UART: [fht] FMC Alias Private Key: 7
3,046,492 UART: [art] Extend RT PCRs Done
3,046,920 UART: [art] Lock RT PCRs Done
3,048,182 UART: [art] Populate DV Done
3,056,355 UART: [fht] FMC Alias Private Key: 7
3,057,381 UART: [art] Derive CDI
3,057,661 UART: [art] Store in slot 0x4
3,143,628 UART: [art] Derive Key Pair
3,143,988 UART: [art] Store priv key in slot 0x5
3,157,396 UART: [art] Derive Key Pair - Done
3,172,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,839 UART: [art] PUB.X = 90F7DF13DCD1D9ED83012AA383E79D2201AEF78DEE6E8E6A8CEE5B03ED785889CD203348E5DA74885C02B7335096F26B
3,195,609 UART: [art] PUB.Y = 7B2FA765E97920F55915CE83E7560B2DB84030728A58F484277E5FDE7939517E0DDA341493A34139BE3809898CFDEB95
3,202,546 UART: [art] SIG.R = D5D3C9A92779150DD8CA991061F788E96F0E10B2E8A4A4559E342F46174D11ED1EC792756DDE92CE6DA3543F1A6A9A7F
3,209,318 UART: [art] SIG.S = 608C907D6332F090F6DC990C5F72B631A02FCC3DA81AE37EBA4D8D544B867A492A9C543AECC2B6C0DE3369A7D16E0A7F
3,233,222 UART: Caliptra RT
3,233,565 UART: [state] CFI Enabled
3,353,716 UART: [rt] RT listening for mailbox commands...
3,354,386 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,140 UART: [rt]cmd =0x4c4d5356, len=1672
3,948,292 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,093 ready_for_fw is high
1,060,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,331 >>> mbox cmd response: success
2,742,028 UART:
2,742,044 UART: Running Caliptra FMC ...
2,742,452 UART:
2,742,595 UART: [state] CFI Enabled
2,753,085 UART: [fht] FMC Alias Private Key: 7
2,871,963 UART: [art] Extend RT PCRs Done
2,872,391 UART: [art] Lock RT PCRs Done
2,873,699 UART: [art] Populate DV Done
2,881,802 UART: [fht] FMC Alias Private Key: 7
2,882,984 UART: [art] Derive CDI
2,883,264 UART: [art] Store in slot 0x4
2,969,427 UART: [art] Derive Key Pair
2,969,787 UART: [art] Store priv key in slot 0x5
2,982,973 UART: [art] Derive Key Pair - Done
2,997,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,169 UART: [art] PUB.X = 6592DF83C42DFC258649B4643E897D713C1AECBD6860CF795BE4DB33F7072340FE428E61E2D07D11FB93A3017179A27F
3,020,937 UART: [art] PUB.Y = 63D68A8B2E02F8B276A408C844D2A90950E515769C90915EBA6CD4DD939DB46B9D0D43156A616F0DA829DEA35482F2B2
3,027,876 UART: [art] SIG.R = 12033C1CD7195DD52A211882117CBC786FF76DC7AE2525808D2794EB60D9C24CE1FBE88021CD9689B7D17B976A0C32ED
3,034,646 UART: [art] SIG.S = 7ED4C7BDFBD73D7086EE8227A72288C4CD6A49A685A8CEE5DCC63CBC71435DAED316CAEBF0FC450C469404951B0BB936
3,058,123 UART: Caliptra RT
3,058,466 UART: [state] CFI Enabled
3,176,784 UART: [rt] RT listening for mailbox commands...
3,177,454 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,048 UART: [rt]cmd =0x4c4d5356, len=1672
3,770,940 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
893,298 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,423 UART: [kat] ++
897,575 UART: [kat] sha1
901,779 UART: [kat] SHA2-256
903,719 UART: [kat] SHA2-384
906,536 UART: [kat] SHA2-512-ACC
908,437 UART: [kat] ECC-384
918,260 UART: [kat] HMAC-384Kdf
922,734 UART: [kat] LMS
1,171,062 UART: [kat] --
1,171,869 UART: [cold-reset] ++
1,172,409 UART: [fht] FHT @ 0x50003400
1,175,080 UART: [idev] ++
1,175,248 UART: [idev] CDI.KEYID = 6
1,175,608 UART: [idev] SUBJECT.KEYID = 7
1,176,032 UART: [idev] UDS.KEYID = 0
1,176,377 ready_for_fw is high
1,176,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,928 UART: [idev] Erasing UDS.KEYID = 0
1,201,035 UART: [idev] Sha1 KeyId Algorithm
1,209,459 UART: [idev] --
1,210,567 UART: [ldev] ++
1,210,735 UART: [ldev] CDI.KEYID = 6
1,211,098 UART: [ldev] SUBJECT.KEYID = 5
1,211,524 UART: [ldev] AUTHORITY.KEYID = 7
1,211,987 UART: [ldev] FE.KEYID = 1
1,217,489 UART: [ldev] Erasing FE.KEYID = 1
1,244,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,265 UART: [ldev] --
1,283,724 UART: [fwproc] Wait for Commands...
1,284,490 UART: [fwproc] Recv command 0x46574c44
1,285,218 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,592 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,762 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,115 >>> mbox cmd response: success
2,829,201 UART: [afmc] ++
2,829,369 UART: [afmc] CDI.KEYID = 6
2,829,731 UART: [afmc] SUBJECT.KEYID = 7
2,830,156 UART: [afmc] AUTHORITY.KEYID = 5
2,865,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,008 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,717 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,600 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,301 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,213 UART: [afmc] --
2,909,315 UART: [cold-reset] --
2,910,333 UART: [state] Locking Datavault
2,911,078 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,682 UART: [state] Locking ICCM
2,912,266 UART: [exit] Launching FMC @ 0x40000130
2,917,596 UART:
2,917,612 UART: Running Caliptra FMC ...
2,918,020 UART:
2,918,074 UART: [state] CFI Enabled
2,928,562 UART: [fht] FMC Alias Private Key: 7
3,047,512 UART: [art] Extend RT PCRs Done
3,047,940 UART: [art] Lock RT PCRs Done
3,049,346 UART: [art] Populate DV Done
3,057,631 UART: [fht] FMC Alias Private Key: 7
3,058,755 UART: [art] Derive CDI
3,059,035 UART: [art] Store in slot 0x4
3,145,084 UART: [art] Derive Key Pair
3,145,444 UART: [art] Store priv key in slot 0x5
3,159,098 UART: [art] Derive Key Pair - Done
3,174,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,312 UART: [art] PUB.X = 01D08DF196CAF33AA8F8613346216341F59083E6472C94CDF1C93BC4D350D6E82844359743C748E9FC23625ED4020755
3,197,065 UART: [art] PUB.Y = 761C6BEC9DBD59B6855810C482066414F3CEC6568F2D289FA8392F0771ED3415DB90051B56D5EC29FADDAC2C65DCD546
3,204,016 UART: [art] SIG.R = F594B073446448163FA897CD65B27774243DA7E7B9BC1EA3EFE50BC5A442A8C8ED8C6CB9AB828F20758E1CFC82AEF072
3,210,797 UART: [art] SIG.S = 41D3610E1F2930B089F0982A39067CE1FF617339ADD97ACCB8ED3896A37923270D7806CCF2490FA4E91143AAA35B6298
3,234,772 UART: Caliptra RT
3,235,023 UART: [state] CFI Enabled
3,355,116 UART: [rt] RT listening for mailbox commands...
3,355,786 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,488 UART: [rt]cmd =0x4c4d5356, len=1672
3,949,622 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,613 ready_for_fw is high
1,060,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,408 >>> mbox cmd response: success
2,743,437 UART:
2,743,453 UART: Running Caliptra FMC ...
2,743,861 UART:
2,743,915 UART: [state] CFI Enabled
2,754,371 UART: [fht] FMC Alias Private Key: 7
2,873,803 UART: [art] Extend RT PCRs Done
2,874,231 UART: [art] Lock RT PCRs Done
2,876,101 UART: [art] Populate DV Done
2,884,608 UART: [fht] FMC Alias Private Key: 7
2,885,780 UART: [art] Derive CDI
2,886,060 UART: [art] Store in slot 0x4
2,971,909 UART: [art] Derive Key Pair
2,972,269 UART: [art] Store priv key in slot 0x5
2,985,107 UART: [art] Derive Key Pair - Done
2,999,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,034 UART: [art] PUB.X = 93A8A9D3CD4ECA0F324B922AEDD9EA96F4D88DAA25B075BC3B6E6CF28E91B4FF3924F9858D06D33F18B9B49258421F1C
3,022,816 UART: [art] PUB.Y = 1D2393967BE2A5A9B95728EA0C1643BE5C7C6E2469CAC92E5C25A95A15C3CDAD215A07F6845AF0EFB20379A8CDE53F28
3,029,771 UART: [art] SIG.R = 435938C0973B6AA5646FCB3EB83C764B166789041F7B3A3B39E79FB2A49614DAD6A3AD43696133E75F9146555023EEC1
3,036,536 UART: [art] SIG.S = 788D2B59E4E042907E3DFFDF9A918E70F45CCD0DB9407D3D85D7CA3ED150D8F8C80357E6A8362EC173EB6ABEC57C599F
3,059,958 UART: Caliptra RT
3,060,209 UART: [state] CFI Enabled
3,179,853 UART: [rt] RT listening for mailbox commands...
3,180,523 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,693 UART: [rt]cmd =0x4c4d5356, len=1672
3,773,999 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
893,655 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,780 UART: [kat] ++
897,932 UART: [kat] sha1
902,080 UART: [kat] SHA2-256
904,020 UART: [kat] SHA2-384
906,897 UART: [kat] SHA2-512-ACC
908,798 UART: [kat] ECC-384
918,687 UART: [kat] HMAC-384Kdf
923,429 UART: [kat] LMS
1,171,757 UART: [kat] --
1,172,578 UART: [cold-reset] ++
1,173,126 UART: [fht] FHT @ 0x50003400
1,175,717 UART: [idev] ++
1,175,885 UART: [idev] CDI.KEYID = 6
1,176,245 UART: [idev] SUBJECT.KEYID = 7
1,176,669 UART: [idev] UDS.KEYID = 0
1,177,014 ready_for_fw is high
1,177,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,521 UART: [idev] Erasing UDS.KEYID = 0
1,201,340 UART: [idev] Sha1 KeyId Algorithm
1,209,872 UART: [idev] --
1,210,932 UART: [ldev] ++
1,211,100 UART: [ldev] CDI.KEYID = 6
1,211,463 UART: [ldev] SUBJECT.KEYID = 5
1,211,889 UART: [ldev] AUTHORITY.KEYID = 7
1,212,352 UART: [ldev] FE.KEYID = 1
1,217,308 UART: [ldev] Erasing FE.KEYID = 1
1,244,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,778 UART: [ldev] --
1,283,281 UART: [fwproc] Wait for Commands...
1,284,019 UART: [fwproc] Recv command 0x46574c44
1,284,747 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,747 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,917 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,066 >>> mbox cmd response: success
2,829,292 UART: [afmc] ++
2,829,460 UART: [afmc] CDI.KEYID = 6
2,829,822 UART: [afmc] SUBJECT.KEYID = 7
2,830,247 UART: [afmc] AUTHORITY.KEYID = 5
2,864,822 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,934 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,817 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,518 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,450 UART: [afmc] --
2,908,520 UART: [cold-reset] --
2,909,358 UART: [state] Locking Datavault
2,910,757 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,361 UART: [state] Locking ICCM
2,911,889 UART: [exit] Launching FMC @ 0x40000130
2,917,219 UART:
2,917,235 UART: Running Caliptra FMC ...
2,917,643 UART:
2,917,786 UART: [state] CFI Enabled
2,928,626 UART: [fht] FMC Alias Private Key: 7
3,047,146 UART: [art] Extend RT PCRs Done
3,047,574 UART: [art] Lock RT PCRs Done
3,049,388 UART: [art] Populate DV Done
3,057,617 UART: [fht] FMC Alias Private Key: 7
3,058,663 UART: [art] Derive CDI
3,058,943 UART: [art] Store in slot 0x4
3,144,654 UART: [art] Derive Key Pair
3,145,014 UART: [art] Store priv key in slot 0x5
3,157,654 UART: [art] Derive Key Pair - Done
3,172,198 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,976 UART: [art] PUB.X = 2F5E8E6A519A7AC64B88F8FDF3685DB3811AA37DDD7F2837621B4AC9536616048497465654EBAB5796BA4CA589F19BE2
3,195,749 UART: [art] PUB.Y = C6DE7DB407D86543E81D20443347E7080578078A53BEC2F3C3722AD1E0E3F2F48642833037EC9E4CE620612F64108E09
3,202,678 UART: [art] SIG.R = 4EB0419F924E8DBE2BB5B1B6DDFF823577C0D357D608C245505647948C789C840F0286EEFB334F24764A771DDC660A73
3,209,438 UART: [art] SIG.S = BE091423DADEB17DEA2BCD3B524E3172AAFA839A41C35B38ACDE2DEE76CD633F6D2F94B39E7FEEFC3EE52D403A9DECA6
3,233,327 UART: Caliptra RT
3,233,670 UART: [state] CFI Enabled
3,352,011 UART: [rt] RT listening for mailbox commands...
3,352,681 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,435 UART: [rt]cmd =0x4c4d5356, len=1672
3,946,515 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,258 ready_for_fw is high
1,060,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,173 >>> mbox cmd response: success
2,742,018 UART:
2,742,034 UART: Running Caliptra FMC ...
2,742,442 UART:
2,742,585 UART: [state] CFI Enabled
2,753,259 UART: [fht] FMC Alias Private Key: 7
2,872,003 UART: [art] Extend RT PCRs Done
2,872,431 UART: [art] Lock RT PCRs Done
2,874,259 UART: [art] Populate DV Done
2,882,430 UART: [fht] FMC Alias Private Key: 7
2,883,462 UART: [art] Derive CDI
2,883,742 UART: [art] Store in slot 0x4
2,969,243 UART: [art] Derive Key Pair
2,969,603 UART: [art] Store priv key in slot 0x5
2,983,143 UART: [art] Derive Key Pair - Done
2,998,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,742 UART: [art] PUB.X = CA77528D2E07C43E865B3985D3864AF7BC7D3BCC8DC52E3B6A7CE6C5A4A4CB8F61C007325759B63F806F71A735EA268E
3,021,518 UART: [art] PUB.Y = 7E0F6C44EF8CC85A3FF85E64A90159B51F2C7DB50122C5D7FBEFB4CF1E55F813F734BFED180C5811A37A120C07BB3BE5
3,028,470 UART: [art] SIG.R = E9708D81BB74851D25427820B6F62FDC09F24DA6600132B5BEE9430E0F055605C55986262541EC845EE82D2C38345E03
3,035,211 UART: [art] SIG.S = 27090969999C0C966E55DF62E033033473E3AFCDA44AF8AF94236D437550E4973339D3FB69616D9404F95B1D2CE71CE9
3,058,716 UART: Caliptra RT
3,059,059 UART: [state] CFI Enabled
3,179,138 UART: [rt] RT listening for mailbox commands...
3,179,808 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,734 UART: [rt]cmd =0x4c4d5356, len=1672
3,773,634 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,161 UART:
192,538 UART: Running Caliptra ROM ...
193,739 UART:
193,891 UART: [state] CFI Enabled
264,508 UART: [state] LifecycleState = Unprovisioned
266,411 UART: [state] DebugLocked = No
268,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,598 UART: [kat] SHA2-256
443,274 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,804 UART: [kat] ++
454,337 UART: [kat] sha1
464,791 UART: [kat] SHA2-256
467,504 UART: [kat] SHA2-384
473,700 UART: [kat] SHA2-512-ACC
476,002 UART: [kat] ECC-384
2,768,943 UART: [kat] HMAC-384Kdf
2,800,082 UART: [kat] LMS
3,990,381 UART: [kat] --
3,993,556 UART: [cold-reset] ++
3,994,651 UART: [fht] Storing FHT @ 0x50003400
4,006,615 UART: [idev] ++
4,007,231 UART: [idev] CDI.KEYID = 6
4,008,136 UART: [idev] SUBJECT.KEYID = 7
4,009,188 UART: [idev] UDS.KEYID = 0
4,010,231 ready_for_fw is high
4,010,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,510 UART: [idev] Erasing UDS.KEYID = 0
7,344,592 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,764 UART: [idev] --
7,370,676 UART: [ldev] ++
7,371,273 UART: [ldev] CDI.KEYID = 6
7,372,240 UART: [ldev] SUBJECT.KEYID = 5
7,373,469 UART: [ldev] AUTHORITY.KEYID = 7
7,374,703 UART: [ldev] FE.KEYID = 1
7,423,046 UART: [ldev] Erasing FE.KEYID = 1
10,756,746 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,924 UART: [ldev] --
13,137,656 UART: [fwproc] Waiting for Commands...
13,140,294 UART: [fwproc] Received command 0x46574c44
13,142,475 UART: [fwproc] Received Image of size 118548 bytes
17,249,565 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,325,316 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,398,489 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,726,805 >>> mbox cmd response: success
17,730,483 UART: [afmc] ++
17,731,104 UART: [afmc] CDI.KEYID = 6
17,731,993 UART: [afmc] SUBJECT.KEYID = 7
17,733,264 UART: [afmc] AUTHORITY.KEYID = 5
21,093,614 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,391,950 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,394,216 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,408,660 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,423,366 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,437,789 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,242 UART: [afmc] --
23,464,118 UART: [cold-reset] --
23,468,362 UART: [state] Locking Datavault
23,473,399 UART: [state] Locking PCR0, PCR1 and PCR31
23,475,102 UART: [state] Locking ICCM
23,477,522 UART: [exit] Launching FMC @ 0x40000130
23,485,889 UART:
23,486,126 UART: Running Caliptra FMC ...
23,487,227 UART:
23,487,398 UART: [state] CFI Enabled
23,550,986 UART: [fht] FMC Alias Private Key: 7
25,891,196 UART: [art] Extend RT PCRs Done
25,892,431 UART: [art] Lock RT PCRs Done
25,894,031 UART: [art] Populate DV Done
25,899,664 UART: [fht] FMC Alias Private Key: 7
25,901,202 UART: [art] Derive CDI
25,902,014 UART: [art] Store in slot 0x4
25,959,278 UART: [art] Derive Key Pair
25,960,319 UART: [art] Store priv key in slot 0x5
29,252,703 UART: [art] Derive Key Pair - Done
29,265,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,805 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,347 UART: [art] PUB.X = BBB75660E8AFEDE3C8F304820BE495D7D0D0FDB8D8295BAECA3B52055AA06B11CDD4865E9547CA3EBB25C90F9AA9B315
31,563,559 UART: [art] PUB.Y = 293124F9BFB506CC41EEF3AB03DBA07AFE94E7AC467F39B75DE343182BA25B0D1103165F518D5FB6F99044D1DB8C7311
31,570,865 UART: [art] SIG.R = FD24D1CC0A3E75CF3E0B951A19C6F38E241053781529821681B6D904CEDDD17B3EF9407A7E431FCC1F9716C6606B1365
31,578,221 UART: [art] SIG.S = 8A85F80C20B46652B8CFBBB4A3CAE95944F9952E05460801209D9692AD520C1BE3A0A04B16F0A2C10344F2CA12753FE7
32,883,985 UART: Caliptra RT
32,884,688 UART: [state] CFI Enabled
33,060,360 UART: [rt] RT listening for mailbox commands...
33,064,374 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,108,927 UART: [rt]cmd =0x4c4d5356, len=1672
33,528,340 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,565 writing to cptra_bootfsm_go
3,810,044 ready_for_fw is high
3,810,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,966,970 >>> mbox cmd response: success
23,652,016 UART:
23,652,441 UART: Running Caliptra FMC ...
23,653,568 UART:
23,653,732 UART: [state] CFI Enabled
23,703,675 UART: [fht] FMC Alias Private Key: 7
26,043,704 UART: [art] Extend RT PCRs Done
26,044,937 UART: [art] Lock RT PCRs Done
26,046,809 UART: [art] Populate DV Done
26,052,454 UART: [fht] FMC Alias Private Key: 7
26,054,163 UART: [art] Derive CDI
26,054,979 UART: [art] Store in slot 0x4
26,112,298 UART: [art] Derive Key Pair
26,113,358 UART: [art] Store priv key in slot 0x5
29,406,212 UART: [art] Derive Key Pair - Done
29,419,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,708,262 UART: [art] Erasing AUTHORITY.KEYID = 7
31,709,785 UART: [art] PUB.X = 14F88983E96DF4C358965A09483AFA5F3EB2F6D1C9193C44F0ADA6EB317A553B26243EE9E42A1AB2A3E83BD3489F85BB
31,717,051 UART: [art] PUB.Y = 80142ACE6B79FCF5D0B736F32A8E05B95DC0828A1084ED792D563BA3B9FBFE57A32012324AA023942DB212BC8829E8C5
31,724,317 UART: [art] SIG.R = 32A859D8476A9E330C306935C02C97AFACD8AAE4BD6C4C4DC9C9F65EA85F05731BFC49675F970F6651D71A1E87C0C1A3
31,731,730 UART: [art] SIG.S = B29902BC190C439EFA1108DC6FFB481DD9D9D9A1248B45EA203DE447CEB62ED511E988CFB79973AC213B3DFF07A828E7
33,036,859 UART: Caliptra RT
33,037,579 UART: [state] CFI Enabled
33,214,791 UART: [rt] RT listening for mailbox commands...
33,218,764 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,263,320 UART: [rt]cmd =0x4c4d5356, len=1672
33,682,796 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
192,609 UART:
192,960 UART: Running Caliptra ROM ...
194,154 UART:
603,911 UART: [state] CFI Enabled
617,112 UART: [state] LifecycleState = Unprovisioned
619,068 UART: [state] DebugLocked = No
620,741 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,426 UART: [kat] SHA2-256
796,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,688 UART: [kat] ++
807,141 UART: [kat] sha1
817,085 UART: [kat] SHA2-256
819,799 UART: [kat] SHA2-384
825,351 UART: [kat] SHA2-512-ACC
827,710 UART: [kat] ECC-384
3,112,075 UART: [kat] HMAC-384Kdf
3,124,177 UART: [kat] LMS
4,314,288 UART: [kat] --
4,317,877 UART: [cold-reset] ++
4,319,599 UART: [fht] Storing FHT @ 0x50003400
4,331,442 UART: [idev] ++
4,332,013 UART: [idev] CDI.KEYID = 6
4,333,048 UART: [idev] SUBJECT.KEYID = 7
4,334,216 UART: [idev] UDS.KEYID = 0
4,335,213 ready_for_fw is high
4,335,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,559 UART: [idev] Erasing UDS.KEYID = 0
7,622,970 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,643 UART: [idev] --
7,647,089 UART: [ldev] ++
7,647,657 UART: [ldev] CDI.KEYID = 6
7,648,588 UART: [ldev] SUBJECT.KEYID = 5
7,649,790 UART: [ldev] AUTHORITY.KEYID = 7
7,651,069 UART: [ldev] FE.KEYID = 1
7,664,631 UART: [ldev] Erasing FE.KEYID = 1
10,952,532 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,105 UART: [ldev] --
13,310,417 UART: [fwproc] Waiting for Commands...
13,312,773 UART: [fwproc] Received command 0x46574c44
13,315,000 UART: [fwproc] Received Image of size 118548 bytes
17,422,033 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,073 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,227 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,956 >>> mbox cmd response: success
17,900,376 UART: [afmc] ++
17,901,002 UART: [afmc] CDI.KEYID = 6
17,901,919 UART: [afmc] SUBJECT.KEYID = 7
17,903,131 UART: [afmc] AUTHORITY.KEYID = 5
21,214,545 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,507,245 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,509,507 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,523,898 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,538,644 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,553,067 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,574,232 UART: [afmc] --
23,578,681 UART: [cold-reset] --
23,583,400 UART: [state] Locking Datavault
23,588,924 UART: [state] Locking PCR0, PCR1 and PCR31
23,590,716 UART: [state] Locking ICCM
23,592,004 UART: [exit] Launching FMC @ 0x40000130
23,600,399 UART:
23,600,626 UART: Running Caliptra FMC ...
23,601,719 UART:
23,601,870 UART: [state] CFI Enabled
23,609,635 UART: [fht] FMC Alias Private Key: 7
25,949,007 UART: [art] Extend RT PCRs Done
25,950,237 UART: [art] Lock RT PCRs Done
25,951,669 UART: [art] Populate DV Done
25,957,079 UART: [fht] FMC Alias Private Key: 7
25,958,614 UART: [art] Derive CDI
25,959,342 UART: [art] Store in slot 0x4
26,001,710 UART: [art] Derive Key Pair
26,002,751 UART: [art] Store priv key in slot 0x5
29,244,616 UART: [art] Derive Key Pair - Done
29,257,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,308 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,812 UART: [art] PUB.X = 50F84AACD53CC978F3DF0E84B531EA02EEDFD9F8B231728152622C23E11C63E5F8971179E9F20FD46C3EDCC2CC8145BB
31,547,123 UART: [art] PUB.Y = 80432729BADB9AC63338B8DD54E3554A279380019223F148E4468F0A0A0FF9EDF0A095CD02C695FC9F78D1243136E4E2
31,554,365 UART: [art] SIG.R = CCAE83FC6E6370175D53874331CC87C569ADEB66D4FE6BDD545C2425D889975C25B79B96B4C363ACDBDC92084ACA3242
31,561,766 UART: [art] SIG.S = 7240D8B78BAFB26025102B59FBDD0BE257146F6E60914DC3274033BC10CC5D780217B3005E13E0325812390B9D5C0DBC
32,866,939 UART: Caliptra RT
32,867,654 UART: [state] CFI Enabled
33,000,433 UART: [rt] RT listening for mailbox commands...
33,004,371 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,048,777 UART: [rt]cmd =0x4c4d5356, len=1672
33,468,247 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
4,128,016 ready_for_fw is high
4,128,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,735 >>> mbox cmd response: success
23,801,280 UART:
23,801,707 UART: Running Caliptra FMC ...
23,802,840 UART:
23,802,996 UART: [state] CFI Enabled
23,810,779 UART: [fht] FMC Alias Private Key: 7
26,150,909 UART: [art] Extend RT PCRs Done
26,152,134 UART: [art] Lock RT PCRs Done
26,153,492 UART: [art] Populate DV Done
26,159,201 UART: [fht] FMC Alias Private Key: 7
26,160,738 UART: [art] Derive CDI
26,161,498 UART: [art] Store in slot 0x4
26,204,635 UART: [art] Derive Key Pair
26,205,700 UART: [art] Store priv key in slot 0x5
29,447,612 UART: [art] Derive Key Pair - Done
29,460,561 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,492 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,005 UART: [art] PUB.X = 5637CBB8F6FCD6B41EF50067CCD20EEEEC28B7C0F685CE8FAFE09FC7CA9DF3CE06615A45FF6D5F80F78EB72BB974E9DA
31,749,311 UART: [art] PUB.Y = 15E65C94D6092224ABBC184AB3C065AB683F6719E6038A6BCB8F554E14F0B2A332240DA700F32B3E66C7DA9BB1410890
31,756,572 UART: [art] SIG.R = 7D3F0C66B5E589DC39B1EA8CA4548D6D9AA8A83FA0D2C5BC07483E723C5485A0208904BDF44EEFB8FBC8318B7DDC4495
31,763,959 UART: [art] SIG.S = 9BEFCBED570CDDBB4FFCABA7D375E17E5CFD4DCD853877C1DC1C34BAB9739DF9C020AE88E0B1E7C2B44FC57CEDA76F5F
33,068,759 UART: Caliptra RT
33,069,472 UART: [state] CFI Enabled
33,203,674 UART: [rt] RT listening for mailbox commands...
33,207,668 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,252,192 UART: [rt]cmd =0x4c4d5356, len=1672
33,671,591 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
192,239 UART:
192,606 UART: Running Caliptra ROM ...
193,801 UART:
193,954 UART: [state] CFI Enabled
263,140 UART: [state] LifecycleState = Unprovisioned
265,057 UART: [state] DebugLocked = No
267,235 UART: [state] WD Timer not started. Device not locked for debugging
271,011 UART: [kat] SHA2-256
450,661 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,408 UART: [kat] ++
461,887 UART: [kat] sha1
472,831 UART: [kat] SHA2-256
475,507 UART: [kat] SHA2-384
480,025 UART: [kat] SHA2-512-ACC
482,395 UART: [kat] ECC-384
2,927,838 UART: [kat] HMAC-384Kdf
2,949,801 UART: [kat] LMS
3,426,326 UART: [kat] --
3,430,958 UART: [cold-reset] ++
3,433,615 UART: [fht] FHT @ 0x50003400
3,445,476 UART: [idev] ++
3,446,054 UART: [idev] CDI.KEYID = 6
3,446,940 UART: [idev] SUBJECT.KEYID = 7
3,448,267 UART: [idev] UDS.KEYID = 0
3,449,193 ready_for_fw is high
3,449,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,422 UART: [idev] Erasing UDS.KEYID = 0
5,966,378 UART: [idev] Sha1 KeyId Algorithm
5,989,769 UART: [idev] --
5,994,248 UART: [ldev] ++
5,994,852 UART: [ldev] CDI.KEYID = 6
5,995,772 UART: [ldev] SUBJECT.KEYID = 5
5,996,931 UART: [ldev] AUTHORITY.KEYID = 7
5,998,216 UART: [ldev] FE.KEYID = 1
6,037,870 UART: [ldev] Erasing FE.KEYID = 1
8,545,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,026 UART: [ldev] --
10,353,126 UART: [fwproc] Wait for Commands...
10,355,648 UART: [fwproc] Recv command 0x46574c44
10,357,626 UART: [fwproc] Recv'd Img size: 118548 bytes
13,837,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,916,416 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,989,440 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,318,342 >>> mbox cmd response: success
14,322,453 UART: [afmc] ++
14,323,066 UART: [afmc] CDI.KEYID = 6
14,323,980 UART: [afmc] SUBJECT.KEYID = 7
14,325,203 UART: [afmc] AUTHORITY.KEYID = 5
16,867,138 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,589,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,592,059 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,607,872 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,623,913 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,639,524 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,663,831 UART: [afmc] --
18,668,176 UART: [cold-reset] --
18,672,577 UART: [state] Locking Datavault
18,679,603 UART: [state] Locking PCR0, PCR1 and PCR31
18,681,354 UART: [state] Locking ICCM
18,683,716 UART: [exit] Launching FMC @ 0x40000130
18,692,108 UART:
18,692,345 UART: Running Caliptra FMC ...
18,693,444 UART:
18,693,603 UART: [state] CFI Enabled
18,747,908 UART: [fht] FMC Alias Private Key: 7
20,535,214 UART: [art] Extend RT PCRs Done
20,536,443 UART: [art] Lock RT PCRs Done
20,538,030 UART: [art] Populate DV Done
20,543,768 UART: [fht] FMC Alias Private Key: 7
20,545,412 UART: [art] Derive CDI
20,546,221 UART: [art] Store in slot 0x4
20,602,020 UART: [art] Derive Key Pair
20,603,050 UART: [art] Store priv key in slot 0x5
23,066,268 UART: [art] Derive Key Pair - Done
23,079,432 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,791,918 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,558 UART: [art] PUB.X = 39F2CEF2C5A19B61C9270137C4E78687167C098F61D1E7F10C8B523BCA9E0070FD9D0DC56C12829CD51C3DC1919AB6FE
24,800,670 UART: [art] PUB.Y = 47ACF0BDD27ECF95EA2E546F0C13737C29E675A763C6AF3F3171941972914B006CDAA579E28679DDC6C9DEDF4F94AD31
24,807,908 UART: [art] SIG.R = A403576F06C5EAD5FFE1A22498F43AE6210F6DDFAAC71EA9CFB2EC6E653AA4DC95ABC70829CFA20C766117F3CA680C49
24,815,309 UART: [art] SIG.S = 84ADCCAFF1FE5326AEFEE05941E3EDAF4C1747ED698143F702D3F91C02BE400111CDF32A3F9C602EFB01A12729D314D8
25,794,203 UART: Caliptra RT
25,794,904 UART: [state] CFI Enabled
25,976,753 UART: [rt] RT listening for mailbox commands...
25,980,710 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,025,165 UART: [rt]cmd =0x4c4d5356, len=1672
26,238,253 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,798 writing to cptra_bootfsm_go
3,461,781 ready_for_fw is high
3,462,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,173 >>> mbox cmd response: success
18,534,875 UART:
18,535,267 UART: Running Caliptra FMC ...
18,536,396 UART:
18,536,550 UART: [state] CFI Enabled
18,605,885 UART: [fht] FMC Alias Private Key: 7
20,372,127 UART: [art] Extend RT PCRs Done
20,373,348 UART: [art] Lock RT PCRs Done
20,374,755 UART: [art] Populate DV Done
20,380,009 UART: [fht] FMC Alias Private Key: 7
20,381,668 UART: [art] Derive CDI
20,382,479 UART: [art] Store in slot 0x4
20,438,867 UART: [art] Derive Key Pair
20,439,911 UART: [art] Store priv key in slot 0x5
22,903,032 UART: [art] Derive Key Pair - Done
22,915,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,915 UART: [art] Erasing AUTHORITY.KEYID = 7
24,630,413 UART: [art] PUB.X = 965ECDEC0E6606FDB56B9E24FC2F1770BE500C2147BA4DD44465E0990E2E398CEA60F08A398EE1683DB69A1737486269
24,637,713 UART: [art] PUB.Y = 1DBDC12A288CCACF9570D401D3F783EF57FD8EAEEE94401C440F94B2FB7DAE970EDF6D86364868830FEAF66EA0DC1635
24,645,005 UART: [art] SIG.R = 25737DED834B8FAF57EEEA8C92469372B9B52B4B222658CC9F29F82EED92EE35332FDB289ED41863BF283EF89DBFDDC6
24,652,417 UART: [art] SIG.S = ADF0F30C2B87C1885225A92E0E03796CC6F8AA56FE0DE0B2D39B036E7B7A5E02915B316E4FF8D530CD7AC4CB866DA8CD
25,631,433 UART: Caliptra RT
25,632,135 UART: [state] CFI Enabled
25,812,678 UART: [rt] RT listening for mailbox commands...
25,816,564 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,860,960 UART: [rt]cmd =0x4c4d5356, len=1672
26,073,979 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,450 UART:
192,819 UART: Running Caliptra ROM ...
194,008 UART:
603,795 UART: [state] CFI Enabled
618,195 UART: [state] LifecycleState = Unprovisioned
620,086 UART: [state] DebugLocked = No
621,268 UART: [state] WD Timer not started. Device not locked for debugging
625,446 UART: [kat] SHA2-256
805,161 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,894 UART: [kat] ++
816,500 UART: [kat] sha1
826,674 UART: [kat] SHA2-256
829,395 UART: [kat] SHA2-384
835,737 UART: [kat] SHA2-512-ACC
838,112 UART: [kat] ECC-384
3,280,799 UART: [kat] HMAC-384Kdf
3,293,890 UART: [kat] LMS
3,770,426 UART: [kat] --
3,774,060 UART: [cold-reset] ++
3,776,275 UART: [fht] FHT @ 0x50003400
3,787,835 UART: [idev] ++
3,788,421 UART: [idev] CDI.KEYID = 6
3,789,356 UART: [idev] SUBJECT.KEYID = 7
3,790,604 UART: [idev] UDS.KEYID = 0
3,791,535 ready_for_fw is high
3,791,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,593 UART: [idev] Erasing UDS.KEYID = 0
6,267,683 UART: [idev] Sha1 KeyId Algorithm
6,291,014 UART: [idev] --
6,296,259 UART: [ldev] ++
6,296,881 UART: [ldev] CDI.KEYID = 6
6,297,942 UART: [ldev] SUBJECT.KEYID = 5
6,299,052 UART: [ldev] AUTHORITY.KEYID = 7
6,300,232 UART: [ldev] FE.KEYID = 1
6,312,884 UART: [ldev] Erasing FE.KEYID = 1
8,794,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,026 UART: [ldev] --
10,588,864 UART: [fwproc] Wait for Commands...
10,591,997 UART: [fwproc] Recv command 0x46574c44
10,593,982 UART: [fwproc] Recv'd Img size: 118548 bytes
14,081,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,856 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,866 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,919 >>> mbox cmd response: success
14,561,512 UART: [afmc] ++
14,562,130 UART: [afmc] CDI.KEYID = 6
14,563,106 UART: [afmc] SUBJECT.KEYID = 7
14,564,211 UART: [afmc] AUTHORITY.KEYID = 5
17,071,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,404 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,259 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,348 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,876 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,995 UART: [afmc] --
18,871,022 UART: [cold-reset] --
18,876,729 UART: [state] Locking Datavault
18,880,449 UART: [state] Locking PCR0, PCR1 and PCR31
18,882,157 UART: [state] Locking ICCM
18,884,635 UART: [exit] Launching FMC @ 0x40000130
18,893,037 UART:
18,893,286 UART: Running Caliptra FMC ...
18,894,390 UART:
18,894,550 UART: [state] CFI Enabled
18,902,440 UART: [fht] FMC Alias Private Key: 7
20,667,897 UART: [art] Extend RT PCRs Done
20,669,110 UART: [art] Lock RT PCRs Done
20,670,841 UART: [art] Populate DV Done
20,676,363 UART: [fht] FMC Alias Private Key: 7
20,678,074 UART: [art] Derive CDI
20,678,900 UART: [art] Store in slot 0x4
20,721,874 UART: [art] Derive Key Pair
20,722,914 UART: [art] Store priv key in slot 0x5
23,149,582 UART: [art] Derive Key Pair - Done
23,162,745 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,034 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,538 UART: [art] PUB.X = 2C65B0419BBDF17CD9DA135C753C02667DC4B813C40ECB4BB1CBB666BFB6DAC7E3EE46DE16BE7A05E9BDBFD5C01BCA34
24,877,895 UART: [art] PUB.Y = 4F8D87E728D7EC1DB3576673724AFF4A243AF843009CBE97DE856D87393A77F908B4A009CA2A37ED175EAB9A44B246BE
24,885,133 UART: [art] SIG.R = 5CAC9A1277599CFDD363BC209336AE2E8164402BE1D45A899F25251651ECA900F4F380C54920A9CF695D8DBF686FEED4
24,892,532 UART: [art] SIG.S = F6C7D007FD459D3DCCBBB41473FC01EDDD0B6BDDCD27FCC57E413D0D18263C25ECD38D9C744EDB2A93662F60AB87A5F9
25,871,457 UART: Caliptra RT
25,872,160 UART: [state] CFI Enabled
26,005,003 UART: [rt] RT listening for mailbox commands...
26,008,907 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,053,362 UART: [rt]cmd =0x4c4d5356, len=1672
26,266,648 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
3,778,167 ready_for_fw is high
3,778,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,441,786 >>> mbox cmd response: success
18,690,362 UART:
18,690,747 UART: Running Caliptra FMC ...
18,691,880 UART:
18,692,039 UART: [state] CFI Enabled
18,699,755 UART: [fht] FMC Alias Private Key: 7
20,465,748 UART: [art] Extend RT PCRs Done
20,466,976 UART: [art] Lock RT PCRs Done
20,468,516 UART: [art] Populate DV Done
20,474,102 UART: [fht] FMC Alias Private Key: 7
20,475,653 UART: [art] Derive CDI
20,476,474 UART: [art] Store in slot 0x4
20,519,450 UART: [art] Derive Key Pair
20,520,491 UART: [art] Store priv key in slot 0x5
22,947,709 UART: [art] Derive Key Pair - Done
22,960,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,666,809 UART: [art] Erasing AUTHORITY.KEYID = 7
24,668,311 UART: [art] PUB.X = 96942D77549F71CA95C59C183A621CB0F27B1E070E151370572B8DE04D7C59ACC6DC28C15DFDCB5BDFBBD54988986D86
24,675,582 UART: [art] PUB.Y = 2C9A256E9BF4D162F686A28B2BB4620D3ED001951086D1400F5F95CC778068F166FFF9A628BDE58FD466A13ECD1E8873
24,682,836 UART: [art] SIG.R = 30F0A99541D30612055332BDEF48D41B4C2496286B6AE29DA02BDCC979F312CDF9DA4EB593EB53894578EE0D28C255AE
24,690,244 UART: [art] SIG.S = 96686EB869AD2116EC42D4CE4BDE2B3ECD3CE2223C51609049DB99D00F0D8C1B526E3535F94A47030D48AFEFE6BD5FE4
25,669,164 UART: Caliptra RT
25,669,865 UART: [state] CFI Enabled
25,802,243 UART: [rt] RT listening for mailbox commands...
25,806,200 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,850,650 UART: [rt]cmd =0x4c4d5356, len=1672
26,063,660 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,114 UART:
192,484 UART: Running Caliptra ROM ...
193,592 UART:
193,737 UART: [state] CFI Enabled
264,575 UART: [state] LifecycleState = Unprovisioned
266,975 UART: [state] DebugLocked = No
268,565 UART: [state] WD Timer not started. Device not locked for debugging
273,025 UART: [kat] SHA2-256
462,947 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,715 UART: [kat] ++
474,194 UART: [kat] sha1
486,200 UART: [kat] SHA2-256
489,214 UART: [kat] SHA2-384
495,201 UART: [kat] SHA2-512-ACC
497,776 UART: [kat] ECC-384
2,948,630 UART: [kat] HMAC-384Kdf
2,972,374 UART: [kat] LMS
3,504,202 UART: [kat] --
3,507,940 UART: [cold-reset] ++
3,509,121 UART: [fht] FHT @ 0x50003400
3,520,242 UART: [idev] ++
3,520,946 UART: [idev] CDI.KEYID = 6
3,521,973 UART: [idev] SUBJECT.KEYID = 7
3,523,074 UART: [idev] UDS.KEYID = 0
3,524,000 ready_for_fw is high
3,524,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,258 UART: [idev] Erasing UDS.KEYID = 0
6,027,602 UART: [idev] Sha1 KeyId Algorithm
6,050,737 UART: [idev] --
6,054,849 UART: [ldev] ++
6,055,583 UART: [ldev] CDI.KEYID = 6
6,056,498 UART: [ldev] SUBJECT.KEYID = 5
6,057,655 UART: [ldev] AUTHORITY.KEYID = 7
6,058,884 UART: [ldev] FE.KEYID = 1
6,100,344 UART: [ldev] Erasing FE.KEYID = 1
8,609,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,141 UART: [ldev] --
10,415,105 UART: [fwproc] Wait for Commands...
10,418,173 UART: [fwproc] Recv command 0x46574c44
10,420,422 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,040 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,638 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,982 >>> mbox cmd response: success
14,684,278 UART: [afmc] ++
14,685,007 UART: [afmc] CDI.KEYID = 6
14,686,227 UART: [afmc] SUBJECT.KEYID = 7
14,687,614 UART: [afmc] AUTHORITY.KEYID = 5
17,215,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,833 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,954 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,112 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,986 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,782 UART: [afmc] --
19,013,190 UART: [cold-reset] --
19,016,893 UART: [state] Locking Datavault
19,022,742 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,952 UART: [state] Locking ICCM
19,027,305 UART: [exit] Launching FMC @ 0x40000130
19,036,002 UART:
19,036,248 UART: Running Caliptra FMC ...
19,037,373 UART:
19,037,536 UART: [state] CFI Enabled
19,096,220 UART: [fht] FMC Alias Private Key: 7
20,862,776 UART: [art] Extend RT PCRs Done
20,863,998 UART: [art] Lock RT PCRs Done
20,865,578 UART: [art] Populate DV Done
20,870,814 UART: [fht] FMC Alias Private Key: 7
20,872,529 UART: [art] Derive CDI
20,873,342 UART: [art] Store in slot 0x4
20,928,210 UART: [art] Derive Key Pair
20,929,209 UART: [art] Store priv key in slot 0x5
23,392,034 UART: [art] Derive Key Pair - Done
23,405,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,218 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,729 UART: [art] PUB.X = C2FF208379AA9CDCBA2353A4C5B7FC851B0CD44255511CD8DD57E5C8143781EC22C77536090CF5C460FEF708F3C769C5
25,125,960 UART: [art] PUB.Y = 6BC1289DC5D40692678913A008ED73428D70791F68263B9C8A16F035D36A30052FFB7301AD6A1CC95E69C4DED30ABE9D
25,133,239 UART: [art] SIG.R = 49EDC5A324A73596AAEA20D2E6A2354EBD948D4CB1AA1912F54AE4921F806FBC993BC7483CE8304C811E4F2E84ED2598
25,140,662 UART: [art] SIG.S = 40D0D13D5A67B0E92B54D88F47374891B33A366D23867DDCC5A7A907A0F28FF297756A950C78D2344F500EDCD4907E5F
26,119,926 UART: Caliptra RT
26,120,615 UART: [state] CFI Enabled
26,299,747 UART: [rt] RT listening for mailbox commands...
26,303,666 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,348,345 UART: [rt]cmd =0x4c4d5356, len=1672
26,561,206 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,893 writing to cptra_bootfsm_go
3,439,376 ready_for_fw is high
3,439,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,828,614 >>> mbox cmd response: success
19,106,943 UART:
19,107,349 UART: Running Caliptra FMC ...
19,108,495 UART:
19,108,661 UART: [state] CFI Enabled
19,178,029 UART: [fht] FMC Alias Private Key: 7
20,943,751 UART: [art] Extend RT PCRs Done
20,944,970 UART: [art] Lock RT PCRs Done
20,946,704 UART: [art] Populate DV Done
20,951,908 UART: [fht] FMC Alias Private Key: 7
20,953,506 UART: [art] Derive CDI
20,954,243 UART: [art] Store in slot 0x4
21,011,282 UART: [art] Derive Key Pair
21,012,329 UART: [art] Store priv key in slot 0x5
23,475,141 UART: [art] Derive Key Pair - Done
23,487,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,833 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,492 UART: [art] PUB.X = 7770C40B99500323AC4A220964D7397217C86B9D5571A38F39D1F838CA76396F0F098B815F4F8731F96B0ACC44209D09
25,209,616 UART: [art] PUB.Y = ABAB4CBE949AC55DC64A9F8AC566E4336570E8B00F2973C17D22183D80CEE056E92264A40CAD5934BEAB4D6FB16EA787
25,216,833 UART: [art] SIG.R = 9084C2F10BC72C0D20CC1CD4293893424FB87E878C7009BF1D47412AB94147C988A3C8FBD1CF6D510F07D23B108179DB
25,224,249 UART: [art] SIG.S = 9E6D7461BAA530194DCA6E1AE6B8FDCEDEC04216C4D3E400A1751BB72929AD3C7E20BE6FC3B2B5551204A3E73718FB96
26,202,744 UART: Caliptra RT
26,203,436 UART: [state] CFI Enabled
26,385,657 UART: [rt] RT listening for mailbox commands...
26,389,646 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,433,943 UART: [rt]cmd =0x4c4d5356, len=1672
26,647,190 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,462 UART:
192,826 UART: Running Caliptra ROM ...
194,018 UART:
603,822 UART: [state] CFI Enabled
617,298 UART: [state] LifecycleState = Unprovisioned
619,683 UART: [state] DebugLocked = No
620,919 UART: [state] WD Timer not started. Device not locked for debugging
624,103 UART: [kat] SHA2-256
813,999 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,798 UART: [kat] ++
825,326 UART: [kat] sha1
837,339 UART: [kat] SHA2-256
840,349 UART: [kat] SHA2-384
846,485 UART: [kat] SHA2-512-ACC
849,069 UART: [kat] ECC-384
3,292,564 UART: [kat] HMAC-384Kdf
3,307,088 UART: [kat] LMS
3,838,884 UART: [kat] --
3,843,444 UART: [cold-reset] ++
3,845,089 UART: [fht] FHT @ 0x50003400
3,855,808 UART: [idev] ++
3,856,456 UART: [idev] CDI.KEYID = 6
3,857,495 UART: [idev] SUBJECT.KEYID = 7
3,858,604 UART: [idev] UDS.KEYID = 0
3,859,707 ready_for_fw is high
3,859,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,637 UART: [idev] Erasing UDS.KEYID = 0
6,333,007 UART: [idev] Sha1 KeyId Algorithm
6,355,405 UART: [idev] --
6,360,944 UART: [ldev] ++
6,361,628 UART: [ldev] CDI.KEYID = 6
6,362,516 UART: [ldev] SUBJECT.KEYID = 5
6,363,725 UART: [ldev] AUTHORITY.KEYID = 7
6,364,964 UART: [ldev] FE.KEYID = 1
6,375,800 UART: [ldev] Erasing FE.KEYID = 1
8,855,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,640 UART: [ldev] --
10,648,124 UART: [fwproc] Wait for Commands...
10,649,957 UART: [fwproc] Recv command 0x46574c44
10,652,271 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,671 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,302 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,807 >>> mbox cmd response: success
14,911,368 UART: [afmc] ++
14,912,097 UART: [afmc] CDI.KEYID = 6
14,913,303 UART: [afmc] SUBJECT.KEYID = 7
14,914,751 UART: [afmc] AUTHORITY.KEYID = 5
17,418,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,577 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,676 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,822 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,745 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,396 UART: [afmc] --
19,213,218 UART: [cold-reset] --
19,217,954 UART: [state] Locking Datavault
19,222,824 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,008 UART: [state] Locking ICCM
19,227,771 UART: [exit] Launching FMC @ 0x40000130
19,236,474 UART:
19,236,714 UART: Running Caliptra FMC ...
19,237,821 UART:
19,237,985 UART: [state] CFI Enabled
19,245,945 UART: [fht] FMC Alias Private Key: 7
21,012,406 UART: [art] Extend RT PCRs Done
21,013,637 UART: [art] Lock RT PCRs Done
21,015,327 UART: [art] Populate DV Done
21,020,912 UART: [fht] FMC Alias Private Key: 7
21,022,509 UART: [art] Derive CDI
21,023,334 UART: [art] Store in slot 0x4
21,066,096 UART: [art] Derive Key Pair
21,067,138 UART: [art] Store priv key in slot 0x5
23,494,142 UART: [art] Derive Key Pair - Done
23,507,359 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,613 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,130 UART: [art] PUB.X = 33DA586FB75AEBBAE647C85EA1B7B9A94D3B20FC1E75DC505421AE3EA1F96DA113E2E75DFCAADA216418F58FE713F3F9
25,222,425 UART: [art] PUB.Y = 52ACCA6884832333C9FA665229A33409D3F225E5B298802ED297DC06D39925F42FA305145FAC2C28A9929B55ED973231
25,229,678 UART: [art] SIG.R = 0447E7F4CF74E856E99A482272B1486215CF3FB3C3EFC68FF7F69D2EDCD890DB965EFA641BE09BBB7ED5BB1F750C46BD
25,237,052 UART: [art] SIG.S = 6CB064D5D75345E37AFDA1302F3DD1C651F77B51420EC2B2C70898B440393782A849D5787F24FC5F879E41BF5D27B318
26,215,319 UART: Caliptra RT
26,216,033 UART: [state] CFI Enabled
26,347,531 UART: [rt] RT listening for mailbox commands...
26,351,474 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,396,032 UART: [rt]cmd =0x4c4d5356, len=1672
26,609,184 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,757,427 ready_for_fw is high
3,757,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,065,676 >>> mbox cmd response: success
19,315,964 UART:
19,316,404 UART: Running Caliptra FMC ...
19,317,522 UART:
19,317,689 UART: [state] CFI Enabled
19,326,033 UART: [fht] FMC Alias Private Key: 7
21,092,334 UART: [art] Extend RT PCRs Done
21,093,570 UART: [art] Lock RT PCRs Done
21,095,494 UART: [art] Populate DV Done
21,101,035 UART: [fht] FMC Alias Private Key: 7
21,102,798 UART: [art] Derive CDI
21,103,543 UART: [art] Store in slot 0x4
21,146,193 UART: [art] Derive Key Pair
21,147,400 UART: [art] Store priv key in slot 0x5
23,574,028 UART: [art] Derive Key Pair - Done
23,586,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,293,607 UART: [art] Erasing AUTHORITY.KEYID = 7
25,295,122 UART: [art] PUB.X = 1B3D661250ED86CCEF2EFBBFAE8CF7A88E10C7B790BCDB93BF644A9BA7522541B3DDA849756ED55D35DC35E3A3548E99
25,302,391 UART: [art] PUB.Y = 659B5E05F5AA14E31E820B649917AE19EA817534355A57D4E63241BEE65D89705D39E09EE6F9264067F2AF7B022CA0D7
25,309,620 UART: [art] SIG.R = 30FA7CEACA8F2F49762357F7C4612DB2A653CAEBC4962A555F6EF93A2717F02B49B352C4E73DE255D26CF3B99F7960F1
25,317,072 UART: [art] SIG.S = 6759ED7BDD4A0C1D803EF7C70627F475A7652447B0847719B1870A1A8A69E9D8963B9D27D69EE7CFE5C47F485A8CC166
26,295,707 UART: Caliptra RT
26,296,397 UART: [state] CFI Enabled
26,429,829 UART: [rt] RT listening for mailbox commands...
26,433,790 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,478,303 UART: [rt]cmd =0x4c4d5356, len=1672
26,691,480 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,009 UART: [kat] SHA2-256
881,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,055 UART: [kat] ++
886,207 UART: [kat] sha1
890,541 UART: [kat] SHA2-256
892,479 UART: [kat] SHA2-384
895,256 UART: [kat] SHA2-512-ACC
897,157 UART: [kat] ECC-384
902,790 UART: [kat] HMAC-384Kdf
907,374 UART: [kat] LMS
1,475,570 UART: [kat] --
1,476,551 UART: [cold-reset] ++
1,476,891 UART: [fht] Storing FHT @ 0x50003400
1,479,628 UART: [idev] ++
1,479,796 UART: [idev] CDI.KEYID = 6
1,480,156 UART: [idev] SUBJECT.KEYID = 7
1,480,580 UART: [idev] UDS.KEYID = 0
1,480,925 ready_for_fw is high
1,480,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,426 UART: [idev] Erasing UDS.KEYID = 0
1,504,992 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,650 UART: [idev] --
1,514,485 UART: [ldev] ++
1,514,653 UART: [ldev] CDI.KEYID = 6
1,515,016 UART: [ldev] SUBJECT.KEYID = 5
1,515,442 UART: [ldev] AUTHORITY.KEYID = 7
1,515,905 UART: [ldev] FE.KEYID = 1
1,521,153 UART: [ldev] Erasing FE.KEYID = 1
1,546,336 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,078 UART: [ldev] --
1,585,483 UART: [fwproc] Waiting for Commands...
1,586,294 UART: [fwproc] Received command 0x46574c44
1,587,085 UART: [fwproc] Received Image of size 118548 bytes
2,931,549 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,299 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,517 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,926 >>> mbox cmd response: success
3,132,014 UART: [afmc] ++
3,132,182 UART: [afmc] CDI.KEYID = 6
3,132,544 UART: [afmc] SUBJECT.KEYID = 7
3,132,969 UART: [afmc] AUTHORITY.KEYID = 5
3,168,054 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,346 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,126 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,835 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,718 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,401 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,211 UART: [afmc] --
3,211,149 UART: [cold-reset] --
3,212,227 UART: [state] Locking Datavault
3,213,568 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,172 UART: [state] Locking ICCM
3,214,746 UART: [exit] Launching FMC @ 0x40000130
3,220,076 UART:
3,220,092 UART: Running Caliptra FMC ...
3,220,500 UART:
3,220,554 UART: [state] CFI Enabled
3,230,966 UART: [fht] FMC Alias Private Key: 7
3,349,716 UART: [art] Extend RT PCRs Done
3,350,144 UART: [art] Lock RT PCRs Done
3,351,580 UART: [art] Populate DV Done
3,359,695 UART: [fht] FMC Alias Private Key: 7
3,360,765 UART: [art] Derive CDI
3,361,045 UART: [art] Store in slot 0x4
3,447,065 UART: [art] Derive Key Pair
3,447,425 UART: [art] Store priv key in slot 0x5
3,460,606 UART: [art] Derive Key Pair - Done
3,475,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,805 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,570 UART: [art] PUB.X = DF7303C4ED1FB58E7753E6432B1385174F1F13E4BDB9A018BD8B911397F40347E1BF0A18DDC2D2058D1D736D4B819ACF
3,498,338 UART: [art] PUB.Y = 19F9398946B843085B0BF5EAF3E654E78D935F08E7B36B116201E5BB98618E0C8AE9FF5345BE4C1A132291C0C3DD120B
3,505,274 UART: [art] SIG.R = A7FED0B0C3838CC502C1AF5BC4046A335354E7235D756F27391AC10FEAD8D7547313E1D54FC796D0909FE95B7D0B1708
3,512,035 UART: [art] SIG.S = 5FB4DC41AA3A0F98FA29B8BC9A59CAF18A16060B3BD93A57141E36BCF0642EB6CA44E6E5C58B1E991F62B7310D4989B2
3,535,447 UART: Caliptra RT
3,535,698 UART: [state] CFI Enabled
3,655,494 UART: [rt] RT listening for mailbox commands...
3,656,164 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,432 UART: [rt]cmd =0x4c4d5356, len=1672
4,275,189 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,243 ready_for_fw is high
1,362,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,132 >>> mbox cmd response: success
3,043,489 UART:
3,043,505 UART: Running Caliptra FMC ...
3,043,913 UART:
3,043,967 UART: [state] CFI Enabled
3,054,579 UART: [fht] FMC Alias Private Key: 7
3,174,151 UART: [art] Extend RT PCRs Done
3,174,579 UART: [art] Lock RT PCRs Done
3,176,201 UART: [art] Populate DV Done
3,184,320 UART: [fht] FMC Alias Private Key: 7
3,185,462 UART: [art] Derive CDI
3,185,742 UART: [art] Store in slot 0x4
3,271,680 UART: [art] Derive Key Pair
3,272,040 UART: [art] Store priv key in slot 0x5
3,284,681 UART: [art] Derive Key Pair - Done
3,299,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,780 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,545 UART: [art] PUB.X = DC2080043A3904CFD4C816EAD7B1EC8CEAAC3365D1E4BE03BBB852AA9D0A47E0A72B52E601E153DCBE0AAE9B2C16A337
3,322,323 UART: [art] PUB.Y = 304FD32CADFE6E83DC19F0EF8F09F60B1C63D0D588F2ED25C7DD57C919A0D3BBD43D427A44BC2E853EDA8DF19BD9C079
3,329,293 UART: [art] SIG.R = EA9A5A6B12932623A1CA246804B32666D5B7E14864BF8905A8CE19798229EB9E5199D410CC2E88AD55519B82F3FB8454
3,336,055 UART: [art] SIG.S = E3C5C4C4F10EA14C77569FC3DE692D53EAFF9A67E3EA814101EF3D4A1161CE63CE93716B7B9D6B284207086543A3E41C
3,360,167 UART: Caliptra RT
3,360,418 UART: [state] CFI Enabled
3,481,541 UART: [rt] RT listening for mailbox commands...
3,482,211 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,857 UART: [rt]cmd =0x4c4d5356, len=1672
4,101,730 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,823 UART: [state] LifecycleState = Unprovisioned
86,478 UART: [state] DebugLocked = No
87,128 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,738 UART: [kat] SHA2-256
882,669 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,784 UART: [kat] ++
886,936 UART: [kat] sha1
891,154 UART: [kat] SHA2-256
893,092 UART: [kat] SHA2-384
895,855 UART: [kat] SHA2-512-ACC
897,756 UART: [kat] ECC-384
903,517 UART: [kat] HMAC-384Kdf
908,049 UART: [kat] LMS
1,476,245 UART: [kat] --
1,476,886 UART: [cold-reset] ++
1,477,366 UART: [fht] Storing FHT @ 0x50003400
1,480,123 UART: [idev] ++
1,480,291 UART: [idev] CDI.KEYID = 6
1,480,651 UART: [idev] SUBJECT.KEYID = 7
1,481,075 UART: [idev] UDS.KEYID = 0
1,481,420 ready_for_fw is high
1,481,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,207 UART: [idev] Erasing UDS.KEYID = 0
1,506,219 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,888 UART: [ldev] ++
1,516,056 UART: [ldev] CDI.KEYID = 6
1,516,419 UART: [ldev] SUBJECT.KEYID = 5
1,516,845 UART: [ldev] AUTHORITY.KEYID = 7
1,517,308 UART: [ldev] FE.KEYID = 1
1,522,432 UART: [ldev] Erasing FE.KEYID = 1
1,547,957 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,881 UART: [ldev] --
1,587,380 UART: [fwproc] Waiting for Commands...
1,588,019 UART: [fwproc] Received command 0x46574c44
1,588,810 UART: [fwproc] Received Image of size 118548 bytes
2,934,228 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,190 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,408 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,755 >>> mbox cmd response: success
3,133,829 UART: [afmc] ++
3,133,997 UART: [afmc] CDI.KEYID = 6
3,134,359 UART: [afmc] SUBJECT.KEYID = 7
3,134,784 UART: [afmc] AUTHORITY.KEYID = 5
3,170,145 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,339 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,119 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,828 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,711 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,394 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,384 UART: [afmc] --
3,213,304 UART: [cold-reset] --
3,214,278 UART: [state] Locking Datavault
3,215,625 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,229 UART: [state] Locking ICCM
3,216,839 UART: [exit] Launching FMC @ 0x40000130
3,222,169 UART:
3,222,185 UART: Running Caliptra FMC ...
3,222,593 UART:
3,222,736 UART: [state] CFI Enabled
3,233,348 UART: [fht] FMC Alias Private Key: 7
3,352,562 UART: [art] Extend RT PCRs Done
3,352,990 UART: [art] Lock RT PCRs Done
3,354,492 UART: [art] Populate DV Done
3,362,413 UART: [fht] FMC Alias Private Key: 7
3,363,587 UART: [art] Derive CDI
3,363,867 UART: [art] Store in slot 0x4
3,449,765 UART: [art] Derive Key Pair
3,450,125 UART: [art] Store priv key in slot 0x5
3,462,932 UART: [art] Derive Key Pair - Done
3,477,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,017 UART: [art] PUB.X = 60BA542739C4DF6A5F7ED89661AB11D527B0B930DF11F2C558193B50969C08738AF63C7A852B377896089CA0097BA3B7
3,500,776 UART: [art] PUB.Y = 699501C81CE3A6FCAF75280CCF21D93FB588637C36296C8C899487203472086F2F41BEA67F0B25E6C14D689E0956BEA7
3,507,711 UART: [art] SIG.R = 86201098BD612D10A98A8625C564A2926B76D8D8706B4102C33F55B8577B68D72DF602C01A19CB5042C90043E81A40C7
3,514,443 UART: [art] SIG.S = 3E2C3F9D765F672F492CCC7947660A11F94C8ACD1D976F8BCFC445B0C37B58019AC7A4441C93CEE9C4D4587696B38189
3,538,107 UART: Caliptra RT
3,538,450 UART: [state] CFI Enabled
3,659,264 UART: [rt] RT listening for mailbox commands...
3,659,934 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,626 UART: [rt]cmd =0x4c4d5356, len=1672
4,279,411 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,950 ready_for_fw is high
1,362,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,773 >>> mbox cmd response: success
3,043,124 UART:
3,043,140 UART: Running Caliptra FMC ...
3,043,548 UART:
3,043,691 UART: [state] CFI Enabled
3,054,263 UART: [fht] FMC Alias Private Key: 7
3,173,515 UART: [art] Extend RT PCRs Done
3,173,943 UART: [art] Lock RT PCRs Done
3,175,153 UART: [art] Populate DV Done
3,183,346 UART: [fht] FMC Alias Private Key: 7
3,184,312 UART: [art] Derive CDI
3,184,592 UART: [art] Store in slot 0x4
3,270,584 UART: [art] Derive Key Pair
3,270,944 UART: [art] Store priv key in slot 0x5
3,284,129 UART: [art] Derive Key Pair - Done
3,298,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,954 UART: [art] PUB.X = 4530E9CDB65444E4331E05BE4D0949823E5A3F6D107CA2A49838994F0FFCB27B74F8EE7ABACEFFD7107252190EB95758
3,321,720 UART: [art] PUB.Y = 3263DDBEA9DB54E4AAD436FB2EEA28F0FF27CCF4D508F3E53AE9EEE3506DBC179DF0926E9E6F4158C6CB7C4C7E135201
3,328,690 UART: [art] SIG.R = 8E95E16EEC5C4AF60628545DA00D7EF346AC736F839E1F606407846F39B4752682196176C55BDCC2ED9DAEBC87E35ED0
3,335,459 UART: [art] SIG.S = 1BA157F3A6754A0BC84FF506415C349F95B2F4B00CAD4B68C2E317340442F52E34EA1068ABC73B62C0837C606267357A
3,359,355 UART: Caliptra RT
3,359,698 UART: [state] CFI Enabled
3,480,012 UART: [rt] RT listening for mailbox commands...
3,480,682 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,200 UART: [rt]cmd =0x4c4d5356, len=1672
4,099,933 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
891,494 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,781 UART: [kat] SHA2-512-ACC
906,682 UART: [kat] ECC-384
916,505 UART: [kat] HMAC-384Kdf
921,269 UART: [kat] LMS
1,169,581 UART: [kat] --
1,170,502 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,694 UART: [idev] ++
1,173,862 UART: [idev] CDI.KEYID = 6
1,174,223 UART: [idev] SUBJECT.KEYID = 7
1,174,648 UART: [idev] UDS.KEYID = 0
1,174,994 ready_for_fw is high
1,174,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,293 UART: [idev] Erasing UDS.KEYID = 0
1,199,187 UART: [idev] Sha1 KeyId Algorithm
1,208,139 UART: [idev] --
1,209,182 UART: [ldev] ++
1,209,350 UART: [ldev] CDI.KEYID = 6
1,209,714 UART: [ldev] SUBJECT.KEYID = 5
1,210,141 UART: [ldev] AUTHORITY.KEYID = 7
1,210,604 UART: [ldev] FE.KEYID = 1
1,215,808 UART: [ldev] Erasing FE.KEYID = 1
1,242,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,814 UART: [ldev] --
1,282,049 UART: [fwproc] Wait for Commands...
1,282,666 UART: [fwproc] Recv command 0x46574c44
1,283,399 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,481 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,656 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,009 >>> mbox cmd response: success
2,828,125 UART: [afmc] ++
2,828,293 UART: [afmc] CDI.KEYID = 6
2,828,656 UART: [afmc] SUBJECT.KEYID = 7
2,829,082 UART: [afmc] AUTHORITY.KEYID = 5
2,864,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,649 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,359 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,240 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,941 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,938 UART: [afmc] --
2,907,899 UART: [cold-reset] --
2,908,885 UART: [state] Locking Datavault
2,910,064 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,668 UART: [state] Locking ICCM
2,911,136 UART: [exit] Launching FMC @ 0x40000130
2,916,466 UART:
2,916,482 UART: Running Caliptra FMC ...
2,916,890 UART:
2,916,944 UART: [state] CFI Enabled
2,927,154 UART: [fht] FMC Alias Private Key: 7
3,046,264 UART: [art] Extend RT PCRs Done
3,046,692 UART: [art] Lock RT PCRs Done
3,048,320 UART: [art] Populate DV Done
3,056,613 UART: [fht] FMC Alias Private Key: 7
3,057,561 UART: [art] Derive CDI
3,057,841 UART: [art] Store in slot 0x4
3,143,558 UART: [art] Derive Key Pair
3,143,918 UART: [art] Store priv key in slot 0x5
3,157,046 UART: [art] Derive Key Pair - Done
3,172,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,137 UART: [art] PUB.X = FBBC79C45913B4672779275D5DEC6C33B6AB858957BBF400F83E4751B08BF1913A55F877242B7398AF30434009220C6E
3,194,875 UART: [art] PUB.Y = B19D58A3FCA068A4FDE7DECB1D907D54A354AE1915A2FA11C413376754FDBCE4EBC268B27ED392D8DC6A179C420C395C
3,201,842 UART: [art] SIG.R = 3A5ADFA63D7881B81221BD3FC31566CA1F4AFDEACE8D7DCE1EC74F29B677A3AD6B46E48D053870403CAB1C40C00E081D
3,208,625 UART: [art] SIG.S = DAD2485B3DE088CDE64E6D9619972B6F97CFE2D74952E4707878B48A323EA64E82AE1D2D74095522DCC4B2C01F699B81
3,232,568 UART: Caliptra RT
3,232,819 UART: [state] CFI Enabled
3,351,592 UART: [rt] RT listening for mailbox commands...
3,352,262 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,874 UART: [rt]cmd =0x4c4d5356, len=1672
3,656,077 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,164 ready_for_fw is high
1,058,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,206 >>> mbox cmd response: success
2,739,399 UART:
2,739,415 UART: Running Caliptra FMC ...
2,739,823 UART:
2,739,877 UART: [state] CFI Enabled
2,750,395 UART: [fht] FMC Alias Private Key: 7
2,868,811 UART: [art] Extend RT PCRs Done
2,869,239 UART: [art] Lock RT PCRs Done
2,870,649 UART: [art] Populate DV Done
2,878,662 UART: [fht] FMC Alias Private Key: 7
2,879,706 UART: [art] Derive CDI
2,879,986 UART: [art] Store in slot 0x4
2,966,109 UART: [art] Derive Key Pair
2,966,469 UART: [art] Store priv key in slot 0x5
2,979,393 UART: [art] Derive Key Pair - Done
2,994,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,671 UART: [art] PUB.X = 22E43742742871D519DFF367B0E7E2BEC773E5914E9EAF89968F525F6F7431253F71F760E9F0A44CAC81218A112D632E
3,017,439 UART: [art] PUB.Y = DD8C2BEA41199FC9A6D311920FB63C84DBAE89892341E5C3ED4D4EDFE141EC0810C564E3D8FD4788072023A91B7D78DB
3,024,394 UART: [art] SIG.R = 2015EA393E991E8DC7FEF79DDC9C4B36651EC3299A9AA2545AF2BA9CE47D0F94DE36DDB1983CEEFFCD2E89BF82F94F93
3,031,187 UART: [art] SIG.S = 62B8D0F7DE36DCD1CE120B53891352BDB393D0E27B748442D175F59684DB04EF8E6F28C16E7F458A1984F539C9BCE3F6
3,054,797 UART: Caliptra RT
3,055,048 UART: [state] CFI Enabled
3,173,914 UART: [rt] RT listening for mailbox commands...
3,174,584 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,215,284 UART: [rt]cmd =0x4c4d5356, len=1672
3,478,769 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,785 UART: [state] LifecycleState = Unprovisioned
86,440 UART: [state] DebugLocked = No
87,016 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
891,701 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,805 UART: [kat] ++
895,957 UART: [kat] sha1
900,245 UART: [kat] SHA2-256
902,185 UART: [kat] SHA2-384
904,930 UART: [kat] SHA2-512-ACC
906,831 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
921,150 UART: [kat] LMS
1,169,462 UART: [kat] --
1,170,475 UART: [cold-reset] ++
1,171,007 UART: [fht] FHT @ 0x50003400
1,173,769 UART: [idev] ++
1,173,937 UART: [idev] CDI.KEYID = 6
1,174,298 UART: [idev] SUBJECT.KEYID = 7
1,174,723 UART: [idev] UDS.KEYID = 0
1,175,069 ready_for_fw is high
1,175,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,646 UART: [idev] Erasing UDS.KEYID = 0
1,199,532 UART: [idev] Sha1 KeyId Algorithm
1,208,388 UART: [idev] --
1,209,417 UART: [ldev] ++
1,209,585 UART: [ldev] CDI.KEYID = 6
1,209,949 UART: [ldev] SUBJECT.KEYID = 5
1,210,376 UART: [ldev] AUTHORITY.KEYID = 7
1,210,839 UART: [ldev] FE.KEYID = 1
1,215,849 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,205 UART: [ldev] --
1,281,570 UART: [fwproc] Wait for Commands...
1,282,243 UART: [fwproc] Recv command 0x46574c44
1,282,976 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,964 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,139 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,480 >>> mbox cmd response: success
2,827,590 UART: [afmc] ++
2,827,758 UART: [afmc] CDI.KEYID = 6
2,828,121 UART: [afmc] SUBJECT.KEYID = 7
2,828,547 UART: [afmc] AUTHORITY.KEYID = 5
2,864,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,317 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,066 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,776 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,657 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,358 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,095 UART: [afmc] --
2,908,124 UART: [cold-reset] --
2,908,768 UART: [state] Locking Datavault
2,909,923 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,527 UART: [state] Locking ICCM
2,911,099 UART: [exit] Launching FMC @ 0x40000130
2,916,429 UART:
2,916,445 UART: Running Caliptra FMC ...
2,916,853 UART:
2,916,996 UART: [state] CFI Enabled
2,927,584 UART: [fht] FMC Alias Private Key: 7
3,046,330 UART: [art] Extend RT PCRs Done
3,046,758 UART: [art] Lock RT PCRs Done
3,048,218 UART: [art] Populate DV Done
3,056,625 UART: [fht] FMC Alias Private Key: 7
3,057,559 UART: [art] Derive CDI
3,057,839 UART: [art] Store in slot 0x4
3,143,676 UART: [art] Derive Key Pair
3,144,036 UART: [art] Store priv key in slot 0x5
3,157,450 UART: [art] Derive Key Pair - Done
3,172,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,445 UART: [art] PUB.X = EB08D580792C74F729714822419D44613DB8A0BAAC446FE53319DDE00B9C440BE438E08C65B269504C20EBEFC8A0D8EE
3,195,214 UART: [art] PUB.Y = AE8053290F58DFA469EB7385A4C1DB65276E006A8F6E82412DBC850DE93475F9E007C2CB8C73E27383F17441816C7B4B
3,202,135 UART: [art] SIG.R = FD96E9F224CB42E24B330CEF934139B091BB9CE3C1400C71CCE48D8D0413EAA268FFCA9360C20B11E9919D7F66B93211
3,208,903 UART: [art] SIG.S = AE46EE3CE6240CDAD32798C947A6E9EACF3382034E32CAF29A32A6C7C40A6074D1188230901EF2ACCD340DBDB292F67A
3,232,797 UART: Caliptra RT
3,233,140 UART: [state] CFI Enabled
3,352,780 UART: [rt] RT listening for mailbox commands...
3,353,450 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,132 UART: [rt]cmd =0x4c4d5356, len=1672
3,657,389 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,963 ready_for_fw is high
1,058,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,667 >>> mbox cmd response: success
2,740,698 UART:
2,740,714 UART: Running Caliptra FMC ...
2,741,122 UART:
2,741,265 UART: [state] CFI Enabled
2,751,741 UART: [fht] FMC Alias Private Key: 7
2,870,001 UART: [art] Extend RT PCRs Done
2,870,429 UART: [art] Lock RT PCRs Done
2,872,129 UART: [art] Populate DV Done
2,880,444 UART: [fht] FMC Alias Private Key: 7
2,881,406 UART: [art] Derive CDI
2,881,686 UART: [art] Store in slot 0x4
2,967,689 UART: [art] Derive Key Pair
2,968,049 UART: [art] Store priv key in slot 0x5
2,980,965 UART: [art] Derive Key Pair - Done
2,995,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,291 UART: [art] PUB.X = FE923AD7C9E97EBE5B489F9C8227C1484CCF3EF0FE250E94FF074B566174913A59AFCEB8B31D10BED5F9286C05190C7A
3,019,065 UART: [art] PUB.Y = 6588644A564E2E830831A41E0D7A1B8640D1EA1690EA5F309310793DFE341A41B77EC94DE65E7EA5CF053EEA04B5FEAB
3,026,013 UART: [art] SIG.R = 9F52FD3505609754CB688C091C9AD88C869BFDF12717B5E7E440881564ED759E8C63B469B6FF1C0C6822BDD96A9C9100
3,032,754 UART: [art] SIG.S = 2A6EE3007462B8BFA7699426670B8B9BFC6DF207DAE738B49AD4C8D07D4B0887BDD07F327179A6962FAA0EDD315B7417
3,056,148 UART: Caliptra RT
3,056,491 UART: [state] CFI Enabled
3,177,148 UART: [rt] RT listening for mailbox commands...
3,177,818 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,272 UART: [rt]cmd =0x4c4d5356, len=1672
3,481,637 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
893,344 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,469 UART: [kat] ++
897,621 UART: [kat] sha1
901,965 UART: [kat] SHA2-256
903,905 UART: [kat] SHA2-384
906,550 UART: [kat] SHA2-512-ACC
908,451 UART: [kat] ECC-384
918,110 UART: [kat] HMAC-384Kdf
922,522 UART: [kat] LMS
1,170,850 UART: [kat] --
1,171,565 UART: [cold-reset] ++
1,171,957 UART: [fht] FHT @ 0x50003400
1,174,436 UART: [idev] ++
1,174,604 UART: [idev] CDI.KEYID = 6
1,174,964 UART: [idev] SUBJECT.KEYID = 7
1,175,388 UART: [idev] UDS.KEYID = 0
1,175,733 ready_for_fw is high
1,175,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,363 UART: [idev] Sha1 KeyId Algorithm
1,208,953 UART: [idev] --
1,209,857 UART: [ldev] ++
1,210,025 UART: [ldev] CDI.KEYID = 6
1,210,388 UART: [ldev] SUBJECT.KEYID = 5
1,210,814 UART: [ldev] AUTHORITY.KEYID = 7
1,211,277 UART: [ldev] FE.KEYID = 1
1,216,315 UART: [ldev] Erasing FE.KEYID = 1
1,243,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,685 UART: [ldev] --
1,282,086 UART: [fwproc] Wait for Commands...
1,282,722 UART: [fwproc] Recv command 0x46574c44
1,283,450 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,688 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,858 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,007 >>> mbox cmd response: success
2,827,053 UART: [afmc] ++
2,827,221 UART: [afmc] CDI.KEYID = 6
2,827,583 UART: [afmc] SUBJECT.KEYID = 7
2,828,008 UART: [afmc] AUTHORITY.KEYID = 5
2,864,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,318 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,027 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,910 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,611 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,381 UART: [afmc] --
2,907,389 UART: [cold-reset] --
2,908,053 UART: [state] Locking Datavault
2,909,104 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,708 UART: [state] Locking ICCM
2,910,266 UART: [exit] Launching FMC @ 0x40000130
2,915,596 UART:
2,915,612 UART: Running Caliptra FMC ...
2,916,020 UART:
2,916,074 UART: [state] CFI Enabled
2,926,778 UART: [fht] FMC Alias Private Key: 7
3,046,134 UART: [art] Extend RT PCRs Done
3,046,562 UART: [art] Lock RT PCRs Done
3,048,046 UART: [art] Populate DV Done
3,056,321 UART: [fht] FMC Alias Private Key: 7
3,057,279 UART: [art] Derive CDI
3,057,559 UART: [art] Store in slot 0x4
3,143,546 UART: [art] Derive Key Pair
3,143,906 UART: [art] Store priv key in slot 0x5
3,157,788 UART: [art] Derive Key Pair - Done
3,172,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,605 UART: [art] PUB.X = 7D4A739F2E95A5CB23A3050005587C86B2F98D8A7AF43F141AAC7AE208EB184142C12275FD06D150E7D036FFB0E82FDB
3,195,351 UART: [art] PUB.Y = 30E03D31BE5417284900F30A48581CC4C9156A4A80CB87E1258E1EC947B512300376F43A6C9B167F90A043FC2AFD9DBE
3,202,275 UART: [art] SIG.R = 86ED078427693A57D79E1CF26EFE80DB01053D602D70CEF26849AFC6F4DE608287BA618F543063E49895B877952E7C11
3,209,034 UART: [art] SIG.S = 521E90CC3958491BA7699CBAB8CEC575E191731FD96987722224C1AE2754C34D45373C6CAC150AB682AD169F4A3BCA7B
3,232,877 UART: Caliptra RT
3,233,128 UART: [state] CFI Enabled
3,352,191 UART: [rt] RT listening for mailbox commands...
3,352,861 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,353 UART: [rt]cmd =0x4c4d5356, len=1672
3,657,000 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,755 ready_for_fw is high
1,060,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,212 >>> mbox cmd response: success
2,743,089 UART:
2,743,105 UART: Running Caliptra FMC ...
2,743,513 UART:
2,743,567 UART: [state] CFI Enabled
2,753,851 UART: [fht] FMC Alias Private Key: 7
2,872,447 UART: [art] Extend RT PCRs Done
2,872,875 UART: [art] Lock RT PCRs Done
2,874,223 UART: [art] Populate DV Done
2,882,202 UART: [fht] FMC Alias Private Key: 7
2,883,160 UART: [art] Derive CDI
2,883,440 UART: [art] Store in slot 0x4
2,969,017 UART: [art] Derive Key Pair
2,969,377 UART: [art] Store priv key in slot 0x5
2,982,207 UART: [art] Derive Key Pair - Done
2,997,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,879 UART: [art] PUB.X = 434EC9A910211D5AF67EA2E230BBE1D8000C806F540E4023C19E6BB0F30AF7D663302B0AAE7A9E093F7CE054D2F996CF
3,020,624 UART: [art] PUB.Y = 7E91799A95A97897B8C6F6269DC3CAD5DB4EE70F8CFFAA6C37E627895B6FED52867B5205D646A8F003D61F1235763074
3,027,569 UART: [art] SIG.R = 32F505F135BAD3334F7E2CBCAE7868EF5BB0DE20B8E72312936335F620C4239B7957C1218916DC2F093B2EA5693BB9E0
3,034,337 UART: [art] SIG.S = A6E0EB2B2DE1A749A4FEB1D23A96463859BA9731C2B5E31C6A169A444A29562D6B9BCD510FD1434FFEF7A64906C50C33
3,058,362 UART: Caliptra RT
3,058,613 UART: [state] CFI Enabled
3,177,168 UART: [rt] RT listening for mailbox commands...
3,177,838 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,362 UART: [rt]cmd =0x4c4d5356, len=1672
3,481,723 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
893,531 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,656 UART: [kat] ++
897,808 UART: [kat] sha1
902,112 UART: [kat] SHA2-256
904,052 UART: [kat] SHA2-384
906,773 UART: [kat] SHA2-512-ACC
908,674 UART: [kat] ECC-384
918,369 UART: [kat] HMAC-384Kdf
922,949 UART: [kat] LMS
1,171,277 UART: [kat] --
1,172,202 UART: [cold-reset] ++
1,172,636 UART: [fht] FHT @ 0x50003400
1,175,067 UART: [idev] ++
1,175,235 UART: [idev] CDI.KEYID = 6
1,175,595 UART: [idev] SUBJECT.KEYID = 7
1,176,019 UART: [idev] UDS.KEYID = 0
1,176,364 ready_for_fw is high
1,176,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,093 UART: [idev] Erasing UDS.KEYID = 0
1,201,348 UART: [idev] Sha1 KeyId Algorithm
1,209,742 UART: [idev] --
1,210,826 UART: [ldev] ++
1,210,994 UART: [ldev] CDI.KEYID = 6
1,211,357 UART: [ldev] SUBJECT.KEYID = 5
1,211,783 UART: [ldev] AUTHORITY.KEYID = 7
1,212,246 UART: [ldev] FE.KEYID = 1
1,217,508 UART: [ldev] Erasing FE.KEYID = 1
1,243,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,544 UART: [ldev] --
1,283,005 UART: [fwproc] Wait for Commands...
1,283,705 UART: [fwproc] Recv command 0x46574c44
1,284,433 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,015 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,185 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,404 >>> mbox cmd response: success
2,830,446 UART: [afmc] ++
2,830,614 UART: [afmc] CDI.KEYID = 6
2,830,976 UART: [afmc] SUBJECT.KEYID = 7
2,831,401 UART: [afmc] AUTHORITY.KEYID = 5
2,867,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,773 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,482 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,365 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,066 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,818 UART: [afmc] --
2,909,760 UART: [cold-reset] --
2,910,812 UART: [state] Locking Datavault
2,912,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,841 UART: [state] Locking ICCM
2,913,325 UART: [exit] Launching FMC @ 0x40000130
2,918,655 UART:
2,918,671 UART: Running Caliptra FMC ...
2,919,079 UART:
2,919,222 UART: [state] CFI Enabled
2,929,480 UART: [fht] FMC Alias Private Key: 7
3,047,808 UART: [art] Extend RT PCRs Done
3,048,236 UART: [art] Lock RT PCRs Done
3,049,826 UART: [art] Populate DV Done
3,058,165 UART: [fht] FMC Alias Private Key: 7
3,059,269 UART: [art] Derive CDI
3,059,549 UART: [art] Store in slot 0x4
3,145,070 UART: [art] Derive Key Pair
3,145,430 UART: [art] Store priv key in slot 0x5
3,158,446 UART: [art] Derive Key Pair - Done
3,173,173 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,497 UART: [art] PUB.X = 48951A28B8C7FB25C71508AC2C3F27142C159149FFB7F14A8F43A57246C59780D58818C64FA5AE7BF86AD69006D15C59
3,196,261 UART: [art] PUB.Y = 42EA1A581EADFD4F23718CA76E24E3BC314D06AC2137A23C44CC635F946038B3041E0EAB3B97AE9AB336D8A19B5D6EF0
3,203,218 UART: [art] SIG.R = 94374D4DECF69E88CAF5F41F0E1415D87151AFDA3DD6CD96A5AF62AC2A7677F6FD911622648B2DAECBC18A750A5BE704
3,209,999 UART: [art] SIG.S = DD1767BF6E93D8AC5FD03417E193D6424956457D8B912805DB8817B6C176661F6C7C821298BF388AB59B7D3DB6AB1CA6
3,234,252 UART: Caliptra RT
3,234,595 UART: [state] CFI Enabled
3,354,971 UART: [rt] RT listening for mailbox commands...
3,355,641 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,521 UART: [rt]cmd =0x4c4d5356, len=1672
3,660,230 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,202 ready_for_fw is high
1,061,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,643 >>> mbox cmd response: success
2,742,628 UART:
2,742,644 UART: Running Caliptra FMC ...
2,743,052 UART:
2,743,195 UART: [state] CFI Enabled
2,753,667 UART: [fht] FMC Alias Private Key: 7
2,872,537 UART: [art] Extend RT PCRs Done
2,872,965 UART: [art] Lock RT PCRs Done
2,874,357 UART: [art] Populate DV Done
2,882,582 UART: [fht] FMC Alias Private Key: 7
2,883,534 UART: [art] Derive CDI
2,883,814 UART: [art] Store in slot 0x4
2,969,561 UART: [art] Derive Key Pair
2,969,921 UART: [art] Store priv key in slot 0x5
2,982,791 UART: [art] Derive Key Pair - Done
2,997,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,571 UART: [art] PUB.X = 176B3FCE445838AB10EB06CC66D3A9EE151B5B950771E071978D712AFB903AEF5702237FE44F3BB462444F1E07970F07
3,020,325 UART: [art] PUB.Y = E77139B45F86C74B5DBA76284327E0703C374E119A2902B6E3B5FED0536D06A34FA5CAE0632A61E3D73BF8BC44F118ED
3,027,277 UART: [art] SIG.R = 98E5EEA88261A1B407371D55D17B53A9B7646D5F302EA6CF22669A8ACBF64493F2C906C7237D846E9D92942D1623B421
3,034,039 UART: [art] SIG.S = 5650B9B69B40AC8864F6E4DB01C5CE1FD394A45AB45468179A1635F6B711B832F5AAE246D6D55CDF924BCAEB4A9D6F6F
3,057,906 UART: Caliptra RT
3,058,249 UART: [state] CFI Enabled
3,177,522 UART: [rt] RT listening for mailbox commands...
3,178,192 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,030 UART: [rt]cmd =0x4c4d5356, len=1672
3,482,689 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
192,252 UART:
193,295 UART: Running Caliptra ROM ...
194,451 UART:
194,668 UART: [state] CFI Enabled
264,539 UART: [state] LifecycleState = Unprovisioned
266,535 UART: [state] DebugLocked = No
269,428 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,246 UART: [kat] SHA2-256
443,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,436 UART: [kat] ++
455,047 UART: [kat] sha1
464,804 UART: [kat] SHA2-256
467,549 UART: [kat] SHA2-384
472,259 UART: [kat] SHA2-512-ACC
474,627 UART: [kat] ECC-384
2,769,186 UART: [kat] HMAC-384Kdf
2,802,042 UART: [kat] LMS
3,992,305 UART: [kat] --
3,998,468 UART: [cold-reset] ++
4,000,543 UART: [fht] Storing FHT @ 0x50003400
4,012,254 UART: [idev] ++
4,012,830 UART: [idev] CDI.KEYID = 6
4,013,787 UART: [idev] SUBJECT.KEYID = 7
4,014,964 UART: [idev] UDS.KEYID = 0
4,016,097 ready_for_fw is high
4,016,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,166,340 UART: [idev] Erasing UDS.KEYID = 0
7,346,293 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,181 UART: [idev] --
7,370,815 UART: [ldev] ++
7,371,412 UART: [ldev] CDI.KEYID = 6
7,372,396 UART: [ldev] SUBJECT.KEYID = 5
7,373,503 UART: [ldev] AUTHORITY.KEYID = 7
7,374,855 UART: [ldev] FE.KEYID = 1
7,410,470 UART: [ldev] Erasing FE.KEYID = 1
10,755,364 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,888 UART: [ldev] --
13,119,038 UART: [fwproc] Waiting for Commands...
13,120,744 UART: [fwproc] Received command 0x46574c44
13,122,943 UART: [fwproc] Received Image of size 118548 bytes
17,227,583 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,308,185 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,346 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,710,216 >>> mbox cmd response: success
17,714,211 UART: [afmc] ++
17,714,846 UART: [afmc] CDI.KEYID = 6
17,715,763 UART: [afmc] SUBJECT.KEYID = 7
17,716,929 UART: [afmc] AUTHORITY.KEYID = 5
21,073,089 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,700 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,958 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,402 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,162 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,527 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,401 UART: [afmc] --
23,444,310 UART: [cold-reset] --
23,448,525 UART: [state] Locking Datavault
23,453,778 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,481 UART: [state] Locking ICCM
23,458,231 UART: [exit] Launching FMC @ 0x40000130
23,466,582 UART:
23,466,819 UART: Running Caliptra FMC ...
23,467,916 UART:
23,468,078 UART: [state] CFI Enabled
23,534,560 UART: [fht] FMC Alias Private Key: 7
25,874,681 UART: [art] Extend RT PCRs Done
25,875,894 UART: [art] Lock RT PCRs Done
25,877,421 UART: [art] Populate DV Done
25,883,046 UART: [fht] FMC Alias Private Key: 7
25,884,532 UART: [art] Derive CDI
25,885,293 UART: [art] Store in slot 0x4
25,944,115 UART: [art] Derive Key Pair
25,945,172 UART: [art] Store priv key in slot 0x5
29,238,127 UART: [art] Derive Key Pair - Done
29,250,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,615 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,126 UART: [art] PUB.X = 3C4A3E67651A4ECA1FEDF411651524909EFC9EF445603FDD35046B54D6EC702CB5C2616C46D02DFFCA065069D5CD7298
31,548,389 UART: [art] PUB.Y = 48B2D48A24C5FA5F169C9D54CFAEB1B029660CBD4711D46A292EF61DA0221E0899E028421150194B126CC9EC6054943A
31,555,636 UART: [art] SIG.R = B7EC426A2B7AB006D3A011988BB118F3F80EA50B5FB1DF2A00FFB58A98B4F6B1F9CE502B92DD19ED66858772E7942B84
31,562,992 UART: [art] SIG.S = 61BCE9D5BC50AC3DCEF1377FF14AABE3BCADFA56CBF24459D8537AE0D24D95DCBDB01DD4F2B5EBF3C712C5FBB5BA4295
32,868,778 UART: Caliptra RT
32,869,492 UART: [state] CFI Enabled
33,046,178 UART: [rt] RT listening for mailbox commands...
33,050,175 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,094,781 UART: [rt]cmd =0x4c4d5356, len=1672
33,514,217 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,784,167 ready_for_fw is high
3,784,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,957,666 >>> mbox cmd response: success
23,646,532 UART:
23,646,929 UART: Running Caliptra FMC ...
23,648,031 UART:
23,648,189 UART: [state] CFI Enabled
23,714,921 UART: [fht] FMC Alias Private Key: 7
26,054,987 UART: [art] Extend RT PCRs Done
26,056,323 UART: [art] Lock RT PCRs Done
26,057,660 UART: [art] Populate DV Done
26,063,064 UART: [fht] FMC Alias Private Key: 7
26,064,772 UART: [art] Derive CDI
26,065,513 UART: [art] Store in slot 0x4
26,122,663 UART: [art] Derive Key Pair
26,123,662 UART: [art] Store priv key in slot 0x5
29,416,156 UART: [art] Derive Key Pair - Done
29,428,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,717,246 UART: [art] Erasing AUTHORITY.KEYID = 7
31,718,752 UART: [art] PUB.X = 4DF664143AAD93AEE2B9B2F28F92F05C074ECE18F20B4C80F9FC7ACB0A4060D1B98F699F05717B2BC223DB715C4768E3
31,726,016 UART: [art] PUB.Y = 67E199DAB181FDDA7B5AB08611AB92BC5E9B93D7293FD60D28B4EA310703078498E95AC121F076034CBDF464E02369EF
31,733,282 UART: [art] SIG.R = C8DEAA7D7C118F4419B603467E889CBDB3A717647E68F613134F7F25E5338D0488AE9C2EE6E041328683D36D3EA3AAF7
31,740,734 UART: [art] SIG.S = 59CCC9CF8BEA76107919F159D092556A2EC50724A3C5CD2B4F1A07C51B57B1CE7DAE6DCC70E0AE305946A6F2BD5624F8
33,046,202 UART: Caliptra RT
33,046,931 UART: [state] CFI Enabled
33,222,239 UART: [rt] RT listening for mailbox commands...
33,226,173 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,270,712 UART: [rt]cmd =0x4c4d5356, len=1672
33,690,402 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,572 writing to cptra_bootfsm_go
192,687 UART:
193,073 UART: Running Caliptra ROM ...
194,205 UART:
603,944 UART: [state] CFI Enabled
615,562 UART: [state] LifecycleState = Unprovisioned
617,413 UART: [state] DebugLocked = No
620,346 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,911 UART: [kat] SHA2-256
794,697 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,206 UART: [kat] ++
805,653 UART: [kat] sha1
817,822 UART: [kat] SHA2-256
820,544 UART: [kat] SHA2-384
827,876 UART: [kat] SHA2-512-ACC
830,258 UART: [kat] ECC-384
3,115,549 UART: [kat] HMAC-384Kdf
3,127,209 UART: [kat] LMS
4,317,296 UART: [kat] --
4,321,524 UART: [cold-reset] ++
4,322,466 UART: [fht] Storing FHT @ 0x50003400
4,335,429 UART: [idev] ++
4,335,993 UART: [idev] CDI.KEYID = 6
4,337,019 UART: [idev] SUBJECT.KEYID = 7
4,338,191 UART: [idev] UDS.KEYID = 0
4,339,229 ready_for_fw is high
4,339,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,280 UART: [idev] Erasing UDS.KEYID = 0
7,620,949 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,670 UART: [idev] --
7,647,956 UART: [ldev] ++
7,648,608 UART: [ldev] CDI.KEYID = 6
7,649,519 UART: [ldev] SUBJECT.KEYID = 5
7,650,725 UART: [ldev] AUTHORITY.KEYID = 7
7,652,008 UART: [ldev] FE.KEYID = 1
7,663,414 UART: [ldev] Erasing FE.KEYID = 1
10,954,927 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,993 UART: [ldev] --
13,313,707 UART: [fwproc] Waiting for Commands...
13,316,711 UART: [fwproc] Received command 0x46574c44
13,318,926 UART: [fwproc] Received Image of size 118548 bytes
17,419,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,267 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,468 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,530 >>> mbox cmd response: success
17,899,970 UART: [afmc] ++
17,900,608 UART: [afmc] CDI.KEYID = 6
17,901,515 UART: [afmc] SUBJECT.KEYID = 7
17,902,729 UART: [afmc] AUTHORITY.KEYID = 5
21,216,942 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,513,831 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,142 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,527 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,281 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,689 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,581,785 UART: [afmc] --
23,585,050 UART: [cold-reset] --
23,590,200 UART: [state] Locking Datavault
23,596,736 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,501 UART: [state] Locking ICCM
23,601,297 UART: [exit] Launching FMC @ 0x40000130
23,609,686 UART:
23,609,921 UART: Running Caliptra FMC ...
23,611,017 UART:
23,611,176 UART: [state] CFI Enabled
23,619,384 UART: [fht] FMC Alias Private Key: 7
25,960,361 UART: [art] Extend RT PCRs Done
25,961,583 UART: [art] Lock RT PCRs Done
25,963,025 UART: [art] Populate DV Done
25,968,490 UART: [fht] FMC Alias Private Key: 7
25,970,016 UART: [art] Derive CDI
25,970,744 UART: [art] Store in slot 0x4
26,013,326 UART: [art] Derive Key Pair
26,014,317 UART: [art] Store priv key in slot 0x5
29,256,373 UART: [art] Derive Key Pair - Done
29,269,497 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,671 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,173 UART: [art] PUB.X = 4521BA88F8134D36B4E9F0B49E826A29EFFDC150EFE6F5FD9CB2D13C1D5EF9E81BE7FC8EAD1F0F5A15DE2F2BC858EF73
31,558,560 UART: [art] PUB.Y = 1D921CE79226BDB34F4A894D72122D9C7FF6D8F0F671B03AE9AEAA5FB5952A17C9218324ACCDE6C0469E2EDC43498C59
31,565,758 UART: [art] SIG.R = 1FE0B9B0B874567ED846E6B4529DF61669B3C7C7E21E686CFEAD98912999ADD8DFBEE6ADA446B1BF222FD4D5A2378592
31,573,150 UART: [art] SIG.S = 742C565E02179BBEA1D6151CC802B87FC065CAF533D1CFF30F4AB213DA2C2F939C37E1B77C110FE2BAFC767BC7EA6DCE
32,878,615 UART: Caliptra RT
32,879,324 UART: [state] CFI Enabled
33,012,650 UART: [rt] RT listening for mailbox commands...
33,016,636 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,060,927 UART: [rt]cmd =0x4c4d5356, len=1672
33,480,384 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
4,127,824 ready_for_fw is high
4,128,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,164 >>> mbox cmd response: success
23,804,947 UART:
23,805,348 UART: Running Caliptra FMC ...
23,806,511 UART:
23,806,669 UART: [state] CFI Enabled
23,814,481 UART: [fht] FMC Alias Private Key: 7
26,154,628 UART: [art] Extend RT PCRs Done
26,155,853 UART: [art] Lock RT PCRs Done
26,157,800 UART: [art] Populate DV Done
26,163,217 UART: [fht] FMC Alias Private Key: 7
26,164,754 UART: [art] Derive CDI
26,165,563 UART: [art] Store in slot 0x4
26,208,151 UART: [art] Derive Key Pair
26,209,147 UART: [art] Store priv key in slot 0x5
29,451,073 UART: [art] Derive Key Pair - Done
29,464,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,627 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,141 UART: [art] PUB.X = 3490DBF385B30CDE2C6A124B1178898FBF258BD7D6DF1F3889267A05AEAA8CEEFB30C206EA6400CADF94A79CE39B9CA8
31,753,451 UART: [art] PUB.Y = 54855835DC3C318B66C9E50D72D61DF12350B364A89BA8477555B2E86E9F8206A2EEC6D84DA1E6E6D2E82B909DD792C9
31,760,705 UART: [art] SIG.R = C4159167B0660A8FD5947DC41AC017D39B19667A715DD0F386A37C74D95337D3D73E9EC8BFB34F33719377DC3702B3A8
31,768,046 UART: [art] SIG.S = D71C57E364EC0E0962A543E72F31831456081A40215A55CCBDF228933F7B07ABCE23D9262CF51D8577BB312FB3438B83
33,073,505 UART: Caliptra RT
33,074,239 UART: [state] CFI Enabled
33,207,638 UART: [rt] RT listening for mailbox commands...
33,211,627 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,255,977 UART: [rt]cmd =0x4c4d5356, len=1672
33,675,542 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,143 UART:
192,501 UART: Running Caliptra ROM ...
193,702 UART:
193,850 UART: [state] CFI Enabled
266,847 UART: [state] LifecycleState = Unprovisioned
268,833 UART: [state] DebugLocked = No
271,005 UART: [state] WD Timer not started. Device not locked for debugging
274,051 UART: [kat] SHA2-256
453,673 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,486 UART: [kat] ++
465,019 UART: [kat] sha1
476,685 UART: [kat] SHA2-256
479,326 UART: [kat] SHA2-384
484,534 UART: [kat] SHA2-512-ACC
486,895 UART: [kat] ECC-384
2,948,142 UART: [kat] HMAC-384Kdf
2,972,118 UART: [kat] LMS
3,448,579 UART: [kat] --
3,454,012 UART: [cold-reset] ++
3,456,368 UART: [fht] FHT @ 0x50003400
3,466,777 UART: [idev] ++
3,467,338 UART: [idev] CDI.KEYID = 6
3,468,219 UART: [idev] SUBJECT.KEYID = 7
3,469,529 UART: [idev] UDS.KEYID = 0
3,470,431 ready_for_fw is high
3,470,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,687 UART: [idev] Erasing UDS.KEYID = 0
5,985,933 UART: [idev] Sha1 KeyId Algorithm
6,010,830 UART: [idev] --
6,015,960 UART: [ldev] ++
6,016,590 UART: [ldev] CDI.KEYID = 6
6,017,502 UART: [ldev] SUBJECT.KEYID = 5
6,018,735 UART: [ldev] AUTHORITY.KEYID = 7
6,019,973 UART: [ldev] FE.KEYID = 1
6,056,712 UART: [ldev] Erasing FE.KEYID = 1
8,561,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,499 UART: [ldev] --
10,376,664 UART: [fwproc] Wait for Commands...
10,378,712 UART: [fwproc] Recv command 0x46574c44
10,380,748 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,655 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,667 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,096 >>> mbox cmd response: success
14,346,427 UART: [afmc] ++
14,347,034 UART: [afmc] CDI.KEYID = 6
14,348,060 UART: [afmc] SUBJECT.KEYID = 7
14,349,162 UART: [afmc] AUTHORITY.KEYID = 5
16,875,952 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,243 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,075 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,120 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,676 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,748 UART: [afmc] --
18,697,917 UART: [cold-reset] --
18,700,752 UART: [state] Locking Datavault
18,703,293 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,997 UART: [state] Locking ICCM
18,707,121 UART: [exit] Launching FMC @ 0x40000130
18,715,526 UART:
18,715,761 UART: Running Caliptra FMC ...
18,716,858 UART:
18,717,016 UART: [state] CFI Enabled
18,777,267 UART: [fht] FMC Alias Private Key: 7
20,564,129 UART: [art] Extend RT PCRs Done
20,565,362 UART: [art] Lock RT PCRs Done
20,567,063 UART: [art] Populate DV Done
20,572,370 UART: [fht] FMC Alias Private Key: 7
20,573,901 UART: [art] Derive CDI
20,574,635 UART: [art] Store in slot 0x4
20,630,975 UART: [art] Derive Key Pair
20,632,016 UART: [art] Store priv key in slot 0x5
23,095,088 UART: [art] Derive Key Pair - Done
23,108,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,821,298 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,820 UART: [art] PUB.X = 95E2887E7FCBA739489A9B45BFB0494AD535C7631AAAF0D97C6FF02D3BF5D3FDEE3B5D5A3B3214CA14E93331FFDD4486
24,830,129 UART: [art] PUB.Y = 1FD4CB124A06452A99B04D71260BED20FD61FC0882C2C357891C159C7F979D8E8425F9C61A78D33F0F98432A6BA8289A
24,837,369 UART: [art] SIG.R = 246604F0D749D066404C83C124F031A76310A16873DAFD3D4BD03E4A64F711273962C08424F9C23EE019694BC5B189C1
24,844,706 UART: [art] SIG.S = 7BA38FA56E1EAF95DF26FA20DD9FD470816C0732E92B890ACC6E2BCF010BF195FE9BC736690D30860E15024EE809AD42
25,823,614 UART: Caliptra RT
25,824,314 UART: [state] CFI Enabled
26,005,063 UART: [rt] RT listening for mailbox commands...
26,009,074 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,053,669 UART: [rt]cmd =0x4c4d5356, len=1672
26,266,702 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,460,800 ready_for_fw is high
3,461,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,249,033 >>> mbox cmd response: success
18,532,254 UART:
18,532,629 UART: Running Caliptra FMC ...
18,533,832 UART:
18,533,997 UART: [state] CFI Enabled
18,601,111 UART: [fht] FMC Alias Private Key: 7
20,388,912 UART: [art] Extend RT PCRs Done
20,390,137 UART: [art] Lock RT PCRs Done
20,391,701 UART: [art] Populate DV Done
20,397,282 UART: [fht] FMC Alias Private Key: 7
20,398,807 UART: [art] Derive CDI
20,399,573 UART: [art] Store in slot 0x4
20,455,309 UART: [art] Derive Key Pair
20,456,307 UART: [art] Store priv key in slot 0x5
22,919,572 UART: [art] Derive Key Pair - Done
22,932,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,645,324 UART: [art] Erasing AUTHORITY.KEYID = 7
24,646,835 UART: [art] PUB.X = 3ED91B2540A0C4CBB22951FCF4A013B6EFF43FC7464E07A7738B1E36622C9F05C253FD8E42957F82D227AD121672A363
24,654,091 UART: [art] PUB.Y = C87245EBF4EF5D08669B7C3A672B5FE660398444C89BCEC9002559C178732F9E58632673BF5BE215C87E8C0925FCC012
24,661,310 UART: [art] SIG.R = 02C8F74C7D89B435EC49E9B0944E5224DC2181705ABA71598ECFD85EEE1A529682D937AA3EA0F29B88A6E5BBA5097B18
24,668,721 UART: [art] SIG.S = 977C5889FDA7AFC8587856EFDE2498C0C3E3B3ADE89C98550D4056C271447504D36CEB433D92EBF70C6DE4AC5BD10D67
25,646,947 UART: Caliptra RT
25,647,659 UART: [state] CFI Enabled
25,829,187 UART: [rt] RT listening for mailbox commands...
25,833,074 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,877,375 UART: [rt]cmd =0x4c4d5356, len=1672
26,090,178 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,492 UART:
192,864 UART: Running Caliptra ROM ...
194,006 UART:
603,793 UART: [state] CFI Enabled
618,830 UART: [state] LifecycleState = Unprovisioned
620,708 UART: [state] DebugLocked = No
623,165 UART: [state] WD Timer not started. Device not locked for debugging
627,563 UART: [kat] SHA2-256
807,161 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,964 UART: [kat] ++
818,437 UART: [kat] sha1
829,882 UART: [kat] SHA2-256
832,581 UART: [kat] SHA2-384
836,839 UART: [kat] SHA2-512-ACC
839,218 UART: [kat] ECC-384
3,282,008 UART: [kat] HMAC-384Kdf
3,293,754 UART: [kat] LMS
3,770,235 UART: [kat] --
3,774,676 UART: [cold-reset] ++
3,777,179 UART: [fht] FHT @ 0x50003400
3,787,235 UART: [idev] ++
3,787,869 UART: [idev] CDI.KEYID = 6
3,788,755 UART: [idev] SUBJECT.KEYID = 7
3,790,071 UART: [idev] UDS.KEYID = 0
3,790,981 ready_for_fw is high
3,791,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,204 UART: [idev] Erasing UDS.KEYID = 0
6,266,603 UART: [idev] Sha1 KeyId Algorithm
6,290,385 UART: [idev] --
6,293,875 UART: [ldev] ++
6,294,458 UART: [ldev] CDI.KEYID = 6
6,295,377 UART: [ldev] SUBJECT.KEYID = 5
6,296,595 UART: [ldev] AUTHORITY.KEYID = 7
6,297,830 UART: [ldev] FE.KEYID = 1
6,309,551 UART: [ldev] Erasing FE.KEYID = 1
8,791,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,482 UART: [ldev] --
10,588,280 UART: [fwproc] Wait for Commands...
10,589,777 UART: [fwproc] Recv command 0x46574c44
10,591,915 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,659 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,663 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,666 >>> mbox cmd response: success
14,567,425 UART: [afmc] ++
14,568,043 UART: [afmc] CDI.KEYID = 6
14,568,933 UART: [afmc] SUBJECT.KEYID = 7
14,570,151 UART: [afmc] AUTHORITY.KEYID = 5
17,071,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,349 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,537 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,360 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,433 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,995 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,656 UART: [afmc] --
18,870,691 UART: [cold-reset] --
18,874,897 UART: [state] Locking Datavault
18,878,912 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,667 UART: [state] Locking ICCM
18,881,953 UART: [exit] Launching FMC @ 0x40000130
18,890,407 UART:
18,890,652 UART: Running Caliptra FMC ...
18,891,756 UART:
18,891,916 UART: [state] CFI Enabled
18,900,183 UART: [fht] FMC Alias Private Key: 7
20,666,293 UART: [art] Extend RT PCRs Done
20,667,513 UART: [art] Lock RT PCRs Done
20,669,142 UART: [art] Populate DV Done
20,674,660 UART: [fht] FMC Alias Private Key: 7
20,676,184 UART: [art] Derive CDI
20,676,954 UART: [art] Store in slot 0x4
20,719,657 UART: [art] Derive Key Pair
20,720,684 UART: [art] Store priv key in slot 0x5
23,147,298 UART: [art] Derive Key Pair - Done
23,160,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,957 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,459 UART: [art] PUB.X = E94527976E85A3A7CC28B0BACE25078533DD9CEE0404225D018F59F87E28CB5B8D6E6F60EEB9BCF106C551F72FEB77EF
24,875,749 UART: [art] PUB.Y = CEF8CCCDDF96D6BCB58BC0B2D2BDA9338088657A3D04D7C48AF722F4810C3B1C504393E8859C0569664D0D356DD61E6C
24,882,973 UART: [art] SIG.R = DC7D08966AE19E67BAE9B881430EF760D0F8C0859C1534EDE87462DB91BD88A58C13ECAE7D82D6A0680C4E5E66A46228
24,890,423 UART: [art] SIG.S = 7F8DEB4BD019635ECB92C6D0F5739D50C1925DF8FFA0109D63339DDD8D9E264DB576A1A48A27D19FAB60A755A37F0949
25,869,164 UART: Caliptra RT
25,869,862 UART: [state] CFI Enabled
26,002,615 UART: [rt] RT listening for mailbox commands...
26,006,551 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,051,171 UART: [rt]cmd =0x4c4d5356, len=1672
26,264,240 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,781,707 ready_for_fw is high
3,782,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,862 >>> mbox cmd response: success
18,696,927 UART:
18,697,326 UART: Running Caliptra FMC ...
18,698,463 UART:
18,698,621 UART: [state] CFI Enabled
18,706,682 UART: [fht] FMC Alias Private Key: 7
20,472,048 UART: [art] Extend RT PCRs Done
20,473,283 UART: [art] Lock RT PCRs Done
20,474,750 UART: [art] Populate DV Done
20,480,234 UART: [fht] FMC Alias Private Key: 7
20,481,784 UART: [art] Derive CDI
20,482,602 UART: [art] Store in slot 0x4
20,525,210 UART: [art] Derive Key Pair
20,526,257 UART: [art] Store priv key in slot 0x5
22,953,398 UART: [art] Derive Key Pair - Done
22,966,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,503 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,005 UART: [art] PUB.X = AAAE6CEE500E83787E2ADEF4C84EB0BBF68849A8CAFECE939DF8A4DDB93160122D216A4CDA9A7CF7879DA909C5D3D1BF
24,681,334 UART: [art] PUB.Y = C5ABEE835C9A053B817663C36D02BE4C8BA69EDBDCCFCA31BF6087ACD6BA503CF5BB6269992282E0EC6976956D711051
24,688,596 UART: [art] SIG.R = 236D1966C364B50796E5A28F22CADC9E72B76BEE689188672D6502664EFBCEF8A9B9664F8C4619E16A6D88C549AC1A18
24,695,994 UART: [art] SIG.S = 12C227820CA9A3EDE81DD4CA7448F114AA05E079EBF7C9FBAB81CDD0EA571475A5875106F514C5B9B58F5A2DBE53DDDA
25,674,290 UART: Caliptra RT
25,675,011 UART: [state] CFI Enabled
25,807,916 UART: [rt] RT listening for mailbox commands...
25,811,838 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,856,282 UART: [rt]cmd =0x4c4d5356, len=1672
26,069,291 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,111 UART:
192,480 UART: Running Caliptra ROM ...
193,683 UART:
193,836 UART: [state] CFI Enabled
263,602 UART: [state] LifecycleState = Unprovisioned
266,024 UART: [state] DebugLocked = No
268,720 UART: [state] WD Timer not started. Device not locked for debugging
273,110 UART: [kat] SHA2-256
462,976 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,788 UART: [kat] ++
474,264 UART: [kat] sha1
486,650 UART: [kat] SHA2-256
489,630 UART: [kat] SHA2-384
495,269 UART: [kat] SHA2-512-ACC
497,846 UART: [kat] ECC-384
2,947,196 UART: [kat] HMAC-384Kdf
2,969,476 UART: [kat] LMS
3,501,278 UART: [kat] --
3,504,489 UART: [cold-reset] ++
3,506,062 UART: [fht] FHT @ 0x50003400
3,518,334 UART: [idev] ++
3,519,082 UART: [idev] CDI.KEYID = 6
3,520,019 UART: [idev] SUBJECT.KEYID = 7
3,521,195 UART: [idev] UDS.KEYID = 0
3,522,116 ready_for_fw is high
3,522,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,550 UART: [idev] Erasing UDS.KEYID = 0
6,026,436 UART: [idev] Sha1 KeyId Algorithm
6,049,009 UART: [idev] --
6,054,089 UART: [ldev] ++
6,054,771 UART: [ldev] CDI.KEYID = 6
6,055,681 UART: [ldev] SUBJECT.KEYID = 5
6,056,892 UART: [ldev] AUTHORITY.KEYID = 7
6,058,122 UART: [ldev] FE.KEYID = 1
6,099,542 UART: [ldev] Erasing FE.KEYID = 1
8,606,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,323 UART: [ldev] --
10,409,593 UART: [fwproc] Wait for Commands...
10,411,366 UART: [fwproc] Recv command 0x46574c44
10,413,667 UART: [fwproc] Recv'd Img size: 118548 bytes
13,904,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,976,307 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,099,896 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,660,522 >>> mbox cmd response: success
14,664,809 UART: [afmc] ++
14,665,524 UART: [afmc] CDI.KEYID = 6
14,666,688 UART: [afmc] SUBJECT.KEYID = 7
14,668,230 UART: [afmc] AUTHORITY.KEYID = 5
17,210,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,136 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,065 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,165 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,304 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,245 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,386 UART: [afmc] --
19,011,336 UART: [cold-reset] --
19,014,497 UART: [state] Locking Datavault
19,020,882 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,024 UART: [state] Locking ICCM
19,025,379 UART: [exit] Launching FMC @ 0x40000130
19,034,068 UART:
19,034,301 UART: Running Caliptra FMC ...
19,035,339 UART:
19,035,486 UART: [state] CFI Enabled
19,093,158 UART: [fht] FMC Alias Private Key: 7
20,879,739 UART: [art] Extend RT PCRs Done
20,880,975 UART: [art] Lock RT PCRs Done
20,882,353 UART: [art] Populate DV Done
20,887,980 UART: [fht] FMC Alias Private Key: 7
20,889,568 UART: [art] Derive CDI
20,890,299 UART: [art] Store in slot 0x4
20,946,244 UART: [art] Derive Key Pair
20,947,237 UART: [art] Store priv key in slot 0x5
23,409,841 UART: [art] Derive Key Pair - Done
23,422,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,533 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,053 UART: [art] PUB.X = BA64681BE21EE6C491B4FA60E37928641AA27600AE04D1067CA4E4D148F21E2DD2788A490481E856BEDBE900D5FB8733
25,145,279 UART: [art] PUB.Y = 49917D46D4E2A681AEDB7DC95C7856F5AAC764DE1F57645348262D71FF748167255C750F6E96BF1DBAE8CE6F529F409F
25,152,554 UART: [art] SIG.R = CA2F58C8A57B12D889C1EE4331276406A34073705B66985DF2E47325DD4D68A66CB6B87E5C0B96B053AEA5F242742FEB
25,159,921 UART: [art] SIG.S = DE95EC1D0EE63FBB8524CDB71E82813A69F7E0D9682106E1A838A936F9FD8539E869115380BE2E86F724B239ECDBD923
26,139,168 UART: Caliptra RT
26,139,859 UART: [state] CFI Enabled
26,318,769 UART: [rt] RT listening for mailbox commands...
26,322,733 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,367,489 UART: [rt]cmd =0x4c4d5356, len=1672
26,580,673 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,440,254 ready_for_fw is high
3,440,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,845,930 >>> mbox cmd response: success
19,130,656 UART:
19,131,060 UART: Running Caliptra FMC ...
19,132,377 UART:
19,132,560 UART: [state] CFI Enabled
19,199,932 UART: [fht] FMC Alias Private Key: 7
20,966,685 UART: [art] Extend RT PCRs Done
20,967,909 UART: [art] Lock RT PCRs Done
20,969,398 UART: [art] Populate DV Done
20,974,726 UART: [fht] FMC Alias Private Key: 7
20,976,412 UART: [art] Derive CDI
20,977,175 UART: [art] Store in slot 0x4
21,032,432 UART: [art] Derive Key Pair
21,033,435 UART: [art] Store priv key in slot 0x5
23,496,301 UART: [art] Derive Key Pair - Done
23,509,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,623 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,149 UART: [art] PUB.X = A30055FD3EB7EE7ABD0BE4D0881873FE3BD19E44A9BB294C68251DC11C9A5823252B0C569D340C463FC1773B447C62BF
25,230,371 UART: [art] PUB.Y = 22D24676FE65131B0218C612AF35107B0FA1AB2E8A333CFB21262D09051AA846925F5B37FB32BC4F36584740EC527D25
25,237,640 UART: [art] SIG.R = FAB87BFE0D555457C408D299BF238EC6CCE0778D1958961143E797FCB4DC6FA45A791618A429868922889B6A3CB4BBB6
25,245,014 UART: [art] SIG.S = D7EA86972EBF42CB997E08AC20867C6B417C88BB0CA98750F99FAC67979728BA5E21B9D9B8CC18FED515E90606ABA60E
26,224,087 UART: Caliptra RT
26,224,805 UART: [state] CFI Enabled
26,405,478 UART: [rt] RT listening for mailbox commands...
26,409,450 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,454,036 UART: [rt]cmd =0x4c4d5356, len=1672
26,666,958 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,426 UART:
192,797 UART: Running Caliptra ROM ...
193,897 UART:
603,521 UART: [state] CFI Enabled
618,692 UART: [state] LifecycleState = Unprovisioned
621,075 UART: [state] DebugLocked = No
623,666 UART: [state] WD Timer not started. Device not locked for debugging
627,783 UART: [kat] SHA2-256
817,720 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,455 UART: [kat] ++
828,977 UART: [kat] sha1
841,199 UART: [kat] SHA2-256
844,219 UART: [kat] SHA2-384
850,358 UART: [kat] SHA2-512-ACC
852,948 UART: [kat] ECC-384
3,297,482 UART: [kat] HMAC-384Kdf
3,309,586 UART: [kat] LMS
3,841,400 UART: [kat] --
3,845,906 UART: [cold-reset] ++
3,847,275 UART: [fht] FHT @ 0x50003400
3,858,896 UART: [idev] ++
3,859,603 UART: [idev] CDI.KEYID = 6
3,860,513 UART: [idev] SUBJECT.KEYID = 7
3,861,761 UART: [idev] UDS.KEYID = 0
3,862,668 ready_for_fw is high
3,862,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,730 UART: [idev] Erasing UDS.KEYID = 0
6,337,580 UART: [idev] Sha1 KeyId Algorithm
6,360,447 UART: [idev] --
6,364,565 UART: [ldev] ++
6,365,262 UART: [ldev] CDI.KEYID = 6
6,366,225 UART: [ldev] SUBJECT.KEYID = 5
6,367,341 UART: [ldev] AUTHORITY.KEYID = 7
6,368,575 UART: [ldev] FE.KEYID = 1
6,378,906 UART: [ldev] Erasing FE.KEYID = 1
8,854,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,182 UART: [ldev] --
10,644,969 UART: [fwproc] Wait for Commands...
10,647,075 UART: [fwproc] Recv command 0x46574c44
10,649,334 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,040 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,676 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,845 >>> mbox cmd response: success
14,910,670 UART: [afmc] ++
14,911,399 UART: [afmc] CDI.KEYID = 6
14,912,519 UART: [afmc] SUBJECT.KEYID = 7
14,914,073 UART: [afmc] AUTHORITY.KEYID = 5
17,417,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,137,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,139,580 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,154,687 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,169,826 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,184,740 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,886 UART: [afmc] --
19,213,119 UART: [cold-reset] --
19,219,586 UART: [state] Locking Datavault
19,225,013 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,176 UART: [state] Locking ICCM
19,228,912 UART: [exit] Launching FMC @ 0x40000130
19,237,609 UART:
19,237,849 UART: Running Caliptra FMC ...
19,238,881 UART:
19,239,033 UART: [state] CFI Enabled
19,247,359 UART: [fht] FMC Alias Private Key: 7
21,013,817 UART: [art] Extend RT PCRs Done
21,015,043 UART: [art] Lock RT PCRs Done
21,016,645 UART: [art] Populate DV Done
21,022,283 UART: [fht] FMC Alias Private Key: 7
21,023,771 UART: [art] Derive CDI
21,024,511 UART: [art] Store in slot 0x4
21,067,376 UART: [art] Derive Key Pair
21,068,422 UART: [art] Store priv key in slot 0x5
23,495,225 UART: [art] Derive Key Pair - Done
23,508,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,181 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,688 UART: [art] PUB.X = B1B9726D33DAAA04FE3719FC4B32237985C8B947A2E1B4AFF816CF3C0E67A9C45B1EB009D69811FCF50714A0CCB43137
25,222,954 UART: [art] PUB.Y = 3099F6DDEC63C7C39506BD0FD535D3AEFCB4247664640A812BE69B8EAD917E84D8E93C5226E8E91D05FA1B1A87016D14
25,230,211 UART: [art] SIG.R = CFBF6D37477CD368D9444D8967278ED084563BFBA1FD29CC5FED8F979C18A4CB8B418BE5F39773805D85140AE26A632F
25,237,629 UART: [art] SIG.S = 2812C18CD1D9A89EE9137ADEB4EB98B0682A6AA0D4ACB642FAC17BF584551AC788349347890D525FC566DD33108EB8E0
26,216,162 UART: Caliptra RT
26,216,855 UART: [state] CFI Enabled
26,349,372 UART: [rt] RT listening for mailbox commands...
26,353,337 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,398,018 UART: [rt]cmd =0x4c4d5356, len=1672
26,610,979 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,753,964 ready_for_fw is high
3,754,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,281 >>> mbox cmd response: success
19,296,998 UART:
19,297,421 UART: Running Caliptra FMC ...
19,298,729 UART:
19,298,908 UART: [state] CFI Enabled
19,306,279 UART: [fht] FMC Alias Private Key: 7
21,072,202 UART: [art] Extend RT PCRs Done
21,073,452 UART: [art] Lock RT PCRs Done
21,074,636 UART: [art] Populate DV Done
21,080,173 UART: [fht] FMC Alias Private Key: 7
21,081,775 UART: [art] Derive CDI
21,082,519 UART: [art] Store in slot 0x4
21,125,450 UART: [art] Derive Key Pair
21,126,495 UART: [art] Store priv key in slot 0x5
23,553,508 UART: [art] Derive Key Pair - Done
23,566,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,847 UART: [art] Erasing AUTHORITY.KEYID = 7
25,274,359 UART: [art] PUB.X = 78EF3311AA001449D79E429B69B6349AF73ECD541CFFCF51A9037F645D09041BC5A7C771AE77CEDD6A927CED7674CAAE
25,281,600 UART: [art] PUB.Y = 9006F9468FBB11E01E149D788074B957339DDA42C85BF2232CB206639636BEDEEB5A7673C6F2E5164A716E7F2446205D
25,288,840 UART: [art] SIG.R = 435CEE398FF264271A75F4C8321186F1475BB8B9FDF29D164867C3DE541ABD644255163840BB8A58465FA0345571DECB
25,296,226 UART: [art] SIG.S = 062155109BF1B8FA2B8B6618AA17913C6FD39A793D09EFB0F26A38276E728F7F75A3802E00E6E1099F904CAA68B3DEDB
26,275,546 UART: Caliptra RT
26,276,241 UART: [state] CFI Enabled
26,410,486 UART: [rt] RT listening for mailbox commands...
26,414,472 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,458,892 UART: [rt]cmd =0x4c4d5356, len=1672
26,672,022 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,648 UART: [state] LifecycleState = Unprovisioned
86,303 UART: [state] DebugLocked = No
87,015 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,581 UART: [kat] SHA2-256
882,512 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,627 UART: [kat] ++
886,779 UART: [kat] sha1
891,041 UART: [kat] SHA2-256
892,979 UART: [kat] SHA2-384
895,774 UART: [kat] SHA2-512-ACC
897,675 UART: [kat] ECC-384
903,202 UART: [kat] HMAC-384Kdf
907,754 UART: [kat] LMS
1,475,950 UART: [kat] --
1,476,733 UART: [cold-reset] ++
1,477,097 UART: [fht] Storing FHT @ 0x50003400
1,479,924 UART: [idev] ++
1,480,092 UART: [idev] CDI.KEYID = 6
1,480,452 UART: [idev] SUBJECT.KEYID = 7
1,480,876 UART: [idev] UDS.KEYID = 0
1,481,221 ready_for_fw is high
1,481,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,970 UART: [idev] Erasing UDS.KEYID = 0
1,505,064 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,656 UART: [idev] --
1,514,825 UART: [ldev] ++
1,514,993 UART: [ldev] CDI.KEYID = 6
1,515,356 UART: [ldev] SUBJECT.KEYID = 5
1,515,782 UART: [ldev] AUTHORITY.KEYID = 7
1,516,245 UART: [ldev] FE.KEYID = 1
1,521,475 UART: [ldev] Erasing FE.KEYID = 1
1,546,706 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,520 UART: [ldev] --
1,585,871 UART: [fwproc] Waiting for Commands...
1,586,486 UART: [fwproc] Received command 0x46574c44
1,587,277 UART: [fwproc] Received Image of size 118548 bytes
2,932,099 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,727 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,945 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,326 >>> mbox cmd response: success
3,132,342 UART: [afmc] ++
3,132,510 UART: [afmc] CDI.KEYID = 6
3,132,872 UART: [afmc] SUBJECT.KEYID = 7
3,133,297 UART: [afmc] AUTHORITY.KEYID = 5
3,168,662 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,942 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,722 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,431 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,314 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,997 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,753 UART: [afmc] --
3,211,873 UART: [cold-reset] --
3,212,671 UART: [state] Locking Datavault
3,213,840 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,444 UART: [state] Locking ICCM
3,214,864 UART: [exit] Launching FMC @ 0x40000130
3,220,194 UART:
3,220,210 UART: Running Caliptra FMC ...
3,220,618 UART:
3,220,672 UART: [state] CFI Enabled
3,231,246 UART: [fht] FMC Alias Private Key: 7
3,350,054 UART: [art] Extend RT PCRs Done
3,350,482 UART: [art] Lock RT PCRs Done
3,351,862 UART: [art] Populate DV Done
3,360,291 UART: [fht] FMC Alias Private Key: 7
3,361,337 UART: [art] Derive CDI
3,361,617 UART: [art] Store in slot 0x4
3,447,455 UART: [art] Derive Key Pair
3,447,815 UART: [art] Store priv key in slot 0x5
3,460,824 UART: [art] Derive Key Pair - Done
3,475,533 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,787 UART: [art] PUB.X = 06BF5636166F96F6BEF3A30A3798D62F503B3A807D86F968F3E0AB8EA7EEA011A1105E861ECB471ACA9D182C51DD0E60
3,498,560 UART: [art] PUB.Y = 1E8CE5913A8FED18D0CDE4B562B0FA401B106EEF47F5C7605EDCA0F85EB492A1FE1AF82419CB3C1A448AEEEB6E79CF1B
3,505,540 UART: [art] SIG.R = 1CB14625C092C505F166D731ABE77C0E8CD62DB9B5762D48B75A358C2F46E8FA61C29A9C9F75D58CA2BBC04D1FEE68DA
3,512,322 UART: [art] SIG.S = 141F62D1F8AF191F7FF0C8AB073AECBD78EB4B262CEC4E4BDA7FEC343933932E2DAE285F468C18FF7D9C002A5A96980D
3,536,136 UART: Caliptra RT
3,536,387 UART: [state] CFI Enabled
3,656,778 UART: [rt] RT listening for mailbox commands...
3,657,448 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,132 UART: [rt]cmd =0x4c4d5356, len=1672
4,276,790 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,101 ready_for_fw is high
1,363,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,532 >>> mbox cmd response: success
3,043,199 UART:
3,043,215 UART: Running Caliptra FMC ...
3,043,623 UART:
3,043,677 UART: [state] CFI Enabled
3,053,809 UART: [fht] FMC Alias Private Key: 7
3,173,081 UART: [art] Extend RT PCRs Done
3,173,509 UART: [art] Lock RT PCRs Done
3,175,089 UART: [art] Populate DV Done
3,183,386 UART: [fht] FMC Alias Private Key: 7
3,184,558 UART: [art] Derive CDI
3,184,838 UART: [art] Store in slot 0x4
3,270,466 UART: [art] Derive Key Pair
3,270,826 UART: [art] Store priv key in slot 0x5
3,284,261 UART: [art] Derive Key Pair - Done
3,299,123 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,729 UART: [art] PUB.X = FA626746B4112BE0A5C342C36E43D830D544A64F2B15FE6F7A00C99BA3C9369A2FE5026E5BE3B094B448E2D8098CCB2C
3,322,481 UART: [art] PUB.Y = 98077C9EBDBAFCD11EFF4D5B18AB115E16DBAB5A90AED44E46D3C06A212C5195275DF7490FEFE4F38DA86AE2AF0A2ED9
3,329,452 UART: [art] SIG.R = 8599B87D9F3D7D400E4523FBD6F39CCF7B0DAFAFF81A35749539CBCDA2C9424A611ADACD144774DB5424F414A7F50CF0
3,336,231 UART: [art] SIG.S = 503199BD8AA65B9310CF735639E9F19224CF8F3773856AED3C7665D515A36926AF09DA8DE3456DF17A99592E6027B72F
3,360,082 UART: Caliptra RT
3,360,333 UART: [state] CFI Enabled
3,479,947 UART: [rt] RT listening for mailbox commands...
3,480,617 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,189 UART: [rt]cmd =0x4c4d5356, len=1672
4,099,941 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,991 UART: [state] LifecycleState = Unprovisioned
85,646 UART: [state] DebugLocked = No
86,252 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,866 UART: [kat] SHA2-256
881,797 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,912 UART: [kat] ++
886,064 UART: [kat] sha1
890,364 UART: [kat] SHA2-256
892,302 UART: [kat] SHA2-384
895,063 UART: [kat] SHA2-512-ACC
896,964 UART: [kat] ECC-384
902,877 UART: [kat] HMAC-384Kdf
907,581 UART: [kat] LMS
1,475,777 UART: [kat] --
1,476,878 UART: [cold-reset] ++
1,477,350 UART: [fht] Storing FHT @ 0x50003400
1,479,999 UART: [idev] ++
1,480,167 UART: [idev] CDI.KEYID = 6
1,480,527 UART: [idev] SUBJECT.KEYID = 7
1,480,951 UART: [idev] UDS.KEYID = 0
1,481,296 ready_for_fw is high
1,481,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,879 UART: [idev] Erasing UDS.KEYID = 0
1,505,293 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,921 UART: [idev] --
1,514,978 UART: [ldev] ++
1,515,146 UART: [ldev] CDI.KEYID = 6
1,515,509 UART: [ldev] SUBJECT.KEYID = 5
1,515,935 UART: [ldev] AUTHORITY.KEYID = 7
1,516,398 UART: [ldev] FE.KEYID = 1
1,521,590 UART: [ldev] Erasing FE.KEYID = 1
1,546,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,079 UART: [ldev] --
1,586,552 UART: [fwproc] Waiting for Commands...
1,587,383 UART: [fwproc] Received command 0x46574c44
1,588,174 UART: [fwproc] Received Image of size 118548 bytes
2,932,452 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,330 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,548 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,925 >>> mbox cmd response: success
3,133,111 UART: [afmc] ++
3,133,279 UART: [afmc] CDI.KEYID = 6
3,133,641 UART: [afmc] SUBJECT.KEYID = 7
3,134,066 UART: [afmc] AUTHORITY.KEYID = 5
3,168,951 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,361 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,141 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,850 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,733 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,416 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,508 UART: [afmc] --
3,212,432 UART: [cold-reset] --
3,213,166 UART: [state] Locking Datavault
3,214,651 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,255 UART: [state] Locking ICCM
3,215,697 UART: [exit] Launching FMC @ 0x40000130
3,221,027 UART:
3,221,043 UART: Running Caliptra FMC ...
3,221,451 UART:
3,221,594 UART: [state] CFI Enabled
3,232,662 UART: [fht] FMC Alias Private Key: 7
3,352,124 UART: [art] Extend RT PCRs Done
3,352,552 UART: [art] Lock RT PCRs Done
3,353,992 UART: [art] Populate DV Done
3,362,101 UART: [fht] FMC Alias Private Key: 7
3,363,133 UART: [art] Derive CDI
3,363,413 UART: [art] Store in slot 0x4
3,449,417 UART: [art] Derive Key Pair
3,449,777 UART: [art] Store priv key in slot 0x5
3,463,386 UART: [art] Derive Key Pair - Done
3,478,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,652 UART: [art] PUB.X = 2943E4BCAA1DE6C2E34D3AC3FAE4C765BED1DC265E4CA541B10879E010B5DA61FD02E98688C0DE29879E68873EA7BA02
3,501,431 UART: [art] PUB.Y = D3392184FC6D1EBCDB84474B479E2A1D54DB6E9C405D64F684C404B55BA90E1BD87770295B6916A0515CAC2B42CD3B48
3,508,383 UART: [art] SIG.R = 25F3765A72FC26EA3AE033ED7E451B0BFE45063496A87DEB5C5A70EC3F8E66CF6C4879D749067AD42347F48E6A574296
3,515,150 UART: [art] SIG.S = 25054F1D665503B69907E01BDE673F6BD1EEE39AD27B7AA830A44B9E762C43A0D8592B1CBEC593A85BFFCA6619E94313
3,538,301 UART: Caliptra RT
3,538,644 UART: [state] CFI Enabled
3,658,797 UART: [rt] RT listening for mailbox commands...
3,659,467 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,333 UART: [rt]cmd =0x4c4d5356, len=1672
4,278,971 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,888 ready_for_fw is high
1,362,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,265 >>> mbox cmd response: success
3,041,804 UART:
3,041,820 UART: Running Caliptra FMC ...
3,042,228 UART:
3,042,371 UART: [state] CFI Enabled
3,053,063 UART: [fht] FMC Alias Private Key: 7
3,171,889 UART: [art] Extend RT PCRs Done
3,172,317 UART: [art] Lock RT PCRs Done
3,174,085 UART: [art] Populate DV Done
3,182,322 UART: [fht] FMC Alias Private Key: 7
3,183,258 UART: [art] Derive CDI
3,183,538 UART: [art] Store in slot 0x4
3,268,740 UART: [art] Derive Key Pair
3,269,100 UART: [art] Store priv key in slot 0x5
3,283,025 UART: [art] Derive Key Pair - Done
3,297,905 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,299 UART: [art] PUB.X = 305924D033865F3A32E0B345ED80BFE1E0026210F369C13D556550FAE7CCA4C1881790AD696B607F20901C326BFCC8DA
3,321,068 UART: [art] PUB.Y = 0D6802435A5F5D8F1AAB48FC14A98D568301A40D0D131DD1AF7EF0EDCAB7EF1390751061D7484D6786FE03360D51E93F
3,328,005 UART: [art] SIG.R = ED1B0EECA3D4F3C162FFAEE487F0A0098967430A5CB2C993E8217C1E8059F4227AA0AB109E94E6B705AF3514A5D93C08
3,334,772 UART: [art] SIG.S = 761F13DC2710B94ACD422C9F88EE128D32084B93A27E6E6124D468B4C1EEADF835C2779BBCD458310AEF8D30D627C896
3,358,768 UART: Caliptra RT
3,359,111 UART: [state] CFI Enabled
3,480,293 UART: [rt] RT listening for mailbox commands...
3,480,963 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,291 UART: [rt]cmd =0x4c4d5356, len=1672
4,100,283 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,772 UART: [kat] SHA2-256
901,712 UART: [kat] SHA2-384
904,341 UART: [kat] SHA2-512-ACC
906,242 UART: [kat] ECC-384
915,707 UART: [kat] HMAC-384Kdf
920,321 UART: [kat] LMS
1,168,633 UART: [kat] --
1,169,302 UART: [cold-reset] ++
1,169,822 UART: [fht] FHT @ 0x50003400
1,172,500 UART: [idev] ++
1,172,668 UART: [idev] CDI.KEYID = 6
1,173,029 UART: [idev] SUBJECT.KEYID = 7
1,173,454 UART: [idev] UDS.KEYID = 0
1,173,800 ready_for_fw is high
1,173,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,381 UART: [idev] Erasing UDS.KEYID = 0
1,198,109 UART: [idev] Sha1 KeyId Algorithm
1,206,797 UART: [idev] --
1,207,792 UART: [ldev] ++
1,207,960 UART: [ldev] CDI.KEYID = 6
1,208,324 UART: [ldev] SUBJECT.KEYID = 5
1,208,751 UART: [ldev] AUTHORITY.KEYID = 7
1,209,214 UART: [ldev] FE.KEYID = 1
1,214,578 UART: [ldev] Erasing FE.KEYID = 1
1,240,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,910 UART: [ldev] --
1,279,281 UART: [fwproc] Wait for Commands...
1,279,902 UART: [fwproc] Recv command 0x46574c44
1,280,635 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,565 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,740 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,117 >>> mbox cmd response: success
2,824,303 UART: [afmc] ++
2,824,471 UART: [afmc] CDI.KEYID = 6
2,824,834 UART: [afmc] SUBJECT.KEYID = 7
2,825,260 UART: [afmc] AUTHORITY.KEYID = 5
2,860,733 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,651 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,361 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,242 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,894,943 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,804 UART: [afmc] --
2,903,785 UART: [cold-reset] --
2,904,311 UART: [state] Locking Datavault
2,905,492 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,096 UART: [state] Locking ICCM
2,906,640 UART: [exit] Launching FMC @ 0x40000130
2,911,970 UART:
2,911,986 UART: Running Caliptra FMC ...
2,912,394 UART:
2,912,448 UART: [state] CFI Enabled
2,923,162 UART: [fht] FMC Alias Private Key: 7
3,042,470 UART: [art] Extend RT PCRs Done
3,042,898 UART: [art] Lock RT PCRs Done
3,044,300 UART: [art] Populate DV Done
3,052,471 UART: [fht] FMC Alias Private Key: 7
3,053,637 UART: [art] Derive CDI
3,053,917 UART: [art] Store in slot 0x4
3,140,066 UART: [art] Derive Key Pair
3,140,426 UART: [art] Store priv key in slot 0x5
3,153,178 UART: [art] Derive Key Pair - Done
3,167,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,968 UART: [art] PUB.X = 57BEDAFF3DDD1879CDEF57B365958888382284E0B89231CDD6AA92E6FB4514F66B999DF5B6FA5EB7A80A8C27299104B8
3,190,744 UART: [art] PUB.Y = 0F88D72334A084BCCF212D579CB7335B6B9F56D3540E1D59E6FB648A61B6C3A981E438ADBA77E7CBA1E8537B84B9E965
3,197,698 UART: [art] SIG.R = F0119F16D04FFE42A0FEAB4E2982FFAA875F34577B390D748A4C0DF436BF449FA86C73FF2755687427397AC84E11EEF0
3,204,472 UART: [art] SIG.S = 8D1043608234787181DFF072C438A85854770D79AF991ADCDB37D89C1AC1D894C7DE728C9DCCE86D947105514543CA39
3,227,262 UART: Caliptra RT
3,227,513 UART: [state] CFI Enabled
3,348,009 UART: [rt] RT listening for mailbox commands...
3,348,679 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,389,475 UART: [rt]cmd =0x4c4d5356, len=1672
3,652,735 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,190 ready_for_fw is high
1,059,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,794 >>> mbox cmd response: success
2,740,857 UART:
2,740,873 UART: Running Caliptra FMC ...
2,741,281 UART:
2,741,335 UART: [state] CFI Enabled
2,751,823 UART: [fht] FMC Alias Private Key: 7
2,870,683 UART: [art] Extend RT PCRs Done
2,871,111 UART: [art] Lock RT PCRs Done
2,872,381 UART: [art] Populate DV Done
2,880,768 UART: [fht] FMC Alias Private Key: 7
2,881,832 UART: [art] Derive CDI
2,882,112 UART: [art] Store in slot 0x4
2,967,815 UART: [art] Derive Key Pair
2,968,175 UART: [art] Store priv key in slot 0x5
2,981,875 UART: [art] Derive Key Pair - Done
2,996,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,200 UART: [art] PUB.X = DF88AF25A50C4344151E1EBD4975477D342D3655A021BF30E11F419555828E443A4349FF828E675B0BEA653AADC04CDA
3,019,968 UART: [art] PUB.Y = CFB71BF4DEC4A21802B87B947E5D3718250AF33458FD4F7E79780BE524F1C39CC03122E35922036534612975A3E18503
3,026,897 UART: [art] SIG.R = D37FC283EA27D492ADFFE84D361F9D9EC238687370D531629B77185FD0D492771AC7E549B32908A3455352C4C2A61183
3,033,660 UART: [art] SIG.S = B74C05F5CA620D9D294F24CD1C206B361E9BF65D299778B96EE805978A583EA4369D5DFF11AAFF7314DF49678E4BF735
3,057,163 UART: Caliptra RT
3,057,414 UART: [state] CFI Enabled
3,177,924 UART: [rt] RT listening for mailbox commands...
3,178,594 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,434 UART: [rt]cmd =0x4c4d5356, len=1672
3,482,882 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,519 UART: [kat] ++
895,671 UART: [kat] sha1
900,119 UART: [kat] SHA2-256
902,059 UART: [kat] SHA2-384
904,640 UART: [kat] SHA2-512-ACC
906,541 UART: [kat] ECC-384
916,274 UART: [kat] HMAC-384Kdf
920,946 UART: [kat] LMS
1,169,258 UART: [kat] --
1,170,099 UART: [cold-reset] ++
1,170,497 UART: [fht] FHT @ 0x50003400
1,173,285 UART: [idev] ++
1,173,453 UART: [idev] CDI.KEYID = 6
1,173,814 UART: [idev] SUBJECT.KEYID = 7
1,174,239 UART: [idev] UDS.KEYID = 0
1,174,585 ready_for_fw is high
1,174,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,174 UART: [idev] Erasing UDS.KEYID = 0
1,199,354 UART: [idev] Sha1 KeyId Algorithm
1,208,300 UART: [idev] --
1,209,367 UART: [ldev] ++
1,209,535 UART: [ldev] CDI.KEYID = 6
1,209,899 UART: [ldev] SUBJECT.KEYID = 5
1,210,326 UART: [ldev] AUTHORITY.KEYID = 7
1,210,789 UART: [ldev] FE.KEYID = 1
1,216,383 UART: [ldev] Erasing FE.KEYID = 1
1,242,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,771 UART: [ldev] --
1,282,144 UART: [fwproc] Wait for Commands...
1,282,863 UART: [fwproc] Recv command 0x46574c44
1,283,596 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,308 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,483 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,642 >>> mbox cmd response: success
2,827,774 UART: [afmc] ++
2,827,942 UART: [afmc] CDI.KEYID = 6
2,828,305 UART: [afmc] SUBJECT.KEYID = 7
2,828,731 UART: [afmc] AUTHORITY.KEYID = 5
2,864,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,232 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,942 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,823 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,524 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,305 UART: [afmc] --
2,908,364 UART: [cold-reset] --
2,909,316 UART: [state] Locking Datavault
2,910,165 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,769 UART: [state] Locking ICCM
2,911,357 UART: [exit] Launching FMC @ 0x40000130
2,916,687 UART:
2,916,703 UART: Running Caliptra FMC ...
2,917,111 UART:
2,917,254 UART: [state] CFI Enabled
2,928,024 UART: [fht] FMC Alias Private Key: 7
3,046,578 UART: [art] Extend RT PCRs Done
3,047,006 UART: [art] Lock RT PCRs Done
3,048,626 UART: [art] Populate DV Done
3,057,075 UART: [fht] FMC Alias Private Key: 7
3,058,097 UART: [art] Derive CDI
3,058,377 UART: [art] Store in slot 0x4
3,144,184 UART: [art] Derive Key Pair
3,144,544 UART: [art] Store priv key in slot 0x5
3,158,710 UART: [art] Derive Key Pair - Done
3,173,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,115 UART: [art] PUB.X = F9FDA07C916F3619210A618146F388F1956F6593F08DCF1AC27A23244AC4DDEADA25D910B8D2CCC05B9CB93167E4FC90
3,196,894 UART: [art] PUB.Y = 823C77AE531A9865DEB9399B439973684582C1A2E6B61E1B5822968766A8109E1621AA5754B1D55BCAB14D5CB10D1B88
3,203,837 UART: [art] SIG.R = 8C505E7B238647C94D5DC2DF889BC6122C626FD138A11EC11F4FA264F9EE8840C38A09B4BAEE0F05C81569179C7D76F4
3,210,606 UART: [art] SIG.S = 89775CD4809CB3F2F82561BB152C387E2CC48691C5D9692737E491FE76A0752EA6B78F318F2CDAE328E47CE76ACD6E44
3,234,286 UART: Caliptra RT
3,234,629 UART: [state] CFI Enabled
3,353,767 UART: [rt] RT listening for mailbox commands...
3,354,437 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,423 UART: [rt]cmd =0x4c4d5356, len=1672
3,658,771 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,585 ready_for_fw is high
1,059,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,117 >>> mbox cmd response: success
2,740,440 UART:
2,740,456 UART: Running Caliptra FMC ...
2,740,864 UART:
2,741,007 UART: [state] CFI Enabled
2,752,057 UART: [fht] FMC Alias Private Key: 7
2,871,509 UART: [art] Extend RT PCRs Done
2,871,937 UART: [art] Lock RT PCRs Done
2,873,255 UART: [art] Populate DV Done
2,881,580 UART: [fht] FMC Alias Private Key: 7
2,882,726 UART: [art] Derive CDI
2,883,006 UART: [art] Store in slot 0x4
2,968,679 UART: [art] Derive Key Pair
2,969,039 UART: [art] Store priv key in slot 0x5
2,983,021 UART: [art] Derive Key Pair - Done
2,997,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,340 UART: [art] PUB.X = E1648FC4B6213ECAAE4A974ED94467C3790EB3FDF5AAAB0C4AAE5AFBCD8777F35F1310C9CDD72C2F24987C58746FC1F0
3,020,128 UART: [art] PUB.Y = 8C9085DEAA14CF48BEED93264FFC8B84DB5D5EFA2D7D0163B5DD75894EFBBC6EC68117B6C69C818F7BE4E5389E81E0E2
3,027,099 UART: [art] SIG.R = AB884B3D7F6B1AF0CE624AD3EC626802BD56AC52D3CE0D70B676BC2BA1E8CA4FE90034F9706EB2D80AE2CCB36E79474F
3,033,862 UART: [art] SIG.S = 3D23EF6DB6C6DAFD5264C50F713EBC4C3834C98806004F9D03A3185AF0F41623C8B74B4503CCB5D88314643A4DBE815E
3,057,744 UART: Caliptra RT
3,058,087 UART: [state] CFI Enabled
3,177,924 UART: [rt] RT listening for mailbox commands...
3,178,594 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,196 UART: [rt]cmd =0x4c4d5356, len=1672
3,482,542 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
893,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,549 UART: [kat] ++
897,701 UART: [kat] sha1
901,995 UART: [kat] SHA2-256
903,935 UART: [kat] SHA2-384
906,498 UART: [kat] SHA2-512-ACC
908,399 UART: [kat] ECC-384
918,086 UART: [kat] HMAC-384Kdf
922,698 UART: [kat] LMS
1,171,026 UART: [kat] --
1,171,935 UART: [cold-reset] ++
1,172,315 UART: [fht] FHT @ 0x50003400
1,174,872 UART: [idev] ++
1,175,040 UART: [idev] CDI.KEYID = 6
1,175,400 UART: [idev] SUBJECT.KEYID = 7
1,175,824 UART: [idev] UDS.KEYID = 0
1,176,169 ready_for_fw is high
1,176,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,008 UART: [idev] Erasing UDS.KEYID = 0
1,201,413 UART: [idev] Sha1 KeyId Algorithm
1,209,839 UART: [idev] --
1,211,083 UART: [ldev] ++
1,211,251 UART: [ldev] CDI.KEYID = 6
1,211,614 UART: [ldev] SUBJECT.KEYID = 5
1,212,040 UART: [ldev] AUTHORITY.KEYID = 7
1,212,503 UART: [ldev] FE.KEYID = 1
1,217,797 UART: [ldev] Erasing FE.KEYID = 1
1,244,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,225 UART: [ldev] --
1,283,734 UART: [fwproc] Wait for Commands...
1,284,536 UART: [fwproc] Recv command 0x46574c44
1,285,264 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,576 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,746 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,077 >>> mbox cmd response: success
2,831,091 UART: [afmc] ++
2,831,259 UART: [afmc] CDI.KEYID = 6
2,831,621 UART: [afmc] SUBJECT.KEYID = 7
2,832,046 UART: [afmc] AUTHORITY.KEYID = 5
2,866,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,730 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,439 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,322 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,023 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,915 UART: [afmc] --
2,909,843 UART: [cold-reset] --
2,910,753 UART: [state] Locking Datavault
2,912,056 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,660 UART: [state] Locking ICCM
2,913,096 UART: [exit] Launching FMC @ 0x40000130
2,918,426 UART:
2,918,442 UART: Running Caliptra FMC ...
2,918,850 UART:
2,918,904 UART: [state] CFI Enabled
2,929,286 UART: [fht] FMC Alias Private Key: 7
3,048,264 UART: [art] Extend RT PCRs Done
3,048,692 UART: [art] Lock RT PCRs Done
3,050,400 UART: [art] Populate DV Done
3,058,621 UART: [fht] FMC Alias Private Key: 7
3,059,677 UART: [art] Derive CDI
3,059,957 UART: [art] Store in slot 0x4
3,145,532 UART: [art] Derive Key Pair
3,145,892 UART: [art] Store priv key in slot 0x5
3,159,136 UART: [art] Derive Key Pair - Done
3,174,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,882 UART: [art] PUB.X = 972BBAEA75C1FF0462464D50410EB4E666AE79A97F36870346ED37CF02738E0F8F3FEB315BD7AEBC0A67AF7536B1E2A5
3,197,648 UART: [art] PUB.Y = 8D59AA8D2EDE366E8FE06B4B7C7BA414243C9B8C9790D7FC4B98F90A4C7FE689B51E64275E3C42A5C525C59ADCC8218B
3,204,611 UART: [art] SIG.R = A7FFC657C6BB2CBC279E35A48274792E64BD85F929395716B8E6E340D4B396DEC447C94884A3646E9F6A5A6C51D7747D
3,211,385 UART: [art] SIG.S = 992AA162BE2B00247932CF5C6C8A0DDA9259D8E655DE87CEF174F6B747E139DF25F0F78535CAF03A8810FEA9821928AE
3,235,846 UART: Caliptra RT
3,236,097 UART: [state] CFI Enabled
3,355,783 UART: [rt] RT listening for mailbox commands...
3,356,453 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,153 UART: [rt]cmd =0x4c4d5356, len=1672
3,660,677 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,277 ready_for_fw is high
1,060,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,350 >>> mbox cmd response: success
2,741,519 UART:
2,741,535 UART: Running Caliptra FMC ...
2,741,943 UART:
2,741,997 UART: [state] CFI Enabled
2,752,351 UART: [fht] FMC Alias Private Key: 7
2,871,983 UART: [art] Extend RT PCRs Done
2,872,411 UART: [art] Lock RT PCRs Done
2,873,753 UART: [art] Populate DV Done
2,882,132 UART: [fht] FMC Alias Private Key: 7
2,883,122 UART: [art] Derive CDI
2,883,402 UART: [art] Store in slot 0x4
2,969,299 UART: [art] Derive Key Pair
2,969,659 UART: [art] Store priv key in slot 0x5
2,982,955 UART: [art] Derive Key Pair - Done
2,997,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,416 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,181 UART: [art] PUB.X = 2CB8F31CEFD12ACDC04AB3673C972E363F1BBEF2717AB1512BD175C8B35DA8B65DC259C0A6F20C5183AF2E21111D4BE8
3,020,968 UART: [art] PUB.Y = 639BDE32F76B29F7D37CBA7EE93DE8A54CB5B4C4961550838CF45ED88D5F23DAB359B11A7BC879C0896626DFF4DD75D9
3,027,934 UART: [art] SIG.R = 0C4B5F905514CDE2160677CC5D2710035874CC1AB780EF4D1597ACF3E82DF69414574831F9C0C78D962D157BC20B2499
3,034,690 UART: [art] SIG.S = CD655C28FC4EE8C88024BEA2E4739C03CD4E62C5DD2E94C787D93FD09FC153C4DD8900ED6499B6410F521F37B9F9E03F
3,058,698 UART: Caliptra RT
3,058,949 UART: [state] CFI Enabled
3,178,792 UART: [rt] RT listening for mailbox commands...
3,179,462 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,468 UART: [rt]cmd =0x4c4d5356, len=1672
3,483,578 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
893,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,560 UART: [kat] ++
897,712 UART: [kat] sha1
901,876 UART: [kat] SHA2-256
903,816 UART: [kat] SHA2-384
906,411 UART: [kat] SHA2-512-ACC
908,312 UART: [kat] ECC-384
918,203 UART: [kat] HMAC-384Kdf
922,895 UART: [kat] LMS
1,171,223 UART: [kat] --
1,172,140 UART: [cold-reset] ++
1,172,532 UART: [fht] FHT @ 0x50003400
1,175,205 UART: [idev] ++
1,175,373 UART: [idev] CDI.KEYID = 6
1,175,733 UART: [idev] SUBJECT.KEYID = 7
1,176,157 UART: [idev] UDS.KEYID = 0
1,176,502 ready_for_fw is high
1,176,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,605 UART: [idev] Erasing UDS.KEYID = 0
1,201,500 UART: [idev] Sha1 KeyId Algorithm
1,209,828 UART: [idev] --
1,210,930 UART: [ldev] ++
1,211,098 UART: [ldev] CDI.KEYID = 6
1,211,461 UART: [ldev] SUBJECT.KEYID = 5
1,211,887 UART: [ldev] AUTHORITY.KEYID = 7
1,212,350 UART: [ldev] FE.KEYID = 1
1,217,554 UART: [ldev] Erasing FE.KEYID = 1
1,244,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,246 UART: [ldev] --
1,283,561 UART: [fwproc] Wait for Commands...
1,284,373 UART: [fwproc] Recv command 0x46574c44
1,285,101 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,677 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,847 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,130 >>> mbox cmd response: success
2,829,332 UART: [afmc] ++
2,829,500 UART: [afmc] CDI.KEYID = 6
2,829,862 UART: [afmc] SUBJECT.KEYID = 7
2,830,287 UART: [afmc] AUTHORITY.KEYID = 5
2,866,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,509 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,218 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,101 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,802 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,654 UART: [afmc] --
2,909,780 UART: [cold-reset] --
2,910,580 UART: [state] Locking Datavault
2,911,779 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,383 UART: [state] Locking ICCM
2,912,847 UART: [exit] Launching FMC @ 0x40000130
2,918,177 UART:
2,918,193 UART: Running Caliptra FMC ...
2,918,601 UART:
2,918,744 UART: [state] CFI Enabled
2,929,400 UART: [fht] FMC Alias Private Key: 7
3,048,380 UART: [art] Extend RT PCRs Done
3,048,808 UART: [art] Lock RT PCRs Done
3,050,374 UART: [art] Populate DV Done
3,058,711 UART: [fht] FMC Alias Private Key: 7
3,059,813 UART: [art] Derive CDI
3,060,093 UART: [art] Store in slot 0x4
3,145,684 UART: [art] Derive Key Pair
3,146,044 UART: [art] Store priv key in slot 0x5
3,159,366 UART: [art] Derive Key Pair - Done
3,174,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,528 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,293 UART: [art] PUB.X = 427542802D73C59303CAEC4E96F9E3EBCB2885E6CD3089520CBC9B8CBCBAC95F94043E77A622E220C91C6CECDC88ACDD
3,197,074 UART: [art] PUB.Y = 283FDE6485360E73D062430A2B6ADDCF1C1FF680B2B4F8814AE5E3E0A0FC2F25869F4EB2532CCB0FFE8D58D9DDC4816C
3,204,035 UART: [art] SIG.R = 92728B072D1166CC69EAA84F5928BD84512DA27069520DBEAFF67F957A37F9C15C53F9B1E9424B8A82B49504E83B3C26
3,210,798 UART: [art] SIG.S = 43C3730F9F5CA4B274322C8995BEA12F7089EA5ACA619F70E6323B128455F369A627A83A3104059BE70BDAB16764D9E0
3,234,362 UART: Caliptra RT
3,234,705 UART: [state] CFI Enabled
3,353,906 UART: [rt] RT listening for mailbox commands...
3,354,576 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,128 UART: [rt]cmd =0x4c4d5356, len=1672
3,658,564 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,958 ready_for_fw is high
1,059,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,917 >>> mbox cmd response: success
2,742,654 UART:
2,742,670 UART: Running Caliptra FMC ...
2,743,078 UART:
2,743,221 UART: [state] CFI Enabled
2,753,773 UART: [fht] FMC Alias Private Key: 7
2,873,699 UART: [art] Extend RT PCRs Done
2,874,127 UART: [art] Lock RT PCRs Done
2,875,519 UART: [art] Populate DV Done
2,883,770 UART: [fht] FMC Alias Private Key: 7
2,884,806 UART: [art] Derive CDI
2,885,086 UART: [art] Store in slot 0x4
2,970,729 UART: [art] Derive Key Pair
2,971,089 UART: [art] Store priv key in slot 0x5
2,984,725 UART: [art] Derive Key Pair - Done
2,999,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,870 UART: [art] PUB.X = 85A810800C8E9E9636BD611D158806B2BAB0871569BB26FBFF3665426D8B906FFD35C011B921FF04A13D5D10E2D936A5
3,022,633 UART: [art] PUB.Y = CCF712D64FDF7BDD6DA11708319B3A1903C1A84DFEB78CCC205880DFAAED9AFBC659ABB5CEE5C00B17A7087E6A44731D
3,029,599 UART: [art] SIG.R = B73E437C1B39F138A08D2630184418814FC5DAD1187606E0479A805964642D18E9AED55B244178B9575E2E52194CC9D5
3,036,356 UART: [art] SIG.S = 23D18ACBFF9C3A57B55AA5F1F41EAA571C4D0E0C4AA855E9CA873E77EDB5DB10BD142FFAC4CAADEF4D2B79F915DC4A19
3,060,108 UART: Caliptra RT
3,060,451 UART: [state] CFI Enabled
3,179,890 UART: [rt] RT listening for mailbox commands...
3,180,560 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,160 UART: [rt]cmd =0x4c4d5356, len=1672
3,484,268 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,951 writing to cptra_bootfsm_go
193,156 UART:
193,506 UART: Running Caliptra ROM ...
194,700 UART:
194,853 UART: [state] CFI Enabled
265,955 UART: [state] LifecycleState = Unprovisioned
267,927 UART: [state] DebugLocked = No
270,310 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,245 UART: [kat] SHA2-256
444,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,442 UART: [kat] ++
455,893 UART: [kat] sha1
467,050 UART: [kat] SHA2-256
469,774 UART: [kat] SHA2-384
476,492 UART: [kat] SHA2-512-ACC
478,868 UART: [kat] ECC-384
2,766,762 UART: [kat] HMAC-384Kdf
2,793,369 UART: [kat] LMS
3,983,639 UART: [kat] --
3,987,021 UART: [cold-reset] ++
3,989,050 UART: [fht] Storing FHT @ 0x50003400
4,000,535 UART: [idev] ++
4,001,114 UART: [idev] CDI.KEYID = 6
4,002,150 UART: [idev] SUBJECT.KEYID = 7
4,003,511 UART: [idev] UDS.KEYID = 0
4,004,664 ready_for_fw is high
4,004,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,153,877 UART: [idev] Erasing UDS.KEYID = 0
7,336,132 UART: [idev] Using Sha1 for KeyId Algorithm
7,357,917 UART: [idev] --
7,362,044 UART: [ldev] ++
7,362,812 UART: [ldev] CDI.KEYID = 6
7,363,734 UART: [ldev] SUBJECT.KEYID = 5
7,364,843 UART: [ldev] AUTHORITY.KEYID = 7
7,366,021 UART: [ldev] FE.KEYID = 1
7,392,879 UART: [ldev] Erasing FE.KEYID = 1
10,727,887 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,040,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,055,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,070,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,084,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,104,306 UART: [ldev] --
13,109,625 UART: [fwproc] Waiting for Commands...
13,112,852 UART: [fwproc] Received command 0x46574c44
13,115,030 UART: [fwproc] Received Image of size 118548 bytes
17,227,222 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,094 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,215 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,704,435 >>> mbox cmd response: success
17,708,320 UART: [afmc] ++
17,708,941 UART: [afmc] CDI.KEYID = 6
17,709,828 UART: [afmc] SUBJECT.KEYID = 7
17,711,105 UART: [afmc] AUTHORITY.KEYID = 5
21,087,717 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,384,930 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,387,153 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,401,609 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,416,359 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,430,734 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,452,263 UART: [afmc] --
23,455,759 UART: [cold-reset] --
23,459,135 UART: [state] Locking Datavault
23,463,268 UART: [state] Locking PCR0, PCR1 and PCR31
23,465,033 UART: [state] Locking ICCM
23,466,218 UART: [exit] Launching FMC @ 0x40000130
23,474,617 UART:
23,474,851 UART: Running Caliptra FMC ...
23,475,952 UART:
23,476,114 UART: [state] CFI Enabled
23,543,414 UART: [fht] FMC Alias Private Key: 7
25,905,062 UART: [art] Extend RT PCRs Done
25,906,312 UART: [art] Lock RT PCRs Done
25,907,779 UART: [art] Populate DV Done
25,913,093 UART: [fht] FMC Alias Private Key: 7
25,914,635 UART: [art] Derive CDI
25,915,398 UART: [art] Store in slot 0x4
25,971,906 UART: [art] Derive Key Pair
25,972,950 UART: [art] Store priv key in slot 0x5
29,265,605 UART: [art] Derive Key Pair - Done
29,278,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,566,310 UART: [art] Erasing AUTHORITY.KEYID = 7
31,567,833 UART: [art] PUB.X = 2AA122BF16F45C0C474A78245D43DD94FB33BE1E524173AA5EF9A9230F6E83CB8AD22BA4E61CEE8B010E2DF2602DDC4D
31,575,102 UART: [art] PUB.Y = 0FAEE3F336BC9C50A84ADE2F695182EEA5E8C0A5760843268FBEE49E76F982AAB424678B730CF7809D1ECC75197B9B35
31,582,359 UART: [art] SIG.R = 765F117C2EFC7394257B3AA00C2549C1C63F33A374E442B10DC0D0B97CB7738EDA1D549DA72B70CDE68BADFEF9424D67
31,589,770 UART: [art] SIG.S = 757CAC14F28A89A99F83C545B6541716BD7518BB7071837A84D8F2ADE26B41A776C34DDEBC0284CFF4050045FFC51285
32,894,963 UART: Caliptra RT
32,895,704 UART: [state] CFI Enabled
33,071,076 UART: [rt] RT listening for mailbox commands...
33,075,040 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,119,754 UART: [rt]cmd =0x4c4d5356, len=1672
33,539,336 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,805,744 ready_for_fw is high
3,806,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,993,976 >>> mbox cmd response: success
23,680,783 UART:
23,681,201 UART: Running Caliptra FMC ...
23,682,310 UART:
23,682,461 UART: [state] CFI Enabled
23,747,046 UART: [fht] FMC Alias Private Key: 7
26,087,528 UART: [art] Extend RT PCRs Done
26,088,760 UART: [art] Lock RT PCRs Done
26,090,305 UART: [art] Populate DV Done
26,095,682 UART: [fht] FMC Alias Private Key: 7
26,097,333 UART: [art] Derive CDI
26,098,073 UART: [art] Store in slot 0x4
26,154,792 UART: [art] Derive Key Pair
26,155,833 UART: [art] Store priv key in slot 0x5
29,447,550 UART: [art] Derive Key Pair - Done
29,460,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,561 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,062 UART: [art] PUB.X = 2E1AFF92724D22C431A4686E8088653C3E0C8C40E82C50E031313326392124C22B205B78CA1071BCD270CDEF3DEAA09C
31,758,327 UART: [art] PUB.Y = 6F79880A4891A8A32822AC08E17FBD4584D9F5B0B3BDE252CBE9FCE61B1531022BACA7A233E236BAB11A4F7166FEF753
31,765,583 UART: [art] SIG.R = C72FE413779E5E1C4670DD68A50087E6A5A6E6DCA85DF61B5C74D1472967C2C30085087A017B08B601880111BF7E5373
31,772,941 UART: [art] SIG.S = 3D10ED77D5E01F158AFFB6D0E021D21CE9FACD837451E64A8D4CF7E78BCA4FE189CB8700D553C3C09896C9F7503C74E5
33,078,074 UART: Caliptra RT
33,078,795 UART: [state] CFI Enabled
33,255,244 UART: [rt] RT listening for mailbox commands...
33,259,202 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,303,692 UART: [rt]cmd =0x4c4d5356, len=1672
33,723,288 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,353 UART:
192,724 UART: Running Caliptra ROM ...
193,903 UART:
603,767 UART: [state] CFI Enabled
618,356 UART: [state] LifecycleState = Unprovisioned
620,297 UART: [state] DebugLocked = No
622,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,476 UART: [kat] SHA2-256
796,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,771 UART: [kat] ++
807,245 UART: [kat] sha1
818,631 UART: [kat] SHA2-256
821,355 UART: [kat] SHA2-384
827,337 UART: [kat] SHA2-512-ACC
829,699 UART: [kat] ECC-384
3,111,604 UART: [kat] HMAC-384Kdf
3,124,418 UART: [kat] LMS
4,314,546 UART: [kat] --
4,318,777 UART: [cold-reset] ++
4,319,923 UART: [fht] Storing FHT @ 0x50003400
4,330,208 UART: [idev] ++
4,330,808 UART: [idev] CDI.KEYID = 6
4,331,716 UART: [idev] SUBJECT.KEYID = 7
4,332,955 UART: [idev] UDS.KEYID = 0
4,333,993 ready_for_fw is high
4,334,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,895 UART: [idev] Erasing UDS.KEYID = 0
7,623,252 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,524 UART: [idev] --
7,648,621 UART: [ldev] ++
7,649,194 UART: [ldev] CDI.KEYID = 6
7,650,150 UART: [ldev] SUBJECT.KEYID = 5
7,651,356 UART: [ldev] AUTHORITY.KEYID = 7
7,652,638 UART: [ldev] FE.KEYID = 1
7,664,847 UART: [ldev] Erasing FE.KEYID = 1
10,956,136 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,953 UART: [ldev] --
13,319,155 UART: [fwproc] Waiting for Commands...
13,321,838 UART: [fwproc] Received command 0x46574c44
13,324,034 UART: [fwproc] Received Image of size 118548 bytes
17,425,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,145 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,543 >>> mbox cmd response: success
17,905,225 UART: [afmc] ++
17,905,833 UART: [afmc] CDI.KEYID = 6
17,906,744 UART: [afmc] SUBJECT.KEYID = 7
17,908,005 UART: [afmc] AUTHORITY.KEYID = 5
21,227,007 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,732 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,006 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,450 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,147 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,575 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,075 UART: [afmc] --
23,595,391 UART: [cold-reset] --
23,598,767 UART: [state] Locking Datavault
23,604,110 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,728 UART: [state] Locking ICCM
23,608,206 UART: [exit] Launching FMC @ 0x40000130
23,616,598 UART:
23,616,829 UART: Running Caliptra FMC ...
23,617,920 UART:
23,618,071 UART: [state] CFI Enabled
23,626,360 UART: [fht] FMC Alias Private Key: 7
25,966,223 UART: [art] Extend RT PCRs Done
25,967,437 UART: [art] Lock RT PCRs Done
25,968,923 UART: [art] Populate DV Done
25,974,548 UART: [fht] FMC Alias Private Key: 7
25,976,135 UART: [art] Derive CDI
25,976,944 UART: [art] Store in slot 0x4
26,019,505 UART: [art] Derive Key Pair
26,020,545 UART: [art] Store priv key in slot 0x5
29,262,592 UART: [art] Derive Key Pair - Done
29,275,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,599 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,103 UART: [art] PUB.X = 99D9F9ABF139D948F755B27A39B63EC145DAB1F27B2614C4F4F05E66D63AA16755BC9912E1FEBDDFEA44688C22C15DEF
31,564,352 UART: [art] PUB.Y = AC8809D24705D7DE16D9011F29917F9800E2AC89EEA64D1369068164C3D56FFDD51FD4DD3591133235017782FF5136A0
31,571,577 UART: [art] SIG.R = 903093DE8052B89BAD08BBB950FD2F9C0B43B723E94B19006445E20C45BF791096273A6400B13D5694DAA69D32E7C0FA
31,578,923 UART: [art] SIG.S = 5532033F46172EA3F8B9FB5589A95B2291ABF089FEE26282FB6DC22288FC87EB5C9043B986E58970707B045ECC30DFA0
32,883,804 UART: Caliptra RT
32,884,629 UART: [state] CFI Enabled
33,018,215 UART: [rt] RT listening for mailbox commands...
33,022,124 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,066,637 UART: [rt]cmd =0x4c4d5356, len=1672
33,486,022 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
4,132,024 ready_for_fw is high
4,132,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,165,871 >>> mbox cmd response: success
23,800,923 UART:
23,801,330 UART: Running Caliptra FMC ...
23,802,464 UART:
23,802,622 UART: [state] CFI Enabled
23,810,252 UART: [fht] FMC Alias Private Key: 7
26,149,233 UART: [art] Extend RT PCRs Done
26,150,474 UART: [art] Lock RT PCRs Done
26,152,243 UART: [art] Populate DV Done
26,157,568 UART: [fht] FMC Alias Private Key: 7
26,159,161 UART: [art] Derive CDI
26,159,972 UART: [art] Store in slot 0x4
26,202,832 UART: [art] Derive Key Pair
26,203,824 UART: [art] Store priv key in slot 0x5
29,445,550 UART: [art] Derive Key Pair - Done
29,458,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,040 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,552 UART: [art] PUB.X = 2A3512B7F6AAA04D36577693993ABFE8949666ED65F35DF5D8BB6CE9A765615B5A0F01914F1FCC551B575328EB3B8EC6
31,747,813 UART: [art] PUB.Y = 6C9B07F128A90B2E9CF20AB0C8E883E770AC41172A59BC274E21B57652AEECB73872162F788581D44666142C057220BC
31,755,019 UART: [art] SIG.R = 0113BA6207A1254D9A8BF95AEBE11874A5BF47776427CEBA649A01C50157A44698C83BE50AF0562D7E735C519C937F88
31,762,412 UART: [art] SIG.S = F5CBE1F1FB11CFA6F16FE793CEFBC38A77A2D6D39CB790671FFC49AB5396A44DAF9F51C867EDC74E939E7EC1228E4D26
33,067,330 UART: Caliptra RT
33,068,048 UART: [state] CFI Enabled
33,200,677 UART: [rt] RT listening for mailbox commands...
33,204,695 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,249,374 UART: [rt]cmd =0x4c4d5356, len=1672
33,668,942 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
192,093 UART:
192,467 UART: Running Caliptra ROM ...
193,654 UART:
193,806 UART: [state] CFI Enabled
263,623 UART: [state] LifecycleState = Unprovisioned
265,572 UART: [state] DebugLocked = No
267,806 UART: [state] WD Timer not started. Device not locked for debugging
271,015 UART: [kat] SHA2-256
450,662 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,397 UART: [kat] ++
461,876 UART: [kat] sha1
472,932 UART: [kat] SHA2-256
475,657 UART: [kat] SHA2-384
481,712 UART: [kat] SHA2-512-ACC
484,075 UART: [kat] ECC-384
2,946,957 UART: [kat] HMAC-384Kdf
2,971,492 UART: [kat] LMS
3,447,967 UART: [kat] --
3,451,700 UART: [cold-reset] ++
3,453,782 UART: [fht] FHT @ 0x50003400
3,464,967 UART: [idev] ++
3,465,524 UART: [idev] CDI.KEYID = 6
3,466,469 UART: [idev] SUBJECT.KEYID = 7
3,467,726 UART: [idev] UDS.KEYID = 0
3,468,623 ready_for_fw is high
3,468,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,870 UART: [idev] Erasing UDS.KEYID = 0
5,987,262 UART: [idev] Sha1 KeyId Algorithm
6,010,973 UART: [idev] --
6,016,834 UART: [ldev] ++
6,017,407 UART: [ldev] CDI.KEYID = 6
6,018,288 UART: [ldev] SUBJECT.KEYID = 5
6,019,553 UART: [ldev] AUTHORITY.KEYID = 7
6,020,785 UART: [ldev] FE.KEYID = 1
6,056,955 UART: [ldev] Erasing FE.KEYID = 1
8,565,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,852 UART: [ldev] --
10,372,569 UART: [fwproc] Wait for Commands...
10,374,123 UART: [fwproc] Recv command 0x46574c44
10,376,109 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,126 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,130 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,015 >>> mbox cmd response: success
14,349,735 UART: [afmc] ++
14,350,351 UART: [afmc] CDI.KEYID = 6
14,351,267 UART: [afmc] SUBJECT.KEYID = 7
14,352,477 UART: [afmc] AUTHORITY.KEYID = 5
16,892,869 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,614,085 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,616,277 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,632,130 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,648,156 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,663,716 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,687,795 UART: [afmc] --
18,692,354 UART: [cold-reset] --
18,694,533 UART: [state] Locking Datavault
18,700,637 UART: [state] Locking PCR0, PCR1 and PCR31
18,702,385 UART: [state] Locking ICCM
18,703,749 UART: [exit] Launching FMC @ 0x40000130
18,712,188 UART:
18,712,417 UART: Running Caliptra FMC ...
18,713,439 UART:
18,713,584 UART: [state] CFI Enabled
18,773,459 UART: [fht] FMC Alias Private Key: 7
20,539,421 UART: [art] Extend RT PCRs Done
20,540,639 UART: [art] Lock RT PCRs Done
20,542,249 UART: [art] Populate DV Done
20,547,387 UART: [fht] FMC Alias Private Key: 7
20,548,864 UART: [art] Derive CDI
20,549,595 UART: [art] Store in slot 0x4
20,606,072 UART: [art] Derive Key Pair
20,607,112 UART: [art] Store priv key in slot 0x5
23,070,392 UART: [art] Derive Key Pair - Done
23,083,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,080 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,585 UART: [art] PUB.X = 5EA9F5A22B4E325038E42F77C6609E70E005EB0645F1FB911A4BB95FD8255673F5AC0B18E4BD07AC460508F142AD2808
24,805,864 UART: [art] PUB.Y = C4E0F2740353814D30BFF3E99B28D8C325EB5F6CC1DF81912E1D1636742F217EEDF84D0B7832AF7C747727C366EC9C40
24,813,108 UART: [art] SIG.R = B29382B41121BD5ED8341C4222F8C78FF3E84AA2353C23126B6E010A4FD6E2E236820F43287F1444F7DAC814B7412CC2
24,820,504 UART: [art] SIG.S = 507281F256664F628F934A13D38CAB766E5C80270D4BED551C4A6C33B3B841C32B6AC484AED3831EBC6B60CD64D998F2
25,799,636 UART: Caliptra RT
25,800,332 UART: [state] CFI Enabled
25,980,029 UART: [rt] RT listening for mailbox commands...
25,983,992 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,028,225 UART: [rt]cmd =0x4c4d5356, len=1672
26,241,397 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,461,841 ready_for_fw is high
3,462,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,214,662 >>> mbox cmd response: success
18,490,544 UART:
18,490,938 UART: Running Caliptra FMC ...
18,492,137 UART:
18,492,300 UART: [state] CFI Enabled
18,561,477 UART: [fht] FMC Alias Private Key: 7
20,349,298 UART: [art] Extend RT PCRs Done
20,350,520 UART: [art] Lock RT PCRs Done
20,352,086 UART: [art] Populate DV Done
20,357,638 UART: [fht] FMC Alias Private Key: 7
20,359,191 UART: [art] Derive CDI
20,359,953 UART: [art] Store in slot 0x4
20,415,000 UART: [art] Derive Key Pair
20,416,046 UART: [art] Store priv key in slot 0x5
22,879,062 UART: [art] Derive Key Pair - Done
22,892,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,273 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,770 UART: [art] PUB.X = 2728F635824B5DF1622BD9D640453334576A821493B704A4F0D0FB84C40023F5E548F5F361FC91EA6DF167029E46E818
24,614,054 UART: [art] PUB.Y = F99BE279218A085FA37D745BFA83A380055696E5FFC96BCB77FD00379193E0DD828C1B7B3B39018A6654E1E57214D7A3
24,621,266 UART: [art] SIG.R = CE61BDD6C8598794A0A1C5C3850846A21D14CD819A698345F2B87A626D495A9A4FB269B3C01BB6B98D9E1FF8F4B9C792
24,628,606 UART: [art] SIG.S = 9BA7CCE88F6B27D2488586FF70C1ACAF4863688497179B0475DBD711C53376147FF5F2EACD07C209D25FA4F2D635C9AB
25,608,070 UART: Caliptra RT
25,608,770 UART: [state] CFI Enabled
25,789,343 UART: [rt] RT listening for mailbox commands...
25,793,235 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,838,088 UART: [rt]cmd =0x4c4d5356, len=1672
26,051,260 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,520 UART:
192,893 UART: Running Caliptra ROM ...
194,080 UART:
603,753 UART: [state] CFI Enabled
619,077 UART: [state] LifecycleState = Unprovisioned
621,039 UART: [state] DebugLocked = No
623,213 UART: [state] WD Timer not started. Device not locked for debugging
626,196 UART: [kat] SHA2-256
805,859 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,660 UART: [kat] ++
817,108 UART: [kat] sha1
827,201 UART: [kat] SHA2-256
829,863 UART: [kat] SHA2-384
835,298 UART: [kat] SHA2-512-ACC
837,667 UART: [kat] ECC-384
3,279,156 UART: [kat] HMAC-384Kdf
3,291,067 UART: [kat] LMS
3,767,610 UART: [kat] --
3,771,830 UART: [cold-reset] ++
3,774,119 UART: [fht] FHT @ 0x50003400
3,785,239 UART: [idev] ++
3,785,886 UART: [idev] CDI.KEYID = 6
3,786,800 UART: [idev] SUBJECT.KEYID = 7
3,788,050 UART: [idev] UDS.KEYID = 0
3,788,983 ready_for_fw is high
3,789,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,109 UART: [idev] Erasing UDS.KEYID = 0
6,268,243 UART: [idev] Sha1 KeyId Algorithm
6,292,127 UART: [idev] --
6,297,369 UART: [ldev] ++
6,297,942 UART: [ldev] CDI.KEYID = 6
6,298,851 UART: [ldev] SUBJECT.KEYID = 5
6,300,086 UART: [ldev] AUTHORITY.KEYID = 7
6,301,332 UART: [ldev] FE.KEYID = 1
6,312,905 UART: [ldev] Erasing FE.KEYID = 1
8,790,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,119 UART: [ldev] --
10,583,850 UART: [fwproc] Wait for Commands...
10,585,569 UART: [fwproc] Recv command 0x46574c44
10,587,554 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,455 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,461 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,088 >>> mbox cmd response: success
14,558,818 UART: [afmc] ++
14,559,426 UART: [afmc] CDI.KEYID = 6
14,560,318 UART: [afmc] SUBJECT.KEYID = 7
14,561,478 UART: [afmc] AUTHORITY.KEYID = 5
17,068,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,134 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,318 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,147 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,226 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,756 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,415 UART: [afmc] --
18,870,965 UART: [cold-reset] --
18,873,918 UART: [state] Locking Datavault
18,877,923 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,625 UART: [state] Locking ICCM
18,880,806 UART: [exit] Launching FMC @ 0x40000130
18,889,228 UART:
18,889,472 UART: Running Caliptra FMC ...
18,890,573 UART:
18,890,737 UART: [state] CFI Enabled
18,898,626 UART: [fht] FMC Alias Private Key: 7
20,664,996 UART: [art] Extend RT PCRs Done
20,666,223 UART: [art] Lock RT PCRs Done
20,667,584 UART: [art] Populate DV Done
20,672,779 UART: [fht] FMC Alias Private Key: 7
20,674,374 UART: [art] Derive CDI
20,675,190 UART: [art] Store in slot 0x4
20,718,057 UART: [art] Derive Key Pair
20,719,094 UART: [art] Store priv key in slot 0x5
23,145,911 UART: [art] Derive Key Pair - Done
23,158,801 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,086 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,622 UART: [art] PUB.X = 2C152F6CE189BCBC8D3551907D6B8EB6DC0AF55D14CB2C549B8025E49B3538F35D072EC72259710BFD66F54B9408EEDB
24,873,702 UART: [art] PUB.Y = CC7E7555CAADADE613FAD16C5AC02D039CFF73604F357935F85B7915BDA48FE6A4EF9D5E804169305B2641106C99B6D1
24,880,938 UART: [art] SIG.R = 6A38F4A56B841E3ACB24E5297A5B9BBFDF7A07C8EDBF63ABDBA0E7A8DEFA1C4BF24686AC33085E0528017E06EE109726
24,888,326 UART: [art] SIG.S = AAB10F8EF975516CF31680E456B65D01A3F6EFD6B191F2ABACC6C1874C990EFD16323FFCDD22675B5811F0E312E4B2E5
25,866,834 UART: Caliptra RT
25,867,534 UART: [state] CFI Enabled
26,001,131 UART: [rt] RT listening for mailbox commands...
26,005,076 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,049,696 UART: [rt]cmd =0x4c4d5356, len=1672
26,262,585 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,782,992 ready_for_fw is high
3,783,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,457,983 >>> mbox cmd response: success
18,711,609 UART:
18,712,006 UART: Running Caliptra FMC ...
18,713,219 UART:
18,713,408 UART: [state] CFI Enabled
18,721,146 UART: [fht] FMC Alias Private Key: 7
20,487,507 UART: [art] Extend RT PCRs Done
20,488,729 UART: [art] Lock RT PCRs Done
20,490,027 UART: [art] Populate DV Done
20,495,654 UART: [fht] FMC Alias Private Key: 7
20,497,221 UART: [art] Derive CDI
20,497,994 UART: [art] Store in slot 0x4
20,540,376 UART: [art] Derive Key Pair
20,541,382 UART: [art] Store priv key in slot 0x5
22,968,233 UART: [art] Derive Key Pair - Done
22,981,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,687,707 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,211 UART: [art] PUB.X = FDD8520255AEE6E6384865743E5994FBC76B20ED407CCCE9DF41B50B617584AA1DBBFCFDB9A275C0B412437EEB00E493
24,696,499 UART: [art] PUB.Y = BE1FCB8C3338DD4CFD9615F27400875F56801EB3EBF36E4EE17CA79285E91166309FC1A24808A02937302E3D8772A4B0
24,703,671 UART: [art] SIG.R = 23947618930BD9DC0449DC81ABF08EB77BAE2C645E3F717CA34E1ECB9FC99DD9B9ABB3DB2D39AB11466A68B6C9AF8FF0
24,711,083 UART: [art] SIG.S = 2195075F6C7DC231C97DA9A924EB1C503DB0568D518E8E016E7C04EE3B8911BE591B0DDAFC335536E683086ACECD5CBE
25,689,211 UART: Caliptra RT
25,690,031 UART: [state] CFI Enabled
25,823,030 UART: [rt] RT listening for mailbox commands...
25,826,939 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,871,254 UART: [rt]cmd =0x4c4d5356, len=1672
26,084,487 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,247 UART:
192,609 UART: Running Caliptra ROM ...
193,785 UART:
193,936 UART: [state] CFI Enabled
260,859 UART: [state] LifecycleState = Unprovisioned
262,916 UART: [state] DebugLocked = No
264,382 UART: [state] WD Timer not started. Device not locked for debugging
269,722 UART: [kat] SHA2-256
459,656 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,400 UART: [kat] ++
470,849 UART: [kat] sha1
483,660 UART: [kat] SHA2-256
486,648 UART: [kat] SHA2-384
493,641 UART: [kat] SHA2-512-ACC
496,224 UART: [kat] ECC-384
2,947,343 UART: [kat] HMAC-384Kdf
2,973,083 UART: [kat] LMS
3,504,872 UART: [kat] --
3,507,941 UART: [cold-reset] ++
3,510,149 UART: [fht] FHT @ 0x50003400
3,521,911 UART: [idev] ++
3,522,663 UART: [idev] CDI.KEYID = 6
3,523,583 UART: [idev] SUBJECT.KEYID = 7
3,524,777 UART: [idev] UDS.KEYID = 0
3,525,703 ready_for_fw is high
3,525,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,949 UART: [idev] Erasing UDS.KEYID = 0
6,029,935 UART: [idev] Sha1 KeyId Algorithm
6,051,916 UART: [idev] --
6,055,638 UART: [ldev] ++
6,056,374 UART: [ldev] CDI.KEYID = 6
6,057,267 UART: [ldev] SUBJECT.KEYID = 5
6,058,426 UART: [ldev] AUTHORITY.KEYID = 7
6,059,660 UART: [ldev] FE.KEYID = 1
6,101,321 UART: [ldev] Erasing FE.KEYID = 1
8,609,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,221 UART: [ldev] --
10,417,196 UART: [fwproc] Wait for Commands...
10,419,997 UART: [fwproc] Recv command 0x46574c44
10,422,304 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,853 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,446 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,342 >>> mbox cmd response: success
14,680,594 UART: [afmc] ++
14,681,324 UART: [afmc] CDI.KEYID = 6
14,682,518 UART: [afmc] SUBJECT.KEYID = 7
14,683,957 UART: [afmc] AUTHORITY.KEYID = 5
17,220,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,964,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,966,839 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,981,910 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,997,067 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,011,932 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,035,104 UART: [afmc] --
19,037,820 UART: [cold-reset] --
19,041,638 UART: [state] Locking Datavault
19,045,977 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,178 UART: [state] Locking ICCM
19,049,952 UART: [exit] Launching FMC @ 0x40000130
19,058,630 UART:
19,058,872 UART: Running Caliptra FMC ...
19,059,979 UART:
19,060,139 UART: [state] CFI Enabled
19,120,925 UART: [fht] FMC Alias Private Key: 7
20,887,709 UART: [art] Extend RT PCRs Done
20,888,928 UART: [art] Lock RT PCRs Done
20,890,601 UART: [art] Populate DV Done
20,896,066 UART: [fht] FMC Alias Private Key: 7
20,897,552 UART: [art] Derive CDI
20,898,282 UART: [art] Store in slot 0x4
20,953,909 UART: [art] Derive Key Pair
20,954,949 UART: [art] Store priv key in slot 0x5
23,417,811 UART: [art] Derive Key Pair - Done
23,430,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,143,858 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,370 UART: [art] PUB.X = BCCF54FFA7190C5B9E604983E9D1D9F806A92F0BFEE6A1819871D481738C39611B2139F1B96E83C65B8034D047A38659
25,152,588 UART: [art] PUB.Y = CB1E4C8A434DE66C74BC2E68814A65D33A60D97A810D7895B3CCBD20917CE7470060713B4B4CE070B96AE74785F724B8
25,159,852 UART: [art] SIG.R = 397B20759EC66B8132EF7E05F2B8FACB6EDA5FAF13336846BA2D89BDA8225D03EA44C0695269DB4E0CAE8514F824EA10
25,167,225 UART: [art] SIG.S = 1FDCF9F4095A68A1C3E93073BDA26DE4AF9540F0B694465D1C23F9577C38F3DB99DD674D5EFA03A1CF0AD6412FFDAFE2
26,145,744 UART: Caliptra RT
26,146,435 UART: [state] CFI Enabled
26,326,941 UART: [rt] RT listening for mailbox commands...
26,330,897 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,375,342 UART: [rt]cmd =0x4c4d5356, len=1672
26,588,087 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,436,847 ready_for_fw is high
3,437,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,809 >>> mbox cmd response: success
19,110,694 UART:
19,111,096 UART: Running Caliptra FMC ...
19,112,207 UART:
19,112,354 UART: [state] CFI Enabled
19,178,324 UART: [fht] FMC Alias Private Key: 7
20,945,340 UART: [art] Extend RT PCRs Done
20,946,572 UART: [art] Lock RT PCRs Done
20,948,064 UART: [art] Populate DV Done
20,953,828 UART: [fht] FMC Alias Private Key: 7
20,955,312 UART: [art] Derive CDI
20,956,042 UART: [art] Store in slot 0x4
21,010,879 UART: [art] Derive Key Pair
21,011,923 UART: [art] Store priv key in slot 0x5
23,474,665 UART: [art] Derive Key Pair - Done
23,487,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,644 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,162 UART: [art] PUB.X = CD756334890A51E7844BB2E92F3B387E685622F12246D44101A887004E033CEC162E3A87A0DD4CD6A8EEA05022320DD2
25,208,428 UART: [art] PUB.Y = 07C3B3AD82566086CCF69FF8AEB483574D49489D4973FAB61034F02466C6D991B4FD0FD2767DF85F6EB016CE1B6275C2
25,215,640 UART: [art] SIG.R = 9B93882B3AFA278F3E2AB90C6E6E769DA71D5DC87ADB2AC322E0F8737B56C13F82EAE84BF4D87EDD89BEC737686E1D1B
25,223,061 UART: [art] SIG.S = 4F03883C2A778896E488A38550CEDC3882A60B92D3C9B1BE80C3E8D38647832656587CECB52772CE325E07AC5E58A9A8
26,202,328 UART: Caliptra RT
26,203,038 UART: [state] CFI Enabled
26,382,026 UART: [rt] RT listening for mailbox commands...
26,385,988 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,430,404 UART: [rt]cmd =0x4c4d5356, len=1672
26,643,830 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,379 UART:
192,741 UART: Running Caliptra ROM ...
193,880 UART:
603,492 UART: [state] CFI Enabled
616,752 UART: [state] LifecycleState = Unprovisioned
618,801 UART: [state] DebugLocked = No
621,340 UART: [state] WD Timer not started. Device not locked for debugging
626,037 UART: [kat] SHA2-256
815,872 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,674 UART: [kat] ++
827,195 UART: [kat] sha1
838,139 UART: [kat] SHA2-256
841,168 UART: [kat] SHA2-384
846,189 UART: [kat] SHA2-512-ACC
848,748 UART: [kat] ECC-384
3,291,272 UART: [kat] HMAC-384Kdf
3,303,143 UART: [kat] LMS
3,834,990 UART: [kat] --
3,840,493 UART: [cold-reset] ++
3,841,436 UART: [fht] FHT @ 0x50003400
3,851,777 UART: [idev] ++
3,852,495 UART: [idev] CDI.KEYID = 6
3,853,530 UART: [idev] SUBJECT.KEYID = 7
3,854,635 UART: [idev] UDS.KEYID = 0
3,855,899 ready_for_fw is high
3,856,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,944 UART: [idev] Erasing UDS.KEYID = 0
6,332,217 UART: [idev] Sha1 KeyId Algorithm
6,355,522 UART: [idev] --
6,360,332 UART: [ldev] ++
6,361,017 UART: [ldev] CDI.KEYID = 6
6,361,938 UART: [ldev] SUBJECT.KEYID = 5
6,363,102 UART: [ldev] AUTHORITY.KEYID = 7
6,364,331 UART: [ldev] FE.KEYID = 1
6,374,827 UART: [ldev] Erasing FE.KEYID = 1
8,851,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,486 UART: [ldev] --
10,643,617 UART: [fwproc] Wait for Commands...
10,646,476 UART: [fwproc] Recv command 0x46574c44
10,648,735 UART: [fwproc] Recv'd Img size: 118548 bytes
14,139,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,912 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,343,517 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,642 >>> mbox cmd response: success
14,907,744 UART: [afmc] ++
14,908,454 UART: [afmc] CDI.KEYID = 6
14,909,705 UART: [afmc] SUBJECT.KEYID = 7
14,911,156 UART: [afmc] AUTHORITY.KEYID = 5
17,415,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,349 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,406 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,567 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,499 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,160 UART: [afmc] --
19,212,219 UART: [cold-reset] --
19,217,512 UART: [state] Locking Datavault
19,222,412 UART: [state] Locking PCR0, PCR1 and PCR31
19,224,576 UART: [state] Locking ICCM
19,226,955 UART: [exit] Launching FMC @ 0x40000130
19,235,648 UART:
19,235,884 UART: Running Caliptra FMC ...
19,236,985 UART:
19,237,146 UART: [state] CFI Enabled
19,245,413 UART: [fht] FMC Alias Private Key: 7
21,011,685 UART: [art] Extend RT PCRs Done
21,012,905 UART: [art] Lock RT PCRs Done
21,014,673 UART: [art] Populate DV Done
21,020,193 UART: [fht] FMC Alias Private Key: 7
21,021,845 UART: [art] Derive CDI
21,022,666 UART: [art] Store in slot 0x4
21,065,211 UART: [art] Derive Key Pair
21,066,235 UART: [art] Store priv key in slot 0x5
23,493,561 UART: [art] Derive Key Pair - Done
23,506,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,445 UART: [art] Erasing AUTHORITY.KEYID = 7
25,213,946 UART: [art] PUB.X = 285609975C464D73FDA3575BD55E8C2E7B06BAA2F086CCEBC4294C23EFBC9C0AACEBC35E771416F89C448C570B48A449
25,221,220 UART: [art] PUB.Y = 9DB1865547766F849F649D28B2BE28E004CFA6D897DC4EC20FFC7D4D461C47A6DDE41DE03F5DFBD8B4FBCC6C615F112F
25,228,477 UART: [art] SIG.R = 85048AC72C2A314D215545BDD016A0D0E381BEC2D7DB44B01FBA2C7E23C6F77335EA2ECDE4CCD7033880321B2F5AB285
25,235,919 UART: [art] SIG.S = 366135C5B7137EE11D4AF89238F1A493A51276B3C8922F6BF99F2DF70AAFEACB72E818D67B39118907AF591D8F85964F
26,214,758 UART: Caliptra RT
26,215,450 UART: [state] CFI Enabled
26,348,092 UART: [rt] RT listening for mailbox commands...
26,352,132 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,396,707 UART: [rt]cmd =0x4c4d5356, len=1672
26,609,929 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,757,378 ready_for_fw is high
3,757,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,849 >>> mbox cmd response: success
19,298,419 UART:
19,298,842 UART: Running Caliptra FMC ...
19,300,003 UART:
19,300,182 UART: [state] CFI Enabled
19,308,088 UART: [fht] FMC Alias Private Key: 7
21,074,514 UART: [art] Extend RT PCRs Done
21,075,742 UART: [art] Lock RT PCRs Done
21,077,650 UART: [art] Populate DV Done
21,083,136 UART: [fht] FMC Alias Private Key: 7
21,084,700 UART: [art] Derive CDI
21,085,475 UART: [art] Store in slot 0x4
21,128,218 UART: [art] Derive Key Pair
21,129,242 UART: [art] Store priv key in slot 0x5
23,556,199 UART: [art] Derive Key Pair - Done
23,569,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,275,254 UART: [art] Erasing AUTHORITY.KEYID = 7
25,276,777 UART: [art] PUB.X = 309422F22B0F40EE782A6F3D3F69BCEBFF0373B0C78EB608E6B5EF646588AE812AAAF1BD801C38CEBE025914B6AEFAFC
25,284,014 UART: [art] PUB.Y = 3AAFAF2D27C0A66529122D39AA362403E10F7511FDD25CF35708D45411CC4757AFA1138C7B0730D1B3346410BC55ECE9
25,291,251 UART: [art] SIG.R = F3AFB40C3499C716BD96D80A65BEC30457B0B92923743566F0B984CB42A2CE1B09F37D97ED628C94B9F4A24109D55B4A
25,298,655 UART: [art] SIG.S = B2417975BDD40624430856D405E0F9DC70C68A6B419D402B07396FB1CC8ED781BF91520328AD99E7399848CC2D9ABAF2
26,277,662 UART: Caliptra RT
26,278,381 UART: [state] CFI Enabled
26,411,172 UART: [rt] RT listening for mailbox commands...
26,415,207 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,459,831 UART: [rt]cmd =0x4c4d5356, len=1672
26,673,203 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,519 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,221 UART: [kat] SHA2-256
882,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,267 UART: [kat] ++
886,419 UART: [kat] sha1
890,755 UART: [kat] SHA2-256
892,693 UART: [kat] SHA2-384
895,632 UART: [kat] SHA2-512-ACC
897,533 UART: [kat] ECC-384
903,100 UART: [kat] HMAC-384Kdf
907,752 UART: [kat] LMS
1,475,948 UART: [kat] --
1,476,979 UART: [cold-reset] ++
1,477,315 UART: [fht] Storing FHT @ 0x50003400
1,480,080 UART: [idev] ++
1,480,248 UART: [idev] CDI.KEYID = 6
1,480,608 UART: [idev] SUBJECT.KEYID = 7
1,481,032 UART: [idev] UDS.KEYID = 0
1,481,377 ready_for_fw is high
1,481,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,852 UART: [idev] Erasing UDS.KEYID = 0
1,505,612 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,284 UART: [idev] --
1,515,301 UART: [ldev] ++
1,515,469 UART: [ldev] CDI.KEYID = 6
1,515,832 UART: [ldev] SUBJECT.KEYID = 5
1,516,258 UART: [ldev] AUTHORITY.KEYID = 7
1,516,721 UART: [ldev] FE.KEYID = 1
1,521,719 UART: [ldev] Erasing FE.KEYID = 1
1,546,630 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,088 UART: [ldev] --
1,585,433 UART: [fwproc] Waiting for Commands...
1,586,280 UART: [fwproc] Received command 0x46574c44
1,587,071 UART: [fwproc] Received Image of size 118548 bytes
2,932,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,953 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,171 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,608 >>> mbox cmd response: success
3,132,626 UART: [afmc] ++
3,132,794 UART: [afmc] CDI.KEYID = 6
3,133,156 UART: [afmc] SUBJECT.KEYID = 7
3,133,581 UART: [afmc] AUTHORITY.KEYID = 5
3,168,918 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,828 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,608 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,317 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,200 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,883 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,891 UART: [afmc] --
3,212,839 UART: [cold-reset] --
3,213,605 UART: [state] Locking Datavault
3,215,010 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,614 UART: [state] Locking ICCM
3,216,102 UART: [exit] Launching FMC @ 0x40000130
3,221,432 UART:
3,221,448 UART: Running Caliptra FMC ...
3,221,856 UART:
3,221,910 UART: [state] CFI Enabled
3,232,254 UART: [fht] FMC Alias Private Key: 7
3,350,694 UART: [art] Extend RT PCRs Done
3,351,122 UART: [art] Lock RT PCRs Done
3,352,572 UART: [art] Populate DV Done
3,360,845 UART: [fht] FMC Alias Private Key: 7
3,361,799 UART: [art] Derive CDI
3,362,079 UART: [art] Store in slot 0x4
3,447,891 UART: [art] Derive Key Pair
3,448,251 UART: [art] Store priv key in slot 0x5
3,460,858 UART: [art] Derive Key Pair - Done
3,475,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,651 UART: [art] PUB.X = 4C2A4861A05CEF858404835EAED1A93776BB5C67B184F89DE29FCC9D2A5489CE0ACF257196AAD02E2A48B79B8FC55E89
3,498,429 UART: [art] PUB.Y = 6FE0E2FC64B8A64F40EFD00DFE6833AFFF240AA5C1C1845A6ECF3B41F2E720F5247E3CE1C94491D78C7F2DACD021FA8C
3,505,399 UART: [art] SIG.R = A046B4DFDCA49E9DFC60B9FAAE874AC49CAFBB58EE189CFC26635BE459948D58971AECDE3A21AFAA1326CED691445A72
3,512,197 UART: [art] SIG.S = 22E8DA89D7C467F0C85D4A91825536820CCBF89B8F053CEC13AD0919D2E326CAF174834175CC90F0C22F2E3D7BB158F6
3,536,510 UART: Caliptra RT
3,536,761 UART: [state] CFI Enabled
3,656,723 UART: [rt] RT listening for mailbox commands...
3,657,393 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,819 UART: [rt]cmd =0x4c4d5356, len=1672
4,276,637 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,721 ready_for_fw is high
1,362,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,074 >>> mbox cmd response: success
3,043,333 UART:
3,043,349 UART: Running Caliptra FMC ...
3,043,757 UART:
3,043,811 UART: [state] CFI Enabled
3,054,177 UART: [fht] FMC Alias Private Key: 7
3,173,567 UART: [art] Extend RT PCRs Done
3,173,995 UART: [art] Lock RT PCRs Done
3,175,713 UART: [art] Populate DV Done
3,183,924 UART: [fht] FMC Alias Private Key: 7
3,185,034 UART: [art] Derive CDI
3,185,314 UART: [art] Store in slot 0x4
3,270,914 UART: [art] Derive Key Pair
3,271,274 UART: [art] Store priv key in slot 0x5
3,284,251 UART: [art] Derive Key Pair - Done
3,298,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,357 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,122 UART: [art] PUB.X = 8791A8CD7CAC0CEE3EA2429AC7800B7B11A8AF0021FF67C839A0C45355494763F110C807A05AF8CAD6D8F760C9E79BCF
3,321,875 UART: [art] PUB.Y = 160A46A4D31AECC0FDE94DA326146FD3DB5A623CCBB0E1F63D55A34A6E65DB4ABC9CB4832787F9742700B53F2D9B3B8A
3,328,820 UART: [art] SIG.R = F160CBCF336F336BE9CD35AA1740AF1E54E5FFAAF430DDC525934C4EB118A8BCDD40A13E7FDA414B7593E85A92F928E2
3,335,612 UART: [art] SIG.S = 1C1FD7D9803D0364BB21AF02D8826838E515F1486DD7BFB4A0FAC076FECF5FDDA5EF097832257420FCB74DADABE73965
3,359,749 UART: Caliptra RT
3,360,000 UART: [state] CFI Enabled
3,479,462 UART: [rt] RT listening for mailbox commands...
3,480,132 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,032 UART: [rt]cmd =0x4c4d5356, len=1672
4,099,736 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,966 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,486 UART: [kat] SHA2-256
882,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,532 UART: [kat] ++
886,684 UART: [kat] sha1
891,086 UART: [kat] SHA2-256
893,024 UART: [kat] SHA2-384
895,629 UART: [kat] SHA2-512-ACC
897,530 UART: [kat] ECC-384
903,357 UART: [kat] HMAC-384Kdf
908,123 UART: [kat] LMS
1,476,319 UART: [kat] --
1,477,100 UART: [cold-reset] ++
1,477,658 UART: [fht] Storing FHT @ 0x50003400
1,480,487 UART: [idev] ++
1,480,655 UART: [idev] CDI.KEYID = 6
1,481,015 UART: [idev] SUBJECT.KEYID = 7
1,481,439 UART: [idev] UDS.KEYID = 0
1,481,784 ready_for_fw is high
1,481,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,213 UART: [idev] Erasing UDS.KEYID = 0
1,505,549 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,191 UART: [idev] --
1,515,184 UART: [ldev] ++
1,515,352 UART: [ldev] CDI.KEYID = 6
1,515,715 UART: [ldev] SUBJECT.KEYID = 5
1,516,141 UART: [ldev] AUTHORITY.KEYID = 7
1,516,604 UART: [ldev] FE.KEYID = 1
1,521,632 UART: [ldev] Erasing FE.KEYID = 1
1,547,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,911 UART: [ldev] --
1,586,316 UART: [fwproc] Waiting for Commands...
1,586,989 UART: [fwproc] Received command 0x46574c44
1,587,780 UART: [fwproc] Received Image of size 118548 bytes
2,933,042 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,158 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,376 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,605 >>> mbox cmd response: success
3,132,689 UART: [afmc] ++
3,132,857 UART: [afmc] CDI.KEYID = 6
3,133,219 UART: [afmc] SUBJECT.KEYID = 7
3,133,644 UART: [afmc] AUTHORITY.KEYID = 5
3,168,783 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,051 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,831 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,540 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,423 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,106 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,178 UART: [afmc] --
3,212,204 UART: [cold-reset] --
3,212,938 UART: [state] Locking Datavault
3,213,945 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,549 UART: [state] Locking ICCM
3,215,195 UART: [exit] Launching FMC @ 0x40000130
3,220,525 UART:
3,220,541 UART: Running Caliptra FMC ...
3,220,949 UART:
3,221,092 UART: [state] CFI Enabled
3,231,474 UART: [fht] FMC Alias Private Key: 7
3,350,716 UART: [art] Extend RT PCRs Done
3,351,144 UART: [art] Lock RT PCRs Done
3,352,494 UART: [art] Populate DV Done
3,360,641 UART: [fht] FMC Alias Private Key: 7
3,361,671 UART: [art] Derive CDI
3,361,951 UART: [art] Store in slot 0x4
3,447,773 UART: [art] Derive Key Pair
3,448,133 UART: [art] Store priv key in slot 0x5
3,461,726 UART: [art] Derive Key Pair - Done
3,476,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,879 UART: [art] PUB.X = 1488EC09C88F7D23DA5BA8F6F8B1F6A1F9E7D2D69C260398F8A8AB96EAA126985415D29FFB5B5ABFE0C87D8F8E91C9BA
3,499,665 UART: [art] PUB.Y = 42E5318F2BBED1563E3A26AE0372774BD82959AD161C39B14D21F44541A97509DD1F36196D4A56BC85AE46F8B8571657
3,506,607 UART: [art] SIG.R = 49E81E8C34C3928FCB2DD337C80522C771E4744FF2AD0F576B3A287BECAC4EAB0ADEBB97FD1D21CB836E9EA20BADEAC8
3,513,395 UART: [art] SIG.S = 46FE1F2A50C0131CBF487FC00D6A6DD03CC0A770633294F11407B2D7CF2F37BC919C757988BA15DD91E82B869275860F
3,537,402 UART: Caliptra RT
3,537,745 UART: [state] CFI Enabled
3,657,478 UART: [rt] RT listening for mailbox commands...
3,658,148 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,798 UART: [rt]cmd =0x4c4d5356, len=1672
4,277,514 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,964 ready_for_fw is high
1,362,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,345 >>> mbox cmd response: success
3,041,610 UART:
3,041,626 UART: Running Caliptra FMC ...
3,042,034 UART:
3,042,177 UART: [state] CFI Enabled
3,052,983 UART: [fht] FMC Alias Private Key: 7
3,172,025 UART: [art] Extend RT PCRs Done
3,172,453 UART: [art] Lock RT PCRs Done
3,174,031 UART: [art] Populate DV Done
3,182,174 UART: [fht] FMC Alias Private Key: 7
3,183,136 UART: [art] Derive CDI
3,183,416 UART: [art] Store in slot 0x4
3,269,126 UART: [art] Derive Key Pair
3,269,486 UART: [art] Store priv key in slot 0x5
3,282,659 UART: [art] Derive Key Pair - Done
3,297,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,894 UART: [art] PUB.X = 890CD9CF52E29B3BC8A66B4595063BCB51B4EA257C47A9700CC4092F96ED196C90A381D838E44438DCE3856A7704574B
3,320,651 UART: [art] PUB.Y = 187ACDFEA60728BA2180EA0EE72EAA6FB096737435CF510E2FC16E183E622283EA2AC6DAD76E2C84BAF7078C5D18CF3D
3,327,609 UART: [art] SIG.R = 9B29C7DB41F99456CBC1BF90414DDD1F6B5510202CA64634F97507C99982FF12190F88CDA79A10A4D79980A29A2BE710
3,334,375 UART: [art] SIG.S = 95892D473E796E0C747879A5C472952424F487937AF0A9ECD3EC190316291085101898F319B5B1F6052835C8BDC1CE19
3,358,106 UART: Caliptra RT
3,358,449 UART: [state] CFI Enabled
3,477,936 UART: [rt] RT listening for mailbox commands...
3,478,606 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,130 UART: [rt]cmd =0x4c4d5356, len=1672
4,098,048 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,677 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
891,576 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
900,052 UART: [kat] SHA2-256
901,992 UART: [kat] SHA2-384
904,797 UART: [kat] SHA2-512-ACC
906,698 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,170,030 UART: [cold-reset] ++
1,170,592 UART: [fht] FHT @ 0x50003400
1,173,144 UART: [idev] ++
1,173,312 UART: [idev] CDI.KEYID = 6
1,173,673 UART: [idev] SUBJECT.KEYID = 7
1,174,098 UART: [idev] UDS.KEYID = 0
1,174,444 ready_for_fw is high
1,174,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,977 UART: [idev] Erasing UDS.KEYID = 0
1,199,137 UART: [idev] Sha1 KeyId Algorithm
1,208,047 UART: [idev] --
1,209,056 UART: [ldev] ++
1,209,224 UART: [ldev] CDI.KEYID = 6
1,209,588 UART: [ldev] SUBJECT.KEYID = 5
1,210,015 UART: [ldev] AUTHORITY.KEYID = 7
1,210,478 UART: [ldev] FE.KEYID = 1
1,215,996 UART: [ldev] Erasing FE.KEYID = 1
1,242,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,318 UART: [ldev] --
1,281,723 UART: [fwproc] Wait for Commands...
1,282,330 UART: [fwproc] Recv command 0x46574c44
1,283,063 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,233 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,408 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,761 >>> mbox cmd response: success
2,827,789 UART: [afmc] ++
2,827,957 UART: [afmc] CDI.KEYID = 6
2,828,320 UART: [afmc] SUBJECT.KEYID = 7
2,828,746 UART: [afmc] AUTHORITY.KEYID = 5
2,864,771 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,208 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,957 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,667 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,548 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,249 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,992 UART: [afmc] --
2,907,843 UART: [cold-reset] --
2,908,497 UART: [state] Locking Datavault
2,909,856 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,460 UART: [state] Locking ICCM
2,911,004 UART: [exit] Launching FMC @ 0x40000130
2,916,334 UART:
2,916,350 UART: Running Caliptra FMC ...
2,916,758 UART:
2,916,812 UART: [state] CFI Enabled
2,927,352 UART: [fht] FMC Alias Private Key: 7
3,045,742 UART: [art] Extend RT PCRs Done
3,046,170 UART: [art] Lock RT PCRs Done
3,047,740 UART: [art] Populate DV Done
3,055,737 UART: [fht] FMC Alias Private Key: 7
3,056,699 UART: [art] Derive CDI
3,056,979 UART: [art] Store in slot 0x4
3,142,616 UART: [art] Derive Key Pair
3,142,976 UART: [art] Store priv key in slot 0x5
3,156,424 UART: [art] Derive Key Pair - Done
3,171,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,282 UART: [art] PUB.X = B652EE90EDAFCA8DFA93858C9B604A0DF39CE330B21DF0229EAC43E74094B55C0348B66D06A635FC714BFA98759F7E4A
3,194,059 UART: [art] PUB.Y = 162C4C644C95D3E750BC130B1BE40B272AAEAC33EDC65B937B479D5CCD7B37F09F8CFC8973C9359190EB80B2CA139812
3,201,015 UART: [art] SIG.R = D19388364BDBFF81E86F00462157B834E788C73F1A8D3F9D07FDA159A8BFFB18EDAB57BA579BD2E632BC16D5BA701AD4
3,207,778 UART: [art] SIG.S = 11E21AEE96B8D4E18FB3432C312B2688DAA495895C0C0A5EDC3D0BB0C1ABEA8737F512F0FB7B53CD11DB12E704D2A979
3,231,826 UART: Caliptra RT
3,232,077 UART: [state] CFI Enabled
3,350,946 UART: [rt] RT listening for mailbox commands...
3,351,616 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,254 UART: [rt]cmd =0x4c4d5356, len=1672
3,655,654 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,084 ready_for_fw is high
1,059,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,510 >>> mbox cmd response: success
2,738,951 UART:
2,738,967 UART: Running Caliptra FMC ...
2,739,375 UART:
2,739,429 UART: [state] CFI Enabled
2,749,867 UART: [fht] FMC Alias Private Key: 7
2,868,683 UART: [art] Extend RT PCRs Done
2,869,111 UART: [art] Lock RT PCRs Done
2,870,735 UART: [art] Populate DV Done
2,878,694 UART: [fht] FMC Alias Private Key: 7
2,879,778 UART: [art] Derive CDI
2,880,058 UART: [art] Store in slot 0x4
2,965,627 UART: [art] Derive Key Pair
2,965,987 UART: [art] Store priv key in slot 0x5
2,979,407 UART: [art] Derive Key Pair - Done
2,994,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,160 UART: [art] PUB.X = 7B028938A6F96E3ED5E6E4292C753D5FA913CAACF653C9B73D609B7DB3BBF01B1FBDA067959D249F157B87456C5019CE
3,016,939 UART: [art] PUB.Y = A06C43ECDCC5DEAA22729877525BD605E28A820C60A6CC8E5EB23563D6BDA9B6FF2E3FE706FABB84EC7FC9AA6FA2CEC8
3,023,912 UART: [art] SIG.R = A6B24AC23ACEAF3E003BE590C265BD10ADBE9E00EB576E59044484B8AF7A8D06213E7F953089C3B6BB2460FA902651DD
3,030,646 UART: [art] SIG.S = 5CEC1A07211B37F39C27365A51A91BEA5C3F01932ACB47A6BD761E40423B3D897FAE7943A390E28CBBD25584E7089D11
3,055,209 UART: Caliptra RT
3,055,460 UART: [state] CFI Enabled
3,174,711 UART: [rt] RT listening for mailbox commands...
3,175,381 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,216,005 UART: [rt]cmd =0x4c4d5356, len=1672
3,479,647 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,429 UART: [kat] ++
895,581 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,766 UART: [kat] SHA2-512-ACC
906,667 UART: [kat] ECC-384
916,376 UART: [kat] HMAC-384Kdf
921,050 UART: [kat] LMS
1,169,362 UART: [kat] --
1,170,391 UART: [cold-reset] ++
1,170,957 UART: [fht] FHT @ 0x50003400
1,173,591 UART: [idev] ++
1,173,759 UART: [idev] CDI.KEYID = 6
1,174,120 UART: [idev] SUBJECT.KEYID = 7
1,174,545 UART: [idev] UDS.KEYID = 0
1,174,891 ready_for_fw is high
1,174,891 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,464 UART: [idev] Erasing UDS.KEYID = 0
1,199,512 UART: [idev] Sha1 KeyId Algorithm
1,208,460 UART: [idev] --
1,209,271 UART: [ldev] ++
1,209,439 UART: [ldev] CDI.KEYID = 6
1,209,803 UART: [ldev] SUBJECT.KEYID = 5
1,210,230 UART: [ldev] AUTHORITY.KEYID = 7
1,210,693 UART: [ldev] FE.KEYID = 1
1,215,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,663 UART: [ldev] --
1,282,094 UART: [fwproc] Wait for Commands...
1,282,863 UART: [fwproc] Recv command 0x46574c44
1,283,596 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,596 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,771 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,076 >>> mbox cmd response: success
2,828,146 UART: [afmc] ++
2,828,314 UART: [afmc] CDI.KEYID = 6
2,828,677 UART: [afmc] SUBJECT.KEYID = 7
2,829,103 UART: [afmc] AUTHORITY.KEYID = 5
2,864,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,236 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,946 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,827 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,528 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,297 UART: [afmc] --
2,908,184 UART: [cold-reset] --
2,908,948 UART: [state] Locking Datavault
2,910,091 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,695 UART: [state] Locking ICCM
2,911,217 UART: [exit] Launching FMC @ 0x40000130
2,916,547 UART:
2,916,563 UART: Running Caliptra FMC ...
2,916,971 UART:
2,917,114 UART: [state] CFI Enabled
2,927,792 UART: [fht] FMC Alias Private Key: 7
3,046,766 UART: [art] Extend RT PCRs Done
3,047,194 UART: [art] Lock RT PCRs Done
3,048,666 UART: [art] Populate DV Done
3,056,777 UART: [fht] FMC Alias Private Key: 7
3,057,707 UART: [art] Derive CDI
3,057,987 UART: [art] Store in slot 0x4
3,144,198 UART: [art] Derive Key Pair
3,144,558 UART: [art] Store priv key in slot 0x5
3,158,420 UART: [art] Derive Key Pair - Done
3,172,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,792 UART: [art] PUB.X = D4FFA40E00FEB841786D0DC752C19D7016BC4254DB3305D5127003FDF6E99F9DFACE5B7146FE8D4548DBDF179FDE4379
3,195,544 UART: [art] PUB.Y = 6693DED628BAC96788A164BE5E80475C2D91F7DBF8CA2B9DE79B734B56741486312A09096C651D418F2255D1AAF41942
3,202,488 UART: [art] SIG.R = 15EF73620A01D419614FC8B28A55C01F341350838E17D423CA76599F9A590E349BC99AE38907213F0B03BBD61620B723
3,209,232 UART: [art] SIG.S = 5233F2B24E9399B9260FD587826CA72AF9DBEF88B9495310798A685F122344B15EFB4972301A1770FD3421FD5572B10D
3,233,190 UART: Caliptra RT
3,233,533 UART: [state] CFI Enabled
3,353,273 UART: [rt] RT listening for mailbox commands...
3,353,943 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,503 UART: [rt]cmd =0x4c4d5356, len=1672
3,657,779 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,517 ready_for_fw is high
1,059,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,521 >>> mbox cmd response: success
2,742,132 UART:
2,742,148 UART: Running Caliptra FMC ...
2,742,556 UART:
2,742,699 UART: [state] CFI Enabled
2,753,757 UART: [fht] FMC Alias Private Key: 7
2,873,083 UART: [art] Extend RT PCRs Done
2,873,511 UART: [art] Lock RT PCRs Done
2,875,197 UART: [art] Populate DV Done
2,883,438 UART: [fht] FMC Alias Private Key: 7
2,884,490 UART: [art] Derive CDI
2,884,770 UART: [art] Store in slot 0x4
2,970,443 UART: [art] Derive Key Pair
2,970,803 UART: [art] Store priv key in slot 0x5
2,984,401 UART: [art] Derive Key Pair - Done
2,999,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,737 UART: [art] PUB.X = 183D8C3C14CAD1A995519A23461F2217F2C2C950B4BDBFA0C8535D4BD38653ED10CD7213E2F7C6A63188ABF1761B4271
3,021,513 UART: [art] PUB.Y = 62372E34092B38604B8577AC6B10D0BE4F2377C750DA2B1525AEEAADCABD096488DDA5637E4AFC4A4CA146160BCB320D
3,028,465 UART: [art] SIG.R = 1948AECF89EB79A4CDAB2E15957E2573A72DC154B2EABBCC4FFD5546717CADC5A99146B60621948B0BA173923EA2D510
3,035,243 UART: [art] SIG.S = 9851476E5CE0AA4C4022E03A2EC3A05EA6836144BB2949B885C67F31AF72DB477B408C0DE4F07AD1DD9B05DFF43B707B
3,058,609 UART: Caliptra RT
3,058,952 UART: [state] CFI Enabled
3,178,959 UART: [rt] RT listening for mailbox commands...
3,179,629 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,659 UART: [rt]cmd =0x4c4d5356, len=1672
3,484,341 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,741 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [kat] SHA2-256
893,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,699 UART: [kat] ++
897,851 UART: [kat] sha1
902,045 UART: [kat] SHA2-256
903,985 UART: [kat] SHA2-384
906,750 UART: [kat] SHA2-512-ACC
908,651 UART: [kat] ECC-384
918,700 UART: [kat] HMAC-384Kdf
923,186 UART: [kat] LMS
1,171,514 UART: [kat] --
1,172,581 UART: [cold-reset] ++
1,172,995 UART: [fht] FHT @ 0x50003400
1,175,886 UART: [idev] ++
1,176,054 UART: [idev] CDI.KEYID = 6
1,176,414 UART: [idev] SUBJECT.KEYID = 7
1,176,838 UART: [idev] UDS.KEYID = 0
1,177,183 ready_for_fw is high
1,177,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,262 UART: [idev] Erasing UDS.KEYID = 0
1,200,869 UART: [idev] Sha1 KeyId Algorithm
1,209,411 UART: [idev] --
1,210,545 UART: [ldev] ++
1,210,713 UART: [ldev] CDI.KEYID = 6
1,211,076 UART: [ldev] SUBJECT.KEYID = 5
1,211,502 UART: [ldev] AUTHORITY.KEYID = 7
1,211,965 UART: [ldev] FE.KEYID = 1
1,217,119 UART: [ldev] Erasing FE.KEYID = 1
1,243,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,429 UART: [ldev] --
1,282,842 UART: [fwproc] Wait for Commands...
1,283,452 UART: [fwproc] Recv command 0x46574c44
1,284,180 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,122 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,292 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,505 >>> mbox cmd response: success
2,828,719 UART: [afmc] ++
2,828,887 UART: [afmc] CDI.KEYID = 6
2,829,249 UART: [afmc] SUBJECT.KEYID = 7
2,829,674 UART: [afmc] AUTHORITY.KEYID = 5
2,865,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,378 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,087 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,970 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,671 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,567 UART: [afmc] --
2,908,481 UART: [cold-reset] --
2,909,359 UART: [state] Locking Datavault
2,910,236 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,840 UART: [state] Locking ICCM
2,911,284 UART: [exit] Launching FMC @ 0x40000130
2,916,614 UART:
2,916,630 UART: Running Caliptra FMC ...
2,917,038 UART:
2,917,092 UART: [state] CFI Enabled
2,927,126 UART: [fht] FMC Alias Private Key: 7
3,046,322 UART: [art] Extend RT PCRs Done
3,046,750 UART: [art] Lock RT PCRs Done
3,048,420 UART: [art] Populate DV Done
3,056,613 UART: [fht] FMC Alias Private Key: 7
3,057,723 UART: [art] Derive CDI
3,058,003 UART: [art] Store in slot 0x4
3,143,972 UART: [art] Derive Key Pair
3,144,332 UART: [art] Store priv key in slot 0x5
3,157,378 UART: [art] Derive Key Pair - Done
3,172,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,615 UART: [art] PUB.X = A9F38BC35F4A4ADD7181C34E9511770E19422FFD0F5A8D59B9F7E7B311EACC576D9019B71995D9647A373EF35F9D4F96
3,195,387 UART: [art] PUB.Y = 8E00A1FD77D42D1D3950B028795B72FCFDDE04A94B64409D92D8DFF1C5112505F533CFC4A65410D9E3D06B22607FCD90
3,202,317 UART: [art] SIG.R = 9E8E25C5C44498A2F4D4EB4F4C37E97854605B7BE7EEEEBC1FB363AE02D00739AB864231E741A3AEDB8DAFCEFEA2E968
3,209,105 UART: [art] SIG.S = DDAD0A71221C89B151692EE0E2DB8AAC465A8020C39C8EF47C840B1FC34243FC90854AFCF35AD0BB66854A66D794E317
3,233,189 UART: Caliptra RT
3,233,440 UART: [state] CFI Enabled
3,352,554 UART: [rt] RT listening for mailbox commands...
3,353,224 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,992 UART: [rt]cmd =0x4c4d5356, len=1672
3,657,616 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,921 ready_for_fw is high
1,059,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,234 >>> mbox cmd response: success
2,742,427 UART:
2,742,443 UART: Running Caliptra FMC ...
2,742,851 UART:
2,742,905 UART: [state] CFI Enabled
2,753,087 UART: [fht] FMC Alias Private Key: 7
2,872,673 UART: [art] Extend RT PCRs Done
2,873,101 UART: [art] Lock RT PCRs Done
2,874,881 UART: [art] Populate DV Done
2,883,078 UART: [fht] FMC Alias Private Key: 7
2,884,214 UART: [art] Derive CDI
2,884,494 UART: [art] Store in slot 0x4
2,970,555 UART: [art] Derive Key Pair
2,970,915 UART: [art] Store priv key in slot 0x5
2,984,577 UART: [art] Derive Key Pair - Done
2,999,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,551 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,316 UART: [art] PUB.X = 6F84E402BF08948F2E6B7F128CE71CD56B5AE7C15D93AEB84357206C2BA74B88C2FAED7FE31E80A21DA963481EDEA4A6
3,022,098 UART: [art] PUB.Y = EFF240426649756F8E4C5941AAE3D7E7CAA86A9AB698EECD4063648D54323BBF1C0BDC10D0E484F0FF47E17EBA9BE07D
3,029,065 UART: [art] SIG.R = 33EFBF442564CFC49D7F978F05ADE9A3DD95F2881BBD453407C43F5A5D5718C548748A25A08C2C2F9927080CBE3287F8
3,035,829 UART: [art] SIG.S = 618C63B1F679F1F555D22942287C8F5503B3700286C31E9503DFFF4A82FC907D9295ABD4E2CDC84A755CB47EF1E6EF45
3,059,912 UART: Caliptra RT
3,060,163 UART: [state] CFI Enabled
3,179,639 UART: [rt] RT listening for mailbox commands...
3,180,309 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,981 UART: [rt]cmd =0x4c4d5356, len=1672
3,484,431 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,911 UART: [state] LifecycleState = Unprovisioned
86,566 UART: [state] DebugLocked = No
87,158 UART: [state] WD Timer not started. Device not locked for debugging
88,331 UART: [kat] SHA2-256
893,981 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,106 UART: [kat] ++
898,258 UART: [kat] sha1
902,480 UART: [kat] SHA2-256
904,420 UART: [kat] SHA2-384
907,237 UART: [kat] SHA2-512-ACC
909,138 UART: [kat] ECC-384
919,345 UART: [kat] HMAC-384Kdf
923,947 UART: [kat] LMS
1,172,275 UART: [kat] --
1,173,442 UART: [cold-reset] ++
1,173,896 UART: [fht] FHT @ 0x50003400
1,176,707 UART: [idev] ++
1,176,875 UART: [idev] CDI.KEYID = 6
1,177,235 UART: [idev] SUBJECT.KEYID = 7
1,177,659 UART: [idev] UDS.KEYID = 0
1,178,004 ready_for_fw is high
1,178,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,597 UART: [idev] Erasing UDS.KEYID = 0
1,202,476 UART: [idev] Sha1 KeyId Algorithm
1,211,166 UART: [idev] --
1,212,330 UART: [ldev] ++
1,212,498 UART: [ldev] CDI.KEYID = 6
1,212,861 UART: [ldev] SUBJECT.KEYID = 5
1,213,287 UART: [ldev] AUTHORITY.KEYID = 7
1,213,750 UART: [ldev] FE.KEYID = 1
1,218,928 UART: [ldev] Erasing FE.KEYID = 1
1,245,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,048 UART: [ldev] --
1,285,489 UART: [fwproc] Wait for Commands...
1,286,251 UART: [fwproc] Recv command 0x46574c44
1,286,979 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,659,447 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,617 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,954 >>> mbox cmd response: success
2,832,032 UART: [afmc] ++
2,832,200 UART: [afmc] CDI.KEYID = 6
2,832,562 UART: [afmc] SUBJECT.KEYID = 7
2,832,987 UART: [afmc] AUTHORITY.KEYID = 5
2,868,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,503 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,891,212 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,897,095 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,796 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,564 UART: [afmc] --
2,911,500 UART: [cold-reset] --
2,912,344 UART: [state] Locking Datavault
2,913,625 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,229 UART: [state] Locking ICCM
2,914,729 UART: [exit] Launching FMC @ 0x40000130
2,920,059 UART:
2,920,075 UART: Running Caliptra FMC ...
2,920,483 UART:
2,920,626 UART: [state] CFI Enabled
2,930,868 UART: [fht] FMC Alias Private Key: 7
3,049,484 UART: [art] Extend RT PCRs Done
3,049,912 UART: [art] Lock RT PCRs Done
3,051,486 UART: [art] Populate DV Done
3,059,855 UART: [fht] FMC Alias Private Key: 7
3,060,797 UART: [art] Derive CDI
3,061,077 UART: [art] Store in slot 0x4
3,147,074 UART: [art] Derive Key Pair
3,147,434 UART: [art] Store priv key in slot 0x5
3,161,478 UART: [art] Derive Key Pair - Done
3,176,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,354 UART: [art] PUB.X = 608F0C376FCA342211AA578299DCDA969A9AB077A73B0EE244D31A791CC221E613190101E1EB81F17E44C298C8465395
3,199,110 UART: [art] PUB.Y = 483ACFA7736BE61E159295BBAE40C66297CB59C68266310C9D463C3247CF4B3597750D2E6CEB7687D146ECB1915213C0
3,206,054 UART: [art] SIG.R = C0C02EF726AB827C12FE1F52DB53AD161C7A2CA6308C3B998535554CD33DCD9739D1317C89BA77DC3AA4FB4237CFEE0E
3,212,839 UART: [art] SIG.S = 841084BEE71C3778D1638552F4FC452817064390C22BF4E516D94A63CF17216B0EB006F05CD62CBEAFB381D35DE1D5DB
3,237,356 UART: Caliptra RT
3,237,699 UART: [state] CFI Enabled
3,357,391 UART: [rt] RT listening for mailbox commands...
3,358,061 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,977 UART: [rt]cmd =0x4c4d5356, len=1672
3,662,515 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,372 ready_for_fw is high
1,060,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,477 >>> mbox cmd response: success
2,742,674 UART:
2,742,690 UART: Running Caliptra FMC ...
2,743,098 UART:
2,743,241 UART: [state] CFI Enabled
2,754,069 UART: [fht] FMC Alias Private Key: 7
2,872,895 UART: [art] Extend RT PCRs Done
2,873,323 UART: [art] Lock RT PCRs Done
2,874,811 UART: [art] Populate DV Done
2,882,776 UART: [fht] FMC Alias Private Key: 7
2,883,804 UART: [art] Derive CDI
2,884,084 UART: [art] Store in slot 0x4
2,969,587 UART: [art] Derive Key Pair
2,969,947 UART: [art] Store priv key in slot 0x5
2,983,385 UART: [art] Derive Key Pair - Done
2,998,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,521 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,286 UART: [art] PUB.X = 0E4CECA9FD5E65CE67F78B43C2DDC27ACE24E7FF78B472305E43CD674D648089A2B81C0AF24E59BEB03DC8A1C746BECE
3,021,076 UART: [art] PUB.Y = 0D40FE911B2C4481FB6B26284FA7F405B15E07D07A53162B732F558FB0E28380E792501B1AA88D3958DA419CEC6132D0
3,028,017 UART: [art] SIG.R = 5DFED3835647504244E99E28B217BA57F5E36282C256819B492A7DA2D46A45BEAD749988CB5DA8B0124A7A608C89E679
3,034,787 UART: [art] SIG.S = 184B0C2D1BAB2FECAF8282C9412873575AAFBF023C90F6202F9C6FB5790501D6EA7F3ADA46A9F01D24C1115755BE55FB
3,058,839 UART: Caliptra RT
3,059,182 UART: [state] CFI Enabled
3,178,526 UART: [rt] RT listening for mailbox commands...
3,179,196 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,772 UART: [rt]cmd =0x4c4d5356, len=1672
3,483,090 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,140 UART:
192,513 UART: Running Caliptra ROM ...
193,707 UART:
193,863 UART: [state] CFI Enabled
263,009 UART: [state] LifecycleState = Unprovisioned
265,007 UART: [state] DebugLocked = No
266,198 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,575 UART: [kat] SHA2-256
440,297 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,755 UART: [kat] ++
451,310 UART: [kat] sha1
463,702 UART: [kat] SHA2-256
466,399 UART: [kat] SHA2-384
472,537 UART: [kat] SHA2-512-ACC
474,841 UART: [kat] ECC-384
2,768,234 UART: [kat] HMAC-384Kdf
2,802,733 UART: [kat] LMS
3,993,015 UART: [kat] --
3,999,353 UART: [cold-reset] ++
4,000,722 UART: [fht] Storing FHT @ 0x50003400
4,012,203 UART: [idev] ++
4,012,765 UART: [idev] CDI.KEYID = 6
4,013,797 UART: [idev] SUBJECT.KEYID = 7
4,014,972 UART: [idev] UDS.KEYID = 0
4,016,014 ready_for_fw is high
4,016,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,165,408 UART: [idev] Erasing UDS.KEYID = 0
7,349,809 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,510 UART: [idev] --
7,375,332 UART: [ldev] ++
7,375,899 UART: [ldev] CDI.KEYID = 6
7,376,863 UART: [ldev] SUBJECT.KEYID = 5
7,378,075 UART: [ldev] AUTHORITY.KEYID = 7
7,379,307 UART: [ldev] FE.KEYID = 1
7,426,680 UART: [ldev] Erasing FE.KEYID = 1
10,759,037 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,067 UART: [ldev] --
13,118,235 UART: [fwproc] Waiting for Commands...
13,120,843 UART: [fwproc] Received command 0x46574c44
13,123,027 UART: [fwproc] Received Image of size 118548 bytes
17,235,007 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,316,195 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,389,405 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,717,997 >>> mbox cmd response: success
17,718,519 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,722,107 UART: [afmc] ++
17,722,690 UART: [afmc] CDI.KEYID = 6
17,723,672 UART: [afmc] SUBJECT.KEYID = 7
17,724,890 UART: [afmc] AUTHORITY.KEYID = 5
21,090,632 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,389,821 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,083 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,535 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,231 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,435,718 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,149 UART: [afmc] --
23,461,965 UART: [cold-reset] --
23,467,395 UART: [state] Locking Datavault
23,472,537 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,291 UART: [state] Locking ICCM
23,477,031 UART: [exit] Launching FMC @ 0x40000130
23,485,440 UART:
23,485,678 UART: Running Caliptra FMC ...
23,486,780 UART:
23,486,940 UART: [state] CFI Enabled
23,549,485 UART: [fht] FMC Alias Private Key: 7
25,889,946 UART: [art] Extend RT PCRs Done
25,891,168 UART: [art] Lock RT PCRs Done
25,892,609 UART: [art] Populate DV Done
25,898,017 UART: [fht] FMC Alias Private Key: 7
25,899,630 UART: [art] Derive CDI
25,900,442 UART: [art] Store in slot 0x4
25,957,999 UART: [art] Derive Key Pair
25,959,046 UART: [art] Store priv key in slot 0x5
29,251,580 UART: [art] Derive Key Pair - Done
29,264,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,026 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,536 UART: [art] PUB.X = 158596D6CE3AFFC8AE76B0A742D87FF03949D3BE1EB112F8F26E7BEBE9E104AE5BA37A7FC03671ECE4069DDE1F1002C4
31,561,796 UART: [art] PUB.Y = 9CA930B7523A65B098C163EBED177739709BDFA33E2969E9716BFC88C02C82FE8E6EE45A3800EB88B86AC943129FF0E5
31,569,094 UART: [art] SIG.R = 01604562BC2AD4BED3CB35F3FE3C0D6B8C7A4227FCF2735DA9549BAF0C82AC79535CB6650E1E6ACB3329074842D231F6
31,576,460 UART: [art] SIG.S = 234A5DA6E4217021721A547167BC66C52540826BFF9AA978A932330BDF010201042824F615FA028FF537D0EDEE392149
32,882,158 UART: Caliptra RT
32,882,861 UART: [state] CFI Enabled
33,078,577 UART: [rt] RT listening for mailbox commands...
33,092,591 >>> mbox cmd response: failed
33,092,990 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,122,560 UART: [rt]cmd =0x46505652, len=4
33,123,836 UART: [rt] FIPS Version
33,124,897 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,764 writing to cptra_bootfsm_go
3,804,682 ready_for_fw is high
3,805,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,970,263 >>> mbox cmd response: success
17,971,093 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,670,069 UART:
23,670,474 UART: Running Caliptra FMC ...
23,671,594 UART:
23,671,754 UART: [state] CFI Enabled
23,740,442 UART: [fht] FMC Alias Private Key: 7
26,081,013 UART: [art] Extend RT PCRs Done
26,082,243 UART: [art] Lock RT PCRs Done
26,083,682 UART: [art] Populate DV Done
26,089,123 UART: [fht] FMC Alias Private Key: 7
26,090,778 UART: [art] Derive CDI
26,091,619 UART: [art] Store in slot 0x4
26,148,589 UART: [art] Derive Key Pair
26,149,590 UART: [art] Store priv key in slot 0x5
29,442,332 UART: [art] Derive Key Pair - Done
29,454,871 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,016 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,534 UART: [art] PUB.X = 9FE37986E016F6CDEE32ED35ED36150001251C8D22A689EF9D59157B875280FE3FA726EEB14C68234E4C878E9DB35024
31,751,793 UART: [art] PUB.Y = 70FC19729A579D1557F4F223F049D8E8AEE29E32515C4E3FF17201AC8135EEC320D4BCD1FC17FBE3B0F75946F31A1367
31,759,059 UART: [art] SIG.R = 992B72F010023D2FD5FC5BCFA0C46138C3A3186D02598FB608C7729D502801F9A06F16E2CC78B135B5CECF8A98BDA36A
31,766,449 UART: [art] SIG.S = 21C9578FB8426377D9C7A81009DE20E9147CD6E9EDEB66606B0E48757C9A6FD82BEAB27469D8F60B8D7A2FEE00F4E88F
33,071,675 UART: Caliptra RT
33,072,399 UART: [state] CFI Enabled
33,248,030 UART: [rt] RT listening for mailbox commands...
33,261,782 >>> mbox cmd response: failed
33,262,184 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,291,952 UART: [rt]cmd =0x46505652, len=4
33,293,301 UART: [rt] FIPS Version
33,294,412 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,369 UART:
192,735 UART: Running Caliptra ROM ...
193,825 UART:
603,756 UART: [state] CFI Enabled
620,130 UART: [state] LifecycleState = Unprovisioned
622,106 UART: [state] DebugLocked = No
624,050 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,060 UART: [kat] SHA2-256
797,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,368 UART: [kat] ++
808,813 UART: [kat] sha1
820,642 UART: [kat] SHA2-256
823,363 UART: [kat] SHA2-384
828,926 UART: [kat] SHA2-512-ACC
831,285 UART: [kat] ECC-384
3,116,441 UART: [kat] HMAC-384Kdf
3,128,745 UART: [kat] LMS
4,318,858 UART: [kat] --
4,322,463 UART: [cold-reset] ++
4,323,904 UART: [fht] Storing FHT @ 0x50003400
4,335,020 UART: [idev] ++
4,335,602 UART: [idev] CDI.KEYID = 6
4,336,487 UART: [idev] SUBJECT.KEYID = 7
4,337,801 UART: [idev] UDS.KEYID = 0
4,338,779 ready_for_fw is high
4,338,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,914 UART: [idev] Erasing UDS.KEYID = 0
7,627,624 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,269 UART: [idev] --
7,653,938 UART: [ldev] ++
7,654,508 UART: [ldev] CDI.KEYID = 6
7,655,439 UART: [ldev] SUBJECT.KEYID = 5
7,656,696 UART: [ldev] AUTHORITY.KEYID = 7
7,657,919 UART: [ldev] FE.KEYID = 1
7,668,773 UART: [ldev] Erasing FE.KEYID = 1
10,956,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,633 UART: [ldev] --
13,317,457 UART: [fwproc] Waiting for Commands...
13,320,532 UART: [fwproc] Received command 0x46574c44
13,322,753 UART: [fwproc] Received Image of size 118548 bytes
17,432,194 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,512,776 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,585,913 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,913,980 >>> mbox cmd response: success
17,915,051 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,917,993 UART: [afmc] ++
17,918,566 UART: [afmc] CDI.KEYID = 6
17,919,466 UART: [afmc] SUBJECT.KEYID = 7
17,920,724 UART: [afmc] AUTHORITY.KEYID = 5
21,232,872 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,526,793 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,529,036 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,543,477 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,558,163 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,572,619 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,593,889 UART: [afmc] --
23,597,475 UART: [cold-reset] --
23,600,841 UART: [state] Locking Datavault
23,606,566 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,310 UART: [state] Locking ICCM
23,610,344 UART: [exit] Launching FMC @ 0x40000130
23,618,783 UART:
23,619,024 UART: Running Caliptra FMC ...
23,620,126 UART:
23,620,283 UART: [state] CFI Enabled
23,628,071 UART: [fht] FMC Alias Private Key: 7
25,968,600 UART: [art] Extend RT PCRs Done
25,969,823 UART: [art] Lock RT PCRs Done
25,971,656 UART: [art] Populate DV Done
25,977,067 UART: [fht] FMC Alias Private Key: 7
25,978,708 UART: [art] Derive CDI
25,979,517 UART: [art] Store in slot 0x4
26,021,622 UART: [art] Derive Key Pair
26,022,620 UART: [art] Store priv key in slot 0x5
29,264,326 UART: [art] Derive Key Pair - Done
29,277,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,286 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,792 UART: [art] PUB.X = 9AD06B55A66EA7DF4E28F10DFD818D45A36847B920849AB7A6F34A4C4E0F5951B673F6C6EA403322552D773CAA377987
31,567,077 UART: [art] PUB.Y = FB08E08AADCE3E03AB8E2B190C5F891023073CD564AD7F2F66D4E506BC429F6B45DC9CCD9B61336BE4902978A12938F9
31,574,328 UART: [art] SIG.R = 11B100F10AA250DE3EBD638FFF270DD6344509F99D55872E8014A7CAD3B9B724B96EB7137B32248E171C02E02CBCB5B4
31,581,662 UART: [art] SIG.S = 42681BF88DAD0D1C3D3C5C818B52515FE5CD613E1B82772B994A1E8F98206256DBCA7302AAE4CCCFD3F462C94766F426
32,887,035 UART: Caliptra RT
32,887,736 UART: [state] CFI Enabled
33,020,619 UART: [rt] RT listening for mailbox commands...
33,034,304 >>> mbox cmd response: failed
33,034,693 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,064,391 UART: [rt]cmd =0x46505652, len=4
33,065,634 UART: [rt] FIPS Version
33,066,952 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
4,127,447 ready_for_fw is high
4,128,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,390 >>> mbox cmd response: success
18,166,197 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,803,374 UART:
23,803,772 UART: Running Caliptra FMC ...
23,805,185 UART:
23,805,354 UART: [state] CFI Enabled
23,813,059 UART: [fht] FMC Alias Private Key: 7
26,152,625 UART: [art] Extend RT PCRs Done
26,153,852 UART: [art] Lock RT PCRs Done
26,155,714 UART: [art] Populate DV Done
26,161,358 UART: [fht] FMC Alias Private Key: 7
26,162,842 UART: [art] Derive CDI
26,163,577 UART: [art] Store in slot 0x4
26,206,109 UART: [art] Derive Key Pair
26,207,109 UART: [art] Store priv key in slot 0x5
29,449,447 UART: [art] Derive Key Pair - Done
29,462,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,495 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,999 UART: [art] PUB.X = A1D0F632925C499F64D221FC13D0FF4B45ECC5454129766EF959D51054B6259BE8A27FF53F455A0011A233009AD6BA06
31,751,188 UART: [art] PUB.Y = 6F4D1275B4C605A67262293C8925BAB81D73504A925D955EBC0A70183482ADF39BBDD844FEF68BF45550F51ABFE57EA4
31,758,480 UART: [art] SIG.R = E0C84938433E2D03226858D4FE236A5C1A4E7F0FDB7FA4E8A040123D2A87466D0A175B6BDB416F140D038F615E98F432
31,765,833 UART: [art] SIG.S = 4CEB1E36593B3FCCADB604750CE027B986F374A201C719B4F970872E513B2C20A6148474972918823A1C5DFBCC0D89F0
33,071,024 UART: Caliptra RT
33,071,730 UART: [state] CFI Enabled
33,205,073 UART: [rt] RT listening for mailbox commands...
33,219,108 >>> mbox cmd response: failed
33,219,506 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,249,209 UART: [rt]cmd =0x46505652, len=4
33,250,449 UART: [rt] FIPS Version
33,251,599 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,096 UART:
192,464 UART: Running Caliptra ROM ...
193,656 UART:
193,826 UART: [state] CFI Enabled
265,894 UART: [state] LifecycleState = Unprovisioned
267,878 UART: [state] DebugLocked = No
269,554 UART: [state] WD Timer not started. Device not locked for debugging
272,802 UART: [kat] SHA2-256
452,440 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,237 UART: [kat] ++
463,771 UART: [kat] sha1
475,641 UART: [kat] SHA2-256
478,290 UART: [kat] SHA2-384
484,841 UART: [kat] SHA2-512-ACC
487,203 UART: [kat] ECC-384
2,946,449 UART: [kat] HMAC-384Kdf
2,971,270 UART: [kat] LMS
3,447,796 UART: [kat] --
3,452,784 UART: [cold-reset] ++
3,455,365 UART: [fht] FHT @ 0x50003400
3,466,053 UART: [idev] ++
3,466,610 UART: [idev] CDI.KEYID = 6
3,467,558 UART: [idev] SUBJECT.KEYID = 7
3,468,791 UART: [idev] UDS.KEYID = 0
3,469,756 ready_for_fw is high
3,469,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,400 UART: [idev] Erasing UDS.KEYID = 0
5,989,262 UART: [idev] Sha1 KeyId Algorithm
6,011,896 UART: [idev] --
6,017,409 UART: [ldev] ++
6,017,978 UART: [ldev] CDI.KEYID = 6
6,018,907 UART: [ldev] SUBJECT.KEYID = 5
6,020,119 UART: [ldev] AUTHORITY.KEYID = 7
6,021,348 UART: [ldev] FE.KEYID = 1
6,057,757 UART: [ldev] Erasing FE.KEYID = 1
8,564,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,533 UART: [ldev] --
10,373,819 UART: [fwproc] Wait for Commands...
10,377,045 UART: [fwproc] Recv command 0x46574c44
10,379,023 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,366 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,414 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,307 >>> mbox cmd response: success
14,342,397 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,345,619 UART: [afmc] ++
14,346,206 UART: [afmc] CDI.KEYID = 6
14,347,162 UART: [afmc] SUBJECT.KEYID = 7
14,348,376 UART: [afmc] AUTHORITY.KEYID = 5
16,891,049 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,614,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,119 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,632,939 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,648,996 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,664,546 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,688,724 UART: [afmc] --
18,692,421 UART: [cold-reset] --
18,694,987 UART: [state] Locking Datavault
18,698,986 UART: [state] Locking PCR0, PCR1 and PCR31
18,700,737 UART: [state] Locking ICCM
18,701,845 UART: [exit] Launching FMC @ 0x40000130
18,710,266 UART:
18,710,505 UART: Running Caliptra FMC ...
18,711,623 UART:
18,711,779 UART: [state] CFI Enabled
18,772,698 UART: [fht] FMC Alias Private Key: 7
20,538,833 UART: [art] Extend RT PCRs Done
20,540,059 UART: [art] Lock RT PCRs Done
20,541,635 UART: [art] Populate DV Done
20,547,144 UART: [fht] FMC Alias Private Key: 7
20,548,629 UART: [art] Derive CDI
20,549,359 UART: [art] Store in slot 0x4
20,605,553 UART: [art] Derive Key Pair
20,606,544 UART: [art] Store priv key in slot 0x5
23,069,889 UART: [art] Derive Key Pair - Done
23,083,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,558 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,065 UART: [art] PUB.X = 380A3150DE50C5EB0916D8CD34D1EA7AD41372E6D5BC67AB673E675AACAEA7EB005B404CA3F3BC0404390178AC026A51
24,804,324 UART: [art] PUB.Y = 5CF11D161A83C33E14FBA3406296B71B5E27951F1E6C292262F1B65A05D503FB20D2E0E797296CC9EC406AA956ECDFF0
24,811,578 UART: [art] SIG.R = 77079EC8A5D7FD0264C65045478E8909A2122BFE63786A15C8E53245E53C51C6FCF3A12B5B7FB4D7DED0BC9296373B3D
24,818,926 UART: [art] SIG.S = 8EDADB5CCA6A981E0049C83DA259F69D06C78B39CEA3545B4259FE6B0DE9CA329D0881CEB295667DDDFEAC371688A292
25,797,777 UART: Caliptra RT
25,798,472 UART: [state] CFI Enabled
25,979,497 UART: [rt] RT listening for mailbox commands...
25,993,117 >>> mbox cmd response: failed
25,993,553 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,023,532 UART: [rt]cmd =0x46505652, len=4
26,024,786 UART: [rt] FIPS Version
26,026,002 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,458,966 ready_for_fw is high
3,459,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,249,143 >>> mbox cmd response: success
14,250,333 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,531,869 UART:
18,532,251 UART: Running Caliptra FMC ...
18,533,361 UART:
18,533,510 UART: [state] CFI Enabled
18,601,001 UART: [fht] FMC Alias Private Key: 7
20,368,274 UART: [art] Extend RT PCRs Done
20,369,518 UART: [art] Lock RT PCRs Done
20,371,282 UART: [art] Populate DV Done
20,376,536 UART: [fht] FMC Alias Private Key: 7
20,378,074 UART: [art] Derive CDI
20,378,887 UART: [art] Store in slot 0x4
20,433,690 UART: [art] Derive Key Pair
20,434,734 UART: [art] Store priv key in slot 0x5
22,897,798 UART: [art] Derive Key Pair - Done
22,910,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,268 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,768 UART: [art] PUB.X = DC33C0748FEE522EF6E0EC2201F9DF267C9D42C0D57CFFBF1F00A4F3111C1EAAA7F8F71B84EE199CF9F3D8F35FFC2D1C
24,632,097 UART: [art] PUB.Y = 5C146923631B8432209462ECFDC3135E038948B24179D561DB5EB51399A7E9324EB1D76F1936652C715C26E2BA1DC441
24,639,303 UART: [art] SIG.R = 3E5CB5CD493561A3C56E771E0305B158DC2A3FC9F2C368CB28E5A383674099E27AC003985224687DAE46868D9F3AE3C7
24,646,706 UART: [art] SIG.S = 629CD7847A143E04AF35A543628A18A530E66E6AEEEAB1A5992CAF60CF46643A2D85D3BFABF446A38898F9F5FBA6015C
25,625,837 UART: Caliptra RT
25,626,550 UART: [state] CFI Enabled
25,806,254 UART: [rt] RT listening for mailbox commands...
25,819,727 >>> mbox cmd response: failed
25,820,119 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,849,717 UART: [rt]cmd =0x46505652, len=4
25,850,998 UART: [rt] FIPS Version
25,852,157 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,541 UART:
192,901 UART: Running Caliptra ROM ...
194,076 UART:
603,644 UART: [state] CFI Enabled
617,456 UART: [state] LifecycleState = Unprovisioned
619,406 UART: [state] DebugLocked = No
620,729 UART: [state] WD Timer not started. Device not locked for debugging
623,988 UART: [kat] SHA2-256
803,612 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,414 UART: [kat] ++
814,893 UART: [kat] sha1
825,417 UART: [kat] SHA2-256
828,171 UART: [kat] SHA2-384
833,561 UART: [kat] SHA2-512-ACC
835,869 UART: [kat] ECC-384
3,278,192 UART: [kat] HMAC-384Kdf
3,291,427 UART: [kat] LMS
3,767,947 UART: [kat] --
3,772,579 UART: [cold-reset] ++
3,773,796 UART: [fht] FHT @ 0x50003400
3,785,193 UART: [idev] ++
3,785,757 UART: [idev] CDI.KEYID = 6
3,786,717 UART: [idev] SUBJECT.KEYID = 7
3,788,150 UART: [idev] UDS.KEYID = 0
3,789,085 ready_for_fw is high
3,789,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,436 UART: [idev] Erasing UDS.KEYID = 0
6,266,670 UART: [idev] Sha1 KeyId Algorithm
6,289,806 UART: [idev] --
6,294,823 UART: [ldev] ++
6,295,448 UART: [ldev] CDI.KEYID = 6
6,296,370 UART: [ldev] SUBJECT.KEYID = 5
6,297,531 UART: [ldev] AUTHORITY.KEYID = 7
6,298,813 UART: [ldev] FE.KEYID = 1
6,311,511 UART: [ldev] Erasing FE.KEYID = 1
8,791,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,482 UART: [ldev] --
10,590,347 UART: [fwproc] Wait for Commands...
10,592,487 UART: [fwproc] Recv command 0x46574c44
10,594,542 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,267 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,320 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,049 >>> mbox cmd response: success
14,560,149 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,562,609 UART: [afmc] ++
14,563,187 UART: [afmc] CDI.KEYID = 6
14,564,126 UART: [afmc] SUBJECT.KEYID = 7
14,565,284 UART: [afmc] AUTHORITY.KEYID = 5
17,061,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,346 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,188 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,262 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,833,824 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,858,573 UART: [afmc] --
18,863,083 UART: [cold-reset] --
18,865,925 UART: [state] Locking Datavault
18,872,846 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,547 UART: [state] Locking ICCM
18,876,860 UART: [exit] Launching FMC @ 0x40000130
18,885,257 UART:
18,885,497 UART: Running Caliptra FMC ...
18,886,596 UART:
18,886,757 UART: [state] CFI Enabled
18,894,804 UART: [fht] FMC Alias Private Key: 7
20,660,826 UART: [art] Extend RT PCRs Done
20,662,040 UART: [art] Lock RT PCRs Done
20,663,499 UART: [art] Populate DV Done
20,668,916 UART: [fht] FMC Alias Private Key: 7
20,670,596 UART: [art] Derive CDI
20,671,339 UART: [art] Store in slot 0x4
20,714,314 UART: [art] Derive Key Pair
20,715,314 UART: [art] Store priv key in slot 0x5
23,142,967 UART: [art] Derive Key Pair - Done
23,156,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,489 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,993 UART: [art] PUB.X = 1FB3AFD9A5C04BDE3645BCE2B7C763279FC7FC21D64ED482A2A0E45B1944A1E7022F384B0B7AC211531600BE283B07DF
24,871,227 UART: [art] PUB.Y = 53C1AE0186E65D4E3371BD6D57732F19DC8848469F9FE077344377F6BC9DDBB35AE45F66F68E627EB157B843CE84E2CA
24,878,504 UART: [art] SIG.R = CD8BFCE0DE47D9EE04FA9BCC6D14047D53991F5DE0F9539B53777B00134550FB203E5484BCFF0FF3A046F3CA1C937EDC
24,885,894 UART: [art] SIG.S = B87AABAA072238635410587BB3C01162412FDF9C59389F42205E789013B24C7853C9D3970C241092C10B15192F7FD653
25,864,924 UART: Caliptra RT
25,865,617 UART: [state] CFI Enabled
25,997,382 UART: [rt] RT listening for mailbox commands...
26,011,195 >>> mbox cmd response: failed
26,011,593 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,041,365 UART: [rt]cmd =0x46505652, len=4
26,042,648 UART: [rt] FIPS Version
26,043,767 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
3,780,467 ready_for_fw is high
3,781,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,045 >>> mbox cmd response: success
14,446,222 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,693,728 UART:
18,694,103 UART: Running Caliptra FMC ...
18,695,225 UART:
18,695,381 UART: [state] CFI Enabled
18,703,169 UART: [fht] FMC Alias Private Key: 7
20,468,675 UART: [art] Extend RT PCRs Done
20,469,893 UART: [art] Lock RT PCRs Done
20,471,441 UART: [art] Populate DV Done
20,476,913 UART: [fht] FMC Alias Private Key: 7
20,478,612 UART: [art] Derive CDI
20,479,348 UART: [art] Store in slot 0x4
20,522,046 UART: [art] Derive Key Pair
20,523,050 UART: [art] Store priv key in slot 0x5
22,949,243 UART: [art] Derive Key Pair - Done
22,961,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,279 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,779 UART: [art] PUB.X = 6C26348870E8958AECCD56D24889609F1553C96E811875140F3A379DD4E465F1CEDFBEEAB1DE4F4A0A8D5FE7B4346910
24,677,025 UART: [art] PUB.Y = 3D6EE5D99E6502AF5FA5D4428385C63CC095D2890C4EC1DB773451C4313BCC7E2F6B4164E1A862C3884ABB0A907AE7BB
24,684,335 UART: [art] SIG.R = 187299DD85DE9A9406B65D2B7E7D368BADA067F3329E15735AB1BBA717140D4367625E15AB552E76D5E8A7EB2557045D
24,691,676 UART: [art] SIG.S = 589BBD840DA5C0DCCC552753BBA538D908CEB89567B3F5960E305AE8B8A60BBD2B8E10EA40F87102F2D5E9320F2FC07A
25,670,502 UART: Caliptra RT
25,671,200 UART: [state] CFI Enabled
25,803,435 UART: [rt] RT listening for mailbox commands...
25,817,115 >>> mbox cmd response: failed
25,817,510 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,847,429 UART: [rt]cmd =0x46505652, len=4
25,848,709 UART: [rt] FIPS Version
25,850,085 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
192,138 UART:
192,509 UART: Running Caliptra ROM ...
193,626 UART:
193,771 UART: [state] CFI Enabled
265,806 UART: [state] LifecycleState = Unprovisioned
268,223 UART: [state] DebugLocked = No
270,469 UART: [state] WD Timer not started. Device not locked for debugging
275,710 UART: [kat] SHA2-256
465,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,308 UART: [kat] ++
476,786 UART: [kat] sha1
488,889 UART: [kat] SHA2-256
491,899 UART: [kat] SHA2-384
498,955 UART: [kat] SHA2-512-ACC
501,539 UART: [kat] ECC-384
2,948,048 UART: [kat] HMAC-384Kdf
2,972,012 UART: [kat] LMS
3,503,829 UART: [kat] --
3,508,743 UART: [cold-reset] ++
3,511,307 UART: [fht] FHT @ 0x50003400
3,521,568 UART: [idev] ++
3,522,200 UART: [idev] CDI.KEYID = 6
3,523,175 UART: [idev] SUBJECT.KEYID = 7
3,524,343 UART: [idev] UDS.KEYID = 0
3,525,389 ready_for_fw is high
3,525,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,666 UART: [idev] Erasing UDS.KEYID = 0
6,030,954 UART: [idev] Sha1 KeyId Algorithm
6,053,387 UART: [idev] --
6,057,390 UART: [ldev] ++
6,058,272 UART: [ldev] CDI.KEYID = 6
6,059,165 UART: [ldev] SUBJECT.KEYID = 5
6,060,222 UART: [ldev] AUTHORITY.KEYID = 7
6,061,395 UART: [ldev] FE.KEYID = 1
6,101,352 UART: [ldev] Erasing FE.KEYID = 1
8,607,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,264 UART: [ldev] --
10,411,879 UART: [fwproc] Wait for Commands...
10,414,615 UART: [fwproc] Recv command 0x46574c44
10,416,894 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,500 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,115 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,515 >>> mbox cmd response: success
14,687,670 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,690,353 UART: [afmc] ++
14,691,045 UART: [afmc] CDI.KEYID = 6
14,692,282 UART: [afmc] SUBJECT.KEYID = 7
14,693,715 UART: [afmc] AUTHORITY.KEYID = 5
17,233,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,977,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,979,525 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,994,638 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,009,785 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,024,700 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,047,796 UART: [afmc] --
19,050,688 UART: [cold-reset] --
19,054,985 UART: [state] Locking Datavault
19,061,586 UART: [state] Locking PCR0, PCR1 and PCR31
19,063,771 UART: [state] Locking ICCM
19,066,764 UART: [exit] Launching FMC @ 0x40000130
19,075,425 UART:
19,075,660 UART: Running Caliptra FMC ...
19,076,763 UART:
19,076,921 UART: [state] CFI Enabled
19,135,142 UART: [fht] FMC Alias Private Key: 7
20,902,171 UART: [art] Extend RT PCRs Done
20,903,388 UART: [art] Lock RT PCRs Done
20,904,925 UART: [art] Populate DV Done
20,910,114 UART: [fht] FMC Alias Private Key: 7
20,911,751 UART: [art] Derive CDI
20,912,509 UART: [art] Store in slot 0x4
20,967,623 UART: [art] Derive Key Pair
20,968,658 UART: [art] Store priv key in slot 0x5
23,431,747 UART: [art] Derive Key Pair - Done
23,444,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,157,124 UART: [art] Erasing AUTHORITY.KEYID = 7
25,158,641 UART: [art] PUB.X = 4B6B51C933CD1DA2ACF4E218C218B9995A7F3C13FB6ED39018868ED2DD36BA72AD95B2BEB724BC2021123E2FEB221F68
25,165,872 UART: [art] PUB.Y = EDA49C981053A9F4ACD5615501CB647B982A227B177870852121153F364EC65CF82E768BDAF94C56E13C01C9721EB2FC
25,173,129 UART: [art] SIG.R = 8DD095EB75F37FD0B6FA53D26396CE0D29470093C3712FB89A04B93C28C5C4678A451DB6C098092E78DC9E7FF50E721F
25,180,535 UART: [art] SIG.S = D3F63587E757F30A5BDBF10E9FB83B1410E301CCA2E32598F591B562CB207873AA926EE19A326436C62C28C59B44A88F
26,159,169 UART: Caliptra RT
26,159,848 UART: [state] CFI Enabled
26,340,303 UART: [rt] RT listening for mailbox commands...
26,354,198 >>> mbox cmd response: failed
26,354,598 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,384,521 UART: [rt]cmd =0x46505652, len=4
26,385,812 UART: [rt] FIPS Version
26,386,974 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,417,197 ready_for_fw is high
3,417,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,801,496 >>> mbox cmd response: success
14,802,585 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,085,261 UART:
19,085,646 UART: Running Caliptra FMC ...
19,086,837 UART:
19,087,026 UART: [state] CFI Enabled
19,156,441 UART: [fht] FMC Alias Private Key: 7
20,922,594 UART: [art] Extend RT PCRs Done
20,923,814 UART: [art] Lock RT PCRs Done
20,925,602 UART: [art] Populate DV Done
20,931,015 UART: [fht] FMC Alias Private Key: 7
20,932,612 UART: [art] Derive CDI
20,933,426 UART: [art] Store in slot 0x4
20,988,548 UART: [art] Derive Key Pair
20,989,583 UART: [art] Store priv key in slot 0x5
23,453,007 UART: [art] Derive Key Pair - Done
23,466,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,178,926 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,438 UART: [art] PUB.X = 4B368879A290A98C0334CED497A6EA4014BB1280CF6E0EF0497B47DCF47BED9E193B3BB7AE00341A5914078C0C520FA3
25,187,700 UART: [art] PUB.Y = 2FB82BE605EA455A9347482EAA9B58403AC90F7C16EF1003280C4DA91EF5E4AEB81E260ADEF9AE7C7632828DED4E648C
25,194,945 UART: [art] SIG.R = 1FE1129D8D3F4458275B53ED72EE73CA0C2DA97B30C626E3CFE33DF0E9CD76655E0A1F03072091ADEFA7BD27377703BC
25,202,364 UART: [art] SIG.S = A8308C0FF8730E01B3DB7E667C5804A6C0C295C040FB64E3F4C43793B7FEC9AEE96B5A110B86E889B4BBA080588EC2FF
26,181,685 UART: Caliptra RT
26,182,402 UART: [state] CFI Enabled
26,362,130 UART: [rt] RT listening for mailbox commands...
26,376,042 >>> mbox cmd response: failed
26,376,436 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,406,245 UART: [rt]cmd =0x46505652, len=4
26,407,485 UART: [rt] FIPS Version
26,408,782 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,496 UART:
192,851 UART: Running Caliptra ROM ...
194,047 UART:
603,548 UART: [state] CFI Enabled
619,218 UART: [state] LifecycleState = Unprovisioned
621,599 UART: [state] DebugLocked = No
622,807 UART: [state] WD Timer not started. Device not locked for debugging
626,314 UART: [kat] SHA2-256
816,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,990 UART: [kat] ++
827,522 UART: [kat] sha1
839,676 UART: [kat] SHA2-256
842,696 UART: [kat] SHA2-384
848,622 UART: [kat] SHA2-512-ACC
851,212 UART: [kat] ECC-384
3,294,888 UART: [kat] HMAC-384Kdf
3,307,478 UART: [kat] LMS
3,839,321 UART: [kat] --
3,845,963 UART: [cold-reset] ++
3,847,690 UART: [fht] FHT @ 0x50003400
3,858,746 UART: [idev] ++
3,859,390 UART: [idev] CDI.KEYID = 6
3,860,375 UART: [idev] SUBJECT.KEYID = 7
3,861,577 UART: [idev] UDS.KEYID = 0
3,862,527 ready_for_fw is high
3,862,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,592 UART: [idev] Erasing UDS.KEYID = 0
6,333,952 UART: [idev] Sha1 KeyId Algorithm
6,357,829 UART: [idev] --
6,363,333 UART: [ldev] ++
6,364,013 UART: [ldev] CDI.KEYID = 6
6,364,935 UART: [ldev] SUBJECT.KEYID = 5
6,366,149 UART: [ldev] AUTHORITY.KEYID = 7
6,367,331 UART: [ldev] FE.KEYID = 1
6,379,440 UART: [ldev] Erasing FE.KEYID = 1
8,855,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,147 UART: [ldev] --
10,644,937 UART: [fwproc] Wait for Commands...
10,646,655 UART: [fwproc] Recv command 0x46574c44
10,648,907 UART: [fwproc] Recv'd Img size: 118548 bytes
14,138,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,214,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,337,839 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,898,620 >>> mbox cmd response: success
14,899,642 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,902,894 UART: [afmc] ++
14,903,602 UART: [afmc] CDI.KEYID = 6
14,904,798 UART: [afmc] SUBJECT.KEYID = 7
14,906,290 UART: [afmc] AUTHORITY.KEYID = 5
17,410,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,132,674 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,134,599 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,149,701 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,164,887 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,179,746 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,204,989 UART: [afmc] --
19,208,534 UART: [cold-reset] --
19,213,103 UART: [state] Locking Datavault
19,217,714 UART: [state] Locking PCR0, PCR1 and PCR31
19,219,858 UART: [state] Locking ICCM
19,221,743 UART: [exit] Launching FMC @ 0x40000130
19,230,425 UART:
19,230,658 UART: Running Caliptra FMC ...
19,231,760 UART:
19,231,920 UART: [state] CFI Enabled
19,239,866 UART: [fht] FMC Alias Private Key: 7
21,005,228 UART: [art] Extend RT PCRs Done
21,006,478 UART: [art] Lock RT PCRs Done
21,008,254 UART: [art] Populate DV Done
21,013,892 UART: [fht] FMC Alias Private Key: 7
21,015,442 UART: [art] Derive CDI
21,016,184 UART: [art] Store in slot 0x4
21,058,946 UART: [art] Derive Key Pair
21,059,990 UART: [art] Store priv key in slot 0x5
23,487,029 UART: [art] Derive Key Pair - Done
23,499,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,206,185 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,702 UART: [art] PUB.X = 6206E41A507384F52D0FE0A1451E5F23FBDB12C2F374CB761FB4B9DAA59DB9EAA935362A51EEEBEBC5D46A0C1B6F7B22
25,215,028 UART: [art] PUB.Y = 5AD18286FA25C282B955AC7BEDB213A3DF41C64BDB249DA8F5984432664DA4544838A9D82F2E4E8183FAA27BCEBFD1E8
25,222,284 UART: [art] SIG.R = 35063E0D3897EA73B016CD6BAFB6734F86BA4ED5E71652A126E49A90291457E0CC7C5FF9C6C0E35581130795AF7F71C4
25,229,707 UART: [art] SIG.S = 8C31D3576838DB4B5F46D660D321D92D19D476746C5510D1D9D904779EC03378D26513B1E3D15AC1F55BA4B649DF4150
26,208,481 UART: Caliptra RT
26,209,189 UART: [state] CFI Enabled
26,341,289 UART: [rt] RT listening for mailbox commands...
26,354,817 >>> mbox cmd response: failed
26,355,205 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,384,919 UART: [rt]cmd =0x46505652, len=4
26,386,197 UART: [rt] FIPS Version
26,387,420 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,756,946 ready_for_fw is high
3,757,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,694 >>> mbox cmd response: success
15,046,732 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,302,376 UART:
19,302,771 UART: Running Caliptra FMC ...
19,303,890 UART:
19,304,048 UART: [state] CFI Enabled
19,312,232 UART: [fht] FMC Alias Private Key: 7
21,077,813 UART: [art] Extend RT PCRs Done
21,079,049 UART: [art] Lock RT PCRs Done
21,080,391 UART: [art] Populate DV Done
21,085,880 UART: [fht] FMC Alias Private Key: 7
21,087,599 UART: [art] Derive CDI
21,088,347 UART: [art] Store in slot 0x4
21,131,512 UART: [art] Derive Key Pair
21,132,561 UART: [art] Store priv key in slot 0x5
23,559,151 UART: [art] Derive Key Pair - Done
23,572,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,421 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,938 UART: [art] PUB.X = ACEB62BB73C1FCDBEBBA6CF34DEFE14188FD060F21752B5411B1412098C2E354390B71215A72FE9B570E17B4F2512DE3
25,287,194 UART: [art] PUB.Y = 802D5805A73915318D40E01C245456FEAEFB08E429E41C89E96DC2B87DB32CADEF9E9DC71679F4174EA6EE8FD059CEA4
25,294,448 UART: [art] SIG.R = EA3E175CCB59203DCE13FC8FE1A7B6632AF02DF8F1B8B10D104E7EAB368879B6AB0D1F9A9DB5C110B093C168FEB68FDB
25,301,843 UART: [art] SIG.S = ED5FF2579901270A991B64DDAE3C3758BA9FD6B6EF52C176CD34D891D3EAC94B8F33B6B9B9B007823D3E6285828EB98F
26,281,000 UART: Caliptra RT
26,281,719 UART: [state] CFI Enabled
26,414,573 UART: [rt] RT listening for mailbox commands...
26,428,380 >>> mbox cmd response: failed
26,428,775 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,458,642 UART: [rt]cmd =0x46505652, len=4
26,459,893 UART: [rt] FIPS Version
26,461,129 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,015 UART: [kat] SHA2-256
881,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,061 UART: [kat] ++
886,213 UART: [kat] sha1
890,407 UART: [kat] SHA2-256
892,345 UART: [kat] SHA2-384
895,172 UART: [kat] SHA2-512-ACC
897,073 UART: [kat] ECC-384
903,026 UART: [kat] HMAC-384Kdf
907,730 UART: [kat] LMS
1,475,926 UART: [kat] --
1,476,961 UART: [cold-reset] ++
1,477,371 UART: [fht] Storing FHT @ 0x50003400
1,480,018 UART: [idev] ++
1,480,186 UART: [idev] CDI.KEYID = 6
1,480,546 UART: [idev] SUBJECT.KEYID = 7
1,480,970 UART: [idev] UDS.KEYID = 0
1,481,315 ready_for_fw is high
1,481,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,718 UART: [idev] Erasing UDS.KEYID = 0
1,505,310 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,828 UART: [idev] --
1,514,817 UART: [ldev] ++
1,514,985 UART: [ldev] CDI.KEYID = 6
1,515,348 UART: [ldev] SUBJECT.KEYID = 5
1,515,774 UART: [ldev] AUTHORITY.KEYID = 7
1,516,237 UART: [ldev] FE.KEYID = 1
1,521,211 UART: [ldev] Erasing FE.KEYID = 1
1,546,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,046 UART: [ldev] --
1,585,393 UART: [fwproc] Waiting for Commands...
1,586,090 UART: [fwproc] Received command 0x46574c44
1,586,881 UART: [fwproc] Received Image of size 118548 bytes
2,931,225 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,133 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,351 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,720 >>> mbox cmd response: success
3,130,720 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,131,820 UART: [afmc] ++
3,131,988 UART: [afmc] CDI.KEYID = 6
3,132,350 UART: [afmc] SUBJECT.KEYID = 7
3,132,775 UART: [afmc] AUTHORITY.KEYID = 5
3,168,018 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,974 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,754 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,463 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,346 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,029 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,891 UART: [afmc] --
3,210,909 UART: [cold-reset] --
3,211,749 UART: [state] Locking Datavault
3,212,784 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,388 UART: [state] Locking ICCM
3,213,936 UART: [exit] Launching FMC @ 0x40000130
3,219,266 UART:
3,219,282 UART: Running Caliptra FMC ...
3,219,690 UART:
3,219,744 UART: [state] CFI Enabled
3,230,094 UART: [fht] FMC Alias Private Key: 7
3,349,486 UART: [art] Extend RT PCRs Done
3,349,914 UART: [art] Lock RT PCRs Done
3,351,368 UART: [art] Populate DV Done
3,359,649 UART: [fht] FMC Alias Private Key: 7
3,360,727 UART: [art] Derive CDI
3,361,007 UART: [art] Store in slot 0x4
3,446,481 UART: [art] Derive Key Pair
3,446,841 UART: [art] Store priv key in slot 0x5
3,459,852 UART: [art] Derive Key Pair - Done
3,474,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,126 UART: [art] PUB.X = C3A360014372D38F0A808F9ED75BA4B06C23AF67582F45485EFBFFF40CBA3A395D644B31BD0E02ECD39C92D517B18E94
3,497,893 UART: [art] PUB.Y = 7B5F5F2C0E2A474B839014A1CE25C4AB7B544C198F60CE32DF0891C9B9118CBFE43031FAD986A0DFF45B61ACFA64D31F
3,504,855 UART: [art] SIG.R = EDB32333F119C858985B93CD828FA6A35C96B8929FEBBC55945656D0CF70535F136002E77D83D4730E1EE3825BB0F4E4
3,511,621 UART: [art] SIG.S = B932A84E794B49C01ED6FA51AAE8F8F49242915FFF526A7C42E2290AAF4E190E9D6E634F133A601A38C6386C399E53D5
3,535,417 UART: Caliptra RT
3,535,668 UART: [state] CFI Enabled
3,655,777 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,656 >>> mbox cmd response: failed
3,668,656 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,940 UART: [rt]cmd =0x46505652, len=4
3,698,600 UART: [rt] FIPS Version
3,699,779 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,919 ready_for_fw is high
1,362,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,756 >>> mbox cmd response: success
2,980,756 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,042,195 UART:
3,042,211 UART: Running Caliptra FMC ...
3,042,619 UART:
3,042,673 UART: [state] CFI Enabled
3,052,985 UART: [fht] FMC Alias Private Key: 7
3,172,115 UART: [art] Extend RT PCRs Done
3,172,543 UART: [art] Lock RT PCRs Done
3,174,365 UART: [art] Populate DV Done
3,182,982 UART: [fht] FMC Alias Private Key: 7
3,183,910 UART: [art] Derive CDI
3,184,190 UART: [art] Store in slot 0x4
3,270,290 UART: [art] Derive Key Pair
3,270,650 UART: [art] Store priv key in slot 0x5
3,283,703 UART: [art] Derive Key Pair - Done
3,298,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,231 UART: [art] PUB.X = ECFBEEE9E19A141114B6D53B0A9F48526A01EF772DE8CA5BA719AFDE58E7285D462EE2E02B196113AE81A2747D204305
3,321,004 UART: [art] PUB.Y = 701ADA514B8E259A825B5BB05903DD42D1981F776720755A7BF491DA0E3903EBF19E559BA1876951D8DD7006B3C7335A
3,327,942 UART: [art] SIG.R = 07DCBED5C6A811CDE29E8560F88BCCB9D40B0861BE19D3394687D14925A9048BA5BAE58D8F54B496D93DDE56E51583CD
3,334,714 UART: [art] SIG.S = 59E622D6AF0D5DE3BD6A85012C5655655F2F342F5BF735BF7C258CF924320BFBB11517AC79363FD5C1DBC1AB38800201
3,358,385 UART: Caliptra RT
3,358,636 UART: [state] CFI Enabled
3,478,249 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,491,000 >>> mbox cmd response: failed
3,491,000 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,342 UART: [rt]cmd =0x46505652, len=4
3,521,002 UART: [rt] FIPS Version
3,522,049 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,470 UART: [kat] SHA2-256
882,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,516 UART: [kat] ++
886,668 UART: [kat] sha1
890,678 UART: [kat] SHA2-256
892,616 UART: [kat] SHA2-384
895,437 UART: [kat] SHA2-512-ACC
897,338 UART: [kat] ECC-384
903,111 UART: [kat] HMAC-384Kdf
907,901 UART: [kat] LMS
1,476,097 UART: [kat] --
1,476,806 UART: [cold-reset] ++
1,477,250 UART: [fht] Storing FHT @ 0x50003400
1,480,055 UART: [idev] ++
1,480,223 UART: [idev] CDI.KEYID = 6
1,480,583 UART: [idev] SUBJECT.KEYID = 7
1,481,007 UART: [idev] UDS.KEYID = 0
1,481,352 ready_for_fw is high
1,481,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,181 UART: [idev] Erasing UDS.KEYID = 0
1,506,507 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,923 UART: [idev] --
1,515,890 UART: [ldev] ++
1,516,058 UART: [ldev] CDI.KEYID = 6
1,516,421 UART: [ldev] SUBJECT.KEYID = 5
1,516,847 UART: [ldev] AUTHORITY.KEYID = 7
1,517,310 UART: [ldev] FE.KEYID = 1
1,522,692 UART: [ldev] Erasing FE.KEYID = 1
1,547,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,737 UART: [ldev] --
1,587,240 UART: [fwproc] Waiting for Commands...
1,587,989 UART: [fwproc] Received command 0x46574c44
1,588,780 UART: [fwproc] Received Image of size 118548 bytes
2,933,542 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,486 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,704 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,055 >>> mbox cmd response: success
3,132,055 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,133,269 UART: [afmc] ++
3,133,437 UART: [afmc] CDI.KEYID = 6
3,133,799 UART: [afmc] SUBJECT.KEYID = 7
3,134,224 UART: [afmc] AUTHORITY.KEYID = 5
3,169,521 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,651 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,431 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,140 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,023 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,706 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,388 UART: [afmc] --
3,212,384 UART: [cold-reset] --
3,213,282 UART: [state] Locking Datavault
3,214,469 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,073 UART: [state] Locking ICCM
3,215,587 UART: [exit] Launching FMC @ 0x40000130
3,220,917 UART:
3,220,933 UART: Running Caliptra FMC ...
3,221,341 UART:
3,221,484 UART: [state] CFI Enabled
3,232,384 UART: [fht] FMC Alias Private Key: 7
3,350,812 UART: [art] Extend RT PCRs Done
3,351,240 UART: [art] Lock RT PCRs Done
3,352,818 UART: [art] Populate DV Done
3,361,179 UART: [fht] FMC Alias Private Key: 7
3,362,221 UART: [art] Derive CDI
3,362,501 UART: [art] Store in slot 0x4
3,448,417 UART: [art] Derive Key Pair
3,448,777 UART: [art] Store priv key in slot 0x5
3,462,040 UART: [art] Derive Key Pair - Done
3,476,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,889 UART: [art] PUB.X = C3BC65B5E79B21A847508328AFEC1B61DE41EC1E42F8A3722FDF29FFBD706A125CA32F4EE8A67D4BE5D7380FC97965FF
3,499,676 UART: [art] PUB.Y = 4406CE6D8C603225CBB6003D2CA0054A1E1C6D06E08DF637A4D16D78665ED1E387E71799914B5ECB5D09DC277C18F74C
3,506,598 UART: [art] SIG.R = 979FC8197D6948F88DED1348B048EAD8D621438E7B109FC910CC6DF62FBA0EAEF7097322B4F2D377AC54A253E1C63E45
3,513,372 UART: [art] SIG.S = 9B423FC163C61C151158BD93F7F303E6300CE2BB70AB6395A921FAF403A2C0D198C142BC2BC98DC2ABDBD366BC261E04
3,537,194 UART: Caliptra RT
3,537,537 UART: [state] CFI Enabled
3,658,486 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,671,573 >>> mbox cmd response: failed
3,671,573 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,961 UART: [rt]cmd =0x46505652, len=4
3,701,621 UART: [rt] FIPS Version
3,702,770 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,806 ready_for_fw is high
1,362,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,693 >>> mbox cmd response: success
2,981,693 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,043,204 UART:
3,043,220 UART: Running Caliptra FMC ...
3,043,628 UART:
3,043,771 UART: [state] CFI Enabled
3,054,645 UART: [fht] FMC Alias Private Key: 7
3,173,559 UART: [art] Extend RT PCRs Done
3,173,987 UART: [art] Lock RT PCRs Done
3,175,631 UART: [art] Populate DV Done
3,183,824 UART: [fht] FMC Alias Private Key: 7
3,184,788 UART: [art] Derive CDI
3,185,068 UART: [art] Store in slot 0x4
3,270,838 UART: [art] Derive Key Pair
3,271,198 UART: [art] Store priv key in slot 0x5
3,284,439 UART: [art] Derive Key Pair - Done
3,299,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,396 UART: [art] PUB.X = 297DD0BE6DAF679BF20F82401CB64EBFAA2E5547481E10F559649A21A539687A1F30094984AC4FE97217A5FF9F521EA6
3,322,166 UART: [art] PUB.Y = 4FEBD982A5B83843737073E6FCE2E5CDF47F9692D5F64420E05305138C95952BD2E6D357687BBCCB61856948456210C2
3,329,109 UART: [art] SIG.R = 40AF29763BB53207622ADF374C2B8B108B663CBA3DD93FCA7E0696247F49A0D63148BC9B0C9322BF923E8CB2878EE0D7
3,335,878 UART: [art] SIG.S = C21341A69F3A3A7A50D3E088CFC9B237F0325F0623715FAD975A80AF8C504B16162D9CEABE1F0321081E20031E6FEDA8
3,359,426 UART: Caliptra RT
3,359,769 UART: [state] CFI Enabled
3,479,187 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,491,890 >>> mbox cmd response: failed
3,491,890 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,392 UART: [rt]cmd =0x46505652, len=4
3,522,052 UART: [rt] FIPS Version
3,523,133 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,936 UART: [kat] SHA2-256
891,486 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,383 UART: [kat] HMAC-384Kdf
920,947 UART: [kat] LMS
1,169,259 UART: [kat] --
1,169,876 UART: [cold-reset] ++
1,170,294 UART: [fht] FHT @ 0x50003400
1,173,054 UART: [idev] ++
1,173,222 UART: [idev] CDI.KEYID = 6
1,173,583 UART: [idev] SUBJECT.KEYID = 7
1,174,008 UART: [idev] UDS.KEYID = 0
1,174,354 ready_for_fw is high
1,174,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,547 UART: [idev] Erasing UDS.KEYID = 0
1,199,729 UART: [idev] Sha1 KeyId Algorithm
1,208,501 UART: [idev] --
1,209,574 UART: [ldev] ++
1,209,742 UART: [ldev] CDI.KEYID = 6
1,210,106 UART: [ldev] SUBJECT.KEYID = 5
1,210,533 UART: [ldev] AUTHORITY.KEYID = 7
1,210,996 UART: [ldev] FE.KEYID = 1
1,216,276 UART: [ldev] Erasing FE.KEYID = 1
1,242,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,370 UART: [ldev] --
1,281,679 UART: [fwproc] Wait for Commands...
1,282,290 UART: [fwproc] Recv command 0x46574c44
1,283,023 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,927 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,102 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,429 >>> mbox cmd response: success
2,826,429 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,827,591 UART: [afmc] ++
2,827,759 UART: [afmc] CDI.KEYID = 6
2,828,122 UART: [afmc] SUBJECT.KEYID = 7
2,828,548 UART: [afmc] AUTHORITY.KEYID = 5
2,863,805 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,118 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,867 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,577 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,458 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,159 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,790 UART: [afmc] --
2,906,775 UART: [cold-reset] --
2,907,373 UART: [state] Locking Datavault
2,908,306 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,910 UART: [state] Locking ICCM
2,909,440 UART: [exit] Launching FMC @ 0x40000130
2,914,770 UART:
2,914,786 UART: Running Caliptra FMC ...
2,915,194 UART:
2,915,248 UART: [state] CFI Enabled
2,925,518 UART: [fht] FMC Alias Private Key: 7
3,044,836 UART: [art] Extend RT PCRs Done
3,045,264 UART: [art] Lock RT PCRs Done
3,046,922 UART: [art] Populate DV Done
3,055,003 UART: [fht] FMC Alias Private Key: 7
3,056,101 UART: [art] Derive CDI
3,056,381 UART: [art] Store in slot 0x4
3,142,124 UART: [art] Derive Key Pair
3,142,484 UART: [art] Store priv key in slot 0x5
3,155,410 UART: [art] Derive Key Pair - Done
3,170,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,159 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,924 UART: [art] PUB.X = 1A952F89D38E26D3C0E4CC6C03E3BD9AEB3357EE2CD34DAA887688FE37FB26E167F6E80FCA8B038C70858F691EED7E97
3,193,703 UART: [art] PUB.Y = A84D9FB2202F72511D44970EC16E607DFD683750ADAF832CB06F60A1BDEC20169B392EDDD74A4EA27E751E32D7B86929
3,200,660 UART: [art] SIG.R = BDDA0C2E679B742453276F955FB4BD72FFDF6DF9BF74F3C03D9165726B5C610C2C1A422E0AF495F2018490CAFBECF3C4
3,207,436 UART: [art] SIG.S = 9121BE9085E1D30967D23BD94FF21C76D5D0A55394AEC90382229F22A86779B3DD02E136626664051CD6E83F9CDAB41C
3,231,636 UART: Caliptra RT
3,231,887 UART: [state] CFI Enabled
3,351,195 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,363,928 >>> mbox cmd response: failed
3,363,928 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,258 UART: [rt]cmd =0x46505652, len=4
3,393,918 UART: [rt] FIPS Version
3,395,087 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,172 ready_for_fw is high
1,059,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,382 >>> mbox cmd response: success
2,678,382 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,739,349 UART:
2,739,365 UART: Running Caliptra FMC ...
2,739,773 UART:
2,739,827 UART: [state] CFI Enabled
2,750,269 UART: [fht] FMC Alias Private Key: 7
2,869,093 UART: [art] Extend RT PCRs Done
2,869,521 UART: [art] Lock RT PCRs Done
2,871,149 UART: [art] Populate DV Done
2,879,538 UART: [fht] FMC Alias Private Key: 7
2,880,508 UART: [art] Derive CDI
2,880,788 UART: [art] Store in slot 0x4
2,966,865 UART: [art] Derive Key Pair
2,967,225 UART: [art] Store priv key in slot 0x5
2,980,705 UART: [art] Derive Key Pair - Done
2,995,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,632 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,397 UART: [art] PUB.X = B114570DED4C8479F796D35026C231A690A7E38D7431B45065B91764516CF2F3A06E90558B3C0CEA2FB8EB3B3BBD081B
3,018,162 UART: [art] PUB.Y = 2D053BA6C174C160B24E7E15D29E6C75BF703FE0CE180543BDD4D574FFC202702162568BC2FDC2839D86CD5E57072685
3,025,104 UART: [art] SIG.R = 1806FEB24EA5CA24938CEA66FB13B24085384C424010A3105E638F15EAE5DC932A8FE62455936F482F2A682F74BB7DB5
3,031,875 UART: [art] SIG.S = 4133CE109BC113EA7228D1C9FD7C2886A4DA1319CF6094B43186E71CBC740AD9B504D2DE3FDFA89A548BDC6003160B69
3,056,195 UART: Caliptra RT
3,056,446 UART: [state] CFI Enabled
3,177,048 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,189,497 >>> mbox cmd response: failed
3,189,497 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,949 UART: [rt]cmd =0x46505652, len=4
3,219,609 UART: [rt] FIPS Version
3,220,494 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,045 UART: [state] LifecycleState = Unprovisioned
85,700 UART: [state] DebugLocked = No
86,250 UART: [state] WD Timer not started. Device not locked for debugging
87,559 UART: [kat] SHA2-256
891,109 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,462 UART: [kat] SHA2-512-ACC
906,363 UART: [kat] ECC-384
916,060 UART: [kat] HMAC-384Kdf
920,766 UART: [kat] LMS
1,169,078 UART: [kat] --
1,170,217 UART: [cold-reset] ++
1,170,735 UART: [fht] FHT @ 0x50003400
1,173,603 UART: [idev] ++
1,173,771 UART: [idev] CDI.KEYID = 6
1,174,132 UART: [idev] SUBJECT.KEYID = 7
1,174,557 UART: [idev] UDS.KEYID = 0
1,174,903 ready_for_fw is high
1,174,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,244 UART: [idev] Erasing UDS.KEYID = 0
1,199,442 UART: [idev] Sha1 KeyId Algorithm
1,208,412 UART: [idev] --
1,209,517 UART: [ldev] ++
1,209,685 UART: [ldev] CDI.KEYID = 6
1,210,049 UART: [ldev] SUBJECT.KEYID = 5
1,210,476 UART: [ldev] AUTHORITY.KEYID = 7
1,210,939 UART: [ldev] FE.KEYID = 1
1,216,243 UART: [ldev] Erasing FE.KEYID = 1
1,243,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,383 UART: [ldev] --
1,282,590 UART: [fwproc] Wait for Commands...
1,283,241 UART: [fwproc] Recv command 0x46574c44
1,283,974 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,456 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,631 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,912 >>> mbox cmd response: success
2,826,912 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,828,034 UART: [afmc] ++
2,828,202 UART: [afmc] CDI.KEYID = 6
2,828,565 UART: [afmc] SUBJECT.KEYID = 7
2,828,991 UART: [afmc] AUTHORITY.KEYID = 5
2,864,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,802 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,512 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,393 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,094 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,739 UART: [afmc] --
2,907,730 UART: [cold-reset] --
2,908,638 UART: [state] Locking Datavault
2,909,923 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,527 UART: [state] Locking ICCM
2,910,973 UART: [exit] Launching FMC @ 0x40000130
2,916,303 UART:
2,916,319 UART: Running Caliptra FMC ...
2,916,727 UART:
2,916,870 UART: [state] CFI Enabled
2,927,494 UART: [fht] FMC Alias Private Key: 7
3,046,896 UART: [art] Extend RT PCRs Done
3,047,324 UART: [art] Lock RT PCRs Done
3,048,618 UART: [art] Populate DV Done
3,056,925 UART: [fht] FMC Alias Private Key: 7
3,058,083 UART: [art] Derive CDI
3,058,363 UART: [art] Store in slot 0x4
3,144,192 UART: [art] Derive Key Pair
3,144,552 UART: [art] Store priv key in slot 0x5
3,157,324 UART: [art] Derive Key Pair - Done
3,172,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,944 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,709 UART: [art] PUB.X = 26E04B2389053E508C17DB3AC67246120B172EF651F73E18F1DEB8C53603309414F343113646CB07E4B20278417BC30B
3,195,451 UART: [art] PUB.Y = 04C1D2B458D6912F88396DC85CCB5132948DC28436CB7D519CC7ADD97326A19315F0CF23F434B899E23A99C804027C1D
3,202,392 UART: [art] SIG.R = C8E3DD6590E847D8AE08DC6987CC02EB94E8DE266EC9437C0B195F87A93B68FDD5BB0253F8D4913D36F8DA26848AC8A0
3,209,164 UART: [art] SIG.S = D7E1E6D5B8FCB4886C2CCDE53AAB89E8BB3551C8BDCDB2DE347C17981BBE2DDE71CDFE7AB7E856164BE8C58EDC9D316D
3,232,724 UART: Caliptra RT
3,233,067 UART: [state] CFI Enabled
3,353,645 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,366,254 >>> mbox cmd response: failed
3,366,254 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,658 UART: [rt]cmd =0x46505652, len=4
3,396,318 UART: [rt] FIPS Version
3,397,397 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,519 ready_for_fw is high
1,059,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,089 >>> mbox cmd response: success
2,678,089 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,740,842 UART:
2,740,858 UART: Running Caliptra FMC ...
2,741,266 UART:
2,741,409 UART: [state] CFI Enabled
2,751,999 UART: [fht] FMC Alias Private Key: 7
2,870,749 UART: [art] Extend RT PCRs Done
2,871,177 UART: [art] Lock RT PCRs Done
2,872,635 UART: [art] Populate DV Done
2,881,052 UART: [fht] FMC Alias Private Key: 7
2,882,222 UART: [art] Derive CDI
2,882,502 UART: [art] Store in slot 0x4
2,968,181 UART: [art] Derive Key Pair
2,968,541 UART: [art] Store priv key in slot 0x5
2,981,275 UART: [art] Derive Key Pair - Done
2,995,864 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,134 UART: [art] PUB.X = 680EE1FBD6A5ABBA73200498C721DBB2A1A104978A2CDDB7968992BC5DAD06B927FE811601E4543EB272DA644E031E93
3,018,896 UART: [art] PUB.Y = 329089C333F979168C378601AC3B91FDDEC6C1E291EB3CA694DE330FA976B58A7BDB29548179D1538D72F80B82A3B2CA
3,025,843 UART: [art] SIG.R = B3BEB4FBDB3C3022EA673A24159D32ACAD7EE1564D34731F7616BD028BC1329C173244CBEF3F7010DBAAB59B0C5A6EF1
3,032,627 UART: [art] SIG.S = 39B585A67879A7D49B1C5098A074FC0B2278BA7BB822465F99781B645E77DFFF397E7A6F75259433EB17594B3B362039
3,056,268 UART: Caliptra RT
3,056,611 UART: [state] CFI Enabled
3,177,612 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,190,193 >>> mbox cmd response: failed
3,190,193 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,637 UART: [rt]cmd =0x46505652, len=4
3,220,297 UART: [rt] FIPS Version
3,221,458 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
893,518 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,643 UART: [kat] ++
897,795 UART: [kat] sha1
902,005 UART: [kat] SHA2-256
903,945 UART: [kat] SHA2-384
906,808 UART: [kat] SHA2-512-ACC
908,709 UART: [kat] ECC-384
918,532 UART: [kat] HMAC-384Kdf
923,154 UART: [kat] LMS
1,171,482 UART: [kat] --
1,172,455 UART: [cold-reset] ++
1,172,919 UART: [fht] FHT @ 0x50003400
1,175,658 UART: [idev] ++
1,175,826 UART: [idev] CDI.KEYID = 6
1,176,186 UART: [idev] SUBJECT.KEYID = 7
1,176,610 UART: [idev] UDS.KEYID = 0
1,176,955 ready_for_fw is high
1,176,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,752 UART: [idev] Erasing UDS.KEYID = 0
1,201,353 UART: [idev] Sha1 KeyId Algorithm
1,209,789 UART: [idev] --
1,210,833 UART: [ldev] ++
1,211,001 UART: [ldev] CDI.KEYID = 6
1,211,364 UART: [ldev] SUBJECT.KEYID = 5
1,211,790 UART: [ldev] AUTHORITY.KEYID = 7
1,212,253 UART: [ldev] FE.KEYID = 1
1,217,675 UART: [ldev] Erasing FE.KEYID = 1
1,243,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,703 UART: [ldev] --
1,283,038 UART: [fwproc] Wait for Commands...
1,283,784 UART: [fwproc] Recv command 0x46574c44
1,284,512 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,872 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,042 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,221 >>> mbox cmd response: success
2,827,221 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,828,277 UART: [afmc] ++
2,828,445 UART: [afmc] CDI.KEYID = 6
2,828,807 UART: [afmc] SUBJECT.KEYID = 7
2,829,232 UART: [afmc] AUTHORITY.KEYID = 5
2,864,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,208 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,917 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,800 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,501 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,261 UART: [afmc] --
2,907,169 UART: [cold-reset] --
2,908,065 UART: [state] Locking Datavault
2,909,512 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,116 UART: [state] Locking ICCM
2,910,586 UART: [exit] Launching FMC @ 0x40000130
2,915,916 UART:
2,915,932 UART: Running Caliptra FMC ...
2,916,340 UART:
2,916,394 UART: [state] CFI Enabled
2,927,096 UART: [fht] FMC Alias Private Key: 7
3,046,284 UART: [art] Extend RT PCRs Done
3,046,712 UART: [art] Lock RT PCRs Done
3,048,118 UART: [art] Populate DV Done
3,056,305 UART: [fht] FMC Alias Private Key: 7
3,057,317 UART: [art] Derive CDI
3,057,597 UART: [art] Store in slot 0x4
3,143,228 UART: [art] Derive Key Pair
3,143,588 UART: [art] Store priv key in slot 0x5
3,157,346 UART: [art] Derive Key Pair - Done
3,172,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,343 UART: [art] PUB.X = 0D91E0BB7B11EA3D5F9295CCB2CBA320DA5EB7138E203B7BDCF863276566B87B762726C51271196282D257DE3B71FE77
3,195,116 UART: [art] PUB.Y = 9157B084D4336E0A9AE2141362BDF44E0C11871DE0B4267C12A84BAA9FC8C456C2DB568AF81BFD017B1173178B835E5B
3,202,063 UART: [art] SIG.R = 0BE7C344F2EDF33DE0B84AB64763E7E3A266ECCF089B5825EDC34653453435BEA1A912310266B57AE12EE6EB49DFBB1E
3,208,840 UART: [art] SIG.S = 6733557F1BF52571AD999BE095DC0DD0618A03FE3B31678D5E7B66861E4899AC71C49FBA1356F0B0DC3936982A8FF2B6
3,232,346 UART: Caliptra RT
3,232,597 UART: [state] CFI Enabled
3,351,565 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,364,128 >>> mbox cmd response: failed
3,364,128 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,714 UART: [rt]cmd =0x46505652, len=4
3,394,374 UART: [rt] FIPS Version
3,395,431 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,201 ready_for_fw is high
1,060,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,934 >>> mbox cmd response: success
2,681,934 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,744,373 UART:
2,744,389 UART: Running Caliptra FMC ...
2,744,797 UART:
2,744,851 UART: [state] CFI Enabled
2,755,823 UART: [fht] FMC Alias Private Key: 7
2,874,481 UART: [art] Extend RT PCRs Done
2,874,909 UART: [art] Lock RT PCRs Done
2,876,607 UART: [art] Populate DV Done
2,884,962 UART: [fht] FMC Alias Private Key: 7
2,885,978 UART: [art] Derive CDI
2,886,258 UART: [art] Store in slot 0x4
2,972,279 UART: [art] Derive Key Pair
2,972,639 UART: [art] Store priv key in slot 0x5
2,985,655 UART: [art] Derive Key Pair - Done
3,000,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,526 UART: [art] PUB.X = B3A1140F180F2855D31ACD0348006BE3D4AE860E07AAA9EE08E46956860EFD128D32BE0E23C14F3A3EACD36A373F4F07
3,023,259 UART: [art] PUB.Y = C86752702C5DC3E891556D5BCC26DEAE0666C8CEE490A9F45B362788B0AF8DB717A650D745594778E641643AD96F147D
3,030,208 UART: [art] SIG.R = 36952B7E04CC5AB171FD1C5C6627A2BD594DE0B2D3084EEEEE028AFE8EF773D9F608E8310DA091591EA24BFC881385B5
3,036,977 UART: [art] SIG.S = 96F195C18740ACE484D8A4FF0BDA5BDDDC42E464201DF3C4731CB3967A8B5829010B242C9F0E0ED89DB9C2ABBDF5DFD8
3,060,952 UART: Caliptra RT
3,061,203 UART: [state] CFI Enabled
3,180,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,193,579 >>> mbox cmd response: failed
3,193,579 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,011 UART: [rt]cmd =0x46505652, len=4
3,223,671 UART: [rt] FIPS Version
3,224,808 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
893,783 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,908 UART: [kat] ++
898,060 UART: [kat] sha1
902,266 UART: [kat] SHA2-256
904,206 UART: [kat] SHA2-384
906,891 UART: [kat] SHA2-512-ACC
908,792 UART: [kat] ECC-384
918,831 UART: [kat] HMAC-384Kdf
923,439 UART: [kat] LMS
1,171,767 UART: [kat] --
1,172,780 UART: [cold-reset] ++
1,173,166 UART: [fht] FHT @ 0x50003400
1,175,795 UART: [idev] ++
1,175,963 UART: [idev] CDI.KEYID = 6
1,176,323 UART: [idev] SUBJECT.KEYID = 7
1,176,747 UART: [idev] UDS.KEYID = 0
1,177,092 ready_for_fw is high
1,177,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,937 UART: [idev] Erasing UDS.KEYID = 0
1,202,208 UART: [idev] Sha1 KeyId Algorithm
1,210,672 UART: [idev] --
1,211,684 UART: [ldev] ++
1,211,852 UART: [ldev] CDI.KEYID = 6
1,212,215 UART: [ldev] SUBJECT.KEYID = 5
1,212,641 UART: [ldev] AUTHORITY.KEYID = 7
1,213,104 UART: [ldev] FE.KEYID = 1
1,218,700 UART: [ldev] Erasing FE.KEYID = 1
1,245,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,686 UART: [ldev] --
1,284,959 UART: [fwproc] Wait for Commands...
1,285,635 UART: [fwproc] Recv command 0x46574c44
1,286,363 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,975 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,145 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,292 >>> mbox cmd response: success
2,830,292 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,831,330 UART: [afmc] ++
2,831,498 UART: [afmc] CDI.KEYID = 6
2,831,860 UART: [afmc] SUBJECT.KEYID = 7
2,832,285 UART: [afmc] AUTHORITY.KEYID = 5
2,868,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,663 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,891,372 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,897,255 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,956 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,810 UART: [afmc] --
2,911,828 UART: [cold-reset] --
2,912,724 UART: [state] Locking Datavault
2,913,677 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,281 UART: [state] Locking ICCM
2,914,937 UART: [exit] Launching FMC @ 0x40000130
2,920,267 UART:
2,920,283 UART: Running Caliptra FMC ...
2,920,691 UART:
2,920,834 UART: [state] CFI Enabled
2,931,230 UART: [fht] FMC Alias Private Key: 7
3,050,104 UART: [art] Extend RT PCRs Done
3,050,532 UART: [art] Lock RT PCRs Done
3,051,936 UART: [art] Populate DV Done
3,060,027 UART: [fht] FMC Alias Private Key: 7
3,061,205 UART: [art] Derive CDI
3,061,485 UART: [art] Store in slot 0x4
3,147,752 UART: [art] Derive Key Pair
3,148,112 UART: [art] Store priv key in slot 0x5
3,161,452 UART: [art] Derive Key Pair - Done
3,176,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,614 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,379 UART: [art] PUB.X = 908FD2386F40C2C1FCC6FAA5F3EC149538D2BBDB2BCC266D7F0384266E182ED2CA1EDD0F0D4B2DBA683558C34AE0BF54
3,199,164 UART: [art] PUB.Y = B2CA337C8D88D685B4F1C0FC3E2C5FE67715CFA23FAD9F8D2940A09589BEAC8CD1B64DA541C28BAC5B693DD650005B39
3,206,112 UART: [art] SIG.R = B626E3AEEB49A6D257950050E59BF4734504C80907F5212B7B7D859FF284D02EB3D5F508CDCDF4D89C5C56382E5A927F
3,212,854 UART: [art] SIG.S = 4F8853B6B731360BAD17A7164DF65B1F92E7EAEC2586C259E5300C1009F8B9B74D4C375CC32CAFA625E40A9238D5DF3B
3,237,008 UART: Caliptra RT
3,237,351 UART: [state] CFI Enabled
3,356,128 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,368,881 >>> mbox cmd response: failed
3,368,881 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,367 UART: [rt]cmd =0x46505652, len=4
3,399,027 UART: [rt] FIPS Version
3,400,068 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,102 ready_for_fw is high
1,061,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,319 >>> mbox cmd response: success
2,679,319 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,740,694 UART:
2,740,710 UART: Running Caliptra FMC ...
2,741,118 UART:
2,741,261 UART: [state] CFI Enabled
2,751,979 UART: [fht] FMC Alias Private Key: 7
2,870,855 UART: [art] Extend RT PCRs Done
2,871,283 UART: [art] Lock RT PCRs Done
2,872,709 UART: [art] Populate DV Done
2,880,928 UART: [fht] FMC Alias Private Key: 7
2,881,972 UART: [art] Derive CDI
2,882,252 UART: [art] Store in slot 0x4
2,968,125 UART: [art] Derive Key Pair
2,968,485 UART: [art] Store priv key in slot 0x5
2,981,513 UART: [art] Derive Key Pair - Done
2,996,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,973 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,738 UART: [art] PUB.X = B0748A99B02E88631C01D5AEEE05E68406516BFE9BFD0D9C15B1A72114F8A93018147923B1323264967916EAF2E86624
3,019,490 UART: [art] PUB.Y = 0498A53DC8118BA414C31E4F6E82B580397F02A217DF87445524AB3E8C93E8446D7B6D3A4CDA10DD41FD504035F741D1
3,026,436 UART: [art] SIG.R = 4AD7CCE890D804AF2918D6B2BE8287A231FF139B75523CAAB2CC82E40C81D515DD50FDBF23A6EA342637C13320DBC3D5
3,033,216 UART: [art] SIG.S = 4B9EF44E851FADCF21B64909358ACDE905021C7C486DC698071EDD9F93A29D8EEA9C8EA008D93AF4D52BA32110AF1BCA
3,057,063 UART: Caliptra RT
3,057,406 UART: [state] CFI Enabled
3,176,920 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,189,663 >>> mbox cmd response: failed
3,189,663 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,991 UART: [rt]cmd =0x46505652, len=4
3,219,651 UART: [rt] FIPS Version
3,220,742 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,024 UART:
192,397 UART: Running Caliptra ROM ...
193,590 UART:
193,742 UART: [state] CFI Enabled
260,440 UART: [state] LifecycleState = Unprovisioned
262,357 UART: [state] DebugLocked = No
264,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,781 UART: [kat] SHA2-256
438,475 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,955 UART: [kat] ++
449,603 UART: [kat] sha1
461,517 UART: [kat] SHA2-256
464,212 UART: [kat] SHA2-384
470,928 UART: [kat] SHA2-512-ACC
473,319 UART: [kat] ECC-384
2,768,016 UART: [kat] HMAC-384Kdf
2,798,818 UART: [kat] LMS
3,989,143 UART: [kat] --
3,992,996 UART: [cold-reset] ++
3,994,999 UART: [fht] Storing FHT @ 0x50003400
4,006,052 UART: [idev] ++
4,006,621 UART: [idev] CDI.KEYID = 6
4,007,666 UART: [idev] SUBJECT.KEYID = 7
4,008,775 UART: [idev] UDS.KEYID = 0
4,009,769 ready_for_fw is high
4,009,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,029 UART: [idev] Erasing UDS.KEYID = 0
7,348,119 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,956 UART: [idev] --
7,374,554 UART: [ldev] ++
7,375,204 UART: [ldev] CDI.KEYID = 6
7,376,132 UART: [ldev] SUBJECT.KEYID = 5
7,377,293 UART: [ldev] AUTHORITY.KEYID = 7
7,378,582 UART: [ldev] FE.KEYID = 1
7,421,435 UART: [ldev] Erasing FE.KEYID = 1
10,756,440 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,501 UART: [ldev] --
13,137,065 UART: [fwproc] Waiting for Commands...
13,140,027 UART: [fwproc] Received command 0x46574c44
13,142,268 UART: [fwproc] Received Image of size 118548 bytes
17,242,799 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,320,483 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,393,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,721,714 >>> mbox cmd response: success
17,722,868 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,725,093 UART: [afmc] ++
17,725,681 UART: [afmc] CDI.KEYID = 6
17,726,626 UART: [afmc] SUBJECT.KEYID = 7
17,727,836 UART: [afmc] AUTHORITY.KEYID = 5
21,093,830 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,396,383 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,398,647 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,413,092 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,427,836 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,442,218 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,462,851 UART: [afmc] --
23,467,037 UART: [cold-reset] --
23,470,575 UART: [state] Locking Datavault
23,474,396 UART: [state] Locking PCR0, PCR1 and PCR31
23,476,151 UART: [state] Locking ICCM
23,478,841 UART: [exit] Launching FMC @ 0x40000130
23,487,241 UART:
23,487,473 UART: Running Caliptra FMC ...
23,488,522 UART:
23,488,678 UART: [state] CFI Enabled
23,553,972 UART: [fht] FMC Alias Private Key: 7
25,894,974 UART: [art] Extend RT PCRs Done
25,896,191 UART: [art] Lock RT PCRs Done
25,897,707 UART: [art] Populate DV Done
25,903,183 UART: [fht] FMC Alias Private Key: 7
25,904,676 UART: [art] Derive CDI
25,905,442 UART: [art] Store in slot 0x4
25,962,076 UART: [art] Derive Key Pair
25,963,072 UART: [art] Store priv key in slot 0x5
29,255,724 UART: [art] Derive Key Pair - Done
29,268,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,069 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,575 UART: [art] PUB.X = 2376DE2895D6D2BF29ABD008A09F826675242A651048436237563A46FE08B77284A41D2D502310549C38C07C99F06648
31,565,849 UART: [art] PUB.Y = B38914B0A9CE2EA9C96F1542FFB5511FDD81B0AF8ED8B9C45260FEAF7E275E6BCEA20A1BD045F41E68CB06BC4455633F
31,573,099 UART: [art] SIG.R = B31290BA24A7772FFF0AE3F32666CA83FECB9C775127BA3222452F91C7B0C1BF75DC8B7AF5E05082F283DD586BFC96A2
31,580,558 UART: [art] SIG.S = 0A731E7F43F00E56AF7DEEFD309A80788CB08C4E370B6FBD1423D62DB2638A2C7EC6EA3962B498B5A7DBB15B8C5CD9CE
32,885,641 UART: Caliptra RT
32,886,366 UART: [state] CFI Enabled
33,063,478 UART: [rt] RT listening for mailbox commands...
33,066,209 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,803,523 ready_for_fw is high
3,804,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,029 >>> mbox cmd response: success
17,959,283 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,650,860 UART:
23,651,255 UART: Running Caliptra FMC ...
23,652,562 UART:
23,652,724 UART: [state] CFI Enabled
23,719,666 UART: [fht] FMC Alias Private Key: 7
26,060,189 UART: [art] Extend RT PCRs Done
26,061,417 UART: [art] Lock RT PCRs Done
26,063,215 UART: [art] Populate DV Done
26,068,634 UART: [fht] FMC Alias Private Key: 7
26,070,171 UART: [art] Derive CDI
26,070,986 UART: [art] Store in slot 0x4
26,127,582 UART: [art] Derive Key Pair
26,128,602 UART: [art] Store priv key in slot 0x5
29,420,838 UART: [art] Derive Key Pair - Done
29,433,319 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,131 UART: [art] Erasing AUTHORITY.KEYID = 7
31,723,657 UART: [art] PUB.X = E1A719023F22FEF7C4C4ADAA8CF53B7DCEDE5DCBE63F7EDF1A6EA41A4CC39D20C271F44873552C950CF09C83B9F76AAE
31,730,968 UART: [art] PUB.Y = C519C98166B5785B14ECE3DE39BD642847B61A1A4FB28E9B1F7EDE0B24DED37E5A8ADF71737CE548091547B5E18D5EF4
31,738,217 UART: [art] SIG.R = CC99EE2AB49A7250282AB4AA949FF607E06E3C6D39847FF13E6B637925A16C1112E1A3333D46FD63DDF8EA3A00470C33
31,745,617 UART: [art] SIG.S = 7DE6E1A9A18687B144EB8C89ECC8A15EE9047668A057B2F5089A8E42F3E7BEA3DCD9D78DFA94F99E5CAC847B8AB9C17F
33,050,357 UART: Caliptra RT
33,051,074 UART: [state] CFI Enabled
33,226,377 UART: [rt] RT listening for mailbox commands...
33,228,786 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,399 UART:
192,769 UART: Running Caliptra ROM ...
194,127 UART:
603,396 UART: [state] CFI Enabled
616,578 UART: [state] LifecycleState = Unprovisioned
618,446 UART: [state] DebugLocked = No
620,326 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,891 UART: [kat] SHA2-256
794,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,155 UART: [kat] ++
805,783 UART: [kat] sha1
817,935 UART: [kat] SHA2-256
820,650 UART: [kat] SHA2-384
826,486 UART: [kat] SHA2-512-ACC
828,855 UART: [kat] ECC-384
3,114,898 UART: [kat] HMAC-384Kdf
3,125,623 UART: [kat] LMS
4,315,756 UART: [kat] --
4,319,607 UART: [cold-reset] ++
4,321,529 UART: [fht] Storing FHT @ 0x50003400
4,332,640 UART: [idev] ++
4,333,273 UART: [idev] CDI.KEYID = 6
4,334,152 UART: [idev] SUBJECT.KEYID = 7
4,335,384 UART: [idev] UDS.KEYID = 0
4,336,486 ready_for_fw is high
4,336,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,543 UART: [idev] Erasing UDS.KEYID = 0
7,625,651 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,381 UART: [idev] --
7,650,331 UART: [ldev] ++
7,650,903 UART: [ldev] CDI.KEYID = 6
7,651,832 UART: [ldev] SUBJECT.KEYID = 5
7,653,090 UART: [ldev] AUTHORITY.KEYID = 7
7,654,320 UART: [ldev] FE.KEYID = 1
7,664,824 UART: [ldev] Erasing FE.KEYID = 1
10,950,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,940 UART: [ldev] --
13,310,365 UART: [fwproc] Waiting for Commands...
13,312,849 UART: [fwproc] Received command 0x46574c44
13,315,083 UART: [fwproc] Received Image of size 118548 bytes
17,419,554 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,856 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,050 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,896,105 >>> mbox cmd response: success
17,897,251 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,900,263 UART: [afmc] ++
17,900,850 UART: [afmc] CDI.KEYID = 6
17,901,731 UART: [afmc] SUBJECT.KEYID = 7
17,903,047 UART: [afmc] AUTHORITY.KEYID = 5
21,221,621 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,252 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,559 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,946 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,693 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,170 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,677 UART: [afmc] --
23,585,732 UART: [cold-reset] --
23,590,506 UART: [state] Locking Datavault
23,595,633 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,374 UART: [state] Locking ICCM
23,598,505 UART: [exit] Launching FMC @ 0x40000130
23,606,890 UART:
23,607,117 UART: Running Caliptra FMC ...
23,608,213 UART:
23,608,366 UART: [state] CFI Enabled
23,616,403 UART: [fht] FMC Alias Private Key: 7
25,956,536 UART: [art] Extend RT PCRs Done
25,957,754 UART: [art] Lock RT PCRs Done
25,959,213 UART: [art] Populate DV Done
25,964,685 UART: [fht] FMC Alias Private Key: 7
25,966,295 UART: [art] Derive CDI
25,967,105 UART: [art] Store in slot 0x4
26,009,853 UART: [art] Derive Key Pair
26,010,854 UART: [art] Store priv key in slot 0x5
29,252,889 UART: [art] Derive Key Pair - Done
29,265,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,967 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,479 UART: [art] PUB.X = 7CE2FC04B7303BFBFFB26AF07239537C28C7A89B3B74BB5B32AF17B2F6FB891948355F3E60D30B4115FB1907D2F928A9
31,554,766 UART: [art] PUB.Y = 5CD6C85A3CA20619A5A0E318C45E6CD845DDE6A8433C316C221E4B5B1F37A8DEDFD0054DA2CA3CD047FE65E808EBD806
31,562,016 UART: [art] SIG.R = AFD2456602DE550DCE07C20FCBC793D33A391B15437B0211C71D39BB73D3A6A7D3C23EACC75194313AA2C1EA51966A6E
31,569,409 UART: [art] SIG.S = 1A5CE32EFED10BCAEEAC823D037761E0303A30A8F692C9C4B9CA09EB095B886832519E2EB464839BA8BDDF976475D67B
32,874,918 UART: Caliptra RT
32,875,638 UART: [state] CFI Enabled
33,009,408 UART: [rt] RT listening for mailbox commands...
33,012,030 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
4,132,100 ready_for_fw is high
4,132,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,925 >>> mbox cmd response: success
18,163,242 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,804,186 UART:
23,804,618 UART: Running Caliptra FMC ...
23,805,755 UART:
23,805,936 UART: [state] CFI Enabled
23,813,737 UART: [fht] FMC Alias Private Key: 7
26,154,224 UART: [art] Extend RT PCRs Done
26,155,470 UART: [art] Lock RT PCRs Done
26,157,160 UART: [art] Populate DV Done
26,162,535 UART: [fht] FMC Alias Private Key: 7
26,164,182 UART: [art] Derive CDI
26,164,992 UART: [art] Store in slot 0x4
26,207,592 UART: [art] Derive Key Pair
26,208,637 UART: [art] Store priv key in slot 0x5
29,450,947 UART: [art] Derive Key Pair - Done
29,464,206 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,330 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,846 UART: [art] PUB.X = 16746EF6DA722D153F3CA944A22CB08237ECBD5E8E8E913C5B1E7C555DE15C3BA5ABAC6F4C67ADA2A16A3D5012424115
31,753,098 UART: [art] PUB.Y = 8DE7458B6561F72523A8A811AB82E1B5B15082D743FA5E639E56067F66A09E9ACD6B3DB152B5C83E9CA88718980E7F53
31,760,349 UART: [art] SIG.R = B8D335F179D7535D347AF0699A337A70FC7C1E80AAD480AF52D24E7A0D3B9433925FF2D456A6354D527F58790D3AAEAA
31,767,752 UART: [art] SIG.S = EF95A4B2EE80E88248D3489735C33115B885F4898BD26357A345ADA367A93D6FA8B756762E97693D011EA03E87FF7EF6
33,072,650 UART: Caliptra RT
33,073,376 UART: [state] CFI Enabled
33,207,020 UART: [rt] RT listening for mailbox commands...
33,209,696 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,126 UART:
192,486 UART: Running Caliptra ROM ...
193,610 UART:
193,757 UART: [state] CFI Enabled
266,549 UART: [state] LifecycleState = Unprovisioned
268,470 UART: [state] DebugLocked = No
270,783 UART: [state] WD Timer not started. Device not locked for debugging
275,457 UART: [kat] SHA2-256
455,072 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,890 UART: [kat] ++
466,354 UART: [kat] sha1
478,009 UART: [kat] SHA2-256
480,668 UART: [kat] SHA2-384
486,011 UART: [kat] SHA2-512-ACC
488,374 UART: [kat] ECC-384
2,952,450 UART: [kat] HMAC-384Kdf
2,972,358 UART: [kat] LMS
3,448,834 UART: [kat] --
3,453,463 UART: [cold-reset] ++
3,454,680 UART: [fht] FHT @ 0x50003400
3,467,514 UART: [idev] ++
3,468,111 UART: [idev] CDI.KEYID = 6
3,469,062 UART: [idev] SUBJECT.KEYID = 7
3,470,308 UART: [idev] UDS.KEYID = 0
3,471,199 ready_for_fw is high
3,471,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,821 UART: [idev] Erasing UDS.KEYID = 0
5,988,446 UART: [idev] Sha1 KeyId Algorithm
6,011,568 UART: [idev] --
6,016,213 UART: [ldev] ++
6,016,990 UART: [ldev] CDI.KEYID = 6
6,017,884 UART: [ldev] SUBJECT.KEYID = 5
6,018,929 UART: [ldev] AUTHORITY.KEYID = 7
6,020,161 UART: [ldev] FE.KEYID = 1
6,059,734 UART: [ldev] Erasing FE.KEYID = 1
8,564,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,306 UART: [ldev] --
10,374,265 UART: [fwproc] Wait for Commands...
10,377,184 UART: [fwproc] Recv command 0x46574c44
10,379,217 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,264 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,270 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,576 >>> mbox cmd response: success
14,350,583 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,353,688 UART: [afmc] ++
14,354,275 UART: [afmc] CDI.KEYID = 6
14,355,217 UART: [afmc] SUBJECT.KEYID = 7
14,356,374 UART: [afmc] AUTHORITY.KEYID = 5
16,897,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,956 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,817 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,861 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,432 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,714,370 UART: [afmc] --
18,718,548 UART: [cold-reset] --
18,723,437 UART: [state] Locking Datavault
18,729,435 UART: [state] Locking PCR0, PCR1 and PCR31
18,731,177 UART: [state] Locking ICCM
18,733,893 UART: [exit] Launching FMC @ 0x40000130
18,742,291 UART:
18,742,570 UART: Running Caliptra FMC ...
18,743,600 UART:
18,743,747 UART: [state] CFI Enabled
18,797,048 UART: [fht] FMC Alias Private Key: 7
20,563,619 UART: [art] Extend RT PCRs Done
20,564,835 UART: [art] Lock RT PCRs Done
20,566,593 UART: [art] Populate DV Done
20,572,114 UART: [fht] FMC Alias Private Key: 7
20,573,665 UART: [art] Derive CDI
20,574,398 UART: [art] Store in slot 0x4
20,629,199 UART: [art] Derive Key Pair
20,630,246 UART: [art] Store priv key in slot 0x5
23,093,066 UART: [art] Derive Key Pair - Done
23,106,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,168 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,674 UART: [art] PUB.X = 05387B76DD21C0DAA4B9A61A3FDD246256EDA572D1880444BC0D138CD6B4C7DE11C25ADA27FF4F6CABAD6804E3A23139
24,826,978 UART: [art] PUB.Y = 21FACC13788D7E180592052CCE698C770115D6E94773BD64B915C6D2F6765727EBABF54FF1BAE15BFC04658521B2F148
24,834,267 UART: [art] SIG.R = 19155B6513FEF12EFC3B61E2B2BB66A0E3FC2CC16750313812995817FE383094074C1107349BD1902F2797008FBF56EB
24,841,609 UART: [art] SIG.S = B2798C9F9835B511E1A2204C56BED82702A8F37F067A058A13C771844A21539FC059C1924744F09FC6872B4FE4C9D7CC
25,820,229 UART: Caliptra RT
25,820,915 UART: [state] CFI Enabled
26,000,580 UART: [rt] RT listening for mailbox commands...
26,002,926 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,458,351 ready_for_fw is high
3,458,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,931 >>> mbox cmd response: success
14,250,168 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,532,539 UART:
18,532,921 UART: Running Caliptra FMC ...
18,534,125 UART:
18,534,286 UART: [state] CFI Enabled
18,602,773 UART: [fht] FMC Alias Private Key: 7
20,369,264 UART: [art] Extend RT PCRs Done
20,370,502 UART: [art] Lock RT PCRs Done
20,372,454 UART: [art] Populate DV Done
20,378,035 UART: [fht] FMC Alias Private Key: 7
20,379,738 UART: [art] Derive CDI
20,380,552 UART: [art] Store in slot 0x4
20,435,404 UART: [art] Derive Key Pair
20,436,410 UART: [art] Store priv key in slot 0x5
22,899,137 UART: [art] Derive Key Pair - Done
22,912,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,579 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,081 UART: [art] PUB.X = B49F97A8FDE44C30357FC552553FCD057E235502117B54C60F828A6476EA49632AABBDEFBD4337DCC6EE265070C03565
24,634,336 UART: [art] PUB.Y = 9D91EF36A3E356F519D9AA1BBBB819642A6A3FE03181CCAF684FAC356C876DCE3B75A6B85C2402A19A4F46B56FBD7C69
24,641,649 UART: [art] SIG.R = C3F83C3D230F322151DDD8B886A372B803B9A35AF495A9EE0AAE8184003222A3D4C8F8C4E8AC2E52455E4B5ED6EBB65A
24,649,044 UART: [art] SIG.S = 47F5D8322323F49A841E6C71C4D6A769CAD47C2D8E23A65C5029A778EF99C894A5480E06ECF466158026474A2F7744FA
25,627,761 UART: Caliptra RT
25,628,464 UART: [state] CFI Enabled
25,809,625 UART: [rt] RT listening for mailbox commands...
25,811,973 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,573 UART:
192,938 UART: Running Caliptra ROM ...
194,077 UART:
603,668 UART: [state] CFI Enabled
619,728 UART: [state] LifecycleState = Unprovisioned
621,634 UART: [state] DebugLocked = No
623,791 UART: [state] WD Timer not started. Device not locked for debugging
627,052 UART: [kat] SHA2-256
806,708 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,447 UART: [kat] ++
817,893 UART: [kat] sha1
827,842 UART: [kat] SHA2-256
830,495 UART: [kat] SHA2-384
837,762 UART: [kat] SHA2-512-ACC
840,138 UART: [kat] ECC-384
3,281,764 UART: [kat] HMAC-384Kdf
3,294,357 UART: [kat] LMS
3,770,818 UART: [kat] --
3,778,148 UART: [cold-reset] ++
3,780,362 UART: [fht] FHT @ 0x50003400
3,790,913 UART: [idev] ++
3,791,479 UART: [idev] CDI.KEYID = 6
3,792,513 UART: [idev] SUBJECT.KEYID = 7
3,793,685 UART: [idev] UDS.KEYID = 0
3,794,615 ready_for_fw is high
3,794,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,145 UART: [idev] Erasing UDS.KEYID = 0
6,269,704 UART: [idev] Sha1 KeyId Algorithm
6,292,457 UART: [idev] --
6,298,162 UART: [ldev] ++
6,298,743 UART: [ldev] CDI.KEYID = 6
6,299,898 UART: [ldev] SUBJECT.KEYID = 5
6,301,043 UART: [ldev] AUTHORITY.KEYID = 7
6,302,261 UART: [ldev] FE.KEYID = 1
6,315,452 UART: [ldev] Erasing FE.KEYID = 1
8,793,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,232 UART: [ldev] --
10,585,762 UART: [fwproc] Wait for Commands...
10,588,999 UART: [fwproc] Recv command 0x46574c44
10,591,037 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,138 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,153 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,771 >>> mbox cmd response: success
14,560,866 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,563,878 UART: [afmc] ++
14,564,473 UART: [afmc] CDI.KEYID = 6
14,565,553 UART: [afmc] SUBJECT.KEYID = 7
14,566,659 UART: [afmc] AUTHORITY.KEYID = 5
17,066,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,752 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,567 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,662 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,191 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,237 UART: [afmc] --
18,866,595 UART: [cold-reset] --
18,871,427 UART: [state] Locking Datavault
18,879,533 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,300 UART: [state] Locking ICCM
18,883,105 UART: [exit] Launching FMC @ 0x40000130
18,891,501 UART:
18,891,768 UART: Running Caliptra FMC ...
18,892,871 UART:
18,893,037 UART: [state] CFI Enabled
18,901,094 UART: [fht] FMC Alias Private Key: 7
20,667,805 UART: [art] Extend RT PCRs Done
20,669,027 UART: [art] Lock RT PCRs Done
20,670,662 UART: [art] Populate DV Done
20,675,934 UART: [fht] FMC Alias Private Key: 7
20,677,540 UART: [art] Derive CDI
20,678,359 UART: [art] Store in slot 0x4
20,720,962 UART: [art] Derive Key Pair
20,722,005 UART: [art] Store priv key in slot 0x5
23,148,869 UART: [art] Derive Key Pair - Done
23,161,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,868,277 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,781 UART: [art] PUB.X = D46E887582E6252D1AC3575CF8D4BD154C636991197498E8550B98241BB5DAF3B8FD58DADCDB3ACA3AD61D13343812FB
24,877,022 UART: [art] PUB.Y = 682ADCDB335507844D4319AA60478EEF303C15A5A18C0B996C576D130322D0754C031FFE274BB0FDADC7BF8609CEA398
24,884,306 UART: [art] SIG.R = F6059CC1902A7DFC71F3E1D7F17B02050F54457730D9FFA351EBD8D621F7E987BBD82096AD932A1B96330D7FC406C27E
24,891,703 UART: [art] SIG.S = 269B811906DE3C5705384D474A0B8CE1FB1FEA9779F77398309B8D4A70B0E4276EE440EA4ED1E8B9005D7F1C49B09241
25,870,438 UART: Caliptra RT
25,871,130 UART: [state] CFI Enabled
26,003,969 UART: [rt] RT listening for mailbox commands...
26,006,533 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,779,396 ready_for_fw is high
3,779,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,152 >>> mbox cmd response: success
14,445,661 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,696,873 UART:
18,697,261 UART: Running Caliptra FMC ...
18,698,461 UART:
18,698,629 UART: [state] CFI Enabled
18,706,791 UART: [fht] FMC Alias Private Key: 7
20,473,222 UART: [art] Extend RT PCRs Done
20,474,959 UART: [art] Lock RT PCRs Done
20,475,978 UART: [art] Populate DV Done
20,481,384 UART: [fht] FMC Alias Private Key: 7
20,482,900 UART: [art] Derive CDI
20,483,680 UART: [art] Store in slot 0x4
20,526,120 UART: [art] Derive Key Pair
20,527,335 UART: [art] Store priv key in slot 0x5
22,954,322 UART: [art] Derive Key Pair - Done
22,967,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,609 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,117 UART: [art] PUB.X = 4D6C06CB3B893ED50C25CC2E3EF2379A689BA73BA901F9343A5F3F56A26ED95827DA68AEF66FCA7BBB986F16080B2EC2
24,682,441 UART: [art] PUB.Y = 3385E6CEE54FDDEEC4ECEEF399A370AD9DB4592AC443557F61D45152122BE1963F51E6B103CFD0E580D527F2BF20DE4B
24,689,710 UART: [art] SIG.R = 0690F13895B38F2996E62B66BE58BC3088FAD91C961BC1310DA94812716F0FD0CEEC74961439DAB064A291AB9BBAACD8
24,697,072 UART: [art] SIG.S = 5D8D6F75EB1E49234F5E22B8AB0948816EAA79DAAB30129F8AF7C6DCD47F470D8B1FC66AF19EF9029F68D1FC853BB902
25,675,785 UART: Caliptra RT
25,676,502 UART: [state] CFI Enabled
25,808,921 UART: [rt] RT listening for mailbox commands...
25,811,437 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,751 writing to cptra_bootfsm_go
192,885 UART:
193,233 UART: Running Caliptra ROM ...
194,404 UART:
194,566 UART: [state] CFI Enabled
263,793 UART: [state] LifecycleState = Unprovisioned
266,211 UART: [state] DebugLocked = No
268,532 UART: [state] WD Timer not started. Device not locked for debugging
273,132 UART: [kat] SHA2-256
462,976 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,784 UART: [kat] ++
474,262 UART: [kat] sha1
485,586 UART: [kat] SHA2-256
488,643 UART: [kat] SHA2-384
494,213 UART: [kat] SHA2-512-ACC
496,792 UART: [kat] ECC-384
2,949,669 UART: [kat] HMAC-384Kdf
2,971,872 UART: [kat] LMS
3,503,645 UART: [kat] --
3,507,638 UART: [cold-reset] ++
3,508,780 UART: [fht] FHT @ 0x50003400
3,520,171 UART: [idev] ++
3,520,870 UART: [idev] CDI.KEYID = 6
3,521,895 UART: [idev] SUBJECT.KEYID = 7
3,523,193 UART: [idev] UDS.KEYID = 0
3,524,125 ready_for_fw is high
3,524,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,215 UART: [idev] Erasing UDS.KEYID = 0
6,027,539 UART: [idev] Sha1 KeyId Algorithm
6,050,454 UART: [idev] --
6,055,853 UART: [ldev] ++
6,056,532 UART: [ldev] CDI.KEYID = 6
6,057,467 UART: [ldev] SUBJECT.KEYID = 5
6,058,630 UART: [ldev] AUTHORITY.KEYID = 7
6,059,858 UART: [ldev] FE.KEYID = 1
6,100,430 UART: [ldev] Erasing FE.KEYID = 1
8,608,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,116 UART: [ldev] --
10,413,078 UART: [fwproc] Wait for Commands...
10,414,913 UART: [fwproc] Recv command 0x46574c44
10,417,171 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,317 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,934 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,609 >>> mbox cmd response: success
14,677,739 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,681,067 UART: [afmc] ++
14,681,776 UART: [afmc] CDI.KEYID = 6
14,682,964 UART: [afmc] SUBJECT.KEYID = 7
14,684,445 UART: [afmc] AUTHORITY.KEYID = 5
17,214,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,680 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,790 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,927 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,822 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,069 UART: [afmc] --
19,011,980 UART: [cold-reset] --
19,015,360 UART: [state] Locking Datavault
19,021,524 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,734 UART: [state] Locking ICCM
19,025,672 UART: [exit] Launching FMC @ 0x40000130
19,034,339 UART:
19,034,574 UART: Running Caliptra FMC ...
19,035,674 UART:
19,035,837 UART: [state] CFI Enabled
19,094,115 UART: [fht] FMC Alias Private Key: 7
20,860,740 UART: [art] Extend RT PCRs Done
20,861,965 UART: [art] Lock RT PCRs Done
20,863,543 UART: [art] Populate DV Done
20,868,839 UART: [fht] FMC Alias Private Key: 7
20,870,490 UART: [art] Derive CDI
20,871,304 UART: [art] Store in slot 0x4
20,926,652 UART: [art] Derive Key Pair
20,927,691 UART: [art] Store priv key in slot 0x5
23,390,379 UART: [art] Derive Key Pair - Done
23,403,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,313 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,821 UART: [art] PUB.X = 62C54C4FDB8911F10D648F9799AA2E82D68C9E5B08550484FE553B9B0F1DAC64F79539DFD360853E03AFAE1C28706301
25,125,109 UART: [art] PUB.Y = 7B57F0E1BA30D9EF3B0FBAEFBB8DA16035D91A1144E7E1BAA23DAC4D74111F6B8D7F5C1BD7D2D5F565E92525D3BA1CB6
25,132,325 UART: [art] SIG.R = ADF59E5591C4B76A564B4E0C2239875F912ACF565DE68A02B57DFC206F278A23756335D4C7D07C88DB31971D7A6CD605
25,139,749 UART: [art] SIG.S = 33B28530D2DC0A4D37373690FBC97CD23A328CC964D1853E2020AA86C4560A7CE36F4D2001D7287E74CD4C66DE7ED881
26,119,097 UART: Caliptra RT
26,119,792 UART: [state] CFI Enabled
26,300,314 UART: [rt] RT listening for mailbox commands...
26,302,827 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,442,780 ready_for_fw is high
3,443,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,848,422 >>> mbox cmd response: success
14,849,502 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,135,637 UART:
19,136,018 UART: Running Caliptra FMC ...
19,137,126 UART:
19,137,282 UART: [state] CFI Enabled
19,200,098 UART: [fht] FMC Alias Private Key: 7
20,967,027 UART: [art] Extend RT PCRs Done
20,968,262 UART: [art] Lock RT PCRs Done
20,969,664 UART: [art] Populate DV Done
20,974,931 UART: [fht] FMC Alias Private Key: 7
20,976,456 UART: [art] Derive CDI
20,977,195 UART: [art] Store in slot 0x4
21,032,375 UART: [art] Derive Key Pair
21,033,377 UART: [art] Store priv key in slot 0x5
23,496,454 UART: [art] Derive Key Pair - Done
23,509,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,598 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,108 UART: [art] PUB.X = AE49640318FDCC45EDAD41822D1E09150028D7829E7821F1E35680E12C56433A76D78AC288FCD602F6C48DC8F1D5C046
25,231,360 UART: [art] PUB.Y = 5FFD63835AA1114C7D80438598C2A5628BFB458F1538EDC6C5E893670A34D3B5247E8FBC6CB95D694B73E24C7211AA52
25,238,610 UART: [art] SIG.R = 8BFE869461021130A48DC09A2EBC2C8B72AFA2EB929E67910DEF9A2CFFEA4D751D775FD745FDC6E50295D20FF09B64EF
25,246,020 UART: [art] SIG.S = 7A1B8891479DF20B732F432C9625C517C3D147412946BD33A08A988F4E57831762069880268ABC07E2F6A303E97D210C
26,224,773 UART: Caliptra RT
26,225,474 UART: [state] CFI Enabled
26,405,489 UART: [rt] RT listening for mailbox commands...
26,408,127 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,609 UART:
192,973 UART: Running Caliptra ROM ...
194,157 UART:
603,895 UART: [state] CFI Enabled
619,068 UART: [state] LifecycleState = Unprovisioned
621,474 UART: [state] DebugLocked = No
623,213 UART: [state] WD Timer not started. Device not locked for debugging
627,898 UART: [kat] SHA2-256
817,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,555 UART: [kat] ++
829,080 UART: [kat] sha1
841,447 UART: [kat] SHA2-256
844,461 UART: [kat] SHA2-384
850,883 UART: [kat] SHA2-512-ACC
853,467 UART: [kat] ECC-384
3,292,783 UART: [kat] HMAC-384Kdf
3,305,823 UART: [kat] LMS
3,837,669 UART: [kat] --
3,842,836 UART: [cold-reset] ++
3,844,279 UART: [fht] FHT @ 0x50003400
3,856,114 UART: [idev] ++
3,856,782 UART: [idev] CDI.KEYID = 6
3,857,822 UART: [idev] SUBJECT.KEYID = 7
3,858,931 UART: [idev] UDS.KEYID = 0
3,859,870 ready_for_fw is high
3,860,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,890 UART: [idev] Erasing UDS.KEYID = 0
6,331,195 UART: [idev] Sha1 KeyId Algorithm
6,353,561 UART: [idev] --
6,359,282 UART: [ldev] ++
6,359,960 UART: [ldev] CDI.KEYID = 6
6,360,901 UART: [ldev] SUBJECT.KEYID = 5
6,362,060 UART: [ldev] AUTHORITY.KEYID = 7
6,363,303 UART: [ldev] FE.KEYID = 1
6,374,840 UART: [ldev] Erasing FE.KEYID = 1
8,858,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,336 UART: [ldev] --
10,649,181 UART: [fwproc] Wait for Commands...
10,650,636 UART: [fwproc] Recv command 0x46574c44
10,652,575 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,946 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,571 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,010 >>> mbox cmd response: success
14,911,038 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,914,202 UART: [afmc] ++
14,914,901 UART: [afmc] CDI.KEYID = 6
14,916,088 UART: [afmc] SUBJECT.KEYID = 7
14,917,589 UART: [afmc] AUTHORITY.KEYID = 5
17,421,902 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,962 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,052 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,177,189 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,102 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,923 UART: [afmc] --
19,219,534 UART: [cold-reset] --
19,224,807 UART: [state] Locking Datavault
19,230,226 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,378 UART: [state] Locking ICCM
19,233,997 UART: [exit] Launching FMC @ 0x40000130
19,242,676 UART:
19,242,914 UART: Running Caliptra FMC ...
19,244,020 UART:
19,244,185 UART: [state] CFI Enabled
19,252,531 UART: [fht] FMC Alias Private Key: 7
21,019,007 UART: [art] Extend RT PCRs Done
21,020,234 UART: [art] Lock RT PCRs Done
21,022,249 UART: [art] Populate DV Done
21,027,668 UART: [fht] FMC Alias Private Key: 7
21,029,314 UART: [art] Derive CDI
21,030,059 UART: [art] Store in slot 0x4
21,072,544 UART: [art] Derive Key Pair
21,073,589 UART: [art] Store priv key in slot 0x5
23,500,137 UART: [art] Derive Key Pair - Done
23,513,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,548 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,053 UART: [art] PUB.X = 45B85D890E013AA627747CA5AEE040FC02E4F4D7FC541D80846EFE1AFAA1C9226586FBD80431B2332B4D33CF874B7FF0
25,228,387 UART: [art] PUB.Y = 703CF2847DA84BAA19A45C9817CAB4BA03A11E714AD626CDCC85D92DAFF6D8F6CCFCEBB6B199AAAE21F825B9B14C9892
25,235,683 UART: [art] SIG.R = 4BF21D261C82A61EDB4CA895FB5393550979FD99ED3869ADD1E657641E9219525E6B4AE0B087A26CEE53DEAFE51986D2
25,243,040 UART: [art] SIG.S = A8FE49DC6B30492D4E8BA3E2D86E7E3119164043B38273E5C383CE1695A2141F5668F5516C7976A58052C86F791E2197
26,221,672 UART: Caliptra RT
26,222,366 UART: [state] CFI Enabled
26,355,538 UART: [rt] RT listening for mailbox commands...
26,357,727 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,757,135 ready_for_fw is high
3,757,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,985 >>> mbox cmd response: success
15,049,167 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,299,496 UART:
19,299,890 UART: Running Caliptra FMC ...
19,301,028 UART:
19,301,190 UART: [state] CFI Enabled
19,309,156 UART: [fht] FMC Alias Private Key: 7
21,076,156 UART: [art] Extend RT PCRs Done
21,077,385 UART: [art] Lock RT PCRs Done
21,078,995 UART: [art] Populate DV Done
21,084,537 UART: [fht] FMC Alias Private Key: 7
21,086,029 UART: [art] Derive CDI
21,086,777 UART: [art] Store in slot 0x4
21,129,324 UART: [art] Derive Key Pair
21,130,330 UART: [art] Store priv key in slot 0x5
23,557,418 UART: [art] Derive Key Pair - Done
23,570,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,633 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,156 UART: [art] PUB.X = 69403369A5F744C8B066554C3651C6D098A8F1599CD7029D5B1C5742C8CE7C1A569C4F75E5AA0C37437A7EA0BE88A0F3
25,285,419 UART: [art] PUB.Y = A084C240E91C885216FC693081BDB0845CF3A923DC6379F239FA755413499876D7C7F5BF979784DC0AF68BE633F70490
25,292,676 UART: [art] SIG.R = 78BDF628095B995880A0AFC5D4F21983C697365E450D7398969587AA6DCF048EF2DF6677DA627DC9659FE543CFE5EE56
25,300,069 UART: [art] SIG.S = E52E2596E16EC3F3DD26D9E14515CB941153F3CD336012E9CDEB99FDE3A2043A951BAB154F43C91A81D0E7A2680F00AF
26,279,175 UART: Caliptra RT
26,279,900 UART: [state] CFI Enabled
26,412,678 UART: [rt] RT listening for mailbox commands...
26,415,108 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
191,998 UART:
192,368 UART: Running Caliptra ROM ...
193,515 UART:
193,667 UART: [state] CFI Enabled
264,178 UART: [state] LifecycleState = Unprovisioned
266,143 UART: [state] DebugLocked = No
268,879 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,126 UART: [kat] SHA2-256
443,803 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,332 UART: [kat] ++
454,813 UART: [kat] sha1
465,303 UART: [kat] SHA2-256
468,030 UART: [kat] SHA2-384
474,451 UART: [kat] SHA2-512-ACC
476,825 UART: [kat] ECC-384
2,768,641 UART: [kat] HMAC-384Kdf
2,799,988 UART: [kat] LMS
3,990,349 UART: [kat] --
3,995,649 UART: [cold-reset] ++
3,997,307 UART: [fht] Storing FHT @ 0x50003400
4,009,069 UART: [idev] ++
4,009,661 UART: [idev] CDI.KEYID = 6
4,010,589 UART: [idev] SUBJECT.KEYID = 7
4,011,779 UART: [idev] UDS.KEYID = 0
4,012,811 ready_for_fw is high
4,013,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,179 UART: [idev] Erasing UDS.KEYID = 0
7,348,071 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,303 UART: [idev] --
7,373,841 UART: [ldev] ++
7,374,421 UART: [ldev] CDI.KEYID = 6
7,375,385 UART: [ldev] SUBJECT.KEYID = 5
7,376,607 UART: [ldev] AUTHORITY.KEYID = 7
7,377,841 UART: [ldev] FE.KEYID = 1
7,422,024 UART: [ldev] Erasing FE.KEYID = 1
10,754,918 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,841 UART: [ldev] --
13,134,349 UART: [fwproc] Waiting for Commands...
13,136,544 UART: [fwproc] Received command 0x46574c44
13,138,724 UART: [fwproc] Received Image of size 118548 bytes
17,233,580 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,308,576 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,769 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,710,179 >>> mbox cmd response: success
17,711,348 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,714,399 UART: [afmc] ++
17,714,982 UART: [afmc] CDI.KEYID = 6
17,715,956 UART: [afmc] SUBJECT.KEYID = 7
17,717,175 UART: [afmc] AUTHORITY.KEYID = 5
21,090,339 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,406,008 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,408,277 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,422,737 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,437,440 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,451,855 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,473,585 UART: [afmc] --
23,476,892 UART: [cold-reset] --
23,481,995 UART: [state] Locking Datavault
23,486,329 UART: [state] Locking PCR0, PCR1 and PCR31
23,488,083 UART: [state] Locking ICCM
23,489,430 UART: [exit] Launching FMC @ 0x40000130
23,497,827 UART:
23,498,063 UART: Running Caliptra FMC ...
23,499,164 UART:
23,499,324 UART: [state] CFI Enabled
23,564,755 UART: [fht] FMC Alias Private Key: 7
25,905,464 UART: [art] Extend RT PCRs Done
25,906,692 UART: [art] Lock RT PCRs Done
25,908,131 UART: [art] Populate DV Done
25,913,438 UART: [fht] FMC Alias Private Key: 7
25,915,149 UART: [art] Derive CDI
25,915,962 UART: [art] Store in slot 0x4
25,973,157 UART: [art] Derive Key Pair
25,974,195 UART: [art] Store priv key in slot 0x5
29,267,077 UART: [art] Derive Key Pair - Done
29,280,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,567,818 UART: [art] Erasing AUTHORITY.KEYID = 7
31,569,327 UART: [art] PUB.X = 2EFC3B70FC2789D2E00AAD8731ADF95565B91456CA330A9FA68F5083051B4748E9B5DE786644DCB4C881E6DF9E0FFF65
31,576,596 UART: [art] PUB.Y = 66B8D204312F0EF47144D7803F86905653E1F2D0906D85AF95E771A5BBB1B57D2DBE05AE0595E7DF5E5F7EF717562B20
31,583,845 UART: [art] SIG.R = 19356E3D6DD42861445AA5097EEE150F656946912BF98743357392067F868B7B5D991802B01F212DF3B95FEA3C45ECA2
31,591,200 UART: [art] SIG.S = 2612C7200EC83DB42C3718E3DC184AA3E7042C22DD2CE1DEF2AE8C83C95294E8A503CCD9DCC171763B61E9E09A7D5A4E
32,895,881 UART: Caliptra RT
32,896,598 UART: [state] CFI Enabled
33,092,754 UART: [rt] RT listening for mailbox commands...
33,124,279 UART: [rt]cmd =0xaabbccdd, len=4
33,125,682 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,786,707 ready_for_fw is high
3,787,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,940,243 >>> mbox cmd response: success
17,941,838 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,626,663 UART:
23,627,102 UART: Running Caliptra FMC ...
23,628,226 UART:
23,628,387 UART: [state] CFI Enabled
23,696,867 UART: [fht] FMC Alias Private Key: 7
26,037,421 UART: [art] Extend RT PCRs Done
26,038,657 UART: [art] Lock RT PCRs Done
26,040,398 UART: [art] Populate DV Done
26,045,892 UART: [fht] FMC Alias Private Key: 7
26,047,369 UART: [art] Derive CDI
26,048,146 UART: [art] Store in slot 0x4
26,104,410 UART: [art] Derive Key Pair
26,105,434 UART: [art] Store priv key in slot 0x5
29,398,155 UART: [art] Derive Key Pair - Done
29,411,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,699,241 UART: [art] Erasing AUTHORITY.KEYID = 7
31,700,759 UART: [art] PUB.X = D23C58F329839851BAE5094A155495A2F105D101AD6114149A00EF49A53B9BFE068A86841349FADDBDC22493569CB9AC
31,707,956 UART: [art] PUB.Y = 50E0EB84DDF3B112B0D42A9B07A0A476A1269C1037113FE18780B670E16636F77FF4C97A68C7E4E9D294517C4B7903B3
31,715,223 UART: [art] SIG.R = 6B8D046183A9F4194BE384D57635775E9DDED4F70B67F23C323AA679743B06E10D896C7C7A1F1880E0417EE1A4E61F05
31,722,564 UART: [art] SIG.S = 98BC44B45F8EB6FA22D9420051B251AF7446E6F98FB0F972E2EC1E432146DDD020BCA52DFFBABE69538D72149B4B758B
33,027,299 UART: Caliptra RT
33,028,008 UART: [state] CFI Enabled
33,204,214 UART: [rt] RT listening for mailbox commands...
33,235,520 UART: [rt]cmd =0xaabbccdd, len=4
33,236,869 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
192,242 UART:
192,607 UART: Running Caliptra ROM ...
193,704 UART:
603,266 UART: [state] CFI Enabled
614,187 UART: [state] LifecycleState = Unprovisioned
616,135 UART: [state] DebugLocked = No
618,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,942 UART: [kat] SHA2-256
792,658 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,239 UART: [kat] ++
803,773 UART: [kat] sha1
813,943 UART: [kat] SHA2-256
816,590 UART: [kat] SHA2-384
822,430 UART: [kat] SHA2-512-ACC
824,791 UART: [kat] ECC-384
3,108,967 UART: [kat] HMAC-384Kdf
3,120,935 UART: [kat] LMS
4,311,079 UART: [kat] --
4,316,862 UART: [cold-reset] ++
4,318,105 UART: [fht] Storing FHT @ 0x50003400
4,330,590 UART: [idev] ++
4,331,220 UART: [idev] CDI.KEYID = 6
4,332,137 UART: [idev] SUBJECT.KEYID = 7
4,333,373 UART: [idev] UDS.KEYID = 0
4,334,427 ready_for_fw is high
4,334,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,543 UART: [idev] Erasing UDS.KEYID = 0
7,621,241 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,210 UART: [idev] --
7,647,526 UART: [ldev] ++
7,648,089 UART: [ldev] CDI.KEYID = 6
7,649,020 UART: [ldev] SUBJECT.KEYID = 5
7,650,299 UART: [ldev] AUTHORITY.KEYID = 7
7,651,445 UART: [ldev] FE.KEYID = 1
7,663,243 UART: [ldev] Erasing FE.KEYID = 1
10,949,384 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,687 UART: [ldev] --
13,306,648 UART: [fwproc] Waiting for Commands...
13,309,865 UART: [fwproc] Received command 0x46574c44
13,312,040 UART: [fwproc] Received Image of size 118548 bytes
17,419,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,431 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,591 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,317 >>> mbox cmd response: success
17,896,412 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,899,626 UART: [afmc] ++
17,900,210 UART: [afmc] CDI.KEYID = 6
17,901,088 UART: [afmc] SUBJECT.KEYID = 7
17,902,354 UART: [afmc] AUTHORITY.KEYID = 5
21,216,679 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,966 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,512,221 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,627 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,541,386 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,757 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,535 UART: [afmc] --
23,580,774 UART: [cold-reset] --
23,583,438 UART: [state] Locking Datavault
23,588,517 UART: [state] Locking PCR0, PCR1 and PCR31
23,590,260 UART: [state] Locking ICCM
23,592,694 UART: [exit] Launching FMC @ 0x40000130
23,601,117 UART:
23,601,359 UART: Running Caliptra FMC ...
23,602,379 UART:
23,602,524 UART: [state] CFI Enabled
23,610,347 UART: [fht] FMC Alias Private Key: 7
25,950,776 UART: [art] Extend RT PCRs Done
25,951,996 UART: [art] Lock RT PCRs Done
25,953,698 UART: [art] Populate DV Done
25,958,940 UART: [fht] FMC Alias Private Key: 7
25,960,629 UART: [art] Derive CDI
25,961,360 UART: [art] Store in slot 0x4
26,004,591 UART: [art] Derive Key Pair
26,005,630 UART: [art] Store priv key in slot 0x5
29,247,136 UART: [art] Derive Key Pair - Done
29,260,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,124 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,631 UART: [art] PUB.X = D7D7C9403131477882C6C7379E52F9B53B969327424F1D9A9086E78F59E83A118F2F21951A50847170BA28C1DE235CB4
31,548,831 UART: [art] PUB.Y = 7BF6DE587525B8C65A40FDA91D8D22EA9C25D064B0F4C638ECA73E25C4A82A0249D9DAFB83C9F453F8431354BC0DFE99
31,556,114 UART: [art] SIG.R = 7518E0B6204992B136B4527725B30803F35977AF1F826BD775318C2FFA196433975F097A1CB95E7284BD65165B8C105A
31,563,514 UART: [art] SIG.S = 0C84E1C5ED742AA45A044AE7A766D317BE4444D382AC59FBF4113DAAFD9BD7CB7229D029457CBCB37769B7AB8D997FED
32,868,574 UART: Caliptra RT
32,869,283 UART: [state] CFI Enabled
33,002,879 UART: [rt] RT listening for mailbox commands...
33,034,288 UART: [rt]cmd =0xaabbccdd, len=4
33,035,659 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
4,132,543 ready_for_fw is high
4,132,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,697 >>> mbox cmd response: success
18,166,310 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,802,590 UART:
23,802,977 UART: Running Caliptra FMC ...
23,804,077 UART:
23,804,232 UART: [state] CFI Enabled
23,812,187 UART: [fht] FMC Alias Private Key: 7
26,152,690 UART: [art] Extend RT PCRs Done
26,153,914 UART: [art] Lock RT PCRs Done
26,155,259 UART: [art] Populate DV Done
26,160,595 UART: [fht] FMC Alias Private Key: 7
26,162,140 UART: [art] Derive CDI
26,162,873 UART: [art] Store in slot 0x4
26,205,694 UART: [art] Derive Key Pair
26,206,735 UART: [art] Store priv key in slot 0x5
29,449,183 UART: [art] Derive Key Pair - Done
29,462,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,382 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,939 UART: [art] PUB.X = A3CC946ACE9D5D335E5D247F80393B5BECA5D8F22D9DA28326459ED438DFC88EE7CA11FE9AB7BF7BDF076D453F3AB995
31,751,180 UART: [art] PUB.Y = 478BB2DD92B8842ACC17CB9ACBC07078ABFB7EB051273E0EC0529AE92289FF22B57CE976D22B3A5552448156C4658C76
31,758,484 UART: [art] SIG.R = E08C89726C8738CF7AD8344077A3A2B715FB02A01C22C2ED61084AB1E420E3375D7D6C98E5D3F41B0C3D0A83BF356863
31,765,868 UART: [art] SIG.S = 5900E70B8C84C709A0655BBD8DDDAD3D648E2CD3511575EF68164F164F8FA276226B4F985A50D4F77A086612FB2DF8E9
33,071,238 UART: Caliptra RT
33,071,958 UART: [state] CFI Enabled
33,205,665 UART: [rt] RT listening for mailbox commands...
33,236,984 UART: [rt]cmd =0xaabbccdd, len=4
33,238,413 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,056 UART:
192,426 UART: Running Caliptra ROM ...
193,517 UART:
193,657 UART: [state] CFI Enabled
265,494 UART: [state] LifecycleState = Unprovisioned
267,503 UART: [state] DebugLocked = No
269,882 UART: [state] WD Timer not started. Device not locked for debugging
274,136 UART: [kat] SHA2-256
453,793 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,618 UART: [kat] ++
465,066 UART: [kat] sha1
475,475 UART: [kat] SHA2-256
478,117 UART: [kat] SHA2-384
483,548 UART: [kat] SHA2-512-ACC
485,914 UART: [kat] ECC-384
2,946,300 UART: [kat] HMAC-384Kdf
2,969,648 UART: [kat] LMS
3,446,180 UART: [kat] --
3,450,530 UART: [cold-reset] ++
3,452,035 UART: [fht] FHT @ 0x50003400
3,463,083 UART: [idev] ++
3,463,646 UART: [idev] CDI.KEYID = 6
3,464,675 UART: [idev] SUBJECT.KEYID = 7
3,465,847 UART: [idev] UDS.KEYID = 0
3,466,988 ready_for_fw is high
3,467,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,356 UART: [idev] Erasing UDS.KEYID = 0
5,984,540 UART: [idev] Sha1 KeyId Algorithm
6,008,223 UART: [idev] --
6,013,335 UART: [ldev] ++
6,013,912 UART: [ldev] CDI.KEYID = 6
6,014,929 UART: [ldev] SUBJECT.KEYID = 5
6,016,030 UART: [ldev] AUTHORITY.KEYID = 7
6,017,316 UART: [ldev] FE.KEYID = 1
6,056,584 UART: [ldev] Erasing FE.KEYID = 1
8,563,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,823 UART: [ldev] --
10,373,748 UART: [fwproc] Wait for Commands...
10,376,105 UART: [fwproc] Recv command 0x46574c44
10,378,136 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,037 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,050 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,486 >>> mbox cmd response: success
14,341,529 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,345,109 UART: [afmc] ++
14,345,681 UART: [afmc] CDI.KEYID = 6
14,346,699 UART: [afmc] SUBJECT.KEYID = 7
14,347,849 UART: [afmc] AUTHORITY.KEYID = 5
16,892,565 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,416 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,260 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,307 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,861 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,228 UART: [afmc] --
18,715,396 UART: [cold-reset] --
18,720,345 UART: [state] Locking Datavault
18,726,073 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,826 UART: [state] Locking ICCM
18,730,619 UART: [exit] Launching FMC @ 0x40000130
18,739,065 UART:
18,739,308 UART: Running Caliptra FMC ...
18,740,409 UART:
18,740,565 UART: [state] CFI Enabled
18,793,763 UART: [fht] FMC Alias Private Key: 7
20,560,393 UART: [art] Extend RT PCRs Done
20,561,619 UART: [art] Lock RT PCRs Done
20,563,376 UART: [art] Populate DV Done
20,568,752 UART: [fht] FMC Alias Private Key: 7
20,570,294 UART: [art] Derive CDI
20,571,106 UART: [art] Store in slot 0x4
20,626,928 UART: [art] Derive Key Pair
20,627,967 UART: [art] Store priv key in slot 0x5
23,090,758 UART: [art] Derive Key Pair - Done
23,103,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,816,276 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,786 UART: [art] PUB.X = A1052C7CB87FD2FF38B3D63B0014327C345226EAEA348FFDD2FE22EDE89CC0931BA3D91933AB68CBA90211D4B116A2B3
24,825,033 UART: [art] PUB.Y = 1FC955BA8EFA6687857647925AF118324CEB027757D9A43ADE3682832BF358209B971F36A8812A502518A7B1E41880E1
24,832,266 UART: [art] SIG.R = BF2934B0FE7F893DA3C02EED9E44093491215FEDC5B1EA04F60CE50817764B80CF8028EDC89BF12004612AA2A20A6CAA
24,839,662 UART: [art] SIG.S = 3FBB741D03732C6510D8B71B3A26DCDDB917F5E4AE8EFAF8990C942A35035D22B11B3C2CE6ED3F22F4EDB23ECD8742B9
25,818,678 UART: Caliptra RT
25,819,392 UART: [state] CFI Enabled
25,998,687 UART: [rt] RT listening for mailbox commands...
26,030,108 UART: [rt]cmd =0xaabbccdd, len=4
26,031,419 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,460,270 ready_for_fw is high
3,460,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,565 >>> mbox cmd response: success
14,240,944 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,516,542 UART:
18,516,921 UART: Running Caliptra FMC ...
18,518,123 UART:
18,518,311 UART: [state] CFI Enabled
18,585,297 UART: [fht] FMC Alias Private Key: 7
20,351,623 UART: [art] Extend RT PCRs Done
20,352,851 UART: [art] Lock RT PCRs Done
20,354,537 UART: [art] Populate DV Done
20,359,899 UART: [fht] FMC Alias Private Key: 7
20,361,379 UART: [art] Derive CDI
20,362,142 UART: [art] Store in slot 0x4
20,418,187 UART: [art] Derive Key Pair
20,419,228 UART: [art] Store priv key in slot 0x5
22,882,033 UART: [art] Derive Key Pair - Done
22,894,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,608,285 UART: [art] Erasing AUTHORITY.KEYID = 7
24,609,786 UART: [art] PUB.X = 7CE1898C967920B0B70FB8F821EC1FA0DD2651E01633910B300AD83A621942D1EEE7E1BB7B8D222CE54A7DF747C73431
24,617,087 UART: [art] PUB.Y = 0A8CA2B89C9F8E109B08CAE7ACF6D377F08F12A909F9A8F26C2CCBC35F56271F0C9FED878369CC87CDC812BC1A686D05
24,624,371 UART: [art] SIG.R = 4B9E65FB0F13605C680CA1B2027060A2BED26CBCF96C1981860DA4ABE970F2787943088399756C7FF65CFA83F37A56F2
24,631,732 UART: [art] SIG.S = 1077194217E6FA39218E88980FCD9576397FCA0FC91C0567AACA26E64E77F655585040BC1CA8C6A11D4832C23D6A791D
25,610,424 UART: Caliptra RT
25,611,128 UART: [state] CFI Enabled
25,793,297 UART: [rt] RT listening for mailbox commands...
25,825,121 UART: [rt]cmd =0xaabbccdd, len=4
25,826,547 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,503 UART:
192,886 UART: Running Caliptra ROM ...
194,019 UART:
603,537 UART: [state] CFI Enabled
619,057 UART: [state] LifecycleState = Unprovisioned
620,937 UART: [state] DebugLocked = No
622,613 UART: [state] WD Timer not started. Device not locked for debugging
625,866 UART: [kat] SHA2-256
805,458 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,261 UART: [kat] ++
816,710 UART: [kat] sha1
827,628 UART: [kat] SHA2-256
830,343 UART: [kat] SHA2-384
836,911 UART: [kat] SHA2-512-ACC
839,295 UART: [kat] ECC-384
3,280,026 UART: [kat] HMAC-384Kdf
3,293,184 UART: [kat] LMS
3,769,726 UART: [kat] --
3,774,646 UART: [cold-reset] ++
3,775,726 UART: [fht] FHT @ 0x50003400
3,786,720 UART: [idev] ++
3,787,325 UART: [idev] CDI.KEYID = 6
3,788,241 UART: [idev] SUBJECT.KEYID = 7
3,789,491 UART: [idev] UDS.KEYID = 0
3,790,419 ready_for_fw is high
3,790,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,306 UART: [idev] Erasing UDS.KEYID = 0
6,265,885 UART: [idev] Sha1 KeyId Algorithm
6,290,373 UART: [idev] --
6,295,234 UART: [ldev] ++
6,295,807 UART: [ldev] CDI.KEYID = 6
6,296,780 UART: [ldev] SUBJECT.KEYID = 5
6,297,940 UART: [ldev] AUTHORITY.KEYID = 7
6,299,250 UART: [ldev] FE.KEYID = 1
6,309,229 UART: [ldev] Erasing FE.KEYID = 1
8,785,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,455 UART: [ldev] --
10,580,793 UART: [fwproc] Wait for Commands...
10,582,865 UART: [fwproc] Recv command 0x46574c44
10,584,910 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,042 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,105 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,972 >>> mbox cmd response: success
14,554,534 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,558,419 UART: [afmc] ++
14,559,003 UART: [afmc] CDI.KEYID = 6
14,559,923 UART: [afmc] SUBJECT.KEYID = 7
14,561,143 UART: [afmc] AUTHORITY.KEYID = 5
17,062,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,228 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,800,049 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,078 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,700 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,886 UART: [afmc] --
18,861,138 UART: [cold-reset] --
18,865,969 UART: [state] Locking Datavault
18,871,376 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,137 UART: [state] Locking ICCM
18,875,504 UART: [exit] Launching FMC @ 0x40000130
18,883,918 UART:
18,884,155 UART: Running Caliptra FMC ...
18,885,258 UART:
18,885,418 UART: [state] CFI Enabled
18,893,841 UART: [fht] FMC Alias Private Key: 7
20,660,732 UART: [art] Extend RT PCRs Done
20,661,955 UART: [art] Lock RT PCRs Done
20,663,825 UART: [art] Populate DV Done
20,669,341 UART: [fht] FMC Alias Private Key: 7
20,670,932 UART: [art] Derive CDI
20,671,750 UART: [art] Store in slot 0x4
20,714,130 UART: [art] Derive Key Pair
20,715,135 UART: [art] Store priv key in slot 0x5
23,142,190 UART: [art] Derive Key Pair - Done
23,155,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,040 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,569 UART: [art] PUB.X = 3AE5DE1FA28B3D884F6886419893EA020D515F39CB6BB01D4B99B821DBE2F51694AF454F2856EC1EBDEF87E19E631AC0
24,870,825 UART: [art] PUB.Y = FCB4C1AB95811B23BA319705F554B3CBFC2FBE7006E51F0B5DAAD5807357CD564BDC3A0F151ED39B71FA2D0B9EEE108B
24,878,108 UART: [art] SIG.R = 0C06AB09BFB90ED35D6D00D4DAFEF26460028C5E0E5B8A74CABFD5C002DD64066825DAF7BBF26D8FFB3A4E1915C78A1E
24,885,495 UART: [art] SIG.S = 452E4C4D1EC218823757154EC43E37E7D90CCD9ECE654408C0C467C760AEF0C40AEBF7DB1286C217E407F81DDD3C3218
25,863,752 UART: Caliptra RT
25,864,455 UART: [state] CFI Enabled
25,996,374 UART: [rt] RT listening for mailbox commands...
26,028,166 UART: [rt]cmd =0xaabbccdd, len=4
26,029,500 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,780,300 ready_for_fw is high
3,780,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,192 >>> mbox cmd response: success
14,451,016 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,703,283 UART:
18,703,668 UART: Running Caliptra FMC ...
18,704,778 UART:
18,704,934 UART: [state] CFI Enabled
18,712,724 UART: [fht] FMC Alias Private Key: 7
20,478,390 UART: [art] Extend RT PCRs Done
20,479,605 UART: [art] Lock RT PCRs Done
20,481,632 UART: [art] Populate DV Done
20,487,048 UART: [fht] FMC Alias Private Key: 7
20,488,532 UART: [art] Derive CDI
20,489,267 UART: [art] Store in slot 0x4
20,531,886 UART: [art] Derive Key Pair
20,532,881 UART: [art] Store priv key in slot 0x5
22,959,865 UART: [art] Derive Key Pair - Done
22,972,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,678,761 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,252 UART: [art] PUB.X = 6A84A409F436DB1271EFE57D504A5A520FA70E442E1B8979224EFCA6AAAF0FA6D083CBEBB3245AA088105EF9454FC1FF
24,687,567 UART: [art] PUB.Y = 366BD834811DEF03180958BD7EB979223D5F0EE22DEC98B4EECBC1B2F68822276747E46EB827EA9A43F4122B9D0593B4
24,694,796 UART: [art] SIG.R = 0BEF9B440B94020ACB0DA333A89AEC145483049C018F6A26E7859BA383FF182BCAB4C94C8A1E4D80E818DEC4A7A99704
24,702,200 UART: [art] SIG.S = 023950D2660673B5C83503A2D76E199C0E46C5C51A270188F0C3CE75EEDC1055071D067539ACF099359CD2D1089B955B
25,681,387 UART: Caliptra RT
25,682,101 UART: [state] CFI Enabled
25,815,277 UART: [rt] RT listening for mailbox commands...
25,846,638 UART: [rt]cmd =0xaabbccdd, len=4
25,848,084 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
191,963 UART:
192,328 UART: Running Caliptra ROM ...
193,456 UART:
193,604 UART: [state] CFI Enabled
260,516 UART: [state] LifecycleState = Unprovisioned
262,877 UART: [state] DebugLocked = No
265,037 UART: [state] WD Timer not started. Device not locked for debugging
270,460 UART: [kat] SHA2-256
460,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,105 UART: [kat] ++
471,550 UART: [kat] sha1
484,268 UART: [kat] SHA2-256
487,267 UART: [kat] SHA2-384
493,114 UART: [kat] SHA2-512-ACC
495,692 UART: [kat] ECC-384
2,949,426 UART: [kat] HMAC-384Kdf
2,971,549 UART: [kat] LMS
3,503,281 UART: [kat] --
3,508,910 UART: [cold-reset] ++
3,511,335 UART: [fht] FHT @ 0x50003400
3,524,101 UART: [idev] ++
3,524,801 UART: [idev] CDI.KEYID = 6
3,525,747 UART: [idev] SUBJECT.KEYID = 7
3,526,984 UART: [idev] UDS.KEYID = 0
3,527,882 ready_for_fw is high
3,528,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,118 UART: [idev] Erasing UDS.KEYID = 0
6,049,808 UART: [idev] Sha1 KeyId Algorithm
6,072,822 UART: [idev] --
6,078,121 UART: [ldev] ++
6,078,796 UART: [ldev] CDI.KEYID = 6
6,079,722 UART: [ldev] SUBJECT.KEYID = 5
6,080,880 UART: [ldev] AUTHORITY.KEYID = 7
6,082,111 UART: [ldev] FE.KEYID = 1
6,119,442 UART: [ldev] Erasing FE.KEYID = 1
8,628,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,307 UART: [ldev] --
10,436,104 UART: [fwproc] Wait for Commands...
10,438,638 UART: [fwproc] Recv command 0x46574c44
10,440,943 UART: [fwproc] Recv'd Img size: 118548 bytes
13,948,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,022,202 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,145,846 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,706,021 >>> mbox cmd response: success
14,707,109 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,710,000 UART: [afmc] ++
14,710,701 UART: [afmc] CDI.KEYID = 6
14,711,937 UART: [afmc] SUBJECT.KEYID = 7
14,713,441 UART: [afmc] AUTHORITY.KEYID = 5
17,258,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,001,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,003,757 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,018,827 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,033,980 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,048,914 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,072,742 UART: [afmc] --
19,076,920 UART: [cold-reset] --
19,081,819 UART: [state] Locking Datavault
19,087,767 UART: [state] Locking PCR0, PCR1 and PCR31
19,089,964 UART: [state] Locking ICCM
19,092,923 UART: [exit] Launching FMC @ 0x40000130
19,101,588 UART:
19,101,820 UART: Running Caliptra FMC ...
19,102,919 UART:
19,103,091 UART: [state] CFI Enabled
19,158,340 UART: [fht] FMC Alias Private Key: 7
20,924,659 UART: [art] Extend RT PCRs Done
20,925,884 UART: [art] Lock RT PCRs Done
20,927,621 UART: [art] Populate DV Done
20,932,919 UART: [fht] FMC Alias Private Key: 7
20,934,559 UART: [art] Derive CDI
20,935,295 UART: [art] Store in slot 0x4
20,990,949 UART: [art] Derive Key Pair
20,991,987 UART: [art] Store priv key in slot 0x5
23,454,935 UART: [art] Derive Key Pair - Done
23,468,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,179,770 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,278 UART: [art] PUB.X = D3D5B3C9450F5BDF2DD552E7FD4A8D67983C067067C7CBA184E3315487A36183F57A11507E8BA2ADA8CA013732A28A12
25,188,555 UART: [art] PUB.Y = 337F120DF3650DB7954028BF2A5E9250F2E4D878EC0D8115008E2A3CAC57C33F34A178E20A3342C25B367307CC18D0A6
25,195,755 UART: [art] SIG.R = DD101224A4B9E05C9D056ED09B242D0FE80C049A7B51D8916864309E8DD8A05656E7AEFC968B82CD40E24CFDF0B946F6
25,203,191 UART: [art] SIG.S = 54E4DAADC79AEAADB15926BDDE43D6F86607DBB32E01A2AB5A2E585617DD86106115DA8571E9AB3D4C0687CF2D810724
26,182,880 UART: Caliptra RT
26,183,570 UART: [state] CFI Enabled
26,362,687 UART: [rt] RT listening for mailbox commands...
26,394,258 UART: [rt]cmd =0xaabbccdd, len=4
26,395,596 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
3,440,226 ready_for_fw is high
3,440,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,815,751 >>> mbox cmd response: success
14,816,918 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,094,712 UART:
19,095,103 UART: Running Caliptra FMC ...
19,096,295 UART:
19,096,467 UART: [state] CFI Enabled
19,161,889 UART: [fht] FMC Alias Private Key: 7
20,928,090 UART: [art] Extend RT PCRs Done
20,929,320 UART: [art] Lock RT PCRs Done
20,931,110 UART: [art] Populate DV Done
20,936,361 UART: [fht] FMC Alias Private Key: 7
20,938,065 UART: [art] Derive CDI
20,938,886 UART: [art] Store in slot 0x4
20,995,103 UART: [art] Derive Key Pair
20,996,144 UART: [art] Store priv key in slot 0x5
23,459,028 UART: [art] Derive Key Pair - Done
23,472,299 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,185,044 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,556 UART: [art] PUB.X = D5F676A2D9C149F36A821B8972EA30201213105866D138AB1D8439C9171B53BB6DBD5B3F74AC5CDBE778815BDB0E3719
25,193,756 UART: [art] PUB.Y = 0F5CAF501464B84E68D4C0C86E7329D42CC477343AD46E0ACC3DCCE5B20FFA81E8853F88425862B1F97D0F3023DE3D5F
25,201,056 UART: [art] SIG.R = E9E7085AE4233CC9A14C1B81085FFB2E0624872D22FC5879D51C22C02C59DE363A7E200009A864D088479725C547F431
25,208,401 UART: [art] SIG.S = 4DB2230C472257FB3817DE156366BBB90504F46AA854AE42B5A5642F49E8B95F63227450EA6247F18104DA348E94ACF3
26,187,242 UART: Caliptra RT
26,187,949 UART: [state] CFI Enabled
26,368,258 UART: [rt] RT listening for mailbox commands...
26,399,892 UART: [rt]cmd =0xaabbccdd, len=4
26,401,292 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,481 UART:
192,851 UART: Running Caliptra ROM ...
194,045 UART:
603,540 UART: [state] CFI Enabled
614,756 UART: [state] LifecycleState = Unprovisioned
617,097 UART: [state] DebugLocked = No
619,627 UART: [state] WD Timer not started. Device not locked for debugging
624,968 UART: [kat] SHA2-256
814,797 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,612 UART: [kat] ++
826,219 UART: [kat] sha1
838,740 UART: [kat] SHA2-256
841,753 UART: [kat] SHA2-384
846,397 UART: [kat] SHA2-512-ACC
848,971 UART: [kat] ECC-384
3,289,217 UART: [kat] HMAC-384Kdf
3,301,816 UART: [kat] LMS
3,833,662 UART: [kat] --
3,836,685 UART: [cold-reset] ++
3,838,339 UART: [fht] FHT @ 0x50003400
3,850,244 UART: [idev] ++
3,850,888 UART: [idev] CDI.KEYID = 6
3,851,924 UART: [idev] SUBJECT.KEYID = 7
3,853,102 UART: [idev] UDS.KEYID = 0
3,854,031 ready_for_fw is high
3,854,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,105 UART: [idev] Erasing UDS.KEYID = 0
6,323,420 UART: [idev] Sha1 KeyId Algorithm
6,344,980 UART: [idev] --
6,349,947 UART: [ldev] ++
6,350,621 UART: [ldev] CDI.KEYID = 6
6,351,579 UART: [ldev] SUBJECT.KEYID = 5
6,352,742 UART: [ldev] AUTHORITY.KEYID = 7
6,353,975 UART: [ldev] FE.KEYID = 1
6,364,385 UART: [ldev] Erasing FE.KEYID = 1
8,840,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,422 UART: [ldev] --
10,632,033 UART: [fwproc] Wait for Commands...
10,634,349 UART: [fwproc] Recv command 0x46574c44
10,636,611 UART: [fwproc] Recv'd Img size: 118548 bytes
14,130,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,206,584 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,330,178 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,889,794 >>> mbox cmd response: success
14,890,307 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,893,137 UART: [afmc] ++
14,893,881 UART: [afmc] CDI.KEYID = 6
14,895,074 UART: [afmc] SUBJECT.KEYID = 7
14,896,518 UART: [afmc] AUTHORITY.KEYID = 5
17,398,430 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,122,674 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,124,674 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,139,767 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,154,900 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,169,848 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,193,877 UART: [afmc] --
19,197,308 UART: [cold-reset] --
19,200,740 UART: [state] Locking Datavault
19,206,650 UART: [state] Locking PCR0, PCR1 and PCR31
19,208,812 UART: [state] Locking ICCM
19,211,593 UART: [exit] Launching FMC @ 0x40000130
19,220,263 UART:
19,220,498 UART: Running Caliptra FMC ...
19,221,551 UART:
19,221,703 UART: [state] CFI Enabled
19,230,287 UART: [fht] FMC Alias Private Key: 7
20,997,035 UART: [art] Extend RT PCRs Done
20,998,260 UART: [art] Lock RT PCRs Done
20,999,967 UART: [art] Populate DV Done
21,005,217 UART: [fht] FMC Alias Private Key: 7
21,006,820 UART: [art] Derive CDI
21,007,761 UART: [art] Store in slot 0x4
21,050,110 UART: [art] Derive Key Pair
21,051,121 UART: [art] Store priv key in slot 0x5
23,477,875 UART: [art] Derive Key Pair - Done
23,490,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,197,551 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,057 UART: [art] PUB.X = 1A43E6C1DFD2B60E88230529D7085F1CFB864E259734C76E549E6C4D5677975DE32BF3BE0A6A21B8F60BFBBC49EE6561
25,206,329 UART: [art] PUB.Y = 4C096F77FB39D76133F2E545F3E7780D52D94029C5A5ACC57C090814F0606BD9B8F1DCA0C8F72B69730C1A74136F5CA7
25,213,574 UART: [art] SIG.R = A646A08ABB5AFF82524E3F340CAD678DB5878F745C9D001D39BEF31136EE027D1AC88116FC54794F299FD9066B62AFB9
25,220,937 UART: [art] SIG.S = 5C9FC10B56F5F86126B96A264CE7852AB476AD3D348519CFB2E2096F0E9C23BC95FDCB935105DFBFBA90AC7A7E07A6D1
26,199,794 UART: Caliptra RT
26,200,509 UART: [state] CFI Enabled
26,333,359 UART: [rt] RT listening for mailbox commands...
26,365,046 UART: [rt]cmd =0xaabbccdd, len=4
26,366,397 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,175 writing to cptra_bootfsm_go
3,769,056 ready_for_fw is high
3,769,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,331 >>> mbox cmd response: success
15,049,956 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,312,355 UART:
19,312,746 UART: Running Caliptra FMC ...
19,313,861 UART:
19,314,028 UART: [state] CFI Enabled
19,321,990 UART: [fht] FMC Alias Private Key: 7
21,087,745 UART: [art] Extend RT PCRs Done
21,088,986 UART: [art] Lock RT PCRs Done
21,090,488 UART: [art] Populate DV Done
21,096,044 UART: [fht] FMC Alias Private Key: 7
21,097,597 UART: [art] Derive CDI
21,098,420 UART: [art] Store in slot 0x4
21,140,868 UART: [art] Derive Key Pair
21,141,918 UART: [art] Store priv key in slot 0x5
23,568,781 UART: [art] Derive Key Pair - Done
23,582,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,288,644 UART: [art] Erasing AUTHORITY.KEYID = 7
25,290,150 UART: [art] PUB.X = B68D226BDF0DADC701F9879782DC6C90E1BB37A5F43F4A8F78B3CFACB5A41456C15F038972AD0ED67D35E7B1C6440CDF
25,297,400 UART: [art] PUB.Y = 0DA13366AAFEFA74FB396081CBA316C4274251EBAA1EAF8054A5C5EA6F06EC8154342689FE6E46725AE81C0833AFAE4C
25,304,707 UART: [art] SIG.R = B9F3A67905248B41F7834FE7B1574B1E6F59081F84FBF0FBD2E03871E448F05D7DB4B633833E971FA79D9E1224DE814C
25,312,070 UART: [art] SIG.S = 42810DDBF9AB05E7F48BCA8926B8C5EA5FE3F422D9A68EF9DCD245232B1E1105E093ABC9DAE053B68A5FC5DFA894FE4D
26,291,220 UART: Caliptra RT
26,291,908 UART: [state] CFI Enabled
26,425,373 UART: [rt] RT listening for mailbox commands...
26,456,868 UART: [rt]cmd =0xaabbccdd, len=4
26,458,240 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,873 UART: [kat] SHA2-256
881,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,919 UART: [kat] ++
886,071 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,910 UART: [kat] SHA2-512-ACC
896,811 UART: [kat] ECC-384
902,592 UART: [kat] HMAC-384Kdf
906,996 UART: [kat] LMS
1,475,192 UART: [kat] --
1,476,169 UART: [cold-reset] ++
1,476,723 UART: [fht] Storing FHT @ 0x50003400
1,479,546 UART: [idev] ++
1,479,714 UART: [idev] CDI.KEYID = 6
1,480,074 UART: [idev] SUBJECT.KEYID = 7
1,480,498 UART: [idev] UDS.KEYID = 0
1,480,843 ready_for_fw is high
1,480,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,624 UART: [idev] Erasing UDS.KEYID = 0
1,505,200 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,824 UART: [idev] --
1,514,723 UART: [ldev] ++
1,514,891 UART: [ldev] CDI.KEYID = 6
1,515,254 UART: [ldev] SUBJECT.KEYID = 5
1,515,680 UART: [ldev] AUTHORITY.KEYID = 7
1,516,143 UART: [ldev] FE.KEYID = 1
1,521,051 UART: [ldev] Erasing FE.KEYID = 1
1,546,148 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,076 UART: [ldev] --
1,585,361 UART: [fwproc] Waiting for Commands...
1,586,038 UART: [fwproc] Received command 0x46574c44
1,586,829 UART: [fwproc] Received Image of size 118548 bytes
2,930,429 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,375 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,593 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,928 >>> mbox cmd response: success
3,128,928 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,129,948 UART: [afmc] ++
3,130,116 UART: [afmc] CDI.KEYID = 6
3,130,478 UART: [afmc] SUBJECT.KEYID = 7
3,130,903 UART: [afmc] AUTHORITY.KEYID = 5
3,165,622 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,070 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,182,850 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,559 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,442 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,125 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,113 UART: [afmc] --
3,209,079 UART: [cold-reset] --
3,209,945 UART: [state] Locking Datavault
3,211,048 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,652 UART: [state] Locking ICCM
3,212,264 UART: [exit] Launching FMC @ 0x40000130
3,217,594 UART:
3,217,610 UART: Running Caliptra FMC ...
3,218,018 UART:
3,218,072 UART: [state] CFI Enabled
3,228,432 UART: [fht] FMC Alias Private Key: 7
3,347,940 UART: [art] Extend RT PCRs Done
3,348,368 UART: [art] Lock RT PCRs Done
3,350,128 UART: [art] Populate DV Done
3,358,327 UART: [fht] FMC Alias Private Key: 7
3,359,269 UART: [art] Derive CDI
3,359,549 UART: [art] Store in slot 0x4
3,445,329 UART: [art] Derive Key Pair
3,445,689 UART: [art] Store priv key in slot 0x5
3,459,252 UART: [art] Derive Key Pair - Done
3,473,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,901 UART: [art] PUB.X = C948BBCF3B225F0415D7CCF24E264B34064476C7FBE12821C517BE3FA6425A78CA5E479C85746E3C3C87B8817C28DF7E
3,496,673 UART: [art] PUB.Y = D910DAF0BA8311D2E5840E634071C1AAFBD4D9F00E5FA9E3149E87FDFCEB214DE50F94BAE5093C04FA956B838E49E849
3,503,626 UART: [art] SIG.R = 525E4CD335F022240F91B4911A4A1239D555C82B050D0BE348FA65BDA779AE46427718539F066AD3DEEF936A038F7649
3,510,376 UART: [art] SIG.S = E2828231ACB0CF9DB6D1EA2E526E8DD302DBD702528565A528558AFEBB9E8B8394AA739511D1E8A81A38D0E58BC971E5
3,534,384 UART: Caliptra RT
3,534,635 UART: [state] CFI Enabled
3,655,395 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,741 UART: [rt]cmd =0xaabbccdd, len=4
3,686,713 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,235 ready_for_fw is high
1,362,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,504 >>> mbox cmd response: success
2,979,504 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,040,799 UART:
3,040,815 UART: Running Caliptra FMC ...
3,041,223 UART:
3,041,277 UART: [state] CFI Enabled
3,051,517 UART: [fht] FMC Alias Private Key: 7
3,170,377 UART: [art] Extend RT PCRs Done
3,170,805 UART: [art] Lock RT PCRs Done
3,172,525 UART: [art] Populate DV Done
3,180,542 UART: [fht] FMC Alias Private Key: 7
3,181,538 UART: [art] Derive CDI
3,181,818 UART: [art] Store in slot 0x4
3,267,274 UART: [art] Derive Key Pair
3,267,634 UART: [art] Store priv key in slot 0x5
3,281,033 UART: [art] Derive Key Pair - Done
3,295,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,540 UART: [art] PUB.X = 639A56CF12613C47815E1D5CD1BCCE5D2A599B5FD30E35522B66B353AA5CBBF6E73CB4ACD0D508FB6F0CFAE78DCE6C0E
3,318,326 UART: [art] PUB.Y = 0DE8045160875A3F1E8A23A1118110E0ABDC5DB5A1C3E24084138781E93C388530CD8EAC727B4FCB2D8B17BC3F6D0185
3,325,273 UART: [art] SIG.R = FB3C687B51AA43DC34C7FE9B8922D7C848B745994211DC438BDA6F5107BB420F643093D1AA2488D56533D459255EC026
3,332,037 UART: [art] SIG.S = B1162E475D32A9A8C2ACC14965DE55F3CAE8F45ACF94990B5ADE4DA2D724F66E69878B8CBAD5E41EA69ABBCA8AFF0F1F
3,355,779 UART: Caliptra RT
3,356,030 UART: [state] CFI Enabled
3,476,005 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,377 UART: [rt]cmd =0xaabbccdd, len=4
3,507,441 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,282 UART: [kat] SHA2-256
882,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,328 UART: [kat] ++
886,480 UART: [kat] sha1
890,722 UART: [kat] SHA2-256
892,660 UART: [kat] SHA2-384
895,523 UART: [kat] SHA2-512-ACC
897,424 UART: [kat] ECC-384
902,961 UART: [kat] HMAC-384Kdf
907,431 UART: [kat] LMS
1,475,627 UART: [kat] --
1,476,634 UART: [cold-reset] ++
1,477,160 UART: [fht] Storing FHT @ 0x50003400
1,479,989 UART: [idev] ++
1,480,157 UART: [idev] CDI.KEYID = 6
1,480,517 UART: [idev] SUBJECT.KEYID = 7
1,480,941 UART: [idev] UDS.KEYID = 0
1,481,286 ready_for_fw is high
1,481,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,217 UART: [idev] Erasing UDS.KEYID = 0
1,506,015 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,517 UART: [idev] --
1,515,456 UART: [ldev] ++
1,515,624 UART: [ldev] CDI.KEYID = 6
1,515,987 UART: [ldev] SUBJECT.KEYID = 5
1,516,413 UART: [ldev] AUTHORITY.KEYID = 7
1,516,876 UART: [ldev] FE.KEYID = 1
1,522,134 UART: [ldev] Erasing FE.KEYID = 1
1,547,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,727 UART: [ldev] --
1,587,052 UART: [fwproc] Waiting for Commands...
1,587,901 UART: [fwproc] Received command 0x46574c44
1,588,692 UART: [fwproc] Received Image of size 118548 bytes
2,934,060 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,086 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,304 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,697 >>> mbox cmd response: success
3,132,697 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,133,761 UART: [afmc] ++
3,133,929 UART: [afmc] CDI.KEYID = 6
3,134,291 UART: [afmc] SUBJECT.KEYID = 7
3,134,716 UART: [afmc] AUTHORITY.KEYID = 5
3,169,181 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,437 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,217 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,926 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,809 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,492 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,520 UART: [afmc] --
3,212,542 UART: [cold-reset] --
3,213,586 UART: [state] Locking Datavault
3,214,989 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,593 UART: [state] Locking ICCM
3,216,215 UART: [exit] Launching FMC @ 0x40000130
3,221,545 UART:
3,221,561 UART: Running Caliptra FMC ...
3,221,969 UART:
3,222,112 UART: [state] CFI Enabled
3,233,134 UART: [fht] FMC Alias Private Key: 7
3,352,374 UART: [art] Extend RT PCRs Done
3,352,802 UART: [art] Lock RT PCRs Done
3,354,500 UART: [art] Populate DV Done
3,362,689 UART: [fht] FMC Alias Private Key: 7
3,363,691 UART: [art] Derive CDI
3,363,971 UART: [art] Store in slot 0x4
3,449,799 UART: [art] Derive Key Pair
3,450,159 UART: [art] Store priv key in slot 0x5
3,463,590 UART: [art] Derive Key Pair - Done
3,478,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,231 UART: [art] PUB.X = E97C28921DB5B9F0438D020D4345F2AF6CB4A4BB16C5B69B2BF380B30023136FC2CCB5755FA86DF07E11B9E68103B12D
3,500,980 UART: [art] PUB.Y = E5CC2930836DD5F850BB198C16241A646F495AC1EA36986FF58101AE7ED139B12A60857FE3DFAC52E460A98F2B4538DB
3,507,935 UART: [art] SIG.R = 60E84CD2A04C855410CDC4C4B6F69F5285EC498BB03B0D6AABF921D482CC87DCE910C8F7ED8CF335C13085C65CEA673C
3,514,720 UART: [art] SIG.S = 4ED839A592A21CCA620748A2E15FF5630FD0DF93AAC804751569E4C1CD8BB2FBED85B90821B244509F225ABF4B2731E4
3,538,500 UART: Caliptra RT
3,538,843 UART: [state] CFI Enabled
3,659,660 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,272 UART: [rt]cmd =0xaabbccdd, len=4
3,691,238 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,220 ready_for_fw is high
1,363,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,255 >>> mbox cmd response: success
2,982,255 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,044,026 UART:
3,044,042 UART: Running Caliptra FMC ...
3,044,450 UART:
3,044,593 UART: [state] CFI Enabled
3,055,187 UART: [fht] FMC Alias Private Key: 7
3,174,115 UART: [art] Extend RT PCRs Done
3,174,543 UART: [art] Lock RT PCRs Done
3,175,965 UART: [art] Populate DV Done
3,184,090 UART: [fht] FMC Alias Private Key: 7
3,185,086 UART: [art] Derive CDI
3,185,366 UART: [art] Store in slot 0x4
3,270,790 UART: [art] Derive Key Pair
3,271,150 UART: [art] Store priv key in slot 0x5
3,285,161 UART: [art] Derive Key Pair - Done
3,299,975 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,818 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,583 UART: [art] PUB.X = 95A01A800F96010F95519A67029A111E63E8DDFB71D836D0EC01828C2430E86AF990C505CF2A871C129286922C213BD2
3,323,329 UART: [art] PUB.Y = C6394752AE0B4725B2A4213EB8057869736D5A9359EA345EB45FB8BFAFC2155A420F6E4F9BA75E831E977C985B57E1EB
3,330,276 UART: [art] SIG.R = 9BD36B512CB7DF42467416CB460F31E853C2E45D4176D902E7CE18B5F669A05CC7E90A1466F156112121758E52D6AF6D
3,337,037 UART: [art] SIG.S = 269A4E89C667AB711FA475AA65B52B53B840482849B01C5D31D3EED308C60902EC910F4AB9FAE19883CB65AE28EDD6B9
3,361,309 UART: Caliptra RT
3,361,652 UART: [state] CFI Enabled
3,482,418 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,868 UART: [rt]cmd =0xaabbccdd, len=4
3,513,828 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,548 UART: [state] LifecycleState = Unprovisioned
86,203 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [kat] SHA2-256
891,580 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,684 UART: [kat] ++
895,836 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,535 UART: [kat] SHA2-512-ACC
906,436 UART: [kat] ECC-384
916,047 UART: [kat] HMAC-384Kdf
920,485 UART: [kat] LMS
1,168,797 UART: [kat] --
1,169,792 UART: [cold-reset] ++
1,170,342 UART: [fht] FHT @ 0x50003400
1,173,054 UART: [idev] ++
1,173,222 UART: [idev] CDI.KEYID = 6
1,173,583 UART: [idev] SUBJECT.KEYID = 7
1,174,008 UART: [idev] UDS.KEYID = 0
1,174,354 ready_for_fw is high
1,174,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,003 UART: [idev] Erasing UDS.KEYID = 0
1,198,973 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,712 UART: [ldev] ++
1,208,880 UART: [ldev] CDI.KEYID = 6
1,209,244 UART: [ldev] SUBJECT.KEYID = 5
1,209,671 UART: [ldev] AUTHORITY.KEYID = 7
1,210,134 UART: [ldev] FE.KEYID = 1
1,215,428 UART: [ldev] Erasing FE.KEYID = 1
1,241,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,755 UART: [fwproc] Wait for Commands...
1,281,502 UART: [fwproc] Recv command 0x46574c44
1,282,235 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,019 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,194 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,503 >>> mbox cmd response: success
2,825,503 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,826,595 UART: [afmc] ++
2,826,763 UART: [afmc] CDI.KEYID = 6
2,827,126 UART: [afmc] SUBJECT.KEYID = 7
2,827,552 UART: [afmc] AUTHORITY.KEYID = 5
2,863,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,628 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,377 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,087 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,968 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,669 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,438 UART: [afmc] --
2,906,271 UART: [cold-reset] --
2,907,221 UART: [state] Locking Datavault
2,908,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,796 UART: [state] Locking ICCM
2,909,326 UART: [exit] Launching FMC @ 0x40000130
2,914,656 UART:
2,914,672 UART: Running Caliptra FMC ...
2,915,080 UART:
2,915,134 UART: [state] CFI Enabled
2,925,436 UART: [fht] FMC Alias Private Key: 7
3,044,580 UART: [art] Extend RT PCRs Done
3,045,008 UART: [art] Lock RT PCRs Done
3,046,608 UART: [art] Populate DV Done
3,054,941 UART: [fht] FMC Alias Private Key: 7
3,056,085 UART: [art] Derive CDI
3,056,365 UART: [art] Store in slot 0x4
3,142,242 UART: [art] Derive Key Pair
3,142,602 UART: [art] Store priv key in slot 0x5
3,155,588 UART: [art] Derive Key Pair - Done
3,170,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,772 UART: [art] PUB.X = 2CAF0D5EC3B90F9C5B18BD5516491E066B3520CB3DC9D2CA598B50002ECD7F1FFC24B0BC22F75244E37C66F24CDE763D
3,193,529 UART: [art] PUB.Y = B8E57CF7008F2BC40A788F8098C1436870EBBA2DD0B2722E6E20E924AF015792888347902A778D79CAEC7FD1461D1A3F
3,200,455 UART: [art] SIG.R = 8E078CDC385516CA986AEB48511E99F3C05A5A21E3203E2C9C153D7C219CA7861DF65C13FFAF0C2E818138D88418DBCC
3,207,229 UART: [art] SIG.S = 8699A0CD4A9C3F4BA591179CE7C9298FCD3929A9555DE72F501DE025C5D44757B1916966757A60C221D33F25A56A1468
3,230,915 UART: Caliptra RT
3,231,166 UART: [state] CFI Enabled
3,350,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,266 UART: [rt]cmd =0xaabbccdd, len=4
3,382,272 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,574 ready_for_fw is high
1,058,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,418 >>> mbox cmd response: success
2,680,418 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,741,839 UART:
2,741,855 UART: Running Caliptra FMC ...
2,742,263 UART:
2,742,317 UART: [state] CFI Enabled
2,752,599 UART: [fht] FMC Alias Private Key: 7
2,871,629 UART: [art] Extend RT PCRs Done
2,872,057 UART: [art] Lock RT PCRs Done
2,873,699 UART: [art] Populate DV Done
2,882,146 UART: [fht] FMC Alias Private Key: 7
2,883,324 UART: [art] Derive CDI
2,883,604 UART: [art] Store in slot 0x4
2,969,353 UART: [art] Derive Key Pair
2,969,713 UART: [art] Store priv key in slot 0x5
2,982,473 UART: [art] Derive Key Pair - Done
2,997,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,602 UART: [art] PUB.X = 447BBA53D871A287D1FC1E08D49A2264ADE2B350B1E8473775682FDAEF4F59469991DEDB8DDEB47781FF443C35223273
3,020,375 UART: [art] PUB.Y = 1A21D7D0C2B693D1DF21AD8168F7C0FA5A5AD5499329DD1723329A50112A00ACE2ECA83CE6FA027930E2D8DD29C972A8
3,027,312 UART: [art] SIG.R = 2B2B4B6730D8183EFA9DEA4BC4D4A4CA0D5D7D8656E1CE1E30167F4F4268DB6A289E913A7B55D5A6753AB590AC5B3849
3,034,093 UART: [art] SIG.S = 1C333E3B98A395599FF6B54E61FA10953225181AAA215EE298C33B96C09F4916FE9F47A7E88285DCD08715DECB5EFFF0
3,058,277 UART: Caliptra RT
3,058,528 UART: [state] CFI Enabled
3,178,082 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,656 UART: [rt]cmd =0xaabbccdd, len=4
3,209,776 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,722 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,583 UART: [kat] SHA2-256
891,133 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,186 UART: [kat] SHA2-512-ACC
906,087 UART: [kat] ECC-384
915,956 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,661 UART: [cold-reset] ++
1,170,229 UART: [fht] FHT @ 0x50003400
1,172,923 UART: [idev] ++
1,173,091 UART: [idev] CDI.KEYID = 6
1,173,452 UART: [idev] SUBJECT.KEYID = 7
1,173,877 UART: [idev] UDS.KEYID = 0
1,174,223 ready_for_fw is high
1,174,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,794 UART: [idev] Erasing UDS.KEYID = 0
1,199,468 UART: [idev] Sha1 KeyId Algorithm
1,208,474 UART: [idev] --
1,209,625 UART: [ldev] ++
1,209,793 UART: [ldev] CDI.KEYID = 6
1,210,157 UART: [ldev] SUBJECT.KEYID = 5
1,210,584 UART: [ldev] AUTHORITY.KEYID = 7
1,211,047 UART: [ldev] FE.KEYID = 1
1,216,517 UART: [ldev] Erasing FE.KEYID = 1
1,243,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,297 UART: [ldev] --
1,282,600 UART: [fwproc] Wait for Commands...
1,283,327 UART: [fwproc] Recv command 0x46574c44
1,284,060 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,366 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,541 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,738 >>> mbox cmd response: success
2,826,738 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,827,958 UART: [afmc] ++
2,828,126 UART: [afmc] CDI.KEYID = 6
2,828,489 UART: [afmc] SUBJECT.KEYID = 7
2,828,915 UART: [afmc] AUTHORITY.KEYID = 5
2,864,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,464 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,174 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,055 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,756 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,445 UART: [afmc] --
2,907,448 UART: [cold-reset] --
2,908,106 UART: [state] Locking Datavault
2,909,381 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,985 UART: [state] Locking ICCM
2,910,635 UART: [exit] Launching FMC @ 0x40000130
2,915,965 UART:
2,915,981 UART: Running Caliptra FMC ...
2,916,389 UART:
2,916,532 UART: [state] CFI Enabled
2,927,348 UART: [fht] FMC Alias Private Key: 7
3,046,324 UART: [art] Extend RT PCRs Done
3,046,752 UART: [art] Lock RT PCRs Done
3,048,252 UART: [art] Populate DV Done
3,056,379 UART: [fht] FMC Alias Private Key: 7
3,057,369 UART: [art] Derive CDI
3,057,649 UART: [art] Store in slot 0x4
3,143,790 UART: [art] Derive Key Pair
3,144,150 UART: [art] Store priv key in slot 0x5
3,157,744 UART: [art] Derive Key Pair - Done
3,172,429 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,361 UART: [art] PUB.X = EF73C9442B5A5C4D108C94071BCC321C4B2C985110C59AB66F2415622FB5D76DD227120D5DDCA9F05C0292C3CC4AACFF
3,195,136 UART: [art] PUB.Y = CDA6B39CDE70526207B4B35F9E7609E3AEDD331B53CCECADB9D85A8FB5604DD33DF31471D8C859BE0B3D34F7AE217FB8
3,202,101 UART: [art] SIG.R = 587A9592713B0CF23EB347F57CA1704717E003131774E36393BFEC4E4A190948C8FD99ED605F588226B861EA26D852C4
3,208,856 UART: [art] SIG.S = 6B80A29E9DB13F8E236A139527697F84F0EF22AF9D27584D2C4375AF9D4F6A351378E4600226A58266FD4401745ABB63
3,232,658 UART: Caliptra RT
3,233,001 UART: [state] CFI Enabled
3,352,525 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,971 UART: [rt]cmd =0xaabbccdd, len=4
3,383,845 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,169 ready_for_fw is high
1,059,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,009 >>> mbox cmd response: success
2,679,009 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,742,026 UART:
2,742,042 UART: Running Caliptra FMC ...
2,742,450 UART:
2,742,593 UART: [state] CFI Enabled
2,753,071 UART: [fht] FMC Alias Private Key: 7
2,872,505 UART: [art] Extend RT PCRs Done
2,872,933 UART: [art] Lock RT PCRs Done
2,874,735 UART: [art] Populate DV Done
2,882,862 UART: [fht] FMC Alias Private Key: 7
2,883,862 UART: [art] Derive CDI
2,884,142 UART: [art] Store in slot 0x4
2,969,553 UART: [art] Derive Key Pair
2,969,913 UART: [art] Store priv key in slot 0x5
2,983,189 UART: [art] Derive Key Pair - Done
2,998,042 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,528 UART: [art] PUB.X = 6B7FD27745F0E38A2D03B7B67EB5CA2D3D79958F87D76285C4E33C55A2732930CFD792A2058EF6A6109829496D9C430A
3,021,289 UART: [art] PUB.Y = 8F8E982030375A06DAB76E7C90A2F6546F82936E4E4AA852C3849DD03ACA6B27C77585E5A1CDF9C90FBF18E1FF7EC405
3,028,242 UART: [art] SIG.R = D6E8CE527A1B1A1C20D5E0319485B6E49C3E04334C565B2BCBAB0FC4FC828E5A2BA1879B45C50D4023D7D3B9A698C02C
3,035,017 UART: [art] SIG.S = B0C71CE3BC7D6A883FEA3FECE557F84E51997D7882676B004361D41290F2732712A70BC3D8144F6C2F149351502160E6
3,058,876 UART: Caliptra RT
3,059,219 UART: [state] CFI Enabled
3,179,169 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,461 UART: [rt]cmd =0xaabbccdd, len=4
3,210,483 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
85,969 UART: [state] WD Timer not started. Device not locked for debugging
87,108 UART: [kat] SHA2-256
892,758 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,883 UART: [kat] ++
897,035 UART: [kat] sha1
901,441 UART: [kat] SHA2-256
903,381 UART: [kat] SHA2-384
906,260 UART: [kat] SHA2-512-ACC
908,161 UART: [kat] ECC-384
917,850 UART: [kat] HMAC-384Kdf
922,334 UART: [kat] LMS
1,170,662 UART: [kat] --
1,171,599 UART: [cold-reset] ++
1,172,031 UART: [fht] FHT @ 0x50003400
1,174,776 UART: [idev] ++
1,174,944 UART: [idev] CDI.KEYID = 6
1,175,304 UART: [idev] SUBJECT.KEYID = 7
1,175,728 UART: [idev] UDS.KEYID = 0
1,176,073 ready_for_fw is high
1,176,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,864 UART: [idev] Erasing UDS.KEYID = 0
1,200,867 UART: [idev] Sha1 KeyId Algorithm
1,209,149 UART: [idev] --
1,210,245 UART: [ldev] ++
1,210,413 UART: [ldev] CDI.KEYID = 6
1,210,776 UART: [ldev] SUBJECT.KEYID = 5
1,211,202 UART: [ldev] AUTHORITY.KEYID = 7
1,211,665 UART: [ldev] FE.KEYID = 1
1,216,901 UART: [ldev] Erasing FE.KEYID = 1
1,243,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,703 UART: [ldev] --
1,283,026 UART: [fwproc] Wait for Commands...
1,283,760 UART: [fwproc] Recv command 0x46574c44
1,284,488 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,442 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,612 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,805 >>> mbox cmd response: success
2,827,805 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,828,835 UART: [afmc] ++
2,829,003 UART: [afmc] CDI.KEYID = 6
2,829,365 UART: [afmc] SUBJECT.KEYID = 7
2,829,790 UART: [afmc] AUTHORITY.KEYID = 5
2,864,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,232 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,941 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,824 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,525 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,543 UART: [afmc] --
2,908,675 UART: [cold-reset] --
2,909,233 UART: [state] Locking Datavault
2,910,562 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,166 UART: [state] Locking ICCM
2,911,644 UART: [exit] Launching FMC @ 0x40000130
2,916,974 UART:
2,916,990 UART: Running Caliptra FMC ...
2,917,398 UART:
2,917,452 UART: [state] CFI Enabled
2,928,144 UART: [fht] FMC Alias Private Key: 7
3,047,196 UART: [art] Extend RT PCRs Done
3,047,624 UART: [art] Lock RT PCRs Done
3,049,156 UART: [art] Populate DV Done
3,057,153 UART: [fht] FMC Alias Private Key: 7
3,058,179 UART: [art] Derive CDI
3,058,459 UART: [art] Store in slot 0x4
3,144,070 UART: [art] Derive Key Pair
3,144,430 UART: [art] Store priv key in slot 0x5
3,158,012 UART: [art] Derive Key Pair - Done
3,172,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,844 UART: [art] PUB.X = 0451140881A26CFF960DDA6B3E128698CC50A5CA3D83E52B216EA4456DAB698C801F2C944BA791D30CBDB46041BB1D1F
3,195,612 UART: [art] PUB.Y = 6EFEEDB8BF2C0A71DA68D3373E82DEC3984493E0BCF3584DDA4377A0837BEEB28582309A27F56169896213F12B12B8FC
3,202,569 UART: [art] SIG.R = 81705BD94E7682262485FEF60F725E4A198EC4A4D3CBF8B7274D514F67774C8111719E4CD2A4F68671CCFDCBD2ADA5C8
3,209,346 UART: [art] SIG.S = E570B24F27E957F31F8E0DDEE3A05109E2C13E91198420F08A540154B1E41AC5AF252C812E76E416C8A9992FF477F92D
3,233,677 UART: Caliptra RT
3,233,928 UART: [state] CFI Enabled
3,353,820 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,680 UART: [rt]cmd =0xaabbccdd, len=4
3,385,522 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,735 ready_for_fw is high
1,060,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,846 >>> mbox cmd response: success
2,678,846 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,740,943 UART:
2,740,959 UART: Running Caliptra FMC ...
2,741,367 UART:
2,741,421 UART: [state] CFI Enabled
2,751,723 UART: [fht] FMC Alias Private Key: 7
2,870,497 UART: [art] Extend RT PCRs Done
2,870,925 UART: [art] Lock RT PCRs Done
2,872,343 UART: [art] Populate DV Done
2,880,364 UART: [fht] FMC Alias Private Key: 7
2,881,468 UART: [art] Derive CDI
2,881,748 UART: [art] Store in slot 0x4
2,967,891 UART: [art] Derive Key Pair
2,968,251 UART: [art] Store priv key in slot 0x5
2,982,249 UART: [art] Derive Key Pair - Done
2,996,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,242 UART: [art] PUB.X = C5DF6894DEEC993F9F75CCBA1864C18C2D5FE6E4F49F149B8D40A8C011973600F28FE9FCDC7F21B1994C7F4B1765AE70
3,020,006 UART: [art] PUB.Y = 4D46BAFBF57F53CFB13998D63C64735B6FEBCF6317D0BA0703DF1BFB3B5473F65B2B21C17E9EE77945993DC0361CE90E
3,026,963 UART: [art] SIG.R = CB064CCF83EED5D40283A4483E8E3CDD3A7431E8CE4CC0E06A3AA01F7994944F51060500F9BDDEC08EF5E55794CCF0D8
3,033,717 UART: [art] SIG.S = 911B3EC8750870C0874C9271E0B219D6D87A14C8F679D9109AD749E396B15F81086355CCC25ECA44922B8C2BD76004CC
3,057,998 UART: Caliptra RT
3,058,249 UART: [state] CFI Enabled
3,177,871 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,577 UART: [rt]cmd =0xaabbccdd, len=4
3,209,529 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,282 UART: [state] WD Timer not started. Device not locked for debugging
87,457 UART: [kat] SHA2-256
893,107 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,232 UART: [kat] ++
897,384 UART: [kat] sha1
901,596 UART: [kat] SHA2-256
903,536 UART: [kat] SHA2-384
906,271 UART: [kat] SHA2-512-ACC
908,172 UART: [kat] ECC-384
917,911 UART: [kat] HMAC-384Kdf
922,683 UART: [kat] LMS
1,171,011 UART: [kat] --
1,172,018 UART: [cold-reset] ++
1,172,460 UART: [fht] FHT @ 0x50003400
1,175,211 UART: [idev] ++
1,175,379 UART: [idev] CDI.KEYID = 6
1,175,739 UART: [idev] SUBJECT.KEYID = 7
1,176,163 UART: [idev] UDS.KEYID = 0
1,176,508 ready_for_fw is high
1,176,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,033 UART: [idev] Erasing UDS.KEYID = 0
1,201,166 UART: [idev] Sha1 KeyId Algorithm
1,209,534 UART: [idev] --
1,210,562 UART: [ldev] ++
1,210,730 UART: [ldev] CDI.KEYID = 6
1,211,093 UART: [ldev] SUBJECT.KEYID = 5
1,211,519 UART: [ldev] AUTHORITY.KEYID = 7
1,211,982 UART: [ldev] FE.KEYID = 1
1,217,522 UART: [ldev] Erasing FE.KEYID = 1
1,243,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,904 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,057 UART: [fwproc] Recv command 0x46574c44
1,284,785 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,093 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,263 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,532 >>> mbox cmd response: success
2,826,532 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,827,726 UART: [afmc] ++
2,827,894 UART: [afmc] CDI.KEYID = 6
2,828,256 UART: [afmc] SUBJECT.KEYID = 7
2,828,681 UART: [afmc] AUTHORITY.KEYID = 5
2,864,540 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,991 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,739 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,448 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,331 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,032 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,034 UART: [afmc] --
2,907,912 UART: [cold-reset] --
2,908,816 UART: [state] Locking Datavault
2,910,127 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,731 UART: [state] Locking ICCM
2,911,329 UART: [exit] Launching FMC @ 0x40000130
2,916,659 UART:
2,916,675 UART: Running Caliptra FMC ...
2,917,083 UART:
2,917,226 UART: [state] CFI Enabled
2,927,806 UART: [fht] FMC Alias Private Key: 7
3,047,938 UART: [art] Extend RT PCRs Done
3,048,366 UART: [art] Lock RT PCRs Done
3,050,242 UART: [art] Populate DV Done
3,058,379 UART: [fht] FMC Alias Private Key: 7
3,059,441 UART: [art] Derive CDI
3,059,721 UART: [art] Store in slot 0x4
3,145,512 UART: [art] Derive Key Pair
3,145,872 UART: [art] Store priv key in slot 0x5
3,159,176 UART: [art] Derive Key Pair - Done
3,174,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,166 UART: [art] PUB.X = 9760A6EE73ACA2F5F48514A9D5648732BCDC9315B483E69BEC7F96DA7F8AC50BAB7C76B38A3F041F76835B51BB4D24C1
3,196,944 UART: [art] PUB.Y = A767AE01D6DB3865ADA5E5147DBB0C29ADE5FBB4E7DF5A6233802707D83595620122C574200725F5B73765A134E098B8
3,203,879 UART: [art] SIG.R = 547B774F3991E15693CCD66CB93EF318F5006D5679BF7BE263339C94999CBF6BC3AA1E127E31A596C805FA580A78DD61
3,210,625 UART: [art] SIG.S = 04302A3A743EC621A9B62678005C642E01AE09FEF43ADFB111E3CCB58735C459DFB26E3B2714F00C272525F0BCF6599A
3,234,685 UART: Caliptra RT
3,235,028 UART: [state] CFI Enabled
3,353,608 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,068 UART: [rt]cmd =0xaabbccdd, len=4
3,384,934 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,572 ready_for_fw is high
1,060,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,639 >>> mbox cmd response: success
2,678,639 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,740,476 UART:
2,740,492 UART: Running Caliptra FMC ...
2,740,900 UART:
2,741,043 UART: [state] CFI Enabled
2,751,227 UART: [fht] FMC Alias Private Key: 7
2,870,371 UART: [art] Extend RT PCRs Done
2,870,799 UART: [art] Lock RT PCRs Done
2,872,329 UART: [art] Populate DV Done
2,880,592 UART: [fht] FMC Alias Private Key: 7
2,881,706 UART: [art] Derive CDI
2,881,986 UART: [art] Store in slot 0x4
2,968,037 UART: [art] Derive Key Pair
2,968,397 UART: [art] Store priv key in slot 0x5
2,982,037 UART: [art] Derive Key Pair - Done
2,997,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,524 UART: [art] PUB.X = 06A0241B9EC9D4D832243F92C788155B59A78C34EB181FE3555FBFDD3390F94F0FB838C9BC91DD8B89E185605C7CB261
3,020,294 UART: [art] PUB.Y = C1C69ABDA1D996A184704502385B36019429E4AF011B6438098BE74D3309A313573F382828BE02B14C0A2DA8AF270E52
3,027,214 UART: [art] SIG.R = 6A78FCE55B5B7B4E8AE1BC49574F56B4E12C15D79EE5C54C8C11F6DC09A34494E2E7C77978586E23B180FD5260B49A00
3,033,967 UART: [art] SIG.S = 446EA210204339D1C285D3108009ADB840C1C63D56137351F668433D8E701239E85313F38626B0FF9FB80111D91DDC5E
3,057,325 UART: Caliptra RT
3,057,668 UART: [state] CFI Enabled
3,177,550 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,324 UART: [rt]cmd =0xaabbccdd, len=4
3,209,230 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,082 UART:
192,443 UART: Running Caliptra ROM ...
193,551 UART:
193,695 UART: [state] CFI Enabled
265,023 UART: [state] LifecycleState = Unprovisioned
267,009 UART: [state] DebugLocked = No
268,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,862 UART: [kat] SHA2-256
442,561 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,051 UART: [kat] ++
453,507 UART: [kat] sha1
462,979 UART: [kat] SHA2-256
465,684 UART: [kat] SHA2-384
471,187 UART: [kat] SHA2-512-ACC
473,560 UART: [kat] ECC-384
2,765,676 UART: [kat] HMAC-384Kdf
2,799,327 UART: [kat] LMS
3,989,671 UART: [kat] --
3,993,981 UART: [cold-reset] ++
3,995,065 UART: [fht] Storing FHT @ 0x50003400
4,007,425 UART: [idev] ++
4,008,002 UART: [idev] CDI.KEYID = 6
4,008,970 UART: [idev] SUBJECT.KEYID = 7
4,010,222 UART: [idev] UDS.KEYID = 0
4,011,201 ready_for_fw is high
4,011,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,507 UART: [idev] Erasing UDS.KEYID = 0
7,345,230 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,778 UART: [idev] --
7,371,787 UART: [ldev] ++
7,372,355 UART: [ldev] CDI.KEYID = 6
7,373,295 UART: [ldev] SUBJECT.KEYID = 5
7,374,525 UART: [ldev] AUTHORITY.KEYID = 7
7,375,760 UART: [ldev] FE.KEYID = 1
7,422,244 UART: [ldev] Erasing FE.KEYID = 1
10,754,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,353 UART: [ldev] --
13,114,735 UART: [fwproc] Waiting for Commands...
13,117,314 UART: [fwproc] Received command 0x46574c44
13,119,497 UART: [fwproc] Received Image of size 118548 bytes
17,227,335 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,797 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,380,986 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,709,375 >>> mbox cmd response: success
17,714,381 UART: [afmc] ++
17,715,006 UART: [afmc] CDI.KEYID = 6
17,715,930 UART: [afmc] SUBJECT.KEYID = 7
17,717,154 UART: [afmc] AUTHORITY.KEYID = 5
21,063,287 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,528 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,811 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,289 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,002 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,401 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,438,078 UART: [afmc] --
23,441,283 UART: [cold-reset] --
23,444,821 UART: [state] Locking Datavault
23,449,747 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,503 UART: [state] Locking ICCM
23,453,717 UART: [exit] Launching FMC @ 0x40000130
23,462,107 UART:
23,462,347 UART: Running Caliptra FMC ...
23,463,467 UART:
23,463,637 UART: [state] CFI Enabled
23,514,183 UART: [fht] FMC Alias Private Key: 7
25,854,598 UART: [art] Extend RT PCRs Done
25,856,321 UART: [art] Lock RT PCRs Done
25,857,332 UART: [art] Populate DV Done
25,862,766 UART: [fht] FMC Alias Private Key: 7
25,864,302 UART: [art] Derive CDI
25,865,086 UART: [art] Store in slot 0x4
25,924,637 UART: [art] Derive Key Pair
25,925,673 UART: [art] Store priv key in slot 0x5
29,218,713 UART: [art] Derive Key Pair - Done
29,231,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,520,148 UART: [art] Erasing AUTHORITY.KEYID = 7
31,521,693 UART: [art] PUB.X = 0293E8B591311E4BBDDABCD14D62647F33D65A59504BA6E285294E4CA974BC52E432F510D40284F55EA983DB00FCC209
31,528,872 UART: [art] PUB.Y = 96E08F56EFAA83AE690DD0844EE1CFD8F138F6A9FBBA22EDF562688D9AB9FE5E37E23F0AA5DB1CF05E218D6C727ACFA5
31,536,177 UART: [art] SIG.R = 5F9F8E1B07EF9F6D51D9012983142B5B6FF5CF9128E8BAE91C358DE83C43D526D44275150328B270E701427C0236747B
31,543,535 UART: [art] SIG.S = 47583C04026234CBEAE88458C1FB3D84BDEE3B740C929E21B321D6612F4C12E575962710F9B27555568D484C13D4C1B6
32,848,559 UART: Caliptra RT
32,849,278 UART: [state] CFI Enabled
33,025,243 UART: [rt] RT listening for mailbox commands...
33,027,142 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,057,670 UART: [rt]cmd =0x434b4558, len=80
33,059,006 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,806,139 ready_for_fw is high
3,806,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,985,722 >>> mbox cmd response: success
23,670,178 UART:
23,670,579 UART: Running Caliptra FMC ...
23,671,783 UART:
23,671,957 UART: [state] CFI Enabled
23,738,768 UART: [fht] FMC Alias Private Key: 7
26,079,036 UART: [art] Extend RT PCRs Done
26,080,278 UART: [art] Lock RT PCRs Done
26,082,080 UART: [art] Populate DV Done
26,087,615 UART: [fht] FMC Alias Private Key: 7
26,089,268 UART: [art] Derive CDI
26,090,085 UART: [art] Store in slot 0x4
26,147,299 UART: [art] Derive Key Pair
26,148,341 UART: [art] Store priv key in slot 0x5
29,441,176 UART: [art] Derive Key Pair - Done
29,454,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,813 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,364 UART: [art] PUB.X = 83A8F8F2E44A6393EA22C386B6373E14D3CDCFAB80925A657EBE65D2F97F728BE9923F19C4F3EF1D5960BCC84598D774
31,750,639 UART: [art] PUB.Y = 7BFF02A1E12656A5796290CFE4391DD66DA01BF9508251DABB96E83D417645E813E0859F483C05FFAC13C94617683F3B
31,757,856 UART: [art] SIG.R = EA010D1463C63D87D5035C4976BB0DCFCC9FA090D82FDAFEA8C13EEEC7DF69EAA6DDB968DB002B136AF0497AE605B233
31,765,262 UART: [art] SIG.S = 4CC17EF9800F7AAD29D0EFFD74A5F86B3BC7B697CF48585D7C56D862D16A8D5280A68D4020B22E332D531138A580D56E
33,070,975 UART: Caliptra RT
33,071,698 UART: [state] CFI Enabled
33,247,731 UART: [rt] RT listening for mailbox commands...
33,249,622 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,279,871 UART: [rt]cmd =0x434b4558, len=80
33,281,412 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,504 UART:
192,870 UART: Running Caliptra ROM ...
194,061 UART:
603,772 UART: [state] CFI Enabled
620,429 UART: [state] LifecycleState = Unprovisioned
622,375 UART: [state] DebugLocked = No
624,114 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,322 UART: [kat] SHA2-256
799,059 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,603 UART: [kat] ++
810,050 UART: [kat] sha1
822,194 UART: [kat] SHA2-256
824,918 UART: [kat] SHA2-384
832,292 UART: [kat] SHA2-512-ACC
834,650 UART: [kat] ECC-384
3,119,067 UART: [kat] HMAC-384Kdf
3,129,953 UART: [kat] LMS
4,320,080 UART: [kat] --
4,326,065 UART: [cold-reset] ++
4,328,285 UART: [fht] Storing FHT @ 0x50003400
4,339,337 UART: [idev] ++
4,339,894 UART: [idev] CDI.KEYID = 6
4,340,867 UART: [idev] SUBJECT.KEYID = 7
4,342,107 UART: [idev] UDS.KEYID = 0
4,343,081 ready_for_fw is high
4,343,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,153 UART: [idev] Erasing UDS.KEYID = 0
7,628,136 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,071 UART: [idev] --
7,655,236 UART: [ldev] ++
7,655,830 UART: [ldev] CDI.KEYID = 6
7,656,845 UART: [ldev] SUBJECT.KEYID = 5
7,657,998 UART: [ldev] AUTHORITY.KEYID = 7
7,659,222 UART: [ldev] FE.KEYID = 1
7,670,184 UART: [ldev] Erasing FE.KEYID = 1
10,960,479 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,733 UART: [ldev] --
13,322,571 UART: [fwproc] Waiting for Commands...
13,325,207 UART: [fwproc] Received command 0x46574c44
13,327,382 UART: [fwproc] Received Image of size 118548 bytes
17,434,001 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,510,915 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,584,119 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,912,263 >>> mbox cmd response: success
17,917,152 UART: [afmc] ++
17,917,770 UART: [afmc] CDI.KEYID = 6
17,918,653 UART: [afmc] SUBJECT.KEYID = 7
17,919,923 UART: [afmc] AUTHORITY.KEYID = 5
21,234,179 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,912 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,531,171 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,614 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,560,337 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,704 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,566 UART: [afmc] --
23,600,044 UART: [cold-reset] --
23,605,254 UART: [state] Locking Datavault
23,610,387 UART: [state] Locking PCR0, PCR1 and PCR31
23,612,094 UART: [state] Locking ICCM
23,614,484 UART: [exit] Launching FMC @ 0x40000130
23,622,868 UART:
23,623,101 UART: Running Caliptra FMC ...
23,624,121 UART:
23,624,264 UART: [state] CFI Enabled
23,632,088 UART: [fht] FMC Alias Private Key: 7
25,971,531 UART: [art] Extend RT PCRs Done
25,972,749 UART: [art] Lock RT PCRs Done
25,974,347 UART: [art] Populate DV Done
25,979,485 UART: [fht] FMC Alias Private Key: 7
25,981,065 UART: [art] Derive CDI
25,981,799 UART: [art] Store in slot 0x4
26,024,381 UART: [art] Derive Key Pair
26,025,370 UART: [art] Store priv key in slot 0x5
29,267,864 UART: [art] Derive Key Pair - Done
29,280,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,977 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,482 UART: [art] PUB.X = 2952AE0D890C34CBF81DDC44BF311034B5106AE6305F81AA45DF461D0918069D17F0000430D5CC4B0040162E32F1CAD0
31,569,687 UART: [art] PUB.Y = B16D8711856579BBE123CB0EDDB45D0F976F7BA97D03308D829273C06DF3AF2A3F2B7CEF6B55D5DD30507C33D79CFA6D
31,576,981 UART: [art] SIG.R = 1730B943C650B4FBE9A450E3D1FA7EF386DF1B593EDF62B957F50F1FDFECCABDF521FB5FA05D23B1075CCCB42C7C4507
31,584,371 UART: [art] SIG.S = E41C6C57992DDBE507F99A4482B6A4C3E257186D6BF022FD975AD1849D42F488F7AFB7B60215243659E76726D68CB298
32,890,224 UART: Caliptra RT
32,890,936 UART: [state] CFI Enabled
33,025,295 UART: [rt] RT listening for mailbox commands...
33,027,178 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,057,796 UART: [rt]cmd =0x434b4558, len=80
33,059,394 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
4,128,170 ready_for_fw is high
4,128,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,185 >>> mbox cmd response: success
23,789,544 UART:
23,789,956 UART: Running Caliptra FMC ...
23,791,078 UART:
23,791,242 UART: [state] CFI Enabled
23,799,071 UART: [fht] FMC Alias Private Key: 7
26,138,939 UART: [art] Extend RT PCRs Done
26,140,171 UART: [art] Lock RT PCRs Done
26,142,016 UART: [art] Populate DV Done
26,147,384 UART: [fht] FMC Alias Private Key: 7
26,149,027 UART: [art] Derive CDI
26,149,837 UART: [art] Store in slot 0x4
26,192,670 UART: [art] Derive Key Pair
26,193,708 UART: [art] Store priv key in slot 0x5
29,435,957 UART: [art] Derive Key Pair - Done
29,449,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,370 UART: [art] Erasing AUTHORITY.KEYID = 7
31,730,867 UART: [art] PUB.X = E18AB8E54000EB7BA75E1674952D8AD6066B9C376230E547570644E19AA17EE0B7F5D0360778F8280D500D7C4BCE6201
31,738,108 UART: [art] PUB.Y = 94EF7DD33232BFFED321B0AF3A29E819906D3FDA192D1E18F810910D12B58A5F1DC0A0BF798E580CA5ECF08322EA1A29
31,745,407 UART: [art] SIG.R = 38C448422C5607849DF9491488E9282C8DA09CB3812CEF4B38804E5F8732AFDA61A8F10D65EF5E5E126E8B5C4BA6A5F1
31,752,741 UART: [art] SIG.S = CF55036E5E6511B51FFD4B27146A1E91F3B65503C470135EFFB49E8D54D7B7A6E35A8B5DE2DF0C14111CDA30E3B0C80F
33,058,062 UART: Caliptra RT
33,058,764 UART: [state] CFI Enabled
33,191,973 UART: [rt] RT listening for mailbox commands...
33,193,855 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,224,154 UART: [rt]cmd =0x434b4558, len=80
33,225,506 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,148 UART:
192,507 UART: Running Caliptra ROM ...
193,699 UART:
193,854 UART: [state] CFI Enabled
270,089 UART: [state] LifecycleState = Unprovisioned
272,010 UART: [state] DebugLocked = No
274,241 UART: [state] WD Timer not started. Device not locked for debugging
278,057 UART: [kat] SHA2-256
457,725 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
468,489 UART: [kat] ++
468,937 UART: [kat] sha1
479,880 UART: [kat] SHA2-256
482,529 UART: [kat] SHA2-384
488,039 UART: [kat] SHA2-512-ACC
490,405 UART: [kat] ECC-384
2,950,623 UART: [kat] HMAC-384Kdf
2,971,531 UART: [kat] LMS
3,447,991 UART: [kat] --
3,452,838 UART: [cold-reset] ++
3,454,830 UART: [fht] FHT @ 0x50003400
3,466,791 UART: [idev] ++
3,467,345 UART: [idev] CDI.KEYID = 6
3,468,297 UART: [idev] SUBJECT.KEYID = 7
3,469,539 UART: [idev] UDS.KEYID = 0
3,470,431 ready_for_fw is high
3,470,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,762 UART: [idev] Erasing UDS.KEYID = 0
5,987,295 UART: [idev] Sha1 KeyId Algorithm
6,010,911 UART: [idev] --
6,016,656 UART: [ldev] ++
6,017,285 UART: [ldev] CDI.KEYID = 6
6,018,209 UART: [ldev] SUBJECT.KEYID = 5
6,019,369 UART: [ldev] AUTHORITY.KEYID = 7
6,020,651 UART: [ldev] FE.KEYID = 1
6,064,855 UART: [ldev] Erasing FE.KEYID = 1
8,569,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,308,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,323,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,339,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,355,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,376,863 UART: [ldev] --
10,382,946 UART: [fwproc] Wait for Commands...
10,385,249 UART: [fwproc] Recv command 0x46574c44
10,387,226 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,414 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,417 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,351,025 >>> mbox cmd response: success
14,355,688 UART: [afmc] ++
14,356,307 UART: [afmc] CDI.KEYID = 6
14,357,221 UART: [afmc] SUBJECT.KEYID = 7
14,358,434 UART: [afmc] AUTHORITY.KEYID = 5
16,905,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,627,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,629,743 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,645,584 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,661,627 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,677,172 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,702,399 UART: [afmc] --
18,705,736 UART: [cold-reset] --
18,710,622 UART: [state] Locking Datavault
18,715,347 UART: [state] Locking PCR0, PCR1 and PCR31
18,717,096 UART: [state] Locking ICCM
18,718,313 UART: [exit] Launching FMC @ 0x40000130
18,726,706 UART:
18,726,938 UART: Running Caliptra FMC ...
18,728,031 UART:
18,728,189 UART: [state] CFI Enabled
18,784,004 UART: [fht] FMC Alias Private Key: 7
20,550,013 UART: [art] Extend RT PCRs Done
20,551,235 UART: [art] Lock RT PCRs Done
20,552,859 UART: [art] Populate DV Done
20,558,214 UART: [fht] FMC Alias Private Key: 7
20,559,959 UART: [art] Derive CDI
20,560,763 UART: [art] Store in slot 0x4
20,616,768 UART: [art] Derive Key Pair
20,617,806 UART: [art] Store priv key in slot 0x5
23,080,158 UART: [art] Derive Key Pair - Done
23,093,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,806,544 UART: [art] Erasing AUTHORITY.KEYID = 7
24,808,050 UART: [art] PUB.X = 41D885A492ED033D9B7AF71E5FF596C1AC0F39DC3F59BDC3C72C562B4EFD313995B3F04FF8849C0F4B1EAD21A9025F16
24,815,308 UART: [art] PUB.Y = 176E0A70A2478682B72540714F7A74D9707FD30F5B1971F9896492DE01CE66C7A9514D348D7BA628F302814071BC37E1
24,822,544 UART: [art] SIG.R = 8A0942CF114BCEFA03734321C41D80D6667A77996B2877D977E6AECCDCC716C564BB756FB51098E0D267AE3E38E08D70
24,829,930 UART: [art] SIG.S = 3B2B6D09F60E5FA73AFBD7E81531E97449013A71A8C15F9EFF2596036C7189367CE1D8EC98CAB74625F5C00C1FCE9FA5
25,809,178 UART: Caliptra RT
25,809,891 UART: [state] CFI Enabled
25,989,809 UART: [rt] RT listening for mailbox commands...
25,991,694 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,022,362 UART: [rt]cmd =0x434b4558, len=80
26,023,804 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,463,632 ready_for_fw is high
3,464,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,223,491 >>> mbox cmd response: success
18,515,036 UART:
18,515,437 UART: Running Caliptra FMC ...
18,516,587 UART:
18,516,747 UART: [state] CFI Enabled
18,581,335 UART: [fht] FMC Alias Private Key: 7
20,348,190 UART: [art] Extend RT PCRs Done
20,349,415 UART: [art] Lock RT PCRs Done
20,351,204 UART: [art] Populate DV Done
20,356,297 UART: [fht] FMC Alias Private Key: 7
20,357,831 UART: [art] Derive CDI
20,358,609 UART: [art] Store in slot 0x4
20,413,422 UART: [art] Derive Key Pair
20,414,413 UART: [art] Store priv key in slot 0x5
22,877,298 UART: [art] Derive Key Pair - Done
22,890,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,515 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,997 UART: [art] PUB.X = ED362BA93D464F5AA936AEC18FEB9E6AE6A0598E65D4288E9B41D94B2DA0C63D3B8C12A21169E0D3B84E4EDDEDC01DE6
24,611,354 UART: [art] PUB.Y = D2FD869A06DF5B70202EB34BBCD84E4AD3BCF84B9EE2DF39F677996F4AF0BB14196A57F781BBD4A9FF0870DE47F2F949
24,618,650 UART: [art] SIG.R = F21383A3D42C8B7A31177FE542CA2464E5F7C61C0CBE734C23FE0A0B136EF595A98C1CF629B7FDF11B049C9360A51084
24,626,051 UART: [art] SIG.S = 4D5420F5105AFBA28E1A21D8C10747230FF68AC0716D7A1D7540442E6210B985DFBFE1A501EB2D552B74E879F64F7ED7
25,605,291 UART: Caliptra RT
25,605,996 UART: [state] CFI Enabled
25,786,165 UART: [rt] RT listening for mailbox commands...
25,788,050 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,818,566 UART: [rt]cmd =0x434b4558, len=80
25,820,000 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,111 writing to cptra_bootfsm_go
193,424 UART:
193,779 UART: Running Caliptra ROM ...
194,880 UART:
604,585 UART: [state] CFI Enabled
615,887 UART: [state] LifecycleState = Unprovisioned
617,773 UART: [state] DebugLocked = No
620,515 UART: [state] WD Timer not started. Device not locked for debugging
625,260 UART: [kat] SHA2-256
804,918 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,722 UART: [kat] ++
816,262 UART: [kat] sha1
828,071 UART: [kat] SHA2-256
830,736 UART: [kat] SHA2-384
836,370 UART: [kat] SHA2-512-ACC
838,741 UART: [kat] ECC-384
3,281,321 UART: [kat] HMAC-384Kdf
3,293,447 UART: [kat] LMS
3,769,941 UART: [kat] --
3,774,082 UART: [cold-reset] ++
3,775,877 UART: [fht] FHT @ 0x50003400
3,786,450 UART: [idev] ++
3,787,027 UART: [idev] CDI.KEYID = 6
3,787,920 UART: [idev] SUBJECT.KEYID = 7
3,789,242 UART: [idev] UDS.KEYID = 0
3,790,160 ready_for_fw is high
3,790,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,416 UART: [idev] Erasing UDS.KEYID = 0
6,268,498 UART: [idev] Sha1 KeyId Algorithm
6,291,270 UART: [idev] --
6,295,717 UART: [ldev] ++
6,296,297 UART: [ldev] CDI.KEYID = 6
6,297,190 UART: [ldev] SUBJECT.KEYID = 5
6,298,404 UART: [ldev] AUTHORITY.KEYID = 7
6,299,694 UART: [ldev] FE.KEYID = 1
6,309,394 UART: [ldev] Erasing FE.KEYID = 1
8,787,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,313 UART: [ldev] --
10,583,765 UART: [fwproc] Wait for Commands...
10,585,699 UART: [fwproc] Recv command 0x46574c44
10,587,689 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,985 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,044 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,853 >>> mbox cmd response: success
14,554,491 UART: [afmc] ++
14,555,097 UART: [afmc] CDI.KEYID = 6
14,556,048 UART: [afmc] SUBJECT.KEYID = 7
14,557,270 UART: [afmc] AUTHORITY.KEYID = 5
17,062,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,490 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,316 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,419 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,833,960 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,858,070 UART: [afmc] --
18,861,614 UART: [cold-reset] --
18,865,156 UART: [state] Locking Datavault
18,872,568 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,325 UART: [state] Locking ICCM
18,876,706 UART: [exit] Launching FMC @ 0x40000130
18,885,110 UART:
18,885,386 UART: Running Caliptra FMC ...
18,886,498 UART:
18,886,657 UART: [state] CFI Enabled
18,894,783 UART: [fht] FMC Alias Private Key: 7
20,661,304 UART: [art] Extend RT PCRs Done
20,662,521 UART: [art] Lock RT PCRs Done
20,664,225 UART: [art] Populate DV Done
20,669,589 UART: [fht] FMC Alias Private Key: 7
20,671,289 UART: [art] Derive CDI
20,672,028 UART: [art] Store in slot 0x4
20,714,734 UART: [art] Derive Key Pair
20,715,731 UART: [art] Store priv key in slot 0x5
23,142,486 UART: [art] Derive Key Pair - Done
23,155,422 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,934 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,415 UART: [art] PUB.X = F6372F4A87424C94BADDC1D067D8F6182D6E567154AC465781B999529E2C12A462D8EA237BDD61F6530D36DC13766057
24,870,711 UART: [art] PUB.Y = 39AD7F387835EA5679588AF25083FC039706143D4652C98D6D57317A3B3299346CC7094270884EAFA33DFDB3F499B09C
24,877,992 UART: [art] SIG.R = DEA8673B027067254043AB856F94D4B9AC26B6579CDBA24B1F0C89872ECCE3147C61DF177C1CD91BA36B5004AB45AD92
24,885,406 UART: [art] SIG.S = EFF6C0381F16726CAF09FECB475AAD024549D73A0A578233DB633E4FDE1564773FB77BB5AE3292594687FE92BCCF858B
25,864,190 UART: Caliptra RT
25,864,897 UART: [state] CFI Enabled
25,997,783 UART: [rt] RT listening for mailbox commands...
25,999,665 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,030,393 UART: [rt]cmd =0x434b4558, len=80
26,031,973 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,778,635 ready_for_fw is high
3,779,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,398 >>> mbox cmd response: success
18,691,377 UART:
18,691,772 UART: Running Caliptra FMC ...
18,692,922 UART:
18,693,086 UART: [state] CFI Enabled
18,700,950 UART: [fht] FMC Alias Private Key: 7
20,467,028 UART: [art] Extend RT PCRs Done
20,468,260 UART: [art] Lock RT PCRs Done
20,469,887 UART: [art] Populate DV Done
20,475,369 UART: [fht] FMC Alias Private Key: 7
20,477,073 UART: [art] Derive CDI
20,477,814 UART: [art] Store in slot 0x4
20,520,356 UART: [art] Derive Key Pair
20,521,359 UART: [art] Store priv key in slot 0x5
22,948,295 UART: [art] Derive Key Pair - Done
22,961,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,869 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,372 UART: [art] PUB.X = F70AB481E10B99CE8383B88DFDFF8D151DFF7566BFB4A5373756366FB402D5E3D626FA00EBDCFC90CAFD04D157EC99A0
24,676,631 UART: [art] PUB.Y = E1D3EDC02472F759C4E64195C569D2AFCC8A2611DC367CF9871151142D0A1E9D3BF8B959E56661C94A635D7ADEA28D76
24,683,898 UART: [art] SIG.R = 92578F88AB60318094D1FC01D8218C0E75F81DB3342232B84A12D0BFA783A7FB9A3796F9E73FC6279EBFBC8A8A788EE7
24,691,303 UART: [art] SIG.S = 5DCF9A960650A84CC8A904553785E1DFB2F044582AF9C9A2BB93EC66B3922C4C193F0222DD3E9A929A6CC089F1D9A325
25,670,268 UART: Caliptra RT
25,670,978 UART: [state] CFI Enabled
25,803,214 UART: [rt] RT listening for mailbox commands...
25,805,097 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,835,723 UART: [rt]cmd =0x434b4558, len=80
25,837,081 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
192,164 UART:
192,526 UART: Running Caliptra ROM ...
193,706 UART:
193,855 UART: [state] CFI Enabled
261,887 UART: [state] LifecycleState = Unprovisioned
264,229 UART: [state] DebugLocked = No
266,117 UART: [state] WD Timer not started. Device not locked for debugging
270,220 UART: [kat] SHA2-256
460,085 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,859 UART: [kat] ++
471,348 UART: [kat] sha1
481,555 UART: [kat] SHA2-256
484,575 UART: [kat] SHA2-384
490,565 UART: [kat] SHA2-512-ACC
493,160 UART: [kat] ECC-384
2,947,953 UART: [kat] HMAC-384Kdf
2,973,291 UART: [kat] LMS
3,505,089 UART: [kat] --
3,506,803 UART: [cold-reset] ++
3,508,730 UART: [fht] FHT @ 0x50003400
3,520,207 UART: [idev] ++
3,520,878 UART: [idev] CDI.KEYID = 6
3,521,862 UART: [idev] SUBJECT.KEYID = 7
3,523,038 UART: [idev] UDS.KEYID = 0
3,523,963 ready_for_fw is high
3,524,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,187 UART: [idev] Erasing UDS.KEYID = 0
6,027,703 UART: [idev] Sha1 KeyId Algorithm
6,050,719 UART: [idev] --
6,055,580 UART: [ldev] ++
6,056,343 UART: [ldev] CDI.KEYID = 6
6,057,233 UART: [ldev] SUBJECT.KEYID = 5
6,058,331 UART: [ldev] AUTHORITY.KEYID = 7
6,059,561 UART: [ldev] FE.KEYID = 1
6,101,018 UART: [ldev] Erasing FE.KEYID = 1
8,608,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,498 UART: [ldev] --
10,415,207 UART: [fwproc] Wait for Commands...
10,417,040 UART: [fwproc] Recv command 0x46574c44
10,419,296 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,696 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,310 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,868 >>> mbox cmd response: success
14,677,881 UART: [afmc] ++
14,678,612 UART: [afmc] CDI.KEYID = 6
14,679,808 UART: [afmc] SUBJECT.KEYID = 7
14,681,170 UART: [afmc] AUTHORITY.KEYID = 5
17,217,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,412 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,336 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,417 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,582 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,447 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,462 UART: [afmc] --
19,012,196 UART: [cold-reset] --
19,016,223 UART: [state] Locking Datavault
19,023,364 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,530 UART: [state] Locking ICCM
19,027,284 UART: [exit] Launching FMC @ 0x40000130
19,035,911 UART:
19,036,197 UART: Running Caliptra FMC ...
19,037,311 UART:
19,037,468 UART: [state] CFI Enabled
19,097,019 UART: [fht] FMC Alias Private Key: 7
20,863,931 UART: [art] Extend RT PCRs Done
20,865,148 UART: [art] Lock RT PCRs Done
20,866,799 UART: [art] Populate DV Done
20,872,009 UART: [fht] FMC Alias Private Key: 7
20,873,484 UART: [art] Derive CDI
20,874,253 UART: [art] Store in slot 0x4
20,929,890 UART: [art] Derive Key Pair
20,930,893 UART: [art] Store priv key in slot 0x5
23,393,933 UART: [art] Derive Key Pair - Done
23,406,726 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,915 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,419 UART: [art] PUB.X = C0E82A5A15C2449583EDDCA77AE50C21CC1D72481ECF7508A2C6F98CDF0F03A8B0B71CD0AE19D44E211C82D8DFA0C5AB
25,128,694 UART: [art] PUB.Y = 144A82E29E78C46FDF78C6D2865C4D8098DC3C4569A0127F310AC072A7751D8A8B42D240B8B4370894BCCDA73563E818
25,135,960 UART: [art] SIG.R = 0B9D9FCB8F0FDA762D0955BC8D9846E53F035ADC57A1B856D231686D7EB92A9A58D73F2AC9EB3852080415783EB9AC68
25,143,330 UART: [art] SIG.S = D209C497628FF34C64605602A0AD3FA426597F7D64E74D701C742613DBA9438D9D605BCBB7492A51FC58240F9C862211
26,122,251 UART: Caliptra RT
26,122,965 UART: [state] CFI Enabled
26,304,229 UART: [rt] RT listening for mailbox commands...
26,306,114 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,336,346 UART: [rt]cmd =0x434b4558, len=80
26,337,702 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,437,488 ready_for_fw is high
3,437,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,838,840 >>> mbox cmd response: success
19,151,719 UART:
19,152,108 UART: Running Caliptra FMC ...
19,153,213 UART:
19,153,360 UART: [state] CFI Enabled
19,221,580 UART: [fht] FMC Alias Private Key: 7
20,988,137 UART: [art] Extend RT PCRs Done
20,989,368 UART: [art] Lock RT PCRs Done
20,991,162 UART: [art] Populate DV Done
20,996,692 UART: [fht] FMC Alias Private Key: 7
20,998,243 UART: [art] Derive CDI
20,999,004 UART: [art] Store in slot 0x4
21,054,059 UART: [art] Derive Key Pair
21,055,114 UART: [art] Store priv key in slot 0x5
23,518,441 UART: [art] Derive Key Pair - Done
23,531,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,243,803 UART: [art] Erasing AUTHORITY.KEYID = 7
25,245,309 UART: [art] PUB.X = A47E0E6362D0E3ACE5A1584B9C1CCC0837BC40640704F3F5F9502853633C94AD66B48EAA1B39B894F53CE6B8A7EC55D1
25,252,597 UART: [art] PUB.Y = D1F4B227B7C2E79F65CF2F77098210125E7897921C7400324B74538EB9D2C5ADEB003E2415771F226C654600AC3B1F50
25,259,786 UART: [art] SIG.R = 60D2D7F08E1EFC1382CCA25C28F0A86F8D69EF53EAAC17941417075443AB31D6FB511B35DDCFC729F6935C8D6384509E
25,267,168 UART: [art] SIG.S = 125FDA0CEE590AA667BD933C411B74430BABDB2C510A543D3323870C30551B04E85C780824DFAA243E327B44B475676F
26,246,226 UART: Caliptra RT
26,246,959 UART: [state] CFI Enabled
26,426,504 UART: [rt] RT listening for mailbox commands...
26,428,395 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,458,648 UART: [rt]cmd =0x434b4558, len=80
26,460,055 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,541 UART:
192,911 UART: Running Caliptra ROM ...
194,108 UART:
603,731 UART: [state] CFI Enabled
618,626 UART: [state] LifecycleState = Unprovisioned
621,043 UART: [state] DebugLocked = No
622,590 UART: [state] WD Timer not started. Device not locked for debugging
626,433 UART: [kat] SHA2-256
816,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,153 UART: [kat] ++
827,604 UART: [kat] sha1
838,552 UART: [kat] SHA2-256
841,581 UART: [kat] SHA2-384
846,761 UART: [kat] SHA2-512-ACC
849,296 UART: [kat] ECC-384
3,289,756 UART: [kat] HMAC-384Kdf
3,302,777 UART: [kat] LMS
3,834,574 UART: [kat] --
3,838,287 UART: [cold-reset] ++
3,839,364 UART: [fht] FHT @ 0x50003400
3,851,192 UART: [idev] ++
3,851,852 UART: [idev] CDI.KEYID = 6
3,852,813 UART: [idev] SUBJECT.KEYID = 7
3,853,938 UART: [idev] UDS.KEYID = 0
3,854,929 ready_for_fw is high
3,855,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,498 UART: [idev] Erasing UDS.KEYID = 0
6,335,325 UART: [idev] Sha1 KeyId Algorithm
6,358,022 UART: [idev] --
6,363,646 UART: [ldev] ++
6,364,371 UART: [ldev] CDI.KEYID = 6
6,365,266 UART: [ldev] SUBJECT.KEYID = 5
6,366,378 UART: [ldev] AUTHORITY.KEYID = 7
6,367,670 UART: [ldev] FE.KEYID = 1
6,380,453 UART: [ldev] Erasing FE.KEYID = 1
8,856,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,905 UART: [ldev] --
10,649,962 UART: [fwproc] Wait for Commands...
10,652,981 UART: [fwproc] Recv command 0x46574c44
10,655,293 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,230,686 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,317 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,273 >>> mbox cmd response: success
14,920,211 UART: [afmc] ++
14,921,115 UART: [afmc] CDI.KEYID = 6
14,922,036 UART: [afmc] SUBJECT.KEYID = 7
14,923,554 UART: [afmc] AUTHORITY.KEYID = 5
17,426,826 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,148,013 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,938 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,165,106 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,180,211 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,195,130 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,363 UART: [afmc] --
19,222,103 UART: [cold-reset] --
19,227,866 UART: [state] Locking Datavault
19,233,029 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,196 UART: [state] Locking ICCM
19,237,520 UART: [exit] Launching FMC @ 0x40000130
19,246,217 UART:
19,246,489 UART: Running Caliptra FMC ...
19,247,526 UART:
19,247,680 UART: [state] CFI Enabled
19,255,630 UART: [fht] FMC Alias Private Key: 7
21,021,720 UART: [art] Extend RT PCRs Done
21,022,945 UART: [art] Lock RT PCRs Done
21,024,711 UART: [art] Populate DV Done
21,030,128 UART: [fht] FMC Alias Private Key: 7
21,031,779 UART: [art] Derive CDI
21,032,600 UART: [art] Store in slot 0x4
21,075,253 UART: [art] Derive Key Pair
21,076,261 UART: [art] Store priv key in slot 0x5
23,503,092 UART: [art] Derive Key Pair - Done
23,515,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,228 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,734 UART: [art] PUB.X = E1D0DB9CC17AF0019B7AD21A0878B03A7DA9CF23ED75002CEFD44694D7B876FBE34A4EBB329649461B521BEAF2FA3092
25,231,000 UART: [art] PUB.Y = D7E98E170921BE38F52DF809B918C785F1130E86FE70C333B9C887871E60F9170033757ABB9221E57830FFC338841C28
25,238,213 UART: [art] SIG.R = 9CB4E175F74986BBB459FE8099E3965443E06451A360A0EE1F61F4E21B2EC7E27142527489F2475F55E46BF097870559
25,245,609 UART: [art] SIG.S = 0F55820F968F1BA43528F0784DF9541259D53F00F46A62D370B5ED71CD16E4FB38EBD38BA53AB3B3210AE9962C8308BC
26,224,909 UART: Caliptra RT
26,225,614 UART: [state] CFI Enabled
26,357,279 UART: [rt] RT listening for mailbox commands...
26,359,163 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,389,685 UART: [rt]cmd =0x434b4558, len=80
26,391,149 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,755,766 ready_for_fw is high
3,756,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,868 >>> mbox cmd response: success
19,301,606 UART:
19,301,995 UART: Running Caliptra FMC ...
19,303,132 UART:
19,303,305 UART: [state] CFI Enabled
19,311,222 UART: [fht] FMC Alias Private Key: 7
21,076,911 UART: [art] Extend RT PCRs Done
21,078,146 UART: [art] Lock RT PCRs Done
21,080,161 UART: [art] Populate DV Done
21,085,533 UART: [fht] FMC Alias Private Key: 7
21,087,191 UART: [art] Derive CDI
21,088,014 UART: [art] Store in slot 0x4
21,130,519 UART: [art] Derive Key Pair
21,131,572 UART: [art] Store priv key in slot 0x5
23,558,411 UART: [art] Derive Key Pair - Done
23,571,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,670 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,205 UART: [art] PUB.X = A284C9D97CD72CD6D1B8E20106DADC77894883C4715A3B89891CE4EC018B342ADF54333FE354D515E5C62AB8CC85302D
25,286,415 UART: [art] PUB.Y = 861D7E99D65F5D50D1FDB2BD07D46734EB72CA7A7C72850A288E633E7CAABD02CA226FA2C0FFBC0C1513A982E84A2816
25,293,704 UART: [art] SIG.R = 4DBD4F0992E374E33CA1A7F420D0398E024F6BFCE1EA2CE0C6AA68C3AFB939AE01637CD5631E7DEC7405FA86DBC94769
25,301,091 UART: [art] SIG.S = B29883521A44480106C67BA39B72FA590BFE30830FDF8255AE964C54F75ACD3A89D416C3F5674C84843F63CC53010E48
26,279,920 UART: Caliptra RT
26,280,634 UART: [state] CFI Enabled
26,413,538 UART: [rt] RT listening for mailbox commands...
26,415,436 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,445,853 UART: [rt]cmd =0x434b4558, len=80
26,447,287 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,987 UART: [kat] SHA2-256
881,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,033 UART: [kat] ++
886,185 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,312 UART: [kat] SHA2-512-ACC
897,213 UART: [kat] ECC-384
902,910 UART: [kat] HMAC-384Kdf
907,650 UART: [kat] LMS
1,475,846 UART: [kat] --
1,476,857 UART: [cold-reset] ++
1,477,389 UART: [fht] Storing FHT @ 0x50003400
1,480,162 UART: [idev] ++
1,480,330 UART: [idev] CDI.KEYID = 6
1,480,690 UART: [idev] SUBJECT.KEYID = 7
1,481,114 UART: [idev] UDS.KEYID = 0
1,481,459 ready_for_fw is high
1,481,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,240 UART: [idev] Erasing UDS.KEYID = 0
1,505,650 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,172 UART: [idev] --
1,515,217 UART: [ldev] ++
1,515,385 UART: [ldev] CDI.KEYID = 6
1,515,748 UART: [ldev] SUBJECT.KEYID = 5
1,516,174 UART: [ldev] AUTHORITY.KEYID = 7
1,516,637 UART: [ldev] FE.KEYID = 1
1,521,725 UART: [ldev] Erasing FE.KEYID = 1
1,546,998 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,514 UART: [ldev] --
1,586,849 UART: [fwproc] Waiting for Commands...
1,587,496 UART: [fwproc] Received command 0x46574c44
1,588,287 UART: [fwproc] Received Image of size 118548 bytes
2,933,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,133 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,351 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,620 >>> mbox cmd response: success
3,133,826 UART: [afmc] ++
3,133,994 UART: [afmc] CDI.KEYID = 6
3,134,356 UART: [afmc] SUBJECT.KEYID = 7
3,134,781 UART: [afmc] AUTHORITY.KEYID = 5
3,169,860 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,194 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,974 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,683 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,566 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,249 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,199 UART: [afmc] --
3,213,179 UART: [cold-reset] --
3,213,963 UART: [state] Locking Datavault
3,215,136 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,740 UART: [state] Locking ICCM
3,216,402 UART: [exit] Launching FMC @ 0x40000130
3,221,732 UART:
3,221,748 UART: Running Caliptra FMC ...
3,222,156 UART:
3,222,210 UART: [state] CFI Enabled
3,232,790 UART: [fht] FMC Alias Private Key: 7
3,351,898 UART: [art] Extend RT PCRs Done
3,352,326 UART: [art] Lock RT PCRs Done
3,353,894 UART: [art] Populate DV Done
3,361,923 UART: [fht] FMC Alias Private Key: 7
3,362,983 UART: [art] Derive CDI
3,363,263 UART: [art] Store in slot 0x4
3,449,083 UART: [art] Derive Key Pair
3,449,443 UART: [art] Store priv key in slot 0x5
3,463,178 UART: [art] Derive Key Pair - Done
3,477,744 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,106 UART: [art] PUB.X = A33A108F85287051652511E40DCC97AC7C44433DCE31C62189F8CC0D97B6D97775C4F87F0B90FCF75A532993FF1EA88C
3,500,871 UART: [art] PUB.Y = 4481B3ACC03B48E7ADBD0D104BE9CADFC42E0E78F5F90F91649F76D3EDF144D6B366DC4F58B70B2930A9AEC29123EC32
3,507,829 UART: [art] SIG.R = F79C75FD36559F51AAC95D7CC65DF42CD144693370E787957E91A6428B5081FFF5689EB5FC40707277B715F3CB94FC4F
3,514,603 UART: [art] SIG.S = 5E5183EBDD6A8459A4A869D273D7F60F2D627DD2970DE66D06EB75AFA7FA9F937F4561CF6EDEF7961D15EB8E37A47EFD
3,538,306 UART: Caliptra RT
3,538,557 UART: [state] CFI Enabled
3,658,732 UART: [rt] RT listening for mailbox commands...
3,659,402 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,736 UART: [rt]cmd =0x434b4558, len=80
3,690,602 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,595 ready_for_fw is high
1,362,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,228 >>> mbox cmd response: success
3,043,327 UART:
3,043,343 UART: Running Caliptra FMC ...
3,043,751 UART:
3,043,805 UART: [state] CFI Enabled
3,054,575 UART: [fht] FMC Alias Private Key: 7
3,173,753 UART: [art] Extend RT PCRs Done
3,174,181 UART: [art] Lock RT PCRs Done
3,175,851 UART: [art] Populate DV Done
3,184,294 UART: [fht] FMC Alias Private Key: 7
3,185,254 UART: [art] Derive CDI
3,185,534 UART: [art] Store in slot 0x4
3,271,786 UART: [art] Derive Key Pair
3,272,146 UART: [art] Store priv key in slot 0x5
3,286,113 UART: [art] Derive Key Pair - Done
3,300,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,811 UART: [art] PUB.X = 50AC043B7BC6E89B0E485C54AC2A100E5F0B5EC2B13A62F42BB3A5E1ECFEA0EA6E6A10B3E7BDCB3C4770B95937E6418E
3,323,593 UART: [art] PUB.Y = D6925D2BEF1C2C6E157727DBBF9203AB180A6BBEF2C617062A7F28FBFC738737D93AEBE2F7FC4F525138C8886DB04643
3,330,548 UART: [art] SIG.R = 83D4CB760F7C7A330167603A51B8AD23ACDE8017CCA36BD78A1F9639BAA0B83E1C62035403AC33BB708C05633A83DD93
3,337,311 UART: [art] SIG.S = 365CF85CE94DC40786714C10B3820EA0ECC6CBBCF5A29F0F284F47051975594F482B3DBEF646BB1683845A45F90ADD54
3,361,380 UART: Caliptra RT
3,361,631 UART: [state] CFI Enabled
3,483,048 UART: [rt] RT listening for mailbox commands...
3,483,718 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,980 UART: [rt]cmd =0x434b4558, len=80
3,514,944 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,542 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,250 UART: [kat] SHA2-256
882,181 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,296 UART: [kat] ++
886,448 UART: [kat] sha1
890,602 UART: [kat] SHA2-256
892,540 UART: [kat] SHA2-384
895,279 UART: [kat] SHA2-512-ACC
897,180 UART: [kat] ECC-384
903,009 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,550 UART: [cold-reset] ++
1,476,942 UART: [fht] Storing FHT @ 0x50003400
1,479,673 UART: [idev] ++
1,479,841 UART: [idev] CDI.KEYID = 6
1,480,201 UART: [idev] SUBJECT.KEYID = 7
1,480,625 UART: [idev] UDS.KEYID = 0
1,480,970 ready_for_fw is high
1,480,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,859 UART: [idev] Erasing UDS.KEYID = 0
1,505,321 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,827 UART: [idev] --
1,514,930 UART: [ldev] ++
1,515,098 UART: [ldev] CDI.KEYID = 6
1,515,461 UART: [ldev] SUBJECT.KEYID = 5
1,515,887 UART: [ldev] AUTHORITY.KEYID = 7
1,516,350 UART: [ldev] FE.KEYID = 1
1,521,666 UART: [ldev] Erasing FE.KEYID = 1
1,546,751 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,351 UART: [ldev] --
1,585,846 UART: [fwproc] Waiting for Commands...
1,586,479 UART: [fwproc] Received command 0x46574c44
1,587,270 UART: [fwproc] Received Image of size 118548 bytes
2,931,734 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,178 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,396 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,753 >>> mbox cmd response: success
3,132,009 UART: [afmc] ++
3,132,177 UART: [afmc] CDI.KEYID = 6
3,132,539 UART: [afmc] SUBJECT.KEYID = 7
3,132,964 UART: [afmc] AUTHORITY.KEYID = 5
3,168,455 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,341 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,121 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,830 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,713 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,396 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,116 UART: [afmc] --
3,211,168 UART: [cold-reset] --
3,212,018 UART: [state] Locking Datavault
3,213,185 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,789 UART: [state] Locking ICCM
3,214,393 UART: [exit] Launching FMC @ 0x40000130
3,219,723 UART:
3,219,739 UART: Running Caliptra FMC ...
3,220,147 UART:
3,220,290 UART: [state] CFI Enabled
3,230,562 UART: [fht] FMC Alias Private Key: 7
3,349,850 UART: [art] Extend RT PCRs Done
3,350,278 UART: [art] Lock RT PCRs Done
3,352,190 UART: [art] Populate DV Done
3,360,579 UART: [fht] FMC Alias Private Key: 7
3,361,631 UART: [art] Derive CDI
3,361,911 UART: [art] Store in slot 0x4
3,447,569 UART: [art] Derive Key Pair
3,447,929 UART: [art] Store priv key in slot 0x5
3,461,502 UART: [art] Derive Key Pair - Done
3,476,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,486 UART: [art] PUB.X = 042DC5520782D42B7740F8D435CBA945AAFA264B7D830C9C9321F6342669FB0FD0DF1B7E0940BC52855CA929508A0AA7
3,499,242 UART: [art] PUB.Y = DC6B2D0A2A35386264C5CCB264C91427675EE180713E54446F8A4AF320B8B87916843A5F8188AB97BDA783E9F995ED78
3,506,189 UART: [art] SIG.R = 2C53C4530600C125A53DFA8604213D897EE9751C17AA2FB6EA2F54FE0451CE124AD357A5C69EFB8D3577E8BDEA945953
3,512,936 UART: [art] SIG.S = 460726C484C114A41AE74DF765F86E3B9430A3F7617CAB47BC04173BFE6CF77C394FD46D2C9B850ADF8BD35D168343E3
3,536,901 UART: Caliptra RT
3,537,244 UART: [state] CFI Enabled
3,657,314 UART: [rt] RT listening for mailbox commands...
3,657,984 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,976 UART: [rt]cmd =0x434b4558, len=80
3,688,964 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,456 ready_for_fw is high
1,363,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,637 >>> mbox cmd response: success
3,042,144 UART:
3,042,160 UART: Running Caliptra FMC ...
3,042,568 UART:
3,042,711 UART: [state] CFI Enabled
3,053,475 UART: [fht] FMC Alias Private Key: 7
3,171,757 UART: [art] Extend RT PCRs Done
3,172,185 UART: [art] Lock RT PCRs Done
3,173,657 UART: [art] Populate DV Done
3,181,616 UART: [fht] FMC Alias Private Key: 7
3,182,620 UART: [art] Derive CDI
3,182,900 UART: [art] Store in slot 0x4
3,268,586 UART: [art] Derive Key Pair
3,268,946 UART: [art] Store priv key in slot 0x5
3,282,119 UART: [art] Derive Key Pair - Done
3,296,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,021 UART: [art] PUB.X = 7B11010D2544AF1E7A7F45B1D2BC3FB1ACD49CACBC591CA7D44399B90DEB0B33728F7A348D204338D7D70E5B885B7FD3
3,319,792 UART: [art] PUB.Y = BEDF1C8285B1CC1FD6E86E7D126E1C616076C019480147C38C26C030DD22B1EC82E2373EFDB21FC64C17C0CD885B9979
3,326,749 UART: [art] SIG.R = 069B2F8308776A2DBEB6F697A894F2A90A0711EDB67B379DEEB210538C5494C096C0C72EFB2D2081B41F324AEA9C6C6E
3,333,517 UART: [art] SIG.S = 30E654F256ABCF8DCE2548251527359317EF01BCFB9253EECF94A4704AF7B0A4E732189C9CDE8D0FCD1C3CFAF6B1493E
3,356,981 UART: Caliptra RT
3,357,324 UART: [state] CFI Enabled
3,478,306 UART: [rt] RT listening for mailbox commands...
3,478,976 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,400 UART: [rt]cmd =0x434b4558, len=80
3,510,454 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
915,973 UART: [kat] HMAC-384Kdf
920,565 UART: [kat] LMS
1,168,877 UART: [kat] --
1,169,662 UART: [cold-reset] ++
1,170,088 UART: [fht] FHT @ 0x50003400
1,172,840 UART: [idev] ++
1,173,008 UART: [idev] CDI.KEYID = 6
1,173,369 UART: [idev] SUBJECT.KEYID = 7
1,173,794 UART: [idev] UDS.KEYID = 0
1,174,140 ready_for_fw is high
1,174,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,849 UART: [idev] Erasing UDS.KEYID = 0
1,198,111 UART: [idev] Sha1 KeyId Algorithm
1,206,991 UART: [idev] --
1,208,154 UART: [ldev] ++
1,208,322 UART: [ldev] CDI.KEYID = 6
1,208,686 UART: [ldev] SUBJECT.KEYID = 5
1,209,113 UART: [ldev] AUTHORITY.KEYID = 7
1,209,576 UART: [ldev] FE.KEYID = 1
1,214,556 UART: [ldev] Erasing FE.KEYID = 1
1,240,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,364 UART: [ldev] --
1,279,759 UART: [fwproc] Wait for Commands...
1,280,460 UART: [fwproc] Recv command 0x46574c44
1,281,193 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,825 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,000 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,227 >>> mbox cmd response: success
2,825,463 UART: [afmc] ++
2,825,631 UART: [afmc] CDI.KEYID = 6
2,825,994 UART: [afmc] SUBJECT.KEYID = 7
2,826,420 UART: [afmc] AUTHORITY.KEYID = 5
2,861,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,565 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,275 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,156 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,857 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,726 UART: [afmc] --
2,904,573 UART: [cold-reset] --
2,905,293 UART: [state] Locking Datavault
2,906,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,038 UART: [state] Locking ICCM
2,907,654 UART: [exit] Launching FMC @ 0x40000130
2,912,984 UART:
2,913,000 UART: Running Caliptra FMC ...
2,913,408 UART:
2,913,462 UART: [state] CFI Enabled
2,924,284 UART: [fht] FMC Alias Private Key: 7
3,043,352 UART: [art] Extend RT PCRs Done
3,043,780 UART: [art] Lock RT PCRs Done
3,045,390 UART: [art] Populate DV Done
3,053,677 UART: [fht] FMC Alias Private Key: 7
3,054,675 UART: [art] Derive CDI
3,054,955 UART: [art] Store in slot 0x4
3,140,918 UART: [art] Derive Key Pair
3,141,278 UART: [art] Store priv key in slot 0x5
3,154,980 UART: [art] Derive Key Pair - Done
3,169,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,206 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,971 UART: [art] PUB.X = 3B5E8901D9907875BD8B42E8F4D634E2E1339D806554A807E45F1E18789972B0F3E9E33283F6A58266139BEB3DB4723F
3,192,729 UART: [art] PUB.Y = 49C75A8AC1D1D7EEC145789FF2B2ECF9012AB00D3C22F305D437ED5AF2D3737524A44CF3D246DE89B7F19C11E3CD7B3E
3,199,688 UART: [art] SIG.R = C9290B7179534B1870CE375A4BB1A6721067DC19A368C81B69713421C0053727D93A05D0CEFD3C7CB16BF3627FAB0066
3,206,425 UART: [art] SIG.S = CC18A0A5E7AE23FE4C6124A80E02D0AE08474C76D45707DF25DFA458723BDF51134DB676B51E9B3E8FCAE4802BF7EB0F
3,229,778 UART: Caliptra RT
3,230,029 UART: [state] CFI Enabled
3,348,368 UART: [rt] RT listening for mailbox commands...
3,349,038 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,330 UART: [rt]cmd =0x434b4558, len=80
3,380,446 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,066 ready_for_fw is high
1,059,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,666 >>> mbox cmd response: success
2,740,229 UART:
2,740,245 UART: Running Caliptra FMC ...
2,740,653 UART:
2,740,707 UART: [state] CFI Enabled
2,751,345 UART: [fht] FMC Alias Private Key: 7
2,870,461 UART: [art] Extend RT PCRs Done
2,870,889 UART: [art] Lock RT PCRs Done
2,872,631 UART: [art] Populate DV Done
2,881,090 UART: [fht] FMC Alias Private Key: 7
2,882,116 UART: [art] Derive CDI
2,882,396 UART: [art] Store in slot 0x4
2,968,275 UART: [art] Derive Key Pair
2,968,635 UART: [art] Store priv key in slot 0x5
2,981,839 UART: [art] Derive Key Pair - Done
2,996,869 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,751 UART: [art] PUB.X = FC9191335C1E09AA75EE7F346868FC848B1399CCFFF9159AE54C140D38C230C56F4EF25F16EA63FBCC79B30331D88F5F
3,019,524 UART: [art] PUB.Y = 88A414C81E4FD39FB15308720ABF280FC2C42E696EBEF08532FE9573EAEC650A991FC73DF0D9452148D894212203E0FC
3,026,465 UART: [art] SIG.R = 34985385AE2B1FD60F9E79AB00BF8E2EE1E15DE603B7FFB6E78C509F4AC89666D18885D0D9D658E81A9F49B382B128EE
3,033,219 UART: [art] SIG.S = 07B97252BE34B1E3E034F1A8BCD4A4D6F89580BBC65518B63FFB37CAC505A2D81F738F9CD5A3CA6BFA5F4BE4F40EE937
3,057,142 UART: Caliptra RT
3,057,393 UART: [state] CFI Enabled
3,177,656 UART: [rt] RT listening for mailbox commands...
3,178,326 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,772 UART: [rt]cmd =0x434b4558, len=80
3,209,858 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
891,473 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
916,330 UART: [kat] HMAC-384Kdf
921,104 UART: [kat] LMS
1,169,416 UART: [kat] --
1,170,265 UART: [cold-reset] ++
1,170,839 UART: [fht] FHT @ 0x50003400
1,173,647 UART: [idev] ++
1,173,815 UART: [idev] CDI.KEYID = 6
1,174,176 UART: [idev] SUBJECT.KEYID = 7
1,174,601 UART: [idev] UDS.KEYID = 0
1,174,947 ready_for_fw is high
1,174,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,712 UART: [idev] Erasing UDS.KEYID = 0
1,199,498 UART: [idev] Sha1 KeyId Algorithm
1,208,362 UART: [idev] --
1,209,557 UART: [ldev] ++
1,209,725 UART: [ldev] CDI.KEYID = 6
1,210,089 UART: [ldev] SUBJECT.KEYID = 5
1,210,516 UART: [ldev] AUTHORITY.KEYID = 7
1,210,979 UART: [ldev] FE.KEYID = 1
1,216,263 UART: [ldev] Erasing FE.KEYID = 1
1,242,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,885 UART: [ldev] --
1,282,172 UART: [fwproc] Wait for Commands...
1,282,759 UART: [fwproc] Recv command 0x46574c44
1,283,492 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,310 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,485 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,698 >>> mbox cmd response: success
2,826,798 UART: [afmc] ++
2,826,966 UART: [afmc] CDI.KEYID = 6
2,827,329 UART: [afmc] SUBJECT.KEYID = 7
2,827,755 UART: [afmc] AUTHORITY.KEYID = 5
2,863,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,001 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,750 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,460 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,341 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,042 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,665 UART: [afmc] --
2,906,616 UART: [cold-reset] --
2,907,384 UART: [state] Locking Datavault
2,908,605 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,209 UART: [state] Locking ICCM
2,909,663 UART: [exit] Launching FMC @ 0x40000130
2,914,993 UART:
2,915,009 UART: Running Caliptra FMC ...
2,915,417 UART:
2,915,560 UART: [state] CFI Enabled
2,926,404 UART: [fht] FMC Alias Private Key: 7
3,045,752 UART: [art] Extend RT PCRs Done
3,046,180 UART: [art] Lock RT PCRs Done
3,047,954 UART: [art] Populate DV Done
3,055,897 UART: [fht] FMC Alias Private Key: 7
3,056,907 UART: [art] Derive CDI
3,057,187 UART: [art] Store in slot 0x4
3,142,928 UART: [art] Derive Key Pair
3,143,288 UART: [art] Store priv key in slot 0x5
3,156,762 UART: [art] Derive Key Pair - Done
3,171,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,553 UART: [art] PUB.X = 614438F8C5F758B691F18BE08DA242866C35D52D0608C67CC9C30E2D23F0161493CB71A75D722E037E5F13A13D50B34E
3,194,309 UART: [art] PUB.Y = 233C6469F97D32E87E545D3F8CC894405996ACAF95CA56C84946F7516F4B626CE8C9AEF7870B8BDB1D2D2C93C19E1C7C
3,201,266 UART: [art] SIG.R = D845BFD91499BC9A396163675F668BC97BE42E227F2708DCC290983E2B9603D9CCFD7B11AE03039ED3E9CF9EAA948201
3,208,029 UART: [art] SIG.S = 7BC003B0FB25BA8CC2ABBFCF1CB17D2D852C0AA811885C0856CCCDEAFA7C569C30A4721373B53B56A187BB71AA2862E9
3,232,192 UART: Caliptra RT
3,232,535 UART: [state] CFI Enabled
3,351,803 UART: [rt] RT listening for mailbox commands...
3,352,473 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,687 UART: [rt]cmd =0x434b4558, len=80
3,383,879 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,021 ready_for_fw is high
1,059,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,803 >>> mbox cmd response: success
2,741,422 UART:
2,741,438 UART: Running Caliptra FMC ...
2,741,846 UART:
2,741,989 UART: [state] CFI Enabled
2,752,795 UART: [fht] FMC Alias Private Key: 7
2,871,861 UART: [art] Extend RT PCRs Done
2,872,289 UART: [art] Lock RT PCRs Done
2,873,853 UART: [art] Populate DV Done
2,881,946 UART: [fht] FMC Alias Private Key: 7
2,883,060 UART: [art] Derive CDI
2,883,340 UART: [art] Store in slot 0x4
2,969,403 UART: [art] Derive Key Pair
2,969,763 UART: [art] Store priv key in slot 0x5
2,983,591 UART: [art] Derive Key Pair - Done
2,998,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,219 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,984 UART: [art] PUB.X = 39431EE59D6A656617F9661F923D6C373922203C5F34E552A825AFA159D30587EB63489157654490389D5F255B08BFE4
3,021,734 UART: [art] PUB.Y = C16135F68A7FAB45DCA4C64C574B8339B119B84B5670A80A70E675353ECAD028ED4F806B704CED2DF4FF775764CEE1C9
3,028,693 UART: [art] SIG.R = 43C84825DBC73E52AE2BB8FB81FB5D4337C7FF21207FBF8AC9D6F302806B6E03A290A977AE8EC97DF0D610E23397B92D
3,035,471 UART: [art] SIG.S = E74655BCDCFCDFB6FA6F912BD99A6EEBD6272F727DEBA9C522ED81A77C142FB05DAC02DDACD54E58962F884446C4C08A
3,059,140 UART: Caliptra RT
3,059,483 UART: [state] CFI Enabled
3,178,709 UART: [rt] RT listening for mailbox commands...
3,179,379 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,653 UART: [rt]cmd =0x434b4558, len=80
3,210,653 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
893,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,303 UART: [kat] ++
897,455 UART: [kat] sha1
901,757 UART: [kat] SHA2-256
903,697 UART: [kat] SHA2-384
906,372 UART: [kat] SHA2-512-ACC
908,273 UART: [kat] ECC-384
917,688 UART: [kat] HMAC-384Kdf
922,400 UART: [kat] LMS
1,170,728 UART: [kat] --
1,171,727 UART: [cold-reset] ++
1,172,201 UART: [fht] FHT @ 0x50003400
1,174,804 UART: [idev] ++
1,174,972 UART: [idev] CDI.KEYID = 6
1,175,332 UART: [idev] SUBJECT.KEYID = 7
1,175,756 UART: [idev] UDS.KEYID = 0
1,176,101 ready_for_fw is high
1,176,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,778 UART: [idev] Erasing UDS.KEYID = 0
1,200,857 UART: [idev] Sha1 KeyId Algorithm
1,209,227 UART: [idev] --
1,210,365 UART: [ldev] ++
1,210,533 UART: [ldev] CDI.KEYID = 6
1,210,896 UART: [ldev] SUBJECT.KEYID = 5
1,211,322 UART: [ldev] AUTHORITY.KEYID = 7
1,211,785 UART: [ldev] FE.KEYID = 1
1,217,095 UART: [ldev] Erasing FE.KEYID = 1
1,243,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,151 UART: [ldev] --
1,282,456 UART: [fwproc] Wait for Commands...
1,283,154 UART: [fwproc] Recv command 0x46574c44
1,283,882 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,436 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,606 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,911 >>> mbox cmd response: success
2,828,159 UART: [afmc] ++
2,828,327 UART: [afmc] CDI.KEYID = 6
2,828,689 UART: [afmc] SUBJECT.KEYID = 7
2,829,114 UART: [afmc] AUTHORITY.KEYID = 5
2,864,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,468 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,177 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,060 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,761 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,649 UART: [afmc] --
2,907,745 UART: [cold-reset] --
2,908,309 UART: [state] Locking Datavault
2,909,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,920 UART: [state] Locking ICCM
2,910,522 UART: [exit] Launching FMC @ 0x40000130
2,915,852 UART:
2,915,868 UART: Running Caliptra FMC ...
2,916,276 UART:
2,916,330 UART: [state] CFI Enabled
2,926,760 UART: [fht] FMC Alias Private Key: 7
3,046,624 UART: [art] Extend RT PCRs Done
3,047,052 UART: [art] Lock RT PCRs Done
3,048,588 UART: [art] Populate DV Done
3,056,749 UART: [fht] FMC Alias Private Key: 7
3,057,729 UART: [art] Derive CDI
3,058,009 UART: [art] Store in slot 0x4
3,144,066 UART: [art] Derive Key Pair
3,144,426 UART: [art] Store priv key in slot 0x5
3,157,448 UART: [art] Derive Key Pair - Done
3,172,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,862 UART: [art] PUB.X = EB15DE6555CC78E1ACB940D642004B94B3EAD939A1DE98747B489B7311C4064288CBA18BF7B44666A06EB872A5932AB4
3,194,613 UART: [art] PUB.Y = C327E2DA7E68117BE6771E358DF93957B0FEBAD966922EF48E1C29BC97764E3C875CF49BB367C81C0C34AC93A7A839A4
3,201,570 UART: [art] SIG.R = C8645799B8CA9792C2D4D4CB559A65DA2056DA54D431E9D1BF9BD5CDBB60F7478BE5E6B275688310F8EE90E646C58A2D
3,208,352 UART: [art] SIG.S = 690FAD40DD20047FF9CDF560F3EB75718DCBFB68BF4B2047E5EF41B4D4209C6D51BFDC3D557FA298E509B9246E331972
3,231,921 UART: Caliptra RT
3,232,172 UART: [state] CFI Enabled
3,351,622 UART: [rt] RT listening for mailbox commands...
3,352,292 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,484 UART: [rt]cmd =0x434b4558, len=80
3,383,350 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,533 ready_for_fw is high
1,060,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,486 >>> mbox cmd response: success
2,742,209 UART:
2,742,225 UART: Running Caliptra FMC ...
2,742,633 UART:
2,742,687 UART: [state] CFI Enabled
2,753,141 UART: [fht] FMC Alias Private Key: 7
2,872,551 UART: [art] Extend RT PCRs Done
2,872,979 UART: [art] Lock RT PCRs Done
2,874,483 UART: [art] Populate DV Done
2,882,966 UART: [fht] FMC Alias Private Key: 7
2,884,048 UART: [art] Derive CDI
2,884,328 UART: [art] Store in slot 0x4
2,970,329 UART: [art] Derive Key Pair
2,970,689 UART: [art] Store priv key in slot 0x5
2,983,209 UART: [art] Derive Key Pair - Done
2,997,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,022 UART: [art] PUB.X = EF42D750120DDC0BD4F653E559E1E3AA73B1A188D0CE5BD2A2A15966AD7EA3B94533C123CEE51059EFA2DFE7A99B3FE8
3,020,808 UART: [art] PUB.Y = E86ED68E4CEB4137E1FED5F11E78CCFE393EB82D22842FCF74901AA145BF088CC52A4716E7448624BD6C96E06BB3753B
3,027,769 UART: [art] SIG.R = 434092425C173E50030C5B70D9DFABFADA67E3419F2B8C30E7F40B6803B446E5712946F2FAAC98F6BA1DC1FC7A2F2C12
3,034,539 UART: [art] SIG.S = EDE2E7BC6986BD325D9592757033AB275969957E7E175D1E74CF5079DCF81D18019BEAC11A4BBF217827DD36A323B090
3,058,140 UART: Caliptra RT
3,058,391 UART: [state] CFI Enabled
3,177,241 UART: [rt] RT listening for mailbox commands...
3,177,911 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,069 UART: [rt]cmd =0x434b4558, len=80
3,209,197 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
893,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,604 UART: [kat] ++
897,756 UART: [kat] sha1
901,852 UART: [kat] SHA2-256
903,792 UART: [kat] SHA2-384
906,639 UART: [kat] SHA2-512-ACC
908,540 UART: [kat] ECC-384
918,383 UART: [kat] HMAC-384Kdf
923,111 UART: [kat] LMS
1,171,439 UART: [kat] --
1,172,564 UART: [cold-reset] ++
1,172,910 UART: [fht] FHT @ 0x50003400
1,175,335 UART: [idev] ++
1,175,503 UART: [idev] CDI.KEYID = 6
1,175,863 UART: [idev] SUBJECT.KEYID = 7
1,176,287 UART: [idev] UDS.KEYID = 0
1,176,632 ready_for_fw is high
1,176,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,631 UART: [idev] Erasing UDS.KEYID = 0
1,201,762 UART: [idev] Sha1 KeyId Algorithm
1,210,168 UART: [idev] --
1,211,228 UART: [ldev] ++
1,211,396 UART: [ldev] CDI.KEYID = 6
1,211,759 UART: [ldev] SUBJECT.KEYID = 5
1,212,185 UART: [ldev] AUTHORITY.KEYID = 7
1,212,648 UART: [ldev] FE.KEYID = 1
1,217,952 UART: [ldev] Erasing FE.KEYID = 1
1,243,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,376 UART: [ldev] --
1,282,703 UART: [fwproc] Wait for Commands...
1,283,335 UART: [fwproc] Recv command 0x46574c44
1,284,063 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,517 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,687 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,030 >>> mbox cmd response: success
2,828,142 UART: [afmc] ++
2,828,310 UART: [afmc] CDI.KEYID = 6
2,828,672 UART: [afmc] SUBJECT.KEYID = 7
2,829,097 UART: [afmc] AUTHORITY.KEYID = 5
2,864,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,949 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,658 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,541 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,242 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,982 UART: [afmc] --
2,907,978 UART: [cold-reset] --
2,908,802 UART: [state] Locking Datavault
2,910,017 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,621 UART: [state] Locking ICCM
2,911,149 UART: [exit] Launching FMC @ 0x40000130
2,916,479 UART:
2,916,495 UART: Running Caliptra FMC ...
2,916,903 UART:
2,917,046 UART: [state] CFI Enabled
2,927,858 UART: [fht] FMC Alias Private Key: 7
3,046,956 UART: [art] Extend RT PCRs Done
3,047,384 UART: [art] Lock RT PCRs Done
3,048,716 UART: [art] Populate DV Done
3,056,981 UART: [fht] FMC Alias Private Key: 7
3,058,117 UART: [art] Derive CDI
3,058,397 UART: [art] Store in slot 0x4
3,144,014 UART: [art] Derive Key Pair
3,144,374 UART: [art] Store priv key in slot 0x5
3,157,900 UART: [art] Derive Key Pair - Done
3,172,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,468 UART: [art] PUB.X = 84D9B8F9DA99C0AB785E83E5D72034DAFCFF6B3D753BD3689471FFFAE0091FFC8339312BB169167D0056518ADFCADF76
3,195,229 UART: [art] PUB.Y = BA7CD0838B68243547E76667AC2C55F7A7FBB12014CD29BDCFEDFB6C639CE47BB84B0A1F2BAA56E9DEA60DA1C6FEAA29
3,202,203 UART: [art] SIG.R = 4F2D39860FC56AEB4B9F0CE457827221A493B6F4A7797B24DD13C307B1B389152823090B66F31BEC28CF08700BC1C144
3,208,952 UART: [art] SIG.S = 82D69DB1E8AE4FC77E4F8812B0F96AA63C59FF5E4C1D8F358D17D1783E12BD9C28EB1A455E46A7AA8367C43869C54F47
3,232,772 UART: Caliptra RT
3,233,115 UART: [state] CFI Enabled
3,353,171 UART: [rt] RT listening for mailbox commands...
3,353,841 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,071 UART: [rt]cmd =0x434b4558, len=80
3,385,127 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,394 ready_for_fw is high
1,060,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,375 >>> mbox cmd response: success
2,741,968 UART:
2,741,984 UART: Running Caliptra FMC ...
2,742,392 UART:
2,742,535 UART: [state] CFI Enabled
2,752,937 UART: [fht] FMC Alias Private Key: 7
2,871,721 UART: [art] Extend RT PCRs Done
2,872,149 UART: [art] Lock RT PCRs Done
2,873,271 UART: [art] Populate DV Done
2,881,576 UART: [fht] FMC Alias Private Key: 7
2,882,706 UART: [art] Derive CDI
2,882,986 UART: [art] Store in slot 0x4
2,969,019 UART: [art] Derive Key Pair
2,969,379 UART: [art] Store priv key in slot 0x5
2,982,383 UART: [art] Derive Key Pair - Done
2,997,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,522 UART: [art] PUB.X = 168BA7225AD71A042B57674D01B0DDE1E19CADAA00DEB45F2CB561AA23D8A9A95190723CD420944605250616B20E4160
3,020,257 UART: [art] PUB.Y = 543A5240E225EACCA14F931CAE00C9B0D0D05555B4DBFD02EF0517D331177BC804017218E51FCF66F7563992C6B1FD4B
3,027,181 UART: [art] SIG.R = C1EB57AC30D3E11A08C392F78D3734D42C910D6F31A96515F01F710EE229614DE4578149DA34DE71CC4C63DFD608E384
3,033,943 UART: [art] SIG.S = 46C501BFFCBFBD8A999C45C0CA6EC81FEBE5683499003138AE027E6BA683F9F639E0B7CB774F3CC339F193B31C2F357A
3,057,255 UART: Caliptra RT
3,057,598 UART: [state] CFI Enabled
3,177,646 UART: [rt] RT listening for mailbox commands...
3,178,316 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,564 UART: [rt]cmd =0x434b4558, len=80
3,209,596 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,030 UART:
192,408 UART: Running Caliptra ROM ...
193,592 UART:
193,748 UART: [state] CFI Enabled
264,996 UART: [state] LifecycleState = Unprovisioned
266,939 UART: [state] DebugLocked = No
269,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,283 UART: [kat] SHA2-256
443,996 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,528 UART: [kat] ++
455,004 UART: [kat] sha1
467,305 UART: [kat] SHA2-256
470,029 UART: [kat] SHA2-384
476,234 UART: [kat] SHA2-512-ACC
478,611 UART: [kat] ECC-384
2,766,736 UART: [kat] HMAC-384Kdf
2,778,906 UART: [kat] LMS
3,969,248 UART: [kat] --
3,972,613 UART: [cold-reset] ++
3,973,971 UART: [fht] Storing FHT @ 0x50003400
3,987,037 UART: [idev] ++
3,987,615 UART: [idev] CDI.KEYID = 6
3,988,498 UART: [idev] SUBJECT.KEYID = 7
3,989,817 UART: [idev] UDS.KEYID = 0
3,990,783 ready_for_fw is high
3,990,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,080 UART: [idev] Erasing UDS.KEYID = 0
7,326,817 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,027 UART: [idev] --
7,352,870 UART: [ldev] ++
7,353,439 UART: [ldev] CDI.KEYID = 6
7,354,378 UART: [ldev] SUBJECT.KEYID = 5
7,355,605 UART: [ldev] AUTHORITY.KEYID = 7
7,356,840 UART: [ldev] FE.KEYID = 1
7,400,894 UART: [ldev] Erasing FE.KEYID = 1
10,734,349 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,993 UART: [ldev] --
13,115,991 UART: [fwproc] Waiting for Commands...
13,117,923 UART: [fwproc] Received command 0x46574c44
13,120,105 UART: [fwproc] Received Image of size 118548 bytes
17,229,312 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,597 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,772 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,486 >>> mbox cmd response: success
17,709,937 UART: [afmc] ++
17,710,562 UART: [afmc] CDI.KEYID = 6
17,711,481 UART: [afmc] SUBJECT.KEYID = 7
17,712,706 UART: [afmc] AUTHORITY.KEYID = 5
21,070,366 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,903 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,165 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,564 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,317 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,731 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,269 UART: [afmc] --
23,440,701 UART: [cold-reset] --
23,445,706 UART: [state] Locking Datavault
23,451,010 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,771 UART: [state] Locking ICCM
23,454,813 UART: [exit] Launching FMC @ 0x40000130
23,463,209 UART:
23,463,451 UART: Running Caliptra FMC ...
23,464,547 UART:
23,464,709 UART: [state] CFI Enabled
23,528,811 UART: [fht] FMC Alias Private Key: 7
25,869,074 UART: [art] Extend RT PCRs Done
25,870,298 UART: [art] Lock RT PCRs Done
25,871,850 UART: [art] Populate DV Done
25,877,371 UART: [fht] FMC Alias Private Key: 7
25,878,913 UART: [art] Derive CDI
25,879,729 UART: [art] Store in slot 0x4
25,936,968 UART: [art] Derive Key Pair
25,938,009 UART: [art] Store priv key in slot 0x5
29,230,286 UART: [art] Derive Key Pair - Done
29,243,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,306 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,828 UART: [art] PUB.X = 0FD1CB50FB635FE7823989A66C8249366CB593F864D03A9CF204B859B0049A60C50FB43BD05022EA6D148DD25948C0E9
31,542,054 UART: [art] PUB.Y = CF337D92572BFF8C85A4CFD368B3FB7AE0852A3B214DA0A2AA01F3CDE54D14D1CDE8AED9028BB95ABB28F0245B991E59
31,549,363 UART: [art] SIG.R = FC4601EBB4CBA58B1FD439A523309470DD0F59A994D81F6E582DC73CF99AF8CC6E64315BAE81C8B68A7B18E15F9E06DA
31,556,778 UART: [art] SIG.S = 903B7CC38745479A1D65E456CE2D716F71ACFDD93ABD4899B9DE57B5DE422629568E5449AB53BD1D4ED12EB1FF205F76
32,861,663 UART: Caliptra RT
32,862,374 UART: [state] CFI Enabled
33,037,595 UART: [rt] RT listening for mailbox commands...
33,039,523 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,070,116 UART: [rt]cmd =0x44504543, len=92
33,076,789 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,803,265 ready_for_fw is high
3,804,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,955,899 >>> mbox cmd response: success
23,646,197 UART:
23,646,632 UART: Running Caliptra FMC ...
23,647,771 UART:
23,647,937 UART: [state] CFI Enabled
23,716,477 UART: [fht] FMC Alias Private Key: 7
26,057,068 UART: [art] Extend RT PCRs Done
26,058,311 UART: [art] Lock RT PCRs Done
26,059,778 UART: [art] Populate DV Done
26,065,310 UART: [fht] FMC Alias Private Key: 7
26,066,798 UART: [art] Derive CDI
26,067,583 UART: [art] Store in slot 0x4
26,125,503 UART: [art] Derive Key Pair
26,126,553 UART: [art] Store priv key in slot 0x5
29,418,934 UART: [art] Derive Key Pair - Done
29,431,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,719,412 UART: [art] Erasing AUTHORITY.KEYID = 7
31,720,921 UART: [art] PUB.X = A64BD1BBF4099B70F2BF5D3CD62318CC1DB46022D3AE1E62CC1B602B87765BED2C1A16D136A982F6A478CC4B8B93C481
31,728,267 UART: [art] PUB.Y = 4FC3A2496E988012DC4F5457CBEA4A90569A361606D785EEF7995805401A7F763382D8AB4B961F2BC3B9DB4E4EEBD130
31,735,493 UART: [art] SIG.R = EB7A6E28807D6E3AC0F936E67511D45D4D4FCB18808AB67B5070B6F5A7B0E1A47FE46AF6E2C8B89F4C49286BE7FCDC1F
31,742,899 UART: [art] SIG.S = 1B6E1E692494E4FBC4D24DFD42881239D91C2AA160AE22C79C82E4302ECCBAE40C60B78A949B786E56DA354816F0CF62
33,048,252 UART: Caliptra RT
33,048,973 UART: [state] CFI Enabled
33,225,115 UART: [rt] RT listening for mailbox commands...
33,227,042 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,257,903 UART: [rt]cmd =0x44504543, len=92
33,264,506 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,407 UART:
192,769 UART: Running Caliptra ROM ...
193,961 UART:
603,428 UART: [state] CFI Enabled
615,758 UART: [state] LifecycleState = Unprovisioned
617,689 UART: [state] DebugLocked = No
620,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,412 UART: [kat] SHA2-256
796,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,668 UART: [kat] ++
807,141 UART: [kat] sha1
816,874 UART: [kat] SHA2-256
819,587 UART: [kat] SHA2-384
824,632 UART: [kat] SHA2-512-ACC
827,007 UART: [kat] ECC-384
3,110,360 UART: [kat] HMAC-384Kdf
3,120,978 UART: [kat] LMS
4,311,112 UART: [kat] --
4,315,099 UART: [cold-reset] ++
4,317,169 UART: [fht] Storing FHT @ 0x50003400
4,327,929 UART: [idev] ++
4,328,484 UART: [idev] CDI.KEYID = 6
4,329,458 UART: [idev] SUBJECT.KEYID = 7
4,330,695 UART: [idev] UDS.KEYID = 0
4,331,751 ready_for_fw is high
4,331,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,817 UART: [idev] Erasing UDS.KEYID = 0
7,616,609 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,836 UART: [idev] --
7,641,487 UART: [ldev] ++
7,642,060 UART: [ldev] CDI.KEYID = 6
7,643,025 UART: [ldev] SUBJECT.KEYID = 5
7,644,238 UART: [ldev] AUTHORITY.KEYID = 7
7,645,518 UART: [ldev] FE.KEYID = 1
7,655,973 UART: [ldev] Erasing FE.KEYID = 1
10,945,214 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,942 UART: [ldev] --
13,305,545 UART: [fwproc] Waiting for Commands...
13,308,025 UART: [fwproc] Received command 0x46574c44
13,310,209 UART: [fwproc] Received Image of size 118548 bytes
17,411,772 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,492,093 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,565,242 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,946 >>> mbox cmd response: success
17,897,391 UART: [afmc] ++
17,898,006 UART: [afmc] CDI.KEYID = 6
17,898,889 UART: [afmc] SUBJECT.KEYID = 7
17,900,099 UART: [afmc] AUTHORITY.KEYID = 5
21,220,230 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,868 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,186 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,549 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,303 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,747 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,482 UART: [afmc] --
23,588,666 UART: [cold-reset] --
23,592,518 UART: [state] Locking Datavault
23,596,028 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,773 UART: [state] Locking ICCM
23,599,755 UART: [exit] Launching FMC @ 0x40000130
23,608,145 UART:
23,608,375 UART: Running Caliptra FMC ...
23,609,472 UART:
23,609,626 UART: [state] CFI Enabled
23,617,749 UART: [fht] FMC Alias Private Key: 7
25,957,633 UART: [art] Extend RT PCRs Done
25,958,854 UART: [art] Lock RT PCRs Done
25,960,641 UART: [art] Populate DV Done
25,966,172 UART: [fht] FMC Alias Private Key: 7
25,967,705 UART: [art] Derive CDI
25,968,437 UART: [art] Store in slot 0x4
26,011,127 UART: [art] Derive Key Pair
26,012,122 UART: [art] Store priv key in slot 0x5
29,253,620 UART: [art] Derive Key Pair - Done
29,266,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,600 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,116 UART: [art] PUB.X = 8D1D9314C519FB0AF9030F521DDDEB5374737D312E0544F0B49E41B03FCB03E48C5D7DACACF2A3F0CDDAC80205BFD040
31,556,373 UART: [art] PUB.Y = 5B59D0378FA89526CCE093B4FC2BF23B5121957514717A69C447BA26A351E62CF7B131A6233BEFEC685DE5C10608A574
31,563,611 UART: [art] SIG.R = F46EF30761B3F55A929CC5840DDBB9417D32866243678540FB6BB66CDBC2C3C0306C49220F9C5FCE65ADF8797BA19AD3
31,571,004 UART: [art] SIG.S = 5970E24C667059EBCB81C23D76C68D54FD828318AB862230F062B8D1ED262CFAD403CF37A5DB0453C8397D9CAECB3134
32,875,984 UART: Caliptra RT
32,876,702 UART: [state] CFI Enabled
33,009,648 UART: [rt] RT listening for mailbox commands...
33,011,585 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,042,193 UART: [rt]cmd =0x44504543, len=92
33,048,812 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,561 writing to cptra_bootfsm_go
4,130,496 ready_for_fw is high
4,130,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,767 >>> mbox cmd response: success
23,800,330 UART:
23,800,770 UART: Running Caliptra FMC ...
23,801,887 UART:
23,802,051 UART: [state] CFI Enabled
23,809,803 UART: [fht] FMC Alias Private Key: 7
26,149,925 UART: [art] Extend RT PCRs Done
26,151,161 UART: [art] Lock RT PCRs Done
26,152,789 UART: [art] Populate DV Done
26,158,270 UART: [fht] FMC Alias Private Key: 7
26,159,970 UART: [art] Derive CDI
26,160,783 UART: [art] Store in slot 0x4
26,202,890 UART: [art] Derive Key Pair
26,203,886 UART: [art] Store priv key in slot 0x5
29,446,065 UART: [art] Derive Key Pair - Done
29,459,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,383 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,890 UART: [art] PUB.X = 3E8F0D4CAA83F6F3D39A5ED76F51346CA516F2FD6B5134D695A9F45E4A0C3FDE6D9DDF73A62D7A6FAFF759C06AEEA799
31,748,166 UART: [art] PUB.Y = C6A9B68B2B8A66FF5C937CA94B5D5C5D124E955F45A3EAA962656F3E5AD900E0BDE8FFE00F4940F27B7262E4F883A61E
31,755,416 UART: [art] SIG.R = 4D5D403A2F7D21634A811B0DE9448BD2679B6A9751EEB4B6CD4AB21F4B5C0EFDE5B12E3D973E4E7E7069D3944493910B
31,762,804 UART: [art] SIG.S = 46266CFCC4F6CC33C1F7188A1EF05B3A3EB74087BD89EBDFD4DD9BAE303BC2B9954BF6615A0CBB272EAFFA76D2D47D36
33,067,790 UART: Caliptra RT
33,068,508 UART: [state] CFI Enabled
33,201,634 UART: [rt] RT listening for mailbox commands...
33,203,552 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,234,092 UART: [rt]cmd =0x44504543, len=92
33,240,875 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,011 UART:
192,367 UART: Running Caliptra ROM ...
193,459 UART:
193,601 UART: [state] CFI Enabled
259,658 UART: [state] LifecycleState = Unprovisioned
261,578 UART: [state] DebugLocked = No
263,674 UART: [state] WD Timer not started. Device not locked for debugging
268,278 UART: [kat] SHA2-256
447,963 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,746 UART: [kat] ++
459,279 UART: [kat] sha1
469,941 UART: [kat] SHA2-256
472,654 UART: [kat] SHA2-384
477,499 UART: [kat] SHA2-512-ACC
479,893 UART: [kat] ECC-384
2,923,709 UART: [kat] HMAC-384Kdf
2,948,091 UART: [kat] LMS
3,424,565 UART: [kat] --
3,428,513 UART: [cold-reset] ++
3,430,577 UART: [fht] FHT @ 0x50003400
3,442,069 UART: [idev] ++
3,442,673 UART: [idev] CDI.KEYID = 6
3,443,627 UART: [idev] SUBJECT.KEYID = 7
3,444,869 UART: [idev] UDS.KEYID = 0
3,445,763 ready_for_fw is high
3,445,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,594,922 UART: [idev] Erasing UDS.KEYID = 0
5,964,297 UART: [idev] Sha1 KeyId Algorithm
5,988,287 UART: [idev] --
5,992,223 UART: [ldev] ++
5,992,794 UART: [ldev] CDI.KEYID = 6
5,993,729 UART: [ldev] SUBJECT.KEYID = 5
5,994,940 UART: [ldev] AUTHORITY.KEYID = 7
5,996,221 UART: [ldev] FE.KEYID = 1
6,034,551 UART: [ldev] Erasing FE.KEYID = 1
8,543,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,275,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,291,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,307,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,322,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,042 UART: [ldev] --
10,350,648 UART: [fwproc] Wait for Commands...
10,353,869 UART: [fwproc] Recv command 0x46574c44
10,355,855 UART: [fwproc] Recv'd Img size: 118548 bytes
13,835,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,908,463 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,981,472 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,310,432 >>> mbox cmd response: success
14,315,262 UART: [afmc] ++
14,315,929 UART: [afmc] CDI.KEYID = 6
14,316,817 UART: [afmc] SUBJECT.KEYID = 7
14,318,031 UART: [afmc] AUTHORITY.KEYID = 5
16,849,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,572,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,154 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,590,941 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,607,036 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,622,614 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,647,126 UART: [afmc] --
18,651,393 UART: [cold-reset] --
18,654,450 UART: [state] Locking Datavault
18,659,964 UART: [state] Locking PCR0, PCR1 and PCR31
18,661,668 UART: [state] Locking ICCM
18,663,010 UART: [exit] Launching FMC @ 0x40000130
18,671,402 UART:
18,671,634 UART: Running Caliptra FMC ...
18,672,730 UART:
18,672,886 UART: [state] CFI Enabled
18,730,751 UART: [fht] FMC Alias Private Key: 7
20,497,842 UART: [art] Extend RT PCRs Done
20,499,061 UART: [art] Lock RT PCRs Done
20,500,553 UART: [art] Populate DV Done
20,506,072 UART: [fht] FMC Alias Private Key: 7
20,507,580 UART: [art] Derive CDI
20,508,316 UART: [art] Store in slot 0x4
20,564,354 UART: [art] Derive Key Pair
20,565,382 UART: [art] Store priv key in slot 0x5
23,027,894 UART: [art] Derive Key Pair - Done
23,040,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,753,980 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,488 UART: [art] PUB.X = 38806F82AD7A653165A9B032DDA47A703511B9FB5D700082063C23B063DC465033666B4D82F3C1B6B7A42EC4B366B023
24,762,747 UART: [art] PUB.Y = 56A7208A70F943E81953D29928FAE6D026F26851D5FFAFD1FAC7D50469C3286D73A78CCB6496C00680F2A1AB5A65D4D4
24,769,978 UART: [art] SIG.R = FD2431E8453AEED6767D819CE74210D2866D1E838637132ED5A61FD5707E5E3CC06C174BEEF1E7B09F8F63B4091F8392
24,777,374 UART: [art] SIG.S = B438252EE5A78DE8D5ECE55AC6504C9CD8CEA2A500B63AA1B489CD06771E1351D62DF154051B72F7BAC64776E029BD2A
25,756,149 UART: Caliptra RT
25,756,856 UART: [state] CFI Enabled
25,937,326 UART: [rt] RT listening for mailbox commands...
25,939,244 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,969,875 UART: [rt]cmd =0x44504543, len=92
25,976,889 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,462,124 ready_for_fw is high
3,462,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,245,099 >>> mbox cmd response: success
18,537,360 UART:
18,537,798 UART: Running Caliptra FMC ...
18,538,943 UART:
18,539,106 UART: [state] CFI Enabled
18,604,554 UART: [fht] FMC Alias Private Key: 7
20,370,900 UART: [art] Extend RT PCRs Done
20,372,123 UART: [art] Lock RT PCRs Done
20,373,862 UART: [art] Populate DV Done
20,379,440 UART: [fht] FMC Alias Private Key: 7
20,381,137 UART: [art] Derive CDI
20,381,947 UART: [art] Store in slot 0x4
20,437,275 UART: [art] Derive Key Pair
20,438,316 UART: [art] Store priv key in slot 0x5
22,901,502 UART: [art] Derive Key Pair - Done
22,914,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,254 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,732 UART: [art] PUB.X = 69923820C86391B15D88C132A979D256988623398A154F65B90CA5AEDFDBD0B87AD6DD45062CE19471503462FEE8EA7C
24,636,057 UART: [art] PUB.Y = 32598547097AA1B0B7B9FF46E6FE59644235D649E6D7B1E22E8EF0D1EFB39F8615A99EFF05804B342D5414ECE60E3510
24,643,266 UART: [art] SIG.R = 694131CBF98BDEBBD8F60A45BBA072534697091E19568EADAB3DC757426422A6363F69C896CF58E47B0C12700EB87137
24,650,672 UART: [art] SIG.S = 36DDAE3C383A6BCAD8F70B783A175E72D8D58132CD0829BEDDE1B6AAE61DD67A9F001D8B8E84AB3CB1666F7EE0E4030D
25,629,337 UART: Caliptra RT
25,630,051 UART: [state] CFI Enabled
25,810,737 UART: [rt] RT listening for mailbox commands...
25,812,657 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,843,409 UART: [rt]cmd =0x44504543, len=92
25,850,086 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
192,575 UART:
192,949 UART: Running Caliptra ROM ...
194,081 UART:
603,710 UART: [state] CFI Enabled
616,957 UART: [state] LifecycleState = Unprovisioned
618,837 UART: [state] DebugLocked = No
620,157 UART: [state] WD Timer not started. Device not locked for debugging
623,560 UART: [kat] SHA2-256
803,193 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,002 UART: [kat] ++
814,488 UART: [kat] sha1
825,717 UART: [kat] SHA2-256
828,381 UART: [kat] SHA2-384
835,331 UART: [kat] SHA2-512-ACC
837,742 UART: [kat] ECC-384
3,278,355 UART: [kat] HMAC-384Kdf
3,291,729 UART: [kat] LMS
3,768,224 UART: [kat] --
3,771,959 UART: [cold-reset] ++
3,774,461 UART: [fht] FHT @ 0x50003400
3,785,085 UART: [idev] ++
3,785,662 UART: [idev] CDI.KEYID = 6
3,786,616 UART: [idev] SUBJECT.KEYID = 7
3,787,868 UART: [idev] UDS.KEYID = 0
3,788,767 ready_for_fw is high
3,788,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,823 UART: [idev] Erasing UDS.KEYID = 0
6,266,317 UART: [idev] Sha1 KeyId Algorithm
6,291,213 UART: [idev] --
6,296,158 UART: [ldev] ++
6,296,741 UART: [ldev] CDI.KEYID = 6
6,297,626 UART: [ldev] SUBJECT.KEYID = 5
6,298,893 UART: [ldev] AUTHORITY.KEYID = 7
6,300,124 UART: [ldev] FE.KEYID = 1
6,313,418 UART: [ldev] Erasing FE.KEYID = 1
8,791,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,694 UART: [ldev] --
10,586,841 UART: [fwproc] Wait for Commands...
10,590,122 UART: [fwproc] Recv command 0x46574c44
10,592,149 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,441 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,499 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,558 >>> mbox cmd response: success
14,555,961 UART: [afmc] ++
14,556,553 UART: [afmc] CDI.KEYID = 6
14,557,467 UART: [afmc] SUBJECT.KEYID = 7
14,558,695 UART: [afmc] AUTHORITY.KEYID = 5
17,063,895 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,615 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,444 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,517 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,096 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,285 UART: [afmc] --
18,864,370 UART: [cold-reset] --
18,868,882 UART: [state] Locking Datavault
18,875,105 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,803 UART: [state] Locking ICCM
18,879,494 UART: [exit] Launching FMC @ 0x40000130
18,887,953 UART:
18,888,192 UART: Running Caliptra FMC ...
18,889,288 UART:
18,889,453 UART: [state] CFI Enabled
18,897,608 UART: [fht] FMC Alias Private Key: 7
20,664,510 UART: [art] Extend RT PCRs Done
20,665,734 UART: [art] Lock RT PCRs Done
20,667,205 UART: [art] Populate DV Done
20,672,783 UART: [fht] FMC Alias Private Key: 7
20,674,379 UART: [art] Derive CDI
20,675,206 UART: [art] Store in slot 0x4
20,718,025 UART: [art] Derive Key Pair
20,719,032 UART: [art] Store priv key in slot 0x5
23,146,581 UART: [art] Derive Key Pair - Done
23,159,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,045 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,562 UART: [art] PUB.X = 76E754169F359EE404AFB226F0E150D796B6A9F58BA695B0C248D3A02E1000F35A6EF9FDFE1781E00944F9ACC0B626F2
24,874,805 UART: [art] PUB.Y = 42ACFCB0F87A9D80B75126CF91BA5523CC66B49333B947AC2B3124C0C11F10967AC5C00A99FCA33A91DCFCB7A88C1E52
24,882,036 UART: [art] SIG.R = D7188B6A9367B250FCB72F3A84B107F38864466E7186920320636A86325F81B7359DFF953AA0E5A13757CECDFCBEE624
24,889,429 UART: [art] SIG.S = E1FBF0617ABE5F017EDA28A5AA97261AB4CE12BC0D2EF63194B899651207C0640FBD1C45166F941B72FF54833FB0CB0B
25,868,499 UART: Caliptra RT
25,869,189 UART: [state] CFI Enabled
26,001,009 UART: [rt] RT listening for mailbox commands...
26,002,934 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,033,745 UART: [rt]cmd =0x44504543, len=92
26,040,636 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,778,874 ready_for_fw is high
3,779,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,208 >>> mbox cmd response: success
18,693,037 UART:
18,693,433 UART: Running Caliptra FMC ...
18,694,625 UART:
18,694,819 UART: [state] CFI Enabled
18,702,549 UART: [fht] FMC Alias Private Key: 7
20,468,701 UART: [art] Extend RT PCRs Done
20,469,932 UART: [art] Lock RT PCRs Done
20,471,401 UART: [art] Populate DV Done
20,476,887 UART: [fht] FMC Alias Private Key: 7
20,478,537 UART: [art] Derive CDI
20,479,354 UART: [art] Store in slot 0x4
20,521,794 UART: [art] Derive Key Pair
20,522,800 UART: [art] Store priv key in slot 0x5
22,950,356 UART: [art] Derive Key Pair - Done
22,963,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,312 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,798 UART: [art] PUB.X = 7C5E43B159C7C89A4A49292E129B6E2D3A33DF8674F90FBDE5731CD0F6BBFBFC32DD799CCAD64BF77D2EF609D9F10E96
24,678,119 UART: [art] PUB.Y = 3C37F31140ED245FB8297653449E044D21AD6F0F8E7DC4FFB2E335704BD2559F6988304B0741EBE9E3F2224A70B0DE95
24,685,331 UART: [art] SIG.R = C92BA371696447AEBEFE12BAD48BD4721D68C3A2666194E62D7BF9F480A13B8F3943C71A6066EBA2B9256D1172AB94C9
24,692,805 UART: [art] SIG.S = 88322D230294E6851367E73801355FAC06143E84C7AE3A79CC50A1EB505570E0F2C617E08F1E7A6776AF9F76121A0A0C
25,671,583 UART: Caliptra RT
25,672,303 UART: [state] CFI Enabled
25,804,455 UART: [rt] RT listening for mailbox commands...
25,806,380 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,837,197 UART: [rt]cmd =0x44504543, len=92
25,843,719 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,173 UART:
192,520 UART: Running Caliptra ROM ...
193,711 UART:
193,872 UART: [state] CFI Enabled
265,829 UART: [state] LifecycleState = Unprovisioned
268,226 UART: [state] DebugLocked = No
270,537 UART: [state] WD Timer not started. Device not locked for debugging
274,650 UART: [kat] SHA2-256
464,491 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,317 UART: [kat] ++
475,764 UART: [kat] sha1
486,847 UART: [kat] SHA2-256
489,851 UART: [kat] SHA2-384
495,697 UART: [kat] SHA2-512-ACC
498,295 UART: [kat] ECC-384
2,947,692 UART: [kat] HMAC-384Kdf
2,971,300 UART: [kat] LMS
3,503,049 UART: [kat] --
3,507,640 UART: [cold-reset] ++
3,508,791 UART: [fht] FHT @ 0x50003400
3,519,410 UART: [idev] ++
3,520,041 UART: [idev] CDI.KEYID = 6
3,521,032 UART: [idev] SUBJECT.KEYID = 7
3,522,207 UART: [idev] UDS.KEYID = 0
3,523,127 ready_for_fw is high
3,523,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,354 UART: [idev] Erasing UDS.KEYID = 0
6,032,241 UART: [idev] Sha1 KeyId Algorithm
6,054,720 UART: [idev] --
6,061,069 UART: [ldev] ++
6,061,792 UART: [ldev] CDI.KEYID = 6
6,062,710 UART: [ldev] SUBJECT.KEYID = 5
6,063,870 UART: [ldev] AUTHORITY.KEYID = 7
6,065,045 UART: [ldev] FE.KEYID = 1
6,100,650 UART: [ldev] Erasing FE.KEYID = 1
8,604,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,437 UART: [ldev] --
10,415,621 UART: [fwproc] Wait for Commands...
10,417,280 UART: [fwproc] Recv command 0x46574c44
10,419,589 UART: [fwproc] Recv'd Img size: 118548 bytes
13,920,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,323 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,125,955 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,626 >>> mbox cmd response: success
14,690,875 UART: [afmc] ++
14,691,603 UART: [afmc] CDI.KEYID = 6
14,692,796 UART: [afmc] SUBJECT.KEYID = 7
14,694,235 UART: [afmc] AUTHORITY.KEYID = 5
17,235,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,256 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,315 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,507 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,379 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,442 UART: [afmc] --
19,035,262 UART: [cold-reset] --
19,037,886 UART: [state] Locking Datavault
19,041,798 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,965 UART: [state] Locking ICCM
19,045,398 UART: [exit] Launching FMC @ 0x40000130
19,054,079 UART:
19,054,317 UART: Running Caliptra FMC ...
19,055,344 UART:
19,055,491 UART: [state] CFI Enabled
19,120,175 UART: [fht] FMC Alias Private Key: 7
20,886,369 UART: [art] Extend RT PCRs Done
20,887,593 UART: [art] Lock RT PCRs Done
20,889,242 UART: [art] Populate DV Done
20,894,646 UART: [fht] FMC Alias Private Key: 7
20,896,127 UART: [art] Derive CDI
20,896,858 UART: [art] Store in slot 0x4
20,952,649 UART: [art] Derive Key Pair
20,953,684 UART: [art] Store priv key in slot 0x5
23,416,919 UART: [art] Derive Key Pair - Done
23,429,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,808 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,315 UART: [art] PUB.X = 0E49292E5F2E4587DCF07266FF14DF063F592F4FC74E59B89840CB7D695B2928C9B365F8764FB9539A292B3C717BA111
25,150,539 UART: [art] PUB.Y = 4DF473AA0312835484EBABA02DF17BF156F15CF8967217484A132698833EFD26052F1C2B9AAE96588294E6AF32D0DAC2
25,157,804 UART: [art] SIG.R = C0336424C776C5909855740FAE27EBC0F69F91275A237726A64F8DEBE58F885EE3B77024A2F623FDF61B36C70A82577F
25,165,184 UART: [art] SIG.S = 09F9F474FE0BE635AB8A20213FB41A531E7C5E936D9DBDCAC2108D1096404C7A3BEB3E6B8479DC5DDF5E55E46A3320F4
26,144,408 UART: Caliptra RT
26,145,118 UART: [state] CFI Enabled
26,326,065 UART: [rt] RT listening for mailbox commands...
26,328,003 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,358,812 UART: [rt]cmd =0x44504543, len=92
26,365,755 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,435,710 ready_for_fw is high
3,436,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,795,288 >>> mbox cmd response: success
19,088,257 UART:
19,088,657 UART: Running Caliptra FMC ...
19,089,865 UART:
19,090,037 UART: [state] CFI Enabled
19,157,837 UART: [fht] FMC Alias Private Key: 7
20,945,685 UART: [art] Extend RT PCRs Done
20,946,908 UART: [art] Lock RT PCRs Done
20,948,536 UART: [art] Populate DV Done
20,953,943 UART: [fht] FMC Alias Private Key: 7
20,955,479 UART: [art] Derive CDI
20,956,291 UART: [art] Store in slot 0x4
21,011,571 UART: [art] Derive Key Pair
21,012,623 UART: [art] Store priv key in slot 0x5
23,475,257 UART: [art] Derive Key Pair - Done
23,488,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,748 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,255 UART: [art] PUB.X = FFB6EA04B7A0CC0BB6F9280C4B6F772A3A896F75DEBA4481E2B598AE982C24B47565671C3B40B611749019BFE3BB0536
25,210,527 UART: [art] PUB.Y = 40045415A3132E843D837494D4AACD97BCE6F676E1DEBA02B964F73EFDF820778EA1C2D48661FA25BF47C72460F39C0E
25,217,801 UART: [art] SIG.R = 18FDAAA0A45957A29BD9AAD4CA0B7157268DB925D93EDE42B5CFCAA2C9DB827AB736E9DBB489FB0CC2A1BBBCF1119F96
25,225,221 UART: [art] SIG.S = 83B50D451B5109AC397C2090F9E30CED03B1C01A4DF799FEA360F835BE9E1C4B4869DF504A98B8B3C99C60AE5EE1AAF7
26,204,244 UART: Caliptra RT
26,204,950 UART: [state] CFI Enabled
26,385,494 UART: [rt] RT listening for mailbox commands...
26,387,430 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,417,858 UART: [rt]cmd =0x44504543, len=92
26,424,297 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,382 UART:
192,744 UART: Running Caliptra ROM ...
193,932 UART:
603,529 UART: [state] CFI Enabled
619,326 UART: [state] LifecycleState = Unprovisioned
621,706 UART: [state] DebugLocked = No
623,503 UART: [state] WD Timer not started. Device not locked for debugging
628,283 UART: [kat] SHA2-256
818,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,912 UART: [kat] ++
829,438 UART: [kat] sha1
840,878 UART: [kat] SHA2-256
843,955 UART: [kat] SHA2-384
849,310 UART: [kat] SHA2-512-ACC
851,895 UART: [kat] ECC-384
3,294,009 UART: [kat] HMAC-384Kdf
3,307,269 UART: [kat] LMS
3,839,093 UART: [kat] --
3,842,322 UART: [cold-reset] ++
3,843,632 UART: [fht] FHT @ 0x50003400
3,854,972 UART: [idev] ++
3,855,614 UART: [idev] CDI.KEYID = 6
3,856,569 UART: [idev] SUBJECT.KEYID = 7
3,857,816 UART: [idev] UDS.KEYID = 0
3,858,720 ready_for_fw is high
3,858,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,831 UART: [idev] Erasing UDS.KEYID = 0
6,334,160 UART: [idev] Sha1 KeyId Algorithm
6,356,367 UART: [idev] --
6,360,577 UART: [ldev] ++
6,361,313 UART: [ldev] CDI.KEYID = 6
6,362,197 UART: [ldev] SUBJECT.KEYID = 5
6,363,306 UART: [ldev] AUTHORITY.KEYID = 7
6,364,597 UART: [ldev] FE.KEYID = 1
6,376,946 UART: [ldev] Erasing FE.KEYID = 1
8,858,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,652 UART: [ldev] --
10,650,947 UART: [fwproc] Wait for Commands...
10,653,852 UART: [fwproc] Recv command 0x46574c44
10,656,160 UART: [fwproc] Recv'd Img size: 118548 bytes
14,157,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,336 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,938 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,824 >>> mbox cmd response: success
14,921,363 UART: [afmc] ++
14,922,068 UART: [afmc] CDI.KEYID = 6
14,923,268 UART: [afmc] SUBJECT.KEYID = 7
14,924,738 UART: [afmc] AUTHORITY.KEYID = 5
17,428,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,152,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,154,694 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,169,743 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,184,893 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,199,817 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,222,164 UART: [afmc] --
19,225,659 UART: [cold-reset] --
19,230,831 UART: [state] Locking Datavault
19,237,392 UART: [state] Locking PCR0, PCR1 and PCR31
19,239,552 UART: [state] Locking ICCM
19,242,183 UART: [exit] Launching FMC @ 0x40000130
19,250,879 UART:
19,251,117 UART: Running Caliptra FMC ...
19,252,226 UART:
19,252,409 UART: [state] CFI Enabled
19,260,684 UART: [fht] FMC Alias Private Key: 7
21,027,077 UART: [art] Extend RT PCRs Done
21,028,303 UART: [art] Lock RT PCRs Done
21,029,599 UART: [art] Populate DV Done
21,035,025 UART: [fht] FMC Alias Private Key: 7
21,036,623 UART: [art] Derive CDI
21,037,371 UART: [art] Store in slot 0x4
21,079,915 UART: [art] Derive Key Pair
21,080,919 UART: [art] Store priv key in slot 0x5
23,507,803 UART: [art] Derive Key Pair - Done
23,520,848 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,192 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,701 UART: [art] PUB.X = FDD75945E8F326C7EE9698369EE36E445ECEEE1F076E97E5517171C2310BE41B359526A01F50E056DA4F0886D99EE112
25,235,913 UART: [art] PUB.Y = D504F2EF5F5BB0854018582D25F4C0E7ABB7BA27DC8354C5F313D161F0A50829A602B5B3574DBEE566D0ADFFACEEC2D1
25,243,179 UART: [art] SIG.R = 6B7F9E0FADA9C73622A743B87866EDC956EEE98011FB29D2ABCBB5FAB4E79AD0A5A795D5FA955EF8D146F7177BDA6E01
25,250,618 UART: [art] SIG.S = DD1974C62CDFAF469D7891E09E96C740A3C5E18E2896E7B5F7EDE8DB9738C2B30797069E4C2A31B996847DF8793B82E8
26,229,740 UART: Caliptra RT
26,230,453 UART: [state] CFI Enabled
26,363,234 UART: [rt] RT listening for mailbox commands...
26,365,165 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,395,980 UART: [rt]cmd =0x44504543, len=92
26,402,691 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,753,512 ready_for_fw is high
3,754,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,039,680 >>> mbox cmd response: success
19,292,949 UART:
19,293,349 UART: Running Caliptra FMC ...
19,294,512 UART:
19,294,681 UART: [state] CFI Enabled
19,302,595 UART: [fht] FMC Alias Private Key: 7
21,068,962 UART: [art] Extend RT PCRs Done
21,070,198 UART: [art] Lock RT PCRs Done
21,071,702 UART: [art] Populate DV Done
21,077,349 UART: [fht] FMC Alias Private Key: 7
21,078,949 UART: [art] Derive CDI
21,079,693 UART: [art] Store in slot 0x4
21,122,454 UART: [art] Derive Key Pair
21,123,460 UART: [art] Store priv key in slot 0x5
23,550,096 UART: [art] Derive Key Pair - Done
23,563,065 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,420 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,950 UART: [art] PUB.X = 6CCF9312965755EB76767DBC5EF3A29B5962000FBCC49B8D4CE7FC6FD843249E99D8BF05F66609CD63C770D23B5ED97B
25,278,141 UART: [art] PUB.Y = 3C413096784CC18C2CCB07B4D1737816402C4136B7957BE8E409E9883B522DF9DD5300A3298C2312AB1FB943E0D4A7E6
25,285,439 UART: [art] SIG.R = 2F5CF72C3B087A5D11DCC84DB15101D80D5D92FD52688C6BA28116DA1C64B714A5925C6C5D23AC0B5F81AC974FBFC602
25,292,787 UART: [art] SIG.S = 3174CE1CFA232ABDBD3D22D54058C08CC080199A6CC70EF4044BF4921855F8464EB58E4C8941DC2D7F0FFD42D7D23B19
26,271,746 UART: Caliptra RT
26,272,456 UART: [state] CFI Enabled
26,404,754 UART: [rt] RT listening for mailbox commands...
26,406,688 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,437,174 UART: [rt]cmd =0x44504543, len=92
26,444,122 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,771 UART: [kat] SHA2-256
881,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,817 UART: [kat] ++
885,969 UART: [kat] sha1
890,299 UART: [kat] SHA2-256
892,237 UART: [kat] SHA2-384
894,816 UART: [kat] SHA2-512-ACC
896,717 UART: [kat] ECC-384
902,584 UART: [kat] HMAC-384Kdf
907,118 UART: [kat] LMS
1,475,314 UART: [kat] --
1,476,349 UART: [cold-reset] ++
1,476,857 UART: [fht] Storing FHT @ 0x50003400
1,479,724 UART: [idev] ++
1,479,892 UART: [idev] CDI.KEYID = 6
1,480,252 UART: [idev] SUBJECT.KEYID = 7
1,480,676 UART: [idev] UDS.KEYID = 0
1,481,021 ready_for_fw is high
1,481,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,382 UART: [idev] Erasing UDS.KEYID = 0
1,504,842 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,462 UART: [idev] --
1,514,569 UART: [ldev] ++
1,514,737 UART: [ldev] CDI.KEYID = 6
1,515,100 UART: [ldev] SUBJECT.KEYID = 5
1,515,526 UART: [ldev] AUTHORITY.KEYID = 7
1,515,989 UART: [ldev] FE.KEYID = 1
1,520,963 UART: [ldev] Erasing FE.KEYID = 1
1,545,812 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,734 UART: [ldev] --
1,585,103 UART: [fwproc] Waiting for Commands...
1,585,720 UART: [fwproc] Received command 0x46574c44
1,586,511 UART: [fwproc] Received Image of size 118548 bytes
2,930,471 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,241 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,668 >>> mbox cmd response: success
3,129,790 UART: [afmc] ++
3,129,958 UART: [afmc] CDI.KEYID = 6
3,130,320 UART: [afmc] SUBJECT.KEYID = 7
3,130,745 UART: [afmc] AUTHORITY.KEYID = 5
3,165,812 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,020 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,182,800 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,509 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,392 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,075 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,015 UART: [afmc] --
3,208,999 UART: [cold-reset] --
3,209,713 UART: [state] Locking Datavault
3,211,050 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,654 UART: [state] Locking ICCM
3,212,172 UART: [exit] Launching FMC @ 0x40000130
3,217,502 UART:
3,217,518 UART: Running Caliptra FMC ...
3,217,926 UART:
3,217,980 UART: [state] CFI Enabled
3,228,676 UART: [fht] FMC Alias Private Key: 7
3,348,612 UART: [art] Extend RT PCRs Done
3,349,040 UART: [art] Lock RT PCRs Done
3,350,602 UART: [art] Populate DV Done
3,358,873 UART: [fht] FMC Alias Private Key: 7
3,359,905 UART: [art] Derive CDI
3,360,185 UART: [art] Store in slot 0x4
3,445,831 UART: [art] Derive Key Pair
3,446,191 UART: [art] Store priv key in slot 0x5
3,459,398 UART: [art] Derive Key Pair - Done
3,474,042 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,134 UART: [art] PUB.X = 29AB352A0925C5068BE3DFDE8CE4E9EA55D44A1EC19DB88532B8B270D6D1A9877567F292B530DD34BCDD87F294F152B4
3,496,910 UART: [art] PUB.Y = A106076A447212B6BB0EF5C811E59CAA61AF972F072B5880949829538EFDB36EECB997789D7EB84147B79B26CA28403C
3,503,850 UART: [art] SIG.R = 569CDD18936694078C26B9EF1B7B513B3030001542A01BF48C2B38A68FE26DB159F50B4B130198DCC80CA176F4AB7AEC
3,510,592 UART: [art] SIG.S = 50F8CDDE704F7D6125E7845604C1237BAB3B1077F188D1A29E2C0250B5F35D1C7FF3E12EE5DF58CD3592026CCBFAD544
3,534,425 UART: Caliptra RT
3,534,676 UART: [state] CFI Enabled
3,654,376 UART: [rt] RT listening for mailbox commands...
3,655,046 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,416 UART: [rt]cmd =0x44504543, len=92
3,692,346 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,147 ready_for_fw is high
1,362,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,996 >>> mbox cmd response: success
3,041,515 UART:
3,041,531 UART: Running Caliptra FMC ...
3,041,939 UART:
3,041,993 UART: [state] CFI Enabled
3,052,643 UART: [fht] FMC Alias Private Key: 7
3,170,761 UART: [art] Extend RT PCRs Done
3,171,189 UART: [art] Lock RT PCRs Done
3,172,635 UART: [art] Populate DV Done
3,180,526 UART: [fht] FMC Alias Private Key: 7
3,181,676 UART: [art] Derive CDI
3,181,956 UART: [art] Store in slot 0x4
3,267,978 UART: [art] Derive Key Pair
3,268,338 UART: [art] Store priv key in slot 0x5
3,281,601 UART: [art] Derive Key Pair - Done
3,296,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,269 UART: [art] PUB.X = 4370AA2F9513E7305BF22E3868C064CB06BA622A66CD83289691CD8EC297BE9FB1050CF2A315626BD6A7EC3A511889DC
3,319,036 UART: [art] PUB.Y = 84CDE889D1FC5109816B551846EB1B7B68E7758D5DAC0498251413DC0AF0FD40E55FF303C47C8282540E7900CB0E8CDF
3,325,952 UART: [art] SIG.R = FC49893B56489A1968EAF43C9296424B31BA36CBBCF81140E8C9AB5F7503FD1E3B814C0365D067B3C18B0CF7F876C796
3,332,719 UART: [art] SIG.S = 4034A9CC3267AC338FC850B2EFC1ABD6E88D373AD1C3EDCAE10A2E2A30F68F9BF2DDD52FE1CCA22A1AD1D3F91F552D73
3,357,434 UART: Caliptra RT
3,357,685 UART: [state] CFI Enabled
3,477,340 UART: [rt] RT listening for mailbox commands...
3,478,010 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,096 UART: [rt]cmd =0x44504543, len=92
3,515,544 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,124 UART: [kat] SHA2-256
882,055 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,170 UART: [kat] ++
886,322 UART: [kat] sha1
890,420 UART: [kat] SHA2-256
892,358 UART: [kat] SHA2-384
895,243 UART: [kat] SHA2-512-ACC
897,144 UART: [kat] ECC-384
902,653 UART: [kat] HMAC-384Kdf
907,317 UART: [kat] LMS
1,475,513 UART: [kat] --
1,476,274 UART: [cold-reset] ++
1,476,694 UART: [fht] Storing FHT @ 0x50003400
1,479,671 UART: [idev] ++
1,479,839 UART: [idev] CDI.KEYID = 6
1,480,199 UART: [idev] SUBJECT.KEYID = 7
1,480,623 UART: [idev] UDS.KEYID = 0
1,480,968 ready_for_fw is high
1,480,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,767 UART: [idev] Erasing UDS.KEYID = 0
1,505,239 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,789 UART: [idev] --
1,514,792 UART: [ldev] ++
1,514,960 UART: [ldev] CDI.KEYID = 6
1,515,323 UART: [ldev] SUBJECT.KEYID = 5
1,515,749 UART: [ldev] AUTHORITY.KEYID = 7
1,516,212 UART: [ldev] FE.KEYID = 1
1,521,638 UART: [ldev] Erasing FE.KEYID = 1
1,547,277 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,191 UART: [ldev] --
1,586,692 UART: [fwproc] Waiting for Commands...
1,587,511 UART: [fwproc] Received command 0x46574c44
1,588,302 UART: [fwproc] Received Image of size 118548 bytes
2,933,744 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,036 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,254 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,693 >>> mbox cmd response: success
3,133,851 UART: [afmc] ++
3,134,019 UART: [afmc] CDI.KEYID = 6
3,134,381 UART: [afmc] SUBJECT.KEYID = 7
3,134,806 UART: [afmc] AUTHORITY.KEYID = 5
3,169,743 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,137 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,917 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,626 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,509 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,192 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,024 UART: [afmc] --
3,212,924 UART: [cold-reset] --
3,213,770 UART: [state] Locking Datavault
3,215,013 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,617 UART: [state] Locking ICCM
3,216,097 UART: [exit] Launching FMC @ 0x40000130
3,221,427 UART:
3,221,443 UART: Running Caliptra FMC ...
3,221,851 UART:
3,221,994 UART: [state] CFI Enabled
3,232,428 UART: [fht] FMC Alias Private Key: 7
3,351,758 UART: [art] Extend RT PCRs Done
3,352,186 UART: [art] Lock RT PCRs Done
3,353,600 UART: [art] Populate DV Done
3,361,947 UART: [fht] FMC Alias Private Key: 7
3,363,021 UART: [art] Derive CDI
3,363,301 UART: [art] Store in slot 0x4
3,449,155 UART: [art] Derive Key Pair
3,449,515 UART: [art] Store priv key in slot 0x5
3,462,798 UART: [art] Derive Key Pair - Done
3,477,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,839 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,604 UART: [art] PUB.X = 70C253E05699304BC7705B112C11574669E5527ADDB0EA19A2BB123B6AD4CE3477AC345D0B2494E7AEC235F6DD12986C
3,500,375 UART: [art] PUB.Y = 4FC8423CD3C4B2E404561CA474F9073DFEA89E4BCCACEF2EE05236320C416A7490634A455B3B093478ACB2D18B6F034D
3,507,320 UART: [art] SIG.R = 14FF65FAD382CF1082C5D8EA77774CDE16453AEFC3439355BBEC5588A46DA0EE730A350954FE4F3F41DCDAD23DFF6BF6
3,514,106 UART: [art] SIG.S = 494DE494138CC256862CDA77E6E1FFDAD411B30DA338AF009829DCE43FF1C91CE3EB43A80FB6611C5030FC67D8C048DD
3,537,450 UART: Caliptra RT
3,537,793 UART: [state] CFI Enabled
3,659,391 UART: [rt] RT listening for mailbox commands...
3,660,061 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,605 UART: [rt]cmd =0x44504543, len=92
3,698,043 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,412 ready_for_fw is high
1,362,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,323 >>> mbox cmd response: success
3,044,064 UART:
3,044,080 UART: Running Caliptra FMC ...
3,044,488 UART:
3,044,631 UART: [state] CFI Enabled
3,054,817 UART: [fht] FMC Alias Private Key: 7
3,174,581 UART: [art] Extend RT PCRs Done
3,175,009 UART: [art] Lock RT PCRs Done
3,176,661 UART: [art] Populate DV Done
3,184,804 UART: [fht] FMC Alias Private Key: 7
3,185,748 UART: [art] Derive CDI
3,186,028 UART: [art] Store in slot 0x4
3,271,962 UART: [art] Derive Key Pair
3,272,322 UART: [art] Store priv key in slot 0x5
3,285,357 UART: [art] Derive Key Pair - Done
3,300,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,008 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,773 UART: [art] PUB.X = 4EE09B8324415F56241444F3ED41655A64A420AD6201CAF8C4DEAD6229937CBF2C5E26408AABC8674C03CA87DCD7C82B
3,322,547 UART: [art] PUB.Y = 3798DED27B69A69E8BD3544B9FE9A2AD302928BA74299C7DE8C970197AEE5C78227F0F35B85CD627A6DB6D8F29CAC9E6
3,329,508 UART: [art] SIG.R = DBF483614685F5D6297045A324BD1985549CE8078E619DDAD7F4A9E75B7F9B2ED0DC6AB936BDD1C4DD4C53FA37B5543F
3,336,289 UART: [art] SIG.S = 57F45931D38D081EF203A66C225B664BC859A48776B218BEF3B09877CA2D7BDB7499C3E8B9324563F092A8F9896ABD09
3,360,474 UART: Caliptra RT
3,360,817 UART: [state] CFI Enabled
3,480,718 UART: [rt] RT listening for mailbox commands...
3,481,388 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,516 UART: [rt]cmd =0x44504543, len=92
3,519,064 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,764 UART: [state] LifecycleState = Unprovisioned
85,419 UART: [state] DebugLocked = No
86,019 UART: [state] WD Timer not started. Device not locked for debugging
87,152 UART: [kat] SHA2-256
890,702 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,806 UART: [kat] ++
894,958 UART: [kat] sha1
899,092 UART: [kat] SHA2-256
901,032 UART: [kat] SHA2-384
903,965 UART: [kat] SHA2-512-ACC
905,866 UART: [kat] ECC-384
915,807 UART: [kat] HMAC-384Kdf
920,389 UART: [kat] LMS
1,168,701 UART: [kat] --
1,169,374 UART: [cold-reset] ++
1,169,812 UART: [fht] FHT @ 0x50003400
1,172,450 UART: [idev] ++
1,172,618 UART: [idev] CDI.KEYID = 6
1,172,979 UART: [idev] SUBJECT.KEYID = 7
1,173,404 UART: [idev] UDS.KEYID = 0
1,173,750 ready_for_fw is high
1,173,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,487 UART: [idev] Erasing UDS.KEYID = 0
1,197,803 UART: [idev] Sha1 KeyId Algorithm
1,206,687 UART: [idev] --
1,207,600 UART: [ldev] ++
1,207,768 UART: [ldev] CDI.KEYID = 6
1,208,132 UART: [ldev] SUBJECT.KEYID = 5
1,208,559 UART: [ldev] AUTHORITY.KEYID = 7
1,209,022 UART: [ldev] FE.KEYID = 1
1,214,192 UART: [ldev] Erasing FE.KEYID = 1
1,241,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,138 UART: [ldev] --
1,280,551 UART: [fwproc] Wait for Commands...
1,281,286 UART: [fwproc] Recv command 0x46574c44
1,282,019 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,493 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,668 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,881 >>> mbox cmd response: success
2,824,905 UART: [afmc] ++
2,825,073 UART: [afmc] CDI.KEYID = 6
2,825,436 UART: [afmc] SUBJECT.KEYID = 7
2,825,862 UART: [afmc] AUTHORITY.KEYID = 5
2,861,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,707 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,417 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,298 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,999 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,708 UART: [afmc] --
2,904,699 UART: [cold-reset] --
2,905,361 UART: [state] Locking Datavault
2,906,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,102 UART: [state] Locking ICCM
2,907,660 UART: [exit] Launching FMC @ 0x40000130
2,912,990 UART:
2,913,006 UART: Running Caliptra FMC ...
2,913,414 UART:
2,913,468 UART: [state] CFI Enabled
2,924,156 UART: [fht] FMC Alias Private Key: 7
3,043,240 UART: [art] Extend RT PCRs Done
3,043,668 UART: [art] Lock RT PCRs Done
3,045,336 UART: [art] Populate DV Done
3,053,625 UART: [fht] FMC Alias Private Key: 7
3,054,739 UART: [art] Derive CDI
3,055,019 UART: [art] Store in slot 0x4
3,141,096 UART: [art] Derive Key Pair
3,141,456 UART: [art] Store priv key in slot 0x5
3,155,218 UART: [art] Derive Key Pair - Done
3,169,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,918 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,683 UART: [art] PUB.X = 6382788B74D68801C7662CE52F7301302755006B6053019643E7B8AFB7D59D06BC6FAE1C1590AD1D661FC3F1068A0F90
3,192,407 UART: [art] PUB.Y = AFC5D21BA77598DCBDBC77E262BC5E8656E46735CEB7105F1DCC873B09776EE8E1237086F0A1485B1AB1500F2F35BAD5
3,199,365 UART: [art] SIG.R = B4E41120AA02379804D85D8FA6A3D4EA2F4B12CB825EA9E6F9BD1B3F70FF2DFFF77E8E7299A11F565234A76E1A5CD497
3,206,145 UART: [art] SIG.S = EA59D5DD5FFA91D709DF879F7DF487532AFEEBBC9DC2B10342546A08E1FCE9EC70FCE6F23277F76BA9741F7A602F3F13
3,229,962 UART: Caliptra RT
3,230,213 UART: [state] CFI Enabled
3,350,158 UART: [rt] RT listening for mailbox commands...
3,350,828 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,224 UART: [rt]cmd =0x44504543, len=92
3,388,812 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,500 ready_for_fw is high
1,059,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,246 >>> mbox cmd response: success
2,742,899 UART:
2,742,915 UART: Running Caliptra FMC ...
2,743,323 UART:
2,743,377 UART: [state] CFI Enabled
2,753,751 UART: [fht] FMC Alias Private Key: 7
2,871,647 UART: [art] Extend RT PCRs Done
2,872,075 UART: [art] Lock RT PCRs Done
2,873,463 UART: [art] Populate DV Done
2,881,824 UART: [fht] FMC Alias Private Key: 7
2,882,888 UART: [art] Derive CDI
2,883,168 UART: [art] Store in slot 0x4
2,969,197 UART: [art] Derive Key Pair
2,969,557 UART: [art] Store priv key in slot 0x5
2,983,117 UART: [art] Derive Key Pair - Done
2,997,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,770 UART: [art] PUB.X = 5149AF32E0B4F02A536C2E2D1C665FCCE0622B76C6EC7EE2CA320A69C0CF2F960A62599D6253FE1CEA087EE54A271D24
3,020,545 UART: [art] PUB.Y = C28748CBB074FE985962E372610F6576842D7821B40B1C02FFB2736BE26E4C2BC7C80BCE483E38D09E3567FC8D508FA8
3,027,487 UART: [art] SIG.R = 51B80D8115E74954A81B354324EF458345AF9F157D743418F2DA41DFC6FA578127D82FF3FDBCF340D3D63A9EF4701899
3,034,256 UART: [art] SIG.S = CFB1A7FDB72B84A12D7539F8B1DB1B1BEAC25185119D8E9D30FCDD7E6FCFFBA8B86D903BD5308C77C27F10410545CF60
3,057,905 UART: Caliptra RT
3,058,156 UART: [state] CFI Enabled
3,177,112 UART: [rt] RT listening for mailbox commands...
3,177,782 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,918 UART: [rt]cmd =0x44504543, len=92
3,214,996 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = No
86,294 UART: [state] WD Timer not started. Device not locked for debugging
87,447 UART: [kat] SHA2-256
890,997 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,101 UART: [kat] ++
895,253 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,160 UART: [kat] SHA2-512-ACC
906,061 UART: [kat] ECC-384
915,982 UART: [kat] HMAC-384Kdf
920,528 UART: [kat] LMS
1,168,840 UART: [kat] --
1,169,689 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,769 UART: [idev] ++
1,172,937 UART: [idev] CDI.KEYID = 6
1,173,298 UART: [idev] SUBJECT.KEYID = 7
1,173,723 UART: [idev] UDS.KEYID = 0
1,174,069 ready_for_fw is high
1,174,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,194 UART: [idev] Erasing UDS.KEYID = 0
1,199,052 UART: [idev] Sha1 KeyId Algorithm
1,208,016 UART: [idev] --
1,209,079 UART: [ldev] ++
1,209,247 UART: [ldev] CDI.KEYID = 6
1,209,611 UART: [ldev] SUBJECT.KEYID = 5
1,210,038 UART: [ldev] AUTHORITY.KEYID = 7
1,210,501 UART: [ldev] FE.KEYID = 1
1,215,863 UART: [ldev] Erasing FE.KEYID = 1
1,242,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,725 UART: [ldev] --
1,282,172 UART: [fwproc] Wait for Commands...
1,282,833 UART: [fwproc] Recv command 0x46574c44
1,283,566 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,576 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,751 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,110 >>> mbox cmd response: success
2,826,140 UART: [afmc] ++
2,826,308 UART: [afmc] CDI.KEYID = 6
2,826,671 UART: [afmc] SUBJECT.KEYID = 7
2,827,097 UART: [afmc] AUTHORITY.KEYID = 5
2,862,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,296 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,006 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,887 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,588 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,333 UART: [afmc] --
2,906,214 UART: [cold-reset] --
2,907,102 UART: [state] Locking Datavault
2,908,413 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,017 UART: [state] Locking ICCM
2,909,573 UART: [exit] Launching FMC @ 0x40000130
2,914,903 UART:
2,914,919 UART: Running Caliptra FMC ...
2,915,327 UART:
2,915,470 UART: [state] CFI Enabled
2,926,192 UART: [fht] FMC Alias Private Key: 7
3,045,694 UART: [art] Extend RT PCRs Done
3,046,122 UART: [art] Lock RT PCRs Done
3,047,808 UART: [art] Populate DV Done
3,056,339 UART: [fht] FMC Alias Private Key: 7
3,057,403 UART: [art] Derive CDI
3,057,683 UART: [art] Store in slot 0x4
3,143,414 UART: [art] Derive Key Pair
3,143,774 UART: [art] Store priv key in slot 0x5
3,157,156 UART: [art] Derive Key Pair - Done
3,172,309 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,503 UART: [art] PUB.X = FA7D4689BC59809B3F1152D5247FE4758CF613B0CA45A7BBFFABE5038CFB01BF3E2DB84F134ADD2A61127D6D166DCEF2
3,195,289 UART: [art] PUB.Y = FA8FDA3EE8A76F35F826E3FAAB0055E9B03EC1F88E05391F78A34FF8D09A0E19C59D712E82D24679C210EC662B0EB21B
3,202,224 UART: [art] SIG.R = 74551D5BCD4AAFC248C216D84ABD7EFFDDE38DF53F3DAEA8721D7AAA8D6E375EBC739BDCE5DE0A3E89CC458850CC123B
3,209,025 UART: [art] SIG.S = 08B17C440669E24805FB693CB8694B3D0037CAF5D63D4755612F0199AAB900142DEE30A6785F86BCD761415AC3FA4C8C
3,232,741 UART: Caliptra RT
3,233,084 UART: [state] CFI Enabled
3,352,855 UART: [rt] RT listening for mailbox commands...
3,353,525 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,971 UART: [rt]cmd =0x44504543, len=92
3,391,225 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,179 ready_for_fw is high
1,060,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,887 >>> mbox cmd response: success
2,741,238 UART:
2,741,254 UART: Running Caliptra FMC ...
2,741,662 UART:
2,741,805 UART: [state] CFI Enabled
2,752,303 UART: [fht] FMC Alias Private Key: 7
2,871,211 UART: [art] Extend RT PCRs Done
2,871,639 UART: [art] Lock RT PCRs Done
2,873,275 UART: [art] Populate DV Done
2,881,368 UART: [fht] FMC Alias Private Key: 7
2,882,438 UART: [art] Derive CDI
2,882,718 UART: [art] Store in slot 0x4
2,968,171 UART: [art] Derive Key Pair
2,968,531 UART: [art] Store priv key in slot 0x5
2,981,825 UART: [art] Derive Key Pair - Done
2,997,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,593 UART: [art] PUB.X = 2F9335437618A434E88D544A02D4A27ADDBCB981221903036A4B7DE7B2640473844F6F2DA595E7626290A7FCE70C2444
3,020,342 UART: [art] PUB.Y = C53A7DE876EEE07BC97C1C1FC88A904E34DB81623233053BA626EC67004FE459C1FA2376E3B5EE1964AE740D02B6233F
3,027,269 UART: [art] SIG.R = 0D52F405BA64309EE8DD0004F643F452FDEB19BA6D5728C42A05C0ACA3DCEFA5152876CB874835EDA7A34C0CAB1A5683
3,034,018 UART: [art] SIG.S = 4C499821CB281226042DA6F43C6DD9CB3BB7A767D4A55EFB90DBF41A22040E8412AF08E43C925AFD6CD81AF1A3A6613F
3,057,606 UART: Caliptra RT
3,057,949 UART: [state] CFI Enabled
3,178,128 UART: [rt] RT listening for mailbox commands...
3,178,798 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,156 UART: [rt]cmd =0x44504543, len=92
3,216,316 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
893,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,269 UART: [kat] ++
897,421 UART: [kat] sha1
901,577 UART: [kat] SHA2-256
903,517 UART: [kat] SHA2-384
906,454 UART: [kat] SHA2-512-ACC
908,355 UART: [kat] ECC-384
917,814 UART: [kat] HMAC-384Kdf
922,466 UART: [kat] LMS
1,170,794 UART: [kat] --
1,171,657 UART: [cold-reset] ++
1,171,999 UART: [fht] FHT @ 0x50003400
1,174,640 UART: [idev] ++
1,174,808 UART: [idev] CDI.KEYID = 6
1,175,168 UART: [idev] SUBJECT.KEYID = 7
1,175,592 UART: [idev] UDS.KEYID = 0
1,175,937 ready_for_fw is high
1,175,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,752 UART: [idev] Erasing UDS.KEYID = 0
1,200,909 UART: [idev] Sha1 KeyId Algorithm
1,209,183 UART: [idev] --
1,210,247 UART: [ldev] ++
1,210,415 UART: [ldev] CDI.KEYID = 6
1,210,778 UART: [ldev] SUBJECT.KEYID = 5
1,211,204 UART: [ldev] AUTHORITY.KEYID = 7
1,211,667 UART: [ldev] FE.KEYID = 1
1,216,835 UART: [ldev] Erasing FE.KEYID = 1
1,242,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,333 UART: [ldev] --
1,281,614 UART: [fwproc] Wait for Commands...
1,282,238 UART: [fwproc] Recv command 0x46574c44
1,282,966 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,118 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,288 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,637 >>> mbox cmd response: success
2,828,741 UART: [afmc] ++
2,828,909 UART: [afmc] CDI.KEYID = 6
2,829,271 UART: [afmc] SUBJECT.KEYID = 7
2,829,696 UART: [afmc] AUTHORITY.KEYID = 5
2,865,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,276 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,985 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,868 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,569 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,421 UART: [afmc] --
2,908,379 UART: [cold-reset] --
2,909,223 UART: [state] Locking Datavault
2,910,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,000 UART: [state] Locking ICCM
2,911,446 UART: [exit] Launching FMC @ 0x40000130
2,916,776 UART:
2,916,792 UART: Running Caliptra FMC ...
2,917,200 UART:
2,917,254 UART: [state] CFI Enabled
2,928,152 UART: [fht] FMC Alias Private Key: 7
3,047,118 UART: [art] Extend RT PCRs Done
3,047,546 UART: [art] Lock RT PCRs Done
3,049,182 UART: [art] Populate DV Done
3,057,179 UART: [fht] FMC Alias Private Key: 7
3,058,271 UART: [art] Derive CDI
3,058,551 UART: [art] Store in slot 0x4
3,144,354 UART: [art] Derive Key Pair
3,144,714 UART: [art] Store priv key in slot 0x5
3,157,710 UART: [art] Derive Key Pair - Done
3,172,561 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,281 UART: [art] PUB.X = AED024D148A2869524C73C0D36AD08945ADDC0DA8311785C5C9F041864A2E957311441882968C29979E416FD7C67F1D4
3,196,036 UART: [art] PUB.Y = F72EFF171621CFA14D2A59EEC3D8803A07E05C1AA056CC5E23BEFC00A027B49F81288857D8B687E1F97FFDEB47702DF0
3,202,977 UART: [art] SIG.R = 7161E1891D22465E978BEB91DF54F6B0C893DDB2F5F68EEE79C512B67D239E86CE018B22899FF955A93AE6A5F7FB0870
3,209,749 UART: [art] SIG.S = 2FC0413406BBA0FCF3D82BB61B36C467D4A6AAC47BC6FF591B6101F4AAB793E4F4B20C34586AF0444AEC76286BB75013
3,232,902 UART: Caliptra RT
3,233,153 UART: [state] CFI Enabled
3,352,588 UART: [rt] RT listening for mailbox commands...
3,353,258 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,452 UART: [rt]cmd =0x44504543, len=92
3,390,824 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,013 ready_for_fw is high
1,060,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,274 >>> mbox cmd response: success
2,742,615 UART:
2,742,631 UART: Running Caliptra FMC ...
2,743,039 UART:
2,743,093 UART: [state] CFI Enabled
2,753,259 UART: [fht] FMC Alias Private Key: 7
2,871,967 UART: [art] Extend RT PCRs Done
2,872,395 UART: [art] Lock RT PCRs Done
2,874,313 UART: [art] Populate DV Done
2,882,732 UART: [fht] FMC Alias Private Key: 7
2,883,834 UART: [art] Derive CDI
2,884,114 UART: [art] Store in slot 0x4
2,969,673 UART: [art] Derive Key Pair
2,970,033 UART: [art] Store priv key in slot 0x5
2,983,927 UART: [art] Derive Key Pair - Done
2,998,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,131 UART: [art] PUB.X = 8727F06D3FCF35BF37FBEE63E5DACD46497B36FBDB793E41FCA62F8DB1E3F8492470CB49F1341AE264958C9685908914
3,021,911 UART: [art] PUB.Y = 3475C39D6B8FCC2CCBD4025C5C868A6695A2B3F1F01F8B9B84BBFDA6AB913B9B4935C22D4D2D47913A376B70B8031F65
3,028,867 UART: [art] SIG.R = 6EBFAD44C3D1DB6995B3538FFA76009F57289AD4DA8A7A7EAC663EA992C0A7D4CFECA545B634342A8E1A2887AF545C88
3,035,633 UART: [art] SIG.S = 961254EA560F79DD932199468F46CD1D87E6142A83420869460DD97582687C9D8DC2C66D794FB0247B1B0031CA145D37
3,059,512 UART: Caliptra RT
3,059,763 UART: [state] CFI Enabled
3,180,317 UART: [rt] RT listening for mailbox commands...
3,180,987 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,687 UART: [rt]cmd =0x44504543, len=92
3,218,765 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
893,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,734 UART: [kat] ++
897,886 UART: [kat] sha1
902,182 UART: [kat] SHA2-256
904,122 UART: [kat] SHA2-384
906,953 UART: [kat] SHA2-512-ACC
908,854 UART: [kat] ECC-384
918,449 UART: [kat] HMAC-384Kdf
923,091 UART: [kat] LMS
1,171,419 UART: [kat] --
1,172,462 UART: [cold-reset] ++
1,172,866 UART: [fht] FHT @ 0x50003400
1,175,541 UART: [idev] ++
1,175,709 UART: [idev] CDI.KEYID = 6
1,176,069 UART: [idev] SUBJECT.KEYID = 7
1,176,493 UART: [idev] UDS.KEYID = 0
1,176,838 ready_for_fw is high
1,176,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,529 UART: [idev] Erasing UDS.KEYID = 0
1,201,902 UART: [idev] Sha1 KeyId Algorithm
1,210,242 UART: [idev] --
1,211,256 UART: [ldev] ++
1,211,424 UART: [ldev] CDI.KEYID = 6
1,211,787 UART: [ldev] SUBJECT.KEYID = 5
1,212,213 UART: [ldev] AUTHORITY.KEYID = 7
1,212,676 UART: [ldev] FE.KEYID = 1
1,218,154 UART: [ldev] Erasing FE.KEYID = 1
1,244,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,902 UART: [ldev] --
1,284,243 UART: [fwproc] Wait for Commands...
1,284,895 UART: [fwproc] Recv command 0x46574c44
1,285,623 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,363 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,533 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,738 >>> mbox cmd response: success
2,830,766 UART: [afmc] ++
2,830,934 UART: [afmc] CDI.KEYID = 6
2,831,296 UART: [afmc] SUBJECT.KEYID = 7
2,831,721 UART: [afmc] AUTHORITY.KEYID = 5
2,866,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,857 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,566 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,449 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,150 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,978 UART: [afmc] --
2,910,036 UART: [cold-reset] --
2,910,926 UART: [state] Locking Datavault
2,912,449 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,053 UART: [state] Locking ICCM
2,913,677 UART: [exit] Launching FMC @ 0x40000130
2,919,007 UART:
2,919,023 UART: Running Caliptra FMC ...
2,919,431 UART:
2,919,574 UART: [state] CFI Enabled
2,930,368 UART: [fht] FMC Alias Private Key: 7
3,049,958 UART: [art] Extend RT PCRs Done
3,050,386 UART: [art] Lock RT PCRs Done
3,051,842 UART: [art] Populate DV Done
3,060,249 UART: [fht] FMC Alias Private Key: 7
3,061,271 UART: [art] Derive CDI
3,061,551 UART: [art] Store in slot 0x4
3,147,708 UART: [art] Derive Key Pair
3,148,068 UART: [art] Store priv key in slot 0x5
3,161,586 UART: [art] Derive Key Pair - Done
3,176,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,369 UART: [art] PUB.X = F19C03CBC576CB80548D006CA8FA96EEB8EFD14089BF04ACACEFF031587F75D64363E729E36BDAE210296E881DDF15DE
3,199,131 UART: [art] PUB.Y = 3AA40AD9610571F21C59D602922FD6F83E7E1FCAD2E417EACF8397B3A576302B4C7B943D7D61FC364B01B33BE6C8D995
3,206,079 UART: [art] SIG.R = 94924205F4E10652CF5F8C5154F75A16836D6DE184540A08BDDF841ADCCBC5DFE72BF4F3A9F449C82202A2AD89E22DE7
3,212,846 UART: [art] SIG.S = 82CEE1DD70DDEC7EC76A7D91D08B6F811463022C18905EA3C22193F71B88DEAA293C91613AFD35E47D95748F511FD73E
3,236,765 UART: Caliptra RT
3,237,108 UART: [state] CFI Enabled
3,356,685 UART: [rt] RT listening for mailbox commands...
3,357,355 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,637 UART: [rt]cmd =0x44504543, len=92
3,395,225 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,074 ready_for_fw is high
1,060,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,097 >>> mbox cmd response: success
2,743,302 UART:
2,743,318 UART: Running Caliptra FMC ...
2,743,726 UART:
2,743,869 UART: [state] CFI Enabled
2,754,331 UART: [fht] FMC Alias Private Key: 7
2,873,591 UART: [art] Extend RT PCRs Done
2,874,019 UART: [art] Lock RT PCRs Done
2,875,511 UART: [art] Populate DV Done
2,883,840 UART: [fht] FMC Alias Private Key: 7
2,884,818 UART: [art] Derive CDI
2,885,098 UART: [art] Store in slot 0x4
2,971,105 UART: [art] Derive Key Pair
2,971,465 UART: [art] Store priv key in slot 0x5
2,984,665 UART: [art] Derive Key Pair - Done
2,999,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,793 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,558 UART: [art] PUB.X = B79BC449C77E7E27821A3ABBB699AC176525E7BD3389A612AC53190632D7B41FB9E9D106B33C5547838B081D50DD4D0D
3,022,320 UART: [art] PUB.Y = 05259A35B2088C78862B2F558504490A134E8E82F33EFE4CA572CA342CC9435A3B2A0FD2B10A50CCD2A68AB054D7D108
3,029,253 UART: [art] SIG.R = 90F56AFFC1E41B0F0A84195D264FF6F14AA64CEA4C9CDAF2326B5778C9E5526D9BB90BCF01286DED41D76E7D226ACB5E
3,036,033 UART: [art] SIG.S = 59B094637FAD2678D907B64F4A69E3C8A90E3D291CC1EB93175CCA7FDEE4AAECA4DB904C681073D3312B9546216B273C
3,059,781 UART: Caliptra RT
3,060,124 UART: [state] CFI Enabled
3,180,228 UART: [rt] RT listening for mailbox commands...
3,180,898 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,350 UART: [rt]cmd =0x44504543, len=92
3,218,834 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,094 UART:
192,475 UART: Running Caliptra ROM ...
193,563 UART:
193,710 UART: [state] CFI Enabled
260,214 UART: [state] LifecycleState = Unprovisioned
262,217 UART: [state] DebugLocked = No
263,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,262 UART: [kat] SHA2-256
437,928 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,451 UART: [kat] ++
448,900 UART: [kat] sha1
460,557 UART: [kat] SHA2-256
463,211 UART: [kat] SHA2-384
469,559 UART: [kat] SHA2-512-ACC
471,925 UART: [kat] ECC-384
2,769,231 UART: [kat] HMAC-384Kdf
2,798,661 UART: [kat] LMS
3,988,931 UART: [kat] --
3,992,685 UART: [cold-reset] ++
3,994,969 UART: [fht] Storing FHT @ 0x50003400
4,005,681 UART: [idev] ++
4,006,250 UART: [idev] CDI.KEYID = 6
4,007,167 UART: [idev] SUBJECT.KEYID = 7
4,008,418 UART: [idev] UDS.KEYID = 0
4,009,512 ready_for_fw is high
4,009,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,158,891 UART: [idev] Erasing UDS.KEYID = 0
7,345,084 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,220 UART: [idev] --
7,372,216 UART: [ldev] ++
7,372,822 UART: [ldev] CDI.KEYID = 6
7,373,739 UART: [ldev] SUBJECT.KEYID = 5
7,374,959 UART: [ldev] AUTHORITY.KEYID = 7
7,376,191 UART: [ldev] FE.KEYID = 1
7,422,781 UART: [ldev] Erasing FE.KEYID = 1
10,755,341 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,382 UART: [ldev] --
13,135,928 UART: [fwproc] Waiting for Commands...
13,138,735 UART: [fwproc] Received command 0x46574c44
13,140,928 UART: [fwproc] Received Image of size 118548 bytes
17,241,481 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,321,776 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,394,926 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,723,265 >>> mbox cmd response: success
17,727,473 UART: [afmc] ++
17,728,138 UART: [afmc] CDI.KEYID = 6
17,729,051 UART: [afmc] SUBJECT.KEYID = 7
17,730,275 UART: [afmc] AUTHORITY.KEYID = 5
21,091,843 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,162 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,442 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,410,895 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,610 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,440,030 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,461,673 UART: [afmc] --
23,465,656 UART: [cold-reset] --
23,468,977 UART: [state] Locking Datavault
23,474,923 UART: [state] Locking PCR0, PCR1 and PCR31
23,476,622 UART: [state] Locking ICCM
23,478,447 UART: [exit] Launching FMC @ 0x40000130
23,486,847 UART:
23,487,082 UART: Running Caliptra FMC ...
23,488,188 UART:
23,488,347 UART: [state] CFI Enabled
23,554,406 UART: [fht] FMC Alias Private Key: 7
25,894,733 UART: [art] Extend RT PCRs Done
25,895,955 UART: [art] Lock RT PCRs Done
25,897,611 UART: [art] Populate DV Done
25,903,189 UART: [fht] FMC Alias Private Key: 7
25,904,831 UART: [art] Derive CDI
25,905,567 UART: [art] Store in slot 0x4
25,963,356 UART: [art] Derive Key Pair
25,964,397 UART: [art] Store priv key in slot 0x5
29,257,132 UART: [art] Derive Key Pair - Done
29,270,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,767 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,279 UART: [art] PUB.X = 6422942F298DDBD14F194721CB7442E7D028C2C492F62A24DCC1754E569E917F11D1863A23F5F54D8D015F631FF6FB18
31,568,546 UART: [art] PUB.Y = 981709E0FDE7DAACA0320604D1DC5C222B7CBE5656D3DBCA86D064DAE024BB3A70B4C89FBA447A857DF1CF521233BA89
31,575,799 UART: [art] SIG.R = 8BC8D5E10A4F55CDAFA827C568D8FAC7B3074C7B304E708AEF871910251A219D4425BA64E41DC64DD95AF3A0477BD55E
31,583,209 UART: [art] SIG.S = 0F46FA45FA3CB8FD839E3D10B31AB4E62D80C31F6C8EF2BBEE6B4D8401E0E753B4F82DC1DC1DED48B8F214EB668B5C56
32,888,603 UART: Caliptra RT
32,889,312 UART: [state] CFI Enabled
33,066,550 UART: [rt] RT listening for mailbox commands...
33,068,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,099,408 UART: [rt]cmd =0x44504543, len=96
33,131,113 >>> mbox cmd response data (56 bytes)
33,132,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,162,582 UART: [rt]cmd =0x44504543, len=96
33,194,925 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,786,042 ready_for_fw is high
3,786,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,938,257 >>> mbox cmd response: success
23,627,950 UART:
23,628,380 UART: Running Caliptra FMC ...
23,629,531 UART:
23,629,692 UART: [state] CFI Enabled
23,679,757 UART: [fht] FMC Alias Private Key: 7
26,020,179 UART: [art] Extend RT PCRs Done
26,021,411 UART: [art] Lock RT PCRs Done
26,022,878 UART: [art] Populate DV Done
26,028,199 UART: [fht] FMC Alias Private Key: 7
26,029,825 UART: [art] Derive CDI
26,030,650 UART: [art] Store in slot 0x4
26,087,862 UART: [art] Derive Key Pair
26,088,911 UART: [art] Store priv key in slot 0x5
29,381,441 UART: [art] Derive Key Pair - Done
29,394,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,682,936 UART: [art] Erasing AUTHORITY.KEYID = 7
31,684,445 UART: [art] PUB.X = 8E7E7644A7EBE50C863B2423471289309F3A26727CA9E1F3FE47DB018D3280C42DEC20CC39FD7B65143B76146B55E8FC
31,691,712 UART: [art] PUB.Y = 67E4089842EA11A734FE34F6C0A9E4A062860465D6AA6FD6D0631B6C54FD7C9EE242391306DB42037992FFD240B8E5F2
31,698,976 UART: [art] SIG.R = 9DD7A5A4B92D1F9E26C9C17CDA3FD76AE71E075ADE192A69FEB13AF0CFC86C4ABDAD0D8F9D60C1814CE124B960FA2FD9
31,706,381 UART: [art] SIG.S = AA98FA2EB52116BEB4499148914CAC5E324A1FE0139178E5373040C5050CF9FFD02900B7787B9233F0F1D6A14C8BA319
33,011,685 UART: Caliptra RT
33,012,412 UART: [state] CFI Enabled
33,188,673 UART: [rt] RT listening for mailbox commands...
33,190,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,221,297 UART: [rt]cmd =0x44504543, len=96
33,254,152 >>> mbox cmd response data (56 bytes)
33,255,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,285,501 UART: [rt]cmd =0x44504543, len=96
33,317,201 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
192,214 UART:
192,579 UART: Running Caliptra ROM ...
193,708 UART:
603,295 UART: [state] CFI Enabled
618,960 UART: [state] LifecycleState = Unprovisioned
620,828 UART: [state] DebugLocked = No
623,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,900 UART: [kat] SHA2-256
798,698 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,215 UART: [kat] ++
809,655 UART: [kat] sha1
820,151 UART: [kat] SHA2-256
822,816 UART: [kat] SHA2-384
828,662 UART: [kat] SHA2-512-ACC
831,023 UART: [kat] ECC-384
3,114,405 UART: [kat] HMAC-384Kdf
3,126,288 UART: [kat] LMS
4,316,422 UART: [kat] --
4,318,926 UART: [cold-reset] ++
4,321,498 UART: [fht] Storing FHT @ 0x50003400
4,333,563 UART: [idev] ++
4,334,173 UART: [idev] CDI.KEYID = 6
4,335,058 UART: [idev] SUBJECT.KEYID = 7
4,336,371 UART: [idev] UDS.KEYID = 0
4,337,382 ready_for_fw is high
4,337,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,383 UART: [idev] Erasing UDS.KEYID = 0
7,622,468 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,323 UART: [idev] --
7,647,331 UART: [ldev] ++
7,647,901 UART: [ldev] CDI.KEYID = 6
7,648,860 UART: [ldev] SUBJECT.KEYID = 5
7,650,061 UART: [ldev] AUTHORITY.KEYID = 7
7,651,347 UART: [ldev] FE.KEYID = 1
7,662,495 UART: [ldev] Erasing FE.KEYID = 1
10,945,781 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,773 UART: [ldev] --
13,306,125 UART: [fwproc] Waiting for Commands...
13,308,747 UART: [fwproc] Received command 0x46574c44
13,310,926 UART: [fwproc] Received Image of size 118548 bytes
17,411,197 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,013 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,173 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,617 >>> mbox cmd response: success
17,899,479 UART: [afmc] ++
17,900,095 UART: [afmc] CDI.KEYID = 6
17,901,037 UART: [afmc] SUBJECT.KEYID = 7
17,902,205 UART: [afmc] AUTHORITY.KEYID = 5
21,214,102 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,634 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,512,950 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,341 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,070 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,502 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,580 UART: [afmc] --
23,580,868 UART: [cold-reset] --
23,586,498 UART: [state] Locking Datavault
23,591,531 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,276 UART: [state] Locking ICCM
23,596,067 UART: [exit] Launching FMC @ 0x40000130
23,604,456 UART:
23,604,687 UART: Running Caliptra FMC ...
23,605,750 UART:
23,605,900 UART: [state] CFI Enabled
23,613,770 UART: [fht] FMC Alias Private Key: 7
25,953,745 UART: [art] Extend RT PCRs Done
25,954,962 UART: [art] Lock RT PCRs Done
25,956,557 UART: [art] Populate DV Done
25,962,072 UART: [fht] FMC Alias Private Key: 7
25,963,767 UART: [art] Derive CDI
25,964,499 UART: [art] Store in slot 0x4
26,007,461 UART: [art] Derive Key Pair
26,008,464 UART: [art] Store priv key in slot 0x5
29,250,759 UART: [art] Derive Key Pair - Done
29,263,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,139 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,651 UART: [art] PUB.X = 28ACD590A1F83D9FBAD2C17EEC8B4108209DA428CC418B52B9422AEF30E138320504B49145A17AF55ADCCA053E22DDCF
31,552,958 UART: [art] PUB.Y = 3BEAA2EF90F3669686AF276D4AA80C9D7C0EC699C648987E4545D253293E065CF588862B454CEC11F1D0DFCCA6800E95
31,560,210 UART: [art] SIG.R = 76034F2198F1CB0A74342C3EFC48B4B7D3B61857DF58FD05539E064498D17D1EDAA3B412BBD53F1FA560AEFC7EE1FF7D
31,567,602 UART: [art] SIG.S = 6E9A0C956AB9CF44BB330848E0B1556AABC837631859041D49B894980BEC8740B902800F96AE58CF0D2F403355854A0F
32,872,477 UART: Caliptra RT
32,873,187 UART: [state] CFI Enabled
33,005,603 UART: [rt] RT listening for mailbox commands...
33,007,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,038,184 UART: [rt]cmd =0x44504543, len=96
33,070,048 >>> mbox cmd response data (56 bytes)
33,070,947 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,101,268 UART: [rt]cmd =0x44504543, len=96
33,133,305 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
4,128,105 ready_for_fw is high
4,128,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,144 >>> mbox cmd response: success
23,808,084 UART:
23,808,502 UART: Running Caliptra FMC ...
23,809,616 UART:
23,809,768 UART: [state] CFI Enabled
23,817,725 UART: [fht] FMC Alias Private Key: 7
26,158,246 UART: [art] Extend RT PCRs Done
26,159,470 UART: [art] Lock RT PCRs Done
26,161,014 UART: [art] Populate DV Done
26,166,494 UART: [fht] FMC Alias Private Key: 7
26,168,138 UART: [art] Derive CDI
26,168,948 UART: [art] Store in slot 0x4
26,211,978 UART: [art] Derive Key Pair
26,213,021 UART: [art] Store priv key in slot 0x5
29,455,528 UART: [art] Derive Key Pair - Done
29,468,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,540 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,060 UART: [art] PUB.X = 56F5D4743BB16855CE57E6CFB6511DE0C07E54A796EEEC52CF0F6E59B8A55C717DF930A328E77BCC20895A40033C807F
31,757,313 UART: [art] PUB.Y = 4E0CF92C6CE108893538CE6B5BA728FDD7495A92AB8936146FD5FE799AF2C8635ECB3D9EF8D8FBD859D5CB7982D868DE
31,764,568 UART: [art] SIG.R = 5BF8EA9376626C6B090F09B877D626AB23D68BAB915A51A6876FD2FAFD09329FA9E5D35832CF02FECFC8A454E8FDDC7B
31,771,962 UART: [art] SIG.S = A84792C4ABD7469D7DA38FE0F3BAF11A0227F03176FC9EEDB931E5BCEEDC6AA70C2EB8EB82395DDFF6F13603C2105F13
33,077,616 UART: Caliptra RT
33,078,335 UART: [state] CFI Enabled
33,211,008 UART: [rt] RT listening for mailbox commands...
33,212,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,243,351 UART: [rt]cmd =0x44504543, len=96
33,275,191 >>> mbox cmd response data (56 bytes)
33,276,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,306,417 UART: [rt]cmd =0x44504543, len=96
33,338,528 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,216 UART:
192,575 UART: Running Caliptra ROM ...
193,759 UART:
193,909 UART: [state] CFI Enabled
262,033 UART: [state] LifecycleState = Unprovisioned
264,013 UART: [state] DebugLocked = No
266,399 UART: [state] WD Timer not started. Device not locked for debugging
270,654 UART: [kat] SHA2-256
450,319 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,131 UART: [kat] ++
461,666 UART: [kat] sha1
472,952 UART: [kat] SHA2-256
475,667 UART: [kat] SHA2-384
482,514 UART: [kat] SHA2-512-ACC
484,879 UART: [kat] ECC-384
2,949,111 UART: [kat] HMAC-384Kdf
2,972,145 UART: [kat] LMS
3,448,662 UART: [kat] --
3,454,808 UART: [cold-reset] ++
3,456,878 UART: [fht] FHT @ 0x50003400
3,467,992 UART: [idev] ++
3,468,548 UART: [idev] CDI.KEYID = 6
3,469,495 UART: [idev] SUBJECT.KEYID = 7
3,470,734 UART: [idev] UDS.KEYID = 0
3,471,702 ready_for_fw is high
3,471,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,927 UART: [idev] Erasing UDS.KEYID = 0
5,987,573 UART: [idev] Sha1 KeyId Algorithm
6,011,573 UART: [idev] --
6,016,012 UART: [ldev] ++
6,016,586 UART: [ldev] CDI.KEYID = 6
6,017,568 UART: [ldev] SUBJECT.KEYID = 5
6,018,729 UART: [ldev] AUTHORITY.KEYID = 7
6,020,018 UART: [ldev] FE.KEYID = 1
6,058,213 UART: [ldev] Erasing FE.KEYID = 1
8,565,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,106 UART: [ldev] --
10,375,960 UART: [fwproc] Wait for Commands...
10,378,048 UART: [fwproc] Recv command 0x46574c44
10,380,032 UART: [fwproc] Recv'd Img size: 118548 bytes
13,872,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,196 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,254 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,867 >>> mbox cmd response: success
14,351,236 UART: [afmc] ++
14,351,843 UART: [afmc] CDI.KEYID = 6
14,352,759 UART: [afmc] SUBJECT.KEYID = 7
14,353,981 UART: [afmc] AUTHORITY.KEYID = 5
16,899,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,641,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,643,680 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,659,469 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,675,562 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,691,109 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,716,536 UART: [afmc] --
18,721,188 UART: [cold-reset] --
18,725,177 UART: [state] Locking Datavault
18,730,530 UART: [state] Locking PCR0, PCR1 and PCR31
18,732,273 UART: [state] Locking ICCM
18,734,994 UART: [exit] Launching FMC @ 0x40000130
18,743,434 UART:
18,743,670 UART: Running Caliptra FMC ...
18,744,767 UART:
18,744,922 UART: [state] CFI Enabled
18,798,462 UART: [fht] FMC Alias Private Key: 7
20,564,962 UART: [art] Extend RT PCRs Done
20,566,180 UART: [art] Lock RT PCRs Done
20,567,693 UART: [art] Populate DV Done
20,573,045 UART: [fht] FMC Alias Private Key: 7
20,574,742 UART: [art] Derive CDI
20,575,546 UART: [art] Store in slot 0x4
20,630,963 UART: [art] Derive Key Pair
20,632,014 UART: [art] Store priv key in slot 0x5
23,095,686 UART: [art] Derive Key Pair - Done
23,108,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,876 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,375 UART: [art] PUB.X = 9E4EFBDE6F1935EB7A4DBB04E7B783B573A9F8252253A1AF0BE07EC7EAA8220720828910E592DE4F02C15042C4C3CED6
24,829,625 UART: [art] PUB.Y = EFEBC9DD6E69E6BC3D7356E6ACD890516A3E819DB14A7BA998A5B649CAD705A346EDBA2C73372F4F96911F604F6C8622
24,836,955 UART: [art] SIG.R = 8D400DD190A174091CBA87AB76D82A2EE46D34B3D2EA738CA7FEE72B8F6085514287AC31AACF668AD39D99361AF46E7D
24,844,355 UART: [art] SIG.S = 8B9D684E30BDE4AFE7BF3F58B65EC6B1C06D43DF4F78E3F8E7723353AC5BD6D4520EB74E224DD68F34892CC7D9BAE074
25,822,989 UART: Caliptra RT
25,823,683 UART: [state] CFI Enabled
26,005,279 UART: [rt] RT listening for mailbox commands...
26,007,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,038,182 UART: [rt]cmd =0x44504543, len=96
26,069,342 >>> mbox cmd response data (56 bytes)
26,070,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,100,707 UART: [rt]cmd =0x44504543, len=96
26,132,378 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,464,023 ready_for_fw is high
3,464,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,212,689 >>> mbox cmd response: success
18,496,746 UART:
18,497,120 UART: Running Caliptra FMC ...
18,498,310 UART:
18,498,472 UART: [state] CFI Enabled
18,563,571 UART: [fht] FMC Alias Private Key: 7
20,330,226 UART: [art] Extend RT PCRs Done
20,331,491 UART: [art] Lock RT PCRs Done
20,332,925 UART: [art] Populate DV Done
20,338,423 UART: [fht] FMC Alias Private Key: 7
20,339,919 UART: [art] Derive CDI
20,340,683 UART: [art] Store in slot 0x4
20,396,253 UART: [art] Derive Key Pair
20,397,286 UART: [art] Store priv key in slot 0x5
22,860,759 UART: [art] Derive Key Pair - Done
22,873,925 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,585,661 UART: [art] Erasing AUTHORITY.KEYID = 7
24,587,162 UART: [art] PUB.X = F2B4EB7A30BC7FF0F5E200D7582C6347F69612F697C0DFD735963B3986AC4048B5419348380B690DFB8D394A24A91AF5
24,594,425 UART: [art] PUB.Y = 03E62F336ABDC278DB52AD535B804CB39FB23456A6A3685FF93D86E04F87B777F7979F5B63AC50BAF79C014AF4CECF6F
24,601,685 UART: [art] SIG.R = 84A146E22A6877F4B190C387E0F5F08A6AA94EE3FFF07627DF111380EDDF8452DBCC466ACA62B668CDCF7E82A58A98A4
24,609,078 UART: [art] SIG.S = C1E88B1889C9982DBECC06DE57A4DD002EA7D9381D4ABFB071A65EC850ADBAD1A17C55AEEC3BDD666B857A7B2348C1D5
25,588,183 UART: Caliptra RT
25,588,893 UART: [state] CFI Enabled
25,769,122 UART: [rt] RT listening for mailbox commands...
25,771,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,801,616 UART: [rt]cmd =0x44504543, len=96
25,832,780 >>> mbox cmd response data (56 bytes)
25,833,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,864,210 UART: [rt]cmd =0x44504543, len=96
25,895,526 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,335 UART:
192,700 UART: Running Caliptra ROM ...
193,836 UART:
603,370 UART: [state] CFI Enabled
618,113 UART: [state] LifecycleState = Unprovisioned
619,989 UART: [state] DebugLocked = No
623,001 UART: [state] WD Timer not started. Device not locked for debugging
627,255 UART: [kat] SHA2-256
806,916 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,750 UART: [kat] ++
818,200 UART: [kat] sha1
828,862 UART: [kat] SHA2-256
831,593 UART: [kat] SHA2-384
837,516 UART: [kat] SHA2-512-ACC
839,883 UART: [kat] ECC-384
3,283,419 UART: [kat] HMAC-384Kdf
3,295,021 UART: [kat] LMS
3,771,567 UART: [kat] --
3,776,383 UART: [cold-reset] ++
3,778,459 UART: [fht] FHT @ 0x50003400
3,791,075 UART: [idev] ++
3,791,715 UART: [idev] CDI.KEYID = 6
3,792,629 UART: [idev] SUBJECT.KEYID = 7
3,793,873 UART: [idev] UDS.KEYID = 0
3,794,798 ready_for_fw is high
3,795,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,859 UART: [idev] Erasing UDS.KEYID = 0
6,277,508 UART: [idev] Sha1 KeyId Algorithm
6,301,754 UART: [idev] --
6,306,968 UART: [ldev] ++
6,307,548 UART: [ldev] CDI.KEYID = 6
6,308,462 UART: [ldev] SUBJECT.KEYID = 5
6,309,672 UART: [ldev] AUTHORITY.KEYID = 7
6,310,907 UART: [ldev] FE.KEYID = 1
6,325,386 UART: [ldev] Erasing FE.KEYID = 1
8,801,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,360 UART: [ldev] --
10,593,129 UART: [fwproc] Wait for Commands...
10,595,169 UART: [fwproc] Recv command 0x46574c44
10,597,157 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,839 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,872 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,238 >>> mbox cmd response: success
14,557,692 UART: [afmc] ++
14,558,300 UART: [afmc] CDI.KEYID = 6
14,559,216 UART: [afmc] SUBJECT.KEYID = 7
14,560,370 UART: [afmc] AUTHORITY.KEYID = 5
17,061,416 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,762 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,582 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,610 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,205 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,859,642 UART: [afmc] --
18,863,518 UART: [cold-reset] --
18,867,475 UART: [state] Locking Datavault
18,871,919 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,620 UART: [state] Locking ICCM
18,875,938 UART: [exit] Launching FMC @ 0x40000130
18,884,341 UART:
18,884,583 UART: Running Caliptra FMC ...
18,885,688 UART:
18,885,856 UART: [state] CFI Enabled
18,893,970 UART: [fht] FMC Alias Private Key: 7
20,659,124 UART: [art] Extend RT PCRs Done
20,660,366 UART: [art] Lock RT PCRs Done
20,662,343 UART: [art] Populate DV Done
20,668,192 UART: [fht] FMC Alias Private Key: 7
20,669,914 UART: [art] Derive CDI
20,670,656 UART: [art] Store in slot 0x4
20,713,686 UART: [art] Derive Key Pair
20,714,727 UART: [art] Store priv key in slot 0x5
23,141,751 UART: [art] Derive Key Pair - Done
23,154,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,561 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,077 UART: [art] PUB.X = C502085FCFBF1295E231F0B49EC1C80CA52FC8FA7803BFE9562CB6ACC1F34F65A91E0BFB73652041EE2FCE483DC0EA08
24,870,322 UART: [art] PUB.Y = 6A21E3B523F1090FF42B1E7531C5F6898E2526F3976BC7C63626B2D2F5F774D9FA68EE40A53D14B20ED99083F4BAF0AA
24,877,607 UART: [art] SIG.R = 88145CD202A7D858072379E81AA33E8EEF709A1CFF72119769D1ADB9A205672ADE2AE15B2A8ECF01A2C87A2B7000CB5E
24,884,994 UART: [art] SIG.S = 3246977B9BE56D54F9D597FACC2E339665E34B028949CF2E9907B6BE06F47528B41281628A8D50A4EAD19FB7419E4AAE
25,863,710 UART: Caliptra RT
25,864,404 UART: [state] CFI Enabled
25,997,406 UART: [rt] RT listening for mailbox commands...
25,999,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,030,006 UART: [rt]cmd =0x44504543, len=96
26,061,624 >>> mbox cmd response data (56 bytes)
26,062,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,093,136 UART: [rt]cmd =0x44504543, len=96
26,124,849 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,549 writing to cptra_bootfsm_go
3,782,383 ready_for_fw is high
3,782,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,389 >>> mbox cmd response: success
18,700,523 UART:
18,700,911 UART: Running Caliptra FMC ...
18,702,107 UART:
18,702,294 UART: [state] CFI Enabled
18,710,091 UART: [fht] FMC Alias Private Key: 7
20,476,406 UART: [art] Extend RT PCRs Done
20,477,636 UART: [art] Lock RT PCRs Done
20,479,343 UART: [art] Populate DV Done
20,484,729 UART: [fht] FMC Alias Private Key: 7
20,486,330 UART: [art] Derive CDI
20,487,148 UART: [art] Store in slot 0x4
20,529,843 UART: [art] Derive Key Pair
20,530,878 UART: [art] Store priv key in slot 0x5
22,957,272 UART: [art] Derive Key Pair - Done
22,970,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,814 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,308 UART: [art] PUB.X = 0FEF8D65715544419DDCD90142E0105C6EBC1C99CABB015E0A2415CC7DB1281E77612A333E35325F8592CA218697A438
24,685,569 UART: [art] PUB.Y = 86BAA05107DE1D14703A58022DDEB79B1F53B29C60BD4C6C35A03E6BAC5FB3D8EB0E666808A00A39149421A9114EB8FA
24,692,835 UART: [art] SIG.R = FF11058E71A85372983AC996AF5378D795A7232296B55BC9A11A680940F139FB38048D478B29D78714AA96B57931A8D4
24,700,203 UART: [art] SIG.S = 29F4BB5D43C4E7CEEF12CBDFF4AFBB63040205E9A47F52D4C6DE3B90289C20D97F43AD92CD0343A2DDA9A594223009EA
25,678,809 UART: Caliptra RT
25,679,511 UART: [state] CFI Enabled
25,813,001 UART: [rt] RT listening for mailbox commands...
25,814,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,845,674 UART: [rt]cmd =0x44504543, len=96
25,876,835 >>> mbox cmd response data (56 bytes)
25,877,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,908,189 UART: [rt]cmd =0x44504543, len=96
25,939,672 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
192,190 UART:
192,566 UART: Running Caliptra ROM ...
193,754 UART:
193,908 UART: [state] CFI Enabled
264,861 UART: [state] LifecycleState = Unprovisioned
267,279 UART: [state] DebugLocked = No
269,025 UART: [state] WD Timer not started. Device not locked for debugging
273,944 UART: [kat] SHA2-256
463,847 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,581 UART: [kat] ++
475,108 UART: [kat] sha1
486,700 UART: [kat] SHA2-256
489,704 UART: [kat] SHA2-384
495,634 UART: [kat] SHA2-512-ACC
498,179 UART: [kat] ECC-384
2,947,676 UART: [kat] HMAC-384Kdf
2,972,094 UART: [kat] LMS
3,503,900 UART: [kat] --
3,510,057 UART: [cold-reset] ++
3,511,076 UART: [fht] FHT @ 0x50003400
3,521,840 UART: [idev] ++
3,522,542 UART: [idev] CDI.KEYID = 6
3,523,531 UART: [idev] SUBJECT.KEYID = 7
3,524,720 UART: [idev] UDS.KEYID = 0
3,525,645 ready_for_fw is high
3,525,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,985 UART: [idev] Erasing UDS.KEYID = 0
6,029,646 UART: [idev] Sha1 KeyId Algorithm
6,052,605 UART: [idev] --
6,058,162 UART: [ldev] ++
6,058,844 UART: [ldev] CDI.KEYID = 6
6,059,727 UART: [ldev] SUBJECT.KEYID = 5
6,060,938 UART: [ldev] AUTHORITY.KEYID = 7
6,062,113 UART: [ldev] FE.KEYID = 1
6,101,601 UART: [ldev] Erasing FE.KEYID = 1
8,609,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,884 UART: [ldev] --
10,415,059 UART: [fwproc] Wait for Commands...
10,416,786 UART: [fwproc] Recv command 0x46574c44
10,419,107 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,947 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,560 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,950 >>> mbox cmd response: success
14,683,042 UART: [afmc] ++
14,683,761 UART: [afmc] CDI.KEYID = 6
14,684,957 UART: [afmc] SUBJECT.KEYID = 7
14,686,405 UART: [afmc] AUTHORITY.KEYID = 5
17,218,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,496 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,612 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,760 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,631 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,751 UART: [afmc] --
19,035,445 UART: [cold-reset] --
19,039,740 UART: [state] Locking Datavault
19,047,797 UART: [state] Locking PCR0, PCR1 and PCR31
19,049,997 UART: [state] Locking ICCM
19,052,254 UART: [exit] Launching FMC @ 0x40000130
19,060,915 UART:
19,061,184 UART: Running Caliptra FMC ...
19,062,295 UART:
19,062,458 UART: [state] CFI Enabled
19,116,441 UART: [fht] FMC Alias Private Key: 7
20,903,924 UART: [art] Extend RT PCRs Done
20,905,147 UART: [art] Lock RT PCRs Done
20,906,587 UART: [art] Populate DV Done
20,912,056 UART: [fht] FMC Alias Private Key: 7
20,913,645 UART: [art] Derive CDI
20,914,458 UART: [art] Store in slot 0x4
20,969,653 UART: [art] Derive Key Pair
20,970,650 UART: [art] Store priv key in slot 0x5
23,433,562 UART: [art] Derive Key Pair - Done
23,446,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,890 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,401 UART: [art] PUB.X = 306C0BD1FB99ABC5A928DE826703D75677B28D46FC3E47B74522ED9839D6851485E21FCB94625B755ED2C5E27AE4F958
25,168,636 UART: [art] PUB.Y = 9F692174B929F39D4561061E919A8582BB59AFDE4249633EF7D295718B8BCC226AC3D71F21DDE0EA1C1EAF707426F851
25,175,902 UART: [art] SIG.R = DF5A92471F66E0BF02090479748B86BBC6EDF7E192E7CECFC8ABAF5BAC6994BAD6260F7380EFFC13EB1C1ABE5C385E8C
25,183,270 UART: [art] SIG.S = 0D29734DBD3C98B3FAB2C4B09ECDF9A5970E1B674E58F7845B097755FEE217EB491FB2445A47E3A55FEB507279924FAA
26,162,048 UART: Caliptra RT
26,162,742 UART: [state] CFI Enabled
26,344,520 UART: [rt] RT listening for mailbox commands...
26,346,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,377,024 UART: [rt]cmd =0x44504543, len=96
26,408,079 >>> mbox cmd response data (56 bytes)
26,408,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,439,343 UART: [rt]cmd =0x44504543, len=96
26,470,693 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,430,749 ready_for_fw is high
3,431,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,812,455 >>> mbox cmd response: success
19,102,449 UART:
19,102,829 UART: Running Caliptra FMC ...
19,104,025 UART:
19,104,200 UART: [state] CFI Enabled
19,171,501 UART: [fht] FMC Alias Private Key: 7
20,937,914 UART: [art] Extend RT PCRs Done
20,939,138 UART: [art] Lock RT PCRs Done
20,940,876 UART: [art] Populate DV Done
20,946,404 UART: [fht] FMC Alias Private Key: 7
20,948,060 UART: [art] Derive CDI
20,948,802 UART: [art] Store in slot 0x4
21,004,968 UART: [art] Derive Key Pair
21,005,973 UART: [art] Store priv key in slot 0x5
23,468,948 UART: [art] Derive Key Pair - Done
23,482,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,194,969 UART: [art] Erasing AUTHORITY.KEYID = 7
25,196,478 UART: [art] PUB.X = 9617370F5D80AAD5085A7BD6051D0E345C72CB1BEC7D6C3674E5A2DCDC8BB183D7C8A8B4C4760707EED01FB716136503
25,203,764 UART: [art] PUB.Y = 09005DB2F3D4D039E5B1F15364855EC879B2355BA1159A89356B26A51926631C72D12A3285007D7FC04B98DD3C887AE4
25,210,912 UART: [art] SIG.R = 813DDFBA0F2966D54709A395DBBADE9FD13956C0C58F0E9413740321707366E8E7AFC36FA9F94E95945341C5619415AF
25,218,330 UART: [art] SIG.S = FD2490FA45EF928CA9FC35543613596984B55C07F0C0E8A13DF1B6D747E6E53791D8984CC64409ACBD3AA5B633B27DB2
26,197,559 UART: Caliptra RT
26,198,281 UART: [state] CFI Enabled
26,377,239 UART: [rt] RT listening for mailbox commands...
26,379,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,409,651 UART: [rt]cmd =0x44504543, len=96
26,440,976 >>> mbox cmd response data (56 bytes)
26,441,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,472,386 UART: [rt]cmd =0x44504543, len=96
26,504,283 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,470 UART:
192,850 UART: Running Caliptra ROM ...
194,043 UART:
603,580 UART: [state] CFI Enabled
617,841 UART: [state] LifecycleState = Unprovisioned
620,255 UART: [state] DebugLocked = No
622,789 UART: [state] WD Timer not started. Device not locked for debugging
627,770 UART: [kat] SHA2-256
817,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,466 UART: [kat] ++
828,951 UART: [kat] sha1
839,402 UART: [kat] SHA2-256
842,419 UART: [kat] SHA2-384
849,266 UART: [kat] SHA2-512-ACC
851,859 UART: [kat] ECC-384
3,294,404 UART: [kat] HMAC-384Kdf
3,308,537 UART: [kat] LMS
3,840,357 UART: [kat] --
3,845,060 UART: [cold-reset] ++
3,846,353 UART: [fht] FHT @ 0x50003400
3,858,044 UART: [idev] ++
3,858,756 UART: [idev] CDI.KEYID = 6
3,859,682 UART: [idev] SUBJECT.KEYID = 7
3,860,927 UART: [idev] UDS.KEYID = 0
3,861,859 ready_for_fw is high
3,862,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,999 UART: [idev] Erasing UDS.KEYID = 0
6,334,513 UART: [idev] Sha1 KeyId Algorithm
6,356,617 UART: [idev] --
6,362,021 UART: [ldev] ++
6,362,712 UART: [ldev] CDI.KEYID = 6
6,363,633 UART: [ldev] SUBJECT.KEYID = 5
6,364,849 UART: [ldev] AUTHORITY.KEYID = 7
6,366,046 UART: [ldev] FE.KEYID = 1
6,377,568 UART: [ldev] Erasing FE.KEYID = 1
8,854,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,739 UART: [ldev] --
10,643,518 UART: [fwproc] Wait for Commands...
10,646,537 UART: [fwproc] Recv command 0x46574c44
10,648,847 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,218,725 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,342,372 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,901,912 >>> mbox cmd response: success
14,906,433 UART: [afmc] ++
14,907,188 UART: [afmc] CDI.KEYID = 6
14,908,391 UART: [afmc] SUBJECT.KEYID = 7
14,909,845 UART: [afmc] AUTHORITY.KEYID = 5
17,409,923 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,132,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,134,802 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,149,901 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,165,047 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,180,005 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,203,287 UART: [afmc] --
19,207,326 UART: [cold-reset] --
19,213,090 UART: [state] Locking Datavault
19,220,629 UART: [state] Locking PCR0, PCR1 and PCR31
19,222,794 UART: [state] Locking ICCM
19,225,148 UART: [exit] Launching FMC @ 0x40000130
19,233,840 UART:
19,234,099 UART: Running Caliptra FMC ...
19,235,210 UART:
19,235,373 UART: [state] CFI Enabled
19,243,637 UART: [fht] FMC Alias Private Key: 7
21,009,689 UART: [art] Extend RT PCRs Done
21,010,917 UART: [art] Lock RT PCRs Done
21,012,496 UART: [art] Populate DV Done
21,017,735 UART: [fht] FMC Alias Private Key: 7
21,019,292 UART: [art] Derive CDI
21,020,066 UART: [art] Store in slot 0x4
21,062,672 UART: [art] Derive Key Pair
21,063,682 UART: [art] Store priv key in slot 0x5
23,490,469 UART: [art] Derive Key Pair - Done
23,503,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,209,730 UART: [art] Erasing AUTHORITY.KEYID = 7
25,211,242 UART: [art] PUB.X = 38434F52234916C89820D42B2F665EC97D79D9BA235CEE0F564A947B5EDE82CCBC4270341EF30378EEF5B8B7EBB7763C
25,218,479 UART: [art] PUB.Y = 217B0AD2915D8891A3820BBBC37FF9C3D90A50651B26F512B055031C6B722903AA2195E455F637DCF0F75E5E9F637D03
25,225,743 UART: [art] SIG.R = 7EBCC15B299D68C6A0419267AF33862FD04D647C98B210E07600FA488DF23D0DEF577FAA2F3F7383C8D06D12D1A8B063
25,233,117 UART: [art] SIG.S = F5FF71608C5632A7F9368070FA45004B6165EF5FDE267F8A1239495893E9151C8C3F0FAE72991B6EDAF740A36920375E
26,211,762 UART: Caliptra RT
26,212,450 UART: [state] CFI Enabled
26,344,540 UART: [rt] RT listening for mailbox commands...
26,346,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,377,049 UART: [rt]cmd =0x44504543, len=96
26,408,676 >>> mbox cmd response data (56 bytes)
26,409,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,439,928 UART: [rt]cmd =0x44504543, len=96
26,471,684 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,759,689 ready_for_fw is high
3,760,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,303 >>> mbox cmd response: success
19,299,646 UART:
19,300,046 UART: Running Caliptra FMC ...
19,301,261 UART:
19,301,454 UART: [state] CFI Enabled
19,309,634 UART: [fht] FMC Alias Private Key: 7
21,075,038 UART: [art] Extend RT PCRs Done
21,076,274 UART: [art] Lock RT PCRs Done
21,077,913 UART: [art] Populate DV Done
21,083,351 UART: [fht] FMC Alias Private Key: 7
21,084,879 UART: [art] Derive CDI
21,085,636 UART: [art] Store in slot 0x4
21,128,295 UART: [art] Derive Key Pair
21,129,305 UART: [art] Store priv key in slot 0x5
23,556,281 UART: [art] Derive Key Pair - Done
23,569,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,275,697 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,212 UART: [art] PUB.X = 6FD6903E06A1839A908FAB04BC12EC4E9FF549902405532437F38E235FE18828E2EBE853CD4AEE0AF1593EA711EBFD1A
25,284,451 UART: [art] PUB.Y = 9CB537AF7C5A4F63EA28C5F336F2D24BD3DFB4A539A7B9018AD475F35C86C121D31B27B5287692F7A3E58EBC1283BD1B
25,291,707 UART: [art] SIG.R = 30033D25FFBF75ED5EC5617C4C36B18B220D4050166EBD1982273703D779635BF206049DE458A52828236BBF186A1C98
25,299,105 UART: [art] SIG.S = 9AC0810033B8E2AE803B443D3CBB1671AD680A496DD30271E907761DEAE61651CC2A3E49E8718397C9E65DDD7E61B3B6
26,277,797 UART: Caliptra RT
26,278,488 UART: [state] CFI Enabled
26,412,683 UART: [rt] RT listening for mailbox commands...
26,414,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,445,191 UART: [rt]cmd =0x44504543, len=96
26,476,331 >>> mbox cmd response data (56 bytes)
26,477,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,507,755 UART: [rt]cmd =0x44504543, len=96
26,539,688 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,107 UART: [kat] SHA2-256
882,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,153 UART: [kat] ++
886,305 UART: [kat] sha1
890,429 UART: [kat] SHA2-256
892,367 UART: [kat] SHA2-384
895,342 UART: [kat] SHA2-512-ACC
897,243 UART: [kat] ECC-384
902,406 UART: [kat] HMAC-384Kdf
907,148 UART: [kat] LMS
1,475,344 UART: [kat] --
1,476,465 UART: [cold-reset] ++
1,476,865 UART: [fht] Storing FHT @ 0x50003400
1,479,716 UART: [idev] ++
1,479,884 UART: [idev] CDI.KEYID = 6
1,480,244 UART: [idev] SUBJECT.KEYID = 7
1,480,668 UART: [idev] UDS.KEYID = 0
1,481,013 ready_for_fw is high
1,481,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,732 UART: [idev] Erasing UDS.KEYID = 0
1,504,876 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,582 UART: [idev] --
1,514,593 UART: [ldev] ++
1,514,761 UART: [ldev] CDI.KEYID = 6
1,515,124 UART: [ldev] SUBJECT.KEYID = 5
1,515,550 UART: [ldev] AUTHORITY.KEYID = 7
1,516,013 UART: [ldev] FE.KEYID = 1
1,520,821 UART: [ldev] Erasing FE.KEYID = 1
1,546,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,938 UART: [ldev] --
1,585,283 UART: [fwproc] Waiting for Commands...
1,586,140 UART: [fwproc] Received command 0x46574c44
1,586,931 UART: [fwproc] Received Image of size 118548 bytes
2,931,787 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,977 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,195 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,398 >>> mbox cmd response: success
3,131,632 UART: [afmc] ++
3,131,800 UART: [afmc] CDI.KEYID = 6
3,132,162 UART: [afmc] SUBJECT.KEYID = 7
3,132,587 UART: [afmc] AUTHORITY.KEYID = 5
3,167,476 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,668 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,448 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,157 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,040 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,723 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,669 UART: [afmc] --
3,210,649 UART: [cold-reset] --
3,211,653 UART: [state] Locking Datavault
3,212,910 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,514 UART: [state] Locking ICCM
3,213,952 UART: [exit] Launching FMC @ 0x40000130
3,219,282 UART:
3,219,298 UART: Running Caliptra FMC ...
3,219,706 UART:
3,219,760 UART: [state] CFI Enabled
3,230,154 UART: [fht] FMC Alias Private Key: 7
3,349,138 UART: [art] Extend RT PCRs Done
3,349,566 UART: [art] Lock RT PCRs Done
3,351,390 UART: [art] Populate DV Done
3,359,503 UART: [fht] FMC Alias Private Key: 7
3,360,677 UART: [art] Derive CDI
3,360,957 UART: [art] Store in slot 0x4
3,446,931 UART: [art] Derive Key Pair
3,447,291 UART: [art] Store priv key in slot 0x5
3,460,066 UART: [art] Derive Key Pair - Done
3,474,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,820 UART: [art] PUB.X = 80CAC54A8D9F59C33A0C0E449285A4DC3BE366D5366FDD2AB3C3E44F6F8E960968D3A981398CF59E3826C8074E07D60C
3,497,580 UART: [art] PUB.Y = F0823ED3FE068E33B597CB5D9C2677CA056937A7FAEF83877B40CBBA9216C6869015CEDF60BC10A80831A78777918738
3,504,523 UART: [art] SIG.R = 8C424C868B6AEAF2CB159ABD638E797E950DFA98EDB644965A9799C14F99E670A0A54EBCDA8B7F4895C7A023517A2648
3,511,300 UART: [art] SIG.S = 0D3B257E6C6B5E7E755C009AD0AE35D6B531B75BEDF1411D95A23B67B5524BF0BCCED0A9907F4D411CDACAAB512877C4
3,535,049 UART: Caliptra RT
3,535,300 UART: [state] CFI Enabled
3,654,796 UART: [rt] RT listening for mailbox commands...
3,655,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,736 UART: [rt]cmd =0x44504543, len=96
3,718,246 >>> mbox cmd response data (56 bytes)
3,718,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,748,098 UART: [rt]cmd =0x44504543, len=96
3,780,866 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,791 ready_for_fw is high
1,362,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,852 >>> mbox cmd response: success
3,042,271 UART:
3,042,287 UART: Running Caliptra FMC ...
3,042,695 UART:
3,042,749 UART: [state] CFI Enabled
3,053,483 UART: [fht] FMC Alias Private Key: 7
3,172,193 UART: [art] Extend RT PCRs Done
3,172,621 UART: [art] Lock RT PCRs Done
3,174,347 UART: [art] Populate DV Done
3,182,542 UART: [fht] FMC Alias Private Key: 7
3,183,592 UART: [art] Derive CDI
3,183,872 UART: [art] Store in slot 0x4
3,269,490 UART: [art] Derive Key Pair
3,269,850 UART: [art] Store priv key in slot 0x5
3,283,017 UART: [art] Derive Key Pair - Done
3,297,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,299 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,064 UART: [art] PUB.X = F055261E1A517D50132CBD2447CE48ABB5530316E6758AF23C0AA56D10B9A310E5B402E1C64ABD93D1714C1AB77115CE
3,320,831 UART: [art] PUB.Y = 4A904BE0C94B06F371ADD9B3E906142ACE4D3BAC66A2925F86046B45866AD0EE451D3B20D08D9FCFEFC6D0B9E303DEC0
3,327,789 UART: [art] SIG.R = A27DEF753CC7348D7FEE0387382F06112F96ED56DB27D3E195D3BDAC101B7A838062A1421BDE0D6FB3DA33F62A03320F
3,334,556 UART: [art] SIG.S = 466933CE527CFDF77542D590AB8DCE19FF77C95910A0FB188B85526C3C7502ACF32D49AF6445AFD088F9031030BF3128
3,358,768 UART: Caliptra RT
3,359,019 UART: [state] CFI Enabled
3,479,197 UART: [rt] RT listening for mailbox commands...
3,479,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,349 UART: [rt]cmd =0x44504543, len=96
3,542,751 >>> mbox cmd response data (56 bytes)
3,542,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,825 UART: [rt]cmd =0x44504543, len=96
3,606,025 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,486 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,054 UART: [kat] SHA2-256
881,985 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,100 UART: [kat] ++
886,252 UART: [kat] sha1
890,438 UART: [kat] SHA2-256
892,376 UART: [kat] SHA2-384
895,303 UART: [kat] SHA2-512-ACC
897,204 UART: [kat] ECC-384
902,675 UART: [kat] HMAC-384Kdf
907,381 UART: [kat] LMS
1,475,577 UART: [kat] --
1,476,264 UART: [cold-reset] ++
1,476,598 UART: [fht] Storing FHT @ 0x50003400
1,479,525 UART: [idev] ++
1,479,693 UART: [idev] CDI.KEYID = 6
1,480,053 UART: [idev] SUBJECT.KEYID = 7
1,480,477 UART: [idev] UDS.KEYID = 0
1,480,822 ready_for_fw is high
1,480,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,975 UART: [idev] Erasing UDS.KEYID = 0
1,505,101 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,819 UART: [idev] --
1,514,988 UART: [ldev] ++
1,515,156 UART: [ldev] CDI.KEYID = 6
1,515,519 UART: [ldev] SUBJECT.KEYID = 5
1,515,945 UART: [ldev] AUTHORITY.KEYID = 7
1,516,408 UART: [ldev] FE.KEYID = 1
1,521,676 UART: [ldev] Erasing FE.KEYID = 1
1,547,491 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,573 UART: [ldev] --
1,586,848 UART: [fwproc] Waiting for Commands...
1,587,613 UART: [fwproc] Received command 0x46574c44
1,588,404 UART: [fwproc] Received Image of size 118548 bytes
2,932,562 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,228 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,446 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,753 >>> mbox cmd response: success
3,132,991 UART: [afmc] ++
3,133,159 UART: [afmc] CDI.KEYID = 6
3,133,521 UART: [afmc] SUBJECT.KEYID = 7
3,133,946 UART: [afmc] AUTHORITY.KEYID = 5
3,168,743 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,445 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,934 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,817 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,500 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,532 UART: [afmc] --
3,212,660 UART: [cold-reset] --
3,213,426 UART: [state] Locking Datavault
3,214,821 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,425 UART: [state] Locking ICCM
3,215,873 UART: [exit] Launching FMC @ 0x40000130
3,221,203 UART:
3,221,219 UART: Running Caliptra FMC ...
3,221,627 UART:
3,221,770 UART: [state] CFI Enabled
3,232,420 UART: [fht] FMC Alias Private Key: 7
3,351,020 UART: [art] Extend RT PCRs Done
3,351,448 UART: [art] Lock RT PCRs Done
3,352,900 UART: [art] Populate DV Done
3,361,289 UART: [fht] FMC Alias Private Key: 7
3,362,263 UART: [art] Derive CDI
3,362,543 UART: [art] Store in slot 0x4
3,448,091 UART: [art] Derive Key Pair
3,448,451 UART: [art] Store priv key in slot 0x5
3,462,254 UART: [art] Derive Key Pair - Done
3,477,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,478 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,243 UART: [art] PUB.X = 0909670D51261EDA9E9761BA49833775B861390654F8E707B28F008422ACE6AE21F44FC427E523BD6DE42CA49DFDFE2F
3,499,980 UART: [art] PUB.Y = 858060DEE6FEE69B31997AA3395CF5967B8A9103663DB3D61560F94C31C2CEF0DF30B79A532FFC330D843F164FD3D2B1
3,506,932 UART: [art] SIG.R = 4F47B6223A7CC40A4E19D150A27940145F85C38FB21AA16DD1688A9E9111C9CDCE3A1B13117EF45573FC9C50DCBC5148
3,513,707 UART: [art] SIG.S = 443A2A27DE0D67BCB8294696C54A2B6D776E8D146EB72F37C9069F01AC9A29454220214B24990E110314105D2A2C1876
3,537,660 UART: Caliptra RT
3,538,003 UART: [state] CFI Enabled
3,659,804 UART: [rt] RT listening for mailbox commands...
3,660,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,040 UART: [rt]cmd =0x44504543, len=96
3,723,424 >>> mbox cmd response data (56 bytes)
3,723,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,753,250 UART: [rt]cmd =0x44504543, len=96
3,785,388 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,654 ready_for_fw is high
1,362,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,511 >>> mbox cmd response: success
3,040,688 UART:
3,040,704 UART: Running Caliptra FMC ...
3,041,112 UART:
3,041,255 UART: [state] CFI Enabled
3,051,961 UART: [fht] FMC Alias Private Key: 7
3,171,263 UART: [art] Extend RT PCRs Done
3,171,691 UART: [art] Lock RT PCRs Done
3,173,377 UART: [art] Populate DV Done
3,181,536 UART: [fht] FMC Alias Private Key: 7
3,182,472 UART: [art] Derive CDI
3,182,752 UART: [art] Store in slot 0x4
3,268,702 UART: [art] Derive Key Pair
3,269,062 UART: [art] Store priv key in slot 0x5
3,282,559 UART: [art] Derive Key Pair - Done
3,297,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,844 UART: [art] PUB.X = 9E383921AB46C9C06B05627AEE53EF8AE08B3C7B80AD47130DA265B2449F6D9F9DEA7051CC02DEA35DFA23F3C106827A
3,320,616 UART: [art] PUB.Y = 96D23AC8A58210617E31BA13AE12CC0A387D8C9FF1354EB004D00C732CC96F34CA9FFFF0D94C3A03B7F0734CAE68DD43
3,327,570 UART: [art] SIG.R = AC0FA73E5EC6814F304D606D0B6C2178307F954D184E9B81F6B33BAFF62A5BCC9DA817D6F50DD157E64AB1B6BFDDA149
3,334,351 UART: [art] SIG.S = B6CFB352B10B8DDCAC1E4B93CC3AFC134DF8080A872A68B72893611E18296323005D8C0F988451430CC481D3BDC8A28F
3,358,316 UART: Caliptra RT
3,358,659 UART: [state] CFI Enabled
3,478,380 UART: [rt] RT listening for mailbox commands...
3,479,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,292 UART: [rt]cmd =0x44504543, len=96
3,542,110 >>> mbox cmd response data (56 bytes)
3,542,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,938 UART: [rt]cmd =0x44504543, len=96
3,603,944 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,109 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
890,890 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,994 UART: [kat] ++
895,146 UART: [kat] sha1
899,422 UART: [kat] SHA2-256
901,362 UART: [kat] SHA2-384
904,113 UART: [kat] SHA2-512-ACC
906,014 UART: [kat] ECC-384
915,769 UART: [kat] HMAC-384Kdf
920,301 UART: [kat] LMS
1,168,613 UART: [kat] --
1,169,648 UART: [cold-reset] ++
1,170,046 UART: [fht] FHT @ 0x50003400
1,172,578 UART: [idev] ++
1,172,746 UART: [idev] CDI.KEYID = 6
1,173,107 UART: [idev] SUBJECT.KEYID = 7
1,173,532 UART: [idev] UDS.KEYID = 0
1,173,878 ready_for_fw is high
1,173,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,557 UART: [idev] Erasing UDS.KEYID = 0
1,199,073 UART: [idev] Sha1 KeyId Algorithm
1,207,823 UART: [idev] --
1,208,714 UART: [ldev] ++
1,208,882 UART: [ldev] CDI.KEYID = 6
1,209,246 UART: [ldev] SUBJECT.KEYID = 5
1,209,673 UART: [ldev] AUTHORITY.KEYID = 7
1,210,136 UART: [ldev] FE.KEYID = 1
1,215,092 UART: [ldev] Erasing FE.KEYID = 1
1,240,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,660 UART: [ldev] --
1,279,931 UART: [fwproc] Wait for Commands...
1,280,574 UART: [fwproc] Recv command 0x46574c44
1,281,307 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,271 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,446 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,811 >>> mbox cmd response: success
2,824,937 UART: [afmc] ++
2,825,105 UART: [afmc] CDI.KEYID = 6
2,825,468 UART: [afmc] SUBJECT.KEYID = 7
2,825,894 UART: [afmc] AUTHORITY.KEYID = 5
2,860,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,091 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,801 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,682 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,383 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,178 UART: [afmc] --
2,904,149 UART: [cold-reset] --
2,904,963 UART: [state] Locking Datavault
2,906,436 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,040 UART: [state] Locking ICCM
2,907,536 UART: [exit] Launching FMC @ 0x40000130
2,912,866 UART:
2,912,882 UART: Running Caliptra FMC ...
2,913,290 UART:
2,913,344 UART: [state] CFI Enabled
2,923,698 UART: [fht] FMC Alias Private Key: 7
3,042,996 UART: [art] Extend RT PCRs Done
3,043,424 UART: [art] Lock RT PCRs Done
3,044,878 UART: [art] Populate DV Done
3,053,159 UART: [fht] FMC Alias Private Key: 7
3,054,115 UART: [art] Derive CDI
3,054,395 UART: [art] Store in slot 0x4
3,140,124 UART: [art] Derive Key Pair
3,140,484 UART: [art] Store priv key in slot 0x5
3,153,636 UART: [art] Derive Key Pair - Done
3,168,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,731 UART: [art] PUB.X = AB97E24A7DE1393DDA2E6DD30A2819997BD360C8A4DFDCC282F6F88354DF91E096A1FDFC13D6270BE80A0696EC6AFB70
3,191,509 UART: [art] PUB.Y = 7776EF7BAD3755940D47C61AFDCBF2F5E27A10797B06540AF70AAA83E5E2D0AF7042453275CF6E5F158B9B636CEB7FDF
3,198,463 UART: [art] SIG.R = DAD47C65E87B6EF95B18B3A29D46818C709886DF09B413ACC47C8CB1839D3E8D530DCA9FE0E0CD2F82D692E8E4B8D802
3,205,240 UART: [art] SIG.S = 7A1252D7106E3A6EDB1B9FD27F3BFE440F252BE85EB2EEC279D9C876619B1BA8C536F9BED22C83FC21A5EC9DBC878938
3,228,647 UART: Caliptra RT
3,228,898 UART: [state] CFI Enabled
3,349,275 UART: [rt] RT listening for mailbox commands...
3,349,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,157 UART: [rt]cmd =0x44504543, len=96
3,412,495 >>> mbox cmd response data (56 bytes)
3,412,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,339 UART: [rt]cmd =0x44504543, len=96
3,475,429 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,740 ready_for_fw is high
1,059,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,160 >>> mbox cmd response: success
2,739,199 UART:
2,739,215 UART: Running Caliptra FMC ...
2,739,623 UART:
2,739,677 UART: [state] CFI Enabled
2,749,953 UART: [fht] FMC Alias Private Key: 7
2,869,219 UART: [art] Extend RT PCRs Done
2,869,647 UART: [art] Lock RT PCRs Done
2,871,267 UART: [art] Populate DV Done
2,879,656 UART: [fht] FMC Alias Private Key: 7
2,880,604 UART: [art] Derive CDI
2,880,884 UART: [art] Store in slot 0x4
2,966,835 UART: [art] Derive Key Pair
2,967,195 UART: [art] Store priv key in slot 0x5
2,980,551 UART: [art] Derive Key Pair - Done
2,995,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,444 UART: [art] PUB.X = DD5430409FA754510FD53FE3276B9CC20F2F6F9720C55ED768024F99B9C471EFD1EF18F93E65CE0EC05B70D0D4FDD165
3,018,214 UART: [art] PUB.Y = FE83291602CE17FD100F70D692CC86DF58A37721113E76F2E8A853EC68BA5318F5A355FD5E1D2E407C231210D566AED5
3,025,162 UART: [art] SIG.R = A5D54FA0C596F2112516C2FFAA66ACB4A9500FC197899A244370C0D017198BFA8BD0B12D537B4C9A045BB9A479AC4670
3,031,934 UART: [art] SIG.S = 08D224B175A13D040A31B25E04B54B3F12A4EC1E7BAD6D9D6596D7F041B31525AAA09932F4CB111252BEC9641E72AA73
3,056,214 UART: Caliptra RT
3,056,465 UART: [state] CFI Enabled
3,175,776 UART: [rt] RT listening for mailbox commands...
3,176,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,966 UART: [rt]cmd =0x44504543, len=96
3,239,918 >>> mbox cmd response data (56 bytes)
3,239,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,804 UART: [rt]cmd =0x44504543, len=96
3,303,108 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,860 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
891,715 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,819 UART: [kat] ++
895,971 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,638 UART: [kat] SHA2-512-ACC
906,539 UART: [kat] ECC-384
916,378 UART: [kat] HMAC-384Kdf
921,118 UART: [kat] LMS
1,169,430 UART: [kat] --
1,170,447 UART: [cold-reset] ++
1,170,875 UART: [fht] FHT @ 0x50003400
1,173,573 UART: [idev] ++
1,173,741 UART: [idev] CDI.KEYID = 6
1,174,102 UART: [idev] SUBJECT.KEYID = 7
1,174,527 UART: [idev] UDS.KEYID = 0
1,174,873 ready_for_fw is high
1,174,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,992 UART: [idev] Erasing UDS.KEYID = 0
1,198,890 UART: [idev] Sha1 KeyId Algorithm
1,207,802 UART: [idev] --
1,209,011 UART: [ldev] ++
1,209,179 UART: [ldev] CDI.KEYID = 6
1,209,543 UART: [ldev] SUBJECT.KEYID = 5
1,209,970 UART: [ldev] AUTHORITY.KEYID = 7
1,210,433 UART: [ldev] FE.KEYID = 1
1,215,849 UART: [ldev] Erasing FE.KEYID = 1
1,242,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,301 UART: [ldev] --
1,281,610 UART: [fwproc] Wait for Commands...
1,282,385 UART: [fwproc] Recv command 0x46574c44
1,283,118 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,314 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,489 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,812 >>> mbox cmd response: success
2,827,040 UART: [afmc] ++
2,827,208 UART: [afmc] CDI.KEYID = 6
2,827,571 UART: [afmc] SUBJECT.KEYID = 7
2,827,997 UART: [afmc] AUTHORITY.KEYID = 5
2,863,666 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,764 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,474 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,355 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,056 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,813 UART: [afmc] --
2,906,822 UART: [cold-reset] --
2,907,798 UART: [state] Locking Datavault
2,908,873 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,477 UART: [state] Locking ICCM
2,910,057 UART: [exit] Launching FMC @ 0x40000130
2,915,387 UART:
2,915,403 UART: Running Caliptra FMC ...
2,915,811 UART:
2,915,954 UART: [state] CFI Enabled
2,926,494 UART: [fht] FMC Alias Private Key: 7
3,045,736 UART: [art] Extend RT PCRs Done
3,046,164 UART: [art] Lock RT PCRs Done
3,047,744 UART: [art] Populate DV Done
3,055,931 UART: [fht] FMC Alias Private Key: 7
3,056,991 UART: [art] Derive CDI
3,057,271 UART: [art] Store in slot 0x4
3,143,526 UART: [art] Derive Key Pair
3,143,886 UART: [art] Store priv key in slot 0x5
3,157,490 UART: [art] Derive Key Pair - Done
3,172,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,745 UART: [art] PUB.X = C3942741A768B017F6D4FA79C9F257AB33FC9A90419F00C5612132C6BDAA73AA8621A119266A79AE3AFF0CF0B64B9778
3,195,496 UART: [art] PUB.Y = 8FA7F22DADE75F825532826278B33DE2FFC9F8F039D8B06BBA1E79EDE720AEA839152C89506AC873F81441D7E2D77BB0
3,202,458 UART: [art] SIG.R = BF87DE6ADDDB50F32425A0624C280781319A7C7D24D51A4486A165F5F62AB6287253CFB8E85D8CD4F15AD1A62F074A21
3,209,230 UART: [art] SIG.S = 1A478D6E847B2DB42D5FF6F904B4F2641905E5EA21AD32AF8E174893EA8DF3F818F3E89BAD23973C9B878C3A942C97D5
3,232,826 UART: Caliptra RT
3,233,169 UART: [state] CFI Enabled
3,353,388 UART: [rt] RT listening for mailbox commands...
3,354,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,780 UART: [rt]cmd =0x44504543, len=96
3,417,290 >>> mbox cmd response data (56 bytes)
3,417,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,222 UART: [rt]cmd =0x44504543, len=96
3,479,504 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,969 ready_for_fw is high
1,058,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,223 >>> mbox cmd response: success
2,740,040 UART:
2,740,056 UART: Running Caliptra FMC ...
2,740,464 UART:
2,740,607 UART: [state] CFI Enabled
2,751,359 UART: [fht] FMC Alias Private Key: 7
2,870,341 UART: [art] Extend RT PCRs Done
2,870,769 UART: [art] Lock RT PCRs Done
2,872,481 UART: [art] Populate DV Done
2,880,846 UART: [fht] FMC Alias Private Key: 7
2,881,840 UART: [art] Derive CDI
2,882,120 UART: [art] Store in slot 0x4
2,967,799 UART: [art] Derive Key Pair
2,968,159 UART: [art] Store priv key in slot 0x5
2,982,101 UART: [art] Derive Key Pair - Done
2,997,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,415 UART: [art] PUB.X = 002651A22DEB19CDADCADBB177E5D6C48D84998A9460AE7C2E6FCB255283106E8808D2106D5DA67193723D3507E20371
3,020,156 UART: [art] PUB.Y = 60EB4E28CC300168176A9670ECC26C3CEDA4E92D594FBA25482CEA43B8EDEA878F81D7EFED679743E476F6E7BF892B2C
3,027,121 UART: [art] SIG.R = 5A62A7A13E98F3188D2319EA0FB3B237B8B0B587565937383E204E339CB244CC4C761B7A207868A5F0C16CA45354525D
3,033,884 UART: [art] SIG.S = A4AAC2CB3A24B7D6196671DC0FA76502A686164BD5204B49EEB915F27FDE17344F41586BFB12ADCBD323D670874DBB3F
3,057,352 UART: Caliptra RT
3,057,695 UART: [state] CFI Enabled
3,177,904 UART: [rt] RT listening for mailbox commands...
3,178,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,934 UART: [rt]cmd =0x44504543, len=96
3,241,868 >>> mbox cmd response data (56 bytes)
3,241,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,272,130 UART: [rt]cmd =0x44504543, len=96
3,304,518 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
893,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,307 UART: [kat] ++
897,459 UART: [kat] sha1
901,621 UART: [kat] SHA2-256
903,561 UART: [kat] SHA2-384
906,268 UART: [kat] SHA2-512-ACC
908,169 UART: [kat] ECC-384
917,688 UART: [kat] HMAC-384Kdf
922,242 UART: [kat] LMS
1,170,570 UART: [kat] --
1,171,235 UART: [cold-reset] ++
1,171,765 UART: [fht] FHT @ 0x50003400
1,174,458 UART: [idev] ++
1,174,626 UART: [idev] CDI.KEYID = 6
1,174,986 UART: [idev] SUBJECT.KEYID = 7
1,175,410 UART: [idev] UDS.KEYID = 0
1,175,755 ready_for_fw is high
1,175,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,134 UART: [idev] Erasing UDS.KEYID = 0
1,200,179 UART: [idev] Sha1 KeyId Algorithm
1,208,687 UART: [idev] --
1,209,641 UART: [ldev] ++
1,209,809 UART: [ldev] CDI.KEYID = 6
1,210,172 UART: [ldev] SUBJECT.KEYID = 5
1,210,598 UART: [ldev] AUTHORITY.KEYID = 7
1,211,061 UART: [ldev] FE.KEYID = 1
1,216,067 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,215 UART: [ldev] --
1,281,490 UART: [fwproc] Wait for Commands...
1,282,104 UART: [fwproc] Recv command 0x46574c44
1,282,832 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,732 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,902 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,289 >>> mbox cmd response: success
2,828,357 UART: [afmc] ++
2,828,525 UART: [afmc] CDI.KEYID = 6
2,828,887 UART: [afmc] SUBJECT.KEYID = 7
2,829,312 UART: [afmc] AUTHORITY.KEYID = 5
2,865,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,954 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,663 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,546 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,247 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,987 UART: [afmc] --
2,909,003 UART: [cold-reset] --
2,909,875 UART: [state] Locking Datavault
2,911,096 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,700 UART: [state] Locking ICCM
2,912,364 UART: [exit] Launching FMC @ 0x40000130
2,917,694 UART:
2,917,710 UART: Running Caliptra FMC ...
2,918,118 UART:
2,918,172 UART: [state] CFI Enabled
2,928,826 UART: [fht] FMC Alias Private Key: 7
3,047,342 UART: [art] Extend RT PCRs Done
3,047,770 UART: [art] Lock RT PCRs Done
3,048,986 UART: [art] Populate DV Done
3,057,237 UART: [fht] FMC Alias Private Key: 7
3,058,221 UART: [art] Derive CDI
3,058,501 UART: [art] Store in slot 0x4
3,144,194 UART: [art] Derive Key Pair
3,144,554 UART: [art] Store priv key in slot 0x5
3,157,912 UART: [art] Derive Key Pair - Done
3,172,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,166 UART: [art] PUB.X = 4B0EFF0F5429756868617BA0051FA1F71B0493DA1BD48B7CE0C0C1050FAA42E469CAD4E1AF112A5E4B3ED3367D1BCE41
3,195,934 UART: [art] PUB.Y = 5207A47894A25E6C965DA8B14F8BC9B42B339C71C6ACBCA72C28E9D2FB8389B737F670B22B2108687B87B023C2B69392
3,202,880 UART: [art] SIG.R = F7525786AC3BE2931EDCD49C187659CCE59B4DAF42827C185DE433B7F54F302640E42F7DFE00CBAE4946C39083AB453E
3,209,638 UART: [art] SIG.S = 2BA81547A2246C8E39079D718CCC42D882435C2FE80DCDDF0F461076E1C9853C48809F2F8A2141293822296EFE3C46B8
3,233,837 UART: Caliptra RT
3,234,088 UART: [state] CFI Enabled
3,354,121 UART: [rt] RT listening for mailbox commands...
3,354,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,285 UART: [rt]cmd =0x44504543, len=96
3,417,903 >>> mbox cmd response data (56 bytes)
3,417,904 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,747 UART: [rt]cmd =0x44504543, len=96
3,480,315 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,637 ready_for_fw is high
1,059,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,472 >>> mbox cmd response: success
2,743,027 UART:
2,743,043 UART: Running Caliptra FMC ...
2,743,451 UART:
2,743,505 UART: [state] CFI Enabled
2,753,711 UART: [fht] FMC Alias Private Key: 7
2,872,759 UART: [art] Extend RT PCRs Done
2,873,187 UART: [art] Lock RT PCRs Done
2,874,953 UART: [art] Populate DV Done
2,883,052 UART: [fht] FMC Alias Private Key: 7
2,883,992 UART: [art] Derive CDI
2,884,272 UART: [art] Store in slot 0x4
2,970,177 UART: [art] Derive Key Pair
2,970,537 UART: [art] Store priv key in slot 0x5
2,983,403 UART: [art] Derive Key Pair - Done
2,997,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,661 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,426 UART: [art] PUB.X = 479DCF2F19CC07B2F7991BB7CC60E433F1D6E445095FC2930035CC08E125A4AC4D4E95B2E9F604123782ED85B2AE2A9D
3,021,172 UART: [art] PUB.Y = 62821B28819FB16F23BBDB23187AE321D2573CDE82B603AA74A8E89BA21F4134A59C37F6A2F30D8DC245A596FE4709C6
3,028,119 UART: [art] SIG.R = 60E85A5D4BDD8FFBAD7B30498C40B8BDBC44AD761549307E1A83144BC8B2D827D19546ADA7C737EA37ED21C43ACAAC80
3,034,909 UART: [art] SIG.S = 918FA768FA544603190B64A3929B263946F858A0AF4AFBE4FF9902BE0C30AE37CC9FE8E78D149DAF1741E3AE23D07874
3,058,315 UART: Caliptra RT
3,058,566 UART: [state] CFI Enabled
3,179,083 UART: [rt] RT listening for mailbox commands...
3,179,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,977 UART: [rt]cmd =0x44504543, len=96
3,242,197 >>> mbox cmd response data (56 bytes)
3,242,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,272,359 UART: [rt]cmd =0x44504543, len=96
3,304,757 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
87,040 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
893,911 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,036 UART: [kat] ++
898,188 UART: [kat] sha1
902,436 UART: [kat] SHA2-256
904,376 UART: [kat] SHA2-384
907,161 UART: [kat] SHA2-512-ACC
909,062 UART: [kat] ECC-384
918,643 UART: [kat] HMAC-384Kdf
923,461 UART: [kat] LMS
1,171,789 UART: [kat] --
1,172,740 UART: [cold-reset] ++
1,173,192 UART: [fht] FHT @ 0x50003400
1,175,787 UART: [idev] ++
1,175,955 UART: [idev] CDI.KEYID = 6
1,176,315 UART: [idev] SUBJECT.KEYID = 7
1,176,739 UART: [idev] UDS.KEYID = 0
1,177,084 ready_for_fw is high
1,177,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,519 UART: [idev] Erasing UDS.KEYID = 0
1,201,286 UART: [idev] Sha1 KeyId Algorithm
1,209,626 UART: [idev] --
1,210,742 UART: [ldev] ++
1,210,910 UART: [ldev] CDI.KEYID = 6
1,211,273 UART: [ldev] SUBJECT.KEYID = 5
1,211,699 UART: [ldev] AUTHORITY.KEYID = 7
1,212,162 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,162 UART: [ldev] --
1,283,603 UART: [fwproc] Wait for Commands...
1,284,245 UART: [fwproc] Recv command 0x46574c44
1,284,973 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,619 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,789 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,180 >>> mbox cmd response: success
2,828,344 UART: [afmc] ++
2,828,512 UART: [afmc] CDI.KEYID = 6
2,828,874 UART: [afmc] SUBJECT.KEYID = 7
2,829,299 UART: [afmc] AUTHORITY.KEYID = 5
2,864,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,057 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,766 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,649 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,350 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,058 UART: [afmc] --
2,908,120 UART: [cold-reset] --
2,908,766 UART: [state] Locking Datavault
2,910,065 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,669 UART: [state] Locking ICCM
2,911,341 UART: [exit] Launching FMC @ 0x40000130
2,916,671 UART:
2,916,687 UART: Running Caliptra FMC ...
2,917,095 UART:
2,917,238 UART: [state] CFI Enabled
2,927,932 UART: [fht] FMC Alias Private Key: 7
3,046,634 UART: [art] Extend RT PCRs Done
3,047,062 UART: [art] Lock RT PCRs Done
3,048,794 UART: [art] Populate DV Done
3,057,161 UART: [fht] FMC Alias Private Key: 7
3,058,297 UART: [art] Derive CDI
3,058,577 UART: [art] Store in slot 0x4
3,145,196 UART: [art] Derive Key Pair
3,145,556 UART: [art] Store priv key in slot 0x5
3,158,466 UART: [art] Derive Key Pair - Done
3,173,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,288 UART: [art] PUB.X = 009D7E11D2B4933120A0F1D016E698ECE9F42D75B77E8D7FB6833E9829BF20AC8FED544A32351FDDD31E732EBAB66D3B
3,196,050 UART: [art] PUB.Y = 0FD84DC454C376C5938FB8AD21CBC0200547CAAACD9A51523B95F50167BD6080C5DE41CC7F6EEEAD289600849B3E775D
3,202,983 UART: [art] SIG.R = D44C877244D1289940A8E0EEB4ECEF46848A84533F2B1F994495371A21222762C18F88918FB4903E8DFDA8117D198278
3,209,745 UART: [art] SIG.S = 5E1951F086602A0F0A4F666EBA3F212C4153EA607A38D96B0709D376C4DAAACC3540A0649C6772D7F00E22BB3416A61E
3,233,640 UART: Caliptra RT
3,233,983 UART: [state] CFI Enabled
3,353,978 UART: [rt] RT listening for mailbox commands...
3,354,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,944 UART: [rt]cmd =0x44504543, len=96
3,417,774 >>> mbox cmd response data (56 bytes)
3,417,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,748 UART: [rt]cmd =0x44504543, len=96
3,479,680 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,812 ready_for_fw is high
1,060,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,855 >>> mbox cmd response: success
2,742,296 UART:
2,742,312 UART: Running Caliptra FMC ...
2,742,720 UART:
2,742,863 UART: [state] CFI Enabled
2,753,747 UART: [fht] FMC Alias Private Key: 7
2,873,261 UART: [art] Extend RT PCRs Done
2,873,689 UART: [art] Lock RT PCRs Done
2,875,543 UART: [art] Populate DV Done
2,883,800 UART: [fht] FMC Alias Private Key: 7
2,884,884 UART: [art] Derive CDI
2,885,164 UART: [art] Store in slot 0x4
2,971,307 UART: [art] Derive Key Pair
2,971,667 UART: [art] Store priv key in slot 0x5
2,984,909 UART: [art] Derive Key Pair - Done
2,999,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,506 UART: [art] PUB.X = 90A25175B330F47F9DDD641A07BCDEA9AC2587FDE3EDA398A93F2C239A8246DA04A4E64D5711CEDFC5E7B0636817B387
3,022,284 UART: [art] PUB.Y = 34939A6AE5EFD29292F5D412B212F3C80B3D021F9CBECBBE6BA9A0509D8C113732E254772752C734AD1EC3AACEC5B8E2
3,029,244 UART: [art] SIG.R = 376AA45346D83524BC7E300E496CB1E9C625CF80D4E4334FB0CEAB62E60B2FA63D09EEAC0075860E90BD996C09F9B27E
3,035,989 UART: [art] SIG.S = 825B2C3DDAB7536A128F88D6A43FB68F97C47FE2CA9610D1AC205BCEBB72FD1C3897A644A0AA6FD778CA0E81081E4945
3,058,823 UART: Caliptra RT
3,059,166 UART: [state] CFI Enabled
3,179,829 UART: [rt] RT listening for mailbox commands...
3,180,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,771 UART: [rt]cmd =0x44504543, len=96
3,244,461 >>> mbox cmd response data (56 bytes)
3,244,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,274,591 UART: [rt]cmd =0x44504543, len=96
3,307,355 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,085 UART:
192,485 UART: Running Caliptra ROM ...
193,680 UART:
193,839 UART: [state] CFI Enabled
269,586 UART: [state] LifecycleState = Unprovisioned
271,591 UART: [state] DebugLocked = No
273,334 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,853 UART: [kat] SHA2-256
448,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
459,121 UART: [kat] ++
459,568 UART: [kat] sha1
470,228 UART: [kat] SHA2-256
472,957 UART: [kat] SHA2-384
479,231 UART: [kat] SHA2-512-ACC
481,597 UART: [kat] ECC-384
2,767,995 UART: [kat] HMAC-384Kdf
2,801,757 UART: [kat] LMS
3,992,022 UART: [kat] --
3,995,986 UART: [cold-reset] ++
3,996,930 UART: [fht] Storing FHT @ 0x50003400
4,008,422 UART: [idev] ++
4,009,028 UART: [idev] CDI.KEYID = 6
4,009,927 UART: [idev] SUBJECT.KEYID = 7
4,011,182 UART: [idev] UDS.KEYID = 0
4,012,191 ready_for_fw is high
4,012,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,659 UART: [idev] Erasing UDS.KEYID = 0
7,347,171 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,284 UART: [idev] --
7,371,984 UART: [ldev] ++
7,372,573 UART: [ldev] CDI.KEYID = 6
7,373,493 UART: [ldev] SUBJECT.KEYID = 5
7,374,715 UART: [ldev] AUTHORITY.KEYID = 7
7,376,022 UART: [ldev] FE.KEYID = 1
7,423,076 UART: [ldev] Erasing FE.KEYID = 1
10,754,357 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,631 UART: [ldev] --
13,136,095 UART: [fwproc] Waiting for Commands...
13,138,902 UART: [fwproc] Received command 0x46574c44
13,141,142 UART: [fwproc] Received Image of size 118548 bytes
17,241,415 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,313,778 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,386,953 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,715,443 >>> mbox cmd response: success
17,720,543 UART: [afmc] ++
17,721,186 UART: [afmc] CDI.KEYID = 6
17,722,104 UART: [afmc] SUBJECT.KEYID = 7
17,723,324 UART: [afmc] AUTHORITY.KEYID = 5
21,087,331 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,389,575 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,391,852 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,242 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,001 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,435,386 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,457,840 UART: [afmc] --
23,461,985 UART: [cold-reset] --
23,467,198 UART: [state] Locking Datavault
23,474,334 UART: [state] Locking PCR0, PCR1 and PCR31
23,476,038 UART: [state] Locking ICCM
23,477,814 UART: [exit] Launching FMC @ 0x40000130
23,486,208 UART:
23,486,465 UART: Running Caliptra FMC ...
23,487,567 UART:
23,487,727 UART: [state] CFI Enabled
23,547,797 UART: [fht] FMC Alias Private Key: 7
25,887,704 UART: [art] Extend RT PCRs Done
25,888,953 UART: [art] Lock RT PCRs Done
25,890,393 UART: [art] Populate DV Done
25,895,812 UART: [fht] FMC Alias Private Key: 7
25,897,410 UART: [art] Derive CDI
25,898,226 UART: [art] Store in slot 0x4
25,955,498 UART: [art] Derive Key Pair
25,956,541 UART: [art] Store priv key in slot 0x5
29,248,305 UART: [art] Derive Key Pair - Done
29,261,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,565 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,093 UART: [art] PUB.X = 65B3B6BF076158A86424D47B576DF2447E3E65563D2A22FF6084FAD7B2AC33CC1E0DB3879DFFB24500C3F62371A2F7D4
31,559,401 UART: [art] PUB.Y = 2AE3DE253DDA7E4C3C6C009D447AD201164F43678A059652B57689A6599160A33086AD85C1843D92C6D0A1287201F7F9
31,566,553 UART: [art] SIG.R = BAA539CEF4F8A81AFBC44CC917DCE1B7E046C2F56178C45FDC22B0210BCEDE4FFA82D70D6CC25DA08CBDD4ABB8E3D868
31,573,984 UART: [art] SIG.S = 49EEA9FF4E9B131A7CF3621C9F34816FDA96C8A3190AACD4289C836F8BDBA1FB019F45E85463FFF5F3CA36F0E58F959E
32,879,289 UART: Caliptra RT
32,879,995 UART: [state] CFI Enabled
33,056,518 UART: [rt] RT listening for mailbox commands...
33,058,446 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,088,575 UART: [rt]cmd =0x44504543, len=24
33,137,026 >>> mbox cmd response data (40 bytes)
33,138,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,168,609 UART: [rt]cmd =0x44504543, len=96
33,175,127 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,789,264 ready_for_fw is high
3,789,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,935,949 >>> mbox cmd response: success
23,629,923 UART:
23,630,338 UART: Running Caliptra FMC ...
23,631,487 UART:
23,631,651 UART: [state] CFI Enabled
23,700,832 UART: [fht] FMC Alias Private Key: 7
26,040,707 UART: [art] Extend RT PCRs Done
26,041,937 UART: [art] Lock RT PCRs Done
26,043,623 UART: [art] Populate DV Done
26,048,995 UART: [fht] FMC Alias Private Key: 7
26,050,488 UART: [art] Derive CDI
26,051,249 UART: [art] Store in slot 0x4
26,109,647 UART: [art] Derive Key Pair
26,110,692 UART: [art] Store priv key in slot 0x5
29,403,449 UART: [art] Derive Key Pair - Done
29,416,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,511 UART: [art] Erasing AUTHORITY.KEYID = 7
31,707,013 UART: [art] PUB.X = 7F8FCFA9C753CF6515F9BF8701E98930FEAA5A0E573231E42D8FE406CAF80405C02E7E093DEFB7B8D407406DADCBCE5E
31,714,272 UART: [art] PUB.Y = 251B068F1E31CF9FD7F8D88DD7A8AF352140F9FEDF31C0FEF544888A888A524FC5649A7F6C4F4C893BA8C1E1742CFC6E
31,721,521 UART: [art] SIG.R = FB8C25D7BCB2FB1AA81995C04B47113752220DF28D2E551F06C41726DFA39C8F1681ED20677FFA9D501A1F90C2814FCC
31,728,917 UART: [art] SIG.S = B6CC07947C2488EF80EA76AC7FDAAB46E1F76568CC0682515E34C80D7108B825A77689CEEC89FAB4C0D3149F6C67232B
33,034,180 UART: Caliptra RT
33,034,888 UART: [state] CFI Enabled
33,209,422 UART: [rt] RT listening for mailbox commands...
33,211,360 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,241,445 UART: [rt]cmd =0x44504543, len=24
33,269,345 >>> mbox cmd response data (40 bytes)
33,270,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,300,938 UART: [rt]cmd =0x44504543, len=96
33,307,702 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,372 UART:
192,737 UART: Running Caliptra ROM ...
193,921 UART:
603,655 UART: [state] CFI Enabled
616,262 UART: [state] LifecycleState = Unprovisioned
618,135 UART: [state] DebugLocked = No
620,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,884 UART: [kat] SHA2-256
795,651 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,170 UART: [kat] ++
806,643 UART: [kat] sha1
819,004 UART: [kat] SHA2-256
821,727 UART: [kat] SHA2-384
826,501 UART: [kat] SHA2-512-ACC
828,936 UART: [kat] ECC-384
3,112,211 UART: [kat] HMAC-384Kdf
3,125,316 UART: [kat] LMS
4,315,452 UART: [kat] --
4,319,875 UART: [cold-reset] ++
4,321,660 UART: [fht] Storing FHT @ 0x50003400
4,332,488 UART: [idev] ++
4,333,124 UART: [idev] CDI.KEYID = 6
4,334,002 UART: [idev] SUBJECT.KEYID = 7
4,335,243 UART: [idev] UDS.KEYID = 0
4,336,224 ready_for_fw is high
4,336,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,245 UART: [idev] Erasing UDS.KEYID = 0
7,623,640 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,557 UART: [idev] --
7,649,007 UART: [ldev] ++
7,649,577 UART: [ldev] CDI.KEYID = 6
7,650,588 UART: [ldev] SUBJECT.KEYID = 5
7,651,759 UART: [ldev] AUTHORITY.KEYID = 7
7,652,981 UART: [ldev] FE.KEYID = 1
7,662,487 UART: [ldev] Erasing FE.KEYID = 1
10,952,611 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,206 UART: [ldev] --
13,315,677 UART: [fwproc] Waiting for Commands...
13,317,493 UART: [fwproc] Received command 0x46574c44
13,319,669 UART: [fwproc] Received Image of size 118548 bytes
17,425,727 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,985 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,171 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,367 >>> mbox cmd response: success
17,905,452 UART: [afmc] ++
17,906,065 UART: [afmc] CDI.KEYID = 6
17,906,977 UART: [afmc] SUBJECT.KEYID = 7
17,908,369 UART: [afmc] AUTHORITY.KEYID = 5
21,221,940 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,354 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,659 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,041 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,797 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,171 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,746 UART: [afmc] --
23,590,047 UART: [cold-reset] --
23,594,543 UART: [state] Locking Datavault
23,600,712 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,468 UART: [state] Locking ICCM
23,603,804 UART: [exit] Launching FMC @ 0x40000130
23,612,212 UART:
23,612,444 UART: Running Caliptra FMC ...
23,613,536 UART:
23,613,686 UART: [state] CFI Enabled
23,621,591 UART: [fht] FMC Alias Private Key: 7
25,961,560 UART: [art] Extend RT PCRs Done
25,962,786 UART: [art] Lock RT PCRs Done
25,964,676 UART: [art] Populate DV Done
25,969,978 UART: [fht] FMC Alias Private Key: 7
25,971,568 UART: [art] Derive CDI
25,972,378 UART: [art] Store in slot 0x4
26,015,027 UART: [art] Derive Key Pair
26,016,070 UART: [art] Store priv key in slot 0x5
29,258,289 UART: [art] Derive Key Pair - Done
29,271,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,295 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,816 UART: [art] PUB.X = F4896C3F2DDA3769C0AC65549D149FAAAC5185218052963017259F30BF6473CB3A985E3A50A9E3DC192364F24674AABA
31,560,021 UART: [art] PUB.Y = 56850F7D1CBBF114CC0922828B0B2BD87899658FE2504B97E4C1CDCBBE2E45B99EE9B8FF971235A54665DF150278CA7C
31,567,313 UART: [art] SIG.R = D54E300E17AFB73D33E40D4DD280FB84549920CA789D8EC8A7245A073FA43CE4D5F198DE874EDD828D73746D0CF482A3
31,574,715 UART: [art] SIG.S = 59459C466E88B2BE4425191E9526F15C4CA323AB1D5FF6B599E492FFF21EB9FDB01B4DFBF2252A029732BBD177C35A29
32,880,671 UART: Caliptra RT
32,881,384 UART: [state] CFI Enabled
33,014,584 UART: [rt] RT listening for mailbox commands...
33,016,492 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,046,283 UART: [rt]cmd =0x44504543, len=24
33,074,124 >>> mbox cmd response data (40 bytes)
33,075,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,105,660 UART: [rt]cmd =0x44504543, len=96
33,112,460 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
4,131,278 ready_for_fw is high
4,131,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,430 >>> mbox cmd response: success
23,803,870 UART:
23,804,316 UART: Running Caliptra FMC ...
23,805,453 UART:
23,805,611 UART: [state] CFI Enabled
23,813,829 UART: [fht] FMC Alias Private Key: 7
26,154,069 UART: [art] Extend RT PCRs Done
26,155,325 UART: [art] Lock RT PCRs Done
26,156,824 UART: [art] Populate DV Done
26,162,274 UART: [fht] FMC Alias Private Key: 7
26,163,983 UART: [art] Derive CDI
26,164,792 UART: [art] Store in slot 0x4
26,207,284 UART: [art] Derive Key Pair
26,208,325 UART: [art] Store priv key in slot 0x5
29,450,226 UART: [art] Derive Key Pair - Done
29,463,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,495 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,011 UART: [art] PUB.X = 4274BAC22502D261D647D1A4250E1FE9FC5CBA369E8CA546E124236878DCD35F260F84DA62E71D3816071CBC8937DB61
31,752,269 UART: [art] PUB.Y = 18E34AC81CC6A5DBACBDBB9799B27FB18C751F1441A601ABCB8612C726E48EEA501FEA0E599EDB4EACB6FB7572218BAE
31,759,560 UART: [art] SIG.R = AE7102D32843C4015A87856F9521C61E84D71CA3068FAE0424CBAEE5A2B6676A251A6DE88D00FF135FCF6D71FF9FC1DA
31,766,956 UART: [art] SIG.S = 3DDFC44E816AF0A36499069AC534B5DA28FCEDDB5E296A36A228EEC468608EA2230C426F88DD0BFD81D2E9747CF60BA7
33,071,956 UART: Caliptra RT
33,072,658 UART: [state] CFI Enabled
33,206,769 UART: [rt] RT listening for mailbox commands...
33,208,704 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,238,800 UART: [rt]cmd =0x44504543, len=24
33,266,649 >>> mbox cmd response data (40 bytes)
33,267,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,298,573 UART: [rt]cmd =0x44504543, len=96
33,305,300 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
192,257 UART:
192,616 UART: Running Caliptra ROM ...
193,802 UART:
193,954 UART: [state] CFI Enabled
262,449 UART: [state] LifecycleState = Unprovisioned
264,342 UART: [state] DebugLocked = No
266,158 UART: [state] WD Timer not started. Device not locked for debugging
269,704 UART: [kat] SHA2-256
449,335 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,142 UART: [kat] ++
460,614 UART: [kat] sha1
470,844 UART: [kat] SHA2-256
473,567 UART: [kat] SHA2-384
478,274 UART: [kat] SHA2-512-ACC
480,647 UART: [kat] ECC-384
2,947,828 UART: [kat] HMAC-384Kdf
2,969,864 UART: [kat] LMS
3,446,327 UART: [kat] --
3,450,322 UART: [cold-reset] ++
3,451,254 UART: [fht] FHT @ 0x50003400
3,463,220 UART: [idev] ++
3,463,788 UART: [idev] CDI.KEYID = 6
3,464,817 UART: [idev] SUBJECT.KEYID = 7
3,465,992 UART: [idev] UDS.KEYID = 0
3,466,993 ready_for_fw is high
3,467,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,644 UART: [idev] Erasing UDS.KEYID = 0
5,986,469 UART: [idev] Sha1 KeyId Algorithm
6,009,714 UART: [idev] --
6,015,336 UART: [ldev] ++
6,015,915 UART: [ldev] CDI.KEYID = 6
6,016,855 UART: [ldev] SUBJECT.KEYID = 5
6,018,066 UART: [ldev] AUTHORITY.KEYID = 7
6,019,300 UART: [ldev] FE.KEYID = 1
6,052,776 UART: [ldev] Erasing FE.KEYID = 1
8,565,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,294,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,310,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,326,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,342,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,022 UART: [ldev] --
10,369,879 UART: [fwproc] Wait for Commands...
10,372,260 UART: [fwproc] Recv command 0x46574c44
10,374,239 UART: [fwproc] Recv'd Img size: 118548 bytes
13,852,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,926,310 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,999,374 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,328,353 >>> mbox cmd response: success
14,331,593 UART: [afmc] ++
14,332,209 UART: [afmc] CDI.KEYID = 6
14,333,127 UART: [afmc] SUBJECT.KEYID = 7
14,334,340 UART: [afmc] AUTHORITY.KEYID = 5
16,868,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,509 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,596,740 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,612,527 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,628,595 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,644,153 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,668,838 UART: [afmc] --
18,673,508 UART: [cold-reset] --
18,677,686 UART: [state] Locking Datavault
18,683,788 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,535 UART: [state] Locking ICCM
18,687,409 UART: [exit] Launching FMC @ 0x40000130
18,695,804 UART:
18,696,035 UART: Running Caliptra FMC ...
18,697,326 UART:
18,697,491 UART: [state] CFI Enabled
18,752,608 UART: [fht] FMC Alias Private Key: 7
20,518,958 UART: [art] Extend RT PCRs Done
20,520,170 UART: [art] Lock RT PCRs Done
20,521,845 UART: [art] Populate DV Done
20,527,090 UART: [fht] FMC Alias Private Key: 7
20,528,693 UART: [art] Derive CDI
20,529,530 UART: [art] Store in slot 0x4
20,585,546 UART: [art] Derive Key Pair
20,586,575 UART: [art] Store priv key in slot 0x5
23,050,057 UART: [art] Derive Key Pair - Done
23,062,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,775,662 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,289 UART: [art] PUB.X = 9EA57C0C206EDDC189CC106EDA0D99535A635465ED2133632001A787D0B2751DBF0B49B341610BA36EEFE2F6BC497448
24,784,388 UART: [art] PUB.Y = A86149F3F197DB2DE611B146E7550B1F5B555903B585067F16FCF2A12493F3FD423A1F4E93D5F6CDAEE5C91456C16D21
24,791,674 UART: [art] SIG.R = 2F225DF79A0B6085183DB1353C65412F62D708DF94E7F034911BB721C4C95A400CEDC34C0EC6F2467DC45C90D8D2DF50
24,799,062 UART: [art] SIG.S = 41272F8656E8820DF6361314DB48BBCD6F43F8C85617FF35E7976C37B1865F38E6F2AFF6DC17FC8279C53F889D4869EB
25,778,079 UART: Caliptra RT
25,778,777 UART: [state] CFI Enabled
25,959,921 UART: [rt] RT listening for mailbox commands...
25,961,831 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,991,741 UART: [rt]cmd =0x44504543, len=24
26,020,344 >>> mbox cmd response data (40 bytes)
26,021,376 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,052,082 UART: [rt]cmd =0x44504543, len=96
26,058,882 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
3,458,013 ready_for_fw is high
3,458,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,249,494 >>> mbox cmd response: success
18,532,178 UART:
18,532,565 UART: Running Caliptra FMC ...
18,533,752 UART:
18,533,913 UART: [state] CFI Enabled
18,600,332 UART: [fht] FMC Alias Private Key: 7
20,366,629 UART: [art] Extend RT PCRs Done
20,367,857 UART: [art] Lock RT PCRs Done
20,369,539 UART: [art] Populate DV Done
20,374,897 UART: [fht] FMC Alias Private Key: 7
20,376,388 UART: [art] Derive CDI
20,377,153 UART: [art] Store in slot 0x4
20,432,511 UART: [art] Derive Key Pair
20,433,569 UART: [art] Store priv key in slot 0x5
22,896,445 UART: [art] Derive Key Pair - Done
22,909,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,622,101 UART: [art] Erasing AUTHORITY.KEYID = 7
24,623,603 UART: [art] PUB.X = 61CB7C53FCBD376A8DE59277F367D227E8067C36D03473AF1773CE46C7E8314A32152B24F69DC454851DEF07AE568DA1
24,630,881 UART: [art] PUB.Y = A5314F027403D5009944B5A670E0A795C1C4B092B237A9B42B51AD3DE2D1DB8B98CBB82EB46620406837127D7A789714
24,638,092 UART: [art] SIG.R = 6CA0E8649553148F7EEBFF6877984DEBFFABEC8015FF8B0F0F5BBB5396BD57E61D63A398DDA9DBFB93BBC73A10C06CBE
24,645,547 UART: [art] SIG.S = C2D1E563949FC6578900C5CE9236A8293A34719F9AAE28DBC39988D3E6C08D4F7C205488BE18AE8B3232563CC37A99F1
25,624,352 UART: Caliptra RT
25,625,047 UART: [state] CFI Enabled
25,806,789 UART: [rt] RT listening for mailbox commands...
25,808,716 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,838,840 UART: [rt]cmd =0x44504543, len=24
25,887,098 >>> mbox cmd response data (40 bytes)
25,888,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,918,750 UART: [rt]cmd =0x44504543, len=96
25,925,222 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,460 UART:
192,807 UART: Running Caliptra ROM ...
193,988 UART:
603,845 UART: [state] CFI Enabled
619,382 UART: [state] LifecycleState = Unprovisioned
621,280 UART: [state] DebugLocked = No
622,807 UART: [state] WD Timer not started. Device not locked for debugging
626,077 UART: [kat] SHA2-256
805,744 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,540 UART: [kat] ++
816,985 UART: [kat] sha1
827,788 UART: [kat] SHA2-256
830,515 UART: [kat] SHA2-384
835,937 UART: [kat] SHA2-512-ACC
838,305 UART: [kat] ECC-384
3,283,207 UART: [kat] HMAC-384Kdf
3,295,685 UART: [kat] LMS
3,772,184 UART: [kat] --
3,777,833 UART: [cold-reset] ++
3,779,627 UART: [fht] FHT @ 0x50003400
3,790,396 UART: [idev] ++
3,790,961 UART: [idev] CDI.KEYID = 6
3,791,995 UART: [idev] SUBJECT.KEYID = 7
3,793,180 UART: [idev] UDS.KEYID = 0
3,794,118 ready_for_fw is high
3,794,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,206 UART: [idev] Erasing UDS.KEYID = 0
6,269,773 UART: [idev] Sha1 KeyId Algorithm
6,292,378 UART: [idev] --
6,298,514 UART: [ldev] ++
6,299,102 UART: [ldev] CDI.KEYID = 6
6,300,036 UART: [ldev] SUBJECT.KEYID = 5
6,301,207 UART: [ldev] AUTHORITY.KEYID = 7
6,302,498 UART: [ldev] FE.KEYID = 1
6,313,528 UART: [ldev] Erasing FE.KEYID = 1
8,793,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,302 UART: [ldev] --
10,589,325 UART: [fwproc] Wait for Commands...
10,590,935 UART: [fwproc] Recv command 0x46574c44
10,592,927 UART: [fwproc] Recv'd Img size: 118548 bytes
14,081,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,159,539 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,232,599 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,560,981 >>> mbox cmd response: success
14,564,514 UART: [afmc] ++
14,565,123 UART: [afmc] CDI.KEYID = 6
14,566,034 UART: [afmc] SUBJECT.KEYID = 7
14,567,255 UART: [afmc] AUTHORITY.KEYID = 5
17,075,561 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,800,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,802,995 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,818,816 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,834,839 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,850,462 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,874,474 UART: [afmc] --
18,877,968 UART: [cold-reset] --
18,883,935 UART: [state] Locking Datavault
18,889,408 UART: [state] Locking PCR0, PCR1 and PCR31
18,891,109 UART: [state] Locking ICCM
18,892,715 UART: [exit] Launching FMC @ 0x40000130
18,901,111 UART:
18,901,356 UART: Running Caliptra FMC ...
18,902,458 UART:
18,902,618 UART: [state] CFI Enabled
18,910,829 UART: [fht] FMC Alias Private Key: 7
20,677,212 UART: [art] Extend RT PCRs Done
20,678,433 UART: [art] Lock RT PCRs Done
20,680,109 UART: [art] Populate DV Done
20,685,578 UART: [fht] FMC Alias Private Key: 7
20,687,072 UART: [art] Derive CDI
20,687,839 UART: [art] Store in slot 0x4
20,730,768 UART: [art] Derive Key Pair
20,731,778 UART: [art] Store priv key in slot 0x5
23,158,343 UART: [art] Derive Key Pair - Done
23,171,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,877,839 UART: [art] Erasing AUTHORITY.KEYID = 7
24,879,347 UART: [art] PUB.X = 7DF17670750E5434D8BFA3B5340811A96D9DD4672E095DE894F38B0B42B879BEF78760F340A4FDF1A44C02852908B160
24,886,643 UART: [art] PUB.Y = A152F36A5076CD2C9364C647F7CA3B7E84A59D2AB426F0027862C2B6C4238F31E250ED697695068CBBD9FB312BEC00B0
24,893,868 UART: [art] SIG.R = 2885FEA197C3AFF46FBC5D9233137D0D6BA3163AE9CCE70C8BAD66082718CD97BA41669EA8B68815F08800F50B4A69BA
24,901,263 UART: [art] SIG.S = 29DB7C7B4B0A6662B0422C3CC36827411AC995013D2E028C30C1F50578A0B471DCE13FCAD99DBDE1A83C9EA3281379DF
25,879,791 UART: Caliptra RT
25,880,481 UART: [state] CFI Enabled
26,012,241 UART: [rt] RT listening for mailbox commands...
26,014,148 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,044,085 UART: [rt]cmd =0x44504543, len=24
26,071,576 >>> mbox cmd response data (40 bytes)
26,072,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,103,499 UART: [rt]cmd =0x44504543, len=96
26,110,068 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,781,029 ready_for_fw is high
3,781,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,909 >>> mbox cmd response: success
18,698,829 UART:
18,699,356 UART: Running Caliptra FMC ...
18,700,520 UART:
18,700,682 UART: [state] CFI Enabled
18,708,519 UART: [fht] FMC Alias Private Key: 7
20,473,991 UART: [art] Extend RT PCRs Done
20,475,221 UART: [art] Lock RT PCRs Done
20,476,849 UART: [art] Populate DV Done
20,482,112 UART: [fht] FMC Alias Private Key: 7
20,483,713 UART: [art] Derive CDI
20,484,532 UART: [art] Store in slot 0x4
20,527,073 UART: [art] Derive Key Pair
20,528,081 UART: [art] Store priv key in slot 0x5
22,954,684 UART: [art] Derive Key Pair - Done
22,967,422 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,029 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,539 UART: [art] PUB.X = 8DDAB43762591391A4B7102C3F16410FA5B51C67058297901BA1B527F82583F24B33FE932A08945E3C5D006FB60DDA91
24,682,798 UART: [art] PUB.Y = 8E7115FC7B33A61A337108967EB8DCC20933F5DEA69759029EF27550F1FA93428DC7C101D69BDDD33FF3B4C30CA10A33
24,690,031 UART: [art] SIG.R = 8C46128D2A0E98108F61AA52574BE11E9D77D56F9323C2399F3D6703091568D91B9D9D40762F030B0A08616360187E3B
24,697,401 UART: [art] SIG.S = 77FFB865875BCAD678A24D59D14CB665C3BAC72ABD66CD10173F71F60C2336B8562E42358F637B92B1129660BEFDF0E2
25,675,846 UART: Caliptra RT
25,676,560 UART: [state] CFI Enabled
25,809,069 UART: [rt] RT listening for mailbox commands...
25,810,990 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,841,023 UART: [rt]cmd =0x44504543, len=24
25,868,324 >>> mbox cmd response data (40 bytes)
25,869,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,900,259 UART: [rt]cmd =0x44504543, len=96
25,906,805 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
191,956 UART:
192,336 UART: Running Caliptra ROM ...
193,482 UART:
193,628 UART: [state] CFI Enabled
266,247 UART: [state] LifecycleState = Unprovisioned
268,649 UART: [state] DebugLocked = No
271,033 UART: [state] WD Timer not started. Device not locked for debugging
274,790 UART: [kat] SHA2-256
464,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,236 UART: [kat] ++
475,710 UART: [kat] sha1
488,214 UART: [kat] SHA2-256
491,224 UART: [kat] SHA2-384
497,071 UART: [kat] SHA2-512-ACC
499,656 UART: [kat] ECC-384
2,949,338 UART: [kat] HMAC-384Kdf
2,973,174 UART: [kat] LMS
3,504,990 UART: [kat] --
3,509,345 UART: [cold-reset] ++
3,510,418 UART: [fht] FHT @ 0x50003400
3,521,554 UART: [idev] ++
3,522,197 UART: [idev] CDI.KEYID = 6
3,523,229 UART: [idev] SUBJECT.KEYID = 7
3,524,330 UART: [idev] UDS.KEYID = 0
3,525,375 ready_for_fw is high
3,525,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,712 UART: [idev] Erasing UDS.KEYID = 0
6,029,697 UART: [idev] Sha1 KeyId Algorithm
6,052,693 UART: [idev] --
6,057,715 UART: [ldev] ++
6,058,402 UART: [ldev] CDI.KEYID = 6
6,059,328 UART: [ldev] SUBJECT.KEYID = 5
6,060,485 UART: [ldev] AUTHORITY.KEYID = 7
6,061,715 UART: [ldev] FE.KEYID = 1
6,101,474 UART: [ldev] Erasing FE.KEYID = 1
8,608,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,511 UART: [ldev] --
10,413,180 UART: [fwproc] Wait for Commands...
10,415,161 UART: [fwproc] Recv command 0x46574c44
10,417,412 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,328 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,945 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,796 >>> mbox cmd response: success
14,685,582 UART: [afmc] ++
14,686,293 UART: [afmc] CDI.KEYID = 6
14,687,539 UART: [afmc] SUBJECT.KEYID = 7
14,688,975 UART: [afmc] AUTHORITY.KEYID = 5
17,214,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,660 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,800 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,943 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,878 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,601 UART: [afmc] --
19,013,255 UART: [cold-reset] --
19,017,548 UART: [state] Locking Datavault
19,023,524 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,679 UART: [state] Locking ICCM
19,027,352 UART: [exit] Launching FMC @ 0x40000130
19,036,028 UART:
19,036,267 UART: Running Caliptra FMC ...
19,037,370 UART:
19,037,545 UART: [state] CFI Enabled
19,096,158 UART: [fht] FMC Alias Private Key: 7
20,862,838 UART: [art] Extend RT PCRs Done
20,864,054 UART: [art] Lock RT PCRs Done
20,865,740 UART: [art] Populate DV Done
20,871,092 UART: [fht] FMC Alias Private Key: 7
20,872,574 UART: [art] Derive CDI
20,873,336 UART: [art] Store in slot 0x4
20,929,350 UART: [art] Derive Key Pair
20,930,392 UART: [art] Store priv key in slot 0x5
23,393,514 UART: [art] Derive Key Pair - Done
23,406,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,439 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,945 UART: [art] PUB.X = 39A3DC66B2E431BDA378238E63C78957571694476CA650F89A72F040712B7F76772FD0B7817ED188875D3022AA611EDC
25,128,221 UART: [art] PUB.Y = B0AB222EC727CB3C3E12B5E68A9180F1BB710088EC72534BA57B29C3B4CBA3EA0FB3D95175705DF895AFFAC50A8977B7
25,135,480 UART: [art] SIG.R = 1872674252E23E3D49BA90CEF7B8A8C87433CFD31D8377ABD857EFE2F78BC3C6A0B0256854D9EDF88A978C4CF091EF37
25,142,887 UART: [art] SIG.S = A31BB7216FEB00C1811E2F0CC1EB07433DF062238DE1F80E9A2712CE70EA3E502BDB8DCCDC05C6149A3AB17EE5C564AB
26,121,664 UART: Caliptra RT
26,122,356 UART: [state] CFI Enabled
26,302,801 UART: [rt] RT listening for mailbox commands...
26,304,700 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,334,598 UART: [rt]cmd =0x44504543, len=24
26,363,316 >>> mbox cmd response data (40 bytes)
26,364,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,395,061 UART: [rt]cmd =0x44504543, len=96
26,401,802 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
3,438,706 ready_for_fw is high
3,439,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,792 >>> mbox cmd response: success
19,112,490 UART:
19,112,881 UART: Running Caliptra FMC ...
19,114,106 UART:
19,114,277 UART: [state] CFI Enabled
19,181,620 UART: [fht] FMC Alias Private Key: 7
20,948,049 UART: [art] Extend RT PCRs Done
20,949,280 UART: [art] Lock RT PCRs Done
20,950,799 UART: [art] Populate DV Done
20,956,428 UART: [fht] FMC Alias Private Key: 7
20,958,016 UART: [art] Derive CDI
20,958,832 UART: [art] Store in slot 0x4
21,014,733 UART: [art] Derive Key Pair
21,015,778 UART: [art] Store priv key in slot 0x5
23,478,706 UART: [art] Derive Key Pair - Done
23,491,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,128 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,640 UART: [art] PUB.X = 37191E9267BED90FF4C61F2FBD1E513DC8F1662484917223F6999C2F6AB41BDBA4589EE74C70630AD3CFCA023C66E45B
25,212,912 UART: [art] PUB.Y = 62F7A7F8612B8F55BE7CCA3F69F906B89EFD87E605406C7B6FDCBA814793460FDE9A540E05628E516E87DA5866A0C3CD
25,220,200 UART: [art] SIG.R = 8549F978645BF415A20A01FE7DBEC82B79EFE65DE16827291A0F69BC9CEB2AB9E64799DA53643F7B94CC84CE86512E4F
25,227,633 UART: [art] SIG.S = F17627A68BB8AB046B9D152D3ABC0C8FDEC244A5EBC8231F5BC33ACE123670305A579E3B3323EE8645A210CA819B1F82
26,206,814 UART: Caliptra RT
26,207,526 UART: [state] CFI Enabled
26,388,789 UART: [rt] RT listening for mailbox commands...
26,390,712 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,420,618 UART: [rt]cmd =0x44504543, len=24
26,448,744 >>> mbox cmd response data (40 bytes)
26,450,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,480,669 UART: [rt]cmd =0x44504543, len=96
26,487,292 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,473 UART:
192,837 UART: Running Caliptra ROM ...
193,993 UART:
603,682 UART: [state] CFI Enabled
615,683 UART: [state] LifecycleState = Unprovisioned
617,741 UART: [state] DebugLocked = No
620,631 UART: [state] WD Timer not started. Device not locked for debugging
624,481 UART: [kat] SHA2-256
814,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,173 UART: [kat] ++
825,702 UART: [kat] sha1
836,579 UART: [kat] SHA2-256
839,598 UART: [kat] SHA2-384
845,950 UART: [kat] SHA2-512-ACC
848,536 UART: [kat] ECC-384
3,292,278 UART: [kat] HMAC-384Kdf
3,304,440 UART: [kat] LMS
3,836,286 UART: [kat] --
3,842,393 UART: [cold-reset] ++
3,843,970 UART: [fht] FHT @ 0x50003400
3,855,944 UART: [idev] ++
3,856,680 UART: [idev] CDI.KEYID = 6
3,857,596 UART: [idev] SUBJECT.KEYID = 7
3,858,842 UART: [idev] UDS.KEYID = 0
3,859,778 ready_for_fw is high
3,859,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,965 UART: [idev] Erasing UDS.KEYID = 0
6,337,072 UART: [idev] Sha1 KeyId Algorithm
6,359,163 UART: [idev] --
6,363,052 UART: [ldev] ++
6,363,736 UART: [ldev] CDI.KEYID = 6
6,364,651 UART: [ldev] SUBJECT.KEYID = 5
6,365,813 UART: [ldev] AUTHORITY.KEYID = 7
6,367,048 UART: [ldev] FE.KEYID = 1
6,377,593 UART: [ldev] Erasing FE.KEYID = 1
8,853,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,001 UART: [ldev] --
10,644,800 UART: [fwproc] Wait for Commands...
10,647,065 UART: [fwproc] Recv command 0x46574c44
10,649,380 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,915 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,528 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,618 >>> mbox cmd response: success
14,914,477 UART: [afmc] ++
14,915,181 UART: [afmc] CDI.KEYID = 6
14,916,434 UART: [afmc] SUBJECT.KEYID = 7
14,917,885 UART: [afmc] AUTHORITY.KEYID = 5
17,420,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,014 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,943 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,053 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,198 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,161 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,803 UART: [afmc] --
19,219,297 UART: [cold-reset] --
19,221,766 UART: [state] Locking Datavault
19,227,353 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,511 UART: [state] Locking ICCM
19,232,088 UART: [exit] Launching FMC @ 0x40000130
19,240,783 UART:
19,241,019 UART: Running Caliptra FMC ...
19,242,128 UART:
19,242,289 UART: [state] CFI Enabled
19,250,557 UART: [fht] FMC Alias Private Key: 7
21,016,463 UART: [art] Extend RT PCRs Done
21,017,686 UART: [art] Lock RT PCRs Done
21,019,510 UART: [art] Populate DV Done
21,024,819 UART: [fht] FMC Alias Private Key: 7
21,026,370 UART: [art] Derive CDI
21,027,115 UART: [art] Store in slot 0x4
21,069,807 UART: [art] Derive Key Pair
21,070,832 UART: [art] Store priv key in slot 0x5
23,497,712 UART: [art] Derive Key Pair - Done
23,510,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,062 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,574 UART: [art] PUB.X = 71CB05E02D04ECC0A5816A88448F89CE536CA54575C7513EB67EA60BCF065E2D9A942CA65F4335BEC501DBDDCB82E1EE
25,225,850 UART: [art] PUB.Y = 11A504C72C1A0C50FFEEE6388F3D7A142B33EAE49CC2058AC5A14A1BDCE6FAD3155FDFB5C361B5432D0B3D6BEC222954
25,233,114 UART: [art] SIG.R = 36DD6EE977FD5BBA9B0278B1F0AE4140D898B9FEEA099F9289B4536461E706436FCC076EE506007E4485A62221D03397
25,240,488 UART: [art] SIG.S = 36AA331D2735BD7AE773B04266C5A2073BF89E80D6B4D66E2ECBAA069BEC0BA3E5AD947FFF6D47D36D2FD63F3BCB48A9
26,219,235 UART: Caliptra RT
26,220,000 UART: [state] CFI Enabled
26,352,153 UART: [rt] RT listening for mailbox commands...
26,354,087 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,384,125 UART: [rt]cmd =0x44504543, len=24
26,411,888 >>> mbox cmd response data (40 bytes)
26,413,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,443,836 UART: [rt]cmd =0x44504543, len=96
26,450,466 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
3,756,480 ready_for_fw is high
3,757,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,815 >>> mbox cmd response: success
19,300,888 UART:
19,301,284 UART: Running Caliptra FMC ...
19,302,413 UART:
19,302,575 UART: [state] CFI Enabled
19,310,640 UART: [fht] FMC Alias Private Key: 7
21,076,661 UART: [art] Extend RT PCRs Done
21,077,898 UART: [art] Lock RT PCRs Done
21,079,719 UART: [art] Populate DV Done
21,085,429 UART: [fht] FMC Alias Private Key: 7
21,086,993 UART: [art] Derive CDI
21,087,823 UART: [art] Store in slot 0x4
21,130,288 UART: [art] Derive Key Pair
21,131,335 UART: [art] Store priv key in slot 0x5
23,557,869 UART: [art] Derive Key Pair - Done
23,570,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,391 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,901 UART: [art] PUB.X = DDADF4D7D7997E535BB638839D6E6A5DCAB0218819AF772F5E2CB753D02896219B8E3B96ECC4F0B8A20B4DBEB8C2D66E
25,286,147 UART: [art] PUB.Y = 129D04B44315EC9111EE0E9BDE05FC686FC299BF4A0312C96C397F6B4E3948F5DE5524CBF20A6F31D7B18458F6B6680B
25,293,427 UART: [art] SIG.R = 5476BEB032F97AAD050C479764AEFC5502B0751D96B721419FFB95613D95F13FBECB420C44CDD85F6843E86246F9A9FC
25,300,826 UART: [art] SIG.S = EDAD35C2938B3DE8C470E1AB77A4DEA9123FD4EB130972CDF9B09E75E6CB5667B8CE676E7CE346BEB073C04569DA8607
26,279,537 UART: Caliptra RT
26,280,249 UART: [state] CFI Enabled
26,413,531 UART: [rt] RT listening for mailbox commands...
26,415,460 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,445,543 UART: [rt]cmd =0x44504543, len=24
26,473,310 >>> mbox cmd response data (40 bytes)
26,474,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,505,286 UART: [rt]cmd =0x44504543, len=96
26,511,771 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,667 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,285 UART: [kat] SHA2-256
882,216 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,331 UART: [kat] ++
886,483 UART: [kat] sha1
890,593 UART: [kat] SHA2-256
892,531 UART: [kat] SHA2-384
895,314 UART: [kat] SHA2-512-ACC
897,215 UART: [kat] ECC-384
902,738 UART: [kat] HMAC-384Kdf
907,356 UART: [kat] LMS
1,475,552 UART: [kat] --
1,476,211 UART: [cold-reset] ++
1,476,789 UART: [fht] Storing FHT @ 0x50003400
1,479,450 UART: [idev] ++
1,479,618 UART: [idev] CDI.KEYID = 6
1,479,978 UART: [idev] SUBJECT.KEYID = 7
1,480,402 UART: [idev] UDS.KEYID = 0
1,480,747 ready_for_fw is high
1,480,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,432 UART: [idev] Erasing UDS.KEYID = 0
1,504,954 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,666 UART: [idev] --
1,514,709 UART: [ldev] ++
1,514,877 UART: [ldev] CDI.KEYID = 6
1,515,240 UART: [ldev] SUBJECT.KEYID = 5
1,515,666 UART: [ldev] AUTHORITY.KEYID = 7
1,516,129 UART: [ldev] FE.KEYID = 1
1,521,099 UART: [ldev] Erasing FE.KEYID = 1
1,546,792 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,850 UART: [ldev] --
1,586,335 UART: [fwproc] Waiting for Commands...
1,587,016 UART: [fwproc] Received command 0x46574c44
1,587,807 UART: [fwproc] Received Image of size 118548 bytes
2,931,583 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,089 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,307 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,576 >>> mbox cmd response: success
3,130,830 UART: [afmc] ++
3,130,998 UART: [afmc] CDI.KEYID = 6
3,131,360 UART: [afmc] SUBJECT.KEYID = 7
3,131,785 UART: [afmc] AUTHORITY.KEYID = 5
3,166,834 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,442 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,222 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,931 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,814 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,497 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,455 UART: [afmc] --
3,210,507 UART: [cold-reset] --
3,211,349 UART: [state] Locking Datavault
3,212,438 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,042 UART: [state] Locking ICCM
3,213,624 UART: [exit] Launching FMC @ 0x40000130
3,218,954 UART:
3,218,970 UART: Running Caliptra FMC ...
3,219,378 UART:
3,219,432 UART: [state] CFI Enabled
3,230,128 UART: [fht] FMC Alias Private Key: 7
3,349,296 UART: [art] Extend RT PCRs Done
3,349,724 UART: [art] Lock RT PCRs Done
3,351,300 UART: [art] Populate DV Done
3,359,445 UART: [fht] FMC Alias Private Key: 7
3,360,513 UART: [art] Derive CDI
3,360,793 UART: [art] Store in slot 0x4
3,446,549 UART: [art] Derive Key Pair
3,446,909 UART: [art] Store priv key in slot 0x5
3,460,500 UART: [art] Derive Key Pair - Done
3,475,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,365 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,130 UART: [art] PUB.X = 14A04B4A2FA5BF5FAF36D97EB1C8B036BA36B85F6EA29984B3DD03AAE2B4EE46496D5623E78117C40C2F4DAFBEC69ABC
3,498,920 UART: [art] PUB.Y = E6484590FE30DDC452D9A29564AC779C91ECBC64D54F1997F9737F672D392F865A23B85CBB3D89DFB211A7F50CC84CF4
3,505,877 UART: [art] SIG.R = 213C1C4BD339FFA82317F3B81E9D258B66B1350B8971DA8FFA8067D90EBCE817A434D6436CF451C233F985E96FAB284B
3,512,649 UART: [art] SIG.S = E26BC5C7EAB31E4AF6C3A04F6A9DEA70203D0613CCEFD3B078A01331F0722747DC0F622A76131B1420C73598B32DB84C
3,535,953 UART: Caliptra RT
3,536,204 UART: [state] CFI Enabled
3,656,099 UART: [rt] RT listening for mailbox commands...
3,656,769 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,357 UART: [rt]cmd =0x44504543, len=24
3,714,025 >>> mbox cmd response data (40 bytes)
3,714,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,743,927 UART: [rt]cmd =0x44504543, len=96
3,751,172 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,313 ready_for_fw is high
1,362,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,340 >>> mbox cmd response: success
3,041,669 UART:
3,041,685 UART: Running Caliptra FMC ...
3,042,093 UART:
3,042,147 UART: [state] CFI Enabled
3,052,373 UART: [fht] FMC Alias Private Key: 7
3,172,279 UART: [art] Extend RT PCRs Done
3,172,707 UART: [art] Lock RT PCRs Done
3,173,983 UART: [art] Populate DV Done
3,182,212 UART: [fht] FMC Alias Private Key: 7
3,183,190 UART: [art] Derive CDI
3,183,470 UART: [art] Store in slot 0x4
3,269,218 UART: [art] Derive Key Pair
3,269,578 UART: [art] Store priv key in slot 0x5
3,282,821 UART: [art] Derive Key Pair - Done
3,297,826 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,076 UART: [art] PUB.X = E68AEDE0E290A4CEFB4E801808D7F0F4BB001B02AE558AAD2E2E647B0508884C36CBFB59036461FDF087C25C8C42F48B
3,320,825 UART: [art] PUB.Y = 591BE3C67ED51CC53DD56FE861C11E4446C680A88B1453F9E06EA869D655C260A74C948647F4F014425D3B67EB2DAC5A
3,327,781 UART: [art] SIG.R = 8BA6DC0EAC1B8057D2DD925E07FE8DB99F26334F71DD886F7E932103058B823C9D2C6E55AF20FF2E985DF237A87354DC
3,334,551 UART: [art] SIG.S = 5EC0653765F0D2D56638224415B24CAE0FABB16560099BEB94539AF861C77D529198B4176101F5A5488B9D169AEE5A61
3,358,296 UART: Caliptra RT
3,358,547 UART: [state] CFI Enabled
3,477,790 UART: [rt] RT listening for mailbox commands...
3,478,460 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,694 UART: [rt]cmd =0x44504543, len=24
3,536,218 >>> mbox cmd response data (40 bytes)
3,536,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,565,954 UART: [rt]cmd =0x44504543, len=96
3,573,575 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,540 UART: [kat] SHA2-256
882,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,586 UART: [kat] ++
886,738 UART: [kat] sha1
890,808 UART: [kat] SHA2-256
892,746 UART: [kat] SHA2-384
895,347 UART: [kat] SHA2-512-ACC
897,248 UART: [kat] ECC-384
902,791 UART: [kat] HMAC-384Kdf
907,353 UART: [kat] LMS
1,475,549 UART: [kat] --
1,476,694 UART: [cold-reset] ++
1,477,266 UART: [fht] Storing FHT @ 0x50003400
1,480,057 UART: [idev] ++
1,480,225 UART: [idev] CDI.KEYID = 6
1,480,585 UART: [idev] SUBJECT.KEYID = 7
1,481,009 UART: [idev] UDS.KEYID = 0
1,481,354 ready_for_fw is high
1,481,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,831 UART: [idev] Erasing UDS.KEYID = 0
1,505,045 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,653 UART: [idev] --
1,514,746 UART: [ldev] ++
1,514,914 UART: [ldev] CDI.KEYID = 6
1,515,277 UART: [ldev] SUBJECT.KEYID = 5
1,515,703 UART: [ldev] AUTHORITY.KEYID = 7
1,516,166 UART: [ldev] FE.KEYID = 1
1,521,330 UART: [ldev] Erasing FE.KEYID = 1
1,546,781 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,931 UART: [ldev] --
1,586,324 UART: [fwproc] Waiting for Commands...
1,587,083 UART: [fwproc] Received command 0x46574c44
1,587,874 UART: [fwproc] Received Image of size 118548 bytes
2,932,970 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,824 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,042 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,485 >>> mbox cmd response: success
3,133,637 UART: [afmc] ++
3,133,805 UART: [afmc] CDI.KEYID = 6
3,134,167 UART: [afmc] SUBJECT.KEYID = 7
3,134,592 UART: [afmc] AUTHORITY.KEYID = 5
3,170,365 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,539 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,319 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,028 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,911 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,594 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,522 UART: [afmc] --
3,213,498 UART: [cold-reset] --
3,214,298 UART: [state] Locking Datavault
3,215,437 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,041 UART: [state] Locking ICCM
3,216,599 UART: [exit] Launching FMC @ 0x40000130
3,221,929 UART:
3,221,945 UART: Running Caliptra FMC ...
3,222,353 UART:
3,222,496 UART: [state] CFI Enabled
3,233,304 UART: [fht] FMC Alias Private Key: 7
3,351,982 UART: [art] Extend RT PCRs Done
3,352,410 UART: [art] Lock RT PCRs Done
3,354,010 UART: [art] Populate DV Done
3,362,275 UART: [fht] FMC Alias Private Key: 7
3,363,437 UART: [art] Derive CDI
3,363,717 UART: [art] Store in slot 0x4
3,449,371 UART: [art] Derive Key Pair
3,449,731 UART: [art] Store priv key in slot 0x5
3,462,184 UART: [art] Derive Key Pair - Done
3,477,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,572 UART: [art] PUB.X = A0102BFC3BC04BFA6E3BF430944DDA5FB5527603A2E6F231015BA8C90C1E15A8B425B4597B5871287CBF3D16DAE5BD55
3,500,347 UART: [art] PUB.Y = A7C799070D0CC9E023B050146E92CBF3BF8384842B4A42F48DF4FF0F4822037236E79B2C004CE2D59A6BF7FA3FDA2AAE
3,507,274 UART: [art] SIG.R = C960DBC18FFC1F8713114512EF4C6225E54E344CA546C7F86075C079E695FAEE4D2C5A894D40B78FEE4F755882DF682D
3,514,052 UART: [art] SIG.S = 45EFAFAA45AEAD4017A53D7D00A98F4B2B892AE995023E52DA9ED5AA8A60D946CACD56E58965BB2451B1077005A73D0A
3,538,178 UART: Caliptra RT
3,538,521 UART: [state] CFI Enabled
3,658,058 UART: [rt] RT listening for mailbox commands...
3,658,728 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,584 UART: [rt]cmd =0x44504543, len=24
3,716,426 >>> mbox cmd response data (40 bytes)
3,716,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,746,300 UART: [rt]cmd =0x44504543, len=96
3,753,501 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,740 ready_for_fw is high
1,362,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,845 >>> mbox cmd response: success
3,042,516 UART:
3,042,532 UART: Running Caliptra FMC ...
3,042,940 UART:
3,043,083 UART: [state] CFI Enabled
3,053,915 UART: [fht] FMC Alias Private Key: 7
3,173,179 UART: [art] Extend RT PCRs Done
3,173,607 UART: [art] Lock RT PCRs Done
3,175,265 UART: [art] Populate DV Done
3,183,872 UART: [fht] FMC Alias Private Key: 7
3,184,958 UART: [art] Derive CDI
3,185,238 UART: [art] Store in slot 0x4
3,270,952 UART: [art] Derive Key Pair
3,271,312 UART: [art] Store priv key in slot 0x5
3,284,135 UART: [art] Derive Key Pair - Done
3,298,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,791 UART: [art] PUB.X = 224F3ACC802DA7FA2C80D25C0EA788FAE5976940688C033D0A50418DDBF5A37DC386C7D2BD61BE5A6935EC84F127450C
3,321,561 UART: [art] PUB.Y = 9FB03D74CF4DA25F8E71C485931F1F31F962BB798B5D66A7DE9C2AE728A7DA670360187CC9F8E268C89658AD37D7484B
3,328,516 UART: [art] SIG.R = 02A8D0A4290B8554E6B2DBC7465D01C3FB56764012878BEDCD7403CD6E1ABD81ADB4DC98A455AA2122C9424EF4475098
3,335,282 UART: [art] SIG.S = 16307BE35428F94BC7293FAA28F4E3C4A8218A8D92CD7AF768F6FDE81A6E1FDF5BAA02D1F0AFA8C51378CB9098CAFDBE
3,359,031 UART: Caliptra RT
3,359,374 UART: [state] CFI Enabled
3,480,042 UART: [rt] RT listening for mailbox commands...
3,480,712 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,570 UART: [rt]cmd =0x44504543, len=24
3,538,260 >>> mbox cmd response data (40 bytes)
3,538,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,568,180 UART: [rt]cmd =0x44504543, len=96
3,575,233 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,280 UART: [kat] ++
895,432 UART: [kat] sha1
899,580 UART: [kat] SHA2-256
901,520 UART: [kat] SHA2-384
904,211 UART: [kat] SHA2-512-ACC
906,112 UART: [kat] ECC-384
915,821 UART: [kat] HMAC-384Kdf
920,471 UART: [kat] LMS
1,168,783 UART: [kat] --
1,169,422 UART: [cold-reset] ++
1,169,888 UART: [fht] FHT @ 0x50003400
1,172,542 UART: [idev] ++
1,172,710 UART: [idev] CDI.KEYID = 6
1,173,071 UART: [idev] SUBJECT.KEYID = 7
1,173,496 UART: [idev] UDS.KEYID = 0
1,173,842 ready_for_fw is high
1,173,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,571 UART: [idev] Erasing UDS.KEYID = 0
1,197,999 UART: [idev] Sha1 KeyId Algorithm
1,206,899 UART: [idev] --
1,208,134 UART: [ldev] ++
1,208,302 UART: [ldev] CDI.KEYID = 6
1,208,666 UART: [ldev] SUBJECT.KEYID = 5
1,209,093 UART: [ldev] AUTHORITY.KEYID = 7
1,209,556 UART: [ldev] FE.KEYID = 1
1,214,588 UART: [ldev] Erasing FE.KEYID = 1
1,241,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,970 UART: [ldev] --
1,280,205 UART: [fwproc] Wait for Commands...
1,280,806 UART: [fwproc] Recv command 0x46574c44
1,281,539 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,221 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,396 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,705 >>> mbox cmd response: success
2,824,735 UART: [afmc] ++
2,824,903 UART: [afmc] CDI.KEYID = 6
2,825,266 UART: [afmc] SUBJECT.KEYID = 7
2,825,692 UART: [afmc] AUTHORITY.KEYID = 5
2,861,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,317 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,027 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,908 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,609 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,326 UART: [afmc] --
2,904,255 UART: [cold-reset] --
2,904,933 UART: [state] Locking Datavault
2,905,954 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,558 UART: [state] Locking ICCM
2,907,192 UART: [exit] Launching FMC @ 0x40000130
2,912,522 UART:
2,912,538 UART: Running Caliptra FMC ...
2,912,946 UART:
2,913,000 UART: [state] CFI Enabled
2,923,082 UART: [fht] FMC Alias Private Key: 7
3,042,138 UART: [art] Extend RT PCRs Done
3,042,566 UART: [art] Lock RT PCRs Done
3,043,952 UART: [art] Populate DV Done
3,052,185 UART: [fht] FMC Alias Private Key: 7
3,053,339 UART: [art] Derive CDI
3,053,619 UART: [art] Store in slot 0x4
3,139,326 UART: [art] Derive Key Pair
3,139,686 UART: [art] Store priv key in slot 0x5
3,152,766 UART: [art] Derive Key Pair - Done
3,167,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,824 UART: [art] PUB.X = 8487FC5E30AB0B7209017B1DBAD9650B43224CBB1FFB7F17DA9CE0371330F51857E471EC64011B9ACE4CDAAB39F9A14D
3,190,595 UART: [art] PUB.Y = 1D5B891E7BCDC7C070D485AE6E921153AF41BA7A8280675A1F96A6A2DEB230F67D025FD721183AD1EEBBA88D7A670578
3,197,551 UART: [art] SIG.R = 35B2E2D5D874A1D5CE0DD5624A0275C1992D9FF3AB8EF5743A044AF3C7143CBEFA5ABCBC9323A08AA5C7A459E7B15AE5
3,204,334 UART: [art] SIG.S = 23661165177653A3B2BEAB5FA1E45CBEED70AB592EC3EF1725E9E7FE8259973D8D3012E5100C972CA8F0201B1B6A2B3D
3,228,043 UART: Caliptra RT
3,228,294 UART: [state] CFI Enabled
3,347,781 UART: [rt] RT listening for mailbox commands...
3,348,451 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,381 UART: [rt]cmd =0x44504543, len=24
3,406,601 >>> mbox cmd response data (40 bytes)
3,406,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,653 UART: [rt]cmd =0x44504543, len=96
3,443,776 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,966 ready_for_fw is high
1,058,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,350 >>> mbox cmd response: success
2,740,627 UART:
2,740,643 UART: Running Caliptra FMC ...
2,741,051 UART:
2,741,105 UART: [state] CFI Enabled
2,751,849 UART: [fht] FMC Alias Private Key: 7
2,870,985 UART: [art] Extend RT PCRs Done
2,871,413 UART: [art] Lock RT PCRs Done
2,873,025 UART: [art] Populate DV Done
2,881,368 UART: [fht] FMC Alias Private Key: 7
2,882,440 UART: [art] Derive CDI
2,882,720 UART: [art] Store in slot 0x4
2,968,401 UART: [art] Derive Key Pair
2,968,761 UART: [art] Store priv key in slot 0x5
2,982,371 UART: [art] Derive Key Pair - Done
2,996,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,924 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,689 UART: [art] PUB.X = 6C0CDD24DE6345788D6026C0D06F3BBC5E32C3FE0F9D0FC8F81428D97176BE9C4FD8E8DBB4C3C6552378C9EAA65DBE3A
3,019,472 UART: [art] PUB.Y = A31F4B1B454DAD591E304C1703D70CC5815FD69BA92B456A5FDAED95141ECB3153210859F682B5C70C58888E8EACF152
3,026,418 UART: [art] SIG.R = 839996709CF8B2C148B14F25C9C53F059B116046E8A30F354856E0ED7EFE7FA8F780714F6874C608340E92F37FBA3D18
3,033,174 UART: [art] SIG.S = A8C1BA230D75705CE522176EF1476CAF8B44D3975CBBAAC047F9B0C94092A69CB9D88110C4C0556D74E4555BA90DED36
3,056,514 UART: Caliptra RT
3,056,765 UART: [state] CFI Enabled
3,176,346 UART: [rt] RT listening for mailbox commands...
3,177,016 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,788 UART: [rt]cmd =0x44504543, len=24
3,234,130 >>> mbox cmd response data (40 bytes)
3,234,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,884 UART: [rt]cmd =0x44504543, len=96
3,271,457 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,681 UART: [kat] SHA2-256
901,621 UART: [kat] SHA2-384
904,164 UART: [kat] SHA2-512-ACC
906,065 UART: [kat] ECC-384
915,610 UART: [kat] HMAC-384Kdf
920,200 UART: [kat] LMS
1,168,512 UART: [kat] --
1,169,069 UART: [cold-reset] ++
1,169,617 UART: [fht] FHT @ 0x50003400
1,172,365 UART: [idev] ++
1,172,533 UART: [idev] CDI.KEYID = 6
1,172,894 UART: [idev] SUBJECT.KEYID = 7
1,173,319 UART: [idev] UDS.KEYID = 0
1,173,665 ready_for_fw is high
1,173,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,540 UART: [idev] Erasing UDS.KEYID = 0
1,198,692 UART: [idev] Sha1 KeyId Algorithm
1,207,610 UART: [idev] --
1,208,725 UART: [ldev] ++
1,208,893 UART: [ldev] CDI.KEYID = 6
1,209,257 UART: [ldev] SUBJECT.KEYID = 5
1,209,684 UART: [ldev] AUTHORITY.KEYID = 7
1,210,147 UART: [ldev] FE.KEYID = 1
1,215,441 UART: [ldev] Erasing FE.KEYID = 1
1,241,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,817 UART: [ldev] --
1,280,092 UART: [fwproc] Wait for Commands...
1,280,717 UART: [fwproc] Recv command 0x46574c44
1,281,450 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,230 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,405 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,760 >>> mbox cmd response: success
2,827,952 UART: [afmc] ++
2,828,120 UART: [afmc] CDI.KEYID = 6
2,828,483 UART: [afmc] SUBJECT.KEYID = 7
2,828,909 UART: [afmc] AUTHORITY.KEYID = 5
2,864,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,714 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,424 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,305 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,006 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,711 UART: [afmc] --
2,907,738 UART: [cold-reset] --
2,908,756 UART: [state] Locking Datavault
2,910,153 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,757 UART: [state] Locking ICCM
2,911,201 UART: [exit] Launching FMC @ 0x40000130
2,916,531 UART:
2,916,547 UART: Running Caliptra FMC ...
2,916,955 UART:
2,917,098 UART: [state] CFI Enabled
2,927,508 UART: [fht] FMC Alias Private Key: 7
3,045,482 UART: [art] Extend RT PCRs Done
3,045,910 UART: [art] Lock RT PCRs Done
3,047,448 UART: [art] Populate DV Done
3,055,503 UART: [fht] FMC Alias Private Key: 7
3,056,599 UART: [art] Derive CDI
3,056,879 UART: [art] Store in slot 0x4
3,142,912 UART: [art] Derive Key Pair
3,143,272 UART: [art] Store priv key in slot 0x5
3,156,662 UART: [art] Derive Key Pair - Done
3,171,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,225 UART: [art] PUB.X = 3D4F781E760877F25DCC243ED484C6629FA18218DE5A608D2AE593D91ACE222DB6A8FA57C54CB5C679C44BFD565F9F9A
3,195,006 UART: [art] PUB.Y = 9BEFB0DFD42609385141452846056B122081E5C44E60669948CB14404F512ACAD90597CE7984F01DA8E05BB919A992D4
3,201,941 UART: [art] SIG.R = 30574428BDDBD1BE378BE7A868448B8831672EB5ADA27D08A7EC36C8A89CD00FED957D2C1C2B1A4030E3D5F5F2FC8DF8
3,208,723 UART: [art] SIG.S = B3B390B566A8AFCBC894E81668AB54650D65C862DC8821D93AED20C76B3C234CE769B3F2950C24AF3F0E653363124E74
3,232,182 UART: Caliptra RT
3,232,525 UART: [state] CFI Enabled
3,352,651 UART: [rt] RT listening for mailbox commands...
3,353,321 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,249 UART: [rt]cmd =0x44504543, len=24
3,411,209 >>> mbox cmd response data (40 bytes)
3,411,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,115 UART: [rt]cmd =0x44504543, len=96
3,448,166 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,297 ready_for_fw is high
1,059,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,249 >>> mbox cmd response: success
2,740,284 UART:
2,740,300 UART: Running Caliptra FMC ...
2,740,708 UART:
2,740,851 UART: [state] CFI Enabled
2,751,891 UART: [fht] FMC Alias Private Key: 7
2,871,415 UART: [art] Extend RT PCRs Done
2,871,843 UART: [art] Lock RT PCRs Done
2,873,369 UART: [art] Populate DV Done
2,881,572 UART: [fht] FMC Alias Private Key: 7
2,882,616 UART: [art] Derive CDI
2,882,896 UART: [art] Store in slot 0x4
2,969,113 UART: [art] Derive Key Pair
2,969,473 UART: [art] Store priv key in slot 0x5
2,983,201 UART: [art] Derive Key Pair - Done
2,997,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,213 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,978 UART: [art] PUB.X = B04C23A03D3763FEC8843B2700FF7428B1BBA11440353B45D8058CD4E9B0EF0392FB407FB0C98A4A27A22D6243272B2E
3,020,724 UART: [art] PUB.Y = 7F6EDCC74131A85E409C3AB175F86A3617CACC68D63F277AD290F77251D793367C6640A3BD19777DA0078BB97BF7E747
3,027,675 UART: [art] SIG.R = 901CEBAB58F43749F74CE36642D40F2AD12FB0F70233FF530156184421E359DF071DBBE21CAC564FC686BEF10AE1F77A
3,034,442 UART: [art] SIG.S = E8CECE3F28D48DBE9B366A153BD7C588E1286B018F09E8997309B4E7368BBAF7C58DA850D0FF0F49BE60037BBF8C28D1
3,057,687 UART: Caliptra RT
3,058,030 UART: [state] CFI Enabled
3,177,269 UART: [rt] RT listening for mailbox commands...
3,177,939 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,823 UART: [rt]cmd =0x44504543, len=24
3,235,579 >>> mbox cmd response data (40 bytes)
3,235,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,449 UART: [rt]cmd =0x44504543, len=96
3,272,898 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
892,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,077 UART: [kat] ++
897,229 UART: [kat] sha1
901,669 UART: [kat] SHA2-256
903,609 UART: [kat] SHA2-384
906,302 UART: [kat] SHA2-512-ACC
908,203 UART: [kat] ECC-384
917,896 UART: [kat] HMAC-384Kdf
922,228 UART: [kat] LMS
1,170,556 UART: [kat] --
1,171,241 UART: [cold-reset] ++
1,171,607 UART: [fht] FHT @ 0x50003400
1,174,188 UART: [idev] ++
1,174,356 UART: [idev] CDI.KEYID = 6
1,174,716 UART: [idev] SUBJECT.KEYID = 7
1,175,140 UART: [idev] UDS.KEYID = 0
1,175,485 ready_for_fw is high
1,175,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,014 UART: [idev] Erasing UDS.KEYID = 0
1,199,831 UART: [idev] Sha1 KeyId Algorithm
1,208,285 UART: [idev] --
1,209,349 UART: [ldev] ++
1,209,517 UART: [ldev] CDI.KEYID = 6
1,209,880 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,215,811 UART: [ldev] Erasing FE.KEYID = 1
1,242,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,169 UART: [ldev] --
1,281,518 UART: [fwproc] Wait for Commands...
1,282,122 UART: [fwproc] Recv command 0x46574c44
1,282,850 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,656 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,826 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,001 >>> mbox cmd response: success
2,827,165 UART: [afmc] ++
2,827,333 UART: [afmc] CDI.KEYID = 6
2,827,695 UART: [afmc] SUBJECT.KEYID = 7
2,828,120 UART: [afmc] AUTHORITY.KEYID = 5
2,863,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,054 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,763 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,646 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,347 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,139 UART: [afmc] --
2,907,103 UART: [cold-reset] --
2,907,841 UART: [state] Locking Datavault
2,909,182 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,786 UART: [state] Locking ICCM
2,910,446 UART: [exit] Launching FMC @ 0x40000130
2,915,776 UART:
2,915,792 UART: Running Caliptra FMC ...
2,916,200 UART:
2,916,254 UART: [state] CFI Enabled
2,926,814 UART: [fht] FMC Alias Private Key: 7
3,045,866 UART: [art] Extend RT PCRs Done
3,046,294 UART: [art] Lock RT PCRs Done
3,047,884 UART: [art] Populate DV Done
3,055,961 UART: [fht] FMC Alias Private Key: 7
3,057,027 UART: [art] Derive CDI
3,057,307 UART: [art] Store in slot 0x4
3,142,698 UART: [art] Derive Key Pair
3,143,058 UART: [art] Store priv key in slot 0x5
3,156,220 UART: [art] Derive Key Pair - Done
3,171,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,009 UART: [art] PUB.X = 27F02E1DD4D6625921FA93964D82DE0898D075BD87CB39EC2E177F6F813A3E6E80847CC7DC2A0964CD7022ECD55C91A8
3,193,781 UART: [art] PUB.Y = 2DCB957B67CD156F741415771BFBCC83B86FAE71AB0326A28852F82CE2307821BE84C81E8A266C292C5A3365C49B86C5
3,200,732 UART: [art] SIG.R = CCDEB77803F4CF3A885E4C40D0EA6CE0B06CEE155B29F9B886C192AE5C1DA1CC22987435F0D90A4B88194C057D32F5E4
3,207,509 UART: [art] SIG.S = 14FAAAF515E94C736DB9901898E1DD89D5CA4ED12C319182ED3CAEE403E638B1DBBBF5E5714397062B2C3B17DF133B13
3,231,113 UART: Caliptra RT
3,231,364 UART: [state] CFI Enabled
3,350,832 UART: [rt] RT listening for mailbox commands...
3,351,502 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,568 UART: [rt]cmd =0x44504543, len=24
3,408,860 >>> mbox cmd response data (40 bytes)
3,408,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,870 UART: [rt]cmd =0x44504543, len=96
3,446,063 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,063 ready_for_fw is high
1,060,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,574 >>> mbox cmd response: success
2,740,185 UART:
2,740,201 UART: Running Caliptra FMC ...
2,740,609 UART:
2,740,663 UART: [state] CFI Enabled
2,751,399 UART: [fht] FMC Alias Private Key: 7
2,870,901 UART: [art] Extend RT PCRs Done
2,871,329 UART: [art] Lock RT PCRs Done
2,872,845 UART: [art] Populate DV Done
2,880,950 UART: [fht] FMC Alias Private Key: 7
2,881,992 UART: [art] Derive CDI
2,882,272 UART: [art] Store in slot 0x4
2,968,113 UART: [art] Derive Key Pair
2,968,473 UART: [art] Store priv key in slot 0x5
2,981,445 UART: [art] Derive Key Pair - Done
2,996,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,297 UART: [art] PUB.X = 862CFB9FB1F5606A9F332E6F1D853B822AE6E92BDB095689124CE9A0DA201F74E48A81AE732528F40B97679009244412
3,019,056 UART: [art] PUB.Y = 032A8DEB68C3AB6B9F3EC18110AA3CC09857DFA4C0E93213B66BE8AE2F8CA30CBF18146CBFAA435D6811A58A09F9B4E7
3,026,019 UART: [art] SIG.R = B13DF0B3024EF6BAA140CB3F43739EFCBC8925E8F06F89C47152D88460E02015D724EB01408A2FF7A3EAE054105AAB07
3,032,790 UART: [art] SIG.S = C44B3A92D14393AC7AE89BDE126F73D8790D9BB06F3D4AE630043EC07825E8C742A13FAAC43D76218F3E07FA2FE8F494
3,056,753 UART: Caliptra RT
3,057,004 UART: [state] CFI Enabled
3,176,073 UART: [rt] RT listening for mailbox commands...
3,176,743 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,609 UART: [rt]cmd =0x44504543, len=24
3,233,903 >>> mbox cmd response data (40 bytes)
3,233,904 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,069 UART: [rt]cmd =0x44504543, len=96
3,271,342 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,182 UART: [kat] SHA2-256
904,122 UART: [kat] SHA2-384
906,779 UART: [kat] SHA2-512-ACC
908,680 UART: [kat] ECC-384
918,581 UART: [kat] HMAC-384Kdf
923,163 UART: [kat] LMS
1,171,491 UART: [kat] --
1,172,358 UART: [cold-reset] ++
1,172,912 UART: [fht] FHT @ 0x50003400
1,175,563 UART: [idev] ++
1,175,731 UART: [idev] CDI.KEYID = 6
1,176,091 UART: [idev] SUBJECT.KEYID = 7
1,176,515 UART: [idev] UDS.KEYID = 0
1,176,860 ready_for_fw is high
1,176,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,723 UART: [idev] Erasing UDS.KEYID = 0
1,201,198 UART: [idev] Sha1 KeyId Algorithm
1,209,532 UART: [idev] --
1,210,500 UART: [ldev] ++
1,210,668 UART: [ldev] CDI.KEYID = 6
1,211,031 UART: [ldev] SUBJECT.KEYID = 5
1,211,457 UART: [ldev] AUTHORITY.KEYID = 7
1,211,920 UART: [ldev] FE.KEYID = 1
1,217,148 UART: [ldev] Erasing FE.KEYID = 1
1,243,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,206 UART: [ldev] --
1,282,675 UART: [fwproc] Wait for Commands...
1,283,405 UART: [fwproc] Recv command 0x46574c44
1,284,133 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,523 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,693 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,022 >>> mbox cmd response: success
2,828,096 UART: [afmc] ++
2,828,264 UART: [afmc] CDI.KEYID = 6
2,828,626 UART: [afmc] SUBJECT.KEYID = 7
2,829,051 UART: [afmc] AUTHORITY.KEYID = 5
2,865,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,525 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,273 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,982 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,865 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,566 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,284 UART: [afmc] --
2,908,350 UART: [cold-reset] --
2,909,240 UART: [state] Locking Datavault
2,910,515 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,119 UART: [state] Locking ICCM
2,911,613 UART: [exit] Launching FMC @ 0x40000130
2,916,943 UART:
2,916,959 UART: Running Caliptra FMC ...
2,917,367 UART:
2,917,510 UART: [state] CFI Enabled
2,927,850 UART: [fht] FMC Alias Private Key: 7
3,047,680 UART: [art] Extend RT PCRs Done
3,048,108 UART: [art] Lock RT PCRs Done
3,049,646 UART: [art] Populate DV Done
3,057,549 UART: [fht] FMC Alias Private Key: 7
3,058,513 UART: [art] Derive CDI
3,058,793 UART: [art] Store in slot 0x4
3,144,892 UART: [art] Derive Key Pair
3,145,252 UART: [art] Store priv key in slot 0x5
3,158,320 UART: [art] Derive Key Pair - Done
3,173,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,777 UART: [art] PUB.X = 1C48D39A375AB5D3690B2F8356F69F8890FAA605A578FF1A70386451FA44ADE9203B75D320F9835C982B5855E41621C3
3,196,537 UART: [art] PUB.Y = AB088E4F6D662B58FAD7231FF3E31DAD2D77B86A25A0ED0A8F4BEB116FE15698AEE6EB48C546B9182FD8AE7B6491A6FF
3,203,505 UART: [art] SIG.R = D7DB30CC37CDA25BFC91B0B6AAAD00B3EB3811266E0142E065322A35B3BA3DC10377A4B107DD20EFF4DA5F20DB126300
3,210,240 UART: [art] SIG.S = 75E49F7EA99717A8647DF9B3E9795C78771E7F6927AE93F4FEBBC3A307589BDBDAC2311B51AB1C1837010A39B3E27AA5
3,233,087 UART: Caliptra RT
3,233,430 UART: [state] CFI Enabled
3,353,680 UART: [rt] RT listening for mailbox commands...
3,354,350 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,228 UART: [rt]cmd =0x44504543, len=24
3,411,790 >>> mbox cmd response data (40 bytes)
3,411,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,796 UART: [rt]cmd =0x44504543, len=96
3,449,163 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,714 ready_for_fw is high
1,060,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,311 >>> mbox cmd response: success
2,742,694 UART:
2,742,710 UART: Running Caliptra FMC ...
2,743,118 UART:
2,743,261 UART: [state] CFI Enabled
2,753,605 UART: [fht] FMC Alias Private Key: 7
2,873,729 UART: [art] Extend RT PCRs Done
2,874,157 UART: [art] Lock RT PCRs Done
2,875,455 UART: [art] Populate DV Done
2,883,642 UART: [fht] FMC Alias Private Key: 7
2,884,686 UART: [art] Derive CDI
2,884,966 UART: [art] Store in slot 0x4
2,970,811 UART: [art] Derive Key Pair
2,971,171 UART: [art] Store priv key in slot 0x5
2,984,451 UART: [art] Derive Key Pair - Done
2,999,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,860 UART: [art] PUB.X = D5280BA2F0BCFD1B76AB676923AB28B1CBC1B691E84A71876AF4C320E2DB1F7099337EE19DA1388AAF376C8DFC291B9B
3,022,645 UART: [art] PUB.Y = 07FA52338C186FF4CC1BB56D196825D715AB5C63422AB63333C00402AFAA145C45A9CAFD833B0EB0EC34F6007743F197
3,029,567 UART: [art] SIG.R = 484B52F2FE65AD589943820E8028771DEF45DFEE6300D6AD58DEACA68F6002067891F4B246C365936D48C344A4062490
3,036,299 UART: [art] SIG.S = 893068073D95CC7CBD80B64CD334E73EC46DCC8F5877A5F76E1853DF99F53E13FD83C69D19D263AA87B50AD6F489BF46
3,060,255 UART: Caliptra RT
3,060,598 UART: [state] CFI Enabled
3,179,920 UART: [rt] RT listening for mailbox commands...
3,180,590 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,430 UART: [rt]cmd =0x44504543, len=24
3,238,116 >>> mbox cmd response data (40 bytes)
3,238,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,998 UART: [rt]cmd =0x44504543, len=96
3,275,323 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
192,050 UART:
192,415 UART: Running Caliptra ROM ...
193,614 UART:
193,770 UART: [state] CFI Enabled
266,990 UART: [state] LifecycleState = Unprovisioned
268,901 UART: [state] DebugLocked = No
270,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,963 UART: [kat] SHA2-256
445,644 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,182 UART: [kat] ++
456,666 UART: [kat] sha1
469,249 UART: [kat] SHA2-256
471,977 UART: [kat] SHA2-384
477,183 UART: [kat] SHA2-512-ACC
479,550 UART: [kat] ECC-384
2,769,337 UART: [kat] HMAC-384Kdf
2,801,615 UART: [kat] LMS
3,991,947 UART: [kat] --
3,995,828 UART: [cold-reset] ++
3,996,771 UART: [fht] Storing FHT @ 0x50003400
4,008,174 UART: [idev] ++
4,008,735 UART: [idev] CDI.KEYID = 6
4,009,624 UART: [idev] SUBJECT.KEYID = 7
4,010,969 UART: [idev] UDS.KEYID = 0
4,011,988 ready_for_fw is high
4,012,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,824 UART: [idev] Erasing UDS.KEYID = 0
7,349,521 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,120 UART: [idev] --
7,373,607 UART: [ldev] ++
7,374,176 UART: [ldev] CDI.KEYID = 6
7,375,144 UART: [ldev] SUBJECT.KEYID = 5
7,376,357 UART: [ldev] AUTHORITY.KEYID = 7
7,377,642 UART: [ldev] FE.KEYID = 1
7,423,772 UART: [ldev] Erasing FE.KEYID = 1
10,756,531 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,857 UART: [ldev] --
13,116,938 UART: [fwproc] Waiting for Commands...
13,119,409 UART: [fwproc] Received command 0x46574c44
13,121,591 UART: [fwproc] Received Image of size 118548 bytes
17,221,807 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,293,354 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,366,478 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,695,708 >>> mbox cmd response: success
17,700,282 UART: [afmc] ++
17,700,903 UART: [afmc] CDI.KEYID = 6
17,701,820 UART: [afmc] SUBJECT.KEYID = 7
17,703,034 UART: [afmc] AUTHORITY.KEYID = 5
21,068,485 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,810 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,072 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,543 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,249 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,677 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,864 UART: [afmc] --
23,441,477 UART: [cold-reset] --
23,445,011 UART: [state] Locking Datavault
23,452,638 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,399 UART: [state] Locking ICCM
23,456,818 UART: [exit] Launching FMC @ 0x40000130
23,465,213 UART:
23,465,451 UART: Running Caliptra FMC ...
23,466,550 UART:
23,466,708 UART: [state] CFI Enabled
23,527,866 UART: [fht] FMC Alias Private Key: 7
25,889,416 UART: [art] Extend RT PCRs Done
25,890,638 UART: [art] Lock RT PCRs Done
25,892,422 UART: [art] Populate DV Done
25,897,996 UART: [fht] FMC Alias Private Key: 7
25,899,588 UART: [art] Derive CDI
25,900,404 UART: [art] Store in slot 0x4
25,957,222 UART: [art] Derive Key Pair
25,958,226 UART: [art] Store priv key in slot 0x5
29,251,021 UART: [art] Derive Key Pair - Done
29,263,936 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,507 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,013 UART: [art] PUB.X = 958D269A1B67AD573994488813B3629D9B2F40E279669C207B40AB56D1EA80220CEDE99FF122645F26F1A19E2C61951F
31,560,287 UART: [art] PUB.Y = D1E94833FC02CFE1811CA75C59AB38BC86B6AE822A33AF184E1EEF0F6EC82E53199BF8BADE08115329A55E389D07992A
31,567,572 UART: [art] SIG.R = E86B3213F1336138E3342218CE2D4C5FE5FD31AE79CEE8276EADFC794D6FE6DAD90FCD321B39ECB455CF387F92F9FC06
31,574,999 UART: [art] SIG.S = 415E962E5962577DB6A4CE4CFF6688B1022EF1104CFA6D16B5C85C06081D297DC0FD9AE281D98306623168B8D539CAD0
32,880,411 UART: Caliptra RT
32,881,128 UART: [state] CFI Enabled
33,056,989 UART: [rt] RT listening for mailbox commands...
33,058,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,089,537 UART: [rt]cmd =0x44504543, len=96
33,096,418 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
3,794,887 ready_for_fw is high
3,795,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,946,945 >>> mbox cmd response: success
23,642,610 UART:
23,643,070 UART: Running Caliptra FMC ...
23,644,200 UART:
23,644,355 UART: [state] CFI Enabled
23,711,191 UART: [fht] FMC Alias Private Key: 7
26,051,759 UART: [art] Extend RT PCRs Done
26,053,011 UART: [art] Lock RT PCRs Done
26,054,462 UART: [art] Populate DV Done
26,059,997 UART: [fht] FMC Alias Private Key: 7
26,061,571 UART: [art] Derive CDI
26,062,393 UART: [art] Store in slot 0x4
26,119,549 UART: [art] Derive Key Pair
26,120,590 UART: [art] Store priv key in slot 0x5
29,412,772 UART: [art] Derive Key Pair - Done
29,425,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,714,118 UART: [art] Erasing AUTHORITY.KEYID = 7
31,715,633 UART: [art] PUB.X = 70C49BED15C6691225A69532294EDDE9F16133393E924602B66B15F068F84D09E1CB06BBCA49269AE2DF2521DB999DC4
31,722,862 UART: [art] PUB.Y = FB3E936B1EAE732591FA998A9BB65CAAD64DABE88A4B2D567A2CC497DC57DADDACC6D00A68BB00E730B9FC3A1B2E0FC8
31,730,130 UART: [art] SIG.R = BB9FEB9299E1F50A5BD2B3A02503170D6FC5E550AC18D553D73ABCB6A6E2B13CE0E1D3595DB3521B73F9806122E81327
31,737,526 UART: [art] SIG.S = EE5A6BA36562122A93262452351916C5583B5FC22FA898C4E10E43E2D5FDE3A7D874F02116ECDC1BD6DEAA3330EB7FBE
33,042,625 UART: Caliptra RT
33,043,332 UART: [state] CFI Enabled
33,219,407 UART: [rt] RT listening for mailbox commands...
33,221,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,251,760 UART: [rt]cmd =0x44504543, len=96
33,258,665 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,512 UART:
192,872 UART: Running Caliptra ROM ...
194,063 UART:
603,801 UART: [state] CFI Enabled
617,905 UART: [state] LifecycleState = Unprovisioned
619,841 UART: [state] DebugLocked = No
622,096 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,189 UART: [kat] SHA2-256
795,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,485 UART: [kat] ++
806,928 UART: [kat] sha1
817,439 UART: [kat] SHA2-256
820,160 UART: [kat] SHA2-384
826,073 UART: [kat] SHA2-512-ACC
828,434 UART: [kat] ECC-384
3,112,680 UART: [kat] HMAC-384Kdf
3,124,645 UART: [kat] LMS
4,314,690 UART: [kat] --
4,318,937 UART: [cold-reset] ++
4,320,613 UART: [fht] Storing FHT @ 0x50003400
4,331,318 UART: [idev] ++
4,331,873 UART: [idev] CDI.KEYID = 6
4,332,867 UART: [idev] SUBJECT.KEYID = 7
4,334,034 UART: [idev] UDS.KEYID = 0
4,335,048 ready_for_fw is high
4,335,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,197 UART: [idev] Erasing UDS.KEYID = 0
7,619,124 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,455 UART: [idev] --
7,645,205 UART: [ldev] ++
7,645,771 UART: [ldev] CDI.KEYID = 6
7,646,728 UART: [ldev] SUBJECT.KEYID = 5
7,647,932 UART: [ldev] AUTHORITY.KEYID = 7
7,649,219 UART: [ldev] FE.KEYID = 1
7,660,405 UART: [ldev] Erasing FE.KEYID = 1
10,950,774 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,042 UART: [ldev] --
13,308,435 UART: [fwproc] Waiting for Commands...
13,311,599 UART: [fwproc] Received command 0x46574c44
13,313,773 UART: [fwproc] Received Image of size 118548 bytes
17,418,121 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,246 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,399 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,403 >>> mbox cmd response: success
17,900,411 UART: [afmc] ++
17,901,020 UART: [afmc] CDI.KEYID = 6
17,901,933 UART: [afmc] SUBJECT.KEYID = 7
17,903,149 UART: [afmc] AUTHORITY.KEYID = 5
21,215,707 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,512,711 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,514,987 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,529,455 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,544,164 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,558,532 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,197 UART: [afmc] --
23,583,858 UART: [cold-reset] --
23,588,033 UART: [state] Locking Datavault
23,592,794 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,485 UART: [state] Locking ICCM
23,596,191 UART: [exit] Launching FMC @ 0x40000130
23,604,591 UART:
23,604,861 UART: Running Caliptra FMC ...
23,605,963 UART:
23,606,117 UART: [state] CFI Enabled
23,614,482 UART: [fht] FMC Alias Private Key: 7
25,955,137 UART: [art] Extend RT PCRs Done
25,956,386 UART: [art] Lock RT PCRs Done
25,957,800 UART: [art] Populate DV Done
25,963,260 UART: [fht] FMC Alias Private Key: 7
25,964,949 UART: [art] Derive CDI
25,965,751 UART: [art] Store in slot 0x4
26,008,174 UART: [art] Derive Key Pair
26,009,212 UART: [art] Store priv key in slot 0x5
29,250,939 UART: [art] Derive Key Pair - Done
29,263,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,725 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,228 UART: [art] PUB.X = 46A8EFC06C2ACB81540375A5C15AA88B1F9846F0C867F213EB01FC646D7AF18FE456DD6EF857E6A9435636883A1C320A
31,553,533 UART: [art] PUB.Y = 472F721F3F182D20DC5C0B76655A644261F7743A255478F39A53649486603E0EEDBF1EDB442E8561A02F92E84F357786
31,560,783 UART: [art] SIG.R = A5CBD6E25D1C331A5AB8DB68DCD12EF2C619C6DA474B0FBB1831A67501E222E41FC4D555C06418F0FD53D9F0FFA16602
31,568,174 UART: [art] SIG.S = C399FE04215E379055749E7123EEB1243E8F377DD083D9666B3CCA2F2555AB04A527E5FA2C61C85D289F88E2B736832D
32,873,430 UART: Caliptra RT
32,874,136 UART: [state] CFI Enabled
33,007,371 UART: [rt] RT listening for mailbox commands...
33,009,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,040,103 UART: [rt]cmd =0x44504543, len=96
33,046,866 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
4,129,342 ready_for_fw is high
4,129,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,152,580 >>> mbox cmd response: success
23,796,323 UART:
23,796,732 UART: Running Caliptra FMC ...
23,797,874 UART:
23,798,038 UART: [state] CFI Enabled
23,806,095 UART: [fht] FMC Alias Private Key: 7
26,146,454 UART: [art] Extend RT PCRs Done
26,147,691 UART: [art] Lock RT PCRs Done
26,149,214 UART: [art] Populate DV Done
26,154,689 UART: [fht] FMC Alias Private Key: 7
26,156,284 UART: [art] Derive CDI
26,157,095 UART: [art] Store in slot 0x4
26,199,769 UART: [art] Derive Key Pair
26,200,835 UART: [art] Store priv key in slot 0x5
29,443,508 UART: [art] Derive Key Pair - Done
29,456,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,499 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,000 UART: [art] PUB.X = 86D1A4242B81BD70264AFA013E32496050C5914FF859621E169F3A6F56E60BF3378D735767B2029D3B01C7EC5ED03A7A
31,745,262 UART: [art] PUB.Y = B6D21FED9879FEB169FABDF7AD05981DBD53D1B5AC7673791579334BF0D26504CCD1060E6E224EB2ADC82B5D0C20DEFC
31,752,568 UART: [art] SIG.R = BC4E4A52CF840DBBEE0D279E0834A4DF5FFDBCA2E51A8F3BBE9B0BE8596630FCF58698F8428FB2EF892B6A4E8ABF0B8B
31,759,954 UART: [art] SIG.S = 89315135C6F10EBCFAC19BDC52159BC79C6BC1D396E50242B0C13CC17EA516B574F5BC7CD8ACDA253D239D43643FE894
33,064,827 UART: Caliptra RT
33,065,530 UART: [state] CFI Enabled
33,198,093 UART: [rt] RT listening for mailbox commands...
33,200,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,230,507 UART: [rt]cmd =0x44504543, len=96
33,237,214 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,179 UART:
192,525 UART: Running Caliptra ROM ...
193,728 UART:
193,877 UART: [state] CFI Enabled
264,742 UART: [state] LifecycleState = Unprovisioned
266,668 UART: [state] DebugLocked = No
268,270 UART: [state] WD Timer not started. Device not locked for debugging
271,592 UART: [kat] SHA2-256
451,280 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,030 UART: [kat] ++
462,694 UART: [kat] sha1
472,495 UART: [kat] SHA2-256
475,234 UART: [kat] SHA2-384
480,650 UART: [kat] SHA2-512-ACC
483,032 UART: [kat] ECC-384
2,948,701 UART: [kat] HMAC-384Kdf
2,971,458 UART: [kat] LMS
3,447,921 UART: [kat] --
3,452,906 UART: [cold-reset] ++
3,454,970 UART: [fht] FHT @ 0x50003400
3,466,152 UART: [idev] ++
3,466,709 UART: [idev] CDI.KEYID = 6
3,467,736 UART: [idev] SUBJECT.KEYID = 7
3,468,903 UART: [idev] UDS.KEYID = 0
3,469,945 ready_for_fw is high
3,470,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,554 UART: [idev] Erasing UDS.KEYID = 0
5,986,029 UART: [idev] Sha1 KeyId Algorithm
6,008,988 UART: [idev] --
6,015,578 UART: [ldev] ++
6,016,170 UART: [ldev] CDI.KEYID = 6
6,017,082 UART: [ldev] SUBJECT.KEYID = 5
6,018,300 UART: [ldev] AUTHORITY.KEYID = 7
6,019,531 UART: [ldev] FE.KEYID = 1
6,058,589 UART: [ldev] Erasing FE.KEYID = 1
8,568,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,454 UART: [ldev] --
10,374,115 UART: [fwproc] Wait for Commands...
10,375,931 UART: [fwproc] Recv command 0x46574c44
10,377,906 UART: [fwproc] Recv'd Img size: 118548 bytes
13,858,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,189 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,208 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,329 >>> mbox cmd response: success
14,342,680 UART: [afmc] ++
14,343,287 UART: [afmc] CDI.KEYID = 6
14,344,173 UART: [afmc] SUBJECT.KEYID = 7
14,345,442 UART: [afmc] AUTHORITY.KEYID = 5
16,875,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,911 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,720 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,649,767 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,322 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,364 UART: [afmc] --
18,693,304 UART: [cold-reset] --
18,696,783 UART: [state] Locking Datavault
18,703,960 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,764 UART: [state] Locking ICCM
18,706,797 UART: [exit] Launching FMC @ 0x40000130
18,715,193 UART:
18,715,425 UART: Running Caliptra FMC ...
18,716,526 UART:
18,716,679 UART: [state] CFI Enabled
18,774,068 UART: [fht] FMC Alias Private Key: 7
20,540,470 UART: [art] Extend RT PCRs Done
20,541,690 UART: [art] Lock RT PCRs Done
20,543,071 UART: [art] Populate DV Done
20,548,827 UART: [fht] FMC Alias Private Key: 7
20,550,310 UART: [art] Derive CDI
20,551,069 UART: [art] Store in slot 0x4
20,606,969 UART: [art] Derive Key Pair
20,607,968 UART: [art] Store priv key in slot 0x5
23,071,001 UART: [art] Derive Key Pair - Done
23,083,764 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,783 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,283 UART: [art] PUB.X = F94CC9C2DC4BD320999B9A44927A1CD74361AAB53FD785ED70261A61AD323465FC7B5A2F1969A90FC309B2F8AFD5EE94
24,805,536 UART: [art] PUB.Y = 62D4A52C5E555555E985029027D3A3FBDEFA10CE71186480AB0D6DDCF80994EF2D7AD821284BDD16BAD89F0FA63E48AF
24,812,825 UART: [art] SIG.R = C6585B3D903215DFBA63FF2EFD78F54A8F5E8672621573E4FC169CE963C999A87212208263B84922FA8B39EA2F0CAACC
24,820,222 UART: [art] SIG.S = 4B746E683CDA899E59A8FA1A11D9336D8773B057A957356FB7BE78BF358AA6DF246E6F28E24A6F26DC289E426CD5A0D3
25,799,414 UART: Caliptra RT
25,800,106 UART: [state] CFI Enabled
25,981,852 UART: [rt] RT listening for mailbox commands...
25,983,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,014,507 UART: [rt]cmd =0x44504543, len=96
26,021,247 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,459,485 ready_for_fw is high
3,460,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,819 >>> mbox cmd response: success
18,535,201 UART:
18,535,575 UART: Running Caliptra FMC ...
18,536,709 UART:
18,536,861 UART: [state] CFI Enabled
18,603,220 UART: [fht] FMC Alias Private Key: 7
20,369,706 UART: [art] Extend RT PCRs Done
20,370,925 UART: [art] Lock RT PCRs Done
20,372,226 UART: [art] Populate DV Done
20,377,501 UART: [fht] FMC Alias Private Key: 7
20,379,152 UART: [art] Derive CDI
20,379,965 UART: [art] Store in slot 0x4
20,435,968 UART: [art] Derive Key Pair
20,436,960 UART: [art] Store priv key in slot 0x5
22,900,104 UART: [art] Derive Key Pair - Done
22,913,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,960 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,465 UART: [art] PUB.X = 0D9CE7839FAA589B2A20A71412507E1B270F2C6CEA49DD29D32A8389B8D8A71C2A9946C15F17C09E7E6D91F4A3877923
24,634,777 UART: [art] PUB.Y = BF4564E487689DC5E233A4147F8BD46881B1F989B2DD3D23B46EEFD1D30258D515669FFFEB723FF1CDFEAB8B7A1BE8D7
24,642,030 UART: [art] SIG.R = D37AE903A596093B0EF6C9067FB2CED93CC1E7795D8C64A848432E050A6D90680406B8CF9BB62A80334B0FC837C07B05
24,649,439 UART: [art] SIG.S = 65DBB0381F091E5D117F1A80C8BFC944F5C6F735A9759C75F31D80E3DCD8EEA0B0E72C196938CF8E83F511E7A17FF52C
25,628,121 UART: Caliptra RT
25,628,833 UART: [state] CFI Enabled
25,811,260 UART: [rt] RT listening for mailbox commands...
25,813,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,843,969 UART: [rt]cmd =0x44504543, len=96
25,850,864 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,338 writing to cptra_bootfsm_go
193,552 UART:
194,003 UART: Running Caliptra ROM ...
195,157 UART:
604,737 UART: [state] CFI Enabled
621,061 UART: [state] LifecycleState = Unprovisioned
623,022 UART: [state] DebugLocked = No
625,911 UART: [state] WD Timer not started. Device not locked for debugging
630,101 UART: [kat] SHA2-256
809,692 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,502 UART: [kat] ++
820,952 UART: [kat] sha1
832,894 UART: [kat] SHA2-256
835,574 UART: [kat] SHA2-384
841,430 UART: [kat] SHA2-512-ACC
843,802 UART: [kat] ECC-384
3,288,807 UART: [kat] HMAC-384Kdf
3,300,540 UART: [kat] LMS
3,777,051 UART: [kat] --
3,781,331 UART: [cold-reset] ++
3,782,479 UART: [fht] FHT @ 0x50003400
3,794,521 UART: [idev] ++
3,795,092 UART: [idev] CDI.KEYID = 6
3,796,132 UART: [idev] SUBJECT.KEYID = 7
3,797,309 UART: [idev] UDS.KEYID = 0
3,798,239 ready_for_fw is high
3,798,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,344 UART: [idev] Erasing UDS.KEYID = 0
6,276,385 UART: [idev] Sha1 KeyId Algorithm
6,299,252 UART: [idev] --
6,304,273 UART: [ldev] ++
6,304,850 UART: [ldev] CDI.KEYID = 6
6,305,762 UART: [ldev] SUBJECT.KEYID = 5
6,306,976 UART: [ldev] AUTHORITY.KEYID = 7
6,308,213 UART: [ldev] FE.KEYID = 1
6,318,863 UART: [ldev] Erasing FE.KEYID = 1
8,794,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,719 UART: [ldev] --
10,586,353 UART: [fwproc] Wait for Commands...
10,588,180 UART: [fwproc] Recv command 0x46574c44
10,590,166 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,633 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,642 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,049 >>> mbox cmd response: success
14,551,725 UART: [afmc] ++
14,552,341 UART: [afmc] CDI.KEYID = 6
14,553,259 UART: [afmc] SUBJECT.KEYID = 7
14,554,478 UART: [afmc] AUTHORITY.KEYID = 5
17,056,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,208 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,029 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,098 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,640 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,791 UART: [afmc] --
18,855,985 UART: [cold-reset] --
18,859,810 UART: [state] Locking Datavault
18,865,008 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,779 UART: [state] Locking ICCM
18,869,390 UART: [exit] Launching FMC @ 0x40000130
18,877,786 UART:
18,878,023 UART: Running Caliptra FMC ...
18,879,129 UART:
18,879,290 UART: [state] CFI Enabled
18,887,401 UART: [fht] FMC Alias Private Key: 7
20,654,028 UART: [art] Extend RT PCRs Done
20,655,248 UART: [art] Lock RT PCRs Done
20,657,197 UART: [art] Populate DV Done
20,662,498 UART: [fht] FMC Alias Private Key: 7
20,664,090 UART: [art] Derive CDI
20,664,908 UART: [art] Store in slot 0x4
20,707,880 UART: [art] Derive Key Pair
20,708,902 UART: [art] Store priv key in slot 0x5
23,135,664 UART: [art] Derive Key Pair - Done
23,148,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,854,526 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,026 UART: [art] PUB.X = 230F33B8B1F207AD9D0E9E7F3F7F1FD9147F57743A97B00795ECF8AE1E1079153DFC53BC3CC70994BEB499236AF2607D
24,863,268 UART: [art] PUB.Y = B09015E59B54225540327108A454863D712AB744A9AF1B37EC06A3281491CDFD821179B7DD5AB90351B0CE2CC624C6F5
24,870,547 UART: [art] SIG.R = 8A472E2B4391A0C248D881E13F84BBFE4BD0DE3359CC206B830471462A02D1531EA85E11C1CCE525DE0C46A93951034B
24,877,928 UART: [art] SIG.S = EB5E30B79E10DC4F0D98C43EB9ECD3305229B13849FD15418361F911D536321BF58BF4E6F0BD0C3A4C7628AE5F7E895D
25,856,809 UART: Caliptra RT
25,857,511 UART: [state] CFI Enabled
25,989,472 UART: [rt] RT listening for mailbox commands...
25,991,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,022,124 UART: [rt]cmd =0x44504543, len=96
26,029,106 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,785,662 ready_for_fw is high
3,786,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,581 >>> mbox cmd response: success
18,696,941 UART:
18,697,326 UART: Running Caliptra FMC ...
18,698,550 UART:
18,698,725 UART: [state] CFI Enabled
18,706,402 UART: [fht] FMC Alias Private Key: 7
20,472,050 UART: [art] Extend RT PCRs Done
20,473,277 UART: [art] Lock RT PCRs Done
20,474,904 UART: [art] Populate DV Done
20,480,542 UART: [fht] FMC Alias Private Key: 7
20,482,139 UART: [art] Derive CDI
20,482,963 UART: [art] Store in slot 0x4
20,525,670 UART: [art] Derive Key Pair
20,526,674 UART: [art] Store priv key in slot 0x5
22,953,740 UART: [art] Derive Key Pair - Done
22,966,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,173 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,670 UART: [art] PUB.X = FF0166A9C3C9F200B1F52B631DA257A4C555B3FA966E841CD31B70154F1E99B9C09AA8CE32B1B3D51FED6E02022C5584
24,681,925 UART: [art] PUB.Y = 193585BF16742BA9A518FF505BF38A8C14FB0FD0B96CB6DD66E36385BD49805E1A5C235A787828B24BEB23035265D8D0
24,689,174 UART: [art] SIG.R = F5508085276594CAA6097EACB62E211D40AB3BCD328C7CB908FBDAE8FE5899DDB4365EADAA19A1E739F4CD3D940C9D38
24,696,596 UART: [art] SIG.S = 1BCED0196CB24F8AEC6DAA49DBBE07CA1D492BDDA7355618212E86C22CE82264B81248FD695BB91C73449258644F93F0
25,676,191 UART: Caliptra RT
25,676,904 UART: [state] CFI Enabled
25,810,773 UART: [rt] RT listening for mailbox commands...
25,812,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,843,394 UART: [rt]cmd =0x44504543, len=96
25,850,167 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,136 UART:
192,517 UART: Running Caliptra ROM ...
193,648 UART:
193,798 UART: [state] CFI Enabled
269,106 UART: [state] LifecycleState = Unprovisioned
271,484 UART: [state] DebugLocked = No
273,433 UART: [state] WD Timer not started. Device not locked for debugging
277,576 UART: [kat] SHA2-256
467,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,175 UART: [kat] ++
478,625 UART: [kat] sha1
490,417 UART: [kat] SHA2-256
493,491 UART: [kat] SHA2-384
499,762 UART: [kat] SHA2-512-ACC
502,338 UART: [kat] ECC-384
2,948,556 UART: [kat] HMAC-384Kdf
2,972,508 UART: [kat] LMS
3,504,259 UART: [kat] --
3,510,809 UART: [cold-reset] ++
3,512,804 UART: [fht] FHT @ 0x50003400
3,524,558 UART: [idev] ++
3,525,260 UART: [idev] CDI.KEYID = 6
3,526,250 UART: [idev] SUBJECT.KEYID = 7
3,527,420 UART: [idev] UDS.KEYID = 0
3,528,363 ready_for_fw is high
3,528,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,728 UART: [idev] Erasing UDS.KEYID = 0
6,032,334 UART: [idev] Sha1 KeyId Algorithm
6,054,489 UART: [idev] --
6,059,155 UART: [ldev] ++
6,059,840 UART: [ldev] CDI.KEYID = 6
6,060,751 UART: [ldev] SUBJECT.KEYID = 5
6,061,910 UART: [ldev] AUTHORITY.KEYID = 7
6,063,140 UART: [ldev] FE.KEYID = 1
6,102,078 UART: [ldev] Erasing FE.KEYID = 1
8,611,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,207 UART: [ldev] --
10,417,525 UART: [fwproc] Wait for Commands...
10,420,532 UART: [fwproc] Recv command 0x46574c44
10,422,837 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,420 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,037 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,134 >>> mbox cmd response: success
14,686,418 UART: [afmc] ++
14,687,126 UART: [afmc] CDI.KEYID = 6
14,688,309 UART: [afmc] SUBJECT.KEYID = 7
14,689,744 UART: [afmc] AUTHORITY.KEYID = 5
17,215,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,940,208 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,120 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,957,233 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,972,408 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,987,259 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,012,086 UART: [afmc] --
19,015,046 UART: [cold-reset] --
19,020,002 UART: [state] Locking Datavault
19,023,641 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,787 UART: [state] Locking ICCM
19,028,433 UART: [exit] Launching FMC @ 0x40000130
19,037,108 UART:
19,037,351 UART: Running Caliptra FMC ...
19,038,452 UART:
19,038,608 UART: [state] CFI Enabled
19,098,919 UART: [fht] FMC Alias Private Key: 7
20,865,254 UART: [art] Extend RT PCRs Done
20,866,471 UART: [art] Lock RT PCRs Done
20,868,284 UART: [art] Populate DV Done
20,873,597 UART: [fht] FMC Alias Private Key: 7
20,875,292 UART: [art] Derive CDI
20,876,028 UART: [art] Store in slot 0x4
20,930,798 UART: [art] Derive Key Pair
20,931,836 UART: [art] Store priv key in slot 0x5
23,394,756 UART: [art] Derive Key Pair - Done
23,407,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,121,024 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,543 UART: [art] PUB.X = A2AD103C544A940DE012474CD24357B1B6B42FBB376E885A1B27E494CE68D8F97633AFF066F33C50D23EE23F57525AED
25,129,773 UART: [art] PUB.Y = A66C21A1D7355087132710053650EF8B01DB0BE37BA5B5252DC300B549291DEFAD1107C40A4BFB1024AA4B992405FA36
25,137,041 UART: [art] SIG.R = 6C6FFC8727A97511B9887D058DB75B0E034179AA413CE8A651996D221BBCB5CB45E50E0FE9B37A4517BB205FD3A0A126
25,144,413 UART: [art] SIG.S = 8B9753D7AB21F341270893A894ACDD195C77FE11845673D141C24129A6B149EF690D4E3CBB063C0A8D312496D18144A9
26,122,958 UART: Caliptra RT
26,123,653 UART: [state] CFI Enabled
26,305,346 UART: [rt] RT listening for mailbox commands...
26,307,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,337,775 UART: [rt]cmd =0x44504543, len=96
26,344,451 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
3,437,316 ready_for_fw is high
3,437,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,457 >>> mbox cmd response: success
19,115,825 UART:
19,116,205 UART: Running Caliptra FMC ...
19,117,414 UART:
19,117,580 UART: [state] CFI Enabled
19,182,599 UART: [fht] FMC Alias Private Key: 7
20,948,555 UART: [art] Extend RT PCRs Done
20,949,784 UART: [art] Lock RT PCRs Done
20,951,630 UART: [art] Populate DV Done
20,956,780 UART: [fht] FMC Alias Private Key: 7
20,958,373 UART: [art] Derive CDI
20,959,185 UART: [art] Store in slot 0x4
21,015,089 UART: [art] Derive Key Pair
21,016,141 UART: [art] Store priv key in slot 0x5
23,479,107 UART: [art] Derive Key Pair - Done
23,491,954 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,225 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,738 UART: [art] PUB.X = 167E14B35479C00738086F6079B374F10BB19EC3E37184C1B547240EFCA5F9F8C11E901D8BC99D75C3C89D0C11724A89
25,214,009 UART: [art] PUB.Y = 9DEC52E8AB16801D2BDB54399D4A869D51C8EA55B7B7DD37DA12233B841BBC9EFAAA1169C4B617201BAAE7AD676A50F6
25,221,295 UART: [art] SIG.R = B021593C34B0A498717940416E8AB9D894D60C56B36146BF15E9EF04406913320EC78D831CF86F0363A4A38B3A2076BF
25,228,665 UART: [art] SIG.S = 3AE3EE89C5FC9DE6993AC4962A46CFF80ACBF089A35CBC86B9AB9656EF09F8C9AB5FA5E3DF009C3921ED6742CAF8C8B6
26,207,955 UART: Caliptra RT
26,208,667 UART: [state] CFI Enabled
26,389,225 UART: [rt] RT listening for mailbox commands...
26,391,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,421,795 UART: [rt]cmd =0x44504543, len=96
26,428,515 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,520 UART:
192,906 UART: Running Caliptra ROM ...
194,091 UART:
603,883 UART: [state] CFI Enabled
617,550 UART: [state] LifecycleState = Unprovisioned
619,930 UART: [state] DebugLocked = No
622,248 UART: [state] WD Timer not started. Device not locked for debugging
626,521 UART: [kat] SHA2-256
816,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,200 UART: [kat] ++
827,681 UART: [kat] sha1
839,251 UART: [kat] SHA2-256
842,277 UART: [kat] SHA2-384
849,269 UART: [kat] SHA2-512-ACC
851,877 UART: [kat] ECC-384
3,294,956 UART: [kat] HMAC-384Kdf
3,307,627 UART: [kat] LMS
3,839,481 UART: [kat] --
3,843,365 UART: [cold-reset] ++
3,844,309 UART: [fht] FHT @ 0x50003400
3,855,932 UART: [idev] ++
3,856,647 UART: [idev] CDI.KEYID = 6
3,857,566 UART: [idev] SUBJECT.KEYID = 7
3,858,744 UART: [idev] UDS.KEYID = 0
3,859,674 ready_for_fw is high
3,859,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,779 UART: [idev] Erasing UDS.KEYID = 0
6,332,953 UART: [idev] Sha1 KeyId Algorithm
6,354,011 UART: [idev] --
6,357,664 UART: [ldev] ++
6,358,376 UART: [ldev] CDI.KEYID = 6
6,359,294 UART: [ldev] SUBJECT.KEYID = 5
6,360,406 UART: [ldev] AUTHORITY.KEYID = 7
6,361,638 UART: [ldev] FE.KEYID = 1
6,373,203 UART: [ldev] Erasing FE.KEYID = 1
8,850,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,118 UART: [ldev] --
10,641,978 UART: [fwproc] Wait for Commands...
10,644,343 UART: [fwproc] Recv command 0x46574c44
10,646,602 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,949 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,566 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,357 >>> mbox cmd response: success
14,915,734 UART: [afmc] ++
14,916,457 UART: [afmc] CDI.KEYID = 6
14,917,658 UART: [afmc] SUBJECT.KEYID = 7
14,919,109 UART: [afmc] AUTHORITY.KEYID = 5
17,422,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,212 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,339 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,296 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,177,431 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,298 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,217,144 UART: [afmc] --
19,221,281 UART: [cold-reset] --
19,224,556 UART: [state] Locking Datavault
19,230,312 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,534 UART: [state] Locking ICCM
19,235,008 UART: [exit] Launching FMC @ 0x40000130
19,243,702 UART:
19,243,939 UART: Running Caliptra FMC ...
19,244,967 UART:
19,245,117 UART: [state] CFI Enabled
19,253,544 UART: [fht] FMC Alias Private Key: 7
21,019,940 UART: [art] Extend RT PCRs Done
21,021,181 UART: [art] Lock RT PCRs Done
21,022,788 UART: [art] Populate DV Done
21,028,420 UART: [fht] FMC Alias Private Key: 7
21,030,018 UART: [art] Derive CDI
21,030,767 UART: [art] Store in slot 0x4
21,073,006 UART: [art] Derive Key Pair
21,074,055 UART: [art] Store priv key in slot 0x5
23,501,168 UART: [art] Derive Key Pair - Done
23,514,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,972 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,482 UART: [art] PUB.X = 374D178EFBE3441E505AB0796B73F948D81DF4E07CB9219B3C41D827A839658D271B000A4D91139B509D0EDF79ECBE90
25,229,773 UART: [art] PUB.Y = E73BAA1D8848870D9AB19D133FDBBD56FC97C227230FF659A949B3727ADE04069E3E71B2EA79EC87233B02D5EC3DBB0B
25,236,986 UART: [art] SIG.R = F407428219133400B69C2B974449FF2FF833B3E55336C154F2A5AE3A251A6A9C3E8EBBE65588364C34F387E1B22EB7E8
25,244,354 UART: [art] SIG.S = B559ADC06BEC5468CD4C677C7B4268D499FF332F840907587163067275DC49CBBBFDC68BD4D3A707AFFE3554927D791A
26,222,693 UART: Caliptra RT
26,223,383 UART: [state] CFI Enabled
26,356,815 UART: [rt] RT listening for mailbox commands...
26,358,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,389,341 UART: [rt]cmd =0x44504543, len=96
26,396,067 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,748,741 ready_for_fw is high
3,749,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,035,872 >>> mbox cmd response: success
19,290,345 UART:
19,290,730 UART: Running Caliptra FMC ...
19,291,836 UART:
19,291,999 UART: [state] CFI Enabled
19,299,999 UART: [fht] FMC Alias Private Key: 7
21,066,366 UART: [art] Extend RT PCRs Done
21,067,595 UART: [art] Lock RT PCRs Done
21,069,148 UART: [art] Populate DV Done
21,074,581 UART: [fht] FMC Alias Private Key: 7
21,076,097 UART: [art] Derive CDI
21,076,858 UART: [art] Store in slot 0x4
21,119,364 UART: [art] Derive Key Pair
21,120,374 UART: [art] Store priv key in slot 0x5
23,547,517 UART: [art] Derive Key Pair - Done
23,560,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,267,214 UART: [art] Erasing AUTHORITY.KEYID = 7
25,268,744 UART: [art] PUB.X = 1B4821BF3A1DC7426DC814798BF25B84B730215310B92FEFD146E09E5AFBB8FC4B85DFD6FDE794F58C898DB264BC708A
25,275,989 UART: [art] PUB.Y = 4E70C3566D07089F2B4442D4B57035BA7B37E5758D4AEC7FA42B947208D35AD23D49BD70B0E1535EBA9C74A466EBED39
25,283,268 UART: [art] SIG.R = 908098CA1209CCFE5D1FE02722836D3632851669BD3DEACC6B76BF25BFB96CDBD6DDDE1838E54C4F979BA03305F0D815
25,290,661 UART: [art] SIG.S = 0A1CC40B3D1EFA928978C673CD491BA9EBF35426D4E93903E39A0B5CB8AF5969F34D2CAF0BDA26CB39089A0D88F17F96
26,269,498 UART: Caliptra RT
26,270,212 UART: [state] CFI Enabled
26,402,200 UART: [rt] RT listening for mailbox commands...
26,404,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,434,616 UART: [rt]cmd =0x44504543, len=96
26,441,183 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,039 UART: [kat] SHA2-256
881,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,085 UART: [kat] ++
886,237 UART: [kat] sha1
890,461 UART: [kat] SHA2-256
892,399 UART: [kat] SHA2-384
895,172 UART: [kat] SHA2-512-ACC
897,073 UART: [kat] ECC-384
902,890 UART: [kat] HMAC-384Kdf
907,498 UART: [kat] LMS
1,475,694 UART: [kat] --
1,476,637 UART: [cold-reset] ++
1,477,067 UART: [fht] Storing FHT @ 0x50003400
1,479,670 UART: [idev] ++
1,479,838 UART: [idev] CDI.KEYID = 6
1,480,198 UART: [idev] SUBJECT.KEYID = 7
1,480,622 UART: [idev] UDS.KEYID = 0
1,480,967 ready_for_fw is high
1,480,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,508 UART: [idev] Erasing UDS.KEYID = 0
1,505,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,030 UART: [idev] --
1,515,063 UART: [ldev] ++
1,515,231 UART: [ldev] CDI.KEYID = 6
1,515,594 UART: [ldev] SUBJECT.KEYID = 5
1,516,020 UART: [ldev] AUTHORITY.KEYID = 7
1,516,483 UART: [ldev] FE.KEYID = 1
1,521,751 UART: [ldev] Erasing FE.KEYID = 1
1,547,742 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,710 UART: [ldev] --
1,586,979 UART: [fwproc] Waiting for Commands...
1,587,754 UART: [fwproc] Received command 0x46574c44
1,588,545 UART: [fwproc] Received Image of size 118548 bytes
2,932,751 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,397 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,615 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,062 >>> mbox cmd response: success
3,133,136 UART: [afmc] ++
3,133,304 UART: [afmc] CDI.KEYID = 6
3,133,666 UART: [afmc] SUBJECT.KEYID = 7
3,134,091 UART: [afmc] AUTHORITY.KEYID = 5
3,168,810 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,270 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,050 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,759 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,642 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,325 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,257 UART: [afmc] --
3,212,191 UART: [cold-reset] --
3,212,871 UART: [state] Locking Datavault
3,214,174 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,778 UART: [state] Locking ICCM
3,215,368 UART: [exit] Launching FMC @ 0x40000130
3,220,698 UART:
3,220,714 UART: Running Caliptra FMC ...
3,221,122 UART:
3,221,176 UART: [state] CFI Enabled
3,231,940 UART: [fht] FMC Alias Private Key: 7
3,350,946 UART: [art] Extend RT PCRs Done
3,351,374 UART: [art] Lock RT PCRs Done
3,353,104 UART: [art] Populate DV Done
3,361,147 UART: [fht] FMC Alias Private Key: 7
3,362,231 UART: [art] Derive CDI
3,362,511 UART: [art] Store in slot 0x4
3,447,799 UART: [art] Derive Key Pair
3,448,159 UART: [art] Store priv key in slot 0x5
3,461,592 UART: [art] Derive Key Pair - Done
3,476,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,624 UART: [art] PUB.X = 674F1B3755C301510B740A521339F056F87E37D4D0340F6B13D4CB126023C68F78B35D82F6618C3655BED9252CADDE47
3,499,378 UART: [art] PUB.Y = D9B4E6799EAF183E16EC03E0BA610AC9CDDE939D65BB97D8C89799E612388C9AFE8C249BA97E15D881480DD1F2F4B064
3,506,333 UART: [art] SIG.R = 13189776215F03B17A490A723AB9DDA1C1ABA0CD1A5DBD45DFFD427408903F6A8FD88C3FDDE031BC5AA392FD1E0A243A
3,513,111 UART: [art] SIG.S = 0E6BDB17A495523F717665BA200E2712A1027F5A4E4F426B356D6D5DB127EF6D633840BA7B0FB78F96FF68D1F80E0CCF
3,536,943 UART: Caliptra RT
3,537,194 UART: [state] CFI Enabled
3,658,140 UART: [rt] RT listening for mailbox commands...
3,658,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,578 UART: [rt]cmd =0x44504543, len=96
3,696,930 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,887 ready_for_fw is high
1,362,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,498 >>> mbox cmd response: success
3,041,821 UART:
3,041,837 UART: Running Caliptra FMC ...
3,042,245 UART:
3,042,299 UART: [state] CFI Enabled
3,052,711 UART: [fht] FMC Alias Private Key: 7
3,171,723 UART: [art] Extend RT PCRs Done
3,172,151 UART: [art] Lock RT PCRs Done
3,173,957 UART: [art] Populate DV Done
3,182,460 UART: [fht] FMC Alias Private Key: 7
3,183,536 UART: [art] Derive CDI
3,183,816 UART: [art] Store in slot 0x4
3,269,334 UART: [art] Derive Key Pair
3,269,694 UART: [art] Store priv key in slot 0x5
3,282,839 UART: [art] Derive Key Pair - Done
3,297,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,164 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,929 UART: [art] PUB.X = BA7AABBF0BCF2FF5BE73051C44130ADF02081437B10D818291371BA37C64204FAB2C11955046B7F0CCC06FAE0F93C5B2
3,320,692 UART: [art] PUB.Y = 341B749A7D774A7BEAAF8F39D3A32D52DFE760C4452F57264C66DE273C0039E11D724E53ACD086367D63ED27E67BCF38
3,327,628 UART: [art] SIG.R = 45EB08A494D6484931CDB31E0684911952CDEAE64B314601881278B9E8E7FDE0A106BC10E6AF24056F918C6026322E22
3,334,379 UART: [art] SIG.S = 34CE269B95F15A3F9531199593B3D93605EA8210DB267E175FFA1EFA0554EFC75EF26C8F2E6102F8F11FE93DCB510CFF
3,358,341 UART: Caliptra RT
3,358,592 UART: [state] CFI Enabled
3,478,456 UART: [rt] RT listening for mailbox commands...
3,479,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,450 UART: [rt]cmd =0x44504543, len=96
3,516,676 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,472 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,124 UART: [kat] SHA2-256
882,055 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,170 UART: [kat] ++
886,322 UART: [kat] sha1
890,532 UART: [kat] SHA2-256
892,470 UART: [kat] SHA2-384
895,263 UART: [kat] SHA2-512-ACC
897,164 UART: [kat] ECC-384
902,833 UART: [kat] HMAC-384Kdf
907,287 UART: [kat] LMS
1,475,483 UART: [kat] --
1,476,474 UART: [cold-reset] ++
1,476,998 UART: [fht] Storing FHT @ 0x50003400
1,479,935 UART: [idev] ++
1,480,103 UART: [idev] CDI.KEYID = 6
1,480,463 UART: [idev] SUBJECT.KEYID = 7
1,480,887 UART: [idev] UDS.KEYID = 0
1,481,232 ready_for_fw is high
1,481,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,887 UART: [idev] Erasing UDS.KEYID = 0
1,505,747 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,373 UART: [idev] --
1,515,458 UART: [ldev] ++
1,515,626 UART: [ldev] CDI.KEYID = 6
1,515,989 UART: [ldev] SUBJECT.KEYID = 5
1,516,415 UART: [ldev] AUTHORITY.KEYID = 7
1,516,878 UART: [ldev] FE.KEYID = 1
1,522,274 UART: [ldev] Erasing FE.KEYID = 1
1,547,395 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,421 UART: [ldev] --
1,586,730 UART: [fwproc] Waiting for Commands...
1,587,459 UART: [fwproc] Received command 0x46574c44
1,588,250 UART: [fwproc] Received Image of size 118548 bytes
2,932,414 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,472 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,690 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,911 >>> mbox cmd response: success
3,131,993 UART: [afmc] ++
3,132,161 UART: [afmc] CDI.KEYID = 6
3,132,523 UART: [afmc] SUBJECT.KEYID = 7
3,132,948 UART: [afmc] AUTHORITY.KEYID = 5
3,168,599 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,657 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,437 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,146 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,029 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,712 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,528 UART: [afmc] --
3,211,660 UART: [cold-reset] --
3,212,316 UART: [state] Locking Datavault
3,213,711 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,315 UART: [state] Locking ICCM
3,214,983 UART: [exit] Launching FMC @ 0x40000130
3,220,313 UART:
3,220,329 UART: Running Caliptra FMC ...
3,220,737 UART:
3,220,880 UART: [state] CFI Enabled
3,231,256 UART: [fht] FMC Alias Private Key: 7
3,350,506 UART: [art] Extend RT PCRs Done
3,350,934 UART: [art] Lock RT PCRs Done
3,352,568 UART: [art] Populate DV Done
3,360,867 UART: [fht] FMC Alias Private Key: 7
3,362,027 UART: [art] Derive CDI
3,362,307 UART: [art] Store in slot 0x4
3,447,873 UART: [art] Derive Key Pair
3,448,233 UART: [art] Store priv key in slot 0x5
3,461,650 UART: [art] Derive Key Pair - Done
3,476,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,940 UART: [art] PUB.X = 7A5759A782413F74429023262428A897E786DC975506EC6193720A5F42F9F70BFCCE9BC6CBFCC865FDA11E4E493EDF07
3,499,702 UART: [art] PUB.Y = D6E2CA66164556BE2F20278828685A241DDE583BFAE3F6DA53FDD4E3D6B2074DFEFDCC5D4943F072527745EBB2CBA039
3,506,665 UART: [art] SIG.R = 61BA2396817E4DC27A0986E33B075378A2F28CDF368928669D2A3B07B093E012FEE8E40A6FC26F017CE5901681204444
3,513,414 UART: [art] SIG.S = EA576EA80B30C3F513A53D191F17909D62D0055D42716FA0E5851B21C7772E841C6134B333042F3718D9311B8CA729F5
3,536,987 UART: Caliptra RT
3,537,330 UART: [state] CFI Enabled
3,657,125 UART: [rt] RT listening for mailbox commands...
3,657,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,933 UART: [rt]cmd =0x44504543, len=96
3,695,305 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,538 ready_for_fw is high
1,362,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,055 >>> mbox cmd response: success
3,041,676 UART:
3,041,692 UART: Running Caliptra FMC ...
3,042,100 UART:
3,042,243 UART: [state] CFI Enabled
3,052,705 UART: [fht] FMC Alias Private Key: 7
3,171,651 UART: [art] Extend RT PCRs Done
3,172,079 UART: [art] Lock RT PCRs Done
3,173,811 UART: [art] Populate DV Done
3,182,064 UART: [fht] FMC Alias Private Key: 7
3,183,228 UART: [art] Derive CDI
3,183,508 UART: [art] Store in slot 0x4
3,268,944 UART: [art] Derive Key Pair
3,269,304 UART: [art] Store priv key in slot 0x5
3,282,311 UART: [art] Derive Key Pair - Done
3,297,142 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,146 UART: [art] PUB.X = 37957986D41C25D3BE5C9E742E99495FA85ED3FFFF1E7A6863348459A0F8691A8B1765C5FD3BBE06ACB6B5A2E4B15895
3,319,921 UART: [art] PUB.Y = D8803200203C0E9281F7EE53526C4CD8B45964ADBDCC90E3F0073909020BAA3D172F6231143031EA79AAB501E544D2F6
3,326,831 UART: [art] SIG.R = 0BE7272C78984C7CB876813AC13EC1F7EBD31C44D79728B83CE7CB971B29BA7B45EB0A778D973514471E7BDB926E3171
3,333,601 UART: [art] SIG.S = 5AF0DB5948FD4F693FD51A009CF92339A05FFBB86E50ADF0971BCF178CDBD200E6B040995ABD95A437CAD6094583FA53
3,356,896 UART: Caliptra RT
3,357,239 UART: [state] CFI Enabled
3,476,943 UART: [rt] RT listening for mailbox commands...
3,477,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,089 UART: [rt]cmd =0x44504543, len=96
3,515,751 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,094 UART: [kat] ++
895,246 UART: [kat] sha1
899,394 UART: [kat] SHA2-256
901,334 UART: [kat] SHA2-384
903,933 UART: [kat] SHA2-512-ACC
905,834 UART: [kat] ECC-384
915,473 UART: [kat] HMAC-384Kdf
920,127 UART: [kat] LMS
1,168,439 UART: [kat] --
1,169,174 UART: [cold-reset] ++
1,169,580 UART: [fht] FHT @ 0x50003400
1,172,290 UART: [idev] ++
1,172,458 UART: [idev] CDI.KEYID = 6
1,172,819 UART: [idev] SUBJECT.KEYID = 7
1,173,244 UART: [idev] UDS.KEYID = 0
1,173,590 ready_for_fw is high
1,173,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,949 UART: [idev] Erasing UDS.KEYID = 0
1,197,687 UART: [idev] Sha1 KeyId Algorithm
1,206,529 UART: [idev] --
1,207,772 UART: [ldev] ++
1,207,940 UART: [ldev] CDI.KEYID = 6
1,208,304 UART: [ldev] SUBJECT.KEYID = 5
1,208,731 UART: [ldev] AUTHORITY.KEYID = 7
1,209,194 UART: [ldev] FE.KEYID = 1
1,214,226 UART: [ldev] Erasing FE.KEYID = 1
1,240,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,050 UART: [ldev] --
1,280,405 UART: [fwproc] Wait for Commands...
1,281,046 UART: [fwproc] Recv command 0x46574c44
1,281,779 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,793 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,968 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,257 >>> mbox cmd response: success
2,824,489 UART: [afmc] ++
2,824,657 UART: [afmc] CDI.KEYID = 6
2,825,020 UART: [afmc] SUBJECT.KEYID = 7
2,825,446 UART: [afmc] AUTHORITY.KEYID = 5
2,860,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,954 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,703 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,413 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,294 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,894,995 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,682 UART: [afmc] --
2,903,539 UART: [cold-reset] --
2,904,353 UART: [state] Locking Datavault
2,905,444 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,048 UART: [state] Locking ICCM
2,906,490 UART: [exit] Launching FMC @ 0x40000130
2,911,820 UART:
2,911,836 UART: Running Caliptra FMC ...
2,912,244 UART:
2,912,298 UART: [state] CFI Enabled
2,923,028 UART: [fht] FMC Alias Private Key: 7
3,042,876 UART: [art] Extend RT PCRs Done
3,043,304 UART: [art] Lock RT PCRs Done
3,044,714 UART: [art] Populate DV Done
3,052,839 UART: [fht] FMC Alias Private Key: 7
3,053,885 UART: [art] Derive CDI
3,054,165 UART: [art] Store in slot 0x4
3,140,202 UART: [art] Derive Key Pair
3,140,562 UART: [art] Store priv key in slot 0x5
3,153,404 UART: [art] Derive Key Pair - Done
3,168,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,607 UART: [art] PUB.X = D73094B6F2A20C369ADC305D0335BCEEDF1E49F63EE1C2C9C62D97F0FCEF2BE5CB62A35808F0D3F676DD77416D239A09
3,191,383 UART: [art] PUB.Y = EB2A823CD8EC7F202AAA36B4B514E6FA2CE172F1397607EFB2C381471356EFE55BCDD2CE901F0A7C179D7137CD4CE5F6
3,198,347 UART: [art] SIG.R = 346BDC423881270F95173FA1B837E6725B97A58418AC402FA66F373C88E7955E3C16BC1C709345CF4A0C09BBBF281770
3,205,106 UART: [art] SIG.S = 3ACFD08F1CD20FD964D4525539B42A2E2766569FDF471CC57C808AC03619B4A66B384DD2EDE1E987D1B628E87630ED39
3,228,587 UART: Caliptra RT
3,228,838 UART: [state] CFI Enabled
3,347,727 UART: [rt] RT listening for mailbox commands...
3,348,397 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,077 UART: [rt]cmd =0x44504543, len=96
3,386,359 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,330 ready_for_fw is high
1,059,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,540 >>> mbox cmd response: success
2,741,257 UART:
2,741,273 UART: Running Caliptra FMC ...
2,741,681 UART:
2,741,735 UART: [state] CFI Enabled
2,752,189 UART: [fht] FMC Alias Private Key: 7
2,871,391 UART: [art] Extend RT PCRs Done
2,871,819 UART: [art] Lock RT PCRs Done
2,873,441 UART: [art] Populate DV Done
2,881,688 UART: [fht] FMC Alias Private Key: 7
2,882,834 UART: [art] Derive CDI
2,883,114 UART: [art] Store in slot 0x4
2,968,871 UART: [art] Derive Key Pair
2,969,231 UART: [art] Store priv key in slot 0x5
2,982,303 UART: [art] Derive Key Pair - Done
2,997,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,356 UART: [art] PUB.X = D6E0620492A691570D3447720D45DCA78581DB8663AEAB82C6948A8162DB407DCD0BFF054597F09426E339664EF327FA
3,020,109 UART: [art] PUB.Y = 2BE45304B2DD28DB2BFBF6595891E8F6C32032841CFD843B62FA6B85366793389EA6DB3528D625455E18E71901E4324B
3,027,051 UART: [art] SIG.R = 9AAF3A11EB7C8F1E689E93E93FBFF3B98BADCF9996D165DD929B4D37A1A27A650029037BEBADB14F8642937C7785D8CA
3,033,814 UART: [art] SIG.S = 207514E9F3BF9D1A7F2ECC04882C5221BE8E38929AA02E27F15890604EBD30076DE95ABECD3C2D869E6D18816C952A77
3,057,770 UART: Caliptra RT
3,058,021 UART: [state] CFI Enabled
3,177,421 UART: [rt] RT listening for mailbox commands...
3,178,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,567 UART: [rt]cmd =0x44504543, len=96
3,215,843 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,380 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
891,195 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,299 UART: [kat] ++
895,451 UART: [kat] sha1
899,543 UART: [kat] SHA2-256
901,483 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
915,680 UART: [kat] HMAC-384Kdf
920,208 UART: [kat] LMS
1,168,520 UART: [kat] --
1,169,035 UART: [cold-reset] ++
1,169,415 UART: [fht] FHT @ 0x50003400
1,172,047 UART: [idev] ++
1,172,215 UART: [idev] CDI.KEYID = 6
1,172,576 UART: [idev] SUBJECT.KEYID = 7
1,173,001 UART: [idev] UDS.KEYID = 0
1,173,347 ready_for_fw is high
1,173,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,788 UART: [idev] Erasing UDS.KEYID = 0
1,197,790 UART: [idev] Sha1 KeyId Algorithm
1,206,788 UART: [idev] --
1,207,865 UART: [ldev] ++
1,208,033 UART: [ldev] CDI.KEYID = 6
1,208,397 UART: [ldev] SUBJECT.KEYID = 5
1,208,824 UART: [ldev] AUTHORITY.KEYID = 7
1,209,287 UART: [ldev] FE.KEYID = 1
1,214,389 UART: [ldev] Erasing FE.KEYID = 1
1,240,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,353 UART: [ldev] --
1,279,796 UART: [fwproc] Wait for Commands...
1,280,483 UART: [fwproc] Recv command 0x46574c44
1,281,216 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,212 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,387 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,748 >>> mbox cmd response: success
2,824,882 UART: [afmc] ++
2,825,050 UART: [afmc] CDI.KEYID = 6
2,825,413 UART: [afmc] SUBJECT.KEYID = 7
2,825,839 UART: [afmc] AUTHORITY.KEYID = 5
2,860,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,080 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,790 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,671 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,372 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,039 UART: [afmc] --
2,904,098 UART: [cold-reset] --
2,904,856 UART: [state] Locking Datavault
2,906,075 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,679 UART: [state] Locking ICCM
2,907,301 UART: [exit] Launching FMC @ 0x40000130
2,912,631 UART:
2,912,647 UART: Running Caliptra FMC ...
2,913,055 UART:
2,913,198 UART: [state] CFI Enabled
2,923,986 UART: [fht] FMC Alias Private Key: 7
3,042,650 UART: [art] Extend RT PCRs Done
3,043,078 UART: [art] Lock RT PCRs Done
3,044,500 UART: [art] Populate DV Done
3,052,731 UART: [fht] FMC Alias Private Key: 7
3,053,685 UART: [art] Derive CDI
3,053,965 UART: [art] Store in slot 0x4
3,139,548 UART: [art] Derive Key Pair
3,139,908 UART: [art] Store priv key in slot 0x5
3,153,678 UART: [art] Derive Key Pair - Done
3,168,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,792 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,557 UART: [art] PUB.X = 8E68ADFE3D355896F5E6F936F414FBBB67BE9BCA81B975291C03088BEFB20BEAA4A17F2252AEAF8ACFEE0B4C61AD55E0
3,191,343 UART: [art] PUB.Y = BCE1F3C9D39F84F65E57FEF1ABCE7236DE1C0BD05542B7D884FB1F173C3165DE8C968C09827A2554BCA9559FAA37AACF
3,198,309 UART: [art] SIG.R = 5F217368FE9AD26437FB63A4FEFA63D6B3B23BF61FC4DF66E150FD8D62F177374D72ED8D942D592834E95180B7E9AB4C
3,205,091 UART: [art] SIG.S = DB9BC4B5DE7DCB06D0D1E8C7D4697D868851D4E4C882D48F358CF9B2F14DAC7B844D57C6F7C89AD11C8FB1F9DC7803E0
3,229,375 UART: Caliptra RT
3,229,718 UART: [state] CFI Enabled
3,348,668 UART: [rt] RT listening for mailbox commands...
3,349,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,536 UART: [rt]cmd =0x44504543, len=96
3,386,924 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,723 ready_for_fw is high
1,059,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,885 >>> mbox cmd response: success
2,742,284 UART:
2,742,300 UART: Running Caliptra FMC ...
2,742,708 UART:
2,742,851 UART: [state] CFI Enabled
2,753,767 UART: [fht] FMC Alias Private Key: 7
2,872,799 UART: [art] Extend RT PCRs Done
2,873,227 UART: [art] Lock RT PCRs Done
2,874,533 UART: [art] Populate DV Done
2,882,756 UART: [fht] FMC Alias Private Key: 7
2,883,766 UART: [art] Derive CDI
2,884,046 UART: [art] Store in slot 0x4
2,969,587 UART: [art] Derive Key Pair
2,969,947 UART: [art] Store priv key in slot 0x5
2,983,297 UART: [art] Derive Key Pair - Done
2,997,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,990 UART: [art] PUB.X = 7D8EF5E586100DE01058F1D89BA20997F137129F5F0F7849F7AD120132651648468F3C95ECCCB3779525EA134B0DB146
3,020,741 UART: [art] PUB.Y = FF6805538FB915A47D93429D0852E1590ACADE871C4DD40F317FE6F7EDCA0B17DF4C83A010C670E4C41AC44C6A46C43E
3,027,690 UART: [art] SIG.R = 353024D501F54299FA3BCCA95CFDF5A1C45ED528D0C4586A7D344E48F29319897772F1F409D297C70AFBA396CC76156F
3,034,455 UART: [art] SIG.S = 88FB5B2A6B07B7C2DE5D5D873EA0D4AFB518904FF5EE389032CEFCB801358FB1F47990B9D16A9422F4F645B8127703A3
3,058,172 UART: Caliptra RT
3,058,515 UART: [state] CFI Enabled
3,178,309 UART: [rt] RT listening for mailbox commands...
3,178,979 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,655 UART: [rt]cmd =0x44504543, len=96
3,217,121 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
893,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,307 UART: [kat] ++
897,459 UART: [kat] sha1
901,729 UART: [kat] SHA2-256
903,669 UART: [kat] SHA2-384
906,320 UART: [kat] SHA2-512-ACC
908,221 UART: [kat] ECC-384
918,002 UART: [kat] HMAC-384Kdf
922,560 UART: [kat] LMS
1,170,888 UART: [kat] --
1,171,779 UART: [cold-reset] ++
1,172,121 UART: [fht] FHT @ 0x50003400
1,174,930 UART: [idev] ++
1,175,098 UART: [idev] CDI.KEYID = 6
1,175,458 UART: [idev] SUBJECT.KEYID = 7
1,175,882 UART: [idev] UDS.KEYID = 0
1,176,227 ready_for_fw is high
1,176,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,682 UART: [idev] Erasing UDS.KEYID = 0
1,200,403 UART: [idev] Sha1 KeyId Algorithm
1,208,973 UART: [idev] --
1,210,045 UART: [ldev] ++
1,210,213 UART: [ldev] CDI.KEYID = 6
1,210,576 UART: [ldev] SUBJECT.KEYID = 5
1,211,002 UART: [ldev] AUTHORITY.KEYID = 7
1,211,465 UART: [ldev] FE.KEYID = 1
1,216,515 UART: [ldev] Erasing FE.KEYID = 1
1,242,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,171 UART: [ldev] --
1,281,588 UART: [fwproc] Wait for Commands...
1,282,224 UART: [fwproc] Recv command 0x46574c44
1,282,952 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,888 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,058 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,271 >>> mbox cmd response: success
2,826,421 UART: [afmc] ++
2,826,589 UART: [afmc] CDI.KEYID = 6
2,826,951 UART: [afmc] SUBJECT.KEYID = 7
2,827,376 UART: [afmc] AUTHORITY.KEYID = 5
2,862,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,516 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,264 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,973 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,856 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,557 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,585 UART: [afmc] --
2,905,713 UART: [cold-reset] --
2,906,613 UART: [state] Locking Datavault
2,908,092 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,696 UART: [state] Locking ICCM
2,909,220 UART: [exit] Launching FMC @ 0x40000130
2,914,550 UART:
2,914,566 UART: Running Caliptra FMC ...
2,914,974 UART:
2,915,028 UART: [state] CFI Enabled
2,925,324 UART: [fht] FMC Alias Private Key: 7
3,044,188 UART: [art] Extend RT PCRs Done
3,044,616 UART: [art] Lock RT PCRs Done
3,046,080 UART: [art] Populate DV Done
3,054,239 UART: [fht] FMC Alias Private Key: 7
3,055,403 UART: [art] Derive CDI
3,055,683 UART: [art] Store in slot 0x4
3,141,528 UART: [art] Derive Key Pair
3,141,888 UART: [art] Store priv key in slot 0x5
3,154,932 UART: [art] Derive Key Pair - Done
3,169,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,145 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,910 UART: [art] PUB.X = 090BBC3AD308D72136B0C7961D0958A7E5E527778B3669ABE4CF6F03D7C6F26E293DDD44D3A17F2DCAEF2B696B5775A2
3,192,677 UART: [art] PUB.Y = 9CCFA5C23CF6C23F864058FFB70DF7763E9256B08FF2C1C3F87435B6D3B7FC2D82B43B2C6D4E8F320935FC5735E08B6D
3,199,635 UART: [art] SIG.R = AE4F3316C72D86BCBC296D4D07CB9F27F59518107E3F0108FF9AD5DC7DE6EE34C43DA74BDDD3117EB3B0DD99E5A415AC
3,206,420 UART: [art] SIG.S = A6620C889B508E4611955F5A10E5A3B4F336AADD390D0E770047B8FC5B1E4CC2BCB260D0685CEDF65EACDCB8DA579EF4
3,230,641 UART: Caliptra RT
3,230,892 UART: [state] CFI Enabled
3,350,913 UART: [rt] RT listening for mailbox commands...
3,351,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,305 UART: [rt]cmd =0x44504543, len=96
3,389,411 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,297 ready_for_fw is high
1,060,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,032 >>> mbox cmd response: success
2,741,505 UART:
2,741,521 UART: Running Caliptra FMC ...
2,741,929 UART:
2,741,983 UART: [state] CFI Enabled
2,752,169 UART: [fht] FMC Alias Private Key: 7
2,871,513 UART: [art] Extend RT PCRs Done
2,871,941 UART: [art] Lock RT PCRs Done
2,873,463 UART: [art] Populate DV Done
2,881,692 UART: [fht] FMC Alias Private Key: 7
2,882,660 UART: [art] Derive CDI
2,882,940 UART: [art] Store in slot 0x4
2,969,125 UART: [art] Derive Key Pair
2,969,485 UART: [art] Store priv key in slot 0x5
2,982,859 UART: [art] Derive Key Pair - Done
2,997,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,279 UART: [art] PUB.X = E24672B33B4F1E2B4C20AFDA2E38633465119D1A792D4912024C4149D408FC4CDFC6A30E59F29E1780AFA1F1238785AF
3,020,044 UART: [art] PUB.Y = C4D81F0C22A4D01E4D0D7A36285D283098700CD5566380F7ABB2BA75E49633B1C6E534BEC2206448080226D6CCCAAE40
3,026,983 UART: [art] SIG.R = 31433A349958CEE98569A6D6409862F3ED3458878D9495B72D5B82E93586652663CED158DF7870AEBC3A8086F9028774
3,033,738 UART: [art] SIG.S = 2C87CA8A16E5BF4633C438480B876CD09C1ACB00C143A93D13785257A47D93A3AD04AE9CC95A53C290E04A5C60F428D4
3,057,254 UART: Caliptra RT
3,057,505 UART: [state] CFI Enabled
3,177,872 UART: [rt] RT listening for mailbox commands...
3,178,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,058 UART: [rt]cmd =0x44504543, len=96
3,216,514 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
893,719 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,844 UART: [kat] ++
897,996 UART: [kat] sha1
902,232 UART: [kat] SHA2-256
904,172 UART: [kat] SHA2-384
907,009 UART: [kat] SHA2-512-ACC
908,910 UART: [kat] ECC-384
918,717 UART: [kat] HMAC-384Kdf
923,259 UART: [kat] LMS
1,171,587 UART: [kat] --
1,172,596 UART: [cold-reset] ++
1,173,042 UART: [fht] FHT @ 0x50003400
1,175,567 UART: [idev] ++
1,175,735 UART: [idev] CDI.KEYID = 6
1,176,095 UART: [idev] SUBJECT.KEYID = 7
1,176,519 UART: [idev] UDS.KEYID = 0
1,176,864 ready_for_fw is high
1,176,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,657 UART: [idev] Erasing UDS.KEYID = 0
1,201,906 UART: [idev] Sha1 KeyId Algorithm
1,210,396 UART: [idev] --
1,211,510 UART: [ldev] ++
1,211,678 UART: [ldev] CDI.KEYID = 6
1,212,041 UART: [ldev] SUBJECT.KEYID = 5
1,212,467 UART: [ldev] AUTHORITY.KEYID = 7
1,212,930 UART: [ldev] FE.KEYID = 1
1,218,232 UART: [ldev] Erasing FE.KEYID = 1
1,244,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,876 UART: [ldev] --
1,284,265 UART: [fwproc] Wait for Commands...
1,284,925 UART: [fwproc] Recv command 0x46574c44
1,285,653 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,513 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,683 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,034 >>> mbox cmd response: success
2,830,100 UART: [afmc] ++
2,830,268 UART: [afmc] CDI.KEYID = 6
2,830,630 UART: [afmc] SUBJECT.KEYID = 7
2,831,055 UART: [afmc] AUTHORITY.KEYID = 5
2,867,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,845 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,554 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,437 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,138 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,150 UART: [afmc] --
2,911,104 UART: [cold-reset] --
2,911,708 UART: [state] Locking Datavault
2,912,785 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,389 UART: [state] Locking ICCM
2,913,941 UART: [exit] Launching FMC @ 0x40000130
2,919,271 UART:
2,919,287 UART: Running Caliptra FMC ...
2,919,695 UART:
2,919,838 UART: [state] CFI Enabled
2,930,466 UART: [fht] FMC Alias Private Key: 7
3,048,984 UART: [art] Extend RT PCRs Done
3,049,412 UART: [art] Lock RT PCRs Done
3,051,228 UART: [art] Populate DV Done
3,059,611 UART: [fht] FMC Alias Private Key: 7
3,060,561 UART: [art] Derive CDI
3,060,841 UART: [art] Store in slot 0x4
3,146,620 UART: [art] Derive Key Pair
3,146,980 UART: [art] Store priv key in slot 0x5
3,160,452 UART: [art] Derive Key Pair - Done
3,174,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,351 UART: [art] PUB.X = 54AEE44094430818913589F814591DE5ED78946A3242D7B87FC634B5E37E122AB2D2D61FF642B547A438370BA799ACDF
3,198,113 UART: [art] PUB.Y = 6BD411053B35C585A20286E3C87EDB451FD1CDC14798B8841C269956EBFE2630BF7348530B5A58C59826FCBBCC79D5FC
3,205,062 UART: [art] SIG.R = 5F6AE701805319B73BFB9D643D1CFFA528653D94EA81673452DEFB07AB6F33594C81A14C4F536BDF683EEA8A3E5DB079
3,211,838 UART: [art] SIG.S = A764EFBE5F9682F5784132DE74EB854958EEBDD826A0EDA0B8652805059975A49C15B45BB739A4E2426412100D582199
3,235,769 UART: Caliptra RT
3,236,112 UART: [state] CFI Enabled
3,355,894 UART: [rt] RT listening for mailbox commands...
3,356,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,094 UART: [rt]cmd =0x44504543, len=96
3,394,160 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,416 ready_for_fw is high
1,060,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,749 >>> mbox cmd response: success
2,742,458 UART:
2,742,474 UART: Running Caliptra FMC ...
2,742,882 UART:
2,743,025 UART: [state] CFI Enabled
2,753,261 UART: [fht] FMC Alias Private Key: 7
2,872,637 UART: [art] Extend RT PCRs Done
2,873,065 UART: [art] Lock RT PCRs Done
2,874,521 UART: [art] Populate DV Done
2,882,576 UART: [fht] FMC Alias Private Key: 7
2,883,656 UART: [art] Derive CDI
2,883,936 UART: [art] Store in slot 0x4
2,969,985 UART: [art] Derive Key Pair
2,970,345 UART: [art] Store priv key in slot 0x5
2,984,199 UART: [art] Derive Key Pair - Done
2,999,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,419 UART: [art] PUB.X = EB13E5D1C9DBC364DDC08167EC0B2C5793AF531A167736CE1F1BFFC329296622F594268C6DB88C5C289A319EC3598193
3,022,192 UART: [art] PUB.Y = 3AB3DD4EBBE7E08B2EDC06D9C45F30E982AE60F23442042D520F1D8DF167BC21EF8D49E18440F116F45DE0FC0C1E383E
3,029,148 UART: [art] SIG.R = 3B4D2D71683D4FA0BB77325005151F2BCB754E986C42E20BBCFC3737344FFBCFAE6554A4B6035908F4E4EC01360FD8CA
3,035,912 UART: [art] SIG.S = 8CCFD3CBF4A60912B7430AC9ADCD414ACCF38F9BEB85B342D2F5C0874EEAAADBF13D5EBFA6F93870705C372554226F8E
3,059,394 UART: Caliptra RT
3,059,737 UART: [state] CFI Enabled
3,179,503 UART: [rt] RT listening for mailbox commands...
3,180,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,723 UART: [rt]cmd =0x44504543, len=96
3,218,069 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,131 UART:
192,495 UART: Running Caliptra ROM ...
193,682 UART:
193,839 UART: [state] CFI Enabled
265,908 UART: [state] LifecycleState = Unprovisioned
267,847 UART: [state] DebugLocked = No
269,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,704 UART: [kat] SHA2-256
443,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,896 UART: [kat] ++
454,375 UART: [kat] sha1
464,710 UART: [kat] SHA2-256
467,412 UART: [kat] SHA2-384
473,553 UART: [kat] SHA2-512-ACC
475,924 UART: [kat] ECC-384
2,767,452 UART: [kat] HMAC-384Kdf
2,800,001 UART: [kat] LMS
3,990,373 UART: [kat] --
3,995,100 UART: [cold-reset] ++
3,996,464 UART: [fht] Storing FHT @ 0x50003400
4,007,301 UART: [idev] ++
4,007,901 UART: [idev] CDI.KEYID = 6
4,008,830 UART: [idev] SUBJECT.KEYID = 7
4,010,010 UART: [idev] UDS.KEYID = 0
4,011,128 ready_for_fw is high
4,011,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,478 UART: [idev] Erasing UDS.KEYID = 0
7,345,503 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,225 UART: [idev] --
7,372,300 UART: [ldev] ++
7,372,870 UART: [ldev] CDI.KEYID = 6
7,373,833 UART: [ldev] SUBJECT.KEYID = 5
7,375,049 UART: [ldev] AUTHORITY.KEYID = 7
7,376,288 UART: [ldev] FE.KEYID = 1
7,403,513 UART: [ldev] Erasing FE.KEYID = 1
10,738,455 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,846 UART: [ldev] --
13,119,987 UART: [fwproc] Waiting for Commands...
13,122,623 UART: [fwproc] Received command 0x46574c44
13,124,808 UART: [fwproc] Received Image of size 118548 bytes
17,228,245 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,712 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,879 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,220 >>> mbox cmd response: success
17,709,814 UART: [afmc] ++
17,710,430 UART: [afmc] CDI.KEYID = 6
17,711,342 UART: [afmc] SUBJECT.KEYID = 7
17,712,561 UART: [afmc] AUTHORITY.KEYID = 5
21,072,690 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,375,354 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,377,614 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,392,068 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,406,774 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,421,179 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,442,570 UART: [afmc] --
23,446,601 UART: [cold-reset] --
23,450,192 UART: [state] Locking Datavault
23,455,116 UART: [state] Locking PCR0, PCR1 and PCR31
23,456,814 UART: [state] Locking ICCM
23,459,372 UART: [exit] Launching FMC @ 0x40000130
23,467,776 UART:
23,468,021 UART: Running Caliptra FMC ...
23,469,125 UART:
23,469,289 UART: [state] CFI Enabled
23,534,793 UART: [fht] FMC Alias Private Key: 7
25,875,044 UART: [art] Extend RT PCRs Done
25,876,287 UART: [art] Lock RT PCRs Done
25,877,683 UART: [art] Populate DV Done
25,882,934 UART: [fht] FMC Alias Private Key: 7
25,884,577 UART: [art] Derive CDI
25,885,308 UART: [art] Store in slot 0x4
25,943,004 UART: [art] Derive Key Pair
25,944,053 UART: [art] Store priv key in slot 0x5
29,237,125 UART: [art] Derive Key Pair - Done
29,249,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,181 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,688 UART: [art] PUB.X = 5E028036B0B0ED76789B21EAAE6065045227524DA2BACF100A7A7C4D3EDEC723FBB252A8DD07AECFF557DD191E55D533
31,546,952 UART: [art] PUB.Y = 9CD222BCFDE1FFE052E8EA5E4ED169532BC42F7DF70DD9E6A5118EA31ECC3D74A326294DE8042CAE044DB9F460325323
31,554,256 UART: [art] SIG.R = 79012FEFF9A12B4FD02EC7A156ADFDDE179FD7D408FD2EA9C0FAC0F5F6E6F35E787979D1F69FECDD3E6ED82E34403108
31,561,670 UART: [art] SIG.S = 328BE0FEA330B4BC9922EAB552A44F2E2D1F62B17724BB4D1CCADF472D499335B8444990C4E32947D3100A7C56B202A5
32,866,856 UART: Caliptra RT
32,867,589 UART: [state] CFI Enabled
33,042,363 UART: [rt] RT listening for mailbox commands...
33,044,260 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,075,236 UART: [rt]cmd =0x4d454153, len=108
33,093,959 >>> mbox cmd response data (12 bytes)
33,094,510 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,125,170 UART: [rt]cmd =0x4d454153, len=108
33,143,213 >>> mbox cmd response data (12 bytes)
33,143,652 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,174,456 UART: [rt]cmd =0x4d454153, len=108
33,193,772 >>> mbox cmd response data (12 bytes)
33,194,233 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,224,772 UART: [rt]cmd =0x4d454153, len=108
33,243,221 >>> mbox cmd response data (12 bytes)
33,243,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,274,297 UART: [rt]cmd =0x4d454153, len=108
33,292,678 >>> mbox cmd response data (12 bytes)
33,293,105 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,323,749 UART: [rt]cmd =0x4d454153, len=108
33,341,822 >>> mbox cmd response data (12 bytes)
33,342,284 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,372,876 UART: [rt]cmd =0x4d454153, len=108
33,391,962 >>> mbox cmd response data (12 bytes)
33,392,382 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,423,042 UART: [rt]cmd =0x4d454153, len=108
33,442,438 >>> mbox cmd response data (12 bytes)
33,442,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,473,399 UART: [rt]cmd =0x4d454153, len=108
33,491,460 >>> mbox cmd response data (12 bytes)
33,491,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,522,483 UART: [rt]cmd =0x4d454153, len=108
33,540,855 >>> mbox cmd response data (12 bytes)
33,541,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,571,848 UART: [rt]cmd =0x4d454153, len=108
33,590,569 >>> mbox cmd response data (12 bytes)
33,591,023 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,621,834 UART: [rt]cmd =0x4d454153, len=108
33,640,814 >>> mbox cmd response data (12 bytes)
33,641,234 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,671,778 UART: [rt]cmd =0x4d454153, len=108
33,691,446 >>> mbox cmd response data (12 bytes)
33,691,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,722,523 UART: [rt]cmd =0x4d454153, len=108
33,741,185 >>> mbox cmd response data (12 bytes)
33,741,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,772,392 UART: [rt]cmd =0x4d454153, len=108
33,774,729 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,786,233 ready_for_fw is high
3,786,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,975,478 >>> mbox cmd response: success
23,686,604 UART:
23,687,011 UART: Running Caliptra FMC ...
23,688,156 UART:
23,688,319 UART: [state] CFI Enabled
23,754,984 UART: [fht] FMC Alias Private Key: 7
26,094,934 UART: [art] Extend RT PCRs Done
26,096,174 UART: [art] Lock RT PCRs Done
26,097,965 UART: [art] Populate DV Done
26,103,446 UART: [fht] FMC Alias Private Key: 7
26,105,097 UART: [art] Derive CDI
26,105,920 UART: [art] Store in slot 0x4
26,162,748 UART: [art] Derive Key Pair
26,163,749 UART: [art] Store priv key in slot 0x5
29,456,726 UART: [art] Derive Key Pair - Done
29,469,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,757,501 UART: [art] Erasing AUTHORITY.KEYID = 7
31,759,030 UART: [art] PUB.X = 3B4ECEFB641FA1450B6932F8DF34EBD66257E4B072734E34C95E9D45DB02FAD70C651BE2A5FEF676525AE899245DD105
31,766,891 UART: [art] PUB.Y = C6B8B304E5950515739234D6962009A1BC8A029B09032D42EB1A073C2179C9F712093C14928F59B57269477EA8ECC12F
31,773,540 UART: [art] SIG.R = 7F3F9D3AD0F1852C5D0534F1D099E9D9EC0EABAD140DE13F2CEC4AFFFC27495B456FC02AA954BA3E6CBB7AC309D7D71A
31,780,959 UART: [art] SIG.S = 91F6C86FBEC4EA29A102F6F25A5AEE8DA8FFE447330380381F125A65B7F44DCAC4772F0F9CD9D01A13A6CE7FFAD1A4AA
33,086,243 UART: Caliptra RT
33,086,951 UART: [state] CFI Enabled
33,262,130 UART: [rt] RT listening for mailbox commands...
33,264,046 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,294,718 UART: [rt]cmd =0x4d454153, len=108
33,312,764 >>> mbox cmd response data (12 bytes)
33,313,291 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,343,995 UART: [rt]cmd =0x4d454153, len=108
33,362,971 >>> mbox cmd response data (12 bytes)
33,363,395 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,393,785 UART: [rt]cmd =0x4d454153, len=108
33,411,882 >>> mbox cmd response data (12 bytes)
33,412,341 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,443,198 UART: [rt]cmd =0x4d454153, len=108
33,461,212 >>> mbox cmd response data (12 bytes)
33,461,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,492,216 UART: [rt]cmd =0x4d454153, len=108
33,510,727 >>> mbox cmd response data (12 bytes)
33,511,164 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,541,814 UART: [rt]cmd =0x4d454153, len=108
33,560,240 >>> mbox cmd response data (12 bytes)
33,560,667 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,591,257 UART: [rt]cmd =0x4d454153, len=108
33,609,431 >>> mbox cmd response data (12 bytes)
33,609,897 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,640,551 UART: [rt]cmd =0x4d454153, len=108
33,659,858 >>> mbox cmd response data (12 bytes)
33,660,281 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,690,847 UART: [rt]cmd =0x4d454153, len=108
33,709,754 >>> mbox cmd response data (12 bytes)
33,710,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,740,722 UART: [rt]cmd =0x4d454153, len=108
33,760,506 >>> mbox cmd response data (12 bytes)
33,760,923 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,791,568 UART: [rt]cmd =0x4d454153, len=108
33,811,052 >>> mbox cmd response data (12 bytes)
33,811,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,842,071 UART: [rt]cmd =0x4d454153, len=108
33,860,192 >>> mbox cmd response data (12 bytes)
33,860,659 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,891,306 UART: [rt]cmd =0x4d454153, len=108
33,910,008 >>> mbox cmd response data (12 bytes)
33,910,434 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,941,028 UART: [rt]cmd =0x4d454153, len=108
33,960,010 >>> mbox cmd response data (12 bytes)
33,960,443 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,991,086 UART: [rt]cmd =0x4d454153, len=108
33,993,468 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,463 UART:
192,824 UART: Running Caliptra ROM ...
194,004 UART:
603,486 UART: [state] CFI Enabled
616,879 UART: [state] LifecycleState = Unprovisioned
618,865 UART: [state] DebugLocked = No
621,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,775 UART: [kat] SHA2-256
796,518 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,039 UART: [kat] ++
807,524 UART: [kat] sha1
817,136 UART: [kat] SHA2-256
819,900 UART: [kat] SHA2-384
825,822 UART: [kat] SHA2-512-ACC
828,182 UART: [kat] ECC-384
3,113,786 UART: [kat] HMAC-384Kdf
3,124,739 UART: [kat] LMS
4,314,870 UART: [kat] --
4,318,900 UART: [cold-reset] ++
4,321,479 UART: [fht] Storing FHT @ 0x50003400
4,332,128 UART: [idev] ++
4,332,731 UART: [idev] CDI.KEYID = 6
4,333,644 UART: [idev] SUBJECT.KEYID = 7
4,334,887 UART: [idev] UDS.KEYID = 0
4,335,935 ready_for_fw is high
4,336,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,859 UART: [idev] Erasing UDS.KEYID = 0
7,624,250 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,390 UART: [idev] --
7,649,731 UART: [ldev] ++
7,650,350 UART: [ldev] CDI.KEYID = 6
7,651,303 UART: [ldev] SUBJECT.KEYID = 5
7,652,518 UART: [ldev] AUTHORITY.KEYID = 7
7,653,743 UART: [ldev] FE.KEYID = 1
7,665,569 UART: [ldev] Erasing FE.KEYID = 1
10,952,520 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,151 UART: [ldev] --
13,313,501 UART: [fwproc] Waiting for Commands...
13,316,294 UART: [fwproc] Received command 0x46574c44
13,318,471 UART: [fwproc] Received Image of size 118548 bytes
17,421,876 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,097 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,272 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,668 >>> mbox cmd response: success
17,909,224 UART: [afmc] ++
17,909,837 UART: [afmc] CDI.KEYID = 6
17,910,719 UART: [afmc] SUBJECT.KEYID = 7
17,911,985 UART: [afmc] AUTHORITY.KEYID = 5
21,228,174 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,521,858 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,109 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,538,578 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,553,286 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,567,655 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,758 UART: [afmc] --
23,593,474 UART: [cold-reset] --
23,598,622 UART: [state] Locking Datavault
23,603,368 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,055 UART: [state] Locking ICCM
23,606,870 UART: [exit] Launching FMC @ 0x40000130
23,615,258 UART:
23,615,564 UART: Running Caliptra FMC ...
23,616,596 UART:
23,616,741 UART: [state] CFI Enabled
23,624,809 UART: [fht] FMC Alias Private Key: 7
25,964,823 UART: [art] Extend RT PCRs Done
25,966,040 UART: [art] Lock RT PCRs Done
25,967,637 UART: [art] Populate DV Done
25,973,308 UART: [fht] FMC Alias Private Key: 7
25,974,836 UART: [art] Derive CDI
25,975,562 UART: [art] Store in slot 0x4
26,017,927 UART: [art] Derive Key Pair
26,018,969 UART: [art] Store priv key in slot 0x5
29,261,265 UART: [art] Derive Key Pair - Done
29,274,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,815 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,338 UART: [art] PUB.X = 3A61F7DFCB8D56FB868A079AD8AA1A242FE433DCC02738067768A78B792D952CC5E75EC80405E1C7209A66327C292699
31,563,552 UART: [art] PUB.Y = 1ECA55D38DEFBDFE9DCD0C65B7E01C58A6479E294BA5546C82542C749642C90FAED6E4A8FA07B1707E81D7FBF1C5EA5C
31,570,844 UART: [art] SIG.R = EDCF2E3158531C3906E1D1815BDA3E058FB69B135D9D06E84565AC96426B068F6B35540115B7A0E6E16D19FA67093943
31,578,235 UART: [art] SIG.S = 7B009BED121F801DE523430CE221E6FAF7FFDDB43E9454EDBC645123CD471B67FF876AA201D8FD9C326D4214E7BB5435
32,883,229 UART: Caliptra RT
32,883,943 UART: [state] CFI Enabled
33,017,155 UART: [rt] RT listening for mailbox commands...
33,019,063 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,049,678 UART: [rt]cmd =0x4d454153, len=108
33,068,106 >>> mbox cmd response data (12 bytes)
33,068,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,099,171 UART: [rt]cmd =0x4d454153, len=108
33,118,093 >>> mbox cmd response data (12 bytes)
33,118,517 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,149,116 UART: [rt]cmd =0x4d454153, len=108
33,167,554 >>> mbox cmd response data (12 bytes)
33,167,988 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,198,845 UART: [rt]cmd =0x4d454153, len=108
33,217,453 >>> mbox cmd response data (12 bytes)
33,217,914 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,248,392 UART: [rt]cmd =0x4d454153, len=108
33,267,640 >>> mbox cmd response data (12 bytes)
33,268,061 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,298,714 UART: [rt]cmd =0x4d454153, len=108
33,317,453 >>> mbox cmd response data (12 bytes)
33,317,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,348,621 UART: [rt]cmd =0x4d454153, len=108
33,367,275 >>> mbox cmd response data (12 bytes)
33,367,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,398,204 UART: [rt]cmd =0x4d454153, len=108
33,417,430 >>> mbox cmd response data (12 bytes)
33,417,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,448,682 UART: [rt]cmd =0x4d454153, len=108
33,468,233 >>> mbox cmd response data (12 bytes)
33,468,666 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,499,243 UART: [rt]cmd =0x4d454153, len=108
33,518,057 >>> mbox cmd response data (12 bytes)
33,518,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,549,279 UART: [rt]cmd =0x4d454153, len=108
33,568,400 >>> mbox cmd response data (12 bytes)
33,568,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,599,626 UART: [rt]cmd =0x4d454153, len=108
33,618,496 >>> mbox cmd response data (12 bytes)
33,618,952 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,649,698 UART: [rt]cmd =0x4d454153, len=108
33,668,946 >>> mbox cmd response data (12 bytes)
33,669,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,700,054 UART: [rt]cmd =0x4d454153, len=108
33,719,228 >>> mbox cmd response data (12 bytes)
33,719,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,750,012 UART: [rt]cmd =0x4d454153, len=108
33,752,553 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,124,166 ready_for_fw is high
4,124,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,145,946 >>> mbox cmd response: success
23,782,578 UART:
23,782,971 UART: Running Caliptra FMC ...
23,784,115 UART:
23,784,269 UART: [state] CFI Enabled
23,791,894 UART: [fht] FMC Alias Private Key: 7
26,131,864 UART: [art] Extend RT PCRs Done
26,133,091 UART: [art] Lock RT PCRs Done
26,134,453 UART: [art] Populate DV Done
26,140,043 UART: [fht] FMC Alias Private Key: 7
26,141,745 UART: [art] Derive CDI
26,142,555 UART: [art] Store in slot 0x4
26,185,415 UART: [art] Derive Key Pair
26,186,408 UART: [art] Store priv key in slot 0x5
29,428,819 UART: [art] Derive Key Pair - Done
29,441,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,406 UART: [art] Erasing AUTHORITY.KEYID = 7
31,723,920 UART: [art] PUB.X = 9120184B70C2E4D262296FF0432B51E21BAA2C37A8F15D1C2EC366BCB905A4B04C142C0DFDDE064B52AE8751148C437B
31,731,224 UART: [art] PUB.Y = 55B317BC2A74751B875ECA30A7FAFD9B2A4FF0C8135EB4AF1CAFCF7506CF3D998984FEEF84B33462D1EB7E0261403F2E
31,738,517 UART: [art] SIG.R = 5573962850C70A5C4498C4E67925F068553F71EED3A4CDA00382F325F74F25966E394F5D6BCFD1BEBB3819730C0DDD2A
31,745,877 UART: [art] SIG.S = EC5DC837B6F073866DD532622E104D05DC007F9C015201F47EABF21D9B97BF73FE5DAC168B6A79D69E45559CDD835361
33,050,752 UART: Caliptra RT
33,051,457 UART: [state] CFI Enabled
33,184,793 UART: [rt] RT listening for mailbox commands...
33,186,680 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,217,514 UART: [rt]cmd =0x4d454153, len=108
33,236,445 >>> mbox cmd response data (12 bytes)
33,236,965 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,267,680 UART: [rt]cmd =0x4d454153, len=108
33,286,268 >>> mbox cmd response data (12 bytes)
33,286,705 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,317,126 UART: [rt]cmd =0x4d454153, len=108
33,336,620 >>> mbox cmd response data (12 bytes)
33,337,105 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,367,590 UART: [rt]cmd =0x4d454153, len=108
33,386,360 >>> mbox cmd response data (12 bytes)
33,386,782 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,417,392 UART: [rt]cmd =0x4d454153, len=108
33,436,722 >>> mbox cmd response data (12 bytes)
33,437,174 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,467,706 UART: [rt]cmd =0x4d454153, len=108
33,486,271 >>> mbox cmd response data (12 bytes)
33,486,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,517,238 UART: [rt]cmd =0x4d454153, len=108
33,536,526 >>> mbox cmd response data (12 bytes)
33,536,959 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,567,598 UART: [rt]cmd =0x4d454153, len=108
33,586,205 >>> mbox cmd response data (12 bytes)
33,586,660 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,617,243 UART: [rt]cmd =0x4d454153, len=108
33,636,005 >>> mbox cmd response data (12 bytes)
33,636,431 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,666,862 UART: [rt]cmd =0x4d454153, len=108
33,685,171 >>> mbox cmd response data (12 bytes)
33,685,596 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,716,392 UART: [rt]cmd =0x4d454153, len=108
33,735,048 >>> mbox cmd response data (12 bytes)
33,735,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,766,271 UART: [rt]cmd =0x4d454153, len=108
33,785,090 >>> mbox cmd response data (12 bytes)
33,785,505 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,816,311 UART: [rt]cmd =0x4d454153, len=108
33,834,835 >>> mbox cmd response data (12 bytes)
33,835,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,865,998 UART: [rt]cmd =0x4d454153, len=108
33,885,082 >>> mbox cmd response data (12 bytes)
33,885,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,916,096 UART: [rt]cmd =0x4d454153, len=108
33,918,466 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,007 UART:
192,383 UART: Running Caliptra ROM ...
193,548 UART:
193,694 UART: [state] CFI Enabled
268,486 UART: [state] LifecycleState = Unprovisioned
270,492 UART: [state] DebugLocked = No
273,089 UART: [state] WD Timer not started. Device not locked for debugging
277,057 UART: [kat] SHA2-256
456,756 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
467,493 UART: [kat] ++
468,095 UART: [kat] sha1
479,830 UART: [kat] SHA2-256
482,544 UART: [kat] SHA2-384
488,400 UART: [kat] SHA2-512-ACC
490,742 UART: [kat] ECC-384
2,947,810 UART: [kat] HMAC-384Kdf
2,973,625 UART: [kat] LMS
3,450,093 UART: [kat] --
3,454,465 UART: [cold-reset] ++
3,456,325 UART: [fht] FHT @ 0x50003400
3,467,512 UART: [idev] ++
3,468,074 UART: [idev] CDI.KEYID = 6
3,469,052 UART: [idev] SUBJECT.KEYID = 7
3,470,293 UART: [idev] UDS.KEYID = 0
3,471,214 ready_for_fw is high
3,471,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,470 UART: [idev] Erasing UDS.KEYID = 0
5,989,945 UART: [idev] Sha1 KeyId Algorithm
6,013,390 UART: [idev] --
6,018,228 UART: [ldev] ++
6,018,801 UART: [ldev] CDI.KEYID = 6
6,019,705 UART: [ldev] SUBJECT.KEYID = 5
6,020,914 UART: [ldev] AUTHORITY.KEYID = 7
6,022,193 UART: [ldev] FE.KEYID = 1
6,060,182 UART: [ldev] Erasing FE.KEYID = 1
8,569,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,576 UART: [ldev] --
10,377,938 UART: [fwproc] Wait for Commands...
10,380,886 UART: [fwproc] Recv command 0x46574c44
10,382,861 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,894 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,018,908 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,256 >>> mbox cmd response: success
14,350,591 UART: [afmc] ++
14,351,208 UART: [afmc] CDI.KEYID = 6
14,352,144 UART: [afmc] SUBJECT.KEYID = 7
14,353,309 UART: [afmc] AUTHORITY.KEYID = 5
16,899,741 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,643,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,645,775 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,661,589 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,677,648 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,693,201 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,717,391 UART: [afmc] --
18,720,929 UART: [cold-reset] --
18,724,190 UART: [state] Locking Datavault
18,731,219 UART: [state] Locking PCR0, PCR1 and PCR31
18,733,014 UART: [state] Locking ICCM
18,734,197 UART: [exit] Launching FMC @ 0x40000130
18,742,645 UART:
18,742,877 UART: Running Caliptra FMC ...
18,743,997 UART:
18,744,164 UART: [state] CFI Enabled
18,799,598 UART: [fht] FMC Alias Private Key: 7
20,566,386 UART: [art] Extend RT PCRs Done
20,567,616 UART: [art] Lock RT PCRs Done
20,569,399 UART: [art] Populate DV Done
20,574,936 UART: [fht] FMC Alias Private Key: 7
20,576,637 UART: [art] Derive CDI
20,577,454 UART: [art] Store in slot 0x4
20,632,986 UART: [art] Derive Key Pair
20,633,987 UART: [art] Store priv key in slot 0x5
23,096,900 UART: [art] Derive Key Pair - Done
23,110,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,822,389 UART: [art] Erasing AUTHORITY.KEYID = 7
24,823,874 UART: [art] PUB.X = A4FA5CD991BEBB3D9987D90C5C0CF775AC82558198CF109E06FF141F2977F0435F2FBFB0292DB471139CD085A2470443
24,831,170 UART: [art] PUB.Y = FEEFA6BE57CB79AC4D3405A877C515E93AE79B49A34543E5BE2189848762116A91FC2AC0A08D2F05FE2E1A208E90CA62
24,838,424 UART: [art] SIG.R = 16184B8432422D9607E8AA659EC481CC6436DED15201660A0F4FAED5A3A6975D775EE9418F17A3D4B244A1F97BE5896C
24,845,818 UART: [art] SIG.S = 6135705693A6DD58B277439E47FAD5B2D89A6731FE8E97E70FA84BF0AAF418952C3B437E094B14F18C89772FF95EF2D7
25,824,577 UART: Caliptra RT
25,825,282 UART: [state] CFI Enabled
26,006,931 UART: [rt] RT listening for mailbox commands...
26,008,939 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,039,549 UART: [rt]cmd =0x4d454153, len=108
26,057,782 >>> mbox cmd response data (12 bytes)
26,058,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,088,883 UART: [rt]cmd =0x4d454153, len=108
26,106,927 >>> mbox cmd response data (12 bytes)
26,107,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,138,064 UART: [rt]cmd =0x4d454153, len=108
26,156,293 >>> mbox cmd response data (12 bytes)
26,156,718 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,187,426 UART: [rt]cmd =0x4d454153, len=108
26,205,866 >>> mbox cmd response data (12 bytes)
26,206,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,236,781 UART: [rt]cmd =0x4d454153, len=108
26,256,251 >>> mbox cmd response data (12 bytes)
26,256,711 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,287,353 UART: [rt]cmd =0x4d454153, len=108
26,305,307 >>> mbox cmd response data (12 bytes)
26,305,727 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,336,325 UART: [rt]cmd =0x4d454153, len=108
26,355,010 >>> mbox cmd response data (12 bytes)
26,355,446 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,386,192 UART: [rt]cmd =0x4d454153, len=108
26,404,630 >>> mbox cmd response data (12 bytes)
26,405,043 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,435,745 UART: [rt]cmd =0x4d454153, len=108
26,454,541 >>> mbox cmd response data (12 bytes)
26,454,985 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,485,461 UART: [rt]cmd =0x4d454153, len=108
26,504,345 >>> mbox cmd response data (12 bytes)
26,504,810 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,535,451 UART: [rt]cmd =0x4d454153, len=108
26,554,646 >>> mbox cmd response data (12 bytes)
26,555,066 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,585,562 UART: [rt]cmd =0x4d454153, len=108
26,604,468 >>> mbox cmd response data (12 bytes)
26,604,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,635,602 UART: [rt]cmd =0x4d454153, len=108
26,654,227 >>> mbox cmd response data (12 bytes)
26,654,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,685,172 UART: [rt]cmd =0x4d454153, len=108
26,704,368 >>> mbox cmd response data (12 bytes)
26,704,790 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,735,458 UART: [rt]cmd =0x4d454153, len=108
26,737,878 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
3,462,582 ready_for_fw is high
3,463,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,246,803 >>> mbox cmd response: success
18,535,396 UART:
18,535,781 UART: Running Caliptra FMC ...
18,536,972 UART:
18,537,138 UART: [state] CFI Enabled
18,604,367 UART: [fht] FMC Alias Private Key: 7
20,370,114 UART: [art] Extend RT PCRs Done
20,371,336 UART: [art] Lock RT PCRs Done
20,373,233 UART: [art] Populate DV Done
20,378,868 UART: [fht] FMC Alias Private Key: 7
20,380,623 UART: [art] Derive CDI
20,381,434 UART: [art] Store in slot 0x4
20,437,038 UART: [art] Derive Key Pair
20,438,082 UART: [art] Store priv key in slot 0x5
22,901,356 UART: [art] Derive Key Pair - Done
22,914,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,832 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,337 UART: [art] PUB.X = 4B03FC40BD65531616D785154806556D1AC0C2970CE6A8144668545EB680738F7F238B7BF130B522D354898F7FC30F90
24,635,543 UART: [art] PUB.Y = D67F6FFA0C4C5FC3FD8D24C0FC1AD6A98BB52BD7B259C10500567B824B89882D65940433AD7C9C1E8D5ADA43247EA6F2
24,642,777 UART: [art] SIG.R = 32F19E0F54271DF9891FED0EB6304FD764B93E0D1163FF06886151F52859A2F51D249CFAE1A72FAA053C89A3170B7CAA
24,650,184 UART: [art] SIG.S = 3EBAC4535FE121FDCABB6F5139AB0139E95D61E02E9CC6456688FFAD63DACE13CD9E54DFF83D45B149F2474E24017921
25,629,336 UART: Caliptra RT
25,630,051 UART: [state] CFI Enabled
25,810,226 UART: [rt] RT listening for mailbox commands...
25,812,110 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,843,041 UART: [rt]cmd =0x4d454153, len=108
25,862,164 >>> mbox cmd response data (12 bytes)
25,862,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,893,571 UART: [rt]cmd =0x4d454153, len=108
25,912,545 >>> mbox cmd response data (12 bytes)
25,912,980 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,943,472 UART: [rt]cmd =0x4d454153, len=108
25,962,922 >>> mbox cmd response data (12 bytes)
25,963,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,994,114 UART: [rt]cmd =0x4d454153, len=108
26,012,401 >>> mbox cmd response data (12 bytes)
26,012,859 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,043,456 UART: [rt]cmd =0x4d454153, len=108
26,062,620 >>> mbox cmd response data (12 bytes)
26,063,063 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,093,996 UART: [rt]cmd =0x4d454153, len=108
26,112,787 >>> mbox cmd response data (12 bytes)
26,113,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,143,695 UART: [rt]cmd =0x4d454153, len=108
26,162,375 >>> mbox cmd response data (12 bytes)
26,162,837 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,193,721 UART: [rt]cmd =0x4d454153, len=108
26,212,539 >>> mbox cmd response data (12 bytes)
26,212,965 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,243,455 UART: [rt]cmd =0x4d454153, len=108
26,262,137 >>> mbox cmd response data (12 bytes)
26,262,565 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,293,313 UART: [rt]cmd =0x4d454153, len=108
26,312,017 >>> mbox cmd response data (12 bytes)
26,312,435 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,342,928 UART: [rt]cmd =0x4d454153, len=108
26,361,885 >>> mbox cmd response data (12 bytes)
26,362,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,392,842 UART: [rt]cmd =0x4d454153, len=108
26,411,934 >>> mbox cmd response data (12 bytes)
26,412,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,443,129 UART: [rt]cmd =0x4d454153, len=108
26,461,624 >>> mbox cmd response data (12 bytes)
26,462,045 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,492,750 UART: [rt]cmd =0x4d454153, len=108
26,511,492 >>> mbox cmd response data (12 bytes)
26,511,920 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,542,397 UART: [rt]cmd =0x4d454153, len=108
26,544,835 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,502 UART:
192,881 UART: Running Caliptra ROM ...
193,978 UART:
603,580 UART: [state] CFI Enabled
617,042 UART: [state] LifecycleState = Unprovisioned
618,925 UART: [state] DebugLocked = No
621,311 UART: [state] WD Timer not started. Device not locked for debugging
625,994 UART: [kat] SHA2-256
805,694 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,421 UART: [kat] ++
817,027 UART: [kat] sha1
827,226 UART: [kat] SHA2-256
829,928 UART: [kat] SHA2-384
835,787 UART: [kat] SHA2-512-ACC
838,156 UART: [kat] ECC-384
3,280,593 UART: [kat] HMAC-384Kdf
3,293,538 UART: [kat] LMS
3,770,065 UART: [kat] --
3,774,704 UART: [cold-reset] ++
3,775,570 UART: [fht] FHT @ 0x50003400
3,786,206 UART: [idev] ++
3,786,813 UART: [idev] CDI.KEYID = 6
3,787,803 UART: [idev] SUBJECT.KEYID = 7
3,788,983 UART: [idev] UDS.KEYID = 0
3,790,059 ready_for_fw is high
3,790,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,086 UART: [idev] Erasing UDS.KEYID = 0
6,270,650 UART: [idev] Sha1 KeyId Algorithm
6,294,036 UART: [idev] --
6,297,822 UART: [ldev] ++
6,298,402 UART: [ldev] CDI.KEYID = 6
6,299,318 UART: [ldev] SUBJECT.KEYID = 5
6,300,539 UART: [ldev] AUTHORITY.KEYID = 7
6,301,695 UART: [ldev] FE.KEYID = 1
6,314,092 UART: [ldev] Erasing FE.KEYID = 1
8,792,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,944 UART: [ldev] --
10,583,427 UART: [fwproc] Wait for Commands...
10,585,868 UART: [fwproc] Recv command 0x46574c44
10,587,539 UART: [fwproc] Recv'd Img size: 118548 bytes
14,083,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,276 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,278 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,564,067 >>> mbox cmd response: success
14,568,242 UART: [afmc] ++
14,568,829 UART: [afmc] CDI.KEYID = 6
14,569,796 UART: [afmc] SUBJECT.KEYID = 7
14,571,011 UART: [afmc] AUTHORITY.KEYID = 5
17,073,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,796,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,798,228 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,814,042 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,830,118 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,845,722 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,870,316 UART: [afmc] --
18,873,896 UART: [cold-reset] --
18,877,281 UART: [state] Locking Datavault
18,884,531 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,235 UART: [state] Locking ICCM
18,888,981 UART: [exit] Launching FMC @ 0x40000130
18,897,380 UART:
18,897,617 UART: Running Caliptra FMC ...
18,898,718 UART:
18,898,880 UART: [state] CFI Enabled
18,907,015 UART: [fht] FMC Alias Private Key: 7
20,673,162 UART: [art] Extend RT PCRs Done
20,674,410 UART: [art] Lock RT PCRs Done
20,675,907 UART: [art] Populate DV Done
20,681,614 UART: [fht] FMC Alias Private Key: 7
20,683,272 UART: [art] Derive CDI
20,684,086 UART: [art] Store in slot 0x4
20,726,525 UART: [art] Derive Key Pair
20,727,525 UART: [art] Store priv key in slot 0x5
23,154,366 UART: [art] Derive Key Pair - Done
23,167,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,873,668 UART: [art] Erasing AUTHORITY.KEYID = 7
24,875,172 UART: [art] PUB.X = C42CDF7C6D6021758B369853C1015922CDB7C527EDB2DA14B2FE69D18CAA38CFD26FD2C137D425C7B226DECBADC15493
24,882,476 UART: [art] PUB.Y = F6B54FB330A2AA61358767EF5581479C7E2B94B70A6195460597F90ADC009335A5785049A5DA9B5BB32030FD3065D845
24,889,702 UART: [art] SIG.R = FD1BFFFB7B607DAB99D1D505039299BD2CDA64447EE970A564A2449800512F5F9C0A8D4D576DFA9653347CE0F49185D6
24,897,036 UART: [art] SIG.S = 66FC3F0EB4851B3040974148CAAC6DCB3D6F58E676FCE5AA5A9D324C97FA71E5DA8DB0008033901BC720E54791661D59
25,875,787 UART: Caliptra RT
25,876,497 UART: [state] CFI Enabled
26,009,648 UART: [rt] RT listening for mailbox commands...
26,011,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,042,365 UART: [rt]cmd =0x4d454153, len=108
26,061,117 >>> mbox cmd response data (12 bytes)
26,061,693 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,092,505 UART: [rt]cmd =0x4d454153, len=108
26,110,957 >>> mbox cmd response data (12 bytes)
26,111,428 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,142,025 UART: [rt]cmd =0x4d454153, len=108
26,161,177 >>> mbox cmd response data (12 bytes)
26,161,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,192,096 UART: [rt]cmd =0x4d454153, len=108
26,210,894 >>> mbox cmd response data (12 bytes)
26,211,328 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,242,028 UART: [rt]cmd =0x4d454153, len=108
26,261,171 >>> mbox cmd response data (12 bytes)
26,261,596 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,292,246 UART: [rt]cmd =0x4d454153, len=108
26,310,740 >>> mbox cmd response data (12 bytes)
26,311,171 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,341,817 UART: [rt]cmd =0x4d454153, len=108
26,359,781 >>> mbox cmd response data (12 bytes)
26,360,234 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,390,868 UART: [rt]cmd =0x4d454153, len=108
26,410,554 >>> mbox cmd response data (12 bytes)
26,410,975 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,441,573 UART: [rt]cmd =0x4d454153, len=108
26,460,860 >>> mbox cmd response data (12 bytes)
26,461,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,491,877 UART: [rt]cmd =0x4d454153, len=108
26,510,817 >>> mbox cmd response data (12 bytes)
26,511,274 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,541,866 UART: [rt]cmd =0x4d454153, len=108
26,561,119 >>> mbox cmd response data (12 bytes)
26,561,557 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,592,433 UART: [rt]cmd =0x4d454153, len=108
26,611,177 >>> mbox cmd response data (12 bytes)
26,611,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,642,301 UART: [rt]cmd =0x4d454153, len=108
26,660,792 >>> mbox cmd response data (12 bytes)
26,661,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,691,696 UART: [rt]cmd =0x4d454153, len=108
26,710,543 >>> mbox cmd response data (12 bytes)
26,710,973 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,741,619 UART: [rt]cmd =0x4d454153, len=108
26,744,159 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,777,000 ready_for_fw is high
3,777,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,610 >>> mbox cmd response: success
18,699,955 UART:
18,700,347 UART: Running Caliptra FMC ...
18,701,546 UART:
18,701,721 UART: [state] CFI Enabled
18,709,719 UART: [fht] FMC Alias Private Key: 7
20,475,786 UART: [art] Extend RT PCRs Done
20,477,033 UART: [art] Lock RT PCRs Done
20,478,941 UART: [art] Populate DV Done
20,484,199 UART: [fht] FMC Alias Private Key: 7
20,485,739 UART: [art] Derive CDI
20,486,508 UART: [art] Store in slot 0x4
20,528,868 UART: [art] Derive Key Pair
20,529,912 UART: [art] Store priv key in slot 0x5
22,956,887 UART: [art] Derive Key Pair - Done
22,969,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,484 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,997 UART: [art] PUB.X = 46EA2B93DD7B51665D63E2B2A8B44885C7FEC89215F1D3C5FC2F17DFC31DD86F190AA6D4F913957AC8E431146EE94F79
24,684,318 UART: [art] PUB.Y = BCF574DBD73686F90E3870826B2A1304EC17731135E686DCD9AFEC97E1285EE05126249E5C027875CD1AB1F1F8781B46
24,691,526 UART: [art] SIG.R = 95ED729B9ADA2E513833411D176C7295AFDD304B48FA1E9D8AB908A8EBF37D056F3AD979B1D223CD17574BA36D8375F5
24,698,920 UART: [art] SIG.S = 41457BED1026F0CB80883B6C207FEB992764520A5D199BF578A717C553ED21E3EEC0AE1B3DB01DFDDB22353F0FFBF2DA
25,677,965 UART: Caliptra RT
25,678,678 UART: [state] CFI Enabled
25,811,599 UART: [rt] RT listening for mailbox commands...
25,813,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,844,324 UART: [rt]cmd =0x4d454153, len=108
25,862,872 >>> mbox cmd response data (12 bytes)
25,863,392 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,894,108 UART: [rt]cmd =0x4d454153, len=108
25,913,129 >>> mbox cmd response data (12 bytes)
25,913,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,944,217 UART: [rt]cmd =0x4d454153, len=108
25,963,289 >>> mbox cmd response data (12 bytes)
25,963,742 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,994,336 UART: [rt]cmd =0x4d454153, len=108
26,012,782 >>> mbox cmd response data (12 bytes)
26,013,215 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,043,974 UART: [rt]cmd =0x4d454153, len=108
26,062,254 >>> mbox cmd response data (12 bytes)
26,062,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,093,325 UART: [rt]cmd =0x4d454153, len=108
26,112,264 >>> mbox cmd response data (12 bytes)
26,112,731 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,143,376 UART: [rt]cmd =0x4d454153, len=108
26,161,495 >>> mbox cmd response data (12 bytes)
26,161,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,192,732 UART: [rt]cmd =0x4d454153, len=108
26,211,904 >>> mbox cmd response data (12 bytes)
26,212,339 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,243,143 UART: [rt]cmd =0x4d454153, len=108
26,262,337 >>> mbox cmd response data (12 bytes)
26,262,766 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,293,519 UART: [rt]cmd =0x4d454153, len=108
26,313,068 >>> mbox cmd response data (12 bytes)
26,313,501 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,344,053 UART: [rt]cmd =0x4d454153, len=108
26,363,880 >>> mbox cmd response data (12 bytes)
26,364,313 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,394,902 UART: [rt]cmd =0x4d454153, len=108
26,414,203 >>> mbox cmd response data (12 bytes)
26,414,638 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,445,180 UART: [rt]cmd =0x4d454153, len=108
26,463,875 >>> mbox cmd response data (12 bytes)
26,464,304 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,494,947 UART: [rt]cmd =0x4d454153, len=108
26,513,982 >>> mbox cmd response data (12 bytes)
26,514,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,545,039 UART: [rt]cmd =0x4d454153, len=108
26,547,695 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
192,231 UART:
192,615 UART: Running Caliptra ROM ...
193,804 UART:
193,960 UART: [state] CFI Enabled
266,477 UART: [state] LifecycleState = Unprovisioned
268,517 UART: [state] DebugLocked = No
271,109 UART: [state] WD Timer not started. Device not locked for debugging
275,522 UART: [kat] SHA2-256
465,404 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,150 UART: [kat] ++
476,598 UART: [kat] sha1
487,426 UART: [kat] SHA2-256
490,437 UART: [kat] SHA2-384
496,994 UART: [kat] SHA2-512-ACC
499,549 UART: [kat] ECC-384
2,955,358 UART: [kat] HMAC-384Kdf
2,980,251 UART: [kat] LMS
3,512,048 UART: [kat] --
3,515,759 UART: [cold-reset] ++
3,517,544 UART: [fht] FHT @ 0x50003400
3,528,166 UART: [idev] ++
3,528,868 UART: [idev] CDI.KEYID = 6
3,529,773 UART: [idev] SUBJECT.KEYID = 7
3,531,015 UART: [idev] UDS.KEYID = 0
3,532,278 ready_for_fw is high
3,532,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,681,578 UART: [idev] Erasing UDS.KEYID = 0
6,036,835 UART: [idev] Sha1 KeyId Algorithm
6,060,347 UART: [idev] --
6,065,494 UART: [ldev] ++
6,066,228 UART: [ldev] CDI.KEYID = 6
6,067,143 UART: [ldev] SUBJECT.KEYID = 5
6,068,301 UART: [ldev] AUTHORITY.KEYID = 7
6,069,532 UART: [ldev] FE.KEYID = 1
6,109,027 UART: [ldev] Erasing FE.KEYID = 1
8,617,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,352,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,367,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,383,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,398,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,419,701 UART: [ldev] --
10,425,202 UART: [fwproc] Wait for Commands...
10,427,471 UART: [fwproc] Recv command 0x46574c44
10,429,778 UART: [fwproc] Recv'd Img size: 118548 bytes
13,930,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,011,092 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,134,701 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,695,010 >>> mbox cmd response: success
14,699,527 UART: [afmc] ++
14,700,266 UART: [afmc] CDI.KEYID = 6
14,701,461 UART: [afmc] SUBJECT.KEYID = 7
14,702,903 UART: [afmc] AUTHORITY.KEYID = 5
17,244,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,969,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,971,080 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,986,151 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,001,314 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,016,217 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,039,485 UART: [afmc] --
19,043,348 UART: [cold-reset] --
19,048,129 UART: [state] Locking Datavault
19,054,806 UART: [state] Locking PCR0, PCR1 and PCR31
19,057,039 UART: [state] Locking ICCM
19,059,723 UART: [exit] Launching FMC @ 0x40000130
19,068,408 UART:
19,068,643 UART: Running Caliptra FMC ...
19,069,746 UART:
19,069,904 UART: [state] CFI Enabled
19,124,472 UART: [fht] FMC Alias Private Key: 7
20,912,111 UART: [art] Extend RT PCRs Done
20,913,330 UART: [art] Lock RT PCRs Done
20,914,762 UART: [art] Populate DV Done
20,920,066 UART: [fht] FMC Alias Private Key: 7
20,921,602 UART: [art] Derive CDI
20,922,337 UART: [art] Store in slot 0x4
20,978,068 UART: [art] Derive Key Pair
20,979,109 UART: [art] Store priv key in slot 0x5
23,441,822 UART: [art] Derive Key Pair - Done
23,454,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,167,494 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,999 UART: [art] PUB.X = F1E87B8101750E55A3E9E8DAB5C75647599274A38BE179BACB9A7D44147F5CA3458540B94C41EA0F930F6A8378B76504
25,176,220 UART: [art] PUB.Y = 0B32FB996B5C895414CB78999D980B04C556F306F603777E71FB7114971A6B2403A7BA410E3543D897AF9AE6E4858EE1
25,183,492 UART: [art] SIG.R = D3B9E36B297B1B0DEAE898D1F12C641022BB1108D1D2EEABA796B02FD583138504DE2CE7C8E4206A5EEAB5C4A1E6FDF3
25,190,860 UART: [art] SIG.S = A9D044771F6600FDE2E48D42225D4F492DD33CDEE3C7839AFB06B4D401136906DE084C9A1D29D0612C1E0A56AB19DB3A
26,169,853 UART: Caliptra RT
26,170,546 UART: [state] CFI Enabled
26,350,733 UART: [rt] RT listening for mailbox commands...
26,352,623 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,383,494 UART: [rt]cmd =0x4d454153, len=108
26,402,373 >>> mbox cmd response data (12 bytes)
26,402,926 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,433,645 UART: [rt]cmd =0x4d454153, len=108
26,452,555 >>> mbox cmd response data (12 bytes)
26,453,016 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,483,612 UART: [rt]cmd =0x4d454153, len=108
26,501,985 >>> mbox cmd response data (12 bytes)
26,502,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,533,026 UART: [rt]cmd =0x4d454153, len=108
26,551,526 >>> mbox cmd response data (12 bytes)
26,551,955 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,582,771 UART: [rt]cmd =0x4d454153, len=108
26,600,968 >>> mbox cmd response data (12 bytes)
26,601,400 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,632,043 UART: [rt]cmd =0x4d454153, len=108
26,651,239 >>> mbox cmd response data (12 bytes)
26,651,665 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,682,313 UART: [rt]cmd =0x4d454153, len=108
26,701,380 >>> mbox cmd response data (12 bytes)
26,701,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,732,612 UART: [rt]cmd =0x4d454153, len=108
26,750,950 >>> mbox cmd response data (12 bytes)
26,751,411 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,782,112 UART: [rt]cmd =0x4d454153, len=108
26,801,357 >>> mbox cmd response data (12 bytes)
26,801,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,832,538 UART: [rt]cmd =0x4d454153, len=108
26,851,289 >>> mbox cmd response data (12 bytes)
26,851,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,882,364 UART: [rt]cmd =0x4d454153, len=108
26,900,908 >>> mbox cmd response data (12 bytes)
26,901,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,932,175 UART: [rt]cmd =0x4d454153, len=108
26,951,317 >>> mbox cmd response data (12 bytes)
26,951,795 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,982,397 UART: [rt]cmd =0x4d454153, len=108
27,000,940 >>> mbox cmd response data (12 bytes)
27,001,389 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,032,088 UART: [rt]cmd =0x4d454153, len=108
27,051,180 >>> mbox cmd response data (12 bytes)
27,051,606 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,082,116 UART: [rt]cmd =0x4d454153, len=108
27,084,611 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,846 writing to cptra_bootfsm_go
3,439,257 ready_for_fw is high
3,439,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,790,216 >>> mbox cmd response: success
19,070,606 UART:
19,071,012 UART: Running Caliptra FMC ...
19,072,155 UART:
19,072,323 UART: [state] CFI Enabled
19,135,960 UART: [fht] FMC Alias Private Key: 7
20,902,002 UART: [art] Extend RT PCRs Done
20,903,224 UART: [art] Lock RT PCRs Done
20,904,632 UART: [art] Populate DV Done
20,910,105 UART: [fht] FMC Alias Private Key: 7
20,911,751 UART: [art] Derive CDI
20,912,564 UART: [art] Store in slot 0x4
20,968,845 UART: [art] Derive Key Pair
20,969,846 UART: [art] Store priv key in slot 0x5
23,432,881 UART: [art] Derive Key Pair - Done
23,446,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,157,783 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,283 UART: [art] PUB.X = 1B9EBD76E58696B8700D9042C3991A17FEF30E85BFBDE8968DFA6780EA6B228D9C06E9F52A0A34343F3050EB42CDEDEB
25,166,555 UART: [art] PUB.Y = F414B04272691F8FB61FA0A87FA071D7893235979584B19ED3465B803124D57AB29A9B20D63BE47D12302D7571C0AD15
25,173,820 UART: [art] SIG.R = EF2DABD3215DD8246632C0926225E48841E84A07C7242E4CE70A8DF8B4BDFBE901EE08FA21AA78ED68ED453CFEE474CE
25,181,185 UART: [art] SIG.S = 903957CB4D23E6DC0F6F01A18CE66644E966C04644994529C951F7A6963AB9283D9A23B2797223C80F43CC5A2B7F94D9
26,160,605 UART: Caliptra RT
26,161,297 UART: [state] CFI Enabled
26,339,646 UART: [rt] RT listening for mailbox commands...
26,341,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,372,426 UART: [rt]cmd =0x4d454153, len=108
26,391,189 >>> mbox cmd response data (12 bytes)
26,391,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,422,475 UART: [rt]cmd =0x4d454153, len=108
26,441,164 >>> mbox cmd response data (12 bytes)
26,441,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,472,353 UART: [rt]cmd =0x4d454153, len=108
26,490,375 >>> mbox cmd response data (12 bytes)
26,490,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,521,543 UART: [rt]cmd =0x4d454153, len=108
26,539,941 >>> mbox cmd response data (12 bytes)
26,540,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,570,903 UART: [rt]cmd =0x4d454153, len=108
26,589,548 >>> mbox cmd response data (12 bytes)
26,590,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,620,708 UART: [rt]cmd =0x4d454153, len=108
26,639,261 >>> mbox cmd response data (12 bytes)
26,639,683 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,670,387 UART: [rt]cmd =0x4d454153, len=108
26,688,702 >>> mbox cmd response data (12 bytes)
26,689,132 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,719,989 UART: [rt]cmd =0x4d454153, len=108
26,738,157 >>> mbox cmd response data (12 bytes)
26,738,642 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,769,398 UART: [rt]cmd =0x4d454153, len=108
26,788,751 >>> mbox cmd response data (12 bytes)
26,789,179 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,819,882 UART: [rt]cmd =0x4d454153, len=108
26,838,302 >>> mbox cmd response data (12 bytes)
26,838,731 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,869,367 UART: [rt]cmd =0x4d454153, len=108
26,888,935 >>> mbox cmd response data (12 bytes)
26,889,360 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,919,744 UART: [rt]cmd =0x4d454153, len=108
26,938,384 >>> mbox cmd response data (12 bytes)
26,938,816 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,969,400 UART: [rt]cmd =0x4d454153, len=108
26,988,056 >>> mbox cmd response data (12 bytes)
26,988,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,019,244 UART: [rt]cmd =0x4d454153, len=108
27,038,279 >>> mbox cmd response data (12 bytes)
27,038,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,069,365 UART: [rt]cmd =0x4d454153, len=108
27,071,567 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
192,420 UART:
192,789 UART: Running Caliptra ROM ...
193,979 UART:
603,785 UART: [state] CFI Enabled
619,012 UART: [state] LifecycleState = Unprovisioned
621,403 UART: [state] DebugLocked = No
624,146 UART: [state] WD Timer not started. Device not locked for debugging
628,484 UART: [kat] SHA2-256
818,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,116 UART: [kat] ++
829,638 UART: [kat] sha1
839,895 UART: [kat] SHA2-256
842,888 UART: [kat] SHA2-384
850,239 UART: [kat] SHA2-512-ACC
852,831 UART: [kat] ECC-384
3,294,484 UART: [kat] HMAC-384Kdf
3,307,357 UART: [kat] LMS
3,839,193 UART: [kat] --
3,843,348 UART: [cold-reset] ++
3,844,288 UART: [fht] FHT @ 0x50003400
3,854,486 UART: [idev] ++
3,855,123 UART: [idev] CDI.KEYID = 6
3,856,152 UART: [idev] SUBJECT.KEYID = 7
3,857,327 UART: [idev] UDS.KEYID = 0
3,858,259 ready_for_fw is high
3,858,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,342 UART: [idev] Erasing UDS.KEYID = 0
6,338,545 UART: [idev] Sha1 KeyId Algorithm
6,360,398 UART: [idev] --
6,365,720 UART: [ldev] ++
6,366,406 UART: [ldev] CDI.KEYID = 6
6,367,318 UART: [ldev] SUBJECT.KEYID = 5
6,368,533 UART: [ldev] AUTHORITY.KEYID = 7
6,369,709 UART: [ldev] FE.KEYID = 1
6,379,974 UART: [ldev] Erasing FE.KEYID = 1
8,857,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,955 UART: [ldev] --
10,650,593 UART: [fwproc] Wait for Commands...
10,652,957 UART: [fwproc] Recv command 0x46574c44
10,655,263 UART: [fwproc] Recv'd Img size: 118548 bytes
14,158,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,973 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,589 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,358 >>> mbox cmd response: success
14,921,670 UART: [afmc] ++
14,922,407 UART: [afmc] CDI.KEYID = 6
14,923,547 UART: [afmc] SUBJECT.KEYID = 7
14,925,055 UART: [afmc] AUTHORITY.KEYID = 5
17,426,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,148,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,985 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,165,092 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,180,253 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,195,110 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,217,887 UART: [afmc] --
19,221,168 UART: [cold-reset] --
19,225,600 UART: [state] Locking Datavault
19,230,710 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,890 UART: [state] Locking ICCM
19,234,195 UART: [exit] Launching FMC @ 0x40000130
19,242,890 UART:
19,243,137 UART: Running Caliptra FMC ...
19,244,243 UART:
19,244,412 UART: [state] CFI Enabled
19,252,143 UART: [fht] FMC Alias Private Key: 7
21,018,643 UART: [art] Extend RT PCRs Done
21,019,867 UART: [art] Lock RT PCRs Done
21,021,445 UART: [art] Populate DV Done
21,026,649 UART: [fht] FMC Alias Private Key: 7
21,028,141 UART: [art] Derive CDI
21,028,913 UART: [art] Store in slot 0x4
21,071,517 UART: [art] Derive Key Pair
21,072,743 UART: [art] Store priv key in slot 0x5
23,499,891 UART: [art] Derive Key Pair - Done
23,513,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,358 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,867 UART: [art] PUB.X = 4A4C5DFDBDFB938DC1B46ACE91AA8A66668E868C153D8BD689895FF6C5D5986811D9425972320B7CC68FF18CA19AF28A
25,228,135 UART: [art] PUB.Y = 7C2D63A4F4ADA1B68DF193D9E2EE5321AD234B47D73CB2CE44F10E4610FBDEFCA9027131AC1F219A60AB2898C50B5B51
25,235,450 UART: [art] SIG.R = 74F2F4FEC7740C2B828DCC68CA8875157BBF7C1526CB2FBB1F95EF5BCDE5A9EE3224481947AEEDF18CC1799C4268CBAF
25,242,881 UART: [art] SIG.S = 66DA8ECCB20E910030DB77EA2909003939AB24D2A52295C08CC6734AA67E90918301722116054CBE7A689A23C8F71E83
26,221,825 UART: Caliptra RT
26,222,520 UART: [state] CFI Enabled
26,355,577 UART: [rt] RT listening for mailbox commands...
26,357,483 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,388,086 UART: [rt]cmd =0x4d454153, len=108
26,406,323 >>> mbox cmd response data (12 bytes)
26,406,855 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,437,688 UART: [rt]cmd =0x4d454153, len=108
26,455,918 >>> mbox cmd response data (12 bytes)
26,456,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,487,238 UART: [rt]cmd =0x4d454153, len=108
26,506,330 >>> mbox cmd response data (12 bytes)
26,506,768 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,537,560 UART: [rt]cmd =0x4d454153, len=108
26,555,557 >>> mbox cmd response data (12 bytes)
26,555,988 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,586,525 UART: [rt]cmd =0x4d454153, len=108
26,605,041 >>> mbox cmd response data (12 bytes)
26,605,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,636,132 UART: [rt]cmd =0x4d454153, len=108
26,654,907 >>> mbox cmd response data (12 bytes)
26,655,338 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,685,675 UART: [rt]cmd =0x4d454153, len=108
26,703,831 >>> mbox cmd response data (12 bytes)
26,704,285 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,735,098 UART: [rt]cmd =0x4d454153, len=108
26,753,548 >>> mbox cmd response data (12 bytes)
26,754,010 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,784,557 UART: [rt]cmd =0x4d454153, len=108
26,803,431 >>> mbox cmd response data (12 bytes)
26,803,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,834,292 UART: [rt]cmd =0x4d454153, len=108
26,853,246 >>> mbox cmd response data (12 bytes)
26,853,683 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,884,220 UART: [rt]cmd =0x4d454153, len=108
26,902,116 >>> mbox cmd response data (12 bytes)
26,902,543 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,933,195 UART: [rt]cmd =0x4d454153, len=108
26,952,161 >>> mbox cmd response data (12 bytes)
26,952,585 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,983,197 UART: [rt]cmd =0x4d454153, len=108
27,002,890 >>> mbox cmd response data (12 bytes)
27,003,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,034,010 UART: [rt]cmd =0x4d454153, len=108
27,053,867 >>> mbox cmd response data (12 bytes)
27,054,300 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,084,957 UART: [rt]cmd =0x4d454153, len=108
27,087,378 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,760,664 ready_for_fw is high
3,761,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,612 >>> mbox cmd response: success
19,294,907 UART:
19,295,354 UART: Running Caliptra FMC ...
19,296,683 UART:
19,296,865 UART: [state] CFI Enabled
19,304,387 UART: [fht] FMC Alias Private Key: 7
21,070,848 UART: [art] Extend RT PCRs Done
21,072,082 UART: [art] Lock RT PCRs Done
21,073,822 UART: [art] Populate DV Done
21,078,994 UART: [fht] FMC Alias Private Key: 7
21,080,711 UART: [art] Derive CDI
21,081,538 UART: [art] Store in slot 0x4
21,124,198 UART: [art] Derive Key Pair
21,125,244 UART: [art] Store priv key in slot 0x5
23,551,936 UART: [art] Derive Key Pair - Done
23,564,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,733 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,252 UART: [art] PUB.X = 4403B0D59B6542A24D6A1742621C7E3B58C1C7209E85698724E7730BF389B7203792F012C4F4F59A5F7127FA797E888C
25,279,522 UART: [art] PUB.Y = 7904AFA7754E46C2FB60636D70463D72A3E9A2384D86FD06AEBA52AFA14AE5DD70C0FF0CB038E642EE1C79E397FC8F28
25,286,774 UART: [art] SIG.R = EB9A7984BFDE38AB7CDF942DB061A2A0E5F94F260688B06E7115282222EC2C9EBC2C94073F4780730108678CBD8E6E9F
25,294,178 UART: [art] SIG.S = 2587BE2A7CE306B53F445C3986EC184D093ED29799E0A922E09DF26B289C0B28F87ABC261338D6D40CCB237C6448C462
26,273,311 UART: Caliptra RT
26,274,025 UART: [state] CFI Enabled
26,406,446 UART: [rt] RT listening for mailbox commands...
26,408,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,438,933 UART: [rt]cmd =0x4d454153, len=108
26,457,600 >>> mbox cmd response data (12 bytes)
26,458,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,488,703 UART: [rt]cmd =0x4d454153, len=108
26,508,327 >>> mbox cmd response data (12 bytes)
26,508,769 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,539,690 UART: [rt]cmd =0x4d454153, len=108
26,558,727 >>> mbox cmd response data (12 bytes)
26,559,202 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,589,797 UART: [rt]cmd =0x4d454153, len=108
26,608,191 >>> mbox cmd response data (12 bytes)
26,608,619 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,639,218 UART: [rt]cmd =0x4d454153, len=108
26,658,346 >>> mbox cmd response data (12 bytes)
26,658,802 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,689,520 UART: [rt]cmd =0x4d454153, len=108
26,709,213 >>> mbox cmd response data (12 bytes)
26,709,642 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,740,300 UART: [rt]cmd =0x4d454153, len=108
26,759,801 >>> mbox cmd response data (12 bytes)
26,760,238 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,790,780 UART: [rt]cmd =0x4d454153, len=108
26,809,932 >>> mbox cmd response data (12 bytes)
26,810,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,840,998 UART: [rt]cmd =0x4d454153, len=108
26,859,772 >>> mbox cmd response data (12 bytes)
26,860,198 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,890,744 UART: [rt]cmd =0x4d454153, len=108
26,909,752 >>> mbox cmd response data (12 bytes)
26,910,184 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,940,830 UART: [rt]cmd =0x4d454153, len=108
26,960,210 >>> mbox cmd response data (12 bytes)
26,960,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,991,099 UART: [rt]cmd =0x4d454153, len=108
27,009,379 >>> mbox cmd response data (12 bytes)
27,009,814 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,040,472 UART: [rt]cmd =0x4d454153, len=108
27,059,649 >>> mbox cmd response data (12 bytes)
27,060,081 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,090,893 UART: [rt]cmd =0x4d454153, len=108
27,109,387 >>> mbox cmd response data (12 bytes)
27,109,808 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,140,456 UART: [rt]cmd =0x4d454153, len=108
27,142,657 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,537 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,065 UART: [kat] SHA2-256
881,996 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,111 UART: [kat] ++
886,263 UART: [kat] sha1
890,503 UART: [kat] SHA2-256
892,441 UART: [kat] SHA2-384
895,384 UART: [kat] SHA2-512-ACC
897,285 UART: [kat] ECC-384
902,588 UART: [kat] HMAC-384Kdf
907,172 UART: [kat] LMS
1,475,368 UART: [kat] --
1,476,081 UART: [cold-reset] ++
1,476,637 UART: [fht] Storing FHT @ 0x50003400
1,479,356 UART: [idev] ++
1,479,524 UART: [idev] CDI.KEYID = 6
1,479,884 UART: [idev] SUBJECT.KEYID = 7
1,480,308 UART: [idev] UDS.KEYID = 0
1,480,653 ready_for_fw is high
1,480,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,282 UART: [idev] Erasing UDS.KEYID = 0
1,504,554 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,202 UART: [idev] --
1,514,249 UART: [ldev] ++
1,514,417 UART: [ldev] CDI.KEYID = 6
1,514,780 UART: [ldev] SUBJECT.KEYID = 5
1,515,206 UART: [ldev] AUTHORITY.KEYID = 7
1,515,669 UART: [ldev] FE.KEYID = 1
1,520,843 UART: [ldev] Erasing FE.KEYID = 1
1,546,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,544 UART: [ldev] --
1,585,927 UART: [fwproc] Waiting for Commands...
1,586,752 UART: [fwproc] Received command 0x46574c44
1,587,543 UART: [fwproc] Received Image of size 118548 bytes
2,932,001 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,783 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,001 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,242 >>> mbox cmd response: success
3,132,482 UART: [afmc] ++
3,132,650 UART: [afmc] CDI.KEYID = 6
3,133,012 UART: [afmc] SUBJECT.KEYID = 7
3,133,437 UART: [afmc] AUTHORITY.KEYID = 5
3,168,630 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,842 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,622 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,331 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,214 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,897 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,791 UART: [afmc] --
3,211,917 UART: [cold-reset] --
3,212,625 UART: [state] Locking Datavault
3,213,978 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,582 UART: [state] Locking ICCM
3,215,196 UART: [exit] Launching FMC @ 0x40000130
3,220,526 UART:
3,220,542 UART: Running Caliptra FMC ...
3,220,950 UART:
3,221,004 UART: [state] CFI Enabled
3,231,740 UART: [fht] FMC Alias Private Key: 7
3,350,926 UART: [art] Extend RT PCRs Done
3,351,354 UART: [art] Lock RT PCRs Done
3,352,812 UART: [art] Populate DV Done
3,360,823 UART: [fht] FMC Alias Private Key: 7
3,361,869 UART: [art] Derive CDI
3,362,149 UART: [art] Store in slot 0x4
3,447,753 UART: [art] Derive Key Pair
3,448,113 UART: [art] Store priv key in slot 0x5
3,461,586 UART: [art] Derive Key Pair - Done
3,476,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,989 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,754 UART: [art] PUB.X = 85D05383C4BB3BCF6522CFD742AC93BC05D5E85F7348581835E22ACA09AACC2180B00FEA04E3EC5F1DE445C567FC61DE
3,499,530 UART: [art] PUB.Y = A9633D55E2744A582AB0BD2285E00E4EF5C61DD6A39DE8D57A5E3541F49284629762852C8054CB12A41BB267E5E131D6
3,506,477 UART: [art] SIG.R = 39E6FBEF247EEE0CA13EFAFEA65222349C9B06F2C28A83C85DF23230E0B20D523DF76E3451EB47EAF888F3549EFB8D60
3,513,256 UART: [art] SIG.S = 9F5D3AC0B813BE276F8DF2B5553779A3C14D10A29879D7856817615296D28177347971F939C7B0A888CDEDDF3EE7B331
3,537,666 UART: Caliptra RT
3,537,917 UART: [state] CFI Enabled
3,658,753 UART: [rt] RT listening for mailbox commands...
3,659,423 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,823 UART: [rt]cmd =0x4d454153, len=108
3,710,201 >>> mbox cmd response data (12 bytes)
3,710,202 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,740,213 UART: [rt]cmd =0x4d454153, len=108
3,760,930 >>> mbox cmd response data (12 bytes)
3,760,931 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,148 UART: [rt]cmd =0x4d454153, len=108
3,811,628 >>> mbox cmd response data (12 bytes)
3,811,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,840 UART: [rt]cmd =0x4d454153, len=108
3,862,801 >>> mbox cmd response data (12 bytes)
3,862,802 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,013 UART: [rt]cmd =0x4d454153, len=108
3,913,963 >>> mbox cmd response data (12 bytes)
3,913,964 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,023 UART: [rt]cmd =0x4d454153, len=108
3,964,862 >>> mbox cmd response data (12 bytes)
3,964,863 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,995,000 UART: [rt]cmd =0x4d454153, len=108
4,015,354 >>> mbox cmd response data (12 bytes)
4,015,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,045,302 UART: [rt]cmd =0x4d454153, len=108
4,066,517 >>> mbox cmd response data (12 bytes)
4,066,518 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,096,609 UART: [rt]cmd =0x4d454153, len=108
4,117,885 >>> mbox cmd response data (12 bytes)
4,117,886 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,147,977 UART: [rt]cmd =0x4d454153, len=108
4,169,382 >>> mbox cmd response data (12 bytes)
4,169,383 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,199,410 UART: [rt]cmd =0x4d454153, len=108
4,219,728 >>> mbox cmd response data (12 bytes)
4,219,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,249,832 UART: [rt]cmd =0x4d454153, len=108
4,271,543 >>> mbox cmd response data (12 bytes)
4,271,544 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,301,261 UART: [rt]cmd =0x4d454153, len=108
4,322,475 >>> mbox cmd response data (12 bytes)
4,322,476 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,352,401 UART: [rt]cmd =0x4d454153, len=108
4,372,750 >>> mbox cmd response data (12 bytes)
4,372,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,402,554 UART: [rt]cmd =0x4d454153, len=108
4,404,759 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,183 ready_for_fw is high
1,362,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,546 >>> mbox cmd response: success
3,041,731 UART:
3,041,747 UART: Running Caliptra FMC ...
3,042,155 UART:
3,042,209 UART: [state] CFI Enabled
3,052,563 UART: [fht] FMC Alias Private Key: 7
3,171,669 UART: [art] Extend RT PCRs Done
3,172,097 UART: [art] Lock RT PCRs Done
3,173,573 UART: [art] Populate DV Done
3,181,722 UART: [fht] FMC Alias Private Key: 7
3,182,658 UART: [art] Derive CDI
3,182,938 UART: [art] Store in slot 0x4
3,268,774 UART: [art] Derive Key Pair
3,269,134 UART: [art] Store priv key in slot 0x5
3,282,565 UART: [art] Derive Key Pair - Done
3,297,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,555 UART: [art] PUB.X = CE5E413FEDE3AB870C9EA3AABE6D0F3DC5E1FF32D6A10B272F36C69D1AF0B8A72BECC404EB995D183540A6FAD6CA4216
3,320,343 UART: [art] PUB.Y = 14E91BE903F52BCCCFD0CCDB2F7A61E9032509D4B63A70BDB5F6C2E3484CA8D048BC51298511282423FE054DE3CF2B74
3,327,295 UART: [art] SIG.R = 3E588CCE54CD491A6123F3214F1B8212D2693DA5AD3C3732D27BCAC6847FF91844FFD00825DA62272FDB5455752B0FDE
3,334,067 UART: [art] SIG.S = CEEBDC7D884A612091B6B2A6CE67008AA53D30094903BF7AA63B111B8AA32648E8891B06D3718735CB2CAADBD56A16C6
3,358,348 UART: Caliptra RT
3,358,599 UART: [state] CFI Enabled
3,478,037 UART: [rt] RT listening for mailbox commands...
3,478,707 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,333 UART: [rt]cmd =0x4d454153, len=108
3,531,395 >>> mbox cmd response data (12 bytes)
3,531,396 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,561,327 UART: [rt]cmd =0x4d454153, len=108
3,582,694 >>> mbox cmd response data (12 bytes)
3,582,695 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,804 UART: [rt]cmd =0x4d454153, len=108
3,633,842 >>> mbox cmd response data (12 bytes)
3,633,843 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,742 UART: [rt]cmd =0x4d454153, len=108
3,684,181 >>> mbox cmd response data (12 bytes)
3,684,182 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,714,131 UART: [rt]cmd =0x4d454153, len=108
3,735,597 >>> mbox cmd response data (12 bytes)
3,735,598 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,765,769 UART: [rt]cmd =0x4d454153, len=108
3,786,576 >>> mbox cmd response data (12 bytes)
3,786,577 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,962 UART: [rt]cmd =0x4d454153, len=108
3,837,514 >>> mbox cmd response data (12 bytes)
3,837,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,867,406 UART: [rt]cmd =0x4d454153, len=108
3,888,709 >>> mbox cmd response data (12 bytes)
3,888,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,918,753 UART: [rt]cmd =0x4d454153, len=108
3,939,939 >>> mbox cmd response data (12 bytes)
3,939,940 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,969,729 UART: [rt]cmd =0x4d454153, len=108
3,990,540 >>> mbox cmd response data (12 bytes)
3,990,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,656 UART: [rt]cmd =0x4d454153, len=108
4,041,940 >>> mbox cmd response data (12 bytes)
4,041,941 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,072,258 UART: [rt]cmd =0x4d454153, len=108
4,093,133 >>> mbox cmd response data (12 bytes)
4,093,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,237 UART: [rt]cmd =0x4d454153, len=108
4,144,491 >>> mbox cmd response data (12 bytes)
4,144,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,174,515 UART: [rt]cmd =0x4d454153, len=108
4,195,472 >>> mbox cmd response data (12 bytes)
4,195,473 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,225,482 UART: [rt]cmd =0x4d454153, len=108
4,227,367 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
86,964 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,628 UART: [kat] SHA2-256
882,559 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,674 UART: [kat] ++
886,826 UART: [kat] sha1
891,066 UART: [kat] SHA2-256
893,004 UART: [kat] SHA2-384
895,715 UART: [kat] SHA2-512-ACC
897,616 UART: [kat] ECC-384
902,839 UART: [kat] HMAC-384Kdf
907,515 UART: [kat] LMS
1,475,711 UART: [kat] --
1,476,656 UART: [cold-reset] ++
1,477,074 UART: [fht] Storing FHT @ 0x50003400
1,479,751 UART: [idev] ++
1,479,919 UART: [idev] CDI.KEYID = 6
1,480,279 UART: [idev] SUBJECT.KEYID = 7
1,480,703 UART: [idev] UDS.KEYID = 0
1,481,048 ready_for_fw is high
1,481,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,043 UART: [idev] Erasing UDS.KEYID = 0
1,505,751 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,259 UART: [idev] --
1,515,520 UART: [ldev] ++
1,515,688 UART: [ldev] CDI.KEYID = 6
1,516,051 UART: [ldev] SUBJECT.KEYID = 5
1,516,477 UART: [ldev] AUTHORITY.KEYID = 7
1,516,940 UART: [ldev] FE.KEYID = 1
1,522,068 UART: [ldev] Erasing FE.KEYID = 1
1,547,599 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,277 UART: [ldev] --
1,586,628 UART: [fwproc] Waiting for Commands...
1,587,439 UART: [fwproc] Received command 0x46574c44
1,588,230 UART: [fwproc] Received Image of size 118548 bytes
2,933,572 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,732 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,950 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,305 >>> mbox cmd response: success
3,134,355 UART: [afmc] ++
3,134,523 UART: [afmc] CDI.KEYID = 6
3,134,885 UART: [afmc] SUBJECT.KEYID = 7
3,135,310 UART: [afmc] AUTHORITY.KEYID = 5
3,170,017 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,451 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,231 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,940 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,823 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,506 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,308 UART: [afmc] --
3,213,434 UART: [cold-reset] --
3,214,166 UART: [state] Locking Datavault
3,215,611 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,215 UART: [state] Locking ICCM
3,216,871 UART: [exit] Launching FMC @ 0x40000130
3,222,201 UART:
3,222,217 UART: Running Caliptra FMC ...
3,222,625 UART:
3,222,768 UART: [state] CFI Enabled
3,233,826 UART: [fht] FMC Alias Private Key: 7
3,353,412 UART: [art] Extend RT PCRs Done
3,353,840 UART: [art] Lock RT PCRs Done
3,355,242 UART: [art] Populate DV Done
3,363,515 UART: [fht] FMC Alias Private Key: 7
3,364,541 UART: [art] Derive CDI
3,364,821 UART: [art] Store in slot 0x4
3,450,727 UART: [art] Derive Key Pair
3,451,087 UART: [art] Store priv key in slot 0x5
3,464,388 UART: [art] Derive Key Pair - Done
3,479,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,291 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,056 UART: [art] PUB.X = B8F23D0DCA1ABC513DB4CFE7847B0802FEFD536003C085CAEBB375E0F6C0DF44EE8422900BE4393B41B8BC974B968856
3,501,827 UART: [art] PUB.Y = E5119B2D37210C6AEA95FCDE23F09821F5D3E70BE8CC707D945159B5856518333479E36B6F0055E7109E3BDA23B49EAC
3,508,753 UART: [art] SIG.R = 346E589F00B46C06D84EF1BCBA03F1DD20C42B0A9CCB382465A25C27E37DE53F5FF8E9DD29B57ACAEC0E50EAFFE6073B
3,515,512 UART: [art] SIG.S = D232AD8C2F7C5D81FE1E655F1B5A8FFBFD2FEC46D22150247A67CB9F0F3F14BD8D416B85411686CD1FA2130E1372EACA
3,539,512 UART: Caliptra RT
3,539,855 UART: [state] CFI Enabled
3,660,067 UART: [rt] RT listening for mailbox commands...
3,660,737 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,057 UART: [rt]cmd =0x4d454153, len=108
3,711,515 >>> mbox cmd response data (12 bytes)
3,711,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,645 UART: [rt]cmd =0x4d454153, len=108
3,763,106 >>> mbox cmd response data (12 bytes)
3,763,107 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,792,900 UART: [rt]cmd =0x4d454153, len=108
3,814,206 >>> mbox cmd response data (12 bytes)
3,814,207 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,290 UART: [rt]cmd =0x4d454153, len=108
3,863,747 >>> mbox cmd response data (12 bytes)
3,863,748 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,795 UART: [rt]cmd =0x4d454153, len=108
3,915,225 >>> mbox cmd response data (12 bytes)
3,915,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,185 UART: [rt]cmd =0x4d454153, len=108
3,965,938 >>> mbox cmd response data (12 bytes)
3,965,939 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,996,004 UART: [rt]cmd =0x4d454153, len=108
4,016,546 >>> mbox cmd response data (12 bytes)
4,016,547 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,046,446 UART: [rt]cmd =0x4d454153, len=108
4,067,153 >>> mbox cmd response data (12 bytes)
4,067,154 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,097,087 UART: [rt]cmd =0x4d454153, len=108
4,117,669 >>> mbox cmd response data (12 bytes)
4,117,670 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,147,765 UART: [rt]cmd =0x4d454153, len=108
4,168,712 >>> mbox cmd response data (12 bytes)
4,168,713 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,198,708 UART: [rt]cmd =0x4d454153, len=108
4,219,686 >>> mbox cmd response data (12 bytes)
4,219,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,249,686 UART: [rt]cmd =0x4d454153, len=108
4,270,867 >>> mbox cmd response data (12 bytes)
4,270,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,300,833 UART: [rt]cmd =0x4d454153, len=108
4,322,559 >>> mbox cmd response data (12 bytes)
4,322,560 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,352,567 UART: [rt]cmd =0x4d454153, len=108
4,373,746 >>> mbox cmd response data (12 bytes)
4,373,747 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,403,526 UART: [rt]cmd =0x4d454153, len=108
4,405,553 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,480 ready_for_fw is high
1,362,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,749 >>> mbox cmd response: success
3,042,412 UART:
3,042,428 UART: Running Caliptra FMC ...
3,042,836 UART:
3,042,979 UART: [state] CFI Enabled
3,053,639 UART: [fht] FMC Alias Private Key: 7
3,172,883 UART: [art] Extend RT PCRs Done
3,173,311 UART: [art] Lock RT PCRs Done
3,174,699 UART: [art] Populate DV Done
3,182,954 UART: [fht] FMC Alias Private Key: 7
3,184,054 UART: [art] Derive CDI
3,184,334 UART: [art] Store in slot 0x4
3,270,126 UART: [art] Derive Key Pair
3,270,486 UART: [art] Store priv key in slot 0x5
3,284,081 UART: [art] Derive Key Pair - Done
3,298,824 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,098 UART: [art] PUB.X = A6520C774D0C33051389F3EC9136C691C80CA5A9A8FC5F9BD9C72CDC9BF23D63CA9787F20B7F11853040FB3759656714
3,321,855 UART: [art] PUB.Y = 69C43638AE3A8C67C23D051878D7BFA40A667CF55FDC64CE04395B5512672E5EC8E6B4788D449361CF22FD8BCFFEF84D
3,328,808 UART: [art] SIG.R = 2C436FA1346E59E51B9A3888FC715DD46BA4BA6FA52F042D26742F95CC0A63053FC7746105C1CFF8D040C26EA89D7024
3,335,572 UART: [art] SIG.S = 015CF42DCA2855A4F6F4E3313FB50E6D6E761B98174C82ACF90E86CD97BEFB722B90215EE6D184FE626CD1CFC6EB6387
3,359,471 UART: Caliptra RT
3,359,814 UART: [state] CFI Enabled
3,480,043 UART: [rt] RT listening for mailbox commands...
3,480,713 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,119 UART: [rt]cmd =0x4d454153, len=108
3,531,827 >>> mbox cmd response data (12 bytes)
3,531,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,562,155 UART: [rt]cmd =0x4d454153, len=108
3,582,912 >>> mbox cmd response data (12 bytes)
3,582,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,076 UART: [rt]cmd =0x4d454153, len=108
3,634,032 >>> mbox cmd response data (12 bytes)
3,634,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,664,106 UART: [rt]cmd =0x4d454153, len=108
3,684,805 >>> mbox cmd response data (12 bytes)
3,684,806 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,714,815 UART: [rt]cmd =0x4d454153, len=108
3,736,503 >>> mbox cmd response data (12 bytes)
3,736,504 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,766,399 UART: [rt]cmd =0x4d454153, len=108
3,787,488 >>> mbox cmd response data (12 bytes)
3,787,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,784 UART: [rt]cmd =0x4d454153, len=108
3,838,832 >>> mbox cmd response data (12 bytes)
3,838,833 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,868,790 UART: [rt]cmd =0x4d454153, len=108
3,889,011 >>> mbox cmd response data (12 bytes)
3,889,012 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,918,929 UART: [rt]cmd =0x4d454153, len=108
3,940,055 >>> mbox cmd response data (12 bytes)
3,940,056 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,969,911 UART: [rt]cmd =0x4d454153, len=108
3,991,244 >>> mbox cmd response data (12 bytes)
3,991,245 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,286 UART: [rt]cmd =0x4d454153, len=108
4,042,080 >>> mbox cmd response data (12 bytes)
4,042,081 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,071,946 UART: [rt]cmd =0x4d454153, len=108
4,093,395 >>> mbox cmd response data (12 bytes)
4,093,396 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,383 UART: [rt]cmd =0x4d454153, len=108
4,144,475 >>> mbox cmd response data (12 bytes)
4,144,476 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,174,361 UART: [rt]cmd =0x4d454153, len=108
4,195,296 >>> mbox cmd response data (12 bytes)
4,195,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,225,460 UART: [rt]cmd =0x4d454153, len=108
4,227,327 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,118 UART: [kat] ++
895,270 UART: [kat] sha1
899,350 UART: [kat] SHA2-256
901,290 UART: [kat] SHA2-384
904,211 UART: [kat] SHA2-512-ACC
906,112 UART: [kat] ECC-384
916,197 UART: [kat] HMAC-384Kdf
920,755 UART: [kat] LMS
1,169,067 UART: [kat] --
1,169,962 UART: [cold-reset] ++
1,170,318 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,174,122 ready_for_fw is high
1,174,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,077 UART: [idev] Erasing UDS.KEYID = 0
1,199,449 UART: [idev] Sha1 KeyId Algorithm
1,208,261 UART: [idev] --
1,209,160 UART: [ldev] ++
1,209,328 UART: [ldev] CDI.KEYID = 6
1,209,692 UART: [ldev] SUBJECT.KEYID = 5
1,210,119 UART: [ldev] AUTHORITY.KEYID = 7
1,210,582 UART: [ldev] FE.KEYID = 1
1,215,538 UART: [ldev] Erasing FE.KEYID = 1
1,242,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,030 UART: [ldev] --
1,281,265 UART: [fwproc] Wait for Commands...
1,282,022 UART: [fwproc] Recv command 0x46574c44
1,282,755 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,337 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,512 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,665 >>> mbox cmd response: success
2,826,813 UART: [afmc] ++
2,826,981 UART: [afmc] CDI.KEYID = 6
2,827,344 UART: [afmc] SUBJECT.KEYID = 7
2,827,770 UART: [afmc] AUTHORITY.KEYID = 5
2,863,789 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,189 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,899 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,780 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,481 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,336 UART: [afmc] --
2,907,383 UART: [cold-reset] --
2,908,237 UART: [state] Locking Datavault
2,909,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,844 UART: [state] Locking ICCM
2,910,286 UART: [exit] Launching FMC @ 0x40000130
2,915,616 UART:
2,915,632 UART: Running Caliptra FMC ...
2,916,040 UART:
2,916,094 UART: [state] CFI Enabled
2,926,650 UART: [fht] FMC Alias Private Key: 7
3,045,500 UART: [art] Extend RT PCRs Done
3,045,928 UART: [art] Lock RT PCRs Done
3,047,244 UART: [art] Populate DV Done
3,055,605 UART: [fht] FMC Alias Private Key: 7
3,056,557 UART: [art] Derive CDI
3,056,837 UART: [art] Store in slot 0x4
3,142,822 UART: [art] Derive Key Pair
3,143,182 UART: [art] Store priv key in slot 0x5
3,156,550 UART: [art] Derive Key Pair - Done
3,171,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,919 UART: [art] PUB.X = 1BBFD383A105FAF1F0CE156064934C4F0C5D7D672CF660054BD5682B8E8A71BD0FD443FC5E58E3584F45D4FC82D7265B
3,194,689 UART: [art] PUB.Y = 432CB144904A71E5BB3AEAD92BCD3304995244DC1CF56625ED438CAD2E51E4329034518464C90BC3D153901A8D7B9AD1
3,201,637 UART: [art] SIG.R = E98C480010C029538B3314C0909EA7B086FC13CA23A264D368A2A1C8AEE968C643C75785DB833406D1F2383D1B39C273
3,208,378 UART: [art] SIG.S = 84F385565D42640714791E125341E93F6FBC51FDAE12DC448E99BE9A000A8AE6FC92B209F6A71BC6A65EA8534F4F1CB5
3,232,325 UART: Caliptra RT
3,232,576 UART: [state] CFI Enabled
3,351,906 UART: [rt] RT listening for mailbox commands...
3,352,576 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,966 UART: [rt]cmd =0x4d454153, len=108
3,404,018 >>> mbox cmd response data (12 bytes)
3,404,019 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,038 UART: [rt]cmd =0x4d454153, len=108
3,453,935 >>> mbox cmd response data (12 bytes)
3,453,936 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,185 UART: [rt]cmd =0x4d454153, len=108
3,504,757 >>> mbox cmd response data (12 bytes)
3,504,758 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,534,685 UART: [rt]cmd =0x4d454153, len=108
3,555,110 >>> mbox cmd response data (12 bytes)
3,555,111 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,174 UART: [rt]cmd =0x4d454153, len=108
3,606,392 >>> mbox cmd response data (12 bytes)
3,606,393 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,230 UART: [rt]cmd =0x4d454153, len=108
3,657,159 >>> mbox cmd response data (12 bytes)
3,657,160 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,155 UART: [rt]cmd =0x4d454153, len=108
3,708,041 >>> mbox cmd response data (12 bytes)
3,708,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,737,973 UART: [rt]cmd =0x4d454153, len=108
3,758,886 >>> mbox cmd response data (12 bytes)
3,758,887 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,788,958 UART: [rt]cmd =0x4d454153, len=108
3,809,290 >>> mbox cmd response data (12 bytes)
3,809,291 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,418 UART: [rt]cmd =0x4d454153, len=108
3,860,253 >>> mbox cmd response data (12 bytes)
3,860,254 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,889,971 UART: [rt]cmd =0x4d454153, len=108
3,911,257 >>> mbox cmd response data (12 bytes)
3,911,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,257 UART: [rt]cmd =0x4d454153, len=108
3,962,158 >>> mbox cmd response data (12 bytes)
3,962,159 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,992,258 UART: [rt]cmd =0x4d454153, len=108
4,013,570 >>> mbox cmd response data (12 bytes)
4,013,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,043,492 UART: [rt]cmd =0x4d454153, len=108
4,064,401 >>> mbox cmd response data (12 bytes)
4,064,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,094,443 UART: [rt]cmd =0x4d454153, len=108
4,096,470 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,750 ready_for_fw is high
1,058,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,900 >>> mbox cmd response: success
2,740,303 UART:
2,740,319 UART: Running Caliptra FMC ...
2,740,727 UART:
2,740,781 UART: [state] CFI Enabled
2,751,325 UART: [fht] FMC Alias Private Key: 7
2,870,023 UART: [art] Extend RT PCRs Done
2,870,451 UART: [art] Lock RT PCRs Done
2,871,939 UART: [art] Populate DV Done
2,880,180 UART: [fht] FMC Alias Private Key: 7
2,881,242 UART: [art] Derive CDI
2,881,522 UART: [art] Store in slot 0x4
2,966,957 UART: [art] Derive Key Pair
2,967,317 UART: [art] Store priv key in slot 0x5
2,981,023 UART: [art] Derive Key Pair - Done
2,995,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,912 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,677 UART: [art] PUB.X = DED8EABD224CB91C14E4FAD521436E22CC3FA136B6B671CB4D17079FB39A4075555C4975AF39FE3D1C27210B2C86E46D
3,018,455 UART: [art] PUB.Y = 2488819ED54AD1BF7E7C2DCFF608011F84A8D29B2D39E488747A0DB567D5A979B1189DD950BFCBC69970E957CED64108
3,025,401 UART: [art] SIG.R = F6767530E0E599CF40C9535A5F0FFBC0CE1DDD110595CA4CCC0D5A9C7FE3D80A3223EB0240AB7DE9EE681B220AA0B9DB
3,032,177 UART: [art] SIG.S = 8AE18D3082EB1EDCE4FD35958F1A86648E996547479B30E9D64E21304B3E7E172A952A55DD4D23511E7A3317C55E4C4A
3,055,575 UART: Caliptra RT
3,055,826 UART: [state] CFI Enabled
3,175,226 UART: [rt] RT listening for mailbox commands...
3,175,896 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,452 UART: [rt]cmd =0x4d454153, len=108
3,227,400 >>> mbox cmd response data (12 bytes)
3,227,401 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,257,526 UART: [rt]cmd =0x4d454153, len=108
3,278,389 >>> mbox cmd response data (12 bytes)
3,278,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,215 UART: [rt]cmd =0x4d454153, len=108
3,329,057 >>> mbox cmd response data (12 bytes)
3,329,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,359,173 UART: [rt]cmd =0x4d454153, len=108
3,379,798 >>> mbox cmd response data (12 bytes)
3,379,799 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,020 UART: [rt]cmd =0x4d454153, len=108
3,431,230 >>> mbox cmd response data (12 bytes)
3,431,231 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,404 UART: [rt]cmd =0x4d454153, len=108
3,482,315 >>> mbox cmd response data (12 bytes)
3,482,316 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,437 UART: [rt]cmd =0x4d454153, len=108
3,533,079 >>> mbox cmd response data (12 bytes)
3,533,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,563,259 UART: [rt]cmd =0x4d454153, len=108
3,583,836 >>> mbox cmd response data (12 bytes)
3,583,837 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,598 UART: [rt]cmd =0x4d454153, len=108
3,635,442 >>> mbox cmd response data (12 bytes)
3,635,443 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,665,434 UART: [rt]cmd =0x4d454153, len=108
3,686,369 >>> mbox cmd response data (12 bytes)
3,686,370 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,716,539 UART: [rt]cmd =0x4d454153, len=108
3,737,681 >>> mbox cmd response data (12 bytes)
3,737,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,767,625 UART: [rt]cmd =0x4d454153, len=108
3,788,512 >>> mbox cmd response data (12 bytes)
3,788,513 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,722 UART: [rt]cmd =0x4d454153, len=108
3,839,828 >>> mbox cmd response data (12 bytes)
3,839,829 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,869,828 UART: [rt]cmd =0x4d454153, len=108
3,890,541 >>> mbox cmd response data (12 bytes)
3,890,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,920,585 UART: [rt]cmd =0x4d454153, len=108
3,922,594 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,364 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,639 UART: [kat] SHA2-256
901,579 UART: [kat] SHA2-384
904,270 UART: [kat] SHA2-512-ACC
906,171 UART: [kat] ECC-384
915,522 UART: [kat] HMAC-384Kdf
920,058 UART: [kat] LMS
1,168,370 UART: [kat] --
1,169,411 UART: [cold-reset] ++
1,169,935 UART: [fht] FHT @ 0x50003400
1,172,807 UART: [idev] ++
1,172,975 UART: [idev] CDI.KEYID = 6
1,173,336 UART: [idev] SUBJECT.KEYID = 7
1,173,761 UART: [idev] UDS.KEYID = 0
1,174,107 ready_for_fw is high
1,174,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,996 UART: [idev] Erasing UDS.KEYID = 0
1,198,842 UART: [idev] Sha1 KeyId Algorithm
1,207,678 UART: [idev] --
1,208,927 UART: [ldev] ++
1,209,095 UART: [ldev] CDI.KEYID = 6
1,209,459 UART: [ldev] SUBJECT.KEYID = 5
1,209,886 UART: [ldev] AUTHORITY.KEYID = 7
1,210,349 UART: [ldev] FE.KEYID = 1
1,215,593 UART: [ldev] Erasing FE.KEYID = 1
1,241,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,987 UART: [ldev] --
1,281,362 UART: [fwproc] Wait for Commands...
1,282,147 UART: [fwproc] Recv command 0x46574c44
1,282,880 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,332 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,507 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,756 >>> mbox cmd response: success
2,827,002 UART: [afmc] ++
2,827,170 UART: [afmc] CDI.KEYID = 6
2,827,533 UART: [afmc] SUBJECT.KEYID = 7
2,827,959 UART: [afmc] AUTHORITY.KEYID = 5
2,863,388 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,416 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,126 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,007 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,708 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,525 UART: [afmc] --
2,906,446 UART: [cold-reset] --
2,907,208 UART: [state] Locking Datavault
2,908,235 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,839 UART: [state] Locking ICCM
2,909,327 UART: [exit] Launching FMC @ 0x40000130
2,914,657 UART:
2,914,673 UART: Running Caliptra FMC ...
2,915,081 UART:
2,915,224 UART: [state] CFI Enabled
2,925,746 UART: [fht] FMC Alias Private Key: 7
3,045,628 UART: [art] Extend RT PCRs Done
3,046,056 UART: [art] Lock RT PCRs Done
3,047,670 UART: [art] Populate DV Done
3,055,931 UART: [fht] FMC Alias Private Key: 7
3,057,075 UART: [art] Derive CDI
3,057,355 UART: [art] Store in slot 0x4
3,143,418 UART: [art] Derive Key Pair
3,143,778 UART: [art] Store priv key in slot 0x5
3,157,060 UART: [art] Derive Key Pair - Done
3,171,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,162 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,927 UART: [art] PUB.X = 8CC1C8E0FA4501649C9DD7107FC388D1EFB421FC7D09CB78137F623B8EFAA65F25115A9DAA4A70BAC4C93F650E01AB3D
3,194,705 UART: [art] PUB.Y = 359D7F8EC98DF62CFB5709135A04D9E014D1E73C618CCD7E5530EE5E03FA298FCB64538C60447BD4D7406CAABB65CB90
3,201,660 UART: [art] SIG.R = 60826116E1DA9D970543B7CFB6D24A776DDEA45B5FDC69F8376D57B8D23037AD078ABC8C98478B32B3EA7DA05E5A53D3
3,208,436 UART: [art] SIG.S = 0A1E30556FD491811E69B2CA819ED28EC9303BC8DFAA19DA39146311CA879F7595C744D5A2C3C287D566D928CDE08D1A
3,232,149 UART: Caliptra RT
3,232,492 UART: [state] CFI Enabled
3,352,582 UART: [rt] RT listening for mailbox commands...
3,353,252 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,952 UART: [rt]cmd =0x4d454153, len=108
3,404,214 >>> mbox cmd response data (12 bytes)
3,404,215 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,326 UART: [rt]cmd =0x4d454153, len=108
3,454,673 >>> mbox cmd response data (12 bytes)
3,454,674 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,735 UART: [rt]cmd =0x4d454153, len=108
3,505,131 >>> mbox cmd response data (12 bytes)
3,505,132 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,535,153 UART: [rt]cmd =0x4d454153, len=108
3,555,832 >>> mbox cmd response data (12 bytes)
3,555,833 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,850 UART: [rt]cmd =0x4d454153, len=108
3,606,172 >>> mbox cmd response data (12 bytes)
3,606,173 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,438 UART: [rt]cmd =0x4d454153, len=108
3,657,991 >>> mbox cmd response data (12 bytes)
3,657,992 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,987 UART: [rt]cmd =0x4d454153, len=108
3,709,005 >>> mbox cmd response data (12 bytes)
3,709,006 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,739,107 UART: [rt]cmd =0x4d454153, len=108
3,759,846 >>> mbox cmd response data (12 bytes)
3,759,847 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,206 UART: [rt]cmd =0x4d454153, len=108
3,811,756 >>> mbox cmd response data (12 bytes)
3,811,757 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,802 UART: [rt]cmd =0x4d454153, len=108
3,862,571 >>> mbox cmd response data (12 bytes)
3,862,572 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,699 UART: [rt]cmd =0x4d454153, len=108
3,912,147 >>> mbox cmd response data (12 bytes)
3,912,148 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,129 UART: [rt]cmd =0x4d454153, len=108
3,963,912 >>> mbox cmd response data (12 bytes)
3,963,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,993,934 UART: [rt]cmd =0x4d454153, len=108
4,014,986 >>> mbox cmd response data (12 bytes)
4,014,987 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,044,768 UART: [rt]cmd =0x4d454153, len=108
4,065,573 >>> mbox cmd response data (12 bytes)
4,065,574 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,095,525 UART: [rt]cmd =0x4d454153, len=108
4,097,786 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,339 ready_for_fw is high
1,059,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,021 >>> mbox cmd response: success
2,741,578 UART:
2,741,594 UART: Running Caliptra FMC ...
2,742,002 UART:
2,742,145 UART: [state] CFI Enabled
2,753,029 UART: [fht] FMC Alias Private Key: 7
2,871,957 UART: [art] Extend RT PCRs Done
2,872,385 UART: [art] Lock RT PCRs Done
2,873,963 UART: [art] Populate DV Done
2,882,112 UART: [fht] FMC Alias Private Key: 7
2,883,122 UART: [art] Derive CDI
2,883,402 UART: [art] Store in slot 0x4
2,969,481 UART: [art] Derive Key Pair
2,969,841 UART: [art] Store priv key in slot 0x5
2,983,619 UART: [art] Derive Key Pair - Done
2,997,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,290 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,055 UART: [art] PUB.X = 32AC43F6CFEE3A132FCA38A644A1F2683B6702FF43A54F457F69F812B7EF24AA1D373D12F71DE76176FF742D31830D47
3,020,827 UART: [art] PUB.Y = CB73C3392BACBA96FA5DF53280DADAE8B5A7E20DE5D632526A1565C5A4FDCD395F4F47756FEDB9A57839FB3AE01C22A9
3,027,798 UART: [art] SIG.R = 1789A34F758609F88FE3D34AC057F4B680953C233E98A23F0F98AF98BC98311E32D006519690104B4EB2A5DE3F9429CB
3,034,557 UART: [art] SIG.S = 37CEE5EF5ABB0FA225196AE46B432C26F5F4E6CFA276D8A94E2B318EC90AA1223FEC44BB2C7F89C5B9F947B37292D974
3,057,923 UART: Caliptra RT
3,058,266 UART: [state] CFI Enabled
3,177,804 UART: [rt] RT listening for mailbox commands...
3,178,474 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,858 UART: [rt]cmd =0x4d454153, len=108
3,229,162 >>> mbox cmd response data (12 bytes)
3,229,163 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,259,182 UART: [rt]cmd =0x4d454153, len=108
3,279,941 >>> mbox cmd response data (12 bytes)
3,279,942 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,997 UART: [rt]cmd =0x4d454153, len=108
3,329,959 >>> mbox cmd response data (12 bytes)
3,329,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,360,083 UART: [rt]cmd =0x4d454153, len=108
3,381,110 >>> mbox cmd response data (12 bytes)
3,381,111 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,094 UART: [rt]cmd =0x4d454153, len=108
3,432,232 >>> mbox cmd response data (12 bytes)
3,432,233 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,462,276 UART: [rt]cmd =0x4d454153, len=108
3,483,233 >>> mbox cmd response data (12 bytes)
3,483,234 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,461 UART: [rt]cmd =0x4d454153, len=108
3,535,097 >>> mbox cmd response data (12 bytes)
3,535,098 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,565,061 UART: [rt]cmd =0x4d454153, len=108
3,586,756 >>> mbox cmd response data (12 bytes)
3,586,757 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,616,896 UART: [rt]cmd =0x4d454153, len=108
3,637,860 >>> mbox cmd response data (12 bytes)
3,637,861 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,950 UART: [rt]cmd =0x4d454153, len=108
3,689,469 >>> mbox cmd response data (12 bytes)
3,689,470 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,771 UART: [rt]cmd =0x4d454153, len=108
3,741,055 >>> mbox cmd response data (12 bytes)
3,741,056 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,771,087 UART: [rt]cmd =0x4d454153, len=108
3,791,962 >>> mbox cmd response data (12 bytes)
3,791,963 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,821,788 UART: [rt]cmd =0x4d454153, len=108
3,843,164 >>> mbox cmd response data (12 bytes)
3,843,165 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,873,066 UART: [rt]cmd =0x4d454153, len=108
3,893,625 >>> mbox cmd response data (12 bytes)
3,893,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,923,641 UART: [rt]cmd =0x4d454153, len=108
3,925,858 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,544 UART: [state] LifecycleState = Unprovisioned
85,199 UART: [state] DebugLocked = No
85,805 UART: [state] WD Timer not started. Device not locked for debugging
87,146 UART: [kat] SHA2-256
892,796 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,921 UART: [kat] ++
897,073 UART: [kat] sha1
901,243 UART: [kat] SHA2-256
903,183 UART: [kat] SHA2-384
905,784 UART: [kat] SHA2-512-ACC
907,685 UART: [kat] ECC-384
917,382 UART: [kat] HMAC-384Kdf
921,934 UART: [kat] LMS
1,170,262 UART: [kat] --
1,171,091 UART: [cold-reset] ++
1,171,463 UART: [fht] FHT @ 0x50003400
1,174,188 UART: [idev] ++
1,174,356 UART: [idev] CDI.KEYID = 6
1,174,716 UART: [idev] SUBJECT.KEYID = 7
1,175,140 UART: [idev] UDS.KEYID = 0
1,175,485 ready_for_fw is high
1,175,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,482 UART: [idev] Erasing UDS.KEYID = 0
1,200,513 UART: [idev] Sha1 KeyId Algorithm
1,208,815 UART: [idev] --
1,209,881 UART: [ldev] ++
1,210,049 UART: [ldev] CDI.KEYID = 6
1,210,412 UART: [ldev] SUBJECT.KEYID = 5
1,210,838 UART: [ldev] AUTHORITY.KEYID = 7
1,211,301 UART: [ldev] FE.KEYID = 1
1,216,293 UART: [ldev] Erasing FE.KEYID = 1
1,242,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,879 UART: [ldev] --
1,282,204 UART: [fwproc] Wait for Commands...
1,282,838 UART: [fwproc] Recv command 0x46574c44
1,283,566 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,138 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,308 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,537 >>> mbox cmd response: success
2,828,749 UART: [afmc] ++
2,828,917 UART: [afmc] CDI.KEYID = 6
2,829,279 UART: [afmc] SUBJECT.KEYID = 7
2,829,704 UART: [afmc] AUTHORITY.KEYID = 5
2,865,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,150 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,859 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,742 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,443 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,345 UART: [afmc] --
2,908,445 UART: [cold-reset] --
2,909,275 UART: [state] Locking Datavault
2,910,490 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,094 UART: [state] Locking ICCM
2,911,710 UART: [exit] Launching FMC @ 0x40000130
2,917,040 UART:
2,917,056 UART: Running Caliptra FMC ...
2,917,464 UART:
2,917,518 UART: [state] CFI Enabled
2,928,088 UART: [fht] FMC Alias Private Key: 7
3,046,800 UART: [art] Extend RT PCRs Done
3,047,228 UART: [art] Lock RT PCRs Done
3,048,724 UART: [art] Populate DV Done
3,057,117 UART: [fht] FMC Alias Private Key: 7
3,058,247 UART: [art] Derive CDI
3,058,527 UART: [art] Store in slot 0x4
3,144,632 UART: [art] Derive Key Pair
3,144,992 UART: [art] Store priv key in slot 0x5
3,158,292 UART: [art] Derive Key Pair - Done
3,172,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,597 UART: [art] PUB.X = 5E3AC8F5C3D185BCC222F8720095273D20C4F6F2FD97D2624D9FFAA2468047A2ACDADFB82F486BD811A66E8905FA2B82
3,196,356 UART: [art] PUB.Y = 5B54123A6A228928230DD4C98F7FE778C4088576596689CC977EB6789CF474B22F791DE4A1FE4776C48BA4834A2C3275
3,203,294 UART: [art] SIG.R = 6F2B843F826D659E30D266AD4E0635B41714B21AB286E911B85D0474D14F2D46BC875A1117FBC8E40B6D493F679E47C7
3,210,055 UART: [art] SIG.S = 9F895AEAB86FCBAC8031F52CD34B5532DF32FCC8413DF252C04FA1C70F68073AA57946E5A496DD16B788D45D063CBD80
3,233,660 UART: Caliptra RT
3,233,911 UART: [state] CFI Enabled
3,353,996 UART: [rt] RT listening for mailbox commands...
3,354,666 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,010 UART: [rt]cmd =0x4d454153, len=108
3,405,670 >>> mbox cmd response data (12 bytes)
3,405,671 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,435,888 UART: [rt]cmd =0x4d454153, len=108
3,456,677 >>> mbox cmd response data (12 bytes)
3,456,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,433 UART: [rt]cmd =0x4d454153, len=108
3,507,379 >>> mbox cmd response data (12 bytes)
3,507,380 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,537,371 UART: [rt]cmd =0x4d454153, len=108
3,558,268 >>> mbox cmd response data (12 bytes)
3,558,269 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,588,308 UART: [rt]cmd =0x4d454153, len=108
3,608,714 >>> mbox cmd response data (12 bytes)
3,608,715 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,702 UART: [rt]cmd =0x4d454153, len=108
3,659,227 >>> mbox cmd response data (12 bytes)
3,659,228 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,375 UART: [rt]cmd =0x4d454153, len=108
3,709,637 >>> mbox cmd response data (12 bytes)
3,709,638 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,739,743 UART: [rt]cmd =0x4d454153, len=108
3,760,348 >>> mbox cmd response data (12 bytes)
3,760,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,282 UART: [rt]cmd =0x4d454153, len=108
3,810,628 >>> mbox cmd response data (12 bytes)
3,810,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,554 UART: [rt]cmd =0x4d454153, len=108
3,861,407 >>> mbox cmd response data (12 bytes)
3,861,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,493 UART: [rt]cmd =0x4d454153, len=108
3,911,907 >>> mbox cmd response data (12 bytes)
3,911,908 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,657 UART: [rt]cmd =0x4d454153, len=108
3,962,630 >>> mbox cmd response data (12 bytes)
3,962,631 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,992,778 UART: [rt]cmd =0x4d454153, len=108
4,013,440 >>> mbox cmd response data (12 bytes)
4,013,441 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,043,458 UART: [rt]cmd =0x4d454153, len=108
4,064,539 >>> mbox cmd response data (12 bytes)
4,064,540 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,094,589 UART: [rt]cmd =0x4d454153, len=108
4,096,494 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,341 ready_for_fw is high
1,060,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,842 >>> mbox cmd response: success
2,741,493 UART:
2,741,509 UART: Running Caliptra FMC ...
2,741,917 UART:
2,741,971 UART: [state] CFI Enabled
2,751,883 UART: [fht] FMC Alias Private Key: 7
2,871,045 UART: [art] Extend RT PCRs Done
2,871,473 UART: [art] Lock RT PCRs Done
2,872,909 UART: [art] Populate DV Done
2,881,358 UART: [fht] FMC Alias Private Key: 7
2,882,502 UART: [art] Derive CDI
2,882,782 UART: [art] Store in slot 0x4
2,968,749 UART: [art] Derive Key Pair
2,969,109 UART: [art] Store priv key in slot 0x5
2,982,215 UART: [art] Derive Key Pair - Done
2,997,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,764 UART: [art] PUB.X = 57F929C4A9697D5F13424E0DA22F94F5182EA362F95AFEFC5116A79B4A3B4EEF196C169D8F39896B11E999108218E034
3,020,531 UART: [art] PUB.Y = 8D85CFB04D0D3972F63CB48321A0B9A5D05C99FA992FB0B618200476A6EEE477114C1D014B5D57012DB4BAD961C16D5F
3,027,477 UART: [art] SIG.R = F6C7BF48631D4111E7F95017E816E0F023F5BAA4803D638071B36215CD88A4948E4CA08E8D75569751CB13A3B7B74B90
3,034,245 UART: [art] SIG.S = 1D32239CFFB59AED2BF297D76D2F96D84DDC2D01FD8F6A09A42A0A728AE94A75D8E9D0856B029FE1A68885085E7FFC5D
3,057,694 UART: Caliptra RT
3,057,945 UART: [state] CFI Enabled
3,178,084 UART: [rt] RT listening for mailbox commands...
3,178,754 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,044 UART: [rt]cmd =0x4d454153, len=108
3,229,812 >>> mbox cmd response data (12 bytes)
3,229,813 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,259,852 UART: [rt]cmd =0x4d454153, len=108
3,280,851 >>> mbox cmd response data (12 bytes)
3,280,852 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,310,707 UART: [rt]cmd =0x4d454153, len=108
3,331,781 >>> mbox cmd response data (12 bytes)
3,331,782 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,361,843 UART: [rt]cmd =0x4d454153, len=108
3,383,036 >>> mbox cmd response data (12 bytes)
3,383,037 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,032 UART: [rt]cmd =0x4d454153, len=108
3,433,736 >>> mbox cmd response data (12 bytes)
3,433,737 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,463,634 UART: [rt]cmd =0x4d454153, len=108
3,484,781 >>> mbox cmd response data (12 bytes)
3,484,782 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,825 UART: [rt]cmd =0x4d454153, len=108
3,535,169 >>> mbox cmd response data (12 bytes)
3,535,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,565,309 UART: [rt]cmd =0x4d454153, len=108
3,586,562 >>> mbox cmd response data (12 bytes)
3,586,563 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,616,658 UART: [rt]cmd =0x4d454153, len=108
3,637,532 >>> mbox cmd response data (12 bytes)
3,637,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,396 UART: [rt]cmd =0x4d454153, len=108
3,688,307 >>> mbox cmd response data (12 bytes)
3,688,308 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,447 UART: [rt]cmd =0x4d454153, len=108
3,739,013 >>> mbox cmd response data (12 bytes)
3,739,014 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,769,357 UART: [rt]cmd =0x4d454153, len=108
3,790,782 >>> mbox cmd response data (12 bytes)
3,790,783 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,950 UART: [rt]cmd =0x4d454153, len=108
3,841,584 >>> mbox cmd response data (12 bytes)
3,841,585 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,871,768 UART: [rt]cmd =0x4d454153, len=108
3,892,475 >>> mbox cmd response data (12 bytes)
3,892,476 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,922,381 UART: [rt]cmd =0x4d454153, len=108
3,924,484 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
893,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,662 UART: [kat] ++
897,814 UART: [kat] sha1
901,934 UART: [kat] SHA2-256
903,874 UART: [kat] SHA2-384
906,741 UART: [kat] SHA2-512-ACC
908,642 UART: [kat] ECC-384
918,165 UART: [kat] HMAC-384Kdf
922,747 UART: [kat] LMS
1,171,075 UART: [kat] --
1,172,150 UART: [cold-reset] ++
1,172,688 UART: [fht] FHT @ 0x50003400
1,175,479 UART: [idev] ++
1,175,647 UART: [idev] CDI.KEYID = 6
1,176,007 UART: [idev] SUBJECT.KEYID = 7
1,176,431 UART: [idev] UDS.KEYID = 0
1,176,776 ready_for_fw is high
1,176,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,237 UART: [idev] Erasing UDS.KEYID = 0
1,201,452 UART: [idev] Sha1 KeyId Algorithm
1,209,916 UART: [idev] --
1,210,776 UART: [ldev] ++
1,210,944 UART: [ldev] CDI.KEYID = 6
1,211,307 UART: [ldev] SUBJECT.KEYID = 5
1,211,733 UART: [ldev] AUTHORITY.KEYID = 7
1,212,196 UART: [ldev] FE.KEYID = 1
1,217,622 UART: [ldev] Erasing FE.KEYID = 1
1,244,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,906 UART: [ldev] --
1,284,403 UART: [fwproc] Wait for Commands...
1,285,105 UART: [fwproc] Recv command 0x46574c44
1,285,833 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,797 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,967 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,364 >>> mbox cmd response: success
2,830,542 UART: [afmc] ++
2,830,710 UART: [afmc] CDI.KEYID = 6
2,831,072 UART: [afmc] SUBJECT.KEYID = 7
2,831,497 UART: [afmc] AUTHORITY.KEYID = 5
2,866,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,873 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,582 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,465 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,166 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,888 UART: [afmc] --
2,909,774 UART: [cold-reset] --
2,910,350 UART: [state] Locking Datavault
2,911,541 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,145 UART: [state] Locking ICCM
2,912,725 UART: [exit] Launching FMC @ 0x40000130
2,918,055 UART:
2,918,071 UART: Running Caliptra FMC ...
2,918,479 UART:
2,918,622 UART: [state] CFI Enabled
2,929,284 UART: [fht] FMC Alias Private Key: 7
3,048,160 UART: [art] Extend RT PCRs Done
3,048,588 UART: [art] Lock RT PCRs Done
3,050,290 UART: [art] Populate DV Done
3,058,751 UART: [fht] FMC Alias Private Key: 7
3,059,829 UART: [art] Derive CDI
3,060,109 UART: [art] Store in slot 0x4
3,145,968 UART: [art] Derive Key Pair
3,146,328 UART: [art] Store priv key in slot 0x5
3,159,666 UART: [art] Derive Key Pair - Done
3,174,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,627 UART: [art] PUB.X = 544512E8237165771A58500C205860F1F8B62B98FD6B87071D75577455897616F3FB1D1D8F9117CF2F21AAC292A6E0D0
3,197,381 UART: [art] PUB.Y = 75D640DF25DF2C474BC5CF2417767E05C2EF8766A6677A4338F16B13DAB64F06EDC526813A1922292DAAD42A46A77CA4
3,204,331 UART: [art] SIG.R = AB7F6E8CCD43C7D7890A4283755044E11EA7437BA95DF9279BF6A10419D1984C6912CF3A641FC5DD270816B84AC20537
3,211,091 UART: [art] SIG.S = 0630C99D6CCD8D6C1950F5F5EF7661E738283209289D8361D13ED2EE7CC9CBC1DF36A9C0BB54F84D291C97ED8E12F4CC
3,235,099 UART: Caliptra RT
3,235,442 UART: [state] CFI Enabled
3,354,833 UART: [rt] RT listening for mailbox commands...
3,355,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,843 UART: [rt]cmd =0x4d454153, len=108
3,406,503 >>> mbox cmd response data (12 bytes)
3,406,504 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,437 UART: [rt]cmd =0x4d454153, len=108
3,456,790 >>> mbox cmd response data (12 bytes)
3,456,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,884 UART: [rt]cmd =0x4d454153, len=108
3,507,390 >>> mbox cmd response data (12 bytes)
3,507,391 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,537,522 UART: [rt]cmd =0x4d454153, len=108
3,558,455 >>> mbox cmd response data (12 bytes)
3,558,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,588,697 UART: [rt]cmd =0x4d454153, len=108
3,609,299 >>> mbox cmd response data (12 bytes)
3,609,300 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,251 UART: [rt]cmd =0x4d454153, len=108
3,659,690 >>> mbox cmd response data (12 bytes)
3,659,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,820 UART: [rt]cmd =0x4d454153, len=108
3,711,138 >>> mbox cmd response data (12 bytes)
3,711,139 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,208 UART: [rt]cmd =0x4d454153, len=108
3,762,245 >>> mbox cmd response data (12 bytes)
3,762,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,792,425 UART: [rt]cmd =0x4d454153, len=108
3,813,663 >>> mbox cmd response data (12 bytes)
3,813,664 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,615 UART: [rt]cmd =0x4d454153, len=108
3,864,380 >>> mbox cmd response data (12 bytes)
3,864,381 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,894,462 UART: [rt]cmd =0x4d454153, len=108
3,914,778 >>> mbox cmd response data (12 bytes)
3,914,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,836 UART: [rt]cmd =0x4d454153, len=108
3,965,679 >>> mbox cmd response data (12 bytes)
3,965,680 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,995,647 UART: [rt]cmd =0x4d454153, len=108
4,016,945 >>> mbox cmd response data (12 bytes)
4,016,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,047,019 UART: [rt]cmd =0x4d454153, len=108
4,067,824 >>> mbox cmd response data (12 bytes)
4,067,825 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,097,722 UART: [rt]cmd =0x4d454153, len=108
4,099,971 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,594 ready_for_fw is high
1,060,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,033 >>> mbox cmd response: success
2,742,512 UART:
2,742,528 UART: Running Caliptra FMC ...
2,742,936 UART:
2,743,079 UART: [state] CFI Enabled
2,753,641 UART: [fht] FMC Alias Private Key: 7
2,872,163 UART: [art] Extend RT PCRs Done
2,872,591 UART: [art] Lock RT PCRs Done
2,874,057 UART: [art] Populate DV Done
2,882,320 UART: [fht] FMC Alias Private Key: 7
2,883,452 UART: [art] Derive CDI
2,883,732 UART: [art] Store in slot 0x4
2,969,787 UART: [art] Derive Key Pair
2,970,147 UART: [art] Store priv key in slot 0x5
2,983,909 UART: [art] Derive Key Pair - Done
2,998,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,299 UART: [art] PUB.X = 22CB06125294248087EF3614C4C41C9895188972C4803E6A46EBC88BA701206CC6F9BDBAD7273A8D57F7CBAE5D16AB83
3,021,067 UART: [art] PUB.Y = B69DBDA0AC4601B3D701ED9DBD7B8D9EB49130BC3D1E1A9701B6A26939A544E0DEDD07EBDCC63613AE947F59BC7F55FD
3,028,031 UART: [art] SIG.R = 3A45CAC45813EBD6F4579CB77ED272C021CE46FDAF4217DD5489DC34F690DCA646CD24A853CFEA41664B7FF82B19C337
3,034,817 UART: [art] SIG.S = 0670E55B155A4ACD92C9177D5DF3B132859BD9CFEB299904A470D9A7EBFC3C8FDAF6FF52BC547E04C1D33DD2455B51B1
3,059,094 UART: Caliptra RT
3,059,437 UART: [state] CFI Enabled
3,179,629 UART: [rt] RT listening for mailbox commands...
3,180,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,541 UART: [rt]cmd =0x4d454153, len=108
3,231,607 >>> mbox cmd response data (12 bytes)
3,231,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,261,489 UART: [rt]cmd =0x4d454153, len=108
3,281,708 >>> mbox cmd response data (12 bytes)
3,281,709 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,311,624 UART: [rt]cmd =0x4d454153, len=108
3,332,722 >>> mbox cmd response data (12 bytes)
3,332,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,362,640 UART: [rt]cmd =0x4d454153, len=108
3,382,877 >>> mbox cmd response data (12 bytes)
3,382,878 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,997 UART: [rt]cmd =0x4d454153, len=108
3,434,189 >>> mbox cmd response data (12 bytes)
3,434,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,464,257 UART: [rt]cmd =0x4d454153, len=108
3,485,172 >>> mbox cmd response data (12 bytes)
3,485,173 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,242 UART: [rt]cmd =0x4d454153, len=108
3,535,382 >>> mbox cmd response data (12 bytes)
3,535,383 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,565,548 UART: [rt]cmd =0x4d454153, len=108
3,586,837 >>> mbox cmd response data (12 bytes)
3,586,838 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,616,905 UART: [rt]cmd =0x4d454153, len=108
3,638,527 >>> mbox cmd response data (12 bytes)
3,638,528 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,763 UART: [rt]cmd =0x4d454153, len=108
3,690,432 >>> mbox cmd response data (12 bytes)
3,690,433 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,644 UART: [rt]cmd =0x4d454153, len=108
3,741,496 >>> mbox cmd response data (12 bytes)
3,741,497 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,771,504 UART: [rt]cmd =0x4d454153, len=108
3,793,093 >>> mbox cmd response data (12 bytes)
3,793,094 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,823,101 UART: [rt]cmd =0x4d454153, len=108
3,843,995 >>> mbox cmd response data (12 bytes)
3,843,996 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,874,143 UART: [rt]cmd =0x4d454153, len=108
3,895,632 >>> mbox cmd response data (12 bytes)
3,895,633 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,925,712 UART: [rt]cmd =0x4d454153, len=108
3,927,605 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,075 UART:
192,436 UART: Running Caliptra ROM ...
193,591 UART:
193,741 UART: [state] CFI Enabled
256,816 UART: [state] LifecycleState = Unprovisioned
258,798 UART: [state] DebugLocked = No
261,542 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,197 UART: [kat] SHA2-256
436,895 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,421 UART: [kat] ++
448,036 UART: [kat] sha1
458,816 UART: [kat] SHA2-256
461,562 UART: [kat] SHA2-384
467,125 UART: [kat] SHA2-512-ACC
469,494 UART: [kat] ECC-384
2,758,399 UART: [kat] HMAC-384Kdf
2,791,075 UART: [kat] LMS
3,981,385 UART: [kat] --
3,986,391 UART: [cold-reset] ++
3,987,689 UART: [fht] Storing FHT @ 0x50003400
3,998,452 UART: [idev] ++
3,999,016 UART: [idev] CDI.KEYID = 6
4,000,051 UART: [idev] SUBJECT.KEYID = 7
4,001,237 UART: [idev] UDS.KEYID = 0
4,002,299 ready_for_fw is high
4,002,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,151,602 UART: [idev] Erasing UDS.KEYID = 0
7,339,513 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,190 UART: [idev] --
7,365,462 UART: [ldev] ++
7,366,086 UART: [ldev] CDI.KEYID = 6
7,367,008 UART: [ldev] SUBJECT.KEYID = 5
7,368,225 UART: [ldev] AUTHORITY.KEYID = 7
7,369,515 UART: [ldev] FE.KEYID = 1
7,415,448 UART: [ldev] Erasing FE.KEYID = 1
10,751,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,061,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,076,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,091,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,105,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,245 UART: [ldev] --
13,128,377 UART: [fwproc] Waiting for Commands...
13,130,143 UART: [fwproc] Received command 0x46574c44
13,132,329 UART: [fwproc] Received Image of size 118548 bytes
17,234,027 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,310,487 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,383,647 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,712,515 >>> mbox cmd response: success
17,717,246 UART: [afmc] ++
17,717,869 UART: [afmc] CDI.KEYID = 6
17,718,942 UART: [afmc] SUBJECT.KEYID = 7
17,720,049 UART: [afmc] AUTHORITY.KEYID = 5
21,085,895 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,383,915 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,386,226 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,400,608 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,415,392 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,429,764 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,451,153 UART: [afmc] --
23,455,877 UART: [cold-reset] --
23,458,962 UART: [state] Locking Datavault
23,464,386 UART: [state] Locking PCR0, PCR1 and PCR31
23,466,140 UART: [state] Locking ICCM
23,467,759 UART: [exit] Launching FMC @ 0x40000130
23,476,159 UART:
23,476,394 UART: Running Caliptra FMC ...
23,477,492 UART:
23,477,653 UART: [state] CFI Enabled
23,543,133 UART: [fht] FMC Alias Private Key: 7
25,883,000 UART: [art] Extend RT PCRs Done
25,884,243 UART: [art] Lock RT PCRs Done
25,885,923 UART: [art] Populate DV Done
25,891,247 UART: [fht] FMC Alias Private Key: 7
25,892,945 UART: [art] Derive CDI
25,893,775 UART: [art] Store in slot 0x4
25,950,602 UART: [art] Derive Key Pair
25,951,621 UART: [art] Store priv key in slot 0x5
29,244,213 UART: [art] Derive Key Pair - Done
29,256,844 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,027 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,540 UART: [art] PUB.X = CABFBA26F38CAC7F9CE0125A0C6A61EA2777AF99C5F48068FE8CCE80FC21275E9FB955FA22D16F3522E3B2524A25D14F
31,554,823 UART: [art] PUB.Y = A4855322328669AE5DD45ADB8C88E8F227EBC0934A7A7B337F8A8A33FBAD56875CAD4036D99777C932B4E634EB221CF8
31,562,079 UART: [art] SIG.R = 1C65BFE629A9F257B97ED9FB9182C6919110F39986F7FA16E8583FA010F892A534183806FF769DD98551B38BCF610F5F
31,569,488 UART: [art] SIG.S = 1916EFAC970B7AC9617A7434BBEA1A552E5C16245EEB4716C6A23C58E043B1F396D386B0FEE5535450AA6F3FA5609CC1
32,874,494 UART: Caliptra RT
32,875,226 UART: [state] CFI Enabled
33,052,830 UART: [rt] RT listening for mailbox commands...
33,054,749 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,084,952 UART: [rt]cmd =0x44504543, len=40
33,133,547 >>> mbox cmd response data (40 bytes)
33,134,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,164,940 UART: [rt]cmd =0x44504543, len=96
33,225,190 >>> mbox cmd response data (56 bytes)
33,225,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,256,437 UART: [rt]cmd =0x44504543, len=96
33,332,340 >>> mbox cmd response data (56 bytes)
33,333,071 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,363,550 UART: [rt]cmd =0x44504543, len=96
33,438,949 >>> mbox cmd response data (56 bytes)
33,439,668 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,470,141 UART: [rt]cmd =0x44504543, len=96
33,546,072 >>> mbox cmd response data (56 bytes)
33,546,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,577,287 UART: [rt]cmd =0x44504543, len=96
33,652,642 >>> mbox cmd response data (56 bytes)
33,653,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,683,736 UART: [rt]cmd =0x44504543, len=96
33,759,394 >>> mbox cmd response data (56 bytes)
33,760,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,790,556 UART: [rt]cmd =0x44504543, len=96
33,866,116 >>> mbox cmd response data (56 bytes)
33,866,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,897,371 UART: [rt]cmd =0x44504543, len=96
33,972,893 >>> mbox cmd response data (56 bytes)
33,973,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,004,186 UART: [rt]cmd =0x44504543, len=96
34,079,943 >>> mbox cmd response data (56 bytes)
34,080,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,111,129 UART: [rt]cmd =0x44504543, len=96
34,186,754 >>> mbox cmd response data (56 bytes)
34,187,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,217,818 UART: [rt]cmd =0x44504543, len=96
34,293,562 >>> mbox cmd response data (56 bytes)
34,294,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,324,670 UART: [rt]cmd =0x44504543, len=96
34,400,392 >>> mbox cmd response data (56 bytes)
34,401,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,431,756 UART: [rt]cmd =0x44504543, len=96
34,507,211 >>> mbox cmd response data (56 bytes)
34,507,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,538,685 UART: [rt]cmd =0x44504543, len=96
34,613,679 >>> mbox cmd response data (56 bytes)
34,614,397 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,644,975 UART: [rt]cmd =0x44504543, len=96
34,651,644 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,782,639 ready_for_fw is high
3,783,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,918,405 >>> mbox cmd response: success
23,601,535 UART:
23,602,055 UART: Running Caliptra FMC ...
23,603,185 UART:
23,603,351 UART: [state] CFI Enabled
23,672,301 UART: [fht] FMC Alias Private Key: 7
26,012,926 UART: [art] Extend RT PCRs Done
26,014,149 UART: [art] Lock RT PCRs Done
26,015,678 UART: [art] Populate DV Done
26,021,094 UART: [fht] FMC Alias Private Key: 7
26,022,742 UART: [art] Derive CDI
26,023,574 UART: [art] Store in slot 0x4
26,080,834 UART: [art] Derive Key Pair
26,081,829 UART: [art] Store priv key in slot 0x5
29,374,190 UART: [art] Derive Key Pair - Done
29,386,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,677,321 UART: [art] Erasing AUTHORITY.KEYID = 7
31,678,841 UART: [art] PUB.X = 0060B17F92B91D1F82691EE9F0485527FEAF47591B269A99DDC02F495089F39CCBE903CC3CBB57F930CF023432DDA4F6
31,686,062 UART: [art] PUB.Y = CFA8C37EB3241A2D058230AEAF672ADF8687EDDEBE18F2A98683DE6409A2FFA7E0FA0EBD7523221C377946B02B15E29C
31,693,342 UART: [art] SIG.R = C25B9BE41B55BDE612A207A878E85ACACAEB00982B55F784047B94C9C4B7626EADC3AEDC3D82E2653726BBE7340C015A
31,700,734 UART: [art] SIG.S = A5A6608DB4B21FA3E77F5855BD7D5787C8E42055F75D34222B5D454B65DCBADCE221BCECAFD3D6F54E0835B42EB91792
33,006,099 UART: Caliptra RT
33,006,821 UART: [state] CFI Enabled
33,183,003 UART: [rt] RT listening for mailbox commands...
33,184,926 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,214,967 UART: [rt]cmd =0x44504543, len=40
33,242,571 >>> mbox cmd response data (40 bytes)
33,243,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,274,393 UART: [rt]cmd =0x44504543, len=96
33,333,823 >>> mbox cmd response data (56 bytes)
33,334,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,365,168 UART: [rt]cmd =0x44504543, len=96
33,440,541 >>> mbox cmd response data (56 bytes)
33,441,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,471,764 UART: [rt]cmd =0x44504543, len=96
33,547,403 >>> mbox cmd response data (56 bytes)
33,548,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,578,596 UART: [rt]cmd =0x44504543, len=96
33,654,148 >>> mbox cmd response data (56 bytes)
33,654,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,685,233 UART: [rt]cmd =0x44504543, len=96
33,760,997 >>> mbox cmd response data (56 bytes)
33,761,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,792,160 UART: [rt]cmd =0x44504543, len=96
33,867,893 >>> mbox cmd response data (56 bytes)
33,868,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,898,926 UART: [rt]cmd =0x44504543, len=96
33,974,591 >>> mbox cmd response data (56 bytes)
33,975,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,005,903 UART: [rt]cmd =0x44504543, len=96
34,081,899 >>> mbox cmd response data (56 bytes)
34,082,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,112,992 UART: [rt]cmd =0x44504543, len=96
34,188,239 >>> mbox cmd response data (56 bytes)
34,188,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,219,649 UART: [rt]cmd =0x44504543, len=96
34,294,624 >>> mbox cmd response data (56 bytes)
34,295,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,325,971 UART: [rt]cmd =0x44504543, len=96
34,401,791 >>> mbox cmd response data (56 bytes)
34,402,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,432,894 UART: [rt]cmd =0x44504543, len=96
34,507,968 >>> mbox cmd response data (56 bytes)
34,508,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,539,428 UART: [rt]cmd =0x44504543, len=96
34,614,779 >>> mbox cmd response data (56 bytes)
34,615,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,645,976 UART: [rt]cmd =0x44504543, len=96
34,722,012 >>> mbox cmd response data (56 bytes)
34,722,734 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,753,272 UART: [rt]cmd =0x44504543, len=96
34,760,143 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,480 UART:
192,860 UART: Running Caliptra ROM ...
193,985 UART:
603,593 UART: [state] CFI Enabled
616,584 UART: [state] LifecycleState = Unprovisioned
618,523 UART: [state] DebugLocked = No
621,031 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,249 UART: [kat] SHA2-256
795,989 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,509 UART: [kat] ++
806,952 UART: [kat] sha1
817,979 UART: [kat] SHA2-256
820,668 UART: [kat] SHA2-384
825,947 UART: [kat] SHA2-512-ACC
828,380 UART: [kat] ECC-384
3,112,440 UART: [kat] HMAC-384Kdf
3,123,466 UART: [kat] LMS
4,313,588 UART: [kat] --
4,318,241 UART: [cold-reset] ++
4,320,732 UART: [fht] Storing FHT @ 0x50003400
4,331,866 UART: [idev] ++
4,332,433 UART: [idev] CDI.KEYID = 6
4,333,308 UART: [idev] SUBJECT.KEYID = 7
4,334,616 UART: [idev] UDS.KEYID = 0
4,335,591 ready_for_fw is high
4,335,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,686 UART: [idev] Erasing UDS.KEYID = 0
7,623,699 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,241 UART: [idev] --
7,648,477 UART: [ldev] ++
7,649,099 UART: [ldev] CDI.KEYID = 6
7,649,989 UART: [ldev] SUBJECT.KEYID = 5
7,651,114 UART: [ldev] AUTHORITY.KEYID = 7
7,652,558 UART: [ldev] FE.KEYID = 1
7,664,212 UART: [ldev] Erasing FE.KEYID = 1
10,947,391 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,419 UART: [ldev] --
13,308,285 UART: [fwproc] Waiting for Commands...
13,310,487 UART: [fwproc] Received command 0x46574c44
13,312,668 UART: [fwproc] Received Image of size 118548 bytes
17,419,862 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,491,397 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,564,566 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,784 >>> mbox cmd response: success
17,897,927 UART: [afmc] ++
17,898,540 UART: [afmc] CDI.KEYID = 6
17,899,447 UART: [afmc] SUBJECT.KEYID = 7
17,900,654 UART: [afmc] AUTHORITY.KEYID = 5
21,215,344 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,265 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,512,517 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,960 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,541,688 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,062 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,577,769 UART: [afmc] --
23,582,493 UART: [cold-reset] --
23,585,217 UART: [state] Locking Datavault
23,589,215 UART: [state] Locking PCR0, PCR1 and PCR31
23,590,906 UART: [state] Locking ICCM
23,592,398 UART: [exit] Launching FMC @ 0x40000130
23,600,785 UART:
23,601,013 UART: Running Caliptra FMC ...
23,602,110 UART:
23,602,267 UART: [state] CFI Enabled
23,610,464 UART: [fht] FMC Alias Private Key: 7
25,950,261 UART: [art] Extend RT PCRs Done
25,951,480 UART: [art] Lock RT PCRs Done
25,953,212 UART: [art] Populate DV Done
25,958,786 UART: [fht] FMC Alias Private Key: 7
25,960,424 UART: [art] Derive CDI
25,961,229 UART: [art] Store in slot 0x4
26,003,819 UART: [art] Derive Key Pair
26,004,816 UART: [art] Store priv key in slot 0x5
29,247,302 UART: [art] Derive Key Pair - Done
29,260,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,143 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,652 UART: [art] PUB.X = 075272F9A19B02BDB16870CAA4433605A12919748EF6617B6745E952921BC240D24F4EFCF3F160BD6E57D286F3179D44
31,548,905 UART: [art] PUB.Y = BF19D1EAD5012520BDF13C778ABF6B3651874CD94853B00E95D762D68D2F512D6CBFC7BE2DFD56CE4F6E88B8AD57F64B
31,556,151 UART: [art] SIG.R = 8AB57218C0CC6F8B5B7DF4CAD7C1EF6557F509CFA7127F688A5B8929DB360C838775513B276AFA5D3E9BE1AE4D833E60
31,563,547 UART: [art] SIG.S = EB8486502DA6E9738CB755249014A30E5E300B1FFE720FD18B77895819C143475E888074055C196F74E4AD482C752F5B
32,868,348 UART: Caliptra RT
32,869,055 UART: [state] CFI Enabled
33,002,448 UART: [rt] RT listening for mailbox commands...
33,004,374 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,034,289 UART: [rt]cmd =0x44504543, len=40
33,061,987 >>> mbox cmd response data (40 bytes)
33,063,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,093,778 UART: [rt]cmd =0x44504543, len=96
33,137,332 >>> mbox cmd response data (56 bytes)
33,138,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,168,685 UART: [rt]cmd =0x44504543, len=96
33,211,344 >>> mbox cmd response data (56 bytes)
33,212,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,242,850 UART: [rt]cmd =0x44504543, len=96
33,285,544 >>> mbox cmd response data (56 bytes)
33,286,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,316,621 UART: [rt]cmd =0x44504543, len=96
33,360,230 >>> mbox cmd response data (56 bytes)
33,360,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,391,475 UART: [rt]cmd =0x44504543, len=96
33,435,959 >>> mbox cmd response data (56 bytes)
33,436,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,467,087 UART: [rt]cmd =0x44504543, len=96
33,511,937 >>> mbox cmd response data (56 bytes)
33,512,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,543,274 UART: [rt]cmd =0x44504543, len=96
33,588,068 >>> mbox cmd response data (56 bytes)
33,588,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,619,177 UART: [rt]cmd =0x44504543, len=96
33,664,127 >>> mbox cmd response data (56 bytes)
33,664,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,695,382 UART: [rt]cmd =0x44504543, len=96
33,740,551 >>> mbox cmd response data (56 bytes)
33,741,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,771,698 UART: [rt]cmd =0x44504543, len=96
33,817,274 >>> mbox cmd response data (56 bytes)
33,817,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,848,624 UART: [rt]cmd =0x44504543, len=96
33,895,124 >>> mbox cmd response data (56 bytes)
33,895,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,926,372 UART: [rt]cmd =0x44504543, len=96
33,972,278 >>> mbox cmd response data (56 bytes)
33,972,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,003,685 UART: [rt]cmd =0x44504543, len=96
34,050,133 >>> mbox cmd response data (56 bytes)
34,050,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,081,382 UART: [rt]cmd =0x44504543, len=96
34,127,938 >>> mbox cmd response data (56 bytes)
34,128,686 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,159,321 UART: [rt]cmd =0x44504543, len=96
34,166,045 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
4,131,083 ready_for_fw is high
4,131,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,170,752 >>> mbox cmd response: success
23,808,485 UART:
23,808,908 UART: Running Caliptra FMC ...
23,810,055 UART:
23,810,230 UART: [state] CFI Enabled
23,817,844 UART: [fht] FMC Alias Private Key: 7
26,158,433 UART: [art] Extend RT PCRs Done
26,159,652 UART: [art] Lock RT PCRs Done
26,161,440 UART: [art] Populate DV Done
26,166,966 UART: [fht] FMC Alias Private Key: 7
26,168,720 UART: [art] Derive CDI
26,169,526 UART: [art] Store in slot 0x4
26,212,059 UART: [art] Derive Key Pair
26,213,059 UART: [art] Store priv key in slot 0x5
29,455,088 UART: [art] Derive Key Pair - Done
29,467,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,733 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,258 UART: [art] PUB.X = 14660639ADABA1D4DD2410073BC8730A87C03D65A32F48318DED26FA500EF92295EB965877BD410F8066DC2DD40EB607
31,756,509 UART: [art] PUB.Y = 5FF7E029885612D844D5E0355FC27AAD549D0F5BD589B776906751C6E96DC38CB0ECA908D828F537FAE58D358BC84DC0
31,763,750 UART: [art] SIG.R = C3D4B137FC0611B1055CD389356D9FD6A1F7516FBC58FCBE3061B2FF8EC32FC79275CF67477E159BA425B03DFE494AAC
31,771,201 UART: [art] SIG.S = BF5B1DC4DEFDE8A9FB9CFC696D9F0AAC9151349F1BB77D6272843EA48CD5A2EDA4497F99097E14E0A692EF0070959912
33,075,610 UART: Caliptra RT
33,076,328 UART: [state] CFI Enabled
33,209,417 UART: [rt] RT listening for mailbox commands...
33,211,351 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,241,550 UART: [rt]cmd =0x44504543, len=40
33,269,042 >>> mbox cmd response data (40 bytes)
33,270,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,301,006 UART: [rt]cmd =0x44504543, len=96
33,344,283 >>> mbox cmd response data (56 bytes)
33,345,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,375,561 UART: [rt]cmd =0x44504543, len=96
33,419,077 >>> mbox cmd response data (56 bytes)
33,419,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,450,108 UART: [rt]cmd =0x44504543, len=96
33,493,297 >>> mbox cmd response data (56 bytes)
33,493,976 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,524,726 UART: [rt]cmd =0x44504543, len=96
33,568,284 >>> mbox cmd response data (56 bytes)
33,568,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,599,454 UART: [rt]cmd =0x44504543, len=96
33,644,511 >>> mbox cmd response data (56 bytes)
33,645,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,675,789 UART: [rt]cmd =0x44504543, len=96
33,720,196 >>> mbox cmd response data (56 bytes)
33,720,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,751,251 UART: [rt]cmd =0x44504543, len=96
33,795,120 >>> mbox cmd response data (56 bytes)
33,795,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,826,456 UART: [rt]cmd =0x44504543, len=96
33,871,574 >>> mbox cmd response data (56 bytes)
33,872,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,902,669 UART: [rt]cmd =0x44504543, len=96
33,948,158 >>> mbox cmd response data (56 bytes)
33,948,838 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,979,195 UART: [rt]cmd =0x44504543, len=96
34,024,686 >>> mbox cmd response data (56 bytes)
34,025,441 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,055,918 UART: [rt]cmd =0x44504543, len=96
34,101,396 >>> mbox cmd response data (56 bytes)
34,102,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,132,426 UART: [rt]cmd =0x44504543, len=96
34,179,076 >>> mbox cmd response data (56 bytes)
34,179,802 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,210,435 UART: [rt]cmd =0x44504543, len=96
34,257,815 >>> mbox cmd response data (56 bytes)
34,258,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,289,108 UART: [rt]cmd =0x44504543, len=96
34,335,978 >>> mbox cmd response data (56 bytes)
34,336,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,367,265 UART: [rt]cmd =0x44504543, len=96
34,374,198 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,056 UART:
192,427 UART: Running Caliptra ROM ...
193,524 UART:
193,663 UART: [state] CFI Enabled
263,988 UART: [state] LifecycleState = Unprovisioned
265,895 UART: [state] DebugLocked = No
267,698 UART: [state] WD Timer not started. Device not locked for debugging
272,291 UART: [kat] SHA2-256
451,981 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,730 UART: [kat] ++
463,179 UART: [kat] sha1
474,733 UART: [kat] SHA2-256
477,393 UART: [kat] SHA2-384
483,329 UART: [kat] SHA2-512-ACC
485,697 UART: [kat] ECC-384
2,948,267 UART: [kat] HMAC-384Kdf
2,970,452 UART: [kat] LMS
3,446,898 UART: [kat] --
3,450,998 UART: [cold-reset] ++
3,453,502 UART: [fht] FHT @ 0x50003400
3,464,332 UART: [idev] ++
3,464,890 UART: [idev] CDI.KEYID = 6
3,465,914 UART: [idev] SUBJECT.KEYID = 7
3,467,085 UART: [idev] UDS.KEYID = 0
3,468,009 ready_for_fw is high
3,468,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,275 UART: [idev] Erasing UDS.KEYID = 0
5,985,955 UART: [idev] Sha1 KeyId Algorithm
6,010,960 UART: [idev] --
6,015,949 UART: [ldev] ++
6,016,520 UART: [ldev] CDI.KEYID = 6
6,017,483 UART: [ldev] SUBJECT.KEYID = 5
6,018,645 UART: [ldev] AUTHORITY.KEYID = 7
6,019,930 UART: [ldev] FE.KEYID = 1
6,056,445 UART: [ldev] Erasing FE.KEYID = 1
8,565,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,681 UART: [ldev] --
10,374,205 UART: [fwproc] Wait for Commands...
10,376,954 UART: [fwproc] Recv command 0x46574c44
10,378,937 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,203 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,211 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,352 >>> mbox cmd response: success
14,352,777 UART: [afmc] ++
14,353,383 UART: [afmc] CDI.KEYID = 6
14,354,268 UART: [afmc] SUBJECT.KEYID = 7
14,355,486 UART: [afmc] AUTHORITY.KEYID = 5
16,898,046 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,641,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,644,119 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,659,908 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,675,953 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,691,541 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,716,208 UART: [afmc] --
18,719,370 UART: [cold-reset] --
18,724,683 UART: [state] Locking Datavault
18,730,533 UART: [state] Locking PCR0, PCR1 and PCR31
18,732,228 UART: [state] Locking ICCM
18,733,401 UART: [exit] Launching FMC @ 0x40000130
18,741,849 UART:
18,742,080 UART: Running Caliptra FMC ...
18,743,179 UART:
18,743,333 UART: [state] CFI Enabled
18,797,117 UART: [fht] FMC Alias Private Key: 7
20,564,065 UART: [art] Extend RT PCRs Done
20,565,266 UART: [art] Lock RT PCRs Done
20,566,966 UART: [art] Populate DV Done
20,572,477 UART: [fht] FMC Alias Private Key: 7
20,574,115 UART: [art] Derive CDI
20,574,847 UART: [art] Store in slot 0x4
20,629,772 UART: [art] Derive Key Pair
20,630,805 UART: [art] Store priv key in slot 0x5
23,094,323 UART: [art] Derive Key Pair - Done
23,107,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,038 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,552 UART: [art] PUB.X = 156EE6878C4B5017E39A1C0DAFCBDD8E587E731CE5E4FA158AADBC2342135386EA474BA09F999E4B10ABEBF3DF13D34D
24,828,857 UART: [art] PUB.Y = A431A6EBA1087C00DFD6B96EAABEB858BEBE70941D752291D3C8E33D7013AC39E8FB99BF7A7C57779847B8C3A9F67BF2
24,836,138 UART: [art] SIG.R = 1BDFC6FC1DB3ACD6D76E755CFC5A1E8913A22CC07F5D17B8BF8681E5767AD235527501F96B945CAE4FD336CBA6086656
24,843,527 UART: [art] SIG.S = F74AE12F87DD41C4DE7B73B3103FD4E329A6A7842F4961B311805AB3F987A206ADA9E155C6BA53E6A05622E4D7442A3B
25,822,853 UART: Caliptra RT
25,823,559 UART: [state] CFI Enabled
26,003,890 UART: [rt] RT listening for mailbox commands...
26,005,792 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,036,048 UART: [rt]cmd =0x44504543, len=40
26,064,141 >>> mbox cmd response data (40 bytes)
26,065,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,095,776 UART: [rt]cmd =0x44504543, len=96
26,155,799 >>> mbox cmd response data (56 bytes)
26,156,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,187,118 UART: [rt]cmd =0x44504543, len=96
26,262,303 >>> mbox cmd response data (56 bytes)
26,263,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,293,518 UART: [rt]cmd =0x44504543, len=96
26,369,313 >>> mbox cmd response data (56 bytes)
26,370,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,400,416 UART: [rt]cmd =0x44504543, len=96
26,475,536 >>> mbox cmd response data (56 bytes)
26,476,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,506,732 UART: [rt]cmd =0x44504543, len=96
26,583,027 >>> mbox cmd response data (56 bytes)
26,583,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,614,347 UART: [rt]cmd =0x44504543, len=96
26,689,977 >>> mbox cmd response data (56 bytes)
26,690,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,721,242 UART: [rt]cmd =0x44504543, len=96
26,796,581 >>> mbox cmd response data (56 bytes)
26,797,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,827,832 UART: [rt]cmd =0x44504543, len=96
26,903,489 >>> mbox cmd response data (56 bytes)
26,904,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,934,505 UART: [rt]cmd =0x44504543, len=96
27,009,895 >>> mbox cmd response data (56 bytes)
27,010,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,041,173 UART: [rt]cmd =0x44504543, len=96
27,116,901 >>> mbox cmd response data (56 bytes)
27,117,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,148,418 UART: [rt]cmd =0x44504543, len=96
27,223,773 >>> mbox cmd response data (56 bytes)
27,224,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,255,142 UART: [rt]cmd =0x44504543, len=96
27,330,738 >>> mbox cmd response data (56 bytes)
27,331,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,362,149 UART: [rt]cmd =0x44504543, len=96
27,437,193 >>> mbox cmd response data (56 bytes)
27,437,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,468,399 UART: [rt]cmd =0x44504543, len=96
27,544,014 >>> mbox cmd response data (56 bytes)
27,544,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,575,058 UART: [rt]cmd =0x44504543, len=96
27,581,823 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,556 writing to cptra_bootfsm_go
3,463,291 ready_for_fw is high
3,463,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,216,666 >>> mbox cmd response: success
18,516,427 UART:
18,516,810 UART: Running Caliptra FMC ...
18,518,031 UART:
18,518,206 UART: [state] CFI Enabled
18,581,879 UART: [fht] FMC Alias Private Key: 7
20,347,363 UART: [art] Extend RT PCRs Done
20,348,569 UART: [art] Lock RT PCRs Done
20,350,349 UART: [art] Populate DV Done
20,355,598 UART: [fht] FMC Alias Private Key: 7
20,357,138 UART: [art] Derive CDI
20,357,948 UART: [art] Store in slot 0x4
20,413,743 UART: [art] Derive Key Pair
20,414,785 UART: [art] Store priv key in slot 0x5
22,878,272 UART: [art] Derive Key Pair - Done
22,891,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,509 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,991 UART: [art] PUB.X = E980C0FD65D0DDCAEA4E67AAB32124914280126CDAFD4812CC73027A6473A96BBCD1A8E366D786C8C75DFEA531E3952F
24,612,290 UART: [art] PUB.Y = 7449BC5217CFA8F93E23FD398614609190FD87CB848F2F7E361701354C98199D6FCCEB3ED14C3FA2551B6CCF20C20AC0
24,619,555 UART: [art] SIG.R = 5623D458D4262AE1EA37EF7F69DCCFB5AF3FFD59D255F646DEFB09D814611112896127954D087DB342EA2A27D68EAEE7
24,626,952 UART: [art] SIG.S = 8F677C0664D06DECE1A1F40EA362F83F89478EC4FFD4523FB63156598CB1BFAAD5687E15E00ECE4533A200204F187561
25,606,078 UART: Caliptra RT
25,606,790 UART: [state] CFI Enabled
25,787,663 UART: [rt] RT listening for mailbox commands...
25,789,581 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,819,461 UART: [rt]cmd =0x44504543, len=40
25,847,224 >>> mbox cmd response data (40 bytes)
25,848,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,879,067 UART: [rt]cmd =0x44504543, len=96
25,938,926 >>> mbox cmd response data (56 bytes)
25,939,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,970,392 UART: [rt]cmd =0x44504543, len=96
26,046,001 >>> mbox cmd response data (56 bytes)
26,046,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,077,492 UART: [rt]cmd =0x44504543, len=96
26,152,864 >>> mbox cmd response data (56 bytes)
26,153,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,184,353 UART: [rt]cmd =0x44504543, len=96
26,259,529 >>> mbox cmd response data (56 bytes)
26,260,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,290,615 UART: [rt]cmd =0x44504543, len=96
26,366,227 >>> mbox cmd response data (56 bytes)
26,366,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,397,642 UART: [rt]cmd =0x44504543, len=96
26,473,032 >>> mbox cmd response data (56 bytes)
26,473,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,504,407 UART: [rt]cmd =0x44504543, len=96
26,579,696 >>> mbox cmd response data (56 bytes)
26,580,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,610,947 UART: [rt]cmd =0x44504543, len=96
26,687,205 >>> mbox cmd response data (56 bytes)
26,687,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,718,531 UART: [rt]cmd =0x44504543, len=96
26,793,436 >>> mbox cmd response data (56 bytes)
26,794,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,824,480 UART: [rt]cmd =0x44504543, len=96
26,900,577 >>> mbox cmd response data (56 bytes)
26,901,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,931,675 UART: [rt]cmd =0x44504543, len=96
27,007,776 >>> mbox cmd response data (56 bytes)
27,008,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,039,194 UART: [rt]cmd =0x44504543, len=96
27,114,042 >>> mbox cmd response data (56 bytes)
27,114,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,145,411 UART: [rt]cmd =0x44504543, len=96
27,221,423 >>> mbox cmd response data (56 bytes)
27,222,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,252,846 UART: [rt]cmd =0x44504543, len=96
27,327,635 >>> mbox cmd response data (56 bytes)
27,328,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,358,841 UART: [rt]cmd =0x44504543, len=96
27,365,525 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
192,464 UART:
192,826 UART: Running Caliptra ROM ...
193,911 UART:
603,805 UART: [state] CFI Enabled
620,193 UART: [state] LifecycleState = Unprovisioned
622,099 UART: [state] DebugLocked = No
623,430 UART: [state] WD Timer not started. Device not locked for debugging
626,616 UART: [kat] SHA2-256
806,253 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,075 UART: [kat] ++
817,561 UART: [kat] sha1
828,011 UART: [kat] SHA2-256
830,668 UART: [kat] SHA2-384
835,874 UART: [kat] SHA2-512-ACC
838,245 UART: [kat] ECC-384
3,279,091 UART: [kat] HMAC-384Kdf
3,292,258 UART: [kat] LMS
3,768,788 UART: [kat] --
3,773,640 UART: [cold-reset] ++
3,774,719 UART: [fht] FHT @ 0x50003400
3,786,058 UART: [idev] ++
3,786,701 UART: [idev] CDI.KEYID = 6
3,787,623 UART: [idev] SUBJECT.KEYID = 7
3,788,873 UART: [idev] UDS.KEYID = 0
3,789,806 ready_for_fw is high
3,790,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,982 UART: [idev] Erasing UDS.KEYID = 0
6,266,811 UART: [idev] Sha1 KeyId Algorithm
6,291,059 UART: [idev] --
6,295,690 UART: [ldev] ++
6,296,280 UART: [ldev] CDI.KEYID = 6
6,297,175 UART: [ldev] SUBJECT.KEYID = 5
6,298,388 UART: [ldev] AUTHORITY.KEYID = 7
6,299,625 UART: [ldev] FE.KEYID = 1
6,311,322 UART: [ldev] Erasing FE.KEYID = 1
8,786,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,381 UART: [ldev] --
10,581,773 UART: [fwproc] Wait for Commands...
10,584,356 UART: [fwproc] Recv command 0x46574c44
10,586,398 UART: [fwproc] Recv'd Img size: 118548 bytes
14,058,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,136,459 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,209,476 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,536,930 >>> mbox cmd response: success
14,541,616 UART: [afmc] ++
14,542,227 UART: [afmc] CDI.KEYID = 6
14,543,115 UART: [afmc] SUBJECT.KEYID = 7
14,544,333 UART: [afmc] AUTHORITY.KEYID = 5
17,049,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,770,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,772,416 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,788,244 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,804,320 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,819,923 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,843,490 UART: [afmc] --
18,846,652 UART: [cold-reset] --
18,850,464 UART: [state] Locking Datavault
18,855,535 UART: [state] Locking PCR0, PCR1 and PCR31
18,857,252 UART: [state] Locking ICCM
18,858,409 UART: [exit] Launching FMC @ 0x40000130
18,866,861 UART:
18,867,093 UART: Running Caliptra FMC ...
18,868,125 UART:
18,868,275 UART: [state] CFI Enabled
18,876,382 UART: [fht] FMC Alias Private Key: 7
20,642,721 UART: [art] Extend RT PCRs Done
20,643,926 UART: [art] Lock RT PCRs Done
20,645,524 UART: [art] Populate DV Done
20,650,991 UART: [fht] FMC Alias Private Key: 7
20,652,558 UART: [art] Derive CDI
20,653,378 UART: [art] Store in slot 0x4
20,695,549 UART: [art] Derive Key Pair
20,696,613 UART: [art] Store priv key in slot 0x5
23,123,528 UART: [art] Derive Key Pair - Done
23,136,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,842,428 UART: [art] Erasing AUTHORITY.KEYID = 7
24,843,911 UART: [art] PUB.X = 82565D6CDD9E72EF2AD93583BE0ECB9D491DD7DB6FAB4F296FE222684A9781D45779A712E7534A0441BC558C44747FDB
24,851,154 UART: [art] PUB.Y = CD18462DBA31647939F6FAA7D9A5AFCA422C57ED88B445350CFA5B2E5DA26F98C60DE5E951D37A56DEEDB15ADF0C8AA0
24,858,490 UART: [art] SIG.R = 0E39AE35CA852F104C62E7C61B4810E7193D5B4D3C7A1AF36842903C13BC83216B0CEC7174CDF1DD657C73D2946CEEA2
24,865,915 UART: [art] SIG.S = 4A3DE26D8760DF07F416906CCA2B69607306B28C95651BDCD1A30EC4AD32FAB34926C95CE5673954DF32515BBB6442FE
25,844,364 UART: Caliptra RT
25,845,064 UART: [state] CFI Enabled
25,978,345 UART: [rt] RT listening for mailbox commands...
25,980,252 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,010,391 UART: [rt]cmd =0x44504543, len=40
26,037,625 >>> mbox cmd response data (40 bytes)
26,038,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,069,211 UART: [rt]cmd =0x44504543, len=96
26,112,563 >>> mbox cmd response data (56 bytes)
26,113,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,143,901 UART: [rt]cmd =0x44504543, len=96
26,186,482 >>> mbox cmd response data (56 bytes)
26,187,192 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,217,687 UART: [rt]cmd =0x44504543, len=96
26,261,194 >>> mbox cmd response data (56 bytes)
26,261,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,292,330 UART: [rt]cmd =0x44504543, len=96
26,336,369 >>> mbox cmd response data (56 bytes)
26,337,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,367,644 UART: [rt]cmd =0x44504543, len=96
26,411,820 >>> mbox cmd response data (56 bytes)
26,412,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,443,101 UART: [rt]cmd =0x44504543, len=96
26,487,974 >>> mbox cmd response data (56 bytes)
26,488,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,519,009 UART: [rt]cmd =0x44504543, len=96
26,564,155 >>> mbox cmd response data (56 bytes)
26,564,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,595,301 UART: [rt]cmd =0x44504543, len=96
26,640,664 >>> mbox cmd response data (56 bytes)
26,641,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,671,815 UART: [rt]cmd =0x44504543, len=96
26,717,228 >>> mbox cmd response data (56 bytes)
26,717,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,748,593 UART: [rt]cmd =0x44504543, len=96
26,794,332 >>> mbox cmd response data (56 bytes)
26,795,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,825,614 UART: [rt]cmd =0x44504543, len=96
26,871,682 >>> mbox cmd response data (56 bytes)
26,872,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,902,822 UART: [rt]cmd =0x44504543, len=96
26,948,527 >>> mbox cmd response data (56 bytes)
26,949,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,979,869 UART: [rt]cmd =0x44504543, len=96
27,026,738 >>> mbox cmd response data (56 bytes)
27,027,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,058,016 UART: [rt]cmd =0x44504543, len=96
27,103,888 >>> mbox cmd response data (56 bytes)
27,104,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,135,317 UART: [rt]cmd =0x44504543, len=96
27,142,422 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,779,646 ready_for_fw is high
3,780,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,440,072 >>> mbox cmd response: success
18,688,595 UART:
18,689,008 UART: Running Caliptra FMC ...
18,690,165 UART:
18,690,332 UART: [state] CFI Enabled
18,698,364 UART: [fht] FMC Alias Private Key: 7
20,464,480 UART: [art] Extend RT PCRs Done
20,465,708 UART: [art] Lock RT PCRs Done
20,467,500 UART: [art] Populate DV Done
20,472,768 UART: [fht] FMC Alias Private Key: 7
20,474,479 UART: [art] Derive CDI
20,475,301 UART: [art] Store in slot 0x4
20,518,017 UART: [art] Derive Key Pair
20,519,057 UART: [art] Store priv key in slot 0x5
22,946,328 UART: [art] Derive Key Pair - Done
22,959,321 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,630 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,132 UART: [art] PUB.X = 057092B7161016396A2FD83B09FC6D5F21A4B8B4C2199682A53A5AA09158D96EF14D7231AF356900E6C3F3A6DF08DA46
24,674,393 UART: [art] PUB.Y = C255D4771DB1207811D8773C9F82F4E110D68CFC77862719A980CEABC8369FF22863C997717D75801B1D67DF5AF9B25E
24,681,644 UART: [art] SIG.R = C859299B3FDA4E40DD27ADF00CCC8B6CE2B9ECF710EEF6C1008E348C739251F6FB35E92A3C3F6587519E7A22D539791B
24,688,999 UART: [art] SIG.S = 41D8EE6CE92670CCC1B08F63E1D2911DF803102ACC1C1857E5C4B8F7A5C08C9B01CE53D5124363F53A5A2B48F70C0C3C
25,668,119 UART: Caliptra RT
25,668,818 UART: [state] CFI Enabled
25,800,576 UART: [rt] RT listening for mailbox commands...
25,802,476 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,832,564 UART: [rt]cmd =0x44504543, len=40
25,859,982 >>> mbox cmd response data (40 bytes)
25,861,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,891,806 UART: [rt]cmd =0x44504543, len=96
25,935,130 >>> mbox cmd response data (56 bytes)
25,935,858 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,966,205 UART: [rt]cmd =0x44504543, len=96
26,009,170 >>> mbox cmd response data (56 bytes)
26,009,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,040,486 UART: [rt]cmd =0x44504543, len=96
26,083,607 >>> mbox cmd response data (56 bytes)
26,084,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,114,871 UART: [rt]cmd =0x44504543, len=96
26,158,835 >>> mbox cmd response data (56 bytes)
26,159,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,190,289 UART: [rt]cmd =0x44504543, len=96
26,234,755 >>> mbox cmd response data (56 bytes)
26,235,445 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,265,919 UART: [rt]cmd =0x44504543, len=96
26,309,905 >>> mbox cmd response data (56 bytes)
26,310,594 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,341,081 UART: [rt]cmd =0x44504543, len=96
26,385,502 >>> mbox cmd response data (56 bytes)
26,386,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,416,509 UART: [rt]cmd =0x44504543, len=96
26,462,713 >>> mbox cmd response data (56 bytes)
26,463,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,493,934 UART: [rt]cmd =0x44504543, len=96
26,539,632 >>> mbox cmd response data (56 bytes)
26,540,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,570,838 UART: [rt]cmd =0x44504543, len=96
26,616,686 >>> mbox cmd response data (56 bytes)
26,617,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,647,997 UART: [rt]cmd =0x44504543, len=96
26,693,629 >>> mbox cmd response data (56 bytes)
26,694,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,724,837 UART: [rt]cmd =0x44504543, len=96
26,771,936 >>> mbox cmd response data (56 bytes)
26,772,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,803,228 UART: [rt]cmd =0x44504543, len=96
26,849,629 >>> mbox cmd response data (56 bytes)
26,850,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,880,943 UART: [rt]cmd =0x44504543, len=96
26,927,439 >>> mbox cmd response data (56 bytes)
26,928,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,958,754 UART: [rt]cmd =0x44504543, len=96
26,965,537 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,126 UART:
192,489 UART: Running Caliptra ROM ...
193,672 UART:
193,845 UART: [state] CFI Enabled
264,098 UART: [state] LifecycleState = Unprovisioned
266,502 UART: [state] DebugLocked = No
269,103 UART: [state] WD Timer not started. Device not locked for debugging
273,556 UART: [kat] SHA2-256
463,434 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,262 UART: [kat] ++
474,711 UART: [kat] sha1
486,861 UART: [kat] SHA2-256
489,941 UART: [kat] SHA2-384
495,647 UART: [kat] SHA2-512-ACC
498,226 UART: [kat] ECC-384
2,946,079 UART: [kat] HMAC-384Kdf
2,971,460 UART: [kat] LMS
3,503,264 UART: [kat] --
3,509,135 UART: [cold-reset] ++
3,510,906 UART: [fht] FHT @ 0x50003400
3,523,735 UART: [idev] ++
3,524,438 UART: [idev] CDI.KEYID = 6
3,525,348 UART: [idev] SUBJECT.KEYID = 7
3,526,588 UART: [idev] UDS.KEYID = 0
3,527,511 ready_for_fw is high
3,527,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,758 UART: [idev] Erasing UDS.KEYID = 0
6,028,174 UART: [idev] Sha1 KeyId Algorithm
6,050,286 UART: [idev] --
6,055,360 UART: [ldev] ++
6,056,038 UART: [ldev] CDI.KEYID = 6
6,056,966 UART: [ldev] SUBJECT.KEYID = 5
6,058,123 UART: [ldev] AUTHORITY.KEYID = 7
6,059,353 UART: [ldev] FE.KEYID = 1
6,099,985 UART: [ldev] Erasing FE.KEYID = 1
8,603,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,985 UART: [ldev] --
10,410,158 UART: [fwproc] Wait for Commands...
10,413,075 UART: [fwproc] Recv command 0x46574c44
10,415,384 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,299 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,900 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,682,953 >>> mbox cmd response: success
14,687,470 UART: [afmc] ++
14,688,202 UART: [afmc] CDI.KEYID = 6
14,689,399 UART: [afmc] SUBJECT.KEYID = 7
14,690,858 UART: [afmc] AUTHORITY.KEYID = 5
17,231,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,011 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,104 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,251 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,149 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,693 UART: [afmc] --
19,033,548 UART: [cold-reset] --
19,036,179 UART: [state] Locking Datavault
19,042,144 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,297 UART: [state] Locking ICCM
19,046,564 UART: [exit] Launching FMC @ 0x40000130
19,055,197 UART:
19,055,433 UART: Running Caliptra FMC ...
19,056,536 UART:
19,056,717 UART: [state] CFI Enabled
19,113,898 UART: [fht] FMC Alias Private Key: 7
20,880,513 UART: [art] Extend RT PCRs Done
20,881,736 UART: [art] Lock RT PCRs Done
20,883,167 UART: [art] Populate DV Done
20,888,739 UART: [fht] FMC Alias Private Key: 7
20,890,486 UART: [art] Derive CDI
20,891,219 UART: [art] Store in slot 0x4
20,946,742 UART: [art] Derive Key Pair
20,947,737 UART: [art] Store priv key in slot 0x5
23,410,336 UART: [art] Derive Key Pair - Done
23,423,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,135,702 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,210 UART: [art] PUB.X = 47BBF6FBF86A45081A461A90FA7D2DE504936F0A17A53DD7EE39D2CEAC1D8C10151FBC710D3FB790CF89A7DB9D722EC8
25,144,488 UART: [art] PUB.Y = BD7E03658AFBED02D0B02470C048949D2A286C9A380780785B1916FF810A5C4C303CB60A58BF455495D183A550FB5CFD
25,151,760 UART: [art] SIG.R = 1628119ED9281F3B83EAD37A45157696EE8981E0D0EF4AFA8D5CF76CB1A39C788EA16B43164F3E270012110EF98C340A
25,159,146 UART: [art] SIG.S = 48CF25DABBD2F3C4EA99E5DC981A286937EBFA7DAF10F02C81382E3A28F72F31E0BA6174C570230F3CFEC01AC9705C7D
26,137,941 UART: Caliptra RT
26,138,669 UART: [state] CFI Enabled
26,318,609 UART: [rt] RT listening for mailbox commands...
26,320,540 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,350,368 UART: [rt]cmd =0x44504543, len=40
26,378,234 >>> mbox cmd response data (40 bytes)
26,379,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,409,851 UART: [rt]cmd =0x44504543, len=96
26,470,270 >>> mbox cmd response data (56 bytes)
26,471,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,501,734 UART: [rt]cmd =0x44504543, len=96
26,576,804 >>> mbox cmd response data (56 bytes)
26,577,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,608,224 UART: [rt]cmd =0x44504543, len=96
26,683,185 >>> mbox cmd response data (56 bytes)
26,683,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,714,194 UART: [rt]cmd =0x44504543, len=96
26,790,089 >>> mbox cmd response data (56 bytes)
26,790,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,821,459 UART: [rt]cmd =0x44504543, len=96
26,897,391 >>> mbox cmd response data (56 bytes)
26,898,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,928,707 UART: [rt]cmd =0x44504543, len=96
27,003,766 >>> mbox cmd response data (56 bytes)
27,004,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,035,093 UART: [rt]cmd =0x44504543, len=96
27,110,078 >>> mbox cmd response data (56 bytes)
27,110,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,141,287 UART: [rt]cmd =0x44504543, len=96
27,216,677 >>> mbox cmd response data (56 bytes)
27,217,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,247,833 UART: [rt]cmd =0x44504543, len=96
27,323,814 >>> mbox cmd response data (56 bytes)
27,324,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,354,984 UART: [rt]cmd =0x44504543, len=96
27,430,568 >>> mbox cmd response data (56 bytes)
27,431,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,461,668 UART: [rt]cmd =0x44504543, len=96
27,537,279 >>> mbox cmd response data (56 bytes)
27,538,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,568,701 UART: [rt]cmd =0x44504543, len=96
27,644,099 >>> mbox cmd response data (56 bytes)
27,644,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,675,248 UART: [rt]cmd =0x44504543, len=96
27,751,361 >>> mbox cmd response data (56 bytes)
27,752,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,782,831 UART: [rt]cmd =0x44504543, len=96
27,857,492 >>> mbox cmd response data (56 bytes)
27,858,218 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,888,798 UART: [rt]cmd =0x44504543, len=96
27,895,629 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
3,437,443 ready_for_fw is high
3,437,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,138 >>> mbox cmd response: success
19,130,324 UART:
19,130,724 UART: Running Caliptra FMC ...
19,131,869 UART:
19,132,034 UART: [state] CFI Enabled
19,197,445 UART: [fht] FMC Alias Private Key: 7
20,963,961 UART: [art] Extend RT PCRs Done
20,965,176 UART: [art] Lock RT PCRs Done
20,966,799 UART: [art] Populate DV Done
20,972,125 UART: [fht] FMC Alias Private Key: 7
20,973,664 UART: [art] Derive CDI
20,974,424 UART: [art] Store in slot 0x4
21,030,483 UART: [art] Derive Key Pair
21,031,488 UART: [art] Store priv key in slot 0x5
23,494,360 UART: [art] Derive Key Pair - Done
23,507,251 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,597 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,089 UART: [art] PUB.X = BBE2948A93D35FCA3E5602623267D759A3AB1E7454234520405392F242BE7E3825438DCFF0E3B3FCD5E084D014FA7D75
25,228,366 UART: [art] PUB.Y = DDAB42EA39F6ACCE10908B9E7A46C4D471116AD15CA4C0F75F201049CD520F0459CDA08DDF713029F1FF3BDA8B34D8FD
25,235,685 UART: [art] SIG.R = 4DB57D7B47F0061A809D3EA96843390DE6CB27EA3393F5581F05E4147F2E3622E85324B84CD180C6F5D00D3F4CD61D8F
25,243,056 UART: [art] SIG.S = 1425E859796103A30E9874D79B2144251E4392120DB940A1CDD040F851FCCADCE828873D7A56B2544206E0038795881B
26,221,734 UART: Caliptra RT
26,222,446 UART: [state] CFI Enabled
26,403,608 UART: [rt] RT listening for mailbox commands...
26,405,536 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,435,754 UART: [rt]cmd =0x44504543, len=40
26,484,354 >>> mbox cmd response data (40 bytes)
26,485,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,515,987 UART: [rt]cmd =0x44504543, len=96
26,576,876 >>> mbox cmd response data (56 bytes)
26,577,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,608,321 UART: [rt]cmd =0x44504543, len=96
26,683,665 >>> mbox cmd response data (56 bytes)
26,684,402 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,715,000 UART: [rt]cmd =0x44504543, len=96
26,790,472 >>> mbox cmd response data (56 bytes)
26,791,170 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,821,658 UART: [rt]cmd =0x44504543, len=96
26,897,211 >>> mbox cmd response data (56 bytes)
26,897,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,928,527 UART: [rt]cmd =0x44504543, len=96
27,003,785 >>> mbox cmd response data (56 bytes)
27,004,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,035,011 UART: [rt]cmd =0x44504543, len=96
27,110,488 >>> mbox cmd response data (56 bytes)
27,111,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,141,894 UART: [rt]cmd =0x44504543, len=96
27,217,430 >>> mbox cmd response data (56 bytes)
27,218,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,248,618 UART: [rt]cmd =0x44504543, len=96
27,324,682 >>> mbox cmd response data (56 bytes)
27,325,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,355,854 UART: [rt]cmd =0x44504543, len=96
27,431,175 >>> mbox cmd response data (56 bytes)
27,431,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,462,326 UART: [rt]cmd =0x44504543, len=96
27,538,200 >>> mbox cmd response data (56 bytes)
27,538,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,569,488 UART: [rt]cmd =0x44504543, len=96
27,644,596 >>> mbox cmd response data (56 bytes)
27,645,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,676,070 UART: [rt]cmd =0x44504543, len=96
27,751,659 >>> mbox cmd response data (56 bytes)
27,752,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,782,965 UART: [rt]cmd =0x44504543, len=96
27,858,209 >>> mbox cmd response data (56 bytes)
27,858,929 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,889,347 UART: [rt]cmd =0x44504543, len=96
27,965,113 >>> mbox cmd response data (56 bytes)
27,965,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,996,447 UART: [rt]cmd =0x44504543, len=96
28,003,369 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,559 UART:
192,919 UART: Running Caliptra ROM ...
194,067 UART:
603,883 UART: [state] CFI Enabled
619,988 UART: [state] LifecycleState = Unprovisioned
622,379 UART: [state] DebugLocked = No
624,198 UART: [state] WD Timer not started. Device not locked for debugging
628,547 UART: [kat] SHA2-256
818,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,219 UART: [kat] ++
829,667 UART: [kat] sha1
839,623 UART: [kat] SHA2-256
842,629 UART: [kat] SHA2-384
849,055 UART: [kat] SHA2-512-ACC
851,656 UART: [kat] ECC-384
3,291,313 UART: [kat] HMAC-384Kdf
3,305,043 UART: [kat] LMS
3,836,878 UART: [kat] --
3,842,526 UART: [cold-reset] ++
3,844,056 UART: [fht] FHT @ 0x50003400
3,855,695 UART: [idev] ++
3,856,406 UART: [idev] CDI.KEYID = 6
3,857,324 UART: [idev] SUBJECT.KEYID = 7
3,858,577 UART: [idev] UDS.KEYID = 0
3,859,505 ready_for_fw is high
3,859,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,562 UART: [idev] Erasing UDS.KEYID = 0
6,332,583 UART: [idev] Sha1 KeyId Algorithm
6,354,464 UART: [idev] --
6,360,351 UART: [ldev] ++
6,361,038 UART: [ldev] CDI.KEYID = 6
6,361,931 UART: [ldev] SUBJECT.KEYID = 5
6,363,148 UART: [ldev] AUTHORITY.KEYID = 7
6,364,330 UART: [ldev] FE.KEYID = 1
6,374,495 UART: [ldev] Erasing FE.KEYID = 1
8,854,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,281 UART: [ldev] --
10,648,079 UART: [fwproc] Wait for Commands...
10,650,128 UART: [fwproc] Recv command 0x46574c44
10,652,440 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,523 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,139 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,313 >>> mbox cmd response: success
14,917,046 UART: [afmc] ++
14,917,789 UART: [afmc] CDI.KEYID = 6
14,918,990 UART: [afmc] SUBJECT.KEYID = 7
14,920,467 UART: [afmc] AUTHORITY.KEYID = 5
17,427,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,144 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,254 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,399 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,298 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,222,605 UART: [afmc] --
19,226,587 UART: [cold-reset] --
19,230,574 UART: [state] Locking Datavault
19,236,058 UART: [state] Locking PCR0, PCR1 and PCR31
19,238,231 UART: [state] Locking ICCM
19,239,691 UART: [exit] Launching FMC @ 0x40000130
19,248,386 UART:
19,248,623 UART: Running Caliptra FMC ...
19,249,724 UART:
19,249,909 UART: [state] CFI Enabled
19,257,531 UART: [fht] FMC Alias Private Key: 7
21,023,953 UART: [art] Extend RT PCRs Done
21,025,183 UART: [art] Lock RT PCRs Done
21,026,868 UART: [art] Populate DV Done
21,032,342 UART: [fht] FMC Alias Private Key: 7
21,033,884 UART: [art] Derive CDI
21,034,702 UART: [art] Store in slot 0x4
21,077,320 UART: [art] Derive Key Pair
21,078,344 UART: [art] Store priv key in slot 0x5
23,505,270 UART: [art] Derive Key Pair - Done
23,517,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,383 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,898 UART: [art] PUB.X = 469F47D9CB18A553D5CC59F7ADBAC345F624FB6FF216673E7D86FDCAB7026DB033E5312512A9CD6C1DF6670D17EB5AD7
25,233,171 UART: [art] PUB.Y = CBD3E66D5283840CEB09DEFC4895B4EB5172DC8921A9987558639F92D90B262BCE24C06F7854185F7933B2AAAC286554
25,240,437 UART: [art] SIG.R = C2D653C34D7C801402C259243ECCB528461E27A8C860D5AFCAF59DCFC00403879AD02D6AC766002630406B5D2FF61C77
25,247,831 UART: [art] SIG.S = F7F88F07025543AEB5E6F10BDDC898A772F5A6B53B6FCF3CB8CA3F3EBEE47A670975B771C44260DC1726B13D739385B8
26,226,900 UART: Caliptra RT
26,227,588 UART: [state] CFI Enabled
26,360,252 UART: [rt] RT listening for mailbox commands...
26,362,194 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,392,462 UART: [rt]cmd =0x44504543, len=40
26,419,851 >>> mbox cmd response data (40 bytes)
26,421,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,451,604 UART: [rt]cmd =0x44504543, len=96
26,494,390 >>> mbox cmd response data (56 bytes)
26,495,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,525,688 UART: [rt]cmd =0x44504543, len=96
26,569,012 >>> mbox cmd response data (56 bytes)
26,569,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,600,447 UART: [rt]cmd =0x44504543, len=96
26,643,984 >>> mbox cmd response data (56 bytes)
26,644,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,675,093 UART: [rt]cmd =0x44504543, len=96
26,718,788 >>> mbox cmd response data (56 bytes)
26,719,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,749,885 UART: [rt]cmd =0x44504543, len=96
26,794,057 >>> mbox cmd response data (56 bytes)
26,794,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,825,704 UART: [rt]cmd =0x44504543, len=96
26,870,046 >>> mbox cmd response data (56 bytes)
26,870,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,901,337 UART: [rt]cmd =0x44504543, len=96
26,946,516 >>> mbox cmd response data (56 bytes)
26,947,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,977,916 UART: [rt]cmd =0x44504543, len=96
27,023,148 >>> mbox cmd response data (56 bytes)
27,023,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,054,675 UART: [rt]cmd =0x44504543, len=96
27,100,616 >>> mbox cmd response data (56 bytes)
27,101,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,131,855 UART: [rt]cmd =0x44504543, len=96
27,177,406 >>> mbox cmd response data (56 bytes)
27,178,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,208,751 UART: [rt]cmd =0x44504543, len=96
27,255,546 >>> mbox cmd response data (56 bytes)
27,256,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,286,675 UART: [rt]cmd =0x44504543, len=96
27,332,881 >>> mbox cmd response data (56 bytes)
27,333,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,364,227 UART: [rt]cmd =0x44504543, len=96
27,410,592 >>> mbox cmd response data (56 bytes)
27,411,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,441,712 UART: [rt]cmd =0x44504543, len=96
27,488,536 >>> mbox cmd response data (56 bytes)
27,489,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,519,772 UART: [rt]cmd =0x44504543, len=96
27,526,696 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
3,757,090 ready_for_fw is high
3,757,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,048,079 >>> mbox cmd response: success
19,303,459 UART:
19,303,854 UART: Running Caliptra FMC ...
19,304,968 UART:
19,305,127 UART: [state] CFI Enabled
19,312,999 UART: [fht] FMC Alias Private Key: 7
21,079,507 UART: [art] Extend RT PCRs Done
21,080,743 UART: [art] Lock RT PCRs Done
21,082,567 UART: [art] Populate DV Done
21,088,373 UART: [fht] FMC Alias Private Key: 7
21,090,088 UART: [art] Derive CDI
21,090,911 UART: [art] Store in slot 0x4
21,133,406 UART: [art] Derive Key Pair
21,134,451 UART: [art] Store priv key in slot 0x5
23,561,770 UART: [art] Derive Key Pair - Done
23,574,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,978 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,508 UART: [art] PUB.X = D7CFDC37F23CB320637A6EF6690B1DB9727A5D0040E5CDA7331C7C433BF4FA8D265F4C4DC819D19CDD5FF9995D1F7A26
25,289,753 UART: [art] PUB.Y = F73295D16BF880FA8E48EE5C398707378C1C6001FA5E18C69275B1173066424046A6513008AACB70F98A5CBB240F7D5D
25,296,996 UART: [art] SIG.R = 6ACB1365D3DFA81B80AA889D35DFC25E022D362673085C640C64791670799752E0A600185BC98A0F2ACECCD45F9F98BD
25,304,382 UART: [art] SIG.S = DD335E58E11666BE7728A141191922B7275030A22D51B011A6C7E7566B0B86B1B68C8B377F48000A533FF5501E709633
26,283,361 UART: Caliptra RT
26,284,079 UART: [state] CFI Enabled
26,417,420 UART: [rt] RT listening for mailbox commands...
26,419,348 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,449,188 UART: [rt]cmd =0x44504543, len=40
26,476,684 >>> mbox cmd response data (40 bytes)
26,477,858 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,508,674 UART: [rt]cmd =0x44504543, len=96
26,551,209 >>> mbox cmd response data (56 bytes)
26,551,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,582,522 UART: [rt]cmd =0x44504543, len=96
26,625,742 >>> mbox cmd response data (56 bytes)
26,626,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,657,031 UART: [rt]cmd =0x44504543, len=96
26,700,347 >>> mbox cmd response data (56 bytes)
26,701,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,731,612 UART: [rt]cmd =0x44504543, len=96
26,775,675 >>> mbox cmd response data (56 bytes)
26,776,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,806,949 UART: [rt]cmd =0x44504543, len=96
26,851,504 >>> mbox cmd response data (56 bytes)
26,852,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,882,796 UART: [rt]cmd =0x44504543, len=96
26,927,436 >>> mbox cmd response data (56 bytes)
26,928,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,958,566 UART: [rt]cmd =0x44504543, len=96
27,003,361 >>> mbox cmd response data (56 bytes)
27,004,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,034,631 UART: [rt]cmd =0x44504543, len=96
27,079,648 >>> mbox cmd response data (56 bytes)
27,080,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,110,732 UART: [rt]cmd =0x44504543, len=96
27,156,344 >>> mbox cmd response data (56 bytes)
27,157,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,187,651 UART: [rt]cmd =0x44504543, len=96
27,233,698 >>> mbox cmd response data (56 bytes)
27,234,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,264,928 UART: [rt]cmd =0x44504543, len=96
27,311,144 >>> mbox cmd response data (56 bytes)
27,311,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,342,337 UART: [rt]cmd =0x44504543, len=96
27,388,165 >>> mbox cmd response data (56 bytes)
27,388,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,419,411 UART: [rt]cmd =0x44504543, len=96
27,465,958 >>> mbox cmd response data (56 bytes)
27,466,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,497,442 UART: [rt]cmd =0x44504543, len=96
27,544,457 >>> mbox cmd response data (56 bytes)
27,545,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,575,634 UART: [rt]cmd =0x44504543, len=96
27,582,454 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,253 UART: [kat] SHA2-256
882,184 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,299 UART: [kat] ++
886,451 UART: [kat] sha1
890,707 UART: [kat] SHA2-256
892,645 UART: [kat] SHA2-384
895,584 UART: [kat] SHA2-512-ACC
897,485 UART: [kat] ECC-384
902,658 UART: [kat] HMAC-384Kdf
907,422 UART: [kat] LMS
1,475,618 UART: [kat] --
1,476,713 UART: [cold-reset] ++
1,477,215 UART: [fht] Storing FHT @ 0x50003400
1,480,128 UART: [idev] ++
1,480,296 UART: [idev] CDI.KEYID = 6
1,480,656 UART: [idev] SUBJECT.KEYID = 7
1,481,080 UART: [idev] UDS.KEYID = 0
1,481,425 ready_for_fw is high
1,481,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,500 UART: [idev] Erasing UDS.KEYID = 0
1,505,140 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,742 UART: [idev] --
1,514,701 UART: [ldev] ++
1,514,869 UART: [ldev] CDI.KEYID = 6
1,515,232 UART: [ldev] SUBJECT.KEYID = 5
1,515,658 UART: [ldev] AUTHORITY.KEYID = 7
1,516,121 UART: [ldev] FE.KEYID = 1
1,521,391 UART: [ldev] Erasing FE.KEYID = 1
1,546,830 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,622 UART: [ldev] --
1,585,995 UART: [fwproc] Waiting for Commands...
1,586,706 UART: [fwproc] Received command 0x46574c44
1,587,497 UART: [fwproc] Received Image of size 118548 bytes
2,932,201 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,347 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,565 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,818 >>> mbox cmd response: success
3,131,984 UART: [afmc] ++
3,132,152 UART: [afmc] CDI.KEYID = 6
3,132,514 UART: [afmc] SUBJECT.KEYID = 7
3,132,939 UART: [afmc] AUTHORITY.KEYID = 5
3,167,624 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,060 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,840 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,549 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,432 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,115 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,897 UART: [afmc] --
3,210,849 UART: [cold-reset] --
3,211,885 UART: [state] Locking Datavault
3,213,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,820 UART: [state] Locking ICCM
3,214,460 UART: [exit] Launching FMC @ 0x40000130
3,219,790 UART:
3,219,806 UART: Running Caliptra FMC ...
3,220,214 UART:
3,220,268 UART: [state] CFI Enabled
3,230,526 UART: [fht] FMC Alias Private Key: 7
3,349,608 UART: [art] Extend RT PCRs Done
3,350,036 UART: [art] Lock RT PCRs Done
3,351,774 UART: [art] Populate DV Done
3,360,039 UART: [fht] FMC Alias Private Key: 7
3,361,061 UART: [art] Derive CDI
3,361,341 UART: [art] Store in slot 0x4
3,447,179 UART: [art] Derive Key Pair
3,447,539 UART: [art] Store priv key in slot 0x5
3,461,078 UART: [art] Derive Key Pair - Done
3,476,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,311 UART: [art] PUB.X = 8ACA316A183B73F1506C18DA199DBD708A65D448F1F1152DA8C7171F642CB570BF9B966C1EC99339F5B19B64B7DBD8C5
3,499,091 UART: [art] PUB.Y = EF8172229EB1AC36F70B9437102753CC0BE480AD32C484E4D407C2D3A61529549A359745F1E4E8FC2658C79178BDA04C
3,506,032 UART: [art] SIG.R = DE95DFD2497635CEE03E76901DE82E1512D6B823E89A4753134532EA88CB4DC0EFD88D9A96C1A16292C2C52B17980E41
3,512,803 UART: [art] SIG.S = 852CF763AB5F9C305E076FB41EADC85F8A9D70E1E4CD3F6294E21D7E6EA7E3392CA899691551D43B3A6D38F8533D5724
3,536,876 UART: Caliptra RT
3,537,127 UART: [state] CFI Enabled
3,657,498 UART: [rt] RT listening for mailbox commands...
3,658,168 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,952 UART: [rt]cmd =0x44504543, len=40
3,715,076 >>> mbox cmd response data (40 bytes)
3,715,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,745,160 UART: [rt]cmd =0x44504543, len=96
3,787,886 >>> mbox cmd response data (56 bytes)
3,787,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,992 UART: [rt]cmd =0x44504543, len=96
3,860,756 >>> mbox cmd response data (56 bytes)
3,860,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,890,776 UART: [rt]cmd =0x44504543, len=96
3,933,409 >>> mbox cmd response data (56 bytes)
3,933,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,327 UART: [rt]cmd =0x44504543, len=96
4,007,043 >>> mbox cmd response data (56 bytes)
4,007,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,037,059 UART: [rt]cmd =0x44504543, len=96
4,080,812 >>> mbox cmd response data (56 bytes)
4,080,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,110,744 UART: [rt]cmd =0x44504543, len=96
4,154,974 >>> mbox cmd response data (56 bytes)
4,154,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,184,718 UART: [rt]cmd =0x44504543, len=96
4,229,151 >>> mbox cmd response data (56 bytes)
4,229,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,258,993 UART: [rt]cmd =0x44504543, len=96
4,303,983 >>> mbox cmd response data (56 bytes)
4,303,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,333,767 UART: [rt]cmd =0x44504543, len=96
4,378,262 >>> mbox cmd response data (56 bytes)
4,378,263 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,408,258 UART: [rt]cmd =0x44504543, len=96
4,454,320 >>> mbox cmd response data (56 bytes)
4,454,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,484,412 UART: [rt]cmd =0x44504543, len=96
4,530,461 >>> mbox cmd response data (56 bytes)
4,530,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,560,473 UART: [rt]cmd =0x44504543, len=96
4,606,195 >>> mbox cmd response data (56 bytes)
4,606,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,636,291 UART: [rt]cmd =0x44504543, len=96
4,682,750 >>> mbox cmd response data (56 bytes)
4,682,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,712,664 UART: [rt]cmd =0x44504543, len=96
4,759,158 >>> mbox cmd response data (56 bytes)
4,759,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,789,026 UART: [rt]cmd =0x44504543, len=96
4,796,257 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,155 ready_for_fw is high
1,362,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,080 >>> mbox cmd response: success
3,040,215 UART:
3,040,231 UART: Running Caliptra FMC ...
3,040,639 UART:
3,040,693 UART: [state] CFI Enabled
3,051,269 UART: [fht] FMC Alias Private Key: 7
3,170,273 UART: [art] Extend RT PCRs Done
3,170,701 UART: [art] Lock RT PCRs Done
3,172,515 UART: [art] Populate DV Done
3,180,632 UART: [fht] FMC Alias Private Key: 7
3,181,810 UART: [art] Derive CDI
3,182,090 UART: [art] Store in slot 0x4
3,267,820 UART: [art] Derive Key Pair
3,268,180 UART: [art] Store priv key in slot 0x5
3,281,363 UART: [art] Derive Key Pair - Done
3,295,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,336 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,101 UART: [art] PUB.X = D8A4E78B2C7D469492D75E39366E5ADCD954AD950172F88FF299C0FF0BBC6689C590FD7E70476CEDD9280DD3C4C524D6
3,318,874 UART: [art] PUB.Y = 568EAE609B4038FE360D8A1C4D8DDF972973FE9E5C58FE407551FE4D8EC889B0107F38701785506933BCBDFAF3256C9C
3,325,829 UART: [art] SIG.R = 4CC9BE22ABAEE45F39EFCA48725F68130F4708698B7B42910575B946E0F035D58F3A2FEF5E6C2F0708D8C447CBA1EF68
3,332,596 UART: [art] SIG.S = 5015976B9574334781E87DBEB425BC50E2B6C647DD2A11C3325DDA35BB7F8245107E4594EB2E317C3902D9494280724D
3,356,865 UART: Caliptra RT
3,357,116 UART: [state] CFI Enabled
3,477,543 UART: [rt] RT listening for mailbox commands...
3,478,213 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,327 UART: [rt]cmd =0x44504543, len=40
3,535,927 >>> mbox cmd response data (40 bytes)
3,535,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,039 UART: [rt]cmd =0x44504543, len=96
3,608,671 >>> mbox cmd response data (56 bytes)
3,608,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,593 UART: [rt]cmd =0x44504543, len=96
3,681,605 >>> mbox cmd response data (56 bytes)
3,681,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,365 UART: [rt]cmd =0x44504543, len=96
3,754,728 >>> mbox cmd response data (56 bytes)
3,754,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,784,472 UART: [rt]cmd =0x44504543, len=96
3,827,632 >>> mbox cmd response data (56 bytes)
3,827,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,857,534 UART: [rt]cmd =0x44504543, len=96
3,901,831 >>> mbox cmd response data (56 bytes)
3,901,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,931,805 UART: [rt]cmd =0x44504543, len=96
3,975,471 >>> mbox cmd response data (56 bytes)
3,975,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,005,349 UART: [rt]cmd =0x44504543, len=96
4,049,738 >>> mbox cmd response data (56 bytes)
4,049,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,079,582 UART: [rt]cmd =0x44504543, len=96
4,124,238 >>> mbox cmd response data (56 bytes)
4,124,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,154,072 UART: [rt]cmd =0x44504543, len=96
4,199,149 >>> mbox cmd response data (56 bytes)
4,199,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,229,081 UART: [rt]cmd =0x44504543, len=96
4,274,443 >>> mbox cmd response data (56 bytes)
4,274,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,304,293 UART: [rt]cmd =0x44504543, len=96
4,349,726 >>> mbox cmd response data (56 bytes)
4,349,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,379,640 UART: [rt]cmd =0x44504543, len=96
4,424,838 >>> mbox cmd response data (56 bytes)
4,424,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,454,728 UART: [rt]cmd =0x44504543, len=96
4,501,131 >>> mbox cmd response data (56 bytes)
4,501,132 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,531,033 UART: [rt]cmd =0x44504543, len=96
4,577,143 >>> mbox cmd response data (56 bytes)
4,577,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,606,941 UART: [rt]cmd =0x44504543, len=96
4,614,198 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,882 UART: [kat] SHA2-256
881,813 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,928 UART: [kat] ++
886,080 UART: [kat] sha1
890,176 UART: [kat] SHA2-256
892,114 UART: [kat] SHA2-384
894,983 UART: [kat] SHA2-512-ACC
896,884 UART: [kat] ECC-384
902,641 UART: [kat] HMAC-384Kdf
907,191 UART: [kat] LMS
1,475,387 UART: [kat] --
1,476,252 UART: [cold-reset] ++
1,476,656 UART: [fht] Storing FHT @ 0x50003400
1,479,473 UART: [idev] ++
1,479,641 UART: [idev] CDI.KEYID = 6
1,480,001 UART: [idev] SUBJECT.KEYID = 7
1,480,425 UART: [idev] UDS.KEYID = 0
1,480,770 ready_for_fw is high
1,480,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,391 UART: [idev] Erasing UDS.KEYID = 0
1,505,067 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,915 UART: [idev] --
1,514,976 UART: [ldev] ++
1,515,144 UART: [ldev] CDI.KEYID = 6
1,515,507 UART: [ldev] SUBJECT.KEYID = 5
1,515,933 UART: [ldev] AUTHORITY.KEYID = 7
1,516,396 UART: [ldev] FE.KEYID = 1
1,521,346 UART: [ldev] Erasing FE.KEYID = 1
1,546,601 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,109 UART: [ldev] --
1,585,594 UART: [fwproc] Waiting for Commands...
1,586,363 UART: [fwproc] Received command 0x46574c44
1,587,154 UART: [fwproc] Received Image of size 118548 bytes
2,932,216 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,496 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,714 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,045 >>> mbox cmd response: success
3,132,243 UART: [afmc] ++
3,132,411 UART: [afmc] CDI.KEYID = 6
3,132,773 UART: [afmc] SUBJECT.KEYID = 7
3,133,198 UART: [afmc] AUTHORITY.KEYID = 5
3,168,863 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,035 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,815 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,524 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,407 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,090 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,876 UART: [afmc] --
3,211,770 UART: [cold-reset] --
3,212,784 UART: [state] Locking Datavault
3,213,955 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,559 UART: [state] Locking ICCM
3,215,207 UART: [exit] Launching FMC @ 0x40000130
3,220,537 UART:
3,220,553 UART: Running Caliptra FMC ...
3,220,961 UART:
3,221,104 UART: [state] CFI Enabled
3,231,680 UART: [fht] FMC Alias Private Key: 7
3,351,024 UART: [art] Extend RT PCRs Done
3,351,452 UART: [art] Lock RT PCRs Done
3,352,920 UART: [art] Populate DV Done
3,361,093 UART: [fht] FMC Alias Private Key: 7
3,362,221 UART: [art] Derive CDI
3,362,501 UART: [art] Store in slot 0x4
3,447,953 UART: [art] Derive Key Pair
3,448,313 UART: [art] Store priv key in slot 0x5
3,461,368 UART: [art] Derive Key Pair - Done
3,475,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,176 UART: [art] PUB.X = E98F9699403090699627FB8E99FEF99E8DD1C70822D0C688D6B29BF91DAE923D03AF641630A1717461758503CA5EA65C
3,498,935 UART: [art] PUB.Y = D9221E0CCE2F91011F5CDDA3C436BCC5EC5721C20A013EB9B8122E62C3EDCB88980D28BBC2ED266EE7C307FC596DDFC9
3,505,891 UART: [art] SIG.R = 9651975D2CCD89876DB8751F9FAB4B512C3728036AA5BF0724AD6853F4828027E2A5A50A243F4B31023AC63FE6810C18
3,512,644 UART: [art] SIG.S = CB84A28743614392D349AC1A3E65F8D6FB110630E2D521D8E4DE466CF0F2741756FB2405B069063A7A631CB23A8E3D9B
3,536,673 UART: Caliptra RT
3,537,016 UART: [state] CFI Enabled
3,657,665 UART: [rt] RT listening for mailbox commands...
3,658,335 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,641 UART: [rt]cmd =0x44504543, len=40
3,716,245 >>> mbox cmd response data (40 bytes)
3,716,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,746,193 UART: [rt]cmd =0x44504543, len=96
3,789,473 >>> mbox cmd response data (56 bytes)
3,789,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,399 UART: [rt]cmd =0x44504543, len=96
3,862,509 >>> mbox cmd response data (56 bytes)
3,862,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,327 UART: [rt]cmd =0x44504543, len=96
3,935,312 >>> mbox cmd response data (56 bytes)
3,935,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,965,222 UART: [rt]cmd =0x44504543, len=96
4,008,032 >>> mbox cmd response data (56 bytes)
4,008,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,038,090 UART: [rt]cmd =0x44504543, len=96
4,081,609 >>> mbox cmd response data (56 bytes)
4,081,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,111,425 UART: [rt]cmd =0x44504543, len=96
4,156,105 >>> mbox cmd response data (56 bytes)
4,156,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,186,223 UART: [rt]cmd =0x44504543, len=96
4,230,360 >>> mbox cmd response data (56 bytes)
4,230,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,260,222 UART: [rt]cmd =0x44504543, len=96
4,305,048 >>> mbox cmd response data (56 bytes)
4,305,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,334,944 UART: [rt]cmd =0x44504543, len=96
4,379,843 >>> mbox cmd response data (56 bytes)
4,379,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,409,855 UART: [rt]cmd =0x44504543, len=96
4,454,953 >>> mbox cmd response data (56 bytes)
4,454,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,485,039 UART: [rt]cmd =0x44504543, len=96
4,530,480 >>> mbox cmd response data (56 bytes)
4,530,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,560,392 UART: [rt]cmd =0x44504543, len=96
4,606,450 >>> mbox cmd response data (56 bytes)
4,606,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,636,450 UART: [rt]cmd =0x44504543, len=96
4,682,263 >>> mbox cmd response data (56 bytes)
4,682,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,712,273 UART: [rt]cmd =0x44504543, len=96
4,759,523 >>> mbox cmd response data (56 bytes)
4,759,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,789,459 UART: [rt]cmd =0x44504543, len=96
4,796,648 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,672 ready_for_fw is high
1,362,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,179 >>> mbox cmd response: success
3,042,106 UART:
3,042,122 UART: Running Caliptra FMC ...
3,042,530 UART:
3,042,673 UART: [state] CFI Enabled
3,053,195 UART: [fht] FMC Alias Private Key: 7
3,172,011 UART: [art] Extend RT PCRs Done
3,172,439 UART: [art] Lock RT PCRs Done
3,174,291 UART: [art] Populate DV Done
3,182,636 UART: [fht] FMC Alias Private Key: 7
3,183,620 UART: [art] Derive CDI
3,183,900 UART: [art] Store in slot 0x4
3,269,732 UART: [art] Derive Key Pair
3,270,092 UART: [art] Store priv key in slot 0x5
3,283,451 UART: [art] Derive Key Pair - Done
3,298,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,556 UART: [art] PUB.X = 4A7CCF78E6EE3663E5CD3086243D92F0C86D6EF8D142A091D798BFC7A0D864E64E6604B7B6D0A354881B35554C45D6AE
3,321,331 UART: [art] PUB.Y = 1ACEE08C35D45A2817A170491A0FE4B6DD11478FC71C1F64F79305547DABFC261C62914B88E68C14180B078CEB3ECDAE
3,328,281 UART: [art] SIG.R = A739BBFFC95E0EADB55341D4D5BF7E8DD5C604B8CDB7D0C44D513014F1DBD7BB7A18F293FFCAEBFE9188585FF5BFAC8B
3,335,081 UART: [art] SIG.S = 67C187A049201624528A5209806B53A1FB1CA77699D26FE6D1254D4B3FB8B36F70C192FFCC80331128D6060E472AD569
3,358,374 UART: Caliptra RT
3,358,717 UART: [state] CFI Enabled
3,478,903 UART: [rt] RT listening for mailbox commands...
3,479,573 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,591 UART: [rt]cmd =0x44504543, len=40
3,536,575 >>> mbox cmd response data (40 bytes)
3,536,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,661 UART: [rt]cmd =0x44504543, len=96
3,609,003 >>> mbox cmd response data (56 bytes)
3,609,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,937 UART: [rt]cmd =0x44504543, len=96
3,681,881 >>> mbox cmd response data (56 bytes)
3,681,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,841 UART: [rt]cmd =0x44504543, len=96
3,755,760 >>> mbox cmd response data (56 bytes)
3,755,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,785,590 UART: [rt]cmd =0x44504543, len=96
3,829,266 >>> mbox cmd response data (56 bytes)
3,829,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,859,222 UART: [rt]cmd =0x44504543, len=96
3,902,943 >>> mbox cmd response data (56 bytes)
3,902,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,933,091 UART: [rt]cmd =0x44504543, len=96
3,977,301 >>> mbox cmd response data (56 bytes)
3,977,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,273 UART: [rt]cmd =0x44504543, len=96
4,051,840 >>> mbox cmd response data (56 bytes)
4,051,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,081,890 UART: [rt]cmd =0x44504543, len=96
4,126,496 >>> mbox cmd response data (56 bytes)
4,126,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,156,652 UART: [rt]cmd =0x44504543, len=96
4,202,123 >>> mbox cmd response data (56 bytes)
4,202,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,232,061 UART: [rt]cmd =0x44504543, len=96
4,276,787 >>> mbox cmd response data (56 bytes)
4,276,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,306,701 UART: [rt]cmd =0x44504543, len=96
4,352,456 >>> mbox cmd response data (56 bytes)
4,352,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,382,274 UART: [rt]cmd =0x44504543, len=96
4,428,226 >>> mbox cmd response data (56 bytes)
4,428,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,458,118 UART: [rt]cmd =0x44504543, len=96
4,504,675 >>> mbox cmd response data (56 bytes)
4,504,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,534,625 UART: [rt]cmd =0x44504543, len=96
4,581,531 >>> mbox cmd response data (56 bytes)
4,581,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,611,523 UART: [rt]cmd =0x44504543, len=96
4,619,330 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,308 UART: [kat] ++
895,460 UART: [kat] sha1
899,772 UART: [kat] SHA2-256
901,712 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
915,977 UART: [kat] HMAC-384Kdf
920,475 UART: [kat] LMS
1,168,787 UART: [kat] --
1,169,488 UART: [cold-reset] ++
1,169,974 UART: [fht] FHT @ 0x50003400
1,172,536 UART: [idev] ++
1,172,704 UART: [idev] CDI.KEYID = 6
1,173,065 UART: [idev] SUBJECT.KEYID = 7
1,173,490 UART: [idev] UDS.KEYID = 0
1,173,836 ready_for_fw is high
1,173,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,669 UART: [idev] Erasing UDS.KEYID = 0
1,198,641 UART: [idev] Sha1 KeyId Algorithm
1,207,335 UART: [idev] --
1,208,234 UART: [ldev] ++
1,208,402 UART: [ldev] CDI.KEYID = 6
1,208,766 UART: [ldev] SUBJECT.KEYID = 5
1,209,193 UART: [ldev] AUTHORITY.KEYID = 7
1,209,656 UART: [ldev] FE.KEYID = 1
1,214,928 UART: [ldev] Erasing FE.KEYID = 1
1,241,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,110 UART: [ldev] --
1,280,461 UART: [fwproc] Wait for Commands...
1,281,272 UART: [fwproc] Recv command 0x46574c44
1,282,005 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,181 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,356 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,637 >>> mbox cmd response: success
2,825,689 UART: [afmc] ++
2,825,857 UART: [afmc] CDI.KEYID = 6
2,826,220 UART: [afmc] SUBJECT.KEYID = 7
2,826,646 UART: [afmc] AUTHORITY.KEYID = 5
2,861,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,523 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,233 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,114 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,815 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,554 UART: [afmc] --
2,904,491 UART: [cold-reset] --
2,905,427 UART: [state] Locking Datavault
2,906,820 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,424 UART: [state] Locking ICCM
2,908,040 UART: [exit] Launching FMC @ 0x40000130
2,913,370 UART:
2,913,386 UART: Running Caliptra FMC ...
2,913,794 UART:
2,913,848 UART: [state] CFI Enabled
2,924,122 UART: [fht] FMC Alias Private Key: 7
3,043,304 UART: [art] Extend RT PCRs Done
3,043,732 UART: [art] Lock RT PCRs Done
3,045,514 UART: [art] Populate DV Done
3,053,957 UART: [fht] FMC Alias Private Key: 7
3,054,895 UART: [art] Derive CDI
3,055,175 UART: [art] Store in slot 0x4
3,140,806 UART: [art] Derive Key Pair
3,141,166 UART: [art] Store priv key in slot 0x5
3,154,382 UART: [art] Derive Key Pair - Done
3,169,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,266 UART: [art] PUB.X = 92FEC49A75C4950101D93A44B3389FD03DB31CF64BB62487EEE8F0C89F5326BE55B7666610450841AF5E127B92528F72
3,192,025 UART: [art] PUB.Y = 59E4F54B708C9F9302F71B7354B64F65D74B4361053C21E5787681C721FA5F6ECB46EA86AB3FEF0C77250D4B214ED0EB
3,198,969 UART: [art] SIG.R = DEB68D09AA97B21CB0013D24D95C736D658736D2D427FEC4E78F024511BF0172CC67EB96BA40C6B6509902EFB3DB71FD
3,205,736 UART: [art] SIG.S = C132BF010D7AA1EE8B373F6B3E3B5F4FA7EF6AC1D2453B2CF85008AB4156061F75580D0EE29EAF08CE506CAE12ECC704
3,229,544 UART: Caliptra RT
3,229,795 UART: [state] CFI Enabled
3,349,753 UART: [rt] RT listening for mailbox commands...
3,350,423 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,539 UART: [rt]cmd =0x44504543, len=40
3,408,223 >>> mbox cmd response data (40 bytes)
3,408,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,203 UART: [rt]cmd =0x44504543, len=96
3,480,927 >>> mbox cmd response data (56 bytes)
3,480,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,835 UART: [rt]cmd =0x44504543, len=96
3,553,245 >>> mbox cmd response data (56 bytes)
3,553,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,582,979 UART: [rt]cmd =0x44504543, len=96
3,626,906 >>> mbox cmd response data (56 bytes)
3,626,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,656,860 UART: [rt]cmd =0x44504543, len=96
3,700,774 >>> mbox cmd response data (56 bytes)
3,700,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,778 UART: [rt]cmd =0x44504543, len=96
3,774,383 >>> mbox cmd response data (56 bytes)
3,774,384 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,804,133 UART: [rt]cmd =0x44504543, len=96
3,848,503 >>> mbox cmd response data (56 bytes)
3,848,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,878,425 UART: [rt]cmd =0x44504543, len=96
3,923,802 >>> mbox cmd response data (56 bytes)
3,923,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,953,602 UART: [rt]cmd =0x44504543, len=96
3,998,238 >>> mbox cmd response data (56 bytes)
3,998,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,314 UART: [rt]cmd =0x44504543, len=96
4,073,133 >>> mbox cmd response data (56 bytes)
4,073,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,103,179 UART: [rt]cmd =0x44504543, len=96
4,148,605 >>> mbox cmd response data (56 bytes)
4,148,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,178,745 UART: [rt]cmd =0x44504543, len=96
4,224,188 >>> mbox cmd response data (56 bytes)
4,224,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,253,930 UART: [rt]cmd =0x44504543, len=96
4,299,736 >>> mbox cmd response data (56 bytes)
4,299,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,329,770 UART: [rt]cmd =0x44504543, len=96
4,375,365 >>> mbox cmd response data (56 bytes)
4,375,366 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,405,301 UART: [rt]cmd =0x44504543, len=96
4,451,149 >>> mbox cmd response data (56 bytes)
4,451,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,480,983 UART: [rt]cmd =0x44504543, len=96
4,488,508 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,314 ready_for_fw is high
1,059,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,694 >>> mbox cmd response: success
2,739,337 UART:
2,739,353 UART: Running Caliptra FMC ...
2,739,761 UART:
2,739,815 UART: [state] CFI Enabled
2,750,189 UART: [fht] FMC Alias Private Key: 7
2,869,219 UART: [art] Extend RT PCRs Done
2,869,647 UART: [art] Lock RT PCRs Done
2,871,641 UART: [art] Populate DV Done
2,880,008 UART: [fht] FMC Alias Private Key: 7
2,881,136 UART: [art] Derive CDI
2,881,416 UART: [art] Store in slot 0x4
2,966,893 UART: [art] Derive Key Pair
2,967,253 UART: [art] Store priv key in slot 0x5
2,980,495 UART: [art] Derive Key Pair - Done
2,995,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,478 UART: [art] PUB.X = 4EDE7F2132458D185B965DC7207DA5767DC867C47D6A35394A993514C9039CA6B67DDA55600424D8D2411DAB5FDE8875
3,018,242 UART: [art] PUB.Y = A9CDDF9C649E47A514B008E3D0498AD8557D901F181DC36DCF8BD65418FC5240F6C1491E266BACF4AD2DB76997F511F1
3,025,201 UART: [art] SIG.R = 819992FC1D1D1B37E9C56256CEF736CD6B01E2CCB9562CEF1F24B3B7F4CCE1C03659F10BCDCC965A4B8A15AF34BEF465
3,031,987 UART: [art] SIG.S = 29EFF21C0C5D08C401905D02AFFD6033811EBCEA11CB82A6B2183D1F675670BEDFB9F4AE67C3E0D157DB0C38815916D0
3,055,452 UART: Caliptra RT
3,055,703 UART: [state] CFI Enabled
3,175,186 UART: [rt] RT listening for mailbox commands...
3,175,856 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,090 UART: [rt]cmd =0x44504543, len=40
3,233,232 >>> mbox cmd response data (40 bytes)
3,233,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,154 UART: [rt]cmd =0x44504543, len=96
3,305,750 >>> mbox cmd response data (56 bytes)
3,305,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,335,728 UART: [rt]cmd =0x44504543, len=96
3,379,460 >>> mbox cmd response data (56 bytes)
3,379,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,538 UART: [rt]cmd =0x44504543, len=96
3,452,893 >>> mbox cmd response data (56 bytes)
3,452,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,482,957 UART: [rt]cmd =0x44504543, len=96
3,526,695 >>> mbox cmd response data (56 bytes)
3,526,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,556,679 UART: [rt]cmd =0x44504543, len=96
3,600,638 >>> mbox cmd response data (56 bytes)
3,600,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,630,698 UART: [rt]cmd =0x44504543, len=96
3,675,860 >>> mbox cmd response data (56 bytes)
3,675,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,705,604 UART: [rt]cmd =0x44504543, len=96
3,750,135 >>> mbox cmd response data (56 bytes)
3,750,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,315 UART: [rt]cmd =0x44504543, len=96
3,825,095 >>> mbox cmd response data (56 bytes)
3,825,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,855,019 UART: [rt]cmd =0x44504543, len=96
3,900,138 >>> mbox cmd response data (56 bytes)
3,900,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,929,958 UART: [rt]cmd =0x44504543, len=96
3,974,846 >>> mbox cmd response data (56 bytes)
3,974,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,004,780 UART: [rt]cmd =0x44504543, len=96
4,050,153 >>> mbox cmd response data (56 bytes)
4,050,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,080,139 UART: [rt]cmd =0x44504543, len=96
4,126,415 >>> mbox cmd response data (56 bytes)
4,126,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,156,237 UART: [rt]cmd =0x44504543, len=96
4,202,980 >>> mbox cmd response data (56 bytes)
4,202,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,232,850 UART: [rt]cmd =0x44504543, len=96
4,280,136 >>> mbox cmd response data (56 bytes)
4,280,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,182 UART: [rt]cmd =0x44504543, len=96
4,317,581 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
891,779 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,883 UART: [kat] ++
896,035 UART: [kat] sha1
900,293 UART: [kat] SHA2-256
902,233 UART: [kat] SHA2-384
904,922 UART: [kat] SHA2-512-ACC
906,823 UART: [kat] ECC-384
916,784 UART: [kat] HMAC-384Kdf
921,306 UART: [kat] LMS
1,169,618 UART: [kat] --
1,170,367 UART: [cold-reset] ++
1,170,829 UART: [fht] FHT @ 0x50003400
1,173,533 UART: [idev] ++
1,173,701 UART: [idev] CDI.KEYID = 6
1,174,062 UART: [idev] SUBJECT.KEYID = 7
1,174,487 UART: [idev] UDS.KEYID = 0
1,174,833 ready_for_fw is high
1,174,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,698 UART: [idev] Erasing UDS.KEYID = 0
1,199,508 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,141 UART: [ldev] ++
1,209,309 UART: [ldev] CDI.KEYID = 6
1,209,673 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,215,897 UART: [ldev] Erasing FE.KEYID = 1
1,241,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,381 UART: [ldev] --
1,281,648 UART: [fwproc] Wait for Commands...
1,282,281 UART: [fwproc] Recv command 0x46574c44
1,283,014 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,623 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,030 >>> mbox cmd response: success
2,828,158 UART: [afmc] ++
2,828,326 UART: [afmc] CDI.KEYID = 6
2,828,689 UART: [afmc] SUBJECT.KEYID = 7
2,829,115 UART: [afmc] AUTHORITY.KEYID = 5
2,864,534 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,372 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,082 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,963 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,664 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,337 UART: [afmc] --
2,907,364 UART: [cold-reset] --
2,908,304 UART: [state] Locking Datavault
2,909,343 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,947 UART: [state] Locking ICCM
2,910,595 UART: [exit] Launching FMC @ 0x40000130
2,915,925 UART:
2,915,941 UART: Running Caliptra FMC ...
2,916,349 UART:
2,916,492 UART: [state] CFI Enabled
2,927,540 UART: [fht] FMC Alias Private Key: 7
3,046,888 UART: [art] Extend RT PCRs Done
3,047,316 UART: [art] Lock RT PCRs Done
3,048,872 UART: [art] Populate DV Done
3,056,903 UART: [fht] FMC Alias Private Key: 7
3,057,987 UART: [art] Derive CDI
3,058,267 UART: [art] Store in slot 0x4
3,144,250 UART: [art] Derive Key Pair
3,144,610 UART: [art] Store priv key in slot 0x5
3,158,356 UART: [art] Derive Key Pair - Done
3,173,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,505 UART: [art] PUB.X = 74290F8D558333E570941DC31903851FD8433D0B23B11D75C9839C9432443EF364EA5ABA370F977D3DF34AE5BFD8C01E
3,196,263 UART: [art] PUB.Y = 76D087F79A1AB072D2CA6C8513BB478EE057C4C8524CD5F0BA0F1661DD3BF6722754938798EF8724AE258F001B965EDD
3,203,194 UART: [art] SIG.R = E38454CF4B4DCCA006F83E47BCCEA25F094A8243B62343CF63CC7B669E4FEE33824220CE004EA7FF54C2968285D8ABC4
3,209,950 UART: [art] SIG.S = 99930E8EE9440F1D9D62E2D5EA4C433BCF8DC9BA47E60D61BAFE98EEC04207B74AABA68CAAEFC9B2950753A44CDC8A25
3,233,691 UART: Caliptra RT
3,234,034 UART: [state] CFI Enabled
3,354,348 UART: [rt] RT listening for mailbox commands...
3,355,018 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,306 UART: [rt]cmd =0x44504543, len=40
3,412,680 >>> mbox cmd response data (40 bytes)
3,412,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,634 UART: [rt]cmd =0x44504543, len=96
3,485,732 >>> mbox cmd response data (56 bytes)
3,485,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,488 UART: [rt]cmd =0x44504543, len=96
3,558,316 >>> mbox cmd response data (56 bytes)
3,558,317 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,588,194 UART: [rt]cmd =0x44504543, len=96
3,631,327 >>> mbox cmd response data (56 bytes)
3,631,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,277 UART: [rt]cmd =0x44504543, len=96
3,704,481 >>> mbox cmd response data (56 bytes)
3,704,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,734,357 UART: [rt]cmd =0x44504543, len=96
3,778,324 >>> mbox cmd response data (56 bytes)
3,778,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,808,434 UART: [rt]cmd =0x44504543, len=96
3,852,350 >>> mbox cmd response data (56 bytes)
3,852,351 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,882,430 UART: [rt]cmd =0x44504543, len=96
3,927,295 >>> mbox cmd response data (56 bytes)
3,927,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,957,399 UART: [rt]cmd =0x44504543, len=96
4,001,905 >>> mbox cmd response data (56 bytes)
4,001,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,032,101 UART: [rt]cmd =0x44504543, len=96
4,077,664 >>> mbox cmd response data (56 bytes)
4,077,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,107,460 UART: [rt]cmd =0x44504543, len=96
4,152,688 >>> mbox cmd response data (56 bytes)
4,152,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,182,550 UART: [rt]cmd =0x44504543, len=96
4,229,223 >>> mbox cmd response data (56 bytes)
4,229,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,259,301 UART: [rt]cmd =0x44504543, len=96
4,305,199 >>> mbox cmd response data (56 bytes)
4,305,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,335,005 UART: [rt]cmd =0x44504543, len=96
4,381,492 >>> mbox cmd response data (56 bytes)
4,381,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,411,450 UART: [rt]cmd =0x44504543, len=96
4,457,438 >>> mbox cmd response data (56 bytes)
4,457,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,487,308 UART: [rt]cmd =0x44504543, len=96
4,494,443 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,233 ready_for_fw is high
1,059,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,795 >>> mbox cmd response: success
2,739,396 UART:
2,739,412 UART: Running Caliptra FMC ...
2,739,820 UART:
2,739,963 UART: [state] CFI Enabled
2,750,691 UART: [fht] FMC Alias Private Key: 7
2,869,817 UART: [art] Extend RT PCRs Done
2,870,245 UART: [art] Lock RT PCRs Done
2,871,731 UART: [art] Populate DV Done
2,879,934 UART: [fht] FMC Alias Private Key: 7
2,881,030 UART: [art] Derive CDI
2,881,310 UART: [art] Store in slot 0x4
2,966,931 UART: [art] Derive Key Pair
2,967,291 UART: [art] Store priv key in slot 0x5
2,980,691 UART: [art] Derive Key Pair - Done
2,995,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,290 UART: [art] PUB.X = CF7FBD3294580CCC7F8BDB4E97F32C37D4A02EDA616182FA1BEB8BD71929BA4507FD0CC3A7ED1BB0609D1C7A98AEB750
3,019,077 UART: [art] PUB.Y = B6666AFF86B341C3E03ACB90DCEA25D3CDD51B234E88871C934DEEB09B2D82A767AED6B7D9B7001490701CE00B8C874C
3,026,018 UART: [art] SIG.R = 9EC873A36B863AE80AD2230326C481A37D0ABC2E5F4A56C48E041BE81460880C06AABAB557D7FC0D7F9EA89FB42BA2F0
3,032,783 UART: [art] SIG.S = E46B0F221ED0079980D65312E59DE84A0B9816C5602AE7A7D464BF3B3E11A6381D1168FF8D1E43B01FD25C24D2B5B206
3,056,463 UART: Caliptra RT
3,056,806 UART: [state] CFI Enabled
3,175,848 UART: [rt] RT listening for mailbox commands...
3,176,518 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,910 UART: [rt]cmd =0x44504543, len=40
3,234,348 >>> mbox cmd response data (40 bytes)
3,234,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,530 UART: [rt]cmd =0x44504543, len=96
3,307,288 >>> mbox cmd response data (56 bytes)
3,307,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,337,222 UART: [rt]cmd =0x44504543, len=96
3,380,250 >>> mbox cmd response data (56 bytes)
3,380,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,128 UART: [rt]cmd =0x44504543, len=96
3,453,739 >>> mbox cmd response data (56 bytes)
3,453,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,483,795 UART: [rt]cmd =0x44504543, len=96
3,527,381 >>> mbox cmd response data (56 bytes)
3,527,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,269 UART: [rt]cmd =0x44504543, len=96
3,601,328 >>> mbox cmd response data (56 bytes)
3,601,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,631,406 UART: [rt]cmd =0x44504543, len=96
3,675,718 >>> mbox cmd response data (56 bytes)
3,675,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,705,494 UART: [rt]cmd =0x44504543, len=96
3,750,533 >>> mbox cmd response data (56 bytes)
3,750,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,513 UART: [rt]cmd =0x44504543, len=96
3,825,307 >>> mbox cmd response data (56 bytes)
3,825,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,855,087 UART: [rt]cmd =0x44504543, len=96
3,901,058 >>> mbox cmd response data (56 bytes)
3,901,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,931,178 UART: [rt]cmd =0x44504543, len=96
3,976,194 >>> mbox cmd response data (56 bytes)
3,976,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,256 UART: [rt]cmd =0x44504543, len=96
4,051,981 >>> mbox cmd response data (56 bytes)
4,051,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,081,839 UART: [rt]cmd =0x44504543, len=96
4,127,909 >>> mbox cmd response data (56 bytes)
4,127,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,158,003 UART: [rt]cmd =0x44504543, len=96
4,204,418 >>> mbox cmd response data (56 bytes)
4,204,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,234,178 UART: [rt]cmd =0x44504543, len=96
4,280,536 >>> mbox cmd response data (56 bytes)
4,280,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,392 UART: [rt]cmd =0x44504543, len=96
4,317,751 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [kat] SHA2-256
893,484 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,609 UART: [kat] ++
897,761 UART: [kat] sha1
901,983 UART: [kat] SHA2-256
903,923 UART: [kat] SHA2-384
906,642 UART: [kat] SHA2-512-ACC
908,543 UART: [kat] ECC-384
918,346 UART: [kat] HMAC-384Kdf
923,008 UART: [kat] LMS
1,171,336 UART: [kat] --
1,172,005 UART: [cold-reset] ++
1,172,533 UART: [fht] FHT @ 0x50003400
1,175,138 UART: [idev] ++
1,175,306 UART: [idev] CDI.KEYID = 6
1,175,666 UART: [idev] SUBJECT.KEYID = 7
1,176,090 UART: [idev] UDS.KEYID = 0
1,176,435 ready_for_fw is high
1,176,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,274 UART: [idev] Erasing UDS.KEYID = 0
1,200,989 UART: [idev] Sha1 KeyId Algorithm
1,209,379 UART: [idev] --
1,210,435 UART: [ldev] ++
1,210,603 UART: [ldev] CDI.KEYID = 6
1,210,966 UART: [ldev] SUBJECT.KEYID = 5
1,211,392 UART: [ldev] AUTHORITY.KEYID = 7
1,211,855 UART: [ldev] FE.KEYID = 1
1,216,921 UART: [ldev] Erasing FE.KEYID = 1
1,243,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,887 UART: [ldev] --
1,282,278 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x46574c44
1,283,578 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,846 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,016 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,337 >>> mbox cmd response: success
2,827,481 UART: [afmc] ++
2,827,649 UART: [afmc] CDI.KEYID = 6
2,828,011 UART: [afmc] SUBJECT.KEYID = 7
2,828,436 UART: [afmc] AUTHORITY.KEYID = 5
2,863,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,672 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,381 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,264 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,965 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,723 UART: [afmc] --
2,906,805 UART: [cold-reset] --
2,907,487 UART: [state] Locking Datavault
2,908,332 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,936 UART: [state] Locking ICCM
2,909,460 UART: [exit] Launching FMC @ 0x40000130
2,914,790 UART:
2,914,806 UART: Running Caliptra FMC ...
2,915,214 UART:
2,915,268 UART: [state] CFI Enabled
2,925,478 UART: [fht] FMC Alias Private Key: 7
3,044,908 UART: [art] Extend RT PCRs Done
3,045,336 UART: [art] Lock RT PCRs Done
3,046,790 UART: [art] Populate DV Done
3,055,125 UART: [fht] FMC Alias Private Key: 7
3,056,159 UART: [art] Derive CDI
3,056,439 UART: [art] Store in slot 0x4
3,142,520 UART: [art] Derive Key Pair
3,142,880 UART: [art] Store priv key in slot 0x5
3,156,114 UART: [art] Derive Key Pair - Done
3,170,759 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,277 UART: [art] PUB.X = 5D3A819249E17DF57274F1178D640AA46DBC50B50C4BDD3CB4C5446E5C9B6D3758356A5714618E8F432A4D761F2F81BE
3,194,045 UART: [art] PUB.Y = A152E562C0C9019FD1E116FD40B2FC4D44364344F6471E55D52E65754981BFF79C65B8E7D74206DD2739AB9567FCE1C1
3,200,991 UART: [art] SIG.R = C1D0A9D0FAECF59D9867A6A175F34E46DAF0A9C70B9DBA5B2FE2C59EF208E91897A684B77B5DAF55CAAF741BA84D20FA
3,207,783 UART: [art] SIG.S = 28BD5C40A4C594CCE04F9A53AF570C75E91989C5D12E4D25F0D544FB10F940AC6DA2E104D17ED34F18335314854C8FD9
3,231,725 UART: Caliptra RT
3,231,976 UART: [state] CFI Enabled
3,352,181 UART: [rt] RT listening for mailbox commands...
3,352,851 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,091 UART: [rt]cmd =0x44504543, len=40
3,410,529 >>> mbox cmd response data (40 bytes)
3,410,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,417 UART: [rt]cmd =0x44504543, len=96
3,482,375 >>> mbox cmd response data (56 bytes)
3,482,376 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,519 UART: [rt]cmd =0x44504543, len=96
3,554,905 >>> mbox cmd response data (56 bytes)
3,554,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,584,805 UART: [rt]cmd =0x44504543, len=96
3,628,608 >>> mbox cmd response data (56 bytes)
3,628,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,658,592 UART: [rt]cmd =0x44504543, len=96
3,702,220 >>> mbox cmd response data (56 bytes)
3,702,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,732,156 UART: [rt]cmd =0x44504543, len=96
3,775,745 >>> mbox cmd response data (56 bytes)
3,775,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,805,745 UART: [rt]cmd =0x44504543, len=96
3,849,523 >>> mbox cmd response data (56 bytes)
3,849,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,879,653 UART: [rt]cmd =0x44504543, len=96
3,924,522 >>> mbox cmd response data (56 bytes)
3,924,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,564 UART: [rt]cmd =0x44504543, len=96
3,998,668 >>> mbox cmd response data (56 bytes)
3,998,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,718 UART: [rt]cmd =0x44504543, len=96
4,072,957 >>> mbox cmd response data (56 bytes)
4,072,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,103,109 UART: [rt]cmd =0x44504543, len=96
4,148,363 >>> mbox cmd response data (56 bytes)
4,148,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,178,305 UART: [rt]cmd =0x44504543, len=96
4,224,110 >>> mbox cmd response data (56 bytes)
4,224,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,254,064 UART: [rt]cmd =0x44504543, len=96
4,299,696 >>> mbox cmd response data (56 bytes)
4,299,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,329,638 UART: [rt]cmd =0x44504543, len=96
4,375,855 >>> mbox cmd response data (56 bytes)
4,375,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,405,559 UART: [rt]cmd =0x44504543, len=96
4,450,875 >>> mbox cmd response data (56 bytes)
4,450,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,480,885 UART: [rt]cmd =0x44504543, len=96
4,488,270 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,879 ready_for_fw is high
1,060,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,882 >>> mbox cmd response: success
2,741,535 UART:
2,741,551 UART: Running Caliptra FMC ...
2,741,959 UART:
2,742,013 UART: [state] CFI Enabled
2,752,667 UART: [fht] FMC Alias Private Key: 7
2,871,073 UART: [art] Extend RT PCRs Done
2,871,501 UART: [art] Lock RT PCRs Done
2,873,079 UART: [art] Populate DV Done
2,881,258 UART: [fht] FMC Alias Private Key: 7
2,882,360 UART: [art] Derive CDI
2,882,640 UART: [art] Store in slot 0x4
2,968,751 UART: [art] Derive Key Pair
2,969,111 UART: [art] Store priv key in slot 0x5
2,982,483 UART: [art] Derive Key Pair - Done
2,997,114 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,696 UART: [art] PUB.X = AA0F2808B50EDBA310C99C37EF64240862B58CA667047ED95A5A46C1E8E5789138DD60C3E576CAB1F2D55178AD3E2DD9
3,020,461 UART: [art] PUB.Y = DB9C1708EFCD32B96A46B3C86AC5FE49A06373DD6189C4565B2C05A34E541C6DFD148F788A51D466A811788DADAAFE4D
3,027,421 UART: [art] SIG.R = 8E31F858579AC6AD647AB284724F289996E7D3AB0BE985319E9CAF03E958A09ED83B6DBE35EABC09289AC17A0B4FA71A
3,034,193 UART: [art] SIG.S = 7FC3D79832B6F6061BE886B52DA2B7145C60C80FA0DE3FF998B0165952F769DB95EBE07949A1FC32148F437BC8EE4C63
3,057,753 UART: Caliptra RT
3,058,004 UART: [state] CFI Enabled
3,178,243 UART: [rt] RT listening for mailbox commands...
3,178,913 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,099 UART: [rt]cmd =0x44504543, len=40
3,236,413 >>> mbox cmd response data (40 bytes)
3,236,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,205 UART: [rt]cmd =0x44504543, len=96
3,308,755 >>> mbox cmd response data (56 bytes)
3,308,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,338,571 UART: [rt]cmd =0x44504543, len=96
3,381,413 >>> mbox cmd response data (56 bytes)
3,381,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,353 UART: [rt]cmd =0x44504543, len=96
3,454,240 >>> mbox cmd response data (56 bytes)
3,454,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,290 UART: [rt]cmd =0x44504543, len=96
3,527,880 >>> mbox cmd response data (56 bytes)
3,527,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,904 UART: [rt]cmd =0x44504543, len=96
3,602,263 >>> mbox cmd response data (56 bytes)
3,602,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,632,313 UART: [rt]cmd =0x44504543, len=96
3,676,631 >>> mbox cmd response data (56 bytes)
3,676,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,706,515 UART: [rt]cmd =0x44504543, len=96
3,751,028 >>> mbox cmd response data (56 bytes)
3,751,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,842 UART: [rt]cmd =0x44504543, len=96
3,824,926 >>> mbox cmd response data (56 bytes)
3,824,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,854,882 UART: [rt]cmd =0x44504543, len=96
3,900,211 >>> mbox cmd response data (56 bytes)
3,900,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,930,113 UART: [rt]cmd =0x44504543, len=96
3,974,729 >>> mbox cmd response data (56 bytes)
3,974,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,004,753 UART: [rt]cmd =0x44504543, len=96
4,050,234 >>> mbox cmd response data (56 bytes)
4,050,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,080,228 UART: [rt]cmd =0x44504543, len=96
4,125,604 >>> mbox cmd response data (56 bytes)
4,125,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,155,660 UART: [rt]cmd =0x44504543, len=96
4,201,433 >>> mbox cmd response data (56 bytes)
4,201,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,231,503 UART: [rt]cmd =0x44504543, len=96
4,277,823 >>> mbox cmd response data (56 bytes)
4,277,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,307,731 UART: [rt]cmd =0x44504543, len=96
4,314,800 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,545 UART: [kat] SHA2-256
893,195 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,320 UART: [kat] ++
897,472 UART: [kat] sha1
901,656 UART: [kat] SHA2-256
903,596 UART: [kat] SHA2-384
906,173 UART: [kat] SHA2-512-ACC
908,074 UART: [kat] ECC-384
918,091 UART: [kat] HMAC-384Kdf
922,581 UART: [kat] LMS
1,170,909 UART: [kat] --
1,171,730 UART: [cold-reset] ++
1,172,198 UART: [fht] FHT @ 0x50003400
1,174,945 UART: [idev] ++
1,175,113 UART: [idev] CDI.KEYID = 6
1,175,473 UART: [idev] SUBJECT.KEYID = 7
1,175,897 UART: [idev] UDS.KEYID = 0
1,176,242 ready_for_fw is high
1,176,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,879 UART: [idev] Erasing UDS.KEYID = 0
1,201,144 UART: [idev] Sha1 KeyId Algorithm
1,209,558 UART: [idev] --
1,210,514 UART: [ldev] ++
1,210,682 UART: [ldev] CDI.KEYID = 6
1,211,045 UART: [ldev] SUBJECT.KEYID = 5
1,211,471 UART: [ldev] AUTHORITY.KEYID = 7
1,211,934 UART: [ldev] FE.KEYID = 1
1,217,138 UART: [ldev] Erasing FE.KEYID = 1
1,243,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,340 UART: [ldev] --
1,282,673 UART: [fwproc] Wait for Commands...
1,283,307 UART: [fwproc] Recv command 0x46574c44
1,284,035 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,235 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,405 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,620 >>> mbox cmd response: success
2,828,870 UART: [afmc] ++
2,829,038 UART: [afmc] CDI.KEYID = 6
2,829,400 UART: [afmc] SUBJECT.KEYID = 7
2,829,825 UART: [afmc] AUTHORITY.KEYID = 5
2,865,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,069 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,778 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,661 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,362 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,268 UART: [afmc] --
2,909,276 UART: [cold-reset] --
2,909,974 UART: [state] Locking Datavault
2,910,979 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,583 UART: [state] Locking ICCM
2,912,155 UART: [exit] Launching FMC @ 0x40000130
2,917,485 UART:
2,917,501 UART: Running Caliptra FMC ...
2,917,909 UART:
2,918,052 UART: [state] CFI Enabled
2,928,750 UART: [fht] FMC Alias Private Key: 7
3,048,010 UART: [art] Extend RT PCRs Done
3,048,438 UART: [art] Lock RT PCRs Done
3,049,840 UART: [art] Populate DV Done
3,057,885 UART: [fht] FMC Alias Private Key: 7
3,058,941 UART: [art] Derive CDI
3,059,221 UART: [art] Store in slot 0x4
3,145,436 UART: [art] Derive Key Pair
3,145,796 UART: [art] Store priv key in slot 0x5
3,158,844 UART: [art] Derive Key Pair - Done
3,173,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,017 UART: [art] PUB.X = 868E9346F93774C2FC6D982DCE0D55441382B0B53C37D2E06BBE0E4E7BDF270CF5C13E373AE82199176414B9F3B4BCE8
3,196,786 UART: [art] PUB.Y = 20D969E3847536CA749A0E72D7F339246FC39947CBA46C8D9A000716188F76D837035EC97A0F1C8441748D1E65B5E6EE
3,203,698 UART: [art] SIG.R = 45BA2C91936999F46BAC61FF3EB7216C7DCEDF989C2866F1F97B6EF158E1BB79ECD01EF64AB02CBEB7EF575203DA9C6E
3,210,489 UART: [art] SIG.S = 4764559009303CC5E604DC1972CF78B2A61D57EE3EC8F31BE93CF159A093F1165AB1B8658FF5D0FD9E7B972570837F52
3,234,373 UART: Caliptra RT
3,234,716 UART: [state] CFI Enabled
3,353,728 UART: [rt] RT listening for mailbox commands...
3,354,398 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,572 UART: [rt]cmd =0x44504543, len=40
3,411,842 >>> mbox cmd response data (40 bytes)
3,411,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,938 UART: [rt]cmd =0x44504543, len=96
3,484,488 >>> mbox cmd response data (56 bytes)
3,484,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,652 UART: [rt]cmd =0x44504543, len=96
3,557,820 >>> mbox cmd response data (56 bytes)
3,557,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,587,556 UART: [rt]cmd =0x44504543, len=96
3,630,817 >>> mbox cmd response data (56 bytes)
3,630,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,660,863 UART: [rt]cmd =0x44504543, len=96
3,704,941 >>> mbox cmd response data (56 bytes)
3,704,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,734,825 UART: [rt]cmd =0x44504543, len=96
3,778,780 >>> mbox cmd response data (56 bytes)
3,778,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,808,956 UART: [rt]cmd =0x44504543, len=96
3,852,652 >>> mbox cmd response data (56 bytes)
3,852,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,882,654 UART: [rt]cmd =0x44504543, len=96
3,927,823 >>> mbox cmd response data (56 bytes)
3,927,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,957,789 UART: [rt]cmd =0x44504543, len=96
4,002,785 >>> mbox cmd response data (56 bytes)
4,002,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,032,827 UART: [rt]cmd =0x44504543, len=96
4,078,050 >>> mbox cmd response data (56 bytes)
4,078,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,107,902 UART: [rt]cmd =0x44504543, len=96
4,153,110 >>> mbox cmd response data (56 bytes)
4,153,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,183,202 UART: [rt]cmd =0x44504543, len=96
4,228,883 >>> mbox cmd response data (56 bytes)
4,228,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,258,761 UART: [rt]cmd =0x44504543, len=96
4,304,743 >>> mbox cmd response data (56 bytes)
4,304,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,334,453 UART: [rt]cmd =0x44504543, len=96
4,381,454 >>> mbox cmd response data (56 bytes)
4,381,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,411,480 UART: [rt]cmd =0x44504543, len=96
4,458,080 >>> mbox cmd response data (56 bytes)
4,458,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,487,954 UART: [rt]cmd =0x44504543, len=96
4,495,109 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,956 ready_for_fw is high
1,060,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,641 >>> mbox cmd response: success
2,743,522 UART:
2,743,538 UART: Running Caliptra FMC ...
2,743,946 UART:
2,744,089 UART: [state] CFI Enabled
2,754,653 UART: [fht] FMC Alias Private Key: 7
2,873,695 UART: [art] Extend RT PCRs Done
2,874,123 UART: [art] Lock RT PCRs Done
2,875,559 UART: [art] Populate DV Done
2,883,574 UART: [fht] FMC Alias Private Key: 7
2,884,660 UART: [art] Derive CDI
2,884,940 UART: [art] Store in slot 0x4
2,970,731 UART: [art] Derive Key Pair
2,971,091 UART: [art] Store priv key in slot 0x5
2,984,087 UART: [art] Derive Key Pair - Done
2,998,646 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,014 UART: [art] PUB.X = 47624F2574C7020674A3C208603A059556219F1FD31F6ECA0E641B03F158025A2A566ED568AA9ED7FCC65296D602A927
3,021,754 UART: [art] PUB.Y = B98B05D4D6FDEC8E0C54D6F2B11482FCB619DE36E3561C5A605A53EB7D2211D56815B8F8CE691F04DFD5498F4DBDBE72
3,028,713 UART: [art] SIG.R = 27DD5A6E2062C634640CF79D8028FAB9BBFFC82A443978671B3CB7D24B4AAC7B6252D267F58052ADDCFB5C6480F39454
3,035,490 UART: [art] SIG.S = 66DEA5F5CA0C9ABEEEC03858D7245733C1B8E6740E7FDA33E11E2A165D54B844479AC378A103D892185ADCD33719ACE5
3,059,231 UART: Caliptra RT
3,059,574 UART: [state] CFI Enabled
3,179,748 UART: [rt] RT listening for mailbox commands...
3,180,418 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,322 UART: [rt]cmd =0x44504543, len=40
3,238,290 >>> mbox cmd response data (40 bytes)
3,238,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,118 UART: [rt]cmd =0x44504543, len=96
3,310,748 >>> mbox cmd response data (56 bytes)
3,310,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,340,850 UART: [rt]cmd =0x44504543, len=96
3,384,506 >>> mbox cmd response data (56 bytes)
3,384,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,384 UART: [rt]cmd =0x44504543, len=96
3,457,933 >>> mbox cmd response data (56 bytes)
3,457,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,487,939 UART: [rt]cmd =0x44504543, len=96
3,530,957 >>> mbox cmd response data (56 bytes)
3,530,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,560,673 UART: [rt]cmd =0x44504543, len=96
3,605,164 >>> mbox cmd response data (56 bytes)
3,605,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,326 UART: [rt]cmd =0x44504543, len=96
3,679,802 >>> mbox cmd response data (56 bytes)
3,679,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,709,988 UART: [rt]cmd =0x44504543, len=96
3,755,339 >>> mbox cmd response data (56 bytes)
3,755,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,785,203 UART: [rt]cmd =0x44504543, len=96
3,830,011 >>> mbox cmd response data (56 bytes)
3,830,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,860,047 UART: [rt]cmd =0x44504543, len=96
3,905,218 >>> mbox cmd response data (56 bytes)
3,905,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,935,164 UART: [rt]cmd =0x44504543, len=96
3,980,636 >>> mbox cmd response data (56 bytes)
3,980,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,630 UART: [rt]cmd =0x44504543, len=96
4,056,225 >>> mbox cmd response data (56 bytes)
4,056,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,086,107 UART: [rt]cmd =0x44504543, len=96
4,132,047 >>> mbox cmd response data (56 bytes)
4,132,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,162,107 UART: [rt]cmd =0x44504543, len=96
4,207,648 >>> mbox cmd response data (56 bytes)
4,207,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,237,482 UART: [rt]cmd =0x44504543, len=96
4,284,140 >>> mbox cmd response data (56 bytes)
4,284,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,314,376 UART: [rt]cmd =0x44504543, len=96
4,321,931 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,098 UART:
192,462 UART: Running Caliptra ROM ...
193,589 UART:
193,735 UART: [state] CFI Enabled
262,319 UART: [state] LifecycleState = Unprovisioned
264,255 UART: [state] DebugLocked = No
267,049 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,712 UART: [kat] SHA2-256
442,429 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,959 UART: [kat] ++
453,437 UART: [kat] sha1
465,169 UART: [kat] SHA2-256
467,824 UART: [kat] SHA2-384
473,602 UART: [kat] SHA2-512-ACC
475,901 UART: [kat] ECC-384
2,768,388 UART: [kat] HMAC-384Kdf
2,799,776 UART: [kat] LMS
3,990,106 UART: [kat] --
3,996,309 UART: [cold-reset] ++
3,998,447 UART: [fht] Storing FHT @ 0x50003400
4,008,787 UART: [idev] ++
4,009,435 UART: [idev] CDI.KEYID = 6
4,010,356 UART: [idev] SUBJECT.KEYID = 7
4,011,624 UART: [idev] UDS.KEYID = 0
4,012,718 ready_for_fw is high
4,012,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,478 UART: [idev] Erasing UDS.KEYID = 0
7,346,775 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,026 UART: [idev] --
7,373,301 UART: [ldev] ++
7,373,874 UART: [ldev] CDI.KEYID = 6
7,374,999 UART: [ldev] SUBJECT.KEYID = 5
7,376,109 UART: [ldev] AUTHORITY.KEYID = 7
7,377,288 UART: [ldev] FE.KEYID = 1
7,422,449 UART: [ldev] Erasing FE.KEYID = 1
10,756,925 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,402 UART: [ldev] --
13,136,178 UART: [fwproc] Waiting for Commands...
13,138,216 UART: [fwproc] Received command 0x46574c44
13,140,452 UART: [fwproc] Received Image of size 118548 bytes
17,243,386 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,818 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,391,997 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,721,379 >>> mbox cmd response: success
17,725,419 UART: [afmc] ++
17,726,040 UART: [afmc] CDI.KEYID = 6
17,726,961 UART: [afmc] SUBJECT.KEYID = 7
17,728,185 UART: [afmc] AUTHORITY.KEYID = 5
21,089,482 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,391,481 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,742 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,408,214 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,917 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,437,289 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,547 UART: [afmc] --
23,463,111 UART: [cold-reset] --
23,467,262 UART: [state] Locking Datavault
23,472,073 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,785 UART: [state] Locking ICCM
23,476,530 UART: [exit] Launching FMC @ 0x40000130
23,484,938 UART:
23,485,183 UART: Running Caliptra FMC ...
23,486,285 UART:
23,486,442 UART: [state] CFI Enabled
23,547,648 UART: [fht] FMC Alias Private Key: 7
25,887,799 UART: [art] Extend RT PCRs Done
25,889,019 UART: [art] Lock RT PCRs Done
25,890,231 UART: [art] Populate DV Done
25,895,759 UART: [fht] FMC Alias Private Key: 7
25,897,360 UART: [art] Derive CDI
25,898,175 UART: [art] Store in slot 0x4
25,955,768 UART: [art] Derive Key Pair
25,956,804 UART: [art] Store priv key in slot 0x5
29,249,423 UART: [art] Derive Key Pair - Done
29,262,210 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,456 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,963 UART: [art] PUB.X = 5526BD99249436D12FAF0D4E2C7F35C4C4651168DF629846BD95B88D7D6E215CD24012BFA20797DC6CC5821BAFDBDC15
31,559,235 UART: [art] PUB.Y = 2B5E66F904D040B31BDB0E6FC35A35EA90E658C5A8A4F77AB09B2E5B8BDC293822EBC20C473A8194A86CB9C9261CEAE1
31,566,484 UART: [art] SIG.R = 03919CC5618D6EC016AA944821B1A9A404D8203862BD3680793ABEF2D48B3DE58EC4193B6C2D02DEFCA35B2D2948B758
31,573,898 UART: [art] SIG.S = CEF7B49B594FEE336E36245126F7283C5622B566DEFE99F90FDCE368F6F290E43358D88B5A7A41852A1AD92F5E234066
32,878,912 UART: Caliptra RT
32,879,621 UART: [state] CFI Enabled
33,076,490 UART: [rt] RT listening for mailbox commands...
33,078,430 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,108,172 UART: [rt]cmd =0x44504543, len=24
33,157,189 >>> mbox cmd response data (40 bytes)
33,158,063 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,188,082 UART: [rt]cmd =0x44504543, len=24
33,221,034 >>> mbox cmd response data (40 bytes)
33,221,652 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,251,428 UART: [rt]cmd =0x44504543, len=24
33,284,801 >>> mbox cmd response data (40 bytes)
33,285,435 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,315,462 UART: [rt]cmd =0x44504543, len=24
33,349,092 >>> mbox cmd response data (40 bytes)
33,349,726 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,379,509 UART: [rt]cmd =0x44504543, len=24
33,413,153 >>> mbox cmd response data (40 bytes)
33,413,806 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,443,777 UART: [rt]cmd =0x44504543, len=24
33,477,376 >>> mbox cmd response data (40 bytes)
33,478,025 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,507,968 UART: [rt]cmd =0x44504543, len=24
33,541,336 >>> mbox cmd response data (40 bytes)
33,541,938 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,571,835 UART: [rt]cmd =0x44504543, len=24
33,605,264 >>> mbox cmd response data (40 bytes)
33,605,889 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,635,927 UART: [rt]cmd =0x44504543, len=24
33,669,332 >>> mbox cmd response data (40 bytes)
33,669,956 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,699,695 UART: [rt]cmd =0x44504543, len=24
33,733,566 >>> mbox cmd response data (40 bytes)
33,734,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,763,901 UART: [rt]cmd =0x44504543, len=24
33,797,680 >>> mbox cmd response data (40 bytes)
33,798,327 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,828,384 UART: [rt]cmd =0x44504543, len=24
33,861,911 >>> mbox cmd response data (40 bytes)
33,862,510 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,892,365 UART: [rt]cmd =0x44504543, len=24
33,925,769 >>> mbox cmd response data (40 bytes)
33,926,382 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,956,395 UART: [rt]cmd =0x44504543, len=24
33,989,693 >>> mbox cmd response data (40 bytes)
33,990,305 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,020,195 UART: [rt]cmd =0x44504543, len=24
34,027,197 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,779,304 ready_for_fw is high
3,779,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,959,894 >>> mbox cmd response: success
23,645,349 UART:
23,645,839 UART: Running Caliptra FMC ...
23,647,131 UART:
23,647,308 UART: [state] CFI Enabled
23,716,730 UART: [fht] FMC Alias Private Key: 7
26,057,397 UART: [art] Extend RT PCRs Done
26,058,629 UART: [art] Lock RT PCRs Done
26,060,013 UART: [art] Populate DV Done
26,065,443 UART: [fht] FMC Alias Private Key: 7
26,067,210 UART: [art] Derive CDI
26,068,028 UART: [art] Store in slot 0x4
26,124,529 UART: [art] Derive Key Pair
26,125,528 UART: [art] Store priv key in slot 0x5
29,418,158 UART: [art] Derive Key Pair - Done
29,431,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,718,998 UART: [art] Erasing AUTHORITY.KEYID = 7
31,720,517 UART: [art] PUB.X = 5A8BF0869F94F658EA46E832C3079EF6531B923BBB67E6379137B4CEC58FDA5D0A4E517145B07263C6DB9A61C1CD6892
31,727,774 UART: [art] PUB.Y = D579C4B18039FCA49C101BFC4CD4B0D0F12220067E33434A44ED3519D21EF4495D5F78EF63EF590EF109A0B3630C8180
31,735,046 UART: [art] SIG.R = 9F8CBBDDFED91270A5535A743FDB0F3B4675C7AE03586C1AB83DEE3970F1458F054758AFD3C571375BE053BC6DF31B90
31,742,451 UART: [art] SIG.S = CBC3604BFB45EDDAEDEF283D2243E6E927942B44EF05895E5D6822384AECAB284E355F506A993F68F83D183AD6CE1BC0
33,047,640 UART: Caliptra RT
33,048,380 UART: [state] CFI Enabled
33,244,960 UART: [rt] RT listening for mailbox commands...
33,247,001 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,277,014 UART: [rt]cmd =0x44504543, len=24
33,325,834 >>> mbox cmd response data (40 bytes)
33,326,771 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,356,639 UART: [rt]cmd =0x44504543, len=24
33,389,637 >>> mbox cmd response data (40 bytes)
33,390,271 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,420,287 UART: [rt]cmd =0x44504543, len=24
33,453,858 >>> mbox cmd response data (40 bytes)
33,454,487 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,484,331 UART: [rt]cmd =0x44504543, len=24
33,517,497 >>> mbox cmd response data (40 bytes)
33,518,151 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,548,213 UART: [rt]cmd =0x44504543, len=24
33,581,747 >>> mbox cmd response data (40 bytes)
33,582,406 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,612,306 UART: [rt]cmd =0x44504543, len=24
33,645,944 >>> mbox cmd response data (40 bytes)
33,646,731 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,676,751 UART: [rt]cmd =0x44504543, len=24
33,710,068 >>> mbox cmd response data (40 bytes)
33,710,682 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,740,649 UART: [rt]cmd =0x44504543, len=24
33,773,996 >>> mbox cmd response data (40 bytes)
33,774,614 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,804,237 UART: [rt]cmd =0x44504543, len=24
33,838,173 >>> mbox cmd response data (40 bytes)
33,838,836 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,868,788 UART: [rt]cmd =0x44504543, len=24
33,902,176 >>> mbox cmd response data (40 bytes)
33,902,848 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,932,962 UART: [rt]cmd =0x44504543, len=24
33,966,221 >>> mbox cmd response data (40 bytes)
33,967,015 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,996,940 UART: [rt]cmd =0x44504543, len=24
34,030,377 >>> mbox cmd response data (40 bytes)
34,030,998 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,060,965 UART: [rt]cmd =0x44504543, len=24
34,094,094 >>> mbox cmd response data (40 bytes)
34,094,719 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,124,559 UART: [rt]cmd =0x44504543, len=24
34,158,733 >>> mbox cmd response data (40 bytes)
34,159,418 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,189,433 UART: [rt]cmd =0x44504543, len=24
34,195,832 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,481 UART:
192,850 UART: Running Caliptra ROM ...
193,950 UART:
603,735 UART: [state] CFI Enabled
613,855 UART: [state] LifecycleState = Unprovisioned
615,730 UART: [state] DebugLocked = No
618,666 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,865 UART: [kat] SHA2-256
793,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,121 UART: [kat] ++
804,640 UART: [kat] sha1
815,153 UART: [kat] SHA2-256
817,865 UART: [kat] SHA2-384
823,169 UART: [kat] SHA2-512-ACC
825,573 UART: [kat] ECC-384
3,110,012 UART: [kat] HMAC-384Kdf
3,122,036 UART: [kat] LMS
4,312,154 UART: [kat] --
4,315,327 UART: [cold-reset] ++
4,317,605 UART: [fht] Storing FHT @ 0x50003400
4,327,799 UART: [idev] ++
4,328,356 UART: [idev] CDI.KEYID = 6
4,329,341 UART: [idev] SUBJECT.KEYID = 7
4,330,578 UART: [idev] UDS.KEYID = 0
4,331,549 ready_for_fw is high
4,331,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,703 UART: [idev] Erasing UDS.KEYID = 0
7,618,914 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,443 UART: [idev] --
7,643,259 UART: [ldev] ++
7,643,828 UART: [ldev] CDI.KEYID = 6
7,644,808 UART: [ldev] SUBJECT.KEYID = 5
7,645,965 UART: [ldev] AUTHORITY.KEYID = 7
7,647,246 UART: [ldev] FE.KEYID = 1
7,658,586 UART: [ldev] Erasing FE.KEYID = 1
10,948,223 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,167 UART: [ldev] --
13,305,147 UART: [fwproc] Waiting for Commands...
13,307,919 UART: [fwproc] Received command 0x46574c44
13,310,102 UART: [fwproc] Received Image of size 118548 bytes
17,419,334 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,652 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,842 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,896,780 >>> mbox cmd response: success
17,901,793 UART: [afmc] ++
17,902,410 UART: [afmc] CDI.KEYID = 6
17,903,292 UART: [afmc] SUBJECT.KEYID = 7
17,904,555 UART: [afmc] AUTHORITY.KEYID = 5
21,224,502 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,634 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,937 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,367 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,086 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,458 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,561 UART: [afmc] --
23,589,470 UART: [cold-reset] --
23,592,566 UART: [state] Locking Datavault
23,596,465 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,215 UART: [state] Locking ICCM
23,599,460 UART: [exit] Launching FMC @ 0x40000130
23,607,850 UART:
23,608,081 UART: Running Caliptra FMC ...
23,609,178 UART:
23,609,333 UART: [state] CFI Enabled
23,617,805 UART: [fht] FMC Alias Private Key: 7
25,958,148 UART: [art] Extend RT PCRs Done
25,959,363 UART: [art] Lock RT PCRs Done
25,960,929 UART: [art] Populate DV Done
25,966,283 UART: [fht] FMC Alias Private Key: 7
25,967,983 UART: [art] Derive CDI
25,968,797 UART: [art] Store in slot 0x4
26,011,286 UART: [art] Derive Key Pair
26,012,287 UART: [art] Store priv key in slot 0x5
29,255,023 UART: [art] Derive Key Pair - Done
29,268,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,793 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,344 UART: [art] PUB.X = D3A02061C6C6E4659C898F074B6F4884C819055B1329284DFBD3D041D24E163AE7E0EEE833771873FBF646751CE28F52
31,557,558 UART: [art] PUB.Y = 972D290C7188E7F550337DF682C0937DA334936F36A53CBAD664D439639BF91B04159A947047689CA19CD82997C7025C
31,564,798 UART: [art] SIG.R = 56165F2CB151D205AE3324E78E5CB51D1984179956D9EB10577D3FF34DC50BB731F4CFD3346EE19132FF8002EC6674C2
31,572,141 UART: [art] SIG.S = DE0B5D70BEAF9E3B7DB120861E41175C7B771D1D361163C70B8BD7651173F7EBC635554E45BC555D1E16C2D2EF5CE118
32,877,736 UART: Caliptra RT
32,878,452 UART: [state] CFI Enabled
33,012,382 UART: [rt] RT listening for mailbox commands...
33,014,312 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,044,447 UART: [rt]cmd =0x44504543, len=24
33,071,780 >>> mbox cmd response data (40 bytes)
33,072,692 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,102,707 UART: [rt]cmd =0x44504543, len=24
33,130,418 >>> mbox cmd response data (40 bytes)
33,131,047 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,160,969 UART: [rt]cmd =0x44504543, len=24
33,188,185 >>> mbox cmd response data (40 bytes)
33,188,821 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,218,604 UART: [rt]cmd =0x44504543, len=24
33,245,874 >>> mbox cmd response data (40 bytes)
33,246,522 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,276,581 UART: [rt]cmd =0x44504543, len=24
33,304,181 >>> mbox cmd response data (40 bytes)
33,304,831 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,334,670 UART: [rt]cmd =0x44504543, len=24
33,362,255 >>> mbox cmd response data (40 bytes)
33,362,859 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,392,872 UART: [rt]cmd =0x44504543, len=24
33,420,602 >>> mbox cmd response data (40 bytes)
33,421,219 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,450,895 UART: [rt]cmd =0x44504543, len=24
33,478,643 >>> mbox cmd response data (40 bytes)
33,479,310 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,509,096 UART: [rt]cmd =0x44504543, len=24
33,536,525 >>> mbox cmd response data (40 bytes)
33,537,135 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,567,202 UART: [rt]cmd =0x44504543, len=24
33,594,932 >>> mbox cmd response data (40 bytes)
33,595,547 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,625,616 UART: [rt]cmd =0x44504543, len=24
33,653,182 >>> mbox cmd response data (40 bytes)
33,653,807 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,683,534 UART: [rt]cmd =0x44504543, len=24
33,711,352 >>> mbox cmd response data (40 bytes)
33,711,988 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,741,776 UART: [rt]cmd =0x44504543, len=24
33,769,357 >>> mbox cmd response data (40 bytes)
33,769,952 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,799,606 UART: [rt]cmd =0x44504543, len=24
33,827,551 >>> mbox cmd response data (40 bytes)
33,828,157 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,857,885 UART: [rt]cmd =0x44504543, len=24
33,864,505 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,919 writing to cptra_bootfsm_go
4,136,962 ready_for_fw is high
4,137,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,350 >>> mbox cmd response: success
23,798,709 UART:
23,799,104 UART: Running Caliptra FMC ...
23,800,248 UART:
23,800,404 UART: [state] CFI Enabled
23,808,025 UART: [fht] FMC Alias Private Key: 7
26,148,203 UART: [art] Extend RT PCRs Done
26,149,423 UART: [art] Lock RT PCRs Done
26,151,372 UART: [art] Populate DV Done
26,156,904 UART: [fht] FMC Alias Private Key: 7
26,158,402 UART: [art] Derive CDI
26,159,160 UART: [art] Store in slot 0x4
26,201,497 UART: [art] Derive Key Pair
26,202,536 UART: [art] Store priv key in slot 0x5
29,444,396 UART: [art] Derive Key Pair - Done
29,457,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,970 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,472 UART: [art] PUB.X = E03ED60D4BC97A89E1C94E33D5BF33DF8250BEFBA07D275FA56F3D00C1592B398EECCB60002BD039D78B61F31B497D56
31,746,810 UART: [art] PUB.Y = B5B3620FDE29B114725CDBB754196C24A400D34A99B1A13DED02996F655412053C0F46D0108F54D12FBD2D017584AB0C
31,753,945 UART: [art] SIG.R = 9C29BF984E8BA81B3DC377337569F99D6CD0F448ABC6D408D94193869D7B7395AF19D4F41E7C22C2FE3D330704210160
31,761,330 UART: [art] SIG.S = AFA405E8F4B8954E07F24BCC1DCCE8AA7B2A069D9C18C2F4A7023A52B627980D03A42F510BA383DF7DE7F83666B3CD9A
33,066,945 UART: Caliptra RT
33,067,650 UART: [state] CFI Enabled
33,200,806 UART: [rt] RT listening for mailbox commands...
33,202,875 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,233,236 UART: [rt]cmd =0x44504543, len=24
33,260,578 >>> mbox cmd response data (40 bytes)
33,261,330 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,291,030 UART: [rt]cmd =0x44504543, len=24
33,318,281 >>> mbox cmd response data (40 bytes)
33,318,920 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,349,037 UART: [rt]cmd =0x44504543, len=24
33,376,855 >>> mbox cmd response data (40 bytes)
33,377,518 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,407,359 UART: [rt]cmd =0x44504543, len=24
33,435,381 >>> mbox cmd response data (40 bytes)
33,435,983 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,465,710 UART: [rt]cmd =0x44504543, len=24
33,493,063 >>> mbox cmd response data (40 bytes)
33,493,711 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,523,672 UART: [rt]cmd =0x44504543, len=24
33,551,293 >>> mbox cmd response data (40 bytes)
33,551,926 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,581,876 UART: [rt]cmd =0x44504543, len=24
33,609,103 >>> mbox cmd response data (40 bytes)
33,609,760 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,639,545 UART: [rt]cmd =0x44504543, len=24
33,667,402 >>> mbox cmd response data (40 bytes)
33,668,005 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,697,861 UART: [rt]cmd =0x44504543, len=24
33,725,372 >>> mbox cmd response data (40 bytes)
33,725,980 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,756,137 UART: [rt]cmd =0x44504543, len=24
33,783,953 >>> mbox cmd response data (40 bytes)
33,784,602 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,814,276 UART: [rt]cmd =0x44504543, len=24
33,841,860 >>> mbox cmd response data (40 bytes)
33,842,465 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,872,369 UART: [rt]cmd =0x44504543, len=24
33,900,181 >>> mbox cmd response data (40 bytes)
33,900,797 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,930,668 UART: [rt]cmd =0x44504543, len=24
33,958,719 >>> mbox cmd response data (40 bytes)
33,959,338 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,989,173 UART: [rt]cmd =0x44504543, len=24
34,017,113 >>> mbox cmd response data (40 bytes)
34,017,774 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,047,722 UART: [rt]cmd =0x44504543, len=24
34,054,181 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,031 UART:
192,397 UART: Running Caliptra ROM ...
193,522 UART:
193,687 UART: [state] CFI Enabled
267,169 UART: [state] LifecycleState = Unprovisioned
269,095 UART: [state] DebugLocked = No
271,733 UART: [state] WD Timer not started. Device not locked for debugging
276,143 UART: [kat] SHA2-256
455,805 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,549 UART: [kat] ++
466,994 UART: [kat] sha1
476,870 UART: [kat] SHA2-256
479,586 UART: [kat] SHA2-384
486,214 UART: [kat] SHA2-512-ACC
488,575 UART: [kat] ECC-384
2,950,715 UART: [kat] HMAC-384Kdf
2,973,322 UART: [kat] LMS
3,449,789 UART: [kat] --
3,455,128 UART: [cold-reset] ++
3,457,502 UART: [fht] FHT @ 0x50003400
3,468,616 UART: [idev] ++
3,469,315 UART: [idev] CDI.KEYID = 6
3,470,312 UART: [idev] SUBJECT.KEYID = 7
3,471,416 UART: [idev] UDS.KEYID = 0
3,472,335 ready_for_fw is high
3,472,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,434 UART: [idev] Erasing UDS.KEYID = 0
5,990,421 UART: [idev] Sha1 KeyId Algorithm
6,015,235 UART: [idev] --
6,021,229 UART: [ldev] ++
6,021,794 UART: [ldev] CDI.KEYID = 6
6,022,730 UART: [ldev] SUBJECT.KEYID = 5
6,023,938 UART: [ldev] AUTHORITY.KEYID = 7
6,025,115 UART: [ldev] FE.KEYID = 1
6,060,986 UART: [ldev] Erasing FE.KEYID = 1
8,571,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,306,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,322,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,338,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,353,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,375,465 UART: [ldev] --
10,380,561 UART: [fwproc] Wait for Commands...
10,383,676 UART: [fwproc] Recv command 0x46574c44
10,385,709 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,494 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,507 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,353,094 >>> mbox cmd response: success
14,357,081 UART: [afmc] ++
14,357,695 UART: [afmc] CDI.KEYID = 6
14,358,610 UART: [afmc] SUBJECT.KEYID = 7
14,359,841 UART: [afmc] AUTHORITY.KEYID = 5
16,896,937 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,621,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,624,091 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,639,895 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,655,941 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,671,526 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,696,199 UART: [afmc] --
18,700,232 UART: [cold-reset] --
18,705,274 UART: [state] Locking Datavault
18,711,433 UART: [state] Locking PCR0, PCR1 and PCR31
18,713,123 UART: [state] Locking ICCM
18,715,700 UART: [exit] Launching FMC @ 0x40000130
18,724,152 UART:
18,724,383 UART: Running Caliptra FMC ...
18,725,481 UART:
18,725,655 UART: [state] CFI Enabled
18,779,638 UART: [fht] FMC Alias Private Key: 7
20,546,080 UART: [art] Extend RT PCRs Done
20,547,301 UART: [art] Lock RT PCRs Done
20,548,989 UART: [art] Populate DV Done
20,554,242 UART: [fht] FMC Alias Private Key: 7
20,555,937 UART: [art] Derive CDI
20,556,749 UART: [art] Store in slot 0x4
20,612,092 UART: [art] Derive Key Pair
20,613,128 UART: [art] Store priv key in slot 0x5
23,075,422 UART: [art] Derive Key Pair - Done
23,088,259 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,801,537 UART: [art] Erasing AUTHORITY.KEYID = 7
24,803,039 UART: [art] PUB.X = BEAB7CC09AA7A96FA7BC6BE7793A2460F1574110F42B80DC6EA6E119B1D87D34C2315A0F6F49C17DDB530DDD4512B889
24,810,349 UART: [art] PUB.Y = 85222BE6CE45C206B3CCDDAB37FC5B738544E3C3E69CF038CB498B5299F772536D6362F814ADF8118FE43A98DED5E471
24,817,578 UART: [art] SIG.R = 01A6C54A98AF65DE685D66F7B1ADBA8EE64A844EBBA3CEF9596E827978BE5DB479B99398BA6F1BAAC2CA3AAB984E6373
24,825,048 UART: [art] SIG.S = E19D8D76CC8F3925A43C2122E017049FE725E70D4D94195B4B6CD67D249E1B711662A20C9A6204E0376F677A634B3C61
25,804,229 UART: Caliptra RT
25,804,937 UART: [state] CFI Enabled
25,986,694 UART: [rt] RT listening for mailbox commands...
25,988,612 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,018,467 UART: [rt]cmd =0x44504543, len=24
26,067,030 >>> mbox cmd response data (40 bytes)
26,067,864 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,097,831 UART: [rt]cmd =0x44504543, len=24
26,131,010 >>> mbox cmd response data (40 bytes)
26,131,669 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,161,735 UART: [rt]cmd =0x44504543, len=24
26,195,924 >>> mbox cmd response data (40 bytes)
26,196,578 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,226,320 UART: [rt]cmd =0x44504543, len=24
26,260,332 >>> mbox cmd response data (40 bytes)
26,260,964 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,291,036 UART: [rt]cmd =0x44504543, len=24
26,324,070 >>> mbox cmd response data (40 bytes)
26,324,694 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,354,661 UART: [rt]cmd =0x44504543, len=24
26,388,547 >>> mbox cmd response data (40 bytes)
26,389,166 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,418,903 UART: [rt]cmd =0x44504543, len=24
26,452,435 >>> mbox cmd response data (40 bytes)
26,453,083 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,482,826 UART: [rt]cmd =0x44504543, len=24
26,516,627 >>> mbox cmd response data (40 bytes)
26,517,271 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,547,006 UART: [rt]cmd =0x44504543, len=24
26,580,646 >>> mbox cmd response data (40 bytes)
26,581,261 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,611,197 UART: [rt]cmd =0x44504543, len=24
26,644,548 >>> mbox cmd response data (40 bytes)
26,645,169 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,675,081 UART: [rt]cmd =0x44504543, len=24
26,708,759 >>> mbox cmd response data (40 bytes)
26,709,386 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,739,230 UART: [rt]cmd =0x44504543, len=24
26,772,883 >>> mbox cmd response data (40 bytes)
26,773,535 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,803,376 UART: [rt]cmd =0x44504543, len=24
26,836,971 >>> mbox cmd response data (40 bytes)
26,837,612 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,867,457 UART: [rt]cmd =0x44504543, len=24
26,900,878 >>> mbox cmd response data (40 bytes)
26,901,478 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,931,437 UART: [rt]cmd =0x44504543, len=24
26,938,594 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,462,871 ready_for_fw is high
3,463,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,207,621 >>> mbox cmd response: success
18,492,594 UART:
18,493,026 UART: Running Caliptra FMC ...
18,494,190 UART:
18,494,351 UART: [state] CFI Enabled
18,560,861 UART: [fht] FMC Alias Private Key: 7
20,327,286 UART: [art] Extend RT PCRs Done
20,328,511 UART: [art] Lock RT PCRs Done
20,329,998 UART: [art] Populate DV Done
20,335,140 UART: [fht] FMC Alias Private Key: 7
20,336,680 UART: [art] Derive CDI
20,337,416 UART: [art] Store in slot 0x4
20,393,433 UART: [art] Derive Key Pair
20,394,472 UART: [art] Store priv key in slot 0x5
22,857,439 UART: [art] Derive Key Pair - Done
22,870,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,583,318 UART: [art] Erasing AUTHORITY.KEYID = 7
24,584,820 UART: [art] PUB.X = B3B02612EAD111942DF5B257B449FBF731FE4F58B660A8184E27D5B299BDCCF22AEAADB35A8C094E6127C31EAE81C385
24,592,134 UART: [art] PUB.Y = 656CE7D89EEF28A47663C6DC7DC9AAE81B3784D777D524ABB1515902DB373D7BFE4421F80D345478E5C50CA1C24C516B
24,599,383 UART: [art] SIG.R = 321735FE4267A4DD8DE65FD9A15A0697D54EA3F7C0F26A0D93D51D46FFF4A6E6E4CEFD75F4AAF2592ADC491D1BD06980
24,606,817 UART: [art] SIG.S = F1589E434592AB2E29AFA8901418F757645E2F98C8E8C85120DA9F792FD618C686AEF8C7407F79677DA05D7DD399813B
25,585,688 UART: Caliptra RT
25,586,387 UART: [state] CFI Enabled
25,767,071 UART: [rt] RT listening for mailbox commands...
25,769,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,799,138 UART: [rt]cmd =0x44504543, len=24
25,827,167 >>> mbox cmd response data (40 bytes)
25,827,925 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,857,666 UART: [rt]cmd =0x44504543, len=24
25,892,221 >>> mbox cmd response data (40 bytes)
25,892,881 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,922,775 UART: [rt]cmd =0x44504543, len=24
25,956,119 >>> mbox cmd response data (40 bytes)
25,956,736 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,986,920 UART: [rt]cmd =0x44504543, len=24
26,020,322 >>> mbox cmd response data (40 bytes)
26,020,944 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,050,696 UART: [rt]cmd =0x44504543, len=24
26,084,335 >>> mbox cmd response data (40 bytes)
26,084,966 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,115,084 UART: [rt]cmd =0x44504543, len=24
26,148,529 >>> mbox cmd response data (40 bytes)
26,149,179 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,179,242 UART: [rt]cmd =0x44504543, len=24
26,212,464 >>> mbox cmd response data (40 bytes)
26,213,119 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,243,020 UART: [rt]cmd =0x44504543, len=24
26,276,657 >>> mbox cmd response data (40 bytes)
26,277,290 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,307,361 UART: [rt]cmd =0x44504543, len=24
26,340,770 >>> mbox cmd response data (40 bytes)
26,341,385 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,371,375 UART: [rt]cmd =0x44504543, len=24
26,404,639 >>> mbox cmd response data (40 bytes)
26,405,266 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,435,270 UART: [rt]cmd =0x44504543, len=24
26,469,204 >>> mbox cmd response data (40 bytes)
26,469,855 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,499,536 UART: [rt]cmd =0x44504543, len=24
26,532,702 >>> mbox cmd response data (40 bytes)
26,533,355 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,563,041 UART: [rt]cmd =0x44504543, len=24
26,596,955 >>> mbox cmd response data (40 bytes)
26,597,563 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,627,551 UART: [rt]cmd =0x44504543, len=24
26,661,222 >>> mbox cmd response data (40 bytes)
26,661,837 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,691,856 UART: [rt]cmd =0x44504543, len=24
26,698,346 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,420 UART:
192,787 UART: Running Caliptra ROM ...
193,872 UART:
603,755 UART: [state] CFI Enabled
617,147 UART: [state] LifecycleState = Unprovisioned
619,085 UART: [state] DebugLocked = No
621,105 UART: [state] WD Timer not started. Device not locked for debugging
625,502 UART: [kat] SHA2-256
805,158 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,890 UART: [kat] ++
816,339 UART: [kat] sha1
827,714 UART: [kat] SHA2-256
830,436 UART: [kat] SHA2-384
837,065 UART: [kat] SHA2-512-ACC
839,462 UART: [kat] ECC-384
3,284,074 UART: [kat] HMAC-384Kdf
3,297,051 UART: [kat] LMS
3,773,536 UART: [kat] --
3,777,908 UART: [cold-reset] ++
3,779,271 UART: [fht] FHT @ 0x50003400
3,788,934 UART: [idev] ++
3,789,497 UART: [idev] CDI.KEYID = 6
3,790,455 UART: [idev] SUBJECT.KEYID = 7
3,791,700 UART: [idev] UDS.KEYID = 0
3,792,718 ready_for_fw is high
3,792,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,837 UART: [idev] Erasing UDS.KEYID = 0
6,268,298 UART: [idev] Sha1 KeyId Algorithm
6,291,988 UART: [idev] --
6,297,066 UART: [ldev] ++
6,297,666 UART: [ldev] CDI.KEYID = 6
6,298,555 UART: [ldev] SUBJECT.KEYID = 5
6,299,768 UART: [ldev] AUTHORITY.KEYID = 7
6,301,002 UART: [ldev] FE.KEYID = 1
6,313,719 UART: [ldev] Erasing FE.KEYID = 1
8,792,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,788 UART: [ldev] --
10,586,483 UART: [fwproc] Wait for Commands...
10,588,800 UART: [fwproc] Recv command 0x46574c44
10,590,839 UART: [fwproc] Recv'd Img size: 118548 bytes
14,081,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,585 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,565 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,768 >>> mbox cmd response: success
14,564,527 UART: [afmc] ++
14,565,141 UART: [afmc] CDI.KEYID = 6
14,566,217 UART: [afmc] SUBJECT.KEYID = 7
14,567,323 UART: [afmc] AUTHORITY.KEYID = 5
17,069,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,893 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,725 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,799 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,387 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,978 UART: [afmc] --
18,870,952 UART: [cold-reset] --
18,874,496 UART: [state] Locking Datavault
18,878,053 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,839 UART: [state] Locking ICCM
18,881,078 UART: [exit] Launching FMC @ 0x40000130
18,889,483 UART:
18,889,721 UART: Running Caliptra FMC ...
18,890,835 UART:
18,891,002 UART: [state] CFI Enabled
18,899,060 UART: [fht] FMC Alias Private Key: 7
20,664,798 UART: [art] Extend RT PCRs Done
20,666,015 UART: [art] Lock RT PCRs Done
20,667,485 UART: [art] Populate DV Done
20,672,791 UART: [fht] FMC Alias Private Key: 7
20,674,340 UART: [art] Derive CDI
20,675,160 UART: [art] Store in slot 0x4
20,717,597 UART: [art] Derive Key Pair
20,718,640 UART: [art] Store priv key in slot 0x5
23,145,045 UART: [art] Derive Key Pair - Done
23,157,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,621 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,126 UART: [art] PUB.X = 24C0F0AC97431B9892548B4DA2F379AF4FF0D1D4BCA0C7A69774487E0DD7A503A21ABC1F5CFB3986718A5C4904C491F8
24,873,436 UART: [art] PUB.Y = C5F0B11CC6B7F67E4E3111C7258B6372DB0F8A8DBE501C717C00E0F29EA94A68C84C02BF1C02A22F10F0E88B2E43826E
24,880,675 UART: [art] SIG.R = 513A79BDA5AAED14C38410378269D6DB3D0AEEADB476EF5DC84AB0698B4E2D24197FA07963AB1077B02C54648342DD05
24,888,064 UART: [art] SIG.S = 3C2C60F2FDC6F42A52EDC750D896FD53EEA90E88BD241575CA2DABF376544B38CCFD6A46F753EC32ECF06AC1A7D7AA1C
25,866,864 UART: Caliptra RT
25,867,555 UART: [state] CFI Enabled
25,999,472 UART: [rt] RT listening for mailbox commands...
26,001,408 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,031,159 UART: [rt]cmd =0x44504543, len=24
26,058,972 >>> mbox cmd response data (40 bytes)
26,059,755 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,089,689 UART: [rt]cmd =0x44504543, len=24
26,116,560 >>> mbox cmd response data (40 bytes)
26,117,212 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,147,183 UART: [rt]cmd =0x44504543, len=24
26,174,627 >>> mbox cmd response data (40 bytes)
26,175,290 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,205,298 UART: [rt]cmd =0x44504543, len=24
26,233,011 >>> mbox cmd response data (40 bytes)
26,233,696 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,263,549 UART: [rt]cmd =0x44504543, len=24
26,291,582 >>> mbox cmd response data (40 bytes)
26,292,198 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,321,883 UART: [rt]cmd =0x44504543, len=24
26,350,257 >>> mbox cmd response data (40 bytes)
26,350,883 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,380,780 UART: [rt]cmd =0x44504543, len=24
26,408,218 >>> mbox cmd response data (40 bytes)
26,408,870 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,438,446 UART: [rt]cmd =0x44504543, len=24
26,466,266 >>> mbox cmd response data (40 bytes)
26,466,880 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,496,849 UART: [rt]cmd =0x44504543, len=24
26,523,824 >>> mbox cmd response data (40 bytes)
26,524,454 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,554,365 UART: [rt]cmd =0x44504543, len=24
26,581,768 >>> mbox cmd response data (40 bytes)
26,582,391 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,612,343 UART: [rt]cmd =0x44504543, len=24
26,640,157 >>> mbox cmd response data (40 bytes)
26,640,806 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,670,869 UART: [rt]cmd =0x44504543, len=24
26,699,050 >>> mbox cmd response data (40 bytes)
26,699,663 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,729,619 UART: [rt]cmd =0x44504543, len=24
26,757,289 >>> mbox cmd response data (40 bytes)
26,757,928 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,787,880 UART: [rt]cmd =0x44504543, len=24
26,815,909 >>> mbox cmd response data (40 bytes)
26,816,564 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,846,358 UART: [rt]cmd =0x44504543, len=24
26,853,352 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,778,628 ready_for_fw is high
3,778,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,688 >>> mbox cmd response: success
18,687,946 UART:
18,688,346 UART: Running Caliptra FMC ...
18,689,489 UART:
18,689,650 UART: [state] CFI Enabled
18,697,701 UART: [fht] FMC Alias Private Key: 7
20,463,757 UART: [art] Extend RT PCRs Done
20,464,979 UART: [art] Lock RT PCRs Done
20,466,713 UART: [art] Populate DV Done
20,472,138 UART: [fht] FMC Alias Private Key: 7
20,473,679 UART: [art] Derive CDI
20,474,430 UART: [art] Store in slot 0x4
20,516,998 UART: [art] Derive Key Pair
20,518,024 UART: [art] Store priv key in slot 0x5
22,945,057 UART: [art] Derive Key Pair - Done
22,957,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,664,463 UART: [art] Erasing AUTHORITY.KEYID = 7
24,665,961 UART: [art] PUB.X = 62E05E1A5A3721B444815E0EF2E0040CB3DFC5135788C16F3D4E1263170168DC2F954723EAE571A8DC757FA24C59F5A1
24,673,225 UART: [art] PUB.Y = F00E67FF7E2F5B520CABF300D9E4F3548882C07C8FC24A223E81FF4EC7F91914C08D4B76F57913544548BCDC6C56BF7B
24,680,487 UART: [art] SIG.R = 29060102182F6D6268B9AF3804FA78539AA25030CA2135208472C4169EF99056E8B5672A0F65AD2755CF478ECBA326A5
24,687,832 UART: [art] SIG.S = D8067780FD6B47450C0A73850D0D2475C118297D0254FF7723485C27FF24969DF1322B7F25F6B9B238F2AD4CDB64C1F5
25,666,722 UART: Caliptra RT
25,667,421 UART: [state] CFI Enabled
25,800,409 UART: [rt] RT listening for mailbox commands...
25,802,320 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,832,488 UART: [rt]cmd =0x44504543, len=24
25,860,159 >>> mbox cmd response data (40 bytes)
25,860,918 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,890,823 UART: [rt]cmd =0x44504543, len=24
25,919,038 >>> mbox cmd response data (40 bytes)
25,919,739 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,949,592 UART: [rt]cmd =0x44504543, len=24
25,977,454 >>> mbox cmd response data (40 bytes)
25,978,083 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,007,856 UART: [rt]cmd =0x44504543, len=24
26,035,048 >>> mbox cmd response data (40 bytes)
26,035,683 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,065,692 UART: [rt]cmd =0x44504543, len=24
26,093,653 >>> mbox cmd response data (40 bytes)
26,094,323 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,124,389 UART: [rt]cmd =0x44504543, len=24
26,151,978 >>> mbox cmd response data (40 bytes)
26,152,592 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,182,507 UART: [rt]cmd =0x44504543, len=24
26,210,293 >>> mbox cmd response data (40 bytes)
26,210,934 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,240,953 UART: [rt]cmd =0x44504543, len=24
26,268,676 >>> mbox cmd response data (40 bytes)
26,269,291 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,299,183 UART: [rt]cmd =0x44504543, len=24
26,326,954 >>> mbox cmd response data (40 bytes)
26,327,603 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,357,341 UART: [rt]cmd =0x44504543, len=24
26,384,813 >>> mbox cmd response data (40 bytes)
26,385,419 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,415,378 UART: [rt]cmd =0x44504543, len=24
26,443,051 >>> mbox cmd response data (40 bytes)
26,443,671 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,473,811 UART: [rt]cmd =0x44504543, len=24
26,501,589 >>> mbox cmd response data (40 bytes)
26,502,208 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,532,285 UART: [rt]cmd =0x44504543, len=24
26,559,934 >>> mbox cmd response data (40 bytes)
26,560,582 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,590,483 UART: [rt]cmd =0x44504543, len=24
26,618,289 >>> mbox cmd response data (40 bytes)
26,618,910 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,648,990 UART: [rt]cmd =0x44504543, len=24
26,655,876 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
191,959 UART:
192,398 UART: Running Caliptra ROM ...
193,546 UART:
193,694 UART: [state] CFI Enabled
263,613 UART: [state] LifecycleState = Unprovisioned
266,020 UART: [state] DebugLocked = No
267,564 UART: [state] WD Timer not started. Device not locked for debugging
273,018 UART: [kat] SHA2-256
462,907 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,657 UART: [kat] ++
474,131 UART: [kat] sha1
485,997 UART: [kat] SHA2-256
489,014 UART: [kat] SHA2-384
494,575 UART: [kat] SHA2-512-ACC
497,160 UART: [kat] ECC-384
2,949,444 UART: [kat] HMAC-384Kdf
2,972,918 UART: [kat] LMS
3,504,706 UART: [kat] --
3,509,418 UART: [cold-reset] ++
3,511,999 UART: [fht] FHT @ 0x50003400
3,523,617 UART: [idev] ++
3,524,332 UART: [idev] CDI.KEYID = 6
3,525,324 UART: [idev] SUBJECT.KEYID = 7
3,526,493 UART: [idev] UDS.KEYID = 0
3,527,413 ready_for_fw is high
3,527,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,965 UART: [idev] Erasing UDS.KEYID = 0
6,030,647 UART: [idev] Sha1 KeyId Algorithm
6,054,233 UART: [idev] --
6,058,765 UART: [ldev] ++
6,059,499 UART: [ldev] CDI.KEYID = 6
6,060,381 UART: [ldev] SUBJECT.KEYID = 5
6,061,594 UART: [ldev] AUTHORITY.KEYID = 7
6,062,788 UART: [ldev] FE.KEYID = 1
6,100,904 UART: [ldev] Erasing FE.KEYID = 1
8,609,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,828 UART: [ldev] --
10,411,607 UART: [fwproc] Wait for Commands...
10,414,116 UART: [fwproc] Recv command 0x46574c44
10,416,426 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,986,751 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,368 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,047 >>> mbox cmd response: success
14,674,436 UART: [afmc] ++
14,675,155 UART: [afmc] CDI.KEYID = 6
14,676,317 UART: [afmc] SUBJECT.KEYID = 7
14,677,808 UART: [afmc] AUTHORITY.KEYID = 5
17,216,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,355 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,269 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,405 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,563 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,465 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,323 UART: [afmc] --
19,032,006 UART: [cold-reset] --
19,036,145 UART: [state] Locking Datavault
19,041,620 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,775 UART: [state] Locking ICCM
19,046,528 UART: [exit] Launching FMC @ 0x40000130
19,055,210 UART:
19,055,503 UART: Running Caliptra FMC ...
19,056,620 UART:
19,056,784 UART: [state] CFI Enabled
19,115,313 UART: [fht] FMC Alias Private Key: 7
20,881,418 UART: [art] Extend RT PCRs Done
20,882,641 UART: [art] Lock RT PCRs Done
20,884,340 UART: [art] Populate DV Done
20,889,801 UART: [fht] FMC Alias Private Key: 7
20,891,329 UART: [art] Derive CDI
20,892,067 UART: [art] Store in slot 0x4
20,948,290 UART: [art] Derive Key Pair
20,949,283 UART: [art] Store priv key in slot 0x5
23,412,077 UART: [art] Derive Key Pair - Done
23,424,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,534 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,045 UART: [art] PUB.X = C6944A2E9040B6112F31F65B9FF00FD3B8759C76D730A747C1679EDD4746A2AD9089665DA0FD166DA31D24B45A572BC7
25,146,339 UART: [art] PUB.Y = FF6DA0AF0E5EEEB83D8771C15B1D6FA2DBA5AD5CD15D9BEDE04355BD3319A360EF13CA81E5EA2810050DBB7C932471C8
25,153,550 UART: [art] SIG.R = 54130CDB934FBC2A6E7E01D10C54C6272D136A93FACE03D1B5B84745AAEC2FB929E5852EAF79867F12094CEF87DA75D8
25,160,974 UART: [art] SIG.S = FC61002A670341825E1F728B7CDCBD486D3872D62A0747FFD36B63FF543C46BD0514D5D0B709F7FF70F8792BED97C561
26,139,862 UART: Caliptra RT
26,140,569 UART: [state] CFI Enabled
26,320,106 UART: [rt] RT listening for mailbox commands...
26,322,039 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,351,904 UART: [rt]cmd =0x44504543, len=24
26,379,750 >>> mbox cmd response data (40 bytes)
26,380,588 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,410,339 UART: [rt]cmd =0x44504543, len=24
26,444,016 >>> mbox cmd response data (40 bytes)
26,444,651 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,474,441 UART: [rt]cmd =0x44504543, len=24
26,507,704 >>> mbox cmd response data (40 bytes)
26,508,360 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,538,391 UART: [rt]cmd =0x44504543, len=24
26,572,039 >>> mbox cmd response data (40 bytes)
26,572,698 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,602,380 UART: [rt]cmd =0x44504543, len=24
26,636,023 >>> mbox cmd response data (40 bytes)
26,636,644 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,666,662 UART: [rt]cmd =0x44504543, len=24
26,699,960 >>> mbox cmd response data (40 bytes)
26,700,579 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,730,380 UART: [rt]cmd =0x44504543, len=24
26,763,678 >>> mbox cmd response data (40 bytes)
26,764,298 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,794,301 UART: [rt]cmd =0x44504543, len=24
26,828,153 >>> mbox cmd response data (40 bytes)
26,828,805 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,858,862 UART: [rt]cmd =0x44504543, len=24
26,892,203 >>> mbox cmd response data (40 bytes)
26,892,859 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,922,600 UART: [rt]cmd =0x44504543, len=24
26,956,346 >>> mbox cmd response data (40 bytes)
26,956,959 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,986,868 UART: [rt]cmd =0x44504543, len=24
27,020,481 >>> mbox cmd response data (40 bytes)
27,021,122 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,050,924 UART: [rt]cmd =0x44504543, len=24
27,084,332 >>> mbox cmd response data (40 bytes)
27,084,952 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,114,793 UART: [rt]cmd =0x44504543, len=24
27,148,434 >>> mbox cmd response data (40 bytes)
27,149,085 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,178,988 UART: [rt]cmd =0x44504543, len=24
27,212,306 >>> mbox cmd response data (40 bytes)
27,212,966 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,242,707 UART: [rt]cmd =0x44504543, len=24
27,249,486 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,438,279 ready_for_fw is high
3,438,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,827,997 >>> mbox cmd response: success
19,111,039 UART:
19,111,434 UART: Running Caliptra FMC ...
19,112,585 UART:
19,112,748 UART: [state] CFI Enabled
19,179,760 UART: [fht] FMC Alias Private Key: 7
20,946,786 UART: [art] Extend RT PCRs Done
20,948,133 UART: [art] Lock RT PCRs Done
20,949,220 UART: [art] Populate DV Done
20,954,635 UART: [fht] FMC Alias Private Key: 7
20,956,354 UART: [art] Derive CDI
20,957,169 UART: [art] Store in slot 0x4
21,012,205 UART: [art] Derive Key Pair
21,013,200 UART: [art] Store priv key in slot 0x5
23,476,212 UART: [art] Derive Key Pair - Done
23,489,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,664 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,174 UART: [art] PUB.X = EBFF7C060F25087279597EDB975F2611DF064875233EA6BD2BBA3050CAE5100F4482970C1B1A39A423D0F5971A29A597
25,210,390 UART: [art] PUB.Y = 6612F38F59CB53BA30267B4C972B83F41D41974D943CE291E8DC611D94CF39861EC9C3506F598D29509DCDC7860B2CD5
25,217,667 UART: [art] SIG.R = C98AF20EF7C145703AC76C6883CC6413196411FC9A965133F6E34B6AF6BEC4D67EE2CAC971413ACBECB8ACA6492B4B61
25,225,092 UART: [art] SIG.S = EC64FD5F2289A96D291B4A2B1D6C6DE03E6AC65A70DD8933E0236DBC6BC79D8B0296CF391B6DDEAC8A088D6AC3EEBDE8
26,204,289 UART: Caliptra RT
26,204,979 UART: [state] CFI Enabled
26,383,905 UART: [rt] RT listening for mailbox commands...
26,385,853 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,415,994 UART: [rt]cmd =0x44504543, len=24
26,444,400 >>> mbox cmd response data (40 bytes)
26,445,162 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,474,863 UART: [rt]cmd =0x44504543, len=24
26,509,674 >>> mbox cmd response data (40 bytes)
26,510,315 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,540,005 UART: [rt]cmd =0x44504543, len=24
26,573,713 >>> mbox cmd response data (40 bytes)
26,574,376 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,604,014 UART: [rt]cmd =0x44504543, len=24
26,637,775 >>> mbox cmd response data (40 bytes)
26,638,432 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,668,173 UART: [rt]cmd =0x44504543, len=24
26,701,783 >>> mbox cmd response data (40 bytes)
26,702,402 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,732,371 UART: [rt]cmd =0x44504543, len=24
26,766,039 >>> mbox cmd response data (40 bytes)
26,766,691 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,796,714 UART: [rt]cmd =0x44504543, len=24
26,830,015 >>> mbox cmd response data (40 bytes)
26,830,639 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,860,592 UART: [rt]cmd =0x44504543, len=24
26,894,246 >>> mbox cmd response data (40 bytes)
26,894,910 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,924,704 UART: [rt]cmd =0x44504543, len=24
26,958,403 >>> mbox cmd response data (40 bytes)
26,959,067 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,988,917 UART: [rt]cmd =0x44504543, len=24
27,022,501 >>> mbox cmd response data (40 bytes)
27,023,112 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,053,135 UART: [rt]cmd =0x44504543, len=24
27,086,326 >>> mbox cmd response data (40 bytes)
27,086,951 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,116,883 UART: [rt]cmd =0x44504543, len=24
27,150,674 >>> mbox cmd response data (40 bytes)
27,151,297 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,181,303 UART: [rt]cmd =0x44504543, len=24
27,214,998 >>> mbox cmd response data (40 bytes)
27,215,654 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,245,230 UART: [rt]cmd =0x44504543, len=24
27,278,772 >>> mbox cmd response data (40 bytes)
27,279,438 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,309,336 UART: [rt]cmd =0x44504543, len=24
27,316,121 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,415 UART:
192,776 UART: Running Caliptra ROM ...
193,976 UART:
603,738 UART: [state] CFI Enabled
618,385 UART: [state] LifecycleState = Unprovisioned
620,735 UART: [state] DebugLocked = No
622,418 UART: [state] WD Timer not started. Device not locked for debugging
626,121 UART: [kat] SHA2-256
815,837 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,644 UART: [kat] ++
827,122 UART: [kat] sha1
838,288 UART: [kat] SHA2-256
841,295 UART: [kat] SHA2-384
847,363 UART: [kat] SHA2-512-ACC
849,958 UART: [kat] ECC-384
3,294,966 UART: [kat] HMAC-384Kdf
3,307,135 UART: [kat] LMS
3,839,003 UART: [kat] --
3,842,722 UART: [cold-reset] ++
3,844,799 UART: [fht] FHT @ 0x50003400
3,856,517 UART: [idev] ++
3,857,233 UART: [idev] CDI.KEYID = 6
3,858,150 UART: [idev] SUBJECT.KEYID = 7
3,859,398 UART: [idev] UDS.KEYID = 0
3,860,326 ready_for_fw is high
3,860,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,379 UART: [idev] Erasing UDS.KEYID = 0
6,337,966 UART: [idev] Sha1 KeyId Algorithm
6,360,843 UART: [idev] --
6,365,050 UART: [ldev] ++
6,365,730 UART: [ldev] CDI.KEYID = 6
6,366,698 UART: [ldev] SUBJECT.KEYID = 5
6,367,861 UART: [ldev] AUTHORITY.KEYID = 7
6,369,093 UART: [ldev] FE.KEYID = 1
6,381,480 UART: [ldev] Erasing FE.KEYID = 1
8,858,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,428 UART: [ldev] --
10,649,269 UART: [fwproc] Wait for Commands...
10,651,201 UART: [fwproc] Recv command 0x46574c44
10,653,510 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,279 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,942 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,980 >>> mbox cmd response: success
14,920,948 UART: [afmc] ++
14,921,683 UART: [afmc] CDI.KEYID = 6
14,922,883 UART: [afmc] SUBJECT.KEYID = 7
14,924,325 UART: [afmc] AUTHORITY.KEYID = 5
17,429,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,152,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,154,798 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,169,893 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,185,018 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,199,957 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,224,369 UART: [afmc] --
19,228,193 UART: [cold-reset] --
19,232,121 UART: [state] Locking Datavault
19,236,365 UART: [state] Locking PCR0, PCR1 and PCR31
19,238,590 UART: [state] Locking ICCM
19,241,346 UART: [exit] Launching FMC @ 0x40000130
19,250,036 UART:
19,250,278 UART: Running Caliptra FMC ...
19,251,382 UART:
19,251,546 UART: [state] CFI Enabled
19,259,723 UART: [fht] FMC Alias Private Key: 7
21,025,420 UART: [art] Extend RT PCRs Done
21,026,641 UART: [art] Lock RT PCRs Done
21,028,113 UART: [art] Populate DV Done
21,033,696 UART: [fht] FMC Alias Private Key: 7
21,035,346 UART: [art] Derive CDI
21,036,167 UART: [art] Store in slot 0x4
21,078,711 UART: [art] Derive Key Pair
21,079,720 UART: [art] Store priv key in slot 0x5
23,507,089 UART: [art] Derive Key Pair - Done
23,520,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,342 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,848 UART: [art] PUB.X = ABF2CD104860A1C50FEF401D2C798D2C1688CC2E19915424D59DFEDF1FDDE5592F7EC7DE08154D2E83A7A572CF54BE66
25,235,167 UART: [art] PUB.Y = 58F9C4DDA8E024D819D35ED872CBC442ABD6CE64061127F5A2A5648C00B3247F20221D7350FA1AD96FBDA1F088F44510
25,242,432 UART: [art] SIG.R = 431A5C3F00B9E6109B3E53F011CB762ED41107AA4DDFF29D01266747BB9EC63796FF2327AC32968852A4DAE385E7F448
25,249,750 UART: [art] SIG.S = D4B7E80DE38A66BB13D39C0C0625D8C18F2A42D32A4C008634C7A03F6051053DD3680FCFC0B345A8F7C8C90E50E11B6E
26,228,668 UART: Caliptra RT
26,229,358 UART: [state] CFI Enabled
26,361,161 UART: [rt] RT listening for mailbox commands...
26,363,077 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,393,161 UART: [rt]cmd =0x44504543, len=24
26,420,460 >>> mbox cmd response data (40 bytes)
26,421,270 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,451,183 UART: [rt]cmd =0x44504543, len=24
26,478,851 >>> mbox cmd response data (40 bytes)
26,479,523 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,509,320 UART: [rt]cmd =0x44504543, len=24
26,536,700 >>> mbox cmd response data (40 bytes)
26,537,334 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,567,258 UART: [rt]cmd =0x44504543, len=24
26,594,879 >>> mbox cmd response data (40 bytes)
26,595,515 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,625,337 UART: [rt]cmd =0x44504543, len=24
26,652,906 >>> mbox cmd response data (40 bytes)
26,653,535 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,683,228 UART: [rt]cmd =0x44504543, len=24
26,711,052 >>> mbox cmd response data (40 bytes)
26,711,718 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,741,785 UART: [rt]cmd =0x44504543, len=24
26,769,542 >>> mbox cmd response data (40 bytes)
26,770,162 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,800,020 UART: [rt]cmd =0x44504543, len=24
26,827,652 >>> mbox cmd response data (40 bytes)
26,828,286 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,858,079 UART: [rt]cmd =0x44504543, len=24
26,886,102 >>> mbox cmd response data (40 bytes)
26,886,735 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,916,633 UART: [rt]cmd =0x44504543, len=24
26,944,304 >>> mbox cmd response data (40 bytes)
26,944,957 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,974,804 UART: [rt]cmd =0x44504543, len=24
27,002,562 >>> mbox cmd response data (40 bytes)
27,003,199 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,033,093 UART: [rt]cmd =0x44504543, len=24
27,060,962 >>> mbox cmd response data (40 bytes)
27,061,601 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,091,451 UART: [rt]cmd =0x44504543, len=24
27,119,009 >>> mbox cmd response data (40 bytes)
27,119,669 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,149,627 UART: [rt]cmd =0x44504543, len=24
27,177,221 >>> mbox cmd response data (40 bytes)
27,177,834 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,207,808 UART: [rt]cmd =0x44504543, len=24
27,214,194 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,101 writing to cptra_bootfsm_go
3,751,843 ready_for_fw is high
3,752,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,363 >>> mbox cmd response: success
19,295,562 UART:
19,295,948 UART: Running Caliptra FMC ...
19,297,150 UART:
19,297,335 UART: [state] CFI Enabled
19,304,974 UART: [fht] FMC Alias Private Key: 7
21,071,396 UART: [art] Extend RT PCRs Done
21,072,625 UART: [art] Lock RT PCRs Done
21,074,372 UART: [art] Populate DV Done
21,079,803 UART: [fht] FMC Alias Private Key: 7
21,081,351 UART: [art] Derive CDI
21,082,173 UART: [art] Store in slot 0x4
21,124,783 UART: [art] Derive Key Pair
21,125,830 UART: [art] Store priv key in slot 0x5
23,552,634 UART: [art] Derive Key Pair - Done
23,565,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,908 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,422 UART: [art] PUB.X = 1697B64ADDC5D433CC9F3262C69CAC49AF99E229DA15A47BD94143C19E7A6227E80511F814597741A6F2038C382A73D6
25,280,737 UART: [art] PUB.Y = DF4949FE8EE03FBEAF3AB66A3C0C726D7241581BCD2AABD60182558DC20C75736FBDBF008A948604AAAEB7B0E6E4DBF5
25,287,923 UART: [art] SIG.R = A2D33004AF6628B562381B90A1D03F6967EA6A0783284143ABED6EBA4B2466A84ABF5EC6DFDDDE546B152F9BBA1F2ABA
25,295,369 UART: [art] SIG.S = A21C31DC87EF8F667C174595D9715A0C7EE45F20A13290726D36E59A3C732ED3E67CF152EE68CEFFC367340140F33C28
26,274,567 UART: Caliptra RT
26,275,284 UART: [state] CFI Enabled
26,407,901 UART: [rt] RT listening for mailbox commands...
26,409,844 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,439,588 UART: [rt]cmd =0x44504543, len=24
26,467,241 >>> mbox cmd response data (40 bytes)
26,467,995 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,497,811 UART: [rt]cmd =0x44504543, len=24
26,525,498 >>> mbox cmd response data (40 bytes)
26,526,141 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,555,828 UART: [rt]cmd =0x44504543, len=24
26,583,731 >>> mbox cmd response data (40 bytes)
26,584,421 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,614,484 UART: [rt]cmd =0x44504543, len=24
26,642,258 >>> mbox cmd response data (40 bytes)
26,642,916 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,672,926 UART: [rt]cmd =0x44504543, len=24
26,701,034 >>> mbox cmd response data (40 bytes)
26,701,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,731,588 UART: [rt]cmd =0x44504543, len=24
26,758,839 >>> mbox cmd response data (40 bytes)
26,759,472 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,789,371 UART: [rt]cmd =0x44504543, len=24
26,816,762 >>> mbox cmd response data (40 bytes)
26,817,460 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,847,488 UART: [rt]cmd =0x44504543, len=24
26,874,980 >>> mbox cmd response data (40 bytes)
26,875,622 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,905,375 UART: [rt]cmd =0x44504543, len=24
26,932,997 >>> mbox cmd response data (40 bytes)
26,933,629 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,963,460 UART: [rt]cmd =0x44504543, len=24
26,990,922 >>> mbox cmd response data (40 bytes)
26,991,556 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,021,566 UART: [rt]cmd =0x44504543, len=24
27,049,448 >>> mbox cmd response data (40 bytes)
27,050,104 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,080,116 UART: [rt]cmd =0x44504543, len=24
27,107,880 >>> mbox cmd response data (40 bytes)
27,108,500 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,138,300 UART: [rt]cmd =0x44504543, len=24
27,166,145 >>> mbox cmd response data (40 bytes)
27,166,781 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,196,757 UART: [rt]cmd =0x44504543, len=24
27,224,303 >>> mbox cmd response data (40 bytes)
27,224,967 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,254,544 UART: [rt]cmd =0x44504543, len=24
27,261,117 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,043 UART: [kat] SHA2-256
881,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,089 UART: [kat] ++
886,241 UART: [kat] sha1
890,481 UART: [kat] SHA2-256
892,419 UART: [kat] SHA2-384
894,966 UART: [kat] SHA2-512-ACC
896,867 UART: [kat] ECC-384
902,374 UART: [kat] HMAC-384Kdf
906,842 UART: [kat] LMS
1,475,038 UART: [kat] --
1,475,965 UART: [cold-reset] ++
1,476,323 UART: [fht] Storing FHT @ 0x50003400
1,479,056 UART: [idev] ++
1,479,224 UART: [idev] CDI.KEYID = 6
1,479,584 UART: [idev] SUBJECT.KEYID = 7
1,480,008 UART: [idev] UDS.KEYID = 0
1,480,353 ready_for_fw is high
1,480,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,808 UART: [idev] Erasing UDS.KEYID = 0
1,504,198 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,816 UART: [idev] --
1,513,855 UART: [ldev] ++
1,514,023 UART: [ldev] CDI.KEYID = 6
1,514,386 UART: [ldev] SUBJECT.KEYID = 5
1,514,812 UART: [ldev] AUTHORITY.KEYID = 7
1,515,275 UART: [ldev] FE.KEYID = 1
1,520,623 UART: [ldev] Erasing FE.KEYID = 1
1,546,256 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,410 UART: [ldev] --
1,585,693 UART: [fwproc] Waiting for Commands...
1,586,464 UART: [fwproc] Received command 0x46574c44
1,587,255 UART: [fwproc] Received Image of size 118548 bytes
2,933,053 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,623 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,841 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,066 >>> mbox cmd response: success
3,133,136 UART: [afmc] ++
3,133,304 UART: [afmc] CDI.KEYID = 6
3,133,666 UART: [afmc] SUBJECT.KEYID = 7
3,134,091 UART: [afmc] AUTHORITY.KEYID = 5
3,169,134 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,502 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,282 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,991 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,874 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,557 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,575 UART: [afmc] --
3,212,629 UART: [cold-reset] --
3,213,451 UART: [state] Locking Datavault
3,214,302 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,906 UART: [state] Locking ICCM
3,215,366 UART: [exit] Launching FMC @ 0x40000130
3,220,696 UART:
3,220,712 UART: Running Caliptra FMC ...
3,221,120 UART:
3,221,174 UART: [state] CFI Enabled
3,231,598 UART: [fht] FMC Alias Private Key: 7
3,350,314 UART: [art] Extend RT PCRs Done
3,350,742 UART: [art] Lock RT PCRs Done
3,352,334 UART: [art] Populate DV Done
3,360,663 UART: [fht] FMC Alias Private Key: 7
3,361,821 UART: [art] Derive CDI
3,362,101 UART: [art] Store in slot 0x4
3,447,673 UART: [art] Derive Key Pair
3,448,033 UART: [art] Store priv key in slot 0x5
3,461,358 UART: [art] Derive Key Pair - Done
3,475,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,900 UART: [art] PUB.X = 9BE110947B250D29E5127D043BB5E169C380FA0416E901F3D5EF2E40F8672A3448576A62B62B9AFC1C8825B079948CB4
3,498,656 UART: [art] PUB.Y = 5ECE409B1B8820EE28D890FDFE1B53C78D18856CE79CA18FD2D4A625CECFDF7F3C0AFD735BB181A8B28903AF3CDECB12
3,505,628 UART: [art] SIG.R = 98950AFEE6445FE1A8CE320C4B0839720D5B4F67B1931DE46FA50429C8E570F1ED5BD22F7DAC199D598B83F771B4C33B
3,512,393 UART: [art] SIG.S = 967ED70996EB655B5F5B8E64AACF1CB4FB15E55607E210B768F78291A0AC5FACF6ADA5B8F97C590565910D4DE850A030
3,536,333 UART: Caliptra RT
3,536,584 UART: [state] CFI Enabled
3,656,531 UART: [rt] RT listening for mailbox commands...
3,657,201 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,149 UART: [rt]cmd =0x44504543, len=24
3,714,453 >>> mbox cmd response data (40 bytes)
3,714,454 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,743,915 UART: [rt]cmd =0x44504543, len=24
3,771,430 >>> mbox cmd response data (40 bytes)
3,771,431 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,800,970 UART: [rt]cmd =0x44504543, len=24
3,828,634 >>> mbox cmd response data (40 bytes)
3,828,635 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,858,112 UART: [rt]cmd =0x44504543, len=24
3,885,737 >>> mbox cmd response data (40 bytes)
3,885,738 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,179 UART: [rt]cmd =0x44504543, len=24
3,943,109 >>> mbox cmd response data (40 bytes)
3,943,110 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,972,461 UART: [rt]cmd =0x44504543, len=24
3,999,658 >>> mbox cmd response data (40 bytes)
3,999,659 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,926 UART: [rt]cmd =0x44504543, len=24
4,056,548 >>> mbox cmd response data (40 bytes)
4,056,549 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,086,070 UART: [rt]cmd =0x44504543, len=24
4,113,643 >>> mbox cmd response data (40 bytes)
4,113,644 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,143,037 UART: [rt]cmd =0x44504543, len=24
4,170,745 >>> mbox cmd response data (40 bytes)
4,170,746 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,200,133 UART: [rt]cmd =0x44504543, len=24
4,227,226 >>> mbox cmd response data (40 bytes)
4,227,227 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,256,768 UART: [rt]cmd =0x44504543, len=24
4,284,152 >>> mbox cmd response data (40 bytes)
4,284,153 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,313,710 UART: [rt]cmd =0x44504543, len=24
4,341,521 >>> mbox cmd response data (40 bytes)
4,341,522 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,370,953 UART: [rt]cmd =0x44504543, len=24
4,398,307 >>> mbox cmd response data (40 bytes)
4,398,308 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,427,723 UART: [rt]cmd =0x44504543, len=24
4,455,352 >>> mbox cmd response data (40 bytes)
4,455,353 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,484,832 UART: [rt]cmd =0x44504543, len=24
4,492,344 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,843 ready_for_fw is high
1,361,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,646 >>> mbox cmd response: success
3,040,121 UART:
3,040,137 UART: Running Caliptra FMC ...
3,040,545 UART:
3,040,599 UART: [state] CFI Enabled
3,051,071 UART: [fht] FMC Alias Private Key: 7
3,170,311 UART: [art] Extend RT PCRs Done
3,170,739 UART: [art] Lock RT PCRs Done
3,172,137 UART: [art] Populate DV Done
3,180,050 UART: [fht] FMC Alias Private Key: 7
3,181,014 UART: [art] Derive CDI
3,181,294 UART: [art] Store in slot 0x4
3,266,830 UART: [art] Derive Key Pair
3,267,190 UART: [art] Store priv key in slot 0x5
3,279,913 UART: [art] Derive Key Pair - Done
3,294,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,289 UART: [art] PUB.X = 60E10DF750CA19D72354592BD29DD6B57E19E170FF50F800680F467453D0147D1CBCD98F5EAB9AC37C23497DFCD89985
3,318,037 UART: [art] PUB.Y = C3E599ABADE1D5C1AD73F0735B3246BFAD4391EDAFE713C823C2130076BA514105BB87B7C5B941F3FF6845C1E0FA3ED4
3,324,980 UART: [art] SIG.R = 33B337D266605411F6470F09B078A0BC2257706FDDF2C238B39FA0940C1D0938BE6F1F2D6AD6CF1B6503616CBB983E17
3,331,737 UART: [art] SIG.S = 4977298DFCC3A0B938EE815B4DC3239C0E7A50FCDB3C70B05CB87CC81F4D29C9A233CC041A24149F8A44AC49E573E6B0
3,355,717 UART: Caliptra RT
3,355,968 UART: [state] CFI Enabled
3,475,897 UART: [rt] RT listening for mailbox commands...
3,476,567 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,735 UART: [rt]cmd =0x44504543, len=24
3,533,661 >>> mbox cmd response data (40 bytes)
3,533,662 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,563,125 UART: [rt]cmd =0x44504543, len=24
3,590,202 >>> mbox cmd response data (40 bytes)
3,590,203 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,619,822 UART: [rt]cmd =0x44504543, len=24
3,647,414 >>> mbox cmd response data (40 bytes)
3,647,415 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,676,932 UART: [rt]cmd =0x44504543, len=24
3,704,495 >>> mbox cmd response data (40 bytes)
3,704,496 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,733,977 UART: [rt]cmd =0x44504543, len=24
3,761,525 >>> mbox cmd response data (40 bytes)
3,761,526 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,135 UART: [rt]cmd =0x44504543, len=24
3,818,706 >>> mbox cmd response data (40 bytes)
3,818,707 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,220 UART: [rt]cmd =0x44504543, len=24
3,875,664 >>> mbox cmd response data (40 bytes)
3,875,665 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,905,022 UART: [rt]cmd =0x44504543, len=24
3,933,091 >>> mbox cmd response data (40 bytes)
3,933,092 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,962,601 UART: [rt]cmd =0x44504543, len=24
3,990,241 >>> mbox cmd response data (40 bytes)
3,990,242 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,877 UART: [rt]cmd =0x44504543, len=24
4,047,758 >>> mbox cmd response data (40 bytes)
4,047,759 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,077,450 UART: [rt]cmd =0x44504543, len=24
4,104,608 >>> mbox cmd response data (40 bytes)
4,104,609 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,134,192 UART: [rt]cmd =0x44504543, len=24
4,161,631 >>> mbox cmd response data (40 bytes)
4,161,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,191,319 UART: [rt]cmd =0x44504543, len=24
4,219,225 >>> mbox cmd response data (40 bytes)
4,219,226 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,248,491 UART: [rt]cmd =0x44504543, len=24
4,275,714 >>> mbox cmd response data (40 bytes)
4,275,715 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,305,296 UART: [rt]cmd =0x44504543, len=24
4,312,470 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,476 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,068 UART: [kat] SHA2-256
881,999 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,114 UART: [kat] ++
886,266 UART: [kat] sha1
890,408 UART: [kat] SHA2-256
892,346 UART: [kat] SHA2-384
895,097 UART: [kat] SHA2-512-ACC
896,998 UART: [kat] ECC-384
902,457 UART: [kat] HMAC-384Kdf
907,199 UART: [kat] LMS
1,475,395 UART: [kat] --
1,476,102 UART: [cold-reset] ++
1,476,644 UART: [fht] Storing FHT @ 0x50003400
1,479,361 UART: [idev] ++
1,479,529 UART: [idev] CDI.KEYID = 6
1,479,889 UART: [idev] SUBJECT.KEYID = 7
1,480,313 UART: [idev] UDS.KEYID = 0
1,480,658 ready_for_fw is high
1,480,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,153 UART: [idev] Erasing UDS.KEYID = 0
1,504,809 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,567 UART: [idev] --
1,514,632 UART: [ldev] ++
1,514,800 UART: [ldev] CDI.KEYID = 6
1,515,163 UART: [ldev] SUBJECT.KEYID = 5
1,515,589 UART: [ldev] AUTHORITY.KEYID = 7
1,516,052 UART: [ldev] FE.KEYID = 1
1,521,612 UART: [ldev] Erasing FE.KEYID = 1
1,546,985 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,743 UART: [ldev] --
1,586,056 UART: [fwproc] Waiting for Commands...
1,586,881 UART: [fwproc] Received command 0x46574c44
1,587,672 UART: [fwproc] Received Image of size 118548 bytes
2,932,364 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,790 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,281 >>> mbox cmd response: success
3,132,289 UART: [afmc] ++
3,132,457 UART: [afmc] CDI.KEYID = 6
3,132,819 UART: [afmc] SUBJECT.KEYID = 7
3,133,244 UART: [afmc] AUTHORITY.KEYID = 5
3,168,219 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,169 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,949 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,658 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,541 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,224 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,910 UART: [afmc] --
3,210,824 UART: [cold-reset] --
3,211,614 UART: [state] Locking Datavault
3,212,645 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,249 UART: [state] Locking ICCM
3,213,839 UART: [exit] Launching FMC @ 0x40000130
3,219,169 UART:
3,219,185 UART: Running Caliptra FMC ...
3,219,593 UART:
3,219,736 UART: [state] CFI Enabled
3,230,428 UART: [fht] FMC Alias Private Key: 7
3,349,544 UART: [art] Extend RT PCRs Done
3,349,972 UART: [art] Lock RT PCRs Done
3,351,366 UART: [art] Populate DV Done
3,359,283 UART: [fht] FMC Alias Private Key: 7
3,360,291 UART: [art] Derive CDI
3,360,571 UART: [art] Store in slot 0x4
3,446,279 UART: [art] Derive Key Pair
3,446,639 UART: [art] Store priv key in slot 0x5
3,460,096 UART: [art] Derive Key Pair - Done
3,474,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,828 UART: [art] PUB.X = 6A5FBE4340304C83341AC2A8CA3D20637605880602DD17C27A4F4DB0FFDCCE3F22E58B17303FD2080CC8B5AE5531252E
3,497,591 UART: [art] PUB.Y = 2CFB03A13A6FA994FA1A5FD6C4968E3D809A066A4EFE337A528D10DE0DEC9272C6167EF1E43DF31474CB9B21A8E5DA94
3,504,550 UART: [art] SIG.R = 8101A5BEBD54217371F27C7EC79EFDF517036E3B134680A5C008D11221C636E6FF30E9F562224B51FDFA99479E0A5C07
3,511,307 UART: [art] SIG.S = B7FE916B1EF8332C82C361D446CC18E717123D203527786B6E878A9A5860E855DE683E68E2C69FE68D9D79C283943406
3,535,170 UART: Caliptra RT
3,535,513 UART: [state] CFI Enabled
3,655,882 UART: [rt] RT listening for mailbox commands...
3,656,552 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,618 UART: [rt]cmd =0x44504543, len=24
3,714,322 >>> mbox cmd response data (40 bytes)
3,714,323 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,743,660 UART: [rt]cmd =0x44504543, len=24
3,771,337 >>> mbox cmd response data (40 bytes)
3,771,338 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,800,923 UART: [rt]cmd =0x44504543, len=24
3,828,395 >>> mbox cmd response data (40 bytes)
3,828,396 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,857,829 UART: [rt]cmd =0x44504543, len=24
3,885,774 >>> mbox cmd response data (40 bytes)
3,885,775 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,180 UART: [rt]cmd =0x44504543, len=24
3,942,762 >>> mbox cmd response data (40 bytes)
3,942,763 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,972,210 UART: [rt]cmd =0x44504543, len=24
3,999,469 >>> mbox cmd response data (40 bytes)
3,999,470 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,001 UART: [rt]cmd =0x44504543, len=24
4,056,953 >>> mbox cmd response data (40 bytes)
4,056,954 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,086,345 UART: [rt]cmd =0x44504543, len=24
4,113,612 >>> mbox cmd response data (40 bytes)
4,113,613 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,143,014 UART: [rt]cmd =0x44504543, len=24
4,171,340 >>> mbox cmd response data (40 bytes)
4,171,341 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,200,874 UART: [rt]cmd =0x44504543, len=24
4,228,905 >>> mbox cmd response data (40 bytes)
4,228,906 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,258,317 UART: [rt]cmd =0x44504543, len=24
4,286,191 >>> mbox cmd response data (40 bytes)
4,286,192 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,315,777 UART: [rt]cmd =0x44504543, len=24
4,343,428 >>> mbox cmd response data (40 bytes)
4,343,429 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,372,958 UART: [rt]cmd =0x44504543, len=24
4,400,378 >>> mbox cmd response data (40 bytes)
4,400,379 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,429,902 UART: [rt]cmd =0x44504543, len=24
4,457,419 >>> mbox cmd response data (40 bytes)
4,457,420 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,486,597 UART: [rt]cmd =0x44504543, len=24
4,494,307 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,372 ready_for_fw is high
1,363,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,103 >>> mbox cmd response: success
3,042,596 UART:
3,042,612 UART: Running Caliptra FMC ...
3,043,020 UART:
3,043,163 UART: [state] CFI Enabled
3,053,829 UART: [fht] FMC Alias Private Key: 7
3,172,651 UART: [art] Extend RT PCRs Done
3,173,079 UART: [art] Lock RT PCRs Done
3,174,589 UART: [art] Populate DV Done
3,182,830 UART: [fht] FMC Alias Private Key: 7
3,183,864 UART: [art] Derive CDI
3,184,144 UART: [art] Store in slot 0x4
3,269,816 UART: [art] Derive Key Pair
3,270,176 UART: [art] Store priv key in slot 0x5
3,283,913 UART: [art] Derive Key Pair - Done
3,298,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,812 UART: [art] PUB.X = CE0A6A55F325D7A61E3544B9CAA127424266EAEC4BBBD155CA0457A574BD41FFB9E4400DEF6A0B1D2774DD62B1EB19B9
3,321,590 UART: [art] PUB.Y = 09DC9BF628A15C722EF84B7923E3EE7AE8365B779AFF115E3D2D60B346D9FCB2C5A7C576A806ED8D40A111DCC8715FA7
3,328,550 UART: [art] SIG.R = F85A1188267B9E287EAEDC7B6FF9542A20FBEFD241044FC38391ACC712F09A20FBF4A18A1CCB50F8C76B2E3C82E0C4D2
3,335,337 UART: [art] SIG.S = 1DC2C07A9DAC85E7BE1E1128221D681FBF9A09D3A8BC2719F0A86931B107841ACD2AE17D5BECF7538568C887ED5CBBF4
3,359,039 UART: Caliptra RT
3,359,382 UART: [state] CFI Enabled
3,479,888 UART: [rt] RT listening for mailbox commands...
3,480,558 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,674 UART: [rt]cmd =0x44504543, len=24
3,537,722 >>> mbox cmd response data (40 bytes)
3,537,723 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,567,144 UART: [rt]cmd =0x44504543, len=24
3,594,427 >>> mbox cmd response data (40 bytes)
3,594,428 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,623,827 UART: [rt]cmd =0x44504543, len=24
3,651,431 >>> mbox cmd response data (40 bytes)
3,651,432 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,681,147 UART: [rt]cmd =0x44504543, len=24
3,709,024 >>> mbox cmd response data (40 bytes)
3,709,025 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,656 UART: [rt]cmd =0x44504543, len=24
3,766,600 >>> mbox cmd response data (40 bytes)
3,766,601 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,796,058 UART: [rt]cmd =0x44504543, len=24
3,824,059 >>> mbox cmd response data (40 bytes)
3,824,060 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,527 UART: [rt]cmd =0x44504543, len=24
3,880,747 >>> mbox cmd response data (40 bytes)
3,880,748 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,159 UART: [rt]cmd =0x44504543, len=24
3,937,908 >>> mbox cmd response data (40 bytes)
3,937,909 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,967,304 UART: [rt]cmd =0x44504543, len=24
3,994,646 >>> mbox cmd response data (40 bytes)
3,994,647 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,202 UART: [rt]cmd =0x44504543, len=24
4,051,793 >>> mbox cmd response data (40 bytes)
4,051,794 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,081,257 UART: [rt]cmd =0x44504543, len=24
4,108,881 >>> mbox cmd response data (40 bytes)
4,108,882 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,138,147 UART: [rt]cmd =0x44504543, len=24
4,166,136 >>> mbox cmd response data (40 bytes)
4,166,137 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,195,624 UART: [rt]cmd =0x44504543, len=24
4,223,058 >>> mbox cmd response data (40 bytes)
4,223,059 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,252,450 UART: [rt]cmd =0x44504543, len=24
4,280,235 >>> mbox cmd response data (40 bytes)
4,280,236 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,309,955 UART: [rt]cmd =0x44504543, len=24
4,317,465 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
891,504 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
900,136 UART: [kat] SHA2-256
902,076 UART: [kat] SHA2-384
904,919 UART: [kat] SHA2-512-ACC
906,820 UART: [kat] ECC-384
916,745 UART: [kat] HMAC-384Kdf
921,303 UART: [kat] LMS
1,169,615 UART: [kat] --
1,170,748 UART: [cold-reset] ++
1,171,148 UART: [fht] FHT @ 0x50003400
1,173,632 UART: [idev] ++
1,173,800 UART: [idev] CDI.KEYID = 6
1,174,161 UART: [idev] SUBJECT.KEYID = 7
1,174,586 UART: [idev] UDS.KEYID = 0
1,174,932 ready_for_fw is high
1,174,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,379 UART: [idev] Erasing UDS.KEYID = 0
1,199,373 UART: [idev] Sha1 KeyId Algorithm
1,208,239 UART: [idev] --
1,209,164 UART: [ldev] ++
1,209,332 UART: [ldev] CDI.KEYID = 6
1,209,696 UART: [ldev] SUBJECT.KEYID = 5
1,210,123 UART: [ldev] AUTHORITY.KEYID = 7
1,210,586 UART: [ldev] FE.KEYID = 1
1,215,738 UART: [ldev] Erasing FE.KEYID = 1
1,242,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,964 UART: [ldev] --
1,281,189 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,705 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,435 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,610 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,915 >>> mbox cmd response: success
2,827,175 UART: [afmc] ++
2,827,343 UART: [afmc] CDI.KEYID = 6
2,827,706 UART: [afmc] SUBJECT.KEYID = 7
2,828,132 UART: [afmc] AUTHORITY.KEYID = 5
2,863,705 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,839 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,549 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,430 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,131 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,922 UART: [afmc] --
2,906,879 UART: [cold-reset] --
2,907,843 UART: [state] Locking Datavault
2,909,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,810 UART: [state] Locking ICCM
2,910,460 UART: [exit] Launching FMC @ 0x40000130
2,915,790 UART:
2,915,806 UART: Running Caliptra FMC ...
2,916,214 UART:
2,916,268 UART: [state] CFI Enabled
2,927,170 UART: [fht] FMC Alias Private Key: 7
3,045,992 UART: [art] Extend RT PCRs Done
3,046,420 UART: [art] Lock RT PCRs Done
3,047,928 UART: [art] Populate DV Done
3,056,339 UART: [fht] FMC Alias Private Key: 7
3,057,283 UART: [art] Derive CDI
3,057,563 UART: [art] Store in slot 0x4
3,143,260 UART: [art] Derive Key Pair
3,143,620 UART: [art] Store priv key in slot 0x5
3,156,714 UART: [art] Derive Key Pair - Done
3,171,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,943 UART: [art] PUB.X = 1C2A3C8C89B4023D587229731DAA80E1E1644DEDF71053B8359CBACF44D3940B8F28BB15B5540A83EFB8738EA296C52B
3,194,712 UART: [art] PUB.Y = DC495349A5A3E8E5821877093A1AC82A0CE2E0F50534F9459B19178D8B93642D76A00A877E626E2749FFBE27C22B3361
3,201,646 UART: [art] SIG.R = ADE32B1C28205C9CEB186809FC0BB274D019495612F8EFD5C3FD773C5085D95E2244C014E4B02816BA4279B054D508B1
3,208,409 UART: [art] SIG.S = 83A50605023EBEB2C59AEDC0F73B3057D2333CB3CD50B5C53B8B1EBDC2DFCC438C8B34D73DFF6839F2E2308A26BA60B0
3,232,212 UART: Caliptra RT
3,232,463 UART: [state] CFI Enabled
3,352,503 UART: [rt] RT listening for mailbox commands...
3,353,173 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,135 UART: [rt]cmd =0x44504543, len=24
3,411,067 >>> mbox cmd response data (40 bytes)
3,411,068 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,283 UART: [rt]cmd =0x44504543, len=24
3,467,886 >>> mbox cmd response data (40 bytes)
3,467,887 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,497,146 UART: [rt]cmd =0x44504543, len=24
3,524,622 >>> mbox cmd response data (40 bytes)
3,524,623 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,118 UART: [rt]cmd =0x44504543, len=24
3,581,807 >>> mbox cmd response data (40 bytes)
3,581,808 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,567 UART: [rt]cmd =0x44504543, len=24
3,639,681 >>> mbox cmd response data (40 bytes)
3,639,682 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,669,283 UART: [rt]cmd =0x44504543, len=24
3,696,854 >>> mbox cmd response data (40 bytes)
3,696,855 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,408 UART: [rt]cmd =0x44504543, len=24
3,753,948 >>> mbox cmd response data (40 bytes)
3,753,949 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,698 UART: [rt]cmd =0x44504543, len=24
3,811,471 >>> mbox cmd response data (40 bytes)
3,811,472 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,021 UART: [rt]cmd =0x44504543, len=24
3,868,457 >>> mbox cmd response data (40 bytes)
3,868,458 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,898,075 UART: [rt]cmd =0x44504543, len=24
3,925,686 >>> mbox cmd response data (40 bytes)
3,925,687 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,955,162 UART: [rt]cmd =0x44504543, len=24
3,982,926 >>> mbox cmd response data (40 bytes)
3,982,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,522 UART: [rt]cmd =0x44504543, len=24
4,040,249 >>> mbox cmd response data (40 bytes)
4,040,250 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,069,609 UART: [rt]cmd =0x44504543, len=24
4,097,077 >>> mbox cmd response data (40 bytes)
4,097,078 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,126,713 UART: [rt]cmd =0x44504543, len=24
4,154,636 >>> mbox cmd response data (40 bytes)
4,154,637 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,183,994 UART: [rt]cmd =0x44504543, len=24
4,191,432 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,850 ready_for_fw is high
1,058,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,032 >>> mbox cmd response: success
2,739,935 UART:
2,739,951 UART: Running Caliptra FMC ...
2,740,359 UART:
2,740,413 UART: [state] CFI Enabled
2,750,789 UART: [fht] FMC Alias Private Key: 7
2,870,537 UART: [art] Extend RT PCRs Done
2,870,965 UART: [art] Lock RT PCRs Done
2,872,529 UART: [art] Populate DV Done
2,880,776 UART: [fht] FMC Alias Private Key: 7
2,881,746 UART: [art] Derive CDI
2,882,026 UART: [art] Store in slot 0x4
2,967,847 UART: [art] Derive Key Pair
2,968,207 UART: [art] Store priv key in slot 0x5
2,981,105 UART: [art] Derive Key Pair - Done
2,995,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,731 UART: [art] PUB.X = AF661C89A96572D83A2FF079113516AE3C41AF2CE6801C1F407E6D0948A16C2305751F0273AC49D1D29C8560FF9FFD5C
3,018,496 UART: [art] PUB.Y = 65B106C86F4EB776C35702FCD01916E920A8F4BCB82669E852AF6AB9E5AF136C0BFFE4EA3264005066D5556C9699A80C
3,025,418 UART: [art] SIG.R = A323FB49DE2E74782CAAAC01F90A3E402F22241A269D2BE3964D657164CF408E33492AF38495D8347D08C30FCCBE10E7
3,032,182 UART: [art] SIG.S = 90FDF781DA8C84902653F2B424AE362331A9A643A0EE987EBDE541784C25A227A09F6CC9E2AC235C21692C33F933229A
3,055,440 UART: Caliptra RT
3,055,691 UART: [state] CFI Enabled
3,175,535 UART: [rt] RT listening for mailbox commands...
3,176,205 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,947 UART: [rt]cmd =0x44504543, len=24
3,233,309 >>> mbox cmd response data (40 bytes)
3,233,310 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,262,641 UART: [rt]cmd =0x44504543, len=24
3,289,892 >>> mbox cmd response data (40 bytes)
3,289,893 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,319,280 UART: [rt]cmd =0x44504543, len=24
3,347,604 >>> mbox cmd response data (40 bytes)
3,347,605 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,377,098 UART: [rt]cmd =0x44504543, len=24
3,404,869 >>> mbox cmd response data (40 bytes)
3,404,870 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,263 UART: [rt]cmd =0x44504543, len=24
3,461,801 >>> mbox cmd response data (40 bytes)
3,461,802 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,491,505 UART: [rt]cmd =0x44504543, len=24
3,518,556 >>> mbox cmd response data (40 bytes)
3,518,557 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,110 UART: [rt]cmd =0x44504543, len=24
3,575,886 >>> mbox cmd response data (40 bytes)
3,575,887 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,342 UART: [rt]cmd =0x44504543, len=24
3,632,903 >>> mbox cmd response data (40 bytes)
3,632,904 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,457 UART: [rt]cmd =0x44504543, len=24
3,689,653 >>> mbox cmd response data (40 bytes)
3,689,654 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,131 UART: [rt]cmd =0x44504543, len=24
3,746,574 >>> mbox cmd response data (40 bytes)
3,746,575 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,776,110 UART: [rt]cmd =0x44504543, len=24
3,803,832 >>> mbox cmd response data (40 bytes)
3,803,833 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,833,490 UART: [rt]cmd =0x44504543, len=24
3,861,447 >>> mbox cmd response data (40 bytes)
3,861,448 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,099 UART: [rt]cmd =0x44504543, len=24
3,918,591 >>> mbox cmd response data (40 bytes)
3,918,592 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,137 UART: [rt]cmd =0x44504543, len=24
3,975,774 >>> mbox cmd response data (40 bytes)
3,975,775 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,005,236 UART: [rt]cmd =0x44504543, len=24
4,012,434 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,380 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
891,141 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,386 UART: [kat] SHA2-512-ACC
906,287 UART: [kat] ECC-384
916,500 UART: [kat] HMAC-384Kdf
921,276 UART: [kat] LMS
1,169,588 UART: [kat] --
1,170,657 UART: [cold-reset] ++
1,171,185 UART: [fht] FHT @ 0x50003400
1,173,775 UART: [idev] ++
1,173,943 UART: [idev] CDI.KEYID = 6
1,174,304 UART: [idev] SUBJECT.KEYID = 7
1,174,729 UART: [idev] UDS.KEYID = 0
1,175,075 ready_for_fw is high
1,175,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,738 UART: [idev] Erasing UDS.KEYID = 0
1,199,432 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,265 UART: [ldev] ++
1,209,433 UART: [ldev] CDI.KEYID = 6
1,209,797 UART: [ldev] SUBJECT.KEYID = 5
1,210,224 UART: [ldev] AUTHORITY.KEYID = 7
1,210,687 UART: [ldev] FE.KEYID = 1
1,216,015 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,379 UART: [ldev] --
1,281,662 UART: [fwproc] Wait for Commands...
1,282,381 UART: [fwproc] Recv command 0x46574c44
1,283,114 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,238 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,413 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,712 >>> mbox cmd response: success
2,827,842 UART: [afmc] ++
2,828,010 UART: [afmc] CDI.KEYID = 6
2,828,373 UART: [afmc] SUBJECT.KEYID = 7
2,828,799 UART: [afmc] AUTHORITY.KEYID = 5
2,864,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,574 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,284 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,165 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,866 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,797 UART: [afmc] --
2,907,704 UART: [cold-reset] --
2,908,690 UART: [state] Locking Datavault
2,909,743 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,347 UART: [state] Locking ICCM
2,910,851 UART: [exit] Launching FMC @ 0x40000130
2,916,181 UART:
2,916,197 UART: Running Caliptra FMC ...
2,916,605 UART:
2,916,748 UART: [state] CFI Enabled
2,927,494 UART: [fht] FMC Alias Private Key: 7
3,046,622 UART: [art] Extend RT PCRs Done
3,047,050 UART: [art] Lock RT PCRs Done
3,048,570 UART: [art] Populate DV Done
3,056,727 UART: [fht] FMC Alias Private Key: 7
3,057,871 UART: [art] Derive CDI
3,058,151 UART: [art] Store in slot 0x4
3,144,064 UART: [art] Derive Key Pair
3,144,424 UART: [art] Store priv key in slot 0x5
3,157,572 UART: [art] Derive Key Pair - Done
3,172,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,327 UART: [art] PUB.X = 20711C4F7C550EB503F6C5EDA1E6DF531BE4182FEF47669E3F4D876DE8A2841AAFF4E579E5ED1BFA7241552A8BC6E560
3,195,107 UART: [art] PUB.Y = D9FE508F5EE1F91B4BD701C373966D7AA284D8B479D1A50312717042DF963B6BE2CFF178439C6B931AFF6018BFFE3E67
3,202,061 UART: [art] SIG.R = 242DB8168AA6D88FB1BDB8C4AD2E2E681B530A4EAE39ED65165A442817F5CAFCC8E093957C015BBE1F7C2937985CEA50
3,208,841 UART: [art] SIG.S = D11F02E14BB16A055A16FB5B7AF211CC9FCE0267841E61A052B1AC973323E9A62BA2F099BEE9C4729E4C44DEC3809E19
3,232,854 UART: Caliptra RT
3,233,197 UART: [state] CFI Enabled
3,352,102 UART: [rt] RT listening for mailbox commands...
3,352,772 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,564 UART: [rt]cmd =0x44504543, len=24
3,410,186 >>> mbox cmd response data (40 bytes)
3,410,187 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,484 UART: [rt]cmd =0x44504543, len=24
3,466,753 >>> mbox cmd response data (40 bytes)
3,466,754 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,496,219 UART: [rt]cmd =0x44504543, len=24
3,524,087 >>> mbox cmd response data (40 bytes)
3,524,088 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,701 UART: [rt]cmd =0x44504543, len=24
3,581,370 >>> mbox cmd response data (40 bytes)
3,581,371 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,792 UART: [rt]cmd =0x44504543, len=24
3,638,584 >>> mbox cmd response data (40 bytes)
3,638,585 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,186 UART: [rt]cmd =0x44504543, len=24
3,695,623 >>> mbox cmd response data (40 bytes)
3,695,624 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,253 UART: [rt]cmd =0x44504543, len=24
3,753,069 >>> mbox cmd response data (40 bytes)
3,753,070 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,425 UART: [rt]cmd =0x44504543, len=24
3,809,744 >>> mbox cmd response data (40 bytes)
3,809,745 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,172 UART: [rt]cmd =0x44504543, len=24
3,867,088 >>> mbox cmd response data (40 bytes)
3,867,089 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,896,628 UART: [rt]cmd =0x44504543, len=24
3,923,669 >>> mbox cmd response data (40 bytes)
3,923,670 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,953,183 UART: [rt]cmd =0x44504543, len=24
3,980,829 >>> mbox cmd response data (40 bytes)
3,980,830 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,395 UART: [rt]cmd =0x44504543, len=24
4,037,924 >>> mbox cmd response data (40 bytes)
4,037,925 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,067,452 UART: [rt]cmd =0x44504543, len=24
4,094,726 >>> mbox cmd response data (40 bytes)
4,094,727 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,014 UART: [rt]cmd =0x44504543, len=24
4,152,165 >>> mbox cmd response data (40 bytes)
4,152,166 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,181,649 UART: [rt]cmd =0x44504543, len=24
4,189,357 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,845 ready_for_fw is high
1,058,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,473 >>> mbox cmd response: success
2,739,764 UART:
2,739,780 UART: Running Caliptra FMC ...
2,740,188 UART:
2,740,331 UART: [state] CFI Enabled
2,750,721 UART: [fht] FMC Alias Private Key: 7
2,869,663 UART: [art] Extend RT PCRs Done
2,870,091 UART: [art] Lock RT PCRs Done
2,872,121 UART: [art] Populate DV Done
2,880,400 UART: [fht] FMC Alias Private Key: 7
2,881,372 UART: [art] Derive CDI
2,881,652 UART: [art] Store in slot 0x4
2,967,629 UART: [art] Derive Key Pair
2,967,989 UART: [art] Store priv key in slot 0x5
2,981,635 UART: [art] Derive Key Pair - Done
2,996,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,922 UART: [art] PUB.X = 283F395A5EBAE8C956DB11CC5692F42E0AAE4DBEC943BDF1834A52BFB0419640293F29CCD40F65BFDDE55D01D5E1ABB7
3,019,707 UART: [art] PUB.Y = CA151660639F1A1A0B3F901EC80E02785F480A7EC27A1E03135612E88BEC9BA127493F42DC18E69C4032B9115762CAF5
3,026,642 UART: [art] SIG.R = 746C259D42E8EBE3EFDD78A56A7428D3D1C3B3BC289B2D4B002DA2A4C164AF7931DD450054039D6CF42656E1505635C1
3,033,371 UART: [art] SIG.S = FC7AECC9156BB8B0C7C4D9D1BC0B0A22B843960D7F0A5AF8B039AF485A30362F4F49B233830AAC1AB85D9B9AB918B1B1
3,057,022 UART: Caliptra RT
3,057,365 UART: [state] CFI Enabled
3,178,702 UART: [rt] RT listening for mailbox commands...
3,179,372 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,250 UART: [rt]cmd =0x44504543, len=24
3,237,056 >>> mbox cmd response data (40 bytes)
3,237,057 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,284 UART: [rt]cmd =0x44504543, len=24
3,293,661 >>> mbox cmd response data (40 bytes)
3,293,662 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,323,175 UART: [rt]cmd =0x44504543, len=24
3,351,019 >>> mbox cmd response data (40 bytes)
3,351,020 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,539 UART: [rt]cmd =0x44504543, len=24
3,408,172 >>> mbox cmd response data (40 bytes)
3,408,173 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,512 UART: [rt]cmd =0x44504543, len=24
3,464,816 >>> mbox cmd response data (40 bytes)
3,464,817 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,494,012 UART: [rt]cmd =0x44504543, len=24
3,521,645 >>> mbox cmd response data (40 bytes)
3,521,646 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,551,459 UART: [rt]cmd =0x44504543, len=24
3,579,449 >>> mbox cmd response data (40 bytes)
3,579,450 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,608,939 UART: [rt]cmd =0x44504543, len=24
3,636,634 >>> mbox cmd response data (40 bytes)
3,636,635 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,665,936 UART: [rt]cmd =0x44504543, len=24
3,693,592 >>> mbox cmd response data (40 bytes)
3,693,593 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,988 UART: [rt]cmd =0x44504543, len=24
3,750,645 >>> mbox cmd response data (40 bytes)
3,750,646 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,201 UART: [rt]cmd =0x44504543, len=24
3,807,377 >>> mbox cmd response data (40 bytes)
3,807,378 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,861 UART: [rt]cmd =0x44504543, len=24
3,864,450 >>> mbox cmd response data (40 bytes)
3,864,451 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,908 UART: [rt]cmd =0x44504543, len=24
3,921,478 >>> mbox cmd response data (40 bytes)
3,921,479 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,850 UART: [rt]cmd =0x44504543, len=24
3,978,355 >>> mbox cmd response data (40 bytes)
3,978,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,735 UART: [rt]cmd =0x44504543, len=24
4,015,043 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,548 UART: [state] LifecycleState = Unprovisioned
86,203 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
893,492 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,617 UART: [kat] ++
897,769 UART: [kat] sha1
902,051 UART: [kat] SHA2-256
903,991 UART: [kat] SHA2-384
906,858 UART: [kat] SHA2-512-ACC
908,759 UART: [kat] ECC-384
918,578 UART: [kat] HMAC-384Kdf
923,192 UART: [kat] LMS
1,171,520 UART: [kat] --
1,172,809 UART: [cold-reset] ++
1,173,333 UART: [fht] FHT @ 0x50003400
1,175,904 UART: [idev] ++
1,176,072 UART: [idev] CDI.KEYID = 6
1,176,432 UART: [idev] SUBJECT.KEYID = 7
1,176,856 UART: [idev] UDS.KEYID = 0
1,177,201 ready_for_fw is high
1,177,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,374 UART: [idev] Erasing UDS.KEYID = 0
1,201,673 UART: [idev] Sha1 KeyId Algorithm
1,210,165 UART: [idev] --
1,211,067 UART: [ldev] ++
1,211,235 UART: [ldev] CDI.KEYID = 6
1,211,598 UART: [ldev] SUBJECT.KEYID = 5
1,212,024 UART: [ldev] AUTHORITY.KEYID = 7
1,212,487 UART: [ldev] FE.KEYID = 1
1,217,673 UART: [ldev] Erasing FE.KEYID = 1
1,243,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,293 UART: [ldev] --
1,282,602 UART: [fwproc] Wait for Commands...
1,283,182 UART: [fwproc] Recv command 0x46574c44
1,283,910 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,312 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,482 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,805 >>> mbox cmd response: success
2,828,063 UART: [afmc] ++
2,828,231 UART: [afmc] CDI.KEYID = 6
2,828,593 UART: [afmc] SUBJECT.KEYID = 7
2,829,018 UART: [afmc] AUTHORITY.KEYID = 5
2,864,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,548 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,257 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,140 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,841 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,743 UART: [afmc] --
2,907,681 UART: [cold-reset] --
2,908,573 UART: [state] Locking Datavault
2,909,708 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,312 UART: [state] Locking ICCM
2,910,864 UART: [exit] Launching FMC @ 0x40000130
2,916,194 UART:
2,916,210 UART: Running Caliptra FMC ...
2,916,618 UART:
2,916,672 UART: [state] CFI Enabled
2,927,226 UART: [fht] FMC Alias Private Key: 7
3,046,564 UART: [art] Extend RT PCRs Done
3,046,992 UART: [art] Lock RT PCRs Done
3,048,378 UART: [art] Populate DV Done
3,056,661 UART: [fht] FMC Alias Private Key: 7
3,057,745 UART: [art] Derive CDI
3,058,025 UART: [art] Store in slot 0x4
3,143,600 UART: [art] Derive Key Pair
3,143,960 UART: [art] Store priv key in slot 0x5
3,157,072 UART: [art] Derive Key Pair - Done
3,171,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,735 UART: [art] PUB.X = 7F5810D1B0C820C6C201A5E56F60B45C30D22FD090122B4EC734D2E3CF018E9B6463AE4C4914F74BF406C587276610F4
3,194,496 UART: [art] PUB.Y = 59D27526797D2CADD19E0E49009CB6310F272E7C46EBDE406E1FB7E631CBD2D76135311F5D35E5E4D9EACC717E167459
3,201,426 UART: [art] SIG.R = 1B6A898200C59340309D1314E00161FAC5F27DCA19AA41A22F18F9453F9BD3A6A89DB8959345CA5AE5623EBE5B943A1A
3,208,177 UART: [art] SIG.S = 70D9FAECE7C8C4A9C66788446712A0979B83DC6D5A493C9CFAC830D289139678F31C7E4FD5DFCC7796679EDE6DC6C525
3,232,045 UART: Caliptra RT
3,232,296 UART: [state] CFI Enabled
3,352,014 UART: [rt] RT listening for mailbox commands...
3,352,684 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,306 UART: [rt]cmd =0x44504543, len=24
3,409,812 >>> mbox cmd response data (40 bytes)
3,409,813 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,178 UART: [rt]cmd =0x44504543, len=24
3,467,157 >>> mbox cmd response data (40 bytes)
3,467,158 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,496,721 UART: [rt]cmd =0x44504543, len=24
3,524,355 >>> mbox cmd response data (40 bytes)
3,524,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,819 UART: [rt]cmd =0x44504543, len=24
3,581,158 >>> mbox cmd response data (40 bytes)
3,581,159 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,784 UART: [rt]cmd =0x44504543, len=24
3,638,230 >>> mbox cmd response data (40 bytes)
3,638,231 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,724 UART: [rt]cmd =0x44504543, len=24
3,695,133 >>> mbox cmd response data (40 bytes)
3,695,134 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,724,717 UART: [rt]cmd =0x44504543, len=24
3,752,159 >>> mbox cmd response data (40 bytes)
3,752,160 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,501 UART: [rt]cmd =0x44504543, len=24
3,808,870 >>> mbox cmd response data (40 bytes)
3,808,871 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,242 UART: [rt]cmd =0x44504543, len=24
3,865,594 >>> mbox cmd response data (40 bytes)
3,865,595 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,894,990 UART: [rt]cmd =0x44504543, len=24
3,922,911 >>> mbox cmd response data (40 bytes)
3,922,912 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,567 UART: [rt]cmd =0x44504543, len=24
3,980,319 >>> mbox cmd response data (40 bytes)
3,980,320 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,583 UART: [rt]cmd =0x44504543, len=24
4,037,382 >>> mbox cmd response data (40 bytes)
4,037,383 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,067,102 UART: [rt]cmd =0x44504543, len=24
4,094,766 >>> mbox cmd response data (40 bytes)
4,094,767 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,120 UART: [rt]cmd =0x44504543, len=24
4,151,679 >>> mbox cmd response data (40 bytes)
4,151,680 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,181,049 UART: [rt]cmd =0x44504543, len=24
4,188,509 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,679 ready_for_fw is high
1,059,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,192 >>> mbox cmd response: success
2,740,511 UART:
2,740,527 UART: Running Caliptra FMC ...
2,740,935 UART:
2,740,989 UART: [state] CFI Enabled
2,751,743 UART: [fht] FMC Alias Private Key: 7
2,870,019 UART: [art] Extend RT PCRs Done
2,870,447 UART: [art] Lock RT PCRs Done
2,872,067 UART: [art] Populate DV Done
2,880,418 UART: [fht] FMC Alias Private Key: 7
2,881,532 UART: [art] Derive CDI
2,881,812 UART: [art] Store in slot 0x4
2,967,769 UART: [art] Derive Key Pair
2,968,129 UART: [art] Store priv key in slot 0x5
2,981,875 UART: [art] Derive Key Pair - Done
2,996,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,731 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,496 UART: [art] PUB.X = 0024200DEE573CBBF0AE43CD0992A129A8A22ED1097B2B431BA27AB5693447456841A1108F0855F191F98AAA1DCB8AA6
3,019,238 UART: [art] PUB.Y = 8E5C3907B6CB3903D119472917A70D6C0F29BE60F60BDC92A040B8F863B4BCC0632C60F5C47F631F385682F5E42AD182
3,026,175 UART: [art] SIG.R = ED8977FE3E2790327CF578A20EB8A1408EF4E03A22A94F4878E8DAEF3335E05F05F62F362A521762AA673ED941C10BE9
3,032,942 UART: [art] SIG.S = 30E03AA2EFE2511CB29C7CD6FF22E2FCF20A29B85B49CD6F0169DFE7C1955ECDC42FA47209F9A2F31C886CEAE0600E25
3,056,332 UART: Caliptra RT
3,056,583 UART: [state] CFI Enabled
3,175,406 UART: [rt] RT listening for mailbox commands...
3,176,076 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,984 UART: [rt]cmd =0x44504543, len=24
3,234,034 >>> mbox cmd response data (40 bytes)
3,234,035 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,702 UART: [rt]cmd =0x44504543, len=24
3,291,435 >>> mbox cmd response data (40 bytes)
3,291,436 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,321,005 UART: [rt]cmd =0x44504543, len=24
3,348,729 >>> mbox cmd response data (40 bytes)
3,348,730 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,341 UART: [rt]cmd =0x44504543, len=24
3,405,832 >>> mbox cmd response data (40 bytes)
3,405,833 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,435,102 UART: [rt]cmd =0x44504543, len=24
3,462,912 >>> mbox cmd response data (40 bytes)
3,462,913 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,492,346 UART: [rt]cmd =0x44504543, len=24
3,519,437 >>> mbox cmd response data (40 bytes)
3,519,438 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,897 UART: [rt]cmd =0x44504543, len=24
3,576,181 >>> mbox cmd response data (40 bytes)
3,576,182 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,665 UART: [rt]cmd =0x44504543, len=24
3,633,224 >>> mbox cmd response data (40 bytes)
3,633,225 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,842 UART: [rt]cmd =0x44504543, len=24
3,690,892 >>> mbox cmd response data (40 bytes)
3,690,893 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,536 UART: [rt]cmd =0x44504543, len=24
3,748,013 >>> mbox cmd response data (40 bytes)
3,748,014 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,695 UART: [rt]cmd =0x44504543, len=24
3,805,443 >>> mbox cmd response data (40 bytes)
3,805,444 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,834,675 UART: [rt]cmd =0x44504543, len=24
3,861,906 >>> mbox cmd response data (40 bytes)
3,861,907 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,482 UART: [rt]cmd =0x44504543, len=24
3,918,916 >>> mbox cmd response data (40 bytes)
3,918,917 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,334 UART: [rt]cmd =0x44504543, len=24
3,975,971 >>> mbox cmd response data (40 bytes)
3,975,972 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,005,233 UART: [rt]cmd =0x44504543, len=24
4,012,799 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
893,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,762 UART: [kat] ++
897,914 UART: [kat] sha1
902,268 UART: [kat] SHA2-256
904,208 UART: [kat] SHA2-384
907,069 UART: [kat] SHA2-512-ACC
908,970 UART: [kat] ECC-384
918,841 UART: [kat] HMAC-384Kdf
923,527 UART: [kat] LMS
1,171,855 UART: [kat] --
1,172,950 UART: [cold-reset] ++
1,173,432 UART: [fht] FHT @ 0x50003400
1,176,127 UART: [idev] ++
1,176,295 UART: [idev] CDI.KEYID = 6
1,176,655 UART: [idev] SUBJECT.KEYID = 7
1,177,079 UART: [idev] UDS.KEYID = 0
1,177,424 ready_for_fw is high
1,177,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,165 UART: [idev] Erasing UDS.KEYID = 0
1,201,936 UART: [idev] Sha1 KeyId Algorithm
1,210,444 UART: [idev] --
1,211,416 UART: [ldev] ++
1,211,584 UART: [ldev] CDI.KEYID = 6
1,211,947 UART: [ldev] SUBJECT.KEYID = 5
1,212,373 UART: [ldev] AUTHORITY.KEYID = 7
1,212,836 UART: [ldev] FE.KEYID = 1
1,218,154 UART: [ldev] Erasing FE.KEYID = 1
1,244,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,962 UART: [ldev] --
1,283,297 UART: [fwproc] Wait for Commands...
1,283,979 UART: [fwproc] Recv command 0x46574c44
1,284,707 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,611 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,781 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,148 >>> mbox cmd response: success
2,828,384 UART: [afmc] ++
2,828,552 UART: [afmc] CDI.KEYID = 6
2,828,914 UART: [afmc] SUBJECT.KEYID = 7
2,829,339 UART: [afmc] AUTHORITY.KEYID = 5
2,864,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,321 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,030 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,913 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,614 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,408 UART: [afmc] --
2,908,390 UART: [cold-reset] --
2,909,218 UART: [state] Locking Datavault
2,910,497 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,101 UART: [state] Locking ICCM
2,911,535 UART: [exit] Launching FMC @ 0x40000130
2,916,865 UART:
2,916,881 UART: Running Caliptra FMC ...
2,917,289 UART:
2,917,432 UART: [state] CFI Enabled
2,927,992 UART: [fht] FMC Alias Private Key: 7
3,046,528 UART: [art] Extend RT PCRs Done
3,046,956 UART: [art] Lock RT PCRs Done
3,048,346 UART: [art] Populate DV Done
3,056,635 UART: [fht] FMC Alias Private Key: 7
3,057,709 UART: [art] Derive CDI
3,057,989 UART: [art] Store in slot 0x4
3,143,942 UART: [art] Derive Key Pair
3,144,302 UART: [art] Store priv key in slot 0x5
3,157,002 UART: [art] Derive Key Pair - Done
3,171,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,326 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,091 UART: [art] PUB.X = B1567CD180008EA4B71DC35A019FC94F35B70BE7D74D1E0E1A74C5170A776D8E0DFBDC36535D285AF20B7BFC49894346
3,194,831 UART: [art] PUB.Y = 72B0B3C83E683330D014D3EBD34779727F7F5B9CE40B692004363BC3BF14648FC894C1B2F1D3EBA2D2E67B4BCC06FE71
3,201,782 UART: [art] SIG.R = 54093F469A6C29C452C6286B1760504CB7786511A1CF8F733623DA0FE91AD6EAA97E2156583A8E627C81E19777D5AC8C
3,208,544 UART: [art] SIG.S = C48F720CDCCF0B93608D1D2E7BE820DAA175319971C2B1EE66D13CCD9B7D7E546BFBB311033C12F15B7C9C2E90F7C31F
3,232,785 UART: Caliptra RT
3,233,128 UART: [state] CFI Enabled
3,352,705 UART: [rt] RT listening for mailbox commands...
3,353,375 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,577 UART: [rt]cmd =0x44504543, len=24
3,410,843 >>> mbox cmd response data (40 bytes)
3,410,844 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,337 UART: [rt]cmd =0x44504543, len=24
3,468,360 >>> mbox cmd response data (40 bytes)
3,468,361 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,497,694 UART: [rt]cmd =0x44504543, len=24
3,525,048 >>> mbox cmd response data (40 bytes)
3,525,049 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,536 UART: [rt]cmd =0x44504543, len=24
3,582,171 >>> mbox cmd response data (40 bytes)
3,582,172 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,647 UART: [rt]cmd =0x44504543, len=24
3,639,535 >>> mbox cmd response data (40 bytes)
3,639,536 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,759 UART: [rt]cmd =0x44504543, len=24
3,696,572 >>> mbox cmd response data (40 bytes)
3,696,573 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,106 UART: [rt]cmd =0x44504543, len=24
3,753,208 >>> mbox cmd response data (40 bytes)
3,753,209 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,662 UART: [rt]cmd =0x44504543, len=24
3,810,283 >>> mbox cmd response data (40 bytes)
3,810,284 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,751 UART: [rt]cmd =0x44504543, len=24
3,867,209 >>> mbox cmd response data (40 bytes)
3,867,210 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,896,855 UART: [rt]cmd =0x44504543, len=24
3,924,354 >>> mbox cmd response data (40 bytes)
3,924,355 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,953,814 UART: [rt]cmd =0x44504543, len=24
3,981,068 >>> mbox cmd response data (40 bytes)
3,981,069 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,318 UART: [rt]cmd =0x44504543, len=24
4,037,831 >>> mbox cmd response data (40 bytes)
4,037,832 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,067,175 UART: [rt]cmd =0x44504543, len=24
4,094,517 >>> mbox cmd response data (40 bytes)
4,094,518 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,189 UART: [rt]cmd =0x44504543, len=24
4,152,196 >>> mbox cmd response data (40 bytes)
4,152,197 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,181,628 UART: [rt]cmd =0x44504543, len=24
4,188,964 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,248 ready_for_fw is high
1,060,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,635 >>> mbox cmd response: success
2,743,698 UART:
2,743,714 UART: Running Caliptra FMC ...
2,744,122 UART:
2,744,265 UART: [state] CFI Enabled
2,754,943 UART: [fht] FMC Alias Private Key: 7
2,873,897 UART: [art] Extend RT PCRs Done
2,874,325 UART: [art] Lock RT PCRs Done
2,875,779 UART: [art] Populate DV Done
2,883,922 UART: [fht] FMC Alias Private Key: 7
2,884,926 UART: [art] Derive CDI
2,885,206 UART: [art] Store in slot 0x4
2,971,059 UART: [art] Derive Key Pair
2,971,419 UART: [art] Store priv key in slot 0x5
2,984,793 UART: [art] Derive Key Pair - Done
2,999,415 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,893 UART: [art] PUB.X = F922645F78DE19DBB0002805CC9DF1563CE2FBF79874374652503E85E15714A5BF1984884550675C62FFB10A1A6A2508
3,022,626 UART: [art] PUB.Y = E4B8F556C91B28B1FA488FD078CE7C5B2BA6B6C5FA57D18C74ADAB5B04B25F42D47C2B70929D4CE621AD56DA80CEFFAF
3,029,601 UART: [art] SIG.R = 55268064F74A514E139222B82E526CBB1EC58AC5B501277595431D1428EE651DAE1A8ABA61D37CFDE723CE2F13B1A266
3,036,372 UART: [art] SIG.S = 8522A06E21B7E4D4FFF5228B67B2448D9621BC448F259F481665737957D4BF5404C83AF987568237C2599356C4C837EC
3,060,493 UART: Caliptra RT
3,060,836 UART: [state] CFI Enabled
3,180,247 UART: [rt] RT listening for mailbox commands...
3,180,917 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,951 UART: [rt]cmd =0x44504543, len=24
3,238,721 >>> mbox cmd response data (40 bytes)
3,238,722 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,075 UART: [rt]cmd =0x44504543, len=24
3,296,112 >>> mbox cmd response data (40 bytes)
3,296,113 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,325,778 UART: [rt]cmd =0x44504543, len=24
3,353,554 >>> mbox cmd response data (40 bytes)
3,353,555 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,068 UART: [rt]cmd =0x44504543, len=24
3,410,095 >>> mbox cmd response data (40 bytes)
3,410,096 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,593 UART: [rt]cmd =0x44504543, len=24
3,467,365 >>> mbox cmd response data (40 bytes)
3,467,366 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,496,741 UART: [rt]cmd =0x44504543, len=24
3,524,026 >>> mbox cmd response data (40 bytes)
3,524,027 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,744 UART: [rt]cmd =0x44504543, len=24
3,581,504 >>> mbox cmd response data (40 bytes)
3,581,505 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,086 UART: [rt]cmd =0x44504543, len=24
3,638,951 >>> mbox cmd response data (40 bytes)
3,638,952 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,339 UART: [rt]cmd =0x44504543, len=24
3,696,175 >>> mbox cmd response data (40 bytes)
3,696,176 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,747 UART: [rt]cmd =0x44504543, len=24
3,753,322 >>> mbox cmd response data (40 bytes)
3,753,323 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,952 UART: [rt]cmd =0x44504543, len=24
3,810,848 >>> mbox cmd response data (40 bytes)
3,810,849 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,396 UART: [rt]cmd =0x44504543, len=24
3,868,017 >>> mbox cmd response data (40 bytes)
3,868,018 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,535 UART: [rt]cmd =0x44504543, len=24
3,925,149 >>> mbox cmd response data (40 bytes)
3,925,150 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,519 UART: [rt]cmd =0x44504543, len=24
3,982,690 >>> mbox cmd response data (40 bytes)
3,982,691 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,246 UART: [rt]cmd =0x44504543, len=24
4,019,702 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,007 UART:
192,387 UART: Running Caliptra ROM ...
193,533 UART:
193,685 UART: [state] CFI Enabled
265,480 UART: [state] LifecycleState = Unprovisioned
267,395 UART: [state] DebugLocked = No
269,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,310 UART: [kat] SHA2-256
444,971 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,521 UART: [kat] ++
456,060 UART: [kat] sha1
466,521 UART: [kat] SHA2-256
469,177 UART: [kat] SHA2-384
474,813 UART: [kat] SHA2-512-ACC
477,177 UART: [kat] ECC-384
2,767,398 UART: [kat] HMAC-384Kdf
2,779,078 UART: [kat] LMS
3,969,393 UART: [kat] --
3,975,759 UART: [cold-reset] ++
3,977,404 UART: [fht] Storing FHT @ 0x50003400
3,988,595 UART: [idev] ++
3,989,162 UART: [idev] CDI.KEYID = 6
3,990,121 UART: [idev] SUBJECT.KEYID = 7
3,991,364 UART: [idev] UDS.KEYID = 0
3,992,372 ready_for_fw is high
3,992,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,734 UART: [idev] Erasing UDS.KEYID = 0
7,324,074 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,134 UART: [idev] --
7,350,621 UART: [ldev] ++
7,351,197 UART: [ldev] CDI.KEYID = 6
7,352,326 UART: [ldev] SUBJECT.KEYID = 5
7,353,431 UART: [ldev] AUTHORITY.KEYID = 7
7,354,607 UART: [ldev] FE.KEYID = 1
7,381,087 UART: [ldev] Erasing FE.KEYID = 1
10,713,747 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,007,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,022,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,037,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,051,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,070,590 UART: [ldev] --
13,074,634 UART: [fwproc] Waiting for Commands...
13,076,460 UART: [fwproc] Received command 0x46574c44
13,078,646 UART: [fwproc] Received Image of size 118548 bytes
17,177,785 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,254,181 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,327,363 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,655,585 >>> mbox cmd response: success
17,658,956 UART: [afmc] ++
17,659,576 UART: [afmc] CDI.KEYID = 6
17,660,467 UART: [afmc] SUBJECT.KEYID = 7
17,661,745 UART: [afmc] AUTHORITY.KEYID = 5
21,032,244 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,331,670 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,957 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,348,354 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,363,113 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,377,504 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,398,250 UART: [afmc] --
23,401,260 UART: [cold-reset] --
23,406,078 UART: [state] Locking Datavault
23,413,173 UART: [state] Locking PCR0, PCR1 and PCR31
23,414,924 UART: [state] Locking ICCM
23,417,587 UART: [exit] Launching FMC @ 0x40000130
23,425,975 UART:
23,426,215 UART: Running Caliptra FMC ...
23,427,241 UART:
23,427,389 UART: [state] CFI Enabled
23,493,000 UART: [fht] FMC Alias Private Key: 7
25,833,655 UART: [art] Extend RT PCRs Done
25,834,894 UART: [art] Lock RT PCRs Done
25,836,713 UART: [art] Populate DV Done
25,842,237 UART: [fht] FMC Alias Private Key: 7
25,843,793 UART: [art] Derive CDI
25,844,530 UART: [art] Store in slot 0x4
25,901,894 UART: [art] Derive Key Pair
25,902,935 UART: [art] Store priv key in slot 0x5
29,196,406 UART: [art] Derive Key Pair - Done
29,209,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,498,074 UART: [art] Erasing AUTHORITY.KEYID = 7
31,499,590 UART: [art] PUB.X = 38D62D36CB0BB6C8963E2B1058A6BBC79E7592D268A83530BFB689C7AAA3C2515669D00C8EFB28FFFB29DD903572F22B
31,506,856 UART: [art] PUB.Y = DA662AE2FA1E5821162BA3B1EFCD5C3E4DB54A339FE35255ED3FF363EB7A712A2550C5AEB6F4D5AA2F9CD1A0404520CF
31,514,158 UART: [art] SIG.R = 0358E6639C56F600ACDBF115D03A677FBD1CC602C6303FC81C3E90541C1B6A21937CD2D437BDF8DA4C053237AE00110A
31,521,515 UART: [art] SIG.S = 6F86891380D2BA2F0674C4C5A7DA2BBA905584778C22DF92F44E75242417D936A4B35E094C66D328D2C6FB954BE35D1F
32,827,125 UART: Caliptra RT
32,827,827 UART: [state] CFI Enabled
33,004,321 UART: [rt] RT listening for mailbox commands...
33,006,283 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,036,310 UART: [rt]cmd =0x44504543, len=24
33,084,372 >>> mbox cmd response data (40 bytes)
33,085,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,116,295 UART: [rt]cmd =0x44504543, len=96
33,175,610 >>> mbox cmd response data (56 bytes)
33,176,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,206,800 UART: [rt]cmd =0x44504543, len=96
33,282,946 >>> mbox cmd response data (56 bytes)
33,283,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,314,348 UART: [rt]cmd =0x44504543, len=96
33,389,523 >>> mbox cmd response data (56 bytes)
33,390,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,420,744 UART: [rt]cmd =0x44504543, len=96
33,496,545 >>> mbox cmd response data (56 bytes)
33,497,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,527,527 UART: [rt]cmd =0x44504543, len=96
33,603,360 >>> mbox cmd response data (56 bytes)
33,604,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,634,793 UART: [rt]cmd =0x44504543, len=96
33,709,859 >>> mbox cmd response data (56 bytes)
33,710,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,741,281 UART: [rt]cmd =0x44504543, len=96
33,817,351 >>> mbox cmd response data (56 bytes)
33,818,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,848,660 UART: [rt]cmd =0x44504543, len=96
33,923,402 >>> mbox cmd response data (56 bytes)
33,924,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,954,448 UART: [rt]cmd =0x44504543, len=96
34,030,338 >>> mbox cmd response data (56 bytes)
34,031,073 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,061,464 UART: [rt]cmd =0x44504543, len=96
34,137,054 >>> mbox cmd response data (56 bytes)
34,137,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,168,331 UART: [rt]cmd =0x44504543, len=96
34,244,056 >>> mbox cmd response data (56 bytes)
34,244,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,275,381 UART: [rt]cmd =0x44504543, len=96
34,350,400 >>> mbox cmd response data (56 bytes)
34,351,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,381,511 UART: [rt]cmd =0x44504543, len=96
34,456,927 >>> mbox cmd response data (56 bytes)
34,457,646 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,488,065 UART: [rt]cmd =0x44504543, len=96
34,563,896 >>> mbox cmd response data (56 bytes)
34,564,623 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,595,263 UART: [rt]cmd =0x44504543, len=96
34,671,189 >>> mbox cmd response data (56 bytes)
34,671,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,702,450 UART: [rt]cmd =0x44504543, len=96
34,709,443 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,801,499 ready_for_fw is high
3,802,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,938,163 >>> mbox cmd response: success
23,626,552 UART:
23,626,957 UART: Running Caliptra FMC ...
23,628,113 UART:
23,628,275 UART: [state] CFI Enabled
23,697,568 UART: [fht] FMC Alias Private Key: 7
26,038,523 UART: [art] Extend RT PCRs Done
26,039,753 UART: [art] Lock RT PCRs Done
26,041,231 UART: [art] Populate DV Done
26,046,769 UART: [fht] FMC Alias Private Key: 7
26,048,479 UART: [art] Derive CDI
26,049,258 UART: [art] Store in slot 0x4
26,106,358 UART: [art] Derive Key Pair
26,107,359 UART: [art] Store priv key in slot 0x5
29,400,629 UART: [art] Derive Key Pair - Done
29,413,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,702,690 UART: [art] Erasing AUTHORITY.KEYID = 7
31,704,203 UART: [art] PUB.X = 59A5B373886BCAB11D3F3C120BCABE660CEFBEAB3A04658F38ABCD11C1F26F46BA3DBC151B70DCCC954A92897E62636B
31,711,527 UART: [art] PUB.Y = DFE06B11591F5294F87CCEFAFFB2B57319BA4F824BDF35CFC4D3441F02F98F2561032BB47B9341FD0B3628A4402B3AFB
31,718,793 UART: [art] SIG.R = 0B46D1918DBCF9ED1F967C389A7DB57AAFBD5CDE6F4643A993BB579F15EE29FD7AFAD65A3A4C1344A01A7B0613795B56
31,726,200 UART: [art] SIG.S = 08F1816395FD849405D194004EE262D175682C54E710EF111787E10A0011A77B6CC5DABC8C22B96C3C045EEF2869690C
33,031,317 UART: Caliptra RT
33,032,035 UART: [state] CFI Enabled
33,208,932 UART: [rt] RT listening for mailbox commands...
33,210,844 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,240,811 UART: [rt]cmd =0x44504543, len=24
33,289,698 >>> mbox cmd response data (40 bytes)
33,290,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,321,527 UART: [rt]cmd =0x44504543, len=96
33,380,887 >>> mbox cmd response data (56 bytes)
33,381,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,412,137 UART: [rt]cmd =0x44504543, len=96
33,487,666 >>> mbox cmd response data (56 bytes)
33,488,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,519,035 UART: [rt]cmd =0x44504543, len=96
33,594,760 >>> mbox cmd response data (56 bytes)
33,595,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,625,905 UART: [rt]cmd =0x44504543, len=96
33,701,772 >>> mbox cmd response data (56 bytes)
33,702,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,732,884 UART: [rt]cmd =0x44504543, len=96
33,807,864 >>> mbox cmd response data (56 bytes)
33,808,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,838,973 UART: [rt]cmd =0x44504543, len=96
33,915,070 >>> mbox cmd response data (56 bytes)
33,915,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,946,318 UART: [rt]cmd =0x44504543, len=96
34,022,039 >>> mbox cmd response data (56 bytes)
34,022,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,053,197 UART: [rt]cmd =0x44504543, len=96
34,128,566 >>> mbox cmd response data (56 bytes)
34,129,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,160,030 UART: [rt]cmd =0x44504543, len=96
34,235,220 >>> mbox cmd response data (56 bytes)
34,235,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,266,255 UART: [rt]cmd =0x44504543, len=96
34,342,084 >>> mbox cmd response data (56 bytes)
34,342,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,373,472 UART: [rt]cmd =0x44504543, len=96
34,448,661 >>> mbox cmd response data (56 bytes)
34,449,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,479,850 UART: [rt]cmd =0x44504543, len=96
34,555,546 >>> mbox cmd response data (56 bytes)
34,556,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,586,681 UART: [rt]cmd =0x44504543, len=96
34,662,890 >>> mbox cmd response data (56 bytes)
34,663,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,694,302 UART: [rt]cmd =0x44504543, len=96
34,769,648 >>> mbox cmd response data (56 bytes)
34,770,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,800,957 UART: [rt]cmd =0x44504543, len=96
34,876,359 >>> mbox cmd response data (56 bytes)
34,877,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,907,649 UART: [rt]cmd =0x44504543, len=96
34,914,722 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
192,389 UART:
192,745 UART: Running Caliptra ROM ...
193,842 UART:
603,695 UART: [state] CFI Enabled
617,083 UART: [state] LifecycleState = Unprovisioned
618,959 UART: [state] DebugLocked = No
620,716 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,427 UART: [kat] SHA2-256
796,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,728 UART: [kat] ++
807,205 UART: [kat] sha1
818,026 UART: [kat] SHA2-256
820,790 UART: [kat] SHA2-384
825,927 UART: [kat] SHA2-512-ACC
828,294 UART: [kat] ECC-384
3,111,704 UART: [kat] HMAC-384Kdf
3,123,159 UART: [kat] LMS
4,313,322 UART: [kat] --
4,318,404 UART: [cold-reset] ++
4,319,552 UART: [fht] Storing FHT @ 0x50003400
4,330,617 UART: [idev] ++
4,331,225 UART: [idev] CDI.KEYID = 6
4,332,159 UART: [idev] SUBJECT.KEYID = 7
4,333,405 UART: [idev] UDS.KEYID = 0
4,334,480 ready_for_fw is high
4,334,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,498 UART: [idev] Erasing UDS.KEYID = 0
7,619,210 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,640 UART: [idev] --
7,644,673 UART: [ldev] ++
7,645,289 UART: [ldev] CDI.KEYID = 6
7,646,244 UART: [ldev] SUBJECT.KEYID = 5
7,647,445 UART: [ldev] AUTHORITY.KEYID = 7
7,648,666 UART: [ldev] FE.KEYID = 1
7,658,875 UART: [ldev] Erasing FE.KEYID = 1
10,948,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,414 UART: [ldev] --
13,309,857 UART: [fwproc] Waiting for Commands...
13,313,187 UART: [fwproc] Received command 0x46574c44
13,315,417 UART: [fwproc] Received Image of size 118548 bytes
17,415,571 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,221 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,415 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,740 >>> mbox cmd response: success
17,900,603 UART: [afmc] ++
17,901,212 UART: [afmc] CDI.KEYID = 6
17,902,119 UART: [afmc] SUBJECT.KEYID = 7
17,903,385 UART: [afmc] AUTHORITY.KEYID = 5
21,219,916 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,299 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,580 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,992 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,695 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,116 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,727 UART: [afmc] --
23,587,702 UART: [cold-reset] --
23,591,667 UART: [state] Locking Datavault
23,596,044 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,740 UART: [state] Locking ICCM
23,599,669 UART: [exit] Launching FMC @ 0x40000130
23,608,064 UART:
23,608,300 UART: Running Caliptra FMC ...
23,609,397 UART:
23,609,740 UART: [state] CFI Enabled
23,617,759 UART: [fht] FMC Alias Private Key: 7
25,957,435 UART: [art] Extend RT PCRs Done
25,958,676 UART: [art] Lock RT PCRs Done
25,960,189 UART: [art] Populate DV Done
25,965,700 UART: [fht] FMC Alias Private Key: 7
25,967,176 UART: [art] Derive CDI
25,967,937 UART: [art] Store in slot 0x4
26,010,309 UART: [art] Derive Key Pair
26,011,352 UART: [art] Store priv key in slot 0x5
29,253,298 UART: [art] Derive Key Pair - Done
29,266,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,483 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,992 UART: [art] PUB.X = F6FA9DCA4A02E488439C8555105220FEB359965529A20D2490075C9DAF41BC663D752DB78B33EBEC0DCEA9285AC21FB4
31,555,298 UART: [art] PUB.Y = 713E3203D04500F036A43CC7005CCCFC4397E3A4BB192532D9EB1F4216B8947046A8650E731DF7C29117F6A4A8FC53B1
31,562,474 UART: [art] SIG.R = 206B56015C57DAD224BB621CB8DF7FCE7E1826615A612225A53B0F18BEE51A6CE306807B9B5D3EA9ECACCF5C3BD2726A
31,569,923 UART: [art] SIG.S = 5FB8E5AAC89BC67CB093734B17F0C39EA8F3C47608709E9B17D1E39E3BC1B50BC7EAE77AD1BEC48A51C3682C9B2671BF
32,874,793 UART: Caliptra RT
32,875,489 UART: [state] CFI Enabled
33,009,496 UART: [rt] RT listening for mailbox commands...
33,011,436 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,041,392 UART: [rt]cmd =0x44504543, len=24
33,068,719 >>> mbox cmd response data (40 bytes)
33,069,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,100,483 UART: [rt]cmd =0x44504543, len=96
33,143,691 >>> mbox cmd response data (56 bytes)
33,144,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,174,936 UART: [rt]cmd =0x44504543, len=96
33,218,624 >>> mbox cmd response data (56 bytes)
33,219,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,250,033 UART: [rt]cmd =0x44504543, len=96
33,293,482 >>> mbox cmd response data (56 bytes)
33,294,193 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,324,715 UART: [rt]cmd =0x44504543, len=96
33,368,014 >>> mbox cmd response data (56 bytes)
33,368,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,399,297 UART: [rt]cmd =0x44504543, len=96
33,443,659 >>> mbox cmd response data (56 bytes)
33,444,344 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,474,821 UART: [rt]cmd =0x44504543, len=96
33,518,644 >>> mbox cmd response data (56 bytes)
33,519,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,549,695 UART: [rt]cmd =0x44504543, len=96
33,594,274 >>> mbox cmd response data (56 bytes)
33,594,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,625,507 UART: [rt]cmd =0x44504543, len=96
33,671,277 >>> mbox cmd response data (56 bytes)
33,671,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,702,446 UART: [rt]cmd =0x44504543, len=96
33,748,378 >>> mbox cmd response data (56 bytes)
33,749,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,779,682 UART: [rt]cmd =0x44504543, len=96
33,825,179 >>> mbox cmd response data (56 bytes)
33,825,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,856,283 UART: [rt]cmd =0x44504543, len=96
33,902,426 >>> mbox cmd response data (56 bytes)
33,903,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,933,596 UART: [rt]cmd =0x44504543, len=96
33,979,950 >>> mbox cmd response data (56 bytes)
33,980,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,011,209 UART: [rt]cmd =0x44504543, len=96
34,057,397 >>> mbox cmd response data (56 bytes)
34,058,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,088,459 UART: [rt]cmd =0x44504543, len=96
34,135,103 >>> mbox cmd response data (56 bytes)
34,135,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,166,315 UART: [rt]cmd =0x44504543, len=96
34,213,424 >>> mbox cmd response data (56 bytes)
34,214,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,244,613 UART: [rt]cmd =0x44504543, len=96
34,250,973 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
4,131,867 ready_for_fw is high
4,132,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,290 >>> mbox cmd response: success
23,805,823 UART:
23,806,215 UART: Running Caliptra FMC ...
23,807,344 UART:
23,807,496 UART: [state] CFI Enabled
23,815,289 UART: [fht] FMC Alias Private Key: 7
26,155,608 UART: [art] Extend RT PCRs Done
26,156,838 UART: [art] Lock RT PCRs Done
26,158,566 UART: [art] Populate DV Done
26,163,994 UART: [fht] FMC Alias Private Key: 7
26,165,582 UART: [art] Derive CDI
26,166,317 UART: [art] Store in slot 0x4
26,208,955 UART: [art] Derive Key Pair
26,209,942 UART: [art] Store priv key in slot 0x5
29,451,967 UART: [art] Derive Key Pair - Done
29,464,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,428 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,066 UART: [art] PUB.X = 3F050F8E66895AB4B052BE4F8F58647C94A188CA227F99D6513CBC730AEA972B72F5A0DF68A52360D55982699848675B
31,754,207 UART: [art] PUB.Y = 9E7252D7FD8A6B9FDAA347D40190005DC3DF8A762AFD2815CE466A7249ECE8E56CE923D1555D7AF76D0D6CF93DBBCAE5
31,761,454 UART: [art] SIG.R = 9ACDE9DD9A8A66CE62C716628FA68F9425B06963F9DDC1E8B619B7021A787580D3AB9B5F51224C22ED5C3F566623E268
31,768,851 UART: [art] SIG.S = CC4475B50D57A42A78D807274FC01C276E0C3598AB3A37C52F324FF86DEBD1BC0437900348CBFE97B531B45334195ED7
33,074,422 UART: Caliptra RT
33,075,134 UART: [state] CFI Enabled
33,208,380 UART: [rt] RT listening for mailbox commands...
33,210,325 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,240,499 UART: [rt]cmd =0x44504543, len=24
33,267,926 >>> mbox cmd response data (40 bytes)
33,269,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,299,665 UART: [rt]cmd =0x44504543, len=96
33,342,766 >>> mbox cmd response data (56 bytes)
33,343,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,373,714 UART: [rt]cmd =0x44504543, len=96
33,417,535 >>> mbox cmd response data (56 bytes)
33,418,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,448,764 UART: [rt]cmd =0x44504543, len=96
33,491,942 >>> mbox cmd response data (56 bytes)
33,492,624 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,523,430 UART: [rt]cmd =0x44504543, len=96
33,566,565 >>> mbox cmd response data (56 bytes)
33,567,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,597,976 UART: [rt]cmd =0x44504543, len=96
33,642,505 >>> mbox cmd response data (56 bytes)
33,643,193 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,673,682 UART: [rt]cmd =0x44504543, len=96
33,718,363 >>> mbox cmd response data (56 bytes)
33,719,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,749,703 UART: [rt]cmd =0x44504543, len=96
33,794,501 >>> mbox cmd response data (56 bytes)
33,795,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,825,875 UART: [rt]cmd =0x44504543, len=96
33,871,365 >>> mbox cmd response data (56 bytes)
33,872,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,902,625 UART: [rt]cmd =0x44504543, len=96
33,947,555 >>> mbox cmd response data (56 bytes)
33,948,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,978,791 UART: [rt]cmd =0x44504543, len=96
34,024,338 >>> mbox cmd response data (56 bytes)
34,025,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,055,868 UART: [rt]cmd =0x44504543, len=96
34,102,103 >>> mbox cmd response data (56 bytes)
34,102,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,133,288 UART: [rt]cmd =0x44504543, len=96
34,179,619 >>> mbox cmd response data (56 bytes)
34,180,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,210,581 UART: [rt]cmd =0x44504543, len=96
34,257,450 >>> mbox cmd response data (56 bytes)
34,258,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,288,636 UART: [rt]cmd =0x44504543, len=96
34,335,775 >>> mbox cmd response data (56 bytes)
34,336,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,367,013 UART: [rt]cmd =0x44504543, len=96
34,414,203 >>> mbox cmd response data (56 bytes)
34,414,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,445,407 UART: [rt]cmd =0x44504543, len=96
34,452,243 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,102 UART:
192,464 UART: Running Caliptra ROM ...
193,561 UART:
193,700 UART: [state] CFI Enabled
267,368 UART: [state] LifecycleState = Unprovisioned
269,340 UART: [state] DebugLocked = No
271,580 UART: [state] WD Timer not started. Device not locked for debugging
275,970 UART: [kat] SHA2-256
455,636 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,446 UART: [kat] ++
466,976 UART: [kat] sha1
477,370 UART: [kat] SHA2-256
480,068 UART: [kat] SHA2-384
484,685 UART: [kat] SHA2-512-ACC
487,058 UART: [kat] ECC-384
2,948,998 UART: [kat] HMAC-384Kdf
2,970,569 UART: [kat] LMS
3,447,059 UART: [kat] --
3,451,977 UART: [cold-reset] ++
3,454,477 UART: [fht] FHT @ 0x50003400
3,465,732 UART: [idev] ++
3,466,360 UART: [idev] CDI.KEYID = 6
3,467,277 UART: [idev] SUBJECT.KEYID = 7
3,468,517 UART: [idev] UDS.KEYID = 0
3,469,562 ready_for_fw is high
3,469,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,886 UART: [idev] Erasing UDS.KEYID = 0
5,988,498 UART: [idev] Sha1 KeyId Algorithm
6,011,390 UART: [idev] --
6,016,335 UART: [ldev] ++
6,016,915 UART: [ldev] CDI.KEYID = 6
6,017,848 UART: [ldev] SUBJECT.KEYID = 5
6,019,067 UART: [ldev] AUTHORITY.KEYID = 7
6,020,299 UART: [ldev] FE.KEYID = 1
6,057,736 UART: [ldev] Erasing FE.KEYID = 1
8,562,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,681 UART: [ldev] --
10,373,829 UART: [fwproc] Wait for Commands...
10,377,054 UART: [fwproc] Recv command 0x46574c44
10,379,042 UART: [fwproc] Recv'd Img size: 118548 bytes
13,858,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,237 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,250 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,728 >>> mbox cmd response: success
14,343,872 UART: [afmc] ++
14,344,482 UART: [afmc] CDI.KEYID = 6
14,345,363 UART: [afmc] SUBJECT.KEYID = 7
14,346,577 UART: [afmc] AUTHORITY.KEYID = 5
16,874,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,092 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,876 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,960 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,520 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,992 UART: [afmc] --
18,694,927 UART: [cold-reset] --
18,698,725 UART: [state] Locking Datavault
18,703,209 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,962 UART: [state] Locking ICCM
18,707,615 UART: [exit] Launching FMC @ 0x40000130
18,716,064 UART:
18,716,298 UART: Running Caliptra FMC ...
18,717,392 UART:
18,717,545 UART: [state] CFI Enabled
18,774,064 UART: [fht] FMC Alias Private Key: 7
20,540,446 UART: [art] Extend RT PCRs Done
20,541,684 UART: [art] Lock RT PCRs Done
20,543,226 UART: [art] Populate DV Done
20,548,587 UART: [fht] FMC Alias Private Key: 7
20,550,078 UART: [art] Derive CDI
20,550,835 UART: [art] Store in slot 0x4
20,607,237 UART: [art] Derive Key Pair
20,608,279 UART: [art] Store priv key in slot 0x5
23,070,883 UART: [art] Derive Key Pair - Done
23,083,826 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,985 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,483 UART: [art] PUB.X = C6CE05319DDA635879AF4982942AD8AE0A420EBA995B7CC6EF24FA2FA82FC0C409754A36CE951FDD3F49E9F68406C520
24,805,758 UART: [art] PUB.Y = 5F4CCF7AB8B7ABCA28AFB8B42848010AA83FF0523BC8821B1605E5672A3E7DD8369E243B21CC8096F39D5576ED256018
24,813,006 UART: [art] SIG.R = E64233B1EF2E770D55AD6EDF151BBF4ECB24F67CF1A77469F3E76597E2CB05C87604D8DCF705A65F128700295E9B7E47
24,820,408 UART: [art] SIG.S = 9E398012A06B9F20E88D85C15B3C17C874A7AD56CF80300C9C82EC7CB1FFC2F883620A674DFED7B0D70103E3CBAAAF7F
25,798,810 UART: Caliptra RT
25,799,522 UART: [state] CFI Enabled
25,980,742 UART: [rt] RT listening for mailbox commands...
25,982,659 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,012,615 UART: [rt]cmd =0x44504543, len=24
26,040,946 >>> mbox cmd response data (40 bytes)
26,042,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,072,725 UART: [rt]cmd =0x44504543, len=96
26,132,923 >>> mbox cmd response data (56 bytes)
26,133,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,164,283 UART: [rt]cmd =0x44504543, len=96
26,239,879 >>> mbox cmd response data (56 bytes)
26,240,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,271,309 UART: [rt]cmd =0x44504543, len=96
26,346,334 >>> mbox cmd response data (56 bytes)
26,347,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,377,865 UART: [rt]cmd =0x44504543, len=96
26,453,642 >>> mbox cmd response data (56 bytes)
26,454,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,485,062 UART: [rt]cmd =0x44504543, len=96
26,559,557 >>> mbox cmd response data (56 bytes)
26,560,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,590,907 UART: [rt]cmd =0x44504543, len=96
26,666,353 >>> mbox cmd response data (56 bytes)
26,667,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,697,488 UART: [rt]cmd =0x44504543, len=96
26,772,941 >>> mbox cmd response data (56 bytes)
26,773,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,804,004 UART: [rt]cmd =0x44504543, len=96
26,879,966 >>> mbox cmd response data (56 bytes)
26,880,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,911,106 UART: [rt]cmd =0x44504543, len=96
26,986,775 >>> mbox cmd response data (56 bytes)
26,987,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,017,965 UART: [rt]cmd =0x44504543, len=96
27,093,577 >>> mbox cmd response data (56 bytes)
27,094,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,124,893 UART: [rt]cmd =0x44504543, len=96
27,200,522 >>> mbox cmd response data (56 bytes)
27,201,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,231,718 UART: [rt]cmd =0x44504543, len=96
27,307,917 >>> mbox cmd response data (56 bytes)
27,308,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,339,289 UART: [rt]cmd =0x44504543, len=96
27,414,737 >>> mbox cmd response data (56 bytes)
27,415,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,445,969 UART: [rt]cmd =0x44504543, len=96
27,521,565 >>> mbox cmd response data (56 bytes)
27,522,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,552,976 UART: [rt]cmd =0x44504543, len=96
27,628,374 >>> mbox cmd response data (56 bytes)
27,629,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,659,894 UART: [rt]cmd =0x44504543, len=96
27,666,615 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,460,274 ready_for_fw is high
3,460,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,410 >>> mbox cmd response: success
18,537,825 UART:
18,538,206 UART: Running Caliptra FMC ...
18,539,301 UART:
18,539,450 UART: [state] CFI Enabled
18,604,506 UART: [fht] FMC Alias Private Key: 7
20,370,734 UART: [art] Extend RT PCRs Done
20,371,956 UART: [art] Lock RT PCRs Done
20,373,627 UART: [art] Populate DV Done
20,379,101 UART: [fht] FMC Alias Private Key: 7
20,380,752 UART: [art] Derive CDI
20,381,566 UART: [art] Store in slot 0x4
20,437,042 UART: [art] Derive Key Pair
20,438,086 UART: [art] Store priv key in slot 0x5
22,900,697 UART: [art] Derive Key Pair - Done
22,913,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,311 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,790 UART: [art] PUB.X = E7956B9C7A1281197DD80E1CAE396EF660DC1B778BA90274EC299BEFAA9A37CFC0743861E19CC336B329E62737985642
24,635,089 UART: [art] PUB.Y = 5626E0A81A26063B37814E6228293413CB23BBAF3FA0B17F22DECA91CF948944508DBE2046772329495420A681FA5FA5
24,642,355 UART: [art] SIG.R = E2CDD8D0C87B3AAFCB2C0544980A6669F03D40B98A715B490905ACEB564E92ED5D47BC1B54BFF562F439746187969708
24,649,749 UART: [art] SIG.S = 85DFAA4D5D1F32D09CD99DF5B256F6EB9675121EBD7C6E8225C8932FD8C36A4C286CFF4F35E8696868C749B692DDEB0C
25,628,912 UART: Caliptra RT
25,629,624 UART: [state] CFI Enabled
25,809,913 UART: [rt] RT listening for mailbox commands...
25,811,843 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,841,915 UART: [rt]cmd =0x44504543, len=24
25,890,674 >>> mbox cmd response data (40 bytes)
25,891,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,922,181 UART: [rt]cmd =0x44504543, len=96
25,981,987 >>> mbox cmd response data (56 bytes)
25,982,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,013,435 UART: [rt]cmd =0x44504543, len=96
26,089,096 >>> mbox cmd response data (56 bytes)
26,089,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,120,436 UART: [rt]cmd =0x44504543, len=96
26,196,169 >>> mbox cmd response data (56 bytes)
26,196,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,227,470 UART: [rt]cmd =0x44504543, len=96
26,302,618 >>> mbox cmd response data (56 bytes)
26,303,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,333,891 UART: [rt]cmd =0x44504543, len=96
26,409,981 >>> mbox cmd response data (56 bytes)
26,410,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,441,288 UART: [rt]cmd =0x44504543, len=96
26,516,262 >>> mbox cmd response data (56 bytes)
26,516,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,547,446 UART: [rt]cmd =0x44504543, len=96
26,623,259 >>> mbox cmd response data (56 bytes)
26,623,976 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,654,505 UART: [rt]cmd =0x44504543, len=96
26,729,784 >>> mbox cmd response data (56 bytes)
26,730,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,760,885 UART: [rt]cmd =0x44504543, len=96
26,836,999 >>> mbox cmd response data (56 bytes)
26,837,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,868,353 UART: [rt]cmd =0x44504543, len=96
26,944,444 >>> mbox cmd response data (56 bytes)
26,945,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,975,732 UART: [rt]cmd =0x44504543, len=96
27,051,191 >>> mbox cmd response data (56 bytes)
27,051,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,082,707 UART: [rt]cmd =0x44504543, len=96
27,157,382 >>> mbox cmd response data (56 bytes)
27,158,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,188,792 UART: [rt]cmd =0x44504543, len=96
27,264,765 >>> mbox cmd response data (56 bytes)
27,265,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,296,026 UART: [rt]cmd =0x44504543, len=96
27,371,695 >>> mbox cmd response data (56 bytes)
27,372,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,402,882 UART: [rt]cmd =0x44504543, len=96
27,478,230 >>> mbox cmd response data (56 bytes)
27,478,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,509,546 UART: [rt]cmd =0x44504543, len=96
27,516,206 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,540 UART:
192,905 UART: Running Caliptra ROM ...
194,101 UART:
603,874 UART: [state] CFI Enabled
617,783 UART: [state] LifecycleState = Unprovisioned
619,843 UART: [state] DebugLocked = No
622,360 UART: [state] WD Timer not started. Device not locked for debugging
625,336 UART: [kat] SHA2-256
804,987 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,783 UART: [kat] ++
816,232 UART: [kat] sha1
828,385 UART: [kat] SHA2-256
831,108 UART: [kat] SHA2-384
837,172 UART: [kat] SHA2-512-ACC
839,573 UART: [kat] ECC-384
3,282,568 UART: [kat] HMAC-384Kdf
3,295,087 UART: [kat] LMS
3,771,627 UART: [kat] --
3,777,823 UART: [cold-reset] ++
3,779,971 UART: [fht] FHT @ 0x50003400
3,791,447 UART: [idev] ++
3,792,012 UART: [idev] CDI.KEYID = 6
3,792,967 UART: [idev] SUBJECT.KEYID = 7
3,794,208 UART: [idev] UDS.KEYID = 0
3,795,176 ready_for_fw is high
3,795,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,211 UART: [idev] Erasing UDS.KEYID = 0
6,274,817 UART: [idev] Sha1 KeyId Algorithm
6,299,063 UART: [idev] --
6,304,882 UART: [ldev] ++
6,305,482 UART: [ldev] CDI.KEYID = 6
6,306,407 UART: [ldev] SUBJECT.KEYID = 5
6,307,569 UART: [ldev] AUTHORITY.KEYID = 7
6,308,861 UART: [ldev] FE.KEYID = 1
6,321,556 UART: [ldev] Erasing FE.KEYID = 1
8,797,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,394 UART: [ldev] --
10,592,250 UART: [fwproc] Wait for Commands...
10,595,210 UART: [fwproc] Recv command 0x46574c44
10,597,208 UART: [fwproc] Recv'd Img size: 118548 bytes
14,081,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,159,348 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,232,365 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,973 >>> mbox cmd response: success
14,564,741 UART: [afmc] ++
14,565,351 UART: [afmc] CDI.KEYID = 6
14,566,324 UART: [afmc] SUBJECT.KEYID = 7
14,567,497 UART: [afmc] AUTHORITY.KEYID = 5
17,077,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,801,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,803,803 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,819,630 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,835,709 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,851,295 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,876,674 UART: [afmc] --
18,880,933 UART: [cold-reset] --
18,884,855 UART: [state] Locking Datavault
18,891,026 UART: [state] Locking PCR0, PCR1 and PCR31
18,892,811 UART: [state] Locking ICCM
18,894,914 UART: [exit] Launching FMC @ 0x40000130
18,903,320 UART:
18,903,558 UART: Running Caliptra FMC ...
18,904,666 UART:
18,904,836 UART: [state] CFI Enabled
18,912,833 UART: [fht] FMC Alias Private Key: 7
20,678,918 UART: [art] Extend RT PCRs Done
20,680,136 UART: [art] Lock RT PCRs Done
20,681,923 UART: [art] Populate DV Done
20,687,284 UART: [fht] FMC Alias Private Key: 7
20,688,876 UART: [art] Derive CDI
20,689,689 UART: [art] Store in slot 0x4
20,732,389 UART: [art] Derive Key Pair
20,733,425 UART: [art] Store priv key in slot 0x5
23,160,318 UART: [art] Derive Key Pair - Done
23,172,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,879,316 UART: [art] Erasing AUTHORITY.KEYID = 7
24,880,820 UART: [art] PUB.X = 7D82D498F1E5EACB742BDAF60F4EC0ECE7968531205304D44B2FB5C6B0ED3C348D6FD22CBB0534D05DFEA6D778DFC226
24,888,114 UART: [art] PUB.Y = 3BAD32A87E366D5429BCFFADCF1F01218D4B31D15B0C152A0E6A8AB0DBC58E8AFFE0F2552727D36BCE9FDECCFDB4A417
24,895,408 UART: [art] SIG.R = E0A44D725C9B9989C646B122E2B15BE4891DD894EDE4B257E14AB167BB356977D6E80937ECC583E6F655AC538A07DCC1
24,902,797 UART: [art] SIG.S = 6B0E89D608747F4BB5DFDB5FB2458E5A0E41A09695D2BD35F4E2F94046B8DC8D46FD23F357B797339D8618B81B7592FD
25,882,376 UART: Caliptra RT
25,883,089 UART: [state] CFI Enabled
26,015,242 UART: [rt] RT listening for mailbox commands...
26,017,152 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,047,010 UART: [rt]cmd =0x44504543, len=24
26,074,393 >>> mbox cmd response data (40 bytes)
26,075,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,106,340 UART: [rt]cmd =0x44504543, len=96
26,149,825 >>> mbox cmd response data (56 bytes)
26,150,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,181,147 UART: [rt]cmd =0x44504543, len=96
26,224,851 >>> mbox cmd response data (56 bytes)
26,225,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,256,226 UART: [rt]cmd =0x44504543, len=96
26,299,921 >>> mbox cmd response data (56 bytes)
26,300,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,331,178 UART: [rt]cmd =0x44504543, len=96
26,374,864 >>> mbox cmd response data (56 bytes)
26,375,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,406,176 UART: [rt]cmd =0x44504543, len=96
26,450,482 >>> mbox cmd response data (56 bytes)
26,451,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,481,660 UART: [rt]cmd =0x44504543, len=96
26,526,022 >>> mbox cmd response data (56 bytes)
26,526,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,557,211 UART: [rt]cmd =0x44504543, len=96
26,601,975 >>> mbox cmd response data (56 bytes)
26,602,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,633,056 UART: [rt]cmd =0x44504543, len=96
26,678,018 >>> mbox cmd response data (56 bytes)
26,678,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,709,363 UART: [rt]cmd =0x44504543, len=96
26,754,595 >>> mbox cmd response data (56 bytes)
26,755,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,785,983 UART: [rt]cmd =0x44504543, len=96
26,831,372 >>> mbox cmd response data (56 bytes)
26,832,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,862,510 UART: [rt]cmd =0x44504543, len=96
26,907,955 >>> mbox cmd response data (56 bytes)
26,908,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,939,020 UART: [rt]cmd =0x44504543, len=96
26,984,201 >>> mbox cmd response data (56 bytes)
26,984,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,015,455 UART: [rt]cmd =0x44504543, len=96
27,062,333 >>> mbox cmd response data (56 bytes)
27,063,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,093,543 UART: [rt]cmd =0x44504543, len=96
27,139,777 >>> mbox cmd response data (56 bytes)
27,140,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,171,256 UART: [rt]cmd =0x44504543, len=96
27,217,868 >>> mbox cmd response data (56 bytes)
27,218,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,249,032 UART: [rt]cmd =0x44504543, len=96
27,255,871 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,775,397 ready_for_fw is high
3,775,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,113 >>> mbox cmd response: success
18,695,971 UART:
18,696,360 UART: Running Caliptra FMC ...
18,697,513 UART:
18,697,675 UART: [state] CFI Enabled
18,705,411 UART: [fht] FMC Alias Private Key: 7
20,472,264 UART: [art] Extend RT PCRs Done
20,473,616 UART: [art] Lock RT PCRs Done
20,475,140 UART: [art] Populate DV Done
20,480,694 UART: [fht] FMC Alias Private Key: 7
20,482,346 UART: [art] Derive CDI
20,483,166 UART: [art] Store in slot 0x4
20,525,875 UART: [art] Derive Key Pair
20,526,882 UART: [art] Store priv key in slot 0x5
22,953,963 UART: [art] Derive Key Pair - Done
22,967,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,724 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,236 UART: [art] PUB.X = 7754B6A6292C96B8B7CDB8EE83699ADBCBFD5B0E397A8DC977B5B87E0571FDF0E6A5E02B2929394F606EFCBDFD33FF23
24,682,501 UART: [art] PUB.Y = 87FF6726A471332C04BC93F152AE2C948008DC87F62C941A9ED07008387A99119376B85D8C64F3B43CD2C882EA2F2948
24,689,764 UART: [art] SIG.R = D69659BD34719EE15A67A8CE4FCE31A9B002B15661E1E3FCEA2B666FCE1044EEB3164FE55F172E9FEB474851DDD64E41
24,697,177 UART: [art] SIG.S = 9EC130BAB8FFB686943D8B241491B4B7A4639B93069B37FB6A4FC66014AB2B3AD5811F1DB00F45DFA2F1C5E15926F960
25,676,665 UART: Caliptra RT
25,677,379 UART: [state] CFI Enabled
25,810,701 UART: [rt] RT listening for mailbox commands...
25,812,609 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,842,650 UART: [rt]cmd =0x44504543, len=24
25,869,733 >>> mbox cmd response data (40 bytes)
25,870,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,901,582 UART: [rt]cmd =0x44504543, len=96
25,944,989 >>> mbox cmd response data (56 bytes)
25,945,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,976,170 UART: [rt]cmd =0x44504543, len=96
26,019,212 >>> mbox cmd response data (56 bytes)
26,019,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,050,697 UART: [rt]cmd =0x44504543, len=96
26,094,276 >>> mbox cmd response data (56 bytes)
26,095,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,125,544 UART: [rt]cmd =0x44504543, len=96
26,168,883 >>> mbox cmd response data (56 bytes)
26,169,611 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,200,088 UART: [rt]cmd =0x44504543, len=96
26,244,120 >>> mbox cmd response data (56 bytes)
26,244,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,275,431 UART: [rt]cmd =0x44504543, len=96
26,319,875 >>> mbox cmd response data (56 bytes)
26,320,594 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,351,345 UART: [rt]cmd =0x44504543, len=96
26,396,168 >>> mbox cmd response data (56 bytes)
26,396,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,427,476 UART: [rt]cmd =0x44504543, len=96
26,473,049 >>> mbox cmd response data (56 bytes)
26,473,943 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,504,426 UART: [rt]cmd =0x44504543, len=96
26,548,865 >>> mbox cmd response data (56 bytes)
26,549,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,580,087 UART: [rt]cmd =0x44504543, len=96
26,625,698 >>> mbox cmd response data (56 bytes)
26,626,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,656,731 UART: [rt]cmd =0x44504543, len=96
26,702,714 >>> mbox cmd response data (56 bytes)
26,703,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,733,788 UART: [rt]cmd =0x44504543, len=96
26,780,360 >>> mbox cmd response data (56 bytes)
26,781,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,811,421 UART: [rt]cmd =0x44504543, len=96
26,857,939 >>> mbox cmd response data (56 bytes)
26,858,629 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,889,220 UART: [rt]cmd =0x44504543, len=96
26,935,846 >>> mbox cmd response data (56 bytes)
26,936,531 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,967,128 UART: [rt]cmd =0x44504543, len=96
27,015,326 >>> mbox cmd response data (56 bytes)
27,016,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,046,520 UART: [rt]cmd =0x44504543, len=96
27,053,390 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,147 UART:
192,506 UART: Running Caliptra ROM ...
193,618 UART:
193,764 UART: [state] CFI Enabled
263,913 UART: [state] LifecycleState = Unprovisioned
266,334 UART: [state] DebugLocked = No
268,007 UART: [state] WD Timer not started. Device not locked for debugging
272,028 UART: [kat] SHA2-256
461,865 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,670 UART: [kat] ++
473,143 UART: [kat] sha1
483,662 UART: [kat] SHA2-256
486,668 UART: [kat] SHA2-384
493,294 UART: [kat] SHA2-512-ACC
495,868 UART: [kat] ECC-384
2,950,025 UART: [kat] HMAC-384Kdf
2,974,627 UART: [kat] LMS
3,506,365 UART: [kat] --
3,512,418 UART: [cold-reset] ++
3,513,776 UART: [fht] FHT @ 0x50003400
3,525,743 UART: [idev] ++
3,526,453 UART: [idev] CDI.KEYID = 6
3,527,450 UART: [idev] SUBJECT.KEYID = 7
3,528,550 UART: [idev] UDS.KEYID = 0
3,529,471 ready_for_fw is high
3,529,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,730 UART: [idev] Erasing UDS.KEYID = 0
6,027,311 UART: [idev] Sha1 KeyId Algorithm
6,049,282 UART: [idev] --
6,054,249 UART: [ldev] ++
6,054,930 UART: [ldev] CDI.KEYID = 6
6,055,897 UART: [ldev] SUBJECT.KEYID = 5
6,057,054 UART: [ldev] AUTHORITY.KEYID = 7
6,058,291 UART: [ldev] FE.KEYID = 1
6,104,044 UART: [ldev] Erasing FE.KEYID = 1
8,608,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,095 UART: [ldev] --
10,417,219 UART: [fwproc] Wait for Commands...
10,420,223 UART: [fwproc] Recv command 0x46574c44
10,422,472 UART: [fwproc] Recv'd Img size: 118548 bytes
13,927,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,005,936 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,129,546 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,689,466 >>> mbox cmd response: success
14,693,549 UART: [afmc] ++
14,694,274 UART: [afmc] CDI.KEYID = 6
14,695,460 UART: [afmc] SUBJECT.KEYID = 7
14,696,909 UART: [afmc] AUTHORITY.KEYID = 5
17,240,541 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,984,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,986,041 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,001,195 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,016,309 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,031,215 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,055,045 UART: [afmc] --
19,059,450 UART: [cold-reset] --
19,063,042 UART: [state] Locking Datavault
19,067,497 UART: [state] Locking PCR0, PCR1 and PCR31
19,069,682 UART: [state] Locking ICCM
19,071,772 UART: [exit] Launching FMC @ 0x40000130
19,080,450 UART:
19,080,685 UART: Running Caliptra FMC ...
19,081,709 UART:
19,081,858 UART: [state] CFI Enabled
19,140,261 UART: [fht] FMC Alias Private Key: 7
20,906,465 UART: [art] Extend RT PCRs Done
20,907,707 UART: [art] Lock RT PCRs Done
20,909,116 UART: [art] Populate DV Done
20,914,343 UART: [fht] FMC Alias Private Key: 7
20,916,048 UART: [art] Derive CDI
20,916,873 UART: [art] Store in slot 0x4
20,972,734 UART: [art] Derive Key Pair
20,973,732 UART: [art] Store priv key in slot 0x5
23,436,268 UART: [art] Derive Key Pair - Done
23,449,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,162,393 UART: [art] Erasing AUTHORITY.KEYID = 7
25,163,904 UART: [art] PUB.X = A7B4DB58465DF39441C62B2F2C73C31B3F8B2F37A773A0A57AE27B54D582F67CDB9FD8EB119A9516211EAEF42A9D0BF9
25,171,132 UART: [art] PUB.Y = F5832E5879A99F46F8B4392DC1A26F96BE8DA879BE27AED287B096AECC97BF82BC6FB53250E085EE374D207CA1241095
25,178,452 UART: [art] SIG.R = 563DA0F1EC9A2B66F9B4890612D4C6AE580C72CE0AD335B0CA7152CE142F6BB8836D6EF7CB66C9F6B9883E5A372513BD
25,185,816 UART: [art] SIG.S = 0F2E5E1D73E6DD4F210B3FB62D8D363988295A8070C9B0CDB079189963B79A8033399B672B70A4A406EC2A731511B7EB
26,164,883 UART: Caliptra RT
26,165,577 UART: [state] CFI Enabled
26,345,578 UART: [rt] RT listening for mailbox commands...
26,347,507 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,377,531 UART: [rt]cmd =0x44504543, len=24
26,406,396 >>> mbox cmd response data (40 bytes)
26,407,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,438,353 UART: [rt]cmd =0x44504543, len=96
26,498,608 >>> mbox cmd response data (56 bytes)
26,499,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,530,149 UART: [rt]cmd =0x44504543, len=96
26,605,782 >>> mbox cmd response data (56 bytes)
26,606,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,636,997 UART: [rt]cmd =0x44504543, len=96
26,712,522 >>> mbox cmd response data (56 bytes)
26,713,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,743,764 UART: [rt]cmd =0x44504543, len=96
26,819,278 >>> mbox cmd response data (56 bytes)
26,820,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,850,473 UART: [rt]cmd =0x44504543, len=96
26,926,010 >>> mbox cmd response data (56 bytes)
26,926,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,957,483 UART: [rt]cmd =0x44504543, len=96
27,032,982 >>> mbox cmd response data (56 bytes)
27,033,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,064,093 UART: [rt]cmd =0x44504543, len=96
27,139,977 >>> mbox cmd response data (56 bytes)
27,140,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,171,187 UART: [rt]cmd =0x44504543, len=96
27,246,871 >>> mbox cmd response data (56 bytes)
27,247,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,278,242 UART: [rt]cmd =0x44504543, len=96
27,352,983 >>> mbox cmd response data (56 bytes)
27,353,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,384,441 UART: [rt]cmd =0x44504543, len=96
27,459,793 >>> mbox cmd response data (56 bytes)
27,460,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,491,053 UART: [rt]cmd =0x44504543, len=96
27,566,578 >>> mbox cmd response data (56 bytes)
27,567,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,597,616 UART: [rt]cmd =0x44504543, len=96
27,672,631 >>> mbox cmd response data (56 bytes)
27,673,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,703,886 UART: [rt]cmd =0x44504543, len=96
27,779,927 >>> mbox cmd response data (56 bytes)
27,780,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,811,462 UART: [rt]cmd =0x44504543, len=96
27,886,714 >>> mbox cmd response data (56 bytes)
27,887,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,917,976 UART: [rt]cmd =0x44504543, len=96
27,993,767 >>> mbox cmd response data (56 bytes)
27,994,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,024,701 UART: [rt]cmd =0x44504543, len=96
28,031,877 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,438,286 ready_for_fw is high
3,438,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,692 >>> mbox cmd response: success
19,117,298 UART:
19,117,726 UART: Running Caliptra FMC ...
19,118,875 UART:
19,119,040 UART: [state] CFI Enabled
19,183,156 UART: [fht] FMC Alias Private Key: 7
20,949,137 UART: [art] Extend RT PCRs Done
20,950,371 UART: [art] Lock RT PCRs Done
20,952,062 UART: [art] Populate DV Done
20,957,695 UART: [fht] FMC Alias Private Key: 7
20,959,340 UART: [art] Derive CDI
20,960,154 UART: [art] Store in slot 0x4
21,015,462 UART: [art] Derive Key Pair
21,016,512 UART: [art] Store priv key in slot 0x5
23,480,279 UART: [art] Derive Key Pair - Done
23,493,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,736 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,266 UART: [art] PUB.X = 10C2A74CB2E4D49439BCB3A23878E239AAB1F1F53D5BED93108CECB5E4883F5CA72EC9911B8C532DE8F56C9B2FB2F703
25,214,538 UART: [art] PUB.Y = 221469A63C57209E63AFA2CA19658E83F221213FF97CD33CD8FE8C741EA0E423A97DDFA5E4425542A1AE4359C84D913A
25,221,806 UART: [art] SIG.R = B8CB986869A1EE992C8954B826E2A0475761D57918ECE8692478388B8E211634699885A727957262F6FFE8BA468FC923
25,229,189 UART: [art] SIG.S = E6C5A84A30D7186C73BB6E7FF7730AB7B133FB39B8787A375CEF740A3815B9D388801121EDAE77C94D132282003260EE
26,208,148 UART: Caliptra RT
26,208,860 UART: [state] CFI Enabled
26,389,580 UART: [rt] RT listening for mailbox commands...
26,391,509 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,421,534 UART: [rt]cmd =0x44504543, len=24
26,449,721 >>> mbox cmd response data (40 bytes)
26,450,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,481,741 UART: [rt]cmd =0x44504543, len=96
26,541,331 >>> mbox cmd response data (56 bytes)
26,542,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,572,366 UART: [rt]cmd =0x44504543, len=96
26,648,081 >>> mbox cmd response data (56 bytes)
26,648,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,679,422 UART: [rt]cmd =0x44504543, len=96
26,754,835 >>> mbox cmd response data (56 bytes)
26,755,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,786,260 UART: [rt]cmd =0x44504543, len=96
26,861,832 >>> mbox cmd response data (56 bytes)
26,862,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,893,153 UART: [rt]cmd =0x44504543, len=96
26,969,231 >>> mbox cmd response data (56 bytes)
26,969,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,000,481 UART: [rt]cmd =0x44504543, len=96
27,075,994 >>> mbox cmd response data (56 bytes)
27,076,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,107,190 UART: [rt]cmd =0x44504543, len=96
27,182,891 >>> mbox cmd response data (56 bytes)
27,183,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,214,262 UART: [rt]cmd =0x44504543, len=96
27,289,702 >>> mbox cmd response data (56 bytes)
27,290,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,320,929 UART: [rt]cmd =0x44504543, len=96
27,396,563 >>> mbox cmd response data (56 bytes)
27,397,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,427,866 UART: [rt]cmd =0x44504543, len=96
27,503,680 >>> mbox cmd response data (56 bytes)
27,504,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,535,052 UART: [rt]cmd =0x44504543, len=96
27,610,340 >>> mbox cmd response data (56 bytes)
27,611,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,641,487 UART: [rt]cmd =0x44504543, len=96
27,717,403 >>> mbox cmd response data (56 bytes)
27,718,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,748,683 UART: [rt]cmd =0x44504543, len=96
27,824,000 >>> mbox cmd response data (56 bytes)
27,824,734 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,855,375 UART: [rt]cmd =0x44504543, len=96
27,931,031 >>> mbox cmd response data (56 bytes)
27,931,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,962,503 UART: [rt]cmd =0x44504543, len=96
28,037,865 >>> mbox cmd response data (56 bytes)
28,038,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,068,953 UART: [rt]cmd =0x44504543, len=96
28,075,674 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
192,507 UART:
192,877 UART: Running Caliptra ROM ...
194,072 UART:
603,679 UART: [state] CFI Enabled
617,023 UART: [state] LifecycleState = Unprovisioned
619,379 UART: [state] DebugLocked = No
621,329 UART: [state] WD Timer not started. Device not locked for debugging
626,520 UART: [kat] SHA2-256
816,421 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,179 UART: [kat] ++
827,705 UART: [kat] sha1
840,284 UART: [kat] SHA2-256
843,304 UART: [kat] SHA2-384
849,229 UART: [kat] SHA2-512-ACC
851,824 UART: [kat] ECC-384
3,291,191 UART: [kat] HMAC-384Kdf
3,304,637 UART: [kat] LMS
3,836,409 UART: [kat] --
3,840,856 UART: [cold-reset] ++
3,842,867 UART: [fht] FHT @ 0x50003400
3,854,700 UART: [idev] ++
3,855,343 UART: [idev] CDI.KEYID = 6
3,856,325 UART: [idev] SUBJECT.KEYID = 7
3,857,503 UART: [idev] UDS.KEYID = 0
3,858,430 ready_for_fw is high
3,858,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,518 UART: [idev] Erasing UDS.KEYID = 0
6,336,066 UART: [idev] Sha1 KeyId Algorithm
6,358,595 UART: [idev] --
6,363,831 UART: [ldev] ++
6,364,518 UART: [ldev] CDI.KEYID = 6
6,365,409 UART: [ldev] SUBJECT.KEYID = 5
6,366,626 UART: [ldev] AUTHORITY.KEYID = 7
6,367,759 UART: [ldev] FE.KEYID = 1
6,377,278 UART: [ldev] Erasing FE.KEYID = 1
8,853,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,723 UART: [ldev] --
10,646,742 UART: [fwproc] Wait for Commands...
10,649,221 UART: [fwproc] Recv command 0x46574c44
10,651,477 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,793 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,400 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,485 >>> mbox cmd response: success
14,921,419 UART: [afmc] ++
14,922,159 UART: [afmc] CDI.KEYID = 6
14,923,354 UART: [afmc] SUBJECT.KEYID = 7
14,924,803 UART: [afmc] AUTHORITY.KEYID = 5
17,424,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,075 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,163,193 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,325 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,193,276 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,957 UART: [afmc] --
19,219,776 UART: [cold-reset] --
19,221,822 UART: [state] Locking Datavault
19,228,765 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,927 UART: [state] Locking ICCM
19,232,928 UART: [exit] Launching FMC @ 0x40000130
19,241,619 UART:
19,241,860 UART: Running Caliptra FMC ...
19,242,964 UART:
19,243,129 UART: [state] CFI Enabled
19,251,126 UART: [fht] FMC Alias Private Key: 7
21,017,605 UART: [art] Extend RT PCRs Done
21,018,824 UART: [art] Lock RT PCRs Done
21,020,455 UART: [art] Populate DV Done
21,025,714 UART: [fht] FMC Alias Private Key: 7
21,027,226 UART: [art] Derive CDI
21,027,998 UART: [art] Store in slot 0x4
21,070,598 UART: [art] Derive Key Pair
21,071,612 UART: [art] Store priv key in slot 0x5
23,497,784 UART: [art] Derive Key Pair - Done
23,510,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,832 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,339 UART: [art] PUB.X = 5C85EF0C719CA15FE70E8ACE692E1222FC22A15453E9FF438769D9D146114F5B89DAD95C3069BE4C9D1D374B31356E41
25,225,607 UART: [art] PUB.Y = 3843727D484187C4AC57381C059E1D67F740C5C30AC2CD755FC8060ADAB33E9F83DA92AADD49A045A4784D485B55F948
25,232,865 UART: [art] SIG.R = 7B6F48640D655ACDAB4A9F4AA8B64C6DC0B089D113678DDD97A2141663B1D6FEEBFB2E55876D4C8FBD78EFF949DC665F
25,240,299 UART: [art] SIG.S = E3A44C506A1DB68F2CAA78C99041C5E5514D6AC7450CAECCC5E5C1537188634C0AB6E1E3EE1454B7481816D8880C96EF
26,219,470 UART: Caliptra RT
26,220,164 UART: [state] CFI Enabled
26,352,722 UART: [rt] RT listening for mailbox commands...
26,354,631 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,384,875 UART: [rt]cmd =0x44504543, len=24
26,412,632 >>> mbox cmd response data (40 bytes)
26,413,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,444,497 UART: [rt]cmd =0x44504543, len=96
26,487,467 >>> mbox cmd response data (56 bytes)
26,488,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,518,712 UART: [rt]cmd =0x44504543, len=96
26,561,763 >>> mbox cmd response data (56 bytes)
26,562,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,593,234 UART: [rt]cmd =0x44504543, len=96
26,636,254 >>> mbox cmd response data (56 bytes)
26,637,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,667,610 UART: [rt]cmd =0x44504543, len=96
26,711,053 >>> mbox cmd response data (56 bytes)
26,711,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,742,475 UART: [rt]cmd =0x44504543, len=96
26,786,932 >>> mbox cmd response data (56 bytes)
26,787,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,818,210 UART: [rt]cmd =0x44504543, len=96
26,862,497 >>> mbox cmd response data (56 bytes)
26,863,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,894,089 UART: [rt]cmd =0x44504543, len=96
26,939,031 >>> mbox cmd response data (56 bytes)
26,939,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,970,243 UART: [rt]cmd =0x44504543, len=96
27,015,606 >>> mbox cmd response data (56 bytes)
27,016,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,046,866 UART: [rt]cmd =0x44504543, len=96
27,093,364 >>> mbox cmd response data (56 bytes)
27,094,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,124,498 UART: [rt]cmd =0x44504543, len=96
27,170,167 >>> mbox cmd response data (56 bytes)
27,170,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,201,643 UART: [rt]cmd =0x44504543, len=96
27,246,982 >>> mbox cmd response data (56 bytes)
27,247,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,278,168 UART: [rt]cmd =0x44504543, len=96
27,324,588 >>> mbox cmd response data (56 bytes)
27,325,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,355,976 UART: [rt]cmd =0x44504543, len=96
27,402,300 >>> mbox cmd response data (56 bytes)
27,403,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,433,509 UART: [rt]cmd =0x44504543, len=96
27,480,572 >>> mbox cmd response data (56 bytes)
27,481,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,511,971 UART: [rt]cmd =0x44504543, len=96
27,559,090 >>> mbox cmd response data (56 bytes)
27,559,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,590,440 UART: [rt]cmd =0x44504543, len=96
27,597,062 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
984 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,216 writing to cptra_bootfsm_go
3,760,302 ready_for_fw is high
3,760,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,051,973 >>> mbox cmd response: success
19,304,818 UART:
19,305,257 UART: Running Caliptra FMC ...
19,306,380 UART:
19,306,535 UART: [state] CFI Enabled
19,314,570 UART: [fht] FMC Alias Private Key: 7
21,080,392 UART: [art] Extend RT PCRs Done
21,081,633 UART: [art] Lock RT PCRs Done
21,083,143 UART: [art] Populate DV Done
21,088,582 UART: [fht] FMC Alias Private Key: 7
21,090,084 UART: [art] Derive CDI
21,090,829 UART: [art] Store in slot 0x4
21,133,785 UART: [art] Derive Key Pair
21,134,832 UART: [art] Store priv key in slot 0x5
23,561,910 UART: [art] Derive Key Pair - Done
23,575,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,385 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,905 UART: [art] PUB.X = 324118CB42C2B14BE5E96860AEAD5BC67AB43C66ED66F221FA8D3238AB0CE521431C760A30E8DFA9CC0D32891FDB3183
25,290,216 UART: [art] PUB.Y = 31E2FEF4FBDB40B9E1B2E523D1BCFD5E41724B07E43797BA0D09F68F30D2EFCA63E67CF7D19182459807000F634FAF03
25,297,461 UART: [art] SIG.R = A7C951E42F9CE53A3789B8884E4A839D802476BCC58336B3B553ED27186FA1C9DEE3FE50587053CF90A8CB9D45D5141E
25,304,838 UART: [art] SIG.S = DCCA05A148F65EFC0AAA9938FD246BFE93B58FEB885F9780E8E7E8082B685BF8BED51C45B55D7CDE9388A010C6170EFE
26,284,224 UART: Caliptra RT
26,284,930 UART: [state] CFI Enabled
26,417,354 UART: [rt] RT listening for mailbox commands...
26,419,292 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,449,261 UART: [rt]cmd =0x44504543, len=24
26,476,755 >>> mbox cmd response data (40 bytes)
26,477,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,508,578 UART: [rt]cmd =0x44504543, len=96
26,551,170 >>> mbox cmd response data (56 bytes)
26,551,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,582,639 UART: [rt]cmd =0x44504543, len=96
26,626,473 >>> mbox cmd response data (56 bytes)
26,627,184 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,657,836 UART: [rt]cmd =0x44504543, len=96
26,701,509 >>> mbox cmd response data (56 bytes)
26,702,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,732,918 UART: [rt]cmd =0x44504543, len=96
26,777,261 >>> mbox cmd response data (56 bytes)
26,777,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,808,448 UART: [rt]cmd =0x44504543, len=96
26,853,242 >>> mbox cmd response data (56 bytes)
26,853,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,884,376 UART: [rt]cmd =0x44504543, len=96
26,928,634 >>> mbox cmd response data (56 bytes)
26,929,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,959,997 UART: [rt]cmd =0x44504543, len=96
27,005,394 >>> mbox cmd response data (56 bytes)
27,006,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,036,533 UART: [rt]cmd =0x44504543, len=96
27,081,905 >>> mbox cmd response data (56 bytes)
27,082,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,113,327 UART: [rt]cmd =0x44504543, len=96
27,158,053 >>> mbox cmd response data (56 bytes)
27,158,783 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,189,317 UART: [rt]cmd =0x44504543, len=96
27,234,364 >>> mbox cmd response data (56 bytes)
27,235,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,265,737 UART: [rt]cmd =0x44504543, len=96
27,311,919 >>> mbox cmd response data (56 bytes)
27,312,642 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,343,337 UART: [rt]cmd =0x44504543, len=96
27,389,533 >>> mbox cmd response data (56 bytes)
27,390,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,420,752 UART: [rt]cmd =0x44504543, len=96
27,467,156 >>> mbox cmd response data (56 bytes)
27,467,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,498,355 UART: [rt]cmd =0x44504543, len=96
27,544,691 >>> mbox cmd response data (56 bytes)
27,545,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,575,947 UART: [rt]cmd =0x44504543, len=96
27,623,147 >>> mbox cmd response data (56 bytes)
27,623,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,654,348 UART: [rt]cmd =0x44504543, len=96
27,661,411 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,187 UART: [kat] SHA2-256
882,118 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,233 UART: [kat] ++
886,385 UART: [kat] sha1
890,549 UART: [kat] SHA2-256
892,487 UART: [kat] SHA2-384
895,296 UART: [kat] SHA2-512-ACC
897,197 UART: [kat] ECC-384
902,790 UART: [kat] HMAC-384Kdf
907,372 UART: [kat] LMS
1,475,568 UART: [kat] --
1,476,651 UART: [cold-reset] ++
1,477,217 UART: [fht] Storing FHT @ 0x50003400
1,480,020 UART: [idev] ++
1,480,188 UART: [idev] CDI.KEYID = 6
1,480,548 UART: [idev] SUBJECT.KEYID = 7
1,480,972 UART: [idev] UDS.KEYID = 0
1,481,317 ready_for_fw is high
1,481,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,858 UART: [idev] Erasing UDS.KEYID = 0
1,505,464 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,266 UART: [idev] --
1,515,295 UART: [ldev] ++
1,515,463 UART: [ldev] CDI.KEYID = 6
1,515,826 UART: [ldev] SUBJECT.KEYID = 5
1,516,252 UART: [ldev] AUTHORITY.KEYID = 7
1,516,715 UART: [ldev] FE.KEYID = 1
1,521,591 UART: [ldev] Erasing FE.KEYID = 1
1,547,214 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,880 UART: [ldev] --
1,586,179 UART: [fwproc] Waiting for Commands...
1,586,804 UART: [fwproc] Received command 0x46574c44
1,587,595 UART: [fwproc] Received Image of size 118548 bytes
2,933,183 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,919 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,137 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,552 >>> mbox cmd response: success
3,133,762 UART: [afmc] ++
3,133,930 UART: [afmc] CDI.KEYID = 6
3,134,292 UART: [afmc] SUBJECT.KEYID = 7
3,134,717 UART: [afmc] AUTHORITY.KEYID = 5
3,169,852 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,410 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,190 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,899 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,782 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,465 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,559 UART: [afmc] --
3,213,513 UART: [cold-reset] --
3,214,251 UART: [state] Locking Datavault
3,215,294 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,898 UART: [state] Locking ICCM
3,216,552 UART: [exit] Launching FMC @ 0x40000130
3,221,882 UART:
3,221,898 UART: Running Caliptra FMC ...
3,222,306 UART:
3,222,360 UART: [state] CFI Enabled
3,233,400 UART: [fht] FMC Alias Private Key: 7
3,352,164 UART: [art] Extend RT PCRs Done
3,352,592 UART: [art] Lock RT PCRs Done
3,354,022 UART: [art] Populate DV Done
3,362,431 UART: [fht] FMC Alias Private Key: 7
3,363,537 UART: [art] Derive CDI
3,363,817 UART: [art] Store in slot 0x4
3,449,515 UART: [art] Derive Key Pair
3,449,875 UART: [art] Store priv key in slot 0x5
3,463,056 UART: [art] Derive Key Pair - Done
3,477,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,811 UART: [art] PUB.X = 6DBAA32F192CCF026EC827E675C02BB3D3F0DC349DE1A90A90BD0D7FCFA774DBA25DBB919858D6BF08C2D01141715079
3,500,587 UART: [art] PUB.Y = 1FF1C0A5C32C7D0E03C1813411B52E7C9F43757FA328E31456F5FE8FB44FAF5C59B0326D9539C1139C3B53CFD2F05C98
3,507,539 UART: [art] SIG.R = FBC146A79E7C29A2EEC67ECD67D06E7D554F9BB697AFAFC161C79E6CC577CA37DAFE4769C6930FDC002CA8B48722D3C5
3,514,308 UART: [art] SIG.S = 74A71CFB8D054D5068599729DA5B8ECCCAE2E2B0C269658AFABD0665B4577D5A885AA46CE65EDA6B251621B50B4680CB
3,538,235 UART: Caliptra RT
3,538,486 UART: [state] CFI Enabled
3,658,555 UART: [rt] RT listening for mailbox commands...
3,659,225 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,371 UART: [rt]cmd =0x44504543, len=24
3,717,059 >>> mbox cmd response data (40 bytes)
3,717,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,747,183 UART: [rt]cmd =0x44504543, len=96
3,790,304 >>> mbox cmd response data (56 bytes)
3,790,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,240 UART: [rt]cmd =0x44504543, len=96
3,863,329 >>> mbox cmd response data (56 bytes)
3,863,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,347 UART: [rt]cmd =0x44504543, len=96
3,937,049 >>> mbox cmd response data (56 bytes)
3,937,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,967,117 UART: [rt]cmd =0x44504543, len=96
4,010,600 >>> mbox cmd response data (56 bytes)
4,010,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,040,402 UART: [rt]cmd =0x44504543, len=96
4,083,632 >>> mbox cmd response data (56 bytes)
4,083,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,113,374 UART: [rt]cmd =0x44504543, len=96
4,157,461 >>> mbox cmd response data (56 bytes)
4,157,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,187,173 UART: [rt]cmd =0x44504543, len=96
4,231,569 >>> mbox cmd response data (56 bytes)
4,231,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,261,565 UART: [rt]cmd =0x44504543, len=96
4,306,356 >>> mbox cmd response data (56 bytes)
4,306,357 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,336,230 UART: [rt]cmd =0x44504543, len=96
4,381,324 >>> mbox cmd response data (56 bytes)
4,381,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,411,138 UART: [rt]cmd =0x44504543, len=96
4,456,723 >>> mbox cmd response data (56 bytes)
4,456,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,486,797 UART: [rt]cmd =0x44504543, len=96
4,532,443 >>> mbox cmd response data (56 bytes)
4,532,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,562,191 UART: [rt]cmd =0x44504543, len=96
4,607,516 >>> mbox cmd response data (56 bytes)
4,607,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,637,392 UART: [rt]cmd =0x44504543, len=96
4,684,136 >>> mbox cmd response data (56 bytes)
4,684,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,714,114 UART: [rt]cmd =0x44504543, len=96
4,760,743 >>> mbox cmd response data (56 bytes)
4,760,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,790,653 UART: [rt]cmd =0x44504543, len=96
4,837,753 >>> mbox cmd response data (56 bytes)
4,837,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,867,855 UART: [rt]cmd =0x44504543, len=96
4,875,093 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,199 ready_for_fw is high
1,362,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,246 >>> mbox cmd response: success
3,041,971 UART:
3,041,987 UART: Running Caliptra FMC ...
3,042,395 UART:
3,042,449 UART: [state] CFI Enabled
3,052,811 UART: [fht] FMC Alias Private Key: 7
3,171,647 UART: [art] Extend RT PCRs Done
3,172,075 UART: [art] Lock RT PCRs Done
3,173,729 UART: [art] Populate DV Done
3,182,044 UART: [fht] FMC Alias Private Key: 7
3,182,984 UART: [art] Derive CDI
3,183,264 UART: [art] Store in slot 0x4
3,269,268 UART: [art] Derive Key Pair
3,269,628 UART: [art] Store priv key in slot 0x5
3,282,399 UART: [art] Derive Key Pair - Done
3,297,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,089 UART: [art] PUB.X = DA409A9A62F4406A3A3BA47E4545B216EEF8123014BD8DB201C8E2ADC7C314FD6AADB72C8E1AF2EADC485CC924A07D59
3,319,878 UART: [art] PUB.Y = 23968FC713FE60BB84C2FAAE1BAE9119AD9280513162693BC816311029AC166113A3F9B68CD245760A7BC3D67329A41F
3,326,825 UART: [art] SIG.R = 5D43C76B7B90279869E15AA11033DB1267D2D3418AECA77B3941CF78529F4E36B0E7E2538B3DFDE0B5D79768348A454A
3,333,597 UART: [art] SIG.S = 234128659FD835E5AFA78B70531F604AF705C3577DA9CABEE4D9EA241CA4971B7F3421C16A41BDE006BE992264A04B32
3,357,437 UART: Caliptra RT
3,357,688 UART: [state] CFI Enabled
3,477,818 UART: [rt] RT listening for mailbox commands...
3,478,488 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,614 UART: [rt]cmd =0x44504543, len=24
3,535,786 >>> mbox cmd response data (40 bytes)
3,535,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,565,646 UART: [rt]cmd =0x44504543, len=96
3,608,373 >>> mbox cmd response data (56 bytes)
3,608,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,489 UART: [rt]cmd =0x44504543, len=96
3,681,772 >>> mbox cmd response data (56 bytes)
3,681,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,760 UART: [rt]cmd =0x44504543, len=96
3,754,908 >>> mbox cmd response data (56 bytes)
3,754,909 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,784,668 UART: [rt]cmd =0x44504543, len=96
3,828,447 >>> mbox cmd response data (56 bytes)
3,828,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,858,445 UART: [rt]cmd =0x44504543, len=96
3,902,589 >>> mbox cmd response data (56 bytes)
3,902,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,932,573 UART: [rt]cmd =0x44504543, len=96
3,976,892 >>> mbox cmd response data (56 bytes)
3,976,893 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,912 UART: [rt]cmd =0x44504543, len=96
4,050,936 >>> mbox cmd response data (56 bytes)
4,050,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,080,858 UART: [rt]cmd =0x44504543, len=96
4,126,455 >>> mbox cmd response data (56 bytes)
4,126,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,156,645 UART: [rt]cmd =0x44504543, len=96
4,202,219 >>> mbox cmd response data (56 bytes)
4,202,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,232,139 UART: [rt]cmd =0x44504543, len=96
4,277,880 >>> mbox cmd response data (56 bytes)
4,277,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,307,898 UART: [rt]cmd =0x44504543, len=96
4,353,976 >>> mbox cmd response data (56 bytes)
4,353,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,383,994 UART: [rt]cmd =0x44504543, len=96
4,429,591 >>> mbox cmd response data (56 bytes)
4,429,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,459,283 UART: [rt]cmd =0x44504543, len=96
4,505,167 >>> mbox cmd response data (56 bytes)
4,505,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,535,427 UART: [rt]cmd =0x44504543, len=96
4,581,998 >>> mbox cmd response data (56 bytes)
4,581,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,612,124 UART: [rt]cmd =0x44504543, len=96
4,659,164 >>> mbox cmd response data (56 bytes)
4,659,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,689,364 UART: [rt]cmd =0x44504543, len=96
4,696,662 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,582 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,310 UART: [kat] SHA2-256
882,241 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,356 UART: [kat] ++
886,508 UART: [kat] sha1
890,940 UART: [kat] SHA2-256
892,878 UART: [kat] SHA2-384
895,455 UART: [kat] SHA2-512-ACC
897,356 UART: [kat] ECC-384
903,037 UART: [kat] HMAC-384Kdf
907,687 UART: [kat] LMS
1,475,883 UART: [kat] --
1,476,696 UART: [cold-reset] ++
1,477,042 UART: [fht] Storing FHT @ 0x50003400
1,480,005 UART: [idev] ++
1,480,173 UART: [idev] CDI.KEYID = 6
1,480,533 UART: [idev] SUBJECT.KEYID = 7
1,480,957 UART: [idev] UDS.KEYID = 0
1,481,302 ready_for_fw is high
1,481,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,753 UART: [idev] Erasing UDS.KEYID = 0
1,505,367 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,023 UART: [idev] --
1,515,050 UART: [ldev] ++
1,515,218 UART: [ldev] CDI.KEYID = 6
1,515,581 UART: [ldev] SUBJECT.KEYID = 5
1,516,007 UART: [ldev] AUTHORITY.KEYID = 7
1,516,470 UART: [ldev] FE.KEYID = 1
1,522,034 UART: [ldev] Erasing FE.KEYID = 1
1,547,895 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,963 UART: [ldev] --
1,587,426 UART: [fwproc] Waiting for Commands...
1,588,203 UART: [fwproc] Received command 0x46574c44
1,588,994 UART: [fwproc] Received Image of size 118548 bytes
2,933,022 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,832 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,050 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,417 >>> mbox cmd response: success
3,133,673 UART: [afmc] ++
3,133,841 UART: [afmc] CDI.KEYID = 6
3,134,203 UART: [afmc] SUBJECT.KEYID = 7
3,134,628 UART: [afmc] AUTHORITY.KEYID = 5
3,169,675 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,663 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,443 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,152 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,035 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,718 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,406 UART: [afmc] --
3,212,460 UART: [cold-reset] --
3,213,428 UART: [state] Locking Datavault
3,214,555 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,159 UART: [state] Locking ICCM
3,215,799 UART: [exit] Launching FMC @ 0x40000130
3,221,129 UART:
3,221,145 UART: Running Caliptra FMC ...
3,221,553 UART:
3,221,696 UART: [state] CFI Enabled
3,232,112 UART: [fht] FMC Alias Private Key: 7
3,350,994 UART: [art] Extend RT PCRs Done
3,351,422 UART: [art] Lock RT PCRs Done
3,353,032 UART: [art] Populate DV Done
3,361,039 UART: [fht] FMC Alias Private Key: 7
3,362,151 UART: [art] Derive CDI
3,362,431 UART: [art] Store in slot 0x4
3,448,445 UART: [art] Derive Key Pair
3,448,805 UART: [art] Store priv key in slot 0x5
3,461,820 UART: [art] Derive Key Pair - Done
3,476,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,839 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,604 UART: [art] PUB.X = 92070C4BEDABB4B657BA78F7CC0F0F5F07E847C8A8F9536A1B17E8AC96D3C49D19BC9CE9177B73C75134428C567E93A1
3,499,371 UART: [art] PUB.Y = 3144587FEECC8BA2E2F6931CF2FF3CD07E0CE70F3796F3CF3630BDA234DFD980742E3466C851F9650D121F7002EE2ABF
3,506,323 UART: [art] SIG.R = FAFBD10E96F79EB34A09D1B70430CC2582D960A705ECD029FD39CDA43A862D00A2AEF39459A0A79E53EBE85804E29A96
3,513,070 UART: [art] SIG.S = 59DDB49994251A0C54E70D4087EF7769971AE178204DAE76C2BC5E10D38CDC88A78BAA2E54AB7AEDC7A73AF621CE6C9D
3,537,156 UART: Caliptra RT
3,537,499 UART: [state] CFI Enabled
3,657,146 UART: [rt] RT listening for mailbox commands...
3,657,816 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,930 UART: [rt]cmd =0x44504543, len=24
3,715,192 >>> mbox cmd response data (40 bytes)
3,715,193 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,745,394 UART: [rt]cmd =0x44504543, len=96
3,788,511 >>> mbox cmd response data (56 bytes)
3,788,512 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,619 UART: [rt]cmd =0x44504543, len=96
3,862,094 >>> mbox cmd response data (56 bytes)
3,862,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,728 UART: [rt]cmd =0x44504543, len=96
3,934,672 >>> mbox cmd response data (56 bytes)
3,934,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,964,918 UART: [rt]cmd =0x44504543, len=96
4,009,389 >>> mbox cmd response data (56 bytes)
4,009,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,039,131 UART: [rt]cmd =0x44504543, len=96
4,083,623 >>> mbox cmd response data (56 bytes)
4,083,624 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,113,673 UART: [rt]cmd =0x44504543, len=96
4,157,892 >>> mbox cmd response data (56 bytes)
4,157,893 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,187,812 UART: [rt]cmd =0x44504543, len=96
4,232,664 >>> mbox cmd response data (56 bytes)
4,232,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,262,550 UART: [rt]cmd =0x44504543, len=96
4,307,135 >>> mbox cmd response data (56 bytes)
4,307,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,337,121 UART: [rt]cmd =0x44504543, len=96
4,382,151 >>> mbox cmd response data (56 bytes)
4,382,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,412,239 UART: [rt]cmd =0x44504543, len=96
4,457,830 >>> mbox cmd response data (56 bytes)
4,457,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,487,706 UART: [rt]cmd =0x44504543, len=96
4,533,884 >>> mbox cmd response data (56 bytes)
4,533,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,564,040 UART: [rt]cmd =0x44504543, len=96
4,610,245 >>> mbox cmd response data (56 bytes)
4,610,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,640,329 UART: [rt]cmd =0x44504543, len=96
4,686,085 >>> mbox cmd response data (56 bytes)
4,686,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,716,309 UART: [rt]cmd =0x44504543, len=96
4,763,492 >>> mbox cmd response data (56 bytes)
4,763,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,793,538 UART: [rt]cmd =0x44504543, len=96
4,840,602 >>> mbox cmd response data (56 bytes)
4,840,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,870,624 UART: [rt]cmd =0x44504543, len=96
4,878,042 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,348 ready_for_fw is high
1,363,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,261 >>> mbox cmd response: success
3,044,468 UART:
3,044,484 UART: Running Caliptra FMC ...
3,044,892 UART:
3,045,035 UART: [state] CFI Enabled
3,055,701 UART: [fht] FMC Alias Private Key: 7
3,174,047 UART: [art] Extend RT PCRs Done
3,174,475 UART: [art] Lock RT PCRs Done
3,176,135 UART: [art] Populate DV Done
3,184,520 UART: [fht] FMC Alias Private Key: 7
3,185,502 UART: [art] Derive CDI
3,185,782 UART: [art] Store in slot 0x4
3,271,688 UART: [art] Derive Key Pair
3,272,048 UART: [art] Store priv key in slot 0x5
3,284,879 UART: [art] Derive Key Pair - Done
3,299,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,964 UART: [art] PUB.X = 1A30AC8444B28F313EC811A9DB069192775406A159E5B338B71D5B6ABFBC6FAED5B440AE8FEB9D1909F0E779B2F91C4B
3,322,739 UART: [art] PUB.Y = C09C917A4C87A4A3DEE37A992A338C743D5F6D5943E8233BB162EB425CA43ADA95AEB17B58D1ED6D1926C7680E46B700
3,329,674 UART: [art] SIG.R = D1084B692CD12AE45FE1DBFB06A54DF582F58776CE6682D42E721694A700ECF462131217CFB8B5456361CAEE62F302CD
3,336,421 UART: [art] SIG.S = F988424DD60B4A0757D5214EA215738875C45D39F82C1EB68CCE6887C37BAC5B2E45D5772E040FE99954C6F72E53EA39
3,359,825 UART: Caliptra RT
3,360,168 UART: [state] CFI Enabled
3,480,742 UART: [rt] RT listening for mailbox commands...
3,481,412 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,598 UART: [rt]cmd =0x44504543, len=24
3,538,918 >>> mbox cmd response data (40 bytes)
3,538,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,568,726 UART: [rt]cmd =0x44504543, len=96
3,611,159 >>> mbox cmd response data (56 bytes)
3,611,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,979 UART: [rt]cmd =0x44504543, len=96
3,684,322 >>> mbox cmd response data (56 bytes)
3,684,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,714,400 UART: [rt]cmd =0x44504543, len=96
3,757,710 >>> mbox cmd response data (56 bytes)
3,757,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,787,802 UART: [rt]cmd =0x44504543, len=96
3,832,105 >>> mbox cmd response data (56 bytes)
3,832,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,861,739 UART: [rt]cmd =0x44504543, len=96
3,905,477 >>> mbox cmd response data (56 bytes)
3,905,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,935,351 UART: [rt]cmd =0x44504543, len=96
3,980,176 >>> mbox cmd response data (56 bytes)
3,980,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,224 UART: [rt]cmd =0x44504543, len=96
4,055,162 >>> mbox cmd response data (56 bytes)
4,055,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,085,104 UART: [rt]cmd =0x44504543, len=96
4,129,521 >>> mbox cmd response data (56 bytes)
4,129,522 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,159,567 UART: [rt]cmd =0x44504543, len=96
4,205,007 >>> mbox cmd response data (56 bytes)
4,205,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,234,951 UART: [rt]cmd =0x44504543, len=96
4,280,830 >>> mbox cmd response data (56 bytes)
4,280,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,860 UART: [rt]cmd =0x44504543, len=96
4,356,312 >>> mbox cmd response data (56 bytes)
4,356,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,386,200 UART: [rt]cmd =0x44504543, len=96
4,431,879 >>> mbox cmd response data (56 bytes)
4,431,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,461,857 UART: [rt]cmd =0x44504543, len=96
4,507,705 >>> mbox cmd response data (56 bytes)
4,507,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,537,481 UART: [rt]cmd =0x44504543, len=96
4,584,238 >>> mbox cmd response data (56 bytes)
4,584,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,614,138 UART: [rt]cmd =0x44504543, len=96
4,660,956 >>> mbox cmd response data (56 bytes)
4,660,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,690,790 UART: [rt]cmd =0x44504543, len=96
4,698,178 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
891,380 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,283 UART: [kat] SHA2-512-ACC
906,184 UART: [kat] ECC-384
915,957 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,758 UART: [cold-reset] ++
1,170,212 UART: [fht] FHT @ 0x50003400
1,172,896 UART: [idev] ++
1,173,064 UART: [idev] CDI.KEYID = 6
1,173,425 UART: [idev] SUBJECT.KEYID = 7
1,173,850 UART: [idev] UDS.KEYID = 0
1,174,196 ready_for_fw is high
1,174,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,189 UART: [idev] Erasing UDS.KEYID = 0
1,198,443 UART: [idev] Sha1 KeyId Algorithm
1,207,371 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,215,002 UART: [ldev] Erasing FE.KEYID = 1
1,241,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,124 UART: [ldev] --
1,280,405 UART: [fwproc] Wait for Commands...
1,280,982 UART: [fwproc] Recv command 0x46574c44
1,281,715 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,415 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,590 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,965 >>> mbox cmd response: success
2,826,085 UART: [afmc] ++
2,826,253 UART: [afmc] CDI.KEYID = 6
2,826,616 UART: [afmc] SUBJECT.KEYID = 7
2,827,042 UART: [afmc] AUTHORITY.KEYID = 5
2,862,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,109 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,819 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,700 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,401 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,144 UART: [afmc] --
2,905,015 UART: [cold-reset] --
2,905,797 UART: [state] Locking Datavault
2,907,220 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,824 UART: [state] Locking ICCM
2,908,392 UART: [exit] Launching FMC @ 0x40000130
2,913,722 UART:
2,913,738 UART: Running Caliptra FMC ...
2,914,146 UART:
2,914,200 UART: [state] CFI Enabled
2,924,812 UART: [fht] FMC Alias Private Key: 7
3,043,608 UART: [art] Extend RT PCRs Done
3,044,036 UART: [art] Lock RT PCRs Done
3,045,686 UART: [art] Populate DV Done
3,053,811 UART: [fht] FMC Alias Private Key: 7
3,054,981 UART: [art] Derive CDI
3,055,261 UART: [art] Store in slot 0x4
3,141,014 UART: [art] Derive Key Pair
3,141,374 UART: [art] Store priv key in slot 0x5
3,154,356 UART: [art] Derive Key Pair - Done
3,168,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,755 UART: [art] PUB.X = A83EA9B034CBE84CA10D326AE9A308DA3A582F0897E42DED553360A1CB0FDD02852396E94C032EAE9F67B1F2505B6A18
3,191,519 UART: [art] PUB.Y = E91ABF7740388C8DA32A2606076853D0B91697356AC02E68AD5E0FFF8CD9502512B8F4AC0A6C268EA9E7A10CE5020426
3,198,452 UART: [art] SIG.R = 406B9E0E3CA5435915911002ED27753361B6A966C06F571035393A8BA0CAC3D66656A075EF30BB1DE33943FAE4E1CD21
3,205,216 UART: [art] SIG.S = 2E451DDF70FD0AF309B555ACFDE3FB324793F8DC805E7E48F5F31217E58244A78BC537DAD77CB6B36380E0211E80BF17
3,228,482 UART: Caliptra RT
3,228,733 UART: [state] CFI Enabled
3,348,794 UART: [rt] RT listening for mailbox commands...
3,349,464 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,298 UART: [rt]cmd =0x44504543, len=24
3,407,164 >>> mbox cmd response data (40 bytes)
3,407,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,288 UART: [rt]cmd =0x44504543, len=96
3,479,741 >>> mbox cmd response data (56 bytes)
3,479,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,631 UART: [rt]cmd =0x44504543, len=96
3,552,012 >>> mbox cmd response data (56 bytes)
3,552,013 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,581,982 UART: [rt]cmd =0x44504543, len=96
3,624,988 >>> mbox cmd response data (56 bytes)
3,624,989 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,654,962 UART: [rt]cmd =0x44504543, len=96
3,698,309 >>> mbox cmd response data (56 bytes)
3,698,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,728,285 UART: [rt]cmd =0x44504543, len=96
3,772,429 >>> mbox cmd response data (56 bytes)
3,772,430 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,802,227 UART: [rt]cmd =0x44504543, len=96
3,846,410 >>> mbox cmd response data (56 bytes)
3,846,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,876,310 UART: [rt]cmd =0x44504543, len=96
3,920,036 >>> mbox cmd response data (56 bytes)
3,920,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,016 UART: [rt]cmd =0x44504543, len=96
3,994,659 >>> mbox cmd response data (56 bytes)
3,994,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,649 UART: [rt]cmd =0x44504543, len=96
4,069,853 >>> mbox cmd response data (56 bytes)
4,069,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,099,785 UART: [rt]cmd =0x44504543, len=96
4,145,336 >>> mbox cmd response data (56 bytes)
4,145,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,175,314 UART: [rt]cmd =0x44504543, len=96
4,221,150 >>> mbox cmd response data (56 bytes)
4,221,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,251,160 UART: [rt]cmd =0x44504543, len=96
4,296,661 >>> mbox cmd response data (56 bytes)
4,296,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,326,755 UART: [rt]cmd =0x44504543, len=96
4,373,217 >>> mbox cmd response data (56 bytes)
4,373,218 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,403,323 UART: [rt]cmd =0x44504543, len=96
4,449,718 >>> mbox cmd response data (56 bytes)
4,449,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,479,678 UART: [rt]cmd =0x44504543, len=96
4,526,478 >>> mbox cmd response data (56 bytes)
4,526,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,556,208 UART: [rt]cmd =0x44504543, len=96
4,563,824 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,432 ready_for_fw is high
1,059,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,162 >>> mbox cmd response: success
2,740,961 UART:
2,740,977 UART: Running Caliptra FMC ...
2,741,385 UART:
2,741,439 UART: [state] CFI Enabled
2,751,643 UART: [fht] FMC Alias Private Key: 7
2,870,843 UART: [art] Extend RT PCRs Done
2,871,271 UART: [art] Lock RT PCRs Done
2,872,689 UART: [art] Populate DV Done
2,880,740 UART: [fht] FMC Alias Private Key: 7
2,881,862 UART: [art] Derive CDI
2,882,142 UART: [art] Store in slot 0x4
2,968,023 UART: [art] Derive Key Pair
2,968,383 UART: [art] Store priv key in slot 0x5
2,981,853 UART: [art] Derive Key Pair - Done
2,996,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,868 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,633 UART: [art] PUB.X = DAF1C80D889971C62AD35BB63AA6977414B667E051A679E616106D0ABD3960C2709FB6F9021A2293FEB3B13A65394CF0
3,019,396 UART: [art] PUB.Y = 86642D62CAEFA9945B89E2C7F8AD159679E6BF31B9B9CA64A079F5FCC4E9278C55AC5F1CB01BE3CC7FAE0217D16B479E
3,026,363 UART: [art] SIG.R = AB071A0F076C15F9C102033311EF06393FFF36B12E4A70ACC6AB6BD3A85FFE269A614632BFF92B382E3A0555D99ADA6C
3,033,126 UART: [art] SIG.S = 1549AF5C3F6DAFCCB1A9B63D0E3CDBAA083E85812E7F94126FF61209BAE4616C286C4A68779452EB4FCC872FC44FC929
3,056,625 UART: Caliptra RT
3,056,876 UART: [state] CFI Enabled
3,175,876 UART: [rt] RT listening for mailbox commands...
3,176,546 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,538 UART: [rt]cmd =0x44504543, len=24
3,234,016 >>> mbox cmd response data (40 bytes)
3,234,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,840 UART: [rt]cmd =0x44504543, len=96
3,307,179 >>> mbox cmd response data (56 bytes)
3,307,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,337,163 UART: [rt]cmd =0x44504543, len=96
3,380,068 >>> mbox cmd response data (56 bytes)
3,380,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,036 UART: [rt]cmd =0x44504543, len=96
3,453,800 >>> mbox cmd response data (56 bytes)
3,453,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,483,848 UART: [rt]cmd =0x44504543, len=96
3,527,435 >>> mbox cmd response data (56 bytes)
3,527,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,571 UART: [rt]cmd =0x44504543, len=96
3,602,085 >>> mbox cmd response data (56 bytes)
3,602,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,631,923 UART: [rt]cmd =0x44504543, len=96
3,675,582 >>> mbox cmd response data (56 bytes)
3,675,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,705,638 UART: [rt]cmd =0x44504543, len=96
3,750,440 >>> mbox cmd response data (56 bytes)
3,750,441 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,166 UART: [rt]cmd =0x44504543, len=96
3,824,443 >>> mbox cmd response data (56 bytes)
3,824,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,854,551 UART: [rt]cmd =0x44504543, len=96
3,899,793 >>> mbox cmd response data (56 bytes)
3,899,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,929,797 UART: [rt]cmd =0x44504543, len=96
3,974,806 >>> mbox cmd response data (56 bytes)
3,974,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,004,684 UART: [rt]cmd =0x44504543, len=96
4,050,990 >>> mbox cmd response data (56 bytes)
4,050,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,081,110 UART: [rt]cmd =0x44504543, len=96
4,126,601 >>> mbox cmd response data (56 bytes)
4,126,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,156,655 UART: [rt]cmd =0x44504543, len=96
4,203,377 >>> mbox cmd response data (56 bytes)
4,203,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,233,315 UART: [rt]cmd =0x44504543, len=96
4,279,708 >>> mbox cmd response data (56 bytes)
4,279,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,309,710 UART: [rt]cmd =0x44504543, len=96
4,356,040 >>> mbox cmd response data (56 bytes)
4,356,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,386,172 UART: [rt]cmd =0x44504543, len=96
4,393,946 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,294 UART: [kat] SHA2-512-ACC
906,195 UART: [kat] ECC-384
916,246 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,169,925 UART: [cold-reset] ++
1,170,429 UART: [fht] FHT @ 0x50003400
1,173,007 UART: [idev] ++
1,173,175 UART: [idev] CDI.KEYID = 6
1,173,536 UART: [idev] SUBJECT.KEYID = 7
1,173,961 UART: [idev] UDS.KEYID = 0
1,174,307 ready_for_fw is high
1,174,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,199,084 UART: [idev] Sha1 KeyId Algorithm
1,207,940 UART: [idev] --
1,208,827 UART: [ldev] ++
1,208,995 UART: [ldev] CDI.KEYID = 6
1,209,359 UART: [ldev] SUBJECT.KEYID = 5
1,209,786 UART: [ldev] AUTHORITY.KEYID = 7
1,210,249 UART: [ldev] FE.KEYID = 1
1,215,599 UART: [ldev] Erasing FE.KEYID = 1
1,242,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,047 UART: [ldev] --
1,281,340 UART: [fwproc] Wait for Commands...
1,282,029 UART: [fwproc] Recv command 0x46574c44
1,282,762 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,150 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,325 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,500 >>> mbox cmd response: success
2,827,662 UART: [afmc] ++
2,827,830 UART: [afmc] CDI.KEYID = 6
2,828,193 UART: [afmc] SUBJECT.KEYID = 7
2,828,619 UART: [afmc] AUTHORITY.KEYID = 5
2,864,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,330 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,040 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,921 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,622 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,307 UART: [afmc] --
2,907,184 UART: [cold-reset] --
2,907,830 UART: [state] Locking Datavault
2,908,819 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,423 UART: [state] Locking ICCM
2,909,867 UART: [exit] Launching FMC @ 0x40000130
2,915,197 UART:
2,915,213 UART: Running Caliptra FMC ...
2,915,621 UART:
2,915,764 UART: [state] CFI Enabled
2,926,344 UART: [fht] FMC Alias Private Key: 7
3,045,274 UART: [art] Extend RT PCRs Done
3,045,702 UART: [art] Lock RT PCRs Done
3,047,220 UART: [art] Populate DV Done
3,055,283 UART: [fht] FMC Alias Private Key: 7
3,056,451 UART: [art] Derive CDI
3,056,731 UART: [art] Store in slot 0x4
3,142,432 UART: [art] Derive Key Pair
3,142,792 UART: [art] Store priv key in slot 0x5
3,156,296 UART: [art] Derive Key Pair - Done
3,171,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,149 UART: [art] PUB.X = CE60D5A3B887A953B19803A06E85DE05D752D210403232976EAB5F39BE789CFDA746B0EE71E03B08A1F6B1A57E2F93C6
3,194,918 UART: [art] PUB.Y = 02B5C5A56DC0B34B17CE3C78DFB8521E865FF7B0BA172007165D58BF026F5282FAE2F28D1E0DD2A942B2C5A0455F3E51
3,201,868 UART: [art] SIG.R = 0E28860EA3C05C8367D6BEEDC98ECBAD5EA3428BA6E3AD6C9520AB76924B0107E7653B50AA024857C3F8D66AD8EC14CE
3,208,641 UART: [art] SIG.S = 905159442635EFEB51B9156FF653BC4AC48F43DFF566F879C61836C07619733ED12CE43C8795D8D963181F4C4870C3DE
3,232,199 UART: Caliptra RT
3,232,542 UART: [state] CFI Enabled
3,352,714 UART: [rt] RT listening for mailbox commands...
3,353,384 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,612 UART: [rt]cmd =0x44504543, len=24
3,411,062 >>> mbox cmd response data (40 bytes)
3,411,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,130 UART: [rt]cmd =0x44504543, len=96
3,484,447 >>> mbox cmd response data (56 bytes)
3,484,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,437 UART: [rt]cmd =0x44504543, len=96
3,557,918 >>> mbox cmd response data (56 bytes)
3,557,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,587,828 UART: [rt]cmd =0x44504543, len=96
3,631,366 >>> mbox cmd response data (56 bytes)
3,631,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,166 UART: [rt]cmd =0x44504543, len=96
3,705,139 >>> mbox cmd response data (56 bytes)
3,705,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,735,013 UART: [rt]cmd =0x44504543, len=96
3,779,111 >>> mbox cmd response data (56 bytes)
3,779,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,809,005 UART: [rt]cmd =0x44504543, len=96
3,853,206 >>> mbox cmd response data (56 bytes)
3,853,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,883,172 UART: [rt]cmd =0x44504543, len=96
3,927,806 >>> mbox cmd response data (56 bytes)
3,927,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,957,856 UART: [rt]cmd =0x44504543, len=96
4,002,891 >>> mbox cmd response data (56 bytes)
4,002,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,032,857 UART: [rt]cmd =0x44504543, len=96
4,078,035 >>> mbox cmd response data (56 bytes)
4,078,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,107,813 UART: [rt]cmd =0x44504543, len=96
4,153,424 >>> mbox cmd response data (56 bytes)
4,153,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,183,432 UART: [rt]cmd =0x44504543, len=96
4,229,040 >>> mbox cmd response data (56 bytes)
4,229,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,258,968 UART: [rt]cmd =0x44504543, len=96
4,304,819 >>> mbox cmd response data (56 bytes)
4,304,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,334,833 UART: [rt]cmd =0x44504543, len=96
4,381,065 >>> mbox cmd response data (56 bytes)
4,381,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,410,803 UART: [rt]cmd =0x44504543, len=96
4,457,658 >>> mbox cmd response data (56 bytes)
4,457,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,487,642 UART: [rt]cmd =0x44504543, len=96
4,534,790 >>> mbox cmd response data (56 bytes)
4,534,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,564,502 UART: [rt]cmd =0x44504543, len=96
4,571,862 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,193 ready_for_fw is high
1,059,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,123 >>> mbox cmd response: success
2,741,884 UART:
2,741,900 UART: Running Caliptra FMC ...
2,742,308 UART:
2,742,451 UART: [state] CFI Enabled
2,753,337 UART: [fht] FMC Alias Private Key: 7
2,872,075 UART: [art] Extend RT PCRs Done
2,872,503 UART: [art] Lock RT PCRs Done
2,873,849 UART: [art] Populate DV Done
2,882,034 UART: [fht] FMC Alias Private Key: 7
2,883,076 UART: [art] Derive CDI
2,883,356 UART: [art] Store in slot 0x4
2,969,189 UART: [art] Derive Key Pair
2,969,549 UART: [art] Store priv key in slot 0x5
2,982,817 UART: [art] Derive Key Pair - Done
2,997,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,074 UART: [art] PUB.X = 4497B9F0C2816DACFCA0A2EB333E841641FEE4600860F7CA286F3E7998C75FBEBBAD3514F00922C932E2643AC11300BF
3,020,826 UART: [art] PUB.Y = 1014FEBC59A9146BF88168E77DFB82DE62F4DFFF4F0A05542A88CF7CE84274B68A9DB436CE7488382FD5710211695D80
3,027,773 UART: [art] SIG.R = 88C9E4EDD8547F6F358B8F42BBBD1AE6C8A7A4C74BAF4F9A5DF139111E28D528D3C8929CA678B7844EF3E8F80326ABE8
3,034,558 UART: [art] SIG.S = CDAF83FA4065715B65BC1910D55E4C23DB1CE48AFEEE742C605C3BF5E711061E823D7038E1997D74DAD67A502533CBE2
3,058,345 UART: Caliptra RT
3,058,688 UART: [state] CFI Enabled
3,179,133 UART: [rt] RT listening for mailbox commands...
3,179,803 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,837 UART: [rt]cmd =0x44504543, len=24
3,237,325 >>> mbox cmd response data (40 bytes)
3,237,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,273 UART: [rt]cmd =0x44504543, len=96
3,310,150 >>> mbox cmd response data (56 bytes)
3,310,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,339,986 UART: [rt]cmd =0x44504543, len=96
3,383,297 >>> mbox cmd response data (56 bytes)
3,383,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,005 UART: [rt]cmd =0x44504543, len=96
3,456,423 >>> mbox cmd response data (56 bytes)
3,456,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,391 UART: [rt]cmd =0x44504543, len=96
3,530,008 >>> mbox cmd response data (56 bytes)
3,530,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,559,938 UART: [rt]cmd =0x44504543, len=96
3,604,222 >>> mbox cmd response data (56 bytes)
3,604,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,230 UART: [rt]cmd =0x44504543, len=96
3,678,827 >>> mbox cmd response data (56 bytes)
3,678,828 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,708,919 UART: [rt]cmd =0x44504543, len=96
3,753,477 >>> mbox cmd response data (56 bytes)
3,753,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,223 UART: [rt]cmd =0x44504543, len=96
3,826,986 >>> mbox cmd response data (56 bytes)
3,826,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,934 UART: [rt]cmd =0x44504543, len=96
3,902,410 >>> mbox cmd response data (56 bytes)
3,902,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,932,460 UART: [rt]cmd =0x44504543, len=96
3,977,835 >>> mbox cmd response data (56 bytes)
3,977,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,839 UART: [rt]cmd =0x44504543, len=96
4,053,515 >>> mbox cmd response data (56 bytes)
4,053,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,083,423 UART: [rt]cmd =0x44504543, len=96
4,130,114 >>> mbox cmd response data (56 bytes)
4,130,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,159,958 UART: [rt]cmd =0x44504543, len=96
4,205,592 >>> mbox cmd response data (56 bytes)
4,205,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,235,640 UART: [rt]cmd =0x44504543, len=96
4,282,965 >>> mbox cmd response data (56 bytes)
4,282,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,313,127 UART: [rt]cmd =0x44504543, len=96
4,360,235 >>> mbox cmd response data (56 bytes)
4,360,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,390,005 UART: [rt]cmd =0x44504543, len=96
4,397,405 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
893,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,321 UART: [kat] ++
897,473 UART: [kat] sha1
901,605 UART: [kat] SHA2-256
903,545 UART: [kat] SHA2-384
906,168 UART: [kat] SHA2-512-ACC
908,069 UART: [kat] ECC-384
917,764 UART: [kat] HMAC-384Kdf
922,276 UART: [kat] LMS
1,170,604 UART: [kat] --
1,171,607 UART: [cold-reset] ++
1,172,105 UART: [fht] FHT @ 0x50003400
1,174,574 UART: [idev] ++
1,174,742 UART: [idev] CDI.KEYID = 6
1,175,102 UART: [idev] SUBJECT.KEYID = 7
1,175,526 UART: [idev] UDS.KEYID = 0
1,175,871 ready_for_fw is high
1,175,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,684 UART: [idev] Erasing UDS.KEYID = 0
1,200,499 UART: [idev] Sha1 KeyId Algorithm
1,208,901 UART: [idev] --
1,209,909 UART: [ldev] ++
1,210,077 UART: [ldev] CDI.KEYID = 6
1,210,440 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,621 UART: [ldev] Erasing FE.KEYID = 1
1,242,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,219 UART: [ldev] --
1,281,518 UART: [fwproc] Wait for Commands...
1,282,150 UART: [fwproc] Recv command 0x46574c44
1,282,878 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,536 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,706 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,859 >>> mbox cmd response: success
2,825,875 UART: [afmc] ++
2,826,043 UART: [afmc] CDI.KEYID = 6
2,826,405 UART: [afmc] SUBJECT.KEYID = 7
2,826,830 UART: [afmc] AUTHORITY.KEYID = 5
2,861,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,572 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,281 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,164 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,865 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,665 UART: [afmc] --
2,904,769 UART: [cold-reset] --
2,905,713 UART: [state] Locking Datavault
2,906,716 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,320 UART: [state] Locking ICCM
2,907,842 UART: [exit] Launching FMC @ 0x40000130
2,913,172 UART:
2,913,188 UART: Running Caliptra FMC ...
2,913,596 UART:
2,913,650 UART: [state] CFI Enabled
2,924,192 UART: [fht] FMC Alias Private Key: 7
3,043,692 UART: [art] Extend RT PCRs Done
3,044,120 UART: [art] Lock RT PCRs Done
3,045,352 UART: [art] Populate DV Done
3,053,675 UART: [fht] FMC Alias Private Key: 7
3,054,809 UART: [art] Derive CDI
3,055,089 UART: [art] Store in slot 0x4
3,140,882 UART: [art] Derive Key Pair
3,141,242 UART: [art] Store priv key in slot 0x5
3,154,672 UART: [art] Derive Key Pair - Done
3,169,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,742 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,507 UART: [art] PUB.X = D766AB08D900A6D794969CD91AF3483B3D42D4267C6B49A8559C1F1EDC862ED312320E1B9F182DE92C296FDBB8481398
3,192,253 UART: [art] PUB.Y = 27E515F8EA2E52E1836836893E7008EFCCBE6E34E100C7CDA2F66934CFD8B6101A76617D9E898B48E958064B77F45D78
3,199,177 UART: [art] SIG.R = 631693094AED842F1337874F0177AA0368890E1D573FFA801719D9C804AD49650CF0F4CD077A42C12A2004598C2EB806
3,205,912 UART: [art] SIG.S = D7A99552EB2A2125883D69CF513C931C7C21F0C8CD26546D1381CB924731FD643F4F2A155FDE5C9ABBFFFE6EEE17F722
3,229,240 UART: Caliptra RT
3,229,491 UART: [state] CFI Enabled
3,349,641 UART: [rt] RT listening for mailbox commands...
3,350,311 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,567 UART: [rt]cmd =0x44504543, len=24
3,407,979 >>> mbox cmd response data (40 bytes)
3,407,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,861 UART: [rt]cmd =0x44504543, len=96
3,480,642 >>> mbox cmd response data (56 bytes)
3,480,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,808 UART: [rt]cmd =0x44504543, len=96
3,553,543 >>> mbox cmd response data (56 bytes)
3,553,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,365 UART: [rt]cmd =0x44504543, len=96
3,626,781 >>> mbox cmd response data (56 bytes)
3,626,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,656,767 UART: [rt]cmd =0x44504543, len=96
3,700,548 >>> mbox cmd response data (56 bytes)
3,700,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,482 UART: [rt]cmd =0x44504543, len=96
3,774,180 >>> mbox cmd response data (56 bytes)
3,774,181 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,804,128 UART: [rt]cmd =0x44504543, len=96
3,848,973 >>> mbox cmd response data (56 bytes)
3,848,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,878,977 UART: [rt]cmd =0x44504543, len=96
3,923,189 >>> mbox cmd response data (56 bytes)
3,923,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,953,451 UART: [rt]cmd =0x44504543, len=96
3,998,208 >>> mbox cmd response data (56 bytes)
3,998,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,028 UART: [rt]cmd =0x44504543, len=96
4,073,460 >>> mbox cmd response data (56 bytes)
4,073,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,103,308 UART: [rt]cmd =0x44504543, len=96
4,149,193 >>> mbox cmd response data (56 bytes)
4,149,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,179,293 UART: [rt]cmd =0x44504543, len=96
4,225,563 >>> mbox cmd response data (56 bytes)
4,225,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,255,391 UART: [rt]cmd =0x44504543, len=96
4,300,724 >>> mbox cmd response data (56 bytes)
4,300,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,330,658 UART: [rt]cmd =0x44504543, len=96
4,376,898 >>> mbox cmd response data (56 bytes)
4,376,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,406,968 UART: [rt]cmd =0x44504543, len=96
4,454,055 >>> mbox cmd response data (56 bytes)
4,454,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,483,993 UART: [rt]cmd =0x44504543, len=96
4,531,831 >>> mbox cmd response data (56 bytes)
4,531,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,561,829 UART: [rt]cmd =0x44504543, len=96
4,569,371 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,129 ready_for_fw is high
1,061,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,682 >>> mbox cmd response: success
2,743,639 UART:
2,743,655 UART: Running Caliptra FMC ...
2,744,063 UART:
2,744,117 UART: [state] CFI Enabled
2,754,725 UART: [fht] FMC Alias Private Key: 7
2,873,759 UART: [art] Extend RT PCRs Done
2,874,187 UART: [art] Lock RT PCRs Done
2,875,781 UART: [art] Populate DV Done
2,884,158 UART: [fht] FMC Alias Private Key: 7
2,885,330 UART: [art] Derive CDI
2,885,610 UART: [art] Store in slot 0x4
2,971,043 UART: [art] Derive Key Pair
2,971,403 UART: [art] Store priv key in slot 0x5
2,984,921 UART: [art] Derive Key Pair - Done
2,999,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,635 UART: [art] PUB.X = A77C177050FD6EA458C54B02D247568D325ABAA6EC9462CEE89E8CDC931832A029399E4DA6FFF82CA1147C28EBF8A16D
3,022,416 UART: [art] PUB.Y = C9045A085505CAEECE164EBFA165F8E1F128C57ED39074658E3FD0F3AABE9536249393B4CC28A04AEA742491F3038C93
3,029,362 UART: [art] SIG.R = B05EFC69FF58075A0D8C98B4CA408BC78CFA9ECB5601B5747EB382C9975590B71CD610CD4BC2D0292764C14FF59BA409
3,036,132 UART: [art] SIG.S = FBF6613278918314B059C0087F3D12DB9794080AC707B3D0E7649B5E1EB26DDA54306C5789533DA47AFB60259029E6D2
3,060,408 UART: Caliptra RT
3,060,659 UART: [state] CFI Enabled
3,181,022 UART: [rt] RT listening for mailbox commands...
3,181,692 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,836 UART: [rt]cmd =0x44504543, len=24
3,239,904 >>> mbox cmd response data (40 bytes)
3,239,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,850 UART: [rt]cmd =0x44504543, len=96
3,313,101 >>> mbox cmd response data (56 bytes)
3,313,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,343,155 UART: [rt]cmd =0x44504543, len=96
3,386,540 >>> mbox cmd response data (56 bytes)
3,386,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,662 UART: [rt]cmd =0x44504543, len=96
3,459,700 >>> mbox cmd response data (56 bytes)
3,459,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,489,502 UART: [rt]cmd =0x44504543, len=96
3,533,663 >>> mbox cmd response data (56 bytes)
3,533,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,563,889 UART: [rt]cmd =0x44504543, len=96
3,607,265 >>> mbox cmd response data (56 bytes)
3,607,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,303 UART: [rt]cmd =0x44504543, len=96
3,681,072 >>> mbox cmd response data (56 bytes)
3,681,073 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,256 UART: [rt]cmd =0x44504543, len=96
3,755,516 >>> mbox cmd response data (56 bytes)
3,755,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,785,528 UART: [rt]cmd =0x44504543, len=96
3,829,843 >>> mbox cmd response data (56 bytes)
3,829,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,859,787 UART: [rt]cmd =0x44504543, len=96
3,904,865 >>> mbox cmd response data (56 bytes)
3,904,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,934,827 UART: [rt]cmd =0x44504543, len=96
3,979,896 >>> mbox cmd response data (56 bytes)
3,979,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,808 UART: [rt]cmd =0x44504543, len=96
4,055,694 >>> mbox cmd response data (56 bytes)
4,055,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,085,760 UART: [rt]cmd =0x44504543, len=96
4,132,067 >>> mbox cmd response data (56 bytes)
4,132,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,161,975 UART: [rt]cmd =0x44504543, len=96
4,208,617 >>> mbox cmd response data (56 bytes)
4,208,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,238,715 UART: [rt]cmd =0x44504543, len=96
4,285,580 >>> mbox cmd response data (56 bytes)
4,285,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,315,538 UART: [rt]cmd =0x44504543, len=96
4,362,674 >>> mbox cmd response data (56 bytes)
4,362,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,392,598 UART: [rt]cmd =0x44504543, len=96
4,400,196 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
893,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,560 UART: [kat] ++
897,712 UART: [kat] sha1
901,818 UART: [kat] SHA2-256
903,758 UART: [kat] SHA2-384
906,527 UART: [kat] SHA2-512-ACC
908,428 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
922,971 UART: [kat] LMS
1,171,299 UART: [kat] --
1,172,272 UART: [cold-reset] ++
1,172,676 UART: [fht] FHT @ 0x50003400
1,175,413 UART: [idev] ++
1,175,581 UART: [idev] CDI.KEYID = 6
1,175,941 UART: [idev] SUBJECT.KEYID = 7
1,176,365 UART: [idev] UDS.KEYID = 0
1,176,710 ready_for_fw is high
1,176,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,567 UART: [idev] Erasing UDS.KEYID = 0
1,201,704 UART: [idev] Sha1 KeyId Algorithm
1,210,206 UART: [idev] --
1,211,344 UART: [ldev] ++
1,211,512 UART: [ldev] CDI.KEYID = 6
1,211,875 UART: [ldev] SUBJECT.KEYID = 5
1,212,301 UART: [ldev] AUTHORITY.KEYID = 7
1,212,764 UART: [ldev] FE.KEYID = 1
1,218,062 UART: [ldev] Erasing FE.KEYID = 1
1,244,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,806 UART: [ldev] --
1,284,203 UART: [fwproc] Wait for Commands...
1,284,779 UART: [fwproc] Recv command 0x46574c44
1,285,507 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,587 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,757 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,112 >>> mbox cmd response: success
2,829,136 UART: [afmc] ++
2,829,304 UART: [afmc] CDI.KEYID = 6
2,829,666 UART: [afmc] SUBJECT.KEYID = 7
2,830,091 UART: [afmc] AUTHORITY.KEYID = 5
2,866,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,465 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,174 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,057 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,758 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,448 UART: [afmc] --
2,909,452 UART: [cold-reset] --
2,910,452 UART: [state] Locking Datavault
2,911,941 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,545 UART: [state] Locking ICCM
2,913,125 UART: [exit] Launching FMC @ 0x40000130
2,918,455 UART:
2,918,471 UART: Running Caliptra FMC ...
2,918,879 UART:
2,919,022 UART: [state] CFI Enabled
2,929,648 UART: [fht] FMC Alias Private Key: 7
3,048,620 UART: [art] Extend RT PCRs Done
3,049,048 UART: [art] Lock RT PCRs Done
3,050,532 UART: [art] Populate DV Done
3,059,003 UART: [fht] FMC Alias Private Key: 7
3,060,141 UART: [art] Derive CDI
3,060,421 UART: [art] Store in slot 0x4
3,146,026 UART: [art] Derive Key Pair
3,146,386 UART: [art] Store priv key in slot 0x5
3,159,468 UART: [art] Derive Key Pair - Done
3,173,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,051 UART: [art] PUB.X = 46204AA406884912D9EF1D83B3831E2CE08F81B15368FF5F1BAA8B2EAF63DD3A0BAB44F823D67D8A7D1EB0577A60F442
3,196,827 UART: [art] PUB.Y = 032D9715D79FECAD79166638BE73329EDF1F227F4326145A2E52A70730C5220FEF7680BDCB10CE1148B12A7F7005F3B5
3,203,767 UART: [art] SIG.R = 90FB5F4FCDA7544DD36045CAFC1142892AA73C104091AD30F0779B8515F63ABF1989D9151AE3EBA25B40E69712DC9AA6
3,210,547 UART: [art] SIG.S = 7FA9D43AE09F882E5B505EBD363E41CF91EA8288503DE4EE25A0CF5E797A2505455C991EFD04B31EA0533FFBA48A3E5D
3,234,753 UART: Caliptra RT
3,235,096 UART: [state] CFI Enabled
3,355,200 UART: [rt] RT listening for mailbox commands...
3,355,870 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,616 UART: [rt]cmd =0x44504543, len=24
3,413,174 >>> mbox cmd response data (40 bytes)
3,413,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,443,294 UART: [rt]cmd =0x44504543, len=96
3,485,991 >>> mbox cmd response data (56 bytes)
3,485,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,029 UART: [rt]cmd =0x44504543, len=96
3,559,178 >>> mbox cmd response data (56 bytes)
3,559,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,589,320 UART: [rt]cmd =0x44504543, len=96
3,632,680 >>> mbox cmd response data (56 bytes)
3,632,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,952 UART: [rt]cmd =0x44504543, len=96
3,707,447 >>> mbox cmd response data (56 bytes)
3,707,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,737,293 UART: [rt]cmd =0x44504543, len=96
3,781,413 >>> mbox cmd response data (56 bytes)
3,781,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,811,357 UART: [rt]cmd =0x44504543, len=96
3,855,554 >>> mbox cmd response data (56 bytes)
3,855,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,885,560 UART: [rt]cmd =0x44504543, len=96
3,930,168 >>> mbox cmd response data (56 bytes)
3,930,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,960,098 UART: [rt]cmd =0x44504543, len=96
4,004,593 >>> mbox cmd response data (56 bytes)
4,004,594 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,034,535 UART: [rt]cmd =0x44504543, len=96
4,079,655 >>> mbox cmd response data (56 bytes)
4,079,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,109,567 UART: [rt]cmd =0x44504543, len=96
4,155,364 >>> mbox cmd response data (56 bytes)
4,155,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,185,252 UART: [rt]cmd =0x44504543, len=96
4,231,796 >>> mbox cmd response data (56 bytes)
4,231,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,261,732 UART: [rt]cmd =0x44504543, len=96
4,307,247 >>> mbox cmd response data (56 bytes)
4,307,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,337,187 UART: [rt]cmd =0x44504543, len=96
4,383,931 >>> mbox cmd response data (56 bytes)
4,383,932 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,413,841 UART: [rt]cmd =0x44504543, len=96
4,459,992 >>> mbox cmd response data (56 bytes)
4,459,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,489,986 UART: [rt]cmd =0x44504543, len=96
4,536,704 >>> mbox cmd response data (56 bytes)
4,536,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,566,838 UART: [rt]cmd =0x44504543, len=96
4,574,368 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,124 ready_for_fw is high
1,060,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,599 >>> mbox cmd response: success
2,742,246 UART:
2,742,262 UART: Running Caliptra FMC ...
2,742,670 UART:
2,742,813 UART: [state] CFI Enabled
2,753,511 UART: [fht] FMC Alias Private Key: 7
2,872,481 UART: [art] Extend RT PCRs Done
2,872,909 UART: [art] Lock RT PCRs Done
2,874,349 UART: [art] Populate DV Done
2,882,540 UART: [fht] FMC Alias Private Key: 7
2,883,500 UART: [art] Derive CDI
2,883,780 UART: [art] Store in slot 0x4
2,969,405 UART: [art] Derive Key Pair
2,969,765 UART: [art] Store priv key in slot 0x5
2,983,465 UART: [art] Derive Key Pair - Done
2,998,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,280 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,045 UART: [art] PUB.X = 6E1DE3AC61E8B04368385EF63CF925336DFABC749095422896CE46990271DECE4660E60528F5D48563C01B5A5749FF2D
3,020,809 UART: [art] PUB.Y = E355EC38D6153EF0F6B22EACE2CA36D6E40522939616548E8E6B3123CB011E424300F2764EA383A2D12CC2077DD9AA0A
3,027,731 UART: [art] SIG.R = 0979C03E53D564784C948A48F648F20CCC5519A9E6DCC58EBD38417E3D465AB0E51428FF67B679F214E9F136313B2B32
3,034,495 UART: [art] SIG.S = 202332B4C66D8D28AA3AE438472C66563AE896993C89A10C92E2DCEC492B725433D6A9C38A5875CD3A49C1D60A3AFE11
3,058,379 UART: Caliptra RT
3,058,722 UART: [state] CFI Enabled
3,178,055 UART: [rt] RT listening for mailbox commands...
3,178,725 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,843 UART: [rt]cmd =0x44504543, len=24
3,236,175 >>> mbox cmd response data (40 bytes)
3,236,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,337 UART: [rt]cmd =0x44504543, len=96
3,309,234 >>> mbox cmd response data (56 bytes)
3,309,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,339,306 UART: [rt]cmd =0x44504543, len=96
3,382,655 >>> mbox cmd response data (56 bytes)
3,382,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,501 UART: [rt]cmd =0x44504543, len=96
3,455,671 >>> mbox cmd response data (56 bytes)
3,455,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,485,563 UART: [rt]cmd =0x44504543, len=96
3,529,750 >>> mbox cmd response data (56 bytes)
3,529,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,559,744 UART: [rt]cmd =0x44504543, len=96
3,604,494 >>> mbox cmd response data (56 bytes)
3,604,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,352 UART: [rt]cmd =0x44504543, len=96
3,678,911 >>> mbox cmd response data (56 bytes)
3,678,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,708,847 UART: [rt]cmd =0x44504543, len=96
3,754,129 >>> mbox cmd response data (56 bytes)
3,754,130 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,784,223 UART: [rt]cmd =0x44504543, len=96
3,829,520 >>> mbox cmd response data (56 bytes)
3,829,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,859,338 UART: [rt]cmd =0x44504543, len=96
3,905,066 >>> mbox cmd response data (56 bytes)
3,905,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,935,096 UART: [rt]cmd =0x44504543, len=96
3,980,541 >>> mbox cmd response data (56 bytes)
3,980,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,329 UART: [rt]cmd =0x44504543, len=96
4,056,503 >>> mbox cmd response data (56 bytes)
4,056,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,086,607 UART: [rt]cmd =0x44504543, len=96
4,133,264 >>> mbox cmd response data (56 bytes)
4,133,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,163,400 UART: [rt]cmd =0x44504543, len=96
4,209,218 >>> mbox cmd response data (56 bytes)
4,209,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,239,180 UART: [rt]cmd =0x44504543, len=96
4,285,621 >>> mbox cmd response data (56 bytes)
4,285,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,315,407 UART: [rt]cmd =0x44504543, len=96
4,361,719 >>> mbox cmd response data (56 bytes)
4,361,720 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,391,903 UART: [rt]cmd =0x44504543, len=96
4,399,275 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,028 UART:
192,404 UART: Running Caliptra ROM ...
193,594 UART:
193,746 UART: [state] CFI Enabled
265,290 UART: [state] LifecycleState = Unprovisioned
267,271 UART: [state] DebugLocked = No
268,595 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,334 UART: [kat] SHA2-256
444,074 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,540 UART: [kat] ++
455,075 UART: [kat] sha1
466,886 UART: [kat] SHA2-256
469,606 UART: [kat] SHA2-384
475,311 UART: [kat] SHA2-512-ACC
477,681 UART: [kat] ECC-384
2,767,204 UART: [kat] HMAC-384Kdf
2,778,879 UART: [kat] LMS
3,969,212 UART: [kat] --
3,972,578 UART: [cold-reset] ++
3,975,144 UART: [fht] Storing FHT @ 0x50003400
3,986,686 UART: [idev] ++
3,987,252 UART: [idev] CDI.KEYID = 6
3,988,209 UART: [idev] SUBJECT.KEYID = 7
3,989,453 UART: [idev] UDS.KEYID = 0
3,990,413 ready_for_fw is high
3,990,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,669 UART: [idev] Erasing UDS.KEYID = 0
7,325,678 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,276 UART: [idev] --
7,351,902 UART: [ldev] ++
7,352,475 UART: [ldev] CDI.KEYID = 6
7,353,479 UART: [ldev] SUBJECT.KEYID = 5
7,354,585 UART: [ldev] AUTHORITY.KEYID = 7
7,355,932 UART: [ldev] FE.KEYID = 1
7,401,195 UART: [ldev] Erasing FE.KEYID = 1
10,733,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,037 UART: [ldev] --
13,117,011 UART: [fwproc] Waiting for Commands...
13,119,322 UART: [fwproc] Received command 0x46574c44
13,121,506 UART: [fwproc] Received Image of size 118548 bytes
17,231,010 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,306,329 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,379,471 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,708,621 >>> mbox cmd response: success
17,712,585 UART: [afmc] ++
17,713,213 UART: [afmc] CDI.KEYID = 6
17,714,128 UART: [afmc] SUBJECT.KEYID = 7
17,715,346 UART: [afmc] AUTHORITY.KEYID = 5
21,091,840 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,682 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,954 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,407,423 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,082 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,505 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,005 UART: [afmc] --
23,461,284 UART: [cold-reset] --
23,465,846 UART: [state] Locking Datavault
23,473,088 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,789 UART: [state] Locking ICCM
23,476,933 UART: [exit] Launching FMC @ 0x40000130
23,485,334 UART:
23,485,738 UART: Running Caliptra FMC ...
23,486,880 UART:
23,487,042 UART: [state] CFI Enabled
23,549,978 UART: [fht] FMC Alias Private Key: 7
25,890,302 UART: [art] Extend RT PCRs Done
25,891,524 UART: [art] Lock RT PCRs Done
25,893,068 UART: [art] Populate DV Done
25,898,213 UART: [fht] FMC Alias Private Key: 7
25,899,748 UART: [art] Derive CDI
25,900,482 UART: [art] Store in slot 0x4
25,956,918 UART: [art] Derive Key Pair
25,957,914 UART: [art] Store priv key in slot 0x5
29,250,769 UART: [art] Derive Key Pair - Done
29,263,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,279 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,790 UART: [art] PUB.X = E390BBEFD0E4D74A9C29BD049C2E8B1C18CC13F34FFE779693219EE15A10B35F7BD2799C0C25CF7E2343BAB5B1B0997E
31,560,067 UART: [art] PUB.Y = 82012A0B7BB7F7CF304CC195C00272213AE231964ACEFFB63C558A66EAA7C8C92099C835A0754A9927CA6D741EB7944F
31,567,352 UART: [art] SIG.R = 42B4E0C9EBAE3C2797E34D40F7E16164C8647B6916FB440D13905E2699A8C89BB2D90DE4DD9D7487E874EA622A8C9D76
31,574,720 UART: [art] SIG.S = B44294565B95B1BE85250337AEF04FB1C84B2EE3FAEF357B6860966CB9D94CA39A84F0EACE5DA4977CECA92682BC6058
32,879,840 UART: Caliptra RT
32,880,563 UART: [state] CFI Enabled
33,057,387 UART: [rt] RT listening for mailbox commands...
33,059,314 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,089,237 UART: [rt]cmd =0x44504543, len=24
33,137,615 >>> mbox cmd response data (40 bytes)
33,138,455 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,168,323 UART: [rt]cmd =0x44504543, len=24
33,201,785 >>> mbox cmd response data (40 bytes)
33,202,422 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,232,105 UART: [rt]cmd =0x44504543, len=24
33,265,624 >>> mbox cmd response data (40 bytes)
33,266,298 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,296,311 UART: [rt]cmd =0x44504543, len=24
33,329,423 >>> mbox cmd response data (40 bytes)
33,330,080 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,360,091 UART: [rt]cmd =0x44504543, len=24
33,393,736 >>> mbox cmd response data (40 bytes)
33,394,353 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,424,259 UART: [rt]cmd =0x44504543, len=24
33,457,773 >>> mbox cmd response data (40 bytes)
33,458,393 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,488,410 UART: [rt]cmd =0x44504543, len=24
33,522,247 >>> mbox cmd response data (40 bytes)
33,522,864 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,552,755 UART: [rt]cmd =0x44504543, len=24
33,585,759 >>> mbox cmd response data (40 bytes)
33,586,428 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,616,112 UART: [rt]cmd =0x44504543, len=24
33,650,029 >>> mbox cmd response data (40 bytes)
33,650,689 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,680,751 UART: [rt]cmd =0x44504543, len=24
33,713,797 >>> mbox cmd response data (40 bytes)
33,714,401 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,744,210 UART: [rt]cmd =0x44504543, len=24
33,777,936 >>> mbox cmd response data (40 bytes)
33,778,561 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,808,476 UART: [rt]cmd =0x44504543, len=24
33,841,825 >>> mbox cmd response data (40 bytes)
33,842,437 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,872,221 UART: [rt]cmd =0x44504543, len=24
33,905,923 >>> mbox cmd response data (40 bytes)
33,906,564 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,936,534 UART: [rt]cmd =0x44504543, len=24
33,969,868 >>> mbox cmd response data (40 bytes)
33,970,538 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,000,443 UART: [rt]cmd =0x44504543, len=24
34,034,036 >>> mbox cmd response data (40 bytes)
34,034,642 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,064,349 UART: [rt]cmd =0x44504543, len=24
34,097,917 >>> mbox cmd response data (40 bytes)
34,098,544 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,128,460 UART: [rt]cmd =0x44504543, len=24
34,135,058 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,807,862 ready_for_fw is high
3,808,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,987,120 >>> mbox cmd response: success
23,671,649 UART:
23,672,114 UART: Running Caliptra FMC ...
23,673,238 UART:
23,673,395 UART: [state] CFI Enabled
23,743,279 UART: [fht] FMC Alias Private Key: 7
26,084,002 UART: [art] Extend RT PCRs Done
26,085,240 UART: [art] Lock RT PCRs Done
26,087,005 UART: [art] Populate DV Done
26,092,282 UART: [fht] FMC Alias Private Key: 7
26,093,972 UART: [art] Derive CDI
26,094,720 UART: [art] Store in slot 0x4
26,151,448 UART: [art] Derive Key Pair
26,152,450 UART: [art] Store priv key in slot 0x5
29,445,133 UART: [art] Derive Key Pair - Done
29,457,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,515 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,026 UART: [art] PUB.X = E30ADC0B0A3CCAF5A079F4CBE25962C560429E6C780D126AE3554C9E82AF7C4BC1398F88B0DC6EA1D4BACAD3182A6913
31,755,300 UART: [art] PUB.Y = EF0F027448F8307CD5CF14CA3B34685402C6A1EBD1D1F93CD8731F71D88D1A96EFF6A4108BE193D9A551733142825AB0
31,762,536 UART: [art] SIG.R = C08EF269E9CE38C2EE76643458122080381677ECD42C20076B16E72D1DDA9790C8F1969FAF9E5021A7E9B151765B274A
31,769,981 UART: [art] SIG.S = 6CCF17CD960852F8A36EEC69F2DF1A323C4E98D1EC2ED197890F572F4F4ABA37E97784C233AD915B6556614F0AC18FB6
33,074,983 UART: Caliptra RT
33,075,699 UART: [state] CFI Enabled
33,251,348 UART: [rt] RT listening for mailbox commands...
33,253,304 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,283,378 UART: [rt]cmd =0x44504543, len=24
33,310,923 >>> mbox cmd response data (40 bytes)
33,311,709 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,341,344 UART: [rt]cmd =0x44504543, len=24
33,374,993 >>> mbox cmd response data (40 bytes)
33,375,664 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,405,457 UART: [rt]cmd =0x44504543, len=24
33,438,390 >>> mbox cmd response data (40 bytes)
33,439,008 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,468,978 UART: [rt]cmd =0x44504543, len=24
33,502,488 >>> mbox cmd response data (40 bytes)
33,503,114 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,533,252 UART: [rt]cmd =0x44504543, len=24
33,566,750 >>> mbox cmd response data (40 bytes)
33,567,382 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,597,007 UART: [rt]cmd =0x44504543, len=24
33,630,607 >>> mbox cmd response data (40 bytes)
33,631,259 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,661,321 UART: [rt]cmd =0x44504543, len=24
33,694,929 >>> mbox cmd response data (40 bytes)
33,695,599 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,725,336 UART: [rt]cmd =0x44504543, len=24
33,758,981 >>> mbox cmd response data (40 bytes)
33,759,583 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,789,488 UART: [rt]cmd =0x44504543, len=24
33,822,784 >>> mbox cmd response data (40 bytes)
33,823,395 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,853,245 UART: [rt]cmd =0x44504543, len=24
33,886,881 >>> mbox cmd response data (40 bytes)
33,887,499 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,917,392 UART: [rt]cmd =0x44504543, len=24
33,951,309 >>> mbox cmd response data (40 bytes)
33,951,958 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,981,801 UART: [rt]cmd =0x44504543, len=24
34,015,059 >>> mbox cmd response data (40 bytes)
34,015,711 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,045,774 UART: [rt]cmd =0x44504543, len=24
34,079,365 >>> mbox cmd response data (40 bytes)
34,079,974 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,109,774 UART: [rt]cmd =0x44504543, len=24
34,143,439 >>> mbox cmd response data (40 bytes)
34,144,063 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,174,081 UART: [rt]cmd =0x44504543, len=24
34,207,266 >>> mbox cmd response data (40 bytes)
34,207,903 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,237,906 UART: [rt]cmd =0x44504543, len=24
34,271,383 >>> mbox cmd response data (40 bytes)
34,272,023 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,302,081 UART: [rt]cmd =0x44504543, len=24
34,308,751 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,881 writing to cptra_bootfsm_go
194,161 UART:
194,507 UART: Running Caliptra ROM ...
195,689 UART:
605,339 UART: [state] CFI Enabled
617,968 UART: [state] LifecycleState = Unprovisioned
619,912 UART: [state] DebugLocked = No
622,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,433 UART: [kat] SHA2-256
797,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,670 UART: [kat] ++
808,279 UART: [kat] sha1
818,872 UART: [kat] SHA2-256
821,605 UART: [kat] SHA2-384
826,453 UART: [kat] SHA2-512-ACC
828,817 UART: [kat] ECC-384
3,113,542 UART: [kat] HMAC-384Kdf
3,124,500 UART: [kat] LMS
4,314,654 UART: [kat] --
4,318,746 UART: [cold-reset] ++
4,320,821 UART: [fht] Storing FHT @ 0x50003400
4,331,720 UART: [idev] ++
4,332,306 UART: [idev] CDI.KEYID = 6
4,333,380 UART: [idev] SUBJECT.KEYID = 7
4,334,479 UART: [idev] UDS.KEYID = 0
4,335,459 ready_for_fw is high
4,335,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,483 UART: [idev] Erasing UDS.KEYID = 0
7,620,055 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,377 UART: [idev] --
7,646,482 UART: [ldev] ++
7,647,100 UART: [ldev] CDI.KEYID = 6
7,648,062 UART: [ldev] SUBJECT.KEYID = 5
7,649,271 UART: [ldev] AUTHORITY.KEYID = 7
7,650,493 UART: [ldev] FE.KEYID = 1
7,660,699 UART: [ldev] Erasing FE.KEYID = 1
10,948,557 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,138 UART: [ldev] --
13,311,568 UART: [fwproc] Waiting for Commands...
13,314,950 UART: [fwproc] Received command 0x46574c44
13,317,126 UART: [fwproc] Received Image of size 118548 bytes
17,427,034 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,695 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,822 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,908,496 >>> mbox cmd response: success
17,911,851 UART: [afmc] ++
17,912,467 UART: [afmc] CDI.KEYID = 6
17,913,373 UART: [afmc] SUBJECT.KEYID = 7
17,914,635 UART: [afmc] AUTHORITY.KEYID = 5
21,228,412 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,164 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,424 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,538,809 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,553,559 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,567,975 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,589,832 UART: [afmc] --
23,593,251 UART: [cold-reset] --
23,596,474 UART: [state] Locking Datavault
23,601,888 UART: [state] Locking PCR0, PCR1 and PCR31
23,603,524 UART: [state] Locking ICCM
23,605,980 UART: [exit] Launching FMC @ 0x40000130
23,614,423 UART:
23,614,651 UART: Running Caliptra FMC ...
23,615,745 UART:
23,615,908 UART: [state] CFI Enabled
23,623,735 UART: [fht] FMC Alias Private Key: 7
25,964,016 UART: [art] Extend RT PCRs Done
25,965,241 UART: [art] Lock RT PCRs Done
25,966,942 UART: [art] Populate DV Done
25,972,246 UART: [fht] FMC Alias Private Key: 7
25,973,898 UART: [art] Derive CDI
25,974,633 UART: [art] Store in slot 0x4
26,017,380 UART: [art] Derive Key Pair
26,018,439 UART: [art] Store priv key in slot 0x5
29,260,782 UART: [art] Derive Key Pair - Done
29,273,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,714 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,228 UART: [art] PUB.X = F5C0BA389A9C0A4F74F2E668B754B24FEC779013EB9C06E2D821B12937AE231711FC94438F417F79648A8940A32059CF
31,562,488 UART: [art] PUB.Y = 397FC78F60CE33ECB2FD93C22D2A9352AC03EC4FDDA63BC8927D48DB21565780279E3092DFF57B91C825B5FCCD8C2564
31,569,768 UART: [art] SIG.R = B938AAF0E2AF5F3FE586ADD96258AD75BCE6D79F5C354B0A36CF7A73DF18FED8C01B2B7D905F00ED5CF75F366E452031
31,577,225 UART: [art] SIG.S = C31D2292881F1BC441CC5D39AF441BBC1E9A7007D934BAEF3F3E3A9E631AC2C9AD8E291D9771A77DB03B97946FFB2001
32,882,050 UART: Caliptra RT
32,882,760 UART: [state] CFI Enabled
33,016,128 UART: [rt] RT listening for mailbox commands...
33,018,042 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,048,279 UART: [rt]cmd =0x44504543, len=24
33,075,691 >>> mbox cmd response data (40 bytes)
33,076,489 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,106,231 UART: [rt]cmd =0x44504543, len=24
33,133,212 >>> mbox cmd response data (40 bytes)
33,133,881 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,163,836 UART: [rt]cmd =0x44504543, len=24
33,191,585 >>> mbox cmd response data (40 bytes)
33,192,206 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,222,276 UART: [rt]cmd =0x44504543, len=24
33,250,114 >>> mbox cmd response data (40 bytes)
33,250,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,280,576 UART: [rt]cmd =0x44504543, len=24
33,308,419 >>> mbox cmd response data (40 bytes)
33,309,048 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,339,159 UART: [rt]cmd =0x44504543, len=24
33,366,801 >>> mbox cmd response data (40 bytes)
33,367,447 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,397,393 UART: [rt]cmd =0x44504543, len=24
33,425,251 >>> mbox cmd response data (40 bytes)
33,425,876 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,455,591 UART: [rt]cmd =0x44504543, len=24
33,483,146 >>> mbox cmd response data (40 bytes)
33,483,756 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,513,540 UART: [rt]cmd =0x44504543, len=24
33,540,968 >>> mbox cmd response data (40 bytes)
33,541,611 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,571,557 UART: [rt]cmd =0x44504543, len=24
33,598,598 >>> mbox cmd response data (40 bytes)
33,599,198 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,629,044 UART: [rt]cmd =0x44504543, len=24
33,657,211 >>> mbox cmd response data (40 bytes)
33,657,837 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,687,628 UART: [rt]cmd =0x44504543, len=24
33,715,410 >>> mbox cmd response data (40 bytes)
33,716,028 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,746,100 UART: [rt]cmd =0x44504543, len=24
33,774,022 >>> mbox cmd response data (40 bytes)
33,774,675 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,804,732 UART: [rt]cmd =0x44504543, len=24
33,832,102 >>> mbox cmd response data (40 bytes)
33,832,708 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,862,556 UART: [rt]cmd =0x44504543, len=24
33,890,314 >>> mbox cmd response data (40 bytes)
33,890,926 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,921,034 UART: [rt]cmd =0x44504543, len=24
33,948,762 >>> mbox cmd response data (40 bytes)
33,949,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,979,391 UART: [rt]cmd =0x44504543, len=24
33,986,219 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
4,122,651 ready_for_fw is high
4,123,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,143,162 >>> mbox cmd response: success
23,786,949 UART:
23,787,353 UART: Running Caliptra FMC ...
23,788,465 UART:
23,788,612 UART: [state] CFI Enabled
23,796,559 UART: [fht] FMC Alias Private Key: 7
26,136,467 UART: [art] Extend RT PCRs Done
26,137,690 UART: [art] Lock RT PCRs Done
26,139,593 UART: [art] Populate DV Done
26,145,118 UART: [fht] FMC Alias Private Key: 7
26,146,708 UART: [art] Derive CDI
26,147,518 UART: [art] Store in slot 0x4
26,190,115 UART: [art] Derive Key Pair
26,191,154 UART: [art] Store priv key in slot 0x5
29,432,777 UART: [art] Derive Key Pair - Done
29,445,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,726,230 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,735 UART: [art] PUB.X = 10BE86F8BFE0289B027C96753F22B9D2BF52906E2E6C039AE3BDB4086603CD0FDA4D1AF576E305E92BCE692C28C43352
31,734,983 UART: [art] PUB.Y = 3F2B52F4AE6DBABB72033F91DC5ACD2F21CE2A0B608A0103D3EAC5B33ED4A06F4DAEF2F90154BB10E84DA89879DED31D
31,742,284 UART: [art] SIG.R = 8392337D3A51E37F0BEFEBD6D4E9335E8A41135DB51943FAE60D2385BF9908F414AC00BC2D1A2B3EDB4F968F0CFC17BA
31,749,668 UART: [art] SIG.S = F9D04C2974EA7E6969595159579D280D668FFFDB7DE725EEE5B0E07FB800A8CC60B25639711E053C5606D8CA525F8C6F
33,054,639 UART: Caliptra RT
33,055,360 UART: [state] CFI Enabled
33,188,024 UART: [rt] RT listening for mailbox commands...
33,189,938 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,219,629 UART: [rt]cmd =0x44504543, len=24
33,247,577 >>> mbox cmd response data (40 bytes)
33,248,343 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,278,241 UART: [rt]cmd =0x44504543, len=24
33,306,003 >>> mbox cmd response data (40 bytes)
33,306,671 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,336,678 UART: [rt]cmd =0x44504543, len=24
33,364,396 >>> mbox cmd response data (40 bytes)
33,365,013 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,394,829 UART: [rt]cmd =0x44504543, len=24
33,422,458 >>> mbox cmd response data (40 bytes)
33,423,082 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,452,994 UART: [rt]cmd =0x44504543, len=24
33,480,306 >>> mbox cmd response data (40 bytes)
33,480,939 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,510,832 UART: [rt]cmd =0x44504543, len=24
33,538,919 >>> mbox cmd response data (40 bytes)
33,539,572 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,569,523 UART: [rt]cmd =0x44504543, len=24
33,596,734 >>> mbox cmd response data (40 bytes)
33,597,337 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,627,192 UART: [rt]cmd =0x44504543, len=24
33,654,864 >>> mbox cmd response data (40 bytes)
33,655,494 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,685,497 UART: [rt]cmd =0x44504543, len=24
33,713,050 >>> mbox cmd response data (40 bytes)
33,713,701 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,743,706 UART: [rt]cmd =0x44504543, len=24
33,771,843 >>> mbox cmd response data (40 bytes)
33,772,490 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,802,385 UART: [rt]cmd =0x44504543, len=24
33,830,406 >>> mbox cmd response data (40 bytes)
33,831,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,860,810 UART: [rt]cmd =0x44504543, len=24
33,888,426 >>> mbox cmd response data (40 bytes)
33,889,047 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,918,889 UART: [rt]cmd =0x44504543, len=24
33,946,864 >>> mbox cmd response data (40 bytes)
33,947,508 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,977,476 UART: [rt]cmd =0x44504543, len=24
34,005,434 >>> mbox cmd response data (40 bytes)
34,006,049 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,036,075 UART: [rt]cmd =0x44504543, len=24
34,064,183 >>> mbox cmd response data (40 bytes)
34,064,799 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,094,548 UART: [rt]cmd =0x44504543, len=24
34,122,060 >>> mbox cmd response data (40 bytes)
34,122,669 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,152,669 UART: [rt]cmd =0x44504543, len=24
34,159,338 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,069 UART:
192,417 UART: Running Caliptra ROM ...
193,590 UART:
193,739 UART: [state] CFI Enabled
264,277 UART: [state] LifecycleState = Unprovisioned
266,243 UART: [state] DebugLocked = No
267,983 UART: [state] WD Timer not started. Device not locked for debugging
271,084 UART: [kat] SHA2-256
450,692 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,534 UART: [kat] ++
462,069 UART: [kat] sha1
471,980 UART: [kat] SHA2-256
474,695 UART: [kat] SHA2-384
481,532 UART: [kat] SHA2-512-ACC
483,970 UART: [kat] ECC-384
2,949,825 UART: [kat] HMAC-384Kdf
2,970,340 UART: [kat] LMS
3,446,809 UART: [kat] --
3,452,039 UART: [cold-reset] ++
3,453,554 UART: [fht] FHT @ 0x50003400
3,465,940 UART: [idev] ++
3,466,568 UART: [idev] CDI.KEYID = 6
3,467,492 UART: [idev] SUBJECT.KEYID = 7
3,468,730 UART: [idev] UDS.KEYID = 0
3,469,720 ready_for_fw is high
3,469,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,012 UART: [idev] Erasing UDS.KEYID = 0
5,987,579 UART: [idev] Sha1 KeyId Algorithm
6,010,063 UART: [idev] --
6,013,955 UART: [ldev] ++
6,014,529 UART: [ldev] CDI.KEYID = 6
6,015,602 UART: [ldev] SUBJECT.KEYID = 5
6,016,705 UART: [ldev] AUTHORITY.KEYID = 7
6,017,929 UART: [ldev] FE.KEYID = 1
6,057,198 UART: [ldev] Erasing FE.KEYID = 1
8,564,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,980 UART: [ldev] --
10,376,271 UART: [fwproc] Wait for Commands...
10,379,225 UART: [fwproc] Recv command 0x46574c44
10,381,238 UART: [fwproc] Recv'd Img size: 118548 bytes
13,871,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,751 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,025,812 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,354,396 >>> mbox cmd response: success
14,357,928 UART: [afmc] ++
14,358,537 UART: [afmc] CDI.KEYID = 6
14,359,419 UART: [afmc] SUBJECT.KEYID = 7
14,360,686 UART: [afmc] AUTHORITY.KEYID = 5
16,892,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,104 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,274 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,108 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,145 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,685 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,905 UART: [afmc] --
18,697,363 UART: [cold-reset] --
18,700,744 UART: [state] Locking Datavault
18,707,344 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,095 UART: [state] Locking ICCM
18,711,782 UART: [exit] Launching FMC @ 0x40000130
18,720,172 UART:
18,720,440 UART: Running Caliptra FMC ...
18,721,487 UART:
18,721,634 UART: [state] CFI Enabled
18,774,914 UART: [fht] FMC Alias Private Key: 7
20,541,301 UART: [art] Extend RT PCRs Done
20,542,508 UART: [art] Lock RT PCRs Done
20,544,291 UART: [art] Populate DV Done
20,549,586 UART: [fht] FMC Alias Private Key: 7
20,551,126 UART: [art] Derive CDI
20,551,939 UART: [art] Store in slot 0x4
20,607,915 UART: [art] Derive Key Pair
20,608,906 UART: [art] Store priv key in slot 0x5
23,071,409 UART: [art] Derive Key Pair - Done
23,084,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,874 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,374 UART: [art] PUB.X = 6A69687FAAC6195870F5F74DA5EC37D96F5134E3DC4D6D8B909E1D21A23B09E3C2A8695B4E4C7E49CC80E9A5731249DB
24,806,624 UART: [art] PUB.Y = 00F5D1DF4B4EE18A07826351B1EBE913ED75727574CAB601E054A26D4BBFE8850DC42872EDE0645CE4A4E86C8AD22D91
24,813,912 UART: [art] SIG.R = 53B6E464427EA920E4A0704E2BE895F361763750715D6A0C10CF04B21631A855C79F25DB50491D23470F046D12F54C6D
24,821,247 UART: [art] SIG.S = 3D03DAB4E7E3F3117592AC49A74D07885056720BB3B30B1C9BA5DE986B2E4A6AC7B2B6C05B9E77259E8299C3C81F084F
25,799,980 UART: Caliptra RT
25,800,677 UART: [state] CFI Enabled
25,981,880 UART: [rt] RT listening for mailbox commands...
25,983,807 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,013,768 UART: [rt]cmd =0x44504543, len=24
26,042,006 >>> mbox cmd response data (40 bytes)
26,042,797 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,072,688 UART: [rt]cmd =0x44504543, len=24
26,106,265 >>> mbox cmd response data (40 bytes)
26,106,897 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,136,597 UART: [rt]cmd =0x44504543, len=24
26,169,999 >>> mbox cmd response data (40 bytes)
26,170,626 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,200,465 UART: [rt]cmd =0x44504543, len=24
26,234,325 >>> mbox cmd response data (40 bytes)
26,234,985 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,264,995 UART: [rt]cmd =0x44504543, len=24
26,298,161 >>> mbox cmd response data (40 bytes)
26,298,813 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,328,766 UART: [rt]cmd =0x44504543, len=24
26,362,400 >>> mbox cmd response data (40 bytes)
26,363,013 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,392,977 UART: [rt]cmd =0x44504543, len=24
26,426,342 >>> mbox cmd response data (40 bytes)
26,426,966 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,456,901 UART: [rt]cmd =0x44504543, len=24
26,490,448 >>> mbox cmd response data (40 bytes)
26,491,064 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,520,906 UART: [rt]cmd =0x44504543, len=24
26,554,661 >>> mbox cmd response data (40 bytes)
26,555,319 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,585,326 UART: [rt]cmd =0x44504543, len=24
26,619,081 >>> mbox cmd response data (40 bytes)
26,619,770 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,649,679 UART: [rt]cmd =0x44504543, len=24
26,682,840 >>> mbox cmd response data (40 bytes)
26,683,453 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,713,103 UART: [rt]cmd =0x44504543, len=24
26,746,833 >>> mbox cmd response data (40 bytes)
26,747,466 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,777,159 UART: [rt]cmd =0x44504543, len=24
26,810,997 >>> mbox cmd response data (40 bytes)
26,811,623 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,841,520 UART: [rt]cmd =0x44504543, len=24
26,874,956 >>> mbox cmd response data (40 bytes)
26,875,619 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,905,682 UART: [rt]cmd =0x44504543, len=24
26,938,793 >>> mbox cmd response data (40 bytes)
26,939,437 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,969,175 UART: [rt]cmd =0x44504543, len=24
27,003,080 >>> mbox cmd response data (40 bytes)
27,003,694 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,033,443 UART: [rt]cmd =0x44504543, len=24
27,040,319 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,461,261 ready_for_fw is high
3,461,690 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,203,768 >>> mbox cmd response: success
18,491,063 UART:
18,491,460 UART: Running Caliptra FMC ...
18,492,770 UART:
18,492,943 UART: [state] CFI Enabled
18,542,906 UART: [fht] FMC Alias Private Key: 7
20,309,679 UART: [art] Extend RT PCRs Done
20,310,901 UART: [art] Lock RT PCRs Done
20,312,259 UART: [art] Populate DV Done
20,317,791 UART: [fht] FMC Alias Private Key: 7
20,319,327 UART: [art] Derive CDI
20,320,141 UART: [art] Store in slot 0x4
20,376,375 UART: [art] Derive Key Pair
20,377,415 UART: [art] Store priv key in slot 0x5
22,840,392 UART: [art] Derive Key Pair - Done
22,853,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,565,334 UART: [art] Erasing AUTHORITY.KEYID = 7
24,566,857 UART: [art] PUB.X = A13E5387E95CCCDBCE4CF9D422FA359ADF7BC81791CEAA430EC006609B91F9833B56D691F6F226075A61CD15DE8105D4
24,574,182 UART: [art] PUB.Y = 06EDD82942697E68532E5749B59AE3E2E2840171AFE1D07533CD443FAD055821A7B5618966A9596065D867AE824F9CC9
24,581,393 UART: [art] SIG.R = 4A2DC6F02A402F43BB07731B28C40AE0A52C62179A468CAC0BF07E659B27C846CA189E181F6B77ED7D74D42AD14A675A
24,588,788 UART: [art] SIG.S = FE69BA5B78F31089863FA41F4B5A1BC38465C5A3932F27CD2C143BCB64B1F4D44BD2CB1E94B46219CE5C9B958055384B
25,567,122 UART: Caliptra RT
25,567,817 UART: [state] CFI Enabled
25,747,896 UART: [rt] RT listening for mailbox commands...
25,749,803 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,779,765 UART: [rt]cmd =0x44504543, len=24
25,808,259 >>> mbox cmd response data (40 bytes)
25,809,018 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,838,976 UART: [rt]cmd =0x44504543, len=24
25,872,124 >>> mbox cmd response data (40 bytes)
25,872,781 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,902,413 UART: [rt]cmd =0x44504543, len=24
25,936,330 >>> mbox cmd response data (40 bytes)
25,937,011 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,966,752 UART: [rt]cmd =0x44504543, len=24
26,000,064 >>> mbox cmd response data (40 bytes)
26,000,683 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,030,598 UART: [rt]cmd =0x44504543, len=24
26,063,717 >>> mbox cmd response data (40 bytes)
26,064,353 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,094,425 UART: [rt]cmd =0x44504543, len=24
26,129,231 >>> mbox cmd response data (40 bytes)
26,129,863 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,159,705 UART: [rt]cmd =0x44504543, len=24
26,192,971 >>> mbox cmd response data (40 bytes)
26,193,625 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,223,630 UART: [rt]cmd =0x44504543, len=24
26,257,059 >>> mbox cmd response data (40 bytes)
26,257,713 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,287,522 UART: [rt]cmd =0x44504543, len=24
26,321,321 >>> mbox cmd response data (40 bytes)
26,321,926 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,351,748 UART: [rt]cmd =0x44504543, len=24
26,385,333 >>> mbox cmd response data (40 bytes)
26,385,968 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,415,987 UART: [rt]cmd =0x44504543, len=24
26,449,228 >>> mbox cmd response data (40 bytes)
26,449,905 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,479,920 UART: [rt]cmd =0x44504543, len=24
26,524,397 >>> mbox cmd response data (40 bytes)
26,525,071 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,555,030 UART: [rt]cmd =0x44504543, len=24
26,588,094 >>> mbox cmd response data (40 bytes)
26,588,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,618,591 UART: [rt]cmd =0x44504543, len=24
26,652,465 >>> mbox cmd response data (40 bytes)
26,653,084 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,683,083 UART: [rt]cmd =0x44504543, len=24
26,716,375 >>> mbox cmd response data (40 bytes)
26,716,989 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,746,947 UART: [rt]cmd =0x44504543, len=24
26,780,671 >>> mbox cmd response data (40 bytes)
26,781,284 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,811,230 UART: [rt]cmd =0x44504543, len=24
26,817,962 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,332 UART:
192,695 UART: Running Caliptra ROM ...
193,814 UART:
603,685 UART: [state] CFI Enabled
612,230 UART: [state] LifecycleState = Unprovisioned
613,940 UART: [state] DebugLocked = No
615,850 UART: [state] WD Timer not started. Device not locked for debugging
619,540 UART: [kat] SHA2-256
799,137 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
809,947 UART: [kat] ++
810,397 UART: [kat] sha1
820,913 UART: [kat] SHA2-256
823,596 UART: [kat] SHA2-384
828,394 UART: [kat] SHA2-512-ACC
830,696 UART: [kat] ECC-384
3,273,378 UART: [kat] HMAC-384Kdf
3,284,336 UART: [kat] LMS
3,760,857 UART: [kat] --
3,765,350 UART: [cold-reset] ++
3,767,067 UART: [fht] FHT @ 0x50003400
3,778,976 UART: [idev] ++
3,779,618 UART: [idev] CDI.KEYID = 6
3,780,528 UART: [idev] SUBJECT.KEYID = 7
3,781,773 UART: [idev] UDS.KEYID = 0
3,782,697 ready_for_fw is high
3,782,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,931,748 UART: [idev] Erasing UDS.KEYID = 0
6,262,478 UART: [idev] Sha1 KeyId Algorithm
6,285,839 UART: [idev] --
6,290,703 UART: [ldev] ++
6,291,273 UART: [ldev] CDI.KEYID = 6
6,292,403 UART: [ldev] SUBJECT.KEYID = 5
6,293,530 UART: [ldev] AUTHORITY.KEYID = 7
6,294,716 UART: [ldev] FE.KEYID = 1
6,306,768 UART: [ldev] Erasing FE.KEYID = 1
8,785,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,240 UART: [ldev] --
10,579,224 UART: [fwproc] Wait for Commands...
10,581,976 UART: [fwproc] Recv command 0x46574c44
10,583,960 UART: [fwproc] Recv'd Img size: 118548 bytes
14,054,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,136,212 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,209,234 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,536,928 >>> mbox cmd response: success
14,541,686 UART: [afmc] ++
14,542,300 UART: [afmc] CDI.KEYID = 6
14,543,187 UART: [afmc] SUBJECT.KEYID = 7
14,544,406 UART: [afmc] AUTHORITY.KEYID = 5
17,049,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,768,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,770,604 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,786,479 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,802,507 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,818,092 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,842,413 UART: [afmc] --
18,846,651 UART: [cold-reset] --
18,851,502 UART: [state] Locking Datavault
18,856,357 UART: [state] Locking PCR0, PCR1 and PCR31
18,858,121 UART: [state] Locking ICCM
18,860,839 UART: [exit] Launching FMC @ 0x40000130
18,869,239 UART:
18,869,474 UART: Running Caliptra FMC ...
18,870,578 UART:
18,870,735 UART: [state] CFI Enabled
18,879,102 UART: [fht] FMC Alias Private Key: 7
20,645,863 UART: [art] Extend RT PCRs Done
20,647,089 UART: [art] Lock RT PCRs Done
20,648,743 UART: [art] Populate DV Done
20,654,215 UART: [fht] FMC Alias Private Key: 7
20,655,760 UART: [art] Derive CDI
20,656,498 UART: [art] Store in slot 0x4
20,698,880 UART: [art] Derive Key Pair
20,699,937 UART: [art] Store priv key in slot 0x5
23,126,810 UART: [art] Derive Key Pair - Done
23,139,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,845,970 UART: [art] Erasing AUTHORITY.KEYID = 7
24,847,472 UART: [art] PUB.X = DB045DDF175932318470B1E44E11F1F46506940F5C9ED74A2660682168F714316ABBB75951BFA1325A629839ADC12E25
24,854,724 UART: [art] PUB.Y = 1DDDF5B9BE2A2176F6FB80AB2D1C38524C1BEAFB5EFFD530B1B40FEC3019DF3504D43E42E8D3241491C44080063781F5
24,861,962 UART: [art] SIG.R = 3F8A55400315F2C626E863643FF08AB8C3756B3F880F4C0056F9BFE274CEBDB1BB6D0573F177282D23D765992EBC3D7E
24,869,360 UART: [art] SIG.S = 9A8D55F4F5E81BA0B673B097D2E9E928C9D747E33EC98F2D8883979349B0D007E08096690CAADE66C7467EF7165731A9
25,847,880 UART: Caliptra RT
25,848,585 UART: [state] CFI Enabled
25,980,671 UART: [rt] RT listening for mailbox commands...
25,982,584 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,012,277 UART: [rt]cmd =0x44504543, len=24
26,040,093 >>> mbox cmd response data (40 bytes)
26,040,880 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,070,638 UART: [rt]cmd =0x44504543, len=24
26,098,612 >>> mbox cmd response data (40 bytes)
26,099,252 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,129,158 UART: [rt]cmd =0x44504543, len=24
26,156,481 >>> mbox cmd response data (40 bytes)
26,157,142 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,187,100 UART: [rt]cmd =0x44504543, len=24
26,214,481 >>> mbox cmd response data (40 bytes)
26,215,144 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,245,050 UART: [rt]cmd =0x44504543, len=24
26,272,801 >>> mbox cmd response data (40 bytes)
26,273,421 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,303,390 UART: [rt]cmd =0x44504543, len=24
26,330,957 >>> mbox cmd response data (40 bytes)
26,331,580 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,361,371 UART: [rt]cmd =0x44504543, len=24
26,389,010 >>> mbox cmd response data (40 bytes)
26,389,692 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,419,380 UART: [rt]cmd =0x44504543, len=24
26,447,135 >>> mbox cmd response data (40 bytes)
26,447,743 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,477,810 UART: [rt]cmd =0x44504543, len=24
26,505,217 >>> mbox cmd response data (40 bytes)
26,505,841 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,535,911 UART: [rt]cmd =0x44504543, len=24
26,563,090 >>> mbox cmd response data (40 bytes)
26,563,712 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,593,451 UART: [rt]cmd =0x44504543, len=24
26,621,420 >>> mbox cmd response data (40 bytes)
26,622,081 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,651,771 UART: [rt]cmd =0x44504543, len=24
26,679,682 >>> mbox cmd response data (40 bytes)
26,680,290 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,710,326 UART: [rt]cmd =0x44504543, len=24
26,738,213 >>> mbox cmd response data (40 bytes)
26,738,832 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,768,566 UART: [rt]cmd =0x44504543, len=24
26,796,591 >>> mbox cmd response data (40 bytes)
26,797,233 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,827,298 UART: [rt]cmd =0x44504543, len=24
26,855,510 >>> mbox cmd response data (40 bytes)
26,856,150 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,886,217 UART: [rt]cmd =0x44504543, len=24
26,914,021 >>> mbox cmd response data (40 bytes)
26,914,628 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,944,749 UART: [rt]cmd =0x44504543, len=24
26,951,773 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,777,614 ready_for_fw is high
3,778,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,111 >>> mbox cmd response: success
18,705,229 UART:
18,705,617 UART: Running Caliptra FMC ...
18,706,811 UART:
18,706,979 UART: [state] CFI Enabled
18,715,132 UART: [fht] FMC Alias Private Key: 7
20,480,995 UART: [art] Extend RT PCRs Done
20,482,228 UART: [art] Lock RT PCRs Done
20,484,044 UART: [art] Populate DV Done
20,489,633 UART: [fht] FMC Alias Private Key: 7
20,491,343 UART: [art] Derive CDI
20,492,178 UART: [art] Store in slot 0x4
20,534,996 UART: [art] Derive Key Pair
20,536,005 UART: [art] Store priv key in slot 0x5
22,963,063 UART: [art] Derive Key Pair - Done
22,975,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,027 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,534 UART: [art] PUB.X = F8EB4EF4066759A46F7C4ADAD654F1D8732D236944A083294B48684E2B052EEB5AAC265BB4683BF986C74EBAE6DFDEAC
24,690,801 UART: [art] PUB.Y = 127EA51B4A89A6665E8C758F5F4F4DEA53551735D9D87A9A0BFA8703069764EF1372364ACBB1E5DAC04469CCF1F9A50F
24,698,059 UART: [art] SIG.R = 5252704CDD450F75400CB9EB8C9951B422DF3079848EF5497401F7277BE19B768009CC993DC6DFA618F5097263662DF8
24,705,503 UART: [art] SIG.S = 9D32FF692AF71010AC7E4044C900D72BC01AABD5084792275CF8033E70A2BACB5946B5131BBB489D91586A8559813ABB
25,684,218 UART: Caliptra RT
25,684,923 UART: [state] CFI Enabled
25,817,910 UART: [rt] RT listening for mailbox commands...
25,819,838 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,849,646 UART: [rt]cmd =0x44504543, len=24
25,877,164 >>> mbox cmd response data (40 bytes)
25,877,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,907,681 UART: [rt]cmd =0x44504543, len=24
25,935,090 >>> mbox cmd response data (40 bytes)
25,935,743 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,965,588 UART: [rt]cmd =0x44504543, len=24
25,993,129 >>> mbox cmd response data (40 bytes)
25,993,797 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,023,808 UART: [rt]cmd =0x44504543, len=24
26,051,187 >>> mbox cmd response data (40 bytes)
26,051,810 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,081,563 UART: [rt]cmd =0x44504543, len=24
26,108,932 >>> mbox cmd response data (40 bytes)
26,109,556 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,139,188 UART: [rt]cmd =0x44504543, len=24
26,166,910 >>> mbox cmd response data (40 bytes)
26,167,539 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,197,721 UART: [rt]cmd =0x44504543, len=24
26,224,984 >>> mbox cmd response data (40 bytes)
26,225,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,255,480 UART: [rt]cmd =0x44504543, len=24
26,282,789 >>> mbox cmd response data (40 bytes)
26,283,392 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,313,189 UART: [rt]cmd =0x44504543, len=24
26,340,313 >>> mbox cmd response data (40 bytes)
26,340,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,371,091 UART: [rt]cmd =0x44504543, len=24
26,399,275 >>> mbox cmd response data (40 bytes)
26,399,923 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,429,825 UART: [rt]cmd =0x44504543, len=24
26,457,508 >>> mbox cmd response data (40 bytes)
26,458,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,488,073 UART: [rt]cmd =0x44504543, len=24
26,515,762 >>> mbox cmd response data (40 bytes)
26,516,385 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,546,127 UART: [rt]cmd =0x44504543, len=24
26,573,202 >>> mbox cmd response data (40 bytes)
26,573,822 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,603,558 UART: [rt]cmd =0x44504543, len=24
26,631,474 >>> mbox cmd response data (40 bytes)
26,632,125 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,662,082 UART: [rt]cmd =0x44504543, len=24
26,689,778 >>> mbox cmd response data (40 bytes)
26,690,383 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,720,400 UART: [rt]cmd =0x44504543, len=24
26,748,109 >>> mbox cmd response data (40 bytes)
26,748,737 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,778,424 UART: [rt]cmd =0x44504543, len=24
26,785,042 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,725 writing to cptra_bootfsm_go
192,950 UART:
193,310 UART: Running Caliptra ROM ...
194,404 UART:
194,544 UART: [state] CFI Enabled
265,328 UART: [state] LifecycleState = Unprovisioned
267,681 UART: [state] DebugLocked = No
269,697 UART: [state] WD Timer not started. Device not locked for debugging
274,442 UART: [kat] SHA2-256
464,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,088 UART: [kat] ++
475,539 UART: [kat] sha1
488,276 UART: [kat] SHA2-256
491,324 UART: [kat] SHA2-384
496,049 UART: [kat] SHA2-512-ACC
498,633 UART: [kat] ECC-384
2,948,219 UART: [kat] HMAC-384Kdf
2,972,702 UART: [kat] LMS
3,504,466 UART: [kat] --
3,508,399 UART: [cold-reset] ++
3,509,687 UART: [fht] FHT @ 0x50003400
3,521,728 UART: [idev] ++
3,522,436 UART: [idev] CDI.KEYID = 6
3,523,515 UART: [idev] SUBJECT.KEYID = 7
3,524,637 UART: [idev] UDS.KEYID = 0
3,525,559 ready_for_fw is high
3,525,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,831 UART: [idev] Erasing UDS.KEYID = 0
6,030,207 UART: [idev] Sha1 KeyId Algorithm
6,051,610 UART: [idev] --
6,055,338 UART: [ldev] ++
6,056,020 UART: [ldev] CDI.KEYID = 6
6,056,933 UART: [ldev] SUBJECT.KEYID = 5
6,058,111 UART: [ldev] AUTHORITY.KEYID = 7
6,059,288 UART: [ldev] FE.KEYID = 1
6,101,541 UART: [ldev] Erasing FE.KEYID = 1
8,607,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,323 UART: [ldev] --
10,415,651 UART: [fwproc] Wait for Commands...
10,417,688 UART: [fwproc] Recv command 0x46574c44
10,420,005 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,801 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,432 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,043 >>> mbox cmd response: success
14,684,924 UART: [afmc] ++
14,685,651 UART: [afmc] CDI.KEYID = 6
14,686,850 UART: [afmc] SUBJECT.KEYID = 7
14,688,292 UART: [afmc] AUTHORITY.KEYID = 5
17,214,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,301 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,407 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,572 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,459 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,957 UART: [afmc] --
19,011,984 UART: [cold-reset] --
19,016,281 UART: [state] Locking Datavault
19,021,277 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,425 UART: [state] Locking ICCM
19,024,969 UART: [exit] Launching FMC @ 0x40000130
19,033,666 UART:
19,033,902 UART: Running Caliptra FMC ...
19,034,927 UART:
19,035,074 UART: [state] CFI Enabled
19,094,847 UART: [fht] FMC Alias Private Key: 7
20,861,220 UART: [art] Extend RT PCRs Done
20,862,439 UART: [art] Lock RT PCRs Done
20,863,710 UART: [art] Populate DV Done
20,868,798 UART: [fht] FMC Alias Private Key: 7
20,870,327 UART: [art] Derive CDI
20,871,057 UART: [art] Store in slot 0x4
20,927,828 UART: [art] Derive Key Pair
20,928,865 UART: [art] Store priv key in slot 0x5
23,391,989 UART: [art] Derive Key Pair - Done
23,404,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,962 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,501 UART: [art] PUB.X = 25C6395B14BEB460280DFDEE99D202E14FBA90A90ED363061D237B61310E4F86C414D0F9931CDAD86CA0228C2099A5B5
25,125,748 UART: [art] PUB.Y = 047CD7C214CE52CD457EA77F0197850A121858B3F5FFEAFABE7E55CB7345429AF51A13D39D6F5EF965A79C887F6827DB
25,132,970 UART: [art] SIG.R = A8FA7FD191F3EE81BF1B78F41BFB9D12FFA0BD72700FAB93C7B53B7531D3C841F716DA7080B023E492D9528EDFB77C49
25,140,400 UART: [art] SIG.S = 1F5E87A28AB4F9462AA662E79B0FDA63F2A1C5EC8C3597402B39E6701F552254607394499420167A68DB6EE0994821B3
26,119,016 UART: Caliptra RT
26,119,727 UART: [state] CFI Enabled
26,300,661 UART: [rt] RT listening for mailbox commands...
26,302,582 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,332,604 UART: [rt]cmd =0x44504543, len=24
26,360,377 >>> mbox cmd response data (40 bytes)
26,361,179 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,391,247 UART: [rt]cmd =0x44504543, len=24
26,424,357 >>> mbox cmd response data (40 bytes)
26,425,015 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,455,190 UART: [rt]cmd =0x44504543, len=24
26,488,518 >>> mbox cmd response data (40 bytes)
26,489,191 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,519,248 UART: [rt]cmd =0x44504543, len=24
26,552,668 >>> mbox cmd response data (40 bytes)
26,553,281 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,583,022 UART: [rt]cmd =0x44504543, len=24
26,616,592 >>> mbox cmd response data (40 bytes)
26,617,220 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,647,237 UART: [rt]cmd =0x44504543, len=24
26,680,690 >>> mbox cmd response data (40 bytes)
26,681,318 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,711,057 UART: [rt]cmd =0x44504543, len=24
26,744,793 >>> mbox cmd response data (40 bytes)
26,745,445 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,775,233 UART: [rt]cmd =0x44504543, len=24
26,808,658 >>> mbox cmd response data (40 bytes)
26,809,305 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,839,386 UART: [rt]cmd =0x44504543, len=24
26,872,970 >>> mbox cmd response data (40 bytes)
26,873,592 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,903,549 UART: [rt]cmd =0x44504543, len=24
26,937,056 >>> mbox cmd response data (40 bytes)
26,937,687 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,967,482 UART: [rt]cmd =0x44504543, len=24
27,001,103 >>> mbox cmd response data (40 bytes)
27,001,748 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,031,753 UART: [rt]cmd =0x44504543, len=24
27,064,912 >>> mbox cmd response data (40 bytes)
27,065,561 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,095,246 UART: [rt]cmd =0x44504543, len=24
27,129,103 >>> mbox cmd response data (40 bytes)
27,129,753 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,159,536 UART: [rt]cmd =0x44504543, len=24
27,193,192 >>> mbox cmd response data (40 bytes)
27,193,803 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,223,701 UART: [rt]cmd =0x44504543, len=24
27,256,991 >>> mbox cmd response data (40 bytes)
27,257,609 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,287,566 UART: [rt]cmd =0x44504543, len=24
27,321,503 >>> mbox cmd response data (40 bytes)
27,322,117 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,352,116 UART: [rt]cmd =0x44504543, len=24
27,359,050 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,437,180 ready_for_fw is high
3,437,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,508 >>> mbox cmd response: success
19,135,640 UART:
19,136,062 UART: Running Caliptra FMC ...
19,137,174 UART:
19,137,328 UART: [state] CFI Enabled
19,203,223 UART: [fht] FMC Alias Private Key: 7
20,970,098 UART: [art] Extend RT PCRs Done
20,971,330 UART: [art] Lock RT PCRs Done
20,973,087 UART: [art] Populate DV Done
20,978,346 UART: [fht] FMC Alias Private Key: 7
20,979,893 UART: [art] Derive CDI
20,980,629 UART: [art] Store in slot 0x4
21,036,150 UART: [art] Derive Key Pair
21,037,216 UART: [art] Store priv key in slot 0x5
23,500,256 UART: [art] Derive Key Pair - Done
23,513,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,085 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,600 UART: [art] PUB.X = 88C9C170122ACC591E81D36802F383644517EDC51D3CF5CA6AE12682EA88E84746267C3ED5FA6BA73C04FE7D30F0B1C9
25,234,833 UART: [art] PUB.Y = CF57AB7EADE3A90442FCF0F8B8FE1480FE2E04D9B69BEA0710BB483D2AA62E5C2AC07CA6F3D4A3A42746A3C0046B6BD1
25,242,110 UART: [art] SIG.R = E76D86E0CA5A9C238D514D01974A0953F356F679FDC1294A30BC9E95594C1BD79F1787CC0A040A5DF90F02715A08C71D
25,249,532 UART: [art] SIG.S = 9AB78236F5DC73C2B2ECF1A8DFAF12D8B3AE43C6E620CC5928CBE16F1F48F0FCDC21CCBB72715E69B0757058015C3181
26,228,342 UART: Caliptra RT
26,229,057 UART: [state] CFI Enabled
26,411,385 UART: [rt] RT listening for mailbox commands...
26,413,311 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,443,346 UART: [rt]cmd =0x44504543, len=24
26,491,334 >>> mbox cmd response data (40 bytes)
26,492,100 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,521,897 UART: [rt]cmd =0x44504543, len=24
26,555,324 >>> mbox cmd response data (40 bytes)
26,555,963 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,585,974 UART: [rt]cmd =0x44504543, len=24
26,619,612 >>> mbox cmd response data (40 bytes)
26,620,277 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,650,386 UART: [rt]cmd =0x44504543, len=24
26,683,923 >>> mbox cmd response data (40 bytes)
26,684,578 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,714,367 UART: [rt]cmd =0x44504543, len=24
26,747,923 >>> mbox cmd response data (40 bytes)
26,748,540 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,778,506 UART: [rt]cmd =0x44504543, len=24
26,811,907 >>> mbox cmd response data (40 bytes)
26,812,534 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,842,383 UART: [rt]cmd =0x44504543, len=24
26,875,726 >>> mbox cmd response data (40 bytes)
26,876,364 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,906,426 UART: [rt]cmd =0x44504543, len=24
26,939,855 >>> mbox cmd response data (40 bytes)
26,940,504 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,970,350 UART: [rt]cmd =0x44504543, len=24
27,003,947 >>> mbox cmd response data (40 bytes)
27,004,599 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,034,395 UART: [rt]cmd =0x44504543, len=24
27,068,081 >>> mbox cmd response data (40 bytes)
27,068,692 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,098,493 UART: [rt]cmd =0x44504543, len=24
27,131,952 >>> mbox cmd response data (40 bytes)
27,132,574 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,162,480 UART: [rt]cmd =0x44504543, len=24
27,196,311 >>> mbox cmd response data (40 bytes)
27,196,923 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,226,621 UART: [rt]cmd =0x44504543, len=24
27,260,536 >>> mbox cmd response data (40 bytes)
27,261,182 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,291,240 UART: [rt]cmd =0x44504543, len=24
27,324,292 >>> mbox cmd response data (40 bytes)
27,324,940 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,355,056 UART: [rt]cmd =0x44504543, len=24
27,388,703 >>> mbox cmd response data (40 bytes)
27,389,309 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,419,268 UART: [rt]cmd =0x44504543, len=24
27,452,132 >>> mbox cmd response data (40 bytes)
27,452,743 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,482,473 UART: [rt]cmd =0x44504543, len=24
27,488,976 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,490 UART:
192,869 UART: Running Caliptra ROM ...
194,038 UART:
603,568 UART: [state] CFI Enabled
616,470 UART: [state] LifecycleState = Unprovisioned
618,854 UART: [state] DebugLocked = No
621,657 UART: [state] WD Timer not started. Device not locked for debugging
625,637 UART: [kat] SHA2-256
815,503 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,312 UART: [kat] ++
826,764 UART: [kat] sha1
838,064 UART: [kat] SHA2-256
841,076 UART: [kat] SHA2-384
846,289 UART: [kat] SHA2-512-ACC
848,893 UART: [kat] ECC-384
3,290,536 UART: [kat] HMAC-384Kdf
3,303,765 UART: [kat] LMS
3,835,550 UART: [kat] --
3,841,922 UART: [cold-reset] ++
3,843,793 UART: [fht] FHT @ 0x50003400
3,854,638 UART: [idev] ++
3,855,275 UART: [idev] CDI.KEYID = 6
3,856,232 UART: [idev] SUBJECT.KEYID = 7
3,857,473 UART: [idev] UDS.KEYID = 0
3,858,403 ready_for_fw is high
3,858,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,506 UART: [idev] Erasing UDS.KEYID = 0
6,333,494 UART: [idev] Sha1 KeyId Algorithm
6,356,936 UART: [idev] --
6,360,771 UART: [ldev] ++
6,361,469 UART: [ldev] CDI.KEYID = 6
6,362,385 UART: [ldev] SUBJECT.KEYID = 5
6,363,549 UART: [ldev] AUTHORITY.KEYID = 7
6,364,783 UART: [ldev] FE.KEYID = 1
6,376,674 UART: [ldev] Erasing FE.KEYID = 1
8,857,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,412 UART: [ldev] --
10,648,580 UART: [fwproc] Wait for Commands...
10,651,000 UART: [fwproc] Recv command 0x46574c44
10,653,316 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,989 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,594 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,160 >>> mbox cmd response: success
14,913,861 UART: [afmc] ++
14,914,577 UART: [afmc] CDI.KEYID = 6
14,915,826 UART: [afmc] SUBJECT.KEYID = 7
14,917,270 UART: [afmc] AUTHORITY.KEYID = 5
17,422,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,665 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,761 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,177,904 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,860 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,216,616 UART: [afmc] --
19,220,380 UART: [cold-reset] --
19,223,931 UART: [state] Locking Datavault
19,228,445 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,684 UART: [state] Locking ICCM
19,233,438 UART: [exit] Launching FMC @ 0x40000130
19,242,086 UART:
19,242,329 UART: Running Caliptra FMC ...
19,243,431 UART:
19,243,592 UART: [state] CFI Enabled
19,251,692 UART: [fht] FMC Alias Private Key: 7
21,018,789 UART: [art] Extend RT PCRs Done
21,020,022 UART: [art] Lock RT PCRs Done
21,021,787 UART: [art] Populate DV Done
21,027,043 UART: [fht] FMC Alias Private Key: 7
21,028,643 UART: [art] Derive CDI
21,029,574 UART: [art] Store in slot 0x4
21,072,391 UART: [art] Derive Key Pair
21,073,408 UART: [art] Store priv key in slot 0x5
23,499,967 UART: [art] Derive Key Pair - Done
23,513,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,709 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,225 UART: [art] PUB.X = 2EB7697355B8731A16944155EBFCA6C0C0B8C6E7BA752C9ED55561D350E05B0BE6E7CD56686B29F5C868BEDB6B72702D
25,228,492 UART: [art] PUB.Y = C3258F03DECFA12D42073FF28DD53614B5C630699E07394FE636F04C91B3EE39F0EA4489A685C922F1E2951FFD036B60
25,235,755 UART: [art] SIG.R = 4B813CA31400400DE772A4DA12EDC9B783DDAA5A189C33584A8009A0937D27C82B0CC126C0A5316DB43FCEDF53AF65F2
25,243,126 UART: [art] SIG.S = 6CFC953322C104A26EEFBD91C2B50191C83BC5D72692A8FD99F102C29FFBE9C816B8E66DDD89152ECAAF8AA4002D1F2A
26,221,767 UART: Caliptra RT
26,222,458 UART: [state] CFI Enabled
26,355,491 UART: [rt] RT listening for mailbox commands...
26,357,428 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,387,187 UART: [rt]cmd =0x44504543, len=24
26,414,736 >>> mbox cmd response data (40 bytes)
26,415,553 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,445,356 UART: [rt]cmd =0x44504543, len=24
26,473,180 >>> mbox cmd response data (40 bytes)
26,473,841 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,503,817 UART: [rt]cmd =0x44504543, len=24
26,531,364 >>> mbox cmd response data (40 bytes)
26,531,994 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,562,069 UART: [rt]cmd =0x44504543, len=24
26,589,701 >>> mbox cmd response data (40 bytes)
26,590,328 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,620,277 UART: [rt]cmd =0x44504543, len=24
26,648,354 >>> mbox cmd response data (40 bytes)
26,649,009 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,678,810 UART: [rt]cmd =0x44504543, len=24
26,706,187 >>> mbox cmd response data (40 bytes)
26,706,804 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,736,821 UART: [rt]cmd =0x44504543, len=24
26,764,125 >>> mbox cmd response data (40 bytes)
26,764,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,794,489 UART: [rt]cmd =0x44504543, len=24
26,821,755 >>> mbox cmd response data (40 bytes)
26,822,380 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,852,497 UART: [rt]cmd =0x44504543, len=24
26,879,617 >>> mbox cmd response data (40 bytes)
26,880,274 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,910,337 UART: [rt]cmd =0x44504543, len=24
26,937,443 >>> mbox cmd response data (40 bytes)
26,938,054 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,967,966 UART: [rt]cmd =0x44504543, len=24
26,995,215 >>> mbox cmd response data (40 bytes)
26,995,845 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,025,742 UART: [rt]cmd =0x44504543, len=24
27,053,299 >>> mbox cmd response data (40 bytes)
27,053,959 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,083,916 UART: [rt]cmd =0x44504543, len=24
27,110,876 >>> mbox cmd response data (40 bytes)
27,111,544 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,141,665 UART: [rt]cmd =0x44504543, len=24
27,169,258 >>> mbox cmd response data (40 bytes)
27,169,864 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,199,717 UART: [rt]cmd =0x44504543, len=24
27,227,173 >>> mbox cmd response data (40 bytes)
27,227,789 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,257,632 UART: [rt]cmd =0x44504543, len=24
27,284,956 >>> mbox cmd response data (40 bytes)
27,285,602 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,315,344 UART: [rt]cmd =0x44504543, len=24
27,321,966 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
3,756,076 ready_for_fw is high
3,756,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,030,904 >>> mbox cmd response: success
19,283,159 UART:
19,283,589 UART: Running Caliptra FMC ...
19,284,707 UART:
19,284,873 UART: [state] CFI Enabled
19,292,472 UART: [fht] FMC Alias Private Key: 7
21,058,384 UART: [art] Extend RT PCRs Done
21,059,608 UART: [art] Lock RT PCRs Done
21,061,482 UART: [art] Populate DV Done
21,066,911 UART: [fht] FMC Alias Private Key: 7
21,068,571 UART: [art] Derive CDI
21,069,319 UART: [art] Store in slot 0x4
21,112,037 UART: [art] Derive Key Pair
21,113,106 UART: [art] Store priv key in slot 0x5
23,539,700 UART: [art] Derive Key Pair - Done
23,552,321 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,258,610 UART: [art] Erasing AUTHORITY.KEYID = 7
25,260,117 UART: [art] PUB.X = D92A37F83543BB2C4108C025DADBCB58CDC536093353287F839409C2DD5642FA700E149D2E79BE45C62E1D52373C4518
25,267,358 UART: [art] PUB.Y = 3AC48D895A0E3DB16F058D8A204B08EB7B57464C81D4E4DBCD2CE4DE0A4D7F702E4A2DA0F33DDC19E071F99B658D24E1
25,274,641 UART: [art] SIG.R = 01A77ED1040A062E2E2017E97D9AD5FB8E6C01A8F166B1E5DF545FFB47B1E2864DB292896ED0D2B12F33B3C27CD49FD6
25,282,022 UART: [art] SIG.S = C72B88695178CAFCDFC3CF00F204666527DDC04DE0470D7B0BEFE683AFBF168FB6E92AB2A9A31B6BACCF0AE1D60F7388
26,260,883 UART: Caliptra RT
26,261,576 UART: [state] CFI Enabled
26,394,692 UART: [rt] RT listening for mailbox commands...
26,396,610 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,426,593 UART: [rt]cmd =0x44504543, len=24
26,454,141 >>> mbox cmd response data (40 bytes)
26,454,930 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,484,835 UART: [rt]cmd =0x44504543, len=24
26,512,218 >>> mbox cmd response data (40 bytes)
26,512,871 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,543,028 UART: [rt]cmd =0x44504543, len=24
26,570,927 >>> mbox cmd response data (40 bytes)
26,571,565 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,601,638 UART: [rt]cmd =0x44504543, len=24
26,629,101 >>> mbox cmd response data (40 bytes)
26,629,738 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,659,313 UART: [rt]cmd =0x44504543, len=24
26,686,730 >>> mbox cmd response data (40 bytes)
26,687,396 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,717,306 UART: [rt]cmd =0x44504543, len=24
26,745,115 >>> mbox cmd response data (40 bytes)
26,745,734 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,775,534 UART: [rt]cmd =0x44504543, len=24
26,803,594 >>> mbox cmd response data (40 bytes)
26,804,222 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,834,199 UART: [rt]cmd =0x44504543, len=24
26,861,643 >>> mbox cmd response data (40 bytes)
26,862,312 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,892,429 UART: [rt]cmd =0x44504543, len=24
26,919,810 >>> mbox cmd response data (40 bytes)
26,920,465 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,950,481 UART: [rt]cmd =0x44504543, len=24
26,978,022 >>> mbox cmd response data (40 bytes)
26,978,637 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,008,598 UART: [rt]cmd =0x44504543, len=24
27,036,128 >>> mbox cmd response data (40 bytes)
27,036,758 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,066,716 UART: [rt]cmd =0x44504543, len=24
27,094,262 >>> mbox cmd response data (40 bytes)
27,094,928 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,124,670 UART: [rt]cmd =0x44504543, len=24
27,152,071 >>> mbox cmd response data (40 bytes)
27,152,696 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,182,559 UART: [rt]cmd =0x44504543, len=24
27,210,454 >>> mbox cmd response data (40 bytes)
27,211,087 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,241,054 UART: [rt]cmd =0x44504543, len=24
27,268,787 >>> mbox cmd response data (40 bytes)
27,269,418 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,299,210 UART: [rt]cmd =0x44504543, len=24
27,326,893 >>> mbox cmd response data (40 bytes)
27,327,565 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,357,527 UART: [rt]cmd =0x44504543, len=24
27,364,047 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,660 UART: [state] LifecycleState = Unprovisioned
86,315 UART: [state] DebugLocked = No
87,037 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,631 UART: [kat] SHA2-256
882,562 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,677 UART: [kat] ++
886,829 UART: [kat] sha1
891,083 UART: [kat] SHA2-256
893,021 UART: [kat] SHA2-384
895,720 UART: [kat] SHA2-512-ACC
897,621 UART: [kat] ECC-384
903,294 UART: [kat] HMAC-384Kdf
908,016 UART: [kat] LMS
1,476,212 UART: [kat] --
1,476,951 UART: [cold-reset] ++
1,477,387 UART: [fht] Storing FHT @ 0x50003400
1,480,214 UART: [idev] ++
1,480,382 UART: [idev] CDI.KEYID = 6
1,480,742 UART: [idev] SUBJECT.KEYID = 7
1,481,166 UART: [idev] UDS.KEYID = 0
1,481,511 ready_for_fw is high
1,481,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,396 UART: [idev] Erasing UDS.KEYID = 0
1,505,750 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,388 UART: [idev] --
1,515,523 UART: [ldev] ++
1,515,691 UART: [ldev] CDI.KEYID = 6
1,516,054 UART: [ldev] SUBJECT.KEYID = 5
1,516,480 UART: [ldev] AUTHORITY.KEYID = 7
1,516,943 UART: [ldev] FE.KEYID = 1
1,522,231 UART: [ldev] Erasing FE.KEYID = 1
1,547,022 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,306 UART: [ldev] --
1,586,593 UART: [fwproc] Waiting for Commands...
1,587,308 UART: [fwproc] Received command 0x46574c44
1,588,099 UART: [fwproc] Received Image of size 118548 bytes
2,932,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,913 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,131 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,548 >>> mbox cmd response: success
3,133,652 UART: [afmc] ++
3,133,820 UART: [afmc] CDI.KEYID = 6
3,134,182 UART: [afmc] SUBJECT.KEYID = 7
3,134,607 UART: [afmc] AUTHORITY.KEYID = 5
3,169,606 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,024 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,804 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,513 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,396 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,079 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,063 UART: [afmc] --
3,212,971 UART: [cold-reset] --
3,213,993 UART: [state] Locking Datavault
3,214,976 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,580 UART: [state] Locking ICCM
3,216,182 UART: [exit] Launching FMC @ 0x40000130
3,221,512 UART:
3,221,528 UART: Running Caliptra FMC ...
3,221,936 UART:
3,221,990 UART: [state] CFI Enabled
3,232,400 UART: [fht] FMC Alias Private Key: 7
3,351,644 UART: [art] Extend RT PCRs Done
3,352,072 UART: [art] Lock RT PCRs Done
3,353,812 UART: [art] Populate DV Done
3,362,211 UART: [fht] FMC Alias Private Key: 7
3,363,277 UART: [art] Derive CDI
3,363,557 UART: [art] Store in slot 0x4
3,449,159 UART: [art] Derive Key Pair
3,449,519 UART: [art] Store priv key in slot 0x5
3,462,892 UART: [art] Derive Key Pair - Done
3,477,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,777 UART: [art] PUB.X = 80775415023BE5F8D3C48AFBF3474158D5A203DD587B4A6CC053442FBD7E2F129C315848DA79F1E850312ACB8ECCD115
3,500,547 UART: [art] PUB.Y = 9071AC4E87884376F77A2DCD764910B9999C75DCD0597736ED697FAE4E4B9C42C7CA137C625B7CE63089964C5944F63B
3,507,497 UART: [art] SIG.R = E64775DCB3AF33D1424CDC98015CA4AE01444A9763E742F525F7AA1BB6F65501DC0FB5C030021AF3F6368EFA3F2B58B6
3,514,264 UART: [art] SIG.S = B126866C68EAF998D857B8EF5E4D2568943F5CABF60313E80FA112D9ED5814C777DB4A1B7C5E5E7CB67CC59F9DBBEDAF
3,538,200 UART: Caliptra RT
3,538,451 UART: [state] CFI Enabled
3,658,089 UART: [rt] RT listening for mailbox commands...
3,658,759 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,549 UART: [rt]cmd =0x44504543, len=24
3,716,423 >>> mbox cmd response data (40 bytes)
3,716,424 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,745,949 UART: [rt]cmd =0x44504543, len=24
3,773,660 >>> mbox cmd response data (40 bytes)
3,773,661 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,803,396 UART: [rt]cmd =0x44504543, len=24
3,831,202 >>> mbox cmd response data (40 bytes)
3,831,203 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,860,898 UART: [rt]cmd =0x44504543, len=24
3,888,601 >>> mbox cmd response data (40 bytes)
3,888,602 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,918,297 UART: [rt]cmd =0x44504543, len=24
3,945,739 >>> mbox cmd response data (40 bytes)
3,945,740 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,975,315 UART: [rt]cmd =0x44504543, len=24
4,002,938 >>> mbox cmd response data (40 bytes)
4,002,939 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,032,456 UART: [rt]cmd =0x44504543, len=24
4,060,404 >>> mbox cmd response data (40 bytes)
4,060,405 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,090,016 UART: [rt]cmd =0x44504543, len=24
4,117,121 >>> mbox cmd response data (40 bytes)
4,117,122 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,146,441 UART: [rt]cmd =0x44504543, len=24
4,173,675 >>> mbox cmd response data (40 bytes)
4,173,676 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,203,041 UART: [rt]cmd =0x44504543, len=24
4,230,636 >>> mbox cmd response data (40 bytes)
4,230,637 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,260,014 UART: [rt]cmd =0x44504543, len=24
4,287,250 >>> mbox cmd response data (40 bytes)
4,287,251 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,316,918 UART: [rt]cmd =0x44504543, len=24
4,344,879 >>> mbox cmd response data (40 bytes)
4,344,880 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,374,211 UART: [rt]cmd =0x44504543, len=24
4,401,745 >>> mbox cmd response data (40 bytes)
4,401,746 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,431,189 UART: [rt]cmd =0x44504543, len=24
4,458,996 >>> mbox cmd response data (40 bytes)
4,458,997 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,488,460 UART: [rt]cmd =0x44504543, len=24
4,516,186 >>> mbox cmd response data (40 bytes)
4,516,187 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,545,630 UART: [rt]cmd =0x44504543, len=24
4,572,967 >>> mbox cmd response data (40 bytes)
4,572,968 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,602,413 UART: [rt]cmd =0x44504543, len=24
4,609,536 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,617 ready_for_fw is high
1,362,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,172 >>> mbox cmd response: success
3,042,903 UART:
3,042,919 UART: Running Caliptra FMC ...
3,043,327 UART:
3,043,381 UART: [state] CFI Enabled
3,054,009 UART: [fht] FMC Alias Private Key: 7
3,172,969 UART: [art] Extend RT PCRs Done
3,173,397 UART: [art] Lock RT PCRs Done
3,174,959 UART: [art] Populate DV Done
3,182,996 UART: [fht] FMC Alias Private Key: 7
3,183,996 UART: [art] Derive CDI
3,184,276 UART: [art] Store in slot 0x4
3,269,718 UART: [art] Derive Key Pair
3,270,078 UART: [art] Store priv key in slot 0x5
3,283,357 UART: [art] Derive Key Pair - Done
3,298,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,594 UART: [art] PUB.X = 6E5360ECC5F132416299DEF853D106DBFBB9BB4B8899F5D3148532E9EADAD89A5044DF3A19D2DF20876AFC275249919B
3,321,371 UART: [art] PUB.Y = AF513A08DDED83EA5AB85A2AD589C27203A34A2D13323142172BAD1DEEF0B0A5892C76F8A320BFD007AF539A3BC85E33
3,328,328 UART: [art] SIG.R = 0771243FC522BBAAB29B96086F979423AA135FE66C9C9CB18659E340BA21F4CBB05CC49F892FBEF3E80C07CE3527408D
3,335,096 UART: [art] SIG.S = F9DAB530D4CEB9B34C9E0136E881A2D4F23597F762712A35853D98A0BBBE5B20654B9A723A84C394198F0365B4108668
3,358,834 UART: Caliptra RT
3,359,085 UART: [state] CFI Enabled
3,479,990 UART: [rt] RT listening for mailbox commands...
3,480,660 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,178 UART: [rt]cmd =0x44504543, len=24
3,537,450 >>> mbox cmd response data (40 bytes)
3,537,451 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,666 UART: [rt]cmd =0x44504543, len=24
3,593,903 >>> mbox cmd response data (40 bytes)
3,593,904 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,623,331 UART: [rt]cmd =0x44504543, len=24
3,650,563 >>> mbox cmd response data (40 bytes)
3,650,564 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,679,797 UART: [rt]cmd =0x44504543, len=24
3,707,328 >>> mbox cmd response data (40 bytes)
3,707,329 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,736,786 UART: [rt]cmd =0x44504543, len=24
3,764,482 >>> mbox cmd response data (40 bytes)
3,764,483 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,794,068 UART: [rt]cmd =0x44504543, len=24
3,821,219 >>> mbox cmd response data (40 bytes)
3,821,220 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,850,883 UART: [rt]cmd =0x44504543, len=24
3,878,379 >>> mbox cmd response data (40 bytes)
3,878,380 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,907,869 UART: [rt]cmd =0x44504543, len=24
3,934,998 >>> mbox cmd response data (40 bytes)
3,934,999 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,964,440 UART: [rt]cmd =0x44504543, len=24
3,991,600 >>> mbox cmd response data (40 bytes)
3,991,601 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,328 UART: [rt]cmd =0x44504543, len=24
4,049,163 >>> mbox cmd response data (40 bytes)
4,049,164 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,078,423 UART: [rt]cmd =0x44504543, len=24
4,106,355 >>> mbox cmd response data (40 bytes)
4,106,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,135,775 UART: [rt]cmd =0x44504543, len=24
4,163,182 >>> mbox cmd response data (40 bytes)
4,163,183 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,192,952 UART: [rt]cmd =0x44504543, len=24
4,220,036 >>> mbox cmd response data (40 bytes)
4,220,037 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,249,508 UART: [rt]cmd =0x44504543, len=24
4,277,123 >>> mbox cmd response data (40 bytes)
4,277,124 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,306,619 UART: [rt]cmd =0x44504543, len=24
4,333,637 >>> mbox cmd response data (40 bytes)
4,333,638 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,363,119 UART: [rt]cmd =0x44504543, len=24
4,390,942 >>> mbox cmd response data (40 bytes)
4,390,943 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,420,294 UART: [rt]cmd =0x44504543, len=24
4,428,011 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
87,136 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,756 UART: [kat] SHA2-256
882,687 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,802 UART: [kat] ++
886,954 UART: [kat] sha1
891,120 UART: [kat] SHA2-256
893,058 UART: [kat] SHA2-384
895,805 UART: [kat] SHA2-512-ACC
897,706 UART: [kat] ECC-384
903,535 UART: [kat] HMAC-384Kdf
908,375 UART: [kat] LMS
1,476,571 UART: [kat] --
1,477,574 UART: [cold-reset] ++
1,478,054 UART: [fht] Storing FHT @ 0x50003400
1,480,761 UART: [idev] ++
1,480,929 UART: [idev] CDI.KEYID = 6
1,481,289 UART: [idev] SUBJECT.KEYID = 7
1,481,713 UART: [idev] UDS.KEYID = 0
1,482,058 ready_for_fw is high
1,482,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,767 UART: [idev] Erasing UDS.KEYID = 0
1,506,871 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,501 UART: [idev] --
1,516,460 UART: [ldev] ++
1,516,628 UART: [ldev] CDI.KEYID = 6
1,516,991 UART: [ldev] SUBJECT.KEYID = 5
1,517,417 UART: [ldev] AUTHORITY.KEYID = 7
1,517,880 UART: [ldev] FE.KEYID = 1
1,523,024 UART: [ldev] Erasing FE.KEYID = 1
1,548,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,949 UART: [ldev] --
1,588,256 UART: [fwproc] Waiting for Commands...
1,588,965 UART: [fwproc] Received command 0x46574c44
1,589,756 UART: [fwproc] Received Image of size 118548 bytes
2,935,206 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,880 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,098 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,541 >>> mbox cmd response: success
3,134,633 UART: [afmc] ++
3,134,801 UART: [afmc] CDI.KEYID = 6
3,135,163 UART: [afmc] SUBJECT.KEYID = 7
3,135,588 UART: [afmc] AUTHORITY.KEYID = 5
3,171,465 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,455 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,188,235 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,944 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,827 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,510 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,482 UART: [afmc] --
3,214,556 UART: [cold-reset] --
3,215,550 UART: [state] Locking Datavault
3,216,793 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,397 UART: [state] Locking ICCM
3,217,977 UART: [exit] Launching FMC @ 0x40000130
3,223,307 UART:
3,223,323 UART: Running Caliptra FMC ...
3,223,731 UART:
3,223,874 UART: [state] CFI Enabled
3,234,610 UART: [fht] FMC Alias Private Key: 7
3,353,606 UART: [art] Extend RT PCRs Done
3,354,034 UART: [art] Lock RT PCRs Done
3,355,868 UART: [art] Populate DV Done
3,364,375 UART: [fht] FMC Alias Private Key: 7
3,365,393 UART: [art] Derive CDI
3,365,673 UART: [art] Store in slot 0x4
3,451,057 UART: [art] Derive Key Pair
3,451,417 UART: [art] Store priv key in slot 0x5
3,464,536 UART: [art] Derive Key Pair - Done
3,479,373 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,490 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,255 UART: [art] PUB.X = 5AA42BB6E9F5BD714A39265963AECFA12D34A240F3B2D23E88C52C5E668355C16479B9B894481C738FACDDF4D9601D27
3,502,033 UART: [art] PUB.Y = FF8AA7D69A9235A7BEA0FD13CC2A16AEFC89D62CE26AF7A915C7DDE690AF85909B2C90B3BA51405E1F7369BE81A9FF64
3,509,007 UART: [art] SIG.R = 13A5048146F6A9B1CF6BE6BB9FE099B12B74371A246CE84295F1674A5351ED9812638F1BC26B612941767854C0BEC37E
3,515,772 UART: [art] SIG.S = 827C7BFCC54326A60B9E43F8850C2D780048A35DF453E2EBE23D21BF393B5C256E95C1A91B3634ED696F503A2967F3BB
3,539,292 UART: Caliptra RT
3,539,635 UART: [state] CFI Enabled
3,660,162 UART: [rt] RT listening for mailbox commands...
3,660,832 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,724 UART: [rt]cmd =0x44504543, len=24
3,718,460 >>> mbox cmd response data (40 bytes)
3,718,461 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,747,846 UART: [rt]cmd =0x44504543, len=24
3,775,663 >>> mbox cmd response data (40 bytes)
3,775,664 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,804,963 UART: [rt]cmd =0x44504543, len=24
3,832,909 >>> mbox cmd response data (40 bytes)
3,832,910 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,862,497 UART: [rt]cmd =0x44504543, len=24
3,889,908 >>> mbox cmd response data (40 bytes)
3,889,909 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,919,306 UART: [rt]cmd =0x44504543, len=24
3,946,690 >>> mbox cmd response data (40 bytes)
3,946,691 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,976,378 UART: [rt]cmd =0x44504543, len=24
4,003,973 >>> mbox cmd response data (40 bytes)
4,003,974 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,033,447 UART: [rt]cmd =0x44504543, len=24
4,061,197 >>> mbox cmd response data (40 bytes)
4,061,198 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,090,765 UART: [rt]cmd =0x44504543, len=24
4,118,628 >>> mbox cmd response data (40 bytes)
4,118,629 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,147,942 UART: [rt]cmd =0x44504543, len=24
4,175,574 >>> mbox cmd response data (40 bytes)
4,175,575 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,205,226 UART: [rt]cmd =0x44504543, len=24
4,233,123 >>> mbox cmd response data (40 bytes)
4,233,124 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,262,669 UART: [rt]cmd =0x44504543, len=24
4,290,227 >>> mbox cmd response data (40 bytes)
4,290,228 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,319,621 UART: [rt]cmd =0x44504543, len=24
4,347,020 >>> mbox cmd response data (40 bytes)
4,347,021 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,376,802 UART: [rt]cmd =0x44504543, len=24
4,404,660 >>> mbox cmd response data (40 bytes)
4,404,661 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,434,230 UART: [rt]cmd =0x44504543, len=24
4,461,459 >>> mbox cmd response data (40 bytes)
4,461,460 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,491,265 UART: [rt]cmd =0x44504543, len=24
4,518,927 >>> mbox cmd response data (40 bytes)
4,518,928 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,548,329 UART: [rt]cmd =0x44504543, len=24
4,576,210 >>> mbox cmd response data (40 bytes)
4,576,211 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,605,850 UART: [rt]cmd =0x44504543, len=24
4,613,431 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,936 ready_for_fw is high
1,362,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,863 >>> mbox cmd response: success
3,044,018 UART:
3,044,034 UART: Running Caliptra FMC ...
3,044,442 UART:
3,044,585 UART: [state] CFI Enabled
3,055,797 UART: [fht] FMC Alias Private Key: 7
3,175,265 UART: [art] Extend RT PCRs Done
3,175,693 UART: [art] Lock RT PCRs Done
3,177,209 UART: [art] Populate DV Done
3,185,476 UART: [fht] FMC Alias Private Key: 7
3,186,496 UART: [art] Derive CDI
3,186,776 UART: [art] Store in slot 0x4
3,272,256 UART: [art] Derive Key Pair
3,272,616 UART: [art] Store priv key in slot 0x5
3,285,291 UART: [art] Derive Key Pair - Done
3,299,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,184 UART: [art] PUB.X = 3A2B648F108965AC2DF1FFA4AE6F975E739CA851309F96FDC8A7DB4A865033AC914B5CAB1EBD50B389C535907DE7B4F3
3,322,970 UART: [art] PUB.Y = 397D161EBE9A720B8C7BEF00FD45BAEB5C16E6370AF723F21F437CDDB78992685E28E7F87CB62FB8916AF907CFB9C3C7
3,329,907 UART: [art] SIG.R = 5BA9703BC1302B58A7A01E410AA95758894721492AC7E0945EB42ECBCADBC549466355883309636A09FCE1DB39819F24
3,336,666 UART: [art] SIG.S = 1FB2070ADECFC74FBD2EEC57CCC14F6167B9F9EC06CE59545A7CC17CDFF95DFBB083599900D6D8251319696CF60EC793
3,360,694 UART: Caliptra RT
3,361,037 UART: [state] CFI Enabled
3,481,461 UART: [rt] RT listening for mailbox commands...
3,482,131 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,149 UART: [rt]cmd =0x44504543, len=24
3,539,223 >>> mbox cmd response data (40 bytes)
3,539,224 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,568,805 UART: [rt]cmd =0x44504543, len=24
3,596,240 >>> mbox cmd response data (40 bytes)
3,596,241 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,625,672 UART: [rt]cmd =0x44504543, len=24
3,653,658 >>> mbox cmd response data (40 bytes)
3,653,659 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,683,000 UART: [rt]cmd =0x44504543, len=24
3,710,433 >>> mbox cmd response data (40 bytes)
3,710,434 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,740,151 UART: [rt]cmd =0x44504543, len=24
3,767,695 >>> mbox cmd response data (40 bytes)
3,767,696 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,797,293 UART: [rt]cmd =0x44504543, len=24
3,824,606 >>> mbox cmd response data (40 bytes)
3,824,607 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,854,136 UART: [rt]cmd =0x44504543, len=24
3,881,726 >>> mbox cmd response data (40 bytes)
3,881,727 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,911,206 UART: [rt]cmd =0x44504543, len=24
3,938,493 >>> mbox cmd response data (40 bytes)
3,938,494 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,968,109 UART: [rt]cmd =0x44504543, len=24
3,995,913 >>> mbox cmd response data (40 bytes)
3,995,914 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,459 UART: [rt]cmd =0x44504543, len=24
4,053,252 >>> mbox cmd response data (40 bytes)
4,053,253 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,082,858 UART: [rt]cmd =0x44504543, len=24
4,110,112 >>> mbox cmd response data (40 bytes)
4,110,113 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,139,630 UART: [rt]cmd =0x44504543, len=24
4,167,433 >>> mbox cmd response data (40 bytes)
4,167,434 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,196,843 UART: [rt]cmd =0x44504543, len=24
4,224,571 >>> mbox cmd response data (40 bytes)
4,224,572 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,254,115 UART: [rt]cmd =0x44504543, len=24
4,281,644 >>> mbox cmd response data (40 bytes)
4,281,645 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,311,130 UART: [rt]cmd =0x44504543, len=24
4,338,612 >>> mbox cmd response data (40 bytes)
4,338,613 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,368,018 UART: [rt]cmd =0x44504543, len=24
4,395,705 >>> mbox cmd response data (40 bytes)
4,395,706 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,425,205 UART: [rt]cmd =0x44504543, len=24
4,432,576 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,054 UART: [kat] ++
895,206 UART: [kat] sha1
899,534 UART: [kat] SHA2-256
901,474 UART: [kat] SHA2-384
904,267 UART: [kat] SHA2-512-ACC
906,168 UART: [kat] ECC-384
915,885 UART: [kat] HMAC-384Kdf
920,473 UART: [kat] LMS
1,168,785 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,208 UART: [fht] FHT @ 0x50003400
1,172,626 UART: [idev] ++
1,172,794 UART: [idev] CDI.KEYID = 6
1,173,155 UART: [idev] SUBJECT.KEYID = 7
1,173,580 UART: [idev] UDS.KEYID = 0
1,173,926 ready_for_fw is high
1,173,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,615 UART: [idev] Erasing UDS.KEYID = 0
1,197,951 UART: [idev] Sha1 KeyId Algorithm
1,206,831 UART: [idev] --
1,207,716 UART: [ldev] ++
1,207,884 UART: [ldev] CDI.KEYID = 6
1,208,248 UART: [ldev] SUBJECT.KEYID = 5
1,208,675 UART: [ldev] AUTHORITY.KEYID = 7
1,209,138 UART: [ldev] FE.KEYID = 1
1,214,416 UART: [ldev] Erasing FE.KEYID = 1
1,240,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,738 UART: [ldev] --
1,280,083 UART: [fwproc] Wait for Commands...
1,280,832 UART: [fwproc] Recv command 0x46574c44
1,281,565 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,603 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,778 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,181 >>> mbox cmd response: success
2,825,307 UART: [afmc] ++
2,825,475 UART: [afmc] CDI.KEYID = 6
2,825,838 UART: [afmc] SUBJECT.KEYID = 7
2,826,264 UART: [afmc] AUTHORITY.KEYID = 5
2,862,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,566 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,315 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,025 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,906 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,607 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,484 UART: [afmc] --
2,905,375 UART: [cold-reset] --
2,906,149 UART: [state] Locking Datavault
2,907,310 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,914 UART: [state] Locking ICCM
2,908,492 UART: [exit] Launching FMC @ 0x40000130
2,913,822 UART:
2,913,838 UART: Running Caliptra FMC ...
2,914,246 UART:
2,914,300 UART: [state] CFI Enabled
2,924,996 UART: [fht] FMC Alias Private Key: 7
3,044,494 UART: [art] Extend RT PCRs Done
3,044,922 UART: [art] Lock RT PCRs Done
3,046,300 UART: [art] Populate DV Done
3,054,565 UART: [fht] FMC Alias Private Key: 7
3,055,535 UART: [art] Derive CDI
3,055,815 UART: [art] Store in slot 0x4
3,141,266 UART: [art] Derive Key Pair
3,141,626 UART: [art] Store priv key in slot 0x5
3,155,002 UART: [art] Derive Key Pair - Done
3,169,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,914 UART: [art] PUB.X = EDCE74274C8B024A7D628415FC0CE86DABF0CFA7E31D6F8C343B81D6714A7FE527C2883EEA2E173013CBF2A332B32206
3,192,689 UART: [art] PUB.Y = D56D968F1B234F7B7825D7149C4528FF4B57BCEAB642D84655B04E70AA1C5781F531A3E5CF5D0F8C8EB9929FBE1A0FD4
3,199,647 UART: [art] SIG.R = 0A9D8B83F003ED000BFFAFE9A406D04FE07CAFE1703BFEBE7C56C3D5D1FBE6673010F7B97EDB20E6FC28F951CCD548D1
3,206,411 UART: [art] SIG.S = 589E4BCCD531C062BDDDFCED7DDCBDD870D213E01B829B1B1575310EFD0608E18EE2F1550EB847A848846840EC06B177
3,230,664 UART: Caliptra RT
3,230,915 UART: [state] CFI Enabled
3,350,918 UART: [rt] RT listening for mailbox commands...
3,351,588 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,362 UART: [rt]cmd =0x44504543, len=24
3,409,126 >>> mbox cmd response data (40 bytes)
3,409,127 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,664 UART: [rt]cmd =0x44504543, len=24
3,465,893 >>> mbox cmd response data (40 bytes)
3,465,894 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,495,349 UART: [rt]cmd =0x44504543, len=24
3,523,101 >>> mbox cmd response data (40 bytes)
3,523,102 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,749 UART: [rt]cmd =0x44504543, len=24
3,580,692 >>> mbox cmd response data (40 bytes)
3,580,693 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,336 UART: [rt]cmd =0x44504543, len=24
3,638,244 >>> mbox cmd response data (40 bytes)
3,638,245 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,862 UART: [rt]cmd =0x44504543, len=24
3,695,369 >>> mbox cmd response data (40 bytes)
3,695,370 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,724,957 UART: [rt]cmd =0x44504543, len=24
3,752,355 >>> mbox cmd response data (40 bytes)
3,752,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,963 UART: [rt]cmd =0x44504543, len=24
3,809,252 >>> mbox cmd response data (40 bytes)
3,809,253 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,606 UART: [rt]cmd =0x44504543, len=24
3,865,998 >>> mbox cmd response data (40 bytes)
3,865,999 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,895,468 UART: [rt]cmd =0x44504543, len=24
3,922,603 >>> mbox cmd response data (40 bytes)
3,922,604 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,029 UART: [rt]cmd =0x44504543, len=24
3,979,695 >>> mbox cmd response data (40 bytes)
3,979,696 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,201 UART: [rt]cmd =0x44504543, len=24
4,036,920 >>> mbox cmd response data (40 bytes)
4,036,921 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,066,404 UART: [rt]cmd =0x44504543, len=24
4,093,824 >>> mbox cmd response data (40 bytes)
4,093,825 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,246 UART: [rt]cmd =0x44504543, len=24
4,150,763 >>> mbox cmd response data (40 bytes)
4,150,764 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,180,577 UART: [rt]cmd =0x44504543, len=24
4,207,993 >>> mbox cmd response data (40 bytes)
4,207,994 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,237,545 UART: [rt]cmd =0x44504543, len=24
4,265,766 >>> mbox cmd response data (40 bytes)
4,265,767 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,295,312 UART: [rt]cmd =0x44504543, len=24
4,302,513 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,470 ready_for_fw is high
1,059,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,450 >>> mbox cmd response: success
2,740,475 UART:
2,740,491 UART: Running Caliptra FMC ...
2,740,899 UART:
2,740,953 UART: [state] CFI Enabled
2,751,551 UART: [fht] FMC Alias Private Key: 7
2,871,003 UART: [art] Extend RT PCRs Done
2,871,431 UART: [art] Lock RT PCRs Done
2,873,251 UART: [art] Populate DV Done
2,881,594 UART: [fht] FMC Alias Private Key: 7
2,882,622 UART: [art] Derive CDI
2,882,902 UART: [art] Store in slot 0x4
2,968,591 UART: [art] Derive Key Pair
2,968,951 UART: [art] Store priv key in slot 0x5
2,982,247 UART: [art] Derive Key Pair - Done
2,996,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,938 UART: [art] PUB.X = C284B3F63A4214552AD6BDCCA526246B18849030F33FDB46599521DF22B43AEEFD03C0FA5FDE9F42746755455D3E707B
3,020,711 UART: [art] PUB.Y = FD06C502DD05225BC339F442E78916ED235CC918C110884062C7A9CB8456B9D5B4340F962DD16948B60B10C5F4C0DF9A
3,027,648 UART: [art] SIG.R = 5C8A0761B1B17E98EFA0D570B64B671E784449C042AC6C123B85181A3CD93FD2BED9B452ADD46C669E70669B536A3844
3,034,419 UART: [art] SIG.S = DC2E20772DCCE6C4BB98A90689AAA8B630F1B8DDEB0E4D9C91A8BA5B77FFE978BC0AC3C40CAF97871028785A05083138
3,058,283 UART: Caliptra RT
3,058,534 UART: [state] CFI Enabled
3,178,572 UART: [rt] RT listening for mailbox commands...
3,179,242 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,432 UART: [rt]cmd =0x44504543, len=24
3,236,964 >>> mbox cmd response data (40 bytes)
3,236,965 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,648 UART: [rt]cmd =0x44504543, len=24
3,293,929 >>> mbox cmd response data (40 bytes)
3,293,930 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,323,135 UART: [rt]cmd =0x44504543, len=24
3,350,905 >>> mbox cmd response data (40 bytes)
3,350,906 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,335 UART: [rt]cmd =0x44504543, len=24
3,407,700 >>> mbox cmd response data (40 bytes)
3,407,701 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,156 UART: [rt]cmd =0x44504543, len=24
3,464,980 >>> mbox cmd response data (40 bytes)
3,464,981 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,494,568 UART: [rt]cmd =0x44504543, len=24
3,521,751 >>> mbox cmd response data (40 bytes)
3,521,752 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,551,027 UART: [rt]cmd =0x44504543, len=24
3,578,275 >>> mbox cmd response data (40 bytes)
3,578,276 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,745 UART: [rt]cmd =0x44504543, len=24
3,635,614 >>> mbox cmd response data (40 bytes)
3,635,615 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,665,014 UART: [rt]cmd =0x44504543, len=24
3,692,666 >>> mbox cmd response data (40 bytes)
3,692,667 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,054 UART: [rt]cmd =0x44504543, len=24
3,749,181 >>> mbox cmd response data (40 bytes)
3,749,182 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,659 UART: [rt]cmd =0x44504543, len=24
3,806,205 >>> mbox cmd response data (40 bytes)
3,806,206 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,835,659 UART: [rt]cmd =0x44504543, len=24
3,863,036 >>> mbox cmd response data (40 bytes)
3,863,037 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,286 UART: [rt]cmd =0x44504543, len=24
3,920,110 >>> mbox cmd response data (40 bytes)
3,920,111 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,782 UART: [rt]cmd =0x44504543, len=24
3,976,915 >>> mbox cmd response data (40 bytes)
3,976,916 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,381 UART: [rt]cmd =0x44504543, len=24
4,034,033 >>> mbox cmd response data (40 bytes)
4,034,034 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,063,523 UART: [rt]cmd =0x44504543, len=24
4,091,420 >>> mbox cmd response data (40 bytes)
4,091,421 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,734 UART: [rt]cmd =0x44504543, len=24
4,127,901 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [kat] SHA2-256
891,321 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,425 UART: [kat] ++
895,577 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
916,426 UART: [kat] HMAC-384Kdf
921,090 UART: [kat] LMS
1,169,402 UART: [kat] --
1,170,343 UART: [cold-reset] ++
1,170,831 UART: [fht] FHT @ 0x50003400
1,173,395 UART: [idev] ++
1,173,563 UART: [idev] CDI.KEYID = 6
1,173,924 UART: [idev] SUBJECT.KEYID = 7
1,174,349 UART: [idev] UDS.KEYID = 0
1,174,695 ready_for_fw is high
1,174,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,730 UART: [idev] Erasing UDS.KEYID = 0
1,199,856 UART: [idev] Sha1 KeyId Algorithm
1,208,742 UART: [idev] --
1,209,745 UART: [ldev] ++
1,209,913 UART: [ldev] CDI.KEYID = 6
1,210,277 UART: [ldev] SUBJECT.KEYID = 5
1,210,704 UART: [ldev] AUTHORITY.KEYID = 7
1,211,167 UART: [ldev] FE.KEYID = 1
1,216,549 UART: [ldev] Erasing FE.KEYID = 1
1,243,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,459 UART: [ldev] --
1,282,692 UART: [fwproc] Wait for Commands...
1,283,413 UART: [fwproc] Recv command 0x46574c44
1,284,146 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,848 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,023 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,354 >>> mbox cmd response: success
2,828,532 UART: [afmc] ++
2,828,700 UART: [afmc] CDI.KEYID = 6
2,829,063 UART: [afmc] SUBJECT.KEYID = 7
2,829,489 UART: [afmc] AUTHORITY.KEYID = 5
2,865,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,795 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,544 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,254 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,135 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,836 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,513 UART: [afmc] --
2,908,330 UART: [cold-reset] --
2,909,180 UART: [state] Locking Datavault
2,910,269 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,873 UART: [state] Locking ICCM
2,911,397 UART: [exit] Launching FMC @ 0x40000130
2,916,727 UART:
2,916,743 UART: Running Caliptra FMC ...
2,917,151 UART:
2,917,294 UART: [state] CFI Enabled
2,928,238 UART: [fht] FMC Alias Private Key: 7
3,047,352 UART: [art] Extend RT PCRs Done
3,047,780 UART: [art] Lock RT PCRs Done
3,049,296 UART: [art] Populate DV Done
3,057,713 UART: [fht] FMC Alias Private Key: 7
3,058,757 UART: [art] Derive CDI
3,059,037 UART: [art] Store in slot 0x4
3,145,188 UART: [art] Derive Key Pair
3,145,548 UART: [art] Store priv key in slot 0x5
3,158,708 UART: [art] Derive Key Pair - Done
3,173,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,996 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,761 UART: [art] PUB.X = 47AF87015D4BC72584CEAD88ABC2BFAB42A04EC64A5E75943E07DD93938445CBCED20F54D26189A9A501A5087A480F2A
3,196,525 UART: [art] PUB.Y = C9FCE0DE934CB63C6A084DB0C1C1956DC767525D8A21FA3939FE1B0316B93B184C7257CF0811F557AE0DB9116B8AD16F
3,203,475 UART: [art] SIG.R = A0295097171B6D472F59395B0290E26C93ED66F63E8D8059222F2C7EA94E8A2A08CEDA9E925EED57552B80E722DDCB4F
3,210,245 UART: [art] SIG.S = B6E37D2D1564FC849E79F57AAC30F9EE117098261CF554BC94B2849EBCEC2C5DBCA59CAD8EE62DF25CCF9F66E06F170A
3,233,962 UART: Caliptra RT
3,234,305 UART: [state] CFI Enabled
3,353,270 UART: [rt] RT listening for mailbox commands...
3,353,940 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,762 UART: [rt]cmd =0x44504543, len=24
3,411,276 >>> mbox cmd response data (40 bytes)
3,411,277 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,778 UART: [rt]cmd =0x44504543, len=24
3,468,535 >>> mbox cmd response data (40 bytes)
3,468,536 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,497,851 UART: [rt]cmd =0x44504543, len=24
3,525,517 >>> mbox cmd response data (40 bytes)
3,525,518 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,555,085 UART: [rt]cmd =0x44504543, len=24
3,582,628 >>> mbox cmd response data (40 bytes)
3,582,629 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,286 UART: [rt]cmd =0x44504543, len=24
3,639,944 >>> mbox cmd response data (40 bytes)
3,639,945 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,669,352 UART: [rt]cmd =0x44504543, len=24
3,696,691 >>> mbox cmd response data (40 bytes)
3,696,692 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,111 UART: [rt]cmd =0x44504543, len=24
3,753,553 >>> mbox cmd response data (40 bytes)
3,753,554 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,021 UART: [rt]cmd =0x44504543, len=24
3,810,856 >>> mbox cmd response data (40 bytes)
3,810,857 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,480 UART: [rt]cmd =0x44504543, len=24
3,868,294 >>> mbox cmd response data (40 bytes)
3,868,295 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,736 UART: [rt]cmd =0x44504543, len=24
3,925,331 >>> mbox cmd response data (40 bytes)
3,925,332 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,635 UART: [rt]cmd =0x44504543, len=24
3,982,623 >>> mbox cmd response data (40 bytes)
3,982,624 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,175 UART: [rt]cmd =0x44504543, len=24
4,039,770 >>> mbox cmd response data (40 bytes)
4,039,771 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,069,468 UART: [rt]cmd =0x44504543, len=24
4,097,222 >>> mbox cmd response data (40 bytes)
4,097,223 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,126,928 UART: [rt]cmd =0x44504543, len=24
4,154,451 >>> mbox cmd response data (40 bytes)
4,154,452 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,184,079 UART: [rt]cmd =0x44504543, len=24
4,211,945 >>> mbox cmd response data (40 bytes)
4,211,946 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,241,319 UART: [rt]cmd =0x44504543, len=24
4,269,230 >>> mbox cmd response data (40 bytes)
4,269,231 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,298,742 UART: [rt]cmd =0x44504543, len=24
4,306,423 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,719 ready_for_fw is high
1,059,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,165 >>> mbox cmd response: success
2,741,254 UART:
2,741,270 UART: Running Caliptra FMC ...
2,741,678 UART:
2,741,821 UART: [state] CFI Enabled
2,752,073 UART: [fht] FMC Alias Private Key: 7
2,870,813 UART: [art] Extend RT PCRs Done
2,871,241 UART: [art] Lock RT PCRs Done
2,872,739 UART: [art] Populate DV Done
2,881,062 UART: [fht] FMC Alias Private Key: 7
2,882,226 UART: [art] Derive CDI
2,882,506 UART: [art] Store in slot 0x4
2,968,031 UART: [art] Derive Key Pair
2,968,391 UART: [art] Store priv key in slot 0x5
2,981,827 UART: [art] Derive Key Pair - Done
2,996,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,780 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,545 UART: [art] PUB.X = AF7BD89CA6D32A376863BA1BDB1446F28F7A4A937646A4169A05910F083F95FFF043F51CF1EA649E9538EBF13C00E502
3,019,289 UART: [art] PUB.Y = 9F01B88724B3CE5D64ECCAAA48C1D1CD74AB4090F0A40FABF0F74AFCF93C9BFB77B6CC0314D874C0F9BF56EB8062FBF4
3,026,260 UART: [art] SIG.R = D47E279E51EF1ECA13C8DDFAFD41DF3DEADBE8FDE1EC45D8B26C59A53C0E4292538DEC35D0C5AD24808940321B60C669
3,033,051 UART: [art] SIG.S = A06DCC23CCD0D43A4BED3A87384537EA81C1856A724718311AA56D990C79614F9821CA0F27972A6425100D80FA31CD16
3,056,454 UART: Caliptra RT
3,056,797 UART: [state] CFI Enabled
3,175,738 UART: [rt] RT listening for mailbox commands...
3,176,408 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,082 UART: [rt]cmd =0x44504543, len=24
3,233,830 >>> mbox cmd response data (40 bytes)
3,233,831 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,198 UART: [rt]cmd =0x44504543, len=24
3,290,699 >>> mbox cmd response data (40 bytes)
3,290,700 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,320,359 UART: [rt]cmd =0x44504543, len=24
3,348,175 >>> mbox cmd response data (40 bytes)
3,348,176 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,377,763 UART: [rt]cmd =0x44504543, len=24
3,404,808 >>> mbox cmd response data (40 bytes)
3,404,809 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,374 UART: [rt]cmd =0x44504543, len=24
3,461,622 >>> mbox cmd response data (40 bytes)
3,461,623 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,491,022 UART: [rt]cmd =0x44504543, len=24
3,518,487 >>> mbox cmd response data (40 bytes)
3,518,488 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,065 UART: [rt]cmd =0x44504543, len=24
3,575,739 >>> mbox cmd response data (40 bytes)
3,575,740 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,193 UART: [rt]cmd =0x44504543, len=24
3,633,008 >>> mbox cmd response data (40 bytes)
3,633,009 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,360 UART: [rt]cmd =0x44504543, len=24
3,690,452 >>> mbox cmd response data (40 bytes)
3,690,453 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,952 UART: [rt]cmd =0x44504543, len=24
3,747,525 >>> mbox cmd response data (40 bytes)
3,747,526 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,201 UART: [rt]cmd =0x44504543, len=24
3,804,583 >>> mbox cmd response data (40 bytes)
3,804,584 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,833,969 UART: [rt]cmd =0x44504543, len=24
3,861,338 >>> mbox cmd response data (40 bytes)
3,861,339 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,890,812 UART: [rt]cmd =0x44504543, len=24
3,918,886 >>> mbox cmd response data (40 bytes)
3,918,887 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,452 UART: [rt]cmd =0x44504543, len=24
3,976,223 >>> mbox cmd response data (40 bytes)
3,976,224 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,005,769 UART: [rt]cmd =0x44504543, len=24
4,033,861 >>> mbox cmd response data (40 bytes)
4,033,862 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,063,235 UART: [rt]cmd =0x44504543, len=24
4,090,926 >>> mbox cmd response data (40 bytes)
4,090,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,458 UART: [rt]cmd =0x44504543, len=24
4,127,843 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
893,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,481 UART: [kat] ++
897,633 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,698 UART: [kat] SHA2-512-ACC
908,599 UART: [kat] ECC-384
918,394 UART: [kat] HMAC-384Kdf
923,058 UART: [kat] LMS
1,171,386 UART: [kat] --
1,172,315 UART: [cold-reset] ++
1,172,731 UART: [fht] FHT @ 0x50003400
1,175,420 UART: [idev] ++
1,175,588 UART: [idev] CDI.KEYID = 6
1,175,948 UART: [idev] SUBJECT.KEYID = 7
1,176,372 UART: [idev] UDS.KEYID = 0
1,176,717 ready_for_fw is high
1,176,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,016 UART: [idev] Erasing UDS.KEYID = 0
1,200,705 UART: [idev] Sha1 KeyId Algorithm
1,209,115 UART: [idev] --
1,210,395 UART: [ldev] ++
1,210,563 UART: [ldev] CDI.KEYID = 6
1,210,926 UART: [ldev] SUBJECT.KEYID = 5
1,211,352 UART: [ldev] AUTHORITY.KEYID = 7
1,211,815 UART: [ldev] FE.KEYID = 1
1,217,213 UART: [ldev] Erasing FE.KEYID = 1
1,242,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,701 UART: [ldev] --
1,282,132 UART: [fwproc] Wait for Commands...
1,282,912 UART: [fwproc] Recv command 0x46574c44
1,283,640 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,742 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,912 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,153 >>> mbox cmd response: success
2,828,409 UART: [afmc] ++
2,828,577 UART: [afmc] CDI.KEYID = 6
2,828,939 UART: [afmc] SUBJECT.KEYID = 7
2,829,364 UART: [afmc] AUTHORITY.KEYID = 5
2,864,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,650 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,359 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,242 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,943 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,721 UART: [afmc] --
2,907,841 UART: [cold-reset] --
2,908,673 UART: [state] Locking Datavault
2,909,778 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,382 UART: [state] Locking ICCM
2,910,872 UART: [exit] Launching FMC @ 0x40000130
2,916,202 UART:
2,916,218 UART: Running Caliptra FMC ...
2,916,626 UART:
2,916,680 UART: [state] CFI Enabled
2,926,836 UART: [fht] FMC Alias Private Key: 7
3,045,500 UART: [art] Extend RT PCRs Done
3,045,928 UART: [art] Lock RT PCRs Done
3,047,848 UART: [art] Populate DV Done
3,056,233 UART: [fht] FMC Alias Private Key: 7
3,057,317 UART: [art] Derive CDI
3,057,597 UART: [art] Store in slot 0x4
3,143,656 UART: [art] Derive Key Pair
3,144,016 UART: [art] Store priv key in slot 0x5
3,157,100 UART: [art] Derive Key Pair - Done
3,171,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,050 UART: [art] PUB.X = 2FA92DD03966A851FE601C59569749ABDB812EF7A7758DBEFF8D8EC25B026050639C4CB4554AA7C2065ADB5C4E5B35AD
3,194,828 UART: [art] PUB.Y = 1E8E782E849F8D349F1B53087FA4403268AA783379BAC5FBAB6A564C35A4A8B9305DA751B97089A3E109551282F9AD39
3,201,772 UART: [art] SIG.R = 4BCBE49609B56402CFE060C638764F793D07F3C8B5F2A7E537A5A562144BDA81CD70831E1C59BC485E5991B4A0E6233E
3,208,537 UART: [art] SIG.S = E3ACD50FC4B33E39293471695E8CFAC52359DCC617F38FDED2DFF1379A6B8C7027AE654AEEC41EAEE7C07A22D94574A1
3,232,336 UART: Caliptra RT
3,232,587 UART: [state] CFI Enabled
3,352,737 UART: [rt] RT listening for mailbox commands...
3,353,407 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,373 UART: [rt]cmd =0x44504543, len=24
3,410,697 >>> mbox cmd response data (40 bytes)
3,410,698 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,065 UART: [rt]cmd =0x44504543, len=24
3,467,368 >>> mbox cmd response data (40 bytes)
3,467,369 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,496,704 UART: [rt]cmd =0x44504543, len=24
3,524,156 >>> mbox cmd response data (40 bytes)
3,524,157 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,670 UART: [rt]cmd =0x44504543, len=24
3,581,121 >>> mbox cmd response data (40 bytes)
3,581,122 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,667 UART: [rt]cmd =0x44504543, len=24
3,637,833 >>> mbox cmd response data (40 bytes)
3,637,834 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,289 UART: [rt]cmd =0x44504543, len=24
3,694,952 >>> mbox cmd response data (40 bytes)
3,694,953 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,724,234 UART: [rt]cmd =0x44504543, len=24
3,751,694 >>> mbox cmd response data (40 bytes)
3,751,695 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,116 UART: [rt]cmd =0x44504543, len=24
3,808,751 >>> mbox cmd response data (40 bytes)
3,808,752 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,403 UART: [rt]cmd =0x44504543, len=24
3,866,217 >>> mbox cmd response data (40 bytes)
3,866,218 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,895,661 UART: [rt]cmd =0x44504543, len=24
3,923,216 >>> mbox cmd response data (40 bytes)
3,923,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,658 UART: [rt]cmd =0x44504543, len=24
3,979,968 >>> mbox cmd response data (40 bytes)
3,979,969 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,564 UART: [rt]cmd =0x44504543, len=24
4,037,573 >>> mbox cmd response data (40 bytes)
4,037,574 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,067,167 UART: [rt]cmd =0x44504543, len=24
4,094,919 >>> mbox cmd response data (40 bytes)
4,094,920 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,521 UART: [rt]cmd =0x44504543, len=24
4,151,884 >>> mbox cmd response data (40 bytes)
4,151,885 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,181,386 UART: [rt]cmd =0x44504543, len=24
4,209,382 >>> mbox cmd response data (40 bytes)
4,209,383 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,238,836 UART: [rt]cmd =0x44504543, len=24
4,266,997 >>> mbox cmd response data (40 bytes)
4,266,998 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,296,681 UART: [rt]cmd =0x44504543, len=24
4,304,290 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,851 ready_for_fw is high
1,059,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,632 >>> mbox cmd response: success
2,743,289 UART:
2,743,305 UART: Running Caliptra FMC ...
2,743,713 UART:
2,743,767 UART: [state] CFI Enabled
2,754,301 UART: [fht] FMC Alias Private Key: 7
2,874,289 UART: [art] Extend RT PCRs Done
2,874,717 UART: [art] Lock RT PCRs Done
2,876,365 UART: [art] Populate DV Done
2,884,642 UART: [fht] FMC Alias Private Key: 7
2,885,694 UART: [art] Derive CDI
2,885,974 UART: [art] Store in slot 0x4
2,971,731 UART: [art] Derive Key Pair
2,972,091 UART: [art] Store priv key in slot 0x5
2,985,217 UART: [art] Derive Key Pair - Done
2,999,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,832 UART: [art] PUB.X = 887C25EB5131B7AF683F37FCB78896B54644A446DD29690E59150394EEBAA1BE7592D9E4841D6DA138D32931CAB60BF6
3,023,597 UART: [art] PUB.Y = D1DEE3DD78BDA9F2ADF372FCAE3A91B9019796F4774AC7061456223D0D966EA4DAA5D640F10A4CC7C09019674D753112
3,030,545 UART: [art] SIG.R = 7F175D2584351D16CAC11B2B3B8A0BA5E75DDBC188F6C4CC5B4355DDBB1797FACB767420BB81B7CE5B91B996C6909C1B
3,037,330 UART: [art] SIG.S = 29A158B93452F79E913E187FC335DAE929774CEB1881CD5B514732A0607EAF166B879A16F237908A599E2F55ABE76C9B
3,061,138 UART: Caliptra RT
3,061,389 UART: [state] CFI Enabled
3,181,586 UART: [rt] RT listening for mailbox commands...
3,182,256 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,154 UART: [rt]cmd =0x44504543, len=24
3,239,768 >>> mbox cmd response data (40 bytes)
3,239,769 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,070 UART: [rt]cmd =0x44504543, len=24
3,296,869 >>> mbox cmd response data (40 bytes)
3,296,870 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,326,481 UART: [rt]cmd =0x44504543, len=24
3,354,039 >>> mbox cmd response data (40 bytes)
3,354,040 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,569 UART: [rt]cmd =0x44504543, len=24
3,410,790 >>> mbox cmd response data (40 bytes)
3,410,791 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,512 UART: [rt]cmd =0x44504543, len=24
3,468,096 >>> mbox cmd response data (40 bytes)
3,468,097 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,497,638 UART: [rt]cmd =0x44504543, len=24
3,524,867 >>> mbox cmd response data (40 bytes)
3,524,868 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,191 UART: [rt]cmd =0x44504543, len=24
3,581,695 >>> mbox cmd response data (40 bytes)
3,581,696 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,073 UART: [rt]cmd =0x44504543, len=24
3,638,592 >>> mbox cmd response data (40 bytes)
3,638,593 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,960 UART: [rt]cmd =0x44504543, len=24
3,695,572 >>> mbox cmd response data (40 bytes)
3,695,573 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,168 UART: [rt]cmd =0x44504543, len=24
3,753,185 >>> mbox cmd response data (40 bytes)
3,753,186 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,771 UART: [rt]cmd =0x44504543, len=24
3,810,827 >>> mbox cmd response data (40 bytes)
3,810,828 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,551 UART: [rt]cmd =0x44504543, len=24
3,868,082 >>> mbox cmd response data (40 bytes)
3,868,083 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,914 UART: [rt]cmd =0x44504543, len=24
3,925,292 >>> mbox cmd response data (40 bytes)
3,925,293 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,714 UART: [rt]cmd =0x44504543, len=24
3,982,611 >>> mbox cmd response data (40 bytes)
3,982,612 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,113 UART: [rt]cmd =0x44504543, len=24
4,039,743 >>> mbox cmd response data (40 bytes)
4,039,744 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,069,343 UART: [rt]cmd =0x44504543, len=24
4,096,956 >>> mbox cmd response data (40 bytes)
4,096,957 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,126,340 UART: [rt]cmd =0x44504543, len=24
4,133,513 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
893,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,608 UART: [kat] ++
897,760 UART: [kat] sha1
902,184 UART: [kat] SHA2-256
904,124 UART: [kat] SHA2-384
906,723 UART: [kat] SHA2-512-ACC
908,624 UART: [kat] ECC-384
918,519 UART: [kat] HMAC-384Kdf
923,329 UART: [kat] LMS
1,171,657 UART: [kat] --
1,172,606 UART: [cold-reset] ++
1,173,002 UART: [fht] FHT @ 0x50003400
1,175,499 UART: [idev] ++
1,175,667 UART: [idev] CDI.KEYID = 6
1,176,027 UART: [idev] SUBJECT.KEYID = 7
1,176,451 UART: [idev] UDS.KEYID = 0
1,176,796 ready_for_fw is high
1,176,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,569 UART: [idev] Erasing UDS.KEYID = 0
1,201,490 UART: [idev] Sha1 KeyId Algorithm
1,209,866 UART: [idev] --
1,211,106 UART: [ldev] ++
1,211,274 UART: [ldev] CDI.KEYID = 6
1,211,637 UART: [ldev] SUBJECT.KEYID = 5
1,212,063 UART: [ldev] AUTHORITY.KEYID = 7
1,212,526 UART: [ldev] FE.KEYID = 1
1,217,976 UART: [ldev] Erasing FE.KEYID = 1
1,244,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,482 UART: [ldev] --
1,283,803 UART: [fwproc] Wait for Commands...
1,284,383 UART: [fwproc] Recv command 0x46574c44
1,285,111 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,267 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,446 >>> mbox cmd response: success
2,828,606 UART: [afmc] ++
2,828,774 UART: [afmc] CDI.KEYID = 6
2,829,136 UART: [afmc] SUBJECT.KEYID = 7
2,829,561 UART: [afmc] AUTHORITY.KEYID = 5
2,865,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,781 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,490 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,373 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,074 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,916 UART: [afmc] --
2,908,850 UART: [cold-reset] --
2,909,622 UART: [state] Locking Datavault
2,910,739 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,343 UART: [state] Locking ICCM
2,911,835 UART: [exit] Launching FMC @ 0x40000130
2,917,165 UART:
2,917,181 UART: Running Caliptra FMC ...
2,917,589 UART:
2,917,732 UART: [state] CFI Enabled
2,928,170 UART: [fht] FMC Alias Private Key: 7
3,047,678 UART: [art] Extend RT PCRs Done
3,048,106 UART: [art] Lock RT PCRs Done
3,049,632 UART: [art] Populate DV Done
3,058,019 UART: [fht] FMC Alias Private Key: 7
3,059,175 UART: [art] Derive CDI
3,059,455 UART: [art] Store in slot 0x4
3,145,516 UART: [art] Derive Key Pair
3,145,876 UART: [art] Store priv key in slot 0x5
3,159,958 UART: [art] Derive Key Pair - Done
3,174,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,127 UART: [art] PUB.X = 59497AE5C04ADC375640B58C8FCCD357C236F6D1B70BF9F196462797A0224F785C5647D932F707F7084ACEC2813D4F82
3,197,888 UART: [art] PUB.Y = D2039B676F61517241826477A7B33454AE3C4DF7DF2845948E877C952C21BD7E2D118C93714DBAB9A8FBCB782E83EBEE
3,204,841 UART: [art] SIG.R = B9707BB9776EB0CE7B1B5F3CAF7935DA624A5D2351CE50E5DF699E6E93B102475C7FD21FD3445EEE1BC13A2D327B56B5
3,211,624 UART: [art] SIG.S = E280D04557E71B2A4B255A23195205C7332F4E4FC3FAB9A229630CB83EC39977F6587D100259C8A9323949376DEFFDDD
3,235,565 UART: Caliptra RT
3,235,908 UART: [state] CFI Enabled
3,355,905 UART: [rt] RT listening for mailbox commands...
3,356,575 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,331 UART: [rt]cmd =0x44504543, len=24
3,414,383 >>> mbox cmd response data (40 bytes)
3,414,384 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,444,049 UART: [rt]cmd =0x44504543, len=24
3,471,312 >>> mbox cmd response data (40 bytes)
3,471,313 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,500,802 UART: [rt]cmd =0x44504543, len=24
3,528,480 >>> mbox cmd response data (40 bytes)
3,528,481 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,884 UART: [rt]cmd =0x44504543, len=24
3,585,513 >>> mbox cmd response data (40 bytes)
3,585,514 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,615,015 UART: [rt]cmd =0x44504543, len=24
3,642,411 >>> mbox cmd response data (40 bytes)
3,642,412 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,671,781 UART: [rt]cmd =0x44504543, len=24
3,699,650 >>> mbox cmd response data (40 bytes)
3,699,651 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,729,094 UART: [rt]cmd =0x44504543, len=24
3,756,870 >>> mbox cmd response data (40 bytes)
3,756,871 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,786,190 UART: [rt]cmd =0x44504543, len=24
3,813,543 >>> mbox cmd response data (40 bytes)
3,813,544 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,009 UART: [rt]cmd =0x44504543, len=24
3,870,769 >>> mbox cmd response data (40 bytes)
3,870,770 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,321 UART: [rt]cmd =0x44504543, len=24
3,928,106 >>> mbox cmd response data (40 bytes)
3,928,107 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,957,660 UART: [rt]cmd =0x44504543, len=24
3,985,006 >>> mbox cmd response data (40 bytes)
3,985,007 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,252 UART: [rt]cmd =0x44504543, len=24
4,042,097 >>> mbox cmd response data (40 bytes)
4,042,098 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,071,881 UART: [rt]cmd =0x44504543, len=24
4,099,473 >>> mbox cmd response data (40 bytes)
4,099,474 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,128,823 UART: [rt]cmd =0x44504543, len=24
4,156,428 >>> mbox cmd response data (40 bytes)
4,156,429 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,185,888 UART: [rt]cmd =0x44504543, len=24
4,213,476 >>> mbox cmd response data (40 bytes)
4,213,477 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,243,050 UART: [rt]cmd =0x44504543, len=24
4,270,281 >>> mbox cmd response data (40 bytes)
4,270,282 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,299,875 UART: [rt]cmd =0x44504543, len=24
4,307,218 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,326 ready_for_fw is high
1,060,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,063 >>> mbox cmd response: success
2,740,884 UART:
2,740,900 UART: Running Caliptra FMC ...
2,741,308 UART:
2,741,451 UART: [state] CFI Enabled
2,752,147 UART: [fht] FMC Alias Private Key: 7
2,871,523 UART: [art] Extend RT PCRs Done
2,871,951 UART: [art] Lock RT PCRs Done
2,873,499 UART: [art] Populate DV Done
2,881,756 UART: [fht] FMC Alias Private Key: 7
2,882,730 UART: [art] Derive CDI
2,883,010 UART: [art] Store in slot 0x4
2,968,751 UART: [art] Derive Key Pair
2,969,111 UART: [art] Store priv key in slot 0x5
2,982,445 UART: [art] Derive Key Pair - Done
2,997,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,410 UART: [art] PUB.X = 5416AE977E02B7222BC11E17CA14657550DC3000C83ED19D5E1AFD1A613BF997E4DFA937FFDD4C7DAF457C7268C4B0D9
3,020,169 UART: [art] PUB.Y = ED7F486AB4C09F68B5E63A14B0A9E242AB412A23379B8565A87CEE2D95EE2487C0429A5425DE3101654A2A988A2100E4
3,027,096 UART: [art] SIG.R = 3C9325E226E2CAFB085AA2E5EF1FBE80576AE9A5E144303591679D1249F1112A86464F82BDD3872569A550BE54B1FE86
3,033,865 UART: [art] SIG.S = 8A43781DF36B0A76D9621F515DBC9AB9BE6826AA0DA09ACF2A29A2D8DD2747BC80DD406AD404503EBF4CCC8CE5825036
3,058,052 UART: Caliptra RT
3,058,395 UART: [state] CFI Enabled
3,178,311 UART: [rt] RT listening for mailbox commands...
3,178,981 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,139 UART: [rt]cmd =0x44504543, len=24
3,236,897 >>> mbox cmd response data (40 bytes)
3,236,898 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,475 UART: [rt]cmd =0x44504543, len=24
3,293,798 >>> mbox cmd response data (40 bytes)
3,293,799 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,323,166 UART: [rt]cmd =0x44504543, len=24
3,350,920 >>> mbox cmd response data (40 bytes)
3,350,921 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,160 UART: [rt]cmd =0x44504543, len=24
3,407,563 >>> mbox cmd response data (40 bytes)
3,407,564 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,739 UART: [rt]cmd =0x44504543, len=24
3,464,157 >>> mbox cmd response data (40 bytes)
3,464,158 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,493,563 UART: [rt]cmd =0x44504543, len=24
3,520,758 >>> mbox cmd response data (40 bytes)
3,520,759 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,300 UART: [rt]cmd =0x44504543, len=24
3,577,920 >>> mbox cmd response data (40 bytes)
3,577,921 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,474 UART: [rt]cmd =0x44504543, len=24
3,634,991 >>> mbox cmd response data (40 bytes)
3,634,992 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,664,451 UART: [rt]cmd =0x44504543, len=24
3,692,213 >>> mbox cmd response data (40 bytes)
3,692,214 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,539 UART: [rt]cmd =0x44504543, len=24
3,749,414 >>> mbox cmd response data (40 bytes)
3,749,415 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,790 UART: [rt]cmd =0x44504543, len=24
3,806,502 >>> mbox cmd response data (40 bytes)
3,806,503 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,835,986 UART: [rt]cmd =0x44504543, len=24
3,863,607 >>> mbox cmd response data (40 bytes)
3,863,608 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,077 UART: [rt]cmd =0x44504543, len=24
3,920,303 >>> mbox cmd response data (40 bytes)
3,920,304 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,837 UART: [rt]cmd =0x44504543, len=24
3,977,620 >>> mbox cmd response data (40 bytes)
3,977,621 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,130 UART: [rt]cmd =0x44504543, len=24
4,034,370 >>> mbox cmd response data (40 bytes)
4,034,371 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,063,838 UART: [rt]cmd =0x44504543, len=24
4,091,317 >>> mbox cmd response data (40 bytes)
4,091,318 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,947 UART: [rt]cmd =0x44504543, len=24
4,128,374 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,192 UART:
192,559 UART: Running Caliptra ROM ...
193,769 UART:
193,924 UART: [state] CFI Enabled
263,624 UART: [state] LifecycleState = Unprovisioned
265,544 UART: [state] DebugLocked = No
267,083 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,248 UART: [kat] SHA2-256
441,949 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,512 UART: [kat] ++
452,962 UART: [kat] sha1
464,120 UART: [kat] SHA2-256
466,775 UART: [kat] SHA2-384
471,769 UART: [kat] SHA2-512-ACC
474,145 UART: [kat] ECC-384
2,769,885 UART: [kat] HMAC-384Kdf
2,800,334 UART: [kat] LMS
3,990,659 UART: [kat] --
3,996,439 UART: [cold-reset] ++
3,997,841 UART: [fht] Storing FHT @ 0x50003400
4,009,614 UART: [idev] ++
4,010,258 UART: [idev] CDI.KEYID = 6
4,011,173 UART: [idev] SUBJECT.KEYID = 7
4,012,420 UART: [idev] UDS.KEYID = 0
4,013,478 ready_for_fw is high
4,013,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,747 UART: [idev] Erasing UDS.KEYID = 0
7,347,126 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,633 UART: [idev] --
7,374,902 UART: [ldev] ++
7,375,480 UART: [ldev] CDI.KEYID = 6
7,376,495 UART: [ldev] SUBJECT.KEYID = 5
7,377,652 UART: [ldev] AUTHORITY.KEYID = 7
7,378,906 UART: [ldev] FE.KEYID = 1
7,424,605 UART: [ldev] Erasing FE.KEYID = 1
10,760,102 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,094 UART: [ldev] --
13,137,777 UART: [fwproc] Waiting for Commands...
13,139,396 UART: [fwproc] Received command 0x46574c44
13,141,580 UART: [fwproc] Received Image of size 118548 bytes
17,252,066 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,325,667 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,398,834 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,727,500 >>> mbox cmd response: success
17,731,311 UART: [afmc] ++
17,731,956 UART: [afmc] CDI.KEYID = 6
17,732,874 UART: [afmc] SUBJECT.KEYID = 7
17,734,090 UART: [afmc] AUTHORITY.KEYID = 5
21,094,673 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,395,187 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,397,450 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,411,897 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,426,595 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,441,062 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,462,297 UART: [afmc] --
23,466,969 UART: [cold-reset] --
23,471,096 UART: [state] Locking Datavault
23,473,483 UART: [state] Locking PCR0, PCR1 and PCR31
23,475,237 UART: [state] Locking ICCM
23,477,382 UART: [exit] Launching FMC @ 0x40000130
23,485,781 UART:
23,486,032 UART: Running Caliptra FMC ...
23,487,139 UART:
23,487,299 UART: [state] CFI Enabled
23,555,541 UART: [fht] FMC Alias Private Key: 7
25,896,149 UART: [art] Extend RT PCRs Done
25,897,405 UART: [art] Lock RT PCRs Done
25,899,412 UART: [art] Populate DV Done
25,905,098 UART: [fht] FMC Alias Private Key: 7
25,906,799 UART: [art] Derive CDI
25,907,616 UART: [art] Store in slot 0x4
25,964,355 UART: [art] Derive Key Pair
25,965,396 UART: [art] Store priv key in slot 0x5
29,258,031 UART: [art] Derive Key Pair - Done
29,270,830 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,378 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,902 UART: [art] PUB.X = BE155A7319F54247DECCFF259E4947BB79F3ACDDE32E92ABCF4D3650D1AFB38774558C31800E909A51EDA35E4EE27D21
31,568,193 UART: [art] PUB.Y = 6834597C01174DB0529917ECBDD8442E760EFC5166811BD744A26D3BDE5E2CA2BCAF1675A7F87816E400DDB367492F7E
31,575,449 UART: [art] SIG.R = 525C6AF2F4EA252A340087346DCFAE1E4A6DD4080F80F2CA60EF78054D87F5D30DE1D577C8450D549A0BCE8744EAE72B
31,582,805 UART: [art] SIG.S = 31A85D0C493541A126C6BC2C46D2D6691A7E50EBA3F6BAEC9CA4043E244F248EE71223030EF428C2782CDBFD54B4E2F5
32,888,200 UART: Caliptra RT
32,888,921 UART: [state] CFI Enabled
33,064,780 UART: [rt] RT listening for mailbox commands...
33,066,978 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,096,936 UART: [rt]cmd =0x49444550, len=8
33,099,263 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,808,672 ready_for_fw is high
3,809,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,984,869 >>> mbox cmd response: success
23,671,470 UART:
23,671,892 UART: Running Caliptra FMC ...
23,673,052 UART:
23,673,220 UART: [state] CFI Enabled
23,741,839 UART: [fht] FMC Alias Private Key: 7
26,082,024 UART: [art] Extend RT PCRs Done
26,083,257 UART: [art] Lock RT PCRs Done
26,085,071 UART: [art] Populate DV Done
26,090,282 UART: [fht] FMC Alias Private Key: 7
26,091,933 UART: [art] Derive CDI
26,092,675 UART: [art] Store in slot 0x4
26,149,771 UART: [art] Derive Key Pair
26,150,811 UART: [art] Store priv key in slot 0x5
29,443,086 UART: [art] Derive Key Pair - Done
29,456,037 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,360 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,876 UART: [art] PUB.X = 453D6A3B1755759D615C60CF1E6DA2A9F3D02D9EC4B76E5622D940A1C5872527146586227540C39219F64F633C90ABF4
31,753,138 UART: [art] PUB.Y = 284A25C4870FA59E8FADD294E105F4572F5F2E6DE0E8E1747AB0283A7618CC6F0E0F8C0E6CC8F324F21D5E97E8E41FB8
31,760,415 UART: [art] SIG.R = E6ECF5058748C44440B71A040D54611DB1DA48513AB02E58645F3D036B6315A7E840EAD369DEB1D076C3078723CC7B1A
31,767,761 UART: [art] SIG.S = C3E96A3D432F011B4315C672E81E018EACDA6674B2CE597DB1896D230200464E054E105DC79211ADB48A4F34090AFA5D
33,073,051 UART: Caliptra RT
33,073,777 UART: [state] CFI Enabled
33,250,827 UART: [rt] RT listening for mailbox commands...
33,253,133 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,282,931 UART: [rt]cmd =0x49444550, len=8
33,285,312 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,410 UART:
192,785 UART: Running Caliptra ROM ...
193,884 UART:
603,634 UART: [state] CFI Enabled
616,245 UART: [state] LifecycleState = Unprovisioned
618,181 UART: [state] DebugLocked = No
620,287 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,067 UART: [kat] SHA2-256
794,866 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,373 UART: [kat] ++
805,848 UART: [kat] sha1
815,881 UART: [kat] SHA2-256
818,573 UART: [kat] SHA2-384
823,430 UART: [kat] SHA2-512-ACC
825,795 UART: [kat] ECC-384
3,111,502 UART: [kat] HMAC-384Kdf
3,123,257 UART: [kat] LMS
4,313,385 UART: [kat] --
4,318,621 UART: [cold-reset] ++
4,319,708 UART: [fht] Storing FHT @ 0x50003400
4,332,196 UART: [idev] ++
4,332,752 UART: [idev] CDI.KEYID = 6
4,333,915 UART: [idev] SUBJECT.KEYID = 7
4,334,978 UART: [idev] UDS.KEYID = 0
4,335,957 ready_for_fw is high
4,336,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,870 UART: [idev] Erasing UDS.KEYID = 0
7,623,399 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,078 UART: [idev] --
7,649,531 UART: [ldev] ++
7,650,097 UART: [ldev] CDI.KEYID = 6
7,651,030 UART: [ldev] SUBJECT.KEYID = 5
7,652,285 UART: [ldev] AUTHORITY.KEYID = 7
7,653,560 UART: [ldev] FE.KEYID = 1
7,664,069 UART: [ldev] Erasing FE.KEYID = 1
10,956,944 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,236 UART: [ldev] --
13,318,503 UART: [fwproc] Waiting for Commands...
13,321,075 UART: [fwproc] Received command 0x46574c44
13,323,305 UART: [fwproc] Received Image of size 118548 bytes
17,428,140 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,423 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,587 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,412 >>> mbox cmd response: success
17,905,431 UART: [afmc] ++
17,906,044 UART: [afmc] CDI.KEYID = 6
17,906,926 UART: [afmc] SUBJECT.KEYID = 7
17,908,193 UART: [afmc] AUTHORITY.KEYID = 5
21,224,212 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,393 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,665 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,137 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,801 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,217 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,119 UART: [afmc] --
23,589,057 UART: [cold-reset] --
23,593,187 UART: [state] Locking Datavault
23,597,832 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,574 UART: [state] Locking ICCM
23,601,663 UART: [exit] Launching FMC @ 0x40000130
23,610,048 UART:
23,610,281 UART: Running Caliptra FMC ...
23,611,372 UART:
23,611,525 UART: [state] CFI Enabled
23,619,463 UART: [fht] FMC Alias Private Key: 7
25,959,856 UART: [art] Extend RT PCRs Done
25,961,100 UART: [art] Lock RT PCRs Done
25,962,568 UART: [art] Populate DV Done
25,967,813 UART: [fht] FMC Alias Private Key: 7
25,969,454 UART: [art] Derive CDI
25,970,261 UART: [art] Store in slot 0x4
26,012,850 UART: [art] Derive Key Pair
26,014,050 UART: [art] Store priv key in slot 0x5
29,255,850 UART: [art] Derive Key Pair - Done
29,268,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,201 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,712 UART: [art] PUB.X = CF99C35285430F0773F148D7512DFF486CF932AB2A84AA05BAF0738FB4212F33A32D83DCBD34BDEB8826460D091D2C06
31,557,965 UART: [art] PUB.Y = E3876E3C80CAE99F9C1E15E1552D97F7B60D4FBD07FE537D65779B54D4E2E00D05D73945DF2C27BB5B7EED79722CAD38
31,565,263 UART: [art] SIG.R = D8E9D66E820685EEB49C8B26244B1DF88D264544CB18E20D62DBC82BF656FCC201DE5CB390C0B0843C94BECB00CC5790
31,572,657 UART: [art] SIG.S = 87859C2CC38082A734E169E0E20DEC3D971F907E9BA2D78950B872A5E2325B14A5088511B488AA849BAF4B55AB8683E0
32,877,319 UART: Caliptra RT
32,878,030 UART: [state] CFI Enabled
33,011,060 UART: [rt] RT listening for mailbox commands...
33,013,327 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,043,281 UART: [rt]cmd =0x49444550, len=8
33,045,503 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
4,125,793 ready_for_fw is high
4,126,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,256 >>> mbox cmd response: success
23,794,249 UART:
23,794,687 UART: Running Caliptra FMC ...
23,795,799 UART:
23,795,962 UART: [state] CFI Enabled
23,803,749 UART: [fht] FMC Alias Private Key: 7
26,143,611 UART: [art] Extend RT PCRs Done
26,144,832 UART: [art] Lock RT PCRs Done
26,146,570 UART: [art] Populate DV Done
26,152,046 UART: [fht] FMC Alias Private Key: 7
26,153,697 UART: [art] Derive CDI
26,154,508 UART: [art] Store in slot 0x4
26,197,268 UART: [art] Derive Key Pair
26,198,303 UART: [art] Store priv key in slot 0x5
29,440,812 UART: [art] Derive Key Pair - Done
29,453,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,916 UART: [art] Erasing AUTHORITY.KEYID = 7
31,735,420 UART: [art] PUB.X = 6FB7067550FBEC2B4527B47B5AF48F05CBFC901F4CECA4831D1AA5F9E067F9199DA848B1AA3D6CFA9ECC924EEB7AA23A
31,742,724 UART: [art] PUB.Y = C5A58BADCF359B6AB9A54CE913E8B72061660A178AD5DAD981ACBE9B8F89CCCB3693AB308CB306B314F4CA5D2E0B470B
31,750,045 UART: [art] SIG.R = DE07FE8166B0E42758D7E06827CF428979789F02C4FA557452BD2C41478F509462D722C434B74374A10C28C841ED3530
31,757,407 UART: [art] SIG.S = 55F76D79BC976BB89286C1843610E9967DC08AA418C47F6934290B5B4A0FD6A0B0EEDE07ADC8A8CE56780EAEB4E991D8
33,062,047 UART: Caliptra RT
33,062,794 UART: [state] CFI Enabled
33,195,363 UART: [rt] RT listening for mailbox commands...
33,197,692 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,227,663 UART: [rt]cmd =0x49444550, len=8
33,229,810 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,176 UART:
192,538 UART: Running Caliptra ROM ...
193,730 UART:
193,909 UART: [state] CFI Enabled
262,847 UART: [state] LifecycleState = Unprovisioned
264,777 UART: [state] DebugLocked = No
266,159 UART: [state] WD Timer not started. Device not locked for debugging
269,472 UART: [kat] SHA2-256
449,169 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,931 UART: [kat] ++
460,406 UART: [kat] sha1
471,635 UART: [kat] SHA2-256
474,364 UART: [kat] SHA2-384
480,350 UART: [kat] SHA2-512-ACC
482,781 UART: [kat] ECC-384
2,946,938 UART: [kat] HMAC-384Kdf
2,971,851 UART: [kat] LMS
3,448,365 UART: [kat] --
3,451,039 UART: [cold-reset] ++
3,452,855 UART: [fht] FHT @ 0x50003400
3,464,899 UART: [idev] ++
3,465,459 UART: [idev] CDI.KEYID = 6
3,466,408 UART: [idev] SUBJECT.KEYID = 7
3,467,723 UART: [idev] UDS.KEYID = 0
3,468,614 ready_for_fw is high
3,468,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,966 UART: [idev] Erasing UDS.KEYID = 0
5,987,932 UART: [idev] Sha1 KeyId Algorithm
6,009,860 UART: [idev] --
6,015,700 UART: [ldev] ++
6,016,325 UART: [ldev] CDI.KEYID = 6
6,017,207 UART: [ldev] SUBJECT.KEYID = 5
6,018,417 UART: [ldev] AUTHORITY.KEYID = 7
6,019,699 UART: [ldev] FE.KEYID = 1
6,057,815 UART: [ldev] Erasing FE.KEYID = 1
8,566,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,461 UART: [ldev] --
10,376,743 UART: [fwproc] Wait for Commands...
10,379,962 UART: [fwproc] Recv command 0x46574c44
10,381,939 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,938 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,018,959 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,484 >>> mbox cmd response: success
14,351,086 UART: [afmc] ++
14,351,884 UART: [afmc] CDI.KEYID = 6
14,352,778 UART: [afmc] SUBJECT.KEYID = 7
14,353,844 UART: [afmc] AUTHORITY.KEYID = 5
16,894,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,135 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,930 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,029 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,582 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,986 UART: [afmc] --
18,695,234 UART: [cold-reset] --
18,698,294 UART: [state] Locking Datavault
18,704,130 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,825 UART: [state] Locking ICCM
18,708,239 UART: [exit] Launching FMC @ 0x40000130
18,716,687 UART:
18,716,924 UART: Running Caliptra FMC ...
18,718,020 UART:
18,718,201 UART: [state] CFI Enabled
18,774,613 UART: [fht] FMC Alias Private Key: 7
20,541,682 UART: [art] Extend RT PCRs Done
20,542,905 UART: [art] Lock RT PCRs Done
20,544,394 UART: [art] Populate DV Done
20,549,696 UART: [fht] FMC Alias Private Key: 7
20,551,171 UART: [art] Derive CDI
20,551,897 UART: [art] Store in slot 0x4
20,607,906 UART: [art] Derive Key Pair
20,608,944 UART: [art] Store priv key in slot 0x5
23,071,984 UART: [art] Derive Key Pair - Done
23,084,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,082 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,745 UART: [art] PUB.X = 0D4439F64459437FCD0F896AC7B2B29065A4CE9571D0FED2A5168DF584E5E87EF7D454EC6D0B374E43F6339B88C4D9DE
24,806,888 UART: [art] PUB.Y = 0664C02938DEF1CCB5345AA7EEBD85BC6B04FAEE280682E9FC9B84C44B63F3D54FE1055E0FC78AABFCE67EB922879EAD
24,814,177 UART: [art] SIG.R = 4A55D797DF2B1589343501A7B00E3FF05264F28BEFC7584CEA701D5EA17438DFDD6402B6F8F7A7B2A4385E19900635C7
24,821,545 UART: [art] SIG.S = 06289FC26B1BC17866810164E43A2D262BC5A88F3BC36644C6B5EC2D11665DDB4D64B5C976D615E9BF1EF9A636141653
25,800,160 UART: Caliptra RT
25,800,869 UART: [state] CFI Enabled
25,981,525 UART: [rt] RT listening for mailbox commands...
25,984,052 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,014,081 UART: [rt]cmd =0x49444550, len=8
26,016,365 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,461,092 ready_for_fw is high
3,461,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,228,392 >>> mbox cmd response: success
18,508,973 UART:
18,509,343 UART: Running Caliptra FMC ...
18,510,445 UART:
18,510,597 UART: [state] CFI Enabled
18,573,731 UART: [fht] FMC Alias Private Key: 7
20,339,873 UART: [art] Extend RT PCRs Done
20,341,097 UART: [art] Lock RT PCRs Done
20,342,807 UART: [art] Populate DV Done
20,348,286 UART: [fht] FMC Alias Private Key: 7
20,349,940 UART: [art] Derive CDI
20,350,754 UART: [art] Store in slot 0x4
20,406,119 UART: [art] Derive Key Pair
20,407,163 UART: [art] Store priv key in slot 0x5
22,869,614 UART: [art] Derive Key Pair - Done
22,882,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,595,785 UART: [art] Erasing AUTHORITY.KEYID = 7
24,597,288 UART: [art] PUB.X = 7949AC9AFA0FD905492C2E120CDC14B1A399DA0A9B5E93742DC51230061766428D1691A6BE2A1D5034F84E94C25AC700
24,604,546 UART: [art] PUB.Y = 32A09ECD87943F5612122186DEBA0E7721CBECF9105CE16B6E0BAE3862B68722C24A4042C45B0AF53F30992BBDDC9815
24,611,793 UART: [art] SIG.R = 4525990AA1AC347173D273EAA8AD06F3EA29E57B3738464632EDB526631E16DFC50884101C77103BDC39EBC901A9C7DF
24,619,186 UART: [art] SIG.S = 488DC8D73673D8E07B30C239C3CA822F51953F2719D3DD7710140AFF89F4C3411D502DC3AB17BE5CDAA7106A3F881FA7
25,597,771 UART: Caliptra RT
25,598,468 UART: [state] CFI Enabled
25,779,075 UART: [rt] RT listening for mailbox commands...
25,781,313 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,811,207 UART: [rt]cmd =0x49444550, len=8
25,813,642 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,315 UART:
192,675 UART: Running Caliptra ROM ...
193,862 UART:
603,567 UART: [state] CFI Enabled
620,874 UART: [state] LifecycleState = Unprovisioned
622,800 UART: [state] DebugLocked = No
624,259 UART: [state] WD Timer not started. Device not locked for debugging
627,516 UART: [kat] SHA2-256
807,188 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,918 UART: [kat] ++
818,438 UART: [kat] sha1
829,241 UART: [kat] SHA2-256
831,985 UART: [kat] SHA2-384
839,061 UART: [kat] SHA2-512-ACC
841,402 UART: [kat] ECC-384
3,283,396 UART: [kat] HMAC-384Kdf
3,296,471 UART: [kat] LMS
3,772,982 UART: [kat] --
3,777,615 UART: [cold-reset] ++
3,780,252 UART: [fht] FHT @ 0x50003400
3,790,944 UART: [idev] ++
3,791,513 UART: [idev] CDI.KEYID = 6
3,792,468 UART: [idev] SUBJECT.KEYID = 7
3,793,711 UART: [idev] UDS.KEYID = 0
3,794,809 ready_for_fw is high
3,795,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,747 UART: [idev] Erasing UDS.KEYID = 0
6,273,311 UART: [idev] Sha1 KeyId Algorithm
6,298,154 UART: [idev] --
6,302,529 UART: [ldev] ++
6,303,111 UART: [ldev] CDI.KEYID = 6
6,304,027 UART: [ldev] SUBJECT.KEYID = 5
6,305,194 UART: [ldev] AUTHORITY.KEYID = 7
6,306,482 UART: [ldev] FE.KEYID = 1
6,318,913 UART: [ldev] Erasing FE.KEYID = 1
8,798,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,828 UART: [ldev] --
10,591,745 UART: [fwproc] Wait for Commands...
10,593,678 UART: [fwproc] Recv command 0x46574c44
10,595,710 UART: [fwproc] Recv'd Img size: 118548 bytes
14,080,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,166,250 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,239,259 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,568,048 >>> mbox cmd response: success
14,571,875 UART: [afmc] ++
14,572,492 UART: [afmc] CDI.KEYID = 6
14,573,409 UART: [afmc] SUBJECT.KEYID = 7
14,574,630 UART: [afmc] AUTHORITY.KEYID = 5
17,082,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,803,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,806,139 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,821,955 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,838,052 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,853,595 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,879,645 UART: [afmc] --
18,883,185 UART: [cold-reset] --
18,886,252 UART: [state] Locking Datavault
18,891,508 UART: [state] Locking PCR0, PCR1 and PCR31
18,893,262 UART: [state] Locking ICCM
18,896,061 UART: [exit] Launching FMC @ 0x40000130
18,904,464 UART:
18,904,700 UART: Running Caliptra FMC ...
18,905,807 UART:
18,905,970 UART: [state] CFI Enabled
18,914,455 UART: [fht] FMC Alias Private Key: 7
20,679,846 UART: [art] Extend RT PCRs Done
20,681,060 UART: [art] Lock RT PCRs Done
20,682,635 UART: [art] Populate DV Done
20,688,318 UART: [fht] FMC Alias Private Key: 7
20,689,916 UART: [art] Derive CDI
20,690,736 UART: [art] Store in slot 0x4
20,733,443 UART: [art] Derive Key Pair
20,734,456 UART: [art] Store priv key in slot 0x5
23,161,745 UART: [art] Derive Key Pair - Done
23,174,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,881,098 UART: [art] Erasing AUTHORITY.KEYID = 7
24,882,587 UART: [art] PUB.X = 46D0DA04A0796EDAE502545295B88B5227AA3E5F1A6665AD0720922A243B57F27D0A0613A26961A8134DA85D02815C29
24,889,823 UART: [art] PUB.Y = 385E1C22BE757DA1BBB462C49A6E278033DA99615E77659D0519F9F95DB0C8AFE6678DB139E71AE90F69B6CA85588672
24,897,103 UART: [art] SIG.R = 770B13876C6DA62B3DBA36E012AA46DA0B12AF200CB222ED50B5B2689B220D75460DCA08069A354AC7B69755DDD84BB0
24,904,504 UART: [art] SIG.S = 28363ED9437E3095BBE5650F059820C48E397AC34B04C0089B6164FF0E7AEC616AA00458D4EEB7196A9FF6D6F1425CA0
25,883,102 UART: Caliptra RT
25,883,804 UART: [state] CFI Enabled
26,015,879 UART: [rt] RT listening for mailbox commands...
26,018,191 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,048,216 UART: [rt]cmd =0x49444550, len=8
26,050,625 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
3,777,170 ready_for_fw is high
3,777,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,620 >>> mbox cmd response: success
18,691,686 UART:
18,692,538 UART: Running Caliptra FMC ...
18,693,670 UART:
18,693,832 UART: [state] CFI Enabled
18,700,924 UART: [fht] FMC Alias Private Key: 7
20,465,828 UART: [art] Extend RT PCRs Done
20,467,076 UART: [art] Lock RT PCRs Done
20,468,789 UART: [art] Populate DV Done
20,474,319 UART: [fht] FMC Alias Private Key: 7
20,475,976 UART: [art] Derive CDI
20,476,797 UART: [art] Store in slot 0x4
20,519,674 UART: [art] Derive Key Pair
20,520,676 UART: [art] Store priv key in slot 0x5
22,947,729 UART: [art] Derive Key Pair - Done
22,960,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,666,980 UART: [art] Erasing AUTHORITY.KEYID = 7
24,668,482 UART: [art] PUB.X = 0DBCD366FDA592093BBC31A512186322954DA72CF6A59AFB938BD2533EC7BA929EF3EF3BDBF1268763095F8732D91B39
24,675,755 UART: [art] PUB.Y = 5475FE49578E1CBDD9A7F41350A82612C0031DC2C9413F74314969E8B67A2C798ED17405E8577ED2EAA22E8A0994E4BE
24,682,962 UART: [art] SIG.R = 76BF759758D26BCC6858BD013AF4148F89622BEA33FF0BACEC9D1DA8405FBBF67BC4DC386492340AE30F9864E7B8D1A3
24,690,361 UART: [art] SIG.S = 805A3134EF75A65190A412C85E0293F9124D4134FB9FD8FFC3963D639DF0A3FD7A78419493A8D12E1835EEFBCAB6D3CA
25,668,774 UART: Caliptra RT
25,669,481 UART: [state] CFI Enabled
25,802,115 UART: [rt] RT listening for mailbox commands...
25,804,583 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,834,388 UART: [rt]cmd =0x49444550, len=8
25,836,753 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,143 UART:
192,526 UART: Running Caliptra ROM ...
193,650 UART:
193,799 UART: [state] CFI Enabled
263,090 UART: [state] LifecycleState = Unprovisioned
265,553 UART: [state] DebugLocked = No
267,593 UART: [state] WD Timer not started. Device not locked for debugging
272,201 UART: [kat] SHA2-256
462,033 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,845 UART: [kat] ++
473,322 UART: [kat] sha1
483,839 UART: [kat] SHA2-256
486,863 UART: [kat] SHA2-384
492,850 UART: [kat] SHA2-512-ACC
495,429 UART: [kat] ECC-384
2,948,585 UART: [kat] HMAC-384Kdf
2,971,763 UART: [kat] LMS
3,503,553 UART: [kat] --
3,508,826 UART: [cold-reset] ++
3,510,189 UART: [fht] FHT @ 0x50003400
3,522,301 UART: [idev] ++
3,523,004 UART: [idev] CDI.KEYID = 6
3,524,040 UART: [idev] SUBJECT.KEYID = 7
3,525,140 UART: [idev] UDS.KEYID = 0
3,526,062 ready_for_fw is high
3,526,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,314 UART: [idev] Erasing UDS.KEYID = 0
6,025,426 UART: [idev] Sha1 KeyId Algorithm
6,047,544 UART: [idev] --
6,053,163 UART: [ldev] ++
6,053,844 UART: [ldev] CDI.KEYID = 6
6,054,753 UART: [ldev] SUBJECT.KEYID = 5
6,055,913 UART: [ldev] AUTHORITY.KEYID = 7
6,057,142 UART: [ldev] FE.KEYID = 1
6,100,199 UART: [ldev] Erasing FE.KEYID = 1
8,605,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,077 UART: [ldev] --
10,414,650 UART: [fwproc] Wait for Commands...
10,416,962 UART: [fwproc] Recv command 0x46574c44
10,419,277 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,386 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,995 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,682,602 >>> mbox cmd response: success
14,687,103 UART: [afmc] ++
14,687,845 UART: [afmc] CDI.KEYID = 6
14,689,044 UART: [afmc] SUBJECT.KEYID = 7
14,690,492 UART: [afmc] AUTHORITY.KEYID = 5
17,218,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,605 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,661 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,846 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,709 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,187 UART: [afmc] --
19,034,897 UART: [cold-reset] --
19,039,214 UART: [state] Locking Datavault
19,044,745 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,945 UART: [state] Locking ICCM
19,049,264 UART: [exit] Launching FMC @ 0x40000130
19,057,942 UART:
19,058,176 UART: Running Caliptra FMC ...
19,059,282 UART:
19,059,451 UART: [state] CFI Enabled
19,120,639 UART: [fht] FMC Alias Private Key: 7
20,907,709 UART: [art] Extend RT PCRs Done
20,908,920 UART: [art] Lock RT PCRs Done
20,910,593 UART: [art] Populate DV Done
20,915,995 UART: [fht] FMC Alias Private Key: 7
20,917,535 UART: [art] Derive CDI
20,918,279 UART: [art] Store in slot 0x4
20,974,776 UART: [art] Derive Key Pair
20,975,784 UART: [art] Store priv key in slot 0x5
23,438,780 UART: [art] Derive Key Pair - Done
23,451,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,164,508 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,017 UART: [art] PUB.X = B2563E0B5F3575E03B8CE19A880AD76FCC92667C0204298A16C600AADA10A2D9F4ECDAAB2D4F44B8A419CB620FEA59EF
25,173,309 UART: [art] PUB.Y = 34626FF1B064494C2394ABDB55984ED25E0B8199B1FF569E57167BEE931E83D8760731D4C1D37993BE01DA6C92EB0471
25,180,575 UART: [art] SIG.R = 8484F3918B1DEBF4943379C610164B12649666E6E31CE747B01D4686E8169F92474F38331142701F3E13B1705ABF6A91
25,187,889 UART: [art] SIG.S = 2CDB3BD53DF318349688507C31DAC3CF41DCD14DB7D3E48DD092B61170A5F03D756E852A7D2B0F866627FE10236EACC0
26,166,586 UART: Caliptra RT
26,167,278 UART: [state] CFI Enabled
26,348,812 UART: [rt] RT listening for mailbox commands...
26,351,284 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,381,122 UART: [rt]cmd =0x49444550, len=8
26,383,449 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,439,164 ready_for_fw is high
3,439,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,818,700 >>> mbox cmd response: success
19,108,918 UART:
19,109,316 UART: Running Caliptra FMC ...
19,110,625 UART:
19,110,797 UART: [state] CFI Enabled
19,178,678 UART: [fht] FMC Alias Private Key: 7
20,945,883 UART: [art] Extend RT PCRs Done
20,947,117 UART: [art] Lock RT PCRs Done
20,949,020 UART: [art] Populate DV Done
20,954,615 UART: [fht] FMC Alias Private Key: 7
20,956,209 UART: [art] Derive CDI
20,957,027 UART: [art] Store in slot 0x4
21,011,804 UART: [art] Derive Key Pair
21,012,849 UART: [art] Store priv key in slot 0x5
23,475,976 UART: [art] Derive Key Pair - Done
23,488,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,338 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,844 UART: [art] PUB.X = E7B3E7143492B708007402A685FF87F872B9B48E979E225A23956D15418936A49B40847E11FC5AD8DB40919FBFEC8DF5
25,210,119 UART: [art] PUB.Y = 78B2A7F3AA981935EA91DA986E344DF9AF966FCA0575CA8B13543E31E79358F100F1546292C18D55841F937ADB1D2B93
25,217,339 UART: [art] SIG.R = 58A866E8A027BC9801CBBA2D1B826364661ECBE488AAD5ED9B13C2893740C1AB4FBDCE4BB06F6DCB431BE48B414ED4C8
25,224,718 UART: [art] SIG.S = E6E4323A350972C4908E170C6B305A1BD2FE45A7B4D6ECCD9EC54B5EE750D38813B7BD2FBEE5D0AD6E2BEA166409A037
26,203,626 UART: Caliptra RT
26,204,316 UART: [state] CFI Enabled
26,383,899 UART: [rt] RT listening for mailbox commands...
26,386,174 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,416,143 UART: [rt]cmd =0x49444550, len=8
26,418,442 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,418 UART:
192,781 UART: Running Caliptra ROM ...
193,922 UART:
603,577 UART: [state] CFI Enabled
615,861 UART: [state] LifecycleState = Unprovisioned
617,888 UART: [state] DebugLocked = No
620,267 UART: [state] WD Timer not started. Device not locked for debugging
625,381 UART: [kat] SHA2-256
815,287 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,047 UART: [kat] ++
826,579 UART: [kat] sha1
838,105 UART: [kat] SHA2-256
841,157 UART: [kat] SHA2-384
847,806 UART: [kat] SHA2-512-ACC
850,393 UART: [kat] ECC-384
3,290,899 UART: [kat] HMAC-384Kdf
3,304,359 UART: [kat] LMS
3,836,160 UART: [kat] --
3,840,938 UART: [cold-reset] ++
3,842,868 UART: [fht] FHT @ 0x50003400
3,854,060 UART: [idev] ++
3,854,774 UART: [idev] CDI.KEYID = 6
3,855,809 UART: [idev] SUBJECT.KEYID = 7
3,856,916 UART: [idev] UDS.KEYID = 0
3,857,847 ready_for_fw is high
3,858,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,912 UART: [idev] Erasing UDS.KEYID = 0
6,333,056 UART: [idev] Sha1 KeyId Algorithm
6,356,390 UART: [idev] --
6,361,489 UART: [ldev] ++
6,362,182 UART: [ldev] CDI.KEYID = 6
6,363,102 UART: [ldev] SUBJECT.KEYID = 5
6,364,265 UART: [ldev] AUTHORITY.KEYID = 7
6,365,500 UART: [ldev] FE.KEYID = 1
6,376,960 UART: [ldev] Erasing FE.KEYID = 1
8,854,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,345 UART: [ldev] --
10,647,116 UART: [fwproc] Wait for Commands...
10,649,970 UART: [fwproc] Recv command 0x46574c44
10,652,288 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,625 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,229 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,472 >>> mbox cmd response: success
14,916,094 UART: [afmc] ++
14,916,926 UART: [afmc] CDI.KEYID = 6
14,918,023 UART: [afmc] SUBJECT.KEYID = 7
14,919,479 UART: [afmc] AUTHORITY.KEYID = 5
17,422,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,617 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,734 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,840 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,802 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,644 UART: [afmc] --
19,218,756 UART: [cold-reset] --
19,222,956 UART: [state] Locking Datavault
19,229,845 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,015 UART: [state] Locking ICCM
19,233,487 UART: [exit] Launching FMC @ 0x40000130
19,242,197 UART:
19,242,475 UART: Running Caliptra FMC ...
19,243,514 UART:
19,243,667 UART: [state] CFI Enabled
19,251,937 UART: [fht] FMC Alias Private Key: 7
21,018,203 UART: [art] Extend RT PCRs Done
21,019,414 UART: [art] Lock RT PCRs Done
21,021,236 UART: [art] Populate DV Done
21,026,601 UART: [fht] FMC Alias Private Key: 7
21,028,215 UART: [art] Derive CDI
21,028,959 UART: [art] Store in slot 0x4
21,071,453 UART: [art] Derive Key Pair
21,072,460 UART: [art] Store priv key in slot 0x5
23,499,761 UART: [art] Derive Key Pair - Done
23,512,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,859 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,376 UART: [art] PUB.X = 54015E266CAE15464DD7A0523ABAB3D795DFF06A9CE55614F6A8F2B6183FC13398C8B81C8F27B55C082EA76C05169CBC
25,227,650 UART: [art] PUB.Y = 1938368EAAC3497355E156A7EFA2148D226EBC5F6E70BF76A34D57778AE102E96233BEAFCF9A01CFE397D513BBA5EFCB
25,234,961 UART: [art] SIG.R = 818F90330E638DEB345D4DB36CFE4F929A536D60EF401907297D90E79C7A7C17E99878B022673C45FFBE4FB89AA09BAB
25,242,409 UART: [art] SIG.S = 65ABF7D326A17AEE86E362EE3CDCFD30E554C56D581F3A5FBC8FB21AA676BD2D96823BC24F0A46FF92AB39241665EF1C
26,221,324 UART: Caliptra RT
26,222,022 UART: [state] CFI Enabled
26,354,260 UART: [rt] RT listening for mailbox commands...
26,356,654 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,386,590 UART: [rt]cmd =0x49444550, len=8
26,388,840 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,759,707 ready_for_fw is high
3,760,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,469 >>> mbox cmd response: success
19,293,929 UART:
19,294,327 UART: Running Caliptra FMC ...
19,295,531 UART:
19,295,727 UART: [state] CFI Enabled
19,303,692 UART: [fht] FMC Alias Private Key: 7
21,069,749 UART: [art] Extend RT PCRs Done
21,070,973 UART: [art] Lock RT PCRs Done
21,072,446 UART: [art] Populate DV Done
21,077,763 UART: [fht] FMC Alias Private Key: 7
21,079,421 UART: [art] Derive CDI
21,080,245 UART: [art] Store in slot 0x4
21,122,743 UART: [art] Derive Key Pair
21,123,784 UART: [art] Store priv key in slot 0x5
23,550,539 UART: [art] Derive Key Pair - Done
23,563,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,928 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,436 UART: [art] PUB.X = 9C21074C434A340AD75062B4698D73BA7086337A41886D98CF28E0EB879EBCBD661535548D9432D4E4BF68CC5B6D1306
25,278,681 UART: [art] PUB.Y = 3E32DEE7924BE0DCA7E6B40CD3F5843A57EE35637A34843E67C3F3B45B20C1F525863A8CC7800F1D8C3A5FB4C07F95A5
25,285,926 UART: [art] SIG.R = 6B5F60AE670F6390E98F75EE12F0EFCF19639D5D431245FD3D2DE5C752BA50A9A861FE3B559EC2A6CD7FB931EDE0A51A
25,293,393 UART: [art] SIG.S = 52A760A4D1B1EBD2FD3C8CC2A610EDE51803E0568BAFAC4E603912F0ED72C70B8FF2117103232D67698A0F134BF44B0B
26,272,617 UART: Caliptra RT
26,273,315 UART: [state] CFI Enabled
26,405,998 UART: [rt] RT listening for mailbox commands...
26,408,290 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,437,981 UART: [rt]cmd =0x49444550, len=8
26,440,312 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,475 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,987 UART: [kat] SHA2-256
881,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,033 UART: [kat] ++
886,185 UART: [kat] sha1
890,257 UART: [kat] SHA2-256
892,195 UART: [kat] SHA2-384
895,062 UART: [kat] SHA2-512-ACC
896,963 UART: [kat] ECC-384
902,452 UART: [kat] HMAC-384Kdf
906,982 UART: [kat] LMS
1,475,178 UART: [kat] --
1,475,977 UART: [cold-reset] ++
1,476,479 UART: [fht] Storing FHT @ 0x50003400
1,479,298 UART: [idev] ++
1,479,466 UART: [idev] CDI.KEYID = 6
1,479,826 UART: [idev] SUBJECT.KEYID = 7
1,480,250 UART: [idev] UDS.KEYID = 0
1,480,595 ready_for_fw is high
1,480,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,402 UART: [idev] Erasing UDS.KEYID = 0
1,505,084 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,840 UART: [idev] --
1,514,779 UART: [ldev] ++
1,514,947 UART: [ldev] CDI.KEYID = 6
1,515,310 UART: [ldev] SUBJECT.KEYID = 5
1,515,736 UART: [ldev] AUTHORITY.KEYID = 7
1,516,199 UART: [ldev] FE.KEYID = 1
1,521,375 UART: [ldev] Erasing FE.KEYID = 1
1,546,386 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,172 UART: [ldev] --
1,585,563 UART: [fwproc] Waiting for Commands...
1,586,424 UART: [fwproc] Received command 0x46574c44
1,587,215 UART: [fwproc] Received Image of size 118548 bytes
2,931,827 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,889 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,107 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,372 >>> mbox cmd response: success
3,132,408 UART: [afmc] ++
3,132,576 UART: [afmc] CDI.KEYID = 6
3,132,938 UART: [afmc] SUBJECT.KEYID = 7
3,133,363 UART: [afmc] AUTHORITY.KEYID = 5
3,168,700 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,530 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,239 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,122 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,805 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,553 UART: [afmc] --
3,211,647 UART: [cold-reset] --
3,212,469 UART: [state] Locking Datavault
3,213,786 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,390 UART: [state] Locking ICCM
3,214,962 UART: [exit] Launching FMC @ 0x40000130
3,220,292 UART:
3,220,308 UART: Running Caliptra FMC ...
3,220,716 UART:
3,220,770 UART: [state] CFI Enabled
3,231,474 UART: [fht] FMC Alias Private Key: 7
3,350,742 UART: [art] Extend RT PCRs Done
3,351,170 UART: [art] Lock RT PCRs Done
3,352,594 UART: [art] Populate DV Done
3,360,839 UART: [fht] FMC Alias Private Key: 7
3,361,913 UART: [art] Derive CDI
3,362,193 UART: [art] Store in slot 0x4
3,448,033 UART: [art] Derive Key Pair
3,448,393 UART: [art] Store priv key in slot 0x5
3,462,134 UART: [art] Derive Key Pair - Done
3,476,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,663 UART: [art] PUB.X = B115B62C26C464EA46DBB6B352A25329F8A916CB538A7924F2E2D4B26B1E8FD2F05E04363E19BDE98318D40D5B21A87B
3,500,435 UART: [art] PUB.Y = FAF6B6AB603E59B357266AF1D835B897FEF00AAF72BDE1BB5B1E090276FC01089A7926DB1B1AB07B7C9AA3C6E1F4C67D
3,507,392 UART: [art] SIG.R = DB8E662A37AEB27F43B88FA2B984F1394EBEFDC48E4A4FC0805BB58E7CB7FC969CD3690B47D9E2C8D24B388597ED93DB
3,514,181 UART: [art] SIG.S = 71ED7F65C7D68D2E6C8BC06E83231B0C4F92D39CB2767E72A6381453C8BEA62A313490B99C6F676169766DDB26F0367A
3,537,878 UART: Caliptra RT
3,538,129 UART: [state] CFI Enabled
3,656,882 UART: [rt] RT listening for mailbox commands...
3,657,552 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,558 UART: [rt]cmd =0x49444550, len=8
3,689,299 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,851 ready_for_fw is high
1,361,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,562 >>> mbox cmd response: success
3,039,677 UART:
3,039,693 UART: Running Caliptra FMC ...
3,040,101 UART:
3,040,155 UART: [state] CFI Enabled
3,050,477 UART: [fht] FMC Alias Private Key: 7
3,169,459 UART: [art] Extend RT PCRs Done
3,169,887 UART: [art] Lock RT PCRs Done
3,171,563 UART: [art] Populate DV Done
3,179,902 UART: [fht] FMC Alias Private Key: 7
3,181,070 UART: [art] Derive CDI
3,181,350 UART: [art] Store in slot 0x4
3,266,668 UART: [art] Derive Key Pair
3,267,028 UART: [art] Store priv key in slot 0x5
3,280,695 UART: [art] Derive Key Pair - Done
3,295,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,425 UART: [art] PUB.X = E5E7C7359B8E86523F5A30046700B2B51D1B9D70D99AC6EED08A2576A47E9B60C5AD5896BEE9F4B44426C7C40DC570D6
3,318,175 UART: [art] PUB.Y = 9E622E63F78F1F906E89A94A8B10F42361B4DFD229919813DF16171E510408026775024536C30A3DD517D1EB30FCCDF6
3,325,106 UART: [art] SIG.R = 5FF6BB580A7AB11F0AE5DEAB4CA4BF9977875C89457166B4A8AC4CFF026F455AB16908E52DB34E7ED7AB1650F37A1615
3,331,880 UART: [art] SIG.S = 924A6C6975E9D1444BC6569B4A0ECE0C125B08204F8D0C8B9DBE716551FB051F26BCC446F09C6066375F15A2BA8EC3CC
3,355,017 UART: Caliptra RT
3,355,268 UART: [state] CFI Enabled
3,476,221 UART: [rt] RT listening for mailbox commands...
3,476,891 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,461 UART: [rt]cmd =0x49444550, len=8
3,508,436 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,158 UART: [kat] SHA2-256
882,089 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,204 UART: [kat] ++
886,356 UART: [kat] sha1
890,626 UART: [kat] SHA2-256
892,564 UART: [kat] SHA2-384
895,541 UART: [kat] SHA2-512-ACC
897,442 UART: [kat] ECC-384
903,281 UART: [kat] HMAC-384Kdf
908,073 UART: [kat] LMS
1,476,269 UART: [kat] --
1,477,078 UART: [cold-reset] ++
1,477,562 UART: [fht] Storing FHT @ 0x50003400
1,480,533 UART: [idev] ++
1,480,701 UART: [idev] CDI.KEYID = 6
1,481,061 UART: [idev] SUBJECT.KEYID = 7
1,481,485 UART: [idev] UDS.KEYID = 0
1,481,830 ready_for_fw is high
1,481,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,213 UART: [idev] Erasing UDS.KEYID = 0
1,505,799 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,359 UART: [idev] --
1,515,426 UART: [ldev] ++
1,515,594 UART: [ldev] CDI.KEYID = 6
1,515,957 UART: [ldev] SUBJECT.KEYID = 5
1,516,383 UART: [ldev] AUTHORITY.KEYID = 7
1,516,846 UART: [ldev] FE.KEYID = 1
1,522,614 UART: [ldev] Erasing FE.KEYID = 1
1,547,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,719 UART: [ldev] --
1,587,122 UART: [fwproc] Waiting for Commands...
1,587,903 UART: [fwproc] Received command 0x46574c44
1,588,694 UART: [fwproc] Received Image of size 118548 bytes
2,934,746 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,652 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,870 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,225 >>> mbox cmd response: success
3,134,381 UART: [afmc] ++
3,134,549 UART: [afmc] CDI.KEYID = 6
3,134,911 UART: [afmc] SUBJECT.KEYID = 7
3,135,336 UART: [afmc] AUTHORITY.KEYID = 5
3,170,435 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,007 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,787 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,496 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,379 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,062 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,090 UART: [afmc] --
3,214,082 UART: [cold-reset] --
3,214,912 UART: [state] Locking Datavault
3,215,909 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,513 UART: [state] Locking ICCM
3,217,013 UART: [exit] Launching FMC @ 0x40000130
3,222,343 UART:
3,222,359 UART: Running Caliptra FMC ...
3,222,767 UART:
3,222,910 UART: [state] CFI Enabled
3,233,568 UART: [fht] FMC Alias Private Key: 7
3,352,756 UART: [art] Extend RT PCRs Done
3,353,184 UART: [art] Lock RT PCRs Done
3,354,382 UART: [art] Populate DV Done
3,362,461 UART: [fht] FMC Alias Private Key: 7
3,363,573 UART: [art] Derive CDI
3,363,853 UART: [art] Store in slot 0x4
3,449,813 UART: [art] Derive Key Pair
3,450,173 UART: [art] Store priv key in slot 0x5
3,463,230 UART: [art] Derive Key Pair - Done
3,478,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,897 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,662 UART: [art] PUB.X = A782A89F73DD7E1B75B0347A14E0FC175A5F62C7E913A094FFA97A8056C00FE8A1D8CB31C491F3338A8B7122BB56EB08
3,501,436 UART: [art] PUB.Y = B8486EA1FDC10E709DE68B67D585A97F32C72C8F1DA0680D7287BAD1705474337C830A612E972E3428CF4A8FBCF20D1D
3,508,382 UART: [art] SIG.R = B8E91F724748A64640C1BBEBCD4F1FB5BD31619C0CB9FE14DDDF15EC4DE2C2DC46DCD15DFC4382F9EE58C9463B7E4D6C
3,515,179 UART: [art] SIG.S = 98CFB30EF595CC8A77DD45BE7DF8C1E49B985A02147DCD0158AA4A569FF4E001288F574E857A7475E74A5F337510F11C
3,538,951 UART: Caliptra RT
3,539,294 UART: [state] CFI Enabled
3,659,524 UART: [rt] RT listening for mailbox commands...
3,660,194 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,180 UART: [rt]cmd =0x49444550, len=8
3,691,955 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,738 ready_for_fw is high
1,362,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,139 >>> mbox cmd response: success
3,043,046 UART:
3,043,062 UART: Running Caliptra FMC ...
3,043,470 UART:
3,043,613 UART: [state] CFI Enabled
3,054,125 UART: [fht] FMC Alias Private Key: 7
3,173,139 UART: [art] Extend RT PCRs Done
3,173,567 UART: [art] Lock RT PCRs Done
3,175,111 UART: [art] Populate DV Done
3,182,996 UART: [fht] FMC Alias Private Key: 7
3,184,174 UART: [art] Derive CDI
3,184,454 UART: [art] Store in slot 0x4
3,270,892 UART: [art] Derive Key Pair
3,271,252 UART: [art] Store priv key in slot 0x5
3,284,457 UART: [art] Derive Key Pair - Done
3,298,915 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,274 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,039 UART: [art] PUB.X = DB71648BC20016CB949F4765C54D23C586515F363CF0DBF838C7B9E09775936C09E08ADF98CE0E630DA18B22C2C3545C
3,321,782 UART: [art] PUB.Y = E6D4943B896F9BAC5E61E0352CDF42887E5CEA929DFC8CB5BD693A764AF97062AFC5B01C805670CEFF6A7CBD9A8E02FE
3,328,753 UART: [art] SIG.R = 458449C67A2263AB6C2090A0CC4F11CD8FE7D7D8F4F73219DE20A63675A605ED9C3CDEE74CF9013E3A2AD6709D23BDB1
3,335,531 UART: [art] SIG.S = 669AC3C87F7AA840B848AE2FF81FF66BF09D8845D30C86EF98CB1124B03E3D32986CA532DBCAD61896A4BC019EB56882
3,358,827 UART: Caliptra RT
3,359,170 UART: [state] CFI Enabled
3,479,918 UART: [rt] RT listening for mailbox commands...
3,480,588 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,608 UART: [rt]cmd =0x49444550, len=8
3,512,511 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,906 UART: [kat] SHA2-256
901,846 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
920,631 UART: [kat] LMS
1,168,943 UART: [kat] --
1,169,978 UART: [cold-reset] ++
1,170,424 UART: [fht] FHT @ 0x50003400
1,173,026 UART: [idev] ++
1,173,194 UART: [idev] CDI.KEYID = 6
1,173,555 UART: [idev] SUBJECT.KEYID = 7
1,173,980 UART: [idev] UDS.KEYID = 0
1,174,326 ready_for_fw is high
1,174,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,873 UART: [idev] Erasing UDS.KEYID = 0
1,198,767 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,652 UART: [ldev] ++
1,208,820 UART: [ldev] CDI.KEYID = 6
1,209,184 UART: [ldev] SUBJECT.KEYID = 5
1,209,611 UART: [ldev] AUTHORITY.KEYID = 7
1,210,074 UART: [ldev] FE.KEYID = 1
1,215,086 UART: [ldev] Erasing FE.KEYID = 1
1,240,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,736 UART: [ldev] --
1,280,075 UART: [fwproc] Wait for Commands...
1,280,846 UART: [fwproc] Recv command 0x46574c44
1,281,579 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,448 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,503 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,678 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,917 >>> mbox cmd response: success
2,826,005 UART: [afmc] ++
2,826,173 UART: [afmc] CDI.KEYID = 6
2,826,536 UART: [afmc] SUBJECT.KEYID = 7
2,826,962 UART: [afmc] AUTHORITY.KEYID = 5
2,862,069 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,435 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,145 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,026 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,727 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,384 UART: [afmc] --
2,905,355 UART: [cold-reset] --
2,906,275 UART: [state] Locking Datavault
2,907,300 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,904 UART: [state] Locking ICCM
2,908,364 UART: [exit] Launching FMC @ 0x40000130
2,913,694 UART:
2,913,710 UART: Running Caliptra FMC ...
2,914,118 UART:
2,914,172 UART: [state] CFI Enabled
2,924,808 UART: [fht] FMC Alias Private Key: 7
3,043,670 UART: [art] Extend RT PCRs Done
3,044,098 UART: [art] Lock RT PCRs Done
3,045,356 UART: [art] Populate DV Done
3,053,927 UART: [fht] FMC Alias Private Key: 7
3,055,037 UART: [art] Derive CDI
3,055,317 UART: [art] Store in slot 0x4
3,141,408 UART: [art] Derive Key Pair
3,141,768 UART: [art] Store priv key in slot 0x5
3,155,014 UART: [art] Derive Key Pair - Done
3,169,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,198 UART: [art] PUB.X = FFDC8A79D9A5ADEA7CCE0BA881AAEE3E90ADB583A392C2E6CB3A0BDC96AA86CB86500616269A8B29D333F4C5FD91CEBA
3,192,993 UART: [art] PUB.Y = 26F10AE8BDCD1F749D0CE73AE26FC5CF263F64D76135F2CAF442FF05B388BEEB8C32ACBDA4A81FBC1BD7227853558EF6
3,199,960 UART: [art] SIG.R = 04D3D744F25BB619B5D811EC75D23CF388A8855081A83098D12A1621987A8395AA85DB57CD5B7796835CBA067F007C3E
3,206,700 UART: [art] SIG.S = 8194F915CABECD237FEC26A4DC60DC6BF95C83CDE73DB69D43E99B0AB29A5EEA36671BFBA1950CA755D98CB919FCA061
3,230,850 UART: Caliptra RT
3,231,101 UART: [state] CFI Enabled
3,351,125 UART: [rt] RT listening for mailbox commands...
3,351,795 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,581 UART: [rt]cmd =0x49444550, len=8
3,383,586 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,946 ready_for_fw is high
1,059,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,444 >>> mbox cmd response: success
2,742,249 UART:
2,742,265 UART: Running Caliptra FMC ...
2,742,673 UART:
2,742,727 UART: [state] CFI Enabled
2,753,023 UART: [fht] FMC Alias Private Key: 7
2,871,913 UART: [art] Extend RT PCRs Done
2,872,341 UART: [art] Lock RT PCRs Done
2,873,643 UART: [art] Populate DV Done
2,882,060 UART: [fht] FMC Alias Private Key: 7
2,883,194 UART: [art] Derive CDI
2,883,474 UART: [art] Store in slot 0x4
2,969,359 UART: [art] Derive Key Pair
2,969,719 UART: [art] Store priv key in slot 0x5
2,982,925 UART: [art] Derive Key Pair - Done
2,997,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,842 UART: [art] PUB.X = 37E3B2E082FA6F157596A41AE20E3CF2BB45F420B444DD0C96E98FAE511629518AF052598A1D47C12E8144D6B5CC2C0F
3,020,611 UART: [art] PUB.Y = 4F375C75BE778EBCBC8BB16BBB26A85E3D2C755D18ABEB0C5DE553FE580E818D17D2EFF96CC13DE568EF0D78BA93B130
3,027,578 UART: [art] SIG.R = AD94E50D36BE5D883C26EC51AF43518AEE77FF7FBA3CFBAF880A4548CF0C074E9676C27E3C16B2BDCEBAAB82FEBC3EC9
3,034,370 UART: [art] SIG.S = 22C31AC95C4711118A00F40E85E5F6996FFC4E247EF9EA6718FF26518C36A90BE75463B4B30F9F760862344C87E668E1
3,058,022 UART: Caliptra RT
3,058,273 UART: [state] CFI Enabled
3,178,215 UART: [rt] RT listening for mailbox commands...
3,178,885 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,763 UART: [rt]cmd =0x49444550, len=8
3,210,612 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,739 UART: [kat] SHA2-256
901,679 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
916,382 UART: [kat] HMAC-384Kdf
921,148 UART: [kat] LMS
1,169,460 UART: [kat] --
1,170,323 UART: [cold-reset] ++
1,170,837 UART: [fht] FHT @ 0x50003400
1,173,519 UART: [idev] ++
1,173,687 UART: [idev] CDI.KEYID = 6
1,174,048 UART: [idev] SUBJECT.KEYID = 7
1,174,473 UART: [idev] UDS.KEYID = 0
1,174,819 ready_for_fw is high
1,174,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,692 UART: [idev] Erasing UDS.KEYID = 0
1,200,352 UART: [idev] Sha1 KeyId Algorithm
1,209,006 UART: [idev] --
1,210,083 UART: [ldev] ++
1,210,251 UART: [ldev] CDI.KEYID = 6
1,210,615 UART: [ldev] SUBJECT.KEYID = 5
1,211,042 UART: [ldev] AUTHORITY.KEYID = 7
1,211,505 UART: [ldev] FE.KEYID = 1
1,216,811 UART: [ldev] Erasing FE.KEYID = 1
1,243,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,917 UART: [ldev] --
1,283,350 UART: [fwproc] Wait for Commands...
1,284,051 UART: [fwproc] Recv command 0x46574c44
1,284,784 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,370 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,545 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,782 >>> mbox cmd response: success
2,830,002 UART: [afmc] ++
2,830,170 UART: [afmc] CDI.KEYID = 6
2,830,533 UART: [afmc] SUBJECT.KEYID = 7
2,830,959 UART: [afmc] AUTHORITY.KEYID = 5
2,866,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,086 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,796 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,677 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,378 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,137 UART: [afmc] --
2,910,202 UART: [cold-reset] --
2,911,072 UART: [state] Locking Datavault
2,912,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,657 UART: [state] Locking ICCM
2,913,121 UART: [exit] Launching FMC @ 0x40000130
2,918,451 UART:
2,918,467 UART: Running Caliptra FMC ...
2,918,875 UART:
2,919,018 UART: [state] CFI Enabled
2,929,744 UART: [fht] FMC Alias Private Key: 7
3,048,570 UART: [art] Extend RT PCRs Done
3,048,998 UART: [art] Lock RT PCRs Done
3,050,536 UART: [art] Populate DV Done
3,058,737 UART: [fht] FMC Alias Private Key: 7
3,059,809 UART: [art] Derive CDI
3,060,089 UART: [art] Store in slot 0x4
3,145,740 UART: [art] Derive Key Pair
3,146,100 UART: [art] Store priv key in slot 0x5
3,160,106 UART: [art] Derive Key Pair - Done
3,174,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,220 UART: [art] PUB.X = CA9698D817A31320A91BC4CE397357107BC900C822E6E8940C61F8881667F1581FF2BA0F73BFFF47C22672968E424B5E
3,197,960 UART: [art] PUB.Y = C268B335513A2BC4C01BF33C6E5E97EDF830EC40B63D999DC49646CF9F0D49A757B0E7D167BED504930FF8E07744FA2C
3,204,913 UART: [art] SIG.R = 22F1971084A0F416571B1FF8D38CEF4C1961ECEDF52533279AAC798D6D052F2D5F865D49EAD6EDF05787DD8CB9B1EE92
3,211,694 UART: [art] SIG.S = 6D73E60ED14CB0746D34F4BA3E610C80BFA24BEEAA92C37912E8F02CD9A6DCAC904D786ECD1576B0C82D50D3D45D22C5
3,235,718 UART: Caliptra RT
3,236,061 UART: [state] CFI Enabled
3,355,894 UART: [rt] RT listening for mailbox commands...
3,356,564 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,186 UART: [rt]cmd =0x49444550, len=8
3,388,181 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,321 ready_for_fw is high
1,060,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,601 >>> mbox cmd response: success
2,740,058 UART:
2,740,074 UART: Running Caliptra FMC ...
2,740,482 UART:
2,740,625 UART: [state] CFI Enabled
2,751,069 UART: [fht] FMC Alias Private Key: 7
2,870,515 UART: [art] Extend RT PCRs Done
2,870,943 UART: [art] Lock RT PCRs Done
2,872,759 UART: [art] Populate DV Done
2,880,986 UART: [fht] FMC Alias Private Key: 7
2,881,950 UART: [art] Derive CDI
2,882,230 UART: [art] Store in slot 0x4
2,967,769 UART: [art] Derive Key Pair
2,968,129 UART: [art] Store priv key in slot 0x5
2,981,517 UART: [art] Derive Key Pair - Done
2,995,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,603 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,368 UART: [art] PUB.X = 872FF0DA978BA3D24AF152A48E61BA21D81F8C881A764944E38F17E034192C5B373147013E602256003CA1F1A6D1FCCF
3,019,115 UART: [art] PUB.Y = F0EA1D6F803FE28A8E09282E27C0F2C12138D1895DED9E34E1DBB76A71CC6AEA02014997C04C5A8988B278C8409B633B
3,026,064 UART: [art] SIG.R = 6BB4E5CF840290E33BE1528A80AE04F00496C0B19D51109B7F7F4D0504A65DFF1C2003F53AD277EE537E8AFBE5C032F8
3,032,826 UART: [art] SIG.S = 412F08FF1DA0319B5CEFAA7AF239E1F378B7011055F3B72C85A9CA65BE7C1555A74277517A1495F723CB4AF6357200F4
3,056,268 UART: Caliptra RT
3,056,611 UART: [state] CFI Enabled
3,177,090 UART: [rt] RT listening for mailbox commands...
3,177,760 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,590 UART: [rt]cmd =0x49444550, len=8
3,209,401 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,612 UART: [state] LifecycleState = Unprovisioned
85,267 UART: [state] DebugLocked = No
85,879 UART: [state] WD Timer not started. Device not locked for debugging
87,086 UART: [kat] SHA2-256
892,736 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,861 UART: [kat] ++
897,013 UART: [kat] sha1
901,353 UART: [kat] SHA2-256
903,293 UART: [kat] SHA2-384
906,060 UART: [kat] SHA2-512-ACC
907,961 UART: [kat] ECC-384
917,664 UART: [kat] HMAC-384Kdf
922,230 UART: [kat] LMS
1,170,558 UART: [kat] --
1,171,651 UART: [cold-reset] ++
1,172,019 UART: [fht] FHT @ 0x50003400
1,174,526 UART: [idev] ++
1,174,694 UART: [idev] CDI.KEYID = 6
1,175,054 UART: [idev] SUBJECT.KEYID = 7
1,175,478 UART: [idev] UDS.KEYID = 0
1,175,823 ready_for_fw is high
1,175,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,308 UART: [idev] Erasing UDS.KEYID = 0
1,200,641 UART: [idev] Sha1 KeyId Algorithm
1,209,253 UART: [idev] --
1,210,393 UART: [ldev] ++
1,210,561 UART: [ldev] CDI.KEYID = 6
1,210,924 UART: [ldev] SUBJECT.KEYID = 5
1,211,350 UART: [ldev] AUTHORITY.KEYID = 7
1,211,813 UART: [ldev] FE.KEYID = 1
1,217,053 UART: [ldev] Erasing FE.KEYID = 1
1,243,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,731 UART: [ldev] --
1,282,222 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,562 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,708 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,878 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,141 >>> mbox cmd response: success
2,827,205 UART: [afmc] ++
2,827,373 UART: [afmc] CDI.KEYID = 6
2,827,735 UART: [afmc] SUBJECT.KEYID = 7
2,828,160 UART: [afmc] AUTHORITY.KEYID = 5
2,863,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,954 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,702 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,411 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,294 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,995 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,729 UART: [afmc] --
2,906,647 UART: [cold-reset] --
2,907,387 UART: [state] Locking Datavault
2,908,582 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,186 UART: [state] Locking ICCM
2,909,736 UART: [exit] Launching FMC @ 0x40000130
2,915,066 UART:
2,915,082 UART: Running Caliptra FMC ...
2,915,490 UART:
2,915,544 UART: [state] CFI Enabled
2,926,352 UART: [fht] FMC Alias Private Key: 7
3,045,088 UART: [art] Extend RT PCRs Done
3,045,516 UART: [art] Lock RT PCRs Done
3,047,174 UART: [art] Populate DV Done
3,055,517 UART: [fht] FMC Alias Private Key: 7
3,056,509 UART: [art] Derive CDI
3,056,789 UART: [art] Store in slot 0x4
3,142,716 UART: [art] Derive Key Pair
3,143,076 UART: [art] Store priv key in slot 0x5
3,156,372 UART: [art] Derive Key Pair - Done
3,171,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,408 UART: [art] PUB.X = 4BB3068E117F508A483B5D1D395E38F585C01D09AECFF14E3E7FC0F487448598694229D45B75A5B102876EDA3328FB80
3,194,169 UART: [art] PUB.Y = 391009B7569E53B34C3CE2C4622D7D6A27A8B814D92D9F0B24EF896929010D7145D8C0AE9B94EC26495363533F441B81
3,201,101 UART: [art] SIG.R = 796DBDA2D2D296180419CCC628ED7A25F9B3796B18F62409928E1EE8ACC7653E02EE4E14DF244B37F3A8AF78C650A863
3,207,870 UART: [art] SIG.S = 51AFEC5368F5635387205824F24E3464494866CC74704E7373826348B741EDF3B74C2BF7CB580B11CE1058AB09D2CFAA
3,231,764 UART: Caliptra RT
3,232,015 UART: [state] CFI Enabled
3,352,258 UART: [rt] RT listening for mailbox commands...
3,352,928 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,914 UART: [rt]cmd =0x49444550, len=8
3,384,823 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,947 ready_for_fw is high
1,059,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,386 >>> mbox cmd response: success
2,742,537 UART:
2,742,553 UART: Running Caliptra FMC ...
2,742,961 UART:
2,743,015 UART: [state] CFI Enabled
2,753,671 UART: [fht] FMC Alias Private Key: 7
2,872,399 UART: [art] Extend RT PCRs Done
2,872,827 UART: [art] Lock RT PCRs Done
2,874,307 UART: [art] Populate DV Done
2,882,520 UART: [fht] FMC Alias Private Key: 7
2,883,460 UART: [art] Derive CDI
2,883,740 UART: [art] Store in slot 0x4
2,969,713 UART: [art] Derive Key Pair
2,970,073 UART: [art] Store priv key in slot 0x5
2,983,275 UART: [art] Derive Key Pair - Done
2,998,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,374 UART: [art] PUB.X = 8F46F416E19116F3724FB7451F6696557C78C6C9DC35C441607088FED622960C15943794451E1B88A585CEBA053B8CFD
3,021,132 UART: [art] PUB.Y = A68B8847FEBB688C26F96FA55588590A6DB0E686B606089754972AB9299D88D0DCBB45C693D44F4AB23E0FD4277E14D6
3,028,074 UART: [art] SIG.R = 4E09A6C6CD8ABD7E98BBE016E1E5E6307883EBF1A6CB3A433B21D4F076A8A75132C85768A2ED35353A1D3F43DBBE42B4
3,034,857 UART: [art] SIG.S = 61312ABD4DF0EA7C9884F4E27540FE13B03C23B8865B1F7F75F4A69AAE49E03A58476ADBBF4C01FCFD8CE808870119CD
3,058,326 UART: Caliptra RT
3,058,577 UART: [state] CFI Enabled
3,177,486 UART: [rt] RT listening for mailbox commands...
3,178,156 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,130 UART: [rt]cmd =0x49444550, len=8
3,209,979 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
893,409 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,534 UART: [kat] ++
897,686 UART: [kat] sha1
901,842 UART: [kat] SHA2-256
903,782 UART: [kat] SHA2-384
906,589 UART: [kat] SHA2-512-ACC
908,490 UART: [kat] ECC-384
918,161 UART: [kat] HMAC-384Kdf
922,853 UART: [kat] LMS
1,171,181 UART: [kat] --
1,172,000 UART: [cold-reset] ++
1,172,366 UART: [fht] FHT @ 0x50003400
1,175,067 UART: [idev] ++
1,175,235 UART: [idev] CDI.KEYID = 6
1,175,595 UART: [idev] SUBJECT.KEYID = 7
1,176,019 UART: [idev] UDS.KEYID = 0
1,176,364 ready_for_fw is high
1,176,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,179 UART: [idev] Erasing UDS.KEYID = 0
1,201,228 UART: [idev] Sha1 KeyId Algorithm
1,209,670 UART: [idev] --
1,210,660 UART: [ldev] ++
1,210,828 UART: [ldev] CDI.KEYID = 6
1,211,191 UART: [ldev] SUBJECT.KEYID = 5
1,211,617 UART: [ldev] AUTHORITY.KEYID = 7
1,212,080 UART: [ldev] FE.KEYID = 1
1,217,328 UART: [ldev] Erasing FE.KEYID = 1
1,243,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,838 UART: [ldev] --
1,283,339 UART: [fwproc] Wait for Commands...
1,284,027 UART: [fwproc] Recv command 0x46574c44
1,284,755 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,675 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,845 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,210 >>> mbox cmd response: success
2,828,316 UART: [afmc] ++
2,828,484 UART: [afmc] CDI.KEYID = 6
2,828,846 UART: [afmc] SUBJECT.KEYID = 7
2,829,271 UART: [afmc] AUTHORITY.KEYID = 5
2,864,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,989 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,698 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,581 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,282 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,254 UART: [afmc] --
2,908,264 UART: [cold-reset] --
2,909,328 UART: [state] Locking Datavault
2,910,525 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,129 UART: [state] Locking ICCM
2,911,607 UART: [exit] Launching FMC @ 0x40000130
2,916,937 UART:
2,916,953 UART: Running Caliptra FMC ...
2,917,361 UART:
2,917,504 UART: [state] CFI Enabled
2,928,156 UART: [fht] FMC Alias Private Key: 7
3,046,814 UART: [art] Extend RT PCRs Done
3,047,242 UART: [art] Lock RT PCRs Done
3,048,514 UART: [art] Populate DV Done
3,056,887 UART: [fht] FMC Alias Private Key: 7
3,057,907 UART: [art] Derive CDI
3,058,187 UART: [art] Store in slot 0x4
3,143,962 UART: [art] Derive Key Pair
3,144,322 UART: [art] Store priv key in slot 0x5
3,158,012 UART: [art] Derive Key Pair - Done
3,172,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,213 UART: [art] PUB.X = 61CCCA575D33FC8726D5DC5EFF2A549EEFCADD8BE9AD2B90B219D12DE503BDB3ED58B66811E05DCA714B77756B837CFF
3,196,008 UART: [art] PUB.Y = AC1D9220776B068CCAA6F5D7FE5822C29EAFF820A6E55169D008F00DAE3E2A3A11F24F66DBA67CB17438DA5F5A9586AF
3,202,967 UART: [art] SIG.R = 83AC336415DD7F8880EE4AA4D216FAA8D4FE53F9CE7FDBA898B8602A1282A0E98250928541E9C637D8B67BD252206D4B
3,209,745 UART: [art] SIG.S = 01EB60B4DF5E12DEC15A939EB07FBF1436CBA6B2681109C0D1324A1FBC24B336DFCF52D4E5B4EC470136DCD5C64361AC
3,233,846 UART: Caliptra RT
3,234,189 UART: [state] CFI Enabled
3,354,671 UART: [rt] RT listening for mailbox commands...
3,355,341 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,041 UART: [rt]cmd =0x49444550, len=8
3,386,800 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,626 ready_for_fw is high
1,060,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,123 >>> mbox cmd response: success
2,740,246 UART:
2,740,262 UART: Running Caliptra FMC ...
2,740,670 UART:
2,740,813 UART: [state] CFI Enabled
2,751,323 UART: [fht] FMC Alias Private Key: 7
2,870,755 UART: [art] Extend RT PCRs Done
2,871,183 UART: [art] Lock RT PCRs Done
2,872,809 UART: [art] Populate DV Done
2,880,922 UART: [fht] FMC Alias Private Key: 7
2,881,988 UART: [art] Derive CDI
2,882,268 UART: [art] Store in slot 0x4
2,968,017 UART: [art] Derive Key Pair
2,968,377 UART: [art] Store priv key in slot 0x5
2,981,621 UART: [art] Derive Key Pair - Done
2,996,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,847 UART: [art] PUB.X = 6A398365CB689ED1FD2BFCD5E783AE2DC3AF6F864EC3F55F43F2F7407AA82DEE0A40F53B34A9495ED70AD8399D1A1961
3,019,629 UART: [art] PUB.Y = 0D08B33CFFFEFC11816FBDA69B1436F52EB55D2CED61A6BCBC41B081D65FD471C08BDBF10572C58F6FE426DB8623B742
3,026,592 UART: [art] SIG.R = 25B3280CEACD1AC19D3AF2547579A8B475D0DFB3D77A6E4742E0805AACD972C9F15264920083D7A67CA4DE8412A37621
3,033,343 UART: [art] SIG.S = 44C6A244E3B8D9C1522863B2A9C01B5733B5CD6676CFF698DCAA9FE80172804AB228EDDEDBBBBB99B5BF6932979AB330
3,057,522 UART: Caliptra RT
3,057,865 UART: [state] CFI Enabled
3,177,674 UART: [rt] RT listening for mailbox commands...
3,178,344 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,344 UART: [rt]cmd =0x49444550, len=8
3,210,237 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,226 UART:
192,600 UART: Running Caliptra ROM ...
193,698 UART:
193,846 UART: [state] CFI Enabled
262,950 UART: [state] LifecycleState = Unprovisioned
264,891 UART: [state] DebugLocked = No
267,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,303 UART: [kat] SHA2-256
441,009 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,548 UART: [kat] ++
451,997 UART: [kat] sha1
464,003 UART: [kat] SHA2-256
466,735 UART: [kat] SHA2-384
472,439 UART: [kat] SHA2-512-ACC
474,804 UART: [kat] ECC-384
2,767,762 UART: [kat] HMAC-384Kdf
2,799,200 UART: [kat] LMS
3,989,501 UART: [kat] --
3,993,308 UART: [cold-reset] ++
3,995,596 UART: [fht] Storing FHT @ 0x50003400
4,007,218 UART: [idev] ++
4,007,794 UART: [idev] CDI.KEYID = 6
4,008,782 UART: [idev] SUBJECT.KEYID = 7
4,009,962 UART: [idev] UDS.KEYID = 0
4,011,071 ready_for_fw is high
4,011,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,458 UART: [idev] Erasing UDS.KEYID = 0
7,342,975 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,388 UART: [idev] --
7,369,168 UART: [ldev] ++
7,369,735 UART: [ldev] CDI.KEYID = 6
7,370,723 UART: [ldev] SUBJECT.KEYID = 5
7,371,933 UART: [ldev] AUTHORITY.KEYID = 7
7,373,159 UART: [ldev] FE.KEYID = 1
7,420,053 UART: [ldev] Erasing FE.KEYID = 1
10,751,781 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,944 UART: [ldev] --
13,114,129 UART: [fwproc] Waiting for Commands...
13,116,494 UART: [fwproc] Received command 0x46574c44
13,118,672 UART: [fwproc] Received Image of size 118548 bytes
17,221,699 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,747 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,373,918 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,702,090 >>> mbox cmd response: success
17,706,678 UART: [afmc] ++
17,707,316 UART: [afmc] CDI.KEYID = 6
17,708,237 UART: [afmc] SUBJECT.KEYID = 7
17,709,403 UART: [afmc] AUTHORITY.KEYID = 5
21,067,752 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,106 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,371 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,384,826 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,544 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,413,978 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,007 UART: [afmc] --
23,439,176 UART: [cold-reset] --
23,443,685 UART: [state] Locking Datavault
23,450,286 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,040 UART: [state] Locking ICCM
23,453,189 UART: [exit] Launching FMC @ 0x40000130
23,461,591 UART:
23,461,833 UART: Running Caliptra FMC ...
23,462,931 UART:
23,463,093 UART: [state] CFI Enabled
23,528,286 UART: [fht] FMC Alias Private Key: 7
25,869,254 UART: [art] Extend RT PCRs Done
25,870,486 UART: [art] Lock RT PCRs Done
25,872,083 UART: [art] Populate DV Done
25,877,346 UART: [fht] FMC Alias Private Key: 7
25,878,884 UART: [art] Derive CDI
25,879,619 UART: [art] Store in slot 0x4
25,936,648 UART: [art] Derive Key Pair
25,937,644 UART: [art] Store priv key in slot 0x5
29,230,555 UART: [art] Derive Key Pair - Done
29,243,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,121 UART: [art] Erasing AUTHORITY.KEYID = 7
31,533,628 UART: [art] PUB.X = 7A6419A56ED6869B209908B09E77689FF05A4412F8AEE6A1AD9A3AFE26DCD079BD08F03F2A5A61E2C8A04526789727AD
31,540,891 UART: [art] PUB.Y = C7313828CC363196D047C2C7E29ED06B22F9C3FF95579ABA5BB540F1CCDBEE72A013DB7D55DA9E94228B69DC5EA4BBE8
31,548,172 UART: [art] SIG.R = 040976F31CCA7F623605766AABA266301D4CAEEDF04F4DEAECFA330DC282864DD65E125E9C134FE660589780AF604DAF
31,555,597 UART: [art] SIG.S = 282DEC6325F1D74F0B86FF688D5E20D2690875A54AC73AC4338C66DE4AD92C67FBDC430BAF09238FB273A715587B0C7C
32,860,630 UART: Caliptra RT
32,861,343 UART: [state] CFI Enabled
33,039,205 UART: [rt] RT listening for mailbox commands...
33,041,104 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,071,406 UART: [rt]cmd =0x52564348, len=36
33,073,250 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,804,617 ready_for_fw is high
3,805,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,982,839 >>> mbox cmd response: success
23,672,050 UART:
23,672,592 UART: Running Caliptra FMC ...
23,673,715 UART:
23,673,873 UART: [state] CFI Enabled
23,740,059 UART: [fht] FMC Alias Private Key: 7
26,080,385 UART: [art] Extend RT PCRs Done
26,081,607 UART: [art] Lock RT PCRs Done
26,083,267 UART: [art] Populate DV Done
26,088,634 UART: [fht] FMC Alias Private Key: 7
26,090,120 UART: [art] Derive CDI
26,090,857 UART: [art] Store in slot 0x4
26,148,279 UART: [art] Derive Key Pair
26,149,319 UART: [art] Store priv key in slot 0x5
29,441,980 UART: [art] Derive Key Pair - Done
29,455,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,967 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,483 UART: [art] PUB.X = 8104A1B7C0F0CD0D77FB0AC156B6B833405C76E573C38BE13600DDB6B8DD2C79DBB3A26948E2FCCC77AB2B22777C4073
31,752,773 UART: [art] PUB.Y = BEEDAA43F3F0DF9E2FE966645B6C6ABA7A4A9381999B68D5E46C3173D2376DCCA631A8802B65EAACE048BDEA635ADB38
31,760,039 UART: [art] SIG.R = D06E5B81B829CD972527B6E13278997FE83E2B440DAEDAB2526C00F9C3415D712D5B1A9A44FC78B0A5CB7673BE53D958
31,767,458 UART: [art] SIG.S = 32D75F3ECE12D98EF1191395624C17A4BE1FB271C52054245277E463645976751BF0B132F8D12F87B473BDD9A866C729
33,072,293 UART: Caliptra RT
33,073,014 UART: [state] CFI Enabled
33,249,915 UART: [rt] RT listening for mailbox commands...
33,251,810 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,281,998 UART: [rt]cmd =0x52564348, len=36
33,283,756 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,424 writing to cptra_bootfsm_go
193,605 UART:
193,964 UART: Running Caliptra ROM ...
195,158 UART:
604,842 UART: [state] CFI Enabled
620,082 UART: [state] LifecycleState = Unprovisioned
622,036 UART: [state] DebugLocked = No
623,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,421 UART: [kat] SHA2-256
798,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,660 UART: [kat] ++
809,136 UART: [kat] sha1
819,870 UART: [kat] SHA2-256
822,590 UART: [kat] SHA2-384
827,293 UART: [kat] SHA2-512-ACC
829,724 UART: [kat] ECC-384
3,113,367 UART: [kat] HMAC-384Kdf
3,125,248 UART: [kat] LMS
4,315,412 UART: [kat] --
4,321,336 UART: [cold-reset] ++
4,323,735 UART: [fht] Storing FHT @ 0x50003400
4,334,328 UART: [idev] ++
4,334,893 UART: [idev] CDI.KEYID = 6
4,335,841 UART: [idev] SUBJECT.KEYID = 7
4,337,077 UART: [idev] UDS.KEYID = 0
4,338,067 ready_for_fw is high
4,338,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,195 UART: [idev] Erasing UDS.KEYID = 0
7,624,311 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,775 UART: [idev] --
7,648,820 UART: [ldev] ++
7,649,386 UART: [ldev] CDI.KEYID = 6
7,650,321 UART: [ldev] SUBJECT.KEYID = 5
7,651,579 UART: [ldev] AUTHORITY.KEYID = 7
7,652,720 UART: [ldev] FE.KEYID = 1
7,664,946 UART: [ldev] Erasing FE.KEYID = 1
10,949,435 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,107 UART: [ldev] --
13,307,663 UART: [fwproc] Waiting for Commands...
13,309,529 UART: [fwproc] Received command 0x46574c44
13,311,759 UART: [fwproc] Received Image of size 118548 bytes
17,422,482 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,796 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,988 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,459 >>> mbox cmd response: success
17,904,358 UART: [afmc] ++
17,904,941 UART: [afmc] CDI.KEYID = 6
17,905,873 UART: [afmc] SUBJECT.KEYID = 7
17,907,153 UART: [afmc] AUTHORITY.KEYID = 5
21,222,048 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,540 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,789 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,270 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,971 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,382 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,883 UART: [afmc] --
23,591,441 UART: [cold-reset] --
23,595,461 UART: [state] Locking Datavault
23,599,671 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,410 UART: [state] Locking ICCM
23,603,922 UART: [exit] Launching FMC @ 0x40000130
23,612,304 UART:
23,612,541 UART: Running Caliptra FMC ...
23,613,631 UART:
23,613,804 UART: [state] CFI Enabled
23,621,518 UART: [fht] FMC Alias Private Key: 7
25,961,649 UART: [art] Extend RT PCRs Done
25,962,867 UART: [art] Lock RT PCRs Done
25,964,420 UART: [art] Populate DV Done
25,969,931 UART: [fht] FMC Alias Private Key: 7
25,971,511 UART: [art] Derive CDI
25,972,241 UART: [art] Store in slot 0x4
26,014,670 UART: [art] Derive Key Pair
26,015,712 UART: [art] Store priv key in slot 0x5
29,258,254 UART: [art] Derive Key Pair - Done
29,270,929 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,539 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,048 UART: [art] PUB.X = 3EC7EE87B4694FA64445C0D7564F49C91ECAA6DA75A1F23F3D0EC609D9FAF31BF1C6E9B4D5E4E02F15F683166C8DE4DE
31,560,308 UART: [art] PUB.Y = 67E62790310F4E6D5E76495D42AD7C65F80CE11A2773E5FF3321F886BE3F2D57D59F96C5F87CB0B64DE1E88D59154D61
31,567,591 UART: [art] SIG.R = 984A9A3DF30701CED6BE144A8701B16043E20C6C1C9844DCCAA7935C5794570F2EE5B0F3B532677985C1DC5EE32CD64C
31,574,949 UART: [art] SIG.S = 19C70F2E848C7B0D90711BECE9EF88C65D633B22C343B0C64AF061DDC6099628CBCEE0DDAF3245FFFD4222878B208869
32,880,352 UART: Caliptra RT
32,881,062 UART: [state] CFI Enabled
33,014,337 UART: [rt] RT listening for mailbox commands...
33,016,214 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,046,137 UART: [rt]cmd =0x52564348, len=36
33,047,988 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
4,127,343 ready_for_fw is high
4,127,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,152,989 >>> mbox cmd response: success
23,798,409 UART:
23,798,950 UART: Running Caliptra FMC ...
23,800,080 UART:
23,800,244 UART: [state] CFI Enabled
23,808,499 UART: [fht] FMC Alias Private Key: 7
26,148,192 UART: [art] Extend RT PCRs Done
26,149,423 UART: [art] Lock RT PCRs Done
26,151,156 UART: [art] Populate DV Done
26,156,558 UART: [fht] FMC Alias Private Key: 7
26,158,212 UART: [art] Derive CDI
26,159,027 UART: [art] Store in slot 0x4
26,201,780 UART: [art] Derive Key Pair
26,202,777 UART: [art] Store priv key in slot 0x5
29,444,574 UART: [art] Derive Key Pair - Done
29,457,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,212 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,726 UART: [art] PUB.X = 62690705440EB4BD86DEB2BD5C3FFDD607759CE9A4E122A6B97D218BD9E9DF51D74DE2E4B2899D544EC3F6BB7D5D5485
31,746,972 UART: [art] PUB.Y = 13294166AA4BF158A32570AC56A7D444372BCA497DEED046DA4F077573C61DB38323E7C8CADB11C90D47FD1D721C6B18
31,754,244 UART: [art] SIG.R = 31088226A5933ED23802336417B3E5633364AF59D397EE642E69924C60D58F5E91B1011626838670B502AF0AA878B641
31,761,593 UART: [art] SIG.S = B6983E1EBFC6F9E890AAC21377ECA88A88AEF33A27411657A55C2E32AF5595E62B94EC968BC6CFB282EDE6C5AD2802BE
33,067,226 UART: Caliptra RT
33,067,928 UART: [state] CFI Enabled
33,201,203 UART: [rt] RT listening for mailbox commands...
33,203,089 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,232,856 UART: [rt]cmd =0x52564348, len=36
33,234,551 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,381 UART:
192,741 UART: Running Caliptra ROM ...
193,913 UART:
194,060 UART: [state] CFI Enabled
265,499 UART: [state] LifecycleState = Unprovisioned
267,497 UART: [state] DebugLocked = No
269,806 UART: [state] WD Timer not started. Device not locked for debugging
274,129 UART: [kat] SHA2-256
453,777 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,589 UART: [kat] ++
465,074 UART: [kat] sha1
475,953 UART: [kat] SHA2-256
478,708 UART: [kat] SHA2-384
483,902 UART: [kat] SHA2-512-ACC
486,271 UART: [kat] ECC-384
2,948,848 UART: [kat] HMAC-384Kdf
2,972,514 UART: [kat] LMS
3,448,981 UART: [kat] --
3,452,405 UART: [cold-reset] ++
3,454,246 UART: [fht] FHT @ 0x50003400
3,465,085 UART: [idev] ++
3,465,721 UART: [idev] CDI.KEYID = 6
3,466,601 UART: [idev] SUBJECT.KEYID = 7
3,467,912 UART: [idev] UDS.KEYID = 0
3,468,804 ready_for_fw is high
3,468,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,405 UART: [idev] Erasing UDS.KEYID = 0
5,987,795 UART: [idev] Sha1 KeyId Algorithm
6,011,551 UART: [idev] --
6,015,649 UART: [ldev] ++
6,016,233 UART: [ldev] CDI.KEYID = 6
6,017,115 UART: [ldev] SUBJECT.KEYID = 5
6,018,330 UART: [ldev] AUTHORITY.KEYID = 7
6,019,617 UART: [ldev] FE.KEYID = 1
6,059,018 UART: [ldev] Erasing FE.KEYID = 1
8,568,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,945 UART: [ldev] --
10,377,902 UART: [fwproc] Wait for Commands...
10,380,417 UART: [fwproc] Recv command 0x46574c44
10,382,449 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,249 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,286 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,494 >>> mbox cmd response: success
14,348,488 UART: [afmc] ++
14,349,102 UART: [afmc] CDI.KEYID = 6
14,349,983 UART: [afmc] SUBJECT.KEYID = 7
14,351,199 UART: [afmc] AUTHORITY.KEYID = 5
16,893,579 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,745 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,580 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,649,606 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,175 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,227 UART: [afmc] --
18,694,903 UART: [cold-reset] --
18,697,732 UART: [state] Locking Datavault
18,700,672 UART: [state] Locking PCR0, PCR1 and PCR31
18,702,423 UART: [state] Locking ICCM
18,705,162 UART: [exit] Launching FMC @ 0x40000130
18,713,607 UART:
18,713,848 UART: Running Caliptra FMC ...
18,714,947 UART:
18,715,101 UART: [state] CFI Enabled
18,772,809 UART: [fht] FMC Alias Private Key: 7
20,539,311 UART: [art] Extend RT PCRs Done
20,540,528 UART: [art] Lock RT PCRs Done
20,542,121 UART: [art] Populate DV Done
20,547,421 UART: [fht] FMC Alias Private Key: 7
20,549,010 UART: [art] Derive CDI
20,549,751 UART: [art] Store in slot 0x4
20,605,271 UART: [art] Derive Key Pair
20,606,307 UART: [art] Store priv key in slot 0x5
23,068,918 UART: [art] Derive Key Pair - Done
23,081,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,794,566 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,068 UART: [art] PUB.X = 04BB28904A20AD045F1ABEFD9CC305739B665F83D65D1079CA98488001CD158CAA89586D2EC03FEB49F09980FD603385
24,803,349 UART: [art] PUB.Y = 58C43B88AB2721BF39650314DF756490B3ADE16AAF9086E2F4C22C76ADD988DA6634E1C315CF7A91019257C786CDDC6F
24,810,592 UART: [art] SIG.R = 7D1ED1033B904BB6E2AFB3C7FFE249AFBDA060515C4F3A7E667D88CA4E93CA7753CA0AA29AE4007ACFCF4202B13E2374
24,818,003 UART: [art] SIG.S = ED9515F095DDF9F5E24F8D0B1AF9D679A31841653D501E22C1DD5B05F289B8D4442AFCB871162F492733448432C3DD9C
25,796,974 UART: Caliptra RT
25,797,673 UART: [state] CFI Enabled
25,977,619 UART: [rt] RT listening for mailbox commands...
25,979,513 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,009,489 UART: [rt]cmd =0x52564348, len=36
26,011,446 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,459,448 ready_for_fw is high
3,460,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,097 >>> mbox cmd response: success
18,535,232 UART:
18,535,654 UART: Running Caliptra FMC ...
18,536,755 UART:
18,536,910 UART: [state] CFI Enabled
18,604,974 UART: [fht] FMC Alias Private Key: 7
20,371,424 UART: [art] Extend RT PCRs Done
20,372,656 UART: [art] Lock RT PCRs Done
20,373,996 UART: [art] Populate DV Done
20,379,365 UART: [fht] FMC Alias Private Key: 7
20,380,960 UART: [art] Derive CDI
20,381,770 UART: [art] Store in slot 0x4
20,437,733 UART: [art] Derive Key Pair
20,438,777 UART: [art] Store priv key in slot 0x5
22,901,515 UART: [art] Derive Key Pair - Done
22,914,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,070 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,983 UART: [art] PUB.X = F8217E3A74957C281D3DD834B3CFAD969EF34C713B98871B99416FC6F0AA7C15C7138F0FE8868B42BA92593EAF4282E2
24,636,892 UART: [art] PUB.Y = 4E8E260897A479F5FCC1B2083C93517C969B3DAF87D0EE1192FC6EC8EA58CB818C15A14E2F75587C22DA51CE27BEFF05
24,644,126 UART: [art] SIG.R = 4489DDE48C4F864277864167741DE98B4228780DC39C06C82F467EB7E784E54304BED978C5C0563306E7D71155474F2E
24,651,510 UART: [art] SIG.S = 3376BA0D8DEE00BE1446AB60164643D36F0C80FE07C1604C16A91C2C9B4F3CD11B287CA6C66F2139AA0E68463A4AA6DD
25,631,075 UART: Caliptra RT
25,631,785 UART: [state] CFI Enabled
25,811,191 UART: [rt] RT listening for mailbox commands...
25,813,097 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,843,366 UART: [rt]cmd =0x52564348, len=36
25,845,350 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,448 UART:
192,806 UART: Running Caliptra ROM ...
193,927 UART:
603,639 UART: [state] CFI Enabled
618,874 UART: [state] LifecycleState = Unprovisioned
620,828 UART: [state] DebugLocked = No
623,088 UART: [state] WD Timer not started. Device not locked for debugging
627,204 UART: [kat] SHA2-256
806,894 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,661 UART: [kat] ++
818,111 UART: [kat] sha1
828,844 UART: [kat] SHA2-256
831,573 UART: [kat] SHA2-384
837,392 UART: [kat] SHA2-512-ACC
839,804 UART: [kat] ECC-384
3,284,608 UART: [kat] HMAC-384Kdf
3,297,413 UART: [kat] LMS
3,773,870 UART: [kat] --
3,777,009 UART: [cold-reset] ++
3,778,521 UART: [fht] FHT @ 0x50003400
3,790,638 UART: [idev] ++
3,791,202 UART: [idev] CDI.KEYID = 6
3,792,253 UART: [idev] SUBJECT.KEYID = 7
3,793,359 UART: [idev] UDS.KEYID = 0
3,794,575 ready_for_fw is high
3,794,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,526 UART: [idev] Erasing UDS.KEYID = 0
6,273,079 UART: [idev] Sha1 KeyId Algorithm
6,296,620 UART: [idev] --
6,301,608 UART: [ldev] ++
6,302,182 UART: [ldev] CDI.KEYID = 6
6,303,197 UART: [ldev] SUBJECT.KEYID = 5
6,304,304 UART: [ldev] AUTHORITY.KEYID = 7
6,305,593 UART: [ldev] FE.KEYID = 1
6,317,918 UART: [ldev] Erasing FE.KEYID = 1
8,796,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,017 UART: [ldev] --
10,589,663 UART: [fwproc] Wait for Commands...
10,592,186 UART: [fwproc] Recv command 0x46574c44
10,594,170 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,115 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,117 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,008 >>> mbox cmd response: success
14,562,072 UART: [afmc] ++
14,562,686 UART: [afmc] CDI.KEYID = 6
14,563,604 UART: [afmc] SUBJECT.KEYID = 7
14,564,827 UART: [afmc] AUTHORITY.KEYID = 5
17,066,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,858 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,678 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,754 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,323 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,312 UART: [afmc] --
18,867,775 UART: [cold-reset] --
18,870,398 UART: [state] Locking Datavault
18,877,214 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,972 UART: [state] Locking ICCM
18,881,502 UART: [exit] Launching FMC @ 0x40000130
18,889,955 UART:
18,890,191 UART: Running Caliptra FMC ...
18,891,293 UART:
18,891,451 UART: [state] CFI Enabled
18,899,936 UART: [fht] FMC Alias Private Key: 7
20,666,409 UART: [art] Extend RT PCRs Done
20,667,653 UART: [art] Lock RT PCRs Done
20,669,232 UART: [art] Populate DV Done
20,674,755 UART: [fht] FMC Alias Private Key: 7
20,676,279 UART: [art] Derive CDI
20,677,050 UART: [art] Store in slot 0x4
20,719,761 UART: [art] Derive Key Pair
20,720,770 UART: [art] Store priv key in slot 0x5
23,147,357 UART: [art] Derive Key Pair - Done
23,160,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,434 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,930 UART: [art] PUB.X = AA42484211CB14458634E09CF98754DE038BB662358672F5F30E4AA6B69FF349F7B76AD6448513E0D7734C78F53069CC
24,875,233 UART: [art] PUB.Y = 558E9F297889D479E8C0FFB28FD31166F15133F283F9EA6F8B12DABEA171373A796038892C5D159ACE25DD29E20D80C0
24,882,458 UART: [art] SIG.R = EE56473EB25DD385765081892C100A77378BB21EE59D6F2A487F2A93E3E917DD9D3D78512151410F8CAB373CCB3CA5AC
24,889,848 UART: [art] SIG.S = 5A695E3B17FC7FE55CD2998100F284E9311951D7F32137173735AA8A799605F5640E385FD5B6B5CD12C7658E7D992F08
25,869,180 UART: Caliptra RT
25,869,887 UART: [state] CFI Enabled
26,003,141 UART: [rt] RT listening for mailbox commands...
26,005,058 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,035,277 UART: [rt]cmd =0x52564348, len=36
26,037,147 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,782,421 ready_for_fw is high
3,783,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,569 >>> mbox cmd response: success
18,700,422 UART:
18,700,810 UART: Running Caliptra FMC ...
18,701,912 UART:
18,702,068 UART: [state] CFI Enabled
18,710,281 UART: [fht] FMC Alias Private Key: 7
20,475,957 UART: [art] Extend RT PCRs Done
20,477,178 UART: [art] Lock RT PCRs Done
20,479,107 UART: [art] Populate DV Done
20,484,262 UART: [fht] FMC Alias Private Key: 7
20,485,858 UART: [art] Derive CDI
20,486,675 UART: [art] Store in slot 0x4
20,529,453 UART: [art] Derive Key Pair
20,530,459 UART: [art] Store priv key in slot 0x5
22,957,046 UART: [art] Derive Key Pair - Done
22,969,780 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,718 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,218 UART: [art] PUB.X = 341229B868B06E622CF1A2D80F438C360C36E592D07CE11FE687B0CF6930E3D71880A28C5195903078DBF207DD734D87
24,685,437 UART: [art] PUB.Y = 42AE56719AAAC281664062022849387DF3F19475D11487F670D601AE743F0CCF558884EDD8F40DFAE1E22064E2EC6F6F
24,692,729 UART: [art] SIG.R = 69187D608EE2F1F36FAEDBA088628B6BC6BBBA09B599DCA7681587BFA1B24032F6AF8CBBB6E077BF1FE1AE95C2AE5F46
24,700,141 UART: [art] SIG.S = DAA7DD8D6A90EBA2C98CD2D31BA41EFF852028110BCD0E504EA41E417343982357CB6995EC6E94C85658787E693A8F6E
25,679,074 UART: Caliptra RT
25,679,786 UART: [state] CFI Enabled
25,811,921 UART: [rt] RT listening for mailbox commands...
25,813,954 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,843,924 UART: [rt]cmd =0x52564348, len=36
25,846,015 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,121 UART:
192,483 UART: Running Caliptra ROM ...
193,669 UART:
193,827 UART: [state] CFI Enabled
265,638 UART: [state] LifecycleState = Unprovisioned
268,041 UART: [state] DebugLocked = No
269,223 UART: [state] WD Timer not started. Device not locked for debugging
272,536 UART: [kat] SHA2-256
462,405 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,181 UART: [kat] ++
473,671 UART: [kat] sha1
484,117 UART: [kat] SHA2-256
487,120 UART: [kat] SHA2-384
493,254 UART: [kat] SHA2-512-ACC
495,833 UART: [kat] ECC-384
2,946,536 UART: [kat] HMAC-384Kdf
2,970,277 UART: [kat] LMS
3,502,002 UART: [kat] --
3,507,280 UART: [cold-reset] ++
3,509,850 UART: [fht] FHT @ 0x50003400
3,520,320 UART: [idev] ++
3,521,019 UART: [idev] CDI.KEYID = 6
3,521,901 UART: [idev] SUBJECT.KEYID = 7
3,523,084 UART: [idev] UDS.KEYID = 0
3,524,085 ready_for_fw is high
3,524,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,291 UART: [idev] Erasing UDS.KEYID = 0
6,030,794 UART: [idev] Sha1 KeyId Algorithm
6,053,655 UART: [idev] --
6,057,220 UART: [ldev] ++
6,057,898 UART: [ldev] CDI.KEYID = 6
6,058,811 UART: [ldev] SUBJECT.KEYID = 5
6,060,037 UART: [ldev] AUTHORITY.KEYID = 7
6,061,143 UART: [ldev] FE.KEYID = 1
6,099,778 UART: [ldev] Erasing FE.KEYID = 1
8,603,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,690 UART: [ldev] --
10,411,062 UART: [fwproc] Wait for Commands...
10,413,542 UART: [fwproc] Recv command 0x46574c44
10,415,799 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,868 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,478 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,854 >>> mbox cmd response: success
14,683,117 UART: [afmc] ++
14,683,842 UART: [afmc] CDI.KEYID = 6
14,685,036 UART: [afmc] SUBJECT.KEYID = 7
14,686,480 UART: [afmc] AUTHORITY.KEYID = 5
17,216,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,381 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,440 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,622 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,486 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,708 UART: [afmc] --
19,012,630 UART: [cold-reset] --
19,017,846 UART: [state] Locking Datavault
19,022,654 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,870 UART: [state] Locking ICCM
19,027,208 UART: [exit] Launching FMC @ 0x40000130
19,035,845 UART:
19,036,081 UART: Running Caliptra FMC ...
19,037,186 UART:
19,037,343 UART: [state] CFI Enabled
19,096,828 UART: [fht] FMC Alias Private Key: 7
20,884,125 UART: [art] Extend RT PCRs Done
20,885,337 UART: [art] Lock RT PCRs Done
20,886,986 UART: [art] Populate DV Done
20,892,403 UART: [fht] FMC Alias Private Key: 7
20,894,000 UART: [art] Derive CDI
20,894,744 UART: [art] Store in slot 0x4
20,950,810 UART: [art] Derive Key Pair
20,951,849 UART: [art] Store priv key in slot 0x5
23,413,998 UART: [art] Derive Key Pair - Done
23,426,934 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,750 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,661 UART: [art] PUB.X = 0540E817C8C0E7126E523B124C3AC8553FA03F73EDFB1B8D22040657A2A96F4B19E9240E4047BD96EB3206A508C9DD57
25,148,501 UART: [art] PUB.Y = A35A381277FA9CE1B874ADCBD15CB758D31B93629317110B72D2550555B5F17C581890DF4D93AD6CB067FC1910360A14
25,155,763 UART: [art] SIG.R = B9B4FBA0287B5219F0F9676B3CE544BEFD1BA717C4E1B4C317AAA9844C68997B43DBB9226149E17E29B8B2CD967B15AB
25,163,131 UART: [art] SIG.S = C8BE9A9ACD380C3A84BAFD64A497A22A7E576BD656FCE78B21CA2D774E0C41E3432AD397D2304CD7D549FDE1E7FF52F6
26,142,567 UART: Caliptra RT
26,143,290 UART: [state] CFI Enabled
26,322,839 UART: [rt] RT listening for mailbox commands...
26,324,723 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,354,744 UART: [rt]cmd =0x52564348, len=36
26,356,714 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,855 writing to cptra_bootfsm_go
3,440,711 ready_for_fw is high
3,441,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,828,269 >>> mbox cmd response: success
19,114,078 UART:
19,114,493 UART: Running Caliptra FMC ...
19,115,639 UART:
19,115,798 UART: [state] CFI Enabled
19,180,879 UART: [fht] FMC Alias Private Key: 7
20,946,765 UART: [art] Extend RT PCRs Done
20,947,972 UART: [art] Lock RT PCRs Done
20,949,582 UART: [art] Populate DV Done
20,954,837 UART: [fht] FMC Alias Private Key: 7
20,956,374 UART: [art] Derive CDI
20,957,107 UART: [art] Store in slot 0x4
21,013,606 UART: [art] Derive Key Pair
21,014,678 UART: [art] Store priv key in slot 0x5
23,477,372 UART: [art] Derive Key Pair - Done
23,490,480 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,471 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,975 UART: [art] PUB.X = F8771A21F8041F64EC05A106A311DED0E463C5CF2D1F99CEFD72BF8D037C833B26EF04349B469E95816B9C60F0D00ED0
25,212,302 UART: [art] PUB.Y = ABB044962BC54A7185EA8EF16D9CB292156F9000382EE23F3DC52AE9EBAC11AA1C82D7AE042BC036F695210466595749
25,219,522 UART: [art] SIG.R = 189F9D711600B7377059B01192EC76151714096466E360537EB4B67C879F9F482D220894D7C59B96DB4FAA7D7603B238
25,226,835 UART: [art] SIG.S = E514ED8D506419005362475361BF0F7C04A27FC0E8A734226C44D2DFB94D2C0FB21071CA76487654664FB85734D8483D
26,205,684 UART: Caliptra RT
26,206,376 UART: [state] CFI Enabled
26,385,851 UART: [rt] RT listening for mailbox commands...
26,387,734 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,417,660 UART: [rt]cmd =0x52564348, len=36
26,419,613 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,388 UART:
192,756 UART: Running Caliptra ROM ...
193,904 UART:
603,594 UART: [state] CFI Enabled
618,904 UART: [state] LifecycleState = Unprovisioned
621,236 UART: [state] DebugLocked = No
623,965 UART: [state] WD Timer not started. Device not locked for debugging
629,079 UART: [kat] SHA2-256
818,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,708 UART: [kat] ++
830,236 UART: [kat] sha1
841,965 UART: [kat] SHA2-256
844,974 UART: [kat] SHA2-384
850,755 UART: [kat] SHA2-512-ACC
853,346 UART: [kat] ECC-384
3,296,895 UART: [kat] HMAC-384Kdf
3,309,716 UART: [kat] LMS
3,841,534 UART: [kat] --
3,844,184 UART: [cold-reset] ++
3,845,479 UART: [fht] FHT @ 0x50003400
3,857,748 UART: [idev] ++
3,858,479 UART: [idev] CDI.KEYID = 6
3,859,514 UART: [idev] SUBJECT.KEYID = 7
3,860,623 UART: [idev] UDS.KEYID = 0
3,861,551 ready_for_fw is high
3,861,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,591 UART: [idev] Erasing UDS.KEYID = 0
6,338,983 UART: [idev] Sha1 KeyId Algorithm
6,360,545 UART: [idev] --
6,366,597 UART: [ldev] ++
6,367,339 UART: [ldev] CDI.KEYID = 6
6,368,250 UART: [ldev] SUBJECT.KEYID = 5
6,369,411 UART: [ldev] AUTHORITY.KEYID = 7
6,370,592 UART: [ldev] FE.KEYID = 1
6,382,862 UART: [ldev] Erasing FE.KEYID = 1
8,864,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,610 UART: [ldev] --
10,656,307 UART: [fwproc] Wait for Commands...
10,657,861 UART: [fwproc] Recv command 0x46574c44
10,660,120 UART: [fwproc] Recv'd Img size: 118548 bytes
14,164,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,242,357 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,365,956 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,925,374 >>> mbox cmd response: success
14,928,658 UART: [afmc] ++
14,929,384 UART: [afmc] CDI.KEYID = 6
14,930,584 UART: [afmc] SUBJECT.KEYID = 7
14,932,032 UART: [afmc] AUTHORITY.KEYID = 5
17,438,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,160,701 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,162,658 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,177,752 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,192,917 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,207,801 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,230,966 UART: [afmc] --
19,233,968 UART: [cold-reset] --
19,238,493 UART: [state] Locking Datavault
19,244,082 UART: [state] Locking PCR0, PCR1 and PCR31
19,246,249 UART: [state] Locking ICCM
19,248,279 UART: [exit] Launching FMC @ 0x40000130
19,256,915 UART:
19,257,148 UART: Running Caliptra FMC ...
19,258,178 UART:
19,258,330 UART: [state] CFI Enabled
19,266,866 UART: [fht] FMC Alias Private Key: 7
21,032,808 UART: [art] Extend RT PCRs Done
21,034,034 UART: [art] Lock RT PCRs Done
21,035,671 UART: [art] Populate DV Done
21,041,037 UART: [fht] FMC Alias Private Key: 7
21,042,636 UART: [art] Derive CDI
21,043,455 UART: [art] Store in slot 0x4
21,086,053 UART: [art] Derive Key Pair
21,087,060 UART: [art] Store priv key in slot 0x5
23,513,741 UART: [art] Derive Key Pair - Done
23,526,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,233,151 UART: [art] Erasing AUTHORITY.KEYID = 7
25,234,670 UART: [art] PUB.X = C85106EC8EB34D38D440BC4D59DB1A9413253B42CCED5EC75C2C81183A2CB7D3BD453331D257C3DC8F977E51FCC5A5C6
25,242,002 UART: [art] PUB.Y = 1C470E4EEC7C7DEDA170EF0C5E543A4743AEF38D20F8F668A691B8DABB32BAB18C0F542C216FC151DDD9A45152D92393
25,249,267 UART: [art] SIG.R = DA3D189D09076986E3E17F85024A098321A66018478BDACDB8C2730D4793270AC9D20A17E76252C43F28F23D343803DA
25,256,642 UART: [art] SIG.S = 1243F6BDDF97A919647B78E15BBA306551E28A946B2241CDE5738FDB20783C947FFC876F129C006773EA397A53119C03
26,235,126 UART: Caliptra RT
26,235,858 UART: [state] CFI Enabled
26,368,957 UART: [rt] RT listening for mailbox commands...
26,370,852 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,400,831 UART: [rt]cmd =0x52564348, len=36
26,402,786 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,515 writing to cptra_bootfsm_go
3,757,966 ready_for_fw is high
3,758,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,052,247 >>> mbox cmd response: success
19,313,240 UART:
19,313,634 UART: Running Caliptra FMC ...
19,314,774 UART:
19,314,947 UART: [state] CFI Enabled
19,322,956 UART: [fht] FMC Alias Private Key: 7
21,088,550 UART: [art] Extend RT PCRs Done
21,089,784 UART: [art] Lock RT PCRs Done
21,091,527 UART: [art] Populate DV Done
21,097,121 UART: [fht] FMC Alias Private Key: 7
21,098,780 UART: [art] Derive CDI
21,099,602 UART: [art] Store in slot 0x4
21,142,213 UART: [art] Derive Key Pair
21,143,260 UART: [art] Store priv key in slot 0x5
23,569,804 UART: [art] Derive Key Pair - Done
23,582,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,288,745 UART: [art] Erasing AUTHORITY.KEYID = 7
25,290,258 UART: [art] PUB.X = 76DEED99B7668246EF26838243E2DF667539B1070FE8D3F0CB20469E99B1F836B19F0FD6A9BCEF9D0D38373AA6597659
25,297,502 UART: [art] PUB.Y = 9C59236FF91A179B0F4D925FB7FE85907287734C92532D3355B06BBC052159AEE482323EE9401EF08AD8F21BD59A57A1
25,304,740 UART: [art] SIG.R = 65B661665B3F9C78885BEA7CE6A295888F39C3D2285F2F1778959F76D55252D5CBD34C1941F50183E70D5BEC8104C180
25,312,125 UART: [art] SIG.S = 4DB63F288DA5FC8037777E1AE3C26B8794D092B4FA0AC34148780F2C525551C9024E88D919047DD9EC160DF317916E31
26,290,386 UART: Caliptra RT
26,291,100 UART: [state] CFI Enabled
26,423,570 UART: [rt] RT listening for mailbox commands...
26,425,472 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,455,452 UART: [rt]cmd =0x52564348, len=36
26,457,323 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,989 UART: [kat] SHA2-256
881,920 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,035 UART: [kat] ++
886,187 UART: [kat] sha1
890,617 UART: [kat] SHA2-256
892,555 UART: [kat] SHA2-384
895,268 UART: [kat] SHA2-512-ACC
897,169 UART: [kat] ECC-384
902,970 UART: [kat] HMAC-384Kdf
907,616 UART: [kat] LMS
1,475,812 UART: [kat] --
1,476,609 UART: [cold-reset] ++
1,477,141 UART: [fht] Storing FHT @ 0x50003400
1,480,086 UART: [idev] ++
1,480,254 UART: [idev] CDI.KEYID = 6
1,480,614 UART: [idev] SUBJECT.KEYID = 7
1,481,038 UART: [idev] UDS.KEYID = 0
1,481,383 ready_for_fw is high
1,481,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,226 UART: [idev] Erasing UDS.KEYID = 0
1,505,948 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,674 UART: [idev] --
1,515,823 UART: [ldev] ++
1,515,991 UART: [ldev] CDI.KEYID = 6
1,516,354 UART: [ldev] SUBJECT.KEYID = 5
1,516,780 UART: [ldev] AUTHORITY.KEYID = 7
1,517,243 UART: [ldev] FE.KEYID = 1
1,522,423 UART: [ldev] Erasing FE.KEYID = 1
1,547,962 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,726 UART: [ldev] --
1,587,127 UART: [fwproc] Waiting for Commands...
1,587,904 UART: [fwproc] Received command 0x46574c44
1,588,695 UART: [fwproc] Received Image of size 118548 bytes
2,932,621 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,083 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,301 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,548 >>> mbox cmd response: success
3,131,652 UART: [afmc] ++
3,131,820 UART: [afmc] CDI.KEYID = 6
3,132,182 UART: [afmc] SUBJECT.KEYID = 7
3,132,607 UART: [afmc] AUTHORITY.KEYID = 5
3,167,520 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,582 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,362 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,071 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,954 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,637 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,515 UART: [afmc] --
3,210,437 UART: [cold-reset] --
3,211,419 UART: [state] Locking Datavault
3,212,466 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,070 UART: [state] Locking ICCM
3,213,744 UART: [exit] Launching FMC @ 0x40000130
3,219,074 UART:
3,219,090 UART: Running Caliptra FMC ...
3,219,498 UART:
3,219,552 UART: [state] CFI Enabled
3,229,912 UART: [fht] FMC Alias Private Key: 7
3,349,130 UART: [art] Extend RT PCRs Done
3,349,558 UART: [art] Lock RT PCRs Done
3,351,170 UART: [art] Populate DV Done
3,359,261 UART: [fht] FMC Alias Private Key: 7
3,360,265 UART: [art] Derive CDI
3,360,545 UART: [art] Store in slot 0x4
3,446,353 UART: [art] Derive Key Pair
3,446,713 UART: [art] Store priv key in slot 0x5
3,459,674 UART: [art] Derive Key Pair - Done
3,474,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,730 UART: [art] PUB.X = 5D61395A30F15233A9A782A9FA86D704A5E068E89D73B03DAB4E855B2851C2C212D0EACAC036C40CF3C4EE67427D654A
3,497,502 UART: [art] PUB.Y = 261FC36E56652941D90D1EC0FA7FAD556370806F2B884D54732E73F09A8E327B4A9C55D2C9C83D33B0B31CB56878B149
3,504,449 UART: [art] SIG.R = 0C60E9EAA362B1061ADED604A66617BAE6248BA22BB7A4B5E22D99378FC28CA14C33FCDAB37FF4332027B473C70845AC
3,511,221 UART: [art] SIG.S = FD2EE5B51551B6ADED89C05E27D11797A8FEF7E97AE576D04E5264E1E6244E6A77A30CD0B71E02492972195317282DB5
3,535,299 UART: Caliptra RT
3,535,550 UART: [state] CFI Enabled
3,656,519 UART: [rt] RT listening for mailbox commands...
3,657,189 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,341 UART: [rt]cmd =0x52564348, len=36
3,688,687 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,221 ready_for_fw is high
1,362,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,594 >>> mbox cmd response: success
3,043,633 UART:
3,043,649 UART: Running Caliptra FMC ...
3,044,057 UART:
3,044,111 UART: [state] CFI Enabled
3,054,251 UART: [fht] FMC Alias Private Key: 7
3,173,387 UART: [art] Extend RT PCRs Done
3,173,815 UART: [art] Lock RT PCRs Done
3,175,647 UART: [art] Populate DV Done
3,184,028 UART: [fht] FMC Alias Private Key: 7
3,185,184 UART: [art] Derive CDI
3,185,464 UART: [art] Store in slot 0x4
3,271,048 UART: [art] Derive Key Pair
3,271,408 UART: [art] Store priv key in slot 0x5
3,284,663 UART: [art] Derive Key Pair - Done
3,299,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,068 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,833 UART: [art] PUB.X = 1D6F75B7CD9C7CE9D01A305D885DA1617D81DC86F5013C7D81B483A4C53C6DDBB7E512CFC4F2399CD20686C0615E549F
3,322,609 UART: [art] PUB.Y = E1E81102C2104FB103AE26BB9F0F381913FAEE1A076F765E6A2B66A191C62FA471351893EE3A23EF6AA8EB9E587555F4
3,329,555 UART: [art] SIG.R = 0F2EAB52CB2E98412680B9812987AC2F1B011D7FD4BD691221C0BF7B5D71A9316EE322E45ED970C9F85AF9443C8BFE1D
3,336,331 UART: [art] SIG.S = 38FCFB2603DBD2C4469336B2FC65333CC579F560D2E79D25FD0FEA11999E2364B9B68768F311496BB2139C4E5C715707
3,360,526 UART: Caliptra RT
3,360,777 UART: [state] CFI Enabled
3,480,719 UART: [rt] RT listening for mailbox commands...
3,481,389 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,301 UART: [rt]cmd =0x52564348, len=36
3,512,679 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,302 UART: [kat] SHA2-256
882,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,348 UART: [kat] ++
886,500 UART: [kat] sha1
890,636 UART: [kat] SHA2-256
892,574 UART: [kat] SHA2-384
895,437 UART: [kat] SHA2-512-ACC
897,338 UART: [kat] ECC-384
902,793 UART: [kat] HMAC-384Kdf
907,605 UART: [kat] LMS
1,475,801 UART: [kat] --
1,476,750 UART: [cold-reset] ++
1,477,254 UART: [fht] Storing FHT @ 0x50003400
1,480,045 UART: [idev] ++
1,480,213 UART: [idev] CDI.KEYID = 6
1,480,573 UART: [idev] SUBJECT.KEYID = 7
1,480,997 UART: [idev] UDS.KEYID = 0
1,481,342 ready_for_fw is high
1,481,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,933 UART: [idev] Erasing UDS.KEYID = 0
1,505,411 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,105 UART: [idev] --
1,515,098 UART: [ldev] ++
1,515,266 UART: [ldev] CDI.KEYID = 6
1,515,629 UART: [ldev] SUBJECT.KEYID = 5
1,516,055 UART: [ldev] AUTHORITY.KEYID = 7
1,516,518 UART: [ldev] FE.KEYID = 1
1,521,682 UART: [ldev] Erasing FE.KEYID = 1
1,547,639 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,615 UART: [ldev] --
1,587,086 UART: [fwproc] Waiting for Commands...
1,587,785 UART: [fwproc] Received command 0x46574c44
1,588,576 UART: [fwproc] Received Image of size 118548 bytes
2,933,304 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,562 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,035 >>> mbox cmd response: success
3,133,067 UART: [afmc] ++
3,133,235 UART: [afmc] CDI.KEYID = 6
3,133,597 UART: [afmc] SUBJECT.KEYID = 7
3,134,022 UART: [afmc] AUTHORITY.KEYID = 5
3,169,337 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,515 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,295 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,004 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,887 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,570 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,368 UART: [afmc] --
3,212,476 UART: [cold-reset] --
3,213,330 UART: [state] Locking Datavault
3,214,613 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,217 UART: [state] Locking ICCM
3,215,647 UART: [exit] Launching FMC @ 0x40000130
3,220,977 UART:
3,220,993 UART: Running Caliptra FMC ...
3,221,401 UART:
3,221,544 UART: [state] CFI Enabled
3,232,316 UART: [fht] FMC Alias Private Key: 7
3,351,192 UART: [art] Extend RT PCRs Done
3,351,620 UART: [art] Lock RT PCRs Done
3,353,588 UART: [art] Populate DV Done
3,361,623 UART: [fht] FMC Alias Private Key: 7
3,362,771 UART: [art] Derive CDI
3,363,051 UART: [art] Store in slot 0x4
3,449,043 UART: [art] Derive Key Pair
3,449,403 UART: [art] Store priv key in slot 0x5
3,463,674 UART: [art] Derive Key Pair - Done
3,478,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,726 UART: [art] PUB.X = AC34936BCC78EA6BB5F8D4416BCC950910FDC9F0E23EE500A08E8A5F1AD3408B1EDEAB37401739A996D9FB9CD718A5CC
3,501,493 UART: [art] PUB.Y = D48D61E4A07D80ACF567C2EDD0C36C299D2B2FB96444B1C5235ABC5F52B05A5D48FD1F2A23478FA9D842A5FEB83E0139
3,508,456 UART: [art] SIG.R = 64E8CFFAD7325F361BEED80710AD6D8A3B8718CBABEAD973FBB7458490D4767CCDDF02CCEEB60BD741FD355B6898E07C
3,515,243 UART: [art] SIG.S = BE51CAFACBA407C435F3F41E4EE78D58F86C3A5BE2FC96D6FA7AAC4223AF928F2B5D36F96483519823C144C5C3F6542C
3,538,618 UART: Caliptra RT
3,538,961 UART: [state] CFI Enabled
3,659,358 UART: [rt] RT listening for mailbox commands...
3,660,028 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,066 UART: [rt]cmd =0x52564348, len=36
3,691,318 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,032 ready_for_fw is high
1,363,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,363 >>> mbox cmd response: success
3,044,046 UART:
3,044,062 UART: Running Caliptra FMC ...
3,044,470 UART:
3,044,613 UART: [state] CFI Enabled
3,054,729 UART: [fht] FMC Alias Private Key: 7
3,173,859 UART: [art] Extend RT PCRs Done
3,174,287 UART: [art] Lock RT PCRs Done
3,176,199 UART: [art] Populate DV Done
3,184,284 UART: [fht] FMC Alias Private Key: 7
3,185,410 UART: [art] Derive CDI
3,185,690 UART: [art] Store in slot 0x4
3,271,450 UART: [art] Derive Key Pair
3,271,810 UART: [art] Store priv key in slot 0x5
3,285,361 UART: [art] Derive Key Pair - Done
3,299,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,309 UART: [art] PUB.X = D48B5FE9C252101A5773984567DC589642AD7CE1F5FAEB10A375B9F56EF29829E4F0C733145B9EFF8F5FAC13879885AF
3,323,087 UART: [art] PUB.Y = A4F3901F5A7CD226CE6907E2070E720E3B8E64E462071135D019D15F0AF20F9BAB25816DA3BF309EBD8C7641A4B288A7
3,330,022 UART: [art] SIG.R = 4310FBF336F9A1F283B72A7A3192245937505C3788100A81C8221124F3B93C0B8FD34D4901DBE548E42DA00F2BF9AD7E
3,336,780 UART: [art] SIG.S = 1E36A0329BAA10CBA3249B7A93F3AE2C44322C8065B60F3E606ECA17DEEC2079E482254E48635FC304F6DFF90F4A74D5
3,360,905 UART: Caliptra RT
3,361,248 UART: [state] CFI Enabled
3,480,478 UART: [rt] RT listening for mailbox commands...
3,481,148 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,202 UART: [rt]cmd =0x52564348, len=36
3,512,698 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
891,372 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
900,020 UART: [kat] SHA2-256
901,960 UART: [kat] SHA2-384
904,801 UART: [kat] SHA2-512-ACC
906,702 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
921,189 UART: [kat] LMS
1,169,501 UART: [kat] --
1,170,376 UART: [cold-reset] ++
1,170,756 UART: [fht] FHT @ 0x50003400
1,173,414 UART: [idev] ++
1,173,582 UART: [idev] CDI.KEYID = 6
1,173,943 UART: [idev] SUBJECT.KEYID = 7
1,174,368 UART: [idev] UDS.KEYID = 0
1,174,714 ready_for_fw is high
1,174,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,331 UART: [idev] Erasing UDS.KEYID = 0
1,199,563 UART: [idev] Sha1 KeyId Algorithm
1,208,423 UART: [idev] --
1,209,364 UART: [ldev] ++
1,209,532 UART: [ldev] CDI.KEYID = 6
1,209,896 UART: [ldev] SUBJECT.KEYID = 5
1,210,323 UART: [ldev] AUTHORITY.KEYID = 7
1,210,786 UART: [ldev] FE.KEYID = 1
1,215,938 UART: [ldev] Erasing FE.KEYID = 1
1,242,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,778 UART: [ldev] --
1,281,211 UART: [fwproc] Wait for Commands...
1,281,876 UART: [fwproc] Recv command 0x46574c44
1,282,609 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,493 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,668 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,013 >>> mbox cmd response: success
2,827,123 UART: [afmc] ++
2,827,291 UART: [afmc] CDI.KEYID = 6
2,827,654 UART: [afmc] SUBJECT.KEYID = 7
2,828,080 UART: [afmc] AUTHORITY.KEYID = 5
2,864,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,697 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,407 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,288 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,989 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,748 UART: [afmc] --
2,907,717 UART: [cold-reset] --
2,908,513 UART: [state] Locking Datavault
2,909,572 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,176 UART: [state] Locking ICCM
2,910,644 UART: [exit] Launching FMC @ 0x40000130
2,915,974 UART:
2,915,990 UART: Running Caliptra FMC ...
2,916,398 UART:
2,916,452 UART: [state] CFI Enabled
2,926,866 UART: [fht] FMC Alias Private Key: 7
3,046,208 UART: [art] Extend RT PCRs Done
3,046,636 UART: [art] Lock RT PCRs Done
3,047,966 UART: [art] Populate DV Done
3,056,025 UART: [fht] FMC Alias Private Key: 7
3,056,989 UART: [art] Derive CDI
3,057,269 UART: [art] Store in slot 0x4
3,142,808 UART: [art] Derive Key Pair
3,143,168 UART: [art] Store priv key in slot 0x5
3,156,316 UART: [art] Derive Key Pair - Done
3,171,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,674 UART: [art] PUB.X = F83CB50D126DED0E895F452F2DAC7153B186FCB36C5C0A146613304E0ABA1FC81A5EFD18CC375EFD944F447791439556
3,194,442 UART: [art] PUB.Y = 9EC193F75D172201CA9B53AFEC0CB89EC74412D73D23BB97EC036AB3294E52195AE8DF1A4B6BCDDDE15D4B019638FE52
3,201,398 UART: [art] SIG.R = 2C2ACDD6A3BBA9F084F57F89B26AF2293554017ED45E8FEAAF8497AA77AC5B5E920665C4775E58972AC1B40AC0AE0181
3,208,170 UART: [art] SIG.S = 16F7742082DE5DA0C8E5A0997E09FBC233F8EACF7D63B022BE3BD76A43B3D43D22C3162805B8404E39F5A96EA96785A0
3,231,932 UART: Caliptra RT
3,232,183 UART: [state] CFI Enabled
3,350,556 UART: [rt] RT listening for mailbox commands...
3,351,226 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,328 UART: [rt]cmd =0x52564348, len=36
3,382,628 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,456 ready_for_fw is high
1,058,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,628 >>> mbox cmd response: success
2,741,055 UART:
2,741,071 UART: Running Caliptra FMC ...
2,741,479 UART:
2,741,533 UART: [state] CFI Enabled
2,752,323 UART: [fht] FMC Alias Private Key: 7
2,871,095 UART: [art] Extend RT PCRs Done
2,871,523 UART: [art] Lock RT PCRs Done
2,872,837 UART: [art] Populate DV Done
2,881,276 UART: [fht] FMC Alias Private Key: 7
2,882,210 UART: [art] Derive CDI
2,882,490 UART: [art] Store in slot 0x4
2,968,271 UART: [art] Derive Key Pair
2,968,631 UART: [art] Store priv key in slot 0x5
2,982,077 UART: [art] Derive Key Pair - Done
2,996,582 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,792 UART: [art] PUB.X = 1EBEA5621080618DF0A0169162A6DB03107A55E76DF39ABEE060BF23FCA2D04B6C89627B72F7AC1284D3F0956013C1FA
3,019,567 UART: [art] PUB.Y = 50F718D98A5E3B6B01AC7A8D4AF54DA9BB7B7FC01F67C4156DCFC00D3ADB0095B243D48ACC02AA9306234945BFAC7FD3
3,026,505 UART: [art] SIG.R = 0D1F8828E4F4A95D45D823F6A699827C03DD37DF999567268DAC54AFA50A831E59C25ADD25248B4E1FA282CA77D342AB
3,033,274 UART: [art] SIG.S = D58F83775CBA19E96C35C06568EBBD9B3C5A10679F13EA0F505494E0010BEBE1AA7B95B91EE2B1DFA10BF037631F5CBA
3,056,686 UART: Caliptra RT
3,056,937 UART: [state] CFI Enabled
3,176,229 UART: [rt] RT listening for mailbox commands...
3,176,899 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,757 UART: [rt]cmd =0x52564348, len=36
3,208,041 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
891,303 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,407 UART: [kat] ++
895,559 UART: [kat] sha1
899,885 UART: [kat] SHA2-256
901,825 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
921,072 UART: [kat] LMS
1,169,384 UART: [kat] --
1,170,141 UART: [cold-reset] ++
1,170,713 UART: [fht] FHT @ 0x50003400
1,173,339 UART: [idev] ++
1,173,507 UART: [idev] CDI.KEYID = 6
1,173,868 UART: [idev] SUBJECT.KEYID = 7
1,174,293 UART: [idev] UDS.KEYID = 0
1,174,639 ready_for_fw is high
1,174,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,456 UART: [idev] Erasing UDS.KEYID = 0
1,199,226 UART: [idev] Sha1 KeyId Algorithm
1,208,068 UART: [idev] --
1,209,073 UART: [ldev] ++
1,209,241 UART: [ldev] CDI.KEYID = 6
1,209,605 UART: [ldev] SUBJECT.KEYID = 5
1,210,032 UART: [ldev] AUTHORITY.KEYID = 7
1,210,495 UART: [ldev] FE.KEYID = 1
1,215,839 UART: [ldev] Erasing FE.KEYID = 1
1,242,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,989 UART: [ldev] --
1,281,388 UART: [fwproc] Wait for Commands...
1,282,129 UART: [fwproc] Recv command 0x46574c44
1,282,862 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,654 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,829 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,110 >>> mbox cmd response: success
2,827,254 UART: [afmc] ++
2,827,422 UART: [afmc] CDI.KEYID = 6
2,827,785 UART: [afmc] SUBJECT.KEYID = 7
2,828,211 UART: [afmc] AUTHORITY.KEYID = 5
2,863,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,604 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,314 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,195 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,896 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,765 UART: [afmc] --
2,906,598 UART: [cold-reset] --
2,907,390 UART: [state] Locking Datavault
2,908,649 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,253 UART: [state] Locking ICCM
2,909,797 UART: [exit] Launching FMC @ 0x40000130
2,915,127 UART:
2,915,143 UART: Running Caliptra FMC ...
2,915,551 UART:
2,915,694 UART: [state] CFI Enabled
2,926,504 UART: [fht] FMC Alias Private Key: 7
3,044,752 UART: [art] Extend RT PCRs Done
3,045,180 UART: [art] Lock RT PCRs Done
3,047,242 UART: [art] Populate DV Done
3,055,455 UART: [fht] FMC Alias Private Key: 7
3,056,549 UART: [art] Derive CDI
3,056,829 UART: [art] Store in slot 0x4
3,142,728 UART: [art] Derive Key Pair
3,143,088 UART: [art] Store priv key in slot 0x5
3,156,150 UART: [art] Derive Key Pair - Done
3,171,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,756 UART: [art] PUB.X = 94B0FAF3717C2C91373A6B1CD57C39EA8314532333AE3BA566B85829F3DA5180C5BEFF1B4D68AED4676429685B47E507
3,194,527 UART: [art] PUB.Y = 6BF1B1738510FDC1F58253FA24B11DB037A3CCD3C98240B184E64C22831F91B968B32B57B09A9680EA84F2094CCFA652
3,201,478 UART: [art] SIG.R = 365EB9E4B14B268550BC9581DB440C7C76729283314A267B995AB70C03792475EBF1A8D8CADECA8BD2752AAC7C0FFFAD
3,208,250 UART: [art] SIG.S = 0F2AA5C525F8B79EDDB4B3DD879D95F3B63E3D47046442EDC3F4D4D704A968612D3B7CA278745889432F76B792294388
3,231,905 UART: Caliptra RT
3,232,248 UART: [state] CFI Enabled
3,351,895 UART: [rt] RT listening for mailbox commands...
3,352,565 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,659 UART: [rt]cmd =0x52564348, len=36
3,384,023 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,037 ready_for_fw is high
1,060,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,779 >>> mbox cmd response: success
2,742,438 UART:
2,742,454 UART: Running Caliptra FMC ...
2,742,862 UART:
2,743,005 UART: [state] CFI Enabled
2,753,481 UART: [fht] FMC Alias Private Key: 7
2,872,215 UART: [art] Extend RT PCRs Done
2,872,643 UART: [art] Lock RT PCRs Done
2,874,465 UART: [art] Populate DV Done
2,882,892 UART: [fht] FMC Alias Private Key: 7
2,884,066 UART: [art] Derive CDI
2,884,346 UART: [art] Store in slot 0x4
2,970,331 UART: [art] Derive Key Pair
2,970,691 UART: [art] Store priv key in slot 0x5
2,983,801 UART: [art] Derive Key Pair - Done
2,998,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,058 UART: [art] PUB.X = 16B8DB643C0DE5AB1DE5585A53340DA86D32D295B0CA110B28716929286A4DC1B0CE34DCD3BC531DA93666F0F399BE7B
3,021,831 UART: [art] PUB.Y = 35E3F3F1F188F7366BE7BC5087C4D81B02EFE0D99E93E3D2E58F5CB550DCAC3B17CD8F9C528E3EB8C8ADD551B43CE387
3,028,800 UART: [art] SIG.R = B0CE5708CBB1D13D88CAF60FA05FA2CCC5555885964DA8F856044F073107C2F6324357CE4114FC93ABB864CC595A141F
3,035,563 UART: [art] SIG.S = 3C61D16B73436C1A927E7A7EEDCD7FBBB428BC56D9296D0B5ED7E8839F0AD7A1F6F452E63643292E7BF4B3E2D971382B
3,059,475 UART: Caliptra RT
3,059,818 UART: [state] CFI Enabled
3,179,854 UART: [rt] RT listening for mailbox commands...
3,180,524 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,428 UART: [rt]cmd =0x52564348, len=36
3,211,726 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,568 UART: [state] LifecycleState = Unprovisioned
86,223 UART: [state] DebugLocked = No
86,841 UART: [state] WD Timer not started. Device not locked for debugging
88,164 UART: [kat] SHA2-256
893,814 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,939 UART: [kat] ++
898,091 UART: [kat] sha1
902,245 UART: [kat] SHA2-256
904,185 UART: [kat] SHA2-384
906,950 UART: [kat] SHA2-512-ACC
908,851 UART: [kat] ECC-384
918,436 UART: [kat] HMAC-384Kdf
922,924 UART: [kat] LMS
1,171,252 UART: [kat] --
1,172,209 UART: [cold-reset] ++
1,172,581 UART: [fht] FHT @ 0x50003400
1,175,260 UART: [idev] ++
1,175,428 UART: [idev] CDI.KEYID = 6
1,175,788 UART: [idev] SUBJECT.KEYID = 7
1,176,212 UART: [idev] UDS.KEYID = 0
1,176,557 ready_for_fw is high
1,176,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,240 UART: [idev] Erasing UDS.KEYID = 0
1,201,259 UART: [idev] Sha1 KeyId Algorithm
1,209,845 UART: [idev] --
1,210,805 UART: [ldev] ++
1,210,973 UART: [ldev] CDI.KEYID = 6
1,211,336 UART: [ldev] SUBJECT.KEYID = 5
1,211,762 UART: [ldev] AUTHORITY.KEYID = 7
1,212,225 UART: [ldev] FE.KEYID = 1
1,217,459 UART: [ldev] Erasing FE.KEYID = 1
1,243,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,027 UART: [ldev] --
1,282,298 UART: [fwproc] Wait for Commands...
1,283,110 UART: [fwproc] Recv command 0x46574c44
1,283,838 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,548 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,718 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,055 >>> mbox cmd response: success
2,828,109 UART: [afmc] ++
2,828,277 UART: [afmc] CDI.KEYID = 6
2,828,639 UART: [afmc] SUBJECT.KEYID = 7
2,829,064 UART: [afmc] AUTHORITY.KEYID = 5
2,864,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,620 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,329 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,212 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,913 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,825 UART: [afmc] --
2,907,779 UART: [cold-reset] --
2,908,503 UART: [state] Locking Datavault
2,909,444 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,048 UART: [state] Locking ICCM
2,910,558 UART: [exit] Launching FMC @ 0x40000130
2,915,888 UART:
2,915,904 UART: Running Caliptra FMC ...
2,916,312 UART:
2,916,366 UART: [state] CFI Enabled
2,926,782 UART: [fht] FMC Alias Private Key: 7
3,045,258 UART: [art] Extend RT PCRs Done
3,045,686 UART: [art] Lock RT PCRs Done
3,047,254 UART: [art] Populate DV Done
3,055,441 UART: [fht] FMC Alias Private Key: 7
3,056,529 UART: [art] Derive CDI
3,056,809 UART: [art] Store in slot 0x4
3,142,930 UART: [art] Derive Key Pair
3,143,290 UART: [art] Store priv key in slot 0x5
3,157,250 UART: [art] Derive Key Pair - Done
3,172,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,785 UART: [art] PUB.X = C338AE5631A8696386B41617E349414C8678B40CF3BB771CDB0EFE837B4D2FBFD01022DA7B92F6B8CCD83DE30B18627E
3,195,556 UART: [art] PUB.Y = 6D86A147565DD176997B21B2873803926AC2F8D3A86FFC4DF122411BC1B90686C6FD98BE5D5D02F67D25FA1117C093EF
3,202,501 UART: [art] SIG.R = 13E5E0CBB0AC6C199AA2D9C63A5D02FCFED4BD14346AC49E71EDAF87E18BACBB6192A781C691E779284BEB2D7C2BA97E
3,209,296 UART: [art] SIG.S = EBD48B18ADFDAF49C81CDB26E4878309BA50B67E853CE9A00CE3AAD0BD1AD9AF683348363CAC3F061E178ECD48084811
3,233,300 UART: Caliptra RT
3,233,551 UART: [state] CFI Enabled
3,352,837 UART: [rt] RT listening for mailbox commands...
3,353,507 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,467 UART: [rt]cmd =0x52564348, len=36
3,384,777 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,833 ready_for_fw is high
1,060,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,998 >>> mbox cmd response: success
2,740,421 UART:
2,740,437 UART: Running Caliptra FMC ...
2,740,845 UART:
2,740,899 UART: [state] CFI Enabled
2,751,151 UART: [fht] FMC Alias Private Key: 7
2,870,663 UART: [art] Extend RT PCRs Done
2,871,091 UART: [art] Lock RT PCRs Done
2,872,481 UART: [art] Populate DV Done
2,880,874 UART: [fht] FMC Alias Private Key: 7
2,881,814 UART: [art] Derive CDI
2,882,094 UART: [art] Store in slot 0x4
2,967,943 UART: [art] Derive Key Pair
2,968,303 UART: [art] Store priv key in slot 0x5
2,981,423 UART: [art] Derive Key Pair - Done
2,996,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,855 UART: [art] PUB.X = A024F461448D378C06E787E18C4671A3DAC2B34AFF77D04989C20419692B2063E070E4B935ABEEECADF79FDDE2AA5BEF
3,019,635 UART: [art] PUB.Y = 4B039E1210E08CF6737A6367E60267B2BB81195B857136818695459614E855FAA6700DD458EDC652E590B5EF21178ED7
3,026,566 UART: [art] SIG.R = B60DCF865E64838062510978253C0A802E7A3BB4EAC5D700FCE37AC787E387A3613B41E8FF60A6A916827D1E56CD5182
3,033,307 UART: [art] SIG.S = F7EB17A7B4A39471297FBB57ED34D3F66A6AFDE261D25E622BF0CCC50A446B7386CBD7C94191879CF68ED0D7E2775067
3,057,044 UART: Caliptra RT
3,057,295 UART: [state] CFI Enabled
3,177,760 UART: [rt] RT listening for mailbox commands...
3,178,430 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,322 UART: [rt]cmd =0x52564348, len=36
3,209,568 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
893,713 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,838 UART: [kat] ++
897,990 UART: [kat] sha1
902,456 UART: [kat] SHA2-256
904,396 UART: [kat] SHA2-384
906,995 UART: [kat] SHA2-512-ACC
908,896 UART: [kat] ECC-384
918,295 UART: [kat] HMAC-384Kdf
922,813 UART: [kat] LMS
1,171,141 UART: [kat] --
1,172,046 UART: [cold-reset] ++
1,172,422 UART: [fht] FHT @ 0x50003400
1,175,157 UART: [idev] ++
1,175,325 UART: [idev] CDI.KEYID = 6
1,175,685 UART: [idev] SUBJECT.KEYID = 7
1,176,109 UART: [idev] UDS.KEYID = 0
1,176,454 ready_for_fw is high
1,176,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,315 UART: [idev] Erasing UDS.KEYID = 0
1,201,698 UART: [idev] Sha1 KeyId Algorithm
1,210,166 UART: [idev] --
1,211,020 UART: [ldev] ++
1,211,188 UART: [ldev] CDI.KEYID = 6
1,211,551 UART: [ldev] SUBJECT.KEYID = 5
1,211,977 UART: [ldev] AUTHORITY.KEYID = 7
1,212,440 UART: [ldev] FE.KEYID = 1
1,217,658 UART: [ldev] Erasing FE.KEYID = 1
1,244,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,094 UART: [ldev] --
1,283,551 UART: [fwproc] Wait for Commands...
1,284,283 UART: [fwproc] Recv command 0x46574c44
1,285,011 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,213 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,383 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,744 >>> mbox cmd response: success
2,829,894 UART: [afmc] ++
2,830,062 UART: [afmc] CDI.KEYID = 6
2,830,424 UART: [afmc] SUBJECT.KEYID = 7
2,830,849 UART: [afmc] AUTHORITY.KEYID = 5
2,866,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,763 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,472 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,355 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,056 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,046 UART: [afmc] --
2,910,098 UART: [cold-reset] --
2,911,172 UART: [state] Locking Datavault
2,912,265 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,869 UART: [state] Locking ICCM
2,913,385 UART: [exit] Launching FMC @ 0x40000130
2,918,715 UART:
2,918,731 UART: Running Caliptra FMC ...
2,919,139 UART:
2,919,282 UART: [state] CFI Enabled
2,929,968 UART: [fht] FMC Alias Private Key: 7
3,049,046 UART: [art] Extend RT PCRs Done
3,049,474 UART: [art] Lock RT PCRs Done
3,051,202 UART: [art] Populate DV Done
3,059,657 UART: [fht] FMC Alias Private Key: 7
3,060,779 UART: [art] Derive CDI
3,061,059 UART: [art] Store in slot 0x4
3,147,064 UART: [art] Derive Key Pair
3,147,424 UART: [art] Store priv key in slot 0x5
3,160,212 UART: [art] Derive Key Pair - Done
3,175,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,613 UART: [art] PUB.X = E8A6B3F137C9EEB8148E19F6140FA86FFCE82FA5ED005E6CA764F50DCF10A5CF737A8A940E0992837EFECC177CA062F6
3,198,369 UART: [art] PUB.Y = CA5920B57CDCA485F9A33FBDD6B77ECBB95EB2CB068A7686043CBC8FEF54871662737E7B4ABC6247BAFAE9B2A1DADB4D
3,205,343 UART: [art] SIG.R = 65E22838E52ED96BC5862EE3FA2B4342C8025A2884CFE8D1BF402969C0764E1A2F63FBAF8BF1FB43F0ABC3F6BBED7371
3,212,128 UART: [art] SIG.S = 059E1359790C33B95C9981F038D02907CC9D6239A9516B149BF7C16503F445006DD05AA09967C379A429C9EB74EDC180
3,235,738 UART: Caliptra RT
3,236,081 UART: [state] CFI Enabled
3,355,146 UART: [rt] RT listening for mailbox commands...
3,355,816 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,508 UART: [rt]cmd =0x52564348, len=36
3,386,838 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,586 ready_for_fw is high
1,060,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,899 >>> mbox cmd response: success
2,741,116 UART:
2,741,132 UART: Running Caliptra FMC ...
2,741,540 UART:
2,741,683 UART: [state] CFI Enabled
2,752,237 UART: [fht] FMC Alias Private Key: 7
2,871,343 UART: [art] Extend RT PCRs Done
2,871,771 UART: [art] Lock RT PCRs Done
2,873,461 UART: [art] Populate DV Done
2,881,814 UART: [fht] FMC Alias Private Key: 7
2,882,958 UART: [art] Derive CDI
2,883,238 UART: [art] Store in slot 0x4
2,968,995 UART: [art] Derive Key Pair
2,969,355 UART: [art] Store priv key in slot 0x5
2,983,115 UART: [art] Derive Key Pair - Done
2,997,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,062 UART: [art] PUB.X = 66B66353B1E4DB76773F5C6F7FA55282E7599C1C9F1D21620BEA9D9C887BCB007CC5F81226520729F9B3647DF3F02F5B
3,020,808 UART: [art] PUB.Y = 68D54D3FEC8200FDBBF54A3A73AE333FF66388E89BEDBAFFCE4A84FEF1DA1105702677CE794C68867A4CBD85A4F1E238
3,027,755 UART: [art] SIG.R = 8EB2578AAC9AD6667522BF39C2079A21E79EADCB7EFB7CBCD1C7007B65D4C34345D24AD6C2AA4CEAB458AABEB1D6CD8C
3,034,532 UART: [art] SIG.S = 98B541A3732ED2EFE96FE4347E9B01E63300AD9A541E39C26CA6EF85BA4A10BAF3E27090FC737351EA87ACC0616AF0B8
3,059,037 UART: Caliptra RT
3,059,380 UART: [state] CFI Enabled
3,179,787 UART: [rt] RT listening for mailbox commands...
3,180,457 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,483 UART: [rt]cmd =0x52564348, len=36
3,211,797 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,162 UART:
192,549 UART: Running Caliptra ROM ...
193,739 UART:
193,893 UART: [state] CFI Enabled
264,838 UART: [state] LifecycleState = Unprovisioned
266,892 UART: [state] DebugLocked = No
268,134 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,006 UART: [kat] SHA2-256
442,711 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,245 UART: [kat] ++
453,725 UART: [kat] sha1
466,094 UART: [kat] SHA2-256
468,754 UART: [kat] SHA2-384
473,324 UART: [kat] SHA2-512-ACC
475,691 UART: [kat] ECC-384
2,765,657 UART: [kat] HMAC-384Kdf
2,778,951 UART: [kat] LMS
3,969,201 UART: [kat] --
3,974,506 UART: [cold-reset] ++
3,976,585 UART: [fht] Storing FHT @ 0x50003400
3,988,493 UART: [idev] ++
3,989,058 UART: [idev] CDI.KEYID = 6
3,990,046 UART: [idev] SUBJECT.KEYID = 7
3,991,224 UART: [idev] UDS.KEYID = 0
3,992,274 ready_for_fw is high
3,992,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,554 UART: [idev] Erasing UDS.KEYID = 0
7,325,904 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,444 UART: [idev] --
7,352,744 UART: [ldev] ++
7,353,374 UART: [ldev] CDI.KEYID = 6
7,354,289 UART: [ldev] SUBJECT.KEYID = 5
7,355,505 UART: [ldev] AUTHORITY.KEYID = 7
7,356,813 UART: [ldev] FE.KEYID = 1
7,404,422 UART: [ldev] Erasing FE.KEYID = 1
10,734,102 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,983 UART: [ldev] --
13,097,705 UART: [fwproc] Waiting for Commands...
13,099,584 UART: [fwproc] Received command 0x46574c44
13,101,767 UART: [fwproc] Received Image of size 118548 bytes
17,203,880 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,279,289 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,352,467 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,681,793 >>> mbox cmd response: success
17,686,385 UART: [afmc] ++
17,687,018 UART: [afmc] CDI.KEYID = 6
17,687,940 UART: [afmc] SUBJECT.KEYID = 7
17,689,165 UART: [afmc] AUTHORITY.KEYID = 5
21,057,195 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,355,711 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,358,011 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,372,411 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,387,172 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,401,546 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,422,975 UART: [afmc] --
23,426,789 UART: [cold-reset] --
23,431,083 UART: [state] Locking Datavault
23,436,223 UART: [state] Locking PCR0, PCR1 and PCR31
23,438,079 UART: [state] Locking ICCM
23,439,871 UART: [exit] Launching FMC @ 0x40000130
23,448,273 UART:
23,448,538 UART: Running Caliptra FMC ...
23,449,642 UART:
23,449,804 UART: [state] CFI Enabled
23,515,042 UART: [fht] FMC Alias Private Key: 7
25,855,507 UART: [art] Extend RT PCRs Done
25,856,749 UART: [art] Lock RT PCRs Done
25,858,110 UART: [art] Populate DV Done
25,863,258 UART: [fht] FMC Alias Private Key: 7
25,864,745 UART: [art] Derive CDI
25,865,506 UART: [art] Store in slot 0x4
25,914,103 UART: [art] Derive Key Pair
25,915,152 UART: [art] Store priv key in slot 0x5
29,208,355 UART: [art] Derive Key Pair - Done
29,221,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,509,383 UART: [art] Erasing AUTHORITY.KEYID = 7
31,510,890 UART: [art] PUB.X = BD2896F3E80F0BA68F0E1233710FCD610061EC674ABBCA8B9AB92C04598137875EFB0F51F99C357BC47E277F16372041
31,518,172 UART: [art] PUB.Y = 3D69C3BFB43FE8C0C89311B834792F8E7AE2B476217B33BF02AD92202477FA3FA10299B8473D3CABFEF7E95E4412C5F3
31,525,394 UART: [art] SIG.R = 3C294959BD1EC99D07AFB052594DFB836FD7AF0AF2F49924D69AC41B520DB799EBF981BE04080C5DF1F8D045297AF293
31,532,819 UART: [art] SIG.S = C6A8006FEE8407DF696F3B6C04FEF6AA7FC184A26BBFC4610EF8E88388B9B165B649E6B60641B381A9960EFB6F0FB3A4
32,838,342 UART: Caliptra RT
32,839,045 UART: [state] CFI Enabled
33,016,223 UART: [rt] RT listening for mailbox commands...
33,018,132 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,048,396 UART: [rt]cmd =0x53574545, len=84
33,050,304 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,809,246 ready_for_fw is high
3,809,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,982,860 >>> mbox cmd response: success
23,670,740 UART:
23,671,171 UART: Running Caliptra FMC ...
23,672,316 UART:
23,672,478 UART: [state] CFI Enabled
23,738,976 UART: [fht] FMC Alias Private Key: 7
26,079,137 UART: [art] Extend RT PCRs Done
26,080,364 UART: [art] Lock RT PCRs Done
26,082,152 UART: [art] Populate DV Done
26,087,578 UART: [fht] FMC Alias Private Key: 7
26,089,120 UART: [art] Derive CDI
26,089,934 UART: [art] Store in slot 0x4
26,147,955 UART: [art] Derive Key Pair
26,149,015 UART: [art] Store priv key in slot 0x5
29,441,533 UART: [art] Derive Key Pair - Done
29,454,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,122 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,631 UART: [art] PUB.X = FDE1441D412D68B587AAB1484A20C2852BD1E656603151E2AA386925BD6FFBB99124FBF06DBA58883026228634B1C33F
31,751,859 UART: [art] PUB.Y = FC0F80099379B33E3B167B4E493C2C051824B6759C21800BD9B19D44FC5DA4D3AF9FBD806B6879F88179FAA62ACCB422
31,759,122 UART: [art] SIG.R = EC641F7CE720A73D234D8A0C9E75AB20175A0E90377454C153748FCD63B33DC3DEB2E2B449496671B196F95407D12516
31,766,475 UART: [art] SIG.S = 0EC2EEBBE72B7D787C4F3D2C0DE35B69281B51BC9A4DA825C43F6103275BB5888887D58E7E99878CA3E83294144AA6CE
33,072,060 UART: Caliptra RT
33,072,784 UART: [state] CFI Enabled
33,267,728 UART: [rt] RT listening for mailbox commands...
33,269,625 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,299,933 UART: [rt]cmd =0x53574545, len=84
33,301,694 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,342 UART:
192,706 UART: Running Caliptra ROM ...
193,806 UART:
603,399 UART: [state] CFI Enabled
617,929 UART: [state] LifecycleState = Unprovisioned
619,874 UART: [state] DebugLocked = No
621,821 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,693 UART: [kat] SHA2-256
796,419 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,933 UART: [kat] ++
807,529 UART: [kat] sha1
817,552 UART: [kat] SHA2-256
820,282 UART: [kat] SHA2-384
827,117 UART: [kat] SHA2-512-ACC
829,480 UART: [kat] ECC-384
3,113,944 UART: [kat] HMAC-384Kdf
3,126,614 UART: [kat] LMS
4,316,736 UART: [kat] --
4,320,253 UART: [cold-reset] ++
4,321,328 UART: [fht] Storing FHT @ 0x50003400
4,332,183 UART: [idev] ++
4,332,735 UART: [idev] CDI.KEYID = 6
4,333,683 UART: [idev] SUBJECT.KEYID = 7
4,334,921 UART: [idev] UDS.KEYID = 0
4,335,883 ready_for_fw is high
4,336,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,923 UART: [idev] Erasing UDS.KEYID = 0
7,626,629 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,803 UART: [idev] --
7,653,317 UART: [ldev] ++
7,653,875 UART: [ldev] CDI.KEYID = 6
7,654,809 UART: [ldev] SUBJECT.KEYID = 5
7,656,081 UART: [ldev] AUTHORITY.KEYID = 7
7,657,234 UART: [ldev] FE.KEYID = 1
7,668,667 UART: [ldev] Erasing FE.KEYID = 1
10,957,883 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,397 UART: [ldev] --
13,318,793 UART: [fwproc] Waiting for Commands...
13,321,691 UART: [fwproc] Received command 0x46574c44
13,323,868 UART: [fwproc] Received Image of size 118548 bytes
17,431,270 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,951 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,134 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,908,324 >>> mbox cmd response: success
17,911,782 UART: [afmc] ++
17,912,403 UART: [afmc] CDI.KEYID = 6
17,913,314 UART: [afmc] SUBJECT.KEYID = 7
17,914,522 UART: [afmc] AUTHORITY.KEYID = 5
21,231,774 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,529,285 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,531,596 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,974 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,560,727 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,575,150 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,140 UART: [afmc] --
23,599,253 UART: [cold-reset] --
23,603,329 UART: [state] Locking Datavault
23,608,407 UART: [state] Locking PCR0, PCR1 and PCR31
23,610,161 UART: [state] Locking ICCM
23,612,957 UART: [exit] Launching FMC @ 0x40000130
23,621,362 UART:
23,621,595 UART: Running Caliptra FMC ...
23,622,692 UART:
23,622,847 UART: [state] CFI Enabled
23,630,732 UART: [fht] FMC Alias Private Key: 7
25,969,997 UART: [art] Extend RT PCRs Done
25,971,216 UART: [art] Lock RT PCRs Done
25,972,702 UART: [art] Populate DV Done
25,978,327 UART: [fht] FMC Alias Private Key: 7
25,979,867 UART: [art] Derive CDI
25,980,599 UART: [art] Store in slot 0x4
26,022,648 UART: [art] Derive Key Pair
26,023,682 UART: [art] Store priv key in slot 0x5
29,265,673 UART: [art] Derive Key Pair - Done
29,278,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,158 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,685 UART: [art] PUB.X = C4ABD7BDA05A41048AF15331CBC85576D5115F116DF245136D0F49D70AEE202C479D3CD2E80823C88F8F519F1B5193CE
31,567,939 UART: [art] PUB.Y = D381ACBB18C45E74ABBECF02C1A98924AEE4856FA013F2E5DA1BD9BF8061C4F52296B948ADA56BB9DE06EA0D6E8B619C
31,575,279 UART: [art] SIG.R = C1DE1C8FBCF9D900E5C2C1B48BCFBFBF75F2428ED501DEBE4EC311CDC5C297049CDAE68CCC20A5C59EB60D6202A2B153
31,582,677 UART: [art] SIG.S = D1C236AA6343AFC894433164D1B9F8FC184184203E1C9EF2421D26AB17C9299AA62AB49743E636C6244A364CBF589FA3
32,888,025 UART: Caliptra RT
32,888,726 UART: [state] CFI Enabled
33,022,416 UART: [rt] RT listening for mailbox commands...
33,024,299 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,054,433 UART: [rt]cmd =0x53574545, len=84
33,056,340 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
4,130,720 ready_for_fw is high
4,131,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,165,581 >>> mbox cmd response: success
23,805,870 UART:
23,806,286 UART: Running Caliptra FMC ...
23,807,402 UART:
23,807,553 UART: [state] CFI Enabled
23,815,299 UART: [fht] FMC Alias Private Key: 7
26,154,810 UART: [art] Extend RT PCRs Done
26,156,056 UART: [art] Lock RT PCRs Done
26,157,391 UART: [art] Populate DV Done
26,162,598 UART: [fht] FMC Alias Private Key: 7
26,164,294 UART: [art] Derive CDI
26,165,031 UART: [art] Store in slot 0x4
26,208,059 UART: [art] Derive Key Pair
26,209,097 UART: [art] Store priv key in slot 0x5
29,451,243 UART: [art] Derive Key Pair - Done
29,464,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,292 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,804 UART: [art] PUB.X = CB03D07962D74F45097CF80083CAD8582EAD2137BECA001D437FA8B07FC7DB05274BF0B0F63E23F4617A3E896FB1CAFA
31,753,050 UART: [art] PUB.Y = B7EF593AC3FDF0B55C753F39A0CD7DA518CECC968D5FB65BB70C2073CBCB921CECC03E1AFD91293B829F835F16858F46
31,760,359 UART: [art] SIG.R = FC1A36B9BD5AD7C4DBC7E887CB94D8673F5AE51A79C78FDBB01EED153E83E53BFCCAD2AF14A5363CEEA50A70E9D59291
31,767,809 UART: [art] SIG.S = EF54872D46E2A76ECA6FF4F9DB9B292A1A4AB960ED06B6B62D64AF7D8C96C13358F71C9FB84AC37D460B0EA4F991CF03
33,072,809 UART: Caliptra RT
33,073,532 UART: [state] CFI Enabled
33,206,748 UART: [rt] RT listening for mailbox commands...
33,208,634 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,239,211 UART: [rt]cmd =0x53574545, len=84
33,241,114 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,037 UART:
192,396 UART: Running Caliptra ROM ...
193,543 UART:
193,688 UART: [state] CFI Enabled
265,331 UART: [state] LifecycleState = Unprovisioned
267,314 UART: [state] DebugLocked = No
269,200 UART: [state] WD Timer not started. Device not locked for debugging
273,860 UART: [kat] SHA2-256
453,473 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,296 UART: [kat] ++
464,827 UART: [kat] sha1
475,084 UART: [kat] SHA2-256
477,735 UART: [kat] SHA2-384
483,503 UART: [kat] SHA2-512-ACC
485,864 UART: [kat] ECC-384
2,950,227 UART: [kat] HMAC-384Kdf
2,971,984 UART: [kat] LMS
3,448,446 UART: [kat] --
3,452,652 UART: [cold-reset] ++
3,453,870 UART: [fht] FHT @ 0x50003400
3,466,121 UART: [idev] ++
3,466,676 UART: [idev] CDI.KEYID = 6
3,467,700 UART: [idev] SUBJECT.KEYID = 7
3,468,876 UART: [idev] UDS.KEYID = 0
3,469,792 ready_for_fw is high
3,469,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,013 UART: [idev] Erasing UDS.KEYID = 0
5,986,010 UART: [idev] Sha1 KeyId Algorithm
6,009,400 UART: [idev] --
6,013,617 UART: [ldev] ++
6,014,191 UART: [ldev] CDI.KEYID = 6
6,015,166 UART: [ldev] SUBJECT.KEYID = 5
6,016,324 UART: [ldev] AUTHORITY.KEYID = 7
6,017,609 UART: [ldev] FE.KEYID = 1
6,058,901 UART: [ldev] Erasing FE.KEYID = 1
8,567,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,868 UART: [ldev] --
10,375,896 UART: [fwproc] Wait for Commands...
10,378,156 UART: [fwproc] Recv command 0x46574c44
10,380,210 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,745 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,761 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,861 >>> mbox cmd response: success
14,346,053 UART: [afmc] ++
14,346,669 UART: [afmc] CDI.KEYID = 6
14,347,553 UART: [afmc] SUBJECT.KEYID = 7
14,348,817 UART: [afmc] AUTHORITY.KEYID = 5
16,879,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,623,066 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,857 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,891 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,670,442 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,695,017 UART: [afmc] --
18,699,173 UART: [cold-reset] --
18,702,599 UART: [state] Locking Datavault
18,709,301 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,990 UART: [state] Locking ICCM
18,713,759 UART: [exit] Launching FMC @ 0x40000130
18,722,142 UART:
18,722,382 UART: Running Caliptra FMC ...
18,723,482 UART:
18,723,638 UART: [state] CFI Enabled
18,778,003 UART: [fht] FMC Alias Private Key: 7
20,544,517 UART: [art] Extend RT PCRs Done
20,545,742 UART: [art] Lock RT PCRs Done
20,547,553 UART: [art] Populate DV Done
20,553,070 UART: [fht] FMC Alias Private Key: 7
20,554,604 UART: [art] Derive CDI
20,555,333 UART: [art] Store in slot 0x4
20,610,831 UART: [art] Derive Key Pair
20,611,898 UART: [art] Store priv key in slot 0x5
23,074,401 UART: [art] Derive Key Pair - Done
23,087,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,801,017 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,515 UART: [art] PUB.X = 28468C81213FABB0CF8F3A16BD4DEE85F18547BD1E13E4E5EB4427F6FFAA8AC182CD40DE92FA5B1D97D5EEEE6A5E17B2
24,809,813 UART: [art] PUB.Y = 6C6F8D67489DDA3191A1EFF0DD6E9B58A5B37161423BD89FC496B0DA86875183E15085BC9E33471794DFCBF21DB1044E
24,817,096 UART: [art] SIG.R = 467CE09422C0F1B1FF9512F462D168A3AC7DFAAE7D2A42ECB57E57B1AE7D677D58141FEA99748207A61783D89A7E6BA3
24,824,498 UART: [art] SIG.S = 0BFF5564B7FDAD4A3291564560FE31843832492A21E7A69FA82B57C28EFCB3E5004C9D4BEE8C5C760890DE2422863FB5
25,803,281 UART: Caliptra RT
25,803,978 UART: [state] CFI Enabled
25,984,274 UART: [rt] RT listening for mailbox commands...
25,986,151 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,016,615 UART: [rt]cmd =0x53574545, len=84
26,018,596 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,458,220 ready_for_fw is high
3,458,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,224,976 >>> mbox cmd response: success
18,515,383 UART:
18,515,771 UART: Running Caliptra FMC ...
18,516,879 UART:
18,517,032 UART: [state] CFI Enabled
18,582,784 UART: [fht] FMC Alias Private Key: 7
20,348,466 UART: [art] Extend RT PCRs Done
20,349,683 UART: [art] Lock RT PCRs Done
20,351,637 UART: [art] Populate DV Done
20,357,049 UART: [fht] FMC Alias Private Key: 7
20,358,750 UART: [art] Derive CDI
20,359,482 UART: [art] Store in slot 0x4
20,415,812 UART: [art] Derive Key Pair
20,416,856 UART: [art] Store priv key in slot 0x5
22,880,062 UART: [art] Derive Key Pair - Done
22,892,628 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,582 UART: [art] Erasing AUTHORITY.KEYID = 7
24,607,061 UART: [art] PUB.X = B3B63A3DB004A36DA41E1BCBD1BF1ADEF809A3DFFA5685A360A0D82479FB9EB174335563CA3E3C987512FA74990F5ADF
24,614,359 UART: [art] PUB.Y = D3B6FAE9D092A41CDB7045F698ED264A1E2383D9D2671BCACD93AE9CCDBDBE72F1E2A273DF3A0AF99CE23E9FAFDEB0AF
24,621,649 UART: [art] SIG.R = 37E417813D67067FA78ADF0D2DB8E2CFE99E437A2E453C46C0D07C05F0A3074D78ACE8F6C1BC17D241A6B19672E115F8
24,629,052 UART: [art] SIG.S = FE4957F7EF06DED2D842312035DF16797416493231222384B9462B34B408714E66BDED9BB86AF45E188E8B4CCD743120
25,607,912 UART: Caliptra RT
25,608,624 UART: [state] CFI Enabled
25,790,016 UART: [rt] RT listening for mailbox commands...
25,791,938 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,822,675 UART: [rt]cmd =0x53574545, len=84
25,824,492 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,338 UART:
192,713 UART: Running Caliptra ROM ...
193,850 UART:
603,737 UART: [state] CFI Enabled
620,052 UART: [state] LifecycleState = Unprovisioned
621,935 UART: [state] DebugLocked = No
624,236 UART: [state] WD Timer not started. Device not locked for debugging
627,906 UART: [kat] SHA2-256
807,569 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,318 UART: [kat] ++
818,765 UART: [kat] sha1
831,130 UART: [kat] SHA2-256
833,781 UART: [kat] SHA2-384
840,489 UART: [kat] SHA2-512-ACC
842,889 UART: [kat] ECC-384
3,284,128 UART: [kat] HMAC-384Kdf
3,295,595 UART: [kat] LMS
3,772,051 UART: [kat] --
3,777,895 UART: [cold-reset] ++
3,779,404 UART: [fht] FHT @ 0x50003400
3,790,670 UART: [idev] ++
3,791,237 UART: [idev] CDI.KEYID = 6
3,792,121 UART: [idev] SUBJECT.KEYID = 7
3,793,440 UART: [idev] UDS.KEYID = 0
3,794,342 ready_for_fw is high
3,794,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,440 UART: [idev] Erasing UDS.KEYID = 0
6,270,794 UART: [idev] Sha1 KeyId Algorithm
6,293,811 UART: [idev] --
6,300,484 UART: [ldev] ++
6,301,067 UART: [ldev] CDI.KEYID = 6
6,302,090 UART: [ldev] SUBJECT.KEYID = 5
6,303,202 UART: [ldev] AUTHORITY.KEYID = 7
6,304,443 UART: [ldev] FE.KEYID = 1
6,317,736 UART: [ldev] Erasing FE.KEYID = 1
8,793,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,025 UART: [ldev] --
10,587,936 UART: [fwproc] Wait for Commands...
10,590,250 UART: [fwproc] Recv command 0x46574c44
10,592,240 UART: [fwproc] Recv'd Img size: 118548 bytes
14,081,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,878 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,236,887 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,564,864 >>> mbox cmd response: success
14,569,523 UART: [afmc] ++
14,570,174 UART: [afmc] CDI.KEYID = 6
14,571,098 UART: [afmc] SUBJECT.KEYID = 7
14,572,319 UART: [afmc] AUTHORITY.KEYID = 5
17,076,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,799,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,801,555 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,817,368 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,833,443 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,849,029 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,872,613 UART: [afmc] --
18,876,371 UART: [cold-reset] --
18,880,615 UART: [state] Locking Datavault
18,886,616 UART: [state] Locking PCR0, PCR1 and PCR31
18,888,314 UART: [state] Locking ICCM
18,889,960 UART: [exit] Launching FMC @ 0x40000130
18,898,351 UART:
18,898,594 UART: Running Caliptra FMC ...
18,899,620 UART:
18,899,769 UART: [state] CFI Enabled
18,908,307 UART: [fht] FMC Alias Private Key: 7
20,674,153 UART: [art] Extend RT PCRs Done
20,675,369 UART: [art] Lock RT PCRs Done
20,676,919 UART: [art] Populate DV Done
20,682,330 UART: [fht] FMC Alias Private Key: 7
20,684,031 UART: [art] Derive CDI
20,684,779 UART: [art] Store in slot 0x4
20,727,541 UART: [art] Derive Key Pair
20,728,543 UART: [art] Store priv key in slot 0x5
23,154,990 UART: [art] Derive Key Pair - Done
23,167,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,874,271 UART: [art] Erasing AUTHORITY.KEYID = 7
24,875,766 UART: [art] PUB.X = 31C535EB84F02DAC9327092F0E98AD0809A00B0138EE8396EE5730C25B135205AD96EB4AEC68D8E4511281509EF7BA61
24,883,008 UART: [art] PUB.Y = A1F65E563C95C08820A058E857DDD94EC764D07E3EE9A2526BA1A2605A2B36D1CE294022AF517D47AFA82AAA02564777
24,890,298 UART: [art] SIG.R = 16C3F6D22AFAFDAC21C07DB3163F47E34462148197390E6D1B51B79DE578CDF38801F6FFB086CE253E5D655B4EF5558E
24,897,696 UART: [art] SIG.S = EC65303FE301FC54F493BE195A02627F877392B5A1D692F71376B55067119EFC1915FCB21BD9832AFD868AEB3A704DF1
25,876,781 UART: Caliptra RT
25,877,478 UART: [state] CFI Enabled
26,010,591 UART: [rt] RT listening for mailbox commands...
26,012,481 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,042,799 UART: [rt]cmd =0x53574545, len=84
26,044,731 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,781,757 ready_for_fw is high
3,782,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,397 >>> mbox cmd response: success
18,698,634 UART:
18,699,013 UART: Running Caliptra FMC ...
18,700,161 UART:
18,700,333 UART: [state] CFI Enabled
18,708,343 UART: [fht] FMC Alias Private Key: 7
20,474,056 UART: [art] Extend RT PCRs Done
20,475,282 UART: [art] Lock RT PCRs Done
20,476,804 UART: [art] Populate DV Done
20,482,120 UART: [fht] FMC Alias Private Key: 7
20,483,780 UART: [art] Derive CDI
20,484,597 UART: [art] Store in slot 0x4
20,527,279 UART: [art] Derive Key Pair
20,528,321 UART: [art] Store priv key in slot 0x5
22,955,009 UART: [art] Derive Key Pair - Done
22,968,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,553 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,054 UART: [art] PUB.X = 7A5EE0CDAF72ED98CC43AFCF1F453CEDDA0A3465760CD3A9479ED27D553431F857EF9D55AAEDD50154F472DE0C0B2E2D
24,683,376 UART: [art] PUB.Y = 255D60833F928DA70EF32367E76C845A9C76DDF64293691FF38BC35FBCB41995E906DAD1F54348D2992179703D1AE27B
24,690,638 UART: [art] SIG.R = DD0640020462559015F08EFC27D559FFD5E8883592B6BE36BFAABE728A5FDE4EF53DF84488FCDF385521684AE28B46E5
24,697,995 UART: [art] SIG.S = 164B249AD4DE83FDAC32BB98D1A4476C7E226F2D96D4032A4CB738758D98832A8D43496C815DC57B22477FCB39D57F3C
25,677,051 UART: Caliptra RT
25,677,756 UART: [state] CFI Enabled
25,811,041 UART: [rt] RT listening for mailbox commands...
25,812,956 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,843,404 UART: [rt]cmd =0x53574545, len=84
25,845,326 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,123 UART:
192,491 UART: Running Caliptra ROM ...
193,615 UART:
193,983 UART: [state] CFI Enabled
265,934 UART: [state] LifecycleState = Unprovisioned
267,949 UART: [state] DebugLocked = No
269,411 UART: [state] WD Timer not started. Device not locked for debugging
273,301 UART: [kat] SHA2-256
463,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,943 UART: [kat] ++
474,418 UART: [kat] sha1
487,135 UART: [kat] SHA2-256
490,145 UART: [kat] SHA2-384
497,001 UART: [kat] SHA2-512-ACC
499,586 UART: [kat] ECC-384
2,947,089 UART: [kat] HMAC-384Kdf
2,972,895 UART: [kat] LMS
3,504,697 UART: [kat] --
3,509,212 UART: [cold-reset] ++
3,511,432 UART: [fht] FHT @ 0x50003400
3,522,621 UART: [idev] ++
3,523,324 UART: [idev] CDI.KEYID = 6
3,524,297 UART: [idev] SUBJECT.KEYID = 7
3,525,474 UART: [idev] UDS.KEYID = 0
3,526,394 ready_for_fw is high
3,526,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,631 UART: [idev] Erasing UDS.KEYID = 0
6,032,304 UART: [idev] Sha1 KeyId Algorithm
6,053,353 UART: [idev] --
6,058,887 UART: [ldev] ++
6,059,626 UART: [ldev] CDI.KEYID = 6
6,060,537 UART: [ldev] SUBJECT.KEYID = 5
6,061,699 UART: [ldev] AUTHORITY.KEYID = 7
6,062,936 UART: [ldev] FE.KEYID = 1
6,093,297 UART: [ldev] Erasing FE.KEYID = 1
8,601,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,174 UART: [ldev] --
10,410,602 UART: [fwproc] Wait for Commands...
10,412,967 UART: [fwproc] Recv command 0x46574c44
10,415,269 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,004 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,618 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,465 >>> mbox cmd response: success
14,675,919 UART: [afmc] ++
14,676,653 UART: [afmc] CDI.KEYID = 6
14,677,843 UART: [afmc] SUBJECT.KEYID = 7
14,679,277 UART: [afmc] AUTHORITY.KEYID = 5
17,206,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,931,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,933,326 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,948,417 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,963,574 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,978,496 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,000,973 UART: [afmc] --
19,003,955 UART: [cold-reset] --
19,008,101 UART: [state] Locking Datavault
19,014,030 UART: [state] Locking PCR0, PCR1 and PCR31
19,016,240 UART: [state] Locking ICCM
19,018,395 UART: [exit] Launching FMC @ 0x40000130
19,027,077 UART:
19,027,319 UART: Running Caliptra FMC ...
19,028,425 UART:
19,028,601 UART: [state] CFI Enabled
19,089,118 UART: [fht] FMC Alias Private Key: 7
20,855,863 UART: [art] Extend RT PCRs Done
20,857,082 UART: [art] Lock RT PCRs Done
20,858,763 UART: [art] Populate DV Done
20,864,280 UART: [fht] FMC Alias Private Key: 7
20,865,974 UART: [art] Derive CDI
20,866,784 UART: [art] Store in slot 0x4
20,921,603 UART: [art] Derive Key Pair
20,922,630 UART: [art] Store priv key in slot 0x5
23,385,527 UART: [art] Derive Key Pair - Done
23,398,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,111,433 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,942 UART: [art] PUB.X = 3A69DAC22D7303C902A86EEFEB60E46BE0CD081A41BF06D3D9B12A281B8315C42F7D3F2755325A7560D8CE2C90A36737
25,120,214 UART: [art] PUB.Y = 466254C276B09A8F657E72CC1A14BEFBD198F858F424459C797B3303177ECE494AE7DE83F4EB77C0D4DD7FD8CF6EF9CC
25,127,481 UART: [art] SIG.R = 2FB6AC6DF0EE529A0C00DD858C9C231663E287CEFCD83B4A1DE1AC5298BBFA7AC609FA892C019664DD76C23DBBAEC17B
25,134,907 UART: [art] SIG.S = A10052B0FB4DFEEBE3BB09C7CF92ED8877EDFA269990F73F2D5DD099972D88AF51881D06BB1ED86CDC01CE1181761880
26,114,200 UART: Caliptra RT
26,114,887 UART: [state] CFI Enabled
26,294,630 UART: [rt] RT listening for mailbox commands...
26,296,557 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,327,182 UART: [rt]cmd =0x53574545, len=84
26,329,050 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,438,462 ready_for_fw is high
3,438,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,816,849 >>> mbox cmd response: success
19,133,819 UART:
19,134,206 UART: Running Caliptra FMC ...
19,135,305 UART:
19,135,453 UART: [state] CFI Enabled
19,200,911 UART: [fht] FMC Alias Private Key: 7
20,969,013 UART: [art] Extend RT PCRs Done
20,970,240 UART: [art] Lock RT PCRs Done
20,971,598 UART: [art] Populate DV Done
20,976,753 UART: [fht] FMC Alias Private Key: 7
20,978,365 UART: [art] Derive CDI
20,979,180 UART: [art] Store in slot 0x4
21,035,027 UART: [art] Derive Key Pair
21,036,030 UART: [art] Store priv key in slot 0x5
23,498,858 UART: [art] Derive Key Pair - Done
23,511,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,657 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,793 UART: [art] PUB.X = E025248FE17288EE3AB631756976982F0C92E536BC9AD7682ECDF5F170F140A548721F258F2D47CC40FC6956E870A383
25,233,435 UART: [art] PUB.Y = A59847D6060E62F99DEC5EDBDDFB87F8D254472263A7ECA87BEE5F085B9E8DED1319C24FC38B4DD8CEFBADAFBB3D7CD1
25,240,736 UART: [art] SIG.R = 28F6E4467FAF29E8CBCAD1EE93B9186E593205850E851A96F4AA32E1F5DC7AC46135E8F38663AE06BC29C08CF97FC851
25,248,167 UART: [art] SIG.S = 59DB7FE1489F8A941144708799C5852E9F99BE9CC552DFD49BD5B450B439B9C93B99DEB479586B8ACB28ED1AE38A1F32
26,227,424 UART: Caliptra RT
26,228,602 UART: [state] CFI Enabled
26,412,668 UART: [rt] RT listening for mailbox commands...
26,414,575 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,444,956 UART: [rt]cmd =0x53574545, len=84
26,446,621 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
192,519 UART:
192,879 UART: Running Caliptra ROM ...
193,987 UART:
603,568 UART: [state] CFI Enabled
615,935 UART: [state] LifecycleState = Unprovisioned
618,327 UART: [state] DebugLocked = No
621,278 UART: [state] WD Timer not started. Device not locked for debugging
625,623 UART: [kat] SHA2-256
815,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,255 UART: [kat] ++
826,780 UART: [kat] sha1
839,007 UART: [kat] SHA2-256
842,031 UART: [kat] SHA2-384
848,525 UART: [kat] SHA2-512-ACC
851,115 UART: [kat] ECC-384
3,292,438 UART: [kat] HMAC-384Kdf
3,304,911 UART: [kat] LMS
3,836,722 UART: [kat] --
3,841,787 UART: [cold-reset] ++
3,843,795 UART: [fht] FHT @ 0x50003400
3,855,774 UART: [idev] ++
3,856,489 UART: [idev] CDI.KEYID = 6
3,857,376 UART: [idev] SUBJECT.KEYID = 7
3,858,625 UART: [idev] UDS.KEYID = 0
3,859,530 ready_for_fw is high
3,859,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,689 UART: [idev] Erasing UDS.KEYID = 0
6,334,517 UART: [idev] Sha1 KeyId Algorithm
6,357,595 UART: [idev] --
6,361,215 UART: [ldev] ++
6,361,899 UART: [ldev] CDI.KEYID = 6
6,362,786 UART: [ldev] SUBJECT.KEYID = 5
6,363,994 UART: [ldev] AUTHORITY.KEYID = 7
6,365,227 UART: [ldev] FE.KEYID = 1
6,376,908 UART: [ldev] Erasing FE.KEYID = 1
8,853,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,179 UART: [ldev] --
10,643,153 UART: [fwproc] Wait for Commands...
10,644,930 UART: [fwproc] Recv command 0x46574c44
10,647,197 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,228 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,841 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,264 >>> mbox cmd response: success
14,916,614 UART: [afmc] ++
14,917,346 UART: [afmc] CDI.KEYID = 6
14,918,543 UART: [afmc] SUBJECT.KEYID = 7
14,919,988 UART: [afmc] AUTHORITY.KEYID = 5
17,426,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,059 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,179 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,328 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,299 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,402 UART: [afmc] --
19,223,816 UART: [cold-reset] --
19,227,973 UART: [state] Locking Datavault
19,234,864 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,028 UART: [state] Locking ICCM
19,239,788 UART: [exit] Launching FMC @ 0x40000130
19,248,431 UART:
19,248,673 UART: Running Caliptra FMC ...
19,249,780 UART:
19,249,940 UART: [state] CFI Enabled
19,257,941 UART: [fht] FMC Alias Private Key: 7
21,024,119 UART: [art] Extend RT PCRs Done
21,025,356 UART: [art] Lock RT PCRs Done
21,026,746 UART: [art] Populate DV Done
21,031,906 UART: [fht] FMC Alias Private Key: 7
21,033,581 UART: [art] Derive CDI
21,034,326 UART: [art] Store in slot 0x4
21,077,249 UART: [art] Derive Key Pair
21,078,254 UART: [art] Store priv key in slot 0x5
23,505,066 UART: [art] Derive Key Pair - Done
23,518,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,739 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,237 UART: [art] PUB.X = 83106C9423D32DB427209759E0A95F029D890C97AC6D6149D15A9C3F91664229A01B503B6E4A51FC214ECFE0C0AD8F17
25,233,517 UART: [art] PUB.Y = F1069D6996CFCD93CD071BA064B6F2C56073CEFCE0F62AA9099A4243E42B9CE44A9B4A431F205D5CF8F1AAA486A809B0
25,240,771 UART: [art] SIG.R = 3DCBFFD6631075F09504818E7A7414496DEFEEC53E0DA491DB0ADE90B6B8CEAF51EA49FC3090E8BEB4749C998939FCA9
25,248,197 UART: [art] SIG.S = 017F5FA68768D5CDB4F390E54CF74A7A6FD518796BFF783CD10CC84239CD69DC05E485724DB2936DEBD65573B83BF8F1
26,226,708 UART: Caliptra RT
26,227,421 UART: [state] CFI Enabled
26,359,550 UART: [rt] RT listening for mailbox commands...
26,361,443 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,392,074 UART: [rt]cmd =0x53574545, len=84
26,393,837 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,761,218 ready_for_fw is high
3,762,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,051,189 >>> mbox cmd response: success
19,304,620 UART:
19,305,035 UART: Running Caliptra FMC ...
19,306,177 UART:
19,306,348 UART: [state] CFI Enabled
19,314,376 UART: [fht] FMC Alias Private Key: 7
21,080,413 UART: [art] Extend RT PCRs Done
21,081,645 UART: [art] Lock RT PCRs Done
21,083,341 UART: [art] Populate DV Done
21,088,776 UART: [fht] FMC Alias Private Key: 7
21,090,426 UART: [art] Derive CDI
21,091,247 UART: [art] Store in slot 0x4
21,133,633 UART: [art] Derive Key Pair
21,134,637 UART: [art] Store priv key in slot 0x5
23,561,715 UART: [art] Derive Key Pair - Done
23,574,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,163 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,677 UART: [art] PUB.X = 27F87F40BFF3BDBF96DCCAFBA6413DFAF79A5443FE7D99386EDAAC1AF25675EE4CB4A09A3A45A713BAF855381F81D4BA
25,289,982 UART: [art] PUB.Y = B3ED470D563D84671EF8AF7E1146143F0576E5D46B5CF4B9E1F2181FAA84236968CF5DDB1E38E291ECD5AFDF159B7436
25,297,257 UART: [art] SIG.R = 21A7EC6E8D43FEFAFB6D2521D5BF9EDB319E4172554687D7385B5049B08E0FE7B7852183ADF82A44CD35685A43E32482
25,304,651 UART: [art] SIG.S = 6EF2D3A1EE5CF614F273B01E5610D67A62D1572A14F5E7153F0CD4825D44469CCC422BF99209FA41691341BC2857C650
26,283,909 UART: Caliptra RT
26,284,623 UART: [state] CFI Enabled
26,417,459 UART: [rt] RT listening for mailbox commands...
26,419,353 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,449,990 UART: [rt]cmd =0x53574545, len=84
26,451,954 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,263 UART: [kat] SHA2-256
882,194 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,309 UART: [kat] ++
886,461 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,476 UART: [kat] SHA2-512-ACC
897,377 UART: [kat] ECC-384
903,098 UART: [kat] HMAC-384Kdf
907,618 UART: [kat] LMS
1,475,814 UART: [kat] --
1,476,727 UART: [cold-reset] ++
1,477,097 UART: [fht] Storing FHT @ 0x50003400
1,479,756 UART: [idev] ++
1,479,924 UART: [idev] CDI.KEYID = 6
1,480,284 UART: [idev] SUBJECT.KEYID = 7
1,480,708 UART: [idev] UDS.KEYID = 0
1,481,053 ready_for_fw is high
1,481,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,740 UART: [idev] Erasing UDS.KEYID = 0
1,505,656 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,168 UART: [idev] --
1,515,159 UART: [ldev] ++
1,515,327 UART: [ldev] CDI.KEYID = 6
1,515,690 UART: [ldev] SUBJECT.KEYID = 5
1,516,116 UART: [ldev] AUTHORITY.KEYID = 7
1,516,579 UART: [ldev] FE.KEYID = 1
1,521,501 UART: [ldev] Erasing FE.KEYID = 1
1,546,634 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,160 UART: [ldev] --
1,585,589 UART: [fwproc] Waiting for Commands...
1,586,260 UART: [fwproc] Received command 0x46574c44
1,587,051 UART: [fwproc] Received Image of size 118548 bytes
2,932,019 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,347 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,565 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,808 >>> mbox cmd response: success
3,131,852 UART: [afmc] ++
3,132,020 UART: [afmc] CDI.KEYID = 6
3,132,382 UART: [afmc] SUBJECT.KEYID = 7
3,132,807 UART: [afmc] AUTHORITY.KEYID = 5
3,167,994 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,334 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,114 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,823 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,706 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,389 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,375 UART: [afmc] --
3,211,273 UART: [cold-reset] --
3,212,313 UART: [state] Locking Datavault
3,213,580 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,184 UART: [state] Locking ICCM
3,214,670 UART: [exit] Launching FMC @ 0x40000130
3,220,000 UART:
3,220,016 UART: Running Caliptra FMC ...
3,220,424 UART:
3,220,478 UART: [state] CFI Enabled
3,230,670 UART: [fht] FMC Alias Private Key: 7
3,349,832 UART: [art] Extend RT PCRs Done
3,350,260 UART: [art] Lock RT PCRs Done
3,351,468 UART: [art] Populate DV Done
3,359,651 UART: [fht] FMC Alias Private Key: 7
3,360,809 UART: [art] Derive CDI
3,361,089 UART: [art] Store in slot 0x4
3,446,611 UART: [art] Derive Key Pair
3,446,971 UART: [art] Store priv key in slot 0x5
3,460,086 UART: [art] Derive Key Pair - Done
3,474,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,391 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,156 UART: [art] PUB.X = DC03D8EF64F1C33190BF10B7926118CAE7D6ED2A3DF7708FF28FD3D88AF42DF5BA343EDD44C88FBA195CB6FA97BD2D48
3,497,949 UART: [art] PUB.Y = 92409CB11B52322520C1BA294800A1A7428AC7C24A968ED7B72166A8C23B18812D0ADE77EB1DE13492C31CD10C5A80C5
3,504,873 UART: [art] SIG.R = 522225866C45EB8CB802A755F995A458E471BAC85F0E22138E202D21F3FFCD0F8B656E01E24E4A95CDA02C34BF375731
3,511,635 UART: [art] SIG.S = 0B5BE117264B316B8459133590D361BAF10CB67D6FD64F78D1B90024F6FB002C83672F54D0179735D4DBEB4AF22C9B74
3,535,369 UART: Caliptra RT
3,535,620 UART: [state] CFI Enabled
3,655,634 UART: [rt] RT listening for mailbox commands...
3,656,304 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,772 UART: [rt]cmd =0x53574545, len=84
3,688,103 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,059 ready_for_fw is high
1,363,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,700 >>> mbox cmd response: success
3,042,443 UART:
3,042,459 UART: Running Caliptra FMC ...
3,042,867 UART:
3,042,921 UART: [state] CFI Enabled
3,053,185 UART: [fht] FMC Alias Private Key: 7
3,172,053 UART: [art] Extend RT PCRs Done
3,172,481 UART: [art] Lock RT PCRs Done
3,174,311 UART: [art] Populate DV Done
3,182,876 UART: [fht] FMC Alias Private Key: 7
3,184,026 UART: [art] Derive CDI
3,184,306 UART: [art] Store in slot 0x4
3,270,488 UART: [art] Derive Key Pair
3,270,848 UART: [art] Store priv key in slot 0x5
3,283,561 UART: [art] Derive Key Pair - Done
3,297,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,254 UART: [art] PUB.X = 5AE47BE6C135E229D270BFA83587E7EDA74AF25AB4F6C59567203BD9AABB1AACC7E7D5CBC9BFBC35420CAF052D0D0F84
3,321,040 UART: [art] PUB.Y = 6722B9D6263F086D77844B2CE2504531FFE24107D0E65E858569F1CA1F59A7F7DEB9B56B614F2EE25AC8F25CD3AF7A5C
3,327,994 UART: [art] SIG.R = 0CB54CA2D157E5861C93AC97ED1E0185CBC6A34C320C2EFC29D82FF853F5BC8A43D8EE07DEF7A63D2C79CF13AB2FCAC7
3,334,780 UART: [art] SIG.S = 3122BE246F52E1328503E528B7E5F15520742284D0DC7B5F72D58741B7996C930FF593C33222FAB906D053B7809443F4
3,358,673 UART: Caliptra RT
3,358,924 UART: [state] CFI Enabled
3,478,722 UART: [rt] RT listening for mailbox commands...
3,479,392 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,948 UART: [rt]cmd =0x53574545, len=84
3,511,511 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,314 UART: [kat] SHA2-256
882,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,360 UART: [kat] ++
886,512 UART: [kat] sha1
890,648 UART: [kat] SHA2-256
892,586 UART: [kat] SHA2-384
895,505 UART: [kat] SHA2-512-ACC
897,406 UART: [kat] ECC-384
903,153 UART: [kat] HMAC-384Kdf
907,859 UART: [kat] LMS
1,476,055 UART: [kat] --
1,476,756 UART: [cold-reset] ++
1,477,216 UART: [fht] Storing FHT @ 0x50003400
1,480,119 UART: [idev] ++
1,480,287 UART: [idev] CDI.KEYID = 6
1,480,647 UART: [idev] SUBJECT.KEYID = 7
1,481,071 UART: [idev] UDS.KEYID = 0
1,481,416 ready_for_fw is high
1,481,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,445 UART: [idev] Erasing UDS.KEYID = 0
1,506,359 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,141 UART: [idev] --
1,516,096 UART: [ldev] ++
1,516,264 UART: [ldev] CDI.KEYID = 6
1,516,627 UART: [ldev] SUBJECT.KEYID = 5
1,517,053 UART: [ldev] AUTHORITY.KEYID = 7
1,517,516 UART: [ldev] FE.KEYID = 1
1,522,830 UART: [ldev] Erasing FE.KEYID = 1
1,547,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,077 UART: [ldev] --
1,587,388 UART: [fwproc] Waiting for Commands...
1,588,207 UART: [fwproc] Received command 0x46574c44
1,588,998 UART: [fwproc] Received Image of size 118548 bytes
2,933,308 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,838 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,056 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,407 >>> mbox cmd response: success
3,133,631 UART: [afmc] ++
3,133,799 UART: [afmc] CDI.KEYID = 6
3,134,161 UART: [afmc] SUBJECT.KEYID = 7
3,134,586 UART: [afmc] AUTHORITY.KEYID = 5
3,169,981 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,189 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,969 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,678 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,561 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,244 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,004 UART: [afmc] --
3,212,924 UART: [cold-reset] --
3,213,848 UART: [state] Locking Datavault
3,215,065 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,669 UART: [state] Locking ICCM
3,216,091 UART: [exit] Launching FMC @ 0x40000130
3,221,421 UART:
3,221,437 UART: Running Caliptra FMC ...
3,221,845 UART:
3,221,988 UART: [state] CFI Enabled
3,232,724 UART: [fht] FMC Alias Private Key: 7
3,352,092 UART: [art] Extend RT PCRs Done
3,352,520 UART: [art] Lock RT PCRs Done
3,354,328 UART: [art] Populate DV Done
3,362,371 UART: [fht] FMC Alias Private Key: 7
3,363,381 UART: [art] Derive CDI
3,363,661 UART: [art] Store in slot 0x4
3,449,425 UART: [art] Derive Key Pair
3,449,785 UART: [art] Store priv key in slot 0x5
3,463,768 UART: [art] Derive Key Pair - Done
3,478,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,748 UART: [art] PUB.X = A5303F880C18239415DB67D96855210DC50088A02695D350620B98EA6EF4756AB456D80D99FA18124CCB8C0698ED6355
3,501,473 UART: [art] PUB.Y = 5175B772C8851D89AA00874B6D8E5DF0EE0248DDE30BE34C174B8EA12650C74E88F6A9EDD46797F8DF197FDEAD7283FC
3,508,409 UART: [art] SIG.R = 2E5BF46DBEF1C48116F10D0CD56E999D5DA632075EED3D8C9D51C6041CB0FEDE8AAB75B1827D47D3BE0BA81E5045A93C
3,515,186 UART: [art] SIG.S = BC673654E304E452836D9A75CC0554E59568CA4861DB7FA8D017C8955E3D379FF8427F6B79A44A9DA707831AD6B3FB8D
3,538,969 UART: Caliptra RT
3,539,312 UART: [state] CFI Enabled
3,660,117 UART: [rt] RT listening for mailbox commands...
3,660,787 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,335 UART: [rt]cmd =0x53574545, len=84
3,692,478 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,730 ready_for_fw is high
1,362,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,519 >>> mbox cmd response: success
3,044,658 UART:
3,044,674 UART: Running Caliptra FMC ...
3,045,082 UART:
3,045,225 UART: [state] CFI Enabled
3,055,285 UART: [fht] FMC Alias Private Key: 7
3,174,161 UART: [art] Extend RT PCRs Done
3,174,589 UART: [art] Lock RT PCRs Done
3,175,927 UART: [art] Populate DV Done
3,184,206 UART: [fht] FMC Alias Private Key: 7
3,185,232 UART: [art] Derive CDI
3,185,512 UART: [art] Store in slot 0x4
3,271,030 UART: [art] Derive Key Pair
3,271,390 UART: [art] Store priv key in slot 0x5
3,284,417 UART: [art] Derive Key Pair - Done
3,299,135 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,349 UART: [art] PUB.X = 0E0E5206EDA403598431275B758E46B8E8E29B03A0C39A9776B9B586EC6C04930FDA290A8D3A8FFE485E5E4063A501D6
3,322,094 UART: [art] PUB.Y = 284815D5F259E5ECBB97D7DE1FFF0DFA819C0145A4DDDB3582EDBEB54CF3A6BAC39929A955B31A70FAC7B49C934BF607
3,329,059 UART: [art] SIG.R = F1CA65DA95053027D0730584E6DE9BD84AE1B5C10CE40F00715145FCA3BB245B4E835857DE7C625A1353E57B926542E4
3,335,797 UART: [art] SIG.S = 080ACFFB2565B02D916BB150CCF0A9F45B9E308F1CAA51A5B45CCCBB2D415BA11244410CB95819D6F74F87DD7DA67120
3,359,838 UART: Caliptra RT
3,360,181 UART: [state] CFI Enabled
3,479,954 UART: [rt] RT listening for mailbox commands...
3,480,624 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,860 UART: [rt]cmd =0x53574545, len=84
3,512,247 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,250 UART: [kat] SHA2-256
890,800 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,904 UART: [kat] ++
895,056 UART: [kat] sha1
899,402 UART: [kat] SHA2-256
901,342 UART: [kat] SHA2-384
903,925 UART: [kat] SHA2-512-ACC
905,826 UART: [kat] ECC-384
915,007 UART: [kat] HMAC-384Kdf
919,609 UART: [kat] LMS
1,167,921 UART: [kat] --
1,169,036 UART: [cold-reset] ++
1,169,388 UART: [fht] FHT @ 0x50003400
1,172,270 UART: [idev] ++
1,172,438 UART: [idev] CDI.KEYID = 6
1,172,799 UART: [idev] SUBJECT.KEYID = 7
1,173,224 UART: [idev] UDS.KEYID = 0
1,173,570 ready_for_fw is high
1,173,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,103 UART: [idev] Erasing UDS.KEYID = 0
1,198,239 UART: [idev] Sha1 KeyId Algorithm
1,207,025 UART: [idev] --
1,208,164 UART: [ldev] ++
1,208,332 UART: [ldev] CDI.KEYID = 6
1,208,696 UART: [ldev] SUBJECT.KEYID = 5
1,209,123 UART: [ldev] AUTHORITY.KEYID = 7
1,209,586 UART: [ldev] FE.KEYID = 1
1,214,518 UART: [ldev] Erasing FE.KEYID = 1
1,241,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,872 UART: [ldev] --
1,280,085 UART: [fwproc] Wait for Commands...
1,280,744 UART: [fwproc] Recv command 0x46574c44
1,281,477 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,673 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,848 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,143 >>> mbox cmd response: success
2,825,323 UART: [afmc] ++
2,825,491 UART: [afmc] CDI.KEYID = 6
2,825,854 UART: [afmc] SUBJECT.KEYID = 7
2,826,280 UART: [afmc] AUTHORITY.KEYID = 5
2,862,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,259 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,969 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,850 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,551 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,090 UART: [afmc] --
2,905,043 UART: [cold-reset] --
2,905,847 UART: [state] Locking Datavault
2,906,788 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,392 UART: [state] Locking ICCM
2,907,988 UART: [exit] Launching FMC @ 0x40000130
2,913,318 UART:
2,913,334 UART: Running Caliptra FMC ...
2,913,742 UART:
2,913,796 UART: [state] CFI Enabled
2,924,402 UART: [fht] FMC Alias Private Key: 7
3,043,548 UART: [art] Extend RT PCRs Done
3,043,976 UART: [art] Lock RT PCRs Done
3,045,428 UART: [art] Populate DV Done
3,053,461 UART: [fht] FMC Alias Private Key: 7
3,054,537 UART: [art] Derive CDI
3,054,817 UART: [art] Store in slot 0x4
3,140,958 UART: [art] Derive Key Pair
3,141,318 UART: [art] Store priv key in slot 0x5
3,154,178 UART: [art] Derive Key Pair - Done
3,169,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,259 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,024 UART: [art] PUB.X = 7078DE4C0D4E2E0B040E009B9E722E4DFD727CAA335961C5557C34BF3EA684DEC9F6E5DAC994CDF7A04828934D622534
3,191,770 UART: [art] PUB.Y = 9364DAB6CB51CD03306851553910D2AB12960A4AED850892E36E6E813F3027D7E73A1DD071F8A1918977FAC289C74193
3,198,707 UART: [art] SIG.R = 7B0FC168ECFECAA28F52BE9F4C08438BCE4B95350CBA5809324EEDA55AB6E9B70ACEB2CE95CD82D2E9B00B517F095196
3,205,480 UART: [art] SIG.S = A7782F6ECF10EBCC4837F52EFE60228B8863CA1335DA095C7DF4B198A4BBDB0B9D62580E537A034EEE8424BA194D0C19
3,229,821 UART: Caliptra RT
3,230,072 UART: [state] CFI Enabled
3,349,860 UART: [rt] RT listening for mailbox commands...
3,350,530 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,728 UART: [rt]cmd =0x53574545, len=84
3,382,199 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,288 ready_for_fw is high
1,060,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,428 >>> mbox cmd response: success
2,741,791 UART:
2,741,807 UART: Running Caliptra FMC ...
2,742,215 UART:
2,742,269 UART: [state] CFI Enabled
2,752,973 UART: [fht] FMC Alias Private Key: 7
2,871,335 UART: [art] Extend RT PCRs Done
2,871,763 UART: [art] Lock RT PCRs Done
2,873,411 UART: [art] Populate DV Done
2,881,770 UART: [fht] FMC Alias Private Key: 7
2,882,748 UART: [art] Derive CDI
2,883,028 UART: [art] Store in slot 0x4
2,969,181 UART: [art] Derive Key Pair
2,969,541 UART: [art] Store priv key in slot 0x5
2,983,411 UART: [art] Derive Key Pair - Done
2,998,151 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,599 UART: [art] PUB.X = 289FAFDAD6B5390E38A7219392CEE4DFC2CBDA19A933FCC6657C6530F51BDECD9E38101AC41A552105DBB57698204020
3,021,375 UART: [art] PUB.Y = 10CBEE066C040DD8A1497BD69D1185FB83B4021CD1DEFC089C2124C6B4D4D94CDA648DD6B325676217857B45926D80A4
3,028,316 UART: [art] SIG.R = 520461180970ACA8FF7A83D55A9AB690DB3DBCE69E5D48AA5AC57462CCC12B8DD8F6910EB1CD146E1B5C0FB7D4EB8FF3
3,035,098 UART: [art] SIG.S = B7521BC9DEB975E8EEFAE3F86952570B8C2DB1D9A3523705BD78D72F25243C6186A32E1F523D48FBA900F59F2A7CCD5C
3,058,940 UART: Caliptra RT
3,059,191 UART: [state] CFI Enabled
3,179,121 UART: [rt] RT listening for mailbox commands...
3,179,791 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,217 UART: [rt]cmd =0x53574545, len=84
3,211,538 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
891,523 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,627 UART: [kat] ++
895,779 UART: [kat] sha1
899,885 UART: [kat] SHA2-256
901,825 UART: [kat] SHA2-384
904,706 UART: [kat] SHA2-512-ACC
906,607 UART: [kat] ECC-384
916,460 UART: [kat] HMAC-384Kdf
921,018 UART: [kat] LMS
1,169,330 UART: [kat] --
1,170,131 UART: [cold-reset] ++
1,170,531 UART: [fht] FHT @ 0x50003400
1,173,291 UART: [idev] ++
1,173,459 UART: [idev] CDI.KEYID = 6
1,173,820 UART: [idev] SUBJECT.KEYID = 7
1,174,245 UART: [idev] UDS.KEYID = 0
1,174,591 ready_for_fw is high
1,174,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,958 UART: [idev] Erasing UDS.KEYID = 0
1,199,250 UART: [idev] Sha1 KeyId Algorithm
1,207,996 UART: [idev] --
1,208,913 UART: [ldev] ++
1,209,081 UART: [ldev] CDI.KEYID = 6
1,209,445 UART: [ldev] SUBJECT.KEYID = 5
1,209,872 UART: [ldev] AUTHORITY.KEYID = 7
1,210,335 UART: [ldev] FE.KEYID = 1
1,215,647 UART: [ldev] Erasing FE.KEYID = 1
1,241,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,729 UART: [ldev] --
1,281,000 UART: [fwproc] Wait for Commands...
1,281,723 UART: [fwproc] Recv command 0x46574c44
1,282,456 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,282 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,457 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,730 >>> mbox cmd response: success
2,826,786 UART: [afmc] ++
2,826,954 UART: [afmc] CDI.KEYID = 6
2,827,317 UART: [afmc] SUBJECT.KEYID = 7
2,827,743 UART: [afmc] AUTHORITY.KEYID = 5
2,863,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,681 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,430 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,140 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,021 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,722 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,607 UART: [afmc] --
2,906,438 UART: [cold-reset] --
2,907,126 UART: [state] Locking Datavault
2,908,239 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,843 UART: [state] Locking ICCM
2,909,321 UART: [exit] Launching FMC @ 0x40000130
2,914,651 UART:
2,914,667 UART: Running Caliptra FMC ...
2,915,075 UART:
2,915,218 UART: [state] CFI Enabled
2,925,828 UART: [fht] FMC Alias Private Key: 7
3,045,608 UART: [art] Extend RT PCRs Done
3,046,036 UART: [art] Lock RT PCRs Done
3,047,376 UART: [art] Populate DV Done
3,055,903 UART: [fht] FMC Alias Private Key: 7
3,057,051 UART: [art] Derive CDI
3,057,331 UART: [art] Store in slot 0x4
3,143,370 UART: [art] Derive Key Pair
3,143,730 UART: [art] Store priv key in slot 0x5
3,157,336 UART: [art] Derive Key Pair - Done
3,172,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,672 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,437 UART: [art] PUB.X = 2C89CA997C4AC79DF8C3363EA03C919C6632D7E5A8209005035839FE871164F72C3FA635B8B2CD267F0B4C9704666DD4
3,195,195 UART: [art] PUB.Y = FF66440435646479A26E0E1DD0A38C8784BD07EE935C5E57DED317D6D9192645CD964A453B5C9CE6C415F734387F2A1B
3,202,138 UART: [art] SIG.R = CA7133649FB4CC2EB2CCA4AD113245A7642557363120C30E493A9D474F559E9E5A859C0460409B1315BE7945E8FD6735
3,208,898 UART: [art] SIG.S = D2DD4AD894115B45D1F3AAB24B12A38A38854224226D46B5CBB66B4D4F635DFDB0391B725A3D13135DA1E94A92B78F9F
3,232,932 UART: Caliptra RT
3,233,275 UART: [state] CFI Enabled
3,352,884 UART: [rt] RT listening for mailbox commands...
3,353,554 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,878 UART: [rt]cmd =0x53574545, len=84
3,385,323 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,543 ready_for_fw is high
1,059,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,915 >>> mbox cmd response: success
2,740,602 UART:
2,740,618 UART: Running Caliptra FMC ...
2,741,026 UART:
2,741,169 UART: [state] CFI Enabled
2,751,941 UART: [fht] FMC Alias Private Key: 7
2,871,419 UART: [art] Extend RT PCRs Done
2,871,847 UART: [art] Lock RT PCRs Done
2,873,439 UART: [art] Populate DV Done
2,881,974 UART: [fht] FMC Alias Private Key: 7
2,883,128 UART: [art] Derive CDI
2,883,408 UART: [art] Store in slot 0x4
2,969,259 UART: [art] Derive Key Pair
2,969,619 UART: [art] Store priv key in slot 0x5
2,983,371 UART: [art] Derive Key Pair - Done
2,998,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,342 UART: [art] PUB.X = AAD4238A1EF0B23296C5CE4B554E15C66FB9B6340B5BFF679C28FE548B5FC59F010C76A0FCD092DC31E212A182C52F2C
3,021,119 UART: [art] PUB.Y = 5367A51490560330879FAE784F8F460F43A7EF80C9DD7F4E741DAB3C8F3417D06326A11AB44F79C860EF12D700F22D14
3,028,041 UART: [art] SIG.R = A0EEC6F9442534CEF5F803DDBDE3506FCD64BA64D328AEF7373F35F304F75608C21EF5B601C970EC258DC92939405F76
3,034,809 UART: [art] SIG.S = F87F4F38525BCB46CF14F8FAA14E62B9593E651D413B0F11169F2D8E40E83B2F74D56CD942D1CF529D1D90C267B61251
3,058,488 UART: Caliptra RT
3,058,831 UART: [state] CFI Enabled
3,179,060 UART: [rt] RT listening for mailbox commands...
3,179,730 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,856 UART: [rt]cmd =0x53574545, len=84
3,211,025 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,826 UART: [kat] SHA2-256
893,476 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,601 UART: [kat] ++
897,753 UART: [kat] sha1
902,141 UART: [kat] SHA2-256
904,081 UART: [kat] SHA2-384
906,778 UART: [kat] SHA2-512-ACC
908,679 UART: [kat] ECC-384
918,406 UART: [kat] HMAC-384Kdf
923,004 UART: [kat] LMS
1,171,332 UART: [kat] --
1,172,377 UART: [cold-reset] ++
1,172,843 UART: [fht] FHT @ 0x50003400
1,175,566 UART: [idev] ++
1,175,734 UART: [idev] CDI.KEYID = 6
1,176,094 UART: [idev] SUBJECT.KEYID = 7
1,176,518 UART: [idev] UDS.KEYID = 0
1,176,863 ready_for_fw is high
1,176,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,474 UART: [idev] Erasing UDS.KEYID = 0
1,201,697 UART: [idev] Sha1 KeyId Algorithm
1,210,295 UART: [idev] --
1,211,153 UART: [ldev] ++
1,211,321 UART: [ldev] CDI.KEYID = 6
1,211,684 UART: [ldev] SUBJECT.KEYID = 5
1,212,110 UART: [ldev] AUTHORITY.KEYID = 7
1,212,573 UART: [ldev] FE.KEYID = 1
1,217,945 UART: [ldev] Erasing FE.KEYID = 1
1,244,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,101 UART: [ldev] --
1,283,572 UART: [fwproc] Wait for Commands...
1,284,248 UART: [fwproc] Recv command 0x46574c44
1,284,976 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,786 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,956 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,353 >>> mbox cmd response: success
2,829,479 UART: [afmc] ++
2,829,647 UART: [afmc] CDI.KEYID = 6
2,830,009 UART: [afmc] SUBJECT.KEYID = 7
2,830,434 UART: [afmc] AUTHORITY.KEYID = 5
2,865,789 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,410 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,158 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,867 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,750 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,451 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,259 UART: [afmc] --
2,909,229 UART: [cold-reset] --
2,910,027 UART: [state] Locking Datavault
2,911,008 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,612 UART: [state] Locking ICCM
2,912,216 UART: [exit] Launching FMC @ 0x40000130
2,917,546 UART:
2,917,562 UART: Running Caliptra FMC ...
2,917,970 UART:
2,918,024 UART: [state] CFI Enabled
2,928,428 UART: [fht] FMC Alias Private Key: 7
3,048,362 UART: [art] Extend RT PCRs Done
3,048,790 UART: [art] Lock RT PCRs Done
3,050,250 UART: [art] Populate DV Done
3,058,365 UART: [fht] FMC Alias Private Key: 7
3,059,319 UART: [art] Derive CDI
3,059,599 UART: [art] Store in slot 0x4
3,145,284 UART: [art] Derive Key Pair
3,145,644 UART: [art] Store priv key in slot 0x5
3,159,038 UART: [art] Derive Key Pair - Done
3,173,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,344 UART: [art] PUB.X = 74807D70B5084FE4720D29F355B690B4F82E29C815FA2AFF8D23A48ACBBD2444035B1AAC87F1A091D1AEBA931779A403
3,197,110 UART: [art] PUB.Y = 8BDFF91600945AB00CE6BDD038DB7A49404B06C9FA23C299BC281F2E13A850004F34BE1C9925757A4658B18A6B0A36F1
3,204,013 UART: [art] SIG.R = F9AB9C8FB523C685F6ABDF1E57820009E8D5DC391F827A29C08C7BC8A0B47874EE39F9698D6245CBCC3BA9522EA267B0
3,210,772 UART: [art] SIG.S = 47B9C4A5E94BDA07B57DAF30F2C1284BAF8CD6D88198E98769F7434A989ED78BB40C585DE36C79A00F48E6DF34490B15
3,234,428 UART: Caliptra RT
3,234,679 UART: [state] CFI Enabled
3,355,011 UART: [rt] RT listening for mailbox commands...
3,355,681 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,773 UART: [rt]cmd =0x53574545, len=84
3,387,200 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,617 ready_for_fw is high
1,059,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,788 >>> mbox cmd response: success
2,741,579 UART:
2,741,595 UART: Running Caliptra FMC ...
2,742,003 UART:
2,742,057 UART: [state] CFI Enabled
2,752,213 UART: [fht] FMC Alias Private Key: 7
2,871,301 UART: [art] Extend RT PCRs Done
2,871,729 UART: [art] Lock RT PCRs Done
2,873,339 UART: [art] Populate DV Done
2,881,798 UART: [fht] FMC Alias Private Key: 7
2,882,816 UART: [art] Derive CDI
2,883,096 UART: [art] Store in slot 0x4
2,968,753 UART: [art] Derive Key Pair
2,969,113 UART: [art] Store priv key in slot 0x5
2,982,477 UART: [art] Derive Key Pair - Done
2,997,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,521 UART: [art] PUB.X = AA69B4298720AF302E78C6276855E97B6F2751565ABA7788E7C7912441378B203E2513BBB276D546F498E13587D12257
3,020,277 UART: [art] PUB.Y = 327A5557C59D7A8A0C800C95F142F7DE79BD579CF83273C42D25F950FBB6288EEFD7A2F408F00523EF12A93C9C14865B
3,027,221 UART: [art] SIG.R = DC672A28372FC3217530F293035464302186344E212A164E66B1A6B404244144A7FC8AF4076A08DAF34F5DC5F3E2691D
3,033,971 UART: [art] SIG.S = 9FEF244388023D275448A5D18D1E10A134D980DE406C088FB80A27CE748A20F5E64D5F5340D7C5577D920C734E660208
3,058,343 UART: Caliptra RT
3,058,594 UART: [state] CFI Enabled
3,177,493 UART: [rt] RT listening for mailbox commands...
3,178,163 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,499 UART: [rt]cmd =0x53574545, len=84
3,209,932 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
893,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,564 UART: [kat] ++
897,716 UART: [kat] sha1
901,822 UART: [kat] SHA2-256
903,762 UART: [kat] SHA2-384
906,595 UART: [kat] SHA2-512-ACC
908,496 UART: [kat] ECC-384
918,239 UART: [kat] HMAC-384Kdf
922,807 UART: [kat] LMS
1,171,135 UART: [kat] --
1,172,112 UART: [cold-reset] ++
1,172,690 UART: [fht] FHT @ 0x50003400
1,175,303 UART: [idev] ++
1,175,471 UART: [idev] CDI.KEYID = 6
1,175,831 UART: [idev] SUBJECT.KEYID = 7
1,176,255 UART: [idev] UDS.KEYID = 0
1,176,600 ready_for_fw is high
1,176,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,081 UART: [idev] Erasing UDS.KEYID = 0
1,201,136 UART: [idev] Sha1 KeyId Algorithm
1,209,580 UART: [idev] --
1,210,574 UART: [ldev] ++
1,210,742 UART: [ldev] CDI.KEYID = 6
1,211,105 UART: [ldev] SUBJECT.KEYID = 5
1,211,531 UART: [ldev] AUTHORITY.KEYID = 7
1,211,994 UART: [ldev] FE.KEYID = 1
1,217,094 UART: [ldev] Erasing FE.KEYID = 1
1,243,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,966 UART: [ldev] --
1,283,433 UART: [fwproc] Wait for Commands...
1,284,191 UART: [fwproc] Recv command 0x46574c44
1,284,919 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,651 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,821 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,086 >>> mbox cmd response: success
2,830,312 UART: [afmc] ++
2,830,480 UART: [afmc] CDI.KEYID = 6
2,830,842 UART: [afmc] SUBJECT.KEYID = 7
2,831,267 UART: [afmc] AUTHORITY.KEYID = 5
2,866,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,005 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,753 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,462 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,345 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,046 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,000 UART: [afmc] --
2,910,120 UART: [cold-reset] --
2,911,152 UART: [state] Locking Datavault
2,912,443 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,047 UART: [state] Locking ICCM
2,913,523 UART: [exit] Launching FMC @ 0x40000130
2,918,853 UART:
2,918,869 UART: Running Caliptra FMC ...
2,919,277 UART:
2,919,420 UART: [state] CFI Enabled
2,929,706 UART: [fht] FMC Alias Private Key: 7
3,048,716 UART: [art] Extend RT PCRs Done
3,049,144 UART: [art] Lock RT PCRs Done
3,050,518 UART: [art] Populate DV Done
3,058,753 UART: [fht] FMC Alias Private Key: 7
3,059,791 UART: [art] Derive CDI
3,060,071 UART: [art] Store in slot 0x4
3,145,986 UART: [art] Derive Key Pair
3,146,346 UART: [art] Store priv key in slot 0x5
3,159,886 UART: [art] Derive Key Pair - Done
3,174,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,965 UART: [art] PUB.X = 29B4C29F2762838E9A5B8EB0DD27A7FC984F787C35271AE4259474EB95DA9A0FA8A28C10513ED266DC843638FA7C5AB3
3,197,740 UART: [art] PUB.Y = 157B172A68C057C52F6A0714F4B686D4C8A728BDE5AE35A41ECE48B191F900457F01EDAAD0DF39E1B40B106D6F31A228
3,204,669 UART: [art] SIG.R = FD8E47A1E769A16BB356D0418CD7DBF7FE4847F383D0015C5DFA9859828822BE14DDF81F69F0E602C31A71D7653A405A
3,211,441 UART: [art] SIG.S = 6D8DC46A854CB3BC76D677A27883F72FC212DFA13D420647A62D1A047BAB1B4598C34B9C759A38A4129F420186424668
3,235,396 UART: Caliptra RT
3,235,739 UART: [state] CFI Enabled
3,354,535 UART: [rt] RT listening for mailbox commands...
3,355,205 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,783 UART: [rt]cmd =0x53574545, len=84
3,387,342 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,236 ready_for_fw is high
1,060,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,603 >>> mbox cmd response: success
2,741,492 UART:
2,741,508 UART: Running Caliptra FMC ...
2,741,916 UART:
2,742,059 UART: [state] CFI Enabled
2,752,619 UART: [fht] FMC Alias Private Key: 7
2,872,069 UART: [art] Extend RT PCRs Done
2,872,497 UART: [art] Lock RT PCRs Done
2,874,039 UART: [art] Populate DV Done
2,882,246 UART: [fht] FMC Alias Private Key: 7
2,883,306 UART: [art] Derive CDI
2,883,586 UART: [art] Store in slot 0x4
2,969,493 UART: [art] Derive Key Pair
2,969,853 UART: [art] Store priv key in slot 0x5
2,983,597 UART: [art] Derive Key Pair - Done
2,998,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,733 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,498 UART: [art] PUB.X = D5791B4E72A3CC91D21E0E930AEC962F140E5B1E8AB0EDCE071268B86A30B6415F6C24B52D7ABCE3C98833891D3DBB9E
3,022,272 UART: [art] PUB.Y = 4D2824105966EB6D5FB1A0793CF3D5967C89925551F61D2FE943FECE7B6E5959A7617E8D3D5CF76542831F28B66FA885
3,029,222 UART: [art] SIG.R = 7EDF5DC01E3FF8489A92BC2DEE7BE188DF50A6125C9B0364892D8FD9D66E289F79C826B16364C36A3692CB798CADFDAD
3,036,007 UART: [art] SIG.S = 6941AA54A74FE7AA30017D6259BF72D0AE26F012847E23D9BFB8DC1BFDD5C2B37C95102D3EC48D24FA4DF7E02943506F
3,059,262 UART: Caliptra RT
3,059,605 UART: [state] CFI Enabled
3,179,386 UART: [rt] RT listening for mailbox commands...
3,180,056 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,600 UART: [rt]cmd =0x53574545, len=84
3,211,979 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,083 UART:
192,433 UART: Running Caliptra ROM ...
193,636 UART:
193,794 UART: [state] CFI Enabled
263,895 UART: [state] LifecycleState = Unprovisioned
265,820 UART: [state] DebugLocked = No
267,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,448 UART: [kat] SHA2-256
442,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,689 UART: [kat] ++
453,130 UART: [kat] sha1
463,009 UART: [kat] SHA2-256
465,666 UART: [kat] SHA2-384
470,379 UART: [kat] SHA2-512-ACC
472,695 UART: [kat] ECC-384
2,769,163 UART: [kat] HMAC-384Kdf
2,802,055 UART: [kat] LMS
3,992,355 UART: [kat] --
3,997,741 UART: [cold-reset] ++
3,998,967 UART: [fht] Storing FHT @ 0x50003400
4,011,445 UART: [idev] ++
4,012,013 UART: [idev] CDI.KEYID = 6
4,012,906 UART: [idev] SUBJECT.KEYID = 7
4,014,158 UART: [idev] UDS.KEYID = 0
4,015,205 ready_for_fw is high
4,015,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,543 UART: [idev] Erasing UDS.KEYID = 0
7,347,352 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,291 UART: [idev] --
7,373,292 UART: [ldev] ++
7,373,893 UART: [ldev] CDI.KEYID = 6
7,374,808 UART: [ldev] SUBJECT.KEYID = 5
7,376,027 UART: [ldev] AUTHORITY.KEYID = 7
7,377,264 UART: [ldev] FE.KEYID = 1
7,422,913 UART: [ldev] Erasing FE.KEYID = 1
10,759,475 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,918 UART: [ldev] --
13,138,827 UART: [fwproc] Waiting for Commands...
13,140,973 UART: [fwproc] Received command 0x46574c44
13,143,155 UART: [fwproc] Received Image of size 118548 bytes
17,238,607 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,311,769 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,384,971 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,712,981 >>> mbox cmd response: success
17,717,115 UART: [afmc] ++
17,717,732 UART: [afmc] CDI.KEYID = 6
17,718,647 UART: [afmc] SUBJECT.KEYID = 7
17,719,918 UART: [afmc] AUTHORITY.KEYID = 5
21,073,411 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,912 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,376,181 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,390,628 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,405,369 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,419,746 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,441,274 UART: [afmc] --
23,445,036 UART: [cold-reset] --
23,448,953 UART: [state] Locking Datavault
23,455,225 UART: [state] Locking PCR0, PCR1 and PCR31
23,456,952 UART: [state] Locking ICCM
23,458,834 UART: [exit] Launching FMC @ 0x40000130
23,467,188 UART:
23,467,421 UART: Running Caliptra FMC ...
23,468,522 UART:
23,468,686 UART: [state] CFI Enabled
23,535,356 UART: [fht] FMC Alias Private Key: 7
25,876,537 UART: [art] Extend RT PCRs Done
25,877,758 UART: [art] Lock RT PCRs Done
25,879,308 UART: [art] Populate DV Done
25,884,720 UART: [fht] FMC Alias Private Key: 7
25,886,202 UART: [art] Derive CDI
25,886,964 UART: [art] Store in slot 0x4
25,944,649 UART: [art] Derive Key Pair
25,945,695 UART: [art] Store priv key in slot 0x5
29,238,151 UART: [art] Derive Key Pair - Done
29,250,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,489 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,995 UART: [art] PUB.X = 4556E8A26897B604893C1133D7750FA879D6CB94FD512AC73F963A6FC586FB9B470230BABF3222C1EC6837033C3F3A98
31,549,215 UART: [art] PUB.Y = 4125465ABB2A5945D1CF69962AEAA0739F48CD942528ADCF3738A59B0D5E996918323D449C86310F1F4F881353616B40
31,556,477 UART: [art] SIG.R = 528440F49C9D5B85DAFC2FEC8715FDFD7F13214F0E17D5E8AB63EC425EDCFF7934CBF9A222CFA5472C4B5CE58559A02E
31,563,892 UART: [art] SIG.S = E9D9E6150CB76645A861B174EBE99F9D464DDEEFFFFF6E9B67DF4D5B1575931B4DD65641CF8278BE73CA29E6452BF1FC
32,868,855 UART: Caliptra RT
32,869,566 UART: [state] CFI Enabled
33,046,565 UART: [rt] RT listening for mailbox commands...
33,048,463 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,079,226 UART: [rt]cmd =0x4d454153, len=108
33,081,241 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,805,414 ready_for_fw is high
3,805,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,964,500 >>> mbox cmd response: success
23,645,791 UART:
23,646,206 UART: Running Caliptra FMC ...
23,647,319 UART:
23,647,472 UART: [state] CFI Enabled
23,715,819 UART: [fht] FMC Alias Private Key: 7
26,056,450 UART: [art] Extend RT PCRs Done
26,057,687 UART: [art] Lock RT PCRs Done
26,059,185 UART: [art] Populate DV Done
26,064,667 UART: [fht] FMC Alias Private Key: 7
26,066,319 UART: [art] Derive CDI
26,067,057 UART: [art] Store in slot 0x4
26,124,497 UART: [art] Derive Key Pair
26,125,535 UART: [art] Store priv key in slot 0x5
29,417,757 UART: [art] Derive Key Pair - Done
29,430,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,718,728 UART: [art] Erasing AUTHORITY.KEYID = 7
31,720,232 UART: [art] PUB.X = 38359B7A4E8FEC0AF3A082D6B1127322AB585CAD9907C29C7DA9B1B20E466509859F6AC5EEAD8C9C59B8842BEDD5F7EF
31,727,483 UART: [art] PUB.Y = E82F9A9F9AB69526C4256B8BCA80D043889D002F102A14FD1CC9424C8F16F18956FDD0B6576EB2A1D17E83E43D9EC9EC
31,734,755 UART: [art] SIG.R = E99ADAC9258616B7E616E72429E0AB1FA51F615CF57F9A0C38F298060FC01C0BD5606FE3D76895F674649288B9A0F187
31,742,159 UART: [art] SIG.S = BCCFCAEB9B9F97CEA1E91C6883F0E312A212F019EE80B1AA961D1141CA9E23AD5A950781E48EFEB7828C9981A8ECBA5A
33,048,073 UART: Caliptra RT
33,048,812 UART: [state] CFI Enabled
33,244,998 UART: [rt] RT listening for mailbox commands...
33,246,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,277,664 UART: [rt]cmd =0x4d454153, len=108
33,279,673 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,501 UART:
192,877 UART: Running Caliptra ROM ...
193,980 UART:
603,872 UART: [state] CFI Enabled
619,640 UART: [state] LifecycleState = Unprovisioned
621,546 UART: [state] DebugLocked = No
623,134 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,587 UART: [kat] SHA2-256
798,372 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,898 UART: [kat] ++
809,534 UART: [kat] sha1
820,412 UART: [kat] SHA2-256
823,062 UART: [kat] SHA2-384
827,911 UART: [kat] SHA2-512-ACC
830,272 UART: [kat] ECC-384
3,112,843 UART: [kat] HMAC-384Kdf
3,123,905 UART: [kat] LMS
4,313,975 UART: [kat] --
4,320,026 UART: [cold-reset] ++
4,322,313 UART: [fht] Storing FHT @ 0x50003400
4,333,787 UART: [idev] ++
4,334,351 UART: [idev] CDI.KEYID = 6
4,335,330 UART: [idev] SUBJECT.KEYID = 7
4,336,589 UART: [idev] UDS.KEYID = 0
4,337,649 ready_for_fw is high
4,337,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,789 UART: [idev] Erasing UDS.KEYID = 0
7,624,769 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,727 UART: [idev] --
7,649,063 UART: [ldev] ++
7,649,635 UART: [ldev] CDI.KEYID = 6
7,650,567 UART: [ldev] SUBJECT.KEYID = 5
7,651,845 UART: [ldev] AUTHORITY.KEYID = 7
7,653,092 UART: [ldev] FE.KEYID = 1
7,666,738 UART: [ldev] Erasing FE.KEYID = 1
10,957,789 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,116 UART: [ldev] --
13,317,653 UART: [fwproc] Waiting for Commands...
13,320,231 UART: [fwproc] Received command 0x46574c44
13,322,409 UART: [fwproc] Received Image of size 118548 bytes
17,428,176 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,510,116 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,583,302 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,912,366 >>> mbox cmd response: success
17,916,536 UART: [afmc] ++
17,917,177 UART: [afmc] CDI.KEYID = 6
17,918,085 UART: [afmc] SUBJECT.KEYID = 7
17,919,294 UART: [afmc] AUTHORITY.KEYID = 5
21,236,068 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,529,774 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,532,030 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,546,494 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,561,187 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,575,650 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,595,927 UART: [afmc] --
23,600,498 UART: [cold-reset] --
23,603,272 UART: [state] Locking Datavault
23,609,214 UART: [state] Locking PCR0, PCR1 and PCR31
23,610,975 UART: [state] Locking ICCM
23,613,669 UART: [exit] Launching FMC @ 0x40000130
23,622,059 UART:
23,622,293 UART: Running Caliptra FMC ...
23,623,386 UART:
23,623,539 UART: [state] CFI Enabled
23,631,774 UART: [fht] FMC Alias Private Key: 7
25,972,391 UART: [art] Extend RT PCRs Done
25,973,598 UART: [art] Lock RT PCRs Done
25,975,127 UART: [art] Populate DV Done
25,980,914 UART: [fht] FMC Alias Private Key: 7
25,982,402 UART: [art] Derive CDI
25,983,159 UART: [art] Store in slot 0x4
26,026,119 UART: [art] Derive Key Pair
26,027,114 UART: [art] Store priv key in slot 0x5
29,268,933 UART: [art] Derive Key Pair - Done
29,282,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,562,196 UART: [art] Erasing AUTHORITY.KEYID = 7
31,563,700 UART: [art] PUB.X = 971198E9BB4FE51D10F4728DCEF4A3BB100F88226A24BC7EBA7C51BD9363A449C01A746D3141DEE00D97D608657A189D
31,571,142 UART: [art] PUB.Y = 7E6D57CC9E873FCE72E18D203E1796D5C120872FCD6646955B5DD474BB4FC2C9F1E3059FB946420556DE01B7D25C0C7D
31,578,252 UART: [art] SIG.R = 38016D5898614898A2FF5002CE2BE43677AF4E5DFB9DAA4CB37137F21CECE8904D465F10A782E603D0F71142C39588D0
31,585,652 UART: [art] SIG.S = 4EDCE85BD7A4AFE23894EF4D7F244CC0ED5B66C067AD310A0CBDA891259BF5503EBAB01DC86679B3E334B011C5D9AF63
32,890,558 UART: Caliptra RT
32,891,269 UART: [state] CFI Enabled
33,024,495 UART: [rt] RT listening for mailbox commands...
33,026,403 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,057,212 UART: [rt]cmd =0x4d454153, len=108
33,059,120 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,124,443 ready_for_fw is high
4,124,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,097 >>> mbox cmd response: success
23,794,371 UART:
23,794,764 UART: Running Caliptra FMC ...
23,796,085 UART:
23,796,271 UART: [state] CFI Enabled
23,803,727 UART: [fht] FMC Alias Private Key: 7
26,143,744 UART: [art] Extend RT PCRs Done
26,144,973 UART: [art] Lock RT PCRs Done
26,146,896 UART: [art] Populate DV Done
26,152,462 UART: [fht] FMC Alias Private Key: 7
26,154,061 UART: [art] Derive CDI
26,154,800 UART: [art] Store in slot 0x4
26,197,601 UART: [art] Derive Key Pair
26,198,596 UART: [art] Store priv key in slot 0x5
29,440,476 UART: [art] Derive Key Pair - Done
29,453,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,757 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,263 UART: [art] PUB.X = D50B59DE5BA083953839E038A3E9B6FA25867607ACD43A7E50527E73519B90B55D8E23516F48D56E5A9D0EEC5815994A
31,743,511 UART: [art] PUB.Y = 781B359915726A1BA3DE954C585EAA2E6C2E0CE24F73050276ACE9A52FCA360DC1FA53B4AD4BBC80A4660455101F239B
31,750,791 UART: [art] SIG.R = 149E3E87F107F8B5E987B8CBEA838937813CC4C831F15863C819871DF8053B628CDA0EC6DE03F26C97DC0A5F2E562A23
31,758,208 UART: [art] SIG.S = F7369BE3CDF8F29B08A2AF4BCFF58BD9267B4B6EC28C878EABCCF3A4A3B30CA145925F18A35C7366DF2B1B48C9F5B110
33,062,918 UART: Caliptra RT
33,063,624 UART: [state] CFI Enabled
33,196,804 UART: [rt] RT listening for mailbox commands...
33,198,694 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,229,563 UART: [rt]cmd =0x4d454153, len=108
33,231,358 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
879 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,908 writing to cptra_bootfsm_go
193,014 UART:
193,371 UART: Running Caliptra ROM ...
194,550 UART:
194,707 UART: [state] CFI Enabled
263,199 UART: [state] LifecycleState = Unprovisioned
265,115 UART: [state] DebugLocked = No
267,001 UART: [state] WD Timer not started. Device not locked for debugging
270,044 UART: [kat] SHA2-256
449,694 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,464 UART: [kat] ++
460,942 UART: [kat] sha1
470,676 UART: [kat] SHA2-256
473,395 UART: [kat] SHA2-384
478,597 UART: [kat] SHA2-512-ACC
481,018 UART: [kat] ECC-384
2,925,550 UART: [kat] HMAC-384Kdf
2,949,660 UART: [kat] LMS
3,426,208 UART: [kat] --
3,429,656 UART: [cold-reset] ++
3,432,013 UART: [fht] FHT @ 0x50003400
3,444,865 UART: [idev] ++
3,445,483 UART: [idev] CDI.KEYID = 6
3,446,368 UART: [idev] SUBJECT.KEYID = 7
3,447,616 UART: [idev] UDS.KEYID = 0
3,448,587 ready_for_fw is high
3,448,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,703 UART: [idev] Erasing UDS.KEYID = 0
5,964,859 UART: [idev] Sha1 KeyId Algorithm
5,989,002 UART: [idev] --
5,994,218 UART: [ldev] ++
5,994,841 UART: [ldev] CDI.KEYID = 6
5,995,745 UART: [ldev] SUBJECT.KEYID = 5
5,996,951 UART: [ldev] AUTHORITY.KEYID = 7
5,998,177 UART: [ldev] FE.KEYID = 1
6,035,401 UART: [ldev] Erasing FE.KEYID = 1
8,542,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,360 UART: [ldev] --
10,353,218 UART: [fwproc] Wait for Commands...
10,354,874 UART: [fwproc] Recv command 0x46574c44
10,356,855 UART: [fwproc] Recv'd Img size: 118548 bytes
13,835,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,915,190 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,988,217 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,317,031 >>> mbox cmd response: success
14,320,442 UART: [afmc] ++
14,321,073 UART: [afmc] CDI.KEYID = 6
14,321,964 UART: [afmc] SUBJECT.KEYID = 7
14,323,239 UART: [afmc] AUTHORITY.KEYID = 5
16,854,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,392 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,613,181 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,629,269 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,644,850 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,669,474 UART: [afmc] --
18,673,995 UART: [cold-reset] --
18,677,582 UART: [state] Locking Datavault
18,683,903 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,650 UART: [state] Locking ICCM
18,687,039 UART: [exit] Launching FMC @ 0x40000130
18,695,440 UART:
18,695,670 UART: Running Caliptra FMC ...
18,696,765 UART:
18,696,918 UART: [state] CFI Enabled
18,754,679 UART: [fht] FMC Alias Private Key: 7
20,521,066 UART: [art] Extend RT PCRs Done
20,522,294 UART: [art] Lock RT PCRs Done
20,523,946 UART: [art] Populate DV Done
20,529,414 UART: [fht] FMC Alias Private Key: 7
20,530,914 UART: [art] Derive CDI
20,531,677 UART: [art] Store in slot 0x4
20,586,739 UART: [art] Derive Key Pair
20,587,770 UART: [art] Store priv key in slot 0x5
23,050,912 UART: [art] Derive Key Pair - Done
23,063,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,298 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,801 UART: [art] PUB.X = D8CF3FF9E18C6B1BFF98ED929F46B982FA621610A48BAFCE298DC2997F252D31088687AC1C6FFBA8E30B00E5E52B8AEB
24,785,053 UART: [art] PUB.Y = 2DF855986875D4D882329EDFD62E82E6763C8B6A9D71F76C52A6B7EF2F10A632C1D3D2B02F3951CE4644A66D9EAE3574
24,792,354 UART: [art] SIG.R = FAD9E8BAAA030A24CC759BB68A7071135A398B9F8E583512F7630AD35781E055769B1CECCBE28A79870E9DC617C2D540
24,799,744 UART: [art] SIG.S = 0C4C58BC4F41BA110A2A5FEABF9024CE279912D3397649ECBAF3D21BB43BC344E1B0CF06E20423D4526B684267257543
25,778,452 UART: Caliptra RT
25,779,151 UART: [state] CFI Enabled
25,959,488 UART: [rt] RT listening for mailbox commands...
25,961,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,992,288 UART: [rt]cmd =0x4d454153, len=108
25,994,428 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,460,915 ready_for_fw is high
3,461,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,232,350 >>> mbox cmd response: success
18,515,043 UART:
18,515,460 UART: Running Caliptra FMC ...
18,516,667 UART:
18,516,837 UART: [state] CFI Enabled
18,584,985 UART: [fht] FMC Alias Private Key: 7
20,351,411 UART: [art] Extend RT PCRs Done
20,352,635 UART: [art] Lock RT PCRs Done
20,354,395 UART: [art] Populate DV Done
20,359,814 UART: [fht] FMC Alias Private Key: 7
20,361,353 UART: [art] Derive CDI
20,362,169 UART: [art] Store in slot 0x4
20,417,648 UART: [art] Derive Key Pair
20,418,693 UART: [art] Store priv key in slot 0x5
22,881,707 UART: [art] Derive Key Pair - Done
22,894,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,279 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,781 UART: [art] PUB.X = F69B302147A181DA301A4D83AC8CE7D25F235F29EF337206CDD8CC2A883C4B0F4DF039572E0BA146FCC0F58B1F64638C
24,616,109 UART: [art] PUB.Y = FBA82DD1D81EE8F9791ECDF0E90CD9F500B8975105824EE47465E67637DA91DAAF1000903BABD74CDA449EC2C2F2644D
24,623,310 UART: [art] SIG.R = 71224520F3671ECDC20ED1270A83E68B47E067A6F9E47D179A59F2619520436D7A1F52E64197C15EA5AC7CEC372AA0B2
24,630,659 UART: [art] SIG.S = 2144E1C1BFDCF5595E67D737AA2E82937375897ABDBF6275A5556844B8A0A05E7E4426F7ECE267248558FB15B31841B4
25,608,935 UART: Caliptra RT
25,609,650 UART: [state] CFI Enabled
25,790,864 UART: [rt] RT listening for mailbox commands...
25,792,759 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,823,635 UART: [rt]cmd =0x4d454153, len=108
25,825,322 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,611 UART:
192,966 UART: Running Caliptra ROM ...
194,147 UART:
603,751 UART: [state] CFI Enabled
615,420 UART: [state] LifecycleState = Unprovisioned
617,353 UART: [state] DebugLocked = No
619,240 UART: [state] WD Timer not started. Device not locked for debugging
623,008 UART: [kat] SHA2-256
802,617 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,440 UART: [kat] ++
813,890 UART: [kat] sha1
825,759 UART: [kat] SHA2-256
828,421 UART: [kat] SHA2-384
834,911 UART: [kat] SHA2-512-ACC
837,283 UART: [kat] ECC-384
3,278,158 UART: [kat] HMAC-384Kdf
3,288,900 UART: [kat] LMS
3,765,372 UART: [kat] --
3,768,888 UART: [cold-reset] ++
3,771,180 UART: [fht] FHT @ 0x50003400
3,781,089 UART: [idev] ++
3,781,655 UART: [idev] CDI.KEYID = 6
3,782,723 UART: [idev] SUBJECT.KEYID = 7
3,783,832 UART: [idev] UDS.KEYID = 0
3,784,786 ready_for_fw is high
3,785,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,934,024 UART: [idev] Erasing UDS.KEYID = 0
6,263,962 UART: [idev] Sha1 KeyId Algorithm
6,287,142 UART: [idev] --
6,292,540 UART: [ldev] ++
6,293,211 UART: [ldev] CDI.KEYID = 6
6,294,101 UART: [ldev] SUBJECT.KEYID = 5
6,295,270 UART: [ldev] AUTHORITY.KEYID = 7
6,296,564 UART: [ldev] FE.KEYID = 1
6,307,508 UART: [ldev] Erasing FE.KEYID = 1
8,784,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,111 UART: [ldev] --
10,578,048 UART: [fwproc] Wait for Commands...
10,580,310 UART: [fwproc] Recv command 0x46574c44
10,582,349 UART: [fwproc] Recv'd Img size: 118548 bytes
14,062,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,845 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,902 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,855 >>> mbox cmd response: success
14,549,319 UART: [afmc] ++
14,549,916 UART: [afmc] CDI.KEYID = 6
14,550,834 UART: [afmc] SUBJECT.KEYID = 7
14,552,053 UART: [afmc] AUTHORITY.KEYID = 5
17,054,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,362 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,187 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,264 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,860 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,607 UART: [afmc] --
18,856,405 UART: [cold-reset] --
18,859,193 UART: [state] Locking Datavault
18,863,581 UART: [state] Locking PCR0, PCR1 and PCR31
18,865,281 UART: [state] Locking ICCM
18,866,677 UART: [exit] Launching FMC @ 0x40000130
18,875,072 UART:
18,875,320 UART: Running Caliptra FMC ...
18,876,422 UART:
18,876,584 UART: [state] CFI Enabled
18,884,686 UART: [fht] FMC Alias Private Key: 7
20,650,471 UART: [art] Extend RT PCRs Done
20,651,687 UART: [art] Lock RT PCRs Done
20,653,363 UART: [art] Populate DV Done
20,658,883 UART: [fht] FMC Alias Private Key: 7
20,660,399 UART: [art] Derive CDI
20,661,141 UART: [art] Store in slot 0x4
20,703,733 UART: [art] Derive Key Pair
20,704,768 UART: [art] Store priv key in slot 0x5
23,132,482 UART: [art] Derive Key Pair - Done
23,145,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,424 UART: [art] Erasing AUTHORITY.KEYID = 7
24,853,933 UART: [art] PUB.X = 8285D1E812D3E6D977F1C3AEF483A5A53070F5D2E6A3A9276C484ECA12239075547AEBA16F142CD04AEFC371FEBB349B
24,861,171 UART: [art] PUB.Y = FF0449539225559F0F43F6D075B75053A8E20A05A564ED5BB03CC1047ACD6179635750E07AD616B0ACD40F6F6394C2F9
24,868,454 UART: [art] SIG.R = 19376990F5A9C6D5C9B56C63FE6697493440E3390D8C7D7375711C6A53A403FB96ADBA3323AC8118122A269B67FDA649
24,875,798 UART: [art] SIG.S = 6D81AEEA2B8F9B8D4959E1B4CDD7FFBD7F1748E6F3FD9048A907579B016BC63A6FF2837EEAA34DCE36FF1D4B78186B89
25,854,713 UART: Caliptra RT
25,855,417 UART: [state] CFI Enabled
25,987,021 UART: [rt] RT listening for mailbox commands...
25,988,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,019,507 UART: [rt]cmd =0x4d454153, len=108
26,021,380 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
3,788,580 ready_for_fw is high
3,788,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,459,649 >>> mbox cmd response: success
18,703,644 UART:
18,704,058 UART: Running Caliptra FMC ...
18,705,227 UART:
18,705,391 UART: [state] CFI Enabled
18,713,182 UART: [fht] FMC Alias Private Key: 7
20,478,879 UART: [art] Extend RT PCRs Done
20,480,120 UART: [art] Lock RT PCRs Done
20,481,972 UART: [art] Populate DV Done
20,487,498 UART: [fht] FMC Alias Private Key: 7
20,489,097 UART: [art] Derive CDI
20,489,920 UART: [art] Store in slot 0x4
20,532,567 UART: [art] Derive Key Pair
20,533,572 UART: [art] Store priv key in slot 0x5
22,960,062 UART: [art] Derive Key Pair - Done
22,972,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,678,716 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,218 UART: [art] PUB.X = 9D0B5722951B85732815F40C0C2A014EDDB00E43D4371D4A80FD3530B439A12310525859E49113A53A789DBA7693F6EC
24,687,426 UART: [art] PUB.Y = A52F4F5D652A93FD3B1763E8E40718D9BEA0323E6203FE7E4DF99A2F18EB6B0F9291B2AA517481DE59314197CE93E739
24,694,678 UART: [art] SIG.R = B17BEB4387CA920FB391FF225353BC701DADBC302DFF409DBB4CE9D4FE54ED8301D3E5BA4CA33B896616D40E29818929
24,702,080 UART: [art] SIG.S = F5D27EF5B1FA94C78E725D8879B0157DEA55552B4FF9F3E111E8CB8CA158DD706549D6D428EEE92F92787EB45D7555E2
25,681,013 UART: Caliptra RT
25,681,732 UART: [state] CFI Enabled
25,815,014 UART: [rt] RT listening for mailbox commands...
25,816,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,847,903 UART: [rt]cmd =0x4d454153, len=108
25,849,675 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,015 UART:
192,425 UART: Running Caliptra ROM ...
193,574 UART:
193,741 UART: [state] CFI Enabled
266,099 UART: [state] LifecycleState = Unprovisioned
268,513 UART: [state] DebugLocked = No
270,609 UART: [state] WD Timer not started. Device not locked for debugging
275,426 UART: [kat] SHA2-256
465,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,062 UART: [kat] ++
476,549 UART: [kat] sha1
488,344 UART: [kat] SHA2-256
491,417 UART: [kat] SHA2-384
496,414 UART: [kat] SHA2-512-ACC
498,993 UART: [kat] ECC-384
2,949,496 UART: [kat] HMAC-384Kdf
2,973,108 UART: [kat] LMS
3,504,853 UART: [kat] --
3,510,347 UART: [cold-reset] ++
3,512,728 UART: [fht] FHT @ 0x50003400
3,524,771 UART: [idev] ++
3,525,404 UART: [idev] CDI.KEYID = 6
3,526,358 UART: [idev] SUBJECT.KEYID = 7
3,527,598 UART: [idev] UDS.KEYID = 0
3,528,490 ready_for_fw is high
3,528,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,784 UART: [idev] Erasing UDS.KEYID = 0
6,030,552 UART: [idev] Sha1 KeyId Algorithm
6,054,151 UART: [idev] --
6,059,099 UART: [ldev] ++
6,059,790 UART: [ldev] CDI.KEYID = 6
6,060,704 UART: [ldev] SUBJECT.KEYID = 5
6,061,862 UART: [ldev] AUTHORITY.KEYID = 7
6,063,091 UART: [ldev] FE.KEYID = 1
6,100,745 UART: [ldev] Erasing FE.KEYID = 1
8,624,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,355,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,386,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,422,881 UART: [ldev] --
10,427,982 UART: [fwproc] Wait for Commands...
10,430,723 UART: [fwproc] Recv command 0x46574c44
10,433,035 UART: [fwproc] Recv'd Img size: 118548 bytes
13,932,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,013,715 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,137,331 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,697,197 >>> mbox cmd response: success
14,701,075 UART: [afmc] ++
14,701,807 UART: [afmc] CDI.KEYID = 6
14,703,052 UART: [afmc] SUBJECT.KEYID = 7
14,704,516 UART: [afmc] AUTHORITY.KEYID = 5
17,247,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,972,230 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,974,140 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,989,277 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,004,396 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,019,331 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,043,107 UART: [afmc] --
19,046,103 UART: [cold-reset] --
19,049,483 UART: [state] Locking Datavault
19,055,180 UART: [state] Locking PCR0, PCR1 and PCR31
19,057,331 UART: [state] Locking ICCM
19,059,970 UART: [exit] Launching FMC @ 0x40000130
19,068,592 UART:
19,068,825 UART: Running Caliptra FMC ...
19,069,925 UART:
19,070,108 UART: [state] CFI Enabled
19,128,810 UART: [fht] FMC Alias Private Key: 7
20,895,101 UART: [art] Extend RT PCRs Done
20,896,318 UART: [art] Lock RT PCRs Done
20,897,833 UART: [art] Populate DV Done
20,903,298 UART: [fht] FMC Alias Private Key: 7
20,904,779 UART: [art] Derive CDI
20,905,535 UART: [art] Store in slot 0x4
20,961,376 UART: [art] Derive Key Pair
20,962,418 UART: [art] Store priv key in slot 0x5
23,425,521 UART: [art] Derive Key Pair - Done
23,438,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,151,733 UART: [art] Erasing AUTHORITY.KEYID = 7
25,153,240 UART: [art] PUB.X = 4B2D1E34C8FAE80C67B06126F2A1739376EAC148687C970031F094674B2F28E3768735D7470B7B5F18B7312A7CF1E962
25,160,479 UART: [art] PUB.Y = A4C23B56F76768CD01454B47001F6AEA719616061C1EB0B726ED34DB5EA269BD9EDEFEC0252D78924B85CC1BEE0BEE2A
25,167,749 UART: [art] SIG.R = A4C844DB0E92E14B2EAE293E4FC4DEFBD84382CEC300EC2A83392B4E6CAEE8F2B1A45E4404B7BFBE8721415EDB892B8C
25,175,148 UART: [art] SIG.S = A60C067541E14CF0311BD1102482C4093E344BB619EE54BB695682055AE6EA2C07B198BCBAF9AAA78AE22AD3BCE47909
26,153,989 UART: Caliptra RT
26,154,701 UART: [state] CFI Enabled
26,336,020 UART: [rt] RT listening for mailbox commands...
26,337,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,368,676 UART: [rt]cmd =0x4d454153, len=108
26,370,551 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,413 writing to cptra_bootfsm_go
3,428,361 ready_for_fw is high
3,429,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,799,772 >>> mbox cmd response: success
19,081,452 UART:
19,081,836 UART: Running Caliptra FMC ...
19,082,945 UART:
19,083,097 UART: [state] CFI Enabled
19,149,182 UART: [fht] FMC Alias Private Key: 7
20,915,744 UART: [art] Extend RT PCRs Done
20,916,970 UART: [art] Lock RT PCRs Done
20,918,926 UART: [art] Populate DV Done
20,924,127 UART: [fht] FMC Alias Private Key: 7
20,925,664 UART: [art] Derive CDI
20,926,478 UART: [art] Store in slot 0x4
20,982,014 UART: [art] Derive Key Pair
20,983,062 UART: [art] Store priv key in slot 0x5
23,446,129 UART: [art] Derive Key Pair - Done
23,459,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,172,308 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,820 UART: [art] PUB.X = 7720B21228A9B341551FD653EC5ACABAA5109BE2F96B28E80EB4815022E20FE18725A20DC9F2AA3445EF736DDBBD14C8
25,181,093 UART: [art] PUB.Y = A5276180CF39061D7D3695356D2D2725706FD89E87989086BD770247B805BD04B9BA5CBF948941BFDC826B2712AEDB7E
25,188,346 UART: [art] SIG.R = 9F1B4B65FFA39AC139F1AD7634E5519ADB18199F804039EB6EC3172DAF36628B3964DEBACFFFD5B2A3EABD2761325CD1
25,195,719 UART: [art] SIG.S = 69E303304FA55FC9217B5987C1B9EE02CC575DF00D0C6DE2675AC7423475633C57FF262DDFA3B565B46F84FA1A29C5D4
26,174,557 UART: Caliptra RT
26,175,244 UART: [state] CFI Enabled
26,355,577 UART: [rt] RT listening for mailbox commands...
26,357,473 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,388,264 UART: [rt]cmd =0x4d454153, len=108
26,390,272 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,461 UART:
192,829 UART: Running Caliptra ROM ...
194,033 UART:
603,564 UART: [state] CFI Enabled
617,174 UART: [state] LifecycleState = Unprovisioned
619,557 UART: [state] DebugLocked = No
621,787 UART: [state] WD Timer not started. Device not locked for debugging
625,910 UART: [kat] SHA2-256
815,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,563 UART: [kat] ++
827,086 UART: [kat] sha1
837,535 UART: [kat] SHA2-256
840,543 UART: [kat] SHA2-384
846,325 UART: [kat] SHA2-512-ACC
848,910 UART: [kat] ECC-384
3,288,623 UART: [kat] HMAC-384Kdf
3,301,014 UART: [kat] LMS
3,832,810 UART: [kat] --
3,837,094 UART: [cold-reset] ++
3,838,694 UART: [fht] FHT @ 0x50003400
3,850,602 UART: [idev] ++
3,851,315 UART: [idev] CDI.KEYID = 6
3,852,269 UART: [idev] SUBJECT.KEYID = 7
3,853,441 UART: [idev] UDS.KEYID = 0
3,854,343 ready_for_fw is high
3,854,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,469 UART: [idev] Erasing UDS.KEYID = 0
6,332,068 UART: [idev] Sha1 KeyId Algorithm
6,355,900 UART: [idev] --
6,361,246 UART: [ldev] ++
6,361,931 UART: [ldev] CDI.KEYID = 6
6,362,817 UART: [ldev] SUBJECT.KEYID = 5
6,364,036 UART: [ldev] AUTHORITY.KEYID = 7
6,365,276 UART: [ldev] FE.KEYID = 1
6,377,252 UART: [ldev] Erasing FE.KEYID = 1
8,850,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,367 UART: [ldev] --
10,641,349 UART: [fwproc] Wait for Commands...
10,642,907 UART: [fwproc] Recv command 0x46574c44
10,645,166 UART: [fwproc] Recv'd Img size: 118548 bytes
14,139,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,989 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,636 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,917 >>> mbox cmd response: success
14,911,122 UART: [afmc] ++
14,911,852 UART: [afmc] CDI.KEYID = 6
14,913,052 UART: [afmc] SUBJECT.KEYID = 7
14,914,527 UART: [afmc] AUTHORITY.KEYID = 5
17,420,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,697 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,817 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,962 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,859 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,105 UART: [afmc] --
19,218,087 UART: [cold-reset] --
19,221,320 UART: [state] Locking Datavault
19,225,456 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,617 UART: [state] Locking ICCM
19,229,651 UART: [exit] Launching FMC @ 0x40000130
19,238,292 UART:
19,238,531 UART: Running Caliptra FMC ...
19,239,560 UART:
19,239,730 UART: [state] CFI Enabled
19,247,897 UART: [fht] FMC Alias Private Key: 7
21,013,919 UART: [art] Extend RT PCRs Done
21,015,638 UART: [art] Lock RT PCRs Done
21,016,669 UART: [art] Populate DV Done
21,022,060 UART: [fht] FMC Alias Private Key: 7
21,023,773 UART: [art] Derive CDI
21,024,600 UART: [art] Store in slot 0x4
21,067,035 UART: [art] Derive Key Pair
21,068,079 UART: [art] Store priv key in slot 0x5
23,494,933 UART: [art] Derive Key Pair - Done
23,508,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,074 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,601 UART: [art] PUB.X = 56F7435A50A4507266DAE33E208CFF0E915B146F8B8163F5B3C02390720AB75A931A783B60CC66FE94564BD535776C18
25,222,807 UART: [art] PUB.Y = 4F3537223082D3918A383014F70F06535CA640F0A3AC288FC8DBCB2B4F151367F06C64F6D7FC9BB236F1543F2EA1BF02
25,230,075 UART: [art] SIG.R = DE68757DC16948F7CBB3313388DB83800F52A2A0FFBB65EFE9CA696418AF0AAD0EFC74248173C6C92C89C233F26DF90F
25,237,481 UART: [art] SIG.S = C67D2710156884211E1FF17A2470D53B7253DA7E562EAF4AC531A963D2554374CB6E16C9B44BCBBE47D98F3E026B57AA
26,217,054 UART: Caliptra RT
26,217,771 UART: [state] CFI Enabled
26,350,570 UART: [rt] RT listening for mailbox commands...
26,352,471 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,383,426 UART: [rt]cmd =0x4d454153, len=108
26,385,384 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
3,760,116 ready_for_fw is high
3,760,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,057,306 >>> mbox cmd response: success
19,310,752 UART:
19,311,147 UART: Running Caliptra FMC ...
19,312,263 UART:
19,312,417 UART: [state] CFI Enabled
19,320,594 UART: [fht] FMC Alias Private Key: 7
21,086,681 UART: [art] Extend RT PCRs Done
21,087,918 UART: [art] Lock RT PCRs Done
21,089,422 UART: [art] Populate DV Done
21,094,905 UART: [fht] FMC Alias Private Key: 7
21,096,571 UART: [art] Derive CDI
21,097,314 UART: [art] Store in slot 0x4
21,140,409 UART: [art] Derive Key Pair
21,141,456 UART: [art] Store priv key in slot 0x5
23,568,138 UART: [art] Derive Key Pair - Done
23,581,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,287,547 UART: [art] Erasing AUTHORITY.KEYID = 7
25,289,051 UART: [art] PUB.X = 1FFC279EE669E744E6155EE4BC12E801F12D68CFF9CC981E38DEF7D04FECDB507E81B7EFB624010872A4333A8A233D4F
25,296,314 UART: [art] PUB.Y = A22009058226EB547C4F1E73CD0BDF9BE39BD9EBC5D608D88C6EF01BC737B544AC68FEF7E0EA55E442F27F28FD1158AD
25,303,605 UART: [art] SIG.R = 2B4AF2168283FF14FBBA41B4E842DB9D394EDB29021DFFD14383AB7E435502C21B90BEA5991817547D7B165828A6DC34
25,310,975 UART: [art] SIG.S = 9213B4C00FCB685B6FDBCF2C781C712E754FFBF773A3663EDB172413DEAC86B9E70EC9F68077A3BA621A7D4D7F39352F
26,290,419 UART: Caliptra RT
26,291,133 UART: [state] CFI Enabled
26,424,143 UART: [rt] RT listening for mailbox commands...
26,426,052 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,456,778 UART: [rt]cmd =0x4d454153, len=108
26,458,472 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,718 UART: [state] LifecycleState = Unprovisioned
86,373 UART: [state] DebugLocked = No
87,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,667 UART: [kat] SHA2-256
882,598 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,713 UART: [kat] ++
886,865 UART: [kat] sha1
890,989 UART: [kat] SHA2-256
892,927 UART: [kat] SHA2-384
895,544 UART: [kat] SHA2-512-ACC
897,445 UART: [kat] ECC-384
903,234 UART: [kat] HMAC-384Kdf
907,784 UART: [kat] LMS
1,475,980 UART: [kat] --
1,476,925 UART: [cold-reset] ++
1,477,487 UART: [fht] Storing FHT @ 0x50003400
1,480,244 UART: [idev] ++
1,480,412 UART: [idev] CDI.KEYID = 6
1,480,772 UART: [idev] SUBJECT.KEYID = 7
1,481,196 UART: [idev] UDS.KEYID = 0
1,481,541 ready_for_fw is high
1,481,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,810 UART: [idev] Erasing UDS.KEYID = 0
1,505,578 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,288 UART: [idev] --
1,515,193 UART: [ldev] ++
1,515,361 UART: [ldev] CDI.KEYID = 6
1,515,724 UART: [ldev] SUBJECT.KEYID = 5
1,516,150 UART: [ldev] AUTHORITY.KEYID = 7
1,516,613 UART: [ldev] FE.KEYID = 1
1,521,687 UART: [ldev] Erasing FE.KEYID = 1
1,547,170 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,234 UART: [ldev] --
1,586,611 UART: [fwproc] Waiting for Commands...
1,587,296 UART: [fwproc] Received command 0x46574c44
1,588,087 UART: [fwproc] Received Image of size 118548 bytes
2,933,315 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,961 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,179 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,390 >>> mbox cmd response: success
3,132,458 UART: [afmc] ++
3,132,626 UART: [afmc] CDI.KEYID = 6
3,132,988 UART: [afmc] SUBJECT.KEYID = 7
3,133,413 UART: [afmc] AUTHORITY.KEYID = 5
3,168,364 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,930 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,710 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,419 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,302 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,985 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,039 UART: [afmc] --
3,212,007 UART: [cold-reset] --
3,212,605 UART: [state] Locking Datavault
3,213,806 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,410 UART: [state] Locking ICCM
3,215,034 UART: [exit] Launching FMC @ 0x40000130
3,220,364 UART:
3,220,380 UART: Running Caliptra FMC ...
3,220,788 UART:
3,220,842 UART: [state] CFI Enabled
3,231,552 UART: [fht] FMC Alias Private Key: 7
3,350,926 UART: [art] Extend RT PCRs Done
3,351,354 UART: [art] Lock RT PCRs Done
3,352,830 UART: [art] Populate DV Done
3,360,861 UART: [fht] FMC Alias Private Key: 7
3,361,893 UART: [art] Derive CDI
3,362,173 UART: [art] Store in slot 0x4
3,447,955 UART: [art] Derive Key Pair
3,448,315 UART: [art] Store priv key in slot 0x5
3,460,848 UART: [art] Derive Key Pair - Done
3,475,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,935 UART: [art] PUB.X = 3EA766C5F526BF2BE7741ED77729F6B89947766FFFF395AFF7AC4486FCAB6490FB3BF1B9CBD733F5533DA55FFFADAC25
3,498,729 UART: [art] PUB.Y = 778D976822BEF356F4EEF04C635B14BDA26A77CFE495496E061B93270029C56B9028ACB51AF08ADAB77312BD730BA985
3,505,657 UART: [art] SIG.R = 7364850CE61C98BC8D724843B65FB527A0F074549546DC622FDD0D8A1A4B313FB82FC19D879DCF1C716BD911B8AC9F88
3,512,429 UART: [art] SIG.S = F53A272F81E7338E1727CBFB0BC65D632E23D3389A59645A49F67AB33D186E97FA195CD43A47D5E220D7D223957B43EA
3,536,158 UART: Caliptra RT
3,536,409 UART: [state] CFI Enabled
3,655,570 UART: [rt] RT listening for mailbox commands...
3,656,240 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,012 UART: [rt]cmd =0x4d454153, len=108
3,688,565 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,277 ready_for_fw is high
1,362,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,446 >>> mbox cmd response: success
3,042,017 UART:
3,042,033 UART: Running Caliptra FMC ...
3,042,441 UART:
3,042,495 UART: [state] CFI Enabled
3,052,955 UART: [fht] FMC Alias Private Key: 7
3,172,041 UART: [art] Extend RT PCRs Done
3,172,469 UART: [art] Lock RT PCRs Done
3,174,069 UART: [art] Populate DV Done
3,182,148 UART: [fht] FMC Alias Private Key: 7
3,183,312 UART: [art] Derive CDI
3,183,592 UART: [art] Store in slot 0x4
3,269,872 UART: [art] Derive Key Pair
3,270,232 UART: [art] Store priv key in slot 0x5
3,283,967 UART: [art] Derive Key Pair - Done
3,298,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,674 UART: [art] PUB.X = FE5F32F9BA08CBF589AD09CF6F7A360D66C1F0FDCE1A1F9A66F5774E071BDBE247A4F78EAAAE75D9C52A0F8EDB9993B3
3,321,459 UART: [art] PUB.Y = 3CE7B542A6E0A58BC1B82FD0FEFCFACA2CB73D338B5B0C2E84648CFF801FC99A0FABE39ED49AB0C2099935C65F1E9B8F
3,328,430 UART: [art] SIG.R = 8B5B63FF2B17F094AB85F39F910AE7030B12C714DDDB39C8F74FA747D5AA34EC33D8BC6AB30C6BC13E1DCC0015E593C8
3,335,186 UART: [art] SIG.S = 568A97D13AAED81D10DF494642C06F74D23D817895A590445366A9964CA8D59AB5522DCFE4272044242C4A5424B54743
3,359,152 UART: Caliptra RT
3,359,403 UART: [state] CFI Enabled
3,479,284 UART: [rt] RT listening for mailbox commands...
3,479,954 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,118 UART: [rt]cmd =0x4d454153, len=108
3,511,547 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,298 UART: [kat] SHA2-256
882,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,344 UART: [kat] ++
886,496 UART: [kat] sha1
890,726 UART: [kat] SHA2-256
892,664 UART: [kat] SHA2-384
895,215 UART: [kat] SHA2-512-ACC
897,116 UART: [kat] ECC-384
902,987 UART: [kat] HMAC-384Kdf
907,649 UART: [kat] LMS
1,475,845 UART: [kat] --
1,476,700 UART: [cold-reset] ++
1,477,106 UART: [fht] Storing FHT @ 0x50003400
1,479,783 UART: [idev] ++
1,479,951 UART: [idev] CDI.KEYID = 6
1,480,311 UART: [idev] SUBJECT.KEYID = 7
1,480,735 UART: [idev] UDS.KEYID = 0
1,481,080 ready_for_fw is high
1,481,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,597 UART: [idev] Erasing UDS.KEYID = 0
1,505,103 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,755 UART: [idev] --
1,514,648 UART: [ldev] ++
1,514,816 UART: [ldev] CDI.KEYID = 6
1,515,179 UART: [ldev] SUBJECT.KEYID = 5
1,515,605 UART: [ldev] AUTHORITY.KEYID = 7
1,516,068 UART: [ldev] FE.KEYID = 1
1,521,626 UART: [ldev] Erasing FE.KEYID = 1
1,547,375 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,593 UART: [ldev] --
1,586,918 UART: [fwproc] Waiting for Commands...
1,587,679 UART: [fwproc] Received command 0x46574c44
1,588,470 UART: [fwproc] Received Image of size 118548 bytes
2,933,874 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,432 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,027 >>> mbox cmd response: success
3,134,085 UART: [afmc] ++
3,134,253 UART: [afmc] CDI.KEYID = 6
3,134,615 UART: [afmc] SUBJECT.KEYID = 7
3,135,040 UART: [afmc] AUTHORITY.KEYID = 5
3,170,087 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,067 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,847 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,556 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,439 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,122 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,902 UART: [afmc] --
3,212,934 UART: [cold-reset] --
3,213,866 UART: [state] Locking Datavault
3,215,221 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,825 UART: [state] Locking ICCM
3,216,441 UART: [exit] Launching FMC @ 0x40000130
3,221,771 UART:
3,221,787 UART: Running Caliptra FMC ...
3,222,195 UART:
3,222,338 UART: [state] CFI Enabled
3,232,758 UART: [fht] FMC Alias Private Key: 7
3,352,106 UART: [art] Extend RT PCRs Done
3,352,534 UART: [art] Lock RT PCRs Done
3,354,134 UART: [art] Populate DV Done
3,362,411 UART: [fht] FMC Alias Private Key: 7
3,363,569 UART: [art] Derive CDI
3,363,849 UART: [art] Store in slot 0x4
3,449,577 UART: [art] Derive Key Pair
3,449,937 UART: [art] Store priv key in slot 0x5
3,462,462 UART: [art] Derive Key Pair - Done
3,476,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,701 UART: [art] PUB.X = F6352DF692DC458FA0D3CBE6AE2F67EBBE3AE5B80C0FFE2370847915F55E9DA45CB95C3EF24EEC28FF0D24A0279C0492
3,499,481 UART: [art] PUB.Y = 62283A3643FAECE1F6A69779F5308CC94454E899DD8C5F43F2FA1FF3D33420AF5B8D81ADE1DDDE4FAA2EB5D32A115FC4
3,506,453 UART: [art] SIG.R = ED5424C6DBDDEB72937CE5E045CD93247C7D4700C8472DCED0E0D0F46543698000BDD523C48F94E1292AE7B575AEA254
3,513,189 UART: [art] SIG.S = 9B6F133DA707D91702CBCAD2BB3ECB5DC72CCDEBEC612D2DACD8E5C1839FA688020802D9B7EFEB455C13F48F3A54410F
3,537,777 UART: Caliptra RT
3,538,120 UART: [state] CFI Enabled
3,658,304 UART: [rt] RT listening for mailbox commands...
3,658,974 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,506 UART: [rt]cmd =0x4d454153, len=108
3,690,909 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,920 ready_for_fw is high
1,363,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,984,079 >>> mbox cmd response: success
3,045,732 UART:
3,045,748 UART: Running Caliptra FMC ...
3,046,156 UART:
3,046,299 UART: [state] CFI Enabled
3,057,281 UART: [fht] FMC Alias Private Key: 7
3,176,359 UART: [art] Extend RT PCRs Done
3,176,787 UART: [art] Lock RT PCRs Done
3,178,351 UART: [art] Populate DV Done
3,186,632 UART: [fht] FMC Alias Private Key: 7
3,187,680 UART: [art] Derive CDI
3,187,960 UART: [art] Store in slot 0x4
3,273,760 UART: [art] Derive Key Pair
3,274,120 UART: [art] Store priv key in slot 0x5
3,287,739 UART: [art] Derive Key Pair - Done
3,302,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,318,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,319,246 UART: [art] PUB.X = 0DE4EF441783054DD018076BD2C5E69672CC3D56623021E8FD50B527A2CB974D18F847D502BAAB49ADDFB6BBA8875384
3,326,012 UART: [art] PUB.Y = 17EBE9C31C7E8D59E8894E6B200119EE61C89A1F1F860BB8C6EEFC5A9DCD94B90733DBE7254C83B7B8E69B2E1A0206E3
3,332,963 UART: [art] SIG.R = D4113EFAE07C5EA1947CCDA32DA4FABD8CB86E46630D4CFCBE549D7748BBD2AF5979DEE174563CBC6CDE031B6D25C614
3,339,755 UART: [art] SIG.S = 1E0A2C0968B1CC4F70758B71D2B56EE04F64B07C7FDA62ABDF26C510F8FDFDF1B32A50397F54776E49600B107F362689
3,362,960 UART: Caliptra RT
3,363,303 UART: [state] CFI Enabled
3,483,230 UART: [rt] RT listening for mailbox commands...
3,483,900 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,494 UART: [rt]cmd =0x4d454153, len=108
3,516,091 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [kat] SHA2-256
890,842 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,946 UART: [kat] ++
895,098 UART: [kat] sha1
899,190 UART: [kat] SHA2-256
901,130 UART: [kat] SHA2-384
904,011 UART: [kat] SHA2-512-ACC
905,912 UART: [kat] ECC-384
915,663 UART: [kat] HMAC-384Kdf
920,429 UART: [kat] LMS
1,168,741 UART: [kat] --
1,169,560 UART: [cold-reset] ++
1,170,116 UART: [fht] FHT @ 0x50003400
1,172,830 UART: [idev] ++
1,172,998 UART: [idev] CDI.KEYID = 6
1,173,359 UART: [idev] SUBJECT.KEYID = 7
1,173,784 UART: [idev] UDS.KEYID = 0
1,174,130 ready_for_fw is high
1,174,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,945 UART: [idev] Erasing UDS.KEYID = 0
1,199,557 UART: [idev] Sha1 KeyId Algorithm
1,208,317 UART: [idev] --
1,209,412 UART: [ldev] ++
1,209,580 UART: [ldev] CDI.KEYID = 6
1,209,944 UART: [ldev] SUBJECT.KEYID = 5
1,210,371 UART: [ldev] AUTHORITY.KEYID = 7
1,210,834 UART: [ldev] FE.KEYID = 1
1,216,192 UART: [ldev] Erasing FE.KEYID = 1
1,242,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,154 UART: [ldev] --
1,281,581 UART: [fwproc] Wait for Commands...
1,282,158 UART: [fwproc] Recv command 0x46574c44
1,282,891 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,505 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,680 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,903 >>> mbox cmd response: success
2,828,089 UART: [afmc] ++
2,828,257 UART: [afmc] CDI.KEYID = 6
2,828,620 UART: [afmc] SUBJECT.KEYID = 7
2,829,046 UART: [afmc] AUTHORITY.KEYID = 5
2,864,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,157 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,867 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,748 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,449 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,302 UART: [afmc] --
2,908,327 UART: [cold-reset] --
2,909,287 UART: [state] Locking Datavault
2,910,422 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,026 UART: [state] Locking ICCM
2,911,650 UART: [exit] Launching FMC @ 0x40000130
2,916,980 UART:
2,916,996 UART: Running Caliptra FMC ...
2,917,404 UART:
2,917,458 UART: [state] CFI Enabled
2,927,858 UART: [fht] FMC Alias Private Key: 7
3,046,388 UART: [art] Extend RT PCRs Done
3,046,816 UART: [art] Lock RT PCRs Done
3,048,356 UART: [art] Populate DV Done
3,056,455 UART: [fht] FMC Alias Private Key: 7
3,057,453 UART: [art] Derive CDI
3,057,733 UART: [art] Store in slot 0x4
3,143,014 UART: [art] Derive Key Pair
3,143,374 UART: [art] Store priv key in slot 0x5
3,156,666 UART: [art] Derive Key Pair - Done
3,171,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,745 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,510 UART: [art] PUB.X = 0BBE48F51E6249CB43F2C59D51292DF263AC4E7F399F01A3901A6C871204C6861EF789149C1E2AFF0096C3C68009894C
3,195,246 UART: [art] PUB.Y = 557BB5E4749D32A9DF950EC8148DA9475CF7F98E3BA60CAEB62744A8634917A308F2383330C7FDAE4DDB415FD4C97600
3,202,173 UART: [art] SIG.R = 47CD54E66653D7F9CAD9FF92B3749D86A94EFE9E2B9FE336F91D5551D2B29A4D18441D371A12040EB8FA38E0054F8CA0
3,208,944 UART: [art] SIG.S = F670003DA4789EB6B0AEBB16AA6E1FBFD1FFF7A449F8C953F3252017830518CF6A0D8EBFBCE96225371C6D73618784A4
3,232,866 UART: Caliptra RT
3,233,117 UART: [state] CFI Enabled
3,352,271 UART: [rt] RT listening for mailbox commands...
3,352,941 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,537 UART: [rt]cmd =0x4d454153, len=108
3,385,004 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,554 ready_for_fw is high
1,059,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,594 >>> mbox cmd response: success
2,739,733 UART:
2,739,749 UART: Running Caliptra FMC ...
2,740,157 UART:
2,740,211 UART: [state] CFI Enabled
2,750,603 UART: [fht] FMC Alias Private Key: 7
2,869,633 UART: [art] Extend RT PCRs Done
2,870,061 UART: [art] Lock RT PCRs Done
2,871,627 UART: [art] Populate DV Done
2,879,846 UART: [fht] FMC Alias Private Key: 7
2,880,994 UART: [art] Derive CDI
2,881,274 UART: [art] Store in slot 0x4
2,966,897 UART: [art] Derive Key Pair
2,967,257 UART: [art] Store priv key in slot 0x5
2,980,737 UART: [art] Derive Key Pair - Done
2,995,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,786 UART: [art] PUB.X = FC066082093801EA55C1D13B7303BD695B2980A93A48FB596BA423D03CA88C59164D5FA224B5442E1C347D1CD18CEB2E
3,018,548 UART: [art] PUB.Y = 640CB3228CF892B6ED191161F73867C953414FB0E022E04FC3B0E5F060934EDB8A345CAC4BBA8B6F289E9DDE78364A07
3,025,500 UART: [art] SIG.R = 74E351CFB48D8BFB95F79834CA01707A2E32BEDEDAC53D84637C5C53D763CB8D2A7A031E92C0C629C9F8D979170A7B2C
3,032,275 UART: [art] SIG.S = AC7359E3BF9D899357C9C2D1B661090A7D02389650B57178EED7B2DE070F436DD83639F43C35AF7BCA05FECC2E988B45
3,055,499 UART: Caliptra RT
3,055,750 UART: [state] CFI Enabled
3,175,832 UART: [rt] RT listening for mailbox commands...
3,176,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,992 UART: [rt]cmd =0x4d454153, len=108
3,208,345 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
891,267 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,522 UART: [kat] SHA2-512-ACC
906,423 UART: [kat] ECC-384
916,390 UART: [kat] HMAC-384Kdf
920,936 UART: [kat] LMS
1,169,248 UART: [kat] --
1,169,873 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,173,143 UART: [idev] ++
1,173,311 UART: [idev] CDI.KEYID = 6
1,173,672 UART: [idev] SUBJECT.KEYID = 7
1,174,097 UART: [idev] UDS.KEYID = 0
1,174,443 ready_for_fw is high
1,174,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,084 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,113 UART: [ldev] ++
1,209,281 UART: [ldev] CDI.KEYID = 6
1,209,645 UART: [ldev] SUBJECT.KEYID = 5
1,210,072 UART: [ldev] AUTHORITY.KEYID = 7
1,210,535 UART: [ldev] FE.KEYID = 1
1,215,863 UART: [ldev] Erasing FE.KEYID = 1
1,242,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,647 UART: [ldev] --
1,281,860 UART: [fwproc] Wait for Commands...
1,282,643 UART: [fwproc] Recv command 0x46574c44
1,283,376 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,405 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,780 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,955 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,156 >>> mbox cmd response: success
2,828,298 UART: [afmc] ++
2,828,466 UART: [afmc] CDI.KEYID = 6
2,828,829 UART: [afmc] SUBJECT.KEYID = 7
2,829,255 UART: [afmc] AUTHORITY.KEYID = 5
2,864,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,594 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,304 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,185 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,886 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,747 UART: [afmc] --
2,907,806 UART: [cold-reset] --
2,908,816 UART: [state] Locking Datavault
2,910,287 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,891 UART: [state] Locking ICCM
2,911,397 UART: [exit] Launching FMC @ 0x40000130
2,916,727 UART:
2,916,743 UART: Running Caliptra FMC ...
2,917,151 UART:
2,917,294 UART: [state] CFI Enabled
2,928,068 UART: [fht] FMC Alias Private Key: 7
3,047,660 UART: [art] Extend RT PCRs Done
3,048,088 UART: [art] Lock RT PCRs Done
3,049,572 UART: [art] Populate DV Done
3,057,691 UART: [fht] FMC Alias Private Key: 7
3,058,677 UART: [art] Derive CDI
3,058,957 UART: [art] Store in slot 0x4
3,144,780 UART: [art] Derive Key Pair
3,145,140 UART: [art] Store priv key in slot 0x5
3,158,684 UART: [art] Derive Key Pair - Done
3,173,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,889 UART: [art] PUB.X = A2C6373DD4492700C72DF0E75867D909CC5602F92EB4D2BAD8715EB481BE32645B49E31C276DFF56B35F48FD5FEAC00B
3,196,640 UART: [art] PUB.Y = 2C1D7B4E9D7AB3E84ECE28131B19D60C77D06DEBD4B96D073F47A4671268658016909F141D41C0A350642E986B4DFEB6
3,203,588 UART: [art] SIG.R = 6FF71C9C676DF17D494B9EAE0FD0CB73D3C5C090EDE2C5572EE98840097CC4EF1DD8773CAEAB61F6ED997078A54FEDF8
3,210,376 UART: [art] SIG.S = 1DC2A7839CAE10FC24158A1C18CBCE2D83D39FC8DD53E6F26C82402A33BED091CBE6B415DE135D1173200B8952E40A60
3,233,976 UART: Caliptra RT
3,234,319 UART: [state] CFI Enabled
3,354,176 UART: [rt] RT listening for mailbox commands...
3,354,846 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,308 UART: [rt]cmd =0x4d454153, len=108
3,386,863 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,333 ready_for_fw is high
1,059,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,827 >>> mbox cmd response: success
2,740,614 UART:
2,740,630 UART: Running Caliptra FMC ...
2,741,038 UART:
2,741,181 UART: [state] CFI Enabled
2,751,889 UART: [fht] FMC Alias Private Key: 7
2,871,225 UART: [art] Extend RT PCRs Done
2,871,653 UART: [art] Lock RT PCRs Done
2,873,257 UART: [art] Populate DV Done
2,881,580 UART: [fht] FMC Alias Private Key: 7
2,882,706 UART: [art] Derive CDI
2,882,986 UART: [art] Store in slot 0x4
2,969,093 UART: [art] Derive Key Pair
2,969,453 UART: [art] Store priv key in slot 0x5
2,982,703 UART: [art] Derive Key Pair - Done
2,997,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,507 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,272 UART: [art] PUB.X = 9CFBA4D74133AB918D67428A457D7D7E9800D97C5C8EBC2958ECBDF92F7D6D2294B42E0E78E47735208C7E7F75FE7B53
3,020,027 UART: [art] PUB.Y = FD169C258FE847A0B60588B0E2528A744CEB33686C90B81001F43BB6B937C8B8CAEBD4C0DDC5B3B4A4148F703ECBE08B
3,026,987 UART: [art] SIG.R = D1E373AF4291FD91917F365776358EFC491E812DA086EFAC3EAFE07A65EB6DC79B2D6A9068C6183BAB0E6758CA7877B5
3,033,766 UART: [art] SIG.S = 5A93832B943A86F579986F3360FE08D91D5BBDB1C69377A17470012522D7C3BBB2D91A8EF0095E8A21B2CF59F4497765
3,057,697 UART: Caliptra RT
3,058,040 UART: [state] CFI Enabled
3,177,466 UART: [rt] RT listening for mailbox commands...
3,178,136 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,832 UART: [rt]cmd =0x4d454153, len=108
3,210,201 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,512 UART: [state] LifecycleState = Unprovisioned
86,167 UART: [state] DebugLocked = No
86,665 UART: [state] WD Timer not started. Device not locked for debugging
88,010 UART: [kat] SHA2-256
893,660 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,785 UART: [kat] ++
897,937 UART: [kat] sha1
902,257 UART: [kat] SHA2-256
904,197 UART: [kat] SHA2-384
906,892 UART: [kat] SHA2-512-ACC
908,793 UART: [kat] ECC-384
918,186 UART: [kat] HMAC-384Kdf
922,724 UART: [kat] LMS
1,171,052 UART: [kat] --
1,172,173 UART: [cold-reset] ++
1,172,521 UART: [fht] FHT @ 0x50003400
1,175,346 UART: [idev] ++
1,175,514 UART: [idev] CDI.KEYID = 6
1,175,874 UART: [idev] SUBJECT.KEYID = 7
1,176,298 UART: [idev] UDS.KEYID = 0
1,176,643 ready_for_fw is high
1,176,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,092 UART: [idev] Erasing UDS.KEYID = 0
1,201,253 UART: [idev] Sha1 KeyId Algorithm
1,209,897 UART: [idev] --
1,210,865 UART: [ldev] ++
1,211,033 UART: [ldev] CDI.KEYID = 6
1,211,396 UART: [ldev] SUBJECT.KEYID = 5
1,211,822 UART: [ldev] AUTHORITY.KEYID = 7
1,212,285 UART: [ldev] FE.KEYID = 1
1,217,343 UART: [ldev] Erasing FE.KEYID = 1
1,243,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,091 UART: [ldev] --
1,282,556 UART: [fwproc] Wait for Commands...
1,283,332 UART: [fwproc] Recv command 0x46574c44
1,284,060 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,122 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,292 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,445 >>> mbox cmd response: success
2,827,657 UART: [afmc] ++
2,827,825 UART: [afmc] CDI.KEYID = 6
2,828,187 UART: [afmc] SUBJECT.KEYID = 7
2,828,612 UART: [afmc] AUTHORITY.KEYID = 5
2,863,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,972 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,681 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,564 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,265 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,083 UART: [afmc] --
2,907,177 UART: [cold-reset] --
2,908,263 UART: [state] Locking Datavault
2,909,520 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,124 UART: [state] Locking ICCM
2,910,732 UART: [exit] Launching FMC @ 0x40000130
2,916,062 UART:
2,916,078 UART: Running Caliptra FMC ...
2,916,486 UART:
2,916,540 UART: [state] CFI Enabled
2,927,040 UART: [fht] FMC Alias Private Key: 7
3,046,124 UART: [art] Extend RT PCRs Done
3,046,552 UART: [art] Lock RT PCRs Done
3,048,236 UART: [art] Populate DV Done
3,056,163 UART: [fht] FMC Alias Private Key: 7
3,057,345 UART: [art] Derive CDI
3,057,625 UART: [art] Store in slot 0x4
3,143,240 UART: [art] Derive Key Pair
3,143,600 UART: [art] Store priv key in slot 0x5
3,157,144 UART: [art] Derive Key Pair - Done
3,171,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,082 UART: [art] PUB.X = 034045A6157CC145F065A585DB509A9D58044266DA2C36A6E2D3CEB8E7568713C15E604DBFEF529269D96575C222F543
3,194,842 UART: [art] PUB.Y = 1747CED25D1DF5AE3A2E2D34F9FFC8DBC47FCA8D477C1DDAB4197A0E3B426DE37C84AA0B80582AAB38E57B3AFCF44D72
3,201,816 UART: [art] SIG.R = 76B1F3CA9FA97A22C8C58A399FAB77B8F251F8775EBDA2F68C80081F30449E562214E2026F44BFF6D2DAB2B6349FCF36
3,208,592 UART: [art] SIG.S = 0828FFB8D553D34D3716687265E39E8D5DAE7594B85C96F591B337F7862CAD1066E4A03D104D0D9704AC455ED566911C
3,232,121 UART: Caliptra RT
3,232,372 UART: [state] CFI Enabled
3,352,331 UART: [rt] RT listening for mailbox commands...
3,353,001 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,401 UART: [rt]cmd =0x4d454153, len=108
3,384,722 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,371 ready_for_fw is high
1,060,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,568 >>> mbox cmd response: success
2,739,927 UART:
2,739,943 UART: Running Caliptra FMC ...
2,740,351 UART:
2,740,405 UART: [state] CFI Enabled
2,751,007 UART: [fht] FMC Alias Private Key: 7
2,870,971 UART: [art] Extend RT PCRs Done
2,871,399 UART: [art] Lock RT PCRs Done
2,873,169 UART: [art] Populate DV Done
2,881,350 UART: [fht] FMC Alias Private Key: 7
2,882,294 UART: [art] Derive CDI
2,882,574 UART: [art] Store in slot 0x4
2,968,259 UART: [art] Derive Key Pair
2,968,619 UART: [art] Store priv key in slot 0x5
2,981,517 UART: [art] Derive Key Pair - Done
2,996,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,900 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,665 UART: [art] PUB.X = 6F2B3EB4C32020FE067119B832BC0C00FD73F47AB083A928679D89D52C9BE15A53CC739E0FE418C7F4448013BD78588D
3,019,408 UART: [art] PUB.Y = D63B4CD1257F6803A2B4B3195B8313EF741BA1BF2B1F87F0771F0CE3D53D61BCDA172B458B9C28D1308B08FBCCA555F7
3,026,363 UART: [art] SIG.R = 3D328E1EF5CB3692B119FD763E33785AB1C80CABE14915147AC5DE6E2FF4D4293CEAC0C3792F11AE130043AA1693FD36
3,033,120 UART: [art] SIG.S = FCE0BFB6214CEFA6D60A123E1C9B1C35249FA4330A77CC180BE5D342DBFB6D19EE8F4739984353CDB850C4E014A1DB7D
3,056,771 UART: Caliptra RT
3,057,022 UART: [state] CFI Enabled
3,176,832 UART: [rt] RT listening for mailbox commands...
3,177,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,350 UART: [rt]cmd =0x4d454153, len=108
3,209,951 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
893,275 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,400 UART: [kat] ++
897,552 UART: [kat] sha1
901,886 UART: [kat] SHA2-256
903,826 UART: [kat] SHA2-384
906,351 UART: [kat] SHA2-512-ACC
908,252 UART: [kat] ECC-384
917,709 UART: [kat] HMAC-384Kdf
922,233 UART: [kat] LMS
1,170,561 UART: [kat] --
1,171,104 UART: [cold-reset] ++
1,171,494 UART: [fht] FHT @ 0x50003400
1,174,205 UART: [idev] ++
1,174,373 UART: [idev] CDI.KEYID = 6
1,174,733 UART: [idev] SUBJECT.KEYID = 7
1,175,157 UART: [idev] UDS.KEYID = 0
1,175,502 ready_for_fw is high
1,175,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,555 UART: [idev] Erasing UDS.KEYID = 0
1,200,310 UART: [idev] Sha1 KeyId Algorithm
1,208,884 UART: [idev] --
1,209,844 UART: [ldev] ++
1,210,012 UART: [ldev] CDI.KEYID = 6
1,210,375 UART: [ldev] SUBJECT.KEYID = 5
1,210,801 UART: [ldev] AUTHORITY.KEYID = 7
1,211,264 UART: [ldev] FE.KEYID = 1
1,216,560 UART: [ldev] Erasing FE.KEYID = 1
1,243,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,150 UART: [ldev] --
1,282,431 UART: [fwproc] Wait for Commands...
1,283,087 UART: [fwproc] Recv command 0x46574c44
1,283,815 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,569 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,739 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,004 >>> mbox cmd response: success
2,828,098 UART: [afmc] ++
2,828,266 UART: [afmc] CDI.KEYID = 6
2,828,628 UART: [afmc] SUBJECT.KEYID = 7
2,829,053 UART: [afmc] AUTHORITY.KEYID = 5
2,864,342 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,587 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,335 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,044 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,927 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,628 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,384 UART: [afmc] --
2,907,492 UART: [cold-reset] --
2,908,282 UART: [state] Locking Datavault
2,909,527 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,131 UART: [state] Locking ICCM
2,910,663 UART: [exit] Launching FMC @ 0x40000130
2,915,993 UART:
2,916,009 UART: Running Caliptra FMC ...
2,916,417 UART:
2,916,560 UART: [state] CFI Enabled
2,927,202 UART: [fht] FMC Alias Private Key: 7
3,045,850 UART: [art] Extend RT PCRs Done
3,046,278 UART: [art] Lock RT PCRs Done
3,047,758 UART: [art] Populate DV Done
3,055,881 UART: [fht] FMC Alias Private Key: 7
3,057,041 UART: [art] Derive CDI
3,057,321 UART: [art] Store in slot 0x4
3,142,952 UART: [art] Derive Key Pair
3,143,312 UART: [art] Store priv key in slot 0x5
3,156,710 UART: [art] Derive Key Pair - Done
3,171,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,875 UART: [art] PUB.X = 42489375B72E3321704569A9076FA83B171CD32DFAEB016EB3B1CB72700D952133B693EAF7C767C5BCD4FA245D4D0324
3,194,635 UART: [art] PUB.Y = 352049130FFD37516410A03AA8B0B19497454889B5A1E2783B6412EA9EED3D5D0C7E3C47E6205FB2471E164BA64F2683
3,201,575 UART: [art] SIG.R = A45BD52F167C52B8A56CE35F19A84D75D19F3A2964AB8F7668A7A3FA2EF70F1A4333D279E07FDB36AED337986356EDF5
3,208,354 UART: [art] SIG.S = AE5A9B24D4E74818B8EDB6F2F663A92FD88C321D3E2EF42709F9E3B17A86675EF01740F7C61E4712092E8F4DF21E4469
3,232,572 UART: Caliptra RT
3,232,915 UART: [state] CFI Enabled
3,352,360 UART: [rt] RT listening for mailbox commands...
3,353,030 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,464 UART: [rt]cmd =0x4d454153, len=108
3,384,811 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,134 ready_for_fw is high
1,060,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,881 >>> mbox cmd response: success
2,741,158 UART:
2,741,174 UART: Running Caliptra FMC ...
2,741,582 UART:
2,741,725 UART: [state] CFI Enabled
2,752,449 UART: [fht] FMC Alias Private Key: 7
2,870,949 UART: [art] Extend RT PCRs Done
2,871,377 UART: [art] Lock RT PCRs Done
2,873,145 UART: [art] Populate DV Done
2,881,504 UART: [fht] FMC Alias Private Key: 7
2,882,502 UART: [art] Derive CDI
2,882,782 UART: [art] Store in slot 0x4
2,968,565 UART: [art] Derive Key Pair
2,968,925 UART: [art] Store priv key in slot 0x5
2,982,161 UART: [art] Derive Key Pair - Done
2,997,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,464 UART: [art] PUB.X = EC67272AEA862E8B2D9D723A3FC5480F236192A26677E1B11DDA5FAAFE6689F9A4868B697EB1839AB414F16D9F3163DF
3,020,241 UART: [art] PUB.Y = A4C2E436E416E65F7D6774C1B98FE7BF790695190E822D11E95D141230FDE27B320377664873F3C49A225EC4632F559E
3,027,176 UART: [art] SIG.R = 89B8C011985D194E934FDB435DDA4780102ABED03A5DE96743F72DEE3EE17330688E4F18EBE770D34A94E72EEBBB3DB9
3,033,960 UART: [art] SIG.S = E9ECD01D2A44EDBA7511367A4FCB6F12E7F7D339EA223BB923FEDE9FBB0E23272E6DF6746A1530F3C5459F39779B1FB1
3,058,261 UART: Caliptra RT
3,058,604 UART: [state] CFI Enabled
3,177,955 UART: [rt] RT listening for mailbox commands...
3,178,625 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,245 UART: [rt]cmd =0x4d454153, len=108
3,211,004 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,126 UART:
192,492 UART: Running Caliptra ROM ...
193,679 UART:
193,849 UART: [state] CFI Enabled
265,077 UART: [state] LifecycleState = Unprovisioned
266,992 UART: [state] DebugLocked = No
269,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,690 UART: [kat] SHA2-256
444,366 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,904 UART: [kat] ++
455,353 UART: [kat] sha1
466,938 UART: [kat] SHA2-256
469,665 UART: [kat] SHA2-384
477,150 UART: [kat] SHA2-512-ACC
479,518 UART: [kat] ECC-384
2,767,602 UART: [kat] HMAC-384Kdf
2,799,025 UART: [kat] LMS
3,989,330 UART: [kat] --
3,993,974 UART: [cold-reset] ++
3,995,292 UART: [fht] Storing FHT @ 0x50003400
4,006,419 UART: [idev] ++
4,006,987 UART: [idev] CDI.KEYID = 6
4,007,946 UART: [idev] SUBJECT.KEYID = 7
4,009,199 UART: [idev] UDS.KEYID = 0
4,010,172 ready_for_fw is high
4,010,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,842 UART: [idev] Erasing UDS.KEYID = 0
7,343,280 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,251 UART: [idev] --
7,369,409 UART: [ldev] ++
7,370,035 UART: [ldev] CDI.KEYID = 6
7,370,926 UART: [ldev] SUBJECT.KEYID = 5
7,372,193 UART: [ldev] AUTHORITY.KEYID = 7
7,373,421 UART: [ldev] FE.KEYID = 1
7,421,415 UART: [ldev] Erasing FE.KEYID = 1
10,751,678 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,930 UART: [ldev] --
13,114,439 UART: [fwproc] Waiting for Commands...
13,116,859 UART: [fwproc] Received command 0x46574c44
13,119,091 UART: [fwproc] Received Image of size 118548 bytes
17,228,756 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,306,186 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,379,364 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,708,718 >>> mbox cmd response: success
17,713,452 UART: [afmc] ++
17,714,072 UART: [afmc] CDI.KEYID = 6
17,714,993 UART: [afmc] SUBJECT.KEYID = 7
17,716,240 UART: [afmc] AUTHORITY.KEYID = 5
21,069,396 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,666 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,982 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,364 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,149 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,539 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,403 UART: [afmc] --
23,439,889 UART: [cold-reset] --
23,445,312 UART: [state] Locking Datavault
23,451,368 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,066 UART: [state] Locking ICCM
23,455,166 UART: [exit] Launching FMC @ 0x40000130
23,463,575 UART:
23,463,812 UART: Running Caliptra FMC ...
23,464,913 UART:
23,465,092 UART: [state] CFI Enabled
23,528,601 UART: [fht] FMC Alias Private Key: 7
25,868,680 UART: [art] Extend RT PCRs Done
25,869,906 UART: [art] Lock RT PCRs Done
25,871,400 UART: [art] Populate DV Done
25,876,699 UART: [fht] FMC Alias Private Key: 7
25,878,397 UART: [art] Derive CDI
25,879,210 UART: [art] Store in slot 0x4
25,936,596 UART: [art] Derive Key Pair
25,937,611 UART: [art] Store priv key in slot 0x5
29,230,315 UART: [art] Derive Key Pair - Done
29,243,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,530,278 UART: [art] Erasing AUTHORITY.KEYID = 7
31,531,792 UART: [art] PUB.X = 44092FE741F26B0613377036642093AE0077564A6BE24814E58FFB03277122A1D94A5DE23E3B1902490DB3BDCE7D98CF
31,539,008 UART: [art] PUB.Y = 6DB1C249F83E204BE488FCC49A0B1C38FF1F87FDD0C737E9DADA28166907ABFB7FF1D7DF167AD56E314C92BB96DA121D
31,546,327 UART: [art] SIG.R = DF13BFC5C4A176EA964BBFB2A2A3C83E8EE2D88A35E026AEA0C3B11AB7A4B77670925535E9FFE5B398EF1E7703BC0973
31,553,776 UART: [art] SIG.S = 8A3C43DFC45E02FE5ECD7A4A3849880CA42C511FAD36F21C316EF620D576164E1C64BDB3F1211D734AF115E7BEB079CA
32,858,195 UART: Caliptra RT
32,858,893 UART: [state] CFI Enabled
33,036,637 UART: [rt] RT listening for mailbox commands...
33,038,523 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,069,011 UART: [rt]cmd =0x4d454153, len=108
33,087,848 >>> mbox cmd response data (12 bytes)
33,088,428 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,119,192 UART: [rt]cmd =0x4d454153, len=108
33,138,229 >>> mbox cmd response data (12 bytes)
33,138,660 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,169,222 UART: [rt]cmd =0x4d454153, len=108
33,187,502 >>> mbox cmd response data (12 bytes)
33,187,941 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,218,643 UART: [rt]cmd =0x4d454153, len=108
33,237,733 >>> mbox cmd response data (12 bytes)
33,238,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,268,950 UART: [rt]cmd =0x4d454153, len=108
33,287,268 >>> mbox cmd response data (12 bytes)
33,287,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,318,222 UART: [rt]cmd =0x4d454153, len=108
33,337,013 >>> mbox cmd response data (12 bytes)
33,337,463 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,368,112 UART: [rt]cmd =0x4d454153, len=108
33,386,933 >>> mbox cmd response data (12 bytes)
33,387,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,418,061 UART: [rt]cmd =0x4d454153, len=108
33,437,301 >>> mbox cmd response data (12 bytes)
33,437,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,468,315 UART: [rt]cmd =0x4d454153, len=108
33,486,661 >>> mbox cmd response data (12 bytes)
33,487,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,517,576 UART: [rt]cmd =0x4d454153, len=108
33,535,541 >>> mbox cmd response data (12 bytes)
33,535,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,566,442 UART: [rt]cmd =0x4d454153, len=108
33,585,669 >>> mbox cmd response data (12 bytes)
33,586,099 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,616,960 UART: [rt]cmd =0x4d454153, len=108
33,635,664 >>> mbox cmd response data (12 bytes)
33,636,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,666,787 UART: [rt]cmd =0x4d454153, len=108
33,685,479 >>> mbox cmd response data (12 bytes)
33,685,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,716,491 UART: [rt]cmd =0x4d454153, len=108
33,735,419 >>> mbox cmd response data (12 bytes)
33,735,877 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,766,579 UART: [rt]cmd =0x4d454153, len=108
33,768,716 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,802,822 ready_for_fw is high
3,803,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,944,926 >>> mbox cmd response: success
23,632,759 UART:
23,633,172 UART: Running Caliptra FMC ...
23,634,471 UART:
23,634,636 UART: [state] CFI Enabled
23,685,330 UART: [fht] FMC Alias Private Key: 7
26,026,271 UART: [art] Extend RT PCRs Done
26,027,504 UART: [art] Lock RT PCRs Done
26,029,215 UART: [art] Populate DV Done
26,034,264 UART: [fht] FMC Alias Private Key: 7
26,035,792 UART: [art] Derive CDI
26,036,562 UART: [art] Store in slot 0x4
26,093,284 UART: [art] Derive Key Pair
26,094,291 UART: [art] Store priv key in slot 0x5
29,387,562 UART: [art] Derive Key Pair - Done
29,400,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,687,260 UART: [art] Erasing AUTHORITY.KEYID = 7
31,688,811 UART: [art] PUB.X = 4F70969B06C7E0BFFABED8CA0AB07441AF88EA9B18C9B29D66E8EB8F25475AD2F9016F13D0AB04C5100A400CB04FB263
31,696,023 UART: [art] PUB.Y = 9F3074133F0AC97C3F0125699538118E8A7855671B869AA05F2DE9CBE7DB026011A701C723136EAEBD132EF95FC44E86
31,703,294 UART: [art] SIG.R = 139AF3817AA300BC9B4F50678342D0BF936081A76D5F8E089DF531D06EB299F9DF924B8D10B98A0721A2960AFFE2FFBA
31,710,700 UART: [art] SIG.S = FEB61C8781661FEB9D186050D0C19EF4D9EED6D7D2E1C7D5A22C0674D771B16775746EB02FC5D6F08BAA08A1A873E728
33,015,876 UART: Caliptra RT
33,016,599 UART: [state] CFI Enabled
33,192,215 UART: [rt] RT listening for mailbox commands...
33,194,108 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,224,773 UART: [rt]cmd =0x4d454153, len=108
33,243,596 >>> mbox cmd response data (12 bytes)
33,244,142 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,274,739 UART: [rt]cmd =0x4d454153, len=108
33,292,968 >>> mbox cmd response data (12 bytes)
33,293,395 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,324,044 UART: [rt]cmd =0x4d454153, len=108
33,342,544 >>> mbox cmd response data (12 bytes)
33,342,978 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,373,619 UART: [rt]cmd =0x4d454153, len=108
33,392,328 >>> mbox cmd response data (12 bytes)
33,392,754 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,423,355 UART: [rt]cmd =0x4d454153, len=108
33,442,330 >>> mbox cmd response data (12 bytes)
33,442,776 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,473,339 UART: [rt]cmd =0x4d454153, len=108
33,492,516 >>> mbox cmd response data (12 bytes)
33,492,944 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,523,753 UART: [rt]cmd =0x4d454153, len=108
33,542,673 >>> mbox cmd response data (12 bytes)
33,543,090 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,573,690 UART: [rt]cmd =0x4d454153, len=108
33,592,431 >>> mbox cmd response data (12 bytes)
33,592,873 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,623,407 UART: [rt]cmd =0x4d454153, len=108
33,642,468 >>> mbox cmd response data (12 bytes)
33,642,926 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,673,594 UART: [rt]cmd =0x4d454153, len=108
33,691,710 >>> mbox cmd response data (12 bytes)
33,692,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,722,780 UART: [rt]cmd =0x4d454153, len=108
33,742,005 >>> mbox cmd response data (12 bytes)
33,742,429 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,773,097 UART: [rt]cmd =0x4d454153, len=108
33,791,695 >>> mbox cmd response data (12 bytes)
33,792,108 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,822,667 UART: [rt]cmd =0x4d454153, len=108
33,841,686 >>> mbox cmd response data (12 bytes)
33,842,112 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,872,773 UART: [rt]cmd =0x4d454153, len=108
33,892,110 >>> mbox cmd response data (12 bytes)
33,892,543 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,923,133 UART: [rt]cmd =0x4d454153, len=108
33,925,457 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
192,472 UART:
192,838 UART: Running Caliptra ROM ...
193,939 UART:
603,838 UART: [state] CFI Enabled
618,147 UART: [state] LifecycleState = Unprovisioned
620,089 UART: [state] DebugLocked = No
623,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,258 UART: [kat] SHA2-256
797,057 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,577 UART: [kat] ++
808,038 UART: [kat] sha1
817,778 UART: [kat] SHA2-256
820,503 UART: [kat] SHA2-384
825,068 UART: [kat] SHA2-512-ACC
827,430 UART: [kat] ECC-384
3,111,127 UART: [kat] HMAC-384Kdf
3,122,010 UART: [kat] LMS
4,312,131 UART: [kat] --
4,318,354 UART: [cold-reset] ++
4,319,224 UART: [fht] Storing FHT @ 0x50003400
4,331,690 UART: [idev] ++
4,332,321 UART: [idev] CDI.KEYID = 6
4,333,222 UART: [idev] SUBJECT.KEYID = 7
4,334,461 UART: [idev] UDS.KEYID = 0
4,335,444 ready_for_fw is high
4,335,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,016 UART: [idev] Erasing UDS.KEYID = 0
7,625,109 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,736 UART: [idev] --
7,651,850 UART: [ldev] ++
7,652,485 UART: [ldev] CDI.KEYID = 6
7,653,397 UART: [ldev] SUBJECT.KEYID = 5
7,654,600 UART: [ldev] AUTHORITY.KEYID = 7
7,655,879 UART: [ldev] FE.KEYID = 1
7,668,875 UART: [ldev] Erasing FE.KEYID = 1
10,957,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,702 UART: [ldev] --
13,318,848 UART: [fwproc] Waiting for Commands...
13,320,477 UART: [fwproc] Received command 0x46574c44
13,322,708 UART: [fwproc] Received Image of size 118548 bytes
17,437,868 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,511,965 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,585,152 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,914,415 >>> mbox cmd response: success
17,918,975 UART: [afmc] ++
17,919,566 UART: [afmc] CDI.KEYID = 6
17,920,530 UART: [afmc] SUBJECT.KEYID = 7
17,921,738 UART: [afmc] AUTHORITY.KEYID = 5
21,239,660 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,531,954 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,534,210 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,548,640 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,563,376 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,577,752 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,599,907 UART: [afmc] --
23,604,086 UART: [cold-reset] --
23,608,052 UART: [state] Locking Datavault
23,612,266 UART: [state] Locking PCR0, PCR1 and PCR31
23,614,015 UART: [state] Locking ICCM
23,615,602 UART: [exit] Launching FMC @ 0x40000130
23,623,986 UART:
23,624,210 UART: Running Caliptra FMC ...
23,625,233 UART:
23,625,373 UART: [state] CFI Enabled
23,633,551 UART: [fht] FMC Alias Private Key: 7
25,974,215 UART: [art] Extend RT PCRs Done
25,975,432 UART: [art] Lock RT PCRs Done
25,977,064 UART: [art] Populate DV Done
25,982,660 UART: [fht] FMC Alias Private Key: 7
25,984,147 UART: [art] Derive CDI
25,984,898 UART: [art] Store in slot 0x4
26,027,757 UART: [art] Derive Key Pair
26,028,751 UART: [art] Store priv key in slot 0x5
29,270,539 UART: [art] Derive Key Pair - Done
29,283,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,563,967 UART: [art] Erasing AUTHORITY.KEYID = 7
31,565,469 UART: [art] PUB.X = 843FA3D8840A9706CDF406FA6CA2BEAF0FE040F4CBCA10EF1AC5DEA5E49097F1809E49AE1E91F493237B56700A4FB1CB
31,572,775 UART: [art] PUB.Y = A64202451D7FBE0C4101FA9A960B85106F2DFE15B050ADDF0DB53140E0E99F359B7707AA94613C4F6010B0B2EDCEEA57
31,580,061 UART: [art] SIG.R = 9E12697AD3FC75E7CF84B46D8790E3784EA6CDCDC05AC25A1F8AC9BA172FA3F45DCD497BFC3D7C3BF6E9AFF02BCF04D2
31,587,470 UART: [art] SIG.S = 523AAAEF2F928FE0B8FC28A0B57A74EE09123DE2749A933A8A16EDBF021DE54E8CAA18B85C1059B7519D087246F93603
32,892,664 UART: Caliptra RT
32,893,361 UART: [state] CFI Enabled
33,026,360 UART: [rt] RT listening for mailbox commands...
33,028,229 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,059,050 UART: [rt]cmd =0x4d454153, len=108
33,077,706 >>> mbox cmd response data (12 bytes)
33,078,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,108,760 UART: [rt]cmd =0x4d454153, len=108
33,127,293 >>> mbox cmd response data (12 bytes)
33,127,722 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,157,982 UART: [rt]cmd =0x4d454153, len=108
33,177,068 >>> mbox cmd response data (12 bytes)
33,177,535 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,208,343 UART: [rt]cmd =0x4d454153, len=108
33,227,424 >>> mbox cmd response data (12 bytes)
33,227,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,258,534 UART: [rt]cmd =0x4d454153, len=108
33,277,300 >>> mbox cmd response data (12 bytes)
33,277,727 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,308,421 UART: [rt]cmd =0x4d454153, len=108
33,327,465 >>> mbox cmd response data (12 bytes)
33,327,934 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,358,814 UART: [rt]cmd =0x4d454153, len=108
33,377,633 >>> mbox cmd response data (12 bytes)
33,378,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,408,759 UART: [rt]cmd =0x4d454153, len=108
33,427,611 >>> mbox cmd response data (12 bytes)
33,428,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,458,725 UART: [rt]cmd =0x4d454153, len=108
33,477,857 >>> mbox cmd response data (12 bytes)
33,478,272 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,508,736 UART: [rt]cmd =0x4d454153, len=108
33,527,423 >>> mbox cmd response data (12 bytes)
33,527,856 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,558,601 UART: [rt]cmd =0x4d454153, len=108
33,577,963 >>> mbox cmd response data (12 bytes)
33,578,426 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,609,228 UART: [rt]cmd =0x4d454153, len=108
33,628,001 >>> mbox cmd response data (12 bytes)
33,628,426 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,658,965 UART: [rt]cmd =0x4d454153, len=108
33,676,899 >>> mbox cmd response data (12 bytes)
33,677,321 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,707,903 UART: [rt]cmd =0x4d454153, len=108
33,727,261 >>> mbox cmd response data (12 bytes)
33,727,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,758,191 UART: [rt]cmd =0x4d454153, len=108
33,760,570 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
4,126,094 ready_for_fw is high
4,126,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,787 >>> mbox cmd response: success
23,806,057 UART:
23,806,459 UART: Running Caliptra FMC ...
23,807,853 UART:
23,808,032 UART: [state] CFI Enabled
23,816,043 UART: [fht] FMC Alias Private Key: 7
26,156,043 UART: [art] Extend RT PCRs Done
26,157,271 UART: [art] Lock RT PCRs Done
26,158,904 UART: [art] Populate DV Done
26,164,160 UART: [fht] FMC Alias Private Key: 7
26,165,762 UART: [art] Derive CDI
26,166,570 UART: [art] Store in slot 0x4
26,209,599 UART: [art] Derive Key Pair
26,210,640 UART: [art] Store priv key in slot 0x5
29,452,458 UART: [art] Derive Key Pair - Done
29,465,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,547 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,050 UART: [art] PUB.X = BE6ADD24A15548336F545016F193343917318445736B5B570A13C087E9EFDED7B97B78A97AB75FD6BC9129F85305DC67
31,754,301 UART: [art] PUB.Y = BF7E20BC60102AC3D4FB64012B30D124BF067BE39D519665232E404FAFF01415AFEA02107FB43842823A0AA602843DC8
31,761,526 UART: [art] SIG.R = 0FDEA418D220C473E53781566208B34246B4DF141D76631BE2263C2B3158FAA61D659202F83F5FAAAA629CCA40862C20
31,768,918 UART: [art] SIG.S = 4B13A7465DC592DBDABCE8C2F529A7AE722D95143D696323CFC3E2C2955CDE5C2A144FEC8CAE78E0A3EF27A3FDAC5889
33,073,828 UART: Caliptra RT
33,074,562 UART: [state] CFI Enabled
33,208,151 UART: [rt] RT listening for mailbox commands...
33,210,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,240,903 UART: [rt]cmd =0x4d454153, len=108
33,259,073 >>> mbox cmd response data (12 bytes)
33,259,623 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,290,203 UART: [rt]cmd =0x4d454153, len=108
33,309,023 >>> mbox cmd response data (12 bytes)
33,309,450 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,340,326 UART: [rt]cmd =0x4d454153, len=108
33,359,718 >>> mbox cmd response data (12 bytes)
33,360,159 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,390,795 UART: [rt]cmd =0x4d454153, len=108
33,409,784 >>> mbox cmd response data (12 bytes)
33,410,244 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,440,889 UART: [rt]cmd =0x4d454153, len=108
33,459,261 >>> mbox cmd response data (12 bytes)
33,459,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,490,238 UART: [rt]cmd =0x4d454153, len=108
33,508,820 >>> mbox cmd response data (12 bytes)
33,509,243 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,539,824 UART: [rt]cmd =0x4d454153, len=108
33,558,633 >>> mbox cmd response data (12 bytes)
33,559,046 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,589,473 UART: [rt]cmd =0x4d454153, len=108
33,608,106 >>> mbox cmd response data (12 bytes)
33,608,532 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,639,010 UART: [rt]cmd =0x4d454153, len=108
33,657,836 >>> mbox cmd response data (12 bytes)
33,658,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,688,768 UART: [rt]cmd =0x4d454153, len=108
33,707,791 >>> mbox cmd response data (12 bytes)
33,708,224 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,739,087 UART: [rt]cmd =0x4d454153, len=108
33,757,621 >>> mbox cmd response data (12 bytes)
33,758,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,788,742 UART: [rt]cmd =0x4d454153, len=108
33,807,881 >>> mbox cmd response data (12 bytes)
33,808,343 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,838,715 UART: [rt]cmd =0x4d454153, len=108
33,857,588 >>> mbox cmd response data (12 bytes)
33,857,998 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,888,697 UART: [rt]cmd =0x4d454153, len=108
33,908,141 >>> mbox cmd response data (12 bytes)
33,908,561 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,939,196 UART: [rt]cmd =0x4d454153, len=108
33,941,520 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
192,213 UART:
192,577 UART: Running Caliptra ROM ...
193,760 UART:
193,908 UART: [state] CFI Enabled
263,636 UART: [state] LifecycleState = Unprovisioned
265,541 UART: [state] DebugLocked = No
268,067 UART: [state] WD Timer not started. Device not locked for debugging
271,601 UART: [kat] SHA2-256
451,289 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,021 UART: [kat] ++
462,559 UART: [kat] sha1
473,172 UART: [kat] SHA2-256
475,864 UART: [kat] SHA2-384
481,072 UART: [kat] SHA2-512-ACC
483,438 UART: [kat] ECC-384
2,946,925 UART: [kat] HMAC-384Kdf
2,970,752 UART: [kat] LMS
3,447,300 UART: [kat] --
3,451,364 UART: [cold-reset] ++
3,453,719 UART: [fht] FHT @ 0x50003400
3,465,327 UART: [idev] ++
3,465,889 UART: [idev] CDI.KEYID = 6
3,466,768 UART: [idev] SUBJECT.KEYID = 7
3,468,078 UART: [idev] UDS.KEYID = 0
3,468,976 ready_for_fw is high
3,469,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,241 UART: [idev] Erasing UDS.KEYID = 0
5,988,217 UART: [idev] Sha1 KeyId Algorithm
6,012,755 UART: [idev] --
6,017,164 UART: [ldev] ++
6,017,744 UART: [ldev] CDI.KEYID = 6
6,018,720 UART: [ldev] SUBJECT.KEYID = 5
6,019,882 UART: [ldev] AUTHORITY.KEYID = 7
6,021,166 UART: [ldev] FE.KEYID = 1
6,057,387 UART: [ldev] Erasing FE.KEYID = 1
8,567,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,214 UART: [ldev] --
10,373,956 UART: [fwproc] Wait for Commands...
10,375,627 UART: [fwproc] Recv command 0x46574c44
10,377,614 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,746 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,018,809 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,234 >>> mbox cmd response: success
14,351,463 UART: [afmc] ++
14,352,075 UART: [afmc] CDI.KEYID = 6
14,353,017 UART: [afmc] SUBJECT.KEYID = 7
14,354,229 UART: [afmc] AUTHORITY.KEYID = 5
16,896,741 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,521 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,306 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,393 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,940 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,153 UART: [afmc] --
18,716,670 UART: [cold-reset] --
18,721,056 UART: [state] Locking Datavault
18,727,497 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,249 UART: [state] Locking ICCM
18,730,693 UART: [exit] Launching FMC @ 0x40000130
18,739,079 UART:
18,739,315 UART: Running Caliptra FMC ...
18,740,408 UART:
18,740,563 UART: [state] CFI Enabled
18,795,393 UART: [fht] FMC Alias Private Key: 7
20,561,812 UART: [art] Extend RT PCRs Done
20,563,028 UART: [art] Lock RT PCRs Done
20,564,657 UART: [art] Populate DV Done
20,570,065 UART: [fht] FMC Alias Private Key: 7
20,571,542 UART: [art] Derive CDI
20,572,317 UART: [art] Store in slot 0x4
20,628,056 UART: [art] Derive Key Pair
20,629,057 UART: [art] Store priv key in slot 0x5
23,092,104 UART: [art] Derive Key Pair - Done
23,105,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,905 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,409 UART: [art] PUB.X = 022653E5A89F7110B0EDD1DC05135FBF03219B68C2CA399F62DEFFE268D952BD4573BFCD5E05E7C6A88DA1AEAAE8A656
24,827,712 UART: [art] PUB.Y = 04E549DCBB0054FBF40DF11D9C0EDAB9710D657F09B98F88A88975846D2F12C4FD590CCF0C9EE72139D10852B96C6797
24,834,953 UART: [art] SIG.R = BC92AB56DFF62818B20872B59C2D1B7A95924077DCC6C15524A6BD58AE5C16BEF283E2EF535A644BF8CC489021B67A7F
24,842,340 UART: [art] SIG.S = E1DF6EE4A771EAFD96D24AB00E650B1F9B407A7FF15040CDCB6DA0407AF87B0F991F0F4380408416A2C648E88BF1C31F
25,821,518 UART: Caliptra RT
25,822,217 UART: [state] CFI Enabled
26,002,441 UART: [rt] RT listening for mailbox commands...
26,004,323 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,034,979 UART: [rt]cmd =0x4d454153, len=108
26,053,914 >>> mbox cmd response data (12 bytes)
26,054,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,085,277 UART: [rt]cmd =0x4d454153, len=108
26,103,813 >>> mbox cmd response data (12 bytes)
26,104,245 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,134,892 UART: [rt]cmd =0x4d454153, len=108
26,154,308 >>> mbox cmd response data (12 bytes)
26,154,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,185,363 UART: [rt]cmd =0x4d454153, len=108
26,204,230 >>> mbox cmd response data (12 bytes)
26,204,650 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,235,453 UART: [rt]cmd =0x4d454153, len=108
26,253,973 >>> mbox cmd response data (12 bytes)
26,254,391 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,285,133 UART: [rt]cmd =0x4d454153, len=108
26,304,545 >>> mbox cmd response data (12 bytes)
26,304,963 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,335,682 UART: [rt]cmd =0x4d454153, len=108
26,354,368 >>> mbox cmd response data (12 bytes)
26,354,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,385,487 UART: [rt]cmd =0x4d454153, len=108
26,403,825 >>> mbox cmd response data (12 bytes)
26,404,278 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,434,923 UART: [rt]cmd =0x4d454153, len=108
26,453,904 >>> mbox cmd response data (12 bytes)
26,454,320 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,484,853 UART: [rt]cmd =0x4d454153, len=108
26,504,138 >>> mbox cmd response data (12 bytes)
26,504,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,535,102 UART: [rt]cmd =0x4d454153, len=108
26,554,026 >>> mbox cmd response data (12 bytes)
26,554,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,585,187 UART: [rt]cmd =0x4d454153, len=108
26,603,215 >>> mbox cmd response data (12 bytes)
26,603,639 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,634,234 UART: [rt]cmd =0x4d454153, len=108
26,653,354 >>> mbox cmd response data (12 bytes)
26,653,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,684,412 UART: [rt]cmd =0x4d454153, len=108
26,703,281 >>> mbox cmd response data (12 bytes)
26,703,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,734,226 UART: [rt]cmd =0x4d454153, len=108
26,736,554 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,461,468 ready_for_fw is high
3,461,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,221,143 >>> mbox cmd response: success
18,516,946 UART:
18,517,344 UART: Running Caliptra FMC ...
18,518,482 UART:
18,518,661 UART: [state] CFI Enabled
18,585,053 UART: [fht] FMC Alias Private Key: 7
20,351,434 UART: [art] Extend RT PCRs Done
20,352,652 UART: [art] Lock RT PCRs Done
20,354,167 UART: [art] Populate DV Done
20,359,633 UART: [fht] FMC Alias Private Key: 7
20,361,235 UART: [art] Derive CDI
20,362,050 UART: [art] Store in slot 0x4
20,417,897 UART: [art] Derive Key Pair
20,418,927 UART: [art] Store priv key in slot 0x5
22,881,995 UART: [art] Derive Key Pair - Done
22,894,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,608,290 UART: [art] Erasing AUTHORITY.KEYID = 7
24,609,791 UART: [art] PUB.X = ABC033C5C2BF2C9198E3134649BCAE98B475B065CD6BF9487D6F51A0071476DD71730EDF9C1292FBEFC2E6DEE1AF028D
24,617,103 UART: [art] PUB.Y = E82E2E7D77706A9686ECFE879D244469D397CD3F61DCD57C1107D7E30C696EF8E512366A799E321F8AA92D5B8310842F
24,624,349 UART: [art] SIG.R = D805AC589D320C5AB4532344B83AA6CF383C0899787F1C36A9C536BE17197192BA6C80C0B9A449636B37259C48188695
24,631,765 UART: [art] SIG.S = 2E47F363713E2702A13D7AB699D20EC1B6BCA34AE92BF1C3B59AD4A2411C15E8DDEC2A6C3586A56EAED83AEB7C15954F
25,610,693 UART: Caliptra RT
25,611,394 UART: [state] CFI Enabled
25,791,955 UART: [rt] RT listening for mailbox commands...
25,793,833 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,824,502 UART: [rt]cmd =0x4d454153, len=108
25,843,274 >>> mbox cmd response data (12 bytes)
25,843,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,874,428 UART: [rt]cmd =0x4d454153, len=108
25,893,120 >>> mbox cmd response data (12 bytes)
25,893,532 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,924,386 UART: [rt]cmd =0x4d454153, len=108
25,942,819 >>> mbox cmd response data (12 bytes)
25,943,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,973,986 UART: [rt]cmd =0x4d454153, len=108
25,993,491 >>> mbox cmd response data (12 bytes)
25,993,925 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,024,571 UART: [rt]cmd =0x4d454153, len=108
26,042,903 >>> mbox cmd response data (12 bytes)
26,043,357 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,074,279 UART: [rt]cmd =0x4d454153, len=108
26,092,641 >>> mbox cmd response data (12 bytes)
26,093,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,123,857 UART: [rt]cmd =0x4d454153, len=108
26,142,563 >>> mbox cmd response data (12 bytes)
26,142,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,173,353 UART: [rt]cmd =0x4d454153, len=108
26,192,092 >>> mbox cmd response data (12 bytes)
26,192,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,223,058 UART: [rt]cmd =0x4d454153, len=108
26,241,764 >>> mbox cmd response data (12 bytes)
26,242,174 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,272,620 UART: [rt]cmd =0x4d454153, len=108
26,292,142 >>> mbox cmd response data (12 bytes)
26,292,574 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,323,381 UART: [rt]cmd =0x4d454153, len=108
26,341,835 >>> mbox cmd response data (12 bytes)
26,342,298 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,373,106 UART: [rt]cmd =0x4d454153, len=108
26,392,244 >>> mbox cmd response data (12 bytes)
26,392,659 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,423,416 UART: [rt]cmd =0x4d454153, len=108
26,441,729 >>> mbox cmd response data (12 bytes)
26,442,158 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,472,910 UART: [rt]cmd =0x4d454153, len=108
26,492,102 >>> mbox cmd response data (12 bytes)
26,492,557 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,523,258 UART: [rt]cmd =0x4d454153, len=108
26,526,031 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
192,470 UART:
192,845 UART: Running Caliptra ROM ...
193,949 UART:
603,611 UART: [state] CFI Enabled
617,869 UART: [state] LifecycleState = Unprovisioned
619,824 UART: [state] DebugLocked = No
621,842 UART: [state] WD Timer not started. Device not locked for debugging
626,372 UART: [kat] SHA2-256
805,974 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,764 UART: [kat] ++
817,215 UART: [kat] sha1
828,375 UART: [kat] SHA2-256
831,106 UART: [kat] SHA2-384
836,175 UART: [kat] SHA2-512-ACC
838,542 UART: [kat] ECC-384
3,280,309 UART: [kat] HMAC-384Kdf
3,291,803 UART: [kat] LMS
3,768,323 UART: [kat] --
3,771,762 UART: [cold-reset] ++
3,772,802 UART: [fht] FHT @ 0x50003400
3,784,289 UART: [idev] ++
3,784,939 UART: [idev] CDI.KEYID = 6
3,785,855 UART: [idev] SUBJECT.KEYID = 7
3,787,102 UART: [idev] UDS.KEYID = 0
3,788,030 ready_for_fw is high
3,788,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,163 UART: [idev] Erasing UDS.KEYID = 0
6,262,590 UART: [idev] Sha1 KeyId Algorithm
6,285,870 UART: [idev] --
6,291,545 UART: [ldev] ++
6,292,112 UART: [ldev] CDI.KEYID = 6
6,293,025 UART: [ldev] SUBJECT.KEYID = 5
6,294,187 UART: [ldev] AUTHORITY.KEYID = 7
6,295,494 UART: [ldev] FE.KEYID = 1
6,306,276 UART: [ldev] Erasing FE.KEYID = 1
8,782,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,514 UART: [ldev] --
10,576,388 UART: [fwproc] Wait for Commands...
10,579,527 UART: [fwproc] Recv command 0x46574c44
10,581,570 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,784 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,797 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,371 >>> mbox cmd response: success
14,550,328 UART: [afmc] ++
14,550,991 UART: [afmc] CDI.KEYID = 6
14,551,924 UART: [afmc] SUBJECT.KEYID = 7
14,553,085 UART: [afmc] AUTHORITY.KEYID = 5
17,054,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,022 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,848 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,902 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,495 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,472 UART: [afmc] --
18,856,960 UART: [cold-reset] --
18,859,418 UART: [state] Locking Datavault
18,864,239 UART: [state] Locking PCR0, PCR1 and PCR31
18,865,995 UART: [state] Locking ICCM
18,867,612 UART: [exit] Launching FMC @ 0x40000130
18,876,015 UART:
18,876,283 UART: Running Caliptra FMC ...
18,877,392 UART:
18,877,561 UART: [state] CFI Enabled
18,885,500 UART: [fht] FMC Alias Private Key: 7
20,652,078 UART: [art] Extend RT PCRs Done
20,653,306 UART: [art] Lock RT PCRs Done
20,654,860 UART: [art] Populate DV Done
20,660,492 UART: [fht] FMC Alias Private Key: 7
20,662,192 UART: [art] Derive CDI
20,662,927 UART: [art] Store in slot 0x4
20,706,010 UART: [art] Derive Key Pair
20,707,010 UART: [art] Store priv key in slot 0x5
23,134,103 UART: [art] Derive Key Pair - Done
23,146,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,302 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,811 UART: [art] PUB.X = C28F07390911C5754E68A02FDEC767D806DE0D003CAF36613A864CE0DE68A2CA2385B2283E177574742E43B1BE8DC313
24,862,087 UART: [art] PUB.Y = 273A93965E04CFCF1B065473F01F63C1ED966093B54B91D335BCB7290A10DD1E80FE25F8DF2EADF44C25B5EA8616A2C0
24,869,324 UART: [art] SIG.R = 7357CB5F4A71296230247EF0E1B712601598322502798348697DC6E3DF8616A249FDC86CEDAB44A363A82DFA8681A786
24,876,660 UART: [art] SIG.S = A425C0AB5109E0FD7303DBBC7B79E4E38A2C0CA6F0D9676FC2A58A97EE500B2E040C9F2AC01E85C67378B09F908F144E
25,854,824 UART: Caliptra RT
25,855,533 UART: [state] CFI Enabled
25,988,472 UART: [rt] RT listening for mailbox commands...
25,990,353 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,020,743 UART: [rt]cmd =0x4d454153, len=108
26,039,232 >>> mbox cmd response data (12 bytes)
26,039,794 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,070,348 UART: [rt]cmd =0x4d454153, len=108
26,088,472 >>> mbox cmd response data (12 bytes)
26,088,910 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,119,562 UART: [rt]cmd =0x4d454153, len=108
26,137,979 >>> mbox cmd response data (12 bytes)
26,138,412 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,168,915 UART: [rt]cmd =0x4d454153, len=108
26,188,104 >>> mbox cmd response data (12 bytes)
26,188,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,219,512 UART: [rt]cmd =0x4d454153, len=108
26,237,248 >>> mbox cmd response data (12 bytes)
26,237,670 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,268,320 UART: [rt]cmd =0x4d454153, len=108
26,287,931 >>> mbox cmd response data (12 bytes)
26,288,372 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,319,015 UART: [rt]cmd =0x4d454153, len=108
26,338,375 >>> mbox cmd response data (12 bytes)
26,338,837 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,369,375 UART: [rt]cmd =0x4d454153, len=108
26,388,569 >>> mbox cmd response data (12 bytes)
26,388,990 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,419,422 UART: [rt]cmd =0x4d454153, len=108
26,438,345 >>> mbox cmd response data (12 bytes)
26,438,778 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,469,421 UART: [rt]cmd =0x4d454153, len=108
26,487,107 >>> mbox cmd response data (12 bytes)
26,487,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,517,957 UART: [rt]cmd =0x4d454153, len=108
26,536,807 >>> mbox cmd response data (12 bytes)
26,537,238 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,567,878 UART: [rt]cmd =0x4d454153, len=108
26,587,078 >>> mbox cmd response data (12 bytes)
26,587,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,617,974 UART: [rt]cmd =0x4d454153, len=108
26,636,793 >>> mbox cmd response data (12 bytes)
26,637,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,667,919 UART: [rt]cmd =0x4d454153, len=108
26,686,717 >>> mbox cmd response data (12 bytes)
26,687,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,718,027 UART: [rt]cmd =0x4d454153, len=108
26,720,576 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,780,423 ready_for_fw is high
3,780,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,441 >>> mbox cmd response: success
18,702,297 UART:
18,702,696 UART: Running Caliptra FMC ...
18,703,834 UART:
18,703,999 UART: [state] CFI Enabled
18,712,039 UART: [fht] FMC Alias Private Key: 7
20,477,551 UART: [art] Extend RT PCRs Done
20,478,765 UART: [art] Lock RT PCRs Done
20,480,668 UART: [art] Populate DV Done
20,485,731 UART: [fht] FMC Alias Private Key: 7
20,487,325 UART: [art] Derive CDI
20,488,144 UART: [art] Store in slot 0x4
20,530,885 UART: [art] Derive Key Pair
20,531,925 UART: [art] Store priv key in slot 0x5
22,958,509 UART: [art] Derive Key Pair - Done
22,971,568 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,578 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,190 UART: [art] PUB.X = 40FDC1BC1839E9990D089CBF7E21CECAFF03E7A9B1132EEC59A4FFAEA019980520ABFBDCE00F86120A42D351E3B680AE
24,686,397 UART: [art] PUB.Y = 40D2C7E6FB8DD1A824F5425B76E8DC72E98B6F80A6B332EB22F67F9C6C1F178C47C4410702DBDD30334C5F49C6E47984
24,693,667 UART: [art] SIG.R = B6A0C8C683FCA458A56C108A5B1D205FC359DD1C0169ECDA2C00FAA9121A67A2CD84247FCC0F11AC90741DBEA21934A7
24,701,070 UART: [art] SIG.S = 8B9791784200D4CE8CE09BE97ABF1B29BB01666AF77F21C0AF5BBD2DA8AFE244A2E53A1A46CCB06D119EF27899F04DFE
25,680,475 UART: Caliptra RT
25,681,189 UART: [state] CFI Enabled
25,814,362 UART: [rt] RT listening for mailbox commands...
25,816,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,847,030 UART: [rt]cmd =0x4d454153, len=108
25,865,808 >>> mbox cmd response data (12 bytes)
25,866,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,897,119 UART: [rt]cmd =0x4d454153, len=108
25,916,240 >>> mbox cmd response data (12 bytes)
25,916,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,947,168 UART: [rt]cmd =0x4d454153, len=108
25,965,505 >>> mbox cmd response data (12 bytes)
25,965,987 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,996,583 UART: [rt]cmd =0x4d454153, len=108
26,014,703 >>> mbox cmd response data (12 bytes)
26,015,138 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,045,953 UART: [rt]cmd =0x4d454153, len=108
26,064,771 >>> mbox cmd response data (12 bytes)
26,065,225 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,095,920 UART: [rt]cmd =0x4d454153, len=108
26,114,705 >>> mbox cmd response data (12 bytes)
26,115,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,145,830 UART: [rt]cmd =0x4d454153, len=108
26,164,297 >>> mbox cmd response data (12 bytes)
26,164,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,195,364 UART: [rt]cmd =0x4d454153, len=108
26,213,528 >>> mbox cmd response data (12 bytes)
26,213,986 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,244,363 UART: [rt]cmd =0x4d454153, len=108
26,263,505 >>> mbox cmd response data (12 bytes)
26,263,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,294,411 UART: [rt]cmd =0x4d454153, len=108
26,313,095 >>> mbox cmd response data (12 bytes)
26,313,526 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,344,171 UART: [rt]cmd =0x4d454153, len=108
26,363,359 >>> mbox cmd response data (12 bytes)
26,363,835 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,394,700 UART: [rt]cmd =0x4d454153, len=108
26,413,846 >>> mbox cmd response data (12 bytes)
26,414,309 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,444,800 UART: [rt]cmd =0x4d454153, len=108
26,463,435 >>> mbox cmd response data (12 bytes)
26,463,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,494,726 UART: [rt]cmd =0x4d454153, len=108
26,513,917 >>> mbox cmd response data (12 bytes)
26,514,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,544,759 UART: [rt]cmd =0x4d454153, len=108
26,546,958 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,109 UART:
192,496 UART: Running Caliptra ROM ...
193,626 UART:
193,771 UART: [state] CFI Enabled
265,469 UART: [state] LifecycleState = Unprovisioned
267,927 UART: [state] DebugLocked = No
269,361 UART: [state] WD Timer not started. Device not locked for debugging
274,401 UART: [kat] SHA2-256
464,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,048 UART: [kat] ++
475,588 UART: [kat] sha1
486,113 UART: [kat] SHA2-256
489,108 UART: [kat] SHA2-384
494,430 UART: [kat] SHA2-512-ACC
497,017 UART: [kat] ECC-384
2,947,247 UART: [kat] HMAC-384Kdf
2,971,650 UART: [kat] LMS
3,503,382 UART: [kat] --
3,506,598 UART: [cold-reset] ++
3,508,100 UART: [fht] FHT @ 0x50003400
3,519,932 UART: [idev] ++
3,520,636 UART: [idev] CDI.KEYID = 6
3,521,664 UART: [idev] SUBJECT.KEYID = 7
3,522,767 UART: [idev] UDS.KEYID = 0
3,523,694 ready_for_fw is high
3,523,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,424 UART: [idev] Erasing UDS.KEYID = 0
6,026,669 UART: [idev] Sha1 KeyId Algorithm
6,049,061 UART: [idev] --
6,053,383 UART: [ldev] ++
6,054,060 UART: [ldev] CDI.KEYID = 6
6,054,950 UART: [ldev] SUBJECT.KEYID = 5
6,056,161 UART: [ldev] AUTHORITY.KEYID = 7
6,057,393 UART: [ldev] FE.KEYID = 1
6,100,826 UART: [ldev] Erasing FE.KEYID = 1
8,608,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,050 UART: [ldev] --
10,415,060 UART: [fwproc] Wait for Commands...
10,417,920 UART: [fwproc] Recv command 0x46574c44
10,420,229 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,922 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,541 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,179 >>> mbox cmd response: success
14,687,323 UART: [afmc] ++
14,688,049 UART: [afmc] CDI.KEYID = 6
14,689,245 UART: [afmc] SUBJECT.KEYID = 7
14,690,686 UART: [afmc] AUTHORITY.KEYID = 5
17,238,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,980,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,982,670 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,997,771 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,012,926 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,027,832 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,051,284 UART: [afmc] --
19,055,561 UART: [cold-reset] --
19,060,591 UART: [state] Locking Datavault
19,066,722 UART: [state] Locking PCR0, PCR1 and PCR31
19,068,879 UART: [state] Locking ICCM
19,070,388 UART: [exit] Launching FMC @ 0x40000130
19,079,069 UART:
19,079,304 UART: Running Caliptra FMC ...
19,080,404 UART:
19,080,566 UART: [state] CFI Enabled
19,137,465 UART: [fht] FMC Alias Private Key: 7
20,903,446 UART: [art] Extend RT PCRs Done
20,904,666 UART: [art] Lock RT PCRs Done
20,906,423 UART: [art] Populate DV Done
20,911,776 UART: [fht] FMC Alias Private Key: 7
20,913,521 UART: [art] Derive CDI
20,914,256 UART: [art] Store in slot 0x4
20,969,938 UART: [art] Derive Key Pair
20,970,999 UART: [art] Store priv key in slot 0x5
23,433,456 UART: [art] Derive Key Pair - Done
23,446,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,249 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,758 UART: [art] PUB.X = 886D097088423D60DEB2709AE22005ECE341866CC827560306998B6B700DFFCF12BF910F88F93BA030F3C97C47F543FB
25,167,991 UART: [art] PUB.Y = 8E8FB59A0450EFD7DB3A5B07F3373CCD88235FC42004C00230F8954D205B8D364E0108EBC977BB871D815779C1F07219
25,175,256 UART: [art] SIG.R = DE5F99F2273B776B0905342439EC6B80D27CDE267CBAF22843D5C611AE5E9D51497EAFB5E8023CB3DC997609F40558CE
25,182,620 UART: [art] SIG.S = 84C611A0872D0235CFFB9005232D2BBE211C64D049BD3FA033469106A7D3E1E45BFBE822F70024FB80287E61009413EC
26,161,642 UART: Caliptra RT
26,162,337 UART: [state] CFI Enabled
26,342,980 UART: [rt] RT listening for mailbox commands...
26,344,863 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,375,737 UART: [rt]cmd =0x4d454153, len=108
26,394,132 >>> mbox cmd response data (12 bytes)
26,394,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,425,300 UART: [rt]cmd =0x4d454153, len=108
26,444,225 >>> mbox cmd response data (12 bytes)
26,444,654 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,475,406 UART: [rt]cmd =0x4d454153, len=108
26,494,070 >>> mbox cmd response data (12 bytes)
26,494,559 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,525,315 UART: [rt]cmd =0x4d454153, len=108
26,544,678 >>> mbox cmd response data (12 bytes)
26,545,103 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,575,702 UART: [rt]cmd =0x4d454153, len=108
26,594,448 >>> mbox cmd response data (12 bytes)
26,594,878 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,625,572 UART: [rt]cmd =0x4d454153, len=108
26,644,168 >>> mbox cmd response data (12 bytes)
26,644,589 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,675,400 UART: [rt]cmd =0x4d454153, len=108
26,693,819 >>> mbox cmd response data (12 bytes)
26,694,262 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,725,117 UART: [rt]cmd =0x4d454153, len=108
26,744,150 >>> mbox cmd response data (12 bytes)
26,744,609 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,775,037 UART: [rt]cmd =0x4d454153, len=108
26,793,803 >>> mbox cmd response data (12 bytes)
26,794,225 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,824,767 UART: [rt]cmd =0x4d454153, len=108
26,843,617 >>> mbox cmd response data (12 bytes)
26,844,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,874,681 UART: [rt]cmd =0x4d454153, len=108
26,894,362 >>> mbox cmd response data (12 bytes)
26,894,814 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,925,622 UART: [rt]cmd =0x4d454153, len=108
26,944,979 >>> mbox cmd response data (12 bytes)
26,945,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,976,069 UART: [rt]cmd =0x4d454153, len=108
26,994,599 >>> mbox cmd response data (12 bytes)
26,995,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,025,677 UART: [rt]cmd =0x4d454153, len=108
27,045,143 >>> mbox cmd response data (12 bytes)
27,045,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,076,263 UART: [rt]cmd =0x4d454153, len=108
27,078,577 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,437,011 ready_for_fw is high
3,437,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,369 >>> mbox cmd response: success
19,112,801 UART:
19,113,193 UART: Running Caliptra FMC ...
19,114,343 UART:
19,114,497 UART: [state] CFI Enabled
19,176,542 UART: [fht] FMC Alias Private Key: 7
20,942,806 UART: [art] Extend RT PCRs Done
20,944,019 UART: [art] Lock RT PCRs Done
20,945,456 UART: [art] Populate DV Done
20,951,030 UART: [fht] FMC Alias Private Key: 7
20,952,731 UART: [art] Derive CDI
20,953,463 UART: [art] Store in slot 0x4
21,009,210 UART: [art] Derive Key Pair
21,010,256 UART: [art] Store priv key in slot 0x5
23,473,585 UART: [art] Derive Key Pair - Done
23,486,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,032 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,551 UART: [art] PUB.X = 7EDD0E86463EA6F3E59D8C3E19B6175A60C030F627545D1B0C6304F9F9CCAE7FFCE5B08684331D8CC2B8960846E530A6
25,207,783 UART: [art] PUB.Y = BEB040203E4147872C0B4E786701961141152A0CA0A3E5EE1106E9C2BB7101168BBB82CDB5702A6CE19AA0465A11F901
25,215,053 UART: [art] SIG.R = 787F128FF46E629F5C398759FFE8521F9CDCDAC206A34481917368F394E697B7115A1B3F9914C85AA8C21B3994DEF341
25,222,414 UART: [art] SIG.S = AA04DB1C4E570A88B222DB0C4BC2488A882BE1D0FA5AF69F80CE091425968F4A8ACFD78D0D6D9E19B365F6C6332FEF3B
26,201,272 UART: Caliptra RT
26,201,988 UART: [state] CFI Enabled
26,382,389 UART: [rt] RT listening for mailbox commands...
26,384,277 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,414,933 UART: [rt]cmd =0x4d454153, len=108
26,432,616 >>> mbox cmd response data (12 bytes)
26,433,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,463,897 UART: [rt]cmd =0x4d454153, len=108
26,482,823 >>> mbox cmd response data (12 bytes)
26,483,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,514,019 UART: [rt]cmd =0x4d454153, len=108
26,532,065 >>> mbox cmd response data (12 bytes)
26,532,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,563,260 UART: [rt]cmd =0x4d454153, len=108
26,581,211 >>> mbox cmd response data (12 bytes)
26,581,636 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,612,236 UART: [rt]cmd =0x4d454153, len=108
26,631,054 >>> mbox cmd response data (12 bytes)
26,631,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,661,983 UART: [rt]cmd =0x4d454153, len=108
26,680,858 >>> mbox cmd response data (12 bytes)
26,681,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,711,905 UART: [rt]cmd =0x4d454153, len=108
26,730,285 >>> mbox cmd response data (12 bytes)
26,730,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,761,535 UART: [rt]cmd =0x4d454153, len=108
26,780,230 >>> mbox cmd response data (12 bytes)
26,780,661 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,811,358 UART: [rt]cmd =0x4d454153, len=108
26,829,955 >>> mbox cmd response data (12 bytes)
26,830,412 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,861,327 UART: [rt]cmd =0x4d454153, len=108
26,880,522 >>> mbox cmd response data (12 bytes)
26,880,933 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,911,422 UART: [rt]cmd =0x4d454153, len=108
26,930,590 >>> mbox cmd response data (12 bytes)
26,931,023 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,961,563 UART: [rt]cmd =0x4d454153, len=108
26,980,589 >>> mbox cmd response data (12 bytes)
26,981,010 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,011,579 UART: [rt]cmd =0x4d454153, len=108
27,030,455 >>> mbox cmd response data (12 bytes)
27,030,892 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,061,594 UART: [rt]cmd =0x4d454153, len=108
27,080,193 >>> mbox cmd response data (12 bytes)
27,080,656 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,111,518 UART: [rt]cmd =0x4d454153, len=108
27,113,733 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,515 UART:
192,891 UART: Running Caliptra ROM ...
193,994 UART:
603,785 UART: [state] CFI Enabled
619,228 UART: [state] LifecycleState = Unprovisioned
621,604 UART: [state] DebugLocked = No
623,907 UART: [state] WD Timer not started. Device not locked for debugging
628,552 UART: [kat] SHA2-256
818,433 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,169 UART: [kat] ++
829,778 UART: [kat] sha1
840,588 UART: [kat] SHA2-256
843,595 UART: [kat] SHA2-384
849,668 UART: [kat] SHA2-512-ACC
852,258 UART: [kat] ECC-384
3,297,639 UART: [kat] HMAC-384Kdf
3,309,208 UART: [kat] LMS
3,841,031 UART: [kat] --
3,845,377 UART: [cold-reset] ++
3,846,341 UART: [fht] FHT @ 0x50003400
3,858,192 UART: [idev] ++
3,858,833 UART: [idev] CDI.KEYID = 6
3,859,868 UART: [idev] SUBJECT.KEYID = 7
3,861,066 UART: [idev] UDS.KEYID = 0
3,862,016 ready_for_fw is high
3,862,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,162 UART: [idev] Erasing UDS.KEYID = 0
6,341,953 UART: [idev] Sha1 KeyId Algorithm
6,363,780 UART: [idev] --
6,368,211 UART: [ldev] ++
6,368,891 UART: [ldev] CDI.KEYID = 6
6,369,804 UART: [ldev] SUBJECT.KEYID = 5
6,371,020 UART: [ldev] AUTHORITY.KEYID = 7
6,372,204 UART: [ldev] FE.KEYID = 1
6,384,584 UART: [ldev] Erasing FE.KEYID = 1
8,863,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,022 UART: [ldev] --
10,655,734 UART: [fwproc] Wait for Commands...
10,658,697 UART: [fwproc] Recv command 0x46574c44
10,660,955 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,520 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,170 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,224 >>> mbox cmd response: success
14,919,867 UART: [afmc] ++
14,920,592 UART: [afmc] CDI.KEYID = 6
14,921,712 UART: [afmc] SUBJECT.KEYID = 7
14,923,213 UART: [afmc] AUTHORITY.KEYID = 5
17,427,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,148,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,150,375 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,165,451 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,180,599 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,195,524 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,715 UART: [afmc] --
19,222,711 UART: [cold-reset] --
19,225,569 UART: [state] Locking Datavault
19,229,761 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,926 UART: [state] Locking ICCM
19,233,820 UART: [exit] Launching FMC @ 0x40000130
19,242,466 UART:
19,242,706 UART: Running Caliptra FMC ...
19,243,812 UART:
19,243,972 UART: [state] CFI Enabled
19,252,348 UART: [fht] FMC Alias Private Key: 7
21,018,457 UART: [art] Extend RT PCRs Done
21,019,686 UART: [art] Lock RT PCRs Done
21,021,181 UART: [art] Populate DV Done
21,026,711 UART: [fht] FMC Alias Private Key: 7
21,028,255 UART: [art] Derive CDI
21,029,027 UART: [art] Store in slot 0x4
21,071,524 UART: [art] Derive Key Pair
21,072,571 UART: [art] Store priv key in slot 0x5
23,499,488 UART: [art] Derive Key Pair - Done
23,512,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,774 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,278 UART: [art] PUB.X = 4AB1CEBF0548971D47A10AAA64829494D4C81CC583248430B13E81DFB7E0797321C617A24EEB1813FF919011CC363019
25,227,544 UART: [art] PUB.Y = 042616AF05FCB1DA5A1F83314CA4594EB979BE29CC5CF02407A0CE05C460F05A76DA32BB855F886E60176C6FB196940B
25,234,808 UART: [art] SIG.R = 3869AF63FED78FFCAFC690B2B33FA15C6E8E9DD99CEC99A9812CDC20E631B358CD8F3380791ED41DBC4BC5E942B4D1C0
25,242,229 UART: [art] SIG.S = 78FA853FEC2E11F77071AA2A4BEA7979B15AAD163BE0D1BB1AC32974DE96178F6622D640E72F7C636E5B37798C9F7C27
26,221,117 UART: Caliptra RT
26,221,823 UART: [state] CFI Enabled
26,354,667 UART: [rt] RT listening for mailbox commands...
26,356,579 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,387,392 UART: [rt]cmd =0x4d454153, len=108
26,407,303 >>> mbox cmd response data (12 bytes)
26,407,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,438,251 UART: [rt]cmd =0x4d454153, len=108
26,456,536 >>> mbox cmd response data (12 bytes)
26,456,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,487,581 UART: [rt]cmd =0x4d454153, len=108
26,505,675 >>> mbox cmd response data (12 bytes)
26,506,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,536,713 UART: [rt]cmd =0x4d454153, len=108
26,555,210 >>> mbox cmd response data (12 bytes)
26,555,639 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,586,296 UART: [rt]cmd =0x4d454153, len=108
26,605,635 >>> mbox cmd response data (12 bytes)
26,606,071 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,636,798 UART: [rt]cmd =0x4d454153, len=108
26,655,675 >>> mbox cmd response data (12 bytes)
26,656,138 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,686,897 UART: [rt]cmd =0x4d454153, len=108
26,705,008 >>> mbox cmd response data (12 bytes)
26,705,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,735,880 UART: [rt]cmd =0x4d454153, len=108
26,754,301 >>> mbox cmd response data (12 bytes)
26,754,736 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,785,384 UART: [rt]cmd =0x4d454153, len=108
26,804,091 >>> mbox cmd response data (12 bytes)
26,804,518 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,835,171 UART: [rt]cmd =0x4d454153, len=108
26,854,614 >>> mbox cmd response data (12 bytes)
26,855,045 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,885,854 UART: [rt]cmd =0x4d454153, len=108
26,904,672 >>> mbox cmd response data (12 bytes)
26,905,110 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,935,917 UART: [rt]cmd =0x4d454153, len=108
26,954,581 >>> mbox cmd response data (12 bytes)
26,955,003 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,985,767 UART: [rt]cmd =0x4d454153, len=108
27,004,354 >>> mbox cmd response data (12 bytes)
27,004,792 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,035,224 UART: [rt]cmd =0x4d454153, len=108
27,054,906 >>> mbox cmd response data (12 bytes)
27,055,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,086,119 UART: [rt]cmd =0x4d454153, len=108
27,088,726 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,755,168 ready_for_fw is high
3,755,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,699 >>> mbox cmd response: success
19,286,900 UART:
19,287,301 UART: Running Caliptra FMC ...
19,288,416 UART:
19,288,572 UART: [state] CFI Enabled
19,296,499 UART: [fht] FMC Alias Private Key: 7
21,061,839 UART: [art] Extend RT PCRs Done
21,063,130 UART: [art] Lock RT PCRs Done
21,064,820 UART: [art] Populate DV Done
21,070,114 UART: [fht] FMC Alias Private Key: 7
21,071,717 UART: [art] Derive CDI
21,072,478 UART: [art] Store in slot 0x4
21,115,241 UART: [art] Derive Key Pair
21,116,254 UART: [art] Store priv key in slot 0x5
23,543,546 UART: [art] Derive Key Pair - Done
23,556,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,262,995 UART: [art] Erasing AUTHORITY.KEYID = 7
25,264,509 UART: [art] PUB.X = 12C49602EE55E82547B1BCCCD587817AADBDB4404646E02EDB51D27BB75F4E730EC91A5AEE6B95FA8A595D649E2D7FFF
25,271,751 UART: [art] PUB.Y = 95029ECAA256637890255D5F3BA5FF6CB122E1EA32E6A3CDC108558E0E9DBB2BD8D222A19EDC83E62ED13AAD544A3AFF
25,279,042 UART: [art] SIG.R = FD5576452705C72BAFD1880A45FBD5379F30ABFA6376831EC71D54519B05E66B45A574B30E28A9334DD3AEB886A741BE
25,286,433 UART: [art] SIG.S = 0DBC1BE2D328CE93124A9ABEE572AF8406E87AAFCE97410F523A5A8A77A2979A2D90C8CE6954FC0781315ECF99A75C6E
26,265,714 UART: Caliptra RT
26,266,421 UART: [state] CFI Enabled
26,399,642 UART: [rt] RT listening for mailbox commands...
26,401,537 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,432,316 UART: [rt]cmd =0x4d454153, len=108
26,451,238 >>> mbox cmd response data (12 bytes)
26,451,758 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,482,461 UART: [rt]cmd =0x4d454153, len=108
26,501,344 >>> mbox cmd response data (12 bytes)
26,501,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,532,693 UART: [rt]cmd =0x4d454153, len=108
26,551,036 >>> mbox cmd response data (12 bytes)
26,551,482 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,581,945 UART: [rt]cmd =0x4d454153, len=108
26,600,794 >>> mbox cmd response data (12 bytes)
26,601,227 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,631,976 UART: [rt]cmd =0x4d454153, len=108
26,651,090 >>> mbox cmd response data (12 bytes)
26,651,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,682,167 UART: [rt]cmd =0x4d454153, len=108
26,700,890 >>> mbox cmd response data (12 bytes)
26,701,322 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,731,872 UART: [rt]cmd =0x4d454153, len=108
26,751,266 >>> mbox cmd response data (12 bytes)
26,751,708 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,782,250 UART: [rt]cmd =0x4d454153, len=108
26,801,251 >>> mbox cmd response data (12 bytes)
26,801,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,832,385 UART: [rt]cmd =0x4d454153, len=108
26,851,505 >>> mbox cmd response data (12 bytes)
26,851,938 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,882,799 UART: [rt]cmd =0x4d454153, len=108
26,901,415 >>> mbox cmd response data (12 bytes)
26,901,875 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,932,360 UART: [rt]cmd =0x4d454153, len=108
26,951,071 >>> mbox cmd response data (12 bytes)
26,951,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,981,884 UART: [rt]cmd =0x4d454153, len=108
27,000,308 >>> mbox cmd response data (12 bytes)
27,000,750 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,031,345 UART: [rt]cmd =0x4d454153, len=108
27,050,820 >>> mbox cmd response data (12 bytes)
27,051,270 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,082,046 UART: [rt]cmd =0x4d454153, len=108
27,100,306 >>> mbox cmd response data (12 bytes)
27,100,733 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,131,379 UART: [rt]cmd =0x4d454153, len=108
27,133,907 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,579 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,203 UART: [kat] SHA2-256
882,134 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,249 UART: [kat] ++
886,401 UART: [kat] sha1
890,819 UART: [kat] SHA2-256
892,757 UART: [kat] SHA2-384
895,374 UART: [kat] SHA2-512-ACC
897,275 UART: [kat] ECC-384
903,246 UART: [kat] HMAC-384Kdf
907,906 UART: [kat] LMS
1,476,102 UART: [kat] --
1,477,133 UART: [cold-reset] ++
1,477,667 UART: [fht] Storing FHT @ 0x50003400
1,480,566 UART: [idev] ++
1,480,734 UART: [idev] CDI.KEYID = 6
1,481,094 UART: [idev] SUBJECT.KEYID = 7
1,481,518 UART: [idev] UDS.KEYID = 0
1,481,863 ready_for_fw is high
1,481,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,184 UART: [idev] Erasing UDS.KEYID = 0
1,506,046 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,680 UART: [idev] --
1,515,853 UART: [ldev] ++
1,516,021 UART: [ldev] CDI.KEYID = 6
1,516,384 UART: [ldev] SUBJECT.KEYID = 5
1,516,810 UART: [ldev] AUTHORITY.KEYID = 7
1,517,273 UART: [ldev] FE.KEYID = 1
1,522,311 UART: [ldev] Erasing FE.KEYID = 1
1,547,796 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,968 UART: [ldev] --
1,587,459 UART: [fwproc] Waiting for Commands...
1,588,074 UART: [fwproc] Received command 0x46574c44
1,588,865 UART: [fwproc] Received Image of size 118548 bytes
2,933,049 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,689 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,907 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,204 >>> mbox cmd response: success
3,133,398 UART: [afmc] ++
3,133,566 UART: [afmc] CDI.KEYID = 6
3,133,928 UART: [afmc] SUBJECT.KEYID = 7
3,134,353 UART: [afmc] AUTHORITY.KEYID = 5
3,169,308 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,508 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,288 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,997 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,880 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,563 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,407 UART: [afmc] --
3,212,533 UART: [cold-reset] --
3,213,365 UART: [state] Locking Datavault
3,214,428 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,032 UART: [state] Locking ICCM
3,215,596 UART: [exit] Launching FMC @ 0x40000130
3,220,926 UART:
3,220,942 UART: Running Caliptra FMC ...
3,221,350 UART:
3,221,404 UART: [state] CFI Enabled
3,232,126 UART: [fht] FMC Alias Private Key: 7
3,351,246 UART: [art] Extend RT PCRs Done
3,351,674 UART: [art] Lock RT PCRs Done
3,353,380 UART: [art] Populate DV Done
3,361,463 UART: [fht] FMC Alias Private Key: 7
3,362,431 UART: [art] Derive CDI
3,362,711 UART: [art] Store in slot 0x4
3,448,541 UART: [art] Derive Key Pair
3,448,901 UART: [art] Store priv key in slot 0x5
3,462,106 UART: [art] Derive Key Pair - Done
3,477,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,770 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,535 UART: [art] PUB.X = 223A2EDE0613974071CC0D6DB5BD232FF709806799C75BCC588653D3938C711AB1C484AC874F52B4A38D68DC7147F695
3,500,296 UART: [art] PUB.Y = 60720772D6B39E5B13C55EAAC2896A34A3AE13B8DADB10D380DAC76E917B3FFD04C295E320CC988855C1A0A1E37E3129
3,507,250 UART: [art] SIG.R = 71D00C9C33926C4112C0CDAE6149FA6E9B3B9301D363292F475BD727B993DF6C17450F1F52487C36B6777639EC93735B
3,514,007 UART: [art] SIG.S = B6FAF9B903A65CCD273F860D8E039A0B38197D24FEF75B32D872FF5C6B1F284C5A14FFB688BDDEEFCEC855BE7ACEF65A
3,537,649 UART: Caliptra RT
3,537,900 UART: [state] CFI Enabled
3,657,320 UART: [rt] RT listening for mailbox commands...
3,657,990 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,430 UART: [rt]cmd =0x4d454153, len=108
3,708,720 >>> mbox cmd response data (12 bytes)
3,708,721 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,680 UART: [rt]cmd =0x4d454153, len=108
3,759,441 >>> mbox cmd response data (12 bytes)
3,759,442 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,789,455 UART: [rt]cmd =0x4d454153, len=108
3,810,279 >>> mbox cmd response data (12 bytes)
3,810,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,465 UART: [rt]cmd =0x4d454153, len=108
3,861,524 >>> mbox cmd response data (12 bytes)
3,861,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,522 UART: [rt]cmd =0x4d454153, len=108
3,912,626 >>> mbox cmd response data (12 bytes)
3,912,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,550 UART: [rt]cmd =0x4d454153, len=108
3,962,949 >>> mbox cmd response data (12 bytes)
3,962,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,993,087 UART: [rt]cmd =0x4d454153, len=108
4,014,267 >>> mbox cmd response data (12 bytes)
4,014,268 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,044,349 UART: [rt]cmd =0x4d454153, len=108
4,065,078 >>> mbox cmd response data (12 bytes)
4,065,079 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,094,962 UART: [rt]cmd =0x4d454153, len=108
4,115,590 >>> mbox cmd response data (12 bytes)
4,115,591 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,145,556 UART: [rt]cmd =0x4d454153, len=108
4,166,491 >>> mbox cmd response data (12 bytes)
4,166,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,196,577 UART: [rt]cmd =0x4d454153, len=108
4,217,695 >>> mbox cmd response data (12 bytes)
4,217,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,247,755 UART: [rt]cmd =0x4d454153, len=108
4,268,300 >>> mbox cmd response data (12 bytes)
4,268,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,298,258 UART: [rt]cmd =0x4d454153, len=108
4,319,116 >>> mbox cmd response data (12 bytes)
4,319,117 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,349,142 UART: [rt]cmd =0x4d454153, len=108
4,371,187 >>> mbox cmd response data (12 bytes)
4,371,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,401,215 UART: [rt]cmd =0x4d454153, len=108
4,403,518 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,749 ready_for_fw is high
1,361,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,944 >>> mbox cmd response: success
3,042,523 UART:
3,042,539 UART: Running Caliptra FMC ...
3,042,947 UART:
3,043,001 UART: [state] CFI Enabled
3,053,547 UART: [fht] FMC Alias Private Key: 7
3,171,781 UART: [art] Extend RT PCRs Done
3,172,209 UART: [art] Lock RT PCRs Done
3,174,041 UART: [art] Populate DV Done
3,182,246 UART: [fht] FMC Alias Private Key: 7
3,183,372 UART: [art] Derive CDI
3,183,652 UART: [art] Store in slot 0x4
3,269,356 UART: [art] Derive Key Pair
3,269,716 UART: [art] Store priv key in slot 0x5
3,282,707 UART: [art] Derive Key Pair - Done
3,297,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,018 UART: [art] PUB.X = 4D53FADF933422912B905FC0FDB2FE631F2D4CFAA4F3289CB2C2004EC1293B60975B14DBA844FA864DE615CD93204828
3,320,776 UART: [art] PUB.Y = 6A96D36A1F2CD873B3EE23E6CD58ADCAE0BD652619F07D580142CAC105D16114CD523A12E77D8FD0C2B1FDFA8278EF6F
3,327,740 UART: [art] SIG.R = 129870F112C2A74105A4D8CFD7A3253B41852E835D62B803CED6A43EAA7A1AC9944199B714528EF17C312E4BC5804F11
3,334,504 UART: [art] SIG.S = BE6108D6A5FFCABEFD39B3906C6B69C9CD13050536F34AD8D6060BAB093DB58F00AE93C41439FD2D605B25778D3F6CE4
3,357,912 UART: Caliptra RT
3,358,163 UART: [state] CFI Enabled
3,477,587 UART: [rt] RT listening for mailbox commands...
3,478,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,459 UART: [rt]cmd =0x4d454153, len=108
3,529,123 >>> mbox cmd response data (12 bytes)
3,529,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,559,325 UART: [rt]cmd =0x4d454153, len=108
3,580,284 >>> mbox cmd response data (12 bytes)
3,580,285 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,380 UART: [rt]cmd =0x4d454153, len=108
3,630,726 >>> mbox cmd response data (12 bytes)
3,630,727 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,660,772 UART: [rt]cmd =0x4d454153, len=108
3,681,417 >>> mbox cmd response data (12 bytes)
3,681,418 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,273 UART: [rt]cmd =0x4d454153, len=108
3,732,469 >>> mbox cmd response data (12 bytes)
3,732,470 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,762,587 UART: [rt]cmd =0x4d454153, len=108
3,783,334 >>> mbox cmd response data (12 bytes)
3,783,335 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,478 UART: [rt]cmd =0x4d454153, len=108
3,833,976 >>> mbox cmd response data (12 bytes)
3,833,977 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,863,906 UART: [rt]cmd =0x4d454153, len=108
3,884,999 >>> mbox cmd response data (12 bytes)
3,885,000 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,017 UART: [rt]cmd =0x4d454153, len=108
3,935,779 >>> mbox cmd response data (12 bytes)
3,935,780 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,965,731 UART: [rt]cmd =0x4d454153, len=108
3,986,700 >>> mbox cmd response data (12 bytes)
3,986,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,468 UART: [rt]cmd =0x4d454153, len=108
4,037,606 >>> mbox cmd response data (12 bytes)
4,037,607 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,067,676 UART: [rt]cmd =0x4d454153, len=108
4,088,229 >>> mbox cmd response data (12 bytes)
4,088,230 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,118,311 UART: [rt]cmd =0x4d454153, len=108
4,139,109 >>> mbox cmd response data (12 bytes)
4,139,110 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,169,099 UART: [rt]cmd =0x4d454153, len=108
4,189,898 >>> mbox cmd response data (12 bytes)
4,189,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,220,052 UART: [rt]cmd =0x4d454153, len=108
4,221,905 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,486 UART: [kat] SHA2-256
882,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,532 UART: [kat] ++
886,684 UART: [kat] sha1
891,158 UART: [kat] SHA2-256
893,096 UART: [kat] SHA2-384
895,947 UART: [kat] SHA2-512-ACC
897,848 UART: [kat] ECC-384
903,301 UART: [kat] HMAC-384Kdf
908,035 UART: [kat] LMS
1,476,231 UART: [kat] --
1,477,146 UART: [cold-reset] ++
1,477,578 UART: [fht] Storing FHT @ 0x50003400
1,480,411 UART: [idev] ++
1,480,579 UART: [idev] CDI.KEYID = 6
1,480,939 UART: [idev] SUBJECT.KEYID = 7
1,481,363 UART: [idev] UDS.KEYID = 0
1,481,708 ready_for_fw is high
1,481,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,471 UART: [idev] Erasing UDS.KEYID = 0
1,506,379 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,073 UART: [idev] --
1,516,138 UART: [ldev] ++
1,516,306 UART: [ldev] CDI.KEYID = 6
1,516,669 UART: [ldev] SUBJECT.KEYID = 5
1,517,095 UART: [ldev] AUTHORITY.KEYID = 7
1,517,558 UART: [ldev] FE.KEYID = 1
1,522,852 UART: [ldev] Erasing FE.KEYID = 1
1,547,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,803 UART: [ldev] --
1,587,192 UART: [fwproc] Waiting for Commands...
1,588,025 UART: [fwproc] Received command 0x46574c44
1,588,816 UART: [fwproc] Received Image of size 118548 bytes
2,934,308 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,690 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,908 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,337 >>> mbox cmd response: success
3,133,459 UART: [afmc] ++
3,133,627 UART: [afmc] CDI.KEYID = 6
3,133,989 UART: [afmc] SUBJECT.KEYID = 7
3,134,414 UART: [afmc] AUTHORITY.KEYID = 5
3,169,595 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,837 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,617 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,326 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,209 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,892 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,622 UART: [afmc] --
3,212,538 UART: [cold-reset] --
3,213,484 UART: [state] Locking Datavault
3,214,549 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,153 UART: [state] Locking ICCM
3,215,809 UART: [exit] Launching FMC @ 0x40000130
3,221,139 UART:
3,221,155 UART: Running Caliptra FMC ...
3,221,563 UART:
3,221,706 UART: [state] CFI Enabled
3,232,482 UART: [fht] FMC Alias Private Key: 7
3,351,056 UART: [art] Extend RT PCRs Done
3,351,484 UART: [art] Lock RT PCRs Done
3,352,930 UART: [art] Populate DV Done
3,361,287 UART: [fht] FMC Alias Private Key: 7
3,362,411 UART: [art] Derive CDI
3,362,691 UART: [art] Store in slot 0x4
3,448,917 UART: [art] Derive Key Pair
3,449,277 UART: [art] Store priv key in slot 0x5
3,462,862 UART: [art] Derive Key Pair - Done
3,477,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,955 UART: [art] PUB.X = 26F6458FC6129D5F475FFBD3B67DBF9A28885A50992418B26D95C4B037DF996E4C14EEC6D6FE5EDB2BA93EB0338472EF
3,500,739 UART: [art] PUB.Y = 7F7D72BB29D7A2A950B98854779157D3B1956C40C20F7F7D15C31D20D3C69496F26A71675ECB145748952DD19EC9223A
3,507,682 UART: [art] SIG.R = D7CBBC0816C1E2D2570ADA79D0F7824C191DAD35683CA19ADFEF158C72185016C38D89904890D4CAB3104C549B2ED379
3,514,454 UART: [art] SIG.S = 1854522C7FABCBEB33DF2190214084EE3F0446B686F2EBFA3C4EA58FABDAFFB072A75311742E5FA33E7EBBF7C0618AF9
3,538,437 UART: Caliptra RT
3,538,780 UART: [state] CFI Enabled
3,659,436 UART: [rt] RT listening for mailbox commands...
3,660,106 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,640 UART: [rt]cmd =0x4d454153, len=108
3,711,036 >>> mbox cmd response data (12 bytes)
3,711,037 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,232 UART: [rt]cmd =0x4d454153, len=108
3,761,627 >>> mbox cmd response data (12 bytes)
3,761,628 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,881 UART: [rt]cmd =0x4d454153, len=108
3,812,403 >>> mbox cmd response data (12 bytes)
3,812,404 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,223 UART: [rt]cmd =0x4d454153, len=108
3,862,402 >>> mbox cmd response data (12 bytes)
3,862,403 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,478 UART: [rt]cmd =0x4d454153, len=108
3,914,006 >>> mbox cmd response data (12 bytes)
3,914,007 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,858 UART: [rt]cmd =0x4d454153, len=108
3,964,193 >>> mbox cmd response data (12 bytes)
3,964,194 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,994,309 UART: [rt]cmd =0x4d454153, len=108
4,015,191 >>> mbox cmd response data (12 bytes)
4,015,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,045,181 UART: [rt]cmd =0x4d454153, len=108
4,065,326 >>> mbox cmd response data (12 bytes)
4,065,327 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,095,298 UART: [rt]cmd =0x4d454153, len=108
4,116,300 >>> mbox cmd response data (12 bytes)
4,116,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,146,318 UART: [rt]cmd =0x4d454153, len=108
4,167,327 >>> mbox cmd response data (12 bytes)
4,167,328 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,197,545 UART: [rt]cmd =0x4d454153, len=108
4,218,407 >>> mbox cmd response data (12 bytes)
4,218,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,248,579 UART: [rt]cmd =0x4d454153, len=108
4,269,550 >>> mbox cmd response data (12 bytes)
4,269,551 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,299,358 UART: [rt]cmd =0x4d454153, len=108
4,320,488 >>> mbox cmd response data (12 bytes)
4,320,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,350,448 UART: [rt]cmd =0x4d454153, len=108
4,372,043 >>> mbox cmd response data (12 bytes)
4,372,044 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,401,865 UART: [rt]cmd =0x4d454153, len=108
4,403,902 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,572 ready_for_fw is high
1,363,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,195 >>> mbox cmd response: success
3,044,852 UART:
3,044,868 UART: Running Caliptra FMC ...
3,045,276 UART:
3,045,419 UART: [state] CFI Enabled
3,055,905 UART: [fht] FMC Alias Private Key: 7
3,174,883 UART: [art] Extend RT PCRs Done
3,175,311 UART: [art] Lock RT PCRs Done
3,176,593 UART: [art] Populate DV Done
3,184,772 UART: [fht] FMC Alias Private Key: 7
3,185,852 UART: [art] Derive CDI
3,186,132 UART: [art] Store in slot 0x4
3,271,784 UART: [art] Derive Key Pair
3,272,144 UART: [art] Store priv key in slot 0x5
3,284,961 UART: [art] Derive Key Pair - Done
3,299,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,903 UART: [art] PUB.X = 18C1964D5643DCE11B288ABED5BE2A382DE5D401F2ACFD5AD0710346322D4942988D9AE95D395EF012EB521C008B2FF7
3,322,655 UART: [art] PUB.Y = C7136D7BF6FCD5BC3F85ADAA493FACC97DE5921B4985EE8DEBDB2EBE8175FD2D2C9C2446D7C38F1E0D13BCCC4AB21386
3,329,634 UART: [art] SIG.R = 5FC5AD4AB995657C6DD168D2A0354CC7708095FAEC49B166A42DB1763487A57010BA2B64266837FCFCDE88B8BB371DDF
3,336,416 UART: [art] SIG.S = 0A12F8E81907EF3AF041DEBBCC8DD068BBF1271B3FD525F43711DB20ADAF81DDBB7C6F044A0665D03C3F3482C05FEF3F
3,360,122 UART: Caliptra RT
3,360,465 UART: [state] CFI Enabled
3,480,496 UART: [rt] RT listening for mailbox commands...
3,481,166 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,780 UART: [rt]cmd =0x4d454153, len=108
3,532,000 >>> mbox cmd response data (12 bytes)
3,532,001 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,561,890 UART: [rt]cmd =0x4d454153, len=108
3,582,439 >>> mbox cmd response data (12 bytes)
3,582,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,571 UART: [rt]cmd =0x4d454153, len=108
3,633,429 >>> mbox cmd response data (12 bytes)
3,633,430 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,223 UART: [rt]cmd =0x4d454153, len=108
3,683,894 >>> mbox cmd response data (12 bytes)
3,683,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,818 UART: [rt]cmd =0x4d454153, len=108
3,735,264 >>> mbox cmd response data (12 bytes)
3,735,265 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,765,430 UART: [rt]cmd =0x4d454153, len=108
3,786,155 >>> mbox cmd response data (12 bytes)
3,786,156 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,143 UART: [rt]cmd =0x4d454153, len=108
3,836,607 >>> mbox cmd response data (12 bytes)
3,836,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,866,597 UART: [rt]cmd =0x4d454153, len=108
3,886,990 >>> mbox cmd response data (12 bytes)
3,886,991 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,917,114 UART: [rt]cmd =0x4d454153, len=108
3,938,084 >>> mbox cmd response data (12 bytes)
3,938,085 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,968,356 UART: [rt]cmd =0x4d454153, len=108
3,989,785 >>> mbox cmd response data (12 bytes)
3,989,786 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,989 UART: [rt]cmd =0x4d454153, len=108
4,041,615 >>> mbox cmd response data (12 bytes)
4,041,616 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,071,669 UART: [rt]cmd =0x4d454153, len=108
4,093,182 >>> mbox cmd response data (12 bytes)
4,093,183 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,256 UART: [rt]cmd =0x4d454153, len=108
4,144,370 >>> mbox cmd response data (12 bytes)
4,144,371 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,174,580 UART: [rt]cmd =0x4d454153, len=108
4,195,569 >>> mbox cmd response data (12 bytes)
4,195,570 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,225,563 UART: [rt]cmd =0x4d454153, len=108
4,227,582 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,708 UART: [state] LifecycleState = Unprovisioned
85,363 UART: [state] DebugLocked = No
86,059 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,978 UART: [kat] ++
895,130 UART: [kat] sha1
899,356 UART: [kat] SHA2-256
901,296 UART: [kat] SHA2-384
904,129 UART: [kat] SHA2-512-ACC
906,030 UART: [kat] ECC-384
915,689 UART: [kat] HMAC-384Kdf
920,227 UART: [kat] LMS
1,168,539 UART: [kat] --
1,169,866 UART: [cold-reset] ++
1,170,376 UART: [fht] FHT @ 0x50003400
1,172,890 UART: [idev] ++
1,173,058 UART: [idev] CDI.KEYID = 6
1,173,419 UART: [idev] SUBJECT.KEYID = 7
1,173,844 UART: [idev] UDS.KEYID = 0
1,174,190 ready_for_fw is high
1,174,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,995 UART: [idev] Erasing UDS.KEYID = 0
1,198,401 UART: [idev] Sha1 KeyId Algorithm
1,207,333 UART: [idev] --
1,208,472 UART: [ldev] ++
1,208,640 UART: [ldev] CDI.KEYID = 6
1,209,004 UART: [ldev] SUBJECT.KEYID = 5
1,209,431 UART: [ldev] AUTHORITY.KEYID = 7
1,209,894 UART: [ldev] FE.KEYID = 1
1,215,054 UART: [ldev] Erasing FE.KEYID = 1
1,241,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,972 UART: [ldev] --
1,280,367 UART: [fwproc] Wait for Commands...
1,280,948 UART: [fwproc] Recv command 0x46574c44
1,281,681 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,570 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,625 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,800 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,063 >>> mbox cmd response: success
2,825,291 UART: [afmc] ++
2,825,459 UART: [afmc] CDI.KEYID = 6
2,825,822 UART: [afmc] SUBJECT.KEYID = 7
2,826,248 UART: [afmc] AUTHORITY.KEYID = 5
2,861,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,151 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,861 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,742 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,443 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,440 UART: [afmc] --
2,904,355 UART: [cold-reset] --
2,905,251 UART: [state] Locking Datavault
2,906,262 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,866 UART: [state] Locking ICCM
2,907,424 UART: [exit] Launching FMC @ 0x40000130
2,912,754 UART:
2,912,770 UART: Running Caliptra FMC ...
2,913,178 UART:
2,913,232 UART: [state] CFI Enabled
2,923,604 UART: [fht] FMC Alias Private Key: 7
3,042,426 UART: [art] Extend RT PCRs Done
3,042,854 UART: [art] Lock RT PCRs Done
3,044,434 UART: [art] Populate DV Done
3,052,713 UART: [fht] FMC Alias Private Key: 7
3,053,681 UART: [art] Derive CDI
3,053,961 UART: [art] Store in slot 0x4
3,139,578 UART: [art] Derive Key Pair
3,139,938 UART: [art] Store priv key in slot 0x5
3,152,958 UART: [art] Derive Key Pair - Done
3,167,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,758 UART: [art] PUB.X = BF2D2614283F550ED46B498AAA54031B01F9F31E94450E69D122BC0E8B2149C21C770310B2E23D2DED1C3BE2B2C48C84
3,190,516 UART: [art] PUB.Y = 20A26F979B99AD7E3CD19D26633C5B5BEA326EBD6FE6A93FD31A091FC8FE0BDC26E2140C4B4B2D26BE5CD22E62089243
3,197,472 UART: [art] SIG.R = 634ED3C937C7B5849138C8CBA17854F639D32EE50F878F7C4C6B02A2A45FFB413BDC03245D1FD3DEF347F9DE13BA9C7C
3,204,249 UART: [art] SIG.S = D24FBC66DBE3F209406FBB4B0F42BDBD8336CBA0FB88AA6492B6E76867570C3BF0E365BA4043C08A06693190E2DB8B1D
3,227,969 UART: Caliptra RT
3,228,220 UART: [state] CFI Enabled
3,347,757 UART: [rt] RT listening for mailbox commands...
3,348,427 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,815 UART: [rt]cmd =0x4d454153, len=108
3,398,699 >>> mbox cmd response data (12 bytes)
3,398,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,428,605 UART: [rt]cmd =0x4d454153, len=108
3,450,094 >>> mbox cmd response data (12 bytes)
3,450,095 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,236 UART: [rt]cmd =0x4d454153, len=108
3,501,580 >>> mbox cmd response data (12 bytes)
3,501,581 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,531,668 UART: [rt]cmd =0x4d454153, len=108
3,551,737 >>> mbox cmd response data (12 bytes)
3,551,738 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,581,683 UART: [rt]cmd =0x4d454153, len=108
3,603,475 >>> mbox cmd response data (12 bytes)
3,603,476 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,633,581 UART: [rt]cmd =0x4d454153, len=108
3,653,590 >>> mbox cmd response data (12 bytes)
3,653,591 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,683,526 UART: [rt]cmd =0x4d454153, len=108
3,703,982 >>> mbox cmd response data (12 bytes)
3,703,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,733,970 UART: [rt]cmd =0x4d454153, len=108
3,755,379 >>> mbox cmd response data (12 bytes)
3,755,380 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,785,421 UART: [rt]cmd =0x4d454153, len=108
3,806,473 >>> mbox cmd response data (12 bytes)
3,806,474 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,479 UART: [rt]cmd =0x4d454153, len=108
3,857,892 >>> mbox cmd response data (12 bytes)
3,857,893 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,888,122 UART: [rt]cmd =0x4d454153, len=108
3,909,290 >>> mbox cmd response data (12 bytes)
3,909,291 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,939,342 UART: [rt]cmd =0x4d454153, len=108
3,960,457 >>> mbox cmd response data (12 bytes)
3,960,458 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,990,761 UART: [rt]cmd =0x4d454153, len=108
4,011,317 >>> mbox cmd response data (12 bytes)
4,011,318 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,041,311 UART: [rt]cmd =0x4d454153, len=108
4,063,118 >>> mbox cmd response data (12 bytes)
4,063,119 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,093,070 UART: [rt]cmd =0x4d454153, len=108
4,095,443 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,424 ready_for_fw is high
1,059,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,174 >>> mbox cmd response: success
2,740,613 UART:
2,740,629 UART: Running Caliptra FMC ...
2,741,037 UART:
2,741,091 UART: [state] CFI Enabled
2,751,293 UART: [fht] FMC Alias Private Key: 7
2,870,549 UART: [art] Extend RT PCRs Done
2,870,977 UART: [art] Lock RT PCRs Done
2,872,707 UART: [art] Populate DV Done
2,880,764 UART: [fht] FMC Alias Private Key: 7
2,881,858 UART: [art] Derive CDI
2,882,138 UART: [art] Store in slot 0x4
2,967,517 UART: [art] Derive Key Pair
2,967,877 UART: [art] Store priv key in slot 0x5
2,981,259 UART: [art] Derive Key Pair - Done
2,995,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,225 UART: [art] PUB.X = CAD9A48DB4BB9759B00FBC0610939D0C68F2D76CB8394642B960F9D46A62DBB933EB75F92B3C748F1A93F3A75BA1B3FD
3,019,002 UART: [art] PUB.Y = C7672C262295E91994A3A32B8B9CE67C7BFE1389B93576517C458C03EBC462CB40A221E374803E2510ADEB5FDFD08FE4
3,025,955 UART: [art] SIG.R = 20B4C88C032878A4EE4F3E07892B8B98E8B93CFD191D9BB3CB5036AE27875E439ED53E8B5EB025A049B2F2678B7C46C4
3,032,727 UART: [art] SIG.S = 92B80600EEDB462DA7607F248236043116C1FB356F277BBD11E7764A954E0DED412F6D5B070E2E4053148057DBEF1CB1
3,055,938 UART: Caliptra RT
3,056,189 UART: [state] CFI Enabled
3,176,314 UART: [rt] RT listening for mailbox commands...
3,176,984 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,492 UART: [rt]cmd =0x4d454153, len=108
3,228,608 >>> mbox cmd response data (12 bytes)
3,228,609 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,258,510 UART: [rt]cmd =0x4d454153, len=108
3,278,953 >>> mbox cmd response data (12 bytes)
3,278,954 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,195 UART: [rt]cmd =0x4d454153, len=108
3,329,813 >>> mbox cmd response data (12 bytes)
3,329,814 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,359,821 UART: [rt]cmd =0x4d454153, len=108
3,380,542 >>> mbox cmd response data (12 bytes)
3,380,543 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,536 UART: [rt]cmd =0x4d454153, len=108
3,431,532 >>> mbox cmd response data (12 bytes)
3,431,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,528 UART: [rt]cmd =0x4d454153, len=108
3,482,017 >>> mbox cmd response data (12 bytes)
3,482,018 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,059 UART: [rt]cmd =0x4d454153, len=108
3,532,433 >>> mbox cmd response data (12 bytes)
3,532,434 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,562,519 UART: [rt]cmd =0x4d454153, len=108
3,583,140 >>> mbox cmd response data (12 bytes)
3,583,141 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,306 UART: [rt]cmd =0x4d454153, len=108
3,634,416 >>> mbox cmd response data (12 bytes)
3,634,417 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,664,316 UART: [rt]cmd =0x4d454153, len=108
3,685,603 >>> mbox cmd response data (12 bytes)
3,685,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,715,715 UART: [rt]cmd =0x4d454153, len=108
3,736,579 >>> mbox cmd response data (12 bytes)
3,736,580 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,766,827 UART: [rt]cmd =0x4d454153, len=108
3,788,074 >>> mbox cmd response data (12 bytes)
3,788,075 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,200 UART: [rt]cmd =0x4d454153, len=108
3,839,742 >>> mbox cmd response data (12 bytes)
3,839,743 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,869,748 UART: [rt]cmd =0x4d454153, len=108
3,890,923 >>> mbox cmd response data (12 bytes)
3,890,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,920,925 UART: [rt]cmd =0x4d454153, len=108
3,923,116 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,297 UART: [kat] ++
895,449 UART: [kat] sha1
899,743 UART: [kat] SHA2-256
901,683 UART: [kat] SHA2-384
904,464 UART: [kat] SHA2-512-ACC
906,365 UART: [kat] ECC-384
916,458 UART: [kat] HMAC-384Kdf
921,142 UART: [kat] LMS
1,169,454 UART: [kat] --
1,170,287 UART: [cold-reset] ++
1,170,681 UART: [fht] FHT @ 0x50003400
1,173,409 UART: [idev] ++
1,173,577 UART: [idev] CDI.KEYID = 6
1,173,938 UART: [idev] SUBJECT.KEYID = 7
1,174,363 UART: [idev] UDS.KEYID = 0
1,174,709 ready_for_fw is high
1,174,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,122 UART: [idev] Erasing UDS.KEYID = 0
1,199,148 UART: [idev] Sha1 KeyId Algorithm
1,207,924 UART: [idev] --
1,208,957 UART: [ldev] ++
1,209,125 UART: [ldev] CDI.KEYID = 6
1,209,489 UART: [ldev] SUBJECT.KEYID = 5
1,209,916 UART: [ldev] AUTHORITY.KEYID = 7
1,210,379 UART: [ldev] FE.KEYID = 1
1,215,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,845 UART: [ldev] --
1,282,180 UART: [fwproc] Wait for Commands...
1,282,763 UART: [fwproc] Recv command 0x46574c44
1,283,496 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,236 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,411 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,668 >>> mbox cmd response: success
2,827,866 UART: [afmc] ++
2,828,034 UART: [afmc] CDI.KEYID = 6
2,828,397 UART: [afmc] SUBJECT.KEYID = 7
2,828,823 UART: [afmc] AUTHORITY.KEYID = 5
2,864,644 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,628 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,338 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,219 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,920 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,757 UART: [afmc] --
2,907,782 UART: [cold-reset] --
2,908,706 UART: [state] Locking Datavault
2,910,013 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,617 UART: [state] Locking ICCM
2,911,191 UART: [exit] Launching FMC @ 0x40000130
2,916,521 UART:
2,916,537 UART: Running Caliptra FMC ...
2,916,945 UART:
2,917,088 UART: [state] CFI Enabled
2,927,522 UART: [fht] FMC Alias Private Key: 7
3,046,366 UART: [art] Extend RT PCRs Done
3,046,794 UART: [art] Lock RT PCRs Done
3,048,470 UART: [art] Populate DV Done
3,056,533 UART: [fht] FMC Alias Private Key: 7
3,057,653 UART: [art] Derive CDI
3,057,933 UART: [art] Store in slot 0x4
3,143,748 UART: [art] Derive Key Pair
3,144,108 UART: [art] Store priv key in slot 0x5
3,157,234 UART: [art] Derive Key Pair - Done
3,172,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,799 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,564 UART: [art] PUB.X = 3AAA36AF67C0BF9B4F4666B3F0C83317FB560D7355F65EE9D2C5C5C719C34CE373F93525109BADD6A95D7FFFBA97CE23
3,195,349 UART: [art] PUB.Y = EA012DB87B5C9FCEF1E480679BEE6B4B8E4927F807E569F44B6D4CF8E508EAF53CEE5968568658CE9BB8AF36A5229968
3,202,304 UART: [art] SIG.R = CC5BD729243681EE57374BDE5B222448CE170ABD9A0932330B8BC351481899C7B628BDFE80522909F1436251DE9B5E9E
3,209,062 UART: [art] SIG.S = FFA71801EBAF54E016E0A9EC1BA6096FE9BDF16EFD3A0B35CDDB3878F3A1222BE774D594B57DDB10CA017E917D51D2D3
3,233,060 UART: Caliptra RT
3,233,403 UART: [state] CFI Enabled
3,353,369 UART: [rt] RT listening for mailbox commands...
3,354,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,337 UART: [rt]cmd =0x4d454153, len=108
3,404,435 >>> mbox cmd response data (12 bytes)
3,404,436 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,691 UART: [rt]cmd =0x4d454153, len=108
3,455,332 >>> mbox cmd response data (12 bytes)
3,455,333 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,485,378 UART: [rt]cmd =0x4d454153, len=108
3,506,810 >>> mbox cmd response data (12 bytes)
3,506,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,537,052 UART: [rt]cmd =0x4d454153, len=108
3,557,453 >>> mbox cmd response data (12 bytes)
3,557,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,587,237 UART: [rt]cmd =0x4d454153, len=108
3,607,793 >>> mbox cmd response data (12 bytes)
3,607,794 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,701 UART: [rt]cmd =0x4d454153, len=108
3,659,174 >>> mbox cmd response data (12 bytes)
3,659,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,308 UART: [rt]cmd =0x4d454153, len=108
3,709,804 >>> mbox cmd response data (12 bytes)
3,709,805 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,739,608 UART: [rt]cmd =0x4d454153, len=108
3,760,365 >>> mbox cmd response data (12 bytes)
3,760,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,493 UART: [rt]cmd =0x4d454153, len=108
3,811,549 >>> mbox cmd response data (12 bytes)
3,811,550 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,739 UART: [rt]cmd =0x4d454153, len=108
3,862,082 >>> mbox cmd response data (12 bytes)
3,862,083 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,898 UART: [rt]cmd =0x4d454153, len=108
3,912,524 >>> mbox cmd response data (12 bytes)
3,912,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,482 UART: [rt]cmd =0x4d454153, len=108
3,963,207 >>> mbox cmd response data (12 bytes)
3,963,208 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,993,359 UART: [rt]cmd =0x4d454153, len=108
4,014,405 >>> mbox cmd response data (12 bytes)
4,014,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,044,459 UART: [rt]cmd =0x4d454153, len=108
4,064,380 >>> mbox cmd response data (12 bytes)
4,064,381 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,094,512 UART: [rt]cmd =0x4d454153, len=108
4,096,481 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,215 ready_for_fw is high
1,060,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,169 >>> mbox cmd response: success
2,741,756 UART:
2,741,772 UART: Running Caliptra FMC ...
2,742,180 UART:
2,742,323 UART: [state] CFI Enabled
2,753,039 UART: [fht] FMC Alias Private Key: 7
2,872,711 UART: [art] Extend RT PCRs Done
2,873,139 UART: [art] Lock RT PCRs Done
2,874,895 UART: [art] Populate DV Done
2,882,968 UART: [fht] FMC Alias Private Key: 7
2,883,950 UART: [art] Derive CDI
2,884,230 UART: [art] Store in slot 0x4
2,970,207 UART: [art] Derive Key Pair
2,970,567 UART: [art] Store priv key in slot 0x5
2,984,335 UART: [art] Derive Key Pair - Done
2,998,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,379 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,144 UART: [art] PUB.X = E253693B574CAF19A8276120209062E3C43451A3E056ABBC49AAFEB31DB94829B0D7222F11A0DB1A9FC97543BAFD772F
3,021,922 UART: [art] PUB.Y = 3D5323DEEE96559AE4BD2AED052A559E9B1473DCC439E533F6F4592A9FB789F2CB84279B1554A84CACC9FDB5F8484E40
3,028,883 UART: [art] SIG.R = E3093E31FEC41F7C7D47DB126EFC61518FF11D37F887486CF1E2E3577BC5CF13766C8BBED8FDF8B1DD6134C031C9902F
3,035,666 UART: [art] SIG.S = 7E78B41034F919B587C27C4324CFCF8F885A0E2EDA0AAD84414F4C7CC005DA8184644AE24D01E0B6EBDED717C2F3DD1D
3,059,656 UART: Caliptra RT
3,059,999 UART: [state] CFI Enabled
3,180,126 UART: [rt] RT listening for mailbox commands...
3,180,796 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,172 UART: [rt]cmd =0x4d454153, len=108
3,231,888 >>> mbox cmd response data (12 bytes)
3,231,889 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,262,026 UART: [rt]cmd =0x4d454153, len=108
3,282,149 >>> mbox cmd response data (12 bytes)
3,282,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,312,001 UART: [rt]cmd =0x4d454153, len=108
3,332,505 >>> mbox cmd response data (12 bytes)
3,332,506 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,362,255 UART: [rt]cmd =0x4d454153, len=108
3,383,230 >>> mbox cmd response data (12 bytes)
3,383,231 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,416 UART: [rt]cmd =0x4d454153, len=108
3,434,538 >>> mbox cmd response data (12 bytes)
3,434,539 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,464,326 UART: [rt]cmd =0x4d454153, len=108
3,486,001 >>> mbox cmd response data (12 bytes)
3,486,002 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,935 UART: [rt]cmd =0x4d454153, len=108
3,537,067 >>> mbox cmd response data (12 bytes)
3,537,068 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,567,007 UART: [rt]cmd =0x4d454153, len=108
3,587,814 >>> mbox cmd response data (12 bytes)
3,587,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,617,662 UART: [rt]cmd =0x4d454153, len=108
3,638,458 >>> mbox cmd response data (12 bytes)
3,638,459 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,478 UART: [rt]cmd =0x4d454153, len=108
3,688,977 >>> mbox cmd response data (12 bytes)
3,688,978 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,991 UART: [rt]cmd =0x4d454153, len=108
3,740,027 >>> mbox cmd response data (12 bytes)
3,740,028 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,770,279 UART: [rt]cmd =0x4d454153, len=108
3,791,658 >>> mbox cmd response data (12 bytes)
3,791,659 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,821,782 UART: [rt]cmd =0x4d454153, len=108
3,842,636 >>> mbox cmd response data (12 bytes)
3,842,637 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,872,766 UART: [rt]cmd =0x4d454153, len=108
3,894,419 >>> mbox cmd response data (12 bytes)
3,894,420 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,924,345 UART: [rt]cmd =0x4d454153, len=108
3,926,146 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
893,394 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,519 UART: [kat] ++
897,671 UART: [kat] sha1
901,965 UART: [kat] SHA2-256
903,905 UART: [kat] SHA2-384
906,564 UART: [kat] SHA2-512-ACC
908,465 UART: [kat] ECC-384
917,924 UART: [kat] HMAC-384Kdf
922,558 UART: [kat] LMS
1,170,886 UART: [kat] --
1,171,821 UART: [cold-reset] ++
1,172,177 UART: [fht] FHT @ 0x50003400
1,174,816 UART: [idev] ++
1,174,984 UART: [idev] CDI.KEYID = 6
1,175,344 UART: [idev] SUBJECT.KEYID = 7
1,175,768 UART: [idev] UDS.KEYID = 0
1,176,113 ready_for_fw is high
1,176,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,958 UART: [idev] Erasing UDS.KEYID = 0
1,200,507 UART: [idev] Sha1 KeyId Algorithm
1,208,867 UART: [idev] --
1,209,967 UART: [ldev] ++
1,210,135 UART: [ldev] CDI.KEYID = 6
1,210,498 UART: [ldev] SUBJECT.KEYID = 5
1,210,924 UART: [ldev] AUTHORITY.KEYID = 7
1,211,387 UART: [ldev] FE.KEYID = 1
1,216,525 UART: [ldev] Erasing FE.KEYID = 1
1,243,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,867 UART: [ldev] --
1,283,192 UART: [fwproc] Wait for Commands...
1,283,778 UART: [fwproc] Recv command 0x46574c44
1,284,506 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,196 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,366 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,573 >>> mbox cmd response: success
2,827,609 UART: [afmc] ++
2,827,777 UART: [afmc] CDI.KEYID = 6
2,828,139 UART: [afmc] SUBJECT.KEYID = 7
2,828,564 UART: [afmc] AUTHORITY.KEYID = 5
2,864,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,488 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,197 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,080 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,781 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,499 UART: [afmc] --
2,907,615 UART: [cold-reset] --
2,908,573 UART: [state] Locking Datavault
2,909,686 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,290 UART: [state] Locking ICCM
2,910,744 UART: [exit] Launching FMC @ 0x40000130
2,916,074 UART:
2,916,090 UART: Running Caliptra FMC ...
2,916,498 UART:
2,916,552 UART: [state] CFI Enabled
2,927,268 UART: [fht] FMC Alias Private Key: 7
3,046,914 UART: [art] Extend RT PCRs Done
3,047,342 UART: [art] Lock RT PCRs Done
3,048,880 UART: [art] Populate DV Done
3,057,279 UART: [fht] FMC Alias Private Key: 7
3,058,289 UART: [art] Derive CDI
3,058,569 UART: [art] Store in slot 0x4
3,144,320 UART: [art] Derive Key Pair
3,144,680 UART: [art] Store priv key in slot 0x5
3,157,604 UART: [art] Derive Key Pair - Done
3,172,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,828 UART: [art] PUB.X = 4637DF566E67945D508835F226B78EDA09EB457DA26E0C8AE9AED273F720F4A98261CFD276322AC93C7AC59F64F7399A
3,195,598 UART: [art] PUB.Y = 0EA8070203E469EA60846A106696CB7672BEE665C43ADE537445AC29CA7E2DE05EDA082D097E3CB9661CC51E76DD2695
3,202,536 UART: [art] SIG.R = FBBBB36EA51187F32FAD0022F3FCE67258B2B2838FC8B019CA715D99772B05060798EC2AD3F2E43E3540A9617182C41F
3,209,281 UART: [art] SIG.S = CF6676D7F8E86266DF4EEE30C6979341B1029ACD699A90EE7E45D20806ABF9ED6BEEDCD01DE46FA20188DE8BFE28A32D
3,233,225 UART: Caliptra RT
3,233,476 UART: [state] CFI Enabled
3,352,854 UART: [rt] RT listening for mailbox commands...
3,353,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,908 UART: [rt]cmd =0x4d454153, len=108
3,404,508 >>> mbox cmd response data (12 bytes)
3,404,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,680 UART: [rt]cmd =0x4d454153, len=108
3,456,125 >>> mbox cmd response data (12 bytes)
3,456,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,177 UART: [rt]cmd =0x4d454153, len=108
3,507,199 >>> mbox cmd response data (12 bytes)
3,507,200 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,537,245 UART: [rt]cmd =0x4d454153, len=108
3,557,792 >>> mbox cmd response data (12 bytes)
3,557,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,587,702 UART: [rt]cmd =0x4d454153, len=108
3,608,416 >>> mbox cmd response data (12 bytes)
3,608,417 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,480 UART: [rt]cmd =0x4d454153, len=108
3,658,411 >>> mbox cmd response data (12 bytes)
3,658,412 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,317 UART: [rt]cmd =0x4d454153, len=108
3,709,041 >>> mbox cmd response data (12 bytes)
3,709,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,739,163 UART: [rt]cmd =0x4d454153, len=108
3,759,814 >>> mbox cmd response data (12 bytes)
3,759,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,789,962 UART: [rt]cmd =0x4d454153, len=108
3,811,348 >>> mbox cmd response data (12 bytes)
3,811,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,386 UART: [rt]cmd =0x4d454153, len=108
3,862,003 >>> mbox cmd response data (12 bytes)
3,862,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,079 UART: [rt]cmd =0x4d454153, len=108
3,913,033 >>> mbox cmd response data (12 bytes)
3,913,034 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,085 UART: [rt]cmd =0x4d454153, len=108
3,963,518 >>> mbox cmd response data (12 bytes)
3,963,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,993,392 UART: [rt]cmd =0x4d454153, len=108
4,014,816 >>> mbox cmd response data (12 bytes)
4,014,817 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,044,776 UART: [rt]cmd =0x4d454153, len=108
4,064,957 >>> mbox cmd response data (12 bytes)
4,064,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,094,863 UART: [rt]cmd =0x4d454153, len=108
4,096,732 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,767 ready_for_fw is high
1,059,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,594 >>> mbox cmd response: success
2,739,773 UART:
2,739,789 UART: Running Caliptra FMC ...
2,740,197 UART:
2,740,251 UART: [state] CFI Enabled
2,750,815 UART: [fht] FMC Alias Private Key: 7
2,869,813 UART: [art] Extend RT PCRs Done
2,870,241 UART: [art] Lock RT PCRs Done
2,871,783 UART: [art] Populate DV Done
2,880,032 UART: [fht] FMC Alias Private Key: 7
2,881,086 UART: [art] Derive CDI
2,881,366 UART: [art] Store in slot 0x4
2,967,347 UART: [art] Derive Key Pair
2,967,707 UART: [art] Store priv key in slot 0x5
2,981,369 UART: [art] Derive Key Pair - Done
2,996,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,277 UART: [art] PUB.X = E9D6DB46807A017A785093A709AA2C7B847C187858A6251D600BF645600B0F05E7832CA245660ECCDC80AE5966FC3276
3,020,024 UART: [art] PUB.Y = CAD1B9CD1DC2F3989EDAAEBA859246047AB22ED8D70F3EF14F7ABDCB6B870CCAD7C8E808AE827E5161BCE33121F488C7
3,026,990 UART: [art] SIG.R = 55C3D8FC662F7DE38C9F3E35E86229006CCB4B258D030AAB13A36B4B47A2998FE2A81CB7DFF5BA1F4A42CD47F42CE8E9
3,033,752 UART: [art] SIG.S = E6DE5A90CA8DB4FE08A97CE539AFDED6E6E7A299CE106F7A5A061AD730C9891CFFC973CB727DBEA584D8F5036B2553F5
3,057,053 UART: Caliptra RT
3,057,304 UART: [state] CFI Enabled
3,176,773 UART: [rt] RT listening for mailbox commands...
3,177,443 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,745 UART: [rt]cmd =0x4d454153, len=108
3,228,059 >>> mbox cmd response data (12 bytes)
3,228,060 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,258,137 UART: [rt]cmd =0x4d454153, len=108
3,278,684 >>> mbox cmd response data (12 bytes)
3,278,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,596 UART: [rt]cmd =0x4d454153, len=108
3,329,368 >>> mbox cmd response data (12 bytes)
3,329,369 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,359,326 UART: [rt]cmd =0x4d454153, len=108
3,380,133 >>> mbox cmd response data (12 bytes)
3,380,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,167 UART: [rt]cmd =0x4d454153, len=108
3,430,743 >>> mbox cmd response data (12 bytes)
3,430,744 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,707 UART: [rt]cmd =0x4d454153, len=108
3,480,944 >>> mbox cmd response data (12 bytes)
3,480,945 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,918 UART: [rt]cmd =0x4d454153, len=108
3,531,996 >>> mbox cmd response data (12 bytes)
3,531,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,562,096 UART: [rt]cmd =0x4d454153, len=108
3,582,763 >>> mbox cmd response data (12 bytes)
3,582,764 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,969 UART: [rt]cmd =0x4d454153, len=108
3,635,129 >>> mbox cmd response data (12 bytes)
3,635,130 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,665,131 UART: [rt]cmd =0x4d454153, len=108
3,685,750 >>> mbox cmd response data (12 bytes)
3,685,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,715,972 UART: [rt]cmd =0x4d454153, len=108
3,737,262 >>> mbox cmd response data (12 bytes)
3,737,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,767,182 UART: [rt]cmd =0x4d454153, len=108
3,788,483 >>> mbox cmd response data (12 bytes)
3,788,484 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,613 UART: [rt]cmd =0x4d454153, len=108
3,839,043 >>> mbox cmd response data (12 bytes)
3,839,044 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,869,225 UART: [rt]cmd =0x4d454153, len=108
3,890,408 >>> mbox cmd response data (12 bytes)
3,890,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,920,242 UART: [rt]cmd =0x4d454153, len=108
3,922,175 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
893,503 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,628 UART: [kat] ++
897,780 UART: [kat] sha1
901,970 UART: [kat] SHA2-256
903,910 UART: [kat] SHA2-384
906,641 UART: [kat] SHA2-512-ACC
908,542 UART: [kat] ECC-384
918,157 UART: [kat] HMAC-384Kdf
922,961 UART: [kat] LMS
1,171,289 UART: [kat] --
1,172,212 UART: [cold-reset] ++
1,172,562 UART: [fht] FHT @ 0x50003400
1,175,267 UART: [idev] ++
1,175,435 UART: [idev] CDI.KEYID = 6
1,175,795 UART: [idev] SUBJECT.KEYID = 7
1,176,219 UART: [idev] UDS.KEYID = 0
1,176,564 ready_for_fw is high
1,176,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,979 UART: [idev] Erasing UDS.KEYID = 0
1,201,010 UART: [idev] Sha1 KeyId Algorithm
1,209,388 UART: [idev] --
1,210,516 UART: [ldev] ++
1,210,684 UART: [ldev] CDI.KEYID = 6
1,211,047 UART: [ldev] SUBJECT.KEYID = 5
1,211,473 UART: [ldev] AUTHORITY.KEYID = 7
1,211,936 UART: [ldev] FE.KEYID = 1
1,217,250 UART: [ldev] Erasing FE.KEYID = 1
1,243,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,886 UART: [ldev] --
1,283,327 UART: [fwproc] Wait for Commands...
1,284,149 UART: [fwproc] Recv command 0x46574c44
1,284,877 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,471 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,641 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,806 >>> mbox cmd response: success
2,829,886 UART: [afmc] ++
2,830,054 UART: [afmc] CDI.KEYID = 6
2,830,416 UART: [afmc] SUBJECT.KEYID = 7
2,830,841 UART: [afmc] AUTHORITY.KEYID = 5
2,866,402 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,625 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,334 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,217 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,918 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,730 UART: [afmc] --
2,909,804 UART: [cold-reset] --
2,910,530 UART: [state] Locking Datavault
2,911,775 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,379 UART: [state] Locking ICCM
2,912,997 UART: [exit] Launching FMC @ 0x40000130
2,918,327 UART:
2,918,343 UART: Running Caliptra FMC ...
2,918,751 UART:
2,918,894 UART: [state] CFI Enabled
2,929,118 UART: [fht] FMC Alias Private Key: 7
3,048,164 UART: [art] Extend RT PCRs Done
3,048,592 UART: [art] Lock RT PCRs Done
3,050,062 UART: [art] Populate DV Done
3,058,441 UART: [fht] FMC Alias Private Key: 7
3,059,451 UART: [art] Derive CDI
3,059,731 UART: [art] Store in slot 0x4
3,145,838 UART: [art] Derive Key Pair
3,146,198 UART: [art] Store priv key in slot 0x5
3,159,504 UART: [art] Derive Key Pair - Done
3,174,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,594 UART: [art] PUB.X = 17DB26B78F481D35E59EB2BC404B461EF139A439ED0A7F24F338A8F26C2125E0810FAAE9B59D908A97085F3DABDEEDE7
3,197,371 UART: [art] PUB.Y = C920703AD02AB2BD67D7FD167C41E5CD768CD2713398E9CDA4427540E0C5F7E6AB16D09DB3FFC703C6636431A5C5AD6A
3,204,332 UART: [art] SIG.R = CB9FDC96991542432CDE9600DDC23351C9A3EBE85F2A43B56008323DF2473A1C85FE931AB34FE0CFC870C77654B98E20
3,211,085 UART: [art] SIG.S = 17804FB1D3CC24AA03B58F30427AFD1067BE660DDB06E6CDBAC91F260E9EFD5CBA4DB72D5B0E6F48CF74BA18DA4B4B0E
3,235,443 UART: Caliptra RT
3,235,786 UART: [state] CFI Enabled
3,355,529 UART: [rt] RT listening for mailbox commands...
3,356,199 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,637 UART: [rt]cmd =0x4d454153, len=108
3,407,277 >>> mbox cmd response data (12 bytes)
3,407,278 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,211 UART: [rt]cmd =0x4d454153, len=108
3,458,280 >>> mbox cmd response data (12 bytes)
3,458,281 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,488,282 UART: [rt]cmd =0x4d454153, len=108
3,509,736 >>> mbox cmd response data (12 bytes)
3,509,737 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,896 UART: [rt]cmd =0x4d454153, len=108
3,560,283 >>> mbox cmd response data (12 bytes)
3,560,284 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,590,381 UART: [rt]cmd =0x4d454153, len=108
3,610,927 >>> mbox cmd response data (12 bytes)
3,610,928 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,045 UART: [rt]cmd =0x4d454153, len=108
3,662,168 >>> mbox cmd response data (12 bytes)
3,662,169 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,692,098 UART: [rt]cmd =0x4d454153, len=108
3,713,870 >>> mbox cmd response data (12 bytes)
3,713,871 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,743,886 UART: [rt]cmd =0x4d454153, len=108
3,765,195 >>> mbox cmd response data (12 bytes)
3,765,196 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,795,077 UART: [rt]cmd =0x4d454153, len=108
3,815,441 >>> mbox cmd response data (12 bytes)
3,815,442 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,425 UART: [rt]cmd =0x4d454153, len=108
3,866,830 >>> mbox cmd response data (12 bytes)
3,866,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,896,834 UART: [rt]cmd =0x4d454153, len=108
3,917,250 >>> mbox cmd response data (12 bytes)
3,917,251 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,947,224 UART: [rt]cmd =0x4d454153, len=108
3,968,217 >>> mbox cmd response data (12 bytes)
3,968,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,998,149 UART: [rt]cmd =0x4d454153, len=108
4,018,321 >>> mbox cmd response data (12 bytes)
4,018,322 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,048,235 UART: [rt]cmd =0x4d454153, len=108
4,069,294 >>> mbox cmd response data (12 bytes)
4,069,295 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,099,060 UART: [rt]cmd =0x4d454153, len=108
4,101,387 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,806 ready_for_fw is high
1,060,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,711 >>> mbox cmd response: success
2,742,892 UART:
2,742,908 UART: Running Caliptra FMC ...
2,743,316 UART:
2,743,459 UART: [state] CFI Enabled
2,754,059 UART: [fht] FMC Alias Private Key: 7
2,873,307 UART: [art] Extend RT PCRs Done
2,873,735 UART: [art] Lock RT PCRs Done
2,875,267 UART: [art] Populate DV Done
2,883,370 UART: [fht] FMC Alias Private Key: 7
2,884,498 UART: [art] Derive CDI
2,884,778 UART: [art] Store in slot 0x4
2,970,543 UART: [art] Derive Key Pair
2,970,903 UART: [art] Store priv key in slot 0x5
2,984,167 UART: [art] Derive Key Pair - Done
2,999,016 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,220 UART: [art] PUB.X = 0C1C651CFE13B8F14AF3C5534EF5E1E8A0487AA9E308E0395D81AD273C0092A690D10F9167849B28C3C8C5AA9153AB6C
3,021,967 UART: [art] PUB.Y = BD61274FDF6FD12ADA926DFD0E9C79FFC4FE716B1DCBFAA2526760434CC1888C4E8273C718DB1FD0B5EA227B92E9DF1D
3,028,940 UART: [art] SIG.R = FBA7E0618E0868E0D5E90EEA1F13702A357BC5F5F49735D1AF1DC044B9C7593867BFEFC25D3064487FF59C65A8890AC6
3,035,711 UART: [art] SIG.S = F9D425A90C3A96E9F94C8BC0062F1228EF41FCCC915AE2D5585FA527F7CD79BE2AD9165EA58939E14BED8C68AFE14051
3,059,701 UART: Caliptra RT
3,060,044 UART: [state] CFI Enabled
3,180,000 UART: [rt] RT listening for mailbox commands...
3,180,670 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,956 UART: [rt]cmd =0x4d454153, len=108
3,232,406 >>> mbox cmd response data (12 bytes)
3,232,407 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,262,522 UART: [rt]cmd =0x4d454153, len=108
3,283,269 >>> mbox cmd response data (12 bytes)
3,283,270 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,313,373 UART: [rt]cmd =0x4d454153, len=108
3,334,735 >>> mbox cmd response data (12 bytes)
3,334,736 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,364,999 UART: [rt]cmd =0x4d454153, len=108
3,385,858 >>> mbox cmd response data (12 bytes)
3,385,859 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,110 UART: [rt]cmd =0x4d454153, len=108
3,436,808 >>> mbox cmd response data (12 bytes)
3,436,809 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,466,982 UART: [rt]cmd =0x4d454153, len=108
3,487,915 >>> mbox cmd response data (12 bytes)
3,487,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,069 UART: [rt]cmd =0x4d454153, len=108
3,539,257 >>> mbox cmd response data (12 bytes)
3,539,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,569,273 UART: [rt]cmd =0x4d454153, len=108
3,590,166 >>> mbox cmd response data (12 bytes)
3,590,167 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,620,100 UART: [rt]cmd =0x4d454153, len=108
3,640,628 >>> mbox cmd response data (12 bytes)
3,640,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,670,702 UART: [rt]cmd =0x4d454153, len=108
3,691,719 >>> mbox cmd response data (12 bytes)
3,691,720 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,663 UART: [rt]cmd =0x4d454153, len=108
3,742,643 >>> mbox cmd response data (12 bytes)
3,742,644 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,772,445 UART: [rt]cmd =0x4d454153, len=108
3,793,622 >>> mbox cmd response data (12 bytes)
3,793,623 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,823,826 UART: [rt]cmd =0x4d454153, len=108
3,845,080 >>> mbox cmd response data (12 bytes)
3,845,081 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,875,198 UART: [rt]cmd =0x4d454153, len=108
3,896,915 >>> mbox cmd response data (12 bytes)
3,896,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,926,959 UART: [rt]cmd =0x4d454153, len=108
3,928,914 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
2,240,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,389,960 UART:
2,390,360 UART: Running Caliptra ROM ...
2,391,453 UART:
2,391,611 UART: [state] CFI Enabled
2,392,582 UART: [state] LifecycleState = Unprovisioned
2,394,240 UART: [state] DebugLocked = No
2,395,272 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,398,584 UART: [kat] SHA2-256
2,399,251 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,402,286 UART: [kat] ++
2,402,738 UART: [kat] sha1
2,403,249 UART: [kat] SHA2-256
2,403,907 UART: [kat] SHA2-384
2,404,565 UART: [kat] SHA2-512-ACC
2,405,405 UART: [kat] ECC-384
2,767,385 UART: [kat] HMAC-384Kdf
2,798,988 UART: [kat] LMS
3,989,266 UART: [kat] --
3,992,641 UART: [cold-reset] ++
3,994,476 UART: [fht] Storing FHT @ 0x50003400
4,006,554 UART: [idev] ++
4,007,124 UART: [idev] CDI.KEYID = 6
4,008,011 UART: [idev] SUBJECT.KEYID = 7
4,009,289 UART: [idev] UDS.KEYID = 0
4,031,789 UART: [idev] Erasing UDS.KEYID = 0
7,344,569 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,713 UART: [idev] --
7,369,461 UART: [ldev] ++
7,370,027 UART: [ldev] CDI.KEYID = 6
7,370,994 UART: [ldev] SUBJECT.KEYID = 5
7,372,211 UART: [ldev] AUTHORITY.KEYID = 7
7,373,495 UART: [ldev] FE.KEYID = 1
7,400,520 UART: [ldev] Erasing FE.KEYID = 1
10,732,588 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,468 UART: [ldev] --
13,091,509 UART: [fwproc] Waiting for Commands...
13,094,492 UART: [fwproc] Received command 0x46574c44
13,096,709 UART: [fwproc] Received Image of size 118548 bytes
17,205,384 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,283,135 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,356,292 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,684,230 >>> mbox cmd response: success
17,688,789 UART: [afmc] ++
17,689,385 UART: [afmc] CDI.KEYID = 6
17,690,405 UART: [afmc] SUBJECT.KEYID = 7
17,691,563 UART: [afmc] AUTHORITY.KEYID = 5
21,044,829 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,346,273 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,348,532 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,362,913 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,377,663 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,392,089 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,412,912 UART: [afmc] --
23,417,354 UART: [cold-reset] --
23,421,333 UART: [state] Locking Datavault
23,428,038 UART: [state] Locking PCR0, PCR1 and PCR31
23,429,739 UART: [state] Locking ICCM
23,432,485 UART: [exit] Launching FMC @ 0x40000130
23,440,891 UART:
23,441,128 UART: Running Caliptra FMC ...
23,442,228 UART:
23,442,403 UART: [state] CFI Enabled
23,506,893 UART: [fht] FMC Alias Private Key: 7
25,846,792 UART: [art] Extend RT PCRs Done
25,848,028 UART: [art] Lock RT PCRs Done
25,849,494 UART: [art] Populate DV Done
25,855,075 UART: [fht] FMC Alias Private Key: 7
25,856,664 UART: [art] Derive CDI
25,857,476 UART: [art] Store in slot 0x4
25,914,708 UART: [art] Derive Key Pair
25,915,751 UART: [art] Store priv key in slot 0x5
29,208,053 UART: [art] Derive Key Pair - Done
29,220,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,508,989 UART: [art] Erasing AUTHORITY.KEYID = 7
31,510,499 UART: [art] PUB.X = C78C9FC7BF0FB47F6815CCC5F4A118AA7D4CB82006BDBFA8AE8C445F384936681357EBBAA3A55B5A72C204E623E1B227
31,517,822 UART: [art] PUB.Y = F733DB8C74B736DFB8095ED7B80B7E99BB4F8487AF9D3F10522F6A2DE6C932E0C2B0FCA3F71EADF6E68CEA37CA0BA093
31,525,070 UART: [art] SIG.R = 628B9377DA00009AA2A145D3CAB9704477C8EEE58B0C0D5DDFD73CF1CBB7416EB7217E28B1CE8A05DEA02FD6158C5032
31,532,484 UART: [art] SIG.S = EDF3308580A2B933F615D8C193D79181109BCCA43890EA56D0526FFC23BBCAB07BE5ABAC94E144C6CC1F7630FA1F6903
32,838,357 UART: Caliptra RT
32,839,075 UART: [state] CFI Enabled
33,014,816 UART: [rt] RT listening for mailbox commands...
33,016,779 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,047,203 UART: [rt]cmd =0x44504543, len=92
33,053,775 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,236,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,772 >>> mbox cmd response: success
23,656,039 UART:
23,656,481 UART: Running Caliptra FMC ...
23,657,609 UART:
23,657,775 UART: [state] CFI Enabled
23,725,563 UART: [fht] FMC Alias Private Key: 7
26,066,450 UART: [art] Extend RT PCRs Done
26,067,697 UART: [art] Lock RT PCRs Done
26,069,492 UART: [art] Populate DV Done
26,074,802 UART: [fht] FMC Alias Private Key: 7
26,076,505 UART: [art] Derive CDI
26,077,250 UART: [art] Store in slot 0x4
26,134,611 UART: [art] Derive Key Pair
26,135,654 UART: [art] Store priv key in slot 0x5
29,428,379 UART: [art] Derive Key Pair - Done
29,441,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,896 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,406 UART: [art] PUB.X = F4845EE3EE26AB74C6A522E85C3B2EBDF988839F9B636844E93BCF56D99DABA6FDE0D91423871D2854A35DD88C7924BE
31,739,736 UART: [art] PUB.Y = 90A15CA0B756ABEB59A80E120F7E40D04D809A6B07B2460DA53B1DB2BC84DA81432DE2254586E4E93B4E200143F15052
31,746,973 UART: [art] SIG.R = A92165C47953F6E66A1244276FA5E8B3C5FCA14144EE0FE737F6D6453B927C22EC87D5CA92A6FD40359622A4C78E3C2C
31,754,372 UART: [art] SIG.S = 594F161609525F63B707FE3FC01287D6BE6336A172E1729150AF129EC2BEE1CB32765ED176F3E6F02AEACB56DD71F15B
33,060,333 UART: Caliptra RT
33,061,052 UART: [state] CFI Enabled
33,237,869 UART: [rt] RT listening for mailbox commands...
33,239,811 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,270,370 UART: [rt]cmd =0x44504543, len=92
33,276,937 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
2,244,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,394,071 UART:
2,394,463 UART: Running Caliptra ROM ...
2,395,627 UART:
2,395,798 UART: [state] CFI Enabled
2,396,759 UART: [state] LifecycleState = Unprovisioned
2,398,428 UART: [state] DebugLocked = No
2,399,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,402,817 UART: [kat] SHA2-256
2,403,481 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,406,479 UART: [kat] ++
2,406,928 UART: [kat] sha1
2,407,435 UART: [kat] SHA2-256
2,408,167 UART: [kat] SHA2-384
2,408,827 UART: [kat] SHA2-512-ACC
2,409,699 UART: [kat] ECC-384
3,114,906 UART: [kat] HMAC-384Kdf
3,126,601 UART: [kat] LMS
4,316,745 UART: [kat] --
4,321,707 UART: [cold-reset] ++
4,323,574 UART: [fht] Storing FHT @ 0x50003400
4,336,552 UART: [idev] ++
4,337,168 UART: [idev] CDI.KEYID = 6
4,338,050 UART: [idev] SUBJECT.KEYID = 7
4,339,314 UART: [idev] UDS.KEYID = 0
4,354,815 UART: [idev] Erasing UDS.KEYID = 0
7,628,251 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,029 UART: [idev] --
7,653,241 UART: [ldev] ++
7,653,817 UART: [ldev] CDI.KEYID = 6
7,654,748 UART: [ldev] SUBJECT.KEYID = 5
7,656,010 UART: [ldev] AUTHORITY.KEYID = 7
7,657,261 UART: [ldev] FE.KEYID = 1
7,670,202 UART: [ldev] Erasing FE.KEYID = 1
10,959,056 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,143 UART: [ldev] --
13,319,243 UART: [fwproc] Waiting for Commands...
13,322,127 UART: [fwproc] Received command 0x46574c44
13,324,314 UART: [fwproc] Received Image of size 118548 bytes
17,434,612 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,163 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,393 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,911,592 >>> mbox cmd response: success
17,916,552 UART: [afmc] ++
17,917,206 UART: [afmc] CDI.KEYID = 6
17,918,115 UART: [afmc] SUBJECT.KEYID = 7
17,919,321 UART: [afmc] AUTHORITY.KEYID = 5
21,229,156 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,205 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,527,452 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,880 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,556,614 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,017 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,593,356 UART: [afmc] --
23,596,410 UART: [cold-reset] --
23,601,671 UART: [state] Locking Datavault
23,607,182 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,941 UART: [state] Locking ICCM
23,610,603 UART: [exit] Launching FMC @ 0x40000130
23,618,993 UART:
23,619,241 UART: Running Caliptra FMC ...
23,620,340 UART:
23,620,494 UART: [state] CFI Enabled
23,628,561 UART: [fht] FMC Alias Private Key: 7
25,968,460 UART: [art] Extend RT PCRs Done
25,969,681 UART: [art] Lock RT PCRs Done
25,971,384 UART: [art] Populate DV Done
25,976,899 UART: [fht] FMC Alias Private Key: 7
25,978,373 UART: [art] Derive CDI
25,979,098 UART: [art] Store in slot 0x4
26,021,972 UART: [art] Derive Key Pair
26,022,966 UART: [art] Store priv key in slot 0x5
29,265,270 UART: [art] Derive Key Pair - Done
29,278,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,144 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,658 UART: [art] PUB.X = B46ACDD9AF81A347F75B77B9C92A22A9DD059AB5CEFB3C03AF651C016484FBBE352FC20FCB08DA143FA8C25280340E4E
31,566,987 UART: [art] PUB.Y = 4FC11DFE2949B0EDCF26D39A536A0EFAD45BD96863E414B75098BA145CC87E899C1E3FFACFFD75C0C17F0C955F29D8FA
31,574,286 UART: [art] SIG.R = 9700526DBE766951819C9DA388E16A7E17481272C47B268BCC0FA6C5DB0A28362FB6009B276CB629C3B8697AAF44F29E
31,581,628 UART: [art] SIG.S = 90EC8399DAE01D04DC55ECF5ADA7115764BCD80B486C5BF8FE19E0C92761A606DE4AE3F2A17ECB6477660F56E8135A04
32,887,253 UART: Caliptra RT
32,887,964 UART: [state] CFI Enabled
33,021,299 UART: [rt] RT listening for mailbox commands...
33,023,227 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,053,623 UART: [rt]cmd =0x44504543, len=92
33,060,514 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
2,240,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,729 >>> mbox cmd response: success
23,807,166 UART:
23,807,597 UART: Running Caliptra FMC ...
23,808,711 UART:
23,808,869 UART: [state] CFI Enabled
23,816,773 UART: [fht] FMC Alias Private Key: 7
26,156,045 UART: [art] Extend RT PCRs Done
26,157,289 UART: [art] Lock RT PCRs Done
26,159,030 UART: [art] Populate DV Done
26,164,178 UART: [fht] FMC Alias Private Key: 7
26,165,871 UART: [art] Derive CDI
26,166,681 UART: [art] Store in slot 0x4
26,209,711 UART: [art] Derive Key Pair
26,210,758 UART: [art] Store priv key in slot 0x5
29,453,252 UART: [art] Derive Key Pair - Done
29,466,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,120 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,632 UART: [art] PUB.X = 64033F9B7563AE0CBE73A41CBD66A5D1C17C224929477FD5F986F70D03D4802E7977BD8ACEE5038FF55468CE9C28E407
31,754,901 UART: [art] PUB.Y = A38C31E5F03FBFF74E69ACFD5A021F08225CAB38DF77FBB97B5030773F45E862D2AE0F4F29C74133CD1C90248AEB79A4
31,762,209 UART: [art] SIG.R = 5BBEEB6D2DF5C7411C86EF65C083D9970A94B55715DA6F2C4E0ACCA9486CAF9434258593276A3E40FD7011230BF6F4AE
31,769,550 UART: [art] SIG.S = D4C839A192861245CEF7B0DF26A431C01A52C45D5A846551E4DCF4315EE700DB0D36E9242C29B207DABC39E2A67D4A19
33,074,889 UART: Caliptra RT
33,075,607 UART: [state] CFI Enabled
33,209,466 UART: [rt] RT listening for mailbox commands...
33,211,387 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,242,148 UART: [rt]cmd =0x44504543, len=92
33,248,901 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
2,221,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,371,498 UART:
2,371,913 UART: Running Caliptra ROM ...
2,373,087 UART:
2,373,266 UART: [state] CFI Enabled
2,374,225 UART: [state] LifecycleState = Unprovisioned
2,375,888 UART: [state] DebugLocked = No
2,376,998 UART: [state] WD Timer not started. Device not locked for debugging
2,379,489 UART: [kat] SHA2-256
2,380,158 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,383,164 UART: [kat] ++
2,383,615 UART: [kat] sha1
2,384,129 UART: [kat] SHA2-256
2,384,864 UART: [kat] SHA2-384
2,385,528 UART: [kat] SHA2-512-ACC
2,386,357 UART: [kat] ECC-384
2,949,320 UART: [kat] HMAC-384Kdf
2,972,223 UART: [kat] LMS
3,448,695 UART: [kat] --
3,453,369 UART: [cold-reset] ++
3,455,572 UART: [fht] FHT @ 0x50003400
3,466,320 UART: [idev] ++
3,466,908 UART: [idev] CDI.KEYID = 6
3,467,814 UART: [idev] SUBJECT.KEYID = 7
3,469,100 UART: [idev] UDS.KEYID = 0
3,501,278 UART: [idev] Erasing UDS.KEYID = 0
5,987,069 UART: [idev] Sha1 KeyId Algorithm
6,010,680 UART: [idev] --
6,015,486 UART: [ldev] ++
6,016,058 UART: [ldev] CDI.KEYID = 6
6,017,194 UART: [ldev] SUBJECT.KEYID = 5
6,018,282 UART: [ldev] AUTHORITY.KEYID = 7
6,019,471 UART: [ldev] FE.KEYID = 1
6,056,153 UART: [ldev] Erasing FE.KEYID = 1
8,563,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,459 UART: [ldev] --
10,373,854 UART: [fwproc] Wait for Commands...
10,376,972 UART: [fwproc] Recv command 0x46574c44
10,379,007 UART: [fwproc] Recv'd Img size: 118548 bytes
13,870,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,806 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,026,881 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,355,707 >>> mbox cmd response: success
14,360,153 UART: [afmc] ++
14,360,733 UART: [afmc] CDI.KEYID = 6
14,361,669 UART: [afmc] SUBJECT.KEYID = 7
14,362,874 UART: [afmc] AUTHORITY.KEYID = 5
16,892,598 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,859 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,656 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,649,690 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,307 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,688,577 UART: [afmc] --
18,691,840 UART: [cold-reset] --
18,694,836 UART: [state] Locking Datavault
18,699,699 UART: [state] Locking PCR0, PCR1 and PCR31
18,701,448 UART: [state] Locking ICCM
18,702,650 UART: [exit] Launching FMC @ 0x40000130
18,711,036 UART:
18,711,272 UART: Running Caliptra FMC ...
18,712,296 UART:
18,712,439 UART: [state] CFI Enabled
18,773,285 UART: [fht] FMC Alias Private Key: 7
20,539,619 UART: [art] Extend RT PCRs Done
20,540,838 UART: [art] Lock RT PCRs Done
20,542,379 UART: [art] Populate DV Done
20,547,733 UART: [fht] FMC Alias Private Key: 7
20,549,282 UART: [art] Derive CDI
20,550,016 UART: [art] Store in slot 0x4
20,606,509 UART: [art] Derive Key Pair
20,607,549 UART: [art] Store priv key in slot 0x5
23,069,729 UART: [art] Derive Key Pair - Done
23,082,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,897 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,388 UART: [art] PUB.X = FD8EA2728EC19E05C8C3924E27ACB67D2A5071D3A538914B70C731026C55294BC2F08C59879F13DAF3B339D41DC11D6D
24,804,628 UART: [art] PUB.Y = 353A9B13EEE161EAB0F9118DB705DA1D57524EBDE906739F0365DD1F07A4149230A00C4BF9BEBCA3E280858520EFC8B5
24,811,908 UART: [art] SIG.R = 38491361B7ECB2C6B34F39D2A19530BC73CED437390CFF732B45088E580B09E4EADD47AF8B90B657D161287E15737926
24,819,307 UART: [art] SIG.S = 70E27950806A1F6E2C0C75143AF5B5B4B022FA352E93BD41CB7B1989A71F8DD95C4941C56F0B2799E8523F83AC8CD449
25,798,361 UART: Caliptra RT
25,799,072 UART: [state] CFI Enabled
25,979,047 UART: [rt] RT listening for mailbox commands...
25,980,974 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,011,555 UART: [rt]cmd =0x44504543, len=92
26,018,151 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
2,220,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,195,448 >>> mbox cmd response: success
18,489,703 UART:
18,490,173 UART: Running Caliptra FMC ...
18,491,289 UART:
18,491,449 UART: [state] CFI Enabled
18,560,608 UART: [fht] FMC Alias Private Key: 7
20,327,246 UART: [art] Extend RT PCRs Done
20,328,473 UART: [art] Lock RT PCRs Done
20,329,850 UART: [art] Populate DV Done
20,335,366 UART: [fht] FMC Alias Private Key: 7
20,337,014 UART: [art] Derive CDI
20,337,836 UART: [art] Store in slot 0x4
20,393,305 UART: [art] Derive Key Pair
20,394,326 UART: [art] Store priv key in slot 0x5
22,857,330 UART: [art] Derive Key Pair - Done
22,870,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,582,285 UART: [art] Erasing AUTHORITY.KEYID = 7
24,583,787 UART: [art] PUB.X = 7D79B03A3B8A139AEF5BE40C993B84C7A94A3C12FE83059A2327B2B27F6F51BEACF6354A4496431D7A655DA171990010
24,591,050 UART: [art] PUB.Y = 23A6CC0B0FD6FECA51559047CE3EFE6B55B59694570ACC9B84ED5C5D0C34FF654EC71AC07DD646982351BF947CFF6A39
24,598,332 UART: [art] SIG.R = 79CA7AE5D17F5A47C9F8DA81559FA82322825E5E5885D1876A9D79EA528F706953F508206EB849F6C688D33B0847513D
24,605,684 UART: [art] SIG.S = BCDC94A54FAB9526673A52609A8B70B40E8AD9D3A903870EB6DA7BEB00F7CE5248E94455323F6814E05C749909C0EB64
25,584,644 UART: Caliptra RT
25,585,346 UART: [state] CFI Enabled
25,764,928 UART: [rt] RT listening for mailbox commands...
25,766,853 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,797,719 UART: [rt]cmd =0x44504543, len=92
25,804,467 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,227,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,377,338 UART:
2,377,750 UART: Running Caliptra ROM ...
2,378,837 UART:
2,379,019 UART: [state] CFI Enabled
2,379,950 UART: [state] LifecycleState = Unprovisioned
2,381,623 UART: [state] DebugLocked = No
2,382,657 UART: [state] WD Timer not started. Device not locked for debugging
2,385,132 UART: [kat] SHA2-256
2,385,800 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,388,807 UART: [kat] ++
2,389,259 UART: [kat] sha1
2,389,773 UART: [kat] SHA2-256
2,390,431 UART: [kat] SHA2-384
2,391,092 UART: [kat] SHA2-512-ACC
2,391,912 UART: [kat] ECC-384
3,280,879 UART: [kat] HMAC-384Kdf
3,294,338 UART: [kat] LMS
3,770,819 UART: [kat] --
3,774,326 UART: [cold-reset] ++
3,776,329 UART: [fht] FHT @ 0x50003400
3,786,175 UART: [idev] ++
3,786,736 UART: [idev] CDI.KEYID = 6
3,787,673 UART: [idev] SUBJECT.KEYID = 7
3,788,943 UART: [idev] UDS.KEYID = 0
3,806,681 UART: [idev] Erasing UDS.KEYID = 0
6,267,949 UART: [idev] Sha1 KeyId Algorithm
6,290,836 UART: [idev] --
6,296,323 UART: [ldev] ++
6,296,902 UART: [ldev] CDI.KEYID = 6
6,297,850 UART: [ldev] SUBJECT.KEYID = 5
6,299,064 UART: [ldev] AUTHORITY.KEYID = 7
6,300,303 UART: [ldev] FE.KEYID = 1
6,311,089 UART: [ldev] Erasing FE.KEYID = 1
8,793,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,001 UART: [ldev] --
10,589,279 UART: [fwproc] Wait for Commands...
10,591,814 UART: [fwproc] Recv command 0x46574c44
10,593,802 UART: [fwproc] Recv'd Img size: 118548 bytes
14,080,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,177 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,202 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,706 >>> mbox cmd response: success
14,566,599 UART: [afmc] ++
14,567,188 UART: [afmc] CDI.KEYID = 6
14,568,102 UART: [afmc] SUBJECT.KEYID = 7
14,569,325 UART: [afmc] AUTHORITY.KEYID = 5
17,076,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,797,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,799,888 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,815,714 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,831,792 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,847,369 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,872,447 UART: [afmc] --
18,876,269 UART: [cold-reset] --
18,880,346 UART: [state] Locking Datavault
18,885,161 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,917 UART: [state] Locking ICCM
18,889,667 UART: [exit] Launching FMC @ 0x40000130
18,898,068 UART:
18,898,309 UART: Running Caliptra FMC ...
18,899,411 UART:
18,899,581 UART: [state] CFI Enabled
18,907,469 UART: [fht] FMC Alias Private Key: 7
20,673,320 UART: [art] Extend RT PCRs Done
20,674,542 UART: [art] Lock RT PCRs Done
20,676,062 UART: [art] Populate DV Done
20,681,594 UART: [fht] FMC Alias Private Key: 7
20,683,064 UART: [art] Derive CDI
20,683,996 UART: [art] Store in slot 0x4
20,726,658 UART: [art] Derive Key Pair
20,727,665 UART: [art] Store priv key in slot 0x5
23,154,721 UART: [art] Derive Key Pair - Done
23,167,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,874,266 UART: [art] Erasing AUTHORITY.KEYID = 7
24,875,769 UART: [art] PUB.X = 6992C881565EFB48CEE1977146D5E5D6A5BF1786CA036A0C1E9AA1C35A0039588700DB15968B672CC3D62F9D69A4E7D0
24,882,960 UART: [art] PUB.Y = 8E50A66FC5F33DED9DE96A62A51836AACD845E07644545FD08CF850648160E49E38EF443E5117D818C93F4CD5774ED51
24,890,253 UART: [art] SIG.R = AF611EF02D18EFF83B683603EA4709C4957C13DEBE36808B45C6D17B6B55861A3476CDAEF77A068764A16FB88D4EE84F
24,897,643 UART: [art] SIG.S = C96F15C6E64815A987E1A672F56E54A8B9E7622F845E77333E674A7F222B15188E9B400EA844B0628053DC92360D14A1
25,876,531 UART: Caliptra RT
25,877,242 UART: [state] CFI Enabled
26,009,844 UART: [rt] RT listening for mailbox commands...
26,011,761 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,042,100 UART: [rt]cmd =0x44504543, len=92
26,048,376 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,224,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,087 >>> mbox cmd response: success
18,705,188 UART:
18,705,608 UART: Running Caliptra FMC ...
18,706,749 UART:
18,706,915 UART: [state] CFI Enabled
18,715,140 UART: [fht] FMC Alias Private Key: 7
20,481,194 UART: [art] Extend RT PCRs Done
20,482,419 UART: [art] Lock RT PCRs Done
20,483,855 UART: [art] Populate DV Done
20,489,276 UART: [fht] FMC Alias Private Key: 7
20,490,872 UART: [art] Derive CDI
20,491,611 UART: [art] Store in slot 0x4
20,534,217 UART: [art] Derive Key Pair
20,535,261 UART: [art] Store priv key in slot 0x5
22,962,276 UART: [art] Derive Key Pair - Done
22,975,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,681,459 UART: [art] Erasing AUTHORITY.KEYID = 7
24,682,966 UART: [art] PUB.X = DBE112BCC200AF7ACB28CD035EDD5A2303427D52D1B65E768C620DAF1F186EC136A7EF0F4F01CB13E0899B719B154EFB
24,690,228 UART: [art] PUB.Y = 7F2B3BBC1F8E78A1B07D22D60493C86AF632E5706E7EC1BB206E9933BB8B04D9C91A242F4242D4168360CDE988F25045
24,697,508 UART: [art] SIG.R = 7832583D728644C6406CA6421E16EC2ADE1D21ACAFF9223EBE586A5378AF69CC4E9F6641B22E0A16F2B25436F375142E
24,704,912 UART: [art] SIG.S = 956D6B66AEC94D5989E8B2A5AB2DC003F37C852FA35D0502D5FB2F58DBEB1BBD3DC0D8F9903319816B5C64536090B691
25,683,417 UART: Caliptra RT
25,684,130 UART: [state] CFI Enabled
25,815,838 UART: [rt] RT listening for mailbox commands...
25,817,773 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,848,111 UART: [rt]cmd =0x44504543, len=92
25,854,941 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,225,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,374,999 UART:
2,375,379 UART: Running Caliptra ROM ...
2,376,552 UART:
2,376,726 UART: [state] CFI Enabled
2,377,684 UART: [state] LifecycleState = Unprovisioned
2,379,652 UART: [state] DebugLocked = No
2,380,777 UART: [state] WD Timer not started. Device not locked for debugging
2,383,253 UART: [kat] SHA2-256
2,383,922 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,386,935 UART: [kat] ++
2,387,386 UART: [kat] sha1
2,387,898 UART: [kat] SHA2-256
2,388,557 UART: [kat] SHA2-384
2,389,381 UART: [kat] SHA2-512-ACC
2,390,194 UART: [kat] ECC-384
2,945,025 UART: [kat] HMAC-384Kdf
2,969,022 UART: [kat] LMS
3,500,768 UART: [kat] --
3,504,159 UART: [cold-reset] ++
3,505,818 UART: [fht] FHT @ 0x50003400
3,517,385 UART: [idev] ++
3,518,055 UART: [idev] CDI.KEYID = 6
3,519,029 UART: [idev] SUBJECT.KEYID = 7
3,520,241 UART: [idev] UDS.KEYID = 0
3,541,020 UART: [idev] Erasing UDS.KEYID = 0
6,025,251 UART: [idev] Sha1 KeyId Algorithm
6,048,167 UART: [idev] --
6,053,190 UART: [ldev] ++
6,053,923 UART: [ldev] CDI.KEYID = 6
6,054,836 UART: [ldev] SUBJECT.KEYID = 5
6,055,988 UART: [ldev] AUTHORITY.KEYID = 7
6,057,238 UART: [ldev] FE.KEYID = 1
6,097,903 UART: [ldev] Erasing FE.KEYID = 1
8,603,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,977 UART: [ldev] --
10,412,943 UART: [fwproc] Wait for Commands...
10,414,440 UART: [fwproc] Recv command 0x46574c44
10,416,421 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,986,656 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,271 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,669,848 >>> mbox cmd response: success
14,673,518 UART: [afmc] ++
14,674,229 UART: [afmc] CDI.KEYID = 6
14,675,468 UART: [afmc] SUBJECT.KEYID = 7
14,676,904 UART: [afmc] AUTHORITY.KEYID = 5
17,212,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,954,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,956,441 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,971,526 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,986,730 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,001,596 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,025,742 UART: [afmc] --
19,028,733 UART: [cold-reset] --
19,032,716 UART: [state] Locking Datavault
19,037,864 UART: [state] Locking PCR0, PCR1 and PCR31
19,040,066 UART: [state] Locking ICCM
19,042,770 UART: [exit] Launching FMC @ 0x40000130
19,051,458 UART:
19,051,708 UART: Running Caliptra FMC ...
19,052,740 UART:
19,052,889 UART: [state] CFI Enabled
19,110,229 UART: [fht] FMC Alias Private Key: 7
20,876,835 UART: [art] Extend RT PCRs Done
20,878,063 UART: [art] Lock RT PCRs Done
20,879,619 UART: [art] Populate DV Done
20,884,970 UART: [fht] FMC Alias Private Key: 7
20,886,498 UART: [art] Derive CDI
20,887,253 UART: [art] Store in slot 0x4
20,942,779 UART: [art] Derive Key Pair
20,943,815 UART: [art] Store priv key in slot 0x5
23,406,701 UART: [art] Derive Key Pair - Done
23,419,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,131,759 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,261 UART: [art] PUB.X = D6EA148A6B24D85DC984019EB360D4DB3B9AD5FD2E68546C38BEED176D7B97938ACAC0B82CFB863756D8E67AA1D35FC3
25,140,601 UART: [art] PUB.Y = 1700E1CA846ECCAB2BC311DCB8850E6CD73CC52ABCCBF4DA9C2F8130E4B432E01898CF8126A7EDDF2D9526EF084E05DD
25,147,869 UART: [art] SIG.R = B31239B97B0398C6CD1333A80F18C378440DE644F1338D476FA75825CA709A841A5DF71D7E2D51ECA00E94B48D193117
25,155,239 UART: [art] SIG.S = 16791EFE2B86C6346655BC07083CE3421525B81FEC9117A6AA13628991679ACE62DF4C65E6FB17546A0BBDF19F0CC6F6
26,134,012 UART: Caliptra RT
26,134,726 UART: [state] CFI Enabled
26,315,659 UART: [rt] RT listening for mailbox commands...
26,317,590 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,348,145 UART: [rt]cmd =0x44504543, len=92
26,354,763 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
2,227,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,388 >>> mbox cmd response: success
19,107,316 UART:
19,107,739 UART: Running Caliptra FMC ...
19,108,905 UART:
19,109,069 UART: [state] CFI Enabled
19,175,885 UART: [fht] FMC Alias Private Key: 7
20,962,880 UART: [art] Extend RT PCRs Done
20,964,096 UART: [art] Lock RT PCRs Done
20,965,510 UART: [art] Populate DV Done
20,970,861 UART: [fht] FMC Alias Private Key: 7
20,972,350 UART: [art] Derive CDI
20,973,086 UART: [art] Store in slot 0x4
21,029,460 UART: [art] Derive Key Pair
21,030,531 UART: [art] Store priv key in slot 0x5
23,493,103 UART: [art] Derive Key Pair - Done
23,505,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,956 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,463 UART: [art] PUB.X = ACEFDFB420605106EA2DCCD9030BC09A2D8564DABCC10FC521D6E62EEE97F977B4EE9DBD18388382DF26062DE4921213
25,227,735 UART: [art] PUB.Y = 497BB46CC829A36AD540B4DA2266BCE028B0AB3B24943DE352023C4C0730DB63C7AF28966243675A7DBE47BEDACD5F8B
25,234,992 UART: [art] SIG.R = CC6E5C4AED7852FD66519453B35C289BDD4A34CB6368A457C444A6F250F0DBDBE862EA3B05D22AD0EB66AC21DB9701AB
25,242,466 UART: [art] SIG.S = F230429B1DD0C88AA217D118F941E3A464B5E2F207F6497CF8484FD7E88B2B07874EE761EA8FF3EDFC75FBCC2BD5CD30
26,221,606 UART: Caliptra RT
26,222,313 UART: [state] CFI Enabled
26,402,774 UART: [rt] RT listening for mailbox commands...
26,404,701 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,435,275 UART: [rt]cmd =0x44504543, len=92
26,441,991 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
2,237,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,387,452 UART:
2,387,840 UART: Running Caliptra ROM ...
2,388,937 UART:
2,389,096 UART: [state] CFI Enabled
2,390,013 UART: [state] LifecycleState = Unprovisioned
2,391,687 UART: [state] DebugLocked = No
2,392,719 UART: [state] WD Timer not started. Device not locked for debugging
2,395,199 UART: [kat] SHA2-256
2,395,870 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,398,876 UART: [kat] ++
2,399,336 UART: [kat] sha1
2,399,849 UART: [kat] SHA2-256
2,400,512 UART: [kat] SHA2-384
2,401,176 UART: [kat] SHA2-512-ACC
2,402,006 UART: [kat] ECC-384
3,295,980 UART: [kat] HMAC-384Kdf
3,309,222 UART: [kat] LMS
3,841,081 UART: [kat] --
3,845,056 UART: [cold-reset] ++
3,846,241 UART: [fht] FHT @ 0x50003400
3,857,176 UART: [idev] ++
3,857,861 UART: [idev] CDI.KEYID = 6
3,858,779 UART: [idev] SUBJECT.KEYID = 7
3,860,000 UART: [idev] UDS.KEYID = 0
3,878,413 UART: [idev] Erasing UDS.KEYID = 0
6,342,841 UART: [idev] Sha1 KeyId Algorithm
6,365,407 UART: [idev] --
6,368,898 UART: [ldev] ++
6,369,590 UART: [ldev] CDI.KEYID = 6
6,370,506 UART: [ldev] SUBJECT.KEYID = 5
6,371,691 UART: [ldev] AUTHORITY.KEYID = 7
6,372,879 UART: [ldev] FE.KEYID = 1
6,384,292 UART: [ldev] Erasing FE.KEYID = 1
8,867,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,391 UART: [ldev] --
10,656,358 UART: [fwproc] Wait for Commands...
10,659,430 UART: [fwproc] Recv command 0x46574c44
10,661,698 UART: [fwproc] Recv'd Img size: 118548 bytes
14,158,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,236,729 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,360,303 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,919,927 >>> mbox cmd response: success
14,924,286 UART: [afmc] ++
14,925,081 UART: [afmc] CDI.KEYID = 6
14,926,183 UART: [afmc] SUBJECT.KEYID = 7
14,927,695 UART: [afmc] AUTHORITY.KEYID = 5
17,436,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,160,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,162,582 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,177,677 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,192,821 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,207,740 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,231,439 UART: [afmc] --
19,235,899 UART: [cold-reset] --
19,238,423 UART: [state] Locking Datavault
19,244,266 UART: [state] Locking PCR0, PCR1 and PCR31
19,246,451 UART: [state] Locking ICCM
19,248,379 UART: [exit] Launching FMC @ 0x40000130
19,257,033 UART:
19,257,275 UART: Running Caliptra FMC ...
19,258,303 UART:
19,258,456 UART: [state] CFI Enabled
19,266,671 UART: [fht] FMC Alias Private Key: 7
21,033,444 UART: [art] Extend RT PCRs Done
21,034,673 UART: [art] Lock RT PCRs Done
21,036,279 UART: [art] Populate DV Done
21,041,589 UART: [fht] FMC Alias Private Key: 7
21,043,300 UART: [art] Derive CDI
21,044,124 UART: [art] Store in slot 0x4
21,086,823 UART: [art] Derive Key Pair
21,087,861 UART: [art] Store priv key in slot 0x5
23,515,193 UART: [art] Derive Key Pair - Done
23,528,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,234,774 UART: [art] Erasing AUTHORITY.KEYID = 7
25,236,302 UART: [art] PUB.X = C606CA4094402FBEA710BE5A368C551662E6EED7BC74C2D04FEE98886BF9E55C0C50EA7904F2F19D9ACAE09EBC5E126E
25,243,628 UART: [art] PUB.Y = 3586B7D1F0E4F15814BBC7B485884E32D16C9E7CB1F13F0E05D9C12105C83C2982FA7E89A85EC36C96504C41E34E9573
25,250,836 UART: [art] SIG.R = 7B449DAE07E0B0CC1A8D315865312C5AA3ADC804493BEB5E706F809EA82878842A033B97A9088393213EED777EBF871B
25,258,257 UART: [art] SIG.S = EBC3B8A0D3F36F56495117EBEC839A60A8C08FC195FAC7193ECC8E76E12AE97C642544278293C9E511568C3208A2F9E2
26,237,532 UART: Caliptra RT
26,238,220 UART: [state] CFI Enabled
26,372,118 UART: [rt] RT listening for mailbox commands...
26,374,043 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,404,925 UART: [rt]cmd =0x44504543, len=92
26,411,763 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
2,242,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,790 >>> mbox cmd response: success
19,303,896 UART:
19,304,318 UART: Running Caliptra FMC ...
19,305,476 UART:
19,305,642 UART: [state] CFI Enabled
19,313,712 UART: [fht] FMC Alias Private Key: 7
21,079,952 UART: [art] Extend RT PCRs Done
21,081,203 UART: [art] Lock RT PCRs Done
21,082,519 UART: [art] Populate DV Done
21,087,836 UART: [fht] FMC Alias Private Key: 7
21,089,517 UART: [art] Derive CDI
21,090,339 UART: [art] Store in slot 0x4
21,132,980 UART: [art] Derive Key Pair
21,134,028 UART: [art] Store priv key in slot 0x5
23,561,010 UART: [art] Derive Key Pair - Done
23,574,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,869 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,377 UART: [art] PUB.X = D1FA8057C719364657FF10F5D2F9306F647101743CD177EC32AC9A83F2091866D819C38169821973AC57E4E23E9D657B
25,289,575 UART: [art] PUB.Y = 34288CA6832AF8B37FDAB9F8D2E8DF0BF06868EFB5A7EDA23837F348E96D8685C56B21915BD617AB75506F150F7647B8
25,296,884 UART: [art] SIG.R = 586A3A6395582B72D6D4DBDDCF5D87A1C3D07C62351A2CB05D87423D660C35CE4430AA6D5B4307B708F1D799D87538EA
25,304,235 UART: [art] SIG.S = 690BDBD3CA89DB587FC8ECC4CF059A55B7B28DC82AFAC00237919C27BBBF9AA5016CC00755C9B4CADCD8A6EA08A5B5FD
26,283,639 UART: Caliptra RT
26,284,361 UART: [state] CFI Enabled
26,418,346 UART: [rt] RT listening for mailbox commands...
26,420,279 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,450,904 UART: [rt]cmd =0x44504543, len=92
26,457,764 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,569 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,103 UART: [kat] SHA2-256
882,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,149 UART: [kat] ++
886,301 UART: [kat] sha1
890,565 UART: [kat] SHA2-256
892,503 UART: [kat] SHA2-384
895,284 UART: [kat] SHA2-512-ACC
897,185 UART: [kat] ECC-384
902,870 UART: [kat] HMAC-384Kdf
907,380 UART: [kat] LMS
1,475,576 UART: [kat] --
1,476,429 UART: [cold-reset] ++
1,476,795 UART: [fht] Storing FHT @ 0x50003400
1,479,658 UART: [idev] ++
1,479,826 UART: [idev] CDI.KEYID = 6
1,480,186 UART: [idev] SUBJECT.KEYID = 7
1,480,610 UART: [idev] UDS.KEYID = 0
1,488,352 UART: [idev] Erasing UDS.KEYID = 0
1,504,688 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,394 UART: [idev] --
1,514,401 UART: [ldev] ++
1,514,569 UART: [ldev] CDI.KEYID = 6
1,514,932 UART: [ldev] SUBJECT.KEYID = 5
1,515,358 UART: [ldev] AUTHORITY.KEYID = 7
1,515,821 UART: [ldev] FE.KEYID = 1
1,520,753 UART: [ldev] Erasing FE.KEYID = 1
1,546,178 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,146 UART: [ldev] --
1,585,543 UART: [fwproc] Waiting for Commands...
1,586,364 UART: [fwproc] Received command 0x46574c44
1,587,155 UART: [fwproc] Received Image of size 118548 bytes
2,930,737 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,445 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,663 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,992 >>> mbox cmd response: success
3,130,220 UART: [afmc] ++
3,130,388 UART: [afmc] CDI.KEYID = 6
3,130,750 UART: [afmc] SUBJECT.KEYID = 7
3,131,175 UART: [afmc] AUTHORITY.KEYID = 5
3,166,222 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,706 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,486 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,195 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,078 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,761 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,529 UART: [afmc] --
3,209,459 UART: [cold-reset] --
3,210,423 UART: [state] Locking Datavault
3,211,678 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,282 UART: [state] Locking ICCM
3,212,756 UART: [exit] Launching FMC @ 0x40000130
3,218,086 UART:
3,218,102 UART: Running Caliptra FMC ...
3,218,510 UART:
3,218,564 UART: [state] CFI Enabled
3,229,460 UART: [fht] FMC Alias Private Key: 7
3,348,410 UART: [art] Extend RT PCRs Done
3,348,838 UART: [art] Lock RT PCRs Done
3,350,206 UART: [art] Populate DV Done
3,358,447 UART: [fht] FMC Alias Private Key: 7
3,359,477 UART: [art] Derive CDI
3,359,757 UART: [art] Store in slot 0x4
3,445,811 UART: [art] Derive Key Pair
3,446,171 UART: [art] Store priv key in slot 0x5
3,459,224 UART: [art] Derive Key Pair - Done
3,473,960 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,514 UART: [art] PUB.X = F6BA22FA147483CCAAEAB2D5F385569E1B068B2C55D6F838527C57D1018E48B772B6D19152AD3F0C1ABE7F8AED81CEA2
3,496,293 UART: [art] PUB.Y = 821B930C9A8CFCE3863C3C35C232D40EDAB9363A693CEB6AFAC77C98DAC109B3D1B8EEB6243545C91E9AD1B2DE7B4B80
3,503,256 UART: [art] SIG.R = 627F850F5E697F96E2605D1333EE3C05D7758A6E5FBA4D6D4734BA8E4D2111421156094DE35830FCD3A87F8E34921CDB
3,510,019 UART: [art] SIG.S = C669ACBAB1A1DF3A6DCA470F3E99B90192D20C8DD6A15C10B12B8DBB8812A22304289AFB3FB7F684225DDC5C6FCCB658
3,533,433 UART: Caliptra RT
3,533,684 UART: [state] CFI Enabled
3,654,276 UART: [rt] RT listening for mailbox commands...
3,654,946 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,282 UART: [rt]cmd =0x44504543, len=92
3,692,629 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,146 >>> mbox cmd response: success
3,041,039 UART:
3,041,055 UART: Running Caliptra FMC ...
3,041,463 UART:
3,041,517 UART: [state] CFI Enabled
3,052,059 UART: [fht] FMC Alias Private Key: 7
3,171,203 UART: [art] Extend RT PCRs Done
3,171,631 UART: [art] Lock RT PCRs Done
3,173,185 UART: [art] Populate DV Done
3,181,498 UART: [fht] FMC Alias Private Key: 7
3,182,670 UART: [art] Derive CDI
3,182,950 UART: [art] Store in slot 0x4
3,268,434 UART: [art] Derive Key Pair
3,268,794 UART: [art] Store priv key in slot 0x5
3,282,229 UART: [art] Derive Key Pair - Done
3,297,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,904 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,669 UART: [art] PUB.X = 83FEF80ADC3B60BD20063BA2DBDFFBD19D22B5AF593578CACFE091231ED51888C8ACA4D7D846E5888DAA77ABFB3C3A9E
3,320,463 UART: [art] PUB.Y = 7C93B0020A042C3E8AAA04328B871B197744887C4BEF6B28BD12F6B587F0D97480554022AABCFB9988EDB2D93088E81B
3,327,405 UART: [art] SIG.R = 6C395FF4698329D1DB98F8DB412B827C2FA277095966A13203779047FE2DF7B95F1BD7BA76DD4628CEC3C1B0E932A913
3,334,173 UART: [art] SIG.S = E670BB74DFBDA34ADAC8FE28611C8939B7CF03CEF95806E119406209BC58938B1FA47158FB8C6946CF388D8379CECA25
3,358,042 UART: Caliptra RT
3,358,293 UART: [state] CFI Enabled
3,478,057 UART: [rt] RT listening for mailbox commands...
3,478,727 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,217 UART: [rt]cmd =0x44504543, len=92
3,516,676 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,604 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,196 UART: [kat] SHA2-256
882,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,242 UART: [kat] ++
886,394 UART: [kat] sha1
890,614 UART: [kat] SHA2-256
892,552 UART: [kat] SHA2-384
895,363 UART: [kat] SHA2-512-ACC
897,264 UART: [kat] ECC-384
902,679 UART: [kat] HMAC-384Kdf
907,213 UART: [kat] LMS
1,475,409 UART: [kat] --
1,476,508 UART: [cold-reset] ++
1,476,968 UART: [fht] Storing FHT @ 0x50003400
1,479,879 UART: [idev] ++
1,480,047 UART: [idev] CDI.KEYID = 6
1,480,407 UART: [idev] SUBJECT.KEYID = 7
1,480,831 UART: [idev] UDS.KEYID = 0
1,488,613 UART: [idev] Erasing UDS.KEYID = 0
1,505,945 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,761 UART: [idev] --
1,515,876 UART: [ldev] ++
1,516,044 UART: [ldev] CDI.KEYID = 6
1,516,407 UART: [ldev] SUBJECT.KEYID = 5
1,516,833 UART: [ldev] AUTHORITY.KEYID = 7
1,517,296 UART: [ldev] FE.KEYID = 1
1,522,500 UART: [ldev] Erasing FE.KEYID = 1
1,547,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,667 UART: [ldev] --
1,587,062 UART: [fwproc] Waiting for Commands...
1,587,781 UART: [fwproc] Received command 0x46574c44
1,588,572 UART: [fwproc] Received Image of size 118548 bytes
2,932,826 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,802 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,020 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,427 >>> mbox cmd response: success
3,132,675 UART: [afmc] ++
3,132,843 UART: [afmc] CDI.KEYID = 6
3,133,205 UART: [afmc] SUBJECT.KEYID = 7
3,133,630 UART: [afmc] AUTHORITY.KEYID = 5
3,168,545 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,927 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,707 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,416 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,299 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,982 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,890 UART: [afmc] --
3,211,836 UART: [cold-reset] --
3,212,526 UART: [state] Locking Datavault
3,213,713 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,317 UART: [state] Locking ICCM
3,214,977 UART: [exit] Launching FMC @ 0x40000130
3,220,307 UART:
3,220,323 UART: Running Caliptra FMC ...
3,220,731 UART:
3,220,874 UART: [state] CFI Enabled
3,231,774 UART: [fht] FMC Alias Private Key: 7
3,351,106 UART: [art] Extend RT PCRs Done
3,351,534 UART: [art] Lock RT PCRs Done
3,352,956 UART: [art] Populate DV Done
3,361,193 UART: [fht] FMC Alias Private Key: 7
3,362,199 UART: [art] Derive CDI
3,362,479 UART: [art] Store in slot 0x4
3,448,371 UART: [art] Derive Key Pair
3,448,731 UART: [art] Store priv key in slot 0x5
3,461,946 UART: [art] Derive Key Pair - Done
3,477,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,522 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,287 UART: [art] PUB.X = ED5346E4E96C16317FF452C9F8E2DC37E84EB611471CE58AF23D9EBA73F4C8513FD5AD15E55BF54383FCFC8DA95952D4
3,500,073 UART: [art] PUB.Y = 2383F6EDC91C06EB2A042964BCD0733DFF235F71E6AD7AA4CE2E222DFFCA85EE5DC2886BDA880B00D63BBD778DFD1ED4
3,507,020 UART: [art] SIG.R = A0540126B6621ED07EFBF9EE501060CFCD403D8BEBFB25E3FC66FCBD1A116CE57707CCB3BD30212A899E2DCD9DF5B686
3,513,808 UART: [art] SIG.S = B96261CD7A6F8A22496C41D447A1881D6D44A7A900384D8C54442D755568AFBA0AF32C59009A29DD1211F9E1AA34C527
3,537,745 UART: Caliptra RT
3,538,088 UART: [state] CFI Enabled
3,659,133 UART: [rt] RT listening for mailbox commands...
3,659,803 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,115 UART: [rt]cmd =0x44504543, len=92
3,697,334 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,415 >>> mbox cmd response: success
3,044,430 UART:
3,044,446 UART: Running Caliptra FMC ...
3,044,854 UART:
3,044,997 UART: [state] CFI Enabled
3,055,869 UART: [fht] FMC Alias Private Key: 7
3,174,437 UART: [art] Extend RT PCRs Done
3,174,865 UART: [art] Lock RT PCRs Done
3,176,337 UART: [art] Populate DV Done
3,184,448 UART: [fht] FMC Alias Private Key: 7
3,185,502 UART: [art] Derive CDI
3,185,782 UART: [art] Store in slot 0x4
3,271,778 UART: [art] Derive Key Pair
3,272,138 UART: [art] Store priv key in slot 0x5
3,285,459 UART: [art] Derive Key Pair - Done
3,300,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,551 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,316 UART: [art] PUB.X = 04DF3FC4390CE9D4072D17D3F4632F23A40759E45DFEE2E03E4F78F856FDD69C76C6027BBE4CB35C7CE8AFE30181B0A4
3,324,084 UART: [art] PUB.Y = 9DA92B76A435B691AEDAD203B9EA9DDF694367D2D9DCD7EFE9B1724C6002895796B55B9F8CCE7D1D667FFAD33D8D20F9
3,331,048 UART: [art] SIG.R = 3D4504705A485B2DF9B87328D78333AB996AFBA724202D4027879B3E5E1F120241A3978095727D597A95602A086470DD
3,337,795 UART: [art] SIG.S = 07C0473D6DC74927E8480FF341C1655ABA924F2309AA7C23584B81975BF507373B7E48347E6E959ACD6BA35A427A2461
3,360,883 UART: Caliptra RT
3,361,226 UART: [state] CFI Enabled
3,481,907 UART: [rt] RT listening for mailbox commands...
3,482,577 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,971 UART: [rt]cmd =0x44504543, len=92
3,520,228 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
87,984 UART: [kat] SHA2-256
891,534 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,638 UART: [kat] ++
895,790 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,779 UART: [kat] SHA2-512-ACC
906,680 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,368 UART: [fht] FHT @ 0x50003400
1,172,864 UART: [idev] ++
1,173,032 UART: [idev] CDI.KEYID = 6
1,173,393 UART: [idev] SUBJECT.KEYID = 7
1,173,818 UART: [idev] UDS.KEYID = 0
1,181,389 UART: [idev] Erasing UDS.KEYID = 0
1,198,109 UART: [idev] Sha1 KeyId Algorithm
1,206,955 UART: [idev] --
1,207,854 UART: [ldev] ++
1,208,022 UART: [ldev] CDI.KEYID = 6
1,208,386 UART: [ldev] SUBJECT.KEYID = 5
1,208,813 UART: [ldev] AUTHORITY.KEYID = 7
1,209,276 UART: [ldev] FE.KEYID = 1
1,214,520 UART: [ldev] Erasing FE.KEYID = 1
1,241,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,456 UART: [ldev] --
1,280,841 UART: [fwproc] Wait for Commands...
1,281,454 UART: [fwproc] Recv command 0x46574c44
1,282,187 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,367 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,542 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,715 >>> mbox cmd response: success
2,827,971 UART: [afmc] ++
2,828,139 UART: [afmc] CDI.KEYID = 6
2,828,502 UART: [afmc] SUBJECT.KEYID = 7
2,828,928 UART: [afmc] AUTHORITY.KEYID = 5
2,865,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,169 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,879 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,760 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,461 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,384 UART: [afmc] --
2,908,213 UART: [cold-reset] --
2,909,279 UART: [state] Locking Datavault
2,910,390 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,994 UART: [state] Locking ICCM
2,911,452 UART: [exit] Launching FMC @ 0x40000130
2,916,782 UART:
2,916,798 UART: Running Caliptra FMC ...
2,917,206 UART:
2,917,260 UART: [state] CFI Enabled
2,927,690 UART: [fht] FMC Alias Private Key: 7
3,046,606 UART: [art] Extend RT PCRs Done
3,047,034 UART: [art] Lock RT PCRs Done
3,048,612 UART: [art] Populate DV Done
3,056,621 UART: [fht] FMC Alias Private Key: 7
3,057,699 UART: [art] Derive CDI
3,057,979 UART: [art] Store in slot 0x4
3,143,660 UART: [art] Derive Key Pair
3,144,020 UART: [art] Store priv key in slot 0x5
3,157,262 UART: [art] Derive Key Pair - Done
3,172,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,755 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,520 UART: [art] PUB.X = 179DEECEA28990F76540362D3C8ECF74914E4E4CA7C8CBA4AA51E8306663CED8D4E8601357636FE092382B4B120E9B0B
3,195,292 UART: [art] PUB.Y = 2283079432E9D446CD25958892C11EE6A2E94E2DABC4FF1E0E1C18761849FB5766C7F20AD811781FBCC938683EBF1A5C
3,202,239 UART: [art] SIG.R = F9AD6BF7F9574AE17A9361A5B12DE98D83AA2897432B9E06BF69156F6CBC9E023ACEDF38BD24103A18A5E8E8038286F6
3,209,012 UART: [art] SIG.S = 53AC890C52ED6517709DB052916D62FF1B8FCB691C75773FBFD8B3C8643D234FA243DB4CA3F0C6D3611C11C5E6F00217
3,232,654 UART: Caliptra RT
3,232,905 UART: [state] CFI Enabled
3,353,424 UART: [rt] RT listening for mailbox commands...
3,354,094 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,394 UART: [rt]cmd =0x44504543, len=92
3,391,629 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,358 >>> mbox cmd response: success
2,740,515 UART:
2,740,531 UART: Running Caliptra FMC ...
2,740,939 UART:
2,740,993 UART: [state] CFI Enabled
2,751,429 UART: [fht] FMC Alias Private Key: 7
2,870,321 UART: [art] Extend RT PCRs Done
2,870,749 UART: [art] Lock RT PCRs Done
2,872,009 UART: [art] Populate DV Done
2,880,176 UART: [fht] FMC Alias Private Key: 7
2,881,274 UART: [art] Derive CDI
2,881,554 UART: [art] Store in slot 0x4
2,967,571 UART: [art] Derive Key Pair
2,967,931 UART: [art] Store priv key in slot 0x5
2,980,807 UART: [art] Derive Key Pair - Done
2,995,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,704 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,469 UART: [art] PUB.X = BBC63BE1BC38A6A711FE88E1B230D208D39894924365821FE346E54DB9E1CE88F3D97FB903E7391B6B0591F980A2D88F
3,018,236 UART: [art] PUB.Y = 4D699E47CE3404610308D55156FA3E23C1D1819B89035E34A3116E1EFC0B8C6FF7A0C584F727B36768E577D09274A649
3,025,165 UART: [art] SIG.R = 501741715CDE0546191EECA3982BD8710F260693085DE8C66F6B437327B585424DC8DFD689EBD645C882DEC24D66D26A
3,031,923 UART: [art] SIG.S = A233684D0D59A5B44B0162A26DAE8FD805FB62F67F4AB9138C39DBF3706F7CA079CB09B71FB1F86C4C4D44170A6092AD
3,055,400 UART: Caliptra RT
3,055,651 UART: [state] CFI Enabled
3,175,940 UART: [rt] RT listening for mailbox commands...
3,176,610 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,974 UART: [rt]cmd =0x44504543, len=92
3,214,345 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,059 UART: [state] LifecycleState = Unprovisioned
85,714 UART: [state] DebugLocked = No
86,342 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,522 UART: [kat] SHA2-512-ACC
906,423 UART: [kat] ECC-384
916,728 UART: [kat] HMAC-384Kdf
921,372 UART: [kat] LMS
1,169,684 UART: [kat] --
1,170,375 UART: [cold-reset] ++
1,170,831 UART: [fht] FHT @ 0x50003400
1,173,419 UART: [idev] ++
1,173,587 UART: [idev] CDI.KEYID = 6
1,173,948 UART: [idev] SUBJECT.KEYID = 7
1,174,373 UART: [idev] UDS.KEYID = 0
1,182,264 UART: [idev] Erasing UDS.KEYID = 0
1,198,908 UART: [idev] Sha1 KeyId Algorithm
1,207,814 UART: [idev] --
1,208,955 UART: [ldev] ++
1,209,123 UART: [ldev] CDI.KEYID = 6
1,209,487 UART: [ldev] SUBJECT.KEYID = 5
1,209,914 UART: [ldev] AUTHORITY.KEYID = 7
1,210,377 UART: [ldev] FE.KEYID = 1
1,215,775 UART: [ldev] Erasing FE.KEYID = 1
1,242,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,205 UART: [ldev] --
1,281,474 UART: [fwproc] Wait for Commands...
1,282,097 UART: [fwproc] Recv command 0x46574c44
1,282,830 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,978 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,153 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,406 >>> mbox cmd response: success
2,826,500 UART: [afmc] ++
2,826,668 UART: [afmc] CDI.KEYID = 6
2,827,031 UART: [afmc] SUBJECT.KEYID = 7
2,827,457 UART: [afmc] AUTHORITY.KEYID = 5
2,863,384 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,798 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,508 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,389 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,090 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,907 UART: [afmc] --
2,906,740 UART: [cold-reset] --
2,907,436 UART: [state] Locking Datavault
2,908,833 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,437 UART: [state] Locking ICCM
2,909,977 UART: [exit] Launching FMC @ 0x40000130
2,915,307 UART:
2,915,323 UART: Running Caliptra FMC ...
2,915,731 UART:
2,915,874 UART: [state] CFI Enabled
2,926,330 UART: [fht] FMC Alias Private Key: 7
3,045,760 UART: [art] Extend RT PCRs Done
3,046,188 UART: [art] Lock RT PCRs Done
3,047,834 UART: [art] Populate DV Done
3,056,041 UART: [fht] FMC Alias Private Key: 7
3,057,219 UART: [art] Derive CDI
3,057,499 UART: [art] Store in slot 0x4
3,143,264 UART: [art] Derive Key Pair
3,143,624 UART: [art] Store priv key in slot 0x5
3,157,030 UART: [art] Derive Key Pair - Done
3,171,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,882 UART: [art] PUB.X = 4D7FC0A3198E8CC89D53378B513BE0FB39F6CF3E1CA7ED8FB15E4C4F9B95E770D4507CFEABE0BED24EDFB06EFB1C282A
3,194,684 UART: [art] PUB.Y = 8EF8613EEBEC01554E4BF8F966ED33390992C031B8FE837F1ECE89D3AF0EA78484C46FEAB2339C7BF66FF9B1A74A1AA8
3,201,645 UART: [art] SIG.R = 2EF8FE3EA7272F9A6A61BA2E46A60F9B74EED61D7105547CFC24FD3FF9F55A7266A3330A9DB59EC0FD53EA1BE36068B6
3,208,426 UART: [art] SIG.S = 446D3C23FC0BB3FE65A3145BCB5C55E1387361BCF8D125A440A75AE1DE00A9568122F4C65BA875D39C46D0B71AEB5D84
3,231,867 UART: Caliptra RT
3,232,210 UART: [state] CFI Enabled
3,351,558 UART: [rt] RT listening for mailbox commands...
3,352,228 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,720 UART: [rt]cmd =0x44504543, len=92
3,390,149 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,387 >>> mbox cmd response: success
2,741,850 UART:
2,741,866 UART: Running Caliptra FMC ...
2,742,274 UART:
2,742,417 UART: [state] CFI Enabled
2,752,769 UART: [fht] FMC Alias Private Key: 7
2,872,043 UART: [art] Extend RT PCRs Done
2,872,471 UART: [art] Lock RT PCRs Done
2,874,341 UART: [art] Populate DV Done
2,882,744 UART: [fht] FMC Alias Private Key: 7
2,883,752 UART: [art] Derive CDI
2,884,032 UART: [art] Store in slot 0x4
2,969,921 UART: [art] Derive Key Pair
2,970,281 UART: [art] Store priv key in slot 0x5
2,983,225 UART: [art] Derive Key Pair - Done
2,997,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,576 UART: [art] PUB.X = 50FEAF3258BF967062B57822635C3845D97A6C9BAE1E7DF18F508618E3AEAE46C87FA6259C63303E6A2C8E50F5B44653
3,021,350 UART: [art] PUB.Y = 67FDB684AC3F6558EF046934FF6123B86C164AF9A86CA10DC86E9483E3A9762E3065AE827C6E0C63935AE39812028924
3,028,286 UART: [art] SIG.R = 866374D54C5979D001E1F25514EDD7ACFD397A872CE94E780A279C53454E4F015C9FBE278BDC161C79D122EEBB47C372
3,035,053 UART: [art] SIG.S = EC9E03408F233F2A380426AA8DAC92446464C0B4CF6C2CEA690E151F7E03616830969840A199A42CC16185E24DF23D15
3,058,401 UART: Caliptra RT
3,058,744 UART: [state] CFI Enabled
3,178,152 UART: [rt] RT listening for mailbox commands...
3,178,822 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,022 UART: [rt]cmd =0x44504543, len=92
3,215,987 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
893,326 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,451 UART: [kat] ++
897,603 UART: [kat] sha1
901,783 UART: [kat] SHA2-256
903,723 UART: [kat] SHA2-384
906,422 UART: [kat] SHA2-512-ACC
908,323 UART: [kat] ECC-384
918,192 UART: [kat] HMAC-384Kdf
922,692 UART: [kat] LMS
1,171,020 UART: [kat] --
1,171,623 UART: [cold-reset] ++
1,172,157 UART: [fht] FHT @ 0x50003400
1,174,616 UART: [idev] ++
1,174,784 UART: [idev] CDI.KEYID = 6
1,175,144 UART: [idev] SUBJECT.KEYID = 7
1,175,568 UART: [idev] UDS.KEYID = 0
1,183,224 UART: [idev] Erasing UDS.KEYID = 0
1,200,211 UART: [idev] Sha1 KeyId Algorithm
1,208,727 UART: [idev] --
1,209,655 UART: [ldev] ++
1,209,823 UART: [ldev] CDI.KEYID = 6
1,210,186 UART: [ldev] SUBJECT.KEYID = 5
1,210,612 UART: [ldev] AUTHORITY.KEYID = 7
1,211,075 UART: [ldev] FE.KEYID = 1
1,216,007 UART: [ldev] Erasing FE.KEYID = 1
1,242,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,631 UART: [ldev] --
1,282,042 UART: [fwproc] Wait for Commands...
1,282,750 UART: [fwproc] Recv command 0x46574c44
1,283,478 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,682 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,852 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,129 >>> mbox cmd response: success
2,827,171 UART: [afmc] ++
2,827,339 UART: [afmc] CDI.KEYID = 6
2,827,701 UART: [afmc] SUBJECT.KEYID = 7
2,828,126 UART: [afmc] AUTHORITY.KEYID = 5
2,863,955 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,980 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,689 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,572 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,273 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,079 UART: [afmc] --
2,907,211 UART: [cold-reset] --
2,908,265 UART: [state] Locking Datavault
2,909,356 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,960 UART: [state] Locking ICCM
2,910,608 UART: [exit] Launching FMC @ 0x40000130
2,915,938 UART:
2,915,954 UART: Running Caliptra FMC ...
2,916,362 UART:
2,916,416 UART: [state] CFI Enabled
2,926,484 UART: [fht] FMC Alias Private Key: 7
3,045,256 UART: [art] Extend RT PCRs Done
3,045,684 UART: [art] Lock RT PCRs Done
3,047,228 UART: [art] Populate DV Done
3,055,603 UART: [fht] FMC Alias Private Key: 7
3,056,593 UART: [art] Derive CDI
3,056,873 UART: [art] Store in slot 0x4
3,142,658 UART: [art] Derive Key Pair
3,143,018 UART: [art] Store priv key in slot 0x5
3,155,710 UART: [art] Derive Key Pair - Done
3,170,526 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,603 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,368 UART: [art] PUB.X = 416AF06D2B5517C17DBB367451D9A2DFF23476D68458811F43ACF3BD29370A5D2747215D60E33704433F2F5EA216F861
3,193,128 UART: [art] PUB.Y = 75CD42C506AE0EBEEDF22852738F2FE60CCE6C2B5DDF86F9FC436B72B59D10D9925C895667CE324BEC6CF2ACE2722DC8
3,200,091 UART: [art] SIG.R = D62177986B461F4146B7AC9668DB5D8BD9454719D7E31CE4820976FF7CCCC7A9B8935D2CB1042AAA70BB3CF6A4A7531E
3,206,865 UART: [art] SIG.S = 59CE335970E6BC87E04131FE2BEBE45DEA68430F03BC18D387D17DFA78E1FB65EECF1E71F0A2705C2FB8F6D48ABE48FE
3,230,319 UART: Caliptra RT
3,230,570 UART: [state] CFI Enabled
3,349,197 UART: [rt] RT listening for mailbox commands...
3,349,867 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,277 UART: [rt]cmd =0x44504543, len=92
3,387,400 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,152 >>> mbox cmd response: success
2,739,941 UART:
2,739,957 UART: Running Caliptra FMC ...
2,740,365 UART:
2,740,419 UART: [state] CFI Enabled
2,751,145 UART: [fht] FMC Alias Private Key: 7
2,870,573 UART: [art] Extend RT PCRs Done
2,871,001 UART: [art] Lock RT PCRs Done
2,872,503 UART: [art] Populate DV Done
2,880,564 UART: [fht] FMC Alias Private Key: 7
2,881,680 UART: [art] Derive CDI
2,881,960 UART: [art] Store in slot 0x4
2,967,801 UART: [art] Derive Key Pair
2,968,161 UART: [art] Store priv key in slot 0x5
2,981,007 UART: [art] Derive Key Pair - Done
2,995,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,678 UART: [art] PUB.X = 8CB7C224DAF8054D84106D623BBE218CF99732B64148E8CD9A3EDED73C7BD8BAB68C5C872F1F23233984341A726473B9
3,018,451 UART: [art] PUB.Y = D9B7CCBE62EC4AA4A396EC0F469C9B26141EC178381AB7166FFA7A130ED848E7D645BF57E84F3758DD01864FEBA51F23
3,025,408 UART: [art] SIG.R = 601B4921E384427CE8E4F0FAA2558609FA2649299160BC718627400A7B00387B0B7DEB6CB194A5BB12C349E9AED5FEFB
3,032,153 UART: [art] SIG.S = 0BE5C05CD8607AB4F42F2A44CCA3EA95EF157119E6D35D973913B9213F44BD18DDD1C5C149E38A5276DC395F77F70AE9
3,055,755 UART: Caliptra RT
3,056,006 UART: [state] CFI Enabled
3,175,238 UART: [rt] RT listening for mailbox commands...
3,175,908 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,398 UART: [rt]cmd =0x44504543, len=92
3,213,609 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
893,749 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,874 UART: [kat] ++
898,026 UART: [kat] sha1
902,162 UART: [kat] SHA2-256
904,102 UART: [kat] SHA2-384
906,875 UART: [kat] SHA2-512-ACC
908,776 UART: [kat] ECC-384
918,279 UART: [kat] HMAC-384Kdf
922,779 UART: [kat] LMS
1,171,107 UART: [kat] --
1,171,992 UART: [cold-reset] ++
1,172,318 UART: [fht] FHT @ 0x50003400
1,174,895 UART: [idev] ++
1,175,063 UART: [idev] CDI.KEYID = 6
1,175,423 UART: [idev] SUBJECT.KEYID = 7
1,175,847 UART: [idev] UDS.KEYID = 0
1,183,845 UART: [idev] Erasing UDS.KEYID = 0
1,201,316 UART: [idev] Sha1 KeyId Algorithm
1,209,838 UART: [idev] --
1,210,934 UART: [ldev] ++
1,211,102 UART: [ldev] CDI.KEYID = 6
1,211,465 UART: [ldev] SUBJECT.KEYID = 5
1,211,891 UART: [ldev] AUTHORITY.KEYID = 7
1,212,354 UART: [ldev] FE.KEYID = 1
1,217,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,610 UART: [ldev] --
1,284,021 UART: [fwproc] Wait for Commands...
1,284,691 UART: [fwproc] Recv command 0x46574c44
1,285,419 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,281 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,451 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,608 >>> mbox cmd response: success
2,829,648 UART: [afmc] ++
2,829,816 UART: [afmc] CDI.KEYID = 6
2,830,178 UART: [afmc] SUBJECT.KEYID = 7
2,830,603 UART: [afmc] AUTHORITY.KEYID = 5
2,866,694 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,553 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,262 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,145 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,846 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,588 UART: [afmc] --
2,909,696 UART: [cold-reset] --
2,910,634 UART: [state] Locking Datavault
2,911,757 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,361 UART: [state] Locking ICCM
2,912,935 UART: [exit] Launching FMC @ 0x40000130
2,918,265 UART:
2,918,281 UART: Running Caliptra FMC ...
2,918,689 UART:
2,918,832 UART: [state] CFI Enabled
2,929,380 UART: [fht] FMC Alias Private Key: 7
3,049,090 UART: [art] Extend RT PCRs Done
3,049,518 UART: [art] Lock RT PCRs Done
3,051,096 UART: [art] Populate DV Done
3,059,125 UART: [fht] FMC Alias Private Key: 7
3,060,307 UART: [art] Derive CDI
3,060,587 UART: [art] Store in slot 0x4
3,146,162 UART: [art] Derive Key Pair
3,146,522 UART: [art] Store priv key in slot 0x5
3,160,116 UART: [art] Derive Key Pair - Done
3,174,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,380 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,145 UART: [art] PUB.X = E61FBA60F01C3F9C95A5077D09922E431408D75A1A8663A510C473EF50EBAB353502E8AFB8DC4106F9D603C6E08EDE65
3,197,905 UART: [art] PUB.Y = D7124CE186CFE1C2B09CD05DEDD819FAE815DD57F637A64E55DA2B02A8652919FCB1C4F61E1397BC1BDBBB45EF8CFAD9
3,204,880 UART: [art] SIG.R = 30AF3C0386E7A66BFFD3B5B9091B5AEE8615F953DA29015EB735CF73DC2498C2344C2DA4CC99DBEB501F6AEF00F86C2D
3,211,639 UART: [art] SIG.S = 5CBCA30F6BCC5D558E27903A3E1583FA75ED759063AFCADF50F591375D7FA27260EB5366916859A72E58106BC3A4CA23
3,235,180 UART: Caliptra RT
3,235,523 UART: [state] CFI Enabled
3,355,907 UART: [rt] RT listening for mailbox commands...
3,356,577 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,957 UART: [rt]cmd =0x44504543, len=92
3,394,150 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,599 >>> mbox cmd response: success
2,741,720 UART:
2,741,736 UART: Running Caliptra FMC ...
2,742,144 UART:
2,742,287 UART: [state] CFI Enabled
2,752,507 UART: [fht] FMC Alias Private Key: 7
2,871,529 UART: [art] Extend RT PCRs Done
2,871,957 UART: [art] Lock RT PCRs Done
2,873,335 UART: [art] Populate DV Done
2,881,812 UART: [fht] FMC Alias Private Key: 7
2,882,832 UART: [art] Derive CDI
2,883,112 UART: [art] Store in slot 0x4
2,968,575 UART: [art] Derive Key Pair
2,968,935 UART: [art] Store priv key in slot 0x5
2,982,531 UART: [art] Derive Key Pair - Done
2,997,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,540 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,305 UART: [art] PUB.X = 006B1296DD637F986B9ECDC55EE0FD37CA87B1D68F11BC09B40E23EC1B5589B9573428A177E9416F0086323C9A154A19
3,020,027 UART: [art] PUB.Y = 10C84D2CBD7DB58336CFCD49F33936FC2CCD88072FAECA67D0E362B95C69E4BEC1BD2C39EDA2CF2E458AAD77FB822E63
3,027,002 UART: [art] SIG.R = 9CFDF0566B0A77183B4944131E2A080E0C5A2285EDFB3F9B926E7E0C7BCDE3A915E34D8EE754DBB0D080DAA318B8F33E
3,033,775 UART: [art] SIG.S = 96CF4150654AE1668DC99692D422FEA02D5070F014A5ED00C6A59306201542E4246029751B8B3030FA24C7F236417809
3,057,471 UART: Caliptra RT
3,057,814 UART: [state] CFI Enabled
3,177,130 UART: [rt] RT listening for mailbox commands...
3,177,800 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,048 UART: [rt]cmd =0x44504543, len=92
3,215,289 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,011 UART:
192,375 UART: Running Caliptra ROM ...
193,575 UART:
193,735 UART: [state] CFI Enabled
263,130 UART: [state] LifecycleState = Unprovisioned
265,043 UART: [state] DebugLocked = No
267,718 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,090 UART: [kat] SHA2-256
442,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,304 UART: [kat] ++
453,811 UART: [kat] sha1
465,987 UART: [kat] SHA2-256
468,653 UART: [kat] SHA2-384
473,792 UART: [kat] SHA2-512-ACC
476,161 UART: [kat] ECC-384
2,768,399 UART: [kat] HMAC-384Kdf
2,799,817 UART: [kat] LMS
3,990,113 UART: [kat] --
3,993,632 UART: [cold-reset] ++
3,994,929 UART: [fht] Storing FHT @ 0x50003400
4,005,486 UART: [idev] ++
4,006,065 UART: [idev] CDI.KEYID = 6
4,006,959 UART: [idev] SUBJECT.KEYID = 7
4,008,211 UART: [idev] UDS.KEYID = 0
4,009,173 ready_for_fw is high
4,009,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,158,443 UART: [idev] Erasing UDS.KEYID = 0
7,347,699 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,848 UART: [idev] --
7,373,609 UART: [ldev] ++
7,374,235 UART: [ldev] CDI.KEYID = 6
7,375,313 UART: [ldev] SUBJECT.KEYID = 5
7,376,496 UART: [ldev] AUTHORITY.KEYID = 7
7,377,640 UART: [ldev] FE.KEYID = 1
7,421,982 UART: [ldev] Erasing FE.KEYID = 1
10,749,968 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,459 UART: [ldev] --
13,113,756 UART: [fwproc] Waiting for Commands...
13,117,057 UART: [fwproc] Received command 0x46574c44
13,119,304 UART: [fwproc] Received Image of size 118548 bytes
17,227,772 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,588 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,767 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,662 >>> mbox cmd response: success
17,697,825 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,700,315 UART: [afmc] ++
17,700,912 UART: [afmc] CDI.KEYID = 6
17,701,858 UART: [afmc] SUBJECT.KEYID = 7
17,703,070 UART: [afmc] AUTHORITY.KEYID = 5
21,066,819 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,367,572 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,369,830 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,384,297 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,005 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,413,397 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,433,957 UART: [afmc] --
23,438,142 UART: [cold-reset] --
23,440,270 UART: [state] Locking Datavault
23,445,356 UART: [state] Locking PCR0, PCR1 and PCR31
23,447,120 UART: [state] Locking ICCM
23,449,052 UART: [exit] Launching FMC @ 0x40000130
23,457,457 UART:
23,457,733 UART: Running Caliptra FMC ...
23,458,841 UART:
23,458,998 UART: [state] CFI Enabled
23,527,003 UART: [fht] FMC Alias Private Key: 7
25,887,483 UART: [art] Extend RT PCRs Done
25,888,713 UART: [art] Lock RT PCRs Done
25,890,307 UART: [art] Populate DV Done
25,895,823 UART: [fht] FMC Alias Private Key: 7
25,897,546 UART: [art] Derive CDI
25,898,357 UART: [art] Store in slot 0x4
25,955,837 UART: [art] Derive Key Pair
25,956,870 UART: [art] Store priv key in slot 0x5
29,249,996 UART: [art] Derive Key Pair - Done
29,263,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,716 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,228 UART: [art] PUB.X = B1020B8C15591A7FA3988493CEB3ABC01939C032E8E7BB8F37B1DD59EB1CC5B95A25DF25E743C418F33F1988F37BD85D
31,559,500 UART: [art] PUB.Y = 37E56DEC6BD2BB20D9096D07F9BA9B3BD81B097EA4DB51C6FCF787124216F4AB7AF008C4A50A4C4D07C3126376AB411B
31,566,806 UART: [art] SIG.R = 52417B735D98A64CECE9BDBC9EE376CF3C9F8B69582CB3321ADAD0195027147B1A9F50CFC6EF08F9CEE4B1D92CF06081
31,574,222 UART: [art] SIG.S = 2E7F1AA4D487C67849D96CAB6D11EA45C544EF1B59B1538504FA6B2C9A343CB899E23C46E5DA9BE6BB506B1D5A7504F1
32,879,559 UART: Caliptra RT
32,880,271 UART: [state] CFI Enabled
33,056,765 UART: [rt] RT listening for mailbox commands...
33,088,898 UART: [rt]cmd =0x50435245, len=56
33,090,550 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,783,594 ready_for_fw is high
3,784,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,965,254 >>> mbox cmd response: success
17,966,759 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,649,304 UART:
23,649,719 UART: Running Caliptra FMC ...
23,650,893 UART:
23,651,059 UART: [state] CFI Enabled
23,718,076 UART: [fht] FMC Alias Private Key: 7
26,058,861 UART: [art] Extend RT PCRs Done
26,060,115 UART: [art] Lock RT PCRs Done
26,061,369 UART: [art] Populate DV Done
26,066,850 UART: [fht] FMC Alias Private Key: 7
26,068,450 UART: [art] Derive CDI
26,069,270 UART: [art] Store in slot 0x4
26,126,620 UART: [art] Derive Key Pair
26,127,670 UART: [art] Store priv key in slot 0x5
29,420,950 UART: [art] Derive Key Pair - Done
29,433,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,013 UART: [art] Erasing AUTHORITY.KEYID = 7
31,723,529 UART: [art] PUB.X = 345CFA8B1BB09FFE6A795290678736EF72A5FAC189AA94E1D8D5148873C039FE18CAC2E1CC4B8B7BFF356A5A49F1962C
31,730,793 UART: [art] PUB.Y = 7F17501243732F3C5871FB6702A2B768BE326B621A9273728092499B0A4E9571E6EBA0B8783250F8F2C26C9AE24233D5
31,738,037 UART: [art] SIG.R = B37F6293FAAC50F033848CEC45D031DD4F6AD566722A1A754B1E7438F3E9CD5FE6BC3886FDCED9921211F7B28911BDEE
31,745,441 UART: [art] SIG.S = 0E7A03EB52D7D099EB8E91EF3842AE3792CD216037524E95B5BCAD84FD1EDC0C61482E7206AE9DD90C94D35C21BA85C3
33,050,539 UART: Caliptra RT
33,051,251 UART: [state] CFI Enabled
33,226,609 UART: [rt] RT listening for mailbox commands...
33,258,316 UART: [rt]cmd =0x50435245, len=56
33,260,075 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,371 UART:
192,751 UART: Running Caliptra ROM ...
193,880 UART:
603,661 UART: [state] CFI Enabled
616,839 UART: [state] LifecycleState = Unprovisioned
618,781 UART: [state] DebugLocked = No
621,438 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,796 UART: [kat] SHA2-256
795,585 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,096 UART: [kat] ++
806,627 UART: [kat] sha1
817,741 UART: [kat] SHA2-256
820,498 UART: [kat] SHA2-384
827,550 UART: [kat] SHA2-512-ACC
829,918 UART: [kat] ECC-384
3,114,016 UART: [kat] HMAC-384Kdf
3,126,035 UART: [kat] LMS
4,316,178 UART: [kat] --
4,321,045 UART: [cold-reset] ++
4,323,328 UART: [fht] Storing FHT @ 0x50003400
4,333,480 UART: [idev] ++
4,334,077 UART: [idev] CDI.KEYID = 6
4,334,988 UART: [idev] SUBJECT.KEYID = 7
4,336,226 UART: [idev] UDS.KEYID = 0
4,337,200 ready_for_fw is high
4,337,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,107 UART: [idev] Erasing UDS.KEYID = 0
7,623,419 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,684 UART: [idev] --
7,649,166 UART: [ldev] ++
7,649,734 UART: [ldev] CDI.KEYID = 6
7,650,696 UART: [ldev] SUBJECT.KEYID = 5
7,651,900 UART: [ldev] AUTHORITY.KEYID = 7
7,653,181 UART: [ldev] FE.KEYID = 1
7,664,331 UART: [ldev] Erasing FE.KEYID = 1
10,955,714 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,282 UART: [ldev] --
13,315,481 UART: [fwproc] Waiting for Commands...
13,318,219 UART: [fwproc] Received command 0x46574c44
13,320,447 UART: [fwproc] Received Image of size 118548 bytes
17,427,136 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,106 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,280 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,108 >>> mbox cmd response: success
17,905,340 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,908,257 UART: [afmc] ++
17,908,869 UART: [afmc] CDI.KEYID = 6
17,909,746 UART: [afmc] SUBJECT.KEYID = 7
17,911,015 UART: [afmc] AUTHORITY.KEYID = 5
21,224,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,395 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,700 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,106 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,806 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,230 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,868 UART: [afmc] --
23,589,319 UART: [cold-reset] --
23,594,412 UART: [state] Locking Datavault
23,598,731 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,480 UART: [state] Locking ICCM
23,603,108 UART: [exit] Launching FMC @ 0x40000130
23,611,489 UART:
23,611,779 UART: Running Caliptra FMC ...
23,612,885 UART:
23,613,039 UART: [state] CFI Enabled
23,621,028 UART: [fht] FMC Alias Private Key: 7
25,961,922 UART: [art] Extend RT PCRs Done
25,963,139 UART: [art] Lock RT PCRs Done
25,965,084 UART: [art] Populate DV Done
25,970,488 UART: [fht] FMC Alias Private Key: 7
25,972,241 UART: [art] Derive CDI
25,973,047 UART: [art] Store in slot 0x4
26,015,637 UART: [art] Derive Key Pair
26,016,670 UART: [art] Store priv key in slot 0x5
29,258,965 UART: [art] Derive Key Pair - Done
29,271,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,835 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,340 UART: [art] PUB.X = 7F3D614BD4D750F0AF7ECB2F1900849BB99619D4758FA4CAF4180DD1307D330DFFECAD17A715AFDE63C20A6E178F210F
31,560,604 UART: [art] PUB.Y = 798218018BA3BD253D6F0234D56DD4F52375B1B8470F10429DBA87CE47DD7D94089971DCE8C0E6B4354D7D3E1CBCE7BF
31,567,838 UART: [art] SIG.R = 757AACC8F77CABA4DE9F782FF35EFA40FC3D60041D5AEB5F64455290BC92C5C27E9426978835D258F3DDF97BDB4DAD89
31,575,283 UART: [art] SIG.S = DC10DE7D79C5EA118A7954223AA9C1F9930FFEEFFD72FFE3FCB18AA4106F62AABBDF0FD6F245D7F86B936C427086F363
32,880,628 UART: Caliptra RT
32,881,343 UART: [state] CFI Enabled
33,014,730 UART: [rt] RT listening for mailbox commands...
33,046,686 UART: [rt]cmd =0x50435245, len=56
33,048,443 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
4,132,423 ready_for_fw is high
4,132,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,171,313 >>> mbox cmd response: success
18,172,575 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,813,011 UART:
23,813,408 UART: Running Caliptra FMC ...
23,814,507 UART:
23,814,656 UART: [state] CFI Enabled
23,822,618 UART: [fht] FMC Alias Private Key: 7
26,162,296 UART: [art] Extend RT PCRs Done
26,163,517 UART: [art] Lock RT PCRs Done
26,165,053 UART: [art] Populate DV Done
26,170,434 UART: [fht] FMC Alias Private Key: 7
26,171,914 UART: [art] Derive CDI
26,172,643 UART: [art] Store in slot 0x4
26,215,716 UART: [art] Derive Key Pair
26,216,919 UART: [art] Store priv key in slot 0x5
29,458,877 UART: [art] Derive Key Pair - Done
29,471,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,752,187 UART: [art] Erasing AUTHORITY.KEYID = 7
31,753,693 UART: [art] PUB.X = 7CCF015B095E4315A485E725EEDE93F5DD238AE12392B2438E5762DD8A3A9E3195CA8DA1C1F9A10A57C60CD09B5A0BD4
31,760,988 UART: [art] PUB.Y = FE99273A9670F7FC9DE19C2A2CB3A44C40DD9FC2A42EA94CCA0839830B045411DC8B8BA15B7FCDF991080C5944F79306
31,768,236 UART: [art] SIG.R = 17B086A3785C8750C57E364A1F7DED1291E7EDB56F9D49BC0C016D93046D90238EBBF0436BC34D2E6D43EF6CF529C260
31,775,628 UART: [art] SIG.S = 16529F93B05CE757ADA6D619877604474FECBF3B077A53F1A70F6E67DFCCFBFDAA55264EEA78F4EA191ADE1CE41DAFAF
33,080,145 UART: Caliptra RT
33,080,866 UART: [state] CFI Enabled
33,214,197 UART: [rt] RT listening for mailbox commands...
33,246,100 UART: [rt]cmd =0x50435245, len=56
33,247,816 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,095 UART:
192,481 UART: Running Caliptra ROM ...
193,627 UART:
193,771 UART: [state] CFI Enabled
261,585 UART: [state] LifecycleState = Unprovisioned
263,502 UART: [state] DebugLocked = No
265,820 UART: [state] WD Timer not started. Device not locked for debugging
269,706 UART: [kat] SHA2-256
449,347 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,159 UART: [kat] ++
460,635 UART: [kat] sha1
472,358 UART: [kat] SHA2-256
475,078 UART: [kat] SHA2-384
481,849 UART: [kat] SHA2-512-ACC
484,233 UART: [kat] ECC-384
2,949,025 UART: [kat] HMAC-384Kdf
2,970,061 UART: [kat] LMS
3,446,521 UART: [kat] --
3,452,227 UART: [cold-reset] ++
3,454,650 UART: [fht] FHT @ 0x50003400
3,466,332 UART: [idev] ++
3,466,898 UART: [idev] CDI.KEYID = 6
3,467,929 UART: [idev] SUBJECT.KEYID = 7
3,469,101 UART: [idev] UDS.KEYID = 0
3,470,145 ready_for_fw is high
3,470,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,471 UART: [idev] Erasing UDS.KEYID = 0
5,989,198 UART: [idev] Sha1 KeyId Algorithm
6,012,867 UART: [idev] --
6,018,746 UART: [ldev] ++
6,019,335 UART: [ldev] CDI.KEYID = 6
6,020,258 UART: [ldev] SUBJECT.KEYID = 5
6,021,470 UART: [ldev] AUTHORITY.KEYID = 7
6,022,713 UART: [ldev] FE.KEYID = 1
6,056,970 UART: [ldev] Erasing FE.KEYID = 1
8,565,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,082 UART: [ldev] --
10,372,048 UART: [fwproc] Wait for Commands...
10,374,805 UART: [fwproc] Recv command 0x46574c44
10,376,789 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,734 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,759 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,037 >>> mbox cmd response: success
14,344,113 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,347,277 UART: [afmc] ++
14,347,865 UART: [afmc] CDI.KEYID = 6
14,348,882 UART: [afmc] SUBJECT.KEYID = 7
14,349,982 UART: [afmc] AUTHORITY.KEYID = 5
16,895,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,807 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,595 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,640 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,224 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,221 UART: [afmc] --
18,715,469 UART: [cold-reset] --
18,718,785 UART: [state] Locking Datavault
18,723,834 UART: [state] Locking PCR0, PCR1 and PCR31
18,725,582 UART: [state] Locking ICCM
18,727,563 UART: [exit] Launching FMC @ 0x40000130
18,735,951 UART:
18,736,192 UART: Running Caliptra FMC ...
18,737,291 UART:
18,737,445 UART: [state] CFI Enabled
18,795,855 UART: [fht] FMC Alias Private Key: 7
20,583,058 UART: [art] Extend RT PCRs Done
20,584,280 UART: [art] Lock RT PCRs Done
20,585,768 UART: [art] Populate DV Done
20,591,071 UART: [fht] FMC Alias Private Key: 7
20,592,661 UART: [art] Derive CDI
20,593,479 UART: [art] Store in slot 0x4
20,648,708 UART: [art] Derive Key Pair
20,649,746 UART: [art] Store priv key in slot 0x5
23,112,886 UART: [art] Derive Key Pair - Done
23,125,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,838,166 UART: [art] Erasing AUTHORITY.KEYID = 7
24,839,665 UART: [art] PUB.X = 161423E3C6ED0B1597FDAE62B094ABD58AEA3FFF9C13839DB902D1818ADF5A060023911F8B68234224C6BB3DAD75F4E4
24,847,104 UART: [art] PUB.Y = 9E0F4BE88A0464AC6C946D10134873822697DBD25DEB781CC7417E7E31D26965E827A4BC90F6C20784552EBAB1FA7321
24,854,185 UART: [art] SIG.R = AF1FFBE9B3A24D2487020BC7620196ED8BD2AF638735E4CE3C742EA61FD08309AC11E038494E41C7F3661F1DC91AB4CB
24,861,577 UART: [art] SIG.S = 1BBE7F4CFC956B8D4DA77C68F1487A0BF37ADA9B83A981D097C658316A9D7E84426A7B6133E1B21964225D0337F53D1F
25,840,808 UART: Caliptra RT
25,841,524 UART: [state] CFI Enabled
26,019,386 UART: [rt] RT listening for mailbox commands...
26,050,974 UART: [rt]cmd =0x50435245, len=56
26,052,848 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,461,320 ready_for_fw is high
3,461,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,201,207 >>> mbox cmd response: success
14,202,328 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,491,520 UART:
18,491,910 UART: Running Caliptra FMC ...
18,493,058 UART:
18,493,240 UART: [state] CFI Enabled
18,560,547 UART: [fht] FMC Alias Private Key: 7
20,327,322 UART: [art] Extend RT PCRs Done
20,328,547 UART: [art] Lock RT PCRs Done
20,330,061 UART: [art] Populate DV Done
20,335,417 UART: [fht] FMC Alias Private Key: 7
20,337,106 UART: [art] Derive CDI
20,337,929 UART: [art] Store in slot 0x4
20,393,920 UART: [art] Derive Key Pair
20,394,921 UART: [art] Store priv key in slot 0x5
22,858,045 UART: [art] Derive Key Pair - Done
22,870,891 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,584,001 UART: [art] Erasing AUTHORITY.KEYID = 7
24,585,491 UART: [art] PUB.X = 8FF907E38E17967088FC6A8D9710B4266C783EB59CC1B22AC91D51467BA32AA5753C8B47B47158B6D9BE0018771CF220
24,592,748 UART: [art] PUB.Y = 14A809162C577A066ECB2F51EC5D17468E11E7EF5815C9A99B24B8A4923A677038A44F08EE5796A9DCDC00539573EAFC
24,599,942 UART: [art] SIG.R = 5F8DE8735EE6B4FA0ACA8B67A7BE188693771CFEEE0426CCAD9557FC3C8B3C666F452E617A20C4060D9275B6453E7BAD
24,607,408 UART: [art] SIG.S = 26DD11FA82F102B56F77C540FB18162233ABE042B41C8F1FFAA200989BF8B16E722406FF1DED6D3A5C74BEB90978B57C
25,586,417 UART: Caliptra RT
25,587,130 UART: [state] CFI Enabled
25,768,536 UART: [rt] RT listening for mailbox commands...
25,800,216 UART: [rt]cmd =0x50435245, len=56
25,801,841 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,524 UART:
192,889 UART: Running Caliptra ROM ...
194,029 UART:
603,498 UART: [state] CFI Enabled
617,562 UART: [state] LifecycleState = Unprovisioned
619,544 UART: [state] DebugLocked = No
621,649 UART: [state] WD Timer not started. Device not locked for debugging
624,848 UART: [kat] SHA2-256
804,450 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,279 UART: [kat] ++
815,815 UART: [kat] sha1
826,346 UART: [kat] SHA2-256
828,994 UART: [kat] SHA2-384
833,701 UART: [kat] SHA2-512-ACC
836,074 UART: [kat] ECC-384
3,281,397 UART: [kat] HMAC-384Kdf
3,293,488 UART: [kat] LMS
3,769,994 UART: [kat] --
3,775,340 UART: [cold-reset] ++
3,777,553 UART: [fht] FHT @ 0x50003400
3,788,745 UART: [idev] ++
3,789,308 UART: [idev] CDI.KEYID = 6
3,790,343 UART: [idev] SUBJECT.KEYID = 7
3,791,526 UART: [idev] UDS.KEYID = 0
3,792,453 ready_for_fw is high
3,792,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,506 UART: [idev] Erasing UDS.KEYID = 0
6,269,923 UART: [idev] Sha1 KeyId Algorithm
6,292,666 UART: [idev] --
6,297,562 UART: [ldev] ++
6,298,142 UART: [ldev] CDI.KEYID = 6
6,299,119 UART: [ldev] SUBJECT.KEYID = 5
6,300,279 UART: [ldev] AUTHORITY.KEYID = 7
6,301,567 UART: [ldev] FE.KEYID = 1
6,312,701 UART: [ldev] Erasing FE.KEYID = 1
8,785,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,292 UART: [ldev] --
10,581,252 UART: [fwproc] Wait for Commands...
10,583,567 UART: [fwproc] Recv command 0x46574c44
10,585,565 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,916 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,923 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,760 >>> mbox cmd response: success
14,555,925 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,558,183 UART: [afmc] ++
14,558,762 UART: [afmc] CDI.KEYID = 6
14,559,783 UART: [afmc] SUBJECT.KEYID = 7
14,560,938 UART: [afmc] AUTHORITY.KEYID = 5
17,062,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,607 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,420 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,518 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,044 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,694 UART: [afmc] --
18,864,351 UART: [cold-reset] --
18,868,858 UART: [state] Locking Datavault
18,872,705 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,404 UART: [state] Locking ICCM
18,875,525 UART: [exit] Launching FMC @ 0x40000130
18,883,973 UART:
18,884,209 UART: Running Caliptra FMC ...
18,885,315 UART:
18,885,481 UART: [state] CFI Enabled
18,894,014 UART: [fht] FMC Alias Private Key: 7
20,659,611 UART: [art] Extend RT PCRs Done
20,660,832 UART: [art] Lock RT PCRs Done
20,662,408 UART: [art] Populate DV Done
20,667,946 UART: [fht] FMC Alias Private Key: 7
20,669,645 UART: [art] Derive CDI
20,670,458 UART: [art] Store in slot 0x4
20,713,263 UART: [art] Derive Key Pair
20,714,338 UART: [art] Store priv key in slot 0x5
23,140,849 UART: [art] Derive Key Pair - Done
23,153,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,860,383 UART: [art] Erasing AUTHORITY.KEYID = 7
24,861,880 UART: [art] PUB.X = 67228AA77C9091A7B210CC27D29CA9BB05520EF4D67729CBC41973CFC2136B4605B54B2C50D3651E1ED8217B0D54EF29
24,869,188 UART: [art] PUB.Y = D97C4A3E486FE35BD72F57A3DD2748482A8BEFC61B2D2E8986CDAB78ED012140FF63425B7F1C446F6827AE98DE862A71
24,876,472 UART: [art] SIG.R = E6482BE27F0F901A7BE8AF4C422EED538D93DCB5B0E630CEBD319D7E5A3B30C95E53C5F67E2C9AB6582D296157906435
24,883,860 UART: [art] SIG.S = E34C0BEC5275A360528EC5D27503FD5841AE58098356F4F475902365935180E0A43C6BDA015917B05150EBD2C652629F
25,863,060 UART: Caliptra RT
25,863,771 UART: [state] CFI Enabled
25,997,490 UART: [rt] RT listening for mailbox commands...
26,029,449 UART: [rt]cmd =0x50435245, len=56
26,031,072 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
3,779,606 ready_for_fw is high
3,780,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,350 >>> mbox cmd response: success
14,437,567 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,682,899 UART:
18,683,271 UART: Running Caliptra FMC ...
18,684,477 UART:
18,684,651 UART: [state] CFI Enabled
18,692,594 UART: [fht] FMC Alias Private Key: 7
20,458,413 UART: [art] Extend RT PCRs Done
20,459,640 UART: [art] Lock RT PCRs Done
20,461,111 UART: [art] Populate DV Done
20,466,744 UART: [fht] FMC Alias Private Key: 7
20,468,472 UART: [art] Derive CDI
20,469,295 UART: [art] Store in slot 0x4
20,512,562 UART: [art] Derive Key Pair
20,513,603 UART: [art] Store priv key in slot 0x5
22,941,118 UART: [art] Derive Key Pair - Done
22,954,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,660,045 UART: [art] Erasing AUTHORITY.KEYID = 7
24,661,548 UART: [art] PUB.X = 4F40F6632B68C48C62E9FC89B259CC20C2125F80D8EEED7B30D8F7EE8EACFE06EC619B0B5F8B86B9221D77F0305E015B
24,668,802 UART: [art] PUB.Y = B41C129ED117B6353EDBB13646EF8BB04BEC1573A046F43EF3EF5310A0E27A465725C8F7CF542B3003BEDD9232977222
24,676,064 UART: [art] SIG.R = E9DC76E1113C193617EBDB21C0474E4B2005F672262C4F47806A8BE4586A6A65099B7EE5875E0197FC19E38CE3D77524
24,683,420 UART: [art] SIG.S = 4631EA1F14652027187FFA9974593BCA8F54C819DCC7245E994E8612F6F631B28BFBD729E3051BE29D5B511DE172AB4B
25,662,974 UART: Caliptra RT
25,663,668 UART: [state] CFI Enabled
25,796,719 UART: [rt] RT listening for mailbox commands...
25,828,589 UART: [rt]cmd =0x50435245, len=56
25,830,296 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,079 UART:
192,447 UART: Running Caliptra ROM ...
193,559 UART:
193,704 UART: [state] CFI Enabled
260,516 UART: [state] LifecycleState = Unprovisioned
262,874 UART: [state] DebugLocked = No
264,400 UART: [state] WD Timer not started. Device not locked for debugging
268,777 UART: [kat] SHA2-256
458,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,403 UART: [kat] ++
469,881 UART: [kat] sha1
481,838 UART: [kat] SHA2-256
484,852 UART: [kat] SHA2-384
491,191 UART: [kat] SHA2-512-ACC
493,838 UART: [kat] ECC-384
2,948,798 UART: [kat] HMAC-384Kdf
2,971,500 UART: [kat] LMS
3,503,262 UART: [kat] --
3,510,105 UART: [cold-reset] ++
3,512,251 UART: [fht] FHT @ 0x50003400
3,524,367 UART: [idev] ++
3,525,078 UART: [idev] CDI.KEYID = 6
3,526,062 UART: [idev] SUBJECT.KEYID = 7
3,527,233 UART: [idev] UDS.KEYID = 0
3,528,152 ready_for_fw is high
3,528,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,394 UART: [idev] Erasing UDS.KEYID = 0
6,050,859 UART: [idev] Sha1 KeyId Algorithm
6,073,919 UART: [idev] --
6,080,021 UART: [ldev] ++
6,080,710 UART: [ldev] CDI.KEYID = 6
6,081,628 UART: [ldev] SUBJECT.KEYID = 5
6,082,787 UART: [ldev] AUTHORITY.KEYID = 7
6,084,020 UART: [ldev] FE.KEYID = 1
6,123,298 UART: [ldev] Erasing FE.KEYID = 1
8,624,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,327 UART: [ldev] --
10,436,435 UART: [fwproc] Wait for Commands...
10,439,505 UART: [fwproc] Recv command 0x46574c44
10,441,838 UART: [fwproc] Recv'd Img size: 118548 bytes
13,943,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,025,615 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,149,251 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,708,797 >>> mbox cmd response: success
14,709,950 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,713,361 UART: [afmc] ++
14,714,099 UART: [afmc] CDI.KEYID = 6
14,715,280 UART: [afmc] SUBJECT.KEYID = 7
14,716,766 UART: [afmc] AUTHORITY.KEYID = 5
17,255,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,982,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,984,818 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,999,951 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,015,055 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,029,938 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,053,956 UART: [afmc] --
19,057,820 UART: [cold-reset] --
19,062,982 UART: [state] Locking Datavault
19,068,497 UART: [state] Locking PCR0, PCR1 and PCR31
19,070,694 UART: [state] Locking ICCM
19,072,855 UART: [exit] Launching FMC @ 0x40000130
19,081,523 UART:
19,081,767 UART: Running Caliptra FMC ...
19,082,867 UART:
19,083,027 UART: [state] CFI Enabled
19,140,058 UART: [fht] FMC Alias Private Key: 7
20,906,544 UART: [art] Extend RT PCRs Done
20,907,984 UART: [art] Lock RT PCRs Done
20,909,585 UART: [art] Populate DV Done
20,915,088 UART: [fht] FMC Alias Private Key: 7
20,916,692 UART: [art] Derive CDI
20,917,465 UART: [art] Store in slot 0x4
20,959,845 UART: [art] Derive Key Pair
20,960,845 UART: [art] Store priv key in slot 0x5
23,423,775 UART: [art] Derive Key Pair - Done
23,436,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,149,075 UART: [art] Erasing AUTHORITY.KEYID = 7
25,150,583 UART: [art] PUB.X = 6434588D0478FB5E5A92AEA732D0271528A9B7D29FA33C869A5CFCAD7D898CE8394F837FBD66C6381A8C58FE811A0A10
25,157,865 UART: [art] PUB.Y = 195386F0EE7C8838AAD3CCD61D8D0FF5AB42875F408D7607DE598E7767F49D064E425F24D4657372AFE577FE1E8697EE
25,165,117 UART: [art] SIG.R = 15D9EBB0F7C5C85469B674408F1230AC7D34B6F3A7B8A7ECFAB061ADCB3C218067DB5CA6990E769FFFADD2E4B0AE14A6
25,172,533 UART: [art] SIG.S = E60D4B3D5DAD93346B638277167EFB1B42352A656997676CED5CB536DBA36EA7F5BF7893E8E7F1DB1BFD419AFD7B8D8E
26,152,071 UART: Caliptra RT
26,152,801 UART: [state] CFI Enabled
26,332,044 UART: [rt] RT listening for mailbox commands...
26,363,833 UART: [rt]cmd =0x50435245, len=56
26,365,686 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,734 writing to cptra_bootfsm_go
3,440,216 ready_for_fw is high
3,440,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,808,303 >>> mbox cmd response: success
14,809,648 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,093,220 UART:
19,093,639 UART: Running Caliptra FMC ...
19,094,791 UART:
19,094,952 UART: [state] CFI Enabled
19,158,220 UART: [fht] FMC Alias Private Key: 7
20,924,779 UART: [art] Extend RT PCRs Done
20,926,011 UART: [art] Lock RT PCRs Done
20,927,430 UART: [art] Populate DV Done
20,932,795 UART: [fht] FMC Alias Private Key: 7
20,934,494 UART: [art] Derive CDI
20,935,308 UART: [art] Store in slot 0x4
20,991,032 UART: [art] Derive Key Pair
20,992,084 UART: [art] Store priv key in slot 0x5
23,454,900 UART: [art] Derive Key Pair - Done
23,467,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,180,403 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,911 UART: [art] PUB.X = 4757C49B30540F270D31C771DF7FAD35D3C0D7F76C2E2AA35FAC55DCD1B25C84472CA1D81B70B79C43B4D5F3E400BD63
25,189,173 UART: [art] PUB.Y = B95B32ACFF0C90B445D4F190E7AF0F14EEDD147CB43174781A2F81F5B73668A581072F12D100EFDC5091E1DF6E171C1E
25,196,423 UART: [art] SIG.R = CA302AC34446731448920D163D7C88A233AC682E8786EB06E257D8C1CAF48D78863A1DFAA3D49930C3FDC03A7C72CB1A
25,203,885 UART: [art] SIG.S = EE1230C28B6C07B724D774F199A9EAFA8F1C71DE91EB7BA17EE1FF8014461E3BC95EF4D7DC024F69B65A520E4778BA65
26,182,535 UART: Caliptra RT
26,183,228 UART: [state] CFI Enabled
26,364,302 UART: [rt] RT listening for mailbox commands...
26,396,253 UART: [rt]cmd =0x50435245, len=56
26,397,843 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,467 UART:
192,836 UART: Running Caliptra ROM ...
193,981 UART:
603,793 UART: [state] CFI Enabled
622,230 UART: [state] LifecycleState = Unprovisioned
624,617 UART: [state] DebugLocked = No
626,312 UART: [state] WD Timer not started. Device not locked for debugging
630,016 UART: [kat] SHA2-256
819,709 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,510 UART: [kat] ++
831,037 UART: [kat] sha1
842,269 UART: [kat] SHA2-256
845,269 UART: [kat] SHA2-384
851,061 UART: [kat] SHA2-512-ACC
853,651 UART: [kat] ECC-384
3,294,959 UART: [kat] HMAC-384Kdf
3,306,779 UART: [kat] LMS
3,838,570 UART: [kat] --
3,841,665 UART: [cold-reset] ++
3,843,178 UART: [fht] FHT @ 0x50003400
3,855,088 UART: [idev] ++
3,855,801 UART: [idev] CDI.KEYID = 6
3,856,780 UART: [idev] SUBJECT.KEYID = 7
3,857,966 UART: [idev] UDS.KEYID = 0
3,858,873 ready_for_fw is high
3,859,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,969 UART: [idev] Erasing UDS.KEYID = 0
6,332,662 UART: [idev] Sha1 KeyId Algorithm
6,355,331 UART: [idev] --
6,360,617 UART: [ldev] ++
6,361,301 UART: [ldev] CDI.KEYID = 6
6,362,232 UART: [ldev] SUBJECT.KEYID = 5
6,363,495 UART: [ldev] AUTHORITY.KEYID = 7
6,364,692 UART: [ldev] FE.KEYID = 1
6,377,668 UART: [ldev] Erasing FE.KEYID = 1
8,858,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,296 UART: [ldev] --
10,655,535 UART: [fwproc] Wait for Commands...
10,657,524 UART: [fwproc] Recv command 0x46574c44
10,659,833 UART: [fwproc] Recv'd Img size: 118548 bytes
14,157,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,240,016 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,363,584 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,924,649 >>> mbox cmd response: success
14,925,843 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,927,954 UART: [afmc] ++
14,928,717 UART: [afmc] CDI.KEYID = 6
14,929,906 UART: [afmc] SUBJECT.KEYID = 7
14,931,352 UART: [afmc] AUTHORITY.KEYID = 5
17,438,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,162,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,164,106 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,179,211 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,194,356 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,209,275 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,233,568 UART: [afmc] --
19,236,575 UART: [cold-reset] --
19,241,843 UART: [state] Locking Datavault
19,247,514 UART: [state] Locking PCR0, PCR1 and PCR31
19,249,729 UART: [state] Locking ICCM
19,251,131 UART: [exit] Launching FMC @ 0x40000130
19,259,807 UART:
19,260,042 UART: Running Caliptra FMC ...
19,261,149 UART:
19,261,307 UART: [state] CFI Enabled
19,269,332 UART: [fht] FMC Alias Private Key: 7
21,035,638 UART: [art] Extend RT PCRs Done
21,036,861 UART: [art] Lock RT PCRs Done
21,038,416 UART: [art] Populate DV Done
21,043,619 UART: [fht] FMC Alias Private Key: 7
21,045,222 UART: [art] Derive CDI
21,046,044 UART: [art] Store in slot 0x4
21,088,806 UART: [art] Derive Key Pair
21,089,840 UART: [art] Store priv key in slot 0x5
23,516,723 UART: [art] Derive Key Pair - Done
23,529,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,236,444 UART: [art] Erasing AUTHORITY.KEYID = 7
25,237,952 UART: [art] PUB.X = AE9ABFA8807B063E49E9C6468DC646D4EA648FD442E059B91570AFA16E997EEF47A1019A70B6191F946026F0C4626E1B
25,245,238 UART: [art] PUB.Y = 61C3995C19A0DB3805E8F8D829B0D0D9C070E81D63CF3D726D3682870DFA3FF8FC60369D51A153AC88C29142969F5EA2
25,252,459 UART: [art] SIG.R = E4884D30261A495323E409DE47FF0A171FA682A94899B652A09066A7F8BAAA07E9CC74C6898313972C5C692705289768
25,259,829 UART: [art] SIG.S = 1FC2EC84DEAB4B1B382890E7B265A30859F834A2D3A1BB9BDF0454EE6D9A74B58F2C86D67F6FB66A3A78823481F80764
26,238,129 UART: Caliptra RT
26,238,839 UART: [state] CFI Enabled
26,372,113 UART: [rt] RT listening for mailbox commands...
26,403,905 UART: [rt]cmd =0x50435245, len=56
26,405,714 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,752,098 ready_for_fw is high
3,752,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,033,002 >>> mbox cmd response: success
15,034,380 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,282,199 UART:
19,282,591 UART: Running Caliptra FMC ...
19,283,795 UART:
19,283,966 UART: [state] CFI Enabled
19,291,709 UART: [fht] FMC Alias Private Key: 7
21,056,822 UART: [art] Extend RT PCRs Done
21,058,031 UART: [art] Lock RT PCRs Done
21,060,011 UART: [art] Populate DV Done
21,065,448 UART: [fht] FMC Alias Private Key: 7
21,067,062 UART: [art] Derive CDI
21,067,818 UART: [art] Store in slot 0x4
21,110,259 UART: [art] Derive Key Pair
21,111,260 UART: [art] Store priv key in slot 0x5
23,537,623 UART: [art] Derive Key Pair - Done
23,550,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,256,696 UART: [art] Erasing AUTHORITY.KEYID = 7
25,258,188 UART: [art] PUB.X = BFC6E869C14E2B2460FD0C87524D3565D8F603F974ACB4B37E94801DC23DB83716D6CFFE31B76579045D9300E3C44D16
25,265,492 UART: [art] PUB.Y = C220B012C4ACE608583A1C6D335B61675DB490EF876F1B6858468E6D4116A189F41227A0F1598DF421941A925F5390C5
25,272,691 UART: [art] SIG.R = E84DAFD5DA109754F9B473DC575C05C664F847A73A6708C480B994A6216EDFE0AB6CFC578F0E999636D65C515B08EE1F
25,280,100 UART: [art] SIG.S = 9EB8FBADA7C949BA6E4D0869C868A91780B76E67E3DFFB023ED29C865F2F26604B851A211560C7ECF54EE6094C06BFD9
26,259,657 UART: Caliptra RT
26,260,368 UART: [state] CFI Enabled
26,393,757 UART: [rt] RT listening for mailbox commands...
26,425,574 UART: [rt]cmd =0x50435245, len=56
26,427,460 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
86,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,613 UART: [kat] SHA2-256
881,544 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,659 UART: [kat] ++
885,811 UART: [kat] sha1
889,995 UART: [kat] SHA2-256
891,933 UART: [kat] SHA2-384
894,716 UART: [kat] SHA2-512-ACC
896,617 UART: [kat] ECC-384
902,214 UART: [kat] HMAC-384Kdf
906,790 UART: [kat] LMS
1,474,986 UART: [kat] --
1,475,541 UART: [cold-reset] ++
1,475,873 UART: [fht] Storing FHT @ 0x50003400
1,478,544 UART: [idev] ++
1,478,712 UART: [idev] CDI.KEYID = 6
1,479,072 UART: [idev] SUBJECT.KEYID = 7
1,479,496 UART: [idev] UDS.KEYID = 0
1,479,841 ready_for_fw is high
1,479,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,564 UART: [idev] Erasing UDS.KEYID = 0
1,503,730 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,406 UART: [idev] --
1,513,483 UART: [ldev] ++
1,513,651 UART: [ldev] CDI.KEYID = 6
1,514,014 UART: [ldev] SUBJECT.KEYID = 5
1,514,440 UART: [ldev] AUTHORITY.KEYID = 7
1,514,903 UART: [ldev] FE.KEYID = 1
1,520,349 UART: [ldev] Erasing FE.KEYID = 1
1,545,664 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,550 UART: [ldev] --
1,584,867 UART: [fwproc] Waiting for Commands...
1,585,526 UART: [fwproc] Received command 0x46574c44
1,586,317 UART: [fwproc] Received Image of size 118548 bytes
2,931,321 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,779 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,997 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,226 >>> mbox cmd response: success
3,129,226 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,130,356 UART: [afmc] ++
3,130,524 UART: [afmc] CDI.KEYID = 6
3,130,886 UART: [afmc] SUBJECT.KEYID = 7
3,131,311 UART: [afmc] AUTHORITY.KEYID = 5
3,166,160 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,600 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,380 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,089 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,972 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,655 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,495 UART: [afmc] --
3,209,453 UART: [cold-reset] --
3,210,491 UART: [state] Locking Datavault
3,211,522 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,126 UART: [state] Locking ICCM
3,212,604 UART: [exit] Launching FMC @ 0x40000130
3,217,934 UART:
3,217,950 UART: Running Caliptra FMC ...
3,218,358 UART:
3,218,412 UART: [state] CFI Enabled
3,228,560 UART: [fht] FMC Alias Private Key: 7
3,347,088 UART: [art] Extend RT PCRs Done
3,347,516 UART: [art] Lock RT PCRs Done
3,349,128 UART: [art] Populate DV Done
3,357,473 UART: [fht] FMC Alias Private Key: 7
3,358,413 UART: [art] Derive CDI
3,358,693 UART: [art] Store in slot 0x4
3,444,375 UART: [art] Derive Key Pair
3,444,735 UART: [art] Store priv key in slot 0x5
3,457,734 UART: [art] Derive Key Pair - Done
3,472,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,487,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,388 UART: [art] PUB.X = E60C1B69C60989C9D1C39DAD98A91A587FAA5FEFD5FFD1DC5EDB66E6C30B55E7163938CED9514D76AE2B81331CEA4D98
3,495,171 UART: [art] PUB.Y = 512CF147A36FC0BFA6BD25AC4461322224EC413ED235465D81C175E1806B5D57148BF4023CC6CC9329F402966F0B3F25
3,502,112 UART: [art] SIG.R = EAC014B45375E69764A44363144285986BEE9827B2098EAEE43BD694D691E87066607A6605C62A46360E24849FA33993
3,508,859 UART: [art] SIG.S = BE442B2D15A95BDBA040A40F43A4A79B2533061E13DA7784FDB069D9C3AA6E744612E5E0BC988374C01C32429A90F261
3,533,109 UART: Caliptra RT
3,533,360 UART: [state] CFI Enabled
3,652,749 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,683,599 UART: [rt]cmd =0x50435245, len=56
3,685,023 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,671 ready_for_fw is high
1,362,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,942 >>> mbox cmd response: success
2,979,942 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,041,151 UART:
3,041,167 UART: Running Caliptra FMC ...
3,041,575 UART:
3,041,629 UART: [state] CFI Enabled
3,052,305 UART: [fht] FMC Alias Private Key: 7
3,171,661 UART: [art] Extend RT PCRs Done
3,172,089 UART: [art] Lock RT PCRs Done
3,173,657 UART: [art] Populate DV Done
3,182,022 UART: [fht] FMC Alias Private Key: 7
3,183,014 UART: [art] Derive CDI
3,183,294 UART: [art] Store in slot 0x4
3,269,174 UART: [art] Derive Key Pair
3,269,534 UART: [art] Store priv key in slot 0x5
3,283,225 UART: [art] Derive Key Pair - Done
3,298,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,696 UART: [art] PUB.X = 7BFB8BCC4CB4FE2028D414EA595FEA1CFFC3639932BC061E16FB48E5D9BC2797CC2F62D390622265C74F549A74063F1C
3,321,474 UART: [art] PUB.Y = E3EBE8D0CF7E0BB0738B32EEF25ED87B9AAB4D6806239D4413D60257F5EF342737CFFEA20578497715B11D1A5C77A332
3,328,422 UART: [art] SIG.R = B74E1714538F611B37E57467CA89B006595CB41A498F12B0100246123C1FEE55729E5045CF25BADE9936F02BADCD402F
3,335,186 UART: [art] SIG.S = 0342BC89F4E1267178DBB54BA874535032E4AEEE807744F985ED041CF8BC19DBB94D40EB58F9BB0A3AD42311A01D694A
3,358,663 UART: Caliptra RT
3,358,914 UART: [state] CFI Enabled
3,479,244 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,996 UART: [rt]cmd =0x50435245, len=56
3,511,538 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,078 UART: [kat] SHA2-256
882,009 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,124 UART: [kat] ++
886,276 UART: [kat] sha1
890,370 UART: [kat] SHA2-256
892,308 UART: [kat] SHA2-384
894,833 UART: [kat] SHA2-512-ACC
896,734 UART: [kat] ECC-384
902,621 UART: [kat] HMAC-384Kdf
907,205 UART: [kat] LMS
1,475,401 UART: [kat] --
1,476,104 UART: [cold-reset] ++
1,476,604 UART: [fht] Storing FHT @ 0x50003400
1,479,499 UART: [idev] ++
1,479,667 UART: [idev] CDI.KEYID = 6
1,480,027 UART: [idev] SUBJECT.KEYID = 7
1,480,451 UART: [idev] UDS.KEYID = 0
1,480,796 ready_for_fw is high
1,480,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,407 UART: [idev] Erasing UDS.KEYID = 0
1,505,023 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,593 UART: [idev] --
1,514,592 UART: [ldev] ++
1,514,760 UART: [ldev] CDI.KEYID = 6
1,515,123 UART: [ldev] SUBJECT.KEYID = 5
1,515,549 UART: [ldev] AUTHORITY.KEYID = 7
1,516,012 UART: [ldev] FE.KEYID = 1
1,521,534 UART: [ldev] Erasing FE.KEYID = 1
1,546,783 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,759 UART: [ldev] --
1,586,160 UART: [fwproc] Waiting for Commands...
1,586,879 UART: [fwproc] Received command 0x46574c44
1,587,670 UART: [fwproc] Received Image of size 118548 bytes
2,933,088 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,582 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,800 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,235 >>> mbox cmd response: success
3,132,235 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,133,333 UART: [afmc] ++
3,133,501 UART: [afmc] CDI.KEYID = 6
3,133,863 UART: [afmc] SUBJECT.KEYID = 7
3,134,288 UART: [afmc] AUTHORITY.KEYID = 5
3,169,975 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,263 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,043 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,752 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,635 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,318 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,236 UART: [afmc] --
3,213,324 UART: [cold-reset] --
3,213,912 UART: [state] Locking Datavault
3,215,337 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,941 UART: [state] Locking ICCM
3,216,447 UART: [exit] Launching FMC @ 0x40000130
3,221,777 UART:
3,221,793 UART: Running Caliptra FMC ...
3,222,201 UART:
3,222,344 UART: [state] CFI Enabled
3,232,824 UART: [fht] FMC Alias Private Key: 7
3,351,994 UART: [art] Extend RT PCRs Done
3,352,422 UART: [art] Lock RT PCRs Done
3,353,826 UART: [art] Populate DV Done
3,362,229 UART: [fht] FMC Alias Private Key: 7
3,363,173 UART: [art] Derive CDI
3,363,453 UART: [art] Store in slot 0x4
3,449,283 UART: [art] Derive Key Pair
3,449,643 UART: [art] Store priv key in slot 0x5
3,463,270 UART: [art] Derive Key Pair - Done
3,478,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,567 UART: [art] PUB.X = B991AAF9F8D30A3283A381C5B3E0236A763377D3C5C4CDE0E551CE1C393B8D0B5890E047B16D470A22A7E9AFB08EEEDD
3,501,344 UART: [art] PUB.Y = DF0B3CF43E5B5CC80326A41CB6B5C9CF181DE991D201F0B8F5EE1B6BE9AAA2E55E132FED0E6C135C6B58F12960528A76
3,508,302 UART: [art] SIG.R = CE2F820AF5C3B34249D9F434E160120FA30520BBA262215ADAEE67F46C44FBBC68C4DEAB6BDBCE222D120BC69A343ED7
3,515,082 UART: [art] SIG.S = 253AD60A747523FB4737AD0F334147025CF08F7531D34F53FA193B3F744EE1A4E3829DFF2C0F929B15413D5F7321EF22
3,539,034 UART: Caliptra RT
3,539,377 UART: [state] CFI Enabled
3,659,707 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,523 UART: [rt]cmd =0x50435245, len=56
3,691,977 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,674 ready_for_fw is high
1,362,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,989 >>> mbox cmd response: success
2,980,989 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,042,188 UART:
3,042,204 UART: Running Caliptra FMC ...
3,042,612 UART:
3,042,755 UART: [state] CFI Enabled
3,053,275 UART: [fht] FMC Alias Private Key: 7
3,172,627 UART: [art] Extend RT PCRs Done
3,173,055 UART: [art] Lock RT PCRs Done
3,174,779 UART: [art] Populate DV Done
3,182,922 UART: [fht] FMC Alias Private Key: 7
3,184,098 UART: [art] Derive CDI
3,184,378 UART: [art] Store in slot 0x4
3,269,970 UART: [art] Derive Key Pair
3,270,330 UART: [art] Store priv key in slot 0x5
3,283,549 UART: [art] Derive Key Pair - Done
3,298,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,856 UART: [art] PUB.X = 274ED3815F3797F9112FD2357E0E139BE18F359484F1A1B02CAC11B539D12F6A1E8C979F2EFEE73E3C8926A20A23C374
3,321,624 UART: [art] PUB.Y = C004664CA11BF79B270BD0140670A12F31D6CEDEEC3CF33138E85AB9DD2689A815B681F09A05F30869D8D5E961CAD815
3,328,567 UART: [art] SIG.R = F2737ACB30468CAF799785C4BD3D72D5B260B76DB9F134F300E161B6C1A761A8052FAD93398FDE6900C49EF916123FB5
3,335,296 UART: [art] SIG.S = C650899E534ED1F6FF6DEBFFD5292908DF985A5EAD2ADE49ECE8B372BC8B7C4A72D58F15B335D224BAD03EC91BE232B7
3,359,217 UART: Caliptra RT
3,359,560 UART: [state] CFI Enabled
3,479,793 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,641 UART: [rt]cmd =0x50435245, len=56
3,512,101 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,218 UART: [kat] ++
895,370 UART: [kat] sha1
899,552 UART: [kat] SHA2-256
901,492 UART: [kat] SHA2-384
904,279 UART: [kat] SHA2-512-ACC
906,180 UART: [kat] ECC-384
915,637 UART: [kat] HMAC-384Kdf
920,021 UART: [kat] LMS
1,168,333 UART: [kat] --
1,168,964 UART: [cold-reset] ++
1,169,412 UART: [fht] FHT @ 0x50003400
1,172,236 UART: [idev] ++
1,172,404 UART: [idev] CDI.KEYID = 6
1,172,765 UART: [idev] SUBJECT.KEYID = 7
1,173,190 UART: [idev] UDS.KEYID = 0
1,173,536 ready_for_fw is high
1,173,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,149 UART: [idev] Erasing UDS.KEYID = 0
1,197,941 UART: [idev] Sha1 KeyId Algorithm
1,206,823 UART: [idev] --
1,207,908 UART: [ldev] ++
1,208,076 UART: [ldev] CDI.KEYID = 6
1,208,440 UART: [ldev] SUBJECT.KEYID = 5
1,208,867 UART: [ldev] AUTHORITY.KEYID = 7
1,209,330 UART: [ldev] FE.KEYID = 1
1,214,578 UART: [ldev] Erasing FE.KEYID = 1
1,241,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,336 UART: [ldev] --
1,280,705 UART: [fwproc] Wait for Commands...
1,281,368 UART: [fwproc] Recv command 0x46574c44
1,282,101 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,149 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,324 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,573 >>> mbox cmd response: success
2,824,573 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,825,689 UART: [afmc] ++
2,825,857 UART: [afmc] CDI.KEYID = 6
2,826,220 UART: [afmc] SUBJECT.KEYID = 7
2,826,646 UART: [afmc] AUTHORITY.KEYID = 5
2,862,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,551 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,142 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,843 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,814 UART: [afmc] --
2,905,643 UART: [cold-reset] --
2,906,381 UART: [state] Locking Datavault
2,907,334 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,938 UART: [state] Locking ICCM
2,908,452 UART: [exit] Launching FMC @ 0x40000130
2,913,782 UART:
2,913,798 UART: Running Caliptra FMC ...
2,914,206 UART:
2,914,260 UART: [state] CFI Enabled
2,924,430 UART: [fht] FMC Alias Private Key: 7
3,043,574 UART: [art] Extend RT PCRs Done
3,044,002 UART: [art] Lock RT PCRs Done
3,045,524 UART: [art] Populate DV Done
3,053,723 UART: [fht] FMC Alias Private Key: 7
3,054,661 UART: [art] Derive CDI
3,054,941 UART: [art] Store in slot 0x4
3,140,934 UART: [art] Derive Key Pair
3,141,294 UART: [art] Store priv key in slot 0x5
3,154,852 UART: [art] Derive Key Pair - Done
3,169,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,926 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,691 UART: [art] PUB.X = 4927D689DB261C6F8CC06D019EE7DDD90D0DE70C158488F730FFFF9F0671066436CE72015280302FABDB15BA555F9F5E
3,192,448 UART: [art] PUB.Y = DD51517BED0F5A1A266E0FD82354EEF6135F2738D5BC2D6808F760138E1216A793D73A911FEC429FF0C4987C131C9F31
3,199,393 UART: [art] SIG.R = D09F0C391F9E3A0093246A3B709AB5C776D33DE99EBF2E3A408B10E365EA51B707A3DD48D020ACE607BDB5829EAC9FD9
3,206,148 UART: [art] SIG.S = A35CBFE31AB4C7908EB39343F5DB7673C2DA4C4BC5D49068A03886243980241A85D982875992FCAE1BFBBE5439C4DF66
3,230,102 UART: Caliptra RT
3,230,353 UART: [state] CFI Enabled
3,350,247 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,841 UART: [rt]cmd =0x50435245, len=56
3,382,129 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,416 ready_for_fw is high
1,059,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,368 >>> mbox cmd response: success
2,678,368 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,739,707 UART:
2,739,723 UART: Running Caliptra FMC ...
2,740,131 UART:
2,740,185 UART: [state] CFI Enabled
2,750,637 UART: [fht] FMC Alias Private Key: 7
2,869,587 UART: [art] Extend RT PCRs Done
2,870,015 UART: [art] Lock RT PCRs Done
2,871,293 UART: [art] Populate DV Done
2,879,534 UART: [fht] FMC Alias Private Key: 7
2,880,582 UART: [art] Derive CDI
2,880,862 UART: [art] Store in slot 0x4
2,967,163 UART: [art] Derive Key Pair
2,967,523 UART: [art] Store priv key in slot 0x5
2,980,331 UART: [art] Derive Key Pair - Done
2,995,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,242 UART: [art] PUB.X = BF44098631362F5C3CD7D83BAB3ED1F773B70628D198AF45239A712F69D45CE44829FE2244B1D757735DFD070C0A7B0F
3,017,998 UART: [art] PUB.Y = B30277967292AB3E30A4EE5C01948AE608369B64A7FC9197B55359AA02585BE6BBEA7FD62E78737D4A9D006D80AFA863
3,024,918 UART: [art] SIG.R = 87C586124E6BBA7D1586232B525BD2C118C31BC129519DF4A4AAEE5A365DEB4B9D9E9C26FC0D36C975EB9E3DDC59EE15
3,031,703 UART: [art] SIG.S = D91F40F2E1CE09160D6B0A5EB674E42A2621B49D04906436C99F59361052289ED748848AF654FA4D5FED54F4BD322302
3,055,476 UART: Caliptra RT
3,055,727 UART: [state] CFI Enabled
3,175,491 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,593 UART: [rt]cmd =0x50435245, len=56
3,208,131 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,762 UART: [kat] SHA2-512-ACC
906,663 UART: [kat] ECC-384
916,430 UART: [kat] HMAC-384Kdf
921,124 UART: [kat] LMS
1,169,436 UART: [kat] --
1,170,481 UART: [cold-reset] ++
1,170,855 UART: [fht] FHT @ 0x50003400
1,173,583 UART: [idev] ++
1,173,751 UART: [idev] CDI.KEYID = 6
1,174,112 UART: [idev] SUBJECT.KEYID = 7
1,174,537 UART: [idev] UDS.KEYID = 0
1,174,883 ready_for_fw is high
1,174,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,540 UART: [idev] Erasing UDS.KEYID = 0
1,199,464 UART: [idev] Sha1 KeyId Algorithm
1,208,330 UART: [idev] --
1,209,371 UART: [ldev] ++
1,209,539 UART: [ldev] CDI.KEYID = 6
1,209,903 UART: [ldev] SUBJECT.KEYID = 5
1,210,330 UART: [ldev] AUTHORITY.KEYID = 7
1,210,793 UART: [ldev] FE.KEYID = 1
1,216,013 UART: [ldev] Erasing FE.KEYID = 1
1,242,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,535 UART: [ldev] --
1,281,762 UART: [fwproc] Wait for Commands...
1,282,361 UART: [fwproc] Recv command 0x46574c44
1,283,094 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,034 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,209 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,442 >>> mbox cmd response: success
2,826,442 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,827,488 UART: [afmc] ++
2,827,656 UART: [afmc] CDI.KEYID = 6
2,828,019 UART: [afmc] SUBJECT.KEYID = 7
2,828,445 UART: [afmc] AUTHORITY.KEYID = 5
2,864,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,264 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,974 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,855 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,556 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,249 UART: [afmc] --
2,908,084 UART: [cold-reset] --
2,909,150 UART: [state] Locking Datavault
2,910,315 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,919 UART: [state] Locking ICCM
2,911,491 UART: [exit] Launching FMC @ 0x40000130
2,916,821 UART:
2,916,837 UART: Running Caliptra FMC ...
2,917,245 UART:
2,917,388 UART: [state] CFI Enabled
2,927,524 UART: [fht] FMC Alias Private Key: 7
3,046,418 UART: [art] Extend RT PCRs Done
3,046,846 UART: [art] Lock RT PCRs Done
3,048,216 UART: [art] Populate DV Done
3,056,571 UART: [fht] FMC Alias Private Key: 7
3,057,725 UART: [art] Derive CDI
3,058,005 UART: [art] Store in slot 0x4
3,143,842 UART: [art] Derive Key Pair
3,144,202 UART: [art] Store priv key in slot 0x5
3,157,590 UART: [art] Derive Key Pair - Done
3,172,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,887 UART: [art] PUB.X = C91E6DB1C3A7A579084BF27E9541A103D1FCB8CE149F717E8AF92C8E3387FFF2D4CFF1B2BBCA3946783903D50CA2D217
3,195,661 UART: [art] PUB.Y = E2BE294F2DABF0327A687978286785D11FC26F932C1CF0AC1E0EE45327D837B96B8B055473A985C31629F961564E35D2
3,202,603 UART: [art] SIG.R = 3AC749A93F70B5A411DFA157C1736E669115B69EDF652E8CA41EAC6532816E680488DD7EC58C48929951FB64D004A8E4
3,209,369 UART: [art] SIG.S = EB465FB7F0B056737AED71ED8B033D8FC8AC6A584E70B7ABC87F265DDBA9A4B8BF908C4DC9BF02D245638CEABFD4D015
3,233,643 UART: Caliptra RT
3,233,986 UART: [state] CFI Enabled
3,353,721 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,713 UART: [rt]cmd =0x50435245, len=56
3,386,251 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,773 ready_for_fw is high
1,058,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,411 >>> mbox cmd response: success
2,677,411 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,740,706 UART:
2,740,722 UART: Running Caliptra FMC ...
2,741,130 UART:
2,741,273 UART: [state] CFI Enabled
2,751,879 UART: [fht] FMC Alias Private Key: 7
2,870,559 UART: [art] Extend RT PCRs Done
2,870,987 UART: [art] Lock RT PCRs Done
2,872,765 UART: [art] Populate DV Done
2,881,156 UART: [fht] FMC Alias Private Key: 7
2,882,332 UART: [art] Derive CDI
2,882,612 UART: [art] Store in slot 0x4
2,968,447 UART: [art] Derive Key Pair
2,968,807 UART: [art] Store priv key in slot 0x5
2,982,323 UART: [art] Derive Key Pair - Done
2,997,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,744 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,509 UART: [art] PUB.X = E48F1F53F009D099D49D9C4CA4EC6F6DFFAB532D93723018ED3D63F666670BDCB897CB4BA96709557648A9940E273E45
3,020,273 UART: [art] PUB.Y = F2EDF477080FC862E29998ACEE2E46B11A1B5E26A0129AB95146083D1BEC322A32B26A7F85FEC3EC2976503C93E0DA6D
3,027,226 UART: [art] SIG.R = 6D695B1F77A6E0C3A3C2DA7D05569D933C004AE4495029C2CA7E28579A9818C458045E43DF04875BF94DAB8513B7CF79
3,033,967 UART: [art] SIG.S = BD46FB98FF55B599DD4B9E764C3C216907EA7C2525661DE5A0674B13E67E71EF8C85A24C316498897C68961BC3373058
3,057,252 UART: Caliptra RT
3,057,595 UART: [state] CFI Enabled
3,176,780 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,730 UART: [rt]cmd =0x50435245, len=56
3,209,112 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
893,378 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,503 UART: [kat] ++
897,655 UART: [kat] sha1
901,687 UART: [kat] SHA2-256
903,627 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,210 UART: [kat] HMAC-384Kdf
922,682 UART: [kat] LMS
1,171,010 UART: [kat] --
1,171,905 UART: [cold-reset] ++
1,172,311 UART: [fht] FHT @ 0x50003400
1,175,176 UART: [idev] ++
1,175,344 UART: [idev] CDI.KEYID = 6
1,175,704 UART: [idev] SUBJECT.KEYID = 7
1,176,128 UART: [idev] UDS.KEYID = 0
1,176,473 ready_for_fw is high
1,176,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,030 UART: [idev] Erasing UDS.KEYID = 0
1,200,663 UART: [idev] Sha1 KeyId Algorithm
1,209,025 UART: [idev] --
1,209,991 UART: [ldev] ++
1,210,159 UART: [ldev] CDI.KEYID = 6
1,210,522 UART: [ldev] SUBJECT.KEYID = 5
1,210,948 UART: [ldev] AUTHORITY.KEYID = 7
1,211,411 UART: [ldev] FE.KEYID = 1
1,216,191 UART: [ldev] Erasing FE.KEYID = 1
1,242,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,655 UART: [ldev] --
1,281,980 UART: [fwproc] Wait for Commands...
1,282,734 UART: [fwproc] Recv command 0x46574c44
1,283,462 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,348 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,518 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,831 >>> mbox cmd response: success
2,826,831 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,827,879 UART: [afmc] ++
2,828,047 UART: [afmc] CDI.KEYID = 6
2,828,409 UART: [afmc] SUBJECT.KEYID = 7
2,828,834 UART: [afmc] AUTHORITY.KEYID = 5
2,864,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,800 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,509 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,392 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,093 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,975 UART: [afmc] --
2,908,031 UART: [cold-reset] --
2,908,691 UART: [state] Locking Datavault
2,909,928 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,532 UART: [state] Locking ICCM
2,910,982 UART: [exit] Launching FMC @ 0x40000130
2,916,312 UART:
2,916,328 UART: Running Caliptra FMC ...
2,916,736 UART:
2,916,790 UART: [state] CFI Enabled
2,927,236 UART: [fht] FMC Alias Private Key: 7
3,046,144 UART: [art] Extend RT PCRs Done
3,046,572 UART: [art] Lock RT PCRs Done
3,048,012 UART: [art] Populate DV Done
3,056,037 UART: [fht] FMC Alias Private Key: 7
3,056,977 UART: [art] Derive CDI
3,057,257 UART: [art] Store in slot 0x4
3,143,322 UART: [art] Derive Key Pair
3,143,682 UART: [art] Store priv key in slot 0x5
3,157,116 UART: [art] Derive Key Pair - Done
3,172,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,925 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,690 UART: [art] PUB.X = 16184C07AD95BF643EBA0210A0F0031079158B7E148D883BCF9ECA8FF5F696DBA4EBD90F7E0CDB5563A7AA3B24B75D02
3,195,458 UART: [art] PUB.Y = 6D51D6C5BD662FBC136830512FECA9E9A9E446AF0216A0759A848A13875E2264755EA9B29341D5C51356F5604F0F5EBB
3,202,404 UART: [art] SIG.R = DDE168894E87A21F76626C1D3684331A0B0645D74D1D966CCAB7410FB1D5A14618FECF9E80449A06EECE3E4599347C6F
3,209,168 UART: [art] SIG.S = 0F65BD40C45193FBF5803E696974E6B0B2BA96ED47AFF98CF8DE9EB9FC453CF46952190F67A1227B3DA9BCDE868D6316
3,232,530 UART: Caliptra RT
3,232,781 UART: [state] CFI Enabled
3,351,302 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,202 UART: [rt]cmd =0x50435245, len=56
3,383,904 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,993 ready_for_fw is high
1,060,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,082 >>> mbox cmd response: success
2,680,082 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,742,117 UART:
2,742,133 UART: Running Caliptra FMC ...
2,742,541 UART:
2,742,595 UART: [state] CFI Enabled
2,753,031 UART: [fht] FMC Alias Private Key: 7
2,872,175 UART: [art] Extend RT PCRs Done
2,872,603 UART: [art] Lock RT PCRs Done
2,874,015 UART: [art] Populate DV Done
2,882,260 UART: [fht] FMC Alias Private Key: 7
2,883,364 UART: [art] Derive CDI
2,883,644 UART: [art] Store in slot 0x4
2,969,457 UART: [art] Derive Key Pair
2,969,817 UART: [art] Store priv key in slot 0x5
2,983,473 UART: [art] Derive Key Pair - Done
2,998,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,837 UART: [art] PUB.X = 5305D31893A30757C0C43DEFBE30C655E8A2EFBB920B3D2B547195F6BA7C197305C7903374ED7BB4ED8DCA00021EC8F4
3,020,580 UART: [art] PUB.Y = E5B82E50AF3CD41C76B1A0CB4B416871709D42BD7E286D14C8F404BE49CCFC1223250A17CBD7E74E0A4AB230413BFF3B
3,027,537 UART: [art] SIG.R = 3AD9B993040B7368ED0DA617F6F62A1EEE23EA042767CAF03AC3C728716554A4C815B8EE66B818B251628BC22ED2899E
3,034,301 UART: [art] SIG.S = E4CFC6A4D0D22CE51635ACF710DB1A662688D47F870DA43CF4E2538440EF88FAA7B9FCABF61C308AD3231E1E1360F8C8
3,058,048 UART: Caliptra RT
3,058,299 UART: [state] CFI Enabled
3,178,458 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,338 UART: [rt]cmd =0x50435245, len=56
3,210,820 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
902,122 UART: [kat] SHA2-256
904,062 UART: [kat] SHA2-384
906,773 UART: [kat] SHA2-512-ACC
908,674 UART: [kat] ECC-384
918,429 UART: [kat] HMAC-384Kdf
922,981 UART: [kat] LMS
1,171,309 UART: [kat] --
1,172,182 UART: [cold-reset] ++
1,172,712 UART: [fht] FHT @ 0x50003400
1,175,219 UART: [idev] ++
1,175,387 UART: [idev] CDI.KEYID = 6
1,175,747 UART: [idev] SUBJECT.KEYID = 7
1,176,171 UART: [idev] UDS.KEYID = 0
1,176,516 ready_for_fw is high
1,176,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,281 UART: [idev] Erasing UDS.KEYID = 0
1,201,146 UART: [idev] Sha1 KeyId Algorithm
1,209,744 UART: [idev] --
1,210,808 UART: [ldev] ++
1,210,976 UART: [ldev] CDI.KEYID = 6
1,211,339 UART: [ldev] SUBJECT.KEYID = 5
1,211,765 UART: [ldev] AUTHORITY.KEYID = 7
1,212,228 UART: [ldev] FE.KEYID = 1
1,217,444 UART: [ldev] Erasing FE.KEYID = 1
1,244,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,382 UART: [ldev] --
1,283,771 UART: [fwproc] Wait for Commands...
1,284,525 UART: [fwproc] Recv command 0x46574c44
1,285,253 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,305 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,475 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,792 >>> mbox cmd response: success
2,828,792 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,829,838 UART: [afmc] ++
2,830,006 UART: [afmc] CDI.KEYID = 6
2,830,368 UART: [afmc] SUBJECT.KEYID = 7
2,830,793 UART: [afmc] AUTHORITY.KEYID = 5
2,865,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,297 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,006 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,889 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,590 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,352 UART: [afmc] --
2,909,366 UART: [cold-reset] --
2,910,312 UART: [state] Locking Datavault
2,911,715 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,319 UART: [state] Locking ICCM
2,912,957 UART: [exit] Launching FMC @ 0x40000130
2,918,287 UART:
2,918,303 UART: Running Caliptra FMC ...
2,918,711 UART:
2,918,854 UART: [state] CFI Enabled
2,929,190 UART: [fht] FMC Alias Private Key: 7
3,048,224 UART: [art] Extend RT PCRs Done
3,048,652 UART: [art] Lock RT PCRs Done
3,049,922 UART: [art] Populate DV Done
3,058,349 UART: [fht] FMC Alias Private Key: 7
3,059,317 UART: [art] Derive CDI
3,059,597 UART: [art] Store in slot 0x4
3,145,216 UART: [art] Derive Key Pair
3,145,576 UART: [art] Store priv key in slot 0x5
3,159,350 UART: [art] Derive Key Pair - Done
3,173,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,204 UART: [art] PUB.X = AEEC2DBF5E7771E1895E0D246007FBD09FD0607718983B80796CA7147BE2639581A0BA35092CCAFDAF928E63CE9B00BA
3,196,955 UART: [art] PUB.Y = 7D0FFBB6F538E101401E5670CBF170B1772BC1B88CF49DD6502BD6DD34161BE4801C0699B464802FA7A7D689AE0FE356
3,203,901 UART: [art] SIG.R = 126F92597D0CD3D44BE4F9477E63CCB8BF8F2DD54D1168C841E4DEDBEA10F858B5F48E033A8F75E9A569F75D499C3F55
3,210,679 UART: [art] SIG.S = 75E02D4348D51828840B61AD59BEAD4D39F63C94994B7865A5B51FCB91D7696BA77943144BB14A5D64632C8E6BDDC489
3,234,636 UART: Caliptra RT
3,234,979 UART: [state] CFI Enabled
3,354,447 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,091 UART: [rt]cmd =0x50435245, len=56
3,386,621 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,778 ready_for_fw is high
1,060,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,457 >>> mbox cmd response: success
2,680,457 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,743,378 UART:
2,743,394 UART: Running Caliptra FMC ...
2,743,802 UART:
2,743,945 UART: [state] CFI Enabled
2,754,595 UART: [fht] FMC Alias Private Key: 7
2,873,799 UART: [art] Extend RT PCRs Done
2,874,227 UART: [art] Lock RT PCRs Done
2,875,845 UART: [art] Populate DV Done
2,884,522 UART: [fht] FMC Alias Private Key: 7
2,885,556 UART: [art] Derive CDI
2,885,836 UART: [art] Store in slot 0x4
2,971,175 UART: [art] Derive Key Pair
2,971,535 UART: [art] Store priv key in slot 0x5
2,985,105 UART: [art] Derive Key Pair - Done
2,999,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,388 UART: [art] PUB.X = 3EA3D083B709C4014CD6157D9F25E1D428BDCA4DA05C963415D906BBE2713426694F4BB4C9D56E3BF7CCB2C9873CA92E
3,023,161 UART: [art] PUB.Y = 54ADFCCE81236557A01A971123C23E5EF6E8557B361772ED35AB650061373496C5470E5A508B09A8F704F29D52B9AEC5
3,030,078 UART: [art] SIG.R = E4FED784D9C6DA2134DBA3748795EAACBC42CBD7E5024FDF2CACC11F95F6DF95EAAB3027DC5CAB98A99C165AA334B8E4
3,036,877 UART: [art] SIG.S = 105891DD7A7631031A7B077D5EED03E5B42C9FA1B88B158AB9990A0119B620EFF3D41BB2215F05A882EBB9CB9ABAB976
3,060,383 UART: Caliptra RT
3,060,726 UART: [state] CFI Enabled
3,180,433 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,301 UART: [rt]cmd =0x50435245, len=56
3,212,817 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,113 UART:
192,466 UART: Running Caliptra ROM ...
193,652 UART:
193,803 UART: [state] CFI Enabled
262,568 UART: [state] LifecycleState = Unprovisioned
264,487 UART: [state] DebugLocked = No
267,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,709 UART: [kat] SHA2-256
442,454 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,920 UART: [kat] ++
453,530 UART: [kat] sha1
463,658 UART: [kat] SHA2-256
466,370 UART: [kat] SHA2-384
472,013 UART: [kat] SHA2-512-ACC
474,393 UART: [kat] ECC-384
2,765,582 UART: [kat] HMAC-384Kdf
2,798,304 UART: [kat] LMS
3,988,610 UART: [kat] --
3,992,130 UART: [cold-reset] ++
3,993,500 UART: [fht] Storing FHT @ 0x50003400
4,005,832 UART: [idev] ++
4,006,485 UART: [idev] CDI.KEYID = 6
4,007,420 UART: [idev] SUBJECT.KEYID = 7
4,008,607 UART: [idev] UDS.KEYID = 0
4,009,598 ready_for_fw is high
4,009,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,158,883 UART: [idev] Erasing UDS.KEYID = 0
7,341,155 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,038 UART: [idev] --
7,367,962 UART: [ldev] ++
7,368,536 UART: [ldev] CDI.KEYID = 6
7,369,502 UART: [ldev] SUBJECT.KEYID = 5
7,370,726 UART: [ldev] AUTHORITY.KEYID = 7
7,371,962 UART: [ldev] FE.KEYID = 1
7,420,297 UART: [ldev] Erasing FE.KEYID = 1
10,751,568 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,897 UART: [ldev] --
13,112,149 UART: [fwproc] Waiting for Commands...
13,114,134 UART: [fwproc] Received command 0x46574c44
13,116,370 UART: [fwproc] Received Image of size 118548 bytes
17,226,338 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,302,676 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,375,842 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,640 >>> mbox cmd response: success
17,704,705 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,706,990 UART: [afmc] ++
17,707,570 UART: [afmc] CDI.KEYID = 6
17,708,534 UART: [afmc] SUBJECT.KEYID = 7
17,709,750 UART: [afmc] AUTHORITY.KEYID = 5
21,064,704 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,363,605 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,365,879 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,380,332 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,395,028 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,409,457 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,431,457 UART: [afmc] --
23,434,840 UART: [cold-reset] --
23,438,321 UART: [state] Locking Datavault
23,443,351 UART: [state] Locking PCR0, PCR1 and PCR31
23,445,115 UART: [state] Locking ICCM
23,447,237 UART: [exit] Launching FMC @ 0x40000130
23,455,634 UART:
23,455,866 UART: Running Caliptra FMC ...
23,456,894 UART:
23,457,042 UART: [state] CFI Enabled
23,524,669 UART: [fht] FMC Alias Private Key: 7
25,865,165 UART: [art] Extend RT PCRs Done
25,866,410 UART: [art] Lock RT PCRs Done
25,867,852 UART: [art] Populate DV Done
25,873,159 UART: [fht] FMC Alias Private Key: 7
25,874,700 UART: [art] Derive CDI
25,875,515 UART: [art] Store in slot 0x4
25,932,388 UART: [art] Derive Key Pair
25,933,465 UART: [art] Store priv key in slot 0x5
29,225,889 UART: [art] Derive Key Pair - Done
29,238,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,526,733 UART: [art] Erasing AUTHORITY.KEYID = 7
31,528,253 UART: [art] PUB.X = 4CC1529E16C67F12749C537D1DC1E985E3D19C88E70283ECC72189F627E18FE79618456E6F3465D57E9BB5AB75C68609
31,535,521 UART: [art] PUB.Y = E3665BA83491CC2B9E34E2885E9D3A86122EC08A07B1C3A3038501DE4CFB3F817F3A3E04D1F721DD211AA64D449419D1
31,542,777 UART: [art] SIG.R = 35AF21D2A8D4B0960C24056A6DA092B15D4DAC3B1F9465542B97671834559B63CD6501B88F83D92223F0E18472BD8C63
31,550,127 UART: [art] SIG.S = AADC6590DAC6E39C34918C85CD352A5A6928DB51736C45C1D5E986170123235C04BBF06C13E5DED61EFE16CCB135F63B
32,855,318 UART: Caliptra RT
32,856,051 UART: [state] CFI Enabled
33,031,859 UART: [rt] RT listening for mailbox commands...
33,063,497 UART: [rt]cmd =0x50435251, len=36
34,222,793 >>> mbox cmd response data (1848 bytes)
34,231,768 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,261,990 UART: [rt]cmd =0x50435245, len=56
34,264,914 >>> mbox cmd response data (8 bytes)
34,265,596 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,295,681 UART: [rt]cmd =0x50435251, len=36
35,460,128 >>> mbox cmd response data (1848 bytes)
35,470,126 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,500,447 UART: [rt]cmd =0x50435245, len=56
35,503,242 >>> mbox cmd response data (8 bytes)
35,503,954 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,534,096 UART: [rt]cmd =0x50435251, len=36
36,696,799 >>> mbox cmd response data (1848 bytes)
36,705,708 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,736,082 UART: [rt]cmd =0x50435245, len=56
36,739,386 >>> mbox cmd response data (8 bytes)
36,739,960 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,769,779 UART: [rt]cmd =0x50435251, len=36
37,934,166 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,782,999 ready_for_fw is high
3,783,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,936,694 >>> mbox cmd response: success
17,937,936 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,626,654 UART:
23,627,100 UART: Running Caliptra FMC ...
23,628,208 UART:
23,628,373 UART: [state] CFI Enabled
23,695,196 UART: [fht] FMC Alias Private Key: 7
26,036,229 UART: [art] Extend RT PCRs Done
26,037,448 UART: [art] Lock RT PCRs Done
26,039,296 UART: [art] Populate DV Done
26,044,453 UART: [fht] FMC Alias Private Key: 7
26,046,154 UART: [art] Derive CDI
26,046,992 UART: [art] Store in slot 0x4
26,104,077 UART: [art] Derive Key Pair
26,105,120 UART: [art] Store priv key in slot 0x5
29,397,555 UART: [art] Derive Key Pair - Done
29,410,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,698,835 UART: [art] Erasing AUTHORITY.KEYID = 7
31,700,353 UART: [art] PUB.X = 6BDE79982B386E43FEAD087284125BA9BDA8376F16EB510856DAA203F60D7BD5FD3DB6CF5BB992E037EDA746B612C55B
31,707,610 UART: [art] PUB.Y = 5A0FADCB16973B0EB947C5405C85C23D5A640B6EEFBDA38A3ED5089C1913964CF9FB4C9EF171E80A3BBF63507D6D6760
31,714,916 UART: [art] SIG.R = C1E413BBDEA375C9CB4AC4B9BBC02862525382ABBB24A270295F442D98923BFDAAF6BD2F85B012DE7E34EDD76BCB0409
31,722,311 UART: [art] SIG.S = 945F5C36D95D54668AD1C438FD11B7A0641EDC6B47E0EC68FD5E10B4DBD63F08F7E0BE5637C498169DB0788AC3B52230
33,028,255 UART: Caliptra RT
33,028,954 UART: [state] CFI Enabled
33,223,312 UART: [rt] RT listening for mailbox commands...
33,254,890 UART: [rt]cmd =0x50435251, len=36
34,415,419 >>> mbox cmd response data (1848 bytes)
34,424,367 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,454,717 UART: [rt]cmd =0x50435245, len=56
34,457,744 >>> mbox cmd response data (8 bytes)
34,458,584 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,488,399 UART: [rt]cmd =0x50435251, len=36
35,651,885 >>> mbox cmd response data (1848 bytes)
35,662,035 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,692,410 UART: [rt]cmd =0x50435245, len=56
35,695,505 >>> mbox cmd response data (8 bytes)
35,696,206 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,726,193 UART: [rt]cmd =0x50435251, len=36
36,888,142 >>> mbox cmd response data (1848 bytes)
36,897,077 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,927,191 UART: [rt]cmd =0x50435245, len=56
36,930,263 >>> mbox cmd response data (8 bytes)
36,930,840 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,960,765 UART: [rt]cmd =0x50435251, len=36
38,125,086 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,262 writing to cptra_bootfsm_go
193,660 UART:
194,033 UART: Running Caliptra ROM ...
195,184 UART:
604,916 UART: [state] CFI Enabled
618,733 UART: [state] LifecycleState = Unprovisioned
620,678 UART: [state] DebugLocked = No
623,572 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,648 UART: [kat] SHA2-256
798,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,937 UART: [kat] ++
809,410 UART: [kat] sha1
819,216 UART: [kat] SHA2-256
821,936 UART: [kat] SHA2-384
827,347 UART: [kat] SHA2-512-ACC
829,717 UART: [kat] ECC-384
3,113,571 UART: [kat] HMAC-384Kdf
3,125,447 UART: [kat] LMS
4,315,543 UART: [kat] --
4,319,837 UART: [cold-reset] ++
4,322,084 UART: [fht] Storing FHT @ 0x50003400
4,334,167 UART: [idev] ++
4,334,744 UART: [idev] CDI.KEYID = 6
4,335,666 UART: [idev] SUBJECT.KEYID = 7
4,336,908 UART: [idev] UDS.KEYID = 0
4,337,980 ready_for_fw is high
4,338,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,124 UART: [idev] Erasing UDS.KEYID = 0
7,626,057 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,491 UART: [idev] --
7,650,720 UART: [ldev] ++
7,651,334 UART: [ldev] CDI.KEYID = 6
7,652,265 UART: [ldev] SUBJECT.KEYID = 5
7,653,469 UART: [ldev] AUTHORITY.KEYID = 7
7,654,699 UART: [ldev] FE.KEYID = 1
7,666,118 UART: [ldev] Erasing FE.KEYID = 1
10,955,292 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,343 UART: [ldev] --
13,317,115 UART: [fwproc] Waiting for Commands...
13,319,794 UART: [fwproc] Received command 0x46574c44
13,322,023 UART: [fwproc] Received Image of size 118548 bytes
17,432,665 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,919 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,583,122 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,908 >>> mbox cmd response: success
17,912,021 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,914,513 UART: [afmc] ++
17,915,142 UART: [afmc] CDI.KEYID = 6
17,916,042 UART: [afmc] SUBJECT.KEYID = 7
17,917,306 UART: [afmc] AUTHORITY.KEYID = 5
21,230,727 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,678 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,980 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,368 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,556,104 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,518 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,818 UART: [afmc] --
23,595,353 UART: [cold-reset] --
23,600,012 UART: [state] Locking Datavault
23,605,364 UART: [state] Locking PCR0, PCR1 and PCR31
23,607,097 UART: [state] Locking ICCM
23,608,221 UART: [exit] Launching FMC @ 0x40000130
23,616,662 UART:
23,616,892 UART: Running Caliptra FMC ...
23,617,985 UART:
23,618,138 UART: [state] CFI Enabled
23,625,800 UART: [fht] FMC Alias Private Key: 7
25,966,165 UART: [art] Extend RT PCRs Done
25,967,385 UART: [art] Lock RT PCRs Done
25,968,736 UART: [art] Populate DV Done
25,974,245 UART: [fht] FMC Alias Private Key: 7
25,975,837 UART: [art] Derive CDI
25,976,645 UART: [art] Store in slot 0x4
26,019,125 UART: [art] Derive Key Pair
26,020,166 UART: [art] Store priv key in slot 0x5
29,262,365 UART: [art] Derive Key Pair - Done
29,275,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,977 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,479 UART: [art] PUB.X = 68BE906A872AC162DF5091F66686AE629B89A77BD33F6FBDF885E4022C698718449EDE27A63CCB80866A1BE8AB7495E3
31,564,732 UART: [art] PUB.Y = D22DFBA72DEC8F816064B301EC41DF751A087FF56B3F6474D7E977871A2F4918FB016D6B692E10C66C393EBC03DEB4A6
31,572,024 UART: [art] SIG.R = 66016764655611F0C95B442A4BD36552C9022CB705BCD5366D114A7C46DA691394D9B6A73658900BCEED3E63FBAFDDFB
31,579,425 UART: [art] SIG.S = 1A1E9FBA6E3E7DF7F3C0C8427E56EB4566842700C280EF0076C83123ED7AB4527952F007AF3433850F316645325E5DA6
32,884,792 UART: Caliptra RT
32,886,022 UART: [state] CFI Enabled
33,018,623 UART: [rt] RT listening for mailbox commands...
33,050,159 UART: [rt]cmd =0x50435251, len=36
34,205,772 >>> mbox cmd response data (1848 bytes)
34,214,838 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,245,082 UART: [rt]cmd =0x50435245, len=56
34,248,028 >>> mbox cmd response data (8 bytes)
34,249,031 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,279,273 UART: [rt]cmd =0x50435251, len=36
35,434,860 >>> mbox cmd response data (1848 bytes)
35,445,320 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,475,803 UART: [rt]cmd =0x50435245, len=56
35,478,680 >>> mbox cmd response data (8 bytes)
35,479,374 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,509,097 UART: [rt]cmd =0x50435251, len=36
36,664,410 >>> mbox cmd response data (1848 bytes)
36,674,068 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,704,264 UART: [rt]cmd =0x50435245, len=56
36,707,299 >>> mbox cmd response data (8 bytes)
36,708,304 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,738,287 UART: [rt]cmd =0x50435251, len=36
37,893,731 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
4,127,821 ready_for_fw is high
4,128,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,126 >>> mbox cmd response: success
18,161,673 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,801,091 UART:
23,801,488 UART: Running Caliptra FMC ...
23,802,591 UART:
23,802,742 UART: [state] CFI Enabled
23,810,754 UART: [fht] FMC Alias Private Key: 7
26,151,062 UART: [art] Extend RT PCRs Done
26,152,286 UART: [art] Lock RT PCRs Done
26,153,956 UART: [art] Populate DV Done
26,159,374 UART: [fht] FMC Alias Private Key: 7
26,160,964 UART: [art] Derive CDI
26,161,697 UART: [art] Store in slot 0x4
26,204,257 UART: [art] Derive Key Pair
26,205,297 UART: [art] Store priv key in slot 0x5
29,446,699 UART: [art] Derive Key Pair - Done
29,459,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,821 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,322 UART: [art] PUB.X = F45DB0EF89B3724F2D02492456FAB054A5201732540CA9B1FAAC11365C9A346913533D482708E91C019355D85A60F236
31,748,560 UART: [art] PUB.Y = 804DEA1C2B4584D90E520AF65360F4590031CEF7A01EE74BC53C135E8420C36B19D499841EE013593769EB146F2D5A33
31,755,747 UART: [art] SIG.R = D2A9DE8C802A21C954FEB02970C5D105BD2F2FCF55BF0700F1447FA2981BC6E9EB0AD252B76AE3D92A6050BB8B4F0E0F
31,763,133 UART: [art] SIG.S = 1743A6738D9934762C28B356A7F1033E071858E49519E9433AE688792CAF0A84FDF262F1CF9D869B947344290FD8B7F5
33,069,255 UART: Caliptra RT
33,069,983 UART: [state] CFI Enabled
33,204,275 UART: [rt] RT listening for mailbox commands...
33,235,622 UART: [rt]cmd =0x50435251, len=36
34,390,993 >>> mbox cmd response data (1848 bytes)
34,399,889 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,430,325 UART: [rt]cmd =0x50435245, len=56
34,433,448 >>> mbox cmd response data (8 bytes)
34,434,255 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,464,176 UART: [rt]cmd =0x50435251, len=36
35,619,782 >>> mbox cmd response data (1848 bytes)
35,629,905 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,660,002 UART: [rt]cmd =0x50435245, len=56
35,663,143 >>> mbox cmd response data (8 bytes)
35,663,846 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,693,831 UART: [rt]cmd =0x50435251, len=36
36,849,424 >>> mbox cmd response data (1848 bytes)
36,858,344 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,888,556 UART: [rt]cmd =0x50435245, len=56
36,891,632 >>> mbox cmd response data (8 bytes)
36,892,141 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,922,031 UART: [rt]cmd =0x50435251, len=36
38,077,175 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,070 UART:
192,432 UART: Running Caliptra ROM ...
193,547 UART:
193,689 UART: [state] CFI Enabled
265,920 UART: [state] LifecycleState = Unprovisioned
267,898 UART: [state] DebugLocked = No
270,019 UART: [state] WD Timer not started. Device not locked for debugging
274,411 UART: [kat] SHA2-256
454,028 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,871 UART: [kat] ++
465,329 UART: [kat] sha1
477,403 UART: [kat] SHA2-256
480,131 UART: [kat] SHA2-384
484,273 UART: [kat] SHA2-512-ACC
486,636 UART: [kat] ECC-384
2,947,326 UART: [kat] HMAC-384Kdf
2,970,518 UART: [kat] LMS
3,446,968 UART: [kat] --
3,450,973 UART: [cold-reset] ++
3,452,120 UART: [fht] FHT @ 0x50003400
3,464,226 UART: [idev] ++
3,464,779 UART: [idev] CDI.KEYID = 6
3,465,744 UART: [idev] SUBJECT.KEYID = 7
3,466,980 UART: [idev] UDS.KEYID = 0
3,467,879 ready_for_fw is high
3,468,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,691 UART: [idev] Erasing UDS.KEYID = 0
5,986,515 UART: [idev] Sha1 KeyId Algorithm
6,008,934 UART: [idev] --
6,014,713 UART: [ldev] ++
6,015,339 UART: [ldev] CDI.KEYID = 6
6,016,224 UART: [ldev] SUBJECT.KEYID = 5
6,017,433 UART: [ldev] AUTHORITY.KEYID = 7
6,018,715 UART: [ldev] FE.KEYID = 1
6,056,715 UART: [ldev] Erasing FE.KEYID = 1
8,563,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,472 UART: [ldev] --
10,373,599 UART: [fwproc] Wait for Commands...
10,375,144 UART: [fwproc] Recv command 0x46574c44
10,377,176 UART: [fwproc] Recv'd Img size: 118548 bytes
13,872,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,028,266 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,357,200 >>> mbox cmd response: success
14,358,338 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,361,049 UART: [afmc] ++
14,361,634 UART: [afmc] CDI.KEYID = 6
14,362,571 UART: [afmc] SUBJECT.KEYID = 7
14,363,778 UART: [afmc] AUTHORITY.KEYID = 5
16,891,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,498 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,337 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,379 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,929 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,519 UART: [afmc] --
18,694,571 UART: [cold-reset] --
18,699,239 UART: [state] Locking Datavault
18,702,744 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,509 UART: [state] Locking ICCM
18,706,252 UART: [exit] Launching FMC @ 0x40000130
18,714,642 UART:
18,714,882 UART: Running Caliptra FMC ...
18,715,976 UART:
18,716,129 UART: [state] CFI Enabled
18,773,939 UART: [fht] FMC Alias Private Key: 7
20,561,158 UART: [art] Extend RT PCRs Done
20,562,383 UART: [art] Lock RT PCRs Done
20,563,816 UART: [art] Populate DV Done
20,569,389 UART: [fht] FMC Alias Private Key: 7
20,570,866 UART: [art] Derive CDI
20,571,595 UART: [art] Store in slot 0x4
20,627,629 UART: [art] Derive Key Pair
20,628,661 UART: [art] Store priv key in slot 0x5
23,091,678 UART: [art] Derive Key Pair - Done
23,104,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,463 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,960 UART: [art] PUB.X = 643C83D5AAD3AE98EB4791276DF30326AD16F7BA94A8BF44BC277A5448FE2A29BA30A7CFF6A004A2580F71D7CC6C2793
24,826,251 UART: [art] PUB.Y = AACBB2557A90EAF34868D7F365CBAA5649B4CDEBFB2F81DC9A3A2E1E1165A7969AEC6F695579A28929147B96599DF6A7
24,833,536 UART: [art] SIG.R = 76B9E952EBD02E01D1B6F081648ADD2E9C89E10697B8E7711DB54EEEBF11DBAB0FA0F462DD1351C8D67C9EAB79C21B13
24,840,929 UART: [art] SIG.S = 8CF2A2DFDF4F95CD471875A5169A144B80768459AA11F77B443058BFC26C37CF7E0E3D6B973356E76771BCEDB01F6B2F
25,819,862 UART: Caliptra RT
25,820,579 UART: [state] CFI Enabled
26,000,345 UART: [rt] RT listening for mailbox commands...
26,031,767 UART: [rt]cmd =0x50435251, len=36
26,944,925 >>> mbox cmd response data (1848 bytes)
26,953,821 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,984,092 UART: [rt]cmd =0x50435245, len=56
26,987,000 >>> mbox cmd response data (8 bytes)
26,987,545 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,017,461 UART: [rt]cmd =0x50435251, len=36
27,925,890 >>> mbox cmd response data (1848 bytes)
27,935,838 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,966,353 UART: [rt]cmd =0x50435245, len=56
27,969,320 >>> mbox cmd response data (8 bytes)
27,969,980 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,999,997 UART: [rt]cmd =0x50435251, len=36
28,928,067 >>> mbox cmd response data (1848 bytes)
28,937,013 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,967,138 UART: [rt]cmd =0x50435245, len=56
28,970,090 >>> mbox cmd response data (8 bytes)
28,970,600 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,000,471 UART: [rt]cmd =0x50435251, len=36
29,908,893 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,463,589 ready_for_fw is high
3,464,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,208,846 >>> mbox cmd response: success
14,210,100 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,488,056 UART:
18,488,436 UART: Running Caliptra FMC ...
18,489,634 UART:
18,489,801 UART: [state] CFI Enabled
18,560,390 UART: [fht] FMC Alias Private Key: 7
20,326,305 UART: [art] Extend RT PCRs Done
20,327,532 UART: [art] Lock RT PCRs Done
20,328,834 UART: [art] Populate DV Done
20,334,327 UART: [fht] FMC Alias Private Key: 7
20,335,870 UART: [art] Derive CDI
20,336,684 UART: [art] Store in slot 0x4
20,393,382 UART: [art] Derive Key Pair
20,394,419 UART: [art] Store priv key in slot 0x5
22,857,117 UART: [art] Derive Key Pair - Done
22,869,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,583,108 UART: [art] Erasing AUTHORITY.KEYID = 7
24,584,614 UART: [art] PUB.X = 01FA8709C34207CC0AAC6268986077E3E4696C62CDB3606A193433B35371160B8457C9C37EB9DCAF337A08578C7A1072
24,591,863 UART: [art] PUB.Y = 6AF97916A0B2BA3AB8463BE929D4F41860008FE269E93610A1F4BB1381A519D335D5A7E8C6E27284D319A106867CCA8D
24,599,126 UART: [art] SIG.R = C028619C788017C6EF96B491BA96549DBF81F3CBF3481185A78BE602C3128726E00194D377DCE5CC1FD0AE2A29DA3D6B
24,606,659 UART: [art] SIG.S = 664B1258ADBADDA594950DC5864CCB032CD16EC5D44AB1BDE550FB7AA21AA0B71DD5E5C4A4D558A29B28414185C47F2C
25,585,404 UART: Caliptra RT
25,586,121 UART: [state] CFI Enabled
25,767,406 UART: [rt] RT listening for mailbox commands...
25,799,089 UART: [rt]cmd =0x50435251, len=36
26,711,238 >>> mbox cmd response data (1848 bytes)
26,720,125 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,750,391 UART: [rt]cmd =0x50435245, len=56
26,753,567 >>> mbox cmd response data (8 bytes)
26,754,361 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,784,255 UART: [rt]cmd =0x50435251, len=36
27,692,498 >>> mbox cmd response data (1848 bytes)
27,702,428 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,732,712 UART: [rt]cmd =0x50435245, len=56
27,735,869 >>> mbox cmd response data (8 bytes)
27,736,575 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,766,456 UART: [rt]cmd =0x50435251, len=36
28,695,074 >>> mbox cmd response data (1848 bytes)
28,703,998 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,734,428 UART: [rt]cmd =0x50435245, len=56
28,737,338 >>> mbox cmd response data (8 bytes)
28,737,901 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,768,007 UART: [rt]cmd =0x50435251, len=36
29,676,625 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
192,641 UART:
192,995 UART: Running Caliptra ROM ...
194,090 UART:
603,941 UART: [state] CFI Enabled
619,039 UART: [state] LifecycleState = Unprovisioned
620,921 UART: [state] DebugLocked = No
622,441 UART: [state] WD Timer not started. Device not locked for debugging
625,979 UART: [kat] SHA2-256
805,617 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,416 UART: [kat] ++
816,864 UART: [kat] sha1
828,300 UART: [kat] SHA2-256
831,026 UART: [kat] SHA2-384
837,801 UART: [kat] SHA2-512-ACC
840,192 UART: [kat] ECC-384
3,280,557 UART: [kat] HMAC-384Kdf
3,294,346 UART: [kat] LMS
3,770,854 UART: [kat] --
3,776,128 UART: [cold-reset] ++
3,778,489 UART: [fht] FHT @ 0x50003400
3,791,106 UART: [idev] ++
3,791,672 UART: [idev] CDI.KEYID = 6
3,792,707 UART: [idev] SUBJECT.KEYID = 7
3,793,881 UART: [idev] UDS.KEYID = 0
3,794,828 ready_for_fw is high
3,795,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,867 UART: [idev] Erasing UDS.KEYID = 0
6,270,669 UART: [idev] Sha1 KeyId Algorithm
6,295,194 UART: [idev] --
6,299,082 UART: [ldev] ++
6,299,679 UART: [ldev] CDI.KEYID = 6
6,300,588 UART: [ldev] SUBJECT.KEYID = 5
6,301,806 UART: [ldev] AUTHORITY.KEYID = 7
6,303,040 UART: [ldev] FE.KEYID = 1
6,312,936 UART: [ldev] Erasing FE.KEYID = 1
8,789,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,848 UART: [ldev] --
10,584,765 UART: [fwproc] Wait for Commands...
10,587,130 UART: [fwproc] Recv command 0x46574c44
10,589,169 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,597 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,627 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,289 >>> mbox cmd response: success
14,549,578 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,551,519 UART: [afmc] ++
14,552,103 UART: [afmc] CDI.KEYID = 6
14,553,236 UART: [afmc] SUBJECT.KEYID = 7
14,554,340 UART: [afmc] AUTHORITY.KEYID = 5
17,056,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,965 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,803 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,833 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,411 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,153 UART: [afmc] --
18,857,286 UART: [cold-reset] --
18,859,801 UART: [state] Locking Datavault
18,864,313 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,069 UART: [state] Locking ICCM
18,868,713 UART: [exit] Launching FMC @ 0x40000130
18,877,140 UART:
18,877,387 UART: Running Caliptra FMC ...
18,878,489 UART:
18,878,654 UART: [state] CFI Enabled
18,886,838 UART: [fht] FMC Alias Private Key: 7
20,653,200 UART: [art] Extend RT PCRs Done
20,654,415 UART: [art] Lock RT PCRs Done
20,656,150 UART: [art] Populate DV Done
20,661,562 UART: [fht] FMC Alias Private Key: 7
20,663,108 UART: [art] Derive CDI
20,663,870 UART: [art] Store in slot 0x4
20,706,837 UART: [art] Derive Key Pair
20,707,842 UART: [art] Store priv key in slot 0x5
23,134,344 UART: [art] Derive Key Pair - Done
23,147,283 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,438 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,936 UART: [art] PUB.X = B9136D86FC317283205D620EA49621FC733B16D0A875111D1F1C737CF5DE5A4E96EF47570F8E89C77FE6174555E90B69
24,862,173 UART: [art] PUB.Y = 2064C6C0BE413A768EAB7EE2F1FC536DED976157F71FE1D3187A59802A0F806E6FB9F5589B6A63915ECD76D0854149CB
24,869,598 UART: [art] SIG.R = 3A40D723CB82B5AB54762E590872EFA9E5919EBD00ACE2A8FB6DECE2318C96161C14AD3490B4C658E9C7473CEE635ECF
24,876,900 UART: [art] SIG.S = E61588B120BC5C0E1ED680E977A5ED797B4D99A75DD6B3CC49B38582782D709A805002E697834065B3663AF3A51E8514
25,855,648 UART: Caliptra RT
25,856,348 UART: [state] CFI Enabled
25,988,959 UART: [rt] RT listening for mailbox commands...
26,020,652 UART: [rt]cmd =0x50435251, len=36
26,928,331 >>> mbox cmd response data (1848 bytes)
26,937,219 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,967,548 UART: [rt]cmd =0x50435245, len=56
26,970,704 >>> mbox cmd response data (8 bytes)
26,971,478 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,001,369 UART: [rt]cmd =0x50435251, len=36
27,909,222 >>> mbox cmd response data (1848 bytes)
27,919,311 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,949,571 UART: [rt]cmd =0x50435245, len=56
27,952,493 >>> mbox cmd response data (8 bytes)
27,953,181 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,983,113 UART: [rt]cmd =0x50435251, len=36
28,890,879 >>> mbox cmd response data (1848 bytes)
28,899,802 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,930,075 UART: [rt]cmd =0x50435245, len=56
28,932,947 >>> mbox cmd response data (8 bytes)
28,933,512 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,963,369 UART: [rt]cmd =0x50435251, len=36
29,871,151 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,780,693 ready_for_fw is high
3,781,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,887 >>> mbox cmd response: success
14,449,104 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,700,493 UART:
18,701,427 UART: Running Caliptra FMC ...
18,702,565 UART:
18,702,726 UART: [state] CFI Enabled
18,710,361 UART: [fht] FMC Alias Private Key: 7
20,475,997 UART: [art] Extend RT PCRs Done
20,477,236 UART: [art] Lock RT PCRs Done
20,478,945 UART: [art] Populate DV Done
20,483,958 UART: [fht] FMC Alias Private Key: 7
20,485,500 UART: [art] Derive CDI
20,486,237 UART: [art] Store in slot 0x4
20,529,243 UART: [art] Derive Key Pair
20,530,274 UART: [art] Store priv key in slot 0x5
22,956,853 UART: [art] Derive Key Pair - Done
22,970,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,467 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,969 UART: [art] PUB.X = 741584C9C8D48834B78DD647CBA3833D8CDD89F646C7136CBE1DA2AA3748610B3FCF1D66F231FC7DE4761488C56E323B
24,685,287 UART: [art] PUB.Y = D7AF4B1FD7655CBA32410E2C062CCE7773B89DC1EF991C0209EAA58FBA96CB64146F13691EF02EFD21E0158D441D2FEE
24,692,531 UART: [art] SIG.R = 05200DF20A7E077CDE87577C79AC2B4DD91A762AA3786971CFC07AEBECA4B792157D08E5288C58D5D01DAEC6A274FD40
24,699,941 UART: [art] SIG.S = 547DF939573FE86FE78FF744F6147291D18F0EE499653023FC14511DB73B102461EA7F280E30FB9C69ED4FF7F02E433B
25,679,032 UART: Caliptra RT
25,679,736 UART: [state] CFI Enabled
25,811,010 UART: [rt] RT listening for mailbox commands...
25,842,916 UART: [rt]cmd =0x50435251, len=36
26,750,789 >>> mbox cmd response data (1848 bytes)
26,759,774 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,790,117 UART: [rt]cmd =0x50435245, len=56
26,793,248 >>> mbox cmd response data (8 bytes)
26,794,241 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,824,118 UART: [rt]cmd =0x50435251, len=36
27,731,796 >>> mbox cmd response data (1848 bytes)
27,741,737 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,772,060 UART: [rt]cmd =0x50435245, len=56
27,774,858 >>> mbox cmd response data (8 bytes)
27,775,488 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,805,529 UART: [rt]cmd =0x50435251, len=36
28,713,243 >>> mbox cmd response data (1848 bytes)
28,722,169 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,752,505 UART: [rt]cmd =0x50435245, len=56
28,755,764 >>> mbox cmd response data (8 bytes)
28,756,359 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,786,240 UART: [rt]cmd =0x50435251, len=36
29,694,009 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
191,956 UART:
192,327 UART: Running Caliptra ROM ...
193,414 UART:
193,558 UART: [state] CFI Enabled
263,393 UART: [state] LifecycleState = Unprovisioned
265,728 UART: [state] DebugLocked = No
268,596 UART: [state] WD Timer not started. Device not locked for debugging
273,058 UART: [kat] SHA2-256
462,889 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,718 UART: [kat] ++
474,216 UART: [kat] sha1
486,612 UART: [kat] SHA2-256
489,591 UART: [kat] SHA2-384
495,443 UART: [kat] SHA2-512-ACC
498,094 UART: [kat] ECC-384
2,948,474 UART: [kat] HMAC-384Kdf
2,972,524 UART: [kat] LMS
3,504,325 UART: [kat] --
3,508,813 UART: [cold-reset] ++
3,509,886 UART: [fht] FHT @ 0x50003400
3,520,002 UART: [idev] ++
3,520,643 UART: [idev] CDI.KEYID = 6
3,521,596 UART: [idev] SUBJECT.KEYID = 7
3,522,838 UART: [idev] UDS.KEYID = 0
3,523,737 ready_for_fw is high
3,524,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,057 UART: [idev] Erasing UDS.KEYID = 0
6,028,162 UART: [idev] Sha1 KeyId Algorithm
6,050,152 UART: [idev] --
6,054,515 UART: [ldev] ++
6,055,199 UART: [ldev] CDI.KEYID = 6
6,056,086 UART: [ldev] SUBJECT.KEYID = 5
6,057,247 UART: [ldev] AUTHORITY.KEYID = 7
6,058,477 UART: [ldev] FE.KEYID = 1
6,102,071 UART: [ldev] Erasing FE.KEYID = 1
8,607,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,169 UART: [ldev] --
10,413,919 UART: [fwproc] Wait for Commands...
10,415,744 UART: [fwproc] Recv command 0x46574c44
10,418,061 UART: [fwproc] Recv'd Img size: 118548 bytes
13,908,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,984,362 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,107,983 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,668,573 >>> mbox cmd response: success
14,669,693 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,673,454 UART: [afmc] ++
14,674,160 UART: [afmc] CDI.KEYID = 6
14,675,348 UART: [afmc] SUBJECT.KEYID = 7
14,676,838 UART: [afmc] AUTHORITY.KEYID = 5
17,213,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,940,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,595 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,957,712 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,972,860 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,987,743 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,514 UART: [afmc] --
19,014,238 UART: [cold-reset] --
19,017,944 UART: [state] Locking Datavault
19,024,216 UART: [state] Locking PCR0, PCR1 and PCR31
19,026,400 UART: [state] Locking ICCM
19,028,978 UART: [exit] Launching FMC @ 0x40000130
19,037,644 UART:
19,037,886 UART: Running Caliptra FMC ...
19,038,989 UART:
19,039,147 UART: [state] CFI Enabled
19,095,620 UART: [fht] FMC Alias Private Key: 7
20,861,847 UART: [art] Extend RT PCRs Done
20,863,066 UART: [art] Lock RT PCRs Done
20,864,773 UART: [art] Populate DV Done
20,870,097 UART: [fht] FMC Alias Private Key: 7
20,871,742 UART: [art] Derive CDI
20,872,479 UART: [art] Store in slot 0x4
20,927,976 UART: [art] Derive Key Pair
20,929,014 UART: [art] Store priv key in slot 0x5
23,392,084 UART: [art] Derive Key Pair - Done
23,404,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,428 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,934 UART: [art] PUB.X = FFBDF70D7F62E940FA080AAADA5B6CD22B5249222104D8C3CCE2953BC0C19393B11E308DB222300FE04F7A34C33FF869
25,126,230 UART: [art] PUB.Y = 12BE2642689FBE907D7F78692279B94AE9D3986EA03452D474530A031F652F64C6DB457EFBABB23FC069E129BB46AA7C
25,133,444 UART: [art] SIG.R = 5C9DE940F4238C62405D45841D6B6828D311997CFE25DF54306C63F05F5446B17DB4902C7D783C3E327F86768D78E0E7
25,140,864 UART: [art] SIG.S = E5D4D16D327551B1578C007F4F0256719D9653A7FCC8CA59E85FC5E0AE6DBE79612024D60269BC8137AB77165DA4A197
26,119,101 UART: Caliptra RT
26,119,807 UART: [state] CFI Enabled
26,301,100 UART: [rt] RT listening for mailbox commands...
26,332,773 UART: [rt]cmd =0x50435251, len=36
27,245,476 >>> mbox cmd response data (1848 bytes)
27,254,365 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,284,576 UART: [rt]cmd =0x50435245, len=56
27,287,947 >>> mbox cmd response data (8 bytes)
27,288,573 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,318,600 UART: [rt]cmd =0x50435251, len=36
28,227,503 >>> mbox cmd response data (1848 bytes)
28,237,465 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,267,691 UART: [rt]cmd =0x50435245, len=56
28,270,696 >>> mbox cmd response data (8 bytes)
28,271,403 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,301,071 UART: [rt]cmd =0x50435251, len=36
29,229,834 >>> mbox cmd response data (1848 bytes)
29,238,727 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,269,156 UART: [rt]cmd =0x50435245, len=56
29,272,393 >>> mbox cmd response data (8 bytes)
29,272,981 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,302,874 UART: [rt]cmd =0x50435251, len=36
30,211,245 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
3,438,159 ready_for_fw is high
3,438,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,828,582 >>> mbox cmd response: success
14,829,992 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,132,601 UART:
19,132,991 UART: Running Caliptra FMC ...
19,134,200 UART:
19,134,367 UART: [state] CFI Enabled
19,198,252 UART: [fht] FMC Alias Private Key: 7
20,985,169 UART: [art] Extend RT PCRs Done
20,986,375 UART: [art] Lock RT PCRs Done
20,988,002 UART: [art] Populate DV Done
20,993,102 UART: [fht] FMC Alias Private Key: 7
20,994,719 UART: [art] Derive CDI
20,995,539 UART: [art] Store in slot 0x4
21,051,741 UART: [art] Derive Key Pair
21,052,737 UART: [art] Store priv key in slot 0x5
23,515,883 UART: [art] Derive Key Pair - Done
23,528,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,240,859 UART: [art] Erasing AUTHORITY.KEYID = 7
25,242,373 UART: [art] PUB.X = F8E6B93F615458091C2F7BE030E3CB8500DE0B0A7B0DAE119F7E04337311ABF4AE6088F32396281EED446E8A08DD4B82
25,249,628 UART: [art] PUB.Y = F3C0488C89853138EA7BDC70EA86B5E164FD72583CF82AB3E305001F362A365CFB417CED072D53160310A48501567A6F
25,256,837 UART: [art] SIG.R = 3E1EB06D0ADC153165FBA3C33F3A3B05A3A274687EAC93B461A025964E76F9948D1E04FAFCFD0CFA037DE805444A119C
25,264,237 UART: [art] SIG.S = 9ED78B925D2B56F9F2C0DBB45BA2C6C65CC698157B0178EE44A23CB9DA5D9D24AB93AADE43E9E90A02AD95F1D9B46734
26,243,265 UART: Caliptra RT
26,243,958 UART: [state] CFI Enabled
26,423,297 UART: [rt] RT listening for mailbox commands...
26,455,020 UART: [rt]cmd =0x50435251, len=36
27,367,346 >>> mbox cmd response data (1848 bytes)
27,376,222 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,406,465 UART: [rt]cmd =0x50435245, len=56
27,409,510 >>> mbox cmd response data (8 bytes)
27,410,317 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,440,406 UART: [rt]cmd =0x50435251, len=36
28,348,638 >>> mbox cmd response data (1848 bytes)
28,358,584 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,388,942 UART: [rt]cmd =0x50435245, len=56
28,391,964 >>> mbox cmd response data (8 bytes)
28,392,676 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,422,831 UART: [rt]cmd =0x50435251, len=36
29,351,585 >>> mbox cmd response data (1848 bytes)
29,360,502 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,390,734 UART: [rt]cmd =0x50435245, len=56
29,393,789 >>> mbox cmd response data (8 bytes)
29,394,362 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,424,292 UART: [rt]cmd =0x50435251, len=36
30,334,165 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,361 UART:
192,731 UART: Running Caliptra ROM ...
193,925 UART:
603,349 UART: [state] CFI Enabled
617,344 UART: [state] LifecycleState = Unprovisioned
619,760 UART: [state] DebugLocked = No
621,538 UART: [state] WD Timer not started. Device not locked for debugging
626,817 UART: [kat] SHA2-256
816,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,441 UART: [kat] ++
827,978 UART: [kat] sha1
838,068 UART: [kat] SHA2-256
841,087 UART: [kat] SHA2-384
846,306 UART: [kat] SHA2-512-ACC
848,891 UART: [kat] ECC-384
3,290,729 UART: [kat] HMAC-384Kdf
3,303,770 UART: [kat] LMS
3,835,559 UART: [kat] --
3,839,838 UART: [cold-reset] ++
3,841,063 UART: [fht] FHT @ 0x50003400
3,853,117 UART: [idev] ++
3,853,835 UART: [idev] CDI.KEYID = 6
3,854,723 UART: [idev] SUBJECT.KEYID = 7
3,855,989 UART: [idev] UDS.KEYID = 0
3,856,894 ready_for_fw is high
3,857,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,942 UART: [idev] Erasing UDS.KEYID = 0
6,334,760 UART: [idev] Sha1 KeyId Algorithm
6,358,634 UART: [idev] --
6,364,243 UART: [ldev] ++
6,364,924 UART: [ldev] CDI.KEYID = 6
6,365,837 UART: [ldev] SUBJECT.KEYID = 5
6,367,001 UART: [ldev] AUTHORITY.KEYID = 7
6,368,243 UART: [ldev] FE.KEYID = 1
6,380,948 UART: [ldev] Erasing FE.KEYID = 1
8,855,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,499 UART: [ldev] --
10,647,683 UART: [fwproc] Wait for Commands...
10,650,431 UART: [fwproc] Recv command 0x46574c44
10,652,743 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,333 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,428 >>> mbox cmd response: success
14,912,994 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,916,686 UART: [afmc] ++
14,917,392 UART: [afmc] CDI.KEYID = 6
14,918,592 UART: [afmc] SUBJECT.KEYID = 7
14,920,038 UART: [afmc] AUTHORITY.KEYID = 5
17,425,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,148,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,150,110 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,165,214 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,180,378 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,195,253 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,060 UART: [afmc] --
19,222,983 UART: [cold-reset] --
19,226,432 UART: [state] Locking Datavault
19,230,399 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,600 UART: [state] Locking ICCM
19,235,082 UART: [exit] Launching FMC @ 0x40000130
19,243,717 UART:
19,243,963 UART: Running Caliptra FMC ...
19,245,072 UART:
19,245,240 UART: [state] CFI Enabled
19,253,126 UART: [fht] FMC Alias Private Key: 7
21,019,469 UART: [art] Extend RT PCRs Done
21,020,705 UART: [art] Lock RT PCRs Done
21,022,418 UART: [art] Populate DV Done
21,027,674 UART: [fht] FMC Alias Private Key: 7
21,029,386 UART: [art] Derive CDI
21,030,128 UART: [art] Store in slot 0x4
21,073,212 UART: [art] Derive Key Pair
21,074,216 UART: [art] Store priv key in slot 0x5
23,500,956 UART: [art] Derive Key Pair - Done
23,514,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,499 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,999 UART: [art] PUB.X = F91DBEE4904AB60853B8EA1D2374762AC3C9D1B966F11663EB91ED15C81391DB890123E9528FCEBF248159EC96DCA8F5
25,229,264 UART: [art] PUB.Y = A09DDB72A151B55138D3DBA722DC8B7A456EDF85A2749722E4E622CE2893C2277DBF83F980C0681BF3A07A7F1C3BECDB
25,236,517 UART: [art] SIG.R = D902222F6B57EF574CB59AC709F7335A2F5F7532AC9C4D16501902D723955302DA9BAF22AA0F9BC1A5B8CB38167AD55E
25,243,940 UART: [art] SIG.S = B67EF2F9DBD4B35EEFC8F5D52AB3ED54D6A561E347BFB36E760E175438806DBBE4FBF4FF1DC4719F823FD68A7BAE4720
26,223,085 UART: Caliptra RT
26,223,797 UART: [state] CFI Enabled
26,356,816 UART: [rt] RT listening for mailbox commands...
26,388,373 UART: [rt]cmd =0x50435251, len=36
27,296,273 >>> mbox cmd response data (1848 bytes)
27,305,180 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,335,274 UART: [rt]cmd =0x50435245, len=56
27,338,178 >>> mbox cmd response data (8 bytes)
27,339,116 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,369,129 UART: [rt]cmd =0x50435251, len=36
28,276,986 >>> mbox cmd response data (1848 bytes)
28,286,957 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,317,128 UART: [rt]cmd =0x50435245, len=56
28,320,303 >>> mbox cmd response data (8 bytes)
28,320,996 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,350,772 UART: [rt]cmd =0x50435251, len=36
29,258,647 >>> mbox cmd response data (1848 bytes)
29,267,545 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,297,952 UART: [rt]cmd =0x50435245, len=56
29,300,876 >>> mbox cmd response data (8 bytes)
29,301,446 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,331,669 UART: [rt]cmd =0x50435251, len=36
30,239,310 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,754,226 ready_for_fw is high
3,754,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,651 >>> mbox cmd response: success
15,045,493 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,298,434 UART:
19,298,833 UART: Running Caliptra FMC ...
19,299,952 UART:
19,300,107 UART: [state] CFI Enabled
19,308,016 UART: [fht] FMC Alias Private Key: 7
21,074,493 UART: [art] Extend RT PCRs Done
21,075,725 UART: [art] Lock RT PCRs Done
21,077,387 UART: [art] Populate DV Done
21,083,143 UART: [fht] FMC Alias Private Key: 7
21,084,622 UART: [art] Derive CDI
21,085,375 UART: [art] Store in slot 0x4
21,128,128 UART: [art] Derive Key Pair
21,129,146 UART: [art] Store priv key in slot 0x5
23,556,602 UART: [art] Derive Key Pair - Done
23,569,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,275,891 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,410 UART: [art] PUB.X = 3CC803DA71197EDC4E554B21D26703A2CCDF4D60F8C86D4E8545A329D36B9D0693497390E952E9397A153A797768F0EF
25,284,634 UART: [art] PUB.Y = 4328530F6609384B4C588B3BD8E8C569576C08687975F35022B62BCF53E55B51196B6029B8A69825A8F3E0874A1D7116
25,292,034 UART: [art] SIG.R = 4846BC3969C9312DF46748641A7F381DFEA24C63409C274192E195107CB55AD7AC21B08D33D0EF4F7DEE96080CF1F5B7
25,299,284 UART: [art] SIG.S = 0E5C7261FFB272065B574FBE42AAEC0941B72ADB92015A884CD2E62FD79DD809C2470D69F8D36748DD770BD560B780E0
26,278,137 UART: Caliptra RT
26,278,850 UART: [state] CFI Enabled
26,410,875 UART: [rt] RT listening for mailbox commands...
26,442,382 UART: [rt]cmd =0x50435251, len=36
27,350,191 >>> mbox cmd response data (1848 bytes)
27,359,101 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,389,156 UART: [rt]cmd =0x50435245, len=56
27,391,950 >>> mbox cmd response data (8 bytes)
27,392,838 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,422,958 UART: [rt]cmd =0x50435251, len=36
28,330,976 >>> mbox cmd response data (1848 bytes)
28,341,118 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,371,215 UART: [rt]cmd =0x50435245, len=56
28,374,226 >>> mbox cmd response data (8 bytes)
28,374,959 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,405,007 UART: [rt]cmd =0x50435251, len=36
29,312,834 >>> mbox cmd response data (1848 bytes)
29,321,748 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,352,139 UART: [rt]cmd =0x50435245, len=56
29,355,058 >>> mbox cmd response data (8 bytes)
29,355,650 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,385,717 UART: [rt]cmd =0x50435251, len=36
30,293,713 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,774 UART: [state] LifecycleState = Unprovisioned
85,429 UART: [state] DebugLocked = No
85,917 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,475 UART: [kat] SHA2-256
881,406 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,521 UART: [kat] ++
885,673 UART: [kat] sha1
889,821 UART: [kat] SHA2-256
891,759 UART: [kat] SHA2-384
894,536 UART: [kat] SHA2-512-ACC
896,437 UART: [kat] ECC-384
901,838 UART: [kat] HMAC-384Kdf
906,296 UART: [kat] LMS
1,474,492 UART: [kat] --
1,475,195 UART: [cold-reset] ++
1,475,675 UART: [fht] Storing FHT @ 0x50003400
1,478,296 UART: [idev] ++
1,478,464 UART: [idev] CDI.KEYID = 6
1,478,824 UART: [idev] SUBJECT.KEYID = 7
1,479,248 UART: [idev] UDS.KEYID = 0
1,479,593 ready_for_fw is high
1,479,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,274 UART: [idev] Erasing UDS.KEYID = 0
1,503,658 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,384 UART: [idev] --
1,513,363 UART: [ldev] ++
1,513,531 UART: [ldev] CDI.KEYID = 6
1,513,894 UART: [ldev] SUBJECT.KEYID = 5
1,514,320 UART: [ldev] AUTHORITY.KEYID = 7
1,514,783 UART: [ldev] FE.KEYID = 1
1,519,899 UART: [ldev] Erasing FE.KEYID = 1
1,545,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,752 UART: [ldev] --
1,584,209 UART: [fwproc] Waiting for Commands...
1,585,024 UART: [fwproc] Received command 0x46574c44
1,585,815 UART: [fwproc] Received Image of size 118548 bytes
2,930,383 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,543 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,761 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,962 >>> mbox cmd response: success
3,128,962 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,130,170 UART: [afmc] ++
3,130,338 UART: [afmc] CDI.KEYID = 6
3,130,700 UART: [afmc] SUBJECT.KEYID = 7
3,131,125 UART: [afmc] AUTHORITY.KEYID = 5
3,166,444 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,780 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,560 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,269 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,152 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,835 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,707 UART: [afmc] --
3,209,611 UART: [cold-reset] --
3,210,409 UART: [state] Locking Datavault
3,211,466 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,070 UART: [state] Locking ICCM
3,212,694 UART: [exit] Launching FMC @ 0x40000130
3,218,024 UART:
3,218,040 UART: Running Caliptra FMC ...
3,218,448 UART:
3,218,502 UART: [state] CFI Enabled
3,229,222 UART: [fht] FMC Alias Private Key: 7
3,348,004 UART: [art] Extend RT PCRs Done
3,348,432 UART: [art] Lock RT PCRs Done
3,350,000 UART: [art] Populate DV Done
3,358,155 UART: [fht] FMC Alias Private Key: 7
3,359,297 UART: [art] Derive CDI
3,359,577 UART: [art] Store in slot 0x4
3,445,543 UART: [art] Derive Key Pair
3,445,903 UART: [art] Store priv key in slot 0x5
3,458,764 UART: [art] Derive Key Pair - Done
3,473,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,623 UART: [art] PUB.X = 03410B9A75FAF9B916A2D91CF31A5455F4C78568B59008B1C16686A3C7CEBE4E479AE439F62F3126E247F194AB6602BC
3,496,385 UART: [art] PUB.Y = 4ADA24EE71EA9963E858E46E356F191F8F8BB9FC6A89BECD8897F978D9559AEAFC7ED43D17C414165C95C06D51F81910
3,503,347 UART: [art] SIG.R = 42C47D7F955DBC33754B6114CA705B56BDCBA4D3794E9D6218256DACC5E632716CBDB2E258DF5F28F3DFC7C0129F5E8A
3,510,133 UART: [art] SIG.S = 7932A24FDB0C0D5F7155324F21901413E66E3F596C07525D3D8265C9AEF004998114FBF8732B8CED579082A058DF7539
3,534,533 UART: Caliptra RT
3,534,784 UART: [state] CFI Enabled
3,655,333 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,093 UART: [rt]cmd =0x50435251, len=36
3,853,549 >>> mbox cmd response data (1848 bytes)
3,853,550 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,883,289 UART: [rt]cmd =0x50435245, len=56
3,886,890 >>> mbox cmd response data (8 bytes)
3,886,891 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,916,438 UART: [rt]cmd =0x50435251, len=36
4,084,168 >>> mbox cmd response data (1848 bytes)
4,084,169 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,113,718 UART: [rt]cmd =0x50435245, len=56
4,117,429 >>> mbox cmd response data (8 bytes)
4,117,430 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,146,829 UART: [rt]cmd =0x50435251, len=36
4,314,091 >>> mbox cmd response data (1848 bytes)
4,314,092 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,343,581 UART: [rt]cmd =0x50435245, len=56
4,347,204 >>> mbox cmd response data (8 bytes)
4,347,205 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,376,726 UART: [rt]cmd =0x50435251, len=36
4,543,702 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,137 ready_for_fw is high
1,362,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,754 >>> mbox cmd response: success
2,979,754 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,041,503 UART:
3,041,519 UART: Running Caliptra FMC ...
3,041,927 UART:
3,041,981 UART: [state] CFI Enabled
3,052,141 UART: [fht] FMC Alias Private Key: 7
3,170,757 UART: [art] Extend RT PCRs Done
3,171,185 UART: [art] Lock RT PCRs Done
3,172,605 UART: [art] Populate DV Done
3,180,872 UART: [fht] FMC Alias Private Key: 7
3,181,802 UART: [art] Derive CDI
3,182,082 UART: [art] Store in slot 0x4
3,268,012 UART: [art] Derive Key Pair
3,268,372 UART: [art] Store priv key in slot 0x5
3,281,497 UART: [art] Derive Key Pair - Done
3,295,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,093 UART: [art] PUB.X = D0798EC73B590FB28BFE439974AB77F542D9CDE51DAE97A8093E1E7BBDDF686F56B94540FDDE99C37F10E2A6351B078E
3,318,870 UART: [art] PUB.Y = E821F46EE347DFEB18AC27C6D7FDAB1B7C429859546B5D14C143BABE9FC510BA9038E00C650AA916EA0812EC6228DF11
3,325,827 UART: [art] SIG.R = 800BC3B32C173CA50A45914C261061B1726C5D4370477D75AEB17F80DF31A600663AF3FBB349C13436A65C58482BFAF6
3,332,569 UART: [art] SIG.S = 484240B827635BFF3D8FE94E618909772D1460EE0691178D7FB5C273658BE21C0D5736D9CAB83FAD59AE1F0B39100AFD
3,356,354 UART: Caliptra RT
3,356,605 UART: [state] CFI Enabled
3,477,899 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,627 UART: [rt]cmd =0x50435251, len=36
3,676,047 >>> mbox cmd response data (1848 bytes)
3,676,048 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,705,569 UART: [rt]cmd =0x50435245, len=56
3,709,084 >>> mbox cmd response data (8 bytes)
3,709,085 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,908 UART: [rt]cmd =0x50435251, len=36
3,906,412 >>> mbox cmd response data (1848 bytes)
3,906,413 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,936,218 UART: [rt]cmd =0x50435245, len=56
3,939,653 >>> mbox cmd response data (8 bytes)
3,939,654 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,969,153 UART: [rt]cmd =0x50435251, len=36
4,136,691 >>> mbox cmd response data (1848 bytes)
4,136,692 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,166,231 UART: [rt]cmd =0x50435245, len=56
4,169,760 >>> mbox cmd response data (8 bytes)
4,169,761 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,199,556 UART: [rt]cmd =0x50435251, len=36
4,366,882 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,428 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,972 UART: [kat] SHA2-256
881,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,018 UART: [kat] ++
886,170 UART: [kat] sha1
890,316 UART: [kat] SHA2-256
892,254 UART: [kat] SHA2-384
895,149 UART: [kat] SHA2-512-ACC
897,050 UART: [kat] ECC-384
902,717 UART: [kat] HMAC-384Kdf
907,529 UART: [kat] LMS
1,475,725 UART: [kat] --
1,476,394 UART: [cold-reset] ++
1,476,842 UART: [fht] Storing FHT @ 0x50003400
1,479,623 UART: [idev] ++
1,479,791 UART: [idev] CDI.KEYID = 6
1,480,151 UART: [idev] SUBJECT.KEYID = 7
1,480,575 UART: [idev] UDS.KEYID = 0
1,480,920 ready_for_fw is high
1,480,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,653 UART: [idev] Erasing UDS.KEYID = 0
1,505,259 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,017 UART: [idev] --
1,515,008 UART: [ldev] ++
1,515,176 UART: [ldev] CDI.KEYID = 6
1,515,539 UART: [ldev] SUBJECT.KEYID = 5
1,515,965 UART: [ldev] AUTHORITY.KEYID = 7
1,516,428 UART: [ldev] FE.KEYID = 1
1,521,688 UART: [ldev] Erasing FE.KEYID = 1
1,547,825 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,981 UART: [ldev] --
1,587,380 UART: [fwproc] Waiting for Commands...
1,588,167 UART: [fwproc] Received command 0x46574c44
1,588,958 UART: [fwproc] Received Image of size 118548 bytes
2,933,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,134 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,352 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,747 >>> mbox cmd response: success
3,132,747 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,133,769 UART: [afmc] ++
3,133,937 UART: [afmc] CDI.KEYID = 6
3,134,299 UART: [afmc] SUBJECT.KEYID = 7
3,134,724 UART: [afmc] AUTHORITY.KEYID = 5
3,170,337 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,635 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,415 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,124 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,007 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,690 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,584 UART: [afmc] --
3,213,464 UART: [cold-reset] --
3,214,154 UART: [state] Locking Datavault
3,215,319 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,923 UART: [state] Locking ICCM
3,216,585 UART: [exit] Launching FMC @ 0x40000130
3,221,915 UART:
3,221,931 UART: Running Caliptra FMC ...
3,222,339 UART:
3,222,482 UART: [state] CFI Enabled
3,232,804 UART: [fht] FMC Alias Private Key: 7
3,351,898 UART: [art] Extend RT PCRs Done
3,352,326 UART: [art] Lock RT PCRs Done
3,354,190 UART: [art] Populate DV Done
3,362,371 UART: [fht] FMC Alias Private Key: 7
3,363,489 UART: [art] Derive CDI
3,363,769 UART: [art] Store in slot 0x4
3,449,469 UART: [art] Derive Key Pair
3,449,829 UART: [art] Store priv key in slot 0x5
3,463,288 UART: [art] Derive Key Pair - Done
3,478,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,414 UART: [art] PUB.X = 80B94061D5822058ACD1FD5C1B5ED4EEADE860EAADBDBDBF0DB0B75EFA0B0555E3DA5A1C1BB16AAEEA71B4316B3F20AD
3,501,213 UART: [art] PUB.Y = E591912806A440A26100B3D8C31C4C991B21014B748EABB25491A421A95A93C1A7F7BA32BAB42B205E3F61294871894D
3,508,131 UART: [art] SIG.R = 7AD5C4DAE19F084C87DD0A709A4A77E83EAA2B06BA67194D04DA469899722050F406DEC070532BA88DB3326342B0C406
3,514,887 UART: [art] SIG.S = 1BC8FB8604DEF16DF58C1772A2561A15EFC0468EEA2B30F3E35AE1B5696F489418C7924BDDDBFBBE7D76567F1DE4A122
3,539,056 UART: Caliptra RT
3,539,399 UART: [state] CFI Enabled
3,659,064 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,486 UART: [rt]cmd =0x50435251, len=36
3,856,966 >>> mbox cmd response data (1848 bytes)
3,856,967 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,738 UART: [rt]cmd =0x50435245, len=56
3,890,157 >>> mbox cmd response data (8 bytes)
3,890,158 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,919,737 UART: [rt]cmd =0x50435251, len=36
4,086,897 >>> mbox cmd response data (1848 bytes)
4,086,898 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,116,517 UART: [rt]cmd =0x50435245, len=56
4,120,202 >>> mbox cmd response data (8 bytes)
4,120,203 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,150,006 UART: [rt]cmd =0x50435251, len=36
4,317,294 >>> mbox cmd response data (1848 bytes)
4,317,295 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,347,120 UART: [rt]cmd =0x50435245, len=56
4,350,703 >>> mbox cmd response data (8 bytes)
4,350,704 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,380,133 UART: [rt]cmd =0x50435251, len=36
4,547,857 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,330 ready_for_fw is high
1,363,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,897 >>> mbox cmd response: success
2,980,897 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,043,108 UART:
3,043,124 UART: Running Caliptra FMC ...
3,043,532 UART:
3,043,675 UART: [state] CFI Enabled
3,054,457 UART: [fht] FMC Alias Private Key: 7
3,173,013 UART: [art] Extend RT PCRs Done
3,173,441 UART: [art] Lock RT PCRs Done
3,175,023 UART: [art] Populate DV Done
3,183,368 UART: [fht] FMC Alias Private Key: 7
3,184,512 UART: [art] Derive CDI
3,184,792 UART: [art] Store in slot 0x4
3,270,690 UART: [art] Derive Key Pair
3,271,050 UART: [art] Store priv key in slot 0x5
3,284,825 UART: [art] Derive Key Pair - Done
3,299,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,300 UART: [art] PUB.X = C65717BBC9FEE0B3023B72C6B101111E6C460754626B4481BF81B938D36B11BF4AD410CE4F9EE6B1DB98C5AD6A8BF086
3,322,073 UART: [art] PUB.Y = 683948A98B6EB5F98FD52531DFA67AF3076C05AFFFBA6BE1D07F911C5DEC2887726C6F65D2F78B5E9B671F623EF56607
3,329,026 UART: [art] SIG.R = 165C3CC5A5E86A6BDA2762485C92D7F0FF872A1CAF158275F9C71B71BE0613899807E5C21C43385B7D5CE2E144BC9666
3,335,794 UART: [art] SIG.S = A82AC728491FDC7A2F819D501B8BA358307FAFD73798C73D5D1CFD8379845CD8B6875F3179B4F1F3A6EDD335AAAAAE59
3,359,392 UART: Caliptra RT
3,359,735 UART: [state] CFI Enabled
3,480,259 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,961 UART: [rt]cmd =0x50435251, len=36
3,678,327 >>> mbox cmd response data (1848 bytes)
3,678,328 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,707,881 UART: [rt]cmd =0x50435245, len=56
3,711,158 >>> mbox cmd response data (8 bytes)
3,711,159 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,740,694 UART: [rt]cmd =0x50435251, len=36
3,908,156 >>> mbox cmd response data (1848 bytes)
3,908,157 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,937,974 UART: [rt]cmd =0x50435245, len=56
3,941,555 >>> mbox cmd response data (8 bytes)
3,941,556 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,971,105 UART: [rt]cmd =0x50435251, len=36
4,138,709 >>> mbox cmd response data (1848 bytes)
4,138,710 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,168,773 UART: [rt]cmd =0x50435245, len=56
4,172,550 >>> mbox cmd response data (8 bytes)
4,172,551 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,202,080 UART: [rt]cmd =0x50435251, len=36
4,369,402 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,750 UART: [state] LifecycleState = Unprovisioned
85,405 UART: [state] DebugLocked = No
85,961 UART: [state] WD Timer not started. Device not locked for debugging
87,282 UART: [kat] SHA2-256
890,832 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,936 UART: [kat] ++
895,088 UART: [kat] sha1
899,300 UART: [kat] SHA2-256
901,240 UART: [kat] SHA2-384
904,039 UART: [kat] SHA2-512-ACC
905,940 UART: [kat] ECC-384
915,333 UART: [kat] HMAC-384Kdf
919,803 UART: [kat] LMS
1,168,115 UART: [kat] --
1,168,946 UART: [cold-reset] ++
1,169,514 UART: [fht] FHT @ 0x50003400
1,172,164 UART: [idev] ++
1,172,332 UART: [idev] CDI.KEYID = 6
1,172,693 UART: [idev] SUBJECT.KEYID = 7
1,173,118 UART: [idev] UDS.KEYID = 0
1,173,464 ready_for_fw is high
1,173,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,251 UART: [idev] Erasing UDS.KEYID = 0
1,198,205 UART: [idev] Sha1 KeyId Algorithm
1,206,901 UART: [idev] --
1,207,764 UART: [ldev] ++
1,207,932 UART: [ldev] CDI.KEYID = 6
1,208,296 UART: [ldev] SUBJECT.KEYID = 5
1,208,723 UART: [ldev] AUTHORITY.KEYID = 7
1,209,186 UART: [ldev] FE.KEYID = 1
1,214,380 UART: [ldev] Erasing FE.KEYID = 1
1,240,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,744 UART: [ldev] --
1,280,003 UART: [fwproc] Wait for Commands...
1,280,578 UART: [fwproc] Recv command 0x46574c44
1,281,311 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,286 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,461 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,672 >>> mbox cmd response: success
2,825,672 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,826,712 UART: [afmc] ++
2,826,880 UART: [afmc] CDI.KEYID = 6
2,827,243 UART: [afmc] SUBJECT.KEYID = 7
2,827,669 UART: [afmc] AUTHORITY.KEYID = 5
2,863,266 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,404 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,114 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,995 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,696 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,479 UART: [afmc] --
2,906,402 UART: [cold-reset] --
2,907,122 UART: [state] Locking Datavault
2,908,309 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,913 UART: [state] Locking ICCM
2,909,401 UART: [exit] Launching FMC @ 0x40000130
2,914,731 UART:
2,914,747 UART: Running Caliptra FMC ...
2,915,155 UART:
2,915,209 UART: [state] CFI Enabled
2,925,843 UART: [fht] FMC Alias Private Key: 7
3,044,009 UART: [art] Extend RT PCRs Done
3,044,437 UART: [art] Lock RT PCRs Done
3,045,875 UART: [art] Populate DV Done
3,053,986 UART: [fht] FMC Alias Private Key: 7
3,055,006 UART: [art] Derive CDI
3,055,286 UART: [art] Store in slot 0x4
3,141,231 UART: [art] Derive Key Pair
3,141,591 UART: [art] Store priv key in slot 0x5
3,154,405 UART: [art] Derive Key Pair - Done
3,169,042 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,936 UART: [art] PUB.X = 35D35C3FABD42FA89305C17B975F8FEBA6990C1845DEF5D38439659A624ABFDEF199BA129D812FB34A5C9BD5D6F4DA96
3,191,718 UART: [art] PUB.Y = 930D0C5E238522F7F110D9DA8F4DC6B53D04914A32E71299659F49E13547BB1629B0EECE8C8479BD86A68A9102311EEE
3,198,658 UART: [art] SIG.R = 1C8D0CAE04179E2B772FE13A06FEE2A43DD3A37B6E277A86372A8DFA5CE36E83F1CD3D1DFEDCD1E63B61DD02B4EF2119
3,205,442 UART: [art] SIG.S = B3E6B96DFC77D9A8E4071399AFDB57D36C90F9EC630DA81CE21825A75C2F101EE8DD460AE878A4C51290C62A0D24ECDC
3,229,186 UART: Caliptra RT
3,229,437 UART: [state] CFI Enabled
3,349,902 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,492 UART: [rt]cmd =0x50435251, len=36
3,547,670 >>> mbox cmd response data (1848 bytes)
3,547,671 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,577,504 UART: [rt]cmd =0x50435245, len=56
3,581,131 >>> mbox cmd response data (8 bytes)
3,581,132 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,759 UART: [rt]cmd =0x50435251, len=36
3,778,149 >>> mbox cmd response data (1848 bytes)
3,778,150 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,807,741 UART: [rt]cmd =0x50435245, len=56
3,811,124 >>> mbox cmd response data (8 bytes)
3,811,125 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,648 UART: [rt]cmd =0x50435251, len=36
4,008,006 >>> mbox cmd response data (1848 bytes)
4,008,007 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,037,670 UART: [rt]cmd =0x50435245, len=56
4,040,897 >>> mbox cmd response data (8 bytes)
4,040,898 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,070,471 UART: [rt]cmd =0x50435251, len=36
4,237,981 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,416 ready_for_fw is high
1,059,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,700 >>> mbox cmd response: success
2,679,700 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,741,627 UART:
2,741,643 UART: Running Caliptra FMC ...
2,742,051 UART:
2,742,105 UART: [state] CFI Enabled
2,752,629 UART: [fht] FMC Alias Private Key: 7
2,871,029 UART: [art] Extend RT PCRs Done
2,871,457 UART: [art] Lock RT PCRs Done
2,872,889 UART: [art] Populate DV Done
2,881,008 UART: [fht] FMC Alias Private Key: 7
2,882,186 UART: [art] Derive CDI
2,882,466 UART: [art] Store in slot 0x4
2,968,723 UART: [art] Derive Key Pair
2,969,083 UART: [art] Store priv key in slot 0x5
2,982,307 UART: [art] Derive Key Pair - Done
2,996,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,964 UART: [art] PUB.X = C8D8F34AB6DC868119AA620926CA020C6CBE07AA54689AB6F1749AB1649E8A6C1F2558480349FE18FB1352E51139E5B5
3,019,723 UART: [art] PUB.Y = 6F39AD3CB29682AC4B82127649B4858E7051A56C085A107D4ECE0BD387E34D8286B899B67A506370ED3252F631D84D3A
3,026,665 UART: [art] SIG.R = 81024AE2DD73C79271BF98C56BD860659DE32FFE3825579B03C4E6EA7A1593398ED749A4820F888DFB87C369121F045F
3,033,423 UART: [art] SIG.S = 546BE18EBB622EC6A9F73213D65655C018AAAECE0D96486BDE2B355F80521C3361267A8FFAAB6D41422EE9DA2A0C7D00
3,056,829 UART: Caliptra RT
3,057,080 UART: [state] CFI Enabled
3,177,537 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,985 UART: [rt]cmd =0x50435251, len=36
3,375,561 >>> mbox cmd response data (1848 bytes)
3,375,562 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,405,285 UART: [rt]cmd =0x50435245, len=56
3,408,836 >>> mbox cmd response data (8 bytes)
3,408,837 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,568 UART: [rt]cmd =0x50435251, len=36
3,605,948 >>> mbox cmd response data (1848 bytes)
3,605,949 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,672 UART: [rt]cmd =0x50435245, len=56
3,639,151 >>> mbox cmd response data (8 bytes)
3,639,152 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,775 UART: [rt]cmd =0x50435251, len=36
3,836,111 >>> mbox cmd response data (1848 bytes)
3,836,112 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,865,881 UART: [rt]cmd =0x50435245, len=56
3,869,596 >>> mbox cmd response data (8 bytes)
3,869,597 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,252 UART: [rt]cmd =0x50435251, len=36
4,066,448 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,458 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
891,229 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,497 UART: [kat] SHA2-256
901,437 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,900 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,299 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,174,285 ready_for_fw is high
1,174,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,700 UART: [idev] Erasing UDS.KEYID = 0
1,198,924 UART: [idev] Sha1 KeyId Algorithm
1,207,696 UART: [idev] --
1,208,657 UART: [ldev] ++
1,208,825 UART: [ldev] CDI.KEYID = 6
1,209,189 UART: [ldev] SUBJECT.KEYID = 5
1,209,616 UART: [ldev] AUTHORITY.KEYID = 7
1,210,079 UART: [ldev] FE.KEYID = 1
1,215,515 UART: [ldev] Erasing FE.KEYID = 1
1,241,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,461 UART: [ldev] --
1,280,754 UART: [fwproc] Wait for Commands...
1,281,565 UART: [fwproc] Recv command 0x46574c44
1,282,298 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,030 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,205 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,556 >>> mbox cmd response: success
2,824,556 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,825,690 UART: [afmc] ++
2,825,858 UART: [afmc] CDI.KEYID = 6
2,826,221 UART: [afmc] SUBJECT.KEYID = 7
2,826,647 UART: [afmc] AUTHORITY.KEYID = 5
2,862,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,804 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,514 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,395 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,096 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,801 UART: [afmc] --
2,905,642 UART: [cold-reset] --
2,906,462 UART: [state] Locking Datavault
2,907,719 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,323 UART: [state] Locking ICCM
2,908,871 UART: [exit] Launching FMC @ 0x40000130
2,914,201 UART:
2,914,217 UART: Running Caliptra FMC ...
2,914,625 UART:
2,914,768 UART: [state] CFI Enabled
2,925,454 UART: [fht] FMC Alias Private Key: 7
3,044,170 UART: [art] Extend RT PCRs Done
3,044,598 UART: [art] Lock RT PCRs Done
3,045,970 UART: [art] Populate DV Done
3,054,203 UART: [fht] FMC Alias Private Key: 7
3,055,381 UART: [art] Derive CDI
3,055,661 UART: [art] Store in slot 0x4
3,141,634 UART: [art] Derive Key Pair
3,141,994 UART: [art] Store priv key in slot 0x5
3,155,628 UART: [art] Derive Key Pair - Done
3,170,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,767 UART: [art] PUB.X = D312C5040B83C22A0128AC3D1C7FA09E3582C9DACA4D71F79E8E1C68E6AAD7CDAFE1D1D84DC413C3B4F8D23520D43F40
3,193,548 UART: [art] PUB.Y = 3D075DF08CF459846BC0174C51CAB2E208F6F09E9AD205DD0BE0CCAAF88202B2CF050BDDAE22032A6024C5FEBFEEA2FB
3,200,502 UART: [art] SIG.R = C6414E38A2654A5206D981896D2E07F00A36736852AFB7595AE498C6B14D00010D30D3AE47ADC01832F65A97F859853E
3,207,229 UART: [art] SIG.S = AAF62A037C55A2515F0BBD85359E7C23984D90919342261EB712F040D8FC4F097E9B321D966D72A4E5D92AA182BEEE17
3,231,020 UART: Caliptra RT
3,231,363 UART: [state] CFI Enabled
3,350,875 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,589 UART: [rt]cmd =0x50435251, len=36
3,549,169 >>> mbox cmd response data (1848 bytes)
3,549,170 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,578,853 UART: [rt]cmd =0x50435245, len=56
3,582,472 >>> mbox cmd response data (8 bytes)
3,582,473 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,904 UART: [rt]cmd =0x50435251, len=36
3,779,246 >>> mbox cmd response data (1848 bytes)
3,779,247 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,808,914 UART: [rt]cmd =0x50435245, len=56
3,812,567 >>> mbox cmd response data (8 bytes)
3,812,568 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,221 UART: [rt]cmd =0x50435251, len=36
4,009,349 >>> mbox cmd response data (1848 bytes)
4,009,350 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,038,811 UART: [rt]cmd =0x50435245, len=56
4,042,354 >>> mbox cmd response data (8 bytes)
4,042,355 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,071,984 UART: [rt]cmd =0x50435251, len=36
4,239,474 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,787 ready_for_fw is high
1,059,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,433 >>> mbox cmd response: success
2,677,433 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,739,224 UART:
2,739,240 UART: Running Caliptra FMC ...
2,739,648 UART:
2,739,791 UART: [state] CFI Enabled
2,750,067 UART: [fht] FMC Alias Private Key: 7
2,869,431 UART: [art] Extend RT PCRs Done
2,869,859 UART: [art] Lock RT PCRs Done
2,871,471 UART: [art] Populate DV Done
2,879,622 UART: [fht] FMC Alias Private Key: 7
2,880,746 UART: [art] Derive CDI
2,881,026 UART: [art] Store in slot 0x4
2,967,007 UART: [art] Derive Key Pair
2,967,367 UART: [art] Store priv key in slot 0x5
2,980,447 UART: [art] Derive Key Pair - Done
2,994,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,861 UART: [art] PUB.X = 3F28A290E7D9C616FC005F0B49AB6783CFAF9B20D02930A7C8D70981D69EC7FB744E40B3CDA8479D0300AD2C70AC74FF
3,017,592 UART: [art] PUB.Y = A4034ABDEE3D52DC63986B7EC23EB11DE1DF7F1BEFB5CBC013A358E99A551C0CE3C24280D9B12565608CC976C70E5065
3,024,549 UART: [art] SIG.R = 698832F4D5057BC29D91584CD3B5B2F0EF04F5B3E53A2B8BE47F13FA1BA038F54A910534483EF3F02FF2DA0C38828B7D
3,031,317 UART: [art] SIG.S = 50B8DE1BB9499C2AE06D0D03CCBFAC4AB249855385DF5673BE8DC61BC0C45C2BDF44C154C1C57150D8BD5E379734361F
3,055,545 UART: Caliptra RT
3,055,888 UART: [state] CFI Enabled
3,175,280 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,190 UART: [rt]cmd =0x50435251, len=36
3,373,510 >>> mbox cmd response data (1848 bytes)
3,373,511 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,403,144 UART: [rt]cmd =0x50435245, len=56
3,406,745 >>> mbox cmd response data (8 bytes)
3,406,746 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,209 UART: [rt]cmd =0x50435251, len=36
3,603,863 >>> mbox cmd response data (1848 bytes)
3,603,864 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,633,357 UART: [rt]cmd =0x50435245, len=56
3,636,730 >>> mbox cmd response data (8 bytes)
3,636,731 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,436 UART: [rt]cmd =0x50435251, len=36
3,833,600 >>> mbox cmd response data (1848 bytes)
3,833,601 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,863,236 UART: [rt]cmd =0x50435245, len=56
3,866,795 >>> mbox cmd response data (8 bytes)
3,866,796 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,896,493 UART: [rt]cmd =0x50435251, len=36
4,063,495 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
893,148 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,273 UART: [kat] ++
897,425 UART: [kat] sha1
901,617 UART: [kat] SHA2-256
903,557 UART: [kat] SHA2-384
906,300 UART: [kat] SHA2-512-ACC
908,201 UART: [kat] ECC-384
918,006 UART: [kat] HMAC-384Kdf
922,496 UART: [kat] LMS
1,170,824 UART: [kat] --
1,171,805 UART: [cold-reset] ++
1,172,247 UART: [fht] FHT @ 0x50003400
1,174,972 UART: [idev] ++
1,175,140 UART: [idev] CDI.KEYID = 6
1,175,500 UART: [idev] SUBJECT.KEYID = 7
1,175,924 UART: [idev] UDS.KEYID = 0
1,176,269 ready_for_fw is high
1,176,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,174 UART: [idev] Erasing UDS.KEYID = 0
1,200,793 UART: [idev] Sha1 KeyId Algorithm
1,209,335 UART: [idev] --
1,210,251 UART: [ldev] ++
1,210,419 UART: [ldev] CDI.KEYID = 6
1,210,782 UART: [ldev] SUBJECT.KEYID = 5
1,211,208 UART: [ldev] AUTHORITY.KEYID = 7
1,211,671 UART: [ldev] FE.KEYID = 1
1,216,819 UART: [ldev] Erasing FE.KEYID = 1
1,243,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,065 UART: [ldev] --
1,282,368 UART: [fwproc] Wait for Commands...
1,283,170 UART: [fwproc] Recv command 0x46574c44
1,283,898 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,930 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,100 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,359 >>> mbox cmd response: success
2,827,359 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,828,417 UART: [afmc] ++
2,828,585 UART: [afmc] CDI.KEYID = 6
2,828,947 UART: [afmc] SUBJECT.KEYID = 7
2,829,372 UART: [afmc] AUTHORITY.KEYID = 5
2,864,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,498 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,207 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,090 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,791 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,443 UART: [afmc] --
2,908,435 UART: [cold-reset] --
2,909,233 UART: [state] Locking Datavault
2,910,294 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,898 UART: [state] Locking ICCM
2,911,488 UART: [exit] Launching FMC @ 0x40000130
2,916,818 UART:
2,916,834 UART: Running Caliptra FMC ...
2,917,242 UART:
2,917,296 UART: [state] CFI Enabled
2,927,678 UART: [fht] FMC Alias Private Key: 7
3,047,234 UART: [art] Extend RT PCRs Done
3,047,662 UART: [art] Lock RT PCRs Done
3,049,436 UART: [art] Populate DV Done
3,057,515 UART: [fht] FMC Alias Private Key: 7
3,058,595 UART: [art] Derive CDI
3,058,875 UART: [art] Store in slot 0x4
3,144,744 UART: [art] Derive Key Pair
3,145,104 UART: [art] Store priv key in slot 0x5
3,158,318 UART: [art] Derive Key Pair - Done
3,173,153 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,830 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,595 UART: [art] PUB.X = 6B8014826AB5C2E0FF8BBC57D64AA7872A01FDFD2F66D96F46F151E25E5694D63AA57B910A11254712AE49EAFE0CFD34
3,196,370 UART: [art] PUB.Y = 7CCC32169B1B27828E4D4F87655F697A2D43D244CA86A54FE57010586EAD84B24C3321FB7428EBCC758565943CB26F12
3,203,320 UART: [art] SIG.R = 216E21E57E234CD98278DBDCE23ED4A5711246AAEA7777430CC40184B0FF34DC8ECA7FEFD42ABBCD481432EA4BE85A59
3,210,104 UART: [art] SIG.S = 97CBF6A8C2C64B1A6F86199F9DCA48F3DCB15341E45ECEC917D2D70BA1B2CBB23256B03AD79A4C96FBB880770997B9FF
3,234,660 UART: Caliptra RT
3,234,911 UART: [state] CFI Enabled
3,353,898 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,586 UART: [rt]cmd =0x50435251, len=36
3,552,026 >>> mbox cmd response data (1848 bytes)
3,552,027 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,581,716 UART: [rt]cmd =0x50435245, len=56
3,585,139 >>> mbox cmd response data (8 bytes)
3,585,140 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,614,825 UART: [rt]cmd =0x50435251, len=36
3,781,999 >>> mbox cmd response data (1848 bytes)
3,782,000 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,811,621 UART: [rt]cmd =0x50435245, len=56
3,814,992 >>> mbox cmd response data (8 bytes)
3,814,993 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,724 UART: [rt]cmd =0x50435251, len=36
4,012,156 >>> mbox cmd response data (1848 bytes)
4,012,157 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,042,000 UART: [rt]cmd =0x50435245, len=56
4,045,791 >>> mbox cmd response data (8 bytes)
4,045,792 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,075,501 UART: [rt]cmd =0x50435251, len=36
4,243,041 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,455 ready_for_fw is high
1,060,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,772 >>> mbox cmd response: success
2,679,772 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,741,653 UART:
2,741,669 UART: Running Caliptra FMC ...
2,742,077 UART:
2,742,131 UART: [state] CFI Enabled
2,752,605 UART: [fht] FMC Alias Private Key: 7
2,871,499 UART: [art] Extend RT PCRs Done
2,871,927 UART: [art] Lock RT PCRs Done
2,873,595 UART: [art] Populate DV Done
2,881,728 UART: [fht] FMC Alias Private Key: 7
2,882,692 UART: [art] Derive CDI
2,882,972 UART: [art] Store in slot 0x4
2,968,357 UART: [art] Derive Key Pair
2,968,717 UART: [art] Store priv key in slot 0x5
2,981,725 UART: [art] Derive Key Pair - Done
2,996,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,572 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,337 UART: [art] PUB.X = ED57482639AF39B8B3A747F8DCE6E79000FF2C657555D5F24A87CE727ECFF7899E25FD6D90D33C65685B4D6937ED0E82
3,019,090 UART: [art] PUB.Y = F9BAA4E7538609DDA7D3467788B3B85D9E11AA41994C505DD2D387F03B0E7DEDD24FA77AEEC1233F492B0BE0FD365110
3,026,045 UART: [art] SIG.R = 66C47209ABF072B77392E55325846CE89D790AA4E0E20CE760D689B0E3FF1790D9E825ED8924BD6DBDF7F3B799302E33
3,032,810 UART: [art] SIG.S = 0BB86F9619048A4C9098F6468E4792989535F2C47DCBF910E3DAC7D3D77876F9A78888923732C1C7F8906B0FBE3D8D21
3,056,411 UART: Caliptra RT
3,056,662 UART: [state] CFI Enabled
3,175,496 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,326 UART: [rt]cmd =0x50435251, len=36
3,374,098 >>> mbox cmd response data (1848 bytes)
3,374,099 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,403,720 UART: [rt]cmd =0x50435245, len=56
3,407,045 >>> mbox cmd response data (8 bytes)
3,407,046 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,529 UART: [rt]cmd =0x50435251, len=36
3,603,753 >>> mbox cmd response data (1848 bytes)
3,603,754 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,633,245 UART: [rt]cmd =0x50435245, len=56
3,637,010 >>> mbox cmd response data (8 bytes)
3,637,011 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,734 UART: [rt]cmd =0x50435251, len=36
3,834,078 >>> mbox cmd response data (1848 bytes)
3,834,079 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,863,616 UART: [rt]cmd =0x50435245, len=56
3,867,135 >>> mbox cmd response data (8 bytes)
3,867,136 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,896,843 UART: [rt]cmd =0x50435251, len=36
4,064,369 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,031 UART: [state] LifecycleState = Unprovisioned
85,686 UART: [state] DebugLocked = No
86,246 UART: [state] WD Timer not started. Device not locked for debugging
87,371 UART: [kat] SHA2-256
893,021 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,146 UART: [kat] ++
897,298 UART: [kat] sha1
901,582 UART: [kat] SHA2-256
903,522 UART: [kat] SHA2-384
906,167 UART: [kat] SHA2-512-ACC
908,068 UART: [kat] ECC-384
918,069 UART: [kat] HMAC-384Kdf
922,841 UART: [kat] LMS
1,171,169 UART: [kat] --
1,172,014 UART: [cold-reset] ++
1,172,442 UART: [fht] FHT @ 0x50003400
1,175,003 UART: [idev] ++
1,175,171 UART: [idev] CDI.KEYID = 6
1,175,531 UART: [idev] SUBJECT.KEYID = 7
1,175,955 UART: [idev] UDS.KEYID = 0
1,176,300 ready_for_fw is high
1,176,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,539 UART: [idev] Erasing UDS.KEYID = 0
1,200,918 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,386 UART: [ldev] ++
1,210,554 UART: [ldev] CDI.KEYID = 6
1,210,917 UART: [ldev] SUBJECT.KEYID = 5
1,211,343 UART: [ldev] AUTHORITY.KEYID = 7
1,211,806 UART: [ldev] FE.KEYID = 1
1,216,960 UART: [ldev] Erasing FE.KEYID = 1
1,243,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,108 UART: [ldev] --
1,282,383 UART: [fwproc] Wait for Commands...
1,283,097 UART: [fwproc] Recv command 0x46574c44
1,283,825 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,997 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,167 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,366 >>> mbox cmd response: success
2,826,366 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,827,532 UART: [afmc] ++
2,827,700 UART: [afmc] CDI.KEYID = 6
2,828,062 UART: [afmc] SUBJECT.KEYID = 7
2,828,487 UART: [afmc] AUTHORITY.KEYID = 5
2,864,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,625 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,334 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,217 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,918 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,714 UART: [afmc] --
2,907,690 UART: [cold-reset] --
2,908,608 UART: [state] Locking Datavault
2,909,781 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,385 UART: [state] Locking ICCM
2,910,907 UART: [exit] Launching FMC @ 0x40000130
2,916,237 UART:
2,916,253 UART: Running Caliptra FMC ...
2,916,661 UART:
2,916,804 UART: [state] CFI Enabled
2,927,422 UART: [fht] FMC Alias Private Key: 7
3,046,126 UART: [art] Extend RT PCRs Done
3,046,554 UART: [art] Lock RT PCRs Done
3,048,296 UART: [art] Populate DV Done
3,056,567 UART: [fht] FMC Alias Private Key: 7
3,057,605 UART: [art] Derive CDI
3,057,885 UART: [art] Store in slot 0x4
3,143,796 UART: [art] Derive Key Pair
3,144,156 UART: [art] Store priv key in slot 0x5
3,157,966 UART: [art] Derive Key Pair - Done
3,172,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,747 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,512 UART: [art] PUB.X = 04121F59CCADF0FC187EABEF22B8E91335C001B1AE87075E9340A5B75EA612A25238D622152B05E967D6183C6D9FD2C9
3,195,276 UART: [art] PUB.Y = 3BBF5964B4939E6A97871FF4EAEE264ED66BD4972485538E854D56807AD77A302CBA501774C4EC6A98D9607816B3D0FE
3,202,230 UART: [art] SIG.R = 4594C1A2FF35600C91D9EFBD988D72137A151C5B18C6A455FD7149FF4356AB65682B31F706960A62D5DB86E7EFAAA0A0
3,208,999 UART: [art] SIG.S = C4A37928764B81BA622A4DB0F78C35A1CE90FCF107A3D026856274F2FB6635C5A0FFF1B0E4B6D2476F526269866A8DF1
3,232,244 UART: Caliptra RT
3,232,587 UART: [state] CFI Enabled
3,351,730 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,578 UART: [rt]cmd =0x50435251, len=36
3,550,246 >>> mbox cmd response data (1848 bytes)
3,550,247 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,579,802 UART: [rt]cmd =0x50435245, len=56
3,583,565 >>> mbox cmd response data (8 bytes)
3,583,566 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,175 UART: [rt]cmd =0x50435251, len=36
3,780,829 >>> mbox cmd response data (1848 bytes)
3,780,830 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,810,377 UART: [rt]cmd =0x50435245, len=56
3,814,272 >>> mbox cmd response data (8 bytes)
3,814,273 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,798 UART: [rt]cmd =0x50435251, len=36
4,011,130 >>> mbox cmd response data (1848 bytes)
4,011,131 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,040,672 UART: [rt]cmd =0x50435245, len=56
4,044,135 >>> mbox cmd response data (8 bytes)
4,044,136 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,073,669 UART: [rt]cmd =0x50435251, len=36
4,241,259 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,774 ready_for_fw is high
1,060,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,161 >>> mbox cmd response: success
2,680,161 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,742,534 UART:
2,742,550 UART: Running Caliptra FMC ...
2,742,958 UART:
2,743,101 UART: [state] CFI Enabled
2,753,871 UART: [fht] FMC Alias Private Key: 7
2,872,831 UART: [art] Extend RT PCRs Done
2,873,259 UART: [art] Lock RT PCRs Done
2,874,725 UART: [art] Populate DV Done
2,883,172 UART: [fht] FMC Alias Private Key: 7
2,884,100 UART: [art] Derive CDI
2,884,380 UART: [art] Store in slot 0x4
2,970,035 UART: [art] Derive Key Pair
2,970,395 UART: [art] Store priv key in slot 0x5
2,984,347 UART: [art] Derive Key Pair - Done
2,998,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,259 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,024 UART: [art] PUB.X = 2AB7DE496C1F7B9583116B62B6F954C8FA33328FE0FEA3DBDCBDCBF8542C08AA46B5E0573A532188CA87DC7BA6924E07
3,021,806 UART: [art] PUB.Y = 255F3C580E5DF0C36C242A79F8CC2465A6172ACC3C1D608A384F745B880DCB7126A79422A31B7832747C07D78245217F
3,028,743 UART: [art] SIG.R = DE01074B01CEECBC97B2CBA9904BD89B63A0681089CAB6380ADE33E49F689EC1695AABB70A6F9F85BD08DED000653AD8
3,035,493 UART: [art] SIG.S = 1524421EDE55B8530E79548E4C80C2FF799099C850F0239C02940D94F7888D6AF63BFA196E90FBE93AFB5BF8DB101BC2
3,058,958 UART: Caliptra RT
3,059,301 UART: [state] CFI Enabled
3,178,536 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,224 UART: [rt]cmd =0x50435251, len=36
3,376,436 >>> mbox cmd response data (1848 bytes)
3,376,437 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,230 UART: [rt]cmd =0x50435245, len=56
3,409,755 >>> mbox cmd response data (8 bytes)
3,409,756 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,619 UART: [rt]cmd =0x50435251, len=36
3,607,187 >>> mbox cmd response data (1848 bytes)
3,607,188 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,053 UART: [rt]cmd =0x50435245, len=56
3,640,778 >>> mbox cmd response data (8 bytes)
3,640,779 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,670,392 UART: [rt]cmd =0x50435251, len=36
3,837,778 >>> mbox cmd response data (1848 bytes)
3,837,779 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,867,322 UART: [rt]cmd =0x50435245, len=56
3,871,039 >>> mbox cmd response data (8 bytes)
3,871,040 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,529 UART: [rt]cmd =0x50435251, len=36
4,067,689 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,015 UART:
192,384 UART: Running Caliptra ROM ...
193,521 UART:
193,672 UART: [state] CFI Enabled
262,705 UART: [state] LifecycleState = Unprovisioned
264,618 UART: [state] DebugLocked = No
267,359 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,102 UART: [kat] SHA2-256
442,803 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,331 UART: [kat] ++
453,805 UART: [kat] sha1
464,684 UART: [kat] SHA2-256
467,348 UART: [kat] SHA2-384
473,479 UART: [kat] SHA2-512-ACC
475,845 UART: [kat] ECC-384
2,766,185 UART: [kat] HMAC-384Kdf
2,778,081 UART: [kat] LMS
3,968,371 UART: [kat] --
3,974,093 UART: [cold-reset] ++
3,975,182 UART: [fht] Storing FHT @ 0x50003400
3,987,163 UART: [idev] ++
3,987,736 UART: [idev] CDI.KEYID = 6
3,988,650 UART: [idev] SUBJECT.KEYID = 7
3,989,919 UART: [idev] UDS.KEYID = 0
3,990,982 ready_for_fw is high
3,991,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,293 UART: [idev] Erasing UDS.KEYID = 0
7,324,726 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,506 UART: [idev] --
7,352,907 UART: [ldev] ++
7,353,481 UART: [ldev] CDI.KEYID = 6
7,354,499 UART: [ldev] SUBJECT.KEYID = 5
7,355,657 UART: [ldev] AUTHORITY.KEYID = 7
7,356,889 UART: [ldev] FE.KEYID = 1
7,398,530 UART: [ldev] Erasing FE.KEYID = 1
10,731,014 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,528 UART: [ldev] --
13,093,923 UART: [fwproc] Waiting for Commands...
13,096,778 UART: [fwproc] Received command 0x46574c44
13,098,959 UART: [fwproc] Received Image of size 118548 bytes
17,199,818 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,848 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,343,022 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,672,224 >>> mbox cmd response: success
17,673,407 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,675,829 UART: [afmc] ++
17,676,414 UART: [afmc] CDI.KEYID = 6
17,677,351 UART: [afmc] SUBJECT.KEYID = 7
17,678,616 UART: [afmc] AUTHORITY.KEYID = 5
21,045,205 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,342,857 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,345,085 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,359,534 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,374,279 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,388,657 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,410,031 UART: [afmc] --
23,413,417 UART: [cold-reset] --
23,417,005 UART: [state] Locking Datavault
23,420,472 UART: [state] Locking PCR0, PCR1 and PCR31
23,422,172 UART: [state] Locking ICCM
23,423,328 UART: [exit] Launching FMC @ 0x40000130
23,431,730 UART:
23,431,964 UART: Running Caliptra FMC ...
23,433,017 UART:
23,433,171 UART: [state] CFI Enabled
23,502,739 UART: [fht] FMC Alias Private Key: 7
25,843,682 UART: [art] Extend RT PCRs Done
25,844,922 UART: [art] Lock RT PCRs Done
25,846,517 UART: [art] Populate DV Done
25,851,977 UART: [fht] FMC Alias Private Key: 7
25,853,454 UART: [art] Derive CDI
25,854,188 UART: [art] Store in slot 0x4
25,911,955 UART: [art] Derive Key Pair
25,912,996 UART: [art] Store priv key in slot 0x5
29,205,723 UART: [art] Derive Key Pair - Done
29,218,830 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,507,718 UART: [art] Erasing AUTHORITY.KEYID = 7
31,509,230 UART: [art] PUB.X = F38EC5582A52908610F95FFF230B8D7B79C05119004D76AB2C9690A37D62571CC41FD32D6BD32E486D2F1E298D36A68D
31,516,496 UART: [art] PUB.Y = 4EE93BD53FB002159C99039C11634322054D2BF7418531B0A54B0AF0C6D22EA3BB2029B63909A1C24B0429EECFC32258
31,523,698 UART: [art] SIG.R = ABCA03301292BA4953D114AD41533F46D24DFBD5F95B46BE9629382E4047F1999D6779A1FFFA3C1092939A99F2F7CCE6
31,531,108 UART: [art] SIG.S = 106CF31A1C23F854D72E010F7F39B515CFA8132D55E10535FFFFA20C0DDFC0A8FC09F7D85CF3AC8DEC60750940FA164F
32,836,438 UART: Caliptra RT
32,837,154 UART: [state] CFI Enabled
33,014,436 UART: [rt] RT listening for mailbox commands...
33,046,233 UART: [rt]cmd =0x50435245, len=56
33,047,884 >>> mbox cmd response: failed
33,048,203 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,078,304 UART: [rt]cmd =0x50435245, len=56
33,079,812 >>> mbox cmd response: failed
33,080,088 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,110,219 UART: [rt]cmd =0x50435245, len=56
33,111,863 >>> mbox cmd response: failed
33,112,114 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,142,132 UART: [rt]cmd =0x50435245, len=56
33,144,140 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,804,653 ready_for_fw is high
3,805,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,956,999 >>> mbox cmd response: success
17,958,162 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,649,423 UART:
23,649,844 UART: Running Caliptra FMC ...
23,651,057 UART:
23,651,236 UART: [state] CFI Enabled
23,702,179 UART: [fht] FMC Alias Private Key: 7
26,042,814 UART: [art] Extend RT PCRs Done
26,044,062 UART: [art] Lock RT PCRs Done
26,045,542 UART: [art] Populate DV Done
26,050,754 UART: [fht] FMC Alias Private Key: 7
26,052,299 UART: [art] Derive CDI
26,053,064 UART: [art] Store in slot 0x4
26,110,142 UART: [art] Derive Key Pair
26,111,208 UART: [art] Store priv key in slot 0x5
29,403,337 UART: [art] Derive Key Pair - Done
29,416,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,704,041 UART: [art] Erasing AUTHORITY.KEYID = 7
31,705,557 UART: [art] PUB.X = A85DD441B01EBBC522203878246C9FC0BEA580F8B3A412B8D138782CB3390A747E2481545EEA5AF8C0C77E6287675B33
31,712,810 UART: [art] PUB.Y = DAAA9D4C7CC5F7C476288572D8D591EABC95925BB0404F7488B9D13BA9582681DA19B10E4000B93FAA0E50511FDF01A1
31,720,075 UART: [art] SIG.R = BBDCC84A3809F60F648D15EB4225347E4D492FFB9F2D31A84550C94CE5DAD5443FB84D971A916735711858E0AC09B2B6
31,727,427 UART: [art] SIG.S = 35AFCD39A701EDC5EA8230ACE74C9F51654AEA0E5DEB3A9FE047B0E399A21C66C61308BE6F02AD65F33F3B15875B3B4B
33,032,423 UART: Caliptra RT
33,033,151 UART: [state] CFI Enabled
33,209,387 UART: [rt] RT listening for mailbox commands...
33,241,025 UART: [rt]cmd =0x50435245, len=56
33,242,730 >>> mbox cmd response: failed
33,243,029 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,273,137 UART: [rt]cmd =0x50435245, len=56
33,274,943 >>> mbox cmd response: failed
33,275,216 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,305,200 UART: [rt]cmd =0x50435245, len=56
33,306,830 >>> mbox cmd response: failed
33,307,091 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,337,386 UART: [rt]cmd =0x50435245, len=56
33,339,188 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,520 UART:
192,883 UART: Running Caliptra ROM ...
194,071 UART:
603,632 UART: [state] CFI Enabled
618,365 UART: [state] LifecycleState = Unprovisioned
620,309 UART: [state] DebugLocked = No
623,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,758 UART: [kat] SHA2-256
797,487 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,053 UART: [kat] ++
808,510 UART: [kat] sha1
818,458 UART: [kat] SHA2-256
821,109 UART: [kat] SHA2-384
826,692 UART: [kat] SHA2-512-ACC
829,058 UART: [kat] ECC-384
3,112,238 UART: [kat] HMAC-384Kdf
3,122,709 UART: [kat] LMS
4,312,802 UART: [kat] --
4,318,444 UART: [cold-reset] ++
4,320,305 UART: [fht] Storing FHT @ 0x50003400
4,332,417 UART: [idev] ++
4,332,974 UART: [idev] CDI.KEYID = 6
4,333,961 UART: [idev] SUBJECT.KEYID = 7
4,335,198 UART: [idev] UDS.KEYID = 0
4,336,188 ready_for_fw is high
4,336,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,325 UART: [idev] Erasing UDS.KEYID = 0
7,622,141 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,169 UART: [idev] --
7,647,275 UART: [ldev] ++
7,647,857 UART: [ldev] CDI.KEYID = 6
7,648,821 UART: [ldev] SUBJECT.KEYID = 5
7,650,031 UART: [ldev] AUTHORITY.KEYID = 7
7,651,258 UART: [ldev] FE.KEYID = 1
7,661,087 UART: [ldev] Erasing FE.KEYID = 1
10,948,893 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,823 UART: [ldev] --
13,313,248 UART: [fwproc] Waiting for Commands...
13,315,006 UART: [fwproc] Received command 0x46574c44
13,317,198 UART: [fwproc] Received Image of size 118548 bytes
17,417,088 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,344 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,510 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,896,548 >>> mbox cmd response: success
17,897,712 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,901,164 UART: [afmc] ++
17,901,745 UART: [afmc] CDI.KEYID = 6
17,902,647 UART: [afmc] SUBJECT.KEYID = 7
17,903,907 UART: [afmc] AUTHORITY.KEYID = 5
21,215,053 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,599 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,511,860 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,300 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,541,041 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,452 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,577,209 UART: [afmc] --
23,581,285 UART: [cold-reset] --
23,585,103 UART: [state] Locking Datavault
23,591,109 UART: [state] Locking PCR0, PCR1 and PCR31
23,592,856 UART: [state] Locking ICCM
23,595,483 UART: [exit] Launching FMC @ 0x40000130
23,603,869 UART:
23,604,097 UART: Running Caliptra FMC ...
23,605,196 UART:
23,605,347 UART: [state] CFI Enabled
23,613,709 UART: [fht] FMC Alias Private Key: 7
25,953,752 UART: [art] Extend RT PCRs Done
25,954,973 UART: [art] Lock RT PCRs Done
25,956,594 UART: [art] Populate DV Done
25,961,942 UART: [fht] FMC Alias Private Key: 7
25,963,635 UART: [art] Derive CDI
25,964,439 UART: [art] Store in slot 0x4
26,006,969 UART: [art] Derive Key Pair
26,007,986 UART: [art] Store priv key in slot 0x5
29,250,242 UART: [art] Derive Key Pair - Done
29,263,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,087 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,599 UART: [art] PUB.X = 56DFF95F59E62528ED2CA254EBA268C8136B585851F11DF4727B5848D9CA02D39C14A270EE0E1B9E4C6A96841B090E3D
31,551,875 UART: [art] PUB.Y = D313A5CC965ABE97BD7F352382134096A1E2D402D0BB8226E3574A614F463E15CD1D850B877F816AAC3066E3CAEB5FE0
31,559,129 UART: [art] SIG.R = 1DC6FD1F111BC3CCDED916A58844CAD04B1E661A683F0BD348587CE749B120D93FED76875078853C146CBF68B67A1D5B
31,566,526 UART: [art] SIG.S = 666A861E9927F4D520F7C1FCB35D9137609FBA51B6A0C607A938A31B163F543D62A94C12BD3FE8F76B44845748DAF6B2
32,871,753 UART: Caliptra RT
32,872,467 UART: [state] CFI Enabled
33,006,427 UART: [rt] RT listening for mailbox commands...
33,038,170 UART: [rt]cmd =0x50435245, len=56
33,040,202 >>> mbox cmd response: failed
33,040,525 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,070,781 UART: [rt]cmd =0x50435245, len=56
33,072,573 >>> mbox cmd response: failed
33,072,862 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,102,940 UART: [rt]cmd =0x50435245, len=56
33,104,744 >>> mbox cmd response: failed
33,104,997 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,135,126 UART: [rt]cmd =0x50435245, len=56
33,136,761 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,121,729 ready_for_fw is high
4,122,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,152,014 >>> mbox cmd response: success
18,153,755 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,793,007 UART:
23,793,448 UART: Running Caliptra FMC ...
23,794,563 UART:
23,794,714 UART: [state] CFI Enabled
23,802,122 UART: [fht] FMC Alias Private Key: 7
26,142,136 UART: [art] Extend RT PCRs Done
26,143,357 UART: [art] Lock RT PCRs Done
26,144,767 UART: [art] Populate DV Done
26,150,194 UART: [fht] FMC Alias Private Key: 7
26,151,729 UART: [art] Derive CDI
26,152,538 UART: [art] Store in slot 0x4
26,194,868 UART: [art] Derive Key Pair
26,195,934 UART: [art] Store priv key in slot 0x5
29,438,238 UART: [art] Derive Key Pair - Done
29,451,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,038 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,555 UART: [art] PUB.X = 149154D13A7D0AA7E269411F37BE4E962FBB05735D442EA1BD8ADE1EE4EB101D9ACB0B1A9DB44D2F69FF855C280BCB52
31,740,854 UART: [art] PUB.Y = A7465ACE124CEB3FB1923705902DFE5AEA1E53535E8D929FA415E42625AAA7F9CE3F5F9DA13C1393F9077521066C833B
31,748,105 UART: [art] SIG.R = C89E546C5B095C0AC427C606CD20E0E87C839FE024F24E349A0D401731F62B9C567584E3021AB19DBB149FB6B0D375B6
31,755,491 UART: [art] SIG.S = 1D0818E903BC91B4ECFC53DE33C96274BCC0C0DCAF3ACD459356DAC4739E7FA2466363454839789EFE481920D7FFCCAE
33,060,417 UART: Caliptra RT
33,061,132 UART: [state] CFI Enabled
33,194,636 UART: [rt] RT listening for mailbox commands...
33,226,094 UART: [rt]cmd =0x50435245, len=56
33,227,777 >>> mbox cmd response: failed
33,228,099 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,258,354 UART: [rt]cmd =0x50435245, len=56
33,260,102 >>> mbox cmd response: failed
33,260,379 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,290,563 UART: [rt]cmd =0x50435245, len=56
33,292,308 >>> mbox cmd response: failed
33,292,562 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,322,641 UART: [rt]cmd =0x50435245, len=56
33,324,370 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,182 UART:
192,538 UART: Running Caliptra ROM ...
193,725 UART:
193,876 UART: [state] CFI Enabled
263,950 UART: [state] LifecycleState = Unprovisioned
265,951 UART: [state] DebugLocked = No
268,057 UART: [state] WD Timer not started. Device not locked for debugging
271,949 UART: [kat] SHA2-256
451,570 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,379 UART: [kat] ++
462,861 UART: [kat] sha1
472,687 UART: [kat] SHA2-256
475,417 UART: [kat] SHA2-384
481,971 UART: [kat] SHA2-512-ACC
484,332 UART: [kat] ECC-384
2,947,502 UART: [kat] HMAC-384Kdf
2,972,108 UART: [kat] LMS
3,448,644 UART: [kat] --
3,452,322 UART: [cold-reset] ++
3,453,264 UART: [fht] FHT @ 0x50003400
3,464,876 UART: [idev] ++
3,465,444 UART: [idev] CDI.KEYID = 6
3,466,353 UART: [idev] SUBJECT.KEYID = 7
3,467,596 UART: [idev] UDS.KEYID = 0
3,468,589 ready_for_fw is high
3,468,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,950 UART: [idev] Erasing UDS.KEYID = 0
5,988,177 UART: [idev] Sha1 KeyId Algorithm
6,012,711 UART: [idev] --
6,018,921 UART: [ldev] ++
6,019,493 UART: [ldev] CDI.KEYID = 6
6,020,376 UART: [ldev] SUBJECT.KEYID = 5
6,021,642 UART: [ldev] AUTHORITY.KEYID = 7
6,022,871 UART: [ldev] FE.KEYID = 1
6,058,297 UART: [ldev] Erasing FE.KEYID = 1
8,567,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,790 UART: [ldev] --
10,374,555 UART: [fwproc] Wait for Commands...
10,377,629 UART: [fwproc] Recv command 0x46574c44
10,379,682 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,084 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,100 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,160 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,421 >>> mbox cmd response: success
14,346,510 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,350,284 UART: [afmc] ++
14,350,873 UART: [afmc] CDI.KEYID = 6
14,351,758 UART: [afmc] SUBJECT.KEYID = 7
14,353,030 UART: [afmc] AUTHORITY.KEYID = 5
16,892,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,393 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,175 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,207 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,806 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,687 UART: [afmc] --
18,696,731 UART: [cold-reset] --
18,701,248 UART: [state] Locking Datavault
18,705,739 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,490 UART: [state] Locking ICCM
18,710,122 UART: [exit] Launching FMC @ 0x40000130
18,718,521 UART:
18,718,750 UART: Running Caliptra FMC ...
18,719,849 UART:
18,720,006 UART: [state] CFI Enabled
18,776,969 UART: [fht] FMC Alias Private Key: 7
20,543,716 UART: [art] Extend RT PCRs Done
20,544,930 UART: [art] Lock RT PCRs Done
20,546,712 UART: [art] Populate DV Done
20,552,284 UART: [fht] FMC Alias Private Key: 7
20,553,873 UART: [art] Derive CDI
20,554,705 UART: [art] Store in slot 0x4
20,610,166 UART: [art] Derive Key Pair
20,611,210 UART: [art] Store priv key in slot 0x5
23,073,567 UART: [art] Derive Key Pair - Done
23,086,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,800,161 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,668 UART: [art] PUB.X = 80FE6A51ABBD1E8FDB16BAF4DB1D80A13CFF455BB216A3DAB5656AD7CDE0319C22B9624C3ED8E57724A145EA83C9B20B
24,808,967 UART: [art] PUB.Y = 219ACC1CDE507FF3598499A81CB93C37E4D686646EF86EFD205B78FFF47EE9C77A40CB30E5B23F0613208628C1FE036A
24,816,256 UART: [art] SIG.R = 4F55014B7EA90046046914CEECD8512A7880930C147FEA8069B488B875B76CEC92E7AA05FECDD4027EC6DED35ED311DB
24,823,644 UART: [art] SIG.S = F6682041786D799DAF87242944AB8778BD75A1474590694EB5CB027AFFF06D2AF82BE675F2CB41C787CDCB6DCB7F6611
25,802,219 UART: Caliptra RT
25,802,940 UART: [state] CFI Enabled
25,984,189 UART: [rt] RT listening for mailbox commands...
26,015,661 UART: [rt]cmd =0x50435245, len=56
26,017,311 >>> mbox cmd response: failed
26,017,629 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,047,739 UART: [rt]cmd =0x50435245, len=56
26,049,544 >>> mbox cmd response: failed
26,050,006 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,080,271 UART: [rt]cmd =0x50435245, len=56
26,081,814 >>> mbox cmd response: failed
26,082,077 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,112,210 UART: [rt]cmd =0x50435245, len=56
26,113,801 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,461,316 ready_for_fw is high
3,461,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,215,665 >>> mbox cmd response: success
14,216,773 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,512,915 UART:
18,513,295 UART: Running Caliptra FMC ...
18,514,434 UART:
18,514,586 UART: [state] CFI Enabled
18,579,549 UART: [fht] FMC Alias Private Key: 7
20,346,013 UART: [art] Extend RT PCRs Done
20,347,240 UART: [art] Lock RT PCRs Done
20,349,076 UART: [art] Populate DV Done
20,354,764 UART: [fht] FMC Alias Private Key: 7
20,356,439 UART: [art] Derive CDI
20,357,257 UART: [art] Store in slot 0x4
20,411,782 UART: [art] Derive Key Pair
20,412,800 UART: [art] Store priv key in slot 0x5
22,875,420 UART: [art] Derive Key Pair - Done
22,888,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,601,399 UART: [art] Erasing AUTHORITY.KEYID = 7
24,602,897 UART: [art] PUB.X = 7B8EB2A07343439F13A63CB383C89A124018E2D0400F1A795D6601FE487BAC62850959430E3DBDB3333593FAC1ED0496
24,610,148 UART: [art] PUB.Y = 3F57E928CBB65871B3E7B674DCE410656A4C9945A21ED1C5ABD143EB5AE1271DC62BE09809ECE0E8AA78190703EA7FA2
24,617,392 UART: [art] SIG.R = A799F9A39E8117DF8E9DE00BC09495C3566B880322ACC166FB2C7FF01A977A0CB3310EC95C01186171C0502B7051DFA9
24,624,789 UART: [art] SIG.S = 41C650CACD96A25D783EF122DAD70E8167C0993B9D923686836A3DC70701B6446C684512D93CE9B15DB1C6F6169B456E
25,604,048 UART: Caliptra RT
25,604,753 UART: [state] CFI Enabled
25,784,302 UART: [rt] RT listening for mailbox commands...
25,815,968 UART: [rt]cmd =0x50435245, len=56
25,817,907 >>> mbox cmd response: failed
25,818,225 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,848,534 UART: [rt]cmd =0x50435245, len=56
25,850,014 >>> mbox cmd response: failed
25,850,278 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,880,526 UART: [rt]cmd =0x50435245, len=56
25,882,135 >>> mbox cmd response: failed
25,882,399 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,912,583 UART: [rt]cmd =0x50435245, len=56
25,914,169 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,375 UART:
192,754 UART: Running Caliptra ROM ...
193,890 UART:
603,723 UART: [state] CFI Enabled
618,694 UART: [state] LifecycleState = Unprovisioned
620,570 UART: [state] DebugLocked = No
622,674 UART: [state] WD Timer not started. Device not locked for debugging
627,358 UART: [kat] SHA2-256
807,031 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,832 UART: [kat] ++
818,310 UART: [kat] sha1
829,401 UART: [kat] SHA2-256
832,127 UART: [kat] SHA2-384
837,979 UART: [kat] SHA2-512-ACC
840,369 UART: [kat] ECC-384
3,284,109 UART: [kat] HMAC-384Kdf
3,296,774 UART: [kat] LMS
3,773,279 UART: [kat] --
3,776,734 UART: [cold-reset] ++
3,777,682 UART: [fht] FHT @ 0x50003400
3,790,084 UART: [idev] ++
3,790,659 UART: [idev] CDI.KEYID = 6
3,791,641 UART: [idev] SUBJECT.KEYID = 7
3,792,889 UART: [idev] UDS.KEYID = 0
3,793,817 ready_for_fw is high
3,794,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,880 UART: [idev] Erasing UDS.KEYID = 0
6,276,915 UART: [idev] Sha1 KeyId Algorithm
6,300,383 UART: [idev] --
6,305,556 UART: [ldev] ++
6,306,144 UART: [ldev] CDI.KEYID = 6
6,307,060 UART: [ldev] SUBJECT.KEYID = 5
6,308,226 UART: [ldev] AUTHORITY.KEYID = 7
6,309,511 UART: [ldev] FE.KEYID = 1
6,323,291 UART: [ldev] Erasing FE.KEYID = 1
8,804,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,522,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,538,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,554,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,570,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,590,238 UART: [ldev] --
10,594,865 UART: [fwproc] Wait for Commands...
10,596,475 UART: [fwproc] Recv command 0x46574c44
10,598,522 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,386 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,419 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,110 >>> mbox cmd response: success
14,559,268 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,561,964 UART: [afmc] ++
14,562,550 UART: [afmc] CDI.KEYID = 6
14,563,491 UART: [afmc] SUBJECT.KEYID = 7
14,564,707 UART: [afmc] AUTHORITY.KEYID = 5
17,069,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,519 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,336 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,397 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,990 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,496 UART: [afmc] --
18,869,685 UART: [cold-reset] --
18,874,416 UART: [state] Locking Datavault
18,879,784 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,483 UART: [state] Locking ICCM
18,883,873 UART: [exit] Launching FMC @ 0x40000130
18,892,267 UART:
18,892,511 UART: Running Caliptra FMC ...
18,893,805 UART:
18,893,979 UART: [state] CFI Enabled
18,902,221 UART: [fht] FMC Alias Private Key: 7
20,668,478 UART: [art] Extend RT PCRs Done
20,669,701 UART: [art] Lock RT PCRs Done
20,671,410 UART: [art] Populate DV Done
20,676,886 UART: [fht] FMC Alias Private Key: 7
20,678,475 UART: [art] Derive CDI
20,679,212 UART: [art] Store in slot 0x4
20,721,859 UART: [art] Derive Key Pair
20,722,858 UART: [art] Store priv key in slot 0x5
23,150,295 UART: [art] Derive Key Pair - Done
23,163,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,837 UART: [art] Erasing AUTHORITY.KEYID = 7
24,871,327 UART: [art] PUB.X = 683D734772F32A055176E7DD10C784111CED380BCD3799657C4EEEE813B54082845452B7781CBFD73A4A742F344269F6
24,878,614 UART: [art] PUB.Y = 0E997E1B2ADE61BEF7076453E944B3268F3D42FFA74697DEA1704D92F339DB21AFA641CDF059F0EE7EC4AF2917174C7B
24,885,885 UART: [art] SIG.R = A88ECA2D8E521B7001084DDA160A65C62786E90628EE3A66628279E7EEF55121EE6E0E25DFBFA9395E977D46A3584D94
24,893,270 UART: [art] SIG.S = 040D37B37F3E26559CC77E38A28411D3E867C6AD28C8556E53A8EE66004D4324691C18E99BCF85F612D4EB354D91682A
25,872,727 UART: Caliptra RT
25,873,434 UART: [state] CFI Enabled
26,005,885 UART: [rt] RT listening for mailbox commands...
26,037,825 UART: [rt]cmd =0x50435245, len=56
26,039,531 >>> mbox cmd response: failed
26,039,832 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,069,927 UART: [rt]cmd =0x50435245, len=56
26,071,471 >>> mbox cmd response: failed
26,071,731 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,101,800 UART: [rt]cmd =0x50435245, len=56
26,103,584 >>> mbox cmd response: failed
26,103,850 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,133,931 UART: [rt]cmd =0x50435245, len=56
26,135,516 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
3,779,091 ready_for_fw is high
3,779,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,472 >>> mbox cmd response: success
14,447,688 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,693,714 UART:
18,694,086 UART: Running Caliptra FMC ...
18,695,290 UART:
18,695,461 UART: [state] CFI Enabled
18,703,509 UART: [fht] FMC Alias Private Key: 7
20,469,655 UART: [art] Extend RT PCRs Done
20,470,883 UART: [art] Lock RT PCRs Done
20,472,513 UART: [art] Populate DV Done
20,477,716 UART: [fht] FMC Alias Private Key: 7
20,479,307 UART: [art] Derive CDI
20,480,142 UART: [art] Store in slot 0x4
20,522,473 UART: [art] Derive Key Pair
20,523,475 UART: [art] Store priv key in slot 0x5
22,950,263 UART: [art] Derive Key Pair - Done
22,962,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,355 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,861 UART: [art] PUB.X = DF6418E0BD2DA5506439DBBECB3C23DD12896F2573819FBE5B3DE6953DEA36015B8868709B5F429E83F4DD820F9ECC08
24,678,174 UART: [art] PUB.Y = E4A9EEFE19DC1288C4A022CAED4D26F52CA633E526A8B85EC89ADDABF73E55EA536AE6F3ECE2226E42075D9F0EBB05FC
24,685,490 UART: [art] SIG.R = 68F5D984A6180904CED5060CB0B40B172CEBEEF24A5A3A00250C6C9697F66BE87C4FBDCF7749E4089EF843BB15641F19
24,692,840 UART: [art] SIG.S = C7A3819AFEAF272B78DFB2455F9AA99D002CC2DE86F63377ED753623E31C972DFC51CA14FF80C35B2ACC948355C5A81F
25,672,112 UART: Caliptra RT
25,672,827 UART: [state] CFI Enabled
25,806,022 UART: [rt] RT listening for mailbox commands...
25,837,970 UART: [rt]cmd =0x50435245, len=56
25,840,024 >>> mbox cmd response: failed
25,840,350 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,870,306 UART: [rt]cmd =0x50435245, len=56
25,871,848 >>> mbox cmd response: failed
25,872,157 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,902,133 UART: [rt]cmd =0x50435245, len=56
25,903,828 >>> mbox cmd response: failed
25,904,090 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,934,078 UART: [rt]cmd =0x50435245, len=56
25,935,976 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
191,970 UART:
192,333 UART: Running Caliptra ROM ...
193,414 UART:
193,558 UART: [state] CFI Enabled
264,679 UART: [state] LifecycleState = Unprovisioned
267,116 UART: [state] DebugLocked = No
269,708 UART: [state] WD Timer not started. Device not locked for debugging
273,894 UART: [kat] SHA2-256
463,793 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,543 UART: [kat] ++
474,989 UART: [kat] sha1
486,733 UART: [kat] SHA2-256
489,744 UART: [kat] SHA2-384
494,170 UART: [kat] SHA2-512-ACC
496,744 UART: [kat] ECC-384
2,946,577 UART: [kat] HMAC-384Kdf
2,971,149 UART: [kat] LMS
3,502,983 UART: [kat] --
3,506,770 UART: [cold-reset] ++
3,507,920 UART: [fht] FHT @ 0x50003400
3,519,818 UART: [idev] ++
3,520,517 UART: [idev] CDI.KEYID = 6
3,521,510 UART: [idev] SUBJECT.KEYID = 7
3,522,620 UART: [idev] UDS.KEYID = 0
3,523,601 ready_for_fw is high
3,523,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,934 UART: [idev] Erasing UDS.KEYID = 0
6,028,680 UART: [idev] Sha1 KeyId Algorithm
6,050,971 UART: [idev] --
6,056,102 UART: [ldev] ++
6,056,795 UART: [ldev] CDI.KEYID = 6
6,057,708 UART: [ldev] SUBJECT.KEYID = 5
6,058,919 UART: [ldev] AUTHORITY.KEYID = 7
6,060,096 UART: [ldev] FE.KEYID = 1
6,101,746 UART: [ldev] Erasing FE.KEYID = 1
8,606,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,462 UART: [ldev] --
10,413,880 UART: [fwproc] Wait for Commands...
10,415,695 UART: [fwproc] Recv command 0x46574c44
10,418,018 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,724 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,373 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,657 >>> mbox cmd response: success
14,672,783 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,674,933 UART: [afmc] ++
14,675,632 UART: [afmc] CDI.KEYID = 6
14,676,826 UART: [afmc] SUBJECT.KEYID = 7
14,678,181 UART: [afmc] AUTHORITY.KEYID = 5
17,215,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,601 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,710 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,857 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,732 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,244 UART: [afmc] --
19,034,335 UART: [cold-reset] --
19,037,926 UART: [state] Locking Datavault
19,041,878 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,068 UART: [state] Locking ICCM
19,046,862 UART: [exit] Launching FMC @ 0x40000130
19,055,523 UART:
19,055,759 UART: Running Caliptra FMC ...
19,056,857 UART:
19,057,013 UART: [state] CFI Enabled
19,117,393 UART: [fht] FMC Alias Private Key: 7
20,883,584 UART: [art] Extend RT PCRs Done
20,885,274 UART: [art] Lock RT PCRs Done
20,886,390 UART: [art] Populate DV Done
20,891,978 UART: [fht] FMC Alias Private Key: 7
20,893,452 UART: [art] Derive CDI
20,894,201 UART: [art] Store in slot 0x4
20,953,123 UART: [art] Derive Key Pair
20,954,164 UART: [art] Store priv key in slot 0x5
23,417,437 UART: [art] Derive Key Pair - Done
23,430,383 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,143,549 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,058 UART: [art] PUB.X = 61602A420E5A84E0B1DF606D3743E4D1F4A3372F19E7D684FE046183007B93E0DA2FF476426EB10D095D727F5421AE0D
25,152,290 UART: [art] PUB.Y = 6BCDD57E9F96C28D90942EEF6653496A660159C5E97ABAFD0ABE02EE1E420997561D19AE764E7AF4BEFBE791D2661144
25,159,541 UART: [art] SIG.R = 7230CDAACBBB18004C81BC72EC7E5EAA1F2DFAA9CF274584E3822E3CEFE22CC110878C0D9D8BF8FB27D52AF2A84BD890
25,166,956 UART: [art] SIG.S = ACA6DADB0FBFE8E80D5ADBD81AE6C6DBC9402859645FFD8CE219195EC7019FA9AF8507F49172DD2F621A2F23A4B58A70
26,145,830 UART: Caliptra RT
26,146,515 UART: [state] CFI Enabled
26,326,949 UART: [rt] RT listening for mailbox commands...
26,358,949 UART: [rt]cmd =0x50435245, len=56
26,360,712 >>> mbox cmd response: failed
26,361,094 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,391,602 UART: [rt]cmd =0x50435245, len=56
26,393,388 >>> mbox cmd response: failed
26,393,654 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,424,112 UART: [rt]cmd =0x50435245, len=56
26,425,804 >>> mbox cmd response: failed
26,426,065 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,456,202 UART: [rt]cmd =0x50435245, len=56
26,457,764 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
3,437,508 ready_for_fw is high
3,438,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,095 >>> mbox cmd response: success
14,826,361 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,102,982 UART:
19,103,377 UART: Running Caliptra FMC ...
19,104,531 UART:
19,104,693 UART: [state] CFI Enabled
19,170,712 UART: [fht] FMC Alias Private Key: 7
20,937,544 UART: [art] Extend RT PCRs Done
20,938,763 UART: [art] Lock RT PCRs Done
20,940,417 UART: [art] Populate DV Done
20,946,211 UART: [fht] FMC Alias Private Key: 7
20,947,748 UART: [art] Derive CDI
20,948,513 UART: [art] Store in slot 0x4
21,003,702 UART: [art] Derive Key Pair
21,004,747 UART: [art] Store priv key in slot 0x5
23,467,403 UART: [art] Derive Key Pair - Done
23,480,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,194,382 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,899 UART: [art] PUB.X = CC6F5477C20CE7027C2239DB0E470A4137735E7A153356D6A0647ABD5A207D7CC5A846ACC4BA68C63A66EB24F04E4A9F
25,203,159 UART: [art] PUB.Y = DC4C5989196839A5B48737FDD03C720C91AC25255C4A513D03B59ED891DE0B49F31FE1401F5128A12EDF44D119B4E47F
25,210,385 UART: [art] SIG.R = BD00D2EDCD73D3261C96314DCF7741C347E723D557B86230D554C26321B0670693DCDD86FE60641D54938ED2C7C484A8
25,217,784 UART: [art] SIG.S = 2DF4A6A239579D6090E508B09A8C245D26FDF2F7DFA5BECF38F941A409CCAEC90E8B8232ADF7B2163876F2446BEA027E
26,196,574 UART: Caliptra RT
26,197,286 UART: [state] CFI Enabled
26,377,550 UART: [rt] RT listening for mailbox commands...
26,409,443 UART: [rt]cmd =0x50435245, len=56
26,411,358 >>> mbox cmd response: failed
26,411,681 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,441,566 UART: [rt]cmd =0x50435245, len=56
26,443,238 >>> mbox cmd response: failed
26,443,505 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,473,697 UART: [rt]cmd =0x50435245, len=56
26,475,224 >>> mbox cmd response: failed
26,475,481 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,505,448 UART: [rt]cmd =0x50435245, len=56
26,507,240 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,586 UART:
192,951 UART: Running Caliptra ROM ...
194,159 UART:
603,694 UART: [state] CFI Enabled
618,264 UART: [state] LifecycleState = Unprovisioned
620,684 UART: [state] DebugLocked = No
622,661 UART: [state] WD Timer not started. Device not locked for debugging
626,573 UART: [kat] SHA2-256
816,473 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,279 UART: [kat] ++
827,798 UART: [kat] sha1
839,521 UART: [kat] SHA2-256
842,541 UART: [kat] SHA2-384
847,827 UART: [kat] SHA2-512-ACC
850,418 UART: [kat] ECC-384
3,294,111 UART: [kat] HMAC-384Kdf
3,306,847 UART: [kat] LMS
3,838,669 UART: [kat] --
3,845,034 UART: [cold-reset] ++
3,846,267 UART: [fht] FHT @ 0x50003400
3,858,601 UART: [idev] ++
3,859,318 UART: [idev] CDI.KEYID = 6
3,860,290 UART: [idev] SUBJECT.KEYID = 7
3,861,469 UART: [idev] UDS.KEYID = 0
3,862,376 ready_for_fw is high
3,862,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,427 UART: [idev] Erasing UDS.KEYID = 0
6,335,247 UART: [idev] Sha1 KeyId Algorithm
6,359,286 UART: [idev] --
6,363,986 UART: [ldev] ++
6,364,668 UART: [ldev] CDI.KEYID = 6
6,365,557 UART: [ldev] SUBJECT.KEYID = 5
6,366,767 UART: [ldev] AUTHORITY.KEYID = 7
6,368,006 UART: [ldev] FE.KEYID = 1
6,377,990 UART: [ldev] Erasing FE.KEYID = 1
8,855,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,159 UART: [ldev] --
10,648,448 UART: [fwproc] Wait for Commands...
10,650,160 UART: [fwproc] Recv command 0x46574c44
10,652,418 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,725 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,384 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,788 >>> mbox cmd response: success
14,918,972 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,922,149 UART: [afmc] ++
14,922,899 UART: [afmc] CDI.KEYID = 6
14,924,083 UART: [afmc] SUBJECT.KEYID = 7
14,925,521 UART: [afmc] AUTHORITY.KEYID = 5
17,429,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,153,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,155,577 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,170,678 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,185,848 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,200,716 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,225,943 UART: [afmc] --
19,229,918 UART: [cold-reset] --
19,235,351 UART: [state] Locking Datavault
19,241,525 UART: [state] Locking PCR0, PCR1 and PCR31
19,243,725 UART: [state] Locking ICCM
19,245,878 UART: [exit] Launching FMC @ 0x40000130
19,254,558 UART:
19,254,802 UART: Running Caliptra FMC ...
19,255,910 UART:
19,256,078 UART: [state] CFI Enabled
19,263,761 UART: [fht] FMC Alias Private Key: 7
21,030,313 UART: [art] Extend RT PCRs Done
21,031,540 UART: [art] Lock RT PCRs Done
21,033,662 UART: [art] Populate DV Done
21,039,190 UART: [fht] FMC Alias Private Key: 7
21,040,677 UART: [art] Derive CDI
21,041,451 UART: [art] Store in slot 0x4
21,083,885 UART: [art] Derive Key Pair
21,084,890 UART: [art] Store priv key in slot 0x5
23,511,532 UART: [art] Derive Key Pair - Done
23,524,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,231,207 UART: [art] Erasing AUTHORITY.KEYID = 7
25,232,712 UART: [art] PUB.X = 7675B762FCC20C7257181FD6092C907F3A62B50BB2E667BB5080972A24A69C6FD331C19477E9C1EAD2CD5129F7B32A10
25,239,975 UART: [art] PUB.Y = 3973D20CEAFDC665CEE8E5A1ED7B5827152C956A6A44FA15ECBF844F1624FB0D869E85A75F26BDB917ABB04E7C66DC49
25,247,276 UART: [art] SIG.R = 5F9F59C415F0A5D1E80D869F9BFEF88853D963B19C96BF8C7092ECC0E94E6E8522363E7F62B88A1AEE9AC455FDC3A59F
25,254,693 UART: [art] SIG.S = 6151AEF2FC960904572CF2EBC06CEFEF86965F4D1C8F9691FDA6F0F6550A7D68DFEB2412CBD3676FCCFF413E3D7A6BD7
26,233,331 UART: Caliptra RT
26,234,045 UART: [state] CFI Enabled
26,366,908 UART: [rt] RT listening for mailbox commands...
26,398,791 UART: [rt]cmd =0x50435245, len=56
26,400,469 >>> mbox cmd response: failed
26,400,791 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,431,059 UART: [rt]cmd =0x50435245, len=56
26,432,767 >>> mbox cmd response: failed
26,433,031 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,463,119 UART: [rt]cmd =0x50435245, len=56
26,464,912 >>> mbox cmd response: failed
26,465,177 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,495,366 UART: [rt]cmd =0x50435245, len=56
26,497,221 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,758,934 ready_for_fw is high
3,759,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,053,068 >>> mbox cmd response: success
15,054,354 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,301,509 UART:
19,301,883 UART: Running Caliptra FMC ...
19,302,998 UART:
19,303,152 UART: [state] CFI Enabled
19,311,331 UART: [fht] FMC Alias Private Key: 7
21,077,286 UART: [art] Extend RT PCRs Done
21,078,516 UART: [art] Lock RT PCRs Done
21,080,101 UART: [art] Populate DV Done
21,085,600 UART: [fht] FMC Alias Private Key: 7
21,087,205 UART: [art] Derive CDI
21,088,027 UART: [art] Store in slot 0x4
21,130,416 UART: [art] Derive Key Pair
21,131,422 UART: [art] Store priv key in slot 0x5
23,558,035 UART: [art] Derive Key Pair - Done
23,571,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,216 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,726 UART: [art] PUB.X = 21888C1053F625FA3E81153A36E93BBD1149DDB2DB6D8C8DD9C0A4696D12FD83BDB071E0CE4864D9C261F50E3BA01F54
25,286,035 UART: [art] PUB.Y = 17E88197B2D043604A266DBA66F2A328377B3A439198330B94D09F0C8EA59E8860BEF45DB3AB103D34161A87A7995F41
25,293,246 UART: [art] SIG.R = 80C52B35F15AF64E1BA8DD9A25C86DD3A6D0C3CE96BF3123DC166A38704783D30295087345E556FC8E3A6F0D776CAF0E
25,300,649 UART: [art] SIG.S = 59EBA8FD51306A6523F7112491FE3A112340DCEB96E9C3327FE566806E5C976C9158A644EC1AD510FBE5664683B110C2
26,279,828 UART: Caliptra RT
26,280,550 UART: [state] CFI Enabled
26,412,266 UART: [rt] RT listening for mailbox commands...
26,444,046 UART: [rt]cmd =0x50435245, len=56
26,445,786 >>> mbox cmd response: failed
26,446,098 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,476,350 UART: [rt]cmd =0x50435245, len=56
26,478,109 >>> mbox cmd response: failed
26,478,371 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,508,615 UART: [rt]cmd =0x50435245, len=56
26,510,527 >>> mbox cmd response: failed
26,510,784 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,540,815 UART: [rt]cmd =0x50435245, len=56
26,542,283 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,723 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,377 UART: [kat] SHA2-256
882,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,423 UART: [kat] ++
886,575 UART: [kat] sha1
890,745 UART: [kat] SHA2-256
892,683 UART: [kat] SHA2-384
895,398 UART: [kat] SHA2-512-ACC
897,299 UART: [kat] ECC-384
902,882 UART: [kat] HMAC-384Kdf
907,500 UART: [kat] LMS
1,475,696 UART: [kat] --
1,476,515 UART: [cold-reset] ++
1,476,875 UART: [fht] Storing FHT @ 0x50003400
1,479,720 UART: [idev] ++
1,479,888 UART: [idev] CDI.KEYID = 6
1,480,248 UART: [idev] SUBJECT.KEYID = 7
1,480,672 UART: [idev] UDS.KEYID = 0
1,481,017 ready_for_fw is high
1,481,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,510 UART: [idev] Erasing UDS.KEYID = 0
1,505,326 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,046 UART: [idev] --
1,515,167 UART: [ldev] ++
1,515,335 UART: [ldev] CDI.KEYID = 6
1,515,698 UART: [ldev] SUBJECT.KEYID = 5
1,516,124 UART: [ldev] AUTHORITY.KEYID = 7
1,516,587 UART: [ldev] FE.KEYID = 1
1,521,719 UART: [ldev] Erasing FE.KEYID = 1
1,546,908 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,678 UART: [ldev] --
1,586,165 UART: [fwproc] Waiting for Commands...
1,586,980 UART: [fwproc] Received command 0x46574c44
1,587,771 UART: [fwproc] Received Image of size 118548 bytes
2,932,451 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,931 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,149 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,382 >>> mbox cmd response: success
3,131,382 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,132,568 UART: [afmc] ++
3,132,736 UART: [afmc] CDI.KEYID = 6
3,133,098 UART: [afmc] SUBJECT.KEYID = 7
3,133,523 UART: [afmc] AUTHORITY.KEYID = 5
3,168,672 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,608 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,388 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,097 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,980 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,663 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,681 UART: [afmc] --
3,211,789 UART: [cold-reset] --
3,212,547 UART: [state] Locking Datavault
3,213,678 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,282 UART: [state] Locking ICCM
3,214,770 UART: [exit] Launching FMC @ 0x40000130
3,220,100 UART:
3,220,116 UART: Running Caliptra FMC ...
3,220,524 UART:
3,220,578 UART: [state] CFI Enabled
3,231,438 UART: [fht] FMC Alias Private Key: 7
3,349,874 UART: [art] Extend RT PCRs Done
3,350,302 UART: [art] Lock RT PCRs Done
3,351,690 UART: [art] Populate DV Done
3,360,109 UART: [fht] FMC Alias Private Key: 7
3,361,041 UART: [art] Derive CDI
3,361,321 UART: [art] Store in slot 0x4
3,447,275 UART: [art] Derive Key Pair
3,447,635 UART: [art] Store priv key in slot 0x5
3,460,900 UART: [art] Derive Key Pair - Done
3,475,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,816 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,581 UART: [art] PUB.X = CA8E6178D355D31BE2AB573ABE16F7157C04A1E4A6F53DFEED3171A908BF711B3D215A8481136E53FE9DF93DFDCAAEFE
3,498,369 UART: [art] PUB.Y = 107FAFC14F2971BEC01E0FB97F12C06E1F8378FB64A7DB4BF7CC1B309B2158100F7AE09C5A836434BE9F004925E1EDA3
3,505,305 UART: [art] SIG.R = 91CB176E538304AAB81740AEEE3DACA055F2CA8769110A0136FAA461D8293708E6C3C0F5E9756EB381B8E3DB5EDA980C
3,512,072 UART: [art] SIG.S = D6B4E1133658DEAEEBBF9D2768BC9DD20E1A3F2FDDA6712C3EE1ED74FE10B7470D47E1ADBE111F945A2A125A1D69F392
3,535,730 UART: Caliptra RT
3,535,981 UART: [state] CFI Enabled
3,657,138 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,736 UART: [rt]cmd =0x50435245, len=56
3,689,326 >>> mbox cmd response: failed
3,689,326 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,828 UART: [rt]cmd =0x50435245, len=56
3,720,276 >>> mbox cmd response: failed
3,720,276 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,749,922 UART: [rt]cmd =0x50435245, len=56
3,751,434 >>> mbox cmd response: failed
3,751,434 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,134 UART: [rt]cmd =0x50435245, len=56
3,782,476 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,213 ready_for_fw is high
1,363,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,802 >>> mbox cmd response: success
2,979,802 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,042,001 UART:
3,042,017 UART: Running Caliptra FMC ...
3,042,425 UART:
3,042,479 UART: [state] CFI Enabled
3,053,003 UART: [fht] FMC Alias Private Key: 7
3,172,523 UART: [art] Extend RT PCRs Done
3,172,951 UART: [art] Lock RT PCRs Done
3,174,475 UART: [art] Populate DV Done
3,182,502 UART: [fht] FMC Alias Private Key: 7
3,183,604 UART: [art] Derive CDI
3,183,884 UART: [art] Store in slot 0x4
3,269,632 UART: [art] Derive Key Pair
3,269,992 UART: [art] Store priv key in slot 0x5
3,282,851 UART: [art] Derive Key Pair - Done
3,297,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,646 UART: [art] PUB.X = 39FF7A0B5160B4236B60D8BA09218D41DEFD1F1A3BE92D6E39B5C9F6183F69E85299B32E0C1611DE124EA0E1B9745C7A
3,320,417 UART: [art] PUB.Y = C5A577467E65FE558518CC74092A52A317844CE7C3FE6CC78364366A7F616F8560C32961CBF0A53B61E62CD349E7BFF7
3,327,366 UART: [art] SIG.R = A949FBF29A248202D6DD88E0069F190F640747468886E8F7824C1A85ED148319CA3D08BD54F208F48BA2BED9D7C3A99A
3,334,122 UART: [art] SIG.S = FF1BEAD314A1370EA5C9B5A323604A23D1861BB0A9A61BB989520C8B3AD535293FDD0EA165B3A4827E2EDCC0E3B01583
3,358,603 UART: Caliptra RT
3,358,854 UART: [state] CFI Enabled
3,479,159 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,123 UART: [rt]cmd =0x50435245, len=56
3,511,425 >>> mbox cmd response: failed
3,511,425 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,015 UART: [rt]cmd =0x50435245, len=56
3,542,629 >>> mbox cmd response: failed
3,542,629 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,609 UART: [rt]cmd =0x50435245, len=56
3,573,893 >>> mbox cmd response: failed
3,573,893 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,515 UART: [rt]cmd =0x50435245, len=56
3,604,917 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,934 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,546 UART: [kat] SHA2-256
882,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,592 UART: [kat] ++
886,744 UART: [kat] sha1
890,878 UART: [kat] SHA2-256
892,816 UART: [kat] SHA2-384
895,629 UART: [kat] SHA2-512-ACC
897,530 UART: [kat] ECC-384
902,757 UART: [kat] HMAC-384Kdf
907,551 UART: [kat] LMS
1,475,747 UART: [kat] --
1,476,666 UART: [cold-reset] ++
1,477,094 UART: [fht] Storing FHT @ 0x50003400
1,480,083 UART: [idev] ++
1,480,251 UART: [idev] CDI.KEYID = 6
1,480,611 UART: [idev] SUBJECT.KEYID = 7
1,481,035 UART: [idev] UDS.KEYID = 0
1,481,380 ready_for_fw is high
1,481,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,239 UART: [idev] Erasing UDS.KEYID = 0
1,506,379 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,061 UART: [idev] --
1,515,870 UART: [ldev] ++
1,516,038 UART: [ldev] CDI.KEYID = 6
1,516,401 UART: [ldev] SUBJECT.KEYID = 5
1,516,827 UART: [ldev] AUTHORITY.KEYID = 7
1,517,290 UART: [ldev] FE.KEYID = 1
1,522,548 UART: [ldev] Erasing FE.KEYID = 1
1,548,231 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,215 UART: [ldev] --
1,587,576 UART: [fwproc] Waiting for Commands...
1,588,377 UART: [fwproc] Received command 0x46574c44
1,589,168 UART: [fwproc] Received Image of size 118548 bytes
2,933,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,810 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,028 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,453 >>> mbox cmd response: success
3,132,453 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,133,711 UART: [afmc] ++
3,133,879 UART: [afmc] CDI.KEYID = 6
3,134,241 UART: [afmc] SUBJECT.KEYID = 7
3,134,666 UART: [afmc] AUTHORITY.KEYID = 5
3,170,351 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,723 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,503 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,212 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,095 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,778 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,694 UART: [afmc] --
3,213,638 UART: [cold-reset] --
3,214,240 UART: [state] Locking Datavault
3,215,527 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,131 UART: [state] Locking ICCM
3,216,605 UART: [exit] Launching FMC @ 0x40000130
3,221,935 UART:
3,221,951 UART: Running Caliptra FMC ...
3,222,359 UART:
3,222,502 UART: [state] CFI Enabled
3,232,912 UART: [fht] FMC Alias Private Key: 7
3,352,070 UART: [art] Extend RT PCRs Done
3,352,498 UART: [art] Lock RT PCRs Done
3,353,770 UART: [art] Populate DV Done
3,361,957 UART: [fht] FMC Alias Private Key: 7
3,363,091 UART: [art] Derive CDI
3,363,371 UART: [art] Store in slot 0x4
3,449,023 UART: [art] Derive Key Pair
3,449,383 UART: [art] Store priv key in slot 0x5
3,462,500 UART: [art] Derive Key Pair - Done
3,477,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,686 UART: [art] PUB.X = EF718CD664C25A0745CA5058CBBB2D9B72DB9760F5EFA32043728CB8FA62274A4BF9921CE339D7E88CD1DF2CA86D1B05
3,500,466 UART: [art] PUB.Y = C901D561D14D23BC0B62E001718DEFC55B75CD6D2D1E31812BC4CBB149561E1DA06EF19F2E45F5982E82F67A441DE67C
3,507,419 UART: [art] SIG.R = 9B9E9B377F2B9AE402F4DA0B50F88001264FBB9C4D68025C9EE5BB355CFFBBFDCA5F574BDFB6509579DE22A0BBA037BD
3,514,203 UART: [art] SIG.S = BCA33294DD50F0A44EE7B690484B2C963194464565E3260C5CA1586700D91B3E7C1CA03A5D3CBB961A5EB7D2ECCEC0E8
3,537,376 UART: Caliptra RT
3,537,719 UART: [state] CFI Enabled
3,658,184 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,122 UART: [rt]cmd =0x50435245, len=56
3,690,438 >>> mbox cmd response: failed
3,690,438 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,856 UART: [rt]cmd =0x50435245, len=56
3,721,378 >>> mbox cmd response: failed
3,721,378 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,750,988 UART: [rt]cmd =0x50435245, len=56
3,752,522 >>> mbox cmd response: failed
3,752,522 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,254 UART: [rt]cmd =0x50435245, len=56
3,783,614 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,788 ready_for_fw is high
1,362,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,241 >>> mbox cmd response: success
2,982,241 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,043,540 UART:
3,043,556 UART: Running Caliptra FMC ...
3,043,964 UART:
3,044,107 UART: [state] CFI Enabled
3,054,475 UART: [fht] FMC Alias Private Key: 7
3,173,369 UART: [art] Extend RT PCRs Done
3,173,797 UART: [art] Lock RT PCRs Done
3,175,397 UART: [art] Populate DV Done
3,183,576 UART: [fht] FMC Alias Private Key: 7
3,184,614 UART: [art] Derive CDI
3,184,894 UART: [art] Store in slot 0x4
3,270,818 UART: [art] Derive Key Pair
3,271,178 UART: [art] Store priv key in slot 0x5
3,284,645 UART: [art] Derive Key Pair - Done
3,299,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,180 UART: [art] PUB.X = 9C5014976FBD846DA59E10E8B19E8C6BD2A52C01DC7A4CC549095A8029A28DFD1B8877CB300871BBF056A0F8277A5F66
3,321,949 UART: [art] PUB.Y = 8C340A52D1A31D2BD6540026B3874C8FDD9B21211E80594CAAFA1DD00C4BA1D9E15F844E0A68D3C9A037B8042AF1D056
3,328,875 UART: [art] SIG.R = AA94C17DDDBC14CE7D5E17C25A34EAC78524495AA029954657D9CC134C6A1BB67D75D8A3A286F40CC778682ED29EC4F6
3,335,656 UART: [art] SIG.S = B72D85CC0EDD78B27E01AAB4E4BE0052C86F909A1E7CB51092A85E7D4376AD52EDF0727DDBE8B673A5893080300B9B40
3,359,653 UART: Caliptra RT
3,359,996 UART: [state] CFI Enabled
3,479,433 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,237 UART: [rt]cmd =0x50435245, len=56
3,511,771 >>> mbox cmd response: failed
3,511,771 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,371 UART: [rt]cmd =0x50435245, len=56
3,542,711 >>> mbox cmd response: failed
3,542,711 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,455 UART: [rt]cmd =0x50435245, len=56
3,574,053 >>> mbox cmd response: failed
3,574,053 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,571 UART: [rt]cmd =0x50435245, len=56
3,604,879 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [kat] SHA2-256
891,046 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,150 UART: [kat] ++
895,302 UART: [kat] sha1
899,526 UART: [kat] SHA2-256
901,466 UART: [kat] SHA2-384
904,201 UART: [kat] SHA2-512-ACC
906,102 UART: [kat] ECC-384
915,641 UART: [kat] HMAC-384Kdf
920,163 UART: [kat] LMS
1,168,475 UART: [kat] --
1,169,450 UART: [cold-reset] ++
1,169,978 UART: [fht] FHT @ 0x50003400
1,172,548 UART: [idev] ++
1,172,716 UART: [idev] CDI.KEYID = 6
1,173,077 UART: [idev] SUBJECT.KEYID = 7
1,173,502 UART: [idev] UDS.KEYID = 0
1,173,848 ready_for_fw is high
1,173,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,615 UART: [idev] Erasing UDS.KEYID = 0
1,198,463 UART: [idev] Sha1 KeyId Algorithm
1,207,545 UART: [idev] --
1,208,806 UART: [ldev] ++
1,208,974 UART: [ldev] CDI.KEYID = 6
1,209,338 UART: [ldev] SUBJECT.KEYID = 5
1,209,765 UART: [ldev] AUTHORITY.KEYID = 7
1,210,228 UART: [ldev] FE.KEYID = 1
1,215,152 UART: [ldev] Erasing FE.KEYID = 1
1,241,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,576 UART: [ldev] --
1,280,859 UART: [fwproc] Wait for Commands...
1,281,650 UART: [fwproc] Recv command 0x46574c44
1,282,383 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,245 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,420 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,765 >>> mbox cmd response: success
2,823,765 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,825,023 UART: [afmc] ++
2,825,191 UART: [afmc] CDI.KEYID = 6
2,825,554 UART: [afmc] SUBJECT.KEYID = 7
2,825,980 UART: [afmc] AUTHORITY.KEYID = 5
2,861,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,725 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,435 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,316 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,017 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,708 UART: [afmc] --
2,904,613 UART: [cold-reset] --
2,905,569 UART: [state] Locking Datavault
2,906,900 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,504 UART: [state] Locking ICCM
2,907,944 UART: [exit] Launching FMC @ 0x40000130
2,913,274 UART:
2,913,290 UART: Running Caliptra FMC ...
2,913,698 UART:
2,913,752 UART: [state] CFI Enabled
2,924,202 UART: [fht] FMC Alias Private Key: 7
3,043,166 UART: [art] Extend RT PCRs Done
3,043,594 UART: [art] Lock RT PCRs Done
3,045,302 UART: [art] Populate DV Done
3,053,639 UART: [fht] FMC Alias Private Key: 7
3,054,741 UART: [art] Derive CDI
3,055,021 UART: [art] Store in slot 0x4
3,140,720 UART: [art] Derive Key Pair
3,141,080 UART: [art] Store priv key in slot 0x5
3,153,814 UART: [art] Derive Key Pair - Done
3,169,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,246 UART: [art] PUB.X = 635F12C2B26FD3D918E810894D960F8B70BA804C9BCA72FED9F6F802F8E90AFED1BD2D3C00E3B1F39F6F15A678289CB8
3,192,001 UART: [art] PUB.Y = 3F2ACB584FAE2BF065CA527249AAE27409DC6BC5AC2F12431CEFE9C073204D53888714AF2C5A702870B391B40C6FD168
3,198,955 UART: [art] SIG.R = 100C410F94260204E93E19994EEFD8D478B80C26E51FAE8AAFE38F784F2AA6A37CC689A5DCD3A66149F44E80776D6B32
3,205,718 UART: [art] SIG.S = 55E84EB1557F8C2574514C5C7CA5A4E2ABED92BFDBFC284F20359D4A61F154810E4E7B6D87ED599C08859A3E48F0304C
3,229,700 UART: Caliptra RT
3,229,951 UART: [state] CFI Enabled
3,348,947 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,873 UART: [rt]cmd =0x50435245, len=56
3,381,589 >>> mbox cmd response: failed
3,381,589 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,073 UART: [rt]cmd =0x50435245, len=56
3,412,497 >>> mbox cmd response: failed
3,412,497 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,279 UART: [rt]cmd =0x50435245, len=56
3,443,641 >>> mbox cmd response: failed
3,443,641 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,291 UART: [rt]cmd =0x50435245, len=56
3,474,707 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,950 ready_for_fw is high
1,058,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,960 >>> mbox cmd response: success
2,677,960 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,739,903 UART:
2,739,919 UART: Running Caliptra FMC ...
2,740,327 UART:
2,740,381 UART: [state] CFI Enabled
2,751,171 UART: [fht] FMC Alias Private Key: 7
2,870,763 UART: [art] Extend RT PCRs Done
2,871,191 UART: [art] Lock RT PCRs Done
2,872,571 UART: [art] Populate DV Done
2,880,958 UART: [fht] FMC Alias Private Key: 7
2,881,974 UART: [art] Derive CDI
2,882,254 UART: [art] Store in slot 0x4
2,968,195 UART: [art] Derive Key Pair
2,968,555 UART: [art] Store priv key in slot 0x5
2,981,779 UART: [art] Derive Key Pair - Done
2,996,848 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,017 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,782 UART: [art] PUB.X = 18CA1474E3B80AEE8D35F5C69C38416FBC0B6B91016212E433E668E265D9A76D7FFDB6CDFBB0CA64B3144C6492748E9A
3,019,555 UART: [art] PUB.Y = 2B370FE2EE575BBCE5E5E14CCE57A8B68DD23D28F4CAEEDBAA3024839512FB3D8CE6D02D1B59E6EAEFCBD00078A3A8F6
3,026,512 UART: [art] SIG.R = 6FE12E37E66DC4CAB8FF1B835608251E83C5376469F054527DA22886872DD3BBD5CFC6AAD355B50DD797E34928016815
3,033,275 UART: [art] SIG.S = D45B5183D04143CD3C65E7F90E505C1EF287F91DFC4586C1EA1B990F7BE2B7D22F7F70A37A2D72FCE29214DC86478D43
3,056,573 UART: Caliptra RT
3,056,824 UART: [state] CFI Enabled
3,176,301 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,855 UART: [rt]cmd =0x50435245, len=56
3,208,401 >>> mbox cmd response: failed
3,208,401 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,141 UART: [rt]cmd =0x50435245, len=56
3,239,277 >>> mbox cmd response: failed
3,239,277 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,219 UART: [rt]cmd =0x50435245, len=56
3,270,447 >>> mbox cmd response: failed
3,270,447 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,269 UART: [rt]cmd =0x50435245, len=56
3,301,573 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,567 UART: [kat] ++
895,719 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,756 UART: [kat] SHA2-512-ACC
906,657 UART: [kat] ECC-384
916,220 UART: [kat] HMAC-384Kdf
920,664 UART: [kat] LMS
1,168,976 UART: [kat] --
1,170,155 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,333 UART: [idev] ++
1,173,501 UART: [idev] CDI.KEYID = 6
1,173,862 UART: [idev] SUBJECT.KEYID = 7
1,174,287 UART: [idev] UDS.KEYID = 0
1,174,633 ready_for_fw is high
1,174,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,426 UART: [idev] Erasing UDS.KEYID = 0
1,198,804 UART: [idev] Sha1 KeyId Algorithm
1,207,654 UART: [idev] --
1,208,569 UART: [ldev] ++
1,208,737 UART: [ldev] CDI.KEYID = 6
1,209,101 UART: [ldev] SUBJECT.KEYID = 5
1,209,528 UART: [ldev] AUTHORITY.KEYID = 7
1,209,991 UART: [ldev] FE.KEYID = 1
1,215,341 UART: [ldev] Erasing FE.KEYID = 1
1,241,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,009 UART: [ldev] --
1,281,462 UART: [fwproc] Wait for Commands...
1,282,153 UART: [fwproc] Recv command 0x46574c44
1,282,886 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,282 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,457 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,782 >>> mbox cmd response: success
2,826,782 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,827,966 UART: [afmc] ++
2,828,134 UART: [afmc] CDI.KEYID = 6
2,828,497 UART: [afmc] SUBJECT.KEYID = 7
2,828,923 UART: [afmc] AUTHORITY.KEYID = 5
2,864,346 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,618 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,328 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,209 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,910 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,485 UART: [afmc] --
2,907,532 UART: [cold-reset] --
2,908,326 UART: [state] Locking Datavault
2,909,765 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,369 UART: [state] Locking ICCM
2,911,039 UART: [exit] Launching FMC @ 0x40000130
2,916,369 UART:
2,916,385 UART: Running Caliptra FMC ...
2,916,793 UART:
2,916,936 UART: [state] CFI Enabled
2,927,912 UART: [fht] FMC Alias Private Key: 7
3,047,196 UART: [art] Extend RT PCRs Done
3,047,624 UART: [art] Lock RT PCRs Done
3,048,994 UART: [art] Populate DV Done
3,056,865 UART: [fht] FMC Alias Private Key: 7
3,058,033 UART: [art] Derive CDI
3,058,313 UART: [art] Store in slot 0x4
3,144,390 UART: [art] Derive Key Pair
3,144,750 UART: [art] Store priv key in slot 0x5
3,158,472 UART: [art] Derive Key Pair - Done
3,173,173 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,493 UART: [art] PUB.X = 7BD25B4F665E42E23E6D88ACB51AC9FC603819D1453392822F1CA4AFBACCBBA83B8E50E596177EE2E98C14A6FFA91918
3,196,279 UART: [art] PUB.Y = BA1EEBBDCF88C195D86FF7C86D69ED433B4FB29943CF1F45BEA685C22147E813E81A473853667FF50625D83132035D75
3,203,229 UART: [art] SIG.R = 48695256B5E991E0D4A891165598B6A55C9D80B2A7C23AC5AE85AB6E109D32B0628DE2472BC723F2E6949B7A5B45A9D0
3,210,001 UART: [art] SIG.S = BA4B382414930EFBF985558079DCA6EA55815A701BC008CFF055849E6B117CB0F397664FCF380DAD3F85FCF2C665BCD5
3,233,448 UART: Caliptra RT
3,233,791 UART: [state] CFI Enabled
3,354,106 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,936 UART: [rt]cmd =0x50435245, len=56
3,386,324 >>> mbox cmd response: failed
3,386,324 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,952 UART: [rt]cmd =0x50435245, len=56
3,417,598 >>> mbox cmd response: failed
3,417,598 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,332 UART: [rt]cmd =0x50435245, len=56
3,448,890 >>> mbox cmd response: failed
3,448,890 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,418 UART: [rt]cmd =0x50435245, len=56
3,479,974 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,783 ready_for_fw is high
1,059,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,535 >>> mbox cmd response: success
2,679,535 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,741,690 UART:
2,741,706 UART: Running Caliptra FMC ...
2,742,114 UART:
2,742,257 UART: [state] CFI Enabled
2,752,885 UART: [fht] FMC Alias Private Key: 7
2,871,225 UART: [art] Extend RT PCRs Done
2,871,653 UART: [art] Lock RT PCRs Done
2,873,351 UART: [art] Populate DV Done
2,881,410 UART: [fht] FMC Alias Private Key: 7
2,882,566 UART: [art] Derive CDI
2,882,846 UART: [art] Store in slot 0x4
2,968,675 UART: [art] Derive Key Pair
2,969,035 UART: [art] Store priv key in slot 0x5
2,981,959 UART: [art] Derive Key Pair - Done
2,996,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,700 UART: [art] PUB.X = 55EC91702EE70936409FC5C7C2D7BF70AB27515BB13431E37E3D23F3955B115B2C06356BDE41CE6398C74DEF7A1698A8
3,019,468 UART: [art] PUB.Y = 17A6FD5EFB30C578ED1649607D1763C87AC64C8AE011F1AF225D323BD8353F021993F6EE3D8B5D4FE178D507AFE73367
3,026,420 UART: [art] SIG.R = 3F31BDC3D73D22645B217720FC9087727B30B0A6204679BB69562597C52724FBE9741864E0593A8FF51B6527D0903F90
3,033,178 UART: [art] SIG.S = 542D1A05041D9B57B2D08164294FB702D715831C46BE993E7C38583E5A0BBC43C075499EEE2C8F6639B7E4E27E9C69AF
3,056,616 UART: Caliptra RT
3,056,959 UART: [state] CFI Enabled
3,176,675 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,755 UART: [rt]cmd =0x50435245, len=56
3,209,167 >>> mbox cmd response: failed
3,209,167 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,857 UART: [rt]cmd =0x50435245, len=56
3,240,383 >>> mbox cmd response: failed
3,240,383 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,899 UART: [rt]cmd =0x50435245, len=56
3,271,287 >>> mbox cmd response: failed
3,271,287 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,139 UART: [rt]cmd =0x50435245, len=56
3,302,803 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
893,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,387 UART: [kat] ++
897,539 UART: [kat] sha1
901,635 UART: [kat] SHA2-256
903,575 UART: [kat] SHA2-384
906,322 UART: [kat] SHA2-512-ACC
908,223 UART: [kat] ECC-384
918,008 UART: [kat] HMAC-384Kdf
922,574 UART: [kat] LMS
1,170,902 UART: [kat] --
1,171,907 UART: [cold-reset] ++
1,172,453 UART: [fht] FHT @ 0x50003400
1,175,240 UART: [idev] ++
1,175,408 UART: [idev] CDI.KEYID = 6
1,175,768 UART: [idev] SUBJECT.KEYID = 7
1,176,192 UART: [idev] UDS.KEYID = 0
1,176,537 ready_for_fw is high
1,176,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,074 UART: [idev] Erasing UDS.KEYID = 0
1,201,145 UART: [idev] Sha1 KeyId Algorithm
1,209,491 UART: [idev] --
1,210,607 UART: [ldev] ++
1,210,775 UART: [ldev] CDI.KEYID = 6
1,211,138 UART: [ldev] SUBJECT.KEYID = 5
1,211,564 UART: [ldev] AUTHORITY.KEYID = 7
1,212,027 UART: [ldev] FE.KEYID = 1
1,217,193 UART: [ldev] Erasing FE.KEYID = 1
1,243,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,365 UART: [ldev] --
1,282,832 UART: [fwproc] Wait for Commands...
1,283,618 UART: [fwproc] Recv command 0x46574c44
1,284,346 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,274 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,444 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,791 >>> mbox cmd response: success
2,826,791 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,827,939 UART: [afmc] ++
2,828,107 UART: [afmc] CDI.KEYID = 6
2,828,469 UART: [afmc] SUBJECT.KEYID = 7
2,828,894 UART: [afmc] AUTHORITY.KEYID = 5
2,864,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,480 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,189 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,072 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,773 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,631 UART: [afmc] --
2,907,519 UART: [cold-reset] --
2,908,349 UART: [state] Locking Datavault
2,909,288 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,892 UART: [state] Locking ICCM
2,910,330 UART: [exit] Launching FMC @ 0x40000130
2,915,660 UART:
2,915,676 UART: Running Caliptra FMC ...
2,916,084 UART:
2,916,138 UART: [state] CFI Enabled
2,926,952 UART: [fht] FMC Alias Private Key: 7
3,046,040 UART: [art] Extend RT PCRs Done
3,046,468 UART: [art] Lock RT PCRs Done
3,048,190 UART: [art] Populate DV Done
3,056,317 UART: [fht] FMC Alias Private Key: 7
3,057,245 UART: [art] Derive CDI
3,057,525 UART: [art] Store in slot 0x4
3,143,396 UART: [art] Derive Key Pair
3,143,756 UART: [art] Store priv key in slot 0x5
3,156,976 UART: [art] Derive Key Pair - Done
3,171,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,731 UART: [art] PUB.X = 8C71EA4EA2A0716B4B630DB7658C018C4DC1814F41A6CE16A1C7B7BB844D0B4A92719E2889F0957D9DC0556C0839446F
3,194,493 UART: [art] PUB.Y = 41863A763E92A8395C8B554FB092ADAD1BD35D3458BCF52C6C6A925EB15068D1E28D72895A9DD965108155578E4D6B13
3,201,443 UART: [art] SIG.R = D2FA584FC586DE993ABFD19A5D7ED2E057D3DC8AF51A41406B470F692A9983AC833E214CCC28F7384D2476EB7DD76A86
3,208,224 UART: [art] SIG.S = 0B2ADF50B0E3239254205AB0A48AEF8F30EB2F169BFD9E0B8C3F31C5878753CC3C98151F5BA84EB677BC9B982C98F8F7
3,232,142 UART: Caliptra RT
3,232,393 UART: [state] CFI Enabled
3,351,836 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,728 UART: [rt]cmd =0x50435245, len=56
3,384,032 >>> mbox cmd response: failed
3,384,032 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,630 UART: [rt]cmd =0x50435245, len=56
3,414,844 >>> mbox cmd response: failed
3,414,844 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,444,428 UART: [rt]cmd =0x50435245, len=56
3,446,078 >>> mbox cmd response: failed
3,446,078 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,808 UART: [rt]cmd =0x50435245, len=56
3,477,204 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,419 ready_for_fw is high
1,060,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,570 >>> mbox cmd response: success
2,677,570 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,739,839 UART:
2,739,855 UART: Running Caliptra FMC ...
2,740,263 UART:
2,740,317 UART: [state] CFI Enabled
2,750,639 UART: [fht] FMC Alias Private Key: 7
2,869,265 UART: [art] Extend RT PCRs Done
2,869,693 UART: [art] Lock RT PCRs Done
2,871,181 UART: [art] Populate DV Done
2,879,322 UART: [fht] FMC Alias Private Key: 7
2,880,276 UART: [art] Derive CDI
2,880,556 UART: [art] Store in slot 0x4
2,965,877 UART: [art] Derive Key Pair
2,966,237 UART: [art] Store priv key in slot 0x5
2,979,599 UART: [art] Derive Key Pair - Done
2,994,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,600 UART: [art] PUB.X = 2E19FE730B47C9D157C623168FDA604982BEA34C7D53325390EC872858E27868647FDA6CBE64266959F9FBC3C2ECEF37
3,017,371 UART: [art] PUB.Y = FB8CB0736797F4EFED62070F0C601DB76CCA829E1078786CE067816BA632CC7577C0C0262F0EE0C6AE3D91EBE4F1BD95
3,024,323 UART: [art] SIG.R = 0BAA067E3325ED8B9F8B7DFBFCD6E2E4CDB201749A4155F2CB8BE4E56491A6A0AB60AAF231BDF6F404B56E55C936A7C1
3,031,105 UART: [art] SIG.S = 1A0A1B51781EF0B07B55BC55383E5D89D2778C9C467162997209BB0DF1BF9C36BACAD5DA2E7BAB290E451553415DFB0D
3,054,184 UART: Caliptra RT
3,054,435 UART: [state] CFI Enabled
3,172,309 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,202,905 UART: [rt]cmd =0x50435245, len=56
3,204,373 >>> mbox cmd response: failed
3,204,373 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,234,127 UART: [rt]cmd =0x50435245, len=56
3,235,571 >>> mbox cmd response: failed
3,235,571 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,119 UART: [rt]cmd =0x50435245, len=56
3,266,729 >>> mbox cmd response: failed
3,266,729 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,296,473 UART: [rt]cmd =0x50435245, len=56
3,297,711 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
893,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,840 UART: [kat] ++
897,992 UART: [kat] sha1
902,282 UART: [kat] SHA2-256
904,222 UART: [kat] SHA2-384
907,119 UART: [kat] SHA2-512-ACC
909,020 UART: [kat] ECC-384
919,353 UART: [kat] HMAC-384Kdf
923,879 UART: [kat] LMS
1,172,207 UART: [kat] --
1,172,950 UART: [cold-reset] ++
1,173,382 UART: [fht] FHT @ 0x50003400
1,176,017 UART: [idev] ++
1,176,185 UART: [idev] CDI.KEYID = 6
1,176,545 UART: [idev] SUBJECT.KEYID = 7
1,176,969 UART: [idev] UDS.KEYID = 0
1,177,314 ready_for_fw is high
1,177,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,423 UART: [idev] Erasing UDS.KEYID = 0
1,201,648 UART: [idev] Sha1 KeyId Algorithm
1,210,210 UART: [idev] --
1,211,444 UART: [ldev] ++
1,211,612 UART: [ldev] CDI.KEYID = 6
1,211,975 UART: [ldev] SUBJECT.KEYID = 5
1,212,401 UART: [ldev] AUTHORITY.KEYID = 7
1,212,864 UART: [ldev] FE.KEYID = 1
1,218,136 UART: [ldev] Erasing FE.KEYID = 1
1,244,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,196 UART: [ldev] --
1,283,615 UART: [fwproc] Wait for Commands...
1,284,191 UART: [fwproc] Recv command 0x46574c44
1,284,919 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,005 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,175 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,358 >>> mbox cmd response: success
2,826,358 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,827,564 UART: [afmc] ++
2,827,732 UART: [afmc] CDI.KEYID = 6
2,828,094 UART: [afmc] SUBJECT.KEYID = 7
2,828,519 UART: [afmc] AUTHORITY.KEYID = 5
2,864,722 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,783 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,492 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,375 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,076 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,932 UART: [afmc] --
2,907,964 UART: [cold-reset] --
2,909,040 UART: [state] Locking Datavault
2,910,455 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,059 UART: [state] Locking ICCM
2,911,487 UART: [exit] Launching FMC @ 0x40000130
2,916,817 UART:
2,916,833 UART: Running Caliptra FMC ...
2,917,241 UART:
2,917,384 UART: [state] CFI Enabled
2,927,798 UART: [fht] FMC Alias Private Key: 7
3,046,812 UART: [art] Extend RT PCRs Done
3,047,240 UART: [art] Lock RT PCRs Done
3,048,722 UART: [art] Populate DV Done
3,057,111 UART: [fht] FMC Alias Private Key: 7
3,058,253 UART: [art] Derive CDI
3,058,533 UART: [art] Store in slot 0x4
3,144,596 UART: [art] Derive Key Pair
3,144,956 UART: [art] Store priv key in slot 0x5
3,158,658 UART: [art] Derive Key Pair - Done
3,173,780 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,216 UART: [art] PUB.X = 8027EED8E7BC8BE3C05E1EA653297C36B2170BB7CB5F49B2EA7E5B58AD9221EDD0622B5C15F05F52C5D1EF40AE512389
3,196,999 UART: [art] PUB.Y = 6A5E348F5AF8B94BD7CFC59FDB7FBA4210047AC2DC0CE790A872D0ADF3C638ACAD9ACABAE2663A3EF99B2652935763C4
3,203,969 UART: [art] SIG.R = 98CD5049D6E9F34B9B6CA48F73BA3DB1708A1156988A2D3A5F6DF9AAB3701DB06527D81E6E33A8BDBDB40A6F556BA21A
3,210,754 UART: [art] SIG.S = 78E89BBD20FCFC6AB573101AF29B15A0B932490CFCD8FC6FDD2288181D6A8164AE9750BF62980B9B45E9E94E7079D2D2
3,234,330 UART: Caliptra RT
3,234,673 UART: [state] CFI Enabled
3,355,336 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,272 UART: [rt]cmd =0x50435245, len=56
3,387,898 >>> mbox cmd response: failed
3,387,898 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,658 UART: [rt]cmd =0x50435245, len=56
3,419,238 >>> mbox cmd response: failed
3,419,238 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,449,036 UART: [rt]cmd =0x50435245, len=56
3,450,734 >>> mbox cmd response: failed
3,450,734 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,392 UART: [rt]cmd =0x50435245, len=56
3,481,874 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,112 ready_for_fw is high
1,061,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,759 >>> mbox cmd response: success
2,679,759 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,742,722 UART:
2,742,738 UART: Running Caliptra FMC ...
2,743,146 UART:
2,743,289 UART: [state] CFI Enabled
2,753,803 UART: [fht] FMC Alias Private Key: 7
2,872,109 UART: [art] Extend RT PCRs Done
2,872,537 UART: [art] Lock RT PCRs Done
2,874,155 UART: [art] Populate DV Done
2,882,376 UART: [fht] FMC Alias Private Key: 7
2,883,546 UART: [art] Derive CDI
2,883,826 UART: [art] Store in slot 0x4
2,969,389 UART: [art] Derive Key Pair
2,969,749 UART: [art] Store priv key in slot 0x5
2,983,327 UART: [art] Derive Key Pair - Done
2,998,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,258 UART: [art] PUB.X = 680F262AA3116A2B9576844B4416D735E6D5D73AEF34475963399AA99C8A430B87A3C055EFBA68D8303EB4810F62FF2B
3,021,019 UART: [art] PUB.Y = A4DEBA1CE2F8B857601F4131DC180EEE49E0FF4B189310B34102498DFAF5843A75BC4FA7D360371E75931D52725202B2
3,027,964 UART: [art] SIG.R = 9012CE09C2FFE0DC61B13EDD593D712C3579B2CDF315B9820E3710F1AD88AFF272E7D603DF8738562B5218CCCE756DB7
3,034,737 UART: [art] SIG.S = 0999237B35075002F53920C38004F76BDF71698E06FA0F4C258C5D55163E61D264226183B86DF2997146C8CCF25B6DB1
3,058,867 UART: Caliptra RT
3,059,210 UART: [state] CFI Enabled
3,180,073 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,665 UART: [rt]cmd =0x50435245, len=56
3,211,959 >>> mbox cmd response: failed
3,211,959 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,751 UART: [rt]cmd =0x50435245, len=56
3,243,235 >>> mbox cmd response: failed
3,243,235 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,272,637 UART: [rt]cmd =0x50435245, len=56
3,274,069 >>> mbox cmd response: failed
3,274,069 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,803 UART: [rt]cmd =0x50435245, len=56
3,305,521 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,046 UART:
192,411 UART: Running Caliptra ROM ...
193,604 UART:
193,756 UART: [state] CFI Enabled
262,647 UART: [state] LifecycleState = Unprovisioned
264,588 UART: [state] DebugLocked = No
267,216 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,734 UART: [kat] SHA2-256
441,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,964 UART: [kat] ++
452,410 UART: [kat] sha1
463,779 UART: [kat] SHA2-256
466,503 UART: [kat] SHA2-384
472,349 UART: [kat] SHA2-512-ACC
474,717 UART: [kat] ECC-384
2,769,009 UART: [kat] HMAC-384Kdf
2,799,648 UART: [kat] LMS
3,989,912 UART: [kat] --
3,991,999 UART: [cold-reset] ++
3,993,365 UART: [fht] Storing FHT @ 0x50003400
4,006,117 UART: [idev] ++
4,006,696 UART: [idev] CDI.KEYID = 6
4,007,656 UART: [idev] SUBJECT.KEYID = 7
4,008,789 UART: [idev] UDS.KEYID = 0
4,009,815 ready_for_fw is high
4,010,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,166 UART: [idev] Erasing UDS.KEYID = 0
7,347,330 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,356 UART: [idev] --
7,375,061 UART: [ldev] ++
7,375,643 UART: [ldev] CDI.KEYID = 6
7,376,728 UART: [ldev] SUBJECT.KEYID = 5
7,377,851 UART: [ldev] AUTHORITY.KEYID = 7
7,379,083 UART: [ldev] FE.KEYID = 1
7,425,309 UART: [ldev] Erasing FE.KEYID = 1
10,756,273 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,909 UART: [ldev] --
13,116,826 UART: [fwproc] Waiting for Commands...
13,119,998 UART: [fwproc] Received command 0x46574c44
13,122,240 UART: [fwproc] Received Image of size 118548 bytes
17,228,811 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,312,756 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,385,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,715,074 >>> mbox cmd response: success
17,716,226 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,718,421 UART: [afmc] ++
17,719,006 UART: [afmc] CDI.KEYID = 6
17,719,922 UART: [afmc] SUBJECT.KEYID = 7
17,721,185 UART: [afmc] AUTHORITY.KEYID = 5
21,092,504 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,113 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,371 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,826 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,519 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,435,938 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,339 UART: [afmc] --
23,462,563 UART: [cold-reset] --
23,465,786 UART: [state] Locking Datavault
23,471,463 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,218 UART: [state] Locking ICCM
23,475,958 UART: [exit] Launching FMC @ 0x40000130
23,484,355 UART:
23,484,597 UART: Running Caliptra FMC ...
23,485,693 UART:
23,485,853 UART: [state] CFI Enabled
23,551,580 UART: [fht] FMC Alias Private Key: 7
25,892,831 UART: [art] Extend RT PCRs Done
25,894,064 UART: [art] Lock RT PCRs Done
25,895,726 UART: [art] Populate DV Done
25,901,248 UART: [fht] FMC Alias Private Key: 7
25,902,729 UART: [art] Derive CDI
25,903,488 UART: [art] Store in slot 0x4
25,960,454 UART: [art] Derive Key Pair
25,961,491 UART: [art] Store priv key in slot 0x5
29,254,442 UART: [art] Derive Key Pair - Done
29,267,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,476 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,995 UART: [art] PUB.X = 86528CA7734420E94A7B7611A75A3D1DF719384899EDDF9E86818542F22B6FEB2E2007A8F3446B027CA0519783F7EACE
31,564,262 UART: [art] PUB.Y = 6C2D2DF7030D88590B2626D4EB7776803270915BDB82190CC75E9CFA576F68FE4AD9B33C3EFF4D0CBC6B30957E110DBC
31,571,514 UART: [art] SIG.R = 3CC2CA3AC5E8DF8620AE508A82A4A7ECD3DBF046318E832486F59A11238FB773D34784831EE8B53C4C815C169C2AA827
31,578,929 UART: [art] SIG.S = EBC3724C312E405A5AFFACE03F018D452D4712F4CD4629224AD3C0AA2D9E8E3517B73F4C00F05532E53C07C4021FB430
32,884,393 UART: Caliptra RT
32,885,140 UART: [state] CFI Enabled
33,082,547 UART: [rt] RT listening for mailbox commands...
33,114,033 UART: [rt]cmd =0x50435252, len=8
33,116,158 >>> mbox cmd response data (8 bytes)
33,116,871 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,146,604 UART: [rt]cmd =0x50435251, len=36
34,315,491 >>> mbox cmd response data (1848 bytes)
34,325,769 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,355,778 UART: [rt]cmd =0x43455246, len=4
34,368,750 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,806,474 ready_for_fw is high
3,807,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,956,234 >>> mbox cmd response: success
17,957,536 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,670,088 UART:
23,670,540 UART: Running Caliptra FMC ...
23,671,692 UART:
23,671,856 UART: [state] CFI Enabled
23,741,133 UART: [fht] FMC Alias Private Key: 7
26,081,173 UART: [art] Extend RT PCRs Done
26,082,397 UART: [art] Lock RT PCRs Done
26,084,026 UART: [art] Populate DV Done
26,089,395 UART: [fht] FMC Alias Private Key: 7
26,091,065 UART: [art] Derive CDI
26,091,888 UART: [art] Store in slot 0x4
26,149,832 UART: [art] Derive Key Pair
26,150,880 UART: [art] Store priv key in slot 0x5
29,443,265 UART: [art] Derive Key Pair - Done
29,456,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,552 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,064 UART: [art] PUB.X = 42272D1EB2886C0B512A952765899EA791A04E5BC7037EC35A70AAD421C39CC8081AE5879607E6C65639634F1F6AD10A
31,753,336 UART: [art] PUB.Y = 617B3A14991F2F958ADF9F57A1FEFEB07DAF4C419CDD489797D0D83E87590CA9353B6B4177E9C6F4DBE625BACC3AD416
31,760,592 UART: [art] SIG.R = 1BE81DAEBD0B0605C8E0AD9C4C180CD05EEE80F1A779A9A75F0799045D77506F550ADAEC752AB77238F371FE62DA1005
31,767,986 UART: [art] SIG.S = 13302C3F02B1967E499E0699BCAE9E2A47E7A86011CF8BAA639C08D80597BFC80207EF27A3F14DA4EC5DD05C86D19456
33,072,326 UART: Caliptra RT
33,073,031 UART: [state] CFI Enabled
33,250,050 UART: [rt] RT listening for mailbox commands...
33,281,165 UART: [rt]cmd =0x50435252, len=8
33,283,350 >>> mbox cmd response data (8 bytes)
33,284,244 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,314,259 UART: [rt]cmd =0x50435251, len=36
34,483,697 >>> mbox cmd response data (1848 bytes)
34,493,907 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,523,832 UART: [rt]cmd =0x43455246, len=4
34,536,794 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,376 UART:
192,782 UART: Running Caliptra ROM ...
193,929 UART:
603,500 UART: [state] CFI Enabled
617,969 UART: [state] LifecycleState = Unprovisioned
619,910 UART: [state] DebugLocked = No
622,568 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,392 UART: [kat] SHA2-256
797,113 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,700 UART: [kat] ++
808,170 UART: [kat] sha1
819,270 UART: [kat] SHA2-256
822,039 UART: [kat] SHA2-384
826,335 UART: [kat] SHA2-512-ACC
828,696 UART: [kat] ECC-384
3,113,172 UART: [kat] HMAC-384Kdf
3,124,204 UART: [kat] LMS
4,314,295 UART: [kat] --
4,317,171 UART: [cold-reset] ++
4,318,461 UART: [fht] Storing FHT @ 0x50003400
4,329,441 UART: [idev] ++
4,329,992 UART: [idev] CDI.KEYID = 6
4,330,937 UART: [idev] SUBJECT.KEYID = 7
4,332,191 UART: [idev] UDS.KEYID = 0
4,333,373 ready_for_fw is high
4,333,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,288 UART: [idev] Erasing UDS.KEYID = 0
7,620,545 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,679 UART: [idev] --
7,646,649 UART: [ldev] ++
7,647,216 UART: [ldev] CDI.KEYID = 6
7,648,151 UART: [ldev] SUBJECT.KEYID = 5
7,649,413 UART: [ldev] AUTHORITY.KEYID = 7
7,650,642 UART: [ldev] FE.KEYID = 1
7,663,040 UART: [ldev] Erasing FE.KEYID = 1
10,951,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,265 UART: [ldev] --
13,313,718 UART: [fwproc] Waiting for Commands...
13,316,236 UART: [fwproc] Received command 0x46574c44
13,318,409 UART: [fwproc] Received Image of size 118548 bytes
17,429,002 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,507,002 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,158 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,908,162 >>> mbox cmd response: success
17,908,717 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,913,016 UART: [afmc] ++
17,913,590 UART: [afmc] CDI.KEYID = 6
17,914,551 UART: [afmc] SUBJECT.KEYID = 7
17,915,812 UART: [afmc] AUTHORITY.KEYID = 5
21,231,015 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,533 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,527,756 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,246 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,556,908 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,325 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,594,040 UART: [afmc] --
23,598,283 UART: [cold-reset] --
23,601,758 UART: [state] Locking Datavault
23,607,482 UART: [state] Locking PCR0, PCR1 and PCR31
23,609,234 UART: [state] Locking ICCM
23,611,596 UART: [exit] Launching FMC @ 0x40000130
23,620,006 UART:
23,620,255 UART: Running Caliptra FMC ...
23,621,349 UART:
23,621,506 UART: [state] CFI Enabled
23,629,296 UART: [fht] FMC Alias Private Key: 7
25,969,695 UART: [art] Extend RT PCRs Done
25,970,960 UART: [art] Lock RT PCRs Done
25,972,449 UART: [art] Populate DV Done
25,977,745 UART: [fht] FMC Alias Private Key: 7
25,979,446 UART: [art] Derive CDI
25,980,179 UART: [art] Store in slot 0x4
26,022,819 UART: [art] Derive Key Pair
26,023,859 UART: [art] Store priv key in slot 0x5
29,266,339 UART: [art] Derive Key Pair - Done
29,279,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,035 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,544 UART: [art] PUB.X = 3DE74EC364319CA69F3F3EE6B0E9EFCD4EF655F3D03C537F338F085DDDD2E2200EAA6E4EA9987CBBB4EE8B57D1E520F1
31,568,848 UART: [art] PUB.Y = AFCB1AFEF564CA6063A6AEC61FC72A9DF06E20E0E97B612D89CD31C6EA695981CF94CE947575241E65B6D34FB0DC5A99
31,576,137 UART: [art] SIG.R = 7977E998E71FD57C4CA69706CD6C308C65D48646C747A7A81AD3749EE2B37004D704AAF1E54A60E8038A5EB7ABFC9D86
31,583,533 UART: [art] SIG.S = 707F0AF5D17E0142E60F60544BCB91AE90241DEAE8CD8D591EF6690BF2296B2E3215DDE0BA2C52BCC3D0B11E42DC018A
32,889,032 UART: Caliptra RT
32,889,740 UART: [state] CFI Enabled
33,022,985 UART: [rt] RT listening for mailbox commands...
33,054,503 UART: [rt]cmd =0x50435252, len=8
33,056,704 >>> mbox cmd response data (8 bytes)
33,057,849 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,087,862 UART: [rt]cmd =0x50435251, len=36
34,243,282 >>> mbox cmd response data (1848 bytes)
34,253,756 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,283,667 UART: [rt]cmd =0x43455246, len=4
34,296,811 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
4,127,446 ready_for_fw is high
4,127,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,040 >>> mbox cmd response: success
18,164,816 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,804,469 UART:
23,804,852 UART: Running Caliptra FMC ...
23,805,986 UART:
23,806,143 UART: [state] CFI Enabled
23,813,966 UART: [fht] FMC Alias Private Key: 7
26,154,165 UART: [art] Extend RT PCRs Done
26,155,397 UART: [art] Lock RT PCRs Done
26,157,028 UART: [art] Populate DV Done
26,162,360 UART: [fht] FMC Alias Private Key: 7
26,163,843 UART: [art] Derive CDI
26,164,602 UART: [art] Store in slot 0x4
26,207,216 UART: [art] Derive Key Pair
26,208,217 UART: [art] Store priv key in slot 0x5
29,450,294 UART: [art] Derive Key Pair - Done
29,463,025 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,510 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,025 UART: [art] PUB.X = 88BA8B045C48AB03EABD1E5B3427E2CED6A46DF7987FF2E45B649B07A0E78215D49A10939EE152AFE4A3B6289F4C2183
31,752,301 UART: [art] PUB.Y = 20FBD5AA25EC1E71F36EE18297583C9522D4FC284258449362E7AD0A679E80CA810F951926482A7EA61B88A1896BD4DE
31,759,559 UART: [art] SIG.R = DB4FE287905AB1F37C674CCFBB8DFE8D8FFAD847954B618E10BAD04790E80B40C05ECCE536D2C10389193DF3C759F6DB
31,766,947 UART: [art] SIG.S = 00EB15CE067337677A16952057AD8A92B1FDC5F95DD72C498BA66D80861D2639D941C707C1F5AE1E89D9FA22CFA32CBA
33,071,812 UART: Caliptra RT
33,072,518 UART: [state] CFI Enabled
33,205,422 UART: [rt] RT listening for mailbox commands...
33,236,623 UART: [rt]cmd =0x50435252, len=8
33,238,761 >>> mbox cmd response data (8 bytes)
33,239,649 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,269,844 UART: [rt]cmd =0x50435251, len=36
34,425,090 >>> mbox cmd response data (1848 bytes)
34,435,320 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,465,114 UART: [rt]cmd =0x43455246, len=4
34,478,064 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,131 UART:
192,497 UART: Running Caliptra ROM ...
193,696 UART:
193,850 UART: [state] CFI Enabled
262,829 UART: [state] LifecycleState = Unprovisioned
264,743 UART: [state] DebugLocked = No
266,705 UART: [state] WD Timer not started. Device not locked for debugging
270,399 UART: [kat] SHA2-256
450,035 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,785 UART: [kat] ++
461,393 UART: [kat] sha1
472,519 UART: [kat] SHA2-256
475,205 UART: [kat] SHA2-384
481,976 UART: [kat] SHA2-512-ACC
484,347 UART: [kat] ECC-384
2,948,669 UART: [kat] HMAC-384Kdf
2,970,652 UART: [kat] LMS
3,447,113 UART: [kat] --
3,450,183 UART: [cold-reset] ++
3,451,827 UART: [fht] FHT @ 0x50003400
3,462,728 UART: [idev] ++
3,463,293 UART: [idev] CDI.KEYID = 6
3,464,322 UART: [idev] SUBJECT.KEYID = 7
3,465,493 UART: [idev] UDS.KEYID = 0
3,466,422 ready_for_fw is high
3,466,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,709 UART: [idev] Erasing UDS.KEYID = 0
5,985,961 UART: [idev] Sha1 KeyId Algorithm
6,010,424 UART: [idev] --
6,014,256 UART: [ldev] ++
6,014,834 UART: [ldev] CDI.KEYID = 6
6,015,716 UART: [ldev] SUBJECT.KEYID = 5
6,016,982 UART: [ldev] AUTHORITY.KEYID = 7
6,018,210 UART: [ldev] FE.KEYID = 1
6,056,834 UART: [ldev] Erasing FE.KEYID = 1
8,566,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,163 UART: [ldev] --
10,372,013 UART: [fwproc] Wait for Commands...
10,374,217 UART: [fwproc] Recv command 0x46574c44
10,376,220 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,778 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,011,784 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,521 >>> mbox cmd response: success
14,341,625 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,344,232 UART: [afmc] ++
14,344,878 UART: [afmc] CDI.KEYID = 6
14,345,787 UART: [afmc] SUBJECT.KEYID = 7
14,346,994 UART: [afmc] AUTHORITY.KEYID = 5
16,892,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,806 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,581 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,667 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,213 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,096 UART: [afmc] --
18,716,351 UART: [cold-reset] --
18,721,348 UART: [state] Locking Datavault
18,726,166 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,911 UART: [state] Locking ICCM
18,729,222 UART: [exit] Launching FMC @ 0x40000130
18,737,612 UART:
18,737,841 UART: Running Caliptra FMC ...
18,738,861 UART:
18,739,006 UART: [state] CFI Enabled
18,794,732 UART: [fht] FMC Alias Private Key: 7
20,561,065 UART: [art] Extend RT PCRs Done
20,562,276 UART: [art] Lock RT PCRs Done
20,564,408 UART: [art] Populate DV Done
20,569,976 UART: [fht] FMC Alias Private Key: 7
20,571,464 UART: [art] Derive CDI
20,572,218 UART: [art] Store in slot 0x4
20,627,665 UART: [art] Derive Key Pair
20,628,706 UART: [art] Store priv key in slot 0x5
23,091,801 UART: [art] Derive Key Pair - Done
23,104,801 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,847 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,330 UART: [art] PUB.X = A6791B39D71D7BB396EDED14B4A796D648074AA4D76C65EE090E2ED682469E557CAEA5C21F5E5C39359C50D872E79B52
24,826,637 UART: [art] PUB.Y = 8349516ACE3F19C047B2987CCCEBD35EBB862E61348C9FA6A397C1E842528670DE888775330FF6ADFDAB97EC96F08E6D
24,833,920 UART: [art] SIG.R = 5554348D0CD4CD5B14A37C784CFAFB954A1AEABD7B6678C92CEEB395B57624DD0FA71993D9F363BE6F15D8DD51DD15A9
24,841,305 UART: [art] SIG.S = 57C3D119261127038777C479BD2F2C39C1459DFBF62CE3983FC08F20B5D6B76767824897BDC3E918DF85BAF7B3A29EAD
25,820,439 UART: Caliptra RT
25,821,148 UART: [state] CFI Enabled
26,001,789 UART: [rt] RT listening for mailbox commands...
26,032,995 UART: [rt]cmd =0x50435252, len=8
26,035,326 >>> mbox cmd response data (8 bytes)
26,036,053 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,066,071 UART: [rt]cmd =0x50435251, len=36
26,988,512 >>> mbox cmd response data (1848 bytes)
26,998,756 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,028,686 UART: [rt]cmd =0x43455246, len=4
27,041,540 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,458,111 ready_for_fw is high
3,458,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,231,120 >>> mbox cmd response: success
14,232,351 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,513,813 UART:
18,514,192 UART: Running Caliptra FMC ...
18,515,386 UART:
18,515,551 UART: [state] CFI Enabled
18,582,398 UART: [fht] FMC Alias Private Key: 7
20,370,256 UART: [art] Extend RT PCRs Done
20,371,473 UART: [art] Lock RT PCRs Done
20,373,368 UART: [art] Populate DV Done
20,378,620 UART: [fht] FMC Alias Private Key: 7
20,380,321 UART: [art] Derive CDI
20,381,133 UART: [art] Store in slot 0x4
20,436,386 UART: [art] Derive Key Pair
20,437,425 UART: [art] Store priv key in slot 0x5
22,900,377 UART: [art] Derive Key Pair - Done
22,913,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,325 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,830 UART: [art] PUB.X = 55D21467B5452E0DB0A11A98F9D2ABFEAC22CC4524AE49AA92BAC7CB1CA4F5FA5C20E58041A198B1B410503D5ADB6A0B
24,635,132 UART: [art] PUB.Y = EA23BB37A0F4E2EA2FF7E45587AF00E6725AB1D06908162319FD1C291F864C9551D01C683E14FF3BD1F01F57E6AC9DC4
24,642,381 UART: [art] SIG.R = F263F76B2678F53185561278FD49CBE951B89333FB5F3FD18BFA34F03AA49AB371DB13EE6D912B436929B61EE9919F13
24,649,773 UART: [art] SIG.S = 43EE15FB41216AC836CB443B38216912369B40D2D1891D10501BF780B391F8C725BB119EEE5857DC7E04F75D4C8FFA28
25,628,472 UART: Caliptra RT
25,629,187 UART: [state] CFI Enabled
25,810,901 UART: [rt] RT listening for mailbox commands...
25,842,212 UART: [rt]cmd =0x50435252, len=8
25,844,221 >>> mbox cmd response data (8 bytes)
25,844,994 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,874,774 UART: [rt]cmd =0x50435251, len=36
26,797,163 >>> mbox cmd response data (1848 bytes)
26,807,335 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,837,057 UART: [rt]cmd =0x43455246, len=4
26,849,713 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,298 UART:
192,672 UART: Running Caliptra ROM ...
193,767 UART:
603,595 UART: [state] CFI Enabled
619,188 UART: [state] LifecycleState = Unprovisioned
621,056 UART: [state] DebugLocked = No
622,867 UART: [state] WD Timer not started. Device not locked for debugging
626,050 UART: [kat] SHA2-256
805,659 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,462 UART: [kat] ++
816,929 UART: [kat] sha1
827,399 UART: [kat] SHA2-256
830,090 UART: [kat] SHA2-384
835,454 UART: [kat] SHA2-512-ACC
837,825 UART: [kat] ECC-384
3,277,208 UART: [kat] HMAC-384Kdf
3,290,582 UART: [kat] LMS
3,767,113 UART: [kat] --
3,770,682 UART: [cold-reset] ++
3,772,613 UART: [fht] FHT @ 0x50003400
3,783,450 UART: [idev] ++
3,784,048 UART: [idev] CDI.KEYID = 6
3,785,017 UART: [idev] SUBJECT.KEYID = 7
3,786,268 UART: [idev] UDS.KEYID = 0
3,787,356 ready_for_fw is high
3,787,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,318 UART: [idev] Erasing UDS.KEYID = 0
6,263,316 UART: [idev] Sha1 KeyId Algorithm
6,286,384 UART: [idev] --
6,291,131 UART: [ldev] ++
6,291,705 UART: [ldev] CDI.KEYID = 6
6,292,649 UART: [ldev] SUBJECT.KEYID = 5
6,293,859 UART: [ldev] AUTHORITY.KEYID = 7
6,295,094 UART: [ldev] FE.KEYID = 1
6,303,861 UART: [ldev] Erasing FE.KEYID = 1
8,778,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,397 UART: [ldev] --
10,575,768 UART: [fwproc] Wait for Commands...
10,577,663 UART: [fwproc] Recv command 0x46574c44
10,579,706 UART: [fwproc] Recv'd Img size: 118548 bytes
14,063,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,083 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,090 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,710 >>> mbox cmd response: success
14,549,923 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,552,892 UART: [afmc] ++
14,553,543 UART: [afmc] CDI.KEYID = 6
14,554,461 UART: [afmc] SUBJECT.KEYID = 7
14,555,680 UART: [afmc] AUTHORITY.KEYID = 5
17,056,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,776,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,778,383 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,794,206 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,810,282 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,825,872 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,850,578 UART: [afmc] --
18,854,500 UART: [cold-reset] --
18,858,743 UART: [state] Locking Datavault
18,863,557 UART: [state] Locking PCR0, PCR1 and PCR31
18,865,308 UART: [state] Locking ICCM
18,868,083 UART: [exit] Launching FMC @ 0x40000130
18,876,533 UART:
18,876,767 UART: Running Caliptra FMC ...
18,877,789 UART:
18,877,940 UART: [state] CFI Enabled
18,886,259 UART: [fht] FMC Alias Private Key: 7
20,652,062 UART: [art] Extend RT PCRs Done
20,653,273 UART: [art] Lock RT PCRs Done
20,654,982 UART: [art] Populate DV Done
20,660,561 UART: [fht] FMC Alias Private Key: 7
20,662,210 UART: [art] Derive CDI
20,663,037 UART: [art] Store in slot 0x4
20,705,426 UART: [art] Derive Key Pair
20,706,417 UART: [art] Store priv key in slot 0x5
23,133,364 UART: [art] Derive Key Pair - Done
23,146,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,223 UART: [art] Erasing AUTHORITY.KEYID = 7
24,853,726 UART: [art] PUB.X = 26EEF8702D2706888F85FDA60F1B5EEA639F1D6BF9C687BF994145E0CC1C6E84CE28490381454A97D13B9D68C1A8DACA
24,861,020 UART: [art] PUB.Y = 45F289DA70EAA088E178E52C226FF1544D08E31677DDDE47DA2725EE7AFE01C8121F9CD511FA7DC3349A52E7714D07A0
24,868,253 UART: [art] SIG.R = E1BA57120FB99CFD575F0BE6AB220A529803BE3DB41337E631574C41D438D0740985E007553FAA00E91769BDDF96616B
24,875,645 UART: [art] SIG.S = E6E0D21D3C4D9B3D3B37D27485981B0D46CE9356C00D625EFC429C5C5319E0FCA075FD0D16C0CAD4AC6D0B8C5EF729A5
25,855,305 UART: Caliptra RT
25,856,013 UART: [state] CFI Enabled
25,989,623 UART: [rt] RT listening for mailbox commands...
26,021,246 UART: [rt]cmd =0x50435252, len=8
26,023,181 >>> mbox cmd response data (8 bytes)
26,024,085 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,054,128 UART: [rt]cmd =0x50435251, len=36
26,961,689 >>> mbox cmd response data (1848 bytes)
26,971,926 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,001,527 UART: [rt]cmd =0x43455246, len=4
27,014,070 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,784,698 ready_for_fw is high
3,785,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,453,560 >>> mbox cmd response: success
14,454,796 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,700,827 UART:
18,701,214 UART: Running Caliptra FMC ...
18,702,350 UART:
18,702,510 UART: [state] CFI Enabled
18,710,517 UART: [fht] FMC Alias Private Key: 7
20,477,187 UART: [art] Extend RT PCRs Done
20,478,431 UART: [art] Lock RT PCRs Done
20,480,223 UART: [art] Populate DV Done
20,485,590 UART: [fht] FMC Alias Private Key: 7
20,487,252 UART: [art] Derive CDI
20,488,073 UART: [art] Store in slot 0x4
20,530,738 UART: [art] Derive Key Pair
20,531,781 UART: [art] Store priv key in slot 0x5
22,958,517 UART: [art] Derive Key Pair - Done
22,971,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,944 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,459 UART: [art] PUB.X = 7DA446C954C1A0A44AC65BF6939CCFC952C433692AB0475F2C6BAEE48DD33FA90A3ABEBAADD340C40F999EC09E74C172
24,686,724 UART: [art] PUB.Y = 77F93168052F6A63952E327142BEDC600760D6DE99D2690931EB8FC35D7151B43D3AAE929A4D27998EB3C8335DB488E1
24,693,930 UART: [art] SIG.R = CF0916B2E2F036FE5F9CCAF267AE15C32C1AE2B5D738EFCFFC0CE83BB6639BD5C83E636FAF0C51AFBA61BABBC66D7022
24,701,385 UART: [art] SIG.S = 6382B768C7B034FE085DBD594A1C879AF122B5AC1AC3897BA275287A1E432D619A0809845F2ABAB8E3B26DFF19DD71B2
25,680,376 UART: Caliptra RT
25,681,084 UART: [state] CFI Enabled
25,813,444 UART: [rt] RT listening for mailbox commands...
25,844,936 UART: [rt]cmd =0x50435252, len=8
25,847,007 >>> mbox cmd response data (8 bytes)
25,847,845 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,877,951 UART: [rt]cmd =0x50435251, len=36
26,785,684 >>> mbox cmd response data (1848 bytes)
26,795,871 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,825,988 UART: [rt]cmd =0x43455246, len=4
26,838,511 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
192,203 UART:
192,558 UART: Running Caliptra ROM ...
193,745 UART:
193,897 UART: [state] CFI Enabled
260,315 UART: [state] LifecycleState = Unprovisioned
262,712 UART: [state] DebugLocked = No
264,533 UART: [state] WD Timer not started. Device not locked for debugging
268,873 UART: [kat] SHA2-256
458,730 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,534 UART: [kat] ++
470,018 UART: [kat] sha1
481,268 UART: [kat] SHA2-256
484,269 UART: [kat] SHA2-384
489,916 UART: [kat] SHA2-512-ACC
492,493 UART: [kat] ECC-384
2,948,784 UART: [kat] HMAC-384Kdf
2,973,007 UART: [kat] LMS
3,504,806 UART: [kat] --
3,511,515 UART: [cold-reset] ++
3,513,589 UART: [fht] FHT @ 0x50003400
3,525,941 UART: [idev] ++
3,526,694 UART: [idev] CDI.KEYID = 6
3,527,621 UART: [idev] SUBJECT.KEYID = 7
3,528,814 UART: [idev] UDS.KEYID = 0
3,529,744 ready_for_fw is high
3,529,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,679,080 UART: [idev] Erasing UDS.KEYID = 0
6,050,454 UART: [idev] Sha1 KeyId Algorithm
6,072,813 UART: [idev] --
6,077,675 UART: [ldev] ++
6,078,354 UART: [ldev] CDI.KEYID = 6
6,079,407 UART: [ldev] SUBJECT.KEYID = 5
6,080,465 UART: [ldev] AUTHORITY.KEYID = 7
6,081,643 UART: [ldev] FE.KEYID = 1
6,121,688 UART: [ldev] Erasing FE.KEYID = 1
8,630,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,392,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,407,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,428,417 UART: [ldev] --
10,433,299 UART: [fwproc] Wait for Commands...
10,435,497 UART: [fwproc] Recv command 0x46574c44
10,437,798 UART: [fwproc] Recv'd Img size: 118548 bytes
13,930,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,785 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,390 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,682,809 >>> mbox cmd response: success
14,683,961 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,686,936 UART: [afmc] ++
14,687,638 UART: [afmc] CDI.KEYID = 6
14,688,824 UART: [afmc] SUBJECT.KEYID = 7
14,690,305 UART: [afmc] AUTHORITY.KEYID = 5
17,231,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,066 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,179 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,320 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,249 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,105 UART: [afmc] --
19,029,780 UART: [cold-reset] --
19,032,236 UART: [state] Locking Datavault
19,038,237 UART: [state] Locking PCR0, PCR1 and PCR31
19,040,410 UART: [state] Locking ICCM
19,041,795 UART: [exit] Launching FMC @ 0x40000130
19,050,464 UART:
19,050,697 UART: Running Caliptra FMC ...
19,051,722 UART:
19,051,872 UART: [state] CFI Enabled
19,115,727 UART: [fht] FMC Alias Private Key: 7
20,881,418 UART: [art] Extend RT PCRs Done
20,882,662 UART: [art] Lock RT PCRs Done
20,884,206 UART: [art] Populate DV Done
20,889,664 UART: [fht] FMC Alias Private Key: 7
20,891,356 UART: [art] Derive CDI
20,892,090 UART: [art] Store in slot 0x4
20,947,853 UART: [art] Derive Key Pair
20,948,846 UART: [art] Store priv key in slot 0x5
23,411,115 UART: [art] Derive Key Pair - Done
23,424,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,965 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,474 UART: [art] PUB.X = 8947736FF42416BAA2F50AF45369E7935522AFE2C87C44D5CCC239F8C68D82398EBD3FA21D5B0F0E69E3A555115CD537
25,145,759 UART: [art] PUB.Y = 8328F64F51368375C3D61DF41907A10B6AFC4F0D46197C66496ABFC7920A99D79C5EADCF22400F0D277974EDEC9A3A8A
25,153,020 UART: [art] SIG.R = 6BE867D6215392E4F342B3613CC129BC3FFE3A3A76BBD4205F8511C87A78A0B8C1BE91135A83DA2B01A79489DC331A2B
25,160,377 UART: [art] SIG.S = C336CAC89CFA7D59D73D0D76FEF1047BFE6ABB8EC3436D71F4DB6C102556166EE41A6299B450BC4C73AA654D73B71700
26,139,207 UART: Caliptra RT
26,139,892 UART: [state] CFI Enabled
26,320,806 UART: [rt] RT listening for mailbox commands...
26,352,126 UART: [rt]cmd =0x50435252, len=8
26,354,084 >>> mbox cmd response data (8 bytes)
26,354,758 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,384,640 UART: [rt]cmd =0x50435251, len=36
27,307,144 >>> mbox cmd response data (1848 bytes)
27,317,410 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,347,042 UART: [rt]cmd =0x43455246, len=4
27,359,718 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,441,937 ready_for_fw is high
3,442,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,611 >>> mbox cmd response: success
14,822,911 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,112,736 UART:
19,113,125 UART: Running Caliptra FMC ...
19,114,266 UART:
19,114,422 UART: [state] CFI Enabled
19,182,852 UART: [fht] FMC Alias Private Key: 7
20,949,180 UART: [art] Extend RT PCRs Done
20,950,402 UART: [art] Lock RT PCRs Done
20,952,027 UART: [art] Populate DV Done
20,957,503 UART: [fht] FMC Alias Private Key: 7
20,959,207 UART: [art] Derive CDI
20,959,943 UART: [art] Store in slot 0x4
21,015,995 UART: [art] Derive Key Pair
21,017,046 UART: [art] Store priv key in slot 0x5
23,480,142 UART: [art] Derive Key Pair - Done
23,492,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,796 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,295 UART: [art] PUB.X = 219B258B3860A94A158D3915FB61124156A69078250DCCACC8A6B0852CFBFF5F399B5F931A7AB203185315E3287AC125
25,214,546 UART: [art] PUB.Y = 5868469AF7B9354A22D7A1A73331AC5A3D243A65F359A49EAF4B82F92C8141EEC82C9DE4A09629AB2AEB5321CB8AD8F5
25,221,811 UART: [art] SIG.R = E7157ADFFB45DE0D6A0455DD7FC2A4CDC567E5B171D0B37B4A111BFC0B2B3CB60B76BBD69BA9A0F826578B43EA96BB9E
25,229,217 UART: [art] SIG.S = 2E4A07EE5CF452AEE2B794A86DCAE0E7985A7B2CFFA93BB61EC09FA878E756773264C67B8D389093DD18591182B35622
26,208,466 UART: Caliptra RT
26,209,198 UART: [state] CFI Enabled
26,390,496 UART: [rt] RT listening for mailbox commands...
26,421,903 UART: [rt]cmd =0x50435252, len=8
26,423,878 >>> mbox cmd response data (8 bytes)
26,424,694 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,454,872 UART: [rt]cmd =0x50435251, len=36
27,376,653 >>> mbox cmd response data (1848 bytes)
27,386,856 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,416,706 UART: [rt]cmd =0x43455246, len=4
27,429,367 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,378 UART:
192,770 UART: Running Caliptra ROM ...
193,914 UART:
603,529 UART: [state] CFI Enabled
617,001 UART: [state] LifecycleState = Unprovisioned
619,324 UART: [state] DebugLocked = No
621,576 UART: [state] WD Timer not started. Device not locked for debugging
625,638 UART: [kat] SHA2-256
815,548 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,355 UART: [kat] ++
826,835 UART: [kat] sha1
838,852 UART: [kat] SHA2-256
841,822 UART: [kat] SHA2-384
846,862 UART: [kat] SHA2-512-ACC
849,458 UART: [kat] ECC-384
3,290,452 UART: [kat] HMAC-384Kdf
3,303,187 UART: [kat] LMS
3,835,011 UART: [kat] --
3,838,798 UART: [cold-reset] ++
3,841,017 UART: [fht] FHT @ 0x50003400
3,851,933 UART: [idev] ++
3,852,577 UART: [idev] CDI.KEYID = 6
3,853,732 UART: [idev] SUBJECT.KEYID = 7
3,854,841 UART: [idev] UDS.KEYID = 0
3,855,774 ready_for_fw is high
3,855,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,853 UART: [idev] Erasing UDS.KEYID = 0
6,329,892 UART: [idev] Sha1 KeyId Algorithm
6,351,829 UART: [idev] --
6,357,068 UART: [ldev] ++
6,357,758 UART: [ldev] CDI.KEYID = 6
6,358,680 UART: [ldev] SUBJECT.KEYID = 5
6,359,839 UART: [ldev] AUTHORITY.KEYID = 7
6,361,041 UART: [ldev] FE.KEYID = 1
6,373,344 UART: [ldev] Erasing FE.KEYID = 1
8,853,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,091 UART: [ldev] --
10,642,145 UART: [fwproc] Wait for Commands...
10,643,754 UART: [fwproc] Recv command 0x46574c44
10,646,010 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,217,473 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,341,082 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,901,262 >>> mbox cmd response: success
14,901,824 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,906,087 UART: [afmc] ++
14,906,800 UART: [afmc] CDI.KEYID = 6
14,907,911 UART: [afmc] SUBJECT.KEYID = 7
14,909,455 UART: [afmc] AUTHORITY.KEYID = 5
17,413,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,137,991 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,139,951 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,057 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,248 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,127 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,208,666 UART: [afmc] --
19,212,488 UART: [cold-reset] --
19,215,980 UART: [state] Locking Datavault
19,221,236 UART: [state] Locking PCR0, PCR1 and PCR31
19,223,382 UART: [state] Locking ICCM
19,226,078 UART: [exit] Launching FMC @ 0x40000130
19,234,736 UART:
19,234,973 UART: Running Caliptra FMC ...
19,236,077 UART:
19,236,242 UART: [state] CFI Enabled
19,244,749 UART: [fht] FMC Alias Private Key: 7
21,011,489 UART: [art] Extend RT PCRs Done
21,012,704 UART: [art] Lock RT PCRs Done
21,014,364 UART: [art] Populate DV Done
21,019,624 UART: [fht] FMC Alias Private Key: 7
21,021,221 UART: [art] Derive CDI
21,021,968 UART: [art] Store in slot 0x4
21,064,837 UART: [art] Derive Key Pair
21,065,848 UART: [art] Store priv key in slot 0x5
23,492,111 UART: [art] Derive Key Pair - Done
23,505,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,349 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,865 UART: [art] PUB.X = 4989A3A049EB9D19086CAC6A25850A7B78F6E74AC8E2E9319E1B9E30EFCBC180ED26C7C917E49C61DAD47670A2B6D7F3
25,220,126 UART: [art] PUB.Y = 4C76A36E661C332D02B2161E3B861E03B4466D8F6D4FB3115938466991875E211AE622B9D9F0E7F562E1266500661358
25,227,334 UART: [art] SIG.R = D92450085446E2C8424962997E5E7685B4EFDFF6179F7941507101B9ED2E5BA67B23B60272E7F1F7B2AAAFF0ADE374F7
25,234,695 UART: [art] SIG.S = FB7556474DE89EC5C27666916316E418D1691A17F6C6A405BD4CADFEE9FD025A501AB8122936E637A84700DAD33A3224
26,214,090 UART: Caliptra RT
26,214,806 UART: [state] CFI Enabled
26,347,475 UART: [rt] RT listening for mailbox commands...
26,378,662 UART: [rt]cmd =0x50435252, len=8
26,380,814 >>> mbox cmd response data (8 bytes)
26,381,737 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,411,882 UART: [rt]cmd =0x50435251, len=36
27,319,863 >>> mbox cmd response data (1848 bytes)
27,330,218 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,360,136 UART: [rt]cmd =0x43455246, len=4
27,373,016 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
3,753,688 ready_for_fw is high
3,754,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,030,373 >>> mbox cmd response: success
15,031,123 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,286,374 UART:
19,286,774 UART: Running Caliptra FMC ...
19,287,984 UART:
19,288,156 UART: [state] CFI Enabled
19,295,853 UART: [fht] FMC Alias Private Key: 7
21,061,572 UART: [art] Extend RT PCRs Done
21,062,815 UART: [art] Lock RT PCRs Done
21,064,295 UART: [art] Populate DV Done
21,069,621 UART: [fht] FMC Alias Private Key: 7
21,071,277 UART: [art] Derive CDI
21,072,101 UART: [art] Store in slot 0x4
21,114,714 UART: [art] Derive Key Pair
21,115,764 UART: [art] Store priv key in slot 0x5
23,542,432 UART: [art] Derive Key Pair - Done
23,555,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,261,674 UART: [art] Erasing AUTHORITY.KEYID = 7
25,263,205 UART: [art] PUB.X = 5D603AF692AB077DFA6346BBBF25F6BDC842BCD81B9659FED2115E0A5AD573F3BF155DB46D0D0BB50030B1B2B38C22A5
25,270,547 UART: [art] PUB.Y = F6D56D2D2FE0BFFCAD017EA7447A3765B568F377DFCBBA4BCFF93C8E50FFBF6BB9428C42CDB86EE56E4C93CD800D5923
25,277,765 UART: [art] SIG.R = 65ADEE658CCA9FF23DAFE0E0F873930F9334385B353EE5E8DB7E5DA493402BB17CA60423B527A7077E232B6D00BC63A3
25,285,117 UART: [art] SIG.S = 0E57E88E25C0600D24BB6CD8DE37BC6CB263B45352C26D2B638EA2DB79B96493BE627E62236223CED78E2630A7E4CE62
26,264,750 UART: Caliptra RT
26,265,466 UART: [state] CFI Enabled
26,397,291 UART: [rt] RT listening for mailbox commands...
26,428,656 UART: [rt]cmd =0x50435252, len=8
26,430,620 >>> mbox cmd response data (8 bytes)
26,431,570 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,461,713 UART: [rt]cmd =0x50435251, len=36
27,369,599 >>> mbox cmd response data (1848 bytes)
27,379,792 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,409,694 UART: [rt]cmd =0x43455246, len=4
27,422,365 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,764 UART: [state] LifecycleState = Unprovisioned
85,419 UART: [state] DebugLocked = No
86,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,705 UART: [kat] SHA2-256
881,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,751 UART: [kat] ++
885,903 UART: [kat] sha1
890,005 UART: [kat] SHA2-256
891,943 UART: [kat] SHA2-384
894,674 UART: [kat] SHA2-512-ACC
896,575 UART: [kat] ECC-384
901,824 UART: [kat] HMAC-384Kdf
906,356 UART: [kat] LMS
1,474,552 UART: [kat] --
1,475,549 UART: [cold-reset] ++
1,475,887 UART: [fht] Storing FHT @ 0x50003400
1,478,666 UART: [idev] ++
1,478,834 UART: [idev] CDI.KEYID = 6
1,479,194 UART: [idev] SUBJECT.KEYID = 7
1,479,618 UART: [idev] UDS.KEYID = 0
1,479,963 ready_for_fw is high
1,479,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,276 UART: [idev] Erasing UDS.KEYID = 0
1,504,356 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,964 UART: [idev] --
1,514,165 UART: [ldev] ++
1,514,333 UART: [ldev] CDI.KEYID = 6
1,514,696 UART: [ldev] SUBJECT.KEYID = 5
1,515,122 UART: [ldev] AUTHORITY.KEYID = 7
1,515,585 UART: [ldev] FE.KEYID = 1
1,520,585 UART: [ldev] Erasing FE.KEYID = 1
1,545,668 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,758 UART: [ldev] --
1,585,105 UART: [fwproc] Waiting for Commands...
1,585,740 UART: [fwproc] Received command 0x46574c44
1,586,531 UART: [fwproc] Received Image of size 118548 bytes
2,931,723 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,083 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,301 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,718 >>> mbox cmd response: success
3,130,718 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,131,852 UART: [afmc] ++
3,132,020 UART: [afmc] CDI.KEYID = 6
3,132,382 UART: [afmc] SUBJECT.KEYID = 7
3,132,807 UART: [afmc] AUTHORITY.KEYID = 5
3,167,402 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,818 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,598 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,307 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,190 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,873 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,807 UART: [afmc] --
3,210,787 UART: [cold-reset] --
3,211,761 UART: [state] Locking Datavault
3,212,948 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,552 UART: [state] Locking ICCM
3,213,980 UART: [exit] Launching FMC @ 0x40000130
3,219,310 UART:
3,219,326 UART: Running Caliptra FMC ...
3,219,734 UART:
3,219,788 UART: [state] CFI Enabled
3,230,040 UART: [fht] FMC Alias Private Key: 7
3,349,254 UART: [art] Extend RT PCRs Done
3,349,682 UART: [art] Lock RT PCRs Done
3,351,152 UART: [art] Populate DV Done
3,359,387 UART: [fht] FMC Alias Private Key: 7
3,360,357 UART: [art] Derive CDI
3,360,637 UART: [art] Store in slot 0x4
3,446,363 UART: [art] Derive Key Pair
3,446,723 UART: [art] Store priv key in slot 0x5
3,459,598 UART: [art] Derive Key Pair - Done
3,474,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,193 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,958 UART: [art] PUB.X = AE7D0B6565D3B1234FB114D216B9C96BFC46763D5C0C987CA55F8CD2BC172D5360C6C5036E6725377B50B4D9DF5C143A
3,497,727 UART: [art] PUB.Y = A1D05D1A1270468C3BFCE2FDE86B3AC2766C8473EC87D39F782D2C3AB69F8B6C9B83639FC490BED358D5AF519CE8DC82
3,504,695 UART: [art] SIG.R = CD95673055CACF31B6BF35021606FA6E8D39893FF33ADB4C40EDB7E168952847CCEF74760AFB3CFBD517032C6451B778
3,511,463 UART: [art] SIG.S = 8680014BF18C101ACC73395254D9672919A50B1C47255CF210F457CC260262A4143139F3D0A237D2A7FCB089B3335C87
3,535,428 UART: Caliptra RT
3,535,679 UART: [state] CFI Enabled
3,656,572 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,298 UART: [rt]cmd =0x50435252, len=8
3,688,816 >>> mbox cmd response data (8 bytes)
3,688,817 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,548 UART: [rt]cmd =0x50435251, len=36
3,885,712 >>> mbox cmd response data (1848 bytes)
3,885,713 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,048 UART: [rt]cmd =0x43455246, len=4
3,927,492 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,123 ready_for_fw is high
1,362,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,918 >>> mbox cmd response: success
2,980,918 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,042,115 UART:
3,042,131 UART: Running Caliptra FMC ...
3,042,539 UART:
3,042,593 UART: [state] CFI Enabled
3,052,767 UART: [fht] FMC Alias Private Key: 7
3,171,691 UART: [art] Extend RT PCRs Done
3,172,119 UART: [art] Lock RT PCRs Done
3,173,779 UART: [art] Populate DV Done
3,181,916 UART: [fht] FMC Alias Private Key: 7
3,183,046 UART: [art] Derive CDI
3,183,326 UART: [art] Store in slot 0x4
3,268,542 UART: [art] Derive Key Pair
3,268,902 UART: [art] Store priv key in slot 0x5
3,282,263 UART: [art] Derive Key Pair - Done
3,297,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,501 UART: [art] PUB.X = 6E6A90964E77F3E14120FA98691C838C838326DB6585DD547472CDB692779C0A88EEAC51D436DE0D82FA38BC91FFD5CD
3,320,273 UART: [art] PUB.Y = E43651DDAB7A21A05E021D5239B1B8CE0BF4FF50AF0C24A98BB115780F4970E8AE233EAD3F5DE10963ABC3697C1EA192
3,327,224 UART: [art] SIG.R = 51383DBBD4E6E115600BF1420506975876821026EECCA08CFE9DA88C7F2A69440947A948ED22AC486643272D704731DF
3,333,978 UART: [art] SIG.S = CC20A770471E48A9206E397EDB1105131D06672F01E48702C98C877E86B4644FA89492342F12BFCBEC55C15B2021EEC1
3,357,938 UART: Caliptra RT
3,358,189 UART: [state] CFI Enabled
3,478,009 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,703 UART: [rt]cmd =0x50435252, len=8
3,510,327 >>> mbox cmd response data (8 bytes)
3,510,328 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,969 UART: [rt]cmd =0x50435251, len=36
3,707,179 >>> mbox cmd response data (1848 bytes)
3,707,180 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,736,375 UART: [rt]cmd =0x43455246, len=4
3,748,739 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,520 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,086 UART: [kat] SHA2-256
882,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,132 UART: [kat] ++
886,284 UART: [kat] sha1
890,544 UART: [kat] SHA2-256
892,482 UART: [kat] SHA2-384
895,105 UART: [kat] SHA2-512-ACC
897,006 UART: [kat] ECC-384
902,601 UART: [kat] HMAC-384Kdf
907,297 UART: [kat] LMS
1,475,493 UART: [kat] --
1,476,320 UART: [cold-reset] ++
1,476,750 UART: [fht] Storing FHT @ 0x50003400
1,479,363 UART: [idev] ++
1,479,531 UART: [idev] CDI.KEYID = 6
1,479,891 UART: [idev] SUBJECT.KEYID = 7
1,480,315 UART: [idev] UDS.KEYID = 0
1,480,660 ready_for_fw is high
1,480,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,325 UART: [idev] Erasing UDS.KEYID = 0
1,505,113 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,781 UART: [idev] --
1,514,714 UART: [ldev] ++
1,514,882 UART: [ldev] CDI.KEYID = 6
1,515,245 UART: [ldev] SUBJECT.KEYID = 5
1,515,671 UART: [ldev] AUTHORITY.KEYID = 7
1,516,134 UART: [ldev] FE.KEYID = 1
1,521,254 UART: [ldev] Erasing FE.KEYID = 1
1,546,757 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,015 UART: [ldev] --
1,586,354 UART: [fwproc] Waiting for Commands...
1,587,011 UART: [fwproc] Received command 0x46574c44
1,587,802 UART: [fwproc] Received Image of size 118548 bytes
2,932,192 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,008 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,451 >>> mbox cmd response: success
3,131,451 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,132,643 UART: [afmc] ++
3,132,811 UART: [afmc] CDI.KEYID = 6
3,133,173 UART: [afmc] SUBJECT.KEYID = 7
3,133,598 UART: [afmc] AUTHORITY.KEYID = 5
3,169,041 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,557 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,337 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,046 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,929 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,612 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,416 UART: [afmc] --
3,212,356 UART: [cold-reset] --
3,213,060 UART: [state] Locking Datavault
3,214,247 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,851 UART: [state] Locking ICCM
3,215,429 UART: [exit] Launching FMC @ 0x40000130
3,220,759 UART:
3,220,775 UART: Running Caliptra FMC ...
3,221,183 UART:
3,221,326 UART: [state] CFI Enabled
3,231,794 UART: [fht] FMC Alias Private Key: 7
3,350,798 UART: [art] Extend RT PCRs Done
3,351,226 UART: [art] Lock RT PCRs Done
3,352,960 UART: [art] Populate DV Done
3,361,181 UART: [fht] FMC Alias Private Key: 7
3,362,225 UART: [art] Derive CDI
3,362,505 UART: [art] Store in slot 0x4
3,448,191 UART: [art] Derive Key Pair
3,448,551 UART: [art] Store priv key in slot 0x5
3,462,464 UART: [art] Derive Key Pair - Done
3,477,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,889 UART: [art] PUB.X = 2FAC89E3520ED891CFCEE380EC09B28BC10302FA78C57BF0272C2911DC2FBCF585B23ECEDE2A548A4ECCE76554431EE8
3,500,669 UART: [art] PUB.Y = 9716C3C4979BFFE3D002FE6E415D4E3CE89D735A2C87EB6A789A70E85D20E1ECCC14E68855D07DD897C60079CD865961
3,507,602 UART: [art] SIG.R = 065E4BE0464863BAD73F04D54ACC9D917FECB0F4766D9FD1615E7C9CC120D86C439D9ABFABF3DACB6844C35BA9E0110D
3,514,385 UART: [art] SIG.S = 8EF3F4E96FBB006A53CF06AB38B534F0C8D9580064EB7A5874EA0339DC06A1A3C176C1D7CB9B6A96AD2A181C45D7BD57
3,537,918 UART: Caliptra RT
3,538,261 UART: [state] CFI Enabled
3,658,395 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,749 UART: [rt]cmd =0x50435252, len=8
3,690,217 >>> mbox cmd response data (8 bytes)
3,690,218 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,627 UART: [rt]cmd =0x50435251, len=36
3,887,247 >>> mbox cmd response data (1848 bytes)
3,887,248 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,916,849 UART: [rt]cmd =0x43455246, len=4
3,929,147 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,248 ready_for_fw is high
1,363,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,931 >>> mbox cmd response: success
2,980,931 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,042,520 UART:
3,042,536 UART: Running Caliptra FMC ...
3,042,944 UART:
3,043,087 UART: [state] CFI Enabled
3,053,615 UART: [fht] FMC Alias Private Key: 7
3,172,475 UART: [art] Extend RT PCRs Done
3,172,903 UART: [art] Lock RT PCRs Done
3,174,577 UART: [art] Populate DV Done
3,182,936 UART: [fht] FMC Alias Private Key: 7
3,183,920 UART: [art] Derive CDI
3,184,200 UART: [art] Store in slot 0x4
3,269,782 UART: [art] Derive Key Pair
3,270,142 UART: [art] Store priv key in slot 0x5
3,283,115 UART: [art] Derive Key Pair - Done
3,298,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,245 UART: [art] PUB.X = 2D0C39F24CBEC73286A6980A5C96F4CA7D56DA3661DC1FB4744302F8805D555840E72C55E88DABFBF0A8E730720F14BD
3,321,013 UART: [art] PUB.Y = 9334E9E2A588D7BA9FE4F3AD2D255ABFA26E18EF326175687F075A5A5FD43D20D8DE192D46C8644E20E51022C6552214
3,327,964 UART: [art] SIG.R = B8B331ED960AFF92E8C3763E46BA89A1ACD7E48479EBA3379253033257F294497325A82D57B605FC28E74B7A0FF61A74
3,334,724 UART: [art] SIG.S = 0DDF7DEB92EE455D15E859A6232F6DBB980C9F953BADCC67958A54D04CA821C7C5E032A3EB9CE37B1C344CCAB4AAAF86
3,358,822 UART: Caliptra RT
3,359,165 UART: [state] CFI Enabled
3,479,361 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,755 UART: [rt]cmd =0x50435252, len=8
3,511,283 >>> mbox cmd response data (8 bytes)
3,511,284 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,521 UART: [rt]cmd =0x50435251, len=36
3,708,007 >>> mbox cmd response data (1848 bytes)
3,708,008 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,737,437 UART: [rt]cmd =0x43455246, len=4
3,749,915 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
900,112 UART: [kat] SHA2-256
902,052 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,489 UART: [kat] HMAC-384Kdf
921,115 UART: [kat] LMS
1,169,427 UART: [kat] --
1,170,406 UART: [cold-reset] ++
1,170,742 UART: [fht] FHT @ 0x50003400
1,173,586 UART: [idev] ++
1,173,754 UART: [idev] CDI.KEYID = 6
1,174,115 UART: [idev] SUBJECT.KEYID = 7
1,174,540 UART: [idev] UDS.KEYID = 0
1,174,886 ready_for_fw is high
1,174,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,569 UART: [idev] Erasing UDS.KEYID = 0
1,199,659 UART: [idev] Sha1 KeyId Algorithm
1,208,645 UART: [idev] --
1,209,602 UART: [ldev] ++
1,209,770 UART: [ldev] CDI.KEYID = 6
1,210,134 UART: [ldev] SUBJECT.KEYID = 5
1,210,561 UART: [ldev] AUTHORITY.KEYID = 7
1,211,024 UART: [ldev] FE.KEYID = 1
1,216,392 UART: [ldev] Erasing FE.KEYID = 1
1,242,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,154 UART: [ldev] --
1,281,417 UART: [fwproc] Wait for Commands...
1,282,034 UART: [fwproc] Recv command 0x46574c44
1,282,767 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,859 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,034 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,283 >>> mbox cmd response: success
2,825,283 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,826,391 UART: [afmc] ++
2,826,559 UART: [afmc] CDI.KEYID = 6
2,826,922 UART: [afmc] SUBJECT.KEYID = 7
2,827,348 UART: [afmc] AUTHORITY.KEYID = 5
2,862,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,837 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,547 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,428 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,129 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,688 UART: [afmc] --
2,905,603 UART: [cold-reset] --
2,906,439 UART: [state] Locking Datavault
2,907,664 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,268 UART: [state] Locking ICCM
2,908,762 UART: [exit] Launching FMC @ 0x40000130
2,914,092 UART:
2,914,108 UART: Running Caliptra FMC ...
2,914,516 UART:
2,914,570 UART: [state] CFI Enabled
2,924,844 UART: [fht] FMC Alias Private Key: 7
3,043,818 UART: [art] Extend RT PCRs Done
3,044,246 UART: [art] Lock RT PCRs Done
3,045,720 UART: [art] Populate DV Done
3,054,101 UART: [fht] FMC Alias Private Key: 7
3,055,141 UART: [art] Derive CDI
3,055,421 UART: [art] Store in slot 0x4
3,141,176 UART: [art] Derive Key Pair
3,141,536 UART: [art] Store priv key in slot 0x5
3,154,294 UART: [art] Derive Key Pair - Done
3,168,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,260 UART: [art] PUB.X = 7BC929CC169B8969357D90ECB58531BFF082F324E68B0EF0910A2E4B7171F76A9ABF6B5476AAD598D492FB40FB6F6AE4
3,192,036 UART: [art] PUB.Y = D2BE6788B3F2F827CB34E2DB4145F23EC0D813BE86B662E462C24C1C076F224CF503A33C8B9D2717B211E4BCB3270600
3,198,961 UART: [art] SIG.R = 94643114F99E059235B1090FBB6475A606039FD719E1BFE280F632CCD939368F838FD770DB514D91705E059B02393C9A
3,205,702 UART: [art] SIG.S = C7E51B6D29E085461AD1F65142CA7F202C40A0ADA54FCCDE888792212A30EAE2BCF0AF203194FD3E3B94C5AA76158E2F
3,229,078 UART: Caliptra RT
3,229,329 UART: [state] CFI Enabled
3,349,197 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,685 UART: [rt]cmd =0x50435252, len=8
3,381,367 >>> mbox cmd response data (8 bytes)
3,381,368 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,969 UART: [rt]cmd =0x50435251, len=36
3,577,907 >>> mbox cmd response data (1848 bytes)
3,577,908 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,167 UART: [rt]cmd =0x43455246, len=4
3,618,984 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,792 ready_for_fw is high
1,059,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,476 >>> mbox cmd response: success
2,678,476 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,740,517 UART:
2,740,533 UART: Running Caliptra FMC ...
2,740,941 UART:
2,740,995 UART: [state] CFI Enabled
2,751,929 UART: [fht] FMC Alias Private Key: 7
2,870,069 UART: [art] Extend RT PCRs Done
2,870,497 UART: [art] Lock RT PCRs Done
2,871,885 UART: [art] Populate DV Done
2,879,994 UART: [fht] FMC Alias Private Key: 7
2,880,942 UART: [art] Derive CDI
2,881,222 UART: [art] Store in slot 0x4
2,967,365 UART: [art] Derive Key Pair
2,967,725 UART: [art] Store priv key in slot 0x5
2,980,743 UART: [art] Derive Key Pair - Done
2,995,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,600 UART: [art] PUB.X = 185B6F7B92BBDDC61106799DF31E0B884C3A6497082D10BB6DB34CB3102D2FCE89D970FAA8EDA135E9AD3C985E8A9C69
3,018,377 UART: [art] PUB.Y = EB43051881F470A52C83C78E886408112EE65ABBB462DDB10DD5AB2271401301D8008D0D45C664774F2DD0853C6BA86E
3,025,290 UART: [art] SIG.R = FC5C89868FBDA7155EBFB7447A1B2D7FD2B96D56BCD813DBD565B42CA466585AD3E376B1BC2265DB16035A867A7B6418
3,032,071 UART: [art] SIG.S = D01CF76479F6258040C0AF2A680DA20BEF80722DE93997984F5155760ACF14A6B54A6BCAE83A16B1386328053BC167D9
3,055,671 UART: Caliptra RT
3,055,922 UART: [state] CFI Enabled
3,175,746 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,468 UART: [rt]cmd =0x50435252, len=8
3,208,022 >>> mbox cmd response data (8 bytes)
3,208,023 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,237,756 UART: [rt]cmd =0x50435251, len=36
3,405,042 >>> mbox cmd response data (1848 bytes)
3,405,043 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,196 UART: [rt]cmd =0x43455246, len=4
3,446,333 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
916,016 UART: [kat] HMAC-384Kdf
920,794 UART: [kat] LMS
1,169,106 UART: [kat] --
1,170,123 UART: [cold-reset] ++
1,170,677 UART: [fht] FHT @ 0x50003400
1,173,441 UART: [idev] ++
1,173,609 UART: [idev] CDI.KEYID = 6
1,173,970 UART: [idev] SUBJECT.KEYID = 7
1,174,395 UART: [idev] UDS.KEYID = 0
1,174,741 ready_for_fw is high
1,174,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,199,010 UART: [idev] Sha1 KeyId Algorithm
1,207,646 UART: [idev] --
1,208,695 UART: [ldev] ++
1,208,863 UART: [ldev] CDI.KEYID = 6
1,209,227 UART: [ldev] SUBJECT.KEYID = 5
1,209,654 UART: [ldev] AUTHORITY.KEYID = 7
1,210,117 UART: [ldev] FE.KEYID = 1
1,215,323 UART: [ldev] Erasing FE.KEYID = 1
1,241,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,041 UART: [ldev] --
1,281,454 UART: [fwproc] Wait for Commands...
1,282,107 UART: [fwproc] Recv command 0x46574c44
1,282,840 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,598 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,773 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,122 >>> mbox cmd response: success
2,827,122 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,828,302 UART: [afmc] ++
2,828,470 UART: [afmc] CDI.KEYID = 6
2,828,833 UART: [afmc] SUBJECT.KEYID = 7
2,829,259 UART: [afmc] AUTHORITY.KEYID = 5
2,864,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,050 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,760 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,641 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,342 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,265 UART: [afmc] --
2,908,146 UART: [cold-reset] --
2,909,240 UART: [state] Locking Datavault
2,910,607 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,211 UART: [state] Locking ICCM
2,911,787 UART: [exit] Launching FMC @ 0x40000130
2,917,117 UART:
2,917,133 UART: Running Caliptra FMC ...
2,917,541 UART:
2,917,684 UART: [state] CFI Enabled
2,928,128 UART: [fht] FMC Alias Private Key: 7
3,047,052 UART: [art] Extend RT PCRs Done
3,047,480 UART: [art] Lock RT PCRs Done
3,049,074 UART: [art] Populate DV Done
3,057,049 UART: [fht] FMC Alias Private Key: 7
3,058,047 UART: [art] Derive CDI
3,058,327 UART: [art] Store in slot 0x4
3,143,878 UART: [art] Derive Key Pair
3,144,238 UART: [art] Store priv key in slot 0x5
3,157,778 UART: [art] Derive Key Pair - Done
3,172,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,177 UART: [art] PUB.X = 8981244A429B489F58F8BA426798439C4314B7E1BF0468CE72F1FEB8B6C57673BFE8B952A01E9C479A08B38831DCDDEA
3,195,947 UART: [art] PUB.Y = 7A0D3B87C7FF64D136D7C4DAA5DDE1628DE51CCACA647F287838C56DC64E2A731A356DF9C82FE8B02EA355AA5E46F416
3,202,914 UART: [art] SIG.R = D29EABF5CC4AD2EF9419051B9FF0C5919D1EE3FE9358B40345098C1E6765E0D786642C5F3DCAD79520363B7868742951
3,209,677 UART: [art] SIG.S = 1854B690732E3EDE95A7A6EF6047C62ED1881CF1CA8B3B0A86B9612256ABEC526F67B7FA553B61BE6A2E8663BFFE5FA8
3,233,388 UART: Caliptra RT
3,233,731 UART: [state] CFI Enabled
3,352,946 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,532 UART: [rt]cmd =0x50435252, len=8
3,385,344 >>> mbox cmd response data (8 bytes)
3,385,345 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,716 UART: [rt]cmd =0x50435251, len=36
3,582,358 >>> mbox cmd response data (1848 bytes)
3,582,359 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,416 UART: [rt]cmd =0x43455246, len=4
3,623,503 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,549 ready_for_fw is high
1,059,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,081 >>> mbox cmd response: success
2,679,081 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,740,482 UART:
2,740,498 UART: Running Caliptra FMC ...
2,740,906 UART:
2,741,049 UART: [state] CFI Enabled
2,751,825 UART: [fht] FMC Alias Private Key: 7
2,870,073 UART: [art] Extend RT PCRs Done
2,870,501 UART: [art] Lock RT PCRs Done
2,872,069 UART: [art] Populate DV Done
2,880,010 UART: [fht] FMC Alias Private Key: 7
2,880,972 UART: [art] Derive CDI
2,881,252 UART: [art] Store in slot 0x4
2,967,241 UART: [art] Derive Key Pair
2,967,601 UART: [art] Store priv key in slot 0x5
2,981,139 UART: [art] Derive Key Pair - Done
2,996,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,454 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,219 UART: [art] PUB.X = 03261DCCF8398B3EAE53D95680D80BB041CC4B1CE9EF14E2C84A546F92E7BB368948750FFA6097812B7AAD18A42ABD95
3,018,992 UART: [art] PUB.Y = 1B38EAE93E232673FD40F4973A0B0F4356F1D294AB1A9028985AF000C5D8F790E01DBCBDF2F1D3BC731F316D5BFB55F5
3,025,928 UART: [art] SIG.R = 777BC3C4B82EDB6350240824D32C4C7F962DCC62B763D19ADE9325BFBEEFED5956675F1D425C85096C4F85A76F88E52C
3,032,702 UART: [art] SIG.S = A037DF9B9563E0ACBCD7AAEFD0AC9BCDAD9EEBB0F670F640950F638950FAD33CE305EC5835CAC2EFC49547B0C6FBC00A
3,056,495 UART: Caliptra RT
3,056,838 UART: [state] CFI Enabled
3,175,915 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,313 UART: [rt]cmd =0x50435252, len=8
3,207,949 >>> mbox cmd response data (8 bytes)
3,207,950 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,237,611 UART: [rt]cmd =0x50435251, len=36
3,404,657 >>> mbox cmd response data (1848 bytes)
3,404,658 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,941 UART: [rt]cmd =0x43455246, len=4
3,445,892 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
893,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,399 UART: [kat] ++
897,551 UART: [kat] sha1
901,771 UART: [kat] SHA2-256
903,711 UART: [kat] SHA2-384
906,596 UART: [kat] SHA2-512-ACC
908,497 UART: [kat] ECC-384
918,232 UART: [kat] HMAC-384Kdf
922,844 UART: [kat] LMS
1,171,172 UART: [kat] --
1,171,979 UART: [cold-reset] ++
1,172,459 UART: [fht] FHT @ 0x50003400
1,174,994 UART: [idev] ++
1,175,162 UART: [idev] CDI.KEYID = 6
1,175,522 UART: [idev] SUBJECT.KEYID = 7
1,175,946 UART: [idev] UDS.KEYID = 0
1,176,291 ready_for_fw is high
1,176,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,880 UART: [idev] Erasing UDS.KEYID = 0
1,201,349 UART: [idev] Sha1 KeyId Algorithm
1,209,843 UART: [idev] --
1,211,039 UART: [ldev] ++
1,211,207 UART: [ldev] CDI.KEYID = 6
1,211,570 UART: [ldev] SUBJECT.KEYID = 5
1,211,996 UART: [ldev] AUTHORITY.KEYID = 7
1,212,459 UART: [ldev] FE.KEYID = 1
1,217,853 UART: [ldev] Erasing FE.KEYID = 1
1,244,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,107 UART: [ldev] --
1,283,434 UART: [fwproc] Wait for Commands...
1,284,138 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,422 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,592 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,807 >>> mbox cmd response: success
2,828,807 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,829,829 UART: [afmc] ++
2,829,997 UART: [afmc] CDI.KEYID = 6
2,830,359 UART: [afmc] SUBJECT.KEYID = 7
2,830,784 UART: [afmc] AUTHORITY.KEYID = 5
2,865,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,860 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,608 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,317 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,200 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,901 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,599 UART: [afmc] --
2,908,523 UART: [cold-reset] --
2,909,183 UART: [state] Locking Datavault
2,910,294 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,898 UART: [state] Locking ICCM
2,911,408 UART: [exit] Launching FMC @ 0x40000130
2,916,738 UART:
2,916,754 UART: Running Caliptra FMC ...
2,917,162 UART:
2,917,216 UART: [state] CFI Enabled
2,927,812 UART: [fht] FMC Alias Private Key: 7
3,047,186 UART: [art] Extend RT PCRs Done
3,047,614 UART: [art] Lock RT PCRs Done
3,049,064 UART: [art] Populate DV Done
3,057,439 UART: [fht] FMC Alias Private Key: 7
3,058,531 UART: [art] Derive CDI
3,058,811 UART: [art] Store in slot 0x4
3,144,938 UART: [art] Derive Key Pair
3,145,298 UART: [art] Store priv key in slot 0x5
3,159,136 UART: [art] Derive Key Pair - Done
3,173,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,373 UART: [art] PUB.X = 8D7EAB4B6F86CDAB14D595AB54F1174F8694FE1C08838F7853AB09CA900048246F89C5E97472F505C508267A6CB51627
3,196,109 UART: [art] PUB.Y = 074EB25A035B44EA938E1464AAD0898A0AA6441761FA73494624CD2F489A7E5E45BE288F706E966BA07B8065CE3B8E11
3,203,052 UART: [art] SIG.R = C23633A5E6A10C3A07C7AFCC7A8A674961B56ADE2DA456D116AC9E71EF8FBCBC6A3C201D93F09A89E50226938E1D8435
3,209,827 UART: [art] SIG.S = 30642F58D702455A684EDD0417EC98EE98FDAAB275B170A105803DBE1642B44BCA399672431637C2EAFDF9FC4012495C
3,233,422 UART: Caliptra RT
3,233,673 UART: [state] CFI Enabled
3,352,936 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,292 UART: [rt]cmd =0x50435252, len=8
3,384,986 >>> mbox cmd response data (8 bytes)
3,384,987 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,462 UART: [rt]cmd =0x50435251, len=36
3,581,996 >>> mbox cmd response data (1848 bytes)
3,581,997 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,550 UART: [rt]cmd =0x43455246, len=4
3,623,573 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,537 ready_for_fw is high
1,060,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,020 >>> mbox cmd response: success
2,680,020 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,741,903 UART:
2,741,919 UART: Running Caliptra FMC ...
2,742,327 UART:
2,742,381 UART: [state] CFI Enabled
2,752,855 UART: [fht] FMC Alias Private Key: 7
2,871,667 UART: [art] Extend RT PCRs Done
2,872,095 UART: [art] Lock RT PCRs Done
2,873,609 UART: [art] Populate DV Done
2,881,738 UART: [fht] FMC Alias Private Key: 7
2,882,884 UART: [art] Derive CDI
2,883,164 UART: [art] Store in slot 0x4
2,968,681 UART: [art] Derive Key Pair
2,969,041 UART: [art] Store priv key in slot 0x5
2,982,579 UART: [art] Derive Key Pair - Done
2,996,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,330 UART: [art] PUB.X = 0B38A63FA0661F2ED773C5335BBC513F73A7867C9772D4650F4262830E1693F211E7DB378684860ECDC275E5AC5D1EB2
3,020,088 UART: [art] PUB.Y = E839F366B402B21B8F52F4DFAE4B3157A8166E7A4DF84B3A8A6CB4A9976FEB2D66B780ADD32BF4D6B00650B5112A775C
3,027,046 UART: [art] SIG.R = AC051BB1C9A85F5B4998BAEC55F075E49C3291701F5FB6FC61848F57AE2EA298FE750EEE3838462029E646E8443B2C2A
3,033,818 UART: [art] SIG.S = 525C8781D40D93ADEEFE2967B5B0C2AD169632B3D66B571FC062BAC1E896838C4F30112EE3AD92F71154E4D17A1DC64D
3,057,833 UART: Caliptra RT
3,058,084 UART: [state] CFI Enabled
3,178,061 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,547 UART: [rt]cmd =0x50435252, len=8
3,210,125 >>> mbox cmd response data (8 bytes)
3,210,126 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,817 UART: [rt]cmd =0x50435251, len=36
3,407,185 >>> mbox cmd response data (1848 bytes)
3,407,186 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,415 UART: [rt]cmd =0x43455246, len=4
3,448,526 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
893,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,560 UART: [kat] ++
897,712 UART: [kat] sha1
901,998 UART: [kat] SHA2-256
903,938 UART: [kat] SHA2-384
906,543 UART: [kat] SHA2-512-ACC
908,444 UART: [kat] ECC-384
918,635 UART: [kat] HMAC-384Kdf
923,441 UART: [kat] LMS
1,171,769 UART: [kat] --
1,172,596 UART: [cold-reset] ++
1,173,006 UART: [fht] FHT @ 0x50003400
1,175,797 UART: [idev] ++
1,175,965 UART: [idev] CDI.KEYID = 6
1,176,325 UART: [idev] SUBJECT.KEYID = 7
1,176,749 UART: [idev] UDS.KEYID = 0
1,177,094 ready_for_fw is high
1,177,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,063 UART: [idev] Erasing UDS.KEYID = 0
1,201,878 UART: [idev] Sha1 KeyId Algorithm
1,210,250 UART: [idev] --
1,211,330 UART: [ldev] ++
1,211,498 UART: [ldev] CDI.KEYID = 6
1,211,861 UART: [ldev] SUBJECT.KEYID = 5
1,212,287 UART: [ldev] AUTHORITY.KEYID = 7
1,212,750 UART: [ldev] FE.KEYID = 1
1,217,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,392 UART: [ldev] --
1,283,883 UART: [fwproc] Wait for Commands...
1,284,609 UART: [fwproc] Recv command 0x46574c44
1,285,337 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,161 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,331 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,500 >>> mbox cmd response: success
2,827,500 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,828,642 UART: [afmc] ++
2,828,810 UART: [afmc] CDI.KEYID = 6
2,829,172 UART: [afmc] SUBJECT.KEYID = 7
2,829,597 UART: [afmc] AUTHORITY.KEYID = 5
2,865,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,277 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,986 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,869 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,570 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,564 UART: [afmc] --
2,908,454 UART: [cold-reset] --
2,909,292 UART: [state] Locking Datavault
2,910,619 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,223 UART: [state] Locking ICCM
2,911,801 UART: [exit] Launching FMC @ 0x40000130
2,917,131 UART:
2,917,147 UART: Running Caliptra FMC ...
2,917,555 UART:
2,917,698 UART: [state] CFI Enabled
2,928,340 UART: [fht] FMC Alias Private Key: 7
3,047,232 UART: [art] Extend RT PCRs Done
3,047,660 UART: [art] Lock RT PCRs Done
3,049,376 UART: [art] Populate DV Done
3,057,553 UART: [fht] FMC Alias Private Key: 7
3,058,501 UART: [art] Derive CDI
3,058,781 UART: [art] Store in slot 0x4
3,144,770 UART: [art] Derive Key Pair
3,145,130 UART: [art] Store priv key in slot 0x5
3,158,230 UART: [art] Derive Key Pair - Done
3,172,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,297 UART: [art] PUB.X = A0DC887B51E60B7595FD3AA78060309F86F7732D0837048CDED6085AF079E304C21CF17F4D422E222959D9DFD107B2C5
3,196,051 UART: [art] PUB.Y = B387781EFEA69F8194181AFB75F841AE05F80CA0784C5C0DE3F9E51148AD6B72D0F1583D6D596ED4E4F226FBF5EA3128
3,203,004 UART: [art] SIG.R = D07463E3A9DF7270BB90353FC20824947D6542F019D67AB7BA19E9EEB2432BBEDCFE1BA8C89CAF5FB46041D54C0D3B07
3,209,781 UART: [art] SIG.S = 6EFA33D95BB34541762841057483CCE009FB86509662BC1484B6C41ACC361AD511E6C58628E5AD350806EA8CCF3FCF59
3,233,283 UART: Caliptra RT
3,233,626 UART: [state] CFI Enabled
3,353,125 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,399 UART: [rt]cmd =0x50435252, len=8
3,385,019 >>> mbox cmd response data (8 bytes)
3,385,020 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,727 UART: [rt]cmd =0x50435251, len=36
3,582,257 >>> mbox cmd response data (1848 bytes)
3,582,258 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,627 UART: [rt]cmd =0x43455246, len=4
3,623,666 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,228 ready_for_fw is high
1,061,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,631 >>> mbox cmd response: success
2,679,631 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,741,472 UART:
2,741,488 UART: Running Caliptra FMC ...
2,741,896 UART:
2,742,039 UART: [state] CFI Enabled
2,752,325 UART: [fht] FMC Alias Private Key: 7
2,872,081 UART: [art] Extend RT PCRs Done
2,872,509 UART: [art] Lock RT PCRs Done
2,873,955 UART: [art] Populate DV Done
2,881,980 UART: [fht] FMC Alias Private Key: 7
2,883,084 UART: [art] Derive CDI
2,883,364 UART: [art] Store in slot 0x4
2,969,577 UART: [art] Derive Key Pair
2,969,937 UART: [art] Store priv key in slot 0x5
2,983,305 UART: [art] Derive Key Pair - Done
2,998,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,414 UART: [art] PUB.X = C3489B9424D703D344F423DE260289F499E123DBEC5DC11EF11CD4CB55EBABB0FBCF71D0F1410DDE0ED7CE410C894FE7
3,021,191 UART: [art] PUB.Y = 2856A3629EBA79C51F87812ABE5C2BF88118F7A0218C1341C62B239FCE056F0366DBE81ACB47E69D5BAB8FDD9894BAEA
3,028,151 UART: [art] SIG.R = 8132C6923A5472597BDB5D5CEE0A4BA669D8F3AB531AFDC9EC24C4BD8BFF5A001FA7BDC4A836F064B0F0034B6B192B82
3,034,913 UART: [art] SIG.S = C0AC2E9E6A245B28E1A8D6F17A92AD0CCB6570E4759F84A7B9192DBEA87249A8511148FE0C782ABB80AFCD35AD235E91
3,058,699 UART: Caliptra RT
3,059,042 UART: [state] CFI Enabled
3,179,340 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,930 UART: [rt]cmd =0x50435252, len=8
3,211,362 >>> mbox cmd response data (8 bytes)
3,211,363 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,964 UART: [rt]cmd =0x50435251, len=36
3,408,342 >>> mbox cmd response data (1848 bytes)
3,408,343 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,770 UART: [rt]cmd =0x43455246, len=4
3,449,913 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
191,975 UART:
192,325 UART: Running Caliptra ROM ...
193,467 UART:
193,616 UART: [state] CFI Enabled
266,333 UART: [state] LifecycleState = Unprovisioned
268,325 UART: [state] DebugLocked = No
270,432 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,096 UART: [kat] SHA2-256
445,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,276 UART: [kat] ++
456,800 UART: [kat] sha1
468,029 UART: [kat] SHA2-256
470,692 UART: [kat] SHA2-384
475,614 UART: [kat] SHA2-512-ACC
477,983 UART: [kat] ECC-384
2,769,839 UART: [kat] HMAC-384Kdf
2,800,901 UART: [kat] LMS
3,991,241 UART: [kat] --
3,995,828 UART: [cold-reset] ++
3,996,909 UART: [fht] Storing FHT @ 0x50003400
4,008,111 UART: [idev] ++
4,008,709 UART: [idev] CDI.KEYID = 6
4,009,629 UART: [idev] SUBJECT.KEYID = 7
4,010,884 UART: [idev] UDS.KEYID = 0
4,011,934 ready_for_fw is high
4,012,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,215 UART: [idev] Erasing UDS.KEYID = 0
7,345,592 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,540 UART: [idev] --
7,371,290 UART: [ldev] ++
7,371,858 UART: [ldev] CDI.KEYID = 6
7,372,830 UART: [ldev] SUBJECT.KEYID = 5
7,374,049 UART: [ldev] AUTHORITY.KEYID = 7
7,375,280 UART: [ldev] FE.KEYID = 1
7,422,707 UART: [ldev] Erasing FE.KEYID = 1
10,750,030 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,597 UART: [ldev] --
13,113,516 UART: [fwproc] Waiting for Commands...
13,116,257 UART: [fwproc] Received command 0x46574c44
13,118,436 UART: [fwproc] Received Image of size 118548 bytes
17,223,038 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,853 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,026 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,702,744 >>> mbox cmd response: success
17,706,733 UART: [afmc] ++
17,707,329 UART: [afmc] CDI.KEYID = 6
17,708,242 UART: [afmc] SUBJECT.KEYID = 7
17,709,457 UART: [afmc] AUTHORITY.KEYID = 5
21,067,780 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,347 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,618 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,071 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,802 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,176 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,775 UART: [afmc] --
23,441,144 UART: [cold-reset] --
23,444,462 UART: [state] Locking Datavault
23,449,329 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,027 UART: [state] Locking ICCM
23,452,727 UART: [exit] Launching FMC @ 0x40000130
23,461,126 UART:
23,461,354 UART: Running Caliptra FMC ...
23,462,381 UART:
23,462,528 UART: [state] CFI Enabled
23,531,247 UART: [fht] FMC Alias Private Key: 7
25,871,775 UART: [art] Extend RT PCRs Done
25,872,993 UART: [art] Lock RT PCRs Done
25,875,133 UART: [art] Populate DV Done
25,880,539 UART: [fht] FMC Alias Private Key: 7
25,882,220 UART: [art] Derive CDI
25,882,970 UART: [art] Store in slot 0x4
25,939,420 UART: [art] Derive Key Pair
25,940,419 UART: [art] Store priv key in slot 0x5
29,234,650 UART: [art] Derive Key Pair - Done
29,247,378 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,808 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,321 UART: [art] PUB.X = 763B97B45D114006AC990DEDC264A562EC2A25ED2BB6DB27D7248274409AA9D4B963A72D81BB554B98F8435061E36A15
31,545,594 UART: [art] PUB.Y = 5865D94658159817EFB4B6BE09853482F70FF3EE5D5461339DA692F99D4EAE366D09767949CB95F964E74258ACEC4EA9
31,552,840 UART: [art] SIG.R = 79D63B899EE06DCE4532990296400FB11B7D9B1F67BA0FDB3426F51CD82D9751EE0C8DEE351B63B0D85D148097BF87A9
31,560,190 UART: [art] SIG.S = 3D7682AD72F1FAFB8B9D5261234155454B3829409294189D96B9975F45A6689B4B8A831C9729A4CEA9E7C7FBCC8DBB9E
32,865,400 UART: Caliptra RT
32,866,132 UART: [state] CFI Enabled
33,042,335 UART: [rt] RT listening for mailbox commands...
33,044,296 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,074,338 UART: [rt]cmd =0x44504543, len=28
33,117,006 >>> mbox cmd response data (2076 bytes)
33,127,107 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,157,167 UART: [rt]cmd =0x44504543, len=28
33,197,638 >>> mbox cmd response data (2076 bytes)
33,542,640 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
33,575,915 UART: [rt]cmd =0x49444550, len=352
33,587,030 >>> mbox cmd response data (8 bytes)
33,587,514 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,617,473 UART: [rt]cmd =0x44504543, len=28
33,660,216 >>> mbox cmd response data (2076 bytes)
33,670,266 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,700,113 UART: [rt]cmd =0x44504543, len=28
33,741,186 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,786,405 ready_for_fw is high
3,786,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,946,106 >>> mbox cmd response: success
23,629,430 UART:
23,629,878 UART: Running Caliptra FMC ...
23,631,011 UART:
23,631,181 UART: [state] CFI Enabled
23,698,561 UART: [fht] FMC Alias Private Key: 7
26,039,470 UART: [art] Extend RT PCRs Done
26,040,693 UART: [art] Lock RT PCRs Done
26,042,377 UART: [art] Populate DV Done
26,047,748 UART: [fht] FMC Alias Private Key: 7
26,049,400 UART: [art] Derive CDI
26,050,239 UART: [art] Store in slot 0x4
26,106,959 UART: [art] Derive Key Pair
26,107,954 UART: [art] Store priv key in slot 0x5
29,399,986 UART: [art] Derive Key Pair - Done
29,412,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,701,429 UART: [art] Erasing AUTHORITY.KEYID = 7
31,702,941 UART: [art] PUB.X = EE6153F1312ADAB00A4ABE34DC763644B9EED5F07E546E1CE6E186A321B15F21DFBD8520DF2AE6951A5C4039BB01A654
31,710,206 UART: [art] PUB.Y = 4C019B17BAF81250C4225B5D4B02EB67205E874B846149AA010EDB06612CBCD1E0BEA30568804DE2D6BE4AE9574B3189
31,717,477 UART: [art] SIG.R = D41CF2C1CB202C330B70788FA8CD1B6C7899D6A86F7FCF757CE9C6868AC58F514228CD4AA9858B0CDED3CDA96F87EEB1
31,724,941 UART: [art] SIG.S = 6714E63A08A83FADC7C7FEAD6FF752DA430B41B4DF474E0163620AF385343ED32C57E657210D8E7E40A24DE1EDB47FE0
33,030,122 UART: Caliptra RT
33,030,845 UART: [state] CFI Enabled
33,206,128 UART: [rt] RT listening for mailbox commands...
33,208,061 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,238,099 UART: [rt]cmd =0x44504543, len=28
33,281,396 >>> mbox cmd response data (2076 bytes)
33,291,433 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,321,440 UART: [rt]cmd =0x44504543, len=28
33,362,247 >>> mbox cmd response data (2076 bytes)
33,707,544 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,740,796 UART: [rt]cmd =0x49444550, len=353
33,754,498 >>> mbox cmd response data (8 bytes)
33,755,010 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,784,924 UART: [rt]cmd =0x44504543, len=28
33,827,479 >>> mbox cmd response data (2076 bytes)
33,837,515 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,867,593 UART: [rt]cmd =0x44504543, len=28
33,908,724 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,417 UART:
192,778 UART: Running Caliptra ROM ...
193,902 UART:
603,564 UART: [state] CFI Enabled
616,748 UART: [state] LifecycleState = Unprovisioned
618,621 UART: [state] DebugLocked = No
620,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,703 UART: [kat] SHA2-256
795,426 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,014 UART: [kat] ++
806,462 UART: [kat] sha1
816,476 UART: [kat] SHA2-256
819,198 UART: [kat] SHA2-384
825,112 UART: [kat] SHA2-512-ACC
827,474 UART: [kat] ECC-384
3,111,845 UART: [kat] HMAC-384Kdf
3,123,024 UART: [kat] LMS
4,313,111 UART: [kat] --
4,320,113 UART: [cold-reset] ++
4,322,685 UART: [fht] Storing FHT @ 0x50003400
4,333,521 UART: [idev] ++
4,334,079 UART: [idev] CDI.KEYID = 6
4,335,104 UART: [idev] SUBJECT.KEYID = 7
4,336,269 UART: [idev] UDS.KEYID = 0
4,337,252 ready_for_fw is high
4,337,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,342 UART: [idev] Erasing UDS.KEYID = 0
7,624,085 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,955 UART: [idev] --
7,649,656 UART: [ldev] ++
7,650,238 UART: [ldev] CDI.KEYID = 6
7,651,198 UART: [ldev] SUBJECT.KEYID = 5
7,652,423 UART: [ldev] AUTHORITY.KEYID = 7
7,653,649 UART: [ldev] FE.KEYID = 1
7,666,019 UART: [ldev] Erasing FE.KEYID = 1
10,950,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,000 UART: [ldev] --
13,313,479 UART: [fwproc] Waiting for Commands...
13,315,195 UART: [fwproc] Received command 0x46574c44
13,317,423 UART: [fwproc] Received Image of size 118548 bytes
17,423,596 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,101 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,282 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,116 >>> mbox cmd response: success
17,905,941 UART: [afmc] ++
17,906,571 UART: [afmc] CDI.KEYID = 6
17,907,484 UART: [afmc] SUBJECT.KEYID = 7
17,908,693 UART: [afmc] AUTHORITY.KEYID = 5
21,222,624 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,513,751 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,007 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,456 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,151 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,610 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,515 UART: [afmc] --
23,583,566 UART: [cold-reset] --
23,588,446 UART: [state] Locking Datavault
23,594,558 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,303 UART: [state] Locking ICCM
23,597,420 UART: [exit] Launching FMC @ 0x40000130
23,605,827 UART:
23,606,058 UART: Running Caliptra FMC ...
23,607,155 UART:
23,607,309 UART: [state] CFI Enabled
23,614,921 UART: [fht] FMC Alias Private Key: 7
25,955,513 UART: [art] Extend RT PCRs Done
25,956,736 UART: [art] Lock RT PCRs Done
25,958,036 UART: [art] Populate DV Done
25,963,457 UART: [fht] FMC Alias Private Key: 7
25,964,934 UART: [art] Derive CDI
25,965,689 UART: [art] Store in slot 0x4
26,008,329 UART: [art] Derive Key Pair
26,009,329 UART: [art] Store priv key in slot 0x5
29,251,178 UART: [art] Derive Key Pair - Done
29,264,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,351 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,878 UART: [art] PUB.X = 1292F96E30FF97A1A577DE365EB4D3A4FA631A8085319FF09AC8433BDE3F454F45D5F2851648784A20C1C3D1044334C0
31,553,131 UART: [art] PUB.Y = F02622D926A53CD4B49B91C38F5A64E210FC91330821620C0229F46916AEB98F5D156250869EB9B8EE33BFC3690B4A12
31,560,412 UART: [art] SIG.R = 262C9FDA4995A49D5CB028BC3D465CD400D2EC59BA677E5356335C1EBBA8138A45E4898943759D8A8DE07AE010977FCB
31,567,755 UART: [art] SIG.S = B9813D394290A6964D4830C97C40BC9E94BE7B47805A229362215C236F9CC82E687F15CE8F95A2C4652F9EA0A4922ADB
32,873,103 UART: Caliptra RT
32,873,814 UART: [state] CFI Enabled
33,006,605 UART: [rt] RT listening for mailbox commands...
33,008,546 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,038,462 UART: [rt]cmd =0x44504543, len=28
33,081,616 >>> mbox cmd response data (2076 bytes)
33,091,665 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,121,735 UART: [rt]cmd =0x44504543, len=28
33,162,469 >>> mbox cmd response data (2076 bytes)
33,506,287 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,539,460 UART: [rt]cmd =0x49444550, len=353
33,553,398 >>> mbox cmd response data (8 bytes)
33,553,862 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,583,845 UART: [rt]cmd =0x44504543, len=28
33,626,445 >>> mbox cmd response data (2076 bytes)
33,636,648 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,666,632 UART: [rt]cmd =0x44504543, len=28
33,707,570 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
4,123,267 ready_for_fw is high
4,123,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,134 >>> mbox cmd response: success
23,803,344 UART:
23,803,816 UART: Running Caliptra FMC ...
23,804,930 UART:
23,805,088 UART: [state] CFI Enabled
23,812,740 UART: [fht] FMC Alias Private Key: 7
26,153,262 UART: [art] Extend RT PCRs Done
26,154,482 UART: [art] Lock RT PCRs Done
26,156,344 UART: [art] Populate DV Done
26,161,973 UART: [fht] FMC Alias Private Key: 7
26,163,453 UART: [art] Derive CDI
26,164,182 UART: [art] Store in slot 0x4
26,206,774 UART: [art] Derive Key Pair
26,207,813 UART: [art] Store priv key in slot 0x5
29,449,936 UART: [art] Derive Key Pair - Done
29,462,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,313 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,822 UART: [art] PUB.X = FC100011DCE4659B3F7EAE730CF1AC23F808392BD9B44CFCB34878426385617BC5C7D2F3D68B54ABCAF1B579BE03C7E6
31,752,069 UART: [art] PUB.Y = DBFDB71A1923EB3FA534D83B57AF80846E7BCD8535157A823D78CBED6CC16498DDE8748A8771784266A372E129AB3DEA
31,759,380 UART: [art] SIG.R = 1698F985FBF0DAB4C4898EFC4B85E405FDBEFAD47A6DCF9C410CEE73CD440FABA889E516567EE9BC1FE11175F4C7576E
31,766,768 UART: [art] SIG.S = F3B42ACF8598B7C7504142CD7A7BF537F8902AD67C83079284A44A0DDBF17F1A6F6DA8C78D5C6F686F83D6DCA8D8DFCC
33,071,821 UART: Caliptra RT
33,072,540 UART: [state] CFI Enabled
33,205,508 UART: [rt] RT listening for mailbox commands...
33,207,440 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,237,187 UART: [rt]cmd =0x44504543, len=28
33,280,023 >>> mbox cmd response data (2076 bytes)
33,290,057 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,320,067 UART: [rt]cmd =0x44504543, len=28
33,360,443 >>> mbox cmd response data (2076 bytes)
33,704,092 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
33,737,318 UART: [rt]cmd =0x49444550, len=352
33,748,649 >>> mbox cmd response data (8 bytes)
33,749,141 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,779,268 UART: [rt]cmd =0x44504543, len=28
33,822,302 >>> mbox cmd response data (2076 bytes)
33,832,362 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,862,489 UART: [rt]cmd =0x44504543, len=28
33,903,919 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,099 UART:
192,465 UART: Running Caliptra ROM ...
193,609 UART:
193,752 UART: [state] CFI Enabled
265,457 UART: [state] LifecycleState = Unprovisioned
267,372 UART: [state] DebugLocked = No
269,321 UART: [state] WD Timer not started. Device not locked for debugging
272,366 UART: [kat] SHA2-256
452,021 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,846 UART: [kat] ++
463,297 UART: [kat] sha1
473,529 UART: [kat] SHA2-256
476,245 UART: [kat] SHA2-384
481,828 UART: [kat] SHA2-512-ACC
484,196 UART: [kat] ECC-384
2,949,889 UART: [kat] HMAC-384Kdf
2,971,664 UART: [kat] LMS
3,448,101 UART: [kat] --
3,453,750 UART: [cold-reset] ++
3,454,771 UART: [fht] FHT @ 0x50003400
3,465,605 UART: [idev] ++
3,466,166 UART: [idev] CDI.KEYID = 6
3,467,193 UART: [idev] SUBJECT.KEYID = 7
3,468,363 UART: [idev] UDS.KEYID = 0
3,469,408 ready_for_fw is high
3,469,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,720 UART: [idev] Erasing UDS.KEYID = 0
5,990,948 UART: [idev] Sha1 KeyId Algorithm
6,015,219 UART: [idev] --
6,020,160 UART: [ldev] ++
6,020,743 UART: [ldev] CDI.KEYID = 6
6,021,669 UART: [ldev] SUBJECT.KEYID = 5
6,022,880 UART: [ldev] AUTHORITY.KEYID = 7
6,024,116 UART: [ldev] FE.KEYID = 1
6,059,720 UART: [ldev] Erasing FE.KEYID = 1
8,564,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,002 UART: [ldev] --
10,374,977 UART: [fwproc] Wait for Commands...
10,377,028 UART: [fwproc] Recv command 0x46574c44
10,379,013 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,582 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,646 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,729 >>> mbox cmd response: success
14,349,111 UART: [afmc] ++
14,349,708 UART: [afmc] CDI.KEYID = 6
14,350,672 UART: [afmc] SUBJECT.KEYID = 7
14,351,889 UART: [afmc] AUTHORITY.KEYID = 5
16,892,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,776 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,614 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,653 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,670,201 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,694,488 UART: [afmc] --
18,698,629 UART: [cold-reset] --
18,701,784 UART: [state] Locking Datavault
18,704,786 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,536 UART: [state] Locking ICCM
18,708,625 UART: [exit] Launching FMC @ 0x40000130
18,717,069 UART:
18,717,305 UART: Running Caliptra FMC ...
18,718,405 UART:
18,718,559 UART: [state] CFI Enabled
18,777,320 UART: [fht] FMC Alias Private Key: 7
20,564,432 UART: [art] Extend RT PCRs Done
20,565,650 UART: [art] Lock RT PCRs Done
20,567,186 UART: [art] Populate DV Done
20,572,862 UART: [fht] FMC Alias Private Key: 7
20,574,450 UART: [art] Derive CDI
20,575,187 UART: [art] Store in slot 0x4
20,631,102 UART: [art] Derive Key Pair
20,632,139 UART: [art] Store priv key in slot 0x5
23,094,580 UART: [art] Derive Key Pair - Done
23,107,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,821,184 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,681 UART: [art] PUB.X = BE93C72AF36555C7E45D397400D8C833362321C02FCF9AA6342FFCFB98E9A2E49F0DC2B93AE1EA8E58E73E02BECF1E1D
24,829,978 UART: [art] PUB.Y = BEF364E743E4A23A1E9B8CB48904FCE110B3FDA870E52C2ADCC1741FE404F18034EDA6B500E739C45C6B7D21D6A84E1D
24,837,260 UART: [art] SIG.R = 0A4E5FCBA9AD1AFE62EAE58E5A84FEFFAADF8D7D0E4EE916CCF5A022687962086F55FB7120BF261E6E71C77E0CF9C156
24,844,683 UART: [art] SIG.S = AC4A06B4423C3BB4FA24D4351B8804690BD401573613EF7C1DAF806C9B45001A2AC98AB6A0F39601E7E1E646CBD007FA
25,823,278 UART: Caliptra RT
25,823,988 UART: [state] CFI Enabled
26,006,277 UART: [rt] RT listening for mailbox commands...
26,008,228 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,038,455 UART: [rt]cmd =0x44504543, len=28
26,081,136 >>> mbox cmd response data (2076 bytes)
26,091,192 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,120,981 UART: [rt]cmd =0x44504543, len=28
26,161,603 >>> mbox cmd response data (2076 bytes)
26,505,985 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,538,905 UART: [rt]cmd =0x49444550, len=352
26,550,026 >>> mbox cmd response data (8 bytes)
26,550,545 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,580,462 UART: [rt]cmd =0x44504543, len=28
26,623,202 >>> mbox cmd response data (2076 bytes)
26,633,282 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,663,146 UART: [rt]cmd =0x44504543, len=28
26,704,385 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,460,678 ready_for_fw is high
3,461,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,980 >>> mbox cmd response: success
18,532,846 UART:
18,533,238 UART: Running Caliptra FMC ...
18,534,351 UART:
18,534,502 UART: [state] CFI Enabled
18,605,366 UART: [fht] FMC Alias Private Key: 7
20,371,566 UART: [art] Extend RT PCRs Done
20,372,785 UART: [art] Lock RT PCRs Done
20,374,454 UART: [art] Populate DV Done
20,379,982 UART: [fht] FMC Alias Private Key: 7
20,381,464 UART: [art] Derive CDI
20,382,228 UART: [art] Store in slot 0x4
20,438,067 UART: [art] Derive Key Pair
20,439,071 UART: [art] Store priv key in slot 0x5
22,915,098 UART: [art] Derive Key Pair - Done
22,928,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,641,943 UART: [art] Erasing AUTHORITY.KEYID = 7
24,643,446 UART: [art] PUB.X = 3BDAFF0DE62FD743027CF15B9BDE4B137B646F29FF7CDF9F2711872EA6D0C66FBAC7228B6E9D55C2B76751E31734FA57
24,650,708 UART: [art] PUB.Y = 6A3A505BAACE00D3E4EEB6516036D2384F2830A9CA06DCE2605B1D0527F605105A2794A535EA6F5A56D30769261D9FB3
24,657,954 UART: [art] SIG.R = 8A988144C5944256F1FA5A1D3095A4DD57BC874CD4A5B8802B9336A88EA87A17842B70BCF14A9CD13F0A2AC10901E5F7
24,665,344 UART: [art] SIG.S = 7A5488AD03D90906B78C5F1ABCA8E2392AF4AE3C33C39D2FA417A14A63A20C9BCE2A7D5E49E385705C1D3805C6C94EB4
25,644,303 UART: Caliptra RT
25,645,039 UART: [state] CFI Enabled
25,825,712 UART: [rt] RT listening for mailbox commands...
25,827,658 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,857,628 UART: [rt]cmd =0x44504543, len=28
25,900,628 >>> mbox cmd response data (2076 bytes)
25,910,668 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,940,516 UART: [rt]cmd =0x44504543, len=28
25,981,406 >>> mbox cmd response data (2076 bytes)
26,325,523 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,358,524 UART: [rt]cmd =0x49444550, len=352
26,369,827 >>> mbox cmd response data (8 bytes)
26,370,358 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,400,112 UART: [rt]cmd =0x44504543, len=28
26,442,692 >>> mbox cmd response data (2076 bytes)
26,452,715 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,482,832 UART: [rt]cmd =0x44504543, len=28
26,523,610 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,508 UART:
192,874 UART: Running Caliptra ROM ...
194,072 UART:
603,871 UART: [state] CFI Enabled
618,978 UART: [state] LifecycleState = Unprovisioned
620,849 UART: [state] DebugLocked = No
622,593 UART: [state] WD Timer not started. Device not locked for debugging
626,847 UART: [kat] SHA2-256
806,500 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,311 UART: [kat] ++
817,847 UART: [kat] sha1
828,232 UART: [kat] SHA2-256
830,957 UART: [kat] SHA2-384
835,954 UART: [kat] SHA2-512-ACC
838,332 UART: [kat] ECC-384
3,279,393 UART: [kat] HMAC-384Kdf
3,291,019 UART: [kat] LMS
3,767,556 UART: [kat] --
3,771,057 UART: [cold-reset] ++
3,773,427 UART: [fht] FHT @ 0x50003400
3,784,836 UART: [idev] ++
3,785,404 UART: [idev] CDI.KEYID = 6
3,786,330 UART: [idev] SUBJECT.KEYID = 7
3,787,578 UART: [idev] UDS.KEYID = 0
3,788,504 ready_for_fw is high
3,788,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,551 UART: [idev] Erasing UDS.KEYID = 0
6,264,998 UART: [idev] Sha1 KeyId Algorithm
6,289,575 UART: [idev] --
6,295,249 UART: [ldev] ++
6,295,823 UART: [ldev] CDI.KEYID = 6
6,296,739 UART: [ldev] SUBJECT.KEYID = 5
6,297,971 UART: [ldev] AUTHORITY.KEYID = 7
6,299,208 UART: [ldev] FE.KEYID = 1
6,311,097 UART: [ldev] Erasing FE.KEYID = 1
8,785,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,412 UART: [ldev] --
10,582,039 UART: [fwproc] Wait for Commands...
10,584,192 UART: [fwproc] Recv command 0x46574c44
10,586,178 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,141,969 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,017 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,543,646 >>> mbox cmd response: success
14,547,099 UART: [afmc] ++
14,547,722 UART: [afmc] CDI.KEYID = 6
14,548,648 UART: [afmc] SUBJECT.KEYID = 7
14,549,869 UART: [afmc] AUTHORITY.KEYID = 5
17,056,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,042 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,869 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,934 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,529 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,145 UART: [afmc] --
18,855,580 UART: [cold-reset] --
18,859,765 UART: [state] Locking Datavault
18,866,203 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,904 UART: [state] Locking ICCM
18,869,304 UART: [exit] Launching FMC @ 0x40000130
18,877,730 UART:
18,877,973 UART: Running Caliptra FMC ...
18,879,202 UART:
18,879,374 UART: [state] CFI Enabled
18,887,344 UART: [fht] FMC Alias Private Key: 7
20,652,685 UART: [art] Extend RT PCRs Done
20,653,907 UART: [art] Lock RT PCRs Done
20,655,479 UART: [art] Populate DV Done
20,660,839 UART: [fht] FMC Alias Private Key: 7
20,662,487 UART: [art] Derive CDI
20,663,304 UART: [art] Store in slot 0x4
20,705,904 UART: [art] Derive Key Pair
20,706,899 UART: [art] Store priv key in slot 0x5
23,133,594 UART: [art] Derive Key Pair - Done
23,146,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,529 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,047 UART: [art] PUB.X = 7ABC3042D85222A112A7DE60AC989B2159CDF2C2A6D1A8563639625AA4DA2AA6AAD0F8AB3EF0104E05D6EF249BBF4B7B
24,861,351 UART: [art] PUB.Y = 92695E060458761FD739504F26BFD683DD06C5D3F1732C98340B8C01325BEBF277065A481838B25C47DBD0DE535596A7
24,868,583 UART: [art] SIG.R = 0DAD29EB0AE4E5B7603A3591DA309596235E0DBF3C2C227F593A06A8E7C77F1CCDC6BF3309D570E34AEBD88BF67885E8
24,875,970 UART: [art] SIG.S = 3469240337704B6D0345C5A82F234F23099BEF70B5D168D88A12762A47AC03A5931F5C4C2DE76291487EAEC6B4DB9AE5
25,854,209 UART: Caliptra RT
25,854,906 UART: [state] CFI Enabled
25,988,065 UART: [rt] RT listening for mailbox commands...
25,989,999 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,020,039 UART: [rt]cmd =0x44504543, len=28
26,062,906 >>> mbox cmd response data (2076 bytes)
26,072,945 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,102,859 UART: [rt]cmd =0x44504543, len=28
26,143,229 >>> mbox cmd response data (2076 bytes)
26,487,763 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,520,961 UART: [rt]cmd =0x49444550, len=352
26,532,159 >>> mbox cmd response data (8 bytes)
26,532,633 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,562,566 UART: [rt]cmd =0x44504543, len=28
26,605,283 >>> mbox cmd response data (2076 bytes)
26,615,306 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,645,295 UART: [rt]cmd =0x44504543, len=28
26,686,321 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,781,196 ready_for_fw is high
3,781,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,811 >>> mbox cmd response: success
18,698,658 UART:
18,699,063 UART: Running Caliptra FMC ...
18,700,177 UART:
18,700,333 UART: [state] CFI Enabled
18,708,190 UART: [fht] FMC Alias Private Key: 7
20,473,640 UART: [art] Extend RT PCRs Done
20,474,866 UART: [art] Lock RT PCRs Done
20,476,250 UART: [art] Populate DV Done
20,481,852 UART: [fht] FMC Alias Private Key: 7
20,483,505 UART: [art] Derive CDI
20,484,247 UART: [art] Store in slot 0x4
20,527,267 UART: [art] Derive Key Pair
20,528,267 UART: [art] Store priv key in slot 0x5
22,955,151 UART: [art] Derive Key Pair - Done
22,968,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,196 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,696 UART: [art] PUB.X = 7E552490CD23B2C95EFA3C680FA9FEDD33EDCBFF781CB37ECA8B9BFBB7F1CEA80EAE1376D93CAE69058203997ED2C38B
24,683,019 UART: [art] PUB.Y = 619F639B0D77C229A2186AA3A4BCDD72B4A47451C871BD4F23BF277DF61E000AA14FA773FF157AB0EE9F66535A2CF86D
24,690,331 UART: [art] SIG.R = 5DE236EB1C7D1F6E282BFCD500BA5F1808241580395E3F44B0AB551C62A4750E8E67F16A959FDD0254BA07D9E1ADE83C
24,697,671 UART: [art] SIG.S = 1C5462A3966F7D50DE93CAE84F3E2DE17F433D56D5B4C0925A3EA6303A918E64B6E4D8E42379A99B00F3AD9BA53CD7E2
25,676,543 UART: Caliptra RT
25,677,256 UART: [state] CFI Enabled
25,809,982 UART: [rt] RT listening for mailbox commands...
25,811,912 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,842,023 UART: [rt]cmd =0x44504543, len=28
25,884,572 >>> mbox cmd response data (2076 bytes)
25,894,587 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,924,601 UART: [rt]cmd =0x44504543, len=28
25,964,974 >>> mbox cmd response data (2076 bytes)
26,309,390 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,342,611 UART: [rt]cmd =0x49444550, len=352
26,353,857 >>> mbox cmd response data (8 bytes)
26,354,351 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,384,354 UART: [rt]cmd =0x44504543, len=28
26,426,970 >>> mbox cmd response data (2076 bytes)
26,437,002 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,466,989 UART: [rt]cmd =0x44504543, len=28
26,508,243 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,157 UART:
192,533 UART: Running Caliptra ROM ...
193,730 UART:
193,882 UART: [state] CFI Enabled
263,871 UART: [state] LifecycleState = Unprovisioned
266,288 UART: [state] DebugLocked = No
267,752 UART: [state] WD Timer not started. Device not locked for debugging
271,712 UART: [kat] SHA2-256
461,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,401 UART: [kat] ++
472,874 UART: [kat] sha1
484,456 UART: [kat] SHA2-256
487,461 UART: [kat] SHA2-384
493,472 UART: [kat] SHA2-512-ACC
496,020 UART: [kat] ECC-384
2,950,436 UART: [kat] HMAC-384Kdf
2,970,672 UART: [kat] LMS
3,502,419 UART: [kat] --
3,506,910 UART: [cold-reset] ++
3,507,986 UART: [fht] FHT @ 0x50003400
3,519,666 UART: [idev] ++
3,520,295 UART: [idev] CDI.KEYID = 6
3,521,275 UART: [idev] SUBJECT.KEYID = 7
3,522,518 UART: [idev] UDS.KEYID = 0
3,523,444 ready_for_fw is high
3,523,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,811 UART: [idev] Erasing UDS.KEYID = 0
6,028,690 UART: [idev] Sha1 KeyId Algorithm
6,051,873 UART: [idev] --
6,055,765 UART: [ldev] ++
6,056,446 UART: [ldev] CDI.KEYID = 6
6,057,358 UART: [ldev] SUBJECT.KEYID = 5
6,058,539 UART: [ldev] AUTHORITY.KEYID = 7
6,059,772 UART: [ldev] FE.KEYID = 1
6,099,752 UART: [ldev] Erasing FE.KEYID = 1
8,605,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,248 UART: [ldev] --
10,415,061 UART: [fwproc] Wait for Commands...
10,417,846 UART: [fwproc] Recv command 0x46574c44
10,420,157 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,653 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,890 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,674,087 >>> mbox cmd response: success
14,677,296 UART: [afmc] ++
14,678,024 UART: [afmc] CDI.KEYID = 6
14,679,222 UART: [afmc] SUBJECT.KEYID = 7
14,680,714 UART: [afmc] AUTHORITY.KEYID = 5
17,227,945 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,952,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,954,814 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,969,896 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,985,048 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,999,960 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,024,102 UART: [afmc] --
19,027,424 UART: [cold-reset] --
19,032,527 UART: [state] Locking Datavault
19,038,749 UART: [state] Locking PCR0, PCR1 and PCR31
19,040,949 UART: [state] Locking ICCM
19,042,241 UART: [exit] Launching FMC @ 0x40000130
19,050,881 UART:
19,051,128 UART: Running Caliptra FMC ...
19,052,234 UART:
19,052,393 UART: [state] CFI Enabled
19,108,585 UART: [fht] FMC Alias Private Key: 7
20,876,279 UART: [art] Extend RT PCRs Done
20,877,486 UART: [art] Lock RT PCRs Done
20,879,148 UART: [art] Populate DV Done
20,884,553 UART: [fht] FMC Alias Private Key: 7
20,886,191 UART: [art] Derive CDI
20,886,998 UART: [art] Store in slot 0x4
20,941,797 UART: [art] Derive Key Pair
20,942,862 UART: [art] Store priv key in slot 0x5
23,405,645 UART: [art] Derive Key Pair - Done
23,418,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,130,612 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,140 UART: [art] PUB.X = 67F4491208A72A615A27BB52821F03A989872876E717A830F86BE2B8DE3FB97AB3B43A09E59EB21D6EB44AE5E80C11FC
25,139,407 UART: [art] PUB.Y = FE53344AECC34DE17B8353D6B7D4D874D68712BCF5970CC36B2FA266105A00AD204B551CA2C200FD4D354659A92E1DDD
25,146,628 UART: [art] SIG.R = DF226EE0353B73A19C70816639436FE0DA086B01334ED3FDFE233C4152CA9260EEA42CC829EE730F5CDC0B087DB97551
25,154,008 UART: [art] SIG.S = C6C9294D4A56618A3B61AD77D5E1F29A32DDE49FD798F1B5B42A90883CB5DE2340B0FBAF0CAF608A821BBB33189C3B77
26,133,032 UART: Caliptra RT
26,133,722 UART: [state] CFI Enabled
26,313,720 UART: [rt] RT listening for mailbox commands...
26,315,661 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,345,511 UART: [rt]cmd =0x44504543, len=28
26,388,649 >>> mbox cmd response data (2076 bytes)
26,398,663 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,428,671 UART: [rt]cmd =0x44504543, len=28
26,469,847 >>> mbox cmd response data (2076 bytes)
26,814,453 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,847,522 UART: [rt]cmd =0x49444550, len=353
26,861,309 >>> mbox cmd response data (8 bytes)
26,861,785 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,891,644 UART: [rt]cmd =0x44504543, len=28
26,934,358 >>> mbox cmd response data (2076 bytes)
26,944,457 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,974,584 UART: [rt]cmd =0x44504543, len=28
27,015,338 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,437,614 ready_for_fw is high
3,438,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,592 >>> mbox cmd response: success
19,117,447 UART:
19,118,304 UART: Running Caliptra FMC ...
19,119,427 UART:
19,119,579 UART: [state] CFI Enabled
19,183,656 UART: [fht] FMC Alias Private Key: 7
20,950,163 UART: [art] Extend RT PCRs Done
20,951,407 UART: [art] Lock RT PCRs Done
20,953,205 UART: [art] Populate DV Done
20,958,677 UART: [fht] FMC Alias Private Key: 7
20,960,218 UART: [art] Derive CDI
20,961,031 UART: [art] Store in slot 0x4
21,016,518 UART: [art] Derive Key Pair
21,017,563 UART: [art] Store priv key in slot 0x5
23,480,287 UART: [art] Derive Key Pair - Done
23,493,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,206,204 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,713 UART: [art] PUB.X = 76541CC62B9E0F4DC4F6B3F6D86FB7778E13596B7B41328770041417B0227A4864C96EA219E43CDC977660471DCDF0DB
25,214,993 UART: [art] PUB.Y = 3D4DFA3FA4C6C8BC50DC942FE501CAE0B8EBB7904AC550ADF3A5090A83E29F44ADD84EA0CE3B0995D353CF3B50BFC8D6
25,222,260 UART: [art] SIG.R = DD7004C9060B96DB9A2B88B08737D1D2C7DF96D3679CF6A55AE38CC91386AB2819C36FDDCD5FB26D30B1BE395001A469
25,229,681 UART: [art] SIG.S = 2DA7B6720956FE26B992CC2C08C22BC1ED5FE603ECB3EBBAF90F44873E921E660930C53912435EDCE5405615AB72F716
26,208,958 UART: Caliptra RT
26,209,670 UART: [state] CFI Enabled
26,389,343 UART: [rt] RT listening for mailbox commands...
26,391,298 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,421,495 UART: [rt]cmd =0x44504543, len=28
26,464,326 >>> mbox cmd response data (2076 bytes)
26,474,388 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,504,443 UART: [rt]cmd =0x44504543, len=28
26,545,163 >>> mbox cmd response data (2076 bytes)
26,889,686 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,922,697 UART: [rt]cmd =0x49444550, len=352
26,933,915 >>> mbox cmd response data (8 bytes)
26,934,387 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,964,300 UART: [rt]cmd =0x44504543, len=28
27,006,897 >>> mbox cmd response data (2076 bytes)
27,016,931 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
27,046,946 UART: [rt]cmd =0x44504543, len=28
27,087,853 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,344 UART:
192,708 UART: Running Caliptra ROM ...
193,808 UART:
603,488 UART: [state] CFI Enabled
620,372 UART: [state] LifecycleState = Unprovisioned
622,761 UART: [state] DebugLocked = No
624,861 UART: [state] WD Timer not started. Device not locked for debugging
628,988 UART: [kat] SHA2-256
818,849 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,597 UART: [kat] ++
830,152 UART: [kat] sha1
842,452 UART: [kat] SHA2-256
845,460 UART: [kat] SHA2-384
850,104 UART: [kat] SHA2-512-ACC
852,714 UART: [kat] ECC-384
3,293,837 UART: [kat] HMAC-384Kdf
3,305,954 UART: [kat] LMS
3,837,763 UART: [kat] --
3,841,118 UART: [cold-reset] ++
3,843,124 UART: [fht] FHT @ 0x50003400
3,854,033 UART: [idev] ++
3,854,752 UART: [idev] CDI.KEYID = 6
3,855,786 UART: [idev] SUBJECT.KEYID = 7
3,857,114 UART: [idev] UDS.KEYID = 0
3,858,060 ready_for_fw is high
3,858,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,980 UART: [idev] Erasing UDS.KEYID = 0
6,329,351 UART: [idev] Sha1 KeyId Algorithm
6,352,176 UART: [idev] --
6,355,930 UART: [ldev] ++
6,356,675 UART: [ldev] CDI.KEYID = 6
6,357,594 UART: [ldev] SUBJECT.KEYID = 5
6,358,702 UART: [ldev] AUTHORITY.KEYID = 7
6,359,936 UART: [ldev] FE.KEYID = 1
6,372,046 UART: [ldev] Erasing FE.KEYID = 1
8,848,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,223 UART: [ldev] --
10,640,758 UART: [fwproc] Wait for Commands...
10,642,735 UART: [fwproc] Recv command 0x46574c44
10,644,998 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,408 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,993 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,042 >>> mbox cmd response: success
14,914,637 UART: [afmc] ++
14,915,363 UART: [afmc] CDI.KEYID = 6
14,916,483 UART: [afmc] SUBJECT.KEYID = 7
14,918,038 UART: [afmc] AUTHORITY.KEYID = 5
17,419,642 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,443 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,417 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,459 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,652 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,581 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,201 UART: [afmc] --
19,214,801 UART: [cold-reset] --
19,219,989 UART: [state] Locking Datavault
19,226,383 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,577 UART: [state] Locking ICCM
19,231,447 UART: [exit] Launching FMC @ 0x40000130
19,240,146 UART:
19,240,391 UART: Running Caliptra FMC ...
19,241,499 UART:
19,241,659 UART: [state] CFI Enabled
19,249,875 UART: [fht] FMC Alias Private Key: 7
21,015,619 UART: [art] Extend RT PCRs Done
21,016,843 UART: [art] Lock RT PCRs Done
21,018,398 UART: [art] Populate DV Done
21,023,602 UART: [fht] FMC Alias Private Key: 7
21,025,200 UART: [art] Derive CDI
21,025,943 UART: [art] Store in slot 0x4
21,068,594 UART: [art] Derive Key Pair
21,069,640 UART: [art] Store priv key in slot 0x5
23,496,525 UART: [art] Derive Key Pair - Done
23,509,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,801 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,433 UART: [art] PUB.X = 54F5904E75959AD254EBFD860B1F24E52575E99C66AE666E7F6F644F2E92A9D636D0897F3224D8A40BB0BAC0449A76CB
25,224,591 UART: [art] PUB.Y = 196199B40455AC914A4F68CE64BF0CDED30D680ED72A98FD452B7E372E4ABA8EEE37C28C45144B0FFB28297DA76C7DB8
25,231,847 UART: [art] SIG.R = 6BF07312445BBAEF7D250E59E300F7DEA352F063D0004702EE0A9DA5006E077475701EF31D9F8A3E94187C0803A6B1E0
25,239,220 UART: [art] SIG.S = 32E001D27D2DF317E54F388D88DB8BFF88BD42CF4B9CDB17E351EA42CA0895864F51A5268FFDE199602B7BA0A79BB6EA
26,218,615 UART: Caliptra RT
26,219,330 UART: [state] CFI Enabled
26,352,443 UART: [rt] RT listening for mailbox commands...
26,354,383 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,384,448 UART: [rt]cmd =0x44504543, len=28
26,427,180 >>> mbox cmd response data (2076 bytes)
26,437,242 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,467,311 UART: [rt]cmd =0x44504543, len=28
26,507,997 >>> mbox cmd response data (2076 bytes)
26,853,059 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,885,975 UART: [rt]cmd =0x49444550, len=352
26,897,188 >>> mbox cmd response data (8 bytes)
26,897,705 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,927,429 UART: [rt]cmd =0x44504543, len=28
26,970,105 >>> mbox cmd response data (2076 bytes)
26,980,449 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
27,010,446 UART: [rt]cmd =0x44504543, len=28
27,051,559 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
3,753,567 ready_for_fw is high
3,754,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,039,238 >>> mbox cmd response: success
19,295,104 UART:
19,295,495 UART: Running Caliptra FMC ...
19,296,618 UART:
19,296,776 UART: [state] CFI Enabled
19,304,793 UART: [fht] FMC Alias Private Key: 7
21,070,275 UART: [art] Extend RT PCRs Done
21,071,501 UART: [art] Lock RT PCRs Done
21,073,600 UART: [art] Populate DV Done
21,078,652 UART: [fht] FMC Alias Private Key: 7
21,080,150 UART: [art] Derive CDI
21,080,910 UART: [art] Store in slot 0x4
21,123,620 UART: [art] Derive Key Pair
21,124,624 UART: [art] Store priv key in slot 0x5
23,551,167 UART: [art] Derive Key Pair - Done
23,564,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,717 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,230 UART: [art] PUB.X = 10A641609127D78AE39429D3B2C83586E6F64D8A30132A937C7E9320BE0845F913DC8218FD947F9828021A0AF0F95A01
25,279,422 UART: [art] PUB.Y = 9A4E241D5453BA887D56B584C4FCCD525A29F3BC891795664DC3127C8E4B78D068E9509F8E7FB0804CF3CA1B331A97FE
25,286,680 UART: [art] SIG.R = 52A2A2CDD1C309D0E4C5C6ECCAA04EE5303EABB3A47D169CCB9E8682C9C80F9B2A8C5166919FC6E4B73A3D9DA0E22EA8
25,294,155 UART: [art] SIG.S = CEFB3BBAE44EC5288F613D2438896A5B198605CC59695598A8C5E1CDB93BBD2DCEF87858AFD3DCBAEA165DA6C685D101
26,273,242 UART: Caliptra RT
26,273,947 UART: [state] CFI Enabled
26,405,454 UART: [rt] RT listening for mailbox commands...
26,407,394 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,437,353 UART: [rt]cmd =0x44504543, len=28
26,480,177 >>> mbox cmd response data (2076 bytes)
26,490,221 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,520,315 UART: [rt]cmd =0x44504543, len=28
26,560,743 >>> mbox cmd response data (2076 bytes)
26,906,007 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,939,193 UART: [rt]cmd =0x49444550, len=353
26,952,772 >>> mbox cmd response data (8 bytes)
26,953,252 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,983,062 UART: [rt]cmd =0x44504543, len=28
27,025,787 >>> mbox cmd response data (2076 bytes)
27,035,808 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
27,066,070 UART: [rt]cmd =0x44504543, len=28
27,107,379 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,661 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,201 UART: [kat] SHA2-256
882,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,247 UART: [kat] ++
886,399 UART: [kat] sha1
890,563 UART: [kat] SHA2-256
892,501 UART: [kat] SHA2-384
895,204 UART: [kat] SHA2-512-ACC
897,105 UART: [kat] ECC-384
902,788 UART: [kat] HMAC-384Kdf
907,426 UART: [kat] LMS
1,475,622 UART: [kat] --
1,476,589 UART: [cold-reset] ++
1,476,989 UART: [fht] Storing FHT @ 0x50003400
1,479,774 UART: [idev] ++
1,479,942 UART: [idev] CDI.KEYID = 6
1,480,302 UART: [idev] SUBJECT.KEYID = 7
1,480,726 UART: [idev] UDS.KEYID = 0
1,481,071 ready_for_fw is high
1,481,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,842 UART: [idev] Erasing UDS.KEYID = 0
1,505,526 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,152 UART: [idev] --
1,515,327 UART: [ldev] ++
1,515,495 UART: [ldev] CDI.KEYID = 6
1,515,858 UART: [ldev] SUBJECT.KEYID = 5
1,516,284 UART: [ldev] AUTHORITY.KEYID = 7
1,516,747 UART: [ldev] FE.KEYID = 1
1,521,781 UART: [ldev] Erasing FE.KEYID = 1
1,546,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,934 UART: [ldev] --
1,586,415 UART: [fwproc] Waiting for Commands...
1,587,264 UART: [fwproc] Received command 0x46574c44
1,588,055 UART: [fwproc] Received Image of size 118548 bytes
2,933,081 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,903 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,121 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,378 >>> mbox cmd response: success
3,133,442 UART: [afmc] ++
3,133,610 UART: [afmc] CDI.KEYID = 6
3,133,972 UART: [afmc] SUBJECT.KEYID = 7
3,134,397 UART: [afmc] AUTHORITY.KEYID = 5
3,169,844 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,966 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,746 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,455 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,338 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,021 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,699 UART: [afmc] --
3,212,645 UART: [cold-reset] --
3,213,543 UART: [state] Locking Datavault
3,214,306 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,910 UART: [state] Locking ICCM
3,215,558 UART: [exit] Launching FMC @ 0x40000130
3,220,888 UART:
3,220,904 UART: Running Caliptra FMC ...
3,221,312 UART:
3,221,366 UART: [state] CFI Enabled
3,231,784 UART: [fht] FMC Alias Private Key: 7
3,350,508 UART: [art] Extend RT PCRs Done
3,350,936 UART: [art] Lock RT PCRs Done
3,352,194 UART: [art] Populate DV Done
3,360,457 UART: [fht] FMC Alias Private Key: 7
3,361,463 UART: [art] Derive CDI
3,361,743 UART: [art] Store in slot 0x4
3,447,309 UART: [art] Derive Key Pair
3,447,669 UART: [art] Store priv key in slot 0x5
3,461,194 UART: [art] Derive Key Pair - Done
3,475,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,922 UART: [art] PUB.X = A934FE25FED96DDC7BDE74867BFF33809467E7D6579648EB2B13B65DEA11DCA20C6EBA477BF1A9F18B163DDA9F7AB56A
3,498,713 UART: [art] PUB.Y = CBB347019A216BB7F0CC5BC73BB28316BD316D63B387387062FC97E55E5150837DAAA01F2B1F1F807C3C303B37B4D015
3,505,666 UART: [art] SIG.R = 18BCC326DE7C62A79300A0C8F29AF397A3BEC9D52114F74AE89F1A225A239ADC64D983E004C85B14EE905A9FDDD3CC38
3,512,427 UART: [art] SIG.S = FD67D3FDAAA3BA898F2C8C85ACEBB5B06DBC583BDA40AFE48BDED13E20C1676700F44B0BD0E7CC46B03D0EAC2B4C3F11
3,536,549 UART: Caliptra RT
3,536,800 UART: [state] CFI Enabled
3,657,784 UART: [rt] RT listening for mailbox commands...
3,658,454 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,628 UART: [rt]cmd =0x44504543, len=28
3,731,587 >>> mbox cmd response data (2076 bytes)
3,731,588 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,760,803 UART: [rt]cmd =0x44504543, len=28
3,801,635 >>> mbox cmd response data (2076 bytes)
3,801,636 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,833,203 UART: [rt]cmd =0x49444550, len=352
3,844,095 >>> mbox cmd response data (8 bytes)
3,844,096 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,873,463 UART: [rt]cmd =0x44504543, len=28
3,916,586 >>> mbox cmd response data (2076 bytes)
3,916,587 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,946,156 UART: [rt]cmd =0x44504543, len=28
3,987,634 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,219 ready_for_fw is high
1,363,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,824 >>> mbox cmd response: success
3,042,579 UART:
3,042,595 UART: Running Caliptra FMC ...
3,043,003 UART:
3,043,057 UART: [state] CFI Enabled
3,053,611 UART: [fht] FMC Alias Private Key: 7
3,172,469 UART: [art] Extend RT PCRs Done
3,172,897 UART: [art] Lock RT PCRs Done
3,174,247 UART: [art] Populate DV Done
3,182,624 UART: [fht] FMC Alias Private Key: 7
3,183,662 UART: [art] Derive CDI
3,183,942 UART: [art] Store in slot 0x4
3,269,590 UART: [art] Derive Key Pair
3,269,950 UART: [art] Store priv key in slot 0x5
3,283,405 UART: [art] Derive Key Pair - Done
3,298,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,490 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,255 UART: [art] PUB.X = BD2C820909495181A7DFE9588A64996A259780C3AE983D47B5FF72A43E974B524DEE539597A46B5B268925F2A942CB68
3,321,015 UART: [art] PUB.Y = 5754736EC0C034B85509AD95C71D00D1D0345361520866C0663F6E2619A841EA4FDC89250A821B9E4672074DF6666645
3,327,917 UART: [art] SIG.R = C398E498602907BAC50553A2600B42E9F522B37700F3FA25848D364456DD4EEE58BE20636C6E6C327B144ED6F9720963
3,334,647 UART: [art] SIG.S = D1DDB6315C208B19635E2779C882E477D1242B06E317D6F3CBDA2B9DB19DCBCC498FC27FE0DE272F89E17ED16ADDEF1B
3,358,830 UART: Caliptra RT
3,359,081 UART: [state] CFI Enabled
3,479,256 UART: [rt] RT listening for mailbox commands...
3,479,926 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,572 UART: [rt]cmd =0x44504543, len=28
3,553,015 >>> mbox cmd response data (2076 bytes)
3,553,016 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,582,461 UART: [rt]cmd =0x44504543, len=28
3,623,638 >>> mbox cmd response data (2076 bytes)
3,623,639 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,655,035 UART: [rt]cmd =0x49444550, len=353
3,668,110 >>> mbox cmd response data (8 bytes)
3,668,111 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,576 UART: [rt]cmd =0x44504543, len=28
3,740,843 >>> mbox cmd response data (2076 bytes)
3,740,844 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,770,457 UART: [rt]cmd =0x44504543, len=28
3,811,543 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
87,044 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,754 UART: [kat] SHA2-256
882,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,800 UART: [kat] ++
886,952 UART: [kat] sha1
891,122 UART: [kat] SHA2-256
893,060 UART: [kat] SHA2-384
895,821 UART: [kat] SHA2-512-ACC
897,722 UART: [kat] ECC-384
903,385 UART: [kat] HMAC-384Kdf
908,163 UART: [kat] LMS
1,476,359 UART: [kat] --
1,477,094 UART: [cold-reset] ++
1,477,554 UART: [fht] Storing FHT @ 0x50003400
1,480,437 UART: [idev] ++
1,480,605 UART: [idev] CDI.KEYID = 6
1,480,965 UART: [idev] SUBJECT.KEYID = 7
1,481,389 UART: [idev] UDS.KEYID = 0
1,481,734 ready_for_fw is high
1,481,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,269 UART: [idev] Erasing UDS.KEYID = 0
1,505,811 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,581 UART: [idev] --
1,515,560 UART: [ldev] ++
1,515,728 UART: [ldev] CDI.KEYID = 6
1,516,091 UART: [ldev] SUBJECT.KEYID = 5
1,516,517 UART: [ldev] AUTHORITY.KEYID = 7
1,516,980 UART: [ldev] FE.KEYID = 1
1,521,910 UART: [ldev] Erasing FE.KEYID = 1
1,547,505 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,247 UART: [ldev] --
1,586,650 UART: [fwproc] Waiting for Commands...
1,587,481 UART: [fwproc] Received command 0x46574c44
1,588,272 UART: [fwproc] Received Image of size 118548 bytes
2,932,652 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,804 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,022 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,435 >>> mbox cmd response: success
3,132,473 UART: [afmc] ++
3,132,641 UART: [afmc] CDI.KEYID = 6
3,133,003 UART: [afmc] SUBJECT.KEYID = 7
3,133,428 UART: [afmc] AUTHORITY.KEYID = 5
3,168,287 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,751 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,531 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,240 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,123 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,806 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,864 UART: [afmc] --
3,211,934 UART: [cold-reset] --
3,212,806 UART: [state] Locking Datavault
3,214,013 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,617 UART: [state] Locking ICCM
3,215,275 UART: [exit] Launching FMC @ 0x40000130
3,220,605 UART:
3,220,621 UART: Running Caliptra FMC ...
3,221,029 UART:
3,221,172 UART: [state] CFI Enabled
3,231,840 UART: [fht] FMC Alias Private Key: 7
3,351,158 UART: [art] Extend RT PCRs Done
3,351,586 UART: [art] Lock RT PCRs Done
3,353,056 UART: [art] Populate DV Done
3,361,159 UART: [fht] FMC Alias Private Key: 7
3,362,281 UART: [art] Derive CDI
3,362,561 UART: [art] Store in slot 0x4
3,448,551 UART: [art] Derive Key Pair
3,448,911 UART: [art] Store priv key in slot 0x5
3,462,598 UART: [art] Derive Key Pair - Done
3,477,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,650 UART: [art] PUB.X = 539F405D77B82C6CFB1B81632F73B818987D7C46C9DBA9CAAFC853D731DBBA753D72AACAA03ADDEA2FA09BEA5B978DD3
3,500,448 UART: [art] PUB.Y = 14C3B71E054FAFB9C987FB72398B453C74DFCCC5CA227AFE1D06583DC9DD00C3BFADBD84DA2C14582B653B9ADE2E8010
3,507,394 UART: [art] SIG.R = D292CAA10481288487FFA49D910838413F45CFA3348FADAEA97E20B609E8C1E91D95E6C0E2590EDE5353D913E2611DCD
3,514,160 UART: [art] SIG.S = 9EF8CA0FA60D55856BE8DA2F37360A6D86AA5C233E2EAD4E3132B796A77273DD72BAA933312D279855ECACBEE48BA614
3,537,829 UART: Caliptra RT
3,538,172 UART: [state] CFI Enabled
3,658,021 UART: [rt] RT listening for mailbox commands...
3,658,691 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,409 UART: [rt]cmd =0x44504543, len=28
3,731,512 >>> mbox cmd response data (2076 bytes)
3,731,513 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,761,252 UART: [rt]cmd =0x44504543, len=28
3,802,587 >>> mbox cmd response data (2076 bytes)
3,802,588 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,834,242 UART: [rt]cmd =0x49444550, len=353
3,847,655 >>> mbox cmd response data (8 bytes)
3,847,656 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,877,215 UART: [rt]cmd =0x44504543, len=28
3,920,552 >>> mbox cmd response data (2076 bytes)
3,920,553 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,168 UART: [rt]cmd =0x44504543, len=28
3,991,800 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,096 ready_for_fw is high
1,363,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,943 >>> mbox cmd response: success
3,042,192 UART:
3,042,208 UART: Running Caliptra FMC ...
3,042,616 UART:
3,042,759 UART: [state] CFI Enabled
3,053,159 UART: [fht] FMC Alias Private Key: 7
3,172,211 UART: [art] Extend RT PCRs Done
3,172,639 UART: [art] Lock RT PCRs Done
3,173,807 UART: [art] Populate DV Done
3,181,974 UART: [fht] FMC Alias Private Key: 7
3,183,102 UART: [art] Derive CDI
3,183,382 UART: [art] Store in slot 0x4
3,269,204 UART: [art] Derive Key Pair
3,269,564 UART: [art] Store priv key in slot 0x5
3,282,903 UART: [art] Derive Key Pair - Done
3,297,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,846 UART: [art] PUB.X = E902AF74E4FF3EF6BBD3886C84F3DF62A188F8412905E643ED2CF1FF196F77C4A99BDAB05E7C23C0AE8920F6191AB598
3,320,626 UART: [art] PUB.Y = 936D334ECCAB9729E6FE2BF2ABD2CD056B1EB8C599CAA6FCD5F9B4BB3C9A10BFBFE36C326CDE3B1154B50F26D7E4F5F1
3,327,604 UART: [art] SIG.R = 85D41568B275D0176C3473487EFFA17F2FB2FC780E8BC5A27BD1799AE6540A9E95858CD62F51BF8065A1EB15E0D0B2C2
3,334,376 UART: [art] SIG.S = BE9181B248618AA5E33F4F2FD82DFE96CDF2F4C0A649AB3730FE2ECB52D7F932C24285FA90ECD47230507F034CA44960
3,358,093 UART: Caliptra RT
3,358,436 UART: [state] CFI Enabled
3,479,275 UART: [rt] RT listening for mailbox commands...
3,479,945 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,817 UART: [rt]cmd =0x44504543, len=28
3,552,934 >>> mbox cmd response data (2076 bytes)
3,552,935 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,582,632 UART: [rt]cmd =0x44504543, len=28
3,623,995 >>> mbox cmd response data (2076 bytes)
3,623,996 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,655,669 UART: [rt]cmd =0x49444550, len=352
3,666,380 >>> mbox cmd response data (8 bytes)
3,666,381 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,695,924 UART: [rt]cmd =0x44504543, len=28
3,738,721 >>> mbox cmd response data (2076 bytes)
3,738,722 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,767,999 UART: [rt]cmd =0x44504543, len=28
3,809,670 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
915,793 UART: [kat] HMAC-384Kdf
920,251 UART: [kat] LMS
1,168,563 UART: [kat] --
1,169,098 UART: [cold-reset] ++
1,169,430 UART: [fht] FHT @ 0x50003400
1,172,034 UART: [idev] ++
1,172,202 UART: [idev] CDI.KEYID = 6
1,172,563 UART: [idev] SUBJECT.KEYID = 7
1,172,988 UART: [idev] UDS.KEYID = 0
1,173,334 ready_for_fw is high
1,173,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,973 UART: [idev] Erasing UDS.KEYID = 0
1,197,767 UART: [idev] Sha1 KeyId Algorithm
1,206,703 UART: [idev] --
1,207,564 UART: [ldev] ++
1,207,732 UART: [ldev] CDI.KEYID = 6
1,208,096 UART: [ldev] SUBJECT.KEYID = 5
1,208,523 UART: [ldev] AUTHORITY.KEYID = 7
1,208,986 UART: [ldev] FE.KEYID = 1
1,214,322 UART: [ldev] Erasing FE.KEYID = 1
1,240,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,518 UART: [ldev] --
1,279,807 UART: [fwproc] Wait for Commands...
1,280,556 UART: [fwproc] Recv command 0x46574c44
1,281,289 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,389 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,564 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,907 >>> mbox cmd response: success
2,826,023 UART: [afmc] ++
2,826,191 UART: [afmc] CDI.KEYID = 6
2,826,554 UART: [afmc] SUBJECT.KEYID = 7
2,826,980 UART: [afmc] AUTHORITY.KEYID = 5
2,862,457 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,368 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,117 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,827 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,708 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,409 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,000 UART: [afmc] --
2,905,989 UART: [cold-reset] --
2,906,749 UART: [state] Locking Datavault
2,907,796 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,400 UART: [state] Locking ICCM
2,908,882 UART: [exit] Launching FMC @ 0x40000130
2,914,212 UART:
2,914,228 UART: Running Caliptra FMC ...
2,914,636 UART:
2,914,690 UART: [state] CFI Enabled
2,925,384 UART: [fht] FMC Alias Private Key: 7
3,044,342 UART: [art] Extend RT PCRs Done
3,044,770 UART: [art] Lock RT PCRs Done
3,046,276 UART: [art] Populate DV Done
3,054,583 UART: [fht] FMC Alias Private Key: 7
3,055,539 UART: [art] Derive CDI
3,055,819 UART: [art] Store in slot 0x4
3,141,566 UART: [art] Derive Key Pair
3,141,926 UART: [art] Store priv key in slot 0x5
3,155,046 UART: [art] Derive Key Pair - Done
3,169,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,448 UART: [art] PUB.X = A3043BC4D921E9200869B62047C32BF1E7B7F627ED3641407E2A8D2E167BCEFBCB669787B4B45DF4DD5C80B8D7FDE4FB
3,192,228 UART: [art] PUB.Y = 3B370950A409EAB5BE366B75E8DBCA8562C9DECA09FBC7CDDC9F569704A34D1E67EE6897BE8929CE98F0C4B1E274B762
3,199,184 UART: [art] SIG.R = 389287A2426DE2199EDB1ACC3D86D9DC2AD3DBCFDA772E4FC6D03E40AEF235AF4B69D8F088CF697213BD102AE5807AE3
3,205,976 UART: [art] SIG.S = C6766ADAC3CD790CF0CD739673A57A43045E4737AAEC80E19014DEECD4ECE1E803952CEB0A4F24A7A99830887D1BEC76
3,229,640 UART: Caliptra RT
3,229,891 UART: [state] CFI Enabled
3,349,536 UART: [rt] RT listening for mailbox commands...
3,350,206 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,250 UART: [rt]cmd =0x44504543, len=28
3,423,437 >>> mbox cmd response data (2076 bytes)
3,423,438 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,452,845 UART: [rt]cmd =0x44504543, len=28
3,494,265 >>> mbox cmd response data (2076 bytes)
3,494,266 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,998 UART: [rt]cmd =0x49444550, len=353
3,539,322 >>> mbox cmd response data (8 bytes)
3,539,323 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,569,024 UART: [rt]cmd =0x44504543, len=28
3,612,499 >>> mbox cmd response data (2076 bytes)
3,612,500 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,145 UART: [rt]cmd =0x44504543, len=28
3,684,114 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,342 ready_for_fw is high
1,060,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,900 >>> mbox cmd response: success
2,741,307 UART:
2,741,323 UART: Running Caliptra FMC ...
2,741,731 UART:
2,741,785 UART: [state] CFI Enabled
2,752,355 UART: [fht] FMC Alias Private Key: 7
2,871,507 UART: [art] Extend RT PCRs Done
2,871,935 UART: [art] Lock RT PCRs Done
2,873,057 UART: [art] Populate DV Done
2,881,186 UART: [fht] FMC Alias Private Key: 7
2,882,306 UART: [art] Derive CDI
2,882,586 UART: [art] Store in slot 0x4
2,968,315 UART: [art] Derive Key Pair
2,968,675 UART: [art] Store priv key in slot 0x5
2,982,393 UART: [art] Derive Key Pair - Done
2,996,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,371 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,136 UART: [art] PUB.X = 2335B40BEFF323BCA913551457B57DC93E79028EEBE583CFB9E74EBBCEF48118CAA513DCCF98080386E69FBDEC173EC3
3,019,914 UART: [art] PUB.Y = AF9FF2D86E272C6B82A1E7DD12DE02327F608589FDB4D5F15E611C85BEA4549150569088042A0433F8EEC22A854514DD
3,026,859 UART: [art] SIG.R = 518B747B5564678FE5EE2E6F01900CA930C00D2C19884A53E5F95725FF8E51F549D5586673B56EA438977CA28FBB80CB
3,033,620 UART: [art] SIG.S = 10DC2D2EE74CEA6A6EBF72E76F06FB651EC10DA09DA786C80985863C0DF276817B166E6704324D55B0B0FEC956E61ECD
3,057,193 UART: Caliptra RT
3,057,444 UART: [state] CFI Enabled
3,175,854 UART: [rt] RT listening for mailbox commands...
3,176,524 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,226 UART: [rt]cmd =0x44504543, len=28
3,249,881 >>> mbox cmd response data (2076 bytes)
3,249,882 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,279,477 UART: [rt]cmd =0x44504543, len=28
3,320,542 >>> mbox cmd response data (2076 bytes)
3,320,543 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,232 UART: [rt]cmd =0x49444550, len=352
3,363,111 >>> mbox cmd response data (8 bytes)
3,363,112 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,595 UART: [rt]cmd =0x44504543, len=28
3,435,582 >>> mbox cmd response data (2076 bytes)
3,435,583 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,465,124 UART: [rt]cmd =0x44504543, len=28
3,506,643 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,717 UART: [state] LifecycleState = Unprovisioned
85,372 UART: [state] DebugLocked = No
86,102 UART: [state] WD Timer not started. Device not locked for debugging
87,241 UART: [kat] SHA2-256
890,791 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,895 UART: [kat] ++
895,047 UART: [kat] sha1
899,207 UART: [kat] SHA2-256
901,147 UART: [kat] SHA2-384
903,902 UART: [kat] SHA2-512-ACC
905,803 UART: [kat] ECC-384
915,980 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,169,825 UART: [cold-reset] ++
1,170,335 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 ready_for_fw is high
1,174,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,796 UART: [idev] Erasing UDS.KEYID = 0
1,198,238 UART: [idev] Sha1 KeyId Algorithm
1,207,186 UART: [idev] --
1,208,229 UART: [ldev] ++
1,208,397 UART: [ldev] CDI.KEYID = 6
1,208,761 UART: [ldev] SUBJECT.KEYID = 5
1,209,188 UART: [ldev] AUTHORITY.KEYID = 7
1,209,651 UART: [ldev] FE.KEYID = 1
1,214,543 UART: [ldev] Erasing FE.KEYID = 1
1,241,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,607 UART: [ldev] --
1,279,936 UART: [fwproc] Wait for Commands...
1,280,619 UART: [fwproc] Recv command 0x46574c44
1,281,352 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,570 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,745 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,000 >>> mbox cmd response: success
2,825,188 UART: [afmc] ++
2,825,356 UART: [afmc] CDI.KEYID = 6
2,825,719 UART: [afmc] SUBJECT.KEYID = 7
2,826,145 UART: [afmc] AUTHORITY.KEYID = 5
2,861,686 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,720 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,430 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,311 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,012 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,909 UART: [afmc] --
2,904,720 UART: [cold-reset] --
2,905,766 UART: [state] Locking Datavault
2,907,037 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,641 UART: [state] Locking ICCM
2,908,093 UART: [exit] Launching FMC @ 0x40000130
2,913,423 UART:
2,913,439 UART: Running Caliptra FMC ...
2,913,847 UART:
2,913,990 UART: [state] CFI Enabled
2,924,460 UART: [fht] FMC Alias Private Key: 7
3,043,252 UART: [art] Extend RT PCRs Done
3,043,680 UART: [art] Lock RT PCRs Done
3,045,212 UART: [art] Populate DV Done
3,053,445 UART: [fht] FMC Alias Private Key: 7
3,054,405 UART: [art] Derive CDI
3,054,685 UART: [art] Store in slot 0x4
3,140,924 UART: [art] Derive Key Pair
3,141,284 UART: [art] Store priv key in slot 0x5
3,154,958 UART: [art] Derive Key Pair - Done
3,169,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,941 UART: [art] PUB.X = 4F7B37E8709337258D2AED541381555E17399B7E195B4ADE0407E8BD15ED463678C3CF76960993405E48ED8618E31CAF
3,192,698 UART: [art] PUB.Y = FD93AE6E24282DCE2B91A0337448CA7DD7C5A524EBB7EF0D568E2984B6555B1362F24FAAC794B1C9769E72826D4B8E41
3,199,655 UART: [art] SIG.R = 92A4F9DCC05A66618441EAF5AB2AA350BB8A59E54D12C2237531FB6CCF15D2C48C1F621C0A8F61DF07227FF48B82BBE7
3,206,435 UART: [art] SIG.S = 64786295285EFDF26750C55352C52DB7965DF97DEECD4EB8750E901DBF2D6B1A267CC4E457A54F7982E8E4D89D12F740
3,230,052 UART: Caliptra RT
3,230,395 UART: [state] CFI Enabled
3,350,078 UART: [rt] RT listening for mailbox commands...
3,350,748 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,496 UART: [rt]cmd =0x44504543, len=28
3,423,861 >>> mbox cmd response data (2076 bytes)
3,423,862 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,453,387 UART: [rt]cmd =0x44504543, len=28
3,494,827 >>> mbox cmd response data (2076 bytes)
3,494,828 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,526,324 UART: [rt]cmd =0x49444550, len=353
3,539,440 >>> mbox cmd response data (8 bytes)
3,539,441 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,568,844 UART: [rt]cmd =0x44504543, len=28
3,612,005 >>> mbox cmd response data (2076 bytes)
3,612,006 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,661 UART: [rt]cmd =0x44504543, len=28
3,683,274 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,475 ready_for_fw is high
1,060,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,427 >>> mbox cmd response: success
2,742,974 UART:
2,742,990 UART: Running Caliptra FMC ...
2,743,398 UART:
2,743,541 UART: [state] CFI Enabled
2,754,005 UART: [fht] FMC Alias Private Key: 7
2,872,797 UART: [art] Extend RT PCRs Done
2,873,225 UART: [art] Lock RT PCRs Done
2,874,609 UART: [art] Populate DV Done
2,882,916 UART: [fht] FMC Alias Private Key: 7
2,884,034 UART: [art] Derive CDI
2,884,314 UART: [art] Store in slot 0x4
2,970,195 UART: [art] Derive Key Pair
2,970,555 UART: [art] Store priv key in slot 0x5
2,984,107 UART: [art] Derive Key Pair - Done
2,998,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,447 UART: [art] PUB.X = 8ADB476C8D41DE5E69CC39A2A975F92468C9A9BAF79348FED200AC5051C9DE81BB5A6785441B7615C7DAB386C3700D45
3,022,202 UART: [art] PUB.Y = 2C1B1ED18DB22E1E0AE865E62C912F650E38360988A97756739BDE581C42EA513F0F70697AB710D9F39402A1ED32CBFE
3,029,143 UART: [art] SIG.R = A122D082B53240B5CA35002EC5605DF6F8645497E978FB9DDCA2388EA373A88CA2B1E77F9D202F5F2E1CAB8B6D9681E4
3,035,901 UART: [art] SIG.S = 9FC0292E0B07D0813B925B3641501BAE33EA0F0E10F96D34E0DEDEB5E5CBC61EE87FB439D45250BADCD460FE59E8469D
3,059,467 UART: Caliptra RT
3,059,810 UART: [state] CFI Enabled
3,179,222 UART: [rt] RT listening for mailbox commands...
3,179,892 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,746 UART: [rt]cmd =0x44504543, len=28
3,252,967 >>> mbox cmd response data (2076 bytes)
3,252,968 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,282,263 UART: [rt]cmd =0x44504543, len=28
3,323,396 >>> mbox cmd response data (2076 bytes)
3,323,397 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,355,057 UART: [rt]cmd =0x49444550, len=353
3,368,260 >>> mbox cmd response data (8 bytes)
3,368,261 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,846 UART: [rt]cmd =0x44504543, len=28
3,441,311 >>> mbox cmd response data (2076 bytes)
3,441,312 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,470,867 UART: [rt]cmd =0x44504543, len=28
3,512,475 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,656 UART: [state] LifecycleState = Unprovisioned
86,311 UART: [state] DebugLocked = No
86,883 UART: [state] WD Timer not started. Device not locked for debugging
88,066 UART: [kat] SHA2-256
893,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,841 UART: [kat] ++
897,993 UART: [kat] sha1
902,147 UART: [kat] SHA2-256
904,087 UART: [kat] SHA2-384
906,798 UART: [kat] SHA2-512-ACC
908,699 UART: [kat] ECC-384
918,586 UART: [kat] HMAC-384Kdf
923,176 UART: [kat] LMS
1,171,504 UART: [kat] --
1,172,567 UART: [cold-reset] ++
1,172,975 UART: [fht] FHT @ 0x50003400
1,175,764 UART: [idev] ++
1,175,932 UART: [idev] CDI.KEYID = 6
1,176,292 UART: [idev] SUBJECT.KEYID = 7
1,176,716 UART: [idev] UDS.KEYID = 0
1,177,061 ready_for_fw is high
1,177,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,636 UART: [idev] Erasing UDS.KEYID = 0
1,201,647 UART: [idev] Sha1 KeyId Algorithm
1,210,091 UART: [idev] --
1,211,345 UART: [ldev] ++
1,211,513 UART: [ldev] CDI.KEYID = 6
1,211,876 UART: [ldev] SUBJECT.KEYID = 5
1,212,302 UART: [ldev] AUTHORITY.KEYID = 7
1,212,765 UART: [ldev] FE.KEYID = 1
1,218,017 UART: [ldev] Erasing FE.KEYID = 1
1,244,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,137 UART: [ldev] --
1,283,424 UART: [fwproc] Wait for Commands...
1,284,204 UART: [fwproc] Recv command 0x46574c44
1,284,932 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,406 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,576 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,891 >>> mbox cmd response: success
2,827,991 UART: [afmc] ++
2,828,159 UART: [afmc] CDI.KEYID = 6
2,828,521 UART: [afmc] SUBJECT.KEYID = 7
2,828,946 UART: [afmc] AUTHORITY.KEYID = 5
2,864,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,812 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,521 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,404 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,105 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,027 UART: [afmc] --
2,907,979 UART: [cold-reset] --
2,908,863 UART: [state] Locking Datavault
2,909,856 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,460 UART: [state] Locking ICCM
2,911,120 UART: [exit] Launching FMC @ 0x40000130
2,916,450 UART:
2,916,466 UART: Running Caliptra FMC ...
2,916,874 UART:
2,916,928 UART: [state] CFI Enabled
2,927,500 UART: [fht] FMC Alias Private Key: 7
3,046,236 UART: [art] Extend RT PCRs Done
3,046,664 UART: [art] Lock RT PCRs Done
3,048,242 UART: [art] Populate DV Done
3,056,215 UART: [fht] FMC Alias Private Key: 7
3,057,305 UART: [art] Derive CDI
3,057,585 UART: [art] Store in slot 0x4
3,143,408 UART: [art] Derive Key Pair
3,143,768 UART: [art] Store priv key in slot 0x5
3,156,888 UART: [art] Derive Key Pair - Done
3,171,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,639 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,404 UART: [art] PUB.X = F64F0B5260BD77B6FC3BDC7CFEEFB196C9AB7C90F98216929ED15821FDB6AEAFDD788056B221CEAC32618B933B5894EC
3,194,193 UART: [art] PUB.Y = 7C92E3431752FF82384A6518C37AFFB46D953B868C8E06B55582609ABB3C916F8FD0C1407322822039CCE1A479BA9445
3,201,136 UART: [art] SIG.R = 224B642B7DD9EAF4EF51FE46937CFA8FDF5A5049E16FC594378CE19C3A585A2D94518D8AB44751FBDED756C4C123D31D
3,207,922 UART: [art] SIG.S = 9C0DB992576DBF20104942707B68D239AEE407EBAA8EF3B8E2D7C7A663777317B57617DBF0167E14F243A79F5BB2156B
3,231,270 UART: Caliptra RT
3,231,521 UART: [state] CFI Enabled
3,351,064 UART: [rt] RT listening for mailbox commands...
3,351,734 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,708 UART: [rt]cmd =0x44504543, len=28
3,425,257 >>> mbox cmd response data (2076 bytes)
3,425,258 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,454,875 UART: [rt]cmd =0x44504543, len=28
3,496,235 >>> mbox cmd response data (2076 bytes)
3,496,236 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,527,927 UART: [rt]cmd =0x49444550, len=354
3,541,134 >>> mbox cmd response data (8 bytes)
3,541,135 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,570,330 UART: [rt]cmd =0x44504543, len=28
3,613,627 >>> mbox cmd response data (2076 bytes)
3,613,628 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,295 UART: [rt]cmd =0x44504543, len=28
3,684,763 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,505 ready_for_fw is high
1,060,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,656 >>> mbox cmd response: success
2,741,967 UART:
2,741,983 UART: Running Caliptra FMC ...
2,742,391 UART:
2,742,445 UART: [state] CFI Enabled
2,753,175 UART: [fht] FMC Alias Private Key: 7
2,872,223 UART: [art] Extend RT PCRs Done
2,872,651 UART: [art] Lock RT PCRs Done
2,873,975 UART: [art] Populate DV Done
2,882,166 UART: [fht] FMC Alias Private Key: 7
2,883,284 UART: [art] Derive CDI
2,883,564 UART: [art] Store in slot 0x4
2,969,659 UART: [art] Derive Key Pair
2,970,019 UART: [art] Store priv key in slot 0x5
2,983,633 UART: [art] Derive Key Pair - Done
2,998,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,139 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,904 UART: [art] PUB.X = 1F9AF1509520140442FDAE43ED48C2A3F4062BA244F65AA2995D859A4F8D31824DAFD24316AF20959221541A9AE3693F
3,021,668 UART: [art] PUB.Y = CF2FB7E797172731B57EE68A4F55105375C8D44961FAC141DB5EF769B77E720898C15B61C4464ECD636B36E4BD0D6955
3,028,614 UART: [art] SIG.R = 53BB8D5461199BD69C975EB08FD7538E4CC0FE1D6BF30C0F1EFEAF372D2C5F73B77BDA5155B55A9DE87236AD01538150
3,035,389 UART: [art] SIG.S = CB1E526984F1AE906FB46C96786AAAE68982ED65D1E46BEFBC0E616DAFF91A2A57AFE63EA9323FE78FD7E6205D0C3D66
3,059,443 UART: Caliptra RT
3,059,694 UART: [state] CFI Enabled
3,178,879 UART: [rt] RT listening for mailbox commands...
3,179,549 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,491 UART: [rt]cmd =0x44504543, len=28
3,252,376 >>> mbox cmd response data (2076 bytes)
3,252,377 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,281,970 UART: [rt]cmd =0x44504543, len=28
3,322,702 >>> mbox cmd response data (2076 bytes)
3,322,703 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,243 UART: [rt]cmd =0x49444550, len=353
3,367,497 >>> mbox cmd response data (8 bytes)
3,367,498 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,865 UART: [rt]cmd =0x44504543, len=28
3,440,288 >>> mbox cmd response data (2076 bytes)
3,440,289 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,469,922 UART: [rt]cmd =0x44504543, len=28
3,511,523 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
893,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,778 UART: [kat] ++
897,930 UART: [kat] sha1
902,326 UART: [kat] SHA2-256
904,266 UART: [kat] SHA2-384
906,977 UART: [kat] SHA2-512-ACC
908,878 UART: [kat] ECC-384
918,279 UART: [kat] HMAC-384Kdf
922,799 UART: [kat] LMS
1,171,127 UART: [kat] --
1,171,816 UART: [cold-reset] ++
1,172,308 UART: [fht] FHT @ 0x50003400
1,175,091 UART: [idev] ++
1,175,259 UART: [idev] CDI.KEYID = 6
1,175,619 UART: [idev] SUBJECT.KEYID = 7
1,176,043 UART: [idev] UDS.KEYID = 0
1,176,388 ready_for_fw is high
1,176,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,903 UART: [idev] Erasing UDS.KEYID = 0
1,200,674 UART: [idev] Sha1 KeyId Algorithm
1,209,158 UART: [idev] --
1,210,058 UART: [ldev] ++
1,210,226 UART: [ldev] CDI.KEYID = 6
1,210,589 UART: [ldev] SUBJECT.KEYID = 5
1,211,015 UART: [ldev] AUTHORITY.KEYID = 7
1,211,478 UART: [ldev] FE.KEYID = 1
1,216,658 UART: [ldev] Erasing FE.KEYID = 1
1,243,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,616 UART: [ldev] --
1,283,091 UART: [fwproc] Wait for Commands...
1,283,913 UART: [fwproc] Recv command 0x46574c44
1,284,641 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,943 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,113 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,424 >>> mbox cmd response: success
2,829,602 UART: [afmc] ++
2,829,770 UART: [afmc] CDI.KEYID = 6
2,830,132 UART: [afmc] SUBJECT.KEYID = 7
2,830,557 UART: [afmc] AUTHORITY.KEYID = 5
2,865,908 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,057 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,766 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,649 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,350 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,160 UART: [afmc] --
2,909,074 UART: [cold-reset] --
2,909,966 UART: [state] Locking Datavault
2,910,917 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,521 UART: [state] Locking ICCM
2,912,193 UART: [exit] Launching FMC @ 0x40000130
2,917,523 UART:
2,917,539 UART: Running Caliptra FMC ...
2,917,947 UART:
2,918,090 UART: [state] CFI Enabled
2,928,566 UART: [fht] FMC Alias Private Key: 7
3,047,908 UART: [art] Extend RT PCRs Done
3,048,336 UART: [art] Lock RT PCRs Done
3,049,968 UART: [art] Populate DV Done
3,058,247 UART: [fht] FMC Alias Private Key: 7
3,059,331 UART: [art] Derive CDI
3,059,611 UART: [art] Store in slot 0x4
3,145,490 UART: [art] Derive Key Pair
3,145,850 UART: [art] Store priv key in slot 0x5
3,159,700 UART: [art] Derive Key Pair - Done
3,174,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,918 UART: [art] PUB.X = FA5FADC031D56A3B47F8C02626AC5173050985803BC89373CE28B776656C103641F61208A6BA6A38540EC84B571F5EEE
3,197,676 UART: [art] PUB.Y = B8C9C13A7F35981A87074314F8BDB1B8FB6462F87E31E98A6FC70CDBAAD629609EB80BD8A9FDF4A6B2E23D139D485517
3,204,631 UART: [art] SIG.R = C71DD62F6AC725842226F48E655EE13A1E2AFD996F05F935032D279304BE1717138B7289A542E887B2DD90B57BF16B2C
3,211,392 UART: [art] SIG.S = B0ABCD22FBFE583EA5DA9801CF13A1CBBD30B657C75107D5EF3943E60275FE72465D3BFD4C0FD11C81DD5933672BF818
3,235,868 UART: Caliptra RT
3,236,211 UART: [state] CFI Enabled
3,356,225 UART: [rt] RT listening for mailbox commands...
3,356,895 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,851 UART: [rt]cmd =0x44504543, len=28
3,430,262 >>> mbox cmd response data (2076 bytes)
3,430,263 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,459,690 UART: [rt]cmd =0x44504543, len=28
3,500,651 >>> mbox cmd response data (2076 bytes)
3,500,652 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,532,624 UART: [rt]cmd =0x49444550, len=353
3,545,843 >>> mbox cmd response data (8 bytes)
3,545,844 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,575,323 UART: [rt]cmd =0x44504543, len=28
3,618,502 >>> mbox cmd response data (2076 bytes)
3,618,503 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,094 UART: [rt]cmd =0x44504543, len=28
3,689,862 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,652 ready_for_fw is high
1,059,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,443 >>> mbox cmd response: success
2,741,610 UART:
2,741,626 UART: Running Caliptra FMC ...
2,742,034 UART:
2,742,177 UART: [state] CFI Enabled
2,752,681 UART: [fht] FMC Alias Private Key: 7
2,870,827 UART: [art] Extend RT PCRs Done
2,871,255 UART: [art] Lock RT PCRs Done
2,872,813 UART: [art] Populate DV Done
2,881,010 UART: [fht] FMC Alias Private Key: 7
2,882,006 UART: [art] Derive CDI
2,882,286 UART: [art] Store in slot 0x4
2,967,907 UART: [art] Derive Key Pair
2,968,267 UART: [art] Store priv key in slot 0x5
2,981,911 UART: [art] Derive Key Pair - Done
2,996,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,153 UART: [art] PUB.X = E5089B4346C3F0263D24E384A550E899E78277315FA9CF2BAF5334D2F93ABB4146595C3E1674BC0F89E7E44038D27AF7
3,019,917 UART: [art] PUB.Y = 108D10A31E61BC90FFFB49F9754A953DF3B290A8F3AB9C2001669EF4AB7B1A874873433D9F42A880EB2FA6889CF87F87
3,026,872 UART: [art] SIG.R = 8A73147F0145C93DA42D99499CD0F31A78BA05ACC7C1FDE39930B15210DCE6D382F4D8747AE9C76ABDEBB58FFF6014DF
3,033,654 UART: [art] SIG.S = D804CB7F937B5D3F76028A620844C1611C07669E77BC86AFB8B96060ABB3CB85B584D8B99C91CF366635B9FF090F4690
3,057,368 UART: Caliptra RT
3,057,711 UART: [state] CFI Enabled
3,177,627 UART: [rt] RT listening for mailbox commands...
3,178,297 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,605 UART: [rt]cmd =0x44504543, len=28
3,252,172 >>> mbox cmd response data (2076 bytes)
3,252,173 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,281,754 UART: [rt]cmd =0x44504543, len=28
3,323,015 >>> mbox cmd response data (2076 bytes)
3,323,016 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,595 UART: [rt]cmd =0x49444550, len=352
3,365,268 >>> mbox cmd response data (8 bytes)
3,365,269 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,704 UART: [rt]cmd =0x44504543, len=28
3,437,763 >>> mbox cmd response data (2076 bytes)
3,437,764 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,467,067 UART: [rt]cmd =0x44504543, len=28
3,508,804 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,010 UART:
192,373 UART: Running Caliptra ROM ...
193,469 UART:
193,625 UART: [state] CFI Enabled
266,623 UART: [state] LifecycleState = Unprovisioned
268,609 UART: [state] DebugLocked = No
269,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,882 UART: [kat] SHA2-256
443,591 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,042 UART: [kat] ++
454,572 UART: [kat] sha1
465,585 UART: [kat] SHA2-256
468,308 UART: [kat] SHA2-384
473,321 UART: [kat] SHA2-512-ACC
475,704 UART: [kat] ECC-384
2,765,768 UART: [kat] HMAC-384Kdf
2,776,944 UART: [kat] LMS
3,967,244 UART: [kat] --
3,973,302 UART: [cold-reset] ++
3,974,374 UART: [fht] Storing FHT @ 0x50003400
3,986,160 UART: [idev] ++
3,986,720 UART: [idev] CDI.KEYID = 6
3,987,672 UART: [idev] SUBJECT.KEYID = 7
3,988,916 UART: [idev] UDS.KEYID = 0
3,989,882 ready_for_fw is high
3,990,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,160 UART: [idev] Erasing UDS.KEYID = 0
7,323,394 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,469 UART: [idev] --
7,350,349 UART: [ldev] ++
7,350,919 UART: [ldev] CDI.KEYID = 6
7,351,884 UART: [ldev] SUBJECT.KEYID = 5
7,353,097 UART: [ldev] AUTHORITY.KEYID = 7
7,354,336 UART: [ldev] FE.KEYID = 1
7,400,918 UART: [ldev] Erasing FE.KEYID = 1
10,737,072 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,409 UART: [ldev] --
13,115,731 UART: [fwproc] Waiting for Commands...
13,118,147 UART: [fwproc] Received command 0x46574c44
13,120,326 UART: [fwproc] Received Image of size 118548 bytes
17,229,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,308,031 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,220 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,709,482 >>> mbox cmd response: success
17,710,585 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,714,286 UART: [afmc] ++
17,714,866 UART: [afmc] CDI.KEYID = 6
17,715,885 UART: [afmc] SUBJECT.KEYID = 7
17,717,045 UART: [afmc] AUTHORITY.KEYID = 5
21,088,496 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,385,632 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,387,914 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,402,374 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,417,075 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,431,499 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,453,213 UART: [afmc] --
23,457,237 UART: [cold-reset] --
23,461,231 UART: [state] Locking Datavault
23,466,427 UART: [state] Locking PCR0, PCR1 and PCR31
23,468,222 UART: [state] Locking ICCM
23,470,927 UART: [exit] Launching FMC @ 0x40000130
23,479,327 UART:
23,479,570 UART: Running Caliptra FMC ...
23,480,673 UART:
23,480,833 UART: [state] CFI Enabled
23,549,259 UART: [fht] FMC Alias Private Key: 7
25,889,268 UART: [art] Extend RT PCRs Done
25,890,488 UART: [art] Lock RT PCRs Done
25,892,169 UART: [art] Populate DV Done
25,897,527 UART: [fht] FMC Alias Private Key: 7
25,899,229 UART: [art] Derive CDI
25,900,041 UART: [art] Store in slot 0x4
25,957,927 UART: [art] Derive Key Pair
25,958,991 UART: [art] Store priv key in slot 0x5
29,251,833 UART: [art] Derive Key Pair - Done
29,264,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,794 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,907 UART: [art] PUB.X = 7A81C82FFD93588292E27221BB5589CD696193E99D929162DE85A46F0B71C7E49479F4C4E0711A984C9ECF37B527BD07
31,555,572 UART: [art] PUB.Y = E1059068AA672B99A8A3A17240E77C9526EC874D4C57C0DDB0B2D642026E15C2F8CA81E74B59BB37046C5D895603C6FF
31,562,741 UART: [art] SIG.R = 16D88154427781A1EE592E88AB75DDEA596CB93279B1CD6BD7DE240F421474B3C6D873ACDE914149D7D18F683308C731
31,570,102 UART: [art] SIG.S = 9FAAF87CE412D960F00B7EA988D3003DD5660D2259895CC4C5684B829909F36C44AB64904D81391057733CC7FF035ADA
32,874,981 UART: Caliptra RT
32,876,236 UART: [state] CFI Enabled
33,063,312 UART: [rt] RT listening for mailbox commands...
33,094,747 UART: [rt]cmd =0x52435458, len=8
33,096,298 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,785,995 ready_for_fw is high
3,786,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,967,338 >>> mbox cmd response: success
17,968,570 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,647,378 UART:
23,647,767 UART: Running Caliptra FMC ...
23,648,970 UART:
23,649,161 UART: [state] CFI Enabled
23,719,168 UART: [fht] FMC Alias Private Key: 7
26,059,682 UART: [art] Extend RT PCRs Done
26,060,909 UART: [art] Lock RT PCRs Done
26,062,487 UART: [art] Populate DV Done
26,067,911 UART: [fht] FMC Alias Private Key: 7
26,069,510 UART: [art] Derive CDI
26,070,330 UART: [art] Store in slot 0x4
26,127,567 UART: [art] Derive Key Pair
26,128,607 UART: [art] Store priv key in slot 0x5
29,421,111 UART: [art] Derive Key Pair - Done
29,433,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,808 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,315 UART: [art] PUB.X = 13FE6157E1664F12FF858F641CCECFDE5594C5C0BA9D1220F2EB2FE80C855BF33CC5641BAD9CEEE4E4D6B39962FF8316
31,731,563 UART: [art] PUB.Y = 1F399D801772F592C7CEFC8789A5C16E3BE5D1E1757D374275415F12549D00A956A63628B8C1CAEA858199A4230D141F
31,738,810 UART: [art] SIG.R = B303EA2F0C6F22BCD91DE638518E2380FE5D2354D30D02AD81B3378E9A817076EF074E80915563A6DB855129BB8AA055
31,746,231 UART: [art] SIG.S = 0C385B23B6970FBADD75EF72A8B5CC03E27386F9E33CC19FD3188B0369CF3C5EEEBFA118C21EB7F183AC70F184D32A1F
33,051,752 UART: Caliptra RT
33,052,480 UART: [state] CFI Enabled
33,227,522 UART: [rt] RT listening for mailbox commands...
33,259,052 UART: [rt]cmd =0x52435458, len=8
33,260,566 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,485 UART:
192,828 UART: Running Caliptra ROM ...
194,013 UART:
603,634 UART: [state] CFI Enabled
622,184 UART: [state] LifecycleState = Unprovisioned
624,161 UART: [state] DebugLocked = No
626,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,900 UART: [kat] SHA2-256
800,696 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,207 UART: [kat] ++
811,649 UART: [kat] sha1
822,587 UART: [kat] SHA2-256
825,230 UART: [kat] SHA2-384
830,428 UART: [kat] SHA2-512-ACC
832,860 UART: [kat] ECC-384
3,117,038 UART: [kat] HMAC-384Kdf
3,129,067 UART: [kat] LMS
4,319,195 UART: [kat] --
4,322,219 UART: [cold-reset] ++
4,323,151 UART: [fht] Storing FHT @ 0x50003400
4,335,847 UART: [idev] ++
4,336,408 UART: [idev] CDI.KEYID = 6
4,337,357 UART: [idev] SUBJECT.KEYID = 7
4,338,595 UART: [idev] UDS.KEYID = 0
4,339,570 ready_for_fw is high
4,339,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,655 UART: [idev] Erasing UDS.KEYID = 0
7,625,592 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,529 UART: [idev] --
7,650,573 UART: [ldev] ++
7,651,139 UART: [ldev] CDI.KEYID = 6
7,652,097 UART: [ldev] SUBJECT.KEYID = 5
7,653,303 UART: [ldev] AUTHORITY.KEYID = 7
7,654,580 UART: [ldev] FE.KEYID = 1
7,664,798 UART: [ldev] Erasing FE.KEYID = 1
10,948,430 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,602 UART: [ldev] --
13,308,700 UART: [fwproc] Waiting for Commands...
13,310,999 UART: [fwproc] Received command 0x46574c44
13,313,224 UART: [fwproc] Received Image of size 118548 bytes
17,419,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,367 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,539 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,912 >>> mbox cmd response: success
17,903,421 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,905,890 UART: [afmc] ++
17,906,475 UART: [afmc] CDI.KEYID = 6
17,907,407 UART: [afmc] SUBJECT.KEYID = 7
17,908,687 UART: [afmc] AUTHORITY.KEYID = 5
21,221,712 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,154 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,408 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,849 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,581 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,948 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,581,274 UART: [afmc] --
23,585,787 UART: [cold-reset] --
23,590,499 UART: [state] Locking Datavault
23,596,129 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,875 UART: [state] Locking ICCM
23,599,261 UART: [exit] Launching FMC @ 0x40000130
23,607,644 UART:
23,607,872 UART: Running Caliptra FMC ...
23,608,963 UART:
23,609,135 UART: [state] CFI Enabled
23,616,960 UART: [fht] FMC Alias Private Key: 7
25,957,393 UART: [art] Extend RT PCRs Done
25,958,605 UART: [art] Lock RT PCRs Done
25,960,498 UART: [art] Populate DV Done
25,965,792 UART: [fht] FMC Alias Private Key: 7
25,967,264 UART: [art] Derive CDI
25,968,020 UART: [art] Store in slot 0x4
26,010,715 UART: [art] Derive Key Pair
26,011,752 UART: [art] Store priv key in slot 0x5
29,254,026 UART: [art] Derive Key Pair - Done
29,266,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,084 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,595 UART: [art] PUB.X = 12E26E31415A2C6F3805EAD576BE548A1E84D896B9DB73912B274556BA390059526B61BB37C078B05D0D067441F780BC
31,555,793 UART: [art] PUB.Y = 5D01CAF1760FC8C76CC66F4FEF0AB40725895AF06C0358A9BF18DC2B2A74B2F17724280690C1B63463F910C2233F047C
31,563,023 UART: [art] SIG.R = BA4057E2E35AD2542D9D9FA724E70B85F97E5E472ECCA28F58B3DD44588532B923D32E38D428ED1ED47ACACEC6BFAA61
31,570,498 UART: [art] SIG.S = 13E306E10AF92EC9E1E8C97117618C7D4FA9E731801F4AAFDFF54E0A7323D08AC77CC4D4597387ACFFC9DE7C86A8787B
32,875,586 UART: Caliptra RT
32,876,277 UART: [state] CFI Enabled
33,008,922 UART: [rt] RT listening for mailbox commands...
33,040,266 UART: [rt]cmd =0x52435458, len=8
33,041,688 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,130,731 ready_for_fw is high
4,131,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,999 >>> mbox cmd response: success
18,161,572 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,803,193 UART:
23,803,583 UART: Running Caliptra FMC ...
23,804,684 UART:
23,804,834 UART: [state] CFI Enabled
23,812,730 UART: [fht] FMC Alias Private Key: 7
26,152,870 UART: [art] Extend RT PCRs Done
26,154,098 UART: [art] Lock RT PCRs Done
26,155,752 UART: [art] Populate DV Done
26,161,011 UART: [fht] FMC Alias Private Key: 7
26,162,655 UART: [art] Derive CDI
26,163,388 UART: [art] Store in slot 0x4
26,205,823 UART: [art] Derive Key Pair
26,206,859 UART: [art] Store priv key in slot 0x5
29,449,084 UART: [art] Derive Key Pair - Done
29,461,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,086 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,599 UART: [art] PUB.X = D571D02C6D13471E94B7554260A0AF94401410F4958CE5E517051323B82DBAC6556951FC26B91871BF828F63B74741BF
31,750,856 UART: [art] PUB.Y = 90C2553AFB3DEF388F8D891E538152C0BEF5F4A44D5D31644AC708BE52E1983C8022CF567F297F6979794FCDFD816639
31,758,103 UART: [art] SIG.R = 0EBB90DBF5EC0881FD4346F581FCCDC1D0EB34BF684443117247181665EF1B0838AB194E9A1A0CCE694C8C5D17ED46C4
31,765,484 UART: [art] SIG.S = 55601A2F7D413A6B9DF445F11DC5835FD6CA1A4A60E6EFCC412AC58AE7A30BE534370E39BE8C40684B3C9E40FC9B98B8
33,071,394 UART: Caliptra RT
33,072,129 UART: [state] CFI Enabled
33,206,053 UART: [rt] RT listening for mailbox commands...
33,237,573 UART: [rt]cmd =0x52435458, len=8
33,238,893 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,145 UART:
192,506 UART: Running Caliptra ROM ...
193,603 UART:
193,744 UART: [state] CFI Enabled
262,735 UART: [state] LifecycleState = Unprovisioned
264,711 UART: [state] DebugLocked = No
265,947 UART: [state] WD Timer not started. Device not locked for debugging
269,402 UART: [kat] SHA2-256
449,054 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,800 UART: [kat] ++
460,248 UART: [kat] sha1
471,458 UART: [kat] SHA2-256
474,155 UART: [kat] SHA2-384
479,652 UART: [kat] SHA2-512-ACC
482,016 UART: [kat] ECC-384
2,948,358 UART: [kat] HMAC-384Kdf
2,969,848 UART: [kat] LMS
3,446,331 UART: [kat] --
3,451,245 UART: [cold-reset] ++
3,453,521 UART: [fht] FHT @ 0x50003400
3,464,633 UART: [idev] ++
3,465,198 UART: [idev] CDI.KEYID = 6
3,466,228 UART: [idev] SUBJECT.KEYID = 7
3,467,396 UART: [idev] UDS.KEYID = 0
3,468,441 ready_for_fw is high
3,468,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,173 UART: [idev] Erasing UDS.KEYID = 0
5,983,031 UART: [idev] Sha1 KeyId Algorithm
6,007,382 UART: [idev] --
6,013,081 UART: [ldev] ++
6,013,722 UART: [ldev] CDI.KEYID = 6
6,014,644 UART: [ldev] SUBJECT.KEYID = 5
6,015,825 UART: [ldev] AUTHORITY.KEYID = 7
6,017,055 UART: [ldev] FE.KEYID = 1
6,055,168 UART: [ldev] Erasing FE.KEYID = 1
8,558,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,598 UART: [ldev] --
10,374,504 UART: [fwproc] Wait for Commands...
10,377,563 UART: [fwproc] Recv command 0x46574c44
10,379,540 UART: [fwproc] Recv'd Img size: 118548 bytes
13,872,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,435 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,476 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,317 >>> mbox cmd response: success
14,348,453 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,351,458 UART: [afmc] ++
14,352,038 UART: [afmc] CDI.KEYID = 6
14,352,980 UART: [afmc] SUBJECT.KEYID = 7
14,354,191 UART: [afmc] AUTHORITY.KEYID = 5
16,897,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,176 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,957 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,059 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,604 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,610 UART: [afmc] --
18,716,079 UART: [cold-reset] --
18,720,645 UART: [state] Locking Datavault
18,725,566 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,268 UART: [state] Locking ICCM
18,730,029 UART: [exit] Launching FMC @ 0x40000130
18,738,481 UART:
18,738,715 UART: Running Caliptra FMC ...
18,739,811 UART:
18,739,967 UART: [state] CFI Enabled
18,795,793 UART: [fht] FMC Alias Private Key: 7
20,562,513 UART: [art] Extend RT PCRs Done
20,563,729 UART: [art] Lock RT PCRs Done
20,565,324 UART: [art] Populate DV Done
20,570,733 UART: [fht] FMC Alias Private Key: 7
20,572,266 UART: [art] Derive CDI
20,572,996 UART: [art] Store in slot 0x4
20,628,767 UART: [art] Derive Key Pair
20,629,807 UART: [art] Store priv key in slot 0x5
23,091,968 UART: [art] Derive Key Pair - Done
23,104,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,351 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,851 UART: [art] PUB.X = A3CFB006B1F08F8DDD32900BA6EC598768812FDDC8DE85261B5241376CA6B204915E987669AAD8175FE9C42CE78448CE
24,826,155 UART: [art] PUB.Y = F0515DEF15560A02A3B5D68F2074A9A29241DFF5C148F37C34C84D31C3BFC26E28ED602AC168114414459E8E7ED04A46
24,833,394 UART: [art] SIG.R = 29410FB7E32E5AB3CBE6EE1BCB8DABE961445D36C3B82A5DFA93BD9956021B1BC8B41300A67748FC129AA187D5A2E20D
24,840,788 UART: [art] SIG.S = EBAC98C12F56269D6A381AC13E35E272460AC3472EE9C0316076964A174EE9648BCD9114034E71A0866B04E8EC410BDB
25,819,736 UART: Caliptra RT
25,820,436 UART: [state] CFI Enabled
26,001,086 UART: [rt] RT listening for mailbox commands...
26,032,569 UART: [rt]cmd =0x52435458, len=8
26,033,965 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,461,455 ready_for_fw is high
3,461,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,234,279 >>> mbox cmd response: success
14,235,623 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,510,374 UART:
18,510,752 UART: Running Caliptra FMC ...
18,511,894 UART:
18,512,053 UART: [state] CFI Enabled
18,578,634 UART: [fht] FMC Alias Private Key: 7
20,345,434 UART: [art] Extend RT PCRs Done
20,346,789 UART: [art] Lock RT PCRs Done
20,348,258 UART: [art] Populate DV Done
20,353,887 UART: [fht] FMC Alias Private Key: 7
20,355,533 UART: [art] Derive CDI
20,356,344 UART: [art] Store in slot 0x4
20,411,357 UART: [art] Derive Key Pair
20,412,355 UART: [art] Store priv key in slot 0x5
22,875,273 UART: [art] Derive Key Pair - Done
22,888,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,600,584 UART: [art] Erasing AUTHORITY.KEYID = 7
24,602,101 UART: [art] PUB.X = 40D0E1DE26FC9AB889133066170E6064AE8204288ACCEFF301365D62CB8B1FFA7D71187ED1CA43823FACEAC11817F590
24,609,366 UART: [art] PUB.Y = A851E2B2EBBCC5D1030BAE38FF52D16539FB39692CC5791EE3A753AE760E34DC2BD67630917B9A802AB0E6533A5B719E
24,616,620 UART: [art] SIG.R = 0DDCB2A73C54A6E216B94DBCC6C2E33FA72CE5E546CD704AD61778E6245B4F55C59702CC702B90530D47CF0472D6E67F
24,624,012 UART: [art] SIG.S = B40127C93112DB2AE32A139F7B04FE531F81ADCAEC26E3DC96157C9C852A1C4F0CD8739ABA937C9B1CFED76C58E86C89
25,603,125 UART: Caliptra RT
25,603,849 UART: [state] CFI Enabled
25,783,979 UART: [rt] RT listening for mailbox commands...
25,815,549 UART: [rt]cmd =0x52435458, len=8
25,816,867 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,502 UART:
192,864 UART: Running Caliptra ROM ...
193,984 UART:
603,580 UART: [state] CFI Enabled
615,615 UART: [state] LifecycleState = Unprovisioned
617,616 UART: [state] DebugLocked = No
618,855 UART: [state] WD Timer not started. Device not locked for debugging
622,833 UART: [kat] SHA2-256
802,519 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,318 UART: [kat] ++
813,767 UART: [kat] sha1
824,001 UART: [kat] SHA2-256
826,740 UART: [kat] SHA2-384
832,304 UART: [kat] SHA2-512-ACC
834,671 UART: [kat] ECC-384
3,276,145 UART: [kat] HMAC-384Kdf
3,289,440 UART: [kat] LMS
3,765,920 UART: [kat] --
3,771,570 UART: [cold-reset] ++
3,774,076 UART: [fht] FHT @ 0x50003400
3,784,983 UART: [idev] ++
3,785,576 UART: [idev] CDI.KEYID = 6
3,786,540 UART: [idev] SUBJECT.KEYID = 7
3,787,712 UART: [idev] UDS.KEYID = 0
3,788,761 ready_for_fw is high
3,788,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,822 UART: [idev] Erasing UDS.KEYID = 0
6,267,769 UART: [idev] Sha1 KeyId Algorithm
6,290,391 UART: [idev] --
6,295,919 UART: [ldev] ++
6,296,560 UART: [ldev] CDI.KEYID = 6
6,297,447 UART: [ldev] SUBJECT.KEYID = 5
6,298,665 UART: [ldev] AUTHORITY.KEYID = 7
6,299,970 UART: [ldev] FE.KEYID = 1
6,309,005 UART: [ldev] Erasing FE.KEYID = 1
8,789,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,420 UART: [ldev] --
10,582,043 UART: [fwproc] Wait for Commands...
10,584,305 UART: [fwproc] Recv command 0x46574c44
10,586,344 UART: [fwproc] Recv'd Img size: 118548 bytes
14,063,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,545 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,557 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,254 >>> mbox cmd response: success
14,545,734 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,548,479 UART: [afmc] ++
14,549,069 UART: [afmc] CDI.KEYID = 6
14,549,959 UART: [afmc] SUBJECT.KEYID = 7
14,551,237 UART: [afmc] AUTHORITY.KEYID = 5
17,055,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,453 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,271 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,331 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,826,915 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,342 UART: [afmc] --
18,854,596 UART: [cold-reset] --
18,860,133 UART: [state] Locking Datavault
18,865,220 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,970 UART: [state] Locking ICCM
18,868,257 UART: [exit] Launching FMC @ 0x40000130
18,876,708 UART:
18,876,942 UART: Running Caliptra FMC ...
18,878,045 UART:
18,878,205 UART: [state] CFI Enabled
18,886,432 UART: [fht] FMC Alias Private Key: 7
20,652,795 UART: [art] Extend RT PCRs Done
20,654,018 UART: [art] Lock RT PCRs Done
20,655,538 UART: [art] Populate DV Done
20,660,902 UART: [fht] FMC Alias Private Key: 7
20,662,610 UART: [art] Derive CDI
20,663,349 UART: [art] Store in slot 0x4
20,706,265 UART: [art] Derive Key Pair
20,707,307 UART: [art] Store priv key in slot 0x5
23,133,763 UART: [art] Derive Key Pair - Done
23,146,759 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,907 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,407 UART: [art] PUB.X = 155C80EEC9338FE5F711A77EDDABE8E85B8189A40A28CB4E07855E0946EEBA555E4E17E82905B5CAF7E602AE9C5EBDAB
24,861,757 UART: [art] PUB.Y = 5C334CC5C351C0DFD9A99310780D93BFCE54E00908C2FB2628E2A9034A4E2422AD9F578A6FCBBD2C055BD25110BB92F8
24,869,035 UART: [art] SIG.R = 38DB424AE7DD8904DDE9FFF0DD0FCBE7C0AB1629C359D8877BCC9367C3D04CE62A35696B58724D68D14254E251179102
24,876,431 UART: [art] SIG.S = 2F039E4F54953C080DE52686EF2378FCD1193C993034F9AD8B775A813DEE518A44EF6D9AE4B52079354B1F5365CCE8B2
25,855,432 UART: Caliptra RT
25,856,140 UART: [state] CFI Enabled
25,988,552 UART: [rt] RT listening for mailbox commands...
26,019,807 UART: [rt]cmd =0x52435458, len=8
26,021,213 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,778,072 ready_for_fw is high
3,778,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,641 >>> mbox cmd response: success
14,452,160 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,698,453 UART:
18,698,837 UART: Running Caliptra FMC ...
18,700,040 UART:
18,700,210 UART: [state] CFI Enabled
18,708,031 UART: [fht] FMC Alias Private Key: 7
20,473,905 UART: [art] Extend RT PCRs Done
20,475,129 UART: [art] Lock RT PCRs Done
20,477,104 UART: [art] Populate DV Done
20,482,421 UART: [fht] FMC Alias Private Key: 7
20,483,963 UART: [art] Derive CDI
20,484,780 UART: [art] Store in slot 0x4
20,527,430 UART: [art] Derive Key Pair
20,528,432 UART: [art] Store priv key in slot 0x5
22,955,272 UART: [art] Derive Key Pair - Done
22,968,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,159 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,659 UART: [art] PUB.X = 025048619B19FDB363614AB4A9E01422C7F49A102539158156C9AEBE07B32408E4085B1F290DD68CFC436E20D01E8E56
24,682,915 UART: [art] PUB.Y = D22AB210D29FD16750A9E88946CA7C72E2E53FE4566F488ECD2F21C1EFF75E4D49477C4D208E94722AEFFD17DB960BC5
24,690,168 UART: [art] SIG.R = 36272CFC756420F1788683BD844F1B7FCD68B6CDC44B9A3FEBECA5664E048B71151EAAB12F2F2BB50254DBE2BE1CE476
24,697,620 UART: [art] SIG.S = 3191C370D7482D6D1AC273D885C8C8FD50B7A0CF7D181310C721C79A0EA6C3A145C3E9DE6C274D07BECF23E5C76544B1
25,675,969 UART: Caliptra RT
25,676,681 UART: [state] CFI Enabled
25,809,296 UART: [rt] RT listening for mailbox commands...
25,840,480 UART: [rt]cmd =0x52435458, len=8
25,841,848 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
191,945 UART:
192,320 UART: Running Caliptra ROM ...
193,419 UART:
193,561 UART: [state] CFI Enabled
262,937 UART: [state] LifecycleState = Unprovisioned
265,352 UART: [state] DebugLocked = No
267,534 UART: [state] WD Timer not started. Device not locked for debugging
272,637 UART: [kat] SHA2-256
462,553 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,286 UART: [kat] ++
473,730 UART: [kat] sha1
485,240 UART: [kat] SHA2-256
488,246 UART: [kat] SHA2-384
494,314 UART: [kat] SHA2-512-ACC
496,963 UART: [kat] ECC-384
2,949,425 UART: [kat] HMAC-384Kdf
2,973,018 UART: [kat] LMS
3,504,800 UART: [kat] --
3,508,147 UART: [cold-reset] ++
3,509,775 UART: [fht] FHT @ 0x50003400
3,520,974 UART: [idev] ++
3,521,609 UART: [idev] CDI.KEYID = 6
3,522,617 UART: [idev] SUBJECT.KEYID = 7
3,523,791 UART: [idev] UDS.KEYID = 0
3,524,715 ready_for_fw is high
3,524,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,077 UART: [idev] Erasing UDS.KEYID = 0
6,030,614 UART: [idev] Sha1 KeyId Algorithm
6,052,335 UART: [idev] --
6,056,762 UART: [ldev] ++
6,057,490 UART: [ldev] CDI.KEYID = 6
6,058,398 UART: [ldev] SUBJECT.KEYID = 5
6,059,550 UART: [ldev] AUTHORITY.KEYID = 7
6,060,778 UART: [ldev] FE.KEYID = 1
6,100,263 UART: [ldev] Erasing FE.KEYID = 1
8,605,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,340 UART: [ldev] --
10,413,139 UART: [fwproc] Wait for Commands...
10,415,174 UART: [fwproc] Recv command 0x46574c44
10,417,475 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,028 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,633 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,414 >>> mbox cmd response: success
14,682,768 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,685,736 UART: [afmc] ++
14,686,492 UART: [afmc] CDI.KEYID = 6
14,687,593 UART: [afmc] SUBJECT.KEYID = 7
14,689,124 UART: [afmc] AUTHORITY.KEYID = 5
17,233,095 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,566 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,679 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,813 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,702 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,796 UART: [afmc] --
19,033,341 UART: [cold-reset] --
19,037,795 UART: [state] Locking Datavault
19,044,932 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,059 UART: [state] Locking ICCM
19,049,538 UART: [exit] Launching FMC @ 0x40000130
19,058,204 UART:
19,058,436 UART: Running Caliptra FMC ...
19,059,744 UART:
19,059,913 UART: [state] CFI Enabled
19,114,587 UART: [fht] FMC Alias Private Key: 7
20,881,347 UART: [art] Extend RT PCRs Done
20,882,572 UART: [art] Lock RT PCRs Done
20,884,442 UART: [art] Populate DV Done
20,889,794 UART: [fht] FMC Alias Private Key: 7
20,891,384 UART: [art] Derive CDI
20,892,117 UART: [art] Store in slot 0x4
20,947,781 UART: [art] Derive Key Pair
20,948,822 UART: [art] Store priv key in slot 0x5
23,411,520 UART: [art] Derive Key Pair - Done
23,424,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,445 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,950 UART: [art] PUB.X = 39CBB9FA334FA61466ABD236A59F2CA4B6EF8C02EC243DDF28C2CFB170098A7F44247FB4599CF7504F07CC5513377424
25,146,253 UART: [art] PUB.Y = C5AF58F423FFA2C44FC57D22B068AF7A064D1A7E30CFF5FDD05A75E9E96A07C11ECC8F15FF68A1822100CF9347A3E420
25,153,478 UART: [art] SIG.R = 0CE13531A5B008706ECF1A0B7BE03CF6087DFE0C203F95A8D658259FC3215A97E6465BE019DA213A393131E3887F4901
25,160,835 UART: [art] SIG.S = B3E8C54C062F603BBFCF2E724527C8AE08ADFD914AFBAE13576B3BAA097FB52EF542CB3DD2131421D32383E5F7A896CA
26,139,694 UART: Caliptra RT
26,140,404 UART: [state] CFI Enabled
26,322,162 UART: [rt] RT listening for mailbox commands...
26,353,637 UART: [rt]cmd =0x52435458, len=8
26,354,950 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,439,474 ready_for_fw is high
3,440,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,553 >>> mbox cmd response: success
14,822,140 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,111,724 UART:
19,112,104 UART: Running Caliptra FMC ...
19,113,306 UART:
19,113,470 UART: [state] CFI Enabled
19,177,945 UART: [fht] FMC Alias Private Key: 7
20,943,854 UART: [art] Extend RT PCRs Done
20,945,082 UART: [art] Lock RT PCRs Done
20,946,667 UART: [art] Populate DV Done
20,952,029 UART: [fht] FMC Alias Private Key: 7
20,953,516 UART: [art] Derive CDI
20,954,276 UART: [art] Store in slot 0x4
21,010,425 UART: [art] Derive Key Pair
21,011,476 UART: [art] Store priv key in slot 0x5
23,474,825 UART: [art] Derive Key Pair - Done
23,487,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,111 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,622 UART: [art] PUB.X = A0B9A6BE3571550446C15D3436740890B0DB08AE3B70C163D6634AD2DC9F657C65388A802453233A31C7D92C5EA9D8C7
25,208,832 UART: [art] PUB.Y = 68AC43F6F85CC6EC83B9498B9FDE5EF3AFF9A5E54BDC647D7E753D78CCBAD153D91A2D16D5EEC766CE9E614A8DF1F938
25,216,137 UART: [art] SIG.R = 0563592A784626642BEF22D8397DD040B2136F8BEA8EAC48FA395902493ADC76718A8862463F8C1DEBA4E6F66F9C1E28
25,223,542 UART: [art] SIG.S = D548120531F27A8C78426801D1456AC0E54BEBA4CBC46B54880EF3A4FDE1D5272290F770B00F001BE9666CB6484DA2DF
26,202,759 UART: Caliptra RT
26,203,495 UART: [state] CFI Enabled
26,383,391 UART: [rt] RT listening for mailbox commands...
26,414,912 UART: [rt]cmd =0x52435458, len=8
26,416,411 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,433 UART:
192,797 UART: Running Caliptra ROM ...
193,989 UART:
603,784 UART: [state] CFI Enabled
618,740 UART: [state] LifecycleState = Unprovisioned
621,153 UART: [state] DebugLocked = No
623,462 UART: [state] WD Timer not started. Device not locked for debugging
627,660 UART: [kat] SHA2-256
817,567 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,376 UART: [kat] ++
828,896 UART: [kat] sha1
839,913 UART: [kat] SHA2-256
842,997 UART: [kat] SHA2-384
848,572 UART: [kat] SHA2-512-ACC
851,158 UART: [kat] ECC-384
3,288,913 UART: [kat] HMAC-384Kdf
3,302,578 UART: [kat] LMS
3,834,392 UART: [kat] --
3,838,808 UART: [cold-reset] ++
3,840,549 UART: [fht] FHT @ 0x50003400
3,850,534 UART: [idev] ++
3,851,175 UART: [idev] CDI.KEYID = 6
3,852,133 UART: [idev] SUBJECT.KEYID = 7
3,853,383 UART: [idev] UDS.KEYID = 0
3,854,500 ready_for_fw is high
3,854,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,565 UART: [idev] Erasing UDS.KEYID = 0
6,330,108 UART: [idev] Sha1 KeyId Algorithm
6,352,409 UART: [idev] --
6,357,586 UART: [ldev] ++
6,358,263 UART: [ldev] CDI.KEYID = 6
6,359,234 UART: [ldev] SUBJECT.KEYID = 5
6,360,395 UART: [ldev] AUTHORITY.KEYID = 7
6,361,627 UART: [ldev] FE.KEYID = 1
6,371,306 UART: [ldev] Erasing FE.KEYID = 1
8,849,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,468 UART: [ldev] --
10,640,471 UART: [fwproc] Wait for Commands...
10,643,271 UART: [fwproc] Recv command 0x46574c44
10,645,578 UART: [fwproc] Recv'd Img size: 118548 bytes
14,135,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,214,743 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,338,349 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,898,096 >>> mbox cmd response: success
14,899,572 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,902,431 UART: [afmc] ++
14,903,135 UART: [afmc] CDI.KEYID = 6
14,904,345 UART: [afmc] SUBJECT.KEYID = 7
14,905,785 UART: [afmc] AUTHORITY.KEYID = 5
17,408,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,131,876 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,133,849 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,148,946 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,164,085 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,179,036 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,202,431 UART: [afmc] --
19,205,812 UART: [cold-reset] --
19,207,897 UART: [state] Locking Datavault
19,212,943 UART: [state] Locking PCR0, PCR1 and PCR31
19,215,094 UART: [state] Locking ICCM
19,218,115 UART: [exit] Launching FMC @ 0x40000130
19,226,746 UART:
19,226,986 UART: Running Caliptra FMC ...
19,228,108 UART:
19,228,277 UART: [state] CFI Enabled
19,236,489 UART: [fht] FMC Alias Private Key: 7
21,002,556 UART: [art] Extend RT PCRs Done
21,003,792 UART: [art] Lock RT PCRs Done
21,005,437 UART: [art] Populate DV Done
21,010,966 UART: [fht] FMC Alias Private Key: 7
21,012,670 UART: [art] Derive CDI
21,013,697 UART: [art] Store in slot 0x4
21,056,045 UART: [art] Derive Key Pair
21,057,059 UART: [art] Store priv key in slot 0x5
23,484,002 UART: [art] Derive Key Pair - Done
23,496,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,408 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,918 UART: [art] PUB.X = 343811A3768FC915A609E3DDDA2DD10E1CAFBF38A7C2CCC5AE42F26A680D3901104953CD7F287464E5795729393938C4
25,212,144 UART: [art] PUB.Y = 50E368D3A059173A90E34C0A1A0066F81A1BB043D95930CF72ED9A90E06AD9D6CC4E522F3608A3586A3CDAF9075BCA87
25,219,419 UART: [art] SIG.R = 9D78B46B21542A09A51E4A0FBD062677D59703D6F4C53E10B158EF74032064C4806AE8F4BB84EDC839A5B3A92FEE4E16
25,226,781 UART: [art] SIG.S = 527E32B14BEC3D43BFD93EBA210B03EF9BE6C4B152C1C244EFC203877052BC4833935AFB591DD2F34F2B92DE56D8DC36
26,205,988 UART: Caliptra RT
26,206,699 UART: [state] CFI Enabled
26,338,309 UART: [rt] RT listening for mailbox commands...
26,369,668 UART: [rt]cmd =0x52435458, len=8
26,370,957 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,753,420 ready_for_fw is high
3,754,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,501 >>> mbox cmd response: success
15,044,091 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,293,700 UART:
19,294,110 UART: Running Caliptra FMC ...
19,295,240 UART:
19,295,399 UART: [state] CFI Enabled
19,303,627 UART: [fht] FMC Alias Private Key: 7
21,069,105 UART: [art] Extend RT PCRs Done
21,070,361 UART: [art] Lock RT PCRs Done
21,072,134 UART: [art] Populate DV Done
21,077,464 UART: [fht] FMC Alias Private Key: 7
21,079,176 UART: [art] Derive CDI
21,079,919 UART: [art] Store in slot 0x4
21,122,477 UART: [art] Derive Key Pair
21,123,527 UART: [art] Store priv key in slot 0x5
23,550,142 UART: [art] Derive Key Pair - Done
23,563,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,925 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,441 UART: [art] PUB.X = 43E22E4F88116BF99815E683FD6FF61BBC7CA539A912926BB4FC4B040B4EC3B6F876D89888232276F2E4F38B871745D2
25,278,720 UART: [art] PUB.Y = CDA34EEDA3B224EC0C8457295D267B6A5660368517F64FE5D931297CF82ABEB4036CB9378A385165A714F69DB9DC92D9
25,285,924 UART: [art] SIG.R = 186983A369C1D9CC8C3D3E6F4C2BE56ED2D384A10EC46CBD5B03070725B8766D83EE4331C436BDA90B8BBCC5DE35BA9B
25,293,406 UART: [art] SIG.S = 9135271B2C46E683D29D8A6EA32615160BA1F16DD19ED708C6A9E8D79C2772DCA100CAA90400BCCA2A90C0CC3510553E
26,272,360 UART: Caliptra RT
26,273,077 UART: [state] CFI Enabled
26,406,041 UART: [rt] RT listening for mailbox commands...
26,437,466 UART: [rt]cmd =0x52435458, len=8
26,438,861 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,229 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,823 UART: [kat] SHA2-256
881,754 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,869 UART: [kat] ++
886,021 UART: [kat] sha1
890,451 UART: [kat] SHA2-256
892,389 UART: [kat] SHA2-384
895,112 UART: [kat] SHA2-512-ACC
897,013 UART: [kat] ECC-384
902,864 UART: [kat] HMAC-384Kdf
907,398 UART: [kat] LMS
1,475,594 UART: [kat] --
1,476,541 UART: [cold-reset] ++
1,477,025 UART: [fht] Storing FHT @ 0x50003400
1,479,776 UART: [idev] ++
1,479,944 UART: [idev] CDI.KEYID = 6
1,480,304 UART: [idev] SUBJECT.KEYID = 7
1,480,728 UART: [idev] UDS.KEYID = 0
1,481,073 ready_for_fw is high
1,481,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,448 UART: [idev] Erasing UDS.KEYID = 0
1,505,348 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,040 UART: [idev] --
1,514,983 UART: [ldev] ++
1,515,151 UART: [ldev] CDI.KEYID = 6
1,515,514 UART: [ldev] SUBJECT.KEYID = 5
1,515,940 UART: [ldev] AUTHORITY.KEYID = 7
1,516,403 UART: [ldev] FE.KEYID = 1
1,521,579 UART: [ldev] Erasing FE.KEYID = 1
1,547,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,928 UART: [ldev] --
1,586,299 UART: [fwproc] Waiting for Commands...
1,587,164 UART: [fwproc] Received command 0x46574c44
1,587,955 UART: [fwproc] Received Image of size 118548 bytes
2,932,981 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,997 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,215 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,480 >>> mbox cmd response: success
3,131,480 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,560 UART: [afmc] ++
3,132,728 UART: [afmc] CDI.KEYID = 6
3,133,090 UART: [afmc] SUBJECT.KEYID = 7
3,133,515 UART: [afmc] AUTHORITY.KEYID = 5
3,168,318 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,654 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,434 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,143 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,026 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,709 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,689 UART: [afmc] --
3,211,799 UART: [cold-reset] --
3,212,587 UART: [state] Locking Datavault
3,213,848 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,452 UART: [state] Locking ICCM
3,214,998 UART: [exit] Launching FMC @ 0x40000130
3,220,328 UART:
3,220,344 UART: Running Caliptra FMC ...
3,220,752 UART:
3,220,806 UART: [state] CFI Enabled
3,231,452 UART: [fht] FMC Alias Private Key: 7
3,350,910 UART: [art] Extend RT PCRs Done
3,351,338 UART: [art] Lock RT PCRs Done
3,352,852 UART: [art] Populate DV Done
3,360,997 UART: [fht] FMC Alias Private Key: 7
3,361,947 UART: [art] Derive CDI
3,362,227 UART: [art] Store in slot 0x4
3,447,989 UART: [art] Derive Key Pair
3,448,349 UART: [art] Store priv key in slot 0x5
3,460,998 UART: [art] Derive Key Pair - Done
3,475,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,655 UART: [art] PUB.X = 5E13036905BAB3169E877CC2F21AFCC4FFAA1954719704346163519D09A901D91860EA8B0DCC7C07FA322CC3985520B0
3,498,404 UART: [art] PUB.Y = 3E8D39B1BC7929E2063992AE65AB5F3D1608062154A5618111478030278DFBF6A3AA22C7691BFFB93A1A69E64ABFDC14
3,505,349 UART: [art] SIG.R = 5BA9042D1DDB2CC33D7D0230D2CA95DFBDFFAE43424AA87AD60BF2C159ED4F5F2E3ED89A009B4B277DB993BA741AF126
3,512,114 UART: [art] SIG.S = 717F7C73CE2F6A0DB15375E22E68360D514171B2F9E7EC84772D9ADB1E4024CD5AC044C74B5CE85E70FD7C33FC97B863
3,536,058 UART: Caliptra RT
3,536,309 UART: [state] CFI Enabled
3,656,906 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,418 UART: [rt]cmd =0x52435458, len=8
3,688,231 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,895 ready_for_fw is high
1,362,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,208 >>> mbox cmd response: success
2,981,208 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,042,325 UART:
3,042,341 UART: Running Caliptra FMC ...
3,042,749 UART:
3,042,803 UART: [state] CFI Enabled
3,053,287 UART: [fht] FMC Alias Private Key: 7
3,172,805 UART: [art] Extend RT PCRs Done
3,173,233 UART: [art] Lock RT PCRs Done
3,174,911 UART: [art] Populate DV Done
3,183,430 UART: [fht] FMC Alias Private Key: 7
3,184,598 UART: [art] Derive CDI
3,184,878 UART: [art] Store in slot 0x4
3,270,762 UART: [art] Derive Key Pair
3,271,122 UART: [art] Store priv key in slot 0x5
3,284,465 UART: [art] Derive Key Pair - Done
3,299,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,352 UART: [art] PUB.X = 990E43BB1BD0D261A259447DB8C800BEDA020C79052B89CE836BF678F9049FBD43C22E2CF62C448091E1AB9CFBE8DFB0
3,322,101 UART: [art] PUB.Y = 63A2A7D87149F6CE5B031F33F16808C9B6AF9FDF5568B8F17AF85C2B7D128869D80430D37C23B0737054001A37DC14E5
3,329,020 UART: [art] SIG.R = 8699C31DD0DA86DB9920BF7D15B2F5A737F36E85D49B6A1F7C458B29575916BB6DB3F3478D14C4F925CEC8EAA47642C1
3,335,800 UART: [art] SIG.S = 5FD0CEC508F817BAFC6BD8271F03333FDC19FDE93041B440730DFF29C0487C30647FB4DCD156F87B4173BBE3C42B4219
3,359,061 UART: Caliptra RT
3,359,312 UART: [state] CFI Enabled
3,479,500 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,994 UART: [rt]cmd =0x52435458, len=8
3,510,945 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,051 UART: [state] LifecycleState = Unprovisioned
86,706 UART: [state] DebugLocked = No
87,322 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 UART: [kat] SHA2-256
882,779 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,894 UART: [kat] ++
887,046 UART: [kat] sha1
891,298 UART: [kat] SHA2-256
893,236 UART: [kat] SHA2-384
896,009 UART: [kat] SHA2-512-ACC
897,910 UART: [kat] ECC-384
903,567 UART: [kat] HMAC-384Kdf
907,991 UART: [kat] LMS
1,476,187 UART: [kat] --
1,477,246 UART: [cold-reset] ++
1,477,604 UART: [fht] Storing FHT @ 0x50003400
1,480,275 UART: [idev] ++
1,480,443 UART: [idev] CDI.KEYID = 6
1,480,803 UART: [idev] SUBJECT.KEYID = 7
1,481,227 UART: [idev] UDS.KEYID = 0
1,481,572 ready_for_fw is high
1,481,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,433 UART: [idev] Erasing UDS.KEYID = 0
1,506,497 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,071 UART: [idev] --
1,516,122 UART: [ldev] ++
1,516,290 UART: [ldev] CDI.KEYID = 6
1,516,653 UART: [ldev] SUBJECT.KEYID = 5
1,517,079 UART: [ldev] AUTHORITY.KEYID = 7
1,517,542 UART: [ldev] FE.KEYID = 1
1,523,100 UART: [ldev] Erasing FE.KEYID = 1
1,548,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,839 UART: [ldev] --
1,588,150 UART: [fwproc] Waiting for Commands...
1,588,787 UART: [fwproc] Received command 0x46574c44
1,589,578 UART: [fwproc] Received Image of size 118548 bytes
2,932,770 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,998 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,625 >>> mbox cmd response: success
3,131,625 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,729 UART: [afmc] ++
3,132,897 UART: [afmc] CDI.KEYID = 6
3,133,259 UART: [afmc] SUBJECT.KEYID = 7
3,133,684 UART: [afmc] AUTHORITY.KEYID = 5
3,169,385 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,783 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,563 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,272 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,155 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,838 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,526 UART: [afmc] --
3,212,438 UART: [cold-reset] --
3,213,458 UART: [state] Locking Datavault
3,214,783 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,387 UART: [state] Locking ICCM
3,215,941 UART: [exit] Launching FMC @ 0x40000130
3,221,271 UART:
3,221,287 UART: Running Caliptra FMC ...
3,221,695 UART:
3,221,838 UART: [state] CFI Enabled
3,232,310 UART: [fht] FMC Alias Private Key: 7
3,351,678 UART: [art] Extend RT PCRs Done
3,352,106 UART: [art] Lock RT PCRs Done
3,353,686 UART: [art] Populate DV Done
3,361,755 UART: [fht] FMC Alias Private Key: 7
3,362,931 UART: [art] Derive CDI
3,363,211 UART: [art] Store in slot 0x4
3,449,185 UART: [art] Derive Key Pair
3,449,545 UART: [art] Store priv key in slot 0x5
3,462,658 UART: [art] Derive Key Pair - Done
3,477,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,146 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,911 UART: [art] PUB.X = A4DC0AB4513A07FB7E27A45E76FAF0808DBC2B35DDC85E278B1FCED2467652296A3180441AB3B80DB18001B94397FEA8
3,500,681 UART: [art] PUB.Y = 70CAE31423AAD9661C6A999C133E98E524BD53B863F5759A9447985A8B28BD5B22E9709CB087450C4C549DF7AA377E86
3,507,628 UART: [art] SIG.R = CA60E93AB5A8AD466FF744CFF6FC02664615ADBA4A8A12DF25DF07FC0F1FD66CAA9BA6C235A8628B2D47683336054908
3,514,399 UART: [art] SIG.S = 4537FA164E0B2B1EC19C3574B0AD73E99D02AE1FF43E7CFB959E64F4F627627269C28A08D9F5612E333C5882FE4C617A
3,537,988 UART: Caliptra RT
3,538,331 UART: [state] CFI Enabled
3,658,971 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,203 UART: [rt]cmd =0x52435458, len=8
3,690,266 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,478 ready_for_fw is high
1,362,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,983 >>> mbox cmd response: success
2,981,983 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,043,614 UART:
3,043,630 UART: Running Caliptra FMC ...
3,044,038 UART:
3,044,181 UART: [state] CFI Enabled
3,054,727 UART: [fht] FMC Alias Private Key: 7
3,173,559 UART: [art] Extend RT PCRs Done
3,173,987 UART: [art] Lock RT PCRs Done
3,175,417 UART: [art] Populate DV Done
3,183,726 UART: [fht] FMC Alias Private Key: 7
3,184,696 UART: [art] Derive CDI
3,184,976 UART: [art] Store in slot 0x4
3,270,548 UART: [art] Derive Key Pair
3,270,908 UART: [art] Store priv key in slot 0x5
3,284,329 UART: [art] Derive Key Pair - Done
3,299,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,953 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,718 UART: [art] PUB.X = 4522F487671FB83A9CF1E4FF68C5E668112F7E4B634FB44EB5B5D47C20D29C2978D4B3297153BE8816B8632810634C38
3,322,484 UART: [art] PUB.Y = D7FF6B201FC891EC44D0DB4062D9C2AD6E6CBF76ED98240F48B7EBB46DAB9B3F0D84F01E5164CF481A53FCFCF73CD503
3,329,451 UART: [art] SIG.R = 9DE3BE8BBE0B55625684D5C2AFB2B350A9CC0198EA0B3B7110AEFD4A9F081E84D11A605D45A27D0E82013365C1FAAB36
3,336,219 UART: [art] SIG.S = ADAC762D51E538DF5F222151024DD286DD3D8FB6BBC40036C899B396956AF8F1C8DA6552751A183F3F8DE4956EFC19E7
3,359,818 UART: Caliptra RT
3,360,161 UART: [state] CFI Enabled
3,479,998 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,498 UART: [rt]cmd =0x52435458, len=8
3,511,691 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,652 UART: [kat] SHA2-256
901,592 UART: [kat] SHA2-384
904,453 UART: [kat] SHA2-512-ACC
906,354 UART: [kat] ECC-384
915,523 UART: [kat] HMAC-384Kdf
920,059 UART: [kat] LMS
1,168,371 UART: [kat] --
1,169,084 UART: [cold-reset] ++
1,169,442 UART: [fht] FHT @ 0x50003400
1,172,014 UART: [idev] ++
1,172,182 UART: [idev] CDI.KEYID = 6
1,172,543 UART: [idev] SUBJECT.KEYID = 7
1,172,968 UART: [idev] UDS.KEYID = 0
1,173,314 ready_for_fw is high
1,173,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,037 UART: [idev] Sha1 KeyId Algorithm
1,206,935 UART: [idev] --
1,208,012 UART: [ldev] ++
1,208,180 UART: [ldev] CDI.KEYID = 6
1,208,544 UART: [ldev] SUBJECT.KEYID = 5
1,208,971 UART: [ldev] AUTHORITY.KEYID = 7
1,209,434 UART: [ldev] FE.KEYID = 1
1,214,306 UART: [ldev] Erasing FE.KEYID = 1
1,240,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,874 UART: [ldev] --
1,280,083 UART: [fwproc] Wait for Commands...
1,280,858 UART: [fwproc] Recv command 0x46574c44
1,281,591 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,465 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,640 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,911 >>> mbox cmd response: success
2,824,911 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,826,095 UART: [afmc] ++
2,826,263 UART: [afmc] CDI.KEYID = 6
2,826,626 UART: [afmc] SUBJECT.KEYID = 7
2,827,052 UART: [afmc] AUTHORITY.KEYID = 5
2,862,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,449 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,159 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,040 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,741 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,322 UART: [afmc] --
2,905,343 UART: [cold-reset] --
2,906,143 UART: [state] Locking Datavault
2,907,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,738 UART: [state] Locking ICCM
2,908,346 UART: [exit] Launching FMC @ 0x40000130
2,913,676 UART:
2,913,692 UART: Running Caliptra FMC ...
2,914,100 UART:
2,914,154 UART: [state] CFI Enabled
2,925,206 UART: [fht] FMC Alias Private Key: 7
3,044,422 UART: [art] Extend RT PCRs Done
3,044,850 UART: [art] Lock RT PCRs Done
3,046,406 UART: [art] Populate DV Done
3,054,981 UART: [fht] FMC Alias Private Key: 7
3,056,085 UART: [art] Derive CDI
3,056,365 UART: [art] Store in slot 0x4
3,142,414 UART: [art] Derive Key Pair
3,142,774 UART: [art] Store priv key in slot 0x5
3,155,774 UART: [art] Derive Key Pair - Done
3,170,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,680 UART: [art] PUB.X = 80DCD2CBE548F609CF5755156882A6456B176F1BE6881CBAC071D3CFA1EC2517DF6FFC14A3B612E75C7ECADD5C281BDD
3,193,469 UART: [art] PUB.Y = D06739F338F9FF12EC060B81F7087FDCFFA9DBF49061245723FF83FDB94163764B03DBC5EFDC11118C993EC4DE60A9C5
3,200,421 UART: [art] SIG.R = 6A13E3931383105B6A91F9EAA6B45FF9B63A188FCAC848183DE5C193971262B3843AB5944EF46597CCD5C16890635A9C
3,207,191 UART: [art] SIG.S = FBE37B7B4439C704D017F23ECDA8AB95F71822C74FB45412A5A7F7E645EDFA632265AE53DCC8DA28559A316EA9479029
3,230,508 UART: Caliptra RT
3,230,759 UART: [state] CFI Enabled
3,351,530 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,108 UART: [rt]cmd =0x52435458, len=8
3,383,181 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,814 ready_for_fw is high
1,058,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,972 >>> mbox cmd response: success
2,677,972 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,241 UART:
2,740,257 UART: Running Caliptra FMC ...
2,740,665 UART:
2,740,719 UART: [state] CFI Enabled
2,751,415 UART: [fht] FMC Alias Private Key: 7
2,870,323 UART: [art] Extend RT PCRs Done
2,870,751 UART: [art] Lock RT PCRs Done
2,872,321 UART: [art] Populate DV Done
2,880,564 UART: [fht] FMC Alias Private Key: 7
2,881,576 UART: [art] Derive CDI
2,881,856 UART: [art] Store in slot 0x4
2,967,905 UART: [art] Derive Key Pair
2,968,265 UART: [art] Store priv key in slot 0x5
2,981,699 UART: [art] Derive Key Pair - Done
2,996,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,579 UART: [art] PUB.X = EFFE59BD862666CD8431DB031BCD09BF470EFB0396C43BA3F9A60766FC0D52F5BFF8A6A8C11FC411B73A854DAE410B7E
3,019,350 UART: [art] PUB.Y = EBC7B856D3FCD0AF2E082FD403094583C8274A92AE387A936984147EDA4958868849B5A2D61ADE27E1E1011A05BC4DBA
3,026,293 UART: [art] SIG.R = 4A7FA50C4EA523C12266C73D92099B48CC66FFBB1C33D6DCC19163703FA6047C78F58BB09C696FA2A16C8DDD08D835F6
3,033,063 UART: [art] SIG.S = 86E5FB31FA9880E524609E472CC1F6D718FBDFD07C003C67506FA8CD46FFD0602BB65AB04C255184A82E04B967C11B88
3,056,384 UART: Caliptra RT
3,056,635 UART: [state] CFI Enabled
3,175,672 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,314 UART: [rt]cmd =0x52435458, len=8
3,207,347 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Unprovisioned
85,734 UART: [state] DebugLocked = No
86,322 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,202 UART: [kat] SHA2-512-ACC
906,103 UART: [kat] ECC-384
916,244 UART: [kat] HMAC-384Kdf
920,842 UART: [kat] LMS
1,169,154 UART: [kat] --
1,169,855 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,172,833 UART: [idev] ++
1,173,001 UART: [idev] CDI.KEYID = 6
1,173,362 UART: [idev] SUBJECT.KEYID = 7
1,173,787 UART: [idev] UDS.KEYID = 0
1,174,133 ready_for_fw is high
1,174,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,946 UART: [idev] Erasing UDS.KEYID = 0
1,199,274 UART: [idev] Sha1 KeyId Algorithm
1,207,980 UART: [idev] --
1,208,859 UART: [ldev] ++
1,209,027 UART: [ldev] CDI.KEYID = 6
1,209,391 UART: [ldev] SUBJECT.KEYID = 5
1,209,818 UART: [ldev] AUTHORITY.KEYID = 7
1,210,281 UART: [ldev] FE.KEYID = 1
1,215,377 UART: [ldev] Erasing FE.KEYID = 1
1,241,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,267 UART: [ldev] --
1,280,486 UART: [fwproc] Wait for Commands...
1,281,271 UART: [fwproc] Recv command 0x46574c44
1,282,004 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,772 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,947 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,348 >>> mbox cmd response: success
2,825,348 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,826,434 UART: [afmc] ++
2,826,602 UART: [afmc] CDI.KEYID = 6
2,826,965 UART: [afmc] SUBJECT.KEYID = 7
2,827,391 UART: [afmc] AUTHORITY.KEYID = 5
2,862,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,772 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,482 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,363 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,064 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,955 UART: [afmc] --
2,905,884 UART: [cold-reset] --
2,906,902 UART: [state] Locking Datavault
2,907,731 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,335 UART: [state] Locking ICCM
2,908,981 UART: [exit] Launching FMC @ 0x40000130
2,914,311 UART:
2,914,327 UART: Running Caliptra FMC ...
2,914,735 UART:
2,914,878 UART: [state] CFI Enabled
2,925,482 UART: [fht] FMC Alias Private Key: 7
3,044,582 UART: [art] Extend RT PCRs Done
3,045,010 UART: [art] Lock RT PCRs Done
3,046,486 UART: [art] Populate DV Done
3,054,873 UART: [fht] FMC Alias Private Key: 7
3,055,889 UART: [art] Derive CDI
3,056,169 UART: [art] Store in slot 0x4
3,141,706 UART: [art] Derive Key Pair
3,142,066 UART: [art] Store priv key in slot 0x5
3,155,186 UART: [art] Derive Key Pair - Done
3,170,070 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,986 UART: [art] PUB.X = DBF180B61CA47DEE27DC85494069C9050FDDD77335912C57D5EB5C916DC2AFABA2F5A93C2545B0A73641E208704FACDF
3,192,763 UART: [art] PUB.Y = 3D885A620E6A558287B750B42E4B35F4C785A422364DB1E72FA03D30C82FBCA7A896546204CDE036E1C7DB140E1538F6
3,199,706 UART: [art] SIG.R = 676679682C279686085EF636302D14428682B1711B734CB1177CFD69EF60BC40A024B56FBE9A3E6ECEB1CB6119F86635
3,206,469 UART: [art] SIG.S = 67A0B9C9699147061EAF8DB4E1CF7EA375F2A6C8DB40D18081DF1AB78035B53DC2A06F6FF56654E1D31382873C03724B
3,230,501 UART: Caliptra RT
3,230,844 UART: [state] CFI Enabled
3,350,544 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,508 UART: [rt]cmd =0x52435458, len=8
3,382,739 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,049 ready_for_fw is high
1,059,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,153 >>> mbox cmd response: success
2,679,153 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,741,078 UART:
2,741,094 UART: Running Caliptra FMC ...
2,741,502 UART:
2,741,645 UART: [state] CFI Enabled
2,752,429 UART: [fht] FMC Alias Private Key: 7
2,871,735 UART: [art] Extend RT PCRs Done
2,872,163 UART: [art] Lock RT PCRs Done
2,873,623 UART: [art] Populate DV Done
2,881,858 UART: [fht] FMC Alias Private Key: 7
2,882,990 UART: [art] Derive CDI
2,883,270 UART: [art] Store in slot 0x4
2,968,975 UART: [art] Derive Key Pair
2,969,335 UART: [art] Store priv key in slot 0x5
2,983,045 UART: [art] Derive Key Pair - Done
2,997,662 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,072 UART: [art] PUB.X = 99E73526AB8C3D67BF68FA108D0AB5BE488C989E1877FCF1B4CCDBB78069C23DD4AFCCD7DD30E4CCB4BA7A396247BB65
3,020,865 UART: [art] PUB.Y = 07A298C02753E8FC41D9C9C7592F0B30EE030FC9EADDE826831502286B161FE091ABEB9F8C22678825FFC1A2C392CD74
3,027,808 UART: [art] SIG.R = 8DD52D6045B7F560A1B9D9D779693B3AB407C05DC61D89A7F39DB63C0FDF71945E0FD216625ED5F70BF398DA97CBAD4B
3,034,582 UART: [art] SIG.S = BED6D3EEFE7297F8C55EE11FDC5CB826B5F3009576DC70ED3F06EA1A0FFB487E72F95C30EE8E432501B377666E7B7E0E
3,058,950 UART: Caliptra RT
3,059,293 UART: [state] CFI Enabled
3,179,525 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,921 UART: [rt]cmd =0x52435458, len=8
3,210,862 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
893,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,179 UART: [kat] ++
897,331 UART: [kat] sha1
901,627 UART: [kat] SHA2-256
903,567 UART: [kat] SHA2-384
906,262 UART: [kat] SHA2-512-ACC
908,163 UART: [kat] ECC-384
917,656 UART: [kat] HMAC-384Kdf
922,156 UART: [kat] LMS
1,170,484 UART: [kat] --
1,171,567 UART: [cold-reset] ++
1,172,035 UART: [fht] FHT @ 0x50003400
1,174,514 UART: [idev] ++
1,174,682 UART: [idev] CDI.KEYID = 6
1,175,042 UART: [idev] SUBJECT.KEYID = 7
1,175,466 UART: [idev] UDS.KEYID = 0
1,175,811 ready_for_fw is high
1,175,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,438 UART: [idev] Erasing UDS.KEYID = 0
1,199,819 UART: [idev] Sha1 KeyId Algorithm
1,208,079 UART: [idev] --
1,209,085 UART: [ldev] ++
1,209,253 UART: [ldev] CDI.KEYID = 6
1,209,616 UART: [ldev] SUBJECT.KEYID = 5
1,210,042 UART: [ldev] AUTHORITY.KEYID = 7
1,210,505 UART: [ldev] FE.KEYID = 1
1,215,723 UART: [ldev] Erasing FE.KEYID = 1
1,242,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,053 UART: [ldev] --
1,281,532 UART: [fwproc] Wait for Commands...
1,282,206 UART: [fwproc] Recv command 0x46574c44
1,282,934 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,598 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,768 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,099 >>> mbox cmd response: success
2,824,099 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,825,265 UART: [afmc] ++
2,825,433 UART: [afmc] CDI.KEYID = 6
2,825,795 UART: [afmc] SUBJECT.KEYID = 7
2,826,220 UART: [afmc] AUTHORITY.KEYID = 5
2,861,459 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,826 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,574 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,283 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,166 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,867 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,677 UART: [afmc] --
2,904,601 UART: [cold-reset] --
2,905,453 UART: [state] Locking Datavault
2,906,712 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,316 UART: [state] Locking ICCM
2,907,770 UART: [exit] Launching FMC @ 0x40000130
2,913,100 UART:
2,913,116 UART: Running Caliptra FMC ...
2,913,524 UART:
2,913,578 UART: [state] CFI Enabled
2,924,042 UART: [fht] FMC Alias Private Key: 7
3,043,212 UART: [art] Extend RT PCRs Done
3,043,640 UART: [art] Lock RT PCRs Done
3,045,016 UART: [art] Populate DV Done
3,053,457 UART: [fht] FMC Alias Private Key: 7
3,054,479 UART: [art] Derive CDI
3,054,759 UART: [art] Store in slot 0x4
3,140,640 UART: [art] Derive Key Pair
3,141,000 UART: [art] Store priv key in slot 0x5
3,154,170 UART: [art] Derive Key Pair - Done
3,168,897 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,007 UART: [art] PUB.X = EC9157DF2AFB67DFD371D1E18BF825E2A0EBCEE1F8C416A9ACBCFA608A50FD437F4803A90288CF95F1A8B9864782C656
3,191,791 UART: [art] PUB.Y = 09C8E812CFDDCDA59B9EB48046440274DE1F009492D59682EF86B43D6FB711348E5E95572F807DD94AB35BB47FC62F4D
3,198,721 UART: [art] SIG.R = EAB191772613EB4F46A2376DAD6E4C0F497C1F4FAF09F21E40DB6C6DD68D385AEFC7262E3162B7E2F62DE30F53444539
3,205,494 UART: [art] SIG.S = 4325DF0E14B541061B1BFCCD1102027DC55795F6DE2ADC346233C7F554827DD235AA73DE3276B663E1CA9EBA53F21137
3,229,290 UART: Caliptra RT
3,229,541 UART: [state] CFI Enabled
3,349,302 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,586 UART: [rt]cmd =0x52435458, len=8
3,380,495 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,499 ready_for_fw is high
1,059,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,834 >>> mbox cmd response: success
2,679,834 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,741,889 UART:
2,741,905 UART: Running Caliptra FMC ...
2,742,313 UART:
2,742,367 UART: [state] CFI Enabled
2,753,007 UART: [fht] FMC Alias Private Key: 7
2,872,659 UART: [art] Extend RT PCRs Done
2,873,087 UART: [art] Lock RT PCRs Done
2,874,641 UART: [art] Populate DV Done
2,882,718 UART: [fht] FMC Alias Private Key: 7
2,883,880 UART: [art] Derive CDI
2,884,160 UART: [art] Store in slot 0x4
2,969,953 UART: [art] Derive Key Pair
2,970,313 UART: [art] Store priv key in slot 0x5
2,983,373 UART: [art] Derive Key Pair - Done
2,998,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,299 UART: [art] PUB.X = C737C164E2EE5946B20D2C46A28BD1C9CDA1D07EA81F37530A3631868EFE284D563E1F29F1D79E59276D19487D1BB8A5
3,021,069 UART: [art] PUB.Y = ADA10E35A765D0A0E804B97B344A804FDE282A230C013625326350BC4924AF0028F430EB2A8F1F8AAE9A8904D84F9B07
3,027,983 UART: [art] SIG.R = 793777256D509B7662F0A27F226FF0925F80A82ED7E0B4564223A1BAEA90F31D7EAB322206E282B5969DD9422FB9BABE
3,034,754 UART: [art] SIG.S = E55BB06DCD1303555F74EB59A043E50630DB2C3DCECCE99764E109A01F37753FA22C282CA8F40C313C3864CF04FC1189
3,058,385 UART: Caliptra RT
3,058,636 UART: [state] CFI Enabled
3,177,993 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,583 UART: [rt]cmd =0x52435458, len=8
3,209,610 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
902,142 UART: [kat] SHA2-256
904,082 UART: [kat] SHA2-384
906,817 UART: [kat] SHA2-512-ACC
908,718 UART: [kat] ECC-384
918,183 UART: [kat] HMAC-384Kdf
922,659 UART: [kat] LMS
1,170,987 UART: [kat] --
1,171,834 UART: [cold-reset] ++
1,172,312 UART: [fht] FHT @ 0x50003400
1,175,101 UART: [idev] ++
1,175,269 UART: [idev] CDI.KEYID = 6
1,175,629 UART: [idev] SUBJECT.KEYID = 7
1,176,053 UART: [idev] UDS.KEYID = 0
1,176,398 ready_for_fw is high
1,176,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,803 UART: [idev] Erasing UDS.KEYID = 0
1,201,176 UART: [idev] Sha1 KeyId Algorithm
1,209,688 UART: [idev] --
1,210,530 UART: [ldev] ++
1,210,698 UART: [ldev] CDI.KEYID = 6
1,211,061 UART: [ldev] SUBJECT.KEYID = 5
1,211,487 UART: [ldev] AUTHORITY.KEYID = 7
1,211,950 UART: [ldev] FE.KEYID = 1
1,216,806 UART: [ldev] Erasing FE.KEYID = 1
1,243,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,574 UART: [ldev] --
1,282,933 UART: [fwproc] Wait for Commands...
1,283,647 UART: [fwproc] Recv command 0x46574c44
1,284,375 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,809 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,979 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,368 >>> mbox cmd response: success
2,827,368 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,828,580 UART: [afmc] ++
2,828,748 UART: [afmc] CDI.KEYID = 6
2,829,110 UART: [afmc] SUBJECT.KEYID = 7
2,829,535 UART: [afmc] AUTHORITY.KEYID = 5
2,865,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,689 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,398 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,281 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,982 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,706 UART: [afmc] --
2,908,784 UART: [cold-reset] --
2,909,766 UART: [state] Locking Datavault
2,910,673 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,277 UART: [state] Locking ICCM
2,911,715 UART: [exit] Launching FMC @ 0x40000130
2,917,045 UART:
2,917,061 UART: Running Caliptra FMC ...
2,917,469 UART:
2,917,612 UART: [state] CFI Enabled
2,928,478 UART: [fht] FMC Alias Private Key: 7
3,047,396 UART: [art] Extend RT PCRs Done
3,047,824 UART: [art] Lock RT PCRs Done
3,049,390 UART: [art] Populate DV Done
3,057,423 UART: [fht] FMC Alias Private Key: 7
3,058,469 UART: [art] Derive CDI
3,058,749 UART: [art] Store in slot 0x4
3,144,832 UART: [art] Derive Key Pair
3,145,192 UART: [art] Store priv key in slot 0x5
3,158,558 UART: [art] Derive Key Pair - Done
3,173,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,150 UART: [art] PUB.X = 0DDA1F4DA2B8A9571A9226D82DE60CBC390DF66B7923C62799AA2840390FA27CCB141F30637506815B8B32BA2A326D61
3,195,909 UART: [art] PUB.Y = 8E6130CD1AA5B7630E39FA148449BB6FB5F9A9FB123224F4B655A0731DBBCB5C63AEB64063182A2545E48776FCD53D01
3,202,861 UART: [art] SIG.R = 0AC438173237739CD2008EBB84061E883A1244323E0DEF4B0BE423E3682275CCE0D17DB1615416E1D893247C81E1A031
3,209,591 UART: [art] SIG.S = C4E30C5232920A33C83796AF9378A8743DCF43729DDDCFB4D1ED011F04E89FC0D82646EB878DFD838F509CF4BDEC4963
3,233,407 UART: Caliptra RT
3,233,750 UART: [state] CFI Enabled
3,353,857 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,445 UART: [rt]cmd =0x52435458, len=8
3,385,540 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,246 ready_for_fw is high
1,061,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,369 >>> mbox cmd response: success
2,679,369 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,741,206 UART:
2,741,222 UART: Running Caliptra FMC ...
2,741,630 UART:
2,741,773 UART: [state] CFI Enabled
2,752,145 UART: [fht] FMC Alias Private Key: 7
2,870,801 UART: [art] Extend RT PCRs Done
2,871,229 UART: [art] Lock RT PCRs Done
2,872,587 UART: [art] Populate DV Done
2,880,490 UART: [fht] FMC Alias Private Key: 7
2,881,608 UART: [art] Derive CDI
2,881,888 UART: [art] Store in slot 0x4
2,967,567 UART: [art] Derive Key Pair
2,967,927 UART: [art] Store priv key in slot 0x5
2,981,843 UART: [art] Derive Key Pair - Done
2,996,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,569 UART: [art] PUB.X = 6D2C45E6848A3B9425658858082A0AE0F9A9B1E0F5397A4D09EF8471DDC870BC9364421AED87C8754F7C56EC7C85706E
3,019,332 UART: [art] PUB.Y = D7AD526BFEDE5A4E5B7B7D779A879CE33A857384B3C2F39B65AF86FF739C308C54411355593B65339511E9632233EE39
3,026,282 UART: [art] SIG.R = 5599794BEADAE2A7674C6D94EF632DA51227E712BB1EA9A71F3BEA8E010E59AC571ACE7A966B92B9FA04736E0FA89F41
3,033,056 UART: [art] SIG.S = 46168D61FC83C490A2B276ACA6995128BBC974F3516203557546BC12226FF11125C75E0D466299AAD735D8794521A45E
3,056,392 UART: Caliptra RT
3,056,735 UART: [state] CFI Enabled
3,175,855 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,499 UART: [rt]cmd =0x52435458, len=8
3,207,474 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,074 UART:
192,453 UART: Running Caliptra ROM ...
193,635 UART:
193,786 UART: [state] CFI Enabled
266,167 UART: [state] LifecycleState = Unprovisioned
268,090 UART: [state] DebugLocked = No
269,492 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,885 UART: [kat] SHA2-256
443,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,115 UART: [kat] ++
454,650 UART: [kat] sha1
466,553 UART: [kat] SHA2-256
469,197 UART: [kat] SHA2-384
475,767 UART: [kat] SHA2-512-ACC
478,134 UART: [kat] ECC-384
2,768,874 UART: [kat] HMAC-384Kdf
2,800,383 UART: [kat] LMS
3,990,691 UART: [kat] --
3,994,678 UART: [cold-reset] ++
3,996,832 UART: [fht] Storing FHT @ 0x50003400
4,007,597 UART: [idev] ++
4,008,177 UART: [idev] CDI.KEYID = 6
4,009,109 UART: [idev] SUBJECT.KEYID = 7
4,010,360 UART: [idev] UDS.KEYID = 0
4,011,451 ready_for_fw is high
4,011,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,822 UART: [idev] Erasing UDS.KEYID = 0
7,348,507 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,538 UART: [idev] --
7,375,157 UART: [ldev] ++
7,375,727 UART: [ldev] CDI.KEYID = 6
7,376,664 UART: [ldev] SUBJECT.KEYID = 5
7,377,875 UART: [ldev] AUTHORITY.KEYID = 7
7,379,163 UART: [ldev] FE.KEYID = 1
7,424,358 UART: [ldev] Erasing FE.KEYID = 1
10,756,186 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,597 UART: [ldev] --
13,116,069 UART: [fwproc] Waiting for Commands...
13,118,169 UART: [fwproc] Received command 0x46574c44
13,120,355 UART: [fwproc] Received Image of size 118548 bytes
17,221,808 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,298,011 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,371,191 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,699,425 >>> mbox cmd response: success
17,700,874 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,703,344 UART: [afmc] ++
17,703,982 UART: [afmc] CDI.KEYID = 6
17,704,893 UART: [afmc] SUBJECT.KEYID = 7
17,706,110 UART: [afmc] AUTHORITY.KEYID = 5
21,070,177 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,586 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,859 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,258 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,015 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,394 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,441,173 UART: [afmc] --
23,444,794 UART: [cold-reset] --
23,448,449 UART: [state] Locking Datavault
23,452,669 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,369 UART: [state] Locking ICCM
23,457,065 UART: [exit] Launching FMC @ 0x40000130
23,465,467 UART:
23,465,706 UART: Running Caliptra FMC ...
23,466,805 UART:
23,466,967 UART: [state] CFI Enabled
23,524,324 UART: [fht] FMC Alias Private Key: 7
25,864,728 UART: [art] Extend RT PCRs Done
25,865,943 UART: [art] Lock RT PCRs Done
25,867,402 UART: [art] Populate DV Done
25,872,655 UART: [fht] FMC Alias Private Key: 7
25,874,241 UART: [art] Derive CDI
25,875,049 UART: [art] Store in slot 0x4
25,932,691 UART: [art] Derive Key Pair
25,933,730 UART: [art] Store priv key in slot 0x5
29,226,763 UART: [art] Derive Key Pair - Done
29,239,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,528,597 UART: [art] Erasing AUTHORITY.KEYID = 7
31,530,115 UART: [art] PUB.X = E058DFB836101FE6B2762FBEDECAF43FA0AE7C7F7AC4E91C70DFE71F8F974A1B2828FCA329C62343C6C87B55A488B987
31,537,381 UART: [art] PUB.Y = F852FF37DB3242340B51C98E5033F5DC02C5E90C7E75C74D22E6819068E196B9AC1E84F95D8E813D66C4430C1EC874A4
31,544,636 UART: [art] SIG.R = 7F51E0C3C9560522B8A97F24BE0448FC8B6BBDEF963559E57B739DA99F4D0BAF7266AC7214C63033F4A41AFDFD4CC7A9
31,552,048 UART: [art] SIG.S = 5492A65F82B0D9A310FDD8F428E488092523B554E459B455766DCCDA77C0F58AB85BE120F98B24EDD09D21640B12A1B2
32,857,164 UART: Caliptra RT
32,857,882 UART: [state] CFI Enabled
33,034,848 UART: [rt] RT listening for mailbox commands...
33,066,274 UART: [rt]cmd =0x52435458, len=8
33,067,569 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,785,149 ready_for_fw is high
3,785,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,926,339 >>> mbox cmd response: success
17,927,947 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,624,406 UART:
23,624,797 UART: Running Caliptra FMC ...
23,625,908 UART:
23,626,059 UART: [state] CFI Enabled
23,690,808 UART: [fht] FMC Alias Private Key: 7
26,030,995 UART: [art] Extend RT PCRs Done
26,032,220 UART: [art] Lock RT PCRs Done
26,033,932 UART: [art] Populate DV Done
26,039,686 UART: [fht] FMC Alias Private Key: 7
26,041,149 UART: [art] Derive CDI
26,041,890 UART: [art] Store in slot 0x4
26,100,044 UART: [art] Derive Key Pair
26,101,087 UART: [art] Store priv key in slot 0x5
29,393,843 UART: [art] Derive Key Pair - Done
29,406,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,695,122 UART: [art] Erasing AUTHORITY.KEYID = 7
31,696,623 UART: [art] PUB.X = C31FE3FF5E4193A0E3D8581AB8CD8E61BD9AFD253E2A65C1983F8C17FD03E67EA5F29BAFB7EDBDA1C4DCE725D18B0758
31,703,936 UART: [art] PUB.Y = 2D5E2CDC15D170DC1F47A191536E14CC3C3A433C9696D372E92864F141FAEDE3EB7513F3C20A86EED88326234F33B902
31,711,200 UART: [art] SIG.R = 5868CD34B9887E0AAEC60052F09601FBE5807BD25B362FC384A563BEE038FC495C2072404661CF63925D138C4FBBB996
31,718,546 UART: [art] SIG.S = 6DEBA21F3A84A23FE1BAC8A0A8B0F3805E40A2FB181CC202BF3F9F68476CF5EA7A111D38E3D634E04F78B42734000A16
33,023,032 UART: Caliptra RT
33,023,751 UART: [state] CFI Enabled
33,200,093 UART: [rt] RT listening for mailbox commands...
33,231,578 UART: [rt]cmd =0x52435458, len=8
33,232,926 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,490 UART:
192,850 UART: Running Caliptra ROM ...
194,048 UART:
603,801 UART: [state] CFI Enabled
618,046 UART: [state] LifecycleState = Unprovisioned
620,002 UART: [state] DebugLocked = No
622,099 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,666 UART: [kat] SHA2-256
796,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,955 UART: [kat] ++
807,397 UART: [kat] sha1
817,627 UART: [kat] SHA2-256
820,286 UART: [kat] SHA2-384
827,192 UART: [kat] SHA2-512-ACC
829,552 UART: [kat] ECC-384
3,112,049 UART: [kat] HMAC-384Kdf
3,124,494 UART: [kat] LMS
4,314,538 UART: [kat] --
4,318,908 UART: [cold-reset] ++
4,321,550 UART: [fht] Storing FHT @ 0x50003400
4,332,816 UART: [idev] ++
4,333,374 UART: [idev] CDI.KEYID = 6
4,334,397 UART: [idev] SUBJECT.KEYID = 7
4,335,562 UART: [idev] UDS.KEYID = 0
4,336,596 ready_for_fw is high
4,336,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,646 UART: [idev] Erasing UDS.KEYID = 0
7,624,050 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,537 UART: [idev] --
7,650,637 UART: [ldev] ++
7,651,204 UART: [ldev] CDI.KEYID = 6
7,652,133 UART: [ldev] SUBJECT.KEYID = 5
7,653,390 UART: [ldev] AUTHORITY.KEYID = 7
7,654,534 UART: [ldev] FE.KEYID = 1
7,666,184 UART: [ldev] Erasing FE.KEYID = 1
10,955,512 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,631 UART: [ldev] --
13,316,156 UART: [fwproc] Waiting for Commands...
13,319,447 UART: [fwproc] Received command 0x46574c44
13,321,626 UART: [fwproc] Received Image of size 118548 bytes
17,423,927 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,529 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,699 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,888 >>> mbox cmd response: success
17,908,314 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,910,511 UART: [afmc] ++
17,911,097 UART: [afmc] CDI.KEYID = 6
17,912,114 UART: [afmc] SUBJECT.KEYID = 7
17,913,267 UART: [afmc] AUTHORITY.KEYID = 5
21,224,154 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,519,042 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,286 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,717 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,456 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,860 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,989 UART: [afmc] --
23,590,181 UART: [cold-reset] --
23,593,777 UART: [state] Locking Datavault
23,601,027 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,721 UART: [state] Locking ICCM
23,604,082 UART: [exit] Launching FMC @ 0x40000130
23,612,466 UART:
23,612,692 UART: Running Caliptra FMC ...
23,613,786 UART:
23,613,937 UART: [state] CFI Enabled
23,622,139 UART: [fht] FMC Alias Private Key: 7
25,962,287 UART: [art] Extend RT PCRs Done
25,963,506 UART: [art] Lock RT PCRs Done
25,964,915 UART: [art] Populate DV Done
25,970,107 UART: [fht] FMC Alias Private Key: 7
25,971,742 UART: [art] Derive CDI
25,972,501 UART: [art] Store in slot 0x4
26,014,786 UART: [art] Derive Key Pair
26,015,827 UART: [art] Store priv key in slot 0x5
29,257,720 UART: [art] Derive Key Pair - Done
29,271,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,653 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,171 UART: [art] PUB.X = 5A0F89C7ACFCC9B1712714EA252F8E466994BE8DB713CED46706581038F4E14E830CBB2CB967773F2E97A3D982C682F8
31,560,428 UART: [art] PUB.Y = B988D29E3C003B762C3B2F03D38D178ED4F2235E3AA0F9610682B1329558128E25A876B022EC1BF01A114BB0CCE5BA99
31,567,668 UART: [art] SIG.R = E39B44F3794E766CFA4FEC46C9F5EFF7BDBCD16FEED8F9F876827EF04AB327BA4F41C820AD765E73245A340612DB48AB
31,575,062 UART: [art] SIG.S = 245EAAFB15572839789B27CBC9660565636FDC0E2635C4DE5FF911A3F731CBF8FA914886AA7F2AAC183EB5E7F611FCDE
32,879,823 UART: Caliptra RT
32,880,531 UART: [state] CFI Enabled
33,013,634 UART: [rt] RT listening for mailbox commands...
33,045,099 UART: [rt]cmd =0x52435458, len=8
33,046,535 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,455 writing to cptra_bootfsm_go
4,124,235 ready_for_fw is high
4,124,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,146,809 >>> mbox cmd response: success
18,148,563 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,781,838 UART:
23,782,287 UART: Running Caliptra FMC ...
23,783,416 UART:
23,783,576 UART: [state] CFI Enabled
23,791,477 UART: [fht] FMC Alias Private Key: 7
26,131,237 UART: [art] Extend RT PCRs Done
26,132,468 UART: [art] Lock RT PCRs Done
26,134,124 UART: [art] Populate DV Done
26,139,651 UART: [fht] FMC Alias Private Key: 7
26,141,295 UART: [art] Derive CDI
26,142,102 UART: [art] Store in slot 0x4
26,184,839 UART: [art] Derive Key Pair
26,185,885 UART: [art] Store priv key in slot 0x5
29,427,907 UART: [art] Derive Key Pair - Done
29,441,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,721,369 UART: [art] Erasing AUTHORITY.KEYID = 7
31,722,871 UART: [art] PUB.X = E6B8E378F81427FEDFA1355CF7A6655D9DCE2B4207F6DB86EA835BC0DAE10082ED351B0CB20796B63F7C06F494FEF204
31,730,168 UART: [art] PUB.Y = 1F6581194BD67AD81DC93A4687FEE07C9354BA235A10F38F739A9E4A1711438CF53193147C483F1A3E10BD57CD382D46
31,737,369 UART: [art] SIG.R = BA309058FA1E0B27708CC0C04D32D0996138AC233BF4B2E43CF582A6E448AA0EB89205609B175A182E1DEE85C5A40A4C
31,744,760 UART: [art] SIG.S = 1A888CFBA7186B092467B487C2AF32DE7DB705FC3581B12AC65428C1DDF8CF428DA3FA407291D472339214B64C0A9A5B
33,050,367 UART: Caliptra RT
33,051,087 UART: [state] CFI Enabled
33,183,929 UART: [rt] RT listening for mailbox commands...
33,215,179 UART: [rt]cmd =0x52435458, len=8
33,216,558 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,066 UART:
192,428 UART: Running Caliptra ROM ...
193,617 UART:
193,768 UART: [state] CFI Enabled
264,932 UART: [state] LifecycleState = Unprovisioned
266,919 UART: [state] DebugLocked = No
268,617 UART: [state] WD Timer not started. Device not locked for debugging
272,028 UART: [kat] SHA2-256
451,643 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,442 UART: [kat] ++
462,969 UART: [kat] sha1
474,178 UART: [kat] SHA2-256
476,898 UART: [kat] SHA2-384
481,675 UART: [kat] SHA2-512-ACC
484,045 UART: [kat] ECC-384
2,945,389 UART: [kat] HMAC-384Kdf
2,970,406 UART: [kat] LMS
3,446,901 UART: [kat] --
3,450,846 UART: [cold-reset] ++
3,452,136 UART: [fht] FHT @ 0x50003400
3,463,668 UART: [idev] ++
3,464,277 UART: [idev] CDI.KEYID = 6
3,465,161 UART: [idev] SUBJECT.KEYID = 7
3,466,476 UART: [idev] UDS.KEYID = 0
3,467,367 ready_for_fw is high
3,467,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,461 UART: [idev] Erasing UDS.KEYID = 0
5,974,446 UART: [idev] Sha1 KeyId Algorithm
5,997,669 UART: [idev] --
6,002,796 UART: [ldev] ++
6,003,367 UART: [ldev] CDI.KEYID = 6
6,004,308 UART: [ldev] SUBJECT.KEYID = 5
6,005,518 UART: [ldev] AUTHORITY.KEYID = 7
6,006,798 UART: [ldev] FE.KEYID = 1
6,049,240 UART: [ldev] Erasing FE.KEYID = 1
8,555,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,290,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,306,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,322,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,337,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,359,572 UART: [ldev] --
10,364,789 UART: [fwproc] Wait for Commands...
10,366,720 UART: [fwproc] Recv command 0x46574c44
10,368,774 UART: [fwproc] Recv'd Img size: 118548 bytes
13,854,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,932,453 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,005,449 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,333,714 >>> mbox cmd response: success
14,334,880 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,338,116 UART: [afmc] ++
14,338,727 UART: [afmc] CDI.KEYID = 6
14,339,608 UART: [afmc] SUBJECT.KEYID = 7
14,340,875 UART: [afmc] AUTHORITY.KEYID = 5
16,887,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,609,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,611,992 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,627,781 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,643,818 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,659,397 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,683,453 UART: [afmc] --
18,687,860 UART: [cold-reset] --
18,690,368 UART: [state] Locking Datavault
18,696,744 UART: [state] Locking PCR0, PCR1 and PCR31
18,698,437 UART: [state] Locking ICCM
18,700,261 UART: [exit] Launching FMC @ 0x40000130
18,708,704 UART:
18,708,940 UART: Running Caliptra FMC ...
18,710,037 UART:
18,710,194 UART: [state] CFI Enabled
18,765,177 UART: [fht] FMC Alias Private Key: 7
20,531,248 UART: [art] Extend RT PCRs Done
20,532,468 UART: [art] Lock RT PCRs Done
20,534,111 UART: [art] Populate DV Done
20,539,679 UART: [fht] FMC Alias Private Key: 7
20,541,208 UART: [art] Derive CDI
20,541,963 UART: [art] Store in slot 0x4
20,597,193 UART: [art] Derive Key Pair
20,598,233 UART: [art] Store priv key in slot 0x5
23,060,987 UART: [art] Derive Key Pair - Done
23,074,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,786,101 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,602 UART: [art] PUB.X = C2342FEE038444A425895E2897E9F3CDFE75A015A6B27EA06592096C16B2932660A2AF931E635A107B2BB5F694D36CA1
24,794,844 UART: [art] PUB.Y = D7D3B7C01BFB6CFC575381265488766E0B43C4ECAB83CFD04390475F7B10BC24D88316DCFC2F0983025B05B63B07EF36
24,802,126 UART: [art] SIG.R = F43BBD18CDB2023555039151B8FD1B2FD8BE4D7F1056A620B3996F85F2DF23BF5B55E282DE910CC992E62AAEFB8F344E
24,809,521 UART: [art] SIG.S = 63A5FE116583A60FC5A7A7C4898F0B7BDDAD44E1734BA09C98D1B71291E018EA45EBD0A41311E4CC325F3165EDA98110
25,788,284 UART: Caliptra RT
25,788,984 UART: [state] CFI Enabled
25,969,893 UART: [rt] RT listening for mailbox commands...
26,001,410 UART: [rt]cmd =0x52435458, len=8
26,002,858 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,460,945 ready_for_fw is high
3,461,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,232,540 >>> mbox cmd response: success
14,233,789 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,511,863 UART:
18,512,247 UART: Running Caliptra FMC ...
18,513,384 UART:
18,513,537 UART: [state] CFI Enabled
18,578,735 UART: [fht] FMC Alias Private Key: 7
20,344,890 UART: [art] Extend RT PCRs Done
20,346,105 UART: [art] Lock RT PCRs Done
20,347,887 UART: [art] Populate DV Done
20,353,245 UART: [fht] FMC Alias Private Key: 7
20,354,805 UART: [art] Derive CDI
20,355,621 UART: [art] Store in slot 0x4
20,411,193 UART: [art] Derive Key Pair
20,412,256 UART: [art] Store priv key in slot 0x5
22,874,856 UART: [art] Derive Key Pair - Done
22,888,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,600,332 UART: [art] Erasing AUTHORITY.KEYID = 7
24,601,835 UART: [art] PUB.X = 9DE97ABF855012E92B8D0E59C2FBBAD4C7C78CA39B6BA0954C83F948169CE7CE4C80AA5125AF5EDBBEB54AEAADD0B8F7
24,609,140 UART: [art] PUB.Y = 521C65887A7FCC9E02303AD868F85CEA52C09EDB8033935C9A9597D336F414BA8B55B061A8B63623FE54C2ABAF228595
24,616,445 UART: [art] SIG.R = 2F2A9D96C3A868A090FDD38BD7AB18130AAF1C963F68DB13D1AE3BB10DAF36B87C5CECF1DDC495937D62C007204DDA5C
24,623,837 UART: [art] SIG.S = D3685063E9A0C6DD05BB02524077D6C918700BF8A57C14BBE8EB546391A45DBFA814943C52D7DC2EA2D1995AD3BB5B8C
25,602,328 UART: Caliptra RT
25,603,029 UART: [state] CFI Enabled
25,784,025 UART: [rt] RT listening for mailbox commands...
25,815,164 UART: [rt]cmd =0x52435458, len=8
25,816,695 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,265 writing to cptra_bootfsm_go
193,445 UART:
193,804 UART: Running Caliptra ROM ...
194,991 UART:
604,413 UART: [state] CFI Enabled
616,626 UART: [state] LifecycleState = Unprovisioned
618,510 UART: [state] DebugLocked = No
619,904 UART: [state] WD Timer not started. Device not locked for debugging
623,944 UART: [kat] SHA2-256
803,588 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,328 UART: [kat] ++
814,934 UART: [kat] sha1
825,110 UART: [kat] SHA2-256
827,838 UART: [kat] SHA2-384
832,625 UART: [kat] SHA2-512-ACC
834,996 UART: [kat] ECC-384
3,278,196 UART: [kat] HMAC-384Kdf
3,291,926 UART: [kat] LMS
3,768,415 UART: [kat] --
3,773,052 UART: [cold-reset] ++
3,774,919 UART: [fht] FHT @ 0x50003400
3,785,541 UART: [idev] ++
3,786,116 UART: [idev] CDI.KEYID = 6
3,787,152 UART: [idev] SUBJECT.KEYID = 7
3,788,330 UART: [idev] UDS.KEYID = 0
3,789,283 ready_for_fw is high
3,789,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,332 UART: [idev] Erasing UDS.KEYID = 0
6,269,317 UART: [idev] Sha1 KeyId Algorithm
6,294,375 UART: [idev] --
6,298,857 UART: [ldev] ++
6,299,435 UART: [ldev] CDI.KEYID = 6
6,300,347 UART: [ldev] SUBJECT.KEYID = 5
6,301,562 UART: [ldev] AUTHORITY.KEYID = 7
6,302,797 UART: [ldev] FE.KEYID = 1
6,311,611 UART: [ldev] Erasing FE.KEYID = 1
8,788,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,134 UART: [ldev] --
10,583,337 UART: [fwproc] Wait for Commands...
10,585,596 UART: [fwproc] Recv command 0x46574c44
10,587,579 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,685 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,699 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,027 >>> mbox cmd response: success
14,563,421 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,566,002 UART: [afmc] ++
14,566,598 UART: [afmc] CDI.KEYID = 6
14,567,536 UART: [afmc] SUBJECT.KEYID = 7
14,568,748 UART: [afmc] AUTHORITY.KEYID = 5
17,077,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,801,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,804,055 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,819,845 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,835,925 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,851,508 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,876,679 UART: [afmc] --
18,881,351 UART: [cold-reset] --
18,886,817 UART: [state] Locking Datavault
18,893,420 UART: [state] Locking PCR0, PCR1 and PCR31
18,895,175 UART: [state] Locking ICCM
18,897,463 UART: [exit] Launching FMC @ 0x40000130
18,905,914 UART:
18,906,155 UART: Running Caliptra FMC ...
18,907,184 UART:
18,907,332 UART: [state] CFI Enabled
18,915,779 UART: [fht] FMC Alias Private Key: 7
20,682,248 UART: [art] Extend RT PCRs Done
20,683,472 UART: [art] Lock RT PCRs Done
20,685,087 UART: [art] Populate DV Done
20,690,728 UART: [fht] FMC Alias Private Key: 7
20,692,430 UART: [art] Derive CDI
20,693,243 UART: [art] Store in slot 0x4
20,735,677 UART: [art] Derive Key Pair
20,736,719 UART: [art] Store priv key in slot 0x5
23,163,675 UART: [art] Derive Key Pair - Done
23,176,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,883,177 UART: [art] Erasing AUTHORITY.KEYID = 7
24,884,683 UART: [art] PUB.X = 0C50A8DD30652A4B7F5A03EA816CB0883D0F405F68C7C5434D499204E75C2929ADBCB9769836636E62D83BCE49557DDB
24,891,917 UART: [art] PUB.Y = 3D8AA96F9157CDD4F0BAC4DAFC0B55BC09E02D8556320B64AEAE6FD6CB10380D69EB786B419FACF5476AA44682579AAF
24,899,250 UART: [art] SIG.R = B768AFF78E149DD414A4DF45CE0F34486A236C8750DF49BCA18AE947F46AFF14E8FED202F72081C68CFA3EDB169BE283
24,906,695 UART: [art] SIG.S = 30AA9FC0E7711267CFF220078E7DB9D914AC6FDE0C6488DF479E394A6E93DC31D35708F9736556A36FFC96E6766E0B79
25,885,787 UART: Caliptra RT
25,886,501 UART: [state] CFI Enabled
26,019,404 UART: [rt] RT listening for mailbox commands...
26,050,847 UART: [rt]cmd =0x52435458, len=8
26,052,309 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,779,275 ready_for_fw is high
3,779,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,651 >>> mbox cmd response: success
14,444,404 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,690,755 UART:
18,691,156 UART: Running Caliptra FMC ...
18,692,355 UART:
18,692,529 UART: [state] CFI Enabled
18,700,412 UART: [fht] FMC Alias Private Key: 7
20,466,064 UART: [art] Extend RT PCRs Done
20,467,319 UART: [art] Lock RT PCRs Done
20,468,662 UART: [art] Populate DV Done
20,474,033 UART: [fht] FMC Alias Private Key: 7
20,475,745 UART: [art] Derive CDI
20,476,486 UART: [art] Store in slot 0x4
20,519,026 UART: [art] Derive Key Pair
20,520,239 UART: [art] Store priv key in slot 0x5
22,946,463 UART: [art] Derive Key Pair - Done
22,959,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,623 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,132 UART: [art] PUB.X = 9F87D7BA242DE2BF0AC96A6602EBB639B728E716883CA44B9AA48F25AF4F0ECC470F98E29FF1653166FF8C79BF7077DC
24,674,461 UART: [art] PUB.Y = 9611BEF4B949289DD7701C000EFF433D8887F21A0793FEAD183D5C5B61B69DFAE1608ABACB3F6F333CB7CD2D4CAF652C
24,681,697 UART: [art] SIG.R = 39F774F91A9F27FA35DE6F70AA239768567DF816E66E80B9EB1B3121680B0FC0FB3FEA8D59C8FF18FDD849C9379AD6B6
24,689,116 UART: [art] SIG.S = 5874D77BDE4FA66997DCACC3C9F6CFF3DF2D31B76238493DE24AB73BC70EB508584060A6FC303569A12F455CDD35271B
25,667,763 UART: Caliptra RT
25,668,460 UART: [state] CFI Enabled
25,801,366 UART: [rt] RT listening for mailbox commands...
25,832,630 UART: [rt]cmd =0x52435458, len=8
25,834,192 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,013 UART:
192,393 UART: Running Caliptra ROM ...
193,581 UART:
193,735 UART: [state] CFI Enabled
263,068 UART: [state] LifecycleState = Unprovisioned
265,472 UART: [state] DebugLocked = No
266,791 UART: [state] WD Timer not started. Device not locked for debugging
271,674 UART: [kat] SHA2-256
461,500 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,304 UART: [kat] ++
472,780 UART: [kat] sha1
483,456 UART: [kat] SHA2-256
486,426 UART: [kat] SHA2-384
492,140 UART: [kat] SHA2-512-ACC
494,727 UART: [kat] ECC-384
2,952,226 UART: [kat] HMAC-384Kdf
2,972,021 UART: [kat] LMS
3,503,748 UART: [kat] --
3,508,969 UART: [cold-reset] ++
3,510,479 UART: [fht] FHT @ 0x50003400
3,521,448 UART: [idev] ++
3,522,157 UART: [idev] CDI.KEYID = 6
3,523,187 UART: [idev] SUBJECT.KEYID = 7
3,524,427 UART: [idev] UDS.KEYID = 0
3,525,432 ready_for_fw is high
3,525,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,558 UART: [idev] Erasing UDS.KEYID = 0
6,029,704 UART: [idev] Sha1 KeyId Algorithm
6,052,034 UART: [idev] --
6,057,275 UART: [ldev] ++
6,057,960 UART: [ldev] CDI.KEYID = 6
6,058,875 UART: [ldev] SUBJECT.KEYID = 5
6,060,085 UART: [ldev] AUTHORITY.KEYID = 7
6,061,265 UART: [ldev] FE.KEYID = 1
6,101,302 UART: [ldev] Erasing FE.KEYID = 1
8,604,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,364 UART: [ldev] --
10,415,042 UART: [fwproc] Wait for Commands...
10,417,531 UART: [fwproc] Recv command 0x46574c44
10,419,856 UART: [fwproc] Recv'd Img size: 118548 bytes
13,910,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,686 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,109,289 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,669,973 >>> mbox cmd response: success
14,671,433 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,673,373 UART: [afmc] ++
14,674,076 UART: [afmc] CDI.KEYID = 6
14,675,240 UART: [afmc] SUBJECT.KEYID = 7
14,676,779 UART: [afmc] AUTHORITY.KEYID = 5
17,215,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,348 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,480 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,589 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,520 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,107 UART: [afmc] --
19,032,863 UART: [cold-reset] --
19,038,071 UART: [state] Locking Datavault
19,043,316 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,547 UART: [state] Locking ICCM
19,048,119 UART: [exit] Launching FMC @ 0x40000130
19,056,787 UART:
19,057,029 UART: Running Caliptra FMC ...
19,058,060 UART:
19,058,211 UART: [state] CFI Enabled
19,116,862 UART: [fht] FMC Alias Private Key: 7
20,883,193 UART: [art] Extend RT PCRs Done
20,884,544 UART: [art] Lock RT PCRs Done
20,885,765 UART: [art] Populate DV Done
20,891,124 UART: [fht] FMC Alias Private Key: 7
20,892,709 UART: [art] Derive CDI
20,893,463 UART: [art] Store in slot 0x4
20,949,710 UART: [art] Derive Key Pair
20,950,706 UART: [art] Store priv key in slot 0x5
23,413,812 UART: [art] Derive Key Pair - Done
23,426,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,417 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,927 UART: [art] PUB.X = 8914A305F938755458A51711F72BE3D524A747939DECA13BD58CAA40EE7203587F6B0FD1298961C7773708133B2B8EEF
25,147,197 UART: [art] PUB.Y = 4BC38CF0E351789ACB5C8EF8F52A1A1B8AE1076272BEA67AA9E01CE2EB227C375CD40DD51F6D529B21C19AA8CD40C456
25,154,455 UART: [art] SIG.R = B70C0F241A6756807A807DF8C35F259A5FE21EF1C78F227C7071AACE5E910D13B088907CF42124C8593CAE563522C6B1
25,161,876 UART: [art] SIG.S = 587C23C630681805E2756BAA1C7FF261A65FE658CA3AFA6E45A868E459DA69109ECFD671DC22E22B78B5A0E81E1D97A2
26,141,317 UART: Caliptra RT
26,141,999 UART: [state] CFI Enabled
26,322,852 UART: [rt] RT listening for mailbox commands...
26,354,363 UART: [rt]cmd =0x52435458, len=8
26,355,770 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,439,091 ready_for_fw is high
3,439,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,012 >>> mbox cmd response: success
14,827,664 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,108,862 UART:
19,109,252 UART: Running Caliptra FMC ...
19,110,386 UART:
19,110,542 UART: [state] CFI Enabled
19,177,209 UART: [fht] FMC Alias Private Key: 7
20,943,291 UART: [art] Extend RT PCRs Done
20,944,518 UART: [art] Lock RT PCRs Done
20,946,314 UART: [art] Populate DV Done
20,951,729 UART: [fht] FMC Alias Private Key: 7
20,953,265 UART: [art] Derive CDI
20,954,025 UART: [art] Store in slot 0x4
21,009,097 UART: [art] Derive Key Pair
21,010,107 UART: [art] Store priv key in slot 0x5
23,473,211 UART: [art] Derive Key Pair - Done
23,486,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,198,119 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,633 UART: [art] PUB.X = 56DB58C23A814656CAD87B65A23C60AFE1327329BE276903F86D0EDEDAF86F2581D61D4EEEFF78C6A4398F4C86607659
25,206,887 UART: [art] PUB.Y = 0252A86CEC5C3909CCCA2E0B1A96A505B3A49B475E49B2B53AA867CAE2F5B0114CF3652C3FD661790A6E0AF77BD76A55
25,214,137 UART: [art] SIG.R = 8F2BCA9CB86B830C288DB8D1D65AEFEB8129912F211CDC40BC1C001FDC86160111C8ED73BE867814124C8CB74A6939C1
25,221,531 UART: [art] SIG.S = BE555B3EA2321EBB7E97416AB6262F768DC93EBA639BC425C401A5F68547FBDAD81FE5FD84AB557A8523CF403A1DB941
26,200,470 UART: Caliptra RT
26,201,183 UART: [state] CFI Enabled
26,381,493 UART: [rt] RT listening for mailbox commands...
26,412,832 UART: [rt]cmd =0x52435458, len=8
26,414,126 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,537 UART:
192,920 UART: Running Caliptra ROM ...
194,232 UART:
603,812 UART: [state] CFI Enabled
617,555 UART: [state] LifecycleState = Unprovisioned
619,888 UART: [state] DebugLocked = No
622,622 UART: [state] WD Timer not started. Device not locked for debugging
627,532 UART: [kat] SHA2-256
817,423 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,186 UART: [kat] ++
828,796 UART: [kat] sha1
840,813 UART: [kat] SHA2-256
843,826 UART: [kat] SHA2-384
849,320 UART: [kat] SHA2-512-ACC
851,907 UART: [kat] ECC-384
3,292,627 UART: [kat] HMAC-384Kdf
3,306,855 UART: [kat] LMS
3,838,652 UART: [kat] --
3,843,716 UART: [cold-reset] ++
3,845,659 UART: [fht] FHT @ 0x50003400
3,856,243 UART: [idev] ++
3,856,989 UART: [idev] CDI.KEYID = 6
3,857,908 UART: [idev] SUBJECT.KEYID = 7
3,859,087 UART: [idev] UDS.KEYID = 0
3,860,022 ready_for_fw is high
3,860,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,075 UART: [idev] Erasing UDS.KEYID = 0
6,334,195 UART: [idev] Sha1 KeyId Algorithm
6,355,997 UART: [idev] --
6,361,137 UART: [ldev] ++
6,361,821 UART: [ldev] CDI.KEYID = 6
6,362,748 UART: [ldev] SUBJECT.KEYID = 5
6,363,908 UART: [ldev] AUTHORITY.KEYID = 7
6,365,185 UART: [ldev] FE.KEYID = 1
6,375,112 UART: [ldev] Erasing FE.KEYID = 1
8,851,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,450 UART: [ldev] --
10,643,362 UART: [fwproc] Wait for Commands...
10,645,767 UART: [fwproc] Recv command 0x46574c44
10,648,086 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,571 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,199 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,061 >>> mbox cmd response: success
14,908,524 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,910,289 UART: [afmc] ++
14,910,991 UART: [afmc] CDI.KEYID = 6
14,912,186 UART: [afmc] SUBJECT.KEYID = 7
14,913,677 UART: [afmc] AUTHORITY.KEYID = 5
17,414,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,135,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,137,962 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,153,010 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,168,152 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,183,059 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,205,802 UART: [afmc] --
19,208,961 UART: [cold-reset] --
19,212,834 UART: [state] Locking Datavault
19,219,065 UART: [state] Locking PCR0, PCR1 and PCR31
19,221,214 UART: [state] Locking ICCM
19,223,640 UART: [exit] Launching FMC @ 0x40000130
19,232,322 UART:
19,232,559 UART: Running Caliptra FMC ...
19,233,663 UART:
19,233,830 UART: [state] CFI Enabled
19,241,769 UART: [fht] FMC Alias Private Key: 7
21,007,507 UART: [art] Extend RT PCRs Done
21,008,743 UART: [art] Lock RT PCRs Done
21,010,575 UART: [art] Populate DV Done
21,015,831 UART: [fht] FMC Alias Private Key: 7
21,017,481 UART: [art] Derive CDI
21,018,225 UART: [art] Store in slot 0x4
21,060,871 UART: [art] Derive Key Pair
21,061,915 UART: [art] Store priv key in slot 0x5
23,488,859 UART: [art] Derive Key Pair - Done
23,502,135 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,208,313 UART: [art] Erasing AUTHORITY.KEYID = 7
25,209,818 UART: [art] PUB.X = 2F1AD7C15DC9E5EFCA183AF9A34B276EC774A71512EC61892BB34CB1B3199A0D6EFFF7878ED8D9766D3105DA1989D626
25,217,137 UART: [art] PUB.Y = 1BA49F0C9EDEA63E2847F970D5D8C5E9908314626E6A4D729193F480742C35610407FD8132797104A5E2D56AE6F15F1B
25,224,340 UART: [art] SIG.R = CBAF066CB1A81BE36CBDE3DE70DED702F9A88A319B633C357D9A0E8520B1FD6215C50D3C2927400ED734454139529093
25,231,701 UART: [art] SIG.S = EB65564018941E8413F926229537F14D8E971EB5591605EB7EA65A3799F3D84DE0F3A902DF10BDB0FC34BC833F6BFAF5
26,210,769 UART: Caliptra RT
26,211,478 UART: [state] CFI Enabled
26,344,376 UART: [rt] RT listening for mailbox commands...
26,375,845 UART: [rt]cmd =0x52435458, len=8
26,377,198 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,752,156 ready_for_fw is high
3,752,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,028 >>> mbox cmd response: success
15,049,076 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,304,576 UART:
19,305,136 UART: Running Caliptra FMC ...
19,306,271 UART:
19,306,432 UART: [state] CFI Enabled
19,313,960 UART: [fht] FMC Alias Private Key: 7
21,079,916 UART: [art] Extend RT PCRs Done
21,081,175 UART: [art] Lock RT PCRs Done
21,082,855 UART: [art] Populate DV Done
21,088,626 UART: [fht] FMC Alias Private Key: 7
21,090,176 UART: [art] Derive CDI
21,090,920 UART: [art] Store in slot 0x4
21,133,574 UART: [art] Derive Key Pair
21,134,578 UART: [art] Store priv key in slot 0x5
23,561,758 UART: [art] Derive Key Pair - Done
23,574,610 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,092 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,623 UART: [art] PUB.X = 497FD0F3F8276C3FAA427170BF60518947F9D0AE8713B162662B346C129238552B0349EE271164EBE08042A8B315AD66
25,289,864 UART: [art] PUB.Y = 1B53A7B7922DF28A909BA5FA5EB55F78EC1CB8C2A246B745CEB35589EAB54D1DC83711914B23C229E723F6975B6DA1DC
25,297,066 UART: [art] SIG.R = FFA8C8B26283AE7CB0E7FBD0F9F60F370AC0B1B55B80DFF2F85CE1E07490D88899C99AD03E95F0F621BA60AB8546B9FB
25,304,693 UART: [art] SIG.S = E8E5059FAF850BADC45D29FA88B4DB1288112EF478B350DCB91E0169CA806AEC845F860C4540D0ECA2143BBD4594EE32
26,283,353 UART: Caliptra RT
26,284,062 UART: [state] CFI Enabled
26,416,132 UART: [rt] RT listening for mailbox commands...
26,447,371 UART: [rt]cmd =0x52435458, len=8
26,448,686 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,197 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,787 UART: [kat] SHA2-256
881,718 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,833 UART: [kat] ++
885,985 UART: [kat] sha1
890,119 UART: [kat] SHA2-256
892,057 UART: [kat] SHA2-384
894,644 UART: [kat] SHA2-512-ACC
896,545 UART: [kat] ECC-384
901,896 UART: [kat] HMAC-384Kdf
906,510 UART: [kat] LMS
1,474,706 UART: [kat] --
1,475,609 UART: [cold-reset] ++
1,476,027 UART: [fht] Storing FHT @ 0x50003400
1,478,862 UART: [idev] ++
1,479,030 UART: [idev] CDI.KEYID = 6
1,479,390 UART: [idev] SUBJECT.KEYID = 7
1,479,814 UART: [idev] UDS.KEYID = 0
1,480,159 ready_for_fw is high
1,480,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,046 UART: [idev] Erasing UDS.KEYID = 0
1,504,590 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,262 UART: [idev] --
1,514,391 UART: [ldev] ++
1,514,559 UART: [ldev] CDI.KEYID = 6
1,514,922 UART: [ldev] SUBJECT.KEYID = 5
1,515,348 UART: [ldev] AUTHORITY.KEYID = 7
1,515,811 UART: [ldev] FE.KEYID = 1
1,520,665 UART: [ldev] Erasing FE.KEYID = 1
1,545,796 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,808 UART: [ldev] --
1,585,167 UART: [fwproc] Waiting for Commands...
1,585,882 UART: [fwproc] Received command 0x46574c44
1,586,673 UART: [fwproc] Received Image of size 118548 bytes
2,932,492 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,550 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,768 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,117 >>> mbox cmd response: success
3,131,117 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,359 UART: [afmc] ++
3,132,527 UART: [afmc] CDI.KEYID = 6
3,132,889 UART: [afmc] SUBJECT.KEYID = 7
3,133,314 UART: [afmc] AUTHORITY.KEYID = 5
3,168,509 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,735 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,515 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,224 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,107 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,790 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,588 UART: [afmc] --
3,211,720 UART: [cold-reset] --
3,212,318 UART: [state] Locking Datavault
3,213,419 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,023 UART: [state] Locking ICCM
3,214,525 UART: [exit] Launching FMC @ 0x40000130
3,219,855 UART:
3,219,871 UART: Running Caliptra FMC ...
3,220,279 UART:
3,220,333 UART: [state] CFI Enabled
3,230,841 UART: [fht] FMC Alias Private Key: 7
3,350,035 UART: [art] Extend RT PCRs Done
3,350,463 UART: [art] Lock RT PCRs Done
3,352,049 UART: [art] Populate DV Done
3,360,140 UART: [fht] FMC Alias Private Key: 7
3,361,138 UART: [art] Derive CDI
3,361,418 UART: [art] Store in slot 0x4
3,447,312 UART: [art] Derive Key Pair
3,447,672 UART: [art] Store priv key in slot 0x5
3,461,219 UART: [art] Derive Key Pair - Done
3,476,029 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,823 UART: [art] PUB.X = B91348DBAEA29F3A7CDF7E0C4B321E8809AC57D7B5228378C60179A90B44657F621AFBD350F6A0F80AF91DCDFC5D244F
3,498,594 UART: [art] PUB.Y = DECC7CB293A2C1DD6DDC7C520560A9DB1FEDEF8F2C848AB40A7058CBD57330F9161D7C9C69FB5E9A269825CD7CA74064
3,505,560 UART: [art] SIG.R = 36CCD0535636C7A0C63BB41C734721185B9C74BFD64DB9D8314C5566B1BDF78D6A175A643FAAC704C7EBE3B90917BC38
3,512,334 UART: [art] SIG.S = AB44FC85E35E345131139F4E80097C4CC381464FCB288500E170888C25BD84014F62A115FCA62D2E35C6E5BD36361D99
3,536,204 UART: Caliptra RT
3,536,455 UART: [state] CFI Enabled
3,657,131 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,701 UART: [rt]cmd =0x52435458, len=8
3,688,629 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,653 ready_for_fw is high
1,362,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,120 >>> mbox cmd response: success
2,979,120 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,039,831 UART:
3,039,847 UART: Running Caliptra FMC ...
3,040,255 UART:
3,040,309 UART: [state] CFI Enabled
3,050,765 UART: [fht] FMC Alias Private Key: 7
3,169,551 UART: [art] Extend RT PCRs Done
3,169,979 UART: [art] Lock RT PCRs Done
3,171,625 UART: [art] Populate DV Done
3,179,842 UART: [fht] FMC Alias Private Key: 7
3,181,000 UART: [art] Derive CDI
3,181,280 UART: [art] Store in slot 0x4
3,266,988 UART: [art] Derive Key Pair
3,267,348 UART: [art] Store priv key in slot 0x5
3,280,635 UART: [art] Derive Key Pair - Done
3,295,335 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,619 UART: [art] PUB.X = 1CE4EA6418ED1457E4A5CDE45D8B324E03D432B4A6C1F0A9E1C8F5FB6FCDCF7FCF0CC38C273F093180339DE1DB3BD5F6
3,318,406 UART: [art] PUB.Y = 50626E1A8E90D48332359A13A5EB355B38B4192ECA4D2F0364EF678C61B1E9CD66C3D8E9D13B23812964A243A873DA16
3,325,353 UART: [art] SIG.R = BA0F60DD518B02A988B098DCEBECA40C406E249EDD6A746D7A2266FA4AD5FD3B281CD3E0648158D9BD16B5C4277AD839
3,332,132 UART: [art] SIG.S = 749339C1DB6141AF182C111ECB17B921B97F7062260EBF1CC38CFCE73CFEF51B718825664DA4A83B062D00650C8D5FA4
3,355,863 UART: Caliptra RT
3,356,114 UART: [state] CFI Enabled
3,475,468 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,505,868 UART: [rt]cmd =0x52435458, len=8
3,506,726 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,029 UART: [state] LifecycleState = Unprovisioned
85,684 UART: [state] DebugLocked = No
86,322 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,050 UART: [kat] SHA2-256
881,981 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,096 UART: [kat] ++
886,248 UART: [kat] sha1
890,480 UART: [kat] SHA2-256
892,418 UART: [kat] SHA2-384
895,171 UART: [kat] SHA2-512-ACC
897,072 UART: [kat] ECC-384
902,973 UART: [kat] HMAC-384Kdf
907,457 UART: [kat] LMS
1,475,653 UART: [kat] --
1,476,386 UART: [cold-reset] ++
1,476,796 UART: [fht] Storing FHT @ 0x50003400
1,479,477 UART: [idev] ++
1,479,645 UART: [idev] CDI.KEYID = 6
1,480,005 UART: [idev] SUBJECT.KEYID = 7
1,480,429 UART: [idev] UDS.KEYID = 0
1,480,774 ready_for_fw is high
1,480,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,233 UART: [idev] Erasing UDS.KEYID = 0
1,504,741 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,423 UART: [idev] --
1,514,490 UART: [ldev] ++
1,514,658 UART: [ldev] CDI.KEYID = 6
1,515,021 UART: [ldev] SUBJECT.KEYID = 5
1,515,447 UART: [ldev] AUTHORITY.KEYID = 7
1,515,910 UART: [ldev] FE.KEYID = 1
1,521,292 UART: [ldev] Erasing FE.KEYID = 1
1,546,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,567 UART: [ldev] --
1,586,004 UART: [fwproc] Waiting for Commands...
1,586,767 UART: [fwproc] Received command 0x46574c44
1,587,558 UART: [fwproc] Received Image of size 118548 bytes
2,932,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,960 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,178 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,587 >>> mbox cmd response: success
3,130,587 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,131,711 UART: [afmc] ++
3,131,879 UART: [afmc] CDI.KEYID = 6
3,132,241 UART: [afmc] SUBJECT.KEYID = 7
3,132,666 UART: [afmc] AUTHORITY.KEYID = 5
3,168,245 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,909 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,689 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,398 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,281 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,964 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,726 UART: [afmc] --
3,211,678 UART: [cold-reset] --
3,212,320 UART: [state] Locking Datavault
3,213,345 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,949 UART: [state] Locking ICCM
3,214,419 UART: [exit] Launching FMC @ 0x40000130
3,219,749 UART:
3,219,765 UART: Running Caliptra FMC ...
3,220,173 UART:
3,220,316 UART: [state] CFI Enabled
3,230,918 UART: [fht] FMC Alias Private Key: 7
3,349,490 UART: [art] Extend RT PCRs Done
3,349,918 UART: [art] Lock RT PCRs Done
3,351,506 UART: [art] Populate DV Done
3,359,407 UART: [fht] FMC Alias Private Key: 7
3,360,427 UART: [art] Derive CDI
3,360,707 UART: [art] Store in slot 0x4
3,446,615 UART: [art] Derive Key Pair
3,446,975 UART: [art] Store priv key in slot 0x5
3,459,720 UART: [art] Derive Key Pair - Done
3,474,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,966 UART: [art] PUB.X = 25BCD2ECEEE91F5BCF98F8D5AE03A3D61CF81E3877B9137824B44F4439B5C0FC62813E5085033A8FBFAB2E2FCEA3F6C3
3,497,752 UART: [art] PUB.Y = B5053D855C9C564E2809255424798164F56B204CCEC8C1CC072B9A69AAE3D1F1B52B6AC7EB51AFB79C4DAC81EC47D64E
3,504,707 UART: [art] SIG.R = CF9CC76A70ED9D2F2DC7570E42371396046370F3A834CF23D609C3056565CEF22CB35ACD552CB3173261AE8E8A2C8847
3,511,469 UART: [art] SIG.S = 14232D6BC9A81F09582B46E58A520808BB9B96F42B7CFB3B92FCD0CDA2C8DA053952371FCF4100226D61668B189051DF
3,534,985 UART: Caliptra RT
3,535,328 UART: [state] CFI Enabled
3,656,230 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,070 UART: [rt]cmd =0x52435458, len=8
3,688,100 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,122 ready_for_fw is high
1,363,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,557 >>> mbox cmd response: success
2,980,557 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,041,890 UART:
3,041,906 UART: Running Caliptra FMC ...
3,042,314 UART:
3,042,457 UART: [state] CFI Enabled
3,053,067 UART: [fht] FMC Alias Private Key: 7
3,171,807 UART: [art] Extend RT PCRs Done
3,172,235 UART: [art] Lock RT PCRs Done
3,173,827 UART: [art] Populate DV Done
3,182,144 UART: [fht] FMC Alias Private Key: 7
3,183,136 UART: [art] Derive CDI
3,183,416 UART: [art] Store in slot 0x4
3,268,988 UART: [art] Derive Key Pair
3,269,348 UART: [art] Store priv key in slot 0x5
3,282,657 UART: [art] Derive Key Pair - Done
3,297,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,169 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,934 UART: [art] PUB.X = 56C5C8111BB600016C7EC0BFEA4661C710A5DA972FC1FDFDEE53F2190C395C3DFE4A59DD109E6E5B36104A8069596659
3,320,686 UART: [art] PUB.Y = F31AA11411E759FD90CB1DC521F8D3B381EC620022557F4B95B6A909EBB2E62EF88389C6ADE8B075C7D096B3D18AC026
3,327,621 UART: [art] SIG.R = F91402FBB05A87440F0B1B3319AAD314E39F4049A681D92A37399B7B82F86B6CF2B273C326BAAC902E1A7417FD35EB7D
3,334,390 UART: [art] SIG.S = 6B7C52709DEF5DD641A141B54575D8C698F3D8DAE12024ED832464204D15B865E249F232AEF60116B38C15E1B6C8AD8E
3,358,249 UART: Caliptra RT
3,358,592 UART: [state] CFI Enabled
3,478,694 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,066 UART: [rt]cmd =0x52435458, len=8
3,509,956 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,700 UART: [state] LifecycleState = Unprovisioned
86,355 UART: [state] DebugLocked = No
86,955 UART: [state] WD Timer not started. Device not locked for debugging
88,122 UART: [kat] SHA2-256
891,672 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,776 UART: [kat] ++
895,928 UART: [kat] sha1
900,306 UART: [kat] SHA2-256
902,246 UART: [kat] SHA2-384
904,935 UART: [kat] SHA2-512-ACC
906,836 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
920,833 UART: [kat] LMS
1,169,145 UART: [kat] --
1,170,258 UART: [cold-reset] ++
1,170,638 UART: [fht] FHT @ 0x50003400
1,173,256 UART: [idev] ++
1,173,424 UART: [idev] CDI.KEYID = 6
1,173,785 UART: [idev] SUBJECT.KEYID = 7
1,174,210 UART: [idev] UDS.KEYID = 0
1,174,556 ready_for_fw is high
1,174,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,037 UART: [idev] Erasing UDS.KEYID = 0
1,199,029 UART: [idev] Sha1 KeyId Algorithm
1,207,773 UART: [idev] --
1,208,612 UART: [ldev] ++
1,208,780 UART: [ldev] CDI.KEYID = 6
1,209,144 UART: [ldev] SUBJECT.KEYID = 5
1,209,571 UART: [ldev] AUTHORITY.KEYID = 7
1,210,034 UART: [ldev] FE.KEYID = 1
1,215,346 UART: [ldev] Erasing FE.KEYID = 1
1,242,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,134 UART: [ldev] --
1,281,415 UART: [fwproc] Wait for Commands...
1,281,988 UART: [fwproc] Recv command 0x46574c44
1,282,721 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,272 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,503 >>> mbox cmd response: success
2,825,503 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,826,711 UART: [afmc] ++
2,826,879 UART: [afmc] CDI.KEYID = 6
2,827,242 UART: [afmc] SUBJECT.KEYID = 7
2,827,668 UART: [afmc] AUTHORITY.KEYID = 5
2,862,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,508 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,257 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,967 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,848 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,549 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,418 UART: [afmc] --
2,906,325 UART: [cold-reset] --
2,907,249 UART: [state] Locking Datavault
2,908,530 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,134 UART: [state] Locking ICCM
2,909,562 UART: [exit] Launching FMC @ 0x40000130
2,914,892 UART:
2,914,908 UART: Running Caliptra FMC ...
2,915,316 UART:
2,915,370 UART: [state] CFI Enabled
2,925,828 UART: [fht] FMC Alias Private Key: 7
3,043,836 UART: [art] Extend RT PCRs Done
3,044,264 UART: [art] Lock RT PCRs Done
3,045,758 UART: [art] Populate DV Done
3,054,269 UART: [fht] FMC Alias Private Key: 7
3,055,269 UART: [art] Derive CDI
3,055,549 UART: [art] Store in slot 0x4
3,141,234 UART: [art] Derive Key Pair
3,141,594 UART: [art] Store priv key in slot 0x5
3,154,856 UART: [art] Derive Key Pair - Done
3,169,450 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,957 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,722 UART: [art] PUB.X = EF8CD90E79F883C91630138A143A32A8E7366AECEE8CF22C6AB5CA09DBFBC624895E8BE25F0FDF7EA5F1C2AADE3FE860
3,192,511 UART: [art] PUB.Y = 60D7DBE5C79622BC0F8EE5D3229B39CB08864F6158A092E688C207A3860563045181BD871B62382FE548C10AF7D55823
3,199,437 UART: [art] SIG.R = EB31FD2B46B2F00EE4F8C029F8A019C8445EBED822ACC9DEC0D5AD44BEE819608BB6CE4275C06903ECE81291DB8F26EE
3,206,225 UART: [art] SIG.S = 2577FCD1811233B78A4D20512D9506C6028C00A875C5FFAEC5DFEBF7FAD0D7F580358D62F60A8FEDFE8FC1506B50B0DA
3,230,382 UART: Caliptra RT
3,230,633 UART: [state] CFI Enabled
3,351,468 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,008 UART: [rt]cmd =0x52435458, len=8
3,383,020 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,990 ready_for_fw is high
1,058,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,466 >>> mbox cmd response: success
2,680,466 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,742,605 UART:
2,742,621 UART: Running Caliptra FMC ...
2,743,029 UART:
2,743,083 UART: [state] CFI Enabled
2,753,191 UART: [fht] FMC Alias Private Key: 7
2,871,481 UART: [art] Extend RT PCRs Done
2,871,909 UART: [art] Lock RT PCRs Done
2,873,561 UART: [art] Populate DV Done
2,881,742 UART: [fht] FMC Alias Private Key: 7
2,882,740 UART: [art] Derive CDI
2,883,020 UART: [art] Store in slot 0x4
2,968,467 UART: [art] Derive Key Pair
2,968,827 UART: [art] Store priv key in slot 0x5
2,981,821 UART: [art] Derive Key Pair - Done
2,996,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,105 UART: [art] PUB.X = E10497CABEBACF33A9BCD0227AF83E35817E30499D5429A90CBB076B97CC14883A3C83657C9D4607FD3557CC95DAD400
3,019,851 UART: [art] PUB.Y = 3C20CEB99FA7B85DA70D2E57599D96AC6E106F74472C4FAF66758CB866BE6E73C185AA70C96ABEAB380F8D8962C8CFD9
3,026,813 UART: [art] SIG.R = 2A0FEA3CB31C0800A2FDB2608E92AD7982C6BF37CCCF43AFAB1A5FA6BCA55ACFD21625B8B42A9E342E9CC0C3319B3D1C
3,033,585 UART: [art] SIG.S = 2084F50030474415EB53182CC44291663E213EA54544FA56E501AD20B3E5D651DD28353A2319E1ACF2D7B472185EDDCF
3,056,730 UART: Caliptra RT
3,056,981 UART: [state] CFI Enabled
3,176,779 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,911 UART: [rt]cmd =0x52435458, len=8
3,208,151 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
86,992 UART: [state] WD Timer not started. Device not locked for debugging
88,289 UART: [kat] SHA2-256
891,839 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,943 UART: [kat] ++
896,095 UART: [kat] sha1
900,547 UART: [kat] SHA2-256
902,487 UART: [kat] SHA2-384
905,378 UART: [kat] SHA2-512-ACC
907,279 UART: [kat] ECC-384
917,284 UART: [kat] HMAC-384Kdf
921,948 UART: [kat] LMS
1,170,260 UART: [kat] --
1,171,221 UART: [cold-reset] ++
1,171,567 UART: [fht] FHT @ 0x50003400
1,174,205 UART: [idev] ++
1,174,373 UART: [idev] CDI.KEYID = 6
1,174,734 UART: [idev] SUBJECT.KEYID = 7
1,175,159 UART: [idev] UDS.KEYID = 0
1,175,505 ready_for_fw is high
1,175,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,286 UART: [idev] Erasing UDS.KEYID = 0
1,199,894 UART: [idev] Sha1 KeyId Algorithm
1,208,976 UART: [idev] --
1,210,031 UART: [ldev] ++
1,210,199 UART: [ldev] CDI.KEYID = 6
1,210,563 UART: [ldev] SUBJECT.KEYID = 5
1,210,990 UART: [ldev] AUTHORITY.KEYID = 7
1,211,453 UART: [ldev] FE.KEYID = 1
1,216,765 UART: [ldev] Erasing FE.KEYID = 1
1,243,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,467 UART: [ldev] --
1,282,746 UART: [fwproc] Wait for Commands...
1,283,491 UART: [fwproc] Recv command 0x46574c44
1,284,224 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,738 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,913 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,208 >>> mbox cmd response: success
2,828,208 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,829,290 UART: [afmc] ++
2,829,458 UART: [afmc] CDI.KEYID = 6
2,829,821 UART: [afmc] SUBJECT.KEYID = 7
2,830,247 UART: [afmc] AUTHORITY.KEYID = 5
2,865,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,481 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,230 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,940 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,821 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,522 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,099 UART: [afmc] --
2,909,074 UART: [cold-reset] --
2,909,864 UART: [state] Locking Datavault
2,911,249 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,853 UART: [state] Locking ICCM
2,912,517 UART: [exit] Launching FMC @ 0x40000130
2,917,847 UART:
2,917,863 UART: Running Caliptra FMC ...
2,918,271 UART:
2,918,414 UART: [state] CFI Enabled
2,929,064 UART: [fht] FMC Alias Private Key: 7
3,047,886 UART: [art] Extend RT PCRs Done
3,048,314 UART: [art] Lock RT PCRs Done
3,050,306 UART: [art] Populate DV Done
3,058,531 UART: [fht] FMC Alias Private Key: 7
3,059,611 UART: [art] Derive CDI
3,059,891 UART: [art] Store in slot 0x4
3,145,670 UART: [art] Derive Key Pair
3,146,030 UART: [art] Store priv key in slot 0x5
3,159,344 UART: [art] Derive Key Pair - Done
3,173,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,601 UART: [art] PUB.X = A3403D4F80662569A4F6BD732BA00854E542CD42D844F61E5AC1399033556EDD3C60A4AFF7044F370FCA1DA33B6BC56A
3,197,370 UART: [art] PUB.Y = 70106DC7D98486C4C27E21DA4D7882B4164EB33B3D1E0F533B246B70C437D46E241D02C1305F5C3487292E80BCF9AD9C
3,204,316 UART: [art] SIG.R = 54399BE524C7AB7D968D23DD107EAC50B0EA2CD72B787C4388892C77522FCEC0697D1C535D86F7F91444AF9297887ECA
3,211,092 UART: [art] SIG.S = 493A6C4343BF1E406F840A21FF460F4E8F0206CDB00CDECC35CEF0D0CF80C5193B888F936D48C0F73998FEB04B02BB89
3,235,148 UART: Caliptra RT
3,235,491 UART: [state] CFI Enabled
3,355,813 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,445 UART: [rt]cmd =0x52435458, len=8
3,387,295 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,995 ready_for_fw is high
1,059,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,847 >>> mbox cmd response: success
2,680,847 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,742,748 UART:
2,742,764 UART: Running Caliptra FMC ...
2,743,172 UART:
2,743,315 UART: [state] CFI Enabled
2,753,995 UART: [fht] FMC Alias Private Key: 7
2,872,741 UART: [art] Extend RT PCRs Done
2,873,169 UART: [art] Lock RT PCRs Done
2,874,503 UART: [art] Populate DV Done
2,882,606 UART: [fht] FMC Alias Private Key: 7
2,883,712 UART: [art] Derive CDI
2,883,992 UART: [art] Store in slot 0x4
2,969,881 UART: [art] Derive Key Pair
2,970,241 UART: [art] Store priv key in slot 0x5
2,983,951 UART: [art] Derive Key Pair - Done
2,999,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,279 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,044 UART: [art] PUB.X = D0772D03621AC4F8EC2EC9D527F5F237EBE0ECAB88E9532DA23B6FC34C7758B5DB48F68C3DABE47F9874DF84220D9013
3,021,824 UART: [art] PUB.Y = BB64E35CC7562BACF8E5DE8FEBF4FB143A01BC1560165A8C5A120D538C233EDD4119A588872D3F9699A91302C8E3990C
3,028,772 UART: [art] SIG.R = 110D7E6FD10A636737CF17FD66DB53651002C6DC7227A3B4A42FE734434B58D9CD142803B5AAEA53470290C8BE5F7317
3,035,529 UART: [art] SIG.S = A0C9D16AB018E7CBBEB86544037DFD4351A446B6406760543E77DFE0EA6DBFCBB7345BC43006070A2A1068B27CDDBB41
3,059,449 UART: Caliptra RT
3,059,792 UART: [state] CFI Enabled
3,179,739 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,057 UART: [rt]cmd =0x52435458, len=8
3,211,017 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,772 UART: [state] LifecycleState = Unprovisioned
85,427 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
893,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,133 UART: [kat] ++
897,285 UART: [kat] sha1
901,673 UART: [kat] SHA2-256
903,613 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,394 UART: [kat] LMS
1,170,722 UART: [kat] --
1,171,675 UART: [cold-reset] ++
1,172,039 UART: [fht] FHT @ 0x50003400
1,174,560 UART: [idev] ++
1,174,728 UART: [idev] CDI.KEYID = 6
1,175,088 UART: [idev] SUBJECT.KEYID = 7
1,175,512 UART: [idev] UDS.KEYID = 0
1,175,857 ready_for_fw is high
1,175,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,154 UART: [idev] Erasing UDS.KEYID = 0
1,200,185 UART: [idev] Sha1 KeyId Algorithm
1,208,677 UART: [idev] --
1,209,751 UART: [ldev] ++
1,209,919 UART: [ldev] CDI.KEYID = 6
1,210,282 UART: [ldev] SUBJECT.KEYID = 5
1,210,708 UART: [ldev] AUTHORITY.KEYID = 7
1,211,171 UART: [ldev] FE.KEYID = 1
1,216,383 UART: [ldev] Erasing FE.KEYID = 1
1,242,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,427 UART: [ldev] --
1,281,696 UART: [fwproc] Wait for Commands...
1,282,490 UART: [fwproc] Recv command 0x46574c44
1,283,218 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,568 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,738 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,973 >>> mbox cmd response: success
2,826,973 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,828,223 UART: [afmc] ++
2,828,391 UART: [afmc] CDI.KEYID = 6
2,828,753 UART: [afmc] SUBJECT.KEYID = 7
2,829,178 UART: [afmc] AUTHORITY.KEYID = 5
2,864,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,576 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,285 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,168 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,869 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,605 UART: [afmc] --
2,907,601 UART: [cold-reset] --
2,908,561 UART: [state] Locking Datavault
2,909,606 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,210 UART: [state] Locking ICCM
2,910,698 UART: [exit] Launching FMC @ 0x40000130
2,916,028 UART:
2,916,044 UART: Running Caliptra FMC ...
2,916,452 UART:
2,916,506 UART: [state] CFI Enabled
2,927,000 UART: [fht] FMC Alias Private Key: 7
3,045,788 UART: [art] Extend RT PCRs Done
3,046,216 UART: [art] Lock RT PCRs Done
3,047,762 UART: [art] Populate DV Done
3,056,093 UART: [fht] FMC Alias Private Key: 7
3,057,029 UART: [art] Derive CDI
3,057,309 UART: [art] Store in slot 0x4
3,142,756 UART: [art] Derive Key Pair
3,143,116 UART: [art] Store priv key in slot 0x5
3,156,212 UART: [art] Derive Key Pair - Done
3,171,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,007 UART: [art] PUB.X = B7EA6BA3441455CBC0314B289707DF8BD96960F25A7C4F9781A1CDF33091C0CF6E9F65AC4BEB1D8860560B41133CE541
3,193,779 UART: [art] PUB.Y = EA8C1227EA78F0629B2D343033BE2AA081D3204A620BD5DF47C810AC2AC9A934ABC65C296A4728ECAA56C2714B4D6410
3,200,736 UART: [art] SIG.R = B8BD90C8B8C4C2273AA6A425FE69153ED3291F6622A050A8D2CEA623934BDB5D24F92155E4011794575CE50B17407AFA
3,207,504 UART: [art] SIG.S = BC00BE97492E9355522B4AE9DFA1CC4E0B7D57AD40604C2AEEEB563B0B3C32D71BA5F59FAE2E94CF598A9B01B1B2BC03
3,231,390 UART: Caliptra RT
3,231,641 UART: [state] CFI Enabled
3,350,477 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,779 UART: [rt]cmd =0x52435458, len=8
3,381,679 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,605 ready_for_fw is high
1,060,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,084 >>> mbox cmd response: success
2,679,084 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,741,205 UART:
2,741,221 UART: Running Caliptra FMC ...
2,741,629 UART:
2,741,683 UART: [state] CFI Enabled
2,751,967 UART: [fht] FMC Alias Private Key: 7
2,871,289 UART: [art] Extend RT PCRs Done
2,871,717 UART: [art] Lock RT PCRs Done
2,873,145 UART: [art] Populate DV Done
2,881,538 UART: [fht] FMC Alias Private Key: 7
2,882,612 UART: [art] Derive CDI
2,882,892 UART: [art] Store in slot 0x4
2,968,529 UART: [art] Derive Key Pair
2,968,889 UART: [art] Store priv key in slot 0x5
2,981,927 UART: [art] Derive Key Pair - Done
2,996,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,884 UART: [art] PUB.X = 5BA5A3611677CD09796C6D917CEE2973926B3C672ABC3AF75E5BA9D49425E8DED086062751F513D31A5BC45F4DAB2888
3,019,654 UART: [art] PUB.Y = 637636702025EE9CBE4287153CD9AF8885E914539A42F9E4C5DF4F88C726B4D81718072A6FC6A66008E54302B610599F
3,026,587 UART: [art] SIG.R = 550C0BB41D272326BDE7955094A60331E8C46839D0F1450529D3FAC61145FE58DB94E7A50A1E59E34E0C4FF97D244F2F
3,033,341 UART: [art] SIG.S = 97EAF3F814CABADDFD6EDCDB1176181EAD290F993A4199861C30FCE3337BE4AF9DF29C808B74A8D4AA6DC097F09DFDB5
3,057,238 UART: Caliptra RT
3,057,489 UART: [state] CFI Enabled
3,177,044 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,668 UART: [rt]cmd =0x52435458, len=8
3,208,822 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
893,563 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,688 UART: [kat] ++
897,840 UART: [kat] sha1
901,896 UART: [kat] SHA2-256
903,836 UART: [kat] SHA2-384
906,711 UART: [kat] SHA2-512-ACC
908,612 UART: [kat] ECC-384
918,253 UART: [kat] HMAC-384Kdf
922,925 UART: [kat] LMS
1,171,253 UART: [kat] --
1,172,200 UART: [cold-reset] ++
1,172,604 UART: [fht] FHT @ 0x50003400
1,175,361 UART: [idev] ++
1,175,529 UART: [idev] CDI.KEYID = 6
1,175,889 UART: [idev] SUBJECT.KEYID = 7
1,176,313 UART: [idev] UDS.KEYID = 0
1,176,658 ready_for_fw is high
1,176,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,215 UART: [idev] Erasing UDS.KEYID = 0
1,201,428 UART: [idev] Sha1 KeyId Algorithm
1,210,014 UART: [idev] --
1,211,182 UART: [ldev] ++
1,211,350 UART: [ldev] CDI.KEYID = 6
1,211,713 UART: [ldev] SUBJECT.KEYID = 5
1,212,139 UART: [ldev] AUTHORITY.KEYID = 7
1,212,602 UART: [ldev] FE.KEYID = 1
1,218,146 UART: [ldev] Erasing FE.KEYID = 1
1,245,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,014 UART: [ldev] --
1,284,307 UART: [fwproc] Wait for Commands...
1,284,933 UART: [fwproc] Recv command 0x46574c44
1,285,661 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,807 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,977 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,214 >>> mbox cmd response: success
2,829,214 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,830,422 UART: [afmc] ++
2,830,590 UART: [afmc] CDI.KEYID = 6
2,830,952 UART: [afmc] SUBJECT.KEYID = 7
2,831,377 UART: [afmc] AUTHORITY.KEYID = 5
2,867,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,787 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,496 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,379 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,080 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,082 UART: [afmc] --
2,911,064 UART: [cold-reset] --
2,911,802 UART: [state] Locking Datavault
2,912,935 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,539 UART: [state] Locking ICCM
2,914,035 UART: [exit] Launching FMC @ 0x40000130
2,919,365 UART:
2,919,381 UART: Running Caliptra FMC ...
2,919,789 UART:
2,919,932 UART: [state] CFI Enabled
2,930,122 UART: [fht] FMC Alias Private Key: 7
3,048,906 UART: [art] Extend RT PCRs Done
3,049,334 UART: [art] Lock RT PCRs Done
3,050,624 UART: [art] Populate DV Done
3,058,821 UART: [fht] FMC Alias Private Key: 7
3,059,979 UART: [art] Derive CDI
3,060,259 UART: [art] Store in slot 0x4
3,146,330 UART: [art] Derive Key Pair
3,146,690 UART: [art] Store priv key in slot 0x5
3,159,444 UART: [art] Derive Key Pair - Done
3,174,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,029 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,794 UART: [art] PUB.X = AC1C0E8B9E4BB134D1C2C0D0B94E57E36A530B3A99427D9CA0ECED0323550581F717258D11EEA1435F4DDF4AA7C34716
3,197,564 UART: [art] PUB.Y = 2824EA2337B104DC9E17D1021C67E2EE34CAE178A16B0F2B54C8862F7B18D9BC8A80CA115FE50C40C93C29230069E8AB
3,204,488 UART: [art] SIG.R = 94025D13DE47F5404A2E206CB28D633FB26452106DE2FB99F7592EE997F579F91F3E6AA72B616D85A8D5554CC781EC7F
3,211,259 UART: [art] SIG.S = CF7BFA5C3E1B609A9CE913A38217EAB3F15ED75F04E429C65A20B855543BD85ED110E7CA8E573482F8E04BA07655B515
3,235,016 UART: Caliptra RT
3,235,359 UART: [state] CFI Enabled
3,354,149 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,655 UART: [rt]cmd =0x52435458, len=8
3,385,777 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,430 ready_for_fw is high
1,061,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,213 >>> mbox cmd response: success
2,680,213 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,742,772 UART:
2,742,788 UART: Running Caliptra FMC ...
2,743,196 UART:
2,743,339 UART: [state] CFI Enabled
2,754,513 UART: [fht] FMC Alias Private Key: 7
2,873,401 UART: [art] Extend RT PCRs Done
2,873,829 UART: [art] Lock RT PCRs Done
2,875,387 UART: [art] Populate DV Done
2,883,764 UART: [fht] FMC Alias Private Key: 7
2,884,822 UART: [art] Derive CDI
2,885,102 UART: [art] Store in slot 0x4
2,970,807 UART: [art] Derive Key Pair
2,971,167 UART: [art] Store priv key in slot 0x5
2,984,447 UART: [art] Derive Key Pair - Done
2,999,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,811 UART: [art] PUB.X = A67796368026081E1A6AABFDECB3C399AF1E60E1B0FDD8D00631C82060AB1290BB6D3527554EBF4759DA2D1FBE67D1CF
3,022,591 UART: [art] PUB.Y = 20B2419407661478B85094607C89525655D20A7904D120974D7F592C32C01133D4899DAAF5BA21A942C93B650555560F
3,029,506 UART: [art] SIG.R = D8177BFE04798549706F220693969099526A0FE0B8A2FE011448952819EF41DCC0DF191707D4C11AD1405B691DE3F2B1
3,036,255 UART: [art] SIG.S = E408EDCBF7425C19093D6CED39639965AC63E405FDFF9C1F2CADAB45181D6097654BEAF4CCEFBE38557087DE597EA467
3,060,014 UART: Caliptra RT
3,060,357 UART: [state] CFI Enabled
3,181,251 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,737 UART: [rt]cmd =0x52435458, len=8
3,212,737 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,051 UART:
192,441 UART: Running Caliptra ROM ...
193,652 UART:
193,824 UART: [state] CFI Enabled
265,112 UART: [state] LifecycleState = Unprovisioned
267,096 UART: [state] DebugLocked = No
269,556 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,002 UART: [kat] SHA2-256
443,744 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,208 UART: [kat] ++
454,812 UART: [kat] sha1
464,627 UART: [kat] SHA2-256
467,352 UART: [kat] SHA2-384
474,336 UART: [kat] SHA2-512-ACC
476,700 UART: [kat] ECC-384
2,769,791 UART: [kat] HMAC-384Kdf
2,801,293 UART: [kat] LMS
3,991,637 UART: [kat] --
3,996,717 UART: [cold-reset] ++
3,997,871 UART: [fht] Storing FHT @ 0x50003400
4,008,495 UART: [idev] ++
4,009,063 UART: [idev] CDI.KEYID = 6
4,010,099 UART: [idev] SUBJECT.KEYID = 7
4,011,282 UART: [idev] UDS.KEYID = 0
4,012,335 ready_for_fw is high
4,012,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,636 UART: [idev] Erasing UDS.KEYID = 0
7,348,338 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,528 UART: [idev] --
7,372,959 UART: [ldev] ++
7,373,529 UART: [ldev] CDI.KEYID = 6
7,374,471 UART: [ldev] SUBJECT.KEYID = 5
7,375,683 UART: [ldev] AUTHORITY.KEYID = 7
7,376,990 UART: [ldev] FE.KEYID = 1
7,423,969 UART: [ldev] Erasing FE.KEYID = 1
10,758,150 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,346 UART: [ldev] --
13,136,689 UART: [fwproc] Waiting for Commands...
13,139,916 UART: [fwproc] Received command 0x46574c44
13,142,145 UART: [fwproc] Received Image of size 118548 bytes
17,250,111 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,329,735 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,402,893 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,731,765 >>> mbox cmd response: success
17,733,163 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,735,872 UART: [afmc] ++
17,736,468 UART: [afmc] CDI.KEYID = 6
17,737,350 UART: [afmc] SUBJECT.KEYID = 7
17,738,619 UART: [afmc] AUTHORITY.KEYID = 5
21,113,122 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,411,529 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,413,798 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,428,191 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,442,942 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,457,358 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,479,394 UART: [afmc] --
23,483,665 UART: [cold-reset] --
23,487,511 UART: [state] Locking Datavault
23,492,063 UART: [state] Locking PCR0, PCR1 and PCR31
23,493,769 UART: [state] Locking ICCM
23,495,678 UART: [exit] Launching FMC @ 0x40000130
23,504,041 UART:
23,504,286 UART: Running Caliptra FMC ...
23,505,388 UART:
23,505,548 UART: [state] CFI Enabled
23,570,595 UART: [fht] FMC Alias Private Key: 7
25,911,290 UART: [art] Extend RT PCRs Done
25,912,510 UART: [art] Lock RT PCRs Done
25,914,112 UART: [art] Populate DV Done
25,919,735 UART: [fht] FMC Alias Private Key: 7
25,921,271 UART: [art] Derive CDI
25,922,006 UART: [art] Store in slot 0x4
25,979,023 UART: [art] Derive Key Pair
25,980,067 UART: [art] Store priv key in slot 0x5
29,273,221 UART: [art] Derive Key Pair - Done
29,286,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,574,404 UART: [art] Erasing AUTHORITY.KEYID = 7
31,575,930 UART: [art] PUB.X = 1C1CA681BB57F969CA2DDC1C46AD78542FFBAE6B5D051EBAC7A5FB28DC66B35196735ACF07F13E24BA1E0FC38431D72E
31,583,192 UART: [art] PUB.Y = C4146D52E7FD1040E69F160B1393805BEDED9C322EF4F193E3BC7580CB35553272BBF5423E37D060B2B3312A7ABD04DF
31,590,437 UART: [art] SIG.R = 93E1E3C9B94EA36FD03A19FC27CF0DB890397C91D2AC0ECD0A8D7117DFBE7D5085141F320DB7A2E6C47DB5C01B44984E
31,597,847 UART: [art] SIG.S = 8B5F5456710209186DD255E4CE54391E0C73A9D27ACEA9F4C62F4D6AD061E7658EFC6D7603CED9CA6FB4897207903DF3
32,903,229 UART: Caliptra RT
32,903,927 UART: [state] CFI Enabled
33,080,350 UART: [rt] RT listening for mailbox commands...
33,112,006 UART: [rt]cmd =0x52435458, len=8
33,113,488 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,785,676 ready_for_fw is high
3,786,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,945,611 >>> mbox cmd response: success
17,947,201 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,628,931 UART:
23,629,321 UART: Running Caliptra FMC ...
23,630,435 UART:
23,630,587 UART: [state] CFI Enabled
23,699,335 UART: [fht] FMC Alias Private Key: 7
26,039,264 UART: [art] Extend RT PCRs Done
26,040,514 UART: [art] Lock RT PCRs Done
26,042,338 UART: [art] Populate DV Done
26,047,737 UART: [fht] FMC Alias Private Key: 7
26,049,283 UART: [art] Derive CDI
26,050,020 UART: [art] Store in slot 0x4
26,108,288 UART: [art] Derive Key Pair
26,109,334 UART: [art] Store priv key in slot 0x5
29,402,287 UART: [art] Derive Key Pair - Done
29,415,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,704,342 UART: [art] Erasing AUTHORITY.KEYID = 7
31,705,849 UART: [art] PUB.X = 1E24307E8242C7BC95EE30357E6C97BD28ADF9FC80DED1612A5551368AFDF274B551A78B08A2886DDEAC5D52984CFEFB
31,713,162 UART: [art] PUB.Y = 6B7EEC947CD3661F910D00997E72F61F9B722D32D022D9505457AC01290FCFAEC24CE221AB9EC10752595E142F860002
31,720,361 UART: [art] SIG.R = C4305DB00185971185EEBE324CE91413AF9B1D3719C06FE586234DAE62056BB7010DDEAB50A52F827966FA5CA5E768D0
31,727,754 UART: [art] SIG.S = 700A05FF1E223FCBB07649DCC85B572788837E0D183D315763AD08A9A21E4562CD70CD3D636E7A6850E2FC9137151D2A
33,032,342 UART: Caliptra RT
33,033,061 UART: [state] CFI Enabled
33,210,252 UART: [rt] RT listening for mailbox commands...
33,241,503 UART: [rt]cmd =0x52435458, len=8
33,242,952 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,440 UART:
192,808 UART: Running Caliptra ROM ...
194,009 UART:
603,623 UART: [state] CFI Enabled
621,081 UART: [state] LifecycleState = Unprovisioned
623,033 UART: [state] DebugLocked = No
625,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,904 UART: [kat] SHA2-256
800,626 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,215 UART: [kat] ++
811,661 UART: [kat] sha1
823,598 UART: [kat] SHA2-256
826,249 UART: [kat] SHA2-384
830,740 UART: [kat] SHA2-512-ACC
833,095 UART: [kat] ECC-384
3,115,461 UART: [kat] HMAC-384Kdf
3,128,402 UART: [kat] LMS
4,318,554 UART: [kat] --
4,322,233 UART: [cold-reset] ++
4,324,237 UART: [fht] Storing FHT @ 0x50003400
4,335,284 UART: [idev] ++
4,335,913 UART: [idev] CDI.KEYID = 6
4,336,835 UART: [idev] SUBJECT.KEYID = 7
4,338,081 UART: [idev] UDS.KEYID = 0
4,339,068 ready_for_fw is high
4,339,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,117 UART: [idev] Erasing UDS.KEYID = 0
7,623,768 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,352 UART: [idev] --
7,648,852 UART: [ldev] ++
7,649,415 UART: [ldev] CDI.KEYID = 6
7,650,424 UART: [ldev] SUBJECT.KEYID = 5
7,651,573 UART: [ldev] AUTHORITY.KEYID = 7
7,652,846 UART: [ldev] FE.KEYID = 1
7,665,124 UART: [ldev] Erasing FE.KEYID = 1
10,954,621 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,299 UART: [ldev] --
13,313,529 UART: [fwproc] Waiting for Commands...
13,316,324 UART: [fwproc] Received command 0x46574c44
13,318,502 UART: [fwproc] Received Image of size 118548 bytes
17,418,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,259 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,443 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,544 >>> mbox cmd response: success
17,902,665 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,905,553 UART: [afmc] ++
17,906,150 UART: [afmc] CDI.KEYID = 6
17,907,113 UART: [afmc] SUBJECT.KEYID = 7
17,908,373 UART: [afmc] AUTHORITY.KEYID = 5
21,224,634 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,170 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,421 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,815 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,560 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,565,973 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,587,897 UART: [afmc] --
23,591,253 UART: [cold-reset] --
23,595,073 UART: [state] Locking Datavault
23,602,371 UART: [state] Locking PCR0, PCR1 and PCR31
23,604,117 UART: [state] Locking ICCM
23,605,286 UART: [exit] Launching FMC @ 0x40000130
23,613,671 UART:
23,613,925 UART: Running Caliptra FMC ...
23,615,024 UART:
23,615,183 UART: [state] CFI Enabled
23,623,008 UART: [fht] FMC Alias Private Key: 7
25,961,928 UART: [art] Extend RT PCRs Done
25,963,145 UART: [art] Lock RT PCRs Done
25,964,658 UART: [art] Populate DV Done
25,970,061 UART: [fht] FMC Alias Private Key: 7
25,971,649 UART: [art] Derive CDI
25,972,458 UART: [art] Store in slot 0x4
26,015,049 UART: [art] Derive Key Pair
26,016,094 UART: [art] Store priv key in slot 0x5
29,258,190 UART: [art] Derive Key Pair - Done
29,271,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,178 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,679 UART: [art] PUB.X = 156A07CD1C5768353AF46568DF0ECC37E0BBE83FABD825A8915BA69F5226A1EEE38E14AD682DE578A96342C110ED30FB
31,560,005 UART: [art] PUB.Y = 5994F0E5DB6CF0B53A42C0359C7CB8EA05DACACE24CD2027140536410ABA18232185E3F33835C227A0391DA90835E69A
31,567,247 UART: [art] SIG.R = BEAEAAE770CF64A974B4E2B8CF60C75D221DB12BBC03B5F011BA21421CAFC979143A56159CDF67D78E9D6184CE36552B
31,574,640 UART: [art] SIG.S = 69FBE10BAB2497A58ADF4AEAB50EFC574ACD22BFC3CB4D67D24E1C75E2C2FA9989789D8A37E5C362233007488020654C
32,879,362 UART: Caliptra RT
32,880,054 UART: [state] CFI Enabled
33,013,342 UART: [rt] RT listening for mailbox commands...
33,044,735 UART: [rt]cmd =0x52435458, len=8
33,046,107 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,127,897 ready_for_fw is high
4,128,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,533 >>> mbox cmd response: success
18,163,906 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,804,915 UART:
23,805,311 UART: Running Caliptra FMC ...
23,806,460 UART:
23,806,619 UART: [state] CFI Enabled
23,814,612 UART: [fht] FMC Alias Private Key: 7
26,154,486 UART: [art] Extend RT PCRs Done
26,155,721 UART: [art] Lock RT PCRs Done
26,157,483 UART: [art] Populate DV Done
26,163,021 UART: [fht] FMC Alias Private Key: 7
26,164,670 UART: [art] Derive CDI
26,165,480 UART: [art] Store in slot 0x4
26,207,688 UART: [art] Derive Key Pair
26,208,674 UART: [art] Store priv key in slot 0x5
29,451,111 UART: [art] Derive Key Pair - Done
29,464,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,118 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,619 UART: [art] PUB.X = 231B2A19A80068996EF7C70FF9073FEC8F9263571156D49A7ECE0C0D6B93DE27A79932E185851D97305B53BAC4D7E508
31,753,819 UART: [art] PUB.Y = 21BBCEE313C8D4B874E7C411A17F68CD31A259977066AF82C1FBF11967FFE989377EAD0592F8B6D7EB6215DC91A1AAD5
31,761,119 UART: [art] SIG.R = 6B37CB66F812B55D34A4AA24A1EA1E44873BF0E2D98D2B1A8D7B2B7075847C8ED31815A978D7F163B6A4E3709521EA72
31,768,451 UART: [art] SIG.S = 7263100B817CBCC2D02ECA69C7B07546EEE0C0F54922BF2CB037809F9885563E21112DEBCB5DD1BBA5F09BBA59A7F3E7
33,073,868 UART: Caliptra RT
33,074,606 UART: [state] CFI Enabled
33,208,271 UART: [rt] RT listening for mailbox commands...
33,239,628 UART: [rt]cmd =0x52435458, len=8
33,241,135 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,208 UART:
192,558 UART: Running Caliptra ROM ...
193,736 UART:
193,885 UART: [state] CFI Enabled
259,870 UART: [state] LifecycleState = Unprovisioned
261,781 UART: [state] DebugLocked = No
263,602 UART: [state] WD Timer not started. Device not locked for debugging
267,143 UART: [kat] SHA2-256
446,774 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,588 UART: [kat] ++
458,117 UART: [kat] sha1
470,061 UART: [kat] SHA2-256
472,734 UART: [kat] SHA2-384
478,394 UART: [kat] SHA2-512-ACC
480,802 UART: [kat] ECC-384
2,928,245 UART: [kat] HMAC-384Kdf
2,962,372 UART: [kat] LMS
3,438,880 UART: [kat] --
3,445,670 UART: [cold-reset] ++
3,446,755 UART: [fht] FHT @ 0x50003400
3,458,513 UART: [idev] ++
3,459,072 UART: [idev] CDI.KEYID = 6
3,460,106 UART: [idev] SUBJECT.KEYID = 7
3,461,281 UART: [idev] UDS.KEYID = 0
3,462,217 ready_for_fw is high
3,462,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,611,464 UART: [idev] Erasing UDS.KEYID = 0
5,978,317 UART: [idev] Sha1 KeyId Algorithm
6,001,704 UART: [idev] --
6,007,521 UART: [ldev] ++
6,008,109 UART: [ldev] CDI.KEYID = 6
6,009,034 UART: [ldev] SUBJECT.KEYID = 5
6,010,203 UART: [ldev] AUTHORITY.KEYID = 7
6,011,488 UART: [ldev] FE.KEYID = 1
6,050,168 UART: [ldev] Erasing FE.KEYID = 1
8,560,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,291,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,307,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,323,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,339,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,361,041 UART: [ldev] --
10,367,273 UART: [fwproc] Wait for Commands...
10,369,476 UART: [fwproc] Recv command 0x46574c44
10,371,455 UART: [fwproc] Recv'd Img size: 118548 bytes
13,850,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,928,882 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,001,897 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,330,814 >>> mbox cmd response: success
14,331,938 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,334,889 UART: [afmc] ++
14,335,467 UART: [afmc] CDI.KEYID = 6
14,336,483 UART: [afmc] SUBJECT.KEYID = 7
14,337,638 UART: [afmc] AUTHORITY.KEYID = 5
16,869,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,610,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,612,537 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,628,327 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,644,385 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,659,968 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,684,636 UART: [afmc] --
18,688,895 UART: [cold-reset] --
18,694,049 UART: [state] Locking Datavault
18,698,708 UART: [state] Locking PCR0, PCR1 and PCR31
18,700,455 UART: [state] Locking ICCM
18,702,385 UART: [exit] Launching FMC @ 0x40000130
18,710,830 UART:
18,711,059 UART: Running Caliptra FMC ...
18,712,157 UART:
18,712,312 UART: [state] CFI Enabled
18,769,504 UART: [fht] FMC Alias Private Key: 7
20,557,014 UART: [art] Extend RT PCRs Done
20,558,238 UART: [art] Lock RT PCRs Done
20,560,312 UART: [art] Populate DV Done
20,565,686 UART: [fht] FMC Alias Private Key: 7
20,567,170 UART: [art] Derive CDI
20,567,930 UART: [art] Store in slot 0x4
20,623,616 UART: [art] Derive Key Pair
20,624,617 UART: [art] Store priv key in slot 0x5
23,088,223 UART: [art] Derive Key Pair - Done
23,101,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,813,952 UART: [art] Erasing AUTHORITY.KEYID = 7
24,815,455 UART: [art] PUB.X = 3D345680D96BE2D7D424826F9C24364699960E276646A44FBC3CAF431F54A780380BD7AB3D45CD8D15B6B354A83ADE07
24,822,707 UART: [art] PUB.Y = CB576A6A4FF39D087580A8D14E761B6E842DF73CFC4C98B78CB1CA531CD2BEE071D99AF23AEBDEE0B7FE4010943002B4
24,829,995 UART: [art] SIG.R = DCDC1FCE81C0833FFE616B7135B7669CC4DC84EB4ED4DCA5363709145E5D36F750C0A10CFD390E79487D037EA306A69F
24,837,394 UART: [art] SIG.S = 551E1AAC28A28D1F192A8F38821AB7BA649688D15E7124E7AF56FA57C72E4549CBB05F5227078007B9F0D94F604769D7
25,816,689 UART: Caliptra RT
25,817,381 UART: [state] CFI Enabled
26,002,300 UART: [rt] RT listening for mailbox commands...
26,033,557 UART: [rt]cmd =0x52435458, len=8
26,034,953 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,460,580 ready_for_fw is high
3,460,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,236,642 >>> mbox cmd response: success
14,238,032 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,513,362 UART:
18,513,749 UART: Running Caliptra FMC ...
18,514,944 UART:
18,515,108 UART: [state] CFI Enabled
18,581,863 UART: [fht] FMC Alias Private Key: 7
20,347,698 UART: [art] Extend RT PCRs Done
20,348,925 UART: [art] Lock RT PCRs Done
20,350,444 UART: [art] Populate DV Done
20,355,698 UART: [fht] FMC Alias Private Key: 7
20,357,209 UART: [art] Derive CDI
20,357,972 UART: [art] Store in slot 0x4
20,414,027 UART: [art] Derive Key Pair
20,415,075 UART: [art] Store priv key in slot 0x5
22,877,328 UART: [art] Derive Key Pair - Done
22,890,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,847 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,352 UART: [art] PUB.X = 630BB9BA90DD36E623797B3A8C72B4C8D3493E651E2457F74EB5B86B137D49BA35A5FCFE064106B2FF1D8B5C3A4C126A
24,611,661 UART: [art] PUB.Y = EC3594E81036BB51573DEA61483C9D76556FEDA272E735CCAA0F6A0CB6E89AC199F278107352307B87B97688A0E3344E
24,618,904 UART: [art] SIG.R = E32987B6A3C12FEBABFDB8AFAD2C5D4945718B4A9172E56B038AAE4C2391E32A176FBEE8811E961EDF98D2B076EAC420
24,626,304 UART: [art] SIG.S = B2F30ED0344409B641D5530C54FAEE51CB52D3DCE972EC1266B3CA7373EB943B35978C01A6F9C1D01BE018FEEF4C556D
25,605,615 UART: Caliptra RT
25,606,331 UART: [state] CFI Enabled
25,785,259 UART: [rt] RT listening for mailbox commands...
25,816,827 UART: [rt]cmd =0x52435458, len=8
25,818,147 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,420 UART:
192,786 UART: Running Caliptra ROM ...
193,969 UART:
603,742 UART: [state] CFI Enabled
619,824 UART: [state] LifecycleState = Unprovisioned
621,701 UART: [state] DebugLocked = No
624,086 UART: [state] WD Timer not started. Device not locked for debugging
628,140 UART: [kat] SHA2-256
807,843 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,571 UART: [kat] ++
819,023 UART: [kat] sha1
830,045 UART: [kat] SHA2-256
832,777 UART: [kat] SHA2-384
838,698 UART: [kat] SHA2-512-ACC
841,066 UART: [kat] ECC-384
3,282,444 UART: [kat] HMAC-384Kdf
3,295,196 UART: [kat] LMS
3,771,649 UART: [kat] --
3,776,036 UART: [cold-reset] ++
3,776,986 UART: [fht] FHT @ 0x50003400
3,788,666 UART: [idev] ++
3,789,238 UART: [idev] CDI.KEYID = 6
3,790,124 UART: [idev] SUBJECT.KEYID = 7
3,791,444 UART: [idev] UDS.KEYID = 0
3,792,342 ready_for_fw is high
3,792,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,419 UART: [idev] Erasing UDS.KEYID = 0
6,273,963 UART: [idev] Sha1 KeyId Algorithm
6,297,080 UART: [idev] --
6,302,212 UART: [ldev] ++
6,302,784 UART: [ldev] CDI.KEYID = 6
6,303,667 UART: [ldev] SUBJECT.KEYID = 5
6,304,932 UART: [ldev] AUTHORITY.KEYID = 7
6,306,166 UART: [ldev] FE.KEYID = 1
6,314,729 UART: [ldev] Erasing FE.KEYID = 1
8,792,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,925 UART: [ldev] --
10,587,802 UART: [fwproc] Wait for Commands...
10,590,549 UART: [fwproc] Recv command 0x46574c44
10,592,592 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,745 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,785 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,917 >>> mbox cmd response: success
14,553,267 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,555,683 UART: [afmc] ++
14,556,294 UART: [afmc] CDI.KEYID = 6
14,557,213 UART: [afmc] SUBJECT.KEYID = 7
14,558,433 UART: [afmc] AUTHORITY.KEYID = 5
17,064,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,552 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,786 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,612 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,677 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,250 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,757 UART: [afmc] --
18,866,212 UART: [cold-reset] --
18,869,424 UART: [state] Locking Datavault
18,876,561 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,314 UART: [state] Locking ICCM
18,879,880 UART: [exit] Launching FMC @ 0x40000130
18,888,342 UART:
18,888,597 UART: Running Caliptra FMC ...
18,889,704 UART:
18,889,867 UART: [state] CFI Enabled
18,898,120 UART: [fht] FMC Alias Private Key: 7
20,664,452 UART: [art] Extend RT PCRs Done
20,665,671 UART: [art] Lock RT PCRs Done
20,667,239 UART: [art] Populate DV Done
20,672,698 UART: [fht] FMC Alias Private Key: 7
20,674,290 UART: [art] Derive CDI
20,675,107 UART: [art] Store in slot 0x4
20,718,134 UART: [art] Derive Key Pair
20,719,129 UART: [art] Store priv key in slot 0x5
23,146,319 UART: [art] Derive Key Pair - Done
23,159,091 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,959 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,458 UART: [art] PUB.X = 2A43E8B10589241734801234AA62B86ADA78309AC67B7A21C349965C2D4521792DFDE14E0BE9EC336C81605547F97BD4
24,873,768 UART: [art] PUB.Y = 208580AFC48420CDB346B6FA741E40E2031DA1E2939680FE3481489627FBEA6E3D3FE543D207D07F3EF5898252C6E1A8
24,881,004 UART: [art] SIG.R = 4BCD3F24F11772825C1235DF822D92248B0F0F70E60B8F6688A5D6B0E04271E3895AB549A4E43F3000E268C39ED09BC3
24,888,340 UART: [art] SIG.S = E545A871AB18EC48579D36EE9B5EF29E61A734CE26062F09395BAFFD8F169E82CA370F5E42235549C544D0C812B63AA0
25,866,845 UART: Caliptra RT
25,867,535 UART: [state] CFI Enabled
26,001,064 UART: [rt] RT listening for mailbox commands...
26,032,201 UART: [rt]cmd =0x52435458, len=8
26,033,472 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
3,778,746 ready_for_fw is high
3,779,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,354 >>> mbox cmd response: success
14,458,031 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,696,477 UART:
18,696,859 UART: Running Caliptra FMC ...
18,697,976 UART:
18,698,133 UART: [state] CFI Enabled
18,705,916 UART: [fht] FMC Alias Private Key: 7
20,471,871 UART: [art] Extend RT PCRs Done
20,473,088 UART: [art] Lock RT PCRs Done
20,474,712 UART: [art] Populate DV Done
20,480,027 UART: [fht] FMC Alias Private Key: 7
20,481,733 UART: [art] Derive CDI
20,482,470 UART: [art] Store in slot 0x4
20,525,286 UART: [art] Derive Key Pair
20,526,320 UART: [art] Store priv key in slot 0x5
22,953,169 UART: [art] Derive Key Pair - Done
22,966,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,834 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,315 UART: [art] PUB.X = 3E4388BDDBF680D62EA25127AB8BF450649F247A5B78DACFC990D69412B89C404D4E0A7D12F389067EA4B9CD1989E2A0
24,681,626 UART: [art] PUB.Y = 0D4C93380477E06F4B32A3C77C5157A38875F2CBB3E7F1EC7BBEED6FCB76E6869ADA61601CF418E2203218EFFD3DA13D
24,688,877 UART: [art] SIG.R = 1D84A7743F5806A61E3C5F247257E485909B6E7157A4769B096F9C0FB280EBDA110263E831134D1D91C48DE8DAF14DC2
24,696,276 UART: [art] SIG.S = C2D4DE368C9E9664467361B94D2877B776A59448FACB4DB2EDBEDB37A910DB90D32A14A9528EADB232A5516C6D0D9845
25,675,402 UART: Caliptra RT
25,676,114 UART: [state] CFI Enabled
25,808,637 UART: [rt] RT listening for mailbox commands...
25,840,238 UART: [rt]cmd =0x52435458, len=8
25,841,644 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
192,256 UART:
192,609 UART: Running Caliptra ROM ...
193,793 UART:
193,946 UART: [state] CFI Enabled
260,867 UART: [state] LifecycleState = Unprovisioned
263,262 UART: [state] DebugLocked = No
266,005 UART: [state] WD Timer not started. Device not locked for debugging
270,834 UART: [kat] SHA2-256
460,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,529 UART: [kat] ++
472,031 UART: [kat] sha1
482,557 UART: [kat] SHA2-256
485,569 UART: [kat] SHA2-384
492,769 UART: [kat] SHA2-512-ACC
495,350 UART: [kat] ECC-384
2,949,250 UART: [kat] HMAC-384Kdf
2,971,716 UART: [kat] LMS
3,503,497 UART: [kat] --
3,506,291 UART: [cold-reset] ++
3,508,537 UART: [fht] FHT @ 0x50003400
3,520,868 UART: [idev] ++
3,521,584 UART: [idev] CDI.KEYID = 6
3,522,615 UART: [idev] SUBJECT.KEYID = 7
3,523,719 UART: [idev] UDS.KEYID = 0
3,524,646 ready_for_fw is high
3,524,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,874 UART: [idev] Erasing UDS.KEYID = 0
6,030,332 UART: [idev] Sha1 KeyId Algorithm
6,051,777 UART: [idev] --
6,058,040 UART: [ldev] ++
6,058,729 UART: [ldev] CDI.KEYID = 6
6,059,657 UART: [ldev] SUBJECT.KEYID = 5
6,060,821 UART: [ldev] AUTHORITY.KEYID = 7
6,062,054 UART: [ldev] FE.KEYID = 1
6,100,260 UART: [ldev] Erasing FE.KEYID = 1
8,608,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,318 UART: [ldev] --
10,417,086 UART: [fwproc] Wait for Commands...
10,420,101 UART: [fwproc] Recv command 0x46574c44
10,422,417 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,302 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,892 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,890 >>> mbox cmd response: success
14,685,333 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,687,653 UART: [afmc] ++
14,688,407 UART: [afmc] CDI.KEYID = 6
14,689,509 UART: [afmc] SUBJECT.KEYID = 7
14,691,034 UART: [afmc] AUTHORITY.KEYID = 5
17,230,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,148 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,053 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,110 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,277 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,212 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,861 UART: [afmc] --
19,033,600 UART: [cold-reset] --
19,039,147 UART: [state] Locking Datavault
19,045,327 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,514 UART: [state] Locking ICCM
19,049,122 UART: [exit] Launching FMC @ 0x40000130
19,057,787 UART:
19,058,021 UART: Running Caliptra FMC ...
19,059,126 UART:
19,059,282 UART: [state] CFI Enabled
19,114,104 UART: [fht] FMC Alias Private Key: 7
20,880,508 UART: [art] Extend RT PCRs Done
20,881,727 UART: [art] Lock RT PCRs Done
20,883,428 UART: [art] Populate DV Done
20,888,866 UART: [fht] FMC Alias Private Key: 7
20,890,405 UART: [art] Derive CDI
20,891,216 UART: [art] Store in slot 0x4
20,947,042 UART: [art] Derive Key Pair
20,948,082 UART: [art] Store priv key in slot 0x5
23,410,900 UART: [art] Derive Key Pair - Done
23,423,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,581 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,080 UART: [art] PUB.X = 4490FF5217165EEC3930BE6F68FBED2877A234D6268CCA7BBBACC0E957DF9B990D08C454BE211EB6AC9FC284047D0874
25,145,412 UART: [art] PUB.Y = C307179F2F12ED9B06CBB2B23C317FF5939274E75BD358FA6C7835C7942D86B5F3EFC3874F3166C4DA786A3A2544FC26
25,152,675 UART: [art] SIG.R = 944D202013BA2C710D3B34516EEC1155E3AE8C13A1A78FAB2B1D2B88A09057C370B474F5C7AFE93BF651E71EA8D4A1DA
25,160,042 UART: [art] SIG.S = 2896019527EF95F57B88470051D752828459BAF6575A38DACCC53F61A62680A146D460CFA38745A57A898EB3796CA3DE
26,138,809 UART: Caliptra RT
26,139,518 UART: [state] CFI Enabled
26,320,170 UART: [rt] RT listening for mailbox commands...
26,351,535 UART: [rt]cmd =0x52435458, len=8
26,353,004 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,437,632 ready_for_fw is high
3,438,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,798,995 >>> mbox cmd response: success
14,800,693 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,090,762 UART:
19,091,161 UART: Running Caliptra FMC ...
19,092,276 UART:
19,092,430 UART: [state] CFI Enabled
19,160,841 UART: [fht] FMC Alias Private Key: 7
20,927,025 UART: [art] Extend RT PCRs Done
20,928,254 UART: [art] Lock RT PCRs Done
20,929,855 UART: [art] Populate DV Done
20,935,494 UART: [fht] FMC Alias Private Key: 7
20,937,202 UART: [art] Derive CDI
20,937,950 UART: [art] Store in slot 0x4
20,993,069 UART: [art] Derive Key Pair
20,994,070 UART: [art] Store priv key in slot 0x5
23,456,795 UART: [art] Derive Key Pair - Done
23,469,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,182,173 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,685 UART: [art] PUB.X = 79CC22947D0836D8D699A5279475B6D65D0F823D1D1ED1E7BB9FB69DD562B205ED443C7246CDDCA19378721008E4D668
25,190,935 UART: [art] PUB.Y = D68DF6DD0D9C0290C770CA831B2F4FB1E907324AF3C6134DFF0485938B9E5C8052C3665AC37621BE812059EDDA75620C
25,198,184 UART: [art] SIG.R = 2170156AE571CB70BDF100D4147C3F1EF4A04B9DDFF53D444A8BCD197433E62E43E4CDA7D0C9AAEE248AD0328F602D8D
25,205,586 UART: [art] SIG.S = 3DB827E76979C39C814DC882EA087FE43CE93D39A0F16744DF093531BF56AE6D18A3731DCEB918A7787551302C74428E
26,184,145 UART: Caliptra RT
26,184,860 UART: [state] CFI Enabled
26,364,373 UART: [rt] RT listening for mailbox commands...
26,395,620 UART: [rt]cmd =0x52435458, len=8
26,397,044 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,439 UART:
192,808 UART: Running Caliptra ROM ...
193,940 UART:
603,772 UART: [state] CFI Enabled
616,396 UART: [state] LifecycleState = Unprovisioned
618,773 UART: [state] DebugLocked = No
620,299 UART: [state] WD Timer not started. Device not locked for debugging
624,133 UART: [kat] SHA2-256
814,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,832 UART: [kat] ++
825,355 UART: [kat] sha1
837,650 UART: [kat] SHA2-256
840,667 UART: [kat] SHA2-384
846,828 UART: [kat] SHA2-512-ACC
849,385 UART: [kat] ECC-384
3,292,978 UART: [kat] HMAC-384Kdf
3,305,943 UART: [kat] LMS
3,837,789 UART: [kat] --
3,844,074 UART: [cold-reset] ++
3,846,155 UART: [fht] FHT @ 0x50003400
3,857,143 UART: [idev] ++
3,857,793 UART: [idev] CDI.KEYID = 6
3,858,830 UART: [idev] SUBJECT.KEYID = 7
3,859,939 UART: [idev] UDS.KEYID = 0
3,860,865 ready_for_fw is high
3,861,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,935 UART: [idev] Erasing UDS.KEYID = 0
6,337,648 UART: [idev] Sha1 KeyId Algorithm
6,360,605 UART: [idev] --
6,365,506 UART: [ldev] ++
6,366,217 UART: [ldev] CDI.KEYID = 6
6,367,107 UART: [ldev] SUBJECT.KEYID = 5
6,368,343 UART: [ldev] AUTHORITY.KEYID = 7
6,369,475 UART: [ldev] FE.KEYID = 1
6,381,633 UART: [ldev] Erasing FE.KEYID = 1
8,862,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,765 UART: [ldev] --
10,653,789 UART: [fwproc] Wait for Commands...
10,655,561 UART: [fwproc] Recv command 0x46574c44
10,657,815 UART: [fwproc] Recv'd Img size: 118548 bytes
14,156,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,234,164 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,770 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,731 >>> mbox cmd response: success
14,918,895 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,921,159 UART: [afmc] ++
14,921,864 UART: [afmc] CDI.KEYID = 6
14,923,027 UART: [afmc] SUBJECT.KEYID = 7
14,924,546 UART: [afmc] AUTHORITY.KEYID = 5
17,433,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,154,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,156,946 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,172,059 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,187,167 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,202,087 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,224,655 UART: [afmc] --
19,227,710 UART: [cold-reset] --
19,231,846 UART: [state] Locking Datavault
19,237,428 UART: [state] Locking PCR0, PCR1 and PCR31
19,239,574 UART: [state] Locking ICCM
19,240,888 UART: [exit] Launching FMC @ 0x40000130
19,249,506 UART:
19,249,757 UART: Running Caliptra FMC ...
19,250,866 UART:
19,251,034 UART: [state] CFI Enabled
19,258,832 UART: [fht] FMC Alias Private Key: 7
21,025,427 UART: [art] Extend RT PCRs Done
21,026,646 UART: [art] Lock RT PCRs Done
21,028,251 UART: [art] Populate DV Done
21,033,664 UART: [fht] FMC Alias Private Key: 7
21,035,368 UART: [art] Derive CDI
21,036,114 UART: [art] Store in slot 0x4
21,078,928 UART: [art] Derive Key Pair
21,079,937 UART: [art] Store priv key in slot 0x5
23,507,034 UART: [art] Derive Key Pair - Done
23,520,037 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,615 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,120 UART: [art] PUB.X = 45B848C5AC237761D88F0DF40E17B1D55A851CC4E46E6496FD0716FF5998A52798EE9F571EA7CA1EDC974F31559F61C1
25,235,388 UART: [art] PUB.Y = 5A0C8800DDBCA844D7EB568252E95668F4EF8BBA457A61D12FD796743992FE7EC4AEB67C78F9F99976BF06A610557C66
25,242,676 UART: [art] SIG.R = 456C78D70A70DB25240DF469AA7A794EE5757699EB95EFAA9BCD3FC361B6B737F0221EF62B45C2BF121FC01C17DFC76A
25,250,063 UART: [art] SIG.S = C6D99FDD068EDFB9DC69A39282A077D7766F0B99C0DBE19E762ABDE8DD3AC359D832D1DE3F36F382DACF0AE662CE9DE5
26,229,420 UART: Caliptra RT
26,230,122 UART: [state] CFI Enabled
26,362,517 UART: [rt] RT listening for mailbox commands...
26,394,153 UART: [rt]cmd =0x52435458, len=8
26,395,666 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,757,106 ready_for_fw is high
3,757,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,051,682 >>> mbox cmd response: success
15,053,125 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,316,367 UART:
19,317,432 UART: Running Caliptra FMC ...
19,318,597 UART:
19,318,761 UART: [state] CFI Enabled
19,325,633 UART: [fht] FMC Alias Private Key: 7
21,091,795 UART: [art] Extend RT PCRs Done
21,093,545 UART: [art] Lock RT PCRs Done
21,094,787 UART: [art] Populate DV Done
21,100,335 UART: [fht] FMC Alias Private Key: 7
21,101,914 UART: [art] Derive CDI
21,102,688 UART: [art] Store in slot 0x4
21,145,358 UART: [art] Derive Key Pair
21,146,368 UART: [art] Store priv key in slot 0x5
23,573,129 UART: [art] Derive Key Pair - Done
23,585,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,291,873 UART: [art] Erasing AUTHORITY.KEYID = 7
25,293,384 UART: [art] PUB.X = 811592BF4FEF91721258ADBF9EF2B904E4107746536373E3B52E1F1A652F4D5A0595034725A49805D6CE118F9562A9C4
25,300,662 UART: [art] PUB.Y = 571F5A4372011FB31C504E62DE3507460E44693EC1287B1E9C65C58693EA075C809746088920ABF1F8A6B1E81479ED7C
25,307,863 UART: [art] SIG.R = C26984B798F679AE86E7F1649B93B0D7DA7786788C91B51467A362603ABE3F0FB588457F0D3DEAFA295C32F267BAF9B2
25,315,216 UART: [art] SIG.S = 72D79411E106536205FE8C531EB2E2293A34626EA92C25CE01F23A067663D5CF6BFF3C1177191BD2914DBB5F8D0137EF
26,294,311 UART: Caliptra RT
26,295,028 UART: [state] CFI Enabled
26,428,184 UART: [rt] RT listening for mailbox commands...
26,459,662 UART: [rt]cmd =0x52435458, len=8
26,461,071 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,951 UART: [kat] SHA2-256
881,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,997 UART: [kat] ++
886,149 UART: [kat] sha1
890,487 UART: [kat] SHA2-256
892,425 UART: [kat] SHA2-384
895,140 UART: [kat] SHA2-512-ACC
897,041 UART: [kat] ECC-384
902,786 UART: [kat] HMAC-384Kdf
907,462 UART: [kat] LMS
1,475,658 UART: [kat] --
1,476,515 UART: [cold-reset] ++
1,476,981 UART: [fht] Storing FHT @ 0x50003400
1,479,860 UART: [idev] ++
1,480,028 UART: [idev] CDI.KEYID = 6
1,480,388 UART: [idev] SUBJECT.KEYID = 7
1,480,812 UART: [idev] UDS.KEYID = 0
1,481,157 ready_for_fw is high
1,481,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,084 UART: [idev] Erasing UDS.KEYID = 0
1,505,870 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,480 UART: [idev] --
1,515,447 UART: [ldev] ++
1,515,615 UART: [ldev] CDI.KEYID = 6
1,515,978 UART: [ldev] SUBJECT.KEYID = 5
1,516,404 UART: [ldev] AUTHORITY.KEYID = 7
1,516,867 UART: [ldev] FE.KEYID = 1
1,522,085 UART: [ldev] Erasing FE.KEYID = 1
1,547,246 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,430 UART: [ldev] --
1,586,717 UART: [fwproc] Waiting for Commands...
1,587,466 UART: [fwproc] Received command 0x46574c44
1,588,257 UART: [fwproc] Received Image of size 118548 bytes
2,932,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,841 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,059 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,314 >>> mbox cmd response: success
3,131,314 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,360 UART: [afmc] ++
3,132,528 UART: [afmc] CDI.KEYID = 6
3,132,890 UART: [afmc] SUBJECT.KEYID = 7
3,133,315 UART: [afmc] AUTHORITY.KEYID = 5
3,167,868 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,830 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,610 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,319 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,202 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,885 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,803 UART: [afmc] --
3,210,759 UART: [cold-reset] --
3,211,743 UART: [state] Locking Datavault
3,212,712 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,316 UART: [state] Locking ICCM
3,213,764 UART: [exit] Launching FMC @ 0x40000130
3,219,094 UART:
3,219,110 UART: Running Caliptra FMC ...
3,219,518 UART:
3,219,572 UART: [state] CFI Enabled
3,229,848 UART: [fht] FMC Alias Private Key: 7
3,349,038 UART: [art] Extend RT PCRs Done
3,349,466 UART: [art] Lock RT PCRs Done
3,350,554 UART: [art] Populate DV Done
3,358,765 UART: [fht] FMC Alias Private Key: 7
3,359,711 UART: [art] Derive CDI
3,359,991 UART: [art] Store in slot 0x4
3,445,611 UART: [art] Derive Key Pair
3,445,971 UART: [art] Store priv key in slot 0x5
3,459,378 UART: [art] Derive Key Pair - Done
3,474,223 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,459 UART: [art] PUB.X = 1B2A850156244EA124501639128354AF275C1E4AEF7E0A56E76DF753234929D32C7F34D46C2F74B6E1248ADBFBBA58D9
3,497,225 UART: [art] PUB.Y = 0799299588C5560283CF5FD83AD5238C1298E75EAA632303550EA9DB12DBB3B19DA52EB1A150491D2309F8D84CE86E23
3,504,160 UART: [art] SIG.R = A93EB026282FCB767A473F201BD2B0B05E9CC6A90FF0E6A946ACD5DDDF7AC612EBEE3A8CBD8AC3CB881DD01E3AA69D38
3,510,959 UART: [art] SIG.S = 223B86663DFF39EC4D92986171E9C3B91A7CC2BCE75D0664743D4C891FDC6D647144C7CE46705BCFFA989282FFD6901D
3,534,528 UART: Caliptra RT
3,534,779 UART: [state] CFI Enabled
3,654,413 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,871 UART: [rt]cmd =0x52435458, len=8
3,686,007 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,931 ready_for_fw is high
1,361,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,464 >>> mbox cmd response: success
2,980,464 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,041,771 UART:
3,041,787 UART: Running Caliptra FMC ...
3,042,195 UART:
3,042,249 UART: [state] CFI Enabled
3,052,953 UART: [fht] FMC Alias Private Key: 7
3,171,873 UART: [art] Extend RT PCRs Done
3,172,301 UART: [art] Lock RT PCRs Done
3,173,921 UART: [art] Populate DV Done
3,182,124 UART: [fht] FMC Alias Private Key: 7
3,183,108 UART: [art] Derive CDI
3,183,388 UART: [art] Store in slot 0x4
3,268,890 UART: [art] Derive Key Pair
3,269,250 UART: [art] Store priv key in slot 0x5
3,281,603 UART: [art] Derive Key Pair - Done
3,296,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,407 UART: [art] PUB.X = 9A6460F8D1A792EBFEB4D4FBCF5E15F5A020BAB89B0BE8F1F035ECC60C84C727A79ABA812D172D06EA3F2A59BC992112
3,319,190 UART: [art] PUB.Y = A949877D613781EF1DA0A85AFF30D8D6732935451B3008B4E3DAF7FC4363D39A70BBE7323B828D49180CD83A9BF0DAD2
3,326,142 UART: [art] SIG.R = FC61611EAA5E8A5204365140FFB8A71457FB3A67F0A90D5B6BA067F8CAB57487599DAA576696C56463AABF98878E27F6
3,332,912 UART: [art] SIG.S = EA2689258D94312789E1D2433FA2C54AA1FB3E3D5C2C160662F7B92A149E58A509FE6F1B5496BE349FD18B403B2BF5A8
3,356,596 UART: Caliptra RT
3,356,847 UART: [state] CFI Enabled
3,477,034 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,470 UART: [rt]cmd =0x52435458, len=8
3,508,564 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,911 UART: [state] LifecycleState = Unprovisioned
85,566 UART: [state] DebugLocked = No
86,268 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,956 UART: [kat] SHA2-256
881,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,002 UART: [kat] ++
886,154 UART: [kat] sha1
890,506 UART: [kat] SHA2-256
892,444 UART: [kat] SHA2-384
895,259 UART: [kat] SHA2-512-ACC
897,160 UART: [kat] ECC-384
902,613 UART: [kat] HMAC-384Kdf
907,193 UART: [kat] LMS
1,475,389 UART: [kat] --
1,476,344 UART: [cold-reset] ++
1,476,794 UART: [fht] Storing FHT @ 0x50003400
1,479,487 UART: [idev] ++
1,479,655 UART: [idev] CDI.KEYID = 6
1,480,015 UART: [idev] SUBJECT.KEYID = 7
1,480,439 UART: [idev] UDS.KEYID = 0
1,480,784 ready_for_fw is high
1,480,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,573 UART: [idev] Erasing UDS.KEYID = 0
1,505,561 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,261 UART: [idev] --
1,515,284 UART: [ldev] ++
1,515,452 UART: [ldev] CDI.KEYID = 6
1,515,815 UART: [ldev] SUBJECT.KEYID = 5
1,516,241 UART: [ldev] AUTHORITY.KEYID = 7
1,516,704 UART: [ldev] FE.KEYID = 1
1,521,820 UART: [ldev] Erasing FE.KEYID = 1
1,547,759 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,767 UART: [ldev] --
1,587,190 UART: [fwproc] Waiting for Commands...
1,587,991 UART: [fwproc] Received command 0x46574c44
1,588,782 UART: [fwproc] Received Image of size 118548 bytes
2,933,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,196 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,414 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,679 >>> mbox cmd response: success
3,131,679 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,735 UART: [afmc] ++
3,132,903 UART: [afmc] CDI.KEYID = 6
3,133,265 UART: [afmc] SUBJECT.KEYID = 7
3,133,690 UART: [afmc] AUTHORITY.KEYID = 5
3,168,891 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,215 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,995 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,704 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,587 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,270 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,230 UART: [afmc] --
3,212,124 UART: [cold-reset] --
3,213,020 UART: [state] Locking Datavault
3,213,975 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,579 UART: [state] Locking ICCM
3,215,083 UART: [exit] Launching FMC @ 0x40000130
3,220,413 UART:
3,220,429 UART: Running Caliptra FMC ...
3,220,837 UART:
3,220,980 UART: [state] CFI Enabled
3,231,824 UART: [fht] FMC Alias Private Key: 7
3,350,672 UART: [art] Extend RT PCRs Done
3,351,100 UART: [art] Lock RT PCRs Done
3,352,342 UART: [art] Populate DV Done
3,360,739 UART: [fht] FMC Alias Private Key: 7
3,361,867 UART: [art] Derive CDI
3,362,147 UART: [art] Store in slot 0x4
3,447,843 UART: [art] Derive Key Pair
3,448,203 UART: [art] Store priv key in slot 0x5
3,461,908 UART: [art] Derive Key Pair - Done
3,476,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,153 UART: [art] PUB.X = 97FDFEA02DDB5D3D66DB72B6635491AC0A48A398569D5FB21945ACCDFAFB74701A7591C6FA9D18F938BBF8E38AEF11C4
3,498,942 UART: [art] PUB.Y = F76902F96C7062AC4403063ACCCC277B4C7BF0F9D9A9E81C7951B957B39C7FFDAE225AC0ADC6CE9F76FCE074AC08F24D
3,505,902 UART: [art] SIG.R = 61787C4E0E3DBA61E3F4639404DC00678D5E8DE4C971605ADAAF66C888EFFA60C1618804F0B2692F95F1B6AF8F4717A2
3,512,649 UART: [art] SIG.S = 4AFF829A1D736BE84C66E5C8B5353A3A3736EE3CFAD004B193D7FA0694A68F23512EB9B446AF9FBC26C3C26C8609C063
3,536,236 UART: Caliptra RT
3,536,579 UART: [state] CFI Enabled
3,656,894 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,076 UART: [rt]cmd =0x52435458, len=8
3,688,052 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,434 ready_for_fw is high
1,363,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,749 >>> mbox cmd response: success
2,982,749 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,044,816 UART:
3,044,832 UART: Running Caliptra FMC ...
3,045,240 UART:
3,045,383 UART: [state] CFI Enabled
3,055,935 UART: [fht] FMC Alias Private Key: 7
3,174,583 UART: [art] Extend RT PCRs Done
3,175,011 UART: [art] Lock RT PCRs Done
3,176,369 UART: [art] Populate DV Done
3,184,606 UART: [fht] FMC Alias Private Key: 7
3,185,648 UART: [art] Derive CDI
3,185,928 UART: [art] Store in slot 0x4
3,271,442 UART: [art] Derive Key Pair
3,271,802 UART: [art] Store priv key in slot 0x5
3,285,637 UART: [art] Derive Key Pair - Done
3,300,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,752 UART: [art] PUB.X = 3B3FEAC0160ACC2EB74E5BD25FAFD1757977C0F966E3CDE5E8D88F7FEE3665E0DABB4AFBEDD1EB1A9CFA2CBF21D1F41E
3,323,561 UART: [art] PUB.Y = 38DCB8C038E0B4A171C16B9F54659EC447D525F8A202AC1CFB20D26510B700A6B11B9D82ED7896DBB73CDA5E694B96EC
3,330,500 UART: [art] SIG.R = E51E76538999880F3C13DDAB50A6BD42641C3C60F49ED043795CF52AD7D109F02A6100463BE94B58243B9A374CF1000B
3,337,217 UART: [art] SIG.S = 3AB8F2FF889C2C8D213D4AE3BD69A4784453078EAABD7ACC532CF430D8C1AD297A63EA283D854B4E945AB4040BF9683F
3,360,772 UART: Caliptra RT
3,361,115 UART: [state] CFI Enabled
3,482,227 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,543 UART: [rt]cmd =0x52435458, len=8
3,513,719 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,716 UART: [state] LifecycleState = Unprovisioned
85,371 UART: [state] DebugLocked = No
85,925 UART: [state] WD Timer not started. Device not locked for debugging
87,236 UART: [kat] SHA2-256
890,786 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,890 UART: [kat] ++
895,042 UART: [kat] sha1
899,312 UART: [kat] SHA2-256
901,252 UART: [kat] SHA2-384
904,173 UART: [kat] SHA2-512-ACC
906,074 UART: [kat] ECC-384
915,917 UART: [kat] HMAC-384Kdf
920,467 UART: [kat] LMS
1,168,779 UART: [kat] --
1,169,760 UART: [cold-reset] ++
1,170,202 UART: [fht] FHT @ 0x50003400
1,172,642 UART: [idev] ++
1,172,810 UART: [idev] CDI.KEYID = 6
1,173,171 UART: [idev] SUBJECT.KEYID = 7
1,173,596 UART: [idev] UDS.KEYID = 0
1,173,942 ready_for_fw is high
1,173,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,323 UART: [idev] Erasing UDS.KEYID = 0
1,198,519 UART: [idev] Sha1 KeyId Algorithm
1,207,519 UART: [idev] --
1,208,584 UART: [ldev] ++
1,208,752 UART: [ldev] CDI.KEYID = 6
1,209,116 UART: [ldev] SUBJECT.KEYID = 5
1,209,543 UART: [ldev] AUTHORITY.KEYID = 7
1,210,006 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,241,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,740 UART: [ldev] --
1,280,135 UART: [fwproc] Wait for Commands...
1,280,744 UART: [fwproc] Recv command 0x46574c44
1,281,477 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,355 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,530 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,751 >>> mbox cmd response: success
2,824,751 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,825,969 UART: [afmc] ++
2,826,137 UART: [afmc] CDI.KEYID = 6
2,826,500 UART: [afmc] SUBJECT.KEYID = 7
2,826,926 UART: [afmc] AUTHORITY.KEYID = 5
2,862,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,313 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,023 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,904 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,605 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,312 UART: [afmc] --
2,905,241 UART: [cold-reset] --
2,905,931 UART: [state] Locking Datavault
2,907,082 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,686 UART: [state] Locking ICCM
2,908,116 UART: [exit] Launching FMC @ 0x40000130
2,913,446 UART:
2,913,462 UART: Running Caliptra FMC ...
2,913,870 UART:
2,913,924 UART: [state] CFI Enabled
2,924,292 UART: [fht] FMC Alias Private Key: 7
3,044,172 UART: [art] Extend RT PCRs Done
3,044,600 UART: [art] Lock RT PCRs Done
3,046,028 UART: [art] Populate DV Done
3,054,395 UART: [fht] FMC Alias Private Key: 7
3,055,549 UART: [art] Derive CDI
3,055,829 UART: [art] Store in slot 0x4
3,141,826 UART: [art] Derive Key Pair
3,142,186 UART: [art] Store priv key in slot 0x5
3,155,312 UART: [art] Derive Key Pair - Done
3,169,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,977 UART: [art] PUB.X = A813804FCB80FFCEA5B61F7F9C6C29D98E3981DC141B1FE83D85DBA278353319F60649E36532FE749B2ACA246A787211
3,192,750 UART: [art] PUB.Y = 4EB9E787BAE6C9E8E6DC4ED88D233310B8EC630412996FF36D0E34AB87719DFE18ACF0CA87CB2A66FA15EAEAC7D01C03
3,199,715 UART: [art] SIG.R = FCD056E7BE58E24441A3DAD225BC35E4AC2C4A82015F3396A6D88B82CF20F5BF79F4E2F4940BCD5F0C2642DC26829B0E
3,206,489 UART: [art] SIG.S = D104F0D3A788606D319A87E237C5D7B3A19E771B5F8B10780D0B1CEC655C47B7749CF63B620B70C802FFD57940BE8780
3,230,428 UART: Caliptra RT
3,230,679 UART: [state] CFI Enabled
3,351,315 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,919 UART: [rt]cmd =0x52435458, len=8
3,382,863 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,698 ready_for_fw is high
1,059,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,154 >>> mbox cmd response: success
2,678,154 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,501 UART:
2,740,517 UART: Running Caliptra FMC ...
2,740,925 UART:
2,740,979 UART: [state] CFI Enabled
2,751,355 UART: [fht] FMC Alias Private Key: 7
2,869,531 UART: [art] Extend RT PCRs Done
2,869,959 UART: [art] Lock RT PCRs Done
2,871,403 UART: [art] Populate DV Done
2,879,666 UART: [fht] FMC Alias Private Key: 7
2,880,732 UART: [art] Derive CDI
2,881,012 UART: [art] Store in slot 0x4
2,966,421 UART: [art] Derive Key Pair
2,966,781 UART: [art] Store priv key in slot 0x5
2,979,785 UART: [art] Derive Key Pair - Done
2,994,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,196 UART: [art] PUB.X = 64B82762F538ADBB099A893EE198342493A876CD4428384353AB1A172D14AA18216BA0DACACC776C256BAC2EDF2A32EB
3,017,973 UART: [art] PUB.Y = 1103A8B1C32CC3231D64C6F6F614B3640B0357282290733C653D5D545E5F16EFDEE249881D131CFCD09878B62850EA36
3,024,910 UART: [art] SIG.R = 6FBC8DFA1F0ECB2BBD7B083B9A483D99E3A654E48A82B9EE651C5596278C617EE1A157F735E27D4009B55B2E7B8913A9
3,031,683 UART: [art] SIG.S = 8701A372D9447AFF2760943A9177A76533B35458071FEB7C6683062D81FC609489F70B27D58B5FE4C171F5E736CCAC78
3,055,457 UART: Caliptra RT
3,055,708 UART: [state] CFI Enabled
3,175,577 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,015 UART: [rt]cmd =0x52435458, len=8
3,207,183 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,783 UART: [kat] SHA2-256
901,723 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
916,412 UART: [kat] HMAC-384Kdf
921,022 UART: [kat] LMS
1,169,334 UART: [kat] --
1,170,347 UART: [cold-reset] ++
1,170,697 UART: [fht] FHT @ 0x50003400
1,173,193 UART: [idev] ++
1,173,361 UART: [idev] CDI.KEYID = 6
1,173,722 UART: [idev] SUBJECT.KEYID = 7
1,174,147 UART: [idev] UDS.KEYID = 0
1,174,493 ready_for_fw is high
1,174,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,016 UART: [idev] Erasing UDS.KEYID = 0
1,199,124 UART: [idev] Sha1 KeyId Algorithm
1,207,942 UART: [idev] --
1,208,905 UART: [ldev] ++
1,209,073 UART: [ldev] CDI.KEYID = 6
1,209,437 UART: [ldev] SUBJECT.KEYID = 5
1,209,864 UART: [ldev] AUTHORITY.KEYID = 7
1,210,327 UART: [ldev] FE.KEYID = 1
1,215,611 UART: [ldev] Erasing FE.KEYID = 1
1,242,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,917 UART: [ldev] --
1,281,214 UART: [fwproc] Wait for Commands...
1,281,857 UART: [fwproc] Recv command 0x46574c44
1,282,590 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,458 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,633 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,006 >>> mbox cmd response: success
2,826,006 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,827,054 UART: [afmc] ++
2,827,222 UART: [afmc] CDI.KEYID = 6
2,827,585 UART: [afmc] SUBJECT.KEYID = 7
2,828,011 UART: [afmc] AUTHORITY.KEYID = 5
2,863,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,648 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,358 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,239 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,940 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,513 UART: [afmc] --
2,906,370 UART: [cold-reset] --
2,907,390 UART: [state] Locking Datavault
2,908,567 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,171 UART: [state] Locking ICCM
2,909,617 UART: [exit] Launching FMC @ 0x40000130
2,914,947 UART:
2,914,963 UART: Running Caliptra FMC ...
2,915,371 UART:
2,915,514 UART: [state] CFI Enabled
2,926,098 UART: [fht] FMC Alias Private Key: 7
3,045,304 UART: [art] Extend RT PCRs Done
3,045,732 UART: [art] Lock RT PCRs Done
3,047,272 UART: [art] Populate DV Done
3,055,551 UART: [fht] FMC Alias Private Key: 7
3,056,655 UART: [art] Derive CDI
3,056,935 UART: [art] Store in slot 0x4
3,142,864 UART: [art] Derive Key Pair
3,143,224 UART: [art] Store priv key in slot 0x5
3,156,820 UART: [art] Derive Key Pair - Done
3,171,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,391 UART: [art] PUB.X = 9C096240B9DF0EC9A411081E42E175B0D53C66804366F504453D43077520571E7E16CD25EAB525821BC178BB708A379D
3,194,138 UART: [art] PUB.Y = 95A78D8542F777C1413D01DDAF1D6B333104F6146F7C624CEB9499AD896926CF27047C8888A26256645F35429824DAA8
3,201,071 UART: [art] SIG.R = 345AEFA84108506E1C8DDAC079BF0A6FAE31B668AD8DB0F6897761A65B30AF5D927E49506D49FDEEA251952C1D693F05
3,207,844 UART: [art] SIG.S = 854FAB9ACA6128B828A79D05E13290FFA4C5A0E26B2423CF611FBCADA6B3E4905ADCFFF75F34E93A3D00A0C260191F98
3,231,445 UART: Caliptra RT
3,231,788 UART: [state] CFI Enabled
3,350,947 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,455 UART: [rt]cmd =0x52435458, len=8
3,382,437 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,869 ready_for_fw is high
1,059,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,767 >>> mbox cmd response: success
2,678,767 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,386 UART:
2,740,402 UART: Running Caliptra FMC ...
2,740,810 UART:
2,740,953 UART: [state] CFI Enabled
2,751,493 UART: [fht] FMC Alias Private Key: 7
2,870,001 UART: [art] Extend RT PCRs Done
2,870,429 UART: [art] Lock RT PCRs Done
2,871,705 UART: [art] Populate DV Done
2,879,894 UART: [fht] FMC Alias Private Key: 7
2,880,918 UART: [art] Derive CDI
2,881,198 UART: [art] Store in slot 0x4
2,966,803 UART: [art] Derive Key Pair
2,967,163 UART: [art] Store priv key in slot 0x5
2,980,701 UART: [art] Derive Key Pair - Done
2,995,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,764 UART: [art] PUB.X = 75030FD62CA7B0CF1CE6A420C2C217F4E688EA2509797F2A795E3D81AFF1874565EF04A4B749403A302401C211386AE0
3,018,519 UART: [art] PUB.Y = 171A827DFBF136BA3A9869F2F9C7A7CFD9BEA5C015149F33CC2C7882D161D6D054636E8835B6BA5DE6EB79C92C70BD1B
3,025,485 UART: [art] SIG.R = CF2D3BBED7A2A103CFC66BFED54323AE632EF6BB33A6F59ADEA20A508B0FD8EBD63E0E741A23BFED105D93C56B99D136
3,032,273 UART: [art] SIG.S = 166CD680047EBB47E16CDBAAA901D9610B42B06E9BBAEC82C64565F255347E1190877613408BDFCA7327B10DEFDD1390
3,056,415 UART: Caliptra RT
3,056,758 UART: [state] CFI Enabled
3,175,459 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,747 UART: [rt]cmd =0x52435458, len=8
3,206,845 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,727 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
893,544 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,669 UART: [kat] ++
897,821 UART: [kat] sha1
901,949 UART: [kat] SHA2-256
903,889 UART: [kat] SHA2-384
906,844 UART: [kat] SHA2-512-ACC
908,745 UART: [kat] ECC-384
918,666 UART: [kat] HMAC-384Kdf
923,258 UART: [kat] LMS
1,171,586 UART: [kat] --
1,172,705 UART: [cold-reset] ++
1,173,087 UART: [fht] FHT @ 0x50003400
1,175,662 UART: [idev] ++
1,175,830 UART: [idev] CDI.KEYID = 6
1,176,190 UART: [idev] SUBJECT.KEYID = 7
1,176,614 UART: [idev] UDS.KEYID = 0
1,176,959 ready_for_fw is high
1,176,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,884 UART: [idev] Erasing UDS.KEYID = 0
1,202,393 UART: [idev] Sha1 KeyId Algorithm
1,210,783 UART: [idev] --
1,211,843 UART: [ldev] ++
1,212,011 UART: [ldev] CDI.KEYID = 6
1,212,374 UART: [ldev] SUBJECT.KEYID = 5
1,212,800 UART: [ldev] AUTHORITY.KEYID = 7
1,213,263 UART: [ldev] FE.KEYID = 1
1,218,487 UART: [ldev] Erasing FE.KEYID = 1
1,244,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,783 UART: [ldev] --
1,284,282 UART: [fwproc] Wait for Commands...
1,284,930 UART: [fwproc] Recv command 0x46574c44
1,285,658 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,243 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,413 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,658 >>> mbox cmd response: success
2,828,658 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,829,810 UART: [afmc] ++
2,829,978 UART: [afmc] CDI.KEYID = 6
2,830,340 UART: [afmc] SUBJECT.KEYID = 7
2,830,765 UART: [afmc] AUTHORITY.KEYID = 5
2,865,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,757 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,466 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,349 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,050 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,916 UART: [afmc] --
2,908,798 UART: [cold-reset] --
2,909,748 UART: [state] Locking Datavault
2,910,931 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,535 UART: [state] Locking ICCM
2,912,117 UART: [exit] Launching FMC @ 0x40000130
2,917,447 UART:
2,917,463 UART: Running Caliptra FMC ...
2,917,871 UART:
2,917,925 UART: [state] CFI Enabled
2,928,549 UART: [fht] FMC Alias Private Key: 7
3,047,467 UART: [art] Extend RT PCRs Done
3,047,895 UART: [art] Lock RT PCRs Done
3,049,451 UART: [art] Populate DV Done
3,057,840 UART: [fht] FMC Alias Private Key: 7
3,059,014 UART: [art] Derive CDI
3,059,294 UART: [art] Store in slot 0x4
3,145,183 UART: [art] Derive Key Pair
3,145,543 UART: [art] Store priv key in slot 0x5
3,158,787 UART: [art] Derive Key Pair - Done
3,173,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,521 UART: [art] PUB.X = 50B6B5A5AE4FBA01D69CA73CD7CAF646311A1B8FC0C0872A31375F760590F2D822BFB8602E5A8F95A3645F32C8558576
3,196,291 UART: [art] PUB.Y = DF4789BB1B6CB077E1BAB1AC02E0E285BA64B0057AF465264ACAC8AF00E96A798658D23BCA32E67D04C6D53C4C109B04
3,203,223 UART: [art] SIG.R = 5D07B1C7504B949B40178F6103F75A7979FC92287B1CBA485A0CE823081BB99DADFABE73BBD7085F32E99A040753E402
3,209,973 UART: [art] SIG.S = CE578FDB944EAEDFCD6EF8F1E2D0E4D4566D8CC58042BB725D4D6468522E7DF842D4758AA8ACC62874BA65D5E7DFFB9D
3,234,685 UART: Caliptra RT
3,234,936 UART: [state] CFI Enabled
3,354,485 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,967 UART: [rt]cmd =0x52435458, len=8
3,385,849 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,845 ready_for_fw is high
1,059,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,944 >>> mbox cmd response: success
2,678,944 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,741,353 UART:
2,741,369 UART: Running Caliptra FMC ...
2,741,777 UART:
2,741,831 UART: [state] CFI Enabled
2,752,387 UART: [fht] FMC Alias Private Key: 7
2,871,679 UART: [art] Extend RT PCRs Done
2,872,107 UART: [art] Lock RT PCRs Done
2,873,407 UART: [art] Populate DV Done
2,881,558 UART: [fht] FMC Alias Private Key: 7
2,882,726 UART: [art] Derive CDI
2,883,006 UART: [art] Store in slot 0x4
2,968,683 UART: [art] Derive Key Pair
2,969,043 UART: [art] Store priv key in slot 0x5
2,982,399 UART: [art] Derive Key Pair - Done
2,997,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,632 UART: [art] PUB.X = 17EE80E8D3F5D628E5798A3CCE2F7936E14F9FB18300EE460F96DCB5A1710FC1C612429C0C1E1932F03C757E1FEFFD3C
3,020,385 UART: [art] PUB.Y = 9AA4950EE5C32DC6362027110CD87A772945CBB36190C6570C2F0D61828B8E5E1821DF6A6C782E7F49FAAFE57D84261E
3,027,327 UART: [art] SIG.R = E6341F648104A37A8D5F113C40277A0CF5300851D144FA7FB39D5056D894297FD65D2478E320A45DE66579C9E5929E27
3,034,080 UART: [art] SIG.S = BFD684DED6142ABE6DF45361D0E9044E69DC21C705D86AEB489BE520A7AEEFF8A23C7FB25AC28EBB889193D1A4577DE1
3,058,220 UART: Caliptra RT
3,058,471 UART: [state] CFI Enabled
3,177,109 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,577 UART: [rt]cmd =0x52435458, len=8
3,208,575 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
893,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,658 UART: [kat] ++
897,810 UART: [kat] sha1
902,142 UART: [kat] SHA2-256
904,082 UART: [kat] SHA2-384
906,893 UART: [kat] SHA2-512-ACC
908,794 UART: [kat] ECC-384
918,089 UART: [kat] HMAC-384Kdf
922,823 UART: [kat] LMS
1,171,151 UART: [kat] --
1,171,906 UART: [cold-reset] ++
1,172,448 UART: [fht] FHT @ 0x50003400
1,175,085 UART: [idev] ++
1,175,253 UART: [idev] CDI.KEYID = 6
1,175,613 UART: [idev] SUBJECT.KEYID = 7
1,176,037 UART: [idev] UDS.KEYID = 0
1,176,382 ready_for_fw is high
1,176,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,801 UART: [idev] Erasing UDS.KEYID = 0
1,200,702 UART: [idev] Sha1 KeyId Algorithm
1,209,034 UART: [idev] --
1,210,074 UART: [ldev] ++
1,210,242 UART: [ldev] CDI.KEYID = 6
1,210,605 UART: [ldev] SUBJECT.KEYID = 5
1,211,031 UART: [ldev] AUTHORITY.KEYID = 7
1,211,494 UART: [ldev] FE.KEYID = 1
1,216,772 UART: [ldev] Erasing FE.KEYID = 1
1,243,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,632 UART: [ldev] --
1,283,093 UART: [fwproc] Wait for Commands...
1,283,781 UART: [fwproc] Recv command 0x46574c44
1,284,509 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,073 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,243 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,624 >>> mbox cmd response: success
2,826,624 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,827,882 UART: [afmc] ++
2,828,050 UART: [afmc] CDI.KEYID = 6
2,828,412 UART: [afmc] SUBJECT.KEYID = 7
2,828,837 UART: [afmc] AUTHORITY.KEYID = 5
2,863,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,389 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,137 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,846 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,729 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,430 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,420 UART: [afmc] --
2,907,460 UART: [cold-reset] --
2,908,506 UART: [state] Locking Datavault
2,909,947 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,551 UART: [state] Locking ICCM
2,911,189 UART: [exit] Launching FMC @ 0x40000130
2,916,519 UART:
2,916,535 UART: Running Caliptra FMC ...
2,916,943 UART:
2,917,086 UART: [state] CFI Enabled
2,927,414 UART: [fht] FMC Alias Private Key: 7
3,045,826 UART: [art] Extend RT PCRs Done
3,046,254 UART: [art] Lock RT PCRs Done
3,047,504 UART: [art] Populate DV Done
3,055,595 UART: [fht] FMC Alias Private Key: 7
3,056,601 UART: [art] Derive CDI
3,056,881 UART: [art] Store in slot 0x4
3,142,652 UART: [art] Derive Key Pair
3,143,012 UART: [art] Store priv key in slot 0x5
3,156,268 UART: [art] Derive Key Pair - Done
3,170,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,923 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,688 UART: [art] PUB.X = F57D1F9F6E407F4016997ECCB191BFADDB313C705012D9F971F1C052F3B2462137A50399DC80FE4C21A8FE0E3D1207F0
3,194,457 UART: [art] PUB.Y = A89AD75EABD17B4B33E1A7FC64CC17AA88CC28BFEE36CDD9180640E16B32D75AF656EADF90BADB1EBCFD91405A8D7889
3,201,434 UART: [art] SIG.R = 6A6D0BA66BBC9390AC8DC47CA3F3796C99C3A764879DD5B43AC30C849D0FD2C59FB79114E75321FFEBA78621C19631AE
3,208,209 UART: [art] SIG.S = 18A7F21D32FC68D3C06EDFB48AE8FA16C89C254F048183DB4D9ECC25EEC82AF751083187768EBDFF26641BF09598034D
3,231,490 UART: Caliptra RT
3,231,833 UART: [state] CFI Enabled
3,352,175 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,497 UART: [rt]cmd =0x52435458, len=8
3,383,567 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,360 ready_for_fw is high
1,060,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,479 >>> mbox cmd response: success
2,679,479 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,741,416 UART:
2,741,432 UART: Running Caliptra FMC ...
2,741,840 UART:
2,741,983 UART: [state] CFI Enabled
2,752,389 UART: [fht] FMC Alias Private Key: 7
2,870,685 UART: [art] Extend RT PCRs Done
2,871,113 UART: [art] Lock RT PCRs Done
2,872,653 UART: [art] Populate DV Done
2,880,908 UART: [fht] FMC Alias Private Key: 7
2,882,052 UART: [art] Derive CDI
2,882,332 UART: [art] Store in slot 0x4
2,968,071 UART: [art] Derive Key Pair
2,968,431 UART: [art] Store priv key in slot 0x5
2,981,939 UART: [art] Derive Key Pair - Done
2,996,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,729 UART: [art] PUB.X = 829E3280C8F79ED84C42A2F6E6FD665C3BAFDE0A48CA3FC6FB9B82FEA3A59F3E3884F95839A942C203E8C8FB11159518
3,019,507 UART: [art] PUB.Y = 54B58B85C5C09DD9283D792C1D22BC2B3335E94A8F43AF7BEE0E2875AE683430037CF4C16C9DED9FF6EDB30D12C09F23
3,026,462 UART: [art] SIG.R = 6C1E9C163B709C70D7CB6352335824EBBC30B9EE5F7C4713D00242AD7315F3F1F71E82F4ABC1328C0BEBB209252DFE1E
3,033,235 UART: [art] SIG.S = 52C52EA36F3860A00F6A87910BD200B534D83819EC7EA9A37F1AD4846845EA338081142B4FCA559D99566390C62C9187
3,056,777 UART: Caliptra RT
3,057,120 UART: [state] CFI Enabled
3,176,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,016 UART: [rt]cmd =0x52435458, len=8
3,207,990 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,104 UART:
192,459 UART: Running Caliptra ROM ...
193,657 UART:
193,818 UART: [state] CFI Enabled
263,462 UART: [state] LifecycleState = Unprovisioned
265,397 UART: [state] DebugLocked = No
268,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,085 UART: [kat] SHA2-256
442,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,307 UART: [kat] ++
453,794 UART: [kat] sha1
464,981 UART: [kat] SHA2-256
467,692 UART: [kat] SHA2-384
473,693 UART: [kat] SHA2-512-ACC
476,066 UART: [kat] ECC-384
2,767,036 UART: [kat] HMAC-384Kdf
2,798,939 UART: [kat] LMS
3,989,227 UART: [kat] --
3,992,651 UART: [cold-reset] ++
3,994,374 UART: [fht] Storing FHT @ 0x50003400
4,005,924 UART: [idev] ++
4,006,491 UART: [idev] CDI.KEYID = 6
4,007,416 UART: [idev] SUBJECT.KEYID = 7
4,008,667 UART: [idev] UDS.KEYID = 0
4,009,694 ready_for_fw is high
4,009,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,341 UART: [idev] Erasing UDS.KEYID = 0
7,348,805 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,182 UART: [idev] --
7,372,307 UART: [ldev] ++
7,372,876 UART: [ldev] CDI.KEYID = 6
7,373,855 UART: [ldev] SUBJECT.KEYID = 5
7,375,069 UART: [ldev] AUTHORITY.KEYID = 7
7,376,301 UART: [ldev] FE.KEYID = 1
7,422,886 UART: [ldev] Erasing FE.KEYID = 1
10,756,068 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,504 UART: [ldev] --
13,136,682 UART: [fwproc] Waiting for Commands...
13,139,973 UART: [fwproc] Received command 0x46574c44
13,142,153 UART: [fwproc] Received Image of size 118548 bytes
17,249,354 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,332,966 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,406,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,735,111 >>> mbox cmd response: success
17,736,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,739,563 UART: [afmc] ++
17,740,184 UART: [afmc] CDI.KEYID = 6
17,741,099 UART: [afmc] SUBJECT.KEYID = 7
17,742,322 UART: [afmc] AUTHORITY.KEYID = 5
21,115,084 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,413,709 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,415,966 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,430,432 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,445,164 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,459,542 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,480,112 UART: [afmc] --
23,484,458 UART: [cold-reset] --
23,490,313 UART: [state] Locking Datavault
23,495,663 UART: [state] Locking PCR0, PCR1 and PCR31
23,497,425 UART: [state] Locking ICCM
23,498,877 UART: [exit] Launching FMC @ 0x40000130
23,507,270 UART:
23,507,512 UART: Running Caliptra FMC ...
23,508,615 UART:
23,508,774 UART: [state] CFI Enabled
23,572,609 UART: [fht] FMC Alias Private Key: 7
25,913,005 UART: [art] Extend RT PCRs Done
25,914,242 UART: [art] Lock RT PCRs Done
25,915,845 UART: [art] Populate DV Done
25,921,279 UART: [fht] FMC Alias Private Key: 7
25,922,816 UART: [art] Derive CDI
25,923,628 UART: [art] Store in slot 0x4
25,980,431 UART: [art] Derive Key Pair
25,981,469 UART: [art] Store priv key in slot 0x5
29,274,155 UART: [art] Derive Key Pair - Done
29,287,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,574,953 UART: [art] Erasing AUTHORITY.KEYID = 7
31,576,469 UART: [art] PUB.X = 6D31691FC66D35F96D3EBDA29A8971B108625D58353BB997DD887C3879D2B97455D2F2356EF29FAED427D435B756009E
31,583,698 UART: [art] PUB.Y = 3D59522C3F34A0E629686216879DFE52DF753ADFBC5201423CF74A97A1EF4482B6D0925CD1380974D08E072B09F48DEA
31,590,907 UART: [art] SIG.R = DE6B44E0E972C009F6F081A630AED1AA349FAAC3086A95778774BE37065C2110514F934764E9960715C3C9E05241B606
31,598,320 UART: [art] SIG.S = F637D9D59C5901A61E86E360DC05D11976755B33A651A986D316ECE33BABD6A275E0AA10201C3097045B9702FD8B4FCF
32,903,563 UART: Caliptra RT
32,904,291 UART: [state] CFI Enabled
33,080,084 UART: [rt] RT listening for mailbox commands...
33,112,260 UART: [rt]cmd =0x44504543, len=96
33,143,896 >>> mbox cmd response data (56 bytes)
33,144,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,175,525 UART: [rt]cmd =0x44504543, len=96
33,207,564 >>> mbox cmd response data (56 bytes)
33,208,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,238,770 UART: [rt]cmd =0x44504543, len=96
33,271,070 >>> mbox cmd response data (56 bytes)
33,271,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,302,214 UART: [rt]cmd =0x44504543, len=96
33,334,827 >>> mbox cmd response data (56 bytes)
33,335,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,366,047 UART: [rt]cmd =0x44504543, len=96
33,397,832 >>> mbox cmd response data (56 bytes)
33,398,512 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,429,050 UART: [rt]cmd =0x44504543, len=96
33,460,511 >>> mbox cmd response data (56 bytes)
33,461,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,491,903 UART: [rt]cmd =0x44504543, len=96
33,523,470 >>> mbox cmd response data (56 bytes)
33,524,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,554,635 UART: [rt]cmd =0x44504543, len=96
33,586,776 >>> mbox cmd response data (56 bytes)
33,587,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,617,961 UART: [rt]cmd =0x44504543, len=96
33,649,975 >>> mbox cmd response data (56 bytes)
33,650,642 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,681,236 UART: [rt]cmd =0x44504543, len=96
33,713,555 >>> mbox cmd response data (56 bytes)
33,714,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,744,665 UART: [rt]cmd =0x44504543, len=96
33,777,096 >>> mbox cmd response data (56 bytes)
33,777,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,808,324 UART: [rt]cmd =0x44504543, len=96
33,840,885 >>> mbox cmd response data (56 bytes)
33,842,013 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,871,891 UART: [rt]cmd =0x52435458, len=8
33,874,043 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,804,058 ready_for_fw is high
3,804,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,952,460 >>> mbox cmd response: success
17,953,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,653,951 UART:
23,654,339 UART: Running Caliptra FMC ...
23,655,447 UART:
23,655,602 UART: [state] CFI Enabled
23,723,368 UART: [fht] FMC Alias Private Key: 7
26,064,139 UART: [art] Extend RT PCRs Done
26,065,496 UART: [art] Lock RT PCRs Done
26,066,943 UART: [art] Populate DV Done
26,072,364 UART: [fht] FMC Alias Private Key: 7
26,074,118 UART: [art] Derive CDI
26,074,862 UART: [art] Store in slot 0x4
26,131,579 UART: [art] Derive Key Pair
26,132,578 UART: [art] Store priv key in slot 0x5
29,424,901 UART: [art] Derive Key Pair - Done
29,437,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,726,294 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,800 UART: [art] PUB.X = B2FF56156B98DE051C9D8840CDCAC6F563BD0037734F4364B3ED197FA14FF422714F8D234C769F7BEF9F72E67CD36F89
31,735,067 UART: [art] PUB.Y = A1BA3DD286E0BBB76C506EFFC70024D8AA5AE0F0E57BBD8FDDD8C20D7670C1977EEF3272855C5CA905EEDDC066D63F50
31,742,335 UART: [art] SIG.R = 9E280F47ABB3000DB697757FE6D7FA92353BA5062203241A0EB51824A57B63BD0056EEDDC104FDDA496B58ECAF55E226
31,749,736 UART: [art] SIG.S = 6D384F0C69FF894C665F390304E5348DA8B7FF01FD7B9061D9A02566D004DF0003E2F27BFE8E7B6A1C5543E87EDDF1CE
33,054,901 UART: Caliptra RT
33,055,623 UART: [state] CFI Enabled
33,232,714 UART: [rt] RT listening for mailbox commands...
33,264,725 UART: [rt]cmd =0x44504543, len=96
33,296,274 >>> mbox cmd response data (56 bytes)
33,297,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,327,859 UART: [rt]cmd =0x44504543, len=96
33,359,579 >>> mbox cmd response data (56 bytes)
33,360,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,390,900 UART: [rt]cmd =0x44504543, len=96
33,423,353 >>> mbox cmd response data (56 bytes)
33,424,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,454,680 UART: [rt]cmd =0x44504543, len=96
33,486,361 >>> mbox cmd response data (56 bytes)
33,487,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,517,472 UART: [rt]cmd =0x44504543, len=96
33,549,021 >>> mbox cmd response data (56 bytes)
33,549,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,580,318 UART: [rt]cmd =0x44504543, len=96
33,612,348 >>> mbox cmd response data (56 bytes)
33,613,071 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,643,444 UART: [rt]cmd =0x44504543, len=96
33,675,522 >>> mbox cmd response data (56 bytes)
33,676,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,706,781 UART: [rt]cmd =0x44504543, len=96
33,738,417 >>> mbox cmd response data (56 bytes)
33,739,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,769,622 UART: [rt]cmd =0x44504543, len=96
33,801,455 >>> mbox cmd response data (56 bytes)
33,802,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,832,569 UART: [rt]cmd =0x44504543, len=96
33,864,512 >>> mbox cmd response data (56 bytes)
33,865,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,895,833 UART: [rt]cmd =0x44504543, len=96
33,927,853 >>> mbox cmd response data (56 bytes)
33,928,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,958,986 UART: [rt]cmd =0x44504543, len=96
33,991,177 >>> mbox cmd response data (56 bytes)
33,992,395 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
34,022,193 UART: [rt]cmd =0x52435458, len=8
34,023,977 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,443 UART:
192,819 UART: Running Caliptra ROM ...
194,023 UART:
603,555 UART: [state] CFI Enabled
618,931 UART: [state] LifecycleState = Unprovisioned
620,868 UART: [state] DebugLocked = No
622,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,884 UART: [kat] SHA2-256
797,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,184 UART: [kat] ++
808,634 UART: [kat] sha1
818,960 UART: [kat] SHA2-256
821,673 UART: [kat] SHA2-384
828,102 UART: [kat] SHA2-512-ACC
830,463 UART: [kat] ECC-384
3,113,362 UART: [kat] HMAC-384Kdf
3,124,474 UART: [kat] LMS
4,314,580 UART: [kat] --
4,319,039 UART: [cold-reset] ++
4,321,190 UART: [fht] Storing FHT @ 0x50003400
4,331,908 UART: [idev] ++
4,332,510 UART: [idev] CDI.KEYID = 6
4,333,426 UART: [idev] SUBJECT.KEYID = 7
4,334,663 UART: [idev] UDS.KEYID = 0
4,335,744 ready_for_fw is high
4,335,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,905 UART: [idev] Erasing UDS.KEYID = 0
7,624,444 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,146 UART: [idev] --
7,649,126 UART: [ldev] ++
7,649,687 UART: [ldev] CDI.KEYID = 6
7,650,670 UART: [ldev] SUBJECT.KEYID = 5
7,651,871 UART: [ldev] AUTHORITY.KEYID = 7
7,653,146 UART: [ldev] FE.KEYID = 1
7,665,435 UART: [ldev] Erasing FE.KEYID = 1
10,956,711 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,609 UART: [ldev] --
13,317,816 UART: [fwproc] Waiting for Commands...
13,320,441 UART: [fwproc] Received command 0x46574c44
13,322,674 UART: [fwproc] Received Image of size 118548 bytes
17,431,442 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,510,541 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,583,688 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,912,980 >>> mbox cmd response: success
17,913,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,916,715 UART: [afmc] ++
17,917,288 UART: [afmc] CDI.KEYID = 6
17,918,223 UART: [afmc] SUBJECT.KEYID = 7
17,919,425 UART: [afmc] AUTHORITY.KEYID = 5
21,236,080 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,530,115 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,532,384 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,546,774 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,561,518 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,575,922 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,597,457 UART: [afmc] --
23,600,987 UART: [cold-reset] --
23,604,327 UART: [state] Locking Datavault
23,608,696 UART: [state] Locking PCR0, PCR1 and PCR31
23,610,396 UART: [state] Locking ICCM
23,612,491 UART: [exit] Launching FMC @ 0x40000130
23,620,878 UART:
23,621,112 UART: Running Caliptra FMC ...
23,622,207 UART:
23,622,358 UART: [state] CFI Enabled
23,630,344 UART: [fht] FMC Alias Private Key: 7
25,970,180 UART: [art] Extend RT PCRs Done
25,971,397 UART: [art] Lock RT PCRs Done
25,972,948 UART: [art] Populate DV Done
25,978,301 UART: [fht] FMC Alias Private Key: 7
25,980,042 UART: [art] Derive CDI
25,980,776 UART: [art] Store in slot 0x4
26,023,519 UART: [art] Derive Key Pair
26,024,579 UART: [art] Store priv key in slot 0x5
29,266,132 UART: [art] Derive Key Pair - Done
29,278,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,761 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,262 UART: [art] PUB.X = 9C7EC6B420272953491EC2B2F1319BEB4FFB44DFCD2955FC6C0A55B891670D244901BFEE605C4CE0C126225240B7C74E
31,567,506 UART: [art] PUB.Y = CEE5D565418739D36E7BD8AEAF132A5ADF567D125C71F4CA166A7A54A52DA43E569458C6BEF279722E727F6B58BE0A2C
31,574,796 UART: [art] SIG.R = 12532346A2C6089EF24E9243E6849B27C1F25B5F8174BA496EC8BA6EDEF15A6F2485589841126069D15267F9FD988F23
31,582,182 UART: [art] SIG.S = 0FE7E6A5BCD1AC0E6A8CAE32BC81C13EADCC2F8CFB088FA537B318E0E73840233FE9796D37B418133E0BAA2321EE0AEC
32,887,113 UART: Caliptra RT
32,887,823 UART: [state] CFI Enabled
33,021,628 UART: [rt] RT listening for mailbox commands...
33,053,674 UART: [rt]cmd =0x44504543, len=96
33,085,182 >>> mbox cmd response data (56 bytes)
33,086,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,116,505 UART: [rt]cmd =0x44504543, len=96
33,148,255 >>> mbox cmd response data (56 bytes)
33,149,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,179,588 UART: [rt]cmd =0x44504543, len=96
33,210,910 >>> mbox cmd response data (56 bytes)
33,211,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,242,320 UART: [rt]cmd =0x44504543, len=96
33,274,720 >>> mbox cmd response data (56 bytes)
33,275,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,306,049 UART: [rt]cmd =0x44504543, len=96
33,337,668 >>> mbox cmd response data (56 bytes)
33,338,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,369,101 UART: [rt]cmd =0x44504543, len=96
33,400,826 >>> mbox cmd response data (56 bytes)
33,401,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,432,195 UART: [rt]cmd =0x44504543, len=96
33,464,059 >>> mbox cmd response data (56 bytes)
33,464,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,495,053 UART: [rt]cmd =0x44504543, len=96
33,526,599 >>> mbox cmd response data (56 bytes)
33,527,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,557,685 UART: [rt]cmd =0x44504543, len=96
33,590,349 >>> mbox cmd response data (56 bytes)
33,591,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,621,454 UART: [rt]cmd =0x44504543, len=96
33,653,985 >>> mbox cmd response data (56 bytes)
33,654,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,685,200 UART: [rt]cmd =0x44504543, len=96
33,716,816 >>> mbox cmd response data (56 bytes)
33,717,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,748,234 UART: [rt]cmd =0x44504543, len=96
33,779,770 >>> mbox cmd response data (56 bytes)
33,781,104 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,811,149 UART: [rt]cmd =0x52435458, len=8
33,813,108 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
4,123,744 ready_for_fw is high
4,124,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,361 >>> mbox cmd response: success
18,160,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,803,970 UART:
23,804,360 UART: Running Caliptra FMC ...
23,805,459 UART:
23,805,609 UART: [state] CFI Enabled
23,813,881 UART: [fht] FMC Alias Private Key: 7
26,153,302 UART: [art] Extend RT PCRs Done
26,154,528 UART: [art] Lock RT PCRs Done
26,156,119 UART: [art] Populate DV Done
26,161,754 UART: [fht] FMC Alias Private Key: 7
26,163,449 UART: [art] Derive CDI
26,164,257 UART: [art] Store in slot 0x4
26,206,587 UART: [art] Derive Key Pair
26,207,621 UART: [art] Store priv key in slot 0x5
29,450,496 UART: [art] Derive Key Pair - Done
29,463,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,959 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,468 UART: [art] PUB.X = 430BAAEC0A2682956A036A9BB0C1F34A1B5A932F409FB494E1792A31E1FE53263DA5E1544DDD91861BDA12582133F459
31,752,703 UART: [art] PUB.Y = CF65D32D1B640834EAE41DAA2112E753E124FFF7B403F2197C3FDF6AD234479D93FBC914C1FD84B805D74060051E3F4F
31,759,992 UART: [art] SIG.R = D417D2A75A0D8F734C39763F71C84B94461B150493D0E33D1D015ED6E7872E33E72043C95B319E6C012E84FA2F96E8DE
31,767,380 UART: [art] SIG.S = 17F2B431E7F566F5043603D1D5961EE0DF41EABC95E0C914E1481E9326EEE938F419DEEB8F96E59350316C689A912853
33,072,644 UART: Caliptra RT
33,073,358 UART: [state] CFI Enabled
33,206,433 UART: [rt] RT listening for mailbox commands...
33,238,534 UART: [rt]cmd =0x44504543, len=96
33,270,896 >>> mbox cmd response data (56 bytes)
33,271,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,302,627 UART: [rt]cmd =0x44504543, len=96
33,334,657 >>> mbox cmd response data (56 bytes)
33,335,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,366,188 UART: [rt]cmd =0x44504543, len=96
33,398,637 >>> mbox cmd response data (56 bytes)
33,399,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,429,917 UART: [rt]cmd =0x44504543, len=96
33,462,204 >>> mbox cmd response data (56 bytes)
33,462,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,493,196 UART: [rt]cmd =0x44504543, len=96
33,524,934 >>> mbox cmd response data (56 bytes)
33,525,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,556,089 UART: [rt]cmd =0x44504543, len=96
33,587,994 >>> mbox cmd response data (56 bytes)
33,588,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,619,404 UART: [rt]cmd =0x44504543, len=96
33,652,066 >>> mbox cmd response data (56 bytes)
33,652,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,683,411 UART: [rt]cmd =0x44504543, len=96
33,715,091 >>> mbox cmd response data (56 bytes)
33,715,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,746,616 UART: [rt]cmd =0x44504543, len=96
33,778,690 >>> mbox cmd response data (56 bytes)
33,779,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,809,854 UART: [rt]cmd =0x44504543, len=96
33,841,201 >>> mbox cmd response data (56 bytes)
33,841,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,872,458 UART: [rt]cmd =0x44504543, len=96
33,904,213 >>> mbox cmd response data (56 bytes)
33,904,943 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,935,578 UART: [rt]cmd =0x44504543, len=96
33,967,818 >>> mbox cmd response data (56 bytes)
33,969,178 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,999,225 UART: [rt]cmd =0x52435458, len=8
34,001,215 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
191,976 UART:
192,328 UART: Running Caliptra ROM ...
193,421 UART:
193,560 UART: [state] CFI Enabled
262,868 UART: [state] LifecycleState = Unprovisioned
264,805 UART: [state] DebugLocked = No
266,589 UART: [state] WD Timer not started. Device not locked for debugging
270,148 UART: [kat] SHA2-256
449,852 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,585 UART: [kat] ++
461,062 UART: [kat] sha1
470,662 UART: [kat] SHA2-256
473,403 UART: [kat] SHA2-384
479,392 UART: [kat] SHA2-512-ACC
481,750 UART: [kat] ECC-384
2,926,563 UART: [kat] HMAC-384Kdf
2,943,558 UART: [kat] LMS
3,420,058 UART: [kat] --
3,425,283 UART: [cold-reset] ++
3,427,858 UART: [fht] FHT @ 0x50003400
3,439,474 UART: [idev] ++
3,440,039 UART: [idev] CDI.KEYID = 6
3,441,073 UART: [idev] SUBJECT.KEYID = 7
3,442,248 UART: [idev] UDS.KEYID = 0
3,443,289 ready_for_fw is high
3,443,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,592,545 UART: [idev] Erasing UDS.KEYID = 0
5,959,403 UART: [idev] Sha1 KeyId Algorithm
5,982,863 UART: [idev] --
5,986,321 UART: [ldev] ++
5,986,893 UART: [ldev] CDI.KEYID = 6
5,987,874 UART: [ldev] SUBJECT.KEYID = 5
5,989,032 UART: [ldev] AUTHORITY.KEYID = 7
5,990,321 UART: [ldev] FE.KEYID = 1
6,030,409 UART: [ldev] Erasing FE.KEYID = 1
8,538,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,271,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,287,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,303,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,318,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,339,932 UART: [ldev] --
10,345,349 UART: [fwproc] Wait for Commands...
10,347,751 UART: [fwproc] Recv command 0x46574c44
10,349,746 UART: [fwproc] Recv'd Img size: 118548 bytes
13,838,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,918,158 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,991,159 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,319,722 >>> mbox cmd response: success
14,320,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,324,151 UART: [afmc] ++
14,324,771 UART: [afmc] CDI.KEYID = 6
14,325,657 UART: [afmc] SUBJECT.KEYID = 7
14,326,921 UART: [afmc] AUTHORITY.KEYID = 5
16,871,359 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,610,485 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,612,715 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,628,510 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,644,548 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,660,112 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,683,435 UART: [afmc] --
18,687,922 UART: [cold-reset] --
18,691,899 UART: [state] Locking Datavault
18,698,223 UART: [state] Locking PCR0, PCR1 and PCR31
18,699,971 UART: [state] Locking ICCM
18,702,121 UART: [exit] Launching FMC @ 0x40000130
18,710,511 UART:
18,710,753 UART: Running Caliptra FMC ...
18,711,854 UART:
18,712,014 UART: [state] CFI Enabled
18,769,476 UART: [fht] FMC Alias Private Key: 7
20,535,861 UART: [art] Extend RT PCRs Done
20,537,084 UART: [art] Lock RT PCRs Done
20,539,008 UART: [art] Populate DV Done
20,544,368 UART: [fht] FMC Alias Private Key: 7
20,546,009 UART: [art] Derive CDI
20,546,748 UART: [art] Store in slot 0x4
20,601,628 UART: [art] Derive Key Pair
20,602,669 UART: [art] Store priv key in slot 0x5
23,065,153 UART: [art] Derive Key Pair - Done
23,078,173 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,790,528 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,033 UART: [art] PUB.X = AA35D7ABAB8B83B383C53545073E21645EE0642A813CEC81CD9E0A1C0674DC598C88984C85FC4112460ADFE6A4688D22
24,799,283 UART: [art] PUB.Y = F72D9DB35FC6A8DCA2862E72BC9B4D1F9E6B18AE4A4ED8091BF6CA04469BF588B8AE5ED76EAF8BAB0A2EA7F3C10425E3
24,806,568 UART: [art] SIG.R = 4EFDB16ADE7A92EAE695C003133FE8949DABF6523ACD937E2C049E0B571C5F7B29916BF91DBDD1416C000A9BFFB69D4B
24,813,966 UART: [art] SIG.S = 37CBF18AFB7E7170CBDDCB6A5A60E02E56130434205289AF402FEFE18E89F2232A638CED518D14A80E54270869F399F1
25,793,182 UART: Caliptra RT
25,793,872 UART: [state] CFI Enabled
25,972,629 UART: [rt] RT listening for mailbox commands...
26,004,496 UART: [rt]cmd =0x44504543, len=96
26,036,693 >>> mbox cmd response data (56 bytes)
26,037,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,068,225 UART: [rt]cmd =0x44504543, len=96
26,099,570 >>> mbox cmd response data (56 bytes)
26,100,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,130,980 UART: [rt]cmd =0x44504543, len=96
26,163,089 >>> mbox cmd response data (56 bytes)
26,163,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,194,491 UART: [rt]cmd =0x44504543, len=96
26,226,752 >>> mbox cmd response data (56 bytes)
26,227,435 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,257,905 UART: [rt]cmd =0x44504543, len=96
26,289,073 >>> mbox cmd response data (56 bytes)
26,289,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,320,466 UART: [rt]cmd =0x44504543, len=96
26,351,961 >>> mbox cmd response data (56 bytes)
26,352,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,383,268 UART: [rt]cmd =0x44504543, len=96
26,415,345 >>> mbox cmd response data (56 bytes)
26,416,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,446,647 UART: [rt]cmd =0x44504543, len=96
26,478,699 >>> mbox cmd response data (56 bytes)
26,479,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,509,874 UART: [rt]cmd =0x44504543, len=96
26,541,872 >>> mbox cmd response data (56 bytes)
26,542,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,573,088 UART: [rt]cmd =0x44504543, len=96
26,605,180 >>> mbox cmd response data (56 bytes)
26,605,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,636,543 UART: [rt]cmd =0x44504543, len=96
26,668,247 >>> mbox cmd response data (56 bytes)
26,668,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,699,551 UART: [rt]cmd =0x44504543, len=96
26,732,108 >>> mbox cmd response data (56 bytes)
26,732,785 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,762,589 UART: [rt]cmd =0x52435458, len=8
26,764,620 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,460,948 ready_for_fw is high
3,461,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,217,270 >>> mbox cmd response: success
14,218,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,495,706 UART:
18,496,090 UART: Running Caliptra FMC ...
18,497,232 UART:
18,497,389 UART: [state] CFI Enabled
18,562,091 UART: [fht] FMC Alias Private Key: 7
20,350,298 UART: [art] Extend RT PCRs Done
20,351,529 UART: [art] Lock RT PCRs Done
20,353,178 UART: [art] Populate DV Done
20,358,598 UART: [fht] FMC Alias Private Key: 7
20,360,188 UART: [art] Derive CDI
20,360,999 UART: [art] Store in slot 0x4
20,416,245 UART: [art] Derive Key Pair
20,417,309 UART: [art] Store priv key in slot 0x5
22,880,132 UART: [art] Derive Key Pair - Done
22,893,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,020 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,525 UART: [art] PUB.X = E71BEA9A659ABF9238484DAD97558D0953729387B311333416C0EC8BB44B657839041456C8FC0415DBAFA346D39B3930
24,615,773 UART: [art] PUB.Y = DB1494644DE03907528E4E0E948B091ABAAB64DADD3B9AB72981C772A7F80A0079EE5489D08CDF4EB28BF894571CBDCB
24,623,015 UART: [art] SIG.R = 507D4847701F02BF1611BA6DDC3668F9A15B358B1F166A95DD35DA5D15F640A451789DC4A5A1B1F95906E4A64A531BD6
24,630,405 UART: [art] SIG.S = BCF88414E39E6CF7D25708E0EA9D8D51F92DF33CF5F4EB38EAE46E40E14107C43257060237A5F1E44C39E23EB5FA4223
25,609,258 UART: Caliptra RT
25,609,954 UART: [state] CFI Enabled
25,790,809 UART: [rt] RT listening for mailbox commands...
25,822,714 UART: [rt]cmd =0x44504543, len=96
25,854,236 >>> mbox cmd response data (56 bytes)
25,855,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,885,593 UART: [rt]cmd =0x44504543, len=96
25,916,936 >>> mbox cmd response data (56 bytes)
25,917,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,948,270 UART: [rt]cmd =0x44504543, len=96
25,979,638 >>> mbox cmd response data (56 bytes)
25,980,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,010,702 UART: [rt]cmd =0x44504543, len=96
26,042,218 >>> mbox cmd response data (56 bytes)
26,042,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,073,591 UART: [rt]cmd =0x44504543, len=96
26,105,449 >>> mbox cmd response data (56 bytes)
26,106,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,136,616 UART: [rt]cmd =0x44504543, len=96
26,168,377 >>> mbox cmd response data (56 bytes)
26,169,100 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,199,517 UART: [rt]cmd =0x44504543, len=96
26,231,643 >>> mbox cmd response data (56 bytes)
26,232,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,262,798 UART: [rt]cmd =0x44504543, len=96
26,295,297 >>> mbox cmd response data (56 bytes)
26,295,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,326,291 UART: [rt]cmd =0x44504543, len=96
26,357,202 >>> mbox cmd response data (56 bytes)
26,357,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,388,564 UART: [rt]cmd =0x44504543, len=96
26,419,908 >>> mbox cmd response data (56 bytes)
26,420,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,451,115 UART: [rt]cmd =0x44504543, len=96
26,482,860 >>> mbox cmd response data (56 bytes)
26,483,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,513,984 UART: [rt]cmd =0x44504543, len=96
26,545,607 >>> mbox cmd response data (56 bytes)
26,546,276 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,575,784 UART: [rt]cmd =0x52435458, len=8
26,577,824 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,430 UART:
192,803 UART: Running Caliptra ROM ...
193,902 UART:
603,820 UART: [state] CFI Enabled
619,567 UART: [state] LifecycleState = Unprovisioned
621,531 UART: [state] DebugLocked = No
624,274 UART: [state] WD Timer not started. Device not locked for debugging
627,696 UART: [kat] SHA2-256
807,298 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,098 UART: [kat] ++
818,637 UART: [kat] sha1
828,947 UART: [kat] SHA2-256
831,631 UART: [kat] SHA2-384
836,076 UART: [kat] SHA2-512-ACC
838,451 UART: [kat] ECC-384
3,281,091 UART: [kat] HMAC-384Kdf
3,293,333 UART: [kat] LMS
3,769,807 UART: [kat] --
3,775,092 UART: [cold-reset] ++
3,776,461 UART: [fht] FHT @ 0x50003400
3,787,832 UART: [idev] ++
3,788,461 UART: [idev] CDI.KEYID = 6
3,789,358 UART: [idev] SUBJECT.KEYID = 7
3,790,433 UART: [idev] UDS.KEYID = 0
3,791,355 ready_for_fw is high
3,791,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,354 UART: [idev] Erasing UDS.KEYID = 0
6,270,438 UART: [idev] Sha1 KeyId Algorithm
6,293,446 UART: [idev] --
6,299,278 UART: [ldev] ++
6,299,852 UART: [ldev] CDI.KEYID = 6
6,300,868 UART: [ldev] SUBJECT.KEYID = 5
6,301,976 UART: [ldev] AUTHORITY.KEYID = 7
6,303,267 UART: [ldev] FE.KEYID = 1
6,315,859 UART: [ldev] Erasing FE.KEYID = 1
8,788,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,970 UART: [ldev] --
10,580,533 UART: [fwproc] Wait for Commands...
10,582,355 UART: [fwproc] Recv command 0x46574c44
10,584,401 UART: [fwproc] Recv'd Img size: 118548 bytes
14,060,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,836 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,877 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,772 >>> mbox cmd response: success
14,552,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,556,064 UART: [afmc] ++
14,556,701 UART: [afmc] CDI.KEYID = 6
14,557,613 UART: [afmc] SUBJECT.KEYID = 7
14,558,829 UART: [afmc] AUTHORITY.KEYID = 5
17,058,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,863 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,686 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,762 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,830,328 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,840 UART: [afmc] --
18,860,087 UART: [cold-reset] --
18,863,200 UART: [state] Locking Datavault
18,868,121 UART: [state] Locking PCR0, PCR1 and PCR31
18,869,877 UART: [state] Locking ICCM
18,872,570 UART: [exit] Launching FMC @ 0x40000130
18,880,964 UART:
18,881,200 UART: Running Caliptra FMC ...
18,882,299 UART:
18,882,462 UART: [state] CFI Enabled
18,890,539 UART: [fht] FMC Alias Private Key: 7
20,657,421 UART: [art] Extend RT PCRs Done
20,658,660 UART: [art] Lock RT PCRs Done
20,660,395 UART: [art] Populate DV Done
20,665,861 UART: [fht] FMC Alias Private Key: 7
20,667,416 UART: [art] Derive CDI
20,668,167 UART: [art] Store in slot 0x4
20,710,629 UART: [art] Derive Key Pair
20,711,668 UART: [art] Store priv key in slot 0x5
23,138,875 UART: [art] Derive Key Pair - Done
23,151,743 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,581 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,089 UART: [art] PUB.X = 28C1A895E6704E4E994945440D3224D79CD2F34A1B2C67E4CA571BDB098492FE76AF0C311985CA8BAEAAA5A0D0C44B2E
24,867,343 UART: [art] PUB.Y = 30552E3D379A68D0C6909AF2A4AFEBC8EDDD59FAC8353BDC2670AE18C66A9F3A784E9A4BBC14BCCC93DB791A815C5121
24,874,625 UART: [art] SIG.R = EA94A7BA2CFCBF282C14FFFAD3A69C6EC1377F51D2CA4EAF8E2B5ECB79457803D4BAF606634E35CE62F44FCCDE687F0A
24,882,065 UART: [art] SIG.S = 7A399D3B2443544DF6BCEF16FD8935A477F4CE9B7BE621B1E73BF5A901F099C32BDC53B70B3D1E7677E5E39276A6BB9E
25,861,264 UART: Caliptra RT
25,861,965 UART: [state] CFI Enabled
25,994,728 UART: [rt] RT listening for mailbox commands...
26,026,997 UART: [rt]cmd =0x44504543, len=96
26,058,489 >>> mbox cmd response data (56 bytes)
26,059,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,089,798 UART: [rt]cmd =0x44504543, len=96
26,121,345 >>> mbox cmd response data (56 bytes)
26,122,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,152,497 UART: [rt]cmd =0x44504543, len=96
26,184,089 >>> mbox cmd response data (56 bytes)
26,184,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,215,154 UART: [rt]cmd =0x44504543, len=96
26,246,933 >>> mbox cmd response data (56 bytes)
26,247,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,278,271 UART: [rt]cmd =0x44504543, len=96
26,310,053 >>> mbox cmd response data (56 bytes)
26,310,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,341,244 UART: [rt]cmd =0x44504543, len=96
26,372,464 >>> mbox cmd response data (56 bytes)
26,373,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,403,557 UART: [rt]cmd =0x44504543, len=96
26,435,588 >>> mbox cmd response data (56 bytes)
26,436,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,466,846 UART: [rt]cmd =0x44504543, len=96
26,498,867 >>> mbox cmd response data (56 bytes)
26,499,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,530,204 UART: [rt]cmd =0x44504543, len=96
26,561,930 >>> mbox cmd response data (56 bytes)
26,562,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,593,224 UART: [rt]cmd =0x44504543, len=96
26,625,515 >>> mbox cmd response data (56 bytes)
26,626,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,656,799 UART: [rt]cmd =0x44504543, len=96
26,690,267 >>> mbox cmd response data (56 bytes)
26,690,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,721,421 UART: [rt]cmd =0x44504543, len=96
26,753,443 >>> mbox cmd response data (56 bytes)
26,754,549 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,784,698 UART: [rt]cmd =0x52435458, len=8
26,786,695 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,780,334 ready_for_fw is high
3,780,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,147 >>> mbox cmd response: success
14,456,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,705,675 UART:
18,706,062 UART: Running Caliptra FMC ...
18,707,172 UART:
18,707,328 UART: [state] CFI Enabled
18,715,490 UART: [fht] FMC Alias Private Key: 7
20,481,755 UART: [art] Extend RT PCRs Done
20,482,979 UART: [art] Lock RT PCRs Done
20,484,851 UART: [art] Populate DV Done
20,490,117 UART: [fht] FMC Alias Private Key: 7
20,491,660 UART: [art] Derive CDI
20,492,397 UART: [art] Store in slot 0x4
20,535,285 UART: [art] Derive Key Pair
20,536,329 UART: [art] Store priv key in slot 0x5
22,962,523 UART: [art] Derive Key Pair - Done
22,975,251 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,681,512 UART: [art] Erasing AUTHORITY.KEYID = 7
24,682,993 UART: [art] PUB.X = E0A5671D184321D27B33E1D14DCC36EDF9BA685CDA743965627B8AC29D77AF4585712282113A8E680AAA447F19D33AFD
24,690,299 UART: [art] PUB.Y = 6752509443D3ACC30C10F2D909A9242FD5F1E98CB393C661F02B6E5764ADA65CB3B8D1914F0E56C1E6641FDE1D3F0C4F
24,697,555 UART: [art] SIG.R = 1BC25C352C6A830AA9A97E781BD3F5783A96D49BD798A8AA7A8396353679676C78DC5E8BA6BEB5B305C7937124BBEE4F
24,704,956 UART: [art] SIG.S = 2280334EB393DBD4B4F4100BE529F1237CE10301436FBA65E0D63C3348948E7DC94E6C0FFBD0800C0F51A8A507C7F321
25,683,589 UART: Caliptra RT
25,684,315 UART: [state] CFI Enabled
25,817,106 UART: [rt] RT listening for mailbox commands...
25,849,164 UART: [rt]cmd =0x44504543, len=96
25,880,256 >>> mbox cmd response data (56 bytes)
25,881,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,911,858 UART: [rt]cmd =0x44504543, len=96
25,943,608 >>> mbox cmd response data (56 bytes)
25,944,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,974,973 UART: [rt]cmd =0x44504543, len=96
26,006,862 >>> mbox cmd response data (56 bytes)
26,007,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,038,378 UART: [rt]cmd =0x44504543, len=96
26,070,437 >>> mbox cmd response data (56 bytes)
26,071,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,101,455 UART: [rt]cmd =0x44504543, len=96
26,133,676 >>> mbox cmd response data (56 bytes)
26,134,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,165,065 UART: [rt]cmd =0x44504543, len=96
26,197,038 >>> mbox cmd response data (56 bytes)
26,197,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,228,406 UART: [rt]cmd =0x44504543, len=96
26,260,093 >>> mbox cmd response data (56 bytes)
26,260,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,291,471 UART: [rt]cmd =0x44504543, len=96
26,324,434 >>> mbox cmd response data (56 bytes)
26,325,130 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,355,831 UART: [rt]cmd =0x44504543, len=96
26,387,880 >>> mbox cmd response data (56 bytes)
26,388,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,419,100 UART: [rt]cmd =0x44504543, len=96
26,450,577 >>> mbox cmd response data (56 bytes)
26,451,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,481,892 UART: [rt]cmd =0x44504543, len=96
26,514,403 >>> mbox cmd response data (56 bytes)
26,515,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,545,649 UART: [rt]cmd =0x44504543, len=96
26,577,181 >>> mbox cmd response data (56 bytes)
26,578,212 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,608,156 UART: [rt]cmd =0x52435458, len=8
26,609,858 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
192,172 UART:
192,535 UART: Running Caliptra ROM ...
193,733 UART:
193,886 UART: [state] CFI Enabled
263,501 UART: [state] LifecycleState = Unprovisioned
265,926 UART: [state] DebugLocked = No
268,172 UART: [state] WD Timer not started. Device not locked for debugging
273,557 UART: [kat] SHA2-256
463,465 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,230 UART: [kat] ++
474,706 UART: [kat] sha1
486,712 UART: [kat] SHA2-256
489,719 UART: [kat] SHA2-384
495,645 UART: [kat] SHA2-512-ACC
498,223 UART: [kat] ECC-384
2,948,852 UART: [kat] HMAC-384Kdf
2,971,884 UART: [kat] LMS
3,503,653 UART: [kat] --
3,508,429 UART: [cold-reset] ++
3,510,438 UART: [fht] FHT @ 0x50003400
3,522,617 UART: [idev] ++
3,523,321 UART: [idev] CDI.KEYID = 6
3,524,233 UART: [idev] SUBJECT.KEYID = 7
3,525,475 UART: [idev] UDS.KEYID = 0
3,526,400 ready_for_fw is high
3,526,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,657 UART: [idev] Erasing UDS.KEYID = 0
6,029,180 UART: [idev] Sha1 KeyId Algorithm
6,052,405 UART: [idev] --
6,057,119 UART: [ldev] ++
6,057,866 UART: [ldev] CDI.KEYID = 6
6,058,793 UART: [ldev] SUBJECT.KEYID = 5
6,059,902 UART: [ldev] AUTHORITY.KEYID = 7
6,061,137 UART: [ldev] FE.KEYID = 1
6,100,953 UART: [ldev] Erasing FE.KEYID = 1
8,604,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,206 UART: [ldev] --
10,413,296 UART: [fwproc] Wait for Commands...
10,415,882 UART: [fwproc] Recv command 0x46574c44
10,418,137 UART: [fwproc] Recv'd Img size: 118548 bytes
13,908,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,937 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,539 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,176 >>> mbox cmd response: success
14,674,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,677,414 UART: [afmc] ++
14,678,109 UART: [afmc] CDI.KEYID = 6
14,679,287 UART: [afmc] SUBJECT.KEYID = 7
14,680,769 UART: [afmc] AUTHORITY.KEYID = 5
17,217,465 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,978 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,891 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,955 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,128 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,000 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,244 UART: [afmc] --
19,033,556 UART: [cold-reset] --
19,038,015 UART: [state] Locking Datavault
19,043,315 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,449 UART: [state] Locking ICCM
19,047,817 UART: [exit] Launching FMC @ 0x40000130
19,056,493 UART:
19,056,731 UART: Running Caliptra FMC ...
19,057,834 UART:
19,057,991 UART: [state] CFI Enabled
19,116,896 UART: [fht] FMC Alias Private Key: 7
20,883,345 UART: [art] Extend RT PCRs Done
20,884,564 UART: [art] Lock RT PCRs Done
20,886,509 UART: [art] Populate DV Done
20,891,936 UART: [fht] FMC Alias Private Key: 7
20,893,525 UART: [art] Derive CDI
20,894,338 UART: [art] Store in slot 0x4
20,949,741 UART: [art] Derive Key Pair
20,950,782 UART: [art] Store priv key in slot 0x5
23,413,466 UART: [art] Derive Key Pair - Done
23,426,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,140,651 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,171 UART: [art] PUB.X = 3BF234D5A224459B7655476468FA53C201ED6199A1A2B526337E2C0EE74198EDC702F3B742C14CA23A193D2CDC56F7D9
25,149,389 UART: [art] PUB.Y = FB22621F1CC06D1B51002FE66DF5974410BA6F7E2C2656F575736D58171F46366F3D9D3CBA624296575BBCB524E80CC2
25,156,652 UART: [art] SIG.R = 391B24318FD535577F625951B58BACEEAAEB370DCAABC82ECD6B069E1C360947E337CE6A77B4B185D15BAABCDF8E50A9
25,164,014 UART: [art] SIG.S = F1478D599A501553E495A4CE2B33CCC014958006EE5D674F3531FF395CA605486C5FD67F6DFEA971395FF4153388567E
26,143,305 UART: Caliptra RT
26,143,998 UART: [state] CFI Enabled
26,323,396 UART: [rt] RT listening for mailbox commands...
26,355,399 UART: [rt]cmd =0x44504543, len=96
26,386,993 >>> mbox cmd response data (56 bytes)
26,387,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,418,385 UART: [rt]cmd =0x44504543, len=96
26,450,088 >>> mbox cmd response data (56 bytes)
26,450,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,481,104 UART: [rt]cmd =0x44504543, len=96
26,512,505 >>> mbox cmd response data (56 bytes)
26,513,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,543,739 UART: [rt]cmd =0x44504543, len=96
26,575,743 >>> mbox cmd response data (56 bytes)
26,576,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,607,120 UART: [rt]cmd =0x44504543, len=96
26,638,623 >>> mbox cmd response data (56 bytes)
26,639,366 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,670,114 UART: [rt]cmd =0x44504543, len=96
26,702,266 >>> mbox cmd response data (56 bytes)
26,703,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,733,766 UART: [rt]cmd =0x44504543, len=96
26,765,417 >>> mbox cmd response data (56 bytes)
26,766,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,796,700 UART: [rt]cmd =0x44504543, len=96
26,827,779 >>> mbox cmd response data (56 bytes)
26,828,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,858,843 UART: [rt]cmd =0x44504543, len=96
26,891,266 >>> mbox cmd response data (56 bytes)
26,891,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,922,379 UART: [rt]cmd =0x44504543, len=96
26,954,677 >>> mbox cmd response data (56 bytes)
26,955,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,985,882 UART: [rt]cmd =0x44504543, len=96
27,017,207 >>> mbox cmd response data (56 bytes)
27,017,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,048,211 UART: [rt]cmd =0x44504543, len=96
27,080,662 >>> mbox cmd response data (56 bytes)
27,081,713 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,111,397 UART: [rt]cmd =0x52435458, len=8
27,113,481 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,438,002 ready_for_fw is high
3,438,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,795 >>> mbox cmd response: success
14,821,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,114,564 UART:
19,114,961 UART: Running Caliptra FMC ...
19,116,151 UART:
19,116,329 UART: [state] CFI Enabled
19,182,492 UART: [fht] FMC Alias Private Key: 7
20,948,857 UART: [art] Extend RT PCRs Done
20,950,082 UART: [art] Lock RT PCRs Done
20,951,991 UART: [art] Populate DV Done
20,957,414 UART: [fht] FMC Alias Private Key: 7
20,959,101 UART: [art] Derive CDI
20,959,922 UART: [art] Store in slot 0x4
21,015,858 UART: [art] Derive Key Pair
21,016,862 UART: [art] Store priv key in slot 0x5
23,479,781 UART: [art] Derive Key Pair - Done
23,493,052 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,382 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,895 UART: [art] PUB.X = 642B03468F4ECA2FD0C7ABA04B9A257A573E6396132AD1843651DF6DF06A71F1B28704DB59D0B2CC98878EA0D1BE23E6
25,214,170 UART: [art] PUB.Y = C4D7E6D48DBE30EE172961840FABE0496B04A593799E78D7D854F2A666D90A1F2C5EB3582DB555CE7F08A9A3B8000828
25,221,418 UART: [art] SIG.R = 91EE2822EAA67F167E9FB947F65D9D4C54154A763E1BBA4C768B8BBE81BF18A75D7DF85DC86B3C45B32EB6DAE502CF40
25,228,822 UART: [art] SIG.S = A78DDF321F3B9EE65F126D006A5FA421E4273804712A98FF4EE312DEA1B61313D55C36492792A6FD87FA345C028893FB
26,207,288 UART: Caliptra RT
26,208,000 UART: [state] CFI Enabled
26,389,081 UART: [rt] RT listening for mailbox commands...
26,421,461 UART: [rt]cmd =0x44504543, len=96
26,453,080 >>> mbox cmd response data (56 bytes)
26,453,947 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,484,443 UART: [rt]cmd =0x44504543, len=96
26,516,822 >>> mbox cmd response data (56 bytes)
26,517,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,547,770 UART: [rt]cmd =0x44504543, len=96
26,580,064 >>> mbox cmd response data (56 bytes)
26,580,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,611,427 UART: [rt]cmd =0x44504543, len=96
26,643,527 >>> mbox cmd response data (56 bytes)
26,644,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,674,883 UART: [rt]cmd =0x44504543, len=96
26,707,076 >>> mbox cmd response data (56 bytes)
26,707,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,738,351 UART: [rt]cmd =0x44504543, len=96
26,770,568 >>> mbox cmd response data (56 bytes)
26,771,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,801,742 UART: [rt]cmd =0x44504543, len=96
26,833,419 >>> mbox cmd response data (56 bytes)
26,834,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,864,896 UART: [rt]cmd =0x44504543, len=96
26,897,193 >>> mbox cmd response data (56 bytes)
26,897,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,928,396 UART: [rt]cmd =0x44504543, len=96
26,960,094 >>> mbox cmd response data (56 bytes)
26,960,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,991,471 UART: [rt]cmd =0x44504543, len=96
27,023,211 >>> mbox cmd response data (56 bytes)
27,023,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,054,551 UART: [rt]cmd =0x44504543, len=96
27,086,769 >>> mbox cmd response data (56 bytes)
27,087,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,117,952 UART: [rt]cmd =0x44504543, len=96
27,149,898 >>> mbox cmd response data (56 bytes)
27,150,986 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,180,667 UART: [rt]cmd =0x52435458, len=8
27,182,720 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,420 UART:
192,791 UART: Running Caliptra ROM ...
193,978 UART:
603,730 UART: [state] CFI Enabled
616,429 UART: [state] LifecycleState = Unprovisioned
618,776 UART: [state] DebugLocked = No
621,156 UART: [state] WD Timer not started. Device not locked for debugging
625,131 UART: [kat] SHA2-256
815,011 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,746 UART: [kat] ++
826,265 UART: [kat] sha1
838,984 UART: [kat] SHA2-256
841,995 UART: [kat] SHA2-384
848,843 UART: [kat] SHA2-512-ACC
851,419 UART: [kat] ECC-384
3,295,129 UART: [kat] HMAC-384Kdf
3,308,805 UART: [kat] LMS
3,840,660 UART: [kat] --
3,844,827 UART: [cold-reset] ++
3,846,699 UART: [fht] FHT @ 0x50003400
3,859,957 UART: [idev] ++
3,860,665 UART: [idev] CDI.KEYID = 6
3,861,549 UART: [idev] SUBJECT.KEYID = 7
3,862,746 UART: [idev] UDS.KEYID = 0
3,863,742 ready_for_fw is high
3,863,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,799 UART: [idev] Erasing UDS.KEYID = 0
6,332,412 UART: [idev] Sha1 KeyId Algorithm
6,355,215 UART: [idev] --
6,359,531 UART: [ldev] ++
6,360,261 UART: [ldev] CDI.KEYID = 6
6,361,163 UART: [ldev] SUBJECT.KEYID = 5
6,362,273 UART: [ldev] AUTHORITY.KEYID = 7
6,363,563 UART: [ldev] FE.KEYID = 1
6,374,076 UART: [ldev] Erasing FE.KEYID = 1
8,849,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,309 UART: [ldev] --
10,641,548 UART: [fwproc] Wait for Commands...
10,643,158 UART: [fwproc] Recv command 0x46574c44
10,645,471 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,477 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,069 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,660 >>> mbox cmd response: success
14,910,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,913,061 UART: [afmc] ++
14,913,770 UART: [afmc] CDI.KEYID = 6
14,914,876 UART: [afmc] SUBJECT.KEYID = 7
14,916,421 UART: [afmc] AUTHORITY.KEYID = 5
17,413,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,136,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,138,531 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,153,627 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,168,771 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,183,724 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,206,902 UART: [afmc] --
19,210,120 UART: [cold-reset] --
19,213,120 UART: [state] Locking Datavault
19,219,024 UART: [state] Locking PCR0, PCR1 and PCR31
19,221,200 UART: [state] Locking ICCM
19,224,031 UART: [exit] Launching FMC @ 0x40000130
19,232,712 UART:
19,232,949 UART: Running Caliptra FMC ...
19,234,055 UART:
19,234,219 UART: [state] CFI Enabled
19,242,568 UART: [fht] FMC Alias Private Key: 7
21,008,289 UART: [art] Extend RT PCRs Done
21,009,653 UART: [art] Lock RT PCRs Done
21,010,996 UART: [art] Populate DV Done
21,016,256 UART: [fht] FMC Alias Private Key: 7
21,017,905 UART: [art] Derive CDI
21,018,650 UART: [art] Store in slot 0x4
21,061,785 UART: [art] Derive Key Pair
21,062,794 UART: [art] Store priv key in slot 0x5
23,489,769 UART: [art] Derive Key Pair - Done
23,502,469 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,208,842 UART: [art] Erasing AUTHORITY.KEYID = 7
25,210,355 UART: [art] PUB.X = 6C748E73F441C9527DA28F5B146FF7C7A4385CD249814ED37A911E135A314C543DB1A98B70200E9A6909F2363BCBCC3A
25,217,634 UART: [art] PUB.Y = 22CC6E17D31A1BB87C3BC5B3D1D76D3529EB8E99F99261088DB7F5A5D5C84AB50441D286474BB7C01B25CD6DE3AF27BE
25,224,890 UART: [art] SIG.R = 73C47D89C68A2D5A1230BEE2C1B3A225D9719B3ADC6C2C323AB0C6152F8B11E5F58F26D6B3A37E5E9FB38F90F1932C30
25,232,308 UART: [art] SIG.S = 0472064615D4AEE820D5362F483C3FE7DF84E0F43AA191C61575F60ADF57CDFCC0340908DE85D2A4D421A4088953EC75
26,212,031 UART: Caliptra RT
26,212,726 UART: [state] CFI Enabled
26,345,254 UART: [rt] RT listening for mailbox commands...
26,377,405 UART: [rt]cmd =0x44504543, len=96
26,409,605 >>> mbox cmd response data (56 bytes)
26,410,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,441,105 UART: [rt]cmd =0x44504543, len=96
26,472,648 >>> mbox cmd response data (56 bytes)
26,473,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,503,967 UART: [rt]cmd =0x44504543, len=96
26,536,009 >>> mbox cmd response data (56 bytes)
26,536,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,567,439 UART: [rt]cmd =0x44504543, len=96
26,599,080 >>> mbox cmd response data (56 bytes)
26,599,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,630,357 UART: [rt]cmd =0x44504543, len=96
26,661,760 >>> mbox cmd response data (56 bytes)
26,662,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,693,018 UART: [rt]cmd =0x44504543, len=96
26,725,283 >>> mbox cmd response data (56 bytes)
26,725,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,756,449 UART: [rt]cmd =0x44504543, len=96
26,787,823 >>> mbox cmd response data (56 bytes)
26,788,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,819,019 UART: [rt]cmd =0x44504543, len=96
26,850,559 >>> mbox cmd response data (56 bytes)
26,851,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,881,989 UART: [rt]cmd =0x44504543, len=96
26,913,852 >>> mbox cmd response data (56 bytes)
26,914,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,944,920 UART: [rt]cmd =0x44504543, len=96
26,976,502 >>> mbox cmd response data (56 bytes)
26,977,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,007,681 UART: [rt]cmd =0x44504543, len=96
27,040,048 >>> mbox cmd response data (56 bytes)
27,040,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,071,525 UART: [rt]cmd =0x44504543, len=96
27,102,967 >>> mbox cmd response data (56 bytes)
27,104,034 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,133,958 UART: [rt]cmd =0x52435458, len=8
27,135,853 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,756,590 ready_for_fw is high
3,757,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,054,038 >>> mbox cmd response: success
15,055,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,303,245 UART:
19,303,644 UART: Running Caliptra FMC ...
19,304,866 UART:
19,305,040 UART: [state] CFI Enabled
19,313,071 UART: [fht] FMC Alias Private Key: 7
21,079,493 UART: [art] Extend RT PCRs Done
21,080,723 UART: [art] Lock RT PCRs Done
21,082,522 UART: [art] Populate DV Done
21,087,798 UART: [fht] FMC Alias Private Key: 7
21,089,395 UART: [art] Derive CDI
21,090,220 UART: [art] Store in slot 0x4
21,132,824 UART: [art] Derive Key Pair
21,133,873 UART: [art] Store priv key in slot 0x5
23,560,974 UART: [art] Derive Key Pair - Done
23,573,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,130 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,665 UART: [art] PUB.X = 12A850C082A4D9127A8BD5B75F12AE592DEA7C6500D687D197AC7155FCA041557BBD28CD143187C5C729133AC980C26F
25,288,899 UART: [art] PUB.Y = 0EABF1E17C5DF9099E21F2D13033686E8D4B22D0AE5CB5F6637A0BAD42382D956C96F6BFA1C6A7C554FD9773B8C7C5F6
25,296,167 UART: [art] SIG.R = 6FD444BF156A6D2F95998FB27D5A4A3FD792ACF72B2E171B1F653154F6C7685EF49E36AE73253B085FB93B780BE547E9
25,303,519 UART: [art] SIG.S = 982F6E76562B59DE6AE1A97007CD2A60CFC6D0588DDA85E1DCFBDAD708D6796CEF271A4C86E90B42F358E1DA368B2F9F
26,282,425 UART: Caliptra RT
26,283,139 UART: [state] CFI Enabled
26,416,431 UART: [rt] RT listening for mailbox commands...
26,448,670 UART: [rt]cmd =0x44504543, len=96
26,480,045 >>> mbox cmd response data (56 bytes)
26,480,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,511,402 UART: [rt]cmd =0x44504543, len=96
26,543,139 >>> mbox cmd response data (56 bytes)
26,543,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,574,511 UART: [rt]cmd =0x44504543, len=96
26,607,381 >>> mbox cmd response data (56 bytes)
26,608,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,638,636 UART: [rt]cmd =0x44504543, len=96
26,670,724 >>> mbox cmd response data (56 bytes)
26,671,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,701,930 UART: [rt]cmd =0x44504543, len=96
26,733,444 >>> mbox cmd response data (56 bytes)
26,734,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,764,655 UART: [rt]cmd =0x44504543, len=96
26,796,461 >>> mbox cmd response data (56 bytes)
26,797,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,827,366 UART: [rt]cmd =0x44504543, len=96
26,858,772 >>> mbox cmd response data (56 bytes)
26,859,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,890,057 UART: [rt]cmd =0x44504543, len=96
26,921,951 >>> mbox cmd response data (56 bytes)
26,922,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,953,124 UART: [rt]cmd =0x44504543, len=96
26,985,392 >>> mbox cmd response data (56 bytes)
26,986,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,016,563 UART: [rt]cmd =0x44504543, len=96
27,048,647 >>> mbox cmd response data (56 bytes)
27,049,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,079,971 UART: [rt]cmd =0x44504543, len=96
27,112,641 >>> mbox cmd response data (56 bytes)
27,113,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,144,030 UART: [rt]cmd =0x44504543, len=96
27,175,003 >>> mbox cmd response data (56 bytes)
27,176,181 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,206,014 UART: [rt]cmd =0x52435458, len=8
27,207,756 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,319 UART: [kat] SHA2-256
882,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,365 UART: [kat] ++
886,517 UART: [kat] sha1
890,805 UART: [kat] SHA2-256
892,743 UART: [kat] SHA2-384
895,452 UART: [kat] SHA2-512-ACC
897,353 UART: [kat] ECC-384
902,676 UART: [kat] HMAC-384Kdf
907,322 UART: [kat] LMS
1,475,518 UART: [kat] --
1,476,463 UART: [cold-reset] ++
1,476,937 UART: [fht] Storing FHT @ 0x50003400
1,479,842 UART: [idev] ++
1,480,010 UART: [idev] CDI.KEYID = 6
1,480,370 UART: [idev] SUBJECT.KEYID = 7
1,480,794 UART: [idev] UDS.KEYID = 0
1,481,139 ready_for_fw is high
1,481,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,650 UART: [idev] Erasing UDS.KEYID = 0
1,505,178 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,880 UART: [idev] --
1,515,065 UART: [ldev] ++
1,515,233 UART: [ldev] CDI.KEYID = 6
1,515,596 UART: [ldev] SUBJECT.KEYID = 5
1,516,022 UART: [ldev] AUTHORITY.KEYID = 7
1,516,485 UART: [ldev] FE.KEYID = 1
1,521,297 UART: [ldev] Erasing FE.KEYID = 1
1,546,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,904 UART: [ldev] --
1,586,369 UART: [fwproc] Waiting for Commands...
1,587,184 UART: [fwproc] Received command 0x46574c44
1,587,975 UART: [fwproc] Received Image of size 118548 bytes
2,932,867 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,729 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,947 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,182 >>> mbox cmd response: success
3,131,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,254 UART: [afmc] ++
3,132,422 UART: [afmc] CDI.KEYID = 6
3,132,784 UART: [afmc] SUBJECT.KEYID = 7
3,133,209 UART: [afmc] AUTHORITY.KEYID = 5
3,168,402 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,690 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,470 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,179 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,062 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,745 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,701 UART: [afmc] --
3,211,791 UART: [cold-reset] --
3,212,697 UART: [state] Locking Datavault
3,213,948 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,552 UART: [state] Locking ICCM
3,215,122 UART: [exit] Launching FMC @ 0x40000130
3,220,452 UART:
3,220,468 UART: Running Caliptra FMC ...
3,220,876 UART:
3,220,930 UART: [state] CFI Enabled
3,231,390 UART: [fht] FMC Alias Private Key: 7
3,350,196 UART: [art] Extend RT PCRs Done
3,350,624 UART: [art] Lock RT PCRs Done
3,352,322 UART: [art] Populate DV Done
3,360,433 UART: [fht] FMC Alias Private Key: 7
3,361,559 UART: [art] Derive CDI
3,361,839 UART: [art] Store in slot 0x4
3,447,771 UART: [art] Derive Key Pair
3,448,131 UART: [art] Store priv key in slot 0x5
3,461,580 UART: [art] Derive Key Pair - Done
3,476,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,597 UART: [art] PUB.X = C057E7F5944877580AC512C9A4DBA7100AE43FADF7F9A757164841936AABC369D9BF041DBD8979F5A869F96D3077ABE4
3,499,366 UART: [art] PUB.Y = 0617E0B3237EE179DE205B4B84BC6EBD1B35A1C4138D7FA5ACDD176C38D2CC97427DA3E2D0AEBE32CF6D2BC898963ECC
3,506,337 UART: [art] SIG.R = 77E7869455D8F84ED5C5E814A1AEC58899AFE07F3279746A612D2721E7EA58380716EEF2F6C574DEA33032D8CBD554F4
3,513,108 UART: [art] SIG.S = 0AAB49C054F634FB20846C924780CEED117FD994376801CD629C4677425F2F4F1A57D02576D182285187B0FE00005E24
3,537,056 UART: Caliptra RT
3,537,307 UART: [state] CFI Enabled
3,658,282 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,808 UART: [rt]cmd =0x44504543, len=96
3,722,722 >>> mbox cmd response data (56 bytes)
3,722,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,752,494 UART: [rt]cmd =0x44504543, len=96
3,786,316 >>> mbox cmd response data (56 bytes)
3,786,317 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,174 UART: [rt]cmd =0x44504543, len=96
3,848,925 >>> mbox cmd response data (56 bytes)
3,848,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,878,919 UART: [rt]cmd =0x44504543, len=96
3,911,929 >>> mbox cmd response data (56 bytes)
3,911,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,927 UART: [rt]cmd =0x44504543, len=96
3,975,360 >>> mbox cmd response data (56 bytes)
3,975,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,005,120 UART: [rt]cmd =0x44504543, len=96
4,038,636 >>> mbox cmd response data (56 bytes)
4,038,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,068,642 UART: [rt]cmd =0x44504543, len=96
4,102,287 >>> mbox cmd response data (56 bytes)
4,102,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,132,255 UART: [rt]cmd =0x44504543, len=96
4,164,429 >>> mbox cmd response data (56 bytes)
4,164,430 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,194,565 UART: [rt]cmd =0x44504543, len=96
4,227,906 >>> mbox cmd response data (56 bytes)
4,227,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,258,042 UART: [rt]cmd =0x44504543, len=96
4,290,546 >>> mbox cmd response data (56 bytes)
4,290,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,320,344 UART: [rt]cmd =0x44504543, len=96
4,352,489 >>> mbox cmd response data (56 bytes)
4,352,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,382,383 UART: [rt]cmd =0x44504543, len=96
4,415,737 >>> mbox cmd response data (56 bytes)
4,415,738 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,445,445 UART: [rt]cmd =0x52435458, len=8
4,447,062 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,367 ready_for_fw is high
1,362,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,664 >>> mbox cmd response: success
2,980,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,041,425 UART:
3,041,441 UART: Running Caliptra FMC ...
3,041,849 UART:
3,041,903 UART: [state] CFI Enabled
3,052,189 UART: [fht] FMC Alias Private Key: 7
3,171,461 UART: [art] Extend RT PCRs Done
3,171,889 UART: [art] Lock RT PCRs Done
3,172,989 UART: [art] Populate DV Done
3,181,368 UART: [fht] FMC Alias Private Key: 7
3,182,430 UART: [art] Derive CDI
3,182,710 UART: [art] Store in slot 0x4
3,268,234 UART: [art] Derive Key Pair
3,268,594 UART: [art] Store priv key in slot 0x5
3,281,663 UART: [art] Derive Key Pair - Done
3,296,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,301 UART: [art] PUB.X = 68096089724E8B07C46BC00847727880C037AE6AAFDC01A6FA86F8155BEF108EF70A026B9114EB03582E2DA128ABBEA3
3,319,056 UART: [art] PUB.Y = 50E28EEE4DFCF190DA27E641CD6EF6261F97238D40F9DB9390A91D0DE3FFD2D61B83C0289738BA5325023B8D882C3223
3,326,008 UART: [art] SIG.R = 398F52210B244BF58F0AC5AAF643B6B78178A428A3FA3C03B82780F217F4B7CB345B46B50B6FFF9E0F0BC4F3CAFCAF6F
3,332,780 UART: [art] SIG.S = 5AEE7B76F196BD16A2BCD21B4018D999241B2EDF898478F910D3AC4BB3CA1A287FC0BF94691210CF19715876EBF31D9F
3,356,994 UART: Caliptra RT
3,357,245 UART: [state] CFI Enabled
3,477,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,700 UART: [rt]cmd =0x44504543, len=96
3,541,058 >>> mbox cmd response data (56 bytes)
3,541,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,570,808 UART: [rt]cmd =0x44504543, len=96
3,604,120 >>> mbox cmd response data (56 bytes)
3,604,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,068 UART: [rt]cmd =0x44504543, len=96
3,667,179 >>> mbox cmd response data (56 bytes)
3,667,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,987 UART: [rt]cmd =0x44504543, len=96
3,729,625 >>> mbox cmd response data (56 bytes)
3,729,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,759,487 UART: [rt]cmd =0x44504543, len=96
3,791,586 >>> mbox cmd response data (56 bytes)
3,791,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,821,560 UART: [rt]cmd =0x44504543, len=96
3,854,654 >>> mbox cmd response data (56 bytes)
3,854,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,884,686 UART: [rt]cmd =0x44504543, len=96
3,917,681 >>> mbox cmd response data (56 bytes)
3,917,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,947,749 UART: [rt]cmd =0x44504543, len=96
3,981,097 >>> mbox cmd response data (56 bytes)
3,981,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,011,001 UART: [rt]cmd =0x44504543, len=96
4,043,502 >>> mbox cmd response data (56 bytes)
4,043,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,073,418 UART: [rt]cmd =0x44504543, len=96
4,107,006 >>> mbox cmd response data (56 bytes)
4,107,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,136,908 UART: [rt]cmd =0x44504543, len=96
4,169,663 >>> mbox cmd response data (56 bytes)
4,169,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,199,615 UART: [rt]cmd =0x44504543, len=96
4,232,641 >>> mbox cmd response data (56 bytes)
4,232,642 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,262,215 UART: [rt]cmd =0x52435458, len=8
4,263,694 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
87,052 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,688 UART: [kat] SHA2-256
882,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,734 UART: [kat] ++
886,886 UART: [kat] sha1
891,056 UART: [kat] SHA2-256
892,994 UART: [kat] SHA2-384
895,943 UART: [kat] SHA2-512-ACC
897,844 UART: [kat] ECC-384
903,561 UART: [kat] HMAC-384Kdf
908,027 UART: [kat] LMS
1,476,223 UART: [kat] --
1,477,024 UART: [cold-reset] ++
1,477,604 UART: [fht] Storing FHT @ 0x50003400
1,480,379 UART: [idev] ++
1,480,547 UART: [idev] CDI.KEYID = 6
1,480,907 UART: [idev] SUBJECT.KEYID = 7
1,481,331 UART: [idev] UDS.KEYID = 0
1,481,676 ready_for_fw is high
1,481,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,511 UART: [idev] Erasing UDS.KEYID = 0
1,506,027 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,729 UART: [idev] --
1,515,780 UART: [ldev] ++
1,515,948 UART: [ldev] CDI.KEYID = 6
1,516,311 UART: [ldev] SUBJECT.KEYID = 5
1,516,737 UART: [ldev] AUTHORITY.KEYID = 7
1,517,200 UART: [ldev] FE.KEYID = 1
1,522,460 UART: [ldev] Erasing FE.KEYID = 1
1,548,119 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,285 UART: [ldev] --
1,587,646 UART: [fwproc] Waiting for Commands...
1,588,301 UART: [fwproc] Received command 0x46574c44
1,589,092 UART: [fwproc] Received Image of size 118548 bytes
2,934,148 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,672 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,890 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,315 >>> mbox cmd response: success
3,133,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,134,365 UART: [afmc] ++
3,134,533 UART: [afmc] CDI.KEYID = 6
3,134,895 UART: [afmc] SUBJECT.KEYID = 7
3,135,320 UART: [afmc] AUTHORITY.KEYID = 5
3,170,389 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,541 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,321 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,030 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,913 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,596 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,278 UART: [afmc] --
3,213,284 UART: [cold-reset] --
3,214,152 UART: [state] Locking Datavault
3,215,171 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,775 UART: [state] Locking ICCM
3,216,243 UART: [exit] Launching FMC @ 0x40000130
3,221,573 UART:
3,221,589 UART: Running Caliptra FMC ...
3,221,997 UART:
3,222,140 UART: [state] CFI Enabled
3,232,944 UART: [fht] FMC Alias Private Key: 7
3,351,940 UART: [art] Extend RT PCRs Done
3,352,368 UART: [art] Lock RT PCRs Done
3,354,084 UART: [art] Populate DV Done
3,362,165 UART: [fht] FMC Alias Private Key: 7
3,363,267 UART: [art] Derive CDI
3,363,547 UART: [art] Store in slot 0x4
3,449,539 UART: [art] Derive Key Pair
3,449,899 UART: [art] Store priv key in slot 0x5
3,463,404 UART: [art] Derive Key Pair - Done
3,478,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,694 UART: [art] PUB.X = 810F77422DDEB0E9606647EB01155A99B89F2063AAA12E5C0C4E3E8E89A29B870C78B17C2BA3151A9EF83D96B694575A
3,501,456 UART: [art] PUB.Y = FADFE86FB9F5FA98117F20A421602A552A1B5F07D6FAD2F5306B4CEBD18A554BDCA9A280FF9EC00B9B88B4A4B5854044
3,508,420 UART: [art] SIG.R = 4E406B48F49349D79B793C758470FA635738B4F3C4C05C3B74529E9DC35CE369F494B7084657833438D8BF1BBB0CE147
3,515,180 UART: [art] SIG.S = 1D68A1CB144F48EE18933AC8401CFCC6967D8D99BDC6D6AD876F6AB828534276AEB2AD7BD20B9946099C5278E0C17FA3
3,539,214 UART: Caliptra RT
3,539,557 UART: [state] CFI Enabled
3,659,748 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,528 UART: [rt]cmd =0x44504543, len=96
3,723,738 >>> mbox cmd response data (56 bytes)
3,723,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,753,854 UART: [rt]cmd =0x44504543, len=96
3,786,724 >>> mbox cmd response data (56 bytes)
3,786,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,640 UART: [rt]cmd =0x44504543, len=96
3,849,841 >>> mbox cmd response data (56 bytes)
3,849,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,879,895 UART: [rt]cmd =0x44504543, len=96
3,913,249 >>> mbox cmd response data (56 bytes)
3,913,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,113 UART: [rt]cmd =0x44504543, len=96
3,976,106 >>> mbox cmd response data (56 bytes)
3,976,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,005,856 UART: [rt]cmd =0x44504543, len=96
4,038,124 >>> mbox cmd response data (56 bytes)
4,038,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,068,044 UART: [rt]cmd =0x44504543, len=96
4,100,843 >>> mbox cmd response data (56 bytes)
4,100,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,130,611 UART: [rt]cmd =0x44504543, len=96
4,163,485 >>> mbox cmd response data (56 bytes)
4,163,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,193,677 UART: [rt]cmd =0x44504543, len=96
4,226,674 >>> mbox cmd response data (56 bytes)
4,226,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,256,832 UART: [rt]cmd =0x44504543, len=96
4,290,062 >>> mbox cmd response data (56 bytes)
4,290,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,320,084 UART: [rt]cmd =0x44504543, len=96
4,352,725 >>> mbox cmd response data (56 bytes)
4,352,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,382,543 UART: [rt]cmd =0x44504543, len=96
4,414,807 >>> mbox cmd response data (56 bytes)
4,414,808 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,444,317 UART: [rt]cmd =0x52435458, len=8
4,445,844 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,088 ready_for_fw is high
1,363,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,334 >>> mbox cmd response: success
2,983,334 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,044,921 UART:
3,044,937 UART: Running Caliptra FMC ...
3,045,345 UART:
3,045,488 UART: [state] CFI Enabled
3,056,210 UART: [fht] FMC Alias Private Key: 7
3,175,046 UART: [art] Extend RT PCRs Done
3,175,474 UART: [art] Lock RT PCRs Done
3,177,244 UART: [art] Populate DV Done
3,185,839 UART: [fht] FMC Alias Private Key: 7
3,186,967 UART: [art] Derive CDI
3,187,247 UART: [art] Store in slot 0x4
3,272,915 UART: [art] Derive Key Pair
3,273,275 UART: [art] Store priv key in slot 0x5
3,286,618 UART: [art] Derive Key Pair - Done
3,301,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,741 UART: [art] PUB.X = 77DDD8FADA1966DA366EAA9B32C4FE5610200C45DF9357FCA7673CB520780CB054288F09DA89E19690924A7E28558FF6
3,324,508 UART: [art] PUB.Y = 0F5D0D70162E3FDBA70B791A92A0CD4B1F7609498B1576C07704770991E20D5BF0064934FC87CEAF3DD52DBBF9DD974D
3,331,444 UART: [art] SIG.R = 82303B1E003BF6C3A36DDAD85B8B4010AB6CCD75A3DF493D33860E85AFCEB0844A9455FEFAA7545330DB4C0D8DDDBBB9
3,338,210 UART: [art] SIG.S = 23E10D4414DEFC84A56E872D538C48B2FE54FEDDEB4FA69181D382654D8E25496B416EEED6B7EDF77057225F3556FB35
3,362,311 UART: Caliptra RT
3,362,654 UART: [state] CFI Enabled
3,483,090 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,952 UART: [rt]cmd =0x44504543, len=96
3,547,014 >>> mbox cmd response data (56 bytes)
3,547,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,577,120 UART: [rt]cmd =0x44504543, len=96
3,610,262 >>> mbox cmd response data (56 bytes)
3,610,263 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,322 UART: [rt]cmd =0x44504543, len=96
3,673,109 >>> mbox cmd response data (56 bytes)
3,673,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,703,061 UART: [rt]cmd =0x44504543, len=96
3,736,215 >>> mbox cmd response data (56 bytes)
3,736,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,766,191 UART: [rt]cmd =0x44504543, len=96
3,799,354 >>> mbox cmd response data (56 bytes)
3,799,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,829,398 UART: [rt]cmd =0x44504543, len=96
3,861,646 >>> mbox cmd response data (56 bytes)
3,861,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,784 UART: [rt]cmd =0x44504543, len=96
3,925,117 >>> mbox cmd response data (56 bytes)
3,925,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,955,189 UART: [rt]cmd =0x44504543, len=96
3,988,101 >>> mbox cmd response data (56 bytes)
3,988,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,909 UART: [rt]cmd =0x44504543, len=96
4,051,480 >>> mbox cmd response data (56 bytes)
4,051,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,081,364 UART: [rt]cmd =0x44504543, len=96
4,114,372 >>> mbox cmd response data (56 bytes)
4,114,373 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,144,312 UART: [rt]cmd =0x44504543, len=96
4,177,453 >>> mbox cmd response data (56 bytes)
4,177,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,207,177 UART: [rt]cmd =0x44504543, len=96
4,239,929 >>> mbox cmd response data (56 bytes)
4,239,930 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,269,283 UART: [rt]cmd =0x52435458, len=8
4,270,900 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,077 UART: [state] WD Timer not started. Device not locked for debugging
87,216 UART: [kat] SHA2-256
890,766 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,870 UART: [kat] ++
895,022 UART: [kat] sha1
899,120 UART: [kat] SHA2-256
901,060 UART: [kat] SHA2-384
903,749 UART: [kat] SHA2-512-ACC
905,650 UART: [kat] ECC-384
915,131 UART: [kat] HMAC-384Kdf
919,747 UART: [kat] LMS
1,168,059 UART: [kat] --
1,169,104 UART: [cold-reset] ++
1,169,614 UART: [fht] FHT @ 0x50003400
1,172,286 UART: [idev] ++
1,172,454 UART: [idev] CDI.KEYID = 6
1,172,815 UART: [idev] SUBJECT.KEYID = 7
1,173,240 UART: [idev] UDS.KEYID = 0
1,173,586 ready_for_fw is high
1,173,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,669 UART: [idev] Erasing UDS.KEYID = 0
1,198,813 UART: [idev] Sha1 KeyId Algorithm
1,207,879 UART: [idev] --
1,208,702 UART: [ldev] ++
1,208,870 UART: [ldev] CDI.KEYID = 6
1,209,234 UART: [ldev] SUBJECT.KEYID = 5
1,209,661 UART: [ldev] AUTHORITY.KEYID = 7
1,210,124 UART: [ldev] FE.KEYID = 1
1,215,248 UART: [ldev] Erasing FE.KEYID = 1
1,241,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,100 UART: [ldev] --
1,280,379 UART: [fwproc] Wait for Commands...
1,281,056 UART: [fwproc] Recv command 0x46574c44
1,281,789 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,629 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,804 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,971 >>> mbox cmd response: success
2,824,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,826,209 UART: [afmc] ++
2,826,377 UART: [afmc] CDI.KEYID = 6
2,826,740 UART: [afmc] SUBJECT.KEYID = 7
2,827,166 UART: [afmc] AUTHORITY.KEYID = 5
2,862,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,975 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,685 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,566 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,267 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,968 UART: [afmc] --
2,906,023 UART: [cold-reset] --
2,906,799 UART: [state] Locking Datavault
2,907,914 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,518 UART: [state] Locking ICCM
2,908,986 UART: [exit] Launching FMC @ 0x40000130
2,914,316 UART:
2,914,332 UART: Running Caliptra FMC ...
2,914,740 UART:
2,914,794 UART: [state] CFI Enabled
2,925,592 UART: [fht] FMC Alias Private Key: 7
3,044,678 UART: [art] Extend RT PCRs Done
3,045,106 UART: [art] Lock RT PCRs Done
3,046,692 UART: [art] Populate DV Done
3,054,741 UART: [fht] FMC Alias Private Key: 7
3,055,865 UART: [art] Derive CDI
3,056,145 UART: [art] Store in slot 0x4
3,141,656 UART: [art] Derive Key Pair
3,142,016 UART: [art] Store priv key in slot 0x5
3,155,518 UART: [art] Derive Key Pair - Done
3,170,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,517 UART: [art] PUB.X = 946AE40CB6904BF4A6EC53DCE5E7E14D38B8EF2FC0DE07B61CD51AA0E4DCB4B833EEF8F6675F937AC686DB21DB25CA8F
3,193,311 UART: [art] PUB.Y = 2ECBF2328027565EEAE18249E6D8C882230D9292116159F94ED39A55667B669B56422803A60DD7DE282D8A5EDCF627D9
3,200,250 UART: [art] SIG.R = CF2177FA996C94F5D783CADFF74A58E40098E2E411E7019204815EA0A52E1817AE453E3493976BCEA2BB26CDCBA490C9
3,207,002 UART: [art] SIG.S = 97341EC9A6D4F0B956446FF41B0B5BC5D458E7FAFBA2D5693260A41BD4EE6D1148FEF55F656DC0B6836EA4D7E98123B3
3,231,361 UART: Caliptra RT
3,231,612 UART: [state] CFI Enabled
3,349,636 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,728 UART: [rt]cmd =0x44504543, len=96
3,413,170 >>> mbox cmd response data (56 bytes)
3,413,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,443,104 UART: [rt]cmd =0x44504543, len=96
3,476,016 >>> mbox cmd response data (56 bytes)
3,476,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,505,990 UART: [rt]cmd =0x44504543, len=96
3,538,973 >>> mbox cmd response data (56 bytes)
3,538,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,568,839 UART: [rt]cmd =0x44504543, len=96
3,601,923 >>> mbox cmd response data (56 bytes)
3,601,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,631,997 UART: [rt]cmd =0x44504543, len=96
3,665,670 >>> mbox cmd response data (56 bytes)
3,665,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,695,652 UART: [rt]cmd =0x44504543, len=96
3,728,544 >>> mbox cmd response data (56 bytes)
3,728,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,758,462 UART: [rt]cmd =0x44504543, len=96
3,791,767 >>> mbox cmd response data (56 bytes)
3,791,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,821,869 UART: [rt]cmd =0x44504543, len=96
3,854,395 >>> mbox cmd response data (56 bytes)
3,854,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,884,329 UART: [rt]cmd =0x44504543, len=96
3,916,850 >>> mbox cmd response data (56 bytes)
3,916,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,946,930 UART: [rt]cmd =0x44504543, len=96
3,979,590 >>> mbox cmd response data (56 bytes)
3,979,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,568 UART: [rt]cmd =0x44504543, len=96
4,041,989 >>> mbox cmd response data (56 bytes)
4,041,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,071,997 UART: [rt]cmd =0x44504543, len=96
4,104,641 >>> mbox cmd response data (56 bytes)
4,104,642 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,134,055 UART: [rt]cmd =0x52435458, len=8
4,135,626 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,206 ready_for_fw is high
1,059,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,490 >>> mbox cmd response: success
2,678,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,407 UART:
2,740,423 UART: Running Caliptra FMC ...
2,740,831 UART:
2,740,885 UART: [state] CFI Enabled
2,751,243 UART: [fht] FMC Alias Private Key: 7
2,871,005 UART: [art] Extend RT PCRs Done
2,871,433 UART: [art] Lock RT PCRs Done
2,873,237 UART: [art] Populate DV Done
2,881,514 UART: [fht] FMC Alias Private Key: 7
2,882,514 UART: [art] Derive CDI
2,882,794 UART: [art] Store in slot 0x4
2,968,815 UART: [art] Derive Key Pair
2,969,175 UART: [art] Store priv key in slot 0x5
2,982,921 UART: [art] Derive Key Pair - Done
2,997,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,281 UART: [art] PUB.X = B1E8B19FC02A63FD06CC6155CA626083BE6FB1DC224AB96EBE3BCD5EC6B2F6FD89AB808FB6830CBF4AC99C233A4D1B04
3,021,070 UART: [art] PUB.Y = D0EE267899DD8456F23A35221609C1A8E11D6C1705CAF0D4FB99152E37E0460540169D2715017757C18FDE35EB998B3C
3,028,004 UART: [art] SIG.R = 4927BB1D26E93A6027BD171E1D097FE68461DB28A46D282EF7CFE6511B2050C2FDC2CBCD541680AF226E72344AC8F12D
3,034,781 UART: [art] SIG.S = 8899B4D008F43094B947B0620C79B9FBC945B704D8B1D7D207E6F595A42B7B9D6605FB81332DDD002634CAF58DE6BC92
3,058,484 UART: Caliptra RT
3,058,735 UART: [state] CFI Enabled
3,178,170 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,278 UART: [rt]cmd =0x44504543, len=96
3,241,186 >>> mbox cmd response data (56 bytes)
3,241,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,048 UART: [rt]cmd =0x44504543, len=96
3,303,618 >>> mbox cmd response data (56 bytes)
3,303,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,333,502 UART: [rt]cmd =0x44504543, len=96
3,366,773 >>> mbox cmd response data (56 bytes)
3,366,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,751 UART: [rt]cmd =0x44504543, len=96
3,429,855 >>> mbox cmd response data (56 bytes)
3,429,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,459,801 UART: [rt]cmd =0x44504543, len=96
3,493,156 >>> mbox cmd response data (56 bytes)
3,493,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,292 UART: [rt]cmd =0x44504543, len=96
3,555,702 >>> mbox cmd response data (56 bytes)
3,555,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,494 UART: [rt]cmd =0x44504543, len=96
3,619,403 >>> mbox cmd response data (56 bytes)
3,619,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,417 UART: [rt]cmd =0x44504543, len=96
3,682,363 >>> mbox cmd response data (56 bytes)
3,682,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,239 UART: [rt]cmd =0x44504543, len=96
3,745,236 >>> mbox cmd response data (56 bytes)
3,745,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,775,046 UART: [rt]cmd =0x44504543, len=96
3,807,684 >>> mbox cmd response data (56 bytes)
3,807,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,850 UART: [rt]cmd =0x44504543, len=96
3,871,249 >>> mbox cmd response data (56 bytes)
3,871,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,305 UART: [rt]cmd =0x44504543, len=96
3,934,435 >>> mbox cmd response data (56 bytes)
3,934,436 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,869 UART: [rt]cmd =0x52435458, len=8
3,965,458 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,599 UART: [kat] ++
895,751 UART: [kat] sha1
899,793 UART: [kat] SHA2-256
901,733 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
916,228 UART: [kat] HMAC-384Kdf
920,912 UART: [kat] LMS
1,169,224 UART: [kat] --
1,169,965 UART: [cold-reset] ++
1,170,435 UART: [fht] FHT @ 0x50003400
1,173,213 UART: [idev] ++
1,173,381 UART: [idev] CDI.KEYID = 6
1,173,742 UART: [idev] SUBJECT.KEYID = 7
1,174,167 UART: [idev] UDS.KEYID = 0
1,174,513 ready_for_fw is high
1,174,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,336 UART: [idev] Erasing UDS.KEYID = 0
1,199,790 UART: [idev] Sha1 KeyId Algorithm
1,208,500 UART: [idev] --
1,209,507 UART: [ldev] ++
1,209,675 UART: [ldev] CDI.KEYID = 6
1,210,039 UART: [ldev] SUBJECT.KEYID = 5
1,210,466 UART: [ldev] AUTHORITY.KEYID = 7
1,210,929 UART: [ldev] FE.KEYID = 1
1,216,327 UART: [ldev] Erasing FE.KEYID = 1
1,243,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,341 UART: [ldev] --
1,282,692 UART: [fwproc] Wait for Commands...
1,283,367 UART: [fwproc] Recv command 0x46574c44
1,284,100 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,668 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,843 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,020 >>> mbox cmd response: success
2,826,020 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,204 UART: [afmc] ++
2,827,372 UART: [afmc] CDI.KEYID = 6
2,827,735 UART: [afmc] SUBJECT.KEYID = 7
2,828,161 UART: [afmc] AUTHORITY.KEYID = 5
2,863,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,269 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,018 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,728 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,609 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,310 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,091 UART: [afmc] --
2,907,130 UART: [cold-reset] --
2,907,960 UART: [state] Locking Datavault
2,909,321 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,925 UART: [state] Locking ICCM
2,910,533 UART: [exit] Launching FMC @ 0x40000130
2,915,863 UART:
2,915,879 UART: Running Caliptra FMC ...
2,916,287 UART:
2,916,430 UART: [state] CFI Enabled
2,927,322 UART: [fht] FMC Alias Private Key: 7
3,046,226 UART: [art] Extend RT PCRs Done
3,046,654 UART: [art] Lock RT PCRs Done
3,048,506 UART: [art] Populate DV Done
3,056,617 UART: [fht] FMC Alias Private Key: 7
3,057,587 UART: [art] Derive CDI
3,057,867 UART: [art] Store in slot 0x4
3,143,146 UART: [art] Derive Key Pair
3,143,506 UART: [art] Store priv key in slot 0x5
3,157,340 UART: [art] Derive Key Pair - Done
3,172,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,302 UART: [art] PUB.X = 88CD91C80500F927C91B7A20C933D439885A1FE28682AFA5110773E49E4200B2C345C968C9132EC0BAFD7F7D0A5B247E
3,195,021 UART: [art] PUB.Y = E423F917233F35A4EA7DAAA59663AF68BB76183FF51C30B36D82F54A0B03EF9936E806E7F3F9833672DA6295306C4771
3,201,962 UART: [art] SIG.R = F3352D5DB006A36B3A58E324B33194CD5A5BB7C24F5FE34ED3BD691DB5700A7F16172DB05E8A8ADF4F2AC5594E930A73
3,208,737 UART: [art] SIG.S = 1CCD29DBC15B5CD88F3E3F8AE4A716006064023A8736E43DFA2F21D940906F142EE583FF66DC372B69A6662D9FAC558F
3,233,336 UART: Caliptra RT
3,233,679 UART: [state] CFI Enabled
3,353,922 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,310 UART: [rt]cmd =0x44504543, len=96
3,417,678 >>> mbox cmd response data (56 bytes)
3,417,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,520 UART: [rt]cmd =0x44504543, len=96
3,480,466 >>> mbox cmd response data (56 bytes)
3,480,467 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,532 UART: [rt]cmd =0x44504543, len=96
3,543,423 >>> mbox cmd response data (56 bytes)
3,543,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,277 UART: [rt]cmd =0x44504543, len=96
3,606,107 >>> mbox cmd response data (56 bytes)
3,606,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,033 UART: [rt]cmd =0x44504543, len=96
3,668,974 >>> mbox cmd response data (56 bytes)
3,668,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,932 UART: [rt]cmd =0x44504543, len=96
3,731,758 >>> mbox cmd response data (56 bytes)
3,731,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,761,396 UART: [rt]cmd =0x44504543, len=96
3,793,649 >>> mbox cmd response data (56 bytes)
3,793,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,823,597 UART: [rt]cmd =0x44504543, len=96
3,856,387 >>> mbox cmd response data (56 bytes)
3,856,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,049 UART: [rt]cmd =0x44504543, len=96
3,919,124 >>> mbox cmd response data (56 bytes)
3,919,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,946 UART: [rt]cmd =0x44504543, len=96
3,982,136 >>> mbox cmd response data (56 bytes)
3,982,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,140 UART: [rt]cmd =0x44504543, len=96
4,045,173 >>> mbox cmd response data (56 bytes)
4,045,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,075,065 UART: [rt]cmd =0x44504543, len=96
4,108,309 >>> mbox cmd response data (56 bytes)
4,108,310 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,137,799 UART: [rt]cmd =0x52435458, len=8
4,139,356 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,379 ready_for_fw is high
1,059,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,045 >>> mbox cmd response: success
2,679,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,200 UART:
2,741,216 UART: Running Caliptra FMC ...
2,741,624 UART:
2,741,767 UART: [state] CFI Enabled
2,752,495 UART: [fht] FMC Alias Private Key: 7
2,872,267 UART: [art] Extend RT PCRs Done
2,872,695 UART: [art] Lock RT PCRs Done
2,874,329 UART: [art] Populate DV Done
2,882,458 UART: [fht] FMC Alias Private Key: 7
2,883,412 UART: [art] Derive CDI
2,883,692 UART: [art] Store in slot 0x4
2,969,107 UART: [art] Derive Key Pair
2,969,467 UART: [art] Store priv key in slot 0x5
2,983,151 UART: [art] Derive Key Pair - Done
2,997,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,614 UART: [art] PUB.X = 9E27DDBABC7478823AA5965CE9635FA281179EBA5B2EAD5DF3C00A0BB977F0F6DB08540CCB77B893066ECE86554C8712
3,021,383 UART: [art] PUB.Y = F563BD75C017C3F310B0129EB831D419B2F006F22ABE8B1F4E2E05E989549F4C1693752F51F2DEE3F2B236AEA68FF6B8
3,028,337 UART: [art] SIG.R = 810B349348B78D009988AAEFCDE39520B2DC23187091357323DF0F9F293F0A1CAE5B660C546D2CC5B6A8075CC191DD20
3,035,074 UART: [art] SIG.S = 8655818658B4DAA2018C8D6B1CC5F38AD14F9771191FE44FC2ABE596A08DD84C56115A40A6986E658EF1F3980AEB6741
3,059,078 UART: Caliptra RT
3,059,421 UART: [state] CFI Enabled
3,178,957 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,083 UART: [rt]cmd =0x44504543, len=96
3,243,093 >>> mbox cmd response data (56 bytes)
3,243,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,029 UART: [rt]cmd =0x44504543, len=96
3,306,377 >>> mbox cmd response data (56 bytes)
3,306,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,336,299 UART: [rt]cmd =0x44504543, len=96
3,368,526 >>> mbox cmd response data (56 bytes)
3,368,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,310 UART: [rt]cmd =0x44504543, len=96
3,431,024 >>> mbox cmd response data (56 bytes)
3,431,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,710 UART: [rt]cmd =0x44504543, len=96
3,493,641 >>> mbox cmd response data (56 bytes)
3,493,642 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,739 UART: [rt]cmd =0x44504543, len=96
3,556,877 >>> mbox cmd response data (56 bytes)
3,556,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,999 UART: [rt]cmd =0x44504543, len=96
3,618,780 >>> mbox cmd response data (56 bytes)
3,618,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,810 UART: [rt]cmd =0x44504543, len=96
3,682,222 >>> mbox cmd response data (56 bytes)
3,682,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,282 UART: [rt]cmd =0x44504543, len=96
3,746,371 >>> mbox cmd response data (56 bytes)
3,746,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,776,053 UART: [rt]cmd =0x44504543, len=96
3,808,165 >>> mbox cmd response data (56 bytes)
3,808,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,157 UART: [rt]cmd =0x44504543, len=96
3,871,128 >>> mbox cmd response data (56 bytes)
3,871,129 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,144 UART: [rt]cmd =0x44504543, len=96
3,934,300 >>> mbox cmd response data (56 bytes)
3,934,301 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,586 UART: [rt]cmd =0x52435458, len=8
3,965,185 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
893,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,333 UART: [kat] ++
897,485 UART: [kat] sha1
901,927 UART: [kat] SHA2-256
903,867 UART: [kat] SHA2-384
906,516 UART: [kat] SHA2-512-ACC
908,417 UART: [kat] ECC-384
917,884 UART: [kat] HMAC-384Kdf
922,332 UART: [kat] LMS
1,170,660 UART: [kat] --
1,171,491 UART: [cold-reset] ++
1,171,957 UART: [fht] FHT @ 0x50003400
1,174,608 UART: [idev] ++
1,174,776 UART: [idev] CDI.KEYID = 6
1,175,136 UART: [idev] SUBJECT.KEYID = 7
1,175,560 UART: [idev] UDS.KEYID = 0
1,175,905 ready_for_fw is high
1,175,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,554 UART: [idev] Erasing UDS.KEYID = 0
1,200,335 UART: [idev] Sha1 KeyId Algorithm
1,208,731 UART: [idev] --
1,209,653 UART: [ldev] ++
1,209,821 UART: [ldev] CDI.KEYID = 6
1,210,184 UART: [ldev] SUBJECT.KEYID = 5
1,210,610 UART: [ldev] AUTHORITY.KEYID = 7
1,211,073 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,242,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,295 UART: [ldev] --
1,281,646 UART: [fwproc] Wait for Commands...
1,282,402 UART: [fwproc] Recv command 0x46574c44
1,283,130 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,852 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,022 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,359 >>> mbox cmd response: success
2,827,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,613 UART: [afmc] ++
2,828,781 UART: [afmc] CDI.KEYID = 6
2,829,143 UART: [afmc] SUBJECT.KEYID = 7
2,829,568 UART: [afmc] AUTHORITY.KEYID = 5
2,864,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,150 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,859 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,742 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,443 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,413 UART: [afmc] --
2,908,533 UART: [cold-reset] --
2,909,353 UART: [state] Locking Datavault
2,910,424 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,028 UART: [state] Locking ICCM
2,911,668 UART: [exit] Launching FMC @ 0x40000130
2,916,998 UART:
2,917,014 UART: Running Caliptra FMC ...
2,917,422 UART:
2,917,476 UART: [state] CFI Enabled
2,928,220 UART: [fht] FMC Alias Private Key: 7
3,047,728 UART: [art] Extend RT PCRs Done
3,048,156 UART: [art] Lock RT PCRs Done
3,049,974 UART: [art] Populate DV Done
3,058,277 UART: [fht] FMC Alias Private Key: 7
3,059,251 UART: [art] Derive CDI
3,059,531 UART: [art] Store in slot 0x4
3,145,420 UART: [art] Derive Key Pair
3,145,780 UART: [art] Store priv key in slot 0x5
3,158,674 UART: [art] Derive Key Pair - Done
3,173,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,749 UART: [art] PUB.X = 5ECBAA37D7C7FE0A23050502572F97B40535700A3873EC4DFF328DD93219B64CD21576A32B3E7255EE333A99D0B628CE
3,196,505 UART: [art] PUB.Y = BA0F36E934805F301AED6CF88D140EFD66385773EC9D6657920537A9F0A24AFE9710C6DBD991B172607A67D82CFA2F56
3,203,452 UART: [art] SIG.R = C4D4A83C7BD3833E083A95E0654A2509629CF8EA3AF204FF686C2BDDD0788C76E66144505D5EC6FE0A8A6451F969C3F7
3,210,218 UART: [art] SIG.S = 5E57D4BE1C0C9D36D8639C755D72A9210DE54E3DE093616A1FD359548AA0503AE7558BBE0A84672E9DDFED414A3F8716
3,233,709 UART: Caliptra RT
3,233,960 UART: [state] CFI Enabled
3,353,743 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,951 UART: [rt]cmd =0x44504543, len=96
3,417,771 >>> mbox cmd response data (56 bytes)
3,417,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,813 UART: [rt]cmd =0x44504543, len=96
3,480,513 >>> mbox cmd response data (56 bytes)
3,480,514 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,657 UART: [rt]cmd =0x44504543, len=96
3,544,120 >>> mbox cmd response data (56 bytes)
3,544,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,574,126 UART: [rt]cmd =0x44504543, len=96
3,607,214 >>> mbox cmd response data (56 bytes)
3,607,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,022 UART: [rt]cmd =0x44504543, len=96
3,669,673 >>> mbox cmd response data (56 bytes)
3,669,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,589 UART: [rt]cmd =0x44504543, len=96
3,732,127 >>> mbox cmd response data (56 bytes)
3,732,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,762,109 UART: [rt]cmd =0x44504543, len=96
3,794,940 >>> mbox cmd response data (56 bytes)
3,794,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,824,736 UART: [rt]cmd =0x44504543, len=96
3,858,026 >>> mbox cmd response data (56 bytes)
3,858,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,888,040 UART: [rt]cmd =0x44504543, len=96
3,921,063 >>> mbox cmd response data (56 bytes)
3,921,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,219 UART: [rt]cmd =0x44504543, len=96
3,984,485 >>> mbox cmd response data (56 bytes)
3,984,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,371 UART: [rt]cmd =0x44504543, len=96
4,046,800 >>> mbox cmd response data (56 bytes)
4,046,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,076,644 UART: [rt]cmd =0x44504543, len=96
4,109,366 >>> mbox cmd response data (56 bytes)
4,109,367 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,138,584 UART: [rt]cmd =0x52435458, len=8
4,140,167 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,133 ready_for_fw is high
1,060,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,103 >>> mbox cmd response: success
2,679,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,848 UART:
2,741,864 UART: Running Caliptra FMC ...
2,742,272 UART:
2,742,326 UART: [state] CFI Enabled
2,752,994 UART: [fht] FMC Alias Private Key: 7
2,871,364 UART: [art] Extend RT PCRs Done
2,871,792 UART: [art] Lock RT PCRs Done
2,873,454 UART: [art] Populate DV Done
2,881,673 UART: [fht] FMC Alias Private Key: 7
2,882,729 UART: [art] Derive CDI
2,883,009 UART: [art] Store in slot 0x4
2,969,228 UART: [art] Derive Key Pair
2,969,588 UART: [art] Store priv key in slot 0x5
2,982,388 UART: [art] Derive Key Pair - Done
2,997,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,805 UART: [art] PUB.X = FC443DA9BF9EED5320A3F4375B5F917ED15EE16189DA0B78D9D181B4C725A7B871AC1117A217ED757EDA048AFE02CC88
3,019,582 UART: [art] PUB.Y = 5B0B25291F0006CC9E1B83295A74994EA1C30559DB714EA9DD58FF3FB24ED79E06C75E195FA87358F0431BFE7D172631
3,026,502 UART: [art] SIG.R = FAF5215602ABA840841B64000D09D11235375324DEAA6A893143D0244CBEAC08748C7295B69E7891F11801942705B709
3,033,217 UART: [art] SIG.S = 0D0244151E9A8DC27D356F901E87A608F708DA7CFE42B04F9BFE3FC93E7EAB6EFAD2E165F6AC0090990B91086CFD864C
3,057,321 UART: Caliptra RT
3,057,572 UART: [state] CFI Enabled
3,176,879 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,063 UART: [rt]cmd =0x44504543, len=96
3,240,249 >>> mbox cmd response data (56 bytes)
3,240,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,270,223 UART: [rt]cmd =0x44504543, len=96
3,302,771 >>> mbox cmd response data (56 bytes)
3,302,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,332,873 UART: [rt]cmd =0x44504543, len=96
3,365,816 >>> mbox cmd response data (56 bytes)
3,365,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,874 UART: [rt]cmd =0x44504543, len=96
3,428,242 >>> mbox cmd response data (56 bytes)
3,428,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,458,252 UART: [rt]cmd =0x44504543, len=96
3,490,441 >>> mbox cmd response data (56 bytes)
3,490,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,563 UART: [rt]cmd =0x44504543, len=96
3,554,167 >>> mbox cmd response data (56 bytes)
3,554,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,584,029 UART: [rt]cmd =0x44504543, len=96
3,617,484 >>> mbox cmd response data (56 bytes)
3,617,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,647,450 UART: [rt]cmd =0x44504543, len=96
3,680,148 >>> mbox cmd response data (56 bytes)
3,680,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,709,932 UART: [rt]cmd =0x44504543, len=96
3,743,035 >>> mbox cmd response data (56 bytes)
3,743,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,772,995 UART: [rt]cmd =0x44504543, len=96
3,806,085 >>> mbox cmd response data (56 bytes)
3,806,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,221 UART: [rt]cmd =0x44504543, len=96
3,869,148 >>> mbox cmd response data (56 bytes)
3,869,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,336 UART: [rt]cmd =0x44504543, len=96
3,932,336 >>> mbox cmd response data (56 bytes)
3,932,337 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,961,826 UART: [rt]cmd =0x52435458, len=8
3,963,529 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
893,549 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,674 UART: [kat] ++
897,826 UART: [kat] sha1
901,988 UART: [kat] SHA2-256
903,928 UART: [kat] SHA2-384
906,459 UART: [kat] SHA2-512-ACC
908,360 UART: [kat] ECC-384
918,353 UART: [kat] HMAC-384Kdf
922,819 UART: [kat] LMS
1,171,147 UART: [kat] --
1,172,122 UART: [cold-reset] ++
1,172,546 UART: [fht] FHT @ 0x50003400
1,175,025 UART: [idev] ++
1,175,193 UART: [idev] CDI.KEYID = 6
1,175,553 UART: [idev] SUBJECT.KEYID = 7
1,175,977 UART: [idev] UDS.KEYID = 0
1,176,322 ready_for_fw is high
1,176,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,521 UART: [idev] Erasing UDS.KEYID = 0
1,202,180 UART: [idev] Sha1 KeyId Algorithm
1,210,640 UART: [idev] --
1,211,762 UART: [ldev] ++
1,211,930 UART: [ldev] CDI.KEYID = 6
1,212,293 UART: [ldev] SUBJECT.KEYID = 5
1,212,719 UART: [ldev] AUTHORITY.KEYID = 7
1,213,182 UART: [ldev] FE.KEYID = 1
1,218,648 UART: [ldev] Erasing FE.KEYID = 1
1,244,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,936 UART: [ldev] --
1,284,415 UART: [fwproc] Wait for Commands...
1,285,017 UART: [fwproc] Recv command 0x46574c44
1,285,745 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,135 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,305 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,662 >>> mbox cmd response: success
2,827,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,678 UART: [afmc] ++
2,828,846 UART: [afmc] CDI.KEYID = 6
2,829,208 UART: [afmc] SUBJECT.KEYID = 7
2,829,633 UART: [afmc] AUTHORITY.KEYID = 5
2,865,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,177 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,886 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,769 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,470 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,456 UART: [afmc] --
2,909,388 UART: [cold-reset] --
2,910,294 UART: [state] Locking Datavault
2,911,617 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,221 UART: [state] Locking ICCM
2,912,827 UART: [exit] Launching FMC @ 0x40000130
2,918,157 UART:
2,918,173 UART: Running Caliptra FMC ...
2,918,581 UART:
2,918,724 UART: [state] CFI Enabled
2,929,268 UART: [fht] FMC Alias Private Key: 7
3,047,936 UART: [art] Extend RT PCRs Done
3,048,364 UART: [art] Lock RT PCRs Done
3,050,008 UART: [art] Populate DV Done
3,058,287 UART: [fht] FMC Alias Private Key: 7
3,059,275 UART: [art] Derive CDI
3,059,555 UART: [art] Store in slot 0x4
3,145,418 UART: [art] Derive Key Pair
3,145,778 UART: [art] Store priv key in slot 0x5
3,158,754 UART: [art] Derive Key Pair - Done
3,173,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,777 UART: [art] PUB.X = F6F5AF1C303397A54CB1C001063F8B0076D64DC2104D81B990812904F02F3F2556051927B97C59DBFAE4112677D21F1C
3,196,509 UART: [art] PUB.Y = 369E490FEAA062F322A9975660402C31EA989E7526EC25408FFB5F2DCB8577EEC77546B2F4C7F22164318C7D33271604
3,203,449 UART: [art] SIG.R = BAB58489E4AFAD130C6D50AF66AB150363D48295F3642BEFF321AEB96C68FBE14B962886C2DB799DDEBA6977908FFE1C
3,210,231 UART: [art] SIG.S = 348603420B863547CDADC58538DC03D5D1510DDD45B5AF8C49B9DC3017EBA588D3851CE038A1348CF4B135A942E4E38C
3,233,849 UART: Caliptra RT
3,234,192 UART: [state] CFI Enabled
3,354,299 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,217 UART: [rt]cmd =0x44504543, len=96
3,417,959 >>> mbox cmd response data (56 bytes)
3,417,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,803 UART: [rt]cmd =0x44504543, len=96
3,480,393 >>> mbox cmd response data (56 bytes)
3,480,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,399 UART: [rt]cmd =0x44504543, len=96
3,543,438 >>> mbox cmd response data (56 bytes)
3,543,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,338 UART: [rt]cmd =0x44504543, len=96
3,605,602 >>> mbox cmd response data (56 bytes)
3,605,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,546 UART: [rt]cmd =0x44504543, len=96
3,668,277 >>> mbox cmd response data (56 bytes)
3,668,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,569 UART: [rt]cmd =0x44504543, len=96
3,731,233 >>> mbox cmd response data (56 bytes)
3,731,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,761,071 UART: [rt]cmd =0x44504543, len=96
3,793,360 >>> mbox cmd response data (56 bytes)
3,793,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,823,274 UART: [rt]cmd =0x44504543, len=96
3,856,120 >>> mbox cmd response data (56 bytes)
3,856,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,186 UART: [rt]cmd =0x44504543, len=96
3,919,159 >>> mbox cmd response data (56 bytes)
3,919,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,239 UART: [rt]cmd =0x44504543, len=96
3,981,521 >>> mbox cmd response data (56 bytes)
3,981,522 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,011,381 UART: [rt]cmd =0x44504543, len=96
4,044,746 >>> mbox cmd response data (56 bytes)
4,044,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,074,660 UART: [rt]cmd =0x44504543, len=96
4,108,396 >>> mbox cmd response data (56 bytes)
4,108,397 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,138,012 UART: [rt]cmd =0x52435458, len=8
4,139,433 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,490 ready_for_fw is high
1,060,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,903 >>> mbox cmd response: success
2,679,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,814 UART:
2,741,830 UART: Running Caliptra FMC ...
2,742,238 UART:
2,742,381 UART: [state] CFI Enabled
2,753,051 UART: [fht] FMC Alias Private Key: 7
2,872,015 UART: [art] Extend RT PCRs Done
2,872,443 UART: [art] Lock RT PCRs Done
2,874,227 UART: [art] Populate DV Done
2,882,680 UART: [fht] FMC Alias Private Key: 7
2,883,636 UART: [art] Derive CDI
2,883,916 UART: [art] Store in slot 0x4
2,969,425 UART: [art] Derive Key Pair
2,969,785 UART: [art] Store priv key in slot 0x5
2,982,871 UART: [art] Derive Key Pair - Done
2,997,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,980 UART: [art] PUB.X = 54F59C232D9FC7CA2E984BF9D68F3027C5539F3FC917CA26D8A89BB5F14A93A845ADC1EB1AAC5B682396047A8924DBC5
3,020,761 UART: [art] PUB.Y = 7E62C85703C1A78D43477A1C0241F3450C5DB8ED54DFB275423561C4E7197CFCD8D8C7A424BC2AE8D6CCC7343B81ED2B
3,027,714 UART: [art] SIG.R = D0F8FBAD68A728C6EBB7DAE139ACD66D5E7B3335D239E03E5D07D358D5626D21341CC5021DC5878DF4E85746C3DE1013
3,034,490 UART: [art] SIG.S = 89A9D64C086721FFFEE60DBEC99DF45770C7B9F9F400F7C05CC422AA8AF89F0A547E2DDD728266551A8099F6C3F7665A
3,058,139 UART: Caliptra RT
3,058,482 UART: [state] CFI Enabled
3,178,730 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,250 UART: [rt]cmd =0x44504543, len=96
3,242,896 >>> mbox cmd response data (56 bytes)
3,242,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,024 UART: [rt]cmd =0x44504543, len=96
3,306,522 >>> mbox cmd response data (56 bytes)
3,306,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,336,132 UART: [rt]cmd =0x44504543, len=96
3,368,277 >>> mbox cmd response data (56 bytes)
3,368,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,229 UART: [rt]cmd =0x44504543, len=96
3,431,381 >>> mbox cmd response data (56 bytes)
3,431,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,237 UART: [rt]cmd =0x44504543, len=96
3,494,502 >>> mbox cmd response data (56 bytes)
3,494,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,642 UART: [rt]cmd =0x44504543, len=96
3,557,834 >>> mbox cmd response data (56 bytes)
3,557,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,587,746 UART: [rt]cmd =0x44504543, len=96
3,620,083 >>> mbox cmd response data (56 bytes)
3,620,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,650,181 UART: [rt]cmd =0x44504543, len=96
3,682,997 >>> mbox cmd response data (56 bytes)
3,682,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,913 UART: [rt]cmd =0x44504543, len=96
3,746,870 >>> mbox cmd response data (56 bytes)
3,746,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,776,942 UART: [rt]cmd =0x44504543, len=96
3,809,684 >>> mbox cmd response data (56 bytes)
3,809,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,730 UART: [rt]cmd =0x44504543, len=96
3,873,233 >>> mbox cmd response data (56 bytes)
3,873,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,903,297 UART: [rt]cmd =0x44504543, len=96
3,936,333 >>> mbox cmd response data (56 bytes)
3,936,334 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,966,001 UART: [rt]cmd =0x52435458, len=8
3,967,728 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,069 UART:
192,445 UART: Running Caliptra ROM ...
193,639 UART:
193,794 UART: [state] CFI Enabled
265,079 UART: [state] LifecycleState = Unprovisioned
267,020 UART: [state] DebugLocked = No
269,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,941 UART: [kat] SHA2-256
444,657 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,142 UART: [kat] ++
455,598 UART: [kat] sha1
466,303 UART: [kat] SHA2-256
468,959 UART: [kat] SHA2-384
474,391 UART: [kat] SHA2-512-ACC
476,762 UART: [kat] ECC-384
2,766,604 UART: [kat] HMAC-384Kdf
2,778,986 UART: [kat] LMS
3,969,274 UART: [kat] --
3,973,778 UART: [cold-reset] ++
3,976,216 UART: [fht] Storing FHT @ 0x50003400
3,988,901 UART: [idev] ++
3,989,467 UART: [idev] CDI.KEYID = 6
3,990,497 UART: [idev] SUBJECT.KEYID = 7
3,991,671 UART: [idev] UDS.KEYID = 0
3,992,708 ready_for_fw is high
3,992,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,990 UART: [idev] Erasing UDS.KEYID = 0
7,325,840 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,220 UART: [idev] --
7,352,704 UART: [ldev] ++
7,353,272 UART: [ldev] CDI.KEYID = 6
7,354,292 UART: [ldev] SUBJECT.KEYID = 5
7,355,447 UART: [ldev] AUTHORITY.KEYID = 7
7,356,677 UART: [ldev] FE.KEYID = 1
7,401,447 UART: [ldev] Erasing FE.KEYID = 1
10,734,318 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,395 UART: [ldev] --
13,116,055 UART: [fwproc] Waiting for Commands...
13,118,917 UART: [fwproc] Received command 0x46574c44
13,121,117 UART: [fwproc] Received Image of size 118548 bytes
17,226,924 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,876 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,380,954 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,709,036 >>> mbox cmd response: success
17,710,218 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,712,949 UART: [afmc] ++
17,713,525 UART: [afmc] CDI.KEYID = 6
17,714,542 UART: [afmc] SUBJECT.KEYID = 7
17,715,706 UART: [afmc] AUTHORITY.KEYID = 5
21,088,733 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,745 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,012 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,407,459 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,164 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,582 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,457,606 UART: [afmc] --
23,461,257 UART: [cold-reset] --
23,465,656 UART: [state] Locking Datavault
23,473,176 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,988 UART: [state] Locking ICCM
23,476,071 UART: [exit] Launching FMC @ 0x40000130
23,484,480 UART:
23,484,716 UART: Running Caliptra FMC ...
23,485,814 UART:
23,485,973 UART: [state] CFI Enabled
23,550,129 UART: [fht] FMC Alias Private Key: 7
25,890,521 UART: [art] Extend RT PCRs Done
25,891,747 UART: [art] Lock RT PCRs Done
25,893,402 UART: [art] Populate DV Done
25,898,977 UART: [fht] FMC Alias Private Key: 7
25,900,677 UART: [art] Derive CDI
25,901,506 UART: [art] Store in slot 0x4
25,958,744 UART: [art] Derive Key Pair
25,959,784 UART: [art] Store priv key in slot 0x5
29,252,913 UART: [art] Derive Key Pair - Done
29,265,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,415 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,932 UART: [art] PUB.X = 561D0028B0C24F1BFDE9896C6246680FFAF3921115F2F45849F17B90D61A0A966543272DC317D3A8D69F4B24C4FD6836
31,564,247 UART: [art] PUB.Y = F6F8D156455394760F368E897ADB3EDEC4669EE71D91743665C97B8C02CE710D6786AA16AD0EDF3D03639FE098214CD9
31,571,403 UART: [art] SIG.R = ED90D223FB6F29D274EB3024C82ABA12E90B333C82A20C8BDDDCDC7D7D14B21A60F0599CF45F7D96690952ED203AA11F
31,578,817 UART: [art] SIG.S = 873262CC2FAC4A7CA000773F26C91B7B01521912579A95585F210D1C6399B5D189869B7ED8B1A7223FCEA475FF8F4BF8
32,884,131 UART: Caliptra RT
32,884,841 UART: [state] CFI Enabled
33,061,760 UART: [rt] RT listening for mailbox commands...
33,093,817 UART: [rt]cmd =0x44504543, len=96
33,125,229 >>> mbox cmd response data (56 bytes)
33,126,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,156,886 UART: [rt]cmd =0x44504543, len=96
33,188,517 >>> mbox cmd response data (56 bytes)
33,189,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,219,787 UART: [rt]cmd =0x44504543, len=96
33,251,552 >>> mbox cmd response data (56 bytes)
33,252,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,283,117 UART: [rt]cmd =0x44504543, len=96
33,314,607 >>> mbox cmd response data (56 bytes)
33,315,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,345,857 UART: [rt]cmd =0x44504543, len=96
33,377,392 >>> mbox cmd response data (56 bytes)
33,378,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,408,880 UART: [rt]cmd =0x44504543, len=96
33,439,910 >>> mbox cmd response data (56 bytes)
33,440,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,471,182 UART: [rt]cmd =0x44504543, len=96
33,502,874 >>> mbox cmd response data (56 bytes)
33,503,559 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,534,134 UART: [rt]cmd =0x44504543, len=96
33,565,372 >>> mbox cmd response data (56 bytes)
33,566,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,596,702 UART: [rt]cmd =0x44504543, len=96
33,628,797 >>> mbox cmd response data (56 bytes)
33,629,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,659,989 UART: [rt]cmd =0x44504543, len=96
33,691,522 >>> mbox cmd response data (56 bytes)
33,692,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,722,735 UART: [rt]cmd =0x44504543, len=96
33,755,277 >>> mbox cmd response data (56 bytes)
33,755,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,786,703 UART: [rt]cmd =0x44504543, len=96
33,818,335 >>> mbox cmd response data (56 bytes)
33,819,479 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,849,264 UART: [rt]cmd =0x52435458, len=8
33,851,376 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,804,611 ready_for_fw is high
3,805,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,975,901 >>> mbox cmd response: success
17,977,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,675,252 UART:
23,675,666 UART: Running Caliptra FMC ...
23,676,789 UART:
23,676,948 UART: [state] CFI Enabled
23,742,084 UART: [fht] FMC Alias Private Key: 7
26,081,951 UART: [art] Extend RT PCRs Done
26,083,173 UART: [art] Lock RT PCRs Done
26,085,188 UART: [art] Populate DV Done
26,090,876 UART: [fht] FMC Alias Private Key: 7
26,092,528 UART: [art] Derive CDI
26,093,344 UART: [art] Store in slot 0x4
26,151,347 UART: [art] Derive Key Pair
26,152,414 UART: [art] Store priv key in slot 0x5
29,445,109 UART: [art] Derive Key Pair - Done
29,458,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,726 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,229 UART: [art] PUB.X = B9D04EC0271B806A3D5EDA831937C1CFA89FE5B0ACCE7B9CC0D5B8C5F67B6531F593C82777D56B82D02CEBE40B19ABBF
31,754,482 UART: [art] PUB.Y = 78D940B197333866D5BD7E81047EE19FCA1ED582AE3CFBFE26DA80D4AFCFB9374766F322BE2178BAE1F29FF72D367E67
31,761,790 UART: [art] SIG.R = BCD0F0892D3690024B6032268298D8CD8262BF4FF32283E1F46726B7ECBB1E2DC16FD6B80136030D3E8A13EF47ECF18B
31,769,186 UART: [art] SIG.S = AF9EF1A35927BE688CFBAA14E91ACB5C9A42B510DE205EF7EEF00B77A6C4E1E8D724CA71DC8AEB43B6C7B3756D2B8130
33,074,400 UART: Caliptra RT
33,075,112 UART: [state] CFI Enabled
33,250,798 UART: [rt] RT listening for mailbox commands...
33,283,031 UART: [rt]cmd =0x44504543, len=96
33,314,679 >>> mbox cmd response data (56 bytes)
33,315,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,346,317 UART: [rt]cmd =0x44504543, len=96
33,378,477 >>> mbox cmd response data (56 bytes)
33,379,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,409,640 UART: [rt]cmd =0x44504543, len=96
33,442,114 >>> mbox cmd response data (56 bytes)
33,442,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,473,440 UART: [rt]cmd =0x44504543, len=96
33,505,826 >>> mbox cmd response data (56 bytes)
33,506,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,537,050 UART: [rt]cmd =0x44504543, len=96
33,569,540 >>> mbox cmd response data (56 bytes)
33,570,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,600,857 UART: [rt]cmd =0x44504543, len=96
33,632,978 >>> mbox cmd response data (56 bytes)
33,633,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,664,089 UART: [rt]cmd =0x44504543, len=96
33,696,735 >>> mbox cmd response data (56 bytes)
33,697,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,728,040 UART: [rt]cmd =0x44504543, len=96
33,760,097 >>> mbox cmd response data (56 bytes)
33,760,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,791,372 UART: [rt]cmd =0x44504543, len=96
33,822,643 >>> mbox cmd response data (56 bytes)
33,823,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,853,995 UART: [rt]cmd =0x44504543, len=96
33,885,479 >>> mbox cmd response data (56 bytes)
33,886,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,916,616 UART: [rt]cmd =0x44504543, len=96
33,948,359 >>> mbox cmd response data (56 bytes)
33,949,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,979,793 UART: [rt]cmd =0x44504543, len=96
34,010,814 >>> mbox cmd response data (56 bytes)
34,011,919 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
34,041,602 UART: [rt]cmd =0x52435458, len=8
34,043,328 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,346 UART:
192,731 UART: Running Caliptra ROM ...
193,874 UART:
603,340 UART: [state] CFI Enabled
618,437 UART: [state] LifecycleState = Unprovisioned
620,380 UART: [state] DebugLocked = No
622,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,399 UART: [kat] SHA2-256
797,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,711 UART: [kat] ++
808,181 UART: [kat] sha1
820,396 UART: [kat] SHA2-256
823,050 UART: [kat] SHA2-384
829,182 UART: [kat] SHA2-512-ACC
831,563 UART: [kat] ECC-384
3,115,619 UART: [kat] HMAC-384Kdf
3,128,909 UART: [kat] LMS
4,319,015 UART: [kat] --
4,322,548 UART: [cold-reset] ++
4,325,123 UART: [fht] Storing FHT @ 0x50003400
4,336,513 UART: [idev] ++
4,337,080 UART: [idev] CDI.KEYID = 6
4,337,989 UART: [idev] SUBJECT.KEYID = 7
4,339,223 UART: [idev] UDS.KEYID = 0
4,340,264 ready_for_fw is high
4,340,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,344 UART: [idev] Erasing UDS.KEYID = 0
7,626,510 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,829 UART: [idev] --
7,652,175 UART: [ldev] ++
7,652,742 UART: [ldev] CDI.KEYID = 6
7,653,705 UART: [ldev] SUBJECT.KEYID = 5
7,654,913 UART: [ldev] AUTHORITY.KEYID = 7
7,656,191 UART: [ldev] FE.KEYID = 1
7,668,630 UART: [ldev] Erasing FE.KEYID = 1
10,955,787 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,765 UART: [ldev] --
13,314,328 UART: [fwproc] Waiting for Commands...
13,316,405 UART: [fwproc] Received command 0x46574c44
13,318,651 UART: [fwproc] Received Image of size 118548 bytes
17,424,347 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,360 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,489 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,589 >>> mbox cmd response: success
17,899,707 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,902,388 UART: [afmc] ++
17,902,989 UART: [afmc] CDI.KEYID = 6
17,903,868 UART: [afmc] SUBJECT.KEYID = 7
17,905,138 UART: [afmc] AUTHORITY.KEYID = 5
21,218,694 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,145 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,401 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,828 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,523 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,983 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,396 UART: [afmc] --
23,583,855 UART: [cold-reset] --
23,587,707 UART: [state] Locking Datavault
23,593,052 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,755 UART: [state] Locking ICCM
23,597,252 UART: [exit] Launching FMC @ 0x40000130
23,605,632 UART:
23,605,881 UART: Running Caliptra FMC ...
23,606,975 UART:
23,607,129 UART: [state] CFI Enabled
23,615,273 UART: [fht] FMC Alias Private Key: 7
25,955,101 UART: [art] Extend RT PCRs Done
25,956,325 UART: [art] Lock RT PCRs Done
25,957,622 UART: [art] Populate DV Done
25,962,972 UART: [fht] FMC Alias Private Key: 7
25,964,563 UART: [art] Derive CDI
25,965,371 UART: [art] Store in slot 0x4
26,008,066 UART: [art] Derive Key Pair
26,009,071 UART: [art] Store priv key in slot 0x5
29,251,521 UART: [art] Derive Key Pair - Done
29,264,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,622 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,121 UART: [art] PUB.X = 148D807FD0139EB1041CDFEF1FE0CB176D02165F59CC5D3794835C216EC116D8E52EA72F0B9CDC04FC586F2BFAD64227
31,553,476 UART: [art] PUB.Y = A7F5E48160743A989FFBE9070B09E9F9DB98E4B172E7A6F5D35739164E46553EB927475CEA1269AEABA2BC14BD18006B
31,560,669 UART: [art] SIG.R = 398A42C73247F0D32B9AC3EFA4847353439EE076BFF9EB726ED28445257C39ADD1C7F7BB2345813C3D8C6BF6B7F38A37
31,568,068 UART: [art] SIG.S = EBA62178A8D179104E2712CBEDE7DF66105C4031FF591D299A509F309D1729F907824C72FE3F4DC9FA6D71810FCF4BE3
32,872,518 UART: Caliptra RT
32,873,215 UART: [state] CFI Enabled
33,007,625 UART: [rt] RT listening for mailbox commands...
33,039,582 UART: [rt]cmd =0x44504543, len=96
33,071,482 >>> mbox cmd response data (56 bytes)
33,072,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,102,828 UART: [rt]cmd =0x44504543, len=96
33,134,143 >>> mbox cmd response data (56 bytes)
33,134,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,165,465 UART: [rt]cmd =0x44504543, len=96
33,196,967 >>> mbox cmd response data (56 bytes)
33,197,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,228,243 UART: [rt]cmd =0x44504543, len=96
33,260,621 >>> mbox cmd response data (56 bytes)
33,261,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,291,708 UART: [rt]cmd =0x44504543, len=96
33,323,324 >>> mbox cmd response data (56 bytes)
33,324,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,354,597 UART: [rt]cmd =0x44504543, len=96
33,386,233 >>> mbox cmd response data (56 bytes)
33,386,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,417,781 UART: [rt]cmd =0x44504543, len=96
33,449,728 >>> mbox cmd response data (56 bytes)
33,450,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,481,064 UART: [rt]cmd =0x44504543, len=96
33,512,905 >>> mbox cmd response data (56 bytes)
33,513,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,544,001 UART: [rt]cmd =0x44504543, len=96
33,575,924 >>> mbox cmd response data (56 bytes)
33,576,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,607,123 UART: [rt]cmd =0x44504543, len=96
33,639,033 >>> mbox cmd response data (56 bytes)
33,639,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,670,216 UART: [rt]cmd =0x44504543, len=96
33,702,174 >>> mbox cmd response data (56 bytes)
33,702,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,733,437 UART: [rt]cmd =0x44504543, len=96
33,764,943 >>> mbox cmd response data (56 bytes)
33,766,057 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,795,677 UART: [rt]cmd =0x52435458, len=8
33,797,696 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
4,131,246 ready_for_fw is high
4,131,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,898 >>> mbox cmd response: success
18,160,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,802,686 UART:
23,803,097 UART: Running Caliptra FMC ...
23,804,247 UART:
23,804,404 UART: [state] CFI Enabled
23,812,153 UART: [fht] FMC Alias Private Key: 7
26,151,526 UART: [art] Extend RT PCRs Done
26,152,747 UART: [art] Lock RT PCRs Done
26,154,395 UART: [art] Populate DV Done
26,160,075 UART: [fht] FMC Alias Private Key: 7
26,161,725 UART: [art] Derive CDI
26,162,461 UART: [art] Store in slot 0x4
26,205,263 UART: [art] Derive Key Pair
26,206,464 UART: [art] Store priv key in slot 0x5
29,448,403 UART: [art] Derive Key Pair - Done
29,460,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,301 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,809 UART: [art] PUB.X = 6CC278CBF7AFE52FE0FB4DE06E194920C5F664213CDD24871CA92FA46152C2DF82595A38BC98EB0921FA0F87F66B620B
31,750,105 UART: [art] PUB.Y = BF2B6FC745F519A1C682902463493207E66CAE433623473CFBDA31E26AE07319C39B55863076916FA6B4917DBDBE62A3
31,757,343 UART: [art] SIG.R = 36C9CB7C725A689060307B5CBA3096EF3A5F4DEB5447EC6F3CE55B024D1B6BC0975799C543D93AEBB7B03543C4EA7FE3
31,764,729 UART: [art] SIG.S = E7E9F92973450E9F91C720E2B982C81AD1AA53E892EAED3D87B6DFB2A19AE8AAFA0DD3C6C7CBFB1891282F6BE0944231
33,069,908 UART: Caliptra RT
33,070,627 UART: [state] CFI Enabled
33,204,002 UART: [rt] RT listening for mailbox commands...
33,235,757 UART: [rt]cmd =0x44504543, len=96
33,267,448 >>> mbox cmd response data (56 bytes)
33,268,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,298,836 UART: [rt]cmd =0x44504543, len=96
33,330,327 >>> mbox cmd response data (56 bytes)
33,331,053 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,361,659 UART: [rt]cmd =0x44504543, len=96
33,393,731 >>> mbox cmd response data (56 bytes)
33,394,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,424,848 UART: [rt]cmd =0x44504543, len=96
33,456,524 >>> mbox cmd response data (56 bytes)
33,457,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,487,755 UART: [rt]cmd =0x44504543, len=96
33,519,663 >>> mbox cmd response data (56 bytes)
33,520,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,550,836 UART: [rt]cmd =0x44504543, len=96
33,582,856 >>> mbox cmd response data (56 bytes)
33,583,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,614,158 UART: [rt]cmd =0x44504543, len=96
33,645,962 >>> mbox cmd response data (56 bytes)
33,646,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,677,259 UART: [rt]cmd =0x44504543, len=96
33,710,040 >>> mbox cmd response data (56 bytes)
33,710,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,741,090 UART: [rt]cmd =0x44504543, len=96
33,772,758 >>> mbox cmd response data (56 bytes)
33,773,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,804,012 UART: [rt]cmd =0x44504543, len=96
33,835,586 >>> mbox cmd response data (56 bytes)
33,836,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,866,561 UART: [rt]cmd =0x44504543, len=96
33,897,988 >>> mbox cmd response data (56 bytes)
33,898,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,929,396 UART: [rt]cmd =0x44504543, len=96
33,960,167 >>> mbox cmd response data (56 bytes)
33,961,272 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,991,009 UART: [rt]cmd =0x52435458, len=8
33,992,989 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,072 UART:
192,431 UART: Running Caliptra ROM ...
193,515 UART:
193,656 UART: [state] CFI Enabled
263,249 UART: [state] LifecycleState = Unprovisioned
265,113 UART: [state] DebugLocked = No
267,624 UART: [state] WD Timer not started. Device not locked for debugging
271,195 UART: [kat] SHA2-256
450,830 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,641 UART: [kat] ++
462,091 UART: [kat] sha1
472,684 UART: [kat] SHA2-256
475,413 UART: [kat] SHA2-384
482,130 UART: [kat] SHA2-512-ACC
484,492 UART: [kat] ECC-384
2,947,115 UART: [kat] HMAC-384Kdf
2,971,048 UART: [kat] LMS
3,447,575 UART: [kat] --
3,450,883 UART: [cold-reset] ++
3,452,542 UART: [fht] FHT @ 0x50003400
3,464,516 UART: [idev] ++
3,465,073 UART: [idev] CDI.KEYID = 6
3,465,982 UART: [idev] SUBJECT.KEYID = 7
3,467,228 UART: [idev] UDS.KEYID = 0
3,468,276 ready_for_fw is high
3,468,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,556 UART: [idev] Erasing UDS.KEYID = 0
5,987,952 UART: [idev] Sha1 KeyId Algorithm
6,011,771 UART: [idev] --
6,017,291 UART: [ldev] ++
6,017,864 UART: [ldev] CDI.KEYID = 6
6,018,743 UART: [ldev] SUBJECT.KEYID = 5
6,020,007 UART: [ldev] AUTHORITY.KEYID = 7
6,021,241 UART: [ldev] FE.KEYID = 1
6,056,150 UART: [ldev] Erasing FE.KEYID = 1
8,562,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,554 UART: [ldev] --
10,371,394 UART: [fwproc] Wait for Commands...
10,374,353 UART: [fwproc] Recv command 0x46574c44
10,376,383 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,362 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,377 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,336,464 >>> mbox cmd response: success
14,337,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,340,355 UART: [afmc] ++
14,340,940 UART: [afmc] CDI.KEYID = 6
14,341,877 UART: [afmc] SUBJECT.KEYID = 7
14,343,085 UART: [afmc] AUTHORITY.KEYID = 5
16,874,077 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,614,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,616,511 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,632,298 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,648,386 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,663,942 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,687,578 UART: [afmc] --
18,692,102 UART: [cold-reset] --
18,696,249 UART: [state] Locking Datavault
18,703,827 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,585 UART: [state] Locking ICCM
18,707,538 UART: [exit] Launching FMC @ 0x40000130
18,715,925 UART:
18,716,157 UART: Running Caliptra FMC ...
18,717,203 UART:
18,717,356 UART: [state] CFI Enabled
18,772,210 UART: [fht] FMC Alias Private Key: 7
20,539,009 UART: [art] Extend RT PCRs Done
20,540,236 UART: [art] Lock RT PCRs Done
20,542,244 UART: [art] Populate DV Done
20,547,544 UART: [fht] FMC Alias Private Key: 7
20,549,077 UART: [art] Derive CDI
20,549,889 UART: [art] Store in slot 0x4
20,604,584 UART: [art] Derive Key Pair
20,605,643 UART: [art] Store priv key in slot 0x5
23,068,253 UART: [art] Derive Key Pair - Done
23,081,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,794,330 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,844 UART: [art] PUB.X = 3E5819463A815359B77941340F212BC2B06D77F3306CE031BDF858FB7AAB7B899CF4F26638559C4F566CCE3F7BFED164
24,803,111 UART: [art] PUB.Y = C447D62231872D274E25FF3D1E8372476075FAC740162419F1B083983FA32B279CB1F94207E875A639D174E44A783BDE
24,810,298 UART: [art] SIG.R = 0748E72571F31EB058CCBB8DCF9F4F3B70A4EECB7CC34ECF225DDDA18671318C704C1A85DF07BAA80BF4424348B0A1CB
24,817,745 UART: [art] SIG.S = 4E03763701FAFB7F898EF1C2825101EB1A0D5F60286EB32F99C20608C6B50DB24EAACCD5F94B159DA8D6A7E05E9089E6
25,796,999 UART: Caliptra RT
25,797,694 UART: [state] CFI Enabled
25,977,466 UART: [rt] RT listening for mailbox commands...
26,009,807 UART: [rt]cmd =0x44504543, len=96
26,040,423 >>> mbox cmd response data (56 bytes)
26,041,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,072,164 UART: [rt]cmd =0x44504543, len=96
26,104,079 >>> mbox cmd response data (56 bytes)
26,104,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,135,180 UART: [rt]cmd =0x44504543, len=96
26,167,345 >>> mbox cmd response data (56 bytes)
26,168,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,198,478 UART: [rt]cmd =0x44504543, len=96
26,229,826 >>> mbox cmd response data (56 bytes)
26,230,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,261,001 UART: [rt]cmd =0x44504543, len=96
26,293,898 >>> mbox cmd response data (56 bytes)
26,294,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,325,081 UART: [rt]cmd =0x44504543, len=96
26,357,666 >>> mbox cmd response data (56 bytes)
26,358,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,388,761 UART: [rt]cmd =0x44504543, len=96
26,421,205 >>> mbox cmd response data (56 bytes)
26,421,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,452,361 UART: [rt]cmd =0x44504543, len=96
26,484,196 >>> mbox cmd response data (56 bytes)
26,484,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,515,584 UART: [rt]cmd =0x44504543, len=96
26,547,639 >>> mbox cmd response data (56 bytes)
26,548,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,578,577 UART: [rt]cmd =0x44504543, len=96
26,610,759 >>> mbox cmd response data (56 bytes)
26,611,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,642,005 UART: [rt]cmd =0x44504543, len=96
26,673,868 >>> mbox cmd response data (56 bytes)
26,674,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,705,111 UART: [rt]cmd =0x44504543, len=96
26,737,234 >>> mbox cmd response data (56 bytes)
26,738,505 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,768,500 UART: [rt]cmd =0x52435458, len=8
26,770,438 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,459,789 ready_for_fw is high
3,460,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,247,865 >>> mbox cmd response: success
14,249,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,531,372 UART:
18,531,761 UART: Running Caliptra FMC ...
18,532,869 UART:
18,533,019 UART: [state] CFI Enabled
18,600,166 UART: [fht] FMC Alias Private Key: 7
20,367,122 UART: [art] Extend RT PCRs Done
20,368,332 UART: [art] Lock RT PCRs Done
20,369,705 UART: [art] Populate DV Done
20,375,233 UART: [fht] FMC Alias Private Key: 7
20,376,931 UART: [art] Derive CDI
20,377,663 UART: [art] Store in slot 0x4
20,432,384 UART: [art] Derive Key Pair
20,433,381 UART: [art] Store priv key in slot 0x5
22,896,248 UART: [art] Derive Key Pair - Done
22,909,042 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,621,824 UART: [art] Erasing AUTHORITY.KEYID = 7
24,623,325 UART: [art] PUB.X = 635B277CD3834D8221AB353731E54F1AF4604AF2A1AD2F282C5581BC24C1FAF58824F96FEFD7643172DA6A270078A456
24,630,571 UART: [art] PUB.Y = 52BE13FA72BC9A57AC6E6FC6AE4EBD0F5BD3440101892AAF820A6F488E5B672C18C54E56DA2D52E0ED43A5081DBA77EF
24,637,880 UART: [art] SIG.R = 7AC66FA7BCACB66854F9F090BF1C72DD0A2E609601C1F1190A12ABA5B2C72742B0C951102B4D94AADCCEBA0FB82C6EF9
24,645,330 UART: [art] SIG.S = 2A8EDB3A6969F6CD417AFA3F4099A26FB6D17F038EFC08FEEF259A2B93B1E3EAE1600FFCE47AC3E22BFFC575CB7F8879
25,624,134 UART: Caliptra RT
25,624,837 UART: [state] CFI Enabled
25,805,400 UART: [rt] RT listening for mailbox commands...
25,837,657 UART: [rt]cmd =0x44504543, len=96
25,869,352 >>> mbox cmd response data (56 bytes)
25,870,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,900,745 UART: [rt]cmd =0x44504543, len=96
25,932,386 >>> mbox cmd response data (56 bytes)
25,933,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,963,573 UART: [rt]cmd =0x44504543, len=96
25,994,878 >>> mbox cmd response data (56 bytes)
25,995,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,026,393 UART: [rt]cmd =0x44504543, len=96
26,058,000 >>> mbox cmd response data (56 bytes)
26,058,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,089,201 UART: [rt]cmd =0x44504543, len=96
26,121,243 >>> mbox cmd response data (56 bytes)
26,121,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,152,535 UART: [rt]cmd =0x44504543, len=96
26,184,426 >>> mbox cmd response data (56 bytes)
26,185,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,215,768 UART: [rt]cmd =0x44504543, len=96
26,247,866 >>> mbox cmd response data (56 bytes)
26,248,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,279,043 UART: [rt]cmd =0x44504543, len=96
26,310,479 >>> mbox cmd response data (56 bytes)
26,311,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,341,670 UART: [rt]cmd =0x44504543, len=96
26,374,294 >>> mbox cmd response data (56 bytes)
26,375,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,405,650 UART: [rt]cmd =0x44504543, len=96
26,437,065 >>> mbox cmd response data (56 bytes)
26,437,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,468,339 UART: [rt]cmd =0x44504543, len=96
26,500,718 >>> mbox cmd response data (56 bytes)
26,501,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,532,267 UART: [rt]cmd =0x44504543, len=96
26,564,690 >>> mbox cmd response data (56 bytes)
26,565,808 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,595,934 UART: [rt]cmd =0x52435458, len=8
26,597,708 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
192,499 UART:
192,873 UART: Running Caliptra ROM ...
194,000 UART:
603,759 UART: [state] CFI Enabled
616,022 UART: [state] LifecycleState = Unprovisioned
617,976 UART: [state] DebugLocked = No
619,797 UART: [state] WD Timer not started. Device not locked for debugging
623,919 UART: [kat] SHA2-256
803,536 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,340 UART: [kat] ++
814,795 UART: [kat] sha1
825,515 UART: [kat] SHA2-256
828,266 UART: [kat] SHA2-384
833,482 UART: [kat] SHA2-512-ACC
835,804 UART: [kat] ECC-384
3,276,074 UART: [kat] HMAC-384Kdf
3,287,749 UART: [kat] LMS
3,764,244 UART: [kat] --
3,769,374 UART: [cold-reset] ++
3,770,309 UART: [fht] FHT @ 0x50003400
3,782,446 UART: [idev] ++
3,783,056 UART: [idev] CDI.KEYID = 6
3,783,947 UART: [idev] SUBJECT.KEYID = 7
3,785,201 UART: [idev] UDS.KEYID = 0
3,786,177 ready_for_fw is high
3,786,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,317 UART: [idev] Erasing UDS.KEYID = 0
6,261,860 UART: [idev] Sha1 KeyId Algorithm
6,286,220 UART: [idev] --
6,289,566 UART: [ldev] ++
6,290,157 UART: [ldev] CDI.KEYID = 6
6,291,039 UART: [ldev] SUBJECT.KEYID = 5
6,292,201 UART: [ldev] AUTHORITY.KEYID = 7
6,293,495 UART: [ldev] FE.KEYID = 1
6,303,633 UART: [ldev] Erasing FE.KEYID = 1
8,783,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,802 UART: [ldev] --
10,577,478 UART: [fwproc] Wait for Commands...
10,580,267 UART: [fwproc] Recv command 0x46574c44
10,582,262 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,986 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,002 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,364 >>> mbox cmd response: success
14,551,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,554,884 UART: [afmc] ++
14,555,471 UART: [afmc] CDI.KEYID = 6
14,556,354 UART: [afmc] SUBJECT.KEYID = 7
14,557,621 UART: [afmc] AUTHORITY.KEYID = 5
17,062,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,037 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,814 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,881 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,833,473 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,034 UART: [afmc] --
18,860,792 UART: [cold-reset] --
18,863,688 UART: [state] Locking Datavault
18,870,086 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,845 UART: [state] Locking ICCM
18,873,348 UART: [exit] Launching FMC @ 0x40000130
18,881,748 UART:
18,881,992 UART: Running Caliptra FMC ...
18,883,096 UART:
18,883,261 UART: [state] CFI Enabled
18,891,203 UART: [fht] FMC Alias Private Key: 7
20,657,750 UART: [art] Extend RT PCRs Done
20,658,972 UART: [art] Lock RT PCRs Done
20,661,033 UART: [art] Populate DV Done
20,666,444 UART: [fht] FMC Alias Private Key: 7
20,668,046 UART: [art] Derive CDI
20,668,866 UART: [art] Store in slot 0x4
20,711,675 UART: [art] Derive Key Pair
20,712,675 UART: [art] Store priv key in slot 0x5
23,139,528 UART: [art] Derive Key Pair - Done
23,152,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,528 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,027 UART: [art] PUB.X = E924E70F5E6DFCAEAED94D4E99D27EA688A9A4E862E02BBDDFD683683FAA65AED9014902BE914F2EF8D1137A7C480B75
24,867,319 UART: [art] PUB.Y = C0178EE8A318F2027B61D11CF2FDD4FA3F359FBCA153605F4EB6F5683CA40C9F94015EF171C871E86DB69DC587B9F11D
24,874,593 UART: [art] SIG.R = 512FA87E070BA3D3B54CD6287AEBC791028C3DBC78C39A34448AC894BD3C2883505B5041A85D94E808EF626D732CF50C
24,881,987 UART: [art] SIG.S = 9A6E5A3DA015960CBC7D55672F9A0BA3F4E207C439D0643CB80C7A697670BFC5FFD97E18B7CA965223A0CEF0C2191733
25,861,215 UART: Caliptra RT
25,861,927 UART: [state] CFI Enabled
25,994,650 UART: [rt] RT listening for mailbox commands...
26,026,325 UART: [rt]cmd =0x44504543, len=96
26,058,261 >>> mbox cmd response data (56 bytes)
26,059,170 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,089,872 UART: [rt]cmd =0x44504543, len=96
26,121,794 >>> mbox cmd response data (56 bytes)
26,122,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,153,136 UART: [rt]cmd =0x44504543, len=96
26,185,654 >>> mbox cmd response data (56 bytes)
26,186,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,216,805 UART: [rt]cmd =0x44504543, len=96
26,248,338 >>> mbox cmd response data (56 bytes)
26,249,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,279,493 UART: [rt]cmd =0x44504543, len=96
26,311,865 >>> mbox cmd response data (56 bytes)
26,312,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,343,205 UART: [rt]cmd =0x44504543, len=96
26,374,659 >>> mbox cmd response data (56 bytes)
26,375,351 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,405,884 UART: [rt]cmd =0x44504543, len=96
26,437,524 >>> mbox cmd response data (56 bytes)
26,438,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,468,987 UART: [rt]cmd =0x44504543, len=96
26,500,761 >>> mbox cmd response data (56 bytes)
26,501,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,532,289 UART: [rt]cmd =0x44504543, len=96
26,564,420 >>> mbox cmd response data (56 bytes)
26,565,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,595,908 UART: [rt]cmd =0x44504543, len=96
26,627,260 >>> mbox cmd response data (56 bytes)
26,627,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,658,548 UART: [rt]cmd =0x44504543, len=96
26,690,979 >>> mbox cmd response data (56 bytes)
26,691,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,722,309 UART: [rt]cmd =0x44504543, len=96
26,754,599 >>> mbox cmd response data (56 bytes)
26,755,707 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,785,742 UART: [rt]cmd =0x52435458, len=8
26,787,725 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
3,784,431 ready_for_fw is high
3,784,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,557 >>> mbox cmd response: success
14,452,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,699,802 UART:
18,700,172 UART: Running Caliptra FMC ...
18,701,271 UART:
18,701,428 UART: [state] CFI Enabled
18,709,044 UART: [fht] FMC Alias Private Key: 7
20,474,713 UART: [art] Extend RT PCRs Done
20,475,963 UART: [art] Lock RT PCRs Done
20,477,379 UART: [art] Populate DV Done
20,482,850 UART: [fht] FMC Alias Private Key: 7
20,484,500 UART: [art] Derive CDI
20,485,319 UART: [art] Store in slot 0x4
20,527,645 UART: [art] Derive Key Pair
20,528,691 UART: [art] Store priv key in slot 0x5
22,955,962 UART: [art] Derive Key Pair - Done
22,968,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,171 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,726 UART: [art] PUB.X = B2BF1BC342565FD7C6E204E08F2E7B777FD4DD73D854C9015840D181C66FCCCA1EAA23884782B2F55DB98E85AB796365
24,684,033 UART: [art] PUB.Y = 5343540D3E51BFB3C1A928A2DD173C56A3AE8C4C2AF0DAC8A614B4456804319F17FE3AA38ECA0DEFA07326F6222DBA52
24,691,255 UART: [art] SIG.R = D5F9297A94B72A20DF93F649C97A28532A3E118CF03734D8D7612CE57E70082CE4043EC8526A444798E1D3E27C50A775
24,698,606 UART: [art] SIG.S = D89C4AA9DB97167C69B1D6AD35785A73FC805004B93E796C6E6D30A6D57647121CAE6972BF0CE20137C93E7C72D59899
25,677,685 UART: Caliptra RT
25,678,397 UART: [state] CFI Enabled
25,810,610 UART: [rt] RT listening for mailbox commands...
25,842,675 UART: [rt]cmd =0x44504543, len=96
25,874,581 >>> mbox cmd response data (56 bytes)
25,875,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,906,143 UART: [rt]cmd =0x44504543, len=96
25,938,274 >>> mbox cmd response data (56 bytes)
25,938,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,969,466 UART: [rt]cmd =0x44504543, len=96
26,000,654 >>> mbox cmd response data (56 bytes)
26,001,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,032,019 UART: [rt]cmd =0x44504543, len=96
26,063,858 >>> mbox cmd response data (56 bytes)
26,064,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,095,091 UART: [rt]cmd =0x44504543, len=96
26,126,232 >>> mbox cmd response data (56 bytes)
26,126,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,157,568 UART: [rt]cmd =0x44504543, len=96
26,189,542 >>> mbox cmd response data (56 bytes)
26,190,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,220,892 UART: [rt]cmd =0x44504543, len=96
26,252,261 >>> mbox cmd response data (56 bytes)
26,252,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,283,537 UART: [rt]cmd =0x44504543, len=96
26,315,146 >>> mbox cmd response data (56 bytes)
26,315,838 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,346,262 UART: [rt]cmd =0x44504543, len=96
26,378,423 >>> mbox cmd response data (56 bytes)
26,379,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,409,804 UART: [rt]cmd =0x44504543, len=96
26,441,712 >>> mbox cmd response data (56 bytes)
26,442,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,473,172 UART: [rt]cmd =0x44504543, len=96
26,505,529 >>> mbox cmd response data (56 bytes)
26,506,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,536,482 UART: [rt]cmd =0x44504543, len=96
26,568,586 >>> mbox cmd response data (56 bytes)
26,569,627 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,599,490 UART: [rt]cmd =0x52435458, len=8
26,601,516 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,213 UART:
192,577 UART: Running Caliptra ROM ...
193,769 UART:
193,922 UART: [state] CFI Enabled
263,616 UART: [state] LifecycleState = Unprovisioned
265,983 UART: [state] DebugLocked = No
267,879 UART: [state] WD Timer not started. Device not locked for debugging
272,691 UART: [kat] SHA2-256
462,565 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,313 UART: [kat] ++
473,767 UART: [kat] sha1
484,750 UART: [kat] SHA2-256
487,765 UART: [kat] SHA2-384
492,684 UART: [kat] SHA2-512-ACC
495,256 UART: [kat] ECC-384
2,947,962 UART: [kat] HMAC-384Kdf
2,970,641 UART: [kat] LMS
3,502,393 UART: [kat] --
3,507,542 UART: [cold-reset] ++
3,508,433 UART: [fht] FHT @ 0x50003400
3,520,548 UART: [idev] ++
3,521,279 UART: [idev] CDI.KEYID = 6
3,522,188 UART: [idev] SUBJECT.KEYID = 7
3,523,429 UART: [idev] UDS.KEYID = 0
3,524,347 ready_for_fw is high
3,524,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,586 UART: [idev] Erasing UDS.KEYID = 0
6,028,757 UART: [idev] Sha1 KeyId Algorithm
6,051,226 UART: [idev] --
6,054,682 UART: [ldev] ++
6,055,366 UART: [ldev] CDI.KEYID = 6
6,056,246 UART: [ldev] SUBJECT.KEYID = 5
6,057,457 UART: [ldev] AUTHORITY.KEYID = 7
6,058,700 UART: [ldev] FE.KEYID = 1
6,099,158 UART: [ldev] Erasing FE.KEYID = 1
8,605,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,521 UART: [ldev] --
10,410,243 UART: [fwproc] Wait for Commands...
10,412,546 UART: [fwproc] Recv command 0x46574c44
10,414,793 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,205 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,807 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,351 >>> mbox cmd response: success
14,672,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,675,952 UART: [afmc] ++
14,676,663 UART: [afmc] CDI.KEYID = 6
14,677,815 UART: [afmc] SUBJECT.KEYID = 7
14,679,349 UART: [afmc] AUTHORITY.KEYID = 5
17,216,254 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,619 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,735 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,883 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,816 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,641 UART: [afmc] --
19,034,598 UART: [cold-reset] --
19,038,141 UART: [state] Locking Datavault
19,044,796 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,928 UART: [state] Locking ICCM
19,049,700 UART: [exit] Launching FMC @ 0x40000130
19,058,363 UART:
19,058,610 UART: Running Caliptra FMC ...
19,059,638 UART:
19,059,786 UART: [state] CFI Enabled
19,116,421 UART: [fht] FMC Alias Private Key: 7
20,903,674 UART: [art] Extend RT PCRs Done
20,904,891 UART: [art] Lock RT PCRs Done
20,906,648 UART: [art] Populate DV Done
20,912,109 UART: [fht] FMC Alias Private Key: 7
20,913,803 UART: [art] Derive CDI
20,914,537 UART: [art] Store in slot 0x4
20,970,367 UART: [art] Derive Key Pair
20,971,404 UART: [art] Store priv key in slot 0x5
23,434,497 UART: [art] Derive Key Pair - Done
23,447,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,160,716 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,228 UART: [art] PUB.X = 23F01D6A12E8439F89F81E3340F5C07A41350DB52C78354AEE2C3E0B15993504DC553C3BBA52C0DB70F12411E48AAE11
25,169,442 UART: [art] PUB.Y = 995D1D833EB6AC3E7FD39D060B0987CB7E24D17699F100221219FB581365DF56C93DA506CAF2A7D559FF01F1AFC0775A
25,176,692 UART: [art] SIG.R = 3B07A17F5E5A0A1C46363DD0D3E8E290FAD55D9081319912AA0F514A82634C72A6116C6F774C698507ACF190574A2771
25,184,086 UART: [art] SIG.S = 0D160BE850335EE9EC53B0BDAFAFA12628C74BA993E0638C9603CC778296980E87DCA61D56CFC9FEB25B395FFBFF2A3C
26,163,570 UART: Caliptra RT
26,164,255 UART: [state] CFI Enabled
26,342,406 UART: [rt] RT listening for mailbox commands...
26,374,464 UART: [rt]cmd =0x44504543, len=96
26,406,086 >>> mbox cmd response data (56 bytes)
26,407,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,437,597 UART: [rt]cmd =0x44504543, len=96
26,469,463 >>> mbox cmd response data (56 bytes)
26,470,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,500,990 UART: [rt]cmd =0x44504543, len=96
26,533,165 >>> mbox cmd response data (56 bytes)
26,533,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,564,547 UART: [rt]cmd =0x44504543, len=96
26,596,379 >>> mbox cmd response data (56 bytes)
26,597,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,627,441 UART: [rt]cmd =0x44504543, len=96
26,659,669 >>> mbox cmd response data (56 bytes)
26,660,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,691,100 UART: [rt]cmd =0x44504543, len=96
26,722,849 >>> mbox cmd response data (56 bytes)
26,723,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,754,139 UART: [rt]cmd =0x44504543, len=96
26,785,781 >>> mbox cmd response data (56 bytes)
26,786,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,817,238 UART: [rt]cmd =0x44504543, len=96
26,848,392 >>> mbox cmd response data (56 bytes)
26,849,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,879,519 UART: [rt]cmd =0x44504543, len=96
26,911,413 >>> mbox cmd response data (56 bytes)
26,912,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,942,949 UART: [rt]cmd =0x44504543, len=96
26,974,873 >>> mbox cmd response data (56 bytes)
26,975,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,006,357 UART: [rt]cmd =0x44504543, len=96
27,038,449 >>> mbox cmd response data (56 bytes)
27,039,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,069,705 UART: [rt]cmd =0x44504543, len=96
27,101,723 >>> mbox cmd response data (56 bytes)
27,102,793 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,132,643 UART: [rt]cmd =0x52435458, len=8
27,134,564 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
3,415,368 ready_for_fw is high
3,415,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,807,124 >>> mbox cmd response: success
14,808,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,090,791 UART:
19,091,183 UART: Running Caliptra FMC ...
19,092,394 UART:
19,092,583 UART: [state] CFI Enabled
19,158,718 UART: [fht] FMC Alias Private Key: 7
20,925,217 UART: [art] Extend RT PCRs Done
20,926,431 UART: [art] Lock RT PCRs Done
20,928,163 UART: [art] Populate DV Done
20,933,633 UART: [fht] FMC Alias Private Key: 7
20,935,177 UART: [art] Derive CDI
20,935,941 UART: [art] Store in slot 0x4
20,991,014 UART: [art] Derive Key Pair
20,992,064 UART: [art] Store priv key in slot 0x5
23,454,374 UART: [art] Derive Key Pair - Done
23,467,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,179,543 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,037 UART: [art] PUB.X = 4464B5C6E896B6754CF443FF8DA2F6ED44AD3A382305FAC610D4F29B7D221751D849A584794163739E83891B8EA0E63C
25,188,294 UART: [art] PUB.Y = 5544A176AA476CE53E9DC3FFC51896793D77FC27FEA715845FEFBE2F0F97F84F5A6B9048935421B40703327E2FAD7070
25,195,548 UART: [art] SIG.R = 58A27AC62043C30A3C0F34DDEE6C8B5C62B42957501996E95EB832BF78DB46ABC8D2BB019C98D0A64C5E21D979B09746
25,202,967 UART: [art] SIG.S = BD040CA6B7CAF92F8A9612F384DD76DB17E9C69A15DABAA438C62C7A8527E35FA747917F204F741ADB3DBB05965232E8
26,182,100 UART: Caliptra RT
26,182,815 UART: [state] CFI Enabled
26,363,808 UART: [rt] RT listening for mailbox commands...
26,395,936 UART: [rt]cmd =0x44504543, len=96
26,427,678 >>> mbox cmd response data (56 bytes)
26,428,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,458,980 UART: [rt]cmd =0x44504543, len=96
26,490,194 >>> mbox cmd response data (56 bytes)
26,490,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,521,532 UART: [rt]cmd =0x44504543, len=96
26,553,314 >>> mbox cmd response data (56 bytes)
26,554,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,584,601 UART: [rt]cmd =0x44504543, len=96
26,615,891 >>> mbox cmd response data (56 bytes)
26,616,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,647,140 UART: [rt]cmd =0x44504543, len=96
26,679,602 >>> mbox cmd response data (56 bytes)
26,680,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,710,865 UART: [rt]cmd =0x44504543, len=96
26,741,744 >>> mbox cmd response data (56 bytes)
26,742,422 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,773,141 UART: [rt]cmd =0x44504543, len=96
26,806,489 >>> mbox cmd response data (56 bytes)
26,807,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,837,601 UART: [rt]cmd =0x44504543, len=96
26,869,112 >>> mbox cmd response data (56 bytes)
26,869,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,900,435 UART: [rt]cmd =0x44504543, len=96
26,932,024 >>> mbox cmd response data (56 bytes)
26,932,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,963,487 UART: [rt]cmd =0x44504543, len=96
26,995,261 >>> mbox cmd response data (56 bytes)
26,995,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,026,506 UART: [rt]cmd =0x44504543, len=96
27,058,474 >>> mbox cmd response data (56 bytes)
27,059,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,090,014 UART: [rt]cmd =0x44504543, len=96
27,122,343 >>> mbox cmd response data (56 bytes)
27,123,449 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,153,402 UART: [rt]cmd =0x52435458, len=8
27,155,428 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,502 UART:
192,873 UART: Running Caliptra ROM ...
194,008 UART:
603,805 UART: [state] CFI Enabled
616,712 UART: [state] LifecycleState = Unprovisioned
619,104 UART: [state] DebugLocked = No
621,846 UART: [state] WD Timer not started. Device not locked for debugging
626,318 UART: [kat] SHA2-256
816,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,939 UART: [kat] ++
827,487 UART: [kat] sha1
839,926 UART: [kat] SHA2-256
842,970 UART: [kat] SHA2-384
849,077 UART: [kat] SHA2-512-ACC
851,602 UART: [kat] ECC-384
3,293,397 UART: [kat] HMAC-384Kdf
3,306,269 UART: [kat] LMS
3,838,114 UART: [kat] --
3,842,249 UART: [cold-reset] ++
3,843,826 UART: [fht] FHT @ 0x50003400
3,855,021 UART: [idev] ++
3,855,659 UART: [idev] CDI.KEYID = 6
3,856,615 UART: [idev] SUBJECT.KEYID = 7
3,857,859 UART: [idev] UDS.KEYID = 0
3,858,764 ready_for_fw is high
3,858,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,827 UART: [idev] Erasing UDS.KEYID = 0
6,341,574 UART: [idev] Sha1 KeyId Algorithm
6,364,365 UART: [idev] --
6,370,117 UART: [ldev] ++
6,370,862 UART: [ldev] CDI.KEYID = 6
6,371,768 UART: [ldev] SUBJECT.KEYID = 5
6,372,928 UART: [ldev] AUTHORITY.KEYID = 7
6,374,160 UART: [ldev] FE.KEYID = 1
6,382,301 UART: [ldev] Erasing FE.KEYID = 1
8,858,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,542 UART: [ldev] --
10,651,536 UART: [fwproc] Wait for Commands...
10,653,309 UART: [fwproc] Recv command 0x46574c44
10,655,617 UART: [fwproc] Recv'd Img size: 118548 bytes
14,158,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,984 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,359,642 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,919,081 >>> mbox cmd response: success
14,920,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,923,129 UART: [afmc] ++
14,923,865 UART: [afmc] CDI.KEYID = 6
14,925,069 UART: [afmc] SUBJECT.KEYID = 7
14,926,518 UART: [afmc] AUTHORITY.KEYID = 5
17,436,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,159,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,161,735 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,176,851 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,191,994 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,206,903 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,230,865 UART: [afmc] --
19,234,141 UART: [cold-reset] --
19,237,249 UART: [state] Locking Datavault
19,241,922 UART: [state] Locking PCR0, PCR1 and PCR31
19,244,130 UART: [state] Locking ICCM
19,245,355 UART: [exit] Launching FMC @ 0x40000130
19,253,703 UART:
19,253,951 UART: Running Caliptra FMC ...
19,254,980 UART:
19,255,132 UART: [state] CFI Enabled
19,262,911 UART: [fht] FMC Alias Private Key: 7
21,028,716 UART: [art] Extend RT PCRs Done
21,029,926 UART: [art] Lock RT PCRs Done
21,031,583 UART: [art] Populate DV Done
21,036,946 UART: [fht] FMC Alias Private Key: 7
21,038,544 UART: [art] Derive CDI
21,039,288 UART: [art] Store in slot 0x4
21,082,224 UART: [art] Derive Key Pair
21,083,295 UART: [art] Store priv key in slot 0x5
23,510,450 UART: [art] Derive Key Pair - Done
23,523,085 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,229,132 UART: [art] Erasing AUTHORITY.KEYID = 7
25,230,625 UART: [art] PUB.X = 37B3C19D6F55AAA49160EC5E8CD71D83D67646EB3D1CB499AF75B246956008083995431B0929139B2CAE82D4BF396D0B
25,237,888 UART: [art] PUB.Y = F6A5356B6A1771C3DA999B8120AB16364994EA1FD6928E944C5AB3091CCF0A1AEA749049563A031B19388D7552B66525
25,245,177 UART: [art] SIG.R = 0424D123302D8EA27B65201400C8A293AE50C3900DB2F17575AA7540A44347E78B398022C43DD3FBD5F4E190325C4ED8
25,252,512 UART: [art] SIG.S = 83BF7897E0498714F4DCF31729BFD592B2C9D3C41D36E413488425B14CD01A9284DB43A76816DEDBB5F987EC4BB560FB
26,230,984 UART: Caliptra RT
26,231,674 UART: [state] CFI Enabled
26,364,887 UART: [rt] RT listening for mailbox commands...
26,396,729 UART: [rt]cmd =0x44504543, len=96
26,428,155 >>> mbox cmd response data (56 bytes)
26,429,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,459,795 UART: [rt]cmd =0x44504543, len=96
26,491,579 >>> mbox cmd response data (56 bytes)
26,492,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,522,942 UART: [rt]cmd =0x44504543, len=96
26,555,179 >>> mbox cmd response data (56 bytes)
26,555,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,586,465 UART: [rt]cmd =0x44504543, len=96
26,618,113 >>> mbox cmd response data (56 bytes)
26,618,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,649,586 UART: [rt]cmd =0x44504543, len=96
26,680,746 >>> mbox cmd response data (56 bytes)
26,681,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,712,153 UART: [rt]cmd =0x44504543, len=96
26,743,854 >>> mbox cmd response data (56 bytes)
26,744,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,774,997 UART: [rt]cmd =0x44504543, len=96
26,806,615 >>> mbox cmd response data (56 bytes)
26,807,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,837,903 UART: [rt]cmd =0x44504543, len=96
26,869,508 >>> mbox cmd response data (56 bytes)
26,870,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,900,742 UART: [rt]cmd =0x44504543, len=96
26,932,886 >>> mbox cmd response data (56 bytes)
26,933,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,964,191 UART: [rt]cmd =0x44504543, len=96
26,996,325 >>> mbox cmd response data (56 bytes)
26,997,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,027,563 UART: [rt]cmd =0x44504543, len=96
27,059,721 >>> mbox cmd response data (56 bytes)
27,060,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,090,749 UART: [rt]cmd =0x44504543, len=96
27,123,397 >>> mbox cmd response data (56 bytes)
27,124,431 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,154,250 UART: [rt]cmd =0x52435458, len=8
27,156,199 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,812 writing to cptra_bootfsm_go
3,759,198 ready_for_fw is high
3,759,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,647 >>> mbox cmd response: success
15,046,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,302,329 UART:
19,302,713 UART: Running Caliptra FMC ...
19,303,899 UART:
19,304,061 UART: [state] CFI Enabled
19,312,031 UART: [fht] FMC Alias Private Key: 7
21,078,298 UART: [art] Extend RT PCRs Done
21,079,528 UART: [art] Lock RT PCRs Done
21,081,160 UART: [art] Populate DV Done
21,086,707 UART: [fht] FMC Alias Private Key: 7
21,088,308 UART: [art] Derive CDI
21,089,131 UART: [art] Store in slot 0x4
21,131,949 UART: [art] Derive Key Pair
21,132,995 UART: [art] Store priv key in slot 0x5
23,559,961 UART: [art] Derive Key Pair - Done
23,572,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,279,072 UART: [art] Erasing AUTHORITY.KEYID = 7
25,280,600 UART: [art] PUB.X = D545A8B69DE09A0481514FADB859C95B6F3058B4C2EF73EF5CA1D6E3A29B513BCAE136696D1A616796D6E87EAF6B87FE
25,287,891 UART: [art] PUB.Y = E8611760585E069FB31BD1519EED440F2BF3B595EF1002D81FDCB2F57747202465AB679A5C42147F05932855B32D8E1D
25,295,116 UART: [art] SIG.R = A9DD163DE49FA7F8750E0C87595AF37BCCB58D28B8F845C0CB903584BE1DEE5E653CFC27F1F05421025B58D372EA9C7A
25,302,522 UART: [art] SIG.S = C37028A698147F61DFBEE09E811B6AFDBBC2B6222FC568E39C50AE080D9714071338EA31BE393D6D1BE1CF74DEE61AB7
26,281,276 UART: Caliptra RT
26,281,970 UART: [state] CFI Enabled
26,415,025 UART: [rt] RT listening for mailbox commands...
26,447,420 UART: [rt]cmd =0x44504543, len=96
26,479,019 >>> mbox cmd response data (56 bytes)
26,479,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,510,576 UART: [rt]cmd =0x44504543, len=96
26,542,527 >>> mbox cmd response data (56 bytes)
26,543,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,573,777 UART: [rt]cmd =0x44504543, len=96
26,605,562 >>> mbox cmd response data (56 bytes)
26,606,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,636,694 UART: [rt]cmd =0x44504543, len=96
26,667,971 >>> mbox cmd response data (56 bytes)
26,668,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,699,309 UART: [rt]cmd =0x44504543, len=96
26,731,792 >>> mbox cmd response data (56 bytes)
26,732,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,763,056 UART: [rt]cmd =0x44504543, len=96
26,794,867 >>> mbox cmd response data (56 bytes)
26,795,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,826,154 UART: [rt]cmd =0x44504543, len=96
26,859,232 >>> mbox cmd response data (56 bytes)
26,859,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,890,634 UART: [rt]cmd =0x44504543, len=96
26,922,363 >>> mbox cmd response data (56 bytes)
26,923,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,953,642 UART: [rt]cmd =0x44504543, len=96
26,985,463 >>> mbox cmd response data (56 bytes)
26,986,181 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,016,735 UART: [rt]cmd =0x44504543, len=96
27,048,605 >>> mbox cmd response data (56 bytes)
27,049,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,079,654 UART: [rt]cmd =0x44504543, len=96
27,111,626 >>> mbox cmd response data (56 bytes)
27,112,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,142,960 UART: [rt]cmd =0x44504543, len=96
27,175,230 >>> mbox cmd response data (56 bytes)
27,176,326 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,206,366 UART: [rt]cmd =0x52435458, len=8
27,208,471 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,331 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,951 UART: [kat] SHA2-256
881,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,997 UART: [kat] ++
886,149 UART: [kat] sha1
890,377 UART: [kat] SHA2-256
892,315 UART: [kat] SHA2-384
895,300 UART: [kat] SHA2-512-ACC
897,201 UART: [kat] ECC-384
902,816 UART: [kat] HMAC-384Kdf
907,394 UART: [kat] LMS
1,475,590 UART: [kat] --
1,476,549 UART: [cold-reset] ++
1,476,917 UART: [fht] Storing FHT @ 0x50003400
1,479,612 UART: [idev] ++
1,479,780 UART: [idev] CDI.KEYID = 6
1,480,140 UART: [idev] SUBJECT.KEYID = 7
1,480,564 UART: [idev] UDS.KEYID = 0
1,480,909 ready_for_fw is high
1,480,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,436 UART: [idev] Erasing UDS.KEYID = 0
1,505,006 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,550 UART: [idev] --
1,514,651 UART: [ldev] ++
1,514,819 UART: [ldev] CDI.KEYID = 6
1,515,182 UART: [ldev] SUBJECT.KEYID = 5
1,515,608 UART: [ldev] AUTHORITY.KEYID = 7
1,516,071 UART: [ldev] FE.KEYID = 1
1,521,279 UART: [ldev] Erasing FE.KEYID = 1
1,546,288 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,494 UART: [ldev] --
1,585,831 UART: [fwproc] Waiting for Commands...
1,586,464 UART: [fwproc] Received command 0x46574c44
1,587,255 UART: [fwproc] Received Image of size 118548 bytes
2,932,875 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,343 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,561 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,786 >>> mbox cmd response: success
3,131,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,962 UART: [afmc] ++
3,133,130 UART: [afmc] CDI.KEYID = 6
3,133,492 UART: [afmc] SUBJECT.KEYID = 7
3,133,917 UART: [afmc] AUTHORITY.KEYID = 5
3,169,120 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,248 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,028 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,737 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,620 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,303 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,283 UART: [afmc] --
3,212,365 UART: [cold-reset] --
3,213,245 UART: [state] Locking Datavault
3,214,606 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,210 UART: [state] Locking ICCM
3,215,728 UART: [exit] Launching FMC @ 0x40000130
3,221,058 UART:
3,221,074 UART: Running Caliptra FMC ...
3,221,482 UART:
3,221,536 UART: [state] CFI Enabled
3,231,742 UART: [fht] FMC Alias Private Key: 7
3,350,560 UART: [art] Extend RT PCRs Done
3,350,988 UART: [art] Lock RT PCRs Done
3,352,456 UART: [art] Populate DV Done
3,360,499 UART: [fht] FMC Alias Private Key: 7
3,361,599 UART: [art] Derive CDI
3,361,879 UART: [art] Store in slot 0x4
3,447,421 UART: [art] Derive Key Pair
3,447,781 UART: [art] Store priv key in slot 0x5
3,460,720 UART: [art] Derive Key Pair - Done
3,476,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,387 UART: [art] PUB.X = 2FBC3A5F2B67B72D953CDC5ADFE27F4552EA5C978395F5CC48EACDEDAEFDD50E0262EFE84139CB6300FB05303A1E7D06
3,499,149 UART: [art] PUB.Y = 5117CBFE586C3FAD92856A26D1A14795A045F6BE74894B130C011D61626A64377594CC258EA4C8C44A66F7D2FC74844D
3,506,093 UART: [art] SIG.R = B705FBD11BB37257C8379A89043B31C89C84FF5CC347B94EA2B6C40319CDF426438C8A78A87AE89869D5A6FE679384BF
3,512,860 UART: [art] SIG.S = DC58C8742C108BBAEFF66D7FF2334F91936362BD5F7DE236EF361B48BA67D845CD8BDC7E41B673947AA0C5E3A505AA2B
3,536,709 UART: Caliptra RT
3,536,960 UART: [state] CFI Enabled
3,656,507 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,809 UART: [rt]cmd =0x44504543, len=96
3,719,751 >>> mbox cmd response data (56 bytes)
3,719,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,749,775 UART: [rt]cmd =0x44504543, len=96
3,782,582 >>> mbox cmd response data (56 bytes)
3,782,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,812,828 UART: [rt]cmd =0x44504543, len=96
3,845,082 >>> mbox cmd response data (56 bytes)
3,845,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,874,872 UART: [rt]cmd =0x44504543, len=96
3,907,453 >>> mbox cmd response data (56 bytes)
3,907,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,937,335 UART: [rt]cmd =0x44504543, len=96
3,969,925 >>> mbox cmd response data (56 bytes)
3,969,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,999,879 UART: [rt]cmd =0x44504543, len=96
4,032,770 >>> mbox cmd response data (56 bytes)
4,032,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,062,980 UART: [rt]cmd =0x44504543, len=96
4,095,768 >>> mbox cmd response data (56 bytes)
4,095,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,125,566 UART: [rt]cmd =0x44504543, len=96
4,158,059 >>> mbox cmd response data (56 bytes)
4,158,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,188,101 UART: [rt]cmd =0x44504543, len=96
4,221,111 >>> mbox cmd response data (56 bytes)
4,221,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,251,191 UART: [rt]cmd =0x44504543, len=96
4,284,732 >>> mbox cmd response data (56 bytes)
4,284,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,314,462 UART: [rt]cmd =0x44504543, len=96
4,348,050 >>> mbox cmd response data (56 bytes)
4,348,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,378,122 UART: [rt]cmd =0x44504543, len=96
4,411,661 >>> mbox cmd response data (56 bytes)
4,411,662 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,441,121 UART: [rt]cmd =0x52435458, len=8
4,442,590 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,989 ready_for_fw is high
1,361,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,172 >>> mbox cmd response: success
2,979,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,093 UART:
3,042,109 UART: Running Caliptra FMC ...
3,042,517 UART:
3,042,571 UART: [state] CFI Enabled
3,053,107 UART: [fht] FMC Alias Private Key: 7
3,172,085 UART: [art] Extend RT PCRs Done
3,172,513 UART: [art] Lock RT PCRs Done
3,173,873 UART: [art] Populate DV Done
3,182,098 UART: [fht] FMC Alias Private Key: 7
3,183,106 UART: [art] Derive CDI
3,183,386 UART: [art] Store in slot 0x4
3,269,282 UART: [art] Derive Key Pair
3,269,642 UART: [art] Store priv key in slot 0x5
3,283,443 UART: [art] Derive Key Pair - Done
3,298,286 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,458 UART: [art] PUB.X = D2265FBF4824BBF744D7E0EB439A78E21B6F707DFAC91DE2A98D5C7CF7BFD00119D2CEB42451500F29E67C77ADC206BB
3,321,239 UART: [art] PUB.Y = CDD52C80B0F824401621CA67006214A390B733459A83F096E2E52677F0BC42906F19AE0CFDABD3A45324F5A36AC35B4D
3,328,168 UART: [art] SIG.R = 578B406DB2979528577B6B9D562A032D89BB9864FE8AB70847E2DFA0361A4634192FBAF40064ABBE04BBF3BAEDBBCF0A
3,334,920 UART: [art] SIG.S = 31494FF30ED1E1B6376925560DC9330D8A1D7698301CF0437DB9627F73D00D1AC2101692F8C15909341839017F92B9A9
3,358,208 UART: Caliptra RT
3,358,459 UART: [state] CFI Enabled
3,478,936 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,142 UART: [rt]cmd =0x44504543, len=96
3,542,532 >>> mbox cmd response data (56 bytes)
3,542,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,210 UART: [rt]cmd =0x44504543, len=96
3,605,251 >>> mbox cmd response data (56 bytes)
3,605,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,149 UART: [rt]cmd =0x44504543, len=96
3,667,855 >>> mbox cmd response data (56 bytes)
3,667,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,561 UART: [rt]cmd =0x44504543, len=96
3,730,596 >>> mbox cmd response data (56 bytes)
3,730,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,760,534 UART: [rt]cmd =0x44504543, len=96
3,793,588 >>> mbox cmd response data (56 bytes)
3,793,589 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,823,464 UART: [rt]cmd =0x44504543, len=96
3,855,853 >>> mbox cmd response data (56 bytes)
3,855,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,885,857 UART: [rt]cmd =0x44504543, len=96
3,918,375 >>> mbox cmd response data (56 bytes)
3,918,376 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,401 UART: [rt]cmd =0x44504543, len=96
3,980,686 >>> mbox cmd response data (56 bytes)
3,980,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,452 UART: [rt]cmd =0x44504543, len=96
4,042,590 >>> mbox cmd response data (56 bytes)
4,042,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,072,608 UART: [rt]cmd =0x44504543, len=96
4,104,925 >>> mbox cmd response data (56 bytes)
4,104,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,134,843 UART: [rt]cmd =0x44504543, len=96
4,167,707 >>> mbox cmd response data (56 bytes)
4,167,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,197,785 UART: [rt]cmd =0x44504543, len=96
4,230,788 >>> mbox cmd response data (56 bytes)
4,230,789 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,260,046 UART: [rt]cmd =0x52435458, len=8
4,261,467 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,077 UART: [state] LifecycleState = Unprovisioned
86,732 UART: [state] DebugLocked = No
87,418 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,916 UART: [kat] SHA2-256
882,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,962 UART: [kat] ++
887,114 UART: [kat] sha1
891,506 UART: [kat] SHA2-256
893,444 UART: [kat] SHA2-384
896,231 UART: [kat] SHA2-512-ACC
898,132 UART: [kat] ECC-384
903,533 UART: [kat] HMAC-384Kdf
907,967 UART: [kat] LMS
1,476,163 UART: [kat] --
1,477,130 UART: [cold-reset] ++
1,477,518 UART: [fht] Storing FHT @ 0x50003400
1,480,433 UART: [idev] ++
1,480,601 UART: [idev] CDI.KEYID = 6
1,480,961 UART: [idev] SUBJECT.KEYID = 7
1,481,385 UART: [idev] UDS.KEYID = 0
1,481,730 ready_for_fw is high
1,481,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,361 UART: [idev] Erasing UDS.KEYID = 0
1,506,061 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,859 UART: [idev] --
1,515,860 UART: [ldev] ++
1,516,028 UART: [ldev] CDI.KEYID = 6
1,516,391 UART: [ldev] SUBJECT.KEYID = 5
1,516,817 UART: [ldev] AUTHORITY.KEYID = 7
1,517,280 UART: [ldev] FE.KEYID = 1
1,522,470 UART: [ldev] Erasing FE.KEYID = 1
1,548,187 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,077 UART: [ldev] --
1,587,572 UART: [fwproc] Waiting for Commands...
1,588,273 UART: [fwproc] Received command 0x46574c44
1,589,064 UART: [fwproc] Received Image of size 118548 bytes
2,933,338 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,696 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,914 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,189 >>> mbox cmd response: success
3,132,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,133,255 UART: [afmc] ++
3,133,423 UART: [afmc] CDI.KEYID = 6
3,133,785 UART: [afmc] SUBJECT.KEYID = 7
3,134,210 UART: [afmc] AUTHORITY.KEYID = 5
3,169,525 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,691 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,471 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,180 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,063 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,746 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,588 UART: [afmc] --
3,212,480 UART: [cold-reset] --
3,213,448 UART: [state] Locking Datavault
3,214,639 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,243 UART: [state] Locking ICCM
3,215,831 UART: [exit] Launching FMC @ 0x40000130
3,221,161 UART:
3,221,177 UART: Running Caliptra FMC ...
3,221,585 UART:
3,221,728 UART: [state] CFI Enabled
3,232,408 UART: [fht] FMC Alias Private Key: 7
3,351,278 UART: [art] Extend RT PCRs Done
3,351,706 UART: [art] Lock RT PCRs Done
3,352,818 UART: [art] Populate DV Done
3,361,231 UART: [fht] FMC Alias Private Key: 7
3,362,393 UART: [art] Derive CDI
3,362,673 UART: [art] Store in slot 0x4
3,448,267 UART: [art] Derive Key Pair
3,448,627 UART: [art] Store priv key in slot 0x5
3,461,886 UART: [art] Derive Key Pair - Done
3,476,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,373 UART: [art] PUB.X = 8DCE4C81F5FAF905A3C765071ADA7495C55E6C3047B37A0C1923BBBE3F9E50305820C79827FB0095E19B5718A12AD8DF
3,500,120 UART: [art] PUB.Y = 121C6F583298B912EF17636D13AD313D822FF60BD3B6C7DD5D402FF78B5D6E25806D75E1920F6A0AC392059FD8DA6C3A
3,507,066 UART: [art] SIG.R = 3B4D680F233236EAA7AB9D5DA486724B2B30B3AC7A98851B7416E31A13B4C920E5F358A8C5E42C436A53B5AF491FCA2D
3,513,843 UART: [art] SIG.S = FE9251035B32C57874676DD1857F099E409B1770D6AF1DCBD742F8E642FB8E88110FA6021B8244BA2CD01D273D660EF2
3,537,616 UART: Caliptra RT
3,537,959 UART: [state] CFI Enabled
3,658,003 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,295 UART: [rt]cmd =0x44504543, len=96
3,721,965 >>> mbox cmd response data (56 bytes)
3,721,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,752,047 UART: [rt]cmd =0x44504543, len=96
3,785,120 >>> mbox cmd response data (56 bytes)
3,785,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,944 UART: [rt]cmd =0x44504543, len=96
3,847,782 >>> mbox cmd response data (56 bytes)
3,847,783 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,877,900 UART: [rt]cmd =0x44504543, len=96
3,909,927 >>> mbox cmd response data (56 bytes)
3,909,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,940,005 UART: [rt]cmd =0x44504543, len=96
3,973,179 >>> mbox cmd response data (56 bytes)
3,973,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,003,191 UART: [rt]cmd =0x44504543, len=96
4,035,786 >>> mbox cmd response data (56 bytes)
4,035,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,065,774 UART: [rt]cmd =0x44504543, len=96
4,098,720 >>> mbox cmd response data (56 bytes)
4,098,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,128,704 UART: [rt]cmd =0x44504543, len=96
4,161,477 >>> mbox cmd response data (56 bytes)
4,161,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,191,219 UART: [rt]cmd =0x44504543, len=96
4,224,479 >>> mbox cmd response data (56 bytes)
4,224,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,254,459 UART: [rt]cmd =0x44504543, len=96
4,287,834 >>> mbox cmd response data (56 bytes)
4,287,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,317,998 UART: [rt]cmd =0x44504543, len=96
4,350,442 >>> mbox cmd response data (56 bytes)
4,350,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,380,400 UART: [rt]cmd =0x44504543, len=96
4,412,987 >>> mbox cmd response data (56 bytes)
4,412,988 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,442,109 UART: [rt]cmd =0x52435458, len=8
4,443,728 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,914 ready_for_fw is high
1,362,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,267 >>> mbox cmd response: success
2,981,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,970 UART:
3,042,986 UART: Running Caliptra FMC ...
3,043,394 UART:
3,043,537 UART: [state] CFI Enabled
3,054,141 UART: [fht] FMC Alias Private Key: 7
3,173,269 UART: [art] Extend RT PCRs Done
3,173,697 UART: [art] Lock RT PCRs Done
3,175,223 UART: [art] Populate DV Done
3,183,572 UART: [fht] FMC Alias Private Key: 7
3,184,684 UART: [art] Derive CDI
3,184,964 UART: [art] Store in slot 0x4
3,270,652 UART: [art] Derive Key Pair
3,271,012 UART: [art] Store priv key in slot 0x5
3,284,567 UART: [art] Derive Key Pair - Done
3,299,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,882 UART: [art] PUB.X = 5FFD29B24D0A4FEBF82DAF0BB6B94A802AA248E97053E2EA8C359013F65987E5BCEFB39180FA0AA80D2A5746E6AC0DD0
3,322,659 UART: [art] PUB.Y = 7204CF1D9422017624A9FD303E2D050B7B7F7563FA54A5A1487CEAD3D9D0DC8649A6637B0AAD2A1638DA9522D6DE705C
3,329,602 UART: [art] SIG.R = 2E1EC15C18B90F76E4ED3647E0D156A63ADD403A9FC6EC60AD06554DBAA6BEC51838C15446AE3C4DDA7984C30F43FC78
3,336,381 UART: [art] SIG.S = 82DFFBF723E12B56D8B9FDE3743EA9D90208EF2BC704CF4183F7D33A86C424B9A259EC709936C1C6CE311BDA260A0AE0
3,360,512 UART: Caliptra RT
3,360,855 UART: [state] CFI Enabled
3,481,525 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,773 UART: [rt]cmd =0x44504543, len=96
3,545,091 >>> mbox cmd response data (56 bytes)
3,545,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,574,943 UART: [rt]cmd =0x44504543, len=96
3,607,398 >>> mbox cmd response data (56 bytes)
3,607,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,296 UART: [rt]cmd =0x44504543, len=96
3,670,066 >>> mbox cmd response data (56 bytes)
3,670,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,016 UART: [rt]cmd =0x44504543, len=96
3,732,593 >>> mbox cmd response data (56 bytes)
3,732,594 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,762,475 UART: [rt]cmd =0x44504543, len=96
3,795,467 >>> mbox cmd response data (56 bytes)
3,795,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,825,251 UART: [rt]cmd =0x44504543, len=96
3,858,622 >>> mbox cmd response data (56 bytes)
3,858,623 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,888,624 UART: [rt]cmd =0x44504543, len=96
3,921,366 >>> mbox cmd response data (56 bytes)
3,921,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,106 UART: [rt]cmd =0x44504543, len=96
3,983,921 >>> mbox cmd response data (56 bytes)
3,983,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,901 UART: [rt]cmd =0x44504543, len=96
4,045,951 >>> mbox cmd response data (56 bytes)
4,045,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,076,067 UART: [rt]cmd =0x44504543, len=96
4,109,316 >>> mbox cmd response data (56 bytes)
4,109,317 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,139,244 UART: [rt]cmd =0x44504543, len=96
4,171,572 >>> mbox cmd response data (56 bytes)
4,171,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,201,586 UART: [rt]cmd =0x44504543, len=96
4,234,551 >>> mbox cmd response data (56 bytes)
4,234,552 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,263,887 UART: [rt]cmd =0x52435458, len=8
4,265,430 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,716 UART: [kat] SHA2-256
901,656 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
921,015 UART: [kat] LMS
1,169,327 UART: [kat] --
1,170,214 UART: [cold-reset] ++
1,170,762 UART: [fht] FHT @ 0x50003400
1,173,474 UART: [idev] ++
1,173,642 UART: [idev] CDI.KEYID = 6
1,174,003 UART: [idev] SUBJECT.KEYID = 7
1,174,428 UART: [idev] UDS.KEYID = 0
1,174,774 ready_for_fw is high
1,174,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,193 UART: [idev] Erasing UDS.KEYID = 0
1,198,257 UART: [idev] Sha1 KeyId Algorithm
1,207,265 UART: [idev] --
1,208,088 UART: [ldev] ++
1,208,256 UART: [ldev] CDI.KEYID = 6
1,208,620 UART: [ldev] SUBJECT.KEYID = 5
1,209,047 UART: [ldev] AUTHORITY.KEYID = 7
1,209,510 UART: [ldev] FE.KEYID = 1
1,214,714 UART: [ldev] Erasing FE.KEYID = 1
1,240,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,750 UART: [ldev] --
1,279,987 UART: [fwproc] Wait for Commands...
1,280,640 UART: [fwproc] Recv command 0x46574c44
1,281,373 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,541 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,716 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,005 >>> mbox cmd response: success
2,824,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,825,233 UART: [afmc] ++
2,825,401 UART: [afmc] CDI.KEYID = 6
2,825,764 UART: [afmc] SUBJECT.KEYID = 7
2,826,190 UART: [afmc] AUTHORITY.KEYID = 5
2,862,595 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,944 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,693 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,403 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,284 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,985 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,788 UART: [afmc] --
2,905,667 UART: [cold-reset] --
2,906,565 UART: [state] Locking Datavault
2,907,582 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,186 UART: [state] Locking ICCM
2,908,860 UART: [exit] Launching FMC @ 0x40000130
2,914,190 UART:
2,914,206 UART: Running Caliptra FMC ...
2,914,614 UART:
2,914,668 UART: [state] CFI Enabled
2,924,696 UART: [fht] FMC Alias Private Key: 7
3,043,546 UART: [art] Extend RT PCRs Done
3,043,974 UART: [art] Lock RT PCRs Done
3,045,750 UART: [art] Populate DV Done
3,053,801 UART: [fht] FMC Alias Private Key: 7
3,054,907 UART: [art] Derive CDI
3,055,187 UART: [art] Store in slot 0x4
3,140,580 UART: [art] Derive Key Pair
3,140,940 UART: [art] Store priv key in slot 0x5
3,154,446 UART: [art] Derive Key Pair - Done
3,169,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,870 UART: [art] PUB.X = CA9E7BDF6A4325CFBA5D8B617185FD1210FA707A54D83DF898E25B1AC3382CC0A15E65A08413388F11C7A71599BC7DD0
3,192,652 UART: [art] PUB.Y = 0436406D878104CDA30371F4C63033143B4612DF9D57A8C0157D47F6CAB4B9314893B9CBF3DB02D149FE4A7CB0E6E1D4
3,199,594 UART: [art] SIG.R = F5CA401B3AC6CD93AFB6A72A7BF5808FE7EB5ED0F34B4ACCE15989EBECD42972F7FAA1BF04D5EE54DD0360705DDD7511
3,206,388 UART: [art] SIG.S = 085E2889663866E3268A7B0041CE0AD94677A5A00216900F012320FFF287F9228625657AB850EBFCEC45358A8AC965F6
3,229,679 UART: Caliptra RT
3,229,930 UART: [state] CFI Enabled
3,349,183 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,123 UART: [rt]cmd =0x44504543, len=96
3,412,461 >>> mbox cmd response data (56 bytes)
3,412,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,335 UART: [rt]cmd =0x44504543, len=96
3,475,810 >>> mbox cmd response data (56 bytes)
3,475,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,505,754 UART: [rt]cmd =0x44504543, len=96
3,538,096 >>> mbox cmd response data (56 bytes)
3,538,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,568,196 UART: [rt]cmd =0x44504543, len=96
3,600,987 >>> mbox cmd response data (56 bytes)
3,600,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,630,995 UART: [rt]cmd =0x44504543, len=96
3,662,627 >>> mbox cmd response data (56 bytes)
3,662,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,692,435 UART: [rt]cmd =0x44504543, len=96
3,725,282 >>> mbox cmd response data (56 bytes)
3,725,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,755,270 UART: [rt]cmd =0x44504543, len=96
3,788,924 >>> mbox cmd response data (56 bytes)
3,788,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,112 UART: [rt]cmd =0x44504543, len=96
3,852,729 >>> mbox cmd response data (56 bytes)
3,852,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,882,669 UART: [rt]cmd =0x44504543, len=96
3,915,559 >>> mbox cmd response data (56 bytes)
3,915,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,553 UART: [rt]cmd =0x44504543, len=96
3,978,054 >>> mbox cmd response data (56 bytes)
3,978,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,970 UART: [rt]cmd =0x44504543, len=96
4,041,432 >>> mbox cmd response data (56 bytes)
4,041,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,071,118 UART: [rt]cmd =0x44504543, len=96
4,103,909 >>> mbox cmd response data (56 bytes)
4,103,910 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,133,113 UART: [rt]cmd =0x52435458, len=8
4,134,814 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,772 ready_for_fw is high
1,058,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,926 >>> mbox cmd response: success
2,678,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,805 UART:
2,740,821 UART: Running Caliptra FMC ...
2,741,229 UART:
2,741,283 UART: [state] CFI Enabled
2,751,833 UART: [fht] FMC Alias Private Key: 7
2,871,189 UART: [art] Extend RT PCRs Done
2,871,617 UART: [art] Lock RT PCRs Done
2,873,083 UART: [art] Populate DV Done
2,881,350 UART: [fht] FMC Alias Private Key: 7
2,882,306 UART: [art] Derive CDI
2,882,586 UART: [art] Store in slot 0x4
2,967,943 UART: [art] Derive Key Pair
2,968,303 UART: [art] Store priv key in slot 0x5
2,982,151 UART: [art] Derive Key Pair - Done
2,996,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,142 UART: [art] PUB.X = 3E9800368381FED5B15285CB4FE6212AC6171CCEDE970E30C28683187E1723DAC4785143902B35011308F1E7375B8583
3,019,871 UART: [art] PUB.Y = 6F3BCD630869C8D1ABC8E37D0A9968BD89564C60D5F3CEC322CE7BC30F64ABFA3AEFB9A2A3F9E168D55EDEC302E88B93
3,026,835 UART: [art] SIG.R = C129BC7A45644A38A098E5832E0EDE7079DD3CCC8ED265885DE42B3453C64805CDC715C6EEA9776C7F97C9C1BFB47225
3,033,609 UART: [art] SIG.S = F62DFAAB326D0BDE7519C1B09E6FC0BF4F8DDE8B3FE8F45711F9A89DB6E6C02D3529C70B417C08EAE8E7AD5A1749E05D
3,057,542 UART: Caliptra RT
3,057,793 UART: [state] CFI Enabled
3,176,935 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,029 UART: [rt]cmd =0x44504543, len=96
3,240,981 >>> mbox cmd response data (56 bytes)
3,240,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,270,789 UART: [rt]cmd =0x44504543, len=96
3,303,722 >>> mbox cmd response data (56 bytes)
3,303,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,333,688 UART: [rt]cmd =0x44504543, len=96
3,366,952 >>> mbox cmd response data (56 bytes)
3,366,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,698 UART: [rt]cmd =0x44504543, len=96
3,429,909 >>> mbox cmd response data (56 bytes)
3,429,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,043 UART: [rt]cmd =0x44504543, len=96
3,492,311 >>> mbox cmd response data (56 bytes)
3,492,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,307 UART: [rt]cmd =0x44504543, len=96
3,555,574 >>> mbox cmd response data (56 bytes)
3,555,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,336 UART: [rt]cmd =0x44504543, len=96
3,618,508 >>> mbox cmd response data (56 bytes)
3,618,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,414 UART: [rt]cmd =0x44504543, len=96
3,681,377 >>> mbox cmd response data (56 bytes)
3,681,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,535 UART: [rt]cmd =0x44504543, len=96
3,745,001 >>> mbox cmd response data (56 bytes)
3,745,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,774,921 UART: [rt]cmd =0x44504543, len=96
3,807,876 >>> mbox cmd response data (56 bytes)
3,807,877 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,690 UART: [rt]cmd =0x44504543, len=96
3,871,064 >>> mbox cmd response data (56 bytes)
3,871,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,996 UART: [rt]cmd =0x44504543, len=96
3,933,641 >>> mbox cmd response data (56 bytes)
3,933,642 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,067 UART: [rt]cmd =0x52435458, len=8
3,964,670 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
88,145 UART: [kat] SHA2-256
891,695 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,799 UART: [kat] ++
895,951 UART: [kat] sha1
900,309 UART: [kat] SHA2-256
902,249 UART: [kat] SHA2-384
905,054 UART: [kat] SHA2-512-ACC
906,955 UART: [kat] ECC-384
916,666 UART: [kat] HMAC-384Kdf
921,346 UART: [kat] LMS
1,169,658 UART: [kat] --
1,170,531 UART: [cold-reset] ++
1,171,107 UART: [fht] FHT @ 0x50003400
1,173,617 UART: [idev] ++
1,173,785 UART: [idev] CDI.KEYID = 6
1,174,146 UART: [idev] SUBJECT.KEYID = 7
1,174,571 UART: [idev] UDS.KEYID = 0
1,174,917 ready_for_fw is high
1,174,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,550 UART: [idev] Erasing UDS.KEYID = 0
1,199,380 UART: [idev] Sha1 KeyId Algorithm
1,208,250 UART: [idev] --
1,209,263 UART: [ldev] ++
1,209,431 UART: [ldev] CDI.KEYID = 6
1,209,795 UART: [ldev] SUBJECT.KEYID = 5
1,210,222 UART: [ldev] AUTHORITY.KEYID = 7
1,210,685 UART: [ldev] FE.KEYID = 1
1,215,923 UART: [ldev] Erasing FE.KEYID = 1
1,241,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,905 UART: [ldev] --
1,281,284 UART: [fwproc] Wait for Commands...
1,281,949 UART: [fwproc] Recv command 0x46574c44
1,282,682 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,824 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,999 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,400 >>> mbox cmd response: success
2,826,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,480 UART: [afmc] ++
2,827,648 UART: [afmc] CDI.KEYID = 6
2,828,011 UART: [afmc] SUBJECT.KEYID = 7
2,828,437 UART: [afmc] AUTHORITY.KEYID = 5
2,864,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,626 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,336 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,217 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,918 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,595 UART: [afmc] --
2,907,610 UART: [cold-reset] --
2,908,450 UART: [state] Locking Datavault
2,909,861 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,465 UART: [state] Locking ICCM
2,910,937 UART: [exit] Launching FMC @ 0x40000130
2,916,267 UART:
2,916,283 UART: Running Caliptra FMC ...
2,916,691 UART:
2,916,834 UART: [state] CFI Enabled
2,927,614 UART: [fht] FMC Alias Private Key: 7
3,046,678 UART: [art] Extend RT PCRs Done
3,047,106 UART: [art] Lock RT PCRs Done
3,048,690 UART: [art] Populate DV Done
3,057,023 UART: [fht] FMC Alias Private Key: 7
3,057,965 UART: [art] Derive CDI
3,058,245 UART: [art] Store in slot 0x4
3,143,816 UART: [art] Derive Key Pair
3,144,176 UART: [art] Store priv key in slot 0x5
3,157,832 UART: [art] Derive Key Pair - Done
3,172,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,727 UART: [art] PUB.X = EE39D535A438ECBAA08FDC89DE4233F005BB7375B91803CD3135E7270E37319355330537BD9B5A5F3C986155A4C2A41F
3,195,487 UART: [art] PUB.Y = 67F0AF6392C2E7843B594C0B9544E0F6DA7314CEB304726DBE59E40980A2F697F1BEBDA542E70938F54F84093745741C
3,202,422 UART: [art] SIG.R = AF319A71B57E21D121B721AB92CE9EF777A16E726AE03EEE75DC9CCF1B7E7963E81CA6758F66FDFD34C7BADA18D40329
3,209,209 UART: [art] SIG.S = 4F4D475D397719E8C3ADDFF1FAF01B23857FD10A748390DB9521ACE7730370421ED157692B147D231BDAD7BF20259A70
3,232,553 UART: Caliptra RT
3,232,896 UART: [state] CFI Enabled
3,352,549 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,379 UART: [rt]cmd =0x44504543, len=96
3,416,231 >>> mbox cmd response data (56 bytes)
3,416,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,446,329 UART: [rt]cmd =0x44504543, len=96
3,479,136 >>> mbox cmd response data (56 bytes)
3,479,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,186 UART: [rt]cmd =0x44504543, len=96
3,542,264 >>> mbox cmd response data (56 bytes)
3,542,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,240 UART: [rt]cmd =0x44504543, len=96
3,604,983 >>> mbox cmd response data (56 bytes)
3,604,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,891 UART: [rt]cmd =0x44504543, len=96
3,667,313 >>> mbox cmd response data (56 bytes)
3,667,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,219 UART: [rt]cmd =0x44504543, len=96
3,730,344 >>> mbox cmd response data (56 bytes)
3,730,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,760,404 UART: [rt]cmd =0x44504543, len=96
3,794,254 >>> mbox cmd response data (56 bytes)
3,794,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,824,244 UART: [rt]cmd =0x44504543, len=96
3,856,993 >>> mbox cmd response data (56 bytes)
3,856,994 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,831 UART: [rt]cmd =0x44504543, len=96
3,920,487 >>> mbox cmd response data (56 bytes)
3,920,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,407 UART: [rt]cmd =0x44504543, len=96
3,983,156 >>> mbox cmd response data (56 bytes)
3,983,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,312 UART: [rt]cmd =0x44504543, len=96
4,046,462 >>> mbox cmd response data (56 bytes)
4,046,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,076,380 UART: [rt]cmd =0x44504543, len=96
4,109,893 >>> mbox cmd response data (56 bytes)
4,109,894 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,139,259 UART: [rt]cmd =0x52435458, len=8
4,140,770 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,895 ready_for_fw is high
1,059,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,329 >>> mbox cmd response: success
2,680,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,928 UART:
2,741,944 UART: Running Caliptra FMC ...
2,742,352 UART:
2,742,495 UART: [state] CFI Enabled
2,752,971 UART: [fht] FMC Alias Private Key: 7
2,871,663 UART: [art] Extend RT PCRs Done
2,872,091 UART: [art] Lock RT PCRs Done
2,873,371 UART: [art] Populate DV Done
2,881,568 UART: [fht] FMC Alias Private Key: 7
2,882,512 UART: [art] Derive CDI
2,882,792 UART: [art] Store in slot 0x4
2,968,487 UART: [art] Derive Key Pair
2,968,847 UART: [art] Store priv key in slot 0x5
2,981,941 UART: [art] Derive Key Pair - Done
2,996,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,288 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,053 UART: [art] PUB.X = 85A4E4EAE3A21A6216A3DAD0690719100F19479B9244611CF6CA24A8D9483498AFE2FA4D9F06748E2755FA81F077FBDE
3,019,820 UART: [art] PUB.Y = E211B26EF00A7FCC692B245D1D9B5912167FEF991CAEA572A411DD50905C3EB6F90F61757B2BC65C7045D1382B36CCB3
3,026,774 UART: [art] SIG.R = F683DD9E7F9BE6EB11BCD050FD4FEA3F69D6C31043416CC396F2EDB98ADB1D5599344AC15E38E219F68249D587CD7D6E
3,033,562 UART: [art] SIG.S = 391FDCFF63BFACEC31B33B560DA40156CB660469BEFB94E42D647F8A345B8AFE7F208D244B880A6BAC1CE2602FDCC84A
3,057,478 UART: Caliptra RT
3,057,821 UART: [state] CFI Enabled
3,177,190 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,354 UART: [rt]cmd =0x44504543, len=96
3,240,458 >>> mbox cmd response data (56 bytes)
3,240,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,270,686 UART: [rt]cmd =0x44504543, len=96
3,303,785 >>> mbox cmd response data (56 bytes)
3,303,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,333,737 UART: [rt]cmd =0x44504543, len=96
3,366,033 >>> mbox cmd response data (56 bytes)
3,366,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,079 UART: [rt]cmd =0x44504543, len=96
3,429,600 >>> mbox cmd response data (56 bytes)
3,429,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,459,784 UART: [rt]cmd =0x44504543, len=96
3,492,674 >>> mbox cmd response data (56 bytes)
3,492,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,482 UART: [rt]cmd =0x44504543, len=96
3,554,873 >>> mbox cmd response data (56 bytes)
3,554,874 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,584,831 UART: [rt]cmd =0x44504543, len=96
3,617,743 >>> mbox cmd response data (56 bytes)
3,617,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,647,745 UART: [rt]cmd =0x44504543, len=96
3,681,132 >>> mbox cmd response data (56 bytes)
3,681,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,178 UART: [rt]cmd =0x44504543, len=96
3,744,198 >>> mbox cmd response data (56 bytes)
3,744,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,774,256 UART: [rt]cmd =0x44504543, len=96
3,807,547 >>> mbox cmd response data (56 bytes)
3,807,548 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,499 UART: [rt]cmd =0x44504543, len=96
3,870,523 >>> mbox cmd response data (56 bytes)
3,870,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,449 UART: [rt]cmd =0x44504543, len=96
3,933,978 >>> mbox cmd response data (56 bytes)
3,933,979 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,298 UART: [rt]cmd =0x52435458, len=8
3,964,805 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,674 UART: [state] LifecycleState = Unprovisioned
86,329 UART: [state] DebugLocked = No
87,033 UART: [state] WD Timer not started. Device not locked for debugging
88,334 UART: [kat] SHA2-256
893,984 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,109 UART: [kat] ++
898,261 UART: [kat] sha1
902,609 UART: [kat] SHA2-256
904,549 UART: [kat] SHA2-384
907,194 UART: [kat] SHA2-512-ACC
909,095 UART: [kat] ECC-384
918,996 UART: [kat] HMAC-384Kdf
923,662 UART: [kat] LMS
1,171,990 UART: [kat] --
1,172,901 UART: [cold-reset] ++
1,173,259 UART: [fht] FHT @ 0x50003400
1,176,026 UART: [idev] ++
1,176,194 UART: [idev] CDI.KEYID = 6
1,176,554 UART: [idev] SUBJECT.KEYID = 7
1,176,978 UART: [idev] UDS.KEYID = 0
1,177,323 ready_for_fw is high
1,177,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,832 UART: [idev] Erasing UDS.KEYID = 0
1,201,845 UART: [idev] Sha1 KeyId Algorithm
1,210,193 UART: [idev] --
1,211,165 UART: [ldev] ++
1,211,333 UART: [ldev] CDI.KEYID = 6
1,211,696 UART: [ldev] SUBJECT.KEYID = 5
1,212,122 UART: [ldev] AUTHORITY.KEYID = 7
1,212,585 UART: [ldev] FE.KEYID = 1
1,217,713 UART: [ldev] Erasing FE.KEYID = 1
1,243,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,403 UART: [ldev] --
1,282,724 UART: [fwproc] Wait for Commands...
1,283,518 UART: [fwproc] Recv command 0x46574c44
1,284,246 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,136 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,306 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,621 >>> mbox cmd response: success
2,827,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,781 UART: [afmc] ++
2,828,949 UART: [afmc] CDI.KEYID = 6
2,829,311 UART: [afmc] SUBJECT.KEYID = 7
2,829,736 UART: [afmc] AUTHORITY.KEYID = 5
2,865,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,438 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,147 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,030 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,731 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,591 UART: [afmc] --
2,908,657 UART: [cold-reset] --
2,909,663 UART: [state] Locking Datavault
2,910,652 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,256 UART: [state] Locking ICCM
2,911,742 UART: [exit] Launching FMC @ 0x40000130
2,917,072 UART:
2,917,088 UART: Running Caliptra FMC ...
2,917,496 UART:
2,917,550 UART: [state] CFI Enabled
2,927,900 UART: [fht] FMC Alias Private Key: 7
3,046,922 UART: [art] Extend RT PCRs Done
3,047,350 UART: [art] Lock RT PCRs Done
3,049,044 UART: [art] Populate DV Done
3,057,345 UART: [fht] FMC Alias Private Key: 7
3,058,283 UART: [art] Derive CDI
3,058,563 UART: [art] Store in slot 0x4
3,144,186 UART: [art] Derive Key Pair
3,144,546 UART: [art] Store priv key in slot 0x5
3,157,780 UART: [art] Derive Key Pair - Done
3,172,361 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,419 UART: [art] PUB.X = 0C87455670016DF427CFCC3E537DA9A5FAC4BEF91307A19B5A890F4D7FD13A51158109F28CA33A715F5EBE3EFD89B3AE
3,195,190 UART: [art] PUB.Y = 2EFD9BDF716BF25B4385D94761BA6FF763D30ABAEE4C3FFBC4B9359DDEE9D50E5A5FABE99210715A0F6E8EFB550BB7CC
3,202,160 UART: [art] SIG.R = A715CF2C4C9CC4381E6F42B0BAD11D7F5ADD6F5F2DB2E890709E7F9B6A5F806473F5248039367FB58ADAA28D6ED707E3
3,208,943 UART: [art] SIG.S = 5DDDF0E267D36903FEF473E5C92AB4DC9BC48F3B38030C0A46C0C8AAD244BA015A5073F8F17B7E8F5F02DC1C3F4042B3
3,232,945 UART: Caliptra RT
3,233,196 UART: [state] CFI Enabled
3,353,887 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,013 UART: [rt]cmd =0x44504543, len=96
3,418,299 >>> mbox cmd response data (56 bytes)
3,418,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,448,239 UART: [rt]cmd =0x44504543, len=96
3,480,874 >>> mbox cmd response data (56 bytes)
3,480,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,832 UART: [rt]cmd =0x44504543, len=96
3,543,126 >>> mbox cmd response data (56 bytes)
3,543,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,260 UART: [rt]cmd =0x44504543, len=96
3,606,027 >>> mbox cmd response data (56 bytes)
3,606,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,263 UART: [rt]cmd =0x44504543, len=96
3,668,969 >>> mbox cmd response data (56 bytes)
3,668,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,011 UART: [rt]cmd =0x44504543, len=96
3,731,922 >>> mbox cmd response data (56 bytes)
3,731,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,761,872 UART: [rt]cmd =0x44504543, len=96
3,794,830 >>> mbox cmd response data (56 bytes)
3,794,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,824,802 UART: [rt]cmd =0x44504543, len=96
3,857,707 >>> mbox cmd response data (56 bytes)
3,857,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,887,801 UART: [rt]cmd =0x44504543, len=96
3,920,951 >>> mbox cmd response data (56 bytes)
3,920,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,879 UART: [rt]cmd =0x44504543, len=96
3,984,572 >>> mbox cmd response data (56 bytes)
3,984,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,508 UART: [rt]cmd =0x44504543, len=96
4,047,116 >>> mbox cmd response data (56 bytes)
4,047,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,077,180 UART: [rt]cmd =0x44504543, len=96
4,110,351 >>> mbox cmd response data (56 bytes)
4,110,352 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,139,707 UART: [rt]cmd =0x52435458, len=8
4,141,158 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,169 ready_for_fw is high
1,060,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,938 >>> mbox cmd response: success
2,678,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,223 UART:
2,740,239 UART: Running Caliptra FMC ...
2,740,647 UART:
2,740,701 UART: [state] CFI Enabled
2,751,175 UART: [fht] FMC Alias Private Key: 7
2,869,981 UART: [art] Extend RT PCRs Done
2,870,409 UART: [art] Lock RT PCRs Done
2,872,115 UART: [art] Populate DV Done
2,880,534 UART: [fht] FMC Alias Private Key: 7
2,881,638 UART: [art] Derive CDI
2,881,918 UART: [art] Store in slot 0x4
2,967,425 UART: [art] Derive Key Pair
2,967,785 UART: [art] Store priv key in slot 0x5
2,980,781 UART: [art] Derive Key Pair - Done
2,995,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,364 UART: [art] PUB.X = 55AB776982926A5E835E9F4A7798294DEF66985BF7FF1C41504AD1D927557D3B6D57A9C972C660CB4928C880A9B05A48
3,019,132 UART: [art] PUB.Y = 81D5CC09F95EB976F8D6B6F18445306763C2B5416D2C244F6CEEDB245448657908C0CDA76395C31DB4DFC24862C61772
3,026,076 UART: [art] SIG.R = 97086E3690C4A9CC3583176479A3B4046A2465A6DAB0BD0F3D3F5386F7F204ABE4A209BAE8129B791B7C2A4DFAF62386
3,032,837 UART: [art] SIG.S = 0CFADB99EB01FF033F63E1B65E6E36B7941C6A16C43446BE635020108E1F0D82F93EE8D637289090EB680FBC40B1DFCD
3,056,462 UART: Caliptra RT
3,056,713 UART: [state] CFI Enabled
3,175,910 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,930 UART: [rt]cmd =0x44504543, len=96
3,239,112 >>> mbox cmd response data (56 bytes)
3,239,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,106 UART: [rt]cmd =0x44504543, len=96
3,301,863 >>> mbox cmd response data (56 bytes)
3,301,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,331,885 UART: [rt]cmd =0x44504543, len=96
3,364,683 >>> mbox cmd response data (56 bytes)
3,364,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,549 UART: [rt]cmd =0x44504543, len=96
3,427,406 >>> mbox cmd response data (56 bytes)
3,427,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,457,190 UART: [rt]cmd =0x44504543, len=96
3,490,258 >>> mbox cmd response data (56 bytes)
3,490,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,080 UART: [rt]cmd =0x44504543, len=96
3,552,893 >>> mbox cmd response data (56 bytes)
3,552,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,582,759 UART: [rt]cmd =0x44504543, len=96
3,615,703 >>> mbox cmd response data (56 bytes)
3,615,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,645,603 UART: [rt]cmd =0x44504543, len=96
3,678,076 >>> mbox cmd response data (56 bytes)
3,678,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,707,904 UART: [rt]cmd =0x44504543, len=96
3,740,932 >>> mbox cmd response data (56 bytes)
3,740,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,770,898 UART: [rt]cmd =0x44504543, len=96
3,803,847 >>> mbox cmd response data (56 bytes)
3,803,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,833,937 UART: [rt]cmd =0x44504543, len=96
3,867,449 >>> mbox cmd response data (56 bytes)
3,867,450 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,491 UART: [rt]cmd =0x44504543, len=96
3,930,848 >>> mbox cmd response data (56 bytes)
3,930,849 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,960,250 UART: [rt]cmd =0x52435458, len=8
3,961,795 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,297 UART: [kat] SHA2-256
893,947 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,072 UART: [kat] ++
898,224 UART: [kat] sha1
902,550 UART: [kat] SHA2-256
904,490 UART: [kat] SHA2-384
907,219 UART: [kat] SHA2-512-ACC
909,120 UART: [kat] ECC-384
919,129 UART: [kat] HMAC-384Kdf
923,789 UART: [kat] LMS
1,172,117 UART: [kat] --
1,173,098 UART: [cold-reset] ++
1,173,556 UART: [fht] FHT @ 0x50003400
1,176,021 UART: [idev] ++
1,176,189 UART: [idev] CDI.KEYID = 6
1,176,549 UART: [idev] SUBJECT.KEYID = 7
1,176,973 UART: [idev] UDS.KEYID = 0
1,177,318 ready_for_fw is high
1,177,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,847 UART: [idev] Erasing UDS.KEYID = 0
1,201,350 UART: [idev] Sha1 KeyId Algorithm
1,210,002 UART: [idev] --
1,211,132 UART: [ldev] ++
1,211,300 UART: [ldev] CDI.KEYID = 6
1,211,663 UART: [ldev] SUBJECT.KEYID = 5
1,212,089 UART: [ldev] AUTHORITY.KEYID = 7
1,212,552 UART: [ldev] FE.KEYID = 1
1,217,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,248 UART: [ldev] --
1,283,705 UART: [fwproc] Wait for Commands...
1,284,495 UART: [fwproc] Recv command 0x46574c44
1,285,223 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,613 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,783 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,112 >>> mbox cmd response: success
2,829,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,830,122 UART: [afmc] ++
2,830,290 UART: [afmc] CDI.KEYID = 6
2,830,652 UART: [afmc] SUBJECT.KEYID = 7
2,831,077 UART: [afmc] AUTHORITY.KEYID = 5
2,867,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,467 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,176 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,059 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,760 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,462 UART: [afmc] --
2,910,498 UART: [cold-reset] --
2,911,242 UART: [state] Locking Datavault
2,912,443 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,047 UART: [state] Locking ICCM
2,913,719 UART: [exit] Launching FMC @ 0x40000130
2,919,049 UART:
2,919,065 UART: Running Caliptra FMC ...
2,919,473 UART:
2,919,616 UART: [state] CFI Enabled
2,930,230 UART: [fht] FMC Alias Private Key: 7
3,048,650 UART: [art] Extend RT PCRs Done
3,049,078 UART: [art] Lock RT PCRs Done
3,050,776 UART: [art] Populate DV Done
3,058,987 UART: [fht] FMC Alias Private Key: 7
3,060,153 UART: [art] Derive CDI
3,060,433 UART: [art] Store in slot 0x4
3,145,998 UART: [art] Derive Key Pair
3,146,358 UART: [art] Store priv key in slot 0x5
3,159,852 UART: [art] Derive Key Pair - Done
3,174,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,846 UART: [art] PUB.X = 49346D16877A2BCE1AE33AF927586B901A0FF716140BBEB43AAF1F4E4B7CC50F2A834E449D356001FAB09217E6091C75
3,197,607 UART: [art] PUB.Y = C595422E4B4BA125E85A9EA1A5B2BD1A0D22676EAF0E57EB02880DA566C12B5CB35D79ADC52594CB807D44C98FE2D83E
3,204,561 UART: [art] SIG.R = BADC08414DF1F6C4E06341A1C953F9722673932585C82505FA32D14E504ABB2B471C52F22095B7936DE9FCCF76707C19
3,211,325 UART: [art] SIG.S = 43A26B8E8BDE227E4FFB592FD405728A22E33EBA131FD9D22C3B1461E41954EEAD7EEDFBB293BE8A412EF59DEE0AFC82
3,235,009 UART: Caliptra RT
3,235,352 UART: [state] CFI Enabled
3,355,787 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,983 UART: [rt]cmd =0x44504543, len=96
3,419,883 >>> mbox cmd response data (56 bytes)
3,419,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,449,929 UART: [rt]cmd =0x44504543, len=96
3,482,294 >>> mbox cmd response data (56 bytes)
3,482,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,368 UART: [rt]cmd =0x44504543, len=96
3,545,566 >>> mbox cmd response data (56 bytes)
3,545,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,575,780 UART: [rt]cmd =0x44504543, len=96
3,609,355 >>> mbox cmd response data (56 bytes)
3,609,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,485 UART: [rt]cmd =0x44504543, len=96
3,672,315 >>> mbox cmd response data (56 bytes)
3,672,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,702,287 UART: [rt]cmd =0x44504543, len=96
3,736,176 >>> mbox cmd response data (56 bytes)
3,736,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,766,126 UART: [rt]cmd =0x44504543, len=96
3,799,138 >>> mbox cmd response data (56 bytes)
3,799,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,829,058 UART: [rt]cmd =0x44504543, len=96
3,861,809 >>> mbox cmd response data (56 bytes)
3,861,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,585 UART: [rt]cmd =0x44504543, len=96
3,924,587 >>> mbox cmd response data (56 bytes)
3,924,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,499 UART: [rt]cmd =0x44504543, len=96
3,987,944 >>> mbox cmd response data (56 bytes)
3,987,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,912 UART: [rt]cmd =0x44504543, len=96
4,051,022 >>> mbox cmd response data (56 bytes)
4,051,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,081,194 UART: [rt]cmd =0x44504543, len=96
4,114,633 >>> mbox cmd response data (56 bytes)
4,114,634 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,144,195 UART: [rt]cmd =0x52435458, len=8
4,145,836 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,934 ready_for_fw is high
1,060,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,185 >>> mbox cmd response: success
2,681,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,743,940 UART:
2,743,956 UART: Running Caliptra FMC ...
2,744,364 UART:
2,744,507 UART: [state] CFI Enabled
2,754,957 UART: [fht] FMC Alias Private Key: 7
2,873,675 UART: [art] Extend RT PCRs Done
2,874,103 UART: [art] Lock RT PCRs Done
2,875,597 UART: [art] Populate DV Done
2,884,044 UART: [fht] FMC Alias Private Key: 7
2,885,172 UART: [art] Derive CDI
2,885,452 UART: [art] Store in slot 0x4
2,971,293 UART: [art] Derive Key Pair
2,971,653 UART: [art] Store priv key in slot 0x5
2,985,373 UART: [art] Derive Key Pair - Done
3,000,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,664 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,429 UART: [art] PUB.X = B5E54519E1CB773EBB3E220488D114B32F7B6E4C7A71A7D86F95A2404346FDE971C80434D8EC81E800D84FF04DCE7417
3,023,177 UART: [art] PUB.Y = 6BDF0B3C795B082FFB0FC8FEDBFD5BA97B93E38FF480926495E4D6F17AEE366AE1F0E65CE7F427EC17BE751047FB78AF
3,030,144 UART: [art] SIG.R = 8E66A720BEF5A1FB003E674896B5EFCE60B5120048F25BA3BE136083C9AE004115E6DA38E1A2222917B889590F5A1845
3,036,845 UART: [art] SIG.S = DA92A80D6CEF9CBF14946EB80E86502BBE4BF955C6D76D572D2F6A738A6D26D7264AF8A4CE000D4ADBB4D9D3D134A404
3,060,509 UART: Caliptra RT
3,060,852 UART: [state] CFI Enabled
3,180,586 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,568 UART: [rt]cmd =0x44504543, len=96
3,244,218 >>> mbox cmd response data (56 bytes)
3,244,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,274,230 UART: [rt]cmd =0x44504543, len=96
3,307,217 >>> mbox cmd response data (56 bytes)
3,307,218 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,337,187 UART: [rt]cmd =0x44504543, len=96
3,371,059 >>> mbox cmd response data (56 bytes)
3,371,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,401,337 UART: [rt]cmd =0x44504543, len=96
3,434,404 >>> mbox cmd response data (56 bytes)
3,434,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,464,394 UART: [rt]cmd =0x44504543, len=96
3,497,544 >>> mbox cmd response data (56 bytes)
3,497,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,527,550 UART: [rt]cmd =0x44504543, len=96
3,561,059 >>> mbox cmd response data (56 bytes)
3,561,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,590,861 UART: [rt]cmd =0x44504543, len=96
3,624,119 >>> mbox cmd response data (56 bytes)
3,624,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,654,111 UART: [rt]cmd =0x44504543, len=96
3,687,308 >>> mbox cmd response data (56 bytes)
3,687,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,226 UART: [rt]cmd =0x44504543, len=96
3,750,682 >>> mbox cmd response data (56 bytes)
3,750,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,582 UART: [rt]cmd =0x44504543, len=96
3,813,205 >>> mbox cmd response data (56 bytes)
3,813,206 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,251 UART: [rt]cmd =0x44504543, len=96
3,875,985 >>> mbox cmd response data (56 bytes)
3,875,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,905,707 UART: [rt]cmd =0x44504543, len=96
3,938,530 >>> mbox cmd response data (56 bytes)
3,938,531 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,967,906 UART: [rt]cmd =0x52435458, len=8
3,969,445 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
Truncated 309346 bytes from beginning
(96 bytes) from SoC
34,562,455 UART: [rt]cmd =0x44504543, len=96
34,595,107 >>> mbox cmd response data (56 bytes)
34,595,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,626,170 UART: [rt]cmd =0x44504543, len=96
34,657,590 >>> mbox cmd response data (56 bytes)
34,658,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,688,845 UART: [rt]cmd =0x44504543, len=96
34,721,081 >>> mbox cmd response data (56 bytes)
34,721,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,752,432 UART: [rt]cmd =0x44504543, len=96
34,785,586 >>> mbox cmd response data (56 bytes)
34,786,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,816,804 UART: [rt]cmd =0x44504543, len=96
34,849,308 >>> mbox cmd response data (56 bytes)
34,850,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,880,723 UART: [rt]cmd =0x44504543, len=96
34,887,541 >>> mbox cmd response: failed
34,887,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,918,384 UART: [rt]cmd =0x44504543, len=96
34,949,861 >>> mbox cmd response data (56 bytes)
34,950,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,981,057 UART: [rt]cmd =0x44504543, len=96
35,013,994 >>> mbox cmd response data (56 bytes)
35,014,668 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,045,105 UART: [rt]cmd =0x44504543, len=96
35,052,192 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,224 UART:
192,577 UART: Running Caliptra ROM ...
193,764 UART:
193,926 UART: [state] CFI Enabled
262,583 UART: [state] LifecycleState = Unprovisioned
264,574 UART: [state] DebugLocked = No
265,974 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,696 UART: [kat] SHA2-256
441,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,898 UART: [kat] ++
452,425 UART: [kat] sha1
464,625 UART: [kat] SHA2-256
467,316 UART: [kat] SHA2-384
472,349 UART: [kat] SHA2-512-ACC
474,685 UART: [kat] ECC-384
2,768,713 UART: [kat] HMAC-384Kdf
2,801,337 UART: [kat] LMS
3,991,599 UART: [kat] --
3,997,541 UART: [cold-reset] ++
3,999,759 UART: [fht] Storing FHT @ 0x50003400
4,011,235 UART: [idev] ++
4,011,806 UART: [idev] CDI.KEYID = 6
4,012,842 UART: [idev] SUBJECT.KEYID = 7
4,014,016 UART: [idev] UDS.KEYID = 0
4,015,098 ready_for_fw is high
4,015,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,369 UART: [idev] Erasing UDS.KEYID = 0
7,348,961 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,155 UART: [idev] --
7,375,258 UART: [ldev] ++
7,375,883 UART: [ldev] CDI.KEYID = 6
7,376,765 UART: [ldev] SUBJECT.KEYID = 5
7,378,032 UART: [ldev] AUTHORITY.KEYID = 7
7,379,268 UART: [ldev] FE.KEYID = 1
7,425,158 UART: [ldev] Erasing FE.KEYID = 1
10,759,043 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,142 UART: [ldev] --
13,137,081 UART: [fwproc] Waiting for Commands...
13,139,124 UART: [fwproc] Received command 0x46574c44
13,141,381 UART: [fwproc] Received Image of size 118548 bytes
17,253,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,332,474 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,405,617 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,733,519 >>> mbox cmd response: success
17,734,060 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,738,029 UART: [afmc] ++
17,738,614 UART: [afmc] CDI.KEYID = 6
17,739,586 UART: [afmc] SUBJECT.KEYID = 7
17,740,803 UART: [afmc] AUTHORITY.KEYID = 5
21,117,573 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,414,145 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,416,406 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,430,867 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,445,583 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,460,014 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,481,306 UART: [afmc] --
23,485,231 UART: [cold-reset] --
23,490,226 UART: [state] Locking Datavault
23,496,390 UART: [state] Locking PCR0, PCR1 and PCR31
23,498,144 UART: [state] Locking ICCM
23,499,596 UART: [exit] Launching FMC @ 0x40000130
23,507,999 UART:
23,508,234 UART: Running Caliptra FMC ...
23,509,545 UART:
23,509,713 UART: [state] CFI Enabled
23,574,963 UART: [fht] FMC Alias Private Key: 7
25,915,840 UART: [art] Extend RT PCRs Done
25,917,088 UART: [art] Lock RT PCRs Done
25,918,536 UART: [art] Populate DV Done
25,923,896 UART: [fht] FMC Alias Private Key: 7
25,925,546 UART: [art] Derive CDI
25,926,304 UART: [art] Store in slot 0x4
25,984,079 UART: [art] Derive Key Pair
25,985,084 UART: [art] Store priv key in slot 0x5
29,277,589 UART: [art] Derive Key Pair - Done
29,290,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,580,328 UART: [art] Erasing AUTHORITY.KEYID = 7
31,581,836 UART: [art] PUB.X = 38E37DC399994DC0B9C361E303FAFFBAFC4C52D96EE82C4752E1C932B1124DCB5635CDBF71C8BBA795F28529887CD80C
31,589,301 UART: [art] PUB.Y = FC3A168259CA8FB5B80FCBA09F68F1D1B0884AAF05D0B04F3D66C16BCA30E514E38681A79EB9A621128910B0545D89D2
31,596,413 UART: [art] SIG.R = 81B8B418BA095C7730F94A18634B05C0A72EE7D3420D275C386CAEF0905CB46F5865F0084F877D48F24076177EFD316D
31,603,778 UART: [art] SIG.S = 4CF68245DEFE79AEBDA24B5944EFEE87908D9197A872B488C2E56A0B3F89BE8006C53D1CD6BEFF347C713372797F8192
32,909,484 UART: Caliptra RT
32,910,209 UART: [state] CFI Enabled
33,088,732 UART: [rt] RT listening for mailbox commands...
33,120,480 UART: [rt]cmd =0x52435458, len=8
33,122,688 >>> mbox cmd response data (16 bytes)
33,123,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,153,824 UART: [rt]cmd =0x44504543, len=96
33,185,683 >>> mbox cmd response data (56 bytes)
33,186,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,216,746 UART: [rt]cmd =0x44504543, len=96
33,248,477 >>> mbox cmd response data (56 bytes)
33,249,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,279,610 UART: [rt]cmd =0x44504543, len=96
33,312,203 >>> mbox cmd response data (56 bytes)
33,312,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,343,461 UART: [rt]cmd =0x44504543, len=96
33,375,422 >>> mbox cmd response data (56 bytes)
33,376,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,406,408 UART: [rt]cmd =0x44504543, len=96
33,438,423 >>> mbox cmd response data (56 bytes)
33,439,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,469,665 UART: [rt]cmd =0x44504543, len=96
33,502,506 >>> mbox cmd response data (56 bytes)
33,503,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,533,669 UART: [rt]cmd =0x44504543, len=96
33,565,663 >>> mbox cmd response data (56 bytes)
33,566,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,596,937 UART: [rt]cmd =0x44504543, len=96
33,627,908 >>> mbox cmd response data (56 bytes)
33,628,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,659,160 UART: [rt]cmd =0x44504543, len=96
33,691,181 >>> mbox cmd response data (56 bytes)
33,691,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,722,648 UART: [rt]cmd =0x44504543, len=96
33,754,248 >>> mbox cmd response data (56 bytes)
33,754,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,785,539 UART: [rt]cmd =0x44504543, len=96
33,816,909 >>> mbox cmd response data (56 bytes)
33,817,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,848,077 UART: [rt]cmd =0x44504543, len=96
33,880,294 >>> mbox cmd response data (56 bytes)
33,880,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,911,344 UART: [rt]cmd =0x44504543, len=96
33,942,902 >>> mbox cmd response data (56 bytes)
33,943,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,974,167 UART: [rt]cmd =0x44504543, len=96
34,005,276 >>> mbox cmd response data (56 bytes)
34,006,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,036,428 UART: [rt]cmd =0x44504543, len=96
34,068,233 >>> mbox cmd response data (56 bytes)
34,068,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,099,573 UART: [rt]cmd =0x44504543, len=96
34,131,900 >>> mbox cmd response data (56 bytes)
34,132,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,163,236 UART: [rt]cmd =0x44504543, len=96
34,195,674 >>> mbox cmd response data (56 bytes)
34,196,357 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,226,614 UART: [rt]cmd =0x44504543, len=96
34,258,480 >>> mbox cmd response data (56 bytes)
34,259,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,289,671 UART: [rt]cmd =0x44504543, len=96
34,321,914 >>> mbox cmd response data (56 bytes)
34,322,629 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,353,423 UART: [rt]cmd =0x44504543, len=96
34,385,491 >>> mbox cmd response data (56 bytes)
34,386,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,416,865 UART: [rt]cmd =0x44504543, len=96
34,448,265 >>> mbox cmd response data (56 bytes)
34,448,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,479,351 UART: [rt]cmd =0x44504543, len=96
34,510,880 >>> mbox cmd response data (56 bytes)
34,511,620 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,542,259 UART: [rt]cmd =0x44504543, len=96
34,574,727 >>> mbox cmd response data (56 bytes)
34,575,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,606,084 UART: [rt]cmd =0x44504543, len=96
34,637,460 >>> mbox cmd response data (56 bytes)
34,638,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,668,605 UART: [rt]cmd =0x44504543, len=96
34,701,464 >>> mbox cmd response data (56 bytes)
34,702,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,732,496 UART: [rt]cmd =0x44504543, len=96
34,764,657 >>> mbox cmd response data (56 bytes)
34,765,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,795,663 UART: [rt]cmd =0x44504543, len=96
34,828,037 >>> mbox cmd response data (56 bytes)
34,828,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,859,381 UART: [rt]cmd =0x44504543, len=96
34,890,906 >>> mbox cmd response data (56 bytes)
34,891,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,922,248 UART: [rt]cmd =0x44504543, len=96
34,955,253 >>> mbox cmd response data (56 bytes)
34,955,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,986,395 UART: [rt]cmd =0x44504543, len=96
34,993,172 >>> mbox cmd response: failed
34,993,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,024,161 UART: [rt]cmd =0x44504543, len=96
35,056,299 >>> mbox cmd response data (56 bytes)
35,057,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,087,493 UART: [rt]cmd =0x44504543, len=96
35,094,397 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 55.80s
Truncated 208126 bytes from beginning
704 UART: [rt]cmd =0x44504543, len=96
33,404,407 >>> mbox cmd response data (56 bytes)
33,405,132 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,435,826 UART: [rt]cmd =0x44504543, len=96
33,467,917 >>> mbox cmd response data (56 bytes)
33,468,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,499,328 UART: [rt]cmd =0x44504543, len=96
33,531,296 >>> mbox cmd response data (56 bytes)
33,531,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,562,289 UART: [rt]cmd =0x44504543, len=96
33,593,960 >>> mbox cmd response data (56 bytes)
33,594,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,625,344 UART: [rt]cmd =0x44504543, len=96
33,657,318 >>> mbox cmd response data (56 bytes)
33,658,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,688,784 UART: [rt]cmd =0x44504543, len=96
33,720,816 >>> mbox cmd response data (56 bytes)
33,721,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,751,939 UART: [rt]cmd =0x44504543, len=96
33,783,685 >>> mbox cmd response data (56 bytes)
33,784,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,815,006 UART: [rt]cmd =0x44504543, len=96
33,847,599 >>> mbox cmd response data (56 bytes)
33,848,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,878,813 UART: [rt]cmd =0x44504543, len=96
33,910,803 >>> mbox cmd response data (56 bytes)
33,911,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,941,845 UART: [rt]cmd =0x44504543, len=96
33,973,999 >>> mbox cmd response data (56 bytes)
33,974,707 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,005,391 UART: [rt]cmd =0x44504543, len=96
34,036,672 >>> mbox cmd response data (56 bytes)
34,037,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,067,970 UART: [rt]cmd =0x44504543, len=96
34,099,069 >>> mbox cmd response data (56 bytes)
34,099,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,130,227 UART: [rt]cmd =0x44504543, len=96
34,162,162 >>> mbox cmd response data (56 bytes)
34,162,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,193,496 UART: [rt]cmd =0x44504543, len=96
34,225,490 >>> mbox cmd response data (56 bytes)
34,226,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,256,806 UART: [rt]cmd =0x44504543, len=96
34,288,990 >>> mbox cmd response data (56 bytes)
34,289,720 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,320,195 UART: [rt]cmd =0x44504543, len=96
34,352,483 >>> mbox cmd response data (56 bytes)
34,353,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,383,885 UART: [rt]cmd =0x44504543, len=96
34,416,871 >>> mbox cmd response data (56 bytes)
34,417,536 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,447,803 UART: [rt]cmd =0x44504543, len=96
34,480,558 >>> mbox cmd response data (56 bytes)
34,481,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,511,605 UART: [rt]cmd =0x44504543, len=96
34,543,975 >>> mbox cmd response data (56 bytes)
34,544,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,575,279 UART: [rt]cmd =0x44504543, len=96
34,608,157 >>> mbox cmd response data (56 bytes)
34,608,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,639,417 UART: [rt]cmd =0x44504543, len=96
34,670,689 >>> mbox cmd response data (56 bytes)
34,671,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,702,093 UART: [rt]cmd =0x44504543, len=96
34,733,843 >>> mbox cmd response data (56 bytes)
34,734,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,764,894 UART: [rt]cmd =0x44504543, len=96
34,797,475 >>> mbox cmd response data (56 bytes)
34,798,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,828,965 UART: [rt]cmd =0x44504543, len=96
34,861,063 >>> mbox cmd response data (56 bytes)
34,861,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,892,372 UART: [rt]cmd =0x44504543, len=96
34,924,236 >>> mbox cmd response data (56 bytes)
34,924,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,955,590 UART: [rt]cmd =0x44504543, len=96
34,988,375 >>> mbox cmd response data (56 bytes)
34,989,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,019,784 UART: [rt]cmd =0x44504543, len=96
35,026,788 >>> mbox cmd response: failed
35,027,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,057,835 UART: [rt]cmd =0x44504543, len=96
35,089,732 >>> mbox cmd response data (56 bytes)
35,090,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,121,053 UART: [rt]cmd =0x44504543, len=96
35,153,965 >>> mbox cmd response data (56 bytes)
35,154,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,185,365 UART: [rt]cmd =0x44504543, len=96
35,192,301 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,780,290 ready_for_fw is high
3,780,690 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,922,283 >>> mbox cmd response: success
17,923,071 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,605,606 UART:
23,606,005 UART: Running Caliptra FMC ...
23,607,166 UART:
23,607,329 UART: [state] CFI Enabled
23,676,754 UART: [fht] FMC Alias Private Key: 7
26,017,442 UART: [art] Extend RT PCRs Done
26,018,682 UART: [art] Lock RT PCRs Done
26,020,348 UART: [art] Populate DV Done
26,025,715 UART: [fht] FMC Alias Private Key: 7
26,027,425 UART: [art] Derive CDI
26,028,165 UART: [art] Store in slot 0x4
26,085,453 UART: [art] Derive Key Pair
26,086,498 UART: [art] Store priv key in slot 0x5
29,378,670 UART: [art] Derive Key Pair - Done
29,391,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,679,339 UART: [art] Erasing AUTHORITY.KEYID = 7
31,680,851 UART: [art] PUB.X = C77465622C2F257F13E74D1A3E9095B2A53795BAEBC955B719685341B5038D2B7289BD02FDC03165486733C98E9242F1
31,688,061 UART: [art] PUB.Y = DBAF25483EE9FA299D5B5D277922198C65C8D346A88F477172826183EBEE7795389D50233D8080F1591501C645678E65
31,695,287 UART: [art] SIG.R = 8A8B5CDCF90850E0396DE15086DE6ADC8DB960D6F40D86D3EA5E4D42E31E3364E63AC4C134F5C0CBC444DE845306E63C
31,702,689 UART: [art] SIG.S = 6D10541BB2D01582C36BD73FFAF2C8B2892FCF364EEECF8B5E8BD486E21246FF1A29C446294EE65EBE208CB964035ACD
33,007,752 UART: Caliptra RT
33,008,479 UART: [state] CFI Enabled
33,186,029 UART: [rt] RT listening for mailbox commands...
33,217,395 UART: [rt]cmd =0x52435458, len=8
33,219,626 >>> mbox cmd response data (16 bytes)
33,220,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,250,715 UART: [rt]cmd =0x44504543, len=96
33,282,793 >>> mbox cmd response data (56 bytes)
33,283,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,314,396 UART: [rt]cmd =0x44504543, len=96
33,346,692 >>> mbox cmd response data (56 bytes)
33,347,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,378,210 UART: [rt]cmd =0x44504543, len=96
33,410,271 >>> mbox cmd response data (56 bytes)
33,410,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,441,531 UART: [rt]cmd =0x44504543, len=96
33,473,011 >>> mbox cmd response data (56 bytes)
33,473,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,504,305 UART: [rt]cmd =0x44504543, len=96
33,536,022 >>> mbox cmd response data (56 bytes)
33,536,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,567,224 UART: [rt]cmd =0x44504543, len=96
33,598,533 >>> mbox cmd response data (56 bytes)
33,599,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,629,721 UART: [rt]cmd =0x44504543, len=96
33,661,356 >>> mbox cmd response data (56 bytes)
33,662,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,692,445 UART: [rt]cmd =0x44504543, len=96
33,724,032 >>> mbox cmd response data (56 bytes)
33,724,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,755,243 UART: [rt]cmd =0x44504543, len=96
33,786,650 >>> mbox cmd response data (56 bytes)
33,787,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,817,905 UART: [rt]cmd =0x44504543, len=96
33,849,276 >>> mbox cmd response data (56 bytes)
33,850,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,880,392 UART: [rt]cmd =0x44504543, len=96
33,912,860 >>> mbox cmd response data (56 bytes)
33,913,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,944,269 UART: [rt]cmd =0x44504543, len=96
33,977,142 >>> mbox cmd response data (56 bytes)
33,977,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,008,519 UART: [rt]cmd =0x44504543, len=96
34,039,871 >>> mbox cmd response data (56 bytes)
34,040,552 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,071,312 UART: [rt]cmd =0x44504543, len=96
34,102,929 >>> mbox cmd response data (56 bytes)
34,103,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,134,243 UART: [rt]cmd =0x44504543, len=96
34,166,378 >>> mbox cmd response data (56 bytes)
34,167,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,197,589 UART: [rt]cmd =0x44504543, len=96
34,229,310 >>> mbox cmd response data (56 bytes)
34,230,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,260,394 UART: [rt]cmd =0x44504543, len=96
34,292,884 >>> mbox cmd response data (56 bytes)
34,293,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,324,113 UART: [rt]cmd =0x44504543, len=96
34,355,618 >>> mbox cmd response data (56 bytes)
34,356,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,386,807 UART: [rt]cmd =0x44504543, len=96
34,419,280 >>> mbox cmd response data (56 bytes)
34,419,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,450,437 UART: [rt]cmd =0x44504543, len=96
34,482,965 >>> mbox cmd response data (56 bytes)
34,483,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,514,119 UART: [rt]cmd =0x44504543, len=96
34,546,851 >>> mbox cmd response data (56 bytes)
34,547,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,578,033 UART: [rt]cmd =0x44504543, len=96
34,610,478 >>> mbox cmd response data (56 bytes)
34,611,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,641,726 UART: [rt]cmd =0x44504543, len=96
34,673,184 >>> mbox cmd response data (56 bytes)
34,673,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,704,679 UART: [rt]cmd =0x44504543, len=96
34,737,485 >>> mbox cmd response data (56 bytes)
34,738,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,768,579 UART: [rt]cmd =0x44504543, len=96
34,800,644 >>> mbox cmd response data (56 bytes)
34,801,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,831,936 UART: [rt]cmd =0x44504543, len=96
34,864,407 >>> mbox cmd response data (56 bytes)
34,865,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,895,764 UART: [rt]cmd =0x44504543, len=96
34,927,617 >>> mbox cmd response data (56 bytes)
34,928,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,958,705 UART: [rt]cmd =0x44504543, len=96
34,990,876 >>> mbox cmd response data (56 bytes)
34,991,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,022,098 UART: [rt]cmd =0x44504543, len=96
35,054,155 >>> mbox cmd response data (56 bytes)
35,054,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,085,589 UART: [rt]cmd =0x44504543, len=96
35,092,262 >>> mbox cmd response: failed
35,092,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,123,062 UART: [rt]cmd =0x44504543, len=96
35,155,329 >>> mbox cmd response data (56 bytes)
35,156,039 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,186,539 UART: [rt]cmd =0x44504543, len=96
35,193,464 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 56.08s
Truncated 309346 bytes from beginning
(96 bytes) from SoC
34,534,590 UART: [rt]cmd =0x44504543, len=96
34,567,095 >>> mbox cmd response data (56 bytes)
34,567,808 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,598,272 UART: [rt]cmd =0x44504543, len=96
34,630,982 >>> mbox cmd response data (56 bytes)
34,631,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,662,130 UART: [rt]cmd =0x44504543, len=96
34,694,343 >>> mbox cmd response data (56 bytes)
34,695,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,725,554 UART: [rt]cmd =0x44504543, len=96
34,757,493 >>> mbox cmd response data (56 bytes)
34,758,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,788,853 UART: [rt]cmd =0x44504543, len=96
34,820,551 >>> mbox cmd response data (56 bytes)
34,821,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,852,009 UART: [rt]cmd =0x44504543, len=96
34,858,841 >>> mbox cmd response: failed
34,859,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,889,726 UART: [rt]cmd =0x44504543, len=96
34,922,634 >>> mbox cmd response data (56 bytes)
34,923,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,953,955 UART: [rt]cmd =0x44504543, len=96
34,986,463 >>> mbox cmd response data (56 bytes)
34,987,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,017,533 UART: [rt]cmd =0x44504543, len=96
35,024,448 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,456 UART:
192,812 UART: Running Caliptra ROM ...
193,981 UART:
603,762 UART: [state] CFI Enabled
618,736 UART: [state] LifecycleState = Unprovisioned
620,721 UART: [state] DebugLocked = No
623,315 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,691 UART: [kat] SHA2-256
797,428 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,955 UART: [kat] ++
808,400 UART: [kat] sha1
820,407 UART: [kat] SHA2-256
823,080 UART: [kat] SHA2-384
829,141 UART: [kat] SHA2-512-ACC
831,500 UART: [kat] ECC-384
3,114,858 UART: [kat] HMAC-384Kdf
3,125,869 UART: [kat] LMS
4,316,006 UART: [kat] --
4,319,173 UART: [cold-reset] ++
4,321,393 UART: [fht] Storing FHT @ 0x50003400
4,332,651 UART: [idev] ++
4,333,280 UART: [idev] CDI.KEYID = 6
4,334,338 UART: [idev] SUBJECT.KEYID = 7
4,335,433 UART: [idev] UDS.KEYID = 0
4,336,495 ready_for_fw is high
4,336,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,544 UART: [idev] Erasing UDS.KEYID = 0
7,627,253 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,418 UART: [idev] --
7,654,086 UART: [ldev] ++
7,654,705 UART: [ldev] CDI.KEYID = 6
7,655,595 UART: [ldev] SUBJECT.KEYID = 5
7,656,861 UART: [ldev] AUTHORITY.KEYID = 7
7,658,013 UART: [ldev] FE.KEYID = 1
7,670,785 UART: [ldev] Erasing FE.KEYID = 1
10,965,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,259,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,274,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,288,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,303,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,320,937 UART: [ldev] --
13,325,109 UART: [fwproc] Waiting for Commands...
13,327,032 UART: [fwproc] Received command 0x46574c44
13,329,208 UART: [fwproc] Received Image of size 118548 bytes
17,430,352 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,507,822 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,994 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,908,646 >>> mbox cmd response: success
17,909,203 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,911,986 UART: [afmc] ++
17,912,614 UART: [afmc] CDI.KEYID = 6
17,913,521 UART: [afmc] SUBJECT.KEYID = 7
17,914,781 UART: [afmc] AUTHORITY.KEYID = 5
21,231,875 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,165 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,461 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,540,829 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,581 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,000 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,166 UART: [afmc] --
23,595,167 UART: [cold-reset] --
23,599,896 UART: [state] Locking Datavault
23,604,273 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,019 UART: [state] Locking ICCM
23,608,705 UART: [exit] Launching FMC @ 0x40000130
23,617,090 UART:
23,617,333 UART: Running Caliptra FMC ...
23,618,424 UART:
23,618,594 UART: [state] CFI Enabled
23,626,585 UART: [fht] FMC Alias Private Key: 7
25,966,834 UART: [art] Extend RT PCRs Done
25,968,048 UART: [art] Lock RT PCRs Done
25,969,699 UART: [art] Populate DV Done
25,975,218 UART: [fht] FMC Alias Private Key: 7
25,976,729 UART: [art] Derive CDI
25,977,495 UART: [art] Store in slot 0x4
26,020,157 UART: [art] Derive Key Pair
26,021,163 UART: [art] Store priv key in slot 0x5
29,263,220 UART: [art] Derive Key Pair - Done
29,276,315 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,594 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,104 UART: [art] PUB.X = 2C6EF49AF54A9358CAF32B23FE1982EEC0173396BD9F2BB9B8BB58C2F617752CEBEF5287F99DFB1C019899CB0CE81BF7
31,565,371 UART: [art] PUB.Y = 9A84D758486B5B714CD27C69AD84926D9BF4B05C545C06E8D60CB0C25E4BEFE8FB317B3A65D0960CDAD0BE403CC980DC
31,572,801 UART: [art] SIG.R = D00C8599A003CC9803B963068F53319EA29811B2E8D429AD5947F5F7DD97F93BEAACC46F63D93D10394294A99077994A
31,580,070 UART: [art] SIG.S = EDA15B95CD419E29A1243E8B8D9C1429C7F9D2FD9482215DA0590078BE077E7CD06D23322CD2C9BC8D683972807A20CD
32,885,323 UART: Caliptra RT
32,886,030 UART: [state] CFI Enabled
33,018,372 UART: [rt] RT listening for mailbox commands...
33,049,909 UART: [rt]cmd =0x52435458, len=8
33,052,138 >>> mbox cmd response data (16 bytes)
33,052,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,083,069 UART: [rt]cmd =0x44504543, len=96
33,114,529 >>> mbox cmd response data (56 bytes)
33,115,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,145,561 UART: [rt]cmd =0x44504543, len=96
33,177,321 >>> mbox cmd response data (56 bytes)
33,178,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,208,531 UART: [rt]cmd =0x44504543, len=96
33,240,978 >>> mbox cmd response data (56 bytes)
33,241,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,272,135 UART: [rt]cmd =0x44504543, len=96
33,304,245 >>> mbox cmd response data (56 bytes)
33,304,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,335,616 UART: [rt]cmd =0x44504543, len=96
33,366,801 >>> mbox cmd response data (56 bytes)
33,367,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,397,744 UART: [rt]cmd =0x44504543, len=96
33,429,874 >>> mbox cmd response data (56 bytes)
33,430,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,461,130 UART: [rt]cmd =0x44504543, len=96
33,493,041 >>> mbox cmd response data (56 bytes)
33,493,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,524,114 UART: [rt]cmd =0x44504543, len=96
33,556,291 >>> mbox cmd response data (56 bytes)
33,556,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,587,282 UART: [rt]cmd =0x44504543, len=96
33,619,489 >>> mbox cmd response data (56 bytes)
33,620,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,650,965 UART: [rt]cmd =0x44504543, len=96
33,682,825 >>> mbox cmd response data (56 bytes)
33,683,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,714,334 UART: [rt]cmd =0x44504543, len=96
33,746,346 >>> mbox cmd response data (56 bytes)
33,747,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,777,717 UART: [rt]cmd =0x44504543, len=96
33,809,515 >>> mbox cmd response data (56 bytes)
33,810,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,840,661 UART: [rt]cmd =0x44504543, len=96
33,873,187 >>> mbox cmd response data (56 bytes)
33,873,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,904,133 UART: [rt]cmd =0x44504543, len=96
33,936,500 >>> mbox cmd response data (56 bytes)
33,937,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,967,963 UART: [rt]cmd =0x44504543, len=96
33,999,772 >>> mbox cmd response data (56 bytes)
34,000,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,030,900 UART: [rt]cmd =0x44504543, len=96
34,063,194 >>> mbox cmd response data (56 bytes)
34,063,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,094,330 UART: [rt]cmd =0x44504543, len=96
34,126,362 >>> mbox cmd response data (56 bytes)
34,127,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,157,468 UART: [rt]cmd =0x44504543, len=96
34,189,303 >>> mbox cmd response data (56 bytes)
34,189,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,220,406 UART: [rt]cmd =0x44504543, len=96
34,252,832 >>> mbox cmd response data (56 bytes)
34,253,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,284,031 UART: [rt]cmd =0x44504543, len=96
34,316,875 >>> mbox cmd response data (56 bytes)
34,317,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,348,004 UART: [rt]cmd =0x44504543, len=96
34,380,599 >>> mbox cmd response data (56 bytes)
34,381,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,411,862 UART: [rt]cmd =0x44504543, len=96
34,444,638 >>> mbox cmd response data (56 bytes)
34,445,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,475,819 UART: [rt]cmd =0x44504543, len=96
34,507,496 >>> mbox cmd response data (56 bytes)
34,508,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,538,669 UART: [rt]cmd =0x44504543, len=96
34,570,831 >>> mbox cmd response data (56 bytes)
34,571,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,602,028 UART: [rt]cmd =0x44504543, len=96
34,634,484 >>> mbox cmd response data (56 bytes)
34,635,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,665,768 UART: [rt]cmd =0x44504543, len=96
34,698,547 >>> mbox cmd response data (56 bytes)
34,699,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,729,944 UART: [rt]cmd =0x44504543, len=96
34,762,114 >>> mbox cmd response data (56 bytes)
34,762,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,793,493 UART: [rt]cmd =0x44504543, len=96
34,825,495 >>> mbox cmd response data (56 bytes)
34,826,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,856,922 UART: [rt]cmd =0x44504543, len=96
34,888,972 >>> mbox cmd response data (56 bytes)
34,889,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,920,166 UART: [rt]cmd =0x44504543, len=96
34,926,936 >>> mbox cmd response: failed
34,927,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,957,828 UART: [rt]cmd =0x44504543, len=96
34,989,604 >>> mbox cmd response data (56 bytes)
34,990,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,021,044 UART: [rt]cmd =0x44504543, len=96
35,028,046 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 55.74s
Truncated 208126 bytes from beginning
682 UART: [rt]cmd =0x44504543, len=96
33,412,308 >>> mbox cmd response data (56 bytes)
33,413,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,443,554 UART: [rt]cmd =0x44504543, len=96
33,475,813 >>> mbox cmd response data (56 bytes)
33,476,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,506,861 UART: [rt]cmd =0x44504543, len=96
33,538,659 >>> mbox cmd response data (56 bytes)
33,539,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,569,931 UART: [rt]cmd =0x44504543, len=96
33,601,686 >>> mbox cmd response data (56 bytes)
33,602,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,632,694 UART: [rt]cmd =0x44504543, len=96
33,663,998 >>> mbox cmd response data (56 bytes)
33,664,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,695,250 UART: [rt]cmd =0x44504543, len=96
33,727,810 >>> mbox cmd response data (56 bytes)
33,728,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,759,200 UART: [rt]cmd =0x44504543, len=96
33,791,036 >>> mbox cmd response data (56 bytes)
33,791,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,822,383 UART: [rt]cmd =0x44504543, len=96
33,854,007 >>> mbox cmd response data (56 bytes)
33,854,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,885,346 UART: [rt]cmd =0x44504543, len=96
33,916,320 >>> mbox cmd response data (56 bytes)
33,917,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,947,505 UART: [rt]cmd =0x44504543, len=96
33,979,605 >>> mbox cmd response data (56 bytes)
33,980,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,010,950 UART: [rt]cmd =0x44504543, len=96
34,042,752 >>> mbox cmd response data (56 bytes)
34,043,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,073,875 UART: [rt]cmd =0x44504543, len=96
34,105,393 >>> mbox cmd response data (56 bytes)
34,106,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,136,691 UART: [rt]cmd =0x44504543, len=96
34,168,902 >>> mbox cmd response data (56 bytes)
34,169,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,200,230 UART: [rt]cmd =0x44504543, len=96
34,232,324 >>> mbox cmd response data (56 bytes)
34,233,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,263,358 UART: [rt]cmd =0x44504543, len=96
34,296,629 >>> mbox cmd response data (56 bytes)
34,297,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,328,083 UART: [rt]cmd =0x44504543, len=96
34,360,046 >>> mbox cmd response data (56 bytes)
34,360,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,391,421 UART: [rt]cmd =0x44504543, len=96
34,423,419 >>> mbox cmd response data (56 bytes)
34,424,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,454,732 UART: [rt]cmd =0x44504543, len=96
34,486,311 >>> mbox cmd response data (56 bytes)
34,487,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,517,692 UART: [rt]cmd =0x44504543, len=96
34,550,871 >>> mbox cmd response data (56 bytes)
34,551,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,582,224 UART: [rt]cmd =0x44504543, len=96
34,614,031 >>> mbox cmd response data (56 bytes)
34,614,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,645,321 UART: [rt]cmd =0x44504543, len=96
34,677,067 >>> mbox cmd response data (56 bytes)
34,677,731 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,708,206 UART: [rt]cmd =0x44504543, len=96
34,740,250 >>> mbox cmd response data (56 bytes)
34,740,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,771,276 UART: [rt]cmd =0x44504543, len=96
34,804,141 >>> mbox cmd response data (56 bytes)
34,804,828 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,835,455 UART: [rt]cmd =0x44504543, len=96
34,868,428 >>> mbox cmd response data (56 bytes)
34,869,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,899,737 UART: [rt]cmd =0x44504543, len=96
34,932,351 >>> mbox cmd response data (56 bytes)
34,933,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,963,750 UART: [rt]cmd =0x44504543, len=96
34,995,874 >>> mbox cmd response data (56 bytes)
34,996,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,026,963 UART: [rt]cmd =0x44504543, len=96
35,033,893 >>> mbox cmd response: failed
35,034,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,064,894 UART: [rt]cmd =0x44504543, len=96
35,097,445 >>> mbox cmd response data (56 bytes)
35,098,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,128,900 UART: [rt]cmd =0x44504543, len=96
35,161,181 >>> mbox cmd response data (56 bytes)
35,161,858 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,192,462 UART: [rt]cmd =0x44504543, len=96
35,199,221 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
4,131,251 ready_for_fw is high
4,131,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,446 >>> mbox cmd response: success
18,163,119 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,802,003 UART:
23,802,417 UART: Running Caliptra FMC ...
23,803,554 UART:
23,803,711 UART: [state] CFI Enabled
23,811,728 UART: [fht] FMC Alias Private Key: 7
26,151,854 UART: [art] Extend RT PCRs Done
26,153,077 UART: [art] Lock RT PCRs Done
26,154,733 UART: [art] Populate DV Done
26,160,034 UART: [fht] FMC Alias Private Key: 7
26,161,737 UART: [art] Derive CDI
26,162,549 UART: [art] Store in slot 0x4
26,205,248 UART: [art] Derive Key Pair
26,206,246 UART: [art] Store priv key in slot 0x5
29,448,682 UART: [art] Derive Key Pair - Done
29,461,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,118 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,632 UART: [art] PUB.X = F57BD67E7BB6BAB968C0068BBB5A3E1247D5D49AE7DB5DC23346DFF0DC8E335A6D93DF97E189D96A2B9C2AEBF81784AC
31,750,988 UART: [art] PUB.Y = 31353D7EE2F69124E9AC829AB072AC70CAEDE81EA367A4D41642740EEA6CE92F40A8E7B6B50F166C55C3339B4BFBEF3E
31,758,211 UART: [art] SIG.R = C7F34F0B0922F3DD4FF0B1BC29DEBA5B60D98ABAFADC0739C37C4E01F876F74B7ED3629FB502B7AD6B92CE5795B8BF00
31,765,607 UART: [art] SIG.S = 0752D113F5BC4C9B9BA5F9579EFF8A989C112BC1DB0876ECDED18971C4629C8C9C51CF39AD15079BF128A597D752C56A
33,070,670 UART: Caliptra RT
33,071,379 UART: [state] CFI Enabled
33,204,502 UART: [rt] RT listening for mailbox commands...
33,236,081 UART: [rt]cmd =0x52435458, len=8
33,238,421 >>> mbox cmd response data (16 bytes)
33,238,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,269,557 UART: [rt]cmd =0x44504543, len=96
33,301,878 >>> mbox cmd response data (56 bytes)
33,302,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,333,340 UART: [rt]cmd =0x44504543, len=96
33,364,937 >>> mbox cmd response data (56 bytes)
33,365,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,396,079 UART: [rt]cmd =0x44504543, len=96
33,427,537 >>> mbox cmd response data (56 bytes)
33,428,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,458,787 UART: [rt]cmd =0x44504543, len=96
33,491,311 >>> mbox cmd response data (56 bytes)
33,491,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,522,736 UART: [rt]cmd =0x44504543, len=96
33,554,411 >>> mbox cmd response data (56 bytes)
33,555,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,585,587 UART: [rt]cmd =0x44504543, len=96
33,617,903 >>> mbox cmd response data (56 bytes)
33,618,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,649,438 UART: [rt]cmd =0x44504543, len=96
33,681,160 >>> mbox cmd response data (56 bytes)
33,681,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,712,601 UART: [rt]cmd =0x44504543, len=96
33,744,213 >>> mbox cmd response data (56 bytes)
33,744,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,775,540 UART: [rt]cmd =0x44504543, len=96
33,808,090 >>> mbox cmd response data (56 bytes)
33,808,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,839,209 UART: [rt]cmd =0x44504543, len=96
33,871,206 >>> mbox cmd response data (56 bytes)
33,871,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,902,523 UART: [rt]cmd =0x44504543, len=96
33,934,507 >>> mbox cmd response data (56 bytes)
33,935,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,965,644 UART: [rt]cmd =0x44504543, len=96
33,997,341 >>> mbox cmd response data (56 bytes)
33,998,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,028,572 UART: [rt]cmd =0x44504543, len=96
34,061,012 >>> mbox cmd response data (56 bytes)
34,061,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,092,312 UART: [rt]cmd =0x44504543, len=96
34,124,686 >>> mbox cmd response data (56 bytes)
34,125,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,155,851 UART: [rt]cmd =0x44504543, len=96
34,187,788 >>> mbox cmd response data (56 bytes)
34,188,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,219,098 UART: [rt]cmd =0x44504543, len=96
34,251,545 >>> mbox cmd response data (56 bytes)
34,252,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,282,614 UART: [rt]cmd =0x44504543, len=96
34,314,729 >>> mbox cmd response data (56 bytes)
34,315,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,346,311 UART: [rt]cmd =0x44504543, len=96
34,378,210 >>> mbox cmd response data (56 bytes)
34,378,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,409,580 UART: [rt]cmd =0x44504543, len=96
34,442,184 >>> mbox cmd response data (56 bytes)
34,442,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,473,672 UART: [rt]cmd =0x44504543, len=96
34,505,880 >>> mbox cmd response data (56 bytes)
34,506,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,537,300 UART: [rt]cmd =0x44504543, len=96
34,569,533 >>> mbox cmd response data (56 bytes)
34,570,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,600,767 UART: [rt]cmd =0x44504543, len=96
34,632,831 >>> mbox cmd response data (56 bytes)
34,633,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,664,221 UART: [rt]cmd =0x44504543, len=96
34,696,046 >>> mbox cmd response data (56 bytes)
34,696,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,727,052 UART: [rt]cmd =0x44504543, len=96
34,759,594 >>> mbox cmd response data (56 bytes)
34,760,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,790,556 UART: [rt]cmd =0x44504543, len=96
34,822,390 >>> mbox cmd response data (56 bytes)
34,823,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,853,274 UART: [rt]cmd =0x44504543, len=96
34,886,101 >>> mbox cmd response data (56 bytes)
34,886,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,917,552 UART: [rt]cmd =0x44504543, len=96
34,949,929 >>> mbox cmd response data (56 bytes)
34,950,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,981,060 UART: [rt]cmd =0x44504543, len=96
35,012,699 >>> mbox cmd response data (56 bytes)
35,013,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,043,864 UART: [rt]cmd =0x44504543, len=96
35,075,864 >>> mbox cmd response data (56 bytes)
35,076,552 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,107,432 UART: [rt]cmd =0x44504543, len=96
35,114,183 >>> mbox cmd response: failed
35,114,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,145,075 UART: [rt]cmd =0x44504543, len=96
35,176,870 >>> mbox cmd response data (56 bytes)
35,177,552 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,207,816 UART: [rt]cmd =0x44504543, len=96
35,214,516 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 56.03s
Truncated 307156 bytes from beginning
d response data (56 bytes)
27,446,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,476,660 UART: [rt]cmd =0x44504543, len=96
27,508,628 >>> mbox cmd response data (56 bytes)
27,509,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,539,919 UART: [rt]cmd =0x44504543, len=96
27,572,686 >>> mbox cmd response data (56 bytes)
27,573,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,604,031 UART: [rt]cmd =0x44504543, len=96
27,635,829 >>> mbox cmd response data (56 bytes)
27,636,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,667,306 UART: [rt]cmd =0x44504543, len=96
27,700,384 >>> mbox cmd response data (56 bytes)
27,701,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,731,647 UART: [rt]cmd =0x44504543, len=96
27,764,417 >>> mbox cmd response data (56 bytes)
27,765,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,795,579 UART: [rt]cmd =0x44504543, len=96
27,802,614 >>> mbox cmd response: failed
27,803,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,833,661 UART: [rt]cmd =0x44504543, len=96
27,866,048 >>> mbox cmd response data (56 bytes)
27,866,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,897,382 UART: [rt]cmd =0x44504543, len=96
27,930,789 >>> mbox cmd response data (56 bytes)
27,931,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,961,798 UART: [rt]cmd =0x44504543, len=96
27,968,559 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,105 UART:
192,466 UART: Running Caliptra ROM ...
193,542 UART:
193,681 UART: [state] CFI Enabled
265,259 UART: [state] LifecycleState = Unprovisioned
267,258 UART: [state] DebugLocked = No
268,633 UART: [state] WD Timer not started. Device not locked for debugging
271,954 UART: [kat] SHA2-256
451,613 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,352 UART: [kat] ++
462,794 UART: [kat] sha1
472,674 UART: [kat] SHA2-256
475,328 UART: [kat] SHA2-384
482,088 UART: [kat] SHA2-512-ACC
484,445 UART: [kat] ECC-384
2,946,429 UART: [kat] HMAC-384Kdf
2,970,572 UART: [kat] LMS
3,447,084 UART: [kat] --
3,452,006 UART: [cold-reset] ++
3,454,297 UART: [fht] FHT @ 0x50003400
3,464,350 UART: [idev] ++
3,464,914 UART: [idev] CDI.KEYID = 6
3,465,942 UART: [idev] SUBJECT.KEYID = 7
3,467,111 UART: [idev] UDS.KEYID = 0
3,468,062 ready_for_fw is high
3,468,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,303 UART: [idev] Erasing UDS.KEYID = 0
5,987,525 UART: [idev] Sha1 KeyId Algorithm
6,010,763 UART: [idev] --
6,015,603 UART: [ldev] ++
6,016,179 UART: [ldev] CDI.KEYID = 6
6,017,086 UART: [ldev] SUBJECT.KEYID = 5
6,018,303 UART: [ldev] AUTHORITY.KEYID = 7
6,019,593 UART: [ldev] FE.KEYID = 1
6,056,857 UART: [ldev] Erasing FE.KEYID = 1
8,562,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,265 UART: [ldev] --
10,372,881 UART: [fwproc] Wait for Commands...
10,376,112 UART: [fwproc] Recv command 0x46574c44
10,378,142 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,655 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,668 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,351,792 >>> mbox cmd response: success
14,352,345 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,356,638 UART: [afmc] ++
14,357,229 UART: [afmc] CDI.KEYID = 6
14,358,195 UART: [afmc] SUBJECT.KEYID = 7
14,359,408 UART: [afmc] AUTHORITY.KEYID = 5
16,893,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,455 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,259 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,296 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,844 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,236 UART: [afmc] --
18,715,398 UART: [cold-reset] --
18,719,583 UART: [state] Locking Datavault
18,724,120 UART: [state] Locking PCR0, PCR1 and PCR31
18,725,878 UART: [state] Locking ICCM
18,728,592 UART: [exit] Launching FMC @ 0x40000130
18,736,980 UART:
18,737,211 UART: Running Caliptra FMC ...
18,738,245 UART:
18,738,389 UART: [state] CFI Enabled
18,795,047 UART: [fht] FMC Alias Private Key: 7
20,561,742 UART: [art] Extend RT PCRs Done
20,562,973 UART: [art] Lock RT PCRs Done
20,564,753 UART: [art] Populate DV Done
20,570,166 UART: [fht] FMC Alias Private Key: 7
20,571,811 UART: [art] Derive CDI
20,572,548 UART: [art] Store in slot 0x4
20,628,091 UART: [art] Derive Key Pair
20,629,097 UART: [art] Store priv key in slot 0x5
23,092,064 UART: [art] Derive Key Pair - Done
23,104,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,216 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,715 UART: [art] PUB.X = FC53848675A8648E7DA24DACD2213667A52FE5290D3A6D0B87C467292EB0A1DD5283F88656636F9DE631BC9FCFBED1E6
24,827,022 UART: [art] PUB.Y = 89F9F7A4F4F31B7F777EE92E925F349DFB0334B8FC3C6BBBF9878D93C5459F8585DFE2AC3A965D73731BC62970F27021
24,834,259 UART: [art] SIG.R = ADC1620A465E5A08DC85B39EF63099288A8C15D1C52B17DD539F638B72716CA0ACE046F8145C1F2F24E1FEC138C8F469
24,841,653 UART: [art] SIG.S = A20A759639473867BE539E5D6E34972B079E7B00366A25208E1E7DD6B1C754E6A92A7B2C89DBF82AFBB9ACF51531A9B1
25,820,595 UART: Caliptra RT
25,821,301 UART: [state] CFI Enabled
26,001,500 UART: [rt] RT listening for mailbox commands...
26,033,157 UART: [rt]cmd =0x52435458, len=8
26,035,390 >>> mbox cmd response data (16 bytes)
26,036,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,066,664 UART: [rt]cmd =0x44504543, len=96
26,098,374 >>> mbox cmd response data (56 bytes)
26,099,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,129,732 UART: [rt]cmd =0x44504543, len=96
26,161,382 >>> mbox cmd response data (56 bytes)
26,162,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,192,806 UART: [rt]cmd =0x44504543, len=96
26,224,340 >>> mbox cmd response data (56 bytes)
26,225,018 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,255,507 UART: [rt]cmd =0x44504543, len=96
26,287,343 >>> mbox cmd response data (56 bytes)
26,288,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,318,441 UART: [rt]cmd =0x44504543, len=96
26,350,342 >>> mbox cmd response data (56 bytes)
26,351,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,381,446 UART: [rt]cmd =0x44504543, len=96
26,412,660 >>> mbox cmd response data (56 bytes)
26,413,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,443,904 UART: [rt]cmd =0x44504543, len=96
26,475,764 >>> mbox cmd response data (56 bytes)
26,476,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,507,028 UART: [rt]cmd =0x44504543, len=96
26,539,135 >>> mbox cmd response data (56 bytes)
26,539,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,570,521 UART: [rt]cmd =0x44504543, len=96
26,603,808 >>> mbox cmd response data (56 bytes)
26,604,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,635,232 UART: [rt]cmd =0x44504543, len=96
26,667,952 >>> mbox cmd response data (56 bytes)
26,668,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,699,273 UART: [rt]cmd =0x44504543, len=96
26,731,790 >>> mbox cmd response data (56 bytes)
26,732,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,763,341 UART: [rt]cmd =0x44504543, len=96
26,795,466 >>> mbox cmd response data (56 bytes)
26,796,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,826,582 UART: [rt]cmd =0x44504543, len=96
26,859,768 >>> mbox cmd response data (56 bytes)
26,860,467 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,890,953 UART: [rt]cmd =0x44504543, len=96
26,923,218 >>> mbox cmd response data (56 bytes)
26,923,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,954,379 UART: [rt]cmd =0x44504543, len=96
26,986,286 >>> mbox cmd response data (56 bytes)
26,986,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,017,440 UART: [rt]cmd =0x44504543, len=96
27,049,360 >>> mbox cmd response data (56 bytes)
27,050,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,080,790 UART: [rt]cmd =0x44504543, len=96
27,112,811 >>> mbox cmd response data (56 bytes)
27,113,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,143,966 UART: [rt]cmd =0x44504543, len=96
27,176,614 >>> mbox cmd response data (56 bytes)
27,177,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,207,782 UART: [rt]cmd =0x44504543, len=96
27,239,780 >>> mbox cmd response data (56 bytes)
27,240,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,271,078 UART: [rt]cmd =0x44504543, len=96
27,303,159 >>> mbox cmd response data (56 bytes)
27,303,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,334,126 UART: [rt]cmd =0x44504543, len=96
27,365,567 >>> mbox cmd response data (56 bytes)
27,366,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,396,703 UART: [rt]cmd =0x44504543, len=96
27,429,513 >>> mbox cmd response data (56 bytes)
27,430,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,460,824 UART: [rt]cmd =0x44504543, len=96
27,492,326 >>> mbox cmd response data (56 bytes)
27,493,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,523,507 UART: [rt]cmd =0x44504543, len=96
27,554,907 >>> mbox cmd response data (56 bytes)
27,555,594 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,586,123 UART: [rt]cmd =0x44504543, len=96
27,618,192 >>> mbox cmd response data (56 bytes)
27,618,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,649,334 UART: [rt]cmd =0x44504543, len=96
27,681,459 >>> mbox cmd response data (56 bytes)
27,682,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,712,615 UART: [rt]cmd =0x44504543, len=96
27,744,679 >>> mbox cmd response data (56 bytes)
27,745,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,775,829 UART: [rt]cmd =0x44504543, len=96
27,807,938 >>> mbox cmd response data (56 bytes)
27,808,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,839,230 UART: [rt]cmd =0x44504543, len=96
27,871,762 >>> mbox cmd response data (56 bytes)
27,872,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,902,925 UART: [rt]cmd =0x44504543, len=96
27,909,809 >>> mbox cmd response: failed
27,910,183 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,940,818 UART: [rt]cmd =0x44504543, len=96
27,973,346 >>> mbox cmd response data (56 bytes)
27,974,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,004,760 UART: [rt]cmd =0x44504543, len=96
28,011,744 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.23s
Truncated 208126 bytes from beginning
776 UART: [rt]cmd =0x44504543, len=96
26,012,184 >>> mbox cmd response data (56 bytes)
26,012,874 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,043,340 UART: [rt]cmd =0x44504543, len=96
26,075,617 >>> mbox cmd response data (56 bytes)
26,076,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,106,625 UART: [rt]cmd =0x44504543, len=96
26,138,908 >>> mbox cmd response data (56 bytes)
26,139,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,170,266 UART: [rt]cmd =0x44504543, len=96
26,202,186 >>> mbox cmd response data (56 bytes)
26,202,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,233,590 UART: [rt]cmd =0x44504543, len=96
26,265,760 >>> mbox cmd response data (56 bytes)
26,266,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,296,863 UART: [rt]cmd =0x44504543, len=96
26,328,863 >>> mbox cmd response data (56 bytes)
26,329,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,360,130 UART: [rt]cmd =0x44504543, len=96
26,391,997 >>> mbox cmd response data (56 bytes)
26,392,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,423,133 UART: [rt]cmd =0x44504543, len=96
26,455,332 >>> mbox cmd response data (56 bytes)
26,456,071 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,486,718 UART: [rt]cmd =0x44504543, len=96
26,519,003 >>> mbox cmd response data (56 bytes)
26,519,686 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,550,274 UART: [rt]cmd =0x44504543, len=96
26,582,647 >>> mbox cmd response data (56 bytes)
26,583,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,613,695 UART: [rt]cmd =0x44504543, len=96
26,645,801 >>> mbox cmd response data (56 bytes)
26,646,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,676,958 UART: [rt]cmd =0x44504543, len=96
26,709,199 >>> mbox cmd response data (56 bytes)
26,709,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,740,391 UART: [rt]cmd =0x44504543, len=96
26,772,897 >>> mbox cmd response data (56 bytes)
26,773,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,804,107 UART: [rt]cmd =0x44504543, len=96
26,836,823 >>> mbox cmd response data (56 bytes)
26,837,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,868,079 UART: [rt]cmd =0x44504543, len=96
26,899,642 >>> mbox cmd response data (56 bytes)
26,900,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,930,861 UART: [rt]cmd =0x44504543, len=96
26,962,951 >>> mbox cmd response data (56 bytes)
26,963,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,994,108 UART: [rt]cmd =0x44504543, len=96
27,026,555 >>> mbox cmd response data (56 bytes)
27,027,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,057,600 UART: [rt]cmd =0x44504543, len=96
27,089,403 >>> mbox cmd response data (56 bytes)
27,090,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,120,486 UART: [rt]cmd =0x44504543, len=96
27,153,221 >>> mbox cmd response data (56 bytes)
27,153,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,184,487 UART: [rt]cmd =0x44504543, len=96
27,217,230 >>> mbox cmd response data (56 bytes)
27,217,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,248,234 UART: [rt]cmd =0x44504543, len=96
27,280,170 >>> mbox cmd response data (56 bytes)
27,280,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,311,531 UART: [rt]cmd =0x44504543, len=96
27,343,815 >>> mbox cmd response data (56 bytes)
27,344,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,375,049 UART: [rt]cmd =0x44504543, len=96
27,407,451 >>> mbox cmd response data (56 bytes)
27,408,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,438,791 UART: [rt]cmd =0x44504543, len=96
27,471,076 >>> mbox cmd response data (56 bytes)
27,471,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,502,352 UART: [rt]cmd =0x44504543, len=96
27,534,774 >>> mbox cmd response data (56 bytes)
27,535,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,565,832 UART: [rt]cmd =0x44504543, len=96
27,597,018 >>> mbox cmd response data (56 bytes)
27,597,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,628,491 UART: [rt]cmd =0x44504543, len=96
27,635,427 >>> mbox cmd response: failed
27,635,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,666,319 UART: [rt]cmd =0x44504543, len=96
27,697,770 >>> mbox cmd response data (56 bytes)
27,698,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,728,947 UART: [rt]cmd =0x44504543, len=96
27,761,104 >>> mbox cmd response data (56 bytes)
27,761,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,792,165 UART: [rt]cmd =0x44504543, len=96
27,799,207 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,817 writing to cptra_bootfsm_go
3,461,195 ready_for_fw is high
3,461,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,196,971 >>> mbox cmd response: success
14,200,016 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,510,582 UART:
18,510,959 UART: Running Caliptra FMC ...
18,512,095 UART:
18,512,254 UART: [state] CFI Enabled
18,580,698 UART: [fht] FMC Alias Private Key: 7
20,346,702 UART: [art] Extend RT PCRs Done
20,347,925 UART: [art] Lock RT PCRs Done
20,349,605 UART: [art] Populate DV Done
20,354,629 UART: [fht] FMC Alias Private Key: 7
20,356,275 UART: [art] Derive CDI
20,357,089 UART: [art] Store in slot 0x4
20,413,707 UART: [art] Derive Key Pair
20,414,747 UART: [art] Store priv key in slot 0x5
22,877,486 UART: [art] Derive Key Pair - Done
22,890,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,975 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,460 UART: [art] PUB.X = D89E40F56EF9DD19B4B6D305F5D4039CA5C23A875FF4CF7CE26522866FA7777AB1C5CE4FABC21FA9B042D587D38C039F
24,612,762 UART: [art] PUB.Y = B9B18FCC94A6E1FC7AE3B099083F3FE9BE959081BB03AFA367871BE375F3FF8042ECB8838FED17F4F2ECD566ADF230DD
24,620,031 UART: [art] SIG.R = 872D5B6BC73E773F7CA81C2FD1838CFF1B40B67893C409C27EB47F54678EEED30FEDF4A2946C23A5CBC343F240314B67
24,627,485 UART: [art] SIG.S = F14929098E9FED4ECCDF89B0CE7ED2BD80220883A06A432BD87F2D513A2D145AA701B6913AAFD4933809FD6D2D828E8D
25,606,065 UART: Caliptra RT
25,606,782 UART: [state] CFI Enabled
25,787,427 UART: [rt] RT listening for mailbox commands...
25,818,796 UART: [rt]cmd =0x52435458, len=8
25,821,125 >>> mbox cmd response data (16 bytes)
25,821,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,852,473 UART: [rt]cmd =0x44504543, len=96
25,884,164 >>> mbox cmd response data (56 bytes)
25,884,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,915,489 UART: [rt]cmd =0x44504543, len=96
25,947,248 >>> mbox cmd response data (56 bytes)
25,947,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,978,656 UART: [rt]cmd =0x44504543, len=96
26,011,058 >>> mbox cmd response data (56 bytes)
26,011,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,042,425 UART: [rt]cmd =0x44504543, len=96
26,074,256 >>> mbox cmd response data (56 bytes)
26,074,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,105,311 UART: [rt]cmd =0x44504543, len=96
26,136,974 >>> mbox cmd response data (56 bytes)
26,137,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,168,293 UART: [rt]cmd =0x44504543, len=96
26,200,332 >>> mbox cmd response data (56 bytes)
26,201,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,231,682 UART: [rt]cmd =0x44504543, len=96
26,263,220 >>> mbox cmd response data (56 bytes)
26,263,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,294,362 UART: [rt]cmd =0x44504543, len=96
26,326,324 >>> mbox cmd response data (56 bytes)
26,327,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,357,627 UART: [rt]cmd =0x44504543, len=96
26,389,206 >>> mbox cmd response data (56 bytes)
26,389,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,420,312 UART: [rt]cmd =0x44504543, len=96
26,452,201 >>> mbox cmd response data (56 bytes)
26,452,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,483,372 UART: [rt]cmd =0x44504543, len=96
26,515,743 >>> mbox cmd response data (56 bytes)
26,516,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,547,025 UART: [rt]cmd =0x44504543, len=96
26,578,668 >>> mbox cmd response data (56 bytes)
26,579,384 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,609,857 UART: [rt]cmd =0x44504543, len=96
26,641,708 >>> mbox cmd response data (56 bytes)
26,642,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,673,139 UART: [rt]cmd =0x44504543, len=96
26,705,783 >>> mbox cmd response data (56 bytes)
26,706,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,736,619 UART: [rt]cmd =0x44504543, len=96
26,768,724 >>> mbox cmd response data (56 bytes)
26,769,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,799,769 UART: [rt]cmd =0x44504543, len=96
26,832,016 >>> mbox cmd response data (56 bytes)
26,832,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,863,318 UART: [rt]cmd =0x44504543, len=96
26,895,268 >>> mbox cmd response data (56 bytes)
26,896,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,926,674 UART: [rt]cmd =0x44504543, len=96
26,958,697 >>> mbox cmd response data (56 bytes)
26,959,369 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,989,761 UART: [rt]cmd =0x44504543, len=96
27,022,155 >>> mbox cmd response data (56 bytes)
27,022,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,053,761 UART: [rt]cmd =0x44504543, len=96
27,085,819 >>> mbox cmd response data (56 bytes)
27,086,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,117,209 UART: [rt]cmd =0x44504543, len=96
27,149,128 >>> mbox cmd response data (56 bytes)
27,149,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,180,422 UART: [rt]cmd =0x44504543, len=96
27,212,334 >>> mbox cmd response data (56 bytes)
27,213,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,243,548 UART: [rt]cmd =0x44504543, len=96
27,275,937 >>> mbox cmd response data (56 bytes)
27,276,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,307,097 UART: [rt]cmd =0x44504543, len=96
27,339,579 >>> mbox cmd response data (56 bytes)
27,340,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,370,580 UART: [rt]cmd =0x44504543, len=96
27,402,465 >>> mbox cmd response data (56 bytes)
27,403,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,433,671 UART: [rt]cmd =0x44504543, len=96
27,465,639 >>> mbox cmd response data (56 bytes)
27,466,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,497,045 UART: [rt]cmd =0x44504543, len=96
27,529,230 >>> mbox cmd response data (56 bytes)
27,529,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,560,455 UART: [rt]cmd =0x44504543, len=96
27,592,526 >>> mbox cmd response data (56 bytes)
27,593,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,623,726 UART: [rt]cmd =0x44504543, len=96
27,655,728 >>> mbox cmd response data (56 bytes)
27,656,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,686,967 UART: [rt]cmd =0x44504543, len=96
27,694,049 >>> mbox cmd response: failed
27,694,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,725,267 UART: [rt]cmd =0x44504543, len=96
27,757,597 >>> mbox cmd response data (56 bytes)
27,758,286 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,788,716 UART: [rt]cmd =0x44504543, len=96
27,795,260 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 44.96s
Truncated 307156 bytes from beginning
d response data (56 bytes)
27,487,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,518,082 UART: [rt]cmd =0x44504543, len=96
27,550,189 >>> mbox cmd response data (56 bytes)
27,550,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,581,662 UART: [rt]cmd =0x44504543, len=96
27,613,592 >>> mbox cmd response data (56 bytes)
27,614,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,644,954 UART: [rt]cmd =0x44504543, len=96
27,676,706 >>> mbox cmd response data (56 bytes)
27,677,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,707,849 UART: [rt]cmd =0x44504543, len=96
27,740,078 >>> mbox cmd response data (56 bytes)
27,740,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,771,346 UART: [rt]cmd =0x44504543, len=96
27,803,554 >>> mbox cmd response data (56 bytes)
27,804,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,834,887 UART: [rt]cmd =0x44504543, len=96
27,842,019 >>> mbox cmd response: failed
27,842,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,872,825 UART: [rt]cmd =0x44504543, len=96
27,905,473 >>> mbox cmd response data (56 bytes)
27,906,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,936,674 UART: [rt]cmd =0x44504543, len=96
27,968,746 >>> mbox cmd response data (56 bytes)
27,969,445 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,000,106 UART: [rt]cmd =0x44504543, len=96
28,007,139 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,425 UART:
192,764 UART: Running Caliptra ROM ...
193,946 UART:
603,679 UART: [state] CFI Enabled
618,191 UART: [state] LifecycleState = Unprovisioned
620,073 UART: [state] DebugLocked = No
622,103 UART: [state] WD Timer not started. Device not locked for debugging
626,355 UART: [kat] SHA2-256
806,011 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,766 UART: [kat] ++
817,250 UART: [kat] sha1
828,413 UART: [kat] SHA2-256
831,082 UART: [kat] SHA2-384
837,932 UART: [kat] SHA2-512-ACC
840,313 UART: [kat] ECC-384
3,281,112 UART: [kat] HMAC-384Kdf
3,293,060 UART: [kat] LMS
3,769,573 UART: [kat] --
3,772,998 UART: [cold-reset] ++
3,774,215 UART: [fht] FHT @ 0x50003400
3,786,544 UART: [idev] ++
3,787,111 UART: [idev] CDI.KEYID = 6
3,788,020 UART: [idev] SUBJECT.KEYID = 7
3,789,267 UART: [idev] UDS.KEYID = 0
3,790,316 ready_for_fw is high
3,790,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,379 UART: [idev] Erasing UDS.KEYID = 0
6,268,909 UART: [idev] Sha1 KeyId Algorithm
6,292,698 UART: [idev] --
6,297,182 UART: [ldev] ++
6,297,751 UART: [ldev] CDI.KEYID = 6
6,298,665 UART: [ldev] SUBJECT.KEYID = 5
6,299,885 UART: [ldev] AUTHORITY.KEYID = 7
6,301,120 UART: [ldev] FE.KEYID = 1
6,312,356 UART: [ldev] Erasing FE.KEYID = 1
8,790,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,692 UART: [ldev] --
10,585,720 UART: [fwproc] Wait for Commands...
10,588,956 UART: [fwproc] Recv command 0x46574c44
10,590,942 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,147 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,155 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,160 >>> mbox cmd response: success
14,552,757 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,556,479 UART: [afmc] ++
14,557,068 UART: [afmc] CDI.KEYID = 6
14,558,011 UART: [afmc] SUBJECT.KEYID = 7
14,559,287 UART: [afmc] AUTHORITY.KEYID = 5
17,060,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,155 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,982 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,020 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,610 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,018 UART: [afmc] --
18,859,482 UART: [cold-reset] --
18,863,673 UART: [state] Locking Datavault
18,869,511 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,274 UART: [state] Locking ICCM
18,873,752 UART: [exit] Launching FMC @ 0x40000130
18,882,153 UART:
18,882,429 UART: Running Caliptra FMC ...
18,883,541 UART:
18,883,706 UART: [state] CFI Enabled
18,891,487 UART: [fht] FMC Alias Private Key: 7
20,657,985 UART: [art] Extend RT PCRs Done
20,659,203 UART: [art] Lock RT PCRs Done
20,661,050 UART: [art] Populate DV Done
20,666,521 UART: [fht] FMC Alias Private Key: 7
20,668,061 UART: [art] Derive CDI
20,668,880 UART: [art] Store in slot 0x4
20,711,605 UART: [art] Derive Key Pair
20,712,614 UART: [art] Store priv key in slot 0x5
23,140,302 UART: [art] Derive Key Pair - Done
23,153,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,984 UART: [art] Erasing AUTHORITY.KEYID = 7
24,861,483 UART: [art] PUB.X = C658F9AF098D5CFEA359E7C3800D2DA4180C2B7EF72E2262DFA34CCA1A33D9E0CCE9D8A9283B65C8C479B6606629F257
24,868,781 UART: [art] PUB.Y = 0CF16FC85ED01CE8D5534E8520936BAB24A990637E0A0D07E0689EE8AB13FE3A2BB940EFCCDB5AF2663B6EEF3EC9B2FE
24,876,057 UART: [art] SIG.R = A9038A02478E27E05D59002FC0D544753FE37CD7693EB33D21841868FEF391FCC7A640197A2E62BD68539CF375346AFB
24,883,440 UART: [art] SIG.S = D64A33FA631439E143BC1553DB1B2D0AAFEF5EA787B303EB5029421F9699B6D0D4D51280B2E0A7159C01EEC68D27267E
25,862,249 UART: Caliptra RT
25,862,953 UART: [state] CFI Enabled
25,995,719 UART: [rt] RT listening for mailbox commands...
26,027,111 UART: [rt]cmd =0x52435458, len=8
26,029,317 >>> mbox cmd response data (16 bytes)
26,029,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,060,388 UART: [rt]cmd =0x44504543, len=96
26,091,886 >>> mbox cmd response data (56 bytes)
26,092,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,123,393 UART: [rt]cmd =0x44504543, len=96
26,155,143 >>> mbox cmd response data (56 bytes)
26,155,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,186,324 UART: [rt]cmd =0x44504543, len=96
26,217,456 >>> mbox cmd response data (56 bytes)
26,218,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,248,640 UART: [rt]cmd =0x44504543, len=96
26,281,064 >>> mbox cmd response data (56 bytes)
26,281,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,312,396 UART: [rt]cmd =0x44504543, len=96
26,345,386 >>> mbox cmd response data (56 bytes)
26,346,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,376,861 UART: [rt]cmd =0x44504543, len=96
26,408,717 >>> mbox cmd response data (56 bytes)
26,409,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,439,775 UART: [rt]cmd =0x44504543, len=96
26,472,008 >>> mbox cmd response data (56 bytes)
26,472,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,503,190 UART: [rt]cmd =0x44504543, len=96
26,535,781 >>> mbox cmd response data (56 bytes)
26,536,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,567,068 UART: [rt]cmd =0x44504543, len=96
26,598,474 >>> mbox cmd response data (56 bytes)
26,599,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,629,749 UART: [rt]cmd =0x44504543, len=96
26,661,671 >>> mbox cmd response data (56 bytes)
26,662,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,693,028 UART: [rt]cmd =0x44504543, len=96
26,724,684 >>> mbox cmd response data (56 bytes)
26,725,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,755,948 UART: [rt]cmd =0x44504543, len=96
26,787,749 >>> mbox cmd response data (56 bytes)
26,788,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,819,028 UART: [rt]cmd =0x44504543, len=96
26,851,402 >>> mbox cmd response data (56 bytes)
26,852,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,882,705 UART: [rt]cmd =0x44504543, len=96
26,915,580 >>> mbox cmd response data (56 bytes)
26,916,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,946,654 UART: [rt]cmd =0x44504543, len=96
26,979,240 >>> mbox cmd response data (56 bytes)
26,979,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,010,493 UART: [rt]cmd =0x44504543, len=96
27,043,120 >>> mbox cmd response data (56 bytes)
27,043,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,074,373 UART: [rt]cmd =0x44504543, len=96
27,106,468 >>> mbox cmd response data (56 bytes)
27,107,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,137,523 UART: [rt]cmd =0x44504543, len=96
27,168,876 >>> mbox cmd response data (56 bytes)
27,169,569 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,200,107 UART: [rt]cmd =0x44504543, len=96
27,231,883 >>> mbox cmd response data (56 bytes)
27,232,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,263,255 UART: [rt]cmd =0x44504543, len=96
27,295,270 >>> mbox cmd response data (56 bytes)
27,295,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,326,627 UART: [rt]cmd =0x44504543, len=96
27,358,705 >>> mbox cmd response data (56 bytes)
27,359,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,390,057 UART: [rt]cmd =0x44504543, len=96
27,421,596 >>> mbox cmd response data (56 bytes)
27,422,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,452,789 UART: [rt]cmd =0x44504543, len=96
27,484,845 >>> mbox cmd response data (56 bytes)
27,485,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,516,120 UART: [rt]cmd =0x44504543, len=96
27,548,498 >>> mbox cmd response data (56 bytes)
27,549,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,579,580 UART: [rt]cmd =0x44504543, len=96
27,611,520 >>> mbox cmd response data (56 bytes)
27,612,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,642,708 UART: [rt]cmd =0x44504543, len=96
27,675,103 >>> mbox cmd response data (56 bytes)
27,675,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,706,538 UART: [rt]cmd =0x44504543, len=96
27,739,234 >>> mbox cmd response data (56 bytes)
27,739,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,770,581 UART: [rt]cmd =0x44504543, len=96
27,802,689 >>> mbox cmd response data (56 bytes)
27,803,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,833,903 UART: [rt]cmd =0x44504543, len=96
27,866,571 >>> mbox cmd response data (56 bytes)
27,867,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,897,979 UART: [rt]cmd =0x44504543, len=96
27,904,868 >>> mbox cmd response: failed
27,905,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,935,875 UART: [rt]cmd =0x44504543, len=96
27,967,497 >>> mbox cmd response data (56 bytes)
27,968,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,998,780 UART: [rt]cmd =0x44504543, len=96
28,005,592 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.25s
Truncated 208126 bytes from beginning
113 UART: [rt]cmd =0x44504543, len=96
26,022,135 >>> mbox cmd response data (56 bytes)
26,022,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,053,615 UART: [rt]cmd =0x44504543, len=96
26,085,351 >>> mbox cmd response data (56 bytes)
26,086,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,116,425 UART: [rt]cmd =0x44504543, len=96
26,148,223 >>> mbox cmd response data (56 bytes)
26,148,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,179,715 UART: [rt]cmd =0x44504543, len=96
26,211,983 >>> mbox cmd response data (56 bytes)
26,212,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,243,532 UART: [rt]cmd =0x44504543, len=96
26,275,101 >>> mbox cmd response data (56 bytes)
26,275,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,306,425 UART: [rt]cmd =0x44504543, len=96
26,338,181 >>> mbox cmd response data (56 bytes)
26,338,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,369,489 UART: [rt]cmd =0x44504543, len=96
26,402,389 >>> mbox cmd response data (56 bytes)
26,403,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,433,924 UART: [rt]cmd =0x44504543, len=96
26,465,617 >>> mbox cmd response data (56 bytes)
26,466,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,496,785 UART: [rt]cmd =0x44504543, len=96
26,528,295 >>> mbox cmd response data (56 bytes)
26,528,989 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,559,567 UART: [rt]cmd =0x44504543, len=96
26,591,273 >>> mbox cmd response data (56 bytes)
26,591,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,622,463 UART: [rt]cmd =0x44504543, len=96
26,654,670 >>> mbox cmd response data (56 bytes)
26,655,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,686,035 UART: [rt]cmd =0x44504543, len=96
26,717,726 >>> mbox cmd response data (56 bytes)
26,718,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,748,855 UART: [rt]cmd =0x44504543, len=96
26,780,602 >>> mbox cmd response data (56 bytes)
26,781,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,811,752 UART: [rt]cmd =0x44504543, len=96
26,843,749 >>> mbox cmd response data (56 bytes)
26,844,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,874,957 UART: [rt]cmd =0x44504543, len=96
26,907,269 >>> mbox cmd response data (56 bytes)
26,907,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,938,412 UART: [rt]cmd =0x44504543, len=96
26,971,359 >>> mbox cmd response data (56 bytes)
26,972,087 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,002,673 UART: [rt]cmd =0x44504543, len=96
27,034,959 >>> mbox cmd response data (56 bytes)
27,035,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,066,197 UART: [rt]cmd =0x44504543, len=96
27,098,036 >>> mbox cmd response data (56 bytes)
27,098,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,129,228 UART: [rt]cmd =0x44504543, len=96
27,161,602 >>> mbox cmd response data (56 bytes)
27,162,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,192,603 UART: [rt]cmd =0x44504543, len=96
27,224,138 >>> mbox cmd response data (56 bytes)
27,224,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,255,549 UART: [rt]cmd =0x44504543, len=96
27,287,440 >>> mbox cmd response data (56 bytes)
27,288,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,318,739 UART: [rt]cmd =0x44504543, len=96
27,351,186 >>> mbox cmd response data (56 bytes)
27,351,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,382,460 UART: [rt]cmd =0x44504543, len=96
27,414,454 >>> mbox cmd response data (56 bytes)
27,415,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,445,538 UART: [rt]cmd =0x44504543, len=96
27,477,862 >>> mbox cmd response data (56 bytes)
27,478,548 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,509,128 UART: [rt]cmd =0x44504543, len=96
27,541,041 >>> mbox cmd response data (56 bytes)
27,541,758 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,572,392 UART: [rt]cmd =0x44504543, len=96
27,604,365 >>> mbox cmd response data (56 bytes)
27,605,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,635,452 UART: [rt]cmd =0x44504543, len=96
27,642,283 >>> mbox cmd response: failed
27,642,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,673,174 UART: [rt]cmd =0x44504543, len=96
27,705,625 >>> mbox cmd response data (56 bytes)
27,706,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,736,935 UART: [rt]cmd =0x44504543, len=96
27,768,986 >>> mbox cmd response data (56 bytes)
27,769,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,800,320 UART: [rt]cmd =0x44504543, len=96
27,807,484 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,782,622 ready_for_fw is high
3,783,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,473 >>> mbox cmd response: success
14,439,562 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,690,103 UART:
18,690,501 UART: Running Caliptra FMC ...
18,691,611 UART:
18,691,767 UART: [state] CFI Enabled
18,699,765 UART: [fht] FMC Alias Private Key: 7
20,466,024 UART: [art] Extend RT PCRs Done
20,467,254 UART: [art] Lock RT PCRs Done
20,468,639 UART: [art] Populate DV Done
20,474,153 UART: [fht] FMC Alias Private Key: 7
20,475,814 UART: [art] Derive CDI
20,476,555 UART: [art] Store in slot 0x4
20,519,636 UART: [art] Derive Key Pair
20,520,677 UART: [art] Store priv key in slot 0x5
22,947,570 UART: [art] Derive Key Pair - Done
22,960,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,666,898 UART: [art] Erasing AUTHORITY.KEYID = 7
24,668,390 UART: [art] PUB.X = ACC0200B471F018271709DC684AB9FFF9D590AF6D9D0342534A71DF3A97766F4E93B4413F7BF57876AB50C368817D6FB
24,675,661 UART: [art] PUB.Y = 631F1FF0410B7280CD44A49507F2C11A0031626431783C41D65BBA02A3757AA4922B359B416940007655572273F9CA95
24,682,831 UART: [art] SIG.R = F84A0CDE271C8B88F44AB2169B4D813A1000FAE72A597791725A3A0127A3AE30C6E89A8A64D01DA1A1B4834F20CDF701
24,690,229 UART: [art] SIG.S = 0D7BAB8E31D4149E7C158FE13A242C5B4CE841C51B97463B1FE956805FC6C5D109F42A84CB1CAAD64AF1106471E44999
25,668,754 UART: Caliptra RT
25,669,466 UART: [state] CFI Enabled
25,802,737 UART: [rt] RT listening for mailbox commands...
25,834,149 UART: [rt]cmd =0x52435458, len=8
25,836,426 >>> mbox cmd response data (16 bytes)
25,836,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,867,322 UART: [rt]cmd =0x44504543, len=96
25,899,450 >>> mbox cmd response data (56 bytes)
25,900,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,930,778 UART: [rt]cmd =0x44504543, len=96
25,962,750 >>> mbox cmd response data (56 bytes)
25,963,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,994,012 UART: [rt]cmd =0x44504543, len=96
26,025,655 >>> mbox cmd response data (56 bytes)
26,026,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,056,782 UART: [rt]cmd =0x44504543, len=96
26,088,268 >>> mbox cmd response data (56 bytes)
26,088,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,119,458 UART: [rt]cmd =0x44504543, len=96
26,150,910 >>> mbox cmd response data (56 bytes)
26,151,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,182,214 UART: [rt]cmd =0x44504543, len=96
26,214,622 >>> mbox cmd response data (56 bytes)
26,215,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,245,877 UART: [rt]cmd =0x44504543, len=96
26,277,795 >>> mbox cmd response data (56 bytes)
26,278,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,308,991 UART: [rt]cmd =0x44504543, len=96
26,340,360 >>> mbox cmd response data (56 bytes)
26,341,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,371,741 UART: [rt]cmd =0x44504543, len=96
26,403,299 >>> mbox cmd response data (56 bytes)
26,403,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,434,512 UART: [rt]cmd =0x44504543, len=96
26,466,771 >>> mbox cmd response data (56 bytes)
26,467,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,498,030 UART: [rt]cmd =0x44504543, len=96
26,529,480 >>> mbox cmd response data (56 bytes)
26,530,192 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,560,611 UART: [rt]cmd =0x44504543, len=96
26,592,624 >>> mbox cmd response data (56 bytes)
26,593,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,623,946 UART: [rt]cmd =0x44504543, len=96
26,655,936 >>> mbox cmd response data (56 bytes)
26,656,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,687,206 UART: [rt]cmd =0x44504543, len=96
26,719,688 >>> mbox cmd response data (56 bytes)
26,720,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,751,051 UART: [rt]cmd =0x44504543, len=96
26,782,815 >>> mbox cmd response data (56 bytes)
26,783,559 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,814,086 UART: [rt]cmd =0x44504543, len=96
26,846,227 >>> mbox cmd response data (56 bytes)
26,846,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,877,550 UART: [rt]cmd =0x44504543, len=96
26,909,677 >>> mbox cmd response data (56 bytes)
26,910,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,940,837 UART: [rt]cmd =0x44504543, len=96
26,972,045 >>> mbox cmd response data (56 bytes)
26,972,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,003,416 UART: [rt]cmd =0x44504543, len=96
27,036,778 >>> mbox cmd response data (56 bytes)
27,037,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,068,054 UART: [rt]cmd =0x44504543, len=96
27,100,023 >>> mbox cmd response data (56 bytes)
27,100,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,131,378 UART: [rt]cmd =0x44504543, len=96
27,163,256 >>> mbox cmd response data (56 bytes)
27,163,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,194,415 UART: [rt]cmd =0x44504543, len=96
27,226,214 >>> mbox cmd response data (56 bytes)
27,226,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,257,203 UART: [rt]cmd =0x44504543, len=96
27,289,629 >>> mbox cmd response data (56 bytes)
27,290,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,320,909 UART: [rt]cmd =0x44504543, len=96
27,352,963 >>> mbox cmd response data (56 bytes)
27,353,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,384,176 UART: [rt]cmd =0x44504543, len=96
27,416,527 >>> mbox cmd response data (56 bytes)
27,417,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,447,831 UART: [rt]cmd =0x44504543, len=96
27,480,175 >>> mbox cmd response data (56 bytes)
27,480,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,511,580 UART: [rt]cmd =0x44504543, len=96
27,544,319 >>> mbox cmd response data (56 bytes)
27,544,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,575,529 UART: [rt]cmd =0x44504543, len=96
27,608,174 >>> mbox cmd response data (56 bytes)
27,608,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,639,404 UART: [rt]cmd =0x44504543, len=96
27,672,262 >>> mbox cmd response data (56 bytes)
27,672,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,703,371 UART: [rt]cmd =0x44504543, len=96
27,710,037 >>> mbox cmd response: failed
27,710,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,740,992 UART: [rt]cmd =0x44504543, len=96
27,772,822 >>> mbox cmd response data (56 bytes)
27,773,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,804,216 UART: [rt]cmd =0x44504543, len=96
27,811,244 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 44.97s
Truncated 307156 bytes from beginning
d response data (56 bytes)
27,801,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,832,117 UART: [rt]cmd =0x44504543, len=96
27,864,201 >>> mbox cmd response data (56 bytes)
27,864,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,895,345 UART: [rt]cmd =0x44504543, len=96
27,928,070 >>> mbox cmd response data (56 bytes)
27,928,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,959,265 UART: [rt]cmd =0x44504543, len=96
27,992,086 >>> mbox cmd response data (56 bytes)
27,992,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,023,342 UART: [rt]cmd =0x44504543, len=96
28,056,206 >>> mbox cmd response data (56 bytes)
28,056,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,087,385 UART: [rt]cmd =0x44504543, len=96
28,120,515 >>> mbox cmd response data (56 bytes)
28,121,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,151,738 UART: [rt]cmd =0x44504543, len=96
28,158,634 >>> mbox cmd response: failed
28,159,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,189,568 UART: [rt]cmd =0x44504543, len=96
28,222,061 >>> mbox cmd response data (56 bytes)
28,222,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,253,223 UART: [rt]cmd =0x44504543, len=96
28,285,702 >>> mbox cmd response data (56 bytes)
28,286,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,316,865 UART: [rt]cmd =0x44504543, len=96
28,323,941 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,110 UART:
192,456 UART: Running Caliptra ROM ...
193,537 UART:
193,678 UART: [state] CFI Enabled
264,112 UART: [state] LifecycleState = Unprovisioned
266,554 UART: [state] DebugLocked = No
267,933 UART: [state] WD Timer not started. Device not locked for debugging
273,098 UART: [kat] SHA2-256
462,978 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,732 UART: [kat] ++
474,183 UART: [kat] sha1
484,932 UART: [kat] SHA2-256
487,945 UART: [kat] SHA2-384
493,575 UART: [kat] SHA2-512-ACC
496,154 UART: [kat] ECC-384
2,947,462 UART: [kat] HMAC-384Kdf
2,972,713 UART: [kat] LMS
3,504,448 UART: [kat] --
3,510,288 UART: [cold-reset] ++
3,511,150 UART: [fht] FHT @ 0x50003400
3,522,413 UART: [idev] ++
3,523,055 UART: [idev] CDI.KEYID = 6
3,524,038 UART: [idev] SUBJECT.KEYID = 7
3,525,210 UART: [idev] UDS.KEYID = 0
3,526,136 ready_for_fw is high
3,526,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,397 UART: [idev] Erasing UDS.KEYID = 0
6,050,101 UART: [idev] Sha1 KeyId Algorithm
6,071,173 UART: [idev] --
6,075,647 UART: [ldev] ++
6,076,326 UART: [ldev] CDI.KEYID = 6
6,077,206 UART: [ldev] SUBJECT.KEYID = 5
6,078,329 UART: [ldev] AUTHORITY.KEYID = 7
6,079,573 UART: [ldev] FE.KEYID = 1
6,121,349 UART: [ldev] Erasing FE.KEYID = 1
8,629,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,428,462 UART: [ldev] --
10,433,386 UART: [fwproc] Wait for Commands...
10,434,833 UART: [fwproc] Recv command 0x46574c44
10,436,835 UART: [fwproc] Recv'd Img size: 118548 bytes
13,938,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,014,000 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,137,625 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,698,175 >>> mbox cmd response: success
14,698,697 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,701,366 UART: [afmc] ++
14,702,058 UART: [afmc] CDI.KEYID = 6
14,703,295 UART: [afmc] SUBJECT.KEYID = 7
14,704,728 UART: [afmc] AUTHORITY.KEYID = 5
17,236,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,978,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,980,642 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,995,765 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,010,926 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,025,811 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,048,142 UART: [afmc] --
19,051,683 UART: [cold-reset] --
19,056,839 UART: [state] Locking Datavault
19,063,329 UART: [state] Locking PCR0, PCR1 and PCR31
19,065,609 UART: [state] Locking ICCM
19,066,912 UART: [exit] Launching FMC @ 0x40000130
19,075,580 UART:
19,075,810 UART: Running Caliptra FMC ...
19,076,914 UART:
19,077,075 UART: [state] CFI Enabled
19,136,976 UART: [fht] FMC Alias Private Key: 7
20,903,747 UART: [art] Extend RT PCRs Done
20,904,970 UART: [art] Lock RT PCRs Done
20,906,150 UART: [art] Populate DV Done
20,911,837 UART: [fht] FMC Alias Private Key: 7
20,913,492 UART: [art] Derive CDI
20,914,248 UART: [art] Store in slot 0x4
20,969,313 UART: [art] Derive Key Pair
20,970,310 UART: [art] Store priv key in slot 0x5
23,433,474 UART: [art] Derive Key Pair - Done
23,446,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,797 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,291 UART: [art] PUB.X = 374564A11609FEC477CF76DA26663A6E3E41F9F0198D5FAD6534763D8002ED52F58A2667A55F5FD8BD3243FB7DCFC16A
25,168,580 UART: [art] PUB.Y = 3C9D3016E642C06B06F9DD7C630BCC375C587E08145F458DF6CF2C164FBF4E0395BABE62C8AF77AA386E735E7ECE247F
25,175,838 UART: [art] SIG.R = 2AB837E438EEB1A74591C99691FE4123D828A6737E17277EDDB29C6CCF0A37B1E2AA341196CB73DBB0311F7EDAA678FF
25,183,260 UART: [art] SIG.S = 10E5B851C8F4E950E273CE5DCCEF09134976CC1A386505F5C95C048BFC8CD752D230AD08FF9EC841DBD68260FDEE6454
26,162,509 UART: Caliptra RT
26,163,227 UART: [state] CFI Enabled
26,343,650 UART: [rt] RT listening for mailbox commands...
26,374,985 UART: [rt]cmd =0x52435458, len=8
26,376,998 >>> mbox cmd response data (16 bytes)
26,377,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,408,149 UART: [rt]cmd =0x44504543, len=96
26,439,958 >>> mbox cmd response data (56 bytes)
26,440,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,471,247 UART: [rt]cmd =0x44504543, len=96
26,502,886 >>> mbox cmd response data (56 bytes)
26,503,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,534,116 UART: [rt]cmd =0x44504543, len=96
26,565,896 >>> mbox cmd response data (56 bytes)
26,566,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,597,071 UART: [rt]cmd =0x44504543, len=96
26,629,068 >>> mbox cmd response data (56 bytes)
26,629,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,660,179 UART: [rt]cmd =0x44504543, len=96
26,691,600 >>> mbox cmd response data (56 bytes)
26,692,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,722,730 UART: [rt]cmd =0x44504543, len=96
26,754,347 >>> mbox cmd response data (56 bytes)
26,755,071 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,785,442 UART: [rt]cmd =0x44504543, len=96
26,817,294 >>> mbox cmd response data (56 bytes)
26,817,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,848,352 UART: [rt]cmd =0x44504543, len=96
26,879,319 >>> mbox cmd response data (56 bytes)
26,880,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,910,703 UART: [rt]cmd =0x44504543, len=96
26,942,319 >>> mbox cmd response data (56 bytes)
26,942,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,973,522 UART: [rt]cmd =0x44504543, len=96
27,005,172 >>> mbox cmd response data (56 bytes)
27,005,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,036,487 UART: [rt]cmd =0x44504543, len=96
27,067,977 >>> mbox cmd response data (56 bytes)
27,068,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,099,257 UART: [rt]cmd =0x44504543, len=96
27,130,304 >>> mbox cmd response data (56 bytes)
27,130,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,161,199 UART: [rt]cmd =0x44504543, len=96
27,193,249 >>> mbox cmd response data (56 bytes)
27,193,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,224,570 UART: [rt]cmd =0x44504543, len=96
27,256,575 >>> mbox cmd response data (56 bytes)
27,257,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,287,851 UART: [rt]cmd =0x44504543, len=96
27,320,139 >>> mbox cmd response data (56 bytes)
27,320,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,351,488 UART: [rt]cmd =0x44504543, len=96
27,382,796 >>> mbox cmd response data (56 bytes)
27,383,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,413,970 UART: [rt]cmd =0x44504543, len=96
27,445,802 >>> mbox cmd response data (56 bytes)
27,446,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,477,031 UART: [rt]cmd =0x44504543, len=96
27,508,949 >>> mbox cmd response data (56 bytes)
27,509,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,540,070 UART: [rt]cmd =0x44504543, len=96
27,572,156 >>> mbox cmd response data (56 bytes)
27,572,874 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,603,411 UART: [rt]cmd =0x44504543, len=96
27,635,321 >>> mbox cmd response data (56 bytes)
27,636,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,666,460 UART: [rt]cmd =0x44504543, len=96
27,698,360 >>> mbox cmd response data (56 bytes)
27,699,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,729,579 UART: [rt]cmd =0x44504543, len=96
27,760,455 >>> mbox cmd response data (56 bytes)
27,761,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,791,570 UART: [rt]cmd =0x44504543, len=96
27,823,510 >>> mbox cmd response data (56 bytes)
27,824,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,854,940 UART: [rt]cmd =0x44504543, len=96
27,886,366 >>> mbox cmd response data (56 bytes)
27,887,078 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,917,450 UART: [rt]cmd =0x44504543, len=96
27,949,580 >>> mbox cmd response data (56 bytes)
27,950,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,980,830 UART: [rt]cmd =0x44504543, len=96
28,013,327 >>> mbox cmd response data (56 bytes)
28,014,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,044,552 UART: [rt]cmd =0x44504543, len=96
28,076,445 >>> mbox cmd response data (56 bytes)
28,077,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,107,691 UART: [rt]cmd =0x44504543, len=96
28,140,229 >>> mbox cmd response data (56 bytes)
28,140,917 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,171,552 UART: [rt]cmd =0x44504543, len=96
28,203,900 >>> mbox cmd response data (56 bytes)
28,204,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,235,306 UART: [rt]cmd =0x44504543, len=96
28,242,297 >>> mbox cmd response: failed
28,242,668 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,273,082 UART: [rt]cmd =0x44504543, len=96
28,304,589 >>> mbox cmd response data (56 bytes)
28,305,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,335,914 UART: [rt]cmd =0x44504543, len=96
28,342,955 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.69s
Truncated 208126 bytes from beginning
662 UART: [rt]cmd =0x44504543, len=96
26,599,959 >>> mbox cmd response data (56 bytes)
26,600,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,631,247 UART: [rt]cmd =0x44504543, len=96
26,663,214 >>> mbox cmd response data (56 bytes)
26,663,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,694,319 UART: [rt]cmd =0x44504543, len=96
26,725,582 >>> mbox cmd response data (56 bytes)
26,726,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,756,898 UART: [rt]cmd =0x44504543, len=96
26,788,916 >>> mbox cmd response data (56 bytes)
26,789,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,819,999 UART: [rt]cmd =0x44504543, len=96
26,852,177 >>> mbox cmd response data (56 bytes)
26,852,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,883,523 UART: [rt]cmd =0x44504543, len=96
26,915,407 >>> mbox cmd response data (56 bytes)
26,916,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,946,662 UART: [rt]cmd =0x44504543, len=96
26,978,120 >>> mbox cmd response data (56 bytes)
26,978,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,009,279 UART: [rt]cmd =0x44504543, len=96
27,040,763 >>> mbox cmd response data (56 bytes)
27,041,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,072,008 UART: [rt]cmd =0x44504543, len=96
27,104,184 >>> mbox cmd response data (56 bytes)
27,105,016 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,135,896 UART: [rt]cmd =0x44504543, len=96
27,168,512 >>> mbox cmd response data (56 bytes)
27,169,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,199,613 UART: [rt]cmd =0x44504543, len=96
27,231,830 >>> mbox cmd response data (56 bytes)
27,232,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,262,783 UART: [rt]cmd =0x44504543, len=96
27,295,127 >>> mbox cmd response data (56 bytes)
27,295,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,326,581 UART: [rt]cmd =0x44504543, len=96
27,358,489 >>> mbox cmd response data (56 bytes)
27,359,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,389,677 UART: [rt]cmd =0x44504543, len=96
27,421,309 >>> mbox cmd response data (56 bytes)
27,421,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,452,514 UART: [rt]cmd =0x44504543, len=96
27,485,585 >>> mbox cmd response data (56 bytes)
27,486,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,516,854 UART: [rt]cmd =0x44504543, len=96
27,549,177 >>> mbox cmd response data (56 bytes)
27,549,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,580,303 UART: [rt]cmd =0x44504543, len=96
27,612,867 >>> mbox cmd response data (56 bytes)
27,613,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,644,165 UART: [rt]cmd =0x44504543, len=96
27,676,564 >>> mbox cmd response data (56 bytes)
27,677,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,707,863 UART: [rt]cmd =0x44504543, len=96
27,740,315 >>> mbox cmd response data (56 bytes)
27,740,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,771,367 UART: [rt]cmd =0x44504543, len=96
27,802,606 >>> mbox cmd response data (56 bytes)
27,803,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,833,887 UART: [rt]cmd =0x44504543, len=96
27,866,641 >>> mbox cmd response data (56 bytes)
27,867,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,897,958 UART: [rt]cmd =0x44504543, len=96
27,930,543 >>> mbox cmd response data (56 bytes)
27,931,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,961,846 UART: [rt]cmd =0x44504543, len=96
27,994,186 >>> mbox cmd response data (56 bytes)
27,994,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,025,315 UART: [rt]cmd =0x44504543, len=96
28,058,143 >>> mbox cmd response data (56 bytes)
28,058,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,089,418 UART: [rt]cmd =0x44504543, len=96
28,121,692 >>> mbox cmd response data (56 bytes)
28,122,376 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,153,082 UART: [rt]cmd =0x44504543, len=96
28,185,724 >>> mbox cmd response data (56 bytes)
28,186,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,216,832 UART: [rt]cmd =0x44504543, len=96
28,223,603 >>> mbox cmd response: failed
28,224,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,254,804 UART: [rt]cmd =0x44504543, len=96
28,287,562 >>> mbox cmd response data (56 bytes)
28,288,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,318,860 UART: [rt]cmd =0x44504543, len=96
28,351,609 >>> mbox cmd response data (56 bytes)
28,352,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,382,713 UART: [rt]cmd =0x44504543, len=96
28,389,659 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,439,633 ready_for_fw is high
3,440,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,193 >>> mbox cmd response: success
14,822,779 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,105,591 UART:
19,105,986 UART: Running Caliptra FMC ...
19,107,150 UART:
19,107,312 UART: [state] CFI Enabled
19,176,239 UART: [fht] FMC Alias Private Key: 7
20,942,885 UART: [art] Extend RT PCRs Done
20,944,116 UART: [art] Lock RT PCRs Done
20,946,010 UART: [art] Populate DV Done
20,951,275 UART: [fht] FMC Alias Private Key: 7
20,952,783 UART: [art] Derive CDI
20,953,548 UART: [art] Store in slot 0x4
21,009,213 UART: [art] Derive Key Pair
21,010,262 UART: [art] Store priv key in slot 0x5
23,473,295 UART: [art] Derive Key Pair - Done
23,486,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,373 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,882 UART: [art] PUB.X = 3FD1697D981C2D737BC9B96E62F3FA3BD0F87A874F7AB3E18E7A8882BCEB3A31F3314AB93E224A0EC945B04B8C173BDA
25,208,192 UART: [art] PUB.Y = D86A06DDEEE0DF21D829FDCE1F1D510642A19BCDAA61AF5819E1A2D0241A5DD8231194A15579A7E19C392D53701E0B98
25,215,467 UART: [art] SIG.R = 0ECDA26727B696C4E580BE5CD05B46C547078CD6F5933568DDE5DD5BC7BC0874FE7603568B9BA07D9A5CEEA2F7C5BF24
25,222,873 UART: [art] SIG.S = BB76BF6481BE28CEC89CE075F2AF6CED097D767466FFC0DA5CF11C48BD53C9D0061C3D31CAA8DF68FAD04E073D3FC379
26,201,618 UART: Caliptra RT
26,202,321 UART: [state] CFI Enabled
26,384,585 UART: [rt] RT listening for mailbox commands...
26,416,104 UART: [rt]cmd =0x52435458, len=8
26,418,274 >>> mbox cmd response data (16 bytes)
26,418,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,449,284 UART: [rt]cmd =0x44504543, len=96
26,480,304 >>> mbox cmd response data (56 bytes)
26,481,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,511,650 UART: [rt]cmd =0x44504543, len=96
26,543,479 >>> mbox cmd response data (56 bytes)
26,544,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,574,655 UART: [rt]cmd =0x44504543, len=96
26,606,829 >>> mbox cmd response data (56 bytes)
26,607,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,638,136 UART: [rt]cmd =0x44504543, len=96
26,670,389 >>> mbox cmd response data (56 bytes)
26,671,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,701,692 UART: [rt]cmd =0x44504543, len=96
26,732,353 >>> mbox cmd response data (56 bytes)
26,733,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,763,579 UART: [rt]cmd =0x44504543, len=96
26,795,243 >>> mbox cmd response data (56 bytes)
26,795,929 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,826,504 UART: [rt]cmd =0x44504543, len=96
26,858,577 >>> mbox cmd response data (56 bytes)
26,859,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,889,824 UART: [rt]cmd =0x44504543, len=96
26,922,064 >>> mbox cmd response data (56 bytes)
26,922,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,953,154 UART: [rt]cmd =0x44504543, len=96
26,985,327 >>> mbox cmd response data (56 bytes)
26,986,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,016,395 UART: [rt]cmd =0x44504543, len=96
27,048,664 >>> mbox cmd response data (56 bytes)
27,049,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,079,953 UART: [rt]cmd =0x44504543, len=96
27,111,538 >>> mbox cmd response data (56 bytes)
27,112,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,142,695 UART: [rt]cmd =0x44504543, len=96
27,174,991 >>> mbox cmd response data (56 bytes)
27,175,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,206,129 UART: [rt]cmd =0x44504543, len=96
27,238,534 >>> mbox cmd response data (56 bytes)
27,239,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,269,942 UART: [rt]cmd =0x44504543, len=96
27,302,225 >>> mbox cmd response data (56 bytes)
27,302,900 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,333,707 UART: [rt]cmd =0x44504543, len=96
27,366,030 >>> mbox cmd response data (56 bytes)
27,366,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,397,366 UART: [rt]cmd =0x44504543, len=96
27,429,522 >>> mbox cmd response data (56 bytes)
27,430,230 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,460,593 UART: [rt]cmd =0x44504543, len=96
27,492,285 >>> mbox cmd response data (56 bytes)
27,493,013 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,523,708 UART: [rt]cmd =0x44504543, len=96
27,555,778 >>> mbox cmd response data (56 bytes)
27,556,531 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,587,066 UART: [rt]cmd =0x44504543, len=96
27,619,146 >>> mbox cmd response data (56 bytes)
27,619,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,650,439 UART: [rt]cmd =0x44504543, len=96
27,682,383 >>> mbox cmd response data (56 bytes)
27,683,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,713,553 UART: [rt]cmd =0x44504543, len=96
27,745,331 >>> mbox cmd response data (56 bytes)
27,746,020 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,776,625 UART: [rt]cmd =0x44504543, len=96
27,809,082 >>> mbox cmd response data (56 bytes)
27,809,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,840,493 UART: [rt]cmd =0x44504543, len=96
27,872,027 >>> mbox cmd response data (56 bytes)
27,872,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,903,437 UART: [rt]cmd =0x44504543, len=96
27,935,506 >>> mbox cmd response data (56 bytes)
27,936,183 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,966,777 UART: [rt]cmd =0x44504543, len=96
27,999,310 >>> mbox cmd response data (56 bytes)
28,000,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,030,439 UART: [rt]cmd =0x44504543, len=96
28,062,763 >>> mbox cmd response data (56 bytes)
28,063,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,094,197 UART: [rt]cmd =0x44504543, len=96
28,126,664 >>> mbox cmd response data (56 bytes)
28,127,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,157,904 UART: [rt]cmd =0x44504543, len=96
28,190,472 >>> mbox cmd response data (56 bytes)
28,191,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,221,720 UART: [rt]cmd =0x44504543, len=96
28,253,897 >>> mbox cmd response data (56 bytes)
28,254,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,285,105 UART: [rt]cmd =0x44504543, len=96
28,291,864 >>> mbox cmd response: failed
28,292,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,322,816 UART: [rt]cmd =0x44504543, len=96
28,355,423 >>> mbox cmd response data (56 bytes)
28,356,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,386,511 UART: [rt]cmd =0x44504543, len=96
28,393,233 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.79s
Truncated 307156 bytes from beginning
d response data (56 bytes)
27,853,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,884,434 UART: [rt]cmd =0x44504543, len=96
27,917,111 >>> mbox cmd response data (56 bytes)
27,917,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,948,209 UART: [rt]cmd =0x44504543, len=96
27,980,401 >>> mbox cmd response data (56 bytes)
27,981,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,011,380 UART: [rt]cmd =0x44504543, len=96
28,044,270 >>> mbox cmd response data (56 bytes)
28,044,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,075,450 UART: [rt]cmd =0x44504543, len=96
28,108,532 >>> mbox cmd response data (56 bytes)
28,109,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,139,692 UART: [rt]cmd =0x44504543, len=96
28,172,792 >>> mbox cmd response data (56 bytes)
28,173,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,204,024 UART: [rt]cmd =0x44504543, len=96
28,210,852 >>> mbox cmd response: failed
28,211,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,241,573 UART: [rt]cmd =0x44504543, len=96
28,273,376 >>> mbox cmd response data (56 bytes)
28,274,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,304,517 UART: [rt]cmd =0x44504543, len=96
28,336,947 >>> mbox cmd response data (56 bytes)
28,337,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,368,164 UART: [rt]cmd =0x44504543, len=96
28,374,930 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,316 UART:
192,698 UART: Running Caliptra ROM ...
193,878 UART:
603,686 UART: [state] CFI Enabled
616,143 UART: [state] LifecycleState = Unprovisioned
618,471 UART: [state] DebugLocked = No
620,997 UART: [state] WD Timer not started. Device not locked for debugging
626,195 UART: [kat] SHA2-256
816,071 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,894 UART: [kat] ++
827,415 UART: [kat] sha1
840,135 UART: [kat] SHA2-256
843,220 UART: [kat] SHA2-384
849,374 UART: [kat] SHA2-512-ACC
851,965 UART: [kat] ECC-384
3,292,836 UART: [kat] HMAC-384Kdf
3,306,741 UART: [kat] LMS
3,838,562 UART: [kat] --
3,842,920 UART: [cold-reset] ++
3,844,145 UART: [fht] FHT @ 0x50003400
3,855,411 UART: [idev] ++
3,856,120 UART: [idev] CDI.KEYID = 6
3,857,017 UART: [idev] SUBJECT.KEYID = 7
3,858,207 UART: [idev] UDS.KEYID = 0
3,859,139 ready_for_fw is high
3,859,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,063 UART: [idev] Erasing UDS.KEYID = 0
6,332,610 UART: [idev] Sha1 KeyId Algorithm
6,354,415 UART: [idev] --
6,360,813 UART: [ldev] ++
6,361,500 UART: [ldev] CDI.KEYID = 6
6,362,409 UART: [ldev] SUBJECT.KEYID = 5
6,363,568 UART: [ldev] AUTHORITY.KEYID = 7
6,364,797 UART: [ldev] FE.KEYID = 1
6,375,879 UART: [ldev] Erasing FE.KEYID = 1
8,852,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,281 UART: [ldev] --
10,647,517 UART: [fwproc] Wait for Commands...
10,650,477 UART: [fwproc] Recv command 0x46574c44
10,652,730 UART: [fwproc] Recv'd Img size: 118548 bytes
14,139,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,220,836 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,344,436 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,904,372 >>> mbox cmd response: success
14,904,906 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,908,711 UART: [afmc] ++
14,909,405 UART: [afmc] CDI.KEYID = 6
14,910,514 UART: [afmc] SUBJECT.KEYID = 7
14,912,057 UART: [afmc] AUTHORITY.KEYID = 5
17,413,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,137,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,139,279 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,154,365 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,169,518 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,184,429 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,207,268 UART: [afmc] --
19,211,138 UART: [cold-reset] --
19,215,081 UART: [state] Locking Datavault
19,219,512 UART: [state] Locking PCR0, PCR1 and PCR31
19,221,725 UART: [state] Locking ICCM
19,223,642 UART: [exit] Launching FMC @ 0x40000130
19,232,267 UART:
19,232,503 UART: Running Caliptra FMC ...
19,233,607 UART:
19,233,767 UART: [state] CFI Enabled
19,241,816 UART: [fht] FMC Alias Private Key: 7
21,007,699 UART: [art] Extend RT PCRs Done
21,008,937 UART: [art] Lock RT PCRs Done
21,010,464 UART: [art] Populate DV Done
21,015,888 UART: [fht] FMC Alias Private Key: 7
21,017,596 UART: [art] Derive CDI
21,018,420 UART: [art] Store in slot 0x4
21,061,138 UART: [art] Derive Key Pair
21,062,201 UART: [art] Store priv key in slot 0x5
23,489,414 UART: [art] Derive Key Pair - Done
23,502,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,209,207 UART: [art] Erasing AUTHORITY.KEYID = 7
25,210,716 UART: [art] PUB.X = B5A5BB3A04B279DE316C2B41707F6302DAB0B8EE49D3BB0CC070D2F345E94286A49AFB46F649C6C8B3CFB4D309E755CD
25,217,999 UART: [art] PUB.Y = 5DC12CE9E80750CA08DC2DE312EAC8C5AE22DA80E055BAFAB33156083FC344BDB91737FC9812218E57BBB76494275ED6
25,225,218 UART: [art] SIG.R = E33D4EAD739E22BAAC0E375182E278CE08EA21719FE9C4C8A1CCD37F98AB50B4429687081FD24EE83834878A4B466BC4
25,232,639 UART: [art] SIG.S = D6623C6090D0D4E7D68CAFC4C13A0B1A091C106F9A836255A5222A259E9E20C51A5A5F6EE82C3F9E2F9AD0E2D7A4A7B6
26,211,898 UART: Caliptra RT
26,212,586 UART: [state] CFI Enabled
26,344,942 UART: [rt] RT listening for mailbox commands...
26,376,354 UART: [rt]cmd =0x52435458, len=8
26,378,691 >>> mbox cmd response data (16 bytes)
26,379,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,410,054 UART: [rt]cmd =0x44504543, len=96
26,442,350 >>> mbox cmd response data (56 bytes)
26,443,208 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,473,745 UART: [rt]cmd =0x44504543, len=96
26,506,151 >>> mbox cmd response data (56 bytes)
26,506,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,537,687 UART: [rt]cmd =0x44504543, len=96
26,569,546 >>> mbox cmd response data (56 bytes)
26,570,228 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,600,926 UART: [rt]cmd =0x44504543, len=96
26,632,428 >>> mbox cmd response data (56 bytes)
26,633,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,663,610 UART: [rt]cmd =0x44504543, len=96
26,695,278 >>> mbox cmd response data (56 bytes)
26,695,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,726,718 UART: [rt]cmd =0x44504543, len=96
26,757,890 >>> mbox cmd response data (56 bytes)
26,758,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,789,237 UART: [rt]cmd =0x44504543, len=96
26,820,953 >>> mbox cmd response data (56 bytes)
26,821,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,852,422 UART: [rt]cmd =0x44504543, len=96
26,884,922 >>> mbox cmd response data (56 bytes)
26,885,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,916,275 UART: [rt]cmd =0x44504543, len=96
26,947,774 >>> mbox cmd response data (56 bytes)
26,948,460 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,978,998 UART: [rt]cmd =0x44504543, len=96
27,011,752 >>> mbox cmd response data (56 bytes)
27,012,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,042,820 UART: [rt]cmd =0x44504543, len=96
27,075,058 >>> mbox cmd response data (56 bytes)
27,075,802 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,106,502 UART: [rt]cmd =0x44504543, len=96
27,138,395 >>> mbox cmd response data (56 bytes)
27,139,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,169,497 UART: [rt]cmd =0x44504543, len=96
27,200,281 >>> mbox cmd response data (56 bytes)
27,200,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,231,454 UART: [rt]cmd =0x44504543, len=96
27,262,143 >>> mbox cmd response data (56 bytes)
27,262,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,293,201 UART: [rt]cmd =0x44504543, len=96
27,324,792 >>> mbox cmd response data (56 bytes)
27,325,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,355,918 UART: [rt]cmd =0x44504543, len=96
27,388,110 >>> mbox cmd response data (56 bytes)
27,388,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,419,093 UART: [rt]cmd =0x44504543, len=96
27,451,820 >>> mbox cmd response data (56 bytes)
27,452,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,482,848 UART: [rt]cmd =0x44504543, len=96
27,514,840 >>> mbox cmd response data (56 bytes)
27,515,536 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,546,186 UART: [rt]cmd =0x44504543, len=96
27,578,614 >>> mbox cmd response data (56 bytes)
27,579,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,609,680 UART: [rt]cmd =0x44504543, len=96
27,641,763 >>> mbox cmd response data (56 bytes)
27,642,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,673,075 UART: [rt]cmd =0x44504543, len=96
27,705,158 >>> mbox cmd response data (56 bytes)
27,705,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,736,357 UART: [rt]cmd =0x44504543, len=96
27,768,429 >>> mbox cmd response data (56 bytes)
27,769,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,799,731 UART: [rt]cmd =0x44504543, len=96
27,831,996 >>> mbox cmd response data (56 bytes)
27,832,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,863,123 UART: [rt]cmd =0x44504543, len=96
27,895,443 >>> mbox cmd response data (56 bytes)
27,896,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,926,880 UART: [rt]cmd =0x44504543, len=96
27,959,289 >>> mbox cmd response data (56 bytes)
27,960,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,990,766 UART: [rt]cmd =0x44504543, len=96
28,022,788 >>> mbox cmd response data (56 bytes)
28,023,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,053,835 UART: [rt]cmd =0x44504543, len=96
28,085,811 >>> mbox cmd response data (56 bytes)
28,086,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,116,883 UART: [rt]cmd =0x44504543, len=96
28,148,742 >>> mbox cmd response data (56 bytes)
28,149,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,179,974 UART: [rt]cmd =0x44504543, len=96
28,211,541 >>> mbox cmd response data (56 bytes)
28,212,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,242,711 UART: [rt]cmd =0x44504543, len=96
28,249,871 >>> mbox cmd response: failed
28,250,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,280,730 UART: [rt]cmd =0x44504543, len=96
28,313,916 >>> mbox cmd response data (56 bytes)
28,314,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,345,104 UART: [rt]cmd =0x44504543, len=96
28,351,809 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.75s
Truncated 208126 bytes from beginning
933 UART: [rt]cmd =0x44504543, len=96
26,617,276 >>> mbox cmd response data (56 bytes)
26,618,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,648,541 UART: [rt]cmd =0x44504543, len=96
26,680,363 >>> mbox cmd response data (56 bytes)
26,681,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,711,664 UART: [rt]cmd =0x44504543, len=96
26,743,821 >>> mbox cmd response data (56 bytes)
26,744,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,775,103 UART: [rt]cmd =0x44504543, len=96
26,806,627 >>> mbox cmd response data (56 bytes)
26,807,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,838,075 UART: [rt]cmd =0x44504543, len=96
26,869,883 >>> mbox cmd response data (56 bytes)
26,870,629 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,901,378 UART: [rt]cmd =0x44504543, len=96
26,934,063 >>> mbox cmd response data (56 bytes)
26,934,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,965,491 UART: [rt]cmd =0x44504543, len=96
26,997,399 >>> mbox cmd response data (56 bytes)
26,998,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,028,632 UART: [rt]cmd =0x44504543, len=96
27,060,915 >>> mbox cmd response data (56 bytes)
27,061,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,092,199 UART: [rt]cmd =0x44504543, len=96
27,123,770 >>> mbox cmd response data (56 bytes)
27,124,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,155,151 UART: [rt]cmd =0x44504543, len=96
27,187,061 >>> mbox cmd response data (56 bytes)
27,187,780 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,218,306 UART: [rt]cmd =0x44504543, len=96
27,250,864 >>> mbox cmd response data (56 bytes)
27,251,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,281,982 UART: [rt]cmd =0x44504543, len=96
27,314,677 >>> mbox cmd response data (56 bytes)
27,315,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,345,848 UART: [rt]cmd =0x44504543, len=96
27,377,356 >>> mbox cmd response data (56 bytes)
27,378,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,408,485 UART: [rt]cmd =0x44504543, len=96
27,440,676 >>> mbox cmd response data (56 bytes)
27,441,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,472,029 UART: [rt]cmd =0x44504543, len=96
27,504,388 >>> mbox cmd response data (56 bytes)
27,505,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,535,641 UART: [rt]cmd =0x44504543, len=96
27,568,256 >>> mbox cmd response data (56 bytes)
27,568,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,599,414 UART: [rt]cmd =0x44504543, len=96
27,631,416 >>> mbox cmd response data (56 bytes)
27,632,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,662,859 UART: [rt]cmd =0x44504543, len=96
27,695,775 >>> mbox cmd response data (56 bytes)
27,696,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,727,115 UART: [rt]cmd =0x44504543, len=96
27,759,129 >>> mbox cmd response data (56 bytes)
27,759,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,790,552 UART: [rt]cmd =0x44504543, len=96
27,822,808 >>> mbox cmd response data (56 bytes)
27,823,535 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,853,907 UART: [rt]cmd =0x44504543, len=96
27,885,556 >>> mbox cmd response data (56 bytes)
27,886,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,916,621 UART: [rt]cmd =0x44504543, len=96
27,948,615 >>> mbox cmd response data (56 bytes)
27,949,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,980,005 UART: [rt]cmd =0x44504543, len=96
28,012,978 >>> mbox cmd response data (56 bytes)
28,013,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,044,056 UART: [rt]cmd =0x44504543, len=96
28,076,270 >>> mbox cmd response data (56 bytes)
28,076,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,107,523 UART: [rt]cmd =0x44504543, len=96
28,140,304 >>> mbox cmd response data (56 bytes)
28,141,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,171,626 UART: [rt]cmd =0x44504543, len=96
28,203,911 >>> mbox cmd response data (56 bytes)
28,204,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,235,026 UART: [rt]cmd =0x44504543, len=96
28,242,005 >>> mbox cmd response: failed
28,242,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,272,965 UART: [rt]cmd =0x44504543, len=96
28,305,518 >>> mbox cmd response data (56 bytes)
28,306,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,336,882 UART: [rt]cmd =0x44504543, len=96
28,369,063 >>> mbox cmd response data (56 bytes)
28,369,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,400,093 UART: [rt]cmd =0x44504543, len=96
28,407,073 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,758,451 ready_for_fw is high
3,758,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,392 >>> mbox cmd response: success
15,046,041 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,294,082 UART:
19,294,472 UART: Running Caliptra FMC ...
19,295,618 UART:
19,295,777 UART: [state] CFI Enabled
19,303,571 UART: [fht] FMC Alias Private Key: 7
21,068,730 UART: [art] Extend RT PCRs Done
21,069,964 UART: [art] Lock RT PCRs Done
21,071,623 UART: [art] Populate DV Done
21,076,989 UART: [fht] FMC Alias Private Key: 7
21,078,645 UART: [art] Derive CDI
21,079,390 UART: [art] Store in slot 0x4
21,122,690 UART: [art] Derive Key Pair
21,123,732 UART: [art] Store priv key in slot 0x5
23,550,676 UART: [art] Derive Key Pair - Done
23,563,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,548 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,068 UART: [art] PUB.X = C3AF478C1551A5C1B52DD4AA4E210A6CE93B2B1449164E455E6E73417B5BEC0E6DCEBB2502586585D0C4B9D265AB8D3E
25,278,348 UART: [art] PUB.Y = E9A9EDC737E7B9B7CC34621606DB8E16D83842F67B0A73B7465D79753579EE80A4CDCE6F9227B32FAD71F100D2290CF7
25,285,583 UART: [art] SIG.R = C8781FA09E96FE0FDE218996C588D1661B14A89C19C1966B2E779938C61BBE66DBE79BBF0DE2AE90CCFF9867B7091AD5
25,292,994 UART: [art] SIG.S = F0E3D17D92BE0B653E52B5966D95A93C56651AD7AD25B03131E17893F430198079FF583227471A0D224FF8F3AB5EA887
26,271,444 UART: Caliptra RT
26,272,157 UART: [state] CFI Enabled
26,404,472 UART: [rt] RT listening for mailbox commands...
26,435,945 UART: [rt]cmd =0x52435458, len=8
26,438,014 >>> mbox cmd response data (16 bytes)
26,438,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,469,304 UART: [rt]cmd =0x44504543, len=96
26,500,951 >>> mbox cmd response data (56 bytes)
26,501,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,532,413 UART: [rt]cmd =0x44504543, len=96
26,564,568 >>> mbox cmd response data (56 bytes)
26,565,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,596,128 UART: [rt]cmd =0x44504543, len=96
26,627,503 >>> mbox cmd response data (56 bytes)
26,628,192 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,658,544 UART: [rt]cmd =0x44504543, len=96
26,689,444 >>> mbox cmd response data (56 bytes)
26,690,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,720,443 UART: [rt]cmd =0x44504543, len=96
26,751,912 >>> mbox cmd response data (56 bytes)
26,752,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,783,136 UART: [rt]cmd =0x44504543, len=96
26,815,227 >>> mbox cmd response data (56 bytes)
26,815,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,846,537 UART: [rt]cmd =0x44504543, len=96
26,878,734 >>> mbox cmd response data (56 bytes)
26,879,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,909,775 UART: [rt]cmd =0x44504543, len=96
26,942,246 >>> mbox cmd response data (56 bytes)
26,942,929 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,973,532 UART: [rt]cmd =0x44504543, len=96
27,005,758 >>> mbox cmd response data (56 bytes)
27,006,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,036,825 UART: [rt]cmd =0x44504543, len=96
27,068,509 >>> mbox cmd response data (56 bytes)
27,069,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,099,691 UART: [rt]cmd =0x44504543, len=96
27,131,675 >>> mbox cmd response data (56 bytes)
27,132,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,163,036 UART: [rt]cmd =0x44504543, len=96
27,195,366 >>> mbox cmd response data (56 bytes)
27,196,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,226,685 UART: [rt]cmd =0x44504543, len=96
27,259,463 >>> mbox cmd response data (56 bytes)
27,260,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,290,927 UART: [rt]cmd =0x44504543, len=96
27,322,656 >>> mbox cmd response data (56 bytes)
27,323,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,353,881 UART: [rt]cmd =0x44504543, len=96
27,386,468 >>> mbox cmd response data (56 bytes)
27,387,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,417,527 UART: [rt]cmd =0x44504543, len=96
27,450,247 >>> mbox cmd response data (56 bytes)
27,450,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,481,442 UART: [rt]cmd =0x44504543, len=96
27,514,083 >>> mbox cmd response data (56 bytes)
27,514,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,545,319 UART: [rt]cmd =0x44504543, len=96
27,577,346 >>> mbox cmd response data (56 bytes)
27,578,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,608,561 UART: [rt]cmd =0x44504543, len=96
27,640,776 >>> mbox cmd response data (56 bytes)
27,641,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,671,938 UART: [rt]cmd =0x44504543, len=96
27,704,449 >>> mbox cmd response data (56 bytes)
27,705,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,735,706 UART: [rt]cmd =0x44504543, len=96
27,768,161 >>> mbox cmd response data (56 bytes)
27,768,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,799,520 UART: [rt]cmd =0x44504543, len=96
27,831,433 >>> mbox cmd response data (56 bytes)
27,832,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,862,678 UART: [rt]cmd =0x44504543, len=96
27,893,998 >>> mbox cmd response data (56 bytes)
27,894,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,924,971 UART: [rt]cmd =0x44504543, len=96
27,957,479 >>> mbox cmd response data (56 bytes)
27,958,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,988,596 UART: [rt]cmd =0x44504543, len=96
28,021,494 >>> mbox cmd response data (56 bytes)
28,022,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,052,651 UART: [rt]cmd =0x44504543, len=96
28,084,791 >>> mbox cmd response data (56 bytes)
28,085,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,116,047 UART: [rt]cmd =0x44504543, len=96
28,148,389 >>> mbox cmd response data (56 bytes)
28,149,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,179,283 UART: [rt]cmd =0x44504543, len=96
28,211,652 >>> mbox cmd response data (56 bytes)
28,212,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,243,045 UART: [rt]cmd =0x44504543, len=96
28,275,638 >>> mbox cmd response data (56 bytes)
28,276,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,306,877 UART: [rt]cmd =0x44504543, len=96
28,314,102 >>> mbox cmd response: failed
28,314,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,345,096 UART: [rt]cmd =0x44504543, len=96
28,376,903 >>> mbox cmd response data (56 bytes)
28,377,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,408,024 UART: [rt]cmd =0x44504543, len=96
28,414,844 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.83s
Truncated 361846 bytes from beginning
a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,675 UART: [kat] SHA2-256
881,606 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,721 UART: [kat] ++
885,873 UART: [kat] sha1
890,035 UART: [kat] SHA2-256
891,973 UART: [kat] SHA2-384
894,578 UART: [kat] SHA2-512-ACC
896,479 UART: [kat] ECC-384
902,436 UART: [kat] HMAC-384Kdf
906,876 UART: [kat] LMS
1,475,072 UART: [kat] --
1,476,015 UART: [cold-reset] ++
1,476,577 UART: [fht] Storing FHT @ 0x50003400
1,479,210 UART: [idev] ++
1,479,378 UART: [idev] CDI.KEYID = 6
1,479,738 UART: [idev] SUBJECT.KEYID = 7
1,480,162 UART: [idev] UDS.KEYID = 0
1,480,507 ready_for_fw is high
1,480,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,404 UART: [idev] Erasing UDS.KEYID = 0
1,505,010 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,802 UART: [idev] --
1,514,881 UART: [ldev] ++
1,515,049 UART: [ldev] CDI.KEYID = 6
1,515,412 UART: [ldev] SUBJECT.KEYID = 5
1,515,838 UART: [ldev] AUTHORITY.KEYID = 7
1,516,301 UART: [ldev] FE.KEYID = 1
1,521,699 UART: [ldev] Erasing FE.KEYID = 1
1,547,196 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,160 UART: [ldev] --
1,586,421 UART: [fwproc] Waiting for Commands...
1,587,160 UART: [fwproc] Received command 0x46574c44
1,587,951 UART: [fwproc] Received Image of size 118548 bytes
2,932,331 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,291 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,509 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,904 >>> mbox cmd response: success
3,130,904 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,120 UART: [afmc] ++
3,132,288 UART: [afmc] CDI.KEYID = 6
3,132,650 UART: [afmc] SUBJECT.KEYID = 7
3,133,075 UART: [afmc] AUTHORITY.KEYID = 5
3,168,530 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,836 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,616 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,325 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,208 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,891 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,637 UART: [afmc] --
3,211,541 UART: [cold-reset] --
3,212,697 UART: [state] Locking Datavault
3,214,000 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,604 UART: [state] Locking ICCM
3,215,212 UART: [exit] Launching FMC @ 0x40000130
3,220,542 UART:
3,220,558 UART: Running Caliptra FMC ...
3,220,966 UART:
3,221,020 UART: [state] CFI Enabled
3,231,548 UART: [fht] FMC Alias Private Key: 7
3,350,958 UART: [art] Extend RT PCRs Done
3,351,386 UART: [art] Lock RT PCRs Done
3,352,554 UART: [art] Populate DV Done
3,360,593 UART: [fht] FMC Alias Private Key: 7
3,361,581 UART: [art] Derive CDI
3,361,861 UART: [art] Store in slot 0x4
3,447,865 UART: [art] Derive Key Pair
3,448,225 UART: [art] Store priv key in slot 0x5
3,461,666 UART: [art] Derive Key Pair - Done
3,476,712 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,300 UART: [art] PUB.X = 1D05A82271EBD8D64674032482FFA85C2C4A497FD3E422AA5D203DC6EA186CB616CC9A2E9AC66503EEB6BD9B88AC6333
3,500,075 UART: [art] PUB.Y = 9F07C81CF47A74D816325CD7BEC6BF45FD6C87C3338A2392CA6BDCB38F58430035C952CE09ED8D94AB80316F7EF94A5B
3,507,011 UART: [art] SIG.R = 1C09C1A4156E28EF64B9741C6FF300B54D2C0355A1CDDC8C3AAFF94DBCDCE468EDB0A2F0EAC678F8A326952DBF65DCA6
3,513,781 UART: [art] SIG.S = BD1C17412150353FA8FEDAEF137FB6C4CB1ACA51BDDB1455B8F77FD60F51591C02CB3776DC7F4FECE3D00B4D310438AC
3,537,709 UART: Caliptra RT
3,537,960 UART: [state] CFI Enabled
3,657,450 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,148 UART: [rt]cmd =0x52435458, len=8
3,689,856 >>> mbox cmd response data (16 bytes)
3,689,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,702 UART: [rt]cmd =0x44504543, len=96
3,752,914 >>> mbox cmd response data (56 bytes)
3,752,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,820 UART: [rt]cmd =0x44504543, len=96
3,815,298 >>> mbox cmd response data (56 bytes)
3,815,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,222 UART: [rt]cmd =0x44504543, len=96
3,878,153 >>> mbox cmd response data (56 bytes)
3,878,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,908,177 UART: [rt]cmd =0x44504543, len=96
3,941,473 >>> mbox cmd response data (56 bytes)
3,941,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,971,285 UART: [rt]cmd =0x44504543, len=96
4,004,280 >>> mbox cmd response data (56 bytes)
4,004,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,034,278 UART: [rt]cmd =0x44504543, len=96
4,066,836 >>> mbox cmd response data (56 bytes)
4,066,837 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,096,778 UART: [rt]cmd =0x44504543, len=96
4,129,705 >>> mbox cmd response data (56 bytes)
4,129,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,159,609 UART: [rt]cmd =0x44504543, len=96
4,192,393 >>> mbox cmd response data (56 bytes)
4,192,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,222,105 UART: [rt]cmd =0x44504543, len=96
4,255,770 >>> mbox cmd response data (56 bytes)
4,255,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,285,562 UART: [rt]cmd =0x44504543, len=96
4,318,634 >>> mbox cmd response data (56 bytes)
4,318,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,348,550 UART: [rt]cmd =0x44504543, len=96
4,381,327 >>> mbox cmd response data (56 bytes)
4,381,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,411,419 UART: [rt]cmd =0x44504543, len=96
4,443,897 >>> mbox cmd response data (56 bytes)
4,443,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,473,951 UART: [rt]cmd =0x44504543, len=96
4,507,370 >>> mbox cmd response data (56 bytes)
4,507,371 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,537,310 UART: [rt]cmd =0x44504543, len=96
4,570,042 >>> mbox cmd response data (56 bytes)
4,570,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,600,140 UART: [rt]cmd =0x44504543, len=96
4,633,075 >>> mbox cmd response data (56 bytes)
4,633,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,662,843 UART: [rt]cmd =0x44504543, len=96
4,696,139 >>> mbox cmd response data (56 bytes)
4,696,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,725,967 UART: [rt]cmd =0x44504543, len=96
4,759,834 >>> mbox cmd response data (56 bytes)
4,759,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,789,738 UART: [rt]cmd =0x44504543, len=96
4,822,938 >>> mbox cmd response data (56 bytes)
4,822,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,852,840 UART: [rt]cmd =0x44504543, len=96
4,886,153 >>> mbox cmd response data (56 bytes)
4,886,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,916,347 UART: [rt]cmd =0x44504543, len=96
4,949,395 >>> mbox cmd response data (56 bytes)
4,949,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,979,183 UART: [rt]cmd =0x44504543, len=96
5,012,162 >>> mbox cmd response data (56 bytes)
5,012,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,041,932 UART: [rt]cmd =0x44504543, len=96
5,074,882 >>> mbox cmd response data (56 bytes)
5,074,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,104,804 UART: [rt]cmd =0x44504543, len=96
5,137,957 >>> mbox cmd response data (56 bytes)
5,137,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,167,609 UART: [rt]cmd =0x44504543, len=96
5,200,997 >>> mbox cmd response data (56 bytes)
5,200,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,230,895 UART: [rt]cmd =0x44504543, len=96
5,264,328 >>> mbox cmd response data (56 bytes)
5,264,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,294,164 UART: [rt]cmd =0x44504543, len=96
5,327,390 >>> mbox cmd response data (56 bytes)
5,327,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,357,572 UART: [rt]cmd =0x44504543, len=96
5,390,521 >>> mbox cmd response data (56 bytes)
5,390,522 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,420,581 UART: [rt]cmd =0x44504543, len=96
5,454,235 >>> mbox cmd response data (56 bytes)
5,454,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,484,269 UART: [rt]cmd =0x44504543, len=96
5,518,042 >>> mbox cmd response data (56 bytes)
5,518,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,547,988 UART: [rt]cmd =0x44504543, len=96
5,555,361 >>> mbox cmd response: failed
5,555,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,585,167 UART: [rt]cmd =0x44504543, len=96
5,618,646 >>> mbox cmd response data (56 bytes)
5,618,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,648,518 UART: [rt]cmd =0x44504543, len=96
5,656,157 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 46.69s
Truncated 260626 bytes from beginning
4,645,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,675,607 UART: [rt]cmd =0x44504543, len=96
4,707,976 >>> mbox cmd response data (56 bytes)
4,707,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,737,658 UART: [rt]cmd =0x44504543, len=96
4,770,588 >>> mbox cmd response data (56 bytes)
4,770,589 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,800,450 UART: [rt]cmd =0x44504543, len=96
4,833,299 >>> mbox cmd response data (56 bytes)
4,833,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,863,269 UART: [rt]cmd =0x44504543, len=96
4,896,673 >>> mbox cmd response data (56 bytes)
4,896,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,926,535 UART: [rt]cmd =0x44504543, len=96
4,959,598 >>> mbox cmd response data (56 bytes)
4,959,599 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,989,470 UART: [rt]cmd =0x44504543, len=96
5,023,254 >>> mbox cmd response data (56 bytes)
5,023,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,053,266 UART: [rt]cmd =0x44504543, len=96
5,087,045 >>> mbox cmd response data (56 bytes)
5,087,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,116,855 UART: [rt]cmd =0x44504543, len=96
5,150,031 >>> mbox cmd response data (56 bytes)
5,150,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,180,073 UART: [rt]cmd =0x44504543, len=96
5,213,382 >>> mbox cmd response data (56 bytes)
5,213,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,243,538 UART: [rt]cmd =0x44504543, len=96
5,276,740 >>> mbox cmd response data (56 bytes)
5,276,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,306,762 UART: [rt]cmd =0x44504543, len=96
5,314,215 >>> mbox cmd response: failed
5,314,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,344,087 UART: [rt]cmd =0x44504543, len=96
5,376,958 >>> mbox cmd response data (56 bytes)
5,376,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,407,098 UART: [rt]cmd =0x44504543, len=96
5,440,013 >>> mbox cmd response data (56 bytes)
5,440,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,469,927 UART: [rt]cmd =0x44504543, len=96
5,477,266 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,239 ready_for_fw is high
1,363,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,880 >>> mbox cmd response: success
2,981,880 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,043,717 UART:
3,043,733 UART: Running Caliptra FMC ...
3,044,141 UART:
3,044,195 UART: [state] CFI Enabled
3,054,625 UART: [fht] FMC Alias Private Key: 7
3,173,369 UART: [art] Extend RT PCRs Done
3,173,797 UART: [art] Lock RT PCRs Done
3,175,185 UART: [art] Populate DV Done
3,183,558 UART: [fht] FMC Alias Private Key: 7
3,184,614 UART: [art] Derive CDI
3,184,894 UART: [art] Store in slot 0x4
3,270,532 UART: [art] Derive Key Pair
3,270,892 UART: [art] Store priv key in slot 0x5
3,284,005 UART: [art] Derive Key Pair - Done
3,298,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,259 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,024 UART: [art] PUB.X = 2A44844D8D9EC91CA180D10513E091B0197362891EB790EAF55A134F29DC8E90713AC6AE1C29E9EEB56A7C3355E81322
3,321,793 UART: [art] PUB.Y = 243065E5C97B53112816D499AD3F8B5E8D57ABDEC4F2C46D0948796151290CC5CFCE5D0E3E0B1B68737F8E7F77CE66CF
3,328,741 UART: [art] SIG.R = DDA3E5E1CA78BF9A80973B67A9BD255C7021773FA81F3AA40A7CC1AA710366E328DF0BCD6331BC12EA4DC5B1E43F1DFF
3,335,526 UART: [art] SIG.S = FF59D62DBD6180BEA41AC1DDA44C3B60C44138D6A2AF8CCCAFCA5CDA58A5EE207BC36DF3575804B47812F53D9323ED92
3,359,629 UART: Caliptra RT
3,359,880 UART: [state] CFI Enabled
3,480,241 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,843 UART: [rt]cmd =0x52435458, len=8
3,512,377 >>> mbox cmd response data (16 bytes)
3,512,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,275 UART: [rt]cmd =0x44504543, len=96
3,574,517 >>> mbox cmd response data (56 bytes)
3,574,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,457 UART: [rt]cmd =0x44504543, len=96
3,637,319 >>> mbox cmd response data (56 bytes)
3,637,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,125 UART: [rt]cmd =0x44504543, len=96
3,700,584 >>> mbox cmd response data (56 bytes)
3,700,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,828 UART: [rt]cmd =0x44504543, len=96
3,763,388 >>> mbox cmd response data (56 bytes)
3,763,389 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,793,414 UART: [rt]cmd =0x44504543, len=96
3,825,891 >>> mbox cmd response data (56 bytes)
3,825,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,855,885 UART: [rt]cmd =0x44504543, len=96
3,888,661 >>> mbox cmd response data (56 bytes)
3,888,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,918,591 UART: [rt]cmd =0x44504543, len=96
3,951,374 >>> mbox cmd response data (56 bytes)
3,951,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,981,086 UART: [rt]cmd =0x44504543, len=96
4,014,370 >>> mbox cmd response data (56 bytes)
4,014,371 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,044,198 UART: [rt]cmd =0x44504543, len=96
4,076,731 >>> mbox cmd response data (56 bytes)
4,076,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,106,549 UART: [rt]cmd =0x44504543, len=96
4,139,351 >>> mbox cmd response data (56 bytes)
4,139,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,169,325 UART: [rt]cmd =0x44504543, len=96
4,201,918 >>> mbox cmd response data (56 bytes)
4,201,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,231,856 UART: [rt]cmd =0x44504543, len=96
4,264,066 >>> mbox cmd response data (56 bytes)
4,264,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,293,914 UART: [rt]cmd =0x44504543, len=96
4,326,427 >>> mbox cmd response data (56 bytes)
4,326,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,356,419 UART: [rt]cmd =0x44504543, len=96
4,389,437 >>> mbox cmd response data (56 bytes)
4,389,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,419,269 UART: [rt]cmd =0x44504543, len=96
4,452,350 >>> mbox cmd response data (56 bytes)
4,452,351 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,482,250 UART: [rt]cmd =0x44504543, len=96
4,516,090 >>> mbox cmd response data (56 bytes)
4,516,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,546,150 UART: [rt]cmd =0x44504543, len=96
4,579,609 >>> mbox cmd response data (56 bytes)
4,579,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,609,717 UART: [rt]cmd =0x44504543, len=96
4,642,711 >>> mbox cmd response data (56 bytes)
4,642,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,672,525 UART: [rt]cmd =0x44504543, len=96
4,706,138 >>> mbox cmd response data (56 bytes)
4,706,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,736,348 UART: [rt]cmd =0x44504543, len=96
4,769,826 >>> mbox cmd response data (56 bytes)
4,769,827 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,799,872 UART: [rt]cmd =0x44504543, len=96
4,832,945 >>> mbox cmd response data (56 bytes)
4,832,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,862,793 UART: [rt]cmd =0x44504543, len=96
4,896,511 >>> mbox cmd response data (56 bytes)
4,896,512 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,926,535 UART: [rt]cmd =0x44504543, len=96
4,959,324 >>> mbox cmd response data (56 bytes)
4,959,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,989,484 UART: [rt]cmd =0x44504543, len=96
5,022,884 >>> mbox cmd response data (56 bytes)
5,022,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,053,150 UART: [rt]cmd =0x44504543, len=96
5,086,983 >>> mbox cmd response data (56 bytes)
5,086,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,117,205 UART: [rt]cmd =0x44504543, len=96
5,151,285 >>> mbox cmd response data (56 bytes)
5,151,286 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,181,191 UART: [rt]cmd =0x44504543, len=96
5,215,062 >>> mbox cmd response data (56 bytes)
5,215,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,244,922 UART: [rt]cmd =0x44504543, len=96
5,278,144 >>> mbox cmd response data (56 bytes)
5,278,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,307,884 UART: [rt]cmd =0x44504543, len=96
5,341,823 >>> mbox cmd response data (56 bytes)
5,341,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,371,781 UART: [rt]cmd =0x44504543, len=96
5,379,320 >>> mbox cmd response: failed
5,379,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,409,204 UART: [rt]cmd =0x44504543, len=96
5,442,137 >>> mbox cmd response data (56 bytes)
5,442,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,471,843 UART: [rt]cmd =0x44504543, len=96
5,479,460 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 44.75s
Truncated 361846 bytes from beginning
a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,959 UART: [state] LifecycleState = Unprovisioned
86,614 UART: [state] DebugLocked = No
87,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,932 UART: [kat] SHA2-256
882,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,978 UART: [kat] ++
887,130 UART: [kat] sha1
891,362 UART: [kat] SHA2-256
893,300 UART: [kat] SHA2-384
896,081 UART: [kat] SHA2-512-ACC
897,982 UART: [kat] ECC-384
903,409 UART: [kat] HMAC-384Kdf
908,083 UART: [kat] LMS
1,476,279 UART: [kat] --
1,477,170 UART: [cold-reset] ++
1,477,684 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,481,704 ready_for_fw is high
1,481,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,609 UART: [idev] Erasing UDS.KEYID = 0
1,506,557 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,123 UART: [idev] --
1,516,128 UART: [ldev] ++
1,516,296 UART: [ldev] CDI.KEYID = 6
1,516,659 UART: [ldev] SUBJECT.KEYID = 5
1,517,085 UART: [ldev] AUTHORITY.KEYID = 7
1,517,548 UART: [ldev] FE.KEYID = 1
1,522,572 UART: [ldev] Erasing FE.KEYID = 1
1,548,289 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,357 UART: [ldev] --
1,587,644 UART: [fwproc] Waiting for Commands...
1,588,485 UART: [fwproc] Received command 0x46574c44
1,589,276 UART: [fwproc] Received Image of size 118548 bytes
2,933,960 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,918 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,136 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,559 >>> mbox cmd response: success
3,132,559 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,133,731 UART: [afmc] ++
3,133,899 UART: [afmc] CDI.KEYID = 6
3,134,261 UART: [afmc] SUBJECT.KEYID = 7
3,134,686 UART: [afmc] AUTHORITY.KEYID = 5
3,169,477 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,771 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,551 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,260 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,143 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,826 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,878 UART: [afmc] --
3,212,842 UART: [cold-reset] --
3,213,722 UART: [state] Locking Datavault
3,214,847 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,451 UART: [state] Locking ICCM
3,216,117 UART: [exit] Launching FMC @ 0x40000130
3,221,447 UART:
3,221,463 UART: Running Caliptra FMC ...
3,221,871 UART:
3,222,014 UART: [state] CFI Enabled
3,232,576 UART: [fht] FMC Alias Private Key: 7
3,351,892 UART: [art] Extend RT PCRs Done
3,352,320 UART: [art] Lock RT PCRs Done
3,353,854 UART: [art] Populate DV Done
3,362,121 UART: [fht] FMC Alias Private Key: 7
3,363,177 UART: [art] Derive CDI
3,363,457 UART: [art] Store in slot 0x4
3,448,835 UART: [art] Derive Key Pair
3,449,195 UART: [art] Store priv key in slot 0x5
3,462,496 UART: [art] Derive Key Pair - Done
3,477,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,900 UART: [art] PUB.X = 286AC3A1933A478812373059E44BA1D1F99802EDC2CC6D4AB981ABBE764FC1EF4D34B5C873FE99913EBCADF204173E5B
3,500,678 UART: [art] PUB.Y = 952137C248A30492CBE5ADA1AB448AF20F7F479C594EFEBBF4C6D8C9F719EB00FE5661578444B3F24DF0B9206017AD5B
3,507,612 UART: [art] SIG.R = 3E3F9F85E9BDC2043FDD5C891AFBF5B0CA0F5FE48620536D4F15E5C74B0C48C326E3C391C8E580E0DEA91F3D3EEB0DD2
3,514,394 UART: [art] SIG.S = 715725DDB3CC4CF6A75AA60995D944647F92BCB46D8BF65ACCBCE09F8026D31BF8816FD30007AB4012CC18B022674914
3,538,680 UART: Caliptra RT
3,539,023 UART: [state] CFI Enabled
3,659,716 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,392 UART: [rt]cmd =0x52435458, len=8
3,692,138 >>> mbox cmd response data (16 bytes)
3,692,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,048 UART: [rt]cmd =0x44504543, len=96
3,755,410 >>> mbox cmd response data (56 bytes)
3,755,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,785,266 UART: [rt]cmd =0x44504543, len=96
3,818,014 >>> mbox cmd response data (56 bytes)
3,818,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,840 UART: [rt]cmd =0x44504543, len=96
3,880,189 >>> mbox cmd response data (56 bytes)
3,880,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,101 UART: [rt]cmd =0x44504543, len=96
3,943,351 >>> mbox cmd response data (56 bytes)
3,943,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,973,189 UART: [rt]cmd =0x44504543, len=96
4,006,606 >>> mbox cmd response data (56 bytes)
4,006,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,036,782 UART: [rt]cmd =0x44504543, len=96
4,070,070 >>> mbox cmd response data (56 bytes)
4,070,071 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,100,080 UART: [rt]cmd =0x44504543, len=96
4,133,425 >>> mbox cmd response data (56 bytes)
4,133,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,163,185 UART: [rt]cmd =0x44504543, len=96
4,196,117 >>> mbox cmd response data (56 bytes)
4,196,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,226,089 UART: [rt]cmd =0x44504543, len=96
4,258,628 >>> mbox cmd response data (56 bytes)
4,258,629 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,288,600 UART: [rt]cmd =0x44504543, len=96
4,321,994 >>> mbox cmd response data (56 bytes)
4,321,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,351,784 UART: [rt]cmd =0x44504543, len=96
4,385,001 >>> mbox cmd response data (56 bytes)
4,385,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,414,833 UART: [rt]cmd =0x44504543, len=96
4,447,369 >>> mbox cmd response data (56 bytes)
4,447,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,477,287 UART: [rt]cmd =0x44504543, len=96
4,510,948 >>> mbox cmd response data (56 bytes)
4,510,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,540,720 UART: [rt]cmd =0x44504543, len=96
4,573,570 >>> mbox cmd response data (56 bytes)
4,573,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,603,560 UART: [rt]cmd =0x44504543, len=96
4,636,583 >>> mbox cmd response data (56 bytes)
4,636,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,666,649 UART: [rt]cmd =0x44504543, len=96
4,699,681 >>> mbox cmd response data (56 bytes)
4,699,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,729,509 UART: [rt]cmd =0x44504543, len=96
4,763,322 >>> mbox cmd response data (56 bytes)
4,763,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,793,264 UART: [rt]cmd =0x44504543, len=96
4,826,492 >>> mbox cmd response data (56 bytes)
4,826,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,856,486 UART: [rt]cmd =0x44504543, len=96
4,889,027 >>> mbox cmd response data (56 bytes)
4,889,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,919,183 UART: [rt]cmd =0x44504543, len=96
4,952,341 >>> mbox cmd response data (56 bytes)
4,952,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,982,413 UART: [rt]cmd =0x44504543, len=96
5,015,884 >>> mbox cmd response data (56 bytes)
5,015,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,045,890 UART: [rt]cmd =0x44504543, len=96
5,078,672 >>> mbox cmd response data (56 bytes)
5,078,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,516 UART: [rt]cmd =0x44504543, len=96
5,142,735 >>> mbox cmd response data (56 bytes)
5,142,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,172,665 UART: [rt]cmd =0x44504543, len=96
5,206,183 >>> mbox cmd response data (56 bytes)
5,206,184 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,236,419 UART: [rt]cmd =0x44504543, len=96
5,270,522 >>> mbox cmd response data (56 bytes)
5,270,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,300,486 UART: [rt]cmd =0x44504543, len=96
5,334,134 >>> mbox cmd response data (56 bytes)
5,334,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,363,894 UART: [rt]cmd =0x44504543, len=96
5,397,359 >>> mbox cmd response data (56 bytes)
5,397,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,427,147 UART: [rt]cmd =0x44504543, len=96
5,460,347 >>> mbox cmd response data (56 bytes)
5,460,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,490,415 UART: [rt]cmd =0x44504543, len=96
5,524,186 >>> mbox cmd response data (56 bytes)
5,524,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,554,294 UART: [rt]cmd =0x44504543, len=96
5,561,845 >>> mbox cmd response: failed
5,561,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,591,647 UART: [rt]cmd =0x44504543, len=96
5,625,730 >>> mbox cmd response data (56 bytes)
5,625,731 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,655,580 UART: [rt]cmd =0x44504543, len=96
5,663,019 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 45.95s
Truncated 260626 bytes from beginning
4,646,213 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,676,196 UART: [rt]cmd =0x44504543, len=96
4,709,487 >>> mbox cmd response data (56 bytes)
4,709,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,739,457 UART: [rt]cmd =0x44504543, len=96
4,772,469 >>> mbox cmd response data (56 bytes)
4,772,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,802,455 UART: [rt]cmd =0x44504543, len=96
4,835,352 >>> mbox cmd response data (56 bytes)
4,835,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,865,282 UART: [rt]cmd =0x44504543, len=96
4,898,428 >>> mbox cmd response data (56 bytes)
4,898,429 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,928,414 UART: [rt]cmd =0x44504543, len=96
4,961,639 >>> mbox cmd response data (56 bytes)
4,961,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,991,571 UART: [rt]cmd =0x44504543, len=96
5,024,623 >>> mbox cmd response data (56 bytes)
5,024,624 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,054,681 UART: [rt]cmd =0x44504543, len=96
5,087,312 >>> mbox cmd response data (56 bytes)
5,087,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,117,170 UART: [rt]cmd =0x44504543, len=96
5,150,498 >>> mbox cmd response data (56 bytes)
5,150,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,180,690 UART: [rt]cmd =0x44504543, len=96
5,214,687 >>> mbox cmd response data (56 bytes)
5,214,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,244,799 UART: [rt]cmd =0x44504543, len=96
5,278,367 >>> mbox cmd response data (56 bytes)
5,278,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,308,239 UART: [rt]cmd =0x44504543, len=96
5,315,782 >>> mbox cmd response: failed
5,315,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,345,758 UART: [rt]cmd =0x44504543, len=96
5,378,891 >>> mbox cmd response data (56 bytes)
5,378,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,408,793 UART: [rt]cmd =0x44504543, len=96
5,441,910 >>> mbox cmd response data (56 bytes)
5,441,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,471,984 UART: [rt]cmd =0x44504543, len=96
5,479,497 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,570 ready_for_fw is high
1,362,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,387 >>> mbox cmd response: success
2,980,387 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,042,008 UART:
3,042,024 UART: Running Caliptra FMC ...
3,042,432 UART:
3,042,575 UART: [state] CFI Enabled
3,053,469 UART: [fht] FMC Alias Private Key: 7
3,172,777 UART: [art] Extend RT PCRs Done
3,173,205 UART: [art] Lock RT PCRs Done
3,174,627 UART: [art] Populate DV Done
3,182,754 UART: [fht] FMC Alias Private Key: 7
3,183,718 UART: [art] Derive CDI
3,183,998 UART: [art] Store in slot 0x4
3,269,862 UART: [art] Derive Key Pair
3,270,222 UART: [art] Store priv key in slot 0x5
3,283,631 UART: [art] Derive Key Pair - Done
3,298,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,525 UART: [art] PUB.X = 4D4E75D80073F0C8B5B63376F90EDAEA63FA2930BD7111DC97F8324581758D33A965F4FD90FF23D8C8A679D93E8ECFC8
3,321,280 UART: [art] PUB.Y = F33FBF6301A2B56CD9D7C828BE66D1DE108C290934AEC16B5D7A1D98044ACD1816216A30CFE76E1E60CE08C8B56C5CF1
3,328,234 UART: [art] SIG.R = 819A457B82F7ADF8BF939659BCEBE2F44648A513D88E7FAC12623FD9AD8F234541363BC3702E6FDA48BC46F546D4B636
3,335,014 UART: [art] SIG.S = FF61820C06345CED9A182F7FC6A2B866A54F6F8EFBA1446D68842886E883D45BD346E5985F7051012EAB5954320C4A57
3,359,128 UART: Caliptra RT
3,359,471 UART: [state] CFI Enabled
3,479,642 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,160 UART: [rt]cmd =0x52435458, len=8
3,511,996 >>> mbox cmd response data (16 bytes)
3,511,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,036 UART: [rt]cmd =0x44504543, len=96
3,574,944 >>> mbox cmd response data (56 bytes)
3,574,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,830 UART: [rt]cmd =0x44504543, len=96
3,638,384 >>> mbox cmd response data (56 bytes)
3,638,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,332 UART: [rt]cmd =0x44504543, len=96
3,701,211 >>> mbox cmd response data (56 bytes)
3,701,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,979 UART: [rt]cmd =0x44504543, len=96
3,764,153 >>> mbox cmd response data (56 bytes)
3,764,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,794,245 UART: [rt]cmd =0x44504543, len=96
3,826,612 >>> mbox cmd response data (56 bytes)
3,826,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,606 UART: [rt]cmd =0x44504543, len=96
3,890,104 >>> mbox cmd response data (56 bytes)
3,890,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,919,950 UART: [rt]cmd =0x44504543, len=96
3,952,819 >>> mbox cmd response data (56 bytes)
3,952,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,982,685 UART: [rt]cmd =0x44504543, len=96
4,015,541 >>> mbox cmd response data (56 bytes)
4,015,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,045,429 UART: [rt]cmd =0x44504543, len=96
4,078,162 >>> mbox cmd response data (56 bytes)
4,078,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,108,190 UART: [rt]cmd =0x44504543, len=96
4,140,846 >>> mbox cmd response data (56 bytes)
4,140,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,170,820 UART: [rt]cmd =0x44504543, len=96
4,203,453 >>> mbox cmd response data (56 bytes)
4,203,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,233,419 UART: [rt]cmd =0x44504543, len=96
4,266,657 >>> mbox cmd response data (56 bytes)
4,266,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,296,733 UART: [rt]cmd =0x44504543, len=96
4,330,222 >>> mbox cmd response data (56 bytes)
4,330,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,360,194 UART: [rt]cmd =0x44504543, len=96
4,393,288 >>> mbox cmd response data (56 bytes)
4,393,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,423,092 UART: [rt]cmd =0x44504543, len=96
4,455,865 >>> mbox cmd response data (56 bytes)
4,455,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,485,679 UART: [rt]cmd =0x44504543, len=96
4,518,817 >>> mbox cmd response data (56 bytes)
4,518,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,548,897 UART: [rt]cmd =0x44504543, len=96
4,581,634 >>> mbox cmd response data (56 bytes)
4,581,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,611,656 UART: [rt]cmd =0x44504543, len=96
4,645,532 >>> mbox cmd response data (56 bytes)
4,645,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,675,364 UART: [rt]cmd =0x44504543, len=96
4,708,863 >>> mbox cmd response data (56 bytes)
4,708,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,739,105 UART: [rt]cmd =0x44504543, len=96
4,772,263 >>> mbox cmd response data (56 bytes)
4,772,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,802,031 UART: [rt]cmd =0x44504543, len=96
4,835,104 >>> mbox cmd response data (56 bytes)
4,835,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,864,992 UART: [rt]cmd =0x44504543, len=96
4,898,386 >>> mbox cmd response data (56 bytes)
4,898,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,928,318 UART: [rt]cmd =0x44504543, len=96
4,961,993 >>> mbox cmd response data (56 bytes)
4,961,994 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,991,875 UART: [rt]cmd =0x44504543, len=96
5,025,027 >>> mbox cmd response data (56 bytes)
5,025,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,054,795 UART: [rt]cmd =0x44504543, len=96
5,088,008 >>> mbox cmd response data (56 bytes)
5,088,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,117,808 UART: [rt]cmd =0x44504543, len=96
5,151,360 >>> mbox cmd response data (56 bytes)
5,151,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,181,366 UART: [rt]cmd =0x44504543, len=96
5,215,265 >>> mbox cmd response data (56 bytes)
5,215,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,245,229 UART: [rt]cmd =0x44504543, len=96
5,279,117 >>> mbox cmd response data (56 bytes)
5,279,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,308,929 UART: [rt]cmd =0x44504543, len=96
5,342,686 >>> mbox cmd response data (56 bytes)
5,342,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,372,542 UART: [rt]cmd =0x44504543, len=96
5,380,007 >>> mbox cmd response: failed
5,380,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,410,257 UART: [rt]cmd =0x44504543, len=96
5,443,344 >>> mbox cmd response data (56 bytes)
5,443,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,473,350 UART: [rt]cmd =0x44504543, len=96
5,480,883 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 45.24s
Truncated 359656 bytes from beginning
2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,106 UART: [kat] ++
895,258 UART: [kat] sha1
899,556 UART: [kat] SHA2-256
901,496 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
916,389 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,170,120 UART: [cold-reset] ++
1,170,462 UART: [fht] FHT @ 0x50003400
1,173,136 UART: [idev] ++
1,173,304 UART: [idev] CDI.KEYID = 6
1,173,665 UART: [idev] SUBJECT.KEYID = 7
1,174,090 UART: [idev] UDS.KEYID = 0
1,174,436 ready_for_fw is high
1,174,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,539 UART: [idev] Erasing UDS.KEYID = 0
1,199,435 UART: [idev] Sha1 KeyId Algorithm
1,208,383 UART: [idev] --
1,209,336 UART: [ldev] ++
1,209,504 UART: [ldev] CDI.KEYID = 6
1,209,868 UART: [ldev] SUBJECT.KEYID = 5
1,210,295 UART: [ldev] AUTHORITY.KEYID = 7
1,210,758 UART: [ldev] FE.KEYID = 1
1,216,150 UART: [ldev] Erasing FE.KEYID = 1
1,242,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,868 UART: [ldev] --
1,282,219 UART: [fwproc] Wait for Commands...
1,282,788 UART: [fwproc] Recv command 0x46574c44
1,283,521 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,209 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,384 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,661 >>> mbox cmd response: success
2,825,661 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,826,791 UART: [afmc] ++
2,826,959 UART: [afmc] CDI.KEYID = 6
2,827,322 UART: [afmc] SUBJECT.KEYID = 7
2,827,748 UART: [afmc] AUTHORITY.KEYID = 5
2,863,415 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,599 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,309 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,190 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,891 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,600 UART: [afmc] --
2,906,651 UART: [cold-reset] --
2,907,579 UART: [state] Locking Datavault
2,908,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,038 UART: [state] Locking ICCM
2,909,500 UART: [exit] Launching FMC @ 0x40000130
2,914,830 UART:
2,914,846 UART: Running Caliptra FMC ...
2,915,254 UART:
2,915,308 UART: [state] CFI Enabled
2,925,658 UART: [fht] FMC Alias Private Key: 7
3,044,916 UART: [art] Extend RT PCRs Done
3,045,344 UART: [art] Lock RT PCRs Done
3,046,748 UART: [art] Populate DV Done
3,055,019 UART: [fht] FMC Alias Private Key: 7
3,056,109 UART: [art] Derive CDI
3,056,389 UART: [art] Store in slot 0x4
3,142,154 UART: [art] Derive Key Pair
3,142,514 UART: [art] Store priv key in slot 0x5
3,155,646 UART: [art] Derive Key Pair - Done
3,170,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,151 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,916 UART: [art] PUB.X = F5E9A360B81566DC34285FA77BD4EE6BCD6C50F4772F5FB78DDAC05FFFB4B9C0408BCA1082D49CBE7230C59BD5A52516
3,193,706 UART: [art] PUB.Y = 5E9C11BC25056F1E2FE6F29125D373E4A99DAF58EC67092E5D8AB2CAAC5498D0BDF8374C7B8C23072765DF79EEA44132
3,200,659 UART: [art] SIG.R = AD33EA9422465A49686C35D80AE49A72FC08FD0CCDADE41F7AA6FF77CE2FBAADCAEF1EBEA166613500FD08A57A494C57
3,207,423 UART: [art] SIG.S = 3B07FCD923430483438EEF9E39847DACE63A42622F6F303E862FB6A18B53B9491F3FE12A232AA9B97807D7CA75FD2AFD
3,231,210 UART: Caliptra RT
3,231,461 UART: [state] CFI Enabled
3,352,210 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,698 UART: [rt]cmd =0x52435458, len=8
3,384,592 >>> mbox cmd response data (16 bytes)
3,384,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,446 UART: [rt]cmd =0x44504543, len=96
3,447,564 >>> mbox cmd response data (56 bytes)
3,447,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,588 UART: [rt]cmd =0x44504543, len=96
3,509,878 >>> mbox cmd response data (56 bytes)
3,509,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,880 UART: [rt]cmd =0x44504543, len=96
3,572,739 >>> mbox cmd response data (56 bytes)
3,572,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,633 UART: [rt]cmd =0x44504543, len=96
3,634,937 >>> mbox cmd response data (56 bytes)
3,634,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,665,133 UART: [rt]cmd =0x44504543, len=96
3,697,822 >>> mbox cmd response data (56 bytes)
3,697,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,862 UART: [rt]cmd =0x44504543, len=96
3,760,650 >>> mbox cmd response data (56 bytes)
3,760,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,496 UART: [rt]cmd =0x44504543, len=96
3,823,579 >>> mbox cmd response data (56 bytes)
3,823,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,585 UART: [rt]cmd =0x44504543, len=96
3,886,231 >>> mbox cmd response data (56 bytes)
3,886,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,916,299 UART: [rt]cmd =0x44504543, len=96
3,949,394 >>> mbox cmd response data (56 bytes)
3,949,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,979,428 UART: [rt]cmd =0x44504543, len=96
4,012,742 >>> mbox cmd response data (56 bytes)
4,012,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,042,622 UART: [rt]cmd =0x44504543, len=96
4,075,373 >>> mbox cmd response data (56 bytes)
4,075,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,105,275 UART: [rt]cmd =0x44504543, len=96
4,138,357 >>> mbox cmd response data (56 bytes)
4,138,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,168,469 UART: [rt]cmd =0x44504543, len=96
4,201,752 >>> mbox cmd response data (56 bytes)
4,201,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,231,688 UART: [rt]cmd =0x44504543, len=96
4,264,340 >>> mbox cmd response data (56 bytes)
4,264,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,294,434 UART: [rt]cmd =0x44504543, len=96
4,326,725 >>> mbox cmd response data (56 bytes)
4,326,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,356,741 UART: [rt]cmd =0x44504543, len=96
4,389,911 >>> mbox cmd response data (56 bytes)
4,389,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,420,111 UART: [rt]cmd =0x44504543, len=96
4,453,116 >>> mbox cmd response data (56 bytes)
4,453,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,483,182 UART: [rt]cmd =0x44504543, len=96
4,517,040 >>> mbox cmd response data (56 bytes)
4,517,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,546,876 UART: [rt]cmd =0x44504543, len=96
4,580,263 >>> mbox cmd response data (56 bytes)
4,580,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,610,335 UART: [rt]cmd =0x44504543, len=96
4,642,979 >>> mbox cmd response data (56 bytes)
4,642,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,672,887 UART: [rt]cmd =0x44504543, len=96
4,706,480 >>> mbox cmd response data (56 bytes)
4,706,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,736,368 UART: [rt]cmd =0x44504543, len=96
4,769,830 >>> mbox cmd response data (56 bytes)
4,769,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,799,522 UART: [rt]cmd =0x44504543, len=96
4,833,073 >>> mbox cmd response data (56 bytes)
4,833,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,862,971 UART: [rt]cmd =0x44504543, len=96
4,896,131 >>> mbox cmd response data (56 bytes)
4,896,132 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,926,105 UART: [rt]cmd =0x44504543, len=96
4,959,390 >>> mbox cmd response data (56 bytes)
4,959,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,989,154 UART: [rt]cmd =0x44504543, len=96
5,022,502 >>> mbox cmd response data (56 bytes)
5,022,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,052,382 UART: [rt]cmd =0x44504543, len=96
5,085,513 >>> mbox cmd response data (56 bytes)
5,085,514 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,115,495 UART: [rt]cmd =0x44504543, len=96
5,149,019 >>> mbox cmd response data (56 bytes)
5,149,020 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,178,923 UART: [rt]cmd =0x44504543, len=96
5,212,240 >>> mbox cmd response data (56 bytes)
5,212,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,242,218 UART: [rt]cmd =0x44504543, len=96
5,249,449 >>> mbox cmd response: failed
5,249,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,279,381 UART: [rt]cmd =0x44504543, len=96
5,312,208 >>> mbox cmd response data (56 bytes)
5,312,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,342,186 UART: [rt]cmd =0x44504543, len=96
5,349,417 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 46.79s
Truncated 260626 bytes from beginning
4,339,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,369,400 UART: [rt]cmd =0x44504543, len=96
4,402,265 >>> mbox cmd response data (56 bytes)
4,402,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,432,121 UART: [rt]cmd =0x44504543, len=96
4,465,767 >>> mbox cmd response data (56 bytes)
4,465,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,495,767 UART: [rt]cmd =0x44504543, len=96
4,528,646 >>> mbox cmd response data (56 bytes)
4,528,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,558,460 UART: [rt]cmd =0x44504543, len=96
4,590,858 >>> mbox cmd response data (56 bytes)
4,590,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,620,712 UART: [rt]cmd =0x44504543, len=96
4,653,883 >>> mbox cmd response data (56 bytes)
4,653,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,683,881 UART: [rt]cmd =0x44504543, len=96
4,717,015 >>> mbox cmd response data (56 bytes)
4,717,016 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,746,835 UART: [rt]cmd =0x44504543, len=96
4,779,604 >>> mbox cmd response data (56 bytes)
4,779,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,809,698 UART: [rt]cmd =0x44504543, len=96
4,843,086 >>> mbox cmd response data (56 bytes)
4,843,087 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,873,214 UART: [rt]cmd =0x44504543, len=96
4,906,297 >>> mbox cmd response data (56 bytes)
4,906,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,936,413 UART: [rt]cmd =0x44504543, len=96
4,968,869 >>> mbox cmd response data (56 bytes)
4,968,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,998,977 UART: [rt]cmd =0x44504543, len=96
5,006,612 >>> mbox cmd response: failed
5,006,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,036,466 UART: [rt]cmd =0x44504543, len=96
5,069,629 >>> mbox cmd response data (56 bytes)
5,069,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,099,603 UART: [rt]cmd =0x44504543, len=96
5,133,786 >>> mbox cmd response data (56 bytes)
5,133,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,163,716 UART: [rt]cmd =0x44504543, len=96
5,170,927 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,574 ready_for_fw is high
1,059,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,804 >>> mbox cmd response: success
2,678,804 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,443 UART:
2,740,459 UART: Running Caliptra FMC ...
2,740,867 UART:
2,740,921 UART: [state] CFI Enabled
2,751,683 UART: [fht] FMC Alias Private Key: 7
2,870,913 UART: [art] Extend RT PCRs Done
2,871,341 UART: [art] Lock RT PCRs Done
2,872,933 UART: [art] Populate DV Done
2,881,040 UART: [fht] FMC Alias Private Key: 7
2,882,136 UART: [art] Derive CDI
2,882,416 UART: [art] Store in slot 0x4
2,967,935 UART: [art] Derive Key Pair
2,968,295 UART: [art] Store priv key in slot 0x5
2,981,701 UART: [art] Derive Key Pair - Done
2,996,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,131 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,896 UART: [art] PUB.X = C651B062E3D4DA18B7740B8ECAAC0B9490EFCF85DCD5EE325B83E77E9EA629018F9C2901BB227FF8E5F2578200A2D761
3,019,646 UART: [art] PUB.Y = 06ED5B6A320687AD5431574F497656499DB99E9AE632FA3C812C3C4D8B4B8506B9EA5F52036BD3EDD38F6C7C15B545A6
3,026,590 UART: [art] SIG.R = 80232F5F0153134FA592A9FFA675F0C7BCF654E753D09F8006FED027C7A61DA009CA4413F721039581E75CD4B4A48F12
3,033,350 UART: [art] SIG.S = FF3AC7B859DE1E85858D18D6D757135F429E8FF2F559931C90ED8F84272AC8AF0828E870289BA487D59399B170B21A5F
3,057,541 UART: Caliptra RT
3,057,792 UART: [state] CFI Enabled
3,177,444 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,958 UART: [rt]cmd =0x52435458, len=8
3,209,456 >>> mbox cmd response data (16 bytes)
3,209,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,248 UART: [rt]cmd =0x44504543, len=96
3,271,772 >>> mbox cmd response data (56 bytes)
3,271,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,960 UART: [rt]cmd =0x44504543, len=96
3,334,712 >>> mbox cmd response data (56 bytes)
3,334,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,364,712 UART: [rt]cmd =0x44504543, len=96
3,397,595 >>> mbox cmd response data (56 bytes)
3,397,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,427,267 UART: [rt]cmd =0x44504543, len=96
3,460,289 >>> mbox cmd response data (56 bytes)
3,460,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,490,183 UART: [rt]cmd =0x44504543, len=96
3,523,006 >>> mbox cmd response data (56 bytes)
3,523,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,138 UART: [rt]cmd =0x44504543, len=96
3,585,974 >>> mbox cmd response data (56 bytes)
3,585,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,616,002 UART: [rt]cmd =0x44504543, len=96
3,648,771 >>> mbox cmd response data (56 bytes)
3,648,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,678,697 UART: [rt]cmd =0x44504543, len=96
3,711,733 >>> mbox cmd response data (56 bytes)
3,711,734 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,742,005 UART: [rt]cmd =0x44504543, len=96
3,774,648 >>> mbox cmd response data (56 bytes)
3,774,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,804,544 UART: [rt]cmd =0x44504543, len=96
3,837,354 >>> mbox cmd response data (56 bytes)
3,837,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,867,538 UART: [rt]cmd =0x44504543, len=96
3,900,669 >>> mbox cmd response data (56 bytes)
3,900,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,930,745 UART: [rt]cmd =0x44504543, len=96
3,964,139 >>> mbox cmd response data (56 bytes)
3,964,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,994,147 UART: [rt]cmd =0x44504543, len=96
4,027,424 >>> mbox cmd response data (56 bytes)
4,027,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,057,316 UART: [rt]cmd =0x44504543, len=96
4,090,436 >>> mbox cmd response data (56 bytes)
4,090,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,496 UART: [rt]cmd =0x44504543, len=96
4,153,789 >>> mbox cmd response data (56 bytes)
4,153,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,184,005 UART: [rt]cmd =0x44504543, len=96
4,217,293 >>> mbox cmd response data (56 bytes)
4,217,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,247,299 UART: [rt]cmd =0x44504543, len=96
4,280,306 >>> mbox cmd response data (56 bytes)
4,280,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,230 UART: [rt]cmd =0x44504543, len=96
4,343,628 >>> mbox cmd response data (56 bytes)
4,343,629 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,373,736 UART: [rt]cmd =0x44504543, len=96
4,406,949 >>> mbox cmd response data (56 bytes)
4,406,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,436,779 UART: [rt]cmd =0x44504543, len=96
4,470,371 >>> mbox cmd response data (56 bytes)
4,470,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,500,167 UART: [rt]cmd =0x44504543, len=96
4,533,258 >>> mbox cmd response data (56 bytes)
4,533,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,563,164 UART: [rt]cmd =0x44504543, len=96
4,596,502 >>> mbox cmd response data (56 bytes)
4,596,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,626,340 UART: [rt]cmd =0x44504543, len=96
4,659,777 >>> mbox cmd response data (56 bytes)
4,659,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,689,839 UART: [rt]cmd =0x44504543, len=96
4,722,949 >>> mbox cmd response data (56 bytes)
4,722,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,753,061 UART: [rt]cmd =0x44504543, len=96
4,786,294 >>> mbox cmd response data (56 bytes)
4,786,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,816,372 UART: [rt]cmd =0x44504543, len=96
4,849,734 >>> mbox cmd response data (56 bytes)
4,849,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,879,670 UART: [rt]cmd =0x44504543, len=96
4,912,957 >>> mbox cmd response data (56 bytes)
4,912,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,943,143 UART: [rt]cmd =0x44504543, len=96
4,976,849 >>> mbox cmd response data (56 bytes)
4,976,850 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,007,081 UART: [rt]cmd =0x44504543, len=96
5,040,658 >>> mbox cmd response data (56 bytes)
5,040,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,070,294 UART: [rt]cmd =0x44504543, len=96
5,077,739 >>> mbox cmd response: failed
5,077,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,107,637 UART: [rt]cmd =0x44504543, len=96
5,140,470 >>> mbox cmd response data (56 bytes)
5,140,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,170,470 UART: [rt]cmd =0x44504543, len=96
5,178,109 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 45.85s
Truncated 359656 bytes from beginning
2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
900,269 UART: [kat] SHA2-256
902,209 UART: [kat] SHA2-384
905,042 UART: [kat] SHA2-512-ACC
906,943 UART: [kat] ECC-384
916,562 UART: [kat] HMAC-384Kdf
921,354 UART: [kat] LMS
1,169,666 UART: [kat] --
1,170,333 UART: [cold-reset] ++
1,170,903 UART: [fht] FHT @ 0x50003400
1,173,691 UART: [idev] ++
1,173,859 UART: [idev] CDI.KEYID = 6
1,174,220 UART: [idev] SUBJECT.KEYID = 7
1,174,645 UART: [idev] UDS.KEYID = 0
1,174,991 ready_for_fw is high
1,174,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,498 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,377 UART: [ldev] ++
1,209,545 UART: [ldev] CDI.KEYID = 6
1,209,909 UART: [ldev] SUBJECT.KEYID = 5
1,210,336 UART: [ldev] AUTHORITY.KEYID = 7
1,210,799 UART: [ldev] FE.KEYID = 1
1,216,101 UART: [ldev] Erasing FE.KEYID = 1
1,242,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,775 UART: [ldev] --
1,282,136 UART: [fwproc] Wait for Commands...
1,282,803 UART: [fwproc] Recv command 0x46574c44
1,283,536 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,846 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,021 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,382 >>> mbox cmd response: success
2,825,382 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,826,496 UART: [afmc] ++
2,826,664 UART: [afmc] CDI.KEYID = 6
2,827,027 UART: [afmc] SUBJECT.KEYID = 7
2,827,453 UART: [afmc] AUTHORITY.KEYID = 5
2,863,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,812 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,522 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,403 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,104 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,023 UART: [afmc] --
2,907,006 UART: [cold-reset] --
2,907,760 UART: [state] Locking Datavault
2,909,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,649 UART: [state] Locking ICCM
2,910,173 UART: [exit] Launching FMC @ 0x40000130
2,915,503 UART:
2,915,519 UART: Running Caliptra FMC ...
2,915,927 UART:
2,916,070 UART: [state] CFI Enabled
2,926,718 UART: [fht] FMC Alias Private Key: 7
3,044,950 UART: [art] Extend RT PCRs Done
3,045,378 UART: [art] Lock RT PCRs Done
3,046,880 UART: [art] Populate DV Done
3,055,173 UART: [fht] FMC Alias Private Key: 7
3,056,331 UART: [art] Derive CDI
3,056,611 UART: [art] Store in slot 0x4
3,142,764 UART: [art] Derive Key Pair
3,143,124 UART: [art] Store priv key in slot 0x5
3,155,950 UART: [art] Derive Key Pair - Done
3,170,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,766 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,531 UART: [art] PUB.X = B4433540B2747377919D730F8FC89BFE688A7C9D8E7A5D46EEC631AA60FD311D2A60B847ADF00C2BE85769E9FBD6F0EF
3,193,309 UART: [art] PUB.Y = 379DD65739251E9D87105F021A3DEAFBA59D83AD30455315D301F31B47ACC08C398092BB2311529354585BEDEC55B3FE
3,200,255 UART: [art] SIG.R = 564CD2630D11FA197F84C39AFDC6D0D6DE16EF349E6F67E7ECB2E216EF95EB6253E548AEB56428EFFA1F700511E9214D
3,207,035 UART: [art] SIG.S = 206A2039A014FC0ADC34E6184E63E46651488FB66DA9E6A5F34997AABD078A44AEEB3FE3A930FDA1835F218837CB99C1
3,230,599 UART: Caliptra RT
3,230,942 UART: [state] CFI Enabled
3,350,752 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,218 UART: [rt]cmd =0x52435458, len=8
3,383,124 >>> mbox cmd response data (16 bytes)
3,383,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,210 UART: [rt]cmd =0x44504543, len=96
3,446,058 >>> mbox cmd response data (56 bytes)
3,446,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,122 UART: [rt]cmd =0x44504543, len=96
3,508,982 >>> mbox cmd response data (56 bytes)
3,508,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,538,856 UART: [rt]cmd =0x44504543, len=96
3,572,187 >>> mbox cmd response data (56 bytes)
3,572,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,073 UART: [rt]cmd =0x44504543, len=96
3,634,693 >>> mbox cmd response data (56 bytes)
3,634,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,664,515 UART: [rt]cmd =0x44504543, len=96
3,697,730 >>> mbox cmd response data (56 bytes)
3,697,731 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,702 UART: [rt]cmd =0x44504543, len=96
3,760,580 >>> mbox cmd response data (56 bytes)
3,760,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,486 UART: [rt]cmd =0x44504543, len=96
3,823,097 >>> mbox cmd response data (56 bytes)
3,823,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,009 UART: [rt]cmd =0x44504543, len=96
3,885,813 >>> mbox cmd response data (56 bytes)
3,885,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,679 UART: [rt]cmd =0x44504543, len=96
3,949,036 >>> mbox cmd response data (56 bytes)
3,949,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,979,040 UART: [rt]cmd =0x44504543, len=96
4,011,662 >>> mbox cmd response data (56 bytes)
4,011,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,041,566 UART: [rt]cmd =0x44504543, len=96
4,074,487 >>> mbox cmd response data (56 bytes)
4,074,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,104,517 UART: [rt]cmd =0x44504543, len=96
4,137,779 >>> mbox cmd response data (56 bytes)
4,137,780 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,167,701 UART: [rt]cmd =0x44504543, len=96
4,200,324 >>> mbox cmd response data (56 bytes)
4,200,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,230,088 UART: [rt]cmd =0x44504543, len=96
4,263,268 >>> mbox cmd response data (56 bytes)
4,263,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,293,362 UART: [rt]cmd =0x44504543, len=96
4,326,899 >>> mbox cmd response data (56 bytes)
4,326,900 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,356,719 UART: [rt]cmd =0x44504543, len=96
4,389,357 >>> mbox cmd response data (56 bytes)
4,389,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,419,595 UART: [rt]cmd =0x44504543, len=96
4,452,940 >>> mbox cmd response data (56 bytes)
4,452,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,482,732 UART: [rt]cmd =0x44504543, len=96
4,515,802 >>> mbox cmd response data (56 bytes)
4,515,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,545,792 UART: [rt]cmd =0x44504543, len=96
4,579,631 >>> mbox cmd response data (56 bytes)
4,579,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,609,765 UART: [rt]cmd =0x44504543, len=96
4,642,891 >>> mbox cmd response data (56 bytes)
4,642,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,672,691 UART: [rt]cmd =0x44504543, len=96
4,706,104 >>> mbox cmd response data (56 bytes)
4,706,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,735,882 UART: [rt]cmd =0x44504543, len=96
4,769,278 >>> mbox cmd response data (56 bytes)
4,769,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,799,250 UART: [rt]cmd =0x44504543, len=96
4,832,063 >>> mbox cmd response data (56 bytes)
4,832,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,862,305 UART: [rt]cmd =0x44504543, len=96
4,895,155 >>> mbox cmd response data (56 bytes)
4,895,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,925,139 UART: [rt]cmd =0x44504543, len=96
4,958,796 >>> mbox cmd response data (56 bytes)
4,958,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,988,956 UART: [rt]cmd =0x44504543, len=96
5,021,984 >>> mbox cmd response data (56 bytes)
5,021,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,052,086 UART: [rt]cmd =0x44504543, len=96
5,085,055 >>> mbox cmd response data (56 bytes)
5,085,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,114,987 UART: [rt]cmd =0x44504543, len=96
5,147,797 >>> mbox cmd response data (56 bytes)
5,147,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,177,655 UART: [rt]cmd =0x44504543, len=96
5,210,162 >>> mbox cmd response data (56 bytes)
5,210,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,240,138 UART: [rt]cmd =0x44504543, len=96
5,247,663 >>> mbox cmd response: failed
5,247,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,277,719 UART: [rt]cmd =0x44504543, len=96
5,310,982 >>> mbox cmd response data (56 bytes)
5,310,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,340,838 UART: [rt]cmd =0x44504543, len=96
5,348,361 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 46.41s
Truncated 260626 bytes from beginning
4,348,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,378,653 UART: [rt]cmd =0x44504543, len=96
4,411,658 >>> mbox cmd response data (56 bytes)
4,411,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,441,768 UART: [rt]cmd =0x44504543, len=96
4,474,478 >>> mbox cmd response data (56 bytes)
4,474,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,504,342 UART: [rt]cmd =0x44504543, len=96
4,537,645 >>> mbox cmd response data (56 bytes)
4,537,646 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,567,545 UART: [rt]cmd =0x44504543, len=96
4,600,353 >>> mbox cmd response data (56 bytes)
4,600,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,630,255 UART: [rt]cmd =0x44504543, len=96
4,664,260 >>> mbox cmd response data (56 bytes)
4,664,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,694,074 UART: [rt]cmd =0x44504543, len=96
4,727,036 >>> mbox cmd response data (56 bytes)
4,727,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,757,152 UART: [rt]cmd =0x44504543, len=96
4,791,007 >>> mbox cmd response data (56 bytes)
4,791,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,820,907 UART: [rt]cmd =0x44504543, len=96
4,854,681 >>> mbox cmd response data (56 bytes)
4,854,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,884,407 UART: [rt]cmd =0x44504543, len=96
4,917,366 >>> mbox cmd response data (56 bytes)
4,917,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,947,252 UART: [rt]cmd =0x44504543, len=96
4,980,394 >>> mbox cmd response data (56 bytes)
4,980,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,010,422 UART: [rt]cmd =0x44504543, len=96
5,017,603 >>> mbox cmd response: failed
5,017,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,047,471 UART: [rt]cmd =0x44504543, len=96
5,080,806 >>> mbox cmd response data (56 bytes)
5,080,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,110,784 UART: [rt]cmd =0x44504543, len=96
5,145,125 >>> mbox cmd response data (56 bytes)
5,145,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,175,111 UART: [rt]cmd =0x44504543, len=96
5,182,744 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,209 ready_for_fw is high
1,059,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,671 >>> mbox cmd response: success
2,678,671 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,741,434 UART:
2,741,450 UART: Running Caliptra FMC ...
2,741,858 UART:
2,742,001 UART: [state] CFI Enabled
2,752,373 UART: [fht] FMC Alias Private Key: 7
2,871,387 UART: [art] Extend RT PCRs Done
2,871,815 UART: [art] Lock RT PCRs Done
2,873,193 UART: [art] Populate DV Done
2,881,544 UART: [fht] FMC Alias Private Key: 7
2,882,538 UART: [art] Derive CDI
2,882,818 UART: [art] Store in slot 0x4
2,968,629 UART: [art] Derive Key Pair
2,968,989 UART: [art] Store priv key in slot 0x5
2,982,083 UART: [art] Derive Key Pair - Done
2,996,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,781 UART: [art] PUB.X = 0107304B3CCE27D1CFCA21D66E996F964D8E03291C6E7B94738F4912D49BF6DD6C8893BF45D57BCA93475ED7C008E28B
3,019,547 UART: [art] PUB.Y = 1784CB39AB175A4C47A7032DE6D4725A807F610495571C75FDF7BDC977983056DEFBDC97558E423731AC119FE02E4328
3,026,491 UART: [art] SIG.R = FB0E9ED367E16336CFF012B80C0CB88308A10EEE351B5927D246A3F0C9513C179A9F96DB6C57BB11F8973D1FFC98C7E2
3,033,258 UART: [art] SIG.S = A4F2D12D9C23E59B4280B1AEDF235D3221889A810E40A35D3A95C6A8DFEFB2C1C71085384C33E5681AA38C3BA43DACCD
3,057,087 UART: Caliptra RT
3,057,430 UART: [state] CFI Enabled
3,177,718 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,240 UART: [rt]cmd =0x52435458, len=8
3,210,008 >>> mbox cmd response data (16 bytes)
3,210,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,758 UART: [rt]cmd =0x44504543, len=96
3,272,320 >>> mbox cmd response data (56 bytes)
3,272,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,456 UART: [rt]cmd =0x44504543, len=96
3,335,524 >>> mbox cmd response data (56 bytes)
3,335,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,365,572 UART: [rt]cmd =0x44504543, len=96
3,398,773 >>> mbox cmd response data (56 bytes)
3,398,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,428,911 UART: [rt]cmd =0x44504543, len=96
3,461,345 >>> mbox cmd response data (56 bytes)
3,461,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,491,335 UART: [rt]cmd =0x44504543, len=96
3,523,826 >>> mbox cmd response data (56 bytes)
3,523,827 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,592 UART: [rt]cmd =0x44504543, len=96
3,586,508 >>> mbox cmd response data (56 bytes)
3,586,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,616,676 UART: [rt]cmd =0x44504543, len=96
3,649,433 >>> mbox cmd response data (56 bytes)
3,649,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,679,337 UART: [rt]cmd =0x44504543, len=96
3,712,095 >>> mbox cmd response data (56 bytes)
3,712,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,742,107 UART: [rt]cmd =0x44504543, len=96
3,775,460 >>> mbox cmd response data (56 bytes)
3,775,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,805,422 UART: [rt]cmd =0x44504543, len=96
3,837,938 >>> mbox cmd response data (56 bytes)
3,837,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,867,698 UART: [rt]cmd =0x44504543, len=96
3,900,791 >>> mbox cmd response data (56 bytes)
3,900,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,930,655 UART: [rt]cmd =0x44504543, len=96
3,963,319 >>> mbox cmd response data (56 bytes)
3,963,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,993,487 UART: [rt]cmd =0x44504543, len=96
4,026,432 >>> mbox cmd response data (56 bytes)
4,026,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,056,540 UART: [rt]cmd =0x44504543, len=96
4,089,976 >>> mbox cmd response data (56 bytes)
4,089,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,890 UART: [rt]cmd =0x44504543, len=96
4,153,505 >>> mbox cmd response data (56 bytes)
4,153,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,183,465 UART: [rt]cmd =0x44504543, len=96
4,217,337 >>> mbox cmd response data (56 bytes)
4,217,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,247,061 UART: [rt]cmd =0x44504543, len=96
4,280,198 >>> mbox cmd response data (56 bytes)
4,280,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,214 UART: [rt]cmd =0x44504543, len=96
4,344,036 >>> mbox cmd response data (56 bytes)
4,344,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,373,966 UART: [rt]cmd =0x44504543, len=96
4,406,669 >>> mbox cmd response data (56 bytes)
4,406,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,436,681 UART: [rt]cmd =0x44504543, len=96
4,469,591 >>> mbox cmd response data (56 bytes)
4,469,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,499,575 UART: [rt]cmd =0x44504543, len=96
4,532,638 >>> mbox cmd response data (56 bytes)
4,532,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,562,628 UART: [rt]cmd =0x44504543, len=96
4,596,530 >>> mbox cmd response data (56 bytes)
4,596,531 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,626,450 UART: [rt]cmd =0x44504543, len=96
4,660,201 >>> mbox cmd response data (56 bytes)
4,660,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,689,931 UART: [rt]cmd =0x44504543, len=96
4,723,481 >>> mbox cmd response data (56 bytes)
4,723,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,753,373 UART: [rt]cmd =0x44504543, len=96
4,785,494 >>> mbox cmd response data (56 bytes)
4,785,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,815,426 UART: [rt]cmd =0x44504543, len=96
4,848,292 >>> mbox cmd response data (56 bytes)
4,848,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,878,406 UART: [rt]cmd =0x44504543, len=96
4,911,403 >>> mbox cmd response data (56 bytes)
4,911,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,941,339 UART: [rt]cmd =0x44504543, len=96
4,974,483 >>> mbox cmd response data (56 bytes)
4,974,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,004,357 UART: [rt]cmd =0x44504543, len=96
5,038,372 >>> mbox cmd response data (56 bytes)
5,038,373 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,068,506 UART: [rt]cmd =0x44504543, len=96
5,075,965 >>> mbox cmd response: failed
5,075,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,105,781 UART: [rt]cmd =0x44504543, len=96
5,137,794 >>> mbox cmd response data (56 bytes)
5,137,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,167,874 UART: [rt]cmd =0x44504543, len=96
5,175,293 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 46.33s
Truncated 359656 bytes from beginning
2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,605 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
893,518 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,643 UART: [kat] ++
897,795 UART: [kat] sha1
902,055 UART: [kat] SHA2-256
903,995 UART: [kat] SHA2-384
906,854 UART: [kat] SHA2-512-ACC
908,755 UART: [kat] ECC-384
918,418 UART: [kat] HMAC-384Kdf
923,132 UART: [kat] LMS
1,171,460 UART: [kat] --
1,172,363 UART: [cold-reset] ++
1,172,863 UART: [fht] FHT @ 0x50003400
1,175,614 UART: [idev] ++
1,175,782 UART: [idev] CDI.KEYID = 6
1,176,142 UART: [idev] SUBJECT.KEYID = 7
1,176,566 UART: [idev] UDS.KEYID = 0
1,176,911 ready_for_fw is high
1,176,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,448 UART: [idev] Erasing UDS.KEYID = 0
1,201,569 UART: [idev] Sha1 KeyId Algorithm
1,210,083 UART: [idev] --
1,210,977 UART: [ldev] ++
1,211,145 UART: [ldev] CDI.KEYID = 6
1,211,508 UART: [ldev] SUBJECT.KEYID = 5
1,211,934 UART: [ldev] AUTHORITY.KEYID = 7
1,212,397 UART: [ldev] FE.KEYID = 1
1,217,501 UART: [ldev] Erasing FE.KEYID = 1
1,243,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,673 UART: [ldev] --
1,282,952 UART: [fwproc] Wait for Commands...
1,283,634 UART: [fwproc] Recv command 0x46574c44
1,284,362 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,974 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,144 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,369 >>> mbox cmd response: success
2,827,369 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,828,481 UART: [afmc] ++
2,828,649 UART: [afmc] CDI.KEYID = 6
2,829,011 UART: [afmc] SUBJECT.KEYID = 7
2,829,436 UART: [afmc] AUTHORITY.KEYID = 5
2,864,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,418 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,127 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,010 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,711 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,549 UART: [afmc] --
2,907,637 UART: [cold-reset] --
2,908,347 UART: [state] Locking Datavault
2,909,492 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,096 UART: [state] Locking ICCM
2,910,770 UART: [exit] Launching FMC @ 0x40000130
2,916,100 UART:
2,916,116 UART: Running Caliptra FMC ...
2,916,524 UART:
2,916,578 UART: [state] CFI Enabled
2,927,010 UART: [fht] FMC Alias Private Key: 7
3,046,624 UART: [art] Extend RT PCRs Done
3,047,052 UART: [art] Lock RT PCRs Done
3,048,928 UART: [art] Populate DV Done
3,057,297 UART: [fht] FMC Alias Private Key: 7
3,058,361 UART: [art] Derive CDI
3,058,641 UART: [art] Store in slot 0x4
3,144,306 UART: [art] Derive Key Pair
3,144,666 UART: [art] Store priv key in slot 0x5
3,157,748 UART: [art] Derive Key Pair - Done
3,172,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,766 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,531 UART: [art] PUB.X = DEECD12FB10FB0950BFED353D990E3DA217B63B1E30AE73175B04E74DB7005940B1E7C4C4B9442CD677D9CA519B587B6
3,196,300 UART: [art] PUB.Y = 800A6ED7A8821C5B7D37C850AE943ED5E1AF9715B464E22A866316DAB58B35A876FB058D462B8568B087AF2E45367BDF
3,203,250 UART: [art] SIG.R = 0D5782F17CD510943F48D43B6BF7EFA90014BCE3C4678C831DB22B41F94E7E475C610B6AC177ABC52DA29D60F36A9A76
3,210,002 UART: [art] SIG.S = E320F1335EF90E437159E917BB019120748BBD0623F6F5BC8D946F7A393411E90CF9DAE8A4548A06A1BFB3E81DC52CCC
3,234,091 UART: Caliptra RT
3,234,342 UART: [state] CFI Enabled
3,354,879 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,277 UART: [rt]cmd =0x52435458, len=8
3,386,837 >>> mbox cmd response data (16 bytes)
3,386,838 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,909 UART: [rt]cmd =0x44504543, len=96
3,449,013 >>> mbox cmd response data (56 bytes)
3,449,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,681 UART: [rt]cmd =0x44504543, len=96
3,511,271 >>> mbox cmd response data (56 bytes)
3,511,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,229 UART: [rt]cmd =0x44504543, len=96
3,573,812 >>> mbox cmd response data (56 bytes)
3,573,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,614 UART: [rt]cmd =0x44504543, len=96
3,636,446 >>> mbox cmd response data (56 bytes)
3,636,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,612 UART: [rt]cmd =0x44504543, len=96
3,699,875 >>> mbox cmd response data (56 bytes)
3,699,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,729,649 UART: [rt]cmd =0x44504543, len=96
3,762,811 >>> mbox cmd response data (56 bytes)
3,762,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,793,015 UART: [rt]cmd =0x44504543, len=96
3,826,104 >>> mbox cmd response data (56 bytes)
3,826,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,046 UART: [rt]cmd =0x44504543, len=96
3,889,158 >>> mbox cmd response data (56 bytes)
3,889,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,918,946 UART: [rt]cmd =0x44504543, len=96
3,951,579 >>> mbox cmd response data (56 bytes)
3,951,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,981,597 UART: [rt]cmd =0x44504543, len=96
4,014,523 >>> mbox cmd response data (56 bytes)
4,014,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,044,529 UART: [rt]cmd =0x44504543, len=96
4,077,314 >>> mbox cmd response data (56 bytes)
4,077,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,107,170 UART: [rt]cmd =0x44504543, len=96
4,140,952 >>> mbox cmd response data (56 bytes)
4,140,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,170,970 UART: [rt]cmd =0x44504543, len=96
4,203,673 >>> mbox cmd response data (56 bytes)
4,203,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,233,469 UART: [rt]cmd =0x44504543, len=96
4,265,109 >>> mbox cmd response data (56 bytes)
4,265,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,295,075 UART: [rt]cmd =0x44504543, len=96
4,327,506 >>> mbox cmd response data (56 bytes)
4,327,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,357,544 UART: [rt]cmd =0x44504543, len=96
4,391,636 >>> mbox cmd response data (56 bytes)
4,391,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,421,424 UART: [rt]cmd =0x44504543, len=96
4,454,715 >>> mbox cmd response data (56 bytes)
4,454,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,484,759 UART: [rt]cmd =0x44504543, len=96
4,517,535 >>> mbox cmd response data (56 bytes)
4,517,536 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,547,415 UART: [rt]cmd =0x44504543, len=96
4,580,480 >>> mbox cmd response data (56 bytes)
4,580,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,610,528 UART: [rt]cmd =0x44504543, len=96
4,642,754 >>> mbox cmd response data (56 bytes)
4,642,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,672,662 UART: [rt]cmd =0x44504543, len=96
4,705,559 >>> mbox cmd response data (56 bytes)
4,705,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,735,339 UART: [rt]cmd =0x44504543, len=96
4,768,669 >>> mbox cmd response data (56 bytes)
4,768,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,798,593 UART: [rt]cmd =0x44504543, len=96
4,831,248 >>> mbox cmd response data (56 bytes)
4,831,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,861,388 UART: [rt]cmd =0x44504543, len=96
4,894,812 >>> mbox cmd response data (56 bytes)
4,894,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,924,670 UART: [rt]cmd =0x44504543, len=96
4,957,501 >>> mbox cmd response data (56 bytes)
4,957,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,987,593 UART: [rt]cmd =0x44504543, len=96
5,021,069 >>> mbox cmd response data (56 bytes)
5,021,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,051,073 UART: [rt]cmd =0x44504543, len=96
5,084,296 >>> mbox cmd response data (56 bytes)
5,084,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,114,096 UART: [rt]cmd =0x44504543, len=96
5,147,818 >>> mbox cmd response data (56 bytes)
5,147,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,177,766 UART: [rt]cmd =0x44504543, len=96
5,210,893 >>> mbox cmd response data (56 bytes)
5,210,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,240,983 UART: [rt]cmd =0x44504543, len=96
5,248,364 >>> mbox cmd response: failed
5,248,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,278,118 UART: [rt]cmd =0x44504543, len=96
5,310,833 >>> mbox cmd response data (56 bytes)
5,310,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,340,965 UART: [rt]cmd =0x44504543, len=96
5,348,382 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 45.20s
Truncated 260626 bytes from beginning
4,345,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,375,295 UART: [rt]cmd =0x44504543, len=96
4,408,018 >>> mbox cmd response data (56 bytes)
4,408,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,437,886 UART: [rt]cmd =0x44504543, len=96
4,470,824 >>> mbox cmd response data (56 bytes)
4,470,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,500,904 UART: [rt]cmd =0x44504543, len=96
4,534,075 >>> mbox cmd response data (56 bytes)
4,534,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,564,003 UART: [rt]cmd =0x44504543, len=96
4,596,897 >>> mbox cmd response data (56 bytes)
4,596,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,626,877 UART: [rt]cmd =0x44504543, len=96
4,660,072 >>> mbox cmd response data (56 bytes)
4,660,073 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,689,900 UART: [rt]cmd =0x44504543, len=96
4,723,134 >>> mbox cmd response data (56 bytes)
4,723,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,753,252 UART: [rt]cmd =0x44504543, len=96
4,786,815 >>> mbox cmd response data (56 bytes)
4,786,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,816,535 UART: [rt]cmd =0x44504543, len=96
4,849,929 >>> mbox cmd response data (56 bytes)
4,849,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,879,953 UART: [rt]cmd =0x44504543, len=96
4,913,328 >>> mbox cmd response data (56 bytes)
4,913,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,943,124 UART: [rt]cmd =0x44504543, len=96
4,976,670 >>> mbox cmd response data (56 bytes)
4,976,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,006,674 UART: [rt]cmd =0x44504543, len=96
5,014,307 >>> mbox cmd response: failed
5,014,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,044,299 UART: [rt]cmd =0x44504543, len=96
5,077,416 >>> mbox cmd response data (56 bytes)
5,077,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,107,508 UART: [rt]cmd =0x44504543, len=96
5,140,319 >>> mbox cmd response data (56 bytes)
5,140,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,170,339 UART: [rt]cmd =0x44504543, len=96
5,177,928 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,363 ready_for_fw is high
1,060,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,728 >>> mbox cmd response: success
2,679,728 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,741,885 UART:
2,741,901 UART: Running Caliptra FMC ...
2,742,309 UART:
2,742,363 UART: [state] CFI Enabled
2,752,689 UART: [fht] FMC Alias Private Key: 7
2,872,029 UART: [art] Extend RT PCRs Done
2,872,457 UART: [art] Lock RT PCRs Done
2,874,235 UART: [art] Populate DV Done
2,882,222 UART: [fht] FMC Alias Private Key: 7
2,883,158 UART: [art] Derive CDI
2,883,438 UART: [art] Store in slot 0x4
2,969,293 UART: [art] Derive Key Pair
2,969,653 UART: [art] Store priv key in slot 0x5
2,983,235 UART: [art] Derive Key Pair - Done
2,997,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,522 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,287 UART: [art] PUB.X = A932E3C0856F1EFA619B26B89D72F132C4B96D9F542253F1FFD791E7603435AAFE298024AD86C721658492AAD4E4B294
3,021,059 UART: [art] PUB.Y = 1D79F11CBEDB49AD479C5F7E76E47FC74C34392C01867DCBC60B5C16A16B84FBB8681C893503BDEC72F21FE4788BD239
3,028,014 UART: [art] SIG.R = E2CC4B2BEF4CAA4203BFBE565BB8D897FBA3887754F7BD700B5604E98863F868FF3609E24836B0D68D48538A21D25EF2
3,034,782 UART: [art] SIG.S = DDBF2E8B7F002C6AA261D08C882DB21191A76227C91BF97521662A142D3A143315CC4D81C4D714BE37E27CDE975E09CF
3,058,887 UART: Caliptra RT
3,059,138 UART: [state] CFI Enabled
3,178,090 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,728 UART: [rt]cmd =0x52435458, len=8
3,210,638 >>> mbox cmd response data (16 bytes)
3,210,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,722 UART: [rt]cmd =0x44504543, len=96
3,273,644 >>> mbox cmd response data (56 bytes)
3,273,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,602 UART: [rt]cmd =0x44504543, len=96
3,337,186 >>> mbox cmd response data (56 bytes)
3,337,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,367,348 UART: [rt]cmd =0x44504543, len=96
3,399,465 >>> mbox cmd response data (56 bytes)
3,399,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,429,189 UART: [rt]cmd =0x44504543, len=96
3,462,215 >>> mbox cmd response data (56 bytes)
3,462,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,492,007 UART: [rt]cmd =0x44504543, len=96
3,525,604 >>> mbox cmd response data (56 bytes)
3,525,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,555,456 UART: [rt]cmd =0x44504543, len=96
3,588,490 >>> mbox cmd response data (56 bytes)
3,588,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,618,624 UART: [rt]cmd =0x44504543, len=96
3,651,303 >>> mbox cmd response data (56 bytes)
3,651,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,681,359 UART: [rt]cmd =0x44504543, len=96
3,714,175 >>> mbox cmd response data (56 bytes)
3,714,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,744,335 UART: [rt]cmd =0x44504543, len=96
3,777,488 >>> mbox cmd response data (56 bytes)
3,777,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,807,336 UART: [rt]cmd =0x44504543, len=96
3,840,098 >>> mbox cmd response data (56 bytes)
3,840,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,869,938 UART: [rt]cmd =0x44504543, len=96
3,902,651 >>> mbox cmd response data (56 bytes)
3,902,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,932,717 UART: [rt]cmd =0x44504543, len=96
3,965,409 >>> mbox cmd response data (56 bytes)
3,965,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,995,371 UART: [rt]cmd =0x44504543, len=96
4,029,254 >>> mbox cmd response data (56 bytes)
4,029,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,059,150 UART: [rt]cmd =0x44504543, len=96
4,092,840 >>> mbox cmd response data (56 bytes)
4,092,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,888 UART: [rt]cmd =0x44504543, len=96
4,157,105 >>> mbox cmd response data (56 bytes)
4,157,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,187,031 UART: [rt]cmd =0x44504543, len=96
4,220,013 >>> mbox cmd response data (56 bytes)
4,220,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,249,987 UART: [rt]cmd =0x44504543, len=96
4,283,006 >>> mbox cmd response data (56 bytes)
4,283,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,313,196 UART: [rt]cmd =0x44504543, len=96
4,345,778 >>> mbox cmd response data (56 bytes)
4,345,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,375,810 UART: [rt]cmd =0x44504543, len=96
4,409,741 >>> mbox cmd response data (56 bytes)
4,409,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,439,563 UART: [rt]cmd =0x44504543, len=96
4,472,545 >>> mbox cmd response data (56 bytes)
4,472,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,502,487 UART: [rt]cmd =0x44504543, len=96
4,535,782 >>> mbox cmd response data (56 bytes)
4,535,783 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,565,812 UART: [rt]cmd =0x44504543, len=96
4,599,650 >>> mbox cmd response data (56 bytes)
4,599,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,629,708 UART: [rt]cmd =0x44504543, len=96
4,662,921 >>> mbox cmd response data (56 bytes)
4,662,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,693,067 UART: [rt]cmd =0x44504543, len=96
4,725,715 >>> mbox cmd response data (56 bytes)
4,725,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,755,653 UART: [rt]cmd =0x44504543, len=96
4,788,716 >>> mbox cmd response data (56 bytes)
4,788,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,818,888 UART: [rt]cmd =0x44504543, len=96
4,852,014 >>> mbox cmd response data (56 bytes)
4,852,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,881,884 UART: [rt]cmd =0x44504543, len=96
4,914,905 >>> mbox cmd response data (56 bytes)
4,914,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,944,909 UART: [rt]cmd =0x44504543, len=96
4,978,345 >>> mbox cmd response data (56 bytes)
4,978,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,008,105 UART: [rt]cmd =0x44504543, len=96
5,041,096 >>> mbox cmd response data (56 bytes)
5,041,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,071,056 UART: [rt]cmd =0x44504543, len=96
5,078,391 >>> mbox cmd response: failed
5,078,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,301 UART: [rt]cmd =0x44504543, len=96
5,141,148 >>> mbox cmd response data (56 bytes)
5,141,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,171,154 UART: [rt]cmd =0x44504543, len=96
5,178,515 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 44.03s
Truncated 359656 bytes from beginning
2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
893,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,606 UART: [kat] ++
897,758 UART: [kat] sha1
902,212 UART: [kat] SHA2-256
904,152 UART: [kat] SHA2-384
906,925 UART: [kat] SHA2-512-ACC
908,826 UART: [kat] ECC-384
918,299 UART: [kat] HMAC-384Kdf
923,019 UART: [kat] LMS
1,171,347 UART: [kat] --
1,172,286 UART: [cold-reset] ++
1,172,678 UART: [fht] FHT @ 0x50003400
1,175,391 UART: [idev] ++
1,175,559 UART: [idev] CDI.KEYID = 6
1,175,919 UART: [idev] SUBJECT.KEYID = 7
1,176,343 UART: [idev] UDS.KEYID = 0
1,176,688 ready_for_fw is high
1,176,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,435 UART: [idev] Erasing UDS.KEYID = 0
1,201,448 UART: [idev] Sha1 KeyId Algorithm
1,209,890 UART: [idev] --
1,211,014 UART: [ldev] ++
1,211,182 UART: [ldev] CDI.KEYID = 6
1,211,545 UART: [ldev] SUBJECT.KEYID = 5
1,211,971 UART: [ldev] AUTHORITY.KEYID = 7
1,212,434 UART: [ldev] FE.KEYID = 1
1,217,774 UART: [ldev] Erasing FE.KEYID = 1
1,243,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,642 UART: [ldev] --
1,282,953 UART: [fwproc] Wait for Commands...
1,283,665 UART: [fwproc] Recv command 0x46574c44
1,284,393 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,901 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,071 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,248 >>> mbox cmd response: success
2,827,248 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,828,378 UART: [afmc] ++
2,828,546 UART: [afmc] CDI.KEYID = 6
2,828,908 UART: [afmc] SUBJECT.KEYID = 7
2,829,333 UART: [afmc] AUTHORITY.KEYID = 5
2,865,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,329 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,038 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,921 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,622 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,420 UART: [afmc] --
2,908,348 UART: [cold-reset] --
2,909,332 UART: [state] Locking Datavault
2,910,935 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,539 UART: [state] Locking ICCM
2,912,143 UART: [exit] Launching FMC @ 0x40000130
2,917,473 UART:
2,917,489 UART: Running Caliptra FMC ...
2,917,897 UART:
2,918,040 UART: [state] CFI Enabled
2,928,816 UART: [fht] FMC Alias Private Key: 7
3,047,698 UART: [art] Extend RT PCRs Done
3,048,126 UART: [art] Lock RT PCRs Done
3,050,040 UART: [art] Populate DV Done
3,058,087 UART: [fht] FMC Alias Private Key: 7
3,059,259 UART: [art] Derive CDI
3,059,539 UART: [art] Store in slot 0x4
3,145,324 UART: [art] Derive Key Pair
3,145,684 UART: [art] Store priv key in slot 0x5
3,158,568 UART: [art] Derive Key Pair - Done
3,173,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,084 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,849 UART: [art] PUB.X = FDAA7C12D42DC4BE000D8FCD5267F6C5B2E68DAF8DFD9B4BB9BA7F6581EF0AE90C7401BA72AEC9EAD44AC76C6039FD02
3,195,616 UART: [art] PUB.Y = 644C9980E73BFF85E7B295C9ACADCC63EE9F80672326A7339FD1BA7A747B9BB1C55EADDA65C95FDBF40A4236382741A6
3,202,579 UART: [art] SIG.R = A6736FCD7EFAA54930A6224910220B67E68A93EA5E4E333C0296E0EC8B8B18205BADBE8BB7FA1F4AD58D807D3809CD18
3,209,354 UART: [art] SIG.S = 950ED6CF7373744074D2889165AB4430145113F8ABF6EBC18ECEAA566A224FBB7E09A39C2DBB64FD2F72D5EF6EB5D48E
3,233,244 UART: Caliptra RT
3,233,587 UART: [state] CFI Enabled
3,353,201 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,805 UART: [rt]cmd =0x52435458, len=8
3,385,517 >>> mbox cmd response data (16 bytes)
3,385,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,503 UART: [rt]cmd =0x44504543, len=96
3,448,833 >>> mbox cmd response data (56 bytes)
3,448,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,697 UART: [rt]cmd =0x44504543, len=96
3,510,987 >>> mbox cmd response data (56 bytes)
3,510,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,871 UART: [rt]cmd =0x44504543, len=96
3,574,290 >>> mbox cmd response data (56 bytes)
3,574,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,254 UART: [rt]cmd =0x44504543, len=96
3,638,066 >>> mbox cmd response data (56 bytes)
3,638,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,784 UART: [rt]cmd =0x44504543, len=96
3,701,141 >>> mbox cmd response data (56 bytes)
3,701,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,967 UART: [rt]cmd =0x44504543, len=96
3,764,079 >>> mbox cmd response data (56 bytes)
3,764,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,794,223 UART: [rt]cmd =0x44504543, len=96
3,826,754 >>> mbox cmd response data (56 bytes)
3,826,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,700 UART: [rt]cmd =0x44504543, len=96
3,890,066 >>> mbox cmd response data (56 bytes)
3,890,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,919,870 UART: [rt]cmd =0x44504543, len=96
3,953,275 >>> mbox cmd response data (56 bytes)
3,953,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,983,141 UART: [rt]cmd =0x44504543, len=96
4,016,355 >>> mbox cmd response data (56 bytes)
4,016,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,046,459 UART: [rt]cmd =0x44504543, len=96
4,079,890 >>> mbox cmd response data (56 bytes)
4,079,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,109,888 UART: [rt]cmd =0x44504543, len=96
4,143,150 >>> mbox cmd response data (56 bytes)
4,143,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,173,042 UART: [rt]cmd =0x44504543, len=96
4,206,089 >>> mbox cmd response data (56 bytes)
4,206,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,236,049 UART: [rt]cmd =0x44504543, len=96
4,269,235 >>> mbox cmd response data (56 bytes)
4,269,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,299,199 UART: [rt]cmd =0x44504543, len=96
4,332,714 >>> mbox cmd response data (56 bytes)
4,332,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,362,866 UART: [rt]cmd =0x44504543, len=96
4,396,964 >>> mbox cmd response data (56 bytes)
4,396,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,426,728 UART: [rt]cmd =0x44504543, len=96
4,459,707 >>> mbox cmd response data (56 bytes)
4,459,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,489,607 UART: [rt]cmd =0x44504543, len=96
4,521,751 >>> mbox cmd response data (56 bytes)
4,521,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,551,799 UART: [rt]cmd =0x44504543, len=96
4,585,022 >>> mbox cmd response data (56 bytes)
4,585,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,614,958 UART: [rt]cmd =0x44504543, len=96
4,648,492 >>> mbox cmd response data (56 bytes)
4,648,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,678,438 UART: [rt]cmd =0x44504543, len=96
4,711,169 >>> mbox cmd response data (56 bytes)
4,711,170 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,741,279 UART: [rt]cmd =0x44504543, len=96
4,775,141 >>> mbox cmd response data (56 bytes)
4,775,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,805,021 UART: [rt]cmd =0x44504543, len=96
4,838,658 >>> mbox cmd response data (56 bytes)
4,838,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,868,622 UART: [rt]cmd =0x44504543, len=96
4,901,506 >>> mbox cmd response data (56 bytes)
4,901,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,931,356 UART: [rt]cmd =0x44504543, len=96
4,964,679 >>> mbox cmd response data (56 bytes)
4,964,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,994,675 UART: [rt]cmd =0x44504543, len=96
5,027,813 >>> mbox cmd response data (56 bytes)
5,027,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,057,851 UART: [rt]cmd =0x44504543, len=96
5,090,830 >>> mbox cmd response data (56 bytes)
5,090,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,120,818 UART: [rt]cmd =0x44504543, len=96
5,153,926 >>> mbox cmd response data (56 bytes)
5,153,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,184,094 UART: [rt]cmd =0x44504543, len=96
5,217,341 >>> mbox cmd response data (56 bytes)
5,217,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,247,423 UART: [rt]cmd =0x44504543, len=96
5,254,476 >>> mbox cmd response: failed
5,254,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,284,278 UART: [rt]cmd =0x44504543, len=96
5,316,859 >>> mbox cmd response data (56 bytes)
5,316,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,346,747 UART: [rt]cmd =0x44504543, len=96
5,354,092 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 44.90s
Truncated 260626 bytes from beginning
4,341,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,371,958 UART: [rt]cmd =0x44504543, len=96
4,404,573 >>> mbox cmd response data (56 bytes)
4,404,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,434,373 UART: [rt]cmd =0x44504543, len=96
4,467,247 >>> mbox cmd response data (56 bytes)
4,467,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,497,313 UART: [rt]cmd =0x44504543, len=96
4,530,306 >>> mbox cmd response data (56 bytes)
4,530,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,560,302 UART: [rt]cmd =0x44504543, len=96
4,593,966 >>> mbox cmd response data (56 bytes)
4,593,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,623,886 UART: [rt]cmd =0x44504543, len=96
4,657,249 >>> mbox cmd response data (56 bytes)
4,657,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,687,405 UART: [rt]cmd =0x44504543, len=96
4,721,419 >>> mbox cmd response data (56 bytes)
4,721,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,751,503 UART: [rt]cmd =0x44504543, len=96
4,784,618 >>> mbox cmd response data (56 bytes)
4,784,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,814,842 UART: [rt]cmd =0x44504543, len=96
4,847,494 >>> mbox cmd response data (56 bytes)
4,847,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,877,684 UART: [rt]cmd =0x44504543, len=96
4,910,751 >>> mbox cmd response data (56 bytes)
4,910,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,940,561 UART: [rt]cmd =0x44504543, len=96
4,972,943 >>> mbox cmd response data (56 bytes)
4,972,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,002,929 UART: [rt]cmd =0x44504543, len=96
5,010,322 >>> mbox cmd response: failed
5,010,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,040,372 UART: [rt]cmd =0x44504543, len=96
5,072,995 >>> mbox cmd response data (56 bytes)
5,072,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,102,895 UART: [rt]cmd =0x44504543, len=96
5,136,624 >>> mbox cmd response data (56 bytes)
5,136,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,166,542 UART: [rt]cmd =0x44504543, len=96
5,174,005 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,134 ready_for_fw is high
1,061,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,225 >>> mbox cmd response: success
2,680,225 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,742,746 UART:
2,742,762 UART: Running Caliptra FMC ...
2,743,170 UART:
2,743,313 UART: [state] CFI Enabled
2,753,743 UART: [fht] FMC Alias Private Key: 7
2,873,017 UART: [art] Extend RT PCRs Done
2,873,445 UART: [art] Lock RT PCRs Done
2,874,825 UART: [art] Populate DV Done
2,882,872 UART: [fht] FMC Alias Private Key: 7
2,883,842 UART: [art] Derive CDI
2,884,122 UART: [art] Store in slot 0x4
2,969,553 UART: [art] Derive Key Pair
2,969,913 UART: [art] Store priv key in slot 0x5
2,983,487 UART: [art] Derive Key Pair - Done
2,998,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,357 UART: [art] PUB.X = 580EDACB0B929438BB8B9202AB5C0A749F6761AB27E6DCC7A865A2CC4F69B703275CA097761DD48CA023C5D1E527CC09
3,021,121 UART: [art] PUB.Y = E160E9F61360125054C939BAE877CC827E796934320E41196CCEEC18BB58EC45CA2129575F8015602717A263FD27AAB1
3,028,064 UART: [art] SIG.R = 0A26EF601300146E9D59DAEDCE981F3E594706DB58A1ED956289482958905DFE686C6F797E781253E52231EC6E068EF1
3,034,801 UART: [art] SIG.S = 0EC77D044EC6A3F72226CBEE0656E2965B16678CA086E1E1AC554DD25F28D86181E980D35337A45BCEA59CA9A44C9D33
3,058,808 UART: Caliptra RT
3,059,151 UART: [state] CFI Enabled
3,179,729 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,207 UART: [rt]cmd =0x52435458, len=8
3,211,945 >>> mbox cmd response data (16 bytes)
3,211,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,969 UART: [rt]cmd =0x44504543, len=96
3,275,081 >>> mbox cmd response data (56 bytes)
3,275,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,855 UART: [rt]cmd =0x44504543, len=96
3,337,075 >>> mbox cmd response data (56 bytes)
3,337,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,367,067 UART: [rt]cmd =0x44504543, len=96
3,400,432 >>> mbox cmd response data (56 bytes)
3,400,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,226 UART: [rt]cmd =0x44504543, len=96
3,463,766 >>> mbox cmd response data (56 bytes)
3,463,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,493,790 UART: [rt]cmd =0x44504543, len=96
3,527,243 >>> mbox cmd response data (56 bytes)
3,527,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,031 UART: [rt]cmd =0x44504543, len=96
3,590,233 >>> mbox cmd response data (56 bytes)
3,590,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,620,349 UART: [rt]cmd =0x44504543, len=96
3,652,926 >>> mbox cmd response data (56 bytes)
3,652,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,682,816 UART: [rt]cmd =0x44504543, len=96
3,716,136 >>> mbox cmd response data (56 bytes)
3,716,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,746,156 UART: [rt]cmd =0x44504543, len=96
3,779,363 >>> mbox cmd response data (56 bytes)
3,779,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,809,339 UART: [rt]cmd =0x44504543, len=96
3,842,507 >>> mbox cmd response data (56 bytes)
3,842,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,872,617 UART: [rt]cmd =0x44504543, len=96
3,905,240 >>> mbox cmd response data (56 bytes)
3,905,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,935,286 UART: [rt]cmd =0x44504543, len=96
3,968,156 >>> mbox cmd response data (56 bytes)
3,968,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,997,944 UART: [rt]cmd =0x44504543, len=96
4,030,709 >>> mbox cmd response data (56 bytes)
4,030,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,060,841 UART: [rt]cmd =0x44504543, len=96
4,094,293 >>> mbox cmd response data (56 bytes)
4,094,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,077 UART: [rt]cmd =0x44504543, len=96
4,157,112 >>> mbox cmd response data (56 bytes)
4,157,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,186,944 UART: [rt]cmd =0x44504543, len=96
4,219,342 >>> mbox cmd response data (56 bytes)
4,219,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,249,216 UART: [rt]cmd =0x44504543, len=96
4,282,883 >>> mbox cmd response data (56 bytes)
4,282,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,312,685 UART: [rt]cmd =0x44504543, len=96
4,346,001 >>> mbox cmd response data (56 bytes)
4,346,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,375,963 UART: [rt]cmd =0x44504543, len=96
4,409,316 >>> mbox cmd response data (56 bytes)
4,409,317 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,439,152 UART: [rt]cmd =0x44504543, len=96
4,472,638 >>> mbox cmd response data (56 bytes)
4,472,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,502,628 UART: [rt]cmd =0x44504543, len=96
4,536,557 >>> mbox cmd response data (56 bytes)
4,536,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,566,401 UART: [rt]cmd =0x44504543, len=96
4,599,803 >>> mbox cmd response data (56 bytes)
4,599,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,629,725 UART: [rt]cmd =0x44504543, len=96
4,663,318 >>> mbox cmd response data (56 bytes)
4,663,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,693,302 UART: [rt]cmd =0x44504543, len=96
4,727,184 >>> mbox cmd response data (56 bytes)
4,727,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,757,114 UART: [rt]cmd =0x44504543, len=96
4,790,091 >>> mbox cmd response data (56 bytes)
4,790,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,819,799 UART: [rt]cmd =0x44504543, len=96
4,853,413 >>> mbox cmd response data (56 bytes)
4,853,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,883,551 UART: [rt]cmd =0x44504543, len=96
4,916,386 >>> mbox cmd response data (56 bytes)
4,916,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,946,180 UART: [rt]cmd =0x44504543, len=96
4,980,032 >>> mbox cmd response data (56 bytes)
4,980,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,010,046 UART: [rt]cmd =0x44504543, len=96
5,043,791 >>> mbox cmd response data (56 bytes)
5,043,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,073,639 UART: [rt]cmd =0x44504543, len=96
5,081,324 >>> mbox cmd response: failed
5,081,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,111,276 UART: [rt]cmd =0x44504543, len=96
5,143,663 >>> mbox cmd response data (56 bytes)
5,143,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,173,595 UART: [rt]cmd =0x44504543, len=96
5,180,902 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 44.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,031 UART:
192,410 UART: Running Caliptra ROM ...
193,582 UART:
193,738 UART: [state] CFI Enabled
267,987 UART: [state] LifecycleState = Unprovisioned
269,981 UART: [state] DebugLocked = No
272,721 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,883 UART: [kat] SHA2-256
446,544 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,084 UART: [kat] ++
457,625 UART: [kat] sha1
469,716 UART: [kat] SHA2-256
472,432 UART: [kat] SHA2-384
479,410 UART: [kat] SHA2-512-ACC
481,778 UART: [kat] ECC-384
2,768,492 UART: [kat] HMAC-384Kdf
2,801,150 UART: [kat] LMS
3,991,429 UART: [kat] --
3,996,874 UART: [cold-reset] ++
3,998,248 UART: [fht] Storing FHT @ 0x50003400
4,009,604 UART: [idev] ++
4,010,216 UART: [idev] CDI.KEYID = 6
4,011,150 UART: [idev] SUBJECT.KEYID = 7
4,012,334 UART: [idev] UDS.KEYID = 0
4,013,431 ready_for_fw is high
4,013,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,695 UART: [idev] Erasing UDS.KEYID = 0
7,346,809 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,922 UART: [idev] --
7,371,788 UART: [ldev] ++
7,372,363 UART: [ldev] CDI.KEYID = 6
7,373,300 UART: [ldev] SUBJECT.KEYID = 5
7,374,562 UART: [ldev] AUTHORITY.KEYID = 7
7,375,791 UART: [ldev] FE.KEYID = 1
7,422,972 UART: [ldev] Erasing FE.KEYID = 1
10,757,498 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,546 UART: [ldev] --
13,138,520 UART: [fwproc] Waiting for Commands...
13,141,154 UART: [fwproc] Received command 0x46574c44
13,143,333 UART: [fwproc] Received Image of size 118548 bytes
17,252,197 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,331,423 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,404,591 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,732,499 >>> mbox cmd response: success
17,733,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,736,913 UART: [afmc] ++
17,737,548 UART: [afmc] CDI.KEYID = 6
17,738,465 UART: [afmc] SUBJECT.KEYID = 7
17,739,681 UART: [afmc] AUTHORITY.KEYID = 5
21,113,870 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,413,474 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,415,753 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,430,143 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,444,905 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,459,291 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,481,602 UART: [afmc] --
23,485,674 UART: [cold-reset] --
23,490,187 UART: [state] Locking Datavault
23,495,490 UART: [state] Locking PCR0, PCR1 and PCR31
23,497,242 UART: [state] Locking ICCM
23,499,479 UART: [exit] Launching FMC @ 0x40000130
23,507,874 UART:
23,508,108 UART: Running Caliptra FMC ...
23,509,135 UART:
23,509,285 UART: [state] CFI Enabled
23,575,497 UART: [fht] FMC Alias Private Key: 7
25,915,371 UART: [art] Extend RT PCRs Done
25,916,616 UART: [art] Lock RT PCRs Done
25,918,434 UART: [art] Populate DV Done
25,923,760 UART: [fht] FMC Alias Private Key: 7
25,925,635 UART: [art] Derive CDI
25,926,389 UART: [art] Store in slot 0x4
25,983,541 UART: [art] Derive Key Pair
25,984,544 UART: [art] Store priv key in slot 0x5
29,277,547 UART: [art] Derive Key Pair - Done
29,290,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,579,487 UART: [art] Erasing AUTHORITY.KEYID = 7
31,580,999 UART: [art] PUB.X = 6BA3ABBD9FF656482C0702310D3C8F94BDECCF38B72BAA1D37C249BC5428FE888251B370C3B40D9F182992854664EBFC
31,588,266 UART: [art] PUB.Y = AAC76BC6F056BECDE6C31C2137911766FF160C7A47E144BF3F547F1EAE3BC74078B72375C884423B669DCBDF4339847E
31,595,565 UART: [art] SIG.R = D15CEAE2FEC0842C964C21B2B0C29B92AC49E862E704AB6CDE6C46068AFA44834CE552CBBA212082328302150DD97587
31,602,983 UART: [art] SIG.S = 91BE63C096A001BC3FD0A969DABFC87F4EAAAF61B405BBE10106E0469BA8D0B03BF6039F1E4A532403EAD2FDF4CAACB2
32,907,940 UART: Caliptra RT
32,908,656 UART: [state] CFI Enabled
33,085,352 UART: [rt] RT listening for mailbox commands...
33,117,362 UART: [rt]cmd =0x44504543, len=96
33,149,506 >>> mbox cmd response data (56 bytes)
33,150,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,180,863 UART: [rt]cmd =0x44504543, len=96
33,212,952 >>> mbox cmd response data (56 bytes)
33,213,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,244,391 UART: [rt]cmd =0x44504543, len=96
33,276,802 >>> mbox cmd response data (56 bytes)
33,277,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,307,878 UART: [rt]cmd =0x44504543, len=96
33,340,255 >>> mbox cmd response data (56 bytes)
33,340,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,371,425 UART: [rt]cmd =0x44504543, len=96
33,403,155 >>> mbox cmd response data (56 bytes)
33,403,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,434,467 UART: [rt]cmd =0x44504543, len=96
33,465,739 >>> mbox cmd response data (56 bytes)
33,466,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,497,110 UART: [rt]cmd =0x44504543, len=96
33,529,204 >>> mbox cmd response data (56 bytes)
33,529,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,560,562 UART: [rt]cmd =0x44504543, len=96
33,592,144 >>> mbox cmd response data (56 bytes)
33,592,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,623,355 UART: [rt]cmd =0x44504543, len=96
33,654,926 >>> mbox cmd response data (56 bytes)
33,655,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,686,140 UART: [rt]cmd =0x44504543, len=96
33,718,472 >>> mbox cmd response data (56 bytes)
33,719,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,749,631 UART: [rt]cmd =0x44504543, len=96
33,780,984 >>> mbox cmd response data (56 bytes)
33,781,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,812,343 UART: [rt]cmd =0x44504543, len=96
33,845,124 >>> mbox cmd response data (56 bytes)
33,846,410 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,876,144 UART: [rt]cmd =0x52435458, len=8
33,878,269 >>> mbox cmd response data (16 bytes)
35,951,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,102,418 UART:
36,102,783 UART: Running Caliptra ROM ...
36,103,834 UART:
36,103,987 UART: [state] CFI Enabled
36,167,901 UART: [state] LifecycleState = Unprovisioned
36,169,869 UART: [state] DebugLocked = No
36,171,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
36,177,062 UART: [kat] SHA2-256
36,346,777 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
36,357,239 UART: [kat] ++
36,357,887 UART: [kat] sha1
36,369,490 UART: [kat] SHA2-256
36,372,175 UART: [kat] SHA2-384
36,378,320 UART: [kat] SHA2-512-ACC
36,380,665 UART: [kat] ECC-384
38,669,225 UART: [kat] HMAC-384Kdf
38,682,284 UART: [kat] LMS
39,872,623 UART: [kat] --
39,877,651 UART: [update-reset] ++
44,065,619 UART: [update-reset] Image verified using Vendor ECC Key Index 0
44,069,521 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
44,467,264 >>> mbox cmd response: success
44,467,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,469,243 UART: [update-reset] Copying MAN_2 To MAN_1
44,491,658 UART: [update-reset Success] --
44,496,314 UART: [state] Locking Datavault
44,501,031 UART: [state] Locking PCR0, PCR1 and PCR31
44,502,790 UART: [state] Locking ICCM
44,504,455 UART: [exit] Launching FMC @ 0x40000130
44,512,905 UART:
44,513,135 UART: Running Caliptra FMC ...
44,514,233 UART:
44,514,405 UART: [state] CFI Enabled
44,610,161 UART: [art] Extend RT PCRs Done
44,611,344 UART: [art] Lock RT PCRs Done
44,612,799 UART: [art] Populate DV Done
44,618,364 UART: [fht] FMC Alias Private Key: 7
44,620,024 UART: [art] Derive CDI
44,620,839 UART: [art] Store in slot 0x4
44,679,312 UART: [art] Derive Key Pair
44,680,384 UART: [art] Store priv key in slot 0x5
47,973,276 UART: [art] Derive Key Pair - Done
47,986,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
50,274,379 UART: [art] Erasing AUTHORITY.KEYID = 7
50,275,904 UART: [art] PUB.X = 1EC9DAC70E49F7D43C0DD77F64B299D16CCCB80573F3B96B81D3D860A62C868A7A569AAE2B091B5698E3ADCE342B14CF
50,283,178 UART: [art] PUB.Y = 51470D74AD59C0DBEBD16FF7F08A7104FAF6FABECAD7817E309172953768E98C7D8DF414072C7B83F4CA6307C6C6BEA9
50,290,431 UART: [art] SIG.R = 3A82A9916B9416242CBB97AFB3D9793484592B649784D8D77C28813AAD600FF01C55B42BDE54AE8A777E0440CFFA9FBD
50,297,840 UART: [art] SIG.S = 3F7776ED6A8A9C506386D2FFB0CF7CF5D0A49912FAAFFFD15657A2793547DD56038956A1D20AD0447EA5887B3D55B7E1
51,602,800 UART: Caliptra RT
51,603,525 UART: [state] CFI Enabled
52,013,205 UART: [rt] RT listening for mailbox commands...
52,044,797 UART: [rt]cmd =0x44504543, len=96
52,076,985 >>> mbox cmd response data (56 bytes)
52,077,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,108,465 UART: [rt]cmd =0x44504543, len=96
52,140,639 >>> mbox cmd response data (56 bytes)
52,141,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,171,783 UART: [rt]cmd =0x44504543, len=96
52,203,834 >>> mbox cmd response data (56 bytes)
52,204,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,234,935 UART: [rt]cmd =0x44504543, len=96
52,267,231 >>> mbox cmd response data (56 bytes)
52,267,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,298,524 UART: [rt]cmd =0x44504543, len=96
52,330,656 >>> mbox cmd response data (56 bytes)
52,331,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,361,671 UART: [rt]cmd =0x44504543, len=96
52,393,803 >>> mbox cmd response data (56 bytes)
52,394,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,425,206 UART: [rt]cmd =0x44504543, len=96
52,457,263 >>> mbox cmd response data (56 bytes)
52,457,947 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,488,488 UART: [rt]cmd =0x44504543, len=96
52,520,323 >>> mbox cmd response data (56 bytes)
52,521,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,551,430 UART: [rt]cmd =0x44504543, len=96
52,583,193 >>> mbox cmd response data (56 bytes)
52,583,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,614,447 UART: [rt]cmd =0x44504543, len=96
52,646,644 >>> mbox cmd response data (56 bytes)
52,647,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,677,947 UART: [rt]cmd =0x44504543, len=96
52,684,836 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,784,364 ready_for_fw is high
3,784,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,944,570 >>> mbox cmd response: success
17,945,599 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,628,413 UART:
23,628,804 UART: Running Caliptra FMC ...
23,629,943 UART:
23,630,100 UART: [state] CFI Enabled
23,700,600 UART: [fht] FMC Alias Private Key: 7
26,041,495 UART: [art] Extend RT PCRs Done
26,042,738 UART: [art] Lock RT PCRs Done
26,044,256 UART: [art] Populate DV Done
26,049,790 UART: [fht] FMC Alias Private Key: 7
26,051,439 UART: [art] Derive CDI
26,052,254 UART: [art] Store in slot 0x4
26,109,964 UART: [art] Derive Key Pair
26,111,001 UART: [art] Store priv key in slot 0x5
29,403,803 UART: [art] Derive Key Pair - Done
29,417,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,706,233 UART: [art] Erasing AUTHORITY.KEYID = 7
31,707,741 UART: [art] PUB.X = B0205CBB296A7B4A4DD8E789BF9D1E0607D83D5FC554B7CB480DF54C4904F9DA41F3D5FFB4E4016425A3C40F589E876D
31,714,998 UART: [art] PUB.Y = 212AFF4CA6A4C221AE36CD26B794737A991372FCCEAB8FD963C78E145840F50E7D163FF8AB4A9E171C93670DB41EF31C
31,722,268 UART: [art] SIG.R = 09F0A34E2BACFD8E84D022028CC896946484C09B20EE5CA4C1BB977C0106BBF52CA9F080CC548784E837CD26218560AC
31,729,670 UART: [art] SIG.S = AAB1E208C943E569EA105AA6DB7B6476629DB18748F3E008731023939F9ABBDBC8BE15AA4363B8E0785AA0AD0AB68879
33,034,847 UART: Caliptra RT
33,035,549 UART: [state] CFI Enabled
33,213,758 UART: [rt] RT listening for mailbox commands...
33,245,959 UART: [rt]cmd =0x44504543, len=96
33,278,415 >>> mbox cmd response data (56 bytes)
33,279,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,310,100 UART: [rt]cmd =0x44504543, len=96
33,341,599 >>> mbox cmd response data (56 bytes)
33,342,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,372,968 UART: [rt]cmd =0x44504543, len=96
33,405,262 >>> mbox cmd response data (56 bytes)
33,405,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,436,535 UART: [rt]cmd =0x44504543, len=96
33,468,258 >>> mbox cmd response data (56 bytes)
33,468,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,499,490 UART: [rt]cmd =0x44504543, len=96
33,531,373 >>> mbox cmd response data (56 bytes)
33,532,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,562,521 UART: [rt]cmd =0x44504543, len=96
33,595,328 >>> mbox cmd response data (56 bytes)
33,596,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,626,429 UART: [rt]cmd =0x44504543, len=96
33,658,282 >>> mbox cmd response data (56 bytes)
33,658,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,689,450 UART: [rt]cmd =0x44504543, len=96
33,722,308 >>> mbox cmd response data (56 bytes)
33,722,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,753,319 UART: [rt]cmd =0x44504543, len=96
33,784,990 >>> mbox cmd response data (56 bytes)
33,785,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,816,163 UART: [rt]cmd =0x44504543, len=96
33,848,299 >>> mbox cmd response data (56 bytes)
33,849,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,879,555 UART: [rt]cmd =0x44504543, len=96
33,911,536 >>> mbox cmd response data (56 bytes)
33,912,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,943,004 UART: [rt]cmd =0x44504543, len=96
33,975,135 >>> mbox cmd response data (56 bytes)
33,976,414 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
34,006,267 UART: [rt]cmd =0x52435458, len=8
34,008,645 >>> mbox cmd response data (16 bytes)
36,082,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,908,439 >>> mbox cmd response: success
44,909,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,943,887 UART:
44,944,212 UART: Running Caliptra FMC ...
44,945,340 UART:
44,945,504 UART: [state] CFI Enabled
45,045,757 UART: [art] Extend RT PCRs Done
45,046,956 UART: [art] Lock RT PCRs Done
45,048,366 UART: [art] Populate DV Done
45,053,723 UART: [fht] FMC Alias Private Key: 7
45,055,261 UART: [art] Derive CDI
45,056,028 UART: [art] Store in slot 0x4
45,115,294 UART: [art] Derive Key Pair
45,116,325 UART: [art] Store priv key in slot 0x5
48,409,139 UART: [art] Derive Key Pair - Done
48,421,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
50,710,407 UART: [art] Erasing AUTHORITY.KEYID = 7
50,711,917 UART: [art] PUB.X = 254D4E6367CA85AA412B5DE7AC692863A6B526D5C9BB0808CD203AD69D164838DACED14E2E1015021E1D6C585E4818DB
50,719,174 UART: [art] PUB.Y = 06011C325CB24182D3B4938157D4649DC2A4035177753411C162D9A1580326869F7E8F9B211EC6966409D2D01C48C9A3
50,726,364 UART: [art] SIG.R = 886DF0742B9288FA066A60EB29FB9EFE9D55C6899374A049E0F3D5A2DA02339EDA9F94120F7E0A48C26E4CF875E9BBC8
50,733,816 UART: [art] SIG.S = D47DF61DD99D6B757168D22B01D5BA591D76E627F0B722CDC9540478462DABFC25BC1CF931D26EB61B4EEE2F845E0F39
52,039,190 UART: Caliptra RT
52,039,920 UART: [state] CFI Enabled
52,465,041 UART: [rt] RT listening for mailbox commands...
52,496,754 UART: [rt]cmd =0x44504543, len=96
52,529,211 >>> mbox cmd response data (56 bytes)
52,530,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,560,565 UART: [rt]cmd =0x44504543, len=96
52,592,839 >>> mbox cmd response data (56 bytes)
52,593,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,624,149 UART: [rt]cmd =0x44504543, len=96
52,656,440 >>> mbox cmd response data (56 bytes)
52,657,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,687,391 UART: [rt]cmd =0x44504543, len=96
52,718,831 >>> mbox cmd response data (56 bytes)
52,719,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,750,019 UART: [rt]cmd =0x44504543, len=96
52,781,944 >>> mbox cmd response data (56 bytes)
52,782,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,813,203 UART: [rt]cmd =0x44504543, len=96
52,845,818 >>> mbox cmd response data (56 bytes)
52,846,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,877,093 UART: [rt]cmd =0x44504543, len=96
52,909,529 >>> mbox cmd response data (56 bytes)
52,910,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,940,853 UART: [rt]cmd =0x44504543, len=96
52,972,980 >>> mbox cmd response data (56 bytes)
52,973,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
53,004,399 UART: [rt]cmd =0x44504543, len=96
53,036,776 >>> mbox cmd response data (56 bytes)
53,037,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
53,068,085 UART: [rt]cmd =0x44504543, len=96
53,099,842 >>> mbox cmd response data (56 bytes)
53,100,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
53,131,008 UART: [rt]cmd =0x44504543, len=96
53,137,880 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,573 UART:
192,924 UART: Running Caliptra ROM ...
194,101 UART:
603,640 UART: [state] CFI Enabled
616,397 UART: [state] LifecycleState = Unprovisioned
618,335 UART: [state] DebugLocked = No
620,998 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,518 UART: [kat] SHA2-256
795,243 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,773 UART: [kat] ++
806,302 UART: [kat] sha1
818,246 UART: [kat] SHA2-256
820,953 UART: [kat] SHA2-384
826,221 UART: [kat] SHA2-512-ACC
828,575 UART: [kat] ECC-384
3,110,644 UART: [kat] HMAC-384Kdf
3,122,369 UART: [kat] LMS
4,312,531 UART: [kat] --
4,318,893 UART: [cold-reset] ++
4,321,390 UART: [fht] Storing FHT @ 0x50003400
4,333,851 UART: [idev] ++
4,334,414 UART: [idev] CDI.KEYID = 6
4,335,391 UART: [idev] SUBJECT.KEYID = 7
4,336,628 UART: [idev] UDS.KEYID = 0
4,337,666 ready_for_fw is high
4,337,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,738 UART: [idev] Erasing UDS.KEYID = 0
7,622,519 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,816 UART: [idev] --
7,648,650 UART: [ldev] ++
7,649,210 UART: [ldev] CDI.KEYID = 6
7,650,145 UART: [ldev] SUBJECT.KEYID = 5
7,651,348 UART: [ldev] AUTHORITY.KEYID = 7
7,652,623 UART: [ldev] FE.KEYID = 1
7,664,786 UART: [ldev] Erasing FE.KEYID = 1
10,956,991 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,021 UART: [ldev] --
13,316,924 UART: [fwproc] Waiting for Commands...
13,319,767 UART: [fwproc] Received command 0x46574c44
13,321,995 UART: [fwproc] Received Image of size 118548 bytes
17,426,907 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,094 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,263 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,557 >>> mbox cmd response: success
17,899,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,903,470 UART: [afmc] ++
17,904,066 UART: [afmc] CDI.KEYID = 6
17,905,005 UART: [afmc] SUBJECT.KEYID = 7
17,906,220 UART: [afmc] AUTHORITY.KEYID = 5
21,221,451 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,165 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,423 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,867 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,581 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,993 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,262 UART: [afmc] --
23,585,947 UART: [cold-reset] --
23,588,027 UART: [state] Locking Datavault
23,592,839 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,530 UART: [state] Locking ICCM
23,596,833 UART: [exit] Launching FMC @ 0x40000130
23,605,225 UART:
23,605,456 UART: Running Caliptra FMC ...
23,606,554 UART:
23,606,706 UART: [state] CFI Enabled
23,615,501 UART: [fht] FMC Alias Private Key: 7
25,955,286 UART: [art] Extend RT PCRs Done
25,956,504 UART: [art] Lock RT PCRs Done
25,958,525 UART: [art] Populate DV Done
25,964,056 UART: [fht] FMC Alias Private Key: 7
25,965,537 UART: [art] Derive CDI
25,966,264 UART: [art] Store in slot 0x4
26,009,203 UART: [art] Derive Key Pair
26,010,245 UART: [art] Store priv key in slot 0x5
29,252,266 UART: [art] Derive Key Pair - Done
29,265,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,568 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,072 UART: [art] PUB.X = 12BCF0C0974855CA5A6F8A82F3A35ECF98FE4101A0300CA9D274533766C4991292343ECA2073F5BE4E0D272E407C5D52
31,554,331 UART: [art] PUB.Y = CBAD97427F3BB81FC6E513A4D73C892F787B5D127CD544E06072ED9B682ABBCD78DC71541C358D9D431B225AE1DEBE44
31,561,618 UART: [art] SIG.R = 69A5D124F75B45066106E6B52E0CFE95183AAA2277CD97A221F30AEC1986C22056AF4E211F59CF2BC5BDBD441EF520A2
31,569,003 UART: [art] SIG.S = 37AAAFE690FF4C83B16F9D6960A8F857F236A0F55984F99506801723FA0BC741FDEB33E3FE42BB3D17211ED924D2E97C
32,874,225 UART: Caliptra RT
32,874,943 UART: [state] CFI Enabled
33,007,226 UART: [rt] RT listening for mailbox commands...
33,039,765 UART: [rt]cmd =0x44504543, len=96
33,072,150 >>> mbox cmd response data (56 bytes)
33,073,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,103,620 UART: [rt]cmd =0x44504543, len=96
33,135,675 >>> mbox cmd response data (56 bytes)
33,136,371 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,166,895 UART: [rt]cmd =0x44504543, len=96
33,198,372 >>> mbox cmd response data (56 bytes)
33,199,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,229,789 UART: [rt]cmd =0x44504543, len=96
33,262,561 >>> mbox cmd response data (56 bytes)
33,263,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,293,797 UART: [rt]cmd =0x44504543, len=96
33,326,188 >>> mbox cmd response data (56 bytes)
33,326,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,357,237 UART: [rt]cmd =0x44504543, len=96
33,389,341 >>> mbox cmd response data (56 bytes)
33,390,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,420,426 UART: [rt]cmd =0x44504543, len=96
33,451,657 >>> mbox cmd response data (56 bytes)
33,452,344 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,482,865 UART: [rt]cmd =0x44504543, len=96
33,514,690 >>> mbox cmd response data (56 bytes)
33,515,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,545,860 UART: [rt]cmd =0x44504543, len=96
33,578,260 >>> mbox cmd response data (56 bytes)
33,578,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,609,589 UART: [rt]cmd =0x44504543, len=96
33,641,482 >>> mbox cmd response data (56 bytes)
33,642,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,672,863 UART: [rt]cmd =0x44504543, len=96
33,705,022 >>> mbox cmd response data (56 bytes)
33,705,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,736,255 UART: [rt]cmd =0x44504543, len=96
33,767,590 >>> mbox cmd response data (56 bytes)
33,768,936 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,798,880 UART: [rt]cmd =0x52435458, len=8
33,801,210 >>> mbox cmd response data (16 bytes)
35,877,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,028,727 UART:
36,029,113 UART: Running Caliptra ROM ...
36,030,247 UART:
36,030,418 UART: [state] CFI Enabled
36,042,964 UART: [state] LifecycleState = Unprovisioned
36,044,923 UART: [state] DebugLocked = No
36,047,008 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
36,052,549 UART: [kat] SHA2-256
36,222,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
36,232,816 UART: [kat] ++
36,233,301 UART: [kat] sha1
36,243,541 UART: [kat] SHA2-256
36,246,227 UART: [kat] SHA2-384
36,251,455 UART: [kat] SHA2-512-ACC
36,253,860 UART: [kat] ECC-384
38,538,950 UART: [kat] HMAC-384Kdf
38,549,687 UART: [kat] LMS
39,739,731 UART: [kat] --
39,744,160 UART: [update-reset] ++
43,936,451 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,939,901 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
44,337,652 >>> mbox cmd response: success
44,338,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,338,780 UART: [update-reset] Copying MAN_2 To MAN_1
44,361,211 UART: [update-reset Success] --
44,364,141 UART: [state] Locking Datavault
44,367,175 UART: [state] Locking PCR0, PCR1 and PCR31
44,368,917 UART: [state] Locking ICCM
44,371,313 UART: [exit] Launching FMC @ 0x40000130
44,379,725 UART:
44,380,003 UART: Running Caliptra FMC ...
44,381,113 UART:
44,381,268 UART: [state] CFI Enabled
44,425,274 UART: [art] Extend RT PCRs Done
44,426,413 UART: [art] Lock RT PCRs Done
44,427,744 UART: [art] Populate DV Done
44,433,140 UART: [fht] FMC Alias Private Key: 7
44,434,847 UART: [art] Derive CDI
44,435,654 UART: [art] Store in slot 0x4
44,478,084 UART: [art] Derive Key Pair
44,479,129 UART: [art] Store priv key in slot 0x5
47,720,827 UART: [art] Derive Key Pair - Done
47,733,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
50,014,177 UART: [art] Erasing AUTHORITY.KEYID = 7
50,015,686 UART: [art] PUB.X = BDE056EBAE1F856784BF7379087F3182E11E8566D2249EC112D1002D1E9A786CA52A0FF3695EA27D516D904ED7A92E39
50,022,949 UART: [art] PUB.Y = 6A00620EFD6EB2A88A9E4A3F292E6BFBBA21A835EF545DE58D548C8EFC857A7B42F499BA7E9342175BFECC09A335DA95
50,030,190 UART: [art] SIG.R = 3F746A8374DD51E4A53DB47F8E8AB247006F95034EDB2550CA8452BF1A09EE27488DA0B0A674BFCDA301975CBAFC60DD
50,037,584 UART: [art] SIG.S = 49443966D169FFAD09CFB4BDCD7DC1B3C2033B1FB96CF4BEAA4D53C0296DE01EDFF4B98DAF2F6CEFBBD255540A9D5FD7
51,343,580 UART: Caliptra RT
51,344,286 UART: [state] CFI Enabled
51,703,911 UART: [rt] RT listening for mailbox commands...
51,735,545 UART: [rt]cmd =0x44504543, len=96
51,767,605 >>> mbox cmd response data (56 bytes)
51,768,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
51,799,310 UART: [rt]cmd =0x44504543, len=96
51,831,392 >>> mbox cmd response data (56 bytes)
51,832,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
51,862,763 UART: [rt]cmd =0x44504543, len=96
51,894,883 >>> mbox cmd response data (56 bytes)
51,895,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
51,925,874 UART: [rt]cmd =0x44504543, len=96
51,957,538 >>> mbox cmd response data (56 bytes)
51,958,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
51,988,752 UART: [rt]cmd =0x44504543, len=96
52,020,742 >>> mbox cmd response data (56 bytes)
52,021,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,051,898 UART: [rt]cmd =0x44504543, len=96
52,083,705 >>> mbox cmd response data (56 bytes)
52,084,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,115,245 UART: [rt]cmd =0x44504543, len=96
52,146,459 >>> mbox cmd response data (56 bytes)
52,147,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,177,729 UART: [rt]cmd =0x44504543, len=96
52,210,341 >>> mbox cmd response data (56 bytes)
52,211,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,241,714 UART: [rt]cmd =0x44504543, len=96
52,273,114 >>> mbox cmd response data (56 bytes)
52,273,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,304,229 UART: [rt]cmd =0x44504543, len=96
52,335,838 >>> mbox cmd response data (56 bytes)
52,336,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,366,939 UART: [rt]cmd =0x44504543, len=96
52,373,714 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
4,127,566 ready_for_fw is high
4,128,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,408 >>> mbox cmd response: success
18,160,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,798,840 UART:
23,799,234 UART: Running Caliptra FMC ...
23,800,374 UART:
23,800,532 UART: [state] CFI Enabled
23,808,415 UART: [fht] FMC Alias Private Key: 7
26,148,391 UART: [art] Extend RT PCRs Done
26,149,606 UART: [art] Lock RT PCRs Done
26,151,340 UART: [art] Populate DV Done
26,156,704 UART: [fht] FMC Alias Private Key: 7
26,158,186 UART: [art] Derive CDI
26,158,939 UART: [art] Store in slot 0x4
26,201,204 UART: [art] Derive Key Pair
26,202,219 UART: [art] Store priv key in slot 0x5
29,443,650 UART: [art] Derive Key Pair - Done
29,457,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,197 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,714 UART: [art] PUB.X = 3AFE1769DFB5278569872DA041D8EFD3A3681B5FC536356ABDD62AC6ADFA6B8A6470C5EF9B431B1670313ECA35F161A5
31,745,982 UART: [art] PUB.Y = 89F3D262D570896DAF5445C6F86E77764807BCAE28C5C45F8FD42881237B24971E516C15EDB02CE5C8F6C25A0977BBAF
31,753,247 UART: [art] SIG.R = 74E0366A8421B801DD4200165DEED84D52D6CD7C00E883BB6D5A4AC9731D553EE4393417DD78C0768E6A30F1A56AE6F5
31,760,587 UART: [art] SIG.S = 1EEA5E98371B2CAD300FA4AEBCE4CE89B59276728591EF3914B4A0DA617667AF204E0FB5564C1A5900C8313166EAA5A6
33,065,807 UART: Caliptra RT
33,066,516 UART: [state] CFI Enabled
33,199,270 UART: [rt] RT listening for mailbox commands...
33,231,386 UART: [rt]cmd =0x44504543, len=96
33,263,672 >>> mbox cmd response data (56 bytes)
33,264,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,295,157 UART: [rt]cmd =0x44504543, len=96
33,327,124 >>> mbox cmd response data (56 bytes)
33,327,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,358,275 UART: [rt]cmd =0x44504543, len=96
33,390,062 >>> mbox cmd response data (56 bytes)
33,390,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,421,397 UART: [rt]cmd =0x44504543, len=96
33,453,505 >>> mbox cmd response data (56 bytes)
33,454,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,484,710 UART: [rt]cmd =0x44504543, len=96
33,516,486 >>> mbox cmd response data (56 bytes)
33,517,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,547,909 UART: [rt]cmd =0x44504543, len=96
33,580,595 >>> mbox cmd response data (56 bytes)
33,581,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,612,048 UART: [rt]cmd =0x44504543, len=96
33,643,467 >>> mbox cmd response data (56 bytes)
33,644,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,674,884 UART: [rt]cmd =0x44504543, len=96
33,707,600 >>> mbox cmd response data (56 bytes)
33,708,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,738,595 UART: [rt]cmd =0x44504543, len=96
33,769,967 >>> mbox cmd response data (56 bytes)
33,770,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,801,403 UART: [rt]cmd =0x44504543, len=96
33,833,429 >>> mbox cmd response data (56 bytes)
33,834,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,864,892 UART: [rt]cmd =0x44504543, len=96
33,896,849 >>> mbox cmd response data (56 bytes)
33,897,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,928,012 UART: [rt]cmd =0x44504543, len=96
33,960,338 >>> mbox cmd response data (56 bytes)
33,961,625 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,991,593 UART: [rt]cmd =0x52435458, len=8
33,993,720 >>> mbox cmd response data (16 bytes)
36,070,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,813,818 >>> mbox cmd response: success
44,814,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,850,519 UART:
44,850,791 UART: Running Caliptra FMC ...
44,851,903 UART:
44,852,058 UART: [state] CFI Enabled
44,896,581 UART: [art] Extend RT PCRs Done
44,897,769 UART: [art] Lock RT PCRs Done
44,899,381 UART: [art] Populate DV Done
44,904,964 UART: [fht] FMC Alias Private Key: 7
44,906,605 UART: [art] Derive CDI
44,907,368 UART: [art] Store in slot 0x4
44,950,019 UART: [art] Derive Key Pair
44,951,067 UART: [art] Store priv key in slot 0x5
48,193,382 UART: [art] Derive Key Pair - Done
48,206,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
50,486,639 UART: [art] Erasing AUTHORITY.KEYID = 7
50,488,159 UART: [art] PUB.X = 2FB64183025D11ED97BD5CC010077E5B13C3E6576730053E0C8D3B7DEDA4CB069EA3842C7F7ABDC96AC434E51CC6A8EF
50,495,464 UART: [art] PUB.Y = 65F6546A79F60BBE61B56327338C01E856B9B59B088284FE51E7FC969CADFE181B1871EC6BAC971E2338A9E020CCB7A0
50,502,686 UART: [art] SIG.R = E8DBD73BF3590C6A04B91F9D423E21038D9B6E185E4FF794E1FB9F3F0695C85381388EF66719314F76D550B0BAEFD10D
50,510,073 UART: [art] SIG.S = C65EE79DCE1906340D1E1ECF90557587D6ADA093B01DC5EFD4A4D13E61B33D57CF8AB94CD1B34B11118709B613AC9548
51,814,821 UART: Caliptra RT
51,815,517 UART: [state] CFI Enabled
52,178,587 UART: [rt] RT listening for mailbox commands...
52,210,221 UART: [rt]cmd =0x44504543, len=96
52,242,452 >>> mbox cmd response data (56 bytes)
52,243,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,273,937 UART: [rt]cmd =0x44504543, len=96
52,305,766 >>> mbox cmd response data (56 bytes)
52,306,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,336,923 UART: [rt]cmd =0x44504543, len=96
52,368,507 >>> mbox cmd response data (56 bytes)
52,369,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,399,526 UART: [rt]cmd =0x44504543, len=96
52,431,767 >>> mbox cmd response data (56 bytes)
52,432,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,462,799 UART: [rt]cmd =0x44504543, len=96
52,494,851 >>> mbox cmd response data (56 bytes)
52,495,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,525,902 UART: [rt]cmd =0x44504543, len=96
52,558,042 >>> mbox cmd response data (56 bytes)
52,558,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,589,320 UART: [rt]cmd =0x44504543, len=96
52,621,513 >>> mbox cmd response data (56 bytes)
52,622,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,652,706 UART: [rt]cmd =0x44504543, len=96
52,684,181 >>> mbox cmd response data (56 bytes)
52,684,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,715,501 UART: [rt]cmd =0x44504543, len=96
52,747,553 >>> mbox cmd response data (56 bytes)
52,748,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,778,760 UART: [rt]cmd =0x44504543, len=96
52,810,436 >>> mbox cmd response data (56 bytes)
52,811,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,841,603 UART: [rt]cmd =0x44504543, len=96
52,848,431 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,078 UART:
192,429 UART: Running Caliptra ROM ...
193,611 UART:
193,759 UART: [state] CFI Enabled
265,277 UART: [state] LifecycleState = Unprovisioned
267,239 UART: [state] DebugLocked = No
269,546 UART: [state] WD Timer not started. Device not locked for debugging
273,509 UART: [kat] SHA2-256
453,200 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,951 UART: [kat] ++
464,400 UART: [kat] sha1
475,798 UART: [kat] SHA2-256
478,462 UART: [kat] SHA2-384
484,093 UART: [kat] SHA2-512-ACC
486,458 UART: [kat] ECC-384
2,947,085 UART: [kat] HMAC-384Kdf
2,971,845 UART: [kat] LMS
3,448,321 UART: [kat] --
3,454,299 UART: [cold-reset] ++
3,455,443 UART: [fht] FHT @ 0x50003400
3,466,699 UART: [idev] ++
3,467,261 UART: [idev] CDI.KEYID = 6
3,468,286 UART: [idev] SUBJECT.KEYID = 7
3,469,465 UART: [idev] UDS.KEYID = 0
3,470,392 ready_for_fw is high
3,470,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,723 UART: [idev] Erasing UDS.KEYID = 0
5,988,204 UART: [idev] Sha1 KeyId Algorithm
6,010,846 UART: [idev] --
6,015,273 UART: [ldev] ++
6,015,842 UART: [ldev] CDI.KEYID = 6
6,016,807 UART: [ldev] SUBJECT.KEYID = 5
6,017,965 UART: [ldev] AUTHORITY.KEYID = 7
6,019,244 UART: [ldev] FE.KEYID = 1
6,058,562 UART: [ldev] Erasing FE.KEYID = 1
8,567,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,692 UART: [ldev] --
10,374,779 UART: [fwproc] Wait for Commands...
10,376,928 UART: [fwproc] Recv command 0x46574c44
10,378,926 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,989 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,044 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,846 >>> mbox cmd response: success
14,348,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,352,627 UART: [afmc] ++
14,353,205 UART: [afmc] CDI.KEYID = 6
14,354,166 UART: [afmc] SUBJECT.KEYID = 7
14,355,430 UART: [afmc] AUTHORITY.KEYID = 5
16,896,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,823 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,002 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,795 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,884 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,449 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,348 UART: [afmc] --
18,716,538 UART: [cold-reset] --
18,720,403 UART: [state] Locking Datavault
18,724,778 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,473 UART: [state] Locking ICCM
18,727,647 UART: [exit] Launching FMC @ 0x40000130
18,736,035 UART:
18,736,269 UART: Running Caliptra FMC ...
18,737,364 UART:
18,737,521 UART: [state] CFI Enabled
18,794,972 UART: [fht] FMC Alias Private Key: 7
20,561,356 UART: [art] Extend RT PCRs Done
20,562,575 UART: [art] Lock RT PCRs Done
20,564,435 UART: [art] Populate DV Done
20,569,733 UART: [fht] FMC Alias Private Key: 7
20,571,376 UART: [art] Derive CDI
20,572,203 UART: [art] Store in slot 0x4
20,627,983 UART: [art] Derive Key Pair
20,629,022 UART: [art] Store priv key in slot 0x5
23,091,875 UART: [art] Derive Key Pair - Done
23,104,924 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,829 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,308 UART: [art] PUB.X = FBF97FD8B9DFFDAD7C896CC459BD1C092C13400E619BE2DAFD91F629740BB851A61F5DA268603EBCF0FBED54343808B2
24,826,655 UART: [art] PUB.Y = 951216964653D0ACF52A46101B1F0F22DA23FEF8D1C457D85F6205F8C8A9735617F0EB23CB327D1AB016F606EDF010A5
24,833,939 UART: [art] SIG.R = 3FE20CCB5762D693C27861824E235717D31312B686EF0BAE1870235DD0669D8AEDE937FCF2561B048E7FF5868E2CB9E7
24,841,375 UART: [art] SIG.S = 44CFB9A43A14D7FF5D599FCEB6B7EF00FD8D394195337AAE83ACA9722E3936AD2605E26A7A9093FD7173975528B29338
25,819,938 UART: Caliptra RT
25,820,652 UART: [state] CFI Enabled
26,001,625 UART: [rt] RT listening for mailbox commands...
26,033,536 UART: [rt]cmd =0x44504543, len=96
26,065,468 >>> mbox cmd response data (56 bytes)
26,066,402 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,096,778 UART: [rt]cmd =0x44504543, len=96
26,128,766 >>> mbox cmd response data (56 bytes)
26,129,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,159,940 UART: [rt]cmd =0x44504543, len=96
26,191,147 >>> mbox cmd response data (56 bytes)
26,191,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,222,316 UART: [rt]cmd =0x44504543, len=96
26,254,686 >>> mbox cmd response data (56 bytes)
26,255,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,285,894 UART: [rt]cmd =0x44504543, len=96
26,317,784 >>> mbox cmd response data (56 bytes)
26,318,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,348,990 UART: [rt]cmd =0x44504543, len=96
26,380,632 >>> mbox cmd response data (56 bytes)
26,381,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,411,939 UART: [rt]cmd =0x44504543, len=96
26,443,898 >>> mbox cmd response data (56 bytes)
26,444,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,475,197 UART: [rt]cmd =0x44504543, len=96
26,507,377 >>> mbox cmd response data (56 bytes)
26,508,053 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,538,714 UART: [rt]cmd =0x44504543, len=96
26,570,766 >>> mbox cmd response data (56 bytes)
26,571,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,601,779 UART: [rt]cmd =0x44504543, len=96
26,634,205 >>> mbox cmd response data (56 bytes)
26,634,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,665,352 UART: [rt]cmd =0x44504543, len=96
26,697,584 >>> mbox cmd response data (56 bytes)
26,698,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,728,988 UART: [rt]cmd =0x44504543, len=96
26,761,334 >>> mbox cmd response data (56 bytes)
26,762,481 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,792,261 UART: [rt]cmd =0x52435458, len=8
26,794,429 >>> mbox cmd response data (16 bytes)
28,850,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,001,483 UART:
29,001,854 UART: Running Caliptra ROM ...
29,002,908 UART:
29,003,061 UART: [state] CFI Enabled
29,058,601 UART: [state] LifecycleState = Unprovisioned
29,060,557 UART: [state] DebugLocked = No
29,063,398 UART: [state] WD Timer not started. Device not locked for debugging
29,066,921 UART: [kat] SHA2-256
29,246,619 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
29,257,391 UART: [kat] ++
29,257,926 UART: [kat] sha1
29,269,140 UART: [kat] SHA2-256
29,271,839 UART: [kat] SHA2-384
29,277,665 UART: [kat] SHA2-512-ACC
29,280,061 UART: [kat] ECC-384
31,721,505 UART: [kat] HMAC-384Kdf
31,745,363 UART: [kat] LMS
32,221,864 UART: [kat] --
32,226,122 UART: [update-reset] ++
35,722,723 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,726,926 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,124,548 >>> mbox cmd response: success
36,125,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
36,125,875 UART: [update-reset] Copying MAN_2 To MAN_1
36,163,017 UART: [update-reset Success] --
36,167,684 UART: [state] Locking Datavault
36,170,930 UART: [state] Locking PCR0, PCR1 and PCR31
36,172,654 UART: [state] Locking ICCM
36,174,776 UART: [exit] Launching FMC @ 0x40000130
36,183,161 UART:
36,183,388 UART: Running Caliptra FMC ...
36,184,410 UART:
36,184,553 UART: [state] CFI Enabled
36,279,415 UART: [art] Extend RT PCRs Done
36,280,611 UART: [art] Lock RT PCRs Done
36,281,875 UART: [art] Populate DV Done
36,287,123 UART: [fht] FMC Alias Private Key: 7
36,288,822 UART: [art] Derive CDI
36,289,632 UART: [art] Store in slot 0x4
36,348,425 UART: [art] Derive Key Pair
36,349,445 UART: [art] Store priv key in slot 0x5
38,812,648 UART: [art] Derive Key Pair - Done
38,825,275 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,538,662 UART: [art] Erasing AUTHORITY.KEYID = 7
40,540,167 UART: [art] PUB.X = 475F758C3D6D0BFC70CCA8034C8ABE4BA982B89B77047EDD86A2104364E50AF343ACE2E7FA93AFA8231F52BD140200E0
40,547,428 UART: [art] PUB.Y = 8F789200E65D0D286315D6E44DC13EF11E0712B6ED25A756FF04D03DFA34A4438436881E7453DE1180226D069FA492F4
40,554,663 UART: [art] SIG.R = D9FF25D9D61DF8093824742BCD90E09CBCA382FABE8B9E5E2334EE23E5AE12C89CE10DBE290DDC175561B423E368C75F
40,562,060 UART: [art] SIG.S = 5B79DB81F94BF0E344D96C4546C37D59E48984D3E4C418B0FD6907C3E4B160D6E2B47D9CE109B5D0F432B148E620616A
41,541,600 UART: Caliptra RT
41,542,283 UART: [state] CFI Enabled
41,943,300 UART: [rt] RT listening for mailbox commands...
41,974,992 UART: [rt]cmd =0x44504543, len=96
42,006,981 >>> mbox cmd response data (56 bytes)
42,007,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,038,484 UART: [rt]cmd =0x44504543, len=96
42,070,532 >>> mbox cmd response data (56 bytes)
42,071,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,101,774 UART: [rt]cmd =0x44504543, len=96
42,133,812 >>> mbox cmd response data (56 bytes)
42,134,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,165,228 UART: [rt]cmd =0x44504543, len=96
42,196,585 >>> mbox cmd response data (56 bytes)
42,197,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,227,902 UART: [rt]cmd =0x44504543, len=96
42,260,301 >>> mbox cmd response data (56 bytes)
42,260,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,291,677 UART: [rt]cmd =0x44504543, len=96
42,323,782 >>> mbox cmd response data (56 bytes)
42,324,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,355,057 UART: [rt]cmd =0x44504543, len=96
42,386,566 >>> mbox cmd response data (56 bytes)
42,387,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,417,692 UART: [rt]cmd =0x44504543, len=96
42,450,036 >>> mbox cmd response data (56 bytes)
42,450,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,481,443 UART: [rt]cmd =0x44504543, len=96
42,513,615 >>> mbox cmd response data (56 bytes)
42,514,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,544,984 UART: [rt]cmd =0x44504543, len=96
42,577,409 >>> mbox cmd response data (56 bytes)
42,578,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,608,414 UART: [rt]cmd =0x44504543, len=96
42,615,278 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,462,044 ready_for_fw is high
3,462,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,100 >>> mbox cmd response: success
14,240,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,532,077 UART:
18,532,499 UART: Running Caliptra FMC ...
18,533,601 UART:
18,533,752 UART: [state] CFI Enabled
18,601,140 UART: [fht] FMC Alias Private Key: 7
20,367,956 UART: [art] Extend RT PCRs Done
20,369,180 UART: [art] Lock RT PCRs Done
20,370,767 UART: [art] Populate DV Done
20,376,130 UART: [fht] FMC Alias Private Key: 7
20,377,733 UART: [art] Derive CDI
20,378,544 UART: [art] Store in slot 0x4
20,433,948 UART: [art] Derive Key Pair
20,434,983 UART: [art] Store priv key in slot 0x5
22,897,624 UART: [art] Derive Key Pair - Done
22,910,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,241 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,755 UART: [art] PUB.X = 4BB3DAF53FFAE92DC9746414DA27158617B64DB04D207C196F03421AB4523B3EFD848842C9B4E213FF3C5320BD69BB93
24,632,011 UART: [art] PUB.Y = 5F2EA6183FE014BB2D35AD66EB6218A8E465BB33E36AF7D58C9A41FE41862A1DCB4D35647099B9FD214CA5282CF4F8FF
24,639,259 UART: [art] SIG.R = A9F3C047364A9F71209DE1EEC2EB3077284A7CEB1697C960008854E80742EF8295E71C0C17AF67596CEA49F4914776D8
24,646,653 UART: [art] SIG.S = 4CC2C50027E321C74D5DCDBFBF4DAE44E2612B6A84CF3140FC48099EE83302FE8020A4515807E7BCEB42D93D29754333
25,626,106 UART: Caliptra RT
25,626,807 UART: [state] CFI Enabled
25,806,341 UART: [rt] RT listening for mailbox commands...
25,838,522 UART: [rt]cmd =0x44504543, len=96
25,869,889 >>> mbox cmd response data (56 bytes)
25,870,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,901,462 UART: [rt]cmd =0x44504543, len=96
25,933,590 >>> mbox cmd response data (56 bytes)
25,934,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,964,678 UART: [rt]cmd =0x44504543, len=96
25,996,306 >>> mbox cmd response data (56 bytes)
25,997,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,027,322 UART: [rt]cmd =0x44504543, len=96
26,058,501 >>> mbox cmd response data (56 bytes)
26,059,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,089,910 UART: [rt]cmd =0x44504543, len=96
26,122,662 >>> mbox cmd response data (56 bytes)
26,123,397 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,154,145 UART: [rt]cmd =0x44504543, len=96
26,185,940 >>> mbox cmd response data (56 bytes)
26,186,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,217,204 UART: [rt]cmd =0x44504543, len=96
26,248,819 >>> mbox cmd response data (56 bytes)
26,249,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,279,776 UART: [rt]cmd =0x44504543, len=96
26,311,897 >>> mbox cmd response data (56 bytes)
26,312,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,343,217 UART: [rt]cmd =0x44504543, len=96
26,375,915 >>> mbox cmd response data (56 bytes)
26,376,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,407,271 UART: [rt]cmd =0x44504543, len=96
26,439,393 >>> mbox cmd response data (56 bytes)
26,440,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,470,851 UART: [rt]cmd =0x44504543, len=96
26,502,969 >>> mbox cmd response data (56 bytes)
26,503,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,534,337 UART: [rt]cmd =0x44504543, len=96
26,566,227 >>> mbox cmd response data (56 bytes)
26,567,350 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,597,198 UART: [rt]cmd =0x52435458, len=8
26,599,404 >>> mbox cmd response data (16 bytes)
28,654,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,957,392 >>> mbox cmd response: success
35,958,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,991,318 UART:
35,991,612 UART: Running Caliptra FMC ...
35,992,646 UART:
35,992,792 UART: [state] CFI Enabled
36,081,580 UART: [art] Extend RT PCRs Done
36,082,801 UART: [art] Lock RT PCRs Done
36,084,180 UART: [art] Populate DV Done
36,089,589 UART: [fht] FMC Alias Private Key: 7
36,091,073 UART: [art] Derive CDI
36,091,913 UART: [art] Store in slot 0x4
36,150,948 UART: [art] Derive Key Pair
36,152,004 UART: [art] Store priv key in slot 0x5
38,613,958 UART: [art] Derive Key Pair - Done
38,627,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,340,076 UART: [art] Erasing AUTHORITY.KEYID = 7
40,341,583 UART: [art] PUB.X = 32338E30F25A7C38F7BA9D8D317F4B00ABF626C504941C7090434EF829406CD999B35D127399303C77F191C1308E6FC0
40,348,840 UART: [art] PUB.Y = 2FC2BECFC45F1CFB3ADEE01B1169441B617EE06FA23D455AD293E489770C30F5B5AC5DFEC40C5296878F634F6530A24D
40,356,076 UART: [art] SIG.R = 35ACAC3CF2C0785FED4E2662039EA4D962CABBFEC1D77AE89F98578F5D637ECDBE5C4F036E31EC69F2874E86D5F200D3
40,363,482 UART: [art] SIG.S = 3B4E3BE78AFAA34A9C1457E8B9087CDBCE381A4633D5B7C8639A813ABA09ADE7A7CDCF1D3D7620380B68240C06274D00
41,341,922 UART: Caliptra RT
41,342,607 UART: [state] CFI Enabled
41,752,559 UART: [rt] RT listening for mailbox commands...
41,784,169 UART: [rt]cmd =0x44504543, len=96
41,816,262 >>> mbox cmd response data (56 bytes)
41,817,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,847,626 UART: [rt]cmd =0x44504543, len=96
41,880,474 >>> mbox cmd response data (56 bytes)
41,881,208 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,911,793 UART: [rt]cmd =0x44504543, len=96
41,943,750 >>> mbox cmd response data (56 bytes)
41,944,429 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,975,144 UART: [rt]cmd =0x44504543, len=96
42,007,079 >>> mbox cmd response data (56 bytes)
42,007,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,038,428 UART: [rt]cmd =0x44504543, len=96
42,071,128 >>> mbox cmd response data (56 bytes)
42,071,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,102,353 UART: [rt]cmd =0x44504543, len=96
42,134,112 >>> mbox cmd response data (56 bytes)
42,134,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,165,372 UART: [rt]cmd =0x44504543, len=96
42,197,372 >>> mbox cmd response data (56 bytes)
42,198,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,228,572 UART: [rt]cmd =0x44504543, len=96
42,260,735 >>> mbox cmd response data (56 bytes)
42,261,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,291,954 UART: [rt]cmd =0x44504543, len=96
42,323,706 >>> mbox cmd response data (56 bytes)
42,324,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,355,002 UART: [rt]cmd =0x44504543, len=96
42,387,550 >>> mbox cmd response data (56 bytes)
42,388,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,418,757 UART: [rt]cmd =0x44504543, len=96
42,425,802 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,597 UART:
192,951 UART: Running Caliptra ROM ...
194,133 UART:
603,711 UART: [state] CFI Enabled
618,928 UART: [state] LifecycleState = Unprovisioned
620,841 UART: [state] DebugLocked = No
622,827 UART: [state] WD Timer not started. Device not locked for debugging
626,586 UART: [kat] SHA2-256
806,193 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,998 UART: [kat] ++
817,487 UART: [kat] sha1
828,575 UART: [kat] SHA2-256
831,237 UART: [kat] SHA2-384
835,814 UART: [kat] SHA2-512-ACC
838,185 UART: [kat] ECC-384
3,277,612 UART: [kat] HMAC-384Kdf
3,289,268 UART: [kat] LMS
3,765,784 UART: [kat] --
3,769,567 UART: [cold-reset] ++
3,770,644 UART: [fht] FHT @ 0x50003400
3,782,688 UART: [idev] ++
3,783,260 UART: [idev] CDI.KEYID = 6
3,784,311 UART: [idev] SUBJECT.KEYID = 7
3,785,495 UART: [idev] UDS.KEYID = 0
3,786,422 ready_for_fw is high
3,786,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,491 UART: [idev] Erasing UDS.KEYID = 0
6,259,398 UART: [idev] Sha1 KeyId Algorithm
6,282,632 UART: [idev] --
6,287,141 UART: [ldev] ++
6,287,752 UART: [ldev] CDI.KEYID = 6
6,288,644 UART: [ldev] SUBJECT.KEYID = 5
6,289,747 UART: [ldev] AUTHORITY.KEYID = 7
6,290,924 UART: [ldev] FE.KEYID = 1
6,302,595 UART: [ldev] Erasing FE.KEYID = 1
8,781,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,537 UART: [ldev] --
10,574,696 UART: [fwproc] Wait for Commands...
10,576,905 UART: [fwproc] Recv command 0x46574c44
10,578,947 UART: [fwproc] Recv'd Img size: 118548 bytes
14,056,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,138,042 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,211,047 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,539,345 >>> mbox cmd response: success
14,540,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,544,303 UART: [afmc] ++
14,544,897 UART: [afmc] CDI.KEYID = 6
14,545,870 UART: [afmc] SUBJECT.KEYID = 7
14,547,031 UART: [afmc] AUTHORITY.KEYID = 5
17,053,332 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,773,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,775,310 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,791,126 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,807,201 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,822,785 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,846,512 UART: [afmc] --
18,850,741 UART: [cold-reset] --
18,854,251 UART: [state] Locking Datavault
18,860,046 UART: [state] Locking PCR0, PCR1 and PCR31
18,861,759 UART: [state] Locking ICCM
18,863,456 UART: [exit] Launching FMC @ 0x40000130
18,871,905 UART:
18,872,142 UART: Running Caliptra FMC ...
18,873,168 UART:
18,873,316 UART: [state] CFI Enabled
18,881,420 UART: [fht] FMC Alias Private Key: 7
20,647,634 UART: [art] Extend RT PCRs Done
20,648,863 UART: [art] Lock RT PCRs Done
20,650,806 UART: [art] Populate DV Done
20,656,176 UART: [fht] FMC Alias Private Key: 7
20,657,879 UART: [art] Derive CDI
20,658,618 UART: [art] Store in slot 0x4
20,700,891 UART: [art] Derive Key Pair
20,701,934 UART: [art] Store priv key in slot 0x5
23,128,785 UART: [art] Derive Key Pair - Done
23,141,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,847,796 UART: [art] Erasing AUTHORITY.KEYID = 7
24,849,297 UART: [art] PUB.X = D33DFC20CDA83A715EA99968A1DF96DC6F46F4796813D6A835D6242E00A556D14EF74B467DF2D2CFC25693F799F2DF05
24,856,546 UART: [art] PUB.Y = F1252FB665D3F30728FB4379D2DDC325D8E209C4A3CC00C97A694B72B63D9FA9355928E18116032A2C447BBAADEF20D0
24,863,775 UART: [art] SIG.R = 52BBBC680F4B19B98BFD6AFCC3D6D29FA3B6896F5CEC1D5D306E460E2E90BC8088AB7212B347244BAA501641DB746785
24,871,217 UART: [art] SIG.S = 1DBAB2960F1807554398D234DF34CA7CC76503AF0164145D206F93390A6333A1B462A356DCD3D75A2C327C7C30B0A973
25,849,946 UART: Caliptra RT
25,850,675 UART: [state] CFI Enabled
25,984,550 UART: [rt] RT listening for mailbox commands...
26,016,502 UART: [rt]cmd =0x44504543, len=96
26,047,863 >>> mbox cmd response data (56 bytes)
26,048,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,079,225 UART: [rt]cmd =0x44504543, len=96
26,111,355 >>> mbox cmd response data (56 bytes)
26,112,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,142,644 UART: [rt]cmd =0x44504543, len=96
26,174,262 >>> mbox cmd response data (56 bytes)
26,174,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,205,320 UART: [rt]cmd =0x44504543, len=96
26,237,225 >>> mbox cmd response data (56 bytes)
26,237,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,268,544 UART: [rt]cmd =0x44504543, len=96
26,299,817 >>> mbox cmd response data (56 bytes)
26,300,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,331,042 UART: [rt]cmd =0x44504543, len=96
26,363,174 >>> mbox cmd response data (56 bytes)
26,363,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,394,619 UART: [rt]cmd =0x44504543, len=96
26,426,187 >>> mbox cmd response data (56 bytes)
26,426,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,457,585 UART: [rt]cmd =0x44504543, len=96
26,489,577 >>> mbox cmd response data (56 bytes)
26,490,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,520,852 UART: [rt]cmd =0x44504543, len=96
26,552,278 >>> mbox cmd response data (56 bytes)
26,553,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,583,488 UART: [rt]cmd =0x44504543, len=96
26,615,410 >>> mbox cmd response data (56 bytes)
26,616,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,646,677 UART: [rt]cmd =0x44504543, len=96
26,678,479 >>> mbox cmd response data (56 bytes)
26,679,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,709,801 UART: [rt]cmd =0x44504543, len=96
26,741,421 >>> mbox cmd response data (56 bytes)
26,742,487 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,772,548 UART: [rt]cmd =0x52435458, len=8
26,774,913 >>> mbox cmd response data (16 bytes)
28,830,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,981,208 UART:
28,981,580 UART: Running Caliptra ROM ...
28,982,634 UART:
28,982,810 UART: [state] CFI Enabled
28,998,280 UART: [state] LifecycleState = Unprovisioned
29,000,188 UART: [state] DebugLocked = No
29,002,827 UART: [state] WD Timer not started. Device not locked for debugging
29,006,580 UART: [kat] SHA2-256
29,186,310 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
29,197,104 UART: [kat] ++
29,197,648 UART: [kat] sha1
29,208,704 UART: [kat] SHA2-256
29,211,393 UART: [kat] SHA2-384
29,217,647 UART: [kat] SHA2-512-ACC
29,220,002 UART: [kat] ECC-384
31,662,686 UART: [kat] HMAC-384Kdf
31,675,941 UART: [kat] LMS
32,152,414 UART: [kat] --
32,158,188 UART: [update-reset] ++
35,652,523 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,656,331 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,053,938 >>> mbox cmd response: success
36,054,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
36,055,499 UART: [update-reset] Copying MAN_2 To MAN_1
36,092,583 UART: [update-reset Success] --
36,096,658 UART: [state] Locking Datavault
36,100,406 UART: [state] Locking PCR0, PCR1 and PCR31
36,102,145 UART: [state] Locking ICCM
36,103,762 UART: [exit] Launching FMC @ 0x40000130
36,112,109 UART:
36,112,351 UART: Running Caliptra FMC ...
36,113,453 UART:
36,113,612 UART: [state] CFI Enabled
36,157,803 UART: [art] Extend RT PCRs Done
36,158,991 UART: [art] Lock RT PCRs Done
36,160,520 UART: [art] Populate DV Done
36,165,983 UART: [fht] FMC Alias Private Key: 7
36,167,577 UART: [art] Derive CDI
36,168,396 UART: [art] Store in slot 0x4
36,210,991 UART: [art] Derive Key Pair
36,212,031 UART: [art] Store priv key in slot 0x5
38,638,834 UART: [art] Derive Key Pair - Done
38,651,824 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,358,104 UART: [art] Erasing AUTHORITY.KEYID = 7
40,359,613 UART: [art] PUB.X = 539339B79A75B5CA8FDDC5FDD0B9D8CA3CF3555C3F8D22AC24345D06B5D67ACB4D1639413E8DF45EEF633229B945470A
40,366,918 UART: [art] PUB.Y = 6638641BF2DC9FAECE4C6368E62BFB7BF35DFD310B815CD9D9FB3A14A6AA4FDAC90A5CA1986B6B12602B984C06A3DEC6
40,374,235 UART: [art] SIG.R = A1F099A0ED7A3DD45BB02FD3B7C87B53916B4B054FD0C0E0A81CD345CCB3BE10546B9B0234EABFEB598C62660810025D
40,381,628 UART: [art] SIG.S = D98E79D45205E6C8D0122601F59B62DEB42B970105F63DA054D2DD817CBAB154862167164D303B0A741A4FE08972C38A
41,360,910 UART: Caliptra RT
41,361,600 UART: [state] CFI Enabled
41,719,247 UART: [rt] RT listening for mailbox commands...
41,751,093 UART: [rt]cmd =0x44504543, len=96
41,783,352 >>> mbox cmd response data (56 bytes)
41,784,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,814,789 UART: [rt]cmd =0x44504543, len=96
41,846,579 >>> mbox cmd response data (56 bytes)
41,847,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,877,926 UART: [rt]cmd =0x44504543, len=96
41,909,580 >>> mbox cmd response data (56 bytes)
41,910,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,940,946 UART: [rt]cmd =0x44504543, len=96
41,973,238 >>> mbox cmd response data (56 bytes)
41,973,994 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,004,478 UART: [rt]cmd =0x44504543, len=96
42,036,724 >>> mbox cmd response data (56 bytes)
42,037,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,067,754 UART: [rt]cmd =0x44504543, len=96
42,099,614 >>> mbox cmd response data (56 bytes)
42,100,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,130,862 UART: [rt]cmd =0x44504543, len=96
42,163,189 >>> mbox cmd response data (56 bytes)
42,163,877 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,194,292 UART: [rt]cmd =0x44504543, len=96
42,226,421 >>> mbox cmd response data (56 bytes)
42,227,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,257,731 UART: [rt]cmd =0x44504543, len=96
42,290,285 >>> mbox cmd response data (56 bytes)
42,291,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,321,719 UART: [rt]cmd =0x44504543, len=96
42,353,571 >>> mbox cmd response data (56 bytes)
42,354,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,384,860 UART: [rt]cmd =0x44504543, len=96
42,391,671 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,782,189 ready_for_fw is high
3,782,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,805 >>> mbox cmd response: success
14,453,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,706,439 UART:
18,706,808 UART: Running Caliptra FMC ...
18,708,010 UART:
18,708,187 UART: [state] CFI Enabled
18,716,270 UART: [fht] FMC Alias Private Key: 7
20,481,956 UART: [art] Extend RT PCRs Done
20,483,180 UART: [art] Lock RT PCRs Done
20,485,021 UART: [art] Populate DV Done
20,490,503 UART: [fht] FMC Alias Private Key: 7
20,492,067 UART: [art] Derive CDI
20,492,893 UART: [art] Store in slot 0x4
20,535,390 UART: [art] Derive Key Pair
20,536,431 UART: [art] Store priv key in slot 0x5
22,963,477 UART: [art] Derive Key Pair - Done
22,976,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,364 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,869 UART: [art] PUB.X = 0D4D4DE7A4166DB070CE76FEFC937EED72317B84A48CA2AD862F454F4559DBF946D0BC559C84BF4749B1857DAC248BA4
24,691,137 UART: [art] PUB.Y = EFDF409901994034A4737EAFF9E61251E713CA7914CD7CC39F2815F28B99EC59906811DF844E5E1E420D69ACA820CB3C
24,698,385 UART: [art] SIG.R = E6B02D51BC9F6F8F5B4C0B414FA54035C7C41EDDF570FCAD42180E5D8D864C89C4ECFEB73160C7A38A2FB273FE9F0E41
24,705,836 UART: [art] SIG.S = 6D787DE96EB82673C2B11308305EE8E4FCB42E751F9A2FC30AAE3778412E3B3870736A9C39328DD9A8B8458E8C1477C9
25,684,554 UART: Caliptra RT
25,685,253 UART: [state] CFI Enabled
25,817,236 UART: [rt] RT listening for mailbox commands...
25,849,349 UART: [rt]cmd =0x44504543, len=96
25,880,928 >>> mbox cmd response data (56 bytes)
25,881,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,912,385 UART: [rt]cmd =0x44504543, len=96
25,944,024 >>> mbox cmd response data (56 bytes)
25,944,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,975,203 UART: [rt]cmd =0x44504543, len=96
26,007,032 >>> mbox cmd response data (56 bytes)
26,007,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,038,313 UART: [rt]cmd =0x44504543, len=96
26,069,556 >>> mbox cmd response data (56 bytes)
26,070,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,100,617 UART: [rt]cmd =0x44504543, len=96
26,133,111 >>> mbox cmd response data (56 bytes)
26,133,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,164,418 UART: [rt]cmd =0x44504543, len=96
26,195,934 >>> mbox cmd response data (56 bytes)
26,196,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,227,059 UART: [rt]cmd =0x44504543, len=96
26,259,658 >>> mbox cmd response data (56 bytes)
26,260,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,290,893 UART: [rt]cmd =0x44504543, len=96
26,323,212 >>> mbox cmd response data (56 bytes)
26,323,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,354,483 UART: [rt]cmd =0x44504543, len=96
26,386,604 >>> mbox cmd response data (56 bytes)
26,387,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,417,961 UART: [rt]cmd =0x44504543, len=96
26,450,299 >>> mbox cmd response data (56 bytes)
26,451,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,481,397 UART: [rt]cmd =0x44504543, len=96
26,514,001 >>> mbox cmd response data (56 bytes)
26,514,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,545,430 UART: [rt]cmd =0x44504543, len=96
26,577,761 >>> mbox cmd response data (56 bytes)
26,578,807 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,608,869 UART: [rt]cmd =0x52435458, len=8
26,611,177 >>> mbox cmd response data (16 bytes)
28,669,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,891,754 >>> mbox cmd response: success
35,892,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,924,658 UART:
35,924,950 UART: Running Caliptra FMC ...
35,926,070 UART:
35,926,236 UART: [state] CFI Enabled
35,970,413 UART: [art] Extend RT PCRs Done
35,971,620 UART: [art] Lock RT PCRs Done
35,972,867 UART: [art] Populate DV Done
35,978,439 UART: [fht] FMC Alias Private Key: 7
35,980,030 UART: [art] Derive CDI
35,980,849 UART: [art] Store in slot 0x4
36,023,282 UART: [art] Derive Key Pair
36,024,283 UART: [art] Store priv key in slot 0x5
38,451,885 UART: [art] Derive Key Pair - Done
38,464,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,171,321 UART: [art] Erasing AUTHORITY.KEYID = 7
40,172,907 UART: [art] PUB.X = 88D80489C5170C49E76BBEA69FD88D0DDE75751AEBAB5330193EE1F84F585FB2FA149D2A59F8D4B9CB79D67D04A69A55
40,180,114 UART: [art] PUB.Y = E4EE9DF63A0D3232F7A2AE3552E00C0756B262F48A420931E0722C492AF6A4E8901713A655F5DE988ABE4EF1414D13BB
40,187,413 UART: [art] SIG.R = 8CA446EB300EE27871B519D3A34AC4359B6970A9FE6F309A350A3DDC90A1CC3152146C347BA4AEA70F64741307EA0F95
40,194,759 UART: [art] SIG.S = EF77B1AFCFDEB8CD01330E9DC6F25B4855E4013BFFF3E2BC2B2045734F240B8394A5BB38FBE18F73FF08D86E2A37C94D
41,173,517 UART: Caliptra RT
41,174,229 UART: [state] CFI Enabled
41,536,444 UART: [rt] RT listening for mailbox commands...
41,568,286 UART: [rt]cmd =0x44504543, len=96
41,600,654 >>> mbox cmd response data (56 bytes)
41,601,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,632,014 UART: [rt]cmd =0x44504543, len=96
41,664,262 >>> mbox cmd response data (56 bytes)
41,664,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,695,524 UART: [rt]cmd =0x44504543, len=96
41,728,182 >>> mbox cmd response data (56 bytes)
41,728,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,759,530 UART: [rt]cmd =0x44504543, len=96
41,791,442 >>> mbox cmd response data (56 bytes)
41,792,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,822,711 UART: [rt]cmd =0x44504543, len=96
41,855,029 >>> mbox cmd response data (56 bytes)
41,855,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,886,171 UART: [rt]cmd =0x44504543, len=96
41,918,430 >>> mbox cmd response data (56 bytes)
41,919,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,949,748 UART: [rt]cmd =0x44504543, len=96
41,982,312 >>> mbox cmd response data (56 bytes)
41,983,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,013,506 UART: [rt]cmd =0x44504543, len=96
42,045,959 >>> mbox cmd response data (56 bytes)
42,046,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,077,103 UART: [rt]cmd =0x44504543, len=96
42,109,503 >>> mbox cmd response data (56 bytes)
42,110,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,140,613 UART: [rt]cmd =0x44504543, len=96
42,172,337 >>> mbox cmd response data (56 bytes)
42,173,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,203,683 UART: [rt]cmd =0x44504543, len=96
42,210,459 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
191,991 UART:
192,348 UART: Running Caliptra ROM ...
193,530 UART:
193,684 UART: [state] CFI Enabled
266,229 UART: [state] LifecycleState = Unprovisioned
268,643 UART: [state] DebugLocked = No
271,316 UART: [state] WD Timer not started. Device not locked for debugging
275,842 UART: [kat] SHA2-256
465,760 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,497 UART: [kat] ++
477,011 UART: [kat] sha1
488,815 UART: [kat] SHA2-256
491,818 UART: [kat] SHA2-384
498,237 UART: [kat] SHA2-512-ACC
500,883 UART: [kat] ECC-384
2,948,534 UART: [kat] HMAC-384Kdf
2,973,715 UART: [kat] LMS
3,505,464 UART: [kat] --
3,510,875 UART: [cold-reset] ++
3,513,444 UART: [fht] FHT @ 0x50003400
3,524,914 UART: [idev] ++
3,525,614 UART: [idev] CDI.KEYID = 6
3,526,565 UART: [idev] SUBJECT.KEYID = 7
3,527,799 UART: [idev] UDS.KEYID = 0
3,528,692 ready_for_fw is high
3,528,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,069 UART: [idev] Erasing UDS.KEYID = 0
6,048,840 UART: [idev] Sha1 KeyId Algorithm
6,072,129 UART: [idev] --
6,076,176 UART: [ldev] ++
6,076,852 UART: [ldev] CDI.KEYID = 6
6,077,788 UART: [ldev] SUBJECT.KEYID = 5
6,078,942 UART: [ldev] AUTHORITY.KEYID = 7
6,080,172 UART: [ldev] FE.KEYID = 1
6,123,685 UART: [ldev] Erasing FE.KEYID = 1
8,625,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,410,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,924 UART: [ldev] --
10,437,004 UART: [fwproc] Wait for Commands...
10,440,195 UART: [fwproc] Recv command 0x46574c44
10,442,447 UART: [fwproc] Recv'd Img size: 118548 bytes
13,934,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,011,775 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,135,395 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,696,054 >>> mbox cmd response: success
14,697,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,700,210 UART: [afmc] ++
14,700,908 UART: [afmc] CDI.KEYID = 6
14,702,063 UART: [afmc] SUBJECT.KEYID = 7
14,703,600 UART: [afmc] AUTHORITY.KEYID = 5
17,237,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,025 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,138 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,268 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,170 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,221 UART: [afmc] --
19,032,952 UART: [cold-reset] --
19,036,923 UART: [state] Locking Datavault
19,042,974 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,104 UART: [state] Locking ICCM
19,047,522 UART: [exit] Launching FMC @ 0x40000130
19,056,187 UART:
19,056,430 UART: Running Caliptra FMC ...
19,057,533 UART:
19,057,688 UART: [state] CFI Enabled
19,118,211 UART: [fht] FMC Alias Private Key: 7
20,884,114 UART: [art] Extend RT PCRs Done
20,885,335 UART: [art] Lock RT PCRs Done
20,887,173 UART: [art] Populate DV Done
20,892,848 UART: [fht] FMC Alias Private Key: 7
20,894,345 UART: [art] Derive CDI
20,895,074 UART: [art] Store in slot 0x4
20,951,334 UART: [art] Derive Key Pair
20,952,372 UART: [art] Store priv key in slot 0x5
23,415,664 UART: [art] Derive Key Pair - Done
23,428,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,148 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,805 UART: [art] PUB.X = 76167DC9DB86E704A94BE8B8326F6871DF6F991A1C1017445B2314994A6ADD20DCE3F53B2DEAD7ADCA6F3D24663F54F7
25,149,941 UART: [art] PUB.Y = D62E17DA060342C1714740E5F90D19389B6B917674B5FE1B9600FC685F2A50397707F104779FA3E17DB13C0B7514F3F4
25,157,153 UART: [art] SIG.R = 1C3A6543A7D789B6DC4B087581A80B2AC51312A424F0DFB455EB70D1124304E0AF4BB95D9C229F6F2CC210B8D3ACC3D8
25,164,564 UART: [art] SIG.S = 30BCA24E11328238564150AB1299ACB61845FDB6814840A927829B3D2EFAF6EF45ADB7AE03355FA3FD75980490C24C08
26,143,267 UART: Caliptra RT
26,143,979 UART: [state] CFI Enabled
26,325,116 UART: [rt] RT listening for mailbox commands...
26,357,437 UART: [rt]cmd =0x44504543, len=96
26,389,319 >>> mbox cmd response data (56 bytes)
26,390,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,420,866 UART: [rt]cmd =0x44504543, len=96
26,453,010 >>> mbox cmd response data (56 bytes)
26,453,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,484,434 UART: [rt]cmd =0x44504543, len=96
26,515,916 >>> mbox cmd response data (56 bytes)
26,516,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,546,942 UART: [rt]cmd =0x44504543, len=96
26,578,479 >>> mbox cmd response data (56 bytes)
26,579,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,609,738 UART: [rt]cmd =0x44504543, len=96
26,641,036 >>> mbox cmd response data (56 bytes)
26,641,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,672,386 UART: [rt]cmd =0x44504543, len=96
26,703,950 >>> mbox cmd response data (56 bytes)
26,704,646 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,735,087 UART: [rt]cmd =0x44504543, len=96
26,767,383 >>> mbox cmd response data (56 bytes)
26,768,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,798,639 UART: [rt]cmd =0x44504543, len=96
26,830,069 >>> mbox cmd response data (56 bytes)
26,830,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,861,219 UART: [rt]cmd =0x44504543, len=96
26,893,232 >>> mbox cmd response data (56 bytes)
26,893,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,924,614 UART: [rt]cmd =0x44504543, len=96
26,956,230 >>> mbox cmd response data (56 bytes)
26,956,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,987,462 UART: [rt]cmd =0x44504543, len=96
27,019,616 >>> mbox cmd response data (56 bytes)
27,020,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,050,730 UART: [rt]cmd =0x44504543, len=96
27,082,393 >>> mbox cmd response data (56 bytes)
27,083,495 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,113,231 UART: [rt]cmd =0x52435458, len=8
27,115,413 >>> mbox cmd response data (16 bytes)
29,182,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,332,709 UART:
29,333,084 UART: Running Caliptra ROM ...
29,334,223 UART:
29,334,394 UART: [state] CFI Enabled
29,407,020 UART: [state] LifecycleState = Unprovisioned
29,409,064 UART: [state] DebugLocked = No
29,411,502 UART: [state] WD Timer not started. Device not locked for debugging
29,415,366 UART: [kat] SHA2-256
29,605,200 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
29,615,986 UART: [kat] ++
29,616,437 UART: [kat] sha1
29,629,321 UART: [kat] SHA2-256
29,632,322 UART: [kat] SHA2-384
29,639,881 UART: [kat] SHA2-512-ACC
29,642,444 UART: [kat] ECC-384
32,087,844 UART: [kat] HMAC-384Kdf
32,113,269 UART: [kat] LMS
32,644,811 UART: [kat] --
32,647,735 UART: [update-reset] ++
36,151,214 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
36,155,456 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,785,207 >>> mbox cmd response: success
36,785,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
36,786,898 UART: [update-reset] Copying MAN_2 To MAN_1
36,824,457 UART: [update-reset Success] --
36,828,354 UART: [state] Locking Datavault
36,830,691 UART: [state] Locking PCR0, PCR1 and PCR31
36,832,830 UART: [state] Locking ICCM
36,834,148 UART: [exit] Launching FMC @ 0x40000130
36,842,766 UART:
36,842,996 UART: Running Caliptra FMC ...
36,844,020 UART:
36,844,168 UART: [state] CFI Enabled
36,946,125 UART: [art] Extend RT PCRs Done
36,947,308 UART: [art] Lock RT PCRs Done
36,948,735 UART: [art] Populate DV Done
36,954,136 UART: [fht] FMC Alias Private Key: 7
36,955,825 UART: [art] Derive CDI
36,956,579 UART: [art] Store in slot 0x4
37,015,582 UART: [art] Derive Key Pair
37,016,623 UART: [art] Store priv key in slot 0x5
39,478,913 UART: [art] Derive Key Pair - Done
39,491,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,205,132 UART: [art] Erasing AUTHORITY.KEYID = 7
41,206,645 UART: [art] PUB.X = D5F777F60B44119066A2FC5E1F896ED212188A89976087B2B00F0DA1A668AA2DD8233AC9C89438EBD6F65D0734CDC16D
41,213,929 UART: [art] PUB.Y = 51EA0DCA4E042EF13516AB9305FDB50C61EDF7E3355D4ECC46768839705DE3F988FEBC84D1FC4DC0DD205F0332C1ED03
41,221,189 UART: [art] SIG.R = A07D66E049310BD60F8B9B167156A8696A2A7D64941A811A008D9E322BCF2DE0ECB1179A0FDE53CB0850731C53FBFF65
41,228,600 UART: [art] SIG.S = A6D0F160CA4C1CFA0A1DBCFE235E081C23442988406111B64ED8762E2E46191D1FA194A516FA404520111803A7DF74F2
42,208,144 UART: Caliptra RT
42,208,834 UART: [state] CFI Enabled
42,614,552 UART: [rt] RT listening for mailbox commands...
42,646,481 UART: [rt]cmd =0x44504543, len=96
42,678,610 >>> mbox cmd response data (56 bytes)
42,679,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,710,093 UART: [rt]cmd =0x44504543, len=96
42,742,659 >>> mbox cmd response data (56 bytes)
42,743,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,774,108 UART: [rt]cmd =0x44504543, len=96
42,806,185 >>> mbox cmd response data (56 bytes)
42,806,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,837,195 UART: [rt]cmd =0x44504543, len=96
42,868,919 >>> mbox cmd response data (56 bytes)
42,869,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,900,178 UART: [rt]cmd =0x44504543, len=96
42,932,740 >>> mbox cmd response data (56 bytes)
42,933,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,964,154 UART: [rt]cmd =0x44504543, len=96
42,995,694 >>> mbox cmd response data (56 bytes)
42,996,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,026,839 UART: [rt]cmd =0x44504543, len=96
43,059,311 >>> mbox cmd response data (56 bytes)
43,059,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,090,626 UART: [rt]cmd =0x44504543, len=96
43,121,758 >>> mbox cmd response data (56 bytes)
43,122,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,153,193 UART: [rt]cmd =0x44504543, len=96
43,185,621 >>> mbox cmd response data (56 bytes)
43,186,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,217,045 UART: [rt]cmd =0x44504543, len=96
43,249,451 >>> mbox cmd response data (56 bytes)
43,250,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,280,913 UART: [rt]cmd =0x44504543, len=96
43,287,859 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,418,642 ready_for_fw is high
3,419,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,803,462 >>> mbox cmd response: success
14,804,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,094,367 UART:
19,094,733 UART: Running Caliptra FMC ...
19,095,875 UART:
19,096,035 UART: [state] CFI Enabled
19,158,965 UART: [fht] FMC Alias Private Key: 7
20,925,330 UART: [art] Extend RT PCRs Done
20,926,570 UART: [art] Lock RT PCRs Done
20,927,820 UART: [art] Populate DV Done
20,933,247 UART: [fht] FMC Alias Private Key: 7
20,934,800 UART: [art] Derive CDI
20,935,620 UART: [art] Store in slot 0x4
20,991,772 UART: [art] Derive Key Pair
20,992,762 UART: [art] Store priv key in slot 0x5
23,455,769 UART: [art] Derive Key Pair - Done
23,468,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,181,914 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,437 UART: [art] PUB.X = 799F4895FFD52D05503885279484EAC57836A1B2F75E92D0495CF23F34CC454C0988F5BB9774118767F0BCF6AD54216B
25,190,647 UART: [art] PUB.Y = 6744D628446F3BDD60665A488B4A8F820920C0999E65E715B13834DB80487ABB3D02C193866499F22AC377E46ECC18A0
25,197,893 UART: [art] SIG.R = 15FBF12BC4EBDBDB3E50B0C9617EFA5C5947CD8AFB482C68949CB3A05B9FD50D11556B3F5694046DE037AA7B630E72C6
25,205,347 UART: [art] SIG.S = 2A79233188B9A4AD3911D4D375D165C79E20E1A888CC58B356020A38B488795F48EC707396AC980CBD5CE3560A12B00E
26,184,305 UART: Caliptra RT
26,185,002 UART: [state] CFI Enabled
26,365,809 UART: [rt] RT listening for mailbox commands...
26,398,147 UART: [rt]cmd =0x44504543, len=96
26,429,887 >>> mbox cmd response data (56 bytes)
26,430,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,461,139 UART: [rt]cmd =0x44504543, len=96
26,492,874 >>> mbox cmd response data (56 bytes)
26,493,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,524,100 UART: [rt]cmd =0x44504543, len=96
26,556,088 >>> mbox cmd response data (56 bytes)
26,556,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,587,350 UART: [rt]cmd =0x44504543, len=96
26,619,686 >>> mbox cmd response data (56 bytes)
26,620,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,650,876 UART: [rt]cmd =0x44504543, len=96
26,682,252 >>> mbox cmd response data (56 bytes)
26,682,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,713,538 UART: [rt]cmd =0x44504543, len=96
26,745,443 >>> mbox cmd response data (56 bytes)
26,746,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,776,612 UART: [rt]cmd =0x44504543, len=96
26,808,559 >>> mbox cmd response data (56 bytes)
26,809,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,840,048 UART: [rt]cmd =0x44504543, len=96
26,872,503 >>> mbox cmd response data (56 bytes)
26,873,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,903,766 UART: [rt]cmd =0x44504543, len=96
26,935,920 >>> mbox cmd response data (56 bytes)
26,936,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,967,322 UART: [rt]cmd =0x44504543, len=96
26,998,749 >>> mbox cmd response data (56 bytes)
26,999,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,030,030 UART: [rt]cmd =0x44504543, len=96
27,061,783 >>> mbox cmd response data (56 bytes)
27,062,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,092,804 UART: [rt]cmd =0x44504543, len=96
27,125,338 >>> mbox cmd response data (56 bytes)
27,126,373 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,156,213 UART: [rt]cmd =0x52435458, len=8
27,158,432 >>> mbox cmd response data (16 bytes)
29,222,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,147,457 >>> mbox cmd response: success
37,148,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
37,181,448 UART:
37,181,785 UART: Running Caliptra FMC ...
37,182,912 UART:
37,183,073 UART: [state] CFI Enabled
37,286,230 UART: [art] Extend RT PCRs Done
37,287,411 UART: [art] Lock RT PCRs Done
37,288,703 UART: [art] Populate DV Done
37,294,056 UART: [fht] FMC Alias Private Key: 7
37,295,595 UART: [art] Derive CDI
37,296,375 UART: [art] Store in slot 0x4
37,355,650 UART: [art] Derive Key Pair
37,356,728 UART: [art] Store priv key in slot 0x5
39,819,741 UART: [art] Derive Key Pair - Done
39,832,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,545,208 UART: [art] Erasing AUTHORITY.KEYID = 7
41,546,705 UART: [art] PUB.X = 17B268DA79C97B273A7F3FEDFD539191CBA9FFE3E2F69CECF7EA15BB48A9F60064EA9D4849AA8E5ABBBD88737E5AD58B
41,553,963 UART: [art] PUB.Y = 080A54A5EC47585FE711EF6D3382D2765439802CA0230D13DFA3DDE58D298C6FF744B1F7B873083CB458B168626D74BB
41,561,218 UART: [art] SIG.R = 13FADC518C2046D5E74CE6652A1C3E70E62E08994FFB2506D4667AA2A82EB3AE57708DCFA1A42F117F9D37AD318F2B4F
41,568,678 UART: [art] SIG.S = 5D8337395C58BB0EB564047506AF13FE20DB34CAB82BC9DE77739181B60D9E5D6220BE18614E061ADE5AF2375977785E
42,547,740 UART: Caliptra RT
42,548,437 UART: [state] CFI Enabled
42,959,764 UART: [rt] RT listening for mailbox commands...
42,991,728 UART: [rt]cmd =0x44504543, len=96
43,023,900 >>> mbox cmd response data (56 bytes)
43,024,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,055,232 UART: [rt]cmd =0x44504543, len=96
43,087,910 >>> mbox cmd response data (56 bytes)
43,088,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,119,179 UART: [rt]cmd =0x44504543, len=96
43,151,467 >>> mbox cmd response data (56 bytes)
43,152,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,182,853 UART: [rt]cmd =0x44504543, len=96
43,215,069 >>> mbox cmd response data (56 bytes)
43,215,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,246,434 UART: [rt]cmd =0x44504543, len=96
43,278,703 >>> mbox cmd response data (56 bytes)
43,279,441 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,309,979 UART: [rt]cmd =0x44504543, len=96
43,342,119 >>> mbox cmd response data (56 bytes)
43,342,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,373,484 UART: [rt]cmd =0x44504543, len=96
43,405,562 >>> mbox cmd response data (56 bytes)
43,406,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,437,080 UART: [rt]cmd =0x44504543, len=96
43,468,507 >>> mbox cmd response data (56 bytes)
43,469,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,499,629 UART: [rt]cmd =0x44504543, len=96
43,531,358 >>> mbox cmd response data (56 bytes)
43,532,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,562,642 UART: [rt]cmd =0x44504543, len=96
43,594,661 >>> mbox cmd response data (56 bytes)
43,595,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,625,880 UART: [rt]cmd =0x44504543, len=96
43,633,026 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,509 UART:
192,874 UART: Running Caliptra ROM ...
194,071 UART:
603,704 UART: [state] CFI Enabled
621,078 UART: [state] LifecycleState = Unprovisioned
623,468 UART: [state] DebugLocked = No
625,855 UART: [state] WD Timer not started. Device not locked for debugging
630,118 UART: [kat] SHA2-256
819,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,823 UART: [kat] ++
831,430 UART: [kat] sha1
842,313 UART: [kat] SHA2-256
845,317 UART: [kat] SHA2-384
851,735 UART: [kat] SHA2-512-ACC
854,326 UART: [kat] ECC-384
3,300,315 UART: [kat] HMAC-384Kdf
3,313,414 UART: [kat] LMS
3,845,182 UART: [kat] --
3,851,043 UART: [cold-reset] ++
3,851,924 UART: [fht] FHT @ 0x50003400
3,864,255 UART: [idev] ++
3,864,895 UART: [idev] CDI.KEYID = 6
3,865,899 UART: [idev] SUBJECT.KEYID = 7
3,867,078 UART: [idev] UDS.KEYID = 0
3,868,008 ready_for_fw is high
3,868,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,017,182 UART: [idev] Erasing UDS.KEYID = 0
6,346,905 UART: [idev] Sha1 KeyId Algorithm
6,370,647 UART: [idev] --
6,375,515 UART: [ldev] ++
6,376,258 UART: [ldev] CDI.KEYID = 6
6,377,153 UART: [ldev] SUBJECT.KEYID = 5
6,378,409 UART: [ldev] AUTHORITY.KEYID = 7
6,379,596 UART: [ldev] FE.KEYID = 1
6,388,655 UART: [ldev] Erasing FE.KEYID = 1
8,864,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,667 UART: [ldev] --
10,654,697 UART: [fwproc] Wait for Commands...
10,657,555 UART: [fwproc] Recv command 0x46574c44
10,659,872 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,843 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,461 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,037 >>> mbox cmd response: success
14,910,624 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,914,495 UART: [afmc] ++
14,915,197 UART: [afmc] CDI.KEYID = 6
14,916,369 UART: [afmc] SUBJECT.KEYID = 7
14,917,866 UART: [afmc] AUTHORITY.KEYID = 5
17,426,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,147 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,163,248 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,401 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,193,310 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,216,789 UART: [afmc] --
19,220,182 UART: [cold-reset] --
19,225,678 UART: [state] Locking Datavault
19,230,829 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,029 UART: [state] Locking ICCM
19,234,327 UART: [exit] Launching FMC @ 0x40000130
19,243,003 UART:
19,243,250 UART: Running Caliptra FMC ...
19,244,362 UART:
19,244,525 UART: [state] CFI Enabled
19,252,610 UART: [fht] FMC Alias Private Key: 7
21,018,409 UART: [art] Extend RT PCRs Done
21,019,630 UART: [art] Lock RT PCRs Done
21,021,537 UART: [art] Populate DV Done
21,027,136 UART: [fht] FMC Alias Private Key: 7
21,028,792 UART: [art] Derive CDI
21,029,615 UART: [art] Store in slot 0x4
21,072,426 UART: [art] Derive Key Pair
21,073,466 UART: [art] Store priv key in slot 0x5
23,500,414 UART: [art] Derive Key Pair - Done
23,513,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,570 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,084 UART: [art] PUB.X = 5A7206058A9F872F4EB48D8F118CF83433C7E7F3C450170EB48FDB7217D4D3C8F38B49F5A86A5553226244B7D8033380
25,228,293 UART: [art] PUB.Y = 26384ED40F38E7A26AFFB3619EF4DDE70F93440D1192E95A77DA55704B2D8F79428E736DF58A0850F11CA5DFE00562E0
25,235,538 UART: [art] SIG.R = ABC87BC560D90E2C3A0A65A104AE6D7C0EA016CC4C96C8D7CE0FDA3A3010863879DF7EC2EC29CB02A9F149EC18D1849A
25,242,954 UART: [art] SIG.S = B5BD3823FAE485FAC2D545DE428F0CA7D90986383FB26089BF4224E52D5B8A223CB1548E0EA6884B0CA722A9CCB08109
26,221,874 UART: Caliptra RT
26,222,567 UART: [state] CFI Enabled
26,354,962 UART: [rt] RT listening for mailbox commands...
26,386,778 UART: [rt]cmd =0x44504543, len=96
26,418,337 >>> mbox cmd response data (56 bytes)
26,419,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,449,869 UART: [rt]cmd =0x44504543, len=96
26,482,450 >>> mbox cmd response data (56 bytes)
26,483,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,513,718 UART: [rt]cmd =0x44504543, len=96
26,545,636 >>> mbox cmd response data (56 bytes)
26,546,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,577,085 UART: [rt]cmd =0x44504543, len=96
26,609,142 >>> mbox cmd response data (56 bytes)
26,609,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,640,548 UART: [rt]cmd =0x44504543, len=96
26,672,278 >>> mbox cmd response data (56 bytes)
26,672,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,703,612 UART: [rt]cmd =0x44504543, len=96
26,736,286 >>> mbox cmd response data (56 bytes)
26,737,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,767,564 UART: [rt]cmd =0x44504543, len=96
26,799,265 >>> mbox cmd response data (56 bytes)
26,799,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,830,472 UART: [rt]cmd =0x44504543, len=96
26,862,172 >>> mbox cmd response data (56 bytes)
26,862,853 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,893,394 UART: [rt]cmd =0x44504543, len=96
26,925,336 >>> mbox cmd response data (56 bytes)
26,926,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,956,665 UART: [rt]cmd =0x44504543, len=96
26,988,178 >>> mbox cmd response data (56 bytes)
26,988,874 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,019,622 UART: [rt]cmd =0x44504543, len=96
27,051,982 >>> mbox cmd response data (56 bytes)
27,052,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,083,423 UART: [rt]cmd =0x44504543, len=96
27,114,909 >>> mbox cmd response data (56 bytes)
27,116,105 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,146,068 UART: [rt]cmd =0x52435458, len=8
27,148,283 >>> mbox cmd response data (16 bytes)
29,216,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,366,983 UART:
29,367,396 UART: Running Caliptra ROM ...
29,368,453 UART:
29,368,608 UART: [state] CFI Enabled
29,381,967 UART: [state] LifecycleState = Unprovisioned
29,383,824 UART: [state] DebugLocked = No
29,385,616 UART: [state] WD Timer not started. Device not locked for debugging
29,390,299 UART: [kat] SHA2-256
29,580,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
29,590,981 UART: [kat] ++
29,591,493 UART: [kat] sha1
29,602,596 UART: [kat] SHA2-256
29,605,603 UART: [kat] SHA2-384
29,612,254 UART: [kat] SHA2-512-ACC
29,614,828 UART: [kat] ECC-384
32,056,850 UART: [kat] HMAC-384Kdf
32,069,632 UART: [kat] LMS
32,601,261 UART: [kat] --
32,606,034 UART: [update-reset] ++
36,119,718 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
36,123,848 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,753,578 >>> mbox cmd response: success
36,754,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
36,754,446 UART: [update-reset] Copying MAN_2 To MAN_1
36,791,973 UART: [update-reset Success] --
36,797,791 UART: [state] Locking Datavault
36,802,711 UART: [state] Locking PCR0, PCR1 and PCR31
36,804,863 UART: [state] Locking ICCM
36,807,541 UART: [exit] Launching FMC @ 0x40000130
36,816,163 UART:
36,816,408 UART: Running Caliptra FMC ...
36,817,515 UART:
36,817,677 UART: [state] CFI Enabled
36,861,529 UART: [art] Extend RT PCRs Done
36,862,683 UART: [art] Lock RT PCRs Done
36,864,359 UART: [art] Populate DV Done
36,869,824 UART: [fht] FMC Alias Private Key: 7
36,871,544 UART: [art] Derive CDI
36,872,364 UART: [art] Store in slot 0x4
36,914,803 UART: [art] Derive Key Pair
36,915,852 UART: [art] Store priv key in slot 0x5
39,342,699 UART: [art] Derive Key Pair - Done
39,355,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,062,457 UART: [art] Erasing AUTHORITY.KEYID = 7
41,063,980 UART: [art] PUB.X = ED1D7E51D32B4F81FDCCFD5597BB175F411AAE330F97F51E700D8B994E11B02787A8A65C7AF7C1A2F28AF9D6F0E59C12
41,071,261 UART: [art] PUB.Y = 163FFB477EFC86D73C824052969EC72C495E6DE6F30922656B9AD62D13283AAC7C9364A24EA4B77008DCCA3EEADA242C
41,078,569 UART: [art] SIG.R = 2B4E1F5ED72C3ECE82CBD75EF3BC7CB58966F596FDF02BF53920ED331A4DA971A55DA4CFBB3D35B37E03EFB89B09D145
41,085,983 UART: [art] SIG.S = 089D2039910F0A79DA4BD157E5375E75A9E23AB47155C3511126F70679A6ACB2D2655844B0DC39755B9C5D4E0C8E41EC
42,065,089 UART: Caliptra RT
42,065,788 UART: [state] CFI Enabled
42,425,776 UART: [rt] RT listening for mailbox commands...
42,457,425 UART: [rt]cmd =0x44504543, len=96
42,489,229 >>> mbox cmd response data (56 bytes)
42,490,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,520,822 UART: [rt]cmd =0x44504543, len=96
42,552,693 >>> mbox cmd response data (56 bytes)
42,553,389 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,583,662 UART: [rt]cmd =0x44504543, len=96
42,616,045 >>> mbox cmd response data (56 bytes)
42,616,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,647,391 UART: [rt]cmd =0x44504543, len=96
42,680,312 >>> mbox cmd response data (56 bytes)
42,681,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,711,384 UART: [rt]cmd =0x44504543, len=96
42,743,465 >>> mbox cmd response data (56 bytes)
42,744,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,774,777 UART: [rt]cmd =0x44504543, len=96
42,806,688 >>> mbox cmd response data (56 bytes)
42,807,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,837,957 UART: [rt]cmd =0x44504543, len=96
42,870,680 >>> mbox cmd response data (56 bytes)
42,871,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,901,985 UART: [rt]cmd =0x44504543, len=96
42,934,485 >>> mbox cmd response data (56 bytes)
42,935,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,965,674 UART: [rt]cmd =0x44504543, len=96
42,998,103 >>> mbox cmd response data (56 bytes)
42,998,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,029,375 UART: [rt]cmd =0x44504543, len=96
43,061,185 >>> mbox cmd response data (56 bytes)
43,061,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,092,434 UART: [rt]cmd =0x44504543, len=96
43,099,318 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,761,026 ready_for_fw is high
3,761,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,907 >>> mbox cmd response: success
15,038,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,294,196 UART:
19,294,665 UART: Running Caliptra FMC ...
19,295,792 UART:
19,295,953 UART: [state] CFI Enabled
19,303,610 UART: [fht] FMC Alias Private Key: 7
21,069,428 UART: [art] Extend RT PCRs Done
21,070,661 UART: [art] Lock RT PCRs Done
21,072,807 UART: [art] Populate DV Done
21,078,272 UART: [fht] FMC Alias Private Key: 7
21,079,775 UART: [art] Derive CDI
21,080,545 UART: [art] Store in slot 0x4
21,123,157 UART: [art] Derive Key Pair
21,124,205 UART: [art] Store priv key in slot 0x5
23,550,977 UART: [art] Derive Key Pair - Done
23,563,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,775 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,292 UART: [art] PUB.X = 21F751E9A458D8559D948A4EB4ADF0CB7443BFBF9F852FF7BFC8EBD12A89E2D5475FAD95BE6181BB1F8799DD1C925C6B
25,278,601 UART: [art] PUB.Y = 6E6CCE3647945F4F97ACC3462C7B211F009B99E2BAEE3EFE1C0A878020552D2D89B65E2BA28B49E34AEDF4CDFD55E49A
25,285,866 UART: [art] SIG.R = 5E2B80ADE5CE420B0AB5D06E08D914B2B61C0BBF08AD651C59770F7BA09249806EA75152FDBFEE743E4DA0E3307F854C
25,293,273 UART: [art] SIG.S = EF26BA2A12CDE13754F77E2B280EE4D687F427E3C9D80B727E78E790A75DA3BB885F3798B058938E945791A0F733858C
26,272,444 UART: Caliptra RT
26,273,159 UART: [state] CFI Enabled
26,405,906 UART: [rt] RT listening for mailbox commands...
26,437,923 UART: [rt]cmd =0x44504543, len=96
26,469,633 >>> mbox cmd response data (56 bytes)
26,470,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,500,958 UART: [rt]cmd =0x44504543, len=96
26,532,667 >>> mbox cmd response data (56 bytes)
26,533,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,563,647 UART: [rt]cmd =0x44504543, len=96
26,596,408 >>> mbox cmd response data (56 bytes)
26,597,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,627,707 UART: [rt]cmd =0x44504543, len=96
26,659,329 >>> mbox cmd response data (56 bytes)
26,660,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,690,339 UART: [rt]cmd =0x44504543, len=96
26,722,117 >>> mbox cmd response data (56 bytes)
26,722,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,753,171 UART: [rt]cmd =0x44504543, len=96
26,785,098 >>> mbox cmd response data (56 bytes)
26,785,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,816,601 UART: [rt]cmd =0x44504543, len=96
26,848,513 >>> mbox cmd response data (56 bytes)
26,849,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,879,689 UART: [rt]cmd =0x44504543, len=96
26,911,742 >>> mbox cmd response data (56 bytes)
26,912,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,942,926 UART: [rt]cmd =0x44504543, len=96
26,974,872 >>> mbox cmd response data (56 bytes)
26,975,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,006,369 UART: [rt]cmd =0x44504543, len=96
27,038,032 >>> mbox cmd response data (56 bytes)
27,038,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,069,401 UART: [rt]cmd =0x44504543, len=96
27,101,330 >>> mbox cmd response data (56 bytes)
27,102,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,132,450 UART: [rt]cmd =0x44504543, len=96
27,164,635 >>> mbox cmd response data (56 bytes)
27,165,989 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,195,679 UART: [rt]cmd =0x52435458, len=8
27,197,895 >>> mbox cmd response data (16 bytes)
29,264,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,098,922 >>> mbox cmd response: success
37,099,569 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
37,135,369 UART:
37,135,660 UART: Running Caliptra FMC ...
37,136,786 UART:
37,136,969 UART: [state] CFI Enabled
37,181,259 UART: [art] Extend RT PCRs Done
37,182,455 UART: [art] Lock RT PCRs Done
37,184,211 UART: [art] Populate DV Done
37,189,510 UART: [fht] FMC Alias Private Key: 7
37,191,210 UART: [art] Derive CDI
37,191,948 UART: [art] Store in slot 0x4
37,235,139 UART: [art] Derive Key Pair
37,236,141 UART: [art] Store priv key in slot 0x5
39,662,717 UART: [art] Derive Key Pair - Done
39,675,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,382,424 UART: [art] Erasing AUTHORITY.KEYID = 7
41,383,947 UART: [art] PUB.X = DAADA4F0D4ACE032DD2CED96A3BA76599F2E05D8941D1EB0A5AD779872D5E1DD42CC752F050D8283D5D3C8351979EB6D
41,391,200 UART: [art] PUB.Y = 90B9012F208CB8B9A5D40E80E5D9AB97B038A67360161CA8CA6A67AAD6845C136EDFBBCCEF0FFD17816DC327496CF120
41,398,492 UART: [art] SIG.R = 7BBADBD81EC8319F8CF44C80E5CE4D5DA56CB77ADD0054886FBB8DF61E7C0F63A4079853EB238DD10590A86BA80914C9
41,405,889 UART: [art] SIG.S = 42B965922E6FDF43171216B9637C8F9054FD1D469C932FCA0CA991CA183D470157F1A798F0DB88E2D138ABB6DA1F7B85
42,384,894 UART: Caliptra RT
42,385,598 UART: [state] CFI Enabled
42,747,642 UART: [rt] RT listening for mailbox commands...
42,779,376 UART: [rt]cmd =0x44504543, len=96
42,811,109 >>> mbox cmd response data (56 bytes)
42,811,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,842,474 UART: [rt]cmd =0x44504543, len=96
42,874,002 >>> mbox cmd response data (56 bytes)
42,874,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,905,179 UART: [rt]cmd =0x44504543, len=96
42,937,642 >>> mbox cmd response data (56 bytes)
42,938,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,968,849 UART: [rt]cmd =0x44504543, len=96
43,000,441 >>> mbox cmd response data (56 bytes)
43,001,130 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,031,666 UART: [rt]cmd =0x44504543, len=96
43,063,789 >>> mbox cmd response data (56 bytes)
43,064,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,095,172 UART: [rt]cmd =0x44504543, len=96
43,128,143 >>> mbox cmd response data (56 bytes)
43,128,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,159,161 UART: [rt]cmd =0x44504543, len=96
43,190,493 >>> mbox cmd response data (56 bytes)
43,191,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,221,854 UART: [rt]cmd =0x44504543, len=96
43,254,739 >>> mbox cmd response data (56 bytes)
43,255,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,286,129 UART: [rt]cmd =0x44504543, len=96
43,318,996 >>> mbox cmd response data (56 bytes)
43,319,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,350,450 UART: [rt]cmd =0x44504543, len=96
43,382,667 >>> mbox cmd response data (56 bytes)
43,383,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,413,968 UART: [rt]cmd =0x44504543, len=96
43,420,655 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
Truncated 1063 bytes from beginning
272 UART: [kat] SHA2-512-ACC
897,173 UART: [kat] ECC-384
902,750 UART: [kat] HMAC-384Kdf
907,234 UART: [kat] LMS
1,475,430 UART: [kat] --
1,476,409 UART: [cold-reset] ++
1,476,857 UART: [fht] Storing FHT @ 0x50003400
1,479,492 UART: [idev] ++
1,479,660 UART: [idev] CDI.KEYID = 6
1,480,020 UART: [idev] SUBJECT.KEYID = 7
1,480,444 UART: [idev] UDS.KEYID = 0
1,480,789 ready_for_fw is high
1,480,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,272 UART: [idev] Erasing UDS.KEYID = 0
1,504,414 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,202 UART: [idev] --
1,514,173 UART: [ldev] ++
1,514,341 UART: [ldev] CDI.KEYID = 6
1,514,704 UART: [ldev] SUBJECT.KEYID = 5
1,515,130 UART: [ldev] AUTHORITY.KEYID = 7
1,515,593 UART: [ldev] FE.KEYID = 1
1,520,585 UART: [ldev] Erasing FE.KEYID = 1
1,546,056 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,946 UART: [ldev] --
1,585,303 UART: [fwproc] Waiting for Commands...
1,586,018 UART: [fwproc] Received command 0x46574c44
1,586,809 UART: [fwproc] Received Image of size 118548 bytes
2,931,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,809 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,027 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,438 >>> mbox cmd response: success
3,130,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,131,586 UART: [afmc] ++
3,131,754 UART: [afmc] CDI.KEYID = 6
3,132,116 UART: [afmc] SUBJECT.KEYID = 7
3,132,541 UART: [afmc] AUTHORITY.KEYID = 5
3,167,368 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,830 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,610 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,319 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,202 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,885 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,669 UART: [afmc] --
3,210,599 UART: [cold-reset] --
3,211,471 UART: [state] Locking Datavault
3,212,456 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,060 UART: [state] Locking ICCM
3,213,632 UART: [exit] Launching FMC @ 0x40000130
3,218,962 UART:
3,218,978 UART: Running Caliptra FMC ...
3,219,386 UART:
3,219,440 UART: [state] CFI Enabled
3,229,964 UART: [fht] FMC Alias Private Key: 7
3,348,888 UART: [art] Extend RT PCRs Done
3,349,316 UART: [art] Lock RT PCRs Done
3,350,824 UART: [art] Populate DV Done
3,359,169 UART: [fht] FMC Alias Private Key: 7
3,360,321 UART: [art] Derive CDI
3,360,601 UART: [art] Store in slot 0x4
3,446,339 UART: [art] Derive Key Pair
3,446,699 UART: [art] Store priv key in slot 0x5
3,459,928 UART: [art] Derive Key Pair - Done
3,474,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,955 UART: [art] PUB.X = AE7B0AB945EF6CD06CC2CC36B7845418B263C4DE3394293E0B5DBB855446B954D57080DF355BDBADFE43D5217D2D0005
3,497,706 UART: [art] PUB.Y = 012CFF506B64DE5490F1311B041B9EF582520C54D74E2D3F70D5C68E881415B8977A6E63BA1A06B17EA49AA4B1D44774
3,504,646 UART: [art] SIG.R = 47B64A523F880ABBA1026C1672DD0373DBC2F0FF6AF1054AF73168FB0E3A16061AADB227D458C1E58A3C4C6E5C5889AB
3,511,412 UART: [art] SIG.S = 39113C05D07A79D6A6CBFB7C7FD0BA4A66FD76B17418D29B5F181E34A65AE410CB92FB82489E6D973381D64DD46891B5
3,535,299 UART: Caliptra RT
3,535,550 UART: [state] CFI Enabled
3,656,333 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,751 UART: [rt]cmd =0x44504543, len=96
3,720,657 >>> mbox cmd response data (56 bytes)
3,720,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,750,883 UART: [rt]cmd =0x44504543, len=96
3,783,589 >>> mbox cmd response data (56 bytes)
3,783,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,707 UART: [rt]cmd =0x44504543, len=96
3,845,874 >>> mbox cmd response data (56 bytes)
3,845,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,876,036 UART: [rt]cmd =0x44504543, len=96
3,909,412 >>> mbox cmd response data (56 bytes)
3,909,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,939,264 UART: [rt]cmd =0x44504543, len=96
3,972,259 >>> mbox cmd response data (56 bytes)
3,972,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,002,253 UART: [rt]cmd =0x44504543, len=96
4,035,343 >>> mbox cmd response data (56 bytes)
4,035,344 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,065,235 UART: [rt]cmd =0x44504543, len=96
4,098,322 >>> mbox cmd response data (56 bytes)
4,098,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,128,064 UART: [rt]cmd =0x44504543, len=96
4,161,104 >>> mbox cmd response data (56 bytes)
4,161,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,191,118 UART: [rt]cmd =0x44504543, len=96
4,223,377 >>> mbox cmd response data (56 bytes)
4,223,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,253,365 UART: [rt]cmd =0x44504543, len=96
4,286,313 >>> mbox cmd response data (56 bytes)
4,286,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,316,159 UART: [rt]cmd =0x44504543, len=96
4,349,432 >>> mbox cmd response data (56 bytes)
4,349,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,379,164 UART: [rt]cmd =0x44504543, len=96
4,412,286 >>> mbox cmd response data (56 bytes)
4,412,287 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,441,544 UART: [rt]cmd =0x52435458, len=8
4,443,462 >>> mbox cmd response data (16 bytes)
4,443,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,444,365 UART:
4,444,381 UART: Running Caliptra ROM ...
4,444,789 UART:
4,444,843 UART: [state] CFI Enabled
4,446,905 UART: [state] LifecycleState = Unprovisioned
4,447,560 UART: [state] DebugLocked = No
4,448,206 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,449,825 UART: [kat] SHA2-256
5,243,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,247,871 UART: [kat] ++
5,248,023 UART: [kat] sha1
5,252,341 UART: [kat] SHA2-256
5,254,279 UART: [kat] SHA2-384
5,257,076 UART: [kat] SHA2-512-ACC
5,258,976 UART: [kat] ECC-384
5,264,479 UART: [kat] HMAC-384Kdf
5,268,949 UART: [kat] LMS
5,837,145 UART: [kat] --
5,837,830 UART: [update-reset] ++
7,218,102 UART: [update-reset] Image verified using Vendor ECC Key Index 0
7,219,352 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,374,619 >>> mbox cmd response: success
7,374,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
7,374,928 UART: [update-reset] Copying MAN_2 To MAN_1
7,382,942 UART: [update-reset Success] --
7,383,755 UART: [state] Locking Datavault
7,384,717 UART: [state] Locking PCR0, PCR1 and PCR31
7,385,321 UART: [state] Locking ICCM
7,385,983 UART: [exit] Launching FMC @ 0x40000130
7,391,313 UART:
7,391,329 UART: Running Caliptra FMC ...
7,391,737 UART:
7,391,791 UART: [state] CFI Enabled
7,481,050 UART: [art] Extend RT PCRs Done
7,481,478 UART: [art] Lock RT PCRs Done
7,482,765 UART: [art] Populate DV Done
7,490,966 UART: [fht] FMC Alias Private Key: 7
7,492,046 UART: [art] Derive CDI
7,492,326 UART: [art] Store in slot 0x4
7,578,188 UART: [art] Derive Key Pair
7,578,548 UART: [art] Store priv key in slot 0x5
7,591,231 UART: [art] Derive Key Pair - Done
7,605,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,621,115 UART: [art] Erasing AUTHORITY.KEYID = 7
7,621,880 UART: [art] PUB.X = 1F88EDC6D07F32301CE39FC85BCC9ADDE8D15526740AEF3F9BE17537276014D672F0F934E3585CB87C28D5FCBCFAF95F
7,628,665 UART: [art] PUB.Y = E24C7058DB1F16B7A4D9A8F6D1AB35D948AEF96796966769E8825228E2AD8B1202E03067A39BAC5F5CDD66582EF74C35
7,635,618 UART: [art] SIG.R = 50EBA9344E74337F417A7D4EC3044F0BCBD5C5045D25F7AC3450EC571DA96F049FB554DC94810E450F80CF9BC164C0D0
7,642,380 UART: [art] SIG.S = 081BBCADA11A636ABF0A64B2B9C3BF4DBE2443F8A83080EB4DB40AA55E0B3D2E88569390BE17D1CABC698470757712DB
7,665,918 UART: Caliptra RT
7,666,169 UART: [state] CFI Enabled
8,018,905 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,049,834 UART: [rt]cmd =0x44504543, len=96
8,083,115 >>> mbox cmd response data (56 bytes)
8,083,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,112,799 UART: [rt]cmd =0x44504543, len=96
8,145,549 >>> mbox cmd response data (56 bytes)
8,145,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,175,529 UART: [rt]cmd =0x44504543, len=96
8,208,886 >>> mbox cmd response data (56 bytes)
8,208,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,238,814 UART: [rt]cmd =0x44504543, len=96
8,271,450 >>> mbox cmd response data (56 bytes)
8,271,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,301,468 UART: [rt]cmd =0x44504543, len=96
8,334,675 >>> mbox cmd response data (56 bytes)
8,334,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,364,649 UART: [rt]cmd =0x44504543, len=96
8,397,377 >>> mbox cmd response data (56 bytes)
8,397,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,427,215 UART: [rt]cmd =0x44504543, len=96
8,460,224 >>> mbox cmd response data (56 bytes)
8,460,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,490,034 UART: [rt]cmd =0x44504543, len=96
8,522,818 >>> mbox cmd response data (56 bytes)
8,522,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,553,016 UART: [rt]cmd =0x44504543, len=96
8,586,167 >>> mbox cmd response data (56 bytes)
8,586,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,616,183 UART: [rt]cmd =0x44504543, len=96
8,649,987 >>> mbox cmd response data (56 bytes)
8,649,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,679,885 UART: [rt]cmd =0x44504543, len=96
8,687,230 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,097 ready_for_fw is high
1,362,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,298 >>> mbox cmd response: success
2,979,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,040,843 UART:
3,040,859 UART: Running Caliptra FMC ...
3,041,267 UART:
3,041,321 UART: [state] CFI Enabled
3,051,929 UART: [fht] FMC Alias Private Key: 7
3,170,447 UART: [art] Extend RT PCRs Done
3,170,875 UART: [art] Lock RT PCRs Done
3,172,443 UART: [art] Populate DV Done
3,180,582 UART: [fht] FMC Alias Private Key: 7
3,181,658 UART: [art] Derive CDI
3,181,938 UART: [art] Store in slot 0x4
3,267,812 UART: [art] Derive Key Pair
3,268,172 UART: [art] Store priv key in slot 0x5
3,281,513 UART: [art] Derive Key Pair - Done
3,296,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,017 UART: [art] PUB.X = C828D525E68D771307C0A5C8A28E29D7FBE8CA2231A6E1BCCA41D33B787B236DDC3FDC1B05A040E62D8D31349394345B
3,319,791 UART: [art] PUB.Y = C7FC165FD2483B7292FB8B2542EBA60BFECAF11115600A6600A80522FD83E71406A391A1E21FEE6D51D1D75D6A037E7E
3,326,714 UART: [art] SIG.R = 5611229D9AA14A0241B5E9386E9E5265AE4010E4B808F1209872E872F32D526505B7DC7C7340518FB1540ABC983A7C37
3,333,464 UART: [art] SIG.S = B905652CED354D139FDC4BCE809E384A94A1C0A9C47D87117E152114DEBC83530FD370B6EB9BABF5AED3FD5AB44F47DC
3,357,400 UART: Caliptra RT
3,357,651 UART: [state] CFI Enabled
3,477,943 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,705 UART: [rt]cmd =0x44504543, len=96
3,541,823 >>> mbox cmd response data (56 bytes)
3,541,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,815 UART: [rt]cmd =0x44504543, len=96
3,604,963 >>> mbox cmd response data (56 bytes)
3,604,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,731 UART: [rt]cmd =0x44504543, len=96
3,667,756 >>> mbox cmd response data (56 bytes)
3,667,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,848 UART: [rt]cmd =0x44504543, len=96
3,731,092 >>> mbox cmd response data (56 bytes)
3,731,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,761,078 UART: [rt]cmd =0x44504543, len=96
3,794,687 >>> mbox cmd response data (56 bytes)
3,794,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,824,739 UART: [rt]cmd =0x44504543, len=96
3,857,917 >>> mbox cmd response data (56 bytes)
3,857,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,887,949 UART: [rt]cmd =0x44504543, len=96
3,920,312 >>> mbox cmd response data (56 bytes)
3,920,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,174 UART: [rt]cmd =0x44504543, len=96
3,983,150 >>> mbox cmd response data (56 bytes)
3,983,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,116 UART: [rt]cmd =0x44504543, len=96
4,045,799 >>> mbox cmd response data (56 bytes)
4,045,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,075,759 UART: [rt]cmd =0x44504543, len=96
4,108,199 >>> mbox cmd response data (56 bytes)
4,108,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,138,219 UART: [rt]cmd =0x44504543, len=96
4,171,614 >>> mbox cmd response data (56 bytes)
4,171,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,201,640 UART: [rt]cmd =0x44504543, len=96
4,234,324 >>> mbox cmd response data (56 bytes)
4,234,325 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,263,812 UART: [rt]cmd =0x52435458, len=8
4,265,532 >>> mbox cmd response data (16 bytes)
4,265,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,079,869 >>> mbox cmd response: success
7,079,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
7,093,447 UART:
7,093,463 UART: Running Caliptra FMC ...
7,093,871 UART:
7,093,925 UART: [state] CFI Enabled
7,183,428 UART: [art] Extend RT PCRs Done
7,183,856 UART: [art] Lock RT PCRs Done
7,185,113 UART: [art] Populate DV Done
7,193,630 UART: [fht] FMC Alias Private Key: 7
7,194,686 UART: [art] Derive CDI
7,194,966 UART: [art] Store in slot 0x4
7,280,828 UART: [art] Derive Key Pair
7,281,188 UART: [art] Store priv key in slot 0x5
7,293,779 UART: [art] Derive Key Pair - Done
7,308,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,324,013 UART: [art] Erasing AUTHORITY.KEYID = 7
7,324,778 UART: [art] PUB.X = F9FF86FC9B896FE2ADD155ED118D5B0EB2740F1D83BCBFA0B983F0BF2F53B788EA9A39F437D886C07DB1676899498267
7,331,556 UART: [art] PUB.Y = FAC098F8E0C9935AA927A256247EC99C7ED3DD6E8C86A99E121AF6C392AF3349CE3B2A0EFEFCFEC87C77FB3B462246B0
7,338,525 UART: [art] SIG.R = 1964C8CA2F74DB99662C3D3A1269C5A76DB345C0705E79F35C0D1EC17E9E5BE37048A23C27D43E5AFFC12D5E59108652
7,345,298 UART: [art] SIG.S = E981806D5C85D6A68555AE3D0F48BC3111921BE85325042D803A2B91A668ABF649F7456B30DC04753CCCADC70348680F
7,369,663 UART: Caliptra RT
7,369,914 UART: [state] CFI Enabled
7,718,137 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,748,908 UART: [rt]cmd =0x44504543, len=96
7,781,689 >>> mbox cmd response data (56 bytes)
7,781,690 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,811,653 UART: [rt]cmd =0x44504543, len=96
7,844,737 >>> mbox cmd response data (56 bytes)
7,844,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,874,651 UART: [rt]cmd =0x44504543, len=96
7,908,778 >>> mbox cmd response data (56 bytes)
7,908,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,938,780 UART: [rt]cmd =0x44504543, len=96
7,972,260 >>> mbox cmd response data (56 bytes)
7,972,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,002,300 UART: [rt]cmd =0x44504543, len=96
8,035,579 >>> mbox cmd response data (56 bytes)
8,035,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,065,601 UART: [rt]cmd =0x44504543, len=96
8,099,293 >>> mbox cmd response data (56 bytes)
8,099,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,129,279 UART: [rt]cmd =0x44504543, len=96
8,162,032 >>> mbox cmd response data (56 bytes)
8,162,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,191,918 UART: [rt]cmd =0x44504543, len=96
8,225,064 >>> mbox cmd response data (56 bytes)
8,225,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,254,934 UART: [rt]cmd =0x44504543, len=96
8,287,779 >>> mbox cmd response data (56 bytes)
8,287,780 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,317,869 UART: [rt]cmd =0x44504543, len=96
8,351,633 >>> mbox cmd response data (56 bytes)
8,351,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,381,793 UART: [rt]cmd =0x44504543, len=96
8,389,302 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
Truncated 1063 bytes from beginning
733 UART: [kat] SHA2-512-ACC
897,634 UART: [kat] ECC-384
903,273 UART: [kat] HMAC-384Kdf
908,151 UART: [kat] LMS
1,476,347 UART: [kat] --
1,477,146 UART: [cold-reset] ++
1,477,722 UART: [fht] Storing FHT @ 0x50003400
1,480,469 UART: [idev] ++
1,480,637 UART: [idev] CDI.KEYID = 6
1,480,997 UART: [idev] SUBJECT.KEYID = 7
1,481,421 UART: [idev] UDS.KEYID = 0
1,481,766 ready_for_fw is high
1,481,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,475 UART: [idev] Erasing UDS.KEYID = 0
1,505,867 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,541 UART: [idev] --
1,515,626 UART: [ldev] ++
1,515,794 UART: [ldev] CDI.KEYID = 6
1,516,157 UART: [ldev] SUBJECT.KEYID = 5
1,516,583 UART: [ldev] AUTHORITY.KEYID = 7
1,517,046 UART: [ldev] FE.KEYID = 1
1,522,326 UART: [ldev] Erasing FE.KEYID = 1
1,547,923 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,705 UART: [ldev] --
1,586,966 UART: [fwproc] Waiting for Commands...
1,587,683 UART: [fwproc] Received command 0x46574c44
1,588,474 UART: [fwproc] Received Image of size 118548 bytes
2,933,070 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,236 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,454 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,771 >>> mbox cmd response: success
3,131,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,855 UART: [afmc] ++
3,133,023 UART: [afmc] CDI.KEYID = 6
3,133,385 UART: [afmc] SUBJECT.KEYID = 7
3,133,810 UART: [afmc] AUTHORITY.KEYID = 5
3,169,175 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,575 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,355 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,064 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,947 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,630 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,504 UART: [afmc] --
3,212,546 UART: [cold-reset] --
3,213,350 UART: [state] Locking Datavault
3,214,535 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,139 UART: [state] Locking ICCM
3,215,607 UART: [exit] Launching FMC @ 0x40000130
3,220,937 UART:
3,220,953 UART: Running Caliptra FMC ...
3,221,361 UART:
3,221,504 UART: [state] CFI Enabled
3,232,102 UART: [fht] FMC Alias Private Key: 7
3,351,306 UART: [art] Extend RT PCRs Done
3,351,734 UART: [art] Lock RT PCRs Done
3,353,204 UART: [art] Populate DV Done
3,361,281 UART: [fht] FMC Alias Private Key: 7
3,362,355 UART: [art] Derive CDI
3,362,635 UART: [art] Store in slot 0x4
3,448,725 UART: [art] Derive Key Pair
3,449,085 UART: [art] Store priv key in slot 0x5
3,462,290 UART: [art] Derive Key Pair - Done
3,477,069 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,065 UART: [art] PUB.X = 9265A55965395AC89594B913E8D85F05FEBB5E8F6493C4C95BC95B60892F7C2425832D4D04856C2066D99FBC0A54CE0D
3,499,823 UART: [art] PUB.Y = 508A794F5C1F941ABB09A4F6BA1D26C5F0834F38C047BB872F60B279F4F33B7BF53D28ABB0DB9C037545EC3CAA983812
3,506,779 UART: [art] SIG.R = D1C0716A0A5A6DDF09CC43DCCD51974EEF24AF565A52CC1488DED7524FB6D0520D6D0812B940FD3E4BBD510C5DA03C4A
3,513,556 UART: [art] SIG.S = 6886AFFBF7B12A5D4AFA2FEC7108391E38DA05DC568E80E3AAB864CE7683484F7B2BFFC92CFB2A88B7075738244F1BBD
3,537,329 UART: Caliptra RT
3,537,672 UART: [state] CFI Enabled
3,658,052 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,402 UART: [rt]cmd =0x44504543, len=96
3,722,334 >>> mbox cmd response data (56 bytes)
3,722,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,752,184 UART: [rt]cmd =0x44504543, len=96
3,785,334 >>> mbox cmd response data (56 bytes)
3,785,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,218 UART: [rt]cmd =0x44504543, len=96
3,848,337 >>> mbox cmd response data (56 bytes)
3,848,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,878,323 UART: [rt]cmd =0x44504543, len=96
3,911,017 >>> mbox cmd response data (56 bytes)
3,911,018 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,023 UART: [rt]cmd =0x44504543, len=96
3,974,662 >>> mbox cmd response data (56 bytes)
3,974,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,004,446 UART: [rt]cmd =0x44504543, len=96
4,038,228 >>> mbox cmd response data (56 bytes)
4,038,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,068,472 UART: [rt]cmd =0x44504543, len=96
4,101,393 >>> mbox cmd response data (56 bytes)
4,101,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,131,427 UART: [rt]cmd =0x44504543, len=96
4,164,415 >>> mbox cmd response data (56 bytes)
4,164,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,194,339 UART: [rt]cmd =0x44504543, len=96
4,227,950 >>> mbox cmd response data (56 bytes)
4,227,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,258,004 UART: [rt]cmd =0x44504543, len=96
4,291,000 >>> mbox cmd response data (56 bytes)
4,291,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,320,852 UART: [rt]cmd =0x44504543, len=96
4,353,031 >>> mbox cmd response data (56 bytes)
4,353,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,382,845 UART: [rt]cmd =0x44504543, len=96
4,415,099 >>> mbox cmd response data (56 bytes)
4,415,100 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,444,369 UART: [rt]cmd =0x52435458, len=8
4,446,285 >>> mbox cmd response data (16 bytes)
4,446,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,447,020 UART:
4,447,036 UART: Running Caliptra ROM ...
4,447,444 UART:
4,447,585 UART: [state] CFI Enabled
4,450,091 UART: [state] LifecycleState = Unprovisioned
4,450,746 UART: [state] DebugLocked = No
4,451,294 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,452,799 UART: [kat] SHA2-256
5,246,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,250,845 UART: [kat] ++
5,250,997 UART: [kat] sha1
5,255,095 UART: [kat] SHA2-256
5,257,033 UART: [kat] SHA2-384
5,259,866 UART: [kat] SHA2-512-ACC
5,261,766 UART: [kat] ECC-384
5,267,393 UART: [kat] HMAC-384Kdf
5,271,971 UART: [kat] LMS
5,840,167 UART: [kat] --
5,840,908 UART: [update-reset] ++
7,220,798 UART: [update-reset] Image verified using Vendor ECC Key Index 0
7,221,876 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,377,143 >>> mbox cmd response: success
7,377,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
7,377,478 UART: [update-reset] Copying MAN_2 To MAN_1
7,385,492 UART: [update-reset Success] --
7,386,205 UART: [state] Locking Datavault
7,386,987 UART: [state] Locking PCR0, PCR1 and PCR31
7,387,591 UART: [state] Locking ICCM
7,388,191 UART: [exit] Launching FMC @ 0x40000130
7,393,521 UART:
7,393,537 UART: Running Caliptra FMC ...
7,393,945 UART:
7,394,088 UART: [state] CFI Enabled
7,483,565 UART: [art] Extend RT PCRs Done
7,483,993 UART: [art] Lock RT PCRs Done
7,485,046 UART: [art] Populate DV Done
7,493,227 UART: [fht] FMC Alias Private Key: 7
7,494,227 UART: [art] Derive CDI
7,494,507 UART: [art] Store in slot 0x4
7,579,913 UART: [art] Derive Key Pair
7,580,273 UART: [art] Store priv key in slot 0x5
7,593,546 UART: [art] Derive Key Pair - Done
7,608,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,623,207 UART: [art] Erasing AUTHORITY.KEYID = 7
7,623,972 UART: [art] PUB.X = 5A8213CB9EB2F39306FE1F474922B836B93B85240C8DB0A6458E77EE3B98895DB8260A4900800E18C414E96E71EBA6A3
7,630,708 UART: [art] PUB.Y = 39DA776617E6B8A981AAFB72A642691E0ECE05843739A73A8EB90C9157B30A8BCDC854259715C0047DBAAA9A2C91DB29
7,637,651 UART: [art] SIG.R = E7A7755B17CAF75A7E96A1FC1EFA23207872662F68610723E57F2593BA45BEFDCCD6CCF4515CAB67F86C1F344A612C7A
7,644,432 UART: [art] SIG.S = FD583BCA1F7B7D92CD4085529125CC629CC9A131D3FEF6FB78CACEC0F94A5E868F6ACE63EF6A85F7DC4C3C0FEF64729C
7,668,445 UART: Caliptra RT
7,668,788 UART: [state] CFI Enabled
8,021,480 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,052,347 UART: [rt]cmd =0x44504543, len=96
8,085,660 >>> mbox cmd response data (56 bytes)
8,085,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,115,564 UART: [rt]cmd =0x44504543, len=96
8,148,474 >>> mbox cmd response data (56 bytes)
8,148,475 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,178,354 UART: [rt]cmd =0x44504543, len=96
8,211,737 >>> mbox cmd response data (56 bytes)
8,211,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,241,527 UART: [rt]cmd =0x44504543, len=96
8,273,707 >>> mbox cmd response data (56 bytes)
8,273,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,303,709 UART: [rt]cmd =0x44504543, len=96
8,336,498 >>> mbox cmd response data (56 bytes)
8,336,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,366,782 UART: [rt]cmd =0x44504543, len=96
8,400,282 >>> mbox cmd response data (56 bytes)
8,400,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,430,314 UART: [rt]cmd =0x44504543, len=96
8,463,209 >>> mbox cmd response data (56 bytes)
8,463,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,493,135 UART: [rt]cmd =0x44504543, len=96
8,526,245 >>> mbox cmd response data (56 bytes)
8,526,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,556,257 UART: [rt]cmd =0x44504543, len=96
8,588,868 >>> mbox cmd response data (56 bytes)
8,588,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,618,894 UART: [rt]cmd =0x44504543, len=96
8,651,658 >>> mbox cmd response data (56 bytes)
8,651,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,681,616 UART: [rt]cmd =0x44504543, len=96
8,688,945 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,880 ready_for_fw is high
1,362,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,083 >>> mbox cmd response: success
2,981,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,566 UART:
3,042,582 UART: Running Caliptra FMC ...
3,042,990 UART:
3,043,133 UART: [state] CFI Enabled
3,053,761 UART: [fht] FMC Alias Private Key: 7
3,172,643 UART: [art] Extend RT PCRs Done
3,173,071 UART: [art] Lock RT PCRs Done
3,174,731 UART: [art] Populate DV Done
3,182,870 UART: [fht] FMC Alias Private Key: 7
3,183,902 UART: [art] Derive CDI
3,184,182 UART: [art] Store in slot 0x4
3,270,026 UART: [art] Derive Key Pair
3,270,386 UART: [art] Store priv key in slot 0x5
3,283,869 UART: [art] Derive Key Pair - Done
3,298,470 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,908 UART: [art] PUB.X = BB789AB163B3A8911B139D2C6A715304C6D29737CD376B27AA9447F987CDFCAC337F71490690B0874C0A511B44861FE1
3,321,669 UART: [art] PUB.Y = 1E889F3A1231B71D684DB7A7DB245B718D1A965D83BCE9E93A424052971C189773E9EC44C452E26C179AA20916C5ACE8
3,328,618 UART: [art] SIG.R = 05E7285691C0FEE55AB116B43A8182723FEB41D0BF21E67129738719C45CAAF3D3B2DE1E267CEF100253267600B82C05
3,335,357 UART: [art] SIG.S = 84AE80F5CF1DA92A0BF6B8DA564DA8525CA8A9391C74754765FB8D461AAB5E80E52B1196FEE82B8337A0C4F28F7CE750
3,359,334 UART: Caliptra RT
3,359,677 UART: [state] CFI Enabled
3,480,611 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,715 UART: [rt]cmd =0x44504543, len=96
3,544,969 >>> mbox cmd response data (56 bytes)
3,544,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,575,229 UART: [rt]cmd =0x44504543, len=96
3,608,499 >>> mbox cmd response data (56 bytes)
3,608,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,395 UART: [rt]cmd =0x44504543, len=96
3,671,168 >>> mbox cmd response data (56 bytes)
3,671,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,062 UART: [rt]cmd =0x44504543, len=96
3,733,914 >>> mbox cmd response data (56 bytes)
3,733,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,763,632 UART: [rt]cmd =0x44504543, len=96
3,797,221 >>> mbox cmd response data (56 bytes)
3,797,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,827,171 UART: [rt]cmd =0x44504543, len=96
3,860,185 >>> mbox cmd response data (56 bytes)
3,860,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,890,095 UART: [rt]cmd =0x44504543, len=96
3,923,044 >>> mbox cmd response data (56 bytes)
3,923,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,998 UART: [rt]cmd =0x44504543, len=96
3,985,542 >>> mbox cmd response data (56 bytes)
3,985,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,015,682 UART: [rt]cmd =0x44504543, len=96
4,048,731 >>> mbox cmd response data (56 bytes)
4,048,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,078,621 UART: [rt]cmd =0x44504543, len=96
4,112,155 >>> mbox cmd response data (56 bytes)
4,112,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,141,869 UART: [rt]cmd =0x44504543, len=96
4,174,904 >>> mbox cmd response data (56 bytes)
4,174,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,204,808 UART: [rt]cmd =0x44504543, len=96
4,238,016 >>> mbox cmd response data (56 bytes)
4,238,017 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,267,416 UART: [rt]cmd =0x52435458, len=8
4,269,284 >>> mbox cmd response data (16 bytes)
4,269,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,084,640 >>> mbox cmd response: success
7,084,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
7,097,890 UART:
7,097,906 UART: Running Caliptra FMC ...
7,098,314 UART:
7,098,457 UART: [state] CFI Enabled
7,187,826 UART: [art] Extend RT PCRs Done
7,188,254 UART: [art] Lock RT PCRs Done
7,189,565 UART: [art] Populate DV Done
7,197,690 UART: [fht] FMC Alias Private Key: 7
7,198,778 UART: [art] Derive CDI
7,199,058 UART: [art] Store in slot 0x4
7,284,502 UART: [art] Derive Key Pair
7,284,862 UART: [art] Store priv key in slot 0x5
7,298,361 UART: [art] Derive Key Pair - Done
7,313,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,328,720 UART: [art] Erasing AUTHORITY.KEYID = 7
7,329,485 UART: [art] PUB.X = 3A7B987B6992C1984627D88CFEACF59C49C12AB7C871456572D4ADAD5A7ADBE75A2C5FE7BB3726A240A060F4B22EFD67
7,336,271 UART: [art] PUB.Y = AEEBE8DCC1D495C0BFDA5C7F60EBB79364AF9E6F4C4F724D839DCE19A87FB009DBF7C70936BD35CD168B8D909BD2AA8E
7,343,247 UART: [art] SIG.R = AA3D9B39318E29DE2FD1D9CE6AF7D17E7867FEBA3EC7357F6D3209CFB94B4E5446D578C5517B6C8B7FC92E1D6809335E
7,350,027 UART: [art] SIG.S = E321766140A83BD5B1F8D274931AE663DBAFCD8093447213B69B5B19E08CEBECC552A49CFE4962671120650BEEE88B0E
7,373,871 UART: Caliptra RT
7,374,214 UART: [state] CFI Enabled
7,725,404 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,756,123 UART: [rt]cmd =0x44504543, len=96
7,790,140 >>> mbox cmd response data (56 bytes)
7,790,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,820,116 UART: [rt]cmd =0x44504543, len=96
7,853,270 >>> mbox cmd response data (56 bytes)
7,853,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,883,360 UART: [rt]cmd =0x44504543, len=96
7,916,219 >>> mbox cmd response data (56 bytes)
7,916,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,946,191 UART: [rt]cmd =0x44504543, len=96
7,979,125 >>> mbox cmd response data (56 bytes)
7,979,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,009,127 UART: [rt]cmd =0x44504543, len=96
8,042,020 >>> mbox cmd response data (56 bytes)
8,042,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,072,120 UART: [rt]cmd =0x44504543, len=96
8,104,268 >>> mbox cmd response data (56 bytes)
8,104,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,134,468 UART: [rt]cmd =0x44504543, len=96
8,168,333 >>> mbox cmd response data (56 bytes)
8,168,334 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,198,221 UART: [rt]cmd =0x44504543, len=96
8,231,239 >>> mbox cmd response data (56 bytes)
8,231,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,261,085 UART: [rt]cmd =0x44504543, len=96
8,293,768 >>> mbox cmd response data (56 bytes)
8,293,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,323,454 UART: [rt]cmd =0x44504543, len=96
8,356,920 >>> mbox cmd response data (56 bytes)
8,356,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,386,906 UART: [rt]cmd =0x44504543, len=96
8,394,139 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
Truncated 959 bytes from beginning
] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
915,691 UART: [kat] HMAC-384Kdf
920,227 UART: [kat] LMS
1,168,539 UART: [kat] --
1,169,196 UART: [cold-reset] ++
1,169,728 UART: [fht] FHT @ 0x50003400
1,172,286 UART: [idev] ++
1,172,454 UART: [idev] CDI.KEYID = 6
1,172,815 UART: [idev] SUBJECT.KEYID = 7
1,173,240 UART: [idev] UDS.KEYID = 0
1,173,586 ready_for_fw is high
1,173,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,195 UART: [idev] Erasing UDS.KEYID = 0
1,198,041 UART: [idev] Sha1 KeyId Algorithm
1,206,955 UART: [idev] --
1,207,970 UART: [ldev] ++
1,208,138 UART: [ldev] CDI.KEYID = 6
1,208,502 UART: [ldev] SUBJECT.KEYID = 5
1,208,929 UART: [ldev] AUTHORITY.KEYID = 7
1,209,392 UART: [ldev] FE.KEYID = 1
1,214,488 UART: [ldev] Erasing FE.KEYID = 1
1,240,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,888 UART: [ldev] --
1,280,297 UART: [fwproc] Wait for Commands...
1,281,078 UART: [fwproc] Recv command 0x46574c44
1,281,811 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,959 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,134 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,487 >>> mbox cmd response: success
2,825,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,826,613 UART: [afmc] ++
2,826,781 UART: [afmc] CDI.KEYID = 6
2,827,144 UART: [afmc] SUBJECT.KEYID = 7
2,827,570 UART: [afmc] AUTHORITY.KEYID = 5
2,863,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,445 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,155 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,036 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,737 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,458 UART: [afmc] --
2,906,477 UART: [cold-reset] --
2,907,219 UART: [state] Locking Datavault
2,908,426 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,030 UART: [state] Locking ICCM
2,909,462 UART: [exit] Launching FMC @ 0x40000130
2,914,792 UART:
2,914,808 UART: Running Caliptra FMC ...
2,915,216 UART:
2,915,270 UART: [state] CFI Enabled
2,925,580 UART: [fht] FMC Alias Private Key: 7
3,044,550 UART: [art] Extend RT PCRs Done
3,044,978 UART: [art] Lock RT PCRs Done
3,046,554 UART: [art] Populate DV Done
3,054,579 UART: [fht] FMC Alias Private Key: 7
3,055,669 UART: [art] Derive CDI
3,055,949 UART: [art] Store in slot 0x4
3,141,586 UART: [art] Derive Key Pair
3,141,946 UART: [art] Store priv key in slot 0x5
3,156,126 UART: [art] Derive Key Pair - Done
3,171,109 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,354 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,119 UART: [art] PUB.X = 9640DBEA94B10130417930C2C2A5B321C401EDF96B26EA9B4F00D8837A9920AEEA4BF7894D43BA1D3819FE365F26F339
3,193,867 UART: [art] PUB.Y = C87AF60C60CE56AE47BA76E942A19FC0DE0CDFCCDF6EAD69C56A7CF0B1E6E2AEA7D075862CAB8F99EB4460326E49EEC8
3,200,843 UART: [art] SIG.R = 6375135C2F5720FDCCBBE245903482E925CA35AC95BA7BAA911CED940F56B004BCF5F80CE9620900AF3821B55876B5A8
3,207,587 UART: [art] SIG.S = 2816A35FF247389E1B0C04AC3416A193524B942BE5D6B9A8CCA8057C74F357D36B5E3549E9BD61E4C306E9ED2771C64E
3,231,209 UART: Caliptra RT
3,231,460 UART: [state] CFI Enabled
3,351,630 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,612 UART: [rt]cmd =0x44504543, len=96
3,416,430 >>> mbox cmd response data (56 bytes)
3,416,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,446,334 UART: [rt]cmd =0x44504543, len=96
3,479,232 >>> mbox cmd response data (56 bytes)
3,479,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,126 UART: [rt]cmd =0x44504543, len=96
3,542,223 >>> mbox cmd response data (56 bytes)
3,542,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,301 UART: [rt]cmd =0x44504543, len=96
3,605,767 >>> mbox cmd response data (56 bytes)
3,605,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,531 UART: [rt]cmd =0x44504543, len=96
3,667,630 >>> mbox cmd response data (56 bytes)
3,667,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,568 UART: [rt]cmd =0x44504543, len=96
3,730,688 >>> mbox cmd response data (56 bytes)
3,730,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,760,646 UART: [rt]cmd =0x44504543, len=96
3,794,057 >>> mbox cmd response data (56 bytes)
3,794,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,823,923 UART: [rt]cmd =0x44504543, len=96
3,856,641 >>> mbox cmd response data (56 bytes)
3,856,642 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,839 UART: [rt]cmd =0x44504543, len=96
3,919,182 >>> mbox cmd response data (56 bytes)
3,919,183 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,172 UART: [rt]cmd =0x44504543, len=96
3,981,798 >>> mbox cmd response data (56 bytes)
3,981,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,011,678 UART: [rt]cmd =0x44504543, len=96
4,045,029 >>> mbox cmd response data (56 bytes)
4,045,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,074,977 UART: [rt]cmd =0x44504543, len=96
4,108,137 >>> mbox cmd response data (56 bytes)
4,108,138 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,137,727 UART: [rt]cmd =0x52435458, len=8
4,139,495 >>> mbox cmd response data (16 bytes)
4,139,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,140,489 UART:
4,140,505 UART: Running Caliptra ROM ...
4,140,913 UART:
4,140,968 UART: [state] CFI Enabled
4,143,526 UART: [state] LifecycleState = Unprovisioned
4,144,181 UART: [state] DebugLocked = No
4,144,835 UART: [state] WD Timer not started. Device not locked for debugging
4,146,079 UART: [kat] SHA2-256
4,949,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,953,733 UART: [kat] ++
4,953,885 UART: [kat] sha1
4,958,147 UART: [kat] SHA2-256
4,960,087 UART: [kat] SHA2-384
4,962,992 UART: [kat] SHA2-512-ACC
4,964,892 UART: [kat] ECC-384
4,974,937 UART: [kat] HMAC-384Kdf
4,979,453 UART: [kat] LMS
5,227,765 UART: [kat] --
5,228,889 UART: [update-reset] ++
6,587,738 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,588,707 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,743,922 >>> mbox cmd response: success
6,743,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,744,221 UART: [update-reset] Copying MAN_2 To MAN_1
6,752,235 UART: [update-reset Success] --
6,753,392 UART: [state] Locking Datavault
6,754,316 UART: [state] Locking PCR0, PCR1 and PCR31
6,754,920 UART: [state] Locking ICCM
6,755,532 UART: [exit] Launching FMC @ 0x40000130
6,760,862 UART:
6,760,878 UART: Running Caliptra FMC ...
6,761,286 UART:
6,761,340 UART: [state] CFI Enabled
6,850,887 UART: [art] Extend RT PCRs Done
6,851,315 UART: [art] Lock RT PCRs Done
6,852,406 UART: [art] Populate DV Done
6,860,799 UART: [fht] FMC Alias Private Key: 7
6,861,759 UART: [art] Derive CDI
6,862,039 UART: [art] Store in slot 0x4
6,947,550 UART: [art] Derive Key Pair
6,947,910 UART: [art] Store priv key in slot 0x5
6,961,644 UART: [art] Derive Key Pair - Done
6,976,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,992,013 UART: [art] Erasing AUTHORITY.KEYID = 7
6,992,778 UART: [art] PUB.X = B00A24D7481DF13AD85C5521FA27793EADC500507341065C14CCA26D70573B61562E65E2BB6FEBD0E6AE165A8F317DE1
6,999,528 UART: [art] PUB.Y = 55CF50EA85ACE4E11356C4E6E07E35958B59764EAC649CE04E00AD7DAD25E7958C33DB6D6B241B635908D73CD86A937B
7,006,463 UART: [art] SIG.R = 377A6E970AEEC6C128224A00B1E633727FA7022702A8C331EBEA6BC8C05ACB86C8408F186EA688BB5C425B8F0E9F61D8
7,013,209 UART: [art] SIG.S = 49C677562484F245B5FF842E45BA863651EBD478F99BEE1646986707AEFF4ECA24F199A1D9992F31BF51207C6E9240C2
7,037,176 UART: Caliptra RT
7,037,427 UART: [state] CFI Enabled
7,390,798 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,421,723 UART: [rt]cmd =0x44504543, len=96
7,455,436 >>> mbox cmd response data (56 bytes)
7,455,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,485,420 UART: [rt]cmd =0x44504543, len=96
7,519,082 >>> mbox cmd response data (56 bytes)
7,519,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,549,204 UART: [rt]cmd =0x44504543, len=96
7,582,095 >>> mbox cmd response data (56 bytes)
7,582,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,612,147 UART: [rt]cmd =0x44504543, len=96
7,643,991 >>> mbox cmd response data (56 bytes)
7,643,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,673,855 UART: [rt]cmd =0x44504543, len=96
7,706,978 >>> mbox cmd response data (56 bytes)
7,706,979 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,737,126 UART: [rt]cmd =0x44504543, len=96
7,770,150 >>> mbox cmd response data (56 bytes)
7,770,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,800,040 UART: [rt]cmd =0x44504543, len=96
7,834,011 >>> mbox cmd response data (56 bytes)
7,834,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,863,911 UART: [rt]cmd =0x44504543, len=96
7,897,189 >>> mbox cmd response data (56 bytes)
7,897,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,926,893 UART: [rt]cmd =0x44504543, len=96
7,959,716 >>> mbox cmd response data (56 bytes)
7,959,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,989,684 UART: [rt]cmd =0x44504543, len=96
8,023,000 >>> mbox cmd response data (56 bytes)
8,023,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,053,162 UART: [rt]cmd =0x44504543, len=96
8,060,425 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,044 ready_for_fw is high
1,059,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,796 >>> mbox cmd response: success
2,676,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,738,887 UART:
2,738,903 UART: Running Caliptra FMC ...
2,739,311 UART:
2,739,365 UART: [state] CFI Enabled
2,749,601 UART: [fht] FMC Alias Private Key: 7
2,868,539 UART: [art] Extend RT PCRs Done
2,868,967 UART: [art] Lock RT PCRs Done
2,870,363 UART: [art] Populate DV Done
2,878,742 UART: [fht] FMC Alias Private Key: 7
2,879,848 UART: [art] Derive CDI
2,880,128 UART: [art] Store in slot 0x4
2,965,689 UART: [art] Derive Key Pair
2,966,049 UART: [art] Store priv key in slot 0x5
2,979,679 UART: [art] Derive Key Pair - Done
2,994,713 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,808 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,573 UART: [art] PUB.X = CFB85AF23CF9EDD66A93371F96B29277BD9A29E736C8F548A16D4361F382D097657B98F5392BB1CFEB8CB14E2B0A3B86
3,018,352 UART: [art] PUB.Y = DFA8C8DA0A9E11F852AE246B7E39F08CF90F6CC7E18A9BCC0D58CFC9E318FD9147D08FE5829EF4B449C8BC57B272EB68
3,025,317 UART: [art] SIG.R = 4826D6133EE29BD0DD65EC316571ABFFB2A25C4C068E04B289D1A6434720F1E51E0918B9DBA8502758DE3A168ED93B10
3,032,084 UART: [art] SIG.S = 6CDF959B5449132129F9A00E86373B0930E91DB9C68FC91EB2278D41520A7DA7C5734711D5B53DD251D10631A396CE37
3,055,330 UART: Caliptra RT
3,055,581 UART: [state] CFI Enabled
3,176,225 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,625 UART: [rt]cmd =0x44504543, len=96
3,240,869 >>> mbox cmd response data (56 bytes)
3,240,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,270,709 UART: [rt]cmd =0x44504543, len=96
3,303,637 >>> mbox cmd response data (56 bytes)
3,303,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,333,539 UART: [rt]cmd =0x44504543, len=96
3,366,688 >>> mbox cmd response data (56 bytes)
3,366,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,620 UART: [rt]cmd =0x44504543, len=96
3,429,284 >>> mbox cmd response data (56 bytes)
3,429,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,459,248 UART: [rt]cmd =0x44504543, len=96
3,492,089 >>> mbox cmd response data (56 bytes)
3,492,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,977 UART: [rt]cmd =0x44504543, len=96
3,554,869 >>> mbox cmd response data (56 bytes)
3,554,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,023 UART: [rt]cmd =0x44504543, len=96
3,618,536 >>> mbox cmd response data (56 bytes)
3,618,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,622 UART: [rt]cmd =0x44504543, len=96
3,681,432 >>> mbox cmd response data (56 bytes)
3,681,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,622 UART: [rt]cmd =0x44504543, len=96
3,744,583 >>> mbox cmd response data (56 bytes)
3,744,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,774,605 UART: [rt]cmd =0x44504543, len=96
3,807,415 >>> mbox cmd response data (56 bytes)
3,807,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,393 UART: [rt]cmd =0x44504543, len=96
3,870,188 >>> mbox cmd response data (56 bytes)
3,870,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,998 UART: [rt]cmd =0x44504543, len=96
3,932,978 >>> mbox cmd response data (56 bytes)
3,932,979 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,962,558 UART: [rt]cmd =0x52435458, len=8
3,964,310 >>> mbox cmd response data (16 bytes)
3,964,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,452,517 >>> mbox cmd response: success
6,452,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,465,786 UART:
6,465,802 UART: Running Caliptra FMC ...
6,466,210 UART:
6,466,264 UART: [state] CFI Enabled
6,555,165 UART: [art] Extend RT PCRs Done
6,555,593 UART: [art] Lock RT PCRs Done
6,556,786 UART: [art] Populate DV Done
6,564,883 UART: [fht] FMC Alias Private Key: 7
6,565,919 UART: [art] Derive CDI
6,566,199 UART: [art] Store in slot 0x4
6,651,978 UART: [art] Derive Key Pair
6,652,338 UART: [art] Store priv key in slot 0x5
6,665,988 UART: [art] Derive Key Pair - Done
6,680,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,696,392 UART: [art] Erasing AUTHORITY.KEYID = 7
6,697,157 UART: [art] PUB.X = E19BAF69424F0C3F3C8E60721443F74EE303ED7EFFB430B32BF582A22573519F270F27EA4A531CD492E99C1CB362D56E
6,703,926 UART: [art] PUB.Y = C9B79BDE806C74020DA9983DC3715FF2603889A2D0EAA9AB24F26C2FEB5C513BBB7BDCC20B295BC03CF6A660B6FB240D
6,710,886 UART: [art] SIG.R = E50E0AC66006E066BAA3FB057D081790F187782115B4FA106F2D81B3CF930E901D8B059CA644E7839ED2283522464383
6,717,629 UART: [art] SIG.S = 179010FFCBF07ED64431395F392DB7C46E0C1F97519661F1E1E444F330D28F5A5D2A06729BC806B371D43B551EE47492
6,742,580 UART: Caliptra RT
6,742,831 UART: [state] CFI Enabled
7,091,691 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,122,478 UART: [rt]cmd =0x44504543, len=96
7,155,497 >>> mbox cmd response data (56 bytes)
7,155,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,185,471 UART: [rt]cmd =0x44504543, len=96
7,218,479 >>> mbox cmd response data (56 bytes)
7,218,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,248,171 UART: [rt]cmd =0x44504543, len=96
7,280,922 >>> mbox cmd response data (56 bytes)
7,280,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,310,936 UART: [rt]cmd =0x44504543, len=96
7,344,204 >>> mbox cmd response data (56 bytes)
7,344,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,374,226 UART: [rt]cmd =0x44504543, len=96
7,407,133 >>> mbox cmd response data (56 bytes)
7,407,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,437,195 UART: [rt]cmd =0x44504543, len=96
7,470,155 >>> mbox cmd response data (56 bytes)
7,470,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,500,095 UART: [rt]cmd =0x44504543, len=96
7,533,380 >>> mbox cmd response data (56 bytes)
7,533,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,563,332 UART: [rt]cmd =0x44504543, len=96
7,596,992 >>> mbox cmd response data (56 bytes)
7,596,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,627,086 UART: [rt]cmd =0x44504543, len=96
7,660,281 >>> mbox cmd response data (56 bytes)
7,660,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,690,155 UART: [rt]cmd =0x44504543, len=96
7,723,385 >>> mbox cmd response data (56 bytes)
7,723,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,753,531 UART: [rt]cmd =0x44504543, len=96
7,760,812 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.60s
Truncated 959 bytes from beginning
] sha1
899,951 UART: [kat] SHA2-256
901,891 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
916,462 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,547 UART: [fht] FHT @ 0x50003400
1,173,093 UART: [idev] ++
1,173,261 UART: [idev] CDI.KEYID = 6
1,173,622 UART: [idev] SUBJECT.KEYID = 7
1,174,047 UART: [idev] UDS.KEYID = 0
1,174,393 ready_for_fw is high
1,174,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,199,220 UART: [idev] Sha1 KeyId Algorithm
1,208,018 UART: [idev] --
1,209,125 UART: [ldev] ++
1,209,293 UART: [ldev] CDI.KEYID = 6
1,209,657 UART: [ldev] SUBJECT.KEYID = 5
1,210,084 UART: [ldev] AUTHORITY.KEYID = 7
1,210,547 UART: [ldev] FE.KEYID = 1
1,216,097 UART: [ldev] Erasing FE.KEYID = 1
1,243,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,351 UART: [ldev] --
1,282,776 UART: [fwproc] Wait for Commands...
1,283,417 UART: [fwproc] Recv command 0x46574c44
1,284,150 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,114 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,289 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,598 >>> mbox cmd response: success
2,826,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,764 UART: [afmc] ++
2,827,932 UART: [afmc] CDI.KEYID = 6
2,828,295 UART: [afmc] SUBJECT.KEYID = 7
2,828,721 UART: [afmc] AUTHORITY.KEYID = 5
2,863,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,250 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,960 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,841 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,542 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,363 UART: [afmc] --
2,907,338 UART: [cold-reset] --
2,908,080 UART: [state] Locking Datavault
2,909,319 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,923 UART: [state] Locking ICCM
2,910,487 UART: [exit] Launching FMC @ 0x40000130
2,915,817 UART:
2,915,833 UART: Running Caliptra FMC ...
2,916,241 UART:
2,916,384 UART: [state] CFI Enabled
2,927,036 UART: [fht] FMC Alias Private Key: 7
3,045,518 UART: [art] Extend RT PCRs Done
3,045,946 UART: [art] Lock RT PCRs Done
3,047,196 UART: [art] Populate DV Done
3,055,317 UART: [fht] FMC Alias Private Key: 7
3,056,253 UART: [art] Derive CDI
3,056,533 UART: [art] Store in slot 0x4
3,142,150 UART: [art] Derive Key Pair
3,142,510 UART: [art] Store priv key in slot 0x5
3,156,072 UART: [art] Derive Key Pair - Done
3,170,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,548 UART: [art] PUB.X = 1E18628B6E688C251CFE1DDDF9C5BA79460C219783926DBABED52396B5096C0FCADEE7721A4717C7DD048C2B4587A910
3,193,316 UART: [art] PUB.Y = FF503765653F30A76943A3D28A26756C1C835EEDE469668F78A5C77CE3AA56F1638252EA5C74CDC1DD396AC7BEBB4108
3,200,271 UART: [art] SIG.R = 905AFD3520450C8AD5F55763BA02D0F09E0037E2EBA05B2A5DA9A8BFFCB62EBFD9CEF3FFD7F0FE217AB063A50727F836
3,207,034 UART: [art] SIG.S = D1C66482116035E73427334E08158F086504371AFA390C2B381D1D600BA8F3039D268A18244F2E38A7092BBF94F9E685
3,230,959 UART: Caliptra RT
3,231,302 UART: [state] CFI Enabled
3,350,658 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,766 UART: [rt]cmd =0x44504543, len=96
3,414,404 >>> mbox cmd response data (56 bytes)
3,414,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,444,432 UART: [rt]cmd =0x44504543, len=96
3,477,228 >>> mbox cmd response data (56 bytes)
3,477,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,124 UART: [rt]cmd =0x44504543, len=96
3,540,515 >>> mbox cmd response data (56 bytes)
3,540,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,570,613 UART: [rt]cmd =0x44504543, len=96
3,602,921 >>> mbox cmd response data (56 bytes)
3,602,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,633,005 UART: [rt]cmd =0x44504543, len=96
3,665,848 >>> mbox cmd response data (56 bytes)
3,665,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,695,628 UART: [rt]cmd =0x44504543, len=96
3,727,938 >>> mbox cmd response data (56 bytes)
3,727,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,757,894 UART: [rt]cmd =0x44504543, len=96
3,790,567 >>> mbox cmd response data (56 bytes)
3,790,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,563 UART: [rt]cmd =0x44504543, len=96
3,854,127 >>> mbox cmd response data (56 bytes)
3,854,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,884,071 UART: [rt]cmd =0x44504543, len=96
3,917,164 >>> mbox cmd response data (56 bytes)
3,917,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,947,040 UART: [rt]cmd =0x44504543, len=96
3,979,740 >>> mbox cmd response data (56 bytes)
3,979,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,380 UART: [rt]cmd =0x44504543, len=96
4,042,433 >>> mbox cmd response data (56 bytes)
4,042,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,072,331 UART: [rt]cmd =0x44504543, len=96
4,105,131 >>> mbox cmd response data (56 bytes)
4,105,132 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,134,415 UART: [rt]cmd =0x52435458, len=8
4,135,997 >>> mbox cmd response data (16 bytes)
4,135,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,136,787 UART:
4,136,803 UART: Running Caliptra ROM ...
4,137,211 UART:
4,137,353 UART: [state] CFI Enabled
4,140,477 UART: [state] LifecycleState = Unprovisioned
4,141,132 UART: [state] DebugLocked = No
4,141,732 UART: [state] WD Timer not started. Device not locked for debugging
4,142,868 UART: [kat] SHA2-256
4,946,418 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,950,522 UART: [kat] ++
4,950,674 UART: [kat] sha1
4,954,936 UART: [kat] SHA2-256
4,956,876 UART: [kat] SHA2-384
4,959,697 UART: [kat] SHA2-512-ACC
4,961,597 UART: [kat] ECC-384
4,971,178 UART: [kat] HMAC-384Kdf
4,975,788 UART: [kat] LMS
5,224,100 UART: [kat] --
5,225,208 UART: [update-reset] ++
6,583,561 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,584,528 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,739,743 >>> mbox cmd response: success
6,739,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,740,024 UART: [update-reset] Copying MAN_2 To MAN_1
6,748,038 UART: [update-reset Success] --
6,748,999 UART: [state] Locking Datavault
6,750,009 UART: [state] Locking PCR0, PCR1 and PCR31
6,750,613 UART: [state] Locking ICCM
6,751,253 UART: [exit] Launching FMC @ 0x40000130
6,756,583 UART:
6,756,599 UART: Running Caliptra FMC ...
6,757,007 UART:
6,757,150 UART: [state] CFI Enabled
6,845,709 UART: [art] Extend RT PCRs Done
6,846,137 UART: [art] Lock RT PCRs Done
6,847,332 UART: [art] Populate DV Done
6,855,243 UART: [fht] FMC Alias Private Key: 7
6,856,249 UART: [art] Derive CDI
6,856,529 UART: [art] Store in slot 0x4
6,942,576 UART: [art] Derive Key Pair
6,942,936 UART: [art] Store priv key in slot 0x5
6,956,578 UART: [art] Derive Key Pair - Done
6,971,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,987,433 UART: [art] Erasing AUTHORITY.KEYID = 7
6,988,198 UART: [art] PUB.X = D6C1955E8CF38875C78742B97BED1FCCD2840670FFDE6970802DD073DBAE863BC8705E3E1B0E2330038C783F9142A2D9
6,994,965 UART: [art] PUB.Y = F5576B8623370E01EB121277BA59B981AE4743B40163C585A76B2601619387DD99696DF00B8187CE8BAC4F560ACDFE33
7,001,895 UART: [art] SIG.R = F8DB8EDCEBCC1C5BCA31DCC59BE86AEBC7706873DC3A0D572EB610211EA5BB5BFC20505586E38F851E3DD8B8620EA66A
7,008,687 UART: [art] SIG.S = 72573F0E059D7A462EC63CE4885CA918EA8D31B33DF4A6764F537705A3F7DB1526F5178B28D63162EE8A351FBFA75D9A
7,032,372 UART: Caliptra RT
7,032,715 UART: [state] CFI Enabled
7,382,199 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,412,790 UART: [rt]cmd =0x44504543, len=96
7,445,585 >>> mbox cmd response data (56 bytes)
7,445,586 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,475,443 UART: [rt]cmd =0x44504543, len=96
7,508,821 >>> mbox cmd response data (56 bytes)
7,508,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,538,847 UART: [rt]cmd =0x44504543, len=96
7,572,072 >>> mbox cmd response data (56 bytes)
7,572,073 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,601,980 UART: [rt]cmd =0x44504543, len=96
7,635,384 >>> mbox cmd response data (56 bytes)
7,635,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,665,432 UART: [rt]cmd =0x44504543, len=96
7,698,207 >>> mbox cmd response data (56 bytes)
7,698,208 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,728,227 UART: [rt]cmd =0x44504543, len=96
7,761,475 >>> mbox cmd response data (56 bytes)
7,761,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,791,417 UART: [rt]cmd =0x44504543, len=96
7,825,074 >>> mbox cmd response data (56 bytes)
7,825,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,855,024 UART: [rt]cmd =0x44504543, len=96
7,888,350 >>> mbox cmd response data (56 bytes)
7,888,351 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,918,330 UART: [rt]cmd =0x44504543, len=96
7,952,165 >>> mbox cmd response data (56 bytes)
7,952,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,982,163 UART: [rt]cmd =0x44504543, len=96
8,015,859 >>> mbox cmd response data (56 bytes)
8,015,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,045,967 UART: [rt]cmd =0x44504543, len=96
8,053,310 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,559 ready_for_fw is high
1,059,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,949 >>> mbox cmd response: success
2,679,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,838 UART:
2,742,854 UART: Running Caliptra FMC ...
2,743,262 UART:
2,743,405 UART: [state] CFI Enabled
2,754,081 UART: [fht] FMC Alias Private Key: 7
2,873,803 UART: [art] Extend RT PCRs Done
2,874,231 UART: [art] Lock RT PCRs Done
2,875,681 UART: [art] Populate DV Done
2,884,270 UART: [fht] FMC Alias Private Key: 7
2,885,222 UART: [art] Derive CDI
2,885,502 UART: [art] Store in slot 0x4
2,971,381 UART: [art] Derive Key Pair
2,971,741 UART: [art] Store priv key in slot 0x5
2,984,949 UART: [art] Derive Key Pair - Done
2,999,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,022 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,787 UART: [art] PUB.X = 0D08199F2AAD9A4C3989F7896AB31E6CFC9538E672C4E1CAA109E292601324E0E419059FE0507CB9895329FB8F8B0A26
3,022,544 UART: [art] PUB.Y = 7D6586C04CB7C695BF01235D6708F5A9842421E6314625A1EC57999CA221631102CFC58AB9E525DC55FF1E26E7931F6B
3,029,483 UART: [art] SIG.R = 6EA133B43D64FCFD3A4EB584A35C7EB797FCFA95F02E1B064A3B026BD177A3C07853EFBBD4A8CD29EC04426782D55CD0
3,036,264 UART: [art] SIG.S = 1F8140204BEA4A26EECFF644273B937F302E3D4C961EE239C2A94634D5DBAEB4D0E35068EA7827FA4DCB6D3889139C27
3,059,816 UART: Caliptra RT
3,060,159 UART: [state] CFI Enabled
3,179,477 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,545 UART: [rt]cmd =0x44504543, len=96
3,243,063 >>> mbox cmd response data (56 bytes)
3,243,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,272,911 UART: [rt]cmd =0x44504543, len=96
3,305,095 >>> mbox cmd response data (56 bytes)
3,305,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,335,021 UART: [rt]cmd =0x44504543, len=96
3,368,362 >>> mbox cmd response data (56 bytes)
3,368,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,362 UART: [rt]cmd =0x44504543, len=96
3,430,844 >>> mbox cmd response data (56 bytes)
3,430,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,786 UART: [rt]cmd =0x44504543, len=96
3,493,663 >>> mbox cmd response data (56 bytes)
3,493,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,635 UART: [rt]cmd =0x44504543, len=96
3,556,271 >>> mbox cmd response data (56 bytes)
3,556,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,425 UART: [rt]cmd =0x44504543, len=96
3,619,458 >>> mbox cmd response data (56 bytes)
3,619,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,306 UART: [rt]cmd =0x44504543, len=96
3,681,998 >>> mbox cmd response data (56 bytes)
3,681,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,002 UART: [rt]cmd =0x44504543, len=96
3,745,093 >>> mbox cmd response data (56 bytes)
3,745,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,775,047 UART: [rt]cmd =0x44504543, len=96
3,808,079 >>> mbox cmd response data (56 bytes)
3,808,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,047 UART: [rt]cmd =0x44504543, len=96
3,871,252 >>> mbox cmd response data (56 bytes)
3,871,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,406 UART: [rt]cmd =0x44504543, len=96
3,934,882 >>> mbox cmd response data (56 bytes)
3,934,883 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,964,160 UART: [rt]cmd =0x52435458, len=8
3,965,874 >>> mbox cmd response data (16 bytes)
3,965,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,454,240 >>> mbox cmd response: success
6,454,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,467,221 UART:
6,467,237 UART: Running Caliptra FMC ...
6,467,645 UART:
6,467,788 UART: [state] CFI Enabled
6,557,007 UART: [art] Extend RT PCRs Done
6,557,435 UART: [art] Lock RT PCRs Done
6,558,742 UART: [art] Populate DV Done
6,566,901 UART: [fht] FMC Alias Private Key: 7
6,568,047 UART: [art] Derive CDI
6,568,327 UART: [art] Store in slot 0x4
6,654,352 UART: [art] Derive Key Pair
6,654,712 UART: [art] Store priv key in slot 0x5
6,668,480 UART: [art] Derive Key Pair - Done
6,683,469 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,698,224 UART: [art] Erasing AUTHORITY.KEYID = 7
6,698,989 UART: [art] PUB.X = 039EE38E635FE545FF2BABD2DCE3B4E6B810FF53C654A8C4A103AF36783A88A8545FB2FA7AD2D8A2203219C3BA64DDCC
6,705,775 UART: [art] PUB.Y = 73DD0061D76B0EC1FDAA1969342F602C35FF05F793A0E14A2ED950B73071B8F6AF85DC0E233EA297692591B22E873737
6,712,696 UART: [art] SIG.R = 17F908B00D5A5A6DD5AA7B68E5AC8B444C204739FAE1A57ED8DAB8738C8E8B862487C8A85594CAF18562F18E081F411F
6,719,467 UART: [art] SIG.S = BEEE65CEC684F4CEAD3BE99A0A5532DB992D35326E42CE6FEAD271F6BF87A63AE02E431592B8ACCDC440B09B03B34488
6,743,039 UART: Caliptra RT
6,743,382 UART: [state] CFI Enabled
7,095,936 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,126,751 UART: [rt]cmd =0x44504543, len=96
7,160,632 >>> mbox cmd response data (56 bytes)
7,160,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,190,602 UART: [rt]cmd =0x44504543, len=96
7,223,852 >>> mbox cmd response data (56 bytes)
7,223,853 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,253,786 UART: [rt]cmd =0x44504543, len=96
7,287,069 >>> mbox cmd response data (56 bytes)
7,287,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,317,309 UART: [rt]cmd =0x44504543, len=96
7,351,455 >>> mbox cmd response data (56 bytes)
7,351,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,381,407 UART: [rt]cmd =0x44504543, len=96
7,414,820 >>> mbox cmd response data (56 bytes)
7,414,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,444,824 UART: [rt]cmd =0x44504543, len=96
7,478,048 >>> mbox cmd response data (56 bytes)
7,478,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,508,096 UART: [rt]cmd =0x44504543, len=96
7,541,393 >>> mbox cmd response data (56 bytes)
7,541,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,571,375 UART: [rt]cmd =0x44504543, len=96
7,604,239 >>> mbox cmd response data (56 bytes)
7,604,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,634,359 UART: [rt]cmd =0x44504543, len=96
7,667,668 >>> mbox cmd response data (56 bytes)
7,667,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,697,664 UART: [rt]cmd =0x44504543, len=96
7,730,546 >>> mbox cmd response data (56 bytes)
7,730,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,760,530 UART: [rt]cmd =0x44504543, len=96
7,767,895 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
Truncated 959 bytes from beginning
] sha1
901,341 UART: [kat] SHA2-256
903,281 UART: [kat] SHA2-384
905,926 UART: [kat] SHA2-512-ACC
907,827 UART: [kat] ECC-384
917,746 UART: [kat] HMAC-384Kdf
922,262 UART: [kat] LMS
1,170,590 UART: [kat] --
1,171,337 UART: [cold-reset] ++
1,171,723 UART: [fht] FHT @ 0x50003400
1,174,504 UART: [idev] ++
1,174,672 UART: [idev] CDI.KEYID = 6
1,175,032 UART: [idev] SUBJECT.KEYID = 7
1,175,456 UART: [idev] UDS.KEYID = 0
1,175,801 ready_for_fw is high
1,175,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,532 UART: [idev] Erasing UDS.KEYID = 0
1,200,945 UART: [idev] Sha1 KeyId Algorithm
1,209,367 UART: [idev] --
1,210,515 UART: [ldev] ++
1,210,683 UART: [ldev] CDI.KEYID = 6
1,211,046 UART: [ldev] SUBJECT.KEYID = 5
1,211,472 UART: [ldev] AUTHORITY.KEYID = 7
1,211,935 UART: [ldev] FE.KEYID = 1
1,217,171 UART: [ldev] Erasing FE.KEYID = 1
1,243,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,527 UART: [ldev] --
1,282,920 UART: [fwproc] Wait for Commands...
1,283,738 UART: [fwproc] Recv command 0x46574c44
1,284,466 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,076 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,246 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,417 >>> mbox cmd response: success
2,828,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,829,657 UART: [afmc] ++
2,829,825 UART: [afmc] CDI.KEYID = 6
2,830,187 UART: [afmc] SUBJECT.KEYID = 7
2,830,612 UART: [afmc] AUTHORITY.KEYID = 5
2,866,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,564 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,273 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,156 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,857 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,785 UART: [afmc] --
2,909,767 UART: [cold-reset] --
2,910,715 UART: [state] Locking Datavault
2,911,908 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,512 UART: [state] Locking ICCM
2,913,050 UART: [exit] Launching FMC @ 0x40000130
2,918,380 UART:
2,918,396 UART: Running Caliptra FMC ...
2,918,804 UART:
2,918,858 UART: [state] CFI Enabled
2,929,144 UART: [fht] FMC Alias Private Key: 7
3,048,182 UART: [art] Extend RT PCRs Done
3,048,610 UART: [art] Lock RT PCRs Done
3,050,116 UART: [art] Populate DV Done
3,058,221 UART: [fht] FMC Alias Private Key: 7
3,059,235 UART: [art] Derive CDI
3,059,515 UART: [art] Store in slot 0x4
3,145,306 UART: [art] Derive Key Pair
3,145,666 UART: [art] Store priv key in slot 0x5
3,159,060 UART: [art] Derive Key Pair - Done
3,173,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,775 UART: [art] PUB.X = B14A563156D6C22092C067C08C7AC3BEF1EA25E9B96118317B58E0396C4183EABEC655AEA966CB0B2E210590A584EE42
3,196,545 UART: [art] PUB.Y = C01C662D7C32CDEB48003879C21160B009F5BBBC88F55D272DDC01C2D960642EA8522D3E0B7189EEDC47A7F187FF875F
3,203,474 UART: [art] SIG.R = 4CB07901555278C16D4BEE8AA316609739C04F424C632A10C1994C73261ECE779BE8A508B14901287BD98DFD13A73384
3,210,229 UART: [art] SIG.S = 460B77DA175E67ACE0FA7060C5A32A300F7FD88D2CA9833F8D63AD6DFB490F444FBB93369309C46B013A197207270218
3,233,974 UART: Caliptra RT
3,234,225 UART: [state] CFI Enabled
3,354,101 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,657 UART: [rt]cmd =0x44504543, len=96
3,417,937 >>> mbox cmd response data (56 bytes)
3,417,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,903 UART: [rt]cmd =0x44504543, len=96
3,480,009 >>> mbox cmd response data (56 bytes)
3,480,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,003 UART: [rt]cmd =0x44504543, len=96
3,543,464 >>> mbox cmd response data (56 bytes)
3,543,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,444 UART: [rt]cmd =0x44504543, len=96
3,606,988 >>> mbox cmd response data (56 bytes)
3,606,989 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,016 UART: [rt]cmd =0x44504543, len=96
3,670,021 >>> mbox cmd response data (56 bytes)
3,670,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,001 UART: [rt]cmd =0x44504543, len=96
3,732,903 >>> mbox cmd response data (56 bytes)
3,732,904 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,763,003 UART: [rt]cmd =0x44504543, len=96
3,795,934 >>> mbox cmd response data (56 bytes)
3,795,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,826,112 UART: [rt]cmd =0x44504543, len=96
3,859,006 >>> mbox cmd response data (56 bytes)
3,859,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,888,924 UART: [rt]cmd =0x44504543, len=96
3,921,001 >>> mbox cmd response data (56 bytes)
3,921,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,989 UART: [rt]cmd =0x44504543, len=96
3,984,909 >>> mbox cmd response data (56 bytes)
3,984,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,839 UART: [rt]cmd =0x44504543, len=96
4,047,446 >>> mbox cmd response data (56 bytes)
4,047,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,077,712 UART: [rt]cmd =0x44504543, len=96
4,110,822 >>> mbox cmd response data (56 bytes)
4,110,823 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,140,256 UART: [rt]cmd =0x52435458, len=8
4,142,030 >>> mbox cmd response data (16 bytes)
4,142,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,142,898 UART:
4,142,914 UART: Running Caliptra ROM ...
4,143,322 UART:
4,143,377 UART: [state] CFI Enabled
4,145,827 UART: [state] LifecycleState = Unprovisioned
4,146,482 UART: [state] DebugLocked = No
4,147,152 UART: [state] WD Timer not started. Device not locked for debugging
4,148,438 UART: [kat] SHA2-256
4,954,088 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,958,213 UART: [kat] ++
4,958,365 UART: [kat] sha1
4,962,639 UART: [kat] SHA2-256
4,964,579 UART: [kat] SHA2-384
4,967,192 UART: [kat] SHA2-512-ACC
4,969,092 UART: [kat] ECC-384
4,978,531 UART: [kat] HMAC-384Kdf
4,983,111 UART: [kat] LMS
5,231,439 UART: [kat] --
5,232,357 UART: [update-reset] ++
6,591,873 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,592,948 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,748,163 >>> mbox cmd response: success
6,748,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,748,304 UART: [update-reset] Copying MAN_2 To MAN_1
6,756,318 UART: [update-reset Success] --
6,757,317 UART: [state] Locking Datavault
6,758,021 UART: [state] Locking PCR0, PCR1 and PCR31
6,758,625 UART: [state] Locking ICCM
6,759,129 UART: [exit] Launching FMC @ 0x40000130
6,764,459 UART:
6,764,475 UART: Running Caliptra FMC ...
6,764,883 UART:
6,764,937 UART: [state] CFI Enabled
6,854,148 UART: [art] Extend RT PCRs Done
6,854,576 UART: [art] Lock RT PCRs Done
6,855,887 UART: [art] Populate DV Done
6,863,836 UART: [fht] FMC Alias Private Key: 7
6,864,862 UART: [art] Derive CDI
6,865,142 UART: [art] Store in slot 0x4
6,950,619 UART: [art] Derive Key Pair
6,950,979 UART: [art] Store priv key in slot 0x5
6,964,095 UART: [art] Derive Key Pair - Done
6,978,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,994,585 UART: [art] Erasing AUTHORITY.KEYID = 7
6,995,350 UART: [art] PUB.X = 4387C5866ACFE73E1D79B6D14A2D43FDB8377EFF4B1F5D87E75B41BF7E3E3576E7E49ADF2BE864FD7101BFAF8CA20455
7,002,134 UART: [art] PUB.Y = B3770EAEDC65F68FF7617FF8413D95D98A540835F4D5E279C688A4031D0D30263EEC84F279088D5406CA7B9D1ABD7859
7,009,070 UART: [art] SIG.R = 8CD1B9F9E123A9FF227A056005B83F176DAFC950EFD93AFA10F038084DCDB5DD6CA301E374AAA68AB5D9F1BABCCF9DC2
7,015,858 UART: [art] SIG.S = 9460BA5AD785F0E4E9838C7CE22469DE583BB6FD245B04834A39B72BFC7E788DB00556764FBEB528D8FBC3138DD2AD9B
7,039,742 UART: Caliptra RT
7,039,993 UART: [state] CFI Enabled
7,388,954 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,419,865 UART: [rt]cmd =0x44504543, len=96
7,453,494 >>> mbox cmd response data (56 bytes)
7,453,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,483,690 UART: [rt]cmd =0x44504543, len=96
7,517,084 >>> mbox cmd response data (56 bytes)
7,517,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,547,054 UART: [rt]cmd =0x44504543, len=96
7,580,175 >>> mbox cmd response data (56 bytes)
7,580,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,610,163 UART: [rt]cmd =0x44504543, len=96
7,643,183 >>> mbox cmd response data (56 bytes)
7,643,184 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,673,135 UART: [rt]cmd =0x44504543, len=96
7,705,972 >>> mbox cmd response data (56 bytes)
7,705,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,735,870 UART: [rt]cmd =0x44504543, len=96
7,769,314 >>> mbox cmd response data (56 bytes)
7,769,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,799,276 UART: [rt]cmd =0x44504543, len=96
7,832,207 >>> mbox cmd response data (56 bytes)
7,832,208 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,861,963 UART: [rt]cmd =0x44504543, len=96
7,894,973 >>> mbox cmd response data (56 bytes)
7,894,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,924,929 UART: [rt]cmd =0x44504543, len=96
7,957,880 >>> mbox cmd response data (56 bytes)
7,957,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,988,118 UART: [rt]cmd =0x44504543, len=96
8,021,208 >>> mbox cmd response data (56 bytes)
8,021,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,051,220 UART: [rt]cmd =0x44504543, len=96
8,058,705 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,475 ready_for_fw is high
1,060,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,066 >>> mbox cmd response: success
2,678,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,261 UART:
2,740,277 UART: Running Caliptra FMC ...
2,740,685 UART:
2,740,739 UART: [state] CFI Enabled
2,751,177 UART: [fht] FMC Alias Private Key: 7
2,870,309 UART: [art] Extend RT PCRs Done
2,870,737 UART: [art] Lock RT PCRs Done
2,872,315 UART: [art] Populate DV Done
2,880,304 UART: [fht] FMC Alias Private Key: 7
2,881,482 UART: [art] Derive CDI
2,881,762 UART: [art] Store in slot 0x4
2,967,531 UART: [art] Derive Key Pair
2,967,891 UART: [art] Store priv key in slot 0x5
2,980,557 UART: [art] Derive Key Pair - Done
2,995,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,752 UART: [art] PUB.X = A3A74B9A5EA566EA5822A4961149454A84291370A590AAEFD1D296BA3DBBEAA6B14417EF58CECAAD28EC5A0B11254D86
3,018,535 UART: [art] PUB.Y = 55AFA444FD235440BB9F34F9B311FC9A303F4F27B6180FDBCB79CB56FD953BBF21F3497BBA4502D7FBE0C09C16EFD613
3,025,499 UART: [art] SIG.R = 6A415B207035C27A9A02DCADA8E9A9B3426CBD97CB794AB3FE7DD0EE78352F2B085C4630F20288C8A35B2104175F2668
3,032,263 UART: [art] SIG.S = D2C967DFEC116B6546E5B5F0AFAA0DB868104FCD16FCC982B013EE0C7318F761B7F4A6D9CF4A44D9979520EA4FBD287F
3,055,997 UART: Caliptra RT
3,056,248 UART: [state] CFI Enabled
3,176,613 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,819 UART: [rt]cmd =0x44504543, len=96
3,240,703 >>> mbox cmd response data (56 bytes)
3,240,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,270,591 UART: [rt]cmd =0x44504543, len=96
3,303,473 >>> mbox cmd response data (56 bytes)
3,303,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,333,573 UART: [rt]cmd =0x44504543, len=96
3,367,006 >>> mbox cmd response data (56 bytes)
3,367,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,086 UART: [rt]cmd =0x44504543, len=96
3,429,562 >>> mbox cmd response data (56 bytes)
3,429,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,459,546 UART: [rt]cmd =0x44504543, len=96
3,492,739 >>> mbox cmd response data (56 bytes)
3,492,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,777 UART: [rt]cmd =0x44504543, len=96
3,555,505 >>> mbox cmd response data (56 bytes)
3,555,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,679 UART: [rt]cmd =0x44504543, len=96
3,618,754 >>> mbox cmd response data (56 bytes)
3,618,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,472 UART: [rt]cmd =0x44504543, len=96
3,680,916 >>> mbox cmd response data (56 bytes)
3,680,917 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,076 UART: [rt]cmd =0x44504543, len=96
3,744,315 >>> mbox cmd response data (56 bytes)
3,744,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,774,285 UART: [rt]cmd =0x44504543, len=96
3,806,683 >>> mbox cmd response data (56 bytes)
3,806,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,481 UART: [rt]cmd =0x44504543, len=96
3,869,528 >>> mbox cmd response data (56 bytes)
3,869,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,826 UART: [rt]cmd =0x44504543, len=96
3,933,080 >>> mbox cmd response data (56 bytes)
3,933,081 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,962,368 UART: [rt]cmd =0x52435458, len=8
3,964,192 >>> mbox cmd response data (16 bytes)
3,964,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,453,456 >>> mbox cmd response: success
6,453,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,467,105 UART:
6,467,121 UART: Running Caliptra FMC ...
6,467,529 UART:
6,467,583 UART: [state] CFI Enabled
6,557,148 UART: [art] Extend RT PCRs Done
6,557,576 UART: [art] Lock RT PCRs Done
6,558,515 UART: [art] Populate DV Done
6,566,586 UART: [fht] FMC Alias Private Key: 7
6,567,548 UART: [art] Derive CDI
6,567,828 UART: [art] Store in slot 0x4
6,654,121 UART: [art] Derive Key Pair
6,654,481 UART: [art] Store priv key in slot 0x5
6,668,061 UART: [art] Derive Key Pair - Done
6,682,713 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,698,750 UART: [art] Erasing AUTHORITY.KEYID = 7
6,699,515 UART: [art] PUB.X = CE5806BDC775707AA965FF4BD62AEB59A6808D5583E1BF9404075E7BB241DA7B67A46A4F75D0195A585BE0A4982D5F91
6,706,284 UART: [art] PUB.Y = 03F19787CED61DA4C7A1F235FF5D93AE2FA8AD23E0005742B4FDA60A34E9F6B008F64340A3F8AFA3AFB0E5D2187119AF
6,713,221 UART: [art] SIG.R = CE8F782A4E55F2DC1A32B7052BCCA67FEC9D646D016AA3328F1DD65E9B7EA6E774BF694953E964AAD81EA7C4523B13BC
6,720,005 UART: [art] SIG.S = 6704905A743BB6ACBAC254D74818EA2C6D6409E51372CADB5BCF301E8FB2B38976995BFB8CA8F8BE4B892DAE9599AB39
6,744,371 UART: Caliptra RT
6,744,622 UART: [state] CFI Enabled
7,098,852 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,129,637 UART: [rt]cmd =0x44504543, len=96
7,162,602 >>> mbox cmd response data (56 bytes)
7,162,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,192,440 UART: [rt]cmd =0x44504543, len=96
7,225,960 >>> mbox cmd response data (56 bytes)
7,225,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,255,900 UART: [rt]cmd =0x44504543, len=96
7,289,175 >>> mbox cmd response data (56 bytes)
7,289,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,319,285 UART: [rt]cmd =0x44504543, len=96
7,352,011 >>> mbox cmd response data (56 bytes)
7,352,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,381,819 UART: [rt]cmd =0x44504543, len=96
7,415,028 >>> mbox cmd response data (56 bytes)
7,415,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,445,218 UART: [rt]cmd =0x44504543, len=96
7,478,592 >>> mbox cmd response data (56 bytes)
7,478,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,508,496 UART: [rt]cmd =0x44504543, len=96
7,541,241 >>> mbox cmd response data (56 bytes)
7,541,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,571,291 UART: [rt]cmd =0x44504543, len=96
7,603,363 >>> mbox cmd response data (56 bytes)
7,603,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,633,321 UART: [rt]cmd =0x44504543, len=96
7,666,564 >>> mbox cmd response data (56 bytes)
7,666,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,696,416 UART: [rt]cmd =0x44504543, len=96
7,730,150 >>> mbox cmd response data (56 bytes)
7,730,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,760,186 UART: [rt]cmd =0x44504543, len=96
7,767,699 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.35s
Truncated 959 bytes from beginning
] sha1
901,994 UART: [kat] SHA2-256
903,934 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,507 UART: [kat] HMAC-384Kdf
923,099 UART: [kat] LMS
1,171,427 UART: [kat] --
1,172,208 UART: [cold-reset] ++
1,172,768 UART: [fht] FHT @ 0x50003400
1,175,389 UART: [idev] ++
1,175,557 UART: [idev] CDI.KEYID = 6
1,175,917 UART: [idev] SUBJECT.KEYID = 7
1,176,341 UART: [idev] UDS.KEYID = 0
1,176,686 ready_for_fw is high
1,176,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,555 UART: [idev] Erasing UDS.KEYID = 0
1,201,428 UART: [idev] Sha1 KeyId Algorithm
1,209,910 UART: [idev] --
1,211,032 UART: [ldev] ++
1,211,200 UART: [ldev] CDI.KEYID = 6
1,211,563 UART: [ldev] SUBJECT.KEYID = 5
1,211,989 UART: [ldev] AUTHORITY.KEYID = 7
1,212,452 UART: [ldev] FE.KEYID = 1
1,217,796 UART: [ldev] Erasing FE.KEYID = 1
1,244,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,494 UART: [ldev] --
1,283,971 UART: [fwproc] Wait for Commands...
1,284,561 UART: [fwproc] Recv command 0x46574c44
1,285,289 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,787 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,957 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,140 >>> mbox cmd response: success
2,829,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,830,196 UART: [afmc] ++
2,830,364 UART: [afmc] CDI.KEYID = 6
2,830,726 UART: [afmc] SUBJECT.KEYID = 7
2,831,151 UART: [afmc] AUTHORITY.KEYID = 5
2,867,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,881 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,590 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,473 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,174 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,118 UART: [afmc] --
2,911,036 UART: [cold-reset] --
2,911,912 UART: [state] Locking Datavault
2,912,995 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,599 UART: [state] Locking ICCM
2,914,053 UART: [exit] Launching FMC @ 0x40000130
2,919,383 UART:
2,919,399 UART: Running Caliptra FMC ...
2,919,807 UART:
2,919,950 UART: [state] CFI Enabled
2,930,606 UART: [fht] FMC Alias Private Key: 7
3,049,774 UART: [art] Extend RT PCRs Done
3,050,202 UART: [art] Lock RT PCRs Done
3,051,606 UART: [art] Populate DV Done
3,059,735 UART: [fht] FMC Alias Private Key: 7
3,060,711 UART: [art] Derive CDI
3,060,991 UART: [art] Store in slot 0x4
3,146,690 UART: [art] Derive Key Pair
3,147,050 UART: [art] Store priv key in slot 0x5
3,159,888 UART: [art] Derive Key Pair - Done
3,174,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,697 UART: [art] PUB.X = 88115EBCAE63CBE02AB6AC3F4B9D79FFE3464A08C11FDDD2931137EF3F4A3389FEF210C5316882AC1EF79444328732E4
3,197,476 UART: [art] PUB.Y = D55319A32B7F8251CC89B1486C8AA90EE181FF1C1D68CC439B2BFB34458DF8BAC1726FF1B38BBFD779B5FEA62AE58B46
3,204,443 UART: [art] SIG.R = 3CAFB9043CF7D7CDA02B88102CBBA8E53ABE93C43DC33F1F464E0A08E416E119327B1B06EBCCD3AB3EBBA462299D8D4F
3,211,227 UART: [art] SIG.S = 9D4E33F88AE6CE1D2CCA0F0981C392C49DE98A8AED57CD5AD3E43DF3F7B9074981A4605D5BF025AA08A165A2013491A7
3,235,504 UART: Caliptra RT
3,235,847 UART: [state] CFI Enabled
3,354,898 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,466 UART: [rt]cmd =0x44504543, len=96
3,419,026 >>> mbox cmd response data (56 bytes)
3,419,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,449,064 UART: [rt]cmd =0x44504543, len=96
3,481,626 >>> mbox cmd response data (56 bytes)
3,481,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,648 UART: [rt]cmd =0x44504543, len=96
3,544,383 >>> mbox cmd response data (56 bytes)
3,544,384 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,574,319 UART: [rt]cmd =0x44504543, len=96
3,606,835 >>> mbox cmd response data (56 bytes)
3,606,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,635 UART: [rt]cmd =0x44504543, len=96
3,669,220 >>> mbox cmd response data (56 bytes)
3,669,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,926 UART: [rt]cmd =0x44504543, len=96
3,732,844 >>> mbox cmd response data (56 bytes)
3,732,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,762,736 UART: [rt]cmd =0x44504543, len=96
3,795,457 >>> mbox cmd response data (56 bytes)
3,795,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,825,395 UART: [rt]cmd =0x44504543, len=96
3,858,543 >>> mbox cmd response data (56 bytes)
3,858,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,888,533 UART: [rt]cmd =0x44504543, len=96
3,922,000 >>> mbox cmd response data (56 bytes)
3,922,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,064 UART: [rt]cmd =0x44504543, len=96
3,985,664 >>> mbox cmd response data (56 bytes)
3,985,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,015,742 UART: [rt]cmd =0x44504543, len=96
4,049,223 >>> mbox cmd response data (56 bytes)
4,049,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,079,085 UART: [rt]cmd =0x44504543, len=96
4,111,769 >>> mbox cmd response data (56 bytes)
4,111,770 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,141,185 UART: [rt]cmd =0x52435458, len=8
4,142,863 >>> mbox cmd response data (16 bytes)
4,142,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,143,723 UART:
4,143,739 UART: Running Caliptra ROM ...
4,144,147 UART:
4,144,289 UART: [state] CFI Enabled
4,146,885 UART: [state] LifecycleState = Unprovisioned
4,147,540 UART: [state] DebugLocked = No
4,148,146 UART: [state] WD Timer not started. Device not locked for debugging
4,149,416 UART: [kat] SHA2-256
4,955,066 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,959,191 UART: [kat] ++
4,959,343 UART: [kat] sha1
4,963,571 UART: [kat] SHA2-256
4,965,511 UART: [kat] SHA2-384
4,968,440 UART: [kat] SHA2-512-ACC
4,970,340 UART: [kat] ECC-384
4,980,207 UART: [kat] HMAC-384Kdf
4,984,885 UART: [kat] LMS
5,233,213 UART: [kat] --
5,233,963 UART: [update-reset] ++
6,593,751 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,594,762 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,749,977 >>> mbox cmd response: success
6,749,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,750,280 UART: [update-reset] Copying MAN_2 To MAN_1
6,758,294 UART: [update-reset Success] --
6,759,099 UART: [state] Locking Datavault
6,759,855 UART: [state] Locking PCR0, PCR1 and PCR31
6,760,459 UART: [state] Locking ICCM
6,761,121 UART: [exit] Launching FMC @ 0x40000130
6,766,451 UART:
6,766,467 UART: Running Caliptra FMC ...
6,766,875 UART:
6,767,018 UART: [state] CFI Enabled
6,856,863 UART: [art] Extend RT PCRs Done
6,857,291 UART: [art] Lock RT PCRs Done
6,858,432 UART: [art] Populate DV Done
6,866,591 UART: [fht] FMC Alias Private Key: 7
6,867,565 UART: [art] Derive CDI
6,867,845 UART: [art] Store in slot 0x4
6,953,320 UART: [art] Derive Key Pair
6,953,680 UART: [art] Store priv key in slot 0x5
6,966,950 UART: [art] Derive Key Pair - Done
6,981,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,997,486 UART: [art] Erasing AUTHORITY.KEYID = 7
6,998,251 UART: [art] PUB.X = 08FF09507645062F9C0B73EEF07BFC1ADF89661493D3643C486C6CA40736E342E9642EFE92A1ADEF9FF1AA21FF360B57
7,005,013 UART: [art] PUB.Y = 4FE9A4AB7EC465F6B60C6F83D7775C9C00FB0DF4851499AF4261C37E19143EB8CE7AE9C82DF0FA7E82D25E1AD36773C8
7,011,951 UART: [art] SIG.R = E3928818B88A7AC66BA7836147B528BBAC4F24F4F9532C3DFDD3621B75721E6B03355554542AF2FB18A9C5AB96075EAD
7,018,721 UART: [art] SIG.S = A0436889CEB96B5E2EB5227A8086FB52091780490012281C537BDB21B7320D642C170545A850AD4C3CCE6D9228A62947
7,042,780 UART: Caliptra RT
7,043,123 UART: [state] CFI Enabled
7,401,318 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,432,227 UART: [rt]cmd =0x44504543, len=96
7,465,364 >>> mbox cmd response data (56 bytes)
7,465,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,495,196 UART: [rt]cmd =0x44504543, len=96
7,528,504 >>> mbox cmd response data (56 bytes)
7,528,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,558,316 UART: [rt]cmd =0x44504543, len=96
7,591,509 >>> mbox cmd response data (56 bytes)
7,591,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,621,243 UART: [rt]cmd =0x44504543, len=96
7,654,995 >>> mbox cmd response data (56 bytes)
7,654,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,684,735 UART: [rt]cmd =0x44504543, len=96
7,717,190 >>> mbox cmd response data (56 bytes)
7,717,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,747,352 UART: [rt]cmd =0x44504543, len=96
7,780,928 >>> mbox cmd response data (56 bytes)
7,780,929 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,810,902 UART: [rt]cmd =0x44504543, len=96
7,844,733 >>> mbox cmd response data (56 bytes)
7,844,734 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,874,737 UART: [rt]cmd =0x44504543, len=96
7,908,215 >>> mbox cmd response data (56 bytes)
7,908,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,938,079 UART: [rt]cmd =0x44504543, len=96
7,971,848 >>> mbox cmd response data (56 bytes)
7,971,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,001,678 UART: [rt]cmd =0x44504543, len=96
8,036,322 >>> mbox cmd response data (56 bytes)
8,036,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,066,244 UART: [rt]cmd =0x44504543, len=96
8,073,983 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,760 ready_for_fw is high
1,060,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,551 >>> mbox cmd response: success
2,681,551 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,743,950 UART:
2,743,966 UART: Running Caliptra FMC ...
2,744,374 UART:
2,744,517 UART: [state] CFI Enabled
2,754,947 UART: [fht] FMC Alias Private Key: 7
2,873,367 UART: [art] Extend RT PCRs Done
2,873,795 UART: [art] Lock RT PCRs Done
2,875,301 UART: [art] Populate DV Done
2,883,470 UART: [fht] FMC Alias Private Key: 7
2,884,526 UART: [art] Derive CDI
2,884,806 UART: [art] Store in slot 0x4
2,970,631 UART: [art] Derive Key Pair
2,970,991 UART: [art] Store priv key in slot 0x5
2,984,493 UART: [art] Derive Key Pair - Done
2,999,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,237 UART: [art] PUB.X = FF326CBF85245BE5508631F260F2945AF62F238A46EAD2A339DE7544B39169EFD3693844D3844A01ED648475B06ECA21
3,022,004 UART: [art] PUB.Y = 51D501E27ECD4EFD0771723834602B4A81D2FADDF8C78EDA40C69DAF83F98FAE633A644BF44D437717308B32AD48747E
3,028,958 UART: [art] SIG.R = A6665FADA986140A570400B7647C9E05F9C79A52F59A0A269256D8ABAD645453C9DB6474539CF72D163CD9C9E4D641E2
3,035,696 UART: [art] SIG.S = 4251BA94E4EEF77BD293C83C8CCBBEB2D0628A6BF9EE2C437982A0487E3A07C03593E297D363E003544C7D801B2D5C7E
3,059,436 UART: Caliptra RT
3,059,779 UART: [state] CFI Enabled
3,179,282 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,658 UART: [rt]cmd =0x44504543, len=96
3,243,226 >>> mbox cmd response data (56 bytes)
3,243,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,346 UART: [rt]cmd =0x44504543, len=96
3,305,692 >>> mbox cmd response data (56 bytes)
3,305,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,335,476 UART: [rt]cmd =0x44504543, len=96
3,368,065 >>> mbox cmd response data (56 bytes)
3,368,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,027 UART: [rt]cmd =0x44504543, len=96
3,431,235 >>> mbox cmd response data (56 bytes)
3,431,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,189 UART: [rt]cmd =0x44504543, len=96
3,494,482 >>> mbox cmd response data (56 bytes)
3,494,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,216 UART: [rt]cmd =0x44504543, len=96
3,556,656 >>> mbox cmd response data (56 bytes)
3,556,657 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,542 UART: [rt]cmd =0x44504543, len=96
3,620,149 >>> mbox cmd response data (56 bytes)
3,620,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,650,197 UART: [rt]cmd =0x44504543, len=96
3,682,499 >>> mbox cmd response data (56 bytes)
3,682,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,553 UART: [rt]cmd =0x44504543, len=96
3,744,862 >>> mbox cmd response data (56 bytes)
3,744,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,774,918 UART: [rt]cmd =0x44504543, len=96
3,807,656 >>> mbox cmd response data (56 bytes)
3,807,657 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,706 UART: [rt]cmd =0x44504543, len=96
3,870,483 >>> mbox cmd response data (56 bytes)
3,870,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,471 UART: [rt]cmd =0x44504543, len=96
3,933,737 >>> mbox cmd response data (56 bytes)
3,933,738 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,962,851 UART: [rt]cmd =0x52435458, len=8
3,964,595 >>> mbox cmd response data (16 bytes)
3,964,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,455,386 >>> mbox cmd response: success
6,455,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,468,703 UART:
6,468,719 UART: Running Caliptra FMC ...
6,469,127 UART:
6,469,270 UART: [state] CFI Enabled
6,558,449 UART: [art] Extend RT PCRs Done
6,558,877 UART: [art] Lock RT PCRs Done
6,559,722 UART: [art] Populate DV Done
6,567,889 UART: [fht] FMC Alias Private Key: 7
6,569,029 UART: [art] Derive CDI
6,569,309 UART: [art] Store in slot 0x4
6,655,068 UART: [art] Derive Key Pair
6,655,428 UART: [art] Store priv key in slot 0x5
6,668,890 UART: [art] Derive Key Pair - Done
6,683,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,699,273 UART: [art] Erasing AUTHORITY.KEYID = 7
6,700,038 UART: [art] PUB.X = 1DF66EDAA158883FF82346D6C4225F390EA86478168A25AFA0106E29316CB0D590DA82FD07CDB5FB2E4E5BF8239956E9
6,706,810 UART: [art] PUB.Y = AAA2F11058C4B7858EF30EB2920CAF953451BA27BA8620278079D521CFE223E87CEB5E3E8582B13317CFDB9FAC96720C
6,713,761 UART: [art] SIG.R = C6C2ADB78879052208E228CF9F20061957F5210F3D744915DA73F9643CBE512FA9DFF5B3DC9D6F8EE40BB2D64A9CE53C
6,720,528 UART: [art] SIG.S = C3CB33118504EA01E3FDBF1900B472906AEB4F3407D987C7A175694FB2FB6DDF874A37DA5DC9CDE44623E0EC958E9769
6,743,787 UART: Caliptra RT
6,744,130 UART: [state] CFI Enabled
7,093,313 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,123,926 UART: [rt]cmd =0x44504543, len=96
7,156,533 >>> mbox cmd response data (56 bytes)
7,156,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,186,365 UART: [rt]cmd =0x44504543, len=96
7,220,139 >>> mbox cmd response data (56 bytes)
7,220,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,249,905 UART: [rt]cmd =0x44504543, len=96
7,283,590 >>> mbox cmd response data (56 bytes)
7,283,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,313,630 UART: [rt]cmd =0x44504543, len=96
7,346,474 >>> mbox cmd response data (56 bytes)
7,346,475 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,376,394 UART: [rt]cmd =0x44504543, len=96
7,409,957 >>> mbox cmd response data (56 bytes)
7,409,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,439,917 UART: [rt]cmd =0x44504543, len=96
7,473,303 >>> mbox cmd response data (56 bytes)
7,473,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,503,177 UART: [rt]cmd =0x44504543, len=96
7,536,714 >>> mbox cmd response data (56 bytes)
7,536,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,566,722 UART: [rt]cmd =0x44504543, len=96
7,600,416 >>> mbox cmd response data (56 bytes)
7,600,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,630,328 UART: [rt]cmd =0x44504543, len=96
7,664,349 >>> mbox cmd response data (56 bytes)
7,664,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,694,281 UART: [rt]cmd =0x44504543, len=96
7,727,677 >>> mbox cmd response data (56 bytes)
7,727,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,757,629 UART: [rt]cmd =0x44504543, len=96
7,765,138 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,231 UART:
192,598 UART: Running Caliptra ROM ...
193,790 UART:
193,970 UART: [state] CFI Enabled
266,484 UART: [state] LifecycleState = Unprovisioned
268,390 UART: [state] DebugLocked = No
269,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,092 UART: [kat] SHA2-256
444,791 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,274 UART: [kat] ++
455,773 UART: [kat] sha1
466,884 UART: [kat] SHA2-256
469,549 UART: [kat] SHA2-384
476,178 UART: [kat] SHA2-512-ACC
478,546 UART: [kat] ECC-384
2,768,853 UART: [kat] HMAC-384Kdf
2,800,705 UART: [kat] LMS
3,991,025 UART: [kat] --
3,996,374 UART: [cold-reset] ++
3,997,615 UART: [fht] Storing FHT @ 0x50003400
4,008,320 UART: [idev] ++
4,008,968 UART: [idev] CDI.KEYID = 6
4,009,887 UART: [idev] SUBJECT.KEYID = 7
4,011,142 UART: [idev] UDS.KEYID = 0
4,012,197 ready_for_fw is high
4,012,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,494 UART: [idev] Erasing UDS.KEYID = 0
7,346,927 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,559 UART: [idev] --
7,373,236 UART: [ldev] ++
7,373,806 UART: [ldev] CDI.KEYID = 6
7,374,783 UART: [ldev] SUBJECT.KEYID = 5
7,376,000 UART: [ldev] AUTHORITY.KEYID = 7
7,377,236 UART: [ldev] FE.KEYID = 1
7,420,971 UART: [ldev] Erasing FE.KEYID = 1
10,754,143 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,680 UART: [ldev] --
13,115,197 UART: [fwproc] Waiting for Commands...
13,117,344 UART: [fwproc] Received command 0x46574c44
13,119,522 UART: [fwproc] Received Image of size 118548 bytes
17,217,456 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,292,611 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,365,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,695,017 >>> mbox cmd response: success
17,698,958 UART: [afmc] ++
17,699,550 UART: [afmc] CDI.KEYID = 6
17,700,494 UART: [afmc] SUBJECT.KEYID = 7
17,701,791 UART: [afmc] AUTHORITY.KEYID = 5
21,070,768 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,619 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,892 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,338 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,032 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,506 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,444 UART: [afmc] --
23,441,632 UART: [cold-reset] --
23,444,622 UART: [state] Locking Datavault
23,449,112 UART: [state] Locking PCR0, PCR1 and PCR31
23,450,862 UART: [state] Locking ICCM
23,453,687 UART: [exit] Launching FMC @ 0x40000130
23,462,077 UART:
23,462,312 UART: Running Caliptra FMC ...
23,463,339 UART:
23,463,503 UART: [state] CFI Enabled
23,528,883 UART: [fht] FMC Alias Private Key: 7
25,869,400 UART: [art] Extend RT PCRs Done
25,870,614 UART: [art] Lock RT PCRs Done
25,872,318 UART: [art] Populate DV Done
25,877,622 UART: [fht] FMC Alias Private Key: 7
25,879,370 UART: [art] Derive CDI
25,880,108 UART: [art] Store in slot 0x4
25,937,306 UART: [art] Derive Key Pair
25,938,341 UART: [art] Store priv key in slot 0x5
29,230,984 UART: [art] Derive Key Pair - Done
29,243,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,081 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,592 UART: [art] PUB.X = D9CA63F26A86C7B62502EDBE3DD9E801E982B6626E81D2EC70AF4750DB366934DAABA8F18C4E0C5616F7956F7106C552
31,542,862 UART: [art] PUB.Y = CB7B0256A25A7EBEF7E5B6773F5334AAB9913B045F6C9658DD8AFDF9999327D967C1AA9DE91CD97EEF75DCEA084754CA
31,550,163 UART: [art] SIG.R = 2A4FB24CB1BD12B457F4B8229DAE9A93E8148189F61502C0768DB5778F1A6F57B619E3FBBDF9B8A833CCD58092362DE5
31,557,588 UART: [art] SIG.S = BD38399299FC346C4CB864CB76A4DB406D283C0C519A5E9C2135F50C57D12825466DC06694348D947612B70018210397
32,862,767 UART: Caliptra RT
32,863,480 UART: [state] CFI Enabled
33,039,967 UART: [rt] RT listening for mailbox commands...
33,042,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,073,385 UART: [rt]cmd =0x44504543, len=96
38,841,856 >>> mbox cmd response data (6236 bytes)
38,871,342 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,901,520 UART: [rt]cmd =0x52564348, len=36
38,904,443 >>> mbox cmd response data (8 bytes)
38,904,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,935,476 UART: [rt]cmd =0x44504543, len=96
44,707,822 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,785,859 ready_for_fw is high
3,786,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,972,875 >>> mbox cmd response: success
23,677,801 UART:
23,678,260 UART: Running Caliptra FMC ...
23,679,386 UART:
23,679,539 UART: [state] CFI Enabled
23,743,511 UART: [fht] FMC Alias Private Key: 7
26,105,585 UART: [art] Extend RT PCRs Done
26,106,825 UART: [art] Lock RT PCRs Done
26,108,405 UART: [art] Populate DV Done
26,113,607 UART: [fht] FMC Alias Private Key: 7
26,115,215 UART: [art] Derive CDI
26,116,035 UART: [art] Store in slot 0x4
26,172,862 UART: [art] Derive Key Pair
26,173,898 UART: [art] Store priv key in slot 0x5
29,467,086 UART: [art] Derive Key Pair - Done
29,479,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,769,327 UART: [art] Erasing AUTHORITY.KEYID = 7
31,771,308 UART: [art] PUB.X = 00CFA7B3CC9DC6B3A6A0FF434B6843ED3EC8545D5EE8AEBA7A1C85B559B16CAE2DFA7246D403D05BCF073CBC8030E651
31,778,099 UART: [art] PUB.Y = FEE33051B43B5B0C2E0E2A20564A465760A32C5FD48594AA6742E819B08FA7E70C1542C6231D90E7CF6EA7D9A59FDAF7
31,785,328 UART: [art] SIG.R = 29D75CD6B36E6926B47560240C4B8510B6D0C9667500AA4BC77B947C8DE89F6507A24F780AE0B0C78A5051B8A302758A
31,792,677 UART: [art] SIG.S = CF263E327EA982D878BD386642F8B42DFB0816725667707A2885E2AF902B140370BB0087DB41C28530C6CB05A2DE53DC
33,097,774 UART: Caliptra RT
33,098,497 UART: [state] CFI Enabled
33,278,595 UART: [rt] RT listening for mailbox commands...
33,281,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,311,653 UART: [rt]cmd =0x44504543, len=96
39,081,128 >>> mbox cmd response data (6236 bytes)
39,110,500 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,140,677 UART: [rt]cmd =0x52564348, len=36
39,143,922 >>> mbox cmd response data (8 bytes)
39,144,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,174,773 UART: [rt]cmd =0x44504543, len=96
44,947,920 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,525 UART:
192,905 UART: Running Caliptra ROM ...
194,017 UART:
603,931 UART: [state] CFI Enabled
616,038 UART: [state] LifecycleState = Unprovisioned
617,979 UART: [state] DebugLocked = No
620,983 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,687 UART: [kat] SHA2-256
796,412 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,926 UART: [kat] ++
807,369 UART: [kat] sha1
817,529 UART: [kat] SHA2-256
820,256 UART: [kat] SHA2-384
825,637 UART: [kat] SHA2-512-ACC
828,000 UART: [kat] ECC-384
3,112,648 UART: [kat] HMAC-384Kdf
3,125,601 UART: [kat] LMS
4,315,650 UART: [kat] --
4,320,185 UART: [cold-reset] ++
4,322,192 UART: [fht] Storing FHT @ 0x50003400
4,334,661 UART: [idev] ++
4,335,216 UART: [idev] CDI.KEYID = 6
4,336,162 UART: [idev] SUBJECT.KEYID = 7
4,337,398 UART: [idev] UDS.KEYID = 0
4,338,808 ready_for_fw is high
4,339,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,830 UART: [idev] Erasing UDS.KEYID = 0
7,625,833 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,626 UART: [idev] --
7,651,040 UART: [ldev] ++
7,651,669 UART: [ldev] CDI.KEYID = 6
7,652,577 UART: [ldev] SUBJECT.KEYID = 5
7,653,834 UART: [ldev] AUTHORITY.KEYID = 7
7,655,054 UART: [ldev] FE.KEYID = 1
7,666,072 UART: [ldev] Erasing FE.KEYID = 1
10,957,123 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,670 UART: [ldev] --
13,318,969 UART: [fwproc] Waiting for Commands...
13,322,026 UART: [fwproc] Received command 0x46574c44
13,324,198 UART: [fwproc] Received Image of size 118548 bytes
17,437,012 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,514,275 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,587,430 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,915,200 >>> mbox cmd response: success
17,919,653 UART: [afmc] ++
17,920,243 UART: [afmc] CDI.KEYID = 6
17,921,207 UART: [afmc] SUBJECT.KEYID = 7
17,922,413 UART: [afmc] AUTHORITY.KEYID = 5
21,241,059 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,535,160 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,537,469 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,551,910 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,566,611 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,580,986 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,602,257 UART: [afmc] --
23,606,010 UART: [cold-reset] --
23,609,078 UART: [state] Locking Datavault
23,614,170 UART: [state] Locking PCR0, PCR1 and PCR31
23,615,920 UART: [state] Locking ICCM
23,617,965 UART: [exit] Launching FMC @ 0x40000130
23,626,346 UART:
23,626,588 UART: Running Caliptra FMC ...
23,627,634 UART:
23,627,783 UART: [state] CFI Enabled
23,636,071 UART: [fht] FMC Alias Private Key: 7
25,976,714 UART: [art] Extend RT PCRs Done
25,977,932 UART: [art] Lock RT PCRs Done
25,979,691 UART: [art] Populate DV Done
25,985,214 UART: [fht] FMC Alias Private Key: 7
25,986,801 UART: [art] Derive CDI
25,987,605 UART: [art] Store in slot 0x4
26,030,517 UART: [art] Derive Key Pair
26,031,578 UART: [art] Store priv key in slot 0x5
29,273,621 UART: [art] Derive Key Pair - Done
29,286,726 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,566,816 UART: [art] Erasing AUTHORITY.KEYID = 7
31,568,319 UART: [art] PUB.X = 3C376AD7542DA72632792E246DC81604C39059411FF49650795CA3A38350DA05176B057D103CAB94695354E5C02BC8AE
31,575,514 UART: [art] PUB.Y = 6AC9D489C6930EDA766BD33712F74B854CDE80F94391373F376EEA8E3AEBEA20DF03F60D7E95D6FD63F83C0DFFF6D312
31,582,806 UART: [art] SIG.R = E825D5317BC21B752FBB27B2AEF82F9B590282083C49362A025C872B961BD1FEE3B156BD09788199E775CC2B3812B955
31,590,199 UART: [art] SIG.S = 519FA278547CC8AD69A7E55B27B93B508771E3C53107E68FC53463A6E321224D23A3AAA45F5D79CC7FE44F968A159BFC
32,895,743 UART: Caliptra RT
32,896,439 UART: [state] CFI Enabled
33,028,962 UART: [rt] RT listening for mailbox commands...
33,031,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,062,203 UART: [rt]cmd =0x44504543, len=96
38,736,245 >>> mbox cmd response data (6236 bytes)
38,765,580 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,795,711 UART: [rt]cmd =0x52564348, len=36
38,798,818 >>> mbox cmd response data (8 bytes)
38,799,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,829,936 UART: [rt]cmd =0x44504543, len=96
44,504,005 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
4,128,099 ready_for_fw is high
4,128,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,430 >>> mbox cmd response: success
23,802,684 UART:
23,803,110 UART: Running Caliptra FMC ...
23,804,227 UART:
23,804,379 UART: [state] CFI Enabled
23,812,237 UART: [fht] FMC Alias Private Key: 7
26,152,489 UART: [art] Extend RT PCRs Done
26,153,724 UART: [art] Lock RT PCRs Done
26,155,379 UART: [art] Populate DV Done
26,160,596 UART: [fht] FMC Alias Private Key: 7
26,162,245 UART: [art] Derive CDI
26,163,057 UART: [art] Store in slot 0x4
26,205,663 UART: [art] Derive Key Pair
26,206,708 UART: [art] Store priv key in slot 0x5
29,449,026 UART: [art] Derive Key Pair - Done
29,462,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,672 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,196 UART: [art] PUB.X = 6E9A74EADAFB2CDAEB669156772397F671B542629650AB931D3E60191C1AA9353D6378B45135C1BBD222A0F9F06EA5BF
31,751,392 UART: [art] PUB.Y = E165C84658F28E900A4BF3F55850E00DB45718145C8832A605A12A15DE964E77471D0F4DB7D069116C2FD09F8A7E6C25
31,758,652 UART: [art] SIG.R = 99FED3290F02DCA192DE8CE92AE8CD1B9DD992EA858460F5E5E757A90B2178A328C64EC00C5059905FF9BCA3C71A3849
31,766,099 UART: [art] SIG.S = 3BD2282029773CD2C39192C790A95B626F5741413856E5AD1CA13E64E20AE6077EA86528ECA1ED59031482488BD9AD27
33,071,200 UART: Caliptra RT
33,071,924 UART: [state] CFI Enabled
33,205,342 UART: [rt] RT listening for mailbox commands...
33,207,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,238,516 UART: [rt]cmd =0x44504543, len=96
38,914,266 >>> mbox cmd response data (6236 bytes)
38,943,583 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,973,932 UART: [rt]cmd =0x52564348, len=36
38,976,643 >>> mbox cmd response data (8 bytes)
38,977,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,007,508 UART: [rt]cmd =0x44504543, len=96
44,682,188 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
191,986 UART:
192,336 UART: Running Caliptra ROM ...
193,532 UART:
193,690 UART: [state] CFI Enabled
267,770 UART: [state] LifecycleState = Unprovisioned
269,558 UART: [state] DebugLocked = No
271,657 UART: [state] WD Timer not started. Device not locked for debugging
275,137 UART: [kat] SHA2-256
454,824 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,622 UART: [kat] ++
466,148 UART: [kat] sha1
477,024 UART: [kat] SHA2-256
479,743 UART: [kat] SHA2-384
485,015 UART: [kat] SHA2-512-ACC
487,386 UART: [kat] ECC-384
2,947,545 UART: [kat] HMAC-384Kdf
2,971,642 UART: [kat] LMS
3,448,133 UART: [kat] --
3,452,908 UART: [cold-reset] ++
3,454,191 UART: [fht] FHT @ 0x50003400
3,465,731 UART: [idev] ++
3,466,437 UART: [idev] CDI.KEYID = 6
3,467,326 UART: [idev] SUBJECT.KEYID = 7
3,468,552 UART: [idev] UDS.KEYID = 0
3,469,551 ready_for_fw is high
3,469,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,666 UART: [idev] Erasing UDS.KEYID = 0
5,990,525 UART: [idev] Sha1 KeyId Algorithm
6,013,218 UART: [idev] --
6,017,429 UART: [ldev] ++
6,017,995 UART: [ldev] CDI.KEYID = 6
6,018,881 UART: [ldev] SUBJECT.KEYID = 5
6,020,146 UART: [ldev] AUTHORITY.KEYID = 7
6,021,381 UART: [ldev] FE.KEYID = 1
6,057,930 UART: [ldev] Erasing FE.KEYID = 1
8,565,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,464 UART: [ldev] --
10,373,789 UART: [fwproc] Wait for Commands...
10,375,500 UART: [fwproc] Recv command 0x46574c44
10,377,483 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,158 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,203 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,787 >>> mbox cmd response: success
14,349,435 UART: [afmc] ++
14,350,048 UART: [afmc] CDI.KEYID = 6
14,350,965 UART: [afmc] SUBJECT.KEYID = 7
14,352,176 UART: [afmc] AUTHORITY.KEYID = 5
16,896,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,958 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,744 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,782 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,422 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,694,211 UART: [afmc] --
18,697,747 UART: [cold-reset] --
18,703,168 UART: [state] Locking Datavault
18,707,973 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,727 UART: [state] Locking ICCM
18,710,847 UART: [exit] Launching FMC @ 0x40000130
18,719,236 UART:
18,719,469 UART: Running Caliptra FMC ...
18,720,563 UART:
18,720,718 UART: [state] CFI Enabled
18,776,806 UART: [fht] FMC Alias Private Key: 7
20,543,497 UART: [art] Extend RT PCRs Done
20,544,713 UART: [art] Lock RT PCRs Done
20,545,983 UART: [art] Populate DV Done
20,551,337 UART: [fht] FMC Alias Private Key: 7
20,553,039 UART: [art] Derive CDI
20,553,778 UART: [art] Store in slot 0x4
20,609,354 UART: [art] Derive Key Pair
20,610,389 UART: [art] Store priv key in slot 0x5
23,073,577 UART: [art] Derive Key Pair - Done
23,086,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,415 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,918 UART: [art] PUB.X = F7F34495F362827D66C0C06193DA810343D963A504617DB93FCC4785B9C27FBCBE149ACF5CFB36A270E205B74CFA71B7
24,808,221 UART: [art] PUB.Y = B94699CE8619930E293A7C76E6D9654C9271FDB965A25D556D2D5BC02B7D3007A61064EEF121C00479A5D93407D5C89D
24,815,451 UART: [art] SIG.R = 23CB3460F220F7A2689093C8D594E02AA91094D6FD11877CDF064094571731FB59BF852DB0D85BE7036FF9E139F92560
24,822,840 UART: [art] SIG.S = 422584629EF230640F0E747D08E3E5A9DFDDFBD8A4F2FD6638B1DD1C83FC91075929795640A6F9753E12A7B9D8B07EE4
25,801,962 UART: Caliptra RT
25,802,697 UART: [state] CFI Enabled
25,983,425 UART: [rt] RT listening for mailbox commands...
25,985,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,016,427 UART: [rt]cmd =0x44504543, len=96
30,380,584 >>> mbox cmd response data (6236 bytes)
30,409,680 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,439,957 UART: [rt]cmd =0x52564348, len=36
30,442,801 >>> mbox cmd response data (8 bytes)
30,443,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,473,701 UART: [rt]cmd =0x44504543, len=96
34,839,069 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,465,675 ready_for_fw is high
3,466,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,226,082 >>> mbox cmd response: success
18,516,751 UART:
18,517,132 UART: Running Caliptra FMC ...
18,518,258 UART:
18,518,412 UART: [state] CFI Enabled
18,585,518 UART: [fht] FMC Alias Private Key: 7
20,351,658 UART: [art] Extend RT PCRs Done
20,352,882 UART: [art] Lock RT PCRs Done
20,354,262 UART: [art] Populate DV Done
20,359,799 UART: [fht] FMC Alias Private Key: 7
20,361,557 UART: [art] Derive CDI
20,362,291 UART: [art] Store in slot 0x4
20,417,610 UART: [art] Derive Key Pair
20,418,650 UART: [art] Store priv key in slot 0x5
22,881,146 UART: [art] Derive Key Pair - Done
22,894,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,606,666 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,172 UART: [art] PUB.X = ACBE19733E2757D9AEA0ECD3BF41C0434B50665134B27C472AB386CC8617C779C15AEFFAF3F131D64132A372CCF1A0C9
24,615,492 UART: [art] PUB.Y = 4EF9469619D89A452963752A57D506880FCD30AA72A8EE12F87FAE45342804FACC539FC4F9E2E3423AC77605D6A5BF5F
24,622,716 UART: [art] SIG.R = D6E5F9F03A74800EB491354DEEE974292322F72CE3E072BAD6BFDE03DD7C7D02F3E1EACDB0CEA099ECD2186BC0F36EF9
24,630,151 UART: [art] SIG.S = 1E02904926628E90D9262992D3F5E1791310400DD34151FD269ADF0A4B26BBA6FE8E5A1FF9DA24F91526F7EDB7378A7B
25,609,427 UART: Caliptra RT
25,610,126 UART: [state] CFI Enabled
25,789,981 UART: [rt] RT listening for mailbox commands...
25,792,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,823,133 UART: [rt]cmd =0x44504543, len=96
30,186,545 >>> mbox cmd response data (6236 bytes)
30,215,595 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,245,780 UART: [rt]cmd =0x52564348, len=36
30,248,780 >>> mbox cmd response data (8 bytes)
30,249,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,279,574 UART: [rt]cmd =0x44504543, len=96
34,645,438 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,288 UART:
192,641 UART: Running Caliptra ROM ...
193,786 UART:
603,432 UART: [state] CFI Enabled
619,187 UART: [state] LifecycleState = Unprovisioned
621,139 UART: [state] DebugLocked = No
622,597 UART: [state] WD Timer not started. Device not locked for debugging
625,929 UART: [kat] SHA2-256
805,595 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,332 UART: [kat] ++
816,882 UART: [kat] sha1
826,921 UART: [kat] SHA2-256
829,555 UART: [kat] SHA2-384
835,631 UART: [kat] SHA2-512-ACC
838,003 UART: [kat] ECC-384
3,277,875 UART: [kat] HMAC-384Kdf
3,290,224 UART: [kat] LMS
3,766,796 UART: [kat] --
3,772,514 UART: [cold-reset] ++
3,774,734 UART: [fht] FHT @ 0x50003400
3,786,360 UART: [idev] ++
3,787,156 UART: [idev] CDI.KEYID = 6
3,788,081 UART: [idev] SUBJECT.KEYID = 7
3,789,196 UART: [idev] UDS.KEYID = 0
3,790,129 ready_for_fw is high
3,790,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,140 UART: [idev] Erasing UDS.KEYID = 0
6,264,355 UART: [idev] Sha1 KeyId Algorithm
6,287,638 UART: [idev] --
6,291,558 UART: [ldev] ++
6,292,174 UART: [ldev] CDI.KEYID = 6
6,293,062 UART: [ldev] SUBJECT.KEYID = 5
6,294,172 UART: [ldev] AUTHORITY.KEYID = 7
6,295,519 UART: [ldev] FE.KEYID = 1
6,305,112 UART: [ldev] Erasing FE.KEYID = 1
8,782,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,130 UART: [ldev] --
10,576,963 UART: [fwproc] Wait for Commands...
10,578,735 UART: [fwproc] Recv command 0x46574c44
10,580,720 UART: [fwproc] Recv'd Img size: 118548 bytes
14,063,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,138,721 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,211,750 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,540,755 >>> mbox cmd response: success
14,545,226 UART: [afmc] ++
14,545,877 UART: [afmc] CDI.KEYID = 6
14,546,785 UART: [afmc] SUBJECT.KEYID = 7
14,548,002 UART: [afmc] AUTHORITY.KEYID = 5
17,056,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,571 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,397 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,470 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,096 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,156 UART: [afmc] --
18,863,264 UART: [cold-reset] --
18,867,998 UART: [state] Locking Datavault
18,873,195 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,897 UART: [state] Locking ICCM
18,876,129 UART: [exit] Launching FMC @ 0x40000130
18,884,586 UART:
18,884,823 UART: Running Caliptra FMC ...
18,885,928 UART:
18,886,089 UART: [state] CFI Enabled
18,894,274 UART: [fht] FMC Alias Private Key: 7
20,659,983 UART: [art] Extend RT PCRs Done
20,661,203 UART: [art] Lock RT PCRs Done
20,662,641 UART: [art] Populate DV Done
20,668,111 UART: [fht] FMC Alias Private Key: 7
20,669,751 UART: [art] Derive CDI
20,670,493 UART: [art] Store in slot 0x4
20,713,091 UART: [art] Derive Key Pair
20,714,107 UART: [art] Store priv key in slot 0x5
23,141,004 UART: [art] Derive Key Pair - Done
23,153,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,860,595 UART: [art] Erasing AUTHORITY.KEYID = 7
24,862,090 UART: [art] PUB.X = 2672BB760824652EA2A7AE2BF534434FEC6681AEF2136B7B79D5DA34F4A3BBC28467A8E5CDB8E405ED297DA7CB3C147B
24,869,399 UART: [art] PUB.Y = 6CD6571983930359927DF72E276162BE97D681E79D6EF3444D80E3D53F8D9F2225D18BB0A28E402451B7EFAB2B0A7891
24,876,627 UART: [art] SIG.R = DC84136832DD6873F5A8129666467BFD112F28260F7B82EE97294F276AE416EE9B02824FFC10FBBB1FE510DD5C88B2FF
24,884,014 UART: [art] SIG.S = 90AB4667F4BA745F79D4471E3EF1D85A2FA2BA730C93F4111E3B5C758D39CFC175107F29E927C38436AE51E0303BE4F4
25,863,065 UART: Caliptra RT
25,863,764 UART: [state] CFI Enabled
25,996,281 UART: [rt] RT listening for mailbox commands...
25,998,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,029,352 UART: [rt]cmd =0x44504543, len=96
30,314,267 >>> mbox cmd response data (6236 bytes)
30,343,327 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,373,775 UART: [rt]cmd =0x52564348, len=36
30,376,945 >>> mbox cmd response data (8 bytes)
30,377,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,407,889 UART: [rt]cmd =0x44504543, len=96
34,693,870 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
3,777,025 ready_for_fw is high
3,777,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,440,402 >>> mbox cmd response: success
18,689,058 UART:
18,689,657 UART: Running Caliptra FMC ...
18,690,773 UART:
18,690,932 UART: [state] CFI Enabled
18,698,956 UART: [fht] FMC Alias Private Key: 7
20,465,120 UART: [art] Extend RT PCRs Done
20,466,349 UART: [art] Lock RT PCRs Done
20,467,981 UART: [art] Populate DV Done
20,473,406 UART: [fht] FMC Alias Private Key: 7
20,475,162 UART: [art] Derive CDI
20,475,980 UART: [art] Store in slot 0x4
20,518,741 UART: [art] Derive Key Pair
20,519,748 UART: [art] Store priv key in slot 0x5
22,946,624 UART: [art] Derive Key Pair - Done
22,959,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,962 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,477 UART: [art] PUB.X = 188F7F48603900D7D64E1F210A2534A2EC9E78E39F78439FC63AC135A053025622BB22DEC82CF060693F060C69C16F08
24,674,744 UART: [art] PUB.Y = 6E964DF70B0C9E13AE3113DEEA7B19C9940DB4ADD412F19DFF2DFB522B879E97C5DCD197AC73AF816D13FA0414FA285C
24,682,013 UART: [art] SIG.R = 29BA8FDB032E2B2D16FAB9A8546EE414087EDD3092520F94EF7F6BAA9F7069C6BDF77682F059D136E4CF1904CD3E3EE8
24,689,423 UART: [art] SIG.S = 01AECBCEF7F49669A18E5FC3077D178D42A02893880AC4DCE8C34F68817B99C0EBA864EFF1CBDC9E0AF7F44C9893F6D6
25,668,607 UART: Caliptra RT
25,669,310 UART: [state] CFI Enabled
25,803,115 UART: [rt] RT listening for mailbox commands...
25,805,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,836,221 UART: [rt]cmd =0x44504543, len=96
30,122,506 >>> mbox cmd response data (6236 bytes)
30,151,741 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,182,041 UART: [rt]cmd =0x52564348, len=36
30,185,025 >>> mbox cmd response data (8 bytes)
30,185,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,216,079 UART: [rt]cmd =0x44504543, len=96
34,501,980 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
191,996 UART:
192,362 UART: Running Caliptra ROM ...
193,534 UART:
193,684 UART: [state] CFI Enabled
265,528 UART: [state] LifecycleState = Unprovisioned
267,901 UART: [state] DebugLocked = No
270,292 UART: [state] WD Timer not started. Device not locked for debugging
274,825 UART: [kat] SHA2-256
464,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,468 UART: [kat] ++
475,955 UART: [kat] sha1
487,324 UART: [kat] SHA2-256
490,355 UART: [kat] SHA2-384
496,270 UART: [kat] SHA2-512-ACC
498,847 UART: [kat] ECC-384
2,947,821 UART: [kat] HMAC-384Kdf
2,971,997 UART: [kat] LMS
3,503,813 UART: [kat] --
3,506,764 UART: [cold-reset] ++
3,508,623 UART: [fht] FHT @ 0x50003400
3,520,027 UART: [idev] ++
3,520,733 UART: [idev] CDI.KEYID = 6
3,521,762 UART: [idev] SUBJECT.KEYID = 7
3,522,872 UART: [idev] UDS.KEYID = 0
3,523,795 ready_for_fw is high
3,523,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,040 UART: [idev] Erasing UDS.KEYID = 0
6,030,004 UART: [idev] Sha1 KeyId Algorithm
6,052,894 UART: [idev] --
6,056,729 UART: [ldev] ++
6,057,468 UART: [ldev] CDI.KEYID = 6
6,058,377 UART: [ldev] SUBJECT.KEYID = 5
6,059,535 UART: [ldev] AUTHORITY.KEYID = 7
6,060,764 UART: [ldev] FE.KEYID = 1
6,100,683 UART: [ldev] Erasing FE.KEYID = 1
8,617,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,400,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,422,519 UART: [ldev] --
10,427,245 UART: [fwproc] Wait for Commands...
10,429,268 UART: [fwproc] Recv command 0x46574c44
10,431,529 UART: [fwproc] Recv'd Img size: 118548 bytes
13,924,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,177 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,755 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,684,434 >>> mbox cmd response: success
14,688,535 UART: [afmc] ++
14,689,237 UART: [afmc] CDI.KEYID = 6
14,690,420 UART: [afmc] SUBJECT.KEYID = 7
14,691,903 UART: [afmc] AUTHORITY.KEYID = 5
17,231,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,972,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,974,295 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,989,406 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,004,566 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,019,434 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,042,630 UART: [afmc] --
19,045,470 UART: [cold-reset] --
19,049,792 UART: [state] Locking Datavault
19,053,377 UART: [state] Locking PCR0, PCR1 and PCR31
19,055,523 UART: [state] Locking ICCM
19,058,492 UART: [exit] Launching FMC @ 0x40000130
19,067,168 UART:
19,067,453 UART: Running Caliptra FMC ...
19,068,568 UART:
19,068,732 UART: [state] CFI Enabled
19,129,747 UART: [fht] FMC Alias Private Key: 7
20,917,566 UART: [art] Extend RT PCRs Done
20,918,779 UART: [art] Lock RT PCRs Done
20,920,141 UART: [art] Populate DV Done
20,925,550 UART: [fht] FMC Alias Private Key: 7
20,927,031 UART: [art] Derive CDI
20,927,793 UART: [art] Store in slot 0x4
20,983,849 UART: [art] Derive Key Pair
20,984,859 UART: [art] Store priv key in slot 0x5
23,447,350 UART: [art] Derive Key Pair - Done
23,459,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,173,323 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,852 UART: [art] PUB.X = 98094251F5E5F89F635893DA4FD657E7850094205C7BDFA398F7606F67548FA94E8D35D6F91FA58C0D783F5ACD9EBDA1
25,182,075 UART: [art] PUB.Y = CFB937E0F23691B0D6C71D225C40C6A0D8E6A6E7618BF5DE33DD63657986EE107AA17C4ABB3E8FF8A2AFD9EA991BBBD6
25,189,348 UART: [art] SIG.R = 55EC6D0283A4D9EE275A1DEC1C505A2FD976A00BA7F23144243F8FF66379D0B8F0EF2EF8ACE46AF66D757178522D0371
25,196,716 UART: [art] SIG.S = 3A013140E036AF139FD63F5A6BB9675F57DC9F70EF5C2BB67198D593C71C06ACE1749AACBDD8D7C6D7FFAF73C7DEBADE
26,175,487 UART: Caliptra RT
26,176,198 UART: [state] CFI Enabled
26,356,504 UART: [rt] RT listening for mailbox commands...
26,358,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,389,427 UART: [rt]cmd =0x44504543, len=96
30,753,192 >>> mbox cmd response data (6236 bytes)
30,782,262 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,812,150 UART: [rt]cmd =0x52564348, len=36
30,815,243 >>> mbox cmd response data (8 bytes)
30,815,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,846,033 UART: [rt]cmd =0x44504543, len=96
35,212,065 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,438,318 ready_for_fw is high
3,438,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,592 >>> mbox cmd response: success
19,113,600 UART:
19,113,988 UART: Running Caliptra FMC ...
19,115,125 UART:
19,115,284 UART: [state] CFI Enabled
19,180,640 UART: [fht] FMC Alias Private Key: 7
20,946,413 UART: [art] Extend RT PCRs Done
20,947,639 UART: [art] Lock RT PCRs Done
20,949,346 UART: [art] Populate DV Done
20,954,937 UART: [fht] FMC Alias Private Key: 7
20,956,482 UART: [art] Derive CDI
20,957,299 UART: [art] Store in slot 0x4
21,012,971 UART: [art] Derive Key Pair
21,014,017 UART: [art] Store priv key in slot 0x5
23,476,843 UART: [art] Derive Key Pair - Done
23,489,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,075 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,594 UART: [art] PUB.X = 78B4BA87D38797586DDCCCA39C64FB7B17B5005AAC89B81B12016CCC508EEBC24E9365275EB06053858401B40A5D9664
25,211,877 UART: [art] PUB.Y = 5371A5150FB93C50F8E260A4FF16131486E7A8CD274D299FC35F871447593812B9AB926B9AD569C22A1DA6F17CFE0CED
25,219,102 UART: [art] SIG.R = 80D26406BCB0693B4B96436DD7802C620455B070E9125BF9A1E4F32C974BCA35C86B687AE530C0D3BD97BB339767AFC4
25,226,552 UART: [art] SIG.S = 32BD94844798B666028587AC16E850FCCA60C9EB8BAB08F282BC482C171BF81D33306B907BF344002807DF7A23A93257
26,205,573 UART: Caliptra RT
26,206,282 UART: [state] CFI Enabled
26,387,176 UART: [rt] RT listening for mailbox commands...
26,389,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,420,118 UART: [rt]cmd =0x44504543, len=96
30,784,809 >>> mbox cmd response data (6236 bytes)
30,813,933 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,843,960 UART: [rt]cmd =0x52564348, len=36
30,847,139 >>> mbox cmd response data (8 bytes)
30,847,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,878,066 UART: [rt]cmd =0x44504543, len=96
35,243,318 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,462 UART:
192,834 UART: Running Caliptra ROM ...
194,049 UART:
603,691 UART: [state] CFI Enabled
618,289 UART: [state] LifecycleState = Unprovisioned
620,665 UART: [state] DebugLocked = No
623,178 UART: [state] WD Timer not started. Device not locked for debugging
627,795 UART: [kat] SHA2-256
817,646 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,442 UART: [kat] ++
828,891 UART: [kat] sha1
841,189 UART: [kat] SHA2-256
844,203 UART: [kat] SHA2-384
850,267 UART: [kat] SHA2-512-ACC
852,854 UART: [kat] ECC-384
3,295,643 UART: [kat] HMAC-384Kdf
3,307,712 UART: [kat] LMS
3,839,528 UART: [kat] --
3,843,124 UART: [cold-reset] ++
3,844,489 UART: [fht] FHT @ 0x50003400
3,855,610 UART: [idev] ++
3,856,253 UART: [idev] CDI.KEYID = 6
3,857,237 UART: [idev] SUBJECT.KEYID = 7
3,858,416 UART: [idev] UDS.KEYID = 0
3,859,343 ready_for_fw is high
3,859,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,421 UART: [idev] Erasing UDS.KEYID = 0
6,332,972 UART: [idev] Sha1 KeyId Algorithm
6,355,962 UART: [idev] --
6,359,385 UART: [ldev] ++
6,360,072 UART: [ldev] CDI.KEYID = 6
6,360,992 UART: [ldev] SUBJECT.KEYID = 5
6,362,230 UART: [ldev] AUTHORITY.KEYID = 7
6,363,408 UART: [ldev] FE.KEYID = 1
6,375,728 UART: [ldev] Erasing FE.KEYID = 1
8,854,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,268 UART: [ldev] --
10,647,745 UART: [fwproc] Wait for Commands...
10,649,406 UART: [fwproc] Recv command 0x46574c44
10,651,721 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,367 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,845 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,463 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,352 >>> mbox cmd response: success
14,914,003 UART: [afmc] ++
14,914,719 UART: [afmc] CDI.KEYID = 6
14,915,970 UART: [afmc] SUBJECT.KEYID = 7
14,917,418 UART: [afmc] AUTHORITY.KEYID = 5
17,423,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,144,771 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,842 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,010 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,884 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,213,258 UART: [afmc] --
19,217,242 UART: [cold-reset] --
19,222,088 UART: [state] Locking Datavault
19,227,092 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,301 UART: [state] Locking ICCM
19,231,014 UART: [exit] Launching FMC @ 0x40000130
19,239,676 UART:
19,239,920 UART: Running Caliptra FMC ...
19,240,952 UART:
19,241,103 UART: [state] CFI Enabled
19,249,429 UART: [fht] FMC Alias Private Key: 7
21,016,411 UART: [art] Extend RT PCRs Done
21,017,636 UART: [art] Lock RT PCRs Done
21,019,241 UART: [art] Populate DV Done
21,024,606 UART: [fht] FMC Alias Private Key: 7
21,026,311 UART: [art] Derive CDI
21,027,059 UART: [art] Store in slot 0x4
21,069,443 UART: [art] Derive Key Pair
21,070,486 UART: [art] Store priv key in slot 0x5
23,497,752 UART: [art] Derive Key Pair - Done
23,511,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,777 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,307 UART: [art] PUB.X = 7CE12F95F7A705544ADFACFF31570A553789BB217527DE7596FDDA066D9E2535E8BC5B0A83E2748D35C40A1ADC09227F
25,226,762 UART: [art] PUB.Y = F06EDE9FD165E4F2D67F6644DBE3C34C6E263FFD11C61394C2A7056684A2C20FA6CC49FDC1E86DFEF3ED9F18636AB261
25,233,864 UART: [art] SIG.R = B05A99A2F452DA6FD6077AB6ACF0B0B0531F50BA151ABF6D9A7859845D625C6DCC8135263ED3863EA36E97CD01472950
25,241,243 UART: [art] SIG.S = 2D3DBE871CA2636771D33000265518BC7AD110A9C3BE8BDCFD281933643D795EB2B23A2D3E120A1045DF0B78762BE8EB
26,220,411 UART: Caliptra RT
26,221,100 UART: [state] CFI Enabled
26,353,492 UART: [rt] RT listening for mailbox commands...
26,355,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,386,904 UART: [rt]cmd =0x44504543, len=96
30,672,109 >>> mbox cmd response data (6236 bytes)
30,701,258 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,731,434 UART: [rt]cmd =0x52564348, len=36
30,734,576 >>> mbox cmd response data (8 bytes)
30,735,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,765,612 UART: [rt]cmd =0x44504543, len=96
35,050,696 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
3,757,008 ready_for_fw is high
3,757,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,443 >>> mbox cmd response: success
19,293,608 UART:
19,294,002 UART: Running Caliptra FMC ...
19,295,168 UART:
19,295,329 UART: [state] CFI Enabled
19,303,530 UART: [fht] FMC Alias Private Key: 7
21,069,284 UART: [art] Extend RT PCRs Done
21,070,506 UART: [art] Lock RT PCRs Done
21,071,924 UART: [art] Populate DV Done
21,077,353 UART: [fht] FMC Alias Private Key: 7
21,078,847 UART: [art] Derive CDI
21,079,613 UART: [art] Store in slot 0x4
21,122,262 UART: [art] Derive Key Pair
21,123,263 UART: [art] Store priv key in slot 0x5
23,549,880 UART: [art] Derive Key Pair - Done
23,562,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,060 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,559 UART: [art] PUB.X = F03A6096D4EF74BC4C5AFAE79C0ABA96F43AF603A5111FA359C937385A1F20FD5E11ACA60AD6FE04400F82F23849FBEB
25,277,855 UART: [art] PUB.Y = 53B598AACBBE5AC84E67CEBF106A2A92539C2591B096948665A1ED55137FBCF75A4757F91546F00C586A75947DF2419E
25,285,094 UART: [art] SIG.R = A882D23AF937E4EC7D5D27326B13DDCE4D98859E29A86ED52A0F49D69827361D5823563D47EF860F176EECC93554A4A0
25,292,531 UART: [art] SIG.S = DB4E1F6C1EBA00BB5F3AE3ED908AF1C51D408EDBD886F73AC2A2F40B36A2F889FAF3F83FF7363B77377FC151D396E601
26,271,758 UART: Caliptra RT
26,272,452 UART: [state] CFI Enabled
26,405,277 UART: [rt] RT listening for mailbox commands...
26,407,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,438,116 UART: [rt]cmd =0x44504543, len=96
30,724,018 >>> mbox cmd response data (6236 bytes)
30,753,665 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,783,480 UART: [rt]cmd =0x52564348, len=36
30,786,250 >>> mbox cmd response data (8 bytes)
30,786,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,817,052 UART: [rt]cmd =0x44504543, len=96
35,101,573 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,599 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,081 UART: [kat] SHA2-256
882,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,127 UART: [kat] ++
886,279 UART: [kat] sha1
890,435 UART: [kat] SHA2-256
892,373 UART: [kat] SHA2-384
895,096 UART: [kat] SHA2-512-ACC
896,997 UART: [kat] ECC-384
902,594 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,511 UART: [cold-reset] ++
1,476,919 UART: [fht] Storing FHT @ 0x50003400
1,479,792 UART: [idev] ++
1,479,960 UART: [idev] CDI.KEYID = 6
1,480,320 UART: [idev] SUBJECT.KEYID = 7
1,480,744 UART: [idev] UDS.KEYID = 0
1,481,089 ready_for_fw is high
1,481,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,318 UART: [idev] Erasing UDS.KEYID = 0
1,505,014 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,658 UART: [idev] --
1,514,829 UART: [ldev] ++
1,514,997 UART: [ldev] CDI.KEYID = 6
1,515,360 UART: [ldev] SUBJECT.KEYID = 5
1,515,786 UART: [ldev] AUTHORITY.KEYID = 7
1,516,249 UART: [ldev] FE.KEYID = 1
1,521,203 UART: [ldev] Erasing FE.KEYID = 1
1,546,856 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,174 UART: [ldev] --
1,586,657 UART: [fwproc] Waiting for Commands...
1,587,432 UART: [fwproc] Received command 0x46574c44
1,588,223 UART: [fwproc] Received Image of size 118548 bytes
2,932,121 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,139 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,357 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,788 >>> mbox cmd response: success
3,131,864 UART: [afmc] ++
3,132,032 UART: [afmc] CDI.KEYID = 6
3,132,394 UART: [afmc] SUBJECT.KEYID = 7
3,132,819 UART: [afmc] AUTHORITY.KEYID = 5
3,167,882 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,122 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,902 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,611 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,494 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,177 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,937 UART: [afmc] --
3,211,039 UART: [cold-reset] --
3,212,019 UART: [state] Locking Datavault
3,213,124 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,728 UART: [state] Locking ICCM
3,214,192 UART: [exit] Launching FMC @ 0x40000130
3,219,522 UART:
3,219,538 UART: Running Caliptra FMC ...
3,219,946 UART:
3,220,000 UART: [state] CFI Enabled
3,230,688 UART: [fht] FMC Alias Private Key: 7
3,349,586 UART: [art] Extend RT PCRs Done
3,350,014 UART: [art] Lock RT PCRs Done
3,351,250 UART: [art] Populate DV Done
3,359,575 UART: [fht] FMC Alias Private Key: 7
3,360,683 UART: [art] Derive CDI
3,360,963 UART: [art] Store in slot 0x4
3,446,503 UART: [art] Derive Key Pair
3,446,863 UART: [art] Store priv key in slot 0x5
3,460,156 UART: [art] Derive Key Pair - Done
3,474,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,410 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,175 UART: [art] PUB.X = B33E8F17183C3C8D0B4769D8D74850E2A70F9E3EE487FC2F8EFB56AA9512B84847B563EC6AF5E3BD68EBD3663D24B21C
3,497,953 UART: [art] PUB.Y = 9A3FD5C2959BF877A8461DA78AE38AFE42A241C59FEA3DA314535195AC3FED7296F5DDC4C1F6D86EAB693FFCB5A5CDA9
3,504,929 UART: [art] SIG.R = 1B748DD6537C46A7C93FA1D8F1CF2D4C27F03A80837F5A36239EA7588BB55DEB34C4A05ED6D5F778B7F517B037424F54
3,511,707 UART: [art] SIG.S = 2DDEA8F83FC2B4CBA06FC73FECE293F8E701B37B0E9E33047CFCBAB25A322A7607EEFD4CDF099B4EE2EDD02C0BCB8EE3
3,535,449 UART: Caliptra RT
3,535,700 UART: [state] CFI Enabled
3,656,283 UART: [rt] RT listening for mailbox commands...
3,656,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,267 UART: [rt]cmd =0x44504543, len=96
3,869,336 >>> mbox cmd response data (6236 bytes)
3,869,337 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,898,900 UART: [rt]cmd =0x52564348, len=36
3,901,352 >>> mbox cmd response data (8 bytes)
3,901,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,931,292 UART: [rt]cmd =0x44504543, len=96
4,112,959 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,507 ready_for_fw is high
1,362,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,238 >>> mbox cmd response: success
3,042,487 UART:
3,042,503 UART: Running Caliptra FMC ...
3,042,911 UART:
3,042,965 UART: [state] CFI Enabled
3,053,583 UART: [fht] FMC Alias Private Key: 7
3,172,505 UART: [art] Extend RT PCRs Done
3,172,933 UART: [art] Lock RT PCRs Done
3,174,451 UART: [art] Populate DV Done
3,182,690 UART: [fht] FMC Alias Private Key: 7
3,183,618 UART: [art] Derive CDI
3,183,898 UART: [art] Store in slot 0x4
3,269,564 UART: [art] Derive Key Pair
3,269,924 UART: [art] Store priv key in slot 0x5
3,283,263 UART: [art] Derive Key Pair - Done
3,297,708 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,780 UART: [art] PUB.X = 80CA5277EC0FE5E5DF83EB74C75332404DE24E302214D46E8169ED398BE5EB6FCD99E6C22B0AEDD7586E74D82AF3FEF1
3,320,562 UART: [art] PUB.Y = 554B8A876FF63BA6039550AF53AB7CBDB0079F932B0F598625D46CE8B85EE1AE143E2FA4B08D5C946E1B0D9F1D8FE565
3,327,514 UART: [art] SIG.R = 3A2FE602F1E011460FFBBB94E9692B3E0917092A4FF5FDFB9958FCA4D5F93E318AD914F84B544DE7370B4C6F84AD071B
3,334,280 UART: [art] SIG.S = 772525D2EF25D123E71AA9E2D9F42900BC2C46A375896B1387D73A7C89A0F1923D9CD95997BC608E34A7829BAF94CC5E
3,358,362 UART: Caliptra RT
3,358,613 UART: [state] CFI Enabled
3,479,054 UART: [rt] RT listening for mailbox commands...
3,479,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,964 UART: [rt]cmd =0x44504543, len=96
3,690,742 >>> mbox cmd response data (6236 bytes)
3,690,743 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,368 UART: [rt]cmd =0x52564348, len=36
3,722,678 >>> mbox cmd response data (8 bytes)
3,722,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,752,696 UART: [rt]cmd =0x44504543, len=96
3,933,920 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,042 UART: [kat] SHA2-256
881,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,088 UART: [kat] ++
886,240 UART: [kat] sha1
890,728 UART: [kat] SHA2-256
892,666 UART: [kat] SHA2-384
895,305 UART: [kat] SHA2-512-ACC
897,206 UART: [kat] ECC-384
903,063 UART: [kat] HMAC-384Kdf
907,737 UART: [kat] LMS
1,475,933 UART: [kat] --
1,476,708 UART: [cold-reset] ++
1,477,164 UART: [fht] Storing FHT @ 0x50003400
1,479,835 UART: [idev] ++
1,480,003 UART: [idev] CDI.KEYID = 6
1,480,363 UART: [idev] SUBJECT.KEYID = 7
1,480,787 UART: [idev] UDS.KEYID = 0
1,481,132 ready_for_fw is high
1,481,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,671 UART: [idev] Erasing UDS.KEYID = 0
1,505,037 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,539 UART: [idev] --
1,514,598 UART: [ldev] ++
1,514,766 UART: [ldev] CDI.KEYID = 6
1,515,129 UART: [ldev] SUBJECT.KEYID = 5
1,515,555 UART: [ldev] AUTHORITY.KEYID = 7
1,516,018 UART: [ldev] FE.KEYID = 1
1,521,166 UART: [ldev] Erasing FE.KEYID = 1
1,546,701 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,037 UART: [ldev] --
1,586,510 UART: [fwproc] Waiting for Commands...
1,587,281 UART: [fwproc] Received command 0x46574c44
1,588,072 UART: [fwproc] Received Image of size 118548 bytes
2,933,726 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,488 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,706 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,151 >>> mbox cmd response: success
3,134,335 UART: [afmc] ++
3,134,503 UART: [afmc] CDI.KEYID = 6
3,134,865 UART: [afmc] SUBJECT.KEYID = 7
3,135,290 UART: [afmc] AUTHORITY.KEYID = 5
3,169,667 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,769 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,549 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,258 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,141 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,824 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,772 UART: [afmc] --
3,212,816 UART: [cold-reset] --
3,213,782 UART: [state] Locking Datavault
3,214,995 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,599 UART: [state] Locking ICCM
3,216,251 UART: [exit] Launching FMC @ 0x40000130
3,221,581 UART:
3,221,597 UART: Running Caliptra FMC ...
3,222,005 UART:
3,222,148 UART: [state] CFI Enabled
3,233,010 UART: [fht] FMC Alias Private Key: 7
3,352,304 UART: [art] Extend RT PCRs Done
3,352,732 UART: [art] Lock RT PCRs Done
3,354,490 UART: [art] Populate DV Done
3,362,893 UART: [fht] FMC Alias Private Key: 7
3,364,005 UART: [art] Derive CDI
3,364,285 UART: [art] Store in slot 0x4
3,450,029 UART: [art] Derive Key Pair
3,450,389 UART: [art] Store priv key in slot 0x5
3,464,148 UART: [art] Derive Key Pair - Done
3,479,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,432 UART: [art] PUB.X = 8170FA0CAB103206194B6EF0DE5815F954FDCE61A09E629F22C8790E869A6F46CAF656C08FAFFED9F2F3DE00ACF2E3AF
3,502,193 UART: [art] PUB.Y = 0734842A9E7EEA5EDAA1FE81600F787D3027127BDA12ABA2902C13BF2E8C467CDBA1CEA00A1AE44DF070011770CCB684
3,509,147 UART: [art] SIG.R = 8357419A7A7FB0EEAB95C09E432C4D4442829FBB0B7E3DAE4EDD6BCD42CE10DCB6E12D84A6125AE5296D0CB8845E1277
3,515,929 UART: [art] SIG.S = BFB519DC4545F48AA4DD473CFBE1BA67C12C68B8BAFB3F77580976CF3AF72AC86B056140EB8F3EBCAE8FAFEFE15DCB97
3,539,747 UART: Caliptra RT
3,540,090 UART: [state] CFI Enabled
3,660,073 UART: [rt] RT listening for mailbox commands...
3,660,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,089 UART: [rt]cmd =0x44504543, len=96
3,872,831 >>> mbox cmd response data (6236 bytes)
3,872,832 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,902,493 UART: [rt]cmd =0x52564348, len=36
3,904,961 >>> mbox cmd response data (8 bytes)
3,904,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,934,887 UART: [rt]cmd =0x44504543, len=96
4,116,741 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,840 ready_for_fw is high
1,362,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,993 >>> mbox cmd response: success
3,043,374 UART:
3,043,390 UART: Running Caliptra FMC ...
3,043,798 UART:
3,043,941 UART: [state] CFI Enabled
3,054,883 UART: [fht] FMC Alias Private Key: 7
3,173,415 UART: [art] Extend RT PCRs Done
3,173,843 UART: [art] Lock RT PCRs Done
3,175,543 UART: [art] Populate DV Done
3,183,584 UART: [fht] FMC Alias Private Key: 7
3,184,758 UART: [art] Derive CDI
3,185,038 UART: [art] Store in slot 0x4
3,271,002 UART: [art] Derive Key Pair
3,271,362 UART: [art] Store priv key in slot 0x5
3,284,315 UART: [art] Derive Key Pair - Done
3,299,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,566 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,331 UART: [art] PUB.X = CE09D7A2D3600A5F8799AE226B62A0CEFC572913D4E0E948A7CCA4600063155E3DE7365026204300DB4D4DB2FB1F0D1C
3,322,056 UART: [art] PUB.Y = 929262E18CE16AF0267BEB8F7E4DFECB9973F8768F38F3885C3D226916C17D418ABC242344F98A4EA2D8470A90CE386E
3,329,009 UART: [art] SIG.R = C92CAEA928C2497276E49D9DBD5A7317321B40B92D466857BEA639B180CD1FB5C4C6522F4F825E6EDB62B6F41F8FC0DB
3,335,793 UART: [art] SIG.S = 8DF18BC2ADABDAA57249EEEF969F3BFC72A72CE6E413F05136AB0D9CED53CFD2A442C4F64A53080B67193CD426A0D6B9
3,359,606 UART: Caliptra RT
3,359,949 UART: [state] CFI Enabled
3,480,122 UART: [rt] RT listening for mailbox commands...
3,480,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,050 UART: [rt]cmd =0x44504543, len=96
3,692,151 >>> mbox cmd response data (6236 bytes)
3,692,152 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,677 UART: [rt]cmd =0x52564348, len=36
3,724,321 >>> mbox cmd response data (8 bytes)
3,724,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,754,385 UART: [rt]cmd =0x44504543, len=96
3,935,910 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,834 UART: [kat] SHA2-256
901,774 UART: [kat] SHA2-384
904,639 UART: [kat] SHA2-512-ACC
906,540 UART: [kat] ECC-384
916,327 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,169,926 UART: [cold-reset] ++
1,170,288 UART: [fht] FHT @ 0x50003400
1,172,836 UART: [idev] ++
1,173,004 UART: [idev] CDI.KEYID = 6
1,173,365 UART: [idev] SUBJECT.KEYID = 7
1,173,790 UART: [idev] UDS.KEYID = 0
1,174,136 ready_for_fw is high
1,174,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,625 UART: [idev] Erasing UDS.KEYID = 0
1,199,183 UART: [idev] Sha1 KeyId Algorithm
1,208,071 UART: [idev] --
1,209,052 UART: [ldev] ++
1,209,220 UART: [ldev] CDI.KEYID = 6
1,209,584 UART: [ldev] SUBJECT.KEYID = 5
1,210,011 UART: [ldev] AUTHORITY.KEYID = 7
1,210,474 UART: [ldev] FE.KEYID = 1
1,215,834 UART: [ldev] Erasing FE.KEYID = 1
1,241,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,098 UART: [ldev] --
1,281,533 UART: [fwproc] Wait for Commands...
1,282,136 UART: [fwproc] Recv command 0x46574c44
1,282,869 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,981 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,156 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,393 >>> mbox cmd response: success
2,828,653 UART: [afmc] ++
2,828,821 UART: [afmc] CDI.KEYID = 6
2,829,184 UART: [afmc] SUBJECT.KEYID = 7
2,829,610 UART: [afmc] AUTHORITY.KEYID = 5
2,864,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,937 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,647 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,528 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,229 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,116 UART: [afmc] --
2,908,069 UART: [cold-reset] --
2,908,751 UART: [state] Locking Datavault
2,909,860 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,464 UART: [state] Locking ICCM
2,911,040 UART: [exit] Launching FMC @ 0x40000130
2,916,370 UART:
2,916,386 UART: Running Caliptra FMC ...
2,916,794 UART:
2,916,848 UART: [state] CFI Enabled
2,927,234 UART: [fht] FMC Alias Private Key: 7
3,045,812 UART: [art] Extend RT PCRs Done
3,046,240 UART: [art] Lock RT PCRs Done
3,047,660 UART: [art] Populate DV Done
3,056,089 UART: [fht] FMC Alias Private Key: 7
3,057,085 UART: [art] Derive CDI
3,057,365 UART: [art] Store in slot 0x4
3,143,124 UART: [art] Derive Key Pair
3,143,484 UART: [art] Store priv key in slot 0x5
3,156,536 UART: [art] Derive Key Pair - Done
3,171,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,719 UART: [art] PUB.X = 017A1D625281143C1437B401C3020C1E6F6253B3D21129FDDC5B4F17A1F626B6A1F4A651002050B705C138C4A3356D6B
3,194,446 UART: [art] PUB.Y = C1F716323188C6C9100670782C4B30802F94A5186B722FA0D10B2D3973178B45A7DBEE8F3822C87FCE099A5184BF8882
3,201,381 UART: [art] SIG.R = 848A3EBB945EC91C3A8615735DFB855B0227310FA89A820D1AD2ADCFBCB6D2970CB15E713470581493AF57E9359CFCED
3,208,151 UART: [art] SIG.S = 74D1E8195E073D5DAA36D754312F83D806C1C9159F6F8E39B29C4954300C842BA3E35C226E4177949F9CACAF0304CB4D
3,231,702 UART: Caliptra RT
3,231,953 UART: [state] CFI Enabled
3,350,974 UART: [rt] RT listening for mailbox commands...
3,351,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,240 UART: [rt]cmd =0x44504543, len=96
3,563,840 >>> mbox cmd response data (6236 bytes)
3,563,841 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,593,458 UART: [rt]cmd =0x52564348, len=36
3,596,096 >>> mbox cmd response data (8 bytes)
3,596,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,626,076 UART: [rt]cmd =0x44504543, len=96
3,808,352 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,276 ready_for_fw is high
1,058,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,098 >>> mbox cmd response: success
2,739,973 UART:
2,739,989 UART: Running Caliptra FMC ...
2,740,397 UART:
2,740,451 UART: [state] CFI Enabled
2,750,879 UART: [fht] FMC Alias Private Key: 7
2,869,375 UART: [art] Extend RT PCRs Done
2,869,803 UART: [art] Lock RT PCRs Done
2,871,441 UART: [art] Populate DV Done
2,879,656 UART: [fht] FMC Alias Private Key: 7
2,880,622 UART: [art] Derive CDI
2,880,902 UART: [art] Store in slot 0x4
2,966,679 UART: [art] Derive Key Pair
2,967,039 UART: [art] Store priv key in slot 0x5
2,980,711 UART: [art] Derive Key Pair - Done
2,995,512 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,659 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,424 UART: [art] PUB.X = 3830B39A1A40D710A190D46AE01FFA71842260B8B5D7E1E98293A485707876A89033263BCF72080A1209BFCE6D7035DF
3,019,181 UART: [art] PUB.Y = FE0B567339C23A78B4A89969D74A378940D3D2AA74D22A0CDDDA08945417D2E01CC55F35B98A764B87376A458FB58B44
3,026,124 UART: [art] SIG.R = 6019D4B6304F7614C5FEBAD8B4B052F353B42C2302B282B709C2DADAE1ECD916E2DEBBBC13276ABD28ECB6498EEB8401
3,032,905 UART: [art] SIG.S = FE4B7F64E63D58C19DDD17691B09FC06677F18A007EDADB411780467820AF61C3609ED5D052C88CDA0CC99BDC392AD72
3,056,556 UART: Caliptra RT
3,056,807 UART: [state] CFI Enabled
3,176,512 UART: [rt] RT listening for mailbox commands...
3,177,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,504 UART: [rt]cmd =0x44504543, len=96
3,389,493 >>> mbox cmd response data (6236 bytes)
3,389,494 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,419,083 UART: [rt]cmd =0x52564348, len=36
3,421,575 >>> mbox cmd response data (8 bytes)
3,421,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,451,349 UART: [rt]cmd =0x44504543, len=96
3,634,604 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,019 UART: [kat] SHA2-256
901,959 UART: [kat] SHA2-384
904,752 UART: [kat] SHA2-512-ACC
906,653 UART: [kat] ECC-384
916,700 UART: [kat] HMAC-384Kdf
921,320 UART: [kat] LMS
1,169,632 UART: [kat] --
1,170,625 UART: [cold-reset] ++
1,171,023 UART: [fht] FHT @ 0x50003400
1,173,827 UART: [idev] ++
1,173,995 UART: [idev] CDI.KEYID = 6
1,174,356 UART: [idev] SUBJECT.KEYID = 7
1,174,781 UART: [idev] UDS.KEYID = 0
1,175,127 ready_for_fw is high
1,175,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,280 UART: [idev] Erasing UDS.KEYID = 0
1,200,302 UART: [idev] Sha1 KeyId Algorithm
1,209,174 UART: [idev] --
1,210,167 UART: [ldev] ++
1,210,335 UART: [ldev] CDI.KEYID = 6
1,210,699 UART: [ldev] SUBJECT.KEYID = 5
1,211,126 UART: [ldev] AUTHORITY.KEYID = 7
1,211,589 UART: [ldev] FE.KEYID = 1
1,216,703 UART: [ldev] Erasing FE.KEYID = 1
1,242,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,617 UART: [ldev] --
1,282,068 UART: [fwproc] Wait for Commands...
1,282,657 UART: [fwproc] Recv command 0x46574c44
1,283,390 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,390 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,565 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,766 >>> mbox cmd response: success
2,826,988 UART: [afmc] ++
2,827,156 UART: [afmc] CDI.KEYID = 6
2,827,519 UART: [afmc] SUBJECT.KEYID = 7
2,827,945 UART: [afmc] AUTHORITY.KEYID = 5
2,862,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,026 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,736 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,617 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,318 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,109 UART: [afmc] --
2,906,090 UART: [cold-reset] --
2,907,078 UART: [state] Locking Datavault
2,908,339 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,943 UART: [state] Locking ICCM
2,909,521 UART: [exit] Launching FMC @ 0x40000130
2,914,851 UART:
2,914,867 UART: Running Caliptra FMC ...
2,915,275 UART:
2,915,418 UART: [state] CFI Enabled
2,925,714 UART: [fht] FMC Alias Private Key: 7
3,045,422 UART: [art] Extend RT PCRs Done
3,045,850 UART: [art] Lock RT PCRs Done
3,047,626 UART: [art] Populate DV Done
3,056,069 UART: [fht] FMC Alias Private Key: 7
3,057,023 UART: [art] Derive CDI
3,057,303 UART: [art] Store in slot 0x4
3,143,130 UART: [art] Derive Key Pair
3,143,490 UART: [art] Store priv key in slot 0x5
3,156,496 UART: [art] Derive Key Pair - Done
3,171,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,801 UART: [art] PUB.X = 396681775A86C649D0D800F2E102F82287068C54B976A9A5BBE1BEE556F2F4170E00A771C142700FC241F833FD27FC8C
3,194,513 UART: [art] PUB.Y = 3B0D7C73DBDE2DFA986ECE9593B3363B5A36D4E384A1F5821FD43CF5CF34F166AE12CA3B0F83B803B78F20A9B3A7F9DE
3,201,476 UART: [art] SIG.R = EDF4484E31A7079B246743759F342C16715A7C61FDF4BDB44278E6999CBF4784564D4472FFD183F8504E12F78EC74275
3,208,239 UART: [art] SIG.S = 5CA20BB722810E11A5A903EC081460EDEC9A6B1AD532DD6BD52CD504627AE65A9F162461B0B17A8335950905E2E46F94
3,231,880 UART: Caliptra RT
3,232,223 UART: [state] CFI Enabled
3,351,808 UART: [rt] RT listening for mailbox commands...
3,352,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,978 UART: [rt]cmd =0x44504543, len=96
3,565,653 >>> mbox cmd response data (6236 bytes)
3,565,654 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,595,321 UART: [rt]cmd =0x52564348, len=36
3,597,805 >>> mbox cmd response data (8 bytes)
3,597,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,627,775 UART: [rt]cmd =0x44504543, len=96
3,810,078 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,651 ready_for_fw is high
1,059,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,361 >>> mbox cmd response: success
2,739,628 UART:
2,739,644 UART: Running Caliptra FMC ...
2,740,052 UART:
2,740,195 UART: [state] CFI Enabled
2,750,873 UART: [fht] FMC Alias Private Key: 7
2,870,919 UART: [art] Extend RT PCRs Done
2,871,347 UART: [art] Lock RT PCRs Done
2,872,731 UART: [art] Populate DV Done
2,880,748 UART: [fht] FMC Alias Private Key: 7
2,881,866 UART: [art] Derive CDI
2,882,146 UART: [art] Store in slot 0x4
2,967,905 UART: [art] Derive Key Pair
2,968,265 UART: [art] Store priv key in slot 0x5
2,981,793 UART: [art] Derive Key Pair - Done
2,996,223 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,425 UART: [art] PUB.X = 7C9CB891D0AC4BD51D395104E7D7626A0814637BF2855B9FFCC298A468315647A820164A01729BC9D6C58CB3D694C4C0
3,019,186 UART: [art] PUB.Y = 40A9ED795B95267DF18E7A174431444B68A45529FB69CDD89DBC7117AADEBC2382847569815650C2F247E4B0641C3CA5
3,026,136 UART: [art] SIG.R = D171E5E6013E29BE681E6B66B0F30B9861BD98493505536CDD7789F712E064622327A1590056A1027EAD0A15915584E2
3,032,857 UART: [art] SIG.S = E794A877D672378E798448C7F01347586D17ABF168338D649A98A8F44B0CB99C551911051E8F12D2FAFAE092A099971D
3,056,801 UART: Caliptra RT
3,057,144 UART: [state] CFI Enabled
3,176,394 UART: [rt] RT listening for mailbox commands...
3,177,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,602 UART: [rt]cmd =0x44504543, len=96
3,390,630 >>> mbox cmd response data (6236 bytes)
3,390,631 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,420,006 UART: [rt]cmd =0x52564348, len=36
3,422,702 >>> mbox cmd response data (8 bytes)
3,422,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,452,352 UART: [rt]cmd =0x44504543, len=96
3,633,244 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
893,338 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,463 UART: [kat] ++
897,615 UART: [kat] sha1
901,969 UART: [kat] SHA2-256
903,909 UART: [kat] SHA2-384
906,720 UART: [kat] SHA2-512-ACC
908,621 UART: [kat] ECC-384
918,428 UART: [kat] HMAC-384Kdf
922,904 UART: [kat] LMS
1,171,232 UART: [kat] --
1,171,987 UART: [cold-reset] ++
1,172,333 UART: [fht] FHT @ 0x50003400
1,175,002 UART: [idev] ++
1,175,170 UART: [idev] CDI.KEYID = 6
1,175,530 UART: [idev] SUBJECT.KEYID = 7
1,175,954 UART: [idev] UDS.KEYID = 0
1,176,299 ready_for_fw is high
1,176,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,050 UART: [idev] Erasing UDS.KEYID = 0
1,201,643 UART: [idev] Sha1 KeyId Algorithm
1,210,129 UART: [idev] --
1,211,337 UART: [ldev] ++
1,211,505 UART: [ldev] CDI.KEYID = 6
1,211,868 UART: [ldev] SUBJECT.KEYID = 5
1,212,294 UART: [ldev] AUTHORITY.KEYID = 7
1,212,757 UART: [ldev] FE.KEYID = 1
1,217,939 UART: [ldev] Erasing FE.KEYID = 1
1,243,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,121 UART: [ldev] --
1,282,452 UART: [fwproc] Wait for Commands...
1,283,094 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,700 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,870 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,231 >>> mbox cmd response: success
2,828,283 UART: [afmc] ++
2,828,451 UART: [afmc] CDI.KEYID = 6
2,828,813 UART: [afmc] SUBJECT.KEYID = 7
2,829,238 UART: [afmc] AUTHORITY.KEYID = 5
2,865,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,366 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,075 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,958 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,659 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,329 UART: [afmc] --
2,908,249 UART: [cold-reset] --
2,908,955 UART: [state] Locking Datavault
2,910,338 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,942 UART: [state] Locking ICCM
2,911,398 UART: [exit] Launching FMC @ 0x40000130
2,916,728 UART:
2,916,744 UART: Running Caliptra FMC ...
2,917,152 UART:
2,917,206 UART: [state] CFI Enabled
2,927,690 UART: [fht] FMC Alias Private Key: 7
3,046,880 UART: [art] Extend RT PCRs Done
3,047,308 UART: [art] Lock RT PCRs Done
3,048,712 UART: [art] Populate DV Done
3,056,983 UART: [fht] FMC Alias Private Key: 7
3,057,971 UART: [art] Derive CDI
3,058,251 UART: [art] Store in slot 0x4
3,144,128 UART: [art] Derive Key Pair
3,144,488 UART: [art] Store priv key in slot 0x5
3,157,578 UART: [art] Derive Key Pair - Done
3,172,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,925 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,690 UART: [art] PUB.X = E009A28DF015798D68529A6688303E9234200BA4D6C38BA1B32F7BFCBCF85AB95550CDBDEBE07BF904939663F2AC2087
3,195,459 UART: [art] PUB.Y = 6090EC67B2A76040C633BE43DC7D349246F203DCBABD5CB1B4D47FE23C8ABEBF9FCF7F6F8FDAB8968F1EE3799885086B
3,202,425 UART: [art] SIG.R = A24A0FC451D6DD1EBF09E504C54D3009A971C324B9CA0740391CAD508D19FCAE5226CEDBE84CBD1CBBA530F9207EEDB5
3,209,204 UART: [art] SIG.S = E9FC18677E8A7C259793F1AF571471E8D477FF45CFD5DF5903FFD642885A91FC97625BABCEB4B4D2C8731C4253D449B4
3,232,767 UART: Caliptra RT
3,233,018 UART: [state] CFI Enabled
3,352,592 UART: [rt] RT listening for mailbox commands...
3,353,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,908 UART: [rt]cmd =0x44504543, len=96
3,566,174 >>> mbox cmd response data (6236 bytes)
3,566,175 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,595,896 UART: [rt]cmd =0x52564348, len=36
3,598,622 >>> mbox cmd response data (8 bytes)
3,598,623 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,628,500 UART: [rt]cmd =0x44504543, len=96
3,811,506 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,297 ready_for_fw is high
1,060,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,334 >>> mbox cmd response: success
2,741,297 UART:
2,741,313 UART: Running Caliptra FMC ...
2,741,721 UART:
2,741,775 UART: [state] CFI Enabled
2,752,433 UART: [fht] FMC Alias Private Key: 7
2,871,727 UART: [art] Extend RT PCRs Done
2,872,155 UART: [art] Lock RT PCRs Done
2,873,853 UART: [art] Populate DV Done
2,881,952 UART: [fht] FMC Alias Private Key: 7
2,882,956 UART: [art] Derive CDI
2,883,236 UART: [art] Store in slot 0x4
2,968,871 UART: [art] Derive Key Pair
2,969,231 UART: [art] Store priv key in slot 0x5
2,981,969 UART: [art] Derive Key Pair - Done
2,996,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,871 UART: [art] PUB.X = F194013A2903BF6B32DEDD7B6C82A7636C9A5765E33010D169535634C1333080599A47A165DBE726916B817BB193014F
3,019,622 UART: [art] PUB.Y = 66187C6AB415683032EC2D176F9FD33A7C1AE84E9698C3C460BC7E72226F9C7E074D64AC440B33597AD5910A42987980
3,026,559 UART: [art] SIG.R = 085A172353F4DC6FFF862BE8369A7393F37E374DDB9F6EB703A8C4DA639CBCD34FBF239B8CC95E6E6BC8F85DFEB277DB
3,033,347 UART: [art] SIG.S = D6D1B876CB6AD79598D6CCB262EBB9C327470DF7DF30B89B650CC314A1AB65BBA7CC3CC1CB6B2499B7D8AA92FFD84659
3,057,219 UART: Caliptra RT
3,057,470 UART: [state] CFI Enabled
3,177,561 UART: [rt] RT listening for mailbox commands...
3,178,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,923 UART: [rt]cmd =0x44504543, len=96
3,389,890 >>> mbox cmd response data (6236 bytes)
3,389,891 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,419,484 UART: [rt]cmd =0x52564348, len=36
3,421,980 >>> mbox cmd response data (8 bytes)
3,421,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,452,170 UART: [rt]cmd =0x44504543, len=96
3,633,767 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
893,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,734 UART: [kat] ++
897,886 UART: [kat] sha1
902,074 UART: [kat] SHA2-256
904,014 UART: [kat] SHA2-384
906,813 UART: [kat] SHA2-512-ACC
908,714 UART: [kat] ECC-384
918,917 UART: [kat] HMAC-384Kdf
923,451 UART: [kat] LMS
1,171,779 UART: [kat] --
1,172,738 UART: [cold-reset] ++
1,173,082 UART: [fht] FHT @ 0x50003400
1,175,615 UART: [idev] ++
1,175,783 UART: [idev] CDI.KEYID = 6
1,176,143 UART: [idev] SUBJECT.KEYID = 7
1,176,567 UART: [idev] UDS.KEYID = 0
1,176,912 ready_for_fw is high
1,176,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,781 UART: [idev] Erasing UDS.KEYID = 0
1,202,052 UART: [idev] Sha1 KeyId Algorithm
1,210,644 UART: [idev] --
1,211,742 UART: [ldev] ++
1,211,910 UART: [ldev] CDI.KEYID = 6
1,212,273 UART: [ldev] SUBJECT.KEYID = 5
1,212,699 UART: [ldev] AUTHORITY.KEYID = 7
1,213,162 UART: [ldev] FE.KEYID = 1
1,218,596 UART: [ldev] Erasing FE.KEYID = 1
1,245,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,500 UART: [ldev] --
1,284,939 UART: [fwproc] Wait for Commands...
1,285,687 UART: [fwproc] Recv command 0x46574c44
1,286,415 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,660,125 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,691,295 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,831,668 >>> mbox cmd response: success
2,832,768 UART: [afmc] ++
2,832,936 UART: [afmc] CDI.KEYID = 6
2,833,298 UART: [afmc] SUBJECT.KEYID = 7
2,833,723 UART: [afmc] AUTHORITY.KEYID = 5
2,869,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,885,657 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,886,405 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,892,114 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,897,997 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,903,698 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,911,372 UART: [afmc] --
2,912,462 UART: [cold-reset] --
2,913,476 UART: [state] Locking Datavault
2,914,685 UART: [state] Locking PCR0, PCR1 and PCR31
2,915,289 UART: [state] Locking ICCM
2,915,889 UART: [exit] Launching FMC @ 0x40000130
2,921,219 UART:
2,921,235 UART: Running Caliptra FMC ...
2,921,643 UART:
2,921,786 UART: [state] CFI Enabled
2,932,352 UART: [fht] FMC Alias Private Key: 7
3,050,872 UART: [art] Extend RT PCRs Done
3,051,300 UART: [art] Lock RT PCRs Done
3,052,980 UART: [art] Populate DV Done
3,061,145 UART: [fht] FMC Alias Private Key: 7
3,062,083 UART: [art] Derive CDI
3,062,363 UART: [art] Store in slot 0x4
3,148,220 UART: [art] Derive Key Pair
3,148,580 UART: [art] Store priv key in slot 0x5
3,161,598 UART: [art] Derive Key Pair - Done
3,176,131 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,147 UART: [art] PUB.X = 476F69208B6F32B040A55A63449DD01B365BA723136E0908106D25C546D5D9155A93E0CB07C334A58EA4E167FF958469
3,198,900 UART: [art] PUB.Y = 6213639C62776DC0918A39F466D77E271ACFF0F1DC6DBBABE2A83B3B6938D17DA43C7B4DF254DF3FAB93845CA677A9E6
3,205,866 UART: [art] SIG.R = 8537CCDC5C0AA428D977E617752868B3F57D00E5FEB8F53BA458F7EA7239FBC80DCC21548019CE9755AAE76D6FD304CD
3,212,619 UART: [art] SIG.S = EADF6C541FE830946076CBC5B79A7D6AD96AA0545052D92D100F2613E3D62B95596801C782AA56E4AA87CE0C8628393E
3,236,120 UART: Caliptra RT
3,236,463 UART: [state] CFI Enabled
3,356,375 UART: [rt] RT listening for mailbox commands...
3,357,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,687 UART: [rt]cmd =0x44504543, len=96
3,570,353 >>> mbox cmd response data (6236 bytes)
3,570,354 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,600,087 UART: [rt]cmd =0x52564348, len=36
3,602,509 >>> mbox cmd response data (8 bytes)
3,602,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,632,453 UART: [rt]cmd =0x44504543, len=96
3,815,113 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,550 ready_for_fw is high
1,060,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,935 >>> mbox cmd response: success
2,741,354 UART:
2,741,370 UART: Running Caliptra FMC ...
2,741,778 UART:
2,741,921 UART: [state] CFI Enabled
2,752,355 UART: [fht] FMC Alias Private Key: 7
2,871,543 UART: [art] Extend RT PCRs Done
2,871,971 UART: [art] Lock RT PCRs Done
2,873,603 UART: [art] Populate DV Done
2,881,742 UART: [fht] FMC Alias Private Key: 7
2,882,860 UART: [art] Derive CDI
2,883,140 UART: [art] Store in slot 0x4
2,969,341 UART: [art] Derive Key Pair
2,969,701 UART: [art] Store priv key in slot 0x5
2,982,859 UART: [art] Derive Key Pair - Done
2,997,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,995 UART: [art] PUB.X = 3902EFA3B8BB37DB371F188AFBE428A4FF2EA4EA6C163056DDE71D36117359EA298056AD91B9B269B862967AF0770EBC
3,020,771 UART: [art] PUB.Y = B6ADECB09BC0953F63BA4029A3B65C1AC18D8C4BC524353C84E53214D5C360A8299C0316241C8C700A2247012D853576
3,027,710 UART: [art] SIG.R = 90E89AD1C6CC59F02B82AC9855932C2BF8490324E2F5862F15F9F2886F2A82C590873CFCF4C1EC7889671D3C71B8AD49
3,034,481 UART: [art] SIG.S = 15BA0BBA5BB06E3888592295B46F5757E293037701607D79807DF014CACA2605B5E5FB1D4CD24B21F922667FEA931C91
3,058,207 UART: Caliptra RT
3,058,550 UART: [state] CFI Enabled
3,177,567 UART: [rt] RT listening for mailbox commands...
3,178,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,713 UART: [rt]cmd =0x44504543, len=96
3,390,288 >>> mbox cmd response data (6236 bytes)
3,390,289 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,419,930 UART: [rt]cmd =0x52564348, len=36
3,422,656 >>> mbox cmd response data (8 bytes)
3,422,657 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,452,756 UART: [rt]cmd =0x44504543, len=96
3,636,389 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,431 UART:
192,801 UART: Running Caliptra ROM ...
194,043 UART:
194,208 UART: [state] CFI Enabled
268,962 UART: [state] LifecycleState = Unprovisioned
270,909 UART: [state] DebugLocked = No
272,242 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,059 UART: [kat] SHA2-256
446,821 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,298 UART: [kat] ++
457,815 UART: [kat] sha1
468,696 UART: [kat] SHA2-256
471,419 UART: [kat] SHA2-384
476,551 UART: [kat] SHA2-512-ACC
478,918 UART: [kat] ECC-384
2,771,071 UART: [kat] HMAC-384Kdf
2,802,350 UART: [kat] LMS
3,992,664 UART: [kat] --
3,997,399 UART: [cold-reset] ++
3,999,471 UART: [fht] Storing FHT @ 0x50003400
4,010,889 UART: [idev] ++
4,011,455 UART: [idev] CDI.KEYID = 6
4,012,411 UART: [idev] SUBJECT.KEYID = 7
4,013,658 UART: [idev] UDS.KEYID = 0
4,014,632 ready_for_fw is high
4,014,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,906 UART: [idev] Erasing UDS.KEYID = 0
7,350,463 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,250 UART: [idev] --
7,374,653 UART: [ldev] ++
7,375,222 UART: [ldev] CDI.KEYID = 6
7,376,238 UART: [ldev] SUBJECT.KEYID = 5
7,377,404 UART: [ldev] AUTHORITY.KEYID = 7
7,378,688 UART: [ldev] FE.KEYID = 1
7,425,908 UART: [ldev] Erasing FE.KEYID = 1
10,758,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,958 UART: [ldev] --
13,138,111 UART: [fwproc] Waiting for Commands...
13,140,058 UART: [fwproc] Received command 0x46574c44
13,142,246 UART: [fwproc] Received Image of size 118548 bytes
17,247,181 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,323,705 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,396,885 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,725,615 >>> mbox cmd response: success
17,729,914 UART: [afmc] ++
17,730,537 UART: [afmc] CDI.KEYID = 6
17,731,453 UART: [afmc] SUBJECT.KEYID = 7
17,732,726 UART: [afmc] AUTHORITY.KEYID = 5
21,090,463 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,176 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,408 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,868 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,575 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,003 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,461,337 UART: [afmc] --
23,465,256 UART: [cold-reset] --
23,468,920 UART: [state] Locking Datavault
23,473,726 UART: [state] Locking PCR0, PCR1 and PCR31
23,475,434 UART: [state] Locking ICCM
23,476,725 UART: [exit] Launching FMC @ 0x40000130
23,485,123 UART:
23,485,365 UART: Running Caliptra FMC ...
23,486,467 UART:
23,486,626 UART: [state] CFI Enabled
23,554,722 UART: [fht] FMC Alias Private Key: 7
25,896,016 UART: [art] Extend RT PCRs Done
25,897,252 UART: [art] Lock RT PCRs Done
25,898,775 UART: [art] Populate DV Done
25,904,186 UART: [fht] FMC Alias Private Key: 7
25,905,778 UART: [art] Derive CDI
25,906,614 UART: [art] Store in slot 0x4
25,963,014 UART: [art] Derive Key Pair
25,964,060 UART: [art] Store priv key in slot 0x5
29,256,656 UART: [art] Derive Key Pair - Done
29,269,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,801 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,318 UART: [art] PUB.X = 2C38E300ECF40CCB648353C1554A7BD538476FCA2F725696A2011377142F85C3B02379E8838ACA4CCFBA8C8C2735A185
31,567,599 UART: [art] PUB.Y = 0FC71F409B0651318749A0232BACE6A24E3348FD2FE2AA9A26DF0A82CDC867A81A4B84B0F3C2E510E86262D422A2FE7A
31,574,849 UART: [art] SIG.R = 748EB07C0D68283B9905EE0DC009FCD46124250FF62421B178EA8A9C7A0210287F0D55B0B128EEB3E18D758F0E1B089F
31,582,219 UART: [art] SIG.S = D33113B918F9500264D7E29530A0D070702F5D0D9C814E278DBA7C1593618C06005B7CCF4CDC8A0B23809FB30D134182
32,887,339 UART: Caliptra RT
32,888,064 UART: [state] CFI Enabled
33,065,723 UART: [rt] RT listening for mailbox commands...
33,067,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,098,395 UART: [rt]cmd =0x44504543, len=96
38,878,779 >>> mbox cmd response data (6236 bytes)
38,908,230 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,938,472 UART: [rt]cmd =0x52564348, len=36
38,941,453 >>> mbox cmd response data (8 bytes)
38,941,896 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,971,858 UART: [rt]cmd =0x52564348, len=36
38,974,048 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
3,808,424 ready_for_fw is high
3,808,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,971,540 >>> mbox cmd response: success
23,671,911 UART:
23,672,299 UART: Running Caliptra FMC ...
23,673,439 UART:
23,673,605 UART: [state] CFI Enabled
23,741,469 UART: [fht] FMC Alias Private Key: 7
26,081,556 UART: [art] Extend RT PCRs Done
26,082,812 UART: [art] Lock RT PCRs Done
26,084,612 UART: [art] Populate DV Done
26,089,979 UART: [fht] FMC Alias Private Key: 7
26,091,521 UART: [art] Derive CDI
26,092,337 UART: [art] Store in slot 0x4
26,149,944 UART: [art] Derive Key Pair
26,150,982 UART: [art] Store priv key in slot 0x5
29,443,743 UART: [art] Derive Key Pair - Done
29,456,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,199 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,726 UART: [art] PUB.X = 6A58E10D14450F3AE06CD3803327FD91FB1F4D736D1AD8EDA8696C358375A26820E9C8D936740A2223C03832FD92B0F4
31,754,991 UART: [art] PUB.Y = 1A04079961DE132C4E0FAE9FECF3D8A6CB85C7E7B5EA7D7214859AD668AA1C0B764D43ECE1F917F19C70CE58E253DE05
31,762,212 UART: [art] SIG.R = CC7566C3F08BE39F7BA86FEDF9F2B008626D2AAAC04FB8D2A811F8D96188ED48A64D14F1941F372775B379258B7C5CA4
31,769,613 UART: [art] SIG.S = F0034F0CC2C623C7BD1B669D8329275F476C3F004CD115D44AE540DBC424FCF7B85BD1963FC079353F232941EB174FC0
33,074,810 UART: Caliptra RT
33,075,534 UART: [state] CFI Enabled
33,253,312 UART: [rt] RT listening for mailbox commands...
33,255,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,285,770 UART: [rt]cmd =0x44504543, len=96
39,066,837 >>> mbox cmd response data (6236 bytes)
39,096,193 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,126,429 UART: [rt]cmd =0x52564348, len=36
39,129,731 >>> mbox cmd response data (8 bytes)
39,130,160 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,160,205 UART: [rt]cmd =0x52564348, len=36
39,162,432 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,519 UART:
192,875 UART: Running Caliptra ROM ...
193,962 UART:
603,818 UART: [state] CFI Enabled
617,665 UART: [state] LifecycleState = Unprovisioned
619,626 UART: [state] DebugLocked = No
621,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,812 UART: [kat] SHA2-256
795,534 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,117 UART: [kat] ++
806,643 UART: [kat] sha1
817,375 UART: [kat] SHA2-256
820,096 UART: [kat] SHA2-384
824,873 UART: [kat] SHA2-512-ACC
827,230 UART: [kat] ECC-384
3,110,703 UART: [kat] HMAC-384Kdf
3,123,570 UART: [kat] LMS
4,313,687 UART: [kat] --
4,317,918 UART: [cold-reset] ++
4,319,766 UART: [fht] Storing FHT @ 0x50003400
4,331,805 UART: [idev] ++
4,332,359 UART: [idev] CDI.KEYID = 6
4,333,232 UART: [idev] SUBJECT.KEYID = 7
4,334,535 UART: [idev] UDS.KEYID = 0
4,335,527 ready_for_fw is high
4,335,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,665 UART: [idev] Erasing UDS.KEYID = 0
7,621,135 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,006 UART: [idev] --
7,648,790 UART: [ldev] ++
7,649,400 UART: [ldev] CDI.KEYID = 6
7,650,302 UART: [ldev] SUBJECT.KEYID = 5
7,651,353 UART: [ldev] AUTHORITY.KEYID = 7
7,652,689 UART: [ldev] FE.KEYID = 1
7,663,252 UART: [ldev] Erasing FE.KEYID = 1
10,948,454 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,475 UART: [ldev] --
13,311,570 UART: [fwproc] Waiting for Commands...
13,314,691 UART: [fwproc] Received command 0x46574c44
13,316,870 UART: [fwproc] Received Image of size 118548 bytes
17,419,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,884 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,092 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,899,570 >>> mbox cmd response: success
17,903,300 UART: [afmc] ++
17,903,925 UART: [afmc] CDI.KEYID = 6
17,904,806 UART: [afmc] SUBJECT.KEYID = 7
17,906,067 UART: [afmc] AUTHORITY.KEYID = 5
21,222,012 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,056 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,310 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,751 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,442 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,856 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,592 UART: [afmc] --
23,587,406 UART: [cold-reset] --
23,591,531 UART: [state] Locking Datavault
23,596,394 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,136 UART: [state] Locking ICCM
23,600,731 UART: [exit] Launching FMC @ 0x40000130
23,609,176 UART:
23,609,414 UART: Running Caliptra FMC ...
23,610,507 UART:
23,610,662 UART: [state] CFI Enabled
23,619,166 UART: [fht] FMC Alias Private Key: 7
25,959,758 UART: [art] Extend RT PCRs Done
25,960,979 UART: [art] Lock RT PCRs Done
25,962,521 UART: [art] Populate DV Done
25,968,038 UART: [fht] FMC Alias Private Key: 7
25,969,613 UART: [art] Derive CDI
25,970,359 UART: [art] Store in slot 0x4
26,012,947 UART: [art] Derive Key Pair
26,013,947 UART: [art] Store priv key in slot 0x5
29,255,708 UART: [art] Derive Key Pair - Done
29,268,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,634 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,145 UART: [art] PUB.X = 249DC2071C73BF617D632C6D9DD8E16C181354396E39DB41710B7D3A9FC03F7F058CA3E03306677BA94C1F88BF2597D4
31,557,405 UART: [art] PUB.Y = B1E8D680B9CA0D663E634DB969D9FF530D9B77EE4144439A8AA616FB225B885FAC18F0A54CF54AE51CA814A08E087A19
31,564,691 UART: [art] SIG.R = 4609FE59CDF0B16E4A13A2E3A8DA92BB1BA6EC2B779E971F4EC1A1D02FD6623A9F2A8AD38238BD4FAAF556817038DB37
31,572,128 UART: [art] SIG.S = 3C04F064FAF6429702CDB9AE2D59D17338EB838E915025FD8DAD95DE99020E6E65215303BC4AF30855C0DC9A25B361A5
32,878,347 UART: Caliptra RT
32,879,064 UART: [state] CFI Enabled
33,013,105 UART: [rt] RT listening for mailbox commands...
33,015,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,045,401 UART: [rt]cmd =0x44504543, len=96
38,729,655 >>> mbox cmd response data (6236 bytes)
38,758,889 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,789,125 UART: [rt]cmd =0x52564348, len=36
38,792,346 >>> mbox cmd response data (8 bytes)
38,792,790 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,822,637 UART: [rt]cmd =0x52564348, len=36
38,824,627 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
4,131,185 ready_for_fw is high
4,131,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,175,050 >>> mbox cmd response: success
23,815,922 UART:
23,816,312 UART: Running Caliptra FMC ...
23,817,517 UART:
23,817,685 UART: [state] CFI Enabled
23,825,568 UART: [fht] FMC Alias Private Key: 7
26,165,541 UART: [art] Extend RT PCRs Done
26,166,761 UART: [art] Lock RT PCRs Done
26,168,336 UART: [art] Populate DV Done
26,173,748 UART: [fht] FMC Alias Private Key: 7
26,175,230 UART: [art] Derive CDI
26,175,983 UART: [art] Store in slot 0x4
26,218,956 UART: [art] Derive Key Pair
26,219,992 UART: [art] Store priv key in slot 0x5
29,461,896 UART: [art] Derive Key Pair - Done
29,474,801 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,754,931 UART: [art] Erasing AUTHORITY.KEYID = 7
31,756,465 UART: [art] PUB.X = 26972F8B71D7131D5BB5C6A4713DC28C86CEEC2B3B5F3994228D693AB81F2266466B857B4EA0C6AC33C33EAFB4E5E974
31,763,677 UART: [art] PUB.Y = B971D1BCADC602F9FC1483C70AE8DA40218AB316830F93EBC4594E3C0379BAEC9AC280A0BCE99F0D582F8CBFC39F58EB
31,770,982 UART: [art] SIG.R = FE1648A25121A6C898F7B177A8E72EF0FE528EF921E09CB2EDDE2A580214387D4AF8A1BD8E310FF35DDB7AFDAC3DC078
31,778,366 UART: [art] SIG.S = AE75261612A70A215181A78463154328430E8FB5C704F67C8AC81BC63ADF9B39ACB29D316FC6D1E203C650E3C0583354
33,084,048 UART: Caliptra RT
33,084,787 UART: [state] CFI Enabled
33,218,492 UART: [rt] RT listening for mailbox commands...
33,220,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,250,689 UART: [rt]cmd =0x44504543, len=96
38,935,666 >>> mbox cmd response data (6236 bytes)
38,964,840 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,995,056 UART: [rt]cmd =0x52564348, len=36
38,998,249 >>> mbox cmd response data (8 bytes)
38,998,638 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,028,593 UART: [rt]cmd =0x52564348, len=36
39,030,618 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
191,983 UART:
192,337 UART: Running Caliptra ROM ...
193,460 UART:
193,604 UART: [state] CFI Enabled
264,010 UART: [state] LifecycleState = Unprovisioned
265,936 UART: [state] DebugLocked = No
267,333 UART: [state] WD Timer not started. Device not locked for debugging
270,947 UART: [kat] SHA2-256
450,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,368 UART: [kat] ++
461,897 UART: [kat] sha1
471,925 UART: [kat] SHA2-256
474,643 UART: [kat] SHA2-384
479,275 UART: [kat] SHA2-512-ACC
481,637 UART: [kat] ECC-384
2,924,932 UART: [kat] HMAC-384Kdf
2,949,548 UART: [kat] LMS
3,426,012 UART: [kat] --
3,430,605 UART: [cold-reset] ++
3,431,966 UART: [fht] FHT @ 0x50003400
3,443,833 UART: [idev] ++
3,444,392 UART: [idev] CDI.KEYID = 6
3,445,342 UART: [idev] SUBJECT.KEYID = 7
3,446,649 UART: [idev] UDS.KEYID = 0
3,447,540 ready_for_fw is high
3,447,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,800 UART: [idev] Erasing UDS.KEYID = 0
5,968,035 UART: [idev] Sha1 KeyId Algorithm
5,990,354 UART: [idev] --
5,995,688 UART: [ldev] ++
5,996,251 UART: [ldev] CDI.KEYID = 6
5,997,214 UART: [ldev] SUBJECT.KEYID = 5
5,998,420 UART: [ldev] AUTHORITY.KEYID = 7
5,999,647 UART: [ldev] FE.KEYID = 1
6,036,728 UART: [ldev] Erasing FE.KEYID = 1
8,542,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,149 UART: [ldev] --
10,353,488 UART: [fwproc] Wait for Commands...
10,356,068 UART: [fwproc] Recv command 0x46574c44
10,358,105 UART: [fwproc] Recv'd Img size: 118548 bytes
13,839,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,913,934 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,986,947 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,314,398 >>> mbox cmd response: success
14,317,761 UART: [afmc] ++
14,318,372 UART: [afmc] CDI.KEYID = 6
14,319,417 UART: [afmc] SUBJECT.KEYID = 7
14,320,519 UART: [afmc] AUTHORITY.KEYID = 5
16,855,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,626 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,615,412 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,452 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,647,050 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,671,117 UART: [afmc] --
18,675,102 UART: [cold-reset] --
18,679,677 UART: [state] Locking Datavault
18,685,406 UART: [state] Locking PCR0, PCR1 and PCR31
18,687,157 UART: [state] Locking ICCM
18,689,856 UART: [exit] Launching FMC @ 0x40000130
18,698,303 UART:
18,698,542 UART: Running Caliptra FMC ...
18,699,661 UART:
18,699,821 UART: [state] CFI Enabled
18,753,812 UART: [fht] FMC Alias Private Key: 7
20,520,548 UART: [art] Extend RT PCRs Done
20,521,771 UART: [art] Lock RT PCRs Done
20,523,450 UART: [art] Populate DV Done
20,529,182 UART: [fht] FMC Alias Private Key: 7
20,530,665 UART: [art] Derive CDI
20,531,424 UART: [art] Store in slot 0x4
20,586,511 UART: [art] Derive Key Pair
20,587,552 UART: [art] Store priv key in slot 0x5
23,049,904 UART: [art] Derive Key Pair - Done
23,062,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,775,571 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,080 UART: [art] PUB.X = 80B75B6EE2E1355EC145B95AB663999B3538E89694A46E3053FC9575801CBC2839FADF631B45BC015924454B3872E024
24,784,332 UART: [art] PUB.Y = 0AD15062C456C2A43928F708695391964544ABE452A862599DB7CA35B3F4A572949ACBB5096D4657410D322228059244
24,791,582 UART: [art] SIG.R = 31BD3CD5EF4550A6E102D4980B1608ECA283287A5E21A49E2F34605343245C37F5BF50294D9A77AAAC036FD94D1CD3EE
24,798,934 UART: [art] SIG.S = B35EB6ECAB019FDB99B2F1387BBF7FF823C4AA2E0FFC22C9677C8F392D6E661CECF71E40DFFB9755FFF76831B33F117C
25,777,852 UART: Caliptra RT
25,778,710 UART: [state] CFI Enabled
25,958,223 UART: [rt] RT listening for mailbox commands...
25,960,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,990,759 UART: [rt]cmd =0x44504543, len=96
30,364,651 >>> mbox cmd response data (6236 bytes)
30,393,772 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,424,055 UART: [rt]cmd =0x52564348, len=36
30,427,118 >>> mbox cmd response data (8 bytes)
30,427,570 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,457,479 UART: [rt]cmd =0x52564348, len=36
30,459,386 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,436,050 ready_for_fw is high
3,436,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,230,446 >>> mbox cmd response: success
18,513,679 UART:
18,514,053 UART: Running Caliptra FMC ...
18,515,170 UART:
18,515,319 UART: [state] CFI Enabled
18,580,079 UART: [fht] FMC Alias Private Key: 7
20,346,297 UART: [art] Extend RT PCRs Done
20,347,525 UART: [art] Lock RT PCRs Done
20,349,213 UART: [art] Populate DV Done
20,354,530 UART: [fht] FMC Alias Private Key: 7
20,356,177 UART: [art] Derive CDI
20,356,994 UART: [art] Store in slot 0x4
20,412,734 UART: [art] Derive Key Pair
20,413,732 UART: [art] Store priv key in slot 0x5
22,877,120 UART: [art] Derive Key Pair - Done
22,890,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,601,751 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,258 UART: [art] PUB.X = E2911642384F56193C4FBC01845E2852CE429E5963E54588FB193BA3E659F068942182EA5401004FB981FC7F0BA7C0EF
24,610,466 UART: [art] PUB.Y = 0AF847BF00D94C97109C6C6F2040A271880645E6044F4EA6CC739F6F5D1DE57150F3D2985F8C5052D37F7D2CBE0AEAD8
24,617,715 UART: [art] SIG.R = FAD79C1144B08F05A4C60173142149904F987F799E94363677482B25776560E772C6C221ABED9C82F3EB6218E1D46347
24,625,063 UART: [art] SIG.S = 276C1492DCC77AFE71C45BD17A5FB0B4AB73A56C4F762CD4CA61A0A78AE0AA43CDAC9F35177CBD473D5F805A08240F7C
25,604,382 UART: Caliptra RT
25,605,083 UART: [state] CFI Enabled
25,784,084 UART: [rt] RT listening for mailbox commands...
25,786,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,816,549 UART: [rt]cmd =0x44504543, len=96
30,193,138 >>> mbox cmd response data (6236 bytes)
30,222,254 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,252,369 UART: [rt]cmd =0x52564348, len=36
30,255,396 >>> mbox cmd response data (8 bytes)
30,255,830 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,286,089 UART: [rt]cmd =0x52564348, len=36
30,288,102 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,560 UART:
192,944 UART: Running Caliptra ROM ...
194,125 UART:
603,660 UART: [state] CFI Enabled
617,979 UART: [state] LifecycleState = Unprovisioned
619,926 UART: [state] DebugLocked = No
621,783 UART: [state] WD Timer not started. Device not locked for debugging
626,546 UART: [kat] SHA2-256
806,193 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,999 UART: [kat] ++
817,486 UART: [kat] sha1
829,074 UART: [kat] SHA2-256
831,802 UART: [kat] SHA2-384
836,659 UART: [kat] SHA2-512-ACC
839,027 UART: [kat] ECC-384
3,281,347 UART: [kat] HMAC-384Kdf
3,293,297 UART: [kat] LMS
3,769,800 UART: [kat] --
3,775,890 UART: [cold-reset] ++
3,778,247 UART: [fht] FHT @ 0x50003400
3,789,077 UART: [idev] ++
3,789,654 UART: [idev] CDI.KEYID = 6
3,790,607 UART: [idev] SUBJECT.KEYID = 7
3,791,852 UART: [idev] UDS.KEYID = 0
3,792,781 ready_for_fw is high
3,792,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,899 UART: [idev] Erasing UDS.KEYID = 0
6,269,342 UART: [idev] Sha1 KeyId Algorithm
6,292,570 UART: [idev] --
6,297,326 UART: [ldev] ++
6,297,896 UART: [ldev] CDI.KEYID = 6
6,298,838 UART: [ldev] SUBJECT.KEYID = 5
6,300,053 UART: [ldev] AUTHORITY.KEYID = 7
6,301,313 UART: [ldev] FE.KEYID = 1
6,309,830 UART: [ldev] Erasing FE.KEYID = 1
8,795,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,212 UART: [ldev] --
10,588,161 UART: [fwproc] Wait for Commands...
10,591,009 UART: [fwproc] Recv command 0x46574c44
10,593,001 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,922 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,557,529 >>> mbox cmd response: success
14,562,478 UART: [afmc] ++
14,563,116 UART: [afmc] CDI.KEYID = 6
14,564,004 UART: [afmc] SUBJECT.KEYID = 7
14,565,230 UART: [afmc] AUTHORITY.KEYID = 5
17,068,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,370 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,203 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,244 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,822 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,867,167 UART: [afmc] --
18,870,494 UART: [cold-reset] --
18,873,171 UART: [state] Locking Datavault
18,877,878 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,615 UART: [state] Locking ICCM
18,881,074 UART: [exit] Launching FMC @ 0x40000130
18,889,481 UART:
18,889,747 UART: Running Caliptra FMC ...
18,890,854 UART:
18,891,016 UART: [state] CFI Enabled
18,899,070 UART: [fht] FMC Alias Private Key: 7
20,664,947 UART: [art] Extend RT PCRs Done
20,666,165 UART: [art] Lock RT PCRs Done
20,667,848 UART: [art] Populate DV Done
20,673,152 UART: [fht] FMC Alias Private Key: 7
20,674,688 UART: [art] Derive CDI
20,675,426 UART: [art] Store in slot 0x4
20,717,963 UART: [art] Derive Key Pair
20,719,005 UART: [art] Store priv key in slot 0x5
23,145,557 UART: [art] Derive Key Pair - Done
23,158,711 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,981 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,478 UART: [art] PUB.X = 9BB0A2F588B896945347A08D51B7FF0B4A73A5D40179595FB212C8BECA91523DC2502DBAFB4B8906B370B88F63A0372C
24,873,741 UART: [art] PUB.Y = 73219D057B2337E47CD4B4BE83E44358A1E1B990B5E3CE273E251271392C02A2969BBBA53EFE5D454A91D41C5A5FA430
24,880,991 UART: [art] SIG.R = 6FE6A9393D191B98E600F2CEE029A5365D2FCA8A6A91ACF80CB640610BE8E8346B6985207A15D83E79706F0D1F090665
24,888,349 UART: [art] SIG.S = 81577D0BA0E6091CCC2750C4041939418681823BB53E17B53C1ABE50E7D9500913A6DEC2A452F8030D881AF24945AC67
25,867,584 UART: Caliptra RT
25,868,267 UART: [state] CFI Enabled
26,001,000 UART: [rt] RT listening for mailbox commands...
26,002,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,033,683 UART: [rt]cmd =0x44504543, len=96
30,328,205 >>> mbox cmd response data (6236 bytes)
30,357,362 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,387,422 UART: [rt]cmd =0x52564348, len=36
30,390,830 >>> mbox cmd response data (8 bytes)
30,391,269 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,421,098 UART: [rt]cmd =0x52564348, len=36
30,423,328 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,779,503 ready_for_fw is high
3,779,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,827 >>> mbox cmd response: success
18,697,581 UART:
18,697,987 UART: Running Caliptra FMC ...
18,699,134 UART:
18,699,299 UART: [state] CFI Enabled
18,707,573 UART: [fht] FMC Alias Private Key: 7
20,473,540 UART: [art] Extend RT PCRs Done
20,474,770 UART: [art] Lock RT PCRs Done
20,476,565 UART: [art] Populate DV Done
20,481,936 UART: [fht] FMC Alias Private Key: 7
20,483,594 UART: [art] Derive CDI
20,484,413 UART: [art] Store in slot 0x4
20,526,846 UART: [art] Derive Key Pair
20,527,850 UART: [art] Store priv key in slot 0x5
22,954,823 UART: [art] Derive Key Pair - Done
22,967,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,931 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,430 UART: [art] PUB.X = 07D32ED947B3A0AE64BF2596501C95D92E13855AB450C5A2312D68CE58EE7D4B6BA206A139EF1A48E34658BDB35E698E
24,682,683 UART: [art] PUB.Y = 1BBEED339EA9BF333B1C8FCBA2550871616AAFF2C4508A148C879DC92831C921EC8875E539802FC188EA30F697FB879A
24,689,941 UART: [art] SIG.R = 7CFD2DCA13AFE9F65D73743C23C33ADEEE55EC23047C3B6E49E7BD4F72D6E42A9506FCD5C4FF6811E75672DD04764149
24,697,406 UART: [art] SIG.S = 0F6042B2AF8CE25E22AF538240E59BD610A96237DCBC57B6ACAC1CA1019B1E9DDCD971A236951B9F4F07C1DF3EFD384D
25,677,024 UART: Caliptra RT
25,677,753 UART: [state] CFI Enabled
25,811,422 UART: [rt] RT listening for mailbox commands...
25,813,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,844,088 UART: [rt]cmd =0x44504543, len=96
30,139,297 >>> mbox cmd response data (6236 bytes)
30,168,664 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,198,625 UART: [rt]cmd =0x52564348, len=36
30,201,657 >>> mbox cmd response data (8 bytes)
30,202,077 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,231,918 UART: [rt]cmd =0x52564348, len=36
30,233,979 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,213 UART:
192,571 UART: Running Caliptra ROM ...
193,772 UART:
193,929 UART: [state] CFI Enabled
263,185 UART: [state] LifecycleState = Unprovisioned
265,616 UART: [state] DebugLocked = No
268,367 UART: [state] WD Timer not started. Device not locked for debugging
272,116 UART: [kat] SHA2-256
461,792 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,612 UART: [kat] ++
473,089 UART: [kat] sha1
483,925 UART: [kat] SHA2-256
486,906 UART: [kat] SHA2-384
493,055 UART: [kat] SHA2-512-ACC
495,641 UART: [kat] ECC-384
2,948,517 UART: [kat] HMAC-384Kdf
2,973,342 UART: [kat] LMS
3,505,114 UART: [kat] --
3,510,310 UART: [cold-reset] ++
3,512,589 UART: [fht] FHT @ 0x50003400
3,524,425 UART: [idev] ++
3,525,188 UART: [idev] CDI.KEYID = 6
3,526,075 UART: [idev] SUBJECT.KEYID = 7
3,527,317 UART: [idev] UDS.KEYID = 0
3,528,215 ready_for_fw is high
3,528,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,299 UART: [idev] Erasing UDS.KEYID = 0
6,029,233 UART: [idev] Sha1 KeyId Algorithm
6,052,030 UART: [idev] --
6,057,058 UART: [ldev] ++
6,057,736 UART: [ldev] CDI.KEYID = 6
6,058,618 UART: [ldev] SUBJECT.KEYID = 5
6,059,824 UART: [ldev] AUTHORITY.KEYID = 7
6,061,051 UART: [ldev] FE.KEYID = 1
6,100,923 UART: [ldev] Erasing FE.KEYID = 1
8,607,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,983 UART: [ldev] --
10,416,480 UART: [fwproc] Wait for Commands...
10,418,625 UART: [fwproc] Recv command 0x46574c44
10,420,874 UART: [fwproc] Recv'd Img size: 118548 bytes
13,920,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,987 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,586 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,144 >>> mbox cmd response: success
14,684,440 UART: [afmc] ++
14,685,173 UART: [afmc] CDI.KEYID = 6
14,686,369 UART: [afmc] SUBJECT.KEYID = 7
14,687,803 UART: [afmc] AUTHORITY.KEYID = 5
17,216,461 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,693 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,790 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,933 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,827 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,645 UART: [afmc] --
19,013,354 UART: [cold-reset] --
19,017,707 UART: [state] Locking Datavault
19,024,422 UART: [state] Locking PCR0, PCR1 and PCR31
19,026,578 UART: [state] Locking ICCM
19,028,897 UART: [exit] Launching FMC @ 0x40000130
19,037,580 UART:
19,037,817 UART: Running Caliptra FMC ...
19,039,036 UART:
19,039,198 UART: [state] CFI Enabled
19,096,548 UART: [fht] FMC Alias Private Key: 7
20,863,120 UART: [art] Extend RT PCRs Done
20,864,338 UART: [art] Lock RT PCRs Done
20,866,362 UART: [art] Populate DV Done
20,871,766 UART: [fht] FMC Alias Private Key: 7
20,873,360 UART: [art] Derive CDI
20,874,170 UART: [art] Store in slot 0x4
20,929,631 UART: [art] Derive Key Pair
20,930,666 UART: [art] Store priv key in slot 0x5
23,393,525 UART: [art] Derive Key Pair - Done
23,406,620 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,531 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,031 UART: [art] PUB.X = 04B85EEDD35A6A88FFEDCCCE6D2625B049330771EC8690810C7B3410742AA7265A1B6E5E2B17B45FD91FFBA3BDFD0894
25,128,254 UART: [art] PUB.Y = B680736A79997933A0B03F16E28C88F305E4E08872FA68CC8D16FDBDBAEB1E13FC9D4F51EA29FB2800BFBA4D20E68D5A
25,135,560 UART: [art] SIG.R = 2644A3A795822D8C847919D736CF2650E90FD862305C9D104D7345E2E937F0F74085540CE0F8AB01D50A0F73F62CED13
25,142,927 UART: [art] SIG.S = 8622A8C0715AF533F3B6AA31E5D29A400E992B1FD6467390734BD7643D68713B898F6EF29648B7D31FE2F3718680E6BD
26,122,273 UART: Caliptra RT
26,122,983 UART: [state] CFI Enabled
26,303,159 UART: [rt] RT listening for mailbox commands...
26,305,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,335,838 UART: [rt]cmd =0x44504543, len=96
30,710,805 >>> mbox cmd response data (6236 bytes)
30,740,057 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,770,182 UART: [rt]cmd =0x52564348, len=36
30,773,216 >>> mbox cmd response data (8 bytes)
30,773,596 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,803,634 UART: [rt]cmd =0x52564348, len=36
30,805,857 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,437,609 ready_for_fw is high
3,438,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,827,373 >>> mbox cmd response: success
19,107,342 UART:
19,107,742 UART: Running Caliptra FMC ...
19,108,852 UART:
19,109,009 UART: [state] CFI Enabled
19,180,282 UART: [fht] FMC Alias Private Key: 7
20,946,418 UART: [art] Extend RT PCRs Done
20,947,639 UART: [art] Lock RT PCRs Done
20,949,126 UART: [art] Populate DV Done
20,954,605 UART: [fht] FMC Alias Private Key: 7
20,956,149 UART: [art] Derive CDI
20,956,910 UART: [art] Store in slot 0x4
21,012,987 UART: [art] Derive Key Pair
21,014,026 UART: [art] Store priv key in slot 0x5
23,477,114 UART: [art] Derive Key Pair - Done
23,490,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,952 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,460 UART: [art] PUB.X = 977F3182CC14F47078928DBAF708639EB69A1A911ADCE77E872678FFAF42C1CB32CD2843347891492C2604ACE95A2466
25,211,677 UART: [art] PUB.Y = A4271763E3D7467910C0E81C8F8902722143EA1390BAF415A4E65BFB53B68CD9213E5C6845E0BF35F1A9C51BDEDF5122
25,218,944 UART: [art] SIG.R = 848CC3776A3600F87E65DE16DD8E62CA172877B0F926D9C5B12CBEA76B167BC3346807AD6470AFF087861591E13E03F7
25,226,312 UART: [art] SIG.S = AAFE7A86080E17245FEE139EC90E7C1B57AEE5D8AE83EC2B8C2960902DD7EFA62FE1D9F53975CDC21576909D0D4075DB
26,205,731 UART: Caliptra RT
26,206,427 UART: [state] CFI Enabled
26,386,983 UART: [rt] RT listening for mailbox commands...
26,388,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,419,346 UART: [rt]cmd =0x44504543, len=96
30,795,382 >>> mbox cmd response data (6236 bytes)
30,824,510 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,854,586 UART: [rt]cmd =0x52564348, len=36
30,857,868 >>> mbox cmd response data (8 bytes)
30,858,297 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,888,363 UART: [rt]cmd =0x52564348, len=36
30,890,334 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
192,306 UART:
192,675 UART: Running Caliptra ROM ...
193,862 UART:
603,351 UART: [state] CFI Enabled
617,381 UART: [state] LifecycleState = Unprovisioned
619,760 UART: [state] DebugLocked = No
622,283 UART: [state] WD Timer not started. Device not locked for debugging
626,483 UART: [kat] SHA2-256
816,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,136 UART: [kat] ++
827,660 UART: [kat] sha1
839,321 UART: [kat] SHA2-256
842,329 UART: [kat] SHA2-384
848,887 UART: [kat] SHA2-512-ACC
851,479 UART: [kat] ECC-384
3,293,461 UART: [kat] HMAC-384Kdf
3,306,762 UART: [kat] LMS
3,838,587 UART: [kat] --
3,843,873 UART: [cold-reset] ++
3,845,902 UART: [fht] FHT @ 0x50003400
3,858,304 UART: [idev] ++
3,859,013 UART: [idev] CDI.KEYID = 6
3,859,932 UART: [idev] SUBJECT.KEYID = 7
3,861,180 UART: [idev] UDS.KEYID = 0
3,862,105 ready_for_fw is high
3,862,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,157 UART: [idev] Erasing UDS.KEYID = 0
6,334,369 UART: [idev] Sha1 KeyId Algorithm
6,355,989 UART: [idev] --
6,360,741 UART: [ldev] ++
6,361,421 UART: [ldev] CDI.KEYID = 6
6,362,305 UART: [ldev] SUBJECT.KEYID = 5
6,363,518 UART: [ldev] AUTHORITY.KEYID = 7
6,364,752 UART: [ldev] FE.KEYID = 1
6,376,959 UART: [ldev] Erasing FE.KEYID = 1
8,856,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,753 UART: [ldev] --
10,648,848 UART: [fwproc] Wait for Commands...
10,650,460 UART: [fwproc] Recv command 0x46574c44
10,652,718 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,026 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,586 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,627 >>> mbox cmd response: success
14,920,286 UART: [afmc] ++
14,921,020 UART: [afmc] CDI.KEYID = 6
14,922,173 UART: [afmc] SUBJECT.KEYID = 7
14,923,695 UART: [afmc] AUTHORITY.KEYID = 5
17,432,033 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,157,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,159,084 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,174,137 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,189,331 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,204,230 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,227,881 UART: [afmc] --
19,230,614 UART: [cold-reset] --
19,234,217 UART: [state] Locking Datavault
19,239,375 UART: [state] Locking PCR0, PCR1 and PCR31
19,241,543 UART: [state] Locking ICCM
19,244,081 UART: [exit] Launching FMC @ 0x40000130
19,252,721 UART:
19,252,958 UART: Running Caliptra FMC ...
19,254,062 UART:
19,254,260 UART: [state] CFI Enabled
19,262,480 UART: [fht] FMC Alias Private Key: 7
21,028,952 UART: [art] Extend RT PCRs Done
21,030,168 UART: [art] Lock RT PCRs Done
21,032,177 UART: [art] Populate DV Done
21,037,632 UART: [fht] FMC Alias Private Key: 7
21,039,239 UART: [art] Derive CDI
21,040,058 UART: [art] Store in slot 0x4
21,083,201 UART: [art] Derive Key Pair
21,084,203 UART: [art] Store priv key in slot 0x5
23,511,412 UART: [art] Derive Key Pair - Done
23,524,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,230,231 UART: [art] Erasing AUTHORITY.KEYID = 7
25,231,740 UART: [art] PUB.X = 141AD48996D0443602C4211B7E48087CA1A2A49300808585A8A8496E0F7C3D67E2B9B840994B6EA5AB6DB438CFAA72D5
25,238,959 UART: [art] PUB.Y = 5F8E10D6F1D0705D63F2605617C3E63DD60A3F106E2B06DAE590EB42BF0D1957302591B135059EAA1A9D010F0506D2C3
25,246,217 UART: [art] SIG.R = 15C3C5E2A7066F4A375DE0904A1DC5287939D32A278C94939DA8DC02838F562020F2B23022BA8FC7D4044A3D129091A7
25,253,604 UART: [art] SIG.S = EB1AE1769ADA9C0602864F091816B7C40919189A8B3E2A1C1E03C03D15F5DB2FA66D9E13FC7B1414172A4DE82BB36E74
26,232,139 UART: Caliptra RT
26,232,825 UART: [state] CFI Enabled
26,364,795 UART: [rt] RT listening for mailbox commands...
26,366,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,397,435 UART: [rt]cmd =0x44504543, len=96
30,692,592 >>> mbox cmd response data (6236 bytes)
30,721,886 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,752,010 UART: [rt]cmd =0x52564348, len=36
30,754,994 >>> mbox cmd response data (8 bytes)
30,755,428 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,785,290 UART: [rt]cmd =0x52564348, len=36
30,787,370 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,753,871 ready_for_fw is high
3,754,357 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,033,899 >>> mbox cmd response: success
19,288,206 UART:
19,288,608 UART: Running Caliptra FMC ...
19,289,772 UART:
19,289,942 UART: [state] CFI Enabled
19,297,799 UART: [fht] FMC Alias Private Key: 7
21,063,624 UART: [art] Extend RT PCRs Done
21,064,843 UART: [art] Lock RT PCRs Done
21,066,749 UART: [art] Populate DV Done
21,072,348 UART: [fht] FMC Alias Private Key: 7
21,073,793 UART: [art] Derive CDI
21,074,719 UART: [art] Store in slot 0x4
21,117,328 UART: [art] Derive Key Pair
21,118,326 UART: [art] Store priv key in slot 0x5
23,545,611 UART: [art] Derive Key Pair - Done
23,558,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,265,353 UART: [art] Erasing AUTHORITY.KEYID = 7
25,266,847 UART: [art] PUB.X = 55654061D387B3597378888395C1D27AA6B8B1AAF14A0348CA7F72D714CA93731E38889BA166C36E816E7AB5C1890A96
25,274,066 UART: [art] PUB.Y = 2397BCD31C77E893F79E88875DCCD9C1FE7471D5159F89EDFAB3AC7D7192DE4A82EA92879B3D6622CDB19966CCC0DB25
25,281,331 UART: [art] SIG.R = EEE50DC451EA391D12A0A2AEC63CA092ED8D58369AC4A09F85C8333C364E26378750C15B449B5F1C422DB13C249DBC9F
25,288,790 UART: [art] SIG.S = 801B2723874365955BE7073A1412F93F8C0E0A4564E561C02CBE74CC7E7B5E7CF711898C9DE1F94C930B352C939EB612
26,267,087 UART: Caliptra RT
26,267,802 UART: [state] CFI Enabled
26,400,149 UART: [rt] RT listening for mailbox commands...
26,402,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,432,781 UART: [rt]cmd =0x44504543, len=96
30,728,352 >>> mbox cmd response data (6236 bytes)
30,757,554 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,788,044 UART: [rt]cmd =0x52564348, len=36
30,790,706 >>> mbox cmd response data (8 bytes)
30,791,045 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,821,141 UART: [rt]cmd =0x52564348, len=36
30,823,113 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,147 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,855 UART: [kat] SHA2-256
881,786 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,901 UART: [kat] ++
886,053 UART: [kat] sha1
890,123 UART: [kat] SHA2-256
892,061 UART: [kat] SHA2-384
894,922 UART: [kat] SHA2-512-ACC
896,823 UART: [kat] ECC-384
902,604 UART: [kat] HMAC-384Kdf
907,166 UART: [kat] LMS
1,475,362 UART: [kat] --
1,476,145 UART: [cold-reset] ++
1,476,533 UART: [fht] Storing FHT @ 0x50003400
1,479,342 UART: [idev] ++
1,479,510 UART: [idev] CDI.KEYID = 6
1,479,870 UART: [idev] SUBJECT.KEYID = 7
1,480,294 UART: [idev] UDS.KEYID = 0
1,480,639 ready_for_fw is high
1,480,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,248 UART: [idev] Erasing UDS.KEYID = 0
1,504,444 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,182 UART: [idev] --
1,514,335 UART: [ldev] ++
1,514,503 UART: [ldev] CDI.KEYID = 6
1,514,866 UART: [ldev] SUBJECT.KEYID = 5
1,515,292 UART: [ldev] AUTHORITY.KEYID = 7
1,515,755 UART: [ldev] FE.KEYID = 1
1,520,799 UART: [ldev] Erasing FE.KEYID = 1
1,545,680 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,680 UART: [ldev] --
1,585,037 UART: [fwproc] Waiting for Commands...
1,585,696 UART: [fwproc] Received command 0x46574c44
1,586,487 UART: [fwproc] Received Image of size 118548 bytes
2,931,563 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,195 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,413 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,642 >>> mbox cmd response: success
3,131,658 UART: [afmc] ++
3,131,826 UART: [afmc] CDI.KEYID = 6
3,132,188 UART: [afmc] SUBJECT.KEYID = 7
3,132,613 UART: [afmc] AUTHORITY.KEYID = 5
3,167,610 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,160 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,940 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,649 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,532 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,215 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,121 UART: [afmc] --
3,211,157 UART: [cold-reset] --
3,211,877 UART: [state] Locking Datavault
3,213,262 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,866 UART: [state] Locking ICCM
3,214,344 UART: [exit] Launching FMC @ 0x40000130
3,219,674 UART:
3,219,690 UART: Running Caliptra FMC ...
3,220,098 UART:
3,220,152 UART: [state] CFI Enabled
3,230,840 UART: [fht] FMC Alias Private Key: 7
3,349,766 UART: [art] Extend RT PCRs Done
3,350,194 UART: [art] Lock RT PCRs Done
3,351,774 UART: [art] Populate DV Done
3,360,205 UART: [fht] FMC Alias Private Key: 7
3,361,187 UART: [art] Derive CDI
3,361,467 UART: [art] Store in slot 0x4
3,447,199 UART: [art] Derive Key Pair
3,447,559 UART: [art] Store priv key in slot 0x5
3,460,650 UART: [art] Derive Key Pair - Done
3,475,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,376 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,141 UART: [art] PUB.X = ECF5068AB49B16DFAE4A2924BB973216E2AEABF5EBCE68BBBA682D27983933AE82DF5C5A345FE0E3689F54B284277EF2
3,498,928 UART: [art] PUB.Y = A8FC7FE22AE3A5FEDA986462934DF9AE007FD8FEBB5FB8452CBAFCF0B34E9668FFE7D293A5ABA27086A3D5E41B248CCD
3,505,888 UART: [art] SIG.R = B251829C7E8ECE2C0CBA19E7ACFA56FA5FE3B4C743785F11524007B6ADDD7C365F7475915ACEE6B4A2F43E2F7E01DBB3
3,512,671 UART: [art] SIG.S = 984A5E91CECE4B7BA0A3E80BF5909D3F1C619E769F93D2D7C2D49914643FA70D9796F5B59A64517D69846F15CC8F7388
3,536,637 UART: Caliptra RT
3,536,888 UART: [state] CFI Enabled
3,657,045 UART: [rt] RT listening for mailbox commands...
3,657,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,143 UART: [rt]cmd =0x44504543, len=96
3,881,520 >>> mbox cmd response data (6236 bytes)
3,881,521 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,911,096 UART: [rt]cmd =0x52564348, len=36
3,913,482 >>> mbox cmd response data (8 bytes)
3,913,483 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,176 UART: [rt]cmd =0x52564348, len=36
3,944,719 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,593 ready_for_fw is high
1,362,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,330 >>> mbox cmd response: success
3,042,705 UART:
3,042,721 UART: Running Caliptra FMC ...
3,043,129 UART:
3,043,183 UART: [state] CFI Enabled
3,053,937 UART: [fht] FMC Alias Private Key: 7
3,173,675 UART: [art] Extend RT PCRs Done
3,174,103 UART: [art] Lock RT PCRs Done
3,175,893 UART: [art] Populate DV Done
3,184,166 UART: [fht] FMC Alias Private Key: 7
3,185,282 UART: [art] Derive CDI
3,185,562 UART: [art] Store in slot 0x4
3,271,498 UART: [art] Derive Key Pair
3,271,858 UART: [art] Store priv key in slot 0x5
3,285,615 UART: [art] Derive Key Pair - Done
3,300,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,830 UART: [art] PUB.X = 29601F5A312FB792D7965E56B87DB86080D6306C260AAF8DFDFAC3C8442304E53E257B8E508A86FC299B12B01B22F2B8
3,323,598 UART: [art] PUB.Y = D3EECBAC80049BB2D980DCCAA4DE445C52103D92FC4743FD86B12F0C8DC55CBEAC4782CAD71B5D50CD2CEA5C3807B110
3,330,567 UART: [art] SIG.R = 0BB2BAB6B554422E54E36EF8EAD7A594D4B5F12EE4B4CF3048A23194C217DDA59EB198C848C30B7ED59F5F575D2DAAA6
3,337,351 UART: [art] SIG.S = 89731051BFF7CC2041600200A168D9AFF84A38B09BB9497EFA23D6ABC8901955CD99C85264AC45BECCF80AA2385562F3
3,360,995 UART: Caliptra RT
3,361,246 UART: [state] CFI Enabled
3,480,760 UART: [rt] RT listening for mailbox commands...
3,481,430 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,212 UART: [rt]cmd =0x44504543, len=96
3,703,498 >>> mbox cmd response data (6236 bytes)
3,703,499 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,733,224 UART: [rt]cmd =0x52564348, len=36
3,735,680 >>> mbox cmd response data (8 bytes)
3,735,681 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,765,074 UART: [rt]cmd =0x52564348, len=36
3,766,697 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,376 UART: [kat] SHA2-256
882,307 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,422 UART: [kat] ++
886,574 UART: [kat] sha1
890,798 UART: [kat] SHA2-256
892,736 UART: [kat] SHA2-384
895,479 UART: [kat] SHA2-512-ACC
897,380 UART: [kat] ECC-384
903,135 UART: [kat] HMAC-384Kdf
907,917 UART: [kat] LMS
1,476,113 UART: [kat] --
1,477,000 UART: [cold-reset] ++
1,477,402 UART: [fht] Storing FHT @ 0x50003400
1,480,159 UART: [idev] ++
1,480,327 UART: [idev] CDI.KEYID = 6
1,480,687 UART: [idev] SUBJECT.KEYID = 7
1,481,111 UART: [idev] UDS.KEYID = 0
1,481,456 ready_for_fw is high
1,481,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,347 UART: [idev] Erasing UDS.KEYID = 0
1,506,313 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,029 UART: [idev] --
1,516,076 UART: [ldev] ++
1,516,244 UART: [ldev] CDI.KEYID = 6
1,516,607 UART: [ldev] SUBJECT.KEYID = 5
1,517,033 UART: [ldev] AUTHORITY.KEYID = 7
1,517,496 UART: [ldev] FE.KEYID = 1
1,522,684 UART: [ldev] Erasing FE.KEYID = 1
1,548,411 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,855 UART: [ldev] --
1,587,242 UART: [fwproc] Waiting for Commands...
1,588,041 UART: [fwproc] Received command 0x46574c44
1,588,832 UART: [fwproc] Received Image of size 118548 bytes
2,933,866 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,526 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,744 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,001 >>> mbox cmd response: success
3,134,215 UART: [afmc] ++
3,134,383 UART: [afmc] CDI.KEYID = 6
3,134,745 UART: [afmc] SUBJECT.KEYID = 7
3,135,170 UART: [afmc] AUTHORITY.KEYID = 5
3,169,941 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,925 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,705 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,414 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,297 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,980 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,904 UART: [afmc] --
3,212,858 UART: [cold-reset] --
3,213,824 UART: [state] Locking Datavault
3,215,375 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,979 UART: [state] Locking ICCM
3,216,541 UART: [exit] Launching FMC @ 0x40000130
3,221,871 UART:
3,221,887 UART: Running Caliptra FMC ...
3,222,295 UART:
3,222,438 UART: [state] CFI Enabled
3,233,080 UART: [fht] FMC Alias Private Key: 7
3,351,656 UART: [art] Extend RT PCRs Done
3,352,084 UART: [art] Lock RT PCRs Done
3,353,472 UART: [art] Populate DV Done
3,361,423 UART: [fht] FMC Alias Private Key: 7
3,362,385 UART: [art] Derive CDI
3,362,665 UART: [art] Store in slot 0x4
3,448,491 UART: [art] Derive Key Pair
3,448,851 UART: [art] Store priv key in slot 0x5
3,462,466 UART: [art] Derive Key Pair - Done
3,477,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,299 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,064 UART: [art] PUB.X = FB2E0E388BF0F1808D0583498C5D73BEDE25FABFEAD455EC3D6BA5526F329E5D74F95670A29EE8826C7A7B02E825EC34
3,500,841 UART: [art] PUB.Y = D9D18075738B14B7A16BDC3F014C0F92A19AAE35574AC80C664D5EFCBCE4363AAB31B2281D5878387D1445C0D98F094C
3,507,787 UART: [art] SIG.R = C8E38733D39B0D92300B05165DBF013B273896B1700F2B98606DB83146153C4F71217ADA296517B8C8BAB5BD8284F55F
3,514,538 UART: [art] SIG.S = B8E2355213D3D8878D24FB7636F25E571F211803B50BEE239BBB3313EC3BAE7EB2C55945442ACDB7C8EDAFA85FFAD015
3,538,472 UART: Caliptra RT
3,538,815 UART: [state] CFI Enabled
3,658,714 UART: [rt] RT listening for mailbox commands...
3,659,384 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,878 UART: [rt]cmd =0x44504543, len=96
3,881,363 >>> mbox cmd response data (6236 bytes)
3,881,364 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,953 UART: [rt]cmd =0x52564348, len=36
3,913,441 >>> mbox cmd response data (8 bytes)
3,913,442 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,913 UART: [rt]cmd =0x52564348, len=36
3,944,506 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,598 ready_for_fw is high
1,362,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,541 >>> mbox cmd response: success
3,044,250 UART:
3,044,266 UART: Running Caliptra FMC ...
3,044,674 UART:
3,044,817 UART: [state] CFI Enabled
3,055,709 UART: [fht] FMC Alias Private Key: 7
3,174,865 UART: [art] Extend RT PCRs Done
3,175,293 UART: [art] Lock RT PCRs Done
3,176,495 UART: [art] Populate DV Done
3,184,636 UART: [fht] FMC Alias Private Key: 7
3,185,686 UART: [art] Derive CDI
3,185,966 UART: [art] Store in slot 0x4
3,271,632 UART: [art] Derive Key Pair
3,271,992 UART: [art] Store priv key in slot 0x5
3,285,783 UART: [art] Derive Key Pair - Done
3,300,826 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,268 UART: [art] PUB.X = 0C77714B61EAA2E649D2484562E70F1B167AC9B0BE2FEE216F7271367970AB148E33E3E405D2CEF31A6C99E70D1628EE
3,324,032 UART: [art] PUB.Y = A794E6098DAF5D0328ACB4FFAFA67CC10238C1379642FE368EB6C5E88F064996BF7E0BD920302B6A56C133B64B1791B5
3,330,975 UART: [art] SIG.R = DF313DE45CB1C486E7005239432B2FCBC95777107298B8BBD54D616F6A155EFEA391528AD3BFE22662758B02A23A76AD
3,337,726 UART: [art] SIG.S = A36BCFC5FFDCD358A29B1330E43A24E17A4B1196779C20C54C6445465538D42461534AE772EE6FDF332D6FCC1EF8D57A
3,361,414 UART: Caliptra RT
3,361,757 UART: [state] CFI Enabled
3,482,478 UART: [rt] RT listening for mailbox commands...
3,483,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,734 UART: [rt]cmd =0x44504543, len=96
3,704,788 >>> mbox cmd response data (6236 bytes)
3,704,789 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,734,378 UART: [rt]cmd =0x52564348, len=36
3,736,536 >>> mbox cmd response data (8 bytes)
3,736,537 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,766,124 UART: [rt]cmd =0x52564348, len=36
3,767,741 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
891,422 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,115 UART: [kat] HMAC-384Kdf
920,701 UART: [kat] LMS
1,169,013 UART: [kat] --
1,170,192 UART: [cold-reset] ++
1,170,538 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,174,512 ready_for_fw is high
1,174,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,315 UART: [idev] Erasing UDS.KEYID = 0
1,199,391 UART: [idev] Sha1 KeyId Algorithm
1,208,257 UART: [idev] --
1,209,272 UART: [ldev] ++
1,209,440 UART: [ldev] CDI.KEYID = 6
1,209,804 UART: [ldev] SUBJECT.KEYID = 5
1,210,231 UART: [ldev] AUTHORITY.KEYID = 7
1,210,694 UART: [ldev] FE.KEYID = 1
1,216,010 UART: [ldev] Erasing FE.KEYID = 1
1,242,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,816 UART: [ldev] --
1,281,199 UART: [fwproc] Wait for Commands...
1,281,866 UART: [fwproc] Recv command 0x46574c44
1,282,599 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,881 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,056 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,237 >>> mbox cmd response: success
2,826,471 UART: [afmc] ++
2,826,639 UART: [afmc] CDI.KEYID = 6
2,827,002 UART: [afmc] SUBJECT.KEYID = 7
2,827,428 UART: [afmc] AUTHORITY.KEYID = 5
2,862,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,113 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,823 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,704 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,405 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,156 UART: [afmc] --
2,906,053 UART: [cold-reset] --
2,906,911 UART: [state] Locking Datavault
2,908,464 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,068 UART: [state] Locking ICCM
2,909,662 UART: [exit] Launching FMC @ 0x40000130
2,914,992 UART:
2,915,008 UART: Running Caliptra FMC ...
2,915,416 UART:
2,915,470 UART: [state] CFI Enabled
2,925,710 UART: [fht] FMC Alias Private Key: 7
3,044,740 UART: [art] Extend RT PCRs Done
3,045,168 UART: [art] Lock RT PCRs Done
3,047,212 UART: [art] Populate DV Done
3,055,357 UART: [fht] FMC Alias Private Key: 7
3,056,503 UART: [art] Derive CDI
3,056,783 UART: [art] Store in slot 0x4
3,142,580 UART: [art] Derive Key Pair
3,142,940 UART: [art] Store priv key in slot 0x5
3,156,256 UART: [art] Derive Key Pair - Done
3,170,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,819 UART: [art] PUB.X = 70BBF02AA3320642959D40FF7615A67FACC5D61619B14DFE498FF95D83448B3E4871B3699B7C4A946CFB88C2C5A8D072
3,194,592 UART: [art] PUB.Y = 4FF046F661CB5F4124B62F5AC37447FA6B92065FAF43A650C03B88C04D3370FA2D71ECF759A565316F9D7BAE06AD6313
3,201,544 UART: [art] SIG.R = 37818FDE87288F7A574FE571CD8FA4DC4CCAE4D91B6F0088055AC0730EEAD17AE01908B8BB3454F2C682018622EC78F6
3,208,290 UART: [art] SIG.S = 8819A9D1842B5A66368C39F796B8E1C94A0DF649178BA82448B0BB7853AFBA9C35C3AC3D4475A2CF5420FF6752F03190
3,232,135 UART: Caliptra RT
3,232,386 UART: [state] CFI Enabled
3,351,465 UART: [rt] RT listening for mailbox commands...
3,352,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,423 UART: [rt]cmd =0x44504543, len=96
3,573,851 >>> mbox cmd response data (6236 bytes)
3,573,852 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,379 UART: [rt]cmd =0x52564348, len=36
3,605,993 >>> mbox cmd response data (8 bytes)
3,605,994 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,807 UART: [rt]cmd =0x52564348, len=36
3,637,464 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,104 ready_for_fw is high
1,059,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,674 >>> mbox cmd response: success
2,740,543 UART:
2,740,559 UART: Running Caliptra FMC ...
2,740,967 UART:
2,741,021 UART: [state] CFI Enabled
2,751,651 UART: [fht] FMC Alias Private Key: 7
2,870,437 UART: [art] Extend RT PCRs Done
2,870,865 UART: [art] Lock RT PCRs Done
2,872,283 UART: [art] Populate DV Done
2,880,326 UART: [fht] FMC Alias Private Key: 7
2,881,396 UART: [art] Derive CDI
2,881,676 UART: [art] Store in slot 0x4
2,967,421 UART: [art] Derive Key Pair
2,967,781 UART: [art] Store priv key in slot 0x5
2,980,701 UART: [art] Derive Key Pair - Done
2,995,309 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,755 UART: [art] PUB.X = EE2837277294F9514914D79324F9A9A9FED652D94CA385C98F73970973F4AF18394E53221C97350A4396CF19404042C4
3,018,505 UART: [art] PUB.Y = 90C6FD0702BF470A52DA871F5FC031CFC88F6833F2ACB0056433C41B756163C6BB4374E39DD324DAE59FDB0CBE7CB517
3,025,454 UART: [art] SIG.R = EEC143C7FD723D1F28508C2B9855AA0BF51527BD5BE45CB31A416F45788936FD54DFCF8B4E4485BCD531862DD490B5B8
3,032,233 UART: [art] SIG.S = 6A1847A1DB95A91DF94DFD6AF9F9E65FD6A2CED245EE5740F42EEA6500DF3270A9046180296EEB0521392EFDD2E5BF40
3,055,977 UART: Caliptra RT
3,056,228 UART: [state] CFI Enabled
3,175,123 UART: [rt] RT listening for mailbox commands...
3,175,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,241 UART: [rt]cmd =0x44504543, len=96
3,398,173 >>> mbox cmd response data (6236 bytes)
3,398,174 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,427,561 UART: [rt]cmd =0x52564348, len=36
3,430,123 >>> mbox cmd response data (8 bytes)
3,430,124 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,459,543 UART: [rt]cmd =0x52564348, len=36
3,461,348 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,691 UART: [kat] ++
895,843 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,652 UART: [kat] SHA2-512-ACC
906,553 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,690 UART: [kat] LMS
1,169,002 UART: [kat] --
1,169,897 UART: [cold-reset] ++
1,170,289 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,174,249 ready_for_fw is high
1,174,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,882 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,228 UART: [idev] --
1,209,145 UART: [ldev] ++
1,209,313 UART: [ldev] CDI.KEYID = 6
1,209,677 UART: [ldev] SUBJECT.KEYID = 5
1,210,104 UART: [ldev] AUTHORITY.KEYID = 7
1,210,567 UART: [ldev] FE.KEYID = 1
1,215,733 UART: [ldev] Erasing FE.KEYID = 1
1,242,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,229 UART: [ldev] --
1,281,594 UART: [fwproc] Wait for Commands...
1,282,329 UART: [fwproc] Recv command 0x46574c44
1,283,062 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,136 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,311 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,482 >>> mbox cmd response: success
2,826,542 UART: [afmc] ++
2,826,710 UART: [afmc] CDI.KEYID = 6
2,827,073 UART: [afmc] SUBJECT.KEYID = 7
2,827,499 UART: [afmc] AUTHORITY.KEYID = 5
2,863,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,390 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,100 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,981 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,682 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,541 UART: [afmc] --
2,906,560 UART: [cold-reset] --
2,907,608 UART: [state] Locking Datavault
2,908,815 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,419 UART: [state] Locking ICCM
2,909,933 UART: [exit] Launching FMC @ 0x40000130
2,915,263 UART:
2,915,279 UART: Running Caliptra FMC ...
2,915,687 UART:
2,915,830 UART: [state] CFI Enabled
2,926,324 UART: [fht] FMC Alias Private Key: 7
3,045,814 UART: [art] Extend RT PCRs Done
3,046,242 UART: [art] Lock RT PCRs Done
3,047,660 UART: [art] Populate DV Done
3,055,913 UART: [fht] FMC Alias Private Key: 7
3,057,055 UART: [art] Derive CDI
3,057,335 UART: [art] Store in slot 0x4
3,143,508 UART: [art] Derive Key Pair
3,143,868 UART: [art] Store priv key in slot 0x5
3,157,322 UART: [art] Derive Key Pair - Done
3,171,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,301 UART: [art] PUB.X = 7ACFC7F349D4A2F1A38A8240FD40FC639F61660D13DF639A2484DAC4C71AF04D4C3D8FB320B79FC5D0E6D63EF6D829D5
3,195,086 UART: [art] PUB.Y = 2D13562FC040E4EB323EBCF84C52E04CE2CE5B1FF94E27C8BB757AF1F4CA746F150E58E9C73AED9ECAF527160AFE398D
3,202,054 UART: [art] SIG.R = F174065D7A35E17F8D3F74C181D0172C8358D6CC5F4F68EA69D25083DBFDE80B33001E01798F5FE7F7769AC48440EFCD
3,208,801 UART: [art] SIG.S = AAC5A480F1B87FBAEC76205DAA02CF134F3EA6C63843B08AB91BA2C4BB4C8409B18203CBACF85CCEFB754D6A0ACD785F
3,232,613 UART: Caliptra RT
3,232,956 UART: [state] CFI Enabled
3,353,280 UART: [rt] RT listening for mailbox commands...
3,353,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,400 UART: [rt]cmd =0x44504543, len=96
3,577,657 >>> mbox cmd response data (6236 bytes)
3,577,658 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,337 UART: [rt]cmd =0x52564348, len=36
3,609,687 >>> mbox cmd response data (8 bytes)
3,609,688 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,067 UART: [rt]cmd =0x52564348, len=36
3,640,872 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,899 ready_for_fw is high
1,058,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,079 >>> mbox cmd response: success
2,740,398 UART:
2,740,414 UART: Running Caliptra FMC ...
2,740,822 UART:
2,740,965 UART: [state] CFI Enabled
2,751,609 UART: [fht] FMC Alias Private Key: 7
2,870,263 UART: [art] Extend RT PCRs Done
2,870,691 UART: [art] Lock RT PCRs Done
2,872,007 UART: [art] Populate DV Done
2,880,410 UART: [fht] FMC Alias Private Key: 7
2,881,524 UART: [art] Derive CDI
2,881,804 UART: [art] Store in slot 0x4
2,968,053 UART: [art] Derive Key Pair
2,968,413 UART: [art] Store priv key in slot 0x5
2,981,593 UART: [art] Derive Key Pair - Done
2,996,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,973 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,738 UART: [art] PUB.X = 0F26AA267C8F8EAFE59A30DBC26722C932EB2165C1D9CE3FF752C68D1F6904A8598F142CBA96E189D186F29B28431873
3,019,508 UART: [art] PUB.Y = D009E7302C78DD06687528815094EEB46F3E9D27ACBF3EBF35E4493D755059EE1AB7539B866478DA49836CFEE85D15B2
3,026,456 UART: [art] SIG.R = CB3CC916EBBAA91DABA7E2079B61E799CD89A359A3C03D46B3EEA02A3096DDD65F8D80702C9DA178BF5D1EC444642C05
3,033,240 UART: [art] SIG.S = 02A1F12A38EDF590DC986FF6FBFFD128437CC634CD78D6ACADC4BEB389058792E4666E7CDF20A11AD804FCF0B1BAD4A6
3,057,627 UART: Caliptra RT
3,057,970 UART: [state] CFI Enabled
3,178,299 UART: [rt] RT listening for mailbox commands...
3,178,969 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,637 UART: [rt]cmd =0x44504543, len=96
3,401,960 >>> mbox cmd response data (6236 bytes)
3,401,961 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,834 UART: [rt]cmd =0x52564348, len=36
3,434,682 >>> mbox cmd response data (8 bytes)
3,434,683 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,464,084 UART: [rt]cmd =0x52564348, len=36
3,465,679 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,760 UART: [state] LifecycleState = Unprovisioned
86,415 UART: [state] DebugLocked = No
86,987 UART: [state] WD Timer not started. Device not locked for debugging
88,164 UART: [kat] SHA2-256
893,814 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,939 UART: [kat] ++
898,091 UART: [kat] sha1
902,153 UART: [kat] SHA2-256
904,093 UART: [kat] SHA2-384
906,796 UART: [kat] SHA2-512-ACC
908,697 UART: [kat] ECC-384
918,620 UART: [kat] HMAC-384Kdf
923,300 UART: [kat] LMS
1,171,628 UART: [kat] --
1,172,413 UART: [cold-reset] ++
1,172,959 UART: [fht] FHT @ 0x50003400
1,175,596 UART: [idev] ++
1,175,764 UART: [idev] CDI.KEYID = 6
1,176,124 UART: [idev] SUBJECT.KEYID = 7
1,176,548 UART: [idev] UDS.KEYID = 0
1,176,893 ready_for_fw is high
1,176,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,398 UART: [idev] Erasing UDS.KEYID = 0
1,201,135 UART: [idev] Sha1 KeyId Algorithm
1,209,805 UART: [idev] --
1,210,621 UART: [ldev] ++
1,210,789 UART: [ldev] CDI.KEYID = 6
1,211,152 UART: [ldev] SUBJECT.KEYID = 5
1,211,578 UART: [ldev] AUTHORITY.KEYID = 7
1,212,041 UART: [ldev] FE.KEYID = 1
1,217,217 UART: [ldev] Erasing FE.KEYID = 1
1,243,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,487 UART: [ldev] --
1,282,952 UART: [fwproc] Wait for Commands...
1,283,776 UART: [fwproc] Recv command 0x46574c44
1,284,504 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,888 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,058 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,297 >>> mbox cmd response: success
2,829,457 UART: [afmc] ++
2,829,625 UART: [afmc] CDI.KEYID = 6
2,829,987 UART: [afmc] SUBJECT.KEYID = 7
2,830,412 UART: [afmc] AUTHORITY.KEYID = 5
2,866,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,588 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,297 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,180 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,881 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,857 UART: [afmc] --
2,909,753 UART: [cold-reset] --
2,910,583 UART: [state] Locking Datavault
2,912,058 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,662 UART: [state] Locking ICCM
2,913,286 UART: [exit] Launching FMC @ 0x40000130
2,918,616 UART:
2,918,632 UART: Running Caliptra FMC ...
2,919,040 UART:
2,919,094 UART: [state] CFI Enabled
2,929,764 UART: [fht] FMC Alias Private Key: 7
3,048,626 UART: [art] Extend RT PCRs Done
3,049,054 UART: [art] Lock RT PCRs Done
3,050,226 UART: [art] Populate DV Done
3,058,639 UART: [fht] FMC Alias Private Key: 7
3,059,639 UART: [art] Derive CDI
3,059,919 UART: [art] Store in slot 0x4
3,145,372 UART: [art] Derive Key Pair
3,145,732 UART: [art] Store priv key in slot 0x5
3,158,508 UART: [art] Derive Key Pair - Done
3,173,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,194 UART: [art] PUB.X = 861B691C38E4A227D3C31BB26461C0ADB88A62DCC20C605E95AD6731831843A8631E9A283BB6F19C6A38CE9A597438A1
3,195,963 UART: [art] PUB.Y = AA236423DAF29CD928AE108F3126E3A23F8EE3A75F2F34F0B6526D59360B8F69C3597983B0DF887AE4FB122B31154933
3,202,912 UART: [art] SIG.R = 9D6E425A7AC91A027BE56579C58223174B127F48AB560E47939F2F374025C4F3F1DB3CD609884390E6C6A87DDB8EBD8F
3,209,677 UART: [art] SIG.S = 8FDCC6A5D3359A5AE443D6BF7D062021B879EE289576608829A233AB92C8FDDC8AE3D64DDEF40350681BF8EE9065A602
3,234,272 UART: Caliptra RT
3,234,523 UART: [state] CFI Enabled
3,353,773 UART: [rt] RT listening for mailbox commands...
3,354,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,041 UART: [rt]cmd =0x44504543, len=96
3,576,689 >>> mbox cmd response data (6236 bytes)
3,576,690 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,391 UART: [rt]cmd =0x52564348, len=36
3,608,885 >>> mbox cmd response data (8 bytes)
3,608,886 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,375 UART: [rt]cmd =0x52564348, len=36
3,640,028 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,959 ready_for_fw is high
1,059,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,292 >>> mbox cmd response: success
2,740,909 UART:
2,740,925 UART: Running Caliptra FMC ...
2,741,333 UART:
2,741,387 UART: [state] CFI Enabled
2,751,807 UART: [fht] FMC Alias Private Key: 7
2,870,403 UART: [art] Extend RT PCRs Done
2,870,831 UART: [art] Lock RT PCRs Done
2,872,347 UART: [art] Populate DV Done
2,880,738 UART: [fht] FMC Alias Private Key: 7
2,881,736 UART: [art] Derive CDI
2,882,016 UART: [art] Store in slot 0x4
2,967,693 UART: [art] Derive Key Pair
2,968,053 UART: [art] Store priv key in slot 0x5
2,980,973 UART: [art] Derive Key Pair - Done
2,995,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,519 UART: [art] PUB.X = F57F4B3F367CC3FD4714E506E19FCB95BA7ED54E02C05A7737047B83A0B813068B3C82969DDC121ABD46BF3A8C4CBEA5
3,018,293 UART: [art] PUB.Y = 9C9140505BE594C6158D4A338861BAEC23C175BB30FFF7D74FE6A3AC24C1826BCDABFA078B269CA20D82D3F9CC80B9D8
3,025,255 UART: [art] SIG.R = FD828A23206314534B92379BEA77F3D1F15D5670BDA95871CBF836CFC9C590A52A69B2D779AF94819C7F2B8F494092A3
3,032,027 UART: [art] SIG.S = 9052E838C2C9297E0B354925075CAED506A6A37FBB05ABF9ACF383C99A7EB8E22E8D5EC8DFBBF3126ECB717F860D9ACC
3,056,238 UART: Caliptra RT
3,056,489 UART: [state] CFI Enabled
3,176,457 UART: [rt] RT listening for mailbox commands...
3,177,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,827 UART: [rt]cmd =0x44504543, len=96
3,400,902 >>> mbox cmd response data (6236 bytes)
3,400,903 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,282 UART: [rt]cmd =0x52564348, len=36
3,432,930 >>> mbox cmd response data (8 bytes)
3,432,931 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,462,740 UART: [rt]cmd =0x52564348, len=36
3,464,285 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
893,681 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,806 UART: [kat] ++
897,958 UART: [kat] sha1
902,304 UART: [kat] SHA2-256
904,244 UART: [kat] SHA2-384
906,893 UART: [kat] SHA2-512-ACC
908,794 UART: [kat] ECC-384
918,337 UART: [kat] HMAC-384Kdf
922,903 UART: [kat] LMS
1,171,231 UART: [kat] --
1,172,134 UART: [cold-reset] ++
1,172,604 UART: [fht] FHT @ 0x50003400
1,175,417 UART: [idev] ++
1,175,585 UART: [idev] CDI.KEYID = 6
1,175,945 UART: [idev] SUBJECT.KEYID = 7
1,176,369 UART: [idev] UDS.KEYID = 0
1,176,714 ready_for_fw is high
1,176,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,471 UART: [idev] Erasing UDS.KEYID = 0
1,202,244 UART: [idev] Sha1 KeyId Algorithm
1,210,840 UART: [idev] --
1,211,780 UART: [ldev] ++
1,211,948 UART: [ldev] CDI.KEYID = 6
1,212,311 UART: [ldev] SUBJECT.KEYID = 5
1,212,737 UART: [ldev] AUTHORITY.KEYID = 7
1,213,200 UART: [ldev] FE.KEYID = 1
1,218,512 UART: [ldev] Erasing FE.KEYID = 1
1,245,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,620 UART: [ldev] --
1,285,005 UART: [fwproc] Wait for Commands...
1,285,725 UART: [fwproc] Recv command 0x46574c44
1,286,453 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,381 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,551 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,726 >>> mbox cmd response: success
2,829,808 UART: [afmc] ++
2,829,976 UART: [afmc] CDI.KEYID = 6
2,830,338 UART: [afmc] SUBJECT.KEYID = 7
2,830,763 UART: [afmc] AUTHORITY.KEYID = 5
2,866,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,113 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,822 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,705 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,406 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,328 UART: [afmc] --
2,910,366 UART: [cold-reset] --
2,911,264 UART: [state] Locking Datavault
2,912,539 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,143 UART: [state] Locking ICCM
2,913,607 UART: [exit] Launching FMC @ 0x40000130
2,918,937 UART:
2,918,953 UART: Running Caliptra FMC ...
2,919,361 UART:
2,919,504 UART: [state] CFI Enabled
2,930,344 UART: [fht] FMC Alias Private Key: 7
3,049,656 UART: [art] Extend RT PCRs Done
3,050,084 UART: [art] Lock RT PCRs Done
3,051,592 UART: [art] Populate DV Done
3,059,733 UART: [fht] FMC Alias Private Key: 7
3,060,791 UART: [art] Derive CDI
3,061,071 UART: [art] Store in slot 0x4
3,146,958 UART: [art] Derive Key Pair
3,147,318 UART: [art] Store priv key in slot 0x5
3,160,914 UART: [art] Derive Key Pair - Done
3,175,251 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,484 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,249 UART: [art] PUB.X = 708D7C56D7310EC1AE1C7FD3364467F7B50233853247E7D7163767F9205310907966B2FF2D0FFEC8B0F0E287C0368DE8
3,198,006 UART: [art] PUB.Y = 30634D79A9726CC2DBB212A71FAA7BF83E9B08A42AACF6ABE65D530D7EE5DE4677B58869D6C655D5A5BDC14233F006DC
3,204,965 UART: [art] SIG.R = 832AE5184F8B8A5FBE5509FE7AFFD7261FCE9412FE36064490049019D69147C1E73684A4AE5F92ECD65F51B739F8317B
3,211,730 UART: [art] SIG.S = EA22C8A2EF58D2AD08C374CBC50492992EC9BE9CA581CDCADA9452FB5DA34529C11AF5141D0B771F1F78E7716774173E
3,235,881 UART: Caliptra RT
3,236,224 UART: [state] CFI Enabled
3,356,792 UART: [rt] RT listening for mailbox commands...
3,357,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,212 UART: [rt]cmd =0x44504543, len=96
3,580,235 >>> mbox cmd response data (6236 bytes)
3,580,236 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,979 UART: [rt]cmd =0x52564348, len=36
3,612,595 >>> mbox cmd response data (8 bytes)
3,612,596 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,167 UART: [rt]cmd =0x52564348, len=36
3,643,824 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,204 ready_for_fw is high
1,060,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,717 >>> mbox cmd response: success
2,742,760 UART:
2,742,776 UART: Running Caliptra FMC ...
2,743,184 UART:
2,743,327 UART: [state] CFI Enabled
2,753,985 UART: [fht] FMC Alias Private Key: 7
2,873,233 UART: [art] Extend RT PCRs Done
2,873,661 UART: [art] Lock RT PCRs Done
2,875,425 UART: [art] Populate DV Done
2,883,576 UART: [fht] FMC Alias Private Key: 7
2,884,578 UART: [art] Derive CDI
2,884,858 UART: [art] Store in slot 0x4
2,970,651 UART: [art] Derive Key Pair
2,971,011 UART: [art] Store priv key in slot 0x5
2,984,547 UART: [art] Derive Key Pair - Done
2,999,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,711 UART: [art] PUB.X = BBA657E620183EE4067B0A1B909EFAF54541512CE6E236B36DD3CDC35E2B81E636DC43A441BF8445755F0DCDD5C65DC2
3,022,486 UART: [art] PUB.Y = 5C4D0733B34F7A925AFBF2389C0E0A8AEC02D0979FF2514E22499D0B533DDAB398DF9B22C41038E68AD46736B58E26A2
3,029,429 UART: [art] SIG.R = D7C993CD96B8882FEF6B15F65DCB099517E08CC92ED3D5B50497CF3E6885B865E9FFCD8E2816C8DADA0167745B253760
3,036,200 UART: [art] SIG.S = 43EBB835311B4D2E3148DA4470125A138876F67891C570DC0D11E597A87EE2A08272EA7E0AFD8145F01F8D5690374D38
3,059,770 UART: Caliptra RT
3,060,113 UART: [state] CFI Enabled
3,179,352 UART: [rt] RT listening for mailbox commands...
3,180,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,542 UART: [rt]cmd =0x44504543, len=96
3,404,857 >>> mbox cmd response data (6236 bytes)
3,404,858 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,447 UART: [rt]cmd =0x52564348, len=36
3,437,081 >>> mbox cmd response data (8 bytes)
3,437,082 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,466,523 UART: [rt]cmd =0x52564348, len=36
3,468,198 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,149 UART:
192,510 UART: Running Caliptra ROM ...
193,711 UART:
193,883 UART: [state] CFI Enabled
266,354 UART: [state] LifecycleState = Unprovisioned
268,356 UART: [state] DebugLocked = No
270,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,501 UART: [kat] SHA2-256
444,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,733 UART: [kat] ++
455,208 UART: [kat] sha1
465,018 UART: [kat] SHA2-256
467,676 UART: [kat] SHA2-384
472,110 UART: [kat] SHA2-512-ACC
474,479 UART: [kat] ECC-384
2,768,872 UART: [kat] HMAC-384Kdf
2,800,145 UART: [kat] LMS
3,990,463 UART: [kat] --
3,994,122 UART: [cold-reset] ++
3,996,567 UART: [fht] Storing FHT @ 0x50003400
4,008,137 UART: [idev] ++
4,008,755 UART: [idev] CDI.KEYID = 6
4,009,679 UART: [idev] SUBJECT.KEYID = 7
4,010,862 UART: [idev] UDS.KEYID = 0
4,011,918 ready_for_fw is high
4,012,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,092 UART: [idev] Erasing UDS.KEYID = 0
7,346,055 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,215 UART: [idev] --
7,370,159 UART: [ldev] ++
7,370,794 UART: [ldev] CDI.KEYID = 6
7,371,709 UART: [ldev] SUBJECT.KEYID = 5
7,372,922 UART: [ldev] AUTHORITY.KEYID = 7
7,374,207 UART: [ldev] FE.KEYID = 1
7,402,302 UART: [ldev] Erasing FE.KEYID = 1
10,732,821 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,395 UART: [ldev] --
13,093,557 UART: [fwproc] Waiting for Commands...
13,095,596 UART: [fwproc] Received command 0x46574c44
13,097,831 UART: [fwproc] Received Image of size 118548 bytes
17,203,312 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,283,305 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,356,441 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,685,226 >>> mbox cmd response: success
17,688,733 UART: [afmc] ++
17,689,345 UART: [afmc] CDI.KEYID = 6
17,690,230 UART: [afmc] SUBJECT.KEYID = 7
17,691,526 UART: [afmc] AUTHORITY.KEYID = 5
21,050,422 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,351,342 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,353,600 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,368,027 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,382,742 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,397,171 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,419,907 UART: [afmc] --
23,423,552 UART: [cold-reset] --
23,427,248 UART: [state] Locking Datavault
23,431,801 UART: [state] Locking PCR0, PCR1 and PCR31
23,433,556 UART: [state] Locking ICCM
23,435,115 UART: [exit] Launching FMC @ 0x40000130
23,443,516 UART:
23,443,753 UART: Running Caliptra FMC ...
23,445,038 UART:
23,445,238 UART: [state] CFI Enabled
23,510,090 UART: [fht] FMC Alias Private Key: 7
25,850,273 UART: [art] Extend RT PCRs Done
25,851,494 UART: [art] Lock RT PCRs Done
25,852,902 UART: [art] Populate DV Done
25,858,530 UART: [fht] FMC Alias Private Key: 7
25,860,184 UART: [art] Derive CDI
25,861,001 UART: [art] Store in slot 0x4
25,918,263 UART: [art] Derive Key Pair
25,919,257 UART: [art] Store priv key in slot 0x5
29,211,844 UART: [art] Derive Key Pair - Done
29,224,897 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,512,799 UART: [art] Erasing AUTHORITY.KEYID = 7
31,514,322 UART: [art] PUB.X = 1243A4E0CCB03ABA2D05F90564AF9E60A7C3D47DC1C5D2A1940059C0873F13E80D23F30C2514421B015F669BE821C152
31,521,537 UART: [art] PUB.Y = 66419C6F5570F162C12481F600BB85561454EEAC81E9343A11DC7F9861AEF8324DBC495ABE6ADD9349DC10A8F5718839
31,528,795 UART: [art] SIG.R = 4F91A2470B1AA41F9D54AD2FB0C52CC7B7F2B000A90E1243ABF9ED686B177E65C8C75941FC2A1E391C3AA104F29E69C3
31,536,188 UART: [art] SIG.S = 5DC78B3184C84929D42F4931DED513D8D759243C7F48E103986947B1F44153F20567F7D8907058098F1DD5E21BC6A24F
32,841,076 UART: Caliptra RT
32,841,782 UART: [state] CFI Enabled
33,037,200 UART: [rt] RT listening for mailbox commands...
33,039,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,069,969 UART: [rt]cmd =0x44504543, len=96
38,849,072 >>> mbox cmd response data (6236 bytes)
38,878,350 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,908,704 UART: [rt]cmd =0x52564348, len=36
38,911,770 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,806,188 ready_for_fw is high
3,806,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,963,288 >>> mbox cmd response: success
23,652,624 UART:
23,653,116 UART: Running Caliptra FMC ...
23,654,238 UART:
23,654,418 UART: [state] CFI Enabled
23,719,415 UART: [fht] FMC Alias Private Key: 7
26,059,127 UART: [art] Extend RT PCRs Done
26,060,367 UART: [art] Lock RT PCRs Done
26,062,402 UART: [art] Populate DV Done
26,067,705 UART: [fht] FMC Alias Private Key: 7
26,069,216 UART: [art] Derive CDI
26,069,988 UART: [art] Store in slot 0x4
26,128,322 UART: [art] Derive Key Pair
26,129,323 UART: [art] Store priv key in slot 0x5
29,422,599 UART: [art] Derive Key Pair - Done
29,435,438 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,177 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,693 UART: [art] PUB.X = 3AF04F9A22A5165E84FAD534985B487B7C6517A76EE0B4433DEC58289D281A57C427D08F81E197EE71B25D1CFB1137A7
31,732,956 UART: [art] PUB.Y = 9A0D4B3E88328561767C74BDC64775FF96CD4BBE1571E4F01E00D05D8A07B1D996C4D5F13D8DDC92E4CE61324C792216
31,740,178 UART: [art] SIG.R = 50CB5DB07FC75C0342DD927207CD24F052E2BDAC54B36C03A87EC465B7B11BCD07F0F51B4092A33A10B1BAA473C6D7D1
31,747,629 UART: [art] SIG.S = 82BFF93534DF4EC3A5071C68579CD1BF1892BF59BFCDFBD57E26E8639249EF5D7B4A25F587FA38C7AEF8108DDC468BC4
33,052,740 UART: Caliptra RT
33,053,464 UART: [state] CFI Enabled
33,242,095 UART: [rt] RT listening for mailbox commands...
33,244,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,274,759 UART: [rt]cmd =0x44504543, len=96
39,055,743 >>> mbox cmd response data (6236 bytes)
39,085,026 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,115,267 UART: [rt]cmd =0x52564348, len=36
39,118,386 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
192,277 UART:
192,668 UART: Running Caliptra ROM ...
193,792 UART:
603,572 UART: [state] CFI Enabled
615,962 UART: [state] LifecycleState = Unprovisioned
617,923 UART: [state] DebugLocked = No
620,015 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,595 UART: [kat] SHA2-256
794,318 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,830 UART: [kat] ++
805,426 UART: [kat] sha1
816,740 UART: [kat] SHA2-256
819,422 UART: [kat] SHA2-384
824,697 UART: [kat] SHA2-512-ACC
827,053 UART: [kat] ECC-384
3,110,328 UART: [kat] HMAC-384Kdf
3,122,029 UART: [kat] LMS
4,312,092 UART: [kat] --
4,316,112 UART: [cold-reset] ++
4,317,192 UART: [fht] Storing FHT @ 0x50003400
4,328,166 UART: [idev] ++
4,328,821 UART: [idev] CDI.KEYID = 6
4,329,733 UART: [idev] SUBJECT.KEYID = 7
4,330,968 UART: [idev] UDS.KEYID = 0
4,332,014 ready_for_fw is high
4,332,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,152 UART: [idev] Erasing UDS.KEYID = 0
7,619,696 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,255 UART: [idev] --
7,645,919 UART: [ldev] ++
7,646,481 UART: [ldev] CDI.KEYID = 6
7,647,438 UART: [ldev] SUBJECT.KEYID = 5
7,648,638 UART: [ldev] AUTHORITY.KEYID = 7
7,649,915 UART: [ldev] FE.KEYID = 1
7,660,608 UART: [ldev] Erasing FE.KEYID = 1
10,950,828 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,082 UART: [ldev] --
13,310,976 UART: [fwproc] Waiting for Commands...
13,313,655 UART: [fwproc] Received command 0x46574c44
13,315,827 UART: [fwproc] Received Image of size 118548 bytes
17,426,251 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,583 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,747 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,683 >>> mbox cmd response: success
17,910,154 UART: [afmc] ++
17,910,777 UART: [afmc] CDI.KEYID = 6
17,911,690 UART: [afmc] SUBJECT.KEYID = 7
17,912,899 UART: [afmc] AUTHORITY.KEYID = 5
21,230,077 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,480 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,527,736 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,186 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,556,901 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,321 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,592,862 UART: [afmc] --
23,596,340 UART: [cold-reset] --
23,601,923 UART: [state] Locking Datavault
23,607,429 UART: [state] Locking PCR0, PCR1 and PCR31
23,609,122 UART: [state] Locking ICCM
23,610,734 UART: [exit] Launching FMC @ 0x40000130
23,619,129 UART:
23,619,414 UART: Running Caliptra FMC ...
23,620,517 UART:
23,620,676 UART: [state] CFI Enabled
23,628,917 UART: [fht] FMC Alias Private Key: 7
25,969,586 UART: [art] Extend RT PCRs Done
25,970,802 UART: [art] Lock RT PCRs Done
25,972,475 UART: [art] Populate DV Done
25,977,950 UART: [fht] FMC Alias Private Key: 7
25,979,644 UART: [art] Derive CDI
25,980,373 UART: [art] Store in slot 0x4
26,023,069 UART: [art] Derive Key Pair
26,024,108 UART: [art] Store priv key in slot 0x5
29,266,161 UART: [art] Derive Key Pair - Done
29,279,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,235 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,745 UART: [art] PUB.X = B91A0F42554A65A640A38E45320AE4D6E8AB4A0CABD46497F389F53FE0FB52B091D172832B751B35687A3EE1AD1A4ED4
31,568,001 UART: [art] PUB.Y = 0220E70F1C5B31E19E710AA4F3232B1E549B00F17CB01DCC07F94013DBB40662DF0591590D60C53656F938830F8EE2E8
31,575,237 UART: [art] SIG.R = 6345A5B633939AFAC3558B0D7ABE3617FDEB56C68B5459AB2E9E9246470805A588BCA154E9BE67AD66BB6E5DD5A686F7
31,582,681 UART: [art] SIG.S = 45143690046E9FA2AC832877D03275A15173A5F2B69C8B5A75BCA312D651AC868B6A0103857BBF8AA1B3FBB92E491819
32,888,023 UART: Caliptra RT
32,888,761 UART: [state] CFI Enabled
33,021,561 UART: [rt] RT listening for mailbox commands...
33,023,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,054,127 UART: [rt]cmd =0x44504543, len=96
38,738,802 >>> mbox cmd response data (6236 bytes)
38,767,881 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,798,208 UART: [rt]cmd =0x52564348, len=36
38,801,172 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
4,127,339 ready_for_fw is high
4,127,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,142 >>> mbox cmd response: success
23,789,714 UART:
23,790,131 UART: Running Caliptra FMC ...
23,791,272 UART:
23,791,435 UART: [state] CFI Enabled
23,799,112 UART: [fht] FMC Alias Private Key: 7
26,139,557 UART: [art] Extend RT PCRs Done
26,140,793 UART: [art] Lock RT PCRs Done
26,142,150 UART: [art] Populate DV Done
26,147,799 UART: [fht] FMC Alias Private Key: 7
26,149,405 UART: [art] Derive CDI
26,150,222 UART: [art] Store in slot 0x4
26,192,761 UART: [art] Derive Key Pair
26,193,754 UART: [art] Store priv key in slot 0x5
29,435,832 UART: [art] Derive Key Pair - Done
29,448,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,146 UART: [art] Erasing AUTHORITY.KEYID = 7
31,730,651 UART: [art] PUB.X = 73175995571E880B4D4E9BE25F3972CC8E228AC18B021D0D7CC7E29FA47F4D20FFCCB52575C709A8026CF66E7533AA93
31,737,929 UART: [art] PUB.Y = 3F946D6810DB6156E8FEDA610B8366E0A1C7A0C4FE835290BE8FF3ACC7D2A5E72E0996E58BADA73E5CE723DF5F58DD8A
31,745,191 UART: [art] SIG.R = 173FAE7BFB04F5E98E94A8D4D7A06C3AFCAABB1BE9FD88B7B2D2D752BC8E0F6868EFD3BDB10B66882C9EF35BCAEADDA9
31,752,585 UART: [art] SIG.S = D375759F2ECC63389D7DAA1B3D562502D0CDB44969A0D0F2A3FC9905683C263FF4EF4E7884524F8D0F493E79F9AB0778
33,057,735 UART: Caliptra RT
33,058,456 UART: [state] CFI Enabled
33,191,737 UART: [rt] RT listening for mailbox commands...
33,193,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,224,095 UART: [rt]cmd =0x44504543, len=96
38,908,604 >>> mbox cmd response data (6236 bytes)
38,937,966 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,968,138 UART: [rt]cmd =0x52564348, len=36
38,971,274 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,178 UART:
192,537 UART: Running Caliptra ROM ...
193,737 UART:
193,892 UART: [state] CFI Enabled
268,096 UART: [state] LifecycleState = Unprovisioned
270,026 UART: [state] DebugLocked = No
271,499 UART: [state] WD Timer not started. Device not locked for debugging
275,544 UART: [kat] SHA2-256
455,231 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,962 UART: [kat] ++
466,565 UART: [kat] sha1
478,294 UART: [kat] SHA2-256
481,016 UART: [kat] SHA2-384
485,727 UART: [kat] SHA2-512-ACC
488,253 UART: [kat] ECC-384
2,949,615 UART: [kat] HMAC-384Kdf
2,971,180 UART: [kat] LMS
3,447,635 UART: [kat] --
3,452,443 UART: [cold-reset] ++
3,454,252 UART: [fht] FHT @ 0x50003400
3,465,797 UART: [idev] ++
3,466,358 UART: [idev] CDI.KEYID = 6
3,467,308 UART: [idev] SUBJECT.KEYID = 7
3,468,546 UART: [idev] UDS.KEYID = 0
3,469,513 ready_for_fw is high
3,469,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,768 UART: [idev] Erasing UDS.KEYID = 0
5,987,098 UART: [idev] Sha1 KeyId Algorithm
6,009,462 UART: [idev] --
6,014,351 UART: [ldev] ++
6,014,932 UART: [ldev] CDI.KEYID = 6
6,015,862 UART: [ldev] SUBJECT.KEYID = 5
6,017,077 UART: [ldev] AUTHORITY.KEYID = 7
6,018,310 UART: [ldev] FE.KEYID = 1
6,056,306 UART: [ldev] Erasing FE.KEYID = 1
8,563,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,107 UART: [ldev] --
10,371,091 UART: [fwproc] Wait for Commands...
10,372,645 UART: [fwproc] Recv command 0x46574c44
10,374,625 UART: [fwproc] Recv'd Img size: 118548 bytes
13,854,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,064 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,091 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,336,129 >>> mbox cmd response: success
14,339,904 UART: [afmc] ++
14,340,514 UART: [afmc] CDI.KEYID = 6
14,341,422 UART: [afmc] SUBJECT.KEYID = 7
14,342,636 UART: [afmc] AUTHORITY.KEYID = 5
16,869,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,614,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,208 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,632,985 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,649,070 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,664,644 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,688,608 UART: [afmc] --
18,692,734 UART: [cold-reset] --
18,698,105 UART: [state] Locking Datavault
18,704,433 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,183 UART: [state] Locking ICCM
18,708,606 UART: [exit] Launching FMC @ 0x40000130
18,717,051 UART:
18,717,283 UART: Running Caliptra FMC ...
18,718,400 UART:
18,718,559 UART: [state] CFI Enabled
18,769,779 UART: [fht] FMC Alias Private Key: 7
20,536,477 UART: [art] Extend RT PCRs Done
20,537,696 UART: [art] Lock RT PCRs Done
20,539,536 UART: [art] Populate DV Done
20,544,995 UART: [fht] FMC Alias Private Key: 7
20,546,643 UART: [art] Derive CDI
20,547,455 UART: [art] Store in slot 0x4
20,601,913 UART: [art] Derive Key Pair
20,602,952 UART: [art] Store priv key in slot 0x5
23,065,509 UART: [art] Derive Key Pair - Done
23,078,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,791,183 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,686 UART: [art] PUB.X = 1540A2780BB2CBEA3302EACC7A2EEE804375C89F0B3370EFC86AABBD9BBC1EAC4B583900219DC14F777F9AC223977A3E
24,799,988 UART: [art] PUB.Y = 47605A0D790F9E35132A0A1E242F24C3818D4CD36A6A73295E01E54ACE2F3E19707039099FB14D7F77EF362868F9B61D
24,807,236 UART: [art] SIG.R = CFD7220FA82AA5BBCAD755D29737ECCED04090DF2AF97B7713550B793F6DD298A6ADEEAD02C7FA4748E18670B72418FC
24,814,668 UART: [art] SIG.S = 4281A5C94021BBE7CE0E28DC7E50B1739D1E300249FFFDA9C62A00887ED59762B6877A4F87A29A378C2BA9FB798970AB
25,793,866 UART: Caliptra RT
25,794,584 UART: [state] CFI Enabled
25,976,075 UART: [rt] RT listening for mailbox commands...
25,977,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,008,915 UART: [rt]cmd =0x44504543, len=96
30,382,269 >>> mbox cmd response data (6236 bytes)
30,411,618 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,441,690 UART: [rt]cmd =0x52564348, len=36
30,444,342 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,461,189 ready_for_fw is high
3,461,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,213,344 >>> mbox cmd response: success
18,493,309 UART:
18,493,700 UART: Running Caliptra FMC ...
18,494,831 UART:
18,494,987 UART: [state] CFI Enabled
18,563,633 UART: [fht] FMC Alias Private Key: 7
20,331,023 UART: [art] Extend RT PCRs Done
20,332,252 UART: [art] Lock RT PCRs Done
20,333,713 UART: [art] Populate DV Done
20,339,509 UART: [fht] FMC Alias Private Key: 7
20,340,952 UART: [art] Derive CDI
20,341,714 UART: [art] Store in slot 0x4
20,396,542 UART: [art] Derive Key Pair
20,397,581 UART: [art] Store priv key in slot 0x5
22,860,485 UART: [art] Derive Key Pair - Done
22,873,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,587,214 UART: [art] Erasing AUTHORITY.KEYID = 7
24,588,852 UART: [art] PUB.X = 566692CCB6F6AD8B248F300D80B0B91508442C1714312B2BC3DA3470B18C9CE681706A7DA32D664F13720493843153E3
24,596,008 UART: [art] PUB.Y = 4A156B7B153A03E911CD74E722C1181D111967FD00E54757A0EF93D84F813B89A5485138DB6ECB92826FC127AA7B465B
24,603,217 UART: [art] SIG.R = 4C3B1B84806D3F211187B2626829F33C8E73E38E33C05BD3F2E3359273CE8F1E9A10BEC1D43FCC24D946D71EDCF309D3
24,610,616 UART: [art] SIG.S = 2506880018E51AE6200ADBAD371127054B99A78DEF14016F59A802D394F956707A62938E919B4D6B85BEA97A6CCDD2AA
25,589,704 UART: Caliptra RT
25,590,426 UART: [state] CFI Enabled
25,770,670 UART: [rt] RT listening for mailbox commands...
25,772,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,803,517 UART: [rt]cmd =0x44504543, len=96
30,179,330 >>> mbox cmd response data (6236 bytes)
30,208,606 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,238,778 UART: [rt]cmd =0x52564348, len=36
30,241,754 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,395 UART:
192,744 UART: Running Caliptra ROM ...
193,929 UART:
603,470 UART: [state] CFI Enabled
613,409 UART: [state] LifecycleState = Unprovisioned
615,364 UART: [state] DebugLocked = No
618,106 UART: [state] WD Timer not started. Device not locked for debugging
622,294 UART: [kat] SHA2-256
801,905 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,713 UART: [kat] ++
813,168 UART: [kat] sha1
824,211 UART: [kat] SHA2-256
826,922 UART: [kat] SHA2-384
832,078 UART: [kat] SHA2-512-ACC
834,460 UART: [kat] ECC-384
3,276,904 UART: [kat] HMAC-384Kdf
3,290,383 UART: [kat] LMS
3,766,917 UART: [kat] --
3,772,197 UART: [cold-reset] ++
3,774,838 UART: [fht] FHT @ 0x50003400
3,787,294 UART: [idev] ++
3,787,873 UART: [idev] CDI.KEYID = 6
3,788,757 UART: [idev] SUBJECT.KEYID = 7
3,790,071 UART: [idev] UDS.KEYID = 0
3,790,975 ready_for_fw is high
3,791,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,156 UART: [idev] Erasing UDS.KEYID = 0
6,268,813 UART: [idev] Sha1 KeyId Algorithm
6,293,192 UART: [idev] --
6,297,730 UART: [ldev] ++
6,298,306 UART: [ldev] CDI.KEYID = 6
6,299,189 UART: [ldev] SUBJECT.KEYID = 5
6,300,403 UART: [ldev] AUTHORITY.KEYID = 7
6,301,697 UART: [ldev] FE.KEYID = 1
6,311,290 UART: [ldev] Erasing FE.KEYID = 1
8,788,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,293 UART: [ldev] --
10,581,924 UART: [fwproc] Wait for Commands...
10,584,026 UART: [fwproc] Recv command 0x46574c44
10,586,014 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,190 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,200 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,776 >>> mbox cmd response: success
14,552,669 UART: [afmc] ++
14,553,286 UART: [afmc] CDI.KEYID = 6
14,554,171 UART: [afmc] SUBJECT.KEYID = 7
14,555,393 UART: [afmc] AUTHORITY.KEYID = 5
17,060,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,552 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,732 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,800,558 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,610 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,209 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,561 UART: [afmc] --
18,858,451 UART: [cold-reset] --
18,862,067 UART: [state] Locking Datavault
18,866,079 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,838 UART: [state] Locking ICCM
18,870,318 UART: [exit] Launching FMC @ 0x40000130
18,878,772 UART:
18,879,009 UART: Running Caliptra FMC ...
18,880,118 UART:
18,880,275 UART: [state] CFI Enabled
18,888,486 UART: [fht] FMC Alias Private Key: 7
20,654,167 UART: [art] Extend RT PCRs Done
20,655,546 UART: [art] Lock RT PCRs Done
20,657,203 UART: [art] Populate DV Done
20,662,786 UART: [fht] FMC Alias Private Key: 7
20,664,339 UART: [art] Derive CDI
20,665,074 UART: [art] Store in slot 0x4
20,707,722 UART: [art] Derive Key Pair
20,708,740 UART: [art] Store priv key in slot 0x5
23,135,607 UART: [art] Derive Key Pair - Done
23,148,655 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,854,782 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,297 UART: [art] PUB.X = BC580ACB4B1194BC039B81B65B10C7CD7654BAEC656E25F68A99A76DC9943660C5C42C1842B98A9142F2E5F416D16191
24,863,538 UART: [art] PUB.Y = 4745AE5776BD118765CE18F339E879DD19A3584BF47839476A521E23FB4CA7BAC6D7E3A61650E39DEA0C619F83D7FF3B
24,870,818 UART: [art] SIG.R = 65ECC808EA256ED7BE8590090AF9FE0D363DA9D3E397730E0610FE3712131A638B4762445C16A32A63EC8D9D1737300C
24,878,213 UART: [art] SIG.S = D11861841F470A2C85B39C487BA5F1FC6A17E1667411B66C180BA1EF86368D021F4F75E421DC27F6E42F2846412564BF
25,857,267 UART: Caliptra RT
25,857,967 UART: [state] CFI Enabled
25,989,774 UART: [rt] RT listening for mailbox commands...
25,991,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,022,219 UART: [rt]cmd =0x44504543, len=96
30,317,329 >>> mbox cmd response data (6236 bytes)
30,346,619 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,376,798 UART: [rt]cmd =0x52564348, len=36
30,379,791 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,782,994 ready_for_fw is high
3,783,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,951 >>> mbox cmd response: success
18,705,683 UART:
18,706,090 UART: Running Caliptra FMC ...
18,707,294 UART:
18,707,469 UART: [state] CFI Enabled
18,715,575 UART: [fht] FMC Alias Private Key: 7
20,482,099 UART: [art] Extend RT PCRs Done
20,483,353 UART: [art] Lock RT PCRs Done
20,484,795 UART: [art] Populate DV Done
20,490,357 UART: [fht] FMC Alias Private Key: 7
20,491,860 UART: [art] Derive CDI
20,492,606 UART: [art] Store in slot 0x4
20,535,579 UART: [art] Derive Key Pair
20,536,632 UART: [art] Store priv key in slot 0x5
22,964,447 UART: [art] Derive Key Pair - Done
22,977,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,731 UART: [art] Erasing AUTHORITY.KEYID = 7
24,685,218 UART: [art] PUB.X = 956259E3D9D6A032D91A5F9C6C18823A5BEE109E231462D0FC6FBD198CBA30654F1C881CEA916DCB62A48E6CB42D9C82
24,692,480 UART: [art] PUB.Y = 7276A72A85BF72C9BD6F97E192715B070C4BC7B17B6015376101489863D43811809A012D9F3E147FCF605505FE1A0EDD
24,699,708 UART: [art] SIG.R = FC65311147ABD3C0E0A7F7E2AEF4E17D511C116146E3604B47C2E5783A765425D1620917AA7062D47FEEDD65EB4B4365
24,707,132 UART: [art] SIG.S = FE10FF16D4C6C7FFD52DC8CD78C6DD3375E2C8F0C2E911E6CA714C444C02A1DC8DBFB97B6775701B6562FCAFEA1D67F6
25,685,609 UART: Caliptra RT
25,686,312 UART: [state] CFI Enabled
25,818,618 UART: [rt] RT listening for mailbox commands...
25,820,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,851,207 UART: [rt]cmd =0x44504543, len=96
30,146,896 >>> mbox cmd response data (6236 bytes)
30,176,652 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,206,893 UART: [rt]cmd =0x52564348, len=36
30,209,780 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,050 UART:
192,424 UART: Running Caliptra ROM ...
193,526 UART:
193,670 UART: [state] CFI Enabled
261,202 UART: [state] LifecycleState = Unprovisioned
263,624 UART: [state] DebugLocked = No
266,427 UART: [state] WD Timer not started. Device not locked for debugging
270,477 UART: [kat] SHA2-256
460,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,156 UART: [kat] ++
471,604 UART: [kat] sha1
482,634 UART: [kat] SHA2-256
485,618 UART: [kat] SHA2-384
492,323 UART: [kat] SHA2-512-ACC
494,912 UART: [kat] ECC-384
2,946,820 UART: [kat] HMAC-384Kdf
2,970,368 UART: [kat] LMS
3,502,160 UART: [kat] --
3,507,280 UART: [cold-reset] ++
3,508,994 UART: [fht] FHT @ 0x50003400
3,521,190 UART: [idev] ++
3,521,863 UART: [idev] CDI.KEYID = 6
3,522,905 UART: [idev] SUBJECT.KEYID = 7
3,524,031 UART: [idev] UDS.KEYID = 0
3,524,971 ready_for_fw is high
3,525,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,390 UART: [idev] Erasing UDS.KEYID = 0
6,032,834 UART: [idev] Sha1 KeyId Algorithm
6,055,722 UART: [idev] --
6,060,413 UART: [ldev] ++
6,061,096 UART: [ldev] CDI.KEYID = 6
6,062,026 UART: [ldev] SUBJECT.KEYID = 5
6,063,190 UART: [ldev] AUTHORITY.KEYID = 7
6,064,415 UART: [ldev] FE.KEYID = 1
6,099,419 UART: [ldev] Erasing FE.KEYID = 1
8,604,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,138 UART: [ldev] --
10,413,250 UART: [fwproc] Wait for Commands...
10,415,948 UART: [fwproc] Recv command 0x46574c44
10,418,203 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,310 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,127,949 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,688,374 >>> mbox cmd response: success
14,693,072 UART: [afmc] ++
14,693,803 UART: [afmc] CDI.KEYID = 6
14,694,995 UART: [afmc] SUBJECT.KEYID = 7
14,696,430 UART: [afmc] AUTHORITY.KEYID = 5
17,238,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,978,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,980,334 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,995,449 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,010,607 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,025,455 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,049,148 UART: [afmc] --
19,053,075 UART: [cold-reset] --
19,057,115 UART: [state] Locking Datavault
19,062,430 UART: [state] Locking PCR0, PCR1 and PCR31
19,064,636 UART: [state] Locking ICCM
19,065,994 UART: [exit] Launching FMC @ 0x40000130
19,074,669 UART:
19,074,915 UART: Running Caliptra FMC ...
19,076,019 UART:
19,076,179 UART: [state] CFI Enabled
19,136,106 UART: [fht] FMC Alias Private Key: 7
20,902,573 UART: [art] Extend RT PCRs Done
20,903,794 UART: [art] Lock RT PCRs Done
20,905,518 UART: [art] Populate DV Done
20,910,928 UART: [fht] FMC Alias Private Key: 7
20,912,462 UART: [art] Derive CDI
20,913,275 UART: [art] Store in slot 0x4
20,968,474 UART: [art] Derive Key Pair
20,969,515 UART: [art] Store priv key in slot 0x5
23,432,862 UART: [art] Derive Key Pair - Done
23,445,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,141 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,644 UART: [art] PUB.X = B3E7EE01BAD1068E8EE9573E99A2682CE4E578A7DBBAC44A1ACD3B2C1AE8C187A0E9A59BE625A9FFB3EA548B0C4BFD90
25,167,921 UART: [art] PUB.Y = C2C1962225D866276C3ED076C666B9D3D2A6F3715F93C1EAD4A504101A6212E2163D88428D8D84277F79ABA544AB08D9
25,175,188 UART: [art] SIG.R = F8C711FDE8287D60D930E480AD9AC8F716A0C2DA9B0270C9F31009358BFFA4E9668848692E021AB52B66345ADD6C0C90
25,182,558 UART: [art] SIG.S = 327E551804324E4DD2EE4C88CC27165EA11A037478C035C95F22212D892FB646CB571FE0056B48180809438F1FF97E40
26,161,453 UART: Caliptra RT
26,162,163 UART: [state] CFI Enabled
26,343,312 UART: [rt] RT listening for mailbox commands...
26,345,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,375,921 UART: [rt]cmd =0x44504543, len=96
30,751,052 >>> mbox cmd response data (6236 bytes)
30,780,174 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,810,461 UART: [rt]cmd =0x52564348, len=36
30,813,523 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,439,147 ready_for_fw is high
3,439,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,815,887 >>> mbox cmd response: success
19,111,327 UART:
19,111,722 UART: Running Caliptra FMC ...
19,112,912 UART:
19,113,080 UART: [state] CFI Enabled
19,179,422 UART: [fht] FMC Alias Private Key: 7
20,967,385 UART: [art] Extend RT PCRs Done
20,968,606 UART: [art] Lock RT PCRs Done
20,969,969 UART: [art] Populate DV Done
20,975,391 UART: [fht] FMC Alias Private Key: 7
20,976,948 UART: [art] Derive CDI
20,977,763 UART: [art] Store in slot 0x4
21,033,240 UART: [art] Derive Key Pair
21,034,283 UART: [art] Store priv key in slot 0x5
23,496,977 UART: [art] Derive Key Pair - Done
23,509,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,787 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,296 UART: [art] PUB.X = C589BFD946584AEE61CDA6EFAB77C02F1C62BC208BD3451732758207C086FF944D52E6362573E2CF4F781598C9801F54
25,231,573 UART: [art] PUB.Y = 9E9607D5C915AD912A8E0D4709BF120A928FC6D94343C4D049E58CAC0038A5913A3F3848E54455E8165CB9C78FB94B31
25,238,782 UART: [art] SIG.R = 65202583CCB1A0EC9098FCBAA0E5CC491B67C671C1553108536D81A21DC5814CAA512C6841EE14969A4C24F88DAABF8F
25,246,237 UART: [art] SIG.S = 52CF0E1B1208E2964D34B1FCFF4E0C564B02653CB102EC71145DDB3B2E6DCE6DA0C30EA25BB088F6B1B54800BF763E5A
26,225,304 UART: Caliptra RT
26,226,007 UART: [state] CFI Enabled
26,407,004 UART: [rt] RT listening for mailbox commands...
26,408,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,439,309 UART: [rt]cmd =0x44504543, len=96
30,817,193 >>> mbox cmd response data (6236 bytes)
30,846,473 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,876,585 UART: [rt]cmd =0x52564348, len=36
30,879,611 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,340 UART:
192,719 UART: Running Caliptra ROM ...
193,846 UART:
603,577 UART: [state] CFI Enabled
618,733 UART: [state] LifecycleState = Unprovisioned
621,042 UART: [state] DebugLocked = No
623,277 UART: [state] WD Timer not started. Device not locked for debugging
628,176 UART: [kat] SHA2-256
818,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,879 UART: [kat] ++
829,402 UART: [kat] sha1
839,138 UART: [kat] SHA2-256
842,148 UART: [kat] SHA2-384
848,214 UART: [kat] SHA2-512-ACC
850,801 UART: [kat] ECC-384
3,291,355 UART: [kat] HMAC-384Kdf
3,304,514 UART: [kat] LMS
3,836,333 UART: [kat] --
3,841,645 UART: [cold-reset] ++
3,843,867 UART: [fht] FHT @ 0x50003400
3,855,180 UART: [idev] ++
3,855,839 UART: [idev] CDI.KEYID = 6
3,856,877 UART: [idev] SUBJECT.KEYID = 7
3,857,980 UART: [idev] UDS.KEYID = 0
3,858,920 ready_for_fw is high
3,859,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,976 UART: [idev] Erasing UDS.KEYID = 0
6,334,826 UART: [idev] Sha1 KeyId Algorithm
6,357,795 UART: [idev] --
6,362,385 UART: [ldev] ++
6,363,064 UART: [ldev] CDI.KEYID = 6
6,364,036 UART: [ldev] SUBJECT.KEYID = 5
6,365,203 UART: [ldev] AUTHORITY.KEYID = 7
6,366,390 UART: [ldev] FE.KEYID = 1
6,377,057 UART: [ldev] Erasing FE.KEYID = 1
8,857,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,510 UART: [ldev] --
10,647,535 UART: [fwproc] Wait for Commands...
10,649,242 UART: [fwproc] Recv command 0x46574c44
10,651,509 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,502 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,118 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,431 >>> mbox cmd response: success
14,913,149 UART: [afmc] ++
14,913,875 UART: [afmc] CDI.KEYID = 6
14,915,097 UART: [afmc] SUBJECT.KEYID = 7
14,916,553 UART: [afmc] AUTHORITY.KEYID = 5
17,422,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,703 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,811 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,177,952 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,821 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,216,032 UART: [afmc] --
19,220,233 UART: [cold-reset] --
19,224,758 UART: [state] Locking Datavault
19,229,110 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,271 UART: [state] Locking ICCM
19,233,793 UART: [exit] Launching FMC @ 0x40000130
19,242,431 UART:
19,242,677 UART: Running Caliptra FMC ...
19,243,727 UART:
19,243,880 UART: [state] CFI Enabled
19,251,829 UART: [fht] FMC Alias Private Key: 7
21,018,304 UART: [art] Extend RT PCRs Done
21,019,531 UART: [art] Lock RT PCRs Done
21,021,365 UART: [art] Populate DV Done
21,026,570 UART: [fht] FMC Alias Private Key: 7
21,028,125 UART: [art] Derive CDI
21,028,953 UART: [art] Store in slot 0x4
21,071,881 UART: [art] Derive Key Pair
21,072,927 UART: [art] Store priv key in slot 0x5
23,499,818 UART: [art] Derive Key Pair - Done
23,512,764 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,901 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,414 UART: [art] PUB.X = FCFD5DB30308026B533830EDE2F0F7FE248AE7307D1789B9072FCDC0AE8413663AEEBE05B90E9B4F09873C907C69DBE2
25,227,689 UART: [art] PUB.Y = 0A366F0A47898A0F9CE48EB4BAECBA0DFFC345DA2599B458999A1A2DE6C07B2BF1303CD3A30F84746CBDACF47DF201C7
25,234,965 UART: [art] SIG.R = D0838426045899C1F7959CA0AEE5BCEB34389B2ADF77CC2DBBF47B99888A5E2AB222BCB0149CAB920D37F6943A32ACAF
25,242,399 UART: [art] SIG.S = 63C6F4EF6429216B8DCE7C1A3DA80577907ADA18BDFEBDEE29078AC62300DD2DCBED47AD9343EB27C1827EC7F2CA0A6F
26,221,658 UART: Caliptra RT
26,222,355 UART: [state] CFI Enabled
26,354,558 UART: [rt] RT listening for mailbox commands...
26,356,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,387,048 UART: [rt]cmd =0x44504543, len=96
30,681,963 >>> mbox cmd response data (6236 bytes)
30,711,058 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,741,251 UART: [rt]cmd =0x52564348, len=36
30,744,371 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
3,754,878 ready_for_fw is high
3,755,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,818 >>> mbox cmd response: success
19,293,605 UART:
19,294,011 UART: Running Caliptra FMC ...
19,295,236 UART:
19,295,412 UART: [state] CFI Enabled
19,303,255 UART: [fht] FMC Alias Private Key: 7
21,069,042 UART: [art] Extend RT PCRs Done
21,070,277 UART: [art] Lock RT PCRs Done
21,072,027 UART: [art] Populate DV Done
21,077,252 UART: [fht] FMC Alias Private Key: 7
21,078,745 UART: [art] Derive CDI
21,079,537 UART: [art] Store in slot 0x4
21,122,049 UART: [art] Derive Key Pair
21,123,100 UART: [art] Store priv key in slot 0x5
23,550,632 UART: [art] Derive Key Pair - Done
23,563,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,933 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,885 UART: [art] PUB.X = F08D423DB3E1D1021F81DA8E4A8218FDCF0F0A79E6B33F3701AE60517F5F102B1D3D2812A601AD51297D059D19FA83E1
25,278,747 UART: [art] PUB.Y = A99A82732222B17DC39C4897BE791BB73911033AB7C2905A620CD99BEB071A6740BFA3F40F78B37910051ECC37D6E215
25,285,932 UART: [art] SIG.R = 592E9CA8A3C4336293D30C70CF0D6808F486300479FA299B6A4E09E149D5E8DB4EF7F5C231DEC0C231EE64E1EF56B4D8
25,293,327 UART: [art] SIG.S = B713831E35CCD59D539F94C01E01724A953A297935C7CD73FFC7D9A6DE1E52674B6F0A4C5827708EBE38F1C919213CCB
26,272,424 UART: Caliptra RT
26,273,116 UART: [state] CFI Enabled
26,406,394 UART: [rt] RT listening for mailbox commands...
26,408,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,438,847 UART: [rt]cmd =0x44504543, len=96
30,733,501 >>> mbox cmd response data (6236 bytes)
30,762,995 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,793,067 UART: [rt]cmd =0x52564348, len=36
30,796,194 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,367 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,009 UART: [kat] SHA2-256
881,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,055 UART: [kat] ++
886,207 UART: [kat] sha1
890,669 UART: [kat] SHA2-256
892,607 UART: [kat] SHA2-384
895,474 UART: [kat] SHA2-512-ACC
897,375 UART: [kat] ECC-384
902,794 UART: [kat] HMAC-384Kdf
907,580 UART: [kat] LMS
1,475,776 UART: [kat] --
1,476,701 UART: [cold-reset] ++
1,477,181 UART: [fht] Storing FHT @ 0x50003400
1,479,826 UART: [idev] ++
1,479,994 UART: [idev] CDI.KEYID = 6
1,480,354 UART: [idev] SUBJECT.KEYID = 7
1,480,778 UART: [idev] UDS.KEYID = 0
1,481,123 ready_for_fw is high
1,481,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,782 UART: [idev] Erasing UDS.KEYID = 0
1,505,420 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,094 UART: [idev] --
1,515,061 UART: [ldev] ++
1,515,229 UART: [ldev] CDI.KEYID = 6
1,515,592 UART: [ldev] SUBJECT.KEYID = 5
1,516,018 UART: [ldev] AUTHORITY.KEYID = 7
1,516,481 UART: [ldev] FE.KEYID = 1
1,521,669 UART: [ldev] Erasing FE.KEYID = 1
1,546,496 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,146 UART: [ldev] --
1,585,639 UART: [fwproc] Waiting for Commands...
1,586,296 UART: [fwproc] Received command 0x46574c44
1,587,087 UART: [fwproc] Received Image of size 118548 bytes
2,932,419 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,911 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,548 >>> mbox cmd response: success
3,132,796 UART: [afmc] ++
3,132,964 UART: [afmc] CDI.KEYID = 6
3,133,326 UART: [afmc] SUBJECT.KEYID = 7
3,133,751 UART: [afmc] AUTHORITY.KEYID = 5
3,168,858 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,170 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,950 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,659 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,542 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,225 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,191 UART: [afmc] --
3,212,075 UART: [cold-reset] --
3,212,905 UART: [state] Locking Datavault
3,213,966 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,570 UART: [state] Locking ICCM
3,215,160 UART: [exit] Launching FMC @ 0x40000130
3,220,490 UART:
3,220,506 UART: Running Caliptra FMC ...
3,220,914 UART:
3,220,968 UART: [state] CFI Enabled
3,231,436 UART: [fht] FMC Alias Private Key: 7
3,349,732 UART: [art] Extend RT PCRs Done
3,350,160 UART: [art] Lock RT PCRs Done
3,351,642 UART: [art] Populate DV Done
3,359,961 UART: [fht] FMC Alias Private Key: 7
3,361,125 UART: [art] Derive CDI
3,361,405 UART: [art] Store in slot 0x4
3,447,271 UART: [art] Derive Key Pair
3,447,631 UART: [art] Store priv key in slot 0x5
3,460,714 UART: [art] Derive Key Pair - Done
3,475,422 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,183 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,948 UART: [art] PUB.X = 3567DF5929AC9C6A7EE7B2BB2AF43D6FA929F7C02ACD3359EE68A15845DAB9032C1BC0DF00A6A8D4F1F708141FC81434
3,498,706 UART: [art] PUB.Y = 232B0F72C484F83A59AB21524CAE27D0BB0D8E42AF5773F82E4A402DC63E33287875B7256123EC43A608DCF3CC6EF9E5
3,505,655 UART: [art] SIG.R = 57B41AC5794F94EAA5E16E7E475E86FA1736F6D52EF86C690868A75D0387D28C61076F58FC60723523DC35A132603125
3,512,410 UART: [art] SIG.S = A46DF5D141209DFAD84831DFE47358D9485CFF1BF900ECF170BA4654E6F179CD8BBCD015B53E53EE9953456D1DE0DAFC
3,536,346 UART: Caliptra RT
3,536,597 UART: [state] CFI Enabled
3,656,857 UART: [rt] RT listening for mailbox commands...
3,657,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,951 UART: [rt]cmd =0x44504543, len=96
3,879,478 >>> mbox cmd response data (6236 bytes)
3,879,479 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,909,086 UART: [rt]cmd =0x52564348, len=36
3,911,666 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,231 ready_for_fw is high
1,362,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,074 >>> mbox cmd response: success
3,040,969 UART:
3,040,985 UART: Running Caliptra FMC ...
3,041,393 UART:
3,041,447 UART: [state] CFI Enabled
3,051,881 UART: [fht] FMC Alias Private Key: 7
3,170,773 UART: [art] Extend RT PCRs Done
3,171,201 UART: [art] Lock RT PCRs Done
3,172,763 UART: [art] Populate DV Done
3,180,818 UART: [fht] FMC Alias Private Key: 7
3,181,760 UART: [art] Derive CDI
3,182,040 UART: [art] Store in slot 0x4
3,267,760 UART: [art] Derive Key Pair
3,268,120 UART: [art] Store priv key in slot 0x5
3,281,047 UART: [art] Derive Key Pair - Done
3,295,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,998 UART: [art] PUB.X = E881ACE82A1E26AABB8A545F874DFBC500F7921014DF47499E04FA589EED5FDA711CA96357C4501A0C150DA646E9683A
3,318,749 UART: [art] PUB.Y = 64E5354F63BB59FC7B84802724EB8EA72A502556B38007746BB72955B33C341B07682BF755B970B240488CEF62912F93
3,325,683 UART: [art] SIG.R = A366A053C2FF70BE13A6DD799F6E81E8984696EA256E9BEBBCDF9FDC68ECE3E784325B055D078B80E4A2FC10E09B80DF
3,332,467 UART: [art] SIG.S = CBB5DDAE748F2D06EDCC254C2321765E8218EF73330DE05FC73AA445B78849A07BEC0B9AED7DEA4DCD194EC9D31055A0
3,357,036 UART: Caliptra RT
3,357,287 UART: [state] CFI Enabled
3,477,112 UART: [rt] RT listening for mailbox commands...
3,477,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,162 UART: [rt]cmd =0x44504543, len=96
3,700,128 >>> mbox cmd response data (6236 bytes)
3,700,129 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,729,820 UART: [rt]cmd =0x52564348, len=36
3,731,970 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,414 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,020 UART: [kat] SHA2-256
881,951 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,066 UART: [kat] ++
886,218 UART: [kat] sha1
890,444 UART: [kat] SHA2-256
892,382 UART: [kat] SHA2-384
895,073 UART: [kat] SHA2-512-ACC
896,974 UART: [kat] ECC-384
902,529 UART: [kat] HMAC-384Kdf
907,065 UART: [kat] LMS
1,475,261 UART: [kat] --
1,476,394 UART: [cold-reset] ++
1,476,820 UART: [fht] Storing FHT @ 0x50003400
1,479,547 UART: [idev] ++
1,479,715 UART: [idev] CDI.KEYID = 6
1,480,075 UART: [idev] SUBJECT.KEYID = 7
1,480,499 UART: [idev] UDS.KEYID = 0
1,480,844 ready_for_fw is high
1,480,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,423 UART: [idev] Erasing UDS.KEYID = 0
1,505,315 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,839 UART: [idev] --
1,514,964 UART: [ldev] ++
1,515,132 UART: [ldev] CDI.KEYID = 6
1,515,495 UART: [ldev] SUBJECT.KEYID = 5
1,515,921 UART: [ldev] AUTHORITY.KEYID = 7
1,516,384 UART: [ldev] FE.KEYID = 1
1,521,688 UART: [ldev] Erasing FE.KEYID = 1
1,546,461 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,627 UART: [ldev] --
1,586,098 UART: [fwproc] Waiting for Commands...
1,586,939 UART: [fwproc] Received command 0x46574c44
1,587,730 UART: [fwproc] Received Image of size 118548 bytes
2,933,254 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,114 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,332 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,689 >>> mbox cmd response: success
3,132,873 UART: [afmc] ++
3,133,041 UART: [afmc] CDI.KEYID = 6
3,133,403 UART: [afmc] SUBJECT.KEYID = 7
3,133,828 UART: [afmc] AUTHORITY.KEYID = 5
3,168,763 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,233 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,013 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,722 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,605 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,288 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,244 UART: [afmc] --
3,212,358 UART: [cold-reset] --
3,213,270 UART: [state] Locking Datavault
3,214,249 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,853 UART: [state] Locking ICCM
3,215,519 UART: [exit] Launching FMC @ 0x40000130
3,220,849 UART:
3,220,865 UART: Running Caliptra FMC ...
3,221,273 UART:
3,221,416 UART: [state] CFI Enabled
3,231,944 UART: [fht] FMC Alias Private Key: 7
3,351,442 UART: [art] Extend RT PCRs Done
3,351,870 UART: [art] Lock RT PCRs Done
3,353,076 UART: [art] Populate DV Done
3,361,461 UART: [fht] FMC Alias Private Key: 7
3,362,487 UART: [art] Derive CDI
3,362,767 UART: [art] Store in slot 0x4
3,448,285 UART: [art] Derive Key Pair
3,448,645 UART: [art] Store priv key in slot 0x5
3,462,082 UART: [art] Derive Key Pair - Done
3,476,930 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,346 UART: [art] PUB.X = 2F6ED34A26C8CE2BB0ADC06C84764F88A85377FB02FC6C12635D74CB60DC02EA46DE8223223AF0E9725B1D0C3734A749
3,500,117 UART: [art] PUB.Y = 16092DD46D717FA864474346A0D97ECC5A67AC71FDA688C280FF0B9FBB44CA77310D799606C33EE9A16BF336E470E39C
3,507,063 UART: [art] SIG.R = 721EDA628C9F495B916D8F7842521AA6679013E881C2DA05FE667DCC2C7D8C6DE84E137A7AC73C179D5B45FBA2518A35
3,513,838 UART: [art] SIG.S = 27642A22B7516EBDA18B2FD0D15CB34B72AEE6DF4CD7345181D8CE5CB5C2C06F9A2EC76E4D9D22D8CDA4C9236874F0D4
3,537,964 UART: Caliptra RT
3,538,307 UART: [state] CFI Enabled
3,658,482 UART: [rt] RT listening for mailbox commands...
3,659,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,414 UART: [rt]cmd =0x44504543, len=96
3,881,283 >>> mbox cmd response data (6236 bytes)
3,881,284 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,781 UART: [rt]cmd =0x52564348, len=36
3,913,303 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,082 ready_for_fw is high
1,363,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,719 >>> mbox cmd response: success
3,043,354 UART:
3,043,370 UART: Running Caliptra FMC ...
3,043,778 UART:
3,043,921 UART: [state] CFI Enabled
3,054,655 UART: [fht] FMC Alias Private Key: 7
3,173,517 UART: [art] Extend RT PCRs Done
3,173,945 UART: [art] Lock RT PCRs Done
3,175,305 UART: [art] Populate DV Done
3,183,704 UART: [fht] FMC Alias Private Key: 7
3,184,848 UART: [art] Derive CDI
3,185,128 UART: [art] Store in slot 0x4
3,270,590 UART: [art] Derive Key Pair
3,270,950 UART: [art] Store priv key in slot 0x5
3,284,531 UART: [art] Derive Key Pair - Done
3,299,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,598 UART: [art] PUB.X = 198680294E2AE2F89118305E1BC8B331FA9A028753516139DA875D892BA9138570FD105E51C37E05D5682A0FFE5F8363
3,322,351 UART: [art] PUB.Y = 2F768807203A41A45BFE75F35E5115AF70AB4833E37D3628E7DECB97525C60656BE92B8FD8E939E3884858C00740400F
3,329,288 UART: [art] SIG.R = 17290F938EE8E5261ECE8E00FF1A6F82467993B0056A416F68680DC3F8E6716A09AB0DD48531535467D3D3CCE1BEEEA2
3,336,027 UART: [art] SIG.S = 4DA2E8D72BAA7040F51D8BBF2FAB54181D199956BE608CAAD266CAA98AA35CF4CB87D4A915FD3D7833134E08150E6E99
3,359,277 UART: Caliptra RT
3,359,620 UART: [state] CFI Enabled
3,479,041 UART: [rt] RT listening for mailbox commands...
3,479,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,925 UART: [rt]cmd =0x44504543, len=96
3,701,542 >>> mbox cmd response data (6236 bytes)
3,701,543 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,731,148 UART: [rt]cmd =0x52564348, len=36
3,733,966 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,029 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [kat] SHA2-256
890,870 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,974 UART: [kat] ++
895,126 UART: [kat] sha1
899,580 UART: [kat] SHA2-256
901,520 UART: [kat] SHA2-384
904,315 UART: [kat] SHA2-512-ACC
906,216 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,170,090 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,360 UART: [idev] ++
1,173,528 UART: [idev] CDI.KEYID = 6
1,173,889 UART: [idev] SUBJECT.KEYID = 7
1,174,314 UART: [idev] UDS.KEYID = 0
1,174,660 ready_for_fw is high
1,174,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,127 UART: [idev] Erasing UDS.KEYID = 0
1,198,905 UART: [idev] Sha1 KeyId Algorithm
1,207,731 UART: [idev] --
1,208,768 UART: [ldev] ++
1,208,936 UART: [ldev] CDI.KEYID = 6
1,209,300 UART: [ldev] SUBJECT.KEYID = 5
1,209,727 UART: [ldev] AUTHORITY.KEYID = 7
1,210,190 UART: [ldev] FE.KEYID = 1
1,215,300 UART: [ldev] Erasing FE.KEYID = 1
1,241,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,504 UART: [ldev] --
1,280,893 UART: [fwproc] Wait for Commands...
1,281,540 UART: [fwproc] Recv command 0x46574c44
1,282,273 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,241 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,416 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,673 >>> mbox cmd response: success
2,826,775 UART: [afmc] ++
2,826,943 UART: [afmc] CDI.KEYID = 6
2,827,306 UART: [afmc] SUBJECT.KEYID = 7
2,827,732 UART: [afmc] AUTHORITY.KEYID = 5
2,862,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,863 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,573 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,454 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,155 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,874 UART: [afmc] --
2,905,889 UART: [cold-reset] --
2,906,453 UART: [state] Locking Datavault
2,907,406 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,010 UART: [state] Locking ICCM
2,908,490 UART: [exit] Launching FMC @ 0x40000130
2,913,820 UART:
2,913,836 UART: Running Caliptra FMC ...
2,914,244 UART:
2,914,298 UART: [state] CFI Enabled
2,924,506 UART: [fht] FMC Alias Private Key: 7
3,043,784 UART: [art] Extend RT PCRs Done
3,044,212 UART: [art] Lock RT PCRs Done
3,045,688 UART: [art] Populate DV Done
3,054,095 UART: [fht] FMC Alias Private Key: 7
3,055,103 UART: [art] Derive CDI
3,055,383 UART: [art] Store in slot 0x4
3,141,204 UART: [art] Derive Key Pair
3,141,564 UART: [art] Store priv key in slot 0x5
3,154,390 UART: [art] Derive Key Pair - Done
3,169,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,415 UART: [art] PUB.X = 7A00585E92D6C7CE70BE76DEEF60E031C9033AF9E7C7707827103602F339A0A55D2A2680E2D42F6FEAE466EC348A9563
3,192,161 UART: [art] PUB.Y = 8FFBA5B35A40C5DDDC267AF18F1D5265DC1DCAAB7C57766CD5EF71CB46EFEB170910D78735BC33F6E8A2764B65988844
3,199,126 UART: [art] SIG.R = 0015EBC5ECF78BCBBABCE7462609D961327D0CEC051B727ABFC3FDE792F164B578715E140D5AF0BC248DCF519788D0A3
3,205,880 UART: [art] SIG.S = ACE96B0972168F50BC2EC7E569954BC806B63DF7DE07FACEF323EFD1EE6608896868E37030DFFD45201B8FF2F3E7EBCE
3,229,152 UART: Caliptra RT
3,229,403 UART: [state] CFI Enabled
3,348,836 UART: [rt] RT listening for mailbox commands...
3,349,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,592 UART: [rt]cmd =0x44504543, len=96
3,571,479 >>> mbox cmd response data (6236 bytes)
3,571,480 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,600,787 UART: [rt]cmd =0x52564348, len=36
3,603,071 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,876 ready_for_fw is high
1,058,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,268 >>> mbox cmd response: success
2,737,915 UART:
2,737,931 UART: Running Caliptra FMC ...
2,738,339 UART:
2,738,393 UART: [state] CFI Enabled
2,748,903 UART: [fht] FMC Alias Private Key: 7
2,867,753 UART: [art] Extend RT PCRs Done
2,868,181 UART: [art] Lock RT PCRs Done
2,869,831 UART: [art] Populate DV Done
2,878,052 UART: [fht] FMC Alias Private Key: 7
2,879,136 UART: [art] Derive CDI
2,879,416 UART: [art] Store in slot 0x4
2,965,231 UART: [art] Derive Key Pair
2,965,591 UART: [art] Store priv key in slot 0x5
2,978,573 UART: [art] Derive Key Pair - Done
2,993,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,601 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,366 UART: [art] PUB.X = ECA5967BF29BAF4E189D86048A2743E0072479CAA69636093A5D417D617E2F98D278C97A2A54F57F51CF18A31FE46143
3,016,127 UART: [art] PUB.Y = 462FB225162F86ECB76BC6B686402D6DB95AC6BB8C73D62F6627FFD2224BE73AF0A909582042ED896AF394A293D3ECEE
3,023,086 UART: [art] SIG.R = 7F4177FF9752DE3E1A2C7956376524845549221F5EEFF079E0ABE982023A632057B5754E1180D4AE305018D7C51DD5FA
3,029,849 UART: [art] SIG.S = 1CFF79E66BCFBCAB1F29BB75BFCE7D4228967AA41C9C9AD7CC04EE9D6F17DAC7233DD777D09E3C1FA9A05396C72C410F
3,053,421 UART: Caliptra RT
3,053,672 UART: [state] CFI Enabled
3,172,190 UART: [rt] RT listening for mailbox commands...
3,172,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,354 UART: [rt]cmd =0x44504543, len=96
3,395,973 >>> mbox cmd response data (6236 bytes)
3,395,974 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,425,783 UART: [rt]cmd =0x52564348, len=36
3,428,803 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
891,513 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
899,979 UART: [kat] SHA2-256
901,919 UART: [kat] SHA2-384
904,760 UART: [kat] SHA2-512-ACC
906,661 UART: [kat] ECC-384
916,856 UART: [kat] HMAC-384Kdf
921,280 UART: [kat] LMS
1,169,592 UART: [kat] --
1,170,333 UART: [cold-reset] ++
1,170,711 UART: [fht] FHT @ 0x50003400
1,173,403 UART: [idev] ++
1,173,571 UART: [idev] CDI.KEYID = 6
1,173,932 UART: [idev] SUBJECT.KEYID = 7
1,174,357 UART: [idev] UDS.KEYID = 0
1,174,703 ready_for_fw is high
1,174,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,546 UART: [idev] Erasing UDS.KEYID = 0
1,199,856 UART: [idev] Sha1 KeyId Algorithm
1,208,674 UART: [idev] --
1,209,619 UART: [ldev] ++
1,209,787 UART: [ldev] CDI.KEYID = 6
1,210,151 UART: [ldev] SUBJECT.KEYID = 5
1,210,578 UART: [ldev] AUTHORITY.KEYID = 7
1,211,041 UART: [ldev] FE.KEYID = 1
1,216,449 UART: [ldev] Erasing FE.KEYID = 1
1,242,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,709 UART: [ldev] --
1,282,040 UART: [fwproc] Wait for Commands...
1,282,635 UART: [fwproc] Recv command 0x46574c44
1,283,368 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,194 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,369 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,558 >>> mbox cmd response: success
2,827,608 UART: [afmc] ++
2,827,776 UART: [afmc] CDI.KEYID = 6
2,828,139 UART: [afmc] SUBJECT.KEYID = 7
2,828,565 UART: [afmc] AUTHORITY.KEYID = 5
2,864,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,374 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,084 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,965 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,666 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,577 UART: [afmc] --
2,907,550 UART: [cold-reset] --
2,908,422 UART: [state] Locking Datavault
2,909,651 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,255 UART: [state] Locking ICCM
2,910,859 UART: [exit] Launching FMC @ 0x40000130
2,916,189 UART:
2,916,205 UART: Running Caliptra FMC ...
2,916,613 UART:
2,916,756 UART: [state] CFI Enabled
2,927,338 UART: [fht] FMC Alias Private Key: 7
3,047,328 UART: [art] Extend RT PCRs Done
3,047,756 UART: [art] Lock RT PCRs Done
3,049,586 UART: [art] Populate DV Done
3,057,901 UART: [fht] FMC Alias Private Key: 7
3,058,837 UART: [art] Derive CDI
3,059,117 UART: [art] Store in slot 0x4
3,144,824 UART: [art] Derive Key Pair
3,145,184 UART: [art] Store priv key in slot 0x5
3,158,536 UART: [art] Derive Key Pair - Done
3,173,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,799 UART: [art] PUB.X = 17E35546BA6F09F73CC03448370B3A5B0930C84CEB6AEFDF41CE2526DB3C6C7D57E08B241147D42396710EF5E36900AF
3,196,541 UART: [art] PUB.Y = C949974F641957F41ED92587D3D8DB51960520D63F610023AA37C07B7FE7FE1D4DE44F9EDB2BC455093C2DE70E365686
3,203,462 UART: [art] SIG.R = 6EA7E55A177DDB9F175D906A6119B3FF088437B752995D6516CAAB337C050FD8416666A6E26C2F411BD511FAB41D286F
3,210,227 UART: [art] SIG.S = FE3B328BF28FC9D1CED409873CFD6A6180D0ED76E3B09FDCD373895EC0E54B9C63FEF971B4DE71E3DD2A174B3CF592FF
3,234,352 UART: Caliptra RT
3,234,695 UART: [state] CFI Enabled
3,355,668 UART: [rt] RT listening for mailbox commands...
3,356,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,904 UART: [rt]cmd =0x44504543, len=96
3,580,728 >>> mbox cmd response data (6236 bytes)
3,580,729 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,340 UART: [rt]cmd =0x52564348, len=36
3,612,968 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,701 ready_for_fw is high
1,058,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,559 >>> mbox cmd response: success
2,740,594 UART:
2,740,610 UART: Running Caliptra FMC ...
2,741,018 UART:
2,741,161 UART: [state] CFI Enabled
2,751,877 UART: [fht] FMC Alias Private Key: 7
2,871,315 UART: [art] Extend RT PCRs Done
2,871,743 UART: [art] Lock RT PCRs Done
2,873,323 UART: [art] Populate DV Done
2,881,756 UART: [fht] FMC Alias Private Key: 7
2,882,684 UART: [art] Derive CDI
2,882,964 UART: [art] Store in slot 0x4
2,968,361 UART: [art] Derive Key Pair
2,968,721 UART: [art] Store priv key in slot 0x5
2,982,457 UART: [art] Derive Key Pair - Done
2,997,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,856 UART: [art] PUB.X = 3F477B26946AC573A5FA3447783DD4C53E05A3F1D8D2F4A5E72B8FCCADFBF2C04ED1CE9C60B228D822A2CDBC5AEE427A
3,020,649 UART: [art] PUB.Y = 54A60C37F33400494F3F111D3AEC554A625F89062D984A9DA4B85EFC401943D0CEA311420C742DF22C33C16EB1BDF818
3,027,572 UART: [art] SIG.R = 389FCD08D1D087BC4366A4CF9D67C7D9E639F0F995F7CB205B6BE8B8BF7ACE9CDE01B0288E341795D119DD17FD132886
3,034,350 UART: [art] SIG.S = 6B4FDB808441E220508DA90BD995F4D848098D5367C01ACC3870691D847AED91D28D0ED08021BE31F40C9213A5F3D1F0
3,057,894 UART: Caliptra RT
3,058,237 UART: [state] CFI Enabled
3,178,601 UART: [rt] RT listening for mailbox commands...
3,179,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,321 UART: [rt]cmd =0x44504543, len=96
3,401,179 >>> mbox cmd response data (6236 bytes)
3,401,180 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,977 UART: [rt]cmd =0x52564348, len=36
3,433,683 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
893,292 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,417 UART: [kat] ++
897,569 UART: [kat] sha1
901,627 UART: [kat] SHA2-256
903,567 UART: [kat] SHA2-384
906,372 UART: [kat] SHA2-512-ACC
908,273 UART: [kat] ECC-384
918,068 UART: [kat] HMAC-384Kdf
922,674 UART: [kat] LMS
1,171,002 UART: [kat] --
1,171,951 UART: [cold-reset] ++
1,172,281 UART: [fht] FHT @ 0x50003400
1,174,794 UART: [idev] ++
1,174,962 UART: [idev] CDI.KEYID = 6
1,175,322 UART: [idev] SUBJECT.KEYID = 7
1,175,746 UART: [idev] UDS.KEYID = 0
1,176,091 ready_for_fw is high
1,176,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,874 UART: [idev] Erasing UDS.KEYID = 0
1,200,577 UART: [idev] Sha1 KeyId Algorithm
1,209,023 UART: [idev] --
1,210,107 UART: [ldev] ++
1,210,275 UART: [ldev] CDI.KEYID = 6
1,210,638 UART: [ldev] SUBJECT.KEYID = 5
1,211,064 UART: [ldev] AUTHORITY.KEYID = 7
1,211,527 UART: [ldev] FE.KEYID = 1
1,216,713 UART: [ldev] Erasing FE.KEYID = 1
1,242,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,301 UART: [ldev] --
1,281,746 UART: [fwproc] Wait for Commands...
1,282,478 UART: [fwproc] Recv command 0x46574c44
1,283,206 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,886 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,056 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,297 >>> mbox cmd response: success
2,827,375 UART: [afmc] ++
2,827,543 UART: [afmc] CDI.KEYID = 6
2,827,905 UART: [afmc] SUBJECT.KEYID = 7
2,828,330 UART: [afmc] AUTHORITY.KEYID = 5
2,863,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,084 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,793 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,676 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,377 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,283 UART: [afmc] --
2,907,243 UART: [cold-reset] --
2,908,037 UART: [state] Locking Datavault
2,909,188 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,792 UART: [state] Locking ICCM
2,910,220 UART: [exit] Launching FMC @ 0x40000130
2,915,550 UART:
2,915,566 UART: Running Caliptra FMC ...
2,915,974 UART:
2,916,028 UART: [state] CFI Enabled
2,926,220 UART: [fht] FMC Alias Private Key: 7
3,045,324 UART: [art] Extend RT PCRs Done
3,045,752 UART: [art] Lock RT PCRs Done
3,047,264 UART: [art] Populate DV Done
3,055,261 UART: [fht] FMC Alias Private Key: 7
3,056,197 UART: [art] Derive CDI
3,056,477 UART: [art] Store in slot 0x4
3,142,570 UART: [art] Derive Key Pair
3,142,930 UART: [art] Store priv key in slot 0x5
3,156,020 UART: [art] Derive Key Pair - Done
3,170,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,005 UART: [art] PUB.X = 3BDD375ADB01250CD0CF8E050C48D5804706446B66B560C965B71B603C39729556C1FAACAFADA8D0AC395558C0001C3B
3,193,746 UART: [art] PUB.Y = A8C0817B3B8CB75825619E91F61C37E162641CD4658D3E128B1566DDF005342B378E7A6B3BE91FDC04C0308A2DBD2C78
3,200,694 UART: [art] SIG.R = 43679BEFC15DEEEE24816EEE88EB70B4125789BBBE833088C2C037AA0F9F903168CABCDD96C73CDFD81DFF2EA71FE25D
3,207,487 UART: [art] SIG.S = 2CE960F0870BC482C46CB6E1D0EE5B13510CB614DF1E86E3D45D1A5DA9B89EE35682DD16380CA7E2ABAAA2F73CE267EC
3,230,920 UART: Caliptra RT
3,231,171 UART: [state] CFI Enabled
3,350,243 UART: [rt] RT listening for mailbox commands...
3,350,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,307 UART: [rt]cmd =0x44504543, len=96
3,571,833 >>> mbox cmd response data (6236 bytes)
3,571,834 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,421 UART: [rt]cmd =0x52564348, len=36
3,604,053 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,777 ready_for_fw is high
1,060,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,768 >>> mbox cmd response: success
2,742,447 UART:
2,742,463 UART: Running Caliptra FMC ...
2,742,871 UART:
2,742,925 UART: [state] CFI Enabled
2,753,583 UART: [fht] FMC Alias Private Key: 7
2,873,211 UART: [art] Extend RT PCRs Done
2,873,639 UART: [art] Lock RT PCRs Done
2,875,489 UART: [art] Populate DV Done
2,883,588 UART: [fht] FMC Alias Private Key: 7
2,884,684 UART: [art] Derive CDI
2,884,964 UART: [art] Store in slot 0x4
2,970,733 UART: [art] Derive Key Pair
2,971,093 UART: [art] Store priv key in slot 0x5
2,984,045 UART: [art] Derive Key Pair - Done
2,998,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,020 UART: [art] PUB.X = 71BA00CA75A9510AB0ADC8D1B56A5D9D86562B95466275DB7249FCACD1C8060DEF2989041BD2063746C40CCD1DED824B
3,021,762 UART: [art] PUB.Y = 9FDB91C30F0875C2F5C091281FFA25DE9A47BD729AB89D21F2883E43BDC3F5D0427606D086131D7A2E6D467EF5138DA2
3,028,711 UART: [art] SIG.R = 7B92BCAEC4AB8B728B1744F130879ED73BF427F774E2198B874FB96E986E32D29955D24760ED144AB31434230BBB4A0F
3,035,479 UART: [art] SIG.S = 6C20955D3D4F4F2129E484074020D653E98F37E8EDF6EB9F10D8A6F2FFA42F175F976936F008B57EF5CDF37CA9AB9EF5
3,059,129 UART: Caliptra RT
3,059,380 UART: [state] CFI Enabled
3,178,834 UART: [rt] RT listening for mailbox commands...
3,179,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,880 UART: [rt]cmd =0x44504543, len=96
3,401,699 >>> mbox cmd response data (6236 bytes)
3,401,700 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,115 UART: [rt]cmd =0x52564348, len=36
3,433,499 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
893,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,864 UART: [kat] ++
898,016 UART: [kat] sha1
902,158 UART: [kat] SHA2-256
904,098 UART: [kat] SHA2-384
906,709 UART: [kat] SHA2-512-ACC
908,610 UART: [kat] ECC-384
918,487 UART: [kat] HMAC-384Kdf
923,055 UART: [kat] LMS
1,171,383 UART: [kat] --
1,172,582 UART: [cold-reset] ++
1,172,912 UART: [fht] FHT @ 0x50003400
1,175,613 UART: [idev] ++
1,175,781 UART: [idev] CDI.KEYID = 6
1,176,141 UART: [idev] SUBJECT.KEYID = 7
1,176,565 UART: [idev] UDS.KEYID = 0
1,176,910 ready_for_fw is high
1,176,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,473 UART: [idev] Erasing UDS.KEYID = 0
1,201,612 UART: [idev] Sha1 KeyId Algorithm
1,210,280 UART: [idev] --
1,211,468 UART: [ldev] ++
1,211,636 UART: [ldev] CDI.KEYID = 6
1,211,999 UART: [ldev] SUBJECT.KEYID = 5
1,212,425 UART: [ldev] AUTHORITY.KEYID = 7
1,212,888 UART: [ldev] FE.KEYID = 1
1,218,254 UART: [ldev] Erasing FE.KEYID = 1
1,244,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,498 UART: [ldev] --
1,283,885 UART: [fwproc] Wait for Commands...
1,284,687 UART: [fwproc] Recv command 0x46574c44
1,285,415 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,521 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,691 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,964 >>> mbox cmd response: success
2,830,184 UART: [afmc] ++
2,830,352 UART: [afmc] CDI.KEYID = 6
2,830,714 UART: [afmc] SUBJECT.KEYID = 7
2,831,139 UART: [afmc] AUTHORITY.KEYID = 5
2,867,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,647 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,356 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,239 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,940 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,702 UART: [afmc] --
2,910,812 UART: [cold-reset] --
2,911,702 UART: [state] Locking Datavault
2,912,915 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,519 UART: [state] Locking ICCM
2,914,111 UART: [exit] Launching FMC @ 0x40000130
2,919,441 UART:
2,919,457 UART: Running Caliptra FMC ...
2,919,865 UART:
2,920,008 UART: [state] CFI Enabled
2,930,718 UART: [fht] FMC Alias Private Key: 7
3,050,034 UART: [art] Extend RT PCRs Done
3,050,462 UART: [art] Lock RT PCRs Done
3,051,974 UART: [art] Populate DV Done
3,060,285 UART: [fht] FMC Alias Private Key: 7
3,061,371 UART: [art] Derive CDI
3,061,651 UART: [art] Store in slot 0x4
3,147,500 UART: [art] Derive Key Pair
3,147,860 UART: [art] Store priv key in slot 0x5
3,161,420 UART: [art] Derive Key Pair - Done
3,176,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,946 UART: [art] PUB.X = A71E9A5A1BE15C2414C0E7D629DC6B88F9A2EE3E1C9F5D378A5739B59E7710C52A7D54F2124DCD7F69A46CAEB40A857D
3,199,729 UART: [art] PUB.Y = 116E706A75C01588559E63482494EB51330DC8B924E0F1A1C43BE91EE0454A8A61F0A615BD4B34BB56C541457482FC32
3,206,672 UART: [art] SIG.R = A001D8D4F2AF5AF54DE0AB24F0FF872DE2C2F68E7D40446CE03F3DA78F6A9B79248642C4BCA631315B5A912251DFEEDC
3,213,459 UART: [art] SIG.S = 737A15FA74B705670C9D6E4BE03470EB34AEBF85A04A839599478775D45F24945D8151867B383CBDF534DECFF9DFB367
3,236,993 UART: Caliptra RT
3,237,336 UART: [state] CFI Enabled
3,356,671 UART: [rt] RT listening for mailbox commands...
3,357,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,799 UART: [rt]cmd =0x44504543, len=96
3,580,407 >>> mbox cmd response data (6236 bytes)
3,580,408 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,689 UART: [rt]cmd =0x52564348, len=36
3,612,309 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,996 ready_for_fw is high
1,060,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,567 >>> mbox cmd response: success
2,743,720 UART:
2,743,736 UART: Running Caliptra FMC ...
2,744,144 UART:
2,744,287 UART: [state] CFI Enabled
2,754,977 UART: [fht] FMC Alias Private Key: 7
2,874,141 UART: [art] Extend RT PCRs Done
2,874,569 UART: [art] Lock RT PCRs Done
2,876,199 UART: [art] Populate DV Done
2,884,424 UART: [fht] FMC Alias Private Key: 7
2,885,484 UART: [art] Derive CDI
2,885,764 UART: [art] Store in slot 0x4
2,972,079 UART: [art] Derive Key Pair
2,972,439 UART: [art] Store priv key in slot 0x5
2,986,725 UART: [art] Derive Key Pair - Done
3,001,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,553 UART: [art] PUB.X = 856F18FE391E1FCF3115BDED5017C3B45099149D7105F427035F07CFE28E3821F1A3006316FA11CF78BC13CCE208561F
3,024,291 UART: [art] PUB.Y = A393B6365DEF8CF9FF83434728AAE9D8D5A280A188FF57DE9A90674BEE35B2C0E1F3821033ECD94077C139933AE840A6
3,031,249 UART: [art] SIG.R = 3CD13B040BB56F49B88F1A6FB80BC02846066F4F340CC9D5EF264102BA82DA1D0BBF90C244A63B41BAC92FA9C33B26B8
3,038,014 UART: [art] SIG.S = 06EF6D977DBE59D259D807005FF37E76E2EA9620D86A6C46A9944E39428AD70249EB261B6E113503E7601C3CBE41C7FE
3,062,188 UART: Caliptra RT
3,062,531 UART: [state] CFI Enabled
3,182,475 UART: [rt] RT listening for mailbox commands...
3,183,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,213,581 UART: [rt]cmd =0x44504543, len=96
3,405,141 >>> mbox cmd response data (6236 bytes)
3,405,142 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,589 UART: [rt]cmd =0x52564348, len=36
3,436,859 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,160 UART:
192,516 UART: Running Caliptra ROM ...
193,698 UART:
193,852 UART: [state] CFI Enabled
268,019 UART: [state] LifecycleState = Unprovisioned
269,948 UART: [state] DebugLocked = No
271,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,149 UART: [kat] SHA2-256
445,860 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,391 UART: [kat] ++
456,880 UART: [kat] sha1
466,891 UART: [kat] SHA2-256
469,597 UART: [kat] SHA2-384
476,382 UART: [kat] SHA2-512-ACC
478,750 UART: [kat] ECC-384
2,769,704 UART: [kat] HMAC-384Kdf
2,799,927 UART: [kat] LMS
3,990,253 UART: [kat] --
3,994,749 UART: [cold-reset] ++
3,995,615 UART: [fht] Storing FHT @ 0x50003400
4,007,233 UART: [idev] ++
4,007,875 UART: [idev] CDI.KEYID = 6
4,008,765 UART: [idev] SUBJECT.KEYID = 7
4,010,011 UART: [idev] UDS.KEYID = 0
4,010,981 ready_for_fw is high
4,011,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,639 UART: [idev] Erasing UDS.KEYID = 0
7,347,763 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,169 UART: [idev] --
7,373,922 UART: [ldev] ++
7,374,491 UART: [ldev] CDI.KEYID = 6
7,375,464 UART: [ldev] SUBJECT.KEYID = 5
7,376,683 UART: [ldev] AUTHORITY.KEYID = 7
7,377,916 UART: [ldev] FE.KEYID = 1
7,421,143 UART: [ldev] Erasing FE.KEYID = 1
10,754,160 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,991 UART: [ldev] --
13,133,882 UART: [fwproc] Waiting for Commands...
13,136,463 UART: [fwproc] Received command 0x46574c44
13,138,665 UART: [fwproc] Received Image of size 118548 bytes
17,237,056 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,313,560 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,386,737 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,715,959 >>> mbox cmd response: success
17,721,039 UART: [afmc] ++
17,721,645 UART: [afmc] CDI.KEYID = 6
17,722,557 UART: [afmc] SUBJECT.KEYID = 7
17,723,772 UART: [afmc] AUTHORITY.KEYID = 5
21,088,387 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,387,431 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,389,695 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,404,142 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,418,885 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,433,302 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,455,835 UART: [afmc] --
23,459,989 UART: [cold-reset] --
23,463,094 UART: [state] Locking Datavault
23,469,370 UART: [state] Locking PCR0, PCR1 and PCR31
23,471,126 UART: [state] Locking ICCM
23,473,463 UART: [exit] Launching FMC @ 0x40000130
23,481,858 UART:
23,482,089 UART: Running Caliptra FMC ...
23,483,118 UART:
23,483,265 UART: [state] CFI Enabled
23,546,934 UART: [fht] FMC Alias Private Key: 7
25,888,032 UART: [art] Extend RT PCRs Done
25,889,256 UART: [art] Lock RT PCRs Done
25,890,758 UART: [art] Populate DV Done
25,896,277 UART: [fht] FMC Alias Private Key: 7
25,897,868 UART: [art] Derive CDI
25,898,605 UART: [art] Store in slot 0x4
25,955,324 UART: [art] Derive Key Pair
25,956,342 UART: [art] Store priv key in slot 0x5
29,249,012 UART: [art] Derive Key Pair - Done
29,261,963 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,722 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,235 UART: [art] PUB.X = B7F7DC002C761606EDECA1DEB1F005DC3C487B37D82AADA51455682E7CC694335B78A469A0494F29472F58FC2B4B456B
31,558,506 UART: [art] PUB.Y = AE4A0244ED71508FC732DAD5A301009E103CC488621F3A87A90D2D8BEB264C86DD5381E59CD7A824893681BCFA06773F
31,565,708 UART: [art] SIG.R = BBB49403AFB831C0F28AEEFD03023E62ACFF45EB01DEDF6F741BB9B339980B0A6B5E9DD85DC318C5E9EA815C5A2E5B00
31,573,117 UART: [art] SIG.S = F9D205785D02BBDDD37B379459AE43FBBDFE5FCD7C5E3A4D19EBF00B08A55A4CF8C7F6461ED7A869DFFD70DBD4996ACD
32,878,407 UART: Caliptra RT
32,879,101 UART: [state] CFI Enabled
33,054,738 UART: [rt] RT listening for mailbox commands...
33,056,630 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,086,663 UART: [rt]cmd =0x52564348, len=36
33,088,694 >>> mbox cmd response: failed
33,088,993 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,118,972 UART: [rt]cmd =0x52564348, len=36
33,121,142 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,784,389 ready_for_fw is high
3,784,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,970,433 >>> mbox cmd response: success
23,671,190 UART:
23,671,588 UART: Running Caliptra FMC ...
23,672,795 UART:
23,672,981 UART: [state] CFI Enabled
23,740,439 UART: [fht] FMC Alias Private Key: 7
26,080,907 UART: [art] Extend RT PCRs Done
26,082,181 UART: [art] Lock RT PCRs Done
26,083,933 UART: [art] Populate DV Done
26,089,372 UART: [fht] FMC Alias Private Key: 7
26,090,925 UART: [art] Derive CDI
26,091,745 UART: [art] Store in slot 0x4
26,149,067 UART: [art] Derive Key Pair
26,150,136 UART: [art] Store priv key in slot 0x5
29,442,877 UART: [art] Derive Key Pair - Done
29,455,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,658 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,161 UART: [art] PUB.X = CAFBF6E6E029C673DC708947F75E3D1A80731ACD182E6B56D4A61C24ADB318FDA6A6C85A8374AEED111D9361F29F3442
31,753,422 UART: [art] PUB.Y = E207C9540A72E48EC3ECE1DA52569067BC1A45FC8CA72B48502053A95F111A185D342930EFC2CDFDE1C59362109976F0
31,760,702 UART: [art] SIG.R = E4BAD06087CFD8A703A4D60A28E7AEFB2408EB68BADBF2665BFECDCE591BD01A9A4AE77C175C9AD19CF5110CFB31124F
31,768,118 UART: [art] SIG.S = ED2F5DEBD1FD58E6E4DA38824064C97EE618CD3CA6D1B8DDADEEFAE346BD608B47091FE46BCB228BDFF30DA1650340F8
33,072,946 UART: Caliptra RT
33,073,673 UART: [state] CFI Enabled
33,251,389 UART: [rt] RT listening for mailbox commands...
33,253,268 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,283,195 UART: [rt]cmd =0x52564348, len=36
33,285,201 >>> mbox cmd response: failed
33,285,531 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,315,432 UART: [rt]cmd =0x52564348, len=36
33,317,469 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,364 UART:
192,754 UART: Running Caliptra ROM ...
193,841 UART:
603,635 UART: [state] CFI Enabled
615,175 UART: [state] LifecycleState = Unprovisioned
617,049 UART: [state] DebugLocked = No
618,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,004 UART: [kat] SHA2-256
792,735 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,245 UART: [kat] ++
803,844 UART: [kat] sha1
814,440 UART: [kat] SHA2-256
817,091 UART: [kat] SHA2-384
821,759 UART: [kat] SHA2-512-ACC
824,124 UART: [kat] ECC-384
3,105,735 UART: [kat] HMAC-384Kdf
3,117,166 UART: [kat] LMS
4,307,228 UART: [kat] --
4,313,368 UART: [cold-reset] ++
4,315,010 UART: [fht] Storing FHT @ 0x50003400
4,326,341 UART: [idev] ++
4,326,907 UART: [idev] CDI.KEYID = 6
4,327,934 UART: [idev] SUBJECT.KEYID = 7
4,329,101 UART: [idev] UDS.KEYID = 0
4,330,162 ready_for_fw is high
4,330,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,479,318 UART: [idev] Erasing UDS.KEYID = 0
7,619,732 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,456 UART: [idev] --
7,643,577 UART: [ldev] ++
7,644,136 UART: [ldev] CDI.KEYID = 6
7,645,065 UART: [ldev] SUBJECT.KEYID = 5
7,646,326 UART: [ldev] AUTHORITY.KEYID = 7
7,647,544 UART: [ldev] FE.KEYID = 1
7,660,207 UART: [ldev] Erasing FE.KEYID = 1
10,951,811 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,341 UART: [ldev] --
13,316,020 UART: [fwproc] Waiting for Commands...
13,317,896 UART: [fwproc] Received command 0x46574c44
13,320,128 UART: [fwproc] Received Image of size 118548 bytes
17,425,541 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,743 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,879 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,126 >>> mbox cmd response: success
17,904,378 UART: [afmc] ++
17,904,987 UART: [afmc] CDI.KEYID = 6
17,905,894 UART: [afmc] SUBJECT.KEYID = 7
17,907,157 UART: [afmc] AUTHORITY.KEYID = 5
21,223,504 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,382 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,827 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,559 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,936 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,303 UART: [afmc] --
23,586,568 UART: [cold-reset] --
23,591,398 UART: [state] Locking Datavault
23,595,500 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,252 UART: [state] Locking ICCM
23,598,588 UART: [exit] Launching FMC @ 0x40000130
23,606,978 UART:
23,607,225 UART: Running Caliptra FMC ...
23,608,323 UART:
23,608,497 UART: [state] CFI Enabled
23,616,213 UART: [fht] FMC Alias Private Key: 7
25,956,108 UART: [art] Extend RT PCRs Done
25,957,326 UART: [art] Lock RT PCRs Done
25,958,949 UART: [art] Populate DV Done
25,964,465 UART: [fht] FMC Alias Private Key: 7
25,966,161 UART: [art] Derive CDI
25,966,901 UART: [art] Store in slot 0x4
26,009,321 UART: [art] Derive Key Pair
26,010,314 UART: [art] Store priv key in slot 0x5
29,252,614 UART: [art] Derive Key Pair - Done
29,265,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,807 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,317 UART: [art] PUB.X = 75885E5BE8D5C98803211B5A02DD8D20C3603649DB472A9B66E650B18CD5EAD949BC6A6346CBB14E45A85E4C6CAA7174
31,554,590 UART: [art] PUB.Y = 666A7A0EF18670E4FF0ED02E12B85C52E003BB5AF1AF4EB3EABEF0C40AC6685C23AF89FAB9F0F77268E6B0F5AB60B76E
31,561,886 UART: [art] SIG.R = 82F8F50B85A84A2280683778DF6F07DBF2BA3CD5B82BF555FB524D418CB8B4B774C4995CD8B59AC23456A4E612EDC1BA
31,569,287 UART: [art] SIG.S = 926A5318420308201C9EC14C582A65000E6CA0C976D3DE7A36F4B6228689B37A176EB75857DDB48BA40B03F77EFA4EC0
32,874,600 UART: Caliptra RT
32,875,319 UART: [state] CFI Enabled
33,007,738 UART: [rt] RT listening for mailbox commands...
33,009,626 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,039,542 UART: [rt]cmd =0x52564348, len=36
33,041,622 >>> mbox cmd response: failed
33,041,917 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,071,653 UART: [rt]cmd =0x52564348, len=36
33,073,552 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,129,639 ready_for_fw is high
4,130,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,153,291 >>> mbox cmd response: success
23,800,101 UART:
23,801,005 UART: Running Caliptra FMC ...
23,802,146 UART:
23,802,388 UART: [state] CFI Enabled
23,809,815 UART: [fht] FMC Alias Private Key: 7
26,149,893 UART: [art] Extend RT PCRs Done
26,151,142 UART: [art] Lock RT PCRs Done
26,152,716 UART: [art] Populate DV Done
26,158,143 UART: [fht] FMC Alias Private Key: 7
26,159,735 UART: [art] Derive CDI
26,160,550 UART: [art] Store in slot 0x4
26,202,662 UART: [art] Derive Key Pair
26,203,693 UART: [art] Store priv key in slot 0x5
29,445,613 UART: [art] Derive Key Pair - Done
29,458,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,302 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,826 UART: [art] PUB.X = BE5DAEE346A2B33620E131FFF5DEE5F951B9C99A9DFF6C1D4083C8C6AE08762F2336BDAFE29D21528908F86C385EEC18
31,748,155 UART: [art] PUB.Y = E41AFB0505DB9F5E62E970223CD4A4EB0410DC0937FFB0C6EBF95C146CFF1C8B40044DA4CA56FEBCC10381BD0F504C1A
31,755,398 UART: [art] SIG.R = 79CDDB3AC8D8E13FF1B3FE855BB19245DA88E877AF68E4CDAC9AFAE8E157F05EA115C68B34EAA6FF8F4DDB7DB89F96FC
31,762,844 UART: [art] SIG.S = 83FF81E01FFF308D1D1470B17CB2D5E0CC404FAA1E76084D26838C8A7ECD9DEA30A9118F49428245166A6BFB55617A9B
33,067,858 UART: Caliptra RT
33,068,564 UART: [state] CFI Enabled
33,201,338 UART: [rt] RT listening for mailbox commands...
33,203,219 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,233,308 UART: [rt]cmd =0x52564348, len=36
33,235,363 >>> mbox cmd response: failed
33,235,694 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,265,589 UART: [rt]cmd =0x52564348, len=36
33,267,544 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,041 UART:
192,404 UART: Running Caliptra ROM ...
193,588 UART:
193,742 UART: [state] CFI Enabled
263,644 UART: [state] LifecycleState = Unprovisioned
265,585 UART: [state] DebugLocked = No
267,834 UART: [state] WD Timer not started. Device not locked for debugging
270,874 UART: [kat] SHA2-256
450,565 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,297 UART: [kat] ++
461,829 UART: [kat] sha1
472,143 UART: [kat] SHA2-256
474,861 UART: [kat] SHA2-384
480,425 UART: [kat] SHA2-512-ACC
482,787 UART: [kat] ECC-384
2,926,731 UART: [kat] HMAC-384Kdf
2,951,196 UART: [kat] LMS
3,427,685 UART: [kat] --
3,431,776 UART: [cold-reset] ++
3,433,427 UART: [fht] FHT @ 0x50003400
3,444,975 UART: [idev] ++
3,445,553 UART: [idev] CDI.KEYID = 6
3,446,583 UART: [idev] SUBJECT.KEYID = 7
3,447,757 UART: [idev] UDS.KEYID = 0
3,448,690 ready_for_fw is high
3,448,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,413 UART: [idev] Erasing UDS.KEYID = 0
5,960,257 UART: [idev] Sha1 KeyId Algorithm
5,985,535 UART: [idev] --
5,989,852 UART: [ldev] ++
5,990,428 UART: [ldev] CDI.KEYID = 6
5,991,343 UART: [ldev] SUBJECT.KEYID = 5
5,992,556 UART: [ldev] AUTHORITY.KEYID = 7
5,993,836 UART: [ldev] FE.KEYID = 1
6,030,836 UART: [ldev] Erasing FE.KEYID = 1
8,536,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,273,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,289,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,305,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,320,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,342,044 UART: [ldev] --
10,346,888 UART: [fwproc] Wait for Commands...
10,349,027 UART: [fwproc] Recv command 0x46574c44
10,351,062 UART: [fwproc] Recv'd Img size: 118548 bytes
13,836,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,917,643 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,990,643 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,319,116 >>> mbox cmd response: success
14,323,629 UART: [afmc] ++
14,324,268 UART: [afmc] CDI.KEYID = 6
14,325,176 UART: [afmc] SUBJECT.KEYID = 7
14,326,387 UART: [afmc] AUTHORITY.KEYID = 5
16,868,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,609,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,611,794 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,627,583 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,643,629 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,659,222 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,684,375 UART: [afmc] --
18,688,187 UART: [cold-reset] --
18,690,373 UART: [state] Locking Datavault
18,695,127 UART: [state] Locking PCR0, PCR1 and PCR31
18,696,872 UART: [state] Locking ICCM
18,698,994 UART: [exit] Launching FMC @ 0x40000130
18,707,385 UART:
18,707,616 UART: Running Caliptra FMC ...
18,708,711 UART:
18,708,865 UART: [state] CFI Enabled
18,768,579 UART: [fht] FMC Alias Private Key: 7
20,535,793 UART: [art] Extend RT PCRs Done
20,537,030 UART: [art] Lock RT PCRs Done
20,538,662 UART: [art] Populate DV Done
20,544,073 UART: [fht] FMC Alias Private Key: 7
20,545,777 UART: [art] Derive CDI
20,546,513 UART: [art] Store in slot 0x4
20,601,473 UART: [art] Derive Key Pair
20,602,511 UART: [art] Store priv key in slot 0x5
23,065,555 UART: [art] Derive Key Pair - Done
23,078,713 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,791,483 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,984 UART: [art] PUB.X = 3E81ADAD1F37E7A1790FC2767E37ECB9C40F42785CE527BB269F556E20BF259A26ABC1183C1E98061D952DE5E799DC23
24,800,235 UART: [art] PUB.Y = EFBB02BD6F8187BA0470D3906A0000853B0FFB9E836582477DE23A51BF5B3C42D8EC038550B141BE259C8560AB230167
24,807,472 UART: [art] SIG.R = 940CB96E51F93D88E5FE30F6D54B363AC077AF6F5CD40D9A0C9B623A6417C609592206378CA7C3AFFDBAA7BC973248EE
24,814,944 UART: [art] SIG.S = A2E34A40D9D562FE6FFC42CD5ECDAB4A26F5FE2B335CA3EA5A29FA7E18B89B25AB15208D6F46C2B2717E395FB7082051
25,793,773 UART: Caliptra RT
25,794,492 UART: [state] CFI Enabled
25,975,600 UART: [rt] RT listening for mailbox commands...
25,977,485 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,007,293 UART: [rt]cmd =0x52564348, len=36
26,009,546 >>> mbox cmd response: failed
26,009,853 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,039,775 UART: [rt]cmd =0x52564348, len=36
26,041,698 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,462,625 ready_for_fw is high
3,463,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,236,642 >>> mbox cmd response: success
18,514,211 UART:
18,514,597 UART: Running Caliptra FMC ...
18,515,699 UART:
18,515,846 UART: [state] CFI Enabled
18,583,313 UART: [fht] FMC Alias Private Key: 7
20,350,064 UART: [art] Extend RT PCRs Done
20,351,302 UART: [art] Lock RT PCRs Done
20,352,929 UART: [art] Populate DV Done
20,358,292 UART: [fht] FMC Alias Private Key: 7
20,359,775 UART: [art] Derive CDI
20,360,533 UART: [art] Store in slot 0x4
20,417,952 UART: [art] Derive Key Pair
20,418,987 UART: [art] Store priv key in slot 0x5
22,881,825 UART: [art] Derive Key Pair - Done
22,894,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,701 UART: [art] Erasing AUTHORITY.KEYID = 7
24,609,208 UART: [art] PUB.X = 2147BB8B49829BDC14C2812154AC7BBDEF8F780207D00E842E62B3C5D152822875B7E5C87255C4B08545097663B4CDF6
24,616,464 UART: [art] PUB.Y = FDA5F8703B1B7A217C5108DADEED4091F4CF480FCE57286991AC6C782E091600276AD35178EAD824C6C5C7D25141F249
24,623,709 UART: [art] SIG.R = 5E545C0B6F799BDBD36143F4F0BA4DC00698B78442F03BE6F70FDF9D8D7F5D4BD50E77A12E1161F4BC9B7E8201E8290A
24,631,110 UART: [art] SIG.S = D75897906B5E723B0146AC5958CD3061162D4416CD6006E839816B494D7D244B425C2311283FF25447BB47667470DA87
25,609,954 UART: Caliptra RT
25,610,652 UART: [state] CFI Enabled
25,792,299 UART: [rt] RT listening for mailbox commands...
25,794,192 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,824,489 UART: [rt]cmd =0x52564348, len=36
25,826,461 >>> mbox cmd response: failed
25,826,752 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,856,667 UART: [rt]cmd =0x52564348, len=36
25,858,668 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,307 writing to cptra_bootfsm_go
193,587 UART:
193,950 UART: Running Caliptra ROM ...
195,054 UART:
604,667 UART: [state] CFI Enabled
617,770 UART: [state] LifecycleState = Unprovisioned
619,723 UART: [state] DebugLocked = No
622,045 UART: [state] WD Timer not started. Device not locked for debugging
626,436 UART: [kat] SHA2-256
806,021 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,829 UART: [kat] ++
817,280 UART: [kat] sha1
828,792 UART: [kat] SHA2-256
831,460 UART: [kat] SHA2-384
837,885 UART: [kat] SHA2-512-ACC
840,258 UART: [kat] ECC-384
3,281,870 UART: [kat] HMAC-384Kdf
3,295,029 UART: [kat] LMS
3,771,514 UART: [kat] --
3,774,539 UART: [cold-reset] ++
3,775,910 UART: [fht] FHT @ 0x50003400
3,786,671 UART: [idev] ++
3,787,233 UART: [idev] CDI.KEYID = 6
3,788,282 UART: [idev] SUBJECT.KEYID = 7
3,789,463 UART: [idev] UDS.KEYID = 0
3,790,393 ready_for_fw is high
3,790,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,455 UART: [idev] Erasing UDS.KEYID = 0
6,263,782 UART: [idev] Sha1 KeyId Algorithm
6,288,300 UART: [idev] --
6,292,510 UART: [ldev] ++
6,293,138 UART: [ldev] CDI.KEYID = 6
6,294,047 UART: [ldev] SUBJECT.KEYID = 5
6,295,214 UART: [ldev] AUTHORITY.KEYID = 7
6,296,503 UART: [ldev] FE.KEYID = 1
6,308,663 UART: [ldev] Erasing FE.KEYID = 1
8,787,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,789 UART: [ldev] --
10,583,170 UART: [fwproc] Wait for Commands...
10,586,401 UART: [fwproc] Recv command 0x46574c44
10,588,389 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,207 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,272 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,545,944 >>> mbox cmd response: success
14,549,436 UART: [afmc] ++
14,550,026 UART: [afmc] CDI.KEYID = 6
14,551,158 UART: [afmc] SUBJECT.KEYID = 7
14,552,267 UART: [afmc] AUTHORITY.KEYID = 5
17,055,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,951 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,781 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,835 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,428 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,288 UART: [afmc] --
18,857,257 UART: [cold-reset] --
18,860,851 UART: [state] Locking Datavault
18,867,557 UART: [state] Locking PCR0, PCR1 and PCR31
18,869,259 UART: [state] Locking ICCM
18,871,575 UART: [exit] Launching FMC @ 0x40000130
18,879,973 UART:
18,880,216 UART: Running Caliptra FMC ...
18,881,533 UART:
18,881,708 UART: [state] CFI Enabled
18,889,412 UART: [fht] FMC Alias Private Key: 7
20,655,322 UART: [art] Extend RT PCRs Done
20,656,563 UART: [art] Lock RT PCRs Done
20,658,219 UART: [art] Populate DV Done
20,663,634 UART: [fht] FMC Alias Private Key: 7
20,665,282 UART: [art] Derive CDI
20,666,018 UART: [art] Store in slot 0x4
20,708,727 UART: [art] Derive Key Pair
20,709,726 UART: [art] Store priv key in slot 0x5
23,136,821 UART: [art] Derive Key Pair - Done
23,149,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,327 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,830 UART: [art] PUB.X = 7BD91D1152B37C9E7F6E966043D15C889A21AC3AF2BF2463998A0F5019BCB33578D3A659A9DE0C3344E80FE81968C433
24,865,074 UART: [art] PUB.Y = CD14ED5C429E404CF629C133B079AE5157D1B3980C935B2D96FC87002C63A69152828A0C1C0C1020C59C400E4D2B2419
24,872,304 UART: [art] SIG.R = 6C2B0DF9BDF4B487B1D5DB985BE6854410965712AA6D2FE7CA403D614D6D6FF53BE52FEDB4B712565DFB92F93A7E901A
24,879,755 UART: [art] SIG.S = 604C905D772F61230E36449BA37ADFC2CA00727549AA49535F205FCF5B6782A05E188349F4627209C55B00A2F656468C
25,858,321 UART: Caliptra RT
25,859,021 UART: [state] CFI Enabled
25,990,958 UART: [rt] RT listening for mailbox commands...
25,992,845 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,023,088 UART: [rt]cmd =0x52564348, len=36
26,024,890 >>> mbox cmd response: failed
26,025,200 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,054,987 UART: [rt]cmd =0x52564348, len=36
26,056,641 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,784,191 ready_for_fw is high
3,784,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,439,214 >>> mbox cmd response: success
18,683,251 UART:
18,683,618 UART: Running Caliptra FMC ...
18,684,730 UART:
18,684,887 UART: [state] CFI Enabled
18,693,047 UART: [fht] FMC Alias Private Key: 7
20,459,368 UART: [art] Extend RT PCRs Done
20,460,586 UART: [art] Lock RT PCRs Done
20,462,511 UART: [art] Populate DV Done
20,468,002 UART: [fht] FMC Alias Private Key: 7
20,469,654 UART: [art] Derive CDI
20,470,395 UART: [art] Store in slot 0x4
20,512,836 UART: [art] Derive Key Pair
20,513,839 UART: [art] Store priv key in slot 0x5
22,940,552 UART: [art] Derive Key Pair - Done
22,953,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,659,701 UART: [art] Erasing AUTHORITY.KEYID = 7
24,661,200 UART: [art] PUB.X = 79B820719FE29B54FAB7ACCB8D8F005F020E08C1079208474E3F80967F3ED62B33BE2D9A6AEE2D2F3C5C7BDF84469752
24,668,451 UART: [art] PUB.Y = C25B718B949CDFB2F70C9C33251B48B4EDD297EBF6A51DD3DA1D47FC3F9470B8C32D186F9D169DF1F53A2A6B5A6C11A7
24,675,708 UART: [art] SIG.R = 63229C5C363BA5591C3840292F500ED2EE7D54B28727D787A058413A231539C03BAF3C59465137BEBFB9250D407C0AC2
24,683,122 UART: [art] SIG.S = E7E7C1E9E9A6A1233F194D9E9D83D2E6069735ACFE8E5CE9BA0987991E990A69A5734747CD4DC527D1F912B8E21A58F6
25,661,620 UART: Caliptra RT
25,662,323 UART: [state] CFI Enabled
25,794,257 UART: [rt] RT listening for mailbox commands...
25,796,153 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,826,299 UART: [rt]cmd =0x52564348, len=36
25,828,413 >>> mbox cmd response: failed
25,828,717 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,858,782 UART: [rt]cmd =0x52564348, len=36
25,860,806 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,181 UART:
192,541 UART: Running Caliptra ROM ...
193,727 UART:
193,886 UART: [state] CFI Enabled
266,799 UART: [state] LifecycleState = Unprovisioned
269,170 UART: [state] DebugLocked = No
270,706 UART: [state] WD Timer not started. Device not locked for debugging
274,742 UART: [kat] SHA2-256
464,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,364 UART: [kat] ++
475,861 UART: [kat] sha1
487,732 UART: [kat] SHA2-256
490,763 UART: [kat] SHA2-384
496,538 UART: [kat] SHA2-512-ACC
499,114 UART: [kat] ECC-384
2,947,059 UART: [kat] HMAC-384Kdf
2,970,921 UART: [kat] LMS
3,502,725 UART: [kat] --
3,508,064 UART: [cold-reset] ++
3,509,925 UART: [fht] FHT @ 0x50003400
3,521,837 UART: [idev] ++
3,522,589 UART: [idev] CDI.KEYID = 6
3,523,505 UART: [idev] SUBJECT.KEYID = 7
3,524,680 UART: [idev] UDS.KEYID = 0
3,525,602 ready_for_fw is high
3,525,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,257 UART: [idev] Erasing UDS.KEYID = 0
6,030,315 UART: [idev] Sha1 KeyId Algorithm
6,053,028 UART: [idev] --
6,057,408 UART: [ldev] ++
6,058,095 UART: [ldev] CDI.KEYID = 6
6,059,011 UART: [ldev] SUBJECT.KEYID = 5
6,060,171 UART: [ldev] AUTHORITY.KEYID = 7
6,061,403 UART: [ldev] FE.KEYID = 1
6,100,476 UART: [ldev] Erasing FE.KEYID = 1
8,609,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,609 UART: [ldev] --
10,412,232 UART: [fwproc] Wait for Commands...
10,414,267 UART: [fwproc] Recv command 0x46574c44
10,416,568 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,833 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,476 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,061 >>> mbox cmd response: success
14,677,518 UART: [afmc] ++
14,678,226 UART: [afmc] CDI.KEYID = 6
14,679,469 UART: [afmc] SUBJECT.KEYID = 7
14,680,907 UART: [afmc] AUTHORITY.KEYID = 5
17,213,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,966 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,099 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,206 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,132 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,225 UART: [afmc] --
19,012,898 UART: [cold-reset] --
19,016,401 UART: [state] Locking Datavault
19,022,088 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,240 UART: [state] Locking ICCM
19,026,614 UART: [exit] Launching FMC @ 0x40000130
19,035,294 UART:
19,035,573 UART: Running Caliptra FMC ...
19,036,688 UART:
19,036,850 UART: [state] CFI Enabled
19,096,291 UART: [fht] FMC Alias Private Key: 7
20,862,341 UART: [art] Extend RT PCRs Done
20,863,568 UART: [art] Lock RT PCRs Done
20,865,245 UART: [art] Populate DV Done
20,870,495 UART: [fht] FMC Alias Private Key: 7
20,872,031 UART: [art] Derive CDI
20,872,992 UART: [art] Store in slot 0x4
20,928,859 UART: [art] Derive Key Pair
20,929,884 UART: [art] Store priv key in slot 0x5
23,392,122 UART: [art] Derive Key Pair - Done
23,405,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,874 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,393 UART: [art] PUB.X = B7F1F022FEED38A9DF065E4AA1785C87258EF3B17678059CCF06BFDC4CC03E1DC6A757FF6EA67C7C9411743771F963DE
25,126,677 UART: [art] PUB.Y = 93C8791F935C7F2926F47AD5F43A78CC76513910372E526F3316A9E32CC109D20E401A8064393E89EA2C3D820685F929
25,133,881 UART: [art] SIG.R = 9E89461923FB974D9B14F7D2080504B158D80602471AB44661AB3023B8E7D6958A1C1D3950B5C84570A2F1E673AC82F5
25,141,254 UART: [art] SIG.S = 4DBF8771E3C98A8BD38A03C046F3FCCC865E1EC76E9398D10D6DD3464F3139EE914BA99CAE2619FE2A273612398C0EDF
26,120,334 UART: Caliptra RT
26,121,028 UART: [state] CFI Enabled
26,301,261 UART: [rt] RT listening for mailbox commands...
26,303,138 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,332,894 UART: [rt]cmd =0x52564348, len=36
26,335,019 >>> mbox cmd response: failed
26,335,415 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,365,427 UART: [rt]cmd =0x52564348, len=36
26,367,416 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,438,661 ready_for_fw is high
3,439,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,148 >>> mbox cmd response: success
19,112,056 UART:
19,112,449 UART: Running Caliptra FMC ...
19,113,644 UART:
19,113,811 UART: [state] CFI Enabled
19,181,388 UART: [fht] FMC Alias Private Key: 7
20,947,977 UART: [art] Extend RT PCRs Done
20,949,204 UART: [art] Lock RT PCRs Done
20,950,624 UART: [art] Populate DV Done
20,956,096 UART: [fht] FMC Alias Private Key: 7
20,957,583 UART: [art] Derive CDI
20,958,343 UART: [art] Store in slot 0x4
21,014,402 UART: [art] Derive Key Pair
21,015,474 UART: [art] Store priv key in slot 0x5
23,478,509 UART: [art] Derive Key Pair - Done
23,491,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,059 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,576 UART: [art] PUB.X = 3CA7146624ED6EDA03EB77205FC2EA3006EE3CD30093997A63ABB68A6E734BA66373EEBCDBAB9489BF512E1A9C7D611B
25,212,849 UART: [art] PUB.Y = ADB23199CE05528C7DDC379101513DB07215D660093AB66A77E0E1B6AB07FCF7ADD6423B6D42FD5D9DB4C360AC5F2D11
25,220,105 UART: [art] SIG.R = A493526DA1F4D222EBD3D56AB90BE624A44EC171EF8C2EFE5124AD4984B0B410510A87DA744BF41D20F7B019B74A6B37
25,227,532 UART: [art] SIG.S = 7C578CA31DFF750533E5DC87A6661F14B546E23A21B443FC13524AD06B6B1BBD2C7ADED0ED22606FEDE2FDF6DC48E748
26,206,984 UART: Caliptra RT
26,207,677 UART: [state] CFI Enabled
26,387,154 UART: [rt] RT listening for mailbox commands...
26,389,047 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,419,024 UART: [rt]cmd =0x52564348, len=36
26,421,114 >>> mbox cmd response: failed
26,421,438 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,451,441 UART: [rt]cmd =0x52564348, len=36
26,453,587 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,553 UART:
192,914 UART: Running Caliptra ROM ...
194,117 UART:
603,639 UART: [state] CFI Enabled
613,506 UART: [state] LifecycleState = Unprovisioned
615,824 UART: [state] DebugLocked = No
618,354 UART: [state] WD Timer not started. Device not locked for debugging
623,741 UART: [kat] SHA2-256
813,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,426 UART: [kat] ++
824,879 UART: [kat] sha1
837,105 UART: [kat] SHA2-256
840,120 UART: [kat] SHA2-384
845,615 UART: [kat] SHA2-512-ACC
848,204 UART: [kat] ECC-384
3,291,379 UART: [kat] HMAC-384Kdf
3,304,058 UART: [kat] LMS
3,835,877 UART: [kat] --
3,841,724 UART: [cold-reset] ++
3,842,734 UART: [fht] FHT @ 0x50003400
3,853,946 UART: [idev] ++
3,854,666 UART: [idev] CDI.KEYID = 6
3,855,703 UART: [idev] SUBJECT.KEYID = 7
3,856,809 UART: [idev] UDS.KEYID = 0
3,857,751 ready_for_fw is high
3,857,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,265 UART: [idev] Erasing UDS.KEYID = 0
6,336,851 UART: [idev] Sha1 KeyId Algorithm
6,359,219 UART: [idev] --
6,364,192 UART: [ldev] ++
6,364,877 UART: [ldev] CDI.KEYID = 6
6,365,767 UART: [ldev] SUBJECT.KEYID = 5
6,366,990 UART: [ldev] AUTHORITY.KEYID = 7
6,368,229 UART: [ldev] FE.KEYID = 1
6,379,557 UART: [ldev] Erasing FE.KEYID = 1
8,858,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,030 UART: [ldev] --
10,649,823 UART: [fwproc] Wait for Commands...
10,652,571 UART: [fwproc] Recv command 0x46574c44
10,654,829 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,230,951 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,550 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,953 >>> mbox cmd response: success
14,919,181 UART: [afmc] ++
14,919,893 UART: [afmc] CDI.KEYID = 6
14,921,090 UART: [afmc] SUBJECT.KEYID = 7
14,922,539 UART: [afmc] AUTHORITY.KEYID = 5
17,429,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,232 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,343 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,515 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,386 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,222,751 UART: [afmc] --
19,225,602 UART: [cold-reset] --
19,228,560 UART: [state] Locking Datavault
19,233,826 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,988 UART: [state] Locking ICCM
19,237,808 UART: [exit] Launching FMC @ 0x40000130
19,246,497 UART:
19,246,732 UART: Running Caliptra FMC ...
19,247,760 UART:
19,247,911 UART: [state] CFI Enabled
19,256,468 UART: [fht] FMC Alias Private Key: 7
21,022,258 UART: [art] Extend RT PCRs Done
21,023,486 UART: [art] Lock RT PCRs Done
21,025,092 UART: [art] Populate DV Done
21,030,571 UART: [fht] FMC Alias Private Key: 7
21,032,169 UART: [art] Derive CDI
21,032,915 UART: [art] Store in slot 0x4
21,075,620 UART: [art] Derive Key Pair
21,076,624 UART: [art] Store priv key in slot 0x5
23,503,288 UART: [art] Derive Key Pair - Done
23,516,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,902 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,424 UART: [art] PUB.X = C925E624A107F4FA204540641E02B9542F1D868200AB8B0E0FB4DE33414B83F40D385E5344CD57BF0DE9CA4A06D08F4D
25,231,646 UART: [art] PUB.Y = 046BFECD37AD4E5FBED0095A952D722CDD336430648988142C6383EFA64195C790825076E3518270A6655EC5FA7FD434
25,238,902 UART: [art] SIG.R = 49A9C67FEB30208D096B59891434E49C62291857BBA703E325FE367BB9965F7C0B9B94E4B36624778AFA3B9B7339D945
25,246,274 UART: [art] SIG.S = 32DF2045B46BCE85BD584D290AF08F111E12EDA8652AFA5446533D62F3750DBB7596C540569245498AEB5B1097749C18
26,224,996 UART: Caliptra RT
26,225,694 UART: [state] CFI Enabled
26,359,325 UART: [rt] RT listening for mailbox commands...
26,361,223 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,391,485 UART: [rt]cmd =0x52564348, len=36
26,393,604 >>> mbox cmd response: failed
26,393,934 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,423,678 UART: [rt]cmd =0x52564348, len=36
26,425,547 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,754,183 ready_for_fw is high
3,754,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,939 >>> mbox cmd response: success
19,289,655 UART:
19,290,066 UART: Running Caliptra FMC ...
19,291,182 UART:
19,291,347 UART: [state] CFI Enabled
19,299,206 UART: [fht] FMC Alias Private Key: 7
21,065,349 UART: [art] Extend RT PCRs Done
21,066,578 UART: [art] Lock RT PCRs Done
21,068,236 UART: [art] Populate DV Done
21,073,554 UART: [fht] FMC Alias Private Key: 7
21,075,157 UART: [art] Derive CDI
21,075,904 UART: [art] Store in slot 0x4
21,118,776 UART: [art] Derive Key Pair
21,119,818 UART: [art] Store priv key in slot 0x5
23,546,469 UART: [art] Derive Key Pair - Done
23,559,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,266,088 UART: [art] Erasing AUTHORITY.KEYID = 7
25,267,593 UART: [art] PUB.X = E0271A279AAE86D11835F9BCF597DCB0DCFB54EE3C5BC415879D826542F89576C6010879F4DAB889F266DE693FB45241
25,274,904 UART: [art] PUB.Y = 8DDAA39F47DC1D80F8199AE98CC9AB16723C0A34FEAE41A1089403CA69A4321EB6C5F417BDC99009F6AA7042B3DF602A
25,282,147 UART: [art] SIG.R = 36948CCD78E85C7CB61619BD522D26A50C81B8074FC352ADB13100DDBA416B576380BDE552613D9B902DC6FCF8B9DE3D
25,289,538 UART: [art] SIG.S = AB08516EF39DB6CBB0327E1FC2ADF2EC7B0B7A66EE1C5E8B9F4A8F03545EF1250F302AB92615F03F440A9EB95D28D993
26,268,599 UART: Caliptra RT
26,269,314 UART: [state] CFI Enabled
26,402,249 UART: [rt] RT listening for mailbox commands...
26,404,134 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,434,063 UART: [rt]cmd =0x52564348, len=36
26,436,146 >>> mbox cmd response: failed
26,436,474 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,466,486 UART: [rt]cmd =0x52564348, len=36
26,468,519 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,612 UART: [state] LifecycleState = Unprovisioned
86,267 UART: [state] DebugLocked = No
86,795 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,515 UART: [kat] SHA2-256
882,446 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,561 UART: [kat] ++
886,713 UART: [kat] sha1
890,853 UART: [kat] SHA2-256
892,791 UART: [kat] SHA2-384
895,586 UART: [kat] SHA2-512-ACC
897,487 UART: [kat] ECC-384
903,130 UART: [kat] HMAC-384Kdf
907,592 UART: [kat] LMS
1,475,788 UART: [kat] --
1,476,827 UART: [cold-reset] ++
1,477,273 UART: [fht] Storing FHT @ 0x50003400
1,480,252 UART: [idev] ++
1,480,420 UART: [idev] CDI.KEYID = 6
1,480,780 UART: [idev] SUBJECT.KEYID = 7
1,481,204 UART: [idev] UDS.KEYID = 0
1,481,549 ready_for_fw is high
1,481,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,168 UART: [idev] Erasing UDS.KEYID = 0
1,505,990 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,514 UART: [idev] --
1,515,589 UART: [ldev] ++
1,515,757 UART: [ldev] CDI.KEYID = 6
1,516,120 UART: [ldev] SUBJECT.KEYID = 5
1,516,546 UART: [ldev] AUTHORITY.KEYID = 7
1,517,009 UART: [ldev] FE.KEYID = 1
1,522,181 UART: [ldev] Erasing FE.KEYID = 1
1,546,952 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,370 UART: [ldev] --
1,586,837 UART: [fwproc] Waiting for Commands...
1,587,490 UART: [fwproc] Received command 0x46574c44
1,588,281 UART: [fwproc] Received Image of size 118548 bytes
2,931,681 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,751 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,969 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,194 >>> mbox cmd response: success
3,131,232 UART: [afmc] ++
3,131,400 UART: [afmc] CDI.KEYID = 6
3,131,762 UART: [afmc] SUBJECT.KEYID = 7
3,132,187 UART: [afmc] AUTHORITY.KEYID = 5
3,167,282 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,570 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,350 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,059 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,942 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,625 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,387 UART: [afmc] --
3,210,509 UART: [cold-reset] --
3,211,367 UART: [state] Locking Datavault
3,212,568 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,172 UART: [state] Locking ICCM
3,213,790 UART: [exit] Launching FMC @ 0x40000130
3,219,120 UART:
3,219,136 UART: Running Caliptra FMC ...
3,219,544 UART:
3,219,598 UART: [state] CFI Enabled
3,230,416 UART: [fht] FMC Alias Private Key: 7
3,349,450 UART: [art] Extend RT PCRs Done
3,349,878 UART: [art] Lock RT PCRs Done
3,351,686 UART: [art] Populate DV Done
3,359,805 UART: [fht] FMC Alias Private Key: 7
3,360,853 UART: [art] Derive CDI
3,361,133 UART: [art] Store in slot 0x4
3,446,417 UART: [art] Derive Key Pair
3,446,777 UART: [art] Store priv key in slot 0x5
3,459,694 UART: [art] Derive Key Pair - Done
3,474,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,704 UART: [art] PUB.X = A1358DF7E1D371C84BC4BAADF922A5546876AFD03ED542E0CA68982DF646AAFC573A84B470FAFE2678C2B321BF9B7572
3,497,490 UART: [art] PUB.Y = E1F9B368ADDA2ED5F9741DBF4170C1E16D7841AB70D7358EA1CD29F7DB91FE83808D6FACABDA3D55D8970DDC357F9732
3,504,459 UART: [art] SIG.R = 108C39C2D90C474D3946D72D074B186BDFD9E6CA6F30FBADA375F434361EF25BAAA9B2E2AB558CEEC863504077CA2C8D
3,511,241 UART: [art] SIG.S = 24BC1565896F479AB2FE29FB4C377604F45B2042D8BDA9E67B6501861963B0BA807401C038A324DEA3D68F0867C74792
3,534,989 UART: Caliptra RT
3,535,240 UART: [state] CFI Enabled
3,655,359 UART: [rt] RT listening for mailbox commands...
3,656,029 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,979 UART: [rt]cmd =0x52564348, len=36
3,687,544 >>> mbox cmd response: failed
3,687,544 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,038 UART: [rt]cmd =0x52564348, len=36
3,718,682 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,859 ready_for_fw is high
1,362,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,106 >>> mbox cmd response: success
3,041,619 UART:
3,041,635 UART: Running Caliptra FMC ...
3,042,043 UART:
3,042,097 UART: [state] CFI Enabled
3,052,619 UART: [fht] FMC Alias Private Key: 7
3,172,157 UART: [art] Extend RT PCRs Done
3,172,585 UART: [art] Lock RT PCRs Done
3,174,275 UART: [art] Populate DV Done
3,182,480 UART: [fht] FMC Alias Private Key: 7
3,183,492 UART: [art] Derive CDI
3,183,772 UART: [art] Store in slot 0x4
3,269,030 UART: [art] Derive Key Pair
3,269,390 UART: [art] Store priv key in slot 0x5
3,282,455 UART: [art] Derive Key Pair - Done
3,297,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,522 UART: [art] PUB.X = 6B36D77FF04002984E2AED764217449052EF27EC1BD7C4E6B484A0FBFC9AA4F1FBD947DFD71DCC464B4BC5C5FDF85F8B
3,320,313 UART: [art] PUB.Y = 96C05E2691FBE681C077667914564D1846C32ACF9902162838F03A0AAF05D4E0E79CA0A3BF3DE6107A382F9F0169178D
3,327,249 UART: [art] SIG.R = CA2DC7206A58F52A52FC48A1296E4C099BD0D94C1C1AE6C4139C0C929BA8148F0C58E54036DAD561A0A4C7CB7A6CEBFD
3,334,030 UART: [art] SIG.S = 8C580913F69FBB2ED8128CA4797ABAEF64E914FDB0A0A2122528B5C531C366887F49327D1C52EF8A87E8FCF63E890528
3,358,414 UART: Caliptra RT
3,358,665 UART: [state] CFI Enabled
3,478,772 UART: [rt] RT listening for mailbox commands...
3,479,442 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,246 UART: [rt]cmd =0x52564348, len=36
3,510,961 >>> mbox cmd response: failed
3,510,961 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,637 UART: [rt]cmd =0x52564348, len=36
3,542,163 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,330 UART: [kat] SHA2-256
882,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,376 UART: [kat] ++
886,528 UART: [kat] sha1
890,690 UART: [kat] SHA2-256
892,628 UART: [kat] SHA2-384
895,565 UART: [kat] SHA2-512-ACC
897,466 UART: [kat] ECC-384
903,263 UART: [kat] HMAC-384Kdf
907,937 UART: [kat] LMS
1,476,133 UART: [kat] --
1,477,024 UART: [cold-reset] ++
1,477,432 UART: [fht] Storing FHT @ 0x50003400
1,480,045 UART: [idev] ++
1,480,213 UART: [idev] CDI.KEYID = 6
1,480,573 UART: [idev] SUBJECT.KEYID = 7
1,480,997 UART: [idev] UDS.KEYID = 0
1,481,342 ready_for_fw is high
1,481,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,635 UART: [idev] Erasing UDS.KEYID = 0
1,505,137 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,707 UART: [idev] --
1,514,956 UART: [ldev] ++
1,515,124 UART: [ldev] CDI.KEYID = 6
1,515,487 UART: [ldev] SUBJECT.KEYID = 5
1,515,913 UART: [ldev] AUTHORITY.KEYID = 7
1,516,376 UART: [ldev] FE.KEYID = 1
1,521,530 UART: [ldev] Erasing FE.KEYID = 1
1,547,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,895 UART: [ldev] --
1,586,186 UART: [fwproc] Waiting for Commands...
1,586,847 UART: [fwproc] Received command 0x46574c44
1,587,638 UART: [fwproc] Received Image of size 118548 bytes
2,931,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,590 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,808 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,193 >>> mbox cmd response: success
3,131,399 UART: [afmc] ++
3,131,567 UART: [afmc] CDI.KEYID = 6
3,131,929 UART: [afmc] SUBJECT.KEYID = 7
3,132,354 UART: [afmc] AUTHORITY.KEYID = 5
3,167,205 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,681 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,461 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,170 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,053 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,736 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,634 UART: [afmc] --
3,210,580 UART: [cold-reset] --
3,211,322 UART: [state] Locking Datavault
3,212,603 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,207 UART: [state] Locking ICCM
3,213,745 UART: [exit] Launching FMC @ 0x40000130
3,219,075 UART:
3,219,091 UART: Running Caliptra FMC ...
3,219,499 UART:
3,219,642 UART: [state] CFI Enabled
3,230,244 UART: [fht] FMC Alias Private Key: 7
3,349,384 UART: [art] Extend RT PCRs Done
3,349,812 UART: [art] Lock RT PCRs Done
3,351,246 UART: [art] Populate DV Done
3,359,361 UART: [fht] FMC Alias Private Key: 7
3,360,407 UART: [art] Derive CDI
3,360,687 UART: [art] Store in slot 0x4
3,446,595 UART: [art] Derive Key Pair
3,446,955 UART: [art] Store priv key in slot 0x5
3,460,308 UART: [art] Derive Key Pair - Done
3,474,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,089 UART: [art] PUB.X = E2D7413699E9DF61910107A9A036750D2F4147DB48886403747417270413F9910A9B98CD8EFA244F298B17C9B584B016
3,497,827 UART: [art] PUB.Y = C416C31703E4AB8EAF483F2E7AB4AB99E58DE6022517E864531CCB729496A34025DB0DFD36E9D3B653FB5CF0F95A0525
3,504,775 UART: [art] SIG.R = 689F7B8A88D4FFF350AE779523900E3AE578B0153049709A789040B5E7746ECB7F706DA0511643AA1EC82567D1A28A7C
3,511,540 UART: [art] SIG.S = A98D3DFDAB54EC16276FF162155B22C9032CBBACBAD86C58D20AF6CED2BAE81943557D28A85F08B48FC2D0C71E5B2E36
3,535,453 UART: Caliptra RT
3,535,796 UART: [state] CFI Enabled
3,655,406 UART: [rt] RT listening for mailbox commands...
3,656,076 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,180 UART: [rt]cmd =0x52564348, len=36
3,688,117 >>> mbox cmd response: failed
3,688,117 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,757 UART: [rt]cmd =0x52564348, len=36
3,719,647 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,754 ready_for_fw is high
1,362,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,859 >>> mbox cmd response: success
3,045,544 UART:
3,045,560 UART: Running Caliptra FMC ...
3,045,968 UART:
3,046,111 UART: [state] CFI Enabled
3,056,783 UART: [fht] FMC Alias Private Key: 7
3,175,565 UART: [art] Extend RT PCRs Done
3,175,993 UART: [art] Lock RT PCRs Done
3,177,511 UART: [art] Populate DV Done
3,185,748 UART: [fht] FMC Alias Private Key: 7
3,186,718 UART: [art] Derive CDI
3,186,998 UART: [art] Store in slot 0x4
3,272,730 UART: [art] Derive Key Pair
3,273,090 UART: [art] Store priv key in slot 0x5
3,286,229 UART: [art] Derive Key Pair - Done
3,300,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,723 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,488 UART: [art] PUB.X = B4F5027C1F02786F94DDEC87CB48BDA62A2848B1B4E9E233F1966BBD88A8F2D5B7D6537B5D9F71BA0905A0246E538D41
3,324,256 UART: [art] PUB.Y = DB95671AE351AD8A95F1A7113652A1D81D02843289244642E36EAADE7794D1930D1CC2F8A9172F92850DCD95C3281B30
3,331,195 UART: [art] SIG.R = F6DCACF0155345CCABC012B02A4A7CE412DF0A7C1D8C1888479AA132166829332101EDFA0AA06CBC8DAF37615F7F8C57
3,337,972 UART: [art] SIG.S = A7495A3253B4F0ADCC7F19B60E4691BA979CB72958BA2CD749C3C798225C3941D2EB35F8AC28819CEB82E6360DCA754A
3,361,728 UART: Caliptra RT
3,362,071 UART: [state] CFI Enabled
3,482,468 UART: [rt] RT listening for mailbox commands...
3,483,138 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,326 UART: [rt]cmd =0x52564348, len=36
3,514,835 >>> mbox cmd response: failed
3,514,835 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,544,409 UART: [rt]cmd =0x52564348, len=36
3,546,159 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,280 UART: [kat] SHA2-256
890,830 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,934 UART: [kat] ++
895,086 UART: [kat] sha1
899,430 UART: [kat] SHA2-256
901,370 UART: [kat] SHA2-384
904,063 UART: [kat] SHA2-512-ACC
905,964 UART: [kat] ECC-384
915,785 UART: [kat] HMAC-384Kdf
920,331 UART: [kat] LMS
1,168,643 UART: [kat] --
1,169,312 UART: [cold-reset] ++
1,169,786 UART: [fht] FHT @ 0x50003400
1,172,580 UART: [idev] ++
1,172,748 UART: [idev] CDI.KEYID = 6
1,173,109 UART: [idev] SUBJECT.KEYID = 7
1,173,534 UART: [idev] UDS.KEYID = 0
1,173,880 ready_for_fw is high
1,173,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,281 UART: [idev] Erasing UDS.KEYID = 0
1,198,109 UART: [idev] Sha1 KeyId Algorithm
1,206,821 UART: [idev] --
1,207,920 UART: [ldev] ++
1,208,088 UART: [ldev] CDI.KEYID = 6
1,208,452 UART: [ldev] SUBJECT.KEYID = 5
1,208,879 UART: [ldev] AUTHORITY.KEYID = 7
1,209,342 UART: [ldev] FE.KEYID = 1
1,214,674 UART: [ldev] Erasing FE.KEYID = 1
1,240,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,882 UART: [ldev] --
1,280,191 UART: [fwproc] Wait for Commands...
1,280,988 UART: [fwproc] Recv command 0x46574c44
1,281,721 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,875 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,050 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,351 >>> mbox cmd response: success
2,826,541 UART: [afmc] ++
2,826,709 UART: [afmc] CDI.KEYID = 6
2,827,072 UART: [afmc] SUBJECT.KEYID = 7
2,827,498 UART: [afmc] AUTHORITY.KEYID = 5
2,863,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,439 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,149 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,030 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,731 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,514 UART: [afmc] --
2,906,395 UART: [cold-reset] --
2,907,037 UART: [state] Locking Datavault
2,908,514 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,118 UART: [state] Locking ICCM
2,909,632 UART: [exit] Launching FMC @ 0x40000130
2,914,962 UART:
2,914,978 UART: Running Caliptra FMC ...
2,915,386 UART:
2,915,440 UART: [state] CFI Enabled
2,925,816 UART: [fht] FMC Alias Private Key: 7
3,044,974 UART: [art] Extend RT PCRs Done
3,045,402 UART: [art] Lock RT PCRs Done
3,047,118 UART: [art] Populate DV Done
3,055,171 UART: [fht] FMC Alias Private Key: 7
3,056,165 UART: [art] Derive CDI
3,056,445 UART: [art] Store in slot 0x4
3,141,988 UART: [art] Derive Key Pair
3,142,348 UART: [art] Store priv key in slot 0x5
3,155,124 UART: [art] Derive Key Pair - Done
3,169,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,803 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,568 UART: [art] PUB.X = E8E4E6C9CD455E89F41A8C5FA4EEADB686B341890A518D8B9C1E86487BA00CFDA64434D6E279DBF4AD18913389FF6E89
3,192,348 UART: [art] PUB.Y = 7A691904A62098FC7E65C8280FD5C54718E72EEA7B44856E665CFB912AAE4EDDD67AF397040D00CCE7854B91055C539E
3,199,267 UART: [art] SIG.R = 49F838161202A443B4DE04279127A30FB7E5B2D7BFBE42DDA77886833235547DB4E31B705A8E47B92F6A2AFA4B94E9DA
3,206,034 UART: [art] SIG.S = 314C6C033BA8BC9071A5429790F99663A094FA2D06C3AAC4342485CA4FBEA3E3F3F8A8D422CC63F545B26471C9652BC5
3,229,910 UART: Caliptra RT
3,230,161 UART: [state] CFI Enabled
3,350,259 UART: [rt] RT listening for mailbox commands...
3,350,929 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,061 UART: [rt]cmd =0x52564348, len=36
3,382,804 >>> mbox cmd response: failed
3,382,804 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,416 UART: [rt]cmd =0x52564348, len=36
3,413,838 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,124 ready_for_fw is high
1,058,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,706 >>> mbox cmd response: success
2,741,783 UART:
2,741,799 UART: Running Caliptra FMC ...
2,742,207 UART:
2,742,261 UART: [state] CFI Enabled
2,752,685 UART: [fht] FMC Alias Private Key: 7
2,870,893 UART: [art] Extend RT PCRs Done
2,871,321 UART: [art] Lock RT PCRs Done
2,872,667 UART: [art] Populate DV Done
2,880,980 UART: [fht] FMC Alias Private Key: 7
2,881,998 UART: [art] Derive CDI
2,882,278 UART: [art] Store in slot 0x4
2,968,365 UART: [art] Derive Key Pair
2,968,725 UART: [art] Store priv key in slot 0x5
2,982,369 UART: [art] Derive Key Pair - Done
2,997,042 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,260 UART: [art] PUB.X = 911009ACB3AF62E95B041320CBF5742888B31159B1B8F91B295AD4188E3C1CD0DA640A7E2419861306DBC674B185AC5B
3,020,020 UART: [art] PUB.Y = 4D58887AAD83CA942D52FA06DDC8BC582D5E0C0A465F1027AD29A8BDFDF696C9E0643CFC92340A587848898DC37C5C00
3,026,948 UART: [art] SIG.R = 5CAA5698D8433AFD1419FF1BFD884150EF67A4C903863B3CEE27123E52C7FA1733E77D4F08ED4A396A4D6734B4565454
3,033,716 UART: [art] SIG.S = 2D8BAA8E7AAB9946C6675713D333174B220ADD3F6623D93A76635C6BD880C5881340310AACF4EF64F11CF919B39BD820
3,056,758 UART: Caliptra RT
3,057,009 UART: [state] CFI Enabled
3,175,741 UART: [rt] RT listening for mailbox commands...
3,176,411 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,529 UART: [rt]cmd =0x52564348, len=36
3,208,060 >>> mbox cmd response: failed
3,208,060 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,237,532 UART: [rt]cmd =0x52564348, len=36
3,239,042 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
899,993 UART: [kat] SHA2-256
901,933 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
916,252 UART: [kat] HMAC-384Kdf
920,996 UART: [kat] LMS
1,169,308 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,589 UART: [fht] FHT @ 0x50003400
1,173,061 UART: [idev] ++
1,173,229 UART: [idev] CDI.KEYID = 6
1,173,590 UART: [idev] SUBJECT.KEYID = 7
1,174,015 UART: [idev] UDS.KEYID = 0
1,174,361 ready_for_fw is high
1,174,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,206 UART: [idev] Erasing UDS.KEYID = 0
1,199,446 UART: [idev] Sha1 KeyId Algorithm
1,208,286 UART: [idev] --
1,209,339 UART: [ldev] ++
1,209,507 UART: [ldev] CDI.KEYID = 6
1,209,871 UART: [ldev] SUBJECT.KEYID = 5
1,210,298 UART: [ldev] AUTHORITY.KEYID = 7
1,210,761 UART: [ldev] FE.KEYID = 1
1,215,939 UART: [ldev] Erasing FE.KEYID = 1
1,242,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,919 UART: [ldev] --
1,281,172 UART: [fwproc] Wait for Commands...
1,281,947 UART: [fwproc] Recv command 0x46574c44
1,282,680 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,166 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,341 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,540 >>> mbox cmd response: success
2,826,670 UART: [afmc] ++
2,826,838 UART: [afmc] CDI.KEYID = 6
2,827,201 UART: [afmc] SUBJECT.KEYID = 7
2,827,627 UART: [afmc] AUTHORITY.KEYID = 5
2,863,534 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,708 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,418 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,299 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,000 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,823 UART: [afmc] --
2,906,870 UART: [cold-reset] --
2,907,562 UART: [state] Locking Datavault
2,908,875 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,479 UART: [state] Locking ICCM
2,910,131 UART: [exit] Launching FMC @ 0x40000130
2,915,461 UART:
2,915,477 UART: Running Caliptra FMC ...
2,915,885 UART:
2,916,028 UART: [state] CFI Enabled
2,926,346 UART: [fht] FMC Alias Private Key: 7
3,045,330 UART: [art] Extend RT PCRs Done
3,045,758 UART: [art] Lock RT PCRs Done
3,047,276 UART: [art] Populate DV Done
3,055,369 UART: [fht] FMC Alias Private Key: 7
3,056,401 UART: [art] Derive CDI
3,056,681 UART: [art] Store in slot 0x4
3,142,642 UART: [art] Derive Key Pair
3,143,002 UART: [art] Store priv key in slot 0x5
3,155,998 UART: [art] Derive Key Pair - Done
3,170,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,633 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,398 UART: [art] PUB.X = 72F1BDF54A254FEA1D553B0D3EDF302E75D7CE6F2457BBA420E69CC5B4E62ADA416F47C53FCBA95B276E438BF72954D8
3,194,185 UART: [art] PUB.Y = E9825E6BCD3D668D2E24BCB4CEB3D2C8EDEA64B783A28C0D146BA59063E3DD01B94FF5D569933BF79F49E3FF34BC2A2E
3,201,153 UART: [art] SIG.R = E3470175E141440308AF5404C83CA8CDA42CBC0ECD10D2319172C5B5A88E156C48FD87AEEA3FE81AB71EA9CFCDFD8BEB
3,207,932 UART: [art] SIG.S = 777C449A6F5BD04463419CD9E4BBE978CE91C85488DB51F943FEF2E2B89355B9386C24EB176FE31345E1C70DB12B75E3
3,231,351 UART: Caliptra RT
3,231,694 UART: [state] CFI Enabled
3,351,217 UART: [rt] RT listening for mailbox commands...
3,351,887 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,817 UART: [rt]cmd =0x52564348, len=36
3,383,372 >>> mbox cmd response: failed
3,383,372 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,972 UART: [rt]cmd =0x52564348, len=36
3,414,774 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,003 ready_for_fw is high
1,059,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,645 >>> mbox cmd response: success
2,741,484 UART:
2,741,500 UART: Running Caliptra FMC ...
2,741,908 UART:
2,742,051 UART: [state] CFI Enabled
2,752,875 UART: [fht] FMC Alias Private Key: 7
2,871,697 UART: [art] Extend RT PCRs Done
2,872,125 UART: [art] Lock RT PCRs Done
2,873,653 UART: [art] Populate DV Done
2,881,950 UART: [fht] FMC Alias Private Key: 7
2,883,066 UART: [art] Derive CDI
2,883,346 UART: [art] Store in slot 0x4
2,969,451 UART: [art] Derive Key Pair
2,969,811 UART: [art] Store priv key in slot 0x5
2,982,909 UART: [art] Derive Key Pair - Done
2,997,848 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,730 UART: [art] PUB.X = A0DC0024162361F860767D25D64F0337C516F672B464A81C73090FBA54C27D97603EDD11F7F17EA089CD5752AEECCF7E
3,020,473 UART: [art] PUB.Y = 5C1188575650AE34E351B72E85200DD499F8A1C86AE41636E6B2680B5240C752998D8C2498F1C4D8E7C9F82755BACB1D
3,027,415 UART: [art] SIG.R = ABF9074D9267C4BAAA756C8D7C9643DCEBD45D9770E7453770A80BE0A3E0DD053AB4CE2808367EDE355BCB134EAF9C5E
3,034,193 UART: [art] SIG.S = 0A6885AF7472108B081816D3A26C4D73A5B1472EBDD96A704CEBAC08FA7D1663E0CCB6DC66188318B1BD4DDE6375025C
3,057,951 UART: Caliptra RT
3,058,294 UART: [state] CFI Enabled
3,177,685 UART: [rt] RT listening for mailbox commands...
3,178,355 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,501 UART: [rt]cmd =0x52564348, len=36
3,210,126 >>> mbox cmd response: failed
3,210,126 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,648 UART: [rt]cmd =0x52564348, len=36
3,241,472 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
893,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,637 UART: [kat] ++
897,789 UART: [kat] sha1
902,195 UART: [kat] SHA2-256
904,135 UART: [kat] SHA2-384
906,996 UART: [kat] SHA2-512-ACC
908,897 UART: [kat] ECC-384
918,510 UART: [kat] HMAC-384Kdf
923,300 UART: [kat] LMS
1,171,628 UART: [kat] --
1,172,601 UART: [cold-reset] ++
1,173,117 UART: [fht] FHT @ 0x50003400
1,175,726 UART: [idev] ++
1,175,894 UART: [idev] CDI.KEYID = 6
1,176,254 UART: [idev] SUBJECT.KEYID = 7
1,176,678 UART: [idev] UDS.KEYID = 0
1,177,023 ready_for_fw is high
1,177,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,726 UART: [idev] Erasing UDS.KEYID = 0
1,201,549 UART: [idev] Sha1 KeyId Algorithm
1,209,977 UART: [idev] --
1,210,839 UART: [ldev] ++
1,211,007 UART: [ldev] CDI.KEYID = 6
1,211,370 UART: [ldev] SUBJECT.KEYID = 5
1,211,796 UART: [ldev] AUTHORITY.KEYID = 7
1,212,259 UART: [ldev] FE.KEYID = 1
1,217,285 UART: [ldev] Erasing FE.KEYID = 1
1,243,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,029 UART: [ldev] --
1,283,482 UART: [fwproc] Wait for Commands...
1,284,116 UART: [fwproc] Recv command 0x46574c44
1,284,844 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,418 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,588 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,909 >>> mbox cmd response: success
2,828,997 UART: [afmc] ++
2,829,165 UART: [afmc] CDI.KEYID = 6
2,829,527 UART: [afmc] SUBJECT.KEYID = 7
2,829,952 UART: [afmc] AUTHORITY.KEYID = 5
2,865,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,448 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,157 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,040 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,741 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,387 UART: [afmc] --
2,908,469 UART: [cold-reset] --
2,909,235 UART: [state] Locking Datavault
2,910,306 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,910 UART: [state] Locking ICCM
2,911,496 UART: [exit] Launching FMC @ 0x40000130
2,916,826 UART:
2,916,842 UART: Running Caliptra FMC ...
2,917,250 UART:
2,917,304 UART: [state] CFI Enabled
2,927,712 UART: [fht] FMC Alias Private Key: 7
3,046,292 UART: [art] Extend RT PCRs Done
3,046,720 UART: [art] Lock RT PCRs Done
3,048,266 UART: [art] Populate DV Done
3,056,697 UART: [fht] FMC Alias Private Key: 7
3,057,719 UART: [art] Derive CDI
3,057,999 UART: [art] Store in slot 0x4
3,143,992 UART: [art] Derive Key Pair
3,144,352 UART: [art] Store priv key in slot 0x5
3,158,040 UART: [art] Derive Key Pair - Done
3,173,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,345 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,110 UART: [art] PUB.X = F005F5F68590B108CCF3B8263C07215B6370C53BABE22604C1F8BFB321A2B5599A4B2B3C42D4F93CB98113BB29F17DBF
3,195,878 UART: [art] PUB.Y = A9FBCAC745FFCEE35E72645D2DB5659F84581C6011BC12A334809F40F634E89576906A16D2184DD9A61810A234D39CF1
3,202,830 UART: [art] SIG.R = 1DD3B051A774BFBD5445A021F3C21BD27B30C09A86E13F6D7FA0EE50899AE3F2D468EDCCE99074FC4DD614436BBF9AC3
3,209,620 UART: [art] SIG.S = B447CDAC1E95791092F92C36911AA20F140CFA16E12502164FE7043E3C96F3F5F53311E6FCA94DD597B4405942BC4B5A
3,233,000 UART: Caliptra RT
3,233,251 UART: [state] CFI Enabled
3,352,054 UART: [rt] RT listening for mailbox commands...
3,352,724 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,748 UART: [rt]cmd =0x52564348, len=36
3,384,277 >>> mbox cmd response: failed
3,384,277 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,881 UART: [rt]cmd =0x52564348, len=36
3,415,527 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,149 ready_for_fw is high
1,060,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,504 >>> mbox cmd response: success
2,743,189 UART:
2,743,205 UART: Running Caliptra FMC ...
2,743,613 UART:
2,743,667 UART: [state] CFI Enabled
2,753,853 UART: [fht] FMC Alias Private Key: 7
2,872,301 UART: [art] Extend RT PCRs Done
2,872,729 UART: [art] Lock RT PCRs Done
2,874,187 UART: [art] Populate DV Done
2,882,286 UART: [fht] FMC Alias Private Key: 7
2,883,334 UART: [art] Derive CDI
2,883,614 UART: [art] Store in slot 0x4
2,969,393 UART: [art] Derive Key Pair
2,969,753 UART: [art] Store priv key in slot 0x5
2,982,847 UART: [art] Derive Key Pair - Done
2,997,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,039 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,804 UART: [art] PUB.X = 12B83C64D182192C793FEC9741A406B5D4B3AEB3C4DEF3BB4DBF61F7124AF6D92579E38EACD7D5F9208FEF5B3D632123
3,020,587 UART: [art] PUB.Y = 1D8C4834835F74697DB043446316EAF8B1A085FD8E13026FF2C0FE042C854D2BC701641C384CF98853EA1AE9AA8F47ED
3,027,534 UART: [art] SIG.R = 07BBF8B03DD03981D8617F5B226228266630C81EE6690FC23F7475B888760A698285DB46BFB248B2F66744F4837264B0
3,034,285 UART: [art] SIG.S = 35B200BBCA3A61E312A95A825D6EF91BCEABC4C2C7829343A063A350879202AA8C25C9E6022EFB6E179190AB6172A00C
3,057,888 UART: Caliptra RT
3,058,139 UART: [state] CFI Enabled
3,178,237 UART: [rt] RT listening for mailbox commands...
3,178,907 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,689 UART: [rt]cmd =0x52564348, len=36
3,210,356 >>> mbox cmd response: failed
3,210,356 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,018 UART: [rt]cmd =0x52564348, len=36
3,241,682 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,811 UART: [state] LifecycleState = Unprovisioned
86,466 UART: [state] DebugLocked = No
87,072 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
893,879 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,004 UART: [kat] ++
898,156 UART: [kat] sha1
902,408 UART: [kat] SHA2-256
904,348 UART: [kat] SHA2-384
907,157 UART: [kat] SHA2-512-ACC
909,058 UART: [kat] ECC-384
919,131 UART: [kat] HMAC-384Kdf
923,677 UART: [kat] LMS
1,172,005 UART: [kat] --
1,172,976 UART: [cold-reset] ++
1,173,316 UART: [fht] FHT @ 0x50003400
1,176,067 UART: [idev] ++
1,176,235 UART: [idev] CDI.KEYID = 6
1,176,595 UART: [idev] SUBJECT.KEYID = 7
1,177,019 UART: [idev] UDS.KEYID = 0
1,177,364 ready_for_fw is high
1,177,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,143 UART: [idev] Erasing UDS.KEYID = 0
1,202,820 UART: [idev] Sha1 KeyId Algorithm
1,211,264 UART: [idev] --
1,212,296 UART: [ldev] ++
1,212,464 UART: [ldev] CDI.KEYID = 6
1,212,827 UART: [ldev] SUBJECT.KEYID = 5
1,213,253 UART: [ldev] AUTHORITY.KEYID = 7
1,213,716 UART: [ldev] FE.KEYID = 1
1,218,930 UART: [ldev] Erasing FE.KEYID = 1
1,245,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,628 UART: [ldev] --
1,285,087 UART: [fwproc] Wait for Commands...
1,285,861 UART: [fwproc] Recv command 0x46574c44
1,286,589 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,913 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,083 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,452 >>> mbox cmd response: success
2,831,564 UART: [afmc] ++
2,831,732 UART: [afmc] CDI.KEYID = 6
2,832,094 UART: [afmc] SUBJECT.KEYID = 7
2,832,519 UART: [afmc] AUTHORITY.KEYID = 5
2,867,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,123 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,871 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,580 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,463 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,164 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,060 UART: [afmc] --
2,911,044 UART: [cold-reset] --
2,911,956 UART: [state] Locking Datavault
2,913,205 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,809 UART: [state] Locking ICCM
2,914,373 UART: [exit] Launching FMC @ 0x40000130
2,919,703 UART:
2,919,719 UART: Running Caliptra FMC ...
2,920,127 UART:
2,920,270 UART: [state] CFI Enabled
2,931,452 UART: [fht] FMC Alias Private Key: 7
3,051,142 UART: [art] Extend RT PCRs Done
3,051,570 UART: [art] Lock RT PCRs Done
3,053,396 UART: [art] Populate DV Done
3,061,831 UART: [fht] FMC Alias Private Key: 7
3,062,993 UART: [art] Derive CDI
3,063,273 UART: [art] Store in slot 0x4
3,149,228 UART: [art] Derive Key Pair
3,149,588 UART: [art] Store priv key in slot 0x5
3,163,118 UART: [art] Derive Key Pair - Done
3,177,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,193,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,830 UART: [art] PUB.X = 66D8071FF60DF4CDFB64F6BB51FAAEF8F4A213D4C40A93B87E9BB199198A25ACBF8AD0DD2C5439897D446803C7498E01
3,200,601 UART: [art] PUB.Y = 1619D1B58DEF72FDE5E32E8168326B7C95DDD9CA470A8A25EFE415179CF45B47485A4C78719235DA81925B45C59DA33E
3,207,554 UART: [art] SIG.R = B42EBED01A7E94AF5BB3316EACD948A918F1F011CBA005F171B94BEC7FC61628671394472756E79A9BA54467EDCC6A1A
3,214,335 UART: [art] SIG.S = D88E5D14C78CAC44E7481A59D1F59924B7E51D6DFD4748AF8B2B0D4E967A5D9D472AA9ED0E43855DC76D64A0FF0C73B5
3,238,518 UART: Caliptra RT
3,238,861 UART: [state] CFI Enabled
3,359,101 UART: [rt] RT listening for mailbox commands...
3,359,771 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,389,567 UART: [rt]cmd =0x52564348, len=36
3,391,038 >>> mbox cmd response: failed
3,391,038 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,420,732 UART: [rt]cmd =0x52564348, len=36
3,422,270 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,818 ready_for_fw is high
1,060,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,461 >>> mbox cmd response: success
2,742,980 UART:
2,742,996 UART: Running Caliptra FMC ...
2,743,404 UART:
2,743,547 UART: [state] CFI Enabled
2,754,059 UART: [fht] FMC Alias Private Key: 7
2,873,389 UART: [art] Extend RT PCRs Done
2,873,817 UART: [art] Lock RT PCRs Done
2,875,231 UART: [art] Populate DV Done
2,883,582 UART: [fht] FMC Alias Private Key: 7
2,884,638 UART: [art] Derive CDI
2,884,918 UART: [art] Store in slot 0x4
2,970,771 UART: [art] Derive Key Pair
2,971,131 UART: [art] Store priv key in slot 0x5
2,984,455 UART: [art] Derive Key Pair - Done
2,999,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,351 UART: [art] PUB.X = E4B0C6DB976697FE5B1F7CA6D7FDAADFF30FD5ACDD96F12FCE434147BA1C612E6510FF16E241C554EFC27DA7A4017FC1
3,022,143 UART: [art] PUB.Y = AD675D2E683D1E8346C89F1EAECA166A2C8ED8C5E68CA8B36F0C34F16172E72AFBA83B53068B17EE4330090DAB35376C
3,029,095 UART: [art] SIG.R = D4A76FCA18AC08CECDCC4ECF42661D3CE2D145727296352431EB0489CE53FBC7F9193FD7F76ADE00FF33719A8D678435
3,035,851 UART: [art] SIG.S = 32EF63F8BC36DFB3E23351CC0CCE0E53C723546B75A97BB368658E127E03AA170481E50B45F357998B0CE47A28E4A159
3,059,783 UART: Caliptra RT
3,060,126 UART: [state] CFI Enabled
3,179,817 UART: [rt] RT listening for mailbox commands...
3,180,487 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,469 UART: [rt]cmd =0x52564348, len=36
3,212,332 >>> mbox cmd response: failed
3,212,332 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,974 UART: [rt]cmd =0x52564348, len=36
3,243,634 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
192,133 UART:
192,497 UART: Running Caliptra ROM ...
193,682 UART:
193,836 UART: [state] CFI Enabled
261,741 UART: [state] LifecycleState = Unprovisioned
263,662 UART: [state] DebugLocked = No
265,904 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,494 UART: [kat] SHA2-256
440,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,654 UART: [kat] ++
451,169 UART: [kat] sha1
463,289 UART: [kat] SHA2-256
465,994 UART: [kat] SHA2-384
471,565 UART: [kat] SHA2-512-ACC
473,938 UART: [kat] ECC-384
2,767,459 UART: [kat] HMAC-384Kdf
2,780,223 UART: [kat] LMS
3,970,543 UART: [kat] --
3,974,955 UART: [cold-reset] ++
3,976,463 UART: [fht] Storing FHT @ 0x50003400
3,986,898 UART: [idev] ++
3,987,462 UART: [idev] CDI.KEYID = 6
3,988,367 UART: [idev] SUBJECT.KEYID = 7
3,989,612 UART: [idev] UDS.KEYID = 0
3,990,736 ready_for_fw is high
3,990,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,150 UART: [idev] Erasing UDS.KEYID = 0
7,328,031 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,374 UART: [idev] --
7,352,771 UART: [ldev] ++
7,353,403 UART: [ldev] CDI.KEYID = 6
7,354,314 UART: [ldev] SUBJECT.KEYID = 5
7,355,531 UART: [ldev] AUTHORITY.KEYID = 7
7,356,822 UART: [ldev] FE.KEYID = 1
7,402,179 UART: [ldev] Erasing FE.KEYID = 1
10,736,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,226 UART: [ldev] --
13,116,529 UART: [fwproc] Waiting for Commands...
13,118,967 UART: [fwproc] Received command 0x46574c44
13,121,155 UART: [fwproc] Received Image of size 118548 bytes
21,570,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,648,694 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,721,869 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,050,209 >>> mbox cmd response: success
22,053,708 UART: [afmc] ++
22,054,336 UART: [afmc] CDI.KEYID = 6
22,055,231 UART: [afmc] SUBJECT.KEYID = 7
22,056,500 UART: [afmc] AUTHORITY.KEYID = 5
25,421,494 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,718,495 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,720,757 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,735,258 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,750,047 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,764,432 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,785,084 UART: [afmc] --
27,789,281 UART: [cold-reset] --
27,792,602 UART: [state] Locking Datavault
27,797,144 UART: [state] Locking PCR0, PCR1 and PCR31
27,798,900 UART: [state] Locking ICCM
27,801,484 UART: [exit] Launching FMC @ 0x40000130
27,809,839 UART:
27,810,071 UART: Running Caliptra FMC ...
27,811,176 UART:
27,811,336 UART: [state] CFI Enabled
27,879,090 UART: [fht] FMC Alias Private Key: 7
30,219,612 UART: [art] Extend RT PCRs Done
30,220,836 UART: [art] Lock RT PCRs Done
30,222,298 UART: [art] Populate DV Done
30,227,814 UART: [fht] FMC Alias Private Key: 7
30,229,403 UART: [art] Derive CDI
30,230,236 UART: [art] Store in slot 0x4
30,287,652 UART: [art] Derive Key Pair
30,288,653 UART: [art] Store priv key in slot 0x5
33,581,305 UART: [art] Derive Key Pair - Done
33,593,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,882,635 UART: [art] Erasing AUTHORITY.KEYID = 7
35,884,147 UART: [art] PUB.X = C124326D5E1885841F3C2548BDB6A8CCC3FA20C17B1F92FAE249142EBBC4417296D380D4D4A6756F58FB22EA7B5C54D7
35,891,418 UART: [art] PUB.Y = 8F235E3B1EA6AE0E78AFD10AB9DF3DEF893C009F6AFCBEE47F22E064EACFCDAC4D79E1076E1F3357935139AD6AD281F0
35,898,705 UART: [art] SIG.R = 554B908CEFA06CAC52521B9C0D4DBB6EB55313EE4489F1035311514A66C70686BAE47C9EE7461429314FD8FF8E38E2C5
35,906,083 UART: [art] SIG.S = BD25A30D1ACED38AAC84F30294AFBE6C443FD167DF7570748CBDAA8B29FA4210776FCB3046C03814A6C09C89E49F0CB6
37,210,942 UART: Caliptra RT
37,211,631 UART: [state] CFI Enabled
37,388,265 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,459,642 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,615,312 UART: [rt]cmd =0x41544d4e, len=14344
49,982,307 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,807,049 ready_for_fw is high
3,807,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,141,289 >>> mbox cmd response: success
27,834,737 UART:
27,835,151 UART: Running Caliptra FMC ...
27,836,267 UART:
27,836,418 UART: [state] CFI Enabled
27,904,213 UART: [fht] FMC Alias Private Key: 7
30,244,769 UART: [art] Extend RT PCRs Done
30,246,004 UART: [art] Lock RT PCRs Done
30,247,774 UART: [art] Populate DV Done
30,253,352 UART: [fht] FMC Alias Private Key: 7
30,254,916 UART: [art] Derive CDI
30,255,736 UART: [art] Store in slot 0x4
30,313,269 UART: [art] Derive Key Pair
30,314,313 UART: [art] Store priv key in slot 0x5
33,607,526 UART: [art] Derive Key Pair - Done
33,620,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,909,043 UART: [art] Erasing AUTHORITY.KEYID = 7
35,910,569 UART: [art] PUB.X = F08BCFC683EE17D4275E7124413509B93A2560BF4D67DF0C57214DEF7240ECB5D0D71A2B413C3466FDC7AAF1AA2C4B5C
35,917,842 UART: [art] PUB.Y = FE0081BC5D4C1539CC226D0AC9B2D4F33139F8C4ECCDCD73889F9460B9503D03AA15220039C210E16AC98D5082BD9D9B
35,925,052 UART: [art] SIG.R = D109CCFA7CDC7083F826FEC65F392D17477AF7052988E89F2CEC5B0460A7FF48DA57BA6C3F0D16AF4C420B511E87F6A1
35,932,463 UART: [art] SIG.S = 205CBF5C79954D93A2E5178BD62CCC7D84F02D9A4CD0E0334DB5673B6829A7C02FD5531204865A466AED1E500F961305
37,237,319 UART: Caliptra RT
37,238,028 UART: [state] CFI Enabled
37,414,118 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,480,457 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,635,920 UART: [rt]cmd =0x41544d4e, len=14344
50,003,165 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,424 UART:
192,772 UART: Running Caliptra ROM ...
193,955 UART:
603,790 UART: [state] CFI Enabled
617,547 UART: [state] LifecycleState = Unprovisioned
619,496 UART: [state] DebugLocked = No
621,736 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,939 UART: [kat] SHA2-256
796,747 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,292 UART: [kat] ++
807,788 UART: [kat] sha1
819,654 UART: [kat] SHA2-256
822,314 UART: [kat] SHA2-384
827,803 UART: [kat] SHA2-512-ACC
830,165 UART: [kat] ECC-384
3,113,123 UART: [kat] HMAC-384Kdf
3,124,996 UART: [kat] LMS
4,315,134 UART: [kat] --
4,317,774 UART: [cold-reset] ++
4,319,270 UART: [fht] Storing FHT @ 0x50003400
4,329,971 UART: [idev] ++
4,330,530 UART: [idev] CDI.KEYID = 6
4,331,556 UART: [idev] SUBJECT.KEYID = 7
4,332,726 UART: [idev] UDS.KEYID = 0
4,333,716 ready_for_fw is high
4,333,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,762 UART: [idev] Erasing UDS.KEYID = 0
7,618,905 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,605 UART: [idev] --
7,644,423 UART: [ldev] ++
7,644,984 UART: [ldev] CDI.KEYID = 6
7,645,962 UART: [ldev] SUBJECT.KEYID = 5
7,647,174 UART: [ldev] AUTHORITY.KEYID = 7
7,648,455 UART: [ldev] FE.KEYID = 1
7,660,664 UART: [ldev] Erasing FE.KEYID = 1
10,945,109 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,712 UART: [ldev] --
13,305,886 UART: [fwproc] Waiting for Commands...
13,309,216 UART: [fwproc] Received command 0x46574c44
13,311,390 UART: [fwproc] Received Image of size 118548 bytes
22,158,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,242,836 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,316,012 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,644,936 >>> mbox cmd response: success
22,648,938 UART: [afmc] ++
22,649,555 UART: [afmc] CDI.KEYID = 6
22,650,464 UART: [afmc] SUBJECT.KEYID = 7
22,651,677 UART: [afmc] AUTHORITY.KEYID = 5
25,968,709 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,265,831 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,268,137 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,282,583 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,297,384 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,311,831 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,333,639 UART: [afmc] --
28,337,181 UART: [cold-reset] --
28,340,391 UART: [state] Locking Datavault
28,345,901 UART: [state] Locking PCR0, PCR1 and PCR31
28,347,648 UART: [state] Locking ICCM
28,350,190 UART: [exit] Launching FMC @ 0x40000130
28,358,586 UART:
28,358,825 UART: Running Caliptra FMC ...
28,359,922 UART:
28,360,076 UART: [state] CFI Enabled
28,368,286 UART: [fht] FMC Alias Private Key: 7
30,707,471 UART: [art] Extend RT PCRs Done
30,708,695 UART: [art] Lock RT PCRs Done
30,710,583 UART: [art] Populate DV Done
30,715,774 UART: [fht] FMC Alias Private Key: 7
30,717,303 UART: [art] Derive CDI
30,718,110 UART: [art] Store in slot 0x4
30,760,693 UART: [art] Derive Key Pair
30,761,686 UART: [art] Store priv key in slot 0x5
34,003,743 UART: [art] Derive Key Pair - Done
34,016,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,296,966 UART: [art] Erasing AUTHORITY.KEYID = 7
36,298,477 UART: [art] PUB.X = BCBF072D65DFF7763B9A88A14C39083C40F0AC046C997BFEDB25BEECB5DAAAC6A5DACAE0906EC19B8CF71053C5A7FA17
36,305,816 UART: [art] PUB.Y = 7A8E0BEAE2A01111B6C2875858F96A8018AC4132FAF491AD221743A6E4C4C206154446902A0299EA3EAFDB90561E9EE4
36,313,060 UART: [art] SIG.R = DCEC87DBF2F82F378BB7DE5527B8E1EE53F0D2A01020578BB81A5029EBE85710791E5CC2DFD381B603DC8FB11B8ABF6B
36,320,462 UART: [art] SIG.S = D1BF847F6AFA7FB324B1F352F1CD04F023FFCC30E4DD810FF72921F995C7F13D93665976F3A8A5B9782E8801C456D85D
37,625,954 UART: Caliptra RT
37,626,655 UART: [state] CFI Enabled
37,758,958 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,825,475 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,981,107 UART: [rt]cmd =0x41544d4e, len=14344
50,477,731 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
4,128,548 ready_for_fw is high
4,128,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,274,923 >>> mbox cmd response: success
27,915,665 UART:
27,916,059 UART: Running Caliptra FMC ...
27,917,201 UART:
27,917,361 UART: [state] CFI Enabled
27,925,095 UART: [fht] FMC Alias Private Key: 7
30,264,870 UART: [art] Extend RT PCRs Done
30,266,101 UART: [art] Lock RT PCRs Done
30,268,049 UART: [art] Populate DV Done
30,273,201 UART: [fht] FMC Alias Private Key: 7
30,274,914 UART: [art] Derive CDI
30,275,732 UART: [art] Store in slot 0x4
30,317,857 UART: [art] Derive Key Pair
30,318,896 UART: [art] Store priv key in slot 0x5
33,560,842 UART: [art] Derive Key Pair - Done
33,573,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,854,142 UART: [art] Erasing AUTHORITY.KEYID = 7
35,855,650 UART: [art] PUB.X = B17DBF4F78D81378C38C31E0620A5E49DAD66B86E41D54D1A7BD9A47CBCE424A91D68CAC1ED3C0105B1B3F6B3DFDC69B
35,862,949 UART: [art] PUB.Y = FE6DA065047CE44AB6BEE7A394CE724EFDCCEA9C5E15576BDFD138DE504C9EA7E9F8069F65C56283D02F625FB485CD1E
35,870,250 UART: [art] SIG.R = 39797BD74ED4C87A3F6BC8123952FD6368BF59067EB6AE3CBA09B38C97B037D2D7743434896021BE77B0981EBA0E49B8
35,877,686 UART: [art] SIG.S = DC0964E7BE7ACAEBB51C48D6FA503DBD99F434F7BAA33565599FDDA07950C9E99107350ACB995E9E8E77FE44E1F67B1D
37,182,844 UART: Caliptra RT
37,183,621 UART: [state] CFI Enabled
37,316,304 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,380,574 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,536,220 UART: [rt]cmd =0x41544d4e, len=14344
50,007,473 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,064 UART:
192,518 UART: Running Caliptra ROM ...
193,627 UART:
193,770 UART: [state] CFI Enabled
263,789 UART: [state] LifecycleState = Unprovisioned
265,646 UART: [state] DebugLocked = No
267,775 UART: [state] WD Timer not started. Device not locked for debugging
271,816 UART: [kat] SHA2-256
451,427 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,226 UART: [kat] ++
462,673 UART: [kat] sha1
473,471 UART: [kat] SHA2-256
476,124 UART: [kat] SHA2-384
482,819 UART: [kat] SHA2-512-ACC
485,245 UART: [kat] ECC-384
2,940,495 UART: [kat] HMAC-384Kdf
2,964,388 UART: [kat] LMS
3,440,894 UART: [kat] --
3,444,834 UART: [cold-reset] ++
3,447,474 UART: [fht] FHT @ 0x50003400
3,458,941 UART: [idev] ++
3,459,496 UART: [idev] CDI.KEYID = 6
3,460,465 UART: [idev] SUBJECT.KEYID = 7
3,461,708 UART: [idev] UDS.KEYID = 0
3,462,601 ready_for_fw is high
3,462,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,611,849 UART: [idev] Erasing UDS.KEYID = 0
5,977,346 UART: [idev] Sha1 KeyId Algorithm
5,999,560 UART: [idev] --
6,003,123 UART: [ldev] ++
6,003,702 UART: [ldev] CDI.KEYID = 6
6,004,678 UART: [ldev] SUBJECT.KEYID = 5
6,005,836 UART: [ldev] AUTHORITY.KEYID = 7
6,007,129 UART: [ldev] FE.KEYID = 1
6,051,482 UART: [ldev] Erasing FE.KEYID = 1
8,553,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,292,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,308,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,324,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,340,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,360,729 UART: [ldev] --
10,365,302 UART: [fwproc] Wait for Commands...
10,368,037 UART: [fwproc] Recv command 0x46574c44
10,370,018 UART: [fwproc] Recv'd Img size: 118548 bytes
14,923,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,008,554 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,081,582 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,410,559 >>> mbox cmd response: success
15,413,783 UART: [afmc] ++
15,414,388 UART: [afmc] CDI.KEYID = 6
15,415,312 UART: [afmc] SUBJECT.KEYID = 7
15,416,577 UART: [afmc] AUTHORITY.KEYID = 5
17,957,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,698,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,700,976 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,716,844 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,732,803 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,748,465 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,773,505 UART: [afmc] --
19,776,617 UART: [cold-reset] --
19,780,580 UART: [state] Locking Datavault
19,783,834 UART: [state] Locking PCR0, PCR1 and PCR31
19,785,461 UART: [state] Locking ICCM
19,786,800 UART: [exit] Launching FMC @ 0x40000130
19,795,202 UART:
19,795,436 UART: Running Caliptra FMC ...
19,796,530 UART:
19,796,686 UART: [state] CFI Enabled
19,855,573 UART: [fht] FMC Alias Private Key: 7
21,621,713 UART: [art] Extend RT PCRs Done
21,622,961 UART: [art] Lock RT PCRs Done
21,624,773 UART: [art] Populate DV Done
21,630,311 UART: [fht] FMC Alias Private Key: 7
21,631,951 UART: [art] Derive CDI
21,632,764 UART: [art] Store in slot 0x4
21,687,852 UART: [art] Derive Key Pair
21,688,848 UART: [art] Store priv key in slot 0x5
24,151,653 UART: [art] Derive Key Pair - Done
24,164,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,878,175 UART: [art] Erasing AUTHORITY.KEYID = 7
25,879,688 UART: [art] PUB.X = A9258A1D9E685D20CBFCF5AE40554C06DB642EB81FEC7A0BFEC5B89F7FB3F97BEF4DF47AD76C0D033875E6A2EA92137F
25,886,937 UART: [art] PUB.Y = 322703F03E0CDF736B266F045781519BCD6EA9848375BFAACFC44A626C3BD2D07F94119A3DDA81D8D730E6FAB701CBBF
25,894,230 UART: [art] SIG.R = 9EC52A726AE57EF50EBE25FDDB037D3AF2FC5CE7F2390C8EB17E169FC0BD52D86C294514D113AF9D96A1AC0B0513AEEC
25,901,673 UART: [art] SIG.S = A487807197C25552DCCA251EBF29ECBBF74F89A967550BB3D0D2BE51B3DA834428DD81E36D8E20CDBA889EB0E782FF11
26,880,353 UART: Caliptra RT
26,881,062 UART: [state] CFI Enabled
27,062,893 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,098,998 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,254,517 UART: [rt]cmd =0x41544d4e, len=14344
36,156,021 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,460,034 ready_for_fw is high
3,460,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,365,719 >>> mbox cmd response: success
19,642,175 UART:
19,642,552 UART: Running Caliptra FMC ...
19,643,666 UART:
19,643,816 UART: [state] CFI Enabled
19,711,210 UART: [fht] FMC Alias Private Key: 7
21,477,538 UART: [art] Extend RT PCRs Done
21,478,798 UART: [art] Lock RT PCRs Done
21,480,337 UART: [art] Populate DV Done
21,485,824 UART: [fht] FMC Alias Private Key: 7
21,487,535 UART: [art] Derive CDI
21,488,356 UART: [art] Store in slot 0x4
21,544,032 UART: [art] Derive Key Pair
21,545,081 UART: [art] Store priv key in slot 0x5
24,008,427 UART: [art] Derive Key Pair - Done
24,021,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,734,205 UART: [art] Erasing AUTHORITY.KEYID = 7
25,735,719 UART: [art] PUB.X = 107ED04FE66A656067437474935241CA3F237F4F5A15AD0BFC45A631579E09C49B6908EB2AE8CFBE8363A954D6DF1FBE
25,743,052 UART: [art] PUB.Y = BB3C16630114A23806A9D709F6DC175F820D9A7FF707BBBBCC25CA07919E13B4CFCD00915026F4785BCD4CF4732BD3AD
25,750,273 UART: [art] SIG.R = 09470728551DD0F51AA228EF36E1510C5DF5F28A198E5093870B154B5F15F81AB3B9DFAC61CEF6BA337809B039F280F4
25,757,613 UART: [art] SIG.S = B3299437EBD12D06F95AC616716F36A8F3A922B014BD48560B3B526CD4EA9A2987599A31A96EBAB6F1BC3993AF43348F
26,736,580 UART: Caliptra RT
26,737,293 UART: [state] CFI Enabled
26,919,470 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,961,548 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,117,000 UART: [rt]cmd =0x41544d4e, len=14344
36,029,950 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
192,483 UART:
192,843 UART: Running Caliptra ROM ...
193,943 UART:
603,794 UART: [state] CFI Enabled
615,551 UART: [state] LifecycleState = Unprovisioned
617,499 UART: [state] DebugLocked = No
619,089 UART: [state] WD Timer not started. Device not locked for debugging
622,637 UART: [kat] SHA2-256
802,248 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,083 UART: [kat] ++
813,537 UART: [kat] sha1
824,201 UART: [kat] SHA2-256
826,930 UART: [kat] SHA2-384
832,373 UART: [kat] SHA2-512-ACC
834,746 UART: [kat] ECC-384
3,277,298 UART: [kat] HMAC-384Kdf
3,290,034 UART: [kat] LMS
3,766,478 UART: [kat] --
3,772,883 UART: [cold-reset] ++
3,773,890 UART: [fht] FHT @ 0x50003400
3,784,934 UART: [idev] ++
3,785,491 UART: [idev] CDI.KEYID = 6
3,786,446 UART: [idev] SUBJECT.KEYID = 7
3,787,693 UART: [idev] UDS.KEYID = 0
3,788,592 ready_for_fw is high
3,788,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,634 UART: [idev] Erasing UDS.KEYID = 0
6,262,194 UART: [idev] Sha1 KeyId Algorithm
6,285,820 UART: [idev] --
6,290,623 UART: [ldev] ++
6,291,194 UART: [ldev] CDI.KEYID = 6
6,292,083 UART: [ldev] SUBJECT.KEYID = 5
6,293,356 UART: [ldev] AUTHORITY.KEYID = 7
6,294,543 UART: [ldev] FE.KEYID = 1
6,308,698 UART: [ldev] Erasing FE.KEYID = 1
8,787,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,757 UART: [ldev] --
10,584,105 UART: [fwproc] Wait for Commands...
10,585,981 UART: [fwproc] Recv command 0x46574c44
10,588,018 UART: [fwproc] Recv'd Img size: 118548 bytes
15,121,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,206,380 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,279,387 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,608,528 >>> mbox cmd response: success
15,612,547 UART: [afmc] ++
15,613,162 UART: [afmc] CDI.KEYID = 6
15,614,084 UART: [afmc] SUBJECT.KEYID = 7
15,615,305 UART: [afmc] AUTHORITY.KEYID = 5
18,124,222 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,846,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,848,890 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,864,711 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,880,675 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,896,368 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,919,962 UART: [afmc] --
19,923,296 UART: [cold-reset] --
19,928,642 UART: [state] Locking Datavault
19,934,489 UART: [state] Locking PCR0, PCR1 and PCR31
19,936,245 UART: [state] Locking ICCM
19,938,670 UART: [exit] Launching FMC @ 0x40000130
19,947,065 UART:
19,947,314 UART: Running Caliptra FMC ...
19,948,416 UART:
19,948,579 UART: [state] CFI Enabled
19,956,897 UART: [fht] FMC Alias Private Key: 7
21,723,128 UART: [art] Extend RT PCRs Done
21,724,356 UART: [art] Lock RT PCRs Done
21,726,387 UART: [art] Populate DV Done
21,731,689 UART: [fht] FMC Alias Private Key: 7
21,733,227 UART: [art] Derive CDI
21,734,042 UART: [art] Store in slot 0x4
21,776,428 UART: [art] Derive Key Pair
21,777,493 UART: [art] Store priv key in slot 0x5
24,203,994 UART: [art] Derive Key Pair - Done
24,216,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,922,665 UART: [art] Erasing AUTHORITY.KEYID = 7
25,924,171 UART: [art] PUB.X = A48A0A68B1D3755E18826DA2D3D1546171DBB9EA2A1B2E924D2A3715FEDA6CCD92A008D94607668768864577D12F0C7E
25,931,415 UART: [art] PUB.Y = AD8A25172A136EABADA95BC0FA9D274A0DEE5FFB4D9DB8906D53959D3D57CCF72E6370FA6C7CB9DFDF57783CFD44F0A7
25,938,696 UART: [art] SIG.R = 78DE73041DC59D3520A8FD2F0D46E49F11D8F8959C4D49FE082D9DDED51448E27E66E17B49726AF173692148F4A0D944
25,946,093 UART: [art] SIG.S = 1F53F9DA223F5405ED65B1F4B25070170A428F2D8FD6A09AB96ED9C5D8A53F087016424AF8CDC1DD226BDB34ECD81691
26,925,170 UART: Caliptra RT
26,925,879 UART: [state] CFI Enabled
27,059,000 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,095,169 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,250,611 UART: [rt]cmd =0x41544d4e, len=14344
36,150,007 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,777,007 ready_for_fw is high
3,777,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,585,451 >>> mbox cmd response: success
19,840,327 UART:
19,840,737 UART: Running Caliptra FMC ...
19,841,851 UART:
19,842,011 UART: [state] CFI Enabled
19,850,188 UART: [fht] FMC Alias Private Key: 7
21,616,569 UART: [art] Extend RT PCRs Done
21,617,773 UART: [art] Lock RT PCRs Done
21,619,724 UART: [art] Populate DV Done
21,624,988 UART: [fht] FMC Alias Private Key: 7
21,626,697 UART: [art] Derive CDI
21,627,436 UART: [art] Store in slot 0x4
21,670,368 UART: [art] Derive Key Pair
21,671,435 UART: [art] Store priv key in slot 0x5
24,098,036 UART: [art] Derive Key Pair - Done
24,111,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,818,235 UART: [art] Erasing AUTHORITY.KEYID = 7
25,819,736 UART: [art] PUB.X = EC9E2CA82CF45E1614A07CE9053204B8339470F23ECD77D42554920016AECC481C433A999ACC97A6DA5EFA24FFF55444
25,826,989 UART: [art] PUB.Y = F95B04D74DDD70415855F594CC63A24985CF8824B738CC71373CFA711AE613454A1C935C16FBB8FB60276761D1CB3A20
25,834,249 UART: [art] SIG.R = CAF949AF92211DC61F3DC4253DBDFEB4E9F03F2690159F7BAD63C53498232D7FE25DD40B0294C62F6CF419A3EB4BE33A
25,841,656 UART: [art] SIG.S = B32771EEB365263B806B9E8C21C91CB5B50CCF0FC2D8C41675C7E4449BCDCBFBD6E4C0E714713DECC8947610CB0AB5A0
26,820,918 UART: Caliptra RT
26,821,634 UART: [state] CFI Enabled
26,955,347 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,020,093 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,175,584 UART: [rt]cmd =0x41544d4e, len=14344
36,073,818 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,075 UART:
192,451 UART: Running Caliptra ROM ...
193,553 UART:
193,698 UART: [state] CFI Enabled
263,263 UART: [state] LifecycleState = Unprovisioned
265,632 UART: [state] DebugLocked = No
267,575 UART: [state] WD Timer not started. Device not locked for debugging
272,602 UART: [kat] SHA2-256
462,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,308 UART: [kat] ++
473,756 UART: [kat] sha1
486,357 UART: [kat] SHA2-256
489,369 UART: [kat] SHA2-384
495,644 UART: [kat] SHA2-512-ACC
498,223 UART: [kat] ECC-384
2,947,516 UART: [kat] HMAC-384Kdf
2,971,652 UART: [kat] LMS
3,503,395 UART: [kat] --
3,506,893 UART: [cold-reset] ++
3,508,744 UART: [fht] FHT @ 0x50003400
3,521,634 UART: [idev] ++
3,522,259 UART: [idev] CDI.KEYID = 6
3,523,239 UART: [idev] SUBJECT.KEYID = 7
3,524,477 UART: [idev] UDS.KEYID = 0
3,525,406 ready_for_fw is high
3,525,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,740 UART: [idev] Erasing UDS.KEYID = 0
6,022,826 UART: [idev] Sha1 KeyId Algorithm
6,045,201 UART: [idev] --
6,049,284 UART: [ldev] ++
6,049,973 UART: [ldev] CDI.KEYID = 6
6,050,884 UART: [ldev] SUBJECT.KEYID = 5
6,052,097 UART: [ldev] AUTHORITY.KEYID = 7
6,053,275 UART: [ldev] FE.KEYID = 1
6,098,485 UART: [ldev] Erasing FE.KEYID = 1
8,605,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,560 UART: [ldev] --
10,413,471 UART: [fwproc] Wait for Commands...
10,416,048 UART: [fwproc] Recv command 0x46574c44
10,418,327 UART: [fwproc] Recv'd Img size: 118548 bytes
15,079,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,162,853 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,286,458 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,846,238 >>> mbox cmd response: success
15,849,697 UART: [afmc] ++
15,850,418 UART: [afmc] CDI.KEYID = 6
15,851,612 UART: [afmc] SUBJECT.KEYID = 7
15,853,053 UART: [afmc] AUTHORITY.KEYID = 5
18,384,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,109,615 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,111,534 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,126,670 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,141,891 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,156,900 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,180,437 UART: [afmc] --
20,184,103 UART: [cold-reset] --
20,188,241 UART: [state] Locking Datavault
20,192,630 UART: [state] Locking PCR0, PCR1 and PCR31
20,194,840 UART: [state] Locking ICCM
20,196,351 UART: [exit] Launching FMC @ 0x40000130
20,205,036 UART:
20,205,276 UART: Running Caliptra FMC ...
20,206,375 UART:
20,206,530 UART: [state] CFI Enabled
20,265,212 UART: [fht] FMC Alias Private Key: 7
22,052,839 UART: [art] Extend RT PCRs Done
22,054,063 UART: [art] Lock RT PCRs Done
22,055,638 UART: [art] Populate DV Done
22,061,157 UART: [fht] FMC Alias Private Key: 7
22,062,692 UART: [art] Derive CDI
22,063,452 UART: [art] Store in slot 0x4
22,119,604 UART: [art] Derive Key Pair
22,120,640 UART: [art] Store priv key in slot 0x5
24,583,814 UART: [art] Derive Key Pair - Done
24,596,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,309,933 UART: [art] Erasing AUTHORITY.KEYID = 7
26,311,429 UART: [art] PUB.X = EF1E4F917561B8E0A32ADF0D12E4518D12FBF5332EF4FF5D83922277A6C3554CF0E167F087EF111AAE6A35299D3B5395
26,318,706 UART: [art] PUB.Y = CC5F717647C753C298FFC260165E9A683D45F9143EBEB7C885E29DAC9AC1089D36689D1809595AB76C04C71AB67E6511
26,325,971 UART: [art] SIG.R = 666C5FC58D53CC0A02E0B2B9C2B702CA1C0CEB65603D6FC02F3511C008076CEC58F1E36D179324B7CD573E727A630B08
26,333,344 UART: [art] SIG.S = 94CF297642D183BA3A9DCDFFA0B74CF3FAA550593551D18B5DC1FB2F7EA4AFC28EC3776B9FDEC4A61D19CD9A11909B02
27,312,347 UART: Caliptra RT
27,313,058 UART: [state] CFI Enabled
27,493,530 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,539,421 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,695,078 UART: [rt]cmd =0x41544d4e, len=14344
36,604,397 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,438,597 ready_for_fw is high
3,439,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,956,409 >>> mbox cmd response: success
20,241,972 UART:
20,242,363 UART: Running Caliptra FMC ...
20,243,463 UART:
20,243,613 UART: [state] CFI Enabled
20,312,800 UART: [fht] FMC Alias Private Key: 7
22,099,928 UART: [art] Extend RT PCRs Done
22,101,159 UART: [art] Lock RT PCRs Done
22,102,850 UART: [art] Populate DV Done
22,108,379 UART: [fht] FMC Alias Private Key: 7
22,109,994 UART: [art] Derive CDI
22,110,809 UART: [art] Store in slot 0x4
22,166,766 UART: [art] Derive Key Pair
22,167,762 UART: [art] Store priv key in slot 0x5
24,630,674 UART: [art] Derive Key Pair - Done
24,643,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,357,000 UART: [art] Erasing AUTHORITY.KEYID = 7
26,358,512 UART: [art] PUB.X = 50F69287F83A6A3D4563130B81A491B58697EAC7BECF0E17415C0E1095215A3970C8D82293A6A4669519562424B0D44F
26,365,796 UART: [art] PUB.Y = B047698E671F6BD809D6B5133E8E534CE524BE5D2F7148541D93912CF988C676FFCF8F2F222D51FACE76EAD60200FAE1
26,373,013 UART: [art] SIG.R = E69192EC83D818577591EDF11D51D294B99E7B8F4BE2C220BC1FDB8F5041A738765B2445F10B6EA46CC4A3A49F06A829
26,380,383 UART: [art] SIG.S = 059CBFDADA905A45ECBA4687BCDFF4CD489E1B56A1B183EA3BA3113ABFC277D6CD696AD719910515F683AE63C4C989C6
27,359,482 UART: Caliptra RT
27,360,175 UART: [state] CFI Enabled
27,541,385 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,588,236 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,743,929 UART: [rt]cmd =0x41544d4e, len=14344
36,641,676 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,508 UART:
192,891 UART: Running Caliptra ROM ...
193,993 UART:
603,804 UART: [state] CFI Enabled
616,288 UART: [state] LifecycleState = Unprovisioned
618,672 UART: [state] DebugLocked = No
621,541 UART: [state] WD Timer not started. Device not locked for debugging
626,806 UART: [kat] SHA2-256
816,654 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,489 UART: [kat] ++
827,971 UART: [kat] sha1
839,488 UART: [kat] SHA2-256
842,540 UART: [kat] SHA2-384
848,790 UART: [kat] SHA2-512-ACC
851,386 UART: [kat] ECC-384
3,293,068 UART: [kat] HMAC-384Kdf
3,306,077 UART: [kat] LMS
3,837,947 UART: [kat] --
3,842,037 UART: [cold-reset] ++
3,843,550 UART: [fht] FHT @ 0x50003400
3,856,095 UART: [idev] ++
3,856,737 UART: [idev] CDI.KEYID = 6
3,857,729 UART: [idev] SUBJECT.KEYID = 7
3,858,906 UART: [idev] UDS.KEYID = 0
3,859,837 ready_for_fw is high
3,860,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,107 UART: [idev] Erasing UDS.KEYID = 0
6,338,518 UART: [idev] Sha1 KeyId Algorithm
6,361,705 UART: [idev] --
6,365,742 UART: [ldev] ++
6,366,432 UART: [ldev] CDI.KEYID = 6
6,367,347 UART: [ldev] SUBJECT.KEYID = 5
6,368,510 UART: [ldev] AUTHORITY.KEYID = 7
6,369,743 UART: [ldev] FE.KEYID = 1
6,378,769 UART: [ldev] Erasing FE.KEYID = 1
8,858,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,187 UART: [ldev] --
10,650,964 UART: [fwproc] Wait for Commands...
10,653,334 UART: [fwproc] Recv command 0x46574c44
10,655,642 UART: [fwproc] Recv'd Img size: 118548 bytes
15,341,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,426,863 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,550,463 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,110,874 >>> mbox cmd response: success
16,115,412 UART: [afmc] ++
16,116,126 UART: [afmc] CDI.KEYID = 6
16,117,374 UART: [afmc] SUBJECT.KEYID = 7
16,118,821 UART: [afmc] AUTHORITY.KEYID = 5
18,620,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,343,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,345,839 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,360,940 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,376,191 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,391,246 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,413,499 UART: [afmc] --
20,416,502 UART: [cold-reset] --
20,421,998 UART: [state] Locking Datavault
20,427,862 UART: [state] Locking PCR0, PCR1 and PCR31
20,430,028 UART: [state] Locking ICCM
20,432,185 UART: [exit] Launching FMC @ 0x40000130
20,440,882 UART:
20,441,119 UART: Running Caliptra FMC ...
20,442,374 UART:
20,442,544 UART: [state] CFI Enabled
20,450,326 UART: [fht] FMC Alias Private Key: 7
22,216,240 UART: [art] Extend RT PCRs Done
22,217,437 UART: [art] Lock RT PCRs Done
22,219,278 UART: [art] Populate DV Done
22,224,643 UART: [fht] FMC Alias Private Key: 7
22,226,199 UART: [art] Derive CDI
22,226,938 UART: [art] Store in slot 0x4
22,269,693 UART: [art] Derive Key Pair
22,270,696 UART: [art] Store priv key in slot 0x5
24,697,715 UART: [art] Derive Key Pair - Done
24,710,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,417,045 UART: [art] Erasing AUTHORITY.KEYID = 7
26,418,547 UART: [art] PUB.X = 43CBE3E63608232547BF42DC60E77A48253CD2CD87A38601BBAB33A1ACE92018855A5DEA7D3DD5FEE0643DEE0D2A6244
26,425,818 UART: [art] PUB.Y = B7A60C4769942733BF92D253446301346AC1F4EDB0AA0474471F54B0BC18609EFA8C213B2BD99C2897F2867784852355
26,433,078 UART: [art] SIG.R = D4651259FC2F38C630F466EDEB07012E9B909D9910BB7EDA419CB7624E164108FD280035B785B36CFF285CAE8FC3A56B
26,440,452 UART: [art] SIG.S = 13FE9280D9F50385D3048B80B8A7C0242418B65F99131485CA234E37B51C1F6C60B8D86C25F6B88AEC7C9959C98B4015
27,419,287 UART: Caliptra RT
27,419,999 UART: [state] CFI Enabled
27,552,512 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,604,194 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,759,785 UART: [rt]cmd =0x41544d4e, len=14344
36,674,671 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
3,754,106 ready_for_fw is high
3,754,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,143,225 >>> mbox cmd response: success
20,400,351 UART:
20,400,749 UART: Running Caliptra FMC ...
20,401,949 UART:
20,402,126 UART: [state] CFI Enabled
20,410,250 UART: [fht] FMC Alias Private Key: 7
22,176,086 UART: [art] Extend RT PCRs Done
22,177,324 UART: [art] Lock RT PCRs Done
22,178,905 UART: [art] Populate DV Done
22,184,127 UART: [fht] FMC Alias Private Key: 7
22,185,742 UART: [art] Derive CDI
22,186,566 UART: [art] Store in slot 0x4
22,229,440 UART: [art] Derive Key Pair
22,230,441 UART: [art] Store priv key in slot 0x5
24,657,147 UART: [art] Derive Key Pair - Done
24,670,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,376,395 UART: [art] Erasing AUTHORITY.KEYID = 7
26,377,964 UART: [art] PUB.X = B2CBC91A3F61174FB8E666246CDADACC1F4E82A2C139A9EC540F232B73240DE2E0978237EBA9B3204C9AF7BD7D1157FF
26,385,228 UART: [art] PUB.Y = 51EACD640310911A442E71E0B18A2C674B51FE9004587929628648EAC8F93821CA0AF2D5A3EA71F0B7CFFEEA25F78BF8
26,392,484 UART: [art] SIG.R = D71DF26E13271150DEDC3951A944A0FAFFF629266D249603764EF1C2DD9F9303211E5808881D64D5772C1DFAA6652DAA
26,399,862 UART: [art] SIG.S = 7724F11490293970F9A21578A1740873962B7D0FC5C5492A52DA28FDD4A8707664425183ED31E0039A6BD2CB5DC32BC0
27,378,337 UART: Caliptra RT
27,379,073 UART: [state] CFI Enabled
27,512,476 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,568,938 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,724,638 UART: [rt]cmd =0x41544d4e, len=14344
36,643,045 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,587 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,237 UART: [kat] SHA2-256
882,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,283 UART: [kat] ++
886,435 UART: [kat] sha1
890,787 UART: [kat] SHA2-256
892,725 UART: [kat] SHA2-384
895,262 UART: [kat] SHA2-512-ACC
897,163 UART: [kat] ECC-384
903,124 UART: [kat] HMAC-384Kdf
907,844 UART: [kat] LMS
1,476,040 UART: [kat] --
1,476,849 UART: [cold-reset] ++
1,477,393 UART: [fht] Storing FHT @ 0x50003400
1,480,240 UART: [idev] ++
1,480,408 UART: [idev] CDI.KEYID = 6
1,480,768 UART: [idev] SUBJECT.KEYID = 7
1,481,192 UART: [idev] UDS.KEYID = 0
1,481,537 ready_for_fw is high
1,481,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,162 UART: [idev] Erasing UDS.KEYID = 0
1,505,768 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,400 UART: [idev] --
1,515,523 UART: [ldev] ++
1,515,691 UART: [ldev] CDI.KEYID = 6
1,516,054 UART: [ldev] SUBJECT.KEYID = 5
1,516,480 UART: [ldev] AUTHORITY.KEYID = 7
1,516,943 UART: [ldev] FE.KEYID = 1
1,521,967 UART: [ldev] Erasing FE.KEYID = 1
1,547,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,156 UART: [ldev] --
1,586,467 UART: [fwproc] Waiting for Commands...
1,587,198 UART: [fwproc] Received command 0x46574c44
1,587,989 UART: [fwproc] Received Image of size 118548 bytes
5,243,136 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,271,710 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,302,928 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,443,165 >>> mbox cmd response: success
5,444,401 UART: [afmc] ++
5,444,569 UART: [afmc] CDI.KEYID = 6
5,444,931 UART: [afmc] SUBJECT.KEYID = 7
5,445,356 UART: [afmc] AUTHORITY.KEYID = 5
5,480,729 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,497,233 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,498,013 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,503,719 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,509,598 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,515,311 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,523,174 UART: [afmc] --
5,524,230 UART: [cold-reset] --
5,524,968 UART: [state] Locking Datavault
5,526,301 UART: [state] Locking PCR0, PCR1 and PCR31
5,526,905 UART: [state] Locking ICCM
5,527,543 UART: [exit] Launching FMC @ 0x40000130
5,532,873 UART:
5,532,889 UART: Running Caliptra FMC ...
5,533,297 UART:
5,533,351 UART: [state] CFI Enabled
5,543,965 UART: [fht] FMC Alias Private Key: 7
5,663,029 UART: [art] Extend RT PCRs Done
5,663,457 UART: [art] Lock RT PCRs Done
5,665,077 UART: [art] Populate DV Done
5,673,542 UART: [fht] FMC Alias Private Key: 7
5,674,532 UART: [art] Derive CDI
5,674,812 UART: [art] Store in slot 0x4
5,760,436 UART: [art] Derive Key Pair
5,760,796 UART: [art] Store priv key in slot 0x5
5,773,671 UART: [art] Derive Key Pair - Done
5,788,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,803,526 UART: [art] Erasing AUTHORITY.KEYID = 7
5,804,291 UART: [art] PUB.X = D664D629F8BA89D08B69A75CE5191A8081129BBEE97B3F924781CA195663B9E10E9EFEEB4A9638B3EF32D2517DE0C5F2
5,811,068 UART: [art] PUB.Y = D81C7631D32A551E9E8DFBEDE4D1BEF504B6255919D16A2E09F99F5702FBF3556CA57FD6CFA6D2CF333E1D3FC8DCC45E
5,818,033 UART: [art] SIG.R = F8FECF2A9BCE1BA404963A6354C8F977E2EC1C5F4261CEEA77D9EEADCABDCF8237825085CA649B876BCB66D70733D293
5,824,819 UART: [art] SIG.S = A43FF879242090FC5BF09F53152FD72E41C8CD1DAE450F2BE1AC0B19EE09EC520389E45D0A1D2D5A363766F304DF09C3
5,848,600 UART: Caliptra RT
5,848,851 UART: [state] CFI Enabled
5,968,690 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,969,360 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,092,320 UART: [rt]cmd =0x41544d4e, len=14344
10,983,825 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,213 ready_for_fw is high
1,362,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,443,689 >>> mbox cmd response: success
5,504,874 UART:
5,504,890 UART: Running Caliptra FMC ...
5,505,298 UART:
5,505,352 UART: [state] CFI Enabled
5,515,924 UART: [fht] FMC Alias Private Key: 7
5,634,382 UART: [art] Extend RT PCRs Done
5,634,810 UART: [art] Lock RT PCRs Done
5,636,228 UART: [art] Populate DV Done
5,644,295 UART: [fht] FMC Alias Private Key: 7
5,645,333 UART: [art] Derive CDI
5,645,613 UART: [art] Store in slot 0x4
5,731,411 UART: [art] Derive Key Pair
5,731,771 UART: [art] Store priv key in slot 0x5
5,744,874 UART: [art] Derive Key Pair - Done
5,759,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,774,622 UART: [art] Erasing AUTHORITY.KEYID = 7
5,775,387 UART: [art] PUB.X = 269B7F57E51DB27AB76AD1416D280E533CCDF784A83DDA4E7C54FDC29952C6217EE6D50B76923556E76D308107979776
5,782,148 UART: [art] PUB.Y = 339FB7CAEC39B9A32A4ACEB9175DBF80F60D14A522CDF39CFCA991E2957135C278677DD38580773B83D6782A8786E736
5,789,101 UART: [art] SIG.R = E0D9C134787EBF0ED1668AD265768BEFDF4565A404B0DEC3D2AA330DFD2F53E3D5EDCEA18C2FF9D3878217BC365AB124
5,795,884 UART: [art] SIG.S = 603150C425E944D1AA9DBE2D25DF0F52F43812CB3B97BB9ED0B19BD6AA627299648B29210A8ECC6A5C509EB2292371F4
5,819,502 UART: Caliptra RT
5,819,753 UART: [state] CFI Enabled
5,939,675 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,940,345 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,063,575 UART: [rt]cmd =0x41544d4e, len=14344
10,993,000 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,266 UART: [kat] SHA2-256
882,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,312 UART: [kat] ++
886,464 UART: [kat] sha1
890,626 UART: [kat] SHA2-256
892,564 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
902,917 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,394 UART: [cold-reset] ++
1,476,970 UART: [fht] Storing FHT @ 0x50003400
1,479,889 UART: [idev] ++
1,480,057 UART: [idev] CDI.KEYID = 6
1,480,417 UART: [idev] SUBJECT.KEYID = 7
1,480,841 UART: [idev] UDS.KEYID = 0
1,481,186 ready_for_fw is high
1,481,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,763 UART: [idev] Erasing UDS.KEYID = 0
1,505,589 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,391 UART: [idev] --
1,515,422 UART: [ldev] ++
1,515,590 UART: [ldev] CDI.KEYID = 6
1,515,953 UART: [ldev] SUBJECT.KEYID = 5
1,516,379 UART: [ldev] AUTHORITY.KEYID = 7
1,516,842 UART: [ldev] FE.KEYID = 1
1,522,124 UART: [ldev] Erasing FE.KEYID = 1
1,547,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,245 UART: [ldev] --
1,586,758 UART: [fwproc] Waiting for Commands...
1,587,537 UART: [fwproc] Received command 0x46574c44
1,588,328 UART: [fwproc] Received Image of size 118548 bytes
5,207,098 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,235,108 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,266,326 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,406,563 >>> mbox cmd response: success
5,407,765 UART: [afmc] ++
5,407,933 UART: [afmc] CDI.KEYID = 6
5,408,295 UART: [afmc] SUBJECT.KEYID = 7
5,408,720 UART: [afmc] AUTHORITY.KEYID = 5
5,443,975 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,460,443 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,461,223 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,466,929 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,472,808 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,478,521 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,486,344 UART: [afmc] --
5,487,428 UART: [cold-reset] --
5,488,352 UART: [state] Locking Datavault
5,489,617 UART: [state] Locking PCR0, PCR1 and PCR31
5,490,221 UART: [state] Locking ICCM
5,490,847 UART: [exit] Launching FMC @ 0x40000130
5,496,177 UART:
5,496,193 UART: Running Caliptra FMC ...
5,496,601 UART:
5,496,744 UART: [state] CFI Enabled
5,507,608 UART: [fht] FMC Alias Private Key: 7
5,626,608 UART: [art] Extend RT PCRs Done
5,627,036 UART: [art] Lock RT PCRs Done
5,628,780 UART: [art] Populate DV Done
5,637,107 UART: [fht] FMC Alias Private Key: 7
5,638,069 UART: [art] Derive CDI
5,638,349 UART: [art] Store in slot 0x4
5,724,333 UART: [art] Derive Key Pair
5,724,693 UART: [art] Store priv key in slot 0x5
5,738,034 UART: [art] Derive Key Pair - Done
5,752,794 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,767,769 UART: [art] Erasing AUTHORITY.KEYID = 7
5,768,534 UART: [art] PUB.X = F8CC4A6FA925ADD301AA617E9FB9E20C77B922423BF92E237FA913E70678C8337EA172DAB76EC5C4F7A321C8BC986792
5,775,307 UART: [art] PUB.Y = 5D018E47209FFC98098556181FACB3886496BD9E23BFA9F65FF90FE779263C3194327094875B94B19B0C2018BCAE4D29
5,782,243 UART: [art] SIG.R = 436829E2C6E7EBBA2850CFFF1AFDAB1CE1BF6336685D6C12E63B872224CEB9FFC78208D13451918AE31F95F2DCBD2227
5,789,026 UART: [art] SIG.S = 7A67E8901CDAAC0B6A2EDD7CAECF6C16D723413A95E61FAB8FFE6513588E56597FB70D842C9073CC480C8DB05ABD6D97
5,812,755 UART: Caliptra RT
5,813,098 UART: [state] CFI Enabled
5,933,415 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,934,085 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,056,773 UART: [rt]cmd =0x41544d4e, len=14344
10,910,212 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,238 ready_for_fw is high
1,363,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,178,807 >>> mbox cmd response: success
5,240,350 UART:
5,240,366 UART: Running Caliptra FMC ...
5,240,774 UART:
5,240,917 UART: [state] CFI Enabled
5,251,805 UART: [fht] FMC Alias Private Key: 7
5,371,403 UART: [art] Extend RT PCRs Done
5,371,831 UART: [art] Lock RT PCRs Done
5,373,287 UART: [art] Populate DV Done
5,381,584 UART: [fht] FMC Alias Private Key: 7
5,382,516 UART: [art] Derive CDI
5,382,796 UART: [art] Store in slot 0x4
5,468,608 UART: [art] Derive Key Pair
5,468,968 UART: [art] Store priv key in slot 0x5
5,481,871 UART: [art] Derive Key Pair - Done
5,496,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,512,313 UART: [art] Erasing AUTHORITY.KEYID = 7
5,513,078 UART: [art] PUB.X = F5F0EE28C8B99A4DF7DAD3F5032888E1BFC9FFBFC0A72E282C3236C7DEBD2D4FDBE7EE1BEDF2820CC4A25180D9F6473B
5,519,874 UART: [art] PUB.Y = 982F6E393308DD53DAD76891A898AB11A978FC06B324C95C72ED690E536F56A3E4B81D2082C88AD4DC6E4C2E7C1F7F21
5,526,823 UART: [art] SIG.R = 6999626A72CF620EBEBE58730A01D913E580FB60CC3437B445C1CF8531B4FDC9AE87FE092F61445DFAE696C0A5F62AF8
5,533,593 UART: [art] SIG.S = 83B8697782CAF569FB6BC7B7BC5AA633B44D9B989CE104A1A310754C946973E2CB05E9619C48E0442B6C5ED8BD2E2496
5,557,909 UART: Caliptra RT
5,558,252 UART: [state] CFI Enabled
5,677,900 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,678,570 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,801,644 UART: [rt]cmd =0x41544d4e, len=14344
10,806,727 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,290 UART: [kat] ++
895,442 UART: [kat] sha1
899,812 UART: [kat] SHA2-256
901,752 UART: [kat] SHA2-384
904,459 UART: [kat] SHA2-512-ACC
906,360 UART: [kat] ECC-384
915,703 UART: [kat] HMAC-384Kdf
920,143 UART: [kat] LMS
1,168,455 UART: [kat] --
1,169,308 UART: [cold-reset] ++
1,169,644 UART: [fht] FHT @ 0x50003400
1,172,458 UART: [idev] ++
1,172,626 UART: [idev] CDI.KEYID = 6
1,172,987 UART: [idev] SUBJECT.KEYID = 7
1,173,412 UART: [idev] UDS.KEYID = 0
1,173,758 ready_for_fw is high
1,173,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,961 UART: [idev] Erasing UDS.KEYID = 0
1,197,311 UART: [idev] Sha1 KeyId Algorithm
1,206,363 UART: [idev] --
1,207,424 UART: [ldev] ++
1,207,592 UART: [ldev] CDI.KEYID = 6
1,207,956 UART: [ldev] SUBJECT.KEYID = 5
1,208,383 UART: [ldev] AUTHORITY.KEYID = 7
1,208,846 UART: [ldev] FE.KEYID = 1
1,213,890 UART: [ldev] Erasing FE.KEYID = 1
1,240,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,906 UART: [ldev] --
1,279,297 UART: [fwproc] Wait for Commands...
1,280,098 UART: [fwproc] Recv command 0x46574c44
1,280,831 UART: [fwproc] Recv'd Img size: 118548 bytes
3,161,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,189,745 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,220,920 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,361,167 >>> mbox cmd response: success
3,362,299 UART: [afmc] ++
3,362,467 UART: [afmc] CDI.KEYID = 6
3,362,830 UART: [afmc] SUBJECT.KEYID = 7
3,363,256 UART: [afmc] AUTHORITY.KEYID = 5
3,398,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,414,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,415,645 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,421,352 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,427,229 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,432,939 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,440,541 UART: [afmc] --
3,441,590 UART: [cold-reset] --
3,442,452 UART: [state] Locking Datavault
3,443,577 UART: [state] Locking PCR0, PCR1 and PCR31
3,444,181 UART: [state] Locking ICCM
3,444,751 UART: [exit] Launching FMC @ 0x40000130
3,450,081 UART:
3,450,097 UART: Running Caliptra FMC ...
3,450,505 UART:
3,450,559 UART: [state] CFI Enabled
3,461,137 UART: [fht] FMC Alias Private Key: 7
3,580,247 UART: [art] Extend RT PCRs Done
3,580,675 UART: [art] Lock RT PCRs Done
3,582,523 UART: [art] Populate DV Done
3,590,906 UART: [fht] FMC Alias Private Key: 7
3,591,956 UART: [art] Derive CDI
3,592,236 UART: [art] Store in slot 0x4
3,677,737 UART: [art] Derive Key Pair
3,678,097 UART: [art] Store priv key in slot 0x5
3,691,683 UART: [art] Derive Key Pair - Done
3,706,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,721,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,722,491 UART: [art] PUB.X = 5A970E3E839C2ED1EC0853DAFD5FAE623B1A4440513EB01B712338D4FCEAECA618427DAC27537FD5B048E7188A403B48
3,729,267 UART: [art] PUB.Y = 775BC00FBA25E471EB05ADB9A4C0EAA6C58C4CCD615ED52AA44C6A71A69C3A46DF88375C553CDDA9F4E185A381D3A528
3,736,233 UART: [art] SIG.R = 3F0DB0AACFDE727512644AC0A45AD20FCDFE0FFA4CD1065575A992D7B0A7DF63C8BAD501301CEA70892897E8249FFB71
3,743,008 UART: [art] SIG.S = F47A8D56096D313DC2001C75D78FAA34286B4151F40CF4508662DAD4F744B3CCC03AA12049C9CB9D4C1C209E2AA546B9
3,767,066 UART: Caliptra RT
3,767,317 UART: [state] CFI Enabled
3,887,429 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,888,099 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,011,155 UART: [rt]cmd =0x41544d4e, len=14344
5,465,882 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,444 ready_for_fw is high
1,059,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,021 >>> mbox cmd response: success
3,281,330 UART:
3,281,346 UART: Running Caliptra FMC ...
3,281,754 UART:
3,281,808 UART: [state] CFI Enabled
3,292,250 UART: [fht] FMC Alias Private Key: 7
3,411,470 UART: [art] Extend RT PCRs Done
3,411,898 UART: [art] Lock RT PCRs Done
3,413,416 UART: [art] Populate DV Done
3,421,715 UART: [fht] FMC Alias Private Key: 7
3,422,683 UART: [art] Derive CDI
3,422,963 UART: [art] Store in slot 0x4
3,508,584 UART: [art] Derive Key Pair
3,508,944 UART: [art] Store priv key in slot 0x5
3,522,342 UART: [art] Derive Key Pair - Done
3,536,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,552,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,553,106 UART: [art] PUB.X = FCE6FB7C300C1E5076CBA76C77A63CFED2C2311FEA52482E209E0ACD0F1C8C6B897A4D8B18B01E2DCD3263DC7EBBE7AE
3,559,897 UART: [art] PUB.Y = A106C3A67EB673F2DFFBB5B477FBBA08D130839DCEBD5F2FCBEBD900A99F15721038FC8F540AADEF2AC1ED1DC076CC36
3,566,848 UART: [art] SIG.R = 86750E8A5E5E111D064E2FE7120825875F36745EAD3AB585B4E778AA71A2531DE0A98CC8331440995537BBB7B4AEDC34
3,573,611 UART: [art] SIG.S = 5B13DBC34A7D6F460D2B1E4B1DA6C30DB8A66A8E1C9178CB0397EB4A31D5176087DB843257C2D8C3434F963AC1BE50B5
3,597,344 UART: Caliptra RT
3,597,595 UART: [state] CFI Enabled
3,717,611 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,718,281 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,407 UART: [rt]cmd =0x41544d4e, len=14344
5,283,007 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,601 UART: [kat] ++
895,753 UART: [kat] sha1
900,059 UART: [kat] SHA2-256
901,999 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
920,842 UART: [kat] LMS
1,169,154 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,627 UART: [fht] FHT @ 0x50003400
1,173,217 UART: [idev] ++
1,173,385 UART: [idev] CDI.KEYID = 6
1,173,746 UART: [idev] SUBJECT.KEYID = 7
1,174,171 UART: [idev] UDS.KEYID = 0
1,174,517 ready_for_fw is high
1,174,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,199,368 UART: [idev] Sha1 KeyId Algorithm
1,208,110 UART: [idev] --
1,209,095 UART: [ldev] ++
1,209,263 UART: [ldev] CDI.KEYID = 6
1,209,627 UART: [ldev] SUBJECT.KEYID = 5
1,210,054 UART: [ldev] AUTHORITY.KEYID = 7
1,210,517 UART: [ldev] FE.KEYID = 1
1,215,733 UART: [ldev] Erasing FE.KEYID = 1
1,242,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,915 UART: [ldev] --
1,282,368 UART: [fwproc] Wait for Commands...
1,283,063 UART: [fwproc] Recv command 0x46574c44
1,283,796 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,742 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,917 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,290 >>> mbox cmd response: success
3,374,394 UART: [afmc] ++
3,374,562 UART: [afmc] CDI.KEYID = 6
3,374,925 UART: [afmc] SUBJECT.KEYID = 7
3,375,351 UART: [afmc] AUTHORITY.KEYID = 5
3,411,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,920 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,627 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,504 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,214 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,784 UART: [afmc] --
3,453,771 UART: [cold-reset] --
3,454,543 UART: [state] Locking Datavault
3,455,752 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,356 UART: [state] Locking ICCM
3,457,006 UART: [exit] Launching FMC @ 0x40000130
3,462,336 UART:
3,462,352 UART: Running Caliptra FMC ...
3,462,760 UART:
3,462,903 UART: [state] CFI Enabled
3,473,729 UART: [fht] FMC Alias Private Key: 7
3,593,067 UART: [art] Extend RT PCRs Done
3,593,495 UART: [art] Lock RT PCRs Done
3,595,001 UART: [art] Populate DV Done
3,603,270 UART: [fht] FMC Alias Private Key: 7
3,604,304 UART: [art] Derive CDI
3,604,584 UART: [art] Store in slot 0x4
3,690,551 UART: [art] Derive Key Pair
3,690,911 UART: [art] Store priv key in slot 0x5
3,704,529 UART: [art] Derive Key Pair - Done
3,719,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,296 UART: [art] PUB.X = 85C3F960304938950651C632A70FB98F60AB798C27179C81F4D6DD7AEF4BBEE313A3896DF88CC9D465B429F63CB47DE4
3,742,066 UART: [art] PUB.Y = BE4400C7ABDAF962A958AC934D4B64D111CF2C3236E464143D4CC22A12C5B7E7E8DA293B64E1E2E3127566837BFD966E
3,749,004 UART: [art] SIG.R = 7F00641A30B791215A2D7F210D666C20F34D688868DFB170CDCC7DFC90153876EF6258D5D6A39DD5036320E62E1DCAD7
3,755,750 UART: [art] SIG.S = 6A6D7D278136B8736A98EAB437206808CA8B74C02CFB7C78275523FE0E4CD0F09B187265DEE0A35361E70BC9B5648E08
3,779,236 UART: Caliptra RT
3,779,579 UART: [state] CFI Enabled
3,899,313 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,899,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,867 UART: [rt]cmd =0x41544d4e, len=14344
5,466,538 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,217 ready_for_fw is high
1,059,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,664 >>> mbox cmd response: success
3,287,225 UART:
3,287,241 UART: Running Caliptra FMC ...
3,287,649 UART:
3,287,792 UART: [state] CFI Enabled
3,298,448 UART: [fht] FMC Alias Private Key: 7
3,417,916 UART: [art] Extend RT PCRs Done
3,418,344 UART: [art] Lock RT PCRs Done
3,419,884 UART: [art] Populate DV Done
3,427,985 UART: [fht] FMC Alias Private Key: 7
3,429,095 UART: [art] Derive CDI
3,429,375 UART: [art] Store in slot 0x4
3,514,672 UART: [art] Derive Key Pair
3,515,032 UART: [art] Store priv key in slot 0x5
3,528,654 UART: [art] Derive Key Pair - Done
3,543,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,536 UART: [art] PUB.X = 56AAC514A8CD26A918BEEC8DA607212A80CE9570ECF8B0FF7F6756EE5F963CF4EE87105F27065956FA22CCF13575B07A
3,566,314 UART: [art] PUB.Y = 01C97FB70DFD50188173B7A36B95D736B123071CAD3BD8E1937BDBF3DAE36A7C5A929FE8687C8853A3CB37ED048ACC49
3,573,266 UART: [art] SIG.R = AF252D3CAD10B63947218F04718E5B066BB8E3DB902A51092B45B4A72E3A247D6DAF1DBAE793020C02372A99C32526A5
3,580,022 UART: [art] SIG.S = F07B023B8DCCB79ABBF19F261B313D5DCC8921B50930921859FA99C5F3BE95322C65AAD8169E03ED139315A73B287240
3,604,077 UART: Caliptra RT
3,604,420 UART: [state] CFI Enabled
3,724,087 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,724,757 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,955 UART: [rt]cmd =0x41544d4e, len=14344
5,297,876 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
893,250 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,375 UART: [kat] ++
897,527 UART: [kat] sha1
901,727 UART: [kat] SHA2-256
903,667 UART: [kat] SHA2-384
906,514 UART: [kat] SHA2-512-ACC
908,415 UART: [kat] ECC-384
918,032 UART: [kat] HMAC-384Kdf
922,698 UART: [kat] LMS
1,171,026 UART: [kat] --
1,171,923 UART: [cold-reset] ++
1,172,249 UART: [fht] FHT @ 0x50003400
1,174,908 UART: [idev] ++
1,175,076 UART: [idev] CDI.KEYID = 6
1,175,436 UART: [idev] SUBJECT.KEYID = 7
1,175,860 UART: [idev] UDS.KEYID = 0
1,176,205 ready_for_fw is high
1,176,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,924 UART: [idev] Erasing UDS.KEYID = 0
1,200,971 UART: [idev] Sha1 KeyId Algorithm
1,209,275 UART: [idev] --
1,210,539 UART: [ldev] ++
1,210,707 UART: [ldev] CDI.KEYID = 6
1,211,070 UART: [ldev] SUBJECT.KEYID = 5
1,211,496 UART: [ldev] AUTHORITY.KEYID = 7
1,211,959 UART: [ldev] FE.KEYID = 1
1,217,185 UART: [ldev] Erasing FE.KEYID = 1
1,243,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,093 UART: [ldev] --
1,282,396 UART: [fwproc] Wait for Commands...
1,283,130 UART: [fwproc] Recv command 0x46574c44
1,283,858 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,888 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,058 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,225 >>> mbox cmd response: success
3,372,261 UART: [afmc] ++
3,372,429 UART: [afmc] CDI.KEYID = 6
3,372,791 UART: [afmc] SUBJECT.KEYID = 7
3,373,216 UART: [afmc] AUTHORITY.KEYID = 5
3,409,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,722 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,470 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,176 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,438,055 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,765 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,484 UART: [afmc] --
3,452,576 UART: [cold-reset] --
3,453,388 UART: [state] Locking Datavault
3,454,163 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,767 UART: [state] Locking ICCM
3,455,395 UART: [exit] Launching FMC @ 0x40000130
3,460,725 UART:
3,460,741 UART: Running Caliptra FMC ...
3,461,149 UART:
3,461,203 UART: [state] CFI Enabled
3,471,529 UART: [fht] FMC Alias Private Key: 7
3,590,707 UART: [art] Extend RT PCRs Done
3,591,135 UART: [art] Lock RT PCRs Done
3,592,889 UART: [art] Populate DV Done
3,601,148 UART: [fht] FMC Alias Private Key: 7
3,602,276 UART: [art] Derive CDI
3,602,556 UART: [art] Store in slot 0x4
3,688,249 UART: [art] Derive Key Pair
3,688,609 UART: [art] Store priv key in slot 0x5
3,702,525 UART: [art] Derive Key Pair - Done
3,717,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,851 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,616 UART: [art] PUB.X = 6927DF13B1712C5C4E578992F904B396A085B226CEEA57D164FCEEEFBC9BE88EE70309364B2435242E550D16738146CA
3,740,376 UART: [art] PUB.Y = 0903105E253D9FEFDB4426046E43D751727F07D78BF1B74FCFB32C602E90BCAFB0541E2CFAFB9A177BE3685AEBA5C215
3,747,330 UART: [art] SIG.R = 97CBC98F1F3A0E92719BF71BEC4CB7C23D13B53260B3C1A2D6F37CAEE50B0DADA84B4281912C8995B5EB404B82F705D8
3,754,104 UART: [art] SIG.S = 40EF477ED85EA1AD9CE5484DA972AC4F78D025756698DC310DDA68658E180E40CC1F2E6DC4D93C57D1AFC92E96CAB125
3,777,954 UART: Caliptra RT
3,778,205 UART: [state] CFI Enabled
3,898,001 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,898,671 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,593 UART: [rt]cmd =0x41544d4e, len=14344
5,463,185 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,059 ready_for_fw is high
1,060,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,230,691 >>> mbox cmd response: success
3,293,244 UART:
3,293,260 UART: Running Caliptra FMC ...
3,293,668 UART:
3,293,722 UART: [state] CFI Enabled
3,304,146 UART: [fht] FMC Alias Private Key: 7
3,422,934 UART: [art] Extend RT PCRs Done
3,423,362 UART: [art] Lock RT PCRs Done
3,425,014 UART: [art] Populate DV Done
3,433,263 UART: [fht] FMC Alias Private Key: 7
3,434,249 UART: [art] Derive CDI
3,434,529 UART: [art] Store in slot 0x4
3,520,444 UART: [art] Derive Key Pair
3,520,804 UART: [art] Store priv key in slot 0x5
3,534,232 UART: [art] Derive Key Pair - Done
3,549,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,564,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,565,196 UART: [art] PUB.X = A1E7C6B4E89A101AE10FDF8AB927790CE5BC69CDC2A593E474888D95846A22B2A2207D6B9989248822161CBADD08B360
3,571,963 UART: [art] PUB.Y = DB4AC58A134CED93B6C1198614D6C23FA017EC8207746F1D5CD27EAE37BCC0AE56352324FF000C9A88ECBBCB591535B7
3,578,901 UART: [art] SIG.R = E1958EBD64706E1BFFF8886707796C7261B57F1D3ABFE4E2EF01FDADA6BBF94D2DFF9CDA53EC4C53DBA2D155A66C3991
3,585,691 UART: [art] SIG.S = 7AB194526E47963B3A12646E5B0564D124727C7CB665BA645E50E6751A520463DD3D8603D37F12AB1A0D76EDA541C997
3,609,577 UART: Caliptra RT
3,609,828 UART: [state] CFI Enabled
3,729,920 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,730,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,696 UART: [rt]cmd =0x41544d4e, len=14344
5,318,695 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
893,443 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,568 UART: [kat] ++
897,720 UART: [kat] sha1
901,956 UART: [kat] SHA2-256
903,896 UART: [kat] SHA2-384
906,647 UART: [kat] SHA2-512-ACC
908,548 UART: [kat] ECC-384
918,289 UART: [kat] HMAC-384Kdf
922,749 UART: [kat] LMS
1,171,077 UART: [kat] --
1,171,736 UART: [cold-reset] ++
1,172,246 UART: [fht] FHT @ 0x50003400
1,175,073 UART: [idev] ++
1,175,241 UART: [idev] CDI.KEYID = 6
1,175,601 UART: [idev] SUBJECT.KEYID = 7
1,176,025 UART: [idev] UDS.KEYID = 0
1,176,370 ready_for_fw is high
1,176,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,787 UART: [idev] Erasing UDS.KEYID = 0
1,201,256 UART: [idev] Sha1 KeyId Algorithm
1,209,790 UART: [idev] --
1,210,836 UART: [ldev] ++
1,211,004 UART: [ldev] CDI.KEYID = 6
1,211,367 UART: [ldev] SUBJECT.KEYID = 5
1,211,793 UART: [ldev] AUTHORITY.KEYID = 7
1,212,256 UART: [ldev] FE.KEYID = 1
1,217,728 UART: [ldev] Erasing FE.KEYID = 1
1,244,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,150 UART: [ldev] --
1,283,473 UART: [fwproc] Wait for Commands...
1,284,147 UART: [fwproc] Recv command 0x46574c44
1,284,875 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,007 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,177 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,568 >>> mbox cmd response: success
3,369,780 UART: [afmc] ++
3,369,948 UART: [afmc] CDI.KEYID = 6
3,370,310 UART: [afmc] SUBJECT.KEYID = 7
3,370,735 UART: [afmc] AUTHORITY.KEYID = 5
3,405,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,422,795 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,543 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,429,249 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,435,128 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,440,838 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,448,555 UART: [afmc] --
3,449,605 UART: [cold-reset] --
3,450,679 UART: [state] Locking Datavault
3,451,864 UART: [state] Locking PCR0, PCR1 and PCR31
3,452,468 UART: [state] Locking ICCM
3,453,128 UART: [exit] Launching FMC @ 0x40000130
3,458,458 UART:
3,458,474 UART: Running Caliptra FMC ...
3,458,882 UART:
3,459,025 UART: [state] CFI Enabled
3,469,655 UART: [fht] FMC Alias Private Key: 7
3,589,419 UART: [art] Extend RT PCRs Done
3,589,847 UART: [art] Lock RT PCRs Done
3,591,509 UART: [art] Populate DV Done
3,599,838 UART: [fht] FMC Alias Private Key: 7
3,600,834 UART: [art] Derive CDI
3,601,114 UART: [art] Store in slot 0x4
3,686,971 UART: [art] Derive Key Pair
3,687,331 UART: [art] Store priv key in slot 0x5
3,700,527 UART: [art] Derive Key Pair - Done
3,715,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,161 UART: [art] PUB.X = B069F4517D4D6EEA74462C2F1B5AE548A9BB78D9C15EBAB2D76636F40467E52490A6F39B3FF8BA187B690A1404D9D49D
3,738,932 UART: [art] PUB.Y = 2D0AFB81BDACC12835C11EA72FEB1A5873E8261CF2C654F245DD74DF28DB83646D116D224D2BC367648C6066E37B1951
3,745,887 UART: [art] SIG.R = 11CE29084BE0F129A61DF95646BFEA95FBDDB69B8970411401DFEB6973327FB8DC19694CE59AA534377D69B53E398DB9
3,752,659 UART: [art] SIG.S = 5769EDBDFF8CE3831B3678FEC43A16E4D6252F82EC729B43E50018863DCC3A6BBD16685AF67D3ABC9597E20BF91E04B6
3,776,445 UART: Caliptra RT
3,776,788 UART: [state] CFI Enabled
3,896,952 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,897,622 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,462 UART: [rt]cmd =0x41544d4e, len=14344
5,480,793 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,314 ready_for_fw is high
1,061,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,784 >>> mbox cmd response: success
3,281,473 UART:
3,281,489 UART: Running Caliptra FMC ...
3,281,897 UART:
3,282,040 UART: [state] CFI Enabled
3,292,704 UART: [fht] FMC Alias Private Key: 7
3,411,178 UART: [art] Extend RT PCRs Done
3,411,606 UART: [art] Lock RT PCRs Done
3,413,000 UART: [art] Populate DV Done
3,421,507 UART: [fht] FMC Alias Private Key: 7
3,422,677 UART: [art] Derive CDI
3,422,957 UART: [art] Store in slot 0x4
3,508,748 UART: [art] Derive Key Pair
3,509,108 UART: [art] Store priv key in slot 0x5
3,522,324 UART: [art] Derive Key Pair - Done
3,537,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,552,820 UART: [art] Erasing AUTHORITY.KEYID = 7
3,553,585 UART: [art] PUB.X = 800C814185E5BA7F520BAAC3C3B75259B43F261682885B883E17A2C2C7D7E798AC685C75603E24CC972AD4A3A5AF44D4
3,560,353 UART: [art] PUB.Y = BF494B7237C4FC1656D7E5BE463C87F69B747D6C8ACEE86B81EC98FEBEA31F9944088DDEBBC2299D5B5035FE10DD7EF7
3,567,322 UART: [art] SIG.R = E4BD9B670CB2DE18015591B62D283794D2687CAC8CA446CF3A260B15965D529A86FF017D6CC2FE89A917B94F846C2275
3,574,084 UART: [art] SIG.S = 88731F85242C997D77988F6BF4E67598800708E652755ACDEB8D773ADCFEBE636E9CF32E90A42597876B6B40112CC327
3,597,844 UART: Caliptra RT
3,598,187 UART: [state] CFI Enabled
3,717,472 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,718,142 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,246 UART: [rt]cmd =0x41544d4e, len=14344
5,282,644 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,124 UART:
192,468 UART: Running Caliptra ROM ...
193,649 UART:
193,807 UART: [state] CFI Enabled
263,781 UART: [state] LifecycleState = Unprovisioned
265,718 UART: [state] DebugLocked = No
268,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,683 UART: [kat] SHA2-256
442,437 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,921 UART: [kat] ++
453,399 UART: [kat] sha1
463,285 UART: [kat] SHA2-256
465,935 UART: [kat] SHA2-384
472,657 UART: [kat] SHA2-512-ACC
474,990 UART: [kat] ECC-384
2,766,746 UART: [kat] HMAC-384Kdf
2,800,594 UART: [kat] LMS
3,990,847 UART: [kat] --
3,994,299 UART: [cold-reset] ++
3,996,873 UART: [fht] Storing FHT @ 0x50003400
4,008,916 UART: [idev] ++
4,009,555 UART: [idev] CDI.KEYID = 6
4,010,468 UART: [idev] SUBJECT.KEYID = 7
4,011,718 UART: [idev] UDS.KEYID = 0
4,012,775 ready_for_fw is high
4,012,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,056 UART: [idev] Erasing UDS.KEYID = 0
7,346,207 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,430 UART: [idev] --
7,372,694 UART: [ldev] ++
7,373,280 UART: [ldev] CDI.KEYID = 6
7,374,193 UART: [ldev] SUBJECT.KEYID = 5
7,375,412 UART: [ldev] AUTHORITY.KEYID = 7
7,376,697 UART: [ldev] FE.KEYID = 1
7,422,770 UART: [ldev] Erasing FE.KEYID = 1
10,753,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,236 UART: [ldev] --
13,115,800 UART: [fwproc] Waiting for Commands...
13,118,871 UART: [fwproc] Received command 0x46574c44
13,121,054 UART: [fwproc] Received Image of size 118548 bytes
22,372,090 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,455,750 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,528,932 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,856,937 >>> mbox cmd response: success
22,861,269 UART: [afmc] ++
22,861,885 UART: [afmc] CDI.KEYID = 6
22,862,803 UART: [afmc] SUBJECT.KEYID = 7
22,864,075 UART: [afmc] AUTHORITY.KEYID = 5
26,230,711 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,528,032 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,530,300 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,544,798 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,559,594 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,573,998 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,595,292 UART: [afmc] --
28,599,163 UART: [cold-reset] --
28,603,240 UART: [state] Locking Datavault
28,608,327 UART: [state] Locking PCR0, PCR1 and PCR31
28,610,024 UART: [state] Locking ICCM
28,612,008 UART: [exit] Launching FMC @ 0x40000130
28,620,362 UART:
28,620,597 UART: Running Caliptra FMC ...
28,621,698 UART:
28,621,857 UART: [state] CFI Enabled
28,689,141 UART: [fht] FMC Alias Private Key: 7
31,028,662 UART: [art] Extend RT PCRs Done
31,029,886 UART: [art] Lock RT PCRs Done
31,031,714 UART: [art] Populate DV Done
31,037,049 UART: [fht] FMC Alias Private Key: 7
31,038,721 UART: [art] Derive CDI
31,039,465 UART: [art] Store in slot 0x4
31,096,716 UART: [art] Derive Key Pair
31,097,721 UART: [art] Store priv key in slot 0x5
34,389,658 UART: [art] Derive Key Pair - Done
34,402,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,690,757 UART: [art] Erasing AUTHORITY.KEYID = 7
36,692,264 UART: [art] PUB.X = 2101F6E80B284EC5DC68A5743CFBE87FBA4B938F021B733F1972C43CA1D81DE51CB7ACB1A2F1B63ACD7C5B0FBD690865
36,699,535 UART: [art] PUB.Y = 96CC30251270752F2CA5B33D562F2719437EE72F543A10C0B65C5618EC3C8122B3BC64155BD793295BA4FE9AFFCEAAD2
36,706,798 UART: [art] SIG.R = ED182780E54EEF6EA443319BA8DD1442B532ABA6C6081F5209F177339A7AF71BA2690FCD1F5C5E25446F026AE347B694
36,714,241 UART: [art] SIG.S = 9348ED79954661C1CE4D80898D648C7F42F9831B8977F5F1A4181340FC92B5980255CC0B38EDF5A8AFC7D3EB32012747
38,019,409 UART: Caliptra RT
38,020,132 UART: [state] CFI Enabled
38,195,886 UART: [rt] RT listening for mailbox commands...
38,198,222 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,353,484 UART: [rt]cmd =0x41544d4e, len=14344
44,820,140 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.51s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,805,184 ready_for_fw is high
3,805,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,232,134 >>> mbox cmd response: success
27,953,160 UART:
27,953,597 UART: Running Caliptra FMC ...
27,954,737 UART:
27,954,900 UART: [state] CFI Enabled
28,024,160 UART: [fht] FMC Alias Private Key: 7
30,364,098 UART: [art] Extend RT PCRs Done
30,365,333 UART: [art] Lock RT PCRs Done
30,366,825 UART: [art] Populate DV Done
30,372,290 UART: [fht] FMC Alias Private Key: 7
30,373,992 UART: [art] Derive CDI
30,374,729 UART: [art] Store in slot 0x4
30,431,767 UART: [art] Derive Key Pair
30,432,806 UART: [art] Store priv key in slot 0x5
33,725,079 UART: [art] Derive Key Pair - Done
33,737,929 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,025,873 UART: [art] Erasing AUTHORITY.KEYID = 7
36,027,382 UART: [art] PUB.X = C79A33BD960E74FF8D80BA8E9B06568B5898E4505D8A84D2EDEFB78E8BAAF7CD6FE15F478DE51D874747E41876AE0190
36,034,719 UART: [art] PUB.Y = E8590248A067945A0FC4571AD5A2CC7F7D0879C9480374C371055A0433C89C588950D14CE611310EB39DCCE79D4B93ED
36,041,946 UART: [art] SIG.R = D0651F80F8631C38326E1FDED998B6B374B1AE1ED10838EDE81F4E9FDBC7A318C1888F39D8CD476F25600FE748191055
36,049,293 UART: [art] SIG.S = C0CEEDEABAEEEE307381AD1DE8B61886FE4AE405894A6D3DA3A292AB9051049D7DB7D561A5DCA671B690B871F6E66CF6
37,354,047 UART: Caliptra RT
37,354,767 UART: [state] CFI Enabled
37,529,385 UART: [rt] RT listening for mailbox commands...
37,531,683 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,686,998 UART: [rt]cmd =0x41544d4e, len=14344
43,920,948 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.47s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
192,560 UART:
192,910 UART: Running Caliptra ROM ...
193,996 UART:
603,852 UART: [state] CFI Enabled
617,826 UART: [state] LifecycleState = Unprovisioned
619,726 UART: [state] DebugLocked = No
621,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,916 UART: [kat] SHA2-256
795,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,209 UART: [kat] ++
806,809 UART: [kat] sha1
817,969 UART: [kat] SHA2-256
820,681 UART: [kat] SHA2-384
826,812 UART: [kat] SHA2-512-ACC
829,176 UART: [kat] ECC-384
3,113,515 UART: [kat] HMAC-384Kdf
3,125,246 UART: [kat] LMS
4,315,357 UART: [kat] --
4,318,306 UART: [cold-reset] ++
4,320,371 UART: [fht] Storing FHT @ 0x50003400
4,332,993 UART: [idev] ++
4,333,550 UART: [idev] CDI.KEYID = 6
4,334,500 UART: [idev] SUBJECT.KEYID = 7
4,335,735 UART: [idev] UDS.KEYID = 0
4,336,707 ready_for_fw is high
4,336,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,832 UART: [idev] Erasing UDS.KEYID = 0
7,626,275 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,271 UART: [idev] --
7,650,501 UART: [ldev] ++
7,651,064 UART: [ldev] CDI.KEYID = 6
7,651,995 UART: [ldev] SUBJECT.KEYID = 5
7,653,254 UART: [ldev] AUTHORITY.KEYID = 7
7,654,535 UART: [ldev] FE.KEYID = 1
7,665,150 UART: [ldev] Erasing FE.KEYID = 1
10,950,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,284 UART: [ldev] --
13,309,488 UART: [fwproc] Waiting for Commands...
13,312,114 UART: [fwproc] Received command 0x46574c44
13,314,339 UART: [fwproc] Received Image of size 118548 bytes
22,324,402 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,404,634 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,477,810 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,806,538 >>> mbox cmd response: success
22,810,784 UART: [afmc] ++
22,811,398 UART: [afmc] CDI.KEYID = 6
22,812,282 UART: [afmc] SUBJECT.KEYID = 7
22,813,550 UART: [afmc] AUTHORITY.KEYID = 5
26,127,788 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,421,843 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,424,136 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,438,627 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,453,416 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,467,823 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,488,764 UART: [afmc] --
28,491,705 UART: [cold-reset] --
28,495,828 UART: [state] Locking Datavault
28,501,390 UART: [state] Locking PCR0, PCR1 and PCR31
28,503,077 UART: [state] Locking ICCM
28,504,391 UART: [exit] Launching FMC @ 0x40000130
28,512,780 UART:
28,513,007 UART: Running Caliptra FMC ...
28,514,031 UART:
28,514,176 UART: [state] CFI Enabled
28,522,666 UART: [fht] FMC Alias Private Key: 7
30,862,101 UART: [art] Extend RT PCRs Done
30,863,455 UART: [art] Lock RT PCRs Done
30,864,958 UART: [art] Populate DV Done
30,870,264 UART: [fht] FMC Alias Private Key: 7
30,871,955 UART: [art] Derive CDI
30,872,685 UART: [art] Store in slot 0x4
30,915,491 UART: [art] Derive Key Pair
30,916,485 UART: [art] Store priv key in slot 0x5
34,158,710 UART: [art] Derive Key Pair - Done
34,171,813 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,452,201 UART: [art] Erasing AUTHORITY.KEYID = 7
36,453,716 UART: [art] PUB.X = 0FC2671A23992DF9301E0DEB98DBD82CF0A5117149A7F1235EE6DD801E80FDEAC284A25CFDFDBEB4D84E70574CD9D186
36,461,013 UART: [art] PUB.Y = B76B865B9D6FB781C8A6D58D5C53818E9DD9538945C1059F1072ECF7070A2938377F63FBC1D29338A685B39A33E31B66
36,468,240 UART: [art] SIG.R = 5AFF07CF1A776A8902058142928A1A953DD368815DF4555C6E05ABB1F82D9C289E6723B0B7F36FF37A8CFAE2F2412DC8
36,475,666 UART: [art] SIG.S = 070B67B3724D319137313D07D2670C93C60686ECCE4EF1B1BF1747636F8C8463046EF9008E8B597CD7EFC8E6008C85FB
37,780,178 UART: Caliptra RT
37,780,887 UART: [state] CFI Enabled
37,913,623 UART: [rt] RT listening for mailbox commands...
37,916,164 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,071,574 UART: [rt]cmd =0x41544d4e, len=14344
44,616,218 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.50s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,127,275 ready_for_fw is high
4,127,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,202,596 >>> mbox cmd response: success
27,848,351 UART:
27,848,778 UART: Running Caliptra FMC ...
27,849,891 UART:
27,850,058 UART: [state] CFI Enabled
27,858,056 UART: [fht] FMC Alias Private Key: 7
30,198,540 UART: [art] Extend RT PCRs Done
30,199,771 UART: [art] Lock RT PCRs Done
30,201,209 UART: [art] Populate DV Done
30,206,784 UART: [fht] FMC Alias Private Key: 7
30,208,373 UART: [art] Derive CDI
30,209,119 UART: [art] Store in slot 0x4
30,251,977 UART: [art] Derive Key Pair
30,252,967 UART: [art] Store priv key in slot 0x5
33,494,722 UART: [art] Derive Key Pair - Done
33,507,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,787,497 UART: [art] Erasing AUTHORITY.KEYID = 7
35,789,002 UART: [art] PUB.X = 27DE936666BFF5007A428F5A5F262CEFF0E2A90145A29AEB8778860988B3B1173E8EEB4E02873AD3CE73B047C48D51EC
35,796,329 UART: [art] PUB.Y = 4C990389D845830954E4D409A987BBB0989CC29F2135C6A94565053CD466FFFB5CDB28801B4F5A2A2A305090E403BD22
35,803,538 UART: [art] SIG.R = 99BF147B162F323D3A057A12C1E13C66329A25F4F28E1372D5E1CDEA5310A3C997E22ED11F70B4EC427F71BEF024866F
35,810,935 UART: [art] SIG.S = 22A35485712B60CC6FA2E0B843A520BFE01517747D91625DF8EE7751752EE2EC7881FE9BAB503695A1337DEB8CC71BDB
37,116,606 UART: Caliptra RT
37,117,313 UART: [state] CFI Enabled
37,250,595 UART: [rt] RT listening for mailbox commands...
37,252,904 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,408,228 UART: [rt]cmd =0x41544d4e, len=14344
43,771,176 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,004 UART:
192,377 UART: Running Caliptra ROM ...
193,571 UART:
193,749 UART: [state] CFI Enabled
266,512 UART: [state] LifecycleState = Unprovisioned
268,498 UART: [state] DebugLocked = No
270,799 UART: [state] WD Timer not started. Device not locked for debugging
275,470 UART: [kat] SHA2-256
455,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,887 UART: [kat] ++
466,335 UART: [kat] sha1
477,134 UART: [kat] SHA2-256
479,850 UART: [kat] SHA2-384
485,622 UART: [kat] SHA2-512-ACC
487,986 UART: [kat] ECC-384
2,945,841 UART: [kat] HMAC-384Kdf
2,969,870 UART: [kat] LMS
3,446,357 UART: [kat] --
3,451,047 UART: [cold-reset] ++
3,453,125 UART: [fht] FHT @ 0x50003400
3,463,992 UART: [idev] ++
3,464,595 UART: [idev] CDI.KEYID = 6
3,465,524 UART: [idev] SUBJECT.KEYID = 7
3,466,700 UART: [idev] UDS.KEYID = 0
3,467,749 ready_for_fw is high
3,467,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,910 UART: [idev] Erasing UDS.KEYID = 0
5,986,620 UART: [idev] Sha1 KeyId Algorithm
6,010,278 UART: [idev] --
6,014,059 UART: [ldev] ++
6,014,630 UART: [ldev] CDI.KEYID = 6
6,015,547 UART: [ldev] SUBJECT.KEYID = 5
6,016,761 UART: [ldev] AUTHORITY.KEYID = 7
6,017,992 UART: [ldev] FE.KEYID = 1
6,058,595 UART: [ldev] Erasing FE.KEYID = 1
8,564,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,463 UART: [ldev] --
10,373,835 UART: [fwproc] Wait for Commands...
10,376,844 UART: [fwproc] Recv command 0x46574c44
10,378,875 UART: [fwproc] Recv'd Img size: 118548 bytes
14,917,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,999,461 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,072,480 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,401,079 >>> mbox cmd response: success
15,404,969 UART: [afmc] ++
15,405,552 UART: [afmc] CDI.KEYID = 6
15,406,589 UART: [afmc] SUBJECT.KEYID = 7
15,407,746 UART: [afmc] AUTHORITY.KEYID = 5
17,936,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,661,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,663,658 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,679,548 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,695,481 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,711,166 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,736,932 UART: [afmc] --
19,740,642 UART: [cold-reset] --
19,744,134 UART: [state] Locking Datavault
19,749,541 UART: [state] Locking PCR0, PCR1 and PCR31
19,751,292 UART: [state] Locking ICCM
19,753,977 UART: [exit] Launching FMC @ 0x40000130
19,762,424 UART:
19,762,663 UART: Running Caliptra FMC ...
19,763,782 UART:
19,763,939 UART: [state] CFI Enabled
19,819,169 UART: [fht] FMC Alias Private Key: 7
21,607,154 UART: [art] Extend RT PCRs Done
21,608,364 UART: [art] Lock RT PCRs Done
21,609,850 UART: [art] Populate DV Done
21,615,098 UART: [fht] FMC Alias Private Key: 7
21,616,584 UART: [art] Derive CDI
21,617,347 UART: [art] Store in slot 0x4
21,673,573 UART: [art] Derive Key Pair
21,674,617 UART: [art] Store priv key in slot 0x5
24,137,692 UART: [art] Derive Key Pair - Done
24,150,960 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,863,219 UART: [art] Erasing AUTHORITY.KEYID = 7
25,864,713 UART: [art] PUB.X = C09B1B47B42860F634F7598CEE2249DBC595EC717D41E9FEFCD5F3ADF1B2DB0ECD0F21249E0FA8C081E086650EE6D06B
25,872,011 UART: [art] PUB.Y = 636943A13662B28678811119D475E4E3E0399EEB2826F7AFF8C6E3B83D88A53745577B90A5D810E8362ED5DCB2B9066B
25,879,267 UART: [art] SIG.R = 6C10CA6875AEB2C32F47929AB0E227A11558E0BD821F3EAD3B8FF1276F7AAD1C59F15A3DA53CE4487953D54974A4DC30
25,886,666 UART: [art] SIG.S = F9FB5166987F8D62C8A4DE0244B719D73363367EF0B2944CD5D39E6CB1D77FCDE96CB7AA6125F86EC105CFEBBAA16FFA
26,866,031 UART: Caliptra RT
26,866,759 UART: [state] CFI Enabled
27,047,762 UART: [rt] RT listening for mailbox commands...
27,050,078 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,205,660 UART: [rt]cmd =0x41544d4e, len=14344
30,925,890 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,460,300 ready_for_fw is high
3,460,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,355,673 >>> mbox cmd response: success
19,644,585 UART:
19,644,989 UART: Running Caliptra FMC ...
19,646,128 UART:
19,646,286 UART: [state] CFI Enabled
19,711,864 UART: [fht] FMC Alias Private Key: 7
21,478,332 UART: [art] Extend RT PCRs Done
21,479,530 UART: [art] Lock RT PCRs Done
21,481,660 UART: [art] Populate DV Done
21,486,861 UART: [fht] FMC Alias Private Key: 7
21,488,560 UART: [art] Derive CDI
21,489,373 UART: [art] Store in slot 0x4
21,545,131 UART: [art] Derive Key Pair
21,546,194 UART: [art] Store priv key in slot 0x5
24,009,202 UART: [art] Derive Key Pair - Done
24,021,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,735,112 UART: [art] Erasing AUTHORITY.KEYID = 7
25,736,617 UART: [art] PUB.X = 792B4FDAE6123AA03D88746DDB72E217A59B429B7B304F59C09AEDD21DBAA675B4C5C55129BD13D981F57BF9EFBB91CF
25,743,886 UART: [art] PUB.Y = C5A33DE75397D6B070960D53424BE86C8D33A185F42934FC70245B44628A88DD9F09C3B54A320918AD492807468A6EA9
25,751,115 UART: [art] SIG.R = DE194E70731762E0E9BEA96D10B895EDD2FB78008A389E024339B4381F703BE4B27E9BB56BB6BBF383A68AE3EEAC3567
25,758,519 UART: [art] SIG.S = 1942AEE087F1AA3FF5C61009CD9CB2E1D5A9CDA0B76938CF04B273EB1691BB3AEEF3C907EC39E190101DC0B89D4F4579
26,737,432 UART: Caliptra RT
26,738,125 UART: [state] CFI Enabled
26,917,389 UART: [rt] RT listening for mailbox commands...
26,919,732 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,074,842 UART: [rt]cmd =0x41544d4e, len=14344
30,783,609 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,609 UART:
192,965 UART: Running Caliptra ROM ...
194,148 UART:
603,735 UART: [state] CFI Enabled
622,199 UART: [state] LifecycleState = Unprovisioned
624,143 UART: [state] DebugLocked = No
626,388 UART: [state] WD Timer not started. Device not locked for debugging
631,139 UART: [kat] SHA2-256
810,746 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
821,553 UART: [kat] ++
822,039 UART: [kat] sha1
833,065 UART: [kat] SHA2-256
835,771 UART: [kat] SHA2-384
841,772 UART: [kat] SHA2-512-ACC
844,091 UART: [kat] ECC-384
3,282,764 UART: [kat] HMAC-384Kdf
3,294,564 UART: [kat] LMS
3,771,083 UART: [kat] --
3,773,725 UART: [cold-reset] ++
3,774,944 UART: [fht] FHT @ 0x50003400
3,784,993 UART: [idev] ++
3,785,549 UART: [idev] CDI.KEYID = 6
3,786,503 UART: [idev] SUBJECT.KEYID = 7
3,787,746 UART: [idev] UDS.KEYID = 0
3,788,647 ready_for_fw is high
3,788,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,688 UART: [idev] Erasing UDS.KEYID = 0
6,265,889 UART: [idev] Sha1 KeyId Algorithm
6,290,143 UART: [idev] --
6,294,840 UART: [ldev] ++
6,295,425 UART: [ldev] CDI.KEYID = 6
6,296,337 UART: [ldev] SUBJECT.KEYID = 5
6,297,553 UART: [ldev] AUTHORITY.KEYID = 7
6,298,786 UART: [ldev] FE.KEYID = 1
6,311,919 UART: [ldev] Erasing FE.KEYID = 1
8,794,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,759 UART: [ldev] --
10,586,563 UART: [fwproc] Wait for Commands...
10,589,305 UART: [fwproc] Recv command 0x46574c44
10,591,298 UART: [fwproc] Recv'd Img size: 118548 bytes
15,139,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,227,679 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,300,709 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,628,530 >>> mbox cmd response: success
15,631,699 UART: [afmc] ++
15,632,318 UART: [afmc] CDI.KEYID = 6
15,633,232 UART: [afmc] SUBJECT.KEYID = 7
15,634,504 UART: [afmc] AUTHORITY.KEYID = 5
18,139,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,861,724 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,863,906 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,879,779 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,895,689 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,911,407 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,936,226 UART: [afmc] --
19,939,391 UART: [cold-reset] --
19,943,794 UART: [state] Locking Datavault
19,950,940 UART: [state] Locking PCR0, PCR1 and PCR31
19,952,715 UART: [state] Locking ICCM
19,955,464 UART: [exit] Launching FMC @ 0x40000130
19,963,863 UART:
19,964,106 UART: Running Caliptra FMC ...
19,965,209 UART:
19,965,372 UART: [state] CFI Enabled
19,973,644 UART: [fht] FMC Alias Private Key: 7
21,739,751 UART: [art] Extend RT PCRs Done
21,740,966 UART: [art] Lock RT PCRs Done
21,742,597 UART: [art] Populate DV Done
21,747,842 UART: [fht] FMC Alias Private Key: 7
21,749,471 UART: [art] Derive CDI
21,750,294 UART: [art] Store in slot 0x4
21,793,216 UART: [art] Derive Key Pair
21,794,212 UART: [art] Store priv key in slot 0x5
24,220,705 UART: [art] Derive Key Pair - Done
24,233,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,940,051 UART: [art] Erasing AUTHORITY.KEYID = 7
25,941,561 UART: [art] PUB.X = 2851C6F0CCBFAC754EA29172D2C3924A252B612154B814EAF13FD66AD0EFAAE6F42BF045934C3935145038BD0A228E75
25,948,810 UART: [art] PUB.Y = EAC740425D7787D35C6B9BE004E763537C439EEFCFDF094D98C6F9576B8D926AD63BF92961C69C2C4915F91CD95BD525
25,956,094 UART: [art] SIG.R = 394FF93F2623AFDBDE4CDDCFB873947E8430255694EB116D0442318A2193E81DA0073915BBB69BE2224DA3CF126DFECA
25,963,500 UART: [art] SIG.S = FC3217D6674D9E2B741BAAEA9BFB13373B4760527F7CFD22C5ECE6923904B26C8F27CA31B3F86188779DC8A276CBBC42
26,942,446 UART: Caliptra RT
26,943,145 UART: [state] CFI Enabled
27,076,805 UART: [rt] RT listening for mailbox commands...
27,079,106 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,234,620 UART: [rt]cmd =0x41544d4e, len=14344
30,959,000 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,781,333 ready_for_fw is high
3,781,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,614,597 >>> mbox cmd response: success
19,862,688 UART:
19,863,090 UART: Running Caliptra FMC ...
19,864,298 UART:
19,864,474 UART: [state] CFI Enabled
19,872,366 UART: [fht] FMC Alias Private Key: 7
21,638,419 UART: [art] Extend RT PCRs Done
21,639,617 UART: [art] Lock RT PCRs Done
21,641,263 UART: [art] Populate DV Done
21,646,895 UART: [fht] FMC Alias Private Key: 7
21,648,490 UART: [art] Derive CDI
21,649,498 UART: [art] Store in slot 0x4
21,691,864 UART: [art] Derive Key Pair
21,692,869 UART: [art] Store priv key in slot 0x5
24,120,076 UART: [art] Derive Key Pair - Done
24,132,909 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,839,555 UART: [art] Erasing AUTHORITY.KEYID = 7
25,841,049 UART: [art] PUB.X = 8319B1CF992EA473A1AD11E69C481E21463CD7F3DD97C0F76D9129DA8EAD8058395B0B090B2BAE4F242D55BBA18B2539
25,848,314 UART: [art] PUB.Y = 701B74045652222AF8E635C3D78C6F2330B9F8E84765C0B5EF2104262A1FB9A8CAA4E37C52930EDCAFCCAE17EC1A647A
25,855,588 UART: [art] SIG.R = D54E3409756BE8C05ECFDD81B6704F3A093D22DD95F7170AAC1F36C4829A409090E10E2B2B43622837E8FCF8D839C285
25,862,942 UART: [art] SIG.S = C9B285939629759F54F589D9935AB62094B04123A4D51A3F0B5D4FAAA00EDE9F196E966A7F6A78A78C22F47CFD20FD2B
26,842,494 UART: Caliptra RT
26,843,210 UART: [state] CFI Enabled
26,975,953 UART: [rt] RT listening for mailbox commands...
26,978,272 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,133,632 UART: [rt]cmd =0x41544d4e, len=14344
30,854,293 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,337 UART:
192,696 UART: Running Caliptra ROM ...
193,882 UART:
194,034 UART: [state] CFI Enabled
263,278 UART: [state] LifecycleState = Unprovisioned
265,686 UART: [state] DebugLocked = No
267,138 UART: [state] WD Timer not started. Device not locked for debugging
272,533 UART: [kat] SHA2-256
462,398 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,153 UART: [kat] ++
473,647 UART: [kat] sha1
484,003 UART: [kat] SHA2-256
487,064 UART: [kat] SHA2-384
493,710 UART: [kat] SHA2-512-ACC
496,243 UART: [kat] ECC-384
2,948,790 UART: [kat] HMAC-384Kdf
2,973,475 UART: [kat] LMS
3,505,245 UART: [kat] --
3,509,734 UART: [cold-reset] ++
3,511,867 UART: [fht] FHT @ 0x50003400
3,522,351 UART: [idev] ++
3,523,092 UART: [idev] CDI.KEYID = 6
3,523,980 UART: [idev] SUBJECT.KEYID = 7
3,525,221 UART: [idev] UDS.KEYID = 0
3,526,124 ready_for_fw is high
3,526,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,285 UART: [idev] Erasing UDS.KEYID = 0
6,028,990 UART: [idev] Sha1 KeyId Algorithm
6,051,514 UART: [idev] --
6,056,212 UART: [ldev] ++
6,056,905 UART: [ldev] CDI.KEYID = 6
6,057,787 UART: [ldev] SUBJECT.KEYID = 5
6,058,999 UART: [ldev] AUTHORITY.KEYID = 7
6,060,185 UART: [ldev] FE.KEYID = 1
6,101,157 UART: [ldev] Erasing FE.KEYID = 1
8,605,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,443 UART: [ldev] --
10,414,162 UART: [fwproc] Wait for Commands...
10,417,282 UART: [fwproc] Recv command 0x46574c44
10,419,590 UART: [fwproc] Recv'd Img size: 118548 bytes
15,082,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,159,481 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,283,079 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,843,140 >>> mbox cmd response: success
15,846,661 UART: [afmc] ++
15,847,392 UART: [afmc] CDI.KEYID = 6
15,848,583 UART: [afmc] SUBJECT.KEYID = 7
15,850,077 UART: [afmc] AUTHORITY.KEYID = 5
18,386,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,109,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,111,537 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,126,624 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,141,888 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,156,895 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,180,744 UART: [afmc] --
20,184,564 UART: [cold-reset] --
20,187,563 UART: [state] Locking Datavault
20,191,599 UART: [state] Locking PCR0, PCR1 and PCR31
20,193,827 UART: [state] Locking ICCM
20,195,705 UART: [exit] Launching FMC @ 0x40000130
20,204,384 UART:
20,204,627 UART: Running Caliptra FMC ...
20,205,724 UART:
20,205,885 UART: [state] CFI Enabled
20,271,383 UART: [fht] FMC Alias Private Key: 7
22,038,273 UART: [art] Extend RT PCRs Done
22,039,500 UART: [art] Lock RT PCRs Done
22,041,369 UART: [art] Populate DV Done
22,046,940 UART: [fht] FMC Alias Private Key: 7
22,048,431 UART: [art] Derive CDI
22,049,194 UART: [art] Store in slot 0x4
22,096,611 UART: [art] Derive Key Pair
22,097,651 UART: [art] Store priv key in slot 0x5
24,560,460 UART: [art] Derive Key Pair - Done
24,573,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,286,279 UART: [art] Erasing AUTHORITY.KEYID = 7
26,287,777 UART: [art] PUB.X = D03CF83F5167BC0525929209DCFEA698E9253DFDBCB66771409CAAFBAB7E1AC92C9BA57E9BD5869291CA225E9EEA10E9
26,295,057 UART: [art] PUB.Y = FBE77B10CC903EC002DBE9E20EC400BD72C662805D9718AD9FF5CBA8C1A03F574FD40C5728B547D6998E7CBF63A6A2F5
26,302,270 UART: [art] SIG.R = AF7C806195334D0D136F43C9ECDC9FABDE023DE368A2FFC53179BD31042409D645CB017807BAEAF6B94E46B3C85EFDBD
26,309,698 UART: [art] SIG.S = 19CECBDF7E0CA75A9104537C0B81D111D7ED0D216D5CB9621E05865B1094964566885226990ACFD262C5E6C9DDDFD01C
27,288,341 UART: Caliptra RT
27,289,054 UART: [state] CFI Enabled
27,467,759 UART: [rt] RT listening for mailbox commands...
27,470,044 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,625,460 UART: [rt]cmd =0x41544d4e, len=14344
31,346,385 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,439,867 ready_for_fw is high
3,440,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,910,534 >>> mbox cmd response: success
20,201,924 UART:
20,202,337 UART: Running Caliptra FMC ...
20,203,537 UART:
20,203,704 UART: [state] CFI Enabled
20,267,691 UART: [fht] FMC Alias Private Key: 7
22,033,762 UART: [art] Extend RT PCRs Done
22,035,005 UART: [art] Lock RT PCRs Done
22,036,642 UART: [art] Populate DV Done
22,042,066 UART: [fht] FMC Alias Private Key: 7
22,043,674 UART: [art] Derive CDI
22,044,491 UART: [art] Store in slot 0x4
22,100,505 UART: [art] Derive Key Pair
22,101,506 UART: [art] Store priv key in slot 0x5
24,564,020 UART: [art] Derive Key Pair - Done
24,576,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,289,303 UART: [art] Erasing AUTHORITY.KEYID = 7
26,290,815 UART: [art] PUB.X = ACA0BEDA61CA8EFE5D5DBBAEC6AE5FFABACFE937B8A468AB5592991143786259555EB956E7A6DBC356425E5E2485ABEC
26,298,114 UART: [art] PUB.Y = E98237C2290F694F50C0F134D3EAC286C164B8B44B3FEF10EE42169C1E3B8644E14FFD2584EF782DCA8AB9C60986E190
26,305,404 UART: [art] SIG.R = 7C203B379C8B7DD5C6E348F32DC2E5EBBB10919C79167E098CA754C9C5FFF4A76F407485F3F197886A33E74FE44F0590
26,312,774 UART: [art] SIG.S = 3719F1E3F6FBBB36DFBCC01B5FF7ABB31355049A77C7E276BECEE52F7B0A8167525430C96CB26839B478E8C67BD2DB05
27,291,953 UART: Caliptra RT
27,292,651 UART: [state] CFI Enabled
27,472,564 UART: [rt] RT listening for mailbox commands...
27,474,874 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,630,349 UART: [rt]cmd =0x41544d4e, len=14344
31,346,433 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,475 UART:
192,847 UART: Running Caliptra ROM ...
194,046 UART:
603,494 UART: [state] CFI Enabled
616,754 UART: [state] LifecycleState = Unprovisioned
619,151 UART: [state] DebugLocked = No
620,542 UART: [state] WD Timer not started. Device not locked for debugging
624,660 UART: [kat] SHA2-256
814,495 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,286 UART: [kat] ++
825,845 UART: [kat] sha1
836,937 UART: [kat] SHA2-256
839,955 UART: [kat] SHA2-384
845,592 UART: [kat] SHA2-512-ACC
848,180 UART: [kat] ECC-384
3,291,599 UART: [kat] HMAC-384Kdf
3,303,494 UART: [kat] LMS
3,835,346 UART: [kat] --
3,840,980 UART: [cold-reset] ++
3,843,057 UART: [fht] FHT @ 0x50003400
3,854,271 UART: [idev] ++
3,854,987 UART: [idev] CDI.KEYID = 6
3,855,877 UART: [idev] SUBJECT.KEYID = 7
3,857,096 UART: [idev] UDS.KEYID = 0
3,858,101 ready_for_fw is high
3,858,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,098 UART: [idev] Erasing UDS.KEYID = 0
6,331,032 UART: [idev] Sha1 KeyId Algorithm
6,352,349 UART: [idev] --
6,358,812 UART: [ldev] ++
6,359,501 UART: [ldev] CDI.KEYID = 6
6,360,392 UART: [ldev] SUBJECT.KEYID = 5
6,361,605 UART: [ldev] AUTHORITY.KEYID = 7
6,362,841 UART: [ldev] FE.KEYID = 1
6,372,680 UART: [ldev] Erasing FE.KEYID = 1
8,850,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,281 UART: [ldev] --
10,639,759 UART: [fwproc] Wait for Commands...
10,642,932 UART: [fwproc] Recv command 0x46574c44
10,645,190 UART: [fwproc] Recv'd Img size: 118548 bytes
15,340,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,426,683 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,550,315 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,110,170 >>> mbox cmd response: success
16,113,831 UART: [afmc] ++
16,114,560 UART: [afmc] CDI.KEYID = 6
16,115,682 UART: [afmc] SUBJECT.KEYID = 7
16,117,184 UART: [afmc] AUTHORITY.KEYID = 5
18,619,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,343,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,345,311 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,360,416 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,375,664 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,390,695 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,415,152 UART: [afmc] --
20,418,051 UART: [cold-reset] --
20,423,375 UART: [state] Locking Datavault
20,429,039 UART: [state] Locking PCR0, PCR1 and PCR31
20,431,209 UART: [state] Locking ICCM
20,433,502 UART: [exit] Launching FMC @ 0x40000130
20,442,141 UART:
20,442,379 UART: Running Caliptra FMC ...
20,443,408 UART:
20,443,558 UART: [state] CFI Enabled
20,451,684 UART: [fht] FMC Alias Private Key: 7
22,217,943 UART: [art] Extend RT PCRs Done
22,219,164 UART: [art] Lock RT PCRs Done
22,220,786 UART: [art] Populate DV Done
22,226,103 UART: [fht] FMC Alias Private Key: 7
22,227,600 UART: [art] Derive CDI
22,228,340 UART: [art] Store in slot 0x4
22,271,149 UART: [art] Derive Key Pair
22,272,193 UART: [art] Store priv key in slot 0x5
24,699,454 UART: [art] Derive Key Pair - Done
24,712,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,418,549 UART: [art] Erasing AUTHORITY.KEYID = 7
26,420,052 UART: [art] PUB.X = 6208F1EA3E93CC3BF2736B46CCEA6DAC4CBAD15E6894A60E720C543F95F3ED6E42C5DC0B34B8AC8D4BAEC3D739080B72
26,427,324 UART: [art] PUB.Y = 462E779DBF463B41F4F5E959F904ED72BF1C5D52D7CC69A869EE2CEDB13049AA784181C5ED0AC820248A3D70D2FCA0E3
26,434,640 UART: [art] SIG.R = A03D2E8090BD90144CC79A7470FDF22BBF2617B680B6BC360DCDC8A1816898AFB224EB06019835DBE48C5798A6FB7479
26,442,011 UART: [art] SIG.S = 881A61779A537F1E5C6F1E465625B3345552CFEFBD8AA3AA9DFF89EDB64C9F8DB2A97DE087F85AF21DD4DFEDF27FC257
27,420,802 UART: Caliptra RT
27,421,528 UART: [state] CFI Enabled
27,554,021 UART: [rt] RT listening for mailbox commands...
27,556,328 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,711,696 UART: [rt]cmd =0x41544d4e, len=14344
31,420,529 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,990 writing to cptra_bootfsm_go
3,763,409 ready_for_fw is high
3,763,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,148,373 >>> mbox cmd response: success
20,404,287 UART:
20,404,673 UART: Running Caliptra FMC ...
20,405,783 UART:
20,405,940 UART: [state] CFI Enabled
20,413,729 UART: [fht] FMC Alias Private Key: 7
22,179,374 UART: [art] Extend RT PCRs Done
22,180,594 UART: [art] Lock RT PCRs Done
22,182,650 UART: [art] Populate DV Done
22,188,282 UART: [fht] FMC Alias Private Key: 7
22,189,718 UART: [art] Derive CDI
22,190,455 UART: [art] Store in slot 0x4
22,233,401 UART: [art] Derive Key Pair
22,234,400 UART: [art] Store priv key in slot 0x5
24,661,154 UART: [art] Derive Key Pair - Done
24,674,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,380,200 UART: [art] Erasing AUTHORITY.KEYID = 7
26,381,709 UART: [art] PUB.X = 2BA86C47593A07EF9FD51237837A95A66D6F8C1E183A1917C0571F8994A4B2A8ADDD28550C8AF8B0D84A7E62E77ABE6C
26,388,942 UART: [art] PUB.Y = 5DFDD47FD0BCE7DF76F8285053F893042D0E287789E1C2682BE36954D5F1A935C501F00BB83A4D81095C6EF146FE05E0
26,396,197 UART: [art] SIG.R = 3AAF75AA681A0321EB22711FDFC887942F31A2223F051C1D3B19C88556EED481476C482C70D2A27C1BECE79C9AE3113E
26,403,591 UART: [art] SIG.S = 18F33B56DA3A919BEFC9DD9211903DEF28ECD736F6847016858E5CBC2EF4DA1A1C6AA0347FEDAE8038B81A9D139F0F1E
27,381,953 UART: Caliptra RT
27,382,660 UART: [state] CFI Enabled
27,514,628 UART: [rt] RT listening for mailbox commands...
27,517,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,672,556 UART: [rt]cmd =0x41544d4e, len=14344
31,382,378 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,187 UART: [kat] SHA2-256
882,118 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,233 UART: [kat] ++
886,385 UART: [kat] sha1
890,801 UART: [kat] SHA2-256
892,739 UART: [kat] SHA2-384
895,664 UART: [kat] SHA2-512-ACC
897,565 UART: [kat] ECC-384
903,350 UART: [kat] HMAC-384Kdf
908,002 UART: [kat] LMS
1,476,198 UART: [kat] --
1,476,949 UART: [cold-reset] ++
1,477,287 UART: [fht] Storing FHT @ 0x50003400
1,480,206 UART: [idev] ++
1,480,374 UART: [idev] CDI.KEYID = 6
1,480,734 UART: [idev] SUBJECT.KEYID = 7
1,481,158 UART: [idev] UDS.KEYID = 0
1,481,503 ready_for_fw is high
1,481,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,594 UART: [idev] Erasing UDS.KEYID = 0
1,506,112 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,544 UART: [idev] --
1,515,405 UART: [ldev] ++
1,515,573 UART: [ldev] CDI.KEYID = 6
1,515,936 UART: [ldev] SUBJECT.KEYID = 5
1,516,362 UART: [ldev] AUTHORITY.KEYID = 7
1,516,825 UART: [ldev] FE.KEYID = 1
1,521,945 UART: [ldev] Erasing FE.KEYID = 1
1,547,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,328 UART: [ldev] --
1,586,831 UART: [fwproc] Waiting for Commands...
1,587,698 UART: [fwproc] Received command 0x46574c44
1,588,489 UART: [fwproc] Received Image of size 118548 bytes
5,055,247 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,083,163 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,114,381 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,254,724 >>> mbox cmd response: success
5,255,738 UART: [afmc] ++
5,255,906 UART: [afmc] CDI.KEYID = 6
5,256,268 UART: [afmc] SUBJECT.KEYID = 7
5,256,693 UART: [afmc] AUTHORITY.KEYID = 5
5,291,532 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,307,830 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,308,610 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,314,316 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,320,195 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,325,908 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,333,749 UART: [afmc] --
5,334,873 UART: [cold-reset] --
5,335,567 UART: [state] Locking Datavault
5,336,850 UART: [state] Locking PCR0, PCR1 and PCR31
5,337,454 UART: [state] Locking ICCM
5,337,986 UART: [exit] Launching FMC @ 0x40000130
5,343,316 UART:
5,343,332 UART: Running Caliptra FMC ...
5,343,740 UART:
5,343,794 UART: [state] CFI Enabled
5,353,942 UART: [fht] FMC Alias Private Key: 7
5,473,066 UART: [art] Extend RT PCRs Done
5,473,494 UART: [art] Lock RT PCRs Done
5,474,938 UART: [art] Populate DV Done
5,483,299 UART: [fht] FMC Alias Private Key: 7
5,484,441 UART: [art] Derive CDI
5,484,721 UART: [art] Store in slot 0x4
5,570,097 UART: [art] Derive Key Pair
5,570,457 UART: [art] Store priv key in slot 0x5
5,583,356 UART: [art] Derive Key Pair - Done
5,598,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,613,285 UART: [art] Erasing AUTHORITY.KEYID = 7
5,614,050 UART: [art] PUB.X = 7CE7CAB51BD6A8C14941E526328A3559F66E2450D3C79D70AF94BDC4225014DF3E41CD08FEDE515435A8747ABC1A8EAC
5,620,831 UART: [art] PUB.Y = 4F98E46D59DD964D83DDBA474823A28C48432F1A2083B351E99C399E6787CA278CD103A243C9B07021315FF034072A78
5,627,769 UART: [art] SIG.R = D6B74A6F8FE9A513D8DE5E73B39192AA577C9C0180729188320EA2A67E40BB33A665E3F1E09258CB9BBA9F5D1C7025E9
5,634,541 UART: [art] SIG.S = 72D4F1E14E3193E816C01F6809B651E663B0B514B6BF546DB69680DFA4153D897BF434648DD3DBFE5A56DA873751F8D9
5,657,760 UART: Caliptra RT
5,658,011 UART: [state] CFI Enabled
5,778,223 UART: [rt] RT listening for mailbox commands...
5,778,893 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,901,973 UART: [rt]cmd =0x41544d4e, len=14344
9,872,254 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,343 ready_for_fw is high
1,362,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,179,486 >>> mbox cmd response: success
5,241,209 UART:
5,241,225 UART: Running Caliptra FMC ...
5,241,633 UART:
5,241,687 UART: [state] CFI Enabled
5,252,425 UART: [fht] FMC Alias Private Key: 7
5,371,925 UART: [art] Extend RT PCRs Done
5,372,353 UART: [art] Lock RT PCRs Done
5,373,679 UART: [art] Populate DV Done
5,381,852 UART: [fht] FMC Alias Private Key: 7
5,382,962 UART: [art] Derive CDI
5,383,242 UART: [art] Store in slot 0x4
5,469,042 UART: [art] Derive Key Pair
5,469,402 UART: [art] Store priv key in slot 0x5
5,482,379 UART: [art] Derive Key Pair - Done
5,497,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,512,666 UART: [art] Erasing AUTHORITY.KEYID = 7
5,513,431 UART: [art] PUB.X = AABABBAF693566DBB56010A052891316BC74D67B797AE383490B2C9FC5A53F57BBFD8D9BBAE49B331DDBF98DD16462D5
5,520,218 UART: [art] PUB.Y = 1342B814E01CF715CF3A68093C3FA4D85EFF5B0E00A76EED3A755AA6DE6A24994CD2A23B8FA59A33F0138CDA13BB392D
5,527,158 UART: [art] SIG.R = 968588D60ED6C211CE0868CB0F94BC290AF9513A09D1B777FC706F60B21002C173580C8B71703435A65DD93574E93968
5,533,899 UART: [art] SIG.S = 02189B7FA393482D966E5C5E653D5CC02D5574154E0F7CB5E1302B8AB0EDF82D7032EE80290DCB9B4D45C0D604C4D11F
5,558,163 UART: Caliptra RT
5,558,414 UART: [state] CFI Enabled
5,677,654 UART: [rt] RT listening for mailbox commands...
5,678,324 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,801,386 UART: [rt]cmd =0x41544d4e, len=14344
9,354,777 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
86,922 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,596 UART: [kat] SHA2-256
882,527 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,642 UART: [kat] ++
886,794 UART: [kat] sha1
891,180 UART: [kat] SHA2-256
893,118 UART: [kat] SHA2-384
895,833 UART: [kat] SHA2-512-ACC
897,734 UART: [kat] ECC-384
903,771 UART: [kat] HMAC-384Kdf
908,433 UART: [kat] LMS
1,476,629 UART: [kat] --
1,477,258 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,597 UART: [idev] ++
1,480,765 UART: [idev] CDI.KEYID = 6
1,481,125 UART: [idev] SUBJECT.KEYID = 7
1,481,549 UART: [idev] UDS.KEYID = 0
1,481,894 ready_for_fw is high
1,481,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,819 UART: [idev] Erasing UDS.KEYID = 0
1,506,821 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,591 UART: [idev] --
1,516,670 UART: [ldev] ++
1,516,838 UART: [ldev] CDI.KEYID = 6
1,517,201 UART: [ldev] SUBJECT.KEYID = 5
1,517,627 UART: [ldev] AUTHORITY.KEYID = 7
1,518,090 UART: [ldev] FE.KEYID = 1
1,523,590 UART: [ldev] Erasing FE.KEYID = 1
1,548,199 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,153 UART: [ldev] --
1,587,550 UART: [fwproc] Waiting for Commands...
1,588,315 UART: [fwproc] Received command 0x46574c44
1,589,106 UART: [fwproc] Received Image of size 118548 bytes
5,283,314 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,311,148 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,342,366 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,482,783 >>> mbox cmd response: success
5,484,043 UART: [afmc] ++
5,484,211 UART: [afmc] CDI.KEYID = 6
5,484,573 UART: [afmc] SUBJECT.KEYID = 7
5,484,998 UART: [afmc] AUTHORITY.KEYID = 5
5,520,697 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,537,337 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,538,117 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,543,823 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,549,702 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,555,415 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,563,376 UART: [afmc] --
5,564,414 UART: [cold-reset] --
5,565,286 UART: [state] Locking Datavault
5,566,623 UART: [state] Locking PCR0, PCR1 and PCR31
5,567,227 UART: [state] Locking ICCM
5,567,841 UART: [exit] Launching FMC @ 0x40000130
5,573,171 UART:
5,573,187 UART: Running Caliptra FMC ...
5,573,595 UART:
5,573,738 UART: [state] CFI Enabled
5,584,720 UART: [fht] FMC Alias Private Key: 7
5,703,486 UART: [art] Extend RT PCRs Done
5,703,914 UART: [art] Lock RT PCRs Done
5,705,250 UART: [art] Populate DV Done
5,713,659 UART: [fht] FMC Alias Private Key: 7
5,714,613 UART: [art] Derive CDI
5,714,893 UART: [art] Store in slot 0x4
5,800,753 UART: [art] Derive Key Pair
5,801,113 UART: [art] Store priv key in slot 0x5
5,814,722 UART: [art] Derive Key Pair - Done
5,829,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,845,008 UART: [art] Erasing AUTHORITY.KEYID = 7
5,845,773 UART: [art] PUB.X = D28891135F68F18F22362392C6E80E87B4DF70D79F118B33853FF5563647A2AB614508E026EB95199301FB4EA44C64E0
5,852,526 UART: [art] PUB.Y = 56E18BDE5CDFA10A1596401CE12512AFF92572795ACAA751DB07F4852E2158CD5DFDF3F7F2A7DF831F3018A52B317FA7
5,859,484 UART: [art] SIG.R = 21F61B2064056FCC7D3BF062FE199479DE82CA571FCE0AFD15461156611ACB7B6497F522F8507AD7E0C5A190D88B861E
5,866,254 UART: [art] SIG.S = 7BC59AC25F5B100CAC637B50C049762A61FEE335F004E7AB51C93D69F6076F5E445AEAB8B215EF164EF58C4C0DFA0992
5,889,343 UART: Caliptra RT
5,889,686 UART: [state] CFI Enabled
6,009,871 UART: [rt] RT listening for mailbox commands...
6,010,541 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,133,897 UART: [rt]cmd =0x41544d4e, len=14344
9,687,343 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.33s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,886 ready_for_fw is high
1,363,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,255,955 >>> mbox cmd response: success
5,317,542 UART:
5,317,558 UART: Running Caliptra FMC ...
5,317,966 UART:
5,318,109 UART: [state] CFI Enabled
5,328,783 UART: [fht] FMC Alias Private Key: 7
5,448,389 UART: [art] Extend RT PCRs Done
5,448,817 UART: [art] Lock RT PCRs Done
5,450,533 UART: [art] Populate DV Done
5,458,976 UART: [fht] FMC Alias Private Key: 7
5,459,996 UART: [art] Derive CDI
5,460,276 UART: [art] Store in slot 0x4
5,545,940 UART: [art] Derive Key Pair
5,546,300 UART: [art] Store priv key in slot 0x5
5,559,543 UART: [art] Derive Key Pair - Done
5,574,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,589,279 UART: [art] Erasing AUTHORITY.KEYID = 7
5,590,044 UART: [art] PUB.X = 8A510A5BF97FF40CB33FA508F8A793722B44F2C4F23BD2EEFCC356F6DEE30741535A23B25E6F30BFE52F6FDFD4E5A309
5,596,819 UART: [art] PUB.Y = A95B317EB5CCA96E23644B66F1496AAB45445E7EA87251A2773EACCD49E1C57E58ED542723994855ADDC6638DFEB9E2A
5,603,781 UART: [art] SIG.R = 07162DBB5DC052ED65970F6729DB72EF20D3235AC0D2078A7A0EC523D4299385EBF4D0DE66D26653D1931831C6EBAC3B
5,610,547 UART: [art] SIG.S = A0D949790CBE4A9AFAF2419D39CF54D026A338BA45A144DB3006799E1CEB5BD82FFC7309D2A1125D2AE68E2E3207286B
5,635,125 UART: Caliptra RT
5,635,468 UART: [state] CFI Enabled
5,755,902 UART: [rt] RT listening for mailbox commands...
5,756,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,879,876 UART: [rt]cmd =0x41544d4e, len=14344
9,698,401 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,459 UART: [kat] SHA2-512-ACC
906,360 UART: [kat] ECC-384
916,413 UART: [kat] HMAC-384Kdf
920,967 UART: [kat] LMS
1,169,279 UART: [kat] --
1,170,294 UART: [cold-reset] ++
1,170,738 UART: [fht] FHT @ 0x50003400
1,173,324 UART: [idev] ++
1,173,492 UART: [idev] CDI.KEYID = 6
1,173,853 UART: [idev] SUBJECT.KEYID = 7
1,174,278 UART: [idev] UDS.KEYID = 0
1,174,624 ready_for_fw is high
1,174,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,935 UART: [idev] Erasing UDS.KEYID = 0
1,198,779 UART: [idev] Sha1 KeyId Algorithm
1,207,743 UART: [idev] --
1,208,790 UART: [ldev] ++
1,208,958 UART: [ldev] CDI.KEYID = 6
1,209,322 UART: [ldev] SUBJECT.KEYID = 5
1,209,749 UART: [ldev] AUTHORITY.KEYID = 7
1,210,212 UART: [ldev] FE.KEYID = 1
1,215,426 UART: [ldev] Erasing FE.KEYID = 1
1,242,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,548 UART: [ldev] --
1,280,941 UART: [fwproc] Wait for Commands...
1,281,662 UART: [fwproc] Recv command 0x46574c44
1,282,395 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,209 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,384 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,611 >>> mbox cmd response: success
3,374,731 UART: [afmc] ++
3,374,899 UART: [afmc] CDI.KEYID = 6
3,375,262 UART: [afmc] SUBJECT.KEYID = 7
3,375,688 UART: [afmc] AUTHORITY.KEYID = 5
3,410,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,827 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,534 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,411 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,121 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,921 UART: [afmc] --
3,453,874 UART: [cold-reset] --
3,454,776 UART: [state] Locking Datavault
3,456,015 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,619 UART: [state] Locking ICCM
3,457,201 UART: [exit] Launching FMC @ 0x40000130
3,462,531 UART:
3,462,547 UART: Running Caliptra FMC ...
3,462,955 UART:
3,463,009 UART: [state] CFI Enabled
3,473,163 UART: [fht] FMC Alias Private Key: 7
3,591,897 UART: [art] Extend RT PCRs Done
3,592,325 UART: [art] Lock RT PCRs Done
3,593,925 UART: [art] Populate DV Done
3,602,360 UART: [fht] FMC Alias Private Key: 7
3,603,456 UART: [art] Derive CDI
3,603,736 UART: [art] Store in slot 0x4
3,689,635 UART: [art] Derive Key Pair
3,689,995 UART: [art] Store priv key in slot 0x5
3,703,515 UART: [art] Derive Key Pair - Done
3,718,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,734,851 UART: [art] PUB.X = 0DCD6ED5D04143807FF0001F229D8F77D06DD45FC049D3958E419F337300A9BF1C444EAD9049B9F6D595ADEF93B85E04
3,741,579 UART: [art] PUB.Y = B526908B4DDA4810B8D2F536AC3376E3D3F954FD19F236B159FC1116BC1CA03B55FD83DA2DDACD38D1B223680C4C5B64
3,748,540 UART: [art] SIG.R = 829EECD38C697B9148B62D951165C9546287D6C3CDE53188549C653A29A37A6274FA64266CD98F1BA54A366468F6CB99
3,755,306 UART: [art] SIG.S = 8840575A68B07D1B0BE70F134B163A82C8F1D54E0F732E00C1DA0A60B97B03BD47F19D09861AAAB3F00EE58D94B7B1FB
3,778,681 UART: Caliptra RT
3,778,932 UART: [state] CFI Enabled
3,898,935 UART: [rt] RT listening for mailbox commands...
3,899,605 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,355 UART: [rt]cmd =0x41544d4e, len=14344
5,170,788 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,334 ready_for_fw is high
1,059,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,497 >>> mbox cmd response: success
3,283,788 UART:
3,283,804 UART: Running Caliptra FMC ...
3,284,212 UART:
3,284,266 UART: [state] CFI Enabled
3,295,192 UART: [fht] FMC Alias Private Key: 7
3,414,044 UART: [art] Extend RT PCRs Done
3,414,472 UART: [art] Lock RT PCRs Done
3,415,986 UART: [art] Populate DV Done
3,424,469 UART: [fht] FMC Alias Private Key: 7
3,425,643 UART: [art] Derive CDI
3,425,923 UART: [art] Store in slot 0x4
3,511,614 UART: [art] Derive Key Pair
3,511,974 UART: [art] Store priv key in slot 0x5
3,524,956 UART: [art] Derive Key Pair - Done
3,539,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,312 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,077 UART: [art] PUB.X = 6F1FB03D2FFCE487994CE59E58CE2840573940706E28BF65872901B6E70665672F608A4B701D6BA114ECD55E5EC7118A
3,562,841 UART: [art] PUB.Y = AA064E73C6EBFBA377E31504F0B22F3B9AD5B2F84594774D473F41644079C08646E49DA2BCA9616DE87C3FBA055C6540
3,569,788 UART: [art] SIG.R = CD6538C5421FB47A245E88EE4F60109B12E14DF44D511E32DD2EB4CBAFDC416C25065CE2322EC4F2EFB9731FE1B449B4
3,576,571 UART: [art] SIG.S = 423AD0A10F94EBD793A615AE99C156A80288935B7F42F820ECC27E200933B99D9EE1F8C1706AD88B13160B1AC901D08F
3,600,420 UART: Caliptra RT
3,600,671 UART: [state] CFI Enabled
3,720,137 UART: [rt] RT listening for mailbox commands...
3,720,807 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,789 UART: [rt]cmd =0x41544d4e, len=14344
4,992,672 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,433 UART: [kat] ++
895,585 UART: [kat] sha1
899,925 UART: [kat] SHA2-256
901,865 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,946 UART: [kat] LMS
1,169,258 UART: [kat] --
1,170,009 UART: [cold-reset] ++
1,170,343 UART: [fht] FHT @ 0x50003400
1,172,951 UART: [idev] ++
1,173,119 UART: [idev] CDI.KEYID = 6
1,173,480 UART: [idev] SUBJECT.KEYID = 7
1,173,905 UART: [idev] UDS.KEYID = 0
1,174,251 ready_for_fw is high
1,174,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,046 UART: [idev] Erasing UDS.KEYID = 0
1,199,582 UART: [idev] Sha1 KeyId Algorithm
1,208,546 UART: [idev] --
1,209,753 UART: [ldev] ++
1,209,921 UART: [ldev] CDI.KEYID = 6
1,210,285 UART: [ldev] SUBJECT.KEYID = 5
1,210,712 UART: [ldev] AUTHORITY.KEYID = 7
1,211,175 UART: [ldev] FE.KEYID = 1
1,216,613 UART: [ldev] Erasing FE.KEYID = 1
1,243,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,439 UART: [ldev] --
1,282,832 UART: [fwproc] Wait for Commands...
1,283,537 UART: [fwproc] Recv command 0x46574c44
1,284,270 UART: [fwproc] Recv'd Img size: 118548 bytes
3,167,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,195,245 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,226,420 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,661 >>> mbox cmd response: success
3,367,809 UART: [afmc] ++
3,367,977 UART: [afmc] CDI.KEYID = 6
3,368,340 UART: [afmc] SUBJECT.KEYID = 7
3,368,766 UART: [afmc] AUTHORITY.KEYID = 5
3,404,033 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,420,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,421,499 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,427,206 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,083 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,438,793 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,446,553 UART: [afmc] --
3,447,542 UART: [cold-reset] --
3,448,534 UART: [state] Locking Datavault
3,449,623 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,227 UART: [state] Locking ICCM
3,450,819 UART: [exit] Launching FMC @ 0x40000130
3,456,149 UART:
3,456,165 UART: Running Caliptra FMC ...
3,456,573 UART:
3,456,716 UART: [state] CFI Enabled
3,467,446 UART: [fht] FMC Alias Private Key: 7
3,586,638 UART: [art] Extend RT PCRs Done
3,587,066 UART: [art] Lock RT PCRs Done
3,588,328 UART: [art] Populate DV Done
3,596,597 UART: [fht] FMC Alias Private Key: 7
3,597,593 UART: [art] Derive CDI
3,597,873 UART: [art] Store in slot 0x4
3,683,774 UART: [art] Derive Key Pair
3,684,134 UART: [art] Store priv key in slot 0x5
3,697,758 UART: [art] Derive Key Pair - Done
3,712,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,728,986 UART: [art] PUB.X = ABC950412120A411B6F81FE749AF07C7B868EA878FD49B77997CFED11A6F5496FDF7522758F393A551AE8EF56093CB89
3,735,759 UART: [art] PUB.Y = 2BADAA24D1DB84D0CACA84D1E948F801DB14EE2D406E619AD73E39BDAD19F59CF06715CCA6AD15AAD997401A7941BD47
3,742,730 UART: [art] SIG.R = 67997A43D5E119F5ABE9F38BDC3D908B8E7CCBA9A8D0F5866DE1E576BBFFFE2000AB7E5AED17DEC51087905E36659C47
3,749,498 UART: [art] SIG.S = 08E2703687129E617E30BA8BD8AC4D19D7FD209749235474AF8D57A0B849C4DE6A5371D4A2AC6312F5867CBB85741200
3,772,529 UART: Caliptra RT
3,772,872 UART: [state] CFI Enabled
3,891,290 UART: [rt] RT listening for mailbox commands...
3,891,960 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,988 UART: [rt]cmd =0x41544d4e, len=14344
5,182,298 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,849 ready_for_fw is high
1,059,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,228,121 >>> mbox cmd response: success
3,290,472 UART:
3,290,488 UART: Running Caliptra FMC ...
3,290,896 UART:
3,291,039 UART: [state] CFI Enabled
3,301,783 UART: [fht] FMC Alias Private Key: 7
3,420,893 UART: [art] Extend RT PCRs Done
3,421,321 UART: [art] Lock RT PCRs Done
3,422,513 UART: [art] Populate DV Done
3,430,498 UART: [fht] FMC Alias Private Key: 7
3,431,668 UART: [art] Derive CDI
3,431,948 UART: [art] Store in slot 0x4
3,517,799 UART: [art] Derive Key Pair
3,518,159 UART: [art] Store priv key in slot 0x5
3,531,019 UART: [art] Derive Key Pair - Done
3,545,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,561,651 UART: [art] Erasing AUTHORITY.KEYID = 7
3,562,416 UART: [art] PUB.X = E11782D9A1CAB57CB2FFEDA2B86B91801BB1AF81C25932B82AFAB3DDCB8508DB2C294F250C4AB4F079F7975A990BD2D1
3,569,199 UART: [art] PUB.Y = E21B5DD59CBDA0A6FC2BE044DCB560E20567CF9C119D685EE15939B5A62FB05866564AD668A44242D431A7901280429E
3,576,150 UART: [art] SIG.R = F4E09DCC03A29F2C4EE5DCE9DCD6D04685A8CF70EAD33271F4C4082F8354131660C45CAE01E81897FFA1B855D6E331AB
3,582,927 UART: [art] SIG.S = 4A25F1BEAA9B15A11169FCC8A27780ED9E810272D52A7C7FA3BBA45442CB714CF012FFEE55F6FC2D93124D1DE0411574
3,606,652 UART: Caliptra RT
3,606,995 UART: [state] CFI Enabled
3,727,191 UART: [rt] RT listening for mailbox commands...
3,727,861 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,850,747 UART: [rt]cmd =0x41544d4e, len=14344
5,002,421 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
893,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,577 UART: [kat] ++
897,729 UART: [kat] sha1
901,859 UART: [kat] SHA2-256
903,799 UART: [kat] SHA2-384
906,544 UART: [kat] SHA2-512-ACC
908,445 UART: [kat] ECC-384
918,362 UART: [kat] HMAC-384Kdf
923,124 UART: [kat] LMS
1,171,452 UART: [kat] --
1,172,383 UART: [cold-reset] ++
1,172,893 UART: [fht] FHT @ 0x50003400
1,175,600 UART: [idev] ++
1,175,768 UART: [idev] CDI.KEYID = 6
1,176,128 UART: [idev] SUBJECT.KEYID = 7
1,176,552 UART: [idev] UDS.KEYID = 0
1,176,897 ready_for_fw is high
1,176,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,604 UART: [idev] Erasing UDS.KEYID = 0
1,201,841 UART: [idev] Sha1 KeyId Algorithm
1,210,243 UART: [idev] --
1,211,157 UART: [ldev] ++
1,211,325 UART: [ldev] CDI.KEYID = 6
1,211,688 UART: [ldev] SUBJECT.KEYID = 5
1,212,114 UART: [ldev] AUTHORITY.KEYID = 7
1,212,577 UART: [ldev] FE.KEYID = 1
1,217,843 UART: [ldev] Erasing FE.KEYID = 1
1,243,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,845 UART: [ldev] --
1,283,184 UART: [fwproc] Wait for Commands...
1,283,816 UART: [fwproc] Recv command 0x46574c44
1,284,544 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,103 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,273 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,584 >>> mbox cmd response: success
3,371,620 UART: [afmc] ++
3,371,788 UART: [afmc] CDI.KEYID = 6
3,372,150 UART: [afmc] SUBJECT.KEYID = 7
3,372,575 UART: [afmc] AUTHORITY.KEYID = 5
3,407,694 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,795 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,501 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,436,380 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,442,090 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,449,937 UART: [afmc] --
3,450,853 UART: [cold-reset] --
3,451,613 UART: [state] Locking Datavault
3,452,914 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,518 UART: [state] Locking ICCM
3,454,182 UART: [exit] Launching FMC @ 0x40000130
3,459,512 UART:
3,459,528 UART: Running Caliptra FMC ...
3,459,936 UART:
3,459,990 UART: [state] CFI Enabled
3,470,432 UART: [fht] FMC Alias Private Key: 7
3,589,414 UART: [art] Extend RT PCRs Done
3,589,842 UART: [art] Lock RT PCRs Done
3,591,216 UART: [art] Populate DV Done
3,599,447 UART: [fht] FMC Alias Private Key: 7
3,600,605 UART: [art] Derive CDI
3,600,885 UART: [art] Store in slot 0x4
3,686,920 UART: [art] Derive Key Pair
3,687,280 UART: [art] Store priv key in slot 0x5
3,700,748 UART: [art] Derive Key Pair - Done
3,715,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,730,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,649 UART: [art] PUB.X = 44C0486FFAEC1B5AB1862D74455030994E829FDAC0889DD79763E0AE2430E195D5C897E73372F98D5D94E75821666EA5
3,738,417 UART: [art] PUB.Y = 6F4F8E48A2347374BAB73A264B96E36150D4C13802AFB071D23526FD08C9C50071B12ED2C7645473787A7D8AFEC1B8A1
3,745,341 UART: [art] SIG.R = 321F586F68D923B2DA39867D8D0623E619F56C2F3B0AD1A7AF828386BBC84C121E6527DF63ED79206B66857ED35B5EB1
3,752,109 UART: [art] SIG.S = 07D46A7B2772351FF68AED92CEBC1DA0C8B82CAA5C7E153032B40836F34876CE19BCE3CDBC8E0B8A86F866EF73D984D1
3,776,062 UART: Caliptra RT
3,776,313 UART: [state] CFI Enabled
3,895,635 UART: [rt] RT listening for mailbox commands...
3,896,305 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,018,981 UART: [rt]cmd =0x41544d4e, len=14344
5,165,035 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,387 ready_for_fw is high
1,060,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,758 >>> mbox cmd response: success
3,291,019 UART:
3,291,035 UART: Running Caliptra FMC ...
3,291,443 UART:
3,291,497 UART: [state] CFI Enabled
3,301,803 UART: [fht] FMC Alias Private Key: 7
3,420,207 UART: [art] Extend RT PCRs Done
3,420,635 UART: [art] Lock RT PCRs Done
3,422,363 UART: [art] Populate DV Done
3,430,790 UART: [fht] FMC Alias Private Key: 7
3,431,798 UART: [art] Derive CDI
3,432,078 UART: [art] Store in slot 0x4
3,517,829 UART: [art] Derive Key Pair
3,518,189 UART: [art] Store priv key in slot 0x5
3,531,953 UART: [art] Derive Key Pair - Done
3,546,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,561,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,562,717 UART: [art] PUB.X = 693905A9B13BF3BEAB9BA921B14407E2642C5FE25AD9FC5036C4564CD7CE1080242EE86A324F07699AE85592E1B8710B
3,569,479 UART: [art] PUB.Y = C8AFA297EE6B96A9DDD65A00F0E3586104CE65DF4853967C31C33423E464F913B28371E65E5BE8A396B4BF0669907555
3,576,401 UART: [art] SIG.R = 4BC29965BE578AB0A2DE0964D5C145E45DF69CD6A10167FA7617A0B0227D46932954B960E2C30C956AB0EDCE3A0B31F4
3,583,167 UART: [art] SIG.S = 4E5260505A4A6C2449A591DFF76F40D01D05485F74750503BE699339B3734B10817E902611794317C63323D5948E41EC
3,606,850 UART: Caliptra RT
3,607,101 UART: [state] CFI Enabled
3,727,209 UART: [rt] RT listening for mailbox commands...
3,727,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,850,983 UART: [rt]cmd =0x41544d4e, len=14344
5,004,702 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
902,114 UART: [kat] SHA2-256
904,054 UART: [kat] SHA2-384
906,807 UART: [kat] SHA2-512-ACC
908,708 UART: [kat] ECC-384
918,683 UART: [kat] HMAC-384Kdf
923,165 UART: [kat] LMS
1,171,493 UART: [kat] --
1,172,386 UART: [cold-reset] ++
1,172,942 UART: [fht] FHT @ 0x50003400
1,175,627 UART: [idev] ++
1,175,795 UART: [idev] CDI.KEYID = 6
1,176,155 UART: [idev] SUBJECT.KEYID = 7
1,176,579 UART: [idev] UDS.KEYID = 0
1,176,924 ready_for_fw is high
1,176,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,729 UART: [idev] Erasing UDS.KEYID = 0
1,201,880 UART: [idev] Sha1 KeyId Algorithm
1,210,248 UART: [idev] --
1,211,192 UART: [ldev] ++
1,211,360 UART: [ldev] CDI.KEYID = 6
1,211,723 UART: [ldev] SUBJECT.KEYID = 5
1,212,149 UART: [ldev] AUTHORITY.KEYID = 7
1,212,612 UART: [ldev] FE.KEYID = 1
1,218,196 UART: [ldev] Erasing FE.KEYID = 1
1,245,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,998 UART: [ldev] --
1,284,369 UART: [fwproc] Wait for Commands...
1,285,191 UART: [fwproc] Recv command 0x46574c44
1,285,919 UART: [fwproc] Recv'd Img size: 118548 bytes
3,187,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,215,338 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,246,508 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,386,781 >>> mbox cmd response: success
3,388,027 UART: [afmc] ++
3,388,195 UART: [afmc] CDI.KEYID = 6
3,388,557 UART: [afmc] SUBJECT.KEYID = 7
3,388,982 UART: [afmc] AUTHORITY.KEYID = 5
3,424,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,441,286 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,442,034 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,447,740 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,453,619 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,459,329 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,467,030 UART: [afmc] --
3,468,016 UART: [cold-reset] --
3,468,812 UART: [state] Locking Datavault
3,470,053 UART: [state] Locking PCR0, PCR1 and PCR31
3,470,657 UART: [state] Locking ICCM
3,471,329 UART: [exit] Launching FMC @ 0x40000130
3,476,659 UART:
3,476,675 UART: Running Caliptra FMC ...
3,477,083 UART:
3,477,226 UART: [state] CFI Enabled
3,488,158 UART: [fht] FMC Alias Private Key: 7
3,607,132 UART: [art] Extend RT PCRs Done
3,607,560 UART: [art] Lock RT PCRs Done
3,609,000 UART: [art] Populate DV Done
3,617,215 UART: [fht] FMC Alias Private Key: 7
3,618,175 UART: [art] Derive CDI
3,618,455 UART: [art] Store in slot 0x4
3,704,662 UART: [art] Derive Key Pair
3,705,022 UART: [art] Store priv key in slot 0x5
3,718,094 UART: [art] Derive Key Pair - Done
3,732,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,748,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,749,359 UART: [art] PUB.X = 39A57F6A3B5BD1517FAB1D7E45B5A66B7AFDE890DAAB1E9F28917FFC924DDB6CD07E2AB1847D0FEF57FF6E6CF92065F4
3,756,154 UART: [art] PUB.Y = 05BF9FE38DC7048F1639B073ABE324936A5ECCA9085DCCA5FA80542CDF09A8917F90B4CC3E2F843F4045469E35E1563B
3,763,102 UART: [art] SIG.R = 7B44007758E4CE494EF603F3E4C2074758C1DC06B14B44647D7279DDE643F158FA7C96825D4D878354FFC52D5A898F62
3,769,839 UART: [art] SIG.S = FAE7651F2AAB1C9CF26D1703DF4BD45126C369C75D63E9579BC3FBCEAA9EE1F096980F0A3334ADC776307F710D435EB4
3,793,345 UART: Caliptra RT
3,793,688 UART: [state] CFI Enabled
3,912,648 UART: [rt] RT listening for mailbox commands...
3,913,318 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,036,504 UART: [rt]cmd =0x41544d4e, len=14344
5,198,090 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,174 ready_for_fw is high
1,060,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,384 >>> mbox cmd response: success
3,280,381 UART:
3,280,397 UART: Running Caliptra FMC ...
3,280,805 UART:
3,280,948 UART: [state] CFI Enabled
3,291,134 UART: [fht] FMC Alias Private Key: 7
3,409,964 UART: [art] Extend RT PCRs Done
3,410,392 UART: [art] Lock RT PCRs Done
3,411,826 UART: [art] Populate DV Done
3,420,115 UART: [fht] FMC Alias Private Key: 7
3,421,239 UART: [art] Derive CDI
3,421,519 UART: [art] Store in slot 0x4
3,507,224 UART: [art] Derive Key Pair
3,507,584 UART: [art] Store priv key in slot 0x5
3,520,800 UART: [art] Derive Key Pair - Done
3,535,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,551,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,552,212 UART: [art] PUB.X = B3BEA1A20DDB331304664206352A84B76DA2513F5568AB8EE8D6880468F2024052623E408810CB94BEA1490C5DC9C272
3,558,960 UART: [art] PUB.Y = 4A14B1CC6CE346CBEAC18461DFF4D0B0487F34BBAA3D683EE6C6D506F726C65B4623CC407C23ECCD8B79FB98BC6D9BBB
3,565,935 UART: [art] SIG.R = D4314B5D712DA11659D0ACCC233E02E0DF96F46E8BAC95752F7973186287BF1D8618685825D41A0B410833C98A91FF82
3,572,694 UART: [art] SIG.S = 0C6CA6BCB5F72B41CB7ECD4126335C33DD9C0E805874AD88FAB31D2C8DCCDBE0B852AD0A17B575DBAF794EB00CE53484
3,596,120 UART: Caliptra RT
3,596,463 UART: [state] CFI Enabled
3,716,877 UART: [rt] RT listening for mailbox commands...
3,717,547 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,827 UART: [rt]cmd =0x41544d4e, len=14344
5,002,127 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,082 UART:
192,444 UART: Running Caliptra ROM ...
193,623 UART:
193,798 UART: [state] CFI Enabled
262,711 UART: [state] LifecycleState = Unprovisioned
264,643 UART: [state] DebugLocked = No
267,168 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,343 UART: [kat] SHA2-256
441,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,522 UART: [kat] ++
452,015 UART: [kat] sha1
464,670 UART: [kat] SHA2-256
467,395 UART: [kat] SHA2-384
472,109 UART: [kat] SHA2-512-ACC
474,477 UART: [kat] ECC-384
2,766,753 UART: [kat] HMAC-384Kdf
2,778,840 UART: [kat] LMS
3,969,188 UART: [kat] --
3,974,833 UART: [cold-reset] ++
3,976,935 UART: [fht] Storing FHT @ 0x50003400
3,988,849 UART: [idev] ++
3,989,423 UART: [idev] CDI.KEYID = 6
3,990,410 UART: [idev] SUBJECT.KEYID = 7
3,991,587 UART: [idev] UDS.KEYID = 0
3,992,657 ready_for_fw is high
3,992,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,919 UART: [idev] Erasing UDS.KEYID = 0
7,329,260 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,133 UART: [idev] --
7,353,323 UART: [ldev] ++
7,353,892 UART: [ldev] CDI.KEYID = 6
7,354,868 UART: [ldev] SUBJECT.KEYID = 5
7,356,085 UART: [ldev] AUTHORITY.KEYID = 7
7,357,322 UART: [ldev] FE.KEYID = 1
7,385,031 UART: [ldev] Erasing FE.KEYID = 1
10,714,643 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,012,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,026,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,041,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,056,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,075,559 UART: [ldev] --
13,079,584 UART: [fwproc] Waiting for Commands...
13,082,433 UART: [fwproc] Received command 0x46574c44
13,084,614 UART: [fwproc] Received Image of size 118548 bytes
22,088,719 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,163,954 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,237,138 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,565,070 >>> mbox cmd response: success
22,569,134 UART: [afmc] ++
22,569,757 UART: [afmc] CDI.KEYID = 6
22,570,658 UART: [afmc] SUBJECT.KEYID = 7
22,571,952 UART: [afmc] AUTHORITY.KEYID = 5
25,943,359 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,241,868 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,244,141 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,258,645 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,273,448 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,287,823 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,308,249 UART: [afmc] --
28,312,827 UART: [cold-reset] --
28,317,072 UART: [state] Locking Datavault
28,323,035 UART: [state] Locking PCR0, PCR1 and PCR31
28,324,740 UART: [state] Locking ICCM
28,327,543 UART: [exit] Launching FMC @ 0x40000130
28,335,938 UART:
28,336,170 UART: Running Caliptra FMC ...
28,337,274 UART:
28,337,456 UART: [state] CFI Enabled
28,402,378 UART: [fht] FMC Alias Private Key: 7
30,742,804 UART: [art] Extend RT PCRs Done
30,744,027 UART: [art] Lock RT PCRs Done
30,745,969 UART: [art] Populate DV Done
30,751,650 UART: [fht] FMC Alias Private Key: 7
30,753,196 UART: [art] Derive CDI
30,754,015 UART: [art] Store in slot 0x4
30,810,967 UART: [art] Derive Key Pair
30,812,014 UART: [art] Store priv key in slot 0x5
34,104,347 UART: [art] Derive Key Pair - Done
34,116,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,406,156 UART: [art] Erasing AUTHORITY.KEYID = 7
36,407,665 UART: [art] PUB.X = 1AB43FE837F23B9AAC12996ABABCC913AA220BDE4404C8A998F462F6F14A48B9565798C63248889F5A8CD6557F36E726
36,414,937 UART: [art] PUB.Y = 9B93CB3F0C173621C197AC61193821F1138666B27C6136364607830EEB5957154F2E36FC558AEB28D8C631F27CBD9A02
36,422,187 UART: [art] SIG.R = E566C2E3FC9CEF59F9AC8699B6E5BCC1415AF54EC5F01C82FD1DA39FC62D6691B1C145DAC52256325066753233D95205
36,429,612 UART: [art] SIG.S = 110B0AABF4B29A0F6D8E751D430478EB6C4EBD25066BB497CE2262CFDB1E97FDF6671450337D5D5B86CA0A2DDA2473A7
37,735,114 UART: Caliptra RT
37,735,826 UART: [state] CFI Enabled
37,911,566 UART: [rt] RT listening for mailbox commands...
37,913,951 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,069,046 UART: [rt]cmd =0x41544d4e, len=14344
44,406,060 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,781,363 ready_for_fw is high
3,781,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,996,265 >>> mbox cmd response: success
27,701,556 UART:
27,701,984 UART: Running Caliptra FMC ...
27,703,098 UART:
27,703,261 UART: [state] CFI Enabled
27,769,057 UART: [fht] FMC Alias Private Key: 7
30,109,123 UART: [art] Extend RT PCRs Done
30,110,368 UART: [art] Lock RT PCRs Done
30,112,002 UART: [art] Populate DV Done
30,117,638 UART: [fht] FMC Alias Private Key: 7
30,119,234 UART: [art] Derive CDI
30,120,049 UART: [art] Store in slot 0x4
30,177,201 UART: [art] Derive Key Pair
30,178,244 UART: [art] Store priv key in slot 0x5
33,470,860 UART: [art] Derive Key Pair - Done
33,483,667 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,772,415 UART: [art] Erasing AUTHORITY.KEYID = 7
35,773,930 UART: [art] PUB.X = 945567971902BB9A4602479A49B5EAF11BFFD533C5906BE17A7A73A9344AA106C7C5B7B57CB3F373FC60AD4D8C0D7C4A
35,781,200 UART: [art] PUB.Y = F437376BE90FD3D8605B4B3C5D4F91D9523DECA059A1A6689D6045D86A6DF6B8B6D59216C90435E16AFC3460E45F193C
35,788,424 UART: [art] SIG.R = F7F6BD0D84C1BC87F4F8D917F2458A5190038A326220B7802B68BF937BE9A6C45FE83E474CDE86D9376A90784433FBD6
35,795,823 UART: [art] SIG.S = FD886DB8B88FDDE0D5315F615CC1C8435C6D2E7AA919A05A0F0F008A2F9329992FA5B345DF452047844B9DACCBC4E573
37,101,550 UART: Caliptra RT
37,102,275 UART: [state] CFI Enabled
37,278,915 UART: [rt] RT listening for mailbox commands...
37,281,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,436,386 UART: [rt]cmd =0x41544d4e, len=14344
43,644,256 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.45s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,366 UART:
192,740 UART: Running Caliptra ROM ...
193,861 UART:
603,475 UART: [state] CFI Enabled
620,066 UART: [state] LifecycleState = Unprovisioned
621,961 UART: [state] DebugLocked = No
623,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,419 UART: [kat] SHA2-256
798,148 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,660 UART: [kat] ++
809,129 UART: [kat] sha1
820,152 UART: [kat] SHA2-256
822,820 UART: [kat] SHA2-384
828,895 UART: [kat] SHA2-512-ACC
831,261 UART: [kat] ECC-384
3,115,774 UART: [kat] HMAC-384Kdf
3,126,714 UART: [kat] LMS
4,316,849 UART: [kat] --
4,321,492 UART: [cold-reset] ++
4,322,782 UART: [fht] Storing FHT @ 0x50003400
4,335,693 UART: [idev] ++
4,336,291 UART: [idev] CDI.KEYID = 6
4,337,197 UART: [idev] SUBJECT.KEYID = 7
4,338,437 UART: [idev] UDS.KEYID = 0
4,339,428 ready_for_fw is high
4,339,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,435 UART: [idev] Erasing UDS.KEYID = 0
7,626,032 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,237 UART: [idev] --
7,652,767 UART: [ldev] ++
7,653,339 UART: [ldev] CDI.KEYID = 6
7,654,298 UART: [ldev] SUBJECT.KEYID = 5
7,655,502 UART: [ldev] AUTHORITY.KEYID = 7
7,656,781 UART: [ldev] FE.KEYID = 1
7,669,747 UART: [ldev] Erasing FE.KEYID = 1
10,958,804 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,403 UART: [ldev] --
13,315,741 UART: [fwproc] Waiting for Commands...
13,318,644 UART: [fwproc] Received command 0x46574c44
13,320,875 UART: [fwproc] Received Image of size 118548 bytes
22,329,866 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,415,246 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,488,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,817,747 >>> mbox cmd response: success
22,821,648 UART: [afmc] ++
22,822,238 UART: [afmc] CDI.KEYID = 6
22,823,137 UART: [afmc] SUBJECT.KEYID = 7
22,824,399 UART: [afmc] AUTHORITY.KEYID = 5
26,137,166 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,431,426 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,433,680 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,448,174 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,462,970 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,477,327 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,499,161 UART: [afmc] --
28,503,901 UART: [cold-reset] --
28,508,298 UART: [state] Locking Datavault
28,512,528 UART: [state] Locking PCR0, PCR1 and PCR31
28,514,275 UART: [state] Locking ICCM
28,515,421 UART: [exit] Launching FMC @ 0x40000130
28,523,803 UART:
28,524,038 UART: Running Caliptra FMC ...
28,525,136 UART:
28,525,290 UART: [state] CFI Enabled
28,533,168 UART: [fht] FMC Alias Private Key: 7
30,873,828 UART: [art] Extend RT PCRs Done
30,875,043 UART: [art] Lock RT PCRs Done
30,876,936 UART: [art] Populate DV Done
30,882,614 UART: [fht] FMC Alias Private Key: 7
30,884,302 UART: [art] Derive CDI
30,885,109 UART: [art] Store in slot 0x4
30,927,375 UART: [art] Derive Key Pair
30,928,411 UART: [art] Store priv key in slot 0x5
34,170,309 UART: [art] Derive Key Pair - Done
34,183,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,463,749 UART: [art] Erasing AUTHORITY.KEYID = 7
36,465,252 UART: [art] PUB.X = 0279DF71BAC03963930C47B6B68987BFBF936F29DC7C2ADF85C1BFAF69EC7FFD1D5677F2401AB96543F3B83A5CB2C801
36,472,506 UART: [art] PUB.Y = 55051AE1AAFAB158E4F76E3FE63BE6EA7D3A7A890C626030B36EB1C7E37A31203D88798CB500EF92366CEA868CC5992E
36,479,750 UART: [art] SIG.R = 9D2567DF2AD403F5E0368CF2B74042DB00F0E4B3364C299E66881AE408E4A333BED8784DCD39B01BB4A5053F7C960227
36,487,135 UART: [art] SIG.S = 207FC1D1555A7A41C58D8BC2D685BEE7F7AC06DC534348740C4889BCBEEDDB59E7D8A9EF1468A44F20F9D898DAAF211B
37,792,533 UART: Caliptra RT
37,793,227 UART: [state] CFI Enabled
37,927,559 UART: [rt] RT listening for mailbox commands...
37,930,337 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,085,693 UART: [rt]cmd =0x41544d4e, len=14344
44,448,368 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
4,128,117 ready_for_fw is high
4,128,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,200,614 >>> mbox cmd response: success
27,841,235 UART:
27,841,675 UART: Running Caliptra FMC ...
27,842,791 UART:
27,842,952 UART: [state] CFI Enabled
27,851,072 UART: [fht] FMC Alias Private Key: 7
30,191,392 UART: [art] Extend RT PCRs Done
30,192,620 UART: [art] Lock RT PCRs Done
30,194,248 UART: [art] Populate DV Done
30,199,621 UART: [fht] FMC Alias Private Key: 7
30,201,272 UART: [art] Derive CDI
30,202,081 UART: [art] Store in slot 0x4
30,244,129 UART: [art] Derive Key Pair
30,245,117 UART: [art] Store priv key in slot 0x5
33,487,483 UART: [art] Derive Key Pair - Done
33,500,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,780,517 UART: [art] Erasing AUTHORITY.KEYID = 7
35,782,134 UART: [art] PUB.X = A10441D35CF00A5C846886FF8DC9676C919078D3568537208BBD48FF95D4F552007E26C90D8C74CDCC4F27780583256C
35,789,273 UART: [art] PUB.Y = 47CC39EFD4224E75A40FE442714DFA972184875CA896D2010E19F735CF0F394EB943075C790F5BDE0F5298B98B41C734
35,796,522 UART: [art] SIG.R = 692304E1F2499FB3CB8E61776529CB7BB58236FF1404B033C98CB4CA4AAE4B30B80C059C3936BEA108C7A5C8E3A7AF37
35,803,854 UART: [art] SIG.S = ED7DEDC562A8E545B429F8D325B04AF2C2EEFC22D0C5AE1D0C42D14C0B7A73C35E5082ED2E889D0D53B5092FD0918835
37,108,763 UART: Caliptra RT
37,109,466 UART: [state] CFI Enabled
37,242,959 UART: [rt] RT listening for mailbox commands...
37,245,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,400,651 UART: [rt]cmd =0x41544d4e, len=14344
43,918,304 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
192,142 UART:
192,501 UART: Running Caliptra ROM ...
193,579 UART:
193,717 UART: [state] CFI Enabled
264,492 UART: [state] LifecycleState = Unprovisioned
266,410 UART: [state] DebugLocked = No
268,377 UART: [state] WD Timer not started. Device not locked for debugging
272,123 UART: [kat] SHA2-256
451,789 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,527 UART: [kat] ++
462,974 UART: [kat] sha1
474,056 UART: [kat] SHA2-256
476,705 UART: [kat] SHA2-384
483,825 UART: [kat] SHA2-512-ACC
486,182 UART: [kat] ECC-384
2,946,319 UART: [kat] HMAC-384Kdf
2,970,274 UART: [kat] LMS
3,446,735 UART: [kat] --
3,451,373 UART: [cold-reset] ++
3,453,649 UART: [fht] FHT @ 0x50003400
3,464,355 UART: [idev] ++
3,464,966 UART: [idev] CDI.KEYID = 6
3,465,872 UART: [idev] SUBJECT.KEYID = 7
3,467,121 UART: [idev] UDS.KEYID = 0
3,468,048 ready_for_fw is high
3,468,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,166 UART: [idev] Erasing UDS.KEYID = 0
5,986,083 UART: [idev] Sha1 KeyId Algorithm
6,010,135 UART: [idev] --
6,015,483 UART: [ldev] ++
6,016,110 UART: [ldev] CDI.KEYID = 6
6,017,021 UART: [ldev] SUBJECT.KEYID = 5
6,018,237 UART: [ldev] AUTHORITY.KEYID = 7
6,019,471 UART: [ldev] FE.KEYID = 1
6,056,219 UART: [ldev] Erasing FE.KEYID = 1
8,565,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,266 UART: [ldev] --
10,372,453 UART: [fwproc] Wait for Commands...
10,375,245 UART: [fwproc] Recv command 0x46574c44
10,377,278 UART: [fwproc] Recv'd Img size: 118548 bytes
14,923,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,005,725 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,078,746 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,406,740 >>> mbox cmd response: success
15,410,004 UART: [afmc] ++
15,410,603 UART: [afmc] CDI.KEYID = 6
15,411,568 UART: [afmc] SUBJECT.KEYID = 7
15,412,778 UART: [afmc] AUTHORITY.KEYID = 5
17,941,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,682,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,684,663 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,700,684 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,716,471 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,732,174 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,756,035 UART: [afmc] --
19,760,115 UART: [cold-reset] --
19,763,431 UART: [state] Locking Datavault
19,768,621 UART: [state] Locking PCR0, PCR1 and PCR31
19,770,373 UART: [state] Locking ICCM
19,772,029 UART: [exit] Launching FMC @ 0x40000130
19,780,425 UART:
19,780,701 UART: Running Caliptra FMC ...
19,781,757 UART:
19,781,907 UART: [state] CFI Enabled
19,840,854 UART: [fht] FMC Alias Private Key: 7
21,607,697 UART: [art] Extend RT PCRs Done
21,608,938 UART: [art] Lock RT PCRs Done
21,610,853 UART: [art] Populate DV Done
21,616,154 UART: [fht] FMC Alias Private Key: 7
21,617,850 UART: [art] Derive CDI
21,618,580 UART: [art] Store in slot 0x4
21,673,821 UART: [art] Derive Key Pair
21,674,859 UART: [art] Store priv key in slot 0x5
24,138,060 UART: [art] Derive Key Pair - Done
24,150,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,864,350 UART: [art] Erasing AUTHORITY.KEYID = 7
25,865,849 UART: [art] PUB.X = 111B9A04FE1EBCF8CBDF47B8047B9E3F94C2B86019E3D02765DCB9C753699C9A75A053EAAA8C19193B11BB5B31199821
25,873,159 UART: [art] PUB.Y = 4C6E067EB870C74D03C3B28EADC2D195A968C07FF7BDDA550FFC2299C8776E99DAB8A12643F113D26DC81D0E3170D6DA
25,880,449 UART: [art] SIG.R = A583AD333FC42973F4160452F92874BC42708752FA649C0A4C053AE1F0AB63D2C84F3A00CA33C40A869511E1B672E92E
25,887,794 UART: [art] SIG.S = E786B0BD36B3140912F15AB844D5153010C5EA2D8DEDD277DDB2D70A15D151B6D729C4E80E014D96C95DB0506A25A4FB
26,866,482 UART: Caliptra RT
26,867,183 UART: [state] CFI Enabled
27,047,192 UART: [rt] RT listening for mailbox commands...
27,049,551 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,205,060 UART: [rt]cmd =0x41544d4e, len=14344
30,924,536 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,462,606 ready_for_fw is high
3,463,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,402,066 >>> mbox cmd response: success
19,686,224 UART:
19,686,607 UART: Running Caliptra FMC ...
19,687,709 UART:
19,687,861 UART: [state] CFI Enabled
19,753,866 UART: [fht] FMC Alias Private Key: 7
21,520,408 UART: [art] Extend RT PCRs Done
21,521,628 UART: [art] Lock RT PCRs Done
21,523,438 UART: [art] Populate DV Done
21,528,849 UART: [fht] FMC Alias Private Key: 7
21,530,326 UART: [art] Derive CDI
21,531,057 UART: [art] Store in slot 0x4
21,586,237 UART: [art] Derive Key Pair
21,587,281 UART: [art] Store priv key in slot 0x5
24,050,279 UART: [art] Derive Key Pair - Done
24,063,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,775,832 UART: [art] Erasing AUTHORITY.KEYID = 7
25,777,335 UART: [art] PUB.X = 33DA8693BF5F79EFD785D35B345F86B0D637A443AF3C55D22FEC6E9B1B88617CB8C5C2E39107AA8B49DCABD03C878723
25,784,594 UART: [art] PUB.Y = E85953CCE7A70C7C215EA649C0F1E1852F008897941A1E9B955A0ED04894F81B55A7BAAA1D496C3082ED905519EA4FC4
25,791,855 UART: [art] SIG.R = 0FD0768492700E8AB6A4E6A8950291673DD23C2F44EDC1CEE514D910F11DDFD1F806F6E93812972F2CDAFC65210FCC08
25,799,297 UART: [art] SIG.S = 36C916117295DB3AF1AC541EF63D5B642954E333451F4493164136BE2A3FE9515527083D22A73F7064703C41D2F9FAD8
26,778,240 UART: Caliptra RT
26,778,953 UART: [state] CFI Enabled
26,959,975 UART: [rt] RT listening for mailbox commands...
26,962,293 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,117,596 UART: [rt]cmd =0x41544d4e, len=14344
30,823,858 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,369 UART:
192,849 UART: Running Caliptra ROM ...
193,971 UART:
603,427 UART: [state] CFI Enabled
618,786 UART: [state] LifecycleState = Unprovisioned
620,674 UART: [state] DebugLocked = No
622,439 UART: [state] WD Timer not started. Device not locked for debugging
626,550 UART: [kat] SHA2-256
806,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,963 UART: [kat] ++
817,456 UART: [kat] sha1
828,636 UART: [kat] SHA2-256
831,331 UART: [kat] SHA2-384
837,825 UART: [kat] SHA2-512-ACC
840,196 UART: [kat] ECC-384
3,283,047 UART: [kat] HMAC-384Kdf
3,295,004 UART: [kat] LMS
3,771,562 UART: [kat] --
3,775,142 UART: [cold-reset] ++
3,777,143 UART: [fht] FHT @ 0x50003400
3,788,429 UART: [idev] ++
3,789,065 UART: [idev] CDI.KEYID = 6
3,790,013 UART: [idev] SUBJECT.KEYID = 7
3,791,201 UART: [idev] UDS.KEYID = 0
3,792,133 ready_for_fw is high
3,792,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,265 UART: [idev] Erasing UDS.KEYID = 0
6,271,129 UART: [idev] Sha1 KeyId Algorithm
6,295,803 UART: [idev] --
6,300,334 UART: [ldev] ++
6,300,903 UART: [ldev] CDI.KEYID = 6
6,301,809 UART: [ldev] SUBJECT.KEYID = 5
6,303,033 UART: [ldev] AUTHORITY.KEYID = 7
6,304,273 UART: [ldev] FE.KEYID = 1
6,316,917 UART: [ldev] Erasing FE.KEYID = 1
8,797,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,604 UART: [ldev] --
10,590,313 UART: [fwproc] Wait for Commands...
10,592,741 UART: [fwproc] Recv command 0x46574c44
10,594,729 UART: [fwproc] Recv'd Img size: 118548 bytes
15,125,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,201,089 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,274,089 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,603,204 >>> mbox cmd response: success
15,607,877 UART: [afmc] ++
15,608,487 UART: [afmc] CDI.KEYID = 6
15,609,454 UART: [afmc] SUBJECT.KEYID = 7
15,610,667 UART: [afmc] AUTHORITY.KEYID = 5
18,113,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,835,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,837,546 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,853,383 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,869,328 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,885,032 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,908,607 UART: [afmc] --
19,913,008 UART: [cold-reset] --
19,916,070 UART: [state] Locking Datavault
19,921,321 UART: [state] Locking PCR0, PCR1 and PCR31
19,923,076 UART: [state] Locking ICCM
19,924,703 UART: [exit] Launching FMC @ 0x40000130
19,933,105 UART:
19,933,341 UART: Running Caliptra FMC ...
19,934,445 UART:
19,934,615 UART: [state] CFI Enabled
19,942,833 UART: [fht] FMC Alias Private Key: 7
21,709,497 UART: [art] Extend RT PCRs Done
21,710,731 UART: [art] Lock RT PCRs Done
21,712,190 UART: [art] Populate DV Done
21,717,554 UART: [fht] FMC Alias Private Key: 7
21,719,270 UART: [art] Derive CDI
21,720,086 UART: [art] Store in slot 0x4
21,762,901 UART: [art] Derive Key Pair
21,763,898 UART: [art] Store priv key in slot 0x5
24,190,752 UART: [art] Derive Key Pair - Done
24,203,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,909,543 UART: [art] Erasing AUTHORITY.KEYID = 7
25,911,041 UART: [art] PUB.X = B8AFFF4F4E78BCB6BD828F833DBF9F82FDE69A9BF41681CDD9C1620D14CD7B37192C4D1C39D386EC1AE09ECC231B02AF
25,918,394 UART: [art] PUB.Y = 4E7AD8F44BDB90933B270A318AD2C0315ECB6DE888932B4FABF8B0BF0E3A87658C043657F9CCAC768C2BB03F9F2CD7DB
25,925,675 UART: [art] SIG.R = 1D7B51D0DC02FE0772846DE3994B8345B54530F356F8E69D10EC4612A9FC0B573F3DF7623D2B397709B0D9E0ADD80EEF
25,933,074 UART: [art] SIG.S = 0FA9A8A71D5F9899DA6923116380011EFA2BF46F6551E676F4FC012F88B42B63A02148EBE8DBEE93FF904A73610F9977
26,912,062 UART: Caliptra RT
26,912,775 UART: [state] CFI Enabled
27,045,279 UART: [rt] RT listening for mailbox commands...
27,047,581 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,203,025 UART: [rt]cmd =0x41544d4e, len=14344
30,927,129 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
3,782,429 ready_for_fw is high
3,782,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,595,732 >>> mbox cmd response: success
19,843,788 UART:
19,844,180 UART: Running Caliptra FMC ...
19,845,341 UART:
19,845,504 UART: [state] CFI Enabled
19,853,456 UART: [fht] FMC Alias Private Key: 7
21,619,907 UART: [art] Extend RT PCRs Done
21,621,132 UART: [art] Lock RT PCRs Done
21,622,649 UART: [art] Populate DV Done
21,628,076 UART: [fht] FMC Alias Private Key: 7
21,629,791 UART: [art] Derive CDI
21,630,606 UART: [art] Store in slot 0x4
21,672,518 UART: [art] Derive Key Pair
21,673,555 UART: [art] Store priv key in slot 0x5
24,100,113 UART: [art] Derive Key Pair - Done
24,113,216 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,819,418 UART: [art] Erasing AUTHORITY.KEYID = 7
25,820,927 UART: [art] PUB.X = B6783BDC857433BDCBC21CDFB5913558813351E6224334CB6410824F0E0991395D805F6E534B648B2E4E6058970CC348
25,828,187 UART: [art] PUB.Y = 8AA64F9229364A4A5735D78D7F62D19F8FC4FF6D3AE969FB8916A23FAC9656C17D0EA00AC1119D278CF0CCAFA26AC4A8
25,835,474 UART: [art] SIG.R = 02A3C709EA51F1AA16EE997003A19CFB3C03DDBFAFCF9660FC0970C6B45D55AE5B3C114F1D0A8F4A9A9C6F2231BE0D1F
25,842,887 UART: [art] SIG.S = FD2E758ADD95B7E4099861F5AE6AD1B57C67931163CDC029C5BD638FAF8C47DC4C6B77663B3BCB40FA90554668F30C4C
26,821,836 UART: Caliptra RT
26,822,551 UART: [state] CFI Enabled
26,955,618 UART: [rt] RT listening for mailbox commands...
26,957,922 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,113,280 UART: [rt]cmd =0x41544d4e, len=14344
30,834,180 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,067 UART:
192,452 UART: Running Caliptra ROM ...
193,630 UART:
193,785 UART: [state] CFI Enabled
263,140 UART: [state] LifecycleState = Unprovisioned
265,509 UART: [state] DebugLocked = No
268,383 UART: [state] WD Timer not started. Device not locked for debugging
273,161 UART: [kat] SHA2-256
463,032 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,848 UART: [kat] ++
474,357 UART: [kat] sha1
484,449 UART: [kat] SHA2-256
487,457 UART: [kat] SHA2-384
493,514 UART: [kat] SHA2-512-ACC
496,098 UART: [kat] ECC-384
2,948,695 UART: [kat] HMAC-384Kdf
2,972,379 UART: [kat] LMS
3,504,181 UART: [kat] --
3,510,639 UART: [cold-reset] ++
3,513,141 UART: [fht] FHT @ 0x50003400
3,524,680 UART: [idev] ++
3,525,382 UART: [idev] CDI.KEYID = 6
3,526,411 UART: [idev] SUBJECT.KEYID = 7
3,527,506 UART: [idev] UDS.KEYID = 0
3,528,437 ready_for_fw is high
3,528,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,768 UART: [idev] Erasing UDS.KEYID = 0
6,030,736 UART: [idev] Sha1 KeyId Algorithm
6,052,813 UART: [idev] --
6,057,295 UART: [ldev] ++
6,057,976 UART: [ldev] CDI.KEYID = 6
6,058,890 UART: [ldev] SUBJECT.KEYID = 5
6,060,101 UART: [ldev] AUTHORITY.KEYID = 7
6,061,275 UART: [ldev] FE.KEYID = 1
6,102,383 UART: [ldev] Erasing FE.KEYID = 1
8,608,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,298 UART: [ldev] --
10,417,268 UART: [fwproc] Wait for Commands...
10,419,215 UART: [fwproc] Recv command 0x46574c44
10,421,467 UART: [fwproc] Recv'd Img size: 118548 bytes
15,101,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,175,550 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,299,150 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,858,816 >>> mbox cmd response: success
15,862,884 UART: [afmc] ++
15,863,607 UART: [afmc] CDI.KEYID = 6
15,864,802 UART: [afmc] SUBJECT.KEYID = 7
15,866,238 UART: [afmc] AUTHORITY.KEYID = 5
18,416,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,156,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,157,942 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,173,035 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,188,242 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,203,302 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,226,078 UART: [afmc] --
20,229,033 UART: [cold-reset] --
20,232,466 UART: [state] Locking Datavault
20,235,615 UART: [state] Locking PCR0, PCR1 and PCR31
20,237,756 UART: [state] Locking ICCM
20,239,307 UART: [exit] Launching FMC @ 0x40000130
20,247,987 UART:
20,248,229 UART: Running Caliptra FMC ...
20,249,327 UART:
20,249,486 UART: [state] CFI Enabled
20,313,811 UART: [fht] FMC Alias Private Key: 7
22,080,459 UART: [art] Extend RT PCRs Done
22,081,684 UART: [art] Lock RT PCRs Done
22,083,230 UART: [art] Populate DV Done
22,088,636 UART: [fht] FMC Alias Private Key: 7
22,090,335 UART: [art] Derive CDI
22,091,167 UART: [art] Store in slot 0x4
22,146,476 UART: [art] Derive Key Pair
22,147,515 UART: [art] Store priv key in slot 0x5
24,610,593 UART: [art] Derive Key Pair - Done
24,623,533 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,337,186 UART: [art] Erasing AUTHORITY.KEYID = 7
26,338,689 UART: [art] PUB.X = C731149657E1A3EA78E52D536827045E35C79ED4F460228FE8F6D7BABC1595A6F0F32B0DBE30DB337CDD38F0E8B93F09
26,345,978 UART: [art] PUB.Y = B10BE9E5C289E55220E0328E20CB5511255B829ED8D2516710EEB5B3E90952518C975C37D96C300D0A0CCAF86726B5CC
26,353,222 UART: [art] SIG.R = 24E43D80B4D55DDCCA2876C697B1CAF25F7D4CD46B5DE205E15F2E3C435CE39AC9C1CFD514D7D2544AF77FA4A89E8399
26,360,607 UART: [art] SIG.S = 2C4C87E1EB01C16F0B5E2A9F47C21C26DDB618147FA174D847BB6FAD6AD1187DB57B64CF5BAC5B5224B9544EDAB9EA2F
27,339,994 UART: Caliptra RT
27,340,699 UART: [state] CFI Enabled
27,520,495 UART: [rt] RT listening for mailbox commands...
27,522,809 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,678,119 UART: [rt]cmd =0x41544d4e, len=14344
31,395,927 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,438,641 ready_for_fw is high
3,439,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,929,762 >>> mbox cmd response: success
20,221,430 UART:
20,221,820 UART: Running Caliptra FMC ...
20,222,960 UART:
20,223,119 UART: [state] CFI Enabled
20,285,284 UART: [fht] FMC Alias Private Key: 7
22,051,997 UART: [art] Extend RT PCRs Done
22,053,226 UART: [art] Lock RT PCRs Done
22,054,803 UART: [art] Populate DV Done
22,060,376 UART: [fht] FMC Alias Private Key: 7
22,061,941 UART: [art] Derive CDI
22,062,758 UART: [art] Store in slot 0x4
22,119,316 UART: [art] Derive Key Pair
22,120,362 UART: [art] Store priv key in slot 0x5
24,583,103 UART: [art] Derive Key Pair - Done
24,596,321 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,309,201 UART: [art] Erasing AUTHORITY.KEYID = 7
26,310,688 UART: [art] PUB.X = 87882583AB08F00B01B4FE9380999CF3613B76C7E99A90817516CDC5620A69468F1F51E6CECE4AAD2B9CA9E0710743BF
26,317,957 UART: [art] PUB.Y = 9005ABCB7FDD36FF03F6C8B75A3BEBE82324519307BF8477537EA5E45F637008CB3F7F3C66400F08A5E48B44F5A85DEE
26,325,234 UART: [art] SIG.R = 603DC68001D36DC2C193D1BFD0B7F4B2F18AF0EC11AED7211679B0A749553C8F13DFA82A695D0076826526C219FBA47C
26,332,601 UART: [art] SIG.S = 5374425CD30F9E9203FB94E8F30559BEA0615C5A5E01CAB8DA8F7D7BAA8FE61F4FCFC49FB60FF5236DEB82B493C066A0
27,311,661 UART: Caliptra RT
27,312,376 UART: [state] CFI Enabled
27,492,295 UART: [rt] RT listening for mailbox commands...
27,494,597 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,650,044 UART: [rt]cmd =0x41544d4e, len=14344
31,366,318 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,380 UART:
192,747 UART: Running Caliptra ROM ...
193,876 UART:
603,410 UART: [state] CFI Enabled
620,804 UART: [state] LifecycleState = Unprovisioned
623,242 UART: [state] DebugLocked = No
625,210 UART: [state] WD Timer not started. Device not locked for debugging
630,492 UART: [kat] SHA2-256
820,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,202 UART: [kat] ++
831,736 UART: [kat] sha1
844,395 UART: [kat] SHA2-256
847,403 UART: [kat] SHA2-384
853,777 UART: [kat] SHA2-512-ACC
856,330 UART: [kat] ECC-384
3,298,792 UART: [kat] HMAC-384Kdf
3,312,798 UART: [kat] LMS
3,844,648 UART: [kat] --
3,850,305 UART: [cold-reset] ++
3,852,887 UART: [fht] FHT @ 0x50003400
3,863,749 UART: [idev] ++
3,864,463 UART: [idev] CDI.KEYID = 6
3,865,455 UART: [idev] SUBJECT.KEYID = 7
3,866,634 UART: [idev] UDS.KEYID = 0
3,867,557 ready_for_fw is high
3,867,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,016,757 UART: [idev] Erasing UDS.KEYID = 0
6,341,541 UART: [idev] Sha1 KeyId Algorithm
6,364,065 UART: [idev] --
6,368,439 UART: [ldev] ++
6,369,117 UART: [ldev] CDI.KEYID = 6
6,370,033 UART: [ldev] SUBJECT.KEYID = 5
6,371,365 UART: [ldev] AUTHORITY.KEYID = 7
6,372,555 UART: [ldev] FE.KEYID = 1
6,382,401 UART: [ldev] Erasing FE.KEYID = 1
8,861,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,938 UART: [ldev] --
10,654,794 UART: [fwproc] Wait for Commands...
10,657,971 UART: [fwproc] Recv command 0x46574c44
10,660,280 UART: [fwproc] Recv'd Img size: 118548 bytes
15,312,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,399,439 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,523,058 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,084,143 >>> mbox cmd response: success
16,088,562 UART: [afmc] ++
16,089,293 UART: [afmc] CDI.KEYID = 6
16,090,491 UART: [afmc] SUBJECT.KEYID = 7
16,091,948 UART: [afmc] AUTHORITY.KEYID = 5
18,597,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,319,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,321,183 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,336,290 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,351,487 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,366,520 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,391,460 UART: [afmc] --
20,395,720 UART: [cold-reset] --
20,399,597 UART: [state] Locking Datavault
20,404,106 UART: [state] Locking PCR0, PCR1 and PCR31
20,406,265 UART: [state] Locking ICCM
20,408,770 UART: [exit] Launching FMC @ 0x40000130
20,417,457 UART:
20,417,691 UART: Running Caliptra FMC ...
20,418,718 UART:
20,418,867 UART: [state] CFI Enabled
20,427,210 UART: [fht] FMC Alias Private Key: 7
22,193,256 UART: [art] Extend RT PCRs Done
22,194,483 UART: [art] Lock RT PCRs Done
22,196,298 UART: [art] Populate DV Done
22,201,875 UART: [fht] FMC Alias Private Key: 7
22,203,415 UART: [art] Derive CDI
22,204,177 UART: [art] Store in slot 0x4
22,247,314 UART: [art] Derive Key Pair
22,248,359 UART: [art] Store priv key in slot 0x5
24,675,485 UART: [art] Derive Key Pair - Done
24,688,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,394,904 UART: [art] Erasing AUTHORITY.KEYID = 7
26,396,390 UART: [art] PUB.X = 0D0D9C002B07457015F09C7E714369AD559B9BA50D77908D82B530A70699139883F7A15E39E3B8EB6115F71C8503083F
26,403,601 UART: [art] PUB.Y = 3D1C44C6ACA637F1E9DF9309A4DF73A0A41693C5400FAC9EE89C661E92144A75B3833CF4A3371F6428CF6841E13A6897
26,410,860 UART: [art] SIG.R = 896DBD376258295A3C67822AFD0A217281E5B91451814258DBF1721B218FDDA88C6A9F09910C50779667A1C80538A095
26,418,230 UART: [art] SIG.S = 4BD173156B999BC40E749C6918B0E86ECAC35C03E4AC36B77C27219CEFED481C9BAE2D4B5F02A5997A74967C63A2E8A9
27,397,465 UART: Caliptra RT
27,398,177 UART: [state] CFI Enabled
27,531,939 UART: [rt] RT listening for mailbox commands...
27,534,257 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,689,636 UART: [rt]cmd =0x41544d4e, len=14344
31,396,792 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,752,035 ready_for_fw is high
3,752,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,132,521 >>> mbox cmd response: success
20,389,618 UART:
20,390,025 UART: Running Caliptra FMC ...
20,391,167 UART:
20,391,338 UART: [state] CFI Enabled
20,399,610 UART: [fht] FMC Alias Private Key: 7
22,164,842 UART: [art] Extend RT PCRs Done
22,166,080 UART: [art] Lock RT PCRs Done
22,167,580 UART: [art] Populate DV Done
22,172,999 UART: [fht] FMC Alias Private Key: 7
22,174,505 UART: [art] Derive CDI
22,175,275 UART: [art] Store in slot 0x4
22,217,764 UART: [art] Derive Key Pair
22,218,807 UART: [art] Store priv key in slot 0x5
24,646,253 UART: [art] Derive Key Pair - Done
24,659,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,365,865 UART: [art] Erasing AUTHORITY.KEYID = 7
26,367,374 UART: [art] PUB.X = 1C1602ADDD7E2D4D90C2487C581A127A0D374072C3850A37ADD690673DE6AC07AEAD1F606349FF313CE76A3E3DAB5C3F
26,374,615 UART: [art] PUB.Y = CEF663618CA87CE9E13E2572AD298F0B035ADD37576538D35E71797B96A661A66EF9728E237C537DA270FD1242451490
26,381,842 UART: [art] SIG.R = 1DEA2FBDAAEF8C7F5533D6146FBB05FA1FE750E1BD92869ABA1853EAE15FCEEC8E706DF57158657C4D092D4D4B42DE2C
26,389,306 UART: [art] SIG.S = 9F4ACBEC311AEF6F60A4AC3428B433C880099286D7D547529613AEA1541CF0725E3A5596BC3D385C497F63E4D441C629
27,368,241 UART: Caliptra RT
27,368,966 UART: [state] CFI Enabled
27,501,765 UART: [rt] RT listening for mailbox commands...
27,504,082 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,659,347 UART: [rt]cmd =0x41544d4e, len=14344
31,378,898 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,903 UART: [kat] SHA2-256
881,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,949 UART: [kat] ++
886,101 UART: [kat] sha1
890,365 UART: [kat] SHA2-256
892,303 UART: [kat] SHA2-384
895,008 UART: [kat] SHA2-512-ACC
896,909 UART: [kat] ECC-384
902,680 UART: [kat] HMAC-384Kdf
907,108 UART: [kat] LMS
1,475,304 UART: [kat] --
1,476,381 UART: [cold-reset] ++
1,476,807 UART: [fht] Storing FHT @ 0x50003400
1,479,516 UART: [idev] ++
1,479,684 UART: [idev] CDI.KEYID = 6
1,480,044 UART: [idev] SUBJECT.KEYID = 7
1,480,468 UART: [idev] UDS.KEYID = 0
1,480,813 ready_for_fw is high
1,480,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,330 UART: [idev] Erasing UDS.KEYID = 0
1,505,218 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,854 UART: [idev] --
1,514,865 UART: [ldev] ++
1,515,033 UART: [ldev] CDI.KEYID = 6
1,515,396 UART: [ldev] SUBJECT.KEYID = 5
1,515,822 UART: [ldev] AUTHORITY.KEYID = 7
1,516,285 UART: [ldev] FE.KEYID = 1
1,521,459 UART: [ldev] Erasing FE.KEYID = 1
1,546,632 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,414 UART: [ldev] --
1,585,769 UART: [fwproc] Waiting for Commands...
1,586,482 UART: [fwproc] Received command 0x46574c44
1,587,273 UART: [fwproc] Received Image of size 118548 bytes
4,978,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,007,457 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,038,675 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,178,870 >>> mbox cmd response: success
5,179,936 UART: [afmc] ++
5,180,104 UART: [afmc] CDI.KEYID = 6
5,180,466 UART: [afmc] SUBJECT.KEYID = 7
5,180,891 UART: [afmc] AUTHORITY.KEYID = 5
5,215,382 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,231,664 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,232,444 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,238,150 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,244,029 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,249,742 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,257,585 UART: [afmc] --
5,258,503 UART: [cold-reset] --
5,259,119 UART: [state] Locking Datavault
5,260,474 UART: [state] Locking PCR0, PCR1 and PCR31
5,261,078 UART: [state] Locking ICCM
5,261,506 UART: [exit] Launching FMC @ 0x40000130
5,266,836 UART:
5,266,852 UART: Running Caliptra FMC ...
5,267,260 UART:
5,267,314 UART: [state] CFI Enabled
5,277,750 UART: [fht] FMC Alias Private Key: 7
5,395,644 UART: [art] Extend RT PCRs Done
5,396,072 UART: [art] Lock RT PCRs Done
5,397,802 UART: [art] Populate DV Done
5,406,163 UART: [fht] FMC Alias Private Key: 7
5,407,223 UART: [art] Derive CDI
5,407,503 UART: [art] Store in slot 0x4
5,493,547 UART: [art] Derive Key Pair
5,493,907 UART: [art] Store priv key in slot 0x5
5,507,450 UART: [art] Derive Key Pair - Done
5,522,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,537,673 UART: [art] Erasing AUTHORITY.KEYID = 7
5,538,438 UART: [art] PUB.X = A5F08D3E7BF7E38C33965FADB9A64B6B9081187574906B9B9A3ECCDE3790E0729310FBD739913F0C216569F43FA555A0
5,545,209 UART: [art] PUB.Y = A8E7F346566803256C256C53A89FA3A29B57DEDA99382EB70CF210CBFDC9CA00B717146DF3AB1332AD12A7479DBC1574
5,552,141 UART: [art] SIG.R = AA070EC982D87D91B9FA9B00A7455288FB1EDC58FD6957154A4BE0E668AD923F81B75DAFCADC0000422AF062F5802412
5,558,849 UART: [art] SIG.S = A9D483A83246266092862D5F1A2C1FF2045D5159A0AA751AF1C6770423E9CB8FCA84BEE8192927A36CBCE66C1E09ED75
5,582,670 UART: Caliptra RT
5,582,921 UART: [state] CFI Enabled
5,702,832 UART: [rt] RT listening for mailbox commands...
5,703,502 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,826,680 UART: [rt]cmd =0x41544d4e, len=14344
9,607,848 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,913 ready_for_fw is high
1,362,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,443,915 >>> mbox cmd response: success
5,505,732 UART:
5,505,748 UART: Running Caliptra FMC ...
5,506,156 UART:
5,506,210 UART: [state] CFI Enabled
5,516,546 UART: [fht] FMC Alias Private Key: 7
5,635,692 UART: [art] Extend RT PCRs Done
5,636,120 UART: [art] Lock RT PCRs Done
5,637,848 UART: [art] Populate DV Done
5,646,153 UART: [fht] FMC Alias Private Key: 7
5,647,295 UART: [art] Derive CDI
5,647,575 UART: [art] Store in slot 0x4
5,733,493 UART: [art] Derive Key Pair
5,733,853 UART: [art] Store priv key in slot 0x5
5,746,830 UART: [art] Derive Key Pair - Done
5,761,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,777,051 UART: [art] Erasing AUTHORITY.KEYID = 7
5,777,816 UART: [art] PUB.X = 58910A8ABD5DBB31291B8E95DC7FCDA8C456636217838DD81CE24EBE1210FF86351316AD7DCB8D41BEDBBB90F98BB4E4
5,784,603 UART: [art] PUB.Y = A2BA284AF4ACB82A0669BA5D93A1880A830E079A6D62561ED74F355BC7A9ED10932F619A4BE70E1132FB2B30EFDAAAF6
5,791,556 UART: [art] SIG.R = 8807E371B28E6C6237F7BF25D0962AB7C489F21ECF7F2B591D72B1D26B455F43F0B07BB0A34D91E742A0E48821065FC2
5,798,324 UART: [art] SIG.S = 7790AA06D1C82E33D0F995217F21C8A5216FD0305A6F0220FC5A526DDE3F76B34DEA5F68917A448131906B325582BC45
5,822,222 UART: Caliptra RT
5,822,473 UART: [state] CFI Enabled
5,942,375 UART: [rt] RT listening for mailbox commands...
5,943,045 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,066,057 UART: [rt]cmd =0x41544d4e, len=14344
9,695,395 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,164 UART: [kat] SHA2-256
882,095 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,210 UART: [kat] ++
886,362 UART: [kat] sha1
890,504 UART: [kat] SHA2-256
892,442 UART: [kat] SHA2-384
895,233 UART: [kat] SHA2-512-ACC
897,134 UART: [kat] ECC-384
903,163 UART: [kat] HMAC-384Kdf
907,853 UART: [kat] LMS
1,476,049 UART: [kat] --
1,476,922 UART: [cold-reset] ++
1,477,464 UART: [fht] Storing FHT @ 0x50003400
1,480,275 UART: [idev] ++
1,480,443 UART: [idev] CDI.KEYID = 6
1,480,803 UART: [idev] SUBJECT.KEYID = 7
1,481,227 UART: [idev] UDS.KEYID = 0
1,481,572 ready_for_fw is high
1,481,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,237 UART: [idev] Erasing UDS.KEYID = 0
1,506,039 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,637 UART: [idev] --
1,515,552 UART: [ldev] ++
1,515,720 UART: [ldev] CDI.KEYID = 6
1,516,083 UART: [ldev] SUBJECT.KEYID = 5
1,516,509 UART: [ldev] AUTHORITY.KEYID = 7
1,516,972 UART: [ldev] FE.KEYID = 1
1,522,392 UART: [ldev] Erasing FE.KEYID = 1
1,547,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,047 UART: [ldev] --
1,587,382 UART: [fwproc] Waiting for Commands...
1,588,153 UART: [fwproc] Received command 0x46574c44
1,588,944 UART: [fwproc] Received Image of size 118548 bytes
5,092,737 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,120,939 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,152,157 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,292,472 >>> mbox cmd response: success
5,293,528 UART: [afmc] ++
5,293,696 UART: [afmc] CDI.KEYID = 6
5,294,058 UART: [afmc] SUBJECT.KEYID = 7
5,294,483 UART: [afmc] AUTHORITY.KEYID = 5
5,329,152 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,345,414 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,346,194 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,351,900 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,357,779 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,363,492 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,371,367 UART: [afmc] --
5,372,371 UART: [cold-reset] --
5,373,185 UART: [state] Locking Datavault
5,374,458 UART: [state] Locking PCR0, PCR1 and PCR31
5,375,062 UART: [state] Locking ICCM
5,375,576 UART: [exit] Launching FMC @ 0x40000130
5,380,906 UART:
5,380,922 UART: Running Caliptra FMC ...
5,381,330 UART:
5,381,473 UART: [state] CFI Enabled
5,392,219 UART: [fht] FMC Alias Private Key: 7
5,511,363 UART: [art] Extend RT PCRs Done
5,511,791 UART: [art] Lock RT PCRs Done
5,513,113 UART: [art] Populate DV Done
5,521,388 UART: [fht] FMC Alias Private Key: 7
5,522,534 UART: [art] Derive CDI
5,522,814 UART: [art] Store in slot 0x4
5,608,708 UART: [art] Derive Key Pair
5,609,068 UART: [art] Store priv key in slot 0x5
5,622,747 UART: [art] Derive Key Pair - Done
5,637,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,652,885 UART: [art] Erasing AUTHORITY.KEYID = 7
5,653,650 UART: [art] PUB.X = B8890E30D0895CFB0DF10CC7A67813058511E5879FCD4DDE9FEE167894F0C32A78269A70E4577580D01111FB5BA07718
5,660,408 UART: [art] PUB.Y = 128046DFF3FD5428CB496D5A8789B0951BBEFEC1D3C483EB6B421746A5DCDE3DE710BC3CD22F2598662C1229838F1F1F
5,667,370 UART: [art] SIG.R = 8F8C701337BF74576DF74630EB5020905E0BECBEC0E9312EDD959BD86618A306F3DE90DFFD7BF271FEC82AFCEBFB100C
5,674,153 UART: [art] SIG.S = DF645008446941246AC677F33F84A2BECBAC70B8072E35A31D9681DC6FBE7DADCCBCA7131F5C800BC67A9FBB1CBB30AB
5,698,758 UART: Caliptra RT
5,699,101 UART: [state] CFI Enabled
5,820,746 UART: [rt] RT listening for mailbox commands...
5,821,416 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,944,290 UART: [rt]cmd =0x41544d4e, len=14344
9,687,347 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.33s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,300 ready_for_fw is high
1,362,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,179,597 >>> mbox cmd response: success
5,242,014 UART:
5,242,030 UART: Running Caliptra FMC ...
5,242,438 UART:
5,242,581 UART: [state] CFI Enabled
5,253,197 UART: [fht] FMC Alias Private Key: 7
5,371,849 UART: [art] Extend RT PCRs Done
5,372,277 UART: [art] Lock RT PCRs Done
5,374,045 UART: [art] Populate DV Done
5,382,446 UART: [fht] FMC Alias Private Key: 7
5,383,538 UART: [art] Derive CDI
5,383,818 UART: [art] Store in slot 0x4
5,469,376 UART: [art] Derive Key Pair
5,469,736 UART: [art] Store priv key in slot 0x5
5,483,755 UART: [art] Derive Key Pair - Done
5,498,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,514,404 UART: [art] Erasing AUTHORITY.KEYID = 7
5,515,169 UART: [art] PUB.X = E5E3DDE3F01068269F9BEC415AD7CDCD6EDC9D4DE46780CCAED44A07C23715605C894BE179857444D45034A4C2C5B0F7
5,521,950 UART: [art] PUB.Y = 5664052F061139F0313FA8D3502B3B60438B370AFBC63502E6D540FB76BBE24265410476595D3A5E52655F68AF954B83
5,528,875 UART: [art] SIG.R = C493580105597EA6F38D088E28CDAC173CDE67BACC62543890FDB67F63F1F81F4DAC7EF7823F177F14474E29B81ADAB0
5,535,648 UART: [art] SIG.S = 32B5651A531E4372265EBADE49C8A8A48488333CE10892B661E14152A2C9F4D2F4F37CAF86E377ADDE37E675636240FA
5,559,253 UART: Caliptra RT
5,559,596 UART: [state] CFI Enabled
5,680,116 UART: [rt] RT listening for mailbox commands...
5,680,786 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,803,854 UART: [rt]cmd =0x41544d4e, len=14344
9,584,599 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.32s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,584 UART: [state] LifecycleState = Unprovisioned
86,239 UART: [state] DebugLocked = No
86,869 UART: [state] WD Timer not started. Device not locked for debugging
88,074 UART: [kat] SHA2-256
891,624 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,170 UART: [kat] SHA2-256
902,110 UART: [kat] SHA2-384
905,019 UART: [kat] SHA2-512-ACC
906,920 UART: [kat] ECC-384
916,541 UART: [kat] HMAC-384Kdf
921,211 UART: [kat] LMS
1,169,523 UART: [kat] --
1,170,336 UART: [cold-reset] ++
1,170,862 UART: [fht] FHT @ 0x50003400
1,173,586 UART: [idev] ++
1,173,754 UART: [idev] CDI.KEYID = 6
1,174,115 UART: [idev] SUBJECT.KEYID = 7
1,174,540 UART: [idev] UDS.KEYID = 0
1,174,886 ready_for_fw is high
1,174,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,405 UART: [idev] Erasing UDS.KEYID = 0
1,199,191 UART: [idev] Sha1 KeyId Algorithm
1,207,971 UART: [idev] --
1,208,990 UART: [ldev] ++
1,209,158 UART: [ldev] CDI.KEYID = 6
1,209,522 UART: [ldev] SUBJECT.KEYID = 5
1,209,949 UART: [ldev] AUTHORITY.KEYID = 7
1,210,412 UART: [ldev] FE.KEYID = 1
1,215,488 UART: [ldev] Erasing FE.KEYID = 1
1,241,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,532 UART: [ldev] --
1,280,977 UART: [fwproc] Wait for Commands...
1,281,768 UART: [fwproc] Recv command 0x46574c44
1,282,501 UART: [fwproc] Recv'd Img size: 118548 bytes
3,170,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,198,648 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,229,823 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,114 >>> mbox cmd response: success
3,371,288 UART: [afmc] ++
3,371,456 UART: [afmc] CDI.KEYID = 6
3,371,819 UART: [afmc] SUBJECT.KEYID = 7
3,372,245 UART: [afmc] AUTHORITY.KEYID = 5
3,408,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,174 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,881 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,436,758 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,442,468 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,228 UART: [afmc] --
3,451,183 UART: [cold-reset] --
3,451,949 UART: [state] Locking Datavault
3,453,284 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,888 UART: [state] Locking ICCM
3,454,382 UART: [exit] Launching FMC @ 0x40000130
3,459,712 UART:
3,459,728 UART: Running Caliptra FMC ...
3,460,136 UART:
3,460,190 UART: [state] CFI Enabled
3,470,464 UART: [fht] FMC Alias Private Key: 7
3,589,376 UART: [art] Extend RT PCRs Done
3,589,804 UART: [art] Lock RT PCRs Done
3,591,492 UART: [art] Populate DV Done
3,599,727 UART: [fht] FMC Alias Private Key: 7
3,600,773 UART: [art] Derive CDI
3,601,053 UART: [art] Store in slot 0x4
3,687,274 UART: [art] Derive Key Pair
3,687,634 UART: [art] Store priv key in slot 0x5
3,700,408 UART: [art] Derive Key Pair - Done
3,715,335 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,730,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,373 UART: [art] PUB.X = BA43F70FB2CB4901AD62358B17A9463D6EACC15B41EE069D72B3D26B97A999D354CBDFB8489B58457A5E8B345D293EF3
3,738,146 UART: [art] PUB.Y = 505F5BCF0C8A3AD7AC68425EF1FA667446EC37FAD01E456C89FD56B934EAC6FCAED7E084935895AB14372F1607DE17C5
3,745,106 UART: [art] SIG.R = 56FA70B8100739ADA7B6054DFFCE668F72EA3643F02DC8EFFEC14485CCE733836F9D985FBEABA3E205249535A8A40E71
3,751,878 UART: [art] SIG.S = 9F7187F910310D9BA201FE6AD34FDC28045125EBBE526818026AF1DA6BECA1F05B84F4916AB448EEF7A3B5AB2D03BAD3
3,775,437 UART: Caliptra RT
3,775,688 UART: [state] CFI Enabled
3,896,300 UART: [rt] RT listening for mailbox commands...
3,896,970 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,646 UART: [rt]cmd =0x41544d4e, len=14344
5,178,323 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,514 ready_for_fw is high
1,059,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,116 >>> mbox cmd response: success
3,283,843 UART:
3,283,859 UART: Running Caliptra FMC ...
3,284,267 UART:
3,284,321 UART: [state] CFI Enabled
3,294,919 UART: [fht] FMC Alias Private Key: 7
3,414,571 UART: [art] Extend RT PCRs Done
3,414,999 UART: [art] Lock RT PCRs Done
3,416,553 UART: [art] Populate DV Done
3,424,854 UART: [fht] FMC Alias Private Key: 7
3,425,812 UART: [art] Derive CDI
3,426,092 UART: [art] Store in slot 0x4
3,511,669 UART: [art] Derive Key Pair
3,512,029 UART: [art] Store priv key in slot 0x5
3,525,035 UART: [art] Derive Key Pair - Done
3,540,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,644 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,409 UART: [art] PUB.X = E15BDDD9EF02E46521DD854DEE281CA8BFE28B0EDC72686A8249452107F3A18120379805117410B93F774E7FDC4CF652
3,563,171 UART: [art] PUB.Y = 4F5B2DD8BCD3379602B8C24546B837A3A8671DE29FEE6A1E6595875BF6E8FA840511ACA671EB31DCDF50E965F7F60B6B
3,570,126 UART: [art] SIG.R = 6C88ABA6A302A0B32AD7D0DE2978FD2B152BDC20B2D07989AD108A47E3DF4CF33695EFC11471AA6F5BD1421543955029
3,576,903 UART: [art] SIG.S = A6A089D2B6CDD00C1135171198621C2B5DFA2BBAF317114FDB817405A038F5F68A09FCCA049C1B5A2DB5B255EFD6BA94
3,600,499 UART: Caliptra RT
3,600,750 UART: [state] CFI Enabled
3,720,428 UART: [rt] RT listening for mailbox commands...
3,721,098 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,292 UART: [rt]cmd =0x41544d4e, len=14344
5,002,987 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,041 UART: [state] LifecycleState = Unprovisioned
86,696 UART: [state] DebugLocked = No
87,356 UART: [state] WD Timer not started. Device not locked for debugging
88,475 UART: [kat] SHA2-256
892,025 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,129 UART: [kat] ++
896,281 UART: [kat] sha1
900,389 UART: [kat] SHA2-256
902,329 UART: [kat] SHA2-384
905,286 UART: [kat] SHA2-512-ACC
907,187 UART: [kat] ECC-384
917,078 UART: [kat] HMAC-384Kdf
921,886 UART: [kat] LMS
1,170,198 UART: [kat] --
1,171,113 UART: [cold-reset] ++
1,171,615 UART: [fht] FHT @ 0x50003400
1,174,301 UART: [idev] ++
1,174,469 UART: [idev] CDI.KEYID = 6
1,174,830 UART: [idev] SUBJECT.KEYID = 7
1,175,255 UART: [idev] UDS.KEYID = 0
1,175,601 ready_for_fw is high
1,175,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,432 UART: [idev] Erasing UDS.KEYID = 0
1,200,676 UART: [idev] Sha1 KeyId Algorithm
1,209,440 UART: [idev] --
1,210,295 UART: [ldev] ++
1,210,463 UART: [ldev] CDI.KEYID = 6
1,210,827 UART: [ldev] SUBJECT.KEYID = 5
1,211,254 UART: [ldev] AUTHORITY.KEYID = 7
1,211,717 UART: [ldev] FE.KEYID = 1
1,216,751 UART: [ldev] Erasing FE.KEYID = 1
1,243,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,285 UART: [ldev] --
1,282,622 UART: [fwproc] Wait for Commands...
1,283,395 UART: [fwproc] Recv command 0x46574c44
1,284,128 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,205,789 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,964 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,377,239 >>> mbox cmd response: success
3,378,495 UART: [afmc] ++
3,378,663 UART: [afmc] CDI.KEYID = 6
3,379,026 UART: [afmc] SUBJECT.KEYID = 7
3,379,452 UART: [afmc] AUTHORITY.KEYID = 5
3,415,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,085 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,792 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,669 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,379 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,071 UART: [afmc] --
3,459,088 UART: [cold-reset] --
3,459,808 UART: [state] Locking Datavault
3,460,751 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,355 UART: [state] Locking ICCM
3,461,843 UART: [exit] Launching FMC @ 0x40000130
3,467,173 UART:
3,467,189 UART: Running Caliptra FMC ...
3,467,597 UART:
3,467,740 UART: [state] CFI Enabled
3,478,374 UART: [fht] FMC Alias Private Key: 7
3,597,430 UART: [art] Extend RT PCRs Done
3,597,858 UART: [art] Lock RT PCRs Done
3,599,272 UART: [art] Populate DV Done
3,607,601 UART: [fht] FMC Alias Private Key: 7
3,608,623 UART: [art] Derive CDI
3,608,903 UART: [art] Store in slot 0x4
3,694,530 UART: [art] Derive Key Pair
3,694,890 UART: [art] Store priv key in slot 0x5
3,708,706 UART: [art] Derive Key Pair - Done
3,723,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,739,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,880 UART: [art] PUB.X = EFA2F06692A54B7B231EE85C354DE9E1F55A9291B6833C1CEB36166FAA060240E44394F79E7D8B9A19072756B70F3F61
3,746,640 UART: [art] PUB.Y = E7A7B4C83E0FCB5DC24E07301EC2B5CC30FE0223C08BA58D1BA4388B86A333711A4B52D9C40CD31B14BD92512AD5A070
3,753,592 UART: [art] SIG.R = 3EDAB1736D6E7B77ADE9A67B291DF067233ACD695024F4DD21CDD3A527E1750B6134E95D8AF6116B10EF3ACDBDDB0486
3,760,374 UART: [art] SIG.S = CCA659229259B5CF6F15CFECF8316A0C57D928D14B35DC7C0520C2ADB676947854317289FAF95EC4DE5B106D92C6E6C9
3,783,634 UART: Caliptra RT
3,783,977 UART: [state] CFI Enabled
3,905,005 UART: [rt] RT listening for mailbox commands...
3,905,675 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,763 UART: [rt]cmd =0x41544d4e, len=14344
5,198,436 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,329 ready_for_fw is high
1,059,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,192 >>> mbox cmd response: success
3,285,559 UART:
3,285,575 UART: Running Caliptra FMC ...
3,285,983 UART:
3,286,126 UART: [state] CFI Enabled
3,296,884 UART: [fht] FMC Alias Private Key: 7
3,415,832 UART: [art] Extend RT PCRs Done
3,416,260 UART: [art] Lock RT PCRs Done
3,417,850 UART: [art] Populate DV Done
3,426,257 UART: [fht] FMC Alias Private Key: 7
3,427,365 UART: [art] Derive CDI
3,427,645 UART: [art] Store in slot 0x4
3,513,350 UART: [art] Derive Key Pair
3,513,710 UART: [art] Store priv key in slot 0x5
3,526,700 UART: [art] Derive Key Pair - Done
3,541,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,574 UART: [art] PUB.X = C6F094E2A1BA1F7C3F6A3D24167563B3C4BD7DD2835C1DC9E63F8760044385977F2B5B230D1FA5A47642D973727E02DC
3,564,339 UART: [art] PUB.Y = 318F3FDF372AACC3C67FDA2ED9E69FE66F9D7F987DB407407B147B4B0DD4C2696553E6D1C29DECAB6846591CBA6AAE9D
3,571,307 UART: [art] SIG.R = B9598B58DE983B56292B5FE6573375F34C94A526D5EAC27DA4F1BF22407FDEF711F2FACE9312AE3DE6B43BDAFF929D4D
3,578,097 UART: [art] SIG.S = 96564954E58778054AE71C3975B063F1DAAE8BDA9820BF3C927AD321C722F932BF358046DAC3E9100EE2F09B056833AA
3,602,208 UART: Caliptra RT
3,602,551 UART: [state] CFI Enabled
3,722,158 UART: [rt] RT listening for mailbox commands...
3,722,828 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,774 UART: [rt]cmd =0x41544d4e, len=14344
5,002,474 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,512 UART: [state] LifecycleState = Unprovisioned
85,167 UART: [state] DebugLocked = No
85,717 UART: [state] WD Timer not started. Device not locked for debugging
87,022 UART: [kat] SHA2-256
892,672 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,797 UART: [kat] ++
896,949 UART: [kat] sha1
901,259 UART: [kat] SHA2-256
903,199 UART: [kat] SHA2-384
905,830 UART: [kat] SHA2-512-ACC
907,731 UART: [kat] ECC-384
917,368 UART: [kat] HMAC-384Kdf
921,952 UART: [kat] LMS
1,170,280 UART: [kat] --
1,171,371 UART: [cold-reset] ++
1,171,753 UART: [fht] FHT @ 0x50003400
1,174,622 UART: [idev] ++
1,174,790 UART: [idev] CDI.KEYID = 6
1,175,150 UART: [idev] SUBJECT.KEYID = 7
1,175,574 UART: [idev] UDS.KEYID = 0
1,175,919 ready_for_fw is high
1,175,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,702 UART: [idev] Erasing UDS.KEYID = 0
1,200,333 UART: [idev] Sha1 KeyId Algorithm
1,209,005 UART: [idev] --
1,209,959 UART: [ldev] ++
1,210,127 UART: [ldev] CDI.KEYID = 6
1,210,490 UART: [ldev] SUBJECT.KEYID = 5
1,210,916 UART: [ldev] AUTHORITY.KEYID = 7
1,211,379 UART: [ldev] FE.KEYID = 1
1,216,211 UART: [ldev] Erasing FE.KEYID = 1
1,242,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,467 UART: [ldev] --
1,281,850 UART: [fwproc] Wait for Commands...
1,282,430 UART: [fwproc] Recv command 0x46574c44
1,283,158 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,993 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,229,163 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,476 >>> mbox cmd response: success
3,370,622 UART: [afmc] ++
3,370,790 UART: [afmc] CDI.KEYID = 6
3,371,152 UART: [afmc] SUBJECT.KEYID = 7
3,371,577 UART: [afmc] AUTHORITY.KEYID = 5
3,406,884 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,839 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,429,545 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,435,424 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,441,134 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,448,735 UART: [afmc] --
3,449,685 UART: [cold-reset] --
3,450,459 UART: [state] Locking Datavault
3,451,660 UART: [state] Locking PCR0, PCR1 and PCR31
3,452,264 UART: [state] Locking ICCM
3,452,696 UART: [exit] Launching FMC @ 0x40000130
3,458,026 UART:
3,458,042 UART: Running Caliptra FMC ...
3,458,450 UART:
3,458,504 UART: [state] CFI Enabled
3,468,824 UART: [fht] FMC Alias Private Key: 7
3,588,178 UART: [art] Extend RT PCRs Done
3,588,606 UART: [art] Lock RT PCRs Done
3,589,920 UART: [art] Populate DV Done
3,598,519 UART: [fht] FMC Alias Private Key: 7
3,599,505 UART: [art] Derive CDI
3,599,785 UART: [art] Store in slot 0x4
3,685,566 UART: [art] Derive Key Pair
3,685,926 UART: [art] Store priv key in slot 0x5
3,698,998 UART: [art] Derive Key Pair - Done
3,713,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,456 UART: [art] PUB.X = A8D4EC2069F0C89C66DDD8B676C4F1B7BE26EEF8E946FE1E2CB09C2A10FE90704CDDE04C4786E1129785BFF63CBC8331
3,736,246 UART: [art] PUB.Y = FBC58570163524873CDB97B008BD90307CA99652836E34924A81A614E0BFD6F630A4280AFDFE9BF18341130A0E954CB3
3,743,184 UART: [art] SIG.R = D1A51E7559314FDF0AA99FF3534A0E57A90728BD7EA3124A3A704E55930700588B75C0A003ABDF151CFDD75895504FE0
3,749,921 UART: [art] SIG.S = 53823829323FF71288808B1C84015C2EBB78FA8C30AC9BA81245AF8B7CACC6835CC10BF013283F84F3F267BF567E4434
3,773,391 UART: Caliptra RT
3,773,642 UART: [state] CFI Enabled
3,893,154 UART: [rt] RT listening for mailbox commands...
3,893,824 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,816 UART: [rt]cmd =0x41544d4e, len=14344
5,183,524 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,907 ready_for_fw is high
1,058,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,419 >>> mbox cmd response: success
3,286,158 UART:
3,286,174 UART: Running Caliptra FMC ...
3,286,582 UART:
3,286,636 UART: [state] CFI Enabled
3,297,416 UART: [fht] FMC Alias Private Key: 7
3,416,470 UART: [art] Extend RT PCRs Done
3,416,898 UART: [art] Lock RT PCRs Done
3,418,680 UART: [art] Populate DV Done
3,426,829 UART: [fht] FMC Alias Private Key: 7
3,427,855 UART: [art] Derive CDI
3,428,135 UART: [art] Store in slot 0x4
3,513,850 UART: [art] Derive Key Pair
3,514,210 UART: [art] Store priv key in slot 0x5
3,527,132 UART: [art] Derive Key Pair - Done
3,541,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,557,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,945 UART: [art] PUB.X = 5C6B19D5FE8A7BED208C72262A9E2DD5300AAF1EA4BC4506262A9C1E212D09EA162CB2972AAD63632018D105B372671B
3,564,711 UART: [art] PUB.Y = DF627DEF2788D874085838AEDB42CC8296AAC99708E20AFC8BE61FD74973925FDA849C78300EB11B160F67865F464105
3,571,645 UART: [art] SIG.R = 15736036BF980F3D690431E47546406AD10D54F03631ADD6BEAEEA7BC980DEB568F063A49DD6A7FF83741F5FA6140622
3,578,407 UART: [art] SIG.S = C1219182364D710E2757FE7210DF052A569A804FF6575283D3879A146AB2C8EC7242665BC414603854AF5502358863DA
3,603,078 UART: Caliptra RT
3,603,329 UART: [state] CFI Enabled
3,722,937 UART: [rt] RT listening for mailbox commands...
3,723,607 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,531 UART: [rt]cmd =0x41544d4e, len=14344
5,016,584 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
893,449 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,574 UART: [kat] ++
897,726 UART: [kat] sha1
901,944 UART: [kat] SHA2-256
903,884 UART: [kat] SHA2-384
906,605 UART: [kat] SHA2-512-ACC
908,506 UART: [kat] ECC-384
918,407 UART: [kat] HMAC-384Kdf
923,073 UART: [kat] LMS
1,171,401 UART: [kat] --
1,172,304 UART: [cold-reset] ++
1,172,818 UART: [fht] FHT @ 0x50003400
1,175,339 UART: [idev] ++
1,175,507 UART: [idev] CDI.KEYID = 6
1,175,867 UART: [idev] SUBJECT.KEYID = 7
1,176,291 UART: [idev] UDS.KEYID = 0
1,176,636 ready_for_fw is high
1,176,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,515 UART: [idev] Erasing UDS.KEYID = 0
1,201,980 UART: [idev] Sha1 KeyId Algorithm
1,210,406 UART: [idev] --
1,211,542 UART: [ldev] ++
1,211,710 UART: [ldev] CDI.KEYID = 6
1,212,073 UART: [ldev] SUBJECT.KEYID = 5
1,212,499 UART: [ldev] AUTHORITY.KEYID = 7
1,212,962 UART: [ldev] FE.KEYID = 1
1,218,260 UART: [ldev] Erasing FE.KEYID = 1
1,244,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,434 UART: [ldev] --
1,283,749 UART: [fwproc] Wait for Commands...
1,284,431 UART: [fwproc] Recv command 0x46574c44
1,285,159 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,935 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,105 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,446 >>> mbox cmd response: success
3,369,588 UART: [afmc] ++
3,369,756 UART: [afmc] CDI.KEYID = 6
3,370,118 UART: [afmc] SUBJECT.KEYID = 7
3,370,543 UART: [afmc] AUTHORITY.KEYID = 5
3,406,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,422,615 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,363 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,429,069 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,434,948 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,440,658 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,448,365 UART: [afmc] --
3,449,275 UART: [cold-reset] --
3,450,103 UART: [state] Locking Datavault
3,451,402 UART: [state] Locking PCR0, PCR1 and PCR31
3,452,006 UART: [state] Locking ICCM
3,452,450 UART: [exit] Launching FMC @ 0x40000130
3,457,780 UART:
3,457,796 UART: Running Caliptra FMC ...
3,458,204 UART:
3,458,347 UART: [state] CFI Enabled
3,469,085 UART: [fht] FMC Alias Private Key: 7
3,587,731 UART: [art] Extend RT PCRs Done
3,588,159 UART: [art] Lock RT PCRs Done
3,589,641 UART: [art] Populate DV Done
3,597,680 UART: [fht] FMC Alias Private Key: 7
3,598,860 UART: [art] Derive CDI
3,599,140 UART: [art] Store in slot 0x4
3,684,877 UART: [art] Derive Key Pair
3,685,237 UART: [art] Store priv key in slot 0x5
3,698,683 UART: [art] Derive Key Pair - Done
3,713,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,100 UART: [art] PUB.X = DB5DF3DE4BC391095CFDE3D77B0CE0D4C6CB11EED8092687F9CFC3527357DF61469686054555C3986AB4DF131C7BB6A7
3,735,872 UART: [art] PUB.Y = 833CA220587BB13D3D4A00C722CC6D903879F09F49878012C5940DD80DDDCC5991FFFB334E1F5367D546752D42259D95
3,742,792 UART: [art] SIG.R = 9C35425D62F3DBB84A71344E9C1E6002C26E3392223E373D5352627A7F23BA3B96ABC749445A9B37F397A5CFB5C6403C
3,749,559 UART: [art] SIG.S = A150C369B50BAACD428D5DEA973CB46B0D7F08EFCB87F5D27A6217A93B460AD04028A0986F8A9F5EE24F0D27AB2061C7
3,773,428 UART: Caliptra RT
3,773,771 UART: [state] CFI Enabled
3,894,294 UART: [rt] RT listening for mailbox commands...
3,894,964 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,744 UART: [rt]cmd =0x41544d4e, len=14344
5,184,670 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,344 ready_for_fw is high
1,060,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,866 >>> mbox cmd response: success
3,280,423 UART:
3,280,439 UART: Running Caliptra FMC ...
3,280,847 UART:
3,280,990 UART: [state] CFI Enabled
3,291,482 UART: [fht] FMC Alias Private Key: 7
3,410,972 UART: [art] Extend RT PCRs Done
3,411,400 UART: [art] Lock RT PCRs Done
3,412,942 UART: [art] Populate DV Done
3,421,013 UART: [fht] FMC Alias Private Key: 7
3,422,045 UART: [art] Derive CDI
3,422,325 UART: [art] Store in slot 0x4
3,507,888 UART: [art] Derive Key Pair
3,508,248 UART: [art] Store priv key in slot 0x5
3,521,582 UART: [art] Derive Key Pair - Done
3,536,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,551,658 UART: [art] Erasing AUTHORITY.KEYID = 7
3,552,423 UART: [art] PUB.X = 77254358609F83FE65E5980B7E690B13C1F30889977A3CEC88EBF2F87AF62EF98C09D0972B158325D7B252480103178A
3,559,167 UART: [art] PUB.Y = 90EDE8BEB5F220227435431E9C16C2B6BB99BCAD97BEAEA0B6095C2B3B812980322B130258CF1108590A7BD0762C8D59
3,566,111 UART: [art] SIG.R = 8A3920E4CD5715DD52CA5F4876E6756A98109617348DA534E2381C52E21258973FEA377FE93DD95218163BE4CBCCECEF
3,572,885 UART: [art] SIG.S = 4DCF36108794B929A3C9B106D1C6319C98618FB96C205916EBE1FA21919401121DD7F3A3B5ECC99B48B1DA7260394C12
3,596,783 UART: Caliptra RT
3,597,126 UART: [state] CFI Enabled
3,716,978 UART: [rt] RT listening for mailbox commands...
3,717,648 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,794 UART: [rt]cmd =0x41544d4e, len=14344
5,000,305 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,123 UART:
192,512 UART: Running Caliptra ROM ...
193,631 UART:
193,785 UART: [state] CFI Enabled
266,471 UART: [state] LifecycleState = Unprovisioned
268,387 UART: [state] DebugLocked = No
270,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,362 UART: [kat] SHA2-256
446,064 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,631 UART: [kat] ++
457,085 UART: [kat] sha1
467,749 UART: [kat] SHA2-256
470,476 UART: [kat] SHA2-384
476,468 UART: [kat] SHA2-512-ACC
478,833 UART: [kat] ECC-384
2,768,667 UART: [kat] HMAC-384Kdf
2,779,270 UART: [kat] LMS
3,969,604 UART: [kat] --
3,974,881 UART: [cold-reset] ++
3,977,449 UART: [fht] Storing FHT @ 0x50003400
3,990,202 UART: [idev] ++
3,990,773 UART: [idev] CDI.KEYID = 6
3,991,806 UART: [idev] SUBJECT.KEYID = 7
3,992,981 UART: [idev] UDS.KEYID = 0
3,994,048 ready_for_fw is high
3,994,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,375 UART: [idev] Erasing UDS.KEYID = 0
7,326,284 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,430 UART: [idev] --
7,351,676 UART: [ldev] ++
7,352,301 UART: [ldev] CDI.KEYID = 6
7,353,313 UART: [ldev] SUBJECT.KEYID = 5
7,354,472 UART: [ldev] AUTHORITY.KEYID = 7
7,355,705 UART: [ldev] FE.KEYID = 1
7,401,377 UART: [ldev] Erasing FE.KEYID = 1
10,735,574 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,190 UART: [ldev] --
13,096,713 UART: [fwproc] Waiting for Commands...
13,099,998 UART: [fwproc] Received command 0x46574c44
13,102,178 UART: [fwproc] Received Image of size 118548 bytes
21,715,931 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,795,954 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,869,126 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,197,756 >>> mbox cmd response: success
22,201,079 UART: [afmc] ++
22,201,677 UART: [afmc] CDI.KEYID = 6
22,202,566 UART: [afmc] SUBJECT.KEYID = 7
22,203,884 UART: [afmc] AUTHORITY.KEYID = 5
25,574,675 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,872,650 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,874,875 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,889,445 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,904,178 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,918,557 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,940,391 UART: [afmc] --
27,943,389 UART: [cold-reset] --
27,947,357 UART: [state] Locking Datavault
27,951,093 UART: [state] Locking PCR0, PCR1 and PCR31
27,952,807 UART: [state] Locking ICCM
27,955,285 UART: [exit] Launching FMC @ 0x40000130
27,963,649 UART:
27,963,929 UART: Running Caliptra FMC ...
27,965,042 UART:
27,965,218 UART: [state] CFI Enabled
28,032,836 UART: [fht] FMC Alias Private Key: 7
30,394,135 UART: [art] Extend RT PCRs Done
30,395,372 UART: [art] Lock RT PCRs Done
30,396,975 UART: [art] Populate DV Done
30,402,240 UART: [fht] FMC Alias Private Key: 7
30,403,938 UART: [art] Derive CDI
30,404,672 UART: [art] Store in slot 0x4
30,462,254 UART: [art] Derive Key Pair
30,463,298 UART: [art] Store priv key in slot 0x5
33,756,167 UART: [art] Derive Key Pair - Done
33,769,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,057,301 UART: [art] Erasing AUTHORITY.KEYID = 7
36,058,818 UART: [art] PUB.X = D1B79F683D5D1CE9500CD8F671B1018BB36E418189E84DD872F684AE09219201C09AAA459F6DDDE5F3CDFE4E92632DA8
36,066,089 UART: [art] PUB.Y = 483E665B016113590F9F670CD66E307AFF11FA9AAA35229B11BD6464F84E24247DC76EC8A5A869376AEE59F59A6878C5
36,073,337 UART: [art] SIG.R = CC0EF871C217B4B12544FB22B54D998082A2C9E132C51F62031622C3C4C22EA63B24896117875D56C46DB4274D5FE181
36,080,701 UART: [art] SIG.S = FDA7DCF1F68F1CBEE310B121A07AE2CFB92F7E72B328D86D59551113C6AB3871F5C06EDB9B5383A08E24BD9FC3793578
37,386,612 UART: Caliptra RT
37,387,319 UART: [state] CFI Enabled
37,583,283 UART: [rt] RT listening for mailbox commands...
37,585,928 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,741,279 UART: [rt]cmd =0x41544d4e, len=14344
37,743,204 >>> mbox cmd response: failed
37,743,980 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,899,485 UART: [rt]cmd =0x41544d4e, len=14344
37,900,989 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,808,559 ready_for_fw is high
3,809,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,309,588 >>> mbox cmd response: success
28,005,639 UART:
28,006,059 UART: Running Caliptra FMC ...
28,007,222 UART:
28,007,389 UART: [state] CFI Enabled
28,074,263 UART: [fht] FMC Alias Private Key: 7
30,414,455 UART: [art] Extend RT PCRs Done
30,415,689 UART: [art] Lock RT PCRs Done
30,417,397 UART: [art] Populate DV Done
30,422,552 UART: [fht] FMC Alias Private Key: 7
30,424,262 UART: [art] Derive CDI
30,425,102 UART: [art] Store in slot 0x4
30,481,565 UART: [art] Derive Key Pair
30,482,605 UART: [art] Store priv key in slot 0x5
33,775,436 UART: [art] Derive Key Pair - Done
33,788,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,077,578 UART: [art] Erasing AUTHORITY.KEYID = 7
36,079,087 UART: [art] PUB.X = BB55645DA462A4355B12E78CD811E6AD574CF428E933747E114EB238F4BB2B88E06C0B133F9B69458EE56B9B2868448F
36,086,367 UART: [art] PUB.Y = 93ED8FBD060D41512659A3E0C03B3C60743E091E37E2E74E903D652755394E338C26BC489C4AEA0CEA35DE1EEE63295C
36,093,575 UART: [art] SIG.R = AD1AD852E43709E44619947EB18DC1DBF273379E5C198D771E3CB295A8787B4EFEE2B7E528E00D46321105BDD6082125
36,100,933 UART: [art] SIG.S = B358375C2AD648C5B2C4A84BD75F7D648FADD9C8D61E3D542FCECF0683D42180B95E10AA8049129913B3CE91EB4186C4
37,406,011 UART: Caliptra RT
37,406,725 UART: [state] CFI Enabled
37,585,296 UART: [rt] RT listening for mailbox commands...
37,587,930 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,743,468 UART: [rt]cmd =0x41544d4e, len=14344
37,745,223 >>> mbox cmd response: failed
37,745,979 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,901,189 UART: [rt]cmd =0x41544d4e, len=14344
37,903,002 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
192,569 UART:
192,945 UART: Running Caliptra ROM ...
194,129 UART:
603,644 UART: [state] CFI Enabled
618,117 UART: [state] LifecycleState = Unprovisioned
620,088 UART: [state] DebugLocked = No
622,759 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,120 UART: [kat] SHA2-256
796,859 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,377 UART: [kat] ++
807,819 UART: [kat] sha1
818,332 UART: [kat] SHA2-256
821,052 UART: [kat] SHA2-384
828,318 UART: [kat] SHA2-512-ACC
830,680 UART: [kat] ECC-384
3,114,891 UART: [kat] HMAC-384Kdf
3,127,860 UART: [kat] LMS
4,317,967 UART: [kat] --
4,322,975 UART: [cold-reset] ++
4,324,411 UART: [fht] Storing FHT @ 0x50003400
4,337,373 UART: [idev] ++
4,337,934 UART: [idev] CDI.KEYID = 6
4,338,910 UART: [idev] SUBJECT.KEYID = 7
4,340,145 UART: [idev] UDS.KEYID = 0
4,341,155 ready_for_fw is high
4,341,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,314 UART: [idev] Erasing UDS.KEYID = 0
7,626,376 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,605 UART: [idev] --
7,652,844 UART: [ldev] ++
7,653,472 UART: [ldev] CDI.KEYID = 6
7,654,377 UART: [ldev] SUBJECT.KEYID = 5
7,655,657 UART: [ldev] AUTHORITY.KEYID = 7
7,656,884 UART: [ldev] FE.KEYID = 1
7,668,224 UART: [ldev] Erasing FE.KEYID = 1
10,958,389 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,665 UART: [ldev] --
13,315,947 UART: [fwproc] Waiting for Commands...
13,318,092 UART: [fwproc] Received command 0x46574c44
13,320,277 UART: [fwproc] Received Image of size 118548 bytes
22,488,813 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,569,268 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,642,437 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,971,448 >>> mbox cmd response: success
22,975,022 UART: [afmc] ++
22,975,642 UART: [afmc] CDI.KEYID = 6
22,976,552 UART: [afmc] SUBJECT.KEYID = 7
22,977,819 UART: [afmc] AUTHORITY.KEYID = 5
26,295,111 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,590,620 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,592,932 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,607,368 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,622,202 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,636,590 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,658,017 UART: [afmc] --
28,661,121 UART: [cold-reset] --
28,665,354 UART: [state] Locking Datavault
28,670,655 UART: [state] Locking PCR0, PCR1 and PCR31
28,672,405 UART: [state] Locking ICCM
28,674,333 UART: [exit] Launching FMC @ 0x40000130
28,682,688 UART:
28,682,919 UART: Running Caliptra FMC ...
28,684,011 UART:
28,684,174 UART: [state] CFI Enabled
28,692,831 UART: [fht] FMC Alias Private Key: 7
31,033,201 UART: [art] Extend RT PCRs Done
31,034,428 UART: [art] Lock RT PCRs Done
31,036,080 UART: [art] Populate DV Done
31,041,491 UART: [fht] FMC Alias Private Key: 7
31,043,132 UART: [art] Derive CDI
31,043,865 UART: [art] Store in slot 0x4
31,086,343 UART: [art] Derive Key Pair
31,087,336 UART: [art] Store priv key in slot 0x5
34,329,503 UART: [art] Derive Key Pair - Done
34,342,655 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,622,991 UART: [art] Erasing AUTHORITY.KEYID = 7
36,624,517 UART: [art] PUB.X = F5CCB80A55883CE74226A25655F84CE802D07F8861ABF88C42D5F93D24D976D265F6B64CC82DE185287F20ED0A48BD51
36,631,770 UART: [art] PUB.Y = 3036252FDD0E97AE22300A0D7EDB0F7685A9460C849C7573160D677086B34C128F2A3F84BE74E0A85219D30A452C1613
36,638,960 UART: [art] SIG.R = 99DB8A9FA6AFFB60DD6F42CA385E2D33CD508A1476E911160C43DFDB7B10940857FAC50EBE8ADBCB8155B35A9F63B02C
36,646,406 UART: [art] SIG.S = E93599015D528AAAA707827FF157D88CF07C0E2978D8AB4B3C59C2250B068DA7E40904973F95E8810BF26A985BEC737A
37,951,901 UART: Caliptra RT
37,952,613 UART: [state] CFI Enabled
38,086,481 UART: [rt] RT listening for mailbox commands...
38,089,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,244,380 UART: [rt]cmd =0x41544d4e, len=14344
38,246,084 >>> mbox cmd response: failed
38,246,839 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,401,816 UART: [rt]cmd =0x41544d4e, len=14344
38,403,948 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
4,130,845 ready_for_fw is high
4,131,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,343,434 >>> mbox cmd response: success
27,982,493 UART:
27,982,913 UART: Running Caliptra FMC ...
27,984,025 UART:
27,984,193 UART: [state] CFI Enabled
27,991,996 UART: [fht] FMC Alias Private Key: 7
30,332,567 UART: [art] Extend RT PCRs Done
30,333,796 UART: [art] Lock RT PCRs Done
30,334,825 UART: [art] Populate DV Done
30,340,455 UART: [fht] FMC Alias Private Key: 7
30,342,033 UART: [art] Derive CDI
30,342,782 UART: [art] Store in slot 0x4
30,385,746 UART: [art] Derive Key Pair
30,386,744 UART: [art] Store priv key in slot 0x5
33,628,869 UART: [art] Derive Key Pair - Done
33,641,915 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,921,900 UART: [art] Erasing AUTHORITY.KEYID = 7
35,923,419 UART: [art] PUB.X = 41C4A31A7EA561F45B2241D723BFCA2BDDEB9139087B320E61A914503430C4FEF2B0B56854EBB1B91F01919CC9324736
35,930,674 UART: [art] PUB.Y = 88C7CAF4BB3B63A07447C83DD7DD0968588AC64FED81462CCCC42CF6F236946BA5CD8726CB7713A72D9B857A213E0332
35,937,969 UART: [art] SIG.R = ADD6CBD23E787FD34136986C980AC154C4F225F97A0DC4A928E09743EE4CAFE807BF12FD0C723D826940A4C07A0C716B
35,945,403 UART: [art] SIG.S = 5DABBBC07BCDC8C85F718875B4CF2086DA8FF54EF69AEA90D355354BD0FE4B04686E3AFED6DA0C64552BC3BFF8E2B571
37,250,365 UART: Caliptra RT
37,251,083 UART: [state] CFI Enabled
37,383,296 UART: [rt] RT listening for mailbox commands...
37,385,830 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,541,156 UART: [rt]cmd =0x41544d4e, len=14344
37,543,288 >>> mbox cmd response: failed
37,544,206 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,699,266 UART: [rt]cmd =0x41544d4e, len=14344
37,701,243 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,037 UART:
192,406 UART: Running Caliptra ROM ...
193,546 UART:
193,690 UART: [state] CFI Enabled
266,719 UART: [state] LifecycleState = Unprovisioned
268,654 UART: [state] DebugLocked = No
270,265 UART: [state] WD Timer not started. Device not locked for debugging
274,363 UART: [kat] SHA2-256
454,034 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,776 UART: [kat] ++
465,323 UART: [kat] sha1
477,119 UART: [kat] SHA2-256
479,845 UART: [kat] SHA2-384
485,972 UART: [kat] SHA2-512-ACC
488,332 UART: [kat] ECC-384
2,953,158 UART: [kat] HMAC-384Kdf
2,986,087 UART: [kat] LMS
3,462,565 UART: [kat] --
3,468,332 UART: [cold-reset] ++
3,470,681 UART: [fht] FHT @ 0x50003400
3,482,569 UART: [idev] ++
3,483,153 UART: [idev] CDI.KEYID = 6
3,484,183 UART: [idev] SUBJECT.KEYID = 7
3,485,354 UART: [idev] UDS.KEYID = 0
3,486,274 ready_for_fw is high
3,486,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,635,601 UART: [idev] Erasing UDS.KEYID = 0
6,002,729 UART: [idev] Sha1 KeyId Algorithm
6,025,560 UART: [idev] --
6,031,064 UART: [ldev] ++
6,031,650 UART: [ldev] CDI.KEYID = 6
6,032,537 UART: [ldev] SUBJECT.KEYID = 5
6,033,752 UART: [ldev] AUTHORITY.KEYID = 7
6,034,979 UART: [ldev] FE.KEYID = 1
6,073,553 UART: [ldev] Erasing FE.KEYID = 1
8,585,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,536 UART: [ldev] --
10,391,850 UART: [fwproc] Wait for Commands...
10,394,043 UART: [fwproc] Recv command 0x46574c44
10,396,028 UART: [fwproc] Recv'd Img size: 118548 bytes
14,930,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,019,700 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,092,723 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,421,793 >>> mbox cmd response: success
15,425,713 UART: [afmc] ++
15,426,320 UART: [afmc] CDI.KEYID = 6
15,427,204 UART: [afmc] SUBJECT.KEYID = 7
15,428,471 UART: [afmc] AUTHORITY.KEYID = 5
17,959,000 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,703,012 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,705,193 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,721,039 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,736,987 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,752,705 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,776,776 UART: [afmc] --
19,780,840 UART: [cold-reset] --
19,785,362 UART: [state] Locking Datavault
19,789,904 UART: [state] Locking PCR0, PCR1 and PCR31
19,791,651 UART: [state] Locking ICCM
19,793,847 UART: [exit] Launching FMC @ 0x40000130
19,802,239 UART:
19,802,471 UART: Running Caliptra FMC ...
19,803,566 UART:
19,803,724 UART: [state] CFI Enabled
19,859,111 UART: [fht] FMC Alias Private Key: 7
21,646,328 UART: [art] Extend RT PCRs Done
21,647,552 UART: [art] Lock RT PCRs Done
21,649,174 UART: [art] Populate DV Done
21,654,803 UART: [fht] FMC Alias Private Key: 7
21,656,446 UART: [art] Derive CDI
21,657,256 UART: [art] Store in slot 0x4
21,713,543 UART: [art] Derive Key Pair
21,714,583 UART: [art] Store priv key in slot 0x5
24,177,143 UART: [art] Derive Key Pair - Done
24,189,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,903,355 UART: [art] Erasing AUTHORITY.KEYID = 7
25,904,863 UART: [art] PUB.X = 09CD21722D0E8A6825C7241A35FD4CE00679A451911318BA0A04254D9A6C936704AF8AF298A9E1531280B033BD8D235F
25,912,111 UART: [art] PUB.Y = 278964DEF0CD306F6C27D0E952585300919DDA218FCD2AAC45A30BEED14DAFC74DF138F107023BD7FE1A4A4DF73AA54E
25,919,409 UART: [art] SIG.R = 98F22D74A4BBFDDDBB021D0284AE649DFC99E0C9AD722A8184B73CC780AC6B78D54BE1428F77A9B448A11A0AD71D36AE
25,926,803 UART: [art] SIG.S = 2791D8EE60643FB71A509D9F2EE554FD0A29D763CFC678C4F6BF6F1677A9C55602034997E4D9DA8211F21FB7CADACD46
26,906,038 UART: Caliptra RT
26,906,773 UART: [state] CFI Enabled
27,087,177 UART: [rt] RT listening for mailbox commands...
27,089,550 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,244,882 UART: [rt]cmd =0x41544d4e, len=14344
27,246,704 >>> mbox cmd response: failed
27,247,407 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,402,713 UART: [rt]cmd =0x41544d4e, len=14344
27,404,700 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
3,462,493 ready_for_fw is high
3,462,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,400,273 >>> mbox cmd response: success
19,691,170 UART:
19,691,909 UART: Running Caliptra FMC ...
19,693,027 UART:
19,693,242 UART: [state] CFI Enabled
19,759,033 UART: [fht] FMC Alias Private Key: 7
21,525,203 UART: [art] Extend RT PCRs Done
21,526,434 UART: [art] Lock RT PCRs Done
21,528,008 UART: [art] Populate DV Done
21,533,376 UART: [fht] FMC Alias Private Key: 7
21,535,022 UART: [art] Derive CDI
21,535,835 UART: [art] Store in slot 0x4
21,591,637 UART: [art] Derive Key Pair
21,592,677 UART: [art] Store priv key in slot 0x5
24,055,782 UART: [art] Derive Key Pair - Done
24,068,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,781,558 UART: [art] Erasing AUTHORITY.KEYID = 7
25,783,062 UART: [art] PUB.X = 48D82F826791FC36DAB20B63D159FD6F2D409D0B6D1E08F05824F817A4B367990F51D68FD4A61236AAEF4E5B1A89D165
25,790,311 UART: [art] PUB.Y = 457DE8F5BE25E19E81B7AB000B95041EF4AF95BA8E336E114AB81CD9AA1D25D6FDBD931EC77805CCBE8CF6F0525320AD
25,797,618 UART: [art] SIG.R = 73119E17AE28BBE0FCC07B019E8CBDBD2393229E4D01D4850E731373A02D5010CE11E959F0697FF8B403C8D59ACCAE13
25,805,022 UART: [art] SIG.S = AEC6A405CE59FDE442391C17683F45AAA33A47AA4AD794BB4EBC557ABD5C86A78934CEC77CD0F6B79465CB072587300A
26,783,679 UART: Caliptra RT
26,784,358 UART: [state] CFI Enabled
26,965,625 UART: [rt] RT listening for mailbox commands...
26,968,428 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,123,612 UART: [rt]cmd =0x41544d4e, len=14344
27,125,517 >>> mbox cmd response: failed
27,126,402 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,281,490 UART: [rt]cmd =0x41544d4e, len=14344
27,283,357 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,480 UART:
192,840 UART: Running Caliptra ROM ...
194,023 UART:
603,531 UART: [state] CFI Enabled
617,410 UART: [state] LifecycleState = Unprovisioned
619,352 UART: [state] DebugLocked = No
621,523 UART: [state] WD Timer not started. Device not locked for debugging
625,859 UART: [kat] SHA2-256
805,541 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,276 UART: [kat] ++
816,880 UART: [kat] sha1
828,156 UART: [kat] SHA2-256
830,843 UART: [kat] SHA2-384
836,697 UART: [kat] SHA2-512-ACC
839,064 UART: [kat] ECC-384
3,283,381 UART: [kat] HMAC-384Kdf
3,297,173 UART: [kat] LMS
3,773,687 UART: [kat] --
3,778,535 UART: [cold-reset] ++
3,780,040 UART: [fht] FHT @ 0x50003400
3,791,389 UART: [idev] ++
3,791,998 UART: [idev] CDI.KEYID = 6
3,792,922 UART: [idev] SUBJECT.KEYID = 7
3,794,172 UART: [idev] UDS.KEYID = 0
3,795,099 ready_for_fw is high
3,795,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,046 UART: [idev] Erasing UDS.KEYID = 0
6,269,413 UART: [idev] Sha1 KeyId Algorithm
6,293,286 UART: [idev] --
6,297,819 UART: [ldev] ++
6,298,445 UART: [ldev] CDI.KEYID = 6
6,299,357 UART: [ldev] SUBJECT.KEYID = 5
6,300,570 UART: [ldev] AUTHORITY.KEYID = 7
6,301,801 UART: [ldev] FE.KEYID = 1
6,309,967 UART: [ldev] Erasing FE.KEYID = 1
8,790,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,679 UART: [ldev] --
10,585,730 UART: [fwproc] Wait for Commands...
10,588,682 UART: [fwproc] Recv command 0x46574c44
10,590,753 UART: [fwproc] Recv'd Img size: 118548 bytes
15,142,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,226,857 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,299,830 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,628,207 >>> mbox cmd response: success
15,632,436 UART: [afmc] ++
15,633,036 UART: [afmc] CDI.KEYID = 6
15,633,960 UART: [afmc] SUBJECT.KEYID = 7
15,635,181 UART: [afmc] AUTHORITY.KEYID = 5
18,140,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,864,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,866,271 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,882,146 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,898,071 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,913,763 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,937,753 UART: [afmc] --
19,940,723 UART: [cold-reset] --
19,944,049 UART: [state] Locking Datavault
19,948,422 UART: [state] Locking PCR0, PCR1 and PCR31
19,950,225 UART: [state] Locking ICCM
19,951,628 UART: [exit] Launching FMC @ 0x40000130
19,960,088 UART:
19,960,340 UART: Running Caliptra FMC ...
19,961,443 UART:
19,961,606 UART: [state] CFI Enabled
19,969,711 UART: [fht] FMC Alias Private Key: 7
21,736,496 UART: [art] Extend RT PCRs Done
21,737,688 UART: [art] Lock RT PCRs Done
21,739,018 UART: [art] Populate DV Done
21,744,601 UART: [fht] FMC Alias Private Key: 7
21,746,191 UART: [art] Derive CDI
21,747,006 UART: [art] Store in slot 0x4
21,789,855 UART: [art] Derive Key Pair
21,790,909 UART: [art] Store priv key in slot 0x5
24,217,423 UART: [art] Derive Key Pair - Done
24,230,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,936,694 UART: [art] Erasing AUTHORITY.KEYID = 7
25,938,185 UART: [art] PUB.X = A2057C91D8A11F8D8124452035C12A5903D880B71B8EF355D69E3AFD8426AD84C0DBF2C44D6790F1703F19C80ECCC632
25,945,466 UART: [art] PUB.Y = 557EC2897A61E819EBADFEBE998228F339ADD39AD43280C7B41D75352982AF0B6E282BFFD051FA416BBC7465C2C7BEB8
25,952,764 UART: [art] SIG.R = 5223C2AB1DED10F8490CCDC16E80DC3A860B969F4D3BA7FF8FA833F489991A2560464186474E2C7CDCB4FE15B88CCB07
25,960,178 UART: [art] SIG.S = 1EAAF228CD7EC38AEE47E7DD6147C21D5A1F274C817038FCA9E500EED4D278F3C6C3890ED79DA8462E5E46B2DBD7BC5C
26,938,567 UART: Caliptra RT
26,939,260 UART: [state] CFI Enabled
27,071,562 UART: [rt] RT listening for mailbox commands...
27,073,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,229,127 UART: [rt]cmd =0x41544d4e, len=14344
27,231,110 >>> mbox cmd response: failed
27,231,830 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,387,150 UART: [rt]cmd =0x41544d4e, len=14344
27,389,028 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,781,400 ready_for_fw is high
3,782,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,605,387 >>> mbox cmd response: success
19,853,683 UART:
19,854,079 UART: Running Caliptra FMC ...
19,855,289 UART:
19,855,467 UART: [state] CFI Enabled
19,863,304 UART: [fht] FMC Alias Private Key: 7
21,629,972 UART: [art] Extend RT PCRs Done
21,631,197 UART: [art] Lock RT PCRs Done
21,633,117 UART: [art] Populate DV Done
21,638,484 UART: [fht] FMC Alias Private Key: 7
21,639,981 UART: [art] Derive CDI
21,640,747 UART: [art] Store in slot 0x4
21,683,829 UART: [art] Derive Key Pair
21,684,829 UART: [art] Store priv key in slot 0x5
24,112,012 UART: [art] Derive Key Pair - Done
24,124,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,830,991 UART: [art] Erasing AUTHORITY.KEYID = 7
25,832,512 UART: [art] PUB.X = B27FDDCACB394DE63C31024D586A092D4426D5A97BA21EC2F4E4797FB69D634C82DAD430359CFA0224D5FF1A2FFAB7CF
25,839,772 UART: [art] PUB.Y = 104B93C31D47E084B0CAE2B1C2A7071F521FC04366D5167B89D133478940383166E957535A9F42366D26F5C13B12924C
25,847,165 UART: [art] SIG.R = CB8BFD6125F56AB3C38F1BA55A5E05F3B87F64A760C9DB6866E7629124C69512E3DCCEFF4CC568725592A1983E10E909
25,854,419 UART: [art] SIG.S = 4CE32A21586883D6D801D40126A081AA85CBD21DC3D05449940EFED605AE6445CC05C719CB8EE9039111A55969DDFD09
26,833,295 UART: Caliptra RT
26,833,995 UART: [state] CFI Enabled
26,966,943 UART: [rt] RT listening for mailbox commands...
26,969,607 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,124,806 UART: [rt]cmd =0x41544d4e, len=14344
27,126,559 >>> mbox cmd response: failed
27,127,457 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,282,585 UART: [rt]cmd =0x41544d4e, len=14344
27,284,557 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
192,034 UART:
192,401 UART: Running Caliptra ROM ...
193,532 UART:
193,682 UART: [state] CFI Enabled
265,249 UART: [state] LifecycleState = Unprovisioned
267,589 UART: [state] DebugLocked = No
269,552 UART: [state] WD Timer not started. Device not locked for debugging
274,522 UART: [kat] SHA2-256
464,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,169 UART: [kat] ++
475,719 UART: [kat] sha1
486,032 UART: [kat] SHA2-256
489,069 UART: [kat] SHA2-384
494,606 UART: [kat] SHA2-512-ACC
497,262 UART: [kat] ECC-384
2,951,082 UART: [kat] HMAC-384Kdf
2,973,357 UART: [kat] LMS
3,505,141 UART: [kat] --
3,510,121 UART: [cold-reset] ++
3,511,549 UART: [fht] FHT @ 0x50003400
3,521,453 UART: [idev] ++
3,522,152 UART: [idev] CDI.KEYID = 6
3,523,107 UART: [idev] SUBJECT.KEYID = 7
3,524,350 UART: [idev] UDS.KEYID = 0
3,525,273 ready_for_fw is high
3,525,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,544 UART: [idev] Erasing UDS.KEYID = 0
6,031,923 UART: [idev] Sha1 KeyId Algorithm
6,054,779 UART: [idev] --
6,059,534 UART: [ldev] ++
6,060,271 UART: [ldev] CDI.KEYID = 6
6,061,181 UART: [ldev] SUBJECT.KEYID = 5
6,062,339 UART: [ldev] AUTHORITY.KEYID = 7
6,063,567 UART: [ldev] FE.KEYID = 1
6,102,577 UART: [ldev] Erasing FE.KEYID = 1
8,612,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,424 UART: [ldev] --
10,417,644 UART: [fwproc] Wait for Commands...
10,419,443 UART: [fwproc] Recv command 0x46574c44
10,421,755 UART: [fwproc] Recv'd Img size: 118548 bytes
15,115,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,200,816 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,324,418 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,884,089 >>> mbox cmd response: success
15,888,109 UART: [afmc] ++
15,888,834 UART: [afmc] CDI.KEYID = 6
15,890,034 UART: [afmc] SUBJECT.KEYID = 7
15,891,476 UART: [afmc] AUTHORITY.KEYID = 5
18,429,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,155,427 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,157,296 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,172,408 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,187,624 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,202,637 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,227,209 UART: [afmc] --
20,230,373 UART: [cold-reset] --
20,233,589 UART: [state] Locking Datavault
20,239,390 UART: [state] Locking PCR0, PCR1 and PCR31
20,241,587 UART: [state] Locking ICCM
20,242,627 UART: [exit] Launching FMC @ 0x40000130
20,251,303 UART:
20,251,575 UART: Running Caliptra FMC ...
20,252,602 UART:
20,252,749 UART: [state] CFI Enabled
20,311,000 UART: [fht] FMC Alias Private Key: 7
22,077,264 UART: [art] Extend RT PCRs Done
22,078,489 UART: [art] Lock RT PCRs Done
22,079,954 UART: [art] Populate DV Done
22,085,475 UART: [fht] FMC Alias Private Key: 7
22,087,065 UART: [art] Derive CDI
22,087,900 UART: [art] Store in slot 0x4
22,143,674 UART: [art] Derive Key Pair
22,144,691 UART: [art] Store priv key in slot 0x5
24,607,630 UART: [art] Derive Key Pair - Done
24,620,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,332,011 UART: [art] Erasing AUTHORITY.KEYID = 7
26,333,518 UART: [art] PUB.X = D2D21546C57D4F109F13BD6B9EB3AB6487248D802B29EEACCC30F32E5D636E5C28EB558891811ACFE7B254F567524531
26,340,796 UART: [art] PUB.Y = B322BC7EA2BDA6321EC9150CC22158BF8FEF9E61232045A145C265F55237C617730B759C3D367A985DDEE9F1ED811B96
26,348,067 UART: [art] SIG.R = 00DD249F4600C5ABDB4C41FA03D402A135507BCD14C806AE855411AF08D9350D1C1051B79B969BA36AB6BA18BF253E6E
26,355,389 UART: [art] SIG.S = 288DB5191CC95FA690BDB634781C1C01A98257175D4AE55CC9CD06B2856913255FCDB7BFB870A3B2597DAD5B18F8867F
27,334,201 UART: Caliptra RT
27,334,915 UART: [state] CFI Enabled
27,514,783 UART: [rt] RT listening for mailbox commands...
27,517,365 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,672,769 UART: [rt]cmd =0x41544d4e, len=14344
27,674,692 >>> mbox cmd response: failed
27,675,488 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,830,628 UART: [rt]cmd =0x41544d4e, len=14344
27,832,430 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,440,381 ready_for_fw is high
3,440,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,969,352 >>> mbox cmd response: success
20,264,209 UART:
20,264,613 UART: Running Caliptra FMC ...
20,265,770 UART:
20,265,931 UART: [state] CFI Enabled
20,330,163 UART: [fht] FMC Alias Private Key: 7
22,096,503 UART: [art] Extend RT PCRs Done
22,097,731 UART: [art] Lock RT PCRs Done
22,099,465 UART: [art] Populate DV Done
22,104,777 UART: [fht] FMC Alias Private Key: 7
22,106,372 UART: [art] Derive CDI
22,107,187 UART: [art] Store in slot 0x4
22,163,152 UART: [art] Derive Key Pair
22,164,192 UART: [art] Store priv key in slot 0x5
24,627,231 UART: [art] Derive Key Pair - Done
24,640,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,353,140 UART: [art] Erasing AUTHORITY.KEYID = 7
26,354,645 UART: [art] PUB.X = E4EDD518D9B28AAE9E195EDE0107744ADA011828D106CF49A235A5C3B295640CA96A9DA358B65D498DDFC1CAF0373D80
26,361,929 UART: [art] PUB.Y = B55F1F48DBB980A753B3B694D86322505FD434D58A90BBA571DD1A50566BA2502E44FC1D6A315C56456DCF494408897A
26,369,155 UART: [art] SIG.R = FF53DE52B32872659688DB8C50AA1022CDB224EDAA6FB2CEF3D0020E4A28DC96257C13A2130DA5F17A2A6742DC62EA2A
26,376,572 UART: [art] SIG.S = D2DBF2E8D981D18BA81769AB9C10452A5CA9E7F1F62587C30EA11CD7CF894D2D8B65D446D56E551F4B3E8C75D89C0D82
27,355,781 UART: Caliptra RT
27,356,495 UART: [state] CFI Enabled
27,536,984 UART: [rt] RT listening for mailbox commands...
27,539,561 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,694,883 UART: [rt]cmd =0x41544d4e, len=14344
27,696,585 >>> mbox cmd response: failed
27,697,322 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,852,417 UART: [rt]cmd =0x41544d4e, len=14344
27,854,117 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
192,408 UART:
192,779 UART: Running Caliptra ROM ...
193,982 UART:
603,440 UART: [state] CFI Enabled
613,926 UART: [state] LifecycleState = Unprovisioned
616,311 UART: [state] DebugLocked = No
618,008 UART: [state] WD Timer not started. Device not locked for debugging
623,353 UART: [kat] SHA2-256
813,258 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,071 UART: [kat] ++
824,529 UART: [kat] sha1
835,552 UART: [kat] SHA2-256
838,570 UART: [kat] SHA2-384
843,925 UART: [kat] SHA2-512-ACC
846,512 UART: [kat] ECC-384
3,288,757 UART: [kat] HMAC-384Kdf
3,301,428 UART: [kat] LMS
3,833,258 UART: [kat] --
3,838,040 UART: [cold-reset] ++
3,839,053 UART: [fht] FHT @ 0x50003400
3,851,246 UART: [idev] ++
3,851,957 UART: [idev] CDI.KEYID = 6
3,852,958 UART: [idev] SUBJECT.KEYID = 7
3,854,133 UART: [idev] UDS.KEYID = 0
3,855,065 ready_for_fw is high
3,855,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,133 UART: [idev] Erasing UDS.KEYID = 0
6,327,976 UART: [idev] Sha1 KeyId Algorithm
6,350,171 UART: [idev] --
6,355,106 UART: [ldev] ++
6,355,847 UART: [ldev] CDI.KEYID = 6
6,356,761 UART: [ldev] SUBJECT.KEYID = 5
6,357,920 UART: [ldev] AUTHORITY.KEYID = 7
6,359,150 UART: [ldev] FE.KEYID = 1
6,370,663 UART: [ldev] Erasing FE.KEYID = 1
8,849,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,383 UART: [ldev] --
10,642,512 UART: [fwproc] Wait for Commands...
10,645,255 UART: [fwproc] Recv command 0x46574c44
10,647,563 UART: [fwproc] Recv'd Img size: 118548 bytes
15,332,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,412,866 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,536,467 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,096,254 >>> mbox cmd response: success
16,100,529 UART: [afmc] ++
16,101,268 UART: [afmc] CDI.KEYID = 6
16,102,467 UART: [afmc] SUBJECT.KEYID = 7
16,104,022 UART: [afmc] AUTHORITY.KEYID = 5
18,609,345 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,330,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,332,631 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,347,753 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,362,967 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,377,988 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,400,558 UART: [afmc] --
20,404,048 UART: [cold-reset] --
20,409,217 UART: [state] Locking Datavault
20,414,972 UART: [state] Locking PCR0, PCR1 and PCR31
20,417,136 UART: [state] Locking ICCM
20,418,644 UART: [exit] Launching FMC @ 0x40000130
20,427,284 UART:
20,427,560 UART: Running Caliptra FMC ...
20,428,598 UART:
20,428,751 UART: [state] CFI Enabled
20,437,402 UART: [fht] FMC Alias Private Key: 7
22,203,658 UART: [art] Extend RT PCRs Done
22,204,897 UART: [art] Lock RT PCRs Done
22,206,389 UART: [art] Populate DV Done
22,211,917 UART: [fht] FMC Alias Private Key: 7
22,213,508 UART: [art] Derive CDI
22,214,246 UART: [art] Store in slot 0x4
22,257,432 UART: [art] Derive Key Pair
22,258,438 UART: [art] Store priv key in slot 0x5
24,685,024 UART: [art] Derive Key Pair - Done
24,697,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,404,173 UART: [art] Erasing AUTHORITY.KEYID = 7
26,405,678 UART: [art] PUB.X = 55581E8BEC40733415CE9FA6DDF032B8271BB016E88582446CBA398569081FB9141D7AE665D9C4F66F1FCB9393536628
26,412,895 UART: [art] PUB.Y = 594EC1C6E55CB58A5504E89E6A896B866B2BA8DA0FE81A4B0B36F13F99A6DF8DE0458A627CD07995150F42FEA615C1B2
26,420,205 UART: [art] SIG.R = F5B586EAB53DD619E0D06CEA81A82C307F2C372A48C5336461103BB81ACD05043B3008A321DBE5CF34890A4EE19B14E3
26,427,603 UART: [art] SIG.S = 89BB5A8647A55448C0FE28C7AFAA6541DC1D63580A1AC231E5BF32000F1DA46559EE580380B5FD97E361E6F6B958F458
27,406,623 UART: Caliptra RT
27,407,324 UART: [state] CFI Enabled
27,540,183 UART: [rt] RT listening for mailbox commands...
27,542,558 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,697,730 UART: [rt]cmd =0x41544d4e, len=14344
27,699,604 >>> mbox cmd response: failed
27,700,340 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,855,571 UART: [rt]cmd =0x41544d4e, len=14344
27,857,230 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,757,105 ready_for_fw is high
3,757,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,141,242 >>> mbox cmd response: success
20,399,862 UART:
20,400,268 UART: Running Caliptra FMC ...
20,401,464 UART:
20,401,636 UART: [state] CFI Enabled
20,409,586 UART: [fht] FMC Alias Private Key: 7
22,175,754 UART: [art] Extend RT PCRs Done
22,176,968 UART: [art] Lock RT PCRs Done
22,178,762 UART: [art] Populate DV Done
22,184,294 UART: [fht] FMC Alias Private Key: 7
22,185,893 UART: [art] Derive CDI
22,186,730 UART: [art] Store in slot 0x4
22,229,442 UART: [art] Derive Key Pair
22,230,491 UART: [art] Store priv key in slot 0x5
24,657,167 UART: [art] Derive Key Pair - Done
24,670,283 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,376,659 UART: [art] Erasing AUTHORITY.KEYID = 7
26,378,169 UART: [art] PUB.X = D921DC43F87623DCE5AEEB7635FC4990423B9FADA947A034F528C3F11CE39538039BBAF7EAF90020688761409D3B99DF
26,385,421 UART: [art] PUB.Y = 1012F9EB677A16CCC32CB01D1C50EC47DE78C8A6539DA22233458006BFCCA010EA0DCE3DF606652420FC2936B584F257
26,392,724 UART: [art] SIG.R = 6D3AE1078E82EE41E33DCC9BED2121B6B67D2D48092A81398A7929F7DBDF537CDB8CD26C1B7BF9F1792C30CF4FD676CF
26,400,140 UART: [art] SIG.S = E339BF242493A15718068FF7458F8C9D1415B7CC13D8CAAC08FA78B43884419A62A6623F87166637CF4DE567D7F7F251
27,378,430 UART: Caliptra RT
27,379,124 UART: [state] CFI Enabled
27,511,480 UART: [rt] RT listening for mailbox commands...
27,514,112 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,669,612 UART: [rt]cmd =0x41544d4e, len=14344
27,671,547 >>> mbox cmd response: failed
27,672,282 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,827,648 UART: [rt]cmd =0x41544d4e, len=14344
27,829,357 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,869 UART: [kat] SHA2-256
881,800 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,915 UART: [kat] ++
886,067 UART: [kat] sha1
890,241 UART: [kat] SHA2-256
892,179 UART: [kat] SHA2-384
894,936 UART: [kat] SHA2-512-ACC
896,837 UART: [kat] ECC-384
902,178 UART: [kat] HMAC-384Kdf
906,904 UART: [kat] LMS
1,475,100 UART: [kat] --
1,475,885 UART: [cold-reset] ++
1,476,309 UART: [fht] Storing FHT @ 0x50003400
1,479,320 UART: [idev] ++
1,479,488 UART: [idev] CDI.KEYID = 6
1,479,848 UART: [idev] SUBJECT.KEYID = 7
1,480,272 UART: [idev] UDS.KEYID = 0
1,480,617 ready_for_fw is high
1,480,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,118 UART: [idev] Erasing UDS.KEYID = 0
1,504,892 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,684 UART: [idev] --
1,514,563 UART: [ldev] ++
1,514,731 UART: [ldev] CDI.KEYID = 6
1,515,094 UART: [ldev] SUBJECT.KEYID = 5
1,515,520 UART: [ldev] AUTHORITY.KEYID = 7
1,515,983 UART: [ldev] FE.KEYID = 1
1,521,267 UART: [ldev] Erasing FE.KEYID = 1
1,546,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,712 UART: [ldev] --
1,586,163 UART: [fwproc] Waiting for Commands...
1,587,002 UART: [fwproc] Received command 0x46574c44
1,587,793 UART: [fwproc] Received Image of size 118548 bytes
5,168,420 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,195,968 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,227,186 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,367,469 >>> mbox cmd response: success
5,368,661 UART: [afmc] ++
5,368,829 UART: [afmc] CDI.KEYID = 6
5,369,191 UART: [afmc] SUBJECT.KEYID = 7
5,369,616 UART: [afmc] AUTHORITY.KEYID = 5
5,404,587 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,420,619 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,421,399 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,427,105 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,432,984 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,438,697 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,446,558 UART: [afmc] --
5,447,480 UART: [cold-reset] --
5,448,138 UART: [state] Locking Datavault
5,449,367 UART: [state] Locking PCR0, PCR1 and PCR31
5,449,971 UART: [state] Locking ICCM
5,450,419 UART: [exit] Launching FMC @ 0x40000130
5,455,749 UART:
5,455,765 UART: Running Caliptra FMC ...
5,456,173 UART:
5,456,227 UART: [state] CFI Enabled
5,466,837 UART: [fht] FMC Alias Private Key: 7
5,585,165 UART: [art] Extend RT PCRs Done
5,585,593 UART: [art] Lock RT PCRs Done
5,587,107 UART: [art] Populate DV Done
5,595,282 UART: [fht] FMC Alias Private Key: 7
5,596,288 UART: [art] Derive CDI
5,596,568 UART: [art] Store in slot 0x4
5,682,718 UART: [art] Derive Key Pair
5,683,078 UART: [art] Store priv key in slot 0x5
5,696,291 UART: [art] Derive Key Pair - Done
5,711,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,726,400 UART: [art] Erasing AUTHORITY.KEYID = 7
5,727,165 UART: [art] PUB.X = AE41BA04C7EC00188CCD591AAABA61B1A5D0B05620769767C79F5AA5F15815999A4E87000D62862738F026C2BB10B039
5,733,887 UART: [art] PUB.Y = F90A0269F12A2F3E472B410EC3277E34DDA3C8360A3DE6C69D1FF272520E49B50F7FA8C26E31C2C24CFC2D5C8ABC97A4
5,740,835 UART: [art] SIG.R = 6767D9E140EA5035AF8D2DD29336FB2E8ED3084F22B078DBB5C86C0488E5C4C40B25816A47201095C0EE6EB23B04323C
5,747,597 UART: [art] SIG.S = FDC59C5DA8C1B4F48B4E4E4A1DA158E98B86B1575FF0E51A7EFED7C505640862ED30F818AB0D0212EFE87A0D6567C8AE
5,770,726 UART: Caliptra RT
5,770,977 UART: [state] CFI Enabled
5,891,313 UART: [rt] RT listening for mailbox commands...
5,891,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,014,829 UART: [rt]cmd =0x41544d4e, len=14344
6,016,234 >>> mbox cmd response: failed
6,016,234 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,138,722 UART: [rt]cmd =0x41544d4e, len=14344
6,140,039 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,599 ready_for_fw is high
1,362,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,254,352 >>> mbox cmd response: success
5,315,551 UART:
5,315,567 UART: Running Caliptra FMC ...
5,315,975 UART:
5,316,029 UART: [state] CFI Enabled
5,326,743 UART: [fht] FMC Alias Private Key: 7
5,445,361 UART: [art] Extend RT PCRs Done
5,445,789 UART: [art] Lock RT PCRs Done
5,447,337 UART: [art] Populate DV Done
5,455,452 UART: [fht] FMC Alias Private Key: 7
5,456,396 UART: [art] Derive CDI
5,456,676 UART: [art] Store in slot 0x4
5,542,330 UART: [art] Derive Key Pair
5,542,690 UART: [art] Store priv key in slot 0x5
5,555,919 UART: [art] Derive Key Pair - Done
5,570,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,585,823 UART: [art] Erasing AUTHORITY.KEYID = 7
5,586,588 UART: [art] PUB.X = A901DE06FB748314BD8792E9FEC7EA9DC43513758CE8E3D86BDBCAC76DF6BF0069A5CF8BA3EBF6870F48B56BA0D4BEDE
5,593,357 UART: [art] PUB.Y = 3BE3AD46534BA8A172C6F8A2DA71774FFBB6DB01CED6F46A7DB1BF1B16B844BC58F2B19C0B536A685CE7EAECF03694D8
5,600,327 UART: [art] SIG.R = 784921C5AEBD8BF45C4CC1C0160CEEA5C053EA49064807317E7CA6927C685E09FE46F3283D97F296C13F5C6AE7C53C02
5,607,090 UART: [art] SIG.S = 79AA87E508882284F93E984B640C51EE964B9E0CD3D5C4E195114DEED4FEA22C7A894734D90E01B9A1627B8AB94B0A29
5,630,726 UART: Caliptra RT
5,630,977 UART: [state] CFI Enabled
5,751,748 UART: [rt] RT listening for mailbox commands...
5,752,418 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,875,358 UART: [rt]cmd =0x41544d4e, len=14344
5,877,177 >>> mbox cmd response: failed
5,877,177 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,999,687 UART: [rt]cmd =0x41544d4e, len=14344
6,001,028 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
87,112 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,618 UART: [kat] SHA2-256
882,549 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,664 UART: [kat] ++
886,816 UART: [kat] sha1
890,928 UART: [kat] SHA2-256
892,866 UART: [kat] SHA2-384
895,553 UART: [kat] SHA2-512-ACC
897,454 UART: [kat] ECC-384
902,963 UART: [kat] HMAC-384Kdf
907,579 UART: [kat] LMS
1,475,775 UART: [kat] --
1,476,550 UART: [cold-reset] ++
1,476,920 UART: [fht] Storing FHT @ 0x50003400
1,479,633 UART: [idev] ++
1,479,801 UART: [idev] CDI.KEYID = 6
1,480,161 UART: [idev] SUBJECT.KEYID = 7
1,480,585 UART: [idev] UDS.KEYID = 0
1,480,930 ready_for_fw is high
1,480,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,527 UART: [idev] Erasing UDS.KEYID = 0
1,504,803 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,521 UART: [idev] --
1,514,584 UART: [ldev] ++
1,514,752 UART: [ldev] CDI.KEYID = 6
1,515,115 UART: [ldev] SUBJECT.KEYID = 5
1,515,541 UART: [ldev] AUTHORITY.KEYID = 7
1,516,004 UART: [ldev] FE.KEYID = 1
1,521,450 UART: [ldev] Erasing FE.KEYID = 1
1,546,443 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,319 UART: [ldev] --
1,585,798 UART: [fwproc] Waiting for Commands...
1,586,469 UART: [fwproc] Received command 0x46574c44
1,587,260 UART: [fwproc] Received Image of size 118548 bytes
5,167,369 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,194,809 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,226,027 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,366,294 >>> mbox cmd response: success
5,367,316 UART: [afmc] ++
5,367,484 UART: [afmc] CDI.KEYID = 6
5,367,846 UART: [afmc] SUBJECT.KEYID = 7
5,368,271 UART: [afmc] AUTHORITY.KEYID = 5
5,403,398 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,419,872 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,420,652 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,426,358 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,432,237 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,437,950 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,445,707 UART: [afmc] --
5,446,601 UART: [cold-reset] --
5,447,369 UART: [state] Locking Datavault
5,448,412 UART: [state] Locking PCR0, PCR1 and PCR31
5,449,016 UART: [state] Locking ICCM
5,449,592 UART: [exit] Launching FMC @ 0x40000130
5,454,922 UART:
5,454,938 UART: Running Caliptra FMC ...
5,455,346 UART:
5,455,489 UART: [state] CFI Enabled
5,466,311 UART: [fht] FMC Alias Private Key: 7
5,585,585 UART: [art] Extend RT PCRs Done
5,586,013 UART: [art] Lock RT PCRs Done
5,587,333 UART: [art] Populate DV Done
5,595,608 UART: [fht] FMC Alias Private Key: 7
5,596,738 UART: [art] Derive CDI
5,597,018 UART: [art] Store in slot 0x4
5,683,276 UART: [art] Derive Key Pair
5,683,636 UART: [art] Store priv key in slot 0x5
5,696,909 UART: [art] Derive Key Pair - Done
5,711,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,726,778 UART: [art] Erasing AUTHORITY.KEYID = 7
5,727,543 UART: [art] PUB.X = 729A5D3ECB2F0121606A5AD028D5C0B6808EEB86A0B704256F57953A22E17990E28A0D3CCD0CF87BDCCFA78A2E14F546
5,734,313 UART: [art] PUB.Y = 33F510F89BBDE9C568A5201CD662AF8637AD685A8A27DFE0C967766C6162CC1CACCC019DC2F449FDBAB9FCC22D651CF2
5,741,282 UART: [art] SIG.R = F13210D53E588E1438CD0AD1637CF965DD55C5774E7FDFC8780DC89D80248EF62419729FB70AB894F3515A452207B8FE
5,748,042 UART: [art] SIG.S = D60CEA8CF2E25B6771F80BFA6A24A4094965E2E13796161C388E3BD9CD12EB96857F2764720ADD33D54BA89875E89E5A
5,771,926 UART: Caliptra RT
5,772,269 UART: [state] CFI Enabled
5,892,554 UART: [rt] RT listening for mailbox commands...
5,893,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,016,172 UART: [rt]cmd =0x41544d4e, len=14344
6,017,895 >>> mbox cmd response: failed
6,017,895 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,140,195 UART: [rt]cmd =0x41544d4e, len=14344
6,141,542 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,544 ready_for_fw is high
1,362,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,217,416 >>> mbox cmd response: success
5,280,025 UART:
5,280,041 UART: Running Caliptra FMC ...
5,280,449 UART:
5,280,592 UART: [state] CFI Enabled
5,290,888 UART: [fht] FMC Alias Private Key: 7
5,410,218 UART: [art] Extend RT PCRs Done
5,410,646 UART: [art] Lock RT PCRs Done
5,411,642 UART: [art] Populate DV Done
5,419,967 UART: [fht] FMC Alias Private Key: 7
5,421,063 UART: [art] Derive CDI
5,421,343 UART: [art] Store in slot 0x4
5,507,171 UART: [art] Derive Key Pair
5,507,531 UART: [art] Store priv key in slot 0x5
5,520,718 UART: [art] Derive Key Pair - Done
5,535,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,550,815 UART: [art] Erasing AUTHORITY.KEYID = 7
5,551,580 UART: [art] PUB.X = 6C6C5DD9EFFDFAC646AD0F876AC2C02203F56C3049F5974114932DA9E955D5F40B0831D2DA7EE0B946A2CDE863082804
5,558,342 UART: [art] PUB.Y = C560D0F1DF411C3A51CF14383F9517586EEA826C449AB2E38749E8CC467B9905960AF39F5FD145D567652ACA548C00CC
5,565,268 UART: [art] SIG.R = 898616B092262B83FAC4E014377B034E9B785C4F18665DFE6EC0D0D888AE3D693E27F1076FCA8903EE8C15A0808CD623
5,572,031 UART: [art] SIG.S = 87FF8093C9D38130AE02FE2A6FB90E6DE64F6190F675FA8AA0AE5CE3F6FEC340D76770B3F72D29A9ED28290F92E6E1F5
5,596,412 UART: Caliptra RT
5,596,755 UART: [state] CFI Enabled
5,716,896 UART: [rt] RT listening for mailbox commands...
5,717,566 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,840,580 UART: [rt]cmd =0x41544d4e, len=14344
5,841,901 >>> mbox cmd response: failed
5,841,901 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,964,533 UART: [rt]cmd =0x41544d4e, len=14344
5,965,924 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,238 UART: [kat] ++
895,390 UART: [kat] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,507 UART: [kat] SHA2-512-ACC
906,408 UART: [kat] ECC-384
915,447 UART: [kat] HMAC-384Kdf
920,035 UART: [kat] LMS
1,168,347 UART: [kat] --
1,169,584 UART: [cold-reset] ++
1,170,002 UART: [fht] FHT @ 0x50003400
1,172,710 UART: [idev] ++
1,172,878 UART: [idev] CDI.KEYID = 6
1,173,239 UART: [idev] SUBJECT.KEYID = 7
1,173,664 UART: [idev] UDS.KEYID = 0
1,174,010 ready_for_fw is high
1,174,010 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,497 UART: [idev] Erasing UDS.KEYID = 0
1,198,771 UART: [idev] Sha1 KeyId Algorithm
1,207,607 UART: [idev] --
1,208,798 UART: [ldev] ++
1,208,966 UART: [ldev] CDI.KEYID = 6
1,209,330 UART: [ldev] SUBJECT.KEYID = 5
1,209,757 UART: [ldev] AUTHORITY.KEYID = 7
1,210,220 UART: [ldev] FE.KEYID = 1
1,215,220 UART: [ldev] Erasing FE.KEYID = 1
1,241,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,296 UART: [ldev] --
1,280,653 UART: [fwproc] Wait for Commands...
1,281,366 UART: [fwproc] Recv command 0x46574c44
1,282,099 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,382 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,198,099 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,229,274 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,593 >>> mbox cmd response: success
3,370,767 UART: [afmc] ++
3,370,935 UART: [afmc] CDI.KEYID = 6
3,371,298 UART: [afmc] SUBJECT.KEYID = 7
3,371,724 UART: [afmc] AUTHORITY.KEYID = 5
3,406,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,422 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,171 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,429,878 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,435,755 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,441,465 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,449,009 UART: [afmc] --
3,449,974 UART: [cold-reset] --
3,450,888 UART: [state] Locking Datavault
3,452,103 UART: [state] Locking PCR0, PCR1 and PCR31
3,452,707 UART: [state] Locking ICCM
3,453,351 UART: [exit] Launching FMC @ 0x40000130
3,458,681 UART:
3,458,697 UART: Running Caliptra FMC ...
3,459,105 UART:
3,459,159 UART: [state] CFI Enabled
3,469,817 UART: [fht] FMC Alias Private Key: 7
3,588,817 UART: [art] Extend RT PCRs Done
3,589,245 UART: [art] Lock RT PCRs Done
3,590,751 UART: [art] Populate DV Done
3,598,936 UART: [fht] FMC Alias Private Key: 7
3,599,992 UART: [art] Derive CDI
3,600,272 UART: [art] Store in slot 0x4
3,686,049 UART: [art] Derive Key Pair
3,686,409 UART: [art] Store priv key in slot 0x5
3,699,633 UART: [art] Derive Key Pair - Done
3,714,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,730,206 UART: [art] Erasing AUTHORITY.KEYID = 7
3,730,971 UART: [art] PUB.X = 1023757F983C0FDF180FF4E742D2835A4835FD3F871B0D7F67BF23A72E8733A4A5CE0FC29178204F30869506DB8BF850
3,737,726 UART: [art] PUB.Y = E8FD7F91C33E7285637226678C8C4CA1ECA255F20BBAEEE7C7DE370EFD8D261F8397AFE2512A6591E043B36CA16B85FF
3,744,686 UART: [art] SIG.R = C1A2B5057AC6AD12CF6442A6BF5B46DD3A5C0ED20F8AF35CA039B065BD43B7015332D4D9AAE8CAB569C8E60D8BAA0C0F
3,751,461 UART: [art] SIG.S = C55D4DB44466D53E88F5C1A26E8F6E4C10DCF6373886855FC04606F6757BDB8EB4A54422BF7AAFF2FEB071825C7E6602
3,775,289 UART: Caliptra RT
3,775,540 UART: [state] CFI Enabled
3,895,887 UART: [rt] RT listening for mailbox commands...
3,896,557 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,285 UART: [rt]cmd =0x41544d4e, len=14344
4,020,670 >>> mbox cmd response: failed
4,020,670 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,143,320 UART: [rt]cmd =0x41544d4e, len=14344
4,144,897 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,536 ready_for_fw is high
1,058,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,823 >>> mbox cmd response: success
3,285,076 UART:
3,285,092 UART: Running Caliptra FMC ...
3,285,500 UART:
3,285,554 UART: [state] CFI Enabled
3,295,970 UART: [fht] FMC Alias Private Key: 7
3,415,334 UART: [art] Extend RT PCRs Done
3,415,762 UART: [art] Lock RT PCRs Done
3,416,986 UART: [art] Populate DV Done
3,425,457 UART: [fht] FMC Alias Private Key: 7
3,426,587 UART: [art] Derive CDI
3,426,867 UART: [art] Store in slot 0x4
3,512,394 UART: [art] Derive Key Pair
3,512,754 UART: [art] Store priv key in slot 0x5
3,525,676 UART: [art] Derive Key Pair - Done
3,540,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,542 UART: [art] PUB.X = B285FC848E9ACE12C111DDEC3FCBBDE7EC3A408A5E78D03AC1DFF6C85212A99C941E11E9D94D72507A1D27251B4C6712
3,563,330 UART: [art] PUB.Y = C32EFB3C03C5A3D4836AF71514C5F36D12F13FB698AC06CE87B89A5A68CA3DF79408062F74B6FD75D070A7C3034D5977
3,570,273 UART: [art] SIG.R = 58C449D7797E646404BC5AE3F4F4365EA9CD542D72D2D7AFC01A5CA18FD679EAE433CE9E10D5EBE68BCD8FD1AEA84730
3,577,062 UART: [art] SIG.S = 481ECC4D12A7E7C72BC774B024A3052D8FC1D10C29EEF3B0BE55E1751AB47C4858F7A0C3F0BC2CDF7F4ACACCD6408EE1
3,600,442 UART: Caliptra RT
3,600,693 UART: [state] CFI Enabled
3,720,791 UART: [rt] RT listening for mailbox commands...
3,721,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,529 UART: [rt]cmd =0x41544d4e, len=14344
3,845,782 >>> mbox cmd response: failed
3,845,782 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,968,540 UART: [rt]cmd =0x41544d4e, len=14344
3,970,215 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,725 UART: [state] LifecycleState = Unprovisioned
86,380 UART: [state] DebugLocked = No
87,040 UART: [state] WD Timer not started. Device not locked for debugging
88,329 UART: [kat] SHA2-256
891,879 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,983 UART: [kat] ++
896,135 UART: [kat] sha1
900,417 UART: [kat] SHA2-256
902,357 UART: [kat] SHA2-384
905,036 UART: [kat] SHA2-512-ACC
906,937 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,876 UART: [kat] LMS
1,169,188 UART: [kat] --
1,170,229 UART: [cold-reset] ++
1,170,613 UART: [fht] FHT @ 0x50003400
1,173,145 UART: [idev] ++
1,173,313 UART: [idev] CDI.KEYID = 6
1,173,674 UART: [idev] SUBJECT.KEYID = 7
1,174,099 UART: [idev] UDS.KEYID = 0
1,174,445 ready_for_fw is high
1,174,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,838 UART: [idev] Erasing UDS.KEYID = 0
1,199,018 UART: [idev] Sha1 KeyId Algorithm
1,207,880 UART: [idev] --
1,208,857 UART: [ldev] ++
1,209,025 UART: [ldev] CDI.KEYID = 6
1,209,389 UART: [ldev] SUBJECT.KEYID = 5
1,209,816 UART: [ldev] AUTHORITY.KEYID = 7
1,210,279 UART: [ldev] FE.KEYID = 1
1,215,277 UART: [ldev] Erasing FE.KEYID = 1
1,241,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,003 UART: [ldev] --
1,280,402 UART: [fwproc] Wait for Commands...
1,281,129 UART: [fwproc] Recv command 0x46574c44
1,281,862 UART: [fwproc] Recv'd Img size: 118548 bytes
3,166,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,194,668 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,225,843 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,066 >>> mbox cmd response: success
3,367,160 UART: [afmc] ++
3,367,328 UART: [afmc] CDI.KEYID = 6
3,367,691 UART: [afmc] SUBJECT.KEYID = 7
3,368,117 UART: [afmc] AUTHORITY.KEYID = 5
3,403,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,419,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,420,454 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,426,161 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,432,038 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,437,748 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,445,652 UART: [afmc] --
3,446,699 UART: [cold-reset] --
3,447,547 UART: [state] Locking Datavault
3,448,672 UART: [state] Locking PCR0, PCR1 and PCR31
3,449,276 UART: [state] Locking ICCM
3,449,712 UART: [exit] Launching FMC @ 0x40000130
3,455,042 UART:
3,455,058 UART: Running Caliptra FMC ...
3,455,466 UART:
3,455,609 UART: [state] CFI Enabled
3,466,429 UART: [fht] FMC Alias Private Key: 7
3,585,385 UART: [art] Extend RT PCRs Done
3,585,813 UART: [art] Lock RT PCRs Done
3,587,419 UART: [art] Populate DV Done
3,595,576 UART: [fht] FMC Alias Private Key: 7
3,596,628 UART: [art] Derive CDI
3,596,908 UART: [art] Store in slot 0x4
3,682,555 UART: [art] Derive Key Pair
3,682,915 UART: [art] Store priv key in slot 0x5
3,695,661 UART: [art] Derive Key Pair - Done
3,710,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,725,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,726,684 UART: [art] PUB.X = 3F5FE11E15B480D8832AEB8C47F2EAB05C803AC0A97CF76BDC92429FFB3B11FD3EDC1D499B9CDFE604A11E54B65BC5D2
3,733,477 UART: [art] PUB.Y = EF15BBA3169FFAB811518E323C2F66579195DFE73E0AA9682A0DBFC12D9FBD960ADA7ECF9B7B29B3BAD239685058F50D
3,740,435 UART: [art] SIG.R = 08A7A2F4B17C518067B82FFA8890533D81D1E9B8093AD01228F8D6EEE25D629373385D384A8DB199F3D9C1E00C5C8006
3,747,193 UART: [art] SIG.S = F38468EF49CB6A55061292F798E999802DBB668D062D4352E5ADEB5D6EF79A4136BB581222A159C12F344D51DD2C540F
3,771,436 UART: Caliptra RT
3,771,779 UART: [state] CFI Enabled
3,891,167 UART: [rt] RT listening for mailbox commands...
3,891,837 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,015,223 UART: [rt]cmd =0x41544d4e, len=14344
4,016,670 >>> mbox cmd response: failed
4,016,670 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,139,242 UART: [rt]cmd =0x41544d4e, len=14344
4,140,869 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,633 ready_for_fw is high
1,059,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,221,397 >>> mbox cmd response: success
3,283,030 UART:
3,283,046 UART: Running Caliptra FMC ...
3,283,454 UART:
3,283,597 UART: [state] CFI Enabled
3,293,745 UART: [fht] FMC Alias Private Key: 7
3,413,103 UART: [art] Extend RT PCRs Done
3,413,531 UART: [art] Lock RT PCRs Done
3,415,009 UART: [art] Populate DV Done
3,423,236 UART: [fht] FMC Alias Private Key: 7
3,424,294 UART: [art] Derive CDI
3,424,574 UART: [art] Store in slot 0x4
3,510,021 UART: [art] Derive Key Pair
3,510,381 UART: [art] Store priv key in slot 0x5
3,523,827 UART: [art] Derive Key Pair - Done
3,538,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,075 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,840 UART: [art] PUB.X = DC654A12CA8F7F3FBE678D659243074D8E2AD67D791639F30914416C817CDB60745904311580A613B40C42E78DAA17CD
3,561,596 UART: [art] PUB.Y = 13E46565F0C7C449F6F79BEA3080ECE437687B4F851B985A4B12298690C987FD38F2A0CE64347FA4E4DF675D649A9393
3,568,546 UART: [art] SIG.R = 2BBA0A4E7796B86732876B7EDBB8FDBFFB2EDFE801C6063893F31FF8C063AA0D63516B54DE5902C732BB4487708D4CCF
3,575,317 UART: [art] SIG.S = F4F44E39F5D28E0903505586709ED3535C8E3F7042CA9626156CF0BB70B8B7C100D359D08CF825F568512F9C3947A3F3
3,599,079 UART: Caliptra RT
3,599,422 UART: [state] CFI Enabled
3,719,390 UART: [rt] RT listening for mailbox commands...
3,720,060 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,992 UART: [rt]cmd =0x41544d4e, len=14344
3,844,577 >>> mbox cmd response: failed
3,844,577 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,967,025 UART: [rt]cmd =0x41544d4e, len=14344
3,968,610 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,520 UART: [state] LifecycleState = Unprovisioned
86,175 UART: [state] DebugLocked = No
86,839 UART: [state] WD Timer not started. Device not locked for debugging
88,172 UART: [kat] SHA2-256
893,822 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,947 UART: [kat] ++
898,099 UART: [kat] sha1
902,287 UART: [kat] SHA2-256
904,227 UART: [kat] SHA2-384
907,048 UART: [kat] SHA2-512-ACC
908,949 UART: [kat] ECC-384
918,622 UART: [kat] HMAC-384Kdf
923,360 UART: [kat] LMS
1,171,688 UART: [kat] --
1,172,933 UART: [cold-reset] ++
1,173,433 UART: [fht] FHT @ 0x50003400
1,176,210 UART: [idev] ++
1,176,378 UART: [idev] CDI.KEYID = 6
1,176,738 UART: [idev] SUBJECT.KEYID = 7
1,177,162 UART: [idev] UDS.KEYID = 0
1,177,507 ready_for_fw is high
1,177,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,126 UART: [idev] Erasing UDS.KEYID = 0
1,202,461 UART: [idev] Sha1 KeyId Algorithm
1,210,907 UART: [idev] --
1,211,851 UART: [ldev] ++
1,212,019 UART: [ldev] CDI.KEYID = 6
1,212,382 UART: [ldev] SUBJECT.KEYID = 5
1,212,808 UART: [ldev] AUTHORITY.KEYID = 7
1,213,271 UART: [ldev] FE.KEYID = 1
1,218,229 UART: [ldev] Erasing FE.KEYID = 1
1,244,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,815 UART: [ldev] --
1,283,216 UART: [fwproc] Wait for Commands...
1,283,902 UART: [fwproc] Recv command 0x46574c44
1,284,630 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,787 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,957 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,290 >>> mbox cmd response: success
3,375,400 UART: [afmc] ++
3,375,568 UART: [afmc] CDI.KEYID = 6
3,375,930 UART: [afmc] SUBJECT.KEYID = 7
3,376,355 UART: [afmc] AUTHORITY.KEYID = 5
3,411,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,969 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,675 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,440,554 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,264 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,059 UART: [afmc] --
3,455,039 UART: [cold-reset] --
3,456,041 UART: [state] Locking Datavault
3,457,192 UART: [state] Locking PCR0, PCR1 and PCR31
3,457,796 UART: [state] Locking ICCM
3,458,322 UART: [exit] Launching FMC @ 0x40000130
3,463,652 UART:
3,463,668 UART: Running Caliptra FMC ...
3,464,076 UART:
3,464,130 UART: [state] CFI Enabled
3,474,634 UART: [fht] FMC Alias Private Key: 7
3,592,814 UART: [art] Extend RT PCRs Done
3,593,242 UART: [art] Lock RT PCRs Done
3,594,734 UART: [art] Populate DV Done
3,602,673 UART: [fht] FMC Alias Private Key: 7
3,603,749 UART: [art] Derive CDI
3,604,029 UART: [art] Store in slot 0x4
3,690,030 UART: [art] Derive Key Pair
3,690,390 UART: [art] Store priv key in slot 0x5
3,703,564 UART: [art] Derive Key Pair - Done
3,718,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,734,313 UART: [art] PUB.X = 4A6E818A10A58428297C8792C1800505175C5BD026780A4417A68A7294898B5F302B1C2D79B61246AEC6F06E2B8446BA
3,741,064 UART: [art] PUB.Y = 4D1D15700A0D4C58DE405F510ACCABB1F01E34037C3B6AD17C135478DB95CCA3D7EE1350D07636736975889A039CA573
3,748,003 UART: [art] SIG.R = EE0C114288EF3B7E145299DC5C591EF4A6D676409E12F715732B4ED286BB895AF91A88252FC0472CD6DC71173F3E52DD
3,754,776 UART: [art] SIG.S = EB9F14D5485B335D158EFB16652C1CFFF2A52740E78316E13DFBE1C665B6F442A3D4CB304F5D6B001405238B191857ED
3,778,799 UART: Caliptra RT
3,779,050 UART: [state] CFI Enabled
3,897,041 UART: [rt] RT listening for mailbox commands...
3,897,711 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,799 UART: [rt]cmd =0x41544d4e, len=14344
4,022,174 >>> mbox cmd response: failed
4,022,174 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,144,988 UART: [rt]cmd =0x41544d4e, len=14344
4,146,415 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,467 ready_for_fw is high
1,060,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,254 >>> mbox cmd response: success
3,281,199 UART:
3,281,215 UART: Running Caliptra FMC ...
3,281,623 UART:
3,281,677 UART: [state] CFI Enabled
3,292,289 UART: [fht] FMC Alias Private Key: 7
3,410,959 UART: [art] Extend RT PCRs Done
3,411,387 UART: [art] Lock RT PCRs Done
3,412,727 UART: [art] Populate DV Done
3,421,116 UART: [fht] FMC Alias Private Key: 7
3,422,140 UART: [art] Derive CDI
3,422,420 UART: [art] Store in slot 0x4
3,508,277 UART: [art] Derive Key Pair
3,508,637 UART: [art] Store priv key in slot 0x5
3,522,273 UART: [art] Derive Key Pair - Done
3,536,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,552,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,552,912 UART: [art] PUB.X = B5B8DC8B2D841E6A487E219E1A24849DBB683450AEFA29D035A711F31F4EDEC6972B02297E45F6D1D2BC3CBCA6031C1F
3,559,692 UART: [art] PUB.Y = F8772519A8CEA9483830874B2BEA239EDC47F7CD73E9478FA35D21736BCEFAB48E2F415EE283B69A150E4D347C8360B9
3,566,647 UART: [art] SIG.R = 2610B2BDABC1A9BE49E721E137930F3854238B23562E2254D98C1646C45639A38C3071D66223CB406BD451F4FAF76055
3,573,408 UART: [art] SIG.S = 15CDCD28E4B093C5390DE8D7DDF9A02919D89804E8BFB0B6FB16405B41E55C70454DE72D52D18F63FB4FE0D2330AB78F
3,597,635 UART: Caliptra RT
3,597,886 UART: [state] CFI Enabled
3,717,958 UART: [rt] RT listening for mailbox commands...
3,718,628 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,330 UART: [rt]cmd =0x41544d4e, len=14344
3,842,963 >>> mbox cmd response: failed
3,842,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,965,459 UART: [rt]cmd =0x41544d4e, len=14344
3,967,146 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
893,879 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,004 UART: [kat] ++
898,156 UART: [kat] sha1
902,636 UART: [kat] SHA2-256
904,576 UART: [kat] SHA2-384
907,271 UART: [kat] SHA2-512-ACC
909,172 UART: [kat] ECC-384
919,295 UART: [kat] HMAC-384Kdf
923,895 UART: [kat] LMS
1,172,223 UART: [kat] --
1,172,858 UART: [cold-reset] ++
1,173,326 UART: [fht] FHT @ 0x50003400
1,176,003 UART: [idev] ++
1,176,171 UART: [idev] CDI.KEYID = 6
1,176,531 UART: [idev] SUBJECT.KEYID = 7
1,176,955 UART: [idev] UDS.KEYID = 0
1,177,300 ready_for_fw is high
1,177,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,157 UART: [idev] Erasing UDS.KEYID = 0
1,202,776 UART: [idev] Sha1 KeyId Algorithm
1,211,256 UART: [idev] --
1,212,326 UART: [ldev] ++
1,212,494 UART: [ldev] CDI.KEYID = 6
1,212,857 UART: [ldev] SUBJECT.KEYID = 5
1,213,283 UART: [ldev] AUTHORITY.KEYID = 7
1,213,746 UART: [ldev] FE.KEYID = 1
1,219,116 UART: [ldev] Erasing FE.KEYID = 1
1,245,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,964 UART: [ldev] --
1,285,445 UART: [fwproc] Wait for Commands...
1,286,127 UART: [fwproc] Recv command 0x46574c44
1,286,855 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,796 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,966 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,183 >>> mbox cmd response: success
3,375,429 UART: [afmc] ++
3,375,597 UART: [afmc] CDI.KEYID = 6
3,375,959 UART: [afmc] SUBJECT.KEYID = 7
3,376,384 UART: [afmc] AUTHORITY.KEYID = 5
3,411,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,890 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,596 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,440,475 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,185 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,858 UART: [afmc] --
3,454,848 UART: [cold-reset] --
3,455,566 UART: [state] Locking Datavault
3,456,407 UART: [state] Locking PCR0, PCR1 and PCR31
3,457,011 UART: [state] Locking ICCM
3,457,567 UART: [exit] Launching FMC @ 0x40000130
3,462,897 UART:
3,462,913 UART: Running Caliptra FMC ...
3,463,321 UART:
3,463,464 UART: [state] CFI Enabled
3,474,262 UART: [fht] FMC Alias Private Key: 7
3,592,914 UART: [art] Extend RT PCRs Done
3,593,342 UART: [art] Lock RT PCRs Done
3,594,736 UART: [art] Populate DV Done
3,602,841 UART: [fht] FMC Alias Private Key: 7
3,603,875 UART: [art] Derive CDI
3,604,155 UART: [art] Store in slot 0x4
3,689,764 UART: [art] Derive Key Pair
3,690,124 UART: [art] Store priv key in slot 0x5
3,704,186 UART: [art] Derive Key Pair - Done
3,718,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,041 UART: [art] PUB.X = A0033CD6EC7EBD60D21A79268F387D3DB10428375DE906CD3F4FEA8C513E216DE2BED2E9404B94D1729F922F0A423F11
3,741,809 UART: [art] PUB.Y = 2D0AA0956EC223578F48A5CDAB150398AEDCC2AB2436B2DBE39ED934AD621BEA91C52EEA09D172B2B939088E26B65F52
3,748,763 UART: [art] SIG.R = D8500732D0D1CF50EC2EB7FBA9301FE683E93AA46A9A58F56F098B726FC86ABA8A1075A981092571DC4F7B484F7DF1BA
3,755,538 UART: [art] SIG.S = 5DB8F80E540576166328A67B6D3A1C990CA18A660366742F36EFDDAFB81D81F8C4A0834B282FB09207F4015D37D6E5B6
3,779,500 UART: Caliptra RT
3,779,843 UART: [state] CFI Enabled
3,899,249 UART: [rt] RT listening for mailbox commands...
3,899,919 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,977 UART: [rt]cmd =0x41544d4e, len=14344
4,024,616 >>> mbox cmd response: failed
4,024,616 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,147,064 UART: [rt]cmd =0x41544d4e, len=14344
4,148,635 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,390 ready_for_fw is high
1,061,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,671 >>> mbox cmd response: success
3,289,434 UART:
3,289,450 UART: Running Caliptra FMC ...
3,289,858 UART:
3,290,001 UART: [state] CFI Enabled
3,300,897 UART: [fht] FMC Alias Private Key: 7
3,419,817 UART: [art] Extend RT PCRs Done
3,420,245 UART: [art] Lock RT PCRs Done
3,422,141 UART: [art] Populate DV Done
3,430,098 UART: [fht] FMC Alias Private Key: 7
3,431,080 UART: [art] Derive CDI
3,431,360 UART: [art] Store in slot 0x4
3,517,419 UART: [art] Derive Key Pair
3,517,779 UART: [art] Store priv key in slot 0x5
3,531,475 UART: [art] Derive Key Pair - Done
3,546,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,561,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,562,728 UART: [art] PUB.X = 6341B2CA875B3EFA2D54446E7DB6B09089668BAE2120915768768EEE3F3128E9F22FD4F2236AA0E6624D6C4C6F2180C5
3,569,500 UART: [art] PUB.Y = 43949C4C34876CB87EA6A6199285AA1C7047AF2BD86AF5FA1E59CD3D7DB22593EDEEDA9CF123AAAE913036AC4B5BE2B1
3,576,472 UART: [art] SIG.R = E3F91CA7CAD9656052D2FE327016D716EDCE4EB53D4B5D186B33BCA1B02D1460DE450BF9893839267FD0B5FE7D302397
3,583,249 UART: [art] SIG.S = E720718303971253C4E67F333519D309F6514909E7DD447AA230F3F7CC458F0E8FB7504B4B6C87AA64ADB068B5C7257F
3,607,047 UART: Caliptra RT
3,607,390 UART: [state] CFI Enabled
3,726,605 UART: [rt] RT listening for mailbox commands...
3,727,275 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,850,419 UART: [rt]cmd =0x41544d4e, len=14344
3,852,144 >>> mbox cmd response: failed
3,852,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,974,734 UART: [rt]cmd =0x41544d4e, len=14344
3,976,265 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,136 UART:
192,490 UART: Running Caliptra ROM ...
193,586 UART:
193,732 UART: [state] CFI Enabled
269,217 UART: [state] LifecycleState = Unprovisioned
271,125 UART: [state] DebugLocked = No
272,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,045 UART: [kat] SHA2-256
446,727 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,234 UART: [kat] ++
457,681 UART: [kat] sha1
468,862 UART: [kat] SHA2-256
471,410 UART: [kat] SHA2-384
478,263 UART: [kat] SHA2-512-ACC
480,630 UART: [kat] ECC-384
2,768,330 UART: [kat] HMAC-384Kdf
2,800,258 UART: [kat] LMS
3,990,609 UART: [kat] --
3,993,830 UART: [cold-reset] ++
3,996,065 UART: [fht] Storing FHT @ 0x50003400
4,006,845 UART: [idev] ++
4,007,464 UART: [idev] CDI.KEYID = 6
4,008,385 UART: [idev] SUBJECT.KEYID = 7
4,009,588 UART: [idev] UDS.KEYID = 0
4,010,584 ready_for_fw is high
4,010,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,941 UART: [idev] Erasing UDS.KEYID = 0
7,349,296 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,381 UART: [idev] --
7,376,238 UART: [ldev] ++
7,376,865 UART: [ldev] CDI.KEYID = 6
7,377,777 UART: [ldev] SUBJECT.KEYID = 5
7,378,990 UART: [ldev] AUTHORITY.KEYID = 7
7,380,278 UART: [ldev] FE.KEYID = 1
7,427,413 UART: [ldev] Erasing FE.KEYID = 1
10,760,592 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,087,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,136,987 UART: [ldev] --
13,142,422 UART: [fwproc] Waiting for Commands...
13,144,245 UART: [fwproc] Received command 0x46574c44
13,146,428 UART: [fwproc] Received Image of size 118548 bytes
21,919,394 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,998,993 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,072,170 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,400,495 >>> mbox cmd response: success
22,404,205 UART: [afmc] ++
22,404,822 UART: [afmc] CDI.KEYID = 6
22,405,738 UART: [afmc] SUBJECT.KEYID = 7
22,406,967 UART: [afmc] AUTHORITY.KEYID = 5
25,772,513 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,070,958 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,073,212 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,087,727 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,102,502 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,116,871 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,137,400 UART: [afmc] --
28,140,935 UART: [cold-reset] --
28,143,065 UART: [state] Locking Datavault
28,149,400 UART: [state] Locking PCR0, PCR1 and PCR31
28,151,143 UART: [state] Locking ICCM
28,153,333 UART: [exit] Launching FMC @ 0x40000130
28,161,738 UART:
28,161,969 UART: Running Caliptra FMC ...
28,162,995 UART:
28,163,142 UART: [state] CFI Enabled
28,229,730 UART: [fht] FMC Alias Private Key: 7
30,570,465 UART: [art] Extend RT PCRs Done
30,571,689 UART: [art] Lock RT PCRs Done
30,573,035 UART: [art] Populate DV Done
30,578,460 UART: [fht] FMC Alias Private Key: 7
30,580,159 UART: [art] Derive CDI
30,580,976 UART: [art] Store in slot 0x4
30,638,182 UART: [art] Derive Key Pair
30,639,221 UART: [art] Store priv key in slot 0x5
33,931,171 UART: [art] Derive Key Pair - Done
33,943,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,233,207 UART: [art] Erasing AUTHORITY.KEYID = 7
36,234,724 UART: [art] PUB.X = 34A6CE54BF5E7B7D12A708F55161236BB4E84882B3E22FAE904AD0A5F35EBCAA819AD043B6BCC6270C020F07DD553542
36,241,996 UART: [art] PUB.Y = E880760A45279BE8978A5BC5BB32C8E1A96C05AEBAEED760176B7BD094360CF99F0124A76FA6E64FDE408A0485DCCC66
36,249,250 UART: [art] SIG.R = 39BAC53D25E73B97B868841D5DD09631284CE220F95F6711E0C8A37BF959EF640801190AEE921278A7FBA860411144DF
36,256,611 UART: [art] SIG.S = 778FBB63EB7365848CEE65290AF6A8BEEA027572FD88360FC1195EB89CE357119F546109DED82EACABFB1B16ABA293B4
37,561,970 UART: Caliptra RT
37,562,680 UART: [state] CFI Enabled
37,739,731 UART: [rt] RT listening for mailbox commands...
37,742,046 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,897,472 UART: [rt]cmd =0x41544d4e, len=14344
46,577,527 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,804,236 ready_for_fw is high
3,804,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,276,039 >>> mbox cmd response: success
27,981,783 UART:
27,982,194 UART: Running Caliptra FMC ...
27,983,299 UART:
27,983,451 UART: [state] CFI Enabled
28,049,352 UART: [fht] FMC Alias Private Key: 7
30,389,360 UART: [art] Extend RT PCRs Done
30,390,592 UART: [art] Lock RT PCRs Done
30,392,307 UART: [art] Populate DV Done
30,397,583 UART: [fht] FMC Alias Private Key: 7
30,399,087 UART: [art] Derive CDI
30,399,824 UART: [art] Store in slot 0x4
30,458,376 UART: [art] Derive Key Pair
30,459,420 UART: [art] Store priv key in slot 0x5
33,751,938 UART: [art] Derive Key Pair - Done
33,764,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,053,007 UART: [art] Erasing AUTHORITY.KEYID = 7
36,054,533 UART: [art] PUB.X = 6C66CCBDAAAA99407C25DD152C241A21F7B0111F98AF2D2B3856F941DB93D0E059964DC03A8D7AB43CDBB638FB1D7B83
36,061,802 UART: [art] PUB.Y = A2A2670BB75D4130223A9F2DAA87EF6924187AFF992345ADA37FC56134B8717A8F7E06F313461F7500E5407F348752A6
36,069,024 UART: [art] SIG.R = C31595CA7A0C04F5B41307317C0D1019C3029710A3054897F3B624682EBBDF4053EA770D633523C2E5B42CBC1C684EB7
36,076,430 UART: [art] SIG.S = 484BD50AEA30E3997667BE2B7712F40525E00B4CB7C6FCE5E27A8B18A61546E38211B2A3346E00F2E58C59D3AB247963
37,382,181 UART: Caliptra RT
37,382,879 UART: [state] CFI Enabled
37,578,752 UART: [rt] RT listening for mailbox commands...
37,581,060 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,736,393 UART: [rt]cmd =0x41544d4e, len=14344
46,235,197 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
192,632 UART:
192,980 UART: Running Caliptra ROM ...
194,162 UART:
603,706 UART: [state] CFI Enabled
618,080 UART: [state] LifecycleState = Unprovisioned
620,024 UART: [state] DebugLocked = No
621,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,965 UART: [kat] SHA2-256
796,692 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,263 UART: [kat] ++
807,740 UART: [kat] sha1
819,959 UART: [kat] SHA2-256
822,675 UART: [kat] SHA2-384
828,522 UART: [kat] SHA2-512-ACC
830,887 UART: [kat] ECC-384
3,116,136 UART: [kat] HMAC-384Kdf
3,127,725 UART: [kat] LMS
4,317,811 UART: [kat] --
4,321,851 UART: [cold-reset] ++
4,323,713 UART: [fht] Storing FHT @ 0x50003400
4,334,508 UART: [idev] ++
4,335,091 UART: [idev] CDI.KEYID = 6
4,335,998 UART: [idev] SUBJECT.KEYID = 7
4,337,236 UART: [idev] UDS.KEYID = 0
4,338,179 ready_for_fw is high
4,338,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,205 UART: [idev] Erasing UDS.KEYID = 0
7,627,411 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,190 UART: [idev] --
7,653,854 UART: [ldev] ++
7,654,473 UART: [ldev] CDI.KEYID = 6
7,655,432 UART: [ldev] SUBJECT.KEYID = 5
7,656,634 UART: [ldev] AUTHORITY.KEYID = 7
7,657,854 UART: [ldev] FE.KEYID = 1
7,670,924 UART: [ldev] Erasing FE.KEYID = 1
10,956,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,615 UART: [ldev] --
13,314,521 UART: [fwproc] Waiting for Commands...
13,317,526 UART: [fwproc] Received command 0x46574c44
13,319,696 UART: [fwproc] Received Image of size 118548 bytes
22,171,300 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,254,393 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,327,571 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,656,739 >>> mbox cmd response: success
22,661,803 UART: [afmc] ++
22,662,414 UART: [afmc] CDI.KEYID = 6
22,663,323 UART: [afmc] SUBJECT.KEYID = 7
22,664,585 UART: [afmc] AUTHORITY.KEYID = 5
25,979,300 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,272,100 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,274,408 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,288,898 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,303,698 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,318,124 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,338,306 UART: [afmc] --
28,341,899 UART: [cold-reset] --
28,344,078 UART: [state] Locking Datavault
28,347,756 UART: [state] Locking PCR0, PCR1 and PCR31
28,349,447 UART: [state] Locking ICCM
28,351,998 UART: [exit] Launching FMC @ 0x40000130
28,360,439 UART:
28,360,674 UART: Running Caliptra FMC ...
28,361,768 UART:
28,361,923 UART: [state] CFI Enabled
28,369,803 UART: [fht] FMC Alias Private Key: 7
30,709,388 UART: [art] Extend RT PCRs Done
30,710,609 UART: [art] Lock RT PCRs Done
30,712,342 UART: [art] Populate DV Done
30,717,851 UART: [fht] FMC Alias Private Key: 7
30,719,541 UART: [art] Derive CDI
30,720,343 UART: [art] Store in slot 0x4
30,762,654 UART: [art] Derive Key Pair
30,763,646 UART: [art] Store priv key in slot 0x5
34,005,267 UART: [art] Derive Key Pair - Done
34,018,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,298,626 UART: [art] Erasing AUTHORITY.KEYID = 7
36,300,131 UART: [art] PUB.X = 79E5F9041A576453D9271199E0081DA1DBE977E7D9CC3C31653F82EBBA41F9332F4D14E0BD57385B66F9C40526811242
36,307,383 UART: [art] PUB.Y = 3205721F19C6234F04EEB1E03067FF7C2E0C77931D310566502614C8F97F7F72F4A867CA6609F1F8E8CEEDA8B7E40404
36,314,590 UART: [art] SIG.R = E5149FD42F5202401D5F17630B5603884521CAC04C516D2FFEB68A0E34F5BB3AF2D7D1E0CF8EF0741D8357CC8750F750
36,321,994 UART: [art] SIG.S = 344FD6C59DC4FA2CECF1F40CB2493CC77CA4A47CC0CBD44BA4E2621FCF23D2FF6027BB881185A0420B4BEACDAC45C175
37,627,418 UART: Caliptra RT
37,628,149 UART: [state] CFI Enabled
37,760,946 UART: [rt] RT listening for mailbox commands...
37,763,259 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,918,514 UART: [rt]cmd =0x41544d4e, len=14344
46,287,507 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
4,126,832 ready_for_fw is high
4,127,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,286,459 >>> mbox cmd response: success
27,927,265 UART:
27,927,654 UART: Running Caliptra FMC ...
27,928,762 UART:
27,928,918 UART: [state] CFI Enabled
27,936,733 UART: [fht] FMC Alias Private Key: 7
30,277,121 UART: [art] Extend RT PCRs Done
30,278,347 UART: [art] Lock RT PCRs Done
30,280,027 UART: [art] Populate DV Done
30,285,466 UART: [fht] FMC Alias Private Key: 7
30,287,064 UART: [art] Derive CDI
30,287,827 UART: [art] Store in slot 0x4
30,330,411 UART: [art] Derive Key Pair
30,331,404 UART: [art] Store priv key in slot 0x5
33,573,182 UART: [art] Derive Key Pair - Done
33,585,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,866,286 UART: [art] Erasing AUTHORITY.KEYID = 7
35,868,042 UART: [art] PUB.X = B359B6134DDA70C66C10ED0FDDD7FB9BFC2A9D6FB9A4F3C1316D9CB825AE425FAB57F261693C2D1711F410C15E5B3B16
35,875,084 UART: [art] PUB.Y = 30EEFA17F1F98DCFD85430AA070206036FD8EEDDC641C0ADBCF0E7AA475C6D0425CA7448E7A7956CF2E6849AED84ED2F
35,882,373 UART: [art] SIG.R = 47462FB4011D1EF0849977F610C521D7BA62448243356B5DDFC2F18FE4D1A88A6646F4F715B6276CF0062C1F1058556F
35,889,756 UART: [art] SIG.S = E14418CA57E8DF4D175219F753BBBC2081231C606C5FBAE94759A39D7831AF589C765C4CD29BC1ECBAABCF07F353B284
37,195,160 UART: Caliptra RT
37,195,889 UART: [state] CFI Enabled
37,328,629 UART: [rt] RT listening for mailbox commands...
37,330,937 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,486,152 UART: [rt]cmd =0x41544d4e, len=14344
46,063,058 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,147 UART:
192,492 UART: Running Caliptra ROM ...
193,580 UART:
193,723 UART: [state] CFI Enabled
263,354 UART: [state] LifecycleState = Unprovisioned
265,282 UART: [state] DebugLocked = No
267,372 UART: [state] WD Timer not started. Device not locked for debugging
271,135 UART: [kat] SHA2-256
450,835 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,619 UART: [kat] ++
462,066 UART: [kat] sha1
473,651 UART: [kat] SHA2-256
476,370 UART: [kat] SHA2-384
481,929 UART: [kat] SHA2-512-ACC
484,318 UART: [kat] ECC-384
2,946,828 UART: [kat] HMAC-384Kdf
2,970,152 UART: [kat] LMS
3,446,706 UART: [kat] --
3,448,598 UART: [cold-reset] ++
3,450,393 UART: [fht] FHT @ 0x50003400
3,462,857 UART: [idev] ++
3,463,490 UART: [idev] CDI.KEYID = 6
3,464,372 UART: [idev] SUBJECT.KEYID = 7
3,465,680 UART: [idev] UDS.KEYID = 0
3,466,576 ready_for_fw is high
3,466,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,915 UART: [idev] Erasing UDS.KEYID = 0
5,987,611 UART: [idev] Sha1 KeyId Algorithm
6,010,294 UART: [idev] --
6,016,235 UART: [ldev] ++
6,016,833 UART: [ldev] CDI.KEYID = 6
6,017,902 UART: [ldev] SUBJECT.KEYID = 5
6,019,010 UART: [ldev] AUTHORITY.KEYID = 7
6,020,192 UART: [ldev] FE.KEYID = 1
6,057,086 UART: [ldev] Erasing FE.KEYID = 1
8,563,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,601 UART: [ldev] --
10,372,367 UART: [fwproc] Wait for Commands...
10,374,184 UART: [fwproc] Recv command 0x46574c44
10,376,163 UART: [fwproc] Recv'd Img size: 118548 bytes
14,911,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,003,840 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,076,838 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,404,552 >>> mbox cmd response: success
15,408,757 UART: [afmc] ++
15,409,404 UART: [afmc] CDI.KEYID = 6
15,410,313 UART: [afmc] SUBJECT.KEYID = 7
15,411,524 UART: [afmc] AUTHORITY.KEYID = 5
17,940,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,663,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,665,675 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,681,521 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,697,453 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,713,169 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,736,454 UART: [afmc] --
19,741,015 UART: [cold-reset] --
19,744,479 UART: [state] Locking Datavault
19,750,593 UART: [state] Locking PCR0, PCR1 and PCR31
19,752,372 UART: [state] Locking ICCM
19,754,311 UART: [exit] Launching FMC @ 0x40000130
19,762,699 UART:
19,762,931 UART: Running Caliptra FMC ...
19,764,030 UART:
19,764,186 UART: [state] CFI Enabled
19,820,541 UART: [fht] FMC Alias Private Key: 7
21,607,948 UART: [art] Extend RT PCRs Done
21,609,150 UART: [art] Lock RT PCRs Done
21,610,523 UART: [art] Populate DV Done
21,615,657 UART: [fht] FMC Alias Private Key: 7
21,617,295 UART: [art] Derive CDI
21,618,103 UART: [art] Store in slot 0x4
21,674,934 UART: [art] Derive Key Pair
21,675,993 UART: [art] Store priv key in slot 0x5
24,139,061 UART: [art] Derive Key Pair - Done
24,152,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,864,739 UART: [art] Erasing AUTHORITY.KEYID = 7
25,866,244 UART: [art] PUB.X = AD1F754D15CCC0504BCD86DC55B7BB343D26E67C9DF5A63223827FDDF90417BF8EBBDE9ACE98EFFE545CD316A47B531F
25,873,552 UART: [art] PUB.Y = 63AB047F8DA58CCD37A02CE1DFFEDB96C10DB1FCAF081955BE009D9470B812908572BBF73C0CB3FE8255C68098CB35C5
25,880,846 UART: [art] SIG.R = AAD38916C8B226D4901211C134807A290A7A551026D10C0C79EB54F3D2F9BFC5FA2459C3A64F95EB62731A2986B6BDAC
25,888,239 UART: [art] SIG.S = 332E68F45B699FC67E0E9C3CF2F7B97F0576E1AD3E99D4685DD61E8281E1B2EC4DA31A6ABA27C904FCCBC5165EDE2FC5
26,867,227 UART: Caliptra RT
26,867,917 UART: [state] CFI Enabled
27,049,989 UART: [rt] RT listening for mailbox commands...
27,052,286 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,207,732 UART: [rt]cmd =0x41544d4e, len=14344
32,128,419 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,462,419 ready_for_fw is high
3,462,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,399,725 >>> mbox cmd response: success
19,684,889 UART:
19,685,276 UART: Running Caliptra FMC ...
19,686,373 UART:
19,686,524 UART: [state] CFI Enabled
19,751,383 UART: [fht] FMC Alias Private Key: 7
21,539,043 UART: [art] Extend RT PCRs Done
21,540,269 UART: [art] Lock RT PCRs Done
21,541,790 UART: [art] Populate DV Done
21,547,269 UART: [fht] FMC Alias Private Key: 7
21,548,751 UART: [art] Derive CDI
21,549,490 UART: [art] Store in slot 0x4
21,605,504 UART: [art] Derive Key Pair
21,606,534 UART: [art] Store priv key in slot 0x5
24,068,916 UART: [art] Derive Key Pair - Done
24,081,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,795,216 UART: [art] Erasing AUTHORITY.KEYID = 7
25,796,719 UART: [art] PUB.X = 5314DE59DF4D2EDBEF411DE51669A3C0106B498F42A4726327C368A83FEEAADF2B7A91D9D1EBC670A8C357D3B4C231D8
25,803,968 UART: [art] PUB.Y = 4F5138B51F29248ECEB8F53B4AC5FF40AC1429F752C080F0E285C090C932CE9916EDFA283F60352BDDF6D20A8CBA7739
25,811,235 UART: [art] SIG.R = 1618A82EC4A27E25760EDEE4DD19BE12BD51D38E542FE9B96C286FE5920CEBB7D34B7BF68F624CF8B301AFE92F7A085F
25,818,681 UART: [art] SIG.S = D33F16D7271F3C7A12725B8D761A9B803E71BF56D4C019678F7517539DF7AAB8CC7B2338A41EB78BDAB10924624FD098
26,797,432 UART: Caliptra RT
26,798,139 UART: [state] CFI Enabled
26,979,722 UART: [rt] RT listening for mailbox commands...
26,982,022 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,137,428 UART: [rt]cmd =0x41544d4e, len=14344
32,035,478 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,504 UART:
192,882 UART: Running Caliptra ROM ...
194,031 UART:
603,888 UART: [state] CFI Enabled
619,611 UART: [state] LifecycleState = Unprovisioned
621,563 UART: [state] DebugLocked = No
622,808 UART: [state] WD Timer not started. Device not locked for debugging
626,071 UART: [kat] SHA2-256
805,677 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,462 UART: [kat] ++
816,940 UART: [kat] sha1
829,158 UART: [kat] SHA2-256
831,858 UART: [kat] SHA2-384
836,860 UART: [kat] SHA2-512-ACC
839,229 UART: [kat] ECC-384
3,281,896 UART: [kat] HMAC-384Kdf
3,292,946 UART: [kat] LMS
3,769,436 UART: [kat] --
3,774,666 UART: [cold-reset] ++
3,776,389 UART: [fht] FHT @ 0x50003400
3,787,096 UART: [idev] ++
3,787,708 UART: [idev] CDI.KEYID = 6
3,788,625 UART: [idev] SUBJECT.KEYID = 7
3,789,878 UART: [idev] UDS.KEYID = 0
3,790,807 ready_for_fw is high
3,791,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,817 UART: [idev] Erasing UDS.KEYID = 0
6,271,311 UART: [idev] Sha1 KeyId Algorithm
6,295,078 UART: [idev] --
6,300,858 UART: [ldev] ++
6,301,434 UART: [ldev] CDI.KEYID = 6
6,302,561 UART: [ldev] SUBJECT.KEYID = 5
6,303,680 UART: [ldev] AUTHORITY.KEYID = 7
6,304,860 UART: [ldev] FE.KEYID = 1
6,315,690 UART: [ldev] Erasing FE.KEYID = 1
8,800,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,588,537 UART: [ldev] --
10,593,704 UART: [fwproc] Wait for Commands...
10,596,028 UART: [fwproc] Recv command 0x46574c44
10,598,075 UART: [fwproc] Recv'd Img size: 118548 bytes
15,154,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,247,033 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,320,040 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,647,795 >>> mbox cmd response: success
15,651,725 UART: [afmc] ++
15,652,336 UART: [afmc] CDI.KEYID = 6
15,653,268 UART: [afmc] SUBJECT.KEYID = 7
15,654,492 UART: [afmc] AUTHORITY.KEYID = 5
18,162,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,887,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,890,138 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,906,006 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,921,929 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,937,625 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,963,145 UART: [afmc] --
19,966,376 UART: [cold-reset] --
19,970,031 UART: [state] Locking Datavault
19,975,822 UART: [state] Locking PCR0, PCR1 and PCR31
19,977,582 UART: [state] Locking ICCM
19,978,815 UART: [exit] Launching FMC @ 0x40000130
19,987,222 UART:
19,987,459 UART: Running Caliptra FMC ...
19,988,583 UART:
19,988,749 UART: [state] CFI Enabled
19,996,746 UART: [fht] FMC Alias Private Key: 7
21,762,864 UART: [art] Extend RT PCRs Done
21,764,084 UART: [art] Lock RT PCRs Done
21,766,014 UART: [art] Populate DV Done
21,771,543 UART: [fht] FMC Alias Private Key: 7
21,773,140 UART: [art] Derive CDI
21,773,957 UART: [art] Store in slot 0x4
21,816,930 UART: [art] Derive Key Pair
21,817,973 UART: [art] Store priv key in slot 0x5
24,245,038 UART: [art] Derive Key Pair - Done
24,258,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,964,265 UART: [art] Erasing AUTHORITY.KEYID = 7
25,965,772 UART: [art] PUB.X = 5251D87E51FACDFFE4DA5604489B0CE75EBA963B6EAB7A9976DA53FBC0EBBD71BCAFC8EF78E61B1BF0D31B36AF55E079
25,973,074 UART: [art] PUB.Y = AF3145E5105ECF705622A1B60C06DFDDF2CAD6E5246242FFB5C1186E001A8BF7AF762F6D53A1A8B14C424849EA3759E0
25,980,325 UART: [art] SIG.R = A38A21CA34A29E75736A25D6BE76DA47ABCD70FDB29C99FA1952BC2A2759FBAFDBC99C0F80081B1F257E38C1AC8F2C1E
25,987,713 UART: [art] SIG.S = 510F48CE2A47BACC0BCD476A6651B2C7FC273F28B79E8CD88D8BACCF58036F84F9844478503DE233AC35D9A8A77B2739
26,966,505 UART: Caliptra RT
26,967,196 UART: [state] CFI Enabled
27,099,979 UART: [rt] RT listening for mailbox commands...
27,102,276 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,257,753 UART: [rt]cmd =0x41544d4e, len=14344
32,168,151 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
3,779,419 ready_for_fw is high
3,779,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,598,172 >>> mbox cmd response: success
19,846,206 UART:
19,846,586 UART: Running Caliptra FMC ...
19,847,697 UART:
19,847,849 UART: [state] CFI Enabled
19,856,013 UART: [fht] FMC Alias Private Key: 7
21,622,033 UART: [art] Extend RT PCRs Done
21,623,259 UART: [art] Lock RT PCRs Done
21,625,079 UART: [art] Populate DV Done
21,630,519 UART: [fht] FMC Alias Private Key: 7
21,632,156 UART: [art] Derive CDI
21,632,903 UART: [art] Store in slot 0x4
21,675,505 UART: [art] Derive Key Pair
21,676,505 UART: [art] Store priv key in slot 0x5
24,103,497 UART: [art] Derive Key Pair - Done
24,116,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,822,614 UART: [art] Erasing AUTHORITY.KEYID = 7
25,824,136 UART: [art] PUB.X = C81BC189D407C48881A4CEDA2FFDCBAD36C2A2B784BA2907CED68D5E1AFE4CB01BCEE77504891AF5EE6D777D6BDAF871
25,831,452 UART: [art] PUB.Y = 19256DBE38648A1B80163394F22522A78B10377018EC613F3117FBBAF8C15E4724EB4E7F833C51523626BEB5CD11CC08
25,838,665 UART: [art] SIG.R = A897EE296B754CE8640B1BABFC7CC1C3FF8139B5C2D8A17C30DBFBEB0BFF67D353CB2AF14A16D0EAD2D0723D6572EE26
25,846,079 UART: [art] SIG.S = 0F8761C3EAF416BD5F0A8945FBED639CCC711385538739687EC888D555020261B35DC711574059AA9577C0EFC8406517
26,824,852 UART: Caliptra RT
26,825,564 UART: [state] CFI Enabled
26,958,200 UART: [rt] RT listening for mailbox commands...
26,960,495 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,115,898 UART: [rt]cmd =0x41544d4e, len=14344
32,037,701 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,254 UART:
192,617 UART: Running Caliptra ROM ...
193,750 UART:
193,894 UART: [state] CFI Enabled
264,399 UART: [state] LifecycleState = Unprovisioned
266,791 UART: [state] DebugLocked = No
269,531 UART: [state] WD Timer not started. Device not locked for debugging
274,970 UART: [kat] SHA2-256
464,815 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,618 UART: [kat] ++
476,156 UART: [kat] sha1
488,381 UART: [kat] SHA2-256
491,383 UART: [kat] SHA2-384
496,727 UART: [kat] SHA2-512-ACC
499,324 UART: [kat] ECC-384
2,949,297 UART: [kat] HMAC-384Kdf
2,974,256 UART: [kat] LMS
3,506,015 UART: [kat] --
3,508,455 UART: [cold-reset] ++
3,510,807 UART: [fht] FHT @ 0x50003400
3,521,918 UART: [idev] ++
3,522,558 UART: [idev] CDI.KEYID = 6
3,523,587 UART: [idev] SUBJECT.KEYID = 7
3,524,757 UART: [idev] UDS.KEYID = 0
3,525,681 ready_for_fw is high
3,525,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,002 UART: [idev] Erasing UDS.KEYID = 0
6,029,394 UART: [idev] Sha1 KeyId Algorithm
6,052,386 UART: [idev] --
6,056,261 UART: [ldev] ++
6,056,968 UART: [ldev] CDI.KEYID = 6
6,057,881 UART: [ldev] SUBJECT.KEYID = 5
6,059,048 UART: [ldev] AUTHORITY.KEYID = 7
6,060,280 UART: [ldev] FE.KEYID = 1
6,101,385 UART: [ldev] Erasing FE.KEYID = 1
8,606,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,263 UART: [ldev] --
10,412,923 UART: [fwproc] Wait for Commands...
10,415,819 UART: [fwproc] Recv command 0x46574c44
10,418,120 UART: [fwproc] Recv'd Img size: 118548 bytes
15,114,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,196,286 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,319,933 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,879,999 >>> mbox cmd response: success
15,883,258 UART: [afmc] ++
15,883,886 UART: [afmc] CDI.KEYID = 6
15,885,002 UART: [afmc] SUBJECT.KEYID = 7
15,886,560 UART: [afmc] AUTHORITY.KEYID = 5
18,428,457 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,153,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,155,835 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,170,906 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,186,162 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,201,197 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,224,603 UART: [afmc] --
20,227,337 UART: [cold-reset] --
20,231,850 UART: [state] Locking Datavault
20,239,637 UART: [state] Locking PCR0, PCR1 and PCR31
20,241,810 UART: [state] Locking ICCM
20,243,174 UART: [exit] Launching FMC @ 0x40000130
20,251,847 UART:
20,252,079 UART: Running Caliptra FMC ...
20,253,183 UART:
20,253,339 UART: [state] CFI Enabled
20,312,105 UART: [fht] FMC Alias Private Key: 7
22,078,831 UART: [art] Extend RT PCRs Done
22,080,053 UART: [art] Lock RT PCRs Done
22,081,949 UART: [art] Populate DV Done
22,087,464 UART: [fht] FMC Alias Private Key: 7
22,089,052 UART: [art] Derive CDI
22,089,867 UART: [art] Store in slot 0x4
22,145,245 UART: [art] Derive Key Pair
22,146,281 UART: [art] Store priv key in slot 0x5
24,608,750 UART: [art] Derive Key Pair - Done
24,621,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,334,264 UART: [art] Erasing AUTHORITY.KEYID = 7
26,335,774 UART: [art] PUB.X = 5B07DE0F3ECE43D16D843BD033299B2FA1A369F34D5C9893BC5558490AEB9EC55D761BEC49BB6B18413C4CA409CBF481
26,343,049 UART: [art] PUB.Y = FED57559B6CD81B1ED3CF5D5B358493BC786487DA9BDDB1D31C536BDC3C1E4F92C8B55080A14805A57BBC9A6C5B80820
26,350,317 UART: [art] SIG.R = DF65C6642F0151DDB65697875B112CF72E66DF24DC580E8BB243F81DAE569013206DC37B9B8D78914AEC18C6DB708D96
26,357,687 UART: [art] SIG.S = 3521099A6AE77ABE6DEE0CE9B579805E3A45766BB1DDC4084F7F90BF3BE2BD84599CA6353BA85556D05758BB8515F093
27,336,187 UART: Caliptra RT
27,336,876 UART: [state] CFI Enabled
27,518,264 UART: [rt] RT listening for mailbox commands...
27,520,557 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,675,760 UART: [rt]cmd =0x41544d4e, len=14344
32,582,887 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,427,448 ready_for_fw is high
3,427,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,916,692 >>> mbox cmd response: success
20,224,946 UART:
20,225,341 UART: Running Caliptra FMC ...
20,226,482 UART:
20,226,639 UART: [state] CFI Enabled
20,293,421 UART: [fht] FMC Alias Private Key: 7
22,080,744 UART: [art] Extend RT PCRs Done
22,081,970 UART: [art] Lock RT PCRs Done
22,083,651 UART: [art] Populate DV Done
22,089,312 UART: [fht] FMC Alias Private Key: 7
22,091,014 UART: [art] Derive CDI
22,091,830 UART: [art] Store in slot 0x4
22,147,173 UART: [art] Derive Key Pair
22,148,218 UART: [art] Store priv key in slot 0x5
24,610,817 UART: [art] Derive Key Pair - Done
24,623,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,336,296 UART: [art] Erasing AUTHORITY.KEYID = 7
26,337,959 UART: [art] PUB.X = DB7090F44649002F6B61C8BFC19A1CA811C7B38888FDE6772B86265147A58DD47E209F93C5CE13414D4F4088E702D368
26,345,036 UART: [art] PUB.Y = DC0422CE633F792AEA7710793EB43AC1DBD2E5A1A048B9DF46424E3A396F9722DB1D0F0590C2344C7B39E8CB09B8F060
26,352,321 UART: [art] SIG.R = B66FF43C9CB48C214AF3F110174EC9CB742DD4D6F696C9C5417B0AD36A98E771F7803B8AEEFB64C13625A846F2823A15
26,359,699 UART: [art] SIG.S = D3FA5F8C2748E9F29943C81149F8B3DC2F938850728A515490F2DA29A21E41E5F1775BE27FEDCC3EA23E257A6BFAEDD7
27,338,980 UART: Caliptra RT
27,339,690 UART: [state] CFI Enabled
27,519,465 UART: [rt] RT listening for mailbox commands...
27,521,745 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,677,152 UART: [rt]cmd =0x41544d4e, len=14344
32,586,287 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,524 UART:
192,890 UART: Running Caliptra ROM ...
193,995 UART:
603,823 UART: [state] CFI Enabled
621,251 UART: [state] LifecycleState = Unprovisioned
623,624 UART: [state] DebugLocked = No
624,944 UART: [state] WD Timer not started. Device not locked for debugging
629,116 UART: [kat] SHA2-256
819,014 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,830 UART: [kat] ++
830,439 UART: [kat] sha1
840,793 UART: [kat] SHA2-256
843,773 UART: [kat] SHA2-384
850,559 UART: [kat] SHA2-512-ACC
853,151 UART: [kat] ECC-384
3,294,188 UART: [kat] HMAC-384Kdf
3,305,793 UART: [kat] LMS
3,837,660 UART: [kat] --
3,843,584 UART: [cold-reset] ++
3,844,685 UART: [fht] FHT @ 0x50003400
3,856,090 UART: [idev] ++
3,856,743 UART: [idev] CDI.KEYID = 6
3,857,777 UART: [idev] SUBJECT.KEYID = 7
3,858,886 UART: [idev] UDS.KEYID = 0
3,859,821 ready_for_fw is high
3,860,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,853 UART: [idev] Erasing UDS.KEYID = 0
6,337,605 UART: [idev] Sha1 KeyId Algorithm
6,361,157 UART: [idev] --
6,364,751 UART: [ldev] ++
6,365,441 UART: [ldev] CDI.KEYID = 6
6,366,325 UART: [ldev] SUBJECT.KEYID = 5
6,367,538 UART: [ldev] AUTHORITY.KEYID = 7
6,368,724 UART: [ldev] FE.KEYID = 1
6,380,832 UART: [ldev] Erasing FE.KEYID = 1
8,860,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,476 UART: [ldev] --
10,651,094 UART: [fwproc] Wait for Commands...
10,654,001 UART: [fwproc] Recv command 0x46574c44
10,656,260 UART: [fwproc] Recv'd Img size: 118548 bytes
15,310,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,389,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,513,146 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,073,503 >>> mbox cmd response: success
16,077,584 UART: [afmc] ++
16,078,319 UART: [afmc] CDI.KEYID = 6
16,079,523 UART: [afmc] SUBJECT.KEYID = 7
16,080,993 UART: [afmc] AUTHORITY.KEYID = 5
18,584,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,306,859 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,308,784 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,323,899 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,339,108 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,354,134 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,376,557 UART: [afmc] --
20,380,159 UART: [cold-reset] --
20,384,795 UART: [state] Locking Datavault
20,391,358 UART: [state] Locking PCR0, PCR1 and PCR31
20,393,521 UART: [state] Locking ICCM
20,395,622 UART: [exit] Launching FMC @ 0x40000130
20,404,315 UART:
20,404,554 UART: Running Caliptra FMC ...
20,405,662 UART:
20,405,845 UART: [state] CFI Enabled
20,413,686 UART: [fht] FMC Alias Private Key: 7
22,180,679 UART: [art] Extend RT PCRs Done
22,181,912 UART: [art] Lock RT PCRs Done
22,183,301 UART: [art] Populate DV Done
22,188,989 UART: [fht] FMC Alias Private Key: 7
22,190,641 UART: [art] Derive CDI
22,191,458 UART: [art] Store in slot 0x4
22,234,367 UART: [art] Derive Key Pair
22,235,406 UART: [art] Store priv key in slot 0x5
24,662,092 UART: [art] Derive Key Pair - Done
24,675,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,381,597 UART: [art] Erasing AUTHORITY.KEYID = 7
26,383,108 UART: [art] PUB.X = D6C49FE29CDB856A683D3094210D9B8F3B672C4B5CCBF6FE4AD0B654BB990F53F1F1FFCDFD37537900DF96E76B68A24C
26,390,331 UART: [art] PUB.Y = C086D5E0EA16550291B7F7A1F5E46BAB5F5AA3BFC45EE99F2284FC112399A13E54482DA52DBBC09E66350FD3C4F3CE47
26,397,602 UART: [art] SIG.R = 8B965E0D0552076A2F5C86F6A1B9D9DC8E4DCD053E62411EB890E7C8FD3AA1B4D4A6C2661BBAC769CA939593F86F6657
26,405,052 UART: [art] SIG.S = 9070B795E04720287D95B79FED49017B10B4D35CB8E6DD463E378F3E92C66EEF56EE18A1E2C16DCE0A6F22DF2E39F8E0
27,384,317 UART: Caliptra RT
27,385,013 UART: [state] CFI Enabled
27,517,430 UART: [rt] RT listening for mailbox commands...
27,519,822 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,675,181 UART: [rt]cmd =0x41544d4e, len=14344
32,588,240 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,759,325 ready_for_fw is high
3,759,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,151,041 >>> mbox cmd response: success
20,397,143 UART:
20,397,569 UART: Running Caliptra FMC ...
20,398,789 UART:
20,398,967 UART: [state] CFI Enabled
20,407,008 UART: [fht] FMC Alias Private Key: 7
22,173,598 UART: [art] Extend RT PCRs Done
22,174,837 UART: [art] Lock RT PCRs Done
22,176,255 UART: [art] Populate DV Done
22,181,661 UART: [fht] FMC Alias Private Key: 7
22,183,264 UART: [art] Derive CDI
22,184,086 UART: [art] Store in slot 0x4
22,227,133 UART: [art] Derive Key Pair
22,228,132 UART: [art] Store priv key in slot 0x5
24,654,904 UART: [art] Derive Key Pair - Done
24,668,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,375,105 UART: [art] Erasing AUTHORITY.KEYID = 7
26,376,614 UART: [art] PUB.X = 36D33B51E89F35DDB1C65F4B4F17AE4E75AC212EE6953275F2E0624926A04801EB3C9EC4C8651E1E67230C5BDB917A7D
26,383,863 UART: [art] PUB.Y = 381001CF6E422391F4D134E5EE5C5016C02F8F8E667D27A76541919E1C48A72A6CF7056445F934BBB1B2E52160BD318F
26,391,099 UART: [art] SIG.R = 273E6635A7B720D5B9DC31BF33D2C3A60C8DFD12D0A54C3AA2155EFFAB0A105ADE206FD4C2ABC4253884A9585DA6E2BC
26,398,560 UART: [art] SIG.S = 694D38A6FA1BA4D6B5CEF855F65078C5894BDCF30C18628B78AC2767768A8C8C0A4D35153EF9EE3C84B3ACF4A492662D
27,377,751 UART: Caliptra RT
27,378,463 UART: [state] CFI Enabled
27,512,598 UART: [rt] RT listening for mailbox commands...
27,514,902 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,670,226 UART: [rt]cmd =0x41544d4e, len=14344
32,587,145 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,155 UART: [kat] SHA2-256
882,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,201 UART: [kat] ++
886,353 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,230 UART: [kat] SHA2-512-ACC
897,131 UART: [kat] ECC-384
902,596 UART: [kat] HMAC-384Kdf
907,070 UART: [kat] LMS
1,475,266 UART: [kat] --
1,475,983 UART: [cold-reset] ++
1,476,513 UART: [fht] Storing FHT @ 0x50003400
1,479,210 UART: [idev] ++
1,479,378 UART: [idev] CDI.KEYID = 6
1,479,738 UART: [idev] SUBJECT.KEYID = 7
1,480,162 UART: [idev] UDS.KEYID = 0
1,480,507 ready_for_fw is high
1,480,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,138 UART: [idev] Erasing UDS.KEYID = 0
1,504,582 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,162 UART: [idev] --
1,514,241 UART: [ldev] ++
1,514,409 UART: [ldev] CDI.KEYID = 6
1,514,772 UART: [ldev] SUBJECT.KEYID = 5
1,515,198 UART: [ldev] AUTHORITY.KEYID = 7
1,515,661 UART: [ldev] FE.KEYID = 1
1,520,887 UART: [ldev] Erasing FE.KEYID = 1
1,546,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,760 UART: [ldev] --
1,586,141 UART: [fwproc] Waiting for Commands...
1,586,756 UART: [fwproc] Received command 0x46574c44
1,587,547 UART: [fwproc] Received Image of size 118548 bytes
5,243,216 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,271,644 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,302,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,443,111 >>> mbox cmd response: success
5,444,289 UART: [afmc] ++
5,444,457 UART: [afmc] CDI.KEYID = 6
5,444,819 UART: [afmc] SUBJECT.KEYID = 7
5,445,244 UART: [afmc] AUTHORITY.KEYID = 5
5,479,559 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,495,729 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,496,509 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,502,215 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,508,094 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,513,807 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,521,508 UART: [afmc] --
5,522,394 UART: [cold-reset] --
5,523,306 UART: [state] Locking Datavault
5,524,263 UART: [state] Locking PCR0, PCR1 and PCR31
5,524,867 UART: [state] Locking ICCM
5,525,309 UART: [exit] Launching FMC @ 0x40000130
5,530,639 UART:
5,530,655 UART: Running Caliptra FMC ...
5,531,063 UART:
5,531,117 UART: [state] CFI Enabled
5,541,461 UART: [fht] FMC Alias Private Key: 7
5,659,613 UART: [art] Extend RT PCRs Done
5,660,041 UART: [art] Lock RT PCRs Done
5,661,587 UART: [art] Populate DV Done
5,669,696 UART: [fht] FMC Alias Private Key: 7
5,670,728 UART: [art] Derive CDI
5,671,008 UART: [art] Store in slot 0x4
5,756,242 UART: [art] Derive Key Pair
5,756,602 UART: [art] Store priv key in slot 0x5
5,769,335 UART: [art] Derive Key Pair - Done
5,784,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,799,902 UART: [art] Erasing AUTHORITY.KEYID = 7
5,800,667 UART: [art] PUB.X = 953DC6CA778ED91F762784513F0D75D1571BFDEB8A328DF51B21BFFC6E6FDA45E4A71FF2607577BAFA2E375534E4E013
5,807,448 UART: [art] PUB.Y = 7912178478827F469067B5F6458F9328075FF4F4BE56E43EA49840BC063CE042D63F4D04CF275A0AD0A095BD7C28877B
5,814,382 UART: [art] SIG.R = 09D80102E06A717499BE4CB024CB49AC2E738EDDDCCD5FC71DF512B42959F65BA26C080E0499123DBB82A6ADAD3FF41B
5,821,152 UART: [art] SIG.S = 6F092A75AEBDEDA3AD08A4C4BD26694995788DDB5C964D6D579D91775006E4927AE912E0FBF3E085C9E2CA3BC412FB64
5,844,697 UART: Caliptra RT
5,844,948 UART: [state] CFI Enabled
5,964,925 UART: [rt] RT listening for mailbox commands...
5,965,595 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,088,505 UART: [rt]cmd =0x41544d4e, len=14344
10,640,468 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,141 ready_for_fw is high
1,362,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,368,485 >>> mbox cmd response: success
5,429,072 UART:
5,429,088 UART: Running Caliptra FMC ...
5,429,496 UART:
5,429,550 UART: [state] CFI Enabled
5,440,000 UART: [fht] FMC Alias Private Key: 7
5,559,028 UART: [art] Extend RT PCRs Done
5,559,456 UART: [art] Lock RT PCRs Done
5,561,298 UART: [art] Populate DV Done
5,569,431 UART: [fht] FMC Alias Private Key: 7
5,570,525 UART: [art] Derive CDI
5,570,805 UART: [art] Store in slot 0x4
5,656,737 UART: [art] Derive Key Pair
5,657,097 UART: [art] Store priv key in slot 0x5
5,670,150 UART: [art] Derive Key Pair - Done
5,685,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,700,618 UART: [art] Erasing AUTHORITY.KEYID = 7
5,701,383 UART: [art] PUB.X = 3246904F1D20A871E8CF6C4EDAB4476AF94B4510EF7EFD4EC3387F2FD6F27B56CD5E69B4CFFC8C6C01D4013F9E9F7548
5,708,165 UART: [art] PUB.Y = DFB6B4B221A1740B1683C27A64DC0A42D4324FCFA719E10F5D09BF775AD2941CC0D1AE3A8F9899B9919A7965DAD28F6F
5,715,117 UART: [art] SIG.R = 90721567C202741B3711B9C27EA5699F456CEF3495FDFD8355752253411064780D63DAF7361FA5A2FB3E1EED5188BA89
5,721,877 UART: [art] SIG.S = 65964175072B16982DB9D5E56594A08A6231113EA218DD7024427D6C345B1CC182EB5CFA80B048BD30CB61664A4A0D8E
5,745,493 UART: Caliptra RT
5,745,744 UART: [state] CFI Enabled
5,866,512 UART: [rt] RT listening for mailbox commands...
5,867,182 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,990,298 UART: [rt]cmd =0x41544d4e, len=14344
10,731,656 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,168 UART: [kat] SHA2-256
882,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,214 UART: [kat] ++
886,366 UART: [kat] sha1
890,542 UART: [kat] SHA2-256
892,480 UART: [kat] SHA2-384
895,265 UART: [kat] SHA2-512-ACC
897,166 UART: [kat] ECC-384
902,749 UART: [kat] HMAC-384Kdf
907,495 UART: [kat] LMS
1,475,691 UART: [kat] --
1,476,576 UART: [cold-reset] ++
1,477,058 UART: [fht] Storing FHT @ 0x50003400
1,479,981 UART: [idev] ++
1,480,149 UART: [idev] CDI.KEYID = 6
1,480,509 UART: [idev] SUBJECT.KEYID = 7
1,480,933 UART: [idev] UDS.KEYID = 0
1,481,278 ready_for_fw is high
1,481,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,015 UART: [idev] Erasing UDS.KEYID = 0
1,505,037 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,669 UART: [idev] --
1,514,714 UART: [ldev] ++
1,514,882 UART: [ldev] CDI.KEYID = 6
1,515,245 UART: [ldev] SUBJECT.KEYID = 5
1,515,671 UART: [ldev] AUTHORITY.KEYID = 7
1,516,134 UART: [ldev] FE.KEYID = 1
1,521,530 UART: [ldev] Erasing FE.KEYID = 1
1,546,927 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,001 UART: [ldev] --
1,586,398 UART: [fwproc] Waiting for Commands...
1,587,113 UART: [fwproc] Received command 0x46574c44
1,587,904 UART: [fwproc] Received Image of size 118548 bytes
5,167,585 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,195,083 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,226,301 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,366,692 >>> mbox cmd response: success
5,367,926 UART: [afmc] ++
5,368,094 UART: [afmc] CDI.KEYID = 6
5,368,456 UART: [afmc] SUBJECT.KEYID = 7
5,368,881 UART: [afmc] AUTHORITY.KEYID = 5
5,403,498 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,420,086 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,420,866 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,426,572 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,432,451 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,438,164 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,446,117 UART: [afmc] --
5,447,033 UART: [cold-reset] --
5,448,187 UART: [state] Locking Datavault
5,449,554 UART: [state] Locking PCR0, PCR1 and PCR31
5,450,158 UART: [state] Locking ICCM
5,450,780 UART: [exit] Launching FMC @ 0x40000130
5,456,110 UART:
5,456,126 UART: Running Caliptra FMC ...
5,456,534 UART:
5,456,677 UART: [state] CFI Enabled
5,467,685 UART: [fht] FMC Alias Private Key: 7
5,587,111 UART: [art] Extend RT PCRs Done
5,587,539 UART: [art] Lock RT PCRs Done
5,589,079 UART: [art] Populate DV Done
5,597,232 UART: [fht] FMC Alias Private Key: 7
5,598,402 UART: [art] Derive CDI
5,598,682 UART: [art] Store in slot 0x4
5,684,410 UART: [art] Derive Key Pair
5,684,770 UART: [art] Store priv key in slot 0x5
5,697,803 UART: [art] Derive Key Pair - Done
5,712,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,728,169 UART: [art] Erasing AUTHORITY.KEYID = 7
5,728,934 UART: [art] PUB.X = 1D2BA35B5CAAE2C2054F4CDE684F8946E71CB847204E4D9500959CF816B82FAE038D3211DBFB5D3383665D6D4E6214A4
5,735,684 UART: [art] PUB.Y = A4165E57D92B00ED61511B170B6BBD7680E6CC6EE687BB5383E99395EB4DF3B88FB08D341CC9CEC11C9D765D5CCD7F21
5,742,625 UART: [art] SIG.R = 1237E977942604216761646CCB555C7B31F203DADBA254378EDA5EA8F616ED82218016C180D068FBAE34E1C677F372AE
5,749,389 UART: [art] SIG.S = 17BDF570B1A3426B2A8D25339EADF9BFC4D23248472B5A12B1632F86E9BACB9348AE6570C9AD1A51C2EA5605F8C0CCF9
5,772,774 UART: Caliptra RT
5,773,117 UART: [state] CFI Enabled
5,893,892 UART: [rt] RT listening for mailbox commands...
5,894,562 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,017,454 UART: [rt]cmd =0x41544d4e, len=14344
10,872,105 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,526 ready_for_fw is high
1,362,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,481,465 >>> mbox cmd response: success
5,543,450 UART:
5,543,466 UART: Running Caliptra FMC ...
5,543,874 UART:
5,544,017 UART: [state] CFI Enabled
5,554,809 UART: [fht] FMC Alias Private Key: 7
5,673,167 UART: [art] Extend RT PCRs Done
5,673,595 UART: [art] Lock RT PCRs Done
5,674,877 UART: [art] Populate DV Done
5,683,402 UART: [fht] FMC Alias Private Key: 7
5,684,348 UART: [art] Derive CDI
5,684,628 UART: [art] Store in slot 0x4
5,770,228 UART: [art] Derive Key Pair
5,770,588 UART: [art] Store priv key in slot 0x5
5,783,977 UART: [art] Derive Key Pair - Done
5,799,156 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,814,401 UART: [art] Erasing AUTHORITY.KEYID = 7
5,815,166 UART: [art] PUB.X = 6EDE7C18B50AF5704EB7BE0EA0DA2E258A346460A54FB8A4864A9D17FA23107A2281AD81773818E887488B48A8B6FBC4
5,821,938 UART: [art] PUB.Y = 4A55352EA2EEA6AD65A5D6CDCEEFD3A0098F714F06AA88B20A86A3EDD75D559441C48770C8BFDC46C10300B0B1330BFF
5,828,871 UART: [art] SIG.R = BC177049D8B9CCD6BD59E8333C73A9574844E7D72EB7EFBC592019919B4EC7FA4C19AC2EE7F30722DC488B8D252A84D6
5,835,650 UART: [art] SIG.S = 1D4CDD93FEBC87831C1CF63EB99E81A6313121DA0C5043EAB3A529CCA5FD67F7FED1E0DAE16B47DBE8D08D4829634386
5,859,597 UART: Caliptra RT
5,859,940 UART: [state] CFI Enabled
5,979,540 UART: [rt] RT listening for mailbox commands...
5,980,210 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,103,120 UART: [rt]cmd =0x41544d4e, len=14344
11,109,860 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,570 UART: [state] LifecycleState = Unprovisioned
85,225 UART: [state] DebugLocked = No
85,929 UART: [state] WD Timer not started. Device not locked for debugging
87,204 UART: [kat] SHA2-256
890,754 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,858 UART: [kat] ++
895,010 UART: [kat] sha1
899,274 UART: [kat] SHA2-256
901,214 UART: [kat] SHA2-384
903,975 UART: [kat] SHA2-512-ACC
905,876 UART: [kat] ECC-384
915,529 UART: [kat] HMAC-384Kdf
920,115 UART: [kat] LMS
1,168,427 UART: [kat] --
1,169,518 UART: [cold-reset] ++
1,169,942 UART: [fht] FHT @ 0x50003400
1,172,684 UART: [idev] ++
1,172,852 UART: [idev] CDI.KEYID = 6
1,173,213 UART: [idev] SUBJECT.KEYID = 7
1,173,638 UART: [idev] UDS.KEYID = 0
1,173,984 ready_for_fw is high
1,173,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,239 UART: [idev] Sha1 KeyId Algorithm
1,207,165 UART: [idev] --
1,208,222 UART: [ldev] ++
1,208,390 UART: [ldev] CDI.KEYID = 6
1,208,754 UART: [ldev] SUBJECT.KEYID = 5
1,209,181 UART: [ldev] AUTHORITY.KEYID = 7
1,209,644 UART: [ldev] FE.KEYID = 1
1,214,710 UART: [ldev] Erasing FE.KEYID = 1
1,241,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,834 UART: [ldev] --
1,280,169 UART: [fwproc] Wait for Commands...
1,280,760 UART: [fwproc] Recv command 0x46574c44
1,281,493 UART: [fwproc] Recv'd Img size: 118548 bytes
3,167,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,195,855 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,030 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,367,309 >>> mbox cmd response: success
3,368,405 UART: [afmc] ++
3,368,573 UART: [afmc] CDI.KEYID = 6
3,368,936 UART: [afmc] SUBJECT.KEYID = 7
3,369,362 UART: [afmc] AUTHORITY.KEYID = 5
3,404,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,405 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,428,112 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,989 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,699 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,527 UART: [afmc] --
3,448,350 UART: [cold-reset] --
3,449,166 UART: [state] Locking Datavault
3,450,091 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,695 UART: [state] Locking ICCM
3,451,267 UART: [exit] Launching FMC @ 0x40000130
3,456,597 UART:
3,456,613 UART: Running Caliptra FMC ...
3,457,021 UART:
3,457,075 UART: [state] CFI Enabled
3,467,629 UART: [fht] FMC Alias Private Key: 7
3,586,739 UART: [art] Extend RT PCRs Done
3,587,167 UART: [art] Lock RT PCRs Done
3,588,943 UART: [art] Populate DV Done
3,597,216 UART: [fht] FMC Alias Private Key: 7
3,598,246 UART: [art] Derive CDI
3,598,526 UART: [art] Store in slot 0x4
3,684,451 UART: [art] Derive Key Pair
3,684,811 UART: [art] Store priv key in slot 0x5
3,698,369 UART: [art] Derive Key Pair - Done
3,713,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,338 UART: [art] PUB.X = 9070321B174FDE87B21AA9A1BB527358FFEAE48CFB95A0E8BC2771993AC0CB237BA3225836779AFAE432EE611729E352
3,736,116 UART: [art] PUB.Y = 0FA4B8DBAB19CABE196F340B4975704915456F9901031E075F1EDF2AA3448230FFD25548CA8A34F5D52E6F1337CE5902
3,743,052 UART: [art] SIG.R = 3F741504E8F051C698ADDDF4F3D779D033920DC8937E6E50ADC1D793C0B67776830D22AA99ECFC1AAC866F17F7922CC0
3,749,823 UART: [art] SIG.S = 97FCDFAE0F291CB4FC3407D2BF8E767EB92107D13436E4757FC237485D8DE60599BEA80FCBDF71AB53A54014B51F3AE8
3,773,934 UART: Caliptra RT
3,774,185 UART: [state] CFI Enabled
3,894,861 UART: [rt] RT listening for mailbox commands...
3,895,531 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,018,673 UART: [rt]cmd =0x41544d4e, len=14344
5,460,274 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,042 ready_for_fw is high
1,059,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,440 >>> mbox cmd response: success
3,290,655 UART:
3,290,671 UART: Running Caliptra FMC ...
3,291,079 UART:
3,291,133 UART: [state] CFI Enabled
3,301,307 UART: [fht] FMC Alias Private Key: 7
3,420,067 UART: [art] Extend RT PCRs Done
3,420,495 UART: [art] Lock RT PCRs Done
3,421,921 UART: [art] Populate DV Done
3,430,104 UART: [fht] FMC Alias Private Key: 7
3,431,152 UART: [art] Derive CDI
3,431,432 UART: [art] Store in slot 0x4
3,517,309 UART: [art] Derive Key Pair
3,517,669 UART: [art] Store priv key in slot 0x5
3,531,265 UART: [art] Derive Key Pair - Done
3,546,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,561,838 UART: [art] Erasing AUTHORITY.KEYID = 7
3,562,603 UART: [art] PUB.X = 7DBF364D0783926B9A940F15348651DA713160ADCC3A1F554511D063ACF8EA692EEA5632D62CF2888C3D8C13CC5F620E
3,569,370 UART: [art] PUB.Y = 12B2DF4479D3B81FEADEF29AF05A0FA2DDA3BDE5D7F571781832B99A37BB0A880A41069CE977DD40076FBEFBF8261C79
3,576,325 UART: [art] SIG.R = 042D3F2985A6A582CCD74EA9408EF8D942CA8625245A0FBA102BD2A6400FBD9203243B8C7D3746393D40F5B04045344F
3,583,083 UART: [art] SIG.S = 9393CBA3F48D9A67A0747C19A1FE024924A045D9A3E056D3DF206AD3EB7B5E83B32D14AD96E0EFE05DFE67FAE933D7A2
3,606,898 UART: Caliptra RT
3,607,149 UART: [state] CFI Enabled
3,726,559 UART: [rt] RT listening for mailbox commands...
3,727,229 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,850,251 UART: [rt]cmd =0x41544d4e, len=14344
5,311,810 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.71s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,571 UART: [kat] ++
895,723 UART: [kat] sha1
900,057 UART: [kat] SHA2-256
901,997 UART: [kat] SHA2-384
904,624 UART: [kat] SHA2-512-ACC
906,525 UART: [kat] ECC-384
916,218 UART: [kat] HMAC-384Kdf
920,886 UART: [kat] LMS
1,169,198 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,307 UART: [fht] FHT @ 0x50003400
1,172,911 UART: [idev] ++
1,173,079 UART: [idev] CDI.KEYID = 6
1,173,440 UART: [idev] SUBJECT.KEYID = 7
1,173,865 UART: [idev] UDS.KEYID = 0
1,174,211 ready_for_fw is high
1,174,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,858 UART: [idev] Erasing UDS.KEYID = 0
1,198,958 UART: [idev] Sha1 KeyId Algorithm
1,207,896 UART: [idev] --
1,209,145 UART: [ldev] ++
1,209,313 UART: [ldev] CDI.KEYID = 6
1,209,677 UART: [ldev] SUBJECT.KEYID = 5
1,210,104 UART: [ldev] AUTHORITY.KEYID = 7
1,210,567 UART: [ldev] FE.KEYID = 1
1,215,859 UART: [ldev] Erasing FE.KEYID = 1
1,242,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,027 UART: [ldev] --
1,281,298 UART: [fwproc] Wait for Commands...
1,281,881 UART: [fwproc] Recv command 0x46574c44
1,282,614 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,764 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,939 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,372,162 >>> mbox cmd response: success
3,373,290 UART: [afmc] ++
3,373,458 UART: [afmc] CDI.KEYID = 6
3,373,821 UART: [afmc] SUBJECT.KEYID = 7
3,374,247 UART: [afmc] AUTHORITY.KEYID = 5
3,409,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,991 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,740 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,447 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,438,324 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,034 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,768 UART: [afmc] --
3,452,581 UART: [cold-reset] --
3,453,333 UART: [state] Locking Datavault
3,454,554 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,158 UART: [state] Locking ICCM
3,455,716 UART: [exit] Launching FMC @ 0x40000130
3,461,046 UART:
3,461,062 UART: Running Caliptra FMC ...
3,461,470 UART:
3,461,613 UART: [state] CFI Enabled
3,472,053 UART: [fht] FMC Alias Private Key: 7
3,590,875 UART: [art] Extend RT PCRs Done
3,591,303 UART: [art] Lock RT PCRs Done
3,592,613 UART: [art] Populate DV Done
3,600,540 UART: [fht] FMC Alias Private Key: 7
3,601,652 UART: [art] Derive CDI
3,601,932 UART: [art] Store in slot 0x4
3,688,127 UART: [art] Derive Key Pair
3,688,487 UART: [art] Store priv key in slot 0x5
3,701,391 UART: [art] Derive Key Pair - Done
3,715,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,791 UART: [art] PUB.X = 021DA3D5B5B98EFDC91261166A07D64ED08CBFF1F5DE3B35375DF400401E49D53994B0B78A3F4411C43114CCF8187C68
3,738,539 UART: [art] PUB.Y = D2BCD59651D8A30227AACCB62E7AE6580673C154EE6DCC90EFD3CC4873D75B693944781006FAEC1F4DB88B9667506D9A
3,745,492 UART: [art] SIG.R = 4B79E5DD18AC93BDB16EEEE0A4DECD502F696FF25984EEBDED7D9BA211F85DAD19E2B69C9AE239CC84DAB6428CD6C37D
3,752,296 UART: [art] SIG.S = CB0BFA0FD8858E0B91580DD3EC8BCBABDF472C12C09293DEC1866CBC83ABFD0B9CC64472178293FE242484932251BD83
3,776,135 UART: Caliptra RT
3,776,478 UART: [state] CFI Enabled
3,896,862 UART: [rt] RT listening for mailbox commands...
3,897,532 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,472 UART: [rt]cmd =0x41544d4e, len=14344
5,474,576 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,917 ready_for_fw is high
1,059,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,220,986 >>> mbox cmd response: success
3,282,637 UART:
3,282,653 UART: Running Caliptra FMC ...
3,283,061 UART:
3,283,204 UART: [state] CFI Enabled
3,294,124 UART: [fht] FMC Alias Private Key: 7
3,413,888 UART: [art] Extend RT PCRs Done
3,414,316 UART: [art] Lock RT PCRs Done
3,415,700 UART: [art] Populate DV Done
3,423,977 UART: [fht] FMC Alias Private Key: 7
3,425,121 UART: [art] Derive CDI
3,425,401 UART: [art] Store in slot 0x4
3,511,220 UART: [art] Derive Key Pair
3,511,580 UART: [art] Store priv key in slot 0x5
3,525,326 UART: [art] Derive Key Pair - Done
3,540,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,712 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,477 UART: [art] PUB.X = 47D51DC27EEA70AD85EFB5A48F4A931479118529741A1BF4D2EACD2B5B3C7DCF168014E6972C80A867C139538DC4C6D4
3,563,257 UART: [art] PUB.Y = B05018185EAE02CEE8D820D690FC5458FB2B4DBE093DC890FB40C5682CB39FB38DDD1C5638C89A601ACE0B60C39F1E6D
3,570,216 UART: [art] SIG.R = AD6EDE637D3B880E9C514B63AAF5D1585D6ECAD30F22F4F61BDCEE4E0FEAEBBCF40397E85DDF487643909770F0500D38
3,576,993 UART: [art] SIG.S = F94C3CC1DB37092DDA53EF40805EE647FDB6395B5393AE5AAEF6EB9A49672F4EAF1A89015F6C6646F705159459488467
3,601,166 UART: Caliptra RT
3,601,509 UART: [state] CFI Enabled
3,721,076 UART: [rt] RT listening for mailbox commands...
3,721,746 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,476 UART: [rt]cmd =0x41544d4e, len=14344
5,290,727 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.69s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
893,608 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,733 UART: [kat] ++
897,885 UART: [kat] sha1
902,179 UART: [kat] SHA2-256
904,119 UART: [kat] SHA2-384
906,838 UART: [kat] SHA2-512-ACC
908,739 UART: [kat] ECC-384
918,368 UART: [kat] HMAC-384Kdf
923,000 UART: [kat] LMS
1,171,328 UART: [kat] --
1,171,995 UART: [cold-reset] ++
1,172,365 UART: [fht] FHT @ 0x50003400
1,175,062 UART: [idev] ++
1,175,230 UART: [idev] CDI.KEYID = 6
1,175,590 UART: [idev] SUBJECT.KEYID = 7
1,176,014 UART: [idev] UDS.KEYID = 0
1,176,359 ready_for_fw is high
1,176,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,278 UART: [idev] Erasing UDS.KEYID = 0
1,201,077 UART: [idev] Sha1 KeyId Algorithm
1,209,569 UART: [idev] --
1,210,819 UART: [ldev] ++
1,210,987 UART: [ldev] CDI.KEYID = 6
1,211,350 UART: [ldev] SUBJECT.KEYID = 5
1,211,776 UART: [ldev] AUTHORITY.KEYID = 7
1,212,239 UART: [ldev] FE.KEYID = 1
1,217,333 UART: [ldev] Erasing FE.KEYID = 1
1,243,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,939 UART: [ldev] --
1,282,274 UART: [fwproc] Wait for Commands...
1,282,940 UART: [fwproc] Recv command 0x46574c44
1,283,668 UART: [fwproc] Recv'd Img size: 118548 bytes
3,179,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,207,647 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,238,817 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,379,176 >>> mbox cmd response: success
3,380,286 UART: [afmc] ++
3,380,454 UART: [afmc] CDI.KEYID = 6
3,380,816 UART: [afmc] SUBJECT.KEYID = 7
3,381,241 UART: [afmc] AUTHORITY.KEYID = 5
3,417,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,433,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,434,445 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,440,151 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,446,030 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,451,740 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,459,395 UART: [afmc] --
3,460,373 UART: [cold-reset] --
3,461,351 UART: [state] Locking Datavault
3,462,586 UART: [state] Locking PCR0, PCR1 and PCR31
3,463,190 UART: [state] Locking ICCM
3,463,816 UART: [exit] Launching FMC @ 0x40000130
3,469,146 UART:
3,469,162 UART: Running Caliptra FMC ...
3,469,570 UART:
3,469,624 UART: [state] CFI Enabled
3,480,174 UART: [fht] FMC Alias Private Key: 7
3,599,070 UART: [art] Extend RT PCRs Done
3,599,498 UART: [art] Lock RT PCRs Done
3,600,894 UART: [art] Populate DV Done
3,609,383 UART: [fht] FMC Alias Private Key: 7
3,610,361 UART: [art] Derive CDI
3,610,641 UART: [art] Store in slot 0x4
3,696,154 UART: [art] Derive Key Pair
3,696,514 UART: [art] Store priv key in slot 0x5
3,709,662 UART: [art] Derive Key Pair - Done
3,724,378 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,739,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,740,614 UART: [art] PUB.X = F08B996E2A1B0F4AAD149E024E56E06D44C1B8413300BEED46FABD7DA423ABF7B0510B181E2065A4DEF5536ECD174788
3,747,367 UART: [art] PUB.Y = EA2060A3E37E855E7C80D27CD0D27DCA71B502CC46FC5FE98F7F066BF9F921FB79DBFCBD7458C2FC160FFD0DDF2C27E2
3,754,333 UART: [art] SIG.R = 660F38090681AA6B807844FC9813348CDA7004BFF05B631044569945B5FB7F23C9951469B20FC7E47E74F9FD5B887A8B
3,761,084 UART: [art] SIG.S = 112AB45A765E426542EF32678CE7C7F4973A066509BC32F7C03E806017DC9F320050AA2B83E78D64A128EB0590509176
3,784,743 UART: Caliptra RT
3,784,994 UART: [state] CFI Enabled
3,905,680 UART: [rt] RT listening for mailbox commands...
3,906,350 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,694 UART: [rt]cmd =0x41544d4e, len=14344
5,457,744 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,041 ready_for_fw is high
1,060,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,704 >>> mbox cmd response: success
3,285,633 UART:
3,285,649 UART: Running Caliptra FMC ...
3,286,057 UART:
3,286,111 UART: [state] CFI Enabled
3,296,965 UART: [fht] FMC Alias Private Key: 7
3,416,133 UART: [art] Extend RT PCRs Done
3,416,561 UART: [art] Lock RT PCRs Done
3,418,063 UART: [art] Populate DV Done
3,426,058 UART: [fht] FMC Alias Private Key: 7
3,427,230 UART: [art] Derive CDI
3,427,510 UART: [art] Store in slot 0x4
3,512,973 UART: [art] Derive Key Pair
3,513,333 UART: [art] Store priv key in slot 0x5
3,526,707 UART: [art] Derive Key Pair - Done
3,541,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,874 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,639 UART: [art] PUB.X = 7E49A56D4307E9CF5B541CFAAAA48C330A376E69F9C0043639E84753CB2A74C524AB19A7602D9A7634427FFF7C0D58AD
3,564,405 UART: [art] PUB.Y = F1CFF6386F85A1F71FE520CC27C323C7D3BEAA114D1FBFAE7B2D6DCD458A89AD18C47CE4DECCFA3B0F1F5730E5E178D5
3,571,384 UART: [art] SIG.R = C27151CDEE7C72CF42C431A0C9C35C3A3BB5FE590964AA9F5D35FD941D401BAD3EFE9FA5FE4373A21E41096BA0923312
3,578,164 UART: [art] SIG.S = AF1FCDAC74E770AD65918DAE2DD596F7D5B518A137B9AE2BF3E302D80B942172B8B5B27302B510FCD6D4EB0C2616652F
3,602,042 UART: Caliptra RT
3,602,293 UART: [state] CFI Enabled
3,722,240 UART: [rt] RT listening for mailbox commands...
3,722,910 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,876 UART: [rt]cmd =0x41544d4e, len=14344
5,305,490 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
893,241 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,366 UART: [kat] ++
897,518 UART: [kat] sha1
901,878 UART: [kat] SHA2-256
903,818 UART: [kat] SHA2-384
906,633 UART: [kat] SHA2-512-ACC
908,534 UART: [kat] ECC-384
918,927 UART: [kat] HMAC-384Kdf
923,657 UART: [kat] LMS
1,171,985 UART: [kat] --
1,172,806 UART: [cold-reset] ++
1,173,368 UART: [fht] FHT @ 0x50003400
1,175,973 UART: [idev] ++
1,176,141 UART: [idev] CDI.KEYID = 6
1,176,501 UART: [idev] SUBJECT.KEYID = 7
1,176,925 UART: [idev] UDS.KEYID = 0
1,177,270 ready_for_fw is high
1,177,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,753 UART: [idev] Erasing UDS.KEYID = 0
1,202,270 UART: [idev] Sha1 KeyId Algorithm
1,210,830 UART: [idev] --
1,211,960 UART: [ldev] ++
1,212,128 UART: [ldev] CDI.KEYID = 6
1,212,491 UART: [ldev] SUBJECT.KEYID = 5
1,212,917 UART: [ldev] AUTHORITY.KEYID = 7
1,213,380 UART: [ldev] FE.KEYID = 1
1,218,444 UART: [ldev] Erasing FE.KEYID = 1
1,245,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,272 UART: [ldev] --
1,284,779 UART: [fwproc] Wait for Commands...
1,285,511 UART: [fwproc] Recv command 0x46574c44
1,286,239 UART: [fwproc] Recv'd Img size: 118548 bytes
3,177,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,230 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,400 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,377,659 >>> mbox cmd response: success
3,378,769 UART: [afmc] ++
3,378,937 UART: [afmc] CDI.KEYID = 6
3,379,299 UART: [afmc] SUBJECT.KEYID = 7
3,379,724 UART: [afmc] AUTHORITY.KEYID = 5
3,415,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,108 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,814 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,693 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,403 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,064 UART: [afmc] --
3,458,958 UART: [cold-reset] --
3,459,880 UART: [state] Locking Datavault
3,461,081 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,685 UART: [state] Locking ICCM
3,462,105 UART: [exit] Launching FMC @ 0x40000130
3,467,435 UART:
3,467,451 UART: Running Caliptra FMC ...
3,467,859 UART:
3,468,002 UART: [state] CFI Enabled
3,478,726 UART: [fht] FMC Alias Private Key: 7
3,597,970 UART: [art] Extend RT PCRs Done
3,598,398 UART: [art] Lock RT PCRs Done
3,599,900 UART: [art] Populate DV Done
3,608,221 UART: [fht] FMC Alias Private Key: 7
3,609,375 UART: [art] Derive CDI
3,609,655 UART: [art] Store in slot 0x4
3,695,568 UART: [art] Derive Key Pair
3,695,928 UART: [art] Store priv key in slot 0x5
3,709,584 UART: [art] Derive Key Pair - Done
3,724,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,739,805 UART: [art] Erasing AUTHORITY.KEYID = 7
3,740,570 UART: [art] PUB.X = 43F6DD9B3ACF111433F0F84B08EB67C3E36EE035149E906A4BC0FA233468857DDD4560D3627B061666AD7F37AD185CE4
3,747,340 UART: [art] PUB.Y = A3C6D73A5B24837B6A359EF75E98BAB2AD952A9C2552D0A5E1115DAA004E42F1FBE8E85848E8957F5140F68E66126B09
3,754,271 UART: [art] SIG.R = D9C45D00ECB3785F37311FF83B8C4D0E93F89D14D40795E671614668F5337235F0EF9DC4D1ED515400EE236DCFB2F784
3,760,995 UART: [art] SIG.S = 5024BD40ECAE556E23C7BBD7C8FC001EFEDE61F03AA1B693CBC798148010AA32F7656B2A10FBE9B08D5AE00A5D93D601
3,784,693 UART: Caliptra RT
3,785,036 UART: [state] CFI Enabled
3,905,242 UART: [rt] RT listening for mailbox commands...
3,905,912 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,956 UART: [rt]cmd =0x41544d4e, len=14344
5,478,058 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,662 ready_for_fw is high
1,059,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,384 >>> mbox cmd response: success
3,292,301 UART:
3,292,317 UART: Running Caliptra FMC ...
3,292,725 UART:
3,292,868 UART: [state] CFI Enabled
3,303,636 UART: [fht] FMC Alias Private Key: 7
3,422,220 UART: [art] Extend RT PCRs Done
3,422,648 UART: [art] Lock RT PCRs Done
3,424,042 UART: [art] Populate DV Done
3,432,213 UART: [fht] FMC Alias Private Key: 7
3,433,173 UART: [art] Derive CDI
3,433,453 UART: [art] Store in slot 0x4
3,519,310 UART: [art] Derive Key Pair
3,519,670 UART: [art] Store priv key in slot 0x5
3,533,374 UART: [art] Derive Key Pair - Done
3,548,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,706 UART: [art] Erasing AUTHORITY.KEYID = 7
3,564,471 UART: [art] PUB.X = FAC9FD99AFBCC4A6AFAA8385B8AB9CB779739E90A325A567A298E70AFA80560790EAA64E91AFC3B659F56875CD9EDE86
3,571,257 UART: [art] PUB.Y = EDBBE2EB3BB88F08DF76730D690B6DABF408EBA2E7DD4B54A8B3E9831AB62EAC18BD4D7C5021135D4667AD18B8631424
3,578,215 UART: [art] SIG.R = CEB9EEF6639ED93A3D7B0C961330EF37124E4116EFF141F73E24397C154A25F0E501B768F53AFD364C8644AAF8D6AEB6
3,584,991 UART: [art] SIG.S = 9B644FF1B275FBDDD1E3355F9EC53F065A45B2205E6D981A7C4D8D9168EE481914CF5D294BBB2106365D6DCDB6F57666
3,609,141 UART: Caliptra RT
3,609,484 UART: [state] CFI Enabled
3,728,683 UART: [rt] RT listening for mailbox commands...
3,729,353 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,619 UART: [rt]cmd =0x41544d4e, len=14344
5,317,103 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,109 UART:
192,520 UART: Running Caliptra ROM ...
193,673 UART:
193,828 UART: [state] CFI Enabled
261,893 UART: [state] LifecycleState = Unprovisioned
263,895 UART: [state] DebugLocked = No
266,007 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,229 UART: [kat] SHA2-256
440,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,448 UART: [kat] ++
451,938 UART: [kat] sha1
462,917 UART: [kat] SHA2-256
465,634 UART: [kat] SHA2-384
470,431 UART: [kat] SHA2-512-ACC
472,759 UART: [kat] ECC-384
2,767,041 UART: [kat] HMAC-384Kdf
2,799,772 UART: [kat] LMS
3,990,101 UART: [kat] --
3,994,330 UART: [cold-reset] ++
3,996,554 UART: [fht] Storing FHT @ 0x50003400
4,009,668 UART: [idev] ++
4,010,236 UART: [idev] CDI.KEYID = 6
4,011,149 UART: [idev] SUBJECT.KEYID = 7
4,012,401 UART: [idev] UDS.KEYID = 0
4,013,415 ready_for_fw is high
4,013,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,755 UART: [idev] Erasing UDS.KEYID = 0
7,345,904 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,735 UART: [idev] --
7,371,589 UART: [ldev] ++
7,372,188 UART: [ldev] CDI.KEYID = 6
7,373,103 UART: [ldev] SUBJECT.KEYID = 5
7,374,314 UART: [ldev] AUTHORITY.KEYID = 7
7,375,606 UART: [ldev] FE.KEYID = 1
7,420,174 UART: [ldev] Erasing FE.KEYID = 1
10,753,550 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,057,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,836 UART: [ldev] --
13,110,898 UART: [fwproc] Waiting for Commands...
13,113,482 UART: [fwproc] Received command 0x46574c44
13,115,664 UART: [fwproc] Received Image of size 118548 bytes
21,490,565 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,566,210 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,639,359 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,968,557 >>> mbox cmd response: success
21,973,274 UART: [afmc] ++
21,973,887 UART: [afmc] CDI.KEYID = 6
21,974,774 UART: [afmc] SUBJECT.KEYID = 7
21,976,044 UART: [afmc] AUTHORITY.KEYID = 5
25,338,159 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,635,751 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,638,069 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,652,521 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,667,317 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,681,703 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,701,950 UART: [afmc] --
27,706,626 UART: [cold-reset] --
27,711,462 UART: [state] Locking Datavault
27,717,466 UART: [state] Locking PCR0, PCR1 and PCR31
27,719,235 UART: [state] Locking ICCM
27,720,553 UART: [exit] Launching FMC @ 0x40000130
27,728,949 UART:
27,729,183 UART: Running Caliptra FMC ...
27,730,282 UART:
27,730,440 UART: [state] CFI Enabled
27,794,323 UART: [fht] FMC Alias Private Key: 7
30,134,395 UART: [art] Extend RT PCRs Done
30,135,617 UART: [art] Lock RT PCRs Done
30,137,351 UART: [art] Populate DV Done
30,142,657 UART: [fht] FMC Alias Private Key: 7
30,144,339 UART: [art] Derive CDI
30,145,164 UART: [art] Store in slot 0x4
30,202,311 UART: [art] Derive Key Pair
30,203,313 UART: [art] Store priv key in slot 0x5
33,496,276 UART: [art] Derive Key Pair - Done
33,509,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,797,018 UART: [art] Erasing AUTHORITY.KEYID = 7
35,798,528 UART: [art] PUB.X = 0C1FCA4A9CE4B9589B2B8C2C949B0280D7B3672FB2AA98A73C4E4CDEDC50939795F93F7CDA435F0EB4560CCC64EB67B5
35,805,799 UART: [art] PUB.Y = 396E9F96CAFF0645717E11B573109C69C544BD3B0BAB08B4F8ECD7B540116222B2DA750DFEF67CCEF9BCDE2669317249
35,813,059 UART: [art] SIG.R = 1164893A4B460FCB57F59EBC4F4853D5FAFD23560DF10C11F4507F5869B7F7982F5E945BC1C3912F061BEF28B826E558
35,820,421 UART: [art] SIG.S = F49F53915423D1DDDADAC25C780A4384470043B2889D49E28B5357872D83AD33EC7A016B254AAB7D7FFC30E56B600A26
37,125,419 UART: Caliptra RT
37,126,116 UART: [state] CFI Enabled
37,303,379 UART: [rt] RT listening for mailbox commands...
37,305,725 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,460,880 UART: [rt]cmd =0x41544d4e, len=14344
41,577,871 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,805,076 ready_for_fw is high
3,805,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,028,304 >>> mbox cmd response: success
27,719,508 UART:
27,719,944 UART: Running Caliptra FMC ...
27,721,070 UART:
27,721,229 UART: [state] CFI Enabled
27,774,643 UART: [fht] FMC Alias Private Key: 7
30,135,852 UART: [art] Extend RT PCRs Done
30,137,094 UART: [art] Lock RT PCRs Done
30,138,804 UART: [art] Populate DV Done
30,144,347 UART: [fht] FMC Alias Private Key: 7
30,145,899 UART: [art] Derive CDI
30,146,668 UART: [art] Store in slot 0x4
30,203,877 UART: [art] Derive Key Pair
30,204,879 UART: [art] Store priv key in slot 0x5
33,497,270 UART: [art] Derive Key Pair - Done
33,510,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,799,377 UART: [art] Erasing AUTHORITY.KEYID = 7
35,800,891 UART: [art] PUB.X = D7C541E90381C247CC5D9E933FE6289CC41EE0AB5C166F6D75C441478F4CEEDEF52392DF5E9154B5046BF7835E099DE8
35,808,229 UART: [art] PUB.Y = 43BAABD90355210E729ECB52A5A5D4AEC014E646A1834E689AB22E9FB487120A8E8DD04142BC13CDC7905766208561AF
35,815,448 UART: [art] SIG.R = BFB41B5FC79E2B9D2E5F7B56E4CCEB094A3F331B89164D0B3EF8574E8A7A5E24B0401A4A9D1B7FE6A30D2B43FBFB77A4
35,822,905 UART: [art] SIG.S = 7D683CA1B8497C1301CAF2219064D75A835ED489E3B60E8B5B25C73CABC83979FA9E4E174D2463BCF90B4E4F1880786A
37,127,817 UART: Caliptra RT
37,128,534 UART: [state] CFI Enabled
37,305,690 UART: [rt] RT listening for mailbox commands...
37,308,009 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,463,498 UART: [rt]cmd =0x41544d4e, len=14344
41,580,651 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,463 UART:
192,823 UART: Running Caliptra ROM ...
194,184 UART:
603,865 UART: [state] CFI Enabled
618,376 UART: [state] LifecycleState = Unprovisioned
620,301 UART: [state] DebugLocked = No
622,887 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,362 UART: [kat] SHA2-256
798,135 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,662 UART: [kat] ++
809,109 UART: [kat] sha1
819,766 UART: [kat] SHA2-256
822,489 UART: [kat] SHA2-384
826,693 UART: [kat] SHA2-512-ACC
828,991 UART: [kat] ECC-384
3,114,989 UART: [kat] HMAC-384Kdf
3,126,438 UART: [kat] LMS
4,316,555 UART: [kat] --
4,321,356 UART: [cold-reset] ++
4,323,575 UART: [fht] Storing FHT @ 0x50003400
4,335,474 UART: [idev] ++
4,336,038 UART: [idev] CDI.KEYID = 6
4,336,945 UART: [idev] SUBJECT.KEYID = 7
4,338,180 UART: [idev] UDS.KEYID = 0
4,339,254 ready_for_fw is high
4,339,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,316 UART: [idev] Erasing UDS.KEYID = 0
7,627,132 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,229 UART: [idev] --
7,651,441 UART: [ldev] ++
7,652,012 UART: [ldev] CDI.KEYID = 6
7,653,026 UART: [ldev] SUBJECT.KEYID = 5
7,654,180 UART: [ldev] AUTHORITY.KEYID = 7
7,655,456 UART: [ldev] FE.KEYID = 1
7,665,447 UART: [ldev] Erasing FE.KEYID = 1
10,953,734 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,568 UART: [ldev] --
13,312,585 UART: [fwproc] Waiting for Commands...
13,314,919 UART: [fwproc] Received command 0x46574c44
13,317,131 UART: [fwproc] Received Image of size 118548 bytes
22,243,005 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,321,948 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,395,167 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,723,949 >>> mbox cmd response: success
22,728,647 UART: [afmc] ++
22,729,260 UART: [afmc] CDI.KEYID = 6
22,730,165 UART: [afmc] SUBJECT.KEYID = 7
22,731,428 UART: [afmc] AUTHORITY.KEYID = 5
26,051,255 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,346,136 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,348,386 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,362,909 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,377,673 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,392,039 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,413,023 UART: [afmc] --
28,416,310 UART: [cold-reset] --
28,419,409 UART: [state] Locking Datavault
28,426,104 UART: [state] Locking PCR0, PCR1 and PCR31
28,427,799 UART: [state] Locking ICCM
28,429,704 UART: [exit] Launching FMC @ 0x40000130
28,438,095 UART:
28,438,371 UART: Running Caliptra FMC ...
28,439,475 UART:
28,439,621 UART: [state] CFI Enabled
28,447,392 UART: [fht] FMC Alias Private Key: 7
30,788,086 UART: [art] Extend RT PCRs Done
30,789,313 UART: [art] Lock RT PCRs Done
30,790,660 UART: [art] Populate DV Done
30,796,066 UART: [fht] FMC Alias Private Key: 7
30,797,659 UART: [art] Derive CDI
30,798,415 UART: [art] Store in slot 0x4
30,841,187 UART: [art] Derive Key Pair
30,842,229 UART: [art] Store priv key in slot 0x5
34,084,267 UART: [art] Derive Key Pair - Done
34,097,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,377,165 UART: [art] Erasing AUTHORITY.KEYID = 7
36,378,673 UART: [art] PUB.X = 9E8858BA92BA749FE759883E648A6B491FCDF211B3A681A926D79C6893A5A628216751E49FCE30FD869F927D9DFD9BFC
36,385,979 UART: [art] PUB.Y = 7B50C76F0324C09EDC2D785A15968B79BD27410B12665728EE22BB74BCD68226EEB370F89005D7B78F9FA9E7E81F0C9C
36,393,216 UART: [art] SIG.R = 45CFCB97382F78FBE2BA8BCABCDEBAE2C00AD21BEDACB6A8F88C585EDBAF36C300450C052F4CB8ED2C8C3794856E4AFA
36,400,665 UART: [art] SIG.S = CD7C6AE9AF4F7F63C95B3F9307DB531F3FB19B6547530AECCCB34DDAFCD0BE4F9EE089EF0DC06D196E0BA08E76BE8A14
37,706,070 UART: Caliptra RT
37,706,783 UART: [state] CFI Enabled
37,839,965 UART: [rt] RT listening for mailbox commands...
37,842,249 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,997,485 UART: [rt]cmd =0x41544d4e, len=14344
42,063,100 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
4,126,179 ready_for_fw is high
4,126,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,415,510 >>> mbox cmd response: success
28,053,005 UART:
28,053,429 UART: Running Caliptra FMC ...
28,054,641 UART:
28,054,806 UART: [state] CFI Enabled
28,062,953 UART: [fht] FMC Alias Private Key: 7
30,403,404 UART: [art] Extend RT PCRs Done
30,404,631 UART: [art] Lock RT PCRs Done
30,406,158 UART: [art] Populate DV Done
30,411,930 UART: [fht] FMC Alias Private Key: 7
30,413,527 UART: [art] Derive CDI
30,414,338 UART: [art] Store in slot 0x4
30,456,717 UART: [art] Derive Key Pair
30,457,710 UART: [art] Store priv key in slot 0x5
33,699,443 UART: [art] Derive Key Pair - Done
33,712,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,992,879 UART: [art] Erasing AUTHORITY.KEYID = 7
35,994,415 UART: [art] PUB.X = 0D521CA391409DF5C9BE142DBF88BB37F01CEBF9B3E10A5DCB36C9A6956050A82BB3BF1FD19334D43315B1B71CD3F458
36,001,716 UART: [art] PUB.Y = 027C5112A70F7AD95020036C81CF6ABCE6AD2C599B37F7A57480D776EA4CF4101515B8D1C5CC749A69C46003925A4BC4
36,008,929 UART: [art] SIG.R = 51F40328086B73D649908E15C18CCEE572D92009E1A916A5763A2A0422BF5F185255078EBAB3C4F52395680DC1789D15
36,016,317 UART: [art] SIG.S = EAA04D56EFD4C4D0C6929DE42B8C004AE10815BBB083B640E2942E96A818CB6AF68EB8529612AE786D6B31928386E1D2
37,321,449 UART: Caliptra RT
37,322,161 UART: [state] CFI Enabled
37,456,246 UART: [rt] RT listening for mailbox commands...
37,458,574 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,614,012 UART: [rt]cmd =0x41544d4e, len=14344
41,705,004 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,149 UART:
192,520 UART: Running Caliptra ROM ...
193,648 UART:
193,792 UART: [state] CFI Enabled
263,725 UART: [state] LifecycleState = Unprovisioned
266,062 UART: [state] DebugLocked = No
267,281 UART: [state] WD Timer not started. Device not locked for debugging
270,347 UART: [kat] SHA2-256
449,964 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,749 UART: [kat] ++
461,190 UART: [kat] sha1
473,126 UART: [kat] SHA2-256
475,775 UART: [kat] SHA2-384
480,926 UART: [kat] SHA2-512-ACC
483,293 UART: [kat] ECC-384
2,950,009 UART: [kat] HMAC-384Kdf
2,971,199 UART: [kat] LMS
3,447,729 UART: [kat] --
3,452,500 UART: [cold-reset] ++
3,454,428 UART: [fht] FHT @ 0x50003400
3,465,768 UART: [idev] ++
3,466,373 UART: [idev] CDI.KEYID = 6
3,467,290 UART: [idev] SUBJECT.KEYID = 7
3,468,393 UART: [idev] UDS.KEYID = 0
3,469,385 ready_for_fw is high
3,469,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,562 UART: [idev] Erasing UDS.KEYID = 0
5,989,719 UART: [idev] Sha1 KeyId Algorithm
6,013,769 UART: [idev] --
6,018,117 UART: [ldev] ++
6,018,747 UART: [ldev] CDI.KEYID = 6
6,019,626 UART: [ldev] SUBJECT.KEYID = 5
6,020,837 UART: [ldev] AUTHORITY.KEYID = 7
6,022,131 UART: [ldev] FE.KEYID = 1
6,058,724 UART: [ldev] Erasing FE.KEYID = 1
8,565,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,839 UART: [ldev] --
10,375,858 UART: [fwproc] Wait for Commands...
10,377,892 UART: [fwproc] Recv command 0x46574c44
10,379,931 UART: [fwproc] Recv'd Img size: 118548 bytes
14,941,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,027,665 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,100,629 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,429,323 >>> mbox cmd response: success
15,433,705 UART: [afmc] ++
15,434,285 UART: [afmc] CDI.KEYID = 6
15,435,219 UART: [afmc] SUBJECT.KEYID = 7
15,436,484 UART: [afmc] AUTHORITY.KEYID = 5
17,979,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,704,065 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,706,305 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,722,169 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,738,060 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,753,771 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,778,041 UART: [afmc] --
19,782,447 UART: [cold-reset] --
19,786,255 UART: [state] Locking Datavault
19,792,743 UART: [state] Locking PCR0, PCR1 and PCR31
19,794,500 UART: [state] Locking ICCM
19,796,324 UART: [exit] Launching FMC @ 0x40000130
19,804,714 UART:
19,804,954 UART: Running Caliptra FMC ...
19,806,051 UART:
19,806,210 UART: [state] CFI Enabled
19,861,751 UART: [fht] FMC Alias Private Key: 7
21,628,421 UART: [art] Extend RT PCRs Done
21,629,636 UART: [art] Lock RT PCRs Done
21,631,072 UART: [art] Populate DV Done
21,636,492 UART: [fht] FMC Alias Private Key: 7
21,638,243 UART: [art] Derive CDI
21,638,979 UART: [art] Store in slot 0x4
21,694,383 UART: [art] Derive Key Pair
21,695,380 UART: [art] Store priv key in slot 0x5
24,158,237 UART: [art] Derive Key Pair - Done
24,171,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,884,023 UART: [art] Erasing AUTHORITY.KEYID = 7
25,885,529 UART: [art] PUB.X = 03C9455A12C39BD37A992DDD9D2D7D31E7707FE0E370D71A444B58B9D2D7B5FB98E659440181DCE448B9EA81525C7BFA
25,892,779 UART: [art] PUB.Y = 789559969B9C069F4A9917EF9BB157F08E4BB2480DE97BA0B35480609126AA4F0CBECDD993A849965A041FFE513B1C6F
25,900,056 UART: [art] SIG.R = 87CE09BF4C7E26D9B2434A882822673EEEA2739B22E2453C7203981E34C5A05F0D93A91BA5C6B99E48997E01863BB27F
25,907,455 UART: [art] SIG.S = 46C70A25BCC7DF2B1FCF77EC703E6D4073C71004E7C2750421C13C9B348FB6CC9B6EADCD737D02165A8AC2FA183FA3E6
26,886,230 UART: Caliptra RT
26,886,957 UART: [state] CFI Enabled
27,066,444 UART: [rt] RT listening for mailbox commands...
27,068,778 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,224,012 UART: [rt]cmd =0x41544d4e, len=14344
29,607,644 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,459,200 ready_for_fw is high
3,459,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,408,457 >>> mbox cmd response: success
19,682,911 UART:
19,683,283 UART: Running Caliptra FMC ...
19,684,473 UART:
19,684,633 UART: [state] CFI Enabled
19,754,088 UART: [fht] FMC Alias Private Key: 7
21,520,271 UART: [art] Extend RT PCRs Done
21,521,512 UART: [art] Lock RT PCRs Done
21,523,133 UART: [art] Populate DV Done
21,528,606 UART: [fht] FMC Alias Private Key: 7
21,530,260 UART: [art] Derive CDI
21,531,077 UART: [art] Store in slot 0x4
21,586,933 UART: [art] Derive Key Pair
21,587,969 UART: [art] Store priv key in slot 0x5
24,050,967 UART: [art] Derive Key Pair - Done
24,064,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,776,689 UART: [art] Erasing AUTHORITY.KEYID = 7
25,778,195 UART: [art] PUB.X = 7E7F363B04F8D3B25F4B4156E02FD8C99AF5D835D7B2C6F63BD08BB6BA9DA6F0F3CEE724D1D8354D17FEAED86E19413E
25,785,443 UART: [art] PUB.Y = 09064B081644C1452EAB1050523ECF2789F8664001DE433B62E585F7A10CC0B47D28288914D3C01262E6CE2A637F247F
25,792,693 UART: [art] SIG.R = 95A8E99A2AE48F6A6641BC2429597890C36A90CE6BE6BE45685FE008343EEC40D23A1B38CDFA00F6A829D5D06D531E26
25,800,086 UART: [art] SIG.S = E42FD1F9FCF897BBD302A61E046AED9B4C62C93B0A443E59918C39E698D0497544CCF732A8D065175255D795F667F1ED
26,779,213 UART: Caliptra RT
26,779,903 UART: [state] CFI Enabled
26,960,736 UART: [rt] RT listening for mailbox commands...
26,963,132 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,118,379 UART: [rt]cmd =0x41544d4e, len=14344
29,495,405 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,478 UART:
192,838 UART: Running Caliptra ROM ...
193,981 UART:
603,501 UART: [state] CFI Enabled
615,739 UART: [state] LifecycleState = Unprovisioned
617,730 UART: [state] DebugLocked = No
619,195 UART: [state] WD Timer not started. Device not locked for debugging
623,330 UART: [kat] SHA2-256
802,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,739 UART: [kat] ++
814,188 UART: [kat] sha1
824,071 UART: [kat] SHA2-256
826,724 UART: [kat] SHA2-384
831,863 UART: [kat] SHA2-512-ACC
834,243 UART: [kat] ECC-384
3,274,004 UART: [kat] HMAC-384Kdf
3,287,730 UART: [kat] LMS
3,764,279 UART: [kat] --
3,768,322 UART: [cold-reset] ++
3,770,050 UART: [fht] FHT @ 0x50003400
3,782,596 UART: [idev] ++
3,783,165 UART: [idev] CDI.KEYID = 6
3,784,078 UART: [idev] SUBJECT.KEYID = 7
3,785,329 UART: [idev] UDS.KEYID = 0
3,786,256 ready_for_fw is high
3,786,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,292 UART: [idev] Erasing UDS.KEYID = 0
6,261,589 UART: [idev] Sha1 KeyId Algorithm
6,284,814 UART: [idev] --
6,290,120 UART: [ldev] ++
6,290,698 UART: [ldev] CDI.KEYID = 6
6,291,579 UART: [ldev] SUBJECT.KEYID = 5
6,292,793 UART: [ldev] AUTHORITY.KEYID = 7
6,294,083 UART: [ldev] FE.KEYID = 1
6,304,293 UART: [ldev] Erasing FE.KEYID = 1
8,786,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,731 UART: [ldev] --
10,580,374 UART: [fwproc] Wait for Commands...
10,582,259 UART: [fwproc] Recv command 0x46574c44
10,584,302 UART: [fwproc] Recv'd Img size: 118548 bytes
15,129,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,212,342 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,285,361 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,612,764 >>> mbox cmd response: success
15,616,889 UART: [afmc] ++
15,617,504 UART: [afmc] CDI.KEYID = 6
15,618,418 UART: [afmc] SUBJECT.KEYID = 7
15,619,585 UART: [afmc] AUTHORITY.KEYID = 5
18,118,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,840,273 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,842,508 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,858,335 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,874,254 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,889,975 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,913,265 UART: [afmc] --
19,916,817 UART: [cold-reset] --
19,921,440 UART: [state] Locking Datavault
19,928,364 UART: [state] Locking PCR0, PCR1 and PCR31
19,930,121 UART: [state] Locking ICCM
19,932,108 UART: [exit] Launching FMC @ 0x40000130
19,940,505 UART:
19,940,743 UART: Running Caliptra FMC ...
19,941,866 UART:
19,942,029 UART: [state] CFI Enabled
19,949,817 UART: [fht] FMC Alias Private Key: 7
21,716,592 UART: [art] Extend RT PCRs Done
21,717,820 UART: [art] Lock RT PCRs Done
21,719,499 UART: [art] Populate DV Done
21,725,343 UART: [fht] FMC Alias Private Key: 7
21,726,821 UART: [art] Derive CDI
21,727,592 UART: [art] Store in slot 0x4
21,770,624 UART: [art] Derive Key Pair
21,771,626 UART: [art] Store priv key in slot 0x5
24,198,419 UART: [art] Derive Key Pair - Done
24,211,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,918,199 UART: [art] Erasing AUTHORITY.KEYID = 7
25,919,692 UART: [art] PUB.X = 825E9AEFB652712C4785E748152054EF1492F9ACD88E1E907792E68EE4BC2B9BBAB2CD6CAD4B0B26462AD6B977D930AD
25,926,988 UART: [art] PUB.Y = 79BBC7B935E15089598B027BDA66D2C65EA0483FA0F9AB194B6A1E2E85603BFCA40B6B4C306EAFCC876C23FC9328C69B
25,934,238 UART: [art] SIG.R = FF4E4DDCB89D218DCBC848C748900DBB4B7261595CC13B1EED8AD8710B0B808B9A883E26878EB6785516ED3397C4BBDE
25,941,626 UART: [art] SIG.S = B13AA6DA08CDA556D6976CC568778B2FCEAE8C8CD9FC96C6005B42A6A9D9F4B3BF9F600C8A0099E77291D316A511A5C9
26,920,427 UART: Caliptra RT
26,921,131 UART: [state] CFI Enabled
27,054,412 UART: [rt] RT listening for mailbox commands...
27,056,855 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,212,318 UART: [rt]cmd =0x41544d4e, len=14344
29,598,348 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
3,782,813 ready_for_fw is high
3,783,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,624,635 >>> mbox cmd response: success
19,876,312 UART:
19,876,697 UART: Running Caliptra FMC ...
19,877,835 UART:
19,877,991 UART: [state] CFI Enabled
19,886,058 UART: [fht] FMC Alias Private Key: 7
21,652,475 UART: [art] Extend RT PCRs Done
21,653,700 UART: [art] Lock RT PCRs Done
21,655,626 UART: [art] Populate DV Done
21,661,215 UART: [fht] FMC Alias Private Key: 7
21,662,706 UART: [art] Derive CDI
21,663,471 UART: [art] Store in slot 0x4
21,706,118 UART: [art] Derive Key Pair
21,707,143 UART: [art] Store priv key in slot 0x5
24,134,171 UART: [art] Derive Key Pair - Done
24,147,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,853,032 UART: [art] Erasing AUTHORITY.KEYID = 7
25,854,541 UART: [art] PUB.X = 93BC285B12F4F207D9228F4DF82B6933D69934EFBAE3037C0F0CEE435FC35BB3D7A2DB35E3807FD65143FC03773EB176
25,861,798 UART: [art] PUB.Y = 61F4121B2F14C309A60C9A39D03E7C52595CB454C441BC566104014E0BBA6588C0CA2AEC37A62A8E244889AA5AFF6AA4
25,869,078 UART: [art] SIG.R = 3D155E12A993E3EA547D0B5CAE5A2DD32A2FD54965F890150C5A62D75930ACD81EA4DAC1A172E99DBD59E9679A363DED
25,876,436 UART: [art] SIG.S = 53B7E8F29ACB80205AC66FF1183A4AC38E68E723AAB6E7DC6D0A2F94B1D5F9AB5DBEB9F1E946AA7A82E4A13B14032A88
26,855,221 UART: Caliptra RT
26,855,917 UART: [state] CFI Enabled
26,989,075 UART: [rt] RT listening for mailbox commands...
26,991,383 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,146,753 UART: [rt]cmd =0x41544d4e, len=14344
29,532,976 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,203 UART:
192,564 UART: Running Caliptra ROM ...
193,755 UART:
193,908 UART: [state] CFI Enabled
263,965 UART: [state] LifecycleState = Unprovisioned
266,364 UART: [state] DebugLocked = No
268,819 UART: [state] WD Timer not started. Device not locked for debugging
273,122 UART: [kat] SHA2-256
462,986 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,752 UART: [kat] ++
474,252 UART: [kat] sha1
486,902 UART: [kat] SHA2-256
489,927 UART: [kat] SHA2-384
495,564 UART: [kat] SHA2-512-ACC
498,141 UART: [kat] ECC-384
2,946,822 UART: [kat] HMAC-384Kdf
2,970,779 UART: [kat] LMS
3,502,548 UART: [kat] --
3,508,256 UART: [cold-reset] ++
3,509,145 UART: [fht] FHT @ 0x50003400
3,521,189 UART: [idev] ++
3,521,826 UART: [idev] CDI.KEYID = 6
3,522,852 UART: [idev] SUBJECT.KEYID = 7
3,524,021 UART: [idev] UDS.KEYID = 0
3,524,950 ready_for_fw is high
3,525,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,306 UART: [idev] Erasing UDS.KEYID = 0
6,029,847 UART: [idev] Sha1 KeyId Algorithm
6,051,868 UART: [idev] --
6,057,587 UART: [ldev] ++
6,058,270 UART: [ldev] CDI.KEYID = 6
6,059,154 UART: [ldev] SUBJECT.KEYID = 5
6,060,367 UART: [ldev] AUTHORITY.KEYID = 7
6,061,542 UART: [ldev] FE.KEYID = 1
6,100,954 UART: [ldev] Erasing FE.KEYID = 1
8,602,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,852 UART: [ldev] --
10,395,256 UART: [fwproc] Wait for Commands...
10,397,839 UART: [fwproc] Recv command 0x46574c44
10,400,152 UART: [fwproc] Recv'd Img size: 118548 bytes
15,094,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,171,695 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,295,310 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,856,187 >>> mbox cmd response: success
15,859,754 UART: [afmc] ++
15,860,454 UART: [afmc] CDI.KEYID = 6
15,861,702 UART: [afmc] SUBJECT.KEYID = 7
15,863,147 UART: [afmc] AUTHORITY.KEYID = 5
18,409,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,131,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,133,789 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,148,906 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,164,098 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,179,115 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,203,915 UART: [afmc] --
20,207,507 UART: [cold-reset] --
20,211,982 UART: [state] Locking Datavault
20,218,161 UART: [state] Locking PCR0, PCR1 and PCR31
20,220,310 UART: [state] Locking ICCM
20,221,481 UART: [exit] Launching FMC @ 0x40000130
20,230,144 UART:
20,230,389 UART: Running Caliptra FMC ...
20,231,488 UART:
20,231,641 UART: [state] CFI Enabled
20,289,674 UART: [fht] FMC Alias Private Key: 7
22,056,250 UART: [art] Extend RT PCRs Done
22,057,474 UART: [art] Lock RT PCRs Done
22,059,071 UART: [art] Populate DV Done
22,064,424 UART: [fht] FMC Alias Private Key: 7
22,065,941 UART: [art] Derive CDI
22,066,680 UART: [art] Store in slot 0x4
22,122,524 UART: [art] Derive Key Pair
22,123,541 UART: [art] Store priv key in slot 0x5
24,586,861 UART: [art] Derive Key Pair - Done
24,599,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,313,041 UART: [art] Erasing AUTHORITY.KEYID = 7
26,314,552 UART: [art] PUB.X = F22E542D9D053CF35710FD7B4F7DF3B5EF211CB09C24A7A2491BBBAD74CAA7161FFA4BA4F0533E7D0D2DC4B08210C3DB
26,321,882 UART: [art] PUB.Y = EF28D108F75B423B32DE5A428F159C78FDE670B504DA17EEAA4B3FA0C4814B3FF2CF875CE6CB90A4E0FE5281361FE633
26,329,140 UART: [art] SIG.R = 10D8C42A966A0A672370C78CB1FF63A267A8875EC1381FAB3D7D6E1D34A2347CFD7651EDF87F70D71C75BE8D776CADE2
26,336,566 UART: [art] SIG.S = AB676E81BDB1C260027F7727E3DB7A834517F426DA0A778E4E811DF960575AA3E69D85CD9AAF092A827E4CF7EB843DFB
27,315,563 UART: Caliptra RT
27,316,273 UART: [state] CFI Enabled
27,497,042 UART: [rt] RT listening for mailbox commands...
27,499,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,654,722 UART: [rt]cmd =0x41544d4e, len=14344
30,038,556 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,439,215 ready_for_fw is high
3,439,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,932,656 >>> mbox cmd response: success
20,223,366 UART:
20,223,742 UART: Running Caliptra FMC ...
20,224,882 UART:
20,225,043 UART: [state] CFI Enabled
20,289,773 UART: [fht] FMC Alias Private Key: 7
22,056,234 UART: [art] Extend RT PCRs Done
22,057,464 UART: [art] Lock RT PCRs Done
22,058,982 UART: [art] Populate DV Done
22,064,698 UART: [fht] FMC Alias Private Key: 7
22,066,348 UART: [art] Derive CDI
22,067,184 UART: [art] Store in slot 0x4
22,122,283 UART: [art] Derive Key Pair
22,123,322 UART: [art] Store priv key in slot 0x5
24,586,279 UART: [art] Derive Key Pair - Done
24,599,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,311,816 UART: [art] Erasing AUTHORITY.KEYID = 7
26,313,336 UART: [art] PUB.X = 1BB27A77D39200CC3EABED7931333EFC08C748E914DA77D85399385239EAAAD3499248F13C5595E21862E58821934AC1
26,320,561 UART: [art] PUB.Y = 8C55AB4FC878D2AEF56472B8805993F7E811800761ADE2549848FBE3990DD0BB80791B9C6BA2236BCD3BF08C9AB2C024
26,327,789 UART: [art] SIG.R = 0191B2AFAEE773D3894662F8C16712A3FE54D9C3A2A3BFF3860B914D13076F3263C50AE20AEDC85A96EFE3DAB5EC8121
26,335,213 UART: [art] SIG.S = 99044EF8C94F68A5DA4EE5A9D8953C45DBA60E93DCB9F31C6DED1BD786C2A58C4BEEE379DE9E89222BEFFA9BB07FB4D4
27,314,311 UART: Caliptra RT
27,315,024 UART: [state] CFI Enabled
27,494,085 UART: [rt] RT listening for mailbox commands...
27,496,492 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,651,651 UART: [rt]cmd =0x41544d4e, len=14344
30,028,104 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,592 UART:
192,949 UART: Running Caliptra ROM ...
194,175 UART:
603,922 UART: [state] CFI Enabled
615,398 UART: [state] LifecycleState = Unprovisioned
617,798 UART: [state] DebugLocked = No
620,319 UART: [state] WD Timer not started. Device not locked for debugging
624,913 UART: [kat] SHA2-256
814,755 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,544 UART: [kat] ++
826,067 UART: [kat] sha1
837,442 UART: [kat] SHA2-256
840,450 UART: [kat] SHA2-384
847,017 UART: [kat] SHA2-512-ACC
849,617 UART: [kat] ECC-384
3,291,493 UART: [kat] HMAC-384Kdf
3,304,596 UART: [kat] LMS
3,836,397 UART: [kat] --
3,842,274 UART: [cold-reset] ++
3,843,294 UART: [fht] FHT @ 0x50003400
3,854,990 UART: [idev] ++
3,855,701 UART: [idev] CDI.KEYID = 6
3,856,613 UART: [idev] SUBJECT.KEYID = 7
3,857,866 UART: [idev] UDS.KEYID = 0
3,858,796 ready_for_fw is high
3,858,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,853 UART: [idev] Erasing UDS.KEYID = 0
6,334,660 UART: [idev] Sha1 KeyId Algorithm
6,357,947 UART: [idev] --
6,364,213 UART: [ldev] ++
6,364,897 UART: [ldev] CDI.KEYID = 6
6,365,786 UART: [ldev] SUBJECT.KEYID = 5
6,367,003 UART: [ldev] AUTHORITY.KEYID = 7
6,368,139 UART: [ldev] FE.KEYID = 1
6,380,215 UART: [ldev] Erasing FE.KEYID = 1
8,861,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,680 UART: [ldev] --
10,650,217 UART: [fwproc] Wait for Commands...
10,653,228 UART: [fwproc] Recv command 0x46574c44
10,655,539 UART: [fwproc] Recv'd Img size: 118548 bytes
15,339,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,418,862 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,542,466 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,102,977 >>> mbox cmd response: success
16,107,131 UART: [afmc] ++
16,107,858 UART: [afmc] CDI.KEYID = 6
16,109,078 UART: [afmc] SUBJECT.KEYID = 7
16,110,533 UART: [afmc] AUTHORITY.KEYID = 5
18,614,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,336,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,338,584 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,353,693 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,368,951 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,384,016 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,408,958 UART: [afmc] --
20,412,135 UART: [cold-reset] --
20,415,953 UART: [state] Locking Datavault
20,420,026 UART: [state] Locking PCR0, PCR1 and PCR31
20,422,193 UART: [state] Locking ICCM
20,424,819 UART: [exit] Launching FMC @ 0x40000130
20,433,453 UART:
20,433,697 UART: Running Caliptra FMC ...
20,434,748 UART:
20,434,902 UART: [state] CFI Enabled
20,443,172 UART: [fht] FMC Alias Private Key: 7
22,210,128 UART: [art] Extend RT PCRs Done
22,211,493 UART: [art] Lock RT PCRs Done
22,212,726 UART: [art] Populate DV Done
22,217,877 UART: [fht] FMC Alias Private Key: 7
22,219,475 UART: [art] Derive CDI
22,220,299 UART: [art] Store in slot 0x4
22,262,629 UART: [art] Derive Key Pair
22,263,632 UART: [art] Store priv key in slot 0x5
24,690,394 UART: [art] Derive Key Pair - Done
24,703,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,409,743 UART: [art] Erasing AUTHORITY.KEYID = 7
26,411,258 UART: [art] PUB.X = FA1B66A63982C1F20BF782F73D568084C0F670BF9C977B9B50A39472F6F40B786C46380C63DCC1AB14BE0E8EF7AC8C27
26,418,529 UART: [art] PUB.Y = 39D767F28C51AD077CA455C1524DBFF08224F71F18888CB404E2D30BD233D74565B0B5477CECF54AF758801D41768BB1
26,425,809 UART: [art] SIG.R = 090347E3AABAB811CBE53D4451A49B2ED5FAD907A0F59156EB9D4B3E9BE4B28AED7A4F95B56A2E07772377E20AF83997
26,433,194 UART: [art] SIG.S = 053EF066E4A7CC7A844A588D64F186790EA7269646BBED84E67197BB48DE89AA45FB8EDD0C93B42218A7C849F25A9524
27,412,461 UART: Caliptra RT
27,413,174 UART: [state] CFI Enabled
27,544,715 UART: [rt] RT listening for mailbox commands...
27,547,013 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,702,494 UART: [rt]cmd =0x41544d4e, len=14344
30,097,768 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,760,343 ready_for_fw is high
3,761,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,134,464 >>> mbox cmd response: success
20,388,767 UART:
20,389,172 UART: Running Caliptra FMC ...
20,390,303 UART:
20,390,461 UART: [state] CFI Enabled
20,398,513 UART: [fht] FMC Alias Private Key: 7
22,164,191 UART: [art] Extend RT PCRs Done
22,165,421 UART: [art] Lock RT PCRs Done
22,167,043 UART: [art] Populate DV Done
22,172,558 UART: [fht] FMC Alias Private Key: 7
22,174,215 UART: [art] Derive CDI
22,174,958 UART: [art] Store in slot 0x4
22,217,767 UART: [art] Derive Key Pair
22,218,772 UART: [art] Store priv key in slot 0x5
24,645,880 UART: [art] Derive Key Pair - Done
24,658,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,365,421 UART: [art] Erasing AUTHORITY.KEYID = 7
26,366,926 UART: [art] PUB.X = ED57A078A69E5D8AE62E4BEA6C3CC92EBCECF53F33211CEEB2261FD12895FB77A4B6DCC2CD46EB6D671459F43C3907D5
26,374,235 UART: [art] PUB.Y = B1C039A15B50B032360C8F8BE59598A9E08C8145E6853E50C7A0E9850406D81FCF33F9618224B3A1D5870FAA1CE484EC
26,381,438 UART: [art] SIG.R = 36B812DB0EFDBEF0A7292251DC91D5E9880D0F74D23DF1781153EB35348A3F2266535A0109A1E56C454E20048DD3DF6F
26,388,830 UART: [art] SIG.S = DF36C7364992E61007A389E0ECA5D4730A19420BBDC2CAF56E98EB6CE051AE6C93BC05408C3520700A55072B4C52BFE6
27,366,765 UART: Caliptra RT
27,367,458 UART: [state] CFI Enabled
27,500,919 UART: [rt] RT listening for mailbox commands...
27,503,245 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,658,581 UART: [rt]cmd =0x41544d4e, len=14344
30,039,990 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,625 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,107 UART: [kat] SHA2-256
882,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,153 UART: [kat] ++
886,305 UART: [kat] sha1
890,517 UART: [kat] SHA2-256
892,455 UART: [kat] SHA2-384
895,244 UART: [kat] SHA2-512-ACC
897,145 UART: [kat] ECC-384
902,806 UART: [kat] HMAC-384Kdf
907,320 UART: [kat] LMS
1,475,516 UART: [kat] --
1,476,297 UART: [cold-reset] ++
1,476,775 UART: [fht] Storing FHT @ 0x50003400
1,479,590 UART: [idev] ++
1,479,758 UART: [idev] CDI.KEYID = 6
1,480,118 UART: [idev] SUBJECT.KEYID = 7
1,480,542 UART: [idev] UDS.KEYID = 0
1,480,887 ready_for_fw is high
1,480,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,956 UART: [idev] Erasing UDS.KEYID = 0
1,506,044 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,760 UART: [idev] --
1,515,765 UART: [ldev] ++
1,515,933 UART: [ldev] CDI.KEYID = 6
1,516,296 UART: [ldev] SUBJECT.KEYID = 5
1,516,722 UART: [ldev] AUTHORITY.KEYID = 7
1,517,185 UART: [ldev] FE.KEYID = 1
1,522,339 UART: [ldev] Erasing FE.KEYID = 1
1,547,942 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,932 UART: [ldev] --
1,587,263 UART: [fwproc] Waiting for Commands...
1,587,996 UART: [fwproc] Received command 0x46574c44
1,588,787 UART: [fwproc] Received Image of size 118548 bytes
5,244,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,272,436 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,303,654 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,443,903 >>> mbox cmd response: success
5,444,963 UART: [afmc] ++
5,445,131 UART: [afmc] CDI.KEYID = 6
5,445,493 UART: [afmc] SUBJECT.KEYID = 7
5,445,918 UART: [afmc] AUTHORITY.KEYID = 5
5,480,579 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,496,911 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,497,691 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,503,397 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,509,276 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,514,989 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,522,808 UART: [afmc] --
5,523,756 UART: [cold-reset] --
5,524,590 UART: [state] Locking Datavault
5,525,733 UART: [state] Locking PCR0, PCR1 and PCR31
5,526,337 UART: [state] Locking ICCM
5,526,929 UART: [exit] Launching FMC @ 0x40000130
5,532,259 UART:
5,532,275 UART: Running Caliptra FMC ...
5,532,683 UART:
5,532,737 UART: [state] CFI Enabled
5,543,355 UART: [fht] FMC Alias Private Key: 7
5,662,021 UART: [art] Extend RT PCRs Done
5,662,449 UART: [art] Lock RT PCRs Done
5,664,217 UART: [art] Populate DV Done
5,672,342 UART: [fht] FMC Alias Private Key: 7
5,673,332 UART: [art] Derive CDI
5,673,612 UART: [art] Store in slot 0x4
5,758,972 UART: [art] Derive Key Pair
5,759,332 UART: [art] Store priv key in slot 0x5
5,772,861 UART: [art] Derive Key Pair - Done
5,787,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,803,146 UART: [art] Erasing AUTHORITY.KEYID = 7
5,803,911 UART: [art] PUB.X = A634735A7D20C5EE57CFF05411E4E9ED0A998AFF8317E5C9D636A59E6F380FBAB43AB124A981CE4F82FF8158D98C1223
5,810,687 UART: [art] PUB.Y = E2A6428BAF2B57BB69E3674FC1379EDD2D2B32F4A4A6C9AEB725E7B2733563F41293C0FAFAB33F0583D4877F8AB03E7A
5,817,650 UART: [art] SIG.R = A8D0823DAF70895FC5F84AF9559BAC3EE5A7DAC353A3B89B1159280629D38E354C2161F789C7E484C6FC9FD1F4B21AB1
5,824,429 UART: [art] SIG.S = BB2A375F356EBEE478B81F7ED545830C7A456426E2C0F2D0AC21018A5E5FE18916D3AAE56D4D87A274C5CA7E1166A571
5,847,983 UART: Caliptra RT
5,848,234 UART: [state] CFI Enabled
5,968,013 UART: [rt] RT listening for mailbox commands...
5,968,683 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,091,845 UART: [rt]cmd =0x41544d4e, len=14344
8,397,684 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,557 ready_for_fw is high
1,362,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,103,958 >>> mbox cmd response: success
5,165,159 UART:
5,165,175 UART: Running Caliptra FMC ...
5,165,583 UART:
5,165,637 UART: [state] CFI Enabled
5,175,991 UART: [fht] FMC Alias Private Key: 7
5,294,285 UART: [art] Extend RT PCRs Done
5,294,713 UART: [art] Lock RT PCRs Done
5,296,371 UART: [art] Populate DV Done
5,304,748 UART: [fht] FMC Alias Private Key: 7
5,305,808 UART: [art] Derive CDI
5,306,088 UART: [art] Store in slot 0x4
5,391,864 UART: [art] Derive Key Pair
5,392,224 UART: [art] Store priv key in slot 0x5
5,404,907 UART: [art] Derive Key Pair - Done
5,419,470 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,435,009 UART: [art] Erasing AUTHORITY.KEYID = 7
5,435,774 UART: [art] PUB.X = 471F7CE02543565AD5999FF6991AFAAF88F27C6DAC84F4AB63D7675DA14D6FAFB36D2B24A61C65491526229D9C53F88F
5,442,554 UART: [art] PUB.Y = 9B973462419853638888FE1284B24EE056EF983980BF9D18F40D97A33D7E206D713ED7F8827F1453C1C4CE7A656F9069
5,449,493 UART: [art] SIG.R = 96648D358ED71021D2C2F8366BE11E1A2587921EFB49E925ADECBFE7204E956F05904195F6F042B125B24FD4BB35ABCD
5,456,268 UART: [art] SIG.S = EA7B9C521F5E19BA344CE563D7DF5296FCB4E27CD581AD0D265A94ED9A2B01EE5E584A35924ED3A0800E3E0029DD9E16
5,479,515 UART: Caliptra RT
5,479,766 UART: [state] CFI Enabled
5,599,557 UART: [rt] RT listening for mailbox commands...
5,600,227 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,723,481 UART: [rt]cmd =0x41544d4e, len=14344
8,029,255 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.99s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,810 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,330 UART: [kat] SHA2-256
882,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,376 UART: [kat] ++
886,528 UART: [kat] sha1
890,602 UART: [kat] SHA2-256
892,540 UART: [kat] SHA2-384
895,289 UART: [kat] SHA2-512-ACC
897,190 UART: [kat] ECC-384
902,933 UART: [kat] HMAC-384Kdf
907,521 UART: [kat] LMS
1,475,717 UART: [kat] --
1,476,732 UART: [cold-reset] ++
1,477,270 UART: [fht] Storing FHT @ 0x50003400
1,480,105 UART: [idev] ++
1,480,273 UART: [idev] CDI.KEYID = 6
1,480,633 UART: [idev] SUBJECT.KEYID = 7
1,481,057 UART: [idev] UDS.KEYID = 0
1,481,402 ready_for_fw is high
1,481,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,263 UART: [idev] Erasing UDS.KEYID = 0
1,505,379 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,009 UART: [idev] --
1,514,948 UART: [ldev] ++
1,515,116 UART: [ldev] CDI.KEYID = 6
1,515,479 UART: [ldev] SUBJECT.KEYID = 5
1,515,905 UART: [ldev] AUTHORITY.KEYID = 7
1,516,368 UART: [ldev] FE.KEYID = 1
1,521,490 UART: [ldev] Erasing FE.KEYID = 1
1,547,057 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,895 UART: [ldev] --
1,586,236 UART: [fwproc] Waiting for Commands...
1,586,903 UART: [fwproc] Received command 0x46574c44
1,587,694 UART: [fwproc] Received Image of size 118548 bytes
5,129,334 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,157,628 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,188,846 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,329,065 >>> mbox cmd response: success
5,330,311 UART: [afmc] ++
5,330,479 UART: [afmc] CDI.KEYID = 6
5,330,841 UART: [afmc] SUBJECT.KEYID = 7
5,331,266 UART: [afmc] AUTHORITY.KEYID = 5
5,366,579 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,382,905 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,383,685 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,389,391 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,395,270 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,400,983 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,408,944 UART: [afmc] --
5,409,930 UART: [cold-reset] --
5,410,750 UART: [state] Locking Datavault
5,411,807 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,411 UART: [state] Locking ICCM
5,412,979 UART: [exit] Launching FMC @ 0x40000130
5,418,309 UART:
5,418,325 UART: Running Caliptra FMC ...
5,418,733 UART:
5,418,876 UART: [state] CFI Enabled
5,429,380 UART: [fht] FMC Alias Private Key: 7
5,548,946 UART: [art] Extend RT PCRs Done
5,549,374 UART: [art] Lock RT PCRs Done
5,550,640 UART: [art] Populate DV Done
5,558,783 UART: [fht] FMC Alias Private Key: 7
5,559,865 UART: [art] Derive CDI
5,560,145 UART: [art] Store in slot 0x4
5,645,923 UART: [art] Derive Key Pair
5,646,283 UART: [art] Store priv key in slot 0x5
5,659,602 UART: [art] Derive Key Pair - Done
5,674,406 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,689,467 UART: [art] Erasing AUTHORITY.KEYID = 7
5,690,232 UART: [art] PUB.X = 9F9D39DF9CCF269585802EFE5FB40E94AE31EF60B4CF1A704F8684921923A5007B9A315DE8DD569BFB48FD3BD933FC58
5,696,991 UART: [art] PUB.Y = 3F7BF2A6981B04B058A402DEA39B781899033AA18CC88980F69091663E8F20EA47FAFF88154DD48C95DC993D74BDBB55
5,703,938 UART: [art] SIG.R = F3277D87480F57B58AA598D40D17ECB79F5D8D6E22F03AC66FB1996743E7BFC4BFDF012A99ABA004B59B6B6FDF42D6B1
5,710,714 UART: [art] SIG.S = 1BC71339C461AE27E7BBE66D85FF8D00AD4892FE4D0D0CCBBA120758CB28B7BE085E1AC77920F0BA762B97E7E3A1DD15
5,734,714 UART: Caliptra RT
5,735,057 UART: [state] CFI Enabled
5,854,801 UART: [rt] RT listening for mailbox commands...
5,855,471 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,978,633 UART: [rt]cmd =0x41544d4e, len=14344
8,246,192 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.00s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,868 ready_for_fw is high
1,362,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,215,932 >>> mbox cmd response: success
5,278,555 UART:
5,278,571 UART: Running Caliptra FMC ...
5,278,979 UART:
5,279,122 UART: [state] CFI Enabled
5,289,926 UART: [fht] FMC Alias Private Key: 7
5,408,800 UART: [art] Extend RT PCRs Done
5,409,228 UART: [art] Lock RT PCRs Done
5,410,724 UART: [art] Populate DV Done
5,418,935 UART: [fht] FMC Alias Private Key: 7
5,420,111 UART: [art] Derive CDI
5,420,391 UART: [art] Store in slot 0x4
5,506,319 UART: [art] Derive Key Pair
5,506,679 UART: [art] Store priv key in slot 0x5
5,519,870 UART: [art] Derive Key Pair - Done
5,534,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,549,837 UART: [art] Erasing AUTHORITY.KEYID = 7
5,550,602 UART: [art] PUB.X = DAC6C0DE9ECBC5869F3148F729938247F8434F23217C4A85E7C7478B3874D4DB0AAF63787931424465B1210ED187B5A0
5,557,364 UART: [art] PUB.Y = B2F6AE42CDA247943B5179F92E9A5EA45F76A05085C2FD2B8B03409E0D9A3AEA1D22DE16456A4A11B109CA6EAD20C261
5,564,319 UART: [art] SIG.R = A668FEF55D61DD35B5D379F81452BE416B3A09002B189CA994DD201BA48AA8B49E5888B901F4106139362BF1AE150E21
5,571,060 UART: [art] SIG.S = EF60E3553B79926FAB2C3AE7CD12D327A54903F733727A106CAD1048CA9C2BC9F16637EEDCE1D33C4673CD2680F05470
5,594,273 UART: Caliptra RT
5,594,616 UART: [state] CFI Enabled
5,713,821 UART: [rt] RT listening for mailbox commands...
5,714,491 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,837,191 UART: [rt]cmd =0x41544d4e, len=14344
8,294,630 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.08s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
891,424 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,528 UART: [kat] ++
895,680 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,043 UART: [kat] HMAC-384Kdf
920,869 UART: [kat] LMS
1,169,181 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,274 UART: [fht] FHT @ 0x50003400
1,172,864 UART: [idev] ++
1,173,032 UART: [idev] CDI.KEYID = 6
1,173,393 UART: [idev] SUBJECT.KEYID = 7
1,173,818 UART: [idev] UDS.KEYID = 0
1,174,164 ready_for_fw is high
1,174,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,827 UART: [idev] Erasing UDS.KEYID = 0
1,198,539 UART: [idev] Sha1 KeyId Algorithm
1,207,593 UART: [idev] --
1,208,490 UART: [ldev] ++
1,208,658 UART: [ldev] CDI.KEYID = 6
1,209,022 UART: [ldev] SUBJECT.KEYID = 5
1,209,449 UART: [ldev] AUTHORITY.KEYID = 7
1,209,912 UART: [ldev] FE.KEYID = 1
1,214,874 UART: [ldev] Erasing FE.KEYID = 1
1,240,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,432 UART: [ldev] --
1,279,781 UART: [fwproc] Wait for Commands...
1,280,502 UART: [fwproc] Recv command 0x46574c44
1,281,235 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,107 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,282 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,453 >>> mbox cmd response: success
3,372,707 UART: [afmc] ++
3,372,875 UART: [afmc] CDI.KEYID = 6
3,373,238 UART: [afmc] SUBJECT.KEYID = 7
3,373,664 UART: [afmc] AUTHORITY.KEYID = 5
3,408,945 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,331 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,038 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,915 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,625 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,571 UART: [afmc] --
3,452,628 UART: [cold-reset] --
3,453,364 UART: [state] Locking Datavault
3,454,545 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,149 UART: [state] Locking ICCM
3,455,803 UART: [exit] Launching FMC @ 0x40000130
3,461,133 UART:
3,461,149 UART: Running Caliptra FMC ...
3,461,557 UART:
3,461,611 UART: [state] CFI Enabled
3,471,713 UART: [fht] FMC Alias Private Key: 7
3,590,557 UART: [art] Extend RT PCRs Done
3,590,985 UART: [art] Lock RT PCRs Done
3,592,583 UART: [art] Populate DV Done
3,600,740 UART: [fht] FMC Alias Private Key: 7
3,601,726 UART: [art] Derive CDI
3,602,006 UART: [art] Store in slot 0x4
3,687,829 UART: [art] Derive Key Pair
3,688,189 UART: [art] Store priv key in slot 0x5
3,701,367 UART: [art] Derive Key Pair - Done
3,715,974 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,820 UART: [art] PUB.X = B9B93FBCE32580D91988E8445CD1A6CC28BF717A8597CC17243088AE62A0D77C2A8828E591753CE667FCB9EF6B0C393B
3,738,595 UART: [art] PUB.Y = 7645D577BEB9B49D81E58D3A391C2AF0F63A7482B1B47220BE0AE9F0C53F1E845D6E221762490D56084BC7DAF57B0FE6
3,745,541 UART: [art] SIG.R = D962616134EB1B382E04FF3A21F0A9CD07AE4F5FBA272E80043FBE1666C074A5F94001C2FD56DF75908B423235B21738
3,752,301 UART: [art] SIG.S = 3F4B473E9387F8978C8FF8D3A340FD3E01765D4EBD0A314B941CA3ACCFB038F7B4BA198A7203D9A5511C6A8D752AEFA0
3,775,908 UART: Caliptra RT
3,776,159 UART: [state] CFI Enabled
3,895,799 UART: [rt] RT listening for mailbox commands...
3,896,469 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,571 UART: [rt]cmd =0x41544d4e, len=14344
4,606,903 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,756 ready_for_fw is high
1,059,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,209,253 >>> mbox cmd response: success
3,270,678 UART:
3,270,694 UART: Running Caliptra FMC ...
3,271,102 UART:
3,271,156 UART: [state] CFI Enabled
3,281,956 UART: [fht] FMC Alias Private Key: 7
3,401,034 UART: [art] Extend RT PCRs Done
3,401,462 UART: [art] Lock RT PCRs Done
3,403,176 UART: [art] Populate DV Done
3,411,295 UART: [fht] FMC Alias Private Key: 7
3,412,299 UART: [art] Derive CDI
3,412,579 UART: [art] Store in slot 0x4
3,498,194 UART: [art] Derive Key Pair
3,498,554 UART: [art] Store priv key in slot 0x5
3,511,478 UART: [art] Derive Key Pair - Done
3,525,864 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,541,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,542,244 UART: [art] PUB.X = 98180C0D517B1497916944CB33C587834D7D4EA28FB2F01C7B1D8BA0977FB5C2FFFCECD43A77C789C12ECD297022E49F
3,549,018 UART: [art] PUB.Y = B03A38196D86CC4FCCE0D695E2ECEB5DCA1F9410838392708EDF3BD17CA144B69A9008B15BE1BD15F9715BAE749D5A33
3,555,981 UART: [art] SIG.R = 6BE4C565B52BC5E0797CB85F7B83CABA0792355AA45B63B9A75C2BB1C48591E309B794879C3DC947872C9ABE5D61703A
3,562,753 UART: [art] SIG.S = EE8BF77ED23F13F99FB2D6B180E235D88D4621613A6E252A707AD2542AA05A8078970E77F62EC3AFEAE054F44A32CEB0
3,585,910 UART: Caliptra RT
3,586,161 UART: [state] CFI Enabled
3,706,453 UART: [rt] RT listening for mailbox commands...
3,707,123 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,830,327 UART: [rt]cmd =0x41544d4e, len=14344
4,414,856 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,875 UART: [kat] SHA2-256
901,815 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
916,498 UART: [kat] HMAC-384Kdf
921,134 UART: [kat] LMS
1,169,446 UART: [kat] --
1,170,253 UART: [cold-reset] ++
1,170,821 UART: [fht] FHT @ 0x50003400
1,173,453 UART: [idev] ++
1,173,621 UART: [idev] CDI.KEYID = 6
1,173,982 UART: [idev] SUBJECT.KEYID = 7
1,174,407 UART: [idev] UDS.KEYID = 0
1,174,753 ready_for_fw is high
1,174,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,550 UART: [idev] Erasing UDS.KEYID = 0
1,200,004 UART: [idev] Sha1 KeyId Algorithm
1,208,886 UART: [idev] --
1,209,843 UART: [ldev] ++
1,210,011 UART: [ldev] CDI.KEYID = 6
1,210,375 UART: [ldev] SUBJECT.KEYID = 5
1,210,802 UART: [ldev] AUTHORITY.KEYID = 7
1,211,265 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,243,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,413 UART: [ldev] --
1,282,760 UART: [fwproc] Wait for Commands...
1,283,571 UART: [fwproc] Recv command 0x46574c44
1,284,304 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,339 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,514 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,883 >>> mbox cmd response: success
3,373,147 UART: [afmc] ++
3,373,315 UART: [afmc] CDI.KEYID = 6
3,373,678 UART: [afmc] SUBJECT.KEYID = 7
3,374,104 UART: [afmc] AUTHORITY.KEYID = 5
3,410,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,956 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,705 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,412 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,289 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,999 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,699 UART: [afmc] --
3,453,628 UART: [cold-reset] --
3,454,420 UART: [state] Locking Datavault
3,455,731 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,335 UART: [state] Locking ICCM
3,456,967 UART: [exit] Launching FMC @ 0x40000130
3,462,297 UART:
3,462,313 UART: Running Caliptra FMC ...
3,462,721 UART:
3,462,864 UART: [state] CFI Enabled
3,473,436 UART: [fht] FMC Alias Private Key: 7
3,592,332 UART: [art] Extend RT PCRs Done
3,592,760 UART: [art] Lock RT PCRs Done
3,594,402 UART: [art] Populate DV Done
3,602,781 UART: [fht] FMC Alias Private Key: 7
3,603,853 UART: [art] Derive CDI
3,604,133 UART: [art] Store in slot 0x4
3,690,146 UART: [art] Derive Key Pair
3,690,506 UART: [art] Store priv key in slot 0x5
3,703,718 UART: [art] Derive Key Pair - Done
3,718,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,100 UART: [art] PUB.X = 90B8D1022005FE829EC141DD2643E6698C8CCBC33F02166CE76949930CC4303C4B1F81C7FFFF1F334C4EBA201FB07435
3,741,864 UART: [art] PUB.Y = 58E8A0B54B2BE217AF04EFABAFDEC9DDA5B259F8C10E8079529C7E0E85C067D850B4948C866D6FDD6F4A82CBD27AEC20
3,748,829 UART: [art] SIG.R = 18181DE2F4C503B5E7925085160E30B7FBB1AE02D05C175ED66C30EE77DD5F0081FD66200A0D77D0B4F4D87FE6D8E1CE
3,755,574 UART: [art] SIG.S = C1A30167B7421778A0842EEF007FDA68BC60099AB6A60CEC07DB6C0718C048E4FB4504A527F1E566A363E8E8EBD7B45D
3,779,858 UART: Caliptra RT
3,780,201 UART: [state] CFI Enabled
3,901,237 UART: [rt] RT listening for mailbox commands...
3,901,907 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,749 UART: [rt]cmd =0x41544d4e, len=14344
4,606,995 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,905 ready_for_fw is high
1,059,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,225,987 >>> mbox cmd response: success
3,288,486 UART:
3,288,502 UART: Running Caliptra FMC ...
3,288,910 UART:
3,289,053 UART: [state] CFI Enabled
3,299,619 UART: [fht] FMC Alias Private Key: 7
3,418,429 UART: [art] Extend RT PCRs Done
3,418,857 UART: [art] Lock RT PCRs Done
3,420,297 UART: [art] Populate DV Done
3,428,394 UART: [fht] FMC Alias Private Key: 7
3,429,516 UART: [art] Derive CDI
3,429,796 UART: [art] Store in slot 0x4
3,515,669 UART: [art] Derive Key Pair
3,516,029 UART: [art] Store priv key in slot 0x5
3,529,967 UART: [art] Derive Key Pair - Done
3,544,963 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,993 UART: [art] PUB.X = B64A0F36FBEB8109D65D2FE052ED2D4D049AA5451A1657076425B65EA493E130B6347DEBBE540C6A41633C4BEE088723
3,567,751 UART: [art] PUB.Y = 7C0825B93B91516527C0E82D7CE7DE1C14A5570CCADA21D491082E8FEF98EC03EE1DE21926A9100690B5549A2F8DE6E2
3,574,694 UART: [art] SIG.R = 530DF1A0DF2C847267EC22E69E0A95EE96EF1BA885F8CE6E36264905E464A54A752D43A9403646F6D619893CF9F04A08
3,581,454 UART: [art] SIG.S = 35498CD590A103049EF2FB7A3D91D725D27E8DC14D4712D2D9B7443FC711E5C0EFAEC1837CDE02CF8E6BFDACC7D96A69
3,605,267 UART: Caliptra RT
3,605,610 UART: [state] CFI Enabled
3,724,086 UART: [rt] RT listening for mailbox commands...
3,724,756 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,762 UART: [rt]cmd =0x41544d4e, len=14344
4,442,955 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
893,642 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,767 UART: [kat] ++
897,919 UART: [kat] sha1
902,113 UART: [kat] SHA2-256
904,053 UART: [kat] SHA2-384
907,000 UART: [kat] SHA2-512-ACC
908,901 UART: [kat] ECC-384
918,356 UART: [kat] HMAC-384Kdf
922,808 UART: [kat] LMS
1,171,136 UART: [kat] --
1,172,191 UART: [cold-reset] ++
1,172,719 UART: [fht] FHT @ 0x50003400
1,175,306 UART: [idev] ++
1,175,474 UART: [idev] CDI.KEYID = 6
1,175,834 UART: [idev] SUBJECT.KEYID = 7
1,176,258 UART: [idev] UDS.KEYID = 0
1,176,603 ready_for_fw is high
1,176,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,318 UART: [idev] Erasing UDS.KEYID = 0
1,201,143 UART: [idev] Sha1 KeyId Algorithm
1,209,715 UART: [idev] --
1,210,721 UART: [ldev] ++
1,210,889 UART: [ldev] CDI.KEYID = 6
1,211,252 UART: [ldev] SUBJECT.KEYID = 5
1,211,678 UART: [ldev] AUTHORITY.KEYID = 7
1,212,141 UART: [ldev] FE.KEYID = 1
1,217,291 UART: [ldev] Erasing FE.KEYID = 1
1,243,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,805 UART: [ldev] --
1,283,156 UART: [fwproc] Wait for Commands...
1,283,942 UART: [fwproc] Recv command 0x46574c44
1,284,670 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,276 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,446 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,367,741 >>> mbox cmd response: success
3,368,777 UART: [afmc] ++
3,368,945 UART: [afmc] CDI.KEYID = 6
3,369,307 UART: [afmc] SUBJECT.KEYID = 7
3,369,732 UART: [afmc] AUTHORITY.KEYID = 5
3,405,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,422,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,888 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,428,594 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,434,473 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,440,183 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,972 UART: [afmc] --
3,448,976 UART: [cold-reset] --
3,449,830 UART: [state] Locking Datavault
3,451,133 UART: [state] Locking PCR0, PCR1 and PCR31
3,451,737 UART: [state] Locking ICCM
3,452,169 UART: [exit] Launching FMC @ 0x40000130
3,457,499 UART:
3,457,515 UART: Running Caliptra FMC ...
3,457,923 UART:
3,457,977 UART: [state] CFI Enabled
3,468,235 UART: [fht] FMC Alias Private Key: 7
3,587,191 UART: [art] Extend RT PCRs Done
3,587,619 UART: [art] Lock RT PCRs Done
3,589,133 UART: [art] Populate DV Done
3,597,396 UART: [fht] FMC Alias Private Key: 7
3,598,430 UART: [art] Derive CDI
3,598,710 UART: [art] Store in slot 0x4
3,684,655 UART: [art] Derive Key Pair
3,685,015 UART: [art] Store priv key in slot 0x5
3,698,277 UART: [art] Derive Key Pair - Done
3,713,171 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,209 UART: [art] PUB.X = A84100D6CB630DFF57521C1C6532F94E6D2F3EE4AEA7ADCB05745650E6321C38040220694EB4F7A65BE4C53560F12263
3,735,947 UART: [art] PUB.Y = BC0F9C6A02B5783A6E629B68D16FDB4DBA206A7AD24E4390F889D03C5D65DA4990F222D5332BDDF99D80FF674E982292
3,742,901 UART: [art] SIG.R = B799F971DCBF382517D87841025ED260A6CDD2048FB7877E39418A62F2BD5065474E9F6DD9157D80EC89C943F95F34AB
3,749,667 UART: [art] SIG.S = CD679CD3ABDECCA0AA282F9D61319C7B649BDC0555EB35F51584668CA69FD3C90684913521D86EBFBFC8A7638A4025A8
3,773,339 UART: Caliptra RT
3,773,590 UART: [state] CFI Enabled
3,893,215 UART: [rt] RT listening for mailbox commands...
3,893,885 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,743 UART: [rt]cmd =0x41544d4e, len=14344
4,604,367 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,493 ready_for_fw is high
1,060,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,646 >>> mbox cmd response: success
3,281,407 UART:
3,281,423 UART: Running Caliptra FMC ...
3,281,831 UART:
3,281,885 UART: [state] CFI Enabled
3,292,309 UART: [fht] FMC Alias Private Key: 7
3,410,681 UART: [art] Extend RT PCRs Done
3,411,109 UART: [art] Lock RT PCRs Done
3,412,791 UART: [art] Populate DV Done
3,421,066 UART: [fht] FMC Alias Private Key: 7
3,422,240 UART: [art] Derive CDI
3,422,520 UART: [art] Store in slot 0x4
3,508,145 UART: [art] Derive Key Pair
3,508,505 UART: [art] Store priv key in slot 0x5
3,521,599 UART: [art] Derive Key Pair - Done
3,536,070 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,551,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,894 UART: [art] PUB.X = 41AF45B9A3B23C61B2E7A27C228616143C396AA6247AA435D409B079804C305F1B1A9CEA573D85A9B64D56C0906E5622
3,558,659 UART: [art] PUB.Y = 6CB6EFB21273D53A1FBDD614BA1C73D97BFF91E7BD83BE4B216B12E5B415589BA6920A34462EEF3C28063767D73924B7
3,565,613 UART: [art] SIG.R = D2FE82064C380E51A6D3AB27746793F7B73FF5BB5812774251007112A9E50108FABD6C9D10FE467009FCF864E2CCB7CA
3,572,352 UART: [art] SIG.S = 3ACFF92E5F331CEECE9F02432CE48831BB49702767946F76D7957EE600F1337C58A508F06D84D59C346F9D0EF57AD303
3,596,006 UART: Caliptra RT
3,596,257 UART: [state] CFI Enabled
3,715,933 UART: [rt] RT listening for mailbox commands...
3,716,603 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,725 UART: [rt]cmd =0x41544d4e, len=14344
4,424,706 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,972 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
893,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,998 UART: [kat] ++
898,150 UART: [kat] sha1
902,504 UART: [kat] SHA2-256
904,444 UART: [kat] SHA2-384
907,113 UART: [kat] SHA2-512-ACC
909,014 UART: [kat] ECC-384
918,753 UART: [kat] HMAC-384Kdf
923,247 UART: [kat] LMS
1,171,575 UART: [kat] --
1,172,488 UART: [cold-reset] ++
1,172,956 UART: [fht] FHT @ 0x50003400
1,175,577 UART: [idev] ++
1,175,745 UART: [idev] CDI.KEYID = 6
1,176,105 UART: [idev] SUBJECT.KEYID = 7
1,176,529 UART: [idev] UDS.KEYID = 0
1,176,874 ready_for_fw is high
1,176,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,335 UART: [idev] Erasing UDS.KEYID = 0
1,201,320 UART: [idev] Sha1 KeyId Algorithm
1,209,902 UART: [idev] --
1,210,884 UART: [ldev] ++
1,211,052 UART: [ldev] CDI.KEYID = 6
1,211,415 UART: [ldev] SUBJECT.KEYID = 5
1,211,841 UART: [ldev] AUTHORITY.KEYID = 7
1,212,304 UART: [ldev] FE.KEYID = 1
1,217,650 UART: [ldev] Erasing FE.KEYID = 1
1,244,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,528 UART: [ldev] --
1,283,965 UART: [fwproc] Wait for Commands...
1,284,675 UART: [fwproc] Recv command 0x46574c44
1,285,403 UART: [fwproc] Recv'd Img size: 118548 bytes
3,176,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,205,254 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,424 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,613 >>> mbox cmd response: success
3,377,665 UART: [afmc] ++
3,377,833 UART: [afmc] CDI.KEYID = 6
3,378,195 UART: [afmc] SUBJECT.KEYID = 7
3,378,620 UART: [afmc] AUTHORITY.KEYID = 5
3,414,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,430,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,431,682 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,437,388 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,443,267 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,448,977 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,456,664 UART: [afmc] --
3,457,566 UART: [cold-reset] --
3,458,542 UART: [state] Locking Datavault
3,459,897 UART: [state] Locking PCR0, PCR1 and PCR31
3,460,501 UART: [state] Locking ICCM
3,461,049 UART: [exit] Launching FMC @ 0x40000130
3,466,379 UART:
3,466,395 UART: Running Caliptra FMC ...
3,466,803 UART:
3,466,946 UART: [state] CFI Enabled
3,477,522 UART: [fht] FMC Alias Private Key: 7
3,596,314 UART: [art] Extend RT PCRs Done
3,596,742 UART: [art] Lock RT PCRs Done
3,598,488 UART: [art] Populate DV Done
3,606,651 UART: [fht] FMC Alias Private Key: 7
3,607,627 UART: [art] Derive CDI
3,607,907 UART: [art] Store in slot 0x4
3,693,444 UART: [art] Derive Key Pair
3,693,804 UART: [art] Store priv key in slot 0x5
3,707,454 UART: [art] Derive Key Pair - Done
3,721,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,736,958 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,723 UART: [art] PUB.X = 0F62C88549D8FCD9EAA9FDDE76D3C5598746553D7FF3BBFB71ACAF2870814234C0EE9239C61AB112DBA902659F942DB4
3,744,501 UART: [art] PUB.Y = AEE873D8AFC876D4573EE4BAAAA50AB7BC184BC503CF9355E2547EFCB940ED1730BA62D0F414FA36EE49C84C893219E4
3,751,465 UART: [art] SIG.R = 05EDB438F621AF5E003E5FC0580A118175501FBFB2831FACFF1887CD17F51D5388C653A8C5CE8B36D9C855C1E40855AF
3,758,214 UART: [art] SIG.S = 20B311E351314ED124CA8F40ABD7B9DFEAB5C6D68F5FECC439899DA37681321965C5500341317A7C36A96526E8E5CD06
3,781,974 UART: Caliptra RT
3,782,317 UART: [state] CFI Enabled
3,901,709 UART: [rt] RT listening for mailbox commands...
3,902,379 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,691 UART: [rt]cmd =0x41544d4e, len=14344
4,610,984 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,156 ready_for_fw is high
1,061,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,234,007 >>> mbox cmd response: success
3,296,030 UART:
3,296,046 UART: Running Caliptra FMC ...
3,296,454 UART:
3,296,597 UART: [state] CFI Enabled
3,306,923 UART: [fht] FMC Alias Private Key: 7
3,425,999 UART: [art] Extend RT PCRs Done
3,426,427 UART: [art] Lock RT PCRs Done
3,427,989 UART: [art] Populate DV Done
3,436,292 UART: [fht] FMC Alias Private Key: 7
3,437,272 UART: [art] Derive CDI
3,437,552 UART: [art] Store in slot 0x4
3,523,263 UART: [art] Derive Key Pair
3,523,623 UART: [art] Store priv key in slot 0x5
3,537,083 UART: [art] Derive Key Pair - Done
3,552,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,567,722 UART: [art] Erasing AUTHORITY.KEYID = 7
3,568,487 UART: [art] PUB.X = C47EEDE4D83ACABB2DD59CAD6EABC8FB041564E189F3719F5BE1B6852C38AB353F673B76101931FF669EAE3E79F654E0
3,575,274 UART: [art] PUB.Y = 428828D84F0BE24B6F36BA0596451DF6FD11BCFC86FEDB0BA5A5F7299105172CB3853AD06C52690A43BE50271886288A
3,582,213 UART: [art] SIG.R = 3DFE95479FEEAEC1F517994554141D0D9FDB73B40DEAB59211D12F7A4E365ED2559CD676BBBC987B5629646E9F6FCD2F
3,588,993 UART: [art] SIG.S = 90216FD971A537848D08300B4D9657DDFD9F99CC0FF51B0322021C37EF8BAD63797132D29F0F651D8AC587CEE2A468CC
3,612,555 UART: Caliptra RT
3,612,898 UART: [state] CFI Enabled
3,732,168 UART: [rt] RT listening for mailbox commands...
3,732,838 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,236 UART: [rt]cmd =0x41544d4e, len=14344
4,423,146 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,074 UART:
192,443 UART: Running Caliptra ROM ...
193,540 UART:
193,685 UART: [state] CFI Enabled
267,270 UART: [state] LifecycleState = Unprovisioned
269,220 UART: [state] DebugLocked = No
271,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,328 UART: [kat] SHA2-256
447,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,535 UART: [kat] ++
457,984 UART: [kat] sha1
470,143 UART: [kat] SHA2-256
472,862 UART: [kat] SHA2-384
478,992 UART: [kat] SHA2-512-ACC
481,365 UART: [kat] ECC-384
2,769,719 UART: [kat] HMAC-384Kdf
2,799,259 UART: [kat] LMS
3,989,560 UART: [kat] --
3,995,565 UART: [cold-reset] ++
3,997,076 UART: [fht] Storing FHT @ 0x50003400
4,009,359 UART: [idev] ++
4,010,013 UART: [idev] CDI.KEYID = 6
4,010,943 UART: [idev] SUBJECT.KEYID = 7
4,012,123 UART: [idev] UDS.KEYID = 0
4,013,258 ready_for_fw is high
4,013,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,653 UART: [idev] Erasing UDS.KEYID = 0
7,349,232 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,713 UART: [idev] --
7,375,624 UART: [ldev] ++
7,376,187 UART: [ldev] CDI.KEYID = 6
7,377,126 UART: [ldev] SUBJECT.KEYID = 5
7,378,388 UART: [ldev] AUTHORITY.KEYID = 7
7,379,671 UART: [ldev] FE.KEYID = 1
7,421,181 UART: [ldev] Erasing FE.KEYID = 1
10,752,001 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,557 UART: [ldev] --
13,112,170 UART: [fwproc] Waiting for Commands...
13,113,938 UART: [fwproc] Received command 0x46574c44
13,116,118 UART: [fwproc] Received Image of size 118548 bytes
22,436,343 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,518,571 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,591,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,919,385 >>> mbox cmd response: success
22,924,434 UART: [afmc] ++
22,925,047 UART: [afmc] CDI.KEYID = 6
22,925,937 UART: [afmc] SUBJECT.KEYID = 7
22,927,213 UART: [afmc] AUTHORITY.KEYID = 5
26,292,633 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,590,039 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,592,270 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,606,781 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,621,590 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,635,953 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,657,171 UART: [afmc] --
28,661,246 UART: [cold-reset] --
28,663,914 UART: [state] Locking Datavault
28,670,351 UART: [state] Locking PCR0, PCR1 and PCR31
28,672,247 UART: [state] Locking ICCM
28,673,465 UART: [exit] Launching FMC @ 0x40000130
28,681,864 UART:
28,682,100 UART: Running Caliptra FMC ...
28,683,201 UART:
28,683,359 UART: [state] CFI Enabled
28,748,827 UART: [fht] FMC Alias Private Key: 7
31,088,512 UART: [art] Extend RT PCRs Done
31,089,751 UART: [art] Lock RT PCRs Done
31,091,410 UART: [art] Populate DV Done
31,096,501 UART: [fht] FMC Alias Private Key: 7
31,098,268 UART: [art] Derive CDI
31,099,006 UART: [art] Store in slot 0x4
31,157,792 UART: [art] Derive Key Pair
31,158,831 UART: [art] Store priv key in slot 0x5
34,451,435 UART: [art] Derive Key Pair - Done
34,463,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,752,608 UART: [art] Erasing AUTHORITY.KEYID = 7
36,754,112 UART: [art] PUB.X = 1A10F1F9EFA83CFE10187264C4CEF6275F2000526F3D87C11D9FA79341461EDB0F2D5FC69442A1AF80600F8107C6FB0A
36,761,380 UART: [art] PUB.Y = E007083CA043F1D396A7CFA1DAB67D48B919DAD45819CB535E5F4C8C3E97C7AC78650DD906040F81BB9A91F9D2819988
36,768,627 UART: [art] SIG.R = 51B3DCC25D09CD156D580CEF84E1EA7CCAB49E9D95C5054CE65A00F1F1225E4772ED20FB50449AFA16E609BD77D7DC87
36,776,038 UART: [art] SIG.S = D16BC1E24FFE665DEB4791D79BBF8198CD3F2E0104635A632AEC9134C5D03E225CAC6F0D0BB0F8C343FEEAC93B644B7B
38,081,602 UART: Caliptra RT
38,082,324 UART: [state] CFI Enabled
38,257,449 UART: [rt] RT listening for mailbox commands...
38,259,744 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,415,459 UART: [rt]cmd =0x41544d4e, len=14344
42,583,738 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,782,462 ready_for_fw is high
3,783,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,786,346 >>> mbox cmd response: success
27,485,742 UART:
27,486,156 UART: Running Caliptra FMC ...
27,487,268 UART:
27,487,419 UART: [state] CFI Enabled
27,556,015 UART: [fht] FMC Alias Private Key: 7
29,895,561 UART: [art] Extend RT PCRs Done
29,896,788 UART: [art] Lock RT PCRs Done
29,898,286 UART: [art] Populate DV Done
29,903,814 UART: [fht] FMC Alias Private Key: 7
29,905,298 UART: [art] Derive CDI
29,906,083 UART: [art] Store in slot 0x4
29,964,601 UART: [art] Derive Key Pair
29,965,645 UART: [art] Store priv key in slot 0x5
33,258,321 UART: [art] Derive Key Pair - Done
33,271,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,560,214 UART: [art] Erasing AUTHORITY.KEYID = 7
35,561,719 UART: [art] PUB.X = 45D8ECB00490F80BFD2EB2E6B27ED962191637E9D741E2E19598704D22B662E2CA1C50679BF1760DDFB9ECFF93D3E237
35,568,987 UART: [art] PUB.Y = 959B442FE7166916C54712E5FCF6C8C22F968658C6F7911283AFB4069AE77DAE155736B001EEE1B357DF5D09CF3096A7
35,576,264 UART: [art] SIG.R = A37F07DB54E33CA4A3F397EE57BE5681E201EE852D6ECBC1FA7196DFBE8CAC66DF0E663DE4B44C47FE5A4F3A2844D391
35,583,666 UART: [art] SIG.S = 435DD8B503217446189D423A8A7E032E66F3DBC2ABA82CD941B256DC0F9F218EB8ED6B7E6773EFD0338AD87918E58838
36,888,550 UART: Caliptra RT
36,889,260 UART: [state] CFI Enabled
37,065,445 UART: [rt] RT listening for mailbox commands...
37,067,769 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,223,082 UART: [rt]cmd =0x41544d4e, len=14344
41,443,615 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,445 UART:
192,811 UART: Running Caliptra ROM ...
193,893 UART:
603,705 UART: [state] CFI Enabled
622,348 UART: [state] LifecycleState = Unprovisioned
624,238 UART: [state] DebugLocked = No
626,740 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,698 UART: [kat] SHA2-256
801,429 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,010 UART: [kat] ++
812,492 UART: [kat] sha1
824,142 UART: [kat] SHA2-256
826,866 UART: [kat] SHA2-384
832,781 UART: [kat] SHA2-512-ACC
835,145 UART: [kat] ECC-384
3,119,344 UART: [kat] HMAC-384Kdf
3,130,791 UART: [kat] LMS
4,320,870 UART: [kat] --
4,325,599 UART: [cold-reset] ++
4,327,879 UART: [fht] Storing FHT @ 0x50003400
4,338,713 UART: [idev] ++
4,339,270 UART: [idev] CDI.KEYID = 6
4,340,260 UART: [idev] SUBJECT.KEYID = 7
4,341,500 UART: [idev] UDS.KEYID = 0
4,342,551 ready_for_fw is high
4,342,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,595 UART: [idev] Erasing UDS.KEYID = 0
7,628,845 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,787 UART: [idev] --
7,654,911 UART: [ldev] ++
7,655,482 UART: [ldev] CDI.KEYID = 6
7,656,494 UART: [ldev] SUBJECT.KEYID = 5
7,657,645 UART: [ldev] AUTHORITY.KEYID = 7
7,658,926 UART: [ldev] FE.KEYID = 1
7,671,135 UART: [ldev] Erasing FE.KEYID = 1
10,963,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,256,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,271,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,285,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,300,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,461 UART: [ldev] --
13,324,129 UART: [fwproc] Waiting for Commands...
13,327,347 UART: [fwproc] Received command 0x46574c44
13,329,573 UART: [fwproc] Received Image of size 118548 bytes
22,565,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,645,991 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,719,170 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,047,947 >>> mbox cmd response: success
23,051,916 UART: [afmc] ++
23,052,526 UART: [afmc] CDI.KEYID = 6
23,053,441 UART: [afmc] SUBJECT.KEYID = 7
23,054,653 UART: [afmc] AUTHORITY.KEYID = 5
26,372,628 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,666,989 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,669,256 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,683,746 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,698,545 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,712,947 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,734,495 UART: [afmc] --
28,738,846 UART: [cold-reset] --
28,741,025 UART: [state] Locking Datavault
28,746,212 UART: [state] Locking PCR0, PCR1 and PCR31
28,747,959 UART: [state] Locking ICCM
28,750,459 UART: [exit] Launching FMC @ 0x40000130
28,758,848 UART:
28,759,077 UART: Running Caliptra FMC ...
28,760,120 UART:
28,760,265 UART: [state] CFI Enabled
28,768,625 UART: [fht] FMC Alias Private Key: 7
31,109,159 UART: [art] Extend RT PCRs Done
31,110,387 UART: [art] Lock RT PCRs Done
31,112,058 UART: [art] Populate DV Done
31,117,572 UART: [fht] FMC Alias Private Key: 7
31,119,212 UART: [art] Derive CDI
31,120,017 UART: [art] Store in slot 0x4
31,162,821 UART: [art] Derive Key Pair
31,163,812 UART: [art] Store priv key in slot 0x5
34,405,948 UART: [art] Derive Key Pair - Done
34,419,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,699,718 UART: [art] Erasing AUTHORITY.KEYID = 7
36,701,221 UART: [art] PUB.X = 6D350560616E54B5121F883F4E1A0B5E5F83C616AD3DE8A0AB17CAE211C976F1DD3B390C94708FDB2F77F9321565D8A7
36,708,505 UART: [art] PUB.Y = D63D03BAC42220FB2009A92F6DA1304B730AD8C9D8D7C7AC7A9699AA61FB0540F41E3A6C2657A516500FB7A11336C71C
36,715,753 UART: [art] SIG.R = 1D8DB19291FBF5DED94EE151366F24A6C4FAEC3EC54129F5CEFC7A0576EB01BCF8028E945DB3F8694550BD60C738B1A3
36,723,157 UART: [art] SIG.S = 48D56C75015C164F3CFD0C8A6E256E8A4D79ED59D11A02F3AC532729D47A23DE13E0364CDBE71B51D8BD7D2BF57A646C
38,028,450 UART: Caliptra RT
38,029,169 UART: [state] CFI Enabled
38,162,245 UART: [rt] RT listening for mailbox commands...
38,164,562 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,320,088 UART: [rt]cmd =0x41544d4e, len=14344
42,540,748 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,124,961 ready_for_fw is high
4,125,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,867,323 >>> mbox cmd response: success
27,509,767 UART:
27,510,183 UART: Running Caliptra FMC ...
27,511,305 UART:
27,511,458 UART: [state] CFI Enabled
27,519,398 UART: [fht] FMC Alias Private Key: 7
29,859,069 UART: [art] Extend RT PCRs Done
29,860,322 UART: [art] Lock RT PCRs Done
29,861,978 UART: [art] Populate DV Done
29,867,345 UART: [fht] FMC Alias Private Key: 7
29,868,940 UART: [art] Derive CDI
29,869,749 UART: [art] Store in slot 0x4
29,912,354 UART: [art] Derive Key Pair
29,913,395 UART: [art] Store priv key in slot 0x5
33,155,800 UART: [art] Derive Key Pair - Done
33,168,584 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,449,224 UART: [art] Erasing AUTHORITY.KEYID = 7
35,450,759 UART: [art] PUB.X = 8C0A0BE3918634EC79E3BDEDA9B2D994C99FD72DFCC2AB518D680C6518765B020C50FEF7357DA8048D94073C676877F9
35,458,004 UART: [art] PUB.Y = 84A650C368D7C4668CF99CF1CFF1277B82949FA348AA910857163FAC6EEC8142E47D5BD2437F15B759A06E5BB68BBDC1
35,465,290 UART: [art] SIG.R = 0220B8EABF485E92A5EA39BAB0AE61F44827CA08D3ECDBE4A7BEA612B3780489960C8C7CA7EDA67FE4762B90E40A5D52
35,472,679 UART: [art] SIG.S = 49392BBB338437BE341FC35CB0D442E033F192B142B2761906767037BD4465355BB4C91D7EBAD2BF9EFC551A25271496
36,778,392 UART: Caliptra RT
36,779,102 UART: [state] CFI Enabled
36,912,820 UART: [rt] RT listening for mailbox commands...
36,915,128 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,070,773 UART: [rt]cmd =0x41544d4e, len=14344
41,213,259 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,138 UART:
192,499 UART: Running Caliptra ROM ...
193,688 UART:
193,844 UART: [state] CFI Enabled
262,779 UART: [state] LifecycleState = Unprovisioned
264,887 UART: [state] DebugLocked = No
267,276 UART: [state] WD Timer not started. Device not locked for debugging
271,166 UART: [kat] SHA2-256
450,811 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,597 UART: [kat] ++
462,123 UART: [kat] sha1
472,529 UART: [kat] SHA2-256
475,188 UART: [kat] SHA2-384
481,670 UART: [kat] SHA2-512-ACC
484,028 UART: [kat] ECC-384
2,949,528 UART: [kat] HMAC-384Kdf
2,970,861 UART: [kat] LMS
3,447,340 UART: [kat] --
3,452,428 UART: [cold-reset] ++
3,453,791 UART: [fht] FHT @ 0x50003400
3,465,640 UART: [idev] ++
3,466,250 UART: [idev] CDI.KEYID = 6
3,467,174 UART: [idev] SUBJECT.KEYID = 7
3,468,420 UART: [idev] UDS.KEYID = 0
3,469,338 ready_for_fw is high
3,469,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,440 UART: [idev] Erasing UDS.KEYID = 0
5,984,751 UART: [idev] Sha1 KeyId Algorithm
6,008,786 UART: [idev] --
6,013,218 UART: [ldev] ++
6,013,786 UART: [ldev] CDI.KEYID = 6
6,014,699 UART: [ldev] SUBJECT.KEYID = 5
6,015,912 UART: [ldev] AUTHORITY.KEYID = 7
6,017,140 UART: [ldev] FE.KEYID = 1
6,057,493 UART: [ldev] Erasing FE.KEYID = 1
8,563,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,863 UART: [ldev] --
10,375,092 UART: [fwproc] Wait for Commands...
10,376,693 UART: [fwproc] Recv command 0x46574c44
10,378,751 UART: [fwproc] Recv'd Img size: 118548 bytes
14,933,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,016,608 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,089,619 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,418,258 >>> mbox cmd response: success
15,421,964 UART: [afmc] ++
15,422,549 UART: [afmc] CDI.KEYID = 6
15,423,511 UART: [afmc] SUBJECT.KEYID = 7
15,424,724 UART: [afmc] AUTHORITY.KEYID = 5
17,961,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,702,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,704,754 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,720,606 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,736,539 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,752,189 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,776,569 UART: [afmc] --
19,781,096 UART: [cold-reset] --
19,785,898 UART: [state] Locking Datavault
19,789,619 UART: [state] Locking PCR0, PCR1 and PCR31
19,791,376 UART: [state] Locking ICCM
19,792,527 UART: [exit] Launching FMC @ 0x40000130
19,800,916 UART:
19,801,153 UART: Running Caliptra FMC ...
19,802,181 UART:
19,802,324 UART: [state] CFI Enabled
19,860,729 UART: [fht] FMC Alias Private Key: 7
21,627,338 UART: [art] Extend RT PCRs Done
21,628,538 UART: [art] Lock RT PCRs Done
21,630,140 UART: [art] Populate DV Done
21,635,867 UART: [fht] FMC Alias Private Key: 7
21,637,610 UART: [art] Derive CDI
21,638,339 UART: [art] Store in slot 0x4
21,693,873 UART: [art] Derive Key Pair
21,694,872 UART: [art] Store priv key in slot 0x5
24,157,436 UART: [art] Derive Key Pair - Done
24,170,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,884,150 UART: [art] Erasing AUTHORITY.KEYID = 7
25,885,650 UART: [art] PUB.X = 1A4A318CA9B5CE3290A0E73635C7A39F2110B20BC229C26226A6D7C125B0DD08EFEE8AC92A6ED7A7D2EEC444BB8CFE60
25,892,945 UART: [art] PUB.Y = E17D5B8BD4E5FB0BDC71AB92C5CB2CD52B71641F4134147B1815E0F195B242920BC331D84C11DC62B38F67C5ABB7E666
25,900,229 UART: [art] SIG.R = AD5EA0B173B249F25A1A080014CB9A9F88F85350C8818F7F28E8A34502670507468DE23237B265944D508931B1F7BFB6
25,907,524 UART: [art] SIG.S = 044985E7DA488618A2F1D7686F4578FCCEF68185FE7A476C37BA1EAD77786FF5026BF9796E85B890E1DA4A695CC03CED
26,886,247 UART: Caliptra RT
26,886,959 UART: [state] CFI Enabled
27,068,496 UART: [rt] RT listening for mailbox commands...
27,070,830 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,226,177 UART: [rt]cmd =0x41544d4e, len=14344
29,617,537 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,461,950 ready_for_fw is high
3,462,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,389,262 >>> mbox cmd response: success
19,670,182 UART:
19,670,566 UART: Running Caliptra FMC ...
19,671,677 UART:
19,671,832 UART: [state] CFI Enabled
19,737,196 UART: [fht] FMC Alias Private Key: 7
21,503,294 UART: [art] Extend RT PCRs Done
21,504,520 UART: [art] Lock RT PCRs Done
21,506,191 UART: [art] Populate DV Done
21,511,526 UART: [fht] FMC Alias Private Key: 7
21,513,171 UART: [art] Derive CDI
21,513,905 UART: [art] Store in slot 0x4
21,569,480 UART: [art] Derive Key Pair
21,570,517 UART: [art] Store priv key in slot 0x5
24,033,722 UART: [art] Derive Key Pair - Done
24,046,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,759,899 UART: [art] Erasing AUTHORITY.KEYID = 7
25,761,393 UART: [art] PUB.X = 8341009A6C8AF090C4AE81AC3901B1F385CA8446B5D5464D7D884EAD2AA30AB8F7C1E41BA3C497182F3F5B83502C0D57
25,768,643 UART: [art] PUB.Y = 104939B70171A14A8B49C18FF807E877A10DA66AD35269B9FC28C08C9E42982D159DFC24EF0E3FD1F912467AB4B605C0
25,775,898 UART: [art] SIG.R = 12B148C7AF04710AD67E70B212FF9BF005C034CD3EB977143C7D76FD80AFD7BB7DF53826DEDFE51D0E9C294AFD995D71
25,783,299 UART: [art] SIG.S = 07DE0A35437C9F8C4FE13C746CCDC7A5E786E77B11B0256797DA808C97476689A72A90710D4B4EF99164BF85174B3987
26,762,731 UART: Caliptra RT
26,763,446 UART: [state] CFI Enabled
26,945,150 UART: [rt] RT listening for mailbox commands...
26,947,483 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,102,728 UART: [rt]cmd =0x41544d4e, len=14344
29,487,221 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,461 UART:
192,816 UART: Running Caliptra ROM ...
193,921 UART:
603,554 UART: [state] CFI Enabled
620,640 UART: [state] LifecycleState = Unprovisioned
622,589 UART: [state] DebugLocked = No
625,196 UART: [state] WD Timer not started. Device not locked for debugging
629,676 UART: [kat] SHA2-256
809,276 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,060 UART: [kat] ++
820,667 UART: [kat] sha1
832,122 UART: [kat] SHA2-256
834,777 UART: [kat] SHA2-384
841,554 UART: [kat] SHA2-512-ACC
843,925 UART: [kat] ECC-384
3,286,057 UART: [kat] HMAC-384Kdf
3,298,726 UART: [kat] LMS
3,775,246 UART: [kat] --
3,779,467 UART: [cold-reset] ++
3,781,630 UART: [fht] FHT @ 0x50003400
3,794,100 UART: [idev] ++
3,794,676 UART: [idev] CDI.KEYID = 6
3,795,606 UART: [idev] SUBJECT.KEYID = 7
3,796,852 UART: [idev] UDS.KEYID = 0
3,797,781 ready_for_fw is high
3,797,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,821 UART: [idev] Erasing UDS.KEYID = 0
6,278,722 UART: [idev] Sha1 KeyId Algorithm
6,301,894 UART: [idev] --
6,306,664 UART: [ldev] ++
6,307,240 UART: [ldev] CDI.KEYID = 6
6,308,151 UART: [ldev] SUBJECT.KEYID = 5
6,309,363 UART: [ldev] AUTHORITY.KEYID = 7
6,310,593 UART: [ldev] FE.KEYID = 1
6,322,481 UART: [ldev] Erasing FE.KEYID = 1
8,799,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,520,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,536,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,567,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,853 UART: [ldev] --
10,595,712 UART: [fwproc] Wait for Commands...
10,597,375 UART: [fwproc] Recv command 0x46574c44
10,599,411 UART: [fwproc] Recv'd Img size: 118548 bytes
15,120,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,205,096 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,278,114 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,605,971 >>> mbox cmd response: success
15,610,780 UART: [afmc] ++
15,611,393 UART: [afmc] CDI.KEYID = 6
15,612,310 UART: [afmc] SUBJECT.KEYID = 7
15,613,552 UART: [afmc] AUTHORITY.KEYID = 5
18,119,750 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,839,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,842,120 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,857,998 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,873,921 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,889,609 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,914,005 UART: [afmc] --
19,918,488 UART: [cold-reset] --
19,922,891 UART: [state] Locking Datavault
19,927,600 UART: [state] Locking PCR0, PCR1 and PCR31
19,929,354 UART: [state] Locking ICCM
19,931,779 UART: [exit] Launching FMC @ 0x40000130
19,940,188 UART:
19,940,425 UART: Running Caliptra FMC ...
19,941,528 UART:
19,941,709 UART: [state] CFI Enabled
19,949,541 UART: [fht] FMC Alias Private Key: 7
21,715,825 UART: [art] Extend RT PCRs Done
21,717,042 UART: [art] Lock RT PCRs Done
21,718,675 UART: [art] Populate DV Done
21,724,303 UART: [fht] FMC Alias Private Key: 7
21,725,790 UART: [art] Derive CDI
21,726,556 UART: [art] Store in slot 0x4
21,769,277 UART: [art] Derive Key Pair
21,770,321 UART: [art] Store priv key in slot 0x5
24,197,880 UART: [art] Derive Key Pair - Done
24,210,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,917,184 UART: [art] Erasing AUTHORITY.KEYID = 7
25,918,687 UART: [art] PUB.X = FBE211A21B76D6B1700A4B1153B224AAEB75B8D85E9630D4423BC91925D3F4E149C58801160C0462E689D9AF33920EF7
25,925,978 UART: [art] PUB.Y = 88CBCEA09EA84D48891B5F88E78425B06EA65E65075168A7EBD4237EF332C05B82FF0235F86DA7003BCEE20F51D60B3F
25,933,210 UART: [art] SIG.R = BD8D133334BFD79DB099166FE623E77F3AE94CF73BE7003AE10295930F5EEF913572796D9E218E12586E886B4D659535
25,940,620 UART: [art] SIG.S = 4604B4AD360449C1F5DBD27E778071684C556868848CD21F30E5DD9DE8794E1BE09A4431CEB405AC36A2BB2B2A40504E
26,919,663 UART: Caliptra RT
26,920,352 UART: [state] CFI Enabled
27,053,254 UART: [rt] RT listening for mailbox commands...
27,055,558 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,210,758 UART: [rt]cmd =0x41544d4e, len=14344
29,600,125 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,405 writing to cptra_bootfsm_go
3,780,995 ready_for_fw is high
3,781,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,591,652 >>> mbox cmd response: success
19,842,507 UART:
19,842,886 UART: Running Caliptra FMC ...
19,843,992 UART:
19,844,153 UART: [state] CFI Enabled
19,852,306 UART: [fht] FMC Alias Private Key: 7
21,618,390 UART: [art] Extend RT PCRs Done
21,619,632 UART: [art] Lock RT PCRs Done
21,621,500 UART: [art] Populate DV Done
21,627,107 UART: [fht] FMC Alias Private Key: 7
21,628,594 UART: [art] Derive CDI
21,629,330 UART: [art] Store in slot 0x4
21,672,011 UART: [art] Derive Key Pair
21,673,057 UART: [art] Store priv key in slot 0x5
24,099,795 UART: [art] Derive Key Pair - Done
24,112,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,819,077 UART: [art] Erasing AUTHORITY.KEYID = 7
25,820,587 UART: [art] PUB.X = 77490AE983E2ABC225706FD7DFBE282D59B621F740852E0A770E45E724C1C56EBED75D1F456D17B482E2EE89645C8E60
25,827,845 UART: [art] PUB.Y = BF66D58499FD494E8E3A34D789BF77496C202C048D054C0B0027A10B53AC5DFDBE8FCCAE9E12C3A031C077A59CC797B1
25,835,068 UART: [art] SIG.R = EAE8DCE0EA33E5FF0FB743217A314CBAAD333B6206EB58CDE9A5083EACD2EA27A8295DC760CD4BA6ADF9A6B004CB81B0
25,842,539 UART: [art] SIG.S = 43551CBA22F423C67C4789D65AEFF9ADB433C9A050393EA0557367951F3637F0B750D524A258003BF9B0B1BF3FAA1F62
26,821,826 UART: Caliptra RT
26,822,517 UART: [state] CFI Enabled
26,955,587 UART: [rt] RT listening for mailbox commands...
26,957,880 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,113,230 UART: [rt]cmd =0x41544d4e, len=14344
29,498,086 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,369 UART:
192,736 UART: Running Caliptra ROM ...
193,913 UART:
194,065 UART: [state] CFI Enabled
262,613 UART: [state] LifecycleState = Unprovisioned
265,037 UART: [state] DebugLocked = No
267,429 UART: [state] WD Timer not started. Device not locked for debugging
272,741 UART: [kat] SHA2-256
462,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,435 UART: [kat] ++
473,917 UART: [kat] sha1
484,864 UART: [kat] SHA2-256
487,879 UART: [kat] SHA2-384
492,802 UART: [kat] SHA2-512-ACC
495,378 UART: [kat] ECC-384
2,946,687 UART: [kat] HMAC-384Kdf
2,971,710 UART: [kat] LMS
3,503,477 UART: [kat] --
3,509,345 UART: [cold-reset] ++
3,511,244 UART: [fht] FHT @ 0x50003400
3,521,303 UART: [idev] ++
3,522,004 UART: [idev] CDI.KEYID = 6
3,522,914 UART: [idev] SUBJECT.KEYID = 7
3,524,152 UART: [idev] UDS.KEYID = 0
3,525,070 ready_for_fw is high
3,525,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,660 UART: [idev] Erasing UDS.KEYID = 0
6,028,582 UART: [idev] Sha1 KeyId Algorithm
6,051,282 UART: [idev] --
6,056,409 UART: [ldev] ++
6,057,088 UART: [ldev] CDI.KEYID = 6
6,057,999 UART: [ldev] SUBJECT.KEYID = 5
6,059,156 UART: [ldev] AUTHORITY.KEYID = 7
6,060,383 UART: [ldev] FE.KEYID = 1
6,098,369 UART: [ldev] Erasing FE.KEYID = 1
8,608,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,753 UART: [ldev] --
10,413,502 UART: [fwproc] Wait for Commands...
10,415,487 UART: [fwproc] Recv command 0x46574c44
10,417,739 UART: [fwproc] Recv'd Img size: 118548 bytes
15,088,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,167,658 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,291,280 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,851,006 >>> mbox cmd response: success
15,854,518 UART: [afmc] ++
15,855,224 UART: [afmc] CDI.KEYID = 6
15,856,413 UART: [afmc] SUBJECT.KEYID = 7
15,857,904 UART: [afmc] AUTHORITY.KEYID = 5
18,385,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,132,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,134,034 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,149,131 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,164,361 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,179,379 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,204,014 UART: [afmc] --
20,207,076 UART: [cold-reset] --
20,211,754 UART: [state] Locking Datavault
20,217,869 UART: [state] Locking PCR0, PCR1 and PCR31
20,220,021 UART: [state] Locking ICCM
20,222,065 UART: [exit] Launching FMC @ 0x40000130
20,230,752 UART:
20,231,024 UART: Running Caliptra FMC ...
20,232,132 UART:
20,232,290 UART: [state] CFI Enabled
20,286,700 UART: [fht] FMC Alias Private Key: 7
22,053,289 UART: [art] Extend RT PCRs Done
22,054,513 UART: [art] Lock RT PCRs Done
22,056,034 UART: [art] Populate DV Done
22,061,736 UART: [fht] FMC Alias Private Key: 7
22,063,442 UART: [art] Derive CDI
22,064,257 UART: [art] Store in slot 0x4
22,119,276 UART: [art] Derive Key Pair
22,120,316 UART: [art] Store priv key in slot 0x5
24,583,346 UART: [art] Derive Key Pair - Done
24,596,286 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,308,840 UART: [art] Erasing AUTHORITY.KEYID = 7
26,310,328 UART: [art] PUB.X = 3EB9DA135EDAF32F4E3B973F88E711E0D4444D5C5DAF2DB63FF192322D25DE214F66E8572DC647224B6101DE43A9B79C
26,317,601 UART: [art] PUB.Y = 31EEEDEE98D5B5AC29F4086263F79FB589113E32D486E8A03D46443DFA9647127608655021235D436B2E188FD4F73E7C
26,324,865 UART: [art] SIG.R = 33E58B8A1902FAA9ED7CA89D21137228C23E56934B70CB94D55B99FCFE56550081E37CCB569602E3FAB315C9F270E9E9
26,332,232 UART: [art] SIG.S = C15EF690345F8D2E6FFBCA2E8D26C7E94A7FC6A5F7245B577657B6558902B27215E1F7193DDD7F385AA4516A8244C3AE
27,311,150 UART: Caliptra RT
27,311,869 UART: [state] CFI Enabled
27,492,653 UART: [rt] RT listening for mailbox commands...
27,494,962 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,650,492 UART: [rt]cmd =0x41544d4e, len=14344
30,026,928 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,419,047 ready_for_fw is high
3,419,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,894,196 >>> mbox cmd response: success
20,180,914 UART:
20,181,291 UART: Running Caliptra FMC ...
20,182,390 UART:
20,182,538 UART: [state] CFI Enabled
20,248,725 UART: [fht] FMC Alias Private Key: 7
22,014,772 UART: [art] Extend RT PCRs Done
22,016,000 UART: [art] Lock RT PCRs Done
22,017,450 UART: [art] Populate DV Done
22,022,952 UART: [fht] FMC Alias Private Key: 7
22,024,557 UART: [art] Derive CDI
22,025,372 UART: [art] Store in slot 0x4
22,082,040 UART: [art] Derive Key Pair
22,083,078 UART: [art] Store priv key in slot 0x5
24,546,030 UART: [art] Derive Key Pair - Done
24,559,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,272,037 UART: [art] Erasing AUTHORITY.KEYID = 7
26,273,552 UART: [art] PUB.X = 9318B2677C43555301266F4664A789418636B96BDB9D839E31C8D42F689EEABF22BDD519F6CBAE1D65D2ED8FC9F06C10
26,280,830 UART: [art] PUB.Y = 2AFB0647E3C3B9D92AA66A9DED88C6E1C86CF034398F57BC31FAC70BCB47EA8636BCD54B1CC13D3382FDB555FCB1121C
26,288,105 UART: [art] SIG.R = 5F3F8D3FF5B2C59B6ABFB270EB2FB7FAC42F368DBD0CB529444942E0831DF03FEFE30B073E42CD7ADB335128827A246B
26,295,520 UART: [art] SIG.S = 4D743C91ECAE2B32CB6A56B88674D5D5550050AD3C3C3D01065C3667C7133EDEED046A37080A27B1DB26F266BAFBEF64
27,274,655 UART: Caliptra RT
27,275,343 UART: [state] CFI Enabled
27,455,574 UART: [rt] RT listening for mailbox commands...
27,457,843 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,613,110 UART: [rt]cmd =0x41544d4e, len=14344
29,983,491 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,072 writing to cptra_bootfsm_go
193,395 UART:
193,750 UART: Running Caliptra ROM ...
194,952 UART:
604,638 UART: [state] CFI Enabled
616,834 UART: [state] LifecycleState = Unprovisioned
619,154 UART: [state] DebugLocked = No
620,895 UART: [state] WD Timer not started. Device not locked for debugging
626,014 UART: [kat] SHA2-256
815,911 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,725 UART: [kat] ++
827,170 UART: [kat] sha1
837,552 UART: [kat] SHA2-256
840,572 UART: [kat] SHA2-384
845,788 UART: [kat] SHA2-512-ACC
848,396 UART: [kat] ECC-384
3,291,931 UART: [kat] HMAC-384Kdf
3,306,085 UART: [kat] LMS
3,837,898 UART: [kat] --
3,841,907 UART: [cold-reset] ++
3,843,796 UART: [fht] FHT @ 0x50003400
3,854,922 UART: [idev] ++
3,855,568 UART: [idev] CDI.KEYID = 6
3,856,524 UART: [idev] SUBJECT.KEYID = 7
3,857,766 UART: [idev] UDS.KEYID = 0
3,858,706 ready_for_fw is high
3,858,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,814 UART: [idev] Erasing UDS.KEYID = 0
6,336,902 UART: [idev] Sha1 KeyId Algorithm
6,359,392 UART: [idev] --
6,363,875 UART: [ldev] ++
6,364,573 UART: [ldev] CDI.KEYID = 6
6,365,461 UART: [ldev] SUBJECT.KEYID = 5
6,366,677 UART: [ldev] AUTHORITY.KEYID = 7
6,367,858 UART: [ldev] FE.KEYID = 1
6,380,503 UART: [ldev] Erasing FE.KEYID = 1
8,858,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,473 UART: [ldev] --
10,649,477 UART: [fwproc] Wait for Commands...
10,651,965 UART: [fwproc] Recv command 0x46574c44
10,654,279 UART: [fwproc] Recv'd Img size: 118548 bytes
15,311,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,390,463 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,514,093 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,073,533 >>> mbox cmd response: success
16,078,314 UART: [afmc] ++
16,079,025 UART: [afmc] CDI.KEYID = 6
16,080,384 UART: [afmc] SUBJECT.KEYID = 7
16,081,689 UART: [afmc] AUTHORITY.KEYID = 5
18,579,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,300,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,302,443 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,317,544 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,332,771 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,347,857 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,371,301 UART: [afmc] --
20,374,961 UART: [cold-reset] --
20,379,163 UART: [state] Locking Datavault
20,385,738 UART: [state] Locking PCR0, PCR1 and PCR31
20,387,977 UART: [state] Locking ICCM
20,390,402 UART: [exit] Launching FMC @ 0x40000130
20,399,042 UART:
20,399,283 UART: Running Caliptra FMC ...
20,400,627 UART:
20,400,802 UART: [state] CFI Enabled
20,408,481 UART: [fht] FMC Alias Private Key: 7
22,175,355 UART: [art] Extend RT PCRs Done
22,176,577 UART: [art] Lock RT PCRs Done
22,178,528 UART: [art] Populate DV Done
22,184,269 UART: [fht] FMC Alias Private Key: 7
22,185,978 UART: [art] Derive CDI
22,186,719 UART: [art] Store in slot 0x4
22,229,098 UART: [art] Derive Key Pair
22,230,102 UART: [art] Store priv key in slot 0x5
24,656,063 UART: [art] Derive Key Pair - Done
24,668,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,375,262 UART: [art] Erasing AUTHORITY.KEYID = 7
26,376,773 UART: [art] PUB.X = 790597EC816AA1D2589B02A16A7449F24C660519E597DCFE6953C1F91FCB7FE961622188EB13100F56458A9DA3BFA247
26,384,038 UART: [art] PUB.Y = 3412E498E9E5082EADAEA66CE53E5777001C78FC8827CB9DB4AB86719D7AB24D85CDFE493911847529B64ECDB13BDC7A
26,391,297 UART: [art] SIG.R = 9BECFF88BA44ECC9B6015A57417B8ADDFFCAB5F0917668E3EDFB9625366B61452A147E0EF8ACDDFFCAA502F1FD6E684F
26,398,730 UART: [art] SIG.S = 6ED11F0D928C13221391545CA70E9BF1DA1D8D3BDBD7796F3E3D9CC5C6CA79607FDFE4A665A6D272D23A0E83B9DAE569
27,377,702 UART: Caliptra RT
27,378,392 UART: [state] CFI Enabled
27,511,438 UART: [rt] RT listening for mailbox commands...
27,513,724 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,668,981 UART: [rt]cmd =0x41544d4e, len=14344
30,051,906 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,757,456 ready_for_fw is high
3,757,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,152,562 >>> mbox cmd response: success
20,409,599 UART:
20,409,975 UART: Running Caliptra FMC ...
20,411,179 UART:
20,411,351 UART: [state] CFI Enabled
20,419,551 UART: [fht] FMC Alias Private Key: 7
22,185,462 UART: [art] Extend RT PCRs Done
22,186,683 UART: [art] Lock RT PCRs Done
22,188,720 UART: [art] Populate DV Done
22,194,254 UART: [fht] FMC Alias Private Key: 7
22,195,822 UART: [art] Derive CDI
22,196,566 UART: [art] Store in slot 0x4
22,239,514 UART: [art] Derive Key Pair
22,240,522 UART: [art] Store priv key in slot 0x5
24,667,516 UART: [art] Derive Key Pair - Done
24,680,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,386,764 UART: [art] Erasing AUTHORITY.KEYID = 7
26,388,276 UART: [art] PUB.X = 434A81AC35FC8AB708EDEBED2B1E8891F8EDC3F535BCFF71193F0102C8C53B42B71C8495A6EFB70E0D71700C99F60019
26,395,539 UART: [art] PUB.Y = 5F728EFE6B9CB8811CE84D0D8990ADE39CB0FD8BD21E0D64BF9B8145857E54C5944D3B65FED24E6DB22E60BF016C8766
26,402,782 UART: [art] SIG.R = D06E4F8490DA20E40861D5D433FC9F2613A138460823A378DADD3AB46C55578F30D35A840EDF08F1FD13A902DD4EB421
26,410,198 UART: [art] SIG.S = DF2AC2E363E406AC82BD6FA87DC761CD9C9FC52C4988E2FBBAFDEC3967EEF71E7E90D0D7C2A5DDCE6ECF9DA8307FC20F
27,389,429 UART: Caliptra RT
27,390,120 UART: [state] CFI Enabled
27,523,841 UART: [rt] RT listening for mailbox commands...
27,526,128 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,681,733 UART: [rt]cmd =0x41544d4e, len=14344
30,068,713 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,191 UART: [kat] SHA2-256
882,122 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,237 UART: [kat] ++
886,389 UART: [kat] sha1
890,587 UART: [kat] SHA2-256
892,525 UART: [kat] SHA2-384
895,260 UART: [kat] SHA2-512-ACC
897,161 UART: [kat] ECC-384
902,676 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,217 UART: [cold-reset] ++
1,476,549 UART: [fht] Storing FHT @ 0x50003400
1,479,288 UART: [idev] ++
1,479,456 UART: [idev] CDI.KEYID = 6
1,479,816 UART: [idev] SUBJECT.KEYID = 7
1,480,240 UART: [idev] UDS.KEYID = 0
1,480,585 ready_for_fw is high
1,480,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,142 UART: [idev] Erasing UDS.KEYID = 0
1,504,668 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,398 UART: [idev] --
1,514,491 UART: [ldev] ++
1,514,659 UART: [ldev] CDI.KEYID = 6
1,515,022 UART: [ldev] SUBJECT.KEYID = 5
1,515,448 UART: [ldev] AUTHORITY.KEYID = 7
1,515,911 UART: [ldev] FE.KEYID = 1
1,521,095 UART: [ldev] Erasing FE.KEYID = 1
1,546,350 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,504 UART: [ldev] --
1,585,939 UART: [fwproc] Waiting for Commands...
1,586,696 UART: [fwproc] Received command 0x46574c44
1,587,487 UART: [fwproc] Received Image of size 118548 bytes
5,318,124 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,346,560 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,377,778 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,518,019 >>> mbox cmd response: success
5,519,163 UART: [afmc] ++
5,519,331 UART: [afmc] CDI.KEYID = 6
5,519,693 UART: [afmc] SUBJECT.KEYID = 7
5,520,118 UART: [afmc] AUTHORITY.KEYID = 5
5,555,109 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,571,655 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,572,435 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,578,141 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,584,020 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,589,733 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,597,476 UART: [afmc] --
5,598,498 UART: [cold-reset] --
5,599,494 UART: [state] Locking Datavault
5,600,705 UART: [state] Locking PCR0, PCR1 and PCR31
5,601,309 UART: [state] Locking ICCM
5,601,915 UART: [exit] Launching FMC @ 0x40000130
5,607,245 UART:
5,607,261 UART: Running Caliptra FMC ...
5,607,669 UART:
5,607,723 UART: [state] CFI Enabled
5,618,285 UART: [fht] FMC Alias Private Key: 7
5,737,323 UART: [art] Extend RT PCRs Done
5,737,751 UART: [art] Lock RT PCRs Done
5,739,183 UART: [art] Populate DV Done
5,747,560 UART: [fht] FMC Alias Private Key: 7
5,748,536 UART: [art] Derive CDI
5,748,816 UART: [art] Store in slot 0x4
5,834,296 UART: [art] Derive Key Pair
5,834,656 UART: [art] Store priv key in slot 0x5
5,848,233 UART: [art] Derive Key Pair - Done
5,863,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,878,555 UART: [art] Erasing AUTHORITY.KEYID = 7
5,879,320 UART: [art] PUB.X = 9E121286309BDCFF4F1B03A570A05F87FD45DC86A1AB475652BED8ABD93B1709CF0985067D9C4689EC27E0C54F2A58AB
5,886,090 UART: [art] PUB.Y = BDD7A57D981217850048B5EA20DD3B7F1D1519CB7A41BA2D0DA767EFB0A3491BDB2A604A6A7295D532AB67B6C73B0D15
5,893,026 UART: [art] SIG.R = 7962F7C99D8B2EC9B354966A13364C189D4062597AF5A7F29CCD5F5EA617ED13FC993E084E1BE11D709F88FEAC178C06
5,899,798 UART: [art] SIG.S = A546682023A76626C73F428FAD7A19D1850C4525456931EFBF42653E69497880554A2E7B963CF8C298BBCE9239567A18
5,923,909 UART: Caliptra RT
5,924,160 UART: [state] CFI Enabled
6,044,022 UART: [rt] RT listening for mailbox commands...
6,044,692 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,167,826 UART: [rt]cmd =0x41544d4e, len=14344
8,435,586 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,985 ready_for_fw is high
1,361,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,291,691 >>> mbox cmd response: success
5,353,170 UART:
5,353,186 UART: Running Caliptra FMC ...
5,353,594 UART:
5,353,648 UART: [state] CFI Enabled
5,364,008 UART: [fht] FMC Alias Private Key: 7
5,482,672 UART: [art] Extend RT PCRs Done
5,483,100 UART: [art] Lock RT PCRs Done
5,485,002 UART: [art] Populate DV Done
5,493,229 UART: [fht] FMC Alias Private Key: 7
5,494,297 UART: [art] Derive CDI
5,494,577 UART: [art] Store in slot 0x4
5,580,523 UART: [art] Derive Key Pair
5,580,883 UART: [art] Store priv key in slot 0x5
5,593,984 UART: [art] Derive Key Pair - Done
5,608,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,623,715 UART: [art] Erasing AUTHORITY.KEYID = 7
5,624,480 UART: [art] PUB.X = EFB518F6380C68574ECC3AC8DD90FEF2480B9F523075699E984D552B0772FC1263ADEE2FE858176A77D4B73CE150532A
5,631,247 UART: [art] PUB.Y = 09245368F446712C1502464B42846F6ACF02F295DE0A7F1FEFE0AB6CDC0EB3F94E68A4C483B97CC0A7A1F9EA13CF2CC0
5,638,198 UART: [art] SIG.R = 7BC6736D9B38E5C622A90D8940500EE164C18F17E5FD7DA14327121B79031F6EFF49949424A56D93812D0AE1C9315C81
5,644,952 UART: [art] SIG.S = 4FAC91E27A84633AC91EDC49C1BCD7ED0D6DB9B3ACB22CE5B49CF5BC9E7D4E4E60881C830AD2DD61AD7EBACEC62D6B5D
5,668,674 UART: Caliptra RT
5,668,925 UART: [state] CFI Enabled
5,788,682 UART: [rt] RT listening for mailbox commands...
5,789,352 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,912,218 UART: [rt]cmd =0x41544d4e, len=14344
8,445,033 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,734 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,452 UART: [kat] SHA2-256
882,383 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,498 UART: [kat] ++
886,650 UART: [kat] sha1
890,940 UART: [kat] SHA2-256
892,878 UART: [kat] SHA2-384
895,761 UART: [kat] SHA2-512-ACC
897,662 UART: [kat] ECC-384
903,547 UART: [kat] HMAC-384Kdf
908,081 UART: [kat] LMS
1,476,277 UART: [kat] --
1,477,190 UART: [cold-reset] ++
1,477,764 UART: [fht] Storing FHT @ 0x50003400
1,480,427 UART: [idev] ++
1,480,595 UART: [idev] CDI.KEYID = 6
1,480,955 UART: [idev] SUBJECT.KEYID = 7
1,481,379 UART: [idev] UDS.KEYID = 0
1,481,724 ready_for_fw is high
1,481,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,605 UART: [idev] Erasing UDS.KEYID = 0
1,506,015 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,753 UART: [idev] --
1,515,768 UART: [ldev] ++
1,515,936 UART: [ldev] CDI.KEYID = 6
1,516,299 UART: [ldev] SUBJECT.KEYID = 5
1,516,725 UART: [ldev] AUTHORITY.KEYID = 7
1,517,188 UART: [ldev] FE.KEYID = 1
1,522,476 UART: [ldev] Erasing FE.KEYID = 1
1,548,155 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,777 UART: [ldev] --
1,587,134 UART: [fwproc] Waiting for Commands...
1,587,979 UART: [fwproc] Received command 0x46574c44
1,588,770 UART: [fwproc] Received Image of size 118548 bytes
5,131,736 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,159,984 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,191,202 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,331,631 >>> mbox cmd response: success
5,332,793 UART: [afmc] ++
5,332,961 UART: [afmc] CDI.KEYID = 6
5,333,323 UART: [afmc] SUBJECT.KEYID = 7
5,333,748 UART: [afmc] AUTHORITY.KEYID = 5
5,368,859 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,385,139 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,385,919 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,391,625 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,397,504 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,403,217 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,411,084 UART: [afmc] --
5,412,020 UART: [cold-reset] --
5,412,920 UART: [state] Locking Datavault
5,414,265 UART: [state] Locking PCR0, PCR1 and PCR31
5,414,869 UART: [state] Locking ICCM
5,415,313 UART: [exit] Launching FMC @ 0x40000130
5,420,643 UART:
5,420,659 UART: Running Caliptra FMC ...
5,421,067 UART:
5,421,210 UART: [state] CFI Enabled
5,431,932 UART: [fht] FMC Alias Private Key: 7
5,550,458 UART: [art] Extend RT PCRs Done
5,550,886 UART: [art] Lock RT PCRs Done
5,552,224 UART: [art] Populate DV Done
5,560,483 UART: [fht] FMC Alias Private Key: 7
5,561,433 UART: [art] Derive CDI
5,561,713 UART: [art] Store in slot 0x4
5,647,339 UART: [art] Derive Key Pair
5,647,699 UART: [art] Store priv key in slot 0x5
5,661,764 UART: [art] Derive Key Pair - Done
5,676,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,692,125 UART: [art] Erasing AUTHORITY.KEYID = 7
5,692,890 UART: [art] PUB.X = 98EDF0584E07CE58E0A224B2D1EE56F9A7EE6523B2191191749A45D77995016F78DAB9D61A94FF492B87989DC46E23C6
5,699,656 UART: [art] PUB.Y = B4098018C71500B42344F06AE3F8B890E82BCE8751E36BF37D4478509A63C0E90ACA0960872BFAA019B98085B1012813
5,706,566 UART: [art] SIG.R = 421386AAF45A77476E597F562E10A00D31FFC8F20E9150727C15DE49BCC01242A054700A7C0FDF2FF2C658D814A1BDFA
5,713,332 UART: [art] SIG.S = 460786F85E76314434FF3CCA44434A0E48C9A1FC6F32779680D1D65DC14DA048235A7656F899B59A5073519E752FE09D
5,737,538 UART: Caliptra RT
5,737,881 UART: [state] CFI Enabled
5,858,168 UART: [rt] RT listening for mailbox commands...
5,858,838 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,981,770 UART: [rt]cmd =0x41544d4e, len=14344
8,211,736 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,538 ready_for_fw is high
1,362,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,331,973 >>> mbox cmd response: success
5,393,822 UART:
5,393,838 UART: Running Caliptra FMC ...
5,394,246 UART:
5,394,389 UART: [state] CFI Enabled
5,404,973 UART: [fht] FMC Alias Private Key: 7
5,524,763 UART: [art] Extend RT PCRs Done
5,525,191 UART: [art] Lock RT PCRs Done
5,526,759 UART: [art] Populate DV Done
5,534,784 UART: [fht] FMC Alias Private Key: 7
5,535,938 UART: [art] Derive CDI
5,536,218 UART: [art] Store in slot 0x4
5,622,144 UART: [art] Derive Key Pair
5,622,504 UART: [art] Store priv key in slot 0x5
5,635,977 UART: [art] Derive Key Pair - Done
5,650,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,666,983 UART: [art] Erasing AUTHORITY.KEYID = 7
5,667,748 UART: [art] PUB.X = 56033D3BA89716C812781D62A63F0F12759DF8482A56FE7866130E18020995077D65D4F3649356F594E512B01818883D
5,674,480 UART: [art] PUB.Y = 1DF9894DE9F2AD4BBD6D0E81176CB3058555413D1FD77CA70BC03D80A6FBF5F85AF8F4BDBB7CFB982FEFA5F70A57EE1C
5,681,448 UART: [art] SIG.R = AE44DCF6AF4D3BBAA90A673155BF4339AA2193BCE9B8CA40B60696246A21EE53A89F44F44E6610509BA4B75CF4806CEC
5,688,228 UART: [art] SIG.S = CF4EBA3044299D548EE0B5B6BE2CE5F263BE24A12283CAA82F78614CCBC9FE942F59FA475D289A0390EC391B70CB3FB5
5,712,341 UART: Caliptra RT
5,712,684 UART: [state] CFI Enabled
5,832,863 UART: [rt] RT listening for mailbox commands...
5,833,533 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,956,575 UART: [rt]cmd =0x41544d4e, len=14344
8,300,523 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,252 UART: [kat] ++
895,404 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,377 UART: [kat] SHA2-512-ACC
906,278 UART: [kat] ECC-384
915,599 UART: [kat] HMAC-384Kdf
920,163 UART: [kat] LMS
1,168,475 UART: [kat] --
1,169,544 UART: [cold-reset] ++
1,170,096 UART: [fht] FHT @ 0x50003400
1,172,772 UART: [idev] ++
1,172,940 UART: [idev] CDI.KEYID = 6
1,173,301 UART: [idev] SUBJECT.KEYID = 7
1,173,726 UART: [idev] UDS.KEYID = 0
1,174,072 ready_for_fw is high
1,174,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,581 UART: [idev] Erasing UDS.KEYID = 0
1,198,041 UART: [idev] Sha1 KeyId Algorithm
1,206,921 UART: [idev] --
1,207,970 UART: [ldev] ++
1,208,138 UART: [ldev] CDI.KEYID = 6
1,208,502 UART: [ldev] SUBJECT.KEYID = 5
1,208,929 UART: [ldev] AUTHORITY.KEYID = 7
1,209,392 UART: [ldev] FE.KEYID = 1
1,214,460 UART: [ldev] Erasing FE.KEYID = 1
1,241,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,318 UART: [ldev] --
1,280,537 UART: [fwproc] Wait for Commands...
1,281,170 UART: [fwproc] Recv command 0x46574c44
1,281,903 UART: [fwproc] Recv'd Img size: 118548 bytes
3,170,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,594 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,769 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,986 >>> mbox cmd response: success
3,370,002 UART: [afmc] ++
3,370,170 UART: [afmc] CDI.KEYID = 6
3,370,533 UART: [afmc] SUBJECT.KEYID = 7
3,370,959 UART: [afmc] AUTHORITY.KEYID = 5
3,406,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,422,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,668 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,429,375 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,435,252 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,440,962 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,448,700 UART: [afmc] --
3,449,551 UART: [cold-reset] --
3,450,363 UART: [state] Locking Datavault
3,451,272 UART: [state] Locking PCR0, PCR1 and PCR31
3,451,876 UART: [state] Locking ICCM
3,452,494 UART: [exit] Launching FMC @ 0x40000130
3,457,824 UART:
3,457,840 UART: Running Caliptra FMC ...
3,458,248 UART:
3,458,302 UART: [state] CFI Enabled
3,468,502 UART: [fht] FMC Alias Private Key: 7
3,587,916 UART: [art] Extend RT PCRs Done
3,588,344 UART: [art] Lock RT PCRs Done
3,589,932 UART: [art] Populate DV Done
3,598,095 UART: [fht] FMC Alias Private Key: 7
3,599,037 UART: [art] Derive CDI
3,599,317 UART: [art] Store in slot 0x4
3,684,756 UART: [art] Derive Key Pair
3,685,116 UART: [art] Store priv key in slot 0x5
3,698,680 UART: [art] Derive Key Pair - Done
3,713,824 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,729,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,730,320 UART: [art] PUB.X = 98947F7A9A2833EF7E0574E5751C1DE93E11CBBBB668E1F5B48FA2847CAF599EC2DAB5BE514B598998CEBCE014F76CE8
3,737,105 UART: [art] PUB.Y = A9D4C2238EF0B55DEE8C26784AE8415ED0465F0D3F4E62129E391F0E9B49ED78A450FD0D703C66AE79D3658E64B5CE35
3,744,056 UART: [art] SIG.R = B6D51805A7FDFF524F2E76C366148BBD25194EBFDD9DB6B15EE3EEC2E8244C00287273A5D28B5145AFDA61993F5DD992
3,750,815 UART: [art] SIG.S = CF6079B74051295B373BDD918EC6110072A15436F75FDBA75558CFAFAE812E2BFABF0C51BE57E82D64B4688DDC5F2AFE
3,774,668 UART: Caliptra RT
3,774,919 UART: [state] CFI Enabled
3,895,188 UART: [rt] RT listening for mailbox commands...
3,895,858 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,018,746 UART: [rt]cmd =0x41544d4e, len=14344
4,606,312 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,928 ready_for_fw is high
1,059,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,499 >>> mbox cmd response: success
3,291,534 UART:
3,291,550 UART: Running Caliptra FMC ...
3,291,958 UART:
3,292,012 UART: [state] CFI Enabled
3,302,622 UART: [fht] FMC Alias Private Key: 7
3,421,710 UART: [art] Extend RT PCRs Done
3,422,138 UART: [art] Lock RT PCRs Done
3,423,768 UART: [art] Populate DV Done
3,432,187 UART: [fht] FMC Alias Private Key: 7
3,433,343 UART: [art] Derive CDI
3,433,623 UART: [art] Store in slot 0x4
3,519,500 UART: [art] Derive Key Pair
3,519,860 UART: [art] Store priv key in slot 0x5
3,533,626 UART: [art] Derive Key Pair - Done
3,548,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,903 UART: [art] Erasing AUTHORITY.KEYID = 7
3,564,668 UART: [art] PUB.X = 559F3A38F81B7D2E45574DFFF2A4AD7E95972CF6221D2BFC9D1F30D3B7A8DFFBB0F6388BC42BEF3B72A872E65B56C18A
3,571,460 UART: [art] PUB.Y = 471704DB92B7DCB6A398D78A2910C10583BD80053F9D74217BA1A26562C32D9032982F9520F7F581327EBF0FE63E5C9E
3,578,396 UART: [art] SIG.R = F76A60E54D446E21990CEA5CC1F7C263FFA568162436BB58CD308AF737C81FA428C0C2B1C61054B641CE49D353F5E736
3,585,169 UART: [art] SIG.S = DC6C394BAC6F78881E6D171014FC9C3976A351BAB1D3C5ACDBA5D2735155D14A59D019C16B23A29D91E76802E145DA0E
3,608,921 UART: Caliptra RT
3,609,172 UART: [state] CFI Enabled
3,728,689 UART: [rt] RT listening for mailbox commands...
3,729,359 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,223 UART: [rt]cmd =0x41544d4e, len=14344
4,447,706 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,821 UART: [kat] ++
895,973 UART: [kat] sha1
900,185 UART: [kat] SHA2-256
902,125 UART: [kat] SHA2-384
904,706 UART: [kat] SHA2-512-ACC
906,607 UART: [kat] ECC-384
916,574 UART: [kat] HMAC-384Kdf
921,380 UART: [kat] LMS
1,169,692 UART: [kat] --
1,170,685 UART: [cold-reset] ++
1,171,133 UART: [fht] FHT @ 0x50003400
1,173,659 UART: [idev] ++
1,173,827 UART: [idev] CDI.KEYID = 6
1,174,188 UART: [idev] SUBJECT.KEYID = 7
1,174,613 UART: [idev] UDS.KEYID = 0
1,174,959 ready_for_fw is high
1,174,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,664 UART: [idev] Erasing UDS.KEYID = 0
1,199,940 UART: [idev] Sha1 KeyId Algorithm
1,208,576 UART: [idev] --
1,209,569 UART: [ldev] ++
1,209,737 UART: [ldev] CDI.KEYID = 6
1,210,101 UART: [ldev] SUBJECT.KEYID = 5
1,210,528 UART: [ldev] AUTHORITY.KEYID = 7
1,210,991 UART: [ldev] FE.KEYID = 1
1,216,033 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,143 UART: [ldev] --
1,281,536 UART: [fwproc] Wait for Commands...
1,282,117 UART: [fwproc] Recv command 0x46574c44
1,282,850 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,170 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,345 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,558 >>> mbox cmd response: success
3,374,584 UART: [afmc] ++
3,374,752 UART: [afmc] CDI.KEYID = 6
3,375,115 UART: [afmc] SUBJECT.KEYID = 7
3,375,541 UART: [afmc] AUTHORITY.KEYID = 5
3,410,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,272 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,979 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,856 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,566 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,484 UART: [afmc] --
3,454,373 UART: [cold-reset] --
3,455,251 UART: [state] Locking Datavault
3,456,290 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,894 UART: [state] Locking ICCM
3,457,346 UART: [exit] Launching FMC @ 0x40000130
3,462,676 UART:
3,462,692 UART: Running Caliptra FMC ...
3,463,100 UART:
3,463,243 UART: [state] CFI Enabled
3,473,787 UART: [fht] FMC Alias Private Key: 7
3,593,189 UART: [art] Extend RT PCRs Done
3,593,617 UART: [art] Lock RT PCRs Done
3,595,151 UART: [art] Populate DV Done
3,603,176 UART: [fht] FMC Alias Private Key: 7
3,604,242 UART: [art] Derive CDI
3,604,522 UART: [art] Store in slot 0x4
3,690,007 UART: [art] Derive Key Pair
3,690,367 UART: [art] Store priv key in slot 0x5
3,703,395 UART: [art] Derive Key Pair - Done
3,718,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,422 UART: [art] PUB.X = 988DD1052968D70854B6C56D06E285DCA546BD5019064FDC022568D60A9A68A8D434BDEEC958AEC0DBF84F58C53DD34B
3,742,184 UART: [art] PUB.Y = CB8F7495E13A52EA166EFB6B49D155626373C6491B8BE0469291B0C494F3DE994289381F45B4406211E8DE93C7B7D6F2
3,749,132 UART: [art] SIG.R = 4FD6F7775DFE5EF212F3F91CBE03A23FC1591C60B74446AD39E4867C91C401428C912593ED0E937CAC67A0F428E8E8F0
3,755,901 UART: [art] SIG.S = E0487637AF4B2091535215852A4B2BCB03FA6683CE891C74B72508AF537E5CE13566C107238D0E338F3ADE5913309A78
3,780,037 UART: Caliptra RT
3,780,380 UART: [state] CFI Enabled
3,900,134 UART: [rt] RT listening for mailbox commands...
3,900,804 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,023,494 UART: [rt]cmd =0x41544d4e, len=14344
4,616,422 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,391 ready_for_fw is high
1,059,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,062 >>> mbox cmd response: success
3,288,383 UART:
3,288,399 UART: Running Caliptra FMC ...
3,288,807 UART:
3,288,950 UART: [state] CFI Enabled
3,299,608 UART: [fht] FMC Alias Private Key: 7
3,418,234 UART: [art] Extend RT PCRs Done
3,418,662 UART: [art] Lock RT PCRs Done
3,420,176 UART: [art] Populate DV Done
3,428,381 UART: [fht] FMC Alias Private Key: 7
3,429,327 UART: [art] Derive CDI
3,429,607 UART: [art] Store in slot 0x4
3,515,246 UART: [art] Derive Key Pair
3,515,606 UART: [art] Store priv key in slot 0x5
3,528,750 UART: [art] Derive Key Pair - Done
3,543,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,559,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,051 UART: [art] PUB.X = 420CBBC7518471992D8ACAEC5FFE504B80144FB48983A5E9D6A2F196F3CFC345E7D649559E64B8A36A19B84DBF73ACF1
3,566,832 UART: [art] PUB.Y = 3F89D33F6915788F3194E44A71D73460A657F0E9D315A1F6A69518742493DBEAC54DA1923BD86C2DFA5DC0772B6BEB3B
3,573,788 UART: [art] SIG.R = 9327F32F1DBAF3ACF6C00A8F83B651137434671DE78398E296FEDB5C017D6E76B2F6AED547B05AD69A292CC8C40A70A2
3,580,561 UART: [art] SIG.S = BA3D5D8608EB0696140AD5FE2EB6BDB91DA7481718EC6AFECBDBB5249711FD938C806FCAB564E52B1E2768E9517D8BB1
3,604,104 UART: Caliptra RT
3,604,447 UART: [state] CFI Enabled
3,724,854 UART: [rt] RT listening for mailbox commands...
3,725,524 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,522 UART: [rt]cmd =0x41544d4e, len=14344
4,433,321 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
893,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,269 UART: [kat] ++
897,421 UART: [kat] sha1
901,725 UART: [kat] SHA2-256
903,665 UART: [kat] SHA2-384
906,326 UART: [kat] SHA2-512-ACC
908,227 UART: [kat] ECC-384
917,740 UART: [kat] HMAC-384Kdf
922,352 UART: [kat] LMS
1,170,680 UART: [kat] --
1,171,371 UART: [cold-reset] ++
1,171,951 UART: [fht] FHT @ 0x50003400
1,174,454 UART: [idev] ++
1,174,622 UART: [idev] CDI.KEYID = 6
1,174,982 UART: [idev] SUBJECT.KEYID = 7
1,175,406 UART: [idev] UDS.KEYID = 0
1,175,751 ready_for_fw is high
1,175,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,598 UART: [idev] Erasing UDS.KEYID = 0
1,200,885 UART: [idev] Sha1 KeyId Algorithm
1,209,183 UART: [idev] --
1,210,251 UART: [ldev] ++
1,210,419 UART: [ldev] CDI.KEYID = 6
1,210,782 UART: [ldev] SUBJECT.KEYID = 5
1,211,208 UART: [ldev] AUTHORITY.KEYID = 7
1,211,671 UART: [ldev] FE.KEYID = 1
1,216,753 UART: [ldev] Erasing FE.KEYID = 1
1,242,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,273 UART: [ldev] --
1,281,748 UART: [fwproc] Wait for Commands...
1,282,354 UART: [fwproc] Recv command 0x46574c44
1,283,082 UART: [fwproc] Recv'd Img size: 118548 bytes
3,165,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,193,402 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,224,572 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,364,859 >>> mbox cmd response: success
3,365,925 UART: [afmc] ++
3,366,093 UART: [afmc] CDI.KEYID = 6
3,366,455 UART: [afmc] SUBJECT.KEYID = 7
3,366,880 UART: [afmc] AUTHORITY.KEYID = 5
3,402,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,418,512 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,419,260 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,424,966 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,430,845 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,436,555 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,444,420 UART: [afmc] --
3,445,402 UART: [cold-reset] --
3,445,932 UART: [state] Locking Datavault
3,447,281 UART: [state] Locking PCR0, PCR1 and PCR31
3,447,885 UART: [state] Locking ICCM
3,448,447 UART: [exit] Launching FMC @ 0x40000130
3,453,777 UART:
3,453,793 UART: Running Caliptra FMC ...
3,454,201 UART:
3,454,255 UART: [state] CFI Enabled
3,464,893 UART: [fht] FMC Alias Private Key: 7
3,583,503 UART: [art] Extend RT PCRs Done
3,583,931 UART: [art] Lock RT PCRs Done
3,585,525 UART: [art] Populate DV Done
3,593,930 UART: [fht] FMC Alias Private Key: 7
3,595,040 UART: [art] Derive CDI
3,595,320 UART: [art] Store in slot 0x4
3,680,971 UART: [art] Derive Key Pair
3,681,331 UART: [art] Store priv key in slot 0x5
3,695,089 UART: [art] Derive Key Pair - Done
3,710,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,725,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,726,356 UART: [art] PUB.X = 11DA61CE8C479AAB6D7EB11A8EAD6386E7DDFDF2A3587E40A599BC279E5F799CF06647348814583038D1B970E1BD81AF
3,733,138 UART: [art] PUB.Y = 0078837119D56F0E6AACD1FF280FEA04FEBD84C7A15AC18A7B1B304E7BBE8836738C00BED0FDF07473369C5ED77DA197
3,740,051 UART: [art] SIG.R = 6621E52C3A87C8161B87F5A5D2CCB98CEB40B006A160B1BFFF58783D060301EA8B621D63959BC0FF1686019FB5520C86
3,746,807 UART: [art] SIG.S = 92D394AAB4FE4CC0A127BCFD9F2CD5F16CEDF97755628255D119678BBCF965DABA2773B69575B0774117776B1805C6BE
3,770,234 UART: Caliptra RT
3,770,485 UART: [state] CFI Enabled
3,890,159 UART: [rt] RT listening for mailbox commands...
3,890,829 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,941 UART: [rt]cmd =0x41544d4e, len=14344
4,604,094 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,813 ready_for_fw is high
1,060,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,221,349 >>> mbox cmd response: success
3,283,864 UART:
3,283,880 UART: Running Caliptra FMC ...
3,284,288 UART:
3,284,342 UART: [state] CFI Enabled
3,294,898 UART: [fht] FMC Alias Private Key: 7
3,413,686 UART: [art] Extend RT PCRs Done
3,414,114 UART: [art] Lock RT PCRs Done
3,415,576 UART: [art] Populate DV Done
3,423,521 UART: [fht] FMC Alias Private Key: 7
3,424,495 UART: [art] Derive CDI
3,424,775 UART: [art] Store in slot 0x4
3,510,624 UART: [art] Derive Key Pair
3,510,984 UART: [art] Store priv key in slot 0x5
3,524,672 UART: [art] Derive Key Pair - Done
3,539,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,901 UART: [art] PUB.X = D612F988DC607ACA5F37E9AF5B23794B1383D27C40B4C3C9540052A749B11FEB2B229F21E3A43E1D338730B18FF3900E
3,562,650 UART: [art] PUB.Y = 2F357E019382B0F8EA747A8395C5E3F0BFFA95930B8E491A3A4C2FF0AA85A3BB737903608EF99EDB060D2E261C43FF5F
3,569,597 UART: [art] SIG.R = FA2AC733A15ED181925ABB789C58D17487FCF1F34956BB63F406B1FC8CBE5B8370DF7925247A79C852804852F67FD365
3,576,368 UART: [art] SIG.S = D13AA05070D5B9331CEFECC385040A3F31B5941A3AAD4590AA0B890FCFDDCE7DF85B75E1E07D176A08094048B426AD19
3,600,624 UART: Caliptra RT
3,600,875 UART: [state] CFI Enabled
3,721,110 UART: [rt] RT listening for mailbox commands...
3,721,780 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,790 UART: [rt]cmd =0x41544d4e, len=14344
4,434,607 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,204 UART: [kat] SHA2-256
904,144 UART: [kat] SHA2-384
906,911 UART: [kat] SHA2-512-ACC
908,812 UART: [kat] ECC-384
917,899 UART: [kat] HMAC-384Kdf
922,589 UART: [kat] LMS
1,170,917 UART: [kat] --
1,171,574 UART: [cold-reset] ++
1,171,986 UART: [fht] FHT @ 0x50003400
1,174,809 UART: [idev] ++
1,174,977 UART: [idev] CDI.KEYID = 6
1,175,337 UART: [idev] SUBJECT.KEYID = 7
1,175,761 UART: [idev] UDS.KEYID = 0
1,176,106 ready_for_fw is high
1,176,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,971 UART: [idev] Erasing UDS.KEYID = 0
1,201,104 UART: [idev] Sha1 KeyId Algorithm
1,209,442 UART: [idev] --
1,210,688 UART: [ldev] ++
1,210,856 UART: [ldev] CDI.KEYID = 6
1,211,219 UART: [ldev] SUBJECT.KEYID = 5
1,211,645 UART: [ldev] AUTHORITY.KEYID = 7
1,212,108 UART: [ldev] FE.KEYID = 1
1,217,628 UART: [ldev] Erasing FE.KEYID = 1
1,244,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,006 UART: [ldev] --
1,284,385 UART: [fwproc] Wait for Commands...
1,285,103 UART: [fwproc] Recv command 0x46574c44
1,285,831 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,705 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,875 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,214 >>> mbox cmd response: success
3,370,300 UART: [afmc] ++
3,370,468 UART: [afmc] CDI.KEYID = 6
3,370,830 UART: [afmc] SUBJECT.KEYID = 7
3,371,255 UART: [afmc] AUTHORITY.KEYID = 5
3,407,066 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,217 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,429,923 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,435,802 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,441,512 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,449,443 UART: [afmc] --
3,450,447 UART: [cold-reset] --
3,451,421 UART: [state] Locking Datavault
3,452,648 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,252 UART: [state] Locking ICCM
3,453,874 UART: [exit] Launching FMC @ 0x40000130
3,459,204 UART:
3,459,220 UART: Running Caliptra FMC ...
3,459,628 UART:
3,459,771 UART: [state] CFI Enabled
3,470,197 UART: [fht] FMC Alias Private Key: 7
3,588,979 UART: [art] Extend RT PCRs Done
3,589,407 UART: [art] Lock RT PCRs Done
3,591,065 UART: [art] Populate DV Done
3,599,492 UART: [fht] FMC Alias Private Key: 7
3,600,638 UART: [art] Derive CDI
3,600,918 UART: [art] Store in slot 0x4
3,686,237 UART: [art] Derive Key Pair
3,686,597 UART: [art] Store priv key in slot 0x5
3,700,131 UART: [art] Derive Key Pair - Done
3,714,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,730,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,275 UART: [art] PUB.X = B946DC8AB5C1C6DB44F3ED8E5060CB9CDC5F9E807D738F52C4E30A000769EF6282E84CE3ACF8D4E99F5D28149025EDD4
3,738,035 UART: [art] PUB.Y = CEBBD65B2D8DD7370BBF00BD6300432CE98F4719B37CD5090668A762B54FB8C5FDB31F669274A55252F53355370E0F83
3,744,930 UART: [art] SIG.R = DC1BF2113E966E838259CB90CDBD6C0408DD25EE2EC94A25C926D02ECB0E0CC73291110931F66F9246D85DD11BB90F61
3,751,692 UART: [art] SIG.S = AA4E27A6443DF486DCD3CDAB40A34669EBC52DF23EEE9421FC567E0C7E94802FBD07631609BFB3BC9AD8C3488907887E
3,775,824 UART: Caliptra RT
3,776,167 UART: [state] CFI Enabled
3,895,852 UART: [rt] RT listening for mailbox commands...
3,896,522 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,632 UART: [rt]cmd =0x41544d4e, len=14344
4,607,008 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,006 ready_for_fw is high
1,061,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,737 >>> mbox cmd response: success
3,291,004 UART:
3,291,020 UART: Running Caliptra FMC ...
3,291,428 UART:
3,291,571 UART: [state] CFI Enabled
3,302,093 UART: [fht] FMC Alias Private Key: 7
3,421,173 UART: [art] Extend RT PCRs Done
3,421,601 UART: [art] Lock RT PCRs Done
3,423,473 UART: [art] Populate DV Done
3,431,832 UART: [fht] FMC Alias Private Key: 7
3,432,822 UART: [art] Derive CDI
3,433,102 UART: [art] Store in slot 0x4
3,518,645 UART: [art] Derive Key Pair
3,519,005 UART: [art] Store priv key in slot 0x5
3,532,309 UART: [art] Derive Key Pair - Done
3,547,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,562,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,563,702 UART: [art] PUB.X = E478166DA2B92F26DCE79E4B50B933BF2F9D680F61A58A20BE7810AF17BE056BD2A48FEC0FFABB8EB7F34D86FB63096F
3,570,482 UART: [art] PUB.Y = DE88A66A514C506D1E555FBA5CD082C64263F1EF6715CF5D0D3E28046EB592F5B1B144F5CF8F63D60578965F8520E804
3,577,424 UART: [art] SIG.R = 9517B0F8BD4105176B815F0ABF218A734D6C38C06AC0139512A986F49CADA67552D598215DDDC4C77CBAEF71CB0E971B
3,584,195 UART: [art] SIG.S = DE5DCC706C97873E1629CDEF4FAF82EE85D204C68BFB43D90F5765D8F88541B018A36C1E1727FBDF92B93F4FB259F1E5
3,607,863 UART: Caliptra RT
3,608,206 UART: [state] CFI Enabled
3,728,399 UART: [rt] RT listening for mailbox commands...
3,729,069 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,013 UART: [rt]cmd =0x41544d4e, len=14344
4,439,675 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,044 writing to cptra_bootfsm_go
193,123 UART:
193,481 UART: Running Caliptra ROM ...
194,579 UART:
194,725 UART: [state] CFI Enabled
264,665 UART: [state] LifecycleState = Unprovisioned
266,594 UART: [state] DebugLocked = No
267,978 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,495 UART: [kat] SHA2-256
442,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,738 UART: [kat] ++
453,220 UART: [kat] sha1
464,810 UART: [kat] SHA2-256
467,542 UART: [kat] SHA2-384
473,036 UART: [kat] SHA2-512-ACC
475,352 UART: [kat] ECC-384
2,769,627 UART: [kat] HMAC-384Kdf
2,801,257 UART: [kat] LMS
3,991,577 UART: [kat] --
3,995,288 UART: [cold-reset] ++
3,997,564 UART: [fht] Storing FHT @ 0x50003400
4,010,760 UART: [idev] ++
4,011,368 UART: [idev] CDI.KEYID = 6
4,012,258 UART: [idev] SUBJECT.KEYID = 7
4,013,578 UART: [idev] UDS.KEYID = 0
4,014,544 ready_for_fw is high
4,014,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,801 UART: [idev] Erasing UDS.KEYID = 0
7,347,953 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,507 UART: [idev] --
7,372,047 UART: [ldev] ++
7,372,657 UART: [ldev] CDI.KEYID = 6
7,373,643 UART: [ldev] SUBJECT.KEYID = 5
7,374,806 UART: [ldev] AUTHORITY.KEYID = 7
7,376,089 UART: [ldev] FE.KEYID = 1
7,422,975 UART: [ldev] Erasing FE.KEYID = 1
10,756,065 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,402 UART: [ldev] --
13,136,544 UART: [fwproc] Waiting for Commands...
13,139,830 UART: [fwproc] Received command 0x46574c44
13,142,067 UART: [fwproc] Received Image of size 118548 bytes
21,752,872 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,831,714 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,904,924 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,234,214 >>> mbox cmd response: success
22,238,495 UART: [afmc] ++
22,239,115 UART: [afmc] CDI.KEYID = 6
22,240,048 UART: [afmc] SUBJECT.KEYID = 7
22,241,273 UART: [afmc] AUTHORITY.KEYID = 5
25,595,331 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,896,956 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,899,226 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,913,670 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,928,476 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,942,864 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,965,247 UART: [afmc] --
27,968,727 UART: [cold-reset] --
27,973,828 UART: [state] Locking Datavault
27,978,968 UART: [state] Locking PCR0, PCR1 and PCR31
27,980,740 UART: [state] Locking ICCM
27,981,902 UART: [exit] Launching FMC @ 0x40000130
27,990,300 UART:
27,990,531 UART: Running Caliptra FMC ...
27,991,562 UART:
27,991,709 UART: [state] CFI Enabled
28,057,550 UART: [fht] FMC Alias Private Key: 7
30,398,299 UART: [art] Extend RT PCRs Done
30,399,523 UART: [art] Lock RT PCRs Done
30,400,905 UART: [art] Populate DV Done
30,406,603 UART: [fht] FMC Alias Private Key: 7
30,408,278 UART: [art] Derive CDI
30,409,109 UART: [art] Store in slot 0x4
30,466,253 UART: [art] Derive Key Pair
30,467,255 UART: [art] Store priv key in slot 0x5
33,760,358 UART: [art] Derive Key Pair - Done
33,773,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,062,272 UART: [art] Erasing AUTHORITY.KEYID = 7
36,063,787 UART: [art] PUB.X = C5B68902027C5FE466364FCD480B0A1C6D347976A19494261F48DB8DE02302AA175DCD6AE411C3DC5DBECE1974C399A0
36,071,000 UART: [art] PUB.Y = 166AD6371B85B90763637223D039141BA3EE7BC288B2F5B2E60B09F245E0FDD5C3F9D8FE150FB346119C67CBB32D890E
36,078,254 UART: [art] SIG.R = EFC8AF5A948295B48E45F9E9C79CAA0883D90A15AE11804F06D6A4687679654512E4ADBD4EE6BF63569710A2E5ED9574
36,085,705 UART: [art] SIG.S = 00866D2344DF485C12306D0C082F3A0E26530F03EF79B3005D1EFDB480875EA294D8FA617FA5535604D5EBB75F9E9317
37,391,053 UART: Caliptra RT
37,391,750 UART: [state] CFI Enabled
37,567,998 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,635,367 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,791,087 UART: [rt]cmd =0x41544d4e, len=14344
50,313,493 >>> mbox cmd response data (8 bytes)
50,316,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,346,739 UART: [rt]cmd =0x494e464f, len=4
50,351,139 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,783,458 ready_for_fw is high
3,784,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,134,597 >>> mbox cmd response: success
27,835,700 UART:
27,836,144 UART: Running Caliptra FMC ...
27,837,265 UART:
27,837,424 UART: [state] CFI Enabled
27,907,220 UART: [fht] FMC Alias Private Key: 7
30,247,633 UART: [art] Extend RT PCRs Done
30,248,857 UART: [art] Lock RT PCRs Done
30,250,541 UART: [art] Populate DV Done
30,256,009 UART: [fht] FMC Alias Private Key: 7
30,257,500 UART: [art] Derive CDI
30,258,282 UART: [art] Store in slot 0x4
30,315,918 UART: [art] Derive Key Pair
30,316,956 UART: [art] Store priv key in slot 0x5
33,610,106 UART: [art] Derive Key Pair - Done
33,623,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,912,379 UART: [art] Erasing AUTHORITY.KEYID = 7
35,913,887 UART: [art] PUB.X = 30212E8BEBBA3DCAFCA63FA9BFC5F43D74D21219AAA6EACE4E8D403066DDECBDD8B5643DCF482B5CB4AAAEFA669F3FA6
35,921,261 UART: [art] PUB.Y = 96F7D0162E5302D65286E61B3991BF148F69AC8481C5F8F634E169792FA04D74591C3787B857AFFDAEDB512F0B78055A
35,928,462 UART: [art] SIG.R = B3EC0FD34350A74C50EF8325D7E6ED11A5C5CBC7B973DE82EF71397D4158D73A0B5C9BDA2B6312F5631916F4CE56F3B8
35,935,864 UART: [art] SIG.S = 87D6DF0CD511D12BE55F59175CCFB93925B4078A42BD4B2C1F42D86316CA356B4756E777C8151F51012B9F33DD693C54
37,240,699 UART: Caliptra RT
37,241,391 UART: [state] CFI Enabled
37,419,132 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,489,023 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,644,658 UART: [rt]cmd =0x41544d4e, len=14344
49,907,652 >>> mbox cmd response data (8 bytes)
49,911,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,941,140 UART: [rt]cmd =0x494e464f, len=4
49,945,430 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,381 writing to cptra_bootfsm_go
193,649 UART:
193,999 UART: Running Caliptra ROM ...
195,183 UART:
604,916 UART: [state] CFI Enabled
619,582 UART: [state] LifecycleState = Unprovisioned
621,455 UART: [state] DebugLocked = No
622,907 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,641 UART: [kat] SHA2-256
797,422 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,931 UART: [kat] ++
808,376 UART: [kat] sha1
820,027 UART: [kat] SHA2-256
822,676 UART: [kat] SHA2-384
827,235 UART: [kat] SHA2-512-ACC
829,602 UART: [kat] ECC-384
3,115,091 UART: [kat] HMAC-384Kdf
3,125,206 UART: [kat] LMS
4,315,285 UART: [kat] --
4,318,372 UART: [cold-reset] ++
4,321,031 UART: [fht] Storing FHT @ 0x50003400
4,333,319 UART: [idev] ++
4,333,884 UART: [idev] CDI.KEYID = 6
4,334,948 UART: [idev] SUBJECT.KEYID = 7
4,336,067 UART: [idev] UDS.KEYID = 0
4,337,121 ready_for_fw is high
4,337,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,151 UART: [idev] Erasing UDS.KEYID = 0
7,621,554 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,878 UART: [idev] --
7,646,760 UART: [ldev] ++
7,647,321 UART: [ldev] CDI.KEYID = 6
7,648,277 UART: [ldev] SUBJECT.KEYID = 5
7,649,541 UART: [ldev] AUTHORITY.KEYID = 7
7,650,768 UART: [ldev] FE.KEYID = 1
7,662,897 UART: [ldev] Erasing FE.KEYID = 1
10,953,645 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,455 UART: [ldev] --
13,317,040 UART: [fwproc] Waiting for Commands...
13,320,374 UART: [fwproc] Received command 0x46574c44
13,322,545 UART: [fwproc] Received Image of size 118548 bytes
22,325,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,403,160 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,476,342 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,804,509 >>> mbox cmd response: success
22,809,144 UART: [afmc] ++
22,809,759 UART: [afmc] CDI.KEYID = 6
22,810,642 UART: [afmc] SUBJECT.KEYID = 7
22,811,906 UART: [afmc] AUTHORITY.KEYID = 5
26,128,414 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,423,556 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,425,810 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,440,316 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,455,130 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,469,489 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,490,346 UART: [afmc] --
28,493,416 UART: [cold-reset] --
28,495,977 UART: [state] Locking Datavault
28,499,005 UART: [state] Locking PCR0, PCR1 and PCR31
28,500,699 UART: [state] Locking ICCM
28,502,550 UART: [exit] Launching FMC @ 0x40000130
28,510,935 UART:
28,511,169 UART: Running Caliptra FMC ...
28,512,186 UART:
28,512,328 UART: [state] CFI Enabled
28,520,827 UART: [fht] FMC Alias Private Key: 7
30,860,162 UART: [art] Extend RT PCRs Done
30,861,380 UART: [art] Lock RT PCRs Done
30,863,509 UART: [art] Populate DV Done
30,868,810 UART: [fht] FMC Alias Private Key: 7
30,870,504 UART: [art] Derive CDI
30,871,308 UART: [art] Store in slot 0x4
30,913,785 UART: [art] Derive Key Pair
30,914,821 UART: [art] Store priv key in slot 0x5
34,156,592 UART: [art] Derive Key Pair - Done
34,169,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,449,571 UART: [art] Erasing AUTHORITY.KEYID = 7
36,451,069 UART: [art] PUB.X = 6DF0E4189DB0C6EE5C6D29F3ADD004908E99D86997E2259D186DA4C8C49445A17F04CB3F087E6E7E54EC8F0323EA88DB
36,458,324 UART: [art] PUB.Y = BA43FA49BF1E371D07A6965D84C78C9879E66E822707C702132737B02D00544EC406F43C47D0038C69E1A82002CB90AB
36,465,560 UART: [art] SIG.R = C479F37C4C02899827D5E12017B295B52E0CDF6E77D230DEDAA9E58FF4BD10363621055B89CD57E52BE3BC76D0B29BD7
36,472,956 UART: [art] SIG.S = 80C16ECA8222B47A562DDDBD58B5274E3E6E49C348719CA193E296AAEFFD5C23AF6F93533D81A68EBB23C7D76156F170
37,777,801 UART: Caliptra RT
37,778,516 UART: [state] CFI Enabled
37,911,783 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,970,741 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
42,126,504 UART: [rt]cmd =0x41544d4e, len=14344
50,649,056 >>> mbox cmd response data (8 bytes)
50,652,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,682,346 UART: [rt]cmd =0x494e464f, len=4
50,686,582 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
4,126,206 ready_for_fw is high
4,126,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,212,775 >>> mbox cmd response: success
27,861,121 UART:
27,861,525 UART: Running Caliptra FMC ...
27,862,657 UART:
27,862,814 UART: [state] CFI Enabled
27,870,894 UART: [fht] FMC Alias Private Key: 7
30,210,627 UART: [art] Extend RT PCRs Done
30,211,866 UART: [art] Lock RT PCRs Done
30,213,653 UART: [art] Populate DV Done
30,219,121 UART: [fht] FMC Alias Private Key: 7
30,220,763 UART: [art] Derive CDI
30,221,574 UART: [art] Store in slot 0x4
30,264,051 UART: [art] Derive Key Pair
30,265,050 UART: [art] Store priv key in slot 0x5
33,507,188 UART: [art] Derive Key Pair - Done
33,520,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,800,335 UART: [art] Erasing AUTHORITY.KEYID = 7
35,801,847 UART: [art] PUB.X = 3A2F3BC24165D0EB0BC5DFB7467E0D5DBD8FB51C7ECF305ADA97A9088072A8F00F1CC0DC6C0751088EBA9A3734369175
35,809,153 UART: [art] PUB.Y = 02820381F9AE8CA9D680443AEE07190436D84267A8755D0023B42BC5B30E4D047916E6AA3651E4DB1B15D1E8F345B7B8
35,816,393 UART: [art] SIG.R = 311A67AE483DB046C6740618AE0111030DE736DC688E6B322F79E3D707022D8083974968AB8FD0849E6CDDA78E226EEA
35,823,727 UART: [art] SIG.S = 89398B40808CFF9C362800E42DB6E6DB7B3F86472E7930C7B122B5A958CB30435FB5F21F0A89B07455FCC6497DFF70EA
37,129,056 UART: Caliptra RT
37,129,769 UART: [state] CFI Enabled
37,262,831 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,344,351 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,500,509 UART: [rt]cmd =0x41544d4e, len=14344
49,945,416 >>> mbox cmd response data (8 bytes)
49,948,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,979,031 UART: [rt]cmd =0x494e464f, len=4
49,983,340 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,132 UART:
192,501 UART: Running Caliptra ROM ...
193,689 UART:
193,845 UART: [state] CFI Enabled
264,439 UART: [state] LifecycleState = Unprovisioned
266,423 UART: [state] DebugLocked = No
268,882 UART: [state] WD Timer not started. Device not locked for debugging
273,073 UART: [kat] SHA2-256
452,722 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,532 UART: [kat] ++
463,981 UART: [kat] sha1
474,313 UART: [kat] SHA2-256
477,000 UART: [kat] SHA2-384
481,868 UART: [kat] SHA2-512-ACC
484,227 UART: [kat] ECC-384
2,947,511 UART: [kat] HMAC-384Kdf
2,971,910 UART: [kat] LMS
3,448,386 UART: [kat] --
3,453,588 UART: [cold-reset] ++
3,455,226 UART: [fht] FHT @ 0x50003400
3,467,825 UART: [idev] ++
3,468,461 UART: [idev] CDI.KEYID = 6
3,469,376 UART: [idev] SUBJECT.KEYID = 7
3,470,636 UART: [idev] UDS.KEYID = 0
3,471,613 ready_for_fw is high
3,471,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,902 UART: [idev] Erasing UDS.KEYID = 0
5,984,050 UART: [idev] Sha1 KeyId Algorithm
6,007,593 UART: [idev] --
6,012,815 UART: [ldev] ++
6,013,401 UART: [ldev] CDI.KEYID = 6
6,014,316 UART: [ldev] SUBJECT.KEYID = 5
6,015,525 UART: [ldev] AUTHORITY.KEYID = 7
6,016,755 UART: [ldev] FE.KEYID = 1
6,058,343 UART: [ldev] Erasing FE.KEYID = 1
8,562,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,919 UART: [ldev] --
10,373,749 UART: [fwproc] Wait for Commands...
10,375,675 UART: [fwproc] Recv command 0x46574c44
10,377,656 UART: [fwproc] Recv'd Img size: 118548 bytes
14,925,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,012,666 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,085,698 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,414,492 >>> mbox cmd response: success
15,417,967 UART: [afmc] ++
15,418,581 UART: [afmc] CDI.KEYID = 6
15,419,545 UART: [afmc] SUBJECT.KEYID = 7
15,420,756 UART: [afmc] AUTHORITY.KEYID = 5
17,961,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,705,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,708,122 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,723,986 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,739,877 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,755,579 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,781,327 UART: [afmc] --
19,785,194 UART: [cold-reset] --
19,790,081 UART: [state] Locking Datavault
19,794,408 UART: [state] Locking PCR0, PCR1 and PCR31
19,796,158 UART: [state] Locking ICCM
19,798,949 UART: [exit] Launching FMC @ 0x40000130
19,807,349 UART:
19,807,583 UART: Running Caliptra FMC ...
19,808,679 UART:
19,808,837 UART: [state] CFI Enabled
19,862,169 UART: [fht] FMC Alias Private Key: 7
21,629,381 UART: [art] Extend RT PCRs Done
21,630,592 UART: [art] Lock RT PCRs Done
21,632,071 UART: [art] Populate DV Done
21,637,489 UART: [fht] FMC Alias Private Key: 7
21,639,130 UART: [art] Derive CDI
21,639,935 UART: [art] Store in slot 0x4
21,695,081 UART: [art] Derive Key Pair
21,696,116 UART: [art] Store priv key in slot 0x5
24,159,059 UART: [art] Derive Key Pair - Done
24,172,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,884,969 UART: [art] Erasing AUTHORITY.KEYID = 7
25,886,470 UART: [art] PUB.X = 5810169B5928D6BFFDBC1D3CBB34EF964EBC95439C0F069E3AFC8D8789229743CEF2E675506E258B03E6CCDB399FC6D6
25,893,780 UART: [art] PUB.Y = AD81CB7FAF1F3F6E50C75F2817438E594318A8E716F55244617896CD5508B19B03C6E13006E4128BC9A43CC4AE4AAFCD
25,901,023 UART: [art] SIG.R = 9CCD40097A8BA2465124F6FC6185803916C5C9D0DBAB69A2B0095AD1D341B81BCF7B7D0B222ABF477DA94CF3CA9939D5
25,908,452 UART: [art] SIG.S = 9979F2232BEC3D87A4D779755554D44D61DE1EBBFF1DD567A1016F5D85381B629F9DFDBD90AD0C8956596C7B62BA961C
26,887,444 UART: Caliptra RT
26,888,127 UART: [state] CFI Enabled
27,067,640 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,111,633 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,267,382 UART: [rt]cmd =0x41544d4e, len=14344
36,179,251 >>> mbox cmd response data (8 bytes)
36,182,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,212,474 UART: [rt]cmd =0x494e464f, len=4
36,216,818 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
3,461,652 ready_for_fw is high
3,462,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,430,505 >>> mbox cmd response: success
19,725,255 UART:
19,725,641 UART: Running Caliptra FMC ...
19,726,774 UART:
19,726,937 UART: [state] CFI Enabled
19,794,338 UART: [fht] FMC Alias Private Key: 7
21,561,081 UART: [art] Extend RT PCRs Done
21,562,312 UART: [art] Lock RT PCRs Done
21,563,907 UART: [art] Populate DV Done
21,569,381 UART: [fht] FMC Alias Private Key: 7
21,571,057 UART: [art] Derive CDI
21,571,800 UART: [art] Store in slot 0x4
21,627,165 UART: [art] Derive Key Pair
21,628,207 UART: [art] Store priv key in slot 0x5
24,091,168 UART: [art] Derive Key Pair - Done
24,104,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,818,340 UART: [art] Erasing AUTHORITY.KEYID = 7
25,819,845 UART: [art] PUB.X = CD254B980A9B96AA86E39676C2EBECDC78BA89C9AC0E23CFF0927C5FB8C0CAAF42C7988538595D5E7DFC9EDD42F5579E
25,827,163 UART: [art] PUB.Y = C401BD419C0C2935A362213F1506136388332C5D789646DBCD16C61304E5706A43FA25274E9D1D70E975D6E73560D0BB
25,834,407 UART: [art] SIG.R = 0922426DF850B066E2FC1AA7098BF680F4977B83C6A8AF9A6F4CA59A6C951885BFFC5F29E8DD8D21768C2CA80BFE5F0F
25,841,760 UART: [art] SIG.S = 2F4093BB70F00E75063ED9C516471C42B2E6B23CB8C84C609FA18E8BE86183FBEF24AE104FDCA39CFC5ACB51BA1EF79D
26,820,334 UART: Caliptra RT
26,821,023 UART: [state] CFI Enabled
27,002,448 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,039,754 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,195,399 UART: [rt]cmd =0x41544d4e, len=14344
36,098,299 >>> mbox cmd response data (8 bytes)
36,101,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,131,804 UART: [rt]cmd =0x494e464f, len=4
36,136,271 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,579 UART:
192,937 UART: Running Caliptra ROM ...
194,078 UART:
603,739 UART: [state] CFI Enabled
619,888 UART: [state] LifecycleState = Unprovisioned
621,770 UART: [state] DebugLocked = No
623,942 UART: [state] WD Timer not started. Device not locked for debugging
627,342 UART: [kat] SHA2-256
806,944 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,749 UART: [kat] ++
818,224 UART: [kat] sha1
830,661 UART: [kat] SHA2-256
833,324 UART: [kat] SHA2-384
839,604 UART: [kat] SHA2-512-ACC
841,935 UART: [kat] ECC-384
3,283,546 UART: [kat] HMAC-384Kdf
3,295,592 UART: [kat] LMS
3,772,159 UART: [kat] --
3,777,024 UART: [cold-reset] ++
3,779,473 UART: [fht] FHT @ 0x50003400
3,789,670 UART: [idev] ++
3,790,235 UART: [idev] CDI.KEYID = 6
3,791,190 UART: [idev] SUBJECT.KEYID = 7
3,792,440 UART: [idev] UDS.KEYID = 0
3,793,412 ready_for_fw is high
3,793,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,456 UART: [idev] Erasing UDS.KEYID = 0
6,268,778 UART: [idev] Sha1 KeyId Algorithm
6,293,007 UART: [idev] --
6,297,515 UART: [ldev] ++
6,298,092 UART: [ldev] CDI.KEYID = 6
6,299,116 UART: [ldev] SUBJECT.KEYID = 5
6,300,240 UART: [ldev] AUTHORITY.KEYID = 7
6,301,473 UART: [ldev] FE.KEYID = 1
6,313,251 UART: [ldev] Erasing FE.KEYID = 1
8,795,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,120 UART: [ldev] --
10,590,412 UART: [fwproc] Wait for Commands...
10,592,997 UART: [fwproc] Recv command 0x46574c44
10,595,047 UART: [fwproc] Recv'd Img size: 118548 bytes
15,132,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,221,216 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,294,231 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,622,696 >>> mbox cmd response: success
15,626,704 UART: [afmc] ++
15,627,325 UART: [afmc] CDI.KEYID = 6
15,628,212 UART: [afmc] SUBJECT.KEYID = 7
15,629,436 UART: [afmc] AUTHORITY.KEYID = 5
18,129,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,852,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,855,138 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,871,006 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,886,956 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,902,660 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,926,329 UART: [afmc] --
19,930,254 UART: [cold-reset] --
19,932,714 UART: [state] Locking Datavault
19,937,317 UART: [state] Locking PCR0, PCR1 and PCR31
19,939,072 UART: [state] Locking ICCM
19,941,448 UART: [exit] Launching FMC @ 0x40000130
19,949,867 UART:
19,950,115 UART: Running Caliptra FMC ...
19,951,221 UART:
19,951,379 UART: [state] CFI Enabled
19,959,164 UART: [fht] FMC Alias Private Key: 7
21,725,039 UART: [art] Extend RT PCRs Done
21,726,266 UART: [art] Lock RT PCRs Done
21,728,056 UART: [art] Populate DV Done
21,733,641 UART: [fht] FMC Alias Private Key: 7
21,735,292 UART: [art] Derive CDI
21,736,033 UART: [art] Store in slot 0x4
21,778,630 UART: [art] Derive Key Pair
21,779,633 UART: [art] Store priv key in slot 0x5
24,206,109 UART: [art] Derive Key Pair - Done
24,219,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,925,343 UART: [art] Erasing AUTHORITY.KEYID = 7
25,926,856 UART: [art] PUB.X = 840F259D1BF290BAF8A04558A3FBD980E6599FECF37E676239F0C4CFA813A6BDF18342A8D21551AB1BAD5EFEAA4668C2
25,934,149 UART: [art] PUB.Y = 7037297D923D060B5BA0DB7D4152144CB56465115C527C62C62757576995BCFD3D44F5DA5A33054DDB8046F675FC8D6A
25,941,427 UART: [art] SIG.R = EF04115CC813B5331369D035F15E80351DC53B3A27850A4F2CCB530C3FF3BCEF7C0B84A188FAD64241C4060D5096AA55
25,948,764 UART: [art] SIG.S = 7C908ECE87E7DAA6396FF74046074CEAC4777ADBD154633ED631E851912E33054E59D2A1DB2BE94438C90318995B7C23
26,927,840 UART: Caliptra RT
26,928,548 UART: [state] CFI Enabled
27,061,759 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,118,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,274,165 UART: [rt]cmd =0x41544d4e, len=14344
36,172,519 >>> mbox cmd response data (8 bytes)
36,175,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,205,791 UART: [rt]cmd =0x494e464f, len=4
36,210,172 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,455 writing to cptra_bootfsm_go
3,778,423 ready_for_fw is high
3,778,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,557,513 >>> mbox cmd response: success
19,811,963 UART:
19,812,335 UART: Running Caliptra FMC ...
19,813,464 UART:
19,813,622 UART: [state] CFI Enabled
19,821,248 UART: [fht] FMC Alias Private Key: 7
21,587,092 UART: [art] Extend RT PCRs Done
21,588,326 UART: [art] Lock RT PCRs Done
21,589,741 UART: [art] Populate DV Done
21,595,325 UART: [fht] FMC Alias Private Key: 7
21,596,871 UART: [art] Derive CDI
21,597,691 UART: [art] Store in slot 0x4
21,640,353 UART: [art] Derive Key Pair
21,641,355 UART: [art] Store priv key in slot 0x5
24,068,136 UART: [art] Derive Key Pair - Done
24,081,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,787,703 UART: [art] Erasing AUTHORITY.KEYID = 7
25,789,210 UART: [art] PUB.X = 266AFBD754701FC549D624BC3FABA512113038FC24158AF97A5D32A299BE01A6F2C8CECBDDDF330385EF69276C58A241
25,796,475 UART: [art] PUB.Y = F36FDE6E47FA4166AB94406FA7C9669DC4A11C865C9F70D267E541C772259EE79DC80F13CBBC951AC05719247BDDC86E
25,803,796 UART: [art] SIG.R = 2A0E8404A7C36971B271198E3E3193750D6367DB963859B6B2EDC1C6EC075403966B6898D13E36BA536A503867E144CC
25,811,143 UART: [art] SIG.S = F65FDB34594A0733F34CC19819E6A611278418D9F205F6C337079F5B0F1742CF808E0A786B76FF85867D031417B1A870
26,790,272 UART: Caliptra RT
26,790,986 UART: [state] CFI Enabled
26,923,488 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,980,398 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,136,041 UART: [rt]cmd =0x41544d4e, len=14344
36,056,813 >>> mbox cmd response data (8 bytes)
36,060,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,089,984 UART: [rt]cmd =0x494e464f, len=4
36,094,271 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,002 UART:
192,392 UART: Running Caliptra ROM ...
193,546 UART:
193,695 UART: [state] CFI Enabled
266,747 UART: [state] LifecycleState = Unprovisioned
269,156 UART: [state] DebugLocked = No
271,623 UART: [state] WD Timer not started. Device not locked for debugging
276,665 UART: [kat] SHA2-256
466,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,326 UART: [kat] ++
477,805 UART: [kat] sha1
487,966 UART: [kat] SHA2-256
490,974 UART: [kat] SHA2-384
496,888 UART: [kat] SHA2-512-ACC
499,496 UART: [kat] ECC-384
2,948,815 UART: [kat] HMAC-384Kdf
2,970,998 UART: [kat] LMS
3,502,808 UART: [kat] --
3,506,870 UART: [cold-reset] ++
3,508,655 UART: [fht] FHT @ 0x50003400
3,519,628 UART: [idev] ++
3,520,332 UART: [idev] CDI.KEYID = 6
3,521,304 UART: [idev] SUBJECT.KEYID = 7
3,522,474 UART: [idev] UDS.KEYID = 0
3,523,393 ready_for_fw is high
3,523,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,085 UART: [idev] Erasing UDS.KEYID = 0
6,029,785 UART: [idev] Sha1 KeyId Algorithm
6,051,498 UART: [idev] --
6,056,067 UART: [ldev] ++
6,056,776 UART: [ldev] CDI.KEYID = 6
6,057,696 UART: [ldev] SUBJECT.KEYID = 5
6,058,805 UART: [ldev] AUTHORITY.KEYID = 7
6,060,039 UART: [ldev] FE.KEYID = 1
6,100,768 UART: [ldev] Erasing FE.KEYID = 1
8,607,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,931 UART: [ldev] --
10,413,031 UART: [fwproc] Wait for Commands...
10,414,698 UART: [fwproc] Recv command 0x46574c44
10,416,948 UART: [fwproc] Recv'd Img size: 118548 bytes
15,100,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,186,871 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,310,501 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,870,471 >>> mbox cmd response: success
15,874,125 UART: [afmc] ++
15,874,818 UART: [afmc] CDI.KEYID = 6
15,876,062 UART: [afmc] SUBJECT.KEYID = 7
15,877,506 UART: [afmc] AUTHORITY.KEYID = 5
18,402,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,132,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,133,924 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,149,027 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,164,277 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,179,300 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,202,964 UART: [afmc] --
20,205,739 UART: [cold-reset] --
20,210,535 UART: [state] Locking Datavault
20,215,803 UART: [state] Locking PCR0, PCR1 and PCR31
20,218,027 UART: [state] Locking ICCM
20,219,532 UART: [exit] Launching FMC @ 0x40000130
20,228,211 UART:
20,228,458 UART: Running Caliptra FMC ...
20,229,562 UART:
20,229,718 UART: [state] CFI Enabled
20,287,710 UART: [fht] FMC Alias Private Key: 7
22,075,197 UART: [art] Extend RT PCRs Done
22,076,391 UART: [art] Lock RT PCRs Done
22,078,158 UART: [art] Populate DV Done
22,083,673 UART: [fht] FMC Alias Private Key: 7
22,085,371 UART: [art] Derive CDI
22,086,110 UART: [art] Store in slot 0x4
22,141,248 UART: [art] Derive Key Pair
22,142,287 UART: [art] Store priv key in slot 0x5
24,604,785 UART: [art] Derive Key Pair - Done
24,617,711 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,330,302 UART: [art] Erasing AUTHORITY.KEYID = 7
26,331,797 UART: [art] PUB.X = B28355230030FB4CA5EC8DD0B1C5720C640D48726E2A4E6FCB9B4F7AFA6275E21B0132A5A21DB091782B19EA2C6A639E
26,339,027 UART: [art] PUB.Y = 8B1BD2BC3404A4B9B0C697CDCFB943084A0503E2242BD39C33ED190B62F37CA1C8E7A8586229E9E46AEA94E3BE71147E
26,346,298 UART: [art] SIG.R = E48273345F8A48E06AABD6C6D889FD5863ECBAA7A651B06ABB3EDFD7A808061D260F846532342EAD018FDC378926D60E
26,353,733 UART: [art] SIG.S = D4A258A06EF2B97FA66B8E13FCB73ABE7EB361351E0D9CAC36C843CCC5535D42B91DD75D426581C678FFE9968A551FDE
27,332,664 UART: Caliptra RT
27,333,372 UART: [state] CFI Enabled
27,513,210 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,565,692 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,721,327 UART: [rt]cmd =0x41544d4e, len=14344
36,621,576 >>> mbox cmd response data (8 bytes)
36,625,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,654,962 UART: [rt]cmd =0x494e464f, len=4
36,659,328 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
3,438,593 ready_for_fw is high
3,439,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,918,086 >>> mbox cmd response: success
20,216,526 UART:
20,216,917 UART: Running Caliptra FMC ...
20,218,056 UART:
20,218,217 UART: [state] CFI Enabled
20,283,790 UART: [fht] FMC Alias Private Key: 7
22,050,626 UART: [art] Extend RT PCRs Done
22,051,830 UART: [art] Lock RT PCRs Done
22,053,290 UART: [art] Populate DV Done
22,058,709 UART: [fht] FMC Alias Private Key: 7
22,060,413 UART: [art] Derive CDI
22,061,229 UART: [art] Store in slot 0x4
22,115,720 UART: [art] Derive Key Pair
22,116,788 UART: [art] Store priv key in slot 0x5
24,578,962 UART: [art] Derive Key Pair - Done
24,592,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,305,069 UART: [art] Erasing AUTHORITY.KEYID = 7
26,306,603 UART: [art] PUB.X = E726A731BA72BD557558B61C7C7D4088044247F6997BDC2E980764275B9358B1717A9092D6C151A95233276AA9D9E200
26,313,773 UART: [art] PUB.Y = B490BAFBA8D82E8C6CB46876C601254F0CB48F9025AE37BA1B79414844EA962AF2E88D45FA848A97F5D8112367BBF2A5
26,321,043 UART: [art] SIG.R = 9179E413CF5E24C49F4D15F7EAD9B9130F7CCDDB632A20A184B5159337859DBCCCCEC0254A2952362DCEEF35EA3F9CA5
26,328,479 UART: [art] SIG.S = 95B521B19E6E97F494DFE02F33D843C4706A4AEA20363989CDDC8B094B6EF9488E42EF3A59882553648C0128D2595181
27,307,459 UART: Caliptra RT
27,308,148 UART: [state] CFI Enabled
27,487,872 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,533,255 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,689,024 UART: [rt]cmd =0x41544d4e, len=14344
36,606,668 >>> mbox cmd response data (8 bytes)
36,610,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,639,940 UART: [rt]cmd =0x494e464f, len=4
36,644,280 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
192,393 UART:
192,766 UART: Running Caliptra ROM ...
193,959 UART:
603,746 UART: [state] CFI Enabled
618,132 UART: [state] LifecycleState = Unprovisioned
620,154 UART: [state] DebugLocked = No
622,549 UART: [state] WD Timer not started. Device not locked for debugging
627,765 UART: [kat] SHA2-256
817,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,406 UART: [kat] ++
828,930 UART: [kat] sha1
840,684 UART: [kat] SHA2-256
843,738 UART: [kat] SHA2-384
849,669 UART: [kat] SHA2-512-ACC
852,259 UART: [kat] ECC-384
3,296,747 UART: [kat] HMAC-384Kdf
3,309,826 UART: [kat] LMS
3,841,635 UART: [kat] --
3,847,974 UART: [cold-reset] ++
3,850,546 UART: [fht] FHT @ 0x50003400
3,863,162 UART: [idev] ++
3,863,875 UART: [idev] CDI.KEYID = 6
3,864,833 UART: [idev] SUBJECT.KEYID = 7
3,866,099 UART: [idev] UDS.KEYID = 0
3,867,254 ready_for_fw is high
3,867,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,016,332 UART: [idev] Erasing UDS.KEYID = 0
6,341,190 UART: [idev] Sha1 KeyId Algorithm
6,364,201 UART: [idev] --
6,369,579 UART: [ldev] ++
6,370,269 UART: [ldev] CDI.KEYID = 6
6,371,183 UART: [ldev] SUBJECT.KEYID = 5
6,372,350 UART: [ldev] AUTHORITY.KEYID = 7
6,373,529 UART: [ldev] FE.KEYID = 1
6,385,579 UART: [ldev] Erasing FE.KEYID = 1
8,867,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,587,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,603,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,618,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,633,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,829 UART: [ldev] --
10,658,827 UART: [fwproc] Wait for Commands...
10,661,085 UART: [fwproc] Recv command 0x46574c44
10,663,396 UART: [fwproc] Recv'd Img size: 118548 bytes
15,345,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,426,832 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,550,441 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,111,027 >>> mbox cmd response: success
16,115,487 UART: [afmc] ++
16,116,197 UART: [afmc] CDI.KEYID = 6
16,117,359 UART: [afmc] SUBJECT.KEYID = 7
16,118,881 UART: [afmc] AUTHORITY.KEYID = 5
18,622,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,343,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,345,284 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,360,431 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,375,621 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,390,644 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,414,196 UART: [afmc] --
20,418,284 UART: [cold-reset] --
20,420,753 UART: [state] Locking Datavault
20,424,291 UART: [state] Locking PCR0, PCR1 and PCR31
20,426,452 UART: [state] Locking ICCM
20,427,719 UART: [exit] Launching FMC @ 0x40000130
20,436,404 UART:
20,436,646 UART: Running Caliptra FMC ...
20,437,874 UART:
20,438,037 UART: [state] CFI Enabled
20,446,289 UART: [fht] FMC Alias Private Key: 7
22,213,021 UART: [art] Extend RT PCRs Done
22,214,238 UART: [art] Lock RT PCRs Done
22,215,924 UART: [art] Populate DV Done
22,221,337 UART: [fht] FMC Alias Private Key: 7
22,222,931 UART: [art] Derive CDI
22,223,674 UART: [art] Store in slot 0x4
22,266,486 UART: [art] Derive Key Pair
22,267,488 UART: [art] Store priv key in slot 0x5
24,694,438 UART: [art] Derive Key Pair - Done
24,707,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,413,787 UART: [art] Erasing AUTHORITY.KEYID = 7
26,415,292 UART: [art] PUB.X = 334D4E685523D3021CB9384E2FE7DFAA0E98A3E6FFBDE11BAAAE42B4AF8A4EEF1537ED48EF094E14B47A5DD098AA57C4
26,422,608 UART: [art] PUB.Y = 52B81E464CAC2127901FA43B3581D31A14A1F5EEE69808D29DBEF1476B4D5857F2CF2A1ABA1C844A794664E9E4D437A2
26,429,867 UART: [art] SIG.R = E2BE04D1B6E608D8C698E17D0849BC8C28CD3C56B484E6F7B69DF67FCF17C0F3531E4E41B61B17FCA36EF2C07C4E3809
26,437,326 UART: [art] SIG.S = 34FF1151666C9BEC3395330D2EB746E05717708F82C95A0A780647BA290EFBD93D88561A7EA3000B18AC0CAC2B2064D8
27,416,323 UART: Caliptra RT
27,417,029 UART: [state] CFI Enabled
27,550,309 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,607,084 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,762,718 UART: [rt]cmd =0x41544d4e, len=14344
36,652,499 >>> mbox cmd response data (8 bytes)
36,656,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,685,912 UART: [rt]cmd =0x494e464f, len=4
36,690,247 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,751,332 ready_for_fw is high
3,751,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,135,214 >>> mbox cmd response: success
20,387,614 UART:
20,388,019 UART: Running Caliptra FMC ...
20,389,234 UART:
20,389,436 UART: [state] CFI Enabled
20,396,748 UART: [fht] FMC Alias Private Key: 7
22,163,122 UART: [art] Extend RT PCRs Done
22,164,346 UART: [art] Lock RT PCRs Done
22,166,360 UART: [art] Populate DV Done
22,171,945 UART: [fht] FMC Alias Private Key: 7
22,173,545 UART: [art] Derive CDI
22,174,369 UART: [art] Store in slot 0x4
22,217,253 UART: [art] Derive Key Pair
22,218,294 UART: [art] Store priv key in slot 0x5
24,645,534 UART: [art] Derive Key Pair - Done
24,658,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,364,444 UART: [art] Erasing AUTHORITY.KEYID = 7
26,365,962 UART: [art] PUB.X = FBC3F7DA72B9F1EAC591603FEE5836E0D806FFD70470C4C8156E93920A0A7FCDF6C13EF8C9238D67F3146BB4FF1A8F88
26,373,262 UART: [art] PUB.Y = 3906D3A3F4F3B69D6ADF2471AEAC193EA7CD96B1077C0C25DC3141F3D2E0B5FA9C7E09A773EE3407EEB08A4A8DAC44E4
26,380,541 UART: [art] SIG.R = 0A19B95504C1A4E1C9D55AF433B90EA3ED17066D57069736C718069F09226EA569706C9F1DAC98216FFCC22DF41F3167
26,387,936 UART: [art] SIG.S = AF9436FC0694741BC31701F75CA7C4DCAA821C093C9FE572EA8C4C26D24C282CF0B678045FC4E90F516D07DD432AE141
27,366,665 UART: Caliptra RT
27,367,388 UART: [state] CFI Enabled
27,500,148 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,553,546 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,709,181 UART: [rt]cmd =0x41544d4e, len=14344
36,621,365 >>> mbox cmd response data (8 bytes)
36,624,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,654,744 UART: [rt]cmd =0x494e464f, len=4
36,659,037 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,825 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,553 UART: [kat] SHA2-256
882,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,599 UART: [kat] ++
886,751 UART: [kat] sha1
890,883 UART: [kat] SHA2-256
892,821 UART: [kat] SHA2-384
895,710 UART: [kat] SHA2-512-ACC
897,611 UART: [kat] ECC-384
903,060 UART: [kat] HMAC-384Kdf
907,748 UART: [kat] LMS
1,475,944 UART: [kat] --
1,476,753 UART: [cold-reset] ++
1,477,187 UART: [fht] Storing FHT @ 0x50003400
1,479,916 UART: [idev] ++
1,480,084 UART: [idev] CDI.KEYID = 6
1,480,444 UART: [idev] SUBJECT.KEYID = 7
1,480,868 UART: [idev] UDS.KEYID = 0
1,481,213 ready_for_fw is high
1,481,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,818 UART: [idev] Erasing UDS.KEYID = 0
1,505,592 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,350 UART: [idev] --
1,515,253 UART: [ldev] ++
1,515,421 UART: [ldev] CDI.KEYID = 6
1,515,784 UART: [ldev] SUBJECT.KEYID = 5
1,516,210 UART: [ldev] AUTHORITY.KEYID = 7
1,516,673 UART: [ldev] FE.KEYID = 1
1,521,595 UART: [ldev] Erasing FE.KEYID = 1
1,546,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,548 UART: [ldev] --
1,585,979 UART: [fwproc] Waiting for Commands...
1,586,748 UART: [fwproc] Received command 0x46574c44
1,587,539 UART: [fwproc] Received Image of size 118548 bytes
5,430,701 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,459,785 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,491,003 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,631,316 >>> mbox cmd response: success
5,632,418 UART: [afmc] ++
5,632,586 UART: [afmc] CDI.KEYID = 6
5,632,948 UART: [afmc] SUBJECT.KEYID = 7
5,633,373 UART: [afmc] AUTHORITY.KEYID = 5
5,668,986 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,685,402 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,686,182 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,691,888 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,697,767 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,703,480 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,711,377 UART: [afmc] --
5,712,263 UART: [cold-reset] --
5,713,277 UART: [state] Locking Datavault
5,714,548 UART: [state] Locking PCR0, PCR1 and PCR31
5,715,152 UART: [state] Locking ICCM
5,715,590 UART: [exit] Launching FMC @ 0x40000130
5,720,920 UART:
5,720,936 UART: Running Caliptra FMC ...
5,721,344 UART:
5,721,398 UART: [state] CFI Enabled
5,732,038 UART: [fht] FMC Alias Private Key: 7
5,851,172 UART: [art] Extend RT PCRs Done
5,851,600 UART: [art] Lock RT PCRs Done
5,852,806 UART: [art] Populate DV Done
5,860,953 UART: [fht] FMC Alias Private Key: 7
5,862,001 UART: [art] Derive CDI
5,862,281 UART: [art] Store in slot 0x4
5,948,147 UART: [art] Derive Key Pair
5,948,507 UART: [art] Store priv key in slot 0x5
5,961,474 UART: [art] Derive Key Pair - Done
5,976,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,991,577 UART: [art] Erasing AUTHORITY.KEYID = 7
5,992,342 UART: [art] PUB.X = EE1813D94EEAE10AA1C2BBA00438E986065A38E9FAC2BFEDEBCC7FC4041E995AAC5524C940727E4E8E9E1350B04A3E9E
5,999,122 UART: [art] PUB.Y = CB3544FABDE675206555D9F5DD9D3D623B7155BFC817953BC3FB22AFA4A000BF7918C3B8CC45A5257B3F95A10CE8A3D7
6,006,063 UART: [art] SIG.R = 659C572B6688C19203299F60C2AA48B815EAE708C44E689AA8686A1581CBA2797B8163EF461634705419DC13ADA38423
6,012,819 UART: [art] SIG.S = 83717CA012BB9A727711015C28374A5BD6559B1B21C876626DBCEEF5C007F47E3B4C0BA9E1CFABB6BA45F6FA6045065F
6,036,811 UART: Caliptra RT
6,037,062 UART: [state] CFI Enabled
6,157,480 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,158,150 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,281,002 UART: [rt]cmd =0x41544d4e, len=14344
11,285,351 >>> mbox cmd response data (8 bytes)
11,285,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,314,799 UART: [rt]cmd =0x494e464f, len=4
11,318,643 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,885 ready_for_fw is high
1,362,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,218,875 >>> mbox cmd response: success
5,280,632 UART:
5,280,648 UART: Running Caliptra FMC ...
5,281,056 UART:
5,281,110 UART: [state] CFI Enabled
5,291,452 UART: [fht] FMC Alias Private Key: 7
5,410,188 UART: [art] Extend RT PCRs Done
5,410,616 UART: [art] Lock RT PCRs Done
5,412,110 UART: [art] Populate DV Done
5,420,447 UART: [fht] FMC Alias Private Key: 7
5,421,493 UART: [art] Derive CDI
5,421,773 UART: [art] Store in slot 0x4
5,507,453 UART: [art] Derive Key Pair
5,507,813 UART: [art] Store priv key in slot 0x5
5,521,208 UART: [art] Derive Key Pair - Done
5,536,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,551,951 UART: [art] Erasing AUTHORITY.KEYID = 7
5,552,716 UART: [art] PUB.X = FB8647141D8BBB9870B63D6C0E4C6E6336E3DB3D68202F6728C957E3886BD8D3F01247526E3C34A9613024E7EA45611E
5,559,481 UART: [art] PUB.Y = AFF480D9D97DA0F845683ECDDB266E2A02CAAA097AE067DF14D94694824BE26F2D74BBAD9BC30A53A02314B8D3990F65
5,566,435 UART: [art] SIG.R = D3AA679037B0731FEBAA62250AF0E2AD70EC8FC9EC8A8B7AA01D8944572DDCAC80F3DCE8B5921C2C68B578E199B4EC64
5,573,224 UART: [art] SIG.S = 13542E9923B329B03F77479CDC399C0DBB7F530A832EF3001A9F94B6849C986A0E2D53F0BDF12C5190D05141A5FEF312
5,597,063 UART: Caliptra RT
5,597,314 UART: [state] CFI Enabled
5,717,542 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,718,212 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,841,448 UART: [rt]cmd =0x41544d4e, len=14344
10,732,605 >>> mbox cmd response data (8 bytes)
10,732,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,762,093 UART: [rt]cmd =0x494e464f, len=4
10,765,863 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,488 UART: [kat] SHA2-256
882,419 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,534 UART: [kat] ++
886,686 UART: [kat] sha1
891,008 UART: [kat] SHA2-256
892,946 UART: [kat] SHA2-384
895,721 UART: [kat] SHA2-512-ACC
897,622 UART: [kat] ECC-384
903,403 UART: [kat] HMAC-384Kdf
907,979 UART: [kat] LMS
1,476,175 UART: [kat] --
1,477,022 UART: [cold-reset] ++
1,477,396 UART: [fht] Storing FHT @ 0x50003400
1,480,185 UART: [idev] ++
1,480,353 UART: [idev] CDI.KEYID = 6
1,480,713 UART: [idev] SUBJECT.KEYID = 7
1,481,137 UART: [idev] UDS.KEYID = 0
1,481,482 ready_for_fw is high
1,481,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,043 UART: [idev] Erasing UDS.KEYID = 0
1,505,495 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,303 UART: [idev] --
1,515,312 UART: [ldev] ++
1,515,480 UART: [ldev] CDI.KEYID = 6
1,515,843 UART: [ldev] SUBJECT.KEYID = 5
1,516,269 UART: [ldev] AUTHORITY.KEYID = 7
1,516,732 UART: [ldev] FE.KEYID = 1
1,521,934 UART: [ldev] Erasing FE.KEYID = 1
1,547,207 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,159 UART: [ldev] --
1,586,526 UART: [fwproc] Waiting for Commands...
1,587,247 UART: [fwproc] Received command 0x46574c44
1,588,038 UART: [fwproc] Received Image of size 118548 bytes
5,432,308 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,459,468 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,490,686 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,630,955 >>> mbox cmd response: success
5,632,001 UART: [afmc] ++
5,632,169 UART: [afmc] CDI.KEYID = 6
5,632,531 UART: [afmc] SUBJECT.KEYID = 7
5,632,956 UART: [afmc] AUTHORITY.KEYID = 5
5,668,343 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,684,763 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,685,543 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,691,249 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,697,128 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,702,841 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,710,840 UART: [afmc] --
5,711,768 UART: [cold-reset] --
5,712,628 UART: [state] Locking Datavault
5,713,813 UART: [state] Locking PCR0, PCR1 and PCR31
5,714,417 UART: [state] Locking ICCM
5,715,053 UART: [exit] Launching FMC @ 0x40000130
5,720,383 UART:
5,720,399 UART: Running Caliptra FMC ...
5,720,807 UART:
5,720,950 UART: [state] CFI Enabled
5,731,622 UART: [fht] FMC Alias Private Key: 7
5,850,372 UART: [art] Extend RT PCRs Done
5,850,800 UART: [art] Lock RT PCRs Done
5,852,190 UART: [art] Populate DV Done
5,860,441 UART: [fht] FMC Alias Private Key: 7
5,861,463 UART: [art] Derive CDI
5,861,743 UART: [art] Store in slot 0x4
5,947,833 UART: [art] Derive Key Pair
5,948,193 UART: [art] Store priv key in slot 0x5
5,961,622 UART: [art] Derive Key Pair - Done
5,976,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,992,245 UART: [art] Erasing AUTHORITY.KEYID = 7
5,993,010 UART: [art] PUB.X = C41D0B0F5006EDB659F4B1924D93F4A74FFB21E9198269A48E3ABF0E13C932E8C17A2FF8B4D75C8BD123E0574E5B6B33
5,999,780 UART: [art] PUB.Y = 28A99113CFB486FB465392F0E711465DFD0E5207F5D3A61158639F37464C055BF07B10F658847CCF06927F05A3E4D6E4
6,006,711 UART: [art] SIG.R = EED6A8F3C87E548B6439E5931079FFE5EF4AC2E97899B2E74AA33DBAFDAF9BC942BA656472F31572488989ED96B673A0
6,013,493 UART: [art] SIG.S = 7F1799F9AAA61E30B49EDAFCA842642D6E03DDF7E233D277570A1CCECC9CE7D9A0C3CE2FBE227D5A6D426F9C27624F5F
6,036,711 UART: Caliptra RT
6,037,054 UART: [state] CFI Enabled
6,157,028 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,157,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,280,892 UART: [rt]cmd =0x41544d4e, len=14344
11,096,357 >>> mbox cmd response data (8 bytes)
11,096,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,125,721 UART: [rt]cmd =0x494e464f, len=4
11,129,409 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,988 ready_for_fw is high
1,362,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,141,756 >>> mbox cmd response: success
5,204,339 UART:
5,204,355 UART: Running Caliptra FMC ...
5,204,763 UART:
5,204,906 UART: [state] CFI Enabled
5,215,920 UART: [fht] FMC Alias Private Key: 7
5,335,342 UART: [art] Extend RT PCRs Done
5,335,770 UART: [art] Lock RT PCRs Done
5,337,320 UART: [art] Populate DV Done
5,345,907 UART: [fht] FMC Alias Private Key: 7
5,346,983 UART: [art] Derive CDI
5,347,263 UART: [art] Store in slot 0x4
5,432,827 UART: [art] Derive Key Pair
5,433,187 UART: [art] Store priv key in slot 0x5
5,446,946 UART: [art] Derive Key Pair - Done
5,461,361 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,477,200 UART: [art] Erasing AUTHORITY.KEYID = 7
5,477,965 UART: [art] PUB.X = 070591AF63AA20BE954121A52A5D60E87C2AEF06DFED59ADBE76895B82A2E752D41A7B2D1B89A8272D274B9A5CF49C31
5,484,738 UART: [art] PUB.Y = 3E50EF891A2B09DA2D859E513ED37DA8E4893717746A7DC218354642963FB652BA68E24A05EB76B39B4211332A5B94E9
5,491,680 UART: [art] SIG.R = A29E5EF2F8B7AAF6CD231CD93EC13AE6791030261EB393D3AD589390D26509E51917451DC10BBDBF1F1E8E6D577FE0C2
5,498,458 UART: [art] SIG.S = 17B0BE21F5AAE2BBAD15BF3FABF20070DC8DAAD6CB1898F62CA1737802523639DFD075BC2A7F0A4A2F2A4DFEA636C02D
5,522,020 UART: Caliptra RT
5,522,363 UART: [state] CFI Enabled
5,642,409 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,643,079 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,766,197 UART: [rt]cmd =0x41544d4e, len=14344
10,733,442 >>> mbox cmd response data (8 bytes)
10,733,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,762,738 UART: [rt]cmd =0x494e464f, len=4
10,766,486 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,142 UART: [kat] ++
895,294 UART: [kat] sha1
899,544 UART: [kat] SHA2-256
901,484 UART: [kat] SHA2-384
904,155 UART: [kat] SHA2-512-ACC
906,056 UART: [kat] ECC-384
915,831 UART: [kat] HMAC-384Kdf
920,327 UART: [kat] LMS
1,168,639 UART: [kat] --
1,169,502 UART: [cold-reset] ++
1,169,988 UART: [fht] FHT @ 0x50003400
1,172,666 UART: [idev] ++
1,172,834 UART: [idev] CDI.KEYID = 6
1,173,195 UART: [idev] SUBJECT.KEYID = 7
1,173,620 UART: [idev] UDS.KEYID = 0
1,173,966 ready_for_fw is high
1,173,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,769 UART: [idev] Erasing UDS.KEYID = 0
1,199,299 UART: [idev] Sha1 KeyId Algorithm
1,208,191 UART: [idev] --
1,209,302 UART: [ldev] ++
1,209,470 UART: [ldev] CDI.KEYID = 6
1,209,834 UART: [ldev] SUBJECT.KEYID = 5
1,210,261 UART: [ldev] AUTHORITY.KEYID = 7
1,210,724 UART: [ldev] FE.KEYID = 1
1,215,906 UART: [ldev] Erasing FE.KEYID = 1
1,241,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,428 UART: [ldev] --
1,280,817 UART: [fwproc] Wait for Commands...
1,281,552 UART: [fwproc] Recv command 0x46574c44
1,282,285 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,163 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,338 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,372,511 >>> mbox cmd response: success
3,373,709 UART: [afmc] ++
3,373,877 UART: [afmc] CDI.KEYID = 6
3,374,240 UART: [afmc] SUBJECT.KEYID = 7
3,374,666 UART: [afmc] AUTHORITY.KEYID = 5
3,409,699 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,731 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,438 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,438,315 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,025 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,769 UART: [afmc] --
3,452,652 UART: [cold-reset] --
3,453,410 UART: [state] Locking Datavault
3,454,585 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,189 UART: [state] Locking ICCM
3,455,823 UART: [exit] Launching FMC @ 0x40000130
3,461,153 UART:
3,461,169 UART: Running Caliptra FMC ...
3,461,577 UART:
3,461,631 UART: [state] CFI Enabled
3,472,207 UART: [fht] FMC Alias Private Key: 7
3,591,157 UART: [art] Extend RT PCRs Done
3,591,585 UART: [art] Lock RT PCRs Done
3,593,227 UART: [art] Populate DV Done
3,601,418 UART: [fht] FMC Alias Private Key: 7
3,602,588 UART: [art] Derive CDI
3,602,868 UART: [art] Store in slot 0x4
3,688,539 UART: [art] Derive Key Pair
3,688,899 UART: [art] Store priv key in slot 0x5
3,702,429 UART: [art] Derive Key Pair - Done
3,717,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,549 UART: [art] PUB.X = D1E3300A5852FE815EEB5DC99E833EA2EB6BCA6FE7C6FE0ACEAB8CFD8A358107B6256C485869E06557AD30AAFCCF8627
3,740,334 UART: [art] PUB.Y = 75378A29210FEA6550E32CE3489346200A37D49801EDC3AA498F6BE52AC16726687A79FA0E7137835D2EB4B24E36D739
3,747,268 UART: [art] SIG.R = 7E60BC54A056B8D624AA7CC45CF747E71A948D232E09C31AB51C05FC9F569A23F82B481232BF59CED6E399EA51537559
3,754,038 UART: [art] SIG.S = 856D140979F97ED4D37D6708E21C6917F74E7F15609982974B11F8FC1EAB2DCA73D719FD6D1462B013CF71451847F81A
3,777,458 UART: Caliptra RT
3,777,709 UART: [state] CFI Enabled
3,897,909 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,898,579 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,643 UART: [rt]cmd =0x41544d4e, len=14344
5,470,768 >>> mbox cmd response data (8 bytes)
5,470,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,499,888 UART: [rt]cmd =0x494e464f, len=4
5,503,712 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,166 ready_for_fw is high
1,059,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,260 >>> mbox cmd response: success
3,280,727 UART:
3,280,743 UART: Running Caliptra FMC ...
3,281,151 UART:
3,281,205 UART: [state] CFI Enabled
3,291,753 UART: [fht] FMC Alias Private Key: 7
3,410,505 UART: [art] Extend RT PCRs Done
3,410,933 UART: [art] Lock RT PCRs Done
3,412,639 UART: [art] Populate DV Done
3,420,962 UART: [fht] FMC Alias Private Key: 7
3,422,014 UART: [art] Derive CDI
3,422,294 UART: [art] Store in slot 0x4
3,508,433 UART: [art] Derive Key Pair
3,508,793 UART: [art] Store priv key in slot 0x5
3,521,623 UART: [art] Derive Key Pair - Done
3,536,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,551,875 UART: [art] Erasing AUTHORITY.KEYID = 7
3,552,640 UART: [art] PUB.X = 0E3543FB64853E4C54536601F768DEA607D43864B4C3BC3C5E718FE2E14FEF50DA8EB4EFF200B70DB4DAF04E36CBD9CC
3,559,396 UART: [art] PUB.Y = 7F53768722C3088D4F4AC72D8499B29EB29CCC81B257A537124557949C09DFADE8521CC6C518BA5CF80A921BC3FC093C
3,566,340 UART: [art] SIG.R = 86989B3C06DD7DDD4B1BF81ED072B3840883A3FA7B501E190E7F7B71B076E0FFD8F787B26E9A50DDB1F74F239F0EB075
3,573,112 UART: [art] SIG.S = 7A063614E9700FFC29E14901979D15D7E3A593A92A94F3782FBD2473473426649EB2B59584DB308504346BA3DA98C375
3,597,006 UART: Caliptra RT
3,597,257 UART: [state] CFI Enabled
3,717,165 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,717,835 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,689 UART: [rt]cmd =0x41544d4e, len=14344
5,300,524 >>> mbox cmd response data (8 bytes)
5,300,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,329,752 UART: [rt]cmd =0x494e464f, len=4
5,333,510 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,396 UART: [kat] SHA2-512-ACC
906,297 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,814 UART: [kat] LMS
1,169,126 UART: [kat] --
1,169,989 UART: [cold-reset] ++
1,170,533 UART: [fht] FHT @ 0x50003400
1,173,267 UART: [idev] ++
1,173,435 UART: [idev] CDI.KEYID = 6
1,173,796 UART: [idev] SUBJECT.KEYID = 7
1,174,221 UART: [idev] UDS.KEYID = 0
1,174,567 ready_for_fw is high
1,174,567 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,968 UART: [idev] Erasing UDS.KEYID = 0
1,198,030 UART: [idev] Sha1 KeyId Algorithm
1,207,060 UART: [idev] --
1,208,267 UART: [ldev] ++
1,208,435 UART: [ldev] CDI.KEYID = 6
1,208,799 UART: [ldev] SUBJECT.KEYID = 5
1,209,226 UART: [ldev] AUTHORITY.KEYID = 7
1,209,689 UART: [ldev] FE.KEYID = 1
1,215,181 UART: [ldev] Erasing FE.KEYID = 1
1,241,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,335 UART: [ldev] --
1,280,746 UART: [fwproc] Wait for Commands...
1,281,437 UART: [fwproc] Recv command 0x46574c44
1,282,170 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,704 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,879 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,196 >>> mbox cmd response: success
3,374,286 UART: [afmc] ++
3,374,454 UART: [afmc] CDI.KEYID = 6
3,374,817 UART: [afmc] SUBJECT.KEYID = 7
3,375,243 UART: [afmc] AUTHORITY.KEYID = 5
3,411,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,738 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,445 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,440,322 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,032 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,862 UART: [afmc] --
3,454,715 UART: [cold-reset] --
3,455,519 UART: [state] Locking Datavault
3,456,836 UART: [state] Locking PCR0, PCR1 and PCR31
3,457,440 UART: [state] Locking ICCM
3,458,018 UART: [exit] Launching FMC @ 0x40000130
3,463,348 UART:
3,463,364 UART: Running Caliptra FMC ...
3,463,772 UART:
3,463,915 UART: [state] CFI Enabled
3,474,363 UART: [fht] FMC Alias Private Key: 7
3,593,049 UART: [art] Extend RT PCRs Done
3,593,477 UART: [art] Lock RT PCRs Done
3,594,729 UART: [art] Populate DV Done
3,603,178 UART: [fht] FMC Alias Private Key: 7
3,604,204 UART: [art] Derive CDI
3,604,484 UART: [art] Store in slot 0x4
3,690,801 UART: [art] Derive Key Pair
3,691,161 UART: [art] Store priv key in slot 0x5
3,703,897 UART: [art] Derive Key Pair - Done
3,718,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,094 UART: [art] Erasing AUTHORITY.KEYID = 7
3,734,859 UART: [art] PUB.X = C1B505CE6C2BC895D04F070E8C40D4B6F0382F3528E97DEBF42C557AD481AF1CD00EC9D9A692A931BB65E3D832BAC0BC
3,741,637 UART: [art] PUB.Y = 3AF869B73A432509F2F53A263521515E68E4EEC2FFCC4E4776ABEC1EDB230380766967A52E3F96D89F115256BB4D3D60
3,748,585 UART: [art] SIG.R = ECD7F387E49721B3BD739CE4A3EC24B86F0624ACDFC4F0F9C40E883DC51703AE9CDCAC51605DDCDA23B50EFED613BE37
3,755,371 UART: [art] SIG.S = F272524614AA623F766326014B8D48F8FD3B76D3D1117069FF33A3581E02062F81624F8B52B768D23C4FDD9E6065FD16
3,778,470 UART: Caliptra RT
3,778,813 UART: [state] CFI Enabled
3,898,564 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,899,234 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,024 UART: [rt]cmd =0x41544d4e, len=14344
5,466,307 >>> mbox cmd response data (8 bytes)
5,466,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,495,563 UART: [rt]cmd =0x494e464f, len=4
5,499,305 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,753 ready_for_fw is high
1,059,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,234,142 >>> mbox cmd response: success
3,296,091 UART:
3,296,107 UART: Running Caliptra FMC ...
3,296,515 UART:
3,296,658 UART: [state] CFI Enabled
3,307,414 UART: [fht] FMC Alias Private Key: 7
3,427,134 UART: [art] Extend RT PCRs Done
3,427,562 UART: [art] Lock RT PCRs Done
3,429,126 UART: [art] Populate DV Done
3,437,293 UART: [fht] FMC Alias Private Key: 7
3,438,433 UART: [art] Derive CDI
3,438,713 UART: [art] Store in slot 0x4
3,524,754 UART: [art] Derive Key Pair
3,525,114 UART: [art] Store priv key in slot 0x5
3,538,066 UART: [art] Derive Key Pair - Done
3,553,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,568,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,569,190 UART: [art] PUB.X = F8F0ADC25F300A42C647DD7747517879CA062F41E610854E63E6EC35D944D8639DB48FEEACC83FEE5E2289B175D29F0E
3,575,961 UART: [art] PUB.Y = 80A53FA063FE6829C8C294468B3B9755DFEC7F23E8B93D998445B9DACA60AF87B8C308F4CCC600C614EC5D57BF707E12
3,582,898 UART: [art] SIG.R = EBF508AA393DD4E9C907A587D54504FE9B143F5082E3BFF59DBB7472B534A9BBA6968870A0F1A681C3206EA4F95A5394
3,589,667 UART: [art] SIG.S = 6AB4A3D28E35446F1A67B5F2BAD7185E3BB9E7251130CE3AA63AB7D4C33D3BB1F3B2CC38605B2F27F674ADFA6C1E16A3
3,613,081 UART: Caliptra RT
3,613,424 UART: [state] CFI Enabled
3,732,714 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,733,384 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,556 UART: [rt]cmd =0x41544d4e, len=14344
5,316,291 >>> mbox cmd response data (8 bytes)
5,316,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,345,511 UART: [rt]cmd =0x494e464f, len=4
5,349,341 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
893,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,409 UART: [kat] ++
897,561 UART: [kat] sha1
901,689 UART: [kat] SHA2-256
903,629 UART: [kat] SHA2-384
906,618 UART: [kat] SHA2-512-ACC
908,519 UART: [kat] ECC-384
918,458 UART: [kat] HMAC-384Kdf
923,054 UART: [kat] LMS
1,171,382 UART: [kat] --
1,172,259 UART: [cold-reset] ++
1,172,799 UART: [fht] FHT @ 0x50003400
1,175,432 UART: [idev] ++
1,175,600 UART: [idev] CDI.KEYID = 6
1,175,960 UART: [idev] SUBJECT.KEYID = 7
1,176,384 UART: [idev] UDS.KEYID = 0
1,176,729 ready_for_fw is high
1,176,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,540 UART: [idev] Erasing UDS.KEYID = 0
1,200,891 UART: [idev] Sha1 KeyId Algorithm
1,209,219 UART: [idev] --
1,210,425 UART: [ldev] ++
1,210,593 UART: [ldev] CDI.KEYID = 6
1,210,956 UART: [ldev] SUBJECT.KEYID = 5
1,211,382 UART: [ldev] AUTHORITY.KEYID = 7
1,211,845 UART: [ldev] FE.KEYID = 1
1,217,037 UART: [ldev] Erasing FE.KEYID = 1
1,243,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,161 UART: [ldev] --
1,282,534 UART: [fwproc] Wait for Commands...
1,283,234 UART: [fwproc] Recv command 0x46574c44
1,283,962 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,394 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,564 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,915 >>> mbox cmd response: success
3,372,971 UART: [afmc] ++
3,373,139 UART: [afmc] CDI.KEYID = 6
3,373,501 UART: [afmc] SUBJECT.KEYID = 7
3,373,926 UART: [afmc] AUTHORITY.KEYID = 5
3,409,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,042 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,790 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,496 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,438,375 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,085 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,722 UART: [afmc] --
3,452,760 UART: [cold-reset] --
3,453,546 UART: [state] Locking Datavault
3,454,803 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,407 UART: [state] Locking ICCM
3,455,977 UART: [exit] Launching FMC @ 0x40000130
3,461,307 UART:
3,461,323 UART: Running Caliptra FMC ...
3,461,731 UART:
3,461,785 UART: [state] CFI Enabled
3,472,167 UART: [fht] FMC Alias Private Key: 7
3,590,503 UART: [art] Extend RT PCRs Done
3,590,931 UART: [art] Lock RT PCRs Done
3,592,545 UART: [art] Populate DV Done
3,600,980 UART: [fht] FMC Alias Private Key: 7
3,602,016 UART: [art] Derive CDI
3,602,296 UART: [art] Store in slot 0x4
3,688,451 UART: [art] Derive Key Pair
3,688,811 UART: [art] Store priv key in slot 0x5
3,701,911 UART: [art] Derive Key Pair - Done
3,716,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,624 UART: [art] PUB.X = 955EF352C10CFBEFA095C6AA82CB4E4063B1CD2C8FB19781391101424C9853101418E4B3E6035C7FF429773774C1CA71
3,739,385 UART: [art] PUB.Y = AE7FB79227EB11DA49AB0230E4523605FE555FC46DBE2F504176C51164C57C31BEB854CE08A18A1B637A5453CC6FAB90
3,746,336 UART: [art] SIG.R = 7F61C9B2E19EDBA26FC090361D65E7F443CA32C18243A4434D1CA2E5DDE325B9D7DBF54F7655364493A0976FC354A89D
3,753,114 UART: [art] SIG.S = B741C57EACB7CC38AFB24BC22C5278CCFD1F3D9AC4EABC64E4429D5A9EDB855CD77D757AB37C3FC9D53976BFF6844FD9
3,776,574 UART: Caliptra RT
3,776,825 UART: [state] CFI Enabled
3,896,273 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,896,943 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,883 UART: [rt]cmd =0x41544d4e, len=14344
5,453,840 >>> mbox cmd response data (8 bytes)
5,453,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,483,278 UART: [rt]cmd =0x494e464f, len=4
5,487,132 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,843 ready_for_fw is high
1,059,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,231,439 >>> mbox cmd response: success
3,293,204 UART:
3,293,220 UART: Running Caliptra FMC ...
3,293,628 UART:
3,293,682 UART: [state] CFI Enabled
3,304,358 UART: [fht] FMC Alias Private Key: 7
3,422,752 UART: [art] Extend RT PCRs Done
3,423,180 UART: [art] Lock RT PCRs Done
3,424,436 UART: [art] Populate DV Done
3,432,791 UART: [fht] FMC Alias Private Key: 7
3,433,731 UART: [art] Derive CDI
3,434,011 UART: [art] Store in slot 0x4
3,520,020 UART: [art] Derive Key Pair
3,520,380 UART: [art] Store priv key in slot 0x5
3,534,224 UART: [art] Derive Key Pair - Done
3,548,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,564,623 UART: [art] PUB.X = E1D7FB3E147CA89D59D4307D77517F1E674A677D87F6122E3017C08E5FFFEAF84BBCDEFD9BB9499086627659D6452939
3,571,399 UART: [art] PUB.Y = F4C48342472BD93B6F7A1112E55641767F9E350C75638F0D6AA85C41DA2CF326AE06208404056F3DC5371B56EEB5953B
3,578,332 UART: [art] SIG.R = 875E6C9B5D75B475034A4168A73CDD6C6021B81021383A4F01C529374FED79887C56D12EAF96B9A45E878201797C8B14
3,585,087 UART: [art] SIG.S = 728A51C33626A85C465735314C54B04F19C725216F1315D371F8A46E184610552CB259A6E7AC1FF6D8B7C738418AE9DC
3,609,259 UART: Caliptra RT
3,609,510 UART: [state] CFI Enabled
3,729,248 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,729,918 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,880 UART: [rt]cmd =0x41544d4e, len=14344
5,310,838 >>> mbox cmd response data (8 bytes)
5,310,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,340,408 UART: [rt]cmd =0x494e464f, len=4
5,344,138 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
893,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,586 UART: [kat] ++
897,738 UART: [kat] sha1
902,002 UART: [kat] SHA2-256
903,942 UART: [kat] SHA2-384
906,717 UART: [kat] SHA2-512-ACC
908,618 UART: [kat] ECC-384
918,109 UART: [kat] HMAC-384Kdf
922,681 UART: [kat] LMS
1,171,009 UART: [kat] --
1,171,622 UART: [cold-reset] ++
1,172,110 UART: [fht] FHT @ 0x50003400
1,174,749 UART: [idev] ++
1,174,917 UART: [idev] CDI.KEYID = 6
1,175,277 UART: [idev] SUBJECT.KEYID = 7
1,175,701 UART: [idev] UDS.KEYID = 0
1,176,046 ready_for_fw is high
1,176,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,799 UART: [idev] Erasing UDS.KEYID = 0
1,200,786 UART: [idev] Sha1 KeyId Algorithm
1,209,264 UART: [idev] --
1,210,390 UART: [ldev] ++
1,210,558 UART: [ldev] CDI.KEYID = 6
1,210,921 UART: [ldev] SUBJECT.KEYID = 5
1,211,347 UART: [ldev] AUTHORITY.KEYID = 7
1,211,810 UART: [ldev] FE.KEYID = 1
1,216,936 UART: [ldev] Erasing FE.KEYID = 1
1,243,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,398 UART: [ldev] --
1,282,847 UART: [fwproc] Wait for Commands...
1,283,421 UART: [fwproc] Recv command 0x46574c44
1,284,149 UART: [fwproc] Recv'd Img size: 118548 bytes
3,170,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,198,954 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,124 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,309 >>> mbox cmd response: success
3,371,473 UART: [afmc] ++
3,371,641 UART: [afmc] CDI.KEYID = 6
3,372,003 UART: [afmc] SUBJECT.KEYID = 7
3,372,428 UART: [afmc] AUTHORITY.KEYID = 5
3,408,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,594 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,300 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,179 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,442,889 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,730 UART: [afmc] --
3,451,618 UART: [cold-reset] --
3,452,564 UART: [state] Locking Datavault
3,453,783 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,387 UART: [state] Locking ICCM
3,454,823 UART: [exit] Launching FMC @ 0x40000130
3,460,153 UART:
3,460,169 UART: Running Caliptra FMC ...
3,460,577 UART:
3,460,720 UART: [state] CFI Enabled
3,471,576 UART: [fht] FMC Alias Private Key: 7
3,590,978 UART: [art] Extend RT PCRs Done
3,591,406 UART: [art] Lock RT PCRs Done
3,593,290 UART: [art] Populate DV Done
3,601,587 UART: [fht] FMC Alias Private Key: 7
3,602,607 UART: [art] Derive CDI
3,602,887 UART: [art] Store in slot 0x4
3,688,638 UART: [art] Derive Key Pair
3,688,998 UART: [art] Store priv key in slot 0x5
3,702,628 UART: [art] Derive Key Pair - Done
3,717,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,995 UART: [art] PUB.X = 1465B1655264F0ADE34E78512A5AC239983F10D07863E3C67D8583C1CC26FD610F4E484BD5C6C888DA77B18EFE61656D
3,740,764 UART: [art] PUB.Y = 5899CDA8363738DE565443C4AF162EC0624C6EA4E2EA9F1EFFA9E6EA0A9B4086D133E2E9B9EA05F947D79423182723F1
3,747,716 UART: [art] SIG.R = E23EE9511414B9683341E57E4B86C01547103C9412001C5E4A32D18A548E175640BC68BD295E5421D17DFFB8CD0A73F2
3,754,457 UART: [art] SIG.S = 14442A426DB34B970AE8E1359B575FFA76BE2F095A4A70A4E57D0308CE574CF7F7C8747749C2DAC9ADD30FF345D366C3
3,778,218 UART: Caliptra RT
3,778,561 UART: [state] CFI Enabled
3,898,311 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,898,981 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,965 UART: [rt]cmd =0x41544d4e, len=14344
5,456,616 >>> mbox cmd response data (8 bytes)
5,456,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,486,062 UART: [rt]cmd =0x494e464f, len=4
5,489,798 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,390 ready_for_fw is high
1,060,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,225,536 >>> mbox cmd response: success
3,286,857 UART:
3,286,873 UART: Running Caliptra FMC ...
3,287,281 UART:
3,287,424 UART: [state] CFI Enabled
3,297,610 UART: [fht] FMC Alias Private Key: 7
3,416,178 UART: [art] Extend RT PCRs Done
3,416,606 UART: [art] Lock RT PCRs Done
3,418,156 UART: [art] Populate DV Done
3,426,553 UART: [fht] FMC Alias Private Key: 7
3,427,717 UART: [art] Derive CDI
3,427,997 UART: [art] Store in slot 0x4
3,513,730 UART: [art] Derive Key Pair
3,514,090 UART: [art] Store priv key in slot 0x5
3,527,520 UART: [art] Derive Key Pair - Done
3,542,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,557,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,558,200 UART: [art] PUB.X = 3C2BAA2832E86B7C891D2919AC38101D01F161E67C4AFF4353D953B544B60C19C5E25E269CD1144C331CE056D717E91D
3,564,966 UART: [art] PUB.Y = 81F682FBAD9805251CF68E4C9F3C7528EE2AC9CD178C5B2AD4A346E21AA829376B7BFD318B33EEF0DA186E0CA50AA0E7
3,571,927 UART: [art] SIG.R = 995998000141D34DEBFE90289572D41C7202D4FDF985F596A8CA94CD753B681F576F6A6B88A59321F74D02A39363D24C
3,578,662 UART: [art] SIG.S = C00024A66E6418F173FD8DD99A920B86A094B8C0493326EED09AC874628D328682ECD53179F4DE3B9E2FF1E629637BD3
3,601,931 UART: Caliptra RT
3,602,274 UART: [state] CFI Enabled
3,722,501 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,723,171 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,199 UART: [rt]cmd =0x41544d4e, len=14344
5,280,058 >>> mbox cmd response data (8 bytes)
5,280,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,309,410 UART: [rt]cmd =0x494e464f, len=4
5,313,274 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,206 UART:
192,552 UART: Running Caliptra ROM ...
193,660 UART:
193,807 UART: [state] CFI Enabled
262,429 UART: [state] LifecycleState = Unprovisioned
264,370 UART: [state] DebugLocked = No
266,186 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,618 UART: [kat] SHA2-256
441,311 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,770 UART: [kat] ++
452,293 UART: [kat] sha1
464,183 UART: [kat] SHA2-256
466,874 UART: [kat] SHA2-384
473,721 UART: [kat] SHA2-512-ACC
476,090 UART: [kat] ECC-384
2,768,451 UART: [kat] HMAC-384Kdf
2,799,483 UART: [kat] LMS
3,989,770 UART: [kat] --
3,992,444 UART: [cold-reset] ++
3,993,746 UART: [fht] Storing FHT @ 0x50003400
4,003,877 UART: [idev] ++
4,004,442 UART: [idev] CDI.KEYID = 6
4,005,396 UART: [idev] SUBJECT.KEYID = 7
4,006,646 UART: [idev] UDS.KEYID = 0
4,007,835 ready_for_fw is high
4,008,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,157,122 UART: [idev] Erasing UDS.KEYID = 0
7,344,195 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,145 UART: [idev] --
7,368,549 UART: [ldev] ++
7,369,124 UART: [ldev] CDI.KEYID = 6
7,370,119 UART: [ldev] SUBJECT.KEYID = 5
7,371,280 UART: [ldev] AUTHORITY.KEYID = 7
7,372,561 UART: [ldev] FE.KEYID = 1
7,421,940 UART: [ldev] Erasing FE.KEYID = 1
10,755,705 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,716 UART: [ldev] --
13,135,496 UART: [fwproc] Waiting for Commands...
13,137,208 UART: [fwproc] Received command 0x46574c44
13,139,390 UART: [fwproc] Received Image of size 118548 bytes
21,826,895 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,907,757 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,980,905 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,310,201 >>> mbox cmd response: success
22,315,240 UART: [afmc] ++
22,315,859 UART: [afmc] CDI.KEYID = 6
22,316,775 UART: [afmc] SUBJECT.KEYID = 7
22,318,000 UART: [afmc] AUTHORITY.KEYID = 5
25,676,164 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,974,330 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,976,593 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,991,120 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,005,895 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,020,220 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,042,312 UART: [afmc] --
28,045,325 UART: [cold-reset] --
28,049,892 UART: [state] Locking Datavault
28,056,004 UART: [state] Locking PCR0, PCR1 and PCR31
28,057,769 UART: [state] Locking ICCM
28,059,411 UART: [exit] Launching FMC @ 0x40000130
28,067,830 UART:
28,068,120 UART: Running Caliptra FMC ...
28,069,236 UART:
28,069,401 UART: [state] CFI Enabled
28,133,012 UART: [fht] FMC Alias Private Key: 7
30,473,830 UART: [art] Extend RT PCRs Done
30,475,050 UART: [art] Lock RT PCRs Done
30,476,759 UART: [art] Populate DV Done
30,482,226 UART: [fht] FMC Alias Private Key: 7
30,483,927 UART: [art] Derive CDI
30,484,745 UART: [art] Store in slot 0x4
30,542,117 UART: [art] Derive Key Pair
30,543,147 UART: [art] Store priv key in slot 0x5
33,836,086 UART: [art] Derive Key Pair - Done
33,848,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,138,311 UART: [art] Erasing AUTHORITY.KEYID = 7
36,139,823 UART: [art] PUB.X = FBDAFA15B4F56864C3E57EF58D915223B55CB50B91C9BD084542C286904E6E56596C131877BA3BFDD36C63D330E8E4C1
36,147,113 UART: [art] PUB.Y = D4EE4915D868D129542A01B2DF8EA42E2FE6560B25F63B9B192283A2FDAAE57FBF2EE191F476C9B92FC103062703F9E9
36,154,386 UART: [art] SIG.R = 09634E60E466038C13BC57E73231F5E11D437BDD9CED26F051C6F28EB3392D775DFC0A891034AEA27528A12018154200
36,161,702 UART: [art] SIG.S = 4C85C71AA544104CEC03F499C93664ED34705257C62992C07059D12A32F34B3388BD01E8A6C38CBEBDAA70CB80418D78
37,466,753 UART: Caliptra RT
37,467,460 UART: [state] CFI Enabled
37,643,426 UART: [rt] RT listening for mailbox commands...
37,645,725 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,801,088 UART: [rt]cmd =0x41544d4e, len=14344
41,866,070 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,782,817 ready_for_fw is high
3,783,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,342,772 >>> mbox cmd response: success
28,043,727 UART:
28,044,138 UART: Running Caliptra FMC ...
28,045,461 UART:
28,045,640 UART: [state] CFI Enabled
28,112,623 UART: [fht] FMC Alias Private Key: 7
30,452,495 UART: [art] Extend RT PCRs Done
30,453,719 UART: [art] Lock RT PCRs Done
30,455,403 UART: [art] Populate DV Done
30,460,918 UART: [fht] FMC Alias Private Key: 7
30,462,622 UART: [art] Derive CDI
30,463,437 UART: [art] Store in slot 0x4
30,519,746 UART: [art] Derive Key Pair
30,520,789 UART: [art] Store priv key in slot 0x5
33,813,344 UART: [art] Derive Key Pair - Done
33,826,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,114,266 UART: [art] Erasing AUTHORITY.KEYID = 7
36,115,786 UART: [art] PUB.X = 5DF0E5E7F99791D8D5D74D280C1D43A25DF665BD563161D0F8BADD51A851E7791EBC958B82D7B6622A70DB2ED7E6F0E6
36,123,054 UART: [art] PUB.Y = 88AFD01B3B5C0F1BD132DB0CE80A1566E401D9F707015D725A3A11CE6493B7D0C700D1A581551B0D0D1AD32845BA71C9
36,130,284 UART: [art] SIG.R = A2A304377ACF517711875664C4BDBEEDD4E970FFD00D2C1C0BE9339E22B197B7064F255992E3A58449E8EB761E8294EE
36,137,699 UART: [art] SIG.S = C9BB1E8FA3B9A8D48AAC90B5419811B211ACDFF4F9984FEBF3C679B8F819244DFB090826AE5B533FBB552555BC8D7278
37,443,062 UART: Caliptra RT
37,443,769 UART: [state] CFI Enabled
37,619,739 UART: [rt] RT listening for mailbox commands...
37,622,047 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,777,383 UART: [rt]cmd =0x41544d4e, len=14344
42,049,525 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,669 UART:
193,047 UART: Running Caliptra ROM ...
194,190 UART:
603,945 UART: [state] CFI Enabled
616,984 UART: [state] LifecycleState = Unprovisioned
618,943 UART: [state] DebugLocked = No
620,819 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,453 UART: [kat] SHA2-256
795,181 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,734 UART: [kat] ++
806,185 UART: [kat] sha1
818,403 UART: [kat] SHA2-256
821,124 UART: [kat] SHA2-384
827,749 UART: [kat] SHA2-512-ACC
830,140 UART: [kat] ECC-384
3,114,377 UART: [kat] HMAC-384Kdf
3,125,393 UART: [kat] LMS
4,315,519 UART: [kat] --
4,318,547 UART: [cold-reset] ++
4,320,406 UART: [fht] Storing FHT @ 0x50003400
4,332,091 UART: [idev] ++
4,332,666 UART: [idev] CDI.KEYID = 6
4,333,581 UART: [idev] SUBJECT.KEYID = 7
4,334,822 UART: [idev] UDS.KEYID = 0
4,335,909 ready_for_fw is high
4,336,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,029 UART: [idev] Erasing UDS.KEYID = 0
7,617,313 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,166 UART: [idev] --
7,642,024 UART: [ldev] ++
7,642,813 UART: [ldev] CDI.KEYID = 6
7,643,704 UART: [ldev] SUBJECT.KEYID = 5
7,644,749 UART: [ldev] AUTHORITY.KEYID = 7
7,646,035 UART: [ldev] FE.KEYID = 1
7,655,956 UART: [ldev] Erasing FE.KEYID = 1
10,943,611 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,249,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,264,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,278,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,296,707 UART: [ldev] --
13,300,831 UART: [fwproc] Waiting for Commands...
13,303,997 UART: [fwproc] Received command 0x46574c44
13,306,182 UART: [fwproc] Received Image of size 118548 bytes
22,076,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,150,672 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,223,864 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,552,362 >>> mbox cmd response: success
22,556,144 UART: [afmc] ++
22,556,757 UART: [afmc] CDI.KEYID = 6
22,557,673 UART: [afmc] SUBJECT.KEYID = 7
22,558,941 UART: [afmc] AUTHORITY.KEYID = 5
25,871,629 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,164,138 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,166,387 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,180,883 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,195,695 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,210,105 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,232,100 UART: [afmc] --
28,235,472 UART: [cold-reset] --
28,239,497 UART: [state] Locking Datavault
28,243,337 UART: [state] Locking PCR0, PCR1 and PCR31
28,245,106 UART: [state] Locking ICCM
28,247,301 UART: [exit] Launching FMC @ 0x40000130
28,255,691 UART:
28,255,921 UART: Running Caliptra FMC ...
28,257,010 UART:
28,257,170 UART: [state] CFI Enabled
28,265,858 UART: [fht] FMC Alias Private Key: 7
30,605,369 UART: [art] Extend RT PCRs Done
30,606,604 UART: [art] Lock RT PCRs Done
30,608,601 UART: [art] Populate DV Done
30,614,120 UART: [fht] FMC Alias Private Key: 7
30,615,707 UART: [art] Derive CDI
30,616,518 UART: [art] Store in slot 0x4
30,659,109 UART: [art] Derive Key Pair
30,660,104 UART: [art] Store priv key in slot 0x5
33,901,893 UART: [art] Derive Key Pair - Done
33,915,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,195,574 UART: [art] Erasing AUTHORITY.KEYID = 7
36,197,075 UART: [art] PUB.X = 274246281DE11289EEEE55E12476961AB6E80C0A3033E0D13FC693E19B55A53BDDAE3160047DC76FB2C3B086FCBF0E18
36,204,412 UART: [art] PUB.Y = 983ED7B0BB11ABEC861EB83C20EE8C8C2831F3D43D99E296CA0DD75F4304BC216DFE8F7564392FB8AFC01C21E4AD0FFB
36,211,675 UART: [art] SIG.R = D940E08A7887A74BDE8C50D422F5E4B287DE3A41ED384BC3E558A2FFBA630E2C6ABAFCF7AC5DABF250573472377D5934
36,219,130 UART: [art] SIG.S = CC1A9A36F18B2279407054E3E8E9E285EB336533C3C8966161282F974418C4A4DB14AFCA4480B3FDF3AEAC7C33121BF6
37,524,169 UART: Caliptra RT
37,524,875 UART: [state] CFI Enabled
37,658,436 UART: [rt] RT listening for mailbox commands...
37,660,758 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,816,119 UART: [rt]cmd =0x41544d4e, len=14344
41,984,533 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
4,127,213 ready_for_fw is high
4,127,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,399,554 >>> mbox cmd response: success
28,044,727 UART:
28,045,158 UART: Running Caliptra FMC ...
28,046,285 UART:
28,046,439 UART: [state] CFI Enabled
28,054,434 UART: [fht] FMC Alias Private Key: 7
30,394,421 UART: [art] Extend RT PCRs Done
30,395,653 UART: [art] Lock RT PCRs Done
30,397,415 UART: [art] Populate DV Done
30,402,891 UART: [fht] FMC Alias Private Key: 7
30,404,486 UART: [art] Derive CDI
30,405,316 UART: [art] Store in slot 0x4
30,447,480 UART: [art] Derive Key Pair
30,448,472 UART: [art] Store priv key in slot 0x5
33,690,313 UART: [art] Derive Key Pair - Done
33,703,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,983,188 UART: [art] Erasing AUTHORITY.KEYID = 7
35,984,696 UART: [art] PUB.X = 436F8B451F0F97E16AFB53025E0662F187D13269A0610C801BA36611A56B84972A809806578B248C3A24D2039FAAFB43
35,991,966 UART: [art] PUB.Y = 86D8D7369DE84011E4DE74C429567539672BAB99E197ADDD87292FF2A80B4FC454BA8260B96CDD36260BDE23B6DA8CCD
35,999,183 UART: [art] SIG.R = 4F95197D5EEA02CB264F9F82EDEED9D762C18F7406333C3C3C9784225CE9E458544361A73C292C108962C4CE85D9DA47
36,006,573 UART: [art] SIG.S = 7D634CD23058577FCBCE5D9FC86DEE9D57C6B4BCD7B78FC3E74F5B20C24B72A89485D27E40965C1225FA261129F44E15
37,311,736 UART: Caliptra RT
37,312,445 UART: [state] CFI Enabled
37,445,890 UART: [rt] RT listening for mailbox commands...
37,448,184 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,603,273 UART: [rt]cmd =0x41544d4e, len=14344
41,694,812 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,025 UART:
192,402 UART: Running Caliptra ROM ...
193,559 UART:
193,704 UART: [state] CFI Enabled
265,651 UART: [state] LifecycleState = Unprovisioned
267,652 UART: [state] DebugLocked = No
269,602 UART: [state] WD Timer not started. Device not locked for debugging
273,775 UART: [kat] SHA2-256
453,424 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,164 UART: [kat] ++
464,683 UART: [kat] sha1
475,196 UART: [kat] SHA2-256
477,912 UART: [kat] SHA2-384
484,033 UART: [kat] SHA2-512-ACC
486,400 UART: [kat] ECC-384
2,946,977 UART: [kat] HMAC-384Kdf
2,971,217 UART: [kat] LMS
3,447,752 UART: [kat] --
3,452,741 UART: [cold-reset] ++
3,455,019 UART: [fht] FHT @ 0x50003400
3,467,238 UART: [idev] ++
3,467,858 UART: [idev] CDI.KEYID = 6
3,468,774 UART: [idev] SUBJECT.KEYID = 7
3,470,015 UART: [idev] UDS.KEYID = 0
3,471,081 ready_for_fw is high
3,471,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,352 UART: [idev] Erasing UDS.KEYID = 0
5,984,670 UART: [idev] Sha1 KeyId Algorithm
6,009,621 UART: [idev] --
6,015,025 UART: [ldev] ++
6,015,600 UART: [ldev] CDI.KEYID = 6
6,016,614 UART: [ldev] SUBJECT.KEYID = 5
6,017,772 UART: [ldev] AUTHORITY.KEYID = 7
6,018,997 UART: [ldev] FE.KEYID = 1
6,057,138 UART: [ldev] Erasing FE.KEYID = 1
8,566,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,570 UART: [ldev] --
10,374,432 UART: [fwproc] Wait for Commands...
10,376,306 UART: [fwproc] Recv command 0x46574c44
10,378,287 UART: [fwproc] Recv'd Img size: 118548 bytes
14,918,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,002,655 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,075,689 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,404,196 >>> mbox cmd response: success
15,408,249 UART: [afmc] ++
15,408,894 UART: [afmc] CDI.KEYID = 6
15,409,799 UART: [afmc] SUBJECT.KEYID = 7
15,411,012 UART: [afmc] AUTHORITY.KEYID = 5
17,939,952 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,685,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,687,283 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,703,140 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,719,059 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,734,776 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,757,821 UART: [afmc] --
19,761,363 UART: [cold-reset] --
19,765,005 UART: [state] Locking Datavault
19,769,817 UART: [state] Locking PCR0, PCR1 and PCR31
19,771,562 UART: [state] Locking ICCM
19,773,521 UART: [exit] Launching FMC @ 0x40000130
19,781,971 UART:
19,782,243 UART: Running Caliptra FMC ...
19,783,271 UART:
19,783,417 UART: [state] CFI Enabled
19,840,649 UART: [fht] FMC Alias Private Key: 7
21,607,583 UART: [art] Extend RT PCRs Done
21,608,802 UART: [art] Lock RT PCRs Done
21,610,454 UART: [art] Populate DV Done
21,615,939 UART: [fht] FMC Alias Private Key: 7
21,617,583 UART: [art] Derive CDI
21,618,395 UART: [art] Store in slot 0x4
21,673,980 UART: [art] Derive Key Pair
21,675,023 UART: [art] Store priv key in slot 0x5
24,138,158 UART: [art] Derive Key Pair - Done
24,150,883 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,864,310 UART: [art] Erasing AUTHORITY.KEYID = 7
25,865,816 UART: [art] PUB.X = 18746817D72CCF675F585E419FDE0A4396DC52153AAD3F1B20A66EFF7086A633C100322E66A104664CDDBAB6300C9F66
25,873,067 UART: [art] PUB.Y = 91104CD66E80AA57A1837972F38D0D1F7F77DFC333831FBF37DB9E0D2515B4472FBEE3C9A275D6DEC765C792FB028278
25,880,357 UART: [art] SIG.R = DC0DD5A0C68ACB0FFC0386FBB1F3F861FBF00F27C779C7F5E3BD53489B50AD3526BEEDAEA275ADB22E273B99D9901784
25,887,750 UART: [art] SIG.S = 89DC24508BB725B382B62D1A24F215634C3036889CDEACC2C9E877AEB429722A1FA72E958C693D95447E08FC5950E1BA
26,867,303 UART: Caliptra RT
26,867,991 UART: [state] CFI Enabled
27,047,860 UART: [rt] RT listening for mailbox commands...
27,050,172 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,205,625 UART: [rt]cmd =0x41544d4e, len=14344
29,583,352 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,460,576 ready_for_fw is high
3,460,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,386,104 >>> mbox cmd response: success
19,665,184 UART:
19,665,562 UART: Running Caliptra FMC ...
19,666,756 UART:
19,666,923 UART: [state] CFI Enabled
19,735,942 UART: [fht] FMC Alias Private Key: 7
21,502,594 UART: [art] Extend RT PCRs Done
21,503,821 UART: [art] Lock RT PCRs Done
21,505,443 UART: [art] Populate DV Done
21,510,755 UART: [fht] FMC Alias Private Key: 7
21,512,396 UART: [art] Derive CDI
21,513,232 UART: [art] Store in slot 0x4
21,568,748 UART: [art] Derive Key Pair
21,569,779 UART: [art] Store priv key in slot 0x5
24,032,368 UART: [art] Derive Key Pair - Done
24,045,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,759,088 UART: [art] Erasing AUTHORITY.KEYID = 7
25,760,595 UART: [art] PUB.X = 3F828374AFB70048D6F1ECDD40500DA384DF3A15D5E833968F53B28D157C5EFD94847A735F1878898CADA19695BCD71A
25,767,855 UART: [art] PUB.Y = 4EC8D7BDC384EBE5FBF430F33DA911D86A4441A9DA29B192271A59C56DD906EACA28383E616EF33C792532C116CE9DAB
25,775,155 UART: [art] SIG.R = 3629A377E2E2D4597F20484625AA509AAB900FF30E7078CEBCC3A8F4B209FB04E77A0BC6885427BF9F6206A190C0428B
25,782,526 UART: [art] SIG.S = 98469711BC8F9AECADFB0409E29EC1E9B9C76DA513BF83A1C7AE74E9E842B28CEC6A09606BDE72A5AE2BEAF17533CC9D
26,761,996 UART: Caliptra RT
26,762,705 UART: [state] CFI Enabled
26,943,646 UART: [rt] RT listening for mailbox commands...
26,945,950 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,101,245 UART: [rt]cmd =0x41544d4e, len=14344
29,490,463 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,340 UART:
192,707 UART: Running Caliptra ROM ...
193,801 UART:
603,533 UART: [state] CFI Enabled
616,341 UART: [state] LifecycleState = Unprovisioned
618,222 UART: [state] DebugLocked = No
619,832 UART: [state] WD Timer not started. Device not locked for debugging
624,229 UART: [kat] SHA2-256
803,858 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,682 UART: [kat] ++
815,137 UART: [kat] sha1
825,870 UART: [kat] SHA2-256
828,600 UART: [kat] SHA2-384
834,882 UART: [kat] SHA2-512-ACC
837,253 UART: [kat] ECC-384
3,280,248 UART: [kat] HMAC-384Kdf
3,293,148 UART: [kat] LMS
3,769,620 UART: [kat] --
3,774,481 UART: [cold-reset] ++
3,776,510 UART: [fht] FHT @ 0x50003400
3,787,999 UART: [idev] ++
3,788,636 UART: [idev] CDI.KEYID = 6
3,789,560 UART: [idev] SUBJECT.KEYID = 7
3,790,809 UART: [idev] UDS.KEYID = 0
3,791,755 ready_for_fw is high
3,791,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,886 UART: [idev] Erasing UDS.KEYID = 0
6,268,362 UART: [idev] Sha1 KeyId Algorithm
6,293,002 UART: [idev] --
6,298,148 UART: [ldev] ++
6,298,719 UART: [ldev] CDI.KEYID = 6
6,299,688 UART: [ldev] SUBJECT.KEYID = 5
6,300,849 UART: [ldev] AUTHORITY.KEYID = 7
6,302,141 UART: [ldev] FE.KEYID = 1
6,314,831 UART: [ldev] Erasing FE.KEYID = 1
8,798,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,625 UART: [ldev] --
10,593,067 UART: [fwproc] Wait for Commands...
10,595,770 UART: [fwproc] Recv command 0x46574c44
10,597,755 UART: [fwproc] Recv'd Img size: 118548 bytes
15,123,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,203,314 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,276,325 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,604,048 >>> mbox cmd response: success
15,608,271 UART: [afmc] ++
15,608,886 UART: [afmc] CDI.KEYID = 6
15,609,806 UART: [afmc] SUBJECT.KEYID = 7
15,611,023 UART: [afmc] AUTHORITY.KEYID = 5
18,112,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,835,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,837,587 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,853,477 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,869,367 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,885,072 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,909,678 UART: [afmc] --
19,912,724 UART: [cold-reset] --
19,917,948 UART: [state] Locking Datavault
19,925,032 UART: [state] Locking PCR0, PCR1 and PCR31
19,926,747 UART: [state] Locking ICCM
19,928,416 UART: [exit] Launching FMC @ 0x40000130
19,936,825 UART:
19,937,104 UART: Running Caliptra FMC ...
19,938,217 UART:
19,938,390 UART: [state] CFI Enabled
19,946,445 UART: [fht] FMC Alias Private Key: 7
21,713,174 UART: [art] Extend RT PCRs Done
21,714,392 UART: [art] Lock RT PCRs Done
21,716,187 UART: [art] Populate DV Done
21,721,455 UART: [fht] FMC Alias Private Key: 7
21,722,942 UART: [art] Derive CDI
21,723,707 UART: [art] Store in slot 0x4
21,766,302 UART: [art] Derive Key Pair
21,767,309 UART: [art] Store priv key in slot 0x5
24,193,738 UART: [art] Derive Key Pair - Done
24,206,845 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,913,083 UART: [art] Erasing AUTHORITY.KEYID = 7
25,914,600 UART: [art] PUB.X = 5210A9B9D871C0BBAA0CC92CC7172569EDE989BA6E2B3021EE4DD8F625D541DED3EB055841CF8062DF19ABD9C4B0F3D4
25,921,900 UART: [art] PUB.Y = 5CFE8A8E9E9B5A72347D0E5FEBAEF4E76CA26BE1A124E63BF975CA870328F18E2E2C62DD069D1B2622020187C4D2D01E
25,929,187 UART: [art] SIG.R = 2AB213A72130B8BEF1EBE25EC6A914637AFD949034A231A748B4C317D9A1CDB43F4BFA7455BCEA46B51030C6ABC6DFE3
25,936,621 UART: [art] SIG.S = 18A36D28D492C101163599EEA03B541B8FE190C991540C3463E49A21F97B38F9EA9AA316639C05485561A31AE886C9E4
26,915,624 UART: Caliptra RT
26,916,336 UART: [state] CFI Enabled
27,049,520 UART: [rt] RT listening for mailbox commands...
27,051,843 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,207,357 UART: [rt]cmd =0x41544d4e, len=14344
29,595,320 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,779,643 ready_for_fw is high
3,780,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,593,325 >>> mbox cmd response: success
19,845,005 UART:
19,845,392 UART: Running Caliptra FMC ...
19,846,495 UART:
19,846,662 UART: [state] CFI Enabled
19,854,176 UART: [fht] FMC Alias Private Key: 7
21,619,849 UART: [art] Extend RT PCRs Done
21,621,076 UART: [art] Lock RT PCRs Done
21,622,600 UART: [art] Populate DV Done
21,627,968 UART: [fht] FMC Alias Private Key: 7
21,629,515 UART: [art] Derive CDI
21,630,281 UART: [art] Store in slot 0x4
21,673,155 UART: [art] Derive Key Pair
21,674,221 UART: [art] Store priv key in slot 0x5
24,101,177 UART: [art] Derive Key Pair - Done
24,114,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,820,645 UART: [art] Erasing AUTHORITY.KEYID = 7
25,822,153 UART: [art] PUB.X = 11CBBA7CA4883624CADD5E01E4CE79817E734BC32902878F9E04465BA5AEB06C352DE393F38B272C00C855870F70C6DE
25,829,416 UART: [art] PUB.Y = D9DECD2F19683A9AEEE400769BF194043B53143D68929629FE5C25967A87D0C5CD2ABE9FAB511908D4FD4932F10E6AED
25,836,615 UART: [art] SIG.R = 2F78082C4E3C1F179AE90186DB78E9544ED25259DFC611F054EB591949D9846D31A506EF72F0BFBDBEF089D2EA284819
25,844,025 UART: [art] SIG.S = AD5C052EF24C17EB344B4E80C4B9F9A22638D26BD43A31AB393223F39B5926AB38086A2565788DBD2D3799D2F8DDCB5C
26,822,487 UART: Caliptra RT
26,823,179 UART: [state] CFI Enabled
26,955,483 UART: [rt] RT listening for mailbox commands...
26,957,861 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,113,329 UART: [rt]cmd =0x41544d4e, len=14344
29,501,568 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,034 UART:
192,403 UART: Running Caliptra ROM ...
193,495 UART:
193,641 UART: [state] CFI Enabled
264,183 UART: [state] LifecycleState = Unprovisioned
266,602 UART: [state] DebugLocked = No
269,344 UART: [state] WD Timer not started. Device not locked for debugging
274,441 UART: [kat] SHA2-256
464,269 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,092 UART: [kat] ++
475,609 UART: [kat] sha1
487,544 UART: [kat] SHA2-256
490,551 UART: [kat] SHA2-384
497,529 UART: [kat] SHA2-512-ACC
500,103 UART: [kat] ECC-384
2,949,355 UART: [kat] HMAC-384Kdf
2,972,641 UART: [kat] LMS
3,504,412 UART: [kat] --
3,510,825 UART: [cold-reset] ++
3,513,322 UART: [fht] FHT @ 0x50003400
3,525,509 UART: [idev] ++
3,526,281 UART: [idev] CDI.KEYID = 6
3,527,171 UART: [idev] SUBJECT.KEYID = 7
3,528,342 UART: [idev] UDS.KEYID = 0
3,529,332 ready_for_fw is high
3,529,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,679,411 UART: [idev] Erasing UDS.KEYID = 0
6,051,460 UART: [idev] Sha1 KeyId Algorithm
6,072,273 UART: [idev] --
6,077,732 UART: [ldev] ++
6,078,410 UART: [ldev] CDI.KEYID = 6
6,079,298 UART: [ldev] SUBJECT.KEYID = 5
6,080,507 UART: [ldev] AUTHORITY.KEYID = 7
6,081,734 UART: [ldev] FE.KEYID = 1
6,123,817 UART: [ldev] Erasing FE.KEYID = 1
8,630,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,366,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,381,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,396,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,411,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,431,856 UART: [ldev] --
10,436,637 UART: [fwproc] Wait for Commands...
10,438,257 UART: [fwproc] Recv command 0x46574c44
10,440,567 UART: [fwproc] Recv'd Img size: 118548 bytes
15,120,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,200,920 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,324,537 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,884,742 >>> mbox cmd response: success
15,888,848 UART: [afmc] ++
15,889,570 UART: [afmc] CDI.KEYID = 6
15,890,764 UART: [afmc] SUBJECT.KEYID = 7
15,892,139 UART: [afmc] AUTHORITY.KEYID = 5
18,434,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,156,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,158,206 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,173,341 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,188,541 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,203,574 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,225,882 UART: [afmc] --
20,228,845 UART: [cold-reset] --
20,232,387 UART: [state] Locking Datavault
20,238,453 UART: [state] Locking PCR0, PCR1 and PCR31
20,240,596 UART: [state] Locking ICCM
20,243,207 UART: [exit] Launching FMC @ 0x40000130
20,251,882 UART:
20,252,117 UART: Running Caliptra FMC ...
20,253,214 UART:
20,253,373 UART: [state] CFI Enabled
20,313,362 UART: [fht] FMC Alias Private Key: 7
22,080,161 UART: [art] Extend RT PCRs Done
22,081,390 UART: [art] Lock RT PCRs Done
22,083,148 UART: [art] Populate DV Done
22,088,664 UART: [fht] FMC Alias Private Key: 7
22,090,317 UART: [art] Derive CDI
22,091,075 UART: [art] Store in slot 0x4
22,146,438 UART: [art] Derive Key Pair
22,147,476 UART: [art] Store priv key in slot 0x5
24,610,084 UART: [art] Derive Key Pair - Done
24,622,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,336,478 UART: [art] Erasing AUTHORITY.KEYID = 7
26,337,981 UART: [art] PUB.X = 169BFF7F4AFD7B71200CC2128FB6EFD64036C5B65B843BA24996BF57D429F603ABE053EA451254602D3166B8E258F233
26,345,267 UART: [art] PUB.Y = D7DEEFF4176FD3B00A250764010ABA39DF94154FCA4B1FBB08200E2E303465616184FF799FE94C8FBC90E541D70D7B80
26,352,533 UART: [art] SIG.R = 7E1F0FF64197B7C8C166D05741DA7E6E8709CFF3FE27A986271F884DA14DA008919E234965A72AA8EFAE7EC651A0694D
26,359,896 UART: [art] SIG.S = 2D645CC7638E5331CBB110F5FC386B6AED645C7831C3917F78E99C35AE7F0BE6268A4740956A0EFFE3B6FCDB4EA59118
27,338,547 UART: Caliptra RT
27,339,260 UART: [state] CFI Enabled
27,519,986 UART: [rt] RT listening for mailbox commands...
27,522,302 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,677,571 UART: [rt]cmd =0x41544d4e, len=14344
30,062,621 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,436,777 ready_for_fw is high
3,437,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,913,361 >>> mbox cmd response: success
20,214,905 UART:
20,215,296 UART: Running Caliptra FMC ...
20,216,492 UART:
20,216,658 UART: [state] CFI Enabled
20,283,119 UART: [fht] FMC Alias Private Key: 7
22,050,089 UART: [art] Extend RT PCRs Done
22,051,315 UART: [art] Lock RT PCRs Done
22,052,676 UART: [art] Populate DV Done
22,057,982 UART: [fht] FMC Alias Private Key: 7
22,059,717 UART: [art] Derive CDI
22,060,541 UART: [art] Store in slot 0x4
22,116,842 UART: [art] Derive Key Pair
22,117,890 UART: [art] Store priv key in slot 0x5
24,580,284 UART: [art] Derive Key Pair - Done
24,593,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,307,484 UART: [art] Erasing AUTHORITY.KEYID = 7
26,308,982 UART: [art] PUB.X = 8012C8315ACD393B0C6E32649BA5BF57ABE273F2EB6FDDBD1BE65EE549BDE3FB4A09763CBE672DC05A2AC92994F2CBCC
26,316,269 UART: [art] PUB.Y = 02994137A046EECDAAFDB24C42F922B5DD5930D15980B6D2B019ACF3DBE3728D2215A191C5A548565F8491410EBF6196
26,323,524 UART: [art] SIG.R = 0E81DF8B37CF1F0FB7F34378A576FF619FFB9D0BDF2B6C7E606AEEB0D8D65977D567090772DED3EB03DF39C46777AC02
26,330,891 UART: [art] SIG.S = 30720F38723C2E1C05C4B7B9E799163F8B4E6939C863E086BA51A7BF19B93F140C255BC6D8E74CF626CF992939293133
27,309,860 UART: Caliptra RT
27,310,575 UART: [state] CFI Enabled
27,490,792 UART: [rt] RT listening for mailbox commands...
27,493,089 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,648,457 UART: [rt]cmd =0x41544d4e, len=14344
30,042,102 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,394 UART:
192,764 UART: Running Caliptra ROM ...
193,870 UART:
603,662 UART: [state] CFI Enabled
616,632 UART: [state] LifecycleState = Unprovisioned
619,030 UART: [state] DebugLocked = No
621,566 UART: [state] WD Timer not started. Device not locked for debugging
625,895 UART: [kat] SHA2-256
815,837 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,572 UART: [kat] ++
827,178 UART: [kat] sha1
838,798 UART: [kat] SHA2-256
841,880 UART: [kat] SHA2-384
848,651 UART: [kat] SHA2-512-ACC
851,245 UART: [kat] ECC-384
3,292,809 UART: [kat] HMAC-384Kdf
3,306,103 UART: [kat] LMS
3,837,968 UART: [kat] --
3,841,204 UART: [cold-reset] ++
3,843,066 UART: [fht] FHT @ 0x50003400
3,855,143 UART: [idev] ++
3,855,818 UART: [idev] CDI.KEYID = 6
3,856,718 UART: [idev] SUBJECT.KEYID = 7
3,858,018 UART: [idev] UDS.KEYID = 0
3,858,970 ready_for_fw is high
3,859,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,118 UART: [idev] Erasing UDS.KEYID = 0
6,338,009 UART: [idev] Sha1 KeyId Algorithm
6,360,495 UART: [idev] --
6,366,315 UART: [ldev] ++
6,366,998 UART: [ldev] CDI.KEYID = 6
6,367,885 UART: [ldev] SUBJECT.KEYID = 5
6,369,099 UART: [ldev] AUTHORITY.KEYID = 7
6,370,287 UART: [ldev] FE.KEYID = 1
6,381,293 UART: [ldev] Erasing FE.KEYID = 1
8,855,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,956 UART: [ldev] --
10,647,714 UART: [fwproc] Wait for Commands...
10,649,474 UART: [fwproc] Recv command 0x46574c44
10,651,815 UART: [fwproc] Recv'd Img size: 118548 bytes
15,316,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,397,603 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,521,255 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,082,278 >>> mbox cmd response: success
16,086,071 UART: [afmc] ++
16,086,808 UART: [afmc] CDI.KEYID = 6
16,088,000 UART: [afmc] SUBJECT.KEYID = 7
16,089,476 UART: [afmc] AUTHORITY.KEYID = 5
18,590,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,311,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,313,753 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,328,874 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,344,085 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,359,124 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,383,160 UART: [afmc] --
20,387,369 UART: [cold-reset] --
20,393,141 UART: [state] Locking Datavault
20,399,332 UART: [state] Locking PCR0, PCR1 and PCR31
20,401,550 UART: [state] Locking ICCM
20,404,275 UART: [exit] Launching FMC @ 0x40000130
20,412,949 UART:
20,413,229 UART: Running Caliptra FMC ...
20,414,261 UART:
20,414,415 UART: [state] CFI Enabled
20,422,095 UART: [fht] FMC Alias Private Key: 7
22,187,964 UART: [art] Extend RT PCRs Done
22,189,168 UART: [art] Lock RT PCRs Done
22,190,654 UART: [art] Populate DV Done
22,195,849 UART: [fht] FMC Alias Private Key: 7
22,197,504 UART: [art] Derive CDI
22,198,246 UART: [art] Store in slot 0x4
22,241,294 UART: [art] Derive Key Pair
22,242,298 UART: [art] Store priv key in slot 0x5
24,669,180 UART: [art] Derive Key Pair - Done
24,682,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,388,728 UART: [art] Erasing AUTHORITY.KEYID = 7
26,390,223 UART: [art] PUB.X = 9B3373851AE63E908908F3AC7443AA03BDDADE5BD9655AAFBF6F48F99DC52F3726C7B817D3D5E24437C7076AD007E7B3
26,397,485 UART: [art] PUB.Y = 7DD034EB0A734E025A41F8AE51ADF54253BDAE5EBF62121875BF94B3EF8C4F474332FD872E71893DB812985F71D717F6
26,404,741 UART: [art] SIG.R = FB551344E378435120AF1CF284EAFD5AAD5FDFE37D2844F455C78A3BC7623BC7F0B8D54AD5FFCDB6D20C3EE891786E2E
26,412,223 UART: [art] SIG.S = 99536D3EE5D8336989F70221FC62AA71A65C78CE0037602961C8CFE79C1DAF28FCB4789B81655419ED00B4C460BE8DD1
27,390,895 UART: Caliptra RT
27,391,588 UART: [state] CFI Enabled
27,524,526 UART: [rt] RT listening for mailbox commands...
27,526,906 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,682,651 UART: [rt]cmd =0x41544d4e, len=14344
30,067,572 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,754,497 ready_for_fw is high
3,754,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,145,793 >>> mbox cmd response: success
20,399,165 UART:
20,399,561 UART: Running Caliptra FMC ...
20,400,669 UART:
20,400,826 UART: [state] CFI Enabled
20,408,550 UART: [fht] FMC Alias Private Key: 7
22,174,877 UART: [art] Extend RT PCRs Done
22,176,106 UART: [art] Lock RT PCRs Done
22,177,416 UART: [art] Populate DV Done
22,183,104 UART: [fht] FMC Alias Private Key: 7
22,184,660 UART: [art] Derive CDI
22,185,437 UART: [art] Store in slot 0x4
22,227,718 UART: [art] Derive Key Pair
22,228,763 UART: [art] Store priv key in slot 0x5
24,655,506 UART: [art] Derive Key Pair - Done
24,668,250 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,374,773 UART: [art] Erasing AUTHORITY.KEYID = 7
26,376,282 UART: [art] PUB.X = 8760E154406FF613127DBED72B86B478364CCEEC5D9E7FB2DD40AAE511D51E2CBDA986FE7DA5DF847C1083D56E953EA7
26,383,602 UART: [art] PUB.Y = 5C811EC0C2A492F9B8FBD96AA0798754923743CACD6B43B1F7A42FD7B563B57AC39B86FA5E7A952871A90C2CBDF0AF71
26,390,832 UART: [art] SIG.R = D2D8E4EAA054317492D2E2F34460209DB6F7FFF649374F36661E607AEC0C9599C233D1EBA58F968DB74EE822069B7D07
26,398,236 UART: [art] SIG.S = D6DF363C1B43074A5353CF0A18CB77537C7BAF997DC08186865FC01D22D8C06D1CE4EDB3A377540BE82D6E008919C25D
27,376,790 UART: Caliptra RT
27,377,504 UART: [state] CFI Enabled
27,510,746 UART: [rt] RT listening for mailbox commands...
27,513,041 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,668,522 UART: [rt]cmd =0x41544d4e, len=14344
30,053,683 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,763 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,317 UART: [kat] SHA2-256
882,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,363 UART: [kat] ++
886,515 UART: [kat] sha1
890,783 UART: [kat] SHA2-256
892,721 UART: [kat] SHA2-384
895,616 UART: [kat] SHA2-512-ACC
897,517 UART: [kat] ECC-384
903,052 UART: [kat] HMAC-384Kdf
907,714 UART: [kat] LMS
1,475,910 UART: [kat] --
1,477,035 UART: [cold-reset] ++
1,477,445 UART: [fht] Storing FHT @ 0x50003400
1,480,138 UART: [idev] ++
1,480,306 UART: [idev] CDI.KEYID = 6
1,480,666 UART: [idev] SUBJECT.KEYID = 7
1,481,090 UART: [idev] UDS.KEYID = 0
1,481,435 ready_for_fw is high
1,481,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,416 UART: [idev] Erasing UDS.KEYID = 0
1,505,576 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,382 UART: [idev] --
1,515,451 UART: [ldev] ++
1,515,619 UART: [ldev] CDI.KEYID = 6
1,515,982 UART: [ldev] SUBJECT.KEYID = 5
1,516,408 UART: [ldev] AUTHORITY.KEYID = 7
1,516,871 UART: [ldev] FE.KEYID = 1
1,521,801 UART: [ldev] Erasing FE.KEYID = 1
1,547,112 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,010 UART: [ldev] --
1,586,391 UART: [fwproc] Waiting for Commands...
1,587,056 UART: [fwproc] Received command 0x46574c44
1,587,847 UART: [fwproc] Received Image of size 118548 bytes
5,281,673 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,309,595 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,340,813 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,481,262 >>> mbox cmd response: success
5,482,384 UART: [afmc] ++
5,482,552 UART: [afmc] CDI.KEYID = 6
5,482,914 UART: [afmc] SUBJECT.KEYID = 7
5,483,339 UART: [afmc] AUTHORITY.KEYID = 5
5,518,484 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,534,612 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,535,392 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,541,098 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,546,977 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,552,690 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,560,627 UART: [afmc] --
5,561,563 UART: [cold-reset] --
5,562,325 UART: [state] Locking Datavault
5,563,274 UART: [state] Locking PCR0, PCR1 and PCR31
5,563,878 UART: [state] Locking ICCM
5,564,332 UART: [exit] Launching FMC @ 0x40000130
5,569,662 UART:
5,569,678 UART: Running Caliptra FMC ...
5,570,086 UART:
5,570,140 UART: [state] CFI Enabled
5,580,480 UART: [fht] FMC Alias Private Key: 7
5,699,358 UART: [art] Extend RT PCRs Done
5,699,786 UART: [art] Lock RT PCRs Done
5,701,124 UART: [art] Populate DV Done
5,709,363 UART: [fht] FMC Alias Private Key: 7
5,710,355 UART: [art] Derive CDI
5,710,635 UART: [art] Store in slot 0x4
5,796,373 UART: [art] Derive Key Pair
5,796,733 UART: [art] Store priv key in slot 0x5
5,809,774 UART: [art] Derive Key Pair - Done
5,824,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,839,817 UART: [art] Erasing AUTHORITY.KEYID = 7
5,840,582 UART: [art] PUB.X = EA4FE7EDD57735F001A5BDAC1BED1F5F1D005F959A49BAFB6D3E266C333FDE3DAE34DCC44CAB99A7FACA3A85569E2996
5,847,359 UART: [art] PUB.Y = AEA958610FA7DDC8E3AE556908D2ADDAAF55CD0403E4DC2FC7CA4F7BBF45C981D6DC4AD0C26500279DAE179A47D15FD7
5,854,303 UART: [art] SIG.R = F8D35C454F12CF2911E3EE1F4D4CE377BF562583A32E09FEED513BC70A3C812E0E202E0BE0A0882CF94B43F73ADB6ABF
5,861,081 UART: [art] SIG.S = 89B5C15D0867FC04535C6110B48795AC3C07237AD68133F4E93CE0529D7ED5612978219A4D463468B6B2614143CD776B
5,884,486 UART: Caliptra RT
5,884,737 UART: [state] CFI Enabled
6,006,184 UART: [rt] RT listening for mailbox commands...
6,006,854 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,129,788 UART: [rt]cmd =0x41544d4e, len=14344
8,397,783 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,957 ready_for_fw is high
1,361,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,292,933 >>> mbox cmd response: success
5,354,918 UART:
5,354,934 UART: Running Caliptra FMC ...
5,355,342 UART:
5,355,396 UART: [state] CFI Enabled
5,366,022 UART: [fht] FMC Alias Private Key: 7
5,485,036 UART: [art] Extend RT PCRs Done
5,485,464 UART: [art] Lock RT PCRs Done
5,487,076 UART: [art] Populate DV Done
5,494,875 UART: [fht] FMC Alias Private Key: 7
5,495,879 UART: [art] Derive CDI
5,496,159 UART: [art] Store in slot 0x4
5,581,699 UART: [art] Derive Key Pair
5,582,059 UART: [art] Store priv key in slot 0x5
5,594,882 UART: [art] Derive Key Pair - Done
5,609,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,625,168 UART: [art] Erasing AUTHORITY.KEYID = 7
5,625,933 UART: [art] PUB.X = 5ADED2998611860D6B7677982E40DA3BB93770BB3088AB51F5CE2FA07DFC3F3A2E784AC2266E86C19769ACA30B19B8C9
5,632,707 UART: [art] PUB.Y = 8EA47B551024AA83D9B665AE1D9053039C4F24619EF636172BA27D97561E1426B781E7D2A240C176FB863BCB46B1750A
5,639,649 UART: [art] SIG.R = 7EDE8E257E2183788C3776F1796174EC39011431E17A33B366B14600130058359FE4264DE4BF5F53DF51ADA64ABC4131
5,646,366 UART: [art] SIG.S = 7B274158F63B807F4F96F923B9FA220AD79F00C1D981C86E6F83F0004BD30DBBA815695CB02A5EB8D02825155C62E8CA
5,669,722 UART: Caliptra RT
5,669,973 UART: [state] CFI Enabled
5,789,774 UART: [rt] RT listening for mailbox commands...
5,790,444 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,913,500 UART: [rt]cmd =0x41544d4e, len=14344
8,294,766 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,492 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,180 UART: [kat] SHA2-256
882,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,226 UART: [kat] ++
886,378 UART: [kat] sha1
890,766 UART: [kat] SHA2-256
892,704 UART: [kat] SHA2-384
895,521 UART: [kat] SHA2-512-ACC
897,422 UART: [kat] ECC-384
903,137 UART: [kat] HMAC-384Kdf
907,637 UART: [kat] LMS
1,475,833 UART: [kat] --
1,476,754 UART: [cold-reset] ++
1,477,144 UART: [fht] Storing FHT @ 0x50003400
1,479,973 UART: [idev] ++
1,480,141 UART: [idev] CDI.KEYID = 6
1,480,501 UART: [idev] SUBJECT.KEYID = 7
1,480,925 UART: [idev] UDS.KEYID = 0
1,481,270 ready_for_fw is high
1,481,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,259 UART: [idev] Erasing UDS.KEYID = 0
1,506,033 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,623 UART: [idev] --
1,515,642 UART: [ldev] ++
1,515,810 UART: [ldev] CDI.KEYID = 6
1,516,173 UART: [ldev] SUBJECT.KEYID = 5
1,516,599 UART: [ldev] AUTHORITY.KEYID = 7
1,517,062 UART: [ldev] FE.KEYID = 1
1,522,176 UART: [ldev] Erasing FE.KEYID = 1
1,547,649 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,147 UART: [ldev] --
1,586,480 UART: [fwproc] Waiting for Commands...
1,587,305 UART: [fwproc] Received command 0x46574c44
1,588,096 UART: [fwproc] Received Image of size 118548 bytes
5,167,637 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,194,759 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,225,977 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,366,230 >>> mbox cmd response: success
5,367,394 UART: [afmc] ++
5,367,562 UART: [afmc] CDI.KEYID = 6
5,367,924 UART: [afmc] SUBJECT.KEYID = 7
5,368,349 UART: [afmc] AUTHORITY.KEYID = 5
5,403,782 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,420,070 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,420,850 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,426,556 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,432,435 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,438,148 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,446,187 UART: [afmc] --
5,447,151 UART: [cold-reset] --
5,447,877 UART: [state] Locking Datavault
5,449,214 UART: [state] Locking PCR0, PCR1 and PCR31
5,449,818 UART: [state] Locking ICCM
5,450,356 UART: [exit] Launching FMC @ 0x40000130
5,455,686 UART:
5,455,702 UART: Running Caliptra FMC ...
5,456,110 UART:
5,456,253 UART: [state] CFI Enabled
5,466,913 UART: [fht] FMC Alias Private Key: 7
5,586,157 UART: [art] Extend RT PCRs Done
5,586,585 UART: [art] Lock RT PCRs Done
5,587,975 UART: [art] Populate DV Done
5,595,926 UART: [fht] FMC Alias Private Key: 7
5,597,050 UART: [art] Derive CDI
5,597,330 UART: [art] Store in slot 0x4
5,683,060 UART: [art] Derive Key Pair
5,683,420 UART: [art] Store priv key in slot 0x5
5,696,835 UART: [art] Derive Key Pair - Done
5,711,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,727,112 UART: [art] Erasing AUTHORITY.KEYID = 7
5,727,877 UART: [art] PUB.X = 47E9CF91D57DC13841AAF474393D89F2A322B9621A280DB61DF5898E232F6E9B0E738383BCA0FD7B57D41BA53D789691
5,734,645 UART: [art] PUB.Y = 7081C2C9931535389D6FE27E39B8D48C6C42EA5E10C1350A5FC3E76F4F197BEDC5CE02DA8DB5A121DCABAF75034F5CA7
5,741,604 UART: [art] SIG.R = D635AD6FAA20E8811D7CA7A615E8AFA97F5616303BAB0E02C5FB29891B0CD42696EAFA7F055896C6FE39E82BC3523D4B
5,748,378 UART: [art] SIG.S = E79B826A5F3C387B3527F12859CD769E8A5A580C23405D6BE93F3748E6D0F03569D24ED65870ADA92483602B591BE676
5,772,217 UART: Caliptra RT
5,772,560 UART: [state] CFI Enabled
5,892,775 UART: [rt] RT listening for mailbox commands...
5,893,445 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,016,513 UART: [rt]cmd =0x41544d4e, len=14344
8,397,474 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,352 ready_for_fw is high
1,362,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,369,224 >>> mbox cmd response: success
5,430,415 UART:
5,430,431 UART: Running Caliptra FMC ...
5,430,839 UART:
5,430,982 UART: [state] CFI Enabled
5,441,616 UART: [fht] FMC Alias Private Key: 7
5,560,656 UART: [art] Extend RT PCRs Done
5,561,084 UART: [art] Lock RT PCRs Done
5,562,400 UART: [art] Populate DV Done
5,570,769 UART: [fht] FMC Alias Private Key: 7
5,571,799 UART: [art] Derive CDI
5,572,079 UART: [art] Store in slot 0x4
5,657,563 UART: [art] Derive Key Pair
5,657,923 UART: [art] Store priv key in slot 0x5
5,671,566 UART: [art] Derive Key Pair - Done
5,686,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,701,923 UART: [art] Erasing AUTHORITY.KEYID = 7
5,702,688 UART: [art] PUB.X = 422C6B4F60B95AB31094F1C6AAA5F612A6C8279349D0FFA8B2D8717C9F4077E9389709CE81FE096B65206EA02D906F0D
5,709,453 UART: [art] PUB.Y = 0E0C0121D843B29CC508FC47BF5A8B1B5F750A447AD5B57D0DA3339811F6BC013A5EAC0319B68FB0FFC91438F090D107
5,716,386 UART: [art] SIG.R = 80C80D8629DF09872AD45725114713C724C5A27C4C3B0147ADBF5BC0FEBD19881BFD637051D71C9FF6F2243C028C7B48
5,723,148 UART: [art] SIG.S = A0DDB0BBCF16C65EDE63145E4232D322E7EC2D3B7C6B6D28ECF42A8E7461A3EA7AC566BF2A831FC7A482958CB3AA8E92
5,747,672 UART: Caliptra RT
5,748,015 UART: [state] CFI Enabled
5,867,920 UART: [rt] RT listening for mailbox commands...
5,868,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,991,280 UART: [rt]cmd =0x41544d4e, len=14344
8,448,751 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.04s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,676 UART: [state] LifecycleState = Unprovisioned
86,331 UART: [state] DebugLocked = No
87,027 UART: [state] WD Timer not started. Device not locked for debugging
88,348 UART: [kat] SHA2-256
891,898 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,002 UART: [kat] ++
896,154 UART: [kat] sha1
900,360 UART: [kat] SHA2-256
902,300 UART: [kat] SHA2-384
905,079 UART: [kat] SHA2-512-ACC
906,980 UART: [kat] ECC-384
916,863 UART: [kat] HMAC-384Kdf
921,345 UART: [kat] LMS
1,169,657 UART: [kat] --
1,170,884 UART: [cold-reset] ++
1,171,320 UART: [fht] FHT @ 0x50003400
1,173,954 UART: [idev] ++
1,174,122 UART: [idev] CDI.KEYID = 6
1,174,483 UART: [idev] SUBJECT.KEYID = 7
1,174,908 UART: [idev] UDS.KEYID = 0
1,175,254 ready_for_fw is high
1,175,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,903 UART: [idev] Erasing UDS.KEYID = 0
1,200,459 UART: [idev] Sha1 KeyId Algorithm
1,209,505 UART: [idev] --
1,210,354 UART: [ldev] ++
1,210,522 UART: [ldev] CDI.KEYID = 6
1,210,886 UART: [ldev] SUBJECT.KEYID = 5
1,211,313 UART: [ldev] AUTHORITY.KEYID = 7
1,211,776 UART: [ldev] FE.KEYID = 1
1,217,222 UART: [ldev] Erasing FE.KEYID = 1
1,244,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,968 UART: [ldev] --
1,283,191 UART: [fwproc] Wait for Commands...
1,283,806 UART: [fwproc] Recv command 0x46574c44
1,284,539 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,190 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,365 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,367,714 >>> mbox cmd response: success
3,368,728 UART: [afmc] ++
3,368,896 UART: [afmc] CDI.KEYID = 6
3,369,259 UART: [afmc] SUBJECT.KEYID = 7
3,369,685 UART: [afmc] AUTHORITY.KEYID = 5
3,404,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,421,772 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,427,479 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,356 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,066 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,446,864 UART: [afmc] --
3,447,767 UART: [cold-reset] --
3,448,461 UART: [state] Locking Datavault
3,449,452 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,056 UART: [state] Locking ICCM
3,450,492 UART: [exit] Launching FMC @ 0x40000130
3,455,822 UART:
3,455,838 UART: Running Caliptra FMC ...
3,456,246 UART:
3,456,300 UART: [state] CFI Enabled
3,467,036 UART: [fht] FMC Alias Private Key: 7
3,586,848 UART: [art] Extend RT PCRs Done
3,587,276 UART: [art] Lock RT PCRs Done
3,588,796 UART: [art] Populate DV Done
3,596,815 UART: [fht] FMC Alias Private Key: 7
3,597,905 UART: [art] Derive CDI
3,598,185 UART: [art] Store in slot 0x4
3,684,316 UART: [art] Derive Key Pair
3,684,676 UART: [art] Store priv key in slot 0x5
3,698,378 UART: [art] Derive Key Pair - Done
3,713,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,470 UART: [art] PUB.X = D81A992381675765150AFB56975FDABA3A17AF504E55F86E2A0E66EBD11A41E1FD0A229959CB8CC0279390BCD0AFBD7A
3,736,245 UART: [art] PUB.Y = 37FA6685E20B73797FD01822CC0282751F3B09EB51D1CFEE54E96F4690CBE6941CED8DE2004C7448A8B4F008629E548D
3,743,165 UART: [art] SIG.R = B2A3D82665DBDB0869BF40AAAFDD843A7F08F83FB653C99A479726BA189C9F093E3E26BB476FB81427FE6CCFC622E82F
3,749,944 UART: [art] SIG.S = CD1DA6303C507FB803EB066AFE6170C9C5AB2C56A55E6A22593345DA2F53E26C99AC4C2B8ECAA990A181E4AD2E78B5B2
3,773,258 UART: Caliptra RT
3,773,509 UART: [state] CFI Enabled
3,892,882 UART: [rt] RT listening for mailbox commands...
3,893,552 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,376 UART: [rt]cmd =0x41544d4e, len=14344
4,590,987 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,618 ready_for_fw is high
1,058,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,621 >>> mbox cmd response: success
3,279,542 UART:
3,279,558 UART: Running Caliptra FMC ...
3,279,966 UART:
3,280,020 UART: [state] CFI Enabled
3,290,594 UART: [fht] FMC Alias Private Key: 7
3,409,542 UART: [art] Extend RT PCRs Done
3,409,970 UART: [art] Lock RT PCRs Done
3,411,576 UART: [art] Populate DV Done
3,419,801 UART: [fht] FMC Alias Private Key: 7
3,420,775 UART: [art] Derive CDI
3,421,055 UART: [art] Store in slot 0x4
3,506,846 UART: [art] Derive Key Pair
3,507,206 UART: [art] Store priv key in slot 0x5
3,520,730 UART: [art] Derive Key Pair - Done
3,535,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,659 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,424 UART: [art] PUB.X = 104FBE64024109B23089FDC5E526E40914564761FD0C984FE9CB6CBADDA3896249747B5174A95A54155B658EB368F609
3,558,175 UART: [art] PUB.Y = DB7714F83261479EAA5C40B916D997763681D6A04B5CB285D69AD0676DB304978560240D4B42FF827BC07F01E328F5C9
3,565,112 UART: [art] SIG.R = FFC1B6B265D190A41D083D98ED53B32D576CE4DD70728CDC7E8B65DDB54505B0E510ED86A01828C99D1DE21A946093D1
3,571,886 UART: [art] SIG.S = D46B50BAA47ECECCBFABAA97A3B69BB0EB71EF653A8EE7B53CFEB76D5B85ACD58177045F233923C9576F9E31E55BAEBF
3,595,009 UART: Caliptra RT
3,595,260 UART: [state] CFI Enabled
3,715,139 UART: [rt] RT listening for mailbox commands...
3,715,809 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,771 UART: [rt]cmd =0x41544d4e, len=14344
4,420,943 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,272 UART: [state] WD Timer not started. Device not locked for debugging
87,451 UART: [kat] SHA2-256
891,001 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,105 UART: [kat] ++
895,257 UART: [kat] sha1
899,635 UART: [kat] SHA2-256
901,575 UART: [kat] SHA2-384
904,204 UART: [kat] SHA2-512-ACC
906,105 UART: [kat] ECC-384
916,226 UART: [kat] HMAC-384Kdf
920,876 UART: [kat] LMS
1,169,188 UART: [kat] --
1,169,975 UART: [cold-reset] ++
1,170,319 UART: [fht] FHT @ 0x50003400
1,172,813 UART: [idev] ++
1,172,981 UART: [idev] CDI.KEYID = 6
1,173,342 UART: [idev] SUBJECT.KEYID = 7
1,173,767 UART: [idev] UDS.KEYID = 0
1,174,113 ready_for_fw is high
1,174,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,712 UART: [idev] Erasing UDS.KEYID = 0
1,198,894 UART: [idev] Sha1 KeyId Algorithm
1,207,832 UART: [idev] --
1,208,901 UART: [ldev] ++
1,209,069 UART: [ldev] CDI.KEYID = 6
1,209,433 UART: [ldev] SUBJECT.KEYID = 5
1,209,860 UART: [ldev] AUTHORITY.KEYID = 7
1,210,323 UART: [ldev] FE.KEYID = 1
1,215,653 UART: [ldev] Erasing FE.KEYID = 1
1,242,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,401 UART: [ldev] --
1,281,706 UART: [fwproc] Wait for Commands...
1,282,311 UART: [fwproc] Recv command 0x46574c44
1,283,044 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,284 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,459 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,377,826 >>> mbox cmd response: success
3,378,986 UART: [afmc] ++
3,379,154 UART: [afmc] CDI.KEYID = 6
3,379,517 UART: [afmc] SUBJECT.KEYID = 7
3,379,943 UART: [afmc] AUTHORITY.KEYID = 5
3,415,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,342 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,049 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,443,926 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,449,636 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,457,496 UART: [afmc] --
3,458,523 UART: [cold-reset] --
3,459,561 UART: [state] Locking Datavault
3,460,384 UART: [state] Locking PCR0, PCR1 and PCR31
3,460,988 UART: [state] Locking ICCM
3,461,536 UART: [exit] Launching FMC @ 0x40000130
3,466,866 UART:
3,466,882 UART: Running Caliptra FMC ...
3,467,290 UART:
3,467,433 UART: [state] CFI Enabled
3,478,149 UART: [fht] FMC Alias Private Key: 7
3,597,129 UART: [art] Extend RT PCRs Done
3,597,557 UART: [art] Lock RT PCRs Done
3,599,335 UART: [art] Populate DV Done
3,607,662 UART: [fht] FMC Alias Private Key: 7
3,608,702 UART: [art] Derive CDI
3,608,982 UART: [art] Store in slot 0x4
3,694,945 UART: [art] Derive Key Pair
3,695,305 UART: [art] Store priv key in slot 0x5
3,708,629 UART: [art] Derive Key Pair - Done
3,723,275 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,706 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,471 UART: [art] PUB.X = 02ED289D4497A46FC526B46E46F9CC0EC7610F25001E024A35E44ABD117F9C555963EBB5EFEE0523EC63C1715D111793
3,746,208 UART: [art] PUB.Y = 1D5BEA19867042DBA2502E570AC7CFE75FFA010D331C59D667BFFF85C8B0F2AD7B72CF8208C2CBC54A905EADB16CF19A
3,753,170 UART: [art] SIG.R = CC48CD177CBF3C64F92B4B6C5100FFE89AC1CDCC958D4BDACDE285DA7E2FF9B69564BB22B0E19A09375024AD27D7BEE8
3,759,943 UART: [art] SIG.S = 4B20E05ED66DAFB6999B34A82D05A70142D8C7BF5D9421C4A7502C495CE6FEDF65ECABB6B59D8E2BE47088989F694EE4
3,783,551 UART: Caliptra RT
3,783,894 UART: [state] CFI Enabled
3,903,870 UART: [rt] RT listening for mailbox commands...
3,904,540 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,600 UART: [rt]cmd =0x41544d4e, len=14344
4,607,379 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,361 ready_for_fw is high
1,060,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,646 >>> mbox cmd response: success
3,286,449 UART:
3,286,465 UART: Running Caliptra FMC ...
3,286,873 UART:
3,287,016 UART: [state] CFI Enabled
3,298,132 UART: [fht] FMC Alias Private Key: 7
3,416,842 UART: [art] Extend RT PCRs Done
3,417,270 UART: [art] Lock RT PCRs Done
3,418,724 UART: [art] Populate DV Done
3,426,953 UART: [fht] FMC Alias Private Key: 7
3,427,973 UART: [art] Derive CDI
3,428,253 UART: [art] Store in slot 0x4
3,514,098 UART: [art] Derive Key Pair
3,514,458 UART: [art] Store priv key in slot 0x5
3,528,280 UART: [art] Derive Key Pair - Done
3,543,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,471 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,236 UART: [art] PUB.X = 1B586C72DC6F984692A74E2C717ADCC71E3589C02E9CFEA6B4FBFC26BBE09FE0E9C55BF27A02366EC95E6C3EE64A0B32
3,566,022 UART: [art] PUB.Y = 6511C843B731A9E7D94423E4340A451F103DA5B2150248EB29B4CD707E998A0410503F72085A0C4CEB11682D57E3BCC4
3,572,953 UART: [art] SIG.R = AA55739391F4230CA33F743C7C6A4F88E856DC92D6F52332DE028160F221ED92A3F9AB5D0351203CBBE99A5B2C742C1F
3,579,720 UART: [art] SIG.S = 71DFA489AE8FD04BA9C1EB13276B0BFEF743A91315AC7DB96F8317FFB14705905EC294B956F830A22084DE25EC02332F
3,603,469 UART: Caliptra RT
3,603,812 UART: [state] CFI Enabled
3,723,086 UART: [rt] RT listening for mailbox commands...
3,723,756 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,854 UART: [rt]cmd =0x41544d4e, len=14344
4,431,257 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
893,070 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,195 UART: [kat] ++
897,347 UART: [kat] sha1
901,471 UART: [kat] SHA2-256
903,411 UART: [kat] SHA2-384
906,334 UART: [kat] SHA2-512-ACC
908,235 UART: [kat] ECC-384
917,802 UART: [kat] HMAC-384Kdf
922,500 UART: [kat] LMS
1,170,828 UART: [kat] --
1,171,739 UART: [cold-reset] ++
1,172,233 UART: [fht] FHT @ 0x50003400
1,174,936 UART: [idev] ++
1,175,104 UART: [idev] CDI.KEYID = 6
1,175,464 UART: [idev] SUBJECT.KEYID = 7
1,175,888 UART: [idev] UDS.KEYID = 0
1,176,233 ready_for_fw is high
1,176,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,852 UART: [idev] Erasing UDS.KEYID = 0
1,201,027 UART: [idev] Sha1 KeyId Algorithm
1,209,535 UART: [idev] --
1,210,591 UART: [ldev] ++
1,210,759 UART: [ldev] CDI.KEYID = 6
1,211,122 UART: [ldev] SUBJECT.KEYID = 5
1,211,548 UART: [ldev] AUTHORITY.KEYID = 7
1,212,011 UART: [ldev] FE.KEYID = 1
1,217,157 UART: [ldev] Erasing FE.KEYID = 1
1,243,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,919 UART: [ldev] --
1,282,260 UART: [fwproc] Wait for Commands...
1,282,918 UART: [fwproc] Recv command 0x46574c44
1,283,646 UART: [fwproc] Recv'd Img size: 118548 bytes
3,177,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,205,120 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,290 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,465 >>> mbox cmd response: success
3,377,507 UART: [afmc] ++
3,377,675 UART: [afmc] CDI.KEYID = 6
3,378,037 UART: [afmc] SUBJECT.KEYID = 7
3,378,462 UART: [afmc] AUTHORITY.KEYID = 5
3,413,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,430,346 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,052 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,931 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,447,641 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,514 UART: [afmc] --
3,456,468 UART: [cold-reset] --
3,457,132 UART: [state] Locking Datavault
3,458,407 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,011 UART: [state] Locking ICCM
3,459,525 UART: [exit] Launching FMC @ 0x40000130
3,464,855 UART:
3,464,871 UART: Running Caliptra FMC ...
3,465,279 UART:
3,465,333 UART: [state] CFI Enabled
3,475,563 UART: [fht] FMC Alias Private Key: 7
3,595,163 UART: [art] Extend RT PCRs Done
3,595,591 UART: [art] Lock RT PCRs Done
3,597,055 UART: [art] Populate DV Done
3,605,530 UART: [fht] FMC Alias Private Key: 7
3,606,518 UART: [art] Derive CDI
3,606,798 UART: [art] Store in slot 0x4
3,692,609 UART: [art] Derive Key Pair
3,692,969 UART: [art] Store priv key in slot 0x5
3,706,041 UART: [art] Derive Key Pair - Done
3,721,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,736,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,374 UART: [art] PUB.X = C77B559042DB31340537FBA17045DC6FDE9D7C9A7754DE5279C0B516B3698EA9A094D293F2A7C6AF99D5E658BDF1B600
3,744,127 UART: [art] PUB.Y = 065B6475F674F98E95C82CC7F8F73A39EB56093678AE41AA7E91C20E607821E3D589E5BA5B562E3F2436B9A95F718921
3,751,066 UART: [art] SIG.R = BBC622B7D914101AC6D76303C0341B16CF9032899C47F99C802D96E65809E9186559294849B3439C0BD830FCA356C68E
3,757,819 UART: [art] SIG.S = AE9F4754EFDC74ED17CC84C1D8342938E967CEE5B17048689525721F589A52482D85BFD00722A67D2394ED85AF8960EE
3,781,828 UART: Caliptra RT
3,782,079 UART: [state] CFI Enabled
3,902,060 UART: [rt] RT listening for mailbox commands...
3,902,730 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,512 UART: [rt]cmd =0x41544d4e, len=14344
4,613,076 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,875 ready_for_fw is high
1,059,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,211,979 >>> mbox cmd response: success
3,273,092 UART:
3,273,108 UART: Running Caliptra FMC ...
3,273,516 UART:
3,273,570 UART: [state] CFI Enabled
3,283,798 UART: [fht] FMC Alias Private Key: 7
3,402,700 UART: [art] Extend RT PCRs Done
3,403,128 UART: [art] Lock RT PCRs Done
3,404,604 UART: [art] Populate DV Done
3,413,069 UART: [fht] FMC Alias Private Key: 7
3,414,207 UART: [art] Derive CDI
3,414,487 UART: [art] Store in slot 0x4
3,500,306 UART: [art] Derive Key Pair
3,500,666 UART: [art] Store priv key in slot 0x5
3,513,584 UART: [art] Derive Key Pair - Done
3,528,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,543,910 UART: [art] Erasing AUTHORITY.KEYID = 7
3,544,675 UART: [art] PUB.X = F31D4111D07162BD8EE5535C12A4F8EBDB304A926AF44D0E3B3A4F21803CD08F844F39B77A292025087C236628833FD9
3,551,439 UART: [art] PUB.Y = 7BBC918CAFE9240402C4B993DECAE7B6708F6A418F0674A76E4DC33746961C4857EE4473262A98B433E29FB2DAEFB454
3,558,388 UART: [art] SIG.R = 12BACF46D44542346FB2A0592D92D05FC9F92D1544A12DE265DB64DDC13BF15069519ECBC287081A33DE1D36290B9674
3,565,156 UART: [art] SIG.S = 50B755B9F9FAF5E5F63D77038BE086D5EA97CC636499E77E19E13188C7AB287307A342509BD30E67F37BCA2151FE82DC
3,588,807 UART: Caliptra RT
3,589,058 UART: [state] CFI Enabled
3,709,328 UART: [rt] RT listening for mailbox commands...
3,709,998 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,833,162 UART: [rt]cmd =0x41544d4e, len=14344
4,423,375 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,485 UART: [kat] SHA2-256
893,135 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,260 UART: [kat] ++
897,412 UART: [kat] sha1
901,450 UART: [kat] SHA2-256
903,390 UART: [kat] SHA2-384
906,065 UART: [kat] SHA2-512-ACC
907,966 UART: [kat] ECC-384
917,615 UART: [kat] HMAC-384Kdf
922,237 UART: [kat] LMS
1,170,565 UART: [kat] --
1,171,388 UART: [cold-reset] ++
1,171,774 UART: [fht] FHT @ 0x50003400
1,174,581 UART: [idev] ++
1,174,749 UART: [idev] CDI.KEYID = 6
1,175,109 UART: [idev] SUBJECT.KEYID = 7
1,175,533 UART: [idev] UDS.KEYID = 0
1,175,878 ready_for_fw is high
1,175,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,449 UART: [idev] Erasing UDS.KEYID = 0
1,200,500 UART: [idev] Sha1 KeyId Algorithm
1,208,866 UART: [idev] --
1,210,020 UART: [ldev] ++
1,210,188 UART: [ldev] CDI.KEYID = 6
1,210,551 UART: [ldev] SUBJECT.KEYID = 5
1,210,977 UART: [ldev] AUTHORITY.KEYID = 7
1,211,440 UART: [ldev] FE.KEYID = 1
1,216,736 UART: [ldev] Erasing FE.KEYID = 1
1,242,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,982 UART: [ldev] --
1,282,385 UART: [fwproc] Wait for Commands...
1,283,013 UART: [fwproc] Recv command 0x46574c44
1,283,741 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,513 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,683 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,926 >>> mbox cmd response: success
3,372,012 UART: [afmc] ++
3,372,180 UART: [afmc] CDI.KEYID = 6
3,372,542 UART: [afmc] SUBJECT.KEYID = 7
3,372,967 UART: [afmc] AUTHORITY.KEYID = 5
3,409,546 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,127 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,833 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,438,712 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,422 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,139 UART: [afmc] --
3,453,085 UART: [cold-reset] --
3,453,727 UART: [state] Locking Datavault
3,454,968 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,572 UART: [state] Locking ICCM
3,456,076 UART: [exit] Launching FMC @ 0x40000130
3,461,406 UART:
3,461,422 UART: Running Caliptra FMC ...
3,461,830 UART:
3,461,973 UART: [state] CFI Enabled
3,472,655 UART: [fht] FMC Alias Private Key: 7
3,591,391 UART: [art] Extend RT PCRs Done
3,591,819 UART: [art] Lock RT PCRs Done
3,593,061 UART: [art] Populate DV Done
3,601,194 UART: [fht] FMC Alias Private Key: 7
3,602,164 UART: [art] Derive CDI
3,602,444 UART: [art] Store in slot 0x4
3,688,003 UART: [art] Derive Key Pair
3,688,363 UART: [art] Store priv key in slot 0x5
3,701,293 UART: [art] Derive Key Pair - Done
3,715,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,120 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,885 UART: [art] PUB.X = 5604D2836ADAEF6048827D8B5CA446FA5822A4743FF198E3BDEBF8A68182AFBC04A6A03AD02A5FA6479AE0BB0512C828
3,738,660 UART: [art] PUB.Y = 1611280ABE0BE5A5E219FA39266C940D0B9C2D53EDAB9F018C1534574A40CE7EE8C0BA927A2934F4FBDC8FBF43F0E9F6
3,745,613 UART: [art] SIG.R = A441C8721717077A5953FF4C470E55220E727551D2F5561856A47F984341B5F29E11BAEC633631BF42EE86800C6AA141
3,752,361 UART: [art] SIG.S = 1AE28207B0EF35213CCEA576A2C8924BEE9E7C23F913031C74951957C28AFD0FC88897E6ECF3ED57AB9C3B3123B6312D
3,776,494 UART: Caliptra RT
3,776,837 UART: [state] CFI Enabled
3,895,943 UART: [rt] RT listening for mailbox commands...
3,896,613 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,575 UART: [rt]cmd =0x41544d4e, len=14344
4,607,079 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,018 ready_for_fw is high
1,061,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,024 >>> mbox cmd response: success
3,279,109 UART:
3,279,125 UART: Running Caliptra FMC ...
3,279,533 UART:
3,279,676 UART: [state] CFI Enabled
3,290,652 UART: [fht] FMC Alias Private Key: 7
3,409,766 UART: [art] Extend RT PCRs Done
3,410,194 UART: [art] Lock RT PCRs Done
3,411,720 UART: [art] Populate DV Done
3,419,909 UART: [fht] FMC Alias Private Key: 7
3,421,087 UART: [art] Derive CDI
3,421,367 UART: [art] Store in slot 0x4
3,507,020 UART: [art] Derive Key Pair
3,507,380 UART: [art] Store priv key in slot 0x5
3,520,386 UART: [art] Derive Key Pair - Done
3,534,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,349 UART: [art] PUB.X = BFF95B0BADADD5E7D7D6C08B2371ED344772C3C41D125285DB1BCAF5EF99798768473D8FD6BFDE2A5449C8D6CDBC3B1A
3,558,142 UART: [art] PUB.Y = 6286D30DCF73BFDC06A00F524D829DA2D72740B5A9573377C95A928DBD645344FEB7E6E8AA3888C1248330CE8E95AFB9
3,565,091 UART: [art] SIG.R = C404B9A7883F9057AE590A5053E948DC9F8EE9389362A0068CD61E5A98F5D516CE80E37C6353192C41EF76253C9F302C
3,571,850 UART: [art] SIG.S = 297E843E338E215A886EF7F08754EF75361D71A9A5D0573E29AE08419C97A02942917F65D550452E0F237F44DEB35F48
3,595,766 UART: Caliptra RT
3,596,109 UART: [state] CFI Enabled
3,715,599 UART: [rt] RT listening for mailbox commands...
3,716,269 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,327 UART: [rt]cmd =0x41544d4e, len=14344
4,429,470 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
191,965 UART:
192,317 UART: Running Caliptra ROM ...
193,461 UART:
193,627 UART: [state] CFI Enabled
266,426 UART: [state] LifecycleState = Unprovisioned
268,342 UART: [state] DebugLocked = No
270,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,095 UART: [kat] SHA2-256
445,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,304 UART: [kat] ++
456,759 UART: [kat] sha1
468,272 UART: [kat] SHA2-256
470,999 UART: [kat] SHA2-384
476,066 UART: [kat] SHA2-512-ACC
478,376 UART: [kat] ECC-384
2,768,881 UART: [kat] HMAC-384Kdf
2,799,720 UART: [kat] LMS
3,990,035 UART: [kat] --
3,995,201 UART: [cold-reset] ++
3,996,660 UART: [fht] Storing FHT @ 0x50003400
4,007,711 UART: [idev] ++
4,008,282 UART: [idev] CDI.KEYID = 6
4,009,277 UART: [idev] SUBJECT.KEYID = 7
4,010,398 UART: [idev] UDS.KEYID = 0
4,011,506 ready_for_fw is high
4,011,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,881 UART: [idev] Erasing UDS.KEYID = 0
7,347,484 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,352 UART: [idev] --
7,372,591 UART: [ldev] ++
7,373,159 UART: [ldev] CDI.KEYID = 6
7,374,128 UART: [ldev] SUBJECT.KEYID = 5
7,375,348 UART: [ldev] AUTHORITY.KEYID = 7
7,376,635 UART: [ldev] FE.KEYID = 1
7,420,860 UART: [ldev] Erasing FE.KEYID = 1
10,755,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,711 UART: [ldev] --
13,135,629 UART: [fwproc] Waiting for Commands...
13,138,422 UART: [fwproc] Received command 0x46574c44
13,140,603 UART: [fwproc] Received Image of size 118548 bytes
22,303,620 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,381,310 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,454,439 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,783,157 >>> mbox cmd response: success
22,788,120 UART: [afmc] ++
22,788,738 UART: [afmc] CDI.KEYID = 6
22,789,653 UART: [afmc] SUBJECT.KEYID = 7
22,790,893 UART: [afmc] AUTHORITY.KEYID = 5
26,162,413 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,462,679 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,464,937 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,479,447 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,494,203 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,508,570 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,530,695 UART: [afmc] --
28,534,514 UART: [cold-reset] --
28,536,861 UART: [state] Locking Datavault
28,541,030 UART: [state] Locking PCR0, PCR1 and PCR31
28,542,731 UART: [state] Locking ICCM
28,544,449 UART: [exit] Launching FMC @ 0x40000130
28,552,847 UART:
28,553,076 UART: Running Caliptra FMC ...
28,554,184 UART:
28,554,370 UART: [state] CFI Enabled
28,621,928 UART: [fht] FMC Alias Private Key: 7
30,982,961 UART: [art] Extend RT PCRs Done
30,984,183 UART: [art] Lock RT PCRs Done
30,985,760 UART: [art] Populate DV Done
30,991,384 UART: [fht] FMC Alias Private Key: 7
30,993,041 UART: [art] Derive CDI
30,993,861 UART: [art] Store in slot 0x4
31,051,066 UART: [art] Derive Key Pair
31,052,113 UART: [art] Store priv key in slot 0x5
34,345,467 UART: [art] Derive Key Pair - Done
34,358,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,647,051 UART: [art] Erasing AUTHORITY.KEYID = 7
36,648,561 UART: [art] PUB.X = 0D0218BCE7AC82A6F7956397DDB7E83E20454E8A7E8BCD07B8C4CAC850F0EF54A88AA6994DCB14F0665531FA5EC91A60
36,655,835 UART: [art] PUB.Y = EAB669FAFD516DF3B85E42B6A92F507AEFF9597F78D33262E4900777296C841EF86F35DBFDDD9B04606E150258DAC730
36,663,092 UART: [art] SIG.R = A5947237BDEA755BFA94153468FEDC3B652409A0EB307911D0E397FB2542A2B1B819199BF7480409D0533C4E5DCEF7EE
36,670,484 UART: [art] SIG.S = CCEB5C44238B90221934174BC3C09097C6527EE3596874639CAADC53C0C96D335075779918335B3815CDBABD5936C5BD
37,976,312 UART: Caliptra RT
37,977,005 UART: [state] CFI Enabled
38,172,555 UART: [rt] RT listening for mailbox commands...
38,174,867 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,330,077 UART: [rt]cmd =0x41544d4e, len=14344
40,366,741 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,803,398 ready_for_fw is high
3,803,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,491,188 >>> mbox cmd response: success
28,172,630 UART:
28,173,057 UART: Running Caliptra FMC ...
28,174,180 UART:
28,174,333 UART: [state] CFI Enabled
28,240,801 UART: [fht] FMC Alias Private Key: 7
30,602,165 UART: [art] Extend RT PCRs Done
30,603,398 UART: [art] Lock RT PCRs Done
30,604,854 UART: [art] Populate DV Done
30,610,216 UART: [fht] FMC Alias Private Key: 7
30,611,873 UART: [art] Derive CDI
30,612,688 UART: [art] Store in slot 0x4
30,670,033 UART: [art] Derive Key Pair
30,671,076 UART: [art] Store priv key in slot 0x5
33,963,587 UART: [art] Derive Key Pair - Done
33,976,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,265,093 UART: [art] Erasing AUTHORITY.KEYID = 7
36,266,614 UART: [art] PUB.X = C4038029782708E7FBCD345E8ACFFC36CBD99A4D423B110827322BD0F0EB6DCAF0084D4B45936D3D43F70EBC9E65C043
36,273,886 UART: [art] PUB.Y = A4498B7C47A6F52CEED4762C466E1F590F5D0F6BB734624E8CE7DD592C7276849C5C46F8D3EFECB0708B7BAB05AEC604
36,281,180 UART: [art] SIG.R = BEAB8C9284AC5CFEAD2074E5D246DC11F2918630E5F94239A3FED91AE350FD30558E5C61A452CF83FADD9A6EA9F7DEE5
36,288,580 UART: [art] SIG.S = 942C8449F907B766244E9447EC99B81AEE27DBE80E9F7D7DCFA80A34EF58EBC4310BAEFBE6ACD24668D7119CA87434DD
37,593,565 UART: Caliptra RT
37,594,283 UART: [state] CFI Enabled
37,771,989 UART: [rt] RT listening for mailbox commands...
37,774,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,929,660 UART: [rt]cmd =0x41544d4e, len=14344
40,017,951 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,523 UART:
192,882 UART: Running Caliptra ROM ...
194,089 UART:
603,812 UART: [state] CFI Enabled
616,774 UART: [state] LifecycleState = Unprovisioned
618,723 UART: [state] DebugLocked = No
620,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,056 UART: [kat] SHA2-256
794,643 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,185 UART: [kat] ++
805,663 UART: [kat] sha1
817,680 UART: [kat] SHA2-256
820,394 UART: [kat] SHA2-384
826,092 UART: [kat] SHA2-512-ACC
828,462 UART: [kat] ECC-384
3,111,075 UART: [kat] HMAC-384Kdf
3,123,033 UART: [kat] LMS
4,313,167 UART: [kat] --
4,317,123 UART: [cold-reset] ++
4,319,617 UART: [fht] Storing FHT @ 0x50003400
4,331,019 UART: [idev] ++
4,331,584 UART: [idev] CDI.KEYID = 6
4,332,529 UART: [idev] SUBJECT.KEYID = 7
4,333,762 UART: [idev] UDS.KEYID = 0
4,334,738 ready_for_fw is high
4,334,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,766 UART: [idev] Erasing UDS.KEYID = 0
7,618,851 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,605 UART: [idev] --
7,643,350 UART: [ldev] ++
7,643,916 UART: [ldev] CDI.KEYID = 6
7,644,849 UART: [ldev] SUBJECT.KEYID = 5
7,645,973 UART: [ldev] AUTHORITY.KEYID = 7
7,647,351 UART: [ldev] FE.KEYID = 1
7,657,981 UART: [ldev] Erasing FE.KEYID = 1
10,943,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,795 UART: [ldev] --
13,303,350 UART: [fwproc] Waiting for Commands...
13,305,877 UART: [fwproc] Received command 0x46574c44
13,308,107 UART: [fwproc] Received Image of size 118548 bytes
22,477,254 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,561,109 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,634,313 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,962,787 >>> mbox cmd response: success
22,967,265 UART: [afmc] ++
22,967,873 UART: [afmc] CDI.KEYID = 6
22,968,804 UART: [afmc] SUBJECT.KEYID = 7
22,970,030 UART: [afmc] AUTHORITY.KEYID = 5
26,285,243 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,579,383 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,581,648 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,596,143 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,610,933 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,625,434 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,647,259 UART: [afmc] --
28,651,391 UART: [cold-reset] --
28,655,249 UART: [state] Locking Datavault
28,660,703 UART: [state] Locking PCR0, PCR1 and PCR31
28,662,451 UART: [state] Locking ICCM
28,663,979 UART: [exit] Launching FMC @ 0x40000130
28,672,366 UART:
28,672,594 UART: Running Caliptra FMC ...
28,673,708 UART:
28,673,861 UART: [state] CFI Enabled
28,681,903 UART: [fht] FMC Alias Private Key: 7
31,022,549 UART: [art] Extend RT PCRs Done
31,023,775 UART: [art] Lock RT PCRs Done
31,025,300 UART: [art] Populate DV Done
31,030,979 UART: [fht] FMC Alias Private Key: 7
31,032,682 UART: [art] Derive CDI
31,033,418 UART: [art] Store in slot 0x4
31,076,165 UART: [art] Derive Key Pair
31,077,163 UART: [art] Store priv key in slot 0x5
34,319,755 UART: [art] Derive Key Pair - Done
34,332,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,612,772 UART: [art] Erasing AUTHORITY.KEYID = 7
36,614,278 UART: [art] PUB.X = 4C357A45841A1A9209CD9F2D5FF61678865D2066E27E16FD9DB0394DA7F470AF220EB2A8FD04F668F9B86B18D04C2390
36,621,525 UART: [art] PUB.Y = D6D83ADB5DD8471F1BED8AA7A4EFA5437A9F860B1238CDD0DDB662F7BC6A3AE6F54C2D6FCA3DC2827C0480ABB2AB8603
36,628,866 UART: [art] SIG.R = 4771424A739FF743FFCF79514FEEF6DAB79F899FF973B7F7ECEE212827F7509F9FA61AD842F70D839C658BC21BE69C55
36,636,277 UART: [art] SIG.S = 71B2875D0A18755EB1FC45CA4886FDF2E874D80EC1C2C88DDBCCBE3C7CFDB7113D7534D0D02FDDF6F46F30E8AB201CFB
37,941,832 UART: Caliptra RT
37,942,521 UART: [state] CFI Enabled
38,076,599 UART: [rt] RT listening for mailbox commands...
38,078,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,234,245 UART: [rt]cmd =0x41544d4e, len=14344
40,270,730 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
4,128,454 ready_for_fw is high
4,129,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,994,309 >>> mbox cmd response: success
27,633,951 UART:
27,634,345 UART: Running Caliptra FMC ...
27,635,461 UART:
27,635,614 UART: [state] CFI Enabled
27,643,398 UART: [fht] FMC Alias Private Key: 7
29,983,040 UART: [art] Extend RT PCRs Done
29,984,271 UART: [art] Lock RT PCRs Done
29,985,492 UART: [art] Populate DV Done
29,990,748 UART: [fht] FMC Alias Private Key: 7
29,992,338 UART: [art] Derive CDI
29,993,074 UART: [art] Store in slot 0x4
30,036,048 UART: [art] Derive Key Pair
30,037,049 UART: [art] Store priv key in slot 0x5
33,279,155 UART: [art] Derive Key Pair - Done
33,291,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,571,920 UART: [art] Erasing AUTHORITY.KEYID = 7
35,573,425 UART: [art] PUB.X = 36F892FC2E157A480DDF9EE158A54CC6FBB3B097489EA4A5AFCD952919D575827B10C94CEB767313CD388BFB2DAAB939
35,580,724 UART: [art] PUB.Y = F97729BAD0A203E5B9D7E6AB4AB90C5553C066814A4A7E1354A9BA0C99DB3CDC660890FC9DD308D521A5A1083BE44C69
35,588,012 UART: [art] SIG.R = DAB97216BA112F673968289C2ED97F23C9EC2364B81B173A46648025B14CBD091049906538ABA99A460405730B257614
35,595,362 UART: [art] SIG.S = 8974BE95AEBAE9DB776C2F90E868D559757815173F29E416B23B3A414D896C3A8AB8E943EAAB25B8A7CA773F06ABBE48
36,900,326 UART: Caliptra RT
36,901,052 UART: [state] CFI Enabled
37,034,666 UART: [rt] RT listening for mailbox commands...
37,036,975 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,192,493 UART: [rt]cmd =0x41544d4e, len=14344
39,229,337 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,096 UART:
192,460 UART: Running Caliptra ROM ...
193,581 UART:
193,747 UART: [state] CFI Enabled
262,355 UART: [state] LifecycleState = Unprovisioned
264,277 UART: [state] DebugLocked = No
265,941 UART: [state] WD Timer not started. Device not locked for debugging
270,680 UART: [kat] SHA2-256
450,316 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,062 UART: [kat] ++
461,588 UART: [kat] sha1
472,971 UART: [kat] SHA2-256
475,684 UART: [kat] SHA2-384
480,901 UART: [kat] SHA2-512-ACC
483,266 UART: [kat] ECC-384
2,944,163 UART: [kat] HMAC-384Kdf
2,969,697 UART: [kat] LMS
3,446,193 UART: [kat] --
3,451,818 UART: [cold-reset] ++
3,453,912 UART: [fht] FHT @ 0x50003400
3,464,964 UART: [idev] ++
3,465,595 UART: [idev] CDI.KEYID = 6
3,466,503 UART: [idev] SUBJECT.KEYID = 7
3,467,749 UART: [idev] UDS.KEYID = 0
3,468,793 ready_for_fw is high
3,468,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,199 UART: [idev] Erasing UDS.KEYID = 0
5,985,824 UART: [idev] Sha1 KeyId Algorithm
6,009,243 UART: [idev] --
6,014,259 UART: [ldev] ++
6,014,842 UART: [ldev] CDI.KEYID = 6
6,015,756 UART: [ldev] SUBJECT.KEYID = 5
6,016,973 UART: [ldev] AUTHORITY.KEYID = 7
6,018,203 UART: [ldev] FE.KEYID = 1
6,057,093 UART: [ldev] Erasing FE.KEYID = 1
8,559,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,918 UART: [ldev] --
10,372,822 UART: [fwproc] Wait for Commands...
10,375,513 UART: [fwproc] Recv command 0x46574c44
10,377,545 UART: [fwproc] Recv'd Img size: 118548 bytes
14,907,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,987,454 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,060,428 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,389,285 >>> mbox cmd response: success
15,392,618 UART: [afmc] ++
15,393,207 UART: [afmc] CDI.KEYID = 6
15,394,222 UART: [afmc] SUBJECT.KEYID = 7
15,395,398 UART: [afmc] AUTHORITY.KEYID = 5
17,939,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,662,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,664,731 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,680,599 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,696,495 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,712,214 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,737,102 UART: [afmc] --
19,740,693 UART: [cold-reset] --
19,745,737 UART: [state] Locking Datavault
19,750,076 UART: [state] Locking PCR0, PCR1 and PCR31
19,751,875 UART: [state] Locking ICCM
19,754,118 UART: [exit] Launching FMC @ 0x40000130
19,762,566 UART:
19,762,800 UART: Running Caliptra FMC ...
19,763,895 UART:
19,764,071 UART: [state] CFI Enabled
19,820,909 UART: [fht] FMC Alias Private Key: 7
21,587,382 UART: [art] Extend RT PCRs Done
21,588,606 UART: [art] Lock RT PCRs Done
21,590,056 UART: [art] Populate DV Done
21,595,490 UART: [fht] FMC Alias Private Key: 7
21,597,140 UART: [art] Derive CDI
21,597,878 UART: [art] Store in slot 0x4
21,653,505 UART: [art] Derive Key Pair
21,654,503 UART: [art] Store priv key in slot 0x5
24,117,785 UART: [art] Derive Key Pair - Done
24,130,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,842,762 UART: [art] Erasing AUTHORITY.KEYID = 7
25,844,273 UART: [art] PUB.X = A2BECC21BF8B683FE2A420846AF6C70C6D0CADDC2B9EC6C2C3D25C8AF3738EC448E61BCDADBBDFC46362AD78B22EE9EE
25,851,591 UART: [art] PUB.Y = D20EF3F4CC0B9DF9E22F41B213E4B1229DF31E7B16DDD3DCC2F84B51B0848F923D53EB28BB1490B9CE451C7273D01C5F
25,858,886 UART: [art] SIG.R = DC2939803FAABB84658A7320359341A7E0C56ED3D684427676BB42C381E81D5E78ED2463056DDF5FF6985390620703D7
25,866,244 UART: [art] SIG.S = 8A5B27009FE66F05567B06A21F63C23FC1110CC9BFA7A160361CE870CD7BFA9619F43F04E6FF5C041D4BAF1109FA9E1F
26,845,301 UART: Caliptra RT
26,845,993 UART: [state] CFI Enabled
27,025,798 UART: [rt] RT listening for mailbox commands...
27,028,140 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,183,577 UART: [rt]cmd =0x41544d4e, len=14344
28,380,281 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,454,830 ready_for_fw is high
3,455,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,412,920 >>> mbox cmd response: success
19,709,628 UART:
19,710,011 UART: Running Caliptra FMC ...
19,711,125 UART:
19,711,277 UART: [state] CFI Enabled
19,776,148 UART: [fht] FMC Alias Private Key: 7
21,541,781 UART: [art] Extend RT PCRs Done
21,543,002 UART: [art] Lock RT PCRs Done
21,545,092 UART: [art] Populate DV Done
21,550,569 UART: [fht] FMC Alias Private Key: 7
21,552,066 UART: [art] Derive CDI
21,552,831 UART: [art] Store in slot 0x4
21,608,848 UART: [art] Derive Key Pair
21,609,906 UART: [art] Store priv key in slot 0x5
24,072,970 UART: [art] Derive Key Pair - Done
24,086,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,798,842 UART: [art] Erasing AUTHORITY.KEYID = 7
25,800,350 UART: [art] PUB.X = 8B99424A47A29E36B668A52BDBD6B94981DD56027489C9BFAE8D796A96AC230D573C28310AB082BFC7E50853CF44BB4E
25,807,601 UART: [art] PUB.Y = 1BBDFA31967C143062234970DA99E379CE7D1950A7C893FF9EB8AE4C7B25A20337414F05763A8891BEBE2977E5E8CC5D
25,814,896 UART: [art] SIG.R = 26225925D4FCF3C23CC93F3D4BD0A9E395559929FF18428F24CA08339C2674B75B08720C94D2A2A91EDB6A2E45B811FA
25,822,236 UART: [art] SIG.S = 8002BFC8F91141DFCB5C2A440091CB664DFC9CA0D32946FA0B28A58431A6EEE59C5754E8118FE666E94A439114FC97E4
26,801,800 UART: Caliptra RT
26,802,492 UART: [state] CFI Enabled
26,983,266 UART: [rt] RT listening for mailbox commands...
26,985,564 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,140,940 UART: [rt]cmd =0x41544d4e, len=14344
28,347,059 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,566 UART:
192,918 UART: Running Caliptra ROM ...
194,021 UART:
603,654 UART: [state] CFI Enabled
621,567 UART: [state] LifecycleState = Unprovisioned
623,515 UART: [state] DebugLocked = No
625,602 UART: [state] WD Timer not started. Device not locked for debugging
629,226 UART: [kat] SHA2-256
808,892 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,699 UART: [kat] ++
820,147 UART: [kat] sha1
830,825 UART: [kat] SHA2-256
833,511 UART: [kat] SHA2-384
840,358 UART: [kat] SHA2-512-ACC
842,665 UART: [kat] ECC-384
3,280,989 UART: [kat] HMAC-384Kdf
3,294,292 UART: [kat] LMS
3,770,794 UART: [kat] --
3,775,509 UART: [cold-reset] ++
3,777,582 UART: [fht] FHT @ 0x50003400
3,789,693 UART: [idev] ++
3,790,257 UART: [idev] CDI.KEYID = 6
3,791,337 UART: [idev] SUBJECT.KEYID = 7
3,792,475 UART: [idev] UDS.KEYID = 0
3,793,413 ready_for_fw is high
3,793,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,315 UART: [idev] Erasing UDS.KEYID = 0
6,271,514 UART: [idev] Sha1 KeyId Algorithm
6,295,065 UART: [idev] --
6,300,415 UART: [ldev] ++
6,300,990 UART: [ldev] CDI.KEYID = 6
6,302,054 UART: [ldev] SUBJECT.KEYID = 5
6,303,163 UART: [ldev] AUTHORITY.KEYID = 7
6,304,395 UART: [ldev] FE.KEYID = 1
6,315,529 UART: [ldev] Erasing FE.KEYID = 1
8,792,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,824 UART: [ldev] --
10,585,843 UART: [fwproc] Wait for Commands...
10,587,882 UART: [fwproc] Recv command 0x46574c44
10,589,916 UART: [fwproc] Recv'd Img size: 118548 bytes
15,128,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,202,381 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,275,445 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,603,051 >>> mbox cmd response: success
15,607,085 UART: [afmc] ++
15,607,701 UART: [afmc] CDI.KEYID = 6
15,608,589 UART: [afmc] SUBJECT.KEYID = 7
15,609,866 UART: [afmc] AUTHORITY.KEYID = 5
18,112,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,836,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,838,270 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,854,178 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,870,101 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,885,794 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,910,136 UART: [afmc] --
19,914,331 UART: [cold-reset] --
19,918,734 UART: [state] Locking Datavault
19,923,768 UART: [state] Locking PCR0, PCR1 and PCR31
19,925,472 UART: [state] Locking ICCM
19,927,735 UART: [exit] Launching FMC @ 0x40000130
19,936,135 UART:
19,936,373 UART: Running Caliptra FMC ...
19,937,479 UART:
19,937,637 UART: [state] CFI Enabled
19,945,738 UART: [fht] FMC Alias Private Key: 7
21,711,883 UART: [art] Extend RT PCRs Done
21,713,125 UART: [art] Lock RT PCRs Done
21,714,876 UART: [art] Populate DV Done
21,720,402 UART: [fht] FMC Alias Private Key: 7
21,721,887 UART: [art] Derive CDI
21,722,653 UART: [art] Store in slot 0x4
21,765,393 UART: [art] Derive Key Pair
21,766,392 UART: [art] Store priv key in slot 0x5
24,193,563 UART: [art] Derive Key Pair - Done
24,206,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,912,971 UART: [art] Erasing AUTHORITY.KEYID = 7
25,914,468 UART: [art] PUB.X = 95EFB2CC5AD46C2BB71CFD2CF44826D1137CE712A9F882CE41303AC03CEC78DD2F8BC4216B6DC5A2AB2F12607561ABBE
25,921,770 UART: [art] PUB.Y = C8C49A9DD84E8F402006EE3EE8ADDF33C1285AF72A303CFC6DBE05F1D5D38F99EA79C74A5BA76E9304F89A2FA9F9FF28
25,929,107 UART: [art] SIG.R = 73CF578E26C45345F652F0FD9FF47CEAE5C13DB51EED867F834C37C8F07E0B0C744FDC48925536687E8A528A17303A50
25,936,492 UART: [art] SIG.S = 57E391EEE1B6A773E1AB813C396410559DFA41E341C179FE6076BC1940F6B0660E81F03F864C0B5CC9B995E9BAD63F35
26,915,893 UART: Caliptra RT
26,916,601 UART: [state] CFI Enabled
27,049,733 UART: [rt] RT listening for mailbox commands...
27,052,040 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,207,416 UART: [rt]cmd =0x41544d4e, len=14344
28,403,586 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,779,447 ready_for_fw is high
3,780,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,601,855 >>> mbox cmd response: success
19,842,839 UART:
19,843,230 UART: Running Caliptra FMC ...
19,844,457 UART:
19,844,632 UART: [state] CFI Enabled
19,852,480 UART: [fht] FMC Alias Private Key: 7
21,618,697 UART: [art] Extend RT PCRs Done
21,619,928 UART: [art] Lock RT PCRs Done
21,621,673 UART: [art] Populate DV Done
21,627,183 UART: [fht] FMC Alias Private Key: 7
21,628,917 UART: [art] Derive CDI
21,629,746 UART: [art] Store in slot 0x4
21,672,079 UART: [art] Derive Key Pair
21,673,088 UART: [art] Store priv key in slot 0x5
24,100,625 UART: [art] Derive Key Pair - Done
24,113,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,820,326 UART: [art] Erasing AUTHORITY.KEYID = 7
25,821,835 UART: [art] PUB.X = 261FD24550B5A6E6497EE4EDF99D9B415C44ED6BC663B8E60140B0578028BDB79FC64E0D1EF883F8ACFE6FD304E3C2DA
25,829,096 UART: [art] PUB.Y = 53D10ECB118E05A0889ECCDA3C53D546FB81A0BD4AB1D7BBFCF0AC2F59023C3448E25200D262CCC0E8540B7E41CC9925
25,836,356 UART: [art] SIG.R = 95A78D72C2C3EA4EFD6A04EFDA52431E60A462570FDA4F9711A7B33513E79193131169A5783128A1A865618B7FFB245D
25,843,769 UART: [art] SIG.S = 36FB06A8B03AD071186ACB01621EB661786C90ADC2776DB67B5383BEADE7D3BB0871F5E8E5E6AAE12E3082360B887FFF
26,822,801 UART: Caliptra RT
26,823,490 UART: [state] CFI Enabled
26,957,458 UART: [rt] RT listening for mailbox commands...
26,959,755 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,115,142 UART: [rt]cmd =0x41544d4e, len=14344
28,315,420 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,036 UART:
192,590 UART: Running Caliptra ROM ...
193,726 UART:
193,889 UART: [state] CFI Enabled
264,228 UART: [state] LifecycleState = Unprovisioned
266,601 UART: [state] DebugLocked = No
269,059 UART: [state] WD Timer not started. Device not locked for debugging
274,129 UART: [kat] SHA2-256
464,031 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,791 UART: [kat] ++
475,282 UART: [kat] sha1
485,725 UART: [kat] SHA2-256
488,729 UART: [kat] SHA2-384
495,359 UART: [kat] SHA2-512-ACC
497,952 UART: [kat] ECC-384
2,946,075 UART: [kat] HMAC-384Kdf
2,970,613 UART: [kat] LMS
3,502,363 UART: [kat] --
3,508,512 UART: [cold-reset] ++
3,509,541 UART: [fht] FHT @ 0x50003400
3,520,369 UART: [idev] ++
3,521,069 UART: [idev] CDI.KEYID = 6
3,522,023 UART: [idev] SUBJECT.KEYID = 7
3,523,269 UART: [idev] UDS.KEYID = 0
3,524,162 ready_for_fw is high
3,524,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,421 UART: [idev] Erasing UDS.KEYID = 0
6,028,751 UART: [idev] Sha1 KeyId Algorithm
6,050,851 UART: [idev] --
6,055,961 UART: [ldev] ++
6,056,650 UART: [ldev] CDI.KEYID = 6
6,057,562 UART: [ldev] SUBJECT.KEYID = 5
6,058,778 UART: [ldev] AUTHORITY.KEYID = 7
6,059,961 UART: [ldev] FE.KEYID = 1
6,099,442 UART: [ldev] Erasing FE.KEYID = 1
8,603,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,045 UART: [ldev] --
10,412,960 UART: [fwproc] Wait for Commands...
10,415,816 UART: [fwproc] Recv command 0x46574c44
10,418,070 UART: [fwproc] Recv'd Img size: 118548 bytes
15,099,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,184,986 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,308,600 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,868,882 >>> mbox cmd response: success
15,873,145 UART: [afmc] ++
15,873,895 UART: [afmc] CDI.KEYID = 6
15,875,096 UART: [afmc] SUBJECT.KEYID = 7
15,876,563 UART: [afmc] AUTHORITY.KEYID = 5
18,403,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,129,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,131,091 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,146,181 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,161,436 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,176,449 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,200,339 UART: [afmc] --
20,204,510 UART: [cold-reset] --
20,210,552 UART: [state] Locking Datavault
20,214,627 UART: [state] Locking PCR0, PCR1 and PCR31
20,216,771 UART: [state] Locking ICCM
20,219,138 UART: [exit] Launching FMC @ 0x40000130
20,227,814 UART:
20,228,058 UART: Running Caliptra FMC ...
20,229,164 UART:
20,229,341 UART: [state] CFI Enabled
20,285,327 UART: [fht] FMC Alias Private Key: 7
22,051,378 UART: [art] Extend RT PCRs Done
22,052,603 UART: [art] Lock RT PCRs Done
22,054,013 UART: [art] Populate DV Done
22,059,428 UART: [fht] FMC Alias Private Key: 7
22,061,022 UART: [art] Derive CDI
22,061,840 UART: [art] Store in slot 0x4
22,118,236 UART: [art] Derive Key Pair
22,119,279 UART: [art] Store priv key in slot 0x5
24,582,022 UART: [art] Derive Key Pair - Done
24,595,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,308,279 UART: [art] Erasing AUTHORITY.KEYID = 7
26,309,791 UART: [art] PUB.X = 38F8FD57C2DCE6406E6D0F4BD9E331520383E6079C81BACBD433F098DA71EC412A9E44B80A02608F7D9B930AE8BF4F73
26,317,095 UART: [art] PUB.Y = 90823109E9B2231A671081B1642A47FE12433CF0B3E25A14D7ACACB47BAC55960D39597C1C51861D1D430CCD9AAC96A5
26,324,308 UART: [art] SIG.R = 8A3C3BD0E45C1113A21DDDE23A8AF6CE5D3EC54D1C1F5619CA25AD1DE29666B748DD7BDF5195DDFD6AA0AB129A570F80
26,331,740 UART: [art] SIG.S = 62362E117F332FA2F2C55DA9DC7A9F6816615CFDCB94ACCD098BB1A43DB0BBCE329D9326F62CA0316BB3AABAB3872001
27,311,409 UART: Caliptra RT
27,312,102 UART: [state] CFI Enabled
27,493,238 UART: [rt] RT listening for mailbox commands...
27,495,557 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,650,858 UART: [rt]cmd =0x41544d4e, len=14344
28,843,718 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,435,921 ready_for_fw is high
3,436,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,914,567 >>> mbox cmd response: success
20,198,273 UART:
20,198,683 UART: Running Caliptra FMC ...
20,199,802 UART:
20,199,956 UART: [state] CFI Enabled
20,265,798 UART: [fht] FMC Alias Private Key: 7
22,031,904 UART: [art] Extend RT PCRs Done
22,033,123 UART: [art] Lock RT PCRs Done
22,034,779 UART: [art] Populate DV Done
22,040,084 UART: [fht] FMC Alias Private Key: 7
22,041,569 UART: [art] Derive CDI
22,042,306 UART: [art] Store in slot 0x4
22,098,494 UART: [art] Derive Key Pair
22,099,586 UART: [art] Store priv key in slot 0x5
24,562,342 UART: [art] Derive Key Pair - Done
24,575,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,288,807 UART: [art] Erasing AUTHORITY.KEYID = 7
26,290,310 UART: [art] PUB.X = D4ABF7CD93BC3F92059E8033ADAE7FDCA7CF6359FDDD204C841EEFD4C8142BD5F77501735E227B0E316E9726CF4D2D5E
26,297,637 UART: [art] PUB.Y = 1AE9E16FFFCC53C4EF87464875B2FC3BF34A7B1DF92FC2711DE47F49DF74A8AD54F89747BCEAC7D1378611570E9197CC
26,304,903 UART: [art] SIG.R = 46171F33BAB1331F1C0ABEFC0B0C4F9633DBB6974FD22CA825583F2D088719A8E2E4B0423CC881D0120953DAE1E0A9D1
26,312,329 UART: [art] SIG.S = 5CA3A01CD6E3954F1B8B08D2751405440591E4A54BD5D1670CFA1D8F7184349D261B2E644FD6D28A515843BC29CF3402
27,290,789 UART: Caliptra RT
27,291,479 UART: [state] CFI Enabled
27,472,502 UART: [rt] RT listening for mailbox commands...
27,474,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,629,979 UART: [rt]cmd =0x41544d4e, len=14344
28,832,449 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,443 UART:
192,839 UART: Running Caliptra ROM ...
193,956 UART:
603,606 UART: [state] CFI Enabled
615,214 UART: [state] LifecycleState = Unprovisioned
617,601 UART: [state] DebugLocked = No
618,853 UART: [state] WD Timer not started. Device not locked for debugging
622,824 UART: [kat] SHA2-256
812,722 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,460 UART: [kat] ++
824,064 UART: [kat] sha1
835,383 UART: [kat] SHA2-256
838,389 UART: [kat] SHA2-384
844,471 UART: [kat] SHA2-512-ACC
847,104 UART: [kat] ECC-384
3,288,957 UART: [kat] HMAC-384Kdf
3,302,467 UART: [kat] LMS
3,834,302 UART: [kat] --
3,839,887 UART: [cold-reset] ++
3,841,539 UART: [fht] FHT @ 0x50003400
3,853,296 UART: [idev] ++
3,854,003 UART: [idev] CDI.KEYID = 6
3,854,924 UART: [idev] SUBJECT.KEYID = 7
3,856,172 UART: [idev] UDS.KEYID = 0
3,857,098 ready_for_fw is high
3,857,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,159 UART: [idev] Erasing UDS.KEYID = 0
6,331,918 UART: [idev] Sha1 KeyId Algorithm
6,353,157 UART: [idev] --
6,356,832 UART: [ldev] ++
6,357,575 UART: [ldev] CDI.KEYID = 6
6,358,490 UART: [ldev] SUBJECT.KEYID = 5
6,359,655 UART: [ldev] AUTHORITY.KEYID = 7
6,361,061 UART: [ldev] FE.KEYID = 1
6,373,189 UART: [ldev] Erasing FE.KEYID = 1
8,849,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,905 UART: [ldev] --
10,641,666 UART: [fwproc] Wait for Commands...
10,643,331 UART: [fwproc] Recv command 0x46574c44
10,645,641 UART: [fwproc] Recv'd Img size: 118548 bytes
15,311,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,389,210 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,512,831 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,073,671 >>> mbox cmd response: success
16,076,889 UART: [afmc] ++
16,077,649 UART: [afmc] CDI.KEYID = 6
16,078,798 UART: [afmc] SUBJECT.KEYID = 7
16,080,254 UART: [afmc] AUTHORITY.KEYID = 5
18,585,057 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,304,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,306,830 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,321,924 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,337,122 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,352,160 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,374,291 UART: [afmc] --
20,378,165 UART: [cold-reset] --
20,382,742 UART: [state] Locking Datavault
20,386,927 UART: [state] Locking PCR0, PCR1 and PCR31
20,389,098 UART: [state] Locking ICCM
20,391,694 UART: [exit] Launching FMC @ 0x40000130
20,400,335 UART:
20,400,593 UART: Running Caliptra FMC ...
20,401,699 UART:
20,401,866 UART: [state] CFI Enabled
20,409,973 UART: [fht] FMC Alias Private Key: 7
22,176,357 UART: [art] Extend RT PCRs Done
22,177,571 UART: [art] Lock RT PCRs Done
22,179,010 UART: [art] Populate DV Done
22,184,536 UART: [fht] FMC Alias Private Key: 7
22,186,073 UART: [art] Derive CDI
22,186,813 UART: [art] Store in slot 0x4
22,229,525 UART: [art] Derive Key Pair
22,230,592 UART: [art] Store priv key in slot 0x5
24,657,936 UART: [art] Derive Key Pair - Done
24,670,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,376,806 UART: [art] Erasing AUTHORITY.KEYID = 7
26,378,359 UART: [art] PUB.X = 1F1DA8BD613A1E8FF7E82E1030A4EC73A71DF418A9A22010290DBD4DE9976E38938AA7D1C527CCA264A142C31B6CA266
26,385,608 UART: [art] PUB.Y = 7005DD151B1CC4AFDD9D17484744325F40C78074C08AAF4EAF85576DDF724BF4C0109B76798190A5D08513FC272ACFED
26,392,815 UART: [art] SIG.R = 1DF67D0F83527389C444BADB1F132294AEFD400C94391E0BAAF8B17546938133946715B1E22D8893C0CBDDF7B6D7F7B9
26,400,240 UART: [art] SIG.S = 04589DB9C7566A2BF2D274C88D74B8C436686FE02B3C121FA2C762B6748ABC2F3FA5496C6786B3D3B4496F8B29D36FE7
27,379,287 UART: Caliptra RT
27,379,973 UART: [state] CFI Enabled
27,512,926 UART: [rt] RT listening for mailbox commands...
27,515,306 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,670,801 UART: [rt]cmd =0x41544d4e, len=14344
28,870,588 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,756,808 ready_for_fw is high
3,757,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,141,513 >>> mbox cmd response: success
20,400,256 UART:
20,400,648 UART: Running Caliptra FMC ...
20,401,855 UART:
20,402,030 UART: [state] CFI Enabled
20,410,042 UART: [fht] FMC Alias Private Key: 7
22,176,679 UART: [art] Extend RT PCRs Done
22,177,915 UART: [art] Lock RT PCRs Done
22,179,791 UART: [art] Populate DV Done
22,185,426 UART: [fht] FMC Alias Private Key: 7
22,187,137 UART: [art] Derive CDI
22,187,877 UART: [art] Store in slot 0x4
22,230,293 UART: [art] Derive Key Pair
22,231,337 UART: [art] Store priv key in slot 0x5
24,658,809 UART: [art] Derive Key Pair - Done
24,671,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,378,342 UART: [art] Erasing AUTHORITY.KEYID = 7
26,379,866 UART: [art] PUB.X = 8047A33BA31C2F8524A17A47DDF6143DCE425214E45F432E9ED4CAD459936E3125631D452BBB5334A75143198509954D
26,387,124 UART: [art] PUB.Y = 387562AEADA7F5B2F9C089B989C8683A8F3A072FA32A21B7F2E2B8D3A37C46F488F1107ED05EEB5247241AF74941B0AF
26,394,326 UART: [art] SIG.R = F14FE1A6D6CDEBCBE877D700041857554818EF13F8584C0FC3DE35A5FE9A6F6D7DC39DEA2E089141D46C5069B8B48896
26,401,719 UART: [art] SIG.S = 65EC19A6A165DBBE73E101C828905D3F808F8D111335BE0AB0C692047F05AEBD8873AD666FDF997477A98DB918FD29F6
27,380,721 UART: Caliptra RT
27,381,417 UART: [state] CFI Enabled
27,514,317 UART: [rt] RT listening for mailbox commands...
27,516,649 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,671,828 UART: [rt]cmd =0x41544d4e, len=14344
28,872,647 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,833 UART: [kat] SHA2-256
881,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,879 UART: [kat] ++
886,031 UART: [kat] sha1
890,117 UART: [kat] SHA2-256
892,055 UART: [kat] SHA2-384
894,818 UART: [kat] SHA2-512-ACC
896,719 UART: [kat] ECC-384
902,332 UART: [kat] HMAC-384Kdf
906,836 UART: [kat] LMS
1,475,032 UART: [kat] --
1,476,001 UART: [cold-reset] ++
1,476,381 UART: [fht] Storing FHT @ 0x50003400
1,479,108 UART: [idev] ++
1,479,276 UART: [idev] CDI.KEYID = 6
1,479,636 UART: [idev] SUBJECT.KEYID = 7
1,480,060 UART: [idev] UDS.KEYID = 0
1,480,405 ready_for_fw is high
1,480,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,904 UART: [idev] Erasing UDS.KEYID = 0
1,504,468 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,294 UART: [idev] --
1,514,301 UART: [ldev] ++
1,514,469 UART: [ldev] CDI.KEYID = 6
1,514,832 UART: [ldev] SUBJECT.KEYID = 5
1,515,258 UART: [ldev] AUTHORITY.KEYID = 7
1,515,721 UART: [ldev] FE.KEYID = 1
1,520,857 UART: [ldev] Erasing FE.KEYID = 1
1,546,490 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,952 UART: [ldev] --
1,585,379 UART: [fwproc] Waiting for Commands...
1,586,222 UART: [fwproc] Received command 0x46574c44
1,587,013 UART: [fwproc] Received Image of size 118548 bytes
5,243,088 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,271,200 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,302,418 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,442,667 >>> mbox cmd response: success
5,443,791 UART: [afmc] ++
5,443,959 UART: [afmc] CDI.KEYID = 6
5,444,321 UART: [afmc] SUBJECT.KEYID = 7
5,444,746 UART: [afmc] AUTHORITY.KEYID = 5
5,479,567 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,495,949 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,496,729 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,502,435 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,508,314 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,514,027 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,521,848 UART: [afmc] --
5,522,786 UART: [cold-reset] --
5,523,652 UART: [state] Locking Datavault
5,524,877 UART: [state] Locking PCR0, PCR1 and PCR31
5,525,481 UART: [state] Locking ICCM
5,526,027 UART: [exit] Launching FMC @ 0x40000130
5,531,357 UART:
5,531,373 UART: Running Caliptra FMC ...
5,531,781 UART:
5,531,835 UART: [state] CFI Enabled
5,542,179 UART: [fht] FMC Alias Private Key: 7
5,661,109 UART: [art] Extend RT PCRs Done
5,661,537 UART: [art] Lock RT PCRs Done
5,663,095 UART: [art] Populate DV Done
5,671,356 UART: [fht] FMC Alias Private Key: 7
5,672,380 UART: [art] Derive CDI
5,672,660 UART: [art] Store in slot 0x4
5,758,210 UART: [art] Derive Key Pair
5,758,570 UART: [art] Store priv key in slot 0x5
5,772,325 UART: [art] Derive Key Pair - Done
5,787,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,802,310 UART: [art] Erasing AUTHORITY.KEYID = 7
5,803,075 UART: [art] PUB.X = 24B9DE16176CF0C813D6EB2A939EA512A191B353CFB4945B0DF8EEB6177A41C2D6DFED7100E3B7B143238AC558A6D565
5,809,832 UART: [art] PUB.Y = 7CC7EFEE7990A1D91585D8658B6CA92DE6EAA067B9EC69BBC25554B15F236D4C5C3399960E9134FD685E14912695BFE9
5,816,787 UART: [art] SIG.R = 055AF439790DEC8F5A602B70DC2A7A421F7D6152489E45FFED12075068EFF7F059506C15639E4C243CDF2DD0C029CEC2
5,823,556 UART: [art] SIG.S = 4CC78C1FE60F2772258FB8DD93B4D16B2D084241E8612DE223B68CE7524D7A6D20C7AB5341F75179DD537E5F08BB0C19
5,847,180 UART: Caliptra RT
5,847,431 UART: [state] CFI Enabled
5,967,764 UART: [rt] RT listening for mailbox commands...
5,968,434 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,091,634 UART: [rt]cmd =0x41544d4e, len=14344
7,325,733 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,115 ready_for_fw is high
1,363,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,407,686 >>> mbox cmd response: success
5,468,269 UART:
5,468,285 UART: Running Caliptra FMC ...
5,468,693 UART:
5,468,747 UART: [state] CFI Enabled
5,479,275 UART: [fht] FMC Alias Private Key: 7
5,598,365 UART: [art] Extend RT PCRs Done
5,598,793 UART: [art] Lock RT PCRs Done
5,600,655 UART: [art] Populate DV Done
5,608,828 UART: [fht] FMC Alias Private Key: 7
5,609,878 UART: [art] Derive CDI
5,610,158 UART: [art] Store in slot 0x4
5,696,022 UART: [art] Derive Key Pair
5,696,382 UART: [art] Store priv key in slot 0x5
5,709,175 UART: [art] Derive Key Pair - Done
5,723,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,738,873 UART: [art] Erasing AUTHORITY.KEYID = 7
5,739,638 UART: [art] PUB.X = BFA1E65C354EBA9A13974017440E6CF6D2FA17DFDDC5B134FC1A15B0AF00E08DC1E5E32FA9EF01FF08C866459579B207
5,746,392 UART: [art] PUB.Y = FB44E2CEE4E29AE6242B40F07A7020FEF21E894AC3B9C2C57F47729B087BFEA8BC6A8D99D5F3A34F8BA7C217DCB6C891
5,753,361 UART: [art] SIG.R = 55BB30E05C1F713965B14A841646D40F45C374E0783CBBEE735FF952F764369CF97748B7833AA88C0E6D3B1A8CF69B50
5,760,127 UART: [art] SIG.S = 32882DB4D315961B16CAE45164F5F814AAC1B7AEA8AC34D10B8137D413DA22E739CE7A3686C994A6E25E0387345E9FE6
5,783,537 UART: Caliptra RT
5,783,788 UART: [state] CFI Enabled
5,903,301 UART: [rt] RT listening for mailbox commands...
5,903,971 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,027,005 UART: [rt]cmd =0x41544d4e, len=14344
7,185,642 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.74s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,352 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,926 UART: [kat] SHA2-256
881,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,972 UART: [kat] ++
886,124 UART: [kat] sha1
890,170 UART: [kat] SHA2-256
892,108 UART: [kat] SHA2-384
894,815 UART: [kat] SHA2-512-ACC
896,716 UART: [kat] ECC-384
902,333 UART: [kat] HMAC-384Kdf
906,865 UART: [kat] LMS
1,475,061 UART: [kat] --
1,475,766 UART: [cold-reset] ++
1,476,152 UART: [fht] Storing FHT @ 0x50003400
1,478,947 UART: [idev] ++
1,479,115 UART: [idev] CDI.KEYID = 6
1,479,475 UART: [idev] SUBJECT.KEYID = 7
1,479,899 UART: [idev] UDS.KEYID = 0
1,480,244 ready_for_fw is high
1,480,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,169 UART: [idev] Erasing UDS.KEYID = 0
1,504,593 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,225 UART: [idev] --
1,514,180 UART: [ldev] ++
1,514,348 UART: [ldev] CDI.KEYID = 6
1,514,711 UART: [ldev] SUBJECT.KEYID = 5
1,515,137 UART: [ldev] AUTHORITY.KEYID = 7
1,515,600 UART: [ldev] FE.KEYID = 1
1,521,120 UART: [ldev] Erasing FE.KEYID = 1
1,546,811 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,093 UART: [ldev] --
1,586,536 UART: [fwproc] Waiting for Commands...
1,587,203 UART: [fwproc] Received command 0x46574c44
1,587,994 UART: [fwproc] Received Image of size 118548 bytes
5,168,543 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,196,715 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,227,933 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,368,330 >>> mbox cmd response: success
5,369,490 UART: [afmc] ++
5,369,658 UART: [afmc] CDI.KEYID = 6
5,370,020 UART: [afmc] SUBJECT.KEYID = 7
5,370,445 UART: [afmc] AUTHORITY.KEYID = 5
5,405,646 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,421,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,422,530 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,428,236 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,434,115 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,439,828 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,447,821 UART: [afmc] --
5,448,941 UART: [cold-reset] --
5,449,819 UART: [state] Locking Datavault
5,451,074 UART: [state] Locking PCR0, PCR1 and PCR31
5,451,678 UART: [state] Locking ICCM
5,452,350 UART: [exit] Launching FMC @ 0x40000130
5,457,680 UART:
5,457,696 UART: Running Caliptra FMC ...
5,458,104 UART:
5,458,247 UART: [state] CFI Enabled
5,468,891 UART: [fht] FMC Alias Private Key: 7
5,588,245 UART: [art] Extend RT PCRs Done
5,588,673 UART: [art] Lock RT PCRs Done
5,590,211 UART: [art] Populate DV Done
5,598,368 UART: [fht] FMC Alias Private Key: 7
5,599,408 UART: [art] Derive CDI
5,599,688 UART: [art] Store in slot 0x4
5,685,444 UART: [art] Derive Key Pair
5,685,804 UART: [art] Store priv key in slot 0x5
5,698,825 UART: [art] Derive Key Pair - Done
5,713,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,729,423 UART: [art] Erasing AUTHORITY.KEYID = 7
5,730,188 UART: [art] PUB.X = 2F7891BE427B687CB413469C816045964BF5B737487A7FD8C847164167A44CEFDFA396B41505C9E1B0C3C12FEFEDDE3E
5,736,963 UART: [art] PUB.Y = A5CAD16A2C857AE17D8906E88BF726B76F0B01D14BF71787E5641D3534F1B156BA179C85DF638C3C3E072A4CEC5C7FAC
5,743,915 UART: [art] SIG.R = 606CDE35B6EDFFBF45D5B58B3E839CE9F45B242DE899524F7E23B118AB6FBBAC040A2533778CCDA50DF48D0DFEDCF574
5,750,699 UART: [art] SIG.S = 4B8530625798D593600FAA596ECCB5F3C636BFE98354999C995E501F0AA6BB9CDC39CD85FC7CA524118A156473B1972B
5,774,609 UART: Caliptra RT
5,774,952 UART: [state] CFI Enabled
5,894,509 UART: [rt] RT listening for mailbox commands...
5,895,179 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,018,291 UART: [rt]cmd =0x41544d4e, len=14344
7,101,008 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,152 ready_for_fw is high
1,363,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,255,409 >>> mbox cmd response: success
5,317,440 UART:
5,317,456 UART: Running Caliptra FMC ...
5,317,864 UART:
5,318,007 UART: [state] CFI Enabled
5,328,681 UART: [fht] FMC Alias Private Key: 7
5,447,113 UART: [art] Extend RT PCRs Done
5,447,541 UART: [art] Lock RT PCRs Done
5,448,841 UART: [art] Populate DV Done
5,457,066 UART: [fht] FMC Alias Private Key: 7
5,458,010 UART: [art] Derive CDI
5,458,290 UART: [art] Store in slot 0x4
5,544,202 UART: [art] Derive Key Pair
5,544,562 UART: [art] Store priv key in slot 0x5
5,558,191 UART: [art] Derive Key Pair - Done
5,573,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,588,574 UART: [art] Erasing AUTHORITY.KEYID = 7
5,589,339 UART: [art] PUB.X = 4C3CCFFEE73C8559012C03451489A5C9731ABE3DCAD98AD14E10E6CB3EB54306B0D9DE8D740DEC38A280F7D84B06E292
5,596,110 UART: [art] PUB.Y = 1D6E76F948302416D171D2BF8D82D111C1FD754283A59FC43949DFC224C8FA4FB5A3E090441FAB678F9EE92A508D04AF
5,603,065 UART: [art] SIG.R = C4D72DF5260F4897A515F637456E8FD26D9168E4A253336FB2521333CB67B7779586C41F1C0308E0A1123544EFC86424
5,609,816 UART: [art] SIG.S = B27A4671D7D2EB4A3564CDC5FFCCB059B3065162A650143509543587BBCDADB2AA46FDB96C6B7EF924F1C54E4380FD83
5,633,578 UART: Caliptra RT
5,633,921 UART: [state] CFI Enabled
5,753,726 UART: [rt] RT listening for mailbox commands...
5,754,396 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,877,484 UART: [rt]cmd =0x41544d4e, len=14344
7,074,075 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
891,436 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,540 UART: [kat] ++
895,692 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,607 UART: [kat] HMAC-384Kdf
921,225 UART: [kat] LMS
1,169,537 UART: [kat] --
1,170,464 UART: [cold-reset] ++
1,171,002 UART: [fht] FHT @ 0x50003400
1,173,826 UART: [idev] ++
1,173,994 UART: [idev] CDI.KEYID = 6
1,174,355 UART: [idev] SUBJECT.KEYID = 7
1,174,780 UART: [idev] UDS.KEYID = 0
1,175,126 ready_for_fw is high
1,175,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,445 UART: [idev] Erasing UDS.KEYID = 0
1,198,937 UART: [idev] Sha1 KeyId Algorithm
1,207,701 UART: [idev] --
1,208,632 UART: [ldev] ++
1,208,800 UART: [ldev] CDI.KEYID = 6
1,209,164 UART: [ldev] SUBJECT.KEYID = 5
1,209,591 UART: [ldev] AUTHORITY.KEYID = 7
1,210,054 UART: [ldev] FE.KEYID = 1
1,215,116 UART: [ldev] Erasing FE.KEYID = 1
1,240,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,774 UART: [ldev] --
1,280,229 UART: [fwproc] Wait for Commands...
1,280,884 UART: [fwproc] Recv command 0x46574c44
1,281,617 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,367 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,542 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,372,729 >>> mbox cmd response: success
3,373,843 UART: [afmc] ++
3,374,011 UART: [afmc] CDI.KEYID = 6
3,374,374 UART: [afmc] SUBJECT.KEYID = 7
3,374,800 UART: [afmc] AUTHORITY.KEYID = 5
3,410,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,431 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,138 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,015 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,725 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,281 UART: [afmc] --
3,453,282 UART: [cold-reset] --
3,454,190 UART: [state] Locking Datavault
3,455,333 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,937 UART: [state] Locking ICCM
3,456,435 UART: [exit] Launching FMC @ 0x40000130
3,461,765 UART:
3,461,781 UART: Running Caliptra FMC ...
3,462,189 UART:
3,462,243 UART: [state] CFI Enabled
3,473,069 UART: [fht] FMC Alias Private Key: 7
3,591,633 UART: [art] Extend RT PCRs Done
3,592,061 UART: [art] Lock RT PCRs Done
3,593,569 UART: [art] Populate DV Done
3,601,896 UART: [fht] FMC Alias Private Key: 7
3,602,972 UART: [art] Derive CDI
3,603,252 UART: [art] Store in slot 0x4
3,689,387 UART: [art] Derive Key Pair
3,689,747 UART: [art] Store priv key in slot 0x5
3,702,649 UART: [art] Derive Key Pair - Done
3,717,164 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,160 UART: [art] PUB.X = 805D97515A5A6D0E809A3861706A6CBB4E85CB1EAF4785A18DD2C30C17CE110B006D2DCF2E5938EE1489C99E3345ADD3
3,739,909 UART: [art] PUB.Y = F87D363BAE592FE57FBC49950E310F8FF03CAC8E7971390F2BFD2A2419B287EE71D7B65CBF854776225DEDD928E416DD
3,746,864 UART: [art] SIG.R = 6AF96C4CFC349BCCEF8C3E7D22FA2E1E5D82825A7ECCB0FF73A0F0A83F67B73ACB97BC3920C1228DBCC726B2D947A989
3,753,660 UART: [art] SIG.S = 3A6CF2EDCF5D369A062714E9EC226DAB970D2BE605C6232BCDD9FE1B944DB2F7BEB74B72DCA6406B7668E07CDA65D1F2
3,776,853 UART: Caliptra RT
3,777,104 UART: [state] CFI Enabled
3,898,110 UART: [rt] RT listening for mailbox commands...
3,898,780 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,694 UART: [rt]cmd =0x41544d4e, len=14344
4,309,315 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,420 ready_for_fw is high
1,058,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,221,083 >>> mbox cmd response: success
3,283,750 UART:
3,283,766 UART: Running Caliptra FMC ...
3,284,174 UART:
3,284,228 UART: [state] CFI Enabled
3,294,790 UART: [fht] FMC Alias Private Key: 7
3,413,784 UART: [art] Extend RT PCRs Done
3,414,212 UART: [art] Lock RT PCRs Done
3,415,652 UART: [art] Populate DV Done
3,423,823 UART: [fht] FMC Alias Private Key: 7
3,424,787 UART: [art] Derive CDI
3,425,067 UART: [art] Store in slot 0x4
3,510,830 UART: [art] Derive Key Pair
3,511,190 UART: [art] Store priv key in slot 0x5
3,524,252 UART: [art] Derive Key Pair - Done
3,539,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,408 UART: [art] PUB.X = 5314EB94338F4FF7F57586F777DFFB30C883EB8B74E1EF3075CDD512631C6DA8C63C127EB136BB2515A906EBB3104D9F
3,562,185 UART: [art] PUB.Y = 50D353758B8EAF7CA59D61CA59B036FF04518248042D7E3C69745A460CCF6B7F48F43326C34AE6561CA1ACEF4E632BB8
3,569,134 UART: [art] SIG.R = 62C98B8FB5C84F4F4FA8C8293D11AB6C7C71A066A0AD9AEEA01610F17D1F9A1BFCA9958B428A0C65E716C3B6C994A174
3,575,917 UART: [art] SIG.S = 2972E47D6318D0E7555EDC2F7F858941CC754C209D9C410F8C70C12525297D3C28AFED5E57F500EB8C7D318386F8DD5B
3,600,316 UART: Caliptra RT
3,600,567 UART: [state] CFI Enabled
3,720,061 UART: [rt] RT listening for mailbox commands...
3,720,731 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,603 UART: [rt]cmd =0x41544d4e, len=14344
4,144,175 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
916,184 UART: [kat] HMAC-384Kdf
920,816 UART: [kat] LMS
1,169,128 UART: [kat] --
1,169,897 UART: [cold-reset] ++
1,170,399 UART: [fht] FHT @ 0x50003400
1,172,911 UART: [idev] ++
1,173,079 UART: [idev] CDI.KEYID = 6
1,173,440 UART: [idev] SUBJECT.KEYID = 7
1,173,865 UART: [idev] UDS.KEYID = 0
1,174,211 ready_for_fw is high
1,174,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,984 UART: [idev] Erasing UDS.KEYID = 0
1,199,482 UART: [idev] Sha1 KeyId Algorithm
1,208,238 UART: [idev] --
1,209,419 UART: [ldev] ++
1,209,587 UART: [ldev] CDI.KEYID = 6
1,209,951 UART: [ldev] SUBJECT.KEYID = 5
1,210,378 UART: [ldev] AUTHORITY.KEYID = 7
1,210,841 UART: [ldev] FE.KEYID = 1
1,216,195 UART: [ldev] Erasing FE.KEYID = 1
1,242,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,261 UART: [ldev] --
1,281,714 UART: [fwproc] Wait for Commands...
1,282,519 UART: [fwproc] Recv command 0x46574c44
1,283,252 UART: [fwproc] Recv'd Img size: 118548 bytes
3,157,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,185,605 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,216,780 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,357,105 >>> mbox cmd response: success
3,358,315 UART: [afmc] ++
3,358,483 UART: [afmc] CDI.KEYID = 6
3,358,846 UART: [afmc] SUBJECT.KEYID = 7
3,359,272 UART: [afmc] AUTHORITY.KEYID = 5
3,394,539 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,411,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,412,485 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,418,192 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,424,069 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,429,779 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,437,759 UART: [afmc] --
3,438,820 UART: [cold-reset] --
3,439,362 UART: [state] Locking Datavault
3,440,755 UART: [state] Locking PCR0, PCR1 and PCR31
3,441,359 UART: [state] Locking ICCM
3,441,947 UART: [exit] Launching FMC @ 0x40000130
3,447,277 UART:
3,447,293 UART: Running Caliptra FMC ...
3,447,701 UART:
3,447,844 UART: [state] CFI Enabled
3,458,462 UART: [fht] FMC Alias Private Key: 7
3,576,658 UART: [art] Extend RT PCRs Done
3,577,086 UART: [art] Lock RT PCRs Done
3,578,578 UART: [art] Populate DV Done
3,586,675 UART: [fht] FMC Alias Private Key: 7
3,587,725 UART: [art] Derive CDI
3,588,005 UART: [art] Store in slot 0x4
3,673,812 UART: [art] Derive Key Pair
3,674,172 UART: [art] Store priv key in slot 0x5
3,687,638 UART: [art] Derive Key Pair - Done
3,702,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,718,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,719,427 UART: [art] PUB.X = 38C7060D9B6B2673EB4AD33D23BBEB2371054CEC7814C1B0C2CFE23F6FBAFB2883B601B58EB98BEF7475F852418D06ED
3,726,198 UART: [art] PUB.Y = C60DE83A119F973ADE38748FA2F75C1D967D2A7C177663E76BA53C9A90E8068A781D61E1C71D7578A51C4C6F6760F337
3,733,144 UART: [art] SIG.R = D77464F63FDEFEFB290ADAF93997C9E8DDBECC83170184A323E5B16022C9481559A611ED2A334EE5ADCB7132A0AAE42D
3,739,926 UART: [art] SIG.S = 63C01054D48274F3D3B69D7BBC62FE697BCE1EC5A886EAE8497C1D09737D6165C283670EF7B64C24314CBFB1942CAF3B
3,763,298 UART: Caliptra RT
3,763,641 UART: [state] CFI Enabled
3,883,345 UART: [rt] RT listening for mailbox commands...
3,884,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,143 UART: [rt]cmd =0x41544d4e, len=14344
4,305,326 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,961 ready_for_fw is high
1,059,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,607 >>> mbox cmd response: success
3,285,232 UART:
3,285,248 UART: Running Caliptra FMC ...
3,285,656 UART:
3,285,799 UART: [state] CFI Enabled
3,296,663 UART: [fht] FMC Alias Private Key: 7
3,415,955 UART: [art] Extend RT PCRs Done
3,416,383 UART: [art] Lock RT PCRs Done
3,417,831 UART: [art] Populate DV Done
3,426,074 UART: [fht] FMC Alias Private Key: 7
3,427,118 UART: [art] Derive CDI
3,427,398 UART: [art] Store in slot 0x4
3,513,141 UART: [art] Derive Key Pair
3,513,501 UART: [art] Store priv key in slot 0x5
3,527,173 UART: [art] Derive Key Pair - Done
3,542,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,557,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,558,030 UART: [art] PUB.X = F4DF0692362DC1BAA80564B7C9DB1ADECEBA22F9758B6983A239638874B6EED36830DE8ADDC7EB2686F7EA873F30F6B7
3,564,812 UART: [art] PUB.Y = 44B17167E6507265F7AC75960893566C850A15C17B9494B18145161D5E9CE61D8717BB6FCCB6F9D629FCAEA9E0765B2C
3,571,756 UART: [art] SIG.R = F986AA3F822CFFB58B46EC4A667FB598E0153B1A9444A53A9A8EF3300A162B22954A463C1DF0F5023139F8C43F29ADDE
3,578,530 UART: [art] SIG.S = A7D5474FF6A2432F7F2CDB5A77ABEFB853F0972B862169BE5A9766B1F9ADC4A6BBBCBBD42BD4A521A66AC77115BBFE6E
3,601,906 UART: Caliptra RT
3,602,249 UART: [state] CFI Enabled
3,721,210 UART: [rt] RT listening for mailbox commands...
3,721,880 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,946 UART: [rt]cmd =0x41544d4e, len=14344
4,148,211 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
893,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,355 UART: [kat] ++
897,507 UART: [kat] sha1
901,571 UART: [kat] SHA2-256
903,511 UART: [kat] SHA2-384
906,152 UART: [kat] SHA2-512-ACC
908,053 UART: [kat] ECC-384
917,602 UART: [kat] HMAC-384Kdf
922,172 UART: [kat] LMS
1,170,500 UART: [kat] --
1,171,391 UART: [cold-reset] ++
1,171,889 UART: [fht] FHT @ 0x50003400
1,174,336 UART: [idev] ++
1,174,504 UART: [idev] CDI.KEYID = 6
1,174,864 UART: [idev] SUBJECT.KEYID = 7
1,175,288 UART: [idev] UDS.KEYID = 0
1,175,633 ready_for_fw is high
1,175,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,486 UART: [idev] Erasing UDS.KEYID = 0
1,200,307 UART: [idev] Sha1 KeyId Algorithm
1,208,807 UART: [idev] --
1,209,879 UART: [ldev] ++
1,210,047 UART: [ldev] CDI.KEYID = 6
1,210,410 UART: [ldev] SUBJECT.KEYID = 5
1,210,836 UART: [ldev] AUTHORITY.KEYID = 7
1,211,299 UART: [ldev] FE.KEYID = 1
1,216,241 UART: [ldev] Erasing FE.KEYID = 1
1,242,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,205 UART: [ldev] --
1,282,500 UART: [fwproc] Wait for Commands...
1,283,072 UART: [fwproc] Recv command 0x46574c44
1,283,800 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,619 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,789 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,008 >>> mbox cmd response: success
3,375,194 UART: [afmc] ++
3,375,362 UART: [afmc] CDI.KEYID = 6
3,375,724 UART: [afmc] SUBJECT.KEYID = 7
3,376,149 UART: [afmc] AUTHORITY.KEYID = 5
3,410,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,811 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,559 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,265 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,440,144 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,854 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,793 UART: [afmc] --
3,454,709 UART: [cold-reset] --
3,455,325 UART: [state] Locking Datavault
3,456,260 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,864 UART: [state] Locking ICCM
3,457,380 UART: [exit] Launching FMC @ 0x40000130
3,462,710 UART:
3,462,726 UART: Running Caliptra FMC ...
3,463,134 UART:
3,463,188 UART: [state] CFI Enabled
3,473,664 UART: [fht] FMC Alias Private Key: 7
3,592,944 UART: [art] Extend RT PCRs Done
3,593,372 UART: [art] Lock RT PCRs Done
3,594,826 UART: [art] Populate DV Done
3,603,261 UART: [fht] FMC Alias Private Key: 7
3,604,419 UART: [art] Derive CDI
3,604,699 UART: [art] Store in slot 0x4
3,690,390 UART: [art] Derive Key Pair
3,690,750 UART: [art] Store priv key in slot 0x5
3,704,106 UART: [art] Derive Key Pair - Done
3,718,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,734,900 UART: [art] PUB.X = 66C0405F9F84BD602629B6C045DDF0F732E6FF8D8B733AA4F21F1EFF27BBD6846BA14ECE363B0023D582D04D343FC332
3,741,660 UART: [art] PUB.Y = CC113F117CAF2536B96007A3B4AEAE081504DD749FF8C6397FF56AF8463940CC410D1765AB285B0AFC011767C7C725A4
3,748,598 UART: [art] SIG.R = 36729C90E269B0C64E80E6E97B4EF19083CBB970FA691FD98E7E96F0704FD6EBE273B4DAA203FDB1387CFCB95B4FC1A7
3,755,383 UART: [art] SIG.S = 0BEF7A624C12AAA965778D26091ECD3886E905AB4290F756E1506F752B6D3915DDCDACD6914E3D093720DD7A35433093
3,779,061 UART: Caliptra RT
3,779,312 UART: [state] CFI Enabled
3,898,474 UART: [rt] RT listening for mailbox commands...
3,899,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,128 UART: [rt]cmd =0x41544d4e, len=14344
4,323,312 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,969 ready_for_fw is high
1,060,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,228,679 >>> mbox cmd response: success
3,289,916 UART:
3,289,932 UART: Running Caliptra FMC ...
3,290,340 UART:
3,290,394 UART: [state] CFI Enabled
3,300,608 UART: [fht] FMC Alias Private Key: 7
3,419,380 UART: [art] Extend RT PCRs Done
3,419,808 UART: [art] Lock RT PCRs Done
3,421,416 UART: [art] Populate DV Done
3,429,897 UART: [fht] FMC Alias Private Key: 7
3,430,999 UART: [art] Derive CDI
3,431,279 UART: [art] Store in slot 0x4
3,516,916 UART: [art] Derive Key Pair
3,517,276 UART: [art] Store priv key in slot 0x5
3,530,356 UART: [art] Derive Key Pair - Done
3,544,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,912 UART: [art] PUB.X = ECF6C0C1E4BC6B3A793B9F8E029824A8EF2CD3E0625177204E06F6A7F6C7CF0CD99BDA47E9A675F6DD2FCD7F1170D146
3,567,693 UART: [art] PUB.Y = 6F6871DCE8E605E3FDA5247B22E838C1932078F6060673C059CF142BE1B2D312520F53735CB6BC4247D96FC42494C55F
3,574,629 UART: [art] SIG.R = 7E2BE482B96CDAA8AD94037E3C2AFC2451B479415EE69A2D2FCA9AD08912AACC3D89D54FD8E052EE4213C19318A4BA0B
3,581,413 UART: [art] SIG.S = 9179589499F3BAA1B6C800246533761F2B3E2A9DEE7976B405A0B08EC3505EA69A0CC4A56C288F1BE7D19A1CC706C73E
3,604,122 UART: Caliptra RT
3,604,373 UART: [state] CFI Enabled
3,723,103 UART: [rt] RT listening for mailbox commands...
3,723,773 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,923 UART: [rt]cmd =0x41544d4e, len=14344
4,150,340 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
893,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,542 UART: [kat] ++
897,694 UART: [kat] sha1
901,996 UART: [kat] SHA2-256
903,936 UART: [kat] SHA2-384
906,699 UART: [kat] SHA2-512-ACC
908,600 UART: [kat] ECC-384
918,653 UART: [kat] HMAC-384Kdf
923,365 UART: [kat] LMS
1,171,693 UART: [kat] --
1,172,778 UART: [cold-reset] ++
1,173,182 UART: [fht] FHT @ 0x50003400
1,175,683 UART: [idev] ++
1,175,851 UART: [idev] CDI.KEYID = 6
1,176,211 UART: [idev] SUBJECT.KEYID = 7
1,176,635 UART: [idev] UDS.KEYID = 0
1,176,980 ready_for_fw is high
1,176,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,851 UART: [idev] Erasing UDS.KEYID = 0
1,202,294 UART: [idev] Sha1 KeyId Algorithm
1,210,706 UART: [idev] --
1,211,830 UART: [ldev] ++
1,211,998 UART: [ldev] CDI.KEYID = 6
1,212,361 UART: [ldev] SUBJECT.KEYID = 5
1,212,787 UART: [ldev] AUTHORITY.KEYID = 7
1,213,250 UART: [ldev] FE.KEYID = 1
1,218,326 UART: [ldev] Erasing FE.KEYID = 1
1,245,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,782 UART: [ldev] --
1,284,223 UART: [fwproc] Wait for Commands...
1,284,829 UART: [fwproc] Recv command 0x46574c44
1,285,557 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,431 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,601 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,804 >>> mbox cmd response: success
3,369,856 UART: [afmc] ++
3,370,024 UART: [afmc] CDI.KEYID = 6
3,370,386 UART: [afmc] SUBJECT.KEYID = 7
3,370,811 UART: [afmc] AUTHORITY.KEYID = 5
3,406,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,422,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,505 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,429,211 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,435,090 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,440,800 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,448,837 UART: [afmc] --
3,449,725 UART: [cold-reset] --
3,450,391 UART: [state] Locking Datavault
3,451,420 UART: [state] Locking PCR0, PCR1 and PCR31
3,452,024 UART: [state] Locking ICCM
3,452,642 UART: [exit] Launching FMC @ 0x40000130
3,457,972 UART:
3,457,988 UART: Running Caliptra FMC ...
3,458,396 UART:
3,458,539 UART: [state] CFI Enabled
3,469,089 UART: [fht] FMC Alias Private Key: 7
3,587,667 UART: [art] Extend RT PCRs Done
3,588,095 UART: [art] Lock RT PCRs Done
3,589,819 UART: [art] Populate DV Done
3,598,208 UART: [fht] FMC Alias Private Key: 7
3,599,212 UART: [art] Derive CDI
3,599,492 UART: [art] Store in slot 0x4
3,685,449 UART: [art] Derive Key Pair
3,685,809 UART: [art] Store priv key in slot 0x5
3,699,265 UART: [art] Derive Key Pair - Done
3,713,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,729,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,987 UART: [art] PUB.X = 44F3A384E1F22D305DAE72DEC939B12A14691F905E06A7FD36346EA469989E964B3008E0B7B9D1C747D320A257524CA1
3,736,751 UART: [art] PUB.Y = 8FB00F27BF61DB96AC8D6924D812B4256DD80077548723E766AA816E3A4FC2E94D07C568D603F64F4E757A0EC7FF4FB7
3,743,675 UART: [art] SIG.R = FD7DCAC6EF336E386C50D0A1980AECEB7AC991339A5C273589782B76A06DBFF19A849CC1FEF4927572CAECB2DB4DD040
3,750,464 UART: [art] SIG.S = F7E62193368C479917F27B29C02213BC1B2228DB592290940171D3B212FE75EF8815A08CE396151448D478D1AAAAE3F7
3,774,107 UART: Caliptra RT
3,774,450 UART: [state] CFI Enabled
3,894,525 UART: [rt] RT listening for mailbox commands...
3,895,195 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,018,445 UART: [rt]cmd =0x41544d4e, len=14344
4,321,952 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,076 ready_for_fw is high
1,061,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,225,847 >>> mbox cmd response: success
3,288,744 UART:
3,288,760 UART: Running Caliptra FMC ...
3,289,168 UART:
3,289,311 UART: [state] CFI Enabled
3,299,949 UART: [fht] FMC Alias Private Key: 7
3,419,327 UART: [art] Extend RT PCRs Done
3,419,755 UART: [art] Lock RT PCRs Done
3,421,399 UART: [art] Populate DV Done
3,429,738 UART: [fht] FMC Alias Private Key: 7
3,430,822 UART: [art] Derive CDI
3,431,102 UART: [art] Store in slot 0x4
3,516,955 UART: [art] Derive Key Pair
3,517,315 UART: [art] Store priv key in slot 0x5
3,530,161 UART: [art] Derive Key Pair - Done
3,544,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,271 UART: [art] PUB.X = 656FBBF9FEC032305BD03575FC755987E5CEA47FA949622CA6938D9DBD8197CDA499BF19E76749F4626C4BD62BA4F5E6
3,568,053 UART: [art] PUB.Y = 95C2E0C287BE02461642C45B243597900A9BEDA9EDD993A2C173E3409F748A12EB268C00F3919AC038BBFDA5EA37524F
3,574,981 UART: [art] SIG.R = 1C0AE1530BFBD71163CF5E7370CFCD3C6A8D181CB2FB019B0134F896132B1D22D55F7FBC76AB5C0DF770702FDD2566DF
3,581,754 UART: [art] SIG.S = 67191D71168D76F4793E47620A7D0C79CA22816CFB04240704245865F5D86F9115A6BF861FD3F8AA6A4F77F28DCB077C
3,605,082 UART: Caliptra RT
3,605,425 UART: [state] CFI Enabled
3,725,513 UART: [rt] RT listening for mailbox commands...
3,726,183 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,131 UART: [rt]cmd =0x41544d4e, len=14344
4,154,771 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
192,309 UART:
192,655 UART: Running Caliptra ROM ...
193,855 UART:
194,009 UART: [state] CFI Enabled
262,295 UART: [state] LifecycleState = Unprovisioned
264,297 UART: [state] DebugLocked = No
266,765 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,127 UART: [kat] SHA2-256
441,831 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,306 UART: [kat] ++
452,797 UART: [kat] sha1
463,103 UART: [kat] SHA2-256
465,774 UART: [kat] SHA2-384
471,197 UART: [kat] SHA2-512-ACC
473,572 UART: [kat] ECC-384
2,765,097 UART: [kat] HMAC-384Kdf
2,776,772 UART: [kat] LMS
3,967,057 UART: [kat] --
3,972,309 UART: [cold-reset] ++
3,973,890 UART: [fht] Storing FHT @ 0x50003400
3,985,228 UART: [idev] ++
3,985,791 UART: [idev] CDI.KEYID = 6
3,986,700 UART: [idev] SUBJECT.KEYID = 7
3,987,945 UART: [idev] UDS.KEYID = 0
3,989,015 ready_for_fw is high
3,989,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,493 UART: [idev] Erasing UDS.KEYID = 0
7,323,725 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,536 UART: [idev] --
7,347,343 UART: [ldev] ++
7,347,921 UART: [ldev] CDI.KEYID = 6
7,348,859 UART: [ldev] SUBJECT.KEYID = 5
7,349,997 UART: [ldev] AUTHORITY.KEYID = 7
7,351,331 UART: [ldev] FE.KEYID = 1
7,378,762 UART: [ldev] Erasing FE.KEYID = 1
10,713,692 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,705 UART: [ldev] --
13,092,350 UART: [fwproc] Waiting for Commands...
13,095,311 UART: [fwproc] Received command 0x46574c44
13,097,502 UART: [fwproc] Received Image of size 118548 bytes
21,710,808 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,791,841 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,864,980 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,193,050 >>> mbox cmd response: success
22,196,622 UART: [afmc] ++
22,197,234 UART: [afmc] CDI.KEYID = 6
22,198,174 UART: [afmc] SUBJECT.KEYID = 7
22,199,393 UART: [afmc] AUTHORITY.KEYID = 5
25,569,453 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,866,478 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,868,754 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,883,268 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,898,030 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,912,408 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,933,999 UART: [afmc] --
27,937,391 UART: [cold-reset] --
27,940,789 UART: [state] Locking Datavault
27,946,367 UART: [state] Locking PCR0, PCR1 and PCR31
27,948,133 UART: [state] Locking ICCM
27,950,157 UART: [exit] Launching FMC @ 0x40000130
27,958,507 UART:
27,958,742 UART: Running Caliptra FMC ...
27,959,844 UART:
27,960,010 UART: [state] CFI Enabled
28,026,173 UART: [fht] FMC Alias Private Key: 7
30,366,732 UART: [art] Extend RT PCRs Done
30,367,953 UART: [art] Lock RT PCRs Done
30,369,743 UART: [art] Populate DV Done
30,375,264 UART: [fht] FMC Alias Private Key: 7
30,376,963 UART: [art] Derive CDI
30,377,777 UART: [art] Store in slot 0x4
30,434,333 UART: [art] Derive Key Pair
30,435,390 UART: [art] Store priv key in slot 0x5
33,727,696 UART: [art] Derive Key Pair - Done
33,740,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,028,204 UART: [art] Erasing AUTHORITY.KEYID = 7
36,029,752 UART: [art] PUB.X = DB6DB864982C5EE5ECD8473E778BAD96E7C0D473C695DB9BCBE03E5C5F2C896769DE49DBF9E92C2F92C4A60EFEFF400B
36,037,029 UART: [art] PUB.Y = 654E3BD1937729CA2C07336F6AC4413700433D3BEA2A6D56F1E6308D5054BC633C371125374CB24CB3783392662345D3
36,044,231 UART: [art] SIG.R = 56981C6E900D153E3709C99E17745F491EFCC86DC5C7AD6985B7DFDD6E693ED3EAE452747B6F235E22F782089C5CECB7
36,051,645 UART: [art] SIG.S = 8A61984EFB335A05149CA3BF8EB9D109B91744447375439822E1CE70115CFC7204ACBFB14F4AC21973DFC306CD5D0A71
37,357,246 UART: Caliptra RT
37,357,968 UART: [state] CFI Enabled
37,534,323 UART: [rt] RT listening for mailbox commands...
37,536,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,691,841 UART: [rt]cmd =0x41544d4e, len=14344
41,093,943 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,808,077 ready_for_fw is high
3,808,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,375,348 >>> mbox cmd response: success
28,068,679 UART:
28,069,091 UART: Running Caliptra FMC ...
28,070,218 UART:
28,070,379 UART: [state] CFI Enabled
28,134,826 UART: [fht] FMC Alias Private Key: 7
30,474,882 UART: [art] Extend RT PCRs Done
30,476,108 UART: [art] Lock RT PCRs Done
30,477,764 UART: [art] Populate DV Done
30,483,175 UART: [fht] FMC Alias Private Key: 7
30,484,820 UART: [art] Derive CDI
30,485,555 UART: [art] Store in slot 0x4
30,543,244 UART: [art] Derive Key Pair
30,544,246 UART: [art] Store priv key in slot 0x5
33,836,499 UART: [art] Derive Key Pair - Done
33,849,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,138,998 UART: [art] Erasing AUTHORITY.KEYID = 7
36,140,530 UART: [art] PUB.X = FE21D5DA846F6E3BECCDEFDF17ECB369D5AE224F6764105F063773F9A96354FEBE3F861FA1EE211903D57CAEC727A7C8
36,147,806 UART: [art] PUB.Y = 2E263E73A8CFDA9164EDA71C3CF78A0EB05FE6FD5601316F3461D5711CFC3E2846C06428BBD5BA8B6885264288022949
36,155,066 UART: [art] SIG.R = 424495B511700CDF3B39595E343C94C9D8117092ED115F81D2D2F7E2E077AD3D98C2C57ED6D91B1B79EDDCD1FBC29381
36,162,436 UART: [art] SIG.S = 2800CD13280877234003006CC747968AA65E01EA4125FC380741BE15D0E6F0E1A0C3A024D21DCEB567EA7620DEB85B5F
37,467,372 UART: Caliptra RT
37,468,081 UART: [state] CFI Enabled
37,644,375 UART: [rt] RT listening for mailbox commands...
37,646,671 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,801,933 UART: [rt]cmd =0x41544d4e, len=14344
41,256,444 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,484 writing to cptra_bootfsm_go
192,600 UART:
192,951 UART: Running Caliptra ROM ...
194,052 UART:
603,756 UART: [state] CFI Enabled
618,994 UART: [state] LifecycleState = Unprovisioned
620,954 UART: [state] DebugLocked = No
623,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,326 UART: [kat] SHA2-256
798,101 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,624 UART: [kat] ++
809,067 UART: [kat] sha1
821,026 UART: [kat] SHA2-256
823,745 UART: [kat] SHA2-384
829,654 UART: [kat] SHA2-512-ACC
832,012 UART: [kat] ECC-384
3,116,713 UART: [kat] HMAC-384Kdf
3,128,870 UART: [kat] LMS
4,318,969 UART: [kat] --
4,325,450 UART: [cold-reset] ++
4,326,809 UART: [fht] Storing FHT @ 0x50003400
4,337,648 UART: [idev] ++
4,338,279 UART: [idev] CDI.KEYID = 6
4,339,153 UART: [idev] SUBJECT.KEYID = 7
4,340,461 UART: [idev] UDS.KEYID = 0
4,341,432 ready_for_fw is high
4,341,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,864 UART: [idev] Erasing UDS.KEYID = 0
7,624,427 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,013 UART: [idev] --
7,650,445 UART: [ldev] ++
7,651,064 UART: [ldev] CDI.KEYID = 6
7,652,029 UART: [ldev] SUBJECT.KEYID = 5
7,653,187 UART: [ldev] AUTHORITY.KEYID = 7
7,654,469 UART: [ldev] FE.KEYID = 1
7,666,024 UART: [ldev] Erasing FE.KEYID = 1
10,958,819 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,414 UART: [ldev] --
13,317,934 UART: [fwproc] Waiting for Commands...
13,319,589 UART: [fwproc] Received command 0x46574c44
13,321,796 UART: [fwproc] Received Image of size 118548 bytes
21,690,369 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,771,469 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,844,641 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,173,221 >>> mbox cmd response: success
22,177,572 UART: [afmc] ++
22,178,187 UART: [afmc] CDI.KEYID = 6
22,179,097 UART: [afmc] SUBJECT.KEYID = 7
22,180,315 UART: [afmc] AUTHORITY.KEYID = 5
25,493,145 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,790,519 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,792,768 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,807,255 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,822,066 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,836,478 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,857,801 UART: [afmc] --
27,862,334 UART: [cold-reset] --
27,866,299 UART: [state] Locking Datavault
27,872,833 UART: [state] Locking PCR0, PCR1 and PCR31
27,874,522 UART: [state] Locking ICCM
27,876,807 UART: [exit] Launching FMC @ 0x40000130
27,885,193 UART:
27,885,426 UART: Running Caliptra FMC ...
27,886,521 UART:
27,886,676 UART: [state] CFI Enabled
27,894,503 UART: [fht] FMC Alias Private Key: 7
30,235,008 UART: [art] Extend RT PCRs Done
30,236,244 UART: [art] Lock RT PCRs Done
30,237,894 UART: [art] Populate DV Done
30,243,143 UART: [fht] FMC Alias Private Key: 7
30,244,783 UART: [art] Derive CDI
30,245,589 UART: [art] Store in slot 0x4
30,288,301 UART: [art] Derive Key Pair
30,289,297 UART: [art] Store priv key in slot 0x5
33,530,896 UART: [art] Derive Key Pair - Done
33,544,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,824,766 UART: [art] Erasing AUTHORITY.KEYID = 7
35,826,271 UART: [art] PUB.X = B340ACB8BC17268E9E1E6939E091F8BD857836BD255071FA0ACE77A221B41474B76C02E04E809059F692A73F9620BF21
35,833,500 UART: [art] PUB.Y = CD15698C21E461E7F79811F4DB6AD00580530D0A442C4DAF976862A554C1ECAED61DB48586426933AC87128B4F05AFD3
35,840,752 UART: [art] SIG.R = 01646F81E92B22BE24F0071F1C1ED910A8DC37C9F377091952DC213BFB5BA123AF5E9B2E21BD230ABC84925DDDA80614
35,848,159 UART: [art] SIG.S = CBB4D9A0E4FAD0BD4AD124A6370A84C6AAF95692874751DBC77683C0C419B5A6D575306ADE45773B8C2F61D7121571DA
37,153,253 UART: Caliptra RT
37,153,938 UART: [state] CFI Enabled
37,286,402 UART: [rt] RT listening for mailbox commands...
37,288,707 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,443,909 UART: [rt]cmd =0x41544d4e, len=14344
40,820,070 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,124,673 ready_for_fw is high
4,125,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,263,958 >>> mbox cmd response: success
27,903,091 UART:
27,903,490 UART: Running Caliptra FMC ...
27,904,601 UART:
27,904,751 UART: [state] CFI Enabled
27,912,899 UART: [fht] FMC Alias Private Key: 7
30,252,676 UART: [art] Extend RT PCRs Done
30,253,901 UART: [art] Lock RT PCRs Done
30,255,876 UART: [art] Populate DV Done
30,260,859 UART: [fht] FMC Alias Private Key: 7
30,262,570 UART: [art] Derive CDI
30,263,305 UART: [art] Store in slot 0x4
30,305,799 UART: [art] Derive Key Pair
30,306,836 UART: [art] Store priv key in slot 0x5
33,549,178 UART: [art] Derive Key Pair - Done
33,561,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,841,826 UART: [art] Erasing AUTHORITY.KEYID = 7
35,843,349 UART: [art] PUB.X = BCA3CB6D72E69D8EA1B68DC3FF5C62F3A49567642FCEB009C3641270E33451C070069CD952FE479759938BED5A749BA3
35,850,596 UART: [art] PUB.Y = 54BC43C2471F652120542C1C30433AD37670BF3BB9E48E88C486B802CC5FE98FBF0FAB62AFF1BC894B566EDB545E0F86
35,857,869 UART: [art] SIG.R = ED16B18A427CCD4D8448005349ACE0F0121BC28D2DDF3C8BE596D84D3604867C21010C0153A10867FA7715198590823F
35,865,207 UART: [art] SIG.S = A6D60286950F09FC7C360B628CAD01CDF078B6EE76CBC64089F29A37E45327B8F9991340E643CEE88AABA9F782DB8090
37,170,171 UART: Caliptra RT
37,170,863 UART: [state] CFI Enabled
37,304,713 UART: [rt] RT listening for mailbox commands...
37,307,017 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,462,336 UART: [rt]cmd =0x41544d4e, len=14344
40,761,669 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,071 UART:
192,437 UART: Running Caliptra ROM ...
193,654 UART:
194,235 UART: [state] CFI Enabled
261,512 UART: [state] LifecycleState = Unprovisioned
263,378 UART: [state] DebugLocked = No
265,245 UART: [state] WD Timer not started. Device not locked for debugging
268,346 UART: [kat] SHA2-256
448,053 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,801 UART: [kat] ++
459,269 UART: [kat] sha1
470,283 UART: [kat] SHA2-256
472,999 UART: [kat] SHA2-384
478,130 UART: [kat] SHA2-512-ACC
480,491 UART: [kat] ECC-384
2,927,291 UART: [kat] HMAC-384Kdf
2,949,007 UART: [kat] LMS
3,425,561 UART: [kat] --
3,429,350 UART: [cold-reset] ++
3,430,422 UART: [fht] FHT @ 0x50003400
3,441,742 UART: [idev] ++
3,442,368 UART: [idev] CDI.KEYID = 6
3,443,249 UART: [idev] SUBJECT.KEYID = 7
3,444,560 UART: [idev] UDS.KEYID = 0
3,445,453 ready_for_fw is high
3,445,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,594,821 UART: [idev] Erasing UDS.KEYID = 0
5,966,450 UART: [idev] Sha1 KeyId Algorithm
5,989,791 UART: [idev] --
5,994,867 UART: [ldev] ++
5,995,435 UART: [ldev] CDI.KEYID = 6
5,996,399 UART: [ldev] SUBJECT.KEYID = 5
5,997,574 UART: [ldev] AUTHORITY.KEYID = 7
5,998,870 UART: [ldev] FE.KEYID = 1
6,037,033 UART: [ldev] Erasing FE.KEYID = 1
8,543,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,151 UART: [ldev] --
10,351,925 UART: [fwproc] Wait for Commands...
10,355,095 UART: [fwproc] Recv command 0x46574c44
10,357,121 UART: [fwproc] Recv'd Img size: 118548 bytes
14,893,962 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,977,226 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,050,241 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,378,599 >>> mbox cmd response: success
15,383,016 UART: [afmc] ++
15,383,608 UART: [afmc] CDI.KEYID = 6
15,384,517 UART: [afmc] SUBJECT.KEYID = 7
15,385,732 UART: [afmc] AUTHORITY.KEYID = 5
17,918,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,645,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,647,657 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,663,542 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,679,481 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,695,137 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,718,676 UART: [afmc] --
19,722,098 UART: [cold-reset] --
19,725,426 UART: [state] Locking Datavault
19,729,643 UART: [state] Locking PCR0, PCR1 and PCR31
19,731,390 UART: [state] Locking ICCM
19,732,649 UART: [exit] Launching FMC @ 0x40000130
19,741,057 UART:
19,741,294 UART: Running Caliptra FMC ...
19,742,317 UART:
19,742,462 UART: [state] CFI Enabled
19,801,285 UART: [fht] FMC Alias Private Key: 7
21,567,965 UART: [art] Extend RT PCRs Done
21,569,192 UART: [art] Lock RT PCRs Done
21,570,794 UART: [art] Populate DV Done
21,576,477 UART: [fht] FMC Alias Private Key: 7
21,578,069 UART: [art] Derive CDI
21,578,831 UART: [art] Store in slot 0x4
21,634,519 UART: [art] Derive Key Pair
21,635,560 UART: [art] Store priv key in slot 0x5
24,098,530 UART: [art] Derive Key Pair - Done
24,111,526 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,824,542 UART: [art] Erasing AUTHORITY.KEYID = 7
25,826,065 UART: [art] PUB.X = FF09E58494C92344A4D6767BDDE54BD2E95B7520A36787C90487A89300EE7A2CEF187993BE5FEF3A3AF3D854D5076B8F
25,833,319 UART: [art] PUB.Y = 2C77456BA8E67FC1A38340B0311B42C3A8BCDA4853A1A6F71CAD705BD8DED6960270CA9217DF3EE099B08A4ABB555BAD
25,840,611 UART: [art] SIG.R = AED45B70C844545FF5ED5012B9E90EBA2FE4D6946580E1D6BAD63D1B033D8B5C801F96C8E091807CCA6050467FB8F8AB
25,848,000 UART: [art] SIG.S = 7471B7D9284E7D73E61623DD1B5586785530892A42B13147FE23009877B9330783C7B387B345A13E0FB94FFC6856D082
26,826,803 UART: Caliptra RT
26,827,518 UART: [state] CFI Enabled
27,009,177 UART: [rt] RT listening for mailbox commands...
27,011,480 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,166,707 UART: [rt]cmd =0x41544d4e, len=14344
29,327,661 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,481,622 ready_for_fw is high
3,482,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,418,163 >>> mbox cmd response: success
19,703,992 UART:
19,704,395 UART: Running Caliptra FMC ...
19,705,512 UART:
19,705,662 UART: [state] CFI Enabled
19,772,325 UART: [fht] FMC Alias Private Key: 7
21,537,809 UART: [art] Extend RT PCRs Done
21,539,022 UART: [art] Lock RT PCRs Done
21,540,488 UART: [art] Populate DV Done
21,545,908 UART: [fht] FMC Alias Private Key: 7
21,547,562 UART: [art] Derive CDI
21,548,376 UART: [art] Store in slot 0x4
21,604,611 UART: [art] Derive Key Pair
21,605,665 UART: [art] Store priv key in slot 0x5
24,068,319 UART: [art] Derive Key Pair - Done
24,081,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,794,922 UART: [art] Erasing AUTHORITY.KEYID = 7
25,796,401 UART: [art] PUB.X = 3B96B0AE8F0C0EDC1E5B1BD9D618EF61A5D019A08729B79CB4517B2991AE0175F78C46C8F7DD93249F0335187C8DF33C
25,803,712 UART: [art] PUB.Y = 02B3A111AB43D2C36FCEFE50E61B27946E05C529D346F691BA373B6D0A538FE7E065AA168C6827A175307B9A0803F3BE
25,810,948 UART: [art] SIG.R = E27FB4B4B862672A5B80137BF552998904691A53E6CADE1E2ABA20264513136F170EA4DB30E98B2C20A58009F2155BAA
25,818,336 UART: [art] SIG.S = 691DBACF21509E894BA74039A203D2FF9DABA4E1085BE456426BDD88029B32A0E06169250C3C727B6269F587CA9593C2
26,797,290 UART: Caliptra RT
26,798,002 UART: [state] CFI Enabled
26,978,602 UART: [rt] RT listening for mailbox commands...
26,980,906 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,136,212 UART: [rt]cmd =0x41544d4e, len=14344
29,294,876 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,503 UART:
192,856 UART: Running Caliptra ROM ...
194,023 UART:
603,830 UART: [state] CFI Enabled
615,321 UART: [state] LifecycleState = Unprovisioned
617,230 UART: [state] DebugLocked = No
618,965 UART: [state] WD Timer not started. Device not locked for debugging
622,009 UART: [kat] SHA2-256
801,619 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,413 UART: [kat] ++
812,862 UART: [kat] sha1
823,947 UART: [kat] SHA2-256
826,683 UART: [kat] SHA2-384
832,062 UART: [kat] SHA2-512-ACC
834,440 UART: [kat] ECC-384
3,278,446 UART: [kat] HMAC-384Kdf
3,291,895 UART: [kat] LMS
3,768,436 UART: [kat] --
3,771,745 UART: [cold-reset] ++
3,773,473 UART: [fht] FHT @ 0x50003400
3,785,311 UART: [idev] ++
3,785,882 UART: [idev] CDI.KEYID = 6
3,786,811 UART: [idev] SUBJECT.KEYID = 7
3,788,060 UART: [idev] UDS.KEYID = 0
3,788,998 ready_for_fw is high
3,789,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,195 UART: [idev] Erasing UDS.KEYID = 0
6,263,082 UART: [idev] Sha1 KeyId Algorithm
6,287,011 UART: [idev] --
6,290,649 UART: [ldev] ++
6,291,258 UART: [ldev] CDI.KEYID = 6
6,292,146 UART: [ldev] SUBJECT.KEYID = 5
6,293,361 UART: [ldev] AUTHORITY.KEYID = 7
6,294,597 UART: [ldev] FE.KEYID = 1
6,306,135 UART: [ldev] Erasing FE.KEYID = 1
8,785,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,997 UART: [ldev] --
10,578,960 UART: [fwproc] Wait for Commands...
10,581,112 UART: [fwproc] Recv command 0x46574c44
10,583,097 UART: [fwproc] Recv'd Img size: 118548 bytes
15,117,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,204,133 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,277,151 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,606,105 >>> mbox cmd response: success
15,609,734 UART: [afmc] ++
15,610,357 UART: [afmc] CDI.KEYID = 6
15,611,280 UART: [afmc] SUBJECT.KEYID = 7
15,612,500 UART: [afmc] AUTHORITY.KEYID = 5
18,120,595 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,842,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,844,433 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,860,316 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,876,239 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,891,969 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,916,779 UART: [afmc] --
19,920,163 UART: [cold-reset] --
19,922,999 UART: [state] Locking Datavault
19,928,049 UART: [state] Locking PCR0, PCR1 and PCR31
19,929,819 UART: [state] Locking ICCM
19,931,595 UART: [exit] Launching FMC @ 0x40000130
19,940,052 UART:
19,940,301 UART: Running Caliptra FMC ...
19,941,357 UART:
19,941,513 UART: [state] CFI Enabled
19,949,512 UART: [fht] FMC Alias Private Key: 7
21,715,732 UART: [art] Extend RT PCRs Done
21,716,958 UART: [art] Lock RT PCRs Done
21,718,426 UART: [art] Populate DV Done
21,723,952 UART: [fht] FMC Alias Private Key: 7
21,725,442 UART: [art] Derive CDI
21,726,204 UART: [art] Store in slot 0x4
21,768,716 UART: [art] Derive Key Pair
21,769,766 UART: [art] Store priv key in slot 0x5
24,196,825 UART: [art] Derive Key Pair - Done
24,209,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,916,145 UART: [art] Erasing AUTHORITY.KEYID = 7
25,917,656 UART: [art] PUB.X = B19FD8B7A825CA04AA3B2197EA38EED221C3F9C60309946EDC6800CFDD4B00D60234A1819C32187EABCDB6E534D935EF
25,924,899 UART: [art] PUB.Y = CD1DA0EF77AFF08BE2B6BECBBB6F1B5E323BCC1CFFDA9E41A2DCAAFEEB7C030482ACB4CE497D83FFF3F330A5E028B196
25,932,246 UART: [art] SIG.R = 6A8888DE3472BC37C30DBA090E299BBA7F31AB6BBB5FDBAEB3C73BBF8FB03E85EB6F32AB410EA545BC0E039282A2826C
25,939,637 UART: [art] SIG.S = F4284A4BC3B21B4DAE70D455ECCA117D4DC2A9D76B1596118961913FDFCB502629D629C7464C171B060D8B34C9C03983
26,918,126 UART: Caliptra RT
26,918,837 UART: [state] CFI Enabled
27,052,335 UART: [rt] RT listening for mailbox commands...
27,054,628 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,209,923 UART: [rt]cmd =0x41544d4e, len=14344
29,371,968 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,777,558 ready_for_fw is high
3,777,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,616,504 >>> mbox cmd response: success
19,866,484 UART:
19,866,891 UART: Running Caliptra FMC ...
19,868,043 UART:
19,868,210 UART: [state] CFI Enabled
19,876,107 UART: [fht] FMC Alias Private Key: 7
21,641,998 UART: [art] Extend RT PCRs Done
21,643,230 UART: [art] Lock RT PCRs Done
21,644,588 UART: [art] Populate DV Done
21,649,815 UART: [fht] FMC Alias Private Key: 7
21,651,521 UART: [art] Derive CDI
21,652,343 UART: [art] Store in slot 0x4
21,695,003 UART: [art] Derive Key Pair
21,696,017 UART: [art] Store priv key in slot 0x5
24,122,719 UART: [art] Derive Key Pair - Done
24,135,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,842,169 UART: [art] Erasing AUTHORITY.KEYID = 7
25,843,700 UART: [art] PUB.X = 0EEE6F38D4F140ECE0FC5192A16778F1C20B80F4CF76FAD2C9E64B1BD69512F18EA0D62E447A4ED67181A7EE3B67841C
25,850,963 UART: [art] PUB.Y = 772F43BEEFE12830064A6BC769DC01165B8972561D6D1F74B8A03B924EDC3FB8DED494946EFBDFF5CE5B38063669E3F0
25,858,221 UART: [art] SIG.R = B31EAD3FDDB69BAA1438BFD2C1C6A58D61660887FEFB3F7797241C3427D54591723D1665A133A982C5503F48D7055AE2
25,865,631 UART: [art] SIG.S = EC3642E5FC35E697908223CF3B37497EA69FAC295C82179E21B8674A8A596F9EB24F5ADF64DDB8C50A97EBE09C7EAA6E
26,844,352 UART: Caliptra RT
26,845,066 UART: [state] CFI Enabled
26,977,839 UART: [rt] RT listening for mailbox commands...
26,980,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,135,882 UART: [rt]cmd =0x41544d4e, len=14344
29,298,762 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,284 UART:
192,672 UART: Running Caliptra ROM ...
193,765 UART:
193,914 UART: [state] CFI Enabled
264,117 UART: [state] LifecycleState = Unprovisioned
266,470 UART: [state] DebugLocked = No
268,278 UART: [state] WD Timer not started. Device not locked for debugging
272,455 UART: [kat] SHA2-256
462,383 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,141 UART: [kat] ++
473,600 UART: [kat] sha1
485,042 UART: [kat] SHA2-256
488,050 UART: [kat] SHA2-384
494,334 UART: [kat] SHA2-512-ACC
496,911 UART: [kat] ECC-384
2,949,751 UART: [kat] HMAC-384Kdf
2,971,875 UART: [kat] LMS
3,503,629 UART: [kat] --
3,508,446 UART: [cold-reset] ++
3,509,601 UART: [fht] FHT @ 0x50003400
3,521,644 UART: [idev] ++
3,522,357 UART: [idev] CDI.KEYID = 6
3,523,386 UART: [idev] SUBJECT.KEYID = 7
3,524,486 UART: [idev] UDS.KEYID = 0
3,525,426 ready_for_fw is high
3,525,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,222 UART: [idev] Erasing UDS.KEYID = 0
6,028,889 UART: [idev] Sha1 KeyId Algorithm
6,051,087 UART: [idev] --
6,056,912 UART: [ldev] ++
6,057,654 UART: [ldev] CDI.KEYID = 6
6,058,563 UART: [ldev] SUBJECT.KEYID = 5
6,059,721 UART: [ldev] AUTHORITY.KEYID = 7
6,060,971 UART: [ldev] FE.KEYID = 1
6,099,649 UART: [ldev] Erasing FE.KEYID = 1
8,607,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,148 UART: [ldev] --
10,415,085 UART: [fwproc] Wait for Commands...
10,416,690 UART: [fwproc] Recv command 0x46574c44
10,418,991 UART: [fwproc] Recv'd Img size: 118548 bytes
15,079,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,164,705 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,288,360 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,848,977 >>> mbox cmd response: success
15,852,654 UART: [afmc] ++
15,853,375 UART: [afmc] CDI.KEYID = 6
15,854,480 UART: [afmc] SUBJECT.KEYID = 7
15,856,029 UART: [afmc] AUTHORITY.KEYID = 5
18,385,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,106,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,108,492 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,123,604 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,138,821 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,153,839 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,178,427 UART: [afmc] --
20,182,020 UART: [cold-reset] --
20,186,536 UART: [state] Locking Datavault
20,191,737 UART: [state] Locking PCR0, PCR1 and PCR31
20,193,891 UART: [state] Locking ICCM
20,195,010 UART: [exit] Launching FMC @ 0x40000130
20,203,685 UART:
20,203,959 UART: Running Caliptra FMC ...
20,205,067 UART:
20,205,232 UART: [state] CFI Enabled
20,264,774 UART: [fht] FMC Alias Private Key: 7
22,031,817 UART: [art] Extend RT PCRs Done
22,033,027 UART: [art] Lock RT PCRs Done
22,034,438 UART: [art] Populate DV Done
22,040,010 UART: [fht] FMC Alias Private Key: 7
22,041,707 UART: [art] Derive CDI
22,042,534 UART: [art] Store in slot 0x4
22,097,521 UART: [art] Derive Key Pair
22,098,519 UART: [art] Store priv key in slot 0x5
24,561,324 UART: [art] Derive Key Pair - Done
24,574,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,287,019 UART: [art] Erasing AUTHORITY.KEYID = 7
26,288,516 UART: [art] PUB.X = 518415EA3A2D6D3D7094DE5CDB7C909189D27C7423633B45A6A57B6C0FF65F83B149CD3D79FA0BB423F583A24CF70747
26,295,824 UART: [art] PUB.Y = 74A99839990CD597B3CA4BCBDF78CE07C0ABCB734212831FF36BFB29EDFB2D41A08FF5316301FF80638161F38E171591
26,303,033 UART: [art] SIG.R = D3ED1AE8F8DFB33A1E10276EE3363817B602E97A3F7031AE36AAB4921D3245E32C7B5A90BFE81A55796CFB0F530EA3C9
26,310,464 UART: [art] SIG.S = 5129E5BD29FFC4F0D2C53B9B4B73CB477A662A0C66C414C998FC2E6232F130750A258C2AB4451D8265557C0B5000D407
27,288,902 UART: Caliptra RT
27,289,612 UART: [state] CFI Enabled
27,469,948 UART: [rt] RT listening for mailbox commands...
27,472,251 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,627,846 UART: [rt]cmd =0x41544d4e, len=14344
29,790,524 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,420,384 ready_for_fw is high
3,420,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,911,039 >>> mbox cmd response: success
20,198,829 UART:
20,199,266 UART: Running Caliptra FMC ...
20,200,370 UART:
20,200,532 UART: [state] CFI Enabled
20,267,692 UART: [fht] FMC Alias Private Key: 7
22,034,219 UART: [art] Extend RT PCRs Done
22,035,463 UART: [art] Lock RT PCRs Done
22,036,848 UART: [art] Populate DV Done
22,042,158 UART: [fht] FMC Alias Private Key: 7
22,043,699 UART: [art] Derive CDI
22,044,519 UART: [art] Store in slot 0x4
22,101,293 UART: [art] Derive Key Pair
22,102,310 UART: [art] Store priv key in slot 0x5
24,564,720 UART: [art] Derive Key Pair - Done
24,577,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,290,694 UART: [art] Erasing AUTHORITY.KEYID = 7
26,292,201 UART: [art] PUB.X = 3DDA91920CE3EC9EB5BC00C4D441A513A7405A2206AA076C64CDB1DC61D5FBB3AF12D804625D1E773414C7DB877738C9
26,299,477 UART: [art] PUB.Y = 3F675B54EB67012792FAE7FFC79D7324F441DAD75D2242AAA1A348D692414B3C3429221EA3BFAD4946ECA951C261F994
26,306,686 UART: [art] SIG.R = 6D8CB11E16625E4C72F0973BC99B295F3BF5B2C7A62A4C158F1DE1DA986EFE275C8917CFDFCEA680133D7685F1D957A3
26,314,104 UART: [art] SIG.S = CF3D1341560A335B27712913ABD7364642F8A520319DB3FD709B66C5F2FBCE5BBD343C7D369BC9958BF9EC663CC56845
27,293,121 UART: Caliptra RT
27,293,813 UART: [state] CFI Enabled
27,474,159 UART: [rt] RT listening for mailbox commands...
27,476,480 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,631,699 UART: [rt]cmd =0x41544d4e, len=14344
29,791,787 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,902 writing to cptra_bootfsm_go
194,154 UART:
194,502 UART: Running Caliptra ROM ...
195,603 UART:
605,279 UART: [state] CFI Enabled
622,499 UART: [state] LifecycleState = Unprovisioned
624,841 UART: [state] DebugLocked = No
626,731 UART: [state] WD Timer not started. Device not locked for debugging
630,771 UART: [kat] SHA2-256
820,652 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,462 UART: [kat] ++
832,069 UART: [kat] sha1
842,246 UART: [kat] SHA2-256
845,256 UART: [kat] SHA2-384
850,895 UART: [kat] SHA2-512-ACC
853,424 UART: [kat] ECC-384
3,296,125 UART: [kat] HMAC-384Kdf
3,308,388 UART: [kat] LMS
3,840,225 UART: [kat] --
3,844,455 UART: [cold-reset] ++
3,846,788 UART: [fht] FHT @ 0x50003400
3,857,495 UART: [idev] ++
3,858,229 UART: [idev] CDI.KEYID = 6
3,859,147 UART: [idev] SUBJECT.KEYID = 7
3,860,324 UART: [idev] UDS.KEYID = 0
3,861,252 ready_for_fw is high
3,861,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,454 UART: [idev] Erasing UDS.KEYID = 0
6,333,813 UART: [idev] Sha1 KeyId Algorithm
6,356,513 UART: [idev] --
6,362,457 UART: [ldev] ++
6,363,143 UART: [ldev] CDI.KEYID = 6
6,364,057 UART: [ldev] SUBJECT.KEYID = 5
6,365,224 UART: [ldev] AUTHORITY.KEYID = 7
6,366,465 UART: [ldev] FE.KEYID = 1
6,377,167 UART: [ldev] Erasing FE.KEYID = 1
8,857,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,533 UART: [ldev] --
10,646,946 UART: [fwproc] Wait for Commands...
10,649,653 UART: [fwproc] Recv command 0x46574c44
10,651,967 UART: [fwproc] Recv'd Img size: 118548 bytes
15,319,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,406,819 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,530,444 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,091,126 >>> mbox cmd response: success
16,094,459 UART: [afmc] ++
16,095,175 UART: [afmc] CDI.KEYID = 6
16,096,374 UART: [afmc] SUBJECT.KEYID = 7
16,097,879 UART: [afmc] AUTHORITY.KEYID = 5
18,601,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,323,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,325,202 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,340,260 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,355,511 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,370,547 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,394,091 UART: [afmc] --
20,398,131 UART: [cold-reset] --
20,402,064 UART: [state] Locking Datavault
20,409,271 UART: [state] Locking PCR0, PCR1 and PCR31
20,411,496 UART: [state] Locking ICCM
20,413,061 UART: [exit] Launching FMC @ 0x40000130
20,421,762 UART:
20,422,001 UART: Running Caliptra FMC ...
20,423,114 UART:
20,423,284 UART: [state] CFI Enabled
20,430,957 UART: [fht] FMC Alias Private Key: 7
22,197,650 UART: [art] Extend RT PCRs Done
22,198,861 UART: [art] Lock RT PCRs Done
22,200,464 UART: [art] Populate DV Done
22,205,932 UART: [fht] FMC Alias Private Key: 7
22,207,526 UART: [art] Derive CDI
22,208,267 UART: [art] Store in slot 0x4
22,251,022 UART: [art] Derive Key Pair
22,252,059 UART: [art] Store priv key in slot 0x5
24,678,346 UART: [art] Derive Key Pair - Done
24,691,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,397,520 UART: [art] Erasing AUTHORITY.KEYID = 7
26,399,025 UART: [art] PUB.X = 2AC60579EF70449499F0DBA1EEB4F5E81F41BF1045B85A7CA2C388A7E421837067169CCC594507FEEEC47099CA066B9F
26,406,322 UART: [art] PUB.Y = 6D15D81EE7239D3D0BEF177BFEC5790B4F11135495DF1045D03884145A9B24330CC5CD521C41E1A5095B990CEBCA0E33
26,413,537 UART: [art] SIG.R = A3474D8BD05538BBAAD5051EB4B80F5523D50972B3961F2DCA7E3C95753F84BCA789F0E9264D152CE99E1FF654390C51
26,420,957 UART: [art] SIG.S = 33378963B10581AA27C8D029585F207B8B7544841F1D22682DB7D7E53D0661C41C0D855C4EE79E0812D956200FE331CA
27,399,739 UART: Caliptra RT
27,400,472 UART: [state] CFI Enabled
27,533,320 UART: [rt] RT listening for mailbox commands...
27,535,663 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,691,194 UART: [rt]cmd =0x41544d4e, len=14344
29,852,808 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,754,457 ready_for_fw is high
3,754,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,163,324 >>> mbox cmd response: success
20,415,671 UART:
20,416,112 UART: Running Caliptra FMC ...
20,417,260 UART:
20,417,429 UART: [state] CFI Enabled
20,425,542 UART: [fht] FMC Alias Private Key: 7
22,191,232 UART: [art] Extend RT PCRs Done
22,192,459 UART: [art] Lock RT PCRs Done
22,194,088 UART: [art] Populate DV Done
22,199,566 UART: [fht] FMC Alias Private Key: 7
22,201,169 UART: [art] Derive CDI
22,201,989 UART: [art] Store in slot 0x4
22,244,643 UART: [art] Derive Key Pair
22,245,688 UART: [art] Store priv key in slot 0x5
24,671,991 UART: [art] Derive Key Pair - Done
24,684,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,390,902 UART: [art] Erasing AUTHORITY.KEYID = 7
26,392,410 UART: [art] PUB.X = 398E3CB9DE31A39825D37ECCDA165C571C81BE254EA2AF6980D2041E000B5A3B7AF530B7B6A6819518E06F411DD057F4
26,399,670 UART: [art] PUB.Y = DC22C01F5098B8D8FFE6FF6FAD0EA80AF57CE4CBBAFB55943BA0F87B9F694A063644570DE1752680CB71AD0551F5A700
26,406,889 UART: [art] SIG.R = 60582CDB672AEABB1CEF08F5F9F4E958BD57F0AE9ED5DEA03F0AD3A6623A67E11B9A817BBABAE1437AE9A9CD746F0A7B
26,414,347 UART: [art] SIG.S = D33CE66866E84FB0425FDBDF27146DCCE544A678067257222CD44C2B316E8FC67BACD0E31C5C04E623525A858CE5AA6C
27,392,646 UART: Caliptra RT
27,393,348 UART: [state] CFI Enabled
27,526,851 UART: [rt] RT listening for mailbox commands...
27,529,167 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,684,467 UART: [rt]cmd =0x41544d4e, len=14344
29,846,244 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,431 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,147 UART: [kat] SHA2-256
882,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,193 UART: [kat] ++
886,345 UART: [kat] sha1
890,445 UART: [kat] SHA2-256
892,383 UART: [kat] SHA2-384
895,188 UART: [kat] SHA2-512-ACC
897,089 UART: [kat] ECC-384
902,826 UART: [kat] HMAC-384Kdf
907,580 UART: [kat] LMS
1,475,776 UART: [kat] --
1,476,643 UART: [cold-reset] ++
1,477,113 UART: [fht] Storing FHT @ 0x50003400
1,479,928 UART: [idev] ++
1,480,096 UART: [idev] CDI.KEYID = 6
1,480,456 UART: [idev] SUBJECT.KEYID = 7
1,480,880 UART: [idev] UDS.KEYID = 0
1,481,225 ready_for_fw is high
1,481,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,218 UART: [idev] Erasing UDS.KEYID = 0
1,505,816 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,590 UART: [idev] --
1,515,747 UART: [ldev] ++
1,515,915 UART: [ldev] CDI.KEYID = 6
1,516,278 UART: [ldev] SUBJECT.KEYID = 5
1,516,704 UART: [ldev] AUTHORITY.KEYID = 7
1,517,167 UART: [ldev] FE.KEYID = 1
1,522,265 UART: [ldev] Erasing FE.KEYID = 1
1,547,742 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,660 UART: [ldev] --
1,587,113 UART: [fwproc] Waiting for Commands...
1,587,862 UART: [fwproc] Received command 0x46574c44
1,588,653 UART: [fwproc] Received Image of size 118548 bytes
5,169,758 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,197,060 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,228,278 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,368,557 >>> mbox cmd response: success
5,369,795 UART: [afmc] ++
5,369,963 UART: [afmc] CDI.KEYID = 6
5,370,325 UART: [afmc] SUBJECT.KEYID = 7
5,370,750 UART: [afmc] AUTHORITY.KEYID = 5
5,406,249 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,422,331 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,423,111 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,428,817 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,434,696 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,440,409 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,448,186 UART: [afmc] --
5,449,132 UART: [cold-reset] --
5,449,948 UART: [state] Locking Datavault
5,451,151 UART: [state] Locking PCR0, PCR1 and PCR31
5,451,755 UART: [state] Locking ICCM
5,452,199 UART: [exit] Launching FMC @ 0x40000130
5,457,529 UART:
5,457,545 UART: Running Caliptra FMC ...
5,457,953 UART:
5,458,007 UART: [state] CFI Enabled
5,468,447 UART: [fht] FMC Alias Private Key: 7
5,587,445 UART: [art] Extend RT PCRs Done
5,587,873 UART: [art] Lock RT PCRs Done
5,589,299 UART: [art] Populate DV Done
5,597,508 UART: [fht] FMC Alias Private Key: 7
5,598,570 UART: [art] Derive CDI
5,598,850 UART: [art] Store in slot 0x4
5,684,372 UART: [art] Derive Key Pair
5,684,732 UART: [art] Store priv key in slot 0x5
5,697,793 UART: [art] Derive Key Pair - Done
5,712,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,727,931 UART: [art] Erasing AUTHORITY.KEYID = 7
5,728,696 UART: [art] PUB.X = 172234436B53A2CCE8BCEB209D1A22516965342CAFD2BDFB77A45066F5D831710FC8D42D3560920CCB36887602E306C1
5,735,454 UART: [art] PUB.Y = 45437B62F6F88BB7B94653E870D45DDD655E68F9F0EA5EFA2F6E5684F82191A2E96BB52D2636448E3BFAE7F4E9C94B01
5,742,411 UART: [art] SIG.R = 8AB10B02F6A93EEB8E39E376C71C7147159E455EFC501393DDB735EC758FA45886374D9D76FE5180A4B6B2A044576250
5,749,175 UART: [art] SIG.S = 54FB327F55A92058F3C0339266B6B4448AA6B5C26EDF6010EB61084BE4B7DDF998BF243033351116049165488C483A67
5,773,669 UART: Caliptra RT
5,773,920 UART: [state] CFI Enabled
5,892,876 UART: [rt] RT listening for mailbox commands...
5,893,546 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,016,572 UART: [rt]cmd =0x41544d4e, len=14344
7,064,009 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,145 ready_for_fw is high
1,363,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,294,801 >>> mbox cmd response: success
5,356,388 UART:
5,356,404 UART: Running Caliptra FMC ...
5,356,812 UART:
5,356,866 UART: [state] CFI Enabled
5,367,746 UART: [fht] FMC Alias Private Key: 7
5,486,386 UART: [art] Extend RT PCRs Done
5,486,814 UART: [art] Lock RT PCRs Done
5,488,238 UART: [art] Populate DV Done
5,496,463 UART: [fht] FMC Alias Private Key: 7
5,497,485 UART: [art] Derive CDI
5,497,765 UART: [art] Store in slot 0x4
5,584,041 UART: [art] Derive Key Pair
5,584,401 UART: [art] Store priv key in slot 0x5
5,597,724 UART: [art] Derive Key Pair - Done
5,612,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,627,910 UART: [art] Erasing AUTHORITY.KEYID = 7
5,628,675 UART: [art] PUB.X = DE664487E7F7515AE267EF84B9AE643475AAAF436D79D78D5FC4292BB3FC5D94CB6CA34C2A558B5B2A97BDD3ACA32474
5,635,463 UART: [art] PUB.Y = 637AD023A76F3250C1B0CF9059E8C2A49F6807345BC7AFDD4F8D19DCA6E04EB9EAC750FD2023163F6BCD8DC86C8687B3
5,642,426 UART: [art] SIG.R = 9A4F8795DB867CD599B7FBEF6F7B509EAC02845776A376C6CB65629EC913B51CD79802C7D3B54D7F04C642D27BDA9C07
5,649,194 UART: [art] SIG.S = 2CA0195A2C7E012E2D51BB0FC360DBF68A6F919CF7F4D1D2DE757D3E1D5185ACC35F5025F7E0E656FDAA16836B6E9B25
5,672,932 UART: Caliptra RT
5,673,183 UART: [state] CFI Enabled
5,793,387 UART: [rt] RT listening for mailbox commands...
5,794,057 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,917,403 UART: [rt]cmd =0x41544d4e, len=14344
7,078,231 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.77s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,598 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,178 UART: [kat] SHA2-256
882,109 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,224 UART: [kat] ++
886,376 UART: [kat] sha1
890,404 UART: [kat] SHA2-256
892,342 UART: [kat] SHA2-384
895,079 UART: [kat] SHA2-512-ACC
896,980 UART: [kat] ECC-384
902,785 UART: [kat] HMAC-384Kdf
907,415 UART: [kat] LMS
1,475,611 UART: [kat] --
1,476,388 UART: [cold-reset] ++
1,476,716 UART: [fht] Storing FHT @ 0x50003400
1,479,441 UART: [idev] ++
1,479,609 UART: [idev] CDI.KEYID = 6
1,479,969 UART: [idev] SUBJECT.KEYID = 7
1,480,393 UART: [idev] UDS.KEYID = 0
1,480,738 ready_for_fw is high
1,480,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,497 UART: [idev] Erasing UDS.KEYID = 0
1,505,237 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,963 UART: [idev] --
1,514,990 UART: [ldev] ++
1,515,158 UART: [ldev] CDI.KEYID = 6
1,515,521 UART: [ldev] SUBJECT.KEYID = 5
1,515,947 UART: [ldev] AUTHORITY.KEYID = 7
1,516,410 UART: [ldev] FE.KEYID = 1
1,521,702 UART: [ldev] Erasing FE.KEYID = 1
1,547,757 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,751 UART: [ldev] --
1,587,084 UART: [fwproc] Waiting for Commands...
1,587,867 UART: [fwproc] Received command 0x46574c44
1,588,658 UART: [fwproc] Received Image of size 118548 bytes
5,131,771 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,159,689 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,190,907 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,331,344 >>> mbox cmd response: success
5,332,392 UART: [afmc] ++
5,332,560 UART: [afmc] CDI.KEYID = 6
5,332,922 UART: [afmc] SUBJECT.KEYID = 7
5,333,347 UART: [afmc] AUTHORITY.KEYID = 5
5,368,192 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,384,374 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,385,154 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,390,860 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,396,739 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,402,452 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,410,083 UART: [afmc] --
5,411,029 UART: [cold-reset] --
5,412,037 UART: [state] Locking Datavault
5,413,492 UART: [state] Locking PCR0, PCR1 and PCR31
5,414,096 UART: [state] Locking ICCM
5,414,642 UART: [exit] Launching FMC @ 0x40000130
5,419,972 UART:
5,419,988 UART: Running Caliptra FMC ...
5,420,396 UART:
5,420,539 UART: [state] CFI Enabled
5,431,555 UART: [fht] FMC Alias Private Key: 7
5,550,465 UART: [art] Extend RT PCRs Done
5,550,893 UART: [art] Lock RT PCRs Done
5,552,169 UART: [art] Populate DV Done
5,560,356 UART: [fht] FMC Alias Private Key: 7
5,561,324 UART: [art] Derive CDI
5,561,604 UART: [art] Store in slot 0x4
5,647,398 UART: [art] Derive Key Pair
5,647,758 UART: [art] Store priv key in slot 0x5
5,660,713 UART: [art] Derive Key Pair - Done
5,675,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,690,547 UART: [art] Erasing AUTHORITY.KEYID = 7
5,691,312 UART: [art] PUB.X = A7337F04329EE935F5721E469F373169D0D42E05F0F96887ED5C46AB46F5FBE0E943F9FA25463DF81EA77E82669DD8BB
5,698,082 UART: [art] PUB.Y = E569987A2D8743C3C8715D2B0DA79BBDE36DA7901947395854B52E65D79CA7793FDBD2C6A350B0359D1A80E0B9CADDB2
5,705,039 UART: [art] SIG.R = 11F3FFA56D772F5812476F0E38B036C57C135064588765E653B2B8E3C989369AFA3C9BA48A209DFB0581378452AA3A32
5,711,799 UART: [art] SIG.S = 8A4E73D34832401BD2AC9A78D4D50BA767257310547DC8CDCA235389738FC5A2591D280BE142FDC399070985BF02B35C
5,735,288 UART: Caliptra RT
5,735,631 UART: [state] CFI Enabled
5,855,915 UART: [rt] RT listening for mailbox commands...
5,856,585 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,979,633 UART: [rt]cmd =0x41544d4e, len=14344
7,254,060 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,356 ready_for_fw is high
1,362,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,143,036 >>> mbox cmd response: success
5,204,959 UART:
5,204,975 UART: Running Caliptra FMC ...
5,205,383 UART:
5,205,526 UART: [state] CFI Enabled
5,215,992 UART: [fht] FMC Alias Private Key: 7
5,334,866 UART: [art] Extend RT PCRs Done
5,335,294 UART: [art] Lock RT PCRs Done
5,337,118 UART: [art] Populate DV Done
5,345,313 UART: [fht] FMC Alias Private Key: 7
5,346,411 UART: [art] Derive CDI
5,346,691 UART: [art] Store in slot 0x4
5,432,369 UART: [art] Derive Key Pair
5,432,729 UART: [art] Store priv key in slot 0x5
5,446,182 UART: [art] Derive Key Pair - Done
5,460,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,476,370 UART: [art] Erasing AUTHORITY.KEYID = 7
5,477,135 UART: [art] PUB.X = 234E57326B80411E4CFAB940A8B4FA9BFE1940D59571AE79D34D2B4E6DA98119B39CE160183278E4C781C2897F9D36E7
5,483,907 UART: [art] PUB.Y = A1E6DD4E3DC390885D5831C7244F2FC4F3D9EA28D874CCCD8DAC08287CF049AA18ED1E56A3BFBE38F3E71ED5E8AEC5AD
5,490,884 UART: [art] SIG.R = E70AD45826F64C48C2AD53F7DA0586F7744451F747D30FE7BE703277959C64D14ED33A64F1031ED836DB4F27323BC9D7
5,497,644 UART: [art] SIG.S = 980D057FA41B42E7F1ACD448948DCF0BE2F004F9B21925489DD9BC307EA7EE9F6F9DD5F37C419E2AA556B5215B0C454A
5,522,011 UART: Caliptra RT
5,522,354 UART: [state] CFI Enabled
5,641,873 UART: [rt] RT listening for mailbox commands...
5,642,543 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,765,421 UART: [rt]cmd =0x41544d4e, len=14344
7,001,776 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.77s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,972 UART: [kat] SHA2-256
901,912 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
916,249 UART: [kat] HMAC-384Kdf
920,795 UART: [kat] LMS
1,169,107 UART: [kat] --
1,169,654 UART: [cold-reset] ++
1,170,024 UART: [fht] FHT @ 0x50003400
1,172,858 UART: [idev] ++
1,173,026 UART: [idev] CDI.KEYID = 6
1,173,387 UART: [idev] SUBJECT.KEYID = 7
1,173,812 UART: [idev] UDS.KEYID = 0
1,174,158 ready_for_fw is high
1,174,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,013 UART: [idev] Erasing UDS.KEYID = 0
1,198,977 UART: [idev] Sha1 KeyId Algorithm
1,207,743 UART: [idev] --
1,208,916 UART: [ldev] ++
1,209,084 UART: [ldev] CDI.KEYID = 6
1,209,448 UART: [ldev] SUBJECT.KEYID = 5
1,209,875 UART: [ldev] AUTHORITY.KEYID = 7
1,210,338 UART: [ldev] FE.KEYID = 1
1,215,460 UART: [ldev] Erasing FE.KEYID = 1
1,241,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,708 UART: [ldev] --
1,281,057 UART: [fwproc] Wait for Commands...
1,281,726 UART: [fwproc] Recv command 0x46574c44
1,282,459 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,388 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,563 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,852 >>> mbox cmd response: success
3,371,980 UART: [afmc] ++
3,372,148 UART: [afmc] CDI.KEYID = 6
3,372,511 UART: [afmc] SUBJECT.KEYID = 7
3,372,937 UART: [afmc] AUTHORITY.KEYID = 5
3,409,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,611 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,360 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,067 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,944 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,654 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,344 UART: [afmc] --
3,452,321 UART: [cold-reset] --
3,452,973 UART: [state] Locking Datavault
3,454,238 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,842 UART: [state] Locking ICCM
3,455,330 UART: [exit] Launching FMC @ 0x40000130
3,460,660 UART:
3,460,676 UART: Running Caliptra FMC ...
3,461,084 UART:
3,461,138 UART: [state] CFI Enabled
3,471,442 UART: [fht] FMC Alias Private Key: 7
3,590,492 UART: [art] Extend RT PCRs Done
3,590,920 UART: [art] Lock RT PCRs Done
3,592,308 UART: [art] Populate DV Done
3,600,749 UART: [fht] FMC Alias Private Key: 7
3,601,773 UART: [art] Derive CDI
3,602,053 UART: [art] Store in slot 0x4
3,687,616 UART: [art] Derive Key Pair
3,687,976 UART: [art] Store priv key in slot 0x5
3,701,018 UART: [art] Derive Key Pair - Done
3,715,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,213 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,978 UART: [art] PUB.X = B938BE9F039A26A6496028910B7E61E4C2BDEA95FC0A21184679E6708EEEC7544D0230DC444F470E431D0EB94F8354BB
3,738,734 UART: [art] PUB.Y = C0A57BB15578F7F0F31FD286C2D3AEFF4FC27B108DA2902D44F4BDDECE125687F4E790DC6301445423FE0B3C3AF94CAA
3,745,698 UART: [art] SIG.R = 98B7DB9A4119CE0C1DB05DCD3488A255DEDCE0C4C07D5758C4FDE2BA14F9B45E6D9A182012D236B07488453B846EC1CE
3,752,481 UART: [art] SIG.S = AFB9A72319257BB95AF84789D383919468EDEF01A89B4A18CD661EA19EA4595E0811F6FAA18D4424F59727CCD898E79A
3,776,419 UART: Caliptra RT
3,776,670 UART: [state] CFI Enabled
3,897,281 UART: [rt] RT listening for mailbox commands...
3,897,951 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,911 UART: [rt]cmd =0x41544d4e, len=14344
4,321,291 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,794 ready_for_fw is high
1,058,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,210,616 >>> mbox cmd response: success
3,272,337 UART:
3,272,353 UART: Running Caliptra FMC ...
3,272,761 UART:
3,272,815 UART: [state] CFI Enabled
3,283,221 UART: [fht] FMC Alias Private Key: 7
3,401,829 UART: [art] Extend RT PCRs Done
3,402,257 UART: [art] Lock RT PCRs Done
3,403,885 UART: [art] Populate DV Done
3,411,942 UART: [fht] FMC Alias Private Key: 7
3,412,904 UART: [art] Derive CDI
3,413,184 UART: [art] Store in slot 0x4
3,499,185 UART: [art] Derive Key Pair
3,499,545 UART: [art] Store priv key in slot 0x5
3,513,051 UART: [art] Derive Key Pair - Done
3,527,963 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,543,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,543,901 UART: [art] PUB.X = E43EDDF000375368AE72D8D91B332F016DA5DE1BDE1C11315C5BD14814DB80876773347A6D5258D3481B46EBF3B04E1F
3,550,652 UART: [art] PUB.Y = F83C501A3D279AB909F64571185E1D7E30466B5F4D5DC2CAC0ABF9CFCC819D41DE9B495BD6047265D5FEBA5ED729ADF0
3,557,616 UART: [art] SIG.R = 2388D84BC1710A6A52CD8ABDEE0D50EC14B2B41848E8C11DA3A35FD475A1832061296EFAF1DD08A106326FBD89F79131
3,564,384 UART: [art] SIG.S = 1FFDA7B7089D2363E589ED7D8D0EFCA5C9859136B41B83156FA8022A42C0C2FD393CFBD6B373BDE1107C98DED1A2A1CB
3,587,593 UART: Caliptra RT
3,587,844 UART: [state] CFI Enabled
3,708,064 UART: [rt] RT listening for mailbox commands...
3,708,734 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,831,506 UART: [rt]cmd =0x41544d4e, len=14344
4,137,038 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,260 UART: [kat] SHA2-512-ACC
906,161 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,829 UART: [cold-reset] ++
1,170,319 UART: [fht] FHT @ 0x50003400
1,172,999 UART: [idev] ++
1,173,167 UART: [idev] CDI.KEYID = 6
1,173,528 UART: [idev] SUBJECT.KEYID = 7
1,173,953 UART: [idev] UDS.KEYID = 0
1,174,299 ready_for_fw is high
1,174,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,562 UART: [idev] Erasing UDS.KEYID = 0
1,198,838 UART: [idev] Sha1 KeyId Algorithm
1,207,526 UART: [idev] --
1,208,569 UART: [ldev] ++
1,208,737 UART: [ldev] CDI.KEYID = 6
1,209,101 UART: [ldev] SUBJECT.KEYID = 5
1,209,528 UART: [ldev] AUTHORITY.KEYID = 7
1,209,991 UART: [ldev] FE.KEYID = 1
1,215,191 UART: [ldev] Erasing FE.KEYID = 1
1,241,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,173 UART: [ldev] --
1,281,534 UART: [fwproc] Wait for Commands...
1,282,163 UART: [fwproc] Recv command 0x46574c44
1,282,896 UART: [fwproc] Recv'd Img size: 118548 bytes
3,161,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,189,115 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,220,290 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,360,685 >>> mbox cmd response: success
3,361,907 UART: [afmc] ++
3,362,075 UART: [afmc] CDI.KEYID = 6
3,362,438 UART: [afmc] SUBJECT.KEYID = 7
3,362,864 UART: [afmc] AUTHORITY.KEYID = 5
3,398,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,415,030 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,415,779 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,421,486 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,427,363 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,433,073 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,440,725 UART: [afmc] --
3,441,692 UART: [cold-reset] --
3,442,486 UART: [state] Locking Datavault
3,443,661 UART: [state] Locking PCR0, PCR1 and PCR31
3,444,265 UART: [state] Locking ICCM
3,444,713 UART: [exit] Launching FMC @ 0x40000130
3,450,043 UART:
3,450,059 UART: Running Caliptra FMC ...
3,450,467 UART:
3,450,610 UART: [state] CFI Enabled
3,460,904 UART: [fht] FMC Alias Private Key: 7
3,579,978 UART: [art] Extend RT PCRs Done
3,580,406 UART: [art] Lock RT PCRs Done
3,582,252 UART: [art] Populate DV Done
3,590,463 UART: [fht] FMC Alias Private Key: 7
3,591,517 UART: [art] Derive CDI
3,591,797 UART: [art] Store in slot 0x4
3,677,938 UART: [art] Derive Key Pair
3,678,298 UART: [art] Store priv key in slot 0x5
3,691,364 UART: [art] Derive Key Pair - Done
3,706,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,722,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,723,003 UART: [art] PUB.X = BFED4D70055EDD958581F39B87681A2722261330A10494EEC36920309DC597DAA29FE5A4E083CBEAE3D227AFFD02AF75
3,729,774 UART: [art] PUB.Y = 89C1867A3098AA7887B1148693DACF416F2B48BA7CB7BD40B90ECD41EF7F272F441B243438A832236740F1223519F8B2
3,736,719 UART: [art] SIG.R = 8942EAC68533E269B52CD0DC76B5650B507B6B193DF2305B181B26DABE4F2CCE26F7684F953B105B32E26C3891B8724C
3,743,490 UART: [art] SIG.S = 763E47C08F73065CD1E49C88138CB30E72E8EADDF64D39C1B94267BE58186D84822D47BCF2319D2702B2051CD966B876
3,767,584 UART: Caliptra RT
3,767,927 UART: [state] CFI Enabled
3,888,173 UART: [rt] RT listening for mailbox commands...
3,888,843 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,011,809 UART: [rt]cmd =0x41544d4e, len=14344
4,309,178 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,065 ready_for_fw is high
1,059,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,214,040 >>> mbox cmd response: success
3,275,825 UART:
3,275,841 UART: Running Caliptra FMC ...
3,276,249 UART:
3,276,392 UART: [state] CFI Enabled
3,286,976 UART: [fht] FMC Alias Private Key: 7
3,406,218 UART: [art] Extend RT PCRs Done
3,406,646 UART: [art] Lock RT PCRs Done
3,408,342 UART: [art] Populate DV Done
3,416,303 UART: [fht] FMC Alias Private Key: 7
3,417,243 UART: [art] Derive CDI
3,417,523 UART: [art] Store in slot 0x4
3,503,312 UART: [art] Derive Key Pair
3,503,672 UART: [art] Store priv key in slot 0x5
3,516,576 UART: [art] Derive Key Pair - Done
3,531,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,546,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,547,631 UART: [art] PUB.X = CB29EEAFD14B94752ADBC6BD9F893EEB20F139FDD2D67CE2897858D8F4C4FE1F6DA3507E65DD9727A153D4285960B0C2
3,554,419 UART: [art] PUB.Y = E0C35B20A7C589D3564BC69CB138A70A46C308922AE087087E3A94010D7BFDCEA9DAF66E52CE2758E4AD6E34C194C317
3,561,364 UART: [art] SIG.R = 4158E5A5704AAFBBB7330289410A7B8DEC50FD76325F78EB78F555CD98335C0856E8236435E77301A75D01C922E39B0A
3,568,114 UART: [art] SIG.S = 24BD96ACC213A5BEBFCB9E23A230873F59DFD29E7991B84DA0771AFAA534681905A7D8DCE86E6CE168A6E4EB493E2ED2
3,592,395 UART: Caliptra RT
3,592,738 UART: [state] CFI Enabled
3,711,856 UART: [rt] RT listening for mailbox commands...
3,712,526 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,835,642 UART: [rt]cmd =0x41544d4e, len=14344
4,143,987 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
893,612 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,737 UART: [kat] ++
897,889 UART: [kat] sha1
902,051 UART: [kat] SHA2-256
903,991 UART: [kat] SHA2-384
906,740 UART: [kat] SHA2-512-ACC
908,641 UART: [kat] ECC-384
918,274 UART: [kat] HMAC-384Kdf
922,932 UART: [kat] LMS
1,171,260 UART: [kat] --
1,171,859 UART: [cold-reset] ++
1,172,239 UART: [fht] FHT @ 0x50003400
1,174,678 UART: [idev] ++
1,174,846 UART: [idev] CDI.KEYID = 6
1,175,206 UART: [idev] SUBJECT.KEYID = 7
1,175,630 UART: [idev] UDS.KEYID = 0
1,175,975 ready_for_fw is high
1,175,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,438 UART: [idev] Erasing UDS.KEYID = 0
1,200,481 UART: [idev] Sha1 KeyId Algorithm
1,209,013 UART: [idev] --
1,210,055 UART: [ldev] ++
1,210,223 UART: [ldev] CDI.KEYID = 6
1,210,586 UART: [ldev] SUBJECT.KEYID = 5
1,211,012 UART: [ldev] AUTHORITY.KEYID = 7
1,211,475 UART: [ldev] FE.KEYID = 1
1,216,475 UART: [ldev] Erasing FE.KEYID = 1
1,243,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,033 UART: [ldev] --
1,282,424 UART: [fwproc] Wait for Commands...
1,283,106 UART: [fwproc] Recv command 0x46574c44
1,283,834 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,222 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,392 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,372,673 >>> mbox cmd response: success
3,373,741 UART: [afmc] ++
3,373,909 UART: [afmc] CDI.KEYID = 6
3,374,271 UART: [afmc] SUBJECT.KEYID = 7
3,374,696 UART: [afmc] AUTHORITY.KEYID = 5
3,410,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,128 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,834 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,438,713 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,423 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,330 UART: [afmc] --
3,453,368 UART: [cold-reset] --
3,454,076 UART: [state] Locking Datavault
3,455,311 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,915 UART: [state] Locking ICCM
3,456,425 UART: [exit] Launching FMC @ 0x40000130
3,461,755 UART:
3,461,771 UART: Running Caliptra FMC ...
3,462,179 UART:
3,462,233 UART: [state] CFI Enabled
3,472,977 UART: [fht] FMC Alias Private Key: 7
3,592,399 UART: [art] Extend RT PCRs Done
3,592,827 UART: [art] Lock RT PCRs Done
3,594,247 UART: [art] Populate DV Done
3,602,316 UART: [fht] FMC Alias Private Key: 7
3,603,328 UART: [art] Derive CDI
3,603,608 UART: [art] Store in slot 0x4
3,689,517 UART: [art] Derive Key Pair
3,689,877 UART: [art] Store priv key in slot 0x5
3,703,009 UART: [art] Derive Key Pair - Done
3,717,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,992 UART: [art] PUB.X = AA43245B8073208769968E136BB07F55778669EA0A0DF092DAAF85C65FA96C5391EDA798A85014E36F44216B198FC3EB
3,740,756 UART: [art] PUB.Y = 3215C0997AB4712A1F28BDFED7E113654527CA3260AC5B022116E20B06A00607D20E8D7B840A57D9AF114D6559EB861F
3,747,685 UART: [art] SIG.R = 56D4B896940B206F760194981507CA550434C4E121642146C9230D6BBC73B3C84ED47C8F820CE808522743B142A1E078
3,754,420 UART: [art] SIG.S = 7F1B9AD3330076523889F80639F63F0521F373B00C05CBCDF5EB4E0E58AE964DC238E5DD1819D6DB3048578A93F51A79
3,778,053 UART: Caliptra RT
3,778,304 UART: [state] CFI Enabled
3,898,214 UART: [rt] RT listening for mailbox commands...
3,898,884 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,924 UART: [rt]cmd =0x41544d4e, len=14344
4,319,537 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,299 ready_for_fw is high
1,060,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,499 >>> mbox cmd response: success
3,283,764 UART:
3,283,780 UART: Running Caliptra FMC ...
3,284,188 UART:
3,284,242 UART: [state] CFI Enabled
3,294,616 UART: [fht] FMC Alias Private Key: 7
3,413,532 UART: [art] Extend RT PCRs Done
3,413,960 UART: [art] Lock RT PCRs Done
3,414,960 UART: [art] Populate DV Done
3,423,231 UART: [fht] FMC Alias Private Key: 7
3,424,227 UART: [art] Derive CDI
3,424,507 UART: [art] Store in slot 0x4
3,510,312 UART: [art] Derive Key Pair
3,510,672 UART: [art] Store priv key in slot 0x5
3,523,674 UART: [art] Derive Key Pair - Done
3,538,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,553,193 UART: [art] Erasing AUTHORITY.KEYID = 7
3,553,958 UART: [art] PUB.X = C8B22F97E7D6BA9A3619142F9EF4E1CE7620E1EC75521A16237EC9E8CE15C5BB607A423336CEA50F73BDDBA695689345
3,560,735 UART: [art] PUB.Y = EBC73417DBC0CB01604B524338CA967F78E39D507D1FC9C51011CE9028A3029978582EFC3A431BC426564AC928E5964B
3,567,679 UART: [art] SIG.R = 59B14462BF8CF24E861A8D9802FDCE2406E4B7152308FCAB8B39F621FB75C553745ED5B2B453DAA5539060330CDF5CFE
3,574,447 UART: [art] SIG.S = 9C2A5823018832B27A0469E4612B714A0A393079249243D86771C18CA1DD2DE48FDDFC40F39881F0726ACFD6D43DEDF6
3,598,534 UART: Caliptra RT
3,598,785 UART: [state] CFI Enabled
3,719,079 UART: [rt] RT listening for mailbox commands...
3,719,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,279 UART: [rt]cmd =0x41544d4e, len=14344
4,143,315 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,282 UART: [state] WD Timer not started. Device not locked for debugging
87,533 UART: [kat] SHA2-256
893,183 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,308 UART: [kat] ++
897,460 UART: [kat] sha1
901,804 UART: [kat] SHA2-256
903,744 UART: [kat] SHA2-384
906,569 UART: [kat] SHA2-512-ACC
908,470 UART: [kat] ECC-384
918,337 UART: [kat] HMAC-384Kdf
923,015 UART: [kat] LMS
1,171,343 UART: [kat] --
1,172,016 UART: [cold-reset] ++
1,172,546 UART: [fht] FHT @ 0x50003400
1,175,063 UART: [idev] ++
1,175,231 UART: [idev] CDI.KEYID = 6
1,175,591 UART: [idev] SUBJECT.KEYID = 7
1,176,015 UART: [idev] UDS.KEYID = 0
1,176,360 ready_for_fw is high
1,176,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,143 UART: [idev] Erasing UDS.KEYID = 0
1,201,058 UART: [idev] Sha1 KeyId Algorithm
1,209,658 UART: [idev] --
1,210,672 UART: [ldev] ++
1,210,840 UART: [ldev] CDI.KEYID = 6
1,211,203 UART: [ldev] SUBJECT.KEYID = 5
1,211,629 UART: [ldev] AUTHORITY.KEYID = 7
1,212,092 UART: [ldev] FE.KEYID = 1
1,217,184 UART: [ldev] Erasing FE.KEYID = 1
1,243,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,064 UART: [ldev] --
1,282,479 UART: [fwproc] Wait for Commands...
1,283,057 UART: [fwproc] Recv command 0x46574c44
1,283,785 UART: [fwproc] Recv'd Img size: 118548 bytes
3,177,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,695 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,865 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,258 >>> mbox cmd response: success
3,379,492 UART: [afmc] ++
3,379,660 UART: [afmc] CDI.KEYID = 6
3,380,022 UART: [afmc] SUBJECT.KEYID = 7
3,380,447 UART: [afmc] AUTHORITY.KEYID = 5
3,415,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,109 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,815 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,694 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,404 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,293 UART: [afmc] --
3,459,393 UART: [cold-reset] --
3,460,159 UART: [state] Locking Datavault
3,461,250 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,854 UART: [state] Locking ICCM
3,462,498 UART: [exit] Launching FMC @ 0x40000130
3,467,828 UART:
3,467,844 UART: Running Caliptra FMC ...
3,468,252 UART:
3,468,395 UART: [state] CFI Enabled
3,478,853 UART: [fht] FMC Alias Private Key: 7
3,598,179 UART: [art] Extend RT PCRs Done
3,598,607 UART: [art] Lock RT PCRs Done
3,600,205 UART: [art] Populate DV Done
3,608,678 UART: [fht] FMC Alias Private Key: 7
3,609,656 UART: [art] Derive CDI
3,609,936 UART: [art] Store in slot 0x4
3,695,611 UART: [art] Derive Key Pair
3,695,971 UART: [art] Store priv key in slot 0x5
3,709,481 UART: [art] Derive Key Pair - Done
3,724,478 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,739,903 UART: [art] Erasing AUTHORITY.KEYID = 7
3,740,668 UART: [art] PUB.X = 4E6D938EA766CE2102B1F3FA0101F0728451D28940C3540E4AD5D8B3BAB118A4A8BA0BAFACEA0E6A44B81151E1CF243A
3,747,436 UART: [art] PUB.Y = 47AC2C5731DB9D45A7106F9CE4F4B1D2434AACC7AE7955F85CEDDCB95210E6A2F530D8044F8AE1A48AE97EC279B861D7
3,754,401 UART: [art] SIG.R = 67E1F3A317B14100B59D31AFB6591F4F399B747737E09C48FCA31B29E548C2EF4D170CF8A4CCE2E77A0217631B387A77
3,761,147 UART: [art] SIG.S = 17E1BEB4105D0A37E3C762C0660193719AFFBF081094080FC74796594276372A284CD49B0E85AE6741B0D79B53AFB488
3,785,091 UART: Caliptra RT
3,785,434 UART: [state] CFI Enabled
3,905,434 UART: [rt] RT listening for mailbox commands...
3,906,104 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,488 UART: [rt]cmd =0x41544d4e, len=14344
4,327,387 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,696 ready_for_fw is high
1,060,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,838 >>> mbox cmd response: success
3,287,153 UART:
3,287,169 UART: Running Caliptra FMC ...
3,287,577 UART:
3,287,720 UART: [state] CFI Enabled
3,298,456 UART: [fht] FMC Alias Private Key: 7
3,417,078 UART: [art] Extend RT PCRs Done
3,417,506 UART: [art] Lock RT PCRs Done
3,419,062 UART: [art] Populate DV Done
3,427,389 UART: [fht] FMC Alias Private Key: 7
3,428,505 UART: [art] Derive CDI
3,428,785 UART: [art] Store in slot 0x4
3,514,390 UART: [art] Derive Key Pair
3,514,750 UART: [art] Store priv key in slot 0x5
3,527,666 UART: [art] Derive Key Pair - Done
3,542,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,557,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,558,589 UART: [art] PUB.X = BE758703AA092B396537F926C59C810B0CCA133663A5872803497F53678773300F1E07FFDC5C25DAF905DEB7EB59C3FC
3,565,337 UART: [art] PUB.Y = 22133AE6049732D6B41C638E51F53D81924B77BA820D831F2C04A24742EF3B985860E3DBFAFB564A2AE9C269C9FAF2B4
3,572,284 UART: [art] SIG.R = 38E438DC9C7692BAC24402874D53A7D2BDFC86E68D3586CB81BF13B460AE3EF78D641D59E294041708B2341043321AB8
3,579,045 UART: [art] SIG.S = 7CA5542A21D425018362B08449893ECFDE92F46E59078ECF90A57223F092A14BEE9D29C42BFF2C58B8724E2ADFD4F475
3,602,581 UART: Caliptra RT
3,602,924 UART: [state] CFI Enabled
3,722,176 UART: [rt] RT listening for mailbox commands...
3,722,846 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,130 UART: [rt]cmd =0x41544d4e, len=14344
4,148,485 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,041 UART:
192,389 UART: Running Caliptra ROM ...
193,767 UART:
193,927 UART: [state] CFI Enabled
264,881 UART: [state] LifecycleState = Unprovisioned
266,822 UART: [state] DebugLocked = No
268,711 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,182 UART: [kat] SHA2-256
443,919 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,383 UART: [kat] ++
455,008 UART: [kat] sha1
464,832 UART: [kat] SHA2-256
467,564 UART: [kat] SHA2-384
473,625 UART: [kat] SHA2-512-ACC
475,997 UART: [kat] ECC-384
2,766,962 UART: [kat] HMAC-384Kdf
2,779,767 UART: [kat] LMS
3,970,086 UART: [kat] --
3,974,326 UART: [cold-reset] ++
3,975,484 UART: [fht] Storing FHT @ 0x50003400
3,987,318 UART: [idev] ++
3,987,885 UART: [idev] CDI.KEYID = 6
3,988,922 UART: [idev] SUBJECT.KEYID = 7
3,990,094 UART: [idev] UDS.KEYID = 0
3,991,158 ready_for_fw is high
3,991,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,435 UART: [idev] Erasing UDS.KEYID = 0
7,328,308 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,982 UART: [idev] --
7,353,733 UART: [ldev] ++
7,354,358 UART: [ldev] CDI.KEYID = 6
7,355,322 UART: [ldev] SUBJECT.KEYID = 5
7,356,535 UART: [ldev] AUTHORITY.KEYID = 7
7,357,773 UART: [ldev] FE.KEYID = 1
7,402,603 UART: [ldev] Erasing FE.KEYID = 1
10,734,475 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,365 UART: [ldev] --
13,095,107 UART: [fwproc] Waiting for Commands...
13,097,016 UART: [fwproc] Received command 0x46574c44
13,099,208 UART: [fwproc] Received Image of size 118548 bytes
17,204,360 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,280,101 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,353,279 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,681,656 >>> mbox cmd response: success
17,685,469 UART: [afmc] ++
17,686,082 UART: [afmc] CDI.KEYID = 6
17,687,002 UART: [afmc] SUBJECT.KEYID = 7
17,688,279 UART: [afmc] AUTHORITY.KEYID = 5
21,051,516 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,348,457 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,350,723 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,365,176 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,379,932 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,394,389 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,416,239 UART: [afmc] --
23,420,481 UART: [cold-reset] --
23,424,291 UART: [state] Locking Datavault
23,429,224 UART: [state] Locking PCR0, PCR1 and PCR31
23,430,926 UART: [state] Locking ICCM
23,433,285 UART: [exit] Launching FMC @ 0x40000130
23,441,685 UART:
23,441,919 UART: Running Caliptra FMC ...
23,443,018 UART:
23,443,187 UART: [state] CFI Enabled
23,509,300 UART: [fht] FMC Alias Private Key: 7
25,850,357 UART: [art] Extend RT PCRs Done
25,851,584 UART: [art] Lock RT PCRs Done
25,853,294 UART: [art] Populate DV Done
25,858,544 UART: [fht] FMC Alias Private Key: 7
25,860,198 UART: [art] Derive CDI
25,861,032 UART: [art] Store in slot 0x4
25,917,755 UART: [art] Derive Key Pair
25,918,812 UART: [art] Store priv key in slot 0x5
29,212,356 UART: [art] Derive Key Pair - Done
29,225,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,513,494 UART: [art] Erasing AUTHORITY.KEYID = 7
31,515,006 UART: [art] PUB.X = 51A776490035432E9397BA07290EB3033C614DFF4C9FB3D1D6B8517FAAA911CA15FFA349F91D9F34D20DC422876BD3B4
31,522,280 UART: [art] PUB.Y = 3616789268FD9212E0975004C3B32FCE6CAE86C2DE3D6FD32F89F2866F6A3BAA058D1C14BEFD11BE3DCD74D2C0EE0A40
31,529,535 UART: [art] SIG.R = 0A7700577ECE43FC3765AF403D28C55D40EF64ED834FA73F377EB7DBB1CD343A7C4D6B458A0ABAE3AAB7B11A4B373A1D
31,536,944 UART: [art] SIG.S = 21646DCB926A692A2A43347258BD696F7E437DE9A2FB153A60ABBBC76DDDD65E63D04744DDD6DAED8FFB7B5A0F9BE9FE
32,842,315 UART: Caliptra RT
32,843,028 UART: [state] CFI Enabled
33,019,763 UART: [rt] RT listening for mailbox commands...
33,022,100 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,177,165 UART: [rt]cmd =0x41544d4e, len=14344
38,477,711 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,788,086 ready_for_fw is high
3,788,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,969,935 >>> mbox cmd response: success
23,674,038 UART:
23,674,476 UART: Running Caliptra FMC ...
23,675,595 UART:
23,675,758 UART: [state] CFI Enabled
23,742,628 UART: [fht] FMC Alias Private Key: 7
26,082,936 UART: [art] Extend RT PCRs Done
26,084,193 UART: [art] Lock RT PCRs Done
26,085,742 UART: [art] Populate DV Done
26,090,882 UART: [fht] FMC Alias Private Key: 7
26,092,540 UART: [art] Derive CDI
26,093,277 UART: [art] Store in slot 0x4
26,150,758 UART: [art] Derive Key Pair
26,151,799 UART: [art] Store priv key in slot 0x5
29,444,303 UART: [art] Derive Key Pair - Done
29,457,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,538 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,049 UART: [art] PUB.X = 82D89D76544FC155179DC1672F7791CE8507B0684E0D04219E1988BE637C58FEB9EE6738E02BFB0D0C05019B38401D87
31,754,317 UART: [art] PUB.Y = 77B76D75B0532E00C1AC15C494E6CD9CD92BFB84BD3C8DC9A2FFC8789A514DF1D9A0B17DFEDBD139C5E17A7FBFAE18A2
31,761,602 UART: [art] SIG.R = 4CC223D7567AC306418152876758CBAF591A03CE2CB91042303674C4CA6E8EFB7634BA1E03E3F46852FE4B56712323EF
31,768,954 UART: [art] SIG.S = FC0493E5710FD863F5E139C4AA3D599891BF3366C42C2E64BB8F4EB8CF8C8B62FACC82E23E9EF20FB5D7890BF5B165E7
33,073,863 UART: Caliptra RT
33,074,551 UART: [state] CFI Enabled
33,251,719 UART: [rt] RT listening for mailbox commands...
33,254,013 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,409,284 UART: [rt]cmd =0x41544d4e, len=14344
38,709,936 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,366 UART:
192,715 UART: Running Caliptra ROM ...
193,902 UART:
603,544 UART: [state] CFI Enabled
618,135 UART: [state] LifecycleState = Unprovisioned
620,007 UART: [state] DebugLocked = No
622,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,811 UART: [kat] SHA2-256
797,571 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,157 UART: [kat] ++
808,604 UART: [kat] sha1
821,321 UART: [kat] SHA2-256
824,040 UART: [kat] SHA2-384
829,390 UART: [kat] SHA2-512-ACC
831,753 UART: [kat] ECC-384
3,114,467 UART: [kat] HMAC-384Kdf
3,126,259 UART: [kat] LMS
4,316,397 UART: [kat] --
4,322,249 UART: [cold-reset] ++
4,324,672 UART: [fht] Storing FHT @ 0x50003400
4,336,141 UART: [idev] ++
4,336,705 UART: [idev] CDI.KEYID = 6
4,337,607 UART: [idev] SUBJECT.KEYID = 7
4,338,842 UART: [idev] UDS.KEYID = 0
4,339,846 ready_for_fw is high
4,340,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,944 UART: [idev] Erasing UDS.KEYID = 0
7,626,883 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,117 UART: [idev] --
7,654,452 UART: [ldev] ++
7,655,016 UART: [ldev] CDI.KEYID = 6
7,655,951 UART: [ldev] SUBJECT.KEYID = 5
7,657,154 UART: [ldev] AUTHORITY.KEYID = 7
7,658,433 UART: [ldev] FE.KEYID = 1
7,670,401 UART: [ldev] Erasing FE.KEYID = 1
10,956,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,763 UART: [ldev] --
13,317,422 UART: [fwproc] Waiting for Commands...
13,320,475 UART: [fwproc] Received command 0x46574c44
13,322,646 UART: [fwproc] Received Image of size 118548 bytes
17,420,572 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,823 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,980 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,790 >>> mbox cmd response: success
17,902,875 UART: [afmc] ++
17,903,493 UART: [afmc] CDI.KEYID = 6
17,904,373 UART: [afmc] SUBJECT.KEYID = 7
17,905,638 UART: [afmc] AUTHORITY.KEYID = 5
21,220,254 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,666 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,952 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,334 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,085 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,504 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,733 UART: [afmc] --
23,585,071 UART: [cold-reset] --
23,590,012 UART: [state] Locking Datavault
23,593,743 UART: [state] Locking PCR0, PCR1 and PCR31
23,595,689 UART: [state] Locking ICCM
23,597,383 UART: [exit] Launching FMC @ 0x40000130
23,605,777 UART:
23,606,005 UART: Running Caliptra FMC ...
23,607,103 UART:
23,607,255 UART: [state] CFI Enabled
23,615,511 UART: [fht] FMC Alias Private Key: 7
25,955,317 UART: [art] Extend RT PCRs Done
25,956,551 UART: [art] Lock RT PCRs Done
25,958,364 UART: [art] Populate DV Done
25,963,662 UART: [fht] FMC Alias Private Key: 7
25,965,196 UART: [art] Derive CDI
25,966,003 UART: [art] Store in slot 0x4
26,008,441 UART: [art] Derive Key Pair
26,009,507 UART: [art] Store priv key in slot 0x5
29,251,588 UART: [art] Derive Key Pair - Done
29,264,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,512 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,021 UART: [art] PUB.X = E6BA2F6E957FCA1E2D105D89D460D2258E1D08036CC5E57148BAC6C968247111B700C5515C2EBA3BE822D35FC256F5D8
31,553,274 UART: [art] PUB.Y = 22894AAC74F7646EFF61FE9AA675A2C070C6810AC892F6DD5A9899E6CE60054084ED51CF2C8BA26321CE153F665875F1
31,560,555 UART: [art] SIG.R = 5F9AFD0C64E7B3C46CBB50E15A6BDE3F3199E1E5B9FF8738A3E39FD1F73DD23A2AD6211D7761790EC2D08DB91111BEBD
31,567,952 UART: [art] SIG.S = ECB846D63F9BBAB5188405CF71BBC2CC2D933302CC41DDEF25F3F71BA42F55124EAF56593EFCDE21D6FC38BC039609DE
32,872,942 UART: Caliptra RT
32,873,651 UART: [state] CFI Enabled
33,007,058 UART: [rt] RT listening for mailbox commands...
33,009,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,164,772 UART: [rt]cmd =0x41544d4e, len=14344
38,464,758 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
4,129,627 ready_for_fw is high
4,130,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,171,727 >>> mbox cmd response: success
23,811,566 UART:
23,811,969 UART: Running Caliptra FMC ...
23,813,179 UART:
23,813,359 UART: [state] CFI Enabled
23,821,344 UART: [fht] FMC Alias Private Key: 7
26,161,328 UART: [art] Extend RT PCRs Done
26,162,559 UART: [art] Lock RT PCRs Done
26,163,938 UART: [art] Populate DV Done
26,169,080 UART: [fht] FMC Alias Private Key: 7
26,170,785 UART: [art] Derive CDI
26,171,595 UART: [art] Store in slot 0x4
26,214,353 UART: [art] Derive Key Pair
26,215,397 UART: [art] Store priv key in slot 0x5
29,457,969 UART: [art] Derive Key Pair - Done
29,471,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,751,506 UART: [art] Erasing AUTHORITY.KEYID = 7
31,753,026 UART: [art] PUB.X = B393792A334B229B483FD918145FE40EE6EEF91B6E4839231ED7458DFBCAC11B6D0519B64EC45ECB56F3476212A6AB69
31,760,289 UART: [art] PUB.Y = AE36A5AEF74A14F163D761EEBEAC999273EF93D0731E2D8FE26F1E56BED6AC1D55C32D0A1215FC93E9CA69965D35CCB0
31,767,561 UART: [art] SIG.R = 12F1731E5EE21AAEBE5245FCBC14970709034831768DB3620CA8A80EC46D0A40371292FFEDEA4BFAECC8B218E9519D6B
31,775,011 UART: [art] SIG.S = C8D35A773C84932F923A5B82D70F3215A3F191CFC28FB1DDB63EBF8A85BAA7E0FE091FCE6F03F3AE894AC3CEFB744DC7
33,080,109 UART: Caliptra RT
33,080,825 UART: [state] CFI Enabled
33,214,625 UART: [rt] RT listening for mailbox commands...
33,216,949 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,372,355 UART: [rt]cmd =0x41544d4e, len=14344
38,673,224 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,167 UART:
192,528 UART: Running Caliptra ROM ...
193,651 UART:
193,792 UART: [state] CFI Enabled
265,738 UART: [state] LifecycleState = Unprovisioned
267,668 UART: [state] DebugLocked = No
269,401 UART: [state] WD Timer not started. Device not locked for debugging
273,645 UART: [kat] SHA2-256
453,280 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,097 UART: [kat] ++
464,549 UART: [kat] sha1
476,271 UART: [kat] SHA2-256
478,991 UART: [kat] SHA2-384
484,407 UART: [kat] SHA2-512-ACC
486,769 UART: [kat] ECC-384
2,946,790 UART: [kat] HMAC-384Kdf
2,970,750 UART: [kat] LMS
3,447,244 UART: [kat] --
3,452,893 UART: [cold-reset] ++
3,454,404 UART: [fht] FHT @ 0x50003400
3,465,491 UART: [idev] ++
3,466,106 UART: [idev] CDI.KEYID = 6
3,466,988 UART: [idev] SUBJECT.KEYID = 7
3,468,300 UART: [idev] UDS.KEYID = 0
3,469,214 ready_for_fw is high
3,469,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,517 UART: [idev] Erasing UDS.KEYID = 0
5,983,729 UART: [idev] Sha1 KeyId Algorithm
6,006,798 UART: [idev] --
6,012,367 UART: [ldev] ++
6,012,937 UART: [ldev] CDI.KEYID = 6
6,013,920 UART: [ldev] SUBJECT.KEYID = 5
6,015,078 UART: [ldev] AUTHORITY.KEYID = 7
6,016,366 UART: [ldev] FE.KEYID = 1
6,056,673 UART: [ldev] Erasing FE.KEYID = 1
8,562,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,215 UART: [ldev] --
10,372,260 UART: [fwproc] Wait for Commands...
10,375,175 UART: [fwproc] Recv command 0x46574c44
10,377,222 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,374 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,401 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,970 >>> mbox cmd response: success
14,345,813 UART: [afmc] ++
14,346,405 UART: [afmc] CDI.KEYID = 6
14,347,424 UART: [afmc] SUBJECT.KEYID = 7
14,348,581 UART: [afmc] AUTHORITY.KEYID = 5
16,894,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,146 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,997 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,051 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,652 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,445 UART: [afmc] --
18,697,306 UART: [cold-reset] --
18,701,053 UART: [state] Locking Datavault
18,705,814 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,558 UART: [state] Locking ICCM
18,709,190 UART: [exit] Launching FMC @ 0x40000130
18,717,633 UART:
18,717,863 UART: Running Caliptra FMC ...
18,718,960 UART:
18,719,116 UART: [state] CFI Enabled
18,775,421 UART: [fht] FMC Alias Private Key: 7
20,563,293 UART: [art] Extend RT PCRs Done
20,564,515 UART: [art] Lock RT PCRs Done
20,566,273 UART: [art] Populate DV Done
20,572,023 UART: [fht] FMC Alias Private Key: 7
20,573,721 UART: [art] Derive CDI
20,574,458 UART: [art] Store in slot 0x4
20,628,900 UART: [art] Derive Key Pair
20,629,944 UART: [art] Store priv key in slot 0x5
23,092,942 UART: [art] Derive Key Pair - Done
23,105,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,648 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,157 UART: [art] PUB.X = 758C766A385CD96A4F56B6585F8008AD6CF38C2FE180D1BACDF45429CD522587CD5ACE203636AB077BB69533C7259CFE
24,827,423 UART: [art] PUB.Y = 8520A65024E37F40432FBDF3AE84C990D65BA0FEFD5AF7673EF3030711007B7B6B935B1AEE299B8E5234FB718CB1E41E
24,834,712 UART: [art] SIG.R = D7039074FB0FC0F3C750F59B3A2293B53DE64353C93ECBAB6AA25B5212363B2C6831857D722A945959FCB45259E6C789
24,842,104 UART: [art] SIG.S = 60DEA1491CDB575E2E8C7454CF956EF42CFECDC835B7FD3DFFFF7F7826B48FEF947AA4A872D5EC6009A5D69C71DF1B48
25,820,697 UART: Caliptra RT
25,821,394 UART: [state] CFI Enabled
26,001,536 UART: [rt] RT listening for mailbox commands...
26,003,846 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,159,734 UART: [rt]cmd =0x41544d4e, len=14344
30,154,939 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,459,827 ready_for_fw is high
3,460,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,235,746 >>> mbox cmd response: success
18,515,082 UART:
18,515,469 UART: Running Caliptra FMC ...
18,516,606 UART:
18,516,761 UART: [state] CFI Enabled
18,581,398 UART: [fht] FMC Alias Private Key: 7
20,348,008 UART: [art] Extend RT PCRs Done
20,349,233 UART: [art] Lock RT PCRs Done
20,350,935 UART: [art] Populate DV Done
20,356,466 UART: [fht] FMC Alias Private Key: 7
20,358,009 UART: [art] Derive CDI
20,358,829 UART: [art] Store in slot 0x4
20,414,580 UART: [art] Derive Key Pair
20,415,619 UART: [art] Store priv key in slot 0x5
22,878,312 UART: [art] Derive Key Pair - Done
22,891,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,928 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,432 UART: [art] PUB.X = 8A56F0FAFD317F49A9D97B873A0BB6B6B8616020A8476BA09FD39A306CB874638471AF3736B4753AC517696715A11366
24,613,689 UART: [art] PUB.Y = 0B55934373A8E915255651E0B151FCFB8CF625AE718ECB36EED5BF969DAAAEEA28239790B49A2F8F5C830B4FA63F32CE
24,620,927 UART: [art] SIG.R = B4602E35FC26511566216FD49F5ECC479085D48C8F2865CDA79A8D75060BE1FD58AF4DE3A46AE12202094748988EF4B8
24,628,320 UART: [art] SIG.S = B103104BF2D8A27BC58D25DF3898587E60AF95E185041503280BA7CAA03A4985B0AF07C7BC931F991137B4FB8B044C89
25,607,028 UART: Caliptra RT
25,607,740 UART: [state] CFI Enabled
25,788,314 UART: [rt] RT listening for mailbox commands...
25,790,694 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,945,677 UART: [rt]cmd =0x41544d4e, len=14344
29,941,284 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
192,597 UART:
192,948 UART: Running Caliptra ROM ...
194,058 UART:
603,872 UART: [state] CFI Enabled
616,715 UART: [state] LifecycleState = Unprovisioned
618,727 UART: [state] DebugLocked = No
619,858 UART: [state] WD Timer not started. Device not locked for debugging
624,187 UART: [kat] SHA2-256
803,805 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,615 UART: [kat] ++
815,092 UART: [kat] sha1
826,542 UART: [kat] SHA2-256
829,275 UART: [kat] SHA2-384
835,410 UART: [kat] SHA2-512-ACC
837,783 UART: [kat] ECC-384
3,281,344 UART: [kat] HMAC-384Kdf
3,294,430 UART: [kat] LMS
3,770,927 UART: [kat] --
3,775,210 UART: [cold-reset] ++
3,777,427 UART: [fht] FHT @ 0x50003400
3,789,122 UART: [idev] ++
3,789,685 UART: [idev] CDI.KEYID = 6
3,790,637 UART: [idev] SUBJECT.KEYID = 7
3,791,881 UART: [idev] UDS.KEYID = 0
3,792,850 ready_for_fw is high
3,793,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,880 UART: [idev] Erasing UDS.KEYID = 0
6,266,723 UART: [idev] Sha1 KeyId Algorithm
6,290,605 UART: [idev] --
6,296,005 UART: [ldev] ++
6,296,623 UART: [ldev] CDI.KEYID = 6
6,297,528 UART: [ldev] SUBJECT.KEYID = 5
6,298,701 UART: [ldev] AUTHORITY.KEYID = 7
6,299,997 UART: [ldev] FE.KEYID = 1
6,310,672 UART: [ldev] Erasing FE.KEYID = 1
8,789,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,679 UART: [ldev] --
10,586,975 UART: [fwproc] Wait for Commands...
10,588,958 UART: [fwproc] Recv command 0x46574c44
10,590,941 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,396 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,408 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,484 >>> mbox cmd response: success
14,560,455 UART: [afmc] ++
14,561,042 UART: [afmc] CDI.KEYID = 6
14,561,987 UART: [afmc] SUBJECT.KEYID = 7
14,563,204 UART: [afmc] AUTHORITY.KEYID = 5
17,066,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,847 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,670 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,744 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,272 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,278 UART: [afmc] --
18,865,563 UART: [cold-reset] --
18,869,270 UART: [state] Locking Datavault
18,874,145 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,897 UART: [state] Locking ICCM
18,878,692 UART: [exit] Launching FMC @ 0x40000130
18,887,097 UART:
18,887,335 UART: Running Caliptra FMC ...
18,888,360 UART:
18,888,510 UART: [state] CFI Enabled
18,896,827 UART: [fht] FMC Alias Private Key: 7
20,663,225 UART: [art] Extend RT PCRs Done
20,664,440 UART: [art] Lock RT PCRs Done
20,665,958 UART: [art] Populate DV Done
20,671,422 UART: [fht] FMC Alias Private Key: 7
20,673,116 UART: [art] Derive CDI
20,673,929 UART: [art] Store in slot 0x4
20,716,584 UART: [art] Derive Key Pair
20,717,623 UART: [art] Store priv key in slot 0x5
23,143,951 UART: [art] Derive Key Pair - Done
23,156,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,161 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,668 UART: [art] PUB.X = 41471877DB4BA097759F8C95C6C7D5F7048D7A034059B9F935861312209ACFEA7AF81EA3A3CB933C4D17366F9E84BBA0
24,871,963 UART: [art] PUB.Y = B7D96BAE6DF06BCA6606546EDE745614721F3F6CB41A452CEF4FC9D7BE0A3098B482746C04FDE297CF6F7174AFF8C270
24,879,256 UART: [art] SIG.R = FDEB8EC20827358448B0B5D92BA94F4A4408E781FA7CED5B98BCEA90CE928A62B6CC4D03BB87DC2720FF4002028A43B8
24,886,644 UART: [art] SIG.S = 3E12BFA017681C514CD0235C0747F00F7A4760F331D4115839749E4A6023E9982A0BA402DA20A9643CAD3D212EE2F48B
25,865,647 UART: Caliptra RT
25,866,362 UART: [state] CFI Enabled
25,999,356 UART: [rt] RT listening for mailbox commands...
26,001,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,156,988 UART: [rt]cmd =0x41544d4e, len=14344
30,152,221 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,782,760 ready_for_fw is high
3,783,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,369 >>> mbox cmd response: success
18,707,543 UART:
18,707,936 UART: Running Caliptra FMC ...
18,709,162 UART:
18,709,341 UART: [state] CFI Enabled
18,716,960 UART: [fht] FMC Alias Private Key: 7
20,482,917 UART: [art] Extend RT PCRs Done
20,484,141 UART: [art] Lock RT PCRs Done
20,485,823 UART: [art] Populate DV Done
20,491,240 UART: [fht] FMC Alias Private Key: 7
20,492,793 UART: [art] Derive CDI
20,493,535 UART: [art] Store in slot 0x4
20,536,081 UART: [art] Derive Key Pair
20,537,129 UART: [art] Store priv key in slot 0x5
22,964,470 UART: [art] Derive Key Pair - Done
22,977,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,091 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,601 UART: [art] PUB.X = 48A7ADA78209FEC26242FEA2AE5E49DF92871C681911E8A27645F70E29BE50629C028F8690053F30A2DA57E70447CF48
24,691,875 UART: [art] PUB.Y = 37E5BEEB800457C6CDBF7866BA1D3FF5D928DDCFED3D0ED27869315C1CE99B2986D6C084A8096CFA4762A97CE133A8ED
24,699,147 UART: [art] SIG.R = 3BB5CB2E5455A905CF4EDE613A40FFFFE95D68C9232670719010B954F0DCA77FEAC45B03ABED3722301C6FFD0C41D10A
24,706,562 UART: [art] SIG.S = F623C13B9D8E13D1A2A2C0B18790CB2D4028864637CA4ACDB48A4F0B3CF2A91B226DC21C1BC724772C8E073060B36389
25,685,283 UART: Caliptra RT
25,685,989 UART: [state] CFI Enabled
25,818,952 UART: [rt] RT listening for mailbox commands...
25,821,277 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,976,805 UART: [rt]cmd =0x41544d4e, len=14344
29,971,957 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,050 UART:
192,418 UART: Running Caliptra ROM ...
193,627 UART:
193,782 UART: [state] CFI Enabled
262,545 UART: [state] LifecycleState = Unprovisioned
264,887 UART: [state] DebugLocked = No
266,774 UART: [state] WD Timer not started. Device not locked for debugging
271,526 UART: [kat] SHA2-256
461,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,233 UART: [kat] ++
472,682 UART: [kat] sha1
483,623 UART: [kat] SHA2-256
486,626 UART: [kat] SHA2-384
491,760 UART: [kat] SHA2-512-ACC
494,338 UART: [kat] ECC-384
2,945,328 UART: [kat] HMAC-384Kdf
2,972,066 UART: [kat] LMS
3,503,843 UART: [kat] --
3,510,760 UART: [cold-reset] ++
3,513,043 UART: [fht] FHT @ 0x50003400
3,525,509 UART: [idev] ++
3,526,217 UART: [idev] CDI.KEYID = 6
3,527,099 UART: [idev] SUBJECT.KEYID = 7
3,528,362 UART: [idev] UDS.KEYID = 0
3,529,297 ready_for_fw is high
3,529,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,529 UART: [idev] Erasing UDS.KEYID = 0
6,048,692 UART: [idev] Sha1 KeyId Algorithm
6,070,637 UART: [idev] --
6,075,771 UART: [ldev] ++
6,076,452 UART: [ldev] CDI.KEYID = 6
6,077,364 UART: [ldev] SUBJECT.KEYID = 5
6,078,524 UART: [ldev] AUTHORITY.KEYID = 7
6,079,754 UART: [ldev] FE.KEYID = 1
6,119,731 UART: [ldev] Erasing FE.KEYID = 1
8,626,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,428,795 UART: [ldev] --
10,434,541 UART: [fwproc] Wait for Commands...
10,437,114 UART: [fwproc] Recv command 0x46574c44
10,439,426 UART: [fwproc] Recv'd Img size: 118548 bytes
13,940,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,017,689 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,141,309 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,700,933 >>> mbox cmd response: success
14,705,727 UART: [afmc] ++
14,706,454 UART: [afmc] CDI.KEYID = 6
14,707,697 UART: [afmc] SUBJECT.KEYID = 7
14,709,137 UART: [afmc] AUTHORITY.KEYID = 5
17,258,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,001,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,003,136 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,018,278 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,033,390 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,048,295 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,071,366 UART: [afmc] --
19,075,437 UART: [cold-reset] --
19,079,302 UART: [state] Locking Datavault
19,085,681 UART: [state] Locking PCR0, PCR1 and PCR31
19,087,860 UART: [state] Locking ICCM
19,089,509 UART: [exit] Launching FMC @ 0x40000130
19,098,131 UART:
19,098,366 UART: Running Caliptra FMC ...
19,099,394 UART:
19,099,543 UART: [state] CFI Enabled
19,156,220 UART: [fht] FMC Alias Private Key: 7
20,922,169 UART: [art] Extend RT PCRs Done
20,923,539 UART: [art] Lock RT PCRs Done
20,925,459 UART: [art] Populate DV Done
20,931,029 UART: [fht] FMC Alias Private Key: 7
20,932,460 UART: [art] Derive CDI
20,933,216 UART: [art] Store in slot 0x4
20,985,104 UART: [art] Derive Key Pair
20,986,101 UART: [art] Store priv key in slot 0x5
23,449,467 UART: [art] Derive Key Pair - Done
23,462,097 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,174,987 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,485 UART: [art] PUB.X = 50D70E828F20D8342BB452EDC681E3F3E43FC28883EA178B5E5CFF4F3CA16D91434A9FA4C7D351FCC6AFA89E1DC27442
25,183,761 UART: [art] PUB.Y = D45B87E77467DAD38AE7628E259E098A12AF28911BF553C24E71F4B38F21F5E6BF73DB1A31D0AF56286282DA7839110E
25,191,019 UART: [art] SIG.R = 873F64A55CE26F6DAF59E956FDF15BFA9734C6091ED2F4DEF4B639FFC629596FC2498A349A528902781EB4DEC04610E6
25,198,449 UART: [art] SIG.S = 2DCFDE3B1FB76467CEC99D6F6CAC43B155CCC76C075DE1C942694F12E4F4D379E262713B33553ACE9FCBE4B6BBB8EA32
26,178,213 UART: Caliptra RT
26,178,914 UART: [state] CFI Enabled
26,358,180 UART: [rt] RT listening for mailbox commands...
26,360,507 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,515,986 UART: [rt]cmd =0x41544d4e, len=14344
30,511,277 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,842 writing to cptra_bootfsm_go
3,438,722 ready_for_fw is high
3,439,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,434 >>> mbox cmd response: success
19,131,463 UART:
19,131,851 UART: Running Caliptra FMC ...
19,132,946 UART:
19,133,119 UART: [state] CFI Enabled
19,198,729 UART: [fht] FMC Alias Private Key: 7
20,964,671 UART: [art] Extend RT PCRs Done
20,965,898 UART: [art] Lock RT PCRs Done
20,967,554 UART: [art] Populate DV Done
20,972,914 UART: [fht] FMC Alias Private Key: 7
20,974,503 UART: [art] Derive CDI
20,975,245 UART: [art] Store in slot 0x4
21,031,479 UART: [art] Derive Key Pair
21,032,525 UART: [art] Store priv key in slot 0x5
23,495,699 UART: [art] Derive Key Pair - Done
23,508,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,391 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,905 UART: [art] PUB.X = 9306E0AE71BAA97AE57C7302D105C333C2DE41EDAD70607A2E564DA7E3C046E63296169FA989EE973B6733278CCF0633
25,230,170 UART: [art] PUB.Y = A7FD77CF3863D4B9485CC894F83B8FA2B16A1BF920AFA80E9077CDDAB46DD311B400E95656BE663EACF4FFB567EB7C78
25,237,442 UART: [art] SIG.R = 3986A7CF72523636F4719F866A122775E5C8DE70F8DA90E309AAD30E3CC6549D80106BA59B2B5EB0360DA90A5D23DCA7
25,244,828 UART: [art] SIG.S = C5774010180A63B199C8406FA128339181B63AB85CB9C78D367605DAE08E3D3793B93CDA25D453440B07BF33818A2560
26,223,470 UART: Caliptra RT
26,224,176 UART: [state] CFI Enabled
26,405,733 UART: [rt] RT listening for mailbox commands...
26,408,058 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,563,098 UART: [rt]cmd =0x41544d4e, len=14344
30,558,692 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,482 UART:
192,845 UART: Running Caliptra ROM ...
194,041 UART:
603,850 UART: [state] CFI Enabled
615,476 UART: [state] LifecycleState = Unprovisioned
617,570 UART: [state] DebugLocked = No
618,811 UART: [state] WD Timer not started. Device not locked for debugging
623,347 UART: [kat] SHA2-256
813,263 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,029 UART: [kat] ++
824,560 UART: [kat] sha1
835,648 UART: [kat] SHA2-256
838,666 UART: [kat] SHA2-384
844,947 UART: [kat] SHA2-512-ACC
847,537 UART: [kat] ECC-384
3,288,850 UART: [kat] HMAC-384Kdf
3,302,165 UART: [kat] LMS
3,833,932 UART: [kat] --
3,837,584 UART: [cold-reset] ++
3,839,805 UART: [fht] FHT @ 0x50003400
3,850,913 UART: [idev] ++
3,851,628 UART: [idev] CDI.KEYID = 6
3,852,818 UART: [idev] SUBJECT.KEYID = 7
3,853,951 UART: [idev] UDS.KEYID = 0
3,854,890 ready_for_fw is high
3,855,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,037 UART: [idev] Erasing UDS.KEYID = 0
6,328,380 UART: [idev] Sha1 KeyId Algorithm
6,350,505 UART: [idev] --
6,355,252 UART: [ldev] ++
6,355,948 UART: [ldev] CDI.KEYID = 6
6,356,838 UART: [ldev] SUBJECT.KEYID = 5
6,358,054 UART: [ldev] AUTHORITY.KEYID = 7
6,359,242 UART: [ldev] FE.KEYID = 1
6,370,729 UART: [ldev] Erasing FE.KEYID = 1
8,844,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,463 UART: [ldev] --
10,634,051 UART: [fwproc] Wait for Commands...
10,637,228 UART: [fwproc] Recv command 0x46574c44
10,639,539 UART: [fwproc] Recv'd Img size: 118548 bytes
14,139,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,215,202 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,338,825 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,899,689 >>> mbox cmd response: success
14,902,890 UART: [afmc] ++
14,903,622 UART: [afmc] CDI.KEYID = 6
14,904,736 UART: [afmc] SUBJECT.KEYID = 7
14,906,235 UART: [afmc] AUTHORITY.KEYID = 5
17,408,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,129,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,131,482 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,146,617 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,161,768 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,176,650 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,199,564 UART: [afmc] --
19,202,891 UART: [cold-reset] --
19,207,951 UART: [state] Locking Datavault
19,212,997 UART: [state] Locking PCR0, PCR1 and PCR31
19,215,197 UART: [state] Locking ICCM
19,217,509 UART: [exit] Launching FMC @ 0x40000130
19,226,149 UART:
19,226,390 UART: Running Caliptra FMC ...
19,227,425 UART:
19,227,580 UART: [state] CFI Enabled
19,235,576 UART: [fht] FMC Alias Private Key: 7
21,002,568 UART: [art] Extend RT PCRs Done
21,003,818 UART: [art] Lock RT PCRs Done
21,005,425 UART: [art] Populate DV Done
21,010,796 UART: [fht] FMC Alias Private Key: 7
21,012,317 UART: [art] Derive CDI
21,013,098 UART: [art] Store in slot 0x4
21,055,700 UART: [art] Derive Key Pair
21,056,745 UART: [art] Store priv key in slot 0x5
23,484,046 UART: [art] Derive Key Pair - Done
23,496,726 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,553 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,076 UART: [art] PUB.X = CA8E14C64602450FB1A94FDB60EC2C9AF94DB029F074F46E8A313610360A1F6D888B10ED657B699CEA12E02ED9F30893
25,211,299 UART: [art] PUB.Y = 07DED88AF461FCCCBEF80E5C6CCD0572F434D944EA7A3B5A5005A873F4A736C571750C41D5A9AC23CFA9820B1E3E6F71
25,218,610 UART: [art] SIG.R = 8EDAF9D1A9E672BA58BD2342D27C2AB34D8B0D5C931148497ACEF3AE933313A9BB5573B8586CA0B48DADB76A248A01EE
25,225,986 UART: [art] SIG.S = A317E4FF82A7DABECBF20FD0A89F5F8426BF2A5CDA97BB81193E05C2B338A69FDB75E0B0F51FB26B909AF85E3BFF4A98
26,204,519 UART: Caliptra RT
26,205,218 UART: [state] CFI Enabled
26,338,818 UART: [rt] RT listening for mailbox commands...
26,341,275 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,496,648 UART: [rt]cmd =0x41544d4e, len=14344
30,491,884 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,757,657 ready_for_fw is high
3,758,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,071,800 >>> mbox cmd response: success
19,329,311 UART:
19,329,729 UART: Running Caliptra FMC ...
19,330,855 UART:
19,331,020 UART: [state] CFI Enabled
19,338,983 UART: [fht] FMC Alias Private Key: 7
21,105,114 UART: [art] Extend RT PCRs Done
21,106,363 UART: [art] Lock RT PCRs Done
21,108,019 UART: [art] Populate DV Done
21,113,490 UART: [fht] FMC Alias Private Key: 7
21,115,200 UART: [art] Derive CDI
21,115,942 UART: [art] Store in slot 0x4
21,158,871 UART: [art] Derive Key Pair
21,159,923 UART: [art] Store priv key in slot 0x5
23,587,061 UART: [art] Derive Key Pair - Done
23,600,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,306,579 UART: [art] Erasing AUTHORITY.KEYID = 7
25,308,093 UART: [art] PUB.X = 9EA5911184A2784A7F404A564614D48880898FF8EDA794D282A945AFE2F4F77987BDA613586A7A3D4C304C0D8801C876
25,315,350 UART: [art] PUB.Y = 6E30CA13BD670A7B7F6A0555B7F235AEABE618B7402CDFFA0CA6907CB08656ED41D858E0C1C2EE0DC13A18D94578E1D4
25,322,609 UART: [art] SIG.R = CFB43BC1B791B0A14532E99FA10DE5808B5764376444BE43A618205EA7A5C3199D82CF29C011801AFE7F6C7AE99714B7
25,330,010 UART: [art] SIG.S = 22DB0A6E99F0A67EACB90D239DBF478498B0C9094D6E26F898A083FC7FED8F6AF2B7C623F6C710C8430195C336E63E85
26,309,398 UART: Caliptra RT
26,310,105 UART: [state] CFI Enabled
26,441,798 UART: [rt] RT listening for mailbox commands...
26,444,133 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,599,650 UART: [rt]cmd =0x41544d4e, len=14344
30,595,220 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,347 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,915 UART: [kat] SHA2-256
881,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,961 UART: [kat] ++
886,113 UART: [kat] sha1
890,331 UART: [kat] SHA2-256
892,269 UART: [kat] SHA2-384
895,030 UART: [kat] SHA2-512-ACC
896,931 UART: [kat] ECC-384
902,678 UART: [kat] HMAC-384Kdf
907,112 UART: [kat] LMS
1,475,308 UART: [kat] --
1,476,155 UART: [cold-reset] ++
1,476,587 UART: [fht] Storing FHT @ 0x50003400
1,479,422 UART: [idev] ++
1,479,590 UART: [idev] CDI.KEYID = 6
1,479,950 UART: [idev] SUBJECT.KEYID = 7
1,480,374 UART: [idev] UDS.KEYID = 0
1,480,719 ready_for_fw is high
1,480,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,248 UART: [idev] Erasing UDS.KEYID = 0
1,504,874 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,500 UART: [idev] --
1,514,701 UART: [ldev] ++
1,514,869 UART: [ldev] CDI.KEYID = 6
1,515,232 UART: [ldev] SUBJECT.KEYID = 5
1,515,658 UART: [ldev] AUTHORITY.KEYID = 7
1,516,121 UART: [ldev] FE.KEYID = 1
1,521,373 UART: [ldev] Erasing FE.KEYID = 1
1,546,618 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,434 UART: [ldev] --
1,585,709 UART: [fwproc] Waiting for Commands...
1,586,522 UART: [fwproc] Received command 0x46574c44
1,587,313 UART: [fwproc] Received Image of size 118548 bytes
2,932,283 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,249 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,467 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,726 >>> mbox cmd response: success
3,132,934 UART: [afmc] ++
3,133,102 UART: [afmc] CDI.KEYID = 6
3,133,464 UART: [afmc] SUBJECT.KEYID = 7
3,133,889 UART: [afmc] AUTHORITY.KEYID = 5
3,169,640 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,882 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,662 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,371 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,254 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,937 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,681 UART: [afmc] --
3,212,639 UART: [cold-reset] --
3,213,395 UART: [state] Locking Datavault
3,214,650 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,254 UART: [state] Locking ICCM
3,215,878 UART: [exit] Launching FMC @ 0x40000130
3,221,208 UART:
3,221,224 UART: Running Caliptra FMC ...
3,221,632 UART:
3,221,686 UART: [state] CFI Enabled
3,232,234 UART: [fht] FMC Alias Private Key: 7
3,350,852 UART: [art] Extend RT PCRs Done
3,351,280 UART: [art] Lock RT PCRs Done
3,352,950 UART: [art] Populate DV Done
3,361,441 UART: [fht] FMC Alias Private Key: 7
3,362,599 UART: [art] Derive CDI
3,362,879 UART: [art] Store in slot 0x4
3,448,583 UART: [art] Derive Key Pair
3,448,943 UART: [art] Store priv key in slot 0x5
3,461,878 UART: [art] Derive Key Pair - Done
3,476,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,664 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,429 UART: [art] PUB.X = BCE85E2F4C2CC0F929BFA9E3B516FBEE45F196F854FD1903F413208301D3B38E2B78EED3654C4AE1A32A4D4C93FA9198
3,499,209 UART: [art] PUB.Y = 2CB83491742AC684C432A60D73DBE4DF2FFDBEEBE89B4A713C62D247482386F337C80CB558EF8C9A0F857FC8F5B4F8C6
3,506,166 UART: [art] SIG.R = C8859A0BAE6B319E08B6C6A4C9FDE560B84729CCDB4163B995850FE22B67333CAAFB1B3E158FC9CA83B8616610D5DE05
3,512,938 UART: [art] SIG.S = 0E95764DFF98ED5CF36706F5DFD138034161C1DEDB45636420BE8B6B57D9E0D7C178590AAC5C5B121C16E0CAAF0909B6
3,536,604 UART: Caliptra RT
3,536,855 UART: [state] CFI Enabled
3,657,345 UART: [rt] RT listening for mailbox commands...
3,658,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,073 UART: [rt]cmd =0x41544d4e, len=14344
4,090,390 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,779 ready_for_fw is high
1,362,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,638 >>> mbox cmd response: success
3,042,293 UART:
3,042,309 UART: Running Caliptra FMC ...
3,042,717 UART:
3,042,771 UART: [state] CFI Enabled
3,053,393 UART: [fht] FMC Alias Private Key: 7
3,172,687 UART: [art] Extend RT PCRs Done
3,173,115 UART: [art] Lock RT PCRs Done
3,174,689 UART: [art] Populate DV Done
3,183,078 UART: [fht] FMC Alias Private Key: 7
3,184,096 UART: [art] Derive CDI
3,184,376 UART: [art] Store in slot 0x4
3,270,214 UART: [art] Derive Key Pair
3,270,574 UART: [art] Store priv key in slot 0x5
3,283,881 UART: [art] Derive Key Pair - Done
3,298,977 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,173 UART: [art] PUB.X = B6F50D5D54B7D7A70510614C949A2F54239AEB58EE1B6C961A6A4B21AAF8743519B3C720CD0FD1F05F811B02BAC44775
3,321,939 UART: [art] PUB.Y = 98A8062E6475FAE992F1C09E48752DBBF6FC4E9FBE95FA91B01D9DF93DEBD354B98B52F15221F5FCD4DDFFC606FC7739
3,328,905 UART: [art] SIG.R = 03F87C5106511ACBC51B9BAFAB9160053B0FE9450CB66BAE5AD50207106A25A855723F7367FBD986E56206D13DC47ED9
3,335,657 UART: [art] SIG.S = 3DB69A96A14208A4510E5E9F3EB8C0B5457E11EAC766F4F2B14CAC5877C377EF4F462727FA6ACC2440E72D0DEE8F8C6F
3,359,354 UART: Caliptra RT
3,359,605 UART: [state] CFI Enabled
3,480,988 UART: [rt] RT listening for mailbox commands...
3,481,658 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,844 UART: [rt]cmd =0x41544d4e, len=14344
3,914,669 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,476 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,040 UART: [kat] SHA2-256
881,971 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,086 UART: [kat] ++
886,238 UART: [kat] sha1
890,354 UART: [kat] SHA2-256
892,292 UART: [kat] SHA2-384
895,055 UART: [kat] SHA2-512-ACC
896,956 UART: [kat] ECC-384
902,481 UART: [kat] HMAC-384Kdf
907,225 UART: [kat] LMS
1,475,421 UART: [kat] --
1,476,130 UART: [cold-reset] ++
1,476,524 UART: [fht] Storing FHT @ 0x50003400
1,479,219 UART: [idev] ++
1,479,387 UART: [idev] CDI.KEYID = 6
1,479,747 UART: [idev] SUBJECT.KEYID = 7
1,480,171 UART: [idev] UDS.KEYID = 0
1,480,516 ready_for_fw is high
1,480,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,413 UART: [idev] Erasing UDS.KEYID = 0
1,505,027 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,715 UART: [idev] --
1,514,852 UART: [ldev] ++
1,515,020 UART: [ldev] CDI.KEYID = 6
1,515,383 UART: [ldev] SUBJECT.KEYID = 5
1,515,809 UART: [ldev] AUTHORITY.KEYID = 7
1,516,272 UART: [ldev] FE.KEYID = 1
1,521,732 UART: [ldev] Erasing FE.KEYID = 1
1,547,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,151 UART: [ldev] --
1,586,652 UART: [fwproc] Waiting for Commands...
1,587,405 UART: [fwproc] Received command 0x46574c44
1,588,196 UART: [fwproc] Received Image of size 118548 bytes
2,932,856 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,020 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,238 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,473 >>> mbox cmd response: success
3,133,705 UART: [afmc] ++
3,133,873 UART: [afmc] CDI.KEYID = 6
3,134,235 UART: [afmc] SUBJECT.KEYID = 7
3,134,660 UART: [afmc] AUTHORITY.KEYID = 5
3,170,437 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,613 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,393 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,102 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,985 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,668 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,484 UART: [afmc] --
3,213,574 UART: [cold-reset] --
3,214,354 UART: [state] Locking Datavault
3,215,315 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,919 UART: [state] Locking ICCM
3,216,433 UART: [exit] Launching FMC @ 0x40000130
3,221,763 UART:
3,221,779 UART: Running Caliptra FMC ...
3,222,187 UART:
3,222,330 UART: [state] CFI Enabled
3,232,864 UART: [fht] FMC Alias Private Key: 7
3,351,442 UART: [art] Extend RT PCRs Done
3,351,870 UART: [art] Lock RT PCRs Done
3,353,708 UART: [art] Populate DV Done
3,361,925 UART: [fht] FMC Alias Private Key: 7
3,362,947 UART: [art] Derive CDI
3,363,227 UART: [art] Store in slot 0x4
3,449,171 UART: [art] Derive Key Pair
3,449,531 UART: [art] Store priv key in slot 0x5
3,463,080 UART: [art] Derive Key Pair - Done
3,477,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,371 UART: [art] PUB.X = 2C6EF4091FB6C452310A5375DCA439EE8FEB9BD52D9EEE075D4FFB49E858D0ED27EE1B4F6346D2E17CC9805E167D1632
3,501,148 UART: [art] PUB.Y = 9324D8D389D195400889D0DA5AB9CA162839B262A76836AB3E571EEE82A9C116985F7006A561B1CBAB0E00BB9D68AF1A
3,508,073 UART: [art] SIG.R = 83D6DA2C25448468F8E62D33E752721E6B50D9E607F1BF6666AE8CC7C153817A140C8BFB0F42AC12EE56B8FC8742125C
3,514,840 UART: [art] SIG.S = 53D3719329F40048412D413248B84FDF7F4AD644560F4B2A3695D44CEEAECFF58852DDF03E3DA783CA22112EB2B28A28
3,539,243 UART: Caliptra RT
3,539,586 UART: [state] CFI Enabled
3,659,872 UART: [rt] RT listening for mailbox commands...
3,660,542 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,552 UART: [rt]cmd =0x41544d4e, len=14344
4,093,835 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,372 ready_for_fw is high
1,362,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,005 >>> mbox cmd response: success
3,042,528 UART:
3,042,544 UART: Running Caliptra FMC ...
3,042,952 UART:
3,043,095 UART: [state] CFI Enabled
3,053,873 UART: [fht] FMC Alias Private Key: 7
3,173,653 UART: [art] Extend RT PCRs Done
3,174,081 UART: [art] Lock RT PCRs Done
3,175,585 UART: [art] Populate DV Done
3,183,686 UART: [fht] FMC Alias Private Key: 7
3,184,754 UART: [art] Derive CDI
3,185,034 UART: [art] Store in slot 0x4
3,270,448 UART: [art] Derive Key Pair
3,270,808 UART: [art] Store priv key in slot 0x5
3,283,637 UART: [art] Derive Key Pair - Done
3,298,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,084 UART: [art] PUB.X = 8BB4639F79192729C1B693E27B3B92BBE1E6E4B3BE634E96BAD7CC926B66E799AC61A77D1C6763A1A262454474C38651
3,320,856 UART: [art] PUB.Y = DB3B38632F9292FE93F4648CF54D8B6F350F6E1137BF6E8D4635EC32272A7010F4B29B00D64237C69C343834E04670F6
3,327,777 UART: [art] SIG.R = 2CC550F746DC4702EDEAB2B7C52F91F91FC4E1104143F3FB22F3106F5FC80C2FE4CFF1FAC11758002134237FDEE6F254
3,334,533 UART: [art] SIG.S = 8261C3A8C0B0EB37C0DF084BB4D3F92B1EBB2371817503EE8DA86957A51786F3DAFC946DF8F55CBEEDD695F68788B119
3,358,177 UART: Caliptra RT
3,358,520 UART: [state] CFI Enabled
3,479,258 UART: [rt] RT listening for mailbox commands...
3,479,928 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,842 UART: [rt]cmd =0x41544d4e, len=14344
3,912,981 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,300 UART: [kat] ++
895,452 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
915,899 UART: [kat] HMAC-384Kdf
920,425 UART: [kat] LMS
1,168,737 UART: [kat] --
1,169,586 UART: [cold-reset] ++
1,169,938 UART: [fht] FHT @ 0x50003400
1,172,538 UART: [idev] ++
1,172,706 UART: [idev] CDI.KEYID = 6
1,173,067 UART: [idev] SUBJECT.KEYID = 7
1,173,492 UART: [idev] UDS.KEYID = 0
1,173,838 ready_for_fw is high
1,173,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,785 UART: [idev] Erasing UDS.KEYID = 0
1,198,507 UART: [idev] Sha1 KeyId Algorithm
1,207,359 UART: [idev] --
1,208,218 UART: [ldev] ++
1,208,386 UART: [ldev] CDI.KEYID = 6
1,208,750 UART: [ldev] SUBJECT.KEYID = 5
1,209,177 UART: [ldev] AUTHORITY.KEYID = 7
1,209,640 UART: [ldev] FE.KEYID = 1
1,214,918 UART: [ldev] Erasing FE.KEYID = 1
1,240,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,242 UART: [ldev] --
1,279,673 UART: [fwproc] Wait for Commands...
1,280,494 UART: [fwproc] Recv command 0x46574c44
1,281,227 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,519 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,694 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,881 >>> mbox cmd response: success
2,825,905 UART: [afmc] ++
2,826,073 UART: [afmc] CDI.KEYID = 6
2,826,436 UART: [afmc] SUBJECT.KEYID = 7
2,826,862 UART: [afmc] AUTHORITY.KEYID = 5
2,861,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,214 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,963 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,673 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,554 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,255 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,228 UART: [afmc] --
2,905,175 UART: [cold-reset] --
2,906,247 UART: [state] Locking Datavault
2,907,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,102 UART: [state] Locking ICCM
2,908,606 UART: [exit] Launching FMC @ 0x40000130
2,913,936 UART:
2,913,952 UART: Running Caliptra FMC ...
2,914,360 UART:
2,914,414 UART: [state] CFI Enabled
2,924,826 UART: [fht] FMC Alias Private Key: 7
3,043,242 UART: [art] Extend RT PCRs Done
3,043,670 UART: [art] Lock RT PCRs Done
3,044,868 UART: [art] Populate DV Done
3,053,063 UART: [fht] FMC Alias Private Key: 7
3,054,197 UART: [art] Derive CDI
3,054,477 UART: [art] Store in slot 0x4
3,140,118 UART: [art] Derive Key Pair
3,140,478 UART: [art] Store priv key in slot 0x5
3,153,766 UART: [art] Derive Key Pair - Done
3,168,475 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,528 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,293 UART: [art] PUB.X = C720C5657002E823E3AD9DA56C1BD7BE40D2CA18E378068AC397C5BB8680940D644C0A2F16A081409C037EB2ADD67932
3,191,052 UART: [art] PUB.Y = 3F0A95B381BA2E117759E7688D54E99A3AB1D3573D32470F24F46112458C4F43F848CB5615AF62867FC4CC7E7DF138FE
3,197,998 UART: [art] SIG.R = C112102A1727456C65293C3A757A0B172617CF639D0A21E1B33423ECC3F08C9619EE4CC576257D3F6C0C8CF913BC5036
3,204,757 UART: [art] SIG.S = 8E469A55C96B0505D9FBB26AEA6982CB12B14B700D8CAC0AE3D699536F212C434733561D127E28E207E127A03DCF9BC3
3,228,396 UART: Caliptra RT
3,228,647 UART: [state] CFI Enabled
3,347,527 UART: [rt] RT listening for mailbox commands...
3,348,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,233 UART: [rt]cmd =0x41544d4e, len=14344
3,780,880 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,524 ready_for_fw is high
1,059,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,742 >>> mbox cmd response: success
2,743,267 UART:
2,743,283 UART: Running Caliptra FMC ...
2,743,691 UART:
2,743,745 UART: [state] CFI Enabled
2,754,577 UART: [fht] FMC Alias Private Key: 7
2,873,203 UART: [art] Extend RT PCRs Done
2,873,631 UART: [art] Lock RT PCRs Done
2,875,045 UART: [art] Populate DV Done
2,883,398 UART: [fht] FMC Alias Private Key: 7
2,884,404 UART: [art] Derive CDI
2,884,684 UART: [art] Store in slot 0x4
2,970,843 UART: [art] Derive Key Pair
2,971,203 UART: [art] Store priv key in slot 0x5
2,984,705 UART: [art] Derive Key Pair - Done
2,999,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,497 UART: [art] PUB.X = 4ACCA806ECDCE8ACE70EDD4A06E7E3600257F772AA286D76E79BFF8BE69551062B8793DF9089B00FA69A1113BBCA9038
3,022,265 UART: [art] PUB.Y = 42FDFDFDB969651355B1939F85C375B974DE313C582157CBA40E8E8C37F4CEA81382F94073DE0BBB097504D2388CB430
3,029,207 UART: [art] SIG.R = CFD222F7EF9A700BAB9A4E55B7B0554A7542B29A9311BE194B2A358D31B248B833143FE12D760787A7CE699C14679D6E
3,035,975 UART: [art] SIG.S = 612A85FA29B05A2F88DDC70B0B0104F44B21AE38D053C41223E2037E06045F5FD750C68B4E963059C222CB65D5BBCEE8
3,060,244 UART: Caliptra RT
3,060,495 UART: [state] CFI Enabled
3,180,502 UART: [rt] RT listening for mailbox commands...
3,181,172 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,302 UART: [rt]cmd =0x41544d4e, len=14344
3,613,875 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,571 UART: [kat] ++
895,723 UART: [kat] sha1
900,057 UART: [kat] SHA2-256
901,997 UART: [kat] SHA2-384
904,794 UART: [kat] SHA2-512-ACC
906,695 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
921,138 UART: [kat] LMS
1,169,450 UART: [kat] --
1,170,453 UART: [cold-reset] ++
1,171,009 UART: [fht] FHT @ 0x50003400
1,173,809 UART: [idev] ++
1,173,977 UART: [idev] CDI.KEYID = 6
1,174,338 UART: [idev] SUBJECT.KEYID = 7
1,174,763 UART: [idev] UDS.KEYID = 0
1,175,109 ready_for_fw is high
1,175,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,962 UART: [idev] Erasing UDS.KEYID = 0
1,199,848 UART: [idev] Sha1 KeyId Algorithm
1,208,752 UART: [idev] --
1,209,723 UART: [ldev] ++
1,209,891 UART: [ldev] CDI.KEYID = 6
1,210,255 UART: [ldev] SUBJECT.KEYID = 5
1,210,682 UART: [ldev] AUTHORITY.KEYID = 7
1,211,145 UART: [ldev] FE.KEYID = 1
1,216,705 UART: [ldev] Erasing FE.KEYID = 1
1,243,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,641 UART: [ldev] --
1,282,026 UART: [fwproc] Wait for Commands...
1,282,743 UART: [fwproc] Recv command 0x46574c44
1,283,476 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,348 >>> mbox cmd response: success
2,826,422 UART: [afmc] ++
2,826,590 UART: [afmc] CDI.KEYID = 6
2,826,953 UART: [afmc] SUBJECT.KEYID = 7
2,827,379 UART: [afmc] AUTHORITY.KEYID = 5
2,862,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,464 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,174 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,055 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,756 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,433 UART: [afmc] --
2,905,488 UART: [cold-reset] --
2,906,398 UART: [state] Locking Datavault
2,907,599 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,203 UART: [state] Locking ICCM
2,908,873 UART: [exit] Launching FMC @ 0x40000130
2,914,203 UART:
2,914,219 UART: Running Caliptra FMC ...
2,914,627 UART:
2,914,770 UART: [state] CFI Enabled
2,925,314 UART: [fht] FMC Alias Private Key: 7
3,044,646 UART: [art] Extend RT PCRs Done
3,045,074 UART: [art] Lock RT PCRs Done
3,046,706 UART: [art] Populate DV Done
3,054,995 UART: [fht] FMC Alias Private Key: 7
3,055,969 UART: [art] Derive CDI
3,056,249 UART: [art] Store in slot 0x4
3,142,112 UART: [art] Derive Key Pair
3,142,472 UART: [art] Store priv key in slot 0x5
3,155,914 UART: [art] Derive Key Pair - Done
3,170,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,703 UART: [art] PUB.X = 6376B90DB5415EE4D5ADCD6A50215478E29D57A2F0B34EEEAC1D65BE1FC5F37C7A2AC05170688038CB30B34C0C3BA1C8
3,193,483 UART: [art] PUB.Y = ACEFBA04829D1D754538C97914447888E02670E393AFAD34514D00C126F254E3A3685C1F578ED7E220B0B9B3970F2A3C
3,200,405 UART: [art] SIG.R = 735A12944E09AFC8A879BA1D0CEEA379B44E5B18FBBF5F663522F33B97C3EEE2DAD90F94DD2DC46679723A690071D98F
3,207,158 UART: [art] SIG.S = 61EC538B6D18142E9D47BFD6D402A135DB6E22A85354B240E077B738B5B6A8A46D0EF13AA3783C07EADE3D67BB5E006E
3,230,631 UART: Caliptra RT
3,230,974 UART: [state] CFI Enabled
3,349,398 UART: [rt] RT listening for mailbox commands...
3,350,068 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,112 UART: [rt]cmd =0x41544d4e, len=14344
3,783,441 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,441 ready_for_fw is high
1,059,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,919 >>> mbox cmd response: success
2,740,716 UART:
2,740,732 UART: Running Caliptra FMC ...
2,741,140 UART:
2,741,283 UART: [state] CFI Enabled
2,752,179 UART: [fht] FMC Alias Private Key: 7
2,870,853 UART: [art] Extend RT PCRs Done
2,871,281 UART: [art] Lock RT PCRs Done
2,872,881 UART: [art] Populate DV Done
2,880,868 UART: [fht] FMC Alias Private Key: 7
2,881,964 UART: [art] Derive CDI
2,882,244 UART: [art] Store in slot 0x4
2,967,861 UART: [art] Derive Key Pair
2,968,221 UART: [art] Store priv key in slot 0x5
2,981,463 UART: [art] Derive Key Pair - Done
2,996,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,459 UART: [art] PUB.X = 0B6A4073DBDBBF1545998E4C2238DB71A23F71B7F768D36BB38AA80A5B8866B8B25112A9A8ADA7CAC8E6323467D774AB
3,019,235 UART: [art] PUB.Y = F9E2597A59A93D234A3C5D98955E6C7E52BB4150C578D49EDC686C83E79EAF58B5E4D168A1D53284464356A0F0135369
3,026,183 UART: [art] SIG.R = A4D4CD945D7CC0F244A252D3DB03B44CDDD3C482A17C539C46DEEE6BBEAA400BC80F7A17E37CC4DFA5AA4A0E90CF3FF0
3,032,975 UART: [art] SIG.S = D1E8CCF69710DB51EDD4F54B3C291727328A7E41EC91BCF9A685DCD9C798CB7B04D5F26EB1211E0B4F3F6DA2D3E4A323
3,056,865 UART: Caliptra RT
3,057,208 UART: [state] CFI Enabled
3,177,064 UART: [rt] RT listening for mailbox commands...
3,177,734 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,124 UART: [rt]cmd =0x41544d4e, len=14344
3,611,157 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
893,318 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,443 UART: [kat] ++
897,595 UART: [kat] sha1
901,839 UART: [kat] SHA2-256
903,779 UART: [kat] SHA2-384
906,384 UART: [kat] SHA2-512-ACC
908,285 UART: [kat] ECC-384
918,190 UART: [kat] HMAC-384Kdf
922,798 UART: [kat] LMS
1,171,126 UART: [kat] --
1,172,063 UART: [cold-reset] ++
1,172,619 UART: [fht] FHT @ 0x50003400
1,175,252 UART: [idev] ++
1,175,420 UART: [idev] CDI.KEYID = 6
1,175,780 UART: [idev] SUBJECT.KEYID = 7
1,176,204 UART: [idev] UDS.KEYID = 0
1,176,549 ready_for_fw is high
1,176,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,246 UART: [idev] Erasing UDS.KEYID = 0
1,201,887 UART: [idev] Sha1 KeyId Algorithm
1,210,385 UART: [idev] --
1,211,395 UART: [ldev] ++
1,211,563 UART: [ldev] CDI.KEYID = 6
1,211,926 UART: [ldev] SUBJECT.KEYID = 5
1,212,352 UART: [ldev] AUTHORITY.KEYID = 7
1,212,815 UART: [ldev] FE.KEYID = 1
1,218,105 UART: [ldev] Erasing FE.KEYID = 1
1,244,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,601 UART: [ldev] --
1,283,972 UART: [fwproc] Wait for Commands...
1,284,722 UART: [fwproc] Recv command 0x46574c44
1,285,450 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,892 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,062 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,343 >>> mbox cmd response: success
2,829,409 UART: [afmc] ++
2,829,577 UART: [afmc] CDI.KEYID = 6
2,829,939 UART: [afmc] SUBJECT.KEYID = 7
2,830,364 UART: [afmc] AUTHORITY.KEYID = 5
2,866,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,744 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,453 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,336 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,037 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,039 UART: [afmc] --
2,909,963 UART: [cold-reset] --
2,910,767 UART: [state] Locking Datavault
2,912,196 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,800 UART: [state] Locking ICCM
2,913,386 UART: [exit] Launching FMC @ 0x40000130
2,918,716 UART:
2,918,732 UART: Running Caliptra FMC ...
2,919,140 UART:
2,919,194 UART: [state] CFI Enabled
2,929,868 UART: [fht] FMC Alias Private Key: 7
3,049,398 UART: [art] Extend RT PCRs Done
3,049,826 UART: [art] Lock RT PCRs Done
3,051,498 UART: [art] Populate DV Done
3,059,679 UART: [fht] FMC Alias Private Key: 7
3,060,685 UART: [art] Derive CDI
3,060,965 UART: [art] Store in slot 0x4
3,146,548 UART: [art] Derive Key Pair
3,146,908 UART: [art] Store priv key in slot 0x5
3,159,756 UART: [art] Derive Key Pair - Done
3,174,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,140 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,905 UART: [art] PUB.X = CF9FFCB51A5F0724C922C8A6602F67AE42E0687C781A4D70CC1D10B71F859132AF76BA644252CC744ABC4D04FA761364
3,197,677 UART: [art] PUB.Y = 1BD892B3D6602B6E60DB80D98471D27B2D4E398996388F7F4232D029454E24CE8F53FB24F93F8AE423ABFBB3E01E44F8
3,204,633 UART: [art] SIG.R = D6B47EA5F8E3922990AED6AD2D0E3A1C22B4EFE41532BC1D771480F656C2F21559D2B3B1B754AAFE1080E2C2E9514E75
3,211,412 UART: [art] SIG.S = 743BB12D8E907D82010CDC26C131F99AF6F8D6417EEE4117A3D1A11413D1775DD95E9E1BB88C576879F4E8B480C06351
3,235,088 UART: Caliptra RT
3,235,339 UART: [state] CFI Enabled
3,354,766 UART: [rt] RT listening for mailbox commands...
3,355,436 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,582 UART: [rt]cmd =0x41544d4e, len=14344
3,787,871 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,057 ready_for_fw is high
1,060,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,150 >>> mbox cmd response: success
2,740,363 UART:
2,740,379 UART: Running Caliptra FMC ...
2,740,787 UART:
2,740,841 UART: [state] CFI Enabled
2,751,193 UART: [fht] FMC Alias Private Key: 7
2,870,505 UART: [art] Extend RT PCRs Done
2,870,933 UART: [art] Lock RT PCRs Done
2,872,621 UART: [art] Populate DV Done
2,880,746 UART: [fht] FMC Alias Private Key: 7
2,881,772 UART: [art] Derive CDI
2,882,052 UART: [art] Store in slot 0x4
2,967,455 UART: [art] Derive Key Pair
2,967,815 UART: [art] Store priv key in slot 0x5
2,981,031 UART: [art] Derive Key Pair - Done
2,995,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,220 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,985 UART: [art] PUB.X = 440FCA689026EDBAFF9085E1B4FEFEF71A0D4EEB0C13D4F7AB0566DF90FDE53513A2B5D2CAC4E39CCA31591901F38929
3,018,762 UART: [art] PUB.Y = 20585F3831B77E666AF7D2F69D6EC1DE282609E99E62838318F5BE0CB059C65B67FB2219D1B502F27FD3CD74D7ECAC63
3,025,711 UART: [art] SIG.R = 2AA6D0929A7C27F8CD7F2EA76240C677ACC633E2B389F850B931D827546937ACDE8CBC259F7CD44BE3C49DEA08B571E7
3,032,492 UART: [art] SIG.S = 9F89BB5D553DFCA6ED59A7749DFC8C5B5F1C270ED9A38CBBBE277B69F1FC503CC5D34CD320FBE49C0F886FE9EDD3C13B
3,056,590 UART: Caliptra RT
3,056,841 UART: [state] CFI Enabled
3,177,016 UART: [rt] RT listening for mailbox commands...
3,177,686 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,434 UART: [rt]cmd =0x41544d4e, len=14344
3,609,669 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
893,645 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,770 UART: [kat] ++
897,922 UART: [kat] sha1
901,978 UART: [kat] SHA2-256
903,918 UART: [kat] SHA2-384
906,653 UART: [kat] SHA2-512-ACC
908,554 UART: [kat] ECC-384
918,421 UART: [kat] HMAC-384Kdf
923,241 UART: [kat] LMS
1,171,569 UART: [kat] --
1,172,380 UART: [cold-reset] ++
1,172,830 UART: [fht] FHT @ 0x50003400
1,175,591 UART: [idev] ++
1,175,759 UART: [idev] CDI.KEYID = 6
1,176,119 UART: [idev] SUBJECT.KEYID = 7
1,176,543 UART: [idev] UDS.KEYID = 0
1,176,888 ready_for_fw is high
1,176,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,157 UART: [idev] Erasing UDS.KEYID = 0
1,201,710 UART: [idev] Sha1 KeyId Algorithm
1,210,240 UART: [idev] --
1,211,394 UART: [ldev] ++
1,211,562 UART: [ldev] CDI.KEYID = 6
1,211,925 UART: [ldev] SUBJECT.KEYID = 5
1,212,351 UART: [ldev] AUTHORITY.KEYID = 7
1,212,814 UART: [ldev] FE.KEYID = 1
1,218,044 UART: [ldev] Erasing FE.KEYID = 1
1,245,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,166 UART: [ldev] --
1,284,589 UART: [fwproc] Wait for Commands...
1,285,239 UART: [fwproc] Recv command 0x46574c44
1,285,967 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,517 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,687 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,884 >>> mbox cmd response: success
2,829,984 UART: [afmc] ++
2,830,152 UART: [afmc] CDI.KEYID = 6
2,830,514 UART: [afmc] SUBJECT.KEYID = 7
2,830,939 UART: [afmc] AUTHORITY.KEYID = 5
2,866,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,315 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,024 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,907 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,608 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,300 UART: [afmc] --
2,909,214 UART: [cold-reset] --
2,910,010 UART: [state] Locking Datavault
2,910,937 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,541 UART: [state] Locking ICCM
2,912,071 UART: [exit] Launching FMC @ 0x40000130
2,917,401 UART:
2,917,417 UART: Running Caliptra FMC ...
2,917,825 UART:
2,917,968 UART: [state] CFI Enabled
2,928,536 UART: [fht] FMC Alias Private Key: 7
3,048,158 UART: [art] Extend RT PCRs Done
3,048,586 UART: [art] Lock RT PCRs Done
3,050,182 UART: [art] Populate DV Done
3,058,189 UART: [fht] FMC Alias Private Key: 7
3,059,169 UART: [art] Derive CDI
3,059,449 UART: [art] Store in slot 0x4
3,145,480 UART: [art] Derive Key Pair
3,145,840 UART: [art] Store priv key in slot 0x5
3,159,066 UART: [art] Derive Key Pair - Done
3,174,141 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,003 UART: [art] PUB.X = 64F4DD4D116BF427E3C099A964AEFB11A31480FF4AEA0DAF8450E26EEE6F9DA6FA61358F25C3034056206C3923DDA59D
3,196,781 UART: [art] PUB.Y = 396D12344994FB7827056F727B9FA76857B64963F61002A3FB8D20837EFD2C720A97B1C209D8CB1300AB67A34A5C43A5
3,203,693 UART: [art] SIG.R = 5C6BC29A147DF5CDD8CEC5AAA78A553B16877EAC096E3373E27B1082C1ECFAE809E65E3FFC0E3EAF8D6628E3E9030766
3,210,468 UART: [art] SIG.S = ED45FAF46A7FFAF6BC93911D2E9855A2D7F346024964DAA7D12540A862745DE3380ACB030F573B832B3D24845A1B4DAB
3,234,628 UART: Caliptra RT
3,234,971 UART: [state] CFI Enabled
3,354,666 UART: [rt] RT listening for mailbox commands...
3,355,336 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,326 UART: [rt]cmd =0x41544d4e, len=14344
3,788,623 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,394 ready_for_fw is high
1,060,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,895 >>> mbox cmd response: success
2,742,668 UART:
2,742,684 UART: Running Caliptra FMC ...
2,743,092 UART:
2,743,235 UART: [state] CFI Enabled
2,753,955 UART: [fht] FMC Alias Private Key: 7
2,872,743 UART: [art] Extend RT PCRs Done
2,873,171 UART: [art] Lock RT PCRs Done
2,874,635 UART: [art] Populate DV Done
2,883,148 UART: [fht] FMC Alias Private Key: 7
2,884,184 UART: [art] Derive CDI
2,884,464 UART: [art] Store in slot 0x4
2,970,087 UART: [art] Derive Key Pair
2,970,447 UART: [art] Store priv key in slot 0x5
2,983,989 UART: [art] Derive Key Pair - Done
2,998,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,790 UART: [art] PUB.X = B46BE7EC15D8148E504D671C075989D6B2D5D8682CC607A2EA816BA70441DDBF00072334464D48BCC1152BBA5CE3470F
3,021,529 UART: [art] PUB.Y = E393D6BDF622A7CEBCE58EF8B6802D1EFEE65AD8C8D0D51FECE57048F68CAB4A7B96FB50700F6026A58B3C99501BB643
3,028,498 UART: [art] SIG.R = F1231AAEEB4425D4AD24C00CE1B1C76C21B5ECAC260F37C0A6CFAA38A4D30496DEA913318D4F1F939F3079A503471686
3,035,268 UART: [art] SIG.S = E4D3DB2A1EC10D4183D1D5F1A0E22DF382F91B51073347BC0388F88F176F5236D6057FBC3F8D0E8F34ECE63F263AB26C
3,059,043 UART: Caliptra RT
3,059,386 UART: [state] CFI Enabled
3,178,626 UART: [rt] RT listening for mailbox commands...
3,179,296 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,120 UART: [rt]cmd =0x41544d4e, len=14344
3,612,363 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,181 UART:
192,536 UART: Running Caliptra ROM ...
193,727 UART:
193,880 UART: [state] CFI Enabled
266,502 UART: [state] LifecycleState = Unprovisioned
268,488 UART: [state] DebugLocked = No
271,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,159 UART: [kat] SHA2-256
445,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,370 UART: [kat] ++
456,865 UART: [kat] sha1
468,024 UART: [kat] SHA2-256
470,763 UART: [kat] SHA2-384
475,328 UART: [kat] SHA2-512-ACC
477,688 UART: [kat] ECC-384
2,767,033 UART: [kat] HMAC-384Kdf
2,799,911 UART: [kat] LMS
3,990,232 UART: [kat] --
3,996,970 UART: [cold-reset] ++
3,999,049 UART: [fht] Storing FHT @ 0x50003400
4,010,180 UART: [idev] ++
4,010,752 UART: [idev] CDI.KEYID = 6
4,011,710 UART: [idev] SUBJECT.KEYID = 7
4,012,954 UART: [idev] UDS.KEYID = 0
4,013,988 ready_for_fw is high
4,014,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,365 UART: [idev] Erasing UDS.KEYID = 0
7,347,403 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,888 UART: [idev] --
7,371,725 UART: [ldev] ++
7,372,295 UART: [ldev] CDI.KEYID = 6
7,373,263 UART: [ldev] SUBJECT.KEYID = 5
7,374,482 UART: [ldev] AUTHORITY.KEYID = 7
7,375,716 UART: [ldev] FE.KEYID = 1
7,421,853 UART: [ldev] Erasing FE.KEYID = 1
10,758,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,419 UART: [ldev] --
13,137,360 UART: [fwproc] Waiting for Commands...
13,139,132 UART: [fwproc] Received command 0x46574c44
13,141,370 UART: [fwproc] Received Image of size 118548 bytes
22,144,036 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,220,352 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,293,529 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,622,495 >>> mbox cmd response: success
22,627,475 UART: [afmc] ++
22,628,096 UART: [afmc] CDI.KEYID = 6
22,629,016 UART: [afmc] SUBJECT.KEYID = 7
22,630,232 UART: [afmc] AUTHORITY.KEYID = 5
26,005,479 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,302,659 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,304,921 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,319,425 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,334,231 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,348,624 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,370,417 UART: [afmc] --
28,374,535 UART: [cold-reset] --
28,377,918 UART: [state] Locking Datavault
28,383,824 UART: [state] Locking PCR0, PCR1 and PCR31
28,385,578 UART: [state] Locking ICCM
28,387,706 UART: [exit] Launching FMC @ 0x40000130
28,396,152 UART:
28,396,383 UART: Running Caliptra FMC ...
28,397,483 UART:
28,397,638 UART: [state] CFI Enabled
28,461,899 UART: [fht] FMC Alias Private Key: 7
30,801,862 UART: [art] Extend RT PCRs Done
30,803,081 UART: [art] Lock RT PCRs Done
30,804,840 UART: [art] Populate DV Done
30,810,195 UART: [fht] FMC Alias Private Key: 7
30,811,706 UART: [art] Derive CDI
30,812,469 UART: [art] Store in slot 0x4
30,870,971 UART: [art] Derive Key Pair
30,872,015 UART: [art] Store priv key in slot 0x5
34,164,689 UART: [art] Derive Key Pair - Done
34,177,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,466,978 UART: [art] Erasing AUTHORITY.KEYID = 7
36,468,489 UART: [art] PUB.X = 3F1FDB114044A1A6A1AD523BD20A68A39B2866BEABFE99FD560CDD509A80BF866FF05084C7BA766C4BAD05CF911E5DE4
36,475,763 UART: [art] PUB.Y = A335A582D1BF00F2DB0A46AEA0BE16FDEE15BFDC1FBA65E3F5136B21015625E659884278FC8A262273D4804C77972815
36,483,023 UART: [art] SIG.R = DCCEBBF5DA5EADCB18C228E6248422DF2CA494F2005AEEC8FF96C3ABFD74ED3D7E47795A83D2CDC72627EAEB8889B361
36,490,385 UART: [art] SIG.S = C1C5AE25FA85A3BD13740776EE13866540BBF2F6A304B602514A488841832FB40A3E3197CA54857EE3923D838F650DE3
37,795,847 UART: Caliptra RT
37,796,538 UART: [state] CFI Enabled
37,971,995 UART: [rt] RT listening for mailbox commands...
37,974,329 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,129,474 UART: [rt]cmd =0x41544d4e, len=14344
44,543,688 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.55s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,788,050 ready_for_fw is high
3,788,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,936,082 >>> mbox cmd response: success
27,638,370 UART:
27,638,793 UART: Running Caliptra FMC ...
27,639,934 UART:
27,640,095 UART: [state] CFI Enabled
27,704,478 UART: [fht] FMC Alias Private Key: 7
30,045,136 UART: [art] Extend RT PCRs Done
30,046,382 UART: [art] Lock RT PCRs Done
30,047,849 UART: [art] Populate DV Done
30,053,322 UART: [fht] FMC Alias Private Key: 7
30,054,908 UART: [art] Derive CDI
30,055,734 UART: [art] Store in slot 0x4
30,113,058 UART: [art] Derive Key Pair
30,114,065 UART: [art] Store priv key in slot 0x5
33,406,914 UART: [art] Derive Key Pair - Done
33,419,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,708,433 UART: [art] Erasing AUTHORITY.KEYID = 7
35,709,940 UART: [art] PUB.X = A1E19E6FFFFBCA7C613E0C61C9392E5C22E79D0DBF4A38BCA4C993A277F377C1674D4AD3B7F5C13CDEE68595F0F65B7C
35,717,205 UART: [art] PUB.Y = 34341057E03A7693DB7DB8A7CB7012E5AA3B066A6E1B0B730E5BD20A3D8EF29895A9478992414C3A415463B2812B89B2
35,724,475 UART: [art] SIG.R = 4BD544E2AF43C9E7E66DD1072645F4B14B3DE597CA41BE2F20BDAB12E92C2DF98FD4CD323B342BF9CD7ABD29A67E68D3
35,731,920 UART: [art] SIG.S = EBFEC85480F446C4A56605CAA37AA5F58B7DE73F3E853B2E9EED7D4A4A79F5AE22FB19027EA580B342D1343B9BA2DEAE
37,037,584 UART: Caliptra RT
37,038,284 UART: [state] CFI Enabled
37,234,515 UART: [rt] RT listening for mailbox commands...
37,236,931 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,392,546 UART: [rt]cmd =0x41544d4e, len=14344
43,702,779 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,314 UART:
192,682 UART: Running Caliptra ROM ...
193,998 UART:
603,465 UART: [state] CFI Enabled
618,781 UART: [state] LifecycleState = Unprovisioned
620,740 UART: [state] DebugLocked = No
622,332 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,892 UART: [kat] SHA2-256
796,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,196 UART: [kat] ++
807,675 UART: [kat] sha1
818,970 UART: [kat] SHA2-256
821,683 UART: [kat] SHA2-384
826,619 UART: [kat] SHA2-512-ACC
828,991 UART: [kat] ECC-384
3,113,849 UART: [kat] HMAC-384Kdf
3,125,673 UART: [kat] LMS
4,315,829 UART: [kat] --
4,320,347 UART: [cold-reset] ++
4,322,417 UART: [fht] Storing FHT @ 0x50003400
4,332,680 UART: [idev] ++
4,333,246 UART: [idev] CDI.KEYID = 6
4,334,152 UART: [idev] SUBJECT.KEYID = 7
4,335,389 UART: [idev] UDS.KEYID = 0
4,336,452 ready_for_fw is high
4,336,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,537 UART: [idev] Erasing UDS.KEYID = 0
7,625,429 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,095 UART: [idev] --
7,652,251 UART: [ldev] ++
7,652,826 UART: [ldev] CDI.KEYID = 6
7,653,761 UART: [ldev] SUBJECT.KEYID = 5
7,654,910 UART: [ldev] AUTHORITY.KEYID = 7
7,656,350 UART: [ldev] FE.KEYID = 1
7,668,158 UART: [ldev] Erasing FE.KEYID = 1
10,953,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,953 UART: [ldev] --
13,309,246 UART: [fwproc] Waiting for Commands...
13,311,977 UART: [fwproc] Received command 0x46574c44
13,314,206 UART: [fwproc] Received Image of size 118548 bytes
21,855,969 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,939,559 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,012,723 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,342,121 >>> mbox cmd response: success
22,346,405 UART: [afmc] ++
22,347,026 UART: [afmc] CDI.KEYID = 6
22,347,919 UART: [afmc] SUBJECT.KEYID = 7
22,349,184 UART: [afmc] AUTHORITY.KEYID = 5
25,663,200 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,954,645 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,956,906 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,971,430 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,986,194 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,000,603 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,021,759 UART: [afmc] --
28,025,188 UART: [cold-reset] --
28,029,746 UART: [state] Locking Datavault
28,034,950 UART: [state] Locking PCR0, PCR1 and PCR31
28,036,703 UART: [state] Locking ICCM
28,038,607 UART: [exit] Launching FMC @ 0x40000130
28,046,997 UART:
28,047,241 UART: Running Caliptra FMC ...
28,048,268 UART:
28,048,415 UART: [state] CFI Enabled
28,056,513 UART: [fht] FMC Alias Private Key: 7
30,395,989 UART: [art] Extend RT PCRs Done
30,397,210 UART: [art] Lock RT PCRs Done
30,398,860 UART: [art] Populate DV Done
30,404,267 UART: [fht] FMC Alias Private Key: 7
30,405,905 UART: [art] Derive CDI
30,406,713 UART: [art] Store in slot 0x4
30,449,311 UART: [art] Derive Key Pair
30,450,344 UART: [art] Store priv key in slot 0x5
33,693,081 UART: [art] Derive Key Pair - Done
33,705,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,986,200 UART: [art] Erasing AUTHORITY.KEYID = 7
35,987,708 UART: [art] PUB.X = 2862AA6DAF0BC59B600F3D26F93B2EAFDB55794D06A5338B7D3A89F40611622FBFBE830B868EF7C483D81F8D280815E8
35,995,003 UART: [art] PUB.Y = F9E30D5197613E71A63FB7A24AE35A4C06D3BD52CF1839FF1FB7238F69397F956BAD7675D1EE8ED22318EF886D0E5609
36,002,239 UART: [art] SIG.R = 993AA2632627BFE871B299699A63DF16F92E78A7D50308CB4B6AEEE8530623C560B3B6FF659F1B8E825932734AFC7EA0
36,009,635 UART: [art] SIG.S = 81E7404B0D0924905C81274334055A74BB745DE09308AAD1E8EE9388F97D5AB846BF6CAF75B4750ECB56C935AA31C098
37,314,928 UART: Caliptra RT
37,315,634 UART: [state] CFI Enabled
37,448,958 UART: [rt] RT listening for mailbox commands...
37,451,269 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,606,701 UART: [rt]cmd =0x41544d4e, len=14344
43,968,496 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
4,120,097 ready_for_fw is high
4,120,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,344,923 >>> mbox cmd response: success
27,979,717 UART:
27,980,122 UART: Running Caliptra FMC ...
27,981,237 UART:
27,981,387 UART: [state] CFI Enabled
27,989,148 UART: [fht] FMC Alias Private Key: 7
30,328,266 UART: [art] Extend RT PCRs Done
30,329,494 UART: [art] Lock RT PCRs Done
30,331,147 UART: [art] Populate DV Done
30,336,498 UART: [fht] FMC Alias Private Key: 7
30,338,032 UART: [art] Derive CDI
30,338,764 UART: [art] Store in slot 0x4
30,381,299 UART: [art] Derive Key Pair
30,382,339 UART: [art] Store priv key in slot 0x5
33,624,168 UART: [art] Derive Key Pair - Done
33,636,984 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,917,445 UART: [art] Erasing AUTHORITY.KEYID = 7
35,918,969 UART: [art] PUB.X = 67013283ECB9C1D1B5F196C061231DFAFE3B96970B47F12E23D66698C32C21239312DB8F7AE3A305B019E3CC00AEF1D4
35,926,232 UART: [art] PUB.Y = 12DC63492B329E03DD303A440C3E366DF9D7874547B5693E417F25C76371046DA58479D581FD22431B262C323A5ADDCF
35,933,430 UART: [art] SIG.R = D8F201883A2D97F7F3A2E5EE012C5C3C6D9A3389730CA57404B79AFF7256990488C898FECB6063A0981C82E839F4403E
35,940,814 UART: [art] SIG.S = 8B328D9CC7973AEE4DA68851BFB598074ADA2222D7410F1A6717A0FD176B309966495C21E56F66AD9CAABEFE8B2D3546
37,246,097 UART: Caliptra RT
37,246,790 UART: [state] CFI Enabled
37,380,110 UART: [rt] RT listening for mailbox commands...
37,382,430 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,538,024 UART: [rt]cmd =0x41544d4e, len=14344
43,925,756 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
191,956 UART:
192,315 UART: Running Caliptra ROM ...
193,447 UART:
193,591 UART: [state] CFI Enabled
261,833 UART: [state] LifecycleState = Unprovisioned
263,765 UART: [state] DebugLocked = No
265,284 UART: [state] WD Timer not started. Device not locked for debugging
269,395 UART: [kat] SHA2-256
449,057 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,835 UART: [kat] ++
460,288 UART: [kat] sha1
472,147 UART: [kat] SHA2-256
474,863 UART: [kat] SHA2-384
480,355 UART: [kat] SHA2-512-ACC
482,717 UART: [kat] ECC-384
2,946,818 UART: [kat] HMAC-384Kdf
2,970,059 UART: [kat] LMS
3,446,619 UART: [kat] --
3,449,578 UART: [cold-reset] ++
3,450,586 UART: [fht] FHT @ 0x50003400
3,461,479 UART: [idev] ++
3,462,038 UART: [idev] CDI.KEYID = 6
3,462,920 UART: [idev] SUBJECT.KEYID = 7
3,464,230 UART: [idev] UDS.KEYID = 0
3,465,124 ready_for_fw is high
3,465,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,614,372 UART: [idev] Erasing UDS.KEYID = 0
5,988,088 UART: [idev] Sha1 KeyId Algorithm
6,011,157 UART: [idev] --
6,015,037 UART: [ldev] ++
6,015,666 UART: [ldev] CDI.KEYID = 6
6,016,582 UART: [ldev] SUBJECT.KEYID = 5
6,017,791 UART: [ldev] AUTHORITY.KEYID = 7
6,019,021 UART: [ldev] FE.KEYID = 1
6,056,210 UART: [ldev] Erasing FE.KEYID = 1
8,561,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,345 UART: [ldev] --
10,371,140 UART: [fwproc] Wait for Commands...
10,374,075 UART: [fwproc] Recv command 0x46574c44
10,376,084 UART: [fwproc] Recv'd Img size: 118548 bytes
14,886,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,971,321 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,044,333 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,373,195 >>> mbox cmd response: success
15,377,503 UART: [afmc] ++
15,378,096 UART: [afmc] CDI.KEYID = 6
15,379,061 UART: [afmc] SUBJECT.KEYID = 7
15,380,275 UART: [afmc] AUTHORITY.KEYID = 5
17,916,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,659,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,661,504 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,677,346 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,693,283 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,708,946 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,734,505 UART: [afmc] --
19,739,011 UART: [cold-reset] --
19,743,527 UART: [state] Locking Datavault
19,748,497 UART: [state] Locking PCR0, PCR1 and PCR31
19,750,252 UART: [state] Locking ICCM
19,752,213 UART: [exit] Launching FMC @ 0x40000130
19,760,656 UART:
19,760,884 UART: Running Caliptra FMC ...
19,761,998 UART:
19,762,151 UART: [state] CFI Enabled
19,814,399 UART: [fht] FMC Alias Private Key: 7
21,581,034 UART: [art] Extend RT PCRs Done
21,582,253 UART: [art] Lock RT PCRs Done
21,583,792 UART: [art] Populate DV Done
21,589,469 UART: [fht] FMC Alias Private Key: 7
21,590,997 UART: [art] Derive CDI
21,591,727 UART: [art] Store in slot 0x4
21,647,351 UART: [art] Derive Key Pair
21,648,343 UART: [art] Store priv key in slot 0x5
24,111,697 UART: [art] Derive Key Pair - Done
24,124,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,837,817 UART: [art] Erasing AUTHORITY.KEYID = 7
25,839,321 UART: [art] PUB.X = 97F8D9BD9CD75A6A90EFFDBC9BCD6F92988089ED5537831B05464B8CAC3D386FEEB31F09B1DE17379F17172DB9D7E958
25,846,570 UART: [art] PUB.Y = E9D57AA822EC121A8F53D487F614635D552704776DD9480C89C11453A73F1576C05DFE4132014C71D9977AA7D3F9FBCD
25,853,834 UART: [art] SIG.R = 81EC5836997F8D383A17682BF7467B7BD004C937CAD1D7A4137B00A0F04F7A8C9BA7A0797FA8ABC02F76007A11BE00D7
25,861,169 UART: [art] SIG.S = B8432C5FE8F0F5B0E3E34C9E030F5EDD200A5D65CF1C5068A2E53E62F20C082933E392EF021A1F83917C4B12EF595828
26,840,176 UART: Caliptra RT
26,840,862 UART: [state] CFI Enabled
27,021,491 UART: [rt] RT listening for mailbox commands...
27,023,809 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,179,087 UART: [rt]cmd =0x41544d4e, len=14344
30,789,295 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,461,692 ready_for_fw is high
3,462,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,393,989 >>> mbox cmd response: success
19,686,490 UART:
19,686,930 UART: Running Caliptra FMC ...
19,688,035 UART:
19,688,196 UART: [state] CFI Enabled
19,755,631 UART: [fht] FMC Alias Private Key: 7
21,521,926 UART: [art] Extend RT PCRs Done
21,523,152 UART: [art] Lock RT PCRs Done
21,524,909 UART: [art] Populate DV Done
21,530,111 UART: [fht] FMC Alias Private Key: 7
21,531,590 UART: [art] Derive CDI
21,532,317 UART: [art] Store in slot 0x4
21,588,606 UART: [art] Derive Key Pair
21,589,650 UART: [art] Store priv key in slot 0x5
24,052,924 UART: [art] Derive Key Pair - Done
24,065,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,778,853 UART: [art] Erasing AUTHORITY.KEYID = 7
25,780,356 UART: [art] PUB.X = 7B46E312CCCB93FB31DBEB7AB2CF0375F8E056FFA20D4510F6D88B0A3CEE96A0B704F183211FCC0007485F0A7C924697
25,787,712 UART: [art] PUB.Y = BF1072E6894F8AAC4FCD7BB676F133BBB4F5005CB566C9FDFB82DC6894064F328EC485352D152459BE4C40CE91BC7800
25,794,852 UART: [art] SIG.R = 8523E3B3AAC7926CC696E475BFC82718F93D16E96C083DFF49E9088921D5250F8FC9718BD4A8112E7CF5D644B3E4E448
25,802,254 UART: [art] SIG.S = 706ED1BBEBFEE939179BAF74BC7DFBFBC7CF0275551E535D2F8D408C23DCD9DA52DB32CAA4CCFA9A583DFF19E5B8BE23
26,780,988 UART: Caliptra RT
26,781,692 UART: [state] CFI Enabled
26,963,943 UART: [rt] RT listening for mailbox commands...
26,966,254 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,121,796 UART: [rt]cmd =0x41544d4e, len=14344
30,729,684 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,312 UART:
192,672 UART: Running Caliptra ROM ...
193,783 UART:
603,684 UART: [state] CFI Enabled
616,293 UART: [state] LifecycleState = Unprovisioned
618,244 UART: [state] DebugLocked = No
620,476 UART: [state] WD Timer not started. Device not locked for debugging
624,155 UART: [kat] SHA2-256
803,813 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,568 UART: [kat] ++
815,092 UART: [kat] sha1
826,679 UART: [kat] SHA2-256
829,335 UART: [kat] SHA2-384
835,328 UART: [kat] SHA2-512-ACC
837,722 UART: [kat] ECC-384
3,282,155 UART: [kat] HMAC-384Kdf
3,294,253 UART: [kat] LMS
3,770,759 UART: [kat] --
3,776,412 UART: [cold-reset] ++
3,777,569 UART: [fht] FHT @ 0x50003400
3,788,904 UART: [idev] ++
3,789,478 UART: [idev] CDI.KEYID = 6
3,790,406 UART: [idev] SUBJECT.KEYID = 7
3,791,658 UART: [idev] UDS.KEYID = 0
3,792,582 ready_for_fw is high
3,792,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,641 UART: [idev] Erasing UDS.KEYID = 0
6,268,292 UART: [idev] Sha1 KeyId Algorithm
6,291,891 UART: [idev] --
6,296,747 UART: [ldev] ++
6,297,337 UART: [ldev] CDI.KEYID = 6
6,298,223 UART: [ldev] SUBJECT.KEYID = 5
6,299,437 UART: [ldev] AUTHORITY.KEYID = 7
6,300,726 UART: [ldev] FE.KEYID = 1
6,310,590 UART: [ldev] Erasing FE.KEYID = 1
8,785,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,722 UART: [ldev] --
10,579,261 UART: [fwproc] Wait for Commands...
10,582,550 UART: [fwproc] Recv command 0x46574c44
10,584,533 UART: [fwproc] Recv'd Img size: 118548 bytes
15,132,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,214,217 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,287,254 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,615,893 >>> mbox cmd response: success
15,620,258 UART: [afmc] ++
15,620,868 UART: [afmc] CDI.KEYID = 6
15,621,784 UART: [afmc] SUBJECT.KEYID = 7
15,623,005 UART: [afmc] AUTHORITY.KEYID = 5
18,123,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,845,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,847,404 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,863,277 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,879,194 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,894,889 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,918,361 UART: [afmc] --
19,922,268 UART: [cold-reset] --
19,925,763 UART: [state] Locking Datavault
19,931,118 UART: [state] Locking PCR0, PCR1 and PCR31
19,932,846 UART: [state] Locking ICCM
19,935,540 UART: [exit] Launching FMC @ 0x40000130
19,943,938 UART:
19,944,173 UART: Running Caliptra FMC ...
19,945,274 UART:
19,945,430 UART: [state] CFI Enabled
19,953,482 UART: [fht] FMC Alias Private Key: 7
21,719,752 UART: [art] Extend RT PCRs Done
21,720,969 UART: [art] Lock RT PCRs Done
21,722,596 UART: [art] Populate DV Done
21,728,281 UART: [fht] FMC Alias Private Key: 7
21,729,822 UART: [art] Derive CDI
21,730,638 UART: [art] Store in slot 0x4
21,773,398 UART: [art] Derive Key Pair
21,774,442 UART: [art] Store priv key in slot 0x5
24,201,861 UART: [art] Derive Key Pair - Done
24,214,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,921,546 UART: [art] Erasing AUTHORITY.KEYID = 7
25,923,051 UART: [art] PUB.X = EC0EEAAAB67025F541C220A8E97CAE99B8D8B2BC375FC7AAF1DC8CA20EE2F3F46AC2CA38A361E4757668A86E181981E7
25,930,358 UART: [art] PUB.Y = 98DC538D815CE316B308971AA9B3A4705115754EBEAB668156DFB00BD24F35F0B28A53CC9B5E4DC66A078456212FCF4C
25,937,584 UART: [art] SIG.R = 12EEF34BC62801639D35F29668B7B87DEFFE03C10F7499A9407F380090C63FFB4B61F60004C336A4F2EBB0E46B1A3FAD
25,944,969 UART: [art] SIG.S = 98758D0D2770C8ADBE8EB660899482F30C5DDD0927CB1AF5FA36A0CBF351E6EE65BA3A5CDB8D82C513C95169A06C1BB9
26,924,217 UART: Caliptra RT
26,924,923 UART: [state] CFI Enabled
27,057,372 UART: [rt] RT listening for mailbox commands...
27,059,696 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,214,797 UART: [rt]cmd =0x41544d4e, len=14344
30,838,873 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,782,349 ready_for_fw is high
3,782,891 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,618,653 >>> mbox cmd response: success
19,868,521 UART:
19,868,929 UART: Running Caliptra FMC ...
19,870,045 UART:
19,870,222 UART: [state] CFI Enabled
19,878,321 UART: [fht] FMC Alias Private Key: 7
21,644,339 UART: [art] Extend RT PCRs Done
21,645,567 UART: [art] Lock RT PCRs Done
21,647,154 UART: [art] Populate DV Done
21,652,367 UART: [fht] FMC Alias Private Key: 7
21,653,919 UART: [art] Derive CDI
21,654,685 UART: [art] Store in slot 0x4
21,697,611 UART: [art] Derive Key Pair
21,698,677 UART: [art] Store priv key in slot 0x5
24,125,422 UART: [art] Derive Key Pair - Done
24,138,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,844,316 UART: [art] Erasing AUTHORITY.KEYID = 7
25,845,828 UART: [art] PUB.X = B1D27868D0CF6D94DD665B935CC8316493FB7606B050A1F778A6F45F776147EA6E6391FA344F8B1626BABEA3E8842389
25,853,092 UART: [art] PUB.Y = 8DE80C05DCEFB09FEEE722F8A1E0F2F2F7CD9ABC5BF30056EC61B0FE1AC8DF2B07EC0613E37A2D17FC19B5C984CFC4C0
25,860,392 UART: [art] SIG.R = 83793A790CBE9F5AAC3C67479D1499CE255CF3DA1DDAC9D20AC924421AF1BC631327206E710A969F5F20B384F127B458
25,867,796 UART: [art] SIG.S = D44B1CB58485838BF000F26CCDA23694B5F73FBC079732E899D3E9EE401527836D9194EBAB00A68647A8D79D85E4712A
26,845,983 UART: Caliptra RT
26,846,671 UART: [state] CFI Enabled
26,979,677 UART: [rt] RT listening for mailbox commands...
26,981,961 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,137,205 UART: [rt]cmd =0x41544d4e, len=14344
30,751,680 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,160 UART:
192,526 UART: Running Caliptra ROM ...
193,706 UART:
193,860 UART: [state] CFI Enabled
264,258 UART: [state] LifecycleState = Unprovisioned
266,674 UART: [state] DebugLocked = No
269,061 UART: [state] WD Timer not started. Device not locked for debugging
274,222 UART: [kat] SHA2-256
464,101 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,923 UART: [kat] ++
475,370 UART: [kat] sha1
486,955 UART: [kat] SHA2-256
490,028 UART: [kat] SHA2-384
496,659 UART: [kat] SHA2-512-ACC
499,240 UART: [kat] ECC-384
2,949,730 UART: [kat] HMAC-384Kdf
2,972,195 UART: [kat] LMS
3,503,993 UART: [kat] --
3,509,196 UART: [cold-reset] ++
3,510,135 UART: [fht] FHT @ 0x50003400
3,521,816 UART: [idev] ++
3,522,526 UART: [idev] CDI.KEYID = 6
3,523,449 UART: [idev] SUBJECT.KEYID = 7
3,524,695 UART: [idev] UDS.KEYID = 0
3,525,804 ready_for_fw is high
3,526,002 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,126 UART: [idev] Erasing UDS.KEYID = 0
6,028,579 UART: [idev] Sha1 KeyId Algorithm
6,051,654 UART: [idev] --
6,056,884 UART: [ldev] ++
6,057,508 UART: [ldev] CDI.KEYID = 6
6,058,428 UART: [ldev] SUBJECT.KEYID = 5
6,059,540 UART: [ldev] AUTHORITY.KEYID = 7
6,060,717 UART: [ldev] FE.KEYID = 1
6,099,938 UART: [ldev] Erasing FE.KEYID = 1
8,604,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,711 UART: [ldev] --
10,414,338 UART: [fwproc] Wait for Commands...
10,417,037 UART: [fwproc] Recv command 0x46574c44
10,419,350 UART: [fwproc] Recv'd Img size: 118548 bytes
15,063,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,145,212 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,268,827 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,829,943 >>> mbox cmd response: success
15,834,696 UART: [afmc] ++
15,835,423 UART: [afmc] CDI.KEYID = 6
15,836,618 UART: [afmc] SUBJECT.KEYID = 7
15,838,066 UART: [afmc] AUTHORITY.KEYID = 5
18,382,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,124,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,126,721 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,141,899 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,157,093 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,172,121 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,196,199 UART: [afmc] --
20,200,007 UART: [cold-reset] --
20,203,338 UART: [state] Locking Datavault
20,209,728 UART: [state] Locking PCR0, PCR1 and PCR31
20,211,882 UART: [state] Locking ICCM
20,213,924 UART: [exit] Launching FMC @ 0x40000130
20,222,603 UART:
20,222,879 UART: Running Caliptra FMC ...
20,223,996 UART:
20,224,156 UART: [state] CFI Enabled
20,282,949 UART: [fht] FMC Alias Private Key: 7
22,048,783 UART: [art] Extend RT PCRs Done
22,050,007 UART: [art] Lock RT PCRs Done
22,051,590 UART: [art] Populate DV Done
22,056,973 UART: [fht] FMC Alias Private Key: 7
22,058,613 UART: [art] Derive CDI
22,059,437 UART: [art] Store in slot 0x4
22,115,832 UART: [art] Derive Key Pair
22,116,829 UART: [art] Store priv key in slot 0x5
24,580,069 UART: [art] Derive Key Pair - Done
24,593,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,304,912 UART: [art] Erasing AUTHORITY.KEYID = 7
26,306,422 UART: [art] PUB.X = 64AFFC30237202214E234A2F91FDEDCFF16927568C6ACEDF60AA0C79C5F3EB5FB9B4AA877EC9BA60466EAB250D198F33
26,313,705 UART: [art] PUB.Y = FF2C7D4AFE0630AE663EDC31099321BF3B882E3BF1B0F38BBA5013852524C2EFCB51C3B24321CC7866210A0953B741A1
26,320,972 UART: [art] SIG.R = F71D99008203E9BD72DFD008CB22D3ACF013CA2D5B2E110C808D4B98F4EF636F90E02D4DB101403AFF778318DB92193D
26,328,339 UART: [art] SIG.S = 64CF55454D669562A8560B471743DC0DCFA406EDAD42E771418C8FFE152599642CEAAC9D32B4D79BE7ED0CA233AEE944
27,307,133 UART: Caliptra RT
27,307,845 UART: [state] CFI Enabled
27,489,014 UART: [rt] RT listening for mailbox commands...
27,491,337 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,646,903 UART: [rt]cmd =0x41544d4e, len=14344
31,258,530 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,441,730 ready_for_fw is high
3,442,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,927,966 >>> mbox cmd response: success
20,239,075 UART:
20,239,480 UART: Running Caliptra FMC ...
20,240,576 UART:
20,240,728 UART: [state] CFI Enabled
20,310,283 UART: [fht] FMC Alias Private Key: 7
22,076,306 UART: [art] Extend RT PCRs Done
22,077,556 UART: [art] Lock RT PCRs Done
22,079,270 UART: [art] Populate DV Done
22,084,790 UART: [fht] FMC Alias Private Key: 7
22,086,434 UART: [art] Derive CDI
22,087,252 UART: [art] Store in slot 0x4
22,142,726 UART: [art] Derive Key Pair
22,143,766 UART: [art] Store priv key in slot 0x5
24,606,173 UART: [art] Derive Key Pair - Done
24,619,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,332,062 UART: [art] Erasing AUTHORITY.KEYID = 7
26,333,588 UART: [art] PUB.X = 288618679BB4B8FC75A696F973B3D1C14FBC2F7743F32812D66EC06371DCCF2F6734F18F0E060B89D2A15AAFF4E47D12
26,340,884 UART: [art] PUB.Y = 9775CF9A2B8F7E6DD3FE9F3C68C048B5A86FB297A34E8B1D378A796D810FA8058A455D638CA80CEE0402DBD0DD814D2F
26,348,172 UART: [art] SIG.R = 6732AC1F664CD083610EE8632874DB3E4DF8D356D387603D39E7F40C245DD4A7A08212D3F76587428E20A24048D72B62
26,355,540 UART: [art] SIG.S = B1DA74DA300243C57B4EFF20B90D8E65AF839C4A629C40CD3543EA6D336E107AF70AEC7EC09DDE37C3F0198DCC2BEC53
27,334,961 UART: Caliptra RT
27,335,652 UART: [state] CFI Enabled
27,514,826 UART: [rt] RT listening for mailbox commands...
27,517,142 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,672,580 UART: [rt]cmd =0x41544d4e, len=14344
31,285,204 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,533 UART:
192,913 UART: Running Caliptra ROM ...
194,015 UART:
603,664 UART: [state] CFI Enabled
620,406 UART: [state] LifecycleState = Unprovisioned
622,799 UART: [state] DebugLocked = No
624,909 UART: [state] WD Timer not started. Device not locked for debugging
629,674 UART: [kat] SHA2-256
819,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,336 UART: [kat] ++
830,945 UART: [kat] sha1
841,288 UART: [kat] SHA2-256
844,273 UART: [kat] SHA2-384
851,058 UART: [kat] SHA2-512-ACC
853,652 UART: [kat] ECC-384
3,294,439 UART: [kat] HMAC-384Kdf
3,307,195 UART: [kat] LMS
3,839,041 UART: [kat] --
3,844,684 UART: [cold-reset] ++
3,846,117 UART: [fht] FHT @ 0x50003400
3,858,450 UART: [idev] ++
3,859,165 UART: [idev] CDI.KEYID = 6
3,860,053 UART: [idev] SUBJECT.KEYID = 7
3,861,302 UART: [idev] UDS.KEYID = 0
3,862,205 ready_for_fw is high
3,862,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,267 UART: [idev] Erasing UDS.KEYID = 0
6,333,524 UART: [idev] Sha1 KeyId Algorithm
6,355,796 UART: [idev] --
6,359,820 UART: [ldev] ++
6,360,507 UART: [ldev] CDI.KEYID = 6
6,361,391 UART: [ldev] SUBJECT.KEYID = 5
6,362,622 UART: [ldev] AUTHORITY.KEYID = 7
6,363,856 UART: [ldev] FE.KEYID = 1
6,374,748 UART: [ldev] Erasing FE.KEYID = 1
8,852,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,284 UART: [ldev] --
10,642,816 UART: [fwproc] Wait for Commands...
10,644,746 UART: [fwproc] Recv command 0x46574c44
10,647,053 UART: [fwproc] Recv'd Img size: 118548 bytes
15,317,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,394,975 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,518,582 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,079,752 >>> mbox cmd response: success
16,083,941 UART: [afmc] ++
16,084,655 UART: [afmc] CDI.KEYID = 6
16,085,772 UART: [afmc] SUBJECT.KEYID = 7
16,087,276 UART: [afmc] AUTHORITY.KEYID = 5
18,594,681 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,315,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,317,469 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,332,509 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,347,765 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,362,825 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,386,053 UART: [afmc] --
20,389,288 UART: [cold-reset] --
20,394,245 UART: [state] Locking Datavault
20,400,539 UART: [state] Locking PCR0, PCR1 and PCR31
20,402,708 UART: [state] Locking ICCM
20,403,841 UART: [exit] Launching FMC @ 0x40000130
20,412,502 UART:
20,412,747 UART: Running Caliptra FMC ...
20,413,853 UART:
20,414,016 UART: [state] CFI Enabled
20,421,912 UART: [fht] FMC Alias Private Key: 7
22,188,178 UART: [art] Extend RT PCRs Done
22,189,406 UART: [art] Lock RT PCRs Done
22,191,438 UART: [art] Populate DV Done
22,196,907 UART: [fht] FMC Alias Private Key: 7
22,198,542 UART: [art] Derive CDI
22,199,287 UART: [art] Store in slot 0x4
22,242,212 UART: [art] Derive Key Pair
22,243,212 UART: [art] Store priv key in slot 0x5
24,670,340 UART: [art] Derive Key Pair - Done
24,683,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,390,806 UART: [art] Erasing AUTHORITY.KEYID = 7
26,392,335 UART: [art] PUB.X = 54C5EFC6EA8F581E6C90063193B902F5AE6DE09A670A442EAF10D121904677CB47901FBCB50AF56840A5BE4ECA8020BE
26,399,614 UART: [art] PUB.Y = B9C1DE2ABEBFA7CD200FCD49235D5AD598739872F68DC4D3DC45848ABB4EF27E3B3022EAD1850001D775C03FC9C013E1
26,406,865 UART: [art] SIG.R = E3638F6E4517A07E10BC0613574CBBD3001400E23F5758ECF1BAAE611AF63A8E03777E6178D2FBAE820FC063F1D9E0F8
26,414,176 UART: [art] SIG.S = 5D8640978E13CA7FD5EF5A4E0E3A84E00DA1471543AF8424F5D03924BDB78D4223391F8E2D56158DCF69BF785F056ED6
27,393,290 UART: Caliptra RT
27,393,981 UART: [state] CFI Enabled
27,527,674 UART: [rt] RT listening for mailbox commands...
27,529,979 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,685,359 UART: [rt]cmd =0x41544d4e, len=14344
31,302,542 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,759,846 ready_for_fw is high
3,760,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,158,071 >>> mbox cmd response: success
20,409,296 UART:
20,409,685 UART: Running Caliptra FMC ...
20,410,829 UART:
20,410,996 UART: [state] CFI Enabled
20,419,039 UART: [fht] FMC Alias Private Key: 7
22,184,990 UART: [art] Extend RT PCRs Done
22,186,237 UART: [art] Lock RT PCRs Done
22,187,626 UART: [art] Populate DV Done
22,193,260 UART: [fht] FMC Alias Private Key: 7
22,194,859 UART: [art] Derive CDI
22,195,601 UART: [art] Store in slot 0x4
22,238,359 UART: [art] Derive Key Pair
22,239,382 UART: [art] Store priv key in slot 0x5
24,666,459 UART: [art] Derive Key Pair - Done
24,679,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,385,967 UART: [art] Erasing AUTHORITY.KEYID = 7
26,387,477 UART: [art] PUB.X = A2B5D43B28A183C9736149A5C7A19EE30420C1CC695E04AD935530135F4DA332205BB68724A883227746CF86584D0122
26,394,723 UART: [art] PUB.Y = C271B9FBF476AB90D02D2BCBE6BA9AB43E6EC59390461B95A7312FDA48CC36ACA25A256969289427D351F91EE28B9B59
26,401,955 UART: [art] SIG.R = ECB935C872261247B157E6EF1B64FDD3349F8AA97D08029917A5C2BACD2532EF320AADBB7E2B06F18649978CA9B9AD3A
26,409,403 UART: [art] SIG.S = 668570A723B40A4A38556A162A6B02049EDF6820A869B2BC37E8D0E8975B9D8E9456B837751160A7F43A30760130F39D
27,388,271 UART: Caliptra RT
27,388,985 UART: [state] CFI Enabled
27,522,035 UART: [rt] RT listening for mailbox commands...
27,524,442 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,680,144 UART: [rt]cmd =0x41544d4e, len=14344
31,282,556 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,315 UART: [kat] SHA2-256
882,246 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,361 UART: [kat] ++
886,513 UART: [kat] sha1
890,643 UART: [kat] SHA2-256
892,581 UART: [kat] SHA2-384
895,322 UART: [kat] SHA2-512-ACC
897,223 UART: [kat] ECC-384
902,802 UART: [kat] HMAC-384Kdf
907,484 UART: [kat] LMS
1,475,680 UART: [kat] --
1,476,501 UART: [cold-reset] ++
1,476,995 UART: [fht] Storing FHT @ 0x50003400
1,479,878 UART: [idev] ++
1,480,046 UART: [idev] CDI.KEYID = 6
1,480,406 UART: [idev] SUBJECT.KEYID = 7
1,480,830 UART: [idev] UDS.KEYID = 0
1,481,175 ready_for_fw is high
1,481,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,720 UART: [idev] Erasing UDS.KEYID = 0
1,505,404 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,044 UART: [idev] --
1,515,211 UART: [ldev] ++
1,515,379 UART: [ldev] CDI.KEYID = 6
1,515,742 UART: [ldev] SUBJECT.KEYID = 5
1,516,168 UART: [ldev] AUTHORITY.KEYID = 7
1,516,631 UART: [ldev] FE.KEYID = 1
1,521,897 UART: [ldev] Erasing FE.KEYID = 1
1,546,912 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,926 UART: [ldev] --
1,586,441 UART: [fwproc] Waiting for Commands...
1,587,270 UART: [fwproc] Received command 0x46574c44
1,588,061 UART: [fwproc] Received Image of size 118548 bytes
5,129,461 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,157,197 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,188,415 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,328,864 >>> mbox cmd response: success
5,329,974 UART: [afmc] ++
5,330,142 UART: [afmc] CDI.KEYID = 6
5,330,504 UART: [afmc] SUBJECT.KEYID = 7
5,330,929 UART: [afmc] AUTHORITY.KEYID = 5
5,366,426 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,382,442 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,383,222 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,388,928 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,394,807 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,400,520 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,408,445 UART: [afmc] --
5,409,353 UART: [cold-reset] --
5,410,173 UART: [state] Locking Datavault
5,411,528 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,132 UART: [state] Locking ICCM
5,412,610 UART: [exit] Launching FMC @ 0x40000130
5,417,940 UART:
5,417,956 UART: Running Caliptra FMC ...
5,418,364 UART:
5,418,418 UART: [state] CFI Enabled
5,429,086 UART: [fht] FMC Alias Private Key: 7
5,547,188 UART: [art] Extend RT PCRs Done
5,547,616 UART: [art] Lock RT PCRs Done
5,548,746 UART: [art] Populate DV Done
5,556,851 UART: [fht] FMC Alias Private Key: 7
5,557,957 UART: [art] Derive CDI
5,558,237 UART: [art] Store in slot 0x4
5,644,277 UART: [art] Derive Key Pair
5,644,637 UART: [art] Store priv key in slot 0x5
5,657,726 UART: [art] Derive Key Pair - Done
5,672,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,687,440 UART: [art] Erasing AUTHORITY.KEYID = 7
5,688,205 UART: [art] PUB.X = 6C9CF11F07E55391C8CBC8A82E9BD12EC780FB036D5360B588145F28997CB061D8E403947EB66B88C93A6CAF5519E64A
5,694,972 UART: [art] PUB.Y = 178AFA87E578D487238CF33E18B28B0834026AE2E393EB4931F21A4AFD942765F928FF247921FF2F3A0D9592B73D4012
5,701,911 UART: [art] SIG.R = 6D0713757068D43C2156B8B017112DFD1D33E9181AA0D08A7AC94F5916D72B8B5E881BE81464D8462777B26A92CFCF54
5,708,676 UART: [art] SIG.S = 1AE73A30F2CDFFE173C2ACA0A10555326A750983DD304D5E8A9612E61EBFAB28FD722EC9EFD2EA41011C971E3AE30741
5,732,746 UART: Caliptra RT
5,732,997 UART: [state] CFI Enabled
5,853,262 UART: [rt] RT listening for mailbox commands...
5,853,932 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,976,768 UART: [rt]cmd =0x41544d4e, len=14344
9,401,325 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.23s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,881 ready_for_fw is high
1,361,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,368,477 >>> mbox cmd response: success
5,429,806 UART:
5,429,822 UART: Running Caliptra FMC ...
5,430,230 UART:
5,430,284 UART: [state] CFI Enabled
5,440,852 UART: [fht] FMC Alias Private Key: 7
5,559,754 UART: [art] Extend RT PCRs Done
5,560,182 UART: [art] Lock RT PCRs Done
5,561,666 UART: [art] Populate DV Done
5,569,865 UART: [fht] FMC Alias Private Key: 7
5,570,893 UART: [art] Derive CDI
5,571,173 UART: [art] Store in slot 0x4
5,657,087 UART: [art] Derive Key Pair
5,657,447 UART: [art] Store priv key in slot 0x5
5,670,888 UART: [art] Derive Key Pair - Done
5,686,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,701,306 UART: [art] Erasing AUTHORITY.KEYID = 7
5,702,071 UART: [art] PUB.X = CBF7F551C9AC178A42B3EF30EBCCFEFAF433C83F1B5EB7B8D377AB165B0058255978DAFE8F456665E283E21296B507B3
5,708,832 UART: [art] PUB.Y = 91C457EA3B5DC5B6043A4758372BC847A1B0AFA7845414D46FF3BC058463F930C332E1985341EEF96CA358163F94CB40
5,715,776 UART: [art] SIG.R = 7B36487DBE41135FD3610235F74166D61ED3A02FB4D7A06A92E0357AA11904EAF8C3B4F49D8FFD4B3B4F4C47E52C206A
5,722,550 UART: [art] SIG.S = 6D6532237F027A221FEE395A2CAC88A03CB8144DD05B601D3507CF6FAE9C724BFB92599103C3FC2B2B6649DE18A1C742
5,746,327 UART: Caliptra RT
5,746,578 UART: [state] CFI Enabled
5,866,227 UART: [rt] RT listening for mailbox commands...
5,866,897 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,990,115 UART: [rt]cmd =0x41544d4e, len=14344
9,528,409 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,953 UART: [state] LifecycleState = Unprovisioned
86,608 UART: [state] DebugLocked = No
87,240 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,784 UART: [kat] SHA2-256
882,715 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,830 UART: [kat] ++
886,982 UART: [kat] sha1
891,316 UART: [kat] SHA2-256
893,254 UART: [kat] SHA2-384
895,921 UART: [kat] SHA2-512-ACC
897,822 UART: [kat] ECC-384
903,625 UART: [kat] HMAC-384Kdf
908,061 UART: [kat] LMS
1,476,257 UART: [kat] --
1,477,214 UART: [cold-reset] ++
1,477,622 UART: [fht] Storing FHT @ 0x50003400
1,480,355 UART: [idev] ++
1,480,523 UART: [idev] CDI.KEYID = 6
1,480,883 UART: [idev] SUBJECT.KEYID = 7
1,481,307 UART: [idev] UDS.KEYID = 0
1,481,652 ready_for_fw is high
1,481,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,227 UART: [idev] Erasing UDS.KEYID = 0
1,506,351 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,847 UART: [idev] --
1,515,786 UART: [ldev] ++
1,515,954 UART: [ldev] CDI.KEYID = 6
1,516,317 UART: [ldev] SUBJECT.KEYID = 5
1,516,743 UART: [ldev] AUTHORITY.KEYID = 7
1,517,206 UART: [ldev] FE.KEYID = 1
1,522,142 UART: [ldev] Erasing FE.KEYID = 1
1,547,467 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,317 UART: [ldev] --
1,586,790 UART: [fwproc] Waiting for Commands...
1,587,595 UART: [fwproc] Received command 0x46574c44
1,588,386 UART: [fwproc] Received Image of size 118548 bytes
5,319,173 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,346,687 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,377,905 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,518,280 >>> mbox cmd response: success
5,519,404 UART: [afmc] ++
5,519,572 UART: [afmc] CDI.KEYID = 6
5,519,934 UART: [afmc] SUBJECT.KEYID = 7
5,520,359 UART: [afmc] AUTHORITY.KEYID = 5
5,555,740 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,571,938 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,572,718 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,578,424 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,584,303 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,590,016 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,598,031 UART: [afmc] --
5,599,103 UART: [cold-reset] --
5,599,969 UART: [state] Locking Datavault
5,601,136 UART: [state] Locking PCR0, PCR1 and PCR31
5,601,740 UART: [state] Locking ICCM
5,602,280 UART: [exit] Launching FMC @ 0x40000130
5,607,610 UART:
5,607,626 UART: Running Caliptra FMC ...
5,608,034 UART:
5,608,177 UART: [state] CFI Enabled
5,618,949 UART: [fht] FMC Alias Private Key: 7
5,737,969 UART: [art] Extend RT PCRs Done
5,738,397 UART: [art] Lock RT PCRs Done
5,740,149 UART: [art] Populate DV Done
5,748,318 UART: [fht] FMC Alias Private Key: 7
5,749,308 UART: [art] Derive CDI
5,749,588 UART: [art] Store in slot 0x4
5,835,438 UART: [art] Derive Key Pair
5,835,798 UART: [art] Store priv key in slot 0x5
5,849,429 UART: [art] Derive Key Pair - Done
5,864,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,879,651 UART: [art] Erasing AUTHORITY.KEYID = 7
5,880,416 UART: [art] PUB.X = 5B15083B8F5DB436F93BD7D278030B6217A64DB0B993525BF3B59C8BCCAC525DB711A67201BCE9BD0D268FE4B591884A
5,887,181 UART: [art] PUB.Y = 1E604A8AF2D7406FF01C3508B9B0EDF5CA34ED65CB8D9804BC271C0F1F3903D6ADB6721EC6E13B2C718702F0F71A6A35
5,894,130 UART: [art] SIG.R = 951DE8465BC0B245C39C148F57F86D143DD22E116EEFD87439DA97ADCC12625DFEB6D225AE801D163FEBC22F6B1D9BD4
5,900,918 UART: [art] SIG.S = 560B9C13E8E54934C21CC49A13FA2E8A9E34769E722B1C8741E717911CBDED9CC855E8041F08B3EB545599534102B0BB
5,925,112 UART: Caliptra RT
5,925,455 UART: [state] CFI Enabled
6,046,505 UART: [rt] RT listening for mailbox commands...
6,047,175 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,170,317 UART: [rt]cmd =0x41544d4e, len=14344
9,594,769 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,606 ready_for_fw is high
1,363,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,330,603 >>> mbox cmd response: success
5,391,948 UART:
5,391,964 UART: Running Caliptra FMC ...
5,392,372 UART:
5,392,515 UART: [state] CFI Enabled
5,403,165 UART: [fht] FMC Alias Private Key: 7
5,521,967 UART: [art] Extend RT PCRs Done
5,522,395 UART: [art] Lock RT PCRs Done
5,523,993 UART: [art] Populate DV Done
5,531,926 UART: [fht] FMC Alias Private Key: 7
5,533,106 UART: [art] Derive CDI
5,533,386 UART: [art] Store in slot 0x4
5,619,150 UART: [art] Derive Key Pair
5,619,510 UART: [art] Store priv key in slot 0x5
5,632,621 UART: [art] Derive Key Pair - Done
5,647,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,662,720 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,485 UART: [art] PUB.X = 14DB26AC08431D1B36FB815BF84816D269EAB1298BFC739B2A09AE199AA89FF7E696CA01CDFECC79BFD49C2A226DCB20
5,670,268 UART: [art] PUB.Y = 81EBDE5C9874F93CEB8FB874C0129B9EEFDD34359ACDB709ED2256AAAE05BB067C7DD86E5D53E8FB2147F4BFE230B426
5,677,233 UART: [art] SIG.R = E19875E97D8B6F559911721091D2C6F4D42800815667FB8363741F3B00541A661B52C26FE246CB7A123CE068A7D49978
5,683,947 UART: [art] SIG.S = 0CD1D3F2047F3A30A5328FA66ABBD1B2EA94CA804861E32A014475556808D24CE14BA786626B5731D04D7C0E67AA775F
5,707,304 UART: Caliptra RT
5,707,647 UART: [state] CFI Enabled
5,827,375 UART: [rt] RT listening for mailbox commands...
5,828,045 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,951,235 UART: [rt]cmd =0x41544d4e, len=14344
9,414,194 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,590 UART: [state] LifecycleState = Unprovisioned
86,245 UART: [state] DebugLocked = No
86,801 UART: [state] WD Timer not started. Device not locked for debugging
88,076 UART: [kat] SHA2-256
891,626 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,730 UART: [kat] ++
895,882 UART: [kat] sha1
900,182 UART: [kat] SHA2-256
902,122 UART: [kat] SHA2-384
904,695 UART: [kat] SHA2-512-ACC
906,596 UART: [kat] ECC-384
916,279 UART: [kat] HMAC-384Kdf
920,853 UART: [kat] LMS
1,169,165 UART: [kat] --
1,169,798 UART: [cold-reset] ++
1,170,204 UART: [fht] FHT @ 0x50003400
1,172,978 UART: [idev] ++
1,173,146 UART: [idev] CDI.KEYID = 6
1,173,507 UART: [idev] SUBJECT.KEYID = 7
1,173,932 UART: [idev] UDS.KEYID = 0
1,174,278 ready_for_fw is high
1,174,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,989 UART: [idev] Erasing UDS.KEYID = 0
1,198,935 UART: [idev] Sha1 KeyId Algorithm
1,207,663 UART: [idev] --
1,208,848 UART: [ldev] ++
1,209,016 UART: [ldev] CDI.KEYID = 6
1,209,380 UART: [ldev] SUBJECT.KEYID = 5
1,209,807 UART: [ldev] AUTHORITY.KEYID = 7
1,210,270 UART: [ldev] FE.KEYID = 1
1,215,314 UART: [ldev] Erasing FE.KEYID = 1
1,241,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,922 UART: [ldev] --
1,280,243 UART: [fwproc] Wait for Commands...
1,280,914 UART: [fwproc] Recv command 0x46574c44
1,281,647 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,811 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,986 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,372,219 >>> mbox cmd response: success
3,373,365 UART: [afmc] ++
3,373,533 UART: [afmc] CDI.KEYID = 6
3,373,896 UART: [afmc] SUBJECT.KEYID = 7
3,374,322 UART: [afmc] AUTHORITY.KEYID = 5
3,408,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,280 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,029 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,736 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,613 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,323 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,111 UART: [afmc] --
3,451,972 UART: [cold-reset] --
3,452,910 UART: [state] Locking Datavault
3,454,341 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,945 UART: [state] Locking ICCM
3,455,509 UART: [exit] Launching FMC @ 0x40000130
3,460,839 UART:
3,460,855 UART: Running Caliptra FMC ...
3,461,263 UART:
3,461,317 UART: [state] CFI Enabled
3,471,827 UART: [fht] FMC Alias Private Key: 7
3,591,299 UART: [art] Extend RT PCRs Done
3,591,727 UART: [art] Lock RT PCRs Done
3,593,359 UART: [art] Populate DV Done
3,601,768 UART: [fht] FMC Alias Private Key: 7
3,602,920 UART: [art] Derive CDI
3,603,200 UART: [art] Store in slot 0x4
3,688,893 UART: [art] Derive Key Pair
3,689,253 UART: [art] Store priv key in slot 0x5
3,702,483 UART: [art] Derive Key Pair - Done
3,717,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,508 UART: [art] PUB.X = A089CAF0BD1B39C054F4107819B421C39C03025208A5A0E8C43AFCB3846CE5AB86F467109560801404964348F64443D1
3,740,258 UART: [art] PUB.Y = F040D19B1BDFDF40D8B39378EC17902DEB0F4178BE52BAC90F0F7F819EBC66B8365CFE748711BE39FD9C78684716E89E
3,747,213 UART: [art] SIG.R = 462A29FE716A595644CCB209EE456A2DDAF1C28924A8FE519F530EDD0F755C485724300E7BED0056C043C3D6AC59570E
3,753,952 UART: [art] SIG.S = B26B673C245918454579274EC52280B2F4815EE54A96E797B200AB6CE938F07526CDE2B614D6FCF4BA73D8E0C7B34380
3,777,118 UART: Caliptra RT
3,777,369 UART: [state] CFI Enabled
3,897,395 UART: [rt] RT listening for mailbox commands...
3,898,065 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,065 UART: [rt]cmd =0x41544d4e, len=14344
4,974,709 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,342 ready_for_fw is high
1,059,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,769 >>> mbox cmd response: success
3,284,744 UART:
3,284,760 UART: Running Caliptra FMC ...
3,285,168 UART:
3,285,222 UART: [state] CFI Enabled
3,295,584 UART: [fht] FMC Alias Private Key: 7
3,414,414 UART: [art] Extend RT PCRs Done
3,414,842 UART: [art] Lock RT PCRs Done
3,416,364 UART: [art] Populate DV Done
3,424,743 UART: [fht] FMC Alias Private Key: 7
3,425,823 UART: [art] Derive CDI
3,426,103 UART: [art] Store in slot 0x4
3,511,316 UART: [art] Derive Key Pair
3,511,676 UART: [art] Store priv key in slot 0x5
3,525,130 UART: [art] Derive Key Pair - Done
3,540,138 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,353 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,118 UART: [art] PUB.X = 6D4F2C775EE014582C71D2E5A016A6AFE6A543CD11C56FD92A764E09054AC18F0D9C5F32C015591C00B3AA5B14DAAFEB
3,562,873 UART: [art] PUB.Y = B260DA92AE18FE648A44FBDF78510170028FE42A6E818EB964E80F4E68A8CB2B3D07211DA3D6CA34B5BFAEDE3C892EB8
3,569,831 UART: [art] SIG.R = 035C12DC4412C4B19AA7C900731C9FFC084F56838538FC6C65A80F357AC9EAB4CFC1FEB3657C70CA2724D8403C5007BB
3,576,577 UART: [art] SIG.S = ECD0B3ED4C2FC75272D2FB6681F86E3AEB9F1DBFCB812F3015FDE1372AB4BBA894C87AEEE82984B8C0C9CB06E5F32386
3,600,150 UART: Caliptra RT
3,600,401 UART: [state] CFI Enabled
3,719,617 UART: [rt] RT listening for mailbox commands...
3,720,287 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,205 UART: [rt]cmd =0x41544d4e, len=14344
4,786,801 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,945 UART: [state] LifecycleState = Unprovisioned
85,600 UART: [state] DebugLocked = No
86,228 UART: [state] WD Timer not started. Device not locked for debugging
87,405 UART: [kat] SHA2-256
890,955 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,345 UART: [kat] SHA2-256
901,285 UART: [kat] SHA2-384
904,028 UART: [kat] SHA2-512-ACC
905,929 UART: [kat] ECC-384
915,698 UART: [kat] HMAC-384Kdf
920,232 UART: [kat] LMS
1,168,544 UART: [kat] --
1,169,587 UART: [cold-reset] ++
1,169,927 UART: [fht] FHT @ 0x50003400
1,172,611 UART: [idev] ++
1,172,779 UART: [idev] CDI.KEYID = 6
1,173,140 UART: [idev] SUBJECT.KEYID = 7
1,173,565 UART: [idev] UDS.KEYID = 0
1,173,911 ready_for_fw is high
1,173,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,574 UART: [idev] Erasing UDS.KEYID = 0
1,198,440 UART: [idev] Sha1 KeyId Algorithm
1,207,188 UART: [idev] --
1,208,247 UART: [ldev] ++
1,208,415 UART: [ldev] CDI.KEYID = 6
1,208,779 UART: [ldev] SUBJECT.KEYID = 5
1,209,206 UART: [ldev] AUTHORITY.KEYID = 7
1,209,669 UART: [ldev] FE.KEYID = 1
1,215,155 UART: [ldev] Erasing FE.KEYID = 1
1,242,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,547 UART: [ldev] --
1,281,870 UART: [fwproc] Wait for Commands...
1,282,633 UART: [fwproc] Recv command 0x46574c44
1,283,366 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,390 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,565 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,876 >>> mbox cmd response: success
3,374,908 UART: [afmc] ++
3,375,076 UART: [afmc] CDI.KEYID = 6
3,375,439 UART: [afmc] SUBJECT.KEYID = 7
3,375,865 UART: [afmc] AUTHORITY.KEYID = 5
3,411,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,903 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,652 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,359 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,440,236 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,946 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,592 UART: [afmc] --
3,454,467 UART: [cold-reset] --
3,455,229 UART: [state] Locking Datavault
3,456,556 UART: [state] Locking PCR0, PCR1 and PCR31
3,457,160 UART: [state] Locking ICCM
3,457,830 UART: [exit] Launching FMC @ 0x40000130
3,463,160 UART:
3,463,176 UART: Running Caliptra FMC ...
3,463,584 UART:
3,463,727 UART: [state] CFI Enabled
3,474,591 UART: [fht] FMC Alias Private Key: 7
3,594,167 UART: [art] Extend RT PCRs Done
3,594,595 UART: [art] Lock RT PCRs Done
3,595,763 UART: [art] Populate DV Done
3,604,076 UART: [fht] FMC Alias Private Key: 7
3,605,012 UART: [art] Derive CDI
3,605,292 UART: [art] Store in slot 0x4
3,691,055 UART: [art] Derive Key Pair
3,691,415 UART: [art] Store priv key in slot 0x5
3,704,995 UART: [art] Derive Key Pair - Done
3,719,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,973 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,738 UART: [art] PUB.X = 3859C266C3B25A651B7A1447E3514F8FB33C68903A56EBEE7F3382415DB99BF0DE62C3C300ABED0962499CD651F89A30
3,742,487 UART: [art] PUB.Y = 24662F68F4E36F165DA93EB2C51E0C455A5E22F615A9C860831B9A15F14035C4EB620C1A361FE3CBFC5CE45787EF0AD6
3,749,438 UART: [art] SIG.R = 60067F0B6493B2837C2433A422E14CC049B43ACE19AEA6CED650A0430FD272BC69B4BEA4ACA485D7515D6454D5255103
3,756,200 UART: [art] SIG.S = B77E6CCBEA6565C2A511DEF56B5C71542770F5E1BA014A490E4A3F48C66B22C26CBB23764DA8999CE65933290C96236D
3,779,683 UART: Caliptra RT
3,780,026 UART: [state] CFI Enabled
3,901,030 UART: [rt] RT listening for mailbox commands...
3,901,700 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,616 UART: [rt]cmd =0x41544d4e, len=14344
4,963,090 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,691 ready_for_fw is high
1,059,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,228,294 >>> mbox cmd response: success
3,290,807 UART:
3,290,823 UART: Running Caliptra FMC ...
3,291,231 UART:
3,291,374 UART: [state] CFI Enabled
3,301,758 UART: [fht] FMC Alias Private Key: 7
3,421,338 UART: [art] Extend RT PCRs Done
3,421,766 UART: [art] Lock RT PCRs Done
3,423,172 UART: [art] Populate DV Done
3,431,171 UART: [fht] FMC Alias Private Key: 7
3,432,329 UART: [art] Derive CDI
3,432,609 UART: [art] Store in slot 0x4
3,518,356 UART: [art] Derive Key Pair
3,518,716 UART: [art] Store priv key in slot 0x5
3,532,018 UART: [art] Derive Key Pair - Done
3,546,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,562,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,563,105 UART: [art] PUB.X = 3754E0109999F34B2908F0976D623FF5A42A6C5D822102EB1D789055076FA7AE2D85ADB2F71448851B69ECCD1D3A3E09
3,569,863 UART: [art] PUB.Y = 3150CD3566E1BBF52930BFAB52C5EB57355867D8C18AF1D56606453044EBCD2E6190CAB3AE05DBD24E188B5EFF427147
3,576,817 UART: [art] SIG.R = 5E2A583C00F01C6FD1461AE71364B34B316E8F6D166E5904F9D858D9D4236CA0590D2272F742BBF8D85C853D271A556F
3,583,559 UART: [art] SIG.S = F10FBE9C1CB567BBA9A9210FA6C186401D696104F66AF5599059414484D6996F311C8D1CC68611055B60FF92806BE767
3,607,347 UART: Caliptra RT
3,607,690 UART: [state] CFI Enabled
3,728,066 UART: [rt] RT listening for mailbox commands...
3,728,736 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,851,386 UART: [rt]cmd =0x41544d4e, len=14344
4,810,890 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,865 UART: [kat] SHA2-256
903,805 UART: [kat] SHA2-384
906,556 UART: [kat] SHA2-512-ACC
908,457 UART: [kat] ECC-384
918,170 UART: [kat] HMAC-384Kdf
922,744 UART: [kat] LMS
1,171,072 UART: [kat] --
1,171,733 UART: [cold-reset] ++
1,172,149 UART: [fht] FHT @ 0x50003400
1,174,740 UART: [idev] ++
1,174,908 UART: [idev] CDI.KEYID = 6
1,175,268 UART: [idev] SUBJECT.KEYID = 7
1,175,692 UART: [idev] UDS.KEYID = 0
1,176,037 ready_for_fw is high
1,176,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,950 UART: [idev] Erasing UDS.KEYID = 0
1,200,303 UART: [idev] Sha1 KeyId Algorithm
1,208,905 UART: [idev] --
1,209,939 UART: [ldev] ++
1,210,107 UART: [ldev] CDI.KEYID = 6
1,210,470 UART: [ldev] SUBJECT.KEYID = 5
1,210,896 UART: [ldev] AUTHORITY.KEYID = 7
1,211,359 UART: [ldev] FE.KEYID = 1
1,216,619 UART: [ldev] Erasing FE.KEYID = 1
1,243,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,502 UART: [fwproc] Wait for Commands...
1,283,158 UART: [fwproc] Recv command 0x46574c44
1,283,886 UART: [fwproc] Recv'd Img size: 118548 bytes
3,160,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,189,227 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,220,397 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,360,600 >>> mbox cmd response: success
3,361,838 UART: [afmc] ++
3,362,006 UART: [afmc] CDI.KEYID = 6
3,362,368 UART: [afmc] SUBJECT.KEYID = 7
3,362,793 UART: [afmc] AUTHORITY.KEYID = 5
3,398,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,415,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,416,043 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,421,749 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,427,628 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,433,338 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,441,125 UART: [afmc] --
3,442,123 UART: [cold-reset] --
3,442,765 UART: [state] Locking Datavault
3,444,024 UART: [state] Locking PCR0, PCR1 and PCR31
3,444,628 UART: [state] Locking ICCM
3,445,114 UART: [exit] Launching FMC @ 0x40000130
3,450,444 UART:
3,450,460 UART: Running Caliptra FMC ...
3,450,868 UART:
3,450,922 UART: [state] CFI Enabled
3,461,104 UART: [fht] FMC Alias Private Key: 7
3,579,266 UART: [art] Extend RT PCRs Done
3,579,694 UART: [art] Lock RT PCRs Done
3,581,200 UART: [art] Populate DV Done
3,589,561 UART: [fht] FMC Alias Private Key: 7
3,590,663 UART: [art] Derive CDI
3,590,943 UART: [art] Store in slot 0x4
3,676,528 UART: [art] Derive Key Pair
3,676,888 UART: [art] Store priv key in slot 0x5
3,689,984 UART: [art] Derive Key Pair - Done
3,704,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,720,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,721,014 UART: [art] PUB.X = 33B336576A65BDF124C48C12596C1823C2B82FCFE5097D1D0CB71C30134D0D3E79C5409252DF880492C8174A12BB1318
3,727,768 UART: [art] PUB.Y = DFDD5CCD3389B92C70BD77D1A1E0A0C1EBCB9861D04E382CDC782587CAD0A1EE3CEE1ECC2C504A1690D03730896BC74B
3,734,742 UART: [art] SIG.R = B63393D75A1347D03B376B531FACBCC8D942083CEDEB5BF61AEF9C8784A20EDDA8804C916A7F9C0811697CAA833182D5
3,741,515 UART: [art] SIG.S = 3D4597EAEBB77247BA305B7F01F9F8B445D40D1139F9D39B1FD7B0353B9FEBDE4D63303D7AFDFDB3C1199115639A5FA9
3,765,323 UART: Caliptra RT
3,765,574 UART: [state] CFI Enabled
3,885,732 UART: [rt] RT listening for mailbox commands...
3,886,402 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,050 UART: [rt]cmd =0x41544d4e, len=14344
4,973,650 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,353 ready_for_fw is high
1,060,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,220,392 >>> mbox cmd response: success
3,282,197 UART:
3,282,213 UART: Running Caliptra FMC ...
3,282,621 UART:
3,282,675 UART: [state] CFI Enabled
3,293,191 UART: [fht] FMC Alias Private Key: 7
3,412,683 UART: [art] Extend RT PCRs Done
3,413,111 UART: [art] Lock RT PCRs Done
3,414,857 UART: [art] Populate DV Done
3,423,184 UART: [fht] FMC Alias Private Key: 7
3,424,220 UART: [art] Derive CDI
3,424,500 UART: [art] Store in slot 0x4
3,510,351 UART: [art] Derive Key Pair
3,510,711 UART: [art] Store priv key in slot 0x5
3,524,069 UART: [art] Derive Key Pair - Done
3,538,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,915 UART: [art] PUB.X = BDC8ABA13F3A78C744F1B01B3001B6C2F9E5292352E90441470D95B39FCB653130C38BE09FB33C0E4ADCD78DED14F325
3,561,685 UART: [art] PUB.Y = 9EA7CCCDBE1ED23E757714656173F8FF4E73A4D1284BA535401D9D7EB0FB7C37946261FBF5A54BB90C8ECAC0D2B0C335
3,568,650 UART: [art] SIG.R = 2C024FE4D15D85F4B6BC2D00AF348ADB5D5DF0533B50425140DB745F99EB7F10E5816303AC7720CD6B14D4D10D23F7C1
3,575,399 UART: [art] SIG.S = F94A542D35C58A608B00BFC31DBB62C637EADF1AC410257B27191E540ACABB983CCAB762E3F415FF939BBFDF558B3817
3,599,328 UART: Caliptra RT
3,599,579 UART: [state] CFI Enabled
3,719,235 UART: [rt] RT listening for mailbox commands...
3,719,905 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,939 UART: [rt]cmd =0x41544d4e, len=14344
4,807,603 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
893,447 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,572 UART: [kat] ++
897,724 UART: [kat] sha1
902,150 UART: [kat] SHA2-256
904,090 UART: [kat] SHA2-384
906,647 UART: [kat] SHA2-512-ACC
908,548 UART: [kat] ECC-384
918,785 UART: [kat] HMAC-384Kdf
923,411 UART: [kat] LMS
1,171,739 UART: [kat] --
1,172,906 UART: [cold-reset] ++
1,173,410 UART: [fht] FHT @ 0x50003400
1,175,897 UART: [idev] ++
1,176,065 UART: [idev] CDI.KEYID = 6
1,176,425 UART: [idev] SUBJECT.KEYID = 7
1,176,849 UART: [idev] UDS.KEYID = 0
1,177,194 ready_for_fw is high
1,177,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,895 UART: [idev] Erasing UDS.KEYID = 0
1,202,108 UART: [idev] Sha1 KeyId Algorithm
1,210,446 UART: [idev] --
1,211,424 UART: [ldev] ++
1,211,592 UART: [ldev] CDI.KEYID = 6
1,211,955 UART: [ldev] SUBJECT.KEYID = 5
1,212,381 UART: [ldev] AUTHORITY.KEYID = 7
1,212,844 UART: [ldev] FE.KEYID = 1
1,217,874 UART: [ldev] Erasing FE.KEYID = 1
1,244,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,390 UART: [ldev] --
1,283,795 UART: [fwproc] Wait for Commands...
1,284,561 UART: [fwproc] Recv command 0x46574c44
1,285,289 UART: [fwproc] Recv'd Img size: 118548 bytes
3,183,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,210,849 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,242,019 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,382,204 >>> mbox cmd response: success
3,383,426 UART: [afmc] ++
3,383,594 UART: [afmc] CDI.KEYID = 6
3,383,956 UART: [afmc] SUBJECT.KEYID = 7
3,384,381 UART: [afmc] AUTHORITY.KEYID = 5
3,420,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,436,643 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,437,391 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,443,097 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,448,976 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,454,686 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,462,547 UART: [afmc] --
3,463,567 UART: [cold-reset] --
3,464,309 UART: [state] Locking Datavault
3,465,612 UART: [state] Locking PCR0, PCR1 and PCR31
3,466,216 UART: [state] Locking ICCM
3,466,864 UART: [exit] Launching FMC @ 0x40000130
3,472,194 UART:
3,472,210 UART: Running Caliptra FMC ...
3,472,618 UART:
3,472,761 UART: [state] CFI Enabled
3,483,441 UART: [fht] FMC Alias Private Key: 7
3,603,009 UART: [art] Extend RT PCRs Done
3,603,437 UART: [art] Lock RT PCRs Done
3,604,805 UART: [art] Populate DV Done
3,613,028 UART: [fht] FMC Alias Private Key: 7
3,614,072 UART: [art] Derive CDI
3,614,352 UART: [art] Store in slot 0x4
3,700,489 UART: [art] Derive Key Pair
3,700,849 UART: [art] Store priv key in slot 0x5
3,714,629 UART: [art] Derive Key Pair - Done
3,729,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,745,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,745,939 UART: [art] PUB.X = D3E2EA7C7B57F095E11F7F2FF3A0D843C67D1CD7FC12BADC50B18CF06B23919A2C9F70B582FBA73A8777CCE0637A62C9
3,752,729 UART: [art] PUB.Y = 84374F56EB20E652FF885D6579FA7AF3DF46164FE77A18CCD0E9EEAAE4159A2DCC0BCF18580F903AA92E85575C1A4965
3,759,687 UART: [art] SIG.R = 2FE0EA252E49C3476D64DC451ED7FA3235974902F117F7F4CB8ECC91197BB05B288DFE93544C7C73FF6E923FBB7066F7
3,766,464 UART: [art] SIG.S = AC2D481AF08CA4627B008814CD39A27120A48FB7C64AEB54E859A3F04585016FDE48CF07274D9F9381E409CC9309C90E
3,790,403 UART: Caliptra RT
3,790,746 UART: [state] CFI Enabled
3,910,904 UART: [rt] RT listening for mailbox commands...
3,911,574 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,034,782 UART: [rt]cmd =0x41544d4e, len=14344
4,981,167 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,454 ready_for_fw is high
1,060,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,445 >>> mbox cmd response: success
3,281,152 UART:
3,281,168 UART: Running Caliptra FMC ...
3,281,576 UART:
3,281,719 UART: [state] CFI Enabled
3,291,963 UART: [fht] FMC Alias Private Key: 7
3,411,101 UART: [art] Extend RT PCRs Done
3,411,529 UART: [art] Lock RT PCRs Done
3,413,203 UART: [art] Populate DV Done
3,421,434 UART: [fht] FMC Alias Private Key: 7
3,422,592 UART: [art] Derive CDI
3,422,872 UART: [art] Store in slot 0x4
3,508,683 UART: [art] Derive Key Pair
3,509,043 UART: [art] Store priv key in slot 0x5
3,522,953 UART: [art] Derive Key Pair - Done
3,537,818 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,553,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,394 UART: [art] PUB.X = EB25716F2FC125C7A6B0C9CF197ED50077B5928061BC01922B2014207F81A50350D70C41ED49EA96B83EECCDF4D7DC7A
3,561,143 UART: [art] PUB.Y = 3A32537294C4D4A8A9D23C0262E6DFA72A66AF3CC04FE015CF7BC99E1C3424062178B7B2B9E0DD9E6B94B73C603707BB
3,568,094 UART: [art] SIG.R = 1FD3F6F38F54A498DB37CA37EAA6A6A31B0DEC3EBA380D5116370F708ED8A8A49D7004251249600F45747FC73910D3DC
3,574,857 UART: [art] SIG.S = 80D57EE9F22B32F8D1AF27510AFB536137C38B7E6943AAACC27477BEB80EC7189FC6941137ACE17A6A8E5F1A57D6FCD2
3,598,049 UART: Caliptra RT
3,598,392 UART: [state] CFI Enabled
3,718,832 UART: [rt] RT listening for mailbox commands...
3,719,502 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,600 UART: [rt]cmd =0x41544d4e, len=14344
4,802,048 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,201 UART:
192,552 UART: Running Caliptra ROM ...
193,739 UART:
193,913 UART: [state] CFI Enabled
261,963 UART: [state] LifecycleState = Unprovisioned
263,883 UART: [state] DebugLocked = No
266,274 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,435 UART: [kat] SHA2-256
440,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,646 UART: [kat] ++
451,123 UART: [kat] sha1
463,559 UART: [kat] SHA2-256
466,213 UART: [kat] SHA2-384
471,661 UART: [kat] SHA2-512-ACC
474,067 UART: [kat] ECC-384
2,765,950 UART: [kat] HMAC-384Kdf
2,798,581 UART: [kat] LMS
3,988,868 UART: [kat] --
3,995,311 UART: [cold-reset] ++
3,996,918 UART: [fht] Storing FHT @ 0x50003400
4,008,751 UART: [idev] ++
4,009,328 UART: [idev] CDI.KEYID = 6
4,010,245 UART: [idev] SUBJECT.KEYID = 7
4,011,494 UART: [idev] UDS.KEYID = 0
4,012,574 ready_for_fw is high
4,012,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,836 UART: [idev] Erasing UDS.KEYID = 0
7,346,595 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,005 UART: [idev] --
7,373,255 UART: [ldev] ++
7,373,836 UART: [ldev] CDI.KEYID = 6
7,374,749 UART: [ldev] SUBJECT.KEYID = 5
7,376,021 UART: [ldev] AUTHORITY.KEYID = 7
7,377,209 UART: [ldev] FE.KEYID = 1
7,420,636 UART: [ldev] Erasing FE.KEYID = 1
10,755,080 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,415 UART: [ldev] --
13,113,301 UART: [fwproc] Waiting for Commands...
13,115,959 UART: [fwproc] Received command 0x46574c44
13,118,195 UART: [fwproc] Received Image of size 118548 bytes
21,966,759 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,042,954 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,116,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,445,369 >>> mbox cmd response: success
22,450,299 UART: [afmc] ++
22,450,909 UART: [afmc] CDI.KEYID = 6
22,451,799 UART: [afmc] SUBJECT.KEYID = 7
22,453,091 UART: [afmc] AUTHORITY.KEYID = 5
25,804,618 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,107,791 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,110,044 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,124,541 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,139,348 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,153,764 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,175,209 UART: [afmc] --
28,178,482 UART: [cold-reset] --
28,181,748 UART: [state] Locking Datavault
28,186,833 UART: [state] Locking PCR0, PCR1 and PCR31
28,188,538 UART: [state] Locking ICCM
28,190,452 UART: [exit] Launching FMC @ 0x40000130
28,198,843 UART:
28,199,078 UART: Running Caliptra FMC ...
28,200,181 UART:
28,200,362 UART: [state] CFI Enabled
28,267,382 UART: [fht] FMC Alias Private Key: 7
30,607,664 UART: [art] Extend RT PCRs Done
30,608,882 UART: [art] Lock RT PCRs Done
30,610,618 UART: [art] Populate DV Done
30,616,136 UART: [fht] FMC Alias Private Key: 7
30,617,724 UART: [art] Derive CDI
30,618,463 UART: [art] Store in slot 0x4
30,675,861 UART: [art] Derive Key Pair
30,676,913 UART: [art] Store priv key in slot 0x5
33,969,460 UART: [art] Derive Key Pair - Done
33,982,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,270,882 UART: [art] Erasing AUTHORITY.KEYID = 7
36,272,389 UART: [art] PUB.X = E439B68837FB42455AAE7D92BF99C3C6F89C0398F9F99A8CCE7B309B04B740ADA3A76B1461C7ADCD73D1A1D5579E3602
36,279,655 UART: [art] PUB.Y = 9A680D8D1EA169004655F30D63CE6ED59F0F85DB23F3E752E28069BB4CFE4DDA38F4BE543E4CEA05B284611F38DFA62E
36,286,961 UART: [art] SIG.R = 322E96080A2B1B7905C18BF2F1F408245A89EECCB19BD8C5058BE18358B196A6F2E64239D49025114A3C9D487DD10FF7
36,294,343 UART: [art] SIG.S = DC5A9AD20A667B7F37D3D91DE2DAC7607A4DC1F6316E4170C6227F8370095D68877394CFC84426826D1222CF21EE4E71
37,599,481 UART: Caliptra RT
37,600,191 UART: [state] CFI Enabled
37,777,527 UART: [rt] RT listening for mailbox commands...
37,779,857 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,935,326 UART: [rt]cmd =0x41544d4e, len=14344
45,585,698 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,805,519 ready_for_fw is high
3,805,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,159,365 >>> mbox cmd response: success
27,847,205 UART:
27,847,653 UART: Running Caliptra FMC ...
27,848,780 UART:
27,848,940 UART: [state] CFI Enabled
27,918,498 UART: [fht] FMC Alias Private Key: 7
30,259,289 UART: [art] Extend RT PCRs Done
30,260,519 UART: [art] Lock RT PCRs Done
30,262,177 UART: [art] Populate DV Done
30,267,485 UART: [fht] FMC Alias Private Key: 7
30,269,185 UART: [art] Derive CDI
30,269,923 UART: [art] Store in slot 0x4
30,326,578 UART: [art] Derive Key Pair
30,327,619 UART: [art] Store priv key in slot 0x5
33,620,061 UART: [art] Derive Key Pair - Done
33,632,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,921,226 UART: [art] Erasing AUTHORITY.KEYID = 7
35,922,755 UART: [art] PUB.X = 96A46D265554DB56E9EC9D1056FE437FBFDEC02FF01B4FC2E195D058BDA9EADBFF9453A171EB64FD338A6A9AFD715B2F
35,930,012 UART: [art] PUB.Y = E61248167C29C913874616CF19A49AC5176796E5441A23D7264B6D119198029542A5DF13F2BDE139DD96BB061A60484C
35,937,235 UART: [art] SIG.R = FC41396F11F351AB6C1DA483C2C40AEE272B098C1AD9B0A1B6F9BA0CE678B7A7AB0895A671AF2E757820752F4F2EFF5D
35,944,637 UART: [art] SIG.S = DC9B0BB5A23C9533E74E819955D2D2CAAD6D364497A2487DACB491F5CA383988356D877F80CD2CF1A2274542A77A5020
37,250,319 UART: Caliptra RT
37,251,026 UART: [state] CFI Enabled
37,447,243 UART: [rt] RT listening for mailbox commands...
37,449,581 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,605,057 UART: [rt]cmd =0x41544d4e, len=14344
45,125,246 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,557 UART:
192,910 UART: Running Caliptra ROM ...
194,098 UART:
603,892 UART: [state] CFI Enabled
619,343 UART: [state] LifecycleState = Unprovisioned
621,212 UART: [state] DebugLocked = No
623,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,931 UART: [kat] SHA2-256
798,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,244 UART: [kat] ++
809,688 UART: [kat] sha1
820,774 UART: [kat] SHA2-256
823,499 UART: [kat] SHA2-384
829,059 UART: [kat] SHA2-512-ACC
831,445 UART: [kat] ECC-384
3,114,642 UART: [kat] HMAC-384Kdf
3,126,317 UART: [kat] LMS
4,316,421 UART: [kat] --
4,320,792 UART: [cold-reset] ++
4,323,041 UART: [fht] Storing FHT @ 0x50003400
4,334,810 UART: [idev] ++
4,335,380 UART: [idev] CDI.KEYID = 6
4,336,288 UART: [idev] SUBJECT.KEYID = 7
4,337,527 UART: [idev] UDS.KEYID = 0
4,338,584 ready_for_fw is high
4,338,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,613 UART: [idev] Erasing UDS.KEYID = 0
7,624,026 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,420 UART: [idev] --
7,650,333 UART: [ldev] ++
7,650,982 UART: [ldev] CDI.KEYID = 6
7,651,898 UART: [ldev] SUBJECT.KEYID = 5
7,653,111 UART: [ldev] AUTHORITY.KEYID = 7
7,654,396 UART: [ldev] FE.KEYID = 1
7,666,119 UART: [ldev] Erasing FE.KEYID = 1
10,956,539 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,641 UART: [ldev] --
13,318,068 UART: [fwproc] Waiting for Commands...
13,319,998 UART: [fwproc] Received command 0x46574c44
13,322,177 UART: [fwproc] Received Image of size 118548 bytes
22,174,343 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,251,374 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,324,509 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,652,427 >>> mbox cmd response: success
22,656,787 UART: [afmc] ++
22,657,407 UART: [afmc] CDI.KEYID = 6
22,658,287 UART: [afmc] SUBJECT.KEYID = 7
22,659,558 UART: [afmc] AUTHORITY.KEYID = 5
25,976,959 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,271,650 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,273,942 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,288,440 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,303,229 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,317,741 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,338,911 UART: [afmc] --
28,341,905 UART: [cold-reset] --
28,346,084 UART: [state] Locking Datavault
28,350,626 UART: [state] Locking PCR0, PCR1 and PCR31
28,352,389 UART: [state] Locking ICCM
28,353,970 UART: [exit] Launching FMC @ 0x40000130
28,362,409 UART:
28,362,638 UART: Running Caliptra FMC ...
28,363,732 UART:
28,363,883 UART: [state] CFI Enabled
28,371,866 UART: [fht] FMC Alias Private Key: 7
30,711,572 UART: [art] Extend RT PCRs Done
30,712,793 UART: [art] Lock RT PCRs Done
30,714,659 UART: [art] Populate DV Done
30,720,225 UART: [fht] FMC Alias Private Key: 7
30,721,796 UART: [art] Derive CDI
30,722,529 UART: [art] Store in slot 0x4
30,765,332 UART: [art] Derive Key Pair
30,766,326 UART: [art] Store priv key in slot 0x5
34,008,106 UART: [art] Derive Key Pair - Done
34,021,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,301,256 UART: [art] Erasing AUTHORITY.KEYID = 7
36,302,762 UART: [art] PUB.X = 4A3C3AE03353F13E2AFFE35812FE6E6165A4444245F37F72B99C22F0299FAE588F89F7D88007E8F1E178AFC651B2F7DD
36,310,064 UART: [art] PUB.Y = CDFCEF1EB436500C6D50FD3D18348EA2FF70D01A10AABB27CB10F1E855632747132454EFC07351FD59CCEFCECEC64B33
36,317,518 UART: [art] SIG.R = 68D8C45327F82CE9A50E2C5C2B508A29065045F59E2334C7590554CF415699D4BA25904A2351D001962BD1041B165D05
36,324,718 UART: [art] SIG.S = E944B8A2337E2B38875AF0E9B36A5950BF9B4FEA28166367DD5F7F9D09EDD97915C0AC8BCFA44D3D49A9468DBFA6E383
37,629,928 UART: Caliptra RT
37,630,613 UART: [state] CFI Enabled
37,764,102 UART: [rt] RT listening for mailbox commands...
37,766,398 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,921,794 UART: [rt]cmd =0x41544d4e, len=14344
45,571,340 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
4,131,970 ready_for_fw is high
4,132,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,292,202 >>> mbox cmd response: success
27,939,131 UART:
27,939,526 UART: Running Caliptra FMC ...
27,940,639 UART:
27,940,792 UART: [state] CFI Enabled
27,948,997 UART: [fht] FMC Alias Private Key: 7
30,288,781 UART: [art] Extend RT PCRs Done
30,290,004 UART: [art] Lock RT PCRs Done
30,291,391 UART: [art] Populate DV Done
30,296,911 UART: [fht] FMC Alias Private Key: 7
30,298,574 UART: [art] Derive CDI
30,299,386 UART: [art] Store in slot 0x4
30,342,248 UART: [art] Derive Key Pair
30,343,245 UART: [art] Store priv key in slot 0x5
33,586,202 UART: [art] Derive Key Pair - Done
33,598,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,879,479 UART: [art] Erasing AUTHORITY.KEYID = 7
35,881,136 UART: [art] PUB.X = F4AABE7F8579DE55C0870E5351689C0E17A68A28AA7670B25D6776CE6530D6051FE1E8286D0DEB1B2B6ADA5C5AF01CA1
35,888,221 UART: [art] PUB.Y = 13B062232DB8019F390FC04FBF9BB74A2A03C2B42629EFFC06EB5FC752C422E7351A1BAD4A6DEA80D4F434F4918EE35A
35,895,487 UART: [art] SIG.R = 375927F2E36449AD43B455A0069F84AE5DE378D06CC03C337E7B640F06FB53ED031A02C9CF1FA6D2EBF8F73F60D001F6
35,902,929 UART: [art] SIG.S = 054B4E47CEB4CC229A100EB0EA221F416F3C91514E6FEF52E3FB66461C3F2D20EDEE5BDDD8FCDBCE523A61E0EDB4854A
37,208,152 UART: Caliptra RT
37,208,841 UART: [state] CFI Enabled
37,342,054 UART: [rt] RT listening for mailbox commands...
37,344,352 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,499,593 UART: [rt]cmd =0x41544d4e, len=14344
44,994,507 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,217 UART:
192,586 UART: Running Caliptra ROM ...
193,805 UART:
193,960 UART: [state] CFI Enabled
264,199 UART: [state] LifecycleState = Unprovisioned
266,111 UART: [state] DebugLocked = No
268,554 UART: [state] WD Timer not started. Device not locked for debugging
272,648 UART: [kat] SHA2-256
452,261 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,087 UART: [kat] ++
463,539 UART: [kat] sha1
473,343 UART: [kat] SHA2-256
475,995 UART: [kat] SHA2-384
482,901 UART: [kat] SHA2-512-ACC
485,263 UART: [kat] ECC-384
2,949,301 UART: [kat] HMAC-384Kdf
2,971,429 UART: [kat] LMS
3,447,886 UART: [kat] --
3,451,753 UART: [cold-reset] ++
3,452,716 UART: [fht] FHT @ 0x50003400
3,463,830 UART: [idev] ++
3,464,460 UART: [idev] CDI.KEYID = 6
3,465,340 UART: [idev] SUBJECT.KEYID = 7
3,466,652 UART: [idev] UDS.KEYID = 0
3,467,547 ready_for_fw is high
3,467,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,889 UART: [idev] Erasing UDS.KEYID = 0
5,988,373 UART: [idev] Sha1 KeyId Algorithm
6,013,351 UART: [idev] --
6,018,730 UART: [ldev] ++
6,019,305 UART: [ldev] CDI.KEYID = 6
6,020,247 UART: [ldev] SUBJECT.KEYID = 5
6,021,408 UART: [ldev] AUTHORITY.KEYID = 7
6,022,695 UART: [ldev] FE.KEYID = 1
6,056,737 UART: [ldev] Erasing FE.KEYID = 1
8,564,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,436 UART: [ldev] --
10,372,866 UART: [fwproc] Wait for Commands...
10,376,089 UART: [fwproc] Recv command 0x46574c44
10,378,072 UART: [fwproc] Recv'd Img size: 118548 bytes
14,935,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,009,317 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,082,371 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,411,228 >>> mbox cmd response: success
15,414,559 UART: [afmc] ++
15,415,141 UART: [afmc] CDI.KEYID = 6
15,416,083 UART: [afmc] SUBJECT.KEYID = 7
15,417,356 UART: [afmc] AUTHORITY.KEYID = 5
17,959,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,683,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,686,095 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,701,973 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,717,925 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,733,583 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,758,480 UART: [afmc] --
19,762,453 UART: [cold-reset] --
19,767,825 UART: [state] Locking Datavault
19,774,806 UART: [state] Locking PCR0, PCR1 and PCR31
19,776,595 UART: [state] Locking ICCM
19,779,389 UART: [exit] Launching FMC @ 0x40000130
19,787,788 UART:
19,788,035 UART: Running Caliptra FMC ...
19,789,141 UART:
19,789,297 UART: [state] CFI Enabled
19,841,376 UART: [fht] FMC Alias Private Key: 7
21,629,106 UART: [art] Extend RT PCRs Done
21,630,325 UART: [art] Lock RT PCRs Done
21,631,868 UART: [art] Populate DV Done
21,637,383 UART: [fht] FMC Alias Private Key: 7
21,639,076 UART: [art] Derive CDI
21,639,816 UART: [art] Store in slot 0x4
21,695,070 UART: [art] Derive Key Pair
21,696,110 UART: [art] Store priv key in slot 0x5
24,159,845 UART: [art] Derive Key Pair - Done
24,172,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,885,335 UART: [art] Erasing AUTHORITY.KEYID = 7
25,886,843 UART: [art] PUB.X = BBA69CE61310AFB744FA50EFAE0016F1E022346391080D280E26158C176C15F0CA8FFA656CBB9B3ECB0B4E2B95EC4169
25,894,098 UART: [art] PUB.Y = 5E4D814AC144A6E3D36E9661DB830B95BFF947B252ECA88C8B4D2D47E67EBE85F4E7A51A54C2ACF2524E38094CE4317D
25,901,340 UART: [art] SIG.R = 9890CA5487B26670BE58EB451F6E3FC4F9CDA78EAFCF9F8749111435ED6D1AF8B3AD19803ECA1804953BCF2D53265897
25,908,740 UART: [art] SIG.S = 1C99AC2EDCB578673AD8DE42CF6A23A33143ACA67AB3A7383CEFA2A370D25BFEE6564A623EA508B51541675777681FE9
26,888,040 UART: Caliptra RT
26,888,733 UART: [state] CFI Enabled
27,070,758 UART: [rt] RT listening for mailbox commands...
27,073,080 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,228,555 UART: [rt]cmd =0x41544d4e, len=14344
31,805,120 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.91s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,463,364 ready_for_fw is high
3,463,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,385,551 >>> mbox cmd response: success
19,667,580 UART:
19,667,946 UART: Running Caliptra FMC ...
19,669,134 UART:
19,669,291 UART: [state] CFI Enabled
19,737,009 UART: [fht] FMC Alias Private Key: 7
21,502,958 UART: [art] Extend RT PCRs Done
21,504,172 UART: [art] Lock RT PCRs Done
21,505,963 UART: [art] Populate DV Done
21,511,046 UART: [fht] FMC Alias Private Key: 7
21,512,745 UART: [art] Derive CDI
21,513,553 UART: [art] Store in slot 0x4
21,569,998 UART: [art] Derive Key Pair
21,571,033 UART: [art] Store priv key in slot 0x5
24,034,573 UART: [art] Derive Key Pair - Done
24,047,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,760,302 UART: [art] Erasing AUTHORITY.KEYID = 7
25,761,817 UART: [art] PUB.X = F55379CECA446481F0844413C2D23BCAFEBBFE64A772C0A008EFDBD381A9ED95BAFB4E8BBBD7D026E8667AD144CF6A6A
25,769,075 UART: [art] PUB.Y = B8D50006F73D4F2B67B50D592C8A479360FF435F428651CD2DB8FF3F9C4CC16395200D09DB699537506C2EB4858FE6C0
25,776,318 UART: [art] SIG.R = 42E28E3AA40E7A1921EB005D2DF950CB55664F2C5A183C1347D341BE850A03ECC66EE0F48626FCF360E3C17CB0745826
25,783,716 UART: [art] SIG.S = A2009B7024B8C7D405389633B8028EDAD9C62EA8B4660363563FA74643D2323AFC90DA0944F4E63A6D0F799068874F20
26,762,822 UART: Caliptra RT
26,763,534 UART: [state] CFI Enabled
26,944,577 UART: [rt] RT listening for mailbox commands...
26,946,867 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,102,268 UART: [rt]cmd =0x41544d4e, len=14344
31,669,324 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.90s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,593 UART:
193,060 UART: Running Caliptra ROM ...
194,241 UART:
603,747 UART: [state] CFI Enabled
619,496 UART: [state] LifecycleState = Unprovisioned
621,492 UART: [state] DebugLocked = No
624,081 UART: [state] WD Timer not started. Device not locked for debugging
627,484 UART: [kat] SHA2-256
807,136 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,881 UART: [kat] ++
818,328 UART: [kat] sha1
828,353 UART: [kat] SHA2-256
831,016 UART: [kat] SHA2-384
837,015 UART: [kat] SHA2-512-ACC
839,388 UART: [kat] ECC-384
3,282,355 UART: [kat] HMAC-384Kdf
3,294,023 UART: [kat] LMS
3,770,532 UART: [kat] --
3,776,976 UART: [cold-reset] ++
3,778,912 UART: [fht] FHT @ 0x50003400
3,790,675 UART: [idev] ++
3,791,250 UART: [idev] CDI.KEYID = 6
3,792,285 UART: [idev] SUBJECT.KEYID = 7
3,793,465 UART: [idev] UDS.KEYID = 0
3,794,369 ready_for_fw is high
3,794,567 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,466 UART: [idev] Erasing UDS.KEYID = 0
6,267,842 UART: [idev] Sha1 KeyId Algorithm
6,291,830 UART: [idev] --
6,297,130 UART: [ldev] ++
6,297,736 UART: [ldev] CDI.KEYID = 6
6,298,625 UART: [ldev] SUBJECT.KEYID = 5
6,299,844 UART: [ldev] AUTHORITY.KEYID = 7
6,301,133 UART: [ldev] FE.KEYID = 1
6,312,861 UART: [ldev] Erasing FE.KEYID = 1
8,791,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,038 UART: [ldev] --
10,586,173 UART: [fwproc] Wait for Commands...
10,589,180 UART: [fwproc] Recv command 0x46574c44
10,591,163 UART: [fwproc] Recv'd Img size: 118548 bytes
15,156,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,236,280 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,309,331 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,637,516 >>> mbox cmd response: success
15,641,507 UART: [afmc] ++
15,642,120 UART: [afmc] CDI.KEYID = 6
15,643,059 UART: [afmc] SUBJECT.KEYID = 7
15,644,293 UART: [afmc] AUTHORITY.KEYID = 5
18,150,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,873,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,876,036 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,891,919 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,907,822 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,923,536 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,948,127 UART: [afmc] --
19,951,237 UART: [cold-reset] --
19,954,402 UART: [state] Locking Datavault
19,959,658 UART: [state] Locking PCR0, PCR1 and PCR31
19,961,415 UART: [state] Locking ICCM
19,962,705 UART: [exit] Launching FMC @ 0x40000130
19,971,106 UART:
19,971,344 UART: Running Caliptra FMC ...
19,972,468 UART:
19,972,627 UART: [state] CFI Enabled
19,980,588 UART: [fht] FMC Alias Private Key: 7
21,746,632 UART: [art] Extend RT PCRs Done
21,747,840 UART: [art] Lock RT PCRs Done
21,749,303 UART: [art] Populate DV Done
21,754,770 UART: [fht] FMC Alias Private Key: 7
21,756,302 UART: [art] Derive CDI
21,757,044 UART: [art] Store in slot 0x4
21,800,070 UART: [art] Derive Key Pair
21,801,067 UART: [art] Store priv key in slot 0x5
24,228,335 UART: [art] Derive Key Pair - Done
24,241,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,947,528 UART: [art] Erasing AUTHORITY.KEYID = 7
25,949,026 UART: [art] PUB.X = EFE634EEA051FBA2C8F83C167A65E9EB784C2EC7F71A324C819EFE45EF5CE21C933696E355884796B53F267ACDEADC66
25,956,329 UART: [art] PUB.Y = F31DBF247FEBA96D5B003750A0CA05289A50E85C2354F24DF6D45757D652D3A18BBEE1B2750C26E120FC3EE6B42872DC
25,963,581 UART: [art] SIG.R = EF7433D3A32349F2BA9894679E1BCF6908D0D4457B606FD912167F2ADAF6BE5D505C05F27183F4CB02453651CE43BCCD
25,970,973 UART: [art] SIG.S = 46C0E27F3FD3A247AED6CCD59879FDA3E0C8BAF4A44ECEA01B74EBC9E4A658D5F1D7E1E52F9BA997FD77FAC867D50765
26,949,714 UART: Caliptra RT
26,950,424 UART: [state] CFI Enabled
27,082,657 UART: [rt] RT listening for mailbox commands...
27,084,960 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,240,646 UART: [rt]cmd =0x41544d4e, len=14344
31,817,620 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.91s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,783,467 ready_for_fw is high
3,783,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,614,373 >>> mbox cmd response: success
19,866,577 UART:
19,866,956 UART: Running Caliptra FMC ...
19,868,235 UART:
19,868,402 UART: [state] CFI Enabled
19,876,254 UART: [fht] FMC Alias Private Key: 7
21,642,288 UART: [art] Extend RT PCRs Done
21,643,509 UART: [art] Lock RT PCRs Done
21,645,327 UART: [art] Populate DV Done
21,650,745 UART: [fht] FMC Alias Private Key: 7
21,652,449 UART: [art] Derive CDI
21,653,211 UART: [art] Store in slot 0x4
21,696,298 UART: [art] Derive Key Pair
21,697,302 UART: [art] Store priv key in slot 0x5
24,124,056 UART: [art] Derive Key Pair - Done
24,136,628 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,843,324 UART: [art] Erasing AUTHORITY.KEYID = 7
25,844,829 UART: [art] PUB.X = A868DF460D6242C53B88D1D10BA1BCA5E0764A6C88A0871A64D577E743B463735D44B389188A0387C5DC8DB5A99D9E84
25,852,083 UART: [art] PUB.Y = E0B535AA3DDE781CCCCF99CB6187709AB0574DECC2379B58E75A4BB49C6B2F6D19A2EFA58F164DBD74AA5304DCD6690B
25,859,390 UART: [art] SIG.R = E04529488221399784A3B26EA786DC76838BAE6A6996C753ACAB29B58AAA9C1162FDE7053FB19C8EC9B04F82938D37F8
25,866,737 UART: [art] SIG.S = BC02DC0C8B409F325AB42183C7638E629BF32701B1776978279B036C111E2E2CA108AC596E4E2BAB86C9F4A70B9CC86E
26,846,021 UART: Caliptra RT
26,846,714 UART: [state] CFI Enabled
26,979,970 UART: [rt] RT listening for mailbox commands...
26,982,260 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,137,683 UART: [rt]cmd =0x41544d4e, len=14344
31,712,960 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.91s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
191,951 UART:
192,319 UART: Running Caliptra ROM ...
193,465 UART:
193,613 UART: [state] CFI Enabled
261,266 UART: [state] LifecycleState = Unprovisioned
263,608 UART: [state] DebugLocked = No
265,993 UART: [state] WD Timer not started. Device not locked for debugging
270,866 UART: [kat] SHA2-256
460,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,462 UART: [kat] ++
471,939 UART: [kat] sha1
483,944 UART: [kat] SHA2-256
486,945 UART: [kat] SHA2-384
492,647 UART: [kat] SHA2-512-ACC
495,294 UART: [kat] ECC-384
2,949,578 UART: [kat] HMAC-384Kdf
2,972,331 UART: [kat] LMS
3,504,112 UART: [kat] --
3,509,271 UART: [cold-reset] ++
3,510,486 UART: [fht] FHT @ 0x50003400
3,520,606 UART: [idev] ++
3,521,302 UART: [idev] CDI.KEYID = 6
3,522,280 UART: [idev] SUBJECT.KEYID = 7
3,523,450 UART: [idev] UDS.KEYID = 0
3,524,372 ready_for_fw is high
3,524,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,613 UART: [idev] Erasing UDS.KEYID = 0
6,031,359 UART: [idev] Sha1 KeyId Algorithm
6,054,051 UART: [idev] --
6,058,506 UART: [ldev] ++
6,059,195 UART: [ldev] CDI.KEYID = 6
6,060,104 UART: [ldev] SUBJECT.KEYID = 5
6,061,261 UART: [ldev] AUTHORITY.KEYID = 7
6,062,489 UART: [ldev] FE.KEYID = 1
6,101,563 UART: [ldev] Erasing FE.KEYID = 1
8,609,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,197 UART: [ldev] --
10,415,462 UART: [fwproc] Wait for Commands...
10,417,930 UART: [fwproc] Recv command 0x46574c44
10,420,238 UART: [fwproc] Recv'd Img size: 118548 bytes
15,076,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,158,720 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,282,291 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,842,575 >>> mbox cmd response: success
15,846,368 UART: [afmc] ++
15,847,086 UART: [afmc] CDI.KEYID = 6
15,848,356 UART: [afmc] SUBJECT.KEYID = 7
15,849,737 UART: [afmc] AUTHORITY.KEYID = 5
18,388,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,125,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,127,372 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,142,513 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,157,735 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,172,715 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,196,496 UART: [afmc] --
20,200,787 UART: [cold-reset] --
20,204,493 UART: [state] Locking Datavault
20,211,478 UART: [state] Locking PCR0, PCR1 and PCR31
20,213,657 UART: [state] Locking ICCM
20,215,338 UART: [exit] Launching FMC @ 0x40000130
20,224,017 UART:
20,224,260 UART: Running Caliptra FMC ...
20,225,380 UART:
20,225,539 UART: [state] CFI Enabled
20,283,021 UART: [fht] FMC Alias Private Key: 7
22,049,719 UART: [art] Extend RT PCRs Done
22,050,941 UART: [art] Lock RT PCRs Done
22,052,511 UART: [art] Populate DV Done
22,057,844 UART: [fht] FMC Alias Private Key: 7
22,059,563 UART: [art] Derive CDI
22,060,381 UART: [art] Store in slot 0x4
22,115,635 UART: [art] Derive Key Pair
22,116,635 UART: [art] Store priv key in slot 0x5
24,579,309 UART: [art] Derive Key Pair - Done
24,592,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,305,255 UART: [art] Erasing AUTHORITY.KEYID = 7
26,306,764 UART: [art] PUB.X = C18B1668F71353A318E537929527671E8E67B3AA859BE411A205AB8DBACFBDAE47BB234FED4258BDDB9D04ACDBFF0EBC
26,313,988 UART: [art] PUB.Y = 59692FFDC2B5C4FABA64472F93D688E1273DFDB2B5ADA0DD63E70555AA649097DD3D2C3DF87CB0EEF726EF9725C79B54
26,321,323 UART: [art] SIG.R = 8D812F8AE88F67E79A34B2E798025CC20A003CF5BFE7E9ECF8A1612C4B776E150F8AA6654DF29614DBA5B30E0823D211
26,328,701 UART: [art] SIG.S = 69B404CDF920062C52CAA66CDCCF4D9F7C451B9CA6D6A579A5B0B28D5EA4885EB52EB4E28A3AC7CC51AB8C1E35307FF9
27,307,443 UART: Caliptra RT
27,308,170 UART: [state] CFI Enabled
27,488,954 UART: [rt] RT listening for mailbox commands...
27,491,255 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,646,626 UART: [rt]cmd =0x41544d4e, len=14344
32,230,986 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,439,411 ready_for_fw is high
3,439,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,922,558 >>> mbox cmd response: success
20,221,715 UART:
20,222,108 UART: Running Caliptra FMC ...
20,223,223 UART:
20,223,395 UART: [state] CFI Enabled
20,287,270 UART: [fht] FMC Alias Private Key: 7
22,073,984 UART: [art] Extend RT PCRs Done
22,075,209 UART: [art] Lock RT PCRs Done
22,076,974 UART: [art] Populate DV Done
22,082,172 UART: [fht] FMC Alias Private Key: 7
22,083,817 UART: [art] Derive CDI
22,084,556 UART: [art] Store in slot 0x4
22,140,893 UART: [art] Derive Key Pair
22,141,936 UART: [art] Store priv key in slot 0x5
24,605,213 UART: [art] Derive Key Pair - Done
24,618,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,331,303 UART: [art] Erasing AUTHORITY.KEYID = 7
26,332,819 UART: [art] PUB.X = 591C6FDC54840041488E4D93B98FFD238C3BA03EE2537FF9F5DABF572DF375CF24246B50B574E4333AA7D94C1911945E
26,340,075 UART: [art] PUB.Y = 132D8B8D373C755CE73CE96B5780A9ADD61DB302E0E1BAD8C797935A1745BE78698D80C5BFEF35F316B475365C7DC454
26,347,328 UART: [art] SIG.R = A05CDEFFA7A7C7E88537DABD39A651AAEB8EC44CDC7939E452109C84213B61ED99AB2C1B16D93D56DC249CB01235981A
26,354,728 UART: [art] SIG.S = 31B8E5D96856BBB5765695BDC946C0AB1A5532042307990436899ACD5B1259A8770DE45AAF9F858EC0645CC04DDAFD15
27,333,673 UART: Caliptra RT
27,334,373 UART: [state] CFI Enabled
27,514,333 UART: [rt] RT listening for mailbox commands...
27,516,643 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,671,797 UART: [rt]cmd =0x41544d4e, len=14344
32,250,589 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,505 UART:
192,866 UART: Running Caliptra ROM ...
194,052 UART:
603,605 UART: [state] CFI Enabled
618,463 UART: [state] LifecycleState = Unprovisioned
620,882 UART: [state] DebugLocked = No
623,341 UART: [state] WD Timer not started. Device not locked for debugging
627,596 UART: [kat] SHA2-256
817,429 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,240 UART: [kat] ++
828,842 UART: [kat] sha1
841,516 UART: [kat] SHA2-256
844,543 UART: [kat] SHA2-384
851,210 UART: [kat] SHA2-512-ACC
853,812 UART: [kat] ECC-384
3,298,353 UART: [kat] HMAC-384Kdf
3,310,375 UART: [kat] LMS
3,842,215 UART: [kat] --
3,845,157 UART: [cold-reset] ++
3,846,588 UART: [fht] FHT @ 0x50003400
3,858,431 UART: [idev] ++
3,859,158 UART: [idev] CDI.KEYID = 6
3,860,049 UART: [idev] SUBJECT.KEYID = 7
3,861,298 UART: [idev] UDS.KEYID = 0
3,862,202 ready_for_fw is high
3,862,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,288 UART: [idev] Erasing UDS.KEYID = 0
6,346,703 UART: [idev] Sha1 KeyId Algorithm
6,370,043 UART: [idev] --
6,374,398 UART: [ldev] ++
6,375,082 UART: [ldev] CDI.KEYID = 6
6,375,975 UART: [ldev] SUBJECT.KEYID = 5
6,377,190 UART: [ldev] AUTHORITY.KEYID = 7
6,378,423 UART: [ldev] FE.KEYID = 1
6,389,947 UART: [ldev] Erasing FE.KEYID = 1
8,864,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,799 UART: [ldev] --
10,656,009 UART: [fwproc] Wait for Commands...
10,657,571 UART: [fwproc] Recv command 0x46574c44
10,659,885 UART: [fwproc] Recv'd Img size: 118548 bytes
15,344,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,428,468 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,552,128 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,113,238 >>> mbox cmd response: success
16,117,294 UART: [afmc] ++
16,118,004 UART: [afmc] CDI.KEYID = 6
16,119,131 UART: [afmc] SUBJECT.KEYID = 7
16,120,691 UART: [afmc] AUTHORITY.KEYID = 5
18,626,765 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,349,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,351,568 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,366,658 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,381,874 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,396,914 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,422,028 UART: [afmc] --
20,425,200 UART: [cold-reset] --
20,430,051 UART: [state] Locking Datavault
20,436,354 UART: [state] Locking PCR0, PCR1 and PCR31
20,438,521 UART: [state] Locking ICCM
20,441,160 UART: [exit] Launching FMC @ 0x40000130
20,449,785 UART:
20,450,066 UART: Running Caliptra FMC ...
20,451,186 UART:
20,451,357 UART: [state] CFI Enabled
20,459,682 UART: [fht] FMC Alias Private Key: 7
22,225,686 UART: [art] Extend RT PCRs Done
22,226,911 UART: [art] Lock RT PCRs Done
22,228,597 UART: [art] Populate DV Done
22,234,130 UART: [fht] FMC Alias Private Key: 7
22,235,676 UART: [art] Derive CDI
22,236,415 UART: [art] Store in slot 0x4
22,278,793 UART: [art] Derive Key Pair
22,279,797 UART: [art] Store priv key in slot 0x5
24,706,965 UART: [art] Derive Key Pair - Done
24,719,966 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,426,229 UART: [art] Erasing AUTHORITY.KEYID = 7
26,427,747 UART: [art] PUB.X = 78C87BA9B3BE3674F3F61C59472E1D0E8DB3017D3A15275BD438F5D57DBDDD67AD4CE0157BB3BDCAADF8B98461B09C47
26,435,083 UART: [art] PUB.Y = 4504F225EEA6F55057E56A217ABB684DBECBE96EF23DD12365E0EFBD61D34ECCAEB2A207E9ED4C2C1B22CEFF8B32548F
26,442,342 UART: [art] SIG.R = 7E04B3EC927A49090F8C4D7637F5E834D13D8847BB6BA88656FEFC0B71F18429DB8F5FDF4681687071B433024C79D7C6
26,449,804 UART: [art] SIG.S = 424587B61179158D3D5E3E6917EC6B289BE5E7A0A4BBC28D0641944BCDE7EC22963F781329299690B9F8C96BE0FEDABE
27,428,425 UART: Caliptra RT
27,429,137 UART: [state] CFI Enabled
27,562,487 UART: [rt] RT listening for mailbox commands...
27,565,329 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,720,653 UART: [rt]cmd =0x41544d4e, len=14344
32,290,080 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,756,674 ready_for_fw is high
3,757,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,141,980 >>> mbox cmd response: success
20,397,609 UART:
20,398,008 UART: Running Caliptra FMC ...
20,399,149 UART:
20,399,310 UART: [state] CFI Enabled
20,407,247 UART: [fht] FMC Alias Private Key: 7
22,174,159 UART: [art] Extend RT PCRs Done
22,175,386 UART: [art] Lock RT PCRs Done
22,177,232 UART: [art] Populate DV Done
22,182,580 UART: [fht] FMC Alias Private Key: 7
22,184,236 UART: [art] Derive CDI
22,185,056 UART: [art] Store in slot 0x4
22,227,776 UART: [art] Derive Key Pair
22,228,821 UART: [art] Store priv key in slot 0x5
24,655,923 UART: [art] Derive Key Pair - Done
24,668,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,375,256 UART: [art] Erasing AUTHORITY.KEYID = 7
26,376,794 UART: [art] PUB.X = 6796B2D933EEA949B935B7E6BD58EF6AFD05B60C7E761B112C5040F5240DFCB6DFE5FE4283FCCA7AD65ACDBFDD9E27F9
26,384,093 UART: [art] PUB.Y = 4807AC66EBC627ED73708FA5B325C1D7492AD354E0C9A93A83966B2170809ACFA64C7945D1519CA27DF242F5E053CE6C
26,391,368 UART: [art] SIG.R = DF2726B57FCCDF71F4061204CBD6C9C6307EC38648874676D1280CAA9336ED0003045BCE1959E30DCF468D55DE0EC0E8
26,398,744 UART: [art] SIG.S = 8BA30C99930456CA54A7F7A43915BB7EAAF236A513E691BC481BB261A2F5E96DA6334F21A251D64A42C5949E18FCF0A2
27,377,212 UART: Caliptra RT
27,377,907 UART: [state] CFI Enabled
27,511,052 UART: [rt] RT listening for mailbox commands...
27,513,375 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,668,984 UART: [rt]cmd =0x41544d4e, len=14344
32,233,879 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,275 UART: [kat] SHA2-256
882,206 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,321 UART: [kat] ++
886,473 UART: [kat] sha1
890,911 UART: [kat] SHA2-256
892,849 UART: [kat] SHA2-384
895,566 UART: [kat] SHA2-512-ACC
897,467 UART: [kat] ECC-384
903,080 UART: [kat] HMAC-384Kdf
907,462 UART: [kat] LMS
1,475,658 UART: [kat] --
1,476,335 UART: [cold-reset] ++
1,476,727 UART: [fht] Storing FHT @ 0x50003400
1,479,536 UART: [idev] ++
1,479,704 UART: [idev] CDI.KEYID = 6
1,480,064 UART: [idev] SUBJECT.KEYID = 7
1,480,488 UART: [idev] UDS.KEYID = 0
1,480,833 ready_for_fw is high
1,480,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,664 UART: [idev] Erasing UDS.KEYID = 0
1,505,100 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,602 UART: [idev] --
1,514,723 UART: [ldev] ++
1,514,891 UART: [ldev] CDI.KEYID = 6
1,515,254 UART: [ldev] SUBJECT.KEYID = 5
1,515,680 UART: [ldev] AUTHORITY.KEYID = 7
1,516,143 UART: [ldev] FE.KEYID = 1
1,521,225 UART: [ldev] Erasing FE.KEYID = 1
1,546,874 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,042 UART: [ldev] --
1,586,485 UART: [fwproc] Waiting for Commands...
1,587,158 UART: [fwproc] Received command 0x46574c44
1,587,949 UART: [fwproc] Received Image of size 118548 bytes
5,357,945 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,385,683 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,416,901 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,557,246 >>> mbox cmd response: success
5,558,308 UART: [afmc] ++
5,558,476 UART: [afmc] CDI.KEYID = 6
5,558,838 UART: [afmc] SUBJECT.KEYID = 7
5,559,263 UART: [afmc] AUTHORITY.KEYID = 5
5,593,942 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,610,106 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,610,886 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,616,592 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,622,471 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,628,184 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,636,093 UART: [afmc] --
5,637,043 UART: [cold-reset] --
5,637,945 UART: [state] Locking Datavault
5,639,036 UART: [state] Locking PCR0, PCR1 and PCR31
5,639,640 UART: [state] Locking ICCM
5,640,200 UART: [exit] Launching FMC @ 0x40000130
5,645,530 UART:
5,645,546 UART: Running Caliptra FMC ...
5,645,954 UART:
5,646,008 UART: [state] CFI Enabled
5,656,394 UART: [fht] FMC Alias Private Key: 7
5,775,542 UART: [art] Extend RT PCRs Done
5,775,970 UART: [art] Lock RT PCRs Done
5,777,406 UART: [art] Populate DV Done
5,785,909 UART: [fht] FMC Alias Private Key: 7
5,787,055 UART: [art] Derive CDI
5,787,335 UART: [art] Store in slot 0x4
5,873,181 UART: [art] Derive Key Pair
5,873,541 UART: [art] Store priv key in slot 0x5
5,886,628 UART: [art] Derive Key Pair - Done
5,901,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,916,872 UART: [art] Erasing AUTHORITY.KEYID = 7
5,917,637 UART: [art] PUB.X = 2F34796E88D8AAF2E3E57ADC97F162110AFEFE0C42554AC0529ED0CD7CA7A2EA4658800B74943FC385811755CAB15615
5,924,406 UART: [art] PUB.Y = EB9476B0316CE6AEF541D67553501115572D18E8150E6777528ADBAA6B9C515A9AF75CA60A7676D2C147951A2015F56A
5,931,348 UART: [art] SIG.R = 7F61B0147C5BBEF010C57384AA26483D1D31A1AF128958D5A629A2C470ACABA2667A7EE7FE49AEA78B4FA61E094357FE
5,938,129 UART: [art] SIG.S = F2C4417CD781067B01189A6C5D7DDD856F80D3E3665BEC52E6D0CD51E6E0A3B3CC5BFFC5F5FF5503BAF2550E5630D7C7
5,961,895 UART: Caliptra RT
5,962,146 UART: [state] CFI Enabled
6,082,222 UART: [rt] RT listening for mailbox commands...
6,082,892 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,205,876 UART: [rt]cmd =0x41544d4e, len=14344
9,670,817 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,871 ready_for_fw is high
1,362,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,330,152 >>> mbox cmd response: success
5,390,803 UART:
5,390,819 UART: Running Caliptra FMC ...
5,391,227 UART:
5,391,281 UART: [state] CFI Enabled
5,402,045 UART: [fht] FMC Alias Private Key: 7
5,520,989 UART: [art] Extend RT PCRs Done
5,521,417 UART: [art] Lock RT PCRs Done
5,522,829 UART: [art] Populate DV Done
5,531,288 UART: [fht] FMC Alias Private Key: 7
5,532,312 UART: [art] Derive CDI
5,532,592 UART: [art] Store in slot 0x4
5,618,172 UART: [art] Derive Key Pair
5,618,532 UART: [art] Store priv key in slot 0x5
5,631,267 UART: [art] Derive Key Pair - Done
5,646,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,661,368 UART: [art] Erasing AUTHORITY.KEYID = 7
5,662,133 UART: [art] PUB.X = 7A885FEF2D76C301A72D3C00C7C0440FD5EF468C94E03E749F048F08E5D7C083221D7E534213BFB18F1DDDD8F9B5E6F9
5,668,881 UART: [art] PUB.Y = 5B60B294568EB9ECB06F781A6126031BDC85F321668B0E794B541EDF44A6CB582E99259753FBF67A60F347F947F24C81
5,675,825 UART: [art] SIG.R = C070A2716AF6A579362B48673E2B2C7534E36BF8BE51150CBBE47E8AD4E4A23820241297FF4F73A8A96346EE0FB7FCC5
5,682,597 UART: [art] SIG.S = 0ED6E3AFE244F96F9EE66C17EFF8B26B0C0F663017E391C18491535C194A4D17B6A8C37639733E5113790BCE6E13A384
5,706,535 UART: Caliptra RT
5,706,786 UART: [state] CFI Enabled
5,826,038 UART: [rt] RT listening for mailbox commands...
5,826,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,949,618 UART: [rt]cmd =0x41544d4e, len=14344
9,452,347 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,112 UART: [kat] SHA2-256
882,043 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,158 UART: [kat] ++
886,310 UART: [kat] sha1
890,520 UART: [kat] SHA2-256
892,458 UART: [kat] SHA2-384
895,263 UART: [kat] SHA2-512-ACC
897,164 UART: [kat] ECC-384
902,429 UART: [kat] HMAC-384Kdf
906,953 UART: [kat] LMS
1,475,149 UART: [kat] --
1,475,794 UART: [cold-reset] ++
1,476,200 UART: [fht] Storing FHT @ 0x50003400
1,479,101 UART: [idev] ++
1,479,269 UART: [idev] CDI.KEYID = 6
1,479,629 UART: [idev] SUBJECT.KEYID = 7
1,480,053 UART: [idev] UDS.KEYID = 0
1,480,398 ready_for_fw is high
1,480,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,963 UART: [idev] Erasing UDS.KEYID = 0
1,504,361 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,887 UART: [idev] --
1,513,958 UART: [ldev] ++
1,514,126 UART: [ldev] CDI.KEYID = 6
1,514,489 UART: [ldev] SUBJECT.KEYID = 5
1,514,915 UART: [ldev] AUTHORITY.KEYID = 7
1,515,378 UART: [ldev] FE.KEYID = 1
1,520,626 UART: [ldev] Erasing FE.KEYID = 1
1,546,299 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,155 UART: [ldev] --
1,585,568 UART: [fwproc] Waiting for Commands...
1,586,279 UART: [fwproc] Received command 0x46574c44
1,587,070 UART: [fwproc] Received Image of size 118548 bytes
5,129,022 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,157,292 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,188,510 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,328,721 >>> mbox cmd response: success
5,329,817 UART: [afmc] ++
5,329,985 UART: [afmc] CDI.KEYID = 6
5,330,347 UART: [afmc] SUBJECT.KEYID = 7
5,330,772 UART: [afmc] AUTHORITY.KEYID = 5
5,366,453 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,382,539 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,383,319 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,389,025 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,394,904 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,400,617 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,408,546 UART: [afmc] --
5,409,516 UART: [cold-reset] --
5,410,046 UART: [state] Locking Datavault
5,411,093 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,697 UART: [state] Locking ICCM
5,412,351 UART: [exit] Launching FMC @ 0x40000130
5,417,681 UART:
5,417,697 UART: Running Caliptra FMC ...
5,418,105 UART:
5,418,248 UART: [state] CFI Enabled
5,428,466 UART: [fht] FMC Alias Private Key: 7
5,547,744 UART: [art] Extend RT PCRs Done
5,548,172 UART: [art] Lock RT PCRs Done
5,549,598 UART: [art] Populate DV Done
5,557,797 UART: [fht] FMC Alias Private Key: 7
5,558,957 UART: [art] Derive CDI
5,559,237 UART: [art] Store in slot 0x4
5,645,041 UART: [art] Derive Key Pair
5,645,401 UART: [art] Store priv key in slot 0x5
5,658,462 UART: [art] Derive Key Pair - Done
5,673,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,688,801 UART: [art] Erasing AUTHORITY.KEYID = 7
5,689,566 UART: [art] PUB.X = BC10C40C1664248AD5B33E496FF85E0B87E86117946B3EB3926BCED679C6C321BC6CFDF04B528985465BCA54C9BF8AC2
5,696,342 UART: [art] PUB.Y = 7C4F84825A4ABB9C4D06C1B281ABBF531FDA5B64D20B79C5BB2BA87EB8E301E989DF67D24F4AD8B8389C6274AAF76F5C
5,703,305 UART: [art] SIG.R = AFF27971276B177E2CB5227C0D9FD2D61F4DD39CA618E2341D63136746A44ED5ABD8A672F5C5337D9E629FA2DE5E3A4A
5,710,084 UART: [art] SIG.S = B2BF269E485C38BA25EC872C2FE2A14833AEE55A7A6DB8D7E504D9E7923AB84877EAA1C158FDB59A09276C35B0A2B7DE
5,733,830 UART: Caliptra RT
5,734,173 UART: [state] CFI Enabled
5,853,462 UART: [rt] RT listening for mailbox commands...
5,854,132 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,977,302 UART: [rt]cmd =0x41544d4e, len=14344
9,631,216 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,554 ready_for_fw is high
1,362,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,255,961 >>> mbox cmd response: success
5,317,450 UART:
5,317,466 UART: Running Caliptra FMC ...
5,317,874 UART:
5,318,017 UART: [state] CFI Enabled
5,328,415 UART: [fht] FMC Alias Private Key: 7
5,447,689 UART: [art] Extend RT PCRs Done
5,448,117 UART: [art] Lock RT PCRs Done
5,449,545 UART: [art] Populate DV Done
5,457,782 UART: [fht] FMC Alias Private Key: 7
5,458,754 UART: [art] Derive CDI
5,459,034 UART: [art] Store in slot 0x4
5,545,168 UART: [art] Derive Key Pair
5,545,528 UART: [art] Store priv key in slot 0x5
5,559,509 UART: [art] Derive Key Pair - Done
5,574,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,589,833 UART: [art] Erasing AUTHORITY.KEYID = 7
5,590,598 UART: [art] PUB.X = 4454596D99DFBFB867C0B1B629C01C37320E93F7BA96A24856D4954CDF47F76187659D7D762074D94B15C30606FFBCAF
5,597,361 UART: [art] PUB.Y = 9FD772E95D06089F778613FE36092CB96220D1DF18E0F416A92F154815ECA91D1318F7490A7DAB9AA97298B2BE5535E3
5,604,299 UART: [art] SIG.R = ECC8BF33F03120FABB59DA8DB9FBEC51CF89442253B05264567D4561C8F10690C90C4534413FBC4D240DC420BAD95794
5,611,068 UART: [art] SIG.S = 75814619092B0FED0B8CB3A296DFC60C071B32C78802D03632E27C9EBA7E29FF5B5B0ECE356889D9EAE293681FA1CD4B
5,634,353 UART: Caliptra RT
5,634,696 UART: [state] CFI Enabled
5,755,230 UART: [rt] RT listening for mailbox commands...
5,755,900 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,879,034 UART: [rt]cmd =0x41544d4e, len=14344
9,457,143 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,962 UART: [kat] SHA2-256
901,902 UART: [kat] SHA2-384
904,699 UART: [kat] SHA2-512-ACC
906,600 UART: [kat] ECC-384
916,607 UART: [kat] HMAC-384Kdf
921,305 UART: [kat] LMS
1,169,617 UART: [kat] --
1,170,696 UART: [cold-reset] ++
1,171,048 UART: [fht] FHT @ 0x50003400
1,173,756 UART: [idev] ++
1,173,924 UART: [idev] CDI.KEYID = 6
1,174,285 UART: [idev] SUBJECT.KEYID = 7
1,174,710 UART: [idev] UDS.KEYID = 0
1,175,056 ready_for_fw is high
1,175,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,621 UART: [idev] Erasing UDS.KEYID = 0
1,199,377 UART: [idev] Sha1 KeyId Algorithm
1,208,195 UART: [idev] --
1,209,366 UART: [ldev] ++
1,209,534 UART: [ldev] CDI.KEYID = 6
1,209,898 UART: [ldev] SUBJECT.KEYID = 5
1,210,325 UART: [ldev] AUTHORITY.KEYID = 7
1,210,788 UART: [ldev] FE.KEYID = 1
1,215,924 UART: [ldev] Erasing FE.KEYID = 1
1,242,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,882 UART: [ldev] --
1,281,285 UART: [fwproc] Wait for Commands...
1,282,098 UART: [fwproc] Recv command 0x46574c44
1,282,831 UART: [fwproc] Recv'd Img size: 118548 bytes
3,163,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,191,939 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,223,114 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,363,517 >>> mbox cmd response: success
3,364,709 UART: [afmc] ++
3,364,877 UART: [afmc] CDI.KEYID = 6
3,365,240 UART: [afmc] SUBJECT.KEYID = 7
3,365,666 UART: [afmc] AUTHORITY.KEYID = 5
3,401,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,417,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,418,173 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,423,880 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,429,757 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,435,467 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,443,163 UART: [afmc] --
3,444,116 UART: [cold-reset] --
3,444,776 UART: [state] Locking Datavault
3,445,865 UART: [state] Locking PCR0, PCR1 and PCR31
3,446,469 UART: [state] Locking ICCM
3,447,007 UART: [exit] Launching FMC @ 0x40000130
3,452,337 UART:
3,452,353 UART: Running Caliptra FMC ...
3,452,761 UART:
3,452,815 UART: [state] CFI Enabled
3,463,563 UART: [fht] FMC Alias Private Key: 7
3,582,129 UART: [art] Extend RT PCRs Done
3,582,557 UART: [art] Lock RT PCRs Done
3,584,027 UART: [art] Populate DV Done
3,592,206 UART: [fht] FMC Alias Private Key: 7
3,593,354 UART: [art] Derive CDI
3,593,634 UART: [art] Store in slot 0x4
3,679,625 UART: [art] Derive Key Pair
3,679,985 UART: [art] Store priv key in slot 0x5
3,693,507 UART: [art] Derive Key Pair - Done
3,708,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,723,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,724,704 UART: [art] PUB.X = 9CDA84391EDE93861038F5F88134FAAEBFE7D6C92DBBAD39B37061DD5C966C097731F80ECCCE1B647A2893FC0807F746
3,731,476 UART: [art] PUB.Y = 5F6D1E7966AE676C393BA1A56E1D832631A1545D8A16A1B22DFDE15E9434364C66D216AD7FDB252E90384FB3BFEAEC52
3,738,438 UART: [art] SIG.R = DC3F36657773571D747302342AFC53E86FB378F9C126DCFA1875B3C2BA0BC3BBA084E4C6D668D4ADAFD198762F750FA5
3,745,211 UART: [art] SIG.S = BE8D0F8DFEA9DB0FCAA32B81856B676569BE83A26924B44BF3D4B9F8636B3741EB46EBC922CFF2538EE8DDE2AF8AE32D
3,769,139 UART: Caliptra RT
3,769,390 UART: [state] CFI Enabled
3,890,059 UART: [rt] RT listening for mailbox commands...
3,890,729 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,805 UART: [rt]cmd =0x41544d4e, len=14344
4,975,447 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,390 ready_for_fw is high
1,059,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,949 >>> mbox cmd response: success
3,286,012 UART:
3,286,028 UART: Running Caliptra FMC ...
3,286,436 UART:
3,286,490 UART: [state] CFI Enabled
3,297,016 UART: [fht] FMC Alias Private Key: 7
3,415,542 UART: [art] Extend RT PCRs Done
3,415,970 UART: [art] Lock RT PCRs Done
3,417,658 UART: [art] Populate DV Done
3,425,845 UART: [fht] FMC Alias Private Key: 7
3,427,003 UART: [art] Derive CDI
3,427,283 UART: [art] Store in slot 0x4
3,513,252 UART: [art] Derive Key Pair
3,513,612 UART: [art] Store priv key in slot 0x5
3,526,980 UART: [art] Derive Key Pair - Done
3,541,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,557,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,770 UART: [art] PUB.X = D8F3D89FAB57D5FC1B0E63CCF567CD5D721CF9F5E43F266F18D68DC32113A885D055D22E9AEA451D56A3BB1E379C2125
3,564,553 UART: [art] PUB.Y = 173F739E8635C003EA47506CAFCE475F2D0180ADD5BA58986FF60FAF670A8E4A81846360285B264700B1541649EF34ED
3,571,469 UART: [art] SIG.R = 1909EBD6D5124DFCD32CB6DB767CF5D466213A817868B6AE69EF00ACC5BBCBD8F312908E8D03880A6E9D7BD905343DF4
3,578,221 UART: [art] SIG.S = E3092D86C28E2784422CDC3529D3EAA69C517D3A4D8798B8C1A0E752DD7758C4BE8CEEF52473257B98EF61E861FD8A51
3,602,092 UART: Caliptra RT
3,602,343 UART: [state] CFI Enabled
3,722,071 UART: [rt] RT listening for mailbox commands...
3,722,741 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,951 UART: [rt]cmd =0x41544d4e, len=14344
4,815,586 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,783 UART: [kat] ++
895,935 UART: [kat] sha1
900,279 UART: [kat] SHA2-256
902,219 UART: [kat] SHA2-384
904,938 UART: [kat] SHA2-512-ACC
906,839 UART: [kat] ECC-384
916,128 UART: [kat] HMAC-384Kdf
920,688 UART: [kat] LMS
1,169,000 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,617 UART: [fht] FHT @ 0x50003400
1,173,149 UART: [idev] ++
1,173,317 UART: [idev] CDI.KEYID = 6
1,173,678 UART: [idev] SUBJECT.KEYID = 7
1,174,103 UART: [idev] UDS.KEYID = 0
1,174,449 ready_for_fw is high
1,174,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,082 UART: [idev] Erasing UDS.KEYID = 0
1,199,510 UART: [idev] Sha1 KeyId Algorithm
1,208,376 UART: [idev] --
1,209,411 UART: [ldev] ++
1,209,579 UART: [ldev] CDI.KEYID = 6
1,209,943 UART: [ldev] SUBJECT.KEYID = 5
1,210,370 UART: [ldev] AUTHORITY.KEYID = 7
1,210,833 UART: [ldev] FE.KEYID = 1
1,216,021 UART: [ldev] Erasing FE.KEYID = 1
1,242,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,523 UART: [ldev] --
1,281,916 UART: [fwproc] Wait for Commands...
1,282,591 UART: [fwproc] Recv command 0x46574c44
1,283,324 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,912 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,229,087 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,348 >>> mbox cmd response: success
3,370,560 UART: [afmc] ++
3,370,728 UART: [afmc] CDI.KEYID = 6
3,371,091 UART: [afmc] SUBJECT.KEYID = 7
3,371,517 UART: [afmc] AUTHORITY.KEYID = 5
3,407,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,624 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,331 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,436,208 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,441,918 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,449,842 UART: [afmc] --
3,450,895 UART: [cold-reset] --
3,451,863 UART: [state] Locking Datavault
3,453,254 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,858 UART: [state] Locking ICCM
3,454,334 UART: [exit] Launching FMC @ 0x40000130
3,459,664 UART:
3,459,680 UART: Running Caliptra FMC ...
3,460,088 UART:
3,460,231 UART: [state] CFI Enabled
3,471,005 UART: [fht] FMC Alias Private Key: 7
3,590,103 UART: [art] Extend RT PCRs Done
3,590,531 UART: [art] Lock RT PCRs Done
3,592,129 UART: [art] Populate DV Done
3,600,456 UART: [fht] FMC Alias Private Key: 7
3,601,606 UART: [art] Derive CDI
3,601,886 UART: [art] Store in slot 0x4
3,688,151 UART: [art] Derive Key Pair
3,688,511 UART: [art] Store priv key in slot 0x5
3,702,237 UART: [art] Derive Key Pair - Done
3,716,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,541 UART: [art] PUB.X = 4E15A6FADB88F05604AB603FA75F91803986E0097A12D1D463E143168AD691E1610680590DB7312868855681E96C954B
3,739,287 UART: [art] PUB.Y = D97F19260395EBA101C7AE0E59C434C18F474704B7A1DD69D4B3CA6C4E0E1D4D1A3E0C8F127467CDA7D3FDC7CAB537CC
3,746,239 UART: [art] SIG.R = B4B4C4AC640F12F1EB8BD19B3A6C3A4F16691803CFED3449136C0332C731228D079F746013E07DA4BA361D15AB42D0EE
3,753,005 UART: [art] SIG.S = 789A1677E65820C4C31883C915EBB2ED4C734499B759ED8ACD17838F6BBE9C540251261D8512F32C6FF7F08EFA53FB71
3,776,996 UART: Caliptra RT
3,777,339 UART: [state] CFI Enabled
3,896,843 UART: [rt] RT listening for mailbox commands...
3,897,513 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,681 UART: [rt]cmd =0x41544d4e, len=14344
4,974,014 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,635 ready_for_fw is high
1,059,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,077 >>> mbox cmd response: success
3,283,326 UART:
3,283,342 UART: Running Caliptra FMC ...
3,283,750 UART:
3,283,893 UART: [state] CFI Enabled
3,294,687 UART: [fht] FMC Alias Private Key: 7
3,414,531 UART: [art] Extend RT PCRs Done
3,414,959 UART: [art] Lock RT PCRs Done
3,416,529 UART: [art] Populate DV Done
3,424,572 UART: [fht] FMC Alias Private Key: 7
3,425,654 UART: [art] Derive CDI
3,425,934 UART: [art] Store in slot 0x4
3,511,781 UART: [art] Derive Key Pair
3,512,141 UART: [art] Store priv key in slot 0x5
3,525,739 UART: [art] Derive Key Pair - Done
3,540,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,846 UART: [art] PUB.X = 6C64E32A159F412E51EAA57B4A06C8BB501DAF6E2AACA7F2844748701451DDA125AE1EE783ABC9E6889D166EB17E905E
3,563,627 UART: [art] PUB.Y = 8819F1D1E4B49E7559674A6B15C72BCF74E68069FF86B3E50BAF5B449993DF777F65D254C0FAD2BA49B4469FF2C5D3EB
3,570,586 UART: [art] SIG.R = 64E80745B765504CE80ED01D303DBA7EA39848591B4291BC0538CF0BBAEC4DFDA599937DAAF53467DADC9145FEF81D3F
3,577,360 UART: [art] SIG.S = 4863FB4A64E89D867A1326EB4CB759F8A220516DC29599167E90DAB47DDCBFC67CE8809EA0F2FFF9C64DB876AEA3464A
3,600,902 UART: Caliptra RT
3,601,245 UART: [state] CFI Enabled
3,721,201 UART: [rt] RT listening for mailbox commands...
3,721,871 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,207 UART: [rt]cmd =0x41544d4e, len=14344
4,807,261 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
893,180 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,305 UART: [kat] ++
897,457 UART: [kat] sha1
901,757 UART: [kat] SHA2-256
903,697 UART: [kat] SHA2-384
906,458 UART: [kat] SHA2-512-ACC
908,359 UART: [kat] ECC-384
918,036 UART: [kat] HMAC-384Kdf
922,704 UART: [kat] LMS
1,171,032 UART: [kat] --
1,171,839 UART: [cold-reset] ++
1,172,239 UART: [fht] FHT @ 0x50003400
1,175,024 UART: [idev] ++
1,175,192 UART: [idev] CDI.KEYID = 6
1,175,552 UART: [idev] SUBJECT.KEYID = 7
1,175,976 UART: [idev] UDS.KEYID = 0
1,176,321 ready_for_fw is high
1,176,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,036 UART: [idev] Erasing UDS.KEYID = 0
1,201,189 UART: [idev] Sha1 KeyId Algorithm
1,209,467 UART: [idev] --
1,210,451 UART: [ldev] ++
1,210,619 UART: [ldev] CDI.KEYID = 6
1,210,982 UART: [ldev] SUBJECT.KEYID = 5
1,211,408 UART: [ldev] AUTHORITY.KEYID = 7
1,211,871 UART: [ldev] FE.KEYID = 1
1,217,101 UART: [ldev] Erasing FE.KEYID = 1
1,243,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,791 UART: [ldev] --
1,282,108 UART: [fwproc] Wait for Commands...
1,282,768 UART: [fwproc] Recv command 0x46574c44
1,283,496 UART: [fwproc] Recv'd Img size: 118548 bytes
3,162,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,190,532 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,221,702 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,361,875 >>> mbox cmd response: success
3,362,961 UART: [afmc] ++
3,363,129 UART: [afmc] CDI.KEYID = 6
3,363,491 UART: [afmc] SUBJECT.KEYID = 7
3,363,916 UART: [afmc] AUTHORITY.KEYID = 5
3,399,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,415,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,416,498 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,422,204 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,428,083 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,433,793 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,441,594 UART: [afmc] --
3,442,554 UART: [cold-reset] --
3,443,328 UART: [state] Locking Datavault
3,444,693 UART: [state] Locking PCR0, PCR1 and PCR31
3,445,297 UART: [state] Locking ICCM
3,445,859 UART: [exit] Launching FMC @ 0x40000130
3,451,189 UART:
3,451,205 UART: Running Caliptra FMC ...
3,451,613 UART:
3,451,667 UART: [state] CFI Enabled
3,462,167 UART: [fht] FMC Alias Private Key: 7
3,580,773 UART: [art] Extend RT PCRs Done
3,581,201 UART: [art] Lock RT PCRs Done
3,582,543 UART: [art] Populate DV Done
3,590,932 UART: [fht] FMC Alias Private Key: 7
3,591,878 UART: [art] Derive CDI
3,592,158 UART: [art] Store in slot 0x4
3,677,667 UART: [art] Derive Key Pair
3,678,027 UART: [art] Store priv key in slot 0x5
3,691,503 UART: [art] Derive Key Pair - Done
3,706,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,721,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,722,177 UART: [art] PUB.X = DD769C9DF225206C4B1A2E459F0DB9189FDA9F854B38E5F153823F711366B1AB15424362816F6BBE1946DBD15D788228
3,728,944 UART: [art] PUB.Y = 10CC0817DA3CC64BDE9605670809D18EAB6E73C6FA9F771AB9F9C8AD420C946D4C734EADC6CDD5D9611AC3B5EB499920
3,735,897 UART: [art] SIG.R = 6BE08964140DB426F5A0673F5684FAAF23793B0687AB8E96630988668A870C70E7186E5670D356F008B48C5064CB2D22
3,742,642 UART: [art] SIG.S = 23E75F8FF11C79E6517784B089162DCD05121A90CB8B354F2E36203ECCC63AD869DBFD9C3BFB311C0869433A0C57BDEC
3,766,417 UART: Caliptra RT
3,766,668 UART: [state] CFI Enabled
3,886,812 UART: [rt] RT listening for mailbox commands...
3,887,482 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,438 UART: [rt]cmd =0x41544d4e, len=14344
4,958,897 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,331 ready_for_fw is high
1,060,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,233,948 >>> mbox cmd response: success
3,296,905 UART:
3,296,921 UART: Running Caliptra FMC ...
3,297,329 UART:
3,297,383 UART: [state] CFI Enabled
3,307,929 UART: [fht] FMC Alias Private Key: 7
3,427,273 UART: [art] Extend RT PCRs Done
3,427,701 UART: [art] Lock RT PCRs Done
3,429,229 UART: [art] Populate DV Done
3,437,334 UART: [fht] FMC Alias Private Key: 7
3,438,268 UART: [art] Derive CDI
3,438,548 UART: [art] Store in slot 0x4
3,524,723 UART: [art] Derive Key Pair
3,525,083 UART: [art] Store priv key in slot 0x5
3,537,823 UART: [art] Derive Key Pair - Done
3,552,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,567,820 UART: [art] Erasing AUTHORITY.KEYID = 7
3,568,585 UART: [art] PUB.X = D925DA8624F3A82D3B27657BA966DE3E2036C730AD921247B6D498F1284B8C54B7C92E437F5CAE875EA9DAE74D50CB73
3,575,363 UART: [art] PUB.Y = D70A70D0A9C1B37A3F726F07E8BCFD5E7BDB6741DF7482D7CE8C8B6D361DF09337962C42548724759CF464085347B8D9
3,582,308 UART: [art] SIG.R = D648BED1215A350A8F92E6AD22AC1CEC2130B365A2E210CDA778A5D257C2FEA25E5F043B2ACEFE1716990F577B443724
3,589,081 UART: [art] SIG.S = 9D8308CDF4C2B084810EF12911030F986BF10DDF7248616CF68CF898053FA255769FBFC8A494A4348C405CB56E35156B
3,613,079 UART: Caliptra RT
3,613,330 UART: [state] CFI Enabled
3,732,437 UART: [rt] RT listening for mailbox commands...
3,733,107 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,195 UART: [rt]cmd =0x41544d4e, len=14344
4,828,597 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
87,054 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
893,913 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,038 UART: [kat] ++
898,190 UART: [kat] sha1
902,540 UART: [kat] SHA2-256
904,480 UART: [kat] SHA2-384
907,343 UART: [kat] SHA2-512-ACC
909,244 UART: [kat] ECC-384
918,631 UART: [kat] HMAC-384Kdf
923,389 UART: [kat] LMS
1,171,717 UART: [kat] --
1,172,492 UART: [cold-reset] ++
1,172,906 UART: [fht] FHT @ 0x50003400
1,175,517 UART: [idev] ++
1,175,685 UART: [idev] CDI.KEYID = 6
1,176,045 UART: [idev] SUBJECT.KEYID = 7
1,176,469 UART: [idev] UDS.KEYID = 0
1,176,814 ready_for_fw is high
1,176,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,569 UART: [idev] Erasing UDS.KEYID = 0
1,201,312 UART: [idev] Sha1 KeyId Algorithm
1,209,868 UART: [idev] --
1,211,014 UART: [ldev] ++
1,211,182 UART: [ldev] CDI.KEYID = 6
1,211,545 UART: [ldev] SUBJECT.KEYID = 5
1,211,971 UART: [ldev] AUTHORITY.KEYID = 7
1,212,434 UART: [ldev] FE.KEYID = 1
1,217,796 UART: [ldev] Erasing FE.KEYID = 1
1,243,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,998 UART: [ldev] --
1,283,387 UART: [fwproc] Wait for Commands...
1,284,077 UART: [fwproc] Recv command 0x46574c44
1,284,805 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,981 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,151 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,372,306 >>> mbox cmd response: success
3,373,442 UART: [afmc] ++
3,373,610 UART: [afmc] CDI.KEYID = 6
3,373,972 UART: [afmc] SUBJECT.KEYID = 7
3,374,397 UART: [afmc] AUTHORITY.KEYID = 5
3,410,270 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,985 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,691 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,570 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,280 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,897 UART: [afmc] --
3,453,973 UART: [cold-reset] --
3,454,945 UART: [state] Locking Datavault
3,456,146 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,750 UART: [state] Locking ICCM
3,457,316 UART: [exit] Launching FMC @ 0x40000130
3,462,646 UART:
3,462,662 UART: Running Caliptra FMC ...
3,463,070 UART:
3,463,213 UART: [state] CFI Enabled
3,473,479 UART: [fht] FMC Alias Private Key: 7
3,593,129 UART: [art] Extend RT PCRs Done
3,593,557 UART: [art] Lock RT PCRs Done
3,594,793 UART: [art] Populate DV Done
3,603,184 UART: [fht] FMC Alias Private Key: 7
3,604,272 UART: [art] Derive CDI
3,604,552 UART: [art] Store in slot 0x4
3,690,237 UART: [art] Derive Key Pair
3,690,597 UART: [art] Store priv key in slot 0x5
3,703,565 UART: [art] Derive Key Pair - Done
3,718,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,950 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,715 UART: [art] PUB.X = 6C7F5B710DD68929816C50BC67C3FBCC93DC53BA9B82B1ABDD513069715DFCB6395037C23D5A0624E888DCBACF251FD4
3,740,495 UART: [art] PUB.Y = 701AFD5EA7D4BDBFE89A4C1308FDBCA6F401185733E3EAD8E900782F01A276E296426485678D64A7FC98E20E2E974DDF
3,747,423 UART: [art] SIG.R = B45FEE75E48B020D08163345D570CFB1A0675A57E967E4B47F65277F4EFA1E19B0EE10588761D45AE244723251C09062
3,754,180 UART: [art] SIG.S = AB889196A1DFDF54A1A19D6FCE71BC267DF692AD749DCD2F01954AA7F6A9E3576B787BDE13CB500EF7AF42682FA78894
3,777,948 UART: Caliptra RT
3,778,291 UART: [state] CFI Enabled
3,898,328 UART: [rt] RT listening for mailbox commands...
3,898,998 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,034 UART: [rt]cmd =0x41544d4e, len=14344
4,981,791 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,712 ready_for_fw is high
1,060,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,681 >>> mbox cmd response: success
3,286,312 UART:
3,286,328 UART: Running Caliptra FMC ...
3,286,736 UART:
3,286,879 UART: [state] CFI Enabled
3,297,651 UART: [fht] FMC Alias Private Key: 7
3,416,397 UART: [art] Extend RT PCRs Done
3,416,825 UART: [art] Lock RT PCRs Done
3,418,285 UART: [art] Populate DV Done
3,426,580 UART: [fht] FMC Alias Private Key: 7
3,427,726 UART: [art] Derive CDI
3,428,006 UART: [art] Store in slot 0x4
3,513,793 UART: [art] Derive Key Pair
3,514,153 UART: [art] Store priv key in slot 0x5
3,527,501 UART: [art] Derive Key Pair - Done
3,542,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,558,780 UART: [art] PUB.X = BE7E3B6D33FB5EAE4CE4718B2749951552576A580A83DCDDCC2C03B92E0289915121E05AB55BE622AC9C696E64B6021A
3,565,546 UART: [art] PUB.Y = 4F6A8E46A22270D8CD04018E16F3BFAA4D56C0989D3960DE9A738D01A4984D9E3190B15176471E5EA083C78F6DCE442F
3,572,491 UART: [art] SIG.R = 67137924948BD7B1CF965F3DA06B50BDBAA6444B746201A028B3306720F18516F5D7EAC020AC53E8826A7DDEB7BCED34
3,579,266 UART: [art] SIG.S = EFA5B01B497A4DD442D49EBA913B975DF15FC5A6400A0DB99B3877B376D0BE55F14973F891C46824E1963C7A712977CC
3,603,860 UART: Caliptra RT
3,604,203 UART: [state] CFI Enabled
3,724,547 UART: [rt] RT listening for mailbox commands...
3,725,217 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,395 UART: [rt]cmd =0x41544d4e, len=14344
4,802,326 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,021 UART:
192,378 UART: Running Caliptra ROM ...
193,514 UART:
193,665 UART: [state] CFI Enabled
268,489 UART: [state] LifecycleState = Unprovisioned
270,421 UART: [state] DebugLocked = No
272,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,392 UART: [kat] SHA2-256
447,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,591 UART: [kat] ++
458,192 UART: [kat] sha1
469,216 UART: [kat] SHA2-256
471,933 UART: [kat] SHA2-384
478,627 UART: [kat] SHA2-512-ACC
481,015 UART: [kat] ECC-384
2,770,243 UART: [kat] HMAC-384Kdf
2,801,874 UART: [kat] LMS
3,992,185 UART: [kat] --
3,996,118 UART: [cold-reset] ++
3,997,552 UART: [fht] Storing FHT @ 0x50003400
4,009,102 UART: [idev] ++
4,009,669 UART: [idev] CDI.KEYID = 6
4,010,597 UART: [idev] SUBJECT.KEYID = 7
4,011,845 UART: [idev] UDS.KEYID = 0
4,012,916 ready_for_fw is high
4,013,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,214 UART: [idev] Erasing UDS.KEYID = 0
7,349,504 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,257 UART: [idev] --
7,374,772 UART: [ldev] ++
7,375,401 UART: [ldev] CDI.KEYID = 6
7,376,320 UART: [ldev] SUBJECT.KEYID = 5
7,377,483 UART: [ldev] AUTHORITY.KEYID = 7
7,378,770 UART: [ldev] FE.KEYID = 1
7,424,469 UART: [ldev] Erasing FE.KEYID = 1
10,757,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,137 UART: [ldev] --
13,138,573 UART: [fwproc] Waiting for Commands...
13,140,952 UART: [fwproc] Received command 0x46574c44
13,143,144 UART: [fwproc] Received Image of size 118548 bytes
17,250,010 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,330,005 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,403,178 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,731,978 >>> mbox cmd response: success
17,736,783 UART: [afmc] ++
17,737,452 UART: [afmc] CDI.KEYID = 6
17,738,365 UART: [afmc] SUBJECT.KEYID = 7
17,739,578 UART: [afmc] AUTHORITY.KEYID = 5
21,111,692 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,412,120 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,414,382 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,428,830 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,443,583 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,458,007 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,479,566 UART: [afmc] --
23,484,187 UART: [cold-reset] --
23,487,508 UART: [state] Locking Datavault
23,491,456 UART: [state] Locking PCR0, PCR1 and PCR31
23,493,226 UART: [state] Locking ICCM
23,494,861 UART: [exit] Launching FMC @ 0x40000130
23,503,249 UART:
23,503,481 UART: Running Caliptra FMC ...
23,504,580 UART:
23,504,738 UART: [state] CFI Enabled
23,571,555 UART: [fht] FMC Alias Private Key: 7
25,912,247 UART: [art] Extend RT PCRs Done
25,913,464 UART: [art] Lock RT PCRs Done
25,914,858 UART: [art] Populate DV Done
25,920,003 UART: [fht] FMC Alias Private Key: 7
25,921,654 UART: [art] Derive CDI
25,922,388 UART: [art] Store in slot 0x4
25,979,262 UART: [art] Derive Key Pair
25,980,299 UART: [art] Store priv key in slot 0x5
29,272,863 UART: [art] Derive Key Pair - Done
29,285,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,574,462 UART: [art] Erasing AUTHORITY.KEYID = 7
31,575,965 UART: [art] PUB.X = D5AC597C49E214DE9E7E208204BC748D5E602055EBCDB2D41FF72906B0260E30E2ABDCEBD7CEF12F7BAF27FC3C4E0EA9
31,583,276 UART: [art] PUB.Y = AFFBD07646D831A238E6D43B500A9F13B75CF3B1A6D62615F98A83E999F351FF33FCD7887D9B4068FA95F5118E7EAD3E
31,590,522 UART: [art] SIG.R = 5AC5CAA90E564BE6A6B4F881702984B815EBF5C65EA5F1D86CBEEE5D553329EB7E1AF84A50898EFA9936A45689038D36
31,597,926 UART: [art] SIG.S = E4E19592E34B5AFE2C1DAA15D7D0BC551B462BDF5C41906DB1F15D2016B6481FCD82001C8CD7136B968F93B02C146A5B
32,903,176 UART: Caliptra RT
32,903,883 UART: [state] CFI Enabled
33,080,591 UART: [rt] RT listening for mailbox commands...
33,082,901 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,238,311 UART: [rt]cmd =0x41544d4e, len=14344
38,538,822 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,784,249 ready_for_fw is high
3,784,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,966,479 >>> mbox cmd response: success
23,668,254 UART:
23,668,660 UART: Running Caliptra FMC ...
23,669,781 UART:
23,669,970 UART: [state] CFI Enabled
23,739,055 UART: [fht] FMC Alias Private Key: 7
26,079,293 UART: [art] Extend RT PCRs Done
26,080,648 UART: [art] Lock RT PCRs Done
26,082,092 UART: [art] Populate DV Done
26,087,708 UART: [fht] FMC Alias Private Key: 7
26,089,416 UART: [art] Derive CDI
26,090,233 UART: [art] Store in slot 0x4
26,148,203 UART: [art] Derive Key Pair
26,149,245 UART: [art] Store priv key in slot 0x5
29,442,208 UART: [art] Derive Key Pair - Done
29,454,745 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,139 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,655 UART: [art] PUB.X = 05D84D424DB2B220E4107154B96028112C5A567F2DC90EEE2BAEFBE635433E19E9F26A8B50963D8E781E469C537CB452
31,752,914 UART: [art] PUB.Y = C9477A8E8AAD6CE06651C57426F43291C31BC48831FA9E140F213DCF128B08ADCFF16A7CB6AE8A2EFB2378CB84C3CB69
31,760,192 UART: [art] SIG.R = DA1E3061791E1EF68BAB6AFC100065011607D2EB3A9E895A4FEAA6E54A5A45F4B036EF2FF2FC25A92BF117BBB78F6D2A
31,767,620 UART: [art] SIG.S = ECADAE06C42ADDFE627C63FD631621B0B6F5FAC1509F4B1E9EE356BE97D6BA42DAAEDC6DD8E3C252449DA4396801CF07
33,072,875 UART: Caliptra RT
33,073,590 UART: [state] CFI Enabled
33,250,605 UART: [rt] RT listening for mailbox commands...
33,252,951 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,407,948 UART: [rt]cmd =0x41544d4e, len=14344
38,708,497 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,547 writing to cptra_bootfsm_go
192,721 UART:
193,075 UART: Running Caliptra ROM ...
194,254 UART:
604,026 UART: [state] CFI Enabled
618,348 UART: [state] LifecycleState = Unprovisioned
620,254 UART: [state] DebugLocked = No
622,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,337 UART: [kat] SHA2-256
797,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,647 UART: [kat] ++
808,097 UART: [kat] sha1
820,317 UART: [kat] SHA2-256
823,033 UART: [kat] SHA2-384
829,293 UART: [kat] SHA2-512-ACC
831,658 UART: [kat] ECC-384
3,116,862 UART: [kat] HMAC-384Kdf
3,129,563 UART: [kat] LMS
4,319,714 UART: [kat] --
4,324,968 UART: [cold-reset] ++
4,326,118 UART: [fht] Storing FHT @ 0x50003400
4,338,009 UART: [idev] ++
4,338,581 UART: [idev] CDI.KEYID = 6
4,339,608 UART: [idev] SUBJECT.KEYID = 7
4,340,778 UART: [idev] UDS.KEYID = 0
4,341,927 ready_for_fw is high
4,342,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,128 UART: [idev] Erasing UDS.KEYID = 0
7,624,321 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,366 UART: [idev] --
7,649,791 UART: [ldev] ++
7,650,553 UART: [ldev] CDI.KEYID = 6
7,651,473 UART: [ldev] SUBJECT.KEYID = 5
7,652,568 UART: [ldev] AUTHORITY.KEYID = 7
7,653,789 UART: [ldev] FE.KEYID = 1
7,666,423 UART: [ldev] Erasing FE.KEYID = 1
10,955,390 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,953 UART: [ldev] --
13,314,130 UART: [fwproc] Waiting for Commands...
13,316,104 UART: [fwproc] Received command 0x46574c44
13,318,334 UART: [fwproc] Received Image of size 118548 bytes
17,411,567 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,491,515 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,564,689 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,012 >>> mbox cmd response: success
17,897,551 UART: [afmc] ++
17,898,181 UART: [afmc] CDI.KEYID = 6
17,899,065 UART: [afmc] SUBJECT.KEYID = 7
17,900,339 UART: [afmc] AUTHORITY.KEYID = 5
21,214,030 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,508,498 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,754 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,525,191 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,539,908 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,554,320 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,575,246 UART: [afmc] --
23,578,457 UART: [cold-reset] --
23,580,432 UART: [state] Locking Datavault
23,585,796 UART: [state] Locking PCR0, PCR1 and PCR31
23,587,543 UART: [state] Locking ICCM
23,589,987 UART: [exit] Launching FMC @ 0x40000130
23,598,375 UART:
23,598,608 UART: Running Caliptra FMC ...
23,599,705 UART:
23,599,859 UART: [state] CFI Enabled
23,608,113 UART: [fht] FMC Alias Private Key: 7
25,947,907 UART: [art] Extend RT PCRs Done
25,949,128 UART: [art] Lock RT PCRs Done
25,951,181 UART: [art] Populate DV Done
25,956,664 UART: [fht] FMC Alias Private Key: 7
25,958,201 UART: [art] Derive CDI
25,959,011 UART: [art] Store in slot 0x4
26,001,768 UART: [art] Derive Key Pair
26,002,814 UART: [art] Store priv key in slot 0x5
29,244,250 UART: [art] Derive Key Pair - Done
29,257,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,783 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,281 UART: [art] PUB.X = 22261229FD868498D7966D4467730CA0555C3305BBD03CC217CD24CAD126AD2390DDBF2DD80FE10DEC72E8A31A4B05B0
31,546,591 UART: [art] PUB.Y = DA8B464B725D22BE676CFFEF84AFFB68B51287507F9C94FC9FED06A1BE211AC9A60E30FFD1A743028D11E7D2A87FBA47
31,553,835 UART: [art] SIG.R = AC01B975A843B91CB8BA59F6CFDECFEE8045F0FACC542A7E756EFCFE1B21230C1DCEB5A4561FF5E5B07D14D5C2D5F9F4
31,561,277 UART: [art] SIG.S = 63F2FBCF7EB631154D86300B08F139271C910D28F97F3210AA3701E3DC26E21B27DCED918CC1DF76FB29407B88522A4F
32,866,486 UART: Caliptra RT
32,867,185 UART: [state] CFI Enabled
33,000,447 UART: [rt] RT listening for mailbox commands...
33,002,759 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,158,294 UART: [rt]cmd =0x41544d4e, len=14344
38,458,798 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
4,126,750 ready_for_fw is high
4,127,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,957 >>> mbox cmd response: success
23,805,754 UART:
23,806,167 UART: Running Caliptra FMC ...
23,807,284 UART:
23,807,434 UART: [state] CFI Enabled
23,815,054 UART: [fht] FMC Alias Private Key: 7
26,155,503 UART: [art] Extend RT PCRs Done
26,156,729 UART: [art] Lock RT PCRs Done
26,157,962 UART: [art] Populate DV Done
26,163,423 UART: [fht] FMC Alias Private Key: 7
26,165,013 UART: [art] Derive CDI
26,165,846 UART: [art] Store in slot 0x4
26,208,451 UART: [art] Derive Key Pair
26,209,492 UART: [art] Store priv key in slot 0x5
29,452,012 UART: [art] Derive Key Pair - Done
29,464,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,259 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,770 UART: [art] PUB.X = 3EED90676ADC55EABB28B598C67186C27F765C32D132C4825A3FFD8C628F4157D85E21EABFBA77952A81A3997C918013
31,754,017 UART: [art] PUB.Y = A835143095C9400B9A3B370F789CB0E8F29C11BDA6E5B7F844EA9824E9C41487D527642461A0418869128A595E247387
31,761,220 UART: [art] SIG.R = 279FEBC00254F5A5F3AC197DF031FE73ECDD94BD03A03DA0668C09A3D59321C82B857618A97AECAC4C4AD6853FFA4B98
31,768,660 UART: [art] SIG.S = FD7D59717A99411CE34B76B4A3E6D59A84D2F64A291F936CEB2F3724834B1E53F30DDB669CCF2AA413EEF11C9E1E7678
33,074,374 UART: Caliptra RT
33,075,089 UART: [state] CFI Enabled
33,207,869 UART: [rt] RT listening for mailbox commands...
33,210,189 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,365,647 UART: [rt]cmd =0x41544d4e, len=14344
38,666,428 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,098 UART:
192,462 UART: Running Caliptra ROM ...
193,670 UART:
193,825 UART: [state] CFI Enabled
262,749 UART: [state] LifecycleState = Unprovisioned
264,733 UART: [state] DebugLocked = No
266,336 UART: [state] WD Timer not started. Device not locked for debugging
270,505 UART: [kat] SHA2-256
450,176 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,000 UART: [kat] ++
461,540 UART: [kat] sha1
472,135 UART: [kat] SHA2-256
474,789 UART: [kat] SHA2-384
479,921 UART: [kat] SHA2-512-ACC
482,306 UART: [kat] ECC-384
2,926,558 UART: [kat] HMAC-384Kdf
2,949,671 UART: [kat] LMS
3,426,137 UART: [kat] --
3,433,043 UART: [cold-reset] ++
3,434,333 UART: [fht] FHT @ 0x50003400
3,445,732 UART: [idev] ++
3,446,291 UART: [idev] CDI.KEYID = 6
3,447,316 UART: [idev] SUBJECT.KEYID = 7
3,448,493 UART: [idev] UDS.KEYID = 0
3,449,435 ready_for_fw is high
3,449,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,802 UART: [idev] Erasing UDS.KEYID = 0
5,965,900 UART: [idev] Sha1 KeyId Algorithm
5,989,456 UART: [idev] --
5,994,799 UART: [ldev] ++
5,995,387 UART: [ldev] CDI.KEYID = 6
5,996,348 UART: [ldev] SUBJECT.KEYID = 5
5,997,504 UART: [ldev] AUTHORITY.KEYID = 7
5,998,789 UART: [ldev] FE.KEYID = 1
6,034,984 UART: [ldev] Erasing FE.KEYID = 1
8,545,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,275,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,291,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,307,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,909 UART: [ldev] --
10,350,848 UART: [fwproc] Wait for Commands...
10,353,209 UART: [fwproc] Recv command 0x46574c44
10,355,191 UART: [fwproc] Recv'd Img size: 118548 bytes
13,837,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,920,342 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,993,383 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,322,453 >>> mbox cmd response: success
14,325,918 UART: [afmc] ++
14,326,503 UART: [afmc] CDI.KEYID = 6
14,327,440 UART: [afmc] SUBJECT.KEYID = 7
14,328,706 UART: [afmc] AUTHORITY.KEYID = 5
16,870,399 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,615 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,595,808 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,611,673 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,627,682 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,643,240 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,667,313 UART: [afmc] --
18,670,419 UART: [cold-reset] --
18,675,680 UART: [state] Locking Datavault
18,681,517 UART: [state] Locking PCR0, PCR1 and PCR31
18,683,233 UART: [state] Locking ICCM
18,684,893 UART: [exit] Launching FMC @ 0x40000130
18,693,335 UART:
18,693,588 UART: Running Caliptra FMC ...
18,694,691 UART:
18,694,846 UART: [state] CFI Enabled
18,751,475 UART: [fht] FMC Alias Private Key: 7
20,518,309 UART: [art] Extend RT PCRs Done
20,519,524 UART: [art] Lock RT PCRs Done
20,521,091 UART: [art] Populate DV Done
20,526,290 UART: [fht] FMC Alias Private Key: 7
20,527,973 UART: [art] Derive CDI
20,528,793 UART: [art] Store in slot 0x4
20,584,697 UART: [art] Derive Key Pair
20,585,695 UART: [art] Store priv key in slot 0x5
23,048,353 UART: [art] Derive Key Pair - Done
23,061,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,774,518 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,032 UART: [art] PUB.X = 6BAF27665478AB22203F29661FD3B2C8FA2323BAB03B81C9FD4731EB7604DE4A13B25C0C088EE92AD5D8328CE321DC43
24,783,302 UART: [art] PUB.Y = 469C8B367908FE1D3D6F57512E70B6B1D469A98C829FDE823E08F482627244FB8F90BE6BAFDB5DFD232F8E704C47FFA7
24,790,537 UART: [art] SIG.R = 12341C0BFEA0C057443B8D6F97C6A216EC6CDC5DFA99A472401E848117407788F763ED1E2640A1EAAB18A2018E2514C6
24,797,937 UART: [art] SIG.S = FDE257C4E0947844EAA9575173B381735033D631463B2F86F183DEC01F34F2CF43C008E4577B7B770CAA8EC6C055DCF1
25,776,666 UART: Caliptra RT
25,777,372 UART: [state] CFI Enabled
25,958,847 UART: [rt] RT listening for mailbox commands...
25,961,152 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,116,738 UART: [rt]cmd =0x41544d4e, len=14344
30,112,718 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,459,970 ready_for_fw is high
3,460,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,226,966 >>> mbox cmd response: success
18,512,686 UART:
18,513,057 UART: Running Caliptra FMC ...
18,514,192 UART:
18,514,346 UART: [state] CFI Enabled
18,581,308 UART: [fht] FMC Alias Private Key: 7
20,368,544 UART: [art] Extend RT PCRs Done
20,369,760 UART: [art] Lock RT PCRs Done
20,371,165 UART: [art] Populate DV Done
20,376,731 UART: [fht] FMC Alias Private Key: 7
20,378,321 UART: [art] Derive CDI
20,379,133 UART: [art] Store in slot 0x4
20,435,222 UART: [art] Derive Key Pair
20,436,258 UART: [art] Store priv key in slot 0x5
22,898,809 UART: [art] Derive Key Pair - Done
22,911,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,403 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,909 UART: [art] PUB.X = 9F066DDD96FEBF47BC344728D6D056B0825055CCBD898AE15F152D662EF6783F221B0441C343137577BCF234B482A049
24,634,112 UART: [art] PUB.Y = CDE44AB20F7B8E33E0520363D0F89BAE863FD40FAD1C43A9DAABC0DA72B34042D6D1B54FAFA72CE0D65D49564367F920
24,641,413 UART: [art] SIG.R = 1C17C72CEBDC505E55A4D8DCBB849171A56AA3C539444FD62203B83E71B3543F6A29F845CB7ADFA73C59D8F848D1CA18
24,648,849 UART: [art] SIG.S = 2925FF5D5DCCF4E588234DE69892917540139DC999752B6A308277A41DD838AAFEDB52955BEA0310E083BB7F5BE4EB53
25,627,305 UART: Caliptra RT
25,628,008 UART: [state] CFI Enabled
25,808,479 UART: [rt] RT listening for mailbox commands...
25,810,793 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,966,142 UART: [rt]cmd =0x41544d4e, len=14344
29,962,268 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
192,666 UART:
193,032 UART: Running Caliptra ROM ...
194,258 UART:
603,777 UART: [state] CFI Enabled
619,922 UART: [state] LifecycleState = Unprovisioned
621,879 UART: [state] DebugLocked = No
623,329 UART: [state] WD Timer not started. Device not locked for debugging
627,653 UART: [kat] SHA2-256
807,365 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,098 UART: [kat] ++
818,579 UART: [kat] sha1
830,167 UART: [kat] SHA2-256
832,901 UART: [kat] SHA2-384
838,897 UART: [kat] SHA2-512-ACC
841,270 UART: [kat] ECC-384
3,283,822 UART: [kat] HMAC-384Kdf
3,296,294 UART: [kat] LMS
3,772,801 UART: [kat] --
3,776,239 UART: [cold-reset] ++
3,778,459 UART: [fht] FHT @ 0x50003400
3,790,503 UART: [idev] ++
3,791,148 UART: [idev] CDI.KEYID = 6
3,792,064 UART: [idev] SUBJECT.KEYID = 7
3,793,318 UART: [idev] UDS.KEYID = 0
3,794,247 ready_for_fw is high
3,794,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,367 UART: [idev] Erasing UDS.KEYID = 0
6,271,897 UART: [idev] Sha1 KeyId Algorithm
6,294,751 UART: [idev] --
6,299,614 UART: [ldev] ++
6,300,186 UART: [ldev] CDI.KEYID = 6
6,301,098 UART: [ldev] SUBJECT.KEYID = 5
6,302,342 UART: [ldev] AUTHORITY.KEYID = 7
6,303,583 UART: [ldev] FE.KEYID = 1
6,316,368 UART: [ldev] Erasing FE.KEYID = 1
8,795,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,532 UART: [ldev] --
10,589,507 UART: [fwproc] Wait for Commands...
10,592,091 UART: [fwproc] Recv command 0x46574c44
10,594,080 UART: [fwproc] Recv'd Img size: 118548 bytes
14,081,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,167,310 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,240,375 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,568,994 >>> mbox cmd response: success
14,572,799 UART: [afmc] ++
14,573,385 UART: [afmc] CDI.KEYID = 6
14,574,298 UART: [afmc] SUBJECT.KEYID = 7
14,575,519 UART: [afmc] AUTHORITY.KEYID = 5
17,083,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,805,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,807,602 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,823,410 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,839,536 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,855,073 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,879,695 UART: [afmc] --
18,883,652 UART: [cold-reset] --
18,887,738 UART: [state] Locking Datavault
18,891,917 UART: [state] Locking PCR0, PCR1 and PCR31
18,893,672 UART: [state] Locking ICCM
18,895,339 UART: [exit] Launching FMC @ 0x40000130
18,903,757 UART:
18,903,999 UART: Running Caliptra FMC ...
18,905,103 UART:
18,905,265 UART: [state] CFI Enabled
18,913,262 UART: [fht] FMC Alias Private Key: 7
20,679,675 UART: [art] Extend RT PCRs Done
20,680,870 UART: [art] Lock RT PCRs Done
20,682,656 UART: [art] Populate DV Done
20,688,017 UART: [fht] FMC Alias Private Key: 7
20,689,616 UART: [art] Derive CDI
20,690,441 UART: [art] Store in slot 0x4
20,733,362 UART: [art] Derive Key Pair
20,734,400 UART: [art] Store priv key in slot 0x5
23,161,304 UART: [art] Derive Key Pair - Done
23,174,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,880,331 UART: [art] Erasing AUTHORITY.KEYID = 7
24,882,142 UART: [art] PUB.X = 99E5EDCF65A19145DC08DD7526E8F53566D80E7ECF4325337CDD6F08704E0E4A35528B840AB9CAC8BEC9DFB4E887A4BD
24,889,115 UART: [art] PUB.Y = 0BD14FB7FADA8C956C87DFE3D1D8D769E8769C60E01CCEA4030E827DAC209180E85CE8E629302F4B58D410966226111B
24,896,404 UART: [art] SIG.R = EED39A80BA5B9E9C4990772AE6629102B7D7AD64894B0044DA67990679DACCBC322D3699C7AEE803D82B096134E7C6EB
24,903,815 UART: [art] SIG.S = C8D199A83A54F01E108CEAAE63226671A5F5564B5755051C9A3D206301E73D86644C42457BD247FE58D78B5846CDEAD3
25,882,361 UART: Caliptra RT
25,883,092 UART: [state] CFI Enabled
26,015,586 UART: [rt] RT listening for mailbox commands...
26,017,925 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,173,294 UART: [rt]cmd =0x41544d4e, len=14344
30,169,445 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
3,779,661 ready_for_fw is high
3,780,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,441,902 >>> mbox cmd response: success
18,688,955 UART:
18,689,348 UART: Running Caliptra FMC ...
18,690,548 UART:
18,690,716 UART: [state] CFI Enabled
18,698,877 UART: [fht] FMC Alias Private Key: 7
20,464,560 UART: [art] Extend RT PCRs Done
20,465,759 UART: [art] Lock RT PCRs Done
20,467,443 UART: [art] Populate DV Done
20,472,812 UART: [fht] FMC Alias Private Key: 7
20,474,361 UART: [art] Derive CDI
20,475,336 UART: [art] Store in slot 0x4
20,517,645 UART: [art] Derive Key Pair
20,518,657 UART: [art] Store priv key in slot 0x5
22,945,579 UART: [art] Derive Key Pair - Done
22,958,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,664,828 UART: [art] Erasing AUTHORITY.KEYID = 7
24,666,327 UART: [art] PUB.X = C2EB8B7120F6CB9F3D736B325EEF3EB2CD4989E716854F012CE98EB836406E804D8D6AF34225EE8F279F9AE00225FDF8
24,673,592 UART: [art] PUB.Y = 0520E688FDC7222824593E4657DF6DEA46F7BBBAB0DBEFB8F37E9F94E28DA5FC09D42708159658AA43AAB41C4B310D4B
24,680,831 UART: [art] SIG.R = BB5061D736161009B19C07F8A4DED64013DCDE2A1DD2DB77D27C4682FA6306DCB10C9BD055A707B90ECD8DACBD6BFB6E
24,688,248 UART: [art] SIG.S = 6DC5F3E1B80C3C7B7F6DC03EFF4C2A167788F37C190C1FE1B3B18A90C88F0752FCC065739093FBA03046A6C8F461BEC5
25,667,037 UART: Caliptra RT
25,667,751 UART: [state] CFI Enabled
25,800,255 UART: [rt] RT listening for mailbox commands...
25,802,571 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,957,665 UART: [rt]cmd =0x41544d4e, len=14344
29,953,339 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,457 UART:
192,846 UART: Running Caliptra ROM ...
194,006 UART:
194,162 UART: [state] CFI Enabled
260,633 UART: [state] LifecycleState = Unprovisioned
263,084 UART: [state] DebugLocked = No
264,435 UART: [state] WD Timer not started. Device not locked for debugging
268,242 UART: [kat] SHA2-256
458,146 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,880 UART: [kat] ++
469,352 UART: [kat] sha1
481,148 UART: [kat] SHA2-256
484,153 UART: [kat] SHA2-384
489,641 UART: [kat] SHA2-512-ACC
492,213 UART: [kat] ECC-384
2,948,474 UART: [kat] HMAC-384Kdf
2,972,394 UART: [kat] LMS
3,504,172 UART: [kat] --
3,511,429 UART: [cold-reset] ++
3,512,362 UART: [fht] FHT @ 0x50003400
3,523,546 UART: [idev] ++
3,524,266 UART: [idev] CDI.KEYID = 6
3,525,182 UART: [idev] SUBJECT.KEYID = 7
3,526,352 UART: [idev] UDS.KEYID = 0
3,527,271 ready_for_fw is high
3,527,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,140 UART: [idev] Erasing UDS.KEYID = 0
6,052,028 UART: [idev] Sha1 KeyId Algorithm
6,074,886 UART: [idev] --
6,078,449 UART: [ldev] ++
6,079,128 UART: [ldev] CDI.KEYID = 6
6,080,040 UART: [ldev] SUBJECT.KEYID = 5
6,081,253 UART: [ldev] AUTHORITY.KEYID = 7
6,082,426 UART: [ldev] FE.KEYID = 1
6,123,113 UART: [ldev] Erasing FE.KEYID = 1
8,632,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,366,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,381,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,397,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,412,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,433,586 UART: [ldev] --
10,438,584 UART: [fwproc] Wait for Commands...
10,440,725 UART: [fwproc] Recv command 0x46574c44
10,443,026 UART: [fwproc] Recv'd Img size: 118548 bytes
13,937,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,016,340 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,139,932 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,700,580 >>> mbox cmd response: success
14,704,317 UART: [afmc] ++
14,705,037 UART: [afmc] CDI.KEYID = 6
14,706,152 UART: [afmc] SUBJECT.KEYID = 7
14,707,702 UART: [afmc] AUTHORITY.KEYID = 5
17,237,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,963,678 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,965,590 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,980,693 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,995,865 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,010,765 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,034,104 UART: [afmc] --
19,036,946 UART: [cold-reset] --
19,040,974 UART: [state] Locking Datavault
19,045,691 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,834 UART: [state] Locking ICCM
19,049,592 UART: [exit] Launching FMC @ 0x40000130
19,058,269 UART:
19,058,507 UART: Running Caliptra FMC ...
19,059,731 UART:
19,059,902 UART: [state] CFI Enabled
19,110,432 UART: [fht] FMC Alias Private Key: 7
20,876,976 UART: [art] Extend RT PCRs Done
20,878,197 UART: [art] Lock RT PCRs Done
20,879,612 UART: [art] Populate DV Done
20,885,031 UART: [fht] FMC Alias Private Key: 7
20,886,679 UART: [art] Derive CDI
20,887,490 UART: [art] Store in slot 0x4
20,943,161 UART: [art] Derive Key Pair
20,944,212 UART: [art] Store priv key in slot 0x5
23,407,216 UART: [art] Derive Key Pair - Done
23,420,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,132,883 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,390 UART: [art] PUB.X = E2F4E65FDB660D36CD2DA8D853D517DCE313A3348E4CD947CA13DEEEE6557DD5C02AF69F4F4C8138A84CCA6270ED6546
25,141,714 UART: [art] PUB.Y = BEC60EC4D9491E84F16E9E62DF7E0F72C5C5EB361728D9E8635C7F687F9BB21F3015262D184BC5765DA5D8AF09012C6D
25,148,962 UART: [art] SIG.R = C10E173930EFF92E36DB60D3611F6A229FBF25D768EE82FC3B006EDD3FB89AE21B0ED9D3BA6787704DE09CEFEA271F7C
25,156,366 UART: [art] SIG.S = 4AC87CAD37F1B51EB36BC4E4EB6080D082EA8BF5031EC5A3F1CB6BFD10909308D179641702B32D19D8B7E0F74AC7F0D2
26,135,292 UART: Caliptra RT
26,136,011 UART: [state] CFI Enabled
26,316,788 UART: [rt] RT listening for mailbox commands...
26,319,102 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,474,240 UART: [rt]cmd =0x41544d4e, len=14344
30,470,040 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,442,072 ready_for_fw is high
3,443,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,268 >>> mbox cmd response: success
19,104,761 UART:
19,105,167 UART: Running Caliptra FMC ...
19,106,286 UART:
19,106,440 UART: [state] CFI Enabled
19,175,659 UART: [fht] FMC Alias Private Key: 7
20,942,767 UART: [art] Extend RT PCRs Done
20,943,999 UART: [art] Lock RT PCRs Done
20,945,758 UART: [art] Populate DV Done
20,951,181 UART: [fht] FMC Alias Private Key: 7
20,952,718 UART: [art] Derive CDI
20,953,473 UART: [art] Store in slot 0x4
21,008,180 UART: [art] Derive Key Pair
21,009,232 UART: [art] Store priv key in slot 0x5
23,472,168 UART: [art] Derive Key Pair - Done
23,485,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,197,885 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,399 UART: [art] PUB.X = 87108C1F1DAB6A61884D691E41F2F173D805A0329A5B4AAB811B3AD7874E080771ABEBC750D6D94A97302ADFC88198DF
25,206,655 UART: [art] PUB.Y = 36175C4DC9F9C8DC2812C9D4E9D2A491FFA6935A1CACF01179782EEE8843B8D402B605B5237E2FA42F5FFF3B50E0D5D7
25,213,911 UART: [art] SIG.R = 2931370B494C31B255338800BA2399C2543D16BF9BD3ECA90A076E90FD27F2F93C0B7C3FFEAC104789965B8B37BDD062
25,221,293 UART: [art] SIG.S = 56AE3D6AD001347DF9494D7D13B94CD8F00A0A2D07E774547636F01D367D0C1C3DCD48B2225F02871B0944B125481AF3
26,199,785 UART: Caliptra RT
26,200,487 UART: [state] CFI Enabled
26,380,609 UART: [rt] RT listening for mailbox commands...
26,382,929 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,538,083 UART: [rt]cmd =0x41544d4e, len=14344
30,533,240 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,457 UART:
192,920 UART: Running Caliptra ROM ...
194,069 UART:
603,575 UART: [state] CFI Enabled
615,617 UART: [state] LifecycleState = Unprovisioned
617,937 UART: [state] DebugLocked = No
619,322 UART: [state] WD Timer not started. Device not locked for debugging
623,085 UART: [kat] SHA2-256
812,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,727 UART: [kat] ++
824,335 UART: [kat] sha1
835,365 UART: [kat] SHA2-256
838,378 UART: [kat] SHA2-384
845,132 UART: [kat] SHA2-512-ACC
847,688 UART: [kat] ECC-384
3,288,916 UART: [kat] HMAC-384Kdf
3,303,354 UART: [kat] LMS
3,835,187 UART: [kat] --
3,840,060 UART: [cold-reset] ++
3,841,861 UART: [fht] FHT @ 0x50003400
3,854,194 UART: [idev] ++
3,854,914 UART: [idev] CDI.KEYID = 6
3,855,949 UART: [idev] SUBJECT.KEYID = 7
3,857,056 UART: [idev] UDS.KEYID = 0
3,857,987 ready_for_fw is high
3,858,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,147 UART: [idev] Erasing UDS.KEYID = 0
6,332,856 UART: [idev] Sha1 KeyId Algorithm
6,355,980 UART: [idev] --
6,361,449 UART: [ldev] ++
6,362,132 UART: [ldev] CDI.KEYID = 6
6,363,258 UART: [ldev] SUBJECT.KEYID = 5
6,364,379 UART: [ldev] AUTHORITY.KEYID = 7
6,365,558 UART: [ldev] FE.KEYID = 1
6,376,747 UART: [ldev] Erasing FE.KEYID = 1
8,856,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,054 UART: [ldev] --
10,647,833 UART: [fwproc] Wait for Commands...
10,649,546 UART: [fwproc] Recv command 0x46574c44
10,651,854 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,800 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,409 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,542 >>> mbox cmd response: success
14,915,893 UART: [afmc] ++
14,916,622 UART: [afmc] CDI.KEYID = 6
14,917,821 UART: [afmc] SUBJECT.KEYID = 7
14,919,265 UART: [afmc] AUTHORITY.KEYID = 5
17,425,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,351 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,478 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,632 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,496 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,146 UART: [afmc] --
19,221,204 UART: [cold-reset] --
19,225,731 UART: [state] Locking Datavault
19,230,479 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,700 UART: [state] Locking ICCM
19,234,808 UART: [exit] Launching FMC @ 0x40000130
19,243,504 UART:
19,243,785 UART: Running Caliptra FMC ...
19,244,897 UART:
19,245,060 UART: [state] CFI Enabled
19,253,225 UART: [fht] FMC Alias Private Key: 7
21,019,823 UART: [art] Extend RT PCRs Done
21,021,049 UART: [art] Lock RT PCRs Done
21,022,686 UART: [art] Populate DV Done
21,028,158 UART: [fht] FMC Alias Private Key: 7
21,029,654 UART: [art] Derive CDI
21,030,424 UART: [art] Store in slot 0x4
21,073,024 UART: [art] Derive Key Pair
21,074,030 UART: [art] Store priv key in slot 0x5
23,500,605 UART: [art] Derive Key Pair - Done
23,513,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,612 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,120 UART: [art] PUB.X = 98A7C3827E0D5B7AFF53A7F5E3548D4BE079BBEB3C26CD00ABEB39EE888F8D3974C734AC0223C57D82658F8E6393CE8E
25,228,387 UART: [art] PUB.Y = 85118D189E615D21805C1B639C07D960CB9051FAD33586C13EEACD7922B429F6CE77DDE4237597F53CD10A1C73D61378
25,235,640 UART: [art] SIG.R = 56195D5096598CCF8823925EFE4B1ABC378AA93939FB8759B56301C501F9EC48380A26885B8341A105A0F157EC8D2A0A
25,243,100 UART: [art] SIG.S = A390C381EBED6EEECE75AFBEFCB4ABB5FEB858178DE0A5025D0017841E2E6C1B21DFDD3D9F09E27392C85A432B7CD807
26,221,616 UART: Caliptra RT
26,222,330 UART: [state] CFI Enabled
26,354,889 UART: [rt] RT listening for mailbox commands...
26,357,196 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,512,734 UART: [rt]cmd =0x41544d4e, len=14344
30,508,610 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,758,142 ready_for_fw is high
3,758,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,052,787 >>> mbox cmd response: success
19,307,850 UART:
19,308,235 UART: Running Caliptra FMC ...
19,309,430 UART:
19,309,603 UART: [state] CFI Enabled
19,317,533 UART: [fht] FMC Alias Private Key: 7
21,083,508 UART: [art] Extend RT PCRs Done
21,084,757 UART: [art] Lock RT PCRs Done
21,086,508 UART: [art] Populate DV Done
21,091,714 UART: [fht] FMC Alias Private Key: 7
21,093,209 UART: [art] Derive CDI
21,093,978 UART: [art] Store in slot 0x4
21,136,958 UART: [art] Derive Key Pair
21,138,007 UART: [art] Store priv key in slot 0x5
23,564,708 UART: [art] Derive Key Pair - Done
23,577,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,284,046 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,554 UART: [art] PUB.X = 9C36D5CEC3DD747F33796282464BFC42D0793D42E6807BEE1054088F9E8FF617BC155607A6E4399A006FF50495DA07F9
25,292,738 UART: [art] PUB.Y = 7B7AB208FD92176A08EE886A9A828001A57631D080B041A25B877C038B769990B6882FA0B120F74C041D21DA7B2BA66C
25,299,977 UART: [art] SIG.R = B76A144A4386E1DCF67F345428C09D1F13A8712A063280BFAF1149171DD98B4276C5DA29E6AA1651BB9D94D02F9D4FF1
25,307,367 UART: [art] SIG.S = EF6C54F8FE6A0E0CB490527DC09CAC3E76FA86A4FCC8511D88F4A8C0BA8A7261DD03E666FBB3A907E35F5DDEEAB9FAAC
26,286,136 UART: Caliptra RT
26,286,842 UART: [state] CFI Enabled
26,420,150 UART: [rt] RT listening for mailbox commands...
26,422,605 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,577,808 UART: [rt]cmd =0x41544d4e, len=14344
30,573,014 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,795 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,477 UART: [kat] SHA2-256
882,408 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,523 UART: [kat] ++
886,675 UART: [kat] sha1
890,965 UART: [kat] SHA2-256
892,903 UART: [kat] SHA2-384
895,558 UART: [kat] SHA2-512-ACC
897,459 UART: [kat] ECC-384
902,980 UART: [kat] HMAC-384Kdf
907,540 UART: [kat] LMS
1,475,736 UART: [kat] --
1,476,335 UART: [cold-reset] ++
1,476,899 UART: [fht] Storing FHT @ 0x50003400
1,479,600 UART: [idev] ++
1,479,768 UART: [idev] CDI.KEYID = 6
1,480,128 UART: [idev] SUBJECT.KEYID = 7
1,480,552 UART: [idev] UDS.KEYID = 0
1,480,897 ready_for_fw is high
1,480,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,242 UART: [idev] Erasing UDS.KEYID = 0
1,504,692 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,436 UART: [idev] --
1,514,547 UART: [ldev] ++
1,514,715 UART: [ldev] CDI.KEYID = 6
1,515,078 UART: [ldev] SUBJECT.KEYID = 5
1,515,504 UART: [ldev] AUTHORITY.KEYID = 7
1,515,967 UART: [ldev] FE.KEYID = 1
1,521,087 UART: [ldev] Erasing FE.KEYID = 1
1,545,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,854 UART: [ldev] --
1,584,161 UART: [fwproc] Waiting for Commands...
1,584,922 UART: [fwproc] Received command 0x46574c44
1,585,713 UART: [fwproc] Received Image of size 118548 bytes
2,929,805 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,529 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,747 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,984 >>> mbox cmd response: success
3,130,000 UART: [afmc] ++
3,130,168 UART: [afmc] CDI.KEYID = 6
3,130,530 UART: [afmc] SUBJECT.KEYID = 7
3,130,955 UART: [afmc] AUTHORITY.KEYID = 5
3,165,150 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,181,176 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,181,956 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,187,665 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,193,548 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,199,231 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,207,083 UART: [afmc] --
3,207,965 UART: [cold-reset] --
3,208,889 UART: [state] Locking Datavault
3,210,332 UART: [state] Locking PCR0, PCR1 and PCR31
3,210,936 UART: [state] Locking ICCM
3,211,416 UART: [exit] Launching FMC @ 0x40000130
3,216,746 UART:
3,216,762 UART: Running Caliptra FMC ...
3,217,170 UART:
3,217,224 UART: [state] CFI Enabled
3,227,934 UART: [fht] FMC Alias Private Key: 7
3,347,488 UART: [art] Extend RT PCRs Done
3,347,916 UART: [art] Lock RT PCRs Done
3,349,640 UART: [art] Populate DV Done
3,357,721 UART: [fht] FMC Alias Private Key: 7
3,358,699 UART: [art] Derive CDI
3,358,979 UART: [art] Store in slot 0x4
3,444,461 UART: [art] Derive Key Pair
3,444,821 UART: [art] Store priv key in slot 0x5
3,458,472 UART: [art] Derive Key Pair - Done
3,473,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,345 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,110 UART: [art] PUB.X = F1B1C84CDD1E4161EF99D31C6FE4D50CCCC4589FF6DAACDE0CD986917C55F43BC84B0B8E30A6730441A7A3612154EF3E
3,496,888 UART: [art] PUB.Y = D495A22B46CE1FB7D245E535FE30248FDC7C0AE29B858DD258FAD0BA5DF57AEE8DEC0DF4D145642BE0818D4AB84F6619
3,503,854 UART: [art] SIG.R = 2C400E16D9239129343C9B2FB760C932092A2918DB25CD002BC77B3F26F6B93D4D6EBCCC4C581F9D8B12430580C32EC7
3,510,597 UART: [art] SIG.S = B9728197B973B87085140A2D01A5528A86612E4537DD41B7C158D21875927C6440F5B4FBC7546A79EF6DE4C95E8D5668
3,534,419 UART: Caliptra RT
3,534,670 UART: [state] CFI Enabled
3,654,442 UART: [rt] RT listening for mailbox commands...
3,655,112 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,318 UART: [rt]cmd =0x41544d4e, len=14344
4,088,019 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,859 ready_for_fw is high
1,362,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,136 >>> mbox cmd response: success
3,043,429 UART:
3,043,445 UART: Running Caliptra FMC ...
3,043,853 UART:
3,043,907 UART: [state] CFI Enabled
3,054,061 UART: [fht] FMC Alias Private Key: 7
3,172,543 UART: [art] Extend RT PCRs Done
3,172,971 UART: [art] Lock RT PCRs Done
3,174,797 UART: [art] Populate DV Done
3,183,064 UART: [fht] FMC Alias Private Key: 7
3,184,246 UART: [art] Derive CDI
3,184,526 UART: [art] Store in slot 0x4
3,270,254 UART: [art] Derive Key Pair
3,270,614 UART: [art] Store priv key in slot 0x5
3,284,183 UART: [art] Derive Key Pair - Done
3,298,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,491 UART: [art] PUB.X = 9E2B4110E6D73136E1EA35FEC4E142FA4EA1E4B01663BBD71E89645E5207FA5575F0D679956C4A25BC4D2C3001DA85E7
3,321,263 UART: [art] PUB.Y = A3B79C07A4890CBFE7044321FCB57A289E0D9CEA697FA6C7BE39F0A892990CCDA7F591EC4A319A34D7ADDFB055BC547B
3,328,220 UART: [art] SIG.R = 1C5E6964C4A14703595FD53D599B542A7D3ED4C32C8E19023B28273FF3A58A808DAB0B4CEB960CA03AE96556F8E974D8
3,334,984 UART: [art] SIG.S = FF440192FD1A630EC588FB508C5EF0D530F4C2CA93471FB7906130123802AF977D7870B1F204ED71CD53172A7ADE80F6
3,358,768 UART: Caliptra RT
3,359,019 UART: [state] CFI Enabled
3,478,809 UART: [rt] RT listening for mailbox commands...
3,479,479 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,577 UART: [rt]cmd =0x41544d4e, len=14344
3,912,344 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,572 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,242 UART: [kat] SHA2-256
882,173 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,288 UART: [kat] ++
886,440 UART: [kat] sha1
890,770 UART: [kat] SHA2-256
892,708 UART: [kat] SHA2-384
895,479 UART: [kat] SHA2-512-ACC
897,380 UART: [kat] ECC-384
902,931 UART: [kat] HMAC-384Kdf
907,761 UART: [kat] LMS
1,475,957 UART: [kat] --
1,476,946 UART: [cold-reset] ++
1,477,410 UART: [fht] Storing FHT @ 0x50003400
1,480,235 UART: [idev] ++
1,480,403 UART: [idev] CDI.KEYID = 6
1,480,763 UART: [idev] SUBJECT.KEYID = 7
1,481,187 UART: [idev] UDS.KEYID = 0
1,481,532 ready_for_fw is high
1,481,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,575 UART: [idev] Erasing UDS.KEYID = 0
1,505,763 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,361 UART: [idev] --
1,515,366 UART: [ldev] ++
1,515,534 UART: [ldev] CDI.KEYID = 6
1,515,897 UART: [ldev] SUBJECT.KEYID = 5
1,516,323 UART: [ldev] AUTHORITY.KEYID = 7
1,516,786 UART: [ldev] FE.KEYID = 1
1,522,066 UART: [ldev] Erasing FE.KEYID = 1
1,547,799 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,907 UART: [ldev] --
1,587,232 UART: [fwproc] Waiting for Commands...
1,588,049 UART: [fwproc] Received command 0x46574c44
1,588,840 UART: [fwproc] Received Image of size 118548 bytes
2,933,058 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,138 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,356 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,551 >>> mbox cmd response: success
3,132,803 UART: [afmc] ++
3,132,971 UART: [afmc] CDI.KEYID = 6
3,133,333 UART: [afmc] SUBJECT.KEYID = 7
3,133,758 UART: [afmc] AUTHORITY.KEYID = 5
3,168,989 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,059 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,839 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,548 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,431 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,114 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,962 UART: [afmc] --
3,212,056 UART: [cold-reset] --
3,212,766 UART: [state] Locking Datavault
3,213,871 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,475 UART: [state] Locking ICCM
3,215,137 UART: [exit] Launching FMC @ 0x40000130
3,220,467 UART:
3,220,483 UART: Running Caliptra FMC ...
3,220,891 UART:
3,221,034 UART: [state] CFI Enabled
3,231,552 UART: [fht] FMC Alias Private Key: 7
3,350,478 UART: [art] Extend RT PCRs Done
3,350,906 UART: [art] Lock RT PCRs Done
3,352,728 UART: [art] Populate DV Done
3,361,109 UART: [fht] FMC Alias Private Key: 7
3,362,095 UART: [art] Derive CDI
3,362,375 UART: [art] Store in slot 0x4
3,447,949 UART: [art] Derive Key Pair
3,448,309 UART: [art] Store priv key in slot 0x5
3,461,154 UART: [art] Derive Key Pair - Done
3,475,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,133 UART: [art] PUB.X = 1C68A73C4EC7B14468DFB90066388E232EFF43E6B950767408B08A64689DCCA7C11F762F8CE35EA6A9FE72B4B7D78A2C
3,498,888 UART: [art] PUB.Y = 666B319B2CCFDBF60F6400143686A6BCAAE178EB8474B3BF460D8B4C386DA9EA839FC1CA24E7C4DA8B7FA956D3DF4255
3,505,830 UART: [art] SIG.R = 4F2FB24A6BFFE1433B00B7E3DE6354A272C1299C5320C399B5DC7946E05E3F7E189521B8571B6DA6C12968A05DB2D43A
3,512,584 UART: [art] SIG.S = A1B114DFC4EE2BD1CFB015403BB98CD83DB5C50FDAE69A4D41CFFA866C0ABB9D1794343583C0D733EB784983BD8FEA36
3,536,384 UART: Caliptra RT
3,536,727 UART: [state] CFI Enabled
3,657,141 UART: [rt] RT listening for mailbox commands...
3,657,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,637 UART: [rt]cmd =0x41544d4e, len=14344
4,090,234 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,540 ready_for_fw is high
1,362,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,607 >>> mbox cmd response: success
3,043,812 UART:
3,043,828 UART: Running Caliptra FMC ...
3,044,236 UART:
3,044,379 UART: [state] CFI Enabled
3,054,749 UART: [fht] FMC Alias Private Key: 7
3,173,743 UART: [art] Extend RT PCRs Done
3,174,171 UART: [art] Lock RT PCRs Done
3,175,869 UART: [art] Populate DV Done
3,183,886 UART: [fht] FMC Alias Private Key: 7
3,185,036 UART: [art] Derive CDI
3,185,316 UART: [art] Store in slot 0x4
3,271,248 UART: [art] Derive Key Pair
3,271,608 UART: [art] Store priv key in slot 0x5
3,284,793 UART: [art] Derive Key Pair - Done
3,299,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,096 UART: [art] PUB.X = 61AF0C62174690B595EB7E5D8CC8FA70209EAA684DD3E30FDF82B048285BFFB65B43D35F38B2C752E89EB6A6DF54254F
3,322,874 UART: [art] PUB.Y = B515EA0BEC42796E74039D74E3497E4ED49F30DBB5ED35B7A68DB9240E1DCCA6CEF2EABFE26C320352288CBA9E488C6D
3,329,834 UART: [art] SIG.R = F0F0636DEB440792E11EAABE3C7B5D1D951867CFD05C1E6008A4215FCFEBCCA2BBCB63F2D1BB8B33BABD5ADC71CEF025
3,336,632 UART: [art] SIG.S = 86B3FE88538BB3C627779034DF8351027CE856FC9389DA1DA87A9A46B0475F02B7AB92392E78A89C7DDFFF97FF168E1C
3,360,860 UART: Caliptra RT
3,361,203 UART: [state] CFI Enabled
3,481,836 UART: [rt] RT listening for mailbox commands...
3,482,506 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,520 UART: [rt]cmd =0x41544d4e, len=14344
3,916,027 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
891,494 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,253 UART: [kat] HMAC-384Kdf
920,977 UART: [kat] LMS
1,169,289 UART: [kat] --
1,169,932 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,173,172 UART: [idev] ++
1,173,340 UART: [idev] CDI.KEYID = 6
1,173,701 UART: [idev] SUBJECT.KEYID = 7
1,174,126 UART: [idev] UDS.KEYID = 0
1,174,472 ready_for_fw is high
1,174,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,435 UART: [idev] Erasing UDS.KEYID = 0
1,198,955 UART: [idev] Sha1 KeyId Algorithm
1,207,609 UART: [idev] --
1,208,790 UART: [ldev] ++
1,208,958 UART: [ldev] CDI.KEYID = 6
1,209,322 UART: [ldev] SUBJECT.KEYID = 5
1,209,749 UART: [ldev] AUTHORITY.KEYID = 7
1,210,212 UART: [ldev] FE.KEYID = 1
1,215,350 UART: [ldev] Erasing FE.KEYID = 1
1,241,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,524 UART: [ldev] --
1,280,949 UART: [fwproc] Wait for Commands...
1,281,594 UART: [fwproc] Recv command 0x46574c44
1,282,327 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,047 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,222 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,379 >>> mbox cmd response: success
2,825,643 UART: [afmc] ++
2,825,811 UART: [afmc] CDI.KEYID = 6
2,826,174 UART: [afmc] SUBJECT.KEYID = 7
2,826,600 UART: [afmc] AUTHORITY.KEYID = 5
2,862,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,405 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,115 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,996 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,697 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,454 UART: [afmc] --
2,905,429 UART: [cold-reset] --
2,906,463 UART: [state] Locking Datavault
2,907,920 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,524 UART: [state] Locking ICCM
2,909,194 UART: [exit] Launching FMC @ 0x40000130
2,914,524 UART:
2,914,540 UART: Running Caliptra FMC ...
2,914,948 UART:
2,915,002 UART: [state] CFI Enabled
2,925,468 UART: [fht] FMC Alias Private Key: 7
3,044,244 UART: [art] Extend RT PCRs Done
3,044,672 UART: [art] Lock RT PCRs Done
3,046,150 UART: [art] Populate DV Done
3,054,475 UART: [fht] FMC Alias Private Key: 7
3,055,629 UART: [art] Derive CDI
3,055,909 UART: [art] Store in slot 0x4
3,141,594 UART: [art] Derive Key Pair
3,141,954 UART: [art] Store priv key in slot 0x5
3,155,128 UART: [art] Derive Key Pair - Done
3,169,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,419 UART: [art] PUB.X = BFD82A87668C9EB7094B98571E4B3CFA922F0D7363211692E9E5E2A3CD6BDFE32F1575F9627A4ADCB4E0BF151004FB6F
3,192,194 UART: [art] PUB.Y = 03F23B64E960F9A4591DC53376F02CCF57E6B4083420EB3FD575B0CFFE5B2C2E35CED14AFCDD0CB84133AA6B154F30A3
3,199,153 UART: [art] SIG.R = AC09B71A96671895D19F33D7F5B0D0EA5E10A5B2E9AA93B9A0822C2886697F30940B362BB0A224E4F7AF1629A83EBFB8
3,205,925 UART: [art] SIG.S = A178F21B1DC7D4DD0F1CDED66E208ADBEA0FBDF9488F946024BA1B5E9DB5C93867DC3D34C64C96AAFED08E2EFA0F3F95
3,229,646 UART: Caliptra RT
3,229,897 UART: [state] CFI Enabled
3,349,443 UART: [rt] RT listening for mailbox commands...
3,350,113 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,117 UART: [rt]cmd =0x41544d4e, len=14344
3,782,906 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,744 ready_for_fw is high
1,058,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,042 >>> mbox cmd response: success
2,738,355 UART:
2,738,371 UART: Running Caliptra FMC ...
2,738,779 UART:
2,738,833 UART: [state] CFI Enabled
2,749,507 UART: [fht] FMC Alias Private Key: 7
2,868,507 UART: [art] Extend RT PCRs Done
2,868,935 UART: [art] Lock RT PCRs Done
2,870,563 UART: [art] Populate DV Done
2,878,846 UART: [fht] FMC Alias Private Key: 7
2,879,972 UART: [art] Derive CDI
2,880,252 UART: [art] Store in slot 0x4
2,966,045 UART: [art] Derive Key Pair
2,966,405 UART: [art] Store priv key in slot 0x5
2,979,495 UART: [art] Derive Key Pair - Done
2,994,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,325 UART: [art] PUB.X = 1F0B8A490C953F414CD7F14E9C03ED298822DD724AE1743E4DD12568C06C3A422F671874C32C87098100D352AA98496A
3,017,057 UART: [art] PUB.Y = 27090015252994475E6DF578DC56231E31084F332698289410DEA987CCE002D377203202B983BC93BE62890CF3E86E75
3,023,954 UART: [art] SIG.R = 1AC2906EB3D11473604EADBF3862824837C5FE09065BB025824ABA74061EF6B42E2BFBD19993BCBE697054F05A899F9E
3,030,721 UART: [art] SIG.S = B7EC9F8F3BFAF6C463C084425970FB35E879139B821F6D3EA8D358018BFF61E6E7E12C2D05F458EA581C702EE7C5531B
3,054,901 UART: Caliptra RT
3,055,152 UART: [state] CFI Enabled
3,174,885 UART: [rt] RT listening for mailbox commands...
3,175,555 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,677 UART: [rt]cmd =0x41544d4e, len=14344
3,608,492 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,781 UART: [kat] ++
895,933 UART: [kat] sha1
900,081 UART: [kat] SHA2-256
902,021 UART: [kat] SHA2-384
904,936 UART: [kat] SHA2-512-ACC
906,837 UART: [kat] ECC-384
916,530 UART: [kat] HMAC-384Kdf
921,094 UART: [kat] LMS
1,169,406 UART: [kat] --
1,170,181 UART: [cold-reset] ++
1,170,649 UART: [fht] FHT @ 0x50003400
1,173,113 UART: [idev] ++
1,173,281 UART: [idev] CDI.KEYID = 6
1,173,642 UART: [idev] SUBJECT.KEYID = 7
1,174,067 UART: [idev] UDS.KEYID = 0
1,174,413 ready_for_fw is high
1,174,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,886 UART: [idev] Erasing UDS.KEYID = 0
1,199,758 UART: [idev] Sha1 KeyId Algorithm
1,208,612 UART: [idev] --
1,209,873 UART: [ldev] ++
1,210,041 UART: [ldev] CDI.KEYID = 6
1,210,405 UART: [ldev] SUBJECT.KEYID = 5
1,210,832 UART: [ldev] AUTHORITY.KEYID = 7
1,211,295 UART: [ldev] FE.KEYID = 1
1,216,717 UART: [ldev] Erasing FE.KEYID = 1
1,242,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,517 UART: [ldev] --
1,281,904 UART: [fwproc] Wait for Commands...
1,282,601 UART: [fwproc] Recv command 0x46574c44
1,283,334 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,772 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,947 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,288 >>> mbox cmd response: success
2,827,500 UART: [afmc] ++
2,827,668 UART: [afmc] CDI.KEYID = 6
2,828,031 UART: [afmc] SUBJECT.KEYID = 7
2,828,457 UART: [afmc] AUTHORITY.KEYID = 5
2,864,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,374 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,084 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,965 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,666 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,367 UART: [afmc] --
2,907,422 UART: [cold-reset] --
2,908,160 UART: [state] Locking Datavault
2,909,581 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,185 UART: [state] Locking ICCM
2,910,777 UART: [exit] Launching FMC @ 0x40000130
2,916,107 UART:
2,916,123 UART: Running Caliptra FMC ...
2,916,531 UART:
2,916,674 UART: [state] CFI Enabled
2,927,722 UART: [fht] FMC Alias Private Key: 7
3,046,814 UART: [art] Extend RT PCRs Done
3,047,242 UART: [art] Lock RT PCRs Done
3,048,736 UART: [art] Populate DV Done
3,057,115 UART: [fht] FMC Alias Private Key: 7
3,058,053 UART: [art] Derive CDI
3,058,333 UART: [art] Store in slot 0x4
3,144,560 UART: [art] Derive Key Pair
3,144,920 UART: [art] Store priv key in slot 0x5
3,158,154 UART: [art] Derive Key Pair - Done
3,172,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,201 UART: [art] PUB.X = 24D25E4F9576DDB9566AFC3775FC8AD3E14E1C1A6348F77F68784F66723EB3C361F8548D1A4FE83FE5D57C6D0ED4C14C
3,195,980 UART: [art] PUB.Y = 978ADFD77E6AE08AFD12DCEC572DFF50AABF729224ABDF30AA1498874D5D904272C91ED11768735412C0735C65C48A51
3,202,940 UART: [art] SIG.R = E420CB5645C8A46DB47404112D1FB2B79D5ADCCDBBBE40CE9F3DE4B9BF37327D46A7B4FA9600B7CCF97A9A83FD62693B
3,209,709 UART: [art] SIG.S = 99062FC41E6B4F1138C85E5D7367B277C62C7E8CDA5FF2EEE79BACBD72EA63D495DDFE9B30588CD50C0BD50CDB2F96E5
3,233,179 UART: Caliptra RT
3,233,522 UART: [state] CFI Enabled
3,353,518 UART: [rt] RT listening for mailbox commands...
3,354,188 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,252 UART: [rt]cmd =0x41544d4e, len=14344
3,786,855 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,399 ready_for_fw is high
1,059,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,421 >>> mbox cmd response: success
2,742,450 UART:
2,742,466 UART: Running Caliptra FMC ...
2,742,874 UART:
2,743,017 UART: [state] CFI Enabled
2,753,759 UART: [fht] FMC Alias Private Key: 7
2,872,273 UART: [art] Extend RT PCRs Done
2,872,701 UART: [art] Lock RT PCRs Done
2,874,065 UART: [art] Populate DV Done
2,882,412 UART: [fht] FMC Alias Private Key: 7
2,883,560 UART: [art] Derive CDI
2,883,840 UART: [art] Store in slot 0x4
2,969,547 UART: [art] Derive Key Pair
2,969,907 UART: [art] Store priv key in slot 0x5
2,983,005 UART: [art] Derive Key Pair - Done
2,997,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,842 UART: [art] PUB.X = FD6175609DBA918AC818DDD4529012B1BAE5280E2C5CE056F83252AB4EF28CC30AD69E02C59E235E04A9D72F6676CFA5
3,020,612 UART: [art] PUB.Y = B63AAB59CB76AD0A77DA5C30AF3C19928B1CFDA7F4F727F408465A5A2C28E9FA29CA803DD249B3131DCECC384B4C6DC4
3,027,580 UART: [art] SIG.R = 8AB274DD0B62D37BD743CEF7B1938CFE9D873392D49657C20C0A2B029AD640C0720198B1A67E5F0F1A6A94BEFBECE998
3,034,346 UART: [art] SIG.S = 8C2AA60DEBD6EEB93F4BEFAFCD3E1ED212033AD9D01C4C3BCC9ECF908CCF1E966711F8B88C5352C21F54344F2C06C101
3,058,096 UART: Caliptra RT
3,058,439 UART: [state] CFI Enabled
3,178,217 UART: [rt] RT listening for mailbox commands...
3,178,887 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,821 UART: [rt]cmd =0x41544d4e, len=14344
3,611,284 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,648 UART: [state] LifecycleState = Unprovisioned
85,303 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
893,014 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,139 UART: [kat] ++
897,291 UART: [kat] sha1
901,535 UART: [kat] SHA2-256
903,475 UART: [kat] SHA2-384
906,274 UART: [kat] SHA2-512-ACC
908,175 UART: [kat] ECC-384
917,558 UART: [kat] HMAC-384Kdf
922,166 UART: [kat] LMS
1,170,494 UART: [kat] --
1,171,659 UART: [cold-reset] ++
1,172,003 UART: [fht] FHT @ 0x50003400
1,174,652 UART: [idev] ++
1,174,820 UART: [idev] CDI.KEYID = 6
1,175,180 UART: [idev] SUBJECT.KEYID = 7
1,175,604 UART: [idev] UDS.KEYID = 0
1,175,949 ready_for_fw is high
1,175,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,284 UART: [idev] Erasing UDS.KEYID = 0
1,200,343 UART: [idev] Sha1 KeyId Algorithm
1,208,805 UART: [idev] --
1,209,905 UART: [ldev] ++
1,210,073 UART: [ldev] CDI.KEYID = 6
1,210,436 UART: [ldev] SUBJECT.KEYID = 5
1,210,862 UART: [ldev] AUTHORITY.KEYID = 7
1,211,325 UART: [ldev] FE.KEYID = 1
1,216,557 UART: [ldev] Erasing FE.KEYID = 1
1,242,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,819 UART: [ldev] --
1,282,280 UART: [fwproc] Wait for Commands...
1,283,092 UART: [fwproc] Recv command 0x46574c44
1,283,820 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,705 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,875 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,212 >>> mbox cmd response: success
2,828,304 UART: [afmc] ++
2,828,472 UART: [afmc] CDI.KEYID = 6
2,828,834 UART: [afmc] SUBJECT.KEYID = 7
2,829,259 UART: [afmc] AUTHORITY.KEYID = 5
2,864,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,791 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,500 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,383 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,084 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,984 UART: [afmc] --
2,908,086 UART: [cold-reset] --
2,908,976 UART: [state] Locking Datavault
2,910,207 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,811 UART: [state] Locking ICCM
2,911,279 UART: [exit] Launching FMC @ 0x40000130
2,916,609 UART:
2,916,625 UART: Running Caliptra FMC ...
2,917,033 UART:
2,917,087 UART: [state] CFI Enabled
2,927,361 UART: [fht] FMC Alias Private Key: 7
3,046,693 UART: [art] Extend RT PCRs Done
3,047,121 UART: [art] Lock RT PCRs Done
3,048,669 UART: [art] Populate DV Done
3,057,190 UART: [fht] FMC Alias Private Key: 7
3,058,344 UART: [art] Derive CDI
3,058,624 UART: [art] Store in slot 0x4
3,144,695 UART: [art] Derive Key Pair
3,145,055 UART: [art] Store priv key in slot 0x5
3,157,821 UART: [art] Derive Key Pair - Done
3,172,871 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,731 UART: [art] PUB.X = F1760A221D835EF3F881DCCAC1BD735B269B61D5E1C56ABDE222776296AFDD1F8E17E35267706E19D0BD7379147DAD94
3,195,508 UART: [art] PUB.Y = C89181CED6298E05205CB5DF8943A79D60947CD4E8C8AA368289F84E773868C500888626C9FDFFA024E7A825E7A9AD7B
3,202,437 UART: [art] SIG.R = 66A3B5158CA1B13D95B474DC3AC158433F23749B73FAAADF695291C5932E6676348A9471597799EF239BF1AE3EF8DD47
3,209,209 UART: [art] SIG.S = 50F7AF2CBAEB564A7CFF2F11AB2F1377B99A8A02CECD2AFF94B0E23926BD81286BD8E439749B40382D7D61B4D5AB2466
3,232,456 UART: Caliptra RT
3,232,707 UART: [state] CFI Enabled
3,352,861 UART: [rt] RT listening for mailbox commands...
3,353,531 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,701 UART: [rt]cmd =0x41544d4e, len=14344
3,786,144 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,655 ready_for_fw is high
1,060,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,572 >>> mbox cmd response: success
2,740,827 UART:
2,740,843 UART: Running Caliptra FMC ...
2,741,251 UART:
2,741,305 UART: [state] CFI Enabled
2,751,277 UART: [fht] FMC Alias Private Key: 7
2,870,637 UART: [art] Extend RT PCRs Done
2,871,065 UART: [art] Lock RT PCRs Done
2,872,427 UART: [art] Populate DV Done
2,880,906 UART: [fht] FMC Alias Private Key: 7
2,881,894 UART: [art] Derive CDI
2,882,174 UART: [art] Store in slot 0x4
2,967,595 UART: [art] Derive Key Pair
2,967,955 UART: [art] Store priv key in slot 0x5
2,981,179 UART: [art] Derive Key Pair - Done
2,996,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,686 UART: [art] PUB.X = 42ED1AF79907C26E184CA9FE02A283578A933B3C9EDE16C811FED29F13D4337EDE900B3EA47441B3CB42942207E0403D
3,019,450 UART: [art] PUB.Y = B38481622A0109953BD4FFC6924A11DD874B191AD4C9F530DD4D3103E855D72630A0113B3057455E063E0C4EC457522F
3,026,379 UART: [art] SIG.R = CE559229DDB5B6911EFC97463D31F966232A9CDE7DB664BF244BB9BE6A5E60980950F8C1E981DF972500C35F0AC39A5A
3,033,131 UART: [art] SIG.S = 1F2A97B733C3203A17BE50B184F9D5973CB856B60873D31E36E8914139F11A8D3A130B5DCE32A87C68E29A763CA07EF1
3,056,569 UART: Caliptra RT
3,056,820 UART: [state] CFI Enabled
3,177,027 UART: [rt] RT listening for mailbox commands...
3,177,697 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,543 UART: [rt]cmd =0x41544d4e, len=14344
3,610,442 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,011 UART: [state] LifecycleState = Unprovisioned
85,666 UART: [state] DebugLocked = No
86,206 UART: [state] WD Timer not started. Device not locked for debugging
87,413 UART: [kat] SHA2-256
893,063 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,188 UART: [kat] ++
897,340 UART: [kat] sha1
901,658 UART: [kat] SHA2-256
903,598 UART: [kat] SHA2-384
906,343 UART: [kat] SHA2-512-ACC
908,244 UART: [kat] ECC-384
918,309 UART: [kat] HMAC-384Kdf
923,021 UART: [kat] LMS
1,171,349 UART: [kat] --
1,172,058 UART: [cold-reset] ++
1,172,566 UART: [fht] FHT @ 0x50003400
1,175,187 UART: [idev] ++
1,175,355 UART: [idev] CDI.KEYID = 6
1,175,715 UART: [idev] SUBJECT.KEYID = 7
1,176,139 UART: [idev] UDS.KEYID = 0
1,176,484 ready_for_fw is high
1,176,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,677 UART: [idev] Erasing UDS.KEYID = 0
1,200,726 UART: [idev] Sha1 KeyId Algorithm
1,209,294 UART: [idev] --
1,210,358 UART: [ldev] ++
1,210,526 UART: [ldev] CDI.KEYID = 6
1,210,889 UART: [ldev] SUBJECT.KEYID = 5
1,211,315 UART: [ldev] AUTHORITY.KEYID = 7
1,211,778 UART: [ldev] FE.KEYID = 1
1,217,052 UART: [ldev] Erasing FE.KEYID = 1
1,243,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,064 UART: [ldev] --
1,282,481 UART: [fwproc] Wait for Commands...
1,283,193 UART: [fwproc] Recv command 0x46574c44
1,283,921 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,181 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,351 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,678 >>> mbox cmd response: success
2,827,710 UART: [afmc] ++
2,827,878 UART: [afmc] CDI.KEYID = 6
2,828,240 UART: [afmc] SUBJECT.KEYID = 7
2,828,665 UART: [afmc] AUTHORITY.KEYID = 5
2,864,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,259 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,968 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,851 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,552 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,384 UART: [afmc] --
2,907,468 UART: [cold-reset] --
2,908,324 UART: [state] Locking Datavault
2,909,263 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,867 UART: [state] Locking ICCM
2,910,403 UART: [exit] Launching FMC @ 0x40000130
2,915,733 UART:
2,915,749 UART: Running Caliptra FMC ...
2,916,157 UART:
2,916,300 UART: [state] CFI Enabled
2,926,876 UART: [fht] FMC Alias Private Key: 7
3,045,782 UART: [art] Extend RT PCRs Done
3,046,210 UART: [art] Lock RT PCRs Done
3,047,616 UART: [art] Populate DV Done
3,056,037 UART: [fht] FMC Alias Private Key: 7
3,056,975 UART: [art] Derive CDI
3,057,255 UART: [art] Store in slot 0x4
3,143,292 UART: [art] Derive Key Pair
3,143,652 UART: [art] Store priv key in slot 0x5
3,157,116 UART: [art] Derive Key Pair - Done
3,171,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,898 UART: [art] PUB.X = E993092C1213EBC574431F0AF9A48D63E32349838CD9419A634C046CA758CC5C97192719337BCF0817265D3F23635F98
3,194,646 UART: [art] PUB.Y = 101C1EE784B1873B3052355DC49219F9F30B712866DC4ADF4D63D719F74917D70B73E21B90E7B4506BA3432A10F97E81
3,201,586 UART: [art] SIG.R = 1E9EC83B8EED017C8FEC1159E66B8585B25E5096658A08DC3C03DE0A8AA155691801064F0859217A02F08F49753609CB
3,208,327 UART: [art] SIG.S = 541CEF88399571523204A2B006291D5834731ADEE997250744D0FD272947035595ED7DD85624BD40B030C9E20C58344C
3,232,446 UART: Caliptra RT
3,232,789 UART: [state] CFI Enabled
3,352,065 UART: [rt] RT listening for mailbox commands...
3,352,735 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,851 UART: [rt]cmd =0x41544d4e, len=14344
3,785,454 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,950 ready_for_fw is high
1,059,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,285 >>> mbox cmd response: success
2,742,064 UART:
2,742,080 UART: Running Caliptra FMC ...
2,742,488 UART:
2,742,631 UART: [state] CFI Enabled
2,753,313 UART: [fht] FMC Alias Private Key: 7
2,872,707 UART: [art] Extend RT PCRs Done
2,873,135 UART: [art] Lock RT PCRs Done
2,874,685 UART: [art] Populate DV Done
2,882,840 UART: [fht] FMC Alias Private Key: 7
2,883,788 UART: [art] Derive CDI
2,884,068 UART: [art] Store in slot 0x4
2,969,751 UART: [art] Derive Key Pair
2,970,111 UART: [art] Store priv key in slot 0x5
2,983,699 UART: [art] Derive Key Pair - Done
2,998,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,409 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,174 UART: [art] PUB.X = 36E8CAC757D56A8035264B9E22ECEF369000FC5CDCA9F5C3A67EAFCCC109AA3F93A39916BB3C3E0385AF08C44F6B3F50
3,021,933 UART: [art] PUB.Y = A9077D743871136FE3D87AFB9BD8842617274B51097A6C42E685AA6B3E9992D2A85B62B8CD3ED41756A2B2542AB6AFAC
3,028,883 UART: [art] SIG.R = 77700C4D2FE228AD4A2FF6FF502607CECA2841C87308BF97BB4D980FFE29FC391AF5C24429D23D5CB7C105405729F2A4
3,035,648 UART: [art] SIG.S = E5E901FBC1B2A868C577CDCEED0486473461CB1F66CA737E92AB7830B44538D5E66801B05A6B48DBDCB404773C7099C7
3,059,650 UART: Caliptra RT
3,059,993 UART: [state] CFI Enabled
3,179,974 UART: [rt] RT listening for mailbox commands...
3,180,644 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,856 UART: [rt]cmd =0x41544d4e, len=14344
3,613,393 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,077 UART:
192,420 UART: Running Caliptra ROM ...
193,620 UART:
193,776 UART: [state] CFI Enabled
265,916 UART: [state] LifecycleState = Unprovisioned
267,839 UART: [state] DebugLocked = No
270,092 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,536 UART: [kat] SHA2-256
444,254 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,729 UART: [kat] ++
455,256 UART: [kat] sha1
466,196 UART: [kat] SHA2-256
468,917 UART: [kat] SHA2-384
474,972 UART: [kat] SHA2-512-ACC
477,341 UART: [kat] ECC-384
2,768,437 UART: [kat] HMAC-384Kdf
2,800,818 UART: [kat] LMS
3,991,131 UART: [kat] --
3,996,448 UART: [cold-reset] ++
3,997,392 UART: [fht] Storing FHT @ 0x50003400
4,008,940 UART: [idev] ++
4,009,526 UART: [idev] CDI.KEYID = 6
4,010,421 UART: [idev] SUBJECT.KEYID = 7
4,011,667 UART: [idev] UDS.KEYID = 0
4,012,732 ready_for_fw is high
4,012,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,042 UART: [idev] Erasing UDS.KEYID = 0
7,347,163 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,739 UART: [idev] --
7,371,598 UART: [ldev] ++
7,372,169 UART: [ldev] CDI.KEYID = 6
7,373,191 UART: [ldev] SUBJECT.KEYID = 5
7,374,352 UART: [ldev] AUTHORITY.KEYID = 7
7,375,638 UART: [ldev] FE.KEYID = 1
7,421,765 UART: [ldev] Erasing FE.KEYID = 1
10,753,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,901 UART: [ldev] --
13,115,057 UART: [fwproc] Waiting for Commands...
13,117,327 UART: [fwproc] Received command 0x46574c44
13,119,567 UART: [fwproc] Received Image of size 118548 bytes
22,209,539 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,294,323 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,367,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,695,137 >>> mbox cmd response: success
22,699,707 UART: [afmc] ++
22,700,324 UART: [afmc] CDI.KEYID = 6
22,701,212 UART: [afmc] SUBJECT.KEYID = 7
22,702,490 UART: [afmc] AUTHORITY.KEYID = 5
26,060,906 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,356,908 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,359,164 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,373,673 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,388,433 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,402,804 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,423,001 UART: [afmc] --
28,426,437 UART: [cold-reset] --
28,429,758 UART: [state] Locking Datavault
28,435,490 UART: [state] Locking PCR0, PCR1 and PCR31
28,437,630 UART: [state] Locking ICCM
28,438,800 UART: [exit] Launching FMC @ 0x40000130
28,447,211 UART:
28,447,456 UART: Running Caliptra FMC ...
28,448,483 UART:
28,448,629 UART: [state] CFI Enabled
28,516,517 UART: [fht] FMC Alias Private Key: 7
30,857,134 UART: [art] Extend RT PCRs Done
30,858,363 UART: [art] Lock RT PCRs Done
30,860,232 UART: [art] Populate DV Done
30,865,480 UART: [fht] FMC Alias Private Key: 7
30,867,014 UART: [art] Derive CDI
30,867,832 UART: [art] Store in slot 0x4
30,924,219 UART: [art] Derive Key Pair
30,925,261 UART: [art] Store priv key in slot 0x5
34,218,040 UART: [art] Derive Key Pair - Done
34,231,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,521,233 UART: [art] Erasing AUTHORITY.KEYID = 7
36,522,755 UART: [art] PUB.X = 0F93032562AB09BB910B6DE0780B8437FF54BB38ACE1563362C125376A6EB3D9B86DBC714D8CF350A56407F810FB5FC8
36,530,029 UART: [art] PUB.Y = 82349ABBFCDB26EE4F43D6754821310DED12B22A76B50A500D4D8C1B05B13726814C14ED14A4BEA44FD19EE9AF7A73B5
36,537,291 UART: [art] SIG.R = 6F57CD2192EEDED27F7596CDE1C0FBE3D215895CA7C18A15928B01F4064E8B57CE6B8FBC36C41A359C18F323ADE5E2FD
36,544,709 UART: [art] SIG.S = 9927270AF16EA26B284DF8A9A56D57A472929FD1E5A513F740792FCDD36E5F281CCA18023579513203E66BBD68368475
37,849,744 UART: Caliptra RT
37,850,491 UART: [state] CFI Enabled
38,025,860 UART: [rt] RT listening for mailbox commands...
38,028,158 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,183,480 UART: [rt]cmd =0x41544d4e, len=14344
38,185,340 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,804,758 ready_for_fw is high
3,805,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,235,649 >>> mbox cmd response: success
27,918,909 UART:
27,919,334 UART: Running Caliptra FMC ...
27,920,475 UART:
27,920,641 UART: [state] CFI Enabled
27,988,569 UART: [fht] FMC Alias Private Key: 7
30,328,611 UART: [art] Extend RT PCRs Done
30,329,835 UART: [art] Lock RT PCRs Done
30,331,434 UART: [art] Populate DV Done
30,337,010 UART: [fht] FMC Alias Private Key: 7
30,338,604 UART: [art] Derive CDI
30,339,419 UART: [art] Store in slot 0x4
30,396,404 UART: [art] Derive Key Pair
30,397,444 UART: [art] Store priv key in slot 0x5
33,689,878 UART: [art] Derive Key Pair - Done
33,702,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,990,981 UART: [art] Erasing AUTHORITY.KEYID = 7
35,992,498 UART: [art] PUB.X = E465F3BE3A96971AFAF5A187CF8F4516A9E7858D461D387B10B59620266D9ABB5FAF8D7958C120E6056660E5FE942499
35,999,706 UART: [art] PUB.Y = 9A111BFAE39A2CD219B95247B7E10653B06D900A795CFDFC05EA8616A52FCCF7D27C8ADD9E65154B5B4B9048DB295DE7
36,007,036 UART: [art] SIG.R = 6B43D33B780567CBF9969B4BFCD22752602BE0356CC80B3D6B6DE779DCEFCDAEBF0ED2A942BA05121794F2A5F16350C9
36,014,398 UART: [art] SIG.S = EE3C8C7BFD612462AA1B8AD7C8425B84C87DC9B018A2F2DBBBCAA415C9CEB61BA4C147364D5E73EFBB797804C0441D99
37,319,645 UART: Caliptra RT
37,320,364 UART: [state] CFI Enabled
37,516,895 UART: [rt] RT listening for mailbox commands...
37,519,269 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,674,651 UART: [rt]cmd =0x41544d4e, len=14344
37,676,621 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,533 UART:
192,883 UART: Running Caliptra ROM ...
194,070 UART:
603,557 UART: [state] CFI Enabled
614,386 UART: [state] LifecycleState = Unprovisioned
616,334 UART: [state] DebugLocked = No
618,916 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,611 UART: [kat] SHA2-256
793,398 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,910 UART: [kat] ++
804,354 UART: [kat] sha1
815,001 UART: [kat] SHA2-256
817,684 UART: [kat] SHA2-384
821,933 UART: [kat] SHA2-512-ACC
824,300 UART: [kat] ECC-384
3,110,284 UART: [kat] HMAC-384Kdf
3,123,287 UART: [kat] LMS
4,313,424 UART: [kat] --
4,318,649 UART: [cold-reset] ++
4,319,725 UART: [fht] Storing FHT @ 0x50003400
4,331,124 UART: [idev] ++
4,331,693 UART: [idev] CDI.KEYID = 6
4,332,678 UART: [idev] SUBJECT.KEYID = 7
4,333,916 UART: [idev] UDS.KEYID = 0
4,334,973 ready_for_fw is high
4,335,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,027 UART: [idev] Erasing UDS.KEYID = 0
7,618,048 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,455 UART: [idev] --
7,642,759 UART: [ldev] ++
7,643,328 UART: [ldev] CDI.KEYID = 6
7,644,278 UART: [ldev] SUBJECT.KEYID = 5
7,645,490 UART: [ldev] AUTHORITY.KEYID = 7
7,646,772 UART: [ldev] FE.KEYID = 1
7,656,471 UART: [ldev] Erasing FE.KEYID = 1
10,949,367 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,298 UART: [ldev] --
13,306,217 UART: [fwproc] Waiting for Commands...
13,309,491 UART: [fwproc] Received command 0x46574c44
13,311,664 UART: [fwproc] Received Image of size 118548 bytes
22,318,522 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,401,386 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,474,558 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,802,178 >>> mbox cmd response: success
22,806,380 UART: [afmc] ++
22,806,990 UART: [afmc] CDI.KEYID = 6
22,807,906 UART: [afmc] SUBJECT.KEYID = 7
22,809,114 UART: [afmc] AUTHORITY.KEYID = 5
26,128,289 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,419,612 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,421,859 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,436,359 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,451,166 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,465,525 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,487,799 UART: [afmc] --
28,491,717 UART: [cold-reset] --
28,495,412 UART: [state] Locking Datavault
28,500,396 UART: [state] Locking PCR0, PCR1 and PCR31
28,502,187 UART: [state] Locking ICCM
28,503,357 UART: [exit] Launching FMC @ 0x40000130
28,511,751 UART:
28,511,989 UART: Running Caliptra FMC ...
28,513,084 UART:
28,513,244 UART: [state] CFI Enabled
28,521,230 UART: [fht] FMC Alias Private Key: 7
30,861,500 UART: [art] Extend RT PCRs Done
30,862,736 UART: [art] Lock RT PCRs Done
30,864,687 UART: [art] Populate DV Done
30,870,150 UART: [fht] FMC Alias Private Key: 7
30,871,734 UART: [art] Derive CDI
30,872,466 UART: [art] Store in slot 0x4
30,915,329 UART: [art] Derive Key Pair
30,916,364 UART: [art] Store priv key in slot 0x5
34,158,210 UART: [art] Derive Key Pair - Done
34,171,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,451,702 UART: [art] Erasing AUTHORITY.KEYID = 7
36,453,229 UART: [art] PUB.X = 48D8551286DE4713DD801D2408A5A22118D14D74E1BD01D4C885ECC3B3DC2E43EB02E111761A51A012A36EA667C5E1AB
36,460,489 UART: [art] PUB.Y = E1E9DAFF51FEFEF01D835C5CAE557EA0DB3D50C76E37BB17A5BADBC8DCC3B3DFF0807DAA9CA64EA87A03ACA0DA729F20
36,467,785 UART: [art] SIG.R = DA0BECAB61EBDCED80C0AFB6DC4311F9C5A3C2A13144C3BECAB527E3D9B7264D3A925B4C86699AC894087374F27F24F6
36,475,230 UART: [art] SIG.S = 8D7640F1D19174B8B16F25B41CE6CD28A394B920D82008A2D110B0D9EE292A1EC44C8949284E7075A709F5BA0039B849
37,780,050 UART: Caliptra RT
37,781,092 UART: [state] CFI Enabled
37,913,738 UART: [rt] RT listening for mailbox commands...
37,916,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,071,460 UART: [rt]cmd =0x41544d4e, len=14344
38,073,426 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
4,129,024 ready_for_fw is high
4,129,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,337,739 >>> mbox cmd response: success
27,980,521 UART:
27,980,942 UART: Running Caliptra FMC ...
27,982,064 UART:
27,982,225 UART: [state] CFI Enabled
27,989,888 UART: [fht] FMC Alias Private Key: 7
30,330,109 UART: [art] Extend RT PCRs Done
30,331,332 UART: [art] Lock RT PCRs Done
30,333,253 UART: [art] Populate DV Done
30,338,712 UART: [fht] FMC Alias Private Key: 7
30,340,324 UART: [art] Derive CDI
30,341,060 UART: [art] Store in slot 0x4
30,383,880 UART: [art] Derive Key Pair
30,384,921 UART: [art] Store priv key in slot 0x5
33,627,172 UART: [art] Derive Key Pair - Done
33,640,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,920,554 UART: [art] Erasing AUTHORITY.KEYID = 7
35,922,082 UART: [art] PUB.X = CD63FCF73B93CA0130A478D152975F16E935AA54B42606A0219DC537678FF0197F899DBF14487D56A9D692F98D6B30D9
35,929,345 UART: [art] PUB.Y = 9D7C87F2B7C42ECC244742883612E26322DFA71E27233E300627FDDF0A3B9938DC1DC0E453C73E7AC25A668DB460D369
35,936,547 UART: [art] SIG.R = F1A57DE080A404048B8779AE5937B31C18A9675A5EE1EB3026704242D60EA138D052E3367396AB8C567D037DE2AED4C9
35,943,940 UART: [art] SIG.S = B536A9D61E858FB7E021CE94F8E9F3A702D6935EBD10886B053947CEBCD149D02D77983E39E7921376C8E4AD9205638E
37,249,467 UART: Caliptra RT
37,250,178 UART: [state] CFI Enabled
37,383,599 UART: [rt] RT listening for mailbox commands...
37,386,070 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,541,462 UART: [rt]cmd =0x41544d4e, len=14344
37,543,070 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,160 UART:
192,516 UART: Running Caliptra ROM ...
193,626 UART:
193,765 UART: [state] CFI Enabled
265,118 UART: [state] LifecycleState = Unprovisioned
267,055 UART: [state] DebugLocked = No
270,068 UART: [state] WD Timer not started. Device not locked for debugging
274,595 UART: [kat] SHA2-256
454,189 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,018 UART: [kat] ++
465,474 UART: [kat] sha1
476,914 UART: [kat] SHA2-256
479,561 UART: [kat] SHA2-384
485,690 UART: [kat] SHA2-512-ACC
488,053 UART: [kat] ECC-384
2,948,259 UART: [kat] HMAC-384Kdf
2,970,537 UART: [kat] LMS
3,447,072 UART: [kat] --
3,451,426 UART: [cold-reset] ++
3,453,353 UART: [fht] FHT @ 0x50003400
3,464,824 UART: [idev] ++
3,465,392 UART: [idev] CDI.KEYID = 6
3,466,274 UART: [idev] SUBJECT.KEYID = 7
3,467,587 UART: [idev] UDS.KEYID = 0
3,468,559 ready_for_fw is high
3,468,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,005 UART: [idev] Erasing UDS.KEYID = 0
5,982,707 UART: [idev] Sha1 KeyId Algorithm
6,007,676 UART: [idev] --
6,011,079 UART: [ldev] ++
6,011,653 UART: [ldev] CDI.KEYID = 6
6,012,585 UART: [ldev] SUBJECT.KEYID = 5
6,013,804 UART: [ldev] AUTHORITY.KEYID = 7
6,015,037 UART: [ldev] FE.KEYID = 1
6,056,404 UART: [ldev] Erasing FE.KEYID = 1
8,566,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,378 UART: [ldev] --
10,375,463 UART: [fwproc] Wait for Commands...
10,377,446 UART: [fwproc] Recv command 0x46574c44
10,379,491 UART: [fwproc] Recv'd Img size: 118548 bytes
14,950,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,029,147 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,102,168 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,431,162 >>> mbox cmd response: success
15,435,525 UART: [afmc] ++
15,436,121 UART: [afmc] CDI.KEYID = 6
15,437,006 UART: [afmc] SUBJECT.KEYID = 7
15,438,283 UART: [afmc] AUTHORITY.KEYID = 5
17,977,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,703,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,705,412 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,721,281 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,737,172 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,752,876 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,777,731 UART: [afmc] --
19,781,216 UART: [cold-reset] --
19,785,291 UART: [state] Locking Datavault
19,790,962 UART: [state] Locking PCR0, PCR1 and PCR31
19,792,861 UART: [state] Locking ICCM
19,794,314 UART: [exit] Launching FMC @ 0x40000130
19,802,725 UART:
19,802,962 UART: Running Caliptra FMC ...
19,803,998 UART:
19,804,142 UART: [state] CFI Enabled
19,857,899 UART: [fht] FMC Alias Private Key: 7
21,624,288 UART: [art] Extend RT PCRs Done
21,625,505 UART: [art] Lock RT PCRs Done
21,627,256 UART: [art] Populate DV Done
21,632,500 UART: [fht] FMC Alias Private Key: 7
21,634,178 UART: [art] Derive CDI
21,634,920 UART: [art] Store in slot 0x4
21,691,361 UART: [art] Derive Key Pair
21,692,355 UART: [art] Store priv key in slot 0x5
24,155,295 UART: [art] Derive Key Pair - Done
24,168,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,881,566 UART: [art] Erasing AUTHORITY.KEYID = 7
25,883,077 UART: [art] PUB.X = 873726EF94DA696D3DBFADF72042AFF39DE4F6E021B057DFBB0E405D8020E588F447339A3151ACA2A540EC97AD80907B
25,890,331 UART: [art] PUB.Y = 18E5E24F45656D81FD60B7FE491610AD3366D1A6FA4328C1BD7FF7B3B0E1612DC8277AED814C05298E4AB72E389A6F41
25,897,621 UART: [art] SIG.R = 6BF2919DB1196D5FD74DB32B88B390F4E85EFFAEAF196F49E90BA057BAF5B31CB0F42BB41EB12E07C3F4CDAFA9442200
25,905,012 UART: [art] SIG.S = AECC97CB64555247F848BBBB1A5B06E8072B3C03D1A8440F600DF63DD51E54992029D05EB11E561C45539AAF6D8A6BB8
26,883,798 UART: Caliptra RT
26,884,483 UART: [state] CFI Enabled
27,065,706 UART: [rt] RT listening for mailbox commands...
27,068,001 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,223,325 UART: [rt]cmd =0x41544d4e, len=14344
27,224,961 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,459,507 ready_for_fw is high
3,459,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,387,765 >>> mbox cmd response: success
19,669,620 UART:
19,670,000 UART: Running Caliptra FMC ...
19,671,206 UART:
19,671,368 UART: [state] CFI Enabled
19,735,574 UART: [fht] FMC Alias Private Key: 7
21,502,412 UART: [art] Extend RT PCRs Done
21,503,633 UART: [art] Lock RT PCRs Done
21,505,149 UART: [art] Populate DV Done
21,510,408 UART: [fht] FMC Alias Private Key: 7
21,512,052 UART: [art] Derive CDI
21,512,866 UART: [art] Store in slot 0x4
21,568,789 UART: [art] Derive Key Pair
21,569,831 UART: [art] Store priv key in slot 0x5
24,032,616 UART: [art] Derive Key Pair - Done
24,045,561 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,758,461 UART: [art] Erasing AUTHORITY.KEYID = 7
25,759,963 UART: [art] PUB.X = 04E9FF368455D50E767D36FD12792985D95B7D40EFCB93E904C84D3043BF6C5B119BEB91CFAA249D8B961B82EC132DAA
25,767,214 UART: [art] PUB.Y = 9EB4F331AE1ACCAECA32CF3C94072FC3A14445A347D63E877556E5CA6872AF72E513B75BEBE58D27EACBA955FCE46DD1
25,774,508 UART: [art] SIG.R = 5456B3D365D520D6D6F4C365A437805DD4ABB1E6C75FB033FC99D03FDC153F3E6D46015BC47FCB0D95408F6DF53004BA
25,781,910 UART: [art] SIG.S = 35D35216722986809C6C070D1D970CE8ECB0711731B824D5D766B4F6D30BC263B9EE3AC659C1D8AE92C2A3B2796603D4
26,761,247 UART: Caliptra RT
26,761,954 UART: [state] CFI Enabled
26,942,949 UART: [rt] RT listening for mailbox commands...
26,945,236 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,100,771 UART: [rt]cmd =0x41544d4e, len=14344
27,102,635 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
192,529 UART:
192,904 UART: Running Caliptra ROM ...
194,109 UART:
603,642 UART: [state] CFI Enabled
615,679 UART: [state] LifecycleState = Unprovisioned
617,633 UART: [state] DebugLocked = No
619,682 UART: [state] WD Timer not started. Device not locked for debugging
623,321 UART: [kat] SHA2-256
802,989 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,812 UART: [kat] ++
814,260 UART: [kat] sha1
825,373 UART: [kat] SHA2-256
828,102 UART: [kat] SHA2-384
834,241 UART: [kat] SHA2-512-ACC
836,613 UART: [kat] ECC-384
3,276,467 UART: [kat] HMAC-384Kdf
3,288,696 UART: [kat] LMS
3,765,186 UART: [kat] --
3,769,552 UART: [cold-reset] ++
3,771,068 UART: [fht] FHT @ 0x50003400
3,782,619 UART: [idev] ++
3,783,185 UART: [idev] CDI.KEYID = 6
3,784,138 UART: [idev] SUBJECT.KEYID = 7
3,785,380 UART: [idev] UDS.KEYID = 0
3,786,281 ready_for_fw is high
3,786,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,310 UART: [idev] Erasing UDS.KEYID = 0
6,261,667 UART: [idev] Sha1 KeyId Algorithm
6,286,078 UART: [idev] --
6,291,426 UART: [ldev] ++
6,291,998 UART: [ldev] CDI.KEYID = 6
6,292,916 UART: [ldev] SUBJECT.KEYID = 5
6,294,135 UART: [ldev] AUTHORITY.KEYID = 7
6,295,391 UART: [ldev] FE.KEYID = 1
6,306,104 UART: [ldev] Erasing FE.KEYID = 1
8,781,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,522 UART: [ldev] --
10,578,679 UART: [fwproc] Wait for Commands...
10,580,675 UART: [fwproc] Recv command 0x46574c44
10,582,714 UART: [fwproc] Recv'd Img size: 118548 bytes
15,121,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,203,057 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,276,062 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,604,673 >>> mbox cmd response: success
15,609,106 UART: [afmc] ++
15,609,742 UART: [afmc] CDI.KEYID = 6
15,610,663 UART: [afmc] SUBJECT.KEYID = 7
15,611,884 UART: [afmc] AUTHORITY.KEYID = 5
18,117,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,841,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,843,625 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,859,505 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,875,423 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,891,115 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,915,236 UART: [afmc] --
19,919,818 UART: [cold-reset] --
19,922,759 UART: [state] Locking Datavault
19,929,086 UART: [state] Locking PCR0, PCR1 and PCR31
19,930,790 UART: [state] Locking ICCM
19,933,294 UART: [exit] Launching FMC @ 0x40000130
19,941,691 UART:
19,941,944 UART: Running Caliptra FMC ...
19,942,971 UART:
19,943,120 UART: [state] CFI Enabled
19,951,123 UART: [fht] FMC Alias Private Key: 7
21,716,615 UART: [art] Extend RT PCRs Done
21,717,842 UART: [art] Lock RT PCRs Done
21,719,549 UART: [art] Populate DV Done
21,725,018 UART: [fht] FMC Alias Private Key: 7
21,726,616 UART: [art] Derive CDI
21,727,433 UART: [art] Store in slot 0x4
21,770,030 UART: [art] Derive Key Pair
21,771,070 UART: [art] Store priv key in slot 0x5
24,198,350 UART: [art] Derive Key Pair - Done
24,211,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,917,518 UART: [art] Erasing AUTHORITY.KEYID = 7
25,919,021 UART: [art] PUB.X = 7858B40AA6F53F87BEB1D2F5E8A78646FD50BEAA448E6A84FC2A0C709C74C8464CCDD491E64BD217504D26EF8F94ECED
25,926,341 UART: [art] PUB.Y = BA10FDBA07332393ED98623E08584CF821AA99B63B788264CCA1C195D5607C8E2C6E99268B1D7D232FCD392277C8C1C0
25,933,578 UART: [art] SIG.R = E0B3CA1A9E2FA9F1620C703737F857BE876F9869F99C973849CE9248854D51CFB8F0C0209632CDAACC1653686B3BF61D
25,940,965 UART: [art] SIG.S = 91B1DC19F8FAA8AF99DBB8BDEBDF4BBB304845EFE56264E07186EE401B20753B0947580F33D6E652EDBA09A520DF5BE9
26,919,954 UART: Caliptra RT
26,920,644 UART: [state] CFI Enabled
27,053,812 UART: [rt] RT listening for mailbox commands...
27,056,112 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,211,428 UART: [rt]cmd =0x41544d4e, len=14344
27,213,232 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,488 writing to cptra_bootfsm_go
3,777,581 ready_for_fw is high
3,778,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,566,540 >>> mbox cmd response: success
19,814,198 UART:
19,814,588 UART: Running Caliptra FMC ...
19,815,697 UART:
19,815,852 UART: [state] CFI Enabled
19,823,752 UART: [fht] FMC Alias Private Key: 7
21,590,130 UART: [art] Extend RT PCRs Done
21,591,355 UART: [art] Lock RT PCRs Done
21,593,113 UART: [art] Populate DV Done
21,598,393 UART: [fht] FMC Alias Private Key: 7
21,600,100 UART: [art] Derive CDI
21,600,920 UART: [art] Store in slot 0x4
21,643,564 UART: [art] Derive Key Pair
21,644,565 UART: [art] Store priv key in slot 0x5
24,071,318 UART: [art] Derive Key Pair - Done
24,084,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,791,135 UART: [art] Erasing AUTHORITY.KEYID = 7
25,792,636 UART: [art] PUB.X = 1A1FE62E41A9D6F4241FC83BB8566E7CFC5FE15CC2BE9246321A9E97DBB48979791862AF86D54E3B217BFD63003EABE0
25,799,901 UART: [art] PUB.Y = 4635ADD4B8523EA6BA85B8A30C10B5322371AEBF1FF1926F9E0E54A02E23341D57480D73E9BC0A80D57B252804660E4A
25,807,137 UART: [art] SIG.R = 3D4A5B7F41A48DD435BB5D91F4F18801F6DC33E8EEF6117881EE96E96DB69D1990D4C94BBBA9E9B5BCCAF34F89EB8CEE
25,814,598 UART: [art] SIG.S = D51B0BFD9E941614A020EBF27C6773E2FC2811F1A5F1F385A42F7E42B23F62D07A45BE9D946107674C54A8FB0285206D
26,793,353 UART: Caliptra RT
26,794,042 UART: [state] CFI Enabled
26,926,926 UART: [rt] RT listening for mailbox commands...
26,929,218 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,084,553 UART: [rt]cmd =0x41544d4e, len=14344
27,086,196 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,863 writing to cptra_bootfsm_go
192,937 UART:
193,286 UART: Running Caliptra ROM ...
194,384 UART:
194,523 UART: [state] CFI Enabled
265,591 UART: [state] LifecycleState = Unprovisioned
268,027 UART: [state] DebugLocked = No
270,832 UART: [state] WD Timer not started. Device not locked for debugging
275,784 UART: [kat] SHA2-256
465,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,439 UART: [kat] ++
476,886 UART: [kat] sha1
488,841 UART: [kat] SHA2-256
491,908 UART: [kat] SHA2-384
498,970 UART: [kat] SHA2-512-ACC
501,562 UART: [kat] ECC-384
2,944,325 UART: [kat] HMAC-384Kdf
2,971,481 UART: [kat] LMS
3,503,285 UART: [kat] --
3,506,584 UART: [cold-reset] ++
3,508,227 UART: [fht] FHT @ 0x50003400
3,520,616 UART: [idev] ++
3,521,328 UART: [idev] CDI.KEYID = 6
3,522,390 UART: [idev] SUBJECT.KEYID = 7
3,523,506 UART: [idev] UDS.KEYID = 0
3,524,436 ready_for_fw is high
3,524,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,627 UART: [idev] Erasing UDS.KEYID = 0
6,029,958 UART: [idev] Sha1 KeyId Algorithm
6,053,160 UART: [idev] --
6,059,101 UART: [ldev] ++
6,059,783 UART: [ldev] CDI.KEYID = 6
6,060,799 UART: [ldev] SUBJECT.KEYID = 5
6,061,849 UART: [ldev] AUTHORITY.KEYID = 7
6,063,125 UART: [ldev] FE.KEYID = 1
6,099,146 UART: [ldev] Erasing FE.KEYID = 1
8,605,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,488 UART: [ldev] --
10,409,948 UART: [fwproc] Wait for Commands...
10,412,805 UART: [fwproc] Recv command 0x46574c44
10,415,055 UART: [fwproc] Recv'd Img size: 118548 bytes
15,096,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,177,449 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,301,069 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,861,704 >>> mbox cmd response: success
15,865,367 UART: [afmc] ++
15,866,038 UART: [afmc] CDI.KEYID = 6
15,867,288 UART: [afmc] SUBJECT.KEYID = 7
15,868,728 UART: [afmc] AUTHORITY.KEYID = 5
18,403,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,129,600 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,131,513 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,146,590 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,161,849 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,176,907 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,201,122 UART: [afmc] --
20,205,304 UART: [cold-reset] --
20,209,198 UART: [state] Locking Datavault
20,215,484 UART: [state] Locking PCR0, PCR1 and PCR31
20,217,627 UART: [state] Locking ICCM
20,219,424 UART: [exit] Launching FMC @ 0x40000130
20,228,095 UART:
20,228,325 UART: Running Caliptra FMC ...
20,229,359 UART:
20,229,505 UART: [state] CFI Enabled
20,286,573 UART: [fht] FMC Alias Private Key: 7
22,052,904 UART: [art] Extend RT PCRs Done
22,054,119 UART: [art] Lock RT PCRs Done
22,055,859 UART: [art] Populate DV Done
22,061,173 UART: [fht] FMC Alias Private Key: 7
22,062,872 UART: [art] Derive CDI
22,063,686 UART: [art] Store in slot 0x4
22,120,346 UART: [art] Derive Key Pair
22,121,405 UART: [art] Store priv key in slot 0x5
24,584,188 UART: [art] Derive Key Pair - Done
24,596,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,309,989 UART: [art] Erasing AUTHORITY.KEYID = 7
26,311,487 UART: [art] PUB.X = BB5D6EED6B873F86BFD2995508C4283E1053A0CE543C16615D540CF133CFA70C4852B884BC383028027F0EC6E92C9BCC
26,318,768 UART: [art] PUB.Y = 3D281E0920897D377577F976D446F1B2C3818B510BF91F2BCB4850813C1B50DD7845F605EC629166A1462C822592ADE3
26,326,001 UART: [art] SIG.R = 3E52081EBAE266D60084E86C84B10C45EE23D860556834CD3897DC20B0EC68B5449F7DF749DC09C8A65177267D385D98
26,333,336 UART: [art] SIG.S = EDAF2E3786F3ECD8B209F4876C6FAAC70E979D05595293294795ED15C2FE99E161EEBD56152EE38683A4988973EC8342
27,312,236 UART: Caliptra RT
27,312,923 UART: [state] CFI Enabled
27,494,178 UART: [rt] RT listening for mailbox commands...
27,496,494 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,651,811 UART: [rt]cmd =0x41544d4e, len=14344
27,653,769 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,438,778 ready_for_fw is high
3,439,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,916,525 >>> mbox cmd response: success
20,203,664 UART:
20,204,055 UART: Running Caliptra FMC ...
20,205,202 UART:
20,205,363 UART: [state] CFI Enabled
20,269,830 UART: [fht] FMC Alias Private Key: 7
22,035,991 UART: [art] Extend RT PCRs Done
22,037,215 UART: [art] Lock RT PCRs Done
22,039,023 UART: [art] Populate DV Done
22,044,276 UART: [fht] FMC Alias Private Key: 7
22,045,979 UART: [art] Derive CDI
22,046,797 UART: [art] Store in slot 0x4
22,102,215 UART: [art] Derive Key Pair
22,103,247 UART: [art] Store priv key in slot 0x5
24,565,784 UART: [art] Derive Key Pair - Done
24,578,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,291,603 UART: [art] Erasing AUTHORITY.KEYID = 7
26,293,124 UART: [art] PUB.X = E7134C4B96B9063C45D5C22CF76FC3D15DBCBF7E6515619A5410E2BDC7631FAC14C0EA0C982ABE565B16F9B756BB625C
26,300,398 UART: [art] PUB.Y = 84B7AE870DC28078F62182E17A65061BF974186AE8490CDEA084BA41E42B7012409F0D86BB29CFD985AEF6BEFB1A68B5
26,307,666 UART: [art] SIG.R = A3BBEF027F626A2F8E0DC0C2D006431A73C8BF2D367A5ED7951BDE9A446805C70DF9BA1CF91F91634C06B4AC5A84D66D
26,315,029 UART: [art] SIG.S = 42731495F7460E26595D6457B9995F871FB957FB02895709A5E2AD07BF1730075C8CB8073ECCFFA6A884881E70AB1D1A
27,294,615 UART: Caliptra RT
27,295,328 UART: [state] CFI Enabled
27,474,307 UART: [rt] RT listening for mailbox commands...
27,476,638 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,632,002 UART: [rt]cmd =0x41544d4e, len=14344
27,633,708 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,495 UART:
193,089 UART: Running Caliptra ROM ...
194,228 UART:
603,565 UART: [state] CFI Enabled
613,239 UART: [state] LifecycleState = Unprovisioned
615,671 UART: [state] DebugLocked = No
617,447 UART: [state] WD Timer not started. Device not locked for debugging
622,066 UART: [kat] SHA2-256
811,973 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
822,790 UART: [kat] ++
823,349 UART: [kat] sha1
835,443 UART: [kat] SHA2-256
838,460 UART: [kat] SHA2-384
844,450 UART: [kat] SHA2-512-ACC
847,034 UART: [kat] ECC-384
3,285,986 UART: [kat] HMAC-384Kdf
3,299,236 UART: [kat] LMS
3,831,050 UART: [kat] --
3,833,586 UART: [cold-reset] ++
3,835,107 UART: [fht] FHT @ 0x50003400
3,846,245 UART: [idev] ++
3,846,895 UART: [idev] CDI.KEYID = 6
3,847,885 UART: [idev] SUBJECT.KEYID = 7
3,849,061 UART: [idev] UDS.KEYID = 0
3,849,997 ready_for_fw is high
3,850,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,999,248 UART: [idev] Erasing UDS.KEYID = 0
6,324,948 UART: [idev] Sha1 KeyId Algorithm
6,347,755 UART: [idev] --
6,352,201 UART: [ldev] ++
6,352,885 UART: [ldev] CDI.KEYID = 6
6,353,808 UART: [ldev] SUBJECT.KEYID = 5
6,354,971 UART: [ldev] AUTHORITY.KEYID = 7
6,356,206 UART: [ldev] FE.KEYID = 1
6,364,909 UART: [ldev] Erasing FE.KEYID = 1
8,843,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,056 UART: [ldev] --
10,636,343 UART: [fwproc] Wait for Commands...
10,638,349 UART: [fwproc] Recv command 0x46574c44
10,640,664 UART: [fwproc] Recv'd Img size: 118548 bytes
15,314,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,400,117 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,523,708 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,083,859 >>> mbox cmd response: success
16,087,234 UART: [afmc] ++
16,087,987 UART: [afmc] CDI.KEYID = 6
16,089,148 UART: [afmc] SUBJECT.KEYID = 7
16,090,603 UART: [afmc] AUTHORITY.KEYID = 5
18,599,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,322,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,324,375 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,339,447 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,354,664 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,369,729 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,393,517 UART: [afmc] --
20,397,211 UART: [cold-reset] --
20,401,203 UART: [state] Locking Datavault
20,404,641 UART: [state] Locking PCR0, PCR1 and PCR31
20,406,811 UART: [state] Locking ICCM
20,409,047 UART: [exit] Launching FMC @ 0x40000130
20,417,691 UART:
20,417,935 UART: Running Caliptra FMC ...
20,419,044 UART:
20,419,217 UART: [state] CFI Enabled
20,426,946 UART: [fht] FMC Alias Private Key: 7
22,193,311 UART: [art] Extend RT PCRs Done
22,194,985 UART: [art] Lock RT PCRs Done
22,196,014 UART: [art] Populate DV Done
22,201,198 UART: [fht] FMC Alias Private Key: 7
22,202,879 UART: [art] Derive CDI
22,203,707 UART: [art] Store in slot 0x4
22,246,511 UART: [art] Derive Key Pair
22,247,625 UART: [art] Store priv key in slot 0x5
24,673,836 UART: [art] Derive Key Pair - Done
24,686,780 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,393,135 UART: [art] Erasing AUTHORITY.KEYID = 7
26,395,353 UART: [art] PUB.X = BBFB739232D52E4021134325D3BAA91C194AE21A4017BC169640370E061FED01CE5B3B790014748135DD20C9657BF46E
26,401,862 UART: [art] PUB.Y = 0D8D520F08872C15624CED4891750BFBA8C5204D0B42D4B6B1742959CA2302FA3179A2CEB8412584CA13D1269B1A0829
26,409,142 UART: [art] SIG.R = C3FD247F032DDD1D2C1C56F8B46A50DE72E784535A553669F9BC10FFB2CF5CD2DE5AAA13B7C0C7C746C943E5857AAF63
26,416,615 UART: [art] SIG.S = D7744C78DBB533710E2282E41517748C283659B9A3F7DBEB23ACB02D5474C8A3287D382AB74FF545280A19CEC509F9A1
27,395,804 UART: Caliptra RT
27,396,950 UART: [state] CFI Enabled
27,530,548 UART: [rt] RT listening for mailbox commands...
27,533,139 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,688,466 UART: [rt]cmd =0x41544d4e, len=14344
27,690,496 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,760,371 ready_for_fw is high
3,760,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,173,260 >>> mbox cmd response: success
20,429,411 UART:
20,429,831 UART: Running Caliptra FMC ...
20,430,975 UART:
20,431,142 UART: [state] CFI Enabled
20,439,138 UART: [fht] FMC Alias Private Key: 7
22,205,125 UART: [art] Extend RT PCRs Done
22,206,357 UART: [art] Lock RT PCRs Done
22,208,039 UART: [art] Populate DV Done
22,213,834 UART: [fht] FMC Alias Private Key: 7
22,215,434 UART: [art] Derive CDI
22,216,258 UART: [art] Store in slot 0x4
22,258,927 UART: [art] Derive Key Pair
22,259,984 UART: [art] Store priv key in slot 0x5
24,687,321 UART: [art] Derive Key Pair - Done
24,700,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,406,972 UART: [art] Erasing AUTHORITY.KEYID = 7
26,408,493 UART: [art] PUB.X = 40BBDCDE8D8BC7ADF2A565885991E08B5B039BDCC2C9CFAB576E71C26401D443AA72DDA93915EAD49347C492EB03091F
26,415,812 UART: [art] PUB.Y = 028DEB1BE7F1BC57A5D74B01FCE820CF0528CCB7D7850F3AC1AA72D135052DD40EB57A438A06FBA603E09670875066B2
26,423,020 UART: [art] SIG.R = 88BD54EA934741B9EAA937434FED23EA7FC33F2F6740DD18FF598066CC745850FEA36F1B1BA1D31534F57ED5B6A6276C
26,430,486 UART: [art] SIG.S = 42FC7E2CF669A7638BB967971A700E54EC20A75F855C6518D8F2222052D8BFC6503F77965045D72E676611EFC7D795BA
27,409,144 UART: Caliptra RT
27,409,857 UART: [state] CFI Enabled
27,543,189 UART: [rt] RT listening for mailbox commands...
27,545,507 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,700,753 UART: [rt]cmd =0x41544d4e, len=14344
27,702,780 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Unprovisioned
85,449 UART: [state] DebugLocked = No
85,975 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,513 UART: [kat] SHA2-256
881,444 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,559 UART: [kat] ++
885,711 UART: [kat] sha1
890,079 UART: [kat] SHA2-256
892,017 UART: [kat] SHA2-384
894,766 UART: [kat] SHA2-512-ACC
896,667 UART: [kat] ECC-384
902,280 UART: [kat] HMAC-384Kdf
906,926 UART: [kat] LMS
1,475,122 UART: [kat] --
1,475,957 UART: [cold-reset] ++
1,476,321 UART: [fht] Storing FHT @ 0x50003400
1,479,250 UART: [idev] ++
1,479,418 UART: [idev] CDI.KEYID = 6
1,479,778 UART: [idev] SUBJECT.KEYID = 7
1,480,202 UART: [idev] UDS.KEYID = 0
1,480,547 ready_for_fw is high
1,480,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,214 UART: [idev] Erasing UDS.KEYID = 0
1,504,894 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,438 UART: [idev] --
1,514,539 UART: [ldev] ++
1,514,707 UART: [ldev] CDI.KEYID = 6
1,515,070 UART: [ldev] SUBJECT.KEYID = 5
1,515,496 UART: [ldev] AUTHORITY.KEYID = 7
1,515,959 UART: [ldev] FE.KEYID = 1
1,521,061 UART: [ldev] Erasing FE.KEYID = 1
1,546,446 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,396 UART: [ldev] --
1,585,765 UART: [fwproc] Waiting for Commands...
1,586,506 UART: [fwproc] Received command 0x46574c44
1,587,297 UART: [fwproc] Received Image of size 118548 bytes
5,204,917 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,233,145 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,264,363 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,404,760 >>> mbox cmd response: success
5,405,878 UART: [afmc] ++
5,406,046 UART: [afmc] CDI.KEYID = 6
5,406,408 UART: [afmc] SUBJECT.KEYID = 7
5,406,833 UART: [afmc] AUTHORITY.KEYID = 5
5,441,908 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,457,912 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,458,692 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,464,398 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,470,277 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,475,990 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,483,877 UART: [afmc] --
5,484,877 UART: [cold-reset] --
5,485,579 UART: [state] Locking Datavault
5,486,752 UART: [state] Locking PCR0, PCR1 and PCR31
5,487,356 UART: [state] Locking ICCM
5,487,890 UART: [exit] Launching FMC @ 0x40000130
5,493,220 UART:
5,493,236 UART: Running Caliptra FMC ...
5,493,644 UART:
5,493,698 UART: [state] CFI Enabled
5,504,504 UART: [fht] FMC Alias Private Key: 7
5,623,214 UART: [art] Extend RT PCRs Done
5,623,642 UART: [art] Lock RT PCRs Done
5,625,136 UART: [art] Populate DV Done
5,633,567 UART: [fht] FMC Alias Private Key: 7
5,634,559 UART: [art] Derive CDI
5,634,839 UART: [art] Store in slot 0x4
5,720,603 UART: [art] Derive Key Pair
5,720,963 UART: [art] Store priv key in slot 0x5
5,734,108 UART: [art] Derive Key Pair - Done
5,748,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,764,314 UART: [art] Erasing AUTHORITY.KEYID = 7
5,765,079 UART: [art] PUB.X = 177ABBF6AB0D8ED42D6F9837989CB689B3192B75F87823EE53C97BE55590CB996B4DE0C069E30FC2C583B3F8AA9EF43E
5,771,857 UART: [art] PUB.Y = F15744810F6A39D56A125A43CAFAA7CADD270FC88162B88C2B8033EF332CD1515CCFCC5E14230C469B9DC8D739030DB8
5,778,804 UART: [art] SIG.R = A12040DD9F9106FC8753D92BAAFFC57F6A62C68126C9CB1BCC78F457D91EAA2A4A2B16319B3A5C57620F2FB0AEC274E5
5,785,586 UART: [art] SIG.S = C03D6CCB685BF1043095A09817CF8A168EA1DCB87C110DA0CED80012F981D002E2E02A486EEA5380C3E727D7D69CEE98
5,809,757 UART: Caliptra RT
5,810,008 UART: [state] CFI Enabled
5,930,215 UART: [rt] RT listening for mailbox commands...
5,930,885 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,054,023 UART: [rt]cmd =0x41544d4e, len=14344
6,055,480 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,685 ready_for_fw is high
1,362,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,216,321 >>> mbox cmd response: success
5,277,860 UART:
5,277,876 UART: Running Caliptra FMC ...
5,278,284 UART:
5,278,338 UART: [state] CFI Enabled
5,288,468 UART: [fht] FMC Alias Private Key: 7
5,407,438 UART: [art] Extend RT PCRs Done
5,407,866 UART: [art] Lock RT PCRs Done
5,409,380 UART: [art] Populate DV Done
5,417,765 UART: [fht] FMC Alias Private Key: 7
5,418,771 UART: [art] Derive CDI
5,419,051 UART: [art] Store in slot 0x4
5,505,227 UART: [art] Derive Key Pair
5,505,587 UART: [art] Store priv key in slot 0x5
5,519,122 UART: [art] Derive Key Pair - Done
5,533,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,549,126 UART: [art] Erasing AUTHORITY.KEYID = 7
5,549,891 UART: [art] PUB.X = 314D4F4A7A8B3FBBD738FBA8308BFD66548800E81A2B8FF0A64DF9F73D0B69AA1BE107C5CB672F169A3C42C30766FEDB
5,556,650 UART: [art] PUB.Y = 10281FFB9B302FFFAFDB1F74F9C5D2EDA018388B809D0AF2382804AB8E95CCB6761AE264A057110A4102F2067E445057
5,563,591 UART: [art] SIG.R = 04BD10897369C428C1BC44C94999D20BB147067E3C835456B5645B692F054C02E4D4AD7A1ED06CD2C94C47EF6073903E
5,570,344 UART: [art] SIG.S = 3AD1DDAA7D04E78F6EA8CD201D02F479974F38A6AAD8BB3176AE6ABA666E6C08535931CCEC6DB7A11AD4F62B08B34D4B
5,594,294 UART: Caliptra RT
5,594,545 UART: [state] CFI Enabled
5,714,538 UART: [rt] RT listening for mailbox commands...
5,715,208 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,838,270 UART: [rt]cmd =0x41544d4e, len=14344
5,839,789 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,276 UART: [kat] SHA2-256
882,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,322 UART: [kat] ++
886,474 UART: [kat] sha1
890,584 UART: [kat] SHA2-256
892,522 UART: [kat] SHA2-384
895,381 UART: [kat] SHA2-512-ACC
897,282 UART: [kat] ECC-384
902,939 UART: [kat] HMAC-384Kdf
907,479 UART: [kat] LMS
1,475,675 UART: [kat] --
1,476,536 UART: [cold-reset] ++
1,477,050 UART: [fht] Storing FHT @ 0x50003400
1,479,975 UART: [idev] ++
1,480,143 UART: [idev] CDI.KEYID = 6
1,480,503 UART: [idev] SUBJECT.KEYID = 7
1,480,927 UART: [idev] UDS.KEYID = 0
1,481,272 ready_for_fw is high
1,481,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,101 UART: [idev] Erasing UDS.KEYID = 0
1,505,527 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,181 UART: [idev] --
1,515,188 UART: [ldev] ++
1,515,356 UART: [ldev] CDI.KEYID = 6
1,515,719 UART: [ldev] SUBJECT.KEYID = 5
1,516,145 UART: [ldev] AUTHORITY.KEYID = 7
1,516,608 UART: [ldev] FE.KEYID = 1
1,521,850 UART: [ldev] Erasing FE.KEYID = 1
1,547,501 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,317 UART: [ldev] --
1,586,760 UART: [fwproc] Waiting for Commands...
1,587,605 UART: [fwproc] Received command 0x46574c44
1,588,396 UART: [fwproc] Received Image of size 118548 bytes
5,130,422 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,158,332 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,189,550 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,329,759 >>> mbox cmd response: success
5,330,817 UART: [afmc] ++
5,330,985 UART: [afmc] CDI.KEYID = 6
5,331,347 UART: [afmc] SUBJECT.KEYID = 7
5,331,772 UART: [afmc] AUTHORITY.KEYID = 5
5,367,239 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,383,837 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,384,617 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,390,323 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,396,202 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,401,915 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,409,736 UART: [afmc] --
5,410,630 UART: [cold-reset] --
5,411,432 UART: [state] Locking Datavault
5,412,417 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,021 UART: [state] Locking ICCM
5,413,627 UART: [exit] Launching FMC @ 0x40000130
5,418,957 UART:
5,418,973 UART: Running Caliptra FMC ...
5,419,381 UART:
5,419,524 UART: [state] CFI Enabled
5,429,788 UART: [fht] FMC Alias Private Key: 7
5,549,086 UART: [art] Extend RT PCRs Done
5,549,514 UART: [art] Lock RT PCRs Done
5,550,778 UART: [art] Populate DV Done
5,559,241 UART: [fht] FMC Alias Private Key: 7
5,560,291 UART: [art] Derive CDI
5,560,571 UART: [art] Store in slot 0x4
5,646,269 UART: [art] Derive Key Pair
5,646,629 UART: [art] Store priv key in slot 0x5
5,659,686 UART: [art] Derive Key Pair - Done
5,674,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,689,888 UART: [art] Erasing AUTHORITY.KEYID = 7
5,690,653 UART: [art] PUB.X = EE5D9DAAF4FA22C48C118E80C8C84440B100EEDBDEBA168F1929A378B93D0CB0F965512B7F779158E04777DA4B7F4BF1
5,697,414 UART: [art] PUB.Y = 9FA5F4B1D1F915B0459FD1F036BEC6DB3FA51A1C140CB33416324CB742194328DE81A39950CB18084F7E399C417F589D
5,704,362 UART: [art] SIG.R = 9ADE8F851693E31B23821B1ABEDD7089C591A6F35FCA13DBF85ED9C3FEADF01534FB210C288D7FC2EFA4617E61C1FB12
5,711,151 UART: [art] SIG.S = 73646A8D4F9DC57649289A6CDBAE66BAB7908D7F7E2EB6199415987F7B0DFBC50DF5965C56D6F27A79158F50C7177F0F
5,734,622 UART: Caliptra RT
5,734,965 UART: [state] CFI Enabled
5,855,693 UART: [rt] RT listening for mailbox commands...
5,856,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,979,637 UART: [rt]cmd =0x41544d4e, len=14344
5,981,278 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,596 ready_for_fw is high
1,362,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,367,928 >>> mbox cmd response: success
5,430,425 UART:
5,430,441 UART: Running Caliptra FMC ...
5,430,849 UART:
5,430,992 UART: [state] CFI Enabled
5,441,766 UART: [fht] FMC Alias Private Key: 7
5,561,020 UART: [art] Extend RT PCRs Done
5,561,448 UART: [art] Lock RT PCRs Done
5,563,044 UART: [art] Populate DV Done
5,571,295 UART: [fht] FMC Alias Private Key: 7
5,572,337 UART: [art] Derive CDI
5,572,617 UART: [art] Store in slot 0x4
5,658,665 UART: [art] Derive Key Pair
5,659,025 UART: [art] Store priv key in slot 0x5
5,672,210 UART: [art] Derive Key Pair - Done
5,686,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,702,270 UART: [art] Erasing AUTHORITY.KEYID = 7
5,703,035 UART: [art] PUB.X = 632E23EBB8D5D46F3105E1FD33E6B9C827629BDDC61EBF23D6787726EDB59DD66A3DB9196CA0BB2740AC91AD56CABC67
5,709,822 UART: [art] PUB.Y = 24F700FC5E8D587CBBE665EF1BE86E6E4BB292E122BB90939FD2B580BF54692C072560C510F8E55F9CFD9223B3263F85
5,716,755 UART: [art] SIG.R = 96CFDCF2D8507326BB996D99CE7370A4DFFEB05DC022A6B7F8355E36AF880617A28853947431B434C0110D69DCFF31DA
5,723,527 UART: [art] SIG.S = 27FF9C43B20E9C241766068558C00BF07432D8C31FF2C94E2392B3E193753046597299C0D33FA78D87F81711BFFE8AF8
5,746,966 UART: Caliptra RT
5,747,309 UART: [state] CFI Enabled
5,867,975 UART: [rt] RT listening for mailbox commands...
5,868,645 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,991,681 UART: [rt]cmd =0x41544d4e, len=14344
5,993,270 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
920,863 UART: [kat] LMS
1,169,175 UART: [kat] --
1,170,064 UART: [cold-reset] ++
1,170,510 UART: [fht] FHT @ 0x50003400
1,173,108 UART: [idev] ++
1,173,276 UART: [idev] CDI.KEYID = 6
1,173,637 UART: [idev] SUBJECT.KEYID = 7
1,174,062 UART: [idev] UDS.KEYID = 0
1,174,408 ready_for_fw is high
1,174,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,905 UART: [idev] Erasing UDS.KEYID = 0
1,198,677 UART: [idev] Sha1 KeyId Algorithm
1,207,599 UART: [idev] --
1,208,582 UART: [ldev] ++
1,208,750 UART: [ldev] CDI.KEYID = 6
1,209,114 UART: [ldev] SUBJECT.KEYID = 5
1,209,541 UART: [ldev] AUTHORITY.KEYID = 7
1,210,004 UART: [ldev] FE.KEYID = 1
1,215,370 UART: [ldev] Erasing FE.KEYID = 1
1,241,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,130 UART: [ldev] --
1,280,341 UART: [fwproc] Wait for Commands...
1,281,136 UART: [fwproc] Recv command 0x46574c44
1,281,869 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,253 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,428 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,372,727 >>> mbox cmd response: success
3,373,905 UART: [afmc] ++
3,374,073 UART: [afmc] CDI.KEYID = 6
3,374,436 UART: [afmc] SUBJECT.KEYID = 7
3,374,862 UART: [afmc] AUTHORITY.KEYID = 5
3,410,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,667 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,374 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,251 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,961 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,771 UART: [afmc] --
3,453,816 UART: [cold-reset] --
3,454,850 UART: [state] Locking Datavault
3,455,739 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,343 UART: [state] Locking ICCM
3,456,811 UART: [exit] Launching FMC @ 0x40000130
3,462,141 UART:
3,462,157 UART: Running Caliptra FMC ...
3,462,565 UART:
3,462,619 UART: [state] CFI Enabled
3,473,423 UART: [fht] FMC Alias Private Key: 7
3,591,297 UART: [art] Extend RT PCRs Done
3,591,725 UART: [art] Lock RT PCRs Done
3,592,975 UART: [art] Populate DV Done
3,601,210 UART: [fht] FMC Alias Private Key: 7
3,602,304 UART: [art] Derive CDI
3,602,584 UART: [art] Store in slot 0x4
3,688,905 UART: [art] Derive Key Pair
3,689,265 UART: [art] Store priv key in slot 0x5
3,702,549 UART: [art] Derive Key Pair - Done
3,717,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,493 UART: [art] PUB.X = CF0259C55207B9389A53B4B22A1A0797B34E9F25E8CE8A8C26AC83D9871EE61504923EA6702C10AB0E9CFB28E1FA2ACE
3,740,260 UART: [art] PUB.Y = FA5333791F086E7BDACF565E6EB6C99B8165D8316C27AD4996155FA6801710E8105F96632BFF546224EC1D29D1153898
3,747,203 UART: [art] SIG.R = AE38CD3601F55615633D99107AB80938C96786116E6E8E33C41D5E1B08B1F4DADF857C43C4B0D753FBB5BDDC6E20B1DF
3,753,976 UART: [art] SIG.S = 299951E80DD3DF52E1606AC62AB4EFA9D5AA0B313150B28D877B034E137698032EF3B9C541CB44015A957287419AEF51
3,777,069 UART: Caliptra RT
3,777,320 UART: [state] CFI Enabled
3,897,354 UART: [rt] RT listening for mailbox commands...
3,898,024 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,060 UART: [rt]cmd =0x41544d4e, len=14344
4,022,557 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,998 ready_for_fw is high
1,058,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,213,941 >>> mbox cmd response: success
3,275,938 UART:
3,275,954 UART: Running Caliptra FMC ...
3,276,362 UART:
3,276,416 UART: [state] CFI Enabled
3,286,938 UART: [fht] FMC Alias Private Key: 7
3,405,726 UART: [art] Extend RT PCRs Done
3,406,154 UART: [art] Lock RT PCRs Done
3,407,574 UART: [art] Populate DV Done
3,415,871 UART: [fht] FMC Alias Private Key: 7
3,416,915 UART: [art] Derive CDI
3,417,195 UART: [art] Store in slot 0x4
3,502,798 UART: [art] Derive Key Pair
3,503,158 UART: [art] Store priv key in slot 0x5
3,516,558 UART: [art] Derive Key Pair - Done
3,531,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,546,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,547,632 UART: [art] PUB.X = 0C3C72E9A016F9846BA043536CB195CBBFE393D981C15A3A2F7BFB25497B42CFDF59451B58351B1D838F3C282145675C
3,554,403 UART: [art] PUB.Y = D035353B480082AC0B7BDC377FDD622398FDCB2B5AA9F6E074513092513F11F732256BEB5ACA9CFC89E28AF583C36B6E
3,561,340 UART: [art] SIG.R = 5DED7419B288CC2A6BD08859F5CAC299A91161E7558B2662483A12F78643D7FC700A3570C35E9E312E3DEFD6231BE31E
3,568,111 UART: [art] SIG.S = F2F1F489C37B1A2F02BA29822FC27FD1CDB251375ADACE235919C61CB4478EEA5BA0A825DA7898A84D6D86D5C47ACBD3
3,591,764 UART: Caliptra RT
3,592,015 UART: [state] CFI Enabled
3,712,225 UART: [rt] RT listening for mailbox commands...
3,712,895 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,115 UART: [rt]cmd =0x41544d4e, len=14344
3,837,780 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,258 UART: [state] WD Timer not started. Device not locked for debugging
87,417 UART: [kat] SHA2-256
890,967 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,071 UART: [kat] ++
895,223 UART: [kat] sha1
899,483 UART: [kat] SHA2-256
901,423 UART: [kat] SHA2-384
904,234 UART: [kat] SHA2-512-ACC
906,135 UART: [kat] ECC-384
915,920 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,169,903 UART: [cold-reset] ++
1,170,463 UART: [fht] FHT @ 0x50003400
1,173,049 UART: [idev] ++
1,173,217 UART: [idev] CDI.KEYID = 6
1,173,578 UART: [idev] SUBJECT.KEYID = 7
1,174,003 UART: [idev] UDS.KEYID = 0
1,174,349 ready_for_fw is high
1,174,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,199,420 UART: [idev] Sha1 KeyId Algorithm
1,208,306 UART: [idev] --
1,209,199 UART: [ldev] ++
1,209,367 UART: [ldev] CDI.KEYID = 6
1,209,731 UART: [ldev] SUBJECT.KEYID = 5
1,210,158 UART: [ldev] AUTHORITY.KEYID = 7
1,210,621 UART: [ldev] FE.KEYID = 1
1,215,871 UART: [ldev] Erasing FE.KEYID = 1
1,242,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,193 UART: [ldev] --
1,281,528 UART: [fwproc] Wait for Commands...
1,282,149 UART: [fwproc] Recv command 0x46574c44
1,282,882 UART: [fwproc] Recv'd Img size: 118548 bytes
3,170,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,198,209 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,229,384 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,579 >>> mbox cmd response: success
3,370,737 UART: [afmc] ++
3,370,905 UART: [afmc] CDI.KEYID = 6
3,371,268 UART: [afmc] SUBJECT.KEYID = 7
3,371,694 UART: [afmc] AUTHORITY.KEYID = 5
3,408,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,597 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,304 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,181 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,442,891 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,701 UART: [afmc] --
3,451,734 UART: [cold-reset] --
3,452,416 UART: [state] Locking Datavault
3,453,417 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,021 UART: [state] Locking ICCM
3,454,497 UART: [exit] Launching FMC @ 0x40000130
3,459,827 UART:
3,459,843 UART: Running Caliptra FMC ...
3,460,251 UART:
3,460,394 UART: [state] CFI Enabled
3,471,072 UART: [fht] FMC Alias Private Key: 7
3,590,228 UART: [art] Extend RT PCRs Done
3,590,656 UART: [art] Lock RT PCRs Done
3,592,204 UART: [art] Populate DV Done
3,600,755 UART: [fht] FMC Alias Private Key: 7
3,601,923 UART: [art] Derive CDI
3,602,203 UART: [art] Store in slot 0x4
3,688,588 UART: [art] Derive Key Pair
3,688,948 UART: [art] Store priv key in slot 0x5
3,702,354 UART: [art] Derive Key Pair - Done
3,717,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,847 UART: [art] PUB.X = 7507E68A59FF1D562BBA79EA79726AF88EAC57B09FF86EA3E9FC50716B085DFA2EC5EC9A9D7FD794F45D2EDD2686450D
3,740,628 UART: [art] PUB.Y = 09735715688BB5EB242F1CA9F6330D3D2BFD950A5DF849BA5C9CB1624BE6738497E1C65815F08A3E4319FBE7DE590F32
3,747,572 UART: [art] SIG.R = 8C6D8A831068F3CE40C7960CEA9287AAB0C3A2CC845859E630C2DF322D3AC1D03C046E7AA45EA850E7767AD10665021F
3,754,338 UART: [art] SIG.S = EB33ADEFD26868724C4CC0F01D7BDEE16D8E827DB8237C03B1E032529E11A71FF38C4A2B195B1563AA2CDD860BABA35F
3,778,102 UART: Caliptra RT
3,778,445 UART: [state] CFI Enabled
3,898,828 UART: [rt] RT listening for mailbox commands...
3,899,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,514 UART: [rt]cmd =0x41544d4e, len=14344
4,024,007 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,413 ready_for_fw is high
1,059,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,231,449 >>> mbox cmd response: success
3,293,380 UART:
3,293,396 UART: Running Caliptra FMC ...
3,293,804 UART:
3,293,947 UART: [state] CFI Enabled
3,304,691 UART: [fht] FMC Alias Private Key: 7
3,423,709 UART: [art] Extend RT PCRs Done
3,424,137 UART: [art] Lock RT PCRs Done
3,425,733 UART: [art] Populate DV Done
3,434,000 UART: [fht] FMC Alias Private Key: 7
3,434,986 UART: [art] Derive CDI
3,435,266 UART: [art] Store in slot 0x4
3,520,879 UART: [art] Derive Key Pair
3,521,239 UART: [art] Store priv key in slot 0x5
3,534,013 UART: [art] Derive Key Pair - Done
3,548,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,564,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,565,208 UART: [art] PUB.X = 0F6CD47DF424D4AFA52CBA5F1BCF57D17645C7C00292B94ED2101E850B887B3ABA6E78186C768027F94207A95F0AA8CD
3,571,975 UART: [art] PUB.Y = D43B458885EB2E0CD237371F1C9BED3C3DD271E7FFD90AC85CBC8CE8BCEA8492E67A8E1775233C06619699B8863658C6
3,578,926 UART: [art] SIG.R = BD1C348B6F9FE73B95E2AADE46D1E505830F192282243005E682BFA3A020E8DB2370986F29D3DA0E2DD2575C42CA77EC
3,585,694 UART: [art] SIG.S = 1B2905BF84AC1E6518B40491F2865F9DDF2A77945C6F15F4AF0BFF1E4CE9A9913A039963D2684C491D62BCB917928FC4
3,609,752 UART: Caliptra RT
3,610,095 UART: [state] CFI Enabled
3,729,543 UART: [rt] RT listening for mailbox commands...
3,730,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,955 UART: [rt]cmd =0x41544d4e, len=14344
3,854,806 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,784 UART: [state] LifecycleState = Unprovisioned
85,439 UART: [state] DebugLocked = No
85,921 UART: [state] WD Timer not started. Device not locked for debugging
87,128 UART: [kat] SHA2-256
892,778 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,903 UART: [kat] ++
897,055 UART: [kat] sha1
901,101 UART: [kat] SHA2-256
903,041 UART: [kat] SHA2-384
905,956 UART: [kat] SHA2-512-ACC
907,857 UART: [kat] ECC-384
917,452 UART: [kat] HMAC-384Kdf
921,888 UART: [kat] LMS
1,170,216 UART: [kat] --
1,171,283 UART: [cold-reset] ++
1,171,637 UART: [fht] FHT @ 0x50003400
1,174,264 UART: [idev] ++
1,174,432 UART: [idev] CDI.KEYID = 6
1,174,792 UART: [idev] SUBJECT.KEYID = 7
1,175,216 UART: [idev] UDS.KEYID = 0
1,175,561 ready_for_fw is high
1,175,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,072 UART: [idev] Erasing UDS.KEYID = 0
1,200,405 UART: [idev] Sha1 KeyId Algorithm
1,208,827 UART: [idev] --
1,209,827 UART: [ldev] ++
1,209,995 UART: [ldev] CDI.KEYID = 6
1,210,358 UART: [ldev] SUBJECT.KEYID = 5
1,210,784 UART: [ldev] AUTHORITY.KEYID = 7
1,211,247 UART: [ldev] FE.KEYID = 1
1,216,465 UART: [ldev] Erasing FE.KEYID = 1
1,242,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,725 UART: [ldev] --
1,282,066 UART: [fwproc] Wait for Commands...
1,282,794 UART: [fwproc] Recv command 0x46574c44
1,283,522 UART: [fwproc] Recv'd Img size: 118548 bytes
3,181,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,209,813 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,240,983 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,381,298 >>> mbox cmd response: success
3,382,382 UART: [afmc] ++
3,382,550 UART: [afmc] CDI.KEYID = 6
3,382,912 UART: [afmc] SUBJECT.KEYID = 7
3,383,337 UART: [afmc] AUTHORITY.KEYID = 5
3,419,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,435,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,436,355 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,442,061 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,447,940 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,453,650 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,461,331 UART: [afmc] --
3,462,459 UART: [cold-reset] --
3,463,371 UART: [state] Locking Datavault
3,464,530 UART: [state] Locking PCR0, PCR1 and PCR31
3,465,134 UART: [state] Locking ICCM
3,465,718 UART: [exit] Launching FMC @ 0x40000130
3,471,048 UART:
3,471,064 UART: Running Caliptra FMC ...
3,471,472 UART:
3,471,526 UART: [state] CFI Enabled
3,482,162 UART: [fht] FMC Alias Private Key: 7
3,600,988 UART: [art] Extend RT PCRs Done
3,601,416 UART: [art] Lock RT PCRs Done
3,602,882 UART: [art] Populate DV Done
3,611,201 UART: [fht] FMC Alias Private Key: 7
3,612,325 UART: [art] Derive CDI
3,612,605 UART: [art] Store in slot 0x4
3,698,792 UART: [art] Derive Key Pair
3,699,152 UART: [art] Store priv key in slot 0x5
3,712,900 UART: [art] Derive Key Pair - Done
3,727,770 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,743,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,743,888 UART: [art] PUB.X = 5EAE0EF895BEAA10B0CB01142BF756A226FF730CB4E782018704359E273B01508830CE0F86F369C6A66508DF5CBA3988
3,750,638 UART: [art] PUB.Y = 80AB53AF5E3116E32F537F4BA32A197F5BF7A02C27E7BC1813755E9B81FE00D80DB9049F727C237473129F9135C1669E
3,757,560 UART: [art] SIG.R = 3A82CC58E42B4D14FEF9F52834B73CA5A402D2197C0BAEF64CF61C0FB155E0764D626A4FF08A0C84DFE6D0AB39019E86
3,764,331 UART: [art] SIG.S = 84652A6D87EFD95B869F02F057E5FC0D7C081783910C1EE39C5D918DE89DBB7BC518C934CA49BF299C2A7C2D5D3BEE18
3,787,605 UART: Caliptra RT
3,787,856 UART: [state] CFI Enabled
3,908,472 UART: [rt] RT listening for mailbox commands...
3,909,142 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,032,238 UART: [rt]cmd =0x41544d4e, len=14344
4,033,585 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,039 ready_for_fw is high
1,060,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,532 >>> mbox cmd response: success
3,280,077 UART:
3,280,093 UART: Running Caliptra FMC ...
3,280,501 UART:
3,280,555 UART: [state] CFI Enabled
3,291,061 UART: [fht] FMC Alias Private Key: 7
3,410,257 UART: [art] Extend RT PCRs Done
3,410,685 UART: [art] Lock RT PCRs Done
3,412,273 UART: [art] Populate DV Done
3,420,612 UART: [fht] FMC Alias Private Key: 7
3,421,636 UART: [art] Derive CDI
3,421,916 UART: [art] Store in slot 0x4
3,507,351 UART: [art] Derive Key Pair
3,507,711 UART: [art] Store priv key in slot 0x5
3,520,613 UART: [art] Derive Key Pair - Done
3,535,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,434 UART: [art] PUB.X = 077F623A6A6D256A7270D5FEA98FC9008D17787B098427D8F63C52E5B5394879442727919FA615CE0CC563FF93DF57C0
3,558,169 UART: [art] PUB.Y = 5217B09318A65D49BB6FDDEB6A80642F9BFC059B3F0515DDF277BF8B7BCEA4583DAD05845F9131D49EA3C656D528E8EB
3,565,126 UART: [art] SIG.R = 040E7B2D6B6A93A40BFE33316ABE69EA719D26397348D2A8C1C1A935B5B6E865EECA980DE04811EFF3EF33383E8A8BD2
3,571,898 UART: [art] SIG.S = 38D691BC8F46CBDBE863D6D1278F9EEC4CEECF45AFDF649E27554D3CD7CEFE49B5E2E413491AE7FEB85EF87927180BBA
3,595,925 UART: Caliptra RT
3,596,176 UART: [state] CFI Enabled
3,715,776 UART: [rt] RT listening for mailbox commands...
3,716,446 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,616 UART: [rt]cmd =0x41544d4e, len=14344
3,840,941 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
893,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,928 UART: [kat] ++
898,080 UART: [kat] sha1
902,438 UART: [kat] SHA2-256
904,378 UART: [kat] SHA2-384
907,135 UART: [kat] SHA2-512-ACC
909,036 UART: [kat] ECC-384
919,049 UART: [kat] HMAC-384Kdf
923,633 UART: [kat] LMS
1,171,961 UART: [kat] --
1,172,994 UART: [cold-reset] ++
1,173,336 UART: [fht] FHT @ 0x50003400
1,176,163 UART: [idev] ++
1,176,331 UART: [idev] CDI.KEYID = 6
1,176,691 UART: [idev] SUBJECT.KEYID = 7
1,177,115 UART: [idev] UDS.KEYID = 0
1,177,460 ready_for_fw is high
1,177,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,005 UART: [idev] Erasing UDS.KEYID = 0
1,201,764 UART: [idev] Sha1 KeyId Algorithm
1,210,278 UART: [idev] --
1,211,288 UART: [ldev] ++
1,211,456 UART: [ldev] CDI.KEYID = 6
1,211,819 UART: [ldev] SUBJECT.KEYID = 5
1,212,245 UART: [ldev] AUTHORITY.KEYID = 7
1,212,708 UART: [ldev] FE.KEYID = 1
1,217,984 UART: [ldev] Erasing FE.KEYID = 1
1,244,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,340 UART: [ldev] --
1,283,649 UART: [fwproc] Wait for Commands...
1,284,377 UART: [fwproc] Recv command 0x46574c44
1,285,105 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,687 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,857 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,136 >>> mbox cmd response: success
3,374,342 UART: [afmc] ++
3,374,510 UART: [afmc] CDI.KEYID = 6
3,374,872 UART: [afmc] SUBJECT.KEYID = 7
3,375,297 UART: [afmc] AUTHORITY.KEYID = 5
3,410,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,645 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,351 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,230 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,940 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,729 UART: [afmc] --
3,453,827 UART: [cold-reset] --
3,454,789 UART: [state] Locking Datavault
3,456,086 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,690 UART: [state] Locking ICCM
3,457,288 UART: [exit] Launching FMC @ 0x40000130
3,462,618 UART:
3,462,634 UART: Running Caliptra FMC ...
3,463,042 UART:
3,463,185 UART: [state] CFI Enabled
3,474,143 UART: [fht] FMC Alias Private Key: 7
3,593,163 UART: [art] Extend RT PCRs Done
3,593,591 UART: [art] Lock RT PCRs Done
3,595,377 UART: [art] Populate DV Done
3,603,602 UART: [fht] FMC Alias Private Key: 7
3,604,764 UART: [art] Derive CDI
3,605,044 UART: [art] Store in slot 0x4
3,690,937 UART: [art] Derive Key Pair
3,691,297 UART: [art] Store priv key in slot 0x5
3,704,683 UART: [art] Derive Key Pair - Done
3,719,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,612 UART: [art] PUB.X = 26139253AD796DC2D36D6723EEE51202CDA4CF95F441628790C8459F523F733B61740100329C6737F3EEF510A17BFB69
3,742,348 UART: [art] PUB.Y = 0AA5EE99880C444BC60DF19733A97034825B6F55C914817D56FCDEEC967B954A314B26E1FDC0B71CA5D9C0505707EC97
3,749,292 UART: [art] SIG.R = 8024AB379307A7D59EB197132B6DA4FB71018C73D286B171B32754E180ACA04474466C74D6A6E01A296E961AB71343A0
3,756,050 UART: [art] SIG.S = 4E26E6B12578547A74ED2D10C86405B932656DE70CE8BE56F9B6B15ADB062A8999D5F75EFB017B123ED267BF32729451
3,780,578 UART: Caliptra RT
3,780,921 UART: [state] CFI Enabled
3,900,201 UART: [rt] RT listening for mailbox commands...
3,900,871 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,023,819 UART: [rt]cmd =0x41544d4e, len=14344
4,025,292 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,270 ready_for_fw is high
1,060,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,237,592 >>> mbox cmd response: success
3,299,701 UART:
3,299,717 UART: Running Caliptra FMC ...
3,300,125 UART:
3,300,268 UART: [state] CFI Enabled
3,311,054 UART: [fht] FMC Alias Private Key: 7
3,430,908 UART: [art] Extend RT PCRs Done
3,431,336 UART: [art] Lock RT PCRs Done
3,432,796 UART: [art] Populate DV Done
3,440,737 UART: [fht] FMC Alias Private Key: 7
3,441,899 UART: [art] Derive CDI
3,442,179 UART: [art] Store in slot 0x4
3,528,344 UART: [art] Derive Key Pair
3,528,704 UART: [art] Store priv key in slot 0x5
3,542,288 UART: [art] Derive Key Pair - Done
3,557,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,572,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,573,696 UART: [art] PUB.X = 25ADD69C1B7D27DBB957C7312F8A3A45DB1BF5E6BA1B1E718C9A8ADCC8B3A52CB13CCCA8155A0E7539614BF69CAB3A57
3,580,489 UART: [art] PUB.Y = 36C3AEF7AD205061BBB0377F206E491DAE14000233886B4CB50DFB0B337470321817A3C2624B6501E40AFFE08323F2F7
3,587,402 UART: [art] SIG.R = AA31955E4828EA8F044EA012A6B2A5AAF378A9D8ABB31C5684B766164DE23C8662234BEF0C88A693D8ED885DE1E21C64
3,594,176 UART: [art] SIG.S = C8A2DB3E87062714A05C8E718C947E7C5A1B1A87B951193B6DC03B7DD7599CE835C67BFDB60F63C15BB78F62AD5B1875
3,617,416 UART: Caliptra RT
3,617,759 UART: [state] CFI Enabled
3,737,570 UART: [rt] RT listening for mailbox commands...
3,738,240 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,861,308 UART: [rt]cmd =0x41544d4e, len=14344
3,862,475 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,140 UART:
192,497 UART: Running Caliptra ROM ...
193,597 UART:
193,739 UART: [state] CFI Enabled
263,958 UART: [state] LifecycleState = Unprovisioned
265,897 UART: [state] DebugLocked = No
268,693 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,035 UART: [kat] SHA2-256
443,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,244 UART: [kat] ++
454,735 UART: [kat] sha1
465,896 UART: [kat] SHA2-256
468,557 UART: [kat] SHA2-384
473,481 UART: [kat] SHA2-512-ACC
475,847 UART: [kat] ECC-384
2,765,827 UART: [kat] HMAC-384Kdf
2,778,222 UART: [kat] LMS
3,968,532 UART: [kat] --
3,972,610 UART: [cold-reset] ++
3,974,042 UART: [fht] Storing FHT @ 0x50003400
3,986,447 UART: [idev] ++
3,987,085 UART: [idev] CDI.KEYID = 6
3,988,001 UART: [idev] SUBJECT.KEYID = 7
3,989,253 UART: [idev] UDS.KEYID = 0
3,990,319 ready_for_fw is high
3,990,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,989 UART: [idev] Erasing UDS.KEYID = 0
7,323,252 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,974 UART: [idev] --
7,351,051 UART: [ldev] ++
7,351,623 UART: [ldev] CDI.KEYID = 6
7,352,568 UART: [ldev] SUBJECT.KEYID = 5
7,353,801 UART: [ldev] AUTHORITY.KEYID = 7
7,355,090 UART: [ldev] FE.KEYID = 1
7,400,336 UART: [ldev] Erasing FE.KEYID = 1
10,732,194 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,065 UART: [ldev] --
13,094,924 UART: [fwproc] Waiting for Commands...
13,097,238 UART: [fwproc] Received command 0x46574c44
13,099,476 UART: [fwproc] Received Image of size 118548 bytes
22,265,411 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,343,856 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,417,032 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,745,407 >>> mbox cmd response: success
22,750,014 UART: [afmc] ++
22,750,628 UART: [afmc] CDI.KEYID = 6
22,751,540 UART: [afmc] SUBJECT.KEYID = 7
22,752,800 UART: [afmc] AUTHORITY.KEYID = 5
26,122,849 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,423,159 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,425,430 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,439,957 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,454,720 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,469,097 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,492,047 UART: [afmc] --
28,495,047 UART: [cold-reset] --
28,499,882 UART: [state] Locking Datavault
28,504,803 UART: [state] Locking PCR0, PCR1 and PCR31
28,506,556 UART: [state] Locking ICCM
28,507,763 UART: [exit] Launching FMC @ 0x40000130
28,516,191 UART:
28,516,469 UART: Running Caliptra FMC ...
28,517,584 UART:
28,517,748 UART: [state] CFI Enabled
28,580,969 UART: [fht] FMC Alias Private Key: 7
30,942,648 UART: [art] Extend RT PCRs Done
30,943,874 UART: [art] Lock RT PCRs Done
30,945,497 UART: [art] Populate DV Done
30,951,128 UART: [fht] FMC Alias Private Key: 7
30,952,682 UART: [art] Derive CDI
30,953,441 UART: [art] Store in slot 0x4
31,010,496 UART: [art] Derive Key Pair
31,011,548 UART: [art] Store priv key in slot 0x5
34,303,762 UART: [art] Derive Key Pair - Done
34,316,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,604,351 UART: [art] Erasing AUTHORITY.KEYID = 7
36,605,881 UART: [art] PUB.X = A37A7C3048AB40F640B0B49B63021353DD79542581F71810BA6987D3F4E882D036052F9AB131D34865A4AE708D656E93
36,613,101 UART: [art] PUB.Y = CB8CE5A5A550433B6399D96B37A7712D9AEE4E136EB51CF379818D8F9CD44578E98A3A7F8C7F708E2FAAB9B24B4AA205
36,620,367 UART: [art] SIG.R = D91D1C0856A9DCA3A110CBB8AAC94D602399FD6CA689BB72C67ED421F6ADEA1D3E392EE9FCA7F70A38C94E1D63174253
36,627,777 UART: [art] SIG.S = 9B6132ED8D2F00108BCBB51DDC7A92BA438921A30527AD2091261BF303F4B0E4ECA4D169BE9A1042195064DD33803C9F
37,932,822 UART: Caliptra RT
37,933,533 UART: [state] CFI Enabled
38,112,244 UART: [rt] RT listening for mailbox commands...
38,114,593 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,269,883 UART: [rt]cmd =0x41544d4e, len=14344
38,271,897 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
3,804,210 ready_for_fw is high
3,804,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,233,384 >>> mbox cmd response: success
27,919,429 UART:
27,919,880 UART: Running Caliptra FMC ...
27,921,001 UART:
27,921,167 UART: [state] CFI Enabled
27,985,960 UART: [fht] FMC Alias Private Key: 7
30,326,671 UART: [art] Extend RT PCRs Done
30,327,907 UART: [art] Lock RT PCRs Done
30,329,703 UART: [art] Populate DV Done
30,335,169 UART: [fht] FMC Alias Private Key: 7
30,336,815 UART: [art] Derive CDI
30,337,631 UART: [art] Store in slot 0x4
30,393,968 UART: [art] Derive Key Pair
30,394,965 UART: [art] Store priv key in slot 0x5
33,687,661 UART: [art] Derive Key Pair - Done
33,700,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,989,331 UART: [art] Erasing AUTHORITY.KEYID = 7
35,990,847 UART: [art] PUB.X = 98FE9224D4624C8C9ACE4A7FE844F65AD69884A715B23739949CF7E4C8C29E1441D720AC27CF84CA01F5A770C6F4288C
35,998,145 UART: [art] PUB.Y = E4B5D0CAFE1B0C1394973BC8F99017F1766CC7EB5940E3A7DF02002F266B7443C92FDF053267A045DAEFCAE9330341F1
36,005,361 UART: [art] SIG.R = CBB88F51CBD41C6046E87057A93049F137FE5F88EDC99F89E236C76AB9291BDD395BCFA83DEFD165C13C98E68A2895BB
36,012,780 UART: [art] SIG.S = E8677A307EB650CF1D347AD6504E3060D4EAC6AA6C203E518E80C67CE594079513343E38AC711CB726CA9EC300423B65
37,317,633 UART: Caliptra RT
37,318,324 UART: [state] CFI Enabled
37,495,457 UART: [rt] RT listening for mailbox commands...
37,497,774 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,653,143 UART: [rt]cmd =0x41544d4e, len=14344
37,655,004 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,399 UART:
192,794 UART: Running Caliptra ROM ...
193,898 UART:
603,625 UART: [state] CFI Enabled
619,347 UART: [state] LifecycleState = Unprovisioned
621,302 UART: [state] DebugLocked = No
623,679 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,033 UART: [kat] SHA2-256
797,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,359 UART: [kat] ++
808,808 UART: [kat] sha1
819,270 UART: [kat] SHA2-256
821,992 UART: [kat] SHA2-384
828,613 UART: [kat] SHA2-512-ACC
830,981 UART: [kat] ECC-384
3,114,944 UART: [kat] HMAC-384Kdf
3,126,883 UART: [kat] LMS
4,316,994 UART: [kat] --
4,320,587 UART: [cold-reset] ++
4,321,664 UART: [fht] Storing FHT @ 0x50003400
4,332,857 UART: [idev] ++
4,333,493 UART: [idev] CDI.KEYID = 6
4,334,413 UART: [idev] SUBJECT.KEYID = 7
4,335,651 UART: [idev] UDS.KEYID = 0
4,336,727 ready_for_fw is high
4,336,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,872 UART: [idev] Erasing UDS.KEYID = 0
7,619,961 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,444 UART: [idev] --
7,646,296 UART: [ldev] ++
7,646,900 UART: [ldev] CDI.KEYID = 6
7,647,810 UART: [ldev] SUBJECT.KEYID = 5
7,649,024 UART: [ldev] AUTHORITY.KEYID = 7
7,650,253 UART: [ldev] FE.KEYID = 1
7,659,864 UART: [ldev] Erasing FE.KEYID = 1
10,949,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,800 UART: [ldev] --
13,308,712 UART: [fwproc] Waiting for Commands...
13,311,882 UART: [fwproc] Received command 0x46574c44
13,314,076 UART: [fwproc] Received Image of size 118548 bytes
22,473,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,554,044 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,627,218 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,955,323 >>> mbox cmd response: success
22,958,599 UART: [afmc] ++
22,959,196 UART: [afmc] CDI.KEYID = 6
22,960,155 UART: [afmc] SUBJECT.KEYID = 7
22,961,361 UART: [afmc] AUTHORITY.KEYID = 5
26,273,036 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,567,624 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,569,886 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,584,375 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,599,187 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,613,593 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,634,701 UART: [afmc] --
28,639,069 UART: [cold-reset] --
28,644,175 UART: [state] Locking Datavault
28,650,123 UART: [state] Locking PCR0, PCR1 and PCR31
28,651,816 UART: [state] Locking ICCM
28,654,366 UART: [exit] Launching FMC @ 0x40000130
28,662,761 UART:
28,662,992 UART: Running Caliptra FMC ...
28,664,085 UART:
28,664,246 UART: [state] CFI Enabled
28,672,450 UART: [fht] FMC Alias Private Key: 7
31,012,220 UART: [art] Extend RT PCRs Done
31,013,443 UART: [art] Lock RT PCRs Done
31,014,954 UART: [art] Populate DV Done
31,020,260 UART: [fht] FMC Alias Private Key: 7
31,021,849 UART: [art] Derive CDI
31,022,657 UART: [art] Store in slot 0x4
31,065,537 UART: [art] Derive Key Pair
31,066,534 UART: [art] Store priv key in slot 0x5
34,308,891 UART: [art] Derive Key Pair - Done
34,321,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,601,731 UART: [art] Erasing AUTHORITY.KEYID = 7
36,603,366 UART: [art] PUB.X = E2E1C5C1AF9ACFCCB33C56203F6F8B6E7D90C41AA4F574E75417A556638BBD45309E0EB1C78B31544D509C9E80C95445
36,610,464 UART: [art] PUB.Y = 2B0E4D90FCF96D834CFADFD3316850519EF006EB97580B8D20F9DA88F1905E8B4890D93141E7B5504F37DD51D8D6ED1F
36,617,754 UART: [art] SIG.R = 99C654E332C2239A874A1B2F9C09D1EAD496483628629BE3DB6A2E34D382AB14F72FFDDCB52DB2DD24970879333A19E6
36,625,154 UART: [art] SIG.S = DD56926FCD73145D6A8293C3FEEEC0E0DCF71E4766666A928011CF9A7795AEA66034FDA45ACBE9D205F132D77A82CBF1
37,930,808 UART: Caliptra RT
37,931,515 UART: [state] CFI Enabled
38,064,896 UART: [rt] RT listening for mailbox commands...
38,067,204 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,222,527 UART: [rt]cmd =0x41544d4e, len=14344
38,224,770 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
4,129,827 ready_for_fw is high
4,130,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,278,428 >>> mbox cmd response: success
27,912,743 UART:
27,913,129 UART: Running Caliptra FMC ...
27,914,245 UART:
27,914,402 UART: [state] CFI Enabled
27,921,841 UART: [fht] FMC Alias Private Key: 7
30,261,690 UART: [art] Extend RT PCRs Done
30,262,918 UART: [art] Lock RT PCRs Done
30,264,598 UART: [art] Populate DV Done
30,270,110 UART: [fht] FMC Alias Private Key: 7
30,271,818 UART: [art] Derive CDI
30,272,553 UART: [art] Store in slot 0x4
30,315,679 UART: [art] Derive Key Pair
30,316,680 UART: [art] Store priv key in slot 0x5
33,558,721 UART: [art] Derive Key Pair - Done
33,571,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,852,315 UART: [art] Erasing AUTHORITY.KEYID = 7
35,853,839 UART: [art] PUB.X = 3E0764F9C1AFDAB5CAD89BE437F6BEB3170E1DDD84253D106D9528079B42358E8804EFC55F662876E0F56A8B78A54626
35,861,139 UART: [art] PUB.Y = BEA66F0938ABFFC19922F757CEE6F31AC788920057EBB9E57A7CBBF984F6B6AC59C6A231ED995C0FD16670CDE1BC9B48
35,868,392 UART: [art] SIG.R = B7B5C22EB1B04C54A8852442C4D76C88E5C558DBC4F3DE95CE3CCEC9A6870D35362BF925C78681D864DD16B08F177A46
35,875,805 UART: [art] SIG.S = 9C531E55E7C1232176AE2E287DC1B49CE7647C3C025B643B23549CAA0E96549EB5E94CF6FE995607FB533D6085FC887D
37,180,706 UART: Caliptra RT
37,181,392 UART: [state] CFI Enabled
37,314,936 UART: [rt] RT listening for mailbox commands...
37,317,230 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,472,501 UART: [rt]cmd =0x41544d4e, len=14344
37,474,688 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
191,981 UART:
192,337 UART: Running Caliptra ROM ...
193,538 UART:
193,691 UART: [state] CFI Enabled
263,627 UART: [state] LifecycleState = Unprovisioned
265,565 UART: [state] DebugLocked = No
268,406 UART: [state] WD Timer not started. Device not locked for debugging
272,814 UART: [kat] SHA2-256
452,445 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,254 UART: [kat] ++
463,784 UART: [kat] sha1
475,585 UART: [kat] SHA2-256
478,299 UART: [kat] SHA2-384
484,493 UART: [kat] SHA2-512-ACC
486,855 UART: [kat] ECC-384
2,948,912 UART: [kat] HMAC-384Kdf
2,972,237 UART: [kat] LMS
3,448,711 UART: [kat] --
3,454,481 UART: [cold-reset] ++
3,457,047 UART: [fht] FHT @ 0x50003400
3,468,015 UART: [idev] ++
3,468,647 UART: [idev] CDI.KEYID = 6
3,469,564 UART: [idev] SUBJECT.KEYID = 7
3,470,740 UART: [idev] UDS.KEYID = 0
3,471,787 ready_for_fw is high
3,471,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,886 UART: [idev] Erasing UDS.KEYID = 0
5,987,160 UART: [idev] Sha1 KeyId Algorithm
6,009,258 UART: [idev] --
6,015,415 UART: [ldev] ++
6,016,038 UART: [ldev] CDI.KEYID = 6
6,016,948 UART: [ldev] SUBJECT.KEYID = 5
6,018,161 UART: [ldev] AUTHORITY.KEYID = 7
6,019,389 UART: [ldev] FE.KEYID = 1
6,061,583 UART: [ldev] Erasing FE.KEYID = 1
8,569,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,911 UART: [ldev] --
10,378,389 UART: [fwproc] Wait for Commands...
10,380,478 UART: [fwproc] Recv command 0x46574c44
10,382,513 UART: [fwproc] Recv'd Img size: 118548 bytes
14,951,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,032,736 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,105,761 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,434,764 >>> mbox cmd response: success
15,438,068 UART: [afmc] ++
15,438,656 UART: [afmc] CDI.KEYID = 6
15,439,593 UART: [afmc] SUBJECT.KEYID = 7
15,440,803 UART: [afmc] AUTHORITY.KEYID = 5
17,966,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,692,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,694,974 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,710,838 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,726,738 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,742,456 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,767,781 UART: [afmc] --
19,771,965 UART: [cold-reset] --
19,774,799 UART: [state] Locking Datavault
19,779,933 UART: [state] Locking PCR0, PCR1 and PCR31
19,781,688 UART: [state] Locking ICCM
19,783,431 UART: [exit] Launching FMC @ 0x40000130
19,791,831 UART:
19,792,105 UART: Running Caliptra FMC ...
19,793,136 UART:
19,793,281 UART: [state] CFI Enabled
19,847,382 UART: [fht] FMC Alias Private Key: 7
21,635,399 UART: [art] Extend RT PCRs Done
21,636,627 UART: [art] Lock RT PCRs Done
21,638,453 UART: [art] Populate DV Done
21,643,863 UART: [fht] FMC Alias Private Key: 7
21,645,558 UART: [art] Derive CDI
21,646,290 UART: [art] Store in slot 0x4
21,700,561 UART: [art] Derive Key Pair
21,701,555 UART: [art] Store priv key in slot 0x5
24,164,157 UART: [art] Derive Key Pair - Done
24,177,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,889,737 UART: [art] Erasing AUTHORITY.KEYID = 7
25,891,261 UART: [art] PUB.X = 63E8ACFF2E44FE678E3E36CE304C183F35BC8A1149D535047F4276E4DAF1613CCC35DF80AAC161C708ED688DA3D62460
25,898,575 UART: [art] PUB.Y = 08DA7F46431564A3A50213EA904356E57850ECCD01942A7D63D6E8E1585BE3674BB5DC677470D661FE7159624906765F
25,905,761 UART: [art] SIG.R = 6C7A59C40B5B31C84987AA75BAFE2AB7FD74F4A9BCACDAA3C774DBF1C24F4CD8ED902F56CBF6CA33BDB7CAE7F8A54876
25,913,209 UART: [art] SIG.S = 590EC46B396E2449B362C68A5C9A87B49B1A109D4C5E4FA3528D965DB78C6CF0794694E531BCA80D57FC43E339362A67
26,892,094 UART: Caliptra RT
26,892,805 UART: [state] CFI Enabled
27,072,679 UART: [rt] RT listening for mailbox commands...
27,075,018 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,230,593 UART: [rt]cmd =0x41544d4e, len=14344
27,232,562 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,460,266 ready_for_fw is high
3,460,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,383,468 >>> mbox cmd response: success
19,668,290 UART:
19,668,671 UART: Running Caliptra FMC ...
19,669,859 UART:
19,670,027 UART: [state] CFI Enabled
19,735,502 UART: [fht] FMC Alias Private Key: 7
21,502,199 UART: [art] Extend RT PCRs Done
21,503,413 UART: [art] Lock RT PCRs Done
21,505,031 UART: [art] Populate DV Done
21,510,400 UART: [fht] FMC Alias Private Key: 7
21,511,992 UART: [art] Derive CDI
21,512,805 UART: [art] Store in slot 0x4
21,568,388 UART: [art] Derive Key Pair
21,569,424 UART: [art] Store priv key in slot 0x5
24,032,002 UART: [art] Derive Key Pair - Done
24,044,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,758,339 UART: [art] Erasing AUTHORITY.KEYID = 7
25,759,823 UART: [art] PUB.X = 99D24F66F4445CC7637520D5B85D737D1CD5AF984541FDA7174673525B784CDD5AA10985D2BCE424132415B75203C8E1
25,767,124 UART: [art] PUB.Y = 5CE8A74B456E4381B48B180E1D49D90F27205F38FE124F0F97F1C1C6EBEC305E9CC002B38036A20BB7C482CAA35A6CDA
25,774,362 UART: [art] SIG.R = 9A8E5C123265D5AA37A3BA5F0590BA291186C8D8E6FC430D1F78AA5FA5CCB01E06F92ABFD01AC8CB21B26ACFCB6A1175
25,781,758 UART: [art] SIG.S = 21327021723677D4C8BDC2753F27AE15F284163D844E05F37CC4C6F2E7CF5D0F30755474BBBD41B7A9A4B2BA65D4668B
26,761,166 UART: Caliptra RT
26,761,901 UART: [state] CFI Enabled
26,942,350 UART: [rt] RT listening for mailbox commands...
26,944,668 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,100,033 UART: [rt]cmd =0x41544d4e, len=14344
27,102,011 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
192,506 UART:
192,853 UART: Running Caliptra ROM ...
193,976 UART:
603,744 UART: [state] CFI Enabled
620,404 UART: [state] LifecycleState = Unprovisioned
622,375 UART: [state] DebugLocked = No
625,103 UART: [state] WD Timer not started. Device not locked for debugging
628,276 UART: [kat] SHA2-256
807,945 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,753 UART: [kat] ++
819,202 UART: [kat] sha1
830,238 UART: [kat] SHA2-256
832,963 UART: [kat] SHA2-384
839,098 UART: [kat] SHA2-512-ACC
841,472 UART: [kat] ECC-384
3,280,040 UART: [kat] HMAC-384Kdf
3,292,412 UART: [kat] LMS
3,768,911 UART: [kat] --
3,775,537 UART: [cold-reset] ++
3,777,116 UART: [fht] FHT @ 0x50003400
3,789,516 UART: [idev] ++
3,790,111 UART: [idev] CDI.KEYID = 6
3,791,148 UART: [idev] SUBJECT.KEYID = 7
3,792,324 UART: [idev] UDS.KEYID = 0
3,793,257 ready_for_fw is high
3,793,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,405 UART: [idev] Erasing UDS.KEYID = 0
6,264,588 UART: [idev] Sha1 KeyId Algorithm
6,288,369 UART: [idev] --
6,293,391 UART: [ldev] ++
6,293,964 UART: [ldev] CDI.KEYID = 6
6,294,931 UART: [ldev] SUBJECT.KEYID = 5
6,296,092 UART: [ldev] AUTHORITY.KEYID = 7
6,297,385 UART: [ldev] FE.KEYID = 1
6,309,764 UART: [ldev] Erasing FE.KEYID = 1
8,787,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,828 UART: [ldev] --
10,582,536 UART: [fwproc] Wait for Commands...
10,584,574 UART: [fwproc] Recv command 0x46574c44
10,586,566 UART: [fwproc] Recv'd Img size: 118548 bytes
15,147,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,234,758 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,307,750 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,635,743 >>> mbox cmd response: success
15,639,668 UART: [afmc] ++
15,640,288 UART: [afmc] CDI.KEYID = 6
15,641,315 UART: [afmc] SUBJECT.KEYID = 7
15,642,486 UART: [afmc] AUTHORITY.KEYID = 5
18,142,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,865,161 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,867,341 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,883,213 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,899,129 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,914,860 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,939,795 UART: [afmc] --
19,942,746 UART: [cold-reset] --
19,946,500 UART: [state] Locking Datavault
19,953,801 UART: [state] Locking PCR0, PCR1 and PCR31
19,955,508 UART: [state] Locking ICCM
19,957,720 UART: [exit] Launching FMC @ 0x40000130
19,966,123 UART:
19,966,360 UART: Running Caliptra FMC ...
19,967,464 UART:
19,967,627 UART: [state] CFI Enabled
19,975,734 UART: [fht] FMC Alias Private Key: 7
21,741,914 UART: [art] Extend RT PCRs Done
21,743,134 UART: [art] Lock RT PCRs Done
21,744,769 UART: [art] Populate DV Done
21,750,249 UART: [fht] FMC Alias Private Key: 7
21,751,988 UART: [art] Derive CDI
21,752,813 UART: [art] Store in slot 0x4
21,795,463 UART: [art] Derive Key Pair
21,796,469 UART: [art] Store priv key in slot 0x5
24,223,429 UART: [art] Derive Key Pair - Done
24,236,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,943,544 UART: [art] Erasing AUTHORITY.KEYID = 7
25,945,051 UART: [art] PUB.X = 9E65378E3F9DDE7E1D4461E5F018D96F17065D481C06068F7FC2FD8D930FC408EDF602B3B9DE0DBE29D40A4B69812A56
25,952,301 UART: [art] PUB.Y = 006F9280287FCE38D1BC11459C29335C54774353B709A584F10695C52F94827CA4C6D2D9BDE60B4A18AEF894974B02CB
25,959,533 UART: [art] SIG.R = 4A0C98D2E0EF903A7068E4EA8E6DC08A8CE0F83F378CAD1866C0A71587C7DD03B0140490DD2EE339271969DFFD03C969
25,966,919 UART: [art] SIG.S = 6406AC9326D3A6990485A9BF6F6DDBABC042554A5F83521157CA682C538665E0FD1CA3C9BE8EB46D5F9E0AA8DF7166BF
26,946,098 UART: Caliptra RT
26,946,936 UART: [state] CFI Enabled
27,079,872 UART: [rt] RT listening for mailbox commands...
27,082,195 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,237,544 UART: [rt]cmd =0x41544d4e, len=14344
27,239,514 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,779,397 ready_for_fw is high
3,779,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,601,846 >>> mbox cmd response: success
19,849,065 UART:
19,849,474 UART: Running Caliptra FMC ...
19,850,577 UART:
19,850,730 UART: [state] CFI Enabled
19,858,630 UART: [fht] FMC Alias Private Key: 7
21,625,067 UART: [art] Extend RT PCRs Done
21,626,294 UART: [art] Lock RT PCRs Done
21,627,761 UART: [art] Populate DV Done
21,633,286 UART: [fht] FMC Alias Private Key: 7
21,634,922 UART: [art] Derive CDI
21,635,751 UART: [art] Store in slot 0x4
21,678,243 UART: [art] Derive Key Pair
21,679,248 UART: [art] Store priv key in slot 0x5
24,106,010 UART: [art] Derive Key Pair - Done
24,118,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,824,556 UART: [art] Erasing AUTHORITY.KEYID = 7
25,826,080 UART: [art] PUB.X = 1C932FD4C3A1AFD62EC2C578E0DF4303ABEFE893D4E4BB696BD1EA95E43167A4FE9DC10B8C97C1880F04989083F785B6
25,833,366 UART: [art] PUB.Y = 28D055DB86C068D042A56460F0FB461683CDE171048B76D30674E4B46AED4F254B12498B550C046F83EA7A1C9F7C30DC
25,840,579 UART: [art] SIG.R = 243E8BACCAC891E07707B12D9A1EF06BBA1005554ABA2EEEDEAC13570D6ED004B20FE75DBA737D06854A91489C58E059
25,847,981 UART: [art] SIG.S = 03023E284C10EFF2090B7D5DAD7E3B938C336F87BAB465AD671D1E588350373600F7BD0476A243D3C78FF2523BB81929
26,826,957 UART: Caliptra RT
26,827,643 UART: [state] CFI Enabled
26,961,167 UART: [rt] RT listening for mailbox commands...
26,963,492 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,118,953 UART: [rt]cmd =0x41544d4e, len=14344
27,120,659 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,200 UART:
192,560 UART: Running Caliptra ROM ...
193,748 UART:
193,907 UART: [state] CFI Enabled
264,992 UART: [state] LifecycleState = Unprovisioned
267,335 UART: [state] DebugLocked = No
269,229 UART: [state] WD Timer not started. Device not locked for debugging
273,182 UART: [kat] SHA2-256
463,041 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,905 UART: [kat] ++
474,380 UART: [kat] sha1
485,749 UART: [kat] SHA2-256
488,763 UART: [kat] SHA2-384
495,812 UART: [kat] SHA2-512-ACC
498,389 UART: [kat] ECC-384
2,947,644 UART: [kat] HMAC-384Kdf
2,972,323 UART: [kat] LMS
3,504,064 UART: [kat] --
3,509,711 UART: [cold-reset] ++
3,511,002 UART: [fht] FHT @ 0x50003400
3,523,083 UART: [idev] ++
3,523,777 UART: [idev] CDI.KEYID = 6
3,524,714 UART: [idev] SUBJECT.KEYID = 7
3,525,890 UART: [idev] UDS.KEYID = 0
3,526,813 ready_for_fw is high
3,527,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,064 UART: [idev] Erasing UDS.KEYID = 0
6,053,230 UART: [idev] Sha1 KeyId Algorithm
6,075,419 UART: [idev] --
6,080,197 UART: [ldev] ++
6,080,890 UART: [ldev] CDI.KEYID = 6
6,081,775 UART: [ldev] SUBJECT.KEYID = 5
6,082,984 UART: [ldev] AUTHORITY.KEYID = 7
6,084,180 UART: [ldev] FE.KEYID = 1
6,123,400 UART: [ldev] Erasing FE.KEYID = 1
8,632,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,395,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,410,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,479 UART: [ldev] --
10,435,142 UART: [fwproc] Wait for Commands...
10,437,230 UART: [fwproc] Recv command 0x46574c44
10,439,532 UART: [fwproc] Recv'd Img size: 118548 bytes
15,103,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,190,235 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,313,843 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,874,355 >>> mbox cmd response: success
15,877,946 UART: [afmc] ++
15,878,693 UART: [afmc] CDI.KEYID = 6
15,879,888 UART: [afmc] SUBJECT.KEYID = 7
15,881,324 UART: [afmc] AUTHORITY.KEYID = 5
18,402,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,131,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,133,347 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,148,431 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,163,652 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,178,674 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,202,118 UART: [afmc] --
20,206,350 UART: [cold-reset] --
20,209,190 UART: [state] Locking Datavault
20,215,090 UART: [state] Locking PCR0, PCR1 and PCR31
20,217,246 UART: [state] Locking ICCM
20,218,477 UART: [exit] Launching FMC @ 0x40000130
20,227,107 UART:
20,227,358 UART: Running Caliptra FMC ...
20,228,462 UART:
20,228,628 UART: [state] CFI Enabled
20,289,431 UART: [fht] FMC Alias Private Key: 7
22,056,376 UART: [art] Extend RT PCRs Done
22,057,596 UART: [art] Lock RT PCRs Done
22,059,359 UART: [art] Populate DV Done
22,064,768 UART: [fht] FMC Alias Private Key: 7
22,066,520 UART: [art] Derive CDI
22,067,337 UART: [art] Store in slot 0x4
22,122,194 UART: [art] Derive Key Pair
22,123,234 UART: [art] Store priv key in slot 0x5
24,587,244 UART: [art] Derive Key Pair - Done
24,599,809 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,312,469 UART: [art] Erasing AUTHORITY.KEYID = 7
26,314,126 UART: [art] PUB.X = B64C9C751DA24BF594EFBF6528F042AA9021C122CC199A3F48526678F425CACB1527597614126FE1E883C8B75934501A
26,321,250 UART: [art] PUB.Y = 73FFC2F3E1E821C0C68C5D3755C61B4024D1F75AAE402AB3D466A4A369562306CF887B78ECAB3111D5F940995D867216
26,328,464 UART: [art] SIG.R = 9BAA64F4BE88E39C5C43C632B31007B26F4FD6E18356DACCA51099EAEDC2737969A28CE8592F93242704250385564B19
26,335,836 UART: [art] SIG.S = 101A847F1F275F01C033EA6F6B7D1AF51CB282F3FBB1846F853D431ED59E7DEB583BE4381897EEA339C199A5B05CA566
27,314,764 UART: Caliptra RT
27,315,454 UART: [state] CFI Enabled
27,496,116 UART: [rt] RT listening for mailbox commands...
27,498,456 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,654,043 UART: [rt]cmd =0x41544d4e, len=14344
27,655,905 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,417,944 ready_for_fw is high
3,418,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,908,572 >>> mbox cmd response: success
20,216,202 UART:
20,216,596 UART: Running Caliptra FMC ...
20,217,696 UART:
20,217,851 UART: [state] CFI Enabled
20,284,994 UART: [fht] FMC Alias Private Key: 7
22,051,886 UART: [art] Extend RT PCRs Done
22,053,113 UART: [art] Lock RT PCRs Done
22,054,985 UART: [art] Populate DV Done
22,060,344 UART: [fht] FMC Alias Private Key: 7
22,062,043 UART: [art] Derive CDI
22,062,783 UART: [art] Store in slot 0x4
22,118,043 UART: [art] Derive Key Pair
22,119,087 UART: [art] Store priv key in slot 0x5
24,581,997 UART: [art] Derive Key Pair - Done
24,594,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,307,181 UART: [art] Erasing AUTHORITY.KEYID = 7
26,308,688 UART: [art] PUB.X = 874DF982D2A6A30375C58DCBBA07E3AF148D03D204640536FB376E73C9EA0C20FB4FF0870952A308BCA238BE93DB548D
26,315,965 UART: [art] PUB.Y = 1A493197C4FB053EE17E5D86FE2269741B227D45693F3748B32752DB1A54E3A0D8845A76E39FFEB2D6EB72A00A7A2291
26,323,246 UART: [art] SIG.R = 2FEE6D35C82A070ED74B165F53E442D746EFE6D5911D5DFCC6019DE47AA647DF7FFE7F6A81D1D4C8EE968D6C73219CAF
26,330,616 UART: [art] SIG.S = 7BD1919C182D3926AAB7B0A1583A504BA542C1461557B66089D688D2A852E0170599C2FFF584BE43BD4A4B0D78C50D06
27,309,536 UART: Caliptra RT
27,310,226 UART: [state] CFI Enabled
27,489,864 UART: [rt] RT listening for mailbox commands...
27,492,169 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,647,539 UART: [rt]cmd =0x41544d4e, len=14344
27,649,233 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,290 UART:
193,076 UART: Running Caliptra ROM ...
194,284 UART:
603,625 UART: [state] CFI Enabled
621,430 UART: [state] LifecycleState = Unprovisioned
623,838 UART: [state] DebugLocked = No
626,282 UART: [state] WD Timer not started. Device not locked for debugging
630,754 UART: [kat] SHA2-256
820,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,399 UART: [kat] ++
831,927 UART: [kat] sha1
843,370 UART: [kat] SHA2-256
846,389 UART: [kat] SHA2-384
851,812 UART: [kat] SHA2-512-ACC
854,400 UART: [kat] ECC-384
3,299,286 UART: [kat] HMAC-384Kdf
3,312,387 UART: [kat] LMS
3,844,175 UART: [kat] --
3,849,474 UART: [cold-reset] ++
3,851,701 UART: [fht] FHT @ 0x50003400
3,862,902 UART: [idev] ++
3,863,567 UART: [idev] CDI.KEYID = 6
3,864,607 UART: [idev] SUBJECT.KEYID = 7
3,865,717 UART: [idev] UDS.KEYID = 0
3,866,703 ready_for_fw is high
3,866,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,016,343 UART: [idev] Erasing UDS.KEYID = 0
6,338,073 UART: [idev] Sha1 KeyId Algorithm
6,361,462 UART: [idev] --
6,365,643 UART: [ldev] ++
6,366,333 UART: [ldev] CDI.KEYID = 6
6,367,253 UART: [ldev] SUBJECT.KEYID = 5
6,368,419 UART: [ldev] AUTHORITY.KEYID = 7
6,369,650 UART: [ldev] FE.KEYID = 1
6,380,330 UART: [ldev] Erasing FE.KEYID = 1
8,856,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,870 UART: [ldev] --
10,647,648 UART: [fwproc] Wait for Commands...
10,650,231 UART: [fwproc] Recv command 0x46574c44
10,652,487 UART: [fwproc] Recv'd Img size: 118548 bytes
15,306,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,382,737 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,506,360 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,065,801 >>> mbox cmd response: success
16,070,006 UART: [afmc] ++
16,070,745 UART: [afmc] CDI.KEYID = 6
16,071,868 UART: [afmc] SUBJECT.KEYID = 7
16,073,377 UART: [afmc] AUTHORITY.KEYID = 5
18,574,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,299,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,301,477 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,316,576 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,331,827 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,346,812 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,371,313 UART: [afmc] --
20,375,732 UART: [cold-reset] --
20,378,418 UART: [state] Locking Datavault
20,385,316 UART: [state] Locking PCR0, PCR1 and PCR31
20,387,482 UART: [state] Locking ICCM
20,388,779 UART: [exit] Launching FMC @ 0x40000130
20,397,416 UART:
20,397,659 UART: Running Caliptra FMC ...
20,398,764 UART:
20,398,927 UART: [state] CFI Enabled
20,407,302 UART: [fht] FMC Alias Private Key: 7
22,173,609 UART: [art] Extend RT PCRs Done
22,174,838 UART: [art] Lock RT PCRs Done
22,176,273 UART: [art] Populate DV Done
22,181,692 UART: [fht] FMC Alias Private Key: 7
22,183,240 UART: [art] Derive CDI
22,183,978 UART: [art] Store in slot 0x4
22,226,898 UART: [art] Derive Key Pair
22,227,939 UART: [art] Store priv key in slot 0x5
24,654,500 UART: [art] Derive Key Pair - Done
24,667,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,373,920 UART: [art] Erasing AUTHORITY.KEYID = 7
26,375,432 UART: [art] PUB.X = D9E79E80C13B061AC3A5FB6705E7A8E5E3FA76F9F267FD061A93EA30717CFDB13603FE901F7B08C09148B9C03D42E223
26,382,699 UART: [art] PUB.Y = B9560370D22B7FD73B377A81215D62D8364A12214D96547DFB07A389120884679D1954E06A5B173D0420847D7BA11568
26,389,901 UART: [art] SIG.R = 283DE96EA0D0C191C86D90D2B8402FC22F1E3E173421C5929B485D85AA8449E948F8EEDD63A06C728C1E6228793D0334
26,397,276 UART: [art] SIG.S = D00DC2FD5897CD1D04BB48913F9B56E45651DCFADEBE055A272B5F7A997CE9FA5F5E9717513B83FC3E0B22900E601E28
27,375,363 UART: Caliptra RT
27,376,097 UART: [state] CFI Enabled
27,509,764 UART: [rt] RT listening for mailbox commands...
27,512,208 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,667,634 UART: [rt]cmd =0x41544d4e, len=14344
27,669,442 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,754,361 ready_for_fw is high
3,754,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,155,236 >>> mbox cmd response: success
20,409,308 UART:
20,409,711 UART: Running Caliptra FMC ...
20,410,947 UART:
20,411,131 UART: [state] CFI Enabled
20,419,242 UART: [fht] FMC Alias Private Key: 7
22,184,759 UART: [art] Extend RT PCRs Done
22,185,981 UART: [art] Lock RT PCRs Done
22,187,669 UART: [art] Populate DV Done
22,193,139 UART: [fht] FMC Alias Private Key: 7
22,194,638 UART: [art] Derive CDI
22,195,408 UART: [art] Store in slot 0x4
22,238,178 UART: [art] Derive Key Pair
22,239,185 UART: [art] Store priv key in slot 0x5
24,665,556 UART: [art] Derive Key Pair - Done
24,678,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,384,806 UART: [art] Erasing AUTHORITY.KEYID = 7
26,386,321 UART: [art] PUB.X = FF0F1FDFB66626FF9D19FEF96467F0F63A83D4DB99DB4A4C4315822C312B854848906BB7024EEABB5E2B9343C5C3098D
26,393,555 UART: [art] PUB.Y = 65520EDC285C9BDA13BE215A80AFCCECCA5B0810EC93850017977B99797AD2CE4E147C94284F59040E4F47E07DD369B5
26,400,806 UART: [art] SIG.R = B34AFA884555554D45631A51AB7B07C6E2706351F449CD827CA4D1C699B3FCC65ED8188A0ED80F8C1BABBBD0150177E8
26,408,208 UART: [art] SIG.S = 33730EA3E524E9CC30F1B81B040FF932B801B35B28A27E17492D9DECA40B1CC8C2290F0428169596D2ACB55DEB7C1800
27,387,156 UART: Caliptra RT
27,387,850 UART: [state] CFI Enabled
27,521,064 UART: [rt] RT listening for mailbox commands...
27,523,361 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,678,836 UART: [rt]cmd =0x41544d4e, len=14344
27,680,804 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,101 UART: [kat] SHA2-256
882,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,147 UART: [kat] ++
886,299 UART: [kat] sha1
890,747 UART: [kat] SHA2-256
892,685 UART: [kat] SHA2-384
895,480 UART: [kat] SHA2-512-ACC
897,381 UART: [kat] ECC-384
902,640 UART: [kat] HMAC-384Kdf
907,416 UART: [kat] LMS
1,475,612 UART: [kat] --
1,476,307 UART: [cold-reset] ++
1,476,869 UART: [fht] Storing FHT @ 0x50003400
1,479,678 UART: [idev] ++
1,479,846 UART: [idev] CDI.KEYID = 6
1,480,206 UART: [idev] SUBJECT.KEYID = 7
1,480,630 UART: [idev] UDS.KEYID = 0
1,480,975 ready_for_fw is high
1,480,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,660 UART: [idev] Erasing UDS.KEYID = 0
1,505,272 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,906 UART: [idev] --
1,514,933 UART: [ldev] ++
1,515,101 UART: [ldev] CDI.KEYID = 6
1,515,464 UART: [ldev] SUBJECT.KEYID = 5
1,515,890 UART: [ldev] AUTHORITY.KEYID = 7
1,516,353 UART: [ldev] FE.KEYID = 1
1,521,215 UART: [ldev] Erasing FE.KEYID = 1
1,546,696 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,234 UART: [ldev] --
1,585,745 UART: [fwproc] Waiting for Commands...
1,586,384 UART: [fwproc] Received command 0x46574c44
1,587,175 UART: [fwproc] Received Image of size 118548 bytes
5,091,840 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,119,682 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,150,900 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,291,315 >>> mbox cmd response: success
5,292,545 UART: [afmc] ++
5,292,713 UART: [afmc] CDI.KEYID = 6
5,293,075 UART: [afmc] SUBJECT.KEYID = 7
5,293,500 UART: [afmc] AUTHORITY.KEYID = 5
5,328,647 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,344,767 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,345,547 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,351,253 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,357,132 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,362,845 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,370,700 UART: [afmc] --
5,371,670 UART: [cold-reset] --
5,372,386 UART: [state] Locking Datavault
5,373,283 UART: [state] Locking PCR0, PCR1 and PCR31
5,373,887 UART: [state] Locking ICCM
5,374,321 UART: [exit] Launching FMC @ 0x40000130
5,379,651 UART:
5,379,667 UART: Running Caliptra FMC ...
5,380,075 UART:
5,380,129 UART: [state] CFI Enabled
5,390,651 UART: [fht] FMC Alias Private Key: 7
5,509,527 UART: [art] Extend RT PCRs Done
5,509,955 UART: [art] Lock RT PCRs Done
5,511,481 UART: [art] Populate DV Done
5,519,720 UART: [fht] FMC Alias Private Key: 7
5,520,886 UART: [art] Derive CDI
5,521,166 UART: [art] Store in slot 0x4
5,606,358 UART: [art] Derive Key Pair
5,606,718 UART: [art] Store priv key in slot 0x5
5,619,849 UART: [art] Derive Key Pair - Done
5,634,250 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,649,747 UART: [art] Erasing AUTHORITY.KEYID = 7
5,650,512 UART: [art] PUB.X = 1C33D77AC5C156B76154780437CA9596613CF1C664764A767DE35C08B71FF07EE287ECAFD3A3E15B6736A2512CAE559A
5,657,280 UART: [art] PUB.Y = 8F5682C0D83EC9A241DC189C0A2344C20E5DC00CF715C248EC734E8F8082D46C4D6ECFA06ECBB639F29BFE4F64E88EC6
5,664,239 UART: [art] SIG.R = 542165C3A1FCBB52CF0DFC9ECE8F560CFFFF18B93FD6A270A8BB671A9926C5FE083ADAC8D2F24D6C002FC3F64523EDE9
5,671,006 UART: [art] SIG.S = 287F7D0F659F676D8350EB3040E3BD4F71AE067D07094732664AE0ECAE3927CCB408B6B31A5E64B915722F3C5B336E08
5,695,086 UART: Caliptra RT
5,695,337 UART: [state] CFI Enabled
5,814,076 UART: [rt] RT listening for mailbox commands...
5,814,746 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,937,594 UART: [rt]cmd =0x41544d4e, len=14344
5,938,927 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,983 ready_for_fw is high
1,362,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,256,458 >>> mbox cmd response: success
5,317,729 UART:
5,317,745 UART: Running Caliptra FMC ...
5,318,153 UART:
5,318,207 UART: [state] CFI Enabled
5,328,829 UART: [fht] FMC Alias Private Key: 7
5,448,137 UART: [art] Extend RT PCRs Done
5,448,565 UART: [art] Lock RT PCRs Done
5,450,233 UART: [art] Populate DV Done
5,458,414 UART: [fht] FMC Alias Private Key: 7
5,459,588 UART: [art] Derive CDI
5,459,868 UART: [art] Store in slot 0x4
5,545,842 UART: [art] Derive Key Pair
5,546,202 UART: [art] Store priv key in slot 0x5
5,559,591 UART: [art] Derive Key Pair - Done
5,574,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,589,578 UART: [art] Erasing AUTHORITY.KEYID = 7
5,590,343 UART: [art] PUB.X = 5DE6B6806DB92F0B6FFD93F1554A8A4618A11EBC6C0B8C114BBC3124FEF3DF4EBC720837361F04821CEA2519B097DE44
5,597,115 UART: [art] PUB.Y = B81C1FED4F14FE7C5A95804E0201C7C691C63E02270EF0CF111A5A891BB4EC2CEB0A893E5D813957C239A830551102A7
5,604,053 UART: [art] SIG.R = 4979D76BD52801EEA2FA176F02F41E82E1C46CC6B3C79BD13F9C3D39FEA6117FF5B7572C86A3258FB2DF670E980A500D
5,610,820 UART: [art] SIG.S = 2811BC58DDD6D49EC0E634948D502CD0045A507711074E6FDE0A92A0D88136AA356979BBACE5ABCC84B4326902C63292
5,635,040 UART: Caliptra RT
5,635,291 UART: [state] CFI Enabled
5,755,202 UART: [rt] RT listening for mailbox commands...
5,755,872 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,878,914 UART: [rt]cmd =0x41544d4e, len=14344
5,880,525 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
87,054 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,712 UART: [kat] SHA2-256
882,643 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,758 UART: [kat] ++
886,910 UART: [kat] sha1
890,934 UART: [kat] SHA2-256
892,872 UART: [kat] SHA2-384
895,615 UART: [kat] SHA2-512-ACC
897,516 UART: [kat] ECC-384
903,311 UART: [kat] HMAC-384Kdf
907,881 UART: [kat] LMS
1,476,077 UART: [kat] --
1,476,878 UART: [cold-reset] ++
1,477,214 UART: [fht] Storing FHT @ 0x50003400
1,480,051 UART: [idev] ++
1,480,219 UART: [idev] CDI.KEYID = 6
1,480,579 UART: [idev] SUBJECT.KEYID = 7
1,481,003 UART: [idev] UDS.KEYID = 0
1,481,348 ready_for_fw is high
1,481,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,547 UART: [idev] Erasing UDS.KEYID = 0
1,505,677 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,289 UART: [idev] --
1,515,412 UART: [ldev] ++
1,515,580 UART: [ldev] CDI.KEYID = 6
1,515,943 UART: [ldev] SUBJECT.KEYID = 5
1,516,369 UART: [ldev] AUTHORITY.KEYID = 7
1,516,832 UART: [ldev] FE.KEYID = 1
1,521,666 UART: [ldev] Erasing FE.KEYID = 1
1,547,061 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,737 UART: [ldev] --
1,586,228 UART: [fwproc] Waiting for Commands...
1,586,925 UART: [fwproc] Received command 0x46574c44
1,587,716 UART: [fwproc] Received Image of size 118548 bytes
5,205,720 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,233,818 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,265,036 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,405,371 >>> mbox cmd response: success
5,406,505 UART: [afmc] ++
5,406,673 UART: [afmc] CDI.KEYID = 6
5,407,035 UART: [afmc] SUBJECT.KEYID = 7
5,407,460 UART: [afmc] AUTHORITY.KEYID = 5
5,442,625 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,458,853 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,459,633 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,465,339 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,471,218 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,476,931 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,484,714 UART: [afmc] --
5,485,728 UART: [cold-reset] --
5,486,620 UART: [state] Locking Datavault
5,487,855 UART: [state] Locking PCR0, PCR1 and PCR31
5,488,459 UART: [state] Locking ICCM
5,488,887 UART: [exit] Launching FMC @ 0x40000130
5,494,217 UART:
5,494,233 UART: Running Caliptra FMC ...
5,494,641 UART:
5,494,784 UART: [state] CFI Enabled
5,505,360 UART: [fht] FMC Alias Private Key: 7
5,624,306 UART: [art] Extend RT PCRs Done
5,624,734 UART: [art] Lock RT PCRs Done
5,626,242 UART: [art] Populate DV Done
5,634,623 UART: [fht] FMC Alias Private Key: 7
5,635,573 UART: [art] Derive CDI
5,635,853 UART: [art] Store in slot 0x4
5,721,843 UART: [art] Derive Key Pair
5,722,203 UART: [art] Store priv key in slot 0x5
5,735,608 UART: [art] Derive Key Pair - Done
5,750,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,765,674 UART: [art] Erasing AUTHORITY.KEYID = 7
5,766,439 UART: [art] PUB.X = 0495B393347E4026A54F982C5E907050F5725292D04870622F672C18B7AC74B16AFD561E165851EAD0FD64441C5CFEC0
5,773,200 UART: [art] PUB.Y = 3A2A24CA382D9011E1FE131B072597C94E061AB3ACD400DEF2A828577C068C9FA2EB70F232DF822E782CD056B631195C
5,780,125 UART: [art] SIG.R = E8B11A91224E0FCA8AA2823B1990DE44B6010C17B89523C55DBB8F914D8ED10B7DC913DBAAA94FF7BDBBD34A272E6713
5,786,901 UART: [art] SIG.S = 6EBFD731EFB3328C0AAA9C40950AF160AF093638D91F2A1DD367727678DA1C3AB7DE5328B7FE48EE47BE48F9BC6D9FBB
5,810,924 UART: Caliptra RT
5,811,267 UART: [state] CFI Enabled
5,932,185 UART: [rt] RT listening for mailbox commands...
5,932,855 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,055,757 UART: [rt]cmd =0x41544d4e, len=14344
6,057,208 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,352 ready_for_fw is high
1,363,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,331,307 >>> mbox cmd response: success
5,392,012 UART:
5,392,028 UART: Running Caliptra FMC ...
5,392,436 UART:
5,392,579 UART: [state] CFI Enabled
5,403,407 UART: [fht] FMC Alias Private Key: 7
5,522,869 UART: [art] Extend RT PCRs Done
5,523,297 UART: [art] Lock RT PCRs Done
5,524,677 UART: [art] Populate DV Done
5,532,974 UART: [fht] FMC Alias Private Key: 7
5,534,118 UART: [art] Derive CDI
5,534,398 UART: [art] Store in slot 0x4
5,620,596 UART: [art] Derive Key Pair
5,620,956 UART: [art] Store priv key in slot 0x5
5,633,673 UART: [art] Derive Key Pair - Done
5,648,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,663,983 UART: [art] Erasing AUTHORITY.KEYID = 7
5,664,748 UART: [art] PUB.X = 8AD0CBC657FCC27B0534A5DCE4AF6A03E76A26B6B91B8F4585C8AA156A4DFF058094A631016AB6363A1881B597CF7230
5,671,516 UART: [art] PUB.Y = E18A8021A384ECD6C6CE668149D6EF51A4063876B61F9AA2B9E5EB98E974AAE528A98CBAD0C333ADA70BC11C57E19133
5,678,474 UART: [art] SIG.R = F0620395382F0039BFDA00E53E0D749B5023E50231416306AEF6A65EDD0A9757CCE8F97B7B82E70EAF1DEB9DA2F5D257
5,685,192 UART: [art] SIG.S = 91F29B116A2F356770B5BD566BB304DFA9DEECF6E36BF323533989AC5B7D9A81535A791BF5C9973977C2F0BF986196CF
5,709,009 UART: Caliptra RT
5,709,352 UART: [state] CFI Enabled
5,829,775 UART: [rt] RT listening for mailbox commands...
5,830,445 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,953,283 UART: [rt]cmd =0x41544d4e, len=14344
5,954,788 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,392 UART: [kat] ++
895,544 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,213 UART: [kat] SHA2-512-ACC
906,114 UART: [kat] ECC-384
915,373 UART: [kat] HMAC-384Kdf
919,953 UART: [kat] LMS
1,168,265 UART: [kat] --
1,169,128 UART: [cold-reset] ++
1,169,518 UART: [fht] FHT @ 0x50003400
1,172,098 UART: [idev] ++
1,172,266 UART: [idev] CDI.KEYID = 6
1,172,627 UART: [idev] SUBJECT.KEYID = 7
1,173,052 UART: [idev] UDS.KEYID = 0
1,173,398 ready_for_fw is high
1,173,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,885 UART: [idev] Erasing UDS.KEYID = 0
1,198,153 UART: [idev] Sha1 KeyId Algorithm
1,206,899 UART: [idev] --
1,207,950 UART: [ldev] ++
1,208,118 UART: [ldev] CDI.KEYID = 6
1,208,482 UART: [ldev] SUBJECT.KEYID = 5
1,208,909 UART: [ldev] AUTHORITY.KEYID = 7
1,209,372 UART: [ldev] FE.KEYID = 1
1,214,650 UART: [ldev] Erasing FE.KEYID = 1
1,240,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,568 UART: [ldev] --
1,280,005 UART: [fwproc] Wait for Commands...
1,280,746 UART: [fwproc] Recv command 0x46574c44
1,281,479 UART: [fwproc] Recv'd Img size: 118548 bytes
3,160,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,188,694 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,219,869 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,360,270 >>> mbox cmd response: success
3,361,514 UART: [afmc] ++
3,361,682 UART: [afmc] CDI.KEYID = 6
3,362,045 UART: [afmc] SUBJECT.KEYID = 7
3,362,471 UART: [afmc] AUTHORITY.KEYID = 5
3,398,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,414,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,415,354 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,421,061 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,426,938 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,432,648 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,440,344 UART: [afmc] --
3,441,287 UART: [cold-reset] --
3,442,089 UART: [state] Locking Datavault
3,443,484 UART: [state] Locking PCR0, PCR1 and PCR31
3,444,088 UART: [state] Locking ICCM
3,444,706 UART: [exit] Launching FMC @ 0x40000130
3,450,036 UART:
3,450,052 UART: Running Caliptra FMC ...
3,450,460 UART:
3,450,514 UART: [state] CFI Enabled
3,461,350 UART: [fht] FMC Alias Private Key: 7
3,580,044 UART: [art] Extend RT PCRs Done
3,580,472 UART: [art] Lock RT PCRs Done
3,581,816 UART: [art] Populate DV Done
3,590,283 UART: [fht] FMC Alias Private Key: 7
3,591,449 UART: [art] Derive CDI
3,591,729 UART: [art] Store in slot 0x4
3,677,706 UART: [art] Derive Key Pair
3,678,066 UART: [art] Store priv key in slot 0x5
3,691,142 UART: [art] Derive Key Pair - Done
3,705,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,721,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,722,382 UART: [art] PUB.X = 9FCD68CE79E29FC9B4C4A093A275B7CCE0000DC4B72426D49562E69CA6B56DAB2BE82F8218872F12F08B5A57424C45FD
3,729,139 UART: [art] PUB.Y = 967A91EA336B39B010D14E84BC7322CC366A073AC1860247D9EF99B44754DA5119C5DB1AEFA812E80332D0E779479CF2
3,736,082 UART: [art] SIG.R = BCD4EC1E85FC894B1C5503080B6351B5BABE8AFA5213B62E7EDEFFC299AA84FF503EF0746BD79798FB22D8E97B10FD94
3,742,865 UART: [art] SIG.S = AC068EA2D2A24EA33B4D03829C9BAA5D002CCB7340F66C4748B536A070B405675A655970BDB4B58EF538A786AC06CB4F
3,766,973 UART: Caliptra RT
3,767,224 UART: [state] CFI Enabled
3,886,371 UART: [rt] RT listening for mailbox commands...
3,887,041 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,415 UART: [rt]cmd =0x41544d4e, len=14344
4,012,074 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,820 ready_for_fw is high
1,059,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,231,072 >>> mbox cmd response: success
3,292,699 UART:
3,292,715 UART: Running Caliptra FMC ...
3,293,123 UART:
3,293,177 UART: [state] CFI Enabled
3,303,365 UART: [fht] FMC Alias Private Key: 7
3,421,611 UART: [art] Extend RT PCRs Done
3,422,039 UART: [art] Lock RT PCRs Done
3,424,007 UART: [art] Populate DV Done
3,432,110 UART: [fht] FMC Alias Private Key: 7
3,433,252 UART: [art] Derive CDI
3,433,532 UART: [art] Store in slot 0x4
3,519,373 UART: [art] Derive Key Pair
3,519,733 UART: [art] Store priv key in slot 0x5
3,533,433 UART: [art] Derive Key Pair - Done
3,547,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,564,140 UART: [art] PUB.X = 1B6E65EA35E2487CD17CC32D2A5302E83123AD20A1B4C9D2FEF3A81CA85B821D819E4C8F6676797BFF2A5523BB11543F
3,570,917 UART: [art] PUB.Y = C3F26EE8B7AACB2B0D604F3AE83198FE9C815CEE82E60F8D0234D14653A87DE303BC8AD6B69A994509CEE64696E8B9C9
3,577,868 UART: [art] SIG.R = 326DA3F25AA8BE84F4134308922E8AB5454679D24CF105E5BB2430B4A64C187743E2B28AF3D699FD10D63D6BEC8BEA25
3,584,640 UART: [art] SIG.S = 752C32DF115BA69923B49BBF14E5A263026B0988761571074FB276248AA6E34B28C99230147C2B8B54FE1A8D31D987CA
3,608,419 UART: Caliptra RT
3,608,670 UART: [state] CFI Enabled
3,728,500 UART: [rt] RT listening for mailbox commands...
3,729,170 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,154 UART: [rt]cmd =0x41544d4e, len=14344
3,853,451 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,825 UART: [state] LifecycleState = Unprovisioned
85,480 UART: [state] DebugLocked = No
86,042 UART: [state] WD Timer not started. Device not locked for debugging
87,257 UART: [kat] SHA2-256
890,807 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,911 UART: [kat] ++
895,063 UART: [kat] sha1
899,443 UART: [kat] SHA2-256
901,383 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
916,164 UART: [kat] HMAC-384Kdf
920,836 UART: [kat] LMS
1,169,148 UART: [kat] --
1,169,873 UART: [cold-reset] ++
1,170,435 UART: [fht] FHT @ 0x50003400
1,173,113 UART: [idev] ++
1,173,281 UART: [idev] CDI.KEYID = 6
1,173,642 UART: [idev] SUBJECT.KEYID = 7
1,174,067 UART: [idev] UDS.KEYID = 0
1,174,413 ready_for_fw is high
1,174,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,966 UART: [idev] Erasing UDS.KEYID = 0
1,198,532 UART: [idev] Sha1 KeyId Algorithm
1,207,420 UART: [idev] --
1,208,507 UART: [ldev] ++
1,208,675 UART: [ldev] CDI.KEYID = 6
1,209,039 UART: [ldev] SUBJECT.KEYID = 5
1,209,466 UART: [ldev] AUTHORITY.KEYID = 7
1,209,929 UART: [ldev] FE.KEYID = 1
1,215,049 UART: [ldev] Erasing FE.KEYID = 1
1,240,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,797 UART: [ldev] --
1,280,044 UART: [fwproc] Wait for Commands...
1,280,667 UART: [fwproc] Recv command 0x46574c44
1,281,400 UART: [fwproc] Recv'd Img size: 118548 bytes
3,166,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,194,555 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,225,730 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,051 >>> mbox cmd response: success
3,367,115 UART: [afmc] ++
3,367,283 UART: [afmc] CDI.KEYID = 6
3,367,646 UART: [afmc] SUBJECT.KEYID = 7
3,368,072 UART: [afmc] AUTHORITY.KEYID = 5
3,403,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,419,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,420,437 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,426,144 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,432,021 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,437,731 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,445,483 UART: [afmc] --
3,446,516 UART: [cold-reset] --
3,447,406 UART: [state] Locking Datavault
3,448,543 UART: [state] Locking PCR0, PCR1 and PCR31
3,449,147 UART: [state] Locking ICCM
3,449,649 UART: [exit] Launching FMC @ 0x40000130
3,454,979 UART:
3,454,995 UART: Running Caliptra FMC ...
3,455,403 UART:
3,455,546 UART: [state] CFI Enabled
3,466,264 UART: [fht] FMC Alias Private Key: 7
3,585,072 UART: [art] Extend RT PCRs Done
3,585,500 UART: [art] Lock RT PCRs Done
3,587,436 UART: [art] Populate DV Done
3,595,585 UART: [fht] FMC Alias Private Key: 7
3,596,619 UART: [art] Derive CDI
3,596,899 UART: [art] Store in slot 0x4
3,682,606 UART: [art] Derive Key Pair
3,682,966 UART: [art] Store priv key in slot 0x5
3,695,906 UART: [art] Derive Key Pair - Done
3,710,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,726,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,727,284 UART: [art] PUB.X = AF0EED1AE7A75CE6E2329E80159C501AE8CBBDA8B4F9A0920B6B7C0EF0CD260009BBE60D88114EA98ACC35FA66B0C746
3,734,041 UART: [art] PUB.Y = F18C1FFB187DDD4B880ED33A509D690551F447C7E4CC2042126AB79FA5481A27F813185895C4C6D1CAD0DF0E266C2AA1
3,740,992 UART: [art] SIG.R = E8655FD70DF8485EA1C5E36C261CEF15B20788565C4820C9AF6A29280D7D2975E43A47A8D606BBD3096F5786B33D5BDC
3,747,753 UART: [art] SIG.S = AF7C00B2F85D7A21A1A29331C57F416EC4D7CDCBDD4BEBC0D459314BCE3C7E34A546A9EF724738D1B0015719E7E71560
3,771,690 UART: Caliptra RT
3,772,033 UART: [state] CFI Enabled
3,891,604 UART: [rt] RT listening for mailbox commands...
3,892,274 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,015,290 UART: [rt]cmd =0x41544d4e, len=14344
4,016,725 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,897 ready_for_fw is high
1,058,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,228,092 >>> mbox cmd response: success
3,289,509 UART:
3,289,525 UART: Running Caliptra FMC ...
3,289,933 UART:
3,290,076 UART: [state] CFI Enabled
3,300,664 UART: [fht] FMC Alias Private Key: 7
3,419,488 UART: [art] Extend RT PCRs Done
3,419,916 UART: [art] Lock RT PCRs Done
3,421,438 UART: [art] Populate DV Done
3,429,523 UART: [fht] FMC Alias Private Key: 7
3,430,537 UART: [art] Derive CDI
3,430,817 UART: [art] Store in slot 0x4
3,516,966 UART: [art] Derive Key Pair
3,517,326 UART: [art] Store priv key in slot 0x5
3,530,712 UART: [art] Derive Key Pair - Done
3,545,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,561,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,772 UART: [art] PUB.X = 400EB9B8B18CDE0DC98EF2D4666D12368B73E88A9425A87345114C4311FA72F4C6724775B9A098C91C785DD5C40467D7
3,568,531 UART: [art] PUB.Y = 4214A9B2BEA0D387F7DB4F328ABA3063C897C4AA9FFAFF0596F609C5429011A0CCF446F1D83091C35B4B24E124523180
3,575,481 UART: [art] SIG.R = 03281239DD2DDA357EE2475F33399E362407D870C09C4CEDAD89DAE53ED665704807133B8D5CDF593CEB1D425CA3AB38
3,582,250 UART: [art] SIG.S = 4E68931F76D5E60BA67DD02C2424954A3A38ACB134E5ABA3083E02BEDEF754C62BA4F64D1176F0E29A2C91AD35B5D226
3,606,095 UART: Caliptra RT
3,606,438 UART: [state] CFI Enabled
3,726,276 UART: [rt] RT listening for mailbox commands...
3,726,946 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,714 UART: [rt]cmd =0x41544d4e, len=14344
3,851,337 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
893,486 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,611 UART: [kat] ++
897,763 UART: [kat] sha1
902,149 UART: [kat] SHA2-256
904,089 UART: [kat] SHA2-384
906,850 UART: [kat] SHA2-512-ACC
908,751 UART: [kat] ECC-384
918,468 UART: [kat] HMAC-384Kdf
922,900 UART: [kat] LMS
1,171,228 UART: [kat] --
1,172,163 UART: [cold-reset] ++
1,172,497 UART: [fht] FHT @ 0x50003400
1,174,928 UART: [idev] ++
1,175,096 UART: [idev] CDI.KEYID = 6
1,175,456 UART: [idev] SUBJECT.KEYID = 7
1,175,880 UART: [idev] UDS.KEYID = 0
1,176,225 ready_for_fw is high
1,176,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,588 UART: [idev] Erasing UDS.KEYID = 0
1,200,313 UART: [idev] Sha1 KeyId Algorithm
1,208,963 UART: [idev] --
1,210,223 UART: [ldev] ++
1,210,391 UART: [ldev] CDI.KEYID = 6
1,210,754 UART: [ldev] SUBJECT.KEYID = 5
1,211,180 UART: [ldev] AUTHORITY.KEYID = 7
1,211,643 UART: [ldev] FE.KEYID = 1
1,216,621 UART: [ldev] Erasing FE.KEYID = 1
1,242,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,663 UART: [ldev] --
1,281,984 UART: [fwproc] Wait for Commands...
1,282,714 UART: [fwproc] Recv command 0x46574c44
1,283,442 UART: [fwproc] Recv'd Img size: 118548 bytes
3,177,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,205,278 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,448 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,717 >>> mbox cmd response: success
3,377,853 UART: [afmc] ++
3,378,021 UART: [afmc] CDI.KEYID = 6
3,378,383 UART: [afmc] SUBJECT.KEYID = 7
3,378,808 UART: [afmc] AUTHORITY.KEYID = 5
3,415,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,416 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,122 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,001 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,449,711 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,457,538 UART: [afmc] --
3,458,640 UART: [cold-reset] --
3,459,606 UART: [state] Locking Datavault
3,460,659 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,263 UART: [state] Locking ICCM
3,461,771 UART: [exit] Launching FMC @ 0x40000130
3,467,101 UART:
3,467,117 UART: Running Caliptra FMC ...
3,467,525 UART:
3,467,579 UART: [state] CFI Enabled
3,478,133 UART: [fht] FMC Alias Private Key: 7
3,596,663 UART: [art] Extend RT PCRs Done
3,597,091 UART: [art] Lock RT PCRs Done
3,598,749 UART: [art] Populate DV Done
3,606,852 UART: [fht] FMC Alias Private Key: 7
3,607,976 UART: [art] Derive CDI
3,608,256 UART: [art] Store in slot 0x4
3,693,837 UART: [art] Derive Key Pair
3,694,197 UART: [art] Store priv key in slot 0x5
3,708,015 UART: [art] Derive Key Pair - Done
3,722,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,625 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,390 UART: [art] PUB.X = F3612F58946B348FA63EDDB12C483CE6B10231510796B30409E2EEFC95073F814001E2898220DA37FAA495B39186075F
3,746,133 UART: [art] PUB.Y = 3824FC3A8FF5D533D513BC87CBD18FE1D37BBD3CF2C1FEDB0B3514826F53356AC354850D5EFAF9909A3996D1F6D113E8
3,753,093 UART: [art] SIG.R = D24A534310CB5D1154F8BF40D90DF6B792D13174EE5CC8A0F755D15D470895767365D8854A7FC611561267265D94DAAD
3,759,855 UART: [art] SIG.S = 43153C2049A470CF1158D3540B42D1DC6E2E70CE52AE7682C11D59E33D9C5E23C1FBE410BA4B57C2CAA52CD6B4AAE517
3,784,048 UART: Caliptra RT
3,784,299 UART: [state] CFI Enabled
3,903,793 UART: [rt] RT listening for mailbox commands...
3,904,463 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,277 UART: [rt]cmd =0x41544d4e, len=14344
4,028,520 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,673 ready_for_fw is high
1,060,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,221 >>> mbox cmd response: success
3,289,634 UART:
3,289,650 UART: Running Caliptra FMC ...
3,290,058 UART:
3,290,112 UART: [state] CFI Enabled
3,300,408 UART: [fht] FMC Alias Private Key: 7
3,419,750 UART: [art] Extend RT PCRs Done
3,420,178 UART: [art] Lock RT PCRs Done
3,421,844 UART: [art] Populate DV Done
3,429,921 UART: [fht] FMC Alias Private Key: 7
3,430,991 UART: [art] Derive CDI
3,431,271 UART: [art] Store in slot 0x4
3,516,616 UART: [art] Derive Key Pair
3,516,976 UART: [art] Store priv key in slot 0x5
3,530,570 UART: [art] Derive Key Pair - Done
3,545,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,561,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,815 UART: [art] PUB.X = FFC842EDE29B17B8A0334B22D4004831D7FE2ED3287C5911793F9A382EE4BEAD8D32FFFA88FF740F89073CB5ADA4E87F
3,568,575 UART: [art] PUB.Y = AB510CF0832AA5A689976F67A5993139448702D17105388E19F87ADF516D98435887549324A33EBCA96192798BCC9CA2
3,575,506 UART: [art] SIG.R = 2F9180AB8D01A7480401598D7B9F74AFE27FF6F369B43DE5DA5123F50C35F6EF50FB895F0C2D2565DA47BC86BF6703C5
3,582,268 UART: [art] SIG.S = 958473711DA8BEB154D1C031B258E0D040E3B2F11809F4E07A84ACF7D1743973C4218358973FC16A4009B3EE299B9E93
3,606,570 UART: Caliptra RT
3,606,821 UART: [state] CFI Enabled
3,726,579 UART: [rt] RT listening for mailbox commands...
3,727,249 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,850,393 UART: [rt]cmd =0x41544d4e, len=14344
3,852,074 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
87,064 UART: [state] WD Timer not started. Device not locked for debugging
88,281 UART: [kat] SHA2-256
893,931 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,056 UART: [kat] ++
898,208 UART: [kat] sha1
902,444 UART: [kat] SHA2-256
904,384 UART: [kat] SHA2-384
907,281 UART: [kat] SHA2-512-ACC
909,182 UART: [kat] ECC-384
919,273 UART: [kat] HMAC-384Kdf
923,913 UART: [kat] LMS
1,172,241 UART: [kat] --
1,173,460 UART: [cold-reset] ++
1,173,928 UART: [fht] FHT @ 0x50003400
1,176,575 UART: [idev] ++
1,176,743 UART: [idev] CDI.KEYID = 6
1,177,103 UART: [idev] SUBJECT.KEYID = 7
1,177,527 UART: [idev] UDS.KEYID = 0
1,177,872 ready_for_fw is high
1,177,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,109 UART: [idev] Erasing UDS.KEYID = 0
1,202,824 UART: [idev] Sha1 KeyId Algorithm
1,211,366 UART: [idev] --
1,212,466 UART: [ldev] ++
1,212,634 UART: [ldev] CDI.KEYID = 6
1,212,997 UART: [ldev] SUBJECT.KEYID = 5
1,213,423 UART: [ldev] AUTHORITY.KEYID = 7
1,213,886 UART: [ldev] FE.KEYID = 1
1,219,102 UART: [ldev] Erasing FE.KEYID = 1
1,245,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,728 UART: [ldev] --
1,284,995 UART: [fwproc] Wait for Commands...
1,285,577 UART: [fwproc] Recv command 0x46574c44
1,286,305 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,456 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,626 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,791 >>> mbox cmd response: success
3,372,957 UART: [afmc] ++
3,373,125 UART: [afmc] CDI.KEYID = 6
3,373,487 UART: [afmc] SUBJECT.KEYID = 7
3,373,912 UART: [afmc] AUTHORITY.KEYID = 5
3,409,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,860 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,566 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,438,445 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,155 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,068 UART: [afmc] --
3,453,104 UART: [cold-reset] --
3,454,076 UART: [state] Locking Datavault
3,455,235 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,839 UART: [state] Locking ICCM
3,456,279 UART: [exit] Launching FMC @ 0x40000130
3,461,609 UART:
3,461,625 UART: Running Caliptra FMC ...
3,462,033 UART:
3,462,176 UART: [state] CFI Enabled
3,472,778 UART: [fht] FMC Alias Private Key: 7
3,591,682 UART: [art] Extend RT PCRs Done
3,592,110 UART: [art] Lock RT PCRs Done
3,593,790 UART: [art] Populate DV Done
3,602,135 UART: [fht] FMC Alias Private Key: 7
3,603,099 UART: [art] Derive CDI
3,603,379 UART: [art] Store in slot 0x4
3,689,246 UART: [art] Derive Key Pair
3,689,606 UART: [art] Store priv key in slot 0x5
3,703,162 UART: [art] Derive Key Pair - Done
3,718,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,734,381 UART: [art] PUB.X = 47E3F333A05D4036DFE8E2C8DAEB38B298986BB1FCDAA13901FA04D5D8926AAF6645FED87FB02E211D0202102B780F0A
3,741,147 UART: [art] PUB.Y = C9E46B269E4D3936C37131E8B85E3568EA22BF2BD19B64D0EB26DECFB96FE52371065DF7309D43DA11B4BA15094F50F9
3,748,101 UART: [art] SIG.R = D33CD743FE210FB2B291B838968D07FFC0B247FE082B0B393160AC5AD9CBB41E33448A2F1B307E760BBB19DA327F50E7
3,754,868 UART: [art] SIG.S = 83F92B65D8D7EA705A3B2662D6BBFBAC15C1D35055F4504ED686103F1B6728F28E28E6B17A0041525B97B8C99D43420C
3,779,041 UART: Caliptra RT
3,779,384 UART: [state] CFI Enabled
3,898,535 UART: [rt] RT listening for mailbox commands...
3,899,205 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,375 UART: [rt]cmd =0x41544d4e, len=14344
4,023,808 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,378 ready_for_fw is high
1,060,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,215,982 >>> mbox cmd response: success
3,278,735 UART:
3,278,751 UART: Running Caliptra FMC ...
3,279,159 UART:
3,279,302 UART: [state] CFI Enabled
3,290,144 UART: [fht] FMC Alias Private Key: 7
3,409,340 UART: [art] Extend RT PCRs Done
3,409,768 UART: [art] Lock RT PCRs Done
3,411,258 UART: [art] Populate DV Done
3,419,361 UART: [fht] FMC Alias Private Key: 7
3,420,385 UART: [art] Derive CDI
3,420,665 UART: [art] Store in slot 0x4
3,506,026 UART: [art] Derive Key Pair
3,506,386 UART: [art] Store priv key in slot 0x5
3,519,780 UART: [art] Derive Key Pair - Done
3,534,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,549,958 UART: [art] Erasing AUTHORITY.KEYID = 7
3,550,723 UART: [art] PUB.X = 06A541EDC44E1FCF335A0A07F777A9A16AF714F7ABDE71F26ADCE461C3814868515595D15ED9FA48C43BFA34E4E502A3
3,557,495 UART: [art] PUB.Y = 198779272F7D1C5C567F7D3D4AF7F7F8D9BAC9EB89ECF82A49AA1A71482B4B0BE9E5BA6C579741CDA7437E6DC4C197C9
3,564,460 UART: [art] SIG.R = 745C74BB0FE41A1E5D1A5BEAE7D6676D9DE12FC7CFDAC7B6709FB6951994C72663156B3F8AAA757089BF3D6F4DF680AE
3,571,247 UART: [art] SIG.S = 1361065464C1BC3C140485B33DE067466F540DEA30909358D0B4DB05B9FF85DDCD85EC2F3083423043513018E5E10F91
3,594,670 UART: Caliptra RT
3,595,013 UART: [state] CFI Enabled
3,715,011 UART: [rt] RT listening for mailbox commands...
3,715,681 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,553 UART: [rt]cmd =0x41544d4e, len=14344
3,840,060 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,066 UART:
192,442 UART: Running Caliptra ROM ...
193,597 UART:
193,745 UART: [state] CFI Enabled
263,657 UART: [state] LifecycleState = Unprovisioned
265,654 UART: [state] DebugLocked = No
267,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,987 UART: [kat] SHA2-256
442,645 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,177 UART: [kat] ++
453,711 UART: [kat] sha1
464,687 UART: [kat] SHA2-256
467,417 UART: [kat] SHA2-384
474,400 UART: [kat] SHA2-512-ACC
476,769 UART: [kat] ECC-384
2,768,466 UART: [kat] HMAC-384Kdf
2,801,121 UART: [kat] LMS
3,991,389 UART: [kat] --
3,996,828 UART: [cold-reset] ++
3,999,189 UART: [fht] Storing FHT @ 0x50003400
4,011,449 UART: [idev] ++
4,012,014 UART: [idev] CDI.KEYID = 6
4,013,053 UART: [idev] SUBJECT.KEYID = 7
4,014,230 UART: [idev] UDS.KEYID = 0
4,015,324 ready_for_fw is high
4,015,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,687 UART: [idev] Erasing UDS.KEYID = 0
7,343,821 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,636 UART: [idev] --
7,369,956 UART: [ldev] ++
7,370,525 UART: [ldev] CDI.KEYID = 6
7,371,489 UART: [ldev] SUBJECT.KEYID = 5
7,372,702 UART: [ldev] AUTHORITY.KEYID = 7
7,373,988 UART: [ldev] FE.KEYID = 1
7,401,467 UART: [ldev] Erasing FE.KEYID = 1
10,733,631 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,997 UART: [ldev] --
13,093,185 UART: [fwproc] Waiting for Commands...
13,096,148 UART: [fwproc] Received command 0x46574c44
13,098,406 UART: [fwproc] Received Image of size 118548 bytes
21,622,133 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,706,822 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,780,009 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,109,341 >>> mbox cmd response: success
22,113,064 UART: [afmc] ++
22,113,680 UART: [afmc] CDI.KEYID = 6
22,114,598 UART: [afmc] SUBJECT.KEYID = 7
22,115,817 UART: [afmc] AUTHORITY.KEYID = 5
25,485,276 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,789,367 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,791,634 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,806,082 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,820,888 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,835,254 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,856,815 UART: [afmc] --
27,859,943 UART: [cold-reset] --
27,863,975 UART: [state] Locking Datavault
27,869,695 UART: [state] Locking PCR0, PCR1 and PCR31
27,871,415 UART: [state] Locking ICCM
27,874,246 UART: [exit] Launching FMC @ 0x40000130
27,882,647 UART:
27,882,881 UART: Running Caliptra FMC ...
27,883,984 UART:
27,884,157 UART: [state] CFI Enabled
27,946,545 UART: [fht] FMC Alias Private Key: 7
30,287,106 UART: [art] Extend RT PCRs Done
30,288,332 UART: [art] Lock RT PCRs Done
30,289,851 UART: [art] Populate DV Done
30,295,378 UART: [fht] FMC Alias Private Key: 7
30,297,025 UART: [art] Derive CDI
30,297,844 UART: [art] Store in slot 0x4
30,354,423 UART: [art] Derive Key Pair
30,355,464 UART: [art] Store priv key in slot 0x5
33,648,383 UART: [art] Derive Key Pair - Done
33,661,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,949,548 UART: [art] Erasing AUTHORITY.KEYID = 7
35,951,056 UART: [art] PUB.X = D6F5D0B7922C02131A7BCD441DA378C57960F1292851381FC347F803D67E3BE5C1CEF7128AB1F46E434B115C9F2CA813
35,958,323 UART: [art] PUB.Y = 18AF590F8F94826E8D5E3493E471A7B808B164E22959435DFD97ABD17487479A44426BFED62CA594488F06040EEDA3DF
35,965,586 UART: [art] SIG.R = 404F30D2AEF4C8E632505AC4B755740BDBCF7170881C8344B48428113B2181CF5F9C79AA621BC0B24A92B3075BDA2D00
35,972,945 UART: [art] SIG.S = 000A3F980BBF4C42C1A6561F407FE81B325CE97CAA7A4B52615D1D75DE44987B722209E4464CE2670EE15078AA2C4C00
37,278,320 UART: Caliptra RT
37,279,029 UART: [state] CFI Enabled
37,454,139 UART: [rt] RT listening for mailbox commands...
37,456,517 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,612,093 UART: [rt]cmd =0x41544d4e, len=14344
37,617,197 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,803,444 ready_for_fw is high
3,804,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,965,553 >>> mbox cmd response: success
27,650,609 UART:
27,651,040 UART: Running Caliptra FMC ...
27,652,178 UART:
27,652,340 UART: [state] CFI Enabled
27,702,599 UART: [fht] FMC Alias Private Key: 7
30,042,690 UART: [art] Extend RT PCRs Done
30,044,045 UART: [art] Lock RT PCRs Done
30,045,571 UART: [art] Populate DV Done
30,050,932 UART: [fht] FMC Alias Private Key: 7
30,052,530 UART: [art] Derive CDI
30,053,349 UART: [art] Store in slot 0x4
30,110,354 UART: [art] Derive Key Pair
30,111,358 UART: [art] Store priv key in slot 0x5
33,404,119 UART: [art] Derive Key Pair - Done
33,416,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,705,264 UART: [art] Erasing AUTHORITY.KEYID = 7
35,706,782 UART: [art] PUB.X = 29DB3C35C5B106C83A570DA26C026B7869A002F642795B5E2CD0EACE5B40AB6266ABEC0759BB125CCCBA3327AB58CFC3
35,714,102 UART: [art] PUB.Y = 22B3584E542434750573A5893CD3D9928D232572944CD8EE4CDD1C84FBAEF976E6B628EF80ECE2D76882825A60265C41
35,721,338 UART: [art] SIG.R = 5C636F705B610BF31BFBC81F3B1BB0710AB90975903B3F0066474775E5FE2FBD942D4B6E939B800F50142DEE00A274B6
35,728,692 UART: [art] SIG.S = 464BE0448F38D12C47CA5C5ECD12DFFF62C074C457E66C689F837517BE33E596EEFDD0D8DA669CAC9900CF756A8DF7C7
37,033,750 UART: Caliptra RT
37,034,469 UART: [state] CFI Enabled
37,209,852 UART: [rt] RT listening for mailbox commands...
37,212,166 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,367,446 UART: [rt]cmd =0x41544d4e, len=14344
37,372,545 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,480 UART:
192,833 UART: Running Caliptra ROM ...
194,020 UART:
603,588 UART: [state] CFI Enabled
615,694 UART: [state] LifecycleState = Unprovisioned
617,640 UART: [state] DebugLocked = No
620,178 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,248 UART: [kat] SHA2-256
793,981 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,555 UART: [kat] ++
805,043 UART: [kat] sha1
816,768 UART: [kat] SHA2-256
819,414 UART: [kat] SHA2-384
824,696 UART: [kat] SHA2-512-ACC
827,056 UART: [kat] ECC-384
3,111,736 UART: [kat] HMAC-384Kdf
3,122,989 UART: [kat] LMS
4,313,107 UART: [kat] --
4,316,576 UART: [cold-reset] ++
4,317,549 UART: [fht] Storing FHT @ 0x50003400
4,328,963 UART: [idev] ++
4,329,536 UART: [idev] CDI.KEYID = 6
4,330,459 UART: [idev] SUBJECT.KEYID = 7
4,331,704 UART: [idev] UDS.KEYID = 0
4,332,775 ready_for_fw is high
4,332,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,868 UART: [idev] Erasing UDS.KEYID = 0
7,612,937 UART: [idev] Using Sha1 for KeyId Algorithm
7,635,923 UART: [idev] --
7,641,532 UART: [ldev] ++
7,642,096 UART: [ldev] CDI.KEYID = 6
7,643,037 UART: [ldev] SUBJECT.KEYID = 5
7,644,247 UART: [ldev] AUTHORITY.KEYID = 7
7,645,529 UART: [ldev] FE.KEYID = 1
7,655,824 UART: [ldev] Erasing FE.KEYID = 1
10,944,850 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,453 UART: [ldev] --
13,302,423 UART: [fwproc] Waiting for Commands...
13,304,187 UART: [fwproc] Received command 0x46574c44
13,306,366 UART: [fwproc] Received Image of size 118548 bytes
22,082,104 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,171,787 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,244,960 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,573,697 >>> mbox cmd response: success
22,578,440 UART: [afmc] ++
22,579,047 UART: [afmc] CDI.KEYID = 6
22,579,927 UART: [afmc] SUBJECT.KEYID = 7
22,581,195 UART: [afmc] AUTHORITY.KEYID = 5
25,904,622 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,199,005 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,201,237 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,215,739 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,230,545 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,244,966 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,265,390 UART: [afmc] --
28,269,145 UART: [cold-reset] --
28,273,646 UART: [state] Locking Datavault
28,277,593 UART: [state] Locking PCR0, PCR1 and PCR31
28,279,337 UART: [state] Locking ICCM
28,281,674 UART: [exit] Launching FMC @ 0x40000130
28,290,059 UART:
28,290,287 UART: Running Caliptra FMC ...
28,291,386 UART:
28,291,537 UART: [state] CFI Enabled
28,299,683 UART: [fht] FMC Alias Private Key: 7
30,639,849 UART: [art] Extend RT PCRs Done
30,641,092 UART: [art] Lock RT PCRs Done
30,643,096 UART: [art] Populate DV Done
30,648,560 UART: [fht] FMC Alias Private Key: 7
30,650,096 UART: [art] Derive CDI
30,650,906 UART: [art] Store in slot 0x4
30,693,707 UART: [art] Derive Key Pair
30,694,702 UART: [art] Store priv key in slot 0x5
33,936,900 UART: [art] Derive Key Pair - Done
33,949,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,230,552 UART: [art] Erasing AUTHORITY.KEYID = 7
36,232,060 UART: [art] PUB.X = F549BDF7EE66D40CE2783F852F68DC5E86F1CB0297DBE97B530BD7E6F7576EB3E8ABE17B1C09AD0F199C8631F73570C9
36,239,341 UART: [art] PUB.Y = 256B3BAC48A5B6F51982D2ED934F1B9DFD36A2E88B010A6882FE415DA48AC528706D464AE94FA6B1C4EDF0F8E8D9059B
36,246,584 UART: [art] SIG.R = 373880A518A808DB5A9ADBDF9C6B8A42E063A9C8C50A877587D040260785ED6C5A1DC47B8137DC9D1117178E7E62EAEA
36,253,972 UART: [art] SIG.S = 06CF4AA32DED3585EE1406806E8813B56C82655691BBD8E4A58B5E1684288A8B00A354E3E41722369153F524BA7E031E
37,559,700 UART: Caliptra RT
37,560,399 UART: [state] CFI Enabled
37,694,226 UART: [rt] RT listening for mailbox commands...
37,696,545 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,851,802 UART: [rt]cmd =0x41544d4e, len=14344
37,856,737 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.21s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
4,121,439 ready_for_fw is high
4,121,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,464,326 >>> mbox cmd response: success
28,104,093 UART:
28,104,496 UART: Running Caliptra FMC ...
28,105,628 UART:
28,105,786 UART: [state] CFI Enabled
28,113,993 UART: [fht] FMC Alias Private Key: 7
30,454,560 UART: [art] Extend RT PCRs Done
30,455,798 UART: [art] Lock RT PCRs Done
30,457,591 UART: [art] Populate DV Done
30,462,850 UART: [fht] FMC Alias Private Key: 7
30,464,398 UART: [art] Derive CDI
30,465,213 UART: [art] Store in slot 0x4
30,507,709 UART: [art] Derive Key Pair
30,508,748 UART: [art] Store priv key in slot 0x5
33,751,008 UART: [art] Derive Key Pair - Done
33,763,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,044,286 UART: [art] Erasing AUTHORITY.KEYID = 7
36,045,803 UART: [art] PUB.X = 2F37F199A0DCD35AD9B063B34A733F13B448D5D2FAEAC29C14E6B3D5BC65EE2CC801566EBBD249E0F47F6D2EB587550A
36,053,110 UART: [art] PUB.Y = 5C8C194F46A43C3B67BF58B774B1595A0B9B934814182A48D3D9ED4506ED6DC6E4097D028924776CD8CD4C68F00B87AE
36,060,317 UART: [art] SIG.R = F111616BB1F4542524D4E0470B78BA4E984DD14B522651104BEFDC50EEAC83D1EB041329A9047BC0075CF1196DEBAF84
36,067,711 UART: [art] SIG.S = 34B33EBED41CB83E3BE42AFF434DDE49C0B67980652EA25ED6C45E4FA9E5CFB07AAF49B2DFCCA81E32F0772B20BB3C9C
37,373,179 UART: Caliptra RT
37,373,886 UART: [state] CFI Enabled
37,507,300 UART: [rt] RT listening for mailbox commands...
37,509,833 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,665,104 UART: [rt]cmd =0x41544d4e, len=14344
37,670,375 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
191,980 UART:
192,364 UART: Running Caliptra ROM ...
193,495 UART:
193,638 UART: [state] CFI Enabled
265,542 UART: [state] LifecycleState = Unprovisioned
267,538 UART: [state] DebugLocked = No
269,141 UART: [state] WD Timer not started. Device not locked for debugging
273,671 UART: [kat] SHA2-256
453,360 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,102 UART: [kat] ++
464,592 UART: [kat] sha1
476,029 UART: [kat] SHA2-256
478,686 UART: [kat] SHA2-384
484,171 UART: [kat] SHA2-512-ACC
486,535 UART: [kat] ECC-384
2,946,373 UART: [kat] HMAC-384Kdf
2,970,488 UART: [kat] LMS
3,447,008 UART: [kat] --
3,451,469 UART: [cold-reset] ++
3,453,425 UART: [fht] FHT @ 0x50003400
3,465,541 UART: [idev] ++
3,466,111 UART: [idev] CDI.KEYID = 6
3,467,140 UART: [idev] SUBJECT.KEYID = 7
3,468,313 UART: [idev] UDS.KEYID = 0
3,469,234 ready_for_fw is high
3,469,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,902 UART: [idev] Erasing UDS.KEYID = 0
5,988,047 UART: [idev] Sha1 KeyId Algorithm
6,012,065 UART: [idev] --
6,017,557 UART: [ldev] ++
6,018,201 UART: [ldev] CDI.KEYID = 6
6,019,134 UART: [ldev] SUBJECT.KEYID = 5
6,020,302 UART: [ldev] AUTHORITY.KEYID = 7
6,021,537 UART: [ldev] FE.KEYID = 1
6,056,488 UART: [ldev] Erasing FE.KEYID = 1
8,562,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,797 UART: [ldev] --
10,374,924 UART: [fwproc] Wait for Commands...
10,377,606 UART: [fwproc] Recv command 0x46574c44
10,379,649 UART: [fwproc] Recv'd Img size: 118548 bytes
14,916,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,003,080 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,076,106 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,404,943 >>> mbox cmd response: success
15,408,284 UART: [afmc] ++
15,408,876 UART: [afmc] CDI.KEYID = 6
15,409,897 UART: [afmc] SUBJECT.KEYID = 7
15,411,056 UART: [afmc] AUTHORITY.KEYID = 5
17,940,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,683,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,685,669 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,701,527 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,717,426 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,733,141 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,758,360 UART: [afmc] --
19,762,170 UART: [cold-reset] --
19,765,003 UART: [state] Locking Datavault
19,772,200 UART: [state] Locking PCR0, PCR1 and PCR31
19,773,993 UART: [state] Locking ICCM
19,776,680 UART: [exit] Launching FMC @ 0x40000130
19,785,073 UART:
19,785,307 UART: Running Caliptra FMC ...
19,786,342 UART:
19,786,487 UART: [state] CFI Enabled
19,840,515 UART: [fht] FMC Alias Private Key: 7
21,606,507 UART: [art] Extend RT PCRs Done
21,607,726 UART: [art] Lock RT PCRs Done
21,609,547 UART: [art] Populate DV Done
21,614,883 UART: [fht] FMC Alias Private Key: 7
21,616,474 UART: [art] Derive CDI
21,617,208 UART: [art] Store in slot 0x4
21,673,320 UART: [art] Derive Key Pair
21,674,317 UART: [art] Store priv key in slot 0x5
24,137,097 UART: [art] Derive Key Pair - Done
24,150,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,863,179 UART: [art] Erasing AUTHORITY.KEYID = 7
25,864,686 UART: [art] PUB.X = BC3C663918CDE349F0B4849A3A4431B71DBA00C0927AAB12E6A1C2BC73152A2CA8C3611CEFE5D697D175338882D24DBE
25,871,930 UART: [art] PUB.Y = EC2D4F2F96FB25C4433349B0FC93906AD0B7C57AE51D1BDBAD69A3D434CB810B8ABAD897A1BB21432B0736B3B9265CD5
25,879,176 UART: [art] SIG.R = 990C8783492B03EB7AA5E206E72E2AF7200D355DD04C680AC67A920614F16EC62A9EEFE148DDF881E0D0C9CF50C50536
25,886,567 UART: [art] SIG.S = C92E71C5FB3F452316624EC6D1C040174D4697139C4ADF5D59343D8679F4DAEAF698434138944D820096856895C330FD
26,864,990 UART: Caliptra RT
26,865,675 UART: [state] CFI Enabled
27,047,849 UART: [rt] RT listening for mailbox commands...
27,050,257 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,205,440 UART: [rt]cmd =0x41544d4e, len=14344
27,210,515 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,460,145 ready_for_fw is high
3,460,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,431,807 >>> mbox cmd response: success
19,723,758 UART:
19,724,134 UART: Running Caliptra FMC ...
19,725,246 UART:
19,725,403 UART: [state] CFI Enabled
19,794,046 UART: [fht] FMC Alias Private Key: 7
21,581,290 UART: [art] Extend RT PCRs Done
21,582,516 UART: [art] Lock RT PCRs Done
21,584,381 UART: [art] Populate DV Done
21,589,642 UART: [fht] FMC Alias Private Key: 7
21,591,228 UART: [art] Derive CDI
21,591,959 UART: [art] Store in slot 0x4
21,646,943 UART: [art] Derive Key Pair
21,647,985 UART: [art] Store priv key in slot 0x5
24,111,412 UART: [art] Derive Key Pair - Done
24,124,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,837,640 UART: [art] Erasing AUTHORITY.KEYID = 7
25,839,169 UART: [art] PUB.X = 43286FEE5E58804B872E50B73FF6CF219BE4C6939AACA3D2C03EF8004E5A440B269DB1C0849ED144D428F3E94EA192C6
25,846,372 UART: [art] PUB.Y = DCB138D087F2BF814A4B690E677ED24D9B2DEDE2FB4236CD340BB02AEEF3517F1A6C54BC3EA5BAA542BF55B550B93579
25,853,665 UART: [art] SIG.R = A752CD2CA4EA0592E98CE53123368F2FE173BD5946B05A8C1905C278EC98F24CE3180C96D705676496CFCAA97E7D4FFF
25,861,067 UART: [art] SIG.S = BEA15DD2A74585247B181EB5EFD0920B19128DE97720C2B0B2D6557374A6007A067E5CC880EC5A485AC5D33C4145432D
26,840,095 UART: Caliptra RT
26,840,790 UART: [state] CFI Enabled
27,021,034 UART: [rt] RT listening for mailbox commands...
27,023,360 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,178,676 UART: [rt]cmd =0x41544d4e, len=14344
27,183,556 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,444 UART:
192,798 UART: Running Caliptra ROM ...
193,991 UART:
603,577 UART: [state] CFI Enabled
619,673 UART: [state] LifecycleState = Unprovisioned
621,651 UART: [state] DebugLocked = No
624,310 UART: [state] WD Timer not started. Device not locked for debugging
627,847 UART: [kat] SHA2-256
807,504 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,272 UART: [kat] ++
818,724 UART: [kat] sha1
829,884 UART: [kat] SHA2-256
832,617 UART: [kat] SHA2-384
837,474 UART: [kat] SHA2-512-ACC
839,846 UART: [kat] ECC-384
3,280,691 UART: [kat] HMAC-384Kdf
3,292,667 UART: [kat] LMS
3,769,168 UART: [kat] --
3,775,167 UART: [cold-reset] ++
3,777,523 UART: [fht] FHT @ 0x50003400
3,788,075 UART: [idev] ++
3,788,642 UART: [idev] CDI.KEYID = 6
3,789,673 UART: [idev] SUBJECT.KEYID = 7
3,790,847 UART: [idev] UDS.KEYID = 0
3,791,790 ready_for_fw is high
3,791,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,841 UART: [idev] Erasing UDS.KEYID = 0
6,268,930 UART: [idev] Sha1 KeyId Algorithm
6,292,952 UART: [idev] --
6,297,618 UART: [ldev] ++
6,298,205 UART: [ldev] CDI.KEYID = 6
6,299,116 UART: [ldev] SUBJECT.KEYID = 5
6,300,350 UART: [ldev] AUTHORITY.KEYID = 7
6,301,583 UART: [ldev] FE.KEYID = 1
6,313,147 UART: [ldev] Erasing FE.KEYID = 1
8,792,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,623 UART: [ldev] --
10,587,855 UART: [fwproc] Wait for Commands...
10,590,000 UART: [fwproc] Recv command 0x46574c44
10,591,988 UART: [fwproc] Recv'd Img size: 118548 bytes
15,143,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,221,625 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,294,653 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,622,885 >>> mbox cmd response: success
15,626,829 UART: [afmc] ++
15,627,447 UART: [afmc] CDI.KEYID = 6
15,628,337 UART: [afmc] SUBJECT.KEYID = 7
15,629,561 UART: [afmc] AUTHORITY.KEYID = 5
18,134,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,856,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,858,655 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,874,530 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,890,423 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,906,154 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,932,106 UART: [afmc] --
19,935,601 UART: [cold-reset] --
19,938,437 UART: [state] Locking Datavault
19,944,500 UART: [state] Locking PCR0, PCR1 and PCR31
19,946,204 UART: [state] Locking ICCM
19,948,305 UART: [exit] Launching FMC @ 0x40000130
19,956,677 UART:
19,956,920 UART: Running Caliptra FMC ...
19,958,031 UART:
19,958,201 UART: [state] CFI Enabled
19,966,148 UART: [fht] FMC Alias Private Key: 7
21,731,907 UART: [art] Extend RT PCRs Done
21,733,262 UART: [art] Lock RT PCRs Done
21,734,738 UART: [art] Populate DV Done
21,740,047 UART: [fht] FMC Alias Private Key: 7
21,741,753 UART: [art] Derive CDI
21,742,572 UART: [art] Store in slot 0x4
21,785,016 UART: [art] Derive Key Pair
21,786,023 UART: [art] Store priv key in slot 0x5
24,213,070 UART: [art] Derive Key Pair - Done
24,225,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,932,055 UART: [art] Erasing AUTHORITY.KEYID = 7
25,933,581 UART: [art] PUB.X = F2AF1A86192C845B4C39C6C3A9EBD61ED0B0A34728EF36BE73FF8A2172F555166880E9E547FC3F9C53769F0B99428083
25,940,821 UART: [art] PUB.Y = D054DDD124C827BB7C5ACFD0F16055D8B48D6180D85D89CAD3E861203FF70C16D4633F17562297D84801451D14F08EE9
25,948,055 UART: [art] SIG.R = DE10736A569FE19A36A602A3CF2388F6B8E5252672A4413E7BA42EF3CDFE983B981C33AE7E04FB2661D32EE4FF979F7A
25,955,445 UART: [art] SIG.S = D3CB98A265DB8589E9D20FE264E30445718DCFC649DF7EB16535798FB7FD9C6CDE779860058FD366C276E20AC59B5DDA
26,934,503 UART: Caliptra RT
26,935,186 UART: [state] CFI Enabled
27,068,551 UART: [rt] RT listening for mailbox commands...
27,070,851 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,226,368 UART: [rt]cmd =0x41544d4e, len=14344
27,231,572 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,781,221 ready_for_fw is high
3,781,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,613,218 >>> mbox cmd response: success
19,868,394 UART:
19,868,809 UART: Running Caliptra FMC ...
19,869,971 UART:
19,870,132 UART: [state] CFI Enabled
19,878,199 UART: [fht] FMC Alias Private Key: 7
21,644,688 UART: [art] Extend RT PCRs Done
21,645,908 UART: [art] Lock RT PCRs Done
21,647,669 UART: [art] Populate DV Done
21,653,435 UART: [fht] FMC Alias Private Key: 7
21,654,872 UART: [art] Derive CDI
21,655,640 UART: [art] Store in slot 0x4
21,698,400 UART: [art] Derive Key Pair
21,699,412 UART: [art] Store priv key in slot 0x5
24,126,454 UART: [art] Derive Key Pair - Done
24,139,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,846,186 UART: [art] Erasing AUTHORITY.KEYID = 7
25,847,689 UART: [art] PUB.X = A802DDF4FB0F3F88D93222533ACE01EC06B45A34D10751FF33479DE20C583ABEBC0C2BDBC037EE0ED32748E384AFD757
25,854,976 UART: [art] PUB.Y = 5508B9C22811238F4DDAC429A768A024F95D6A4692524591A6B9B015FE08ACE6B5771841FBE6FACB13E28FBD0D54A57A
25,862,218 UART: [art] SIG.R = BDFBF3F282D5A228A05E44A23CE06E1FA0F69C6A4E1DC2991547C4A3C14F9EC999ED8A08EEA9683B2DB7B984FFBE6589
25,869,623 UART: [art] SIG.S = 8CC03423BBDAD45CD706D45E5AF8DCC5CCE8FC00EDE768EB7FEC3994C9232CD51D6E8BA95B232DA18F9B8EF45395537F
26,848,132 UART: Caliptra RT
26,848,823 UART: [state] CFI Enabled
26,983,055 UART: [rt] RT listening for mailbox commands...
26,985,384 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,141,113 UART: [rt]cmd =0x41544d4e, len=14344
27,146,390 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,212 UART:
192,574 UART: Running Caliptra ROM ...
193,776 UART:
193,935 UART: [state] CFI Enabled
266,881 UART: [state] LifecycleState = Unprovisioned
269,300 UART: [state] DebugLocked = No
271,972 UART: [state] WD Timer not started. Device not locked for debugging
276,213 UART: [kat] SHA2-256
466,146 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,899 UART: [kat] ++
477,347 UART: [kat] sha1
487,932 UART: [kat] SHA2-256
490,937 UART: [kat] SHA2-384
496,495 UART: [kat] SHA2-512-ACC
499,070 UART: [kat] ECC-384
2,951,055 UART: [kat] HMAC-384Kdf
2,972,182 UART: [kat] LMS
3,503,961 UART: [kat] --
3,507,517 UART: [cold-reset] ++
3,509,630 UART: [fht] FHT @ 0x50003400
3,519,832 UART: [idev] ++
3,520,536 UART: [idev] CDI.KEYID = 6
3,521,566 UART: [idev] SUBJECT.KEYID = 7
3,522,735 UART: [idev] UDS.KEYID = 0
3,523,660 ready_for_fw is high
3,523,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,899 UART: [idev] Erasing UDS.KEYID = 0
6,027,847 UART: [idev] Sha1 KeyId Algorithm
6,050,763 UART: [idev] --
6,055,679 UART: [ldev] ++
6,056,361 UART: [ldev] CDI.KEYID = 6
6,057,271 UART: [ldev] SUBJECT.KEYID = 5
6,058,433 UART: [ldev] AUTHORITY.KEYID = 7
6,059,664 UART: [ldev] FE.KEYID = 1
6,102,855 UART: [ldev] Erasing FE.KEYID = 1
8,608,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,061 UART: [ldev] --
10,415,758 UART: [fwproc] Wait for Commands...
10,418,227 UART: [fwproc] Recv command 0x46574c44
10,420,530 UART: [fwproc] Recv'd Img size: 118548 bytes
15,079,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,168,769 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,292,375 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,853,379 >>> mbox cmd response: success
15,856,884 UART: [afmc] ++
15,857,583 UART: [afmc] CDI.KEYID = 6
15,858,854 UART: [afmc] SUBJECT.KEYID = 7
15,860,303 UART: [afmc] AUTHORITY.KEYID = 5
18,388,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,113,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,115,178 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,130,260 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,145,524 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,160,595 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,185,338 UART: [afmc] --
20,188,983 UART: [cold-reset] --
20,191,280 UART: [state] Locking Datavault
20,198,370 UART: [state] Locking PCR0, PCR1 and PCR31
20,200,580 UART: [state] Locking ICCM
20,202,004 UART: [exit] Launching FMC @ 0x40000130
20,210,631 UART:
20,210,862 UART: Running Caliptra FMC ...
20,211,905 UART:
20,212,052 UART: [state] CFI Enabled
20,271,611 UART: [fht] FMC Alias Private Key: 7
22,038,021 UART: [art] Extend RT PCRs Done
22,039,251 UART: [art] Lock RT PCRs Done
22,040,908 UART: [art] Populate DV Done
22,046,314 UART: [fht] FMC Alias Private Key: 7
22,047,848 UART: [art] Derive CDI
22,048,584 UART: [art] Store in slot 0x4
22,105,020 UART: [art] Derive Key Pair
22,106,064 UART: [art] Store priv key in slot 0x5
24,568,529 UART: [art] Derive Key Pair - Done
24,581,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,295,174 UART: [art] Erasing AUTHORITY.KEYID = 7
26,296,695 UART: [art] PUB.X = 97383F74A7F58988B280A8DA317D23998FC255707A0054B49EC3D43ED3FF58A67914B66781606CCC0DFFDDFAEB5E728B
26,303,921 UART: [art] PUB.Y = C69F0F26CA19F5D82ABCEE9BEB244AC7B381E88560E89CE97D8E37B9BD6D9828EC262DAF3142DF4978EC1E3AE2F4027C
26,311,238 UART: [art] SIG.R = 117697CD3313BB13C59A4247CD86158BEA152CA6CD38B2D2A5CD6D8352396A8E2D4D204F91F8F2E5117AD1CF8506F61F
26,318,627 UART: [art] SIG.S = 9CFDAE30AF3D8D724EA1871DCDE48E370046D9D778684B1569CF9995FC90A9465A3CAFADBA2C522CE85445B92B94E7EF
27,297,361 UART: Caliptra RT
27,298,076 UART: [state] CFI Enabled
27,478,860 UART: [rt] RT listening for mailbox commands...
27,481,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,636,525 UART: [rt]cmd =0x41544d4e, len=14344
27,641,948 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,418,036 ready_for_fw is high
3,418,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,905,806 >>> mbox cmd response: success
20,200,374 UART:
20,200,745 UART: Running Caliptra FMC ...
20,201,950 UART:
20,202,112 UART: [state] CFI Enabled
20,266,952 UART: [fht] FMC Alias Private Key: 7
22,033,376 UART: [art] Extend RT PCRs Done
22,034,598 UART: [art] Lock RT PCRs Done
22,036,171 UART: [art] Populate DV Done
22,041,788 UART: [fht] FMC Alias Private Key: 7
22,043,508 UART: [art] Derive CDI
22,044,325 UART: [art] Store in slot 0x4
22,100,009 UART: [art] Derive Key Pair
22,101,003 UART: [art] Store priv key in slot 0x5
24,563,696 UART: [art] Derive Key Pair - Done
24,576,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,290,107 UART: [art] Erasing AUTHORITY.KEYID = 7
26,291,612 UART: [art] PUB.X = 33EF742776F1DE012C2C2F5287222C81276F9287F23478359421B81C7FE24E3D5A636910035E5D921252D731076283A8
26,298,838 UART: [art] PUB.Y = 195C1A3AA69B3C9940177BB8F2F1C59F97A9FEFC89384E41C4E1958836E5EE2A2593564BB1AAFA8CB3A30733CF57D17F
26,306,103 UART: [art] SIG.R = 0E338A735D795DF1DB1387BD733B52BEB652DDF0B07A2EAFDEE74D79794ECB604AFAD3915AF1C3CF89A95AFA14C4ACD4
26,313,583 UART: [art] SIG.S = 79204DEA89784E553F627C94AFC7FAF8CB8682D75D32B3A3D4B3C2D7AC44153FAB5CEA374D36F9CA4ECA3C6C2D22F0FC
27,292,785 UART: Caliptra RT
27,293,479 UART: [state] CFI Enabled
27,474,101 UART: [rt] RT listening for mailbox commands...
27,476,408 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,631,773 UART: [rt]cmd =0x41544d4e, len=14344
27,636,838 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,624 UART:
192,997 UART: Running Caliptra ROM ...
194,205 UART:
603,916 UART: [state] CFI Enabled
616,539 UART: [state] LifecycleState = Unprovisioned
618,927 UART: [state] DebugLocked = No
621,024 UART: [state] WD Timer not started. Device not locked for debugging
625,707 UART: [kat] SHA2-256
815,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,313 UART: [kat] ++
826,881 UART: [kat] sha1
837,835 UART: [kat] SHA2-256
840,860 UART: [kat] SHA2-384
847,070 UART: [kat] SHA2-512-ACC
849,659 UART: [kat] ECC-384
3,292,708 UART: [kat] HMAC-384Kdf
3,305,719 UART: [kat] LMS
3,837,570 UART: [kat] --
3,842,509 UART: [cold-reset] ++
3,843,752 UART: [fht] FHT @ 0x50003400
3,855,803 UART: [idev] ++
3,856,518 UART: [idev] CDI.KEYID = 6
3,857,433 UART: [idev] SUBJECT.KEYID = 7
3,858,686 UART: [idev] UDS.KEYID = 0
3,859,618 ready_for_fw is high
3,859,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,694 UART: [idev] Erasing UDS.KEYID = 0
6,338,997 UART: [idev] Sha1 KeyId Algorithm
6,362,816 UART: [idev] --
6,367,518 UART: [ldev] ++
6,368,263 UART: [ldev] CDI.KEYID = 6
6,369,175 UART: [ldev] SUBJECT.KEYID = 5
6,370,335 UART: [ldev] AUTHORITY.KEYID = 7
6,371,515 UART: [ldev] FE.KEYID = 1
6,382,274 UART: [ldev] Erasing FE.KEYID = 1
8,859,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,632 UART: [ldev] --
10,653,758 UART: [fwproc] Wait for Commands...
10,656,561 UART: [fwproc] Recv command 0x46574c44
10,658,817 UART: [fwproc] Recv'd Img size: 118548 bytes
15,341,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,421,338 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,544,948 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,105,451 >>> mbox cmd response: success
16,110,135 UART: [afmc] ++
16,110,857 UART: [afmc] CDI.KEYID = 6
16,112,057 UART: [afmc] SUBJECT.KEYID = 7
16,113,527 UART: [afmc] AUTHORITY.KEYID = 5
18,613,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,338,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,340,293 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,355,396 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,370,588 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,385,633 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,408,889 UART: [afmc] --
20,412,126 UART: [cold-reset] --
20,417,945 UART: [state] Locking Datavault
20,422,573 UART: [state] Locking PCR0, PCR1 and PCR31
20,424,736 UART: [state] Locking ICCM
20,426,434 UART: [exit] Launching FMC @ 0x40000130
20,435,068 UART:
20,435,309 UART: Running Caliptra FMC ...
20,436,413 UART:
20,436,600 UART: [state] CFI Enabled
20,444,387 UART: [fht] FMC Alias Private Key: 7
22,210,053 UART: [art] Extend RT PCRs Done
22,211,279 UART: [art] Lock RT PCRs Done
22,212,772 UART: [art] Populate DV Done
22,218,246 UART: [fht] FMC Alias Private Key: 7
22,219,730 UART: [art] Derive CDI
22,220,466 UART: [art] Store in slot 0x4
22,263,057 UART: [art] Derive Key Pair
22,264,107 UART: [art] Store priv key in slot 0x5
24,690,898 UART: [art] Derive Key Pair - Done
24,704,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,411,113 UART: [art] Erasing AUTHORITY.KEYID = 7
26,412,604 UART: [art] PUB.X = AAE37C34DB95E13693A0ABF16011B2AE9190B6C364801FE954EA61D0067AC54009E5D3C625CCD734102117C962729735
26,419,868 UART: [art] PUB.Y = A905F8BE7DDEDBAC428A0EBA8D42A4BA17AFB00582B16EAAA600ED528AC5B2A9EF6DA039226646E84BCFF86CA3E1D052
26,427,125 UART: [art] SIG.R = 34679E14A65359058FA329654E4EDF19CA4737835145C404F8D990897E42F4DDEA2BBAC15DC1563F35977B8D053D0468
26,434,518 UART: [art] SIG.S = 5B10B3A9C18134BFF40B9D3BB10D67DB56233453988BE8E0F742E3F848B9593EAC37E0D2D443D1FC3788A1533E78B61D
27,413,572 UART: Caliptra RT
27,414,281 UART: [state] CFI Enabled
27,546,101 UART: [rt] RT listening for mailbox commands...
27,548,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,703,618 UART: [rt]cmd =0x41544d4e, len=14344
27,708,667 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,754,855 ready_for_fw is high
3,755,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,131,965 >>> mbox cmd response: success
20,382,524 UART:
20,382,927 UART: Running Caliptra FMC ...
20,384,045 UART:
20,384,210 UART: [state] CFI Enabled
20,392,013 UART: [fht] FMC Alias Private Key: 7
22,158,556 UART: [art] Extend RT PCRs Done
22,159,783 UART: [art] Lock RT PCRs Done
22,161,549 UART: [art] Populate DV Done
22,166,802 UART: [fht] FMC Alias Private Key: 7
22,168,509 UART: [art] Derive CDI
22,169,249 UART: [art] Store in slot 0x4
22,211,915 UART: [art] Derive Key Pair
22,212,960 UART: [art] Store priv key in slot 0x5
24,639,760 UART: [art] Derive Key Pair - Done
24,652,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,359,570 UART: [art] Erasing AUTHORITY.KEYID = 7
26,361,090 UART: [art] PUB.X = 2650CF8B0BDDEC3A7FCCD1BEAE6C04BEFA763C4FC0510A03806949C9C36488BB9F4AF1BD75807B3DA76B7A11FEF7647F
26,368,364 UART: [art] PUB.Y = DECC86F66C023F7582EF47EE7A9C517847B466ACF6D5B2B366EF6902D12E41A8ED669698670593DC2539F0B4AE25867A
26,375,620 UART: [art] SIG.R = FFEF536CCCABCC5C508C5F4007DC57578FD0F8D1C45800293948613AB145D06DE887DEAB613F2245F463C48F21B720A4
26,383,003 UART: [art] SIG.S = 16226659FB0C2B8CC9FEE25C4A5D2F3F5BE8D21C814BB51C39525C3B80E6D1B4F5316FB0B5099CF0943C9A2EDB13FFFD
27,361,575 UART: Caliptra RT
27,362,283 UART: [state] CFI Enabled
27,494,862 UART: [rt] RT listening for mailbox commands...
27,497,168 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,652,397 UART: [rt]cmd =0x41544d4e, len=14344
27,657,784 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,537 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,053 UART: [kat] SHA2-256
881,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,099 UART: [kat] ++
886,251 UART: [kat] sha1
890,511 UART: [kat] SHA2-256
892,449 UART: [kat] SHA2-384
895,152 UART: [kat] SHA2-512-ACC
897,053 UART: [kat] ECC-384
902,708 UART: [kat] HMAC-384Kdf
907,512 UART: [kat] LMS
1,475,708 UART: [kat] --
1,476,605 UART: [cold-reset] ++
1,476,941 UART: [fht] Storing FHT @ 0x50003400
1,479,888 UART: [idev] ++
1,480,056 UART: [idev] CDI.KEYID = 6
1,480,416 UART: [idev] SUBJECT.KEYID = 7
1,480,840 UART: [idev] UDS.KEYID = 0
1,481,185 ready_for_fw is high
1,481,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,666 UART: [idev] Erasing UDS.KEYID = 0
1,505,066 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,752 UART: [idev] --
1,514,869 UART: [ldev] ++
1,515,037 UART: [ldev] CDI.KEYID = 6
1,515,400 UART: [ldev] SUBJECT.KEYID = 5
1,515,826 UART: [ldev] AUTHORITY.KEYID = 7
1,516,289 UART: [ldev] FE.KEYID = 1
1,521,299 UART: [ldev] Erasing FE.KEYID = 1
1,547,006 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,638 UART: [ldev] --
1,586,031 UART: [fwproc] Waiting for Commands...
1,586,840 UART: [fwproc] Received command 0x46574c44
1,587,631 UART: [fwproc] Received Image of size 118548 bytes
5,280,505 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,308,741 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,339,959 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,480,308 >>> mbox cmd response: success
5,481,472 UART: [afmc] ++
5,481,640 UART: [afmc] CDI.KEYID = 6
5,482,002 UART: [afmc] SUBJECT.KEYID = 7
5,482,427 UART: [afmc] AUTHORITY.KEYID = 5
5,517,500 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,533,698 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,534,478 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,540,184 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,546,063 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,551,776 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,559,579 UART: [afmc] --
5,560,677 UART: [cold-reset] --
5,561,265 UART: [state] Locking Datavault
5,562,394 UART: [state] Locking PCR0, PCR1 and PCR31
5,562,998 UART: [state] Locking ICCM
5,563,630 UART: [exit] Launching FMC @ 0x40000130
5,568,960 UART:
5,568,976 UART: Running Caliptra FMC ...
5,569,384 UART:
5,569,438 UART: [state] CFI Enabled
5,579,494 UART: [fht] FMC Alias Private Key: 7
5,698,916 UART: [art] Extend RT PCRs Done
5,699,344 UART: [art] Lock RT PCRs Done
5,701,166 UART: [art] Populate DV Done
5,709,589 UART: [fht] FMC Alias Private Key: 7
5,710,581 UART: [art] Derive CDI
5,710,861 UART: [art] Store in slot 0x4
5,796,427 UART: [art] Derive Key Pair
5,796,787 UART: [art] Store priv key in slot 0x5
5,810,114 UART: [art] Derive Key Pair - Done
5,824,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,840,593 UART: [art] Erasing AUTHORITY.KEYID = 7
5,841,358 UART: [art] PUB.X = F9D3BEC553D8A414603945ECCFB685696B7EE315A8C03D08FDFA6278B5BCECD2936514999BDC0430E90568AD3F7CE2D5
5,848,133 UART: [art] PUB.Y = EB5275FB5D189D7D393F935D78AA033498D572E1927314F82EECA144BB05FD77B18EE5974F02495D88306C5B5EE2D2B5
5,855,078 UART: [art] SIG.R = 45375BB500BD9F189E5D3899937413C9B647E5EAFDC4DC6E99FFB19FAEE73B72FB64142BEFD6AE53D72628EAC81FFA83
5,861,846 UART: [art] SIG.S = F9E15DDDB4233DA2BA41EB79CD6547B1D9BF9A0C84F7AC6401DEF0E1A7A2F720B650D6BB7A16EF62D076A4C08F204B15
5,885,422 UART: Caliptra RT
5,885,673 UART: [state] CFI Enabled
6,005,811 UART: [rt] RT listening for mailbox commands...
6,006,481 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,129,351 UART: [rt]cmd =0x41544d4e, len=14344
6,136,106 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,137 ready_for_fw is high
1,363,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,293,515 >>> mbox cmd response: success
5,354,920 UART:
5,354,936 UART: Running Caliptra FMC ...
5,355,344 UART:
5,355,398 UART: [state] CFI Enabled
5,365,966 UART: [fht] FMC Alias Private Key: 7
5,485,200 UART: [art] Extend RT PCRs Done
5,485,628 UART: [art] Lock RT PCRs Done
5,487,132 UART: [art] Populate DV Done
5,495,053 UART: [fht] FMC Alias Private Key: 7
5,495,991 UART: [art] Derive CDI
5,496,271 UART: [art] Store in slot 0x4
5,581,725 UART: [art] Derive Key Pair
5,582,085 UART: [art] Store priv key in slot 0x5
5,595,276 UART: [art] Derive Key Pair - Done
5,609,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,625,190 UART: [art] Erasing AUTHORITY.KEYID = 7
5,625,955 UART: [art] PUB.X = CFB6A8F808D4D39FD61BE7DA1708F7633849CDCDDA358C022214354C9E735541254B18CAAA28BA8605A1241BFD0FC030
5,632,720 UART: [art] PUB.Y = EA8B03F7459E988A67EDF4A40BBBE17CB90BE886B5C6BB635AE297027A16F7AA0C608735848A50938079D7B743591D03
5,639,656 UART: [art] SIG.R = E60CC77A8246C94477ABC13517E6410D82C3FA8C2555ADA7730BB2A5C7143ECDB89E46E4C7AF9616D7FE4C7AF39BE699
5,646,431 UART: [art] SIG.S = F46665E36EC8EC1CBFA63F6DC31DA5D474AF8321E15FAA9C70B22BA3D13CBD9FB311E67370462AB34D2BC68D407B95C8
5,669,901 UART: Caliptra RT
5,670,152 UART: [state] CFI Enabled
5,790,091 UART: [rt] RT listening for mailbox commands...
5,790,761 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,913,695 UART: [rt]cmd =0x41544d4e, len=14344
5,920,016 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,725 UART: [state] LifecycleState = Unprovisioned
86,380 UART: [state] DebugLocked = No
86,866 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,582 UART: [kat] SHA2-256
882,513 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,628 UART: [kat] ++
886,780 UART: [kat] sha1
890,828 UART: [kat] SHA2-256
892,766 UART: [kat] SHA2-384
895,451 UART: [kat] SHA2-512-ACC
897,352 UART: [kat] ECC-384
903,009 UART: [kat] HMAC-384Kdf
907,843 UART: [kat] LMS
1,476,039 UART: [kat] --
1,477,126 UART: [cold-reset] ++
1,477,534 UART: [fht] Storing FHT @ 0x50003400
1,480,349 UART: [idev] ++
1,480,517 UART: [idev] CDI.KEYID = 6
1,480,877 UART: [idev] SUBJECT.KEYID = 7
1,481,301 UART: [idev] UDS.KEYID = 0
1,481,646 ready_for_fw is high
1,481,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,045 UART: [idev] Erasing UDS.KEYID = 0
1,505,787 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,467 UART: [idev] --
1,515,496 UART: [ldev] ++
1,515,664 UART: [ldev] CDI.KEYID = 6
1,516,027 UART: [ldev] SUBJECT.KEYID = 5
1,516,453 UART: [ldev] AUTHORITY.KEYID = 7
1,516,916 UART: [ldev] FE.KEYID = 1
1,522,398 UART: [ldev] Erasing FE.KEYID = 1
1,547,751 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,785 UART: [ldev] --
1,587,226 UART: [fwproc] Waiting for Commands...
1,588,031 UART: [fwproc] Received command 0x46574c44
1,588,822 UART: [fwproc] Received Image of size 118548 bytes
5,168,697 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,196,663 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,227,881 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,368,160 >>> mbox cmd response: success
5,369,256 UART: [afmc] ++
5,369,424 UART: [afmc] CDI.KEYID = 6
5,369,786 UART: [afmc] SUBJECT.KEYID = 7
5,370,211 UART: [afmc] AUTHORITY.KEYID = 5
5,405,122 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,421,328 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,422,108 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,427,814 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,433,693 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,439,406 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,447,459 UART: [afmc] --
5,448,411 UART: [cold-reset] --
5,449,341 UART: [state] Locking Datavault
5,450,408 UART: [state] Locking PCR0, PCR1 and PCR31
5,451,012 UART: [state] Locking ICCM
5,451,588 UART: [exit] Launching FMC @ 0x40000130
5,456,918 UART:
5,456,934 UART: Running Caliptra FMC ...
5,457,342 UART:
5,457,485 UART: [state] CFI Enabled
5,468,337 UART: [fht] FMC Alias Private Key: 7
5,587,025 UART: [art] Extend RT PCRs Done
5,587,453 UART: [art] Lock RT PCRs Done
5,589,147 UART: [art] Populate DV Done
5,597,246 UART: [fht] FMC Alias Private Key: 7
5,598,364 UART: [art] Derive CDI
5,598,644 UART: [art] Store in slot 0x4
5,684,798 UART: [art] Derive Key Pair
5,685,158 UART: [art] Store priv key in slot 0x5
5,698,861 UART: [art] Derive Key Pair - Done
5,713,400 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,729,045 UART: [art] Erasing AUTHORITY.KEYID = 7
5,729,810 UART: [art] PUB.X = 42AA2318D43F790503068106FB3E6F5FA1190FC2D27E3EB2B2EBC7E25CF9EB9BCDC1D9EF5222907558EF22719A528918
5,736,573 UART: [art] PUB.Y = DB28FD8C822258001D3F35EB7B955B7D49778ED5616138D663F739B8330282E8A25088D453E46C4D3C39D4850E5A4B52
5,743,489 UART: [art] SIG.R = E8661A412814B0F78BE10ECC6C8A9160EF1BD3BA3BFF313F5A02C20938A0A9125F8F7692829352F1CF8466FA4E41AA3F
5,750,260 UART: [art] SIG.S = D787F0EE489E5622E71356DE3C6DB050AF9BE89D0CD0FA1BA9C415662D92598A75262545A5E0376AB873A0F64DFDE566
5,774,083 UART: Caliptra RT
5,774,426 UART: [state] CFI Enabled
5,895,903 UART: [rt] RT listening for mailbox commands...
5,896,573 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,019,465 UART: [rt]cmd =0x41544d4e, len=14344
6,026,214 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,992 ready_for_fw is high
1,362,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,217,388 >>> mbox cmd response: success
5,279,773 UART:
5,279,789 UART: Running Caliptra FMC ...
5,280,197 UART:
5,280,340 UART: [state] CFI Enabled
5,291,102 UART: [fht] FMC Alias Private Key: 7
5,410,038 UART: [art] Extend RT PCRs Done
5,410,466 UART: [art] Lock RT PCRs Done
5,411,932 UART: [art] Populate DV Done
5,420,221 UART: [fht] FMC Alias Private Key: 7
5,421,347 UART: [art] Derive CDI
5,421,627 UART: [art] Store in slot 0x4
5,507,461 UART: [art] Derive Key Pair
5,507,821 UART: [art] Store priv key in slot 0x5
5,521,174 UART: [art] Derive Key Pair - Done
5,536,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,551,886 UART: [art] Erasing AUTHORITY.KEYID = 7
5,552,651 UART: [art] PUB.X = 07D23369C1164BC520D38F58EE08CB40F0FA8A64943ACB104C3F7A64B303E74ACC4C35DD71ADA9E79AB60B1FC803E32F
5,559,422 UART: [art] PUB.Y = 6B9DA38F9CCACA306A82CB73E6A96328F2660A2B4F273BAA3B69A5C0D065F9601C1DABC1C8DA00F63C0EB76EC9140EF5
5,566,363 UART: [art] SIG.R = 6860D3075378AD8B06B2B15B9528ADCA52C09455DDD2BB1EBC7A403CAA2729CA88F2BAF7DF5641EB175068FB11D66115
5,573,139 UART: [art] SIG.S = AAF48F1E067AC67A755FBB5463994B0F4258BDA2B030AE81616A1FC92BD47FA35112DBE5CB58C0950C752FCDB87C15C0
5,596,864 UART: Caliptra RT
5,597,207 UART: [state] CFI Enabled
5,717,771 UART: [rt] RT listening for mailbox commands...
5,718,441 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,841,473 UART: [rt]cmd =0x41544d4e, len=14344
5,847,660 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,861 UART: [state] WD Timer not started. Device not locked for debugging
88,184 UART: [kat] SHA2-256
891,734 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,838 UART: [kat] ++
895,990 UART: [kat] sha1
900,384 UART: [kat] SHA2-256
902,324 UART: [kat] SHA2-384
905,161 UART: [kat] SHA2-512-ACC
907,062 UART: [kat] ECC-384
916,849 UART: [kat] HMAC-384Kdf
921,569 UART: [kat] LMS
1,169,881 UART: [kat] --
1,170,786 UART: [cold-reset] ++
1,171,188 UART: [fht] FHT @ 0x50003400
1,173,806 UART: [idev] ++
1,173,974 UART: [idev] CDI.KEYID = 6
1,174,335 UART: [idev] SUBJECT.KEYID = 7
1,174,760 UART: [idev] UDS.KEYID = 0
1,175,106 ready_for_fw is high
1,175,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,761 UART: [idev] Erasing UDS.KEYID = 0
1,200,225 UART: [idev] Sha1 KeyId Algorithm
1,209,193 UART: [idev] --
1,210,130 UART: [ldev] ++
1,210,298 UART: [ldev] CDI.KEYID = 6
1,210,662 UART: [ldev] SUBJECT.KEYID = 5
1,211,089 UART: [ldev] AUTHORITY.KEYID = 7
1,211,552 UART: [ldev] FE.KEYID = 1
1,216,996 UART: [ldev] Erasing FE.KEYID = 1
1,243,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,194 UART: [ldev] --
1,282,419 UART: [fwproc] Wait for Commands...
1,283,062 UART: [fwproc] Recv command 0x46574c44
1,283,795 UART: [fwproc] Recv'd Img size: 118548 bytes
3,179,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,207,623 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,238,798 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,379,139 >>> mbox cmd response: success
3,380,251 UART: [afmc] ++
3,380,419 UART: [afmc] CDI.KEYID = 6
3,380,782 UART: [afmc] SUBJECT.KEYID = 7
3,381,208 UART: [afmc] AUTHORITY.KEYID = 5
3,416,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,451 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,439,158 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,445,035 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,745 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,537 UART: [afmc] --
3,459,576 UART: [cold-reset] --
3,460,484 UART: [state] Locking Datavault
3,461,517 UART: [state] Locking PCR0, PCR1 and PCR31
3,462,121 UART: [state] Locking ICCM
3,462,755 UART: [exit] Launching FMC @ 0x40000130
3,468,085 UART:
3,468,101 UART: Running Caliptra FMC ...
3,468,509 UART:
3,468,563 UART: [state] CFI Enabled
3,479,239 UART: [fht] FMC Alias Private Key: 7
3,598,057 UART: [art] Extend RT PCRs Done
3,598,485 UART: [art] Lock RT PCRs Done
3,599,871 UART: [art] Populate DV Done
3,608,250 UART: [fht] FMC Alias Private Key: 7
3,609,306 UART: [art] Derive CDI
3,609,586 UART: [art] Store in slot 0x4
3,695,643 UART: [art] Derive Key Pair
3,696,003 UART: [art] Store priv key in slot 0x5
3,709,021 UART: [art] Derive Key Pair - Done
3,723,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,739,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,740,565 UART: [art] PUB.X = 291A7C86651DF6436FC6102A71917410C13B7EB4CA47F74A29F2A1BD95F248E8DC821FCCAA733A725B50AE7897A5BC2A
3,747,345 UART: [art] PUB.Y = E028F7DE077B7BA4D7ED9AED01D13374F1DAFED8E35D4F22EA14F4B3F5DD2FBB611C7E3BB8749018C807EFFAC84C110F
3,754,311 UART: [art] SIG.R = E72C6FB94B9A38BABAAF7F0A41DDC2A94E26BC75F195E0520820085EF8EEE705AB8779C2DF545D10D5A1A1740D348864
3,761,080 UART: [art] SIG.S = EE06606B7D70CF23B36F618C0D4A90D680C934921AFD9EC2E0D9283DB231223B100FBCA4164B87475FF60A871078C812
3,784,964 UART: Caliptra RT
3,785,215 UART: [state] CFI Enabled
3,906,148 UART: [rt] RT listening for mailbox commands...
3,906,818 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,924 UART: [rt]cmd =0x41544d4e, len=14344
4,035,845 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,242 ready_for_fw is high
1,059,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,504 >>> mbox cmd response: success
3,279,553 UART:
3,279,569 UART: Running Caliptra FMC ...
3,279,977 UART:
3,280,031 UART: [state] CFI Enabled
3,290,367 UART: [fht] FMC Alias Private Key: 7
3,409,675 UART: [art] Extend RT PCRs Done
3,410,103 UART: [art] Lock RT PCRs Done
3,411,639 UART: [art] Populate DV Done
3,419,750 UART: [fht] FMC Alias Private Key: 7
3,420,808 UART: [art] Derive CDI
3,421,088 UART: [art] Store in slot 0x4
3,506,795 UART: [art] Derive Key Pair
3,507,155 UART: [art] Store priv key in slot 0x5
3,520,325 UART: [art] Derive Key Pair - Done
3,535,164 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,238 UART: [art] PUB.X = D98EAF635AA12380990CBB7103700D1F6F862007D3BBC86AD7CA4DD7530C0426C5805DF1DCA674DDF6C3DFDC20EFB0F3
3,558,010 UART: [art] PUB.Y = 07E4320E90ABDF347797F14E00164BC72F26707B5AC011CFBB75E44E9C31537BEA0F4CCF707A68113E3F97DFB6D3310C
3,564,936 UART: [art] SIG.R = 4EDD45884351249D62D9381DD4B88D2DD0B30821A5D43AE80A960FFD25E6132F4FD5F5EFF0B32219E2C761FF0D0B77E0
3,571,701 UART: [art] SIG.S = D5BDC092DA8C68B6C58E8A71AD3F60C8F4B4559DA0BEF4C27F4D581C3D52AC95ADA9F52C935CB55432B2D9EDA78DB691
3,594,883 UART: Caliptra RT
3,595,134 UART: [state] CFI Enabled
3,714,992 UART: [rt] RT listening for mailbox commands...
3,715,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,610 UART: [rt]cmd =0x41544d4e, len=14344
3,845,121 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
899,989 UART: [kat] SHA2-256
901,929 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
916,052 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,735 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,689 UART: [idev] ++
1,172,857 UART: [idev] CDI.KEYID = 6
1,173,218 UART: [idev] SUBJECT.KEYID = 7
1,173,643 UART: [idev] UDS.KEYID = 0
1,173,989 ready_for_fw is high
1,173,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,728 UART: [idev] Erasing UDS.KEYID = 0
1,198,530 UART: [idev] Sha1 KeyId Algorithm
1,207,276 UART: [idev] --
1,208,443 UART: [ldev] ++
1,208,611 UART: [ldev] CDI.KEYID = 6
1,208,975 UART: [ldev] SUBJECT.KEYID = 5
1,209,402 UART: [ldev] AUTHORITY.KEYID = 7
1,209,865 UART: [ldev] FE.KEYID = 1
1,215,251 UART: [ldev] Erasing FE.KEYID = 1
1,241,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,845 UART: [ldev] --
1,281,210 UART: [fwproc] Wait for Commands...
1,281,929 UART: [fwproc] Recv command 0x46574c44
1,282,662 UART: [fwproc] Recv'd Img size: 118548 bytes
3,165,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,193,433 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,224,608 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,364,967 >>> mbox cmd response: success
3,366,155 UART: [afmc] ++
3,366,323 UART: [afmc] CDI.KEYID = 6
3,366,686 UART: [afmc] SUBJECT.KEYID = 7
3,367,112 UART: [afmc] AUTHORITY.KEYID = 5
3,402,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,419,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,419,751 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,425,458 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,431,335 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,437,045 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,444,731 UART: [afmc] --
3,445,754 UART: [cold-reset] --
3,446,540 UART: [state] Locking Datavault
3,447,625 UART: [state] Locking PCR0, PCR1 and PCR31
3,448,229 UART: [state] Locking ICCM
3,448,679 UART: [exit] Launching FMC @ 0x40000130
3,454,009 UART:
3,454,025 UART: Running Caliptra FMC ...
3,454,433 UART:
3,454,576 UART: [state] CFI Enabled
3,465,398 UART: [fht] FMC Alias Private Key: 7
3,583,854 UART: [art] Extend RT PCRs Done
3,584,282 UART: [art] Lock RT PCRs Done
3,585,770 UART: [art] Populate DV Done
3,593,925 UART: [fht] FMC Alias Private Key: 7
3,595,055 UART: [art] Derive CDI
3,595,335 UART: [art] Store in slot 0x4
3,680,852 UART: [art] Derive Key Pair
3,681,212 UART: [art] Store priv key in slot 0x5
3,693,822 UART: [art] Derive Key Pair - Done
3,708,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,723,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,724,527 UART: [art] PUB.X = 29CBF4B748E0460D197C4B923A50EF42F95857A81EBB32B1A80B34EEDFE6BF28109B57B66F41E06801D5F3ED9BB24FBD
3,731,304 UART: [art] PUB.Y = 1BDCACE12A939E69DC71E3587F09328FE8370A08C763A6B045644DE3464285E135C95B3709C9577FAB0D5149D5791DB3
3,738,239 UART: [art] SIG.R = 8A5C45C40594F0E10FEDC97B7DC5E23C76FB016A63E94EFCD80A8AAB444F1AA55D64571FC11BFAE4E5BB84B85F405A4D
3,745,021 UART: [art] SIG.S = D2C4D1C3C0FCA3A171F8F654636B15E2BFAB42EC4BCFF7F55A3B92A2764700A31E6C707034030F8CAB8E5CC1D85DEE14
3,768,903 UART: Caliptra RT
3,769,246 UART: [state] CFI Enabled
3,889,629 UART: [rt] RT listening for mailbox commands...
3,890,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,387 UART: [rt]cmd =0x41544d4e, len=14344
4,019,836 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,931 ready_for_fw is high
1,059,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,221,039 >>> mbox cmd response: success
3,283,288 UART:
3,283,304 UART: Running Caliptra FMC ...
3,283,712 UART:
3,283,855 UART: [state] CFI Enabled
3,294,367 UART: [fht] FMC Alias Private Key: 7
3,413,271 UART: [art] Extend RT PCRs Done
3,413,699 UART: [art] Lock RT PCRs Done
3,415,215 UART: [art] Populate DV Done
3,423,082 UART: [fht] FMC Alias Private Key: 7
3,424,104 UART: [art] Derive CDI
3,424,384 UART: [art] Store in slot 0x4
3,510,163 UART: [art] Derive Key Pair
3,510,523 UART: [art] Store priv key in slot 0x5
3,523,557 UART: [art] Derive Key Pair - Done
3,538,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,553,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,625 UART: [art] PUB.X = FB3576A73E3CBEC32FDB5D88EC45279E68699D4C648B472B3156B79E30CCD9107B1E56C7AFBDCE191BA64098E2503FC2
3,561,409 UART: [art] PUB.Y = BABF4D7988D33E6F70F807A096902C67232D9027499AE2C396CA2519528B39EBA0D330DE2681BF559AD8E2E5C5AD1302
3,568,357 UART: [art] SIG.R = C00DD8AFC19D85E1CF9A9A5B1BE3B4B5B31A244829908310D55D022A080C607C655412EC4FB6B4CF2B08B609F8BCA523
3,575,121 UART: [art] SIG.S = CACF054CEA61492D32C42D60E475A48DDC36D8D45890EEEF43EF69999131E1F8CCB02E583E84A8F6411ED57C69D53E93
3,599,080 UART: Caliptra RT
3,599,423 UART: [state] CFI Enabled
3,719,234 UART: [rt] RT listening for mailbox commands...
3,719,904 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,928 UART: [rt]cmd =0x41544d4e, len=14344
3,849,003 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,642 UART: [state] LifecycleState = Unprovisioned
86,297 UART: [state] DebugLocked = No
86,867 UART: [state] WD Timer not started. Device not locked for debugging
88,086 UART: [kat] SHA2-256
893,736 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,861 UART: [kat] ++
898,013 UART: [kat] sha1
902,245 UART: [kat] SHA2-256
904,185 UART: [kat] SHA2-384
906,786 UART: [kat] SHA2-512-ACC
908,687 UART: [kat] ECC-384
918,186 UART: [kat] HMAC-384Kdf
922,930 UART: [kat] LMS
1,171,258 UART: [kat] --
1,172,399 UART: [cold-reset] ++
1,172,829 UART: [fht] FHT @ 0x50003400
1,175,690 UART: [idev] ++
1,175,858 UART: [idev] CDI.KEYID = 6
1,176,218 UART: [idev] SUBJECT.KEYID = 7
1,176,642 UART: [idev] UDS.KEYID = 0
1,176,987 ready_for_fw is high
1,176,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,510 UART: [idev] Erasing UDS.KEYID = 0
1,201,417 UART: [idev] Sha1 KeyId Algorithm
1,209,983 UART: [idev] --
1,211,063 UART: [ldev] ++
1,211,231 UART: [ldev] CDI.KEYID = 6
1,211,594 UART: [ldev] SUBJECT.KEYID = 5
1,212,020 UART: [ldev] AUTHORITY.KEYID = 7
1,212,483 UART: [ldev] FE.KEYID = 1
1,217,625 UART: [ldev] Erasing FE.KEYID = 1
1,243,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,059 UART: [ldev] --
1,282,542 UART: [fwproc] Wait for Commands...
1,283,358 UART: [fwproc] Recv command 0x46574c44
1,284,086 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,236 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,406 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,755 >>> mbox cmd response: success
3,372,879 UART: [afmc] ++
3,373,047 UART: [afmc] CDI.KEYID = 6
3,373,409 UART: [afmc] SUBJECT.KEYID = 7
3,373,834 UART: [afmc] AUTHORITY.KEYID = 5
3,408,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,064 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,770 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,649 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,359 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,268 UART: [afmc] --
3,452,194 UART: [cold-reset] --
3,453,136 UART: [state] Locking Datavault
3,454,201 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,805 UART: [state] Locking ICCM
3,455,259 UART: [exit] Launching FMC @ 0x40000130
3,460,589 UART:
3,460,605 UART: Running Caliptra FMC ...
3,461,013 UART:
3,461,067 UART: [state] CFI Enabled
3,471,211 UART: [fht] FMC Alias Private Key: 7
3,590,627 UART: [art] Extend RT PCRs Done
3,591,055 UART: [art] Lock RT PCRs Done
3,592,431 UART: [art] Populate DV Done
3,600,564 UART: [fht] FMC Alias Private Key: 7
3,601,542 UART: [art] Derive CDI
3,601,822 UART: [art] Store in slot 0x4
3,687,253 UART: [art] Derive Key Pair
3,687,613 UART: [art] Store priv key in slot 0x5
3,701,447 UART: [art] Derive Key Pair - Done
3,716,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,330 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,095 UART: [art] PUB.X = 90DC71221F1DE987D3DDCAEEB499F6622A97ABD0200290BEE3369A5521C8D623986F6C0C95C98A47A0B18BBD155A7141
3,738,867 UART: [art] PUB.Y = 506D393FE89C7AD6AF80B7B1C2A225F92B2FC2564836D825AB98EFD73CE82BA1C0888B8068AD071E5C8CDFE06F6A2EC4
3,745,832 UART: [art] SIG.R = 2DC88315A04136AFF0527B16E78610527678CD1E5E0922E5DEA1529E81F8F493EF8FA3ED83984102452512F50E55DDFF
3,752,593 UART: [art] SIG.S = C9E2B3C6B10C3A6048BFD6A14AFA43ED5E808B07D61A9E16439C2F8C341C6AFF8CD33DC5E3D93A8C7505692A0C59DEBD
3,776,097 UART: Caliptra RT
3,776,348 UART: [state] CFI Enabled
3,896,034 UART: [rt] RT listening for mailbox commands...
3,896,704 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,960 UART: [rt]cmd =0x41544d4e, len=14344
4,025,957 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,007 ready_for_fw is high
1,060,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,220,703 >>> mbox cmd response: success
3,283,048 UART:
3,283,064 UART: Running Caliptra FMC ...
3,283,472 UART:
3,283,526 UART: [state] CFI Enabled
3,293,984 UART: [fht] FMC Alias Private Key: 7
3,412,966 UART: [art] Extend RT PCRs Done
3,413,394 UART: [art] Lock RT PCRs Done
3,414,642 UART: [art] Populate DV Done
3,422,799 UART: [fht] FMC Alias Private Key: 7
3,423,933 UART: [art] Derive CDI
3,424,213 UART: [art] Store in slot 0x4
3,510,032 UART: [art] Derive Key Pair
3,510,392 UART: [art] Store priv key in slot 0x5
3,523,774 UART: [art] Derive Key Pair - Done
3,538,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,553,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,439 UART: [art] PUB.X = 9AFFD42A747261E36EB5D6E8005800F4E5F1D1C5970E5E852019C6CC4E81BC11D1B99B7D5EE055E2BE7A78550DDB710A
3,561,168 UART: [art] PUB.Y = 52F938B76F52FD30FA8F074C28052535256F4A48A234309B7F7D7060E82064E6D9E33F119F2B7056991DDCC7F4219F09
3,568,103 UART: [art] SIG.R = 98B21A421BB5008C66EA2AF2ACA77007115E0EDB6CC1BC7C4B2A3DAE9190C359EBB2B6D7A7FC23835C066DA9E3649E3E
3,574,862 UART: [art] SIG.S = 5CCD693F79653F7A90F0E065FD68F62721ACD27EB80F6007D350CACF105D2D3C04E8BFE8D9976AD3753E0B0FD8229E42
3,598,921 UART: Caliptra RT
3,599,172 UART: [state] CFI Enabled
3,718,040 UART: [rt] RT listening for mailbox commands...
3,718,710 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,978 UART: [rt]cmd =0x41544d4e, len=14344
3,848,343 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
893,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,716 UART: [kat] ++
897,868 UART: [kat] sha1
902,194 UART: [kat] SHA2-256
904,134 UART: [kat] SHA2-384
907,025 UART: [kat] SHA2-512-ACC
908,926 UART: [kat] ECC-384
918,977 UART: [kat] HMAC-384Kdf
923,631 UART: [kat] LMS
1,171,959 UART: [kat] --
1,172,998 UART: [cold-reset] ++
1,173,384 UART: [fht] FHT @ 0x50003400
1,176,207 UART: [idev] ++
1,176,375 UART: [idev] CDI.KEYID = 6
1,176,735 UART: [idev] SUBJECT.KEYID = 7
1,177,159 UART: [idev] UDS.KEYID = 0
1,177,504 ready_for_fw is high
1,177,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,315 UART: [idev] Erasing UDS.KEYID = 0
1,202,468 UART: [idev] Sha1 KeyId Algorithm
1,210,920 UART: [idev] --
1,212,046 UART: [ldev] ++
1,212,214 UART: [ldev] CDI.KEYID = 6
1,212,577 UART: [ldev] SUBJECT.KEYID = 5
1,213,003 UART: [ldev] AUTHORITY.KEYID = 7
1,213,466 UART: [ldev] FE.KEYID = 1
1,218,670 UART: [ldev] Erasing FE.KEYID = 1
1,244,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,648 UART: [ldev] --
1,283,919 UART: [fwproc] Wait for Commands...
1,284,503 UART: [fwproc] Recv command 0x46574c44
1,285,231 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,073 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,243 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,377,484 >>> mbox cmd response: success
3,378,522 UART: [afmc] ++
3,378,690 UART: [afmc] CDI.KEYID = 6
3,379,052 UART: [afmc] SUBJECT.KEYID = 7
3,379,477 UART: [afmc] AUTHORITY.KEYID = 5
3,415,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,079 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,785 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,664 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,374 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,189 UART: [afmc] --
3,459,175 UART: [cold-reset] --
3,460,001 UART: [state] Locking Datavault
3,461,264 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,868 UART: [state] Locking ICCM
3,462,314 UART: [exit] Launching FMC @ 0x40000130
3,467,644 UART:
3,467,660 UART: Running Caliptra FMC ...
3,468,068 UART:
3,468,211 UART: [state] CFI Enabled
3,478,901 UART: [fht] FMC Alias Private Key: 7
3,597,249 UART: [art] Extend RT PCRs Done
3,597,677 UART: [art] Lock RT PCRs Done
3,599,391 UART: [art] Populate DV Done
3,607,570 UART: [fht] FMC Alias Private Key: 7
3,608,658 UART: [art] Derive CDI
3,608,938 UART: [art] Store in slot 0x4
3,694,743 UART: [art] Derive Key Pair
3,695,103 UART: [art] Store priv key in slot 0x5
3,707,965 UART: [art] Derive Key Pair - Done
3,722,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,738,806 UART: [art] PUB.X = 63B6F609B66AD07AE09C69B52E0B07386AC423CEBE4CF2BFF2B964581D39DC964D74B7B0409C6B65B628CB06BFA68537
3,745,576 UART: [art] PUB.Y = 51E1ECDB5D6FCFD852D0E89ABB46D33F9C068B754966DFFFD644F5D3001CCB2FCFD8D7A5C5D590F476963EBB407F9DB3
3,752,527 UART: [art] SIG.R = 23D2CA13E9E832DEE74B98F206082EB5BDBA64044DC22C76A5EF147AF613DD38C2DC640056CBDEA126CEB3F0483417D4
3,759,282 UART: [art] SIG.S = 6C03EB7791F8EB50F40FA5745A8A1282D8C1DEB3104737712F0BC46615AF8085FA0C0E08D304021C4FA7E0C37B2C87EC
3,783,148 UART: Caliptra RT
3,783,491 UART: [state] CFI Enabled
3,903,215 UART: [rt] RT listening for mailbox commands...
3,903,885 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,049 UART: [rt]cmd =0x41544d4e, len=14344
4,033,412 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,076 ready_for_fw is high
1,061,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,221,497 >>> mbox cmd response: success
3,283,842 UART:
3,283,858 UART: Running Caliptra FMC ...
3,284,266 UART:
3,284,409 UART: [state] CFI Enabled
3,295,163 UART: [fht] FMC Alias Private Key: 7
3,414,319 UART: [art] Extend RT PCRs Done
3,414,747 UART: [art] Lock RT PCRs Done
3,416,509 UART: [art] Populate DV Done
3,424,782 UART: [fht] FMC Alias Private Key: 7
3,425,768 UART: [art] Derive CDI
3,426,048 UART: [art] Store in slot 0x4
3,512,209 UART: [art] Derive Key Pair
3,512,569 UART: [art] Store priv key in slot 0x5
3,526,199 UART: [art] Derive Key Pair - Done
3,541,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,285 UART: [art] PUB.X = C139FEBCABD62244E82062CFA7CBE6C225F8E4A0CE0C9FB61AA71E8BA97BDC17971F4B4AD08A928826C42253B9127214
3,564,068 UART: [art] PUB.Y = 3EA20BD6D0C29FE864A38C8886793B9728441918D3E7CDB78D6A2A37CB2160C5BA325B2C253F377849ABBD7794831023
3,571,015 UART: [art] SIG.R = 4053EBBEACA426F553BBF10727038ADC695557C7F281A09555196A319DEF0E55BC52AE3D499C782FE9C15C4BB2D573DE
3,577,788 UART: [art] SIG.S = 04142FDA0996984B57002E6D55CF053CFC9F8352BD125FD7D964A6571697AC2D7BD0536B312217546CCB58A477B26D5F
3,601,833 UART: Caliptra RT
3,602,176 UART: [state] CFI Enabled
3,722,352 UART: [rt] RT listening for mailbox commands...
3,723,022 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,804 UART: [rt]cmd =0x41544d4e, len=14344
3,851,879 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
191,993 UART:
192,348 UART: Running Caliptra ROM ...
193,552 UART:
193,707 UART: [state] CFI Enabled
262,216 UART: [state] LifecycleState = Unprovisioned
264,154 UART: [state] DebugLocked = No
265,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,294 UART: [kat] SHA2-256
440,983 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,523 UART: [kat] ++
452,005 UART: [kat] sha1
462,390 UART: [kat] SHA2-256
465,112 UART: [kat] SHA2-384
471,457 UART: [kat] SHA2-512-ACC
473,763 UART: [kat] ECC-384
2,768,179 UART: [kat] HMAC-384Kdf
2,800,093 UART: [kat] LMS
3,990,400 UART: [kat] --
3,996,070 UART: [cold-reset] ++
3,998,156 UART: [fht] Storing FHT @ 0x50003400
4,008,857 UART: [idev] ++
4,009,428 UART: [idev] CDI.KEYID = 6
4,010,419 UART: [idev] SUBJECT.KEYID = 7
4,011,670 UART: [idev] UDS.KEYID = 0
4,012,736 ready_for_fw is high
4,012,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,000 UART: [idev] Erasing UDS.KEYID = 0
7,346,703 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,192 UART: [idev] --
7,372,730 UART: [ldev] ++
7,373,303 UART: [ldev] CDI.KEYID = 6
7,374,272 UART: [ldev] SUBJECT.KEYID = 5
7,375,435 UART: [ldev] AUTHORITY.KEYID = 7
7,376,722 UART: [ldev] FE.KEYID = 1
7,421,729 UART: [ldev] Erasing FE.KEYID = 1
10,754,675 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,652 UART: [ldev] --
13,117,647 UART: [fwproc] Waiting for Commands...
13,119,856 UART: [fwproc] Received command 0x46574c44
13,122,088 UART: [fwproc] Received Image of size 118548 bytes
21,572,102 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,656,895 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,730,080 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,059,023 >>> mbox cmd response: success
22,063,181 UART: [afmc] ++
22,063,806 UART: [afmc] CDI.KEYID = 6
22,064,742 UART: [afmc] SUBJECT.KEYID = 7
22,065,972 UART: [afmc] AUTHORITY.KEYID = 5
25,422,525 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,718,912 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,721,175 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,735,671 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,750,484 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,764,805 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,785,901 UART: [afmc] --
27,790,079 UART: [cold-reset] --
27,793,146 UART: [state] Locking Datavault
27,799,913 UART: [state] Locking PCR0, PCR1 and PCR31
27,801,622 UART: [state] Locking ICCM
27,804,234 UART: [exit] Launching FMC @ 0x40000130
27,812,628 UART:
27,812,860 UART: Running Caliptra FMC ...
27,813,981 UART:
27,814,144 UART: [state] CFI Enabled
27,879,219 UART: [fht] FMC Alias Private Key: 7
30,219,633 UART: [art] Extend RT PCRs Done
30,220,859 UART: [art] Lock RT PCRs Done
30,222,564 UART: [art] Populate DV Done
30,227,974 UART: [fht] FMC Alias Private Key: 7
30,229,560 UART: [art] Derive CDI
30,230,299 UART: [art] Store in slot 0x4
30,287,268 UART: [art] Derive Key Pair
30,288,327 UART: [art] Store priv key in slot 0x5
33,580,338 UART: [art] Derive Key Pair - Done
33,593,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,882,326 UART: [art] Erasing AUTHORITY.KEYID = 7
35,883,835 UART: [art] PUB.X = 0BC8FC25D428414BFD19E906A135E3424C877FD7F0C02942C61FE252A110CB4F5985EFC32735C72B05A1BDF375B2DB63
35,891,107 UART: [art] PUB.Y = F76B58E9058BD5EF26A52CB30F8D46D7E295AF81511DB50616034E4409C9CE1BCEC779A6115B7690072BFEE059DEE5FC
35,898,391 UART: [art] SIG.R = F041C0C07F9E351AD61EC3F58D30ACC3FFA637452FB994D58681868975685F8CD9483C2E48D3BF57B4D9E00B88FF53A9
35,905,758 UART: [art] SIG.S = 605665F1D6B3639943BF6AE56CC790751F813ACAE15DB7557569446C403821EF1E43D23120596FA0057ED7A5D45EA9C5
37,211,258 UART: Caliptra RT
37,211,965 UART: [state] CFI Enabled
37,386,741 UART: [rt] RT listening for mailbox commands...
37,389,123 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,544,442 UART: [rt]cmd =0x41544d4e, len=14344
38,837,924 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,806,340 ready_for_fw is high
3,806,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,336,336 >>> mbox cmd response: success
28,022,902 UART:
28,023,295 UART: Running Caliptra FMC ...
28,024,411 UART:
28,024,569 UART: [state] CFI Enabled
28,091,206 UART: [fht] FMC Alias Private Key: 7
30,452,889 UART: [art] Extend RT PCRs Done
30,454,109 UART: [art] Lock RT PCRs Done
30,455,555 UART: [art] Populate DV Done
30,461,125 UART: [fht] FMC Alias Private Key: 7
30,462,718 UART: [art] Derive CDI
30,463,474 UART: [art] Store in slot 0x4
30,520,727 UART: [art] Derive Key Pair
30,521,730 UART: [art] Store priv key in slot 0x5
33,813,917 UART: [art] Derive Key Pair - Done
33,826,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,114,813 UART: [art] Erasing AUTHORITY.KEYID = 7
36,116,326 UART: [art] PUB.X = C822CD6800D4AA646841900F8D9F08A966568389A20C3D2DAA29A6B846EC04A71FF5FB02B298B240B415CAC3BDD76D01
36,123,539 UART: [art] PUB.Y = 4B455C8A8359DA26BD641E75A512FC2D8626068AD00FC0D2D2433E1F41277647CE36B5A2D0C36AA4AF31EEA42000E39A
36,130,857 UART: [art] SIG.R = D26964B4B141EE91393F197183D46C954C09E6DF2AC4DCCF3BA28492707596009701C8868F0C3C1D6E3B2819A338F4F3
36,138,175 UART: [art] SIG.S = A8A5CF86B2C037A03E10FD72D6FC42BD49E2B20A0B58971E42C26EC4B464A9B08B859B46B5B0EB11BA1301A638DB85D9
37,443,107 UART: Caliptra RT
37,443,824 UART: [state] CFI Enabled
37,620,497 UART: [rt] RT listening for mailbox commands...
37,622,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,778,230 UART: [rt]cmd =0x41544d4e, len=14344
39,071,283 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,108 writing to cptra_bootfsm_go
194,260 UART:
194,631 UART: Running Caliptra ROM ...
195,819 UART:
605,676 UART: [state] CFI Enabled
620,838 UART: [state] LifecycleState = Unprovisioned
622,779 UART: [state] DebugLocked = No
625,299 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,355 UART: [kat] SHA2-256
800,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,589 UART: [kat] ++
811,188 UART: [kat] sha1
822,135 UART: [kat] SHA2-256
824,844 UART: [kat] SHA2-384
832,033 UART: [kat] SHA2-512-ACC
834,402 UART: [kat] ECC-384
3,117,255 UART: [kat] HMAC-384Kdf
3,129,006 UART: [kat] LMS
4,319,122 UART: [kat] --
4,324,299 UART: [cold-reset] ++
4,326,263 UART: [fht] Storing FHT @ 0x50003400
4,338,591 UART: [idev] ++
4,339,156 UART: [idev] CDI.KEYID = 6
4,340,131 UART: [idev] SUBJECT.KEYID = 7
4,341,368 UART: [idev] UDS.KEYID = 0
4,342,465 ready_for_fw is high
4,342,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,621 UART: [idev] Erasing UDS.KEYID = 0
7,629,717 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,976 UART: [idev] --
7,655,891 UART: [ldev] ++
7,656,458 UART: [ldev] CDI.KEYID = 6
7,657,468 UART: [ldev] SUBJECT.KEYID = 5
7,658,642 UART: [ldev] AUTHORITY.KEYID = 7
7,659,870 UART: [ldev] FE.KEYID = 1
7,670,024 UART: [ldev] Erasing FE.KEYID = 1
10,956,317 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,724 UART: [ldev] --
13,316,635 UART: [fwproc] Waiting for Commands...
13,319,801 UART: [fwproc] Received command 0x46574c44
13,321,977 UART: [fwproc] Received Image of size 118548 bytes
22,568,791 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,652,209 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,725,377 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,054,424 >>> mbox cmd response: success
23,059,211 UART: [afmc] ++
23,059,843 UART: [afmc] CDI.KEYID = 6
23,060,762 UART: [afmc] SUBJECT.KEYID = 7
23,061,974 UART: [afmc] AUTHORITY.KEYID = 5
26,377,952 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,674,726 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,676,983 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,691,473 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,706,278 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,720,687 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,742,849 UART: [afmc] --
28,746,458 UART: [cold-reset] --
28,750,102 UART: [state] Locking Datavault
28,754,690 UART: [state] Locking PCR0, PCR1 and PCR31
28,756,431 UART: [state] Locking ICCM
28,758,335 UART: [exit] Launching FMC @ 0x40000130
28,766,746 UART:
28,766,984 UART: Running Caliptra FMC ...
28,768,079 UART:
28,768,237 UART: [state] CFI Enabled
28,776,116 UART: [fht] FMC Alias Private Key: 7
31,115,660 UART: [art] Extend RT PCRs Done
31,116,883 UART: [art] Lock RT PCRs Done
31,118,720 UART: [art] Populate DV Done
31,124,128 UART: [fht] FMC Alias Private Key: 7
31,125,810 UART: [art] Derive CDI
31,126,628 UART: [art] Store in slot 0x4
31,169,164 UART: [art] Derive Key Pair
31,170,163 UART: [art] Store priv key in slot 0x5
34,412,264 UART: [art] Derive Key Pair - Done
34,425,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,705,111 UART: [art] Erasing AUTHORITY.KEYID = 7
36,706,633 UART: [art] PUB.X = C8F1571302D3CC77F825E6AAC5A2A0117C65DE7C659E8407D46BC58158D01A7E9A67B7A2C30155B353D20ABB0943643E
36,713,900 UART: [art] PUB.Y = 9F88A473421468E5A3A4F9B1492477785DC94F60A91E08F20517478DC997AF32A402F8F051784A7A89DDFD0065CFE0CB
36,721,091 UART: [art] SIG.R = C01F6E74AFA925607CDF9E28292E5A8BEF03F194F880DB3E8C0FB393F6BB64172F91D366F104C45FE395226BA40221CC
36,728,536 UART: [art] SIG.S = 375C888F05341DFE9C7C117AA8150E2FED8513DC917857E2D84C162EAC54386E0883B0E3FA21009CC0DD48C6FDF91899
38,033,817 UART: Caliptra RT
38,034,528 UART: [state] CFI Enabled
38,167,489 UART: [rt] RT listening for mailbox commands...
38,169,826 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,325,019 UART: [rt]cmd =0x41544d4e, len=14344
39,618,195 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,123,693 ready_for_fw is high
4,124,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,335,002 >>> mbox cmd response: success
27,983,074 UART:
27,983,521 UART: Running Caliptra FMC ...
27,984,643 UART:
27,984,797 UART: [state] CFI Enabled
27,992,746 UART: [fht] FMC Alias Private Key: 7
30,332,528 UART: [art] Extend RT PCRs Done
30,333,756 UART: [art] Lock RT PCRs Done
30,335,373 UART: [art] Populate DV Done
30,340,946 UART: [fht] FMC Alias Private Key: 7
30,342,540 UART: [art] Derive CDI
30,343,286 UART: [art] Store in slot 0x4
30,385,670 UART: [art] Derive Key Pair
30,386,712 UART: [art] Store priv key in slot 0x5
33,628,820 UART: [art] Derive Key Pair - Done
33,641,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,921,817 UART: [art] Erasing AUTHORITY.KEYID = 7
35,923,327 UART: [art] PUB.X = 737836F9796FC5052EC5B379F70EF40DA6DAE75F4B8EA56A5FF0831E1AD2F654E8E493F62206750012037F9B975D8A24
35,930,567 UART: [art] PUB.Y = 760AAAE24D80DC51A503DC6FACD2F881D60C1C09FF54C683A2CB93A8CCFFBFE9604D0B11877B53E25539903D1208632C
35,937,831 UART: [art] SIG.R = DD4FFBD2CD89013245A79EA1F4B08E9C4BB042BC0DDEA73381A6401297A0EB54DD85043051B79D3BF010B3012F3ED850
35,945,227 UART: [art] SIG.S = A374770BEBAC7B86F9C9AA13B08CF23514C35C8AF799A36789FBF24BCFD162CCED578D6A7A5BC8B91749654050243EF9
37,250,541 UART: Caliptra RT
37,251,253 UART: [state] CFI Enabled
37,385,212 UART: [rt] RT listening for mailbox commands...
37,387,530 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,542,942 UART: [rt]cmd =0x41544d4e, len=14344
38,835,994 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,123 UART:
192,480 UART: Running Caliptra ROM ...
193,595 UART:
193,739 UART: [state] CFI Enabled
263,974 UART: [state] LifecycleState = Unprovisioned
265,916 UART: [state] DebugLocked = No
268,508 UART: [state] WD Timer not started. Device not locked for debugging
272,279 UART: [kat] SHA2-256
451,969 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,720 UART: [kat] ++
463,240 UART: [kat] sha1
474,391 UART: [kat] SHA2-256
477,114 UART: [kat] SHA2-384
482,744 UART: [kat] SHA2-512-ACC
485,175 UART: [kat] ECC-384
2,947,040 UART: [kat] HMAC-384Kdf
2,969,165 UART: [kat] LMS
3,445,693 UART: [kat] --
3,450,184 UART: [cold-reset] ++
3,452,754 UART: [fht] FHT @ 0x50003400
3,463,176 UART: [idev] ++
3,463,743 UART: [idev] CDI.KEYID = 6
3,464,727 UART: [idev] SUBJECT.KEYID = 7
3,465,896 UART: [idev] UDS.KEYID = 0
3,466,991 ready_for_fw is high
3,467,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,235 UART: [idev] Erasing UDS.KEYID = 0
5,984,785 UART: [idev] Sha1 KeyId Algorithm
6,006,988 UART: [idev] --
6,012,445 UART: [ldev] ++
6,013,070 UART: [ldev] CDI.KEYID = 6
6,013,983 UART: [ldev] SUBJECT.KEYID = 5
6,015,194 UART: [ldev] AUTHORITY.KEYID = 7
6,016,428 UART: [ldev] FE.KEYID = 1
6,055,577 UART: [ldev] Erasing FE.KEYID = 1
8,560,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,204 UART: [ldev] --
10,374,940 UART: [fwproc] Wait for Commands...
10,377,307 UART: [fwproc] Recv command 0x46574c44
10,379,345 UART: [fwproc] Recv'd Img size: 118548 bytes
14,912,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,993,768 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,066,781 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,394,876 >>> mbox cmd response: success
15,398,127 UART: [afmc] ++
15,398,718 UART: [afmc] CDI.KEYID = 6
15,399,682 UART: [afmc] SUBJECT.KEYID = 7
15,400,898 UART: [afmc] AUTHORITY.KEYID = 5
17,936,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,660,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,662,704 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,678,551 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,694,480 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,710,179 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,733,362 UART: [afmc] --
19,737,171 UART: [cold-reset] --
19,740,810 UART: [state] Locking Datavault
19,746,004 UART: [state] Locking PCR0, PCR1 and PCR31
19,747,762 UART: [state] Locking ICCM
19,749,097 UART: [exit] Launching FMC @ 0x40000130
19,757,488 UART:
19,757,720 UART: Running Caliptra FMC ...
19,758,817 UART:
19,758,973 UART: [state] CFI Enabled
19,818,649 UART: [fht] FMC Alias Private Key: 7
21,584,969 UART: [art] Extend RT PCRs Done
21,586,191 UART: [art] Lock RT PCRs Done
21,587,873 UART: [art] Populate DV Done
21,593,221 UART: [fht] FMC Alias Private Key: 7
21,594,753 UART: [art] Derive CDI
21,595,563 UART: [art] Store in slot 0x4
21,651,248 UART: [art] Derive Key Pair
21,652,287 UART: [art] Store priv key in slot 0x5
24,115,497 UART: [art] Derive Key Pair - Done
24,128,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,840,521 UART: [art] Erasing AUTHORITY.KEYID = 7
25,842,014 UART: [art] PUB.X = CD49AEFE7421244D864BB214CBF25293A648482DB4C359C19C77891867BAE94BF4C10AD8C5498B6C99CA88F264C6C465
25,849,331 UART: [art] PUB.Y = 09BF298183119C2B2B325A820BA006266A5AC051A240B03E5C671E5E003E454899472BA87714C69B6BF93F6B76915D21
25,856,519 UART: [art] SIG.R = 2A885A1D37BB4ECFD4449FA9AD85A02226D55C08FBBFEC68D8A13944D96AD5C14568EAA1A97D3AE6FBC9A46438762951
25,863,910 UART: [art] SIG.S = 2C257A4620F2A1E0CF11C793C06BEC619162CE9CD2B3319C2912C7352B7A8F27916BF1F837DEDE4FA6781398585EBE93
26,843,009 UART: Caliptra RT
26,843,707 UART: [state] CFI Enabled
27,023,590 UART: [rt] RT listening for mailbox commands...
27,025,918 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,181,063 UART: [rt]cmd =0x41544d4e, len=14344
28,147,866 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,459,698 ready_for_fw is high
3,460,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,402,192 >>> mbox cmd response: success
19,684,923 UART:
19,685,301 UART: Running Caliptra FMC ...
19,686,599 UART:
19,686,782 UART: [state] CFI Enabled
19,751,746 UART: [fht] FMC Alias Private Key: 7
21,518,447 UART: [art] Extend RT PCRs Done
21,519,694 UART: [art] Lock RT PCRs Done
21,521,382 UART: [art] Populate DV Done
21,526,954 UART: [fht] FMC Alias Private Key: 7
21,528,434 UART: [art] Derive CDI
21,529,212 UART: [art] Store in slot 0x4
21,585,106 UART: [art] Derive Key Pair
21,586,099 UART: [art] Store priv key in slot 0x5
24,049,251 UART: [art] Derive Key Pair - Done
24,062,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,775,247 UART: [art] Erasing AUTHORITY.KEYID = 7
25,776,759 UART: [art] PUB.X = B359D397F7FA8ECDF66F38F852324FADCCDF20B8F0049C2CF8B4E57047A8CDA37D97B8C7E5699BB383F92443221C1F15
25,784,065 UART: [art] PUB.Y = 4F0AB72EF88E6F5E58EEC6DBBFB363B69B10156E68617DA97A2368E8DCED973C3BCE0EA1A2B418FF9FC53B8EB8322B1E
25,791,358 UART: [art] SIG.R = 9F28889C0E4C78E9AE7DC788CEDBD08AA2E5D5A4A2900D96E9621486B63DC74F997D1EDBDA638D29FF6CE332E3AFA840
25,798,756 UART: [art] SIG.S = F01ACAEE59E6B8C7DC73D9745260B783B96862E8515B0F4EAF7863B132B08DAEC2AF80BD25301ADDE218193DF4F37AA6
26,777,151 UART: Caliptra RT
26,777,870 UART: [state] CFI Enabled
26,959,858 UART: [rt] RT listening for mailbox commands...
26,962,149 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,117,851 UART: [rt]cmd =0x41544d4e, len=14344
28,084,711 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,537 UART:
192,906 UART: Running Caliptra ROM ...
194,052 UART:
603,648 UART: [state] CFI Enabled
619,152 UART: [state] LifecycleState = Unprovisioned
621,048 UART: [state] DebugLocked = No
622,232 UART: [state] WD Timer not started. Device not locked for debugging
626,480 UART: [kat] SHA2-256
806,155 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,963 UART: [kat] ++
817,440 UART: [kat] sha1
828,613 UART: [kat] SHA2-256
831,309 UART: [kat] SHA2-384
835,887 UART: [kat] SHA2-512-ACC
838,259 UART: [kat] ECC-384
3,279,215 UART: [kat] HMAC-384Kdf
3,291,497 UART: [kat] LMS
3,768,007 UART: [kat] --
3,771,742 UART: [cold-reset] ++
3,773,818 UART: [fht] FHT @ 0x50003400
3,785,729 UART: [idev] ++
3,786,359 UART: [idev] CDI.KEYID = 6
3,787,251 UART: [idev] SUBJECT.KEYID = 7
3,788,501 UART: [idev] UDS.KEYID = 0
3,789,406 ready_for_fw is high
3,789,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,558 UART: [idev] Erasing UDS.KEYID = 0
6,267,299 UART: [idev] Sha1 KeyId Algorithm
6,289,981 UART: [idev] --
6,295,165 UART: [ldev] ++
6,295,735 UART: [ldev] CDI.KEYID = 6
6,296,655 UART: [ldev] SUBJECT.KEYID = 5
6,297,869 UART: [ldev] AUTHORITY.KEYID = 7
6,299,103 UART: [ldev] FE.KEYID = 1
6,309,318 UART: [ldev] Erasing FE.KEYID = 1
8,784,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,875 UART: [ldev] --
10,575,356 UART: [fwproc] Wait for Commands...
10,577,068 UART: [fwproc] Recv command 0x46574c44
10,579,061 UART: [fwproc] Recv'd Img size: 118548 bytes
15,137,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,218,629 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,291,642 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,619,877 >>> mbox cmd response: success
15,623,184 UART: [afmc] ++
15,623,985 UART: [afmc] CDI.KEYID = 6
15,624,914 UART: [afmc] SUBJECT.KEYID = 7
15,626,022 UART: [afmc] AUTHORITY.KEYID = 5
18,130,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,853,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,855,366 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,871,260 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,887,189 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,902,887 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,926,732 UART: [afmc] --
19,929,846 UART: [cold-reset] --
19,933,818 UART: [state] Locking Datavault
19,941,994 UART: [state] Locking PCR0, PCR1 and PCR31
19,943,952 UART: [state] Locking ICCM
19,946,278 UART: [exit] Launching FMC @ 0x40000130
19,954,685 UART:
19,954,934 UART: Running Caliptra FMC ...
19,956,038 UART:
19,956,206 UART: [state] CFI Enabled
19,964,100 UART: [fht] FMC Alias Private Key: 7
21,730,602 UART: [art] Extend RT PCRs Done
21,731,824 UART: [art] Lock RT PCRs Done
21,733,771 UART: [art] Populate DV Done
21,738,969 UART: [fht] FMC Alias Private Key: 7
21,740,674 UART: [art] Derive CDI
21,741,489 UART: [art] Store in slot 0x4
21,784,063 UART: [art] Derive Key Pair
21,785,101 UART: [art] Store priv key in slot 0x5
24,212,087 UART: [art] Derive Key Pair - Done
24,225,085 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,931,237 UART: [art] Erasing AUTHORITY.KEYID = 7
25,932,747 UART: [art] PUB.X = DBE0623223D4C056A985195F809FD39A8596AF9144F6A46BD449A4371EC4D75CCFF06A18533200A9AA0EF24E82BA1241
25,939,991 UART: [art] PUB.Y = F0E87FA318DF1A38D80EF5D8F113D909EB1A9B2027967177807FF4180DF26F8D19CBA73CABDBA5D756C108F0687BF392
25,947,290 UART: [art] SIG.R = 5A98BC676D76729374D7C630BBC3FF557DDB13DBACBD15472A98A457B0A3E523964F54D8C96F4324E1910DCB33CCD596
25,954,694 UART: [art] SIG.S = 3E4FBC9D0E24815FAD125548D7230E00D0D478701F0F362D7AA86486C38EFC554C8695AC38A535F1CD6F5758AD550501
26,934,132 UART: Caliptra RT
26,934,863 UART: [state] CFI Enabled
27,067,963 UART: [rt] RT listening for mailbox commands...
27,070,290 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,225,610 UART: [rt]cmd =0x41544d4e, len=14344
28,193,024 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,775,651 ready_for_fw is high
3,776,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,610,423 >>> mbox cmd response: success
19,863,278 UART:
19,863,663 UART: Running Caliptra FMC ...
19,864,855 UART:
19,865,024 UART: [state] CFI Enabled
19,873,081 UART: [fht] FMC Alias Private Key: 7
21,638,763 UART: [art] Extend RT PCRs Done
21,639,986 UART: [art] Lock RT PCRs Done
21,641,671 UART: [art] Populate DV Done
21,647,056 UART: [fht] FMC Alias Private Key: 7
21,648,553 UART: [art] Derive CDI
21,649,317 UART: [art] Store in slot 0x4
21,692,180 UART: [art] Derive Key Pair
21,693,179 UART: [art] Store priv key in slot 0x5
24,119,833 UART: [art] Derive Key Pair - Done
24,132,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,838,969 UART: [art] Erasing AUTHORITY.KEYID = 7
25,840,471 UART: [art] PUB.X = AF60548F590BD9C73AE6254E12814198B4922FE417B35F13A2C7C3FC97AD02321D69AA51361ACB796BC389B96FD3C769
25,847,747 UART: [art] PUB.Y = 7CA531DA976A587D4B54FC545F20C3C4960E206C925C8706159B13AE2DEBFE64DEEC910C7A46E8B29B8063095B247AE3
25,854,996 UART: [art] SIG.R = 1F22950644355DA8A0BA29A9CA3A86CAC02ADC1060176F7990575484AB0E3CD10766F31401B547CD07B1C7C826F8B9E6
25,862,341 UART: [art] SIG.S = 07B5A3111E00284D220BD0647EF87640EB964A726C8829CDA453E6FD8C2D36A8C05945B8B5FA57D21C1415DEE9BB0D00
26,841,417 UART: Caliptra RT
26,842,283 UART: [state] CFI Enabled
26,975,436 UART: [rt] RT listening for mailbox commands...
26,977,840 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,133,281 UART: [rt]cmd =0x41544d4e, len=14344
28,100,195 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
192,182 UART:
192,540 UART: Running Caliptra ROM ...
193,733 UART:
193,901 UART: [state] CFI Enabled
262,386 UART: [state] LifecycleState = Unprovisioned
264,798 UART: [state] DebugLocked = No
266,329 UART: [state] WD Timer not started. Device not locked for debugging
270,636 UART: [kat] SHA2-256
460,523 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,265 UART: [kat] ++
471,758 UART: [kat] sha1
483,649 UART: [kat] SHA2-256
486,638 UART: [kat] SHA2-384
493,198 UART: [kat] SHA2-512-ACC
495,773 UART: [kat] ECC-384
2,947,756 UART: [kat] HMAC-384Kdf
2,972,787 UART: [kat] LMS
3,504,521 UART: [kat] --
3,507,902 UART: [cold-reset] ++
3,510,193 UART: [fht] FHT @ 0x50003400
3,522,990 UART: [idev] ++
3,523,747 UART: [idev] CDI.KEYID = 6
3,524,665 UART: [idev] SUBJECT.KEYID = 7
3,525,836 UART: [idev] UDS.KEYID = 0
3,526,774 ready_for_fw is high
3,526,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,868 UART: [idev] Erasing UDS.KEYID = 0
6,029,899 UART: [idev] Sha1 KeyId Algorithm
6,053,566 UART: [idev] --
6,058,316 UART: [ldev] ++
6,058,993 UART: [ldev] CDI.KEYID = 6
6,059,900 UART: [ldev] SUBJECT.KEYID = 5
6,061,109 UART: [ldev] AUTHORITY.KEYID = 7
6,062,288 UART: [ldev] FE.KEYID = 1
6,100,090 UART: [ldev] Erasing FE.KEYID = 1
8,602,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,184 UART: [ldev] --
10,414,863 UART: [fwproc] Wait for Commands...
10,417,874 UART: [fwproc] Recv command 0x46574c44
10,420,124 UART: [fwproc] Recv'd Img size: 118548 bytes
15,108,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,190,930 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,314,553 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,875,313 >>> mbox cmd response: success
15,879,250 UART: [afmc] ++
15,879,980 UART: [afmc] CDI.KEYID = 6
15,881,178 UART: [afmc] SUBJECT.KEYID = 7
15,882,616 UART: [afmc] AUTHORITY.KEYID = 5
18,410,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,153,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,155,372 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,170,444 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,185,687 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,200,699 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,225,809 UART: [afmc] --
20,228,753 UART: [cold-reset] --
20,231,485 UART: [state] Locking Datavault
20,235,710 UART: [state] Locking PCR0, PCR1 and PCR31
20,237,857 UART: [state] Locking ICCM
20,240,067 UART: [exit] Launching FMC @ 0x40000130
20,248,742 UART:
20,248,982 UART: Running Caliptra FMC ...
20,250,081 UART:
20,250,248 UART: [state] CFI Enabled
20,311,737 UART: [fht] FMC Alias Private Key: 7
22,077,755 UART: [art] Extend RT PCRs Done
22,078,978 UART: [art] Lock RT PCRs Done
22,080,619 UART: [art] Populate DV Done
22,086,279 UART: [fht] FMC Alias Private Key: 7
22,087,767 UART: [art] Derive CDI
22,088,506 UART: [art] Store in slot 0x4
22,144,731 UART: [art] Derive Key Pair
22,145,729 UART: [art] Store priv key in slot 0x5
24,608,779 UART: [art] Derive Key Pair - Done
24,621,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,334,413 UART: [art] Erasing AUTHORITY.KEYID = 7
26,335,918 UART: [art] PUB.X = 4ADFEB8A72DFB20C7C066F5EB8FD0D71DAA199000E7E870B4C15404326A04383D6CE73B86972EF3047208C5222EE77CF
26,343,194 UART: [art] PUB.Y = 6379CAD280D8777B066FC8779598A078F458BD653FA8044B11F5CCBE9336264C6CC6986063393C42591860CA26702216
26,350,399 UART: [art] SIG.R = 30D4D4E36AA2DA83CFF6D5D2D5DBA50011B9B8F7A24EFB02EE1EA7317DA6D484D1157691F5C7E5A65962B530BD46799D
26,357,771 UART: [art] SIG.S = 243F01922BD4ED844A680AB093CD1A209FA73616754967F203C6AB09916AB6D9430EB6D75129015ABD15F040475C74BE
27,336,849 UART: Caliptra RT
27,337,546 UART: [state] CFI Enabled
27,518,002 UART: [rt] RT listening for mailbox commands...
27,520,460 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,675,891 UART: [rt]cmd =0x41544d4e, len=14344
28,642,865 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,438,255 ready_for_fw is high
3,438,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,922,360 >>> mbox cmd response: success
20,198,066 UART:
20,198,451 UART: Running Caliptra FMC ...
20,199,653 UART:
20,199,823 UART: [state] CFI Enabled
20,267,475 UART: [fht] FMC Alias Private Key: 7
22,033,212 UART: [art] Extend RT PCRs Done
22,034,446 UART: [art] Lock RT PCRs Done
22,035,967 UART: [art] Populate DV Done
22,041,454 UART: [fht] FMC Alias Private Key: 7
22,043,000 UART: [art] Derive CDI
22,043,825 UART: [art] Store in slot 0x4
22,100,167 UART: [art] Derive Key Pair
22,101,216 UART: [art] Store priv key in slot 0x5
24,564,307 UART: [art] Derive Key Pair - Done
24,577,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,290,533 UART: [art] Erasing AUTHORITY.KEYID = 7
26,292,041 UART: [art] PUB.X = 6ED0BD0351B0C9FF67B49DC01EAC33F11C44B278F2AC176CC2418D896819061FDE6FF3DFBD9BCDCA4FB1585F7027407D
26,299,316 UART: [art] PUB.Y = 45CE1984FA79F040A5090801779209E869A079F6046D2EC159281D0264B20768F69B74BCFF2AE5F5D89E9D7A4979EAC1
26,306,598 UART: [art] SIG.R = 73AE0E8F7EF98C394A8C233CFE8D8A4EBB0A67D47941DCD3DD5721BC101A2273DF1AFBCEC1B81004B4578348F5271BF5
26,313,973 UART: [art] SIG.S = 4A04CF00AAF2736AC486AF389E79E774A8A1BD82D56887A6CCEF9E9A564821908694E71274770682483AD2835E69232D
27,293,099 UART: Caliptra RT
27,293,818 UART: [state] CFI Enabled
27,476,330 UART: [rt] RT listening for mailbox commands...
27,478,625 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,634,292 UART: [rt]cmd =0x41544d4e, len=14344
28,601,206 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,436 UART:
192,806 UART: Running Caliptra ROM ...
193,963 UART:
603,545 UART: [state] CFI Enabled
617,789 UART: [state] LifecycleState = Unprovisioned
620,162 UART: [state] DebugLocked = No
622,326 UART: [state] WD Timer not started. Device not locked for debugging
626,374 UART: [kat] SHA2-256
816,246 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,061 UART: [kat] ++
827,514 UART: [kat] sha1
838,746 UART: [kat] SHA2-256
841,770 UART: [kat] SHA2-384
847,984 UART: [kat] SHA2-512-ACC
850,576 UART: [kat] ECC-384
3,292,699 UART: [kat] HMAC-384Kdf
3,304,689 UART: [kat] LMS
3,836,511 UART: [kat] --
3,839,470 UART: [cold-reset] ++
3,840,705 UART: [fht] FHT @ 0x50003400
3,850,709 UART: [idev] ++
3,851,411 UART: [idev] CDI.KEYID = 6
3,852,342 UART: [idev] SUBJECT.KEYID = 7
3,853,535 UART: [idev] UDS.KEYID = 0
3,854,471 ready_for_fw is high
3,854,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,400 UART: [idev] Erasing UDS.KEYID = 0
6,328,544 UART: [idev] Sha1 KeyId Algorithm
6,351,200 UART: [idev] --
6,356,334 UART: [ldev] ++
6,357,016 UART: [ldev] CDI.KEYID = 6
6,357,910 UART: [ldev] SUBJECT.KEYID = 5
6,359,131 UART: [ldev] AUTHORITY.KEYID = 7
6,360,230 UART: [ldev] FE.KEYID = 1
6,373,244 UART: [ldev] Erasing FE.KEYID = 1
8,856,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,769 UART: [ldev] --
10,647,950 UART: [fwproc] Wait for Commands...
10,650,045 UART: [fwproc] Recv command 0x46574c44
10,652,315 UART: [fwproc] Recv'd Img size: 118548 bytes
15,299,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,381,986 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,505,595 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,065,470 >>> mbox cmd response: success
16,069,228 UART: [afmc] ++
16,069,965 UART: [afmc] CDI.KEYID = 6
16,071,187 UART: [afmc] SUBJECT.KEYID = 7
16,072,641 UART: [afmc] AUTHORITY.KEYID = 5
18,582,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,304,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,306,068 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,321,180 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,336,404 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,351,454 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,375,650 UART: [afmc] --
20,378,547 UART: [cold-reset] --
20,384,320 UART: [state] Locking Datavault
20,389,591 UART: [state] Locking PCR0, PCR1 and PCR31
20,391,752 UART: [state] Locking ICCM
20,394,015 UART: [exit] Launching FMC @ 0x40000130
20,402,657 UART:
20,402,903 UART: Running Caliptra FMC ...
20,404,030 UART:
20,404,202 UART: [state] CFI Enabled
20,412,378 UART: [fht] FMC Alias Private Key: 7
22,179,190 UART: [art] Extend RT PCRs Done
22,180,413 UART: [art] Lock RT PCRs Done
22,182,208 UART: [art] Populate DV Done
22,187,632 UART: [fht] FMC Alias Private Key: 7
22,189,124 UART: [art] Derive CDI
22,189,891 UART: [art] Store in slot 0x4
22,232,878 UART: [art] Derive Key Pair
22,233,878 UART: [art] Store priv key in slot 0x5
24,660,528 UART: [art] Derive Key Pair - Done
24,673,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,380,218 UART: [art] Erasing AUTHORITY.KEYID = 7
26,381,741 UART: [art] PUB.X = F30A989E8DC513BCA4221663C6309CDBE009E63F6E95095A37521960C1799B4EB1FF03593E588996C93D7BB0C0FBED55
26,388,960 UART: [art] PUB.Y = F932802548561054EF538FE5500630E3AF9D8BD76B206BE14AE7CB45B9FB4D488BE8CFFC898FE15134B72D90AEDF7F38
26,396,237 UART: [art] SIG.R = 752EBB09320A297E77FA8220212DE58D401C1F342058068B27524B349B90B57A6A76C37FE912C27B531F0662F2DF64B2
26,403,605 UART: [art] SIG.S = 9DE3005EF808D7A12643F38E0BC25AE0F7368F41A37FEB53D3E6045CCB544789601D5B8F57817FC0EC5C8B8E108F1E29
27,382,336 UART: Caliptra RT
27,383,055 UART: [state] CFI Enabled
27,516,168 UART: [rt] RT listening for mailbox commands...
27,518,483 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,673,964 UART: [rt]cmd =0x41544d4e, len=14344
28,640,974 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,755,159 ready_for_fw is high
3,755,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,140,685 >>> mbox cmd response: success
20,397,973 UART:
20,398,374 UART: Running Caliptra FMC ...
20,399,579 UART:
20,399,767 UART: [state] CFI Enabled
20,407,503 UART: [fht] FMC Alias Private Key: 7
22,173,857 UART: [art] Extend RT PCRs Done
22,175,082 UART: [art] Lock RT PCRs Done
22,176,824 UART: [art] Populate DV Done
22,182,300 UART: [fht] FMC Alias Private Key: 7
22,183,798 UART: [art] Derive CDI
22,184,541 UART: [art] Store in slot 0x4
22,227,303 UART: [art] Derive Key Pair
22,228,306 UART: [art] Store priv key in slot 0x5
24,655,604 UART: [art] Derive Key Pair - Done
24,668,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,374,848 UART: [art] Erasing AUTHORITY.KEYID = 7
26,376,356 UART: [art] PUB.X = 18F05A88AA02837D1FEBCD00A59C2FAB7867E8CF454E4FEEE112E0452E8E49C57AB5CECE67C775BF0271D701A970885F
26,383,630 UART: [art] PUB.Y = CB8A1DD4C657C59E858B0573C48F494F676087A2F550C8C5B4DF43A1BDE79571E9639D9F205D24B5ED90E3DFA0A500EB
26,390,894 UART: [art] SIG.R = 87189D5DC2EA08C2FAD1B9C1D1738A37F2EDDCEAD425298553DAA7D6DB71CAF5B2D1AED051EAB4E6CA6A9F6825197A30
26,398,270 UART: [art] SIG.S = FC570667D418402D5E6D26584D6DF2E1D92FC23716DD2844BEA8B81061FEBF2A36E9AFD95BB8C1F3F435074C66426564
27,376,998 UART: Caliptra RT
27,377,709 UART: [state] CFI Enabled
27,510,033 UART: [rt] RT listening for mailbox commands...
27,512,339 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,667,669 UART: [rt]cmd =0x41544d4e, len=14344
28,634,554 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,542 UART: [state] LifecycleState = Unprovisioned
85,197 UART: [state] DebugLocked = No
85,801 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,471 UART: [kat] SHA2-256
881,402 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,517 UART: [kat] ++
885,669 UART: [kat] sha1
889,763 UART: [kat] SHA2-256
891,701 UART: [kat] SHA2-384
894,452 UART: [kat] SHA2-512-ACC
896,353 UART: [kat] ECC-384
901,990 UART: [kat] HMAC-384Kdf
906,516 UART: [kat] LMS
1,474,712 UART: [kat] --
1,475,545 UART: [cold-reset] ++
1,475,909 UART: [fht] Storing FHT @ 0x50003400
1,478,882 UART: [idev] ++
1,479,050 UART: [idev] CDI.KEYID = 6
1,479,410 UART: [idev] SUBJECT.KEYID = 7
1,479,834 UART: [idev] UDS.KEYID = 0
1,480,179 ready_for_fw is high
1,480,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,892 UART: [idev] Erasing UDS.KEYID = 0
1,504,736 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,282 UART: [idev] --
1,514,343 UART: [ldev] ++
1,514,511 UART: [ldev] CDI.KEYID = 6
1,514,874 UART: [ldev] SUBJECT.KEYID = 5
1,515,300 UART: [ldev] AUTHORITY.KEYID = 7
1,515,763 UART: [ldev] FE.KEYID = 1
1,520,945 UART: [ldev] Erasing FE.KEYID = 1
1,545,468 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,336 UART: [ldev] --
1,584,619 UART: [fwproc] Waiting for Commands...
1,585,248 UART: [fwproc] Received command 0x46574c44
1,586,039 UART: [fwproc] Received Image of size 118548 bytes
5,241,752 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,269,096 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,300,314 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,440,625 >>> mbox cmd response: success
5,441,805 UART: [afmc] ++
5,441,973 UART: [afmc] CDI.KEYID = 6
5,442,335 UART: [afmc] SUBJECT.KEYID = 7
5,442,760 UART: [afmc] AUTHORITY.KEYID = 5
5,477,169 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,493,515 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,494,295 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,500,001 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,505,880 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,511,593 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,519,228 UART: [afmc] --
5,520,296 UART: [cold-reset] --
5,521,284 UART: [state] Locking Datavault
5,522,593 UART: [state] Locking PCR0, PCR1 and PCR31
5,523,197 UART: [state] Locking ICCM
5,523,805 UART: [exit] Launching FMC @ 0x40000130
5,529,135 UART:
5,529,151 UART: Running Caliptra FMC ...
5,529,559 UART:
5,529,613 UART: [state] CFI Enabled
5,539,843 UART: [fht] FMC Alias Private Key: 7
5,658,595 UART: [art] Extend RT PCRs Done
5,659,023 UART: [art] Lock RT PCRs Done
5,660,529 UART: [art] Populate DV Done
5,668,786 UART: [fht] FMC Alias Private Key: 7
5,669,730 UART: [art] Derive CDI
5,670,010 UART: [art] Store in slot 0x4
5,755,516 UART: [art] Derive Key Pair
5,755,876 UART: [art] Store priv key in slot 0x5
5,769,111 UART: [art] Derive Key Pair - Done
5,784,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,799,454 UART: [art] Erasing AUTHORITY.KEYID = 7
5,800,219 UART: [art] PUB.X = 002FA7AEE19AB7B05FE7AF1BD3180E7BD1DF3D77E4FE8C8316C68D9B9CAE6CB21F9DF68A582AE5EB0EBA172C98AD1EF9
5,806,995 UART: [art] PUB.Y = DEF9B21C19964AA59E6122F74447CF1ACA78EEDC9D36F683A293F3E54317E1A8AD650B5CC2E6F871CC3194C2134302CB
5,813,951 UART: [art] SIG.R = 9DE8E0A59A9C9F40FE44AB0555F622D55CDAC9A112DC7BF7B5A501C293FF0D77EBCF050C490B1B6747CA0BC492EBCEF6
5,820,726 UART: [art] SIG.S = 669553CD7D5B8AE952AC46F1650F71BD1256B3DC7A8C12E83AF1A22EC7F82C615C94C922EED34EBEE062DFEDD9AD0C8D
5,844,462 UART: Caliptra RT
5,844,713 UART: [state] CFI Enabled
5,964,523 UART: [rt] RT listening for mailbox commands...
5,965,193 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,088,229 UART: [rt]cmd =0x41544d4e, len=14344
6,097,003 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,697 ready_for_fw is high
1,362,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,407,358 >>> mbox cmd response: success
5,468,919 UART:
5,468,935 UART: Running Caliptra FMC ...
5,469,343 UART:
5,469,397 UART: [state] CFI Enabled
5,479,803 UART: [fht] FMC Alias Private Key: 7
5,599,095 UART: [art] Extend RT PCRs Done
5,599,523 UART: [art] Lock RT PCRs Done
5,600,843 UART: [art] Populate DV Done
5,609,018 UART: [fht] FMC Alias Private Key: 7
5,610,192 UART: [art] Derive CDI
5,610,472 UART: [art] Store in slot 0x4
5,695,886 UART: [art] Derive Key Pair
5,696,246 UART: [art] Store priv key in slot 0x5
5,709,079 UART: [art] Derive Key Pair - Done
5,724,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,739,159 UART: [art] Erasing AUTHORITY.KEYID = 7
5,739,924 UART: [art] PUB.X = 0105ABC70F02E890A2A59FA85109023386815AF86A6E05A63B0244EF4284B5D94D82FEB8F60E3519DA9E041A5661C94A
5,746,664 UART: [art] PUB.Y = 20AF54BA188086A168CB572FEB96D2C6086DE374F65FC1BEF350D196FA456948BE2922817A57C2A7228352A6540047CB
5,753,589 UART: [art] SIG.R = C317BC29B2ED74128F80E57D021AEE190D6381CBEDC6522F658D509B9BD3C407D5C418637BA823B3045F8564D54AC764
5,760,351 UART: [art] SIG.S = 29327BCFB872E9E90FAC1A134BF0C236017F1C932DB1B7B1D80CA6D1458D1EE8E1BFC2779399E9821ABDA11D0E078712
5,784,236 UART: Caliptra RT
5,784,487 UART: [state] CFI Enabled
5,905,515 UART: [rt] RT listening for mailbox commands...
5,906,185 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,029,403 UART: [rt]cmd =0x41544d4e, len=14344
6,038,109 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,328 UART: [kat] SHA2-256
882,259 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,374 UART: [kat] ++
886,526 UART: [kat] sha1
890,810 UART: [kat] SHA2-256
892,748 UART: [kat] SHA2-384
895,501 UART: [kat] SHA2-512-ACC
897,402 UART: [kat] ECC-384
902,779 UART: [kat] HMAC-384Kdf
907,445 UART: [kat] LMS
1,475,641 UART: [kat] --
1,476,358 UART: [cold-reset] ++
1,476,692 UART: [fht] Storing FHT @ 0x50003400
1,479,481 UART: [idev] ++
1,479,649 UART: [idev] CDI.KEYID = 6
1,480,009 UART: [idev] SUBJECT.KEYID = 7
1,480,433 UART: [idev] UDS.KEYID = 0
1,480,778 ready_for_fw is high
1,480,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,631 UART: [idev] Erasing UDS.KEYID = 0
1,505,269 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,955 UART: [idev] --
1,515,168 UART: [ldev] ++
1,515,336 UART: [ldev] CDI.KEYID = 6
1,515,699 UART: [ldev] SUBJECT.KEYID = 5
1,516,125 UART: [ldev] AUTHORITY.KEYID = 7
1,516,588 UART: [ldev] FE.KEYID = 1
1,521,740 UART: [ldev] Erasing FE.KEYID = 1
1,547,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,587 UART: [ldev] --
1,586,920 UART: [fwproc] Waiting for Commands...
1,587,673 UART: [fwproc] Received command 0x46574c44
1,588,464 UART: [fwproc] Received Image of size 118548 bytes
5,132,036 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,159,528 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,190,746 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,331,133 >>> mbox cmd response: success
5,332,373 UART: [afmc] ++
5,332,541 UART: [afmc] CDI.KEYID = 6
5,332,903 UART: [afmc] SUBJECT.KEYID = 7
5,333,328 UART: [afmc] AUTHORITY.KEYID = 5
5,369,083 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,385,163 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,385,943 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,391,649 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,397,528 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,403,241 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,411,266 UART: [afmc] --
5,412,332 UART: [cold-reset] --
5,413,316 UART: [state] Locking Datavault
5,414,687 UART: [state] Locking PCR0, PCR1 and PCR31
5,415,291 UART: [state] Locking ICCM
5,415,883 UART: [exit] Launching FMC @ 0x40000130
5,421,213 UART:
5,421,229 UART: Running Caliptra FMC ...
5,421,637 UART:
5,421,780 UART: [state] CFI Enabled
5,431,902 UART: [fht] FMC Alias Private Key: 7
5,550,276 UART: [art] Extend RT PCRs Done
5,550,704 UART: [art] Lock RT PCRs Done
5,552,244 UART: [art] Populate DV Done
5,560,605 UART: [fht] FMC Alias Private Key: 7
5,561,731 UART: [art] Derive CDI
5,562,011 UART: [art] Store in slot 0x4
5,647,733 UART: [art] Derive Key Pair
5,648,093 UART: [art] Store priv key in slot 0x5
5,662,092 UART: [art] Derive Key Pair - Done
5,676,844 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,692,411 UART: [art] Erasing AUTHORITY.KEYID = 7
5,693,176 UART: [art] PUB.X = 1C8FB972F80CBCB86FAD9106D148FC65C170BA5CBB433A47D9E9A26E29C0BE1C3429DE1AAA7F7C51226B1F2032CC05E2
5,699,957 UART: [art] PUB.Y = 5A1A545A56347CC68AFBF28354A841C8185CD43C653423AB2D28EC701065E3AE2F443EF769848094DAB89B8E41607DF3
5,706,909 UART: [art] SIG.R = 1F205C722142D2713032CBE1B6144A7A0800F566C816F86DDF48D8571FE91DFE027EB90844A52211708FF1CE74045835
5,713,639 UART: [art] SIG.S = 495DE4F8E8B14EECF8C5A5728818E67A4C85C8999C03934205F451A9C75B1CA2AA3CE6A7A074D11D24A8494BE4B7743E
5,737,529 UART: Caliptra RT
5,737,872 UART: [state] CFI Enabled
5,859,069 UART: [rt] RT listening for mailbox commands...
5,859,739 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,982,959 UART: [rt]cmd =0x41544d4e, len=14344
5,991,523 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,718 ready_for_fw is high
1,362,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,254,523 >>> mbox cmd response: success
5,317,052 UART:
5,317,068 UART: Running Caliptra FMC ...
5,317,476 UART:
5,317,619 UART: [state] CFI Enabled
5,327,969 UART: [fht] FMC Alias Private Key: 7
5,447,601 UART: [art] Extend RT PCRs Done
5,448,029 UART: [art] Lock RT PCRs Done
5,449,535 UART: [art] Populate DV Done
5,458,058 UART: [fht] FMC Alias Private Key: 7
5,459,222 UART: [art] Derive CDI
5,459,502 UART: [art] Store in slot 0x4
5,545,598 UART: [art] Derive Key Pair
5,545,958 UART: [art] Store priv key in slot 0x5
5,559,231 UART: [art] Derive Key Pair - Done
5,573,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,589,977 UART: [art] Erasing AUTHORITY.KEYID = 7
5,590,742 UART: [art] PUB.X = 22D2FE400B03A280CF0379F48AE8D2E557065A672DA6F54838683CE8B1ACC0F0BA5C18BF3EFAC8E31A998FDE8AD5C8C6
5,597,520 UART: [art] PUB.Y = DC7A1CA89DD3638DF11851CFE5753B82661B69AA83C0E639467C41A0B1BD8D65E3A7D4AC2DC0F307386C07962191095A
5,604,467 UART: [art] SIG.R = ECDC3841111F8AF333DB7D36C710DA3C834206B01182CF2FFB920B9985702892FF927503A5252F29FE719B4927C3C584
5,611,226 UART: [art] SIG.S = 0D20298AAFF57D91A02288FF838E3FD8784E736AE1E9BF6D6AEB588851C10E570D942FBEE2B26C69E4B1BD77FD5C0CA3
5,634,714 UART: Caliptra RT
5,635,057 UART: [state] CFI Enabled
5,755,495 UART: [rt] RT listening for mailbox commands...
5,756,165 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,879,279 UART: [rt]cmd =0x41544d4e, len=14344
5,887,729 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,869 UART: [state] WD Timer not started. Device not locked for debugging
88,080 UART: [kat] SHA2-256
891,630 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,734 UART: [kat] ++
895,886 UART: [kat] sha1
900,140 UART: [kat] SHA2-256
902,080 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,025 UART: [kat] HMAC-384Kdf
920,471 UART: [kat] LMS
1,168,783 UART: [kat] --
1,169,722 UART: [cold-reset] ++
1,170,138 UART: [fht] FHT @ 0x50003400
1,172,902 UART: [idev] ++
1,173,070 UART: [idev] CDI.KEYID = 6
1,173,431 UART: [idev] SUBJECT.KEYID = 7
1,173,856 UART: [idev] UDS.KEYID = 0
1,174,202 ready_for_fw is high
1,174,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,198,693 UART: [idev] Sha1 KeyId Algorithm
1,207,441 UART: [idev] --
1,208,364 UART: [ldev] ++
1,208,532 UART: [ldev] CDI.KEYID = 6
1,208,896 UART: [ldev] SUBJECT.KEYID = 5
1,209,323 UART: [ldev] AUTHORITY.KEYID = 7
1,209,786 UART: [ldev] FE.KEYID = 1
1,214,704 UART: [ldev] Erasing FE.KEYID = 1
1,241,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,970 UART: [ldev] --
1,280,345 UART: [fwproc] Wait for Commands...
1,280,916 UART: [fwproc] Recv command 0x46574c44
1,281,649 UART: [fwproc] Recv'd Img size: 118548 bytes
3,184,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,212,020 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,243,195 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,383,370 >>> mbox cmd response: success
3,384,452 UART: [afmc] ++
3,384,620 UART: [afmc] CDI.KEYID = 6
3,384,983 UART: [afmc] SUBJECT.KEYID = 7
3,385,409 UART: [afmc] AUTHORITY.KEYID = 5
3,420,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,437,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,437,786 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,443,493 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,449,370 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,455,080 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,462,812 UART: [afmc] --
3,463,633 UART: [cold-reset] --
3,464,415 UART: [state] Locking Datavault
3,465,578 UART: [state] Locking PCR0, PCR1 and PCR31
3,466,182 UART: [state] Locking ICCM
3,466,756 UART: [exit] Launching FMC @ 0x40000130
3,472,086 UART:
3,472,102 UART: Running Caliptra FMC ...
3,472,510 UART:
3,472,564 UART: [state] CFI Enabled
3,483,280 UART: [fht] FMC Alias Private Key: 7
3,602,696 UART: [art] Extend RT PCRs Done
3,603,124 UART: [art] Lock RT PCRs Done
3,604,716 UART: [art] Populate DV Done
3,613,101 UART: [fht] FMC Alias Private Key: 7
3,614,135 UART: [art] Derive CDI
3,614,415 UART: [art] Store in slot 0x4
3,700,194 UART: [art] Derive Key Pair
3,700,554 UART: [art] Store priv key in slot 0x5
3,713,400 UART: [art] Derive Key Pair - Done
3,728,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,743,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,744,655 UART: [art] PUB.X = 186DC9FA5D1268FFCD7305197217154139169E2878A8599ECE5E9DE45D267F89DCDD977A50ABFF24282F444702811438
3,751,415 UART: [art] PUB.Y = F2A77C09641AEEC08CDD3A7C7DB1790133277B548D43B8BB21EE80E9B559BF8CE9591B78B2355C7082BEDD6CE9E9EFFC
3,758,379 UART: [art] SIG.R = A5AE4DE4FA744A6B77CD863BF643600552E2347E7367AF37BA3DF59C52211C019EECBA65675984C6846D08034CA50F4C
3,765,140 UART: [art] SIG.S = 32BA069CEFC2A34CC684D4E2D9AD47B360CB3267D0FE61D2BF4FF6F999E2EBBD5E35252C6D383D3A44FD86744046F9D7
3,788,991 UART: Caliptra RT
3,789,242 UART: [state] CFI Enabled
3,907,766 UART: [rt] RT listening for mailbox commands...
3,908,436 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,031,364 UART: [rt]cmd =0x41544d4e, len=14344
4,040,000 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,102 ready_for_fw is high
1,060,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,221,063 >>> mbox cmd response: success
3,282,980 UART:
3,282,996 UART: Running Caliptra FMC ...
3,283,404 UART:
3,283,458 UART: [state] CFI Enabled
3,294,218 UART: [fht] FMC Alias Private Key: 7
3,413,414 UART: [art] Extend RT PCRs Done
3,413,842 UART: [art] Lock RT PCRs Done
3,415,254 UART: [art] Populate DV Done
3,423,669 UART: [fht] FMC Alias Private Key: 7
3,424,693 UART: [art] Derive CDI
3,424,973 UART: [art] Store in slot 0x4
3,510,602 UART: [art] Derive Key Pair
3,510,962 UART: [art] Store priv key in slot 0x5
3,523,728 UART: [art] Derive Key Pair - Done
3,538,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,865 UART: [art] PUB.X = 1584895DFE3D3C62613AAF6EAAE61A5CD32E628BE04864B6270A23E8AA75B41F479D7E7877D145907087DF745BDD4560
3,561,636 UART: [art] PUB.Y = 1C259E350F0A93C2F1C3FDB8B9911BAC201931FA77C125DE8E7ACDA770466C570CCB55FBD4393776701475FF2794DF05
3,568,582 UART: [art] SIG.R = 794ED0137511C246A7CA915ACA5B0ED2E50D6371D03BFB528104846994D40919CC3408460B5ECC17088A9A1D893257E4
3,575,327 UART: [art] SIG.S = 86C6A14F34F175306F74BA0187224375FE23CA4EB0428CE53D0C95514C3091DE1E7C0A00C9F2BA32E1791528822109B6
3,599,343 UART: Caliptra RT
3,599,594 UART: [state] CFI Enabled
3,718,890 UART: [rt] RT listening for mailbox commands...
3,719,560 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,604 UART: [rt]cmd =0x41544d4e, len=14344
3,851,062 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
891,377 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,512 UART: [kat] LMS
1,168,824 UART: [kat] --
1,169,819 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,919 UART: [idev] ++
1,173,087 UART: [idev] CDI.KEYID = 6
1,173,448 UART: [idev] SUBJECT.KEYID = 7
1,173,873 UART: [idev] UDS.KEYID = 0
1,174,219 ready_for_fw is high
1,174,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,552 UART: [idev] Sha1 KeyId Algorithm
1,208,308 UART: [idev] --
1,209,421 UART: [ldev] ++
1,209,589 UART: [ldev] CDI.KEYID = 6
1,209,953 UART: [ldev] SUBJECT.KEYID = 5
1,210,380 UART: [ldev] AUTHORITY.KEYID = 7
1,210,843 UART: [ldev] FE.KEYID = 1
1,216,169 UART: [ldev] Erasing FE.KEYID = 1
1,242,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,245 UART: [ldev] --
1,281,638 UART: [fwproc] Wait for Commands...
1,282,297 UART: [fwproc] Recv command 0x46574c44
1,283,030 UART: [fwproc] Recv'd Img size: 118548 bytes
3,179,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,207,472 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,238,647 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,904 >>> mbox cmd response: success
3,379,932 UART: [afmc] ++
3,380,100 UART: [afmc] CDI.KEYID = 6
3,380,463 UART: [afmc] SUBJECT.KEYID = 7
3,380,889 UART: [afmc] AUTHORITY.KEYID = 5
3,416,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,727 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,476 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,439,183 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,445,060 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,770 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,592 UART: [afmc] --
3,459,585 UART: [cold-reset] --
3,460,599 UART: [state] Locking Datavault
3,461,396 UART: [state] Locking PCR0, PCR1 and PCR31
3,462,000 UART: [state] Locking ICCM
3,462,612 UART: [exit] Launching FMC @ 0x40000130
3,467,942 UART:
3,467,958 UART: Running Caliptra FMC ...
3,468,366 UART:
3,468,509 UART: [state] CFI Enabled
3,478,751 UART: [fht] FMC Alias Private Key: 7
3,597,629 UART: [art] Extend RT PCRs Done
3,598,057 UART: [art] Lock RT PCRs Done
3,599,689 UART: [art] Populate DV Done
3,608,074 UART: [fht] FMC Alias Private Key: 7
3,609,136 UART: [art] Derive CDI
3,609,416 UART: [art] Store in slot 0x4
3,694,921 UART: [art] Derive Key Pair
3,695,281 UART: [art] Store priv key in slot 0x5
3,709,155 UART: [art] Derive Key Pair - Done
3,724,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,740,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,740,945 UART: [art] PUB.X = 3A69245F551D82675C80CA904D23200B17BED6E56D884C37F9B797F22C1433EF121E42A6E002022959903572F574660C
3,747,691 UART: [art] PUB.Y = 42F69445BBF13BE8FECC1E1E6E8B1EE7506AF22F1F9211EEA498E7CE57D6B75794AF415994E94AFC1E232ABAEFCBC044
3,754,665 UART: [art] SIG.R = 4CB0A81FCD8914EFE6D202958DAFB50309FFFB9657B69E7ED2019C22420A7B2CA56EEE7DA63B4553B3EDDF224F4ED329
3,761,440 UART: [art] SIG.S = 191678C083CFC0D51356B78206C9BD38808CEB5A2E21811522F10089B2FF0369EB5D6F502D05AFA2047FBEF7CA5A92C8
3,785,406 UART: Caliptra RT
3,785,749 UART: [state] CFI Enabled
3,904,961 UART: [rt] RT listening for mailbox commands...
3,905,631 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,711 UART: [rt]cmd =0x41544d4e, len=14344
4,037,267 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,347 ready_for_fw is high
1,059,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,234,044 >>> mbox cmd response: success
3,296,293 UART:
3,296,309 UART: Running Caliptra FMC ...
3,296,717 UART:
3,296,860 UART: [state] CFI Enabled
3,307,196 UART: [fht] FMC Alias Private Key: 7
3,426,306 UART: [art] Extend RT PCRs Done
3,426,734 UART: [art] Lock RT PCRs Done
3,428,306 UART: [art] Populate DV Done
3,436,487 UART: [fht] FMC Alias Private Key: 7
3,437,577 UART: [art] Derive CDI
3,437,857 UART: [art] Store in slot 0x4
3,523,636 UART: [art] Derive Key Pair
3,523,996 UART: [art] Store priv key in slot 0x5
3,537,538 UART: [art] Derive Key Pair - Done
3,552,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,568,359 UART: [art] Erasing AUTHORITY.KEYID = 7
3,569,124 UART: [art] PUB.X = 82B3E1D7CB880D2630F91B0B9720BE7039EFF4C8A093DD8980DDECC192F2E1392ADF129141ABEACC70263D8388D2CBEB
3,575,906 UART: [art] PUB.Y = BA168125B45DAA061D6D57512AF552CCB9CDC53394CF5DB94959368D8A1605CA6A1B6CA5D78FACD9E8095CF9043F9A9E
3,582,860 UART: [art] SIG.R = 24AB3ACB3098D41A641E2D8E86A98442D0F5194C63871716AF6C48A97B1A940ED8F2BA4F575B70605C9176DE36B96BC5
3,589,631 UART: [art] SIG.S = 67E0006DF547E620A93998AF8F870959F95B73E548A6C8D239A8CCE193A7E4B8B85D8AC5FF1A4DD69CDA4A51FB727BB5
3,613,564 UART: Caliptra RT
3,613,907 UART: [state] CFI Enabled
3,734,671 UART: [rt] RT listening for mailbox commands...
3,735,341 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,858,347 UART: [rt]cmd =0x41544d4e, len=14344
3,866,779 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,057 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
892,974 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,099 UART: [kat] ++
897,251 UART: [kat] sha1
901,337 UART: [kat] SHA2-256
903,277 UART: [kat] SHA2-384
906,172 UART: [kat] SHA2-512-ACC
908,073 UART: [kat] ECC-384
917,268 UART: [kat] HMAC-384Kdf
921,782 UART: [kat] LMS
1,170,110 UART: [kat] --
1,171,121 UART: [cold-reset] ++
1,171,589 UART: [fht] FHT @ 0x50003400
1,174,396 UART: [idev] ++
1,174,564 UART: [idev] CDI.KEYID = 6
1,174,924 UART: [idev] SUBJECT.KEYID = 7
1,175,348 UART: [idev] UDS.KEYID = 0
1,175,693 ready_for_fw is high
1,175,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,974 UART: [idev] Erasing UDS.KEYID = 0
1,199,643 UART: [idev] Sha1 KeyId Algorithm
1,207,995 UART: [idev] --
1,208,985 UART: [ldev] ++
1,209,153 UART: [ldev] CDI.KEYID = 6
1,209,516 UART: [ldev] SUBJECT.KEYID = 5
1,209,942 UART: [ldev] AUTHORITY.KEYID = 7
1,210,405 UART: [ldev] FE.KEYID = 1
1,215,501 UART: [ldev] Erasing FE.KEYID = 1
1,242,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,979 UART: [ldev] --
1,281,480 UART: [fwproc] Wait for Commands...
1,282,300 UART: [fwproc] Recv command 0x46574c44
1,283,028 UART: [fwproc] Recv'd Img size: 118548 bytes
3,164,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,192,795 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,223,965 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,364,296 >>> mbox cmd response: success
3,365,376 UART: [afmc] ++
3,365,544 UART: [afmc] CDI.KEYID = 6
3,365,906 UART: [afmc] SUBJECT.KEYID = 7
3,366,331 UART: [afmc] AUTHORITY.KEYID = 5
3,401,438 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,417,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,418,643 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,424,349 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,430,228 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,435,938 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,443,821 UART: [afmc] --
3,444,853 UART: [cold-reset] --
3,445,573 UART: [state] Locking Datavault
3,447,032 UART: [state] Locking PCR0, PCR1 and PCR31
3,447,636 UART: [state] Locking ICCM
3,448,232 UART: [exit] Launching FMC @ 0x40000130
3,453,562 UART:
3,453,578 UART: Running Caliptra FMC ...
3,453,986 UART:
3,454,040 UART: [state] CFI Enabled
3,464,518 UART: [fht] FMC Alias Private Key: 7
3,582,924 UART: [art] Extend RT PCRs Done
3,583,352 UART: [art] Lock RT PCRs Done
3,585,048 UART: [art] Populate DV Done
3,593,279 UART: [fht] FMC Alias Private Key: 7
3,594,221 UART: [art] Derive CDI
3,594,501 UART: [art] Store in slot 0x4
3,680,244 UART: [art] Derive Key Pair
3,680,604 UART: [art] Store priv key in slot 0x5
3,693,126 UART: [art] Derive Key Pair - Done
3,707,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,723,357 UART: [art] Erasing AUTHORITY.KEYID = 7
3,724,122 UART: [art] PUB.X = 992E85F3C7DEE618CA1938BFA61C561EE4E6ED5250366F2D31FF0CBE5F06504C035971910710B63F1757D968705B0749
3,730,875 UART: [art] PUB.Y = F32351963BD480ACCB2874872D87D2D1BEA21426B83B0A8A32A27F0BAEBEFE18C815BC4D666F9C96546176C94BC2E655
3,737,829 UART: [art] SIG.R = 47B34285283204717BB8DE02CB1F2419F79A9E72E3812E188C776B2C17966F84CDA90FD364BE3D2B70478287EE677C26
3,744,586 UART: [art] SIG.S = D165C287D5C3F5B92A1E0D30F64E677F3BDF401C4DF58A0D19A608674F22E78107747161BC970318031B9B8F3E873649
3,768,932 UART: Caliptra RT
3,769,183 UART: [state] CFI Enabled
3,888,269 UART: [rt] RT listening for mailbox commands...
3,888,939 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,011,903 UART: [rt]cmd =0x41544d4e, len=14344
4,020,487 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,777 ready_for_fw is high
1,060,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,743 >>> mbox cmd response: success
3,289,308 UART:
3,289,324 UART: Running Caliptra FMC ...
3,289,732 UART:
3,289,786 UART: [state] CFI Enabled
3,299,932 UART: [fht] FMC Alias Private Key: 7
3,418,586 UART: [art] Extend RT PCRs Done
3,419,014 UART: [art] Lock RT PCRs Done
3,420,738 UART: [art] Populate DV Done
3,429,107 UART: [fht] FMC Alias Private Key: 7
3,430,241 UART: [art] Derive CDI
3,430,521 UART: [art] Store in slot 0x4
3,516,574 UART: [art] Derive Key Pair
3,516,934 UART: [art] Store priv key in slot 0x5
3,530,508 UART: [art] Derive Key Pair - Done
3,545,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,147 UART: [art] PUB.X = C43E2DB6D3CD8765D430C33E12FAC4A49B2C5220FE2475779EA0241E55C28CEDF776218C4EA1EE4384CCCF98A2DD388B
3,567,933 UART: [art] PUB.Y = 69935706AFAA8098FDCEB713E0F818E8A925783B9845D9E1624B9C576AE703EFA22EF4C421F44139178F3D5F006AD731
3,574,857 UART: [art] SIG.R = 7AC272F15A9F1F77E31ED5F742B814EAB3FBD9B73E716F0AC6E0A83F1276B8A76A8F32F75D7F51B0A03EFB2207D08523
3,581,635 UART: [art] SIG.S = 9AA8F6DDECA880C4D79100BD9128416069468809A9AC28E05A51E867979A2DC5C9B93D4720F6780E4455D26719AA50DE
3,605,479 UART: Caliptra RT
3,605,730 UART: [state] CFI Enabled
3,724,774 UART: [rt] RT listening for mailbox commands...
3,725,444 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,606 UART: [rt]cmd =0x41544d4e, len=14344
3,857,088 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,835 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,018 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
893,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,000 UART: [kat] ++
898,152 UART: [kat] sha1
902,348 UART: [kat] SHA2-256
904,288 UART: [kat] SHA2-384
906,957 UART: [kat] SHA2-512-ACC
908,858 UART: [kat] ECC-384
918,599 UART: [kat] HMAC-384Kdf
923,299 UART: [kat] LMS
1,171,627 UART: [kat] --
1,172,482 UART: [cold-reset] ++
1,172,830 UART: [fht] FHT @ 0x50003400
1,175,543 UART: [idev] ++
1,175,711 UART: [idev] CDI.KEYID = 6
1,176,071 UART: [idev] SUBJECT.KEYID = 7
1,176,495 UART: [idev] UDS.KEYID = 0
1,176,840 ready_for_fw is high
1,176,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,579 UART: [idev] Erasing UDS.KEYID = 0
1,201,544 UART: [idev] Sha1 KeyId Algorithm
1,209,886 UART: [idev] --
1,210,742 UART: [ldev] ++
1,210,910 UART: [ldev] CDI.KEYID = 6
1,211,273 UART: [ldev] SUBJECT.KEYID = 5
1,211,699 UART: [ldev] AUTHORITY.KEYID = 7
1,212,162 UART: [ldev] FE.KEYID = 1
1,217,316 UART: [ldev] Erasing FE.KEYID = 1
1,244,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,640 UART: [ldev] --
1,283,061 UART: [fwproc] Wait for Commands...
1,283,707 UART: [fwproc] Recv command 0x46574c44
1,284,435 UART: [fwproc] Recv'd Img size: 118548 bytes
3,180,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,208,932 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,240,102 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,380,293 >>> mbox cmd response: success
3,381,437 UART: [afmc] ++
3,381,605 UART: [afmc] CDI.KEYID = 6
3,381,967 UART: [afmc] SUBJECT.KEYID = 7
3,382,392 UART: [afmc] AUTHORITY.KEYID = 5
3,417,623 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,433,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,434,498 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,440,204 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,446,083 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,451,793 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,459,492 UART: [afmc] --
3,460,466 UART: [cold-reset] --
3,461,448 UART: [state] Locking Datavault
3,462,951 UART: [state] Locking PCR0, PCR1 and PCR31
3,463,555 UART: [state] Locking ICCM
3,464,125 UART: [exit] Launching FMC @ 0x40000130
3,469,455 UART:
3,469,471 UART: Running Caliptra FMC ...
3,469,879 UART:
3,470,022 UART: [state] CFI Enabled
3,480,702 UART: [fht] FMC Alias Private Key: 7
3,600,100 UART: [art] Extend RT PCRs Done
3,600,528 UART: [art] Lock RT PCRs Done
3,601,908 UART: [art] Populate DV Done
3,610,059 UART: [fht] FMC Alias Private Key: 7
3,611,187 UART: [art] Derive CDI
3,611,467 UART: [art] Store in slot 0x4
3,697,434 UART: [art] Derive Key Pair
3,697,794 UART: [art] Store priv key in slot 0x5
3,710,874 UART: [art] Derive Key Pair - Done
3,726,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,741,499 UART: [art] Erasing AUTHORITY.KEYID = 7
3,742,264 UART: [art] PUB.X = 2A32B36A447C471159A5132ECA622E6DDACA7F18BBE655B30D80460DABE1E0B513130ECEB27D2117DE6590BFCCAF12B0
3,749,043 UART: [art] PUB.Y = B0590277A14042A868F20273633E1CEABD01D6C94E92C266CB15DF235A0136B9BD735EB3FE63C301B07856D3A0030F1E
3,755,974 UART: [art] SIG.R = 5DF7E90BB5A5DAF72CAF0BBB39958FF892FE248ADE966FAE296C2CC4B68C8A8329D4122DC361C151EC63F3AD666AE2B2
3,762,762 UART: [art] SIG.S = A3542282A3A66864FC58FFBBABF9E4EEF23C3FEC44CC1684AB6572836B18D2383CD5294FD01D930F10FB4F73F7ED2DF1
3,786,539 UART: Caliptra RT
3,786,882 UART: [state] CFI Enabled
3,907,356 UART: [rt] RT listening for mailbox commands...
3,908,026 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,031,166 UART: [rt]cmd =0x41544d4e, len=14344
4,039,514 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,224 ready_for_fw is high
1,061,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,216,767 >>> mbox cmd response: success
3,279,454 UART:
3,279,470 UART: Running Caliptra FMC ...
3,279,878 UART:
3,280,021 UART: [state] CFI Enabled
3,290,681 UART: [fht] FMC Alias Private Key: 7
3,410,009 UART: [art] Extend RT PCRs Done
3,410,437 UART: [art] Lock RT PCRs Done
3,412,087 UART: [art] Populate DV Done
3,420,302 UART: [fht] FMC Alias Private Key: 7
3,421,272 UART: [art] Derive CDI
3,421,552 UART: [art] Store in slot 0x4
3,507,465 UART: [art] Derive Key Pair
3,507,825 UART: [art] Store priv key in slot 0x5
3,521,039 UART: [art] Derive Key Pair - Done
3,535,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,551,357 UART: [art] Erasing AUTHORITY.KEYID = 7
3,552,122 UART: [art] PUB.X = 03D74A1914852FCE999ACE5816F5CAC9A3E8153226FAFF06683B2E48DA3E2B5F81958F2B39FED25F7E762EA50945E3BE
3,558,895 UART: [art] PUB.Y = B7FBE4FF945FFB6FF42C28233AF8BAB6773181EDA6D88823E27A2C161CFCA8AB2D7B591490D92E3C5A9F6BEA9A4E8973
3,565,867 UART: [art] SIG.R = 666007AEF947407DDB82F0CE33F31FCA9369D32FC89F0DB753D2C492950D61B50F97A1DC9736FBE8E9F1A3D73E4A2AAC
3,572,641 UART: [art] SIG.S = A6640321D936B3694D66236D16D6D734A8EB843B5B694388D51C39BF7DB0E78F473561A2BCE599801BB98D4F72F45FC7
3,596,442 UART: Caliptra RT
3,596,785 UART: [state] CFI Enabled
3,717,545 UART: [rt] RT listening for mailbox commands...
3,718,215 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,469 UART: [rt]cmd =0x41544d4e, len=14344
3,849,831 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,288 UART:
192,629 UART: Running Caliptra ROM ...
193,821 UART:
193,975 UART: [state] CFI Enabled
263,305 UART: [state] LifecycleState = Unprovisioned
265,295 UART: [state] DebugLocked = No
267,472 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,633 UART: [kat] SHA2-256
442,332 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,795 UART: [kat] ++
453,326 UART: [kat] sha1
465,050 UART: [kat] SHA2-256
467,711 UART: [kat] SHA2-384
474,507 UART: [kat] SHA2-512-ACC
476,847 UART: [kat] ECC-384
2,769,664 UART: [kat] HMAC-384Kdf
2,800,052 UART: [kat] LMS
3,990,341 UART: [kat] --
3,993,708 UART: [cold-reset] ++
3,995,812 UART: [fht] Storing FHT @ 0x50003400
4,006,737 UART: [idev] ++
4,007,309 UART: [idev] CDI.KEYID = 6
4,008,314 UART: [idev] SUBJECT.KEYID = 7
4,009,519 UART: [idev] UDS.KEYID = 0
4,010,654 ready_for_fw is high
4,010,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,996 UART: [idev] Erasing UDS.KEYID = 0
7,346,800 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,518 UART: [idev] --
7,370,189 UART: [ldev] ++
7,370,828 UART: [ldev] CDI.KEYID = 6
7,371,748 UART: [ldev] SUBJECT.KEYID = 5
7,372,961 UART: [ldev] AUTHORITY.KEYID = 7
7,374,189 UART: [ldev] FE.KEYID = 1
7,401,365 UART: [ldev] Erasing FE.KEYID = 1
10,732,092 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,330 UART: [ldev] --
13,092,465 UART: [fwproc] Waiting for Commands...
13,094,669 UART: [fwproc] Received command 0x46574c44
13,096,858 UART: [fwproc] Received Image of size 118548 bytes
17,199,588 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,278,941 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,352,130 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,680,019 >>> mbox cmd response: success
17,684,814 UART: [afmc] ++
17,685,428 UART: [afmc] CDI.KEYID = 6
17,686,342 UART: [afmc] SUBJECT.KEYID = 7
17,687,563 UART: [afmc] AUTHORITY.KEYID = 5
21,049,081 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,350,309 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,352,568 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,367,060 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,381,745 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,396,178 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,418,321 UART: [afmc] --
23,422,242 UART: [cold-reset] --
23,427,508 UART: [state] Locking Datavault
23,433,349 UART: [state] Locking PCR0, PCR1 and PCR31
23,435,684 UART: [state] Locking ICCM
23,436,857 UART: [exit] Launching FMC @ 0x40000130
23,445,255 UART:
23,445,488 UART: Running Caliptra FMC ...
23,446,589 UART:
23,446,747 UART: [state] CFI Enabled
23,509,215 UART: [fht] FMC Alias Private Key: 7
25,870,805 UART: [art] Extend RT PCRs Done
25,872,028 UART: [art] Lock RT PCRs Done
25,873,570 UART: [art] Populate DV Done
25,878,931 UART: [fht] FMC Alias Private Key: 7
25,880,631 UART: [art] Derive CDI
25,881,445 UART: [art] Store in slot 0x4
25,939,192 UART: [art] Derive Key Pair
25,940,228 UART: [art] Store priv key in slot 0x5
29,233,861 UART: [art] Derive Key Pair - Done
29,246,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,938 UART: [art] Erasing AUTHORITY.KEYID = 7
31,536,447 UART: [art] PUB.X = 19006F2378048DCD932448D03EC40F46540F8412905F6258C24DC220E406129733699B0E0DD3B42C3C7F3B08571BFD64
31,543,658 UART: [art] PUB.Y = 2DFB57F35F7028D5C44D2F74DB402AEFCB205F539CD75C62F4B31EBF1F67AFC591AC0CD1CB64289D4F729B58D3677BB8
31,550,962 UART: [art] SIG.R = C30F30F5EED932F203163267C5593A24C49782DC53B9E105815DFF74D1A9BD8B86782CB153F639036FFC71D7359943D7
31,558,320 UART: [art] SIG.S = CDCC6606ECBF62E87B5FC51DB2D8DE32382A3217470A690297C731F83ED43FB03A7B8CEE0769834E7C2E3CD6D9C2D34A
32,863,524 UART: Caliptra RT
32,864,232 UART: [state] CFI Enabled
33,040,578 UART: [rt] RT listening for mailbox commands...
33,042,935 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,198,356 UART: [rt]cmd =0x41544d4e, len=14344
38,499,577 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,817,239 ready_for_fw is high
3,817,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,003,055 >>> mbox cmd response: success
23,681,127 UART:
23,681,529 UART: Running Caliptra FMC ...
23,682,682 UART:
23,682,844 UART: [state] CFI Enabled
23,732,889 UART: [fht] FMC Alias Private Key: 7
26,072,631 UART: [art] Extend RT PCRs Done
26,073,864 UART: [art] Lock RT PCRs Done
26,075,416 UART: [art] Populate DV Done
26,080,994 UART: [fht] FMC Alias Private Key: 7
26,082,533 UART: [art] Derive CDI
26,083,272 UART: [art] Store in slot 0x4
26,141,833 UART: [art] Derive Key Pair
26,142,882 UART: [art] Store priv key in slot 0x5
29,435,640 UART: [art] Derive Key Pair - Done
29,448,797 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,312 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,819 UART: [art] PUB.X = F574DDCE25E0E07DCF00B288B33514A0D9383E349ECFCFF49700E7C78678A39C148C89C5C5AFE20AA725CDE97187C929
31,746,078 UART: [art] PUB.Y = E610DF57F1A9DEE3904833149B8622723698DE931F63AA180F090A59C06E3427807C35665E29123B314C6A19160C8364
31,753,314 UART: [art] SIG.R = C5FFBEAC0F720DF00084B42099F17B4D5B64E73C40048DD13B92FFE2CA1EBA79557965D46CC511E316D85B3728155B8B
31,760,671 UART: [art] SIG.S = 1E0AF991042107FFDEB256C6ACE6F4090EE52146EF2A0AE93F25E5B32EAF5F093908377AF4269233201A177D6FF71A14
33,066,189 UART: Caliptra RT
33,066,908 UART: [state] CFI Enabled
33,244,840 UART: [rt] RT listening for mailbox commands...
33,247,238 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,402,690 UART: [rt]cmd =0x41544d4e, len=14344
38,703,882 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,557 UART:
192,917 UART: Running Caliptra ROM ...
194,104 UART:
603,771 UART: [state] CFI Enabled
617,010 UART: [state] LifecycleState = Unprovisioned
618,889 UART: [state] DebugLocked = No
620,340 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,825 UART: [kat] SHA2-256
795,552 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,136 UART: [kat] ++
806,764 UART: [kat] sha1
817,005 UART: [kat] SHA2-256
819,734 UART: [kat] SHA2-384
825,364 UART: [kat] SHA2-512-ACC
827,749 UART: [kat] ECC-384
3,110,987 UART: [kat] HMAC-384Kdf
3,123,287 UART: [kat] LMS
4,313,379 UART: [kat] --
4,316,958 UART: [cold-reset] ++
4,318,740 UART: [fht] Storing FHT @ 0x50003400
4,330,085 UART: [idev] ++
4,330,686 UART: [idev] CDI.KEYID = 6
4,331,570 UART: [idev] SUBJECT.KEYID = 7
4,332,807 UART: [idev] UDS.KEYID = 0
4,333,780 ready_for_fw is high
4,333,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,665 UART: [idev] Erasing UDS.KEYID = 0
7,623,090 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,947 UART: [idev] --
7,648,508 UART: [ldev] ++
7,649,154 UART: [ldev] CDI.KEYID = 6
7,650,062 UART: [ldev] SUBJECT.KEYID = 5
7,651,272 UART: [ldev] AUTHORITY.KEYID = 7
7,652,554 UART: [ldev] FE.KEYID = 1
7,663,024 UART: [ldev] Erasing FE.KEYID = 1
10,949,966 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,076 UART: [ldev] --
13,308,266 UART: [fwproc] Waiting for Commands...
13,310,838 UART: [fwproc] Received command 0x46574c44
13,313,016 UART: [fwproc] Received Image of size 118548 bytes
17,418,584 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,492,917 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,109 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,808 >>> mbox cmd response: success
17,897,597 UART: [afmc] ++
17,898,205 UART: [afmc] CDI.KEYID = 6
17,899,110 UART: [afmc] SUBJECT.KEYID = 7
17,900,375 UART: [afmc] AUTHORITY.KEYID = 5
21,217,341 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,512,663 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,514,971 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,529,395 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,544,109 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,558,485 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,342 UART: [afmc] --
23,583,553 UART: [cold-reset] --
23,587,249 UART: [state] Locking Datavault
23,591,625 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,337 UART: [state] Locking ICCM
23,596,079 UART: [exit] Launching FMC @ 0x40000130
23,604,473 UART:
23,604,703 UART: Running Caliptra FMC ...
23,605,796 UART:
23,605,950 UART: [state] CFI Enabled
23,614,270 UART: [fht] FMC Alias Private Key: 7
25,954,632 UART: [art] Extend RT PCRs Done
25,955,859 UART: [art] Lock RT PCRs Done
25,957,477 UART: [art] Populate DV Done
25,962,995 UART: [fht] FMC Alias Private Key: 7
25,964,482 UART: [art] Derive CDI
25,965,238 UART: [art] Store in slot 0x4
26,008,262 UART: [art] Derive Key Pair
26,009,299 UART: [art] Store priv key in slot 0x5
29,251,156 UART: [art] Derive Key Pair - Done
29,264,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,798 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,302 UART: [art] PUB.X = 0BE407B0BF087B4572EAEFD314471B7468BC824B316EC9221873520653E37E4D8AAA80CEC2F4867C6A32E47B848DEF15
31,553,546 UART: [art] PUB.Y = F1FB47477C651CFEB17C4E2B3EA6A2EA03CDE29A326751EF04E0FF043B5839CE1F5BAD66C2AF859953B5B10D0A60198B
31,560,838 UART: [art] SIG.R = 0666FE62ED2295638C552256E94097101B7A4FA30DA026FDAAC70C4ACFA27109575CDC0AD05B2308444988D1E657687D
31,568,185 UART: [art] SIG.S = 5B5119D092294E0F76BF407FC9A3FB719845975FE7DD9F65F33CB36210C8A5EBFA42627EAC039587F4A27C2BF466A666
32,873,252 UART: Caliptra RT
32,873,969 UART: [state] CFI Enabled
33,007,463 UART: [rt] RT listening for mailbox commands...
33,009,798 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,165,276 UART: [rt]cmd =0x41544d4e, len=14344
38,466,379 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
4,128,291 ready_for_fw is high
4,128,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,143,606 >>> mbox cmd response: success
23,788,363 UART:
23,789,172 UART: Running Caliptra FMC ...
23,790,286 UART:
23,790,439 UART: [state] CFI Enabled
23,797,868 UART: [fht] FMC Alias Private Key: 7
26,137,498 UART: [art] Extend RT PCRs Done
26,138,734 UART: [art] Lock RT PCRs Done
26,140,597 UART: [art] Populate DV Done
26,146,173 UART: [fht] FMC Alias Private Key: 7
26,147,824 UART: [art] Derive CDI
26,148,560 UART: [art] Store in slot 0x4
26,191,319 UART: [art] Derive Key Pair
26,192,357 UART: [art] Store priv key in slot 0x5
29,434,465 UART: [art] Derive Key Pair - Done
29,447,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,632 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,141 UART: [art] PUB.X = 9B8F3C6F34B15DEFD66FC1084857EA688203B9DB69AC285D7660BB89553DEDF9A6C7EDEED8D990AD2ABCED3EA5E303F7
31,736,435 UART: [art] PUB.Y = F3B298F0DA6DD635231343277CF6E7DB302E5AEF185CC9A8B5B4DB773D961646C6CD03FD1B0EFDEEF0A01AEF7E0BB855
31,743,757 UART: [art] SIG.R = 34750E66DB8D7E273D7F36C2596383962DCD905BC41A1A60E9B15B06B9867BF69E2AEB48C725BEB0199B2BBBA64AB71A
31,751,143 UART: [art] SIG.S = 2E791BACC28D3A25CE90F2A3E472AC7BBB68D8C2FA5E472D8CC1C78706293B4B3863F26C49B275052B07A9755F863836
33,056,209 UART: Caliptra RT
33,056,919 UART: [state] CFI Enabled
33,190,288 UART: [rt] RT listening for mailbox commands...
33,192,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,348,010 UART: [rt]cmd =0x41544d4e, len=14344
38,648,625 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,074 UART:
192,437 UART: Running Caliptra ROM ...
193,635 UART:
193,804 UART: [state] CFI Enabled
265,610 UART: [state] LifecycleState = Unprovisioned
267,505 UART: [state] DebugLocked = No
269,743 UART: [state] WD Timer not started. Device not locked for debugging
272,717 UART: [kat] SHA2-256
452,389 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,143 UART: [kat] ++
463,606 UART: [kat] sha1
473,818 UART: [kat] SHA2-256
476,516 UART: [kat] SHA2-384
481,583 UART: [kat] SHA2-512-ACC
483,956 UART: [kat] ECC-384
2,943,766 UART: [kat] HMAC-384Kdf
2,969,993 UART: [kat] LMS
3,446,536 UART: [kat] --
3,450,386 UART: [cold-reset] ++
3,452,522 UART: [fht] FHT @ 0x50003400
3,462,356 UART: [idev] ++
3,462,922 UART: [idev] CDI.KEYID = 6
3,463,872 UART: [idev] SUBJECT.KEYID = 7
3,465,108 UART: [idev] UDS.KEYID = 0
3,466,071 ready_for_fw is high
3,466,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,429 UART: [idev] Erasing UDS.KEYID = 0
5,985,904 UART: [idev] Sha1 KeyId Algorithm
6,009,518 UART: [idev] --
6,014,755 UART: [ldev] ++
6,015,321 UART: [ldev] CDI.KEYID = 6
6,016,230 UART: [ldev] SUBJECT.KEYID = 5
6,017,446 UART: [ldev] AUTHORITY.KEYID = 7
6,018,729 UART: [ldev] FE.KEYID = 1
6,056,757 UART: [ldev] Erasing FE.KEYID = 1
8,564,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,326,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,342,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,348 UART: [ldev] --
10,369,064 UART: [fwproc] Wait for Commands...
10,372,257 UART: [fwproc] Recv command 0x46574c44
10,374,290 UART: [fwproc] Recv'd Img size: 118548 bytes
13,851,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,930,790 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,003,851 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,331,268 >>> mbox cmd response: success
14,334,733 UART: [afmc] ++
14,335,319 UART: [afmc] CDI.KEYID = 6
14,336,257 UART: [afmc] SUBJECT.KEYID = 7
14,337,467 UART: [afmc] AUTHORITY.KEYID = 5
16,870,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,613,403 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,615,602 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,631,479 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,647,490 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,663,049 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,686,236 UART: [afmc] --
18,689,891 UART: [cold-reset] --
18,693,638 UART: [state] Locking Datavault
18,698,936 UART: [state] Locking PCR0, PCR1 and PCR31
18,700,634 UART: [state] Locking ICCM
18,702,893 UART: [exit] Launching FMC @ 0x40000130
18,711,298 UART:
18,711,548 UART: Running Caliptra FMC ...
18,712,645 UART:
18,712,800 UART: [state] CFI Enabled
18,772,023 UART: [fht] FMC Alias Private Key: 7
20,559,718 UART: [art] Extend RT PCRs Done
20,560,937 UART: [art] Lock RT PCRs Done
20,562,295 UART: [art] Populate DV Done
20,567,656 UART: [fht] FMC Alias Private Key: 7
20,569,241 UART: [art] Derive CDI
20,570,073 UART: [art] Store in slot 0x4
20,625,876 UART: [art] Derive Key Pair
20,626,922 UART: [art] Store priv key in slot 0x5
23,088,999 UART: [art] Derive Key Pair - Done
23,101,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,815,496 UART: [art] Erasing AUTHORITY.KEYID = 7
24,816,989 UART: [art] PUB.X = E5D81E9D86B445B5048BFEBEABD5A412D2F79FB2392DB2B0C5B8762AD00A7FD6981DE9F52D564065F1F759EF0DBB05A6
24,824,289 UART: [art] PUB.Y = E7FF6F238C4B9DA3B7521F3F56D48DF7F8DF154FFCF5CDEC566548583BB4922FC2667867D12652A8B841C56062C9858C
24,831,530 UART: [art] SIG.R = DE7F3F754C5C46543BE4AFB247075C86DE235C5531B76830BF00F58E7E994A6BA3B99450AA6E8DD456FE167667450519
24,838,920 UART: [art] SIG.S = D6E9428CCAD122992D994F53F6D99FC364FC3CAAFB66B228CF77EEC52AF390AAF4D89D3973EFD410838BC4C2D807D421
25,817,259 UART: Caliptra RT
25,817,964 UART: [state] CFI Enabled
25,999,356 UART: [rt] RT listening for mailbox commands...
26,001,671 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,156,925 UART: [rt]cmd =0x41544d4e, len=14344
30,152,885 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,462,388 ready_for_fw is high
3,462,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,231,012 >>> mbox cmd response: success
18,516,077 UART:
18,516,484 UART: Running Caliptra FMC ...
18,517,629 UART:
18,517,786 UART: [state] CFI Enabled
18,584,366 UART: [fht] FMC Alias Private Key: 7
20,350,699 UART: [art] Extend RT PCRs Done
20,351,899 UART: [art] Lock RT PCRs Done
20,353,574 UART: [art] Populate DV Done
20,359,092 UART: [fht] FMC Alias Private Key: 7
20,360,740 UART: [art] Derive CDI
20,361,552 UART: [art] Store in slot 0x4
20,417,019 UART: [art] Derive Key Pair
20,418,021 UART: [art] Store priv key in slot 0x5
22,880,805 UART: [art] Derive Key Pair - Done
22,893,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,014 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,515 UART: [art] PUB.X = 2AFB4B91A5833921FAEF4B4354A7B82D32F808ED24DE8A3C7ED8FCB39E8FB63518FF6EE456DC41CA4B035FF71B000C25
24,615,774 UART: [art] PUB.Y = 4663398D99077D834FD45C6DEF6DE86FD005BB10DD155DDE4BAB7D138377A66B513958A21F5EBB11583F039D1B1AC54E
24,623,018 UART: [art] SIG.R = 12376D71FF330CA659EC19A1224C6E968F5A5824D1E87274A0DFA3691D3C2AF86885E8A64787B75F75D227F30DC56E51
24,630,422 UART: [art] SIG.S = 4DE6C17CB4BE5BE40680BDFBD2081BE029D642BA8024A22D6065C9B5031B482849C75583BA1BAC9FE177230492484FCB
25,608,969 UART: Caliptra RT
25,609,677 UART: [state] CFI Enabled
25,790,999 UART: [rt] RT listening for mailbox commands...
25,793,312 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,948,591 UART: [rt]cmd =0x41544d4e, len=14344
29,944,239 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,989 writing to cptra_bootfsm_go
194,254 UART:
194,607 UART: Running Caliptra ROM ...
195,811 UART:
605,425 UART: [state] CFI Enabled
617,606 UART: [state] LifecycleState = Unprovisioned
619,564 UART: [state] DebugLocked = No
622,452 UART: [state] WD Timer not started. Device not locked for debugging
625,992 UART: [kat] SHA2-256
805,594 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,377 UART: [kat] ++
816,830 UART: [kat] sha1
828,128 UART: [kat] SHA2-256
830,864 UART: [kat] SHA2-384
836,786 UART: [kat] SHA2-512-ACC
839,157 UART: [kat] ECC-384
3,282,438 UART: [kat] HMAC-384Kdf
3,295,908 UART: [kat] LMS
3,772,399 UART: [kat] --
3,776,475 UART: [cold-reset] ++
3,778,904 UART: [fht] FHT @ 0x50003400
3,791,308 UART: [idev] ++
3,791,874 UART: [idev] CDI.KEYID = 6
3,792,802 UART: [idev] SUBJECT.KEYID = 7
3,794,052 UART: [idev] UDS.KEYID = 0
3,794,983 ready_for_fw is high
3,795,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,033 UART: [idev] Erasing UDS.KEYID = 0
6,277,964 UART: [idev] Sha1 KeyId Algorithm
6,301,400 UART: [idev] --
6,305,661 UART: [ldev] ++
6,306,233 UART: [ldev] CDI.KEYID = 6
6,307,147 UART: [ldev] SUBJECT.KEYID = 5
6,308,364 UART: [ldev] AUTHORITY.KEYID = 7
6,309,595 UART: [ldev] FE.KEYID = 1
6,321,648 UART: [ldev] Erasing FE.KEYID = 1
8,800,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,520,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,536,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,567,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,588,818 UART: [ldev] --
10,593,924 UART: [fwproc] Wait for Commands...
10,596,244 UART: [fwproc] Recv command 0x46574c44
10,598,233 UART: [fwproc] Recv'd Img size: 118548 bytes
14,090,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,403 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,247,450 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,576,075 >>> mbox cmd response: success
14,580,352 UART: [afmc] ++
14,580,973 UART: [afmc] CDI.KEYID = 6
14,581,890 UART: [afmc] SUBJECT.KEYID = 7
14,583,112 UART: [afmc] AUTHORITY.KEYID = 5
17,089,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,811,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,813,836 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,829,660 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,845,690 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,861,281 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,884,875 UART: [afmc] --
18,887,922 UART: [cold-reset] --
18,891,632 UART: [state] Locking Datavault
18,898,070 UART: [state] Locking PCR0, PCR1 and PCR31
18,899,839 UART: [state] Locking ICCM
18,901,725 UART: [exit] Launching FMC @ 0x40000130
18,910,122 UART:
18,910,357 UART: Running Caliptra FMC ...
18,911,463 UART:
18,911,623 UART: [state] CFI Enabled
18,919,561 UART: [fht] FMC Alias Private Key: 7
20,686,166 UART: [art] Extend RT PCRs Done
20,687,382 UART: [art] Lock RT PCRs Done
20,689,113 UART: [art] Populate DV Done
20,694,634 UART: [fht] FMC Alias Private Key: 7
20,696,175 UART: [art] Derive CDI
20,696,991 UART: [art] Store in slot 0x4
20,739,627 UART: [art] Derive Key Pair
20,740,680 UART: [art] Store priv key in slot 0x5
23,167,608 UART: [art] Derive Key Pair - Done
23,180,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,886,682 UART: [art] Erasing AUTHORITY.KEYID = 7
24,888,182 UART: [art] PUB.X = 2C97B60541A5FC0428B0BDD5192EDD258DB09560C86C4EA1564073639C351AAACF95DAC394534D6E1541B433CDE8D689
24,895,475 UART: [art] PUB.Y = 9B2A927BE36331810828A0FE276B8B815A5DE7202D39E928D0A5B1F6C7317D4897D08008C545D98BE83A0368563EF9CA
24,902,711 UART: [art] SIG.R = 360A4B8E25D332056C5DE1CD9588F3AEF31A359BA91399EE5D506B3C6FAAD197B3C60D107794B6ED601926EDCC5CAD1C
24,910,104 UART: [art] SIG.S = 41B371027475FDD5C103112649FD9291D1805CD5C48200D4B25665095C58D1AF0B1053D9F8050A1599A8FB4977D0C9FB
25,889,571 UART: Caliptra RT
25,890,286 UART: [state] CFI Enabled
26,022,723 UART: [rt] RT listening for mailbox commands...
26,025,049 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,180,258 UART: [rt]cmd =0x41544d4e, len=14344
30,175,722 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
3,773,541 ready_for_fw is high
3,773,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,441,654 >>> mbox cmd response: success
18,695,997 UART:
18,696,383 UART: Running Caliptra FMC ...
18,697,578 UART:
18,697,747 UART: [state] CFI Enabled
18,705,855 UART: [fht] FMC Alias Private Key: 7
20,471,629 UART: [art] Extend RT PCRs Done
20,472,823 UART: [art] Lock RT PCRs Done
20,474,340 UART: [art] Populate DV Done
20,479,803 UART: [fht] FMC Alias Private Key: 7
20,481,288 UART: [art] Derive CDI
20,482,073 UART: [art] Store in slot 0x4
20,524,412 UART: [art] Derive Key Pair
20,525,448 UART: [art] Store priv key in slot 0x5
22,952,481 UART: [art] Derive Key Pair - Done
22,965,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,092 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,596 UART: [art] PUB.X = 0B1A0671A9EC323D3682D853732D1F6E9E8216EC28873B05AA950C223E16440C2468E588D50B3B056535E8838D216570
24,680,800 UART: [art] PUB.Y = 7647D3C6FBCE582B62B42241545232A8E265CE634CD86DCD3B4C69D8134E45AD869259E9C88F75E01BC8BF7EEB9EA005
24,688,079 UART: [art] SIG.R = 88F44118675D21890CC7C672A38F8C399FD4414AEE55EB6434E69E39E776C8F70D60EBAEEF1B05EE937A5C72E7606CD9
24,695,503 UART: [art] SIG.S = 092B8B7CD1B33CBEAD558D1E8804AAD7C3A9289C22C014EF18E445FE423168EAF4920F8809096D67D40EB0BCE7995E0A
25,673,905 UART: Caliptra RT
25,674,609 UART: [state] CFI Enabled
25,808,142 UART: [rt] RT listening for mailbox commands...
25,810,452 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,965,938 UART: [rt]cmd =0x41544d4e, len=14344
29,961,468 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
191,958 UART:
192,325 UART: Running Caliptra ROM ...
193,509 UART:
193,684 UART: [state] CFI Enabled
263,886 UART: [state] LifecycleState = Unprovisioned
266,238 UART: [state] DebugLocked = No
268,261 UART: [state] WD Timer not started. Device not locked for debugging
272,289 UART: [kat] SHA2-256
462,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,926 UART: [kat] ++
473,375 UART: [kat] sha1
485,168 UART: [kat] SHA2-256
488,171 UART: [kat] SHA2-384
494,161 UART: [kat] SHA2-512-ACC
496,738 UART: [kat] ECC-384
2,947,679 UART: [kat] HMAC-384Kdf
2,971,709 UART: [kat] LMS
3,503,502 UART: [kat] --
3,507,235 UART: [cold-reset] ++
3,509,613 UART: [fht] FHT @ 0x50003400
3,521,227 UART: [idev] ++
3,521,927 UART: [idev] CDI.KEYID = 6
3,522,955 UART: [idev] SUBJECT.KEYID = 7
3,524,055 UART: [idev] UDS.KEYID = 0
3,524,980 ready_for_fw is high
3,525,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,329 UART: [idev] Erasing UDS.KEYID = 0
6,027,381 UART: [idev] Sha1 KeyId Algorithm
6,049,873 UART: [idev] --
6,054,742 UART: [ldev] ++
6,055,439 UART: [ldev] CDI.KEYID = 6
6,056,353 UART: [ldev] SUBJECT.KEYID = 5
6,057,508 UART: [ldev] AUTHORITY.KEYID = 7
6,058,740 UART: [ldev] FE.KEYID = 1
6,099,898 UART: [ldev] Erasing FE.KEYID = 1
8,608,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,332 UART: [ldev] --
10,415,865 UART: [fwproc] Wait for Commands...
10,418,601 UART: [fwproc] Recv command 0x46574c44
10,420,908 UART: [fwproc] Recv'd Img size: 118548 bytes
13,922,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,173 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,788 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,685,841 >>> mbox cmd response: success
14,689,237 UART: [afmc] ++
14,689,977 UART: [afmc] CDI.KEYID = 6
14,691,170 UART: [afmc] SUBJECT.KEYID = 7
14,692,625 UART: [afmc] AUTHORITY.KEYID = 5
17,235,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,545 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,658 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,810 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,715 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,392 UART: [afmc] --
19,034,460 UART: [cold-reset] --
19,038,599 UART: [state] Locking Datavault
19,042,023 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,172 UART: [state] Locking ICCM
19,046,813 UART: [exit] Launching FMC @ 0x40000130
19,055,442 UART:
19,055,677 UART: Running Caliptra FMC ...
19,056,778 UART:
19,056,955 UART: [state] CFI Enabled
19,117,745 UART: [fht] FMC Alias Private Key: 7
20,884,086 UART: [art] Extend RT PCRs Done
20,885,311 UART: [art] Lock RT PCRs Done
20,887,370 UART: [art] Populate DV Done
20,892,881 UART: [fht] FMC Alias Private Key: 7
20,894,573 UART: [art] Derive CDI
20,895,383 UART: [art] Store in slot 0x4
20,950,624 UART: [art] Derive Key Pair
20,951,672 UART: [art] Store priv key in slot 0x5
23,414,733 UART: [art] Derive Key Pair - Done
23,427,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,205 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,709 UART: [art] PUB.X = 88D4599732D3AAE389FF28E60BB13690E735D709E1BB32276E41E4F951B74DC941F1963445E42DD0B0BB1066A8084280
25,149,932 UART: [art] PUB.Y = C2975D7E259DB2C9EA3F041BBCCAA7137F03ED23D5D2BC228F12D518B58BEA68F440592645C0FB8A727317B84D12DA00
25,157,196 UART: [art] SIG.R = E45DA115EB0BE2E8885A0D55F6C0B28BAFF2A32A51BEF0584AE585D962C49BDEA182E85154089465D14B845770B6CF86
25,164,642 UART: [art] SIG.S = 87983D792028BCE132CA061A421C5F3BB7BDD63A15E8D697AD6EBDCAECB695694CEC12B8C8B4AA0E6D1B9DE80FEF0D7D
26,143,123 UART: Caliptra RT
26,143,823 UART: [state] CFI Enabled
26,326,052 UART: [rt] RT listening for mailbox commands...
26,328,396 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,483,990 UART: [rt]cmd =0x41544d4e, len=14344
30,479,303 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,439,288 ready_for_fw is high
3,439,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,640 >>> mbox cmd response: success
19,111,434 UART:
19,111,825 UART: Running Caliptra FMC ...
19,113,033 UART:
19,113,204 UART: [state] CFI Enabled
19,179,830 UART: [fht] FMC Alias Private Key: 7
20,945,806 UART: [art] Extend RT PCRs Done
20,947,251 UART: [art] Lock RT PCRs Done
20,948,481 UART: [art] Populate DV Done
20,953,952 UART: [fht] FMC Alias Private Key: 7
20,955,501 UART: [art] Derive CDI
20,956,322 UART: [art] Store in slot 0x4
21,012,327 UART: [art] Derive Key Pair
21,013,346 UART: [art] Store priv key in slot 0x5
23,475,726 UART: [art] Derive Key Pair - Done
23,488,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,049 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,562 UART: [art] PUB.X = 814FABDAC84CD94BF663ABBEFBA49E2401A183EA613251BEA0C050ABF62DB563A12D134C966B30D783C33567AAE2B52C
25,209,819 UART: [art] PUB.Y = 6E4186116E55BCC80B12ABF2D3A4E9808BD0CD85C1AF8789F7CD6F61B38CDBD9CB3E30FF32DB026FB4C522F5755BFD4D
25,217,126 UART: [art] SIG.R = 11F8B7C5FFB65783B1F62CDC566E6F520428E3116C415C9977E9CC69308364466D46529EC3E28B20C01F241477C578F7
25,224,492 UART: [art] SIG.S = 435C630A6D772A7A15ACCDEE96A4F570E8FDDAF3181D9A5A2B64F013A827835991F25ACDE66F914820FA0867F95810E8
26,204,032 UART: Caliptra RT
26,204,737 UART: [state] CFI Enabled
26,384,812 UART: [rt] RT listening for mailbox commands...
26,387,283 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,542,681 UART: [rt]cmd =0x41544d4e, len=14344
30,538,878 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,578 UART:
192,967 UART: Running Caliptra ROM ...
194,161 UART:
603,641 UART: [state] CFI Enabled
614,138 UART: [state] LifecycleState = Unprovisioned
616,523 UART: [state] DebugLocked = No
618,691 UART: [state] WD Timer not started. Device not locked for debugging
623,795 UART: [kat] SHA2-256
813,674 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,483 UART: [kat] ++
824,986 UART: [kat] sha1
836,817 UART: [kat] SHA2-256
839,799 UART: [kat] SHA2-384
845,303 UART: [kat] SHA2-512-ACC
847,889 UART: [kat] ECC-384
3,289,043 UART: [kat] HMAC-384Kdf
3,302,413 UART: [kat] LMS
3,834,194 UART: [kat] --
3,838,487 UART: [cold-reset] ++
3,840,630 UART: [fht] FHT @ 0x50003400
3,852,472 UART: [idev] ++
3,853,113 UART: [idev] CDI.KEYID = 6
3,854,147 UART: [idev] SUBJECT.KEYID = 7
3,855,325 UART: [idev] UDS.KEYID = 0
3,856,254 ready_for_fw is high
3,856,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,591 UART: [idev] Erasing UDS.KEYID = 0
6,330,534 UART: [idev] Sha1 KeyId Algorithm
6,352,786 UART: [idev] --
6,357,258 UART: [ldev] ++
6,357,979 UART: [ldev] CDI.KEYID = 6
6,358,898 UART: [ldev] SUBJECT.KEYID = 5
6,360,008 UART: [ldev] AUTHORITY.KEYID = 7
6,361,248 UART: [ldev] FE.KEYID = 1
6,372,704 UART: [ldev] Erasing FE.KEYID = 1
8,847,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,961 UART: [ldev] --
10,638,522 UART: [fwproc] Wait for Commands...
10,641,070 UART: [fwproc] Recv command 0x46574c44
10,643,386 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,958 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,567 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,603 >>> mbox cmd response: success
14,918,416 UART: [afmc] ++
14,919,142 UART: [afmc] CDI.KEYID = 6
14,920,343 UART: [afmc] SUBJECT.KEYID = 7
14,921,789 UART: [afmc] AUTHORITY.KEYID = 5
17,427,876 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,535 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,512 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,630 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,781 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,658 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,675 UART: [afmc] --
19,223,067 UART: [cold-reset] --
19,227,917 UART: [state] Locking Datavault
19,232,969 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,139 UART: [state] Locking ICCM
19,237,034 UART: [exit] Launching FMC @ 0x40000130
19,245,671 UART:
19,245,922 UART: Running Caliptra FMC ...
19,247,029 UART:
19,247,202 UART: [state] CFI Enabled
19,255,255 UART: [fht] FMC Alias Private Key: 7
21,021,437 UART: [art] Extend RT PCRs Done
21,022,650 UART: [art] Lock RT PCRs Done
21,024,448 UART: [art] Populate DV Done
21,029,758 UART: [fht] FMC Alias Private Key: 7
21,031,356 UART: [art] Derive CDI
21,032,198 UART: [art] Store in slot 0x4
21,074,371 UART: [art] Derive Key Pair
21,075,370 UART: [art] Store priv key in slot 0x5
23,502,086 UART: [art] Derive Key Pair - Done
23,515,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,386 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,887 UART: [art] PUB.X = 0B97512E23DE2D17BF569577190ABC68414CE49426283D266CA60B4AF78ED10AF0C53C0975D97BB08F1C2FA0D7D0D069
25,230,158 UART: [art] PUB.Y = 163B21846CF066B589D03B5E4804246AB0C4CC8D8C7AE60D7318C79E31A04B169AE4B1AE3694B3879BD8FA083E90E517
25,237,409 UART: [art] SIG.R = AA131593906D1AF061E24EBF3EC7AD0715DE328FC8361170AE8AA612E31F7AD76C03FFAC161D7B9C2D68A3A8F5F0E564
25,244,845 UART: [art] SIG.S = B6C5D113BB1E85BBB6662014E584FE853CD380FD96EC7EE6D24583D6415F26188EE86D785F3DD2A27FC67F3DEAF29F4B
26,224,911 UART: Caliptra RT
26,225,609 UART: [state] CFI Enabled
26,357,594 UART: [rt] RT listening for mailbox commands...
26,359,900 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,515,191 UART: [rt]cmd =0x41544d4e, len=14344
30,510,832 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,758,394 ready_for_fw is high
3,758,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,054,631 >>> mbox cmd response: success
19,313,330 UART:
19,313,736 UART: Running Caliptra FMC ...
19,315,054 UART:
19,315,237 UART: [state] CFI Enabled
19,323,450 UART: [fht] FMC Alias Private Key: 7
21,090,731 UART: [art] Extend RT PCRs Done
21,091,966 UART: [art] Lock RT PCRs Done
21,093,947 UART: [art] Populate DV Done
21,099,152 UART: [fht] FMC Alias Private Key: 7
21,100,703 UART: [art] Derive CDI
21,101,450 UART: [art] Store in slot 0x4
21,144,157 UART: [art] Derive Key Pair
21,145,181 UART: [art] Store priv key in slot 0x5
23,572,225 UART: [art] Derive Key Pair - Done
23,585,065 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,290,722 UART: [art] Erasing AUTHORITY.KEYID = 7
25,292,249 UART: [art] PUB.X = 19F4CAA2F0442A5D7AA72FB8DA0D4779DB9939AD1F42BB91E61E03F54F9037749683CDF5A5909D14959DB6CAAADE97B8
25,299,545 UART: [art] PUB.Y = 992FF882419F6A304833D4AB23EA8D4BE59E4A259775EEAEA4AA3F2C24E603DA0D8373C25DCC30011EF70C51016DEF86
25,306,802 UART: [art] SIG.R = B456FC5E26DC7C37A7C89C8D3824549415D8E8C5AE622A50E41AD1E1674459ACC301645507A3CFA73D6A40582E31ED0A
25,314,191 UART: [art] SIG.S = 23CEA91F50F48A2613F884B4871897193B379ABF9392B674A6BB6870C3A63465604F41BCE34858346CBD99DF65FD7483
26,293,222 UART: Caliptra RT
26,293,943 UART: [state] CFI Enabled
26,426,833 UART: [rt] RT listening for mailbox commands...
26,429,142 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,584,688 UART: [rt]cmd =0x41544d4e, len=14344
30,580,768 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,369 UART: [kat] SHA2-256
882,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,415 UART: [kat] ++
886,567 UART: [kat] sha1
890,965 UART: [kat] SHA2-256
892,903 UART: [kat] SHA2-384
895,630 UART: [kat] SHA2-512-ACC
897,531 UART: [kat] ECC-384
903,028 UART: [kat] HMAC-384Kdf
907,470 UART: [kat] LMS
1,475,666 UART: [kat] --
1,476,595 UART: [cold-reset] ++
1,476,941 UART: [fht] Storing FHT @ 0x50003400
1,479,836 UART: [idev] ++
1,480,004 UART: [idev] CDI.KEYID = 6
1,480,364 UART: [idev] SUBJECT.KEYID = 7
1,480,788 UART: [idev] UDS.KEYID = 0
1,481,133 ready_for_fw is high
1,481,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,592 UART: [idev] Erasing UDS.KEYID = 0
1,505,708 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,178 UART: [idev] --
1,515,137 UART: [ldev] ++
1,515,305 UART: [ldev] CDI.KEYID = 6
1,515,668 UART: [ldev] SUBJECT.KEYID = 5
1,516,094 UART: [ldev] AUTHORITY.KEYID = 7
1,516,557 UART: [ldev] FE.KEYID = 1
1,521,903 UART: [ldev] Erasing FE.KEYID = 1
1,546,788 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,878 UART: [ldev] --
1,586,369 UART: [fwproc] Waiting for Commands...
1,587,100 UART: [fwproc] Received command 0x46574c44
1,587,891 UART: [fwproc] Received Image of size 118548 bytes
2,932,897 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,575 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,793 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,002 >>> mbox cmd response: success
3,132,214 UART: [afmc] ++
3,132,382 UART: [afmc] CDI.KEYID = 6
3,132,744 UART: [afmc] SUBJECT.KEYID = 7
3,133,169 UART: [afmc] AUTHORITY.KEYID = 5
3,167,862 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,134 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,914 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,623 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,506 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,189 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,951 UART: [afmc] --
3,210,995 UART: [cold-reset] --
3,211,865 UART: [state] Locking Datavault
3,212,992 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,596 UART: [state] Locking ICCM
3,214,052 UART: [exit] Launching FMC @ 0x40000130
3,219,382 UART:
3,219,398 UART: Running Caliptra FMC ...
3,219,806 UART:
3,219,860 UART: [state] CFI Enabled
3,229,936 UART: [fht] FMC Alias Private Key: 7
3,348,504 UART: [art] Extend RT PCRs Done
3,348,932 UART: [art] Lock RT PCRs Done
3,350,224 UART: [art] Populate DV Done
3,358,301 UART: [fht] FMC Alias Private Key: 7
3,359,419 UART: [art] Derive CDI
3,359,699 UART: [art] Store in slot 0x4
3,445,141 UART: [art] Derive Key Pair
3,445,501 UART: [art] Store priv key in slot 0x5
3,458,792 UART: [art] Derive Key Pair - Done
3,473,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,854 UART: [art] PUB.X = 3F4F08D2B27343B84C0FD822507CDB36E77C160E7B95CC4F70AFCE9E5B534B3867E1CC2E40CB9CA023A86885AFDA0825
3,496,626 UART: [art] PUB.Y = F7F27C04C3C730644846ABB95BB6DAA37C822EEA4FD635F02D390C20E6DFCBF5E3D8A575CD27012947E46E1EF1E0FB1F
3,503,587 UART: [art] SIG.R = F4CD50BF7A228EB8334DFEC3FE86457D4C3CD6264495C0C3C38AFB32BBE5526DFC5942842872D99FA61EA0885107E452
3,510,364 UART: [art] SIG.S = 310BA774059427208402FC793FED2CAE7DF9C39362335AAB226A77B2D50E51FD7B98DAEA94345D69980897DAF911D612
3,533,683 UART: Caliptra RT
3,533,934 UART: [state] CFI Enabled
3,653,918 UART: [rt] RT listening for mailbox commands...
3,654,588 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,760 UART: [rt]cmd =0x41544d4e, len=14344
4,087,859 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,529 ready_for_fw is high
1,362,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,316 >>> mbox cmd response: success
3,042,763 UART:
3,042,779 UART: Running Caliptra FMC ...
3,043,187 UART:
3,043,241 UART: [state] CFI Enabled
3,053,913 UART: [fht] FMC Alias Private Key: 7
3,173,175 UART: [art] Extend RT PCRs Done
3,173,603 UART: [art] Lock RT PCRs Done
3,175,319 UART: [art] Populate DV Done
3,183,878 UART: [fht] FMC Alias Private Key: 7
3,184,938 UART: [art] Derive CDI
3,185,218 UART: [art] Store in slot 0x4
3,271,248 UART: [art] Derive Key Pair
3,271,608 UART: [art] Store priv key in slot 0x5
3,284,507 UART: [art] Derive Key Pair - Done
3,299,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,217 UART: [art] PUB.X = 68235210D7E4EFA7BD89822C0D2102B0A45C16FC109031D27D781B3E9EBB233966008096B078FDB8798BEEC87148CFA2
3,322,961 UART: [art] PUB.Y = 4F79AF24A5F4AE1C99EF097DEB1DA65C44E18EE04E796A5FCBB03FDEE57832E8EEBF869378685B8ED378C324B9AA00BB
3,329,910 UART: [art] SIG.R = 904D7DB53D54BB41C088A307A8CBC59D94BC87D7B281E99C78859901CB4BF719DC40DFAFB3B47D3DE40D207DA8E9489B
3,336,687 UART: [art] SIG.S = BE0EEDFA6186BC62DF0900B1A446C8DB487A9C90FCA0CFA4BC4106053306E846403F4CC53A7B88F83499CCE14F80D065
3,360,338 UART: Caliptra RT
3,360,589 UART: [state] CFI Enabled
3,481,294 UART: [rt] RT listening for mailbox commands...
3,481,964 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,382 UART: [rt]cmd =0x41544d4e, len=14344
3,915,447 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,202 UART: [kat] SHA2-256
882,133 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,248 UART: [kat] ++
886,400 UART: [kat] sha1
890,776 UART: [kat] SHA2-256
892,714 UART: [kat] SHA2-384
895,383 UART: [kat] SHA2-512-ACC
897,284 UART: [kat] ECC-384
903,061 UART: [kat] HMAC-384Kdf
907,761 UART: [kat] LMS
1,475,957 UART: [kat] --
1,476,800 UART: [cold-reset] ++
1,477,354 UART: [fht] Storing FHT @ 0x50003400
1,480,177 UART: [idev] ++
1,480,345 UART: [idev] CDI.KEYID = 6
1,480,705 UART: [idev] SUBJECT.KEYID = 7
1,481,129 UART: [idev] UDS.KEYID = 0
1,481,474 ready_for_fw is high
1,481,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,125 UART: [idev] Erasing UDS.KEYID = 0
1,505,529 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,035 UART: [idev] --
1,515,284 UART: [ldev] ++
1,515,452 UART: [ldev] CDI.KEYID = 6
1,515,815 UART: [ldev] SUBJECT.KEYID = 5
1,516,241 UART: [ldev] AUTHORITY.KEYID = 7
1,516,704 UART: [ldev] FE.KEYID = 1
1,521,786 UART: [ldev] Erasing FE.KEYID = 1
1,547,275 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,205 UART: [ldev] --
1,586,604 UART: [fwproc] Waiting for Commands...
1,587,471 UART: [fwproc] Received command 0x46574c44
1,588,262 UART: [fwproc] Received Image of size 118548 bytes
2,932,834 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,420 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,638 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,053 >>> mbox cmd response: success
3,133,209 UART: [afmc] ++
3,133,377 UART: [afmc] CDI.KEYID = 6
3,133,739 UART: [afmc] SUBJECT.KEYID = 7
3,134,164 UART: [afmc] AUTHORITY.KEYID = 5
3,169,381 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,549 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,329 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,038 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,921 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,604 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,334 UART: [afmc] --
3,212,356 UART: [cold-reset] --
3,213,530 UART: [state] Locking Datavault
3,214,685 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,289 UART: [state] Locking ICCM
3,215,953 UART: [exit] Launching FMC @ 0x40000130
3,221,283 UART:
3,221,299 UART: Running Caliptra FMC ...
3,221,707 UART:
3,221,850 UART: [state] CFI Enabled
3,232,582 UART: [fht] FMC Alias Private Key: 7
3,352,146 UART: [art] Extend RT PCRs Done
3,352,574 UART: [art] Lock RT PCRs Done
3,353,966 UART: [art] Populate DV Done
3,362,103 UART: [fht] FMC Alias Private Key: 7
3,363,143 UART: [art] Derive CDI
3,363,423 UART: [art] Store in slot 0x4
3,449,365 UART: [art] Derive Key Pair
3,449,725 UART: [art] Store priv key in slot 0x5
3,462,798 UART: [art] Derive Key Pair - Done
3,477,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,898 UART: [art] PUB.X = 2A7D83EF0EA7BFA4BC363AF450C3ABC928FF061BC7120377696FF6F0686F6FD6385725AC3A74650A3FC746EF2B113621
3,500,666 UART: [art] PUB.Y = 79FB0847F6629190AA1E191832FE29220FE70D2A271CAAA61C33E1A253754F33D6FD534F64A8E4CA1E5D14B13FEFD366
3,507,615 UART: [art] SIG.R = 8D118620EBEB4487A1C984B80C961FAA3C55ECB3E44F1591C14F4EC2814B33FBAEDC669D87687CA3122CAD3884FA7B1E
3,514,398 UART: [art] SIG.S = 4D9A6245CBA9E0B4A4C1B5796C060B669AC7C0135A20742E2BCD3BC1B5BC657E2C4EC81273102876BD64E16D77D326C2
3,538,446 UART: Caliptra RT
3,538,789 UART: [state] CFI Enabled
3,658,629 UART: [rt] RT listening for mailbox commands...
3,659,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,323 UART: [rt]cmd =0x41544d4e, len=14344
4,091,648 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,152 ready_for_fw is high
1,363,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,613 >>> mbox cmd response: success
3,041,518 UART:
3,041,534 UART: Running Caliptra FMC ...
3,041,942 UART:
3,042,085 UART: [state] CFI Enabled
3,052,463 UART: [fht] FMC Alias Private Key: 7
3,170,791 UART: [art] Extend RT PCRs Done
3,171,219 UART: [art] Lock RT PCRs Done
3,172,931 UART: [art] Populate DV Done
3,181,368 UART: [fht] FMC Alias Private Key: 7
3,182,320 UART: [art] Derive CDI
3,182,600 UART: [art] Store in slot 0x4
3,267,996 UART: [art] Derive Key Pair
3,268,356 UART: [art] Store priv key in slot 0x5
3,281,475 UART: [art] Derive Key Pair - Done
3,296,470 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,960 UART: [art] PUB.X = 37A4B403AF418B648C4B2A356DDF19C1D289EDF3E7D30077E9EFD58A0F4A175F7DBB3D15A6D2610702EB1B9FF4E80C73
3,319,709 UART: [art] PUB.Y = CCCA5908519ECE7A40BF5CBCC61AB2E2DF426485F45C4505B2702B4CE4053679BA06833191530F58723689D7C356A6AA
3,326,648 UART: [art] SIG.R = 5AF237E2DA2DADA8BF40778DF0DF130C692FF06117DFD1DFDE8C024500A286DA829BBF5DD791946576A3223812592112
3,333,398 UART: [art] SIG.S = A1EC79B4EDA70FBB69DF637591A5BB3F7A43F69FDF297EBA41DB3F0D6F103FCE70035A92F384590BFA144651EB119530
3,357,410 UART: Caliptra RT
3,357,753 UART: [state] CFI Enabled
3,478,889 UART: [rt] RT listening for mailbox commands...
3,479,559 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,649 UART: [rt]cmd =0x41544d4e, len=14344
3,912,952 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,280 UART: [kat] ++
895,432 UART: [kat] sha1
899,620 UART: [kat] SHA2-256
901,560 UART: [kat] SHA2-384
904,381 UART: [kat] SHA2-512-ACC
906,282 UART: [kat] ECC-384
916,059 UART: [kat] HMAC-384Kdf
920,573 UART: [kat] LMS
1,168,885 UART: [kat] --
1,169,760 UART: [cold-reset] ++
1,170,318 UART: [fht] FHT @ 0x50003400
1,173,174 UART: [idev] ++
1,173,342 UART: [idev] CDI.KEYID = 6
1,173,703 UART: [idev] SUBJECT.KEYID = 7
1,174,128 UART: [idev] UDS.KEYID = 0
1,174,474 ready_for_fw is high
1,174,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,599 UART: [idev] Erasing UDS.KEYID = 0
1,200,099 UART: [idev] Sha1 KeyId Algorithm
1,208,857 UART: [idev] --
1,209,950 UART: [ldev] ++
1,210,118 UART: [ldev] CDI.KEYID = 6
1,210,482 UART: [ldev] SUBJECT.KEYID = 5
1,210,909 UART: [ldev] AUTHORITY.KEYID = 7
1,211,372 UART: [ldev] FE.KEYID = 1
1,216,434 UART: [ldev] Erasing FE.KEYID = 1
1,242,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,652 UART: [ldev] --
1,281,865 UART: [fwproc] Wait for Commands...
1,282,558 UART: [fwproc] Recv command 0x46574c44
1,283,291 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,513 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,688 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,035 >>> mbox cmd response: success
2,828,263 UART: [afmc] ++
2,828,431 UART: [afmc] CDI.KEYID = 6
2,828,794 UART: [afmc] SUBJECT.KEYID = 7
2,829,220 UART: [afmc] AUTHORITY.KEYID = 5
2,864,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,324 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,073 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,783 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,664 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,365 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,300 UART: [afmc] --
2,908,183 UART: [cold-reset] --
2,909,157 UART: [state] Locking Datavault
2,910,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,814 UART: [state] Locking ICCM
2,911,296 UART: [exit] Launching FMC @ 0x40000130
2,916,626 UART:
2,916,642 UART: Running Caliptra FMC ...
2,917,050 UART:
2,917,104 UART: [state] CFI Enabled
2,927,432 UART: [fht] FMC Alias Private Key: 7
3,046,306 UART: [art] Extend RT PCRs Done
3,046,734 UART: [art] Lock RT PCRs Done
3,048,190 UART: [art] Populate DV Done
3,056,225 UART: [fht] FMC Alias Private Key: 7
3,057,401 UART: [art] Derive CDI
3,057,681 UART: [art] Store in slot 0x4
3,143,334 UART: [art] Derive Key Pair
3,143,694 UART: [art] Store priv key in slot 0x5
3,156,874 UART: [art] Derive Key Pair - Done
3,171,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,442 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,207 UART: [art] PUB.X = FC52D0ED9E5550195042F5694771165F39E51B6557A96E566979361D40352D3845874E69CEC4FD1399AE4E680F22CA00
3,194,942 UART: [art] PUB.Y = 28EC2E414CDFCC8203D11CBE22842ED7F6947B0B00F6AFA72E1F8B268BAE070A98AE1BD112BBDB4E1432530482A099D6
3,201,871 UART: [art] SIG.R = 023FBC01061C3FEA5C4FBBDD974B772EFDE9E9891A701C2466AB137A5259FC8AA170BB93022F72427A5E04A0E4CBD9D6
3,208,642 UART: [art] SIG.S = 70199DDE18987CFE4EC125E517D0215E2EAC03E8BF9BBBF3AC1AE5B323584F7A6E158F00080B0BA4C344B1231DEA855F
3,231,966 UART: Caliptra RT
3,232,217 UART: [state] CFI Enabled
3,352,165 UART: [rt] RT listening for mailbox commands...
3,352,835 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,543 UART: [rt]cmd =0x41544d4e, len=14344
3,785,712 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,834 ready_for_fw is high
1,059,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,610 >>> mbox cmd response: success
2,741,909 UART:
2,741,925 UART: Running Caliptra FMC ...
2,742,333 UART:
2,742,387 UART: [state] CFI Enabled
2,752,875 UART: [fht] FMC Alias Private Key: 7
2,871,949 UART: [art] Extend RT PCRs Done
2,872,377 UART: [art] Lock RT PCRs Done
2,874,123 UART: [art] Populate DV Done
2,882,276 UART: [fht] FMC Alias Private Key: 7
2,883,306 UART: [art] Derive CDI
2,883,586 UART: [art] Store in slot 0x4
2,968,961 UART: [art] Derive Key Pair
2,969,321 UART: [art] Store priv key in slot 0x5
2,981,985 UART: [art] Derive Key Pair - Done
2,996,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,659 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,424 UART: [art] PUB.X = 154B14CA4E33F77368A822CAA12539A6AF1FAEB0956AB0825CB616D3582C48AE0D742103E889D500BAD6308349065415
3,019,161 UART: [art] PUB.Y = 35466D35EEC0551F5CD76DFB4C581A5216C41CE97F02FAB1319DE7FFA458A7E131CDC4163F483DEC93413275650E6686
3,026,111 UART: [art] SIG.R = FD305C30A533F9BF18F994B0BBE45142261790F0EC16DD8D07E7635CA54DBC340E0FC29A3AAC244ADC121BCF3A18C9E4
3,032,890 UART: [art] SIG.S = 587F592D103ED1726CDF02F7BA4B0530ED3F5686FF6063C764613EA23653A2B89B3EAF0159AD865F93C920C1EA13EF9B
3,056,855 UART: Caliptra RT
3,057,106 UART: [state] CFI Enabled
3,176,543 UART: [rt] RT listening for mailbox commands...
3,177,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,497 UART: [rt]cmd =0x41544d4e, len=14344
3,610,680 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
891,541 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,645 UART: [kat] ++
895,797 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,412 UART: [kat] SHA2-512-ACC
906,313 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,900 UART: [kat] LMS
1,169,212 UART: [kat] --
1,170,427 UART: [cold-reset] ++
1,170,769 UART: [fht] FHT @ 0x50003400
1,173,351 UART: [idev] ++
1,173,519 UART: [idev] CDI.KEYID = 6
1,173,880 UART: [idev] SUBJECT.KEYID = 7
1,174,305 UART: [idev] UDS.KEYID = 0
1,174,651 ready_for_fw is high
1,174,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,788 UART: [idev] Erasing UDS.KEYID = 0
1,199,132 UART: [idev] Sha1 KeyId Algorithm
1,208,064 UART: [idev] --
1,209,213 UART: [ldev] ++
1,209,381 UART: [ldev] CDI.KEYID = 6
1,209,745 UART: [ldev] SUBJECT.KEYID = 5
1,210,172 UART: [ldev] AUTHORITY.KEYID = 7
1,210,635 UART: [ldev] FE.KEYID = 1
1,216,021 UART: [ldev] Erasing FE.KEYID = 1
1,242,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,543 UART: [ldev] --
1,281,762 UART: [fwproc] Wait for Commands...
1,282,355 UART: [fwproc] Recv command 0x46574c44
1,283,088 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,878 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,053 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,238 >>> mbox cmd response: success
2,827,404 UART: [afmc] ++
2,827,572 UART: [afmc] CDI.KEYID = 6
2,827,935 UART: [afmc] SUBJECT.KEYID = 7
2,828,361 UART: [afmc] AUTHORITY.KEYID = 5
2,864,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,603 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,352 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,062 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,943 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,644 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,591 UART: [afmc] --
2,907,652 UART: [cold-reset] --
2,908,598 UART: [state] Locking Datavault
2,909,675 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,279 UART: [state] Locking ICCM
2,910,933 UART: [exit] Launching FMC @ 0x40000130
2,916,263 UART:
2,916,279 UART: Running Caliptra FMC ...
2,916,687 UART:
2,916,830 UART: [state] CFI Enabled
2,927,278 UART: [fht] FMC Alias Private Key: 7
3,046,400 UART: [art] Extend RT PCRs Done
3,046,828 UART: [art] Lock RT PCRs Done
3,048,468 UART: [art] Populate DV Done
3,056,741 UART: [fht] FMC Alias Private Key: 7
3,057,707 UART: [art] Derive CDI
3,057,987 UART: [art] Store in slot 0x4
3,143,854 UART: [art] Derive Key Pair
3,144,214 UART: [art] Store priv key in slot 0x5
3,157,746 UART: [art] Derive Key Pair - Done
3,172,216 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,710 UART: [art] PUB.X = 3F33A791C041577CA478C8F02325499BF01006D858EF96E2592480F8D4704D7AD2399A7709732191BA34349B10A5DF9D
3,195,464 UART: [art] PUB.Y = 00F11694D41A4B6F2DBDC711A66D76C15CDA646BF5D8F6F2DC2F0770EF929CD016D90EDA1CB2363208447FA03B4E7D52
3,202,397 UART: [art] SIG.R = ED36B1AE9DD9BC73666E4D68613DF0D1A5AA877C13FFC3531D210DDDD4403AC1EF6A41EA4D07356693EBC1D30014C8D4
3,209,157 UART: [art] SIG.S = 35E8B864DFD2A6FB71940B5CDC68206070F3FA0D03FE0CA734E5D916EE80FA06C535AB63774B87626FD3807ADA7B1AF8
3,233,158 UART: Caliptra RT
3,233,501 UART: [state] CFI Enabled
3,352,510 UART: [rt] RT listening for mailbox commands...
3,353,180 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,378 UART: [rt]cmd =0x41544d4e, len=14344
3,786,839 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,169 ready_for_fw is high
1,059,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,407 >>> mbox cmd response: success
2,742,334 UART:
2,742,350 UART: Running Caliptra FMC ...
2,742,758 UART:
2,742,901 UART: [state] CFI Enabled
2,753,501 UART: [fht] FMC Alias Private Key: 7
2,872,823 UART: [art] Extend RT PCRs Done
2,873,251 UART: [art] Lock RT PCRs Done
2,874,557 UART: [art] Populate DV Done
2,883,038 UART: [fht] FMC Alias Private Key: 7
2,883,968 UART: [art] Derive CDI
2,884,248 UART: [art] Store in slot 0x4
2,970,289 UART: [art] Derive Key Pair
2,970,649 UART: [art] Store priv key in slot 0x5
2,984,297 UART: [art] Derive Key Pair - Done
2,999,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,456 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,221 UART: [art] PUB.X = DA29ECC28291FACBEE8505D112C4C8EA51907296220D8294462AE69E1AC72CFF9F620C954BD50F81251968C1604B4EDC
3,021,987 UART: [art] PUB.Y = 2C7B11EDFA805C5DEFEEA699DC070388E9570CBDEF22A2C6CC66C9D5EAED2B25D0AE618E034A9DDAC6F2B5F90DEB58CF
3,028,958 UART: [art] SIG.R = 36925F8A0736FDC531A92A5272D413CD63E32B5C9769555C66B79F1B234A530F0BCAEB9084522A759086736C44248396
3,035,709 UART: [art] SIG.S = A8C1C3BA8A0702DA93BFAF3F3BEC65F3232E90C5D4EF0181CD31AB5F37E1EF1E227B883CF0B5188A69B6597DF8CE2DAB
3,059,798 UART: Caliptra RT
3,060,141 UART: [state] CFI Enabled
3,180,582 UART: [rt] RT listening for mailbox commands...
3,181,252 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,164 UART: [rt]cmd =0x41544d4e, len=14344
3,614,153 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
893,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,641 UART: [kat] ++
897,793 UART: [kat] sha1
902,083 UART: [kat] SHA2-256
904,023 UART: [kat] SHA2-384
906,658 UART: [kat] SHA2-512-ACC
908,559 UART: [kat] ECC-384
918,094 UART: [kat] HMAC-384Kdf
922,816 UART: [kat] LMS
1,171,144 UART: [kat] --
1,172,031 UART: [cold-reset] ++
1,172,469 UART: [fht] FHT @ 0x50003400
1,175,206 UART: [idev] ++
1,175,374 UART: [idev] CDI.KEYID = 6
1,175,734 UART: [idev] SUBJECT.KEYID = 7
1,176,158 UART: [idev] UDS.KEYID = 0
1,176,503 ready_for_fw is high
1,176,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,830 UART: [idev] Erasing UDS.KEYID = 0
1,200,511 UART: [idev] Sha1 KeyId Algorithm
1,209,075 UART: [idev] --
1,210,155 UART: [ldev] ++
1,210,323 UART: [ldev] CDI.KEYID = 6
1,210,686 UART: [ldev] SUBJECT.KEYID = 5
1,211,112 UART: [ldev] AUTHORITY.KEYID = 7
1,211,575 UART: [ldev] FE.KEYID = 1
1,216,749 UART: [ldev] Erasing FE.KEYID = 1
1,242,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,543 UART: [ldev] --
1,281,916 UART: [fwproc] Wait for Commands...
1,282,522 UART: [fwproc] Recv command 0x46574c44
1,283,250 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,826 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,996 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,385 >>> mbox cmd response: success
2,826,585 UART: [afmc] ++
2,826,753 UART: [afmc] CDI.KEYID = 6
2,827,115 UART: [afmc] SUBJECT.KEYID = 7
2,827,540 UART: [afmc] AUTHORITY.KEYID = 5
2,863,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,066 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,775 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,658 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,359 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,255 UART: [afmc] --
2,907,341 UART: [cold-reset] --
2,908,387 UART: [state] Locking Datavault
2,909,600 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,204 UART: [state] Locking ICCM
2,910,872 UART: [exit] Launching FMC @ 0x40000130
2,916,202 UART:
2,916,218 UART: Running Caliptra FMC ...
2,916,626 UART:
2,916,680 UART: [state] CFI Enabled
2,927,250 UART: [fht] FMC Alias Private Key: 7
3,046,062 UART: [art] Extend RT PCRs Done
3,046,490 UART: [art] Lock RT PCRs Done
3,048,362 UART: [art] Populate DV Done
3,056,883 UART: [fht] FMC Alias Private Key: 7
3,057,895 UART: [art] Derive CDI
3,058,175 UART: [art] Store in slot 0x4
3,143,990 UART: [art] Derive Key Pair
3,144,350 UART: [art] Store priv key in slot 0x5
3,157,534 UART: [art] Derive Key Pair - Done
3,172,383 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,737 UART: [art] PUB.X = 0C45D24006ABD0AD8C2D1F0E6A788BAC0C30F16BED6E880D6FCF5F92166492A0DA73D639FF8EB7352CECB48F050EFF6B
3,195,510 UART: [art] PUB.Y = E50701B2143DDE86460D54B007B20780227AA4F9B4BC8E3C1F5740AD997F955EB365DC7DA9F23AF03BA4FBB38820B127
3,202,453 UART: [art] SIG.R = 6BCF473FF48AF8F86DB2C4009DB0080A445049971440710F660F3F7B9A1F898A1A37C9F67FDC7676652C227D255CC5C7
3,209,191 UART: [art] SIG.S = 3EAA3A3459E8A1A1C3BC071B1F5BA9DE4C00740F21F5CAFFA8DFF3D242995F2FA0551BD3CF7A1992356A6DF62EDCAE5C
3,233,417 UART: Caliptra RT
3,233,668 UART: [state] CFI Enabled
3,354,136 UART: [rt] RT listening for mailbox commands...
3,354,806 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,746 UART: [rt]cmd =0x41544d4e, len=14344
3,787,717 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,469 ready_for_fw is high
1,060,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,478 >>> mbox cmd response: success
2,740,419 UART:
2,740,435 UART: Running Caliptra FMC ...
2,740,843 UART:
2,740,897 UART: [state] CFI Enabled
2,750,991 UART: [fht] FMC Alias Private Key: 7
2,869,819 UART: [art] Extend RT PCRs Done
2,870,247 UART: [art] Lock RT PCRs Done
2,871,863 UART: [art] Populate DV Done
2,880,288 UART: [fht] FMC Alias Private Key: 7
2,881,218 UART: [art] Derive CDI
2,881,498 UART: [art] Store in slot 0x4
2,966,969 UART: [art] Derive Key Pair
2,967,329 UART: [art] Store priv key in slot 0x5
2,980,487 UART: [art] Derive Key Pair - Done
2,995,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,008 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,773 UART: [art] PUB.X = 651AE67967F055C238F65BFD77A3D3CE75384229CAF4D3940C892B2A15DC13364F3637514E6724917221632A44F760EF
3,018,532 UART: [art] PUB.Y = B302E3661B3BDDE099F3BF3F6E35AABB6CAE458C713B777EF0F56A3BD802F3B1F3FA8228C4BC1C01CE2022941A74596C
3,025,491 UART: [art] SIG.R = 94A3EB5DED83F62C4781CD51838474FCFFA8AB436D783B4F06F9A808068CC11F2D368E09FDDCB8BC16CA15A9B8C6A7ED
3,032,271 UART: [art] SIG.S = A520788521A9BE200550DC863BFC33086AA0541D020484D02AD209215D4A4AA21BFE6EE83EA6F26174B7FFCA3C41EE96
3,056,234 UART: Caliptra RT
3,056,485 UART: [state] CFI Enabled
3,176,127 UART: [rt] RT listening for mailbox commands...
3,176,797 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,959 UART: [rt]cmd =0x41544d4e, len=14344
3,610,316 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,915 UART: [state] LifecycleState = Unprovisioned
85,570 UART: [state] DebugLocked = No
86,220 UART: [state] WD Timer not started. Device not locked for debugging
87,481 UART: [kat] SHA2-256
893,131 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,256 UART: [kat] ++
897,408 UART: [kat] sha1
901,430 UART: [kat] SHA2-256
903,370 UART: [kat] SHA2-384
906,197 UART: [kat] SHA2-512-ACC
908,098 UART: [kat] ECC-384
918,007 UART: [kat] HMAC-384Kdf
922,475 UART: [kat] LMS
1,170,803 UART: [kat] --
1,171,692 UART: [cold-reset] ++
1,172,034 UART: [fht] FHT @ 0x50003400
1,174,767 UART: [idev] ++
1,174,935 UART: [idev] CDI.KEYID = 6
1,175,295 UART: [idev] SUBJECT.KEYID = 7
1,175,719 UART: [idev] UDS.KEYID = 0
1,176,064 ready_for_fw is high
1,176,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,897 UART: [idev] Erasing UDS.KEYID = 0
1,200,822 UART: [idev] Sha1 KeyId Algorithm
1,209,158 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,795 UART: [ldev] SUBJECT.KEYID = 5
1,211,221 UART: [ldev] AUTHORITY.KEYID = 7
1,211,684 UART: [ldev] FE.KEYID = 1
1,216,814 UART: [ldev] Erasing FE.KEYID = 1
1,243,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,686 UART: [ldev] --
1,282,991 UART: [fwproc] Wait for Commands...
1,283,811 UART: [fwproc] Recv command 0x46574c44
1,284,539 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,455 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,625 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,840 >>> mbox cmd response: success
2,828,848 UART: [afmc] ++
2,829,016 UART: [afmc] CDI.KEYID = 6
2,829,378 UART: [afmc] SUBJECT.KEYID = 7
2,829,803 UART: [afmc] AUTHORITY.KEYID = 5
2,865,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,065 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,813 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,522 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,405 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,106 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,002 UART: [afmc] --
2,909,112 UART: [cold-reset] --
2,910,130 UART: [state] Locking Datavault
2,911,117 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,721 UART: [state] Locking ICCM
2,912,265 UART: [exit] Launching FMC @ 0x40000130
2,917,595 UART:
2,917,611 UART: Running Caliptra FMC ...
2,918,019 UART:
2,918,162 UART: [state] CFI Enabled
2,928,664 UART: [fht] FMC Alias Private Key: 7
3,047,478 UART: [art] Extend RT PCRs Done
3,047,906 UART: [art] Lock RT PCRs Done
3,049,460 UART: [art] Populate DV Done
3,057,573 UART: [fht] FMC Alias Private Key: 7
3,058,663 UART: [art] Derive CDI
3,058,943 UART: [art] Store in slot 0x4
3,144,954 UART: [art] Derive Key Pair
3,145,314 UART: [art] Store priv key in slot 0x5
3,158,458 UART: [art] Derive Key Pair - Done
3,173,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,513 UART: [art] PUB.X = 3CC42B78931E27BC87B4BF4F23844ECA544751F5123DE411DCC84EF5C8849001FD3115803D3E3621A337F24E1E74350F
3,196,277 UART: [art] PUB.Y = A5F2BC278B77A8F8689A094EA035EBA3AB5CFD1B787304B96FEA971882A28340B4C6F56924405F5CDC6C7D5002E4C64D
3,203,228 UART: [art] SIG.R = 53DC4EA8F87F1B2B12BBAD4C791689CC2920135BD8B067AF01C4F695F4A134C47E9423E01B29F7CFC4FE42CFEC201E66
3,210,011 UART: [art] SIG.S = 57A5C229785EBB02A6505DE4CB0A5CC183E48C45B8FA4B1737D4C022DAAA644402C9B96466BFB9766B7D3280A6F43E89
3,234,058 UART: Caliptra RT
3,234,401 UART: [state] CFI Enabled
3,354,709 UART: [rt] RT listening for mailbox commands...
3,355,379 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,429 UART: [rt]cmd =0x41544d4e, len=14344
3,788,602 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,956 ready_for_fw is high
1,060,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,955 >>> mbox cmd response: success
2,744,684 UART:
2,744,700 UART: Running Caliptra FMC ...
2,745,108 UART:
2,745,251 UART: [state] CFI Enabled
2,755,635 UART: [fht] FMC Alias Private Key: 7
2,875,125 UART: [art] Extend RT PCRs Done
2,875,553 UART: [art] Lock RT PCRs Done
2,877,261 UART: [art] Populate DV Done
2,885,548 UART: [fht] FMC Alias Private Key: 7
2,886,578 UART: [art] Derive CDI
2,886,858 UART: [art] Store in slot 0x4
2,972,723 UART: [art] Derive Key Pair
2,973,083 UART: [art] Store priv key in slot 0x5
2,986,437 UART: [art] Derive Key Pair - Done
3,001,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,094 UART: [art] PUB.X = AEDAC71DE714747AB28AAB322FDE0B9083172433AEE21D1948A43DB52F80E73FF4FF4EB5BFF05391C26B07742C7A1D66
3,023,874 UART: [art] PUB.Y = 5B59E998B5E95B1C4224FBEBBD20473FC12183AA3A7551C38B8DEDAFC17476A122293790825FBD9350A287A5E74D0E44
3,030,827 UART: [art] SIG.R = E04F0391D8A2EDD4660F37A5FE2B12A854E6EBEA0A7695B18259BF6AD037AD38733ABF32048D43982BB47F99762418EE
3,037,593 UART: [art] SIG.S = D2816E83B153444392C6AA1251BCA5326E64D4BD40F93C957893F83E6DC928F4D80D5C266558AB4FABCFB2CAEAC23ABE
3,061,866 UART: Caliptra RT
3,062,209 UART: [state] CFI Enabled
3,182,577 UART: [rt] RT listening for mailbox commands...
3,183,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,295 UART: [rt]cmd =0x41544d4e, len=14344
3,616,102 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,252 UART:
192,603 UART: Running Caliptra ROM ...
193,710 UART:
193,856 UART: [state] CFI Enabled
264,239 UART: [state] LifecycleState = Unprovisioned
266,246 UART: [state] DebugLocked = No
269,121 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,924 UART: [kat] SHA2-256
443,632 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,087 UART: [kat] ++
454,610 UART: [kat] sha1
465,718 UART: [kat] SHA2-256
468,350 UART: [kat] SHA2-384
474,562 UART: [kat] SHA2-512-ACC
476,930 UART: [kat] ECC-384
2,766,783 UART: [kat] HMAC-384Kdf
2,796,679 UART: [kat] LMS
3,986,973 UART: [kat] --
3,990,132 UART: [cold-reset] ++
3,992,348 UART: [fht] Storing FHT @ 0x50003400
4,003,756 UART: [idev] ++
4,004,326 UART: [idev] CDI.KEYID = 6
4,005,254 UART: [idev] SUBJECT.KEYID = 7
4,006,507 UART: [idev] UDS.KEYID = 0
4,007,543 ready_for_fw is high
4,007,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,156,836 UART: [idev] Erasing UDS.KEYID = 0
7,344,082 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,059 UART: [idev] --
7,370,431 UART: [ldev] ++
7,371,013 UART: [ldev] CDI.KEYID = 6
7,371,988 UART: [ldev] SUBJECT.KEYID = 5
7,373,222 UART: [ldev] AUTHORITY.KEYID = 7
7,374,454 UART: [ldev] FE.KEYID = 1
7,419,547 UART: [ldev] Erasing FE.KEYID = 1
10,751,221 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,077 UART: [ldev] --
13,111,388 UART: [fwproc] Waiting for Commands...
13,113,484 UART: [fwproc] Received command 0x46574c44
13,115,665 UART: [fwproc] Received Image of size 118548 bytes
22,121,063 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,202,933 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,276,115 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,604,087 >>> mbox cmd response: success
22,608,378 UART: [afmc] ++
22,608,996 UART: [afmc] CDI.KEYID = 6
22,609,913 UART: [afmc] SUBJECT.KEYID = 7
22,611,191 UART: [afmc] AUTHORITY.KEYID = 5
25,976,714 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,276,712 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,278,976 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,293,478 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,308,274 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,322,661 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,343,944 UART: [afmc] --
28,348,624 UART: [cold-reset] --
28,351,676 UART: [state] Locking Datavault
28,355,905 UART: [state] Locking PCR0, PCR1 and PCR31
28,357,661 UART: [state] Locking ICCM
28,358,736 UART: [exit] Launching FMC @ 0x40000130
28,367,160 UART:
28,367,401 UART: Running Caliptra FMC ...
28,368,504 UART:
28,368,665 UART: [state] CFI Enabled
28,435,691 UART: [fht] FMC Alias Private Key: 7
30,776,219 UART: [art] Extend RT PCRs Done
30,777,463 UART: [art] Lock RT PCRs Done
30,779,096 UART: [art] Populate DV Done
30,784,514 UART: [fht] FMC Alias Private Key: 7
30,785,998 UART: [art] Derive CDI
30,786,930 UART: [art] Store in slot 0x4
30,836,140 UART: [art] Derive Key Pair
30,837,142 UART: [art] Store priv key in slot 0x5
34,130,857 UART: [art] Derive Key Pair - Done
34,143,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,432,302 UART: [art] Erasing AUTHORITY.KEYID = 7
36,433,822 UART: [art] PUB.X = 3CC65B0C5EBFF957411C6EEAD8B005EC4726BFFE15626256F5BD4A1A5D65F739BAF28FD40D51DF99F6D1938DCA764108
36,441,098 UART: [art] PUB.Y = 504E79D546509531D62C06FD7FAB8871A9440B23FD592267275CB819889313A51FD3FB45F72D6FFFE1DBECB210E8E6B4
36,448,347 UART: [art] SIG.R = B2C2CD42266F41828ECBB934357C80C43933B5B9B284458E5FAF9FBFDD58CCFC4BA420E90520388FCB7AC54DCB802AC8
36,455,759 UART: [art] SIG.S = A6F00ECB49DE848922ADC4DCC3F7C32AE0F63632046C164374CF04F7602986284A108F87A307B1C79686CB93050CB881
37,760,543 UART: Caliptra RT
37,761,254 UART: [state] CFI Enabled
37,949,722 UART: [rt] RT listening for mailbox commands...
37,952,032 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,107,283 UART: [rt]cmd =0x41544d4e, len=14344
42,257,999 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
3,803,113 ready_for_fw is high
3,803,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,227,195 >>> mbox cmd response: success
27,911,324 UART:
27,911,728 UART: Running Caliptra FMC ...
27,913,046 UART:
27,913,222 UART: [state] CFI Enabled
27,981,497 UART: [fht] FMC Alias Private Key: 7
30,342,776 UART: [art] Extend RT PCRs Done
30,344,008 UART: [art] Lock RT PCRs Done
30,345,990 UART: [art] Populate DV Done
30,351,238 UART: [fht] FMC Alias Private Key: 7
30,352,778 UART: [art] Derive CDI
30,353,546 UART: [art] Store in slot 0x4
30,411,735 UART: [art] Derive Key Pair
30,412,771 UART: [art] Store priv key in slot 0x5
33,705,186 UART: [art] Derive Key Pair - Done
33,717,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,006,137 UART: [art] Erasing AUTHORITY.KEYID = 7
36,007,648 UART: [art] PUB.X = 37D47DA9D69F66F200680E6448E8AFE934F0597B7F51D64912080F95324167DDE2033DFC97E24E560118586A428DE895
36,014,862 UART: [art] PUB.Y = 0697499F71277E757D2DF6F4BDAE75C17EF21F1C89D3CC25B14A4999FD55820194024EFB2A5C40969F136C5D3589FEC2
36,022,092 UART: [art] SIG.R = E183D9439F1F44BBE4945A5298E42543171E98749A5984786802F56FB34879A7DB3842DFF4393B1A58D17CF33D5FC671
36,029,448 UART: [art] SIG.S = D234C56975B689F0F41B06488001D1819554F340615826460FF0BEBF9DB80DA02671E9E516A0C7EB362300D0ADCD1892
37,334,974 UART: Caliptra RT
37,335,684 UART: [state] CFI Enabled
37,510,138 UART: [rt] RT listening for mailbox commands...
37,512,469 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,667,923 UART: [rt]cmd =0x41544d4e, len=14344
41,896,855 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,516 UART:
192,883 UART: Running Caliptra ROM ...
194,023 UART:
603,494 UART: [state] CFI Enabled
620,934 UART: [state] LifecycleState = Unprovisioned
622,817 UART: [state] DebugLocked = No
624,912 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,763 UART: [kat] SHA2-256
799,489 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,008 UART: [kat] ++
810,487 UART: [kat] sha1
821,873 UART: [kat] SHA2-256
824,633 UART: [kat] SHA2-384
829,696 UART: [kat] SHA2-512-ACC
832,127 UART: [kat] ECC-384
3,116,619 UART: [kat] HMAC-384Kdf
3,129,850 UART: [kat] LMS
4,319,966 UART: [kat] --
4,325,755 UART: [cold-reset] ++
4,328,415 UART: [fht] Storing FHT @ 0x50003400
4,339,043 UART: [idev] ++
4,339,679 UART: [idev] CDI.KEYID = 6
4,340,580 UART: [idev] SUBJECT.KEYID = 7
4,341,822 UART: [idev] UDS.KEYID = 0
4,342,831 ready_for_fw is high
4,343,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,866 UART: [idev] Erasing UDS.KEYID = 0
7,630,483 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,363 UART: [idev] --
7,654,110 UART: [ldev] ++
7,654,677 UART: [ldev] CDI.KEYID = 6
7,655,635 UART: [ldev] SUBJECT.KEYID = 5
7,656,843 UART: [ldev] AUTHORITY.KEYID = 7
7,658,120 UART: [ldev] FE.KEYID = 1
7,667,785 UART: [ldev] Erasing FE.KEYID = 1
10,960,459 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,408 UART: [ldev] --
13,317,708 UART: [fwproc] Waiting for Commands...
13,320,334 UART: [fwproc] Received command 0x46574c44
13,322,507 UART: [fwproc] Received Image of size 118548 bytes
22,323,717 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,405,599 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,478,781 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,807,305 >>> mbox cmd response: success
22,810,747 UART: [afmc] ++
22,811,370 UART: [afmc] CDI.KEYID = 6
22,812,437 UART: [afmc] SUBJECT.KEYID = 7
22,813,558 UART: [afmc] AUTHORITY.KEYID = 5
26,128,362 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,422,822 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,425,092 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,439,590 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,454,399 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,468,764 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,490,531 UART: [afmc] --
28,493,531 UART: [cold-reset] --
28,497,817 UART: [state] Locking Datavault
28,503,577 UART: [state] Locking PCR0, PCR1 and PCR31
28,505,305 UART: [state] Locking ICCM
28,507,162 UART: [exit] Launching FMC @ 0x40000130
28,515,557 UART:
28,515,785 UART: Running Caliptra FMC ...
28,516,879 UART:
28,517,056 UART: [state] CFI Enabled
28,525,211 UART: [fht] FMC Alias Private Key: 7
30,865,675 UART: [art] Extend RT PCRs Done
30,866,897 UART: [art] Lock RT PCRs Done
30,868,466 UART: [art] Populate DV Done
30,873,818 UART: [fht] FMC Alias Private Key: 7
30,875,402 UART: [art] Derive CDI
30,876,211 UART: [art] Store in slot 0x4
30,919,292 UART: [art] Derive Key Pair
30,920,333 UART: [art] Store priv key in slot 0x5
34,161,832 UART: [art] Derive Key Pair - Done
34,174,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,454,974 UART: [art] Erasing AUTHORITY.KEYID = 7
36,456,484 UART: [art] PUB.X = 0D19D352EC8A62F6872351E7F90029703294DF3E11A304917B26837DF86E68A0808FE7DD49932C9E9ED982037176DBF5
36,463,746 UART: [art] PUB.Y = 6AD32EA3B96C23129C38B3A2B2AFE831FAEF31AC827E55AA26FF42ACD7E22637006850C79B2C8FBD90C3C2CA40345925
36,470,977 UART: [art] SIG.R = 516FB7E4016282DBFDE0E8905CDFBCAF09039AC79548F3CD6BAE3CB5F342EA31921E8102C17160157E7FCF6AC7DA616A
36,478,395 UART: [art] SIG.S = AFA35E5BCDDBB1EC80DB1B3D40586627CA4523B541A4C94645CD332A35CD949D921CB90E498C700BC5E80703E9E9EC34
37,783,683 UART: Caliptra RT
37,784,385 UART: [state] CFI Enabled
37,917,161 UART: [rt] RT listening for mailbox commands...
37,919,469 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,075,043 UART: [rt]cmd =0x41544d4e, len=14344
42,303,616 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,234 writing to cptra_bootfsm_go
4,126,281 ready_for_fw is high
4,126,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,550,074 >>> mbox cmd response: success
28,191,738 UART:
28,192,149 UART: Running Caliptra FMC ...
28,193,297 UART:
28,193,477 UART: [state] CFI Enabled
28,201,257 UART: [fht] FMC Alias Private Key: 7
30,541,310 UART: [art] Extend RT PCRs Done
30,542,534 UART: [art] Lock RT PCRs Done
30,544,272 UART: [art] Populate DV Done
30,549,680 UART: [fht] FMC Alias Private Key: 7
30,551,325 UART: [art] Derive CDI
30,552,132 UART: [art] Store in slot 0x4
30,594,513 UART: [art] Derive Key Pair
30,595,552 UART: [art] Store priv key in slot 0x5
33,837,078 UART: [art] Derive Key Pair - Done
33,850,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,130,012 UART: [art] Erasing AUTHORITY.KEYID = 7
36,131,545 UART: [art] PUB.X = 7E9E1A9F06E092D782D1F7B3AF3DD8231EF598346FF47D6CFC0D42F3CBBECBB449FA55E3222276480E963477F282C06D
36,138,858 UART: [art] PUB.Y = 5B25E3677979B4F0A62B6FB8B592C1264A836F88229865A4C0B257EC31708D8262EF99C402C91413471417B6DCFEB273
36,146,066 UART: [art] SIG.R = E11357B5F7B76D7857D9C65D06B7E65795DC6E0E9C76093938767810302BFF913A53AE194357797511CF51DCFB066EAF
36,153,420 UART: [art] SIG.S = DC97F3BF9AE36746C9DFBE6C64B6CB187D8FE28F3787845765AD362F2C40AC04E42F5FFD36362370D015B7DE75C264F2
37,458,435 UART: Caliptra RT
37,459,146 UART: [state] CFI Enabled
37,592,137 UART: [rt] RT listening for mailbox commands...
37,594,438 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,749,847 UART: [rt]cmd =0x41544d4e, len=14344
41,901,039 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,131 UART:
192,490 UART: Running Caliptra ROM ...
193,719 UART:
193,874 UART: [state] CFI Enabled
265,768 UART: [state] LifecycleState = Unprovisioned
267,683 UART: [state] DebugLocked = No
269,642 UART: [state] WD Timer not started. Device not locked for debugging
272,677 UART: [kat] SHA2-256
452,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,061 UART: [kat] ++
463,596 UART: [kat] sha1
474,406 UART: [kat] SHA2-256
477,129 UART: [kat] SHA2-384
484,462 UART: [kat] SHA2-512-ACC
486,824 UART: [kat] ECC-384
2,948,303 UART: [kat] HMAC-384Kdf
2,971,710 UART: [kat] LMS
3,448,164 UART: [kat] --
3,453,126 UART: [cold-reset] ++
3,454,948 UART: [fht] FHT @ 0x50003400
3,467,863 UART: [idev] ++
3,468,497 UART: [idev] CDI.KEYID = 6
3,469,378 UART: [idev] SUBJECT.KEYID = 7
3,470,698 UART: [idev] UDS.KEYID = 0
3,471,599 ready_for_fw is high
3,471,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,859 UART: [idev] Erasing UDS.KEYID = 0
5,989,339 UART: [idev] Sha1 KeyId Algorithm
6,013,259 UART: [idev] --
6,017,343 UART: [ldev] ++
6,017,916 UART: [ldev] CDI.KEYID = 6
6,018,856 UART: [ldev] SUBJECT.KEYID = 5
6,020,068 UART: [ldev] AUTHORITY.KEYID = 7
6,021,301 UART: [ldev] FE.KEYID = 1
6,057,016 UART: [ldev] Erasing FE.KEYID = 1
8,561,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,637 UART: [ldev] --
10,373,489 UART: [fwproc] Wait for Commands...
10,376,067 UART: [fwproc] Recv command 0x46574c44
10,378,099 UART: [fwproc] Recv'd Img size: 118548 bytes
14,890,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,974,636 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,047,647 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,375,125 >>> mbox cmd response: success
15,379,843 UART: [afmc] ++
15,380,428 UART: [afmc] CDI.KEYID = 6
15,381,313 UART: [afmc] SUBJECT.KEYID = 7
15,382,586 UART: [afmc] AUTHORITY.KEYID = 5
17,916,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,641,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,643,813 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,659,641 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,675,567 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,691,310 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,716,100 UART: [afmc] --
19,719,748 UART: [cold-reset] --
19,724,254 UART: [state] Locking Datavault
19,728,801 UART: [state] Locking PCR0, PCR1 and PCR31
19,730,550 UART: [state] Locking ICCM
19,732,749 UART: [exit] Launching FMC @ 0x40000130
19,741,135 UART:
19,741,368 UART: Running Caliptra FMC ...
19,742,465 UART:
19,742,621 UART: [state] CFI Enabled
19,798,629 UART: [fht] FMC Alias Private Key: 7
21,586,142 UART: [art] Extend RT PCRs Done
21,587,368 UART: [art] Lock RT PCRs Done
21,588,937 UART: [art] Populate DV Done
21,594,400 UART: [fht] FMC Alias Private Key: 7
21,596,044 UART: [art] Derive CDI
21,596,859 UART: [art] Store in slot 0x4
21,652,446 UART: [art] Derive Key Pair
21,653,486 UART: [art] Store priv key in slot 0x5
24,116,554 UART: [art] Derive Key Pair - Done
24,129,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,842,790 UART: [art] Erasing AUTHORITY.KEYID = 7
25,844,299 UART: [art] PUB.X = 8C6472FF46AE1476A9A4E998F09E71322CECFA3F887E227D9878E43824657AA6E3C724A5F1E68DA97FFBBFFD79B970EA
25,851,586 UART: [art] PUB.Y = DA2B0A4CF72E5BA184D6CC49369E8CBC01644DCD36D8D3FCCD453384EA6B7B3A888322B4B1F4406E92E7D5946A7A9668
25,858,831 UART: [art] SIG.R = E0AEAC0109C021CC475F0EE43BF8E1344CA600CDB30A8C5E5C5B5F6F773D7E90830070DD2BCC44AEF7B7DBB251F0A3EA
25,866,223 UART: [art] SIG.S = 9BDBA621A3742B9F89C3F914F7FD2F49D23F11B4E602B8086310EBDA8489F5AE67AF8AF5A780416CC6534182817A8717
26,844,703 UART: Caliptra RT
26,845,410 UART: [state] CFI Enabled
27,027,424 UART: [rt] RT listening for mailbox commands...
27,029,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,184,961 UART: [rt]cmd =0x41544d4e, len=14344
29,610,915 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,463,434 ready_for_fw is high
3,463,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,385,064 >>> mbox cmd response: success
19,690,080 UART:
19,690,450 UART: Running Caliptra FMC ...
19,691,665 UART:
19,691,834 UART: [state] CFI Enabled
19,755,233 UART: [fht] FMC Alias Private Key: 7
21,521,584 UART: [art] Extend RT PCRs Done
21,522,816 UART: [art] Lock RT PCRs Done
21,524,605 UART: [art] Populate DV Done
21,529,964 UART: [fht] FMC Alias Private Key: 7
21,531,503 UART: [art] Derive CDI
21,532,314 UART: [art] Store in slot 0x4
21,587,886 UART: [art] Derive Key Pair
21,588,925 UART: [art] Store priv key in slot 0x5
24,051,612 UART: [art] Derive Key Pair - Done
24,064,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,777,521 UART: [art] Erasing AUTHORITY.KEYID = 7
25,779,021 UART: [art] PUB.X = 608BCC2C9D68957E090DAFE325EAA119E33F2BA231D31C7E4400A41343FB8EB7E38AE6854F7BD9A7C07C738A91FA5766
25,786,279 UART: [art] PUB.Y = 71DD4B3D6B3413140075FF5CDBF9C860EC17990ACE18495A9F191569F23F97A87FBCC244BD0115ADE20C6D0BD2EAC839
25,793,526 UART: [art] SIG.R = C809C039E730D1A358FFA6BB3FA788E831B312DEDEA377AAD268E430539FB2DC86C9350755E7FE5B8B382E5DB3A89062
25,800,947 UART: [art] SIG.S = 4FE3F9382519202DF0EE01175ED64D6DF95A9FF35E1E40A901FD32CAE9D35C491EEB5C5961443ED260470EF88FE95A99
26,779,775 UART: Caliptra RT
26,780,476 UART: [state] CFI Enabled
26,962,063 UART: [rt] RT listening for mailbox commands...
26,964,387 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,119,799 UART: [rt]cmd =0x41544d4e, len=14344
29,539,922 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,366 UART:
192,717 UART: Running Caliptra ROM ...
193,928 UART:
603,511 UART: [state] CFI Enabled
617,885 UART: [state] LifecycleState = Unprovisioned
619,763 UART: [state] DebugLocked = No
621,071 UART: [state] WD Timer not started. Device not locked for debugging
625,699 UART: [kat] SHA2-256
805,405 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,143 UART: [kat] ++
816,595 UART: [kat] sha1
828,325 UART: [kat] SHA2-256
830,990 UART: [kat] SHA2-384
838,403 UART: [kat] SHA2-512-ACC
840,776 UART: [kat] ECC-384
3,282,325 UART: [kat] HMAC-384Kdf
3,294,604 UART: [kat] LMS
3,771,105 UART: [kat] --
3,777,172 UART: [cold-reset] ++
3,778,749 UART: [fht] FHT @ 0x50003400
3,790,221 UART: [idev] ++
3,790,794 UART: [idev] CDI.KEYID = 6
3,791,725 UART: [idev] SUBJECT.KEYID = 7
3,792,990 UART: [idev] UDS.KEYID = 0
3,793,921 ready_for_fw is high
3,794,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,058 UART: [idev] Erasing UDS.KEYID = 0
6,270,622 UART: [idev] Sha1 KeyId Algorithm
6,293,147 UART: [idev] --
6,299,300 UART: [ldev] ++
6,299,927 UART: [ldev] CDI.KEYID = 6
6,300,841 UART: [ldev] SUBJECT.KEYID = 5
6,302,056 UART: [ldev] AUTHORITY.KEYID = 7
6,303,290 UART: [ldev] FE.KEYID = 1
6,316,045 UART: [ldev] Erasing FE.KEYID = 1
8,797,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,999 UART: [ldev] --
10,593,371 UART: [fwproc] Wait for Commands...
10,595,195 UART: [fwproc] Recv command 0x46574c44
10,597,189 UART: [fwproc] Recv'd Img size: 118548 bytes
15,150,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,232,419 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,305,436 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,634,496 >>> mbox cmd response: success
15,637,834 UART: [afmc] ++
15,638,424 UART: [afmc] CDI.KEYID = 6
15,639,447 UART: [afmc] SUBJECT.KEYID = 7
15,640,609 UART: [afmc] AUTHORITY.KEYID = 5
18,147,308 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,871,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,873,833 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,889,726 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,905,642 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,921,373 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,946,092 UART: [afmc] --
19,950,285 UART: [cold-reset] --
19,954,360 UART: [state] Locking Datavault
19,961,823 UART: [state] Locking PCR0, PCR1 and PCR31
19,963,577 UART: [state] Locking ICCM
19,965,081 UART: [exit] Launching FMC @ 0x40000130
19,973,485 UART:
19,973,730 UART: Running Caliptra FMC ...
19,974,955 UART:
19,975,119 UART: [state] CFI Enabled
19,983,234 UART: [fht] FMC Alias Private Key: 7
21,749,412 UART: [art] Extend RT PCRs Done
21,750,635 UART: [art] Lock RT PCRs Done
21,752,096 UART: [art] Populate DV Done
21,757,572 UART: [fht] FMC Alias Private Key: 7
21,759,263 UART: [art] Derive CDI
21,760,006 UART: [art] Store in slot 0x4
21,802,983 UART: [art] Derive Key Pair
21,803,980 UART: [art] Store priv key in slot 0x5
24,231,257 UART: [art] Derive Key Pair - Done
24,244,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,950,208 UART: [art] Erasing AUTHORITY.KEYID = 7
25,951,710 UART: [art] PUB.X = D547401ABDB6F64968BD1FE101774CACD4F8156A0CCE18F28374C53917956BA51C1C6F90D3A27D4495380C08C85C6497
25,958,951 UART: [art] PUB.Y = 5D17009D858BD88CBE6F89D3C9259CEAE17B681B81A2BCBA623D4917A0012D289CCC7F6350FC8ACE4E190A9C2D48D21A
25,966,232 UART: [art] SIG.R = F6BAD9E4FAEE2AC0C92143DF145153A651D4BD94FCDBF17FF58E320C59337A9B722C0074FC1DDF2717CCD8C688B1BD75
25,973,620 UART: [art] SIG.S = 96A9ADB3F64F58F78CE778D00D75BEF6B7E3509A5E15C527569601B8203274CA3D36CA85E6892580B28EE93AAF4A8AEA
26,952,788 UART: Caliptra RT
26,953,489 UART: [state] CFI Enabled
27,086,650 UART: [rt] RT listening for mailbox commands...
27,088,996 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,244,474 UART: [rt]cmd =0x41544d4e, len=14344
29,675,982 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,776,132 ready_for_fw is high
3,776,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,639,669 >>> mbox cmd response: success
19,892,607 UART:
19,892,983 UART: Running Caliptra FMC ...
19,894,187 UART:
19,894,364 UART: [state] CFI Enabled
19,902,206 UART: [fht] FMC Alias Private Key: 7
21,667,772 UART: [art] Extend RT PCRs Done
21,668,986 UART: [art] Lock RT PCRs Done
21,670,719 UART: [art] Populate DV Done
21,676,041 UART: [fht] FMC Alias Private Key: 7
21,677,751 UART: [art] Derive CDI
21,678,570 UART: [art] Store in slot 0x4
21,721,772 UART: [art] Derive Key Pair
21,722,817 UART: [art] Store priv key in slot 0x5
24,149,253 UART: [art] Derive Key Pair - Done
24,161,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,868,432 UART: [art] Erasing AUTHORITY.KEYID = 7
25,869,922 UART: [art] PUB.X = 4FC5DA7F85AA92B23A7D15266A88C08048934B5920A7756F315479E7BB3DAAD4E44BA5A126CEAAF8BABDA7045860F5EA
25,877,230 UART: [art] PUB.Y = 4CB02F40580CFBA62657711986767D47A1A0CD796B7AB95742FF2C9C357C1997209CE43B9C2B4DA471D7E992B7863A72
25,884,482 UART: [art] SIG.R = E1752ADC80894D11AE16077813C6FF3D3FF55E92262ADDAE4BE3D3117FF6F148C5668E7415AB16DFD4EE3F39C0836457
25,891,893 UART: [art] SIG.S = 44010C2AB4633534CA68938350ECF2D7493662711048582277C0629892C780C9D5AC1271D588989FF91F2376458378C6
26,870,883 UART: Caliptra RT
26,871,571 UART: [state] CFI Enabled
27,003,546 UART: [rt] RT listening for mailbox commands...
27,005,869 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,160,913 UART: [rt]cmd =0x41544d4e, len=14344
29,579,193 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
191,973 UART:
192,356 UART: Running Caliptra ROM ...
193,522 UART:
193,670 UART: [state] CFI Enabled
264,508 UART: [state] LifecycleState = Unprovisioned
266,926 UART: [state] DebugLocked = No
268,450 UART: [state] WD Timer not started. Device not locked for debugging
273,895 UART: [kat] SHA2-256
463,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,548 UART: [kat] ++
474,997 UART: [kat] sha1
486,719 UART: [kat] SHA2-256
489,725 UART: [kat] SHA2-384
494,715 UART: [kat] SHA2-512-ACC
497,290 UART: [kat] ECC-384
2,949,166 UART: [kat] HMAC-384Kdf
2,971,986 UART: [kat] LMS
3,503,715 UART: [kat] --
3,508,014 UART: [cold-reset] ++
3,510,374 UART: [fht] FHT @ 0x50003400
3,522,199 UART: [idev] ++
3,522,829 UART: [idev] CDI.KEYID = 6
3,523,856 UART: [idev] SUBJECT.KEYID = 7
3,525,022 UART: [idev] UDS.KEYID = 0
3,525,950 ready_for_fw is high
3,526,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,266 UART: [idev] Erasing UDS.KEYID = 0
6,026,139 UART: [idev] Sha1 KeyId Algorithm
6,048,889 UART: [idev] --
6,053,201 UART: [ldev] ++
6,053,935 UART: [ldev] CDI.KEYID = 6
6,054,818 UART: [ldev] SUBJECT.KEYID = 5
6,055,969 UART: [ldev] AUTHORITY.KEYID = 7
6,057,198 UART: [ldev] FE.KEYID = 1
6,099,546 UART: [ldev] Erasing FE.KEYID = 1
8,605,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,213 UART: [ldev] --
10,412,098 UART: [fwproc] Wait for Commands...
10,415,216 UART: [fwproc] Recv command 0x46574c44
10,417,525 UART: [fwproc] Recv'd Img size: 118548 bytes
15,094,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,182,681 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,306,293 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,866,833 >>> mbox cmd response: success
15,871,173 UART: [afmc] ++
15,871,896 UART: [afmc] CDI.KEYID = 6
15,873,107 UART: [afmc] SUBJECT.KEYID = 7
15,874,550 UART: [afmc] AUTHORITY.KEYID = 5
18,402,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,129,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,131,496 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,146,582 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,161,786 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,176,860 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,200,429 UART: [afmc] --
20,203,063 UART: [cold-reset] --
20,208,445 UART: [state] Locking Datavault
20,214,236 UART: [state] Locking PCR0, PCR1 and PCR31
20,216,379 UART: [state] Locking ICCM
20,217,611 UART: [exit] Launching FMC @ 0x40000130
20,226,239 UART:
20,226,470 UART: Running Caliptra FMC ...
20,227,589 UART:
20,227,747 UART: [state] CFI Enabled
20,286,516 UART: [fht] FMC Alias Private Key: 7
22,053,670 UART: [art] Extend RT PCRs Done
22,054,891 UART: [art] Lock RT PCRs Done
22,056,400 UART: [art] Populate DV Done
22,061,810 UART: [fht] FMC Alias Private Key: 7
22,063,457 UART: [art] Derive CDI
22,064,271 UART: [art] Store in slot 0x4
22,118,819 UART: [art] Derive Key Pair
22,119,858 UART: [art] Store priv key in slot 0x5
24,582,988 UART: [art] Derive Key Pair - Done
24,595,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,308,348 UART: [art] Erasing AUTHORITY.KEYID = 7
26,309,856 UART: [art] PUB.X = 4C9B75951A9A3E7DD60678BFF6FFE13B44ED8063518436549580DCB53571136F206FC05CD6CF35F86B1448ED33530998
26,317,134 UART: [art] PUB.Y = FFFF002DFE8AD3FE852BA46213F36EA77EF8B96D7E8F8BFE5522FA46CEC6D1C9FD5BEC8CA420855C5D525CC15AB16CBE
26,324,422 UART: [art] SIG.R = CDE5E94D9AAE97370B9378EA99D0F4E0A3E99695740C48B406A16C559832AC968EAB8CD3028C4B6F0307EBBF058EF793
26,331,792 UART: [art] SIG.S = 0445B725F544C176CDB735A73D78EA7E41B90B63BB49BFF844496A6E62D127DFB65FA94E84554F8CB4B2DB2E2E67B571
27,311,153 UART: Caliptra RT
27,311,872 UART: [state] CFI Enabled
27,492,002 UART: [rt] RT listening for mailbox commands...
27,494,319 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,649,618 UART: [rt]cmd =0x41544d4e, len=14344
30,073,593 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,438,133 ready_for_fw is high
3,438,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,958,518 >>> mbox cmd response: success
20,239,749 UART:
20,240,146 UART: Running Caliptra FMC ...
20,241,280 UART:
20,241,445 UART: [state] CFI Enabled
20,310,940 UART: [fht] FMC Alias Private Key: 7
22,077,721 UART: [art] Extend RT PCRs Done
22,078,931 UART: [art] Lock RT PCRs Done
22,080,720 UART: [art] Populate DV Done
22,086,257 UART: [fht] FMC Alias Private Key: 7
22,087,917 UART: [art] Derive CDI
22,088,679 UART: [art] Store in slot 0x4
22,143,724 UART: [art] Derive Key Pair
22,144,760 UART: [art] Store priv key in slot 0x5
24,607,775 UART: [art] Derive Key Pair - Done
24,620,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,334,004 UART: [art] Erasing AUTHORITY.KEYID = 7
26,335,513 UART: [art] PUB.X = 258CAE83D2C1EC66ACF31EBF6624CD529F0349C2AE85AA117E309FF041E44B6B007CD39ADDE1C4BB3E16D84E1F5E5620
26,342,792 UART: [art] PUB.Y = 4DDB23CF665E3F659312935301B60C065A7201FA35795B3CB5B015DDEAD4502E9C72A80EEE577F361C2A1B48BB37B425
26,350,065 UART: [art] SIG.R = A91153E61F8BB2D101C7C60D11F2FBD911336047431F23967BF5E8D1FCD2F6B143724B6CF8180E9CA3545F520D1C548A
26,357,440 UART: [art] SIG.S = 2FB921DA5491C8B6490B973566F798AC1C0A3762BE73DDDB3A1547A86F9200E1F0F3651BF9AC372DBFCE839CAB7AC1CD
27,336,886 UART: Caliptra RT
27,337,605 UART: [state] CFI Enabled
27,516,886 UART: [rt] RT listening for mailbox commands...
27,519,206 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,674,426 UART: [rt]cmd =0x41544d4e, len=14344
30,094,019 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
192,427 UART:
192,792 UART: Running Caliptra ROM ...
193,943 UART:
603,692 UART: [state] CFI Enabled
618,017 UART: [state] LifecycleState = Unprovisioned
620,415 UART: [state] DebugLocked = No
622,868 UART: [state] WD Timer not started. Device not locked for debugging
627,199 UART: [kat] SHA2-256
817,109 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,855 UART: [kat] ++
828,405 UART: [kat] sha1
840,365 UART: [kat] SHA2-256
843,348 UART: [kat] SHA2-384
848,641 UART: [kat] SHA2-512-ACC
851,237 UART: [kat] ECC-384
3,295,276 UART: [kat] HMAC-384Kdf
3,307,858 UART: [kat] LMS
3,839,620 UART: [kat] --
3,844,739 UART: [cold-reset] ++
3,847,315 UART: [fht] FHT @ 0x50003400
3,858,439 UART: [idev] ++
3,859,149 UART: [idev] CDI.KEYID = 6
3,860,060 UART: [idev] SUBJECT.KEYID = 7
3,861,312 UART: [idev] UDS.KEYID = 0
3,862,241 ready_for_fw is high
3,862,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,308 UART: [idev] Erasing UDS.KEYID = 0
6,341,381 UART: [idev] Sha1 KeyId Algorithm
6,364,866 UART: [idev] --
6,369,696 UART: [ldev] ++
6,370,384 UART: [ldev] CDI.KEYID = 6
6,371,295 UART: [ldev] SUBJECT.KEYID = 5
6,372,458 UART: [ldev] AUTHORITY.KEYID = 7
6,373,688 UART: [ldev] FE.KEYID = 1
6,384,193 UART: [ldev] Erasing FE.KEYID = 1
8,863,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,355 UART: [ldev] --
10,656,160 UART: [fwproc] Wait for Commands...
10,657,767 UART: [fwproc] Recv command 0x46574c44
10,660,076 UART: [fwproc] Recv'd Img size: 118548 bytes
15,322,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,405,464 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,529,131 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,089,858 >>> mbox cmd response: success
16,093,853 UART: [afmc] ++
16,094,590 UART: [afmc] CDI.KEYID = 6
16,095,815 UART: [afmc] SUBJECT.KEYID = 7
16,097,213 UART: [afmc] AUTHORITY.KEYID = 5
18,598,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,320,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,322,022 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,337,142 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,352,397 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,367,455 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,390,365 UART: [afmc] --
20,394,184 UART: [cold-reset] --
20,398,279 UART: [state] Locking Datavault
20,403,332 UART: [state] Locking PCR0, PCR1 and PCR31
20,405,550 UART: [state] Locking ICCM
20,407,763 UART: [exit] Launching FMC @ 0x40000130
20,416,458 UART:
20,416,700 UART: Running Caliptra FMC ...
20,417,824 UART:
20,417,992 UART: [state] CFI Enabled
20,426,098 UART: [fht] FMC Alias Private Key: 7
22,192,421 UART: [art] Extend RT PCRs Done
22,193,647 UART: [art] Lock RT PCRs Done
22,195,115 UART: [art] Populate DV Done
22,200,586 UART: [fht] FMC Alias Private Key: 7
22,202,165 UART: [art] Derive CDI
22,203,000 UART: [art] Store in slot 0x4
22,245,932 UART: [art] Derive Key Pair
22,246,935 UART: [art] Store priv key in slot 0x5
24,674,236 UART: [art] Derive Key Pair - Done
24,687,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,393,743 UART: [art] Erasing AUTHORITY.KEYID = 7
26,395,255 UART: [art] PUB.X = 9A32B1A144DD93EE19716C257DC77E33C59AFBDEEB90370AB76FB44F3AB3E1576BBA0D9E1159BF93453A4A38751EA9EE
26,402,528 UART: [art] PUB.Y = 331AF0D3F63D615D0F29178E245677252B7BBDF68C83E9498D226D299CF08D92480A594264EADC56D730515FF2259860
26,409,750 UART: [art] SIG.R = DF2F1DF5D8505300DA10101830CEBC324847C6412396B3AD22DB85E077FCD2A24DE532C7EB7CB8B6F12C5E2AD0B9F5C9
26,417,130 UART: [art] SIG.S = 1E4B00A97DFB92E3B7B1C10463688C63E0A09475F4C792D43804576E54B860AB16123F1608A0E23A24E3413448860C34
27,395,349 UART: Caliptra RT
27,396,037 UART: [state] CFI Enabled
27,529,024 UART: [rt] RT listening for mailbox commands...
27,531,462 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,686,987 UART: [rt]cmd =0x41544d4e, len=14344
30,120,885 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,760,026 ready_for_fw is high
3,760,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,153,652 >>> mbox cmd response: success
20,406,048 UART:
20,406,452 UART: Running Caliptra FMC ...
20,407,596 UART:
20,407,784 UART: [state] CFI Enabled
20,415,571 UART: [fht] FMC Alias Private Key: 7
22,182,244 UART: [art] Extend RT PCRs Done
22,183,481 UART: [art] Lock RT PCRs Done
22,185,089 UART: [art] Populate DV Done
22,190,777 UART: [fht] FMC Alias Private Key: 7
22,192,429 UART: [art] Derive CDI
22,193,250 UART: [art] Store in slot 0x4
22,235,803 UART: [art] Derive Key Pair
22,236,846 UART: [art] Store priv key in slot 0x5
24,663,380 UART: [art] Derive Key Pair - Done
24,676,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,382,995 UART: [art] Erasing AUTHORITY.KEYID = 7
26,384,507 UART: [art] PUB.X = C6E9BE9CCC135A74B09C44D149E72BEF6476521946881265841C9B183B920614BC52987845BD71B1A31D4D790F33FF1F
26,391,748 UART: [art] PUB.Y = 375121DAAE7C3AC3E19C0EFD4909039C5BE4CA749E4C2C404A4F403CB13A44CDF0304BDED923278F62917104FD97DE90
26,399,054 UART: [art] SIG.R = 0824155250F6D09B76BA653E555F3020A1021A5C23F135790C7A08095F3C616440AAA829EE39424F2EB390C00C6A58AB
26,406,401 UART: [art] SIG.S = A61D4BC9CDDC7A77355FD76B331D6D536090FA031DB1EC0543321C954FFCEE21EB003AA4CAAB4547675E98A48093B209
27,386,029 UART: Caliptra RT
27,386,729 UART: [state] CFI Enabled
27,519,723 UART: [rt] RT listening for mailbox commands...
27,522,028 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,677,351 UART: [rt]cmd =0x41544d4e, len=14344
30,100,979 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,381 UART: [state] DebugLocked = No
85,869 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,347 UART: [kat] SHA2-256
881,278 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,393 UART: [kat] ++
885,545 UART: [kat] sha1
889,871 UART: [kat] SHA2-256
891,809 UART: [kat] SHA2-384
894,444 UART: [kat] SHA2-512-ACC
896,345 UART: [kat] ECC-384
901,874 UART: [kat] HMAC-384Kdf
906,494 UART: [kat] LMS
1,474,690 UART: [kat] --
1,475,457 UART: [cold-reset] ++
1,475,927 UART: [fht] Storing FHT @ 0x50003400
1,478,716 UART: [idev] ++
1,478,884 UART: [idev] CDI.KEYID = 6
1,479,244 UART: [idev] SUBJECT.KEYID = 7
1,479,668 UART: [idev] UDS.KEYID = 0
1,480,013 ready_for_fw is high
1,480,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,592 UART: [idev] Erasing UDS.KEYID = 0
1,504,268 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,766 UART: [idev] --
1,513,625 UART: [ldev] ++
1,513,793 UART: [ldev] CDI.KEYID = 6
1,514,156 UART: [ldev] SUBJECT.KEYID = 5
1,514,582 UART: [ldev] AUTHORITY.KEYID = 7
1,515,045 UART: [ldev] FE.KEYID = 1
1,520,015 UART: [ldev] Erasing FE.KEYID = 1
1,545,062 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,010 UART: [ldev] --
1,584,519 UART: [fwproc] Waiting for Commands...
1,585,286 UART: [fwproc] Received command 0x46574c44
1,586,077 UART: [fwproc] Received Image of size 118548 bytes
5,280,039 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,308,167 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,339,385 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,479,812 >>> mbox cmd response: success
5,481,048 UART: [afmc] ++
5,481,216 UART: [afmc] CDI.KEYID = 6
5,481,578 UART: [afmc] SUBJECT.KEYID = 7
5,482,003 UART: [afmc] AUTHORITY.KEYID = 5
5,516,700 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,532,788 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,533,568 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,539,274 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,545,153 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,550,866 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,558,573 UART: [afmc] --
5,559,575 UART: [cold-reset] --
5,560,261 UART: [state] Locking Datavault
5,561,550 UART: [state] Locking PCR0, PCR1 and PCR31
5,562,154 UART: [state] Locking ICCM
5,562,710 UART: [exit] Launching FMC @ 0x40000130
5,568,040 UART:
5,568,056 UART: Running Caliptra FMC ...
5,568,464 UART:
5,568,518 UART: [state] CFI Enabled
5,578,836 UART: [fht] FMC Alias Private Key: 7
5,698,522 UART: [art] Extend RT PCRs Done
5,698,950 UART: [art] Lock RT PCRs Done
5,700,262 UART: [art] Populate DV Done
5,708,773 UART: [fht] FMC Alias Private Key: 7
5,709,741 UART: [art] Derive CDI
5,710,021 UART: [art] Store in slot 0x4
5,795,463 UART: [art] Derive Key Pair
5,795,823 UART: [art] Store priv key in slot 0x5
5,808,390 UART: [art] Derive Key Pair - Done
5,823,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,838,860 UART: [art] Erasing AUTHORITY.KEYID = 7
5,839,625 UART: [art] PUB.X = 9A70068FA29FE9254783A2DB884A183DB080FEC5385F3F84572BCD689FFCE4863CEF133FC2AF6FC85EDCDCC2552A4C57
5,846,410 UART: [art] PUB.Y = 24BFF86613323B76D7B386FEFF87620373DD583085D2A149A7D5943EF2C665448173E771E1246D920495A1777E264057
5,853,340 UART: [art] SIG.R = 4F60A3340E393E43E163A1FC8BE1365CF0ADC9AE986EBB20E8EC0A9496423EF5846E3BB8F868C6DD1D593885C6E9D17F
5,860,118 UART: [art] SIG.S = 4299AD6EEE2E32F3083AC5D1CA97BC11835CFED567B8C287D7A8683910915E871B78C5857D42CDCE067884A131F14F5C
5,884,220 UART: Caliptra RT
5,884,471 UART: [state] CFI Enabled
6,004,326 UART: [rt] RT listening for mailbox commands...
6,004,996 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,128,018 UART: [rt]cmd =0x41544d4e, len=14344
8,744,574 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,623 ready_for_fw is high
1,362,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,254,788 >>> mbox cmd response: success
5,315,925 UART:
5,315,941 UART: Running Caliptra FMC ...
5,316,349 UART:
5,316,403 UART: [state] CFI Enabled
5,327,103 UART: [fht] FMC Alias Private Key: 7
5,446,841 UART: [art] Extend RT PCRs Done
5,447,269 UART: [art] Lock RT PCRs Done
5,448,557 UART: [art] Populate DV Done
5,456,856 UART: [fht] FMC Alias Private Key: 7
5,457,984 UART: [art] Derive CDI
5,458,264 UART: [art] Store in slot 0x4
5,544,140 UART: [art] Derive Key Pair
5,544,500 UART: [art] Store priv key in slot 0x5
5,557,677 UART: [art] Derive Key Pair - Done
5,572,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,588,054 UART: [art] Erasing AUTHORITY.KEYID = 7
5,588,819 UART: [art] PUB.X = 139947A2236529AB80DDF290F2BC5689F6D764448E633253A0E2E70059AD6BFFED50B13869C09968A1782C74D9F47E7C
5,595,565 UART: [art] PUB.Y = 4C6DDAD365E461486F99AA4771C09FC39C5ACF2571D7304D5FD266748CA09F407BF9D6AEB5E1FEB84BEE24944AB67A53
5,602,531 UART: [art] SIG.R = 54D33FB2F2D381B244396BB033F784FECBC9455AF428949B0076EE8E5DDEB01422191920DD30FB94CA301A658F41CD9A
5,609,287 UART: [art] SIG.S = 308D5B083824EE170FD44875BD44F3C559269BA9A2BD056A32D6AF1684782176CFF707A5A0328F0F072E136B00110440
5,633,404 UART: Caliptra RT
5,633,655 UART: [state] CFI Enabled
5,754,130 UART: [rt] RT listening for mailbox commands...
5,754,800 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,878,096 UART: [rt]cmd =0x41544d4e, len=14344
8,116,185 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.99s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,154 UART: [kat] SHA2-256
882,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,200 UART: [kat] ++
886,352 UART: [kat] sha1
890,612 UART: [kat] SHA2-256
892,550 UART: [kat] SHA2-384
895,315 UART: [kat] SHA2-512-ACC
897,216 UART: [kat] ECC-384
902,855 UART: [kat] HMAC-384Kdf
907,535 UART: [kat] LMS
1,475,731 UART: [kat] --
1,476,578 UART: [cold-reset] ++
1,477,104 UART: [fht] Storing FHT @ 0x50003400
1,479,851 UART: [idev] ++
1,480,019 UART: [idev] CDI.KEYID = 6
1,480,379 UART: [idev] SUBJECT.KEYID = 7
1,480,803 UART: [idev] UDS.KEYID = 0
1,481,148 ready_for_fw is high
1,481,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,891 UART: [idev] Erasing UDS.KEYID = 0
1,505,005 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,499 UART: [idev] --
1,514,512 UART: [ldev] ++
1,514,680 UART: [ldev] CDI.KEYID = 6
1,515,043 UART: [ldev] SUBJECT.KEYID = 5
1,515,469 UART: [ldev] AUTHORITY.KEYID = 7
1,515,932 UART: [ldev] FE.KEYID = 1
1,521,400 UART: [ldev] Erasing FE.KEYID = 1
1,546,733 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,639 UART: [ldev] --
1,586,136 UART: [fwproc] Waiting for Commands...
1,586,977 UART: [fwproc] Received command 0x46574c44
1,587,768 UART: [fwproc] Received Image of size 118548 bytes
5,242,841 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,271,067 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,302,285 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,442,712 >>> mbox cmd response: success
5,443,742 UART: [afmc] ++
5,443,910 UART: [afmc] CDI.KEYID = 6
5,444,272 UART: [afmc] SUBJECT.KEYID = 7
5,444,697 UART: [afmc] AUTHORITY.KEYID = 5
5,480,208 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,496,034 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,496,814 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,502,520 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,508,399 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,514,112 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,521,747 UART: [afmc] --
5,522,797 UART: [cold-reset] --
5,523,801 UART: [state] Locking Datavault
5,524,874 UART: [state] Locking PCR0, PCR1 and PCR31
5,525,478 UART: [state] Locking ICCM
5,525,970 UART: [exit] Launching FMC @ 0x40000130
5,531,300 UART:
5,531,316 UART: Running Caliptra FMC ...
5,531,724 UART:
5,531,867 UART: [state] CFI Enabled
5,542,531 UART: [fht] FMC Alias Private Key: 7
5,661,209 UART: [art] Extend RT PCRs Done
5,661,637 UART: [art] Lock RT PCRs Done
5,662,997 UART: [art] Populate DV Done
5,671,244 UART: [fht] FMC Alias Private Key: 7
5,672,318 UART: [art] Derive CDI
5,672,598 UART: [art] Store in slot 0x4
5,758,036 UART: [art] Derive Key Pair
5,758,396 UART: [art] Store priv key in slot 0x5
5,771,641 UART: [art] Derive Key Pair - Done
5,786,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,801,971 UART: [art] Erasing AUTHORITY.KEYID = 7
5,802,736 UART: [art] PUB.X = FA04457C8ED164C0EA45D490C90604D80F0DCF8978EE52D12A0E9B9C974E7B3D9CA6FCEBE99EC149AB69BF3FCCE10CE2
5,809,511 UART: [art] PUB.Y = F20CB495C53CBF85D15F4F69A9C790F2D53F351A55B0B0C5D613EACFAFA739C7C20442E776D9D26685FDD093A1E34E82
5,816,469 UART: [art] SIG.R = F54A5B33ADAA5C9D3B343730B3A45F5D1EA5429716806C5C0456937A1608D72DD41FE42872AAA76B5A43C8061DFFADF7
5,823,240 UART: [art] SIG.S = 39E8BF7B0732029D5AD4A56C92133A2793D9C7CA9182B5FB5F93F516BEF6E38AC577F185D27E127AD42B17F7336D305E
5,846,796 UART: Caliptra RT
5,847,139 UART: [state] CFI Enabled
5,966,603 UART: [rt] RT listening for mailbox commands...
5,967,273 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,090,015 UART: [rt]cmd =0x41544d4e, len=14344
8,403,637 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,068 ready_for_fw is high
1,363,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,369,214 >>> mbox cmd response: success
5,431,501 UART:
5,431,517 UART: Running Caliptra FMC ...
5,431,925 UART:
5,432,068 UART: [state] CFI Enabled
5,442,632 UART: [fht] FMC Alias Private Key: 7
5,561,796 UART: [art] Extend RT PCRs Done
5,562,224 UART: [art] Lock RT PCRs Done
5,563,636 UART: [art] Populate DV Done
5,571,723 UART: [fht] FMC Alias Private Key: 7
5,572,651 UART: [art] Derive CDI
5,572,931 UART: [art] Store in slot 0x4
5,658,735 UART: [art] Derive Key Pair
5,659,095 UART: [art] Store priv key in slot 0x5
5,672,886 UART: [art] Derive Key Pair - Done
5,687,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,703,383 UART: [art] Erasing AUTHORITY.KEYID = 7
5,704,148 UART: [art] PUB.X = F777DDF508C742FC07B40DF176CD39F19054C041C5DBE622B508AD56CC1333844208B0E4E5037B23422296AF8B5C4DDB
5,710,906 UART: [art] PUB.Y = 8CAFB6284335D3EA53BC8A9D9BC0F4300DCAEC0EF201BF2DDDBE68A12703E8A1300ED5FE11E54AD33FA040674428EE44
5,717,863 UART: [art] SIG.R = 16716CD961B420BE688298681A9D86F0D8C1199A258C13D17CF89DA05C9E78ED6037B61DE7982CEFFC49FB172CB53A2F
5,724,641 UART: [art] SIG.S = E58E60CC00E4F822C278E70E66C517E4DAEB31D7CCD98A6384ADFD209168371EB10E8A510FA71B66A7BB4117491FF0D8
5,748,174 UART: Caliptra RT
5,748,517 UART: [state] CFI Enabled
5,868,961 UART: [rt] RT listening for mailbox commands...
5,869,631 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,992,905 UART: [rt]cmd =0x41544d4e, len=14344
8,344,529 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
891,424 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,528 UART: [kat] ++
895,680 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,591 UART: [kat] SHA2-512-ACC
906,492 UART: [kat] ECC-384
916,103 UART: [kat] HMAC-384Kdf
920,481 UART: [kat] LMS
1,168,793 UART: [kat] --
1,169,616 UART: [cold-reset] ++
1,169,962 UART: [fht] FHT @ 0x50003400
1,172,828 UART: [idev] ++
1,172,996 UART: [idev] CDI.KEYID = 6
1,173,357 UART: [idev] SUBJECT.KEYID = 7
1,173,782 UART: [idev] UDS.KEYID = 0
1,174,128 ready_for_fw is high
1,174,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,779 UART: [idev] Erasing UDS.KEYID = 0
1,198,653 UART: [idev] Sha1 KeyId Algorithm
1,207,661 UART: [idev] --
1,208,582 UART: [ldev] ++
1,208,750 UART: [ldev] CDI.KEYID = 6
1,209,114 UART: [ldev] SUBJECT.KEYID = 5
1,209,541 UART: [ldev] AUTHORITY.KEYID = 7
1,210,004 UART: [ldev] FE.KEYID = 1
1,215,166 UART: [ldev] Erasing FE.KEYID = 1
1,240,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,928 UART: [ldev] --
1,280,281 UART: [fwproc] Wait for Commands...
1,281,096 UART: [fwproc] Recv command 0x46574c44
1,281,829 UART: [fwproc] Recv'd Img size: 118548 bytes
3,162,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,191,091 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,222,266 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,362,623 >>> mbox cmd response: success
3,363,817 UART: [afmc] ++
3,363,985 UART: [afmc] CDI.KEYID = 6
3,364,348 UART: [afmc] SUBJECT.KEYID = 7
3,364,774 UART: [afmc] AUTHORITY.KEYID = 5
3,400,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,417,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,417,749 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,423,456 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,429,333 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,435,043 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,442,757 UART: [afmc] --
3,443,612 UART: [cold-reset] --
3,444,456 UART: [state] Locking Datavault
3,445,469 UART: [state] Locking PCR0, PCR1 and PCR31
3,446,073 UART: [state] Locking ICCM
3,446,741 UART: [exit] Launching FMC @ 0x40000130
3,452,071 UART:
3,452,087 UART: Running Caliptra FMC ...
3,452,495 UART:
3,452,549 UART: [state] CFI Enabled
3,463,197 UART: [fht] FMC Alias Private Key: 7
3,581,987 UART: [art] Extend RT PCRs Done
3,582,415 UART: [art] Lock RT PCRs Done
3,583,927 UART: [art] Populate DV Done
3,592,452 UART: [fht] FMC Alias Private Key: 7
3,593,428 UART: [art] Derive CDI
3,593,708 UART: [art] Store in slot 0x4
3,679,593 UART: [art] Derive Key Pair
3,679,953 UART: [art] Store priv key in slot 0x5
3,693,339 UART: [art] Derive Key Pair - Done
3,708,235 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,723,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,724,357 UART: [art] PUB.X = 723117B65AE65B1D5A31FB35122C842FEF8923E98FA1CA14A80DB6D7335DC9578D817E18C1D98EA299623CCAE14983BF
3,731,132 UART: [art] PUB.Y = 364007DE1601EA28F9D9524CC3D61C00C6AD96EC5E31DD7C3E752D88C73C0F5DE08F76FDD54AD0528770B5C2304E082A
3,738,058 UART: [art] SIG.R = 33A3B9C57D68A63E8CAEE455411CEA5C5D4F461DEC9F6182314A59BFBA7445975AC59CE885F6C53E6ED724BEF0AB6320
3,744,844 UART: [art] SIG.S = EEAE1380D050C0D2E365D9EB716F2E0C894586088D513AA1F1DC41936D5D84C473CE93881499C2FB4A3F37B68993A0C1
3,768,432 UART: Caliptra RT
3,768,683 UART: [state] CFI Enabled
3,888,875 UART: [rt] RT listening for mailbox commands...
3,889,545 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,899 UART: [rt]cmd =0x41544d4e, len=14344
4,681,950 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,056 ready_for_fw is high
1,059,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,221,251 >>> mbox cmd response: success
3,282,894 UART:
3,282,910 UART: Running Caliptra FMC ...
3,283,318 UART:
3,283,372 UART: [state] CFI Enabled
3,293,664 UART: [fht] FMC Alias Private Key: 7
3,412,204 UART: [art] Extend RT PCRs Done
3,412,632 UART: [art] Lock RT PCRs Done
3,414,102 UART: [art] Populate DV Done
3,422,425 UART: [fht] FMC Alias Private Key: 7
3,423,539 UART: [art] Derive CDI
3,423,819 UART: [art] Store in slot 0x4
3,509,154 UART: [art] Derive Key Pair
3,509,514 UART: [art] Store priv key in slot 0x5
3,522,848 UART: [art] Derive Key Pair - Done
3,537,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,552,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,553,608 UART: [art] PUB.X = 200C43ACA0810607B98155292C741D981187A823B660F49C665281DCD15B69BB6149C96F491DFE7B33DF0685F6BA36AC
3,560,364 UART: [art] PUB.Y = C20F1882E379BBCC905B3EE6A1614D2DE2FAD8D80D12BFC120A0A6030179323FC6387DAB196F3ADD1359E072BA719511
3,567,312 UART: [art] SIG.R = 1C052CD4B363ECA1666CB1F4A526DD8190B1DC5AFCEBE113B41874D683EA0FE92C433826C8E95BB4C4332B8669D91A22
3,574,088 UART: [art] SIG.S = 64FDCAC1433F5C2766E1EDC57D9CE19F1552247EE9949B3E50EDDA29D059663221507E4113742C77633A132099E6685E
3,597,222 UART: Caliptra RT
3,597,473 UART: [state] CFI Enabled
3,717,613 UART: [rt] RT listening for mailbox commands...
3,718,283 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,153 UART: [rt]cmd =0x41544d4e, len=14344
4,509,642 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,264 UART: [kat] SHA2-512-ACC
906,165 UART: [kat] ECC-384
916,226 UART: [kat] HMAC-384Kdf
920,994 UART: [kat] LMS
1,169,306 UART: [kat] --
1,170,241 UART: [cold-reset] ++
1,170,799 UART: [fht] FHT @ 0x50003400
1,173,485 UART: [idev] ++
1,173,653 UART: [idev] CDI.KEYID = 6
1,174,014 UART: [idev] SUBJECT.KEYID = 7
1,174,439 UART: [idev] UDS.KEYID = 0
1,174,785 ready_for_fw is high
1,174,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,274 UART: [idev] Erasing UDS.KEYID = 0
1,199,632 UART: [idev] Sha1 KeyId Algorithm
1,208,622 UART: [idev] --
1,209,767 UART: [ldev] ++
1,209,935 UART: [ldev] CDI.KEYID = 6
1,210,299 UART: [ldev] SUBJECT.KEYID = 5
1,210,726 UART: [ldev] AUTHORITY.KEYID = 7
1,211,189 UART: [ldev] FE.KEYID = 1
1,216,407 UART: [ldev] Erasing FE.KEYID = 1
1,242,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,723 UART: [ldev] --
1,282,068 UART: [fwproc] Wait for Commands...
1,282,805 UART: [fwproc] Recv command 0x46574c44
1,283,538 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,522 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,697 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,012 >>> mbox cmd response: success
3,370,082 UART: [afmc] ++
3,370,250 UART: [afmc] CDI.KEYID = 6
3,370,613 UART: [afmc] SUBJECT.KEYID = 7
3,371,039 UART: [afmc] AUTHORITY.KEYID = 5
3,406,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,422,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,380 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,429,087 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,434,964 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,440,674 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,448,542 UART: [afmc] --
3,449,583 UART: [cold-reset] --
3,450,763 UART: [state] Locking Datavault
3,452,182 UART: [state] Locking PCR0, PCR1 and PCR31
3,452,786 UART: [state] Locking ICCM
3,453,378 UART: [exit] Launching FMC @ 0x40000130
3,458,708 UART:
3,458,724 UART: Running Caliptra FMC ...
3,459,132 UART:
3,459,275 UART: [state] CFI Enabled
3,469,969 UART: [fht] FMC Alias Private Key: 7
3,589,077 UART: [art] Extend RT PCRs Done
3,589,505 UART: [art] Lock RT PCRs Done
3,590,855 UART: [art] Populate DV Done
3,598,884 UART: [fht] FMC Alias Private Key: 7
3,599,986 UART: [art] Derive CDI
3,600,266 UART: [art] Store in slot 0x4
3,685,989 UART: [art] Derive Key Pair
3,686,349 UART: [art] Store priv key in slot 0x5
3,700,321 UART: [art] Derive Key Pair - Done
3,714,935 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,730,310 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,075 UART: [art] PUB.X = 8BDEAFBAE107B7C841543C730FF7FF52E67A21CA7D58E5342ADBFEC9FC1026016550F2D7343EE6EE0CC0500CFA32F91C
3,737,852 UART: [art] PUB.Y = 1F14F7128A594EEC9D8A9B5AF8378BB1923BC2A9BBCBB21366C491CF85CBC730D5BD5A74F8F119BBF46810A78E2E421B
3,744,820 UART: [art] SIG.R = 699FEEDEA5DD7731D4BE5087381A961399865EDA8ECC6F90C8946CA834698F7B76C1D4ABAFA170BEE924099059A0F046
3,751,597 UART: [art] SIG.S = 30C2EDFB74CADB4731706B032EF34613595543E614E98A7ADA412AF6521E7E03D69E00D29175FD1C79E13C874EF3A4C3
3,775,741 UART: Caliptra RT
3,776,084 UART: [state] CFI Enabled
3,895,200 UART: [rt] RT listening for mailbox commands...
3,895,870 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,052 UART: [rt]cmd =0x41544d4e, len=14344
4,693,451 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,875 ready_for_fw is high
1,059,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,509 >>> mbox cmd response: success
3,287,574 UART:
3,287,590 UART: Running Caliptra FMC ...
3,287,998 UART:
3,288,141 UART: [state] CFI Enabled
3,298,253 UART: [fht] FMC Alias Private Key: 7
3,417,243 UART: [art] Extend RT PCRs Done
3,417,671 UART: [art] Lock RT PCRs Done
3,419,045 UART: [art] Populate DV Done
3,427,202 UART: [fht] FMC Alias Private Key: 7
3,428,342 UART: [art] Derive CDI
3,428,622 UART: [art] Store in slot 0x4
3,513,985 UART: [art] Derive Key Pair
3,514,345 UART: [art] Store priv key in slot 0x5
3,527,717 UART: [art] Derive Key Pair - Done
3,542,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,557,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,558,624 UART: [art] PUB.X = 8BD86479F84398DE752E6D01D3519699BC6F2669C38305E69202C4A7E40093053C10FC5E2552EC45F516BE04D57E1898
3,565,349 UART: [art] PUB.Y = EDC310456089BF2F575EBFFA93403F0405BDE81D043A000B5AE359F750247A76A7DDCBC691CF46FEC4B70FFA1346FB5E
3,572,280 UART: [art] SIG.R = F46E6B703BE8C31F4832C9FFC24C6F51A0A83323B316DA06FBECFB0AC36230C292632771AFFC55F0BE4174244443F945
3,579,052 UART: [art] SIG.S = 1573B1749E48875ACF39E94607A83C7D4FCD90F6ACA35A9DC24EF138D01E5FC83CEEDEA2AA593B53CC8BB8F839DEFC1C
3,602,761 UART: Caliptra RT
3,603,104 UART: [state] CFI Enabled
3,723,356 UART: [rt] RT listening for mailbox commands...
3,724,026 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,160 UART: [rt]cmd =0x41544d4e, len=14344
4,514,090 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,814 UART: [state] LifecycleState = Unprovisioned
85,469 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
893,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,299 UART: [kat] ++
897,451 UART: [kat] sha1
901,705 UART: [kat] SHA2-256
903,645 UART: [kat] SHA2-384
906,452 UART: [kat] SHA2-512-ACC
908,353 UART: [kat] ECC-384
918,508 UART: [kat] HMAC-384Kdf
923,154 UART: [kat] LMS
1,171,482 UART: [kat] --
1,172,333 UART: [cold-reset] ++
1,172,771 UART: [fht] FHT @ 0x50003400
1,175,362 UART: [idev] ++
1,175,530 UART: [idev] CDI.KEYID = 6
1,175,890 UART: [idev] SUBJECT.KEYID = 7
1,176,314 UART: [idev] UDS.KEYID = 0
1,176,659 ready_for_fw is high
1,176,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,642 UART: [idev] Erasing UDS.KEYID = 0
1,201,517 UART: [idev] Sha1 KeyId Algorithm
1,209,905 UART: [idev] --
1,211,045 UART: [ldev] ++
1,211,213 UART: [ldev] CDI.KEYID = 6
1,211,576 UART: [ldev] SUBJECT.KEYID = 5
1,212,002 UART: [ldev] AUTHORITY.KEYID = 7
1,212,465 UART: [ldev] FE.KEYID = 1
1,217,787 UART: [ldev] Erasing FE.KEYID = 1
1,244,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,447 UART: [ldev] --
1,283,860 UART: [fwproc] Wait for Commands...
1,284,542 UART: [fwproc] Recv command 0x46574c44
1,285,270 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,822 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,992 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,159 >>> mbox cmd response: success
3,379,213 UART: [afmc] ++
3,379,381 UART: [afmc] CDI.KEYID = 6
3,379,743 UART: [afmc] SUBJECT.KEYID = 7
3,380,168 UART: [afmc] AUTHORITY.KEYID = 5
3,415,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,754 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,460 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,339 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,049 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,096 UART: [afmc] --
3,459,048 UART: [cold-reset] --
3,459,948 UART: [state] Locking Datavault
3,461,143 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,747 UART: [state] Locking ICCM
3,462,217 UART: [exit] Launching FMC @ 0x40000130
3,467,547 UART:
3,467,563 UART: Running Caliptra FMC ...
3,467,971 UART:
3,468,025 UART: [state] CFI Enabled
3,478,559 UART: [fht] FMC Alias Private Key: 7
3,597,319 UART: [art] Extend RT PCRs Done
3,597,747 UART: [art] Lock RT PCRs Done
3,599,293 UART: [art] Populate DV Done
3,607,674 UART: [fht] FMC Alias Private Key: 7
3,608,664 UART: [art] Derive CDI
3,608,944 UART: [art] Store in slot 0x4
3,695,015 UART: [art] Derive Key Pair
3,695,375 UART: [art] Store priv key in slot 0x5
3,708,451 UART: [art] Derive Key Pair - Done
3,723,237 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,838 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,603 UART: [art] PUB.X = CC44418167FB29D8B8B430DE180A2B1D7C59CEF98CB07356F41A8468ECFEAAC96BBCDA126DC5DC505D08A75D87BC055F
3,746,386 UART: [art] PUB.Y = 4A0B7D7D330157DDBC4CFDA78129A94AF6BA0CFCD18451EE8944B1B05ED4E0AA859736D6273D4394645DF494A7B1D8A3
3,753,341 UART: [art] SIG.R = 33BFDB3C24072B35D8AFE8110D9E2E96B809A7357B044EFDDA709E66DA1D377EAF79C0A3ABDDC91E4CDF5A3F3CA83624
3,760,123 UART: [art] SIG.S = DABFC3F4E812BE2C2A2C04741E18D5EBF525AAF38F35E9FB5F35000A0A74720F371A91BAEC193E7C3A1E6D404192EED5
3,783,653 UART: Caliptra RT
3,783,904 UART: [state] CFI Enabled
3,903,496 UART: [rt] RT listening for mailbox commands...
3,904,166 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,026,912 UART: [rt]cmd =0x41544d4e, len=14344
4,701,223 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,123 ready_for_fw is high
1,061,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,141 >>> mbox cmd response: success
3,285,168 UART:
3,285,184 UART: Running Caliptra FMC ...
3,285,592 UART:
3,285,646 UART: [state] CFI Enabled
3,296,170 UART: [fht] FMC Alias Private Key: 7
3,414,726 UART: [art] Extend RT PCRs Done
3,415,154 UART: [art] Lock RT PCRs Done
3,416,726 UART: [art] Populate DV Done
3,424,803 UART: [fht] FMC Alias Private Key: 7
3,425,797 UART: [art] Derive CDI
3,426,077 UART: [art] Store in slot 0x4
3,511,748 UART: [art] Derive Key Pair
3,512,108 UART: [art] Store priv key in slot 0x5
3,525,674 UART: [art] Derive Key Pair - Done
3,540,366 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,033 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,798 UART: [art] PUB.X = 2B5BDAEF97FAC2CB903FCA8AB482CC14AAB2C50F357A309C3855F4543F9D6B92394060C9FB35406C5C52F23DBFCEC259
3,563,585 UART: [art] PUB.Y = 5DCDF68B69F3835045868DA696B8720D723781681238CB4EBD6538578D4ABEF8D1F0F2BC25A178A90CAE69F90125E052
3,570,528 UART: [art] SIG.R = 66011C38AF85DAA3A9FCC983A61AD6AFDC678EF5F1532C1EA816765A95C72F7005B0F78EAB37E0E953445F3D3FD3DFC1
3,577,310 UART: [art] SIG.S = BBFDDCD54F3B4CB8D4C223DFF920DE970F24461F225138C6CB0FD24F6A117A75011E9ABC83B14BBEA57DBD1C86C3DF2D
3,600,807 UART: Caliptra RT
3,601,058 UART: [state] CFI Enabled
3,719,834 UART: [rt] RT listening for mailbox commands...
3,720,504 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,606 UART: [rt]cmd =0x41544d4e, len=14344
4,504,564 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
893,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,440 UART: [kat] ++
897,592 UART: [kat] sha1
901,988 UART: [kat] SHA2-256
903,928 UART: [kat] SHA2-384
906,703 UART: [kat] SHA2-512-ACC
908,604 UART: [kat] ECC-384
917,693 UART: [kat] HMAC-384Kdf
922,177 UART: [kat] LMS
1,170,505 UART: [kat] --
1,171,678 UART: [cold-reset] ++
1,172,212 UART: [fht] FHT @ 0x50003400
1,174,957 UART: [idev] ++
1,175,125 UART: [idev] CDI.KEYID = 6
1,175,485 UART: [idev] SUBJECT.KEYID = 7
1,175,909 UART: [idev] UDS.KEYID = 0
1,176,254 ready_for_fw is high
1,176,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,259 UART: [idev] Erasing UDS.KEYID = 0
1,202,016 UART: [idev] Sha1 KeyId Algorithm
1,210,406 UART: [idev] --
1,211,288 UART: [ldev] ++
1,211,456 UART: [ldev] CDI.KEYID = 6
1,211,819 UART: [ldev] SUBJECT.KEYID = 5
1,212,245 UART: [ldev] AUTHORITY.KEYID = 7
1,212,708 UART: [ldev] FE.KEYID = 1
1,217,900 UART: [ldev] Erasing FE.KEYID = 1
1,244,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,726 UART: [ldev] --
1,284,229 UART: [fwproc] Wait for Commands...
1,284,849 UART: [fwproc] Recv command 0x46574c44
1,285,577 UART: [fwproc] Recv'd Img size: 118548 bytes
3,179,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,207,853 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,239,023 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,379,220 >>> mbox cmd response: success
3,380,294 UART: [afmc] ++
3,380,462 UART: [afmc] CDI.KEYID = 6
3,380,824 UART: [afmc] SUBJECT.KEYID = 7
3,381,249 UART: [afmc] AUTHORITY.KEYID = 5
3,416,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,433,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,434,115 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,439,821 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,445,700 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,451,410 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,459,167 UART: [afmc] --
3,460,227 UART: [cold-reset] --
3,460,919 UART: [state] Locking Datavault
3,461,982 UART: [state] Locking PCR0, PCR1 and PCR31
3,462,586 UART: [state] Locking ICCM
3,463,248 UART: [exit] Launching FMC @ 0x40000130
3,468,578 UART:
3,468,594 UART: Running Caliptra FMC ...
3,469,002 UART:
3,469,145 UART: [state] CFI Enabled
3,479,545 UART: [fht] FMC Alias Private Key: 7
3,599,175 UART: [art] Extend RT PCRs Done
3,599,603 UART: [art] Lock RT PCRs Done
3,601,223 UART: [art] Populate DV Done
3,609,722 UART: [fht] FMC Alias Private Key: 7
3,610,800 UART: [art] Derive CDI
3,611,080 UART: [art] Store in slot 0x4
3,696,895 UART: [art] Derive Key Pair
3,697,255 UART: [art] Store priv key in slot 0x5
3,710,787 UART: [art] Derive Key Pair - Done
3,725,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,741,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,741,892 UART: [art] PUB.X = D36EA51961D37A3831E0F9BCD516C1F24D24CEF4A3EE5678AD3992FFCBB5B0EA44F98406E6DE18E8264F2575A0A3BA9F
3,748,677 UART: [art] PUB.Y = F51DDB6E6FBDFEB804B24E7872AA1F4D97EC571425D76E44A77EC8295E5E8C4138A4E6847926977D7E90B2318ACBEF53
3,755,636 UART: [art] SIG.R = 0774263943362E23B48C70493281771D66EC497259F6F3CD8A56526C7344867310B1F32757E48F60B751729876D570B0
3,762,379 UART: [art] SIG.S = 9B8065F0CFED639F02A90ED3F9D54F2C2A564C2B35D60D8BE5A19100C4463E475A25F57BD2671E136DF520FEAFDB2285
3,786,312 UART: Caliptra RT
3,786,655 UART: [state] CFI Enabled
3,906,097 UART: [rt] RT listening for mailbox commands...
3,906,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,781 UART: [rt]cmd =0x41544d4e, len=14344
4,691,407 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,720 ready_for_fw is high
1,060,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,534 >>> mbox cmd response: success
3,280,607 UART:
3,280,623 UART: Running Caliptra FMC ...
3,281,031 UART:
3,281,174 UART: [state] CFI Enabled
3,291,862 UART: [fht] FMC Alias Private Key: 7
3,411,884 UART: [art] Extend RT PCRs Done
3,412,312 UART: [art] Lock RT PCRs Done
3,413,828 UART: [art] Populate DV Done
3,422,203 UART: [fht] FMC Alias Private Key: 7
3,423,273 UART: [art] Derive CDI
3,423,553 UART: [art] Store in slot 0x4
3,509,464 UART: [art] Derive Key Pair
3,509,824 UART: [art] Store priv key in slot 0x5
3,523,728 UART: [art] Derive Key Pair - Done
3,538,475 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,553,774 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,539 UART: [art] PUB.X = 28318A33735475A5A0AB817B3990604FEB8BBE27A46435AF53D701604B28117032352907C3CB7216CA7665C544138B9E
3,561,291 UART: [art] PUB.Y = 8AAB50CE7E83F80E9797AAF78C92DBEBD64D5BD1A4F01364F2F29C78FC4509345D9B1FD66AAF92795CB0CC93904E1453
3,568,251 UART: [art] SIG.R = F06ACECA0FB0ACF3B0247CAD654C77CB06015AF2365ABA06F11160C5F1E905AD44349FC7793093A97BB41D7AEB66BB37
3,575,024 UART: [art] SIG.S = E4DB10A88E24546AF43ECA783CE389A112045C6A045EDFBE26332376B335DEFDB0AD4FA753701EA82ECC20D4EC2B51CD
3,598,412 UART: Caliptra RT
3,598,755 UART: [state] CFI Enabled
3,718,394 UART: [rt] RT listening for mailbox commands...
3,719,064 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,140 UART: [rt]cmd =0x41544d4e, len=14344
4,514,004 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,062 UART:
192,479 UART: Running Caliptra ROM ...
193,591 UART:
193,740 UART: [state] CFI Enabled
263,010 UART: [state] LifecycleState = Unprovisioned
265,008 UART: [state] DebugLocked = No
267,974 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,222 UART: [kat] SHA2-256
441,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,413 UART: [kat] ++
453,053 UART: [kat] sha1
463,016 UART: [kat] SHA2-256
465,683 UART: [kat] SHA2-384
471,037 UART: [kat] SHA2-512-ACC
473,416 UART: [kat] ECC-384
2,765,888 UART: [kat] HMAC-384Kdf
2,777,856 UART: [kat] LMS
3,968,130 UART: [kat] --
3,973,369 UART: [cold-reset] ++
3,974,910 UART: [fht] Storing FHT @ 0x50003400
3,986,256 UART: [idev] ++
3,986,823 UART: [idev] CDI.KEYID = 6
3,987,732 UART: [idev] SUBJECT.KEYID = 7
3,988,999 UART: [idev] UDS.KEYID = 0
3,990,055 ready_for_fw is high
3,990,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,337 UART: [idev] Erasing UDS.KEYID = 0
7,323,454 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,043 UART: [idev] --
7,347,875 UART: [ldev] ++
7,348,508 UART: [ldev] CDI.KEYID = 6
7,349,419 UART: [ldev] SUBJECT.KEYID = 5
7,350,635 UART: [ldev] AUTHORITY.KEYID = 7
7,351,920 UART: [ldev] FE.KEYID = 1
7,399,668 UART: [ldev] Erasing FE.KEYID = 1
10,730,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,748 UART: [ldev] --
13,091,986 UART: [fwproc] Waiting for Commands...
13,094,854 UART: [fwproc] Received command 0x46574c44
13,097,061 UART: [fwproc] Received Image of size 118548 bytes
22,029,701 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,111,092 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,184,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,513,493 >>> mbox cmd response: success
22,518,348 UART: [afmc] ++
22,518,958 UART: [afmc] CDI.KEYID = 6
22,519,844 UART: [afmc] SUBJECT.KEYID = 7
22,521,115 UART: [afmc] AUTHORITY.KEYID = 5
25,891,366 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,189,793 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,192,109 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,206,576 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,221,367 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,235,749 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,257,472 UART: [afmc] --
28,261,495 UART: [cold-reset] --
28,266,864 UART: [state] Locking Datavault
28,272,651 UART: [state] Locking PCR0, PCR1 and PCR31
28,274,403 UART: [state] Locking ICCM
28,275,452 UART: [exit] Launching FMC @ 0x40000130
28,283,844 UART:
28,284,089 UART: Running Caliptra FMC ...
28,285,195 UART:
28,285,351 UART: [state] CFI Enabled
28,348,313 UART: [fht] FMC Alias Private Key: 7
30,689,229 UART: [art] Extend RT PCRs Done
30,690,449 UART: [art] Lock RT PCRs Done
30,692,114 UART: [art] Populate DV Done
30,697,488 UART: [fht] FMC Alias Private Key: 7
30,699,145 UART: [art] Derive CDI
30,699,886 UART: [art] Store in slot 0x4
30,757,141 UART: [art] Derive Key Pair
30,758,140 UART: [art] Store priv key in slot 0x5
34,050,940 UART: [art] Derive Key Pair - Done
34,063,803 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,352,041 UART: [art] Erasing AUTHORITY.KEYID = 7
36,353,557 UART: [art] PUB.X = 0C9149561B929EAD04116507A34089055222C8AE4342CE390C8B80F1B010FF666A0B0B24C5E25B55876BD5345B517142
36,360,775 UART: [art] PUB.Y = 788C3F21C75ACA460463F7E5A731A86014ECF305C445B6E35B4FD64C46BAF137CE6AE4B530B3E4A8FBD56BC6C24D3664
36,368,077 UART: [art] SIG.R = 338B5A4911D30D43202F2D111C974876514F454C444DD6B03DE4B8E7DFDF215778C0C464F7A320912BE4C43396980C5E
36,375,487 UART: [art] SIG.S = E4A9340B02326C46DA42C75D223059BB4E1C09D4DB42929355C714A43F729C218A089D57A25472B690AF052717C38CB6
37,680,616 UART: Caliptra RT
37,681,312 UART: [state] CFI Enabled
37,877,019 UART: [rt] RT listening for mailbox commands...
37,879,357 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,034,998 UART: [rt]cmd =0x41544d4e, len=14344
43,474,501 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,807,012 ready_for_fw is high
3,807,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,087,823 >>> mbox cmd response: success
27,773,062 UART:
27,773,512 UART: Running Caliptra FMC ...
27,774,636 UART:
27,774,795 UART: [state] CFI Enabled
27,839,334 UART: [fht] FMC Alias Private Key: 7
30,200,166 UART: [art] Extend RT PCRs Done
30,201,396 UART: [art] Lock RT PCRs Done
30,202,856 UART: [art] Populate DV Done
30,208,482 UART: [fht] FMC Alias Private Key: 7
30,209,923 UART: [art] Derive CDI
30,210,843 UART: [art] Store in slot 0x4
30,268,599 UART: [art] Derive Key Pair
30,269,637 UART: [art] Store priv key in slot 0x5
33,562,484 UART: [art] Derive Key Pair - Done
33,575,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,863,914 UART: [art] Erasing AUTHORITY.KEYID = 7
35,865,440 UART: [art] PUB.X = 726527922E227D691CD52C5B8F73FA8794E6416E84D086660EC2E39F4A297611A56416C7FF85A71919FE1BE29788575B
35,872,716 UART: [art] PUB.Y = DE8C5E81676D869B846E21405379CF4858859D40BDB5F659112751A032D1737355ED067EFAFAADFBAF0FF98F23B985D2
35,879,948 UART: [art] SIG.R = CB58EEB62DC07FEDDBC44C48B2697625497F192BC2102306157239FC1E2E6B4960D13AF64AD654DF96A9F53B3E1FE2BB
35,887,291 UART: [art] SIG.S = 24226F1A70DFE92C44E377C251E749E9DABDA2F5151C9FB2E4DAEB0431B05D0509AA6AD11D5ADA08DAFFB6186D7E82FF
37,192,263 UART: Caliptra RT
37,192,995 UART: [state] CFI Enabled
37,369,122 UART: [rt] RT listening for mailbox commands...
37,371,464 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,526,894 UART: [rt]cmd =0x41544d4e, len=14344
43,017,809 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,446 UART:
192,822 UART: Running Caliptra ROM ...
193,974 UART:
603,832 UART: [state] CFI Enabled
617,519 UART: [state] LifecycleState = Unprovisioned
619,440 UART: [state] DebugLocked = No
621,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,914 UART: [kat] SHA2-256
796,642 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,169 UART: [kat] ++
807,768 UART: [kat] sha1
818,644 UART: [kat] SHA2-256
821,293 UART: [kat] SHA2-384
828,132 UART: [kat] SHA2-512-ACC
830,436 UART: [kat] ECC-384
3,113,764 UART: [kat] HMAC-384Kdf
3,126,727 UART: [kat] LMS
4,316,829 UART: [kat] --
4,320,937 UART: [cold-reset] ++
4,322,091 UART: [fht] Storing FHT @ 0x50003400
4,333,642 UART: [idev] ++
4,334,210 UART: [idev] CDI.KEYID = 6
4,335,186 UART: [idev] SUBJECT.KEYID = 7
4,336,439 UART: [idev] UDS.KEYID = 0
4,337,539 ready_for_fw is high
4,337,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,694 UART: [idev] Erasing UDS.KEYID = 0
7,627,293 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,576 UART: [idev] --
7,654,153 UART: [ldev] ++
7,654,758 UART: [ldev] CDI.KEYID = 6
7,655,669 UART: [ldev] SUBJECT.KEYID = 5
7,656,876 UART: [ldev] AUTHORITY.KEYID = 7
7,658,157 UART: [ldev] FE.KEYID = 1
7,667,769 UART: [ldev] Erasing FE.KEYID = 1
10,958,681 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,390 UART: [ldev] --
13,318,459 UART: [fwproc] Waiting for Commands...
13,321,629 UART: [fwproc] Received command 0x46574c44
13,323,804 UART: [fwproc] Received Image of size 118548 bytes
21,375,358 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,455,666 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,528,840 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,856,753 >>> mbox cmd response: success
21,860,464 UART: [afmc] ++
21,861,055 UART: [afmc] CDI.KEYID = 6
21,861,971 UART: [afmc] SUBJECT.KEYID = 7
21,863,236 UART: [afmc] AUTHORITY.KEYID = 5
25,178,263 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,472,310 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,474,562 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,489,089 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,503,833 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,518,262 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,539,221 UART: [afmc] --
27,542,487 UART: [cold-reset] --
27,547,857 UART: [state] Locking Datavault
27,554,455 UART: [state] Locking PCR0, PCR1 and PCR31
27,556,146 UART: [state] Locking ICCM
27,557,836 UART: [exit] Launching FMC @ 0x40000130
27,566,223 UART:
27,566,460 UART: Running Caliptra FMC ...
27,567,551 UART:
27,567,708 UART: [state] CFI Enabled
27,575,593 UART: [fht] FMC Alias Private Key: 7
29,915,976 UART: [art] Extend RT PCRs Done
29,917,193 UART: [art] Lock RT PCRs Done
29,918,917 UART: [art] Populate DV Done
29,924,485 UART: [fht] FMC Alias Private Key: 7
29,926,234 UART: [art] Derive CDI
29,927,041 UART: [art] Store in slot 0x4
29,969,253 UART: [art] Derive Key Pair
29,970,251 UART: [art] Store priv key in slot 0x5
33,212,380 UART: [art] Derive Key Pair - Done
33,225,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,505,558 UART: [art] Erasing AUTHORITY.KEYID = 7
35,507,061 UART: [art] PUB.X = C6D2D73A4ECD95B86D685E11E2230E2670AE6C9522F2F04004A2F8423CCDD82C6F8DA99EB087A967D27CDAEAC16D1710
35,514,316 UART: [art] PUB.Y = E98106649EAF659B20FB4D1047D838E6688AC4CB94C9A4AC6AED6F477E7676764D1ED08E563ED284BA9B02F56CE95041
35,521,602 UART: [art] SIG.R = 963B793B1A7676B58303AF1C1BDDFCF95351D88130315562DC6D87ADACBC1BEC26DC0911DEFFD9ABB594E74D09CE943B
35,528,993 UART: [art] SIG.S = A56F6C533111D1C26B0642311ABDCB542DA3C4C00D1F16AF661428387B6874BC1A8B58F02F843EB60E229B5B3F1A41EA
36,834,564 UART: Caliptra RT
36,835,261 UART: [state] CFI Enabled
36,968,649 UART: [rt] RT listening for mailbox commands...
36,971,018 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,126,453 UART: [rt]cmd =0x41544d4e, len=14344
42,617,290 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,127,489 ready_for_fw is high
4,127,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,213,652 >>> mbox cmd response: success
27,863,217 UART:
27,863,599 UART: Running Caliptra FMC ...
27,864,748 UART:
27,864,906 UART: [state] CFI Enabled
27,872,998 UART: [fht] FMC Alias Private Key: 7
30,213,509 UART: [art] Extend RT PCRs Done
30,214,728 UART: [art] Lock RT PCRs Done
30,216,298 UART: [art] Populate DV Done
30,221,756 UART: [fht] FMC Alias Private Key: 7
30,223,289 UART: [art] Derive CDI
30,224,098 UART: [art] Store in slot 0x4
30,266,528 UART: [art] Derive Key Pair
30,267,523 UART: [art] Store priv key in slot 0x5
33,510,451 UART: [art] Derive Key Pair - Done
33,523,453 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,803,393 UART: [art] Erasing AUTHORITY.KEYID = 7
35,804,899 UART: [art] PUB.X = 6FDC63E4B550AA88D5B43A49D575128F338A746A3308C7FDB346348CBBD80B7B2EA96F8A4038CAB5C44B61DA422464C2
35,812,230 UART: [art] PUB.Y = 20DD512E52BC581368EBD382B064FD9B5B622236FA1DC505D2B025AFEE157D2F20DCAF4D1EE35247933BB2705CC77A34
35,819,447 UART: [art] SIG.R = 16C307E2619B68972C43FE99C9038D11FA7EB761C59A81ADE7B1C1CAE9CAAFC52348C1CC3A36A20D987A1F53D3DBD06F
35,826,901 UART: [art] SIG.S = CED0320F2EB98A5971DA09D347E496D930F0061C1C77A60BE952D4291A425C6DD38295AE9882346C09EE32E709F28BAB
37,131,811 UART: Caliptra RT
37,132,527 UART: [state] CFI Enabled
37,266,463 UART: [rt] RT listening for mailbox commands...
37,268,756 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,424,061 UART: [rt]cmd =0x41544d4e, len=14344
42,811,113 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,016 UART:
192,384 UART: Running Caliptra ROM ...
193,509 UART:
193,652 UART: [state] CFI Enabled
263,038 UART: [state] LifecycleState = Unprovisioned
265,013 UART: [state] DebugLocked = No
266,745 UART: [state] WD Timer not started. Device not locked for debugging
270,436 UART: [kat] SHA2-256
450,108 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,849 UART: [kat] ++
461,289 UART: [kat] sha1
472,515 UART: [kat] SHA2-256
475,159 UART: [kat] SHA2-384
481,426 UART: [kat] SHA2-512-ACC
483,798 UART: [kat] ECC-384
2,945,507 UART: [kat] HMAC-384Kdf
2,970,059 UART: [kat] LMS
3,446,603 UART: [kat] --
3,450,810 UART: [cold-reset] ++
3,453,086 UART: [fht] FHT @ 0x50003400
3,465,353 UART: [idev] ++
3,465,957 UART: [idev] CDI.KEYID = 6
3,466,842 UART: [idev] SUBJECT.KEYID = 7
3,468,106 UART: [idev] UDS.KEYID = 0
3,469,048 ready_for_fw is high
3,469,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,459 UART: [idev] Erasing UDS.KEYID = 0
5,988,460 UART: [idev] Sha1 KeyId Algorithm
6,012,068 UART: [idev] --
6,017,252 UART: [ldev] ++
6,018,495 UART: [ldev] CDI.KEYID = 6
6,019,399 UART: [ldev] SUBJECT.KEYID = 5
6,020,420 UART: [ldev] AUTHORITY.KEYID = 7
6,021,602 UART: [ldev] FE.KEYID = 1
6,056,474 UART: [ldev] Erasing FE.KEYID = 1
8,563,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,569 UART: [ldev] --
10,373,099 UART: [fwproc] Wait for Commands...
10,375,133 UART: [fwproc] Recv command 0x46574c44
10,377,162 UART: [fwproc] Recv'd Img size: 118548 bytes
14,904,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,983,007 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,055,983 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,383,698 >>> mbox cmd response: success
15,388,156 UART: [afmc] ++
15,388,744 UART: [afmc] CDI.KEYID = 6
15,389,681 UART: [afmc] SUBJECT.KEYID = 7
15,390,893 UART: [afmc] AUTHORITY.KEYID = 5
17,937,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,663,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,665,493 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,681,360 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,697,301 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,713,012 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,737,871 UART: [afmc] --
19,742,177 UART: [cold-reset] --
19,745,335 UART: [state] Locking Datavault
19,750,362 UART: [state] Locking PCR0, PCR1 and PCR31
19,752,110 UART: [state] Locking ICCM
19,754,660 UART: [exit] Launching FMC @ 0x40000130
19,763,056 UART:
19,763,292 UART: Running Caliptra FMC ...
19,764,386 UART:
19,764,541 UART: [state] CFI Enabled
19,821,064 UART: [fht] FMC Alias Private Key: 7
21,587,250 UART: [art] Extend RT PCRs Done
21,588,468 UART: [art] Lock RT PCRs Done
21,590,399 UART: [art] Populate DV Done
21,595,862 UART: [fht] FMC Alias Private Key: 7
21,597,446 UART: [art] Derive CDI
21,598,175 UART: [art] Store in slot 0x4
21,654,347 UART: [art] Derive Key Pair
21,655,380 UART: [art] Store priv key in slot 0x5
24,118,658 UART: [art] Derive Key Pair - Done
24,131,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,844,030 UART: [art] Erasing AUTHORITY.KEYID = 7
25,845,547 UART: [art] PUB.X = E01177985ED0C4F8AAB259B647F2B17B0248722E702B9BA3FA87889A98593D6F36E1C7E2FB82EEF6035202D0A1F2C3BC
25,852,800 UART: [art] PUB.Y = 714780AFC1443FC80DBC4ABCE97B4066F33D94D555EBF87154A31DAC88D270CC3865CFE2DF4448D9ADF17810D4BD354B
25,860,065 UART: [art] SIG.R = 9DB75934E07BDFDCD1A2D95572EA6C0CABAC9B8C07238AA37EA718430B703EE90D97DD11C75DAB416C457904B2308387
25,867,481 UART: [art] SIG.S = D6A470978AD6AA8B9DBB1F8FCE20353C31120BEBCECCA1E93A29DCD1ADD6A952CF5CF29F5635414A63DE3C815C050DD1
26,846,344 UART: Caliptra RT
26,847,046 UART: [state] CFI Enabled
27,027,461 UART: [rt] RT listening for mailbox commands...
27,029,838 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,185,256 UART: [rt]cmd =0x41544d4e, len=14344
30,553,825 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,462,765 ready_for_fw is high
3,463,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,408,848 >>> mbox cmd response: success
19,689,523 UART:
19,689,888 UART: Running Caliptra FMC ...
19,691,079 UART:
19,691,249 UART: [state] CFI Enabled
19,758,160 UART: [fht] FMC Alias Private Key: 7
21,524,591 UART: [art] Extend RT PCRs Done
21,525,804 UART: [art] Lock RT PCRs Done
21,527,483 UART: [art] Populate DV Done
21,532,907 UART: [fht] FMC Alias Private Key: 7
21,534,410 UART: [art] Derive CDI
21,535,169 UART: [art] Store in slot 0x4
21,591,126 UART: [art] Derive Key Pair
21,592,160 UART: [art] Store priv key in slot 0x5
24,055,125 UART: [art] Derive Key Pair - Done
24,068,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,780,876 UART: [art] Erasing AUTHORITY.KEYID = 7
25,782,378 UART: [art] PUB.X = 7C4128CE1AB2E45414B634020747DEB56313B77ABB21E3BC66748080D947DFF77A2FB59D6A3A19EC6256AF9F4F2D61C1
25,789,651 UART: [art] PUB.Y = FBAFA7919F59A9E53ADA6284D21A2013D394394E3A9CBFB0CAB65BD3217A6AE91C1CDEBF54F8E56157AF8A740EC31155
25,796,958 UART: [art] SIG.R = DD5F06A79F945AAED316A403C99D33C6243BDA8EAA13146B898D23E0F1DE1D8B59789A5459114581562798F103786C27
25,804,303 UART: [art] SIG.S = 507801F397B6F5C16F7E24589B169B05F8AEA811286E703FE520F92425BCC3E1F0A60E4EBA36DFBE02FD03C343CE3CFA
26,783,526 UART: Caliptra RT
26,784,229 UART: [state] CFI Enabled
26,963,568 UART: [rt] RT listening for mailbox commands...
26,965,900 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,121,136 UART: [rt]cmd =0x41544d4e, len=14344
30,502,491 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,432 UART:
192,805 UART: Running Caliptra ROM ...
193,916 UART:
603,709 UART: [state] CFI Enabled
618,932 UART: [state] LifecycleState = Unprovisioned
620,878 UART: [state] DebugLocked = No
622,199 UART: [state] WD Timer not started. Device not locked for debugging
625,306 UART: [kat] SHA2-256
804,963 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,759 UART: [kat] ++
816,207 UART: [kat] sha1
828,504 UART: [kat] SHA2-256
831,159 UART: [kat] SHA2-384
837,507 UART: [kat] SHA2-512-ACC
839,878 UART: [kat] ECC-384
3,284,750 UART: [kat] HMAC-384Kdf
3,297,185 UART: [kat] LMS
3,773,706 UART: [kat] --
3,778,703 UART: [cold-reset] ++
3,780,501 UART: [fht] FHT @ 0x50003400
3,792,263 UART: [idev] ++
3,792,824 UART: [idev] CDI.KEYID = 6
3,793,796 UART: [idev] SUBJECT.KEYID = 7
3,795,048 UART: [idev] UDS.KEYID = 0
3,795,953 ready_for_fw is high
3,796,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,000 UART: [idev] Erasing UDS.KEYID = 0
6,271,396 UART: [idev] Sha1 KeyId Algorithm
6,295,487 UART: [idev] --
6,300,560 UART: [ldev] ++
6,301,130 UART: [ldev] CDI.KEYID = 6
6,302,017 UART: [ldev] SUBJECT.KEYID = 5
6,303,236 UART: [ldev] AUTHORITY.KEYID = 7
6,304,524 UART: [ldev] FE.KEYID = 1
6,315,825 UART: [ldev] Erasing FE.KEYID = 1
8,795,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,469 UART: [ldev] --
10,592,122 UART: [fwproc] Wait for Commands...
10,594,977 UART: [fwproc] Recv command 0x46574c44
10,597,026 UART: [fwproc] Recv'd Img size: 118548 bytes
15,134,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,211,451 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,284,472 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,613,165 >>> mbox cmd response: success
15,617,335 UART: [afmc] ++
15,617,946 UART: [afmc] CDI.KEYID = 6
15,618,895 UART: [afmc] SUBJECT.KEYID = 7
15,620,119 UART: [afmc] AUTHORITY.KEYID = 5
18,125,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,845,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,847,244 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,863,167 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,879,038 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,894,732 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,919,741 UART: [afmc] --
19,923,603 UART: [cold-reset] --
19,928,709 UART: [state] Locking Datavault
19,934,757 UART: [state] Locking PCR0, PCR1 and PCR31
19,936,461 UART: [state] Locking ICCM
19,938,453 UART: [exit] Launching FMC @ 0x40000130
19,946,906 UART:
19,947,146 UART: Running Caliptra FMC ...
19,948,253 UART:
19,948,409 UART: [state] CFI Enabled
19,956,024 UART: [fht] FMC Alias Private Key: 7
21,721,561 UART: [art] Extend RT PCRs Done
21,722,781 UART: [art] Lock RT PCRs Done
21,724,271 UART: [art] Populate DV Done
21,729,574 UART: [fht] FMC Alias Private Key: 7
21,731,225 UART: [art] Derive CDI
21,731,961 UART: [art] Store in slot 0x4
21,774,974 UART: [art] Derive Key Pair
21,776,033 UART: [art] Store priv key in slot 0x5
24,203,380 UART: [art] Derive Key Pair - Done
24,216,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,922,840 UART: [art] Erasing AUTHORITY.KEYID = 7
25,924,339 UART: [art] PUB.X = 9EC9DA03E57D6F954A428684F7CA885BE66C420C8A8E5E28BDEAE23AA6D339DFEBD654ADAFD67528DD83C1E09F9C7FF5
25,931,666 UART: [art] PUB.Y = 22401DF30E0E8A89D6FF05F6FA208551D9D48228197A46A385FCD29BD8FABA46F0603FC0B86F6085566BB145D526810C
25,938,899 UART: [art] SIG.R = 87682854704BE2D85138076F271E00B35A6B9B7E634B2A30E4EF383A0ACA73CEB45E59D841DAD20DBED530E359BEDD53
25,946,295 UART: [art] SIG.S = 9EFF879350D52C227C998B915F8D4622A896C35F81A64CDE0DD8EEC770F33E03FE6E08DB4B3F72380CEFA7107606435B
26,925,220 UART: Caliptra RT
26,925,903 UART: [state] CFI Enabled
27,057,744 UART: [rt] RT listening for mailbox commands...
27,060,127 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,215,542 UART: [rt]cmd =0x41544d4e, len=14344
30,604,818 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
3,774,358 ready_for_fw is high
3,774,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,589,320 >>> mbox cmd response: success
19,843,244 UART:
19,843,619 UART: Running Caliptra FMC ...
19,844,726 UART:
19,844,886 UART: [state] CFI Enabled
19,853,003 UART: [fht] FMC Alias Private Key: 7
21,618,708 UART: [art] Extend RT PCRs Done
21,619,967 UART: [art] Lock RT PCRs Done
21,621,568 UART: [art] Populate DV Done
21,626,889 UART: [fht] FMC Alias Private Key: 7
21,628,561 UART: [art] Derive CDI
21,629,306 UART: [art] Store in slot 0x4
21,671,801 UART: [art] Derive Key Pair
21,672,843 UART: [art] Store priv key in slot 0x5
24,100,215 UART: [art] Derive Key Pair - Done
24,112,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,819,286 UART: [art] Erasing AUTHORITY.KEYID = 7
25,820,786 UART: [art] PUB.X = 3949874F551346BA867D0A94A255D2E724DB80761668BE91758D1B3A5C7DF185279026F0A2799365F011B5AD0509C429
25,828,053 UART: [art] PUB.Y = AC06B55086E18872E79D40FD5D175A77B241C6270CFE0955A8763F83C746B5DC2959EA6AAEE8BBC7095FD8E11AAF0543
25,835,265 UART: [art] SIG.R = 15E8B715A9D722D9B212E2DE49C5C7AB7287A25FC402F295EF4C584E07850061B481849FA10047CB3B65D324D7FBCDC7
25,842,634 UART: [art] SIG.S = B71B3865F81A947DE33979A91873017D1F5C207AF5F03A7FF030761019E6883ACEFC2F571BB5C700D1577B061DF82772
26,821,229 UART: Caliptra RT
26,821,919 UART: [state] CFI Enabled
26,954,703 UART: [rt] RT listening for mailbox commands...
26,957,021 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,112,543 UART: [rt]cmd =0x41544d4e, len=14344
30,501,565 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,091 UART:
192,464 UART: Running Caliptra ROM ...
193,665 UART:
193,828 UART: [state] CFI Enabled
264,784 UART: [state] LifecycleState = Unprovisioned
267,205 UART: [state] DebugLocked = No
269,597 UART: [state] WD Timer not started. Device not locked for debugging
274,697 UART: [kat] SHA2-256
464,624 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,362 UART: [kat] ++
475,859 UART: [kat] sha1
486,801 UART: [kat] SHA2-256
489,835 UART: [kat] SHA2-384
495,751 UART: [kat] SHA2-512-ACC
498,327 UART: [kat] ECC-384
2,946,018 UART: [kat] HMAC-384Kdf
2,971,012 UART: [kat] LMS
3,502,788 UART: [kat] --
3,506,802 UART: [cold-reset] ++
3,509,442 UART: [fht] FHT @ 0x50003400
3,521,053 UART: [idev] ++
3,521,682 UART: [idev] CDI.KEYID = 6
3,522,630 UART: [idev] SUBJECT.KEYID = 7
3,523,868 UART: [idev] UDS.KEYID = 0
3,524,765 ready_for_fw is high
3,524,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,120 UART: [idev] Erasing UDS.KEYID = 0
6,028,091 UART: [idev] Sha1 KeyId Algorithm
6,051,673 UART: [idev] --
6,056,163 UART: [ldev] ++
6,056,840 UART: [ldev] CDI.KEYID = 6
6,057,720 UART: [ldev] SUBJECT.KEYID = 5
6,059,109 UART: [ldev] AUTHORITY.KEYID = 7
6,060,317 UART: [ldev] FE.KEYID = 1
6,099,725 UART: [ldev] Erasing FE.KEYID = 1
8,605,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,210 UART: [ldev] --
10,414,172 UART: [fwproc] Wait for Commands...
10,415,937 UART: [fwproc] Recv command 0x46574c44
10,418,186 UART: [fwproc] Recv'd Img size: 118548 bytes
15,105,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,190,519 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,314,133 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,874,486 >>> mbox cmd response: success
15,878,881 UART: [afmc] ++
15,879,606 UART: [afmc] CDI.KEYID = 6
15,880,796 UART: [afmc] SUBJECT.KEYID = 7
15,882,282 UART: [afmc] AUTHORITY.KEYID = 5
18,408,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,132,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,134,893 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,149,964 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,165,182 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,180,220 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,203,925 UART: [afmc] --
20,208,267 UART: [cold-reset] --
20,213,066 UART: [state] Locking Datavault
20,216,758 UART: [state] Locking PCR0, PCR1 and PCR31
20,219,124 UART: [state] Locking ICCM
20,220,851 UART: [exit] Launching FMC @ 0x40000130
20,229,536 UART:
20,229,767 UART: Running Caliptra FMC ...
20,230,788 UART:
20,230,929 UART: [state] CFI Enabled
20,290,205 UART: [fht] FMC Alias Private Key: 7
22,056,328 UART: [art] Extend RT PCRs Done
22,057,556 UART: [art] Lock RT PCRs Done
22,059,207 UART: [art] Populate DV Done
22,064,498 UART: [fht] FMC Alias Private Key: 7
22,065,995 UART: [art] Derive CDI
22,066,923 UART: [art] Store in slot 0x4
22,122,508 UART: [art] Derive Key Pair
22,123,525 UART: [art] Store priv key in slot 0x5
24,586,593 UART: [art] Derive Key Pair - Done
24,599,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,312,104 UART: [art] Erasing AUTHORITY.KEYID = 7
26,313,620 UART: [art] PUB.X = 95C10FE7C7B99FF87DDB4C703EC43F49868D8F88A396E7E525AE98197EB93B18F8ED15BD532C1B710047CA1FEC2F9B84
26,320,883 UART: [art] PUB.Y = EC66AF53EDEA03D5239A1C8BB0EA632582F1A683AE8081562C32CB43B1E9A8BC42A59B464A3B34E5FE57531B8DB53372
26,328,149 UART: [art] SIG.R = 15A0F333D177F510BC02EE6DF5BFD524058DCF321F92002626DA6AD2ADDF43D33F452726C9762A50456456A217CCB05F
26,335,521 UART: [art] SIG.S = 747B59B80D6BB9D51000A212A34AFA1EF399113F9FDF52DE99A4BC3880E6513B5E73FA9D1DB10A26612639A6736B6261
27,314,155 UART: Caliptra RT
27,314,870 UART: [state] CFI Enabled
27,494,167 UART: [rt] RT listening for mailbox commands...
27,496,495 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,651,991 UART: [rt]cmd =0x41544d4e, len=14344
31,029,976 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,439,556 ready_for_fw is high
3,440,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,933,130 >>> mbox cmd response: success
20,219,003 UART:
20,219,429 UART: Running Caliptra FMC ...
20,220,580 UART:
20,220,740 UART: [state] CFI Enabled
20,289,104 UART: [fht] FMC Alias Private Key: 7
22,056,026 UART: [art] Extend RT PCRs Done
22,057,266 UART: [art] Lock RT PCRs Done
22,058,791 UART: [art] Populate DV Done
22,064,251 UART: [fht] FMC Alias Private Key: 7
22,065,901 UART: [art] Derive CDI
22,066,717 UART: [art] Store in slot 0x4
22,122,367 UART: [art] Derive Key Pair
22,123,409 UART: [art] Store priv key in slot 0x5
24,585,958 UART: [art] Derive Key Pair - Done
24,598,620 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,311,561 UART: [art] Erasing AUTHORITY.KEYID = 7
26,313,070 UART: [art] PUB.X = EB8E47BAD49B7AC71CF58FA568B21BE812F523E1C4E77CB249B470110B16B58CF6B802623D25DC97BFFA1713A06CDC4D
26,320,289 UART: [art] PUB.Y = E61F77C254B0901238E86535D40C73D67A1A52BC5F6B2AD6A5389930B03688985AA7B9A2605A4B43754FFA87FA19ED7C
26,327,589 UART: [art] SIG.R = EE30417339B7E3E20C17315D9071CC5FF4754C8132CA954EB70EF944F5A9619F8F05874012C6910A0C4CDD549BDF2903
26,334,968 UART: [art] SIG.S = 150509C6F7D7C2E03834595F6E74006894B2187850D8D4DF5BD000904D95EC6CBDA954C85EB554A7906D34F668DDB105
27,313,498 UART: Caliptra RT
27,314,207 UART: [state] CFI Enabled
27,494,823 UART: [rt] RT listening for mailbox commands...
27,497,106 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,652,482 UART: [rt]cmd =0x41544d4e, len=14344
31,031,589 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
192,468 UART:
192,830 UART: Running Caliptra ROM ...
193,923 UART:
603,637 UART: [state] CFI Enabled
616,824 UART: [state] LifecycleState = Unprovisioned
619,223 UART: [state] DebugLocked = No
621,530 UART: [state] WD Timer not started. Device not locked for debugging
625,373 UART: [kat] SHA2-256
815,251 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,082 UART: [kat] ++
826,539 UART: [kat] sha1
837,770 UART: [kat] SHA2-256
840,791 UART: [kat] SHA2-384
847,270 UART: [kat] SHA2-512-ACC
849,797 UART: [kat] ECC-384
3,290,366 UART: [kat] HMAC-384Kdf
3,302,187 UART: [kat] LMS
3,834,040 UART: [kat] --
3,839,405 UART: [cold-reset] ++
3,841,345 UART: [fht] FHT @ 0x50003400
3,853,678 UART: [idev] ++
3,854,398 UART: [idev] CDI.KEYID = 6
3,855,318 UART: [idev] SUBJECT.KEYID = 7
3,856,567 UART: [idev] UDS.KEYID = 0
3,857,497 ready_for_fw is high
3,857,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,708 UART: [idev] Erasing UDS.KEYID = 0
6,330,635 UART: [idev] Sha1 KeyId Algorithm
6,353,322 UART: [idev] --
6,359,750 UART: [ldev] ++
6,360,434 UART: [ldev] CDI.KEYID = 6
6,361,320 UART: [ldev] SUBJECT.KEYID = 5
6,362,576 UART: [ldev] AUTHORITY.KEYID = 7
6,363,773 UART: [ldev] FE.KEYID = 1
6,374,105 UART: [ldev] Erasing FE.KEYID = 1
8,855,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,981 UART: [ldev] --
10,647,104 UART: [fwproc] Wait for Commands...
10,648,992 UART: [fwproc] Recv command 0x46574c44
10,651,306 UART: [fwproc] Recv'd Img size: 118548 bytes
15,324,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,405,597 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,529,200 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,089,306 >>> mbox cmd response: success
16,092,841 UART: [afmc] ++
16,093,579 UART: [afmc] CDI.KEYID = 6
16,094,782 UART: [afmc] SUBJECT.KEYID = 7
16,096,242 UART: [afmc] AUTHORITY.KEYID = 5
18,599,876 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,319,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,321,098 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,336,201 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,351,452 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,366,547 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,389,516 UART: [afmc] --
20,392,736 UART: [cold-reset] --
20,396,503 UART: [state] Locking Datavault
20,402,687 UART: [state] Locking PCR0, PCR1 and PCR31
20,404,854 UART: [state] Locking ICCM
20,407,551 UART: [exit] Launching FMC @ 0x40000130
20,416,186 UART:
20,416,426 UART: Running Caliptra FMC ...
20,417,531 UART:
20,417,697 UART: [state] CFI Enabled
20,425,805 UART: [fht] FMC Alias Private Key: 7
22,192,589 UART: [art] Extend RT PCRs Done
22,193,816 UART: [art] Lock RT PCRs Done
22,195,391 UART: [art] Populate DV Done
22,200,805 UART: [fht] FMC Alias Private Key: 7
22,202,346 UART: [art] Derive CDI
22,203,098 UART: [art] Store in slot 0x4
22,245,805 UART: [art] Derive Key Pair
22,246,813 UART: [art] Store priv key in slot 0x5
24,673,532 UART: [art] Derive Key Pair - Done
24,686,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,392,459 UART: [art] Erasing AUTHORITY.KEYID = 7
26,393,970 UART: [art] PUB.X = 5B137AA8CADF7BF39522F9FC5A1F5FA0E960B671D730A1789A0C6A3159E4BD6040EB1D707CD53C8355E6141B35EBEA9C
26,401,253 UART: [art] PUB.Y = 7806B367B3F19511A40E793A3813D32D2395D8BF61E685EDD8724D3CD28A23C3F85C8998DA29EB6EE0FFAE0F0CFB5982
26,408,508 UART: [art] SIG.R = 8A5373E47DEF811EE1CA3A2986F933C5A0AF9AD507573B2B3FBFED18E3F901CE1E6EE415EB47729FB1747460A79B9C9B
26,415,927 UART: [art] SIG.S = BFB90C2C6D340224F26D8B6EFEA23949FB3C6608D4E2A333459788386ADD439237DC63E6A2D14A97EF22864DE9E014BA
27,395,088 UART: Caliptra RT
27,395,780 UART: [state] CFI Enabled
27,528,189 UART: [rt] RT listening for mailbox commands...
27,530,475 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,685,683 UART: [rt]cmd =0x41544d4e, len=14344
31,070,975 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,753,107 ready_for_fw is high
3,753,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,135,530 >>> mbox cmd response: success
20,385,435 UART:
20,385,851 UART: Running Caliptra FMC ...
20,387,004 UART:
20,387,178 UART: [state] CFI Enabled
20,395,079 UART: [fht] FMC Alias Private Key: 7
22,160,980 UART: [art] Extend RT PCRs Done
22,162,204 UART: [art] Lock RT PCRs Done
22,163,888 UART: [art] Populate DV Done
22,169,198 UART: [fht] FMC Alias Private Key: 7
22,170,748 UART: [art] Derive CDI
22,171,588 UART: [art] Store in slot 0x4
22,214,192 UART: [art] Derive Key Pair
22,215,199 UART: [art] Store priv key in slot 0x5
24,642,322 UART: [art] Derive Key Pair - Done
24,655,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,361,482 UART: [art] Erasing AUTHORITY.KEYID = 7
26,362,996 UART: [art] PUB.X = 51829948DC05934C29F1B3B1C8DB7C6AFCA265C4F153AD7B305DD2AA049C6B89767E2E7930960B0B60F98430B7127142
26,370,215 UART: [art] PUB.Y = D664D5DC74F18AA90E23F81A006813D825F86C79FFD09BBA5806EFE238FD192276DDD910835945DA9A5CB90B1381D9C6
26,377,449 UART: [art] SIG.R = EC6109AA1956CE73E558A06DD92400EC0B5641F0B7D618494613BA8504D28F418D5E5287CFB68EFF85CA028A65E0CE2E
26,384,899 UART: [art] SIG.S = D07DF22052972C31B7029738B8AB832899C64A0DDD6BCF62144E53D2647B2D806AC07881F960527DBEC8BDAB97FC5042
27,363,433 UART: Caliptra RT
27,364,140 UART: [state] CFI Enabled
27,497,404 UART: [rt] RT listening for mailbox commands...
27,499,715 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,655,133 UART: [rt]cmd =0x41544d4e, len=14344
31,041,366 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,635 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,333 UART: [kat] SHA2-256
882,264 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,379 UART: [kat] ++
886,531 UART: [kat] sha1
890,849 UART: [kat] SHA2-256
892,787 UART: [kat] SHA2-384
895,576 UART: [kat] SHA2-512-ACC
897,477 UART: [kat] ECC-384
903,218 UART: [kat] HMAC-384Kdf
907,846 UART: [kat] LMS
1,476,042 UART: [kat] --
1,477,165 UART: [cold-reset] ++
1,477,705 UART: [fht] Storing FHT @ 0x50003400
1,480,442 UART: [idev] ++
1,480,610 UART: [idev] CDI.KEYID = 6
1,480,970 UART: [idev] SUBJECT.KEYID = 7
1,481,394 UART: [idev] UDS.KEYID = 0
1,481,739 ready_for_fw is high
1,481,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,230 UART: [idev] Erasing UDS.KEYID = 0
1,505,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,854 UART: [idev] --
1,514,937 UART: [ldev] ++
1,515,105 UART: [ldev] CDI.KEYID = 6
1,515,468 UART: [ldev] SUBJECT.KEYID = 5
1,515,894 UART: [ldev] AUTHORITY.KEYID = 7
1,516,357 UART: [ldev] FE.KEYID = 1
1,521,843 UART: [ldev] Erasing FE.KEYID = 1
1,546,866 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,056 UART: [ldev] --
1,586,383 UART: [fwproc] Waiting for Commands...
1,587,108 UART: [fwproc] Received command 0x46574c44
1,587,899 UART: [fwproc] Received Image of size 118548 bytes
5,205,663 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,233,469 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,264,687 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,405,016 >>> mbox cmd response: success
5,406,146 UART: [afmc] ++
5,406,314 UART: [afmc] CDI.KEYID = 6
5,406,676 UART: [afmc] SUBJECT.KEYID = 7
5,407,101 UART: [afmc] AUTHORITY.KEYID = 5
5,442,214 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,459,156 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,459,936 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,465,642 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,471,521 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,477,234 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,485,075 UART: [afmc] --
5,486,183 UART: [cold-reset] --
5,487,167 UART: [state] Locking Datavault
5,488,456 UART: [state] Locking PCR0, PCR1 and PCR31
5,489,060 UART: [state] Locking ICCM
5,489,542 UART: [exit] Launching FMC @ 0x40000130
5,494,872 UART:
5,494,888 UART: Running Caliptra FMC ...
5,495,296 UART:
5,495,350 UART: [state] CFI Enabled
5,505,640 UART: [fht] FMC Alias Private Key: 7
5,624,920 UART: [art] Extend RT PCRs Done
5,625,348 UART: [art] Lock RT PCRs Done
5,626,630 UART: [art] Populate DV Done
5,635,019 UART: [fht] FMC Alias Private Key: 7
5,636,125 UART: [art] Derive CDI
5,636,405 UART: [art] Store in slot 0x4
5,722,093 UART: [art] Derive Key Pair
5,722,453 UART: [art] Store priv key in slot 0x5
5,736,380 UART: [art] Derive Key Pair - Done
5,751,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,766,639 UART: [art] Erasing AUTHORITY.KEYID = 7
5,767,404 UART: [art] PUB.X = 620D3914530C0DE6B0348AC464497FEEFB656D8D0532338F10BB24BF93AD011BFE54F02082BAD5A98E454AF4AF4E2337
5,774,167 UART: [art] PUB.Y = 6E4C659C2C4ED635E16C1A256508853AE1B76E6BE4E55A4FC1E09C05F41B1098844EBDA007908ABBAAF674CF3CF67703
5,781,117 UART: [art] SIG.R = 5C5954F9E9AF8FB1B29F8812F75809BC3CF0D9C8FF6A3B26A617F45B28075BF9AE60188C7D8978E73E4DEAA80944E39B
5,787,890 UART: [art] SIG.S = 57452BBB8AE6729239846F0723B31B5C968DF7636128F8C86AAF62A7F19921E8574B05CAEEC375034BF39A86C1055176
5,811,812 UART: Caliptra RT
5,812,063 UART: [state] CFI Enabled
5,932,786 UART: [rt] RT listening for mailbox commands...
5,933,456 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,056,444 UART: [rt]cmd =0x41544d4e, len=14344
8,372,857 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,299 ready_for_fw is high
1,362,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,369,303 >>> mbox cmd response: success
5,430,894 UART:
5,430,910 UART: Running Caliptra FMC ...
5,431,318 UART:
5,431,372 UART: [state] CFI Enabled
5,442,156 UART: [fht] FMC Alias Private Key: 7
5,561,794 UART: [art] Extend RT PCRs Done
5,562,222 UART: [art] Lock RT PCRs Done
5,563,922 UART: [art] Populate DV Done
5,572,129 UART: [fht] FMC Alias Private Key: 7
5,573,095 UART: [art] Derive CDI
5,573,375 UART: [art] Store in slot 0x4
5,658,975 UART: [art] Derive Key Pair
5,659,335 UART: [art] Store priv key in slot 0x5
5,672,548 UART: [art] Derive Key Pair - Done
5,687,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,702,469 UART: [art] Erasing AUTHORITY.KEYID = 7
5,703,234 UART: [art] PUB.X = E736C1C9002987F3D4DF3E9C6CF47B75E3B9AF6DEA93CCB313600D91532E1DD89D067A7C2A7000185288FC7C2D678142
5,709,960 UART: [art] PUB.Y = A59B9DB491B8C57E3F6C4709F5A50FD8AED704C619F8803F1A1A1C29E65A24CC92A5E0BCF8520A4DF2CC630B3DFF6880
5,716,913 UART: [art] SIG.R = 33300BE9AA5612FD70A4B01F9B3971DFFCEC4AEDA844162CDF5BAFFFF2E3BB1243CADF5F2EB449E4C8B59060262A2697
5,723,704 UART: [art] SIG.S = 2F43CDAD00153A9877041EFBCC2E56B12D573CC4FD8675978BE3C0A39592F41A0A41CE197F7E3090D28F2593F9A1C042
5,747,160 UART: Caliptra RT
5,747,411 UART: [state] CFI Enabled
5,868,166 UART: [rt] RT listening for mailbox commands...
5,868,836 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,991,708 UART: [rt]cmd =0x41544d4e, len=14344
8,345,822 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,813 UART: [state] LifecycleState = Unprovisioned
86,468 UART: [state] DebugLocked = No
87,010 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,692 UART: [kat] SHA2-256
882,623 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,738 UART: [kat] ++
886,890 UART: [kat] sha1
891,298 UART: [kat] SHA2-256
893,236 UART: [kat] SHA2-384
896,045 UART: [kat] SHA2-512-ACC
897,946 UART: [kat] ECC-384
903,429 UART: [kat] HMAC-384Kdf
908,117 UART: [kat] LMS
1,476,313 UART: [kat] --
1,477,172 UART: [cold-reset] ++
1,477,744 UART: [fht] Storing FHT @ 0x50003400
1,480,657 UART: [idev] ++
1,480,825 UART: [idev] CDI.KEYID = 6
1,481,185 UART: [idev] SUBJECT.KEYID = 7
1,481,609 UART: [idev] UDS.KEYID = 0
1,481,954 ready_for_fw is high
1,481,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,849 UART: [idev] Erasing UDS.KEYID = 0
1,506,615 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,093 UART: [idev] --
1,516,226 UART: [ldev] ++
1,516,394 UART: [ldev] CDI.KEYID = 6
1,516,757 UART: [ldev] SUBJECT.KEYID = 5
1,517,183 UART: [ldev] AUTHORITY.KEYID = 7
1,517,646 UART: [ldev] FE.KEYID = 1
1,522,942 UART: [ldev] Erasing FE.KEYID = 1
1,548,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,489 UART: [ldev] --
1,587,896 UART: [fwproc] Waiting for Commands...
1,588,637 UART: [fwproc] Received command 0x46574c44
1,589,428 UART: [fwproc] Received Image of size 118548 bytes
5,243,869 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,271,463 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,302,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,443,064 >>> mbox cmd response: success
5,444,238 UART: [afmc] ++
5,444,406 UART: [afmc] CDI.KEYID = 6
5,444,768 UART: [afmc] SUBJECT.KEYID = 7
5,445,193 UART: [afmc] AUTHORITY.KEYID = 5
5,480,214 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,496,528 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,497,308 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,503,014 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,508,893 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,514,606 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,522,533 UART: [afmc] --
5,523,595 UART: [cold-reset] --
5,524,545 UART: [state] Locking Datavault
5,525,698 UART: [state] Locking PCR0, PCR1 and PCR31
5,526,302 UART: [state] Locking ICCM
5,526,758 UART: [exit] Launching FMC @ 0x40000130
5,532,088 UART:
5,532,104 UART: Running Caliptra FMC ...
5,532,512 UART:
5,532,655 UART: [state] CFI Enabled
5,542,909 UART: [fht] FMC Alias Private Key: 7
5,661,853 UART: [art] Extend RT PCRs Done
5,662,281 UART: [art] Lock RT PCRs Done
5,663,771 UART: [art] Populate DV Done
5,671,948 UART: [fht] FMC Alias Private Key: 7
5,672,940 UART: [art] Derive CDI
5,673,220 UART: [art] Store in slot 0x4
5,758,998 UART: [art] Derive Key Pair
5,759,358 UART: [art] Store priv key in slot 0x5
5,772,479 UART: [art] Derive Key Pair - Done
5,787,422 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,802,717 UART: [art] Erasing AUTHORITY.KEYID = 7
5,803,482 UART: [art] PUB.X = 9F69670C1631ECA736DACDAB529B3F06833B678412D5C35A96521399BD7B03F5258318ACC277AAEC59FE80DA56B4AD29
5,810,251 UART: [art] PUB.Y = C76F0D97721EA0F216DBB10C2C86F1D9F6AB16945B1CA04811188144BD40B715AE5151FE88E6DBD46E6E956313980505
5,817,191 UART: [art] SIG.R = ACDCB86B357C55993F5B56E891E8C8C343796BF3AD0B0BEE1FFFCE19DF555EEFA1116B7C08BFC39675D5389C9F4A494C
5,823,974 UART: [art] SIG.S = 4F773A2D15E8CD8C343B0EB6638DD63594A8583E86EF4DC824EEEC57D87FAF77B15265398E754C3D3C5C0C4E4AC959E1
5,847,628 UART: Caliptra RT
5,847,971 UART: [state] CFI Enabled
5,967,887 UART: [rt] RT listening for mailbox commands...
5,968,557 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,091,663 UART: [rt]cmd =0x41544d4e, len=14344
8,521,365 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,428 ready_for_fw is high
1,363,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,219,510 >>> mbox cmd response: success
5,281,661 UART:
5,281,677 UART: Running Caliptra FMC ...
5,282,085 UART:
5,282,228 UART: [state] CFI Enabled
5,292,558 UART: [fht] FMC Alias Private Key: 7
5,412,016 UART: [art] Extend RT PCRs Done
5,412,444 UART: [art] Lock RT PCRs Done
5,414,168 UART: [art] Populate DV Done
5,422,631 UART: [fht] FMC Alias Private Key: 7
5,423,735 UART: [art] Derive CDI
5,424,015 UART: [art] Store in slot 0x4
5,509,321 UART: [art] Derive Key Pair
5,509,681 UART: [art] Store priv key in slot 0x5
5,523,726 UART: [art] Derive Key Pair - Done
5,538,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,553,731 UART: [art] Erasing AUTHORITY.KEYID = 7
5,554,496 UART: [art] PUB.X = 05CCE35ACDFC79EC931ADC083966B4F47C2A078BCE5C46ED2994C03C98BA354B7389134023A36EE098F988C951CD8264
5,561,265 UART: [art] PUB.Y = A28947CDCD1BB8E2DBF49161FE5E1BFAE0702AA0B3E4FAB28890F702FEF075CC44FFDCD12C01F3DEC6968958058EE886
5,568,230 UART: [art] SIG.R = FE0A890431F99A2BF6AF982B7C27DB25464B2DC31F05373E336E12A2CD06FB822BDF4EB03D8E7B919D0F0EE5622DA109
5,574,993 UART: [art] SIG.S = CB02F989992192D0146B95FF6D73ECF6EF035E4D3FE61D1C2541378DBCB4C00A8261FD5E072828C4C0C4A830F3A3F687
5,598,873 UART: Caliptra RT
5,599,216 UART: [state] CFI Enabled
5,719,469 UART: [rt] RT listening for mailbox commands...
5,720,139 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,843,115 UART: [rt]cmd =0x41544d4e, len=14344
8,311,233 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,681 UART: [kat] SHA2-512-ACC
906,582 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,761 UART: [kat] LMS
1,169,073 UART: [kat] --
1,169,898 UART: [cold-reset] ++
1,170,268 UART: [fht] FHT @ 0x50003400
1,173,026 UART: [idev] ++
1,173,194 UART: [idev] CDI.KEYID = 6
1,173,555 UART: [idev] SUBJECT.KEYID = 7
1,173,980 UART: [idev] UDS.KEYID = 0
1,174,326 ready_for_fw is high
1,174,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,849 UART: [idev] Erasing UDS.KEYID = 0
1,198,619 UART: [idev] Sha1 KeyId Algorithm
1,207,533 UART: [idev] --
1,208,550 UART: [ldev] ++
1,208,718 UART: [ldev] CDI.KEYID = 6
1,209,082 UART: [ldev] SUBJECT.KEYID = 5
1,209,509 UART: [ldev] AUTHORITY.KEYID = 7
1,209,972 UART: [ldev] FE.KEYID = 1
1,215,078 UART: [ldev] Erasing FE.KEYID = 1
1,240,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,824 UART: [ldev] --
1,280,155 UART: [fwproc] Wait for Commands...
1,280,902 UART: [fwproc] Recv command 0x46574c44
1,281,635 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,210 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,385 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,372,618 >>> mbox cmd response: success
3,373,782 UART: [afmc] ++
3,373,950 UART: [afmc] CDI.KEYID = 6
3,374,313 UART: [afmc] SUBJECT.KEYID = 7
3,374,739 UART: [afmc] AUTHORITY.KEYID = 5
3,410,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,165 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,914 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,621 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,498 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,208 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,176 UART: [afmc] --
3,454,123 UART: [cold-reset] --
3,454,909 UART: [state] Locking Datavault
3,456,366 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,970 UART: [state] Locking ICCM
3,457,586 UART: [exit] Launching FMC @ 0x40000130
3,462,916 UART:
3,462,932 UART: Running Caliptra FMC ...
3,463,340 UART:
3,463,394 UART: [state] CFI Enabled
3,474,046 UART: [fht] FMC Alias Private Key: 7
3,593,230 UART: [art] Extend RT PCRs Done
3,593,658 UART: [art] Lock RT PCRs Done
3,595,048 UART: [art] Populate DV Done
3,603,409 UART: [fht] FMC Alias Private Key: 7
3,604,501 UART: [art] Derive CDI
3,604,781 UART: [art] Store in slot 0x4
3,690,840 UART: [art] Derive Key Pair
3,691,200 UART: [art] Store priv key in slot 0x5
3,705,016 UART: [art] Derive Key Pair - Done
3,719,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,736,365 UART: [art] PUB.X = D9D0562FD706CF4F1B3EC4F89CCF7AE225B3CB7D1A0BBD298211514E09BD242DE975FCA9E0EE101701AC9BDC8DA67BB0
3,743,149 UART: [art] PUB.Y = 63D6241C3B4833E086D4072116E4A7DEB9698F3C438A43C163F0528729C85A83852A417DFF39560593DCF9A44A5FFE6E
3,750,091 UART: [art] SIG.R = 5096C74E42B854224D7416374E3132ED39B3CF4EB4D2C4AF302E76B5EE29865B5A459727A8CBAD36BD5AE1D94726BC0F
3,756,866 UART: [art] SIG.S = E048B50FEE053BDD4C73F9A007255BF0B833F39D477966358C1E7A2949E5FD2A31E705E2DC4C5306725225FF51FAB349
3,781,035 UART: Caliptra RT
3,781,286 UART: [state] CFI Enabled
3,901,480 UART: [rt] RT listening for mailbox commands...
3,902,150 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,140 UART: [rt]cmd =0x41544d4e, len=14344
4,688,958 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,338 ready_for_fw is high
1,059,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,232 >>> mbox cmd response: success
3,288,741 UART:
3,288,757 UART: Running Caliptra FMC ...
3,289,165 UART:
3,289,219 UART: [state] CFI Enabled
3,299,879 UART: [fht] FMC Alias Private Key: 7
3,419,145 UART: [art] Extend RT PCRs Done
3,419,573 UART: [art] Lock RT PCRs Done
3,421,501 UART: [art] Populate DV Done
3,429,494 UART: [fht] FMC Alias Private Key: 7
3,430,624 UART: [art] Derive CDI
3,430,904 UART: [art] Store in slot 0x4
3,516,337 UART: [art] Derive Key Pair
3,516,697 UART: [art] Store priv key in slot 0x5
3,530,143 UART: [art] Derive Key Pair - Done
3,544,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,912 UART: [art] PUB.X = 2AAF7A6084D35FC518B4C4BCE9DF81AB046530469F03DAE912034EB404AEE358B4EF8FD30F418337E5FE2CB47C1D76B8
3,567,683 UART: [art] PUB.Y = B202A7A74F0D972E7CF75C6EDE08022EB05E1C0D6684E5C95E81409953FEAF0428A63A5169A33F7F067D9CF3821EF12A
3,574,620 UART: [art] SIG.R = 293252C6083A62A61ED96EC145F174C5D823515D3F4C9F26D8CBD7011C0FEF15280B751F67681D94E24DD0187D58496B
3,581,376 UART: [art] SIG.S = DA60D678489F6562A5CDB0A66F02A6117CFF5F938647931C6CF83E3ED2953CDEA9F134A24694DD89C170816EC29DE64E
3,605,815 UART: Caliptra RT
3,606,066 UART: [state] CFI Enabled
3,724,976 UART: [rt] RT listening for mailbox commands...
3,725,646 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,834 UART: [rt]cmd =0x41544d4e, len=14344
4,519,613 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
891,541 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,645 UART: [kat] ++
895,797 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,218 UART: [kat] HMAC-384Kdf
920,754 UART: [kat] LMS
1,169,066 UART: [kat] --
1,169,847 UART: [cold-reset] ++
1,170,237 UART: [fht] FHT @ 0x50003400
1,172,867 UART: [idev] ++
1,173,035 UART: [idev] CDI.KEYID = 6
1,173,396 UART: [idev] SUBJECT.KEYID = 7
1,173,821 UART: [idev] UDS.KEYID = 0
1,174,167 ready_for_fw is high
1,174,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,008 UART: [idev] Erasing UDS.KEYID = 0
1,199,602 UART: [idev] Sha1 KeyId Algorithm
1,208,408 UART: [idev] --
1,209,305 UART: [ldev] ++
1,209,473 UART: [ldev] CDI.KEYID = 6
1,209,837 UART: [ldev] SUBJECT.KEYID = 5
1,210,264 UART: [ldev] AUTHORITY.KEYID = 7
1,210,727 UART: [ldev] FE.KEYID = 1
1,216,061 UART: [ldev] Erasing FE.KEYID = 1
1,242,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,069 UART: [ldev] --
1,281,332 UART: [fwproc] Wait for Commands...
1,281,947 UART: [fwproc] Recv command 0x46574c44
1,282,680 UART: [fwproc] Recv'd Img size: 118548 bytes
3,161,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,189,347 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,220,522 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,360,923 >>> mbox cmd response: success
3,362,135 UART: [afmc] ++
3,362,303 UART: [afmc] CDI.KEYID = 6
3,362,666 UART: [afmc] SUBJECT.KEYID = 7
3,363,092 UART: [afmc] AUTHORITY.KEYID = 5
3,399,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,415,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,416,663 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,422,370 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,428,247 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,433,957 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,441,727 UART: [afmc] --
3,442,560 UART: [cold-reset] --
3,443,654 UART: [state] Locking Datavault
3,444,885 UART: [state] Locking PCR0, PCR1 and PCR31
3,445,489 UART: [state] Locking ICCM
3,446,123 UART: [exit] Launching FMC @ 0x40000130
3,451,453 UART:
3,451,469 UART: Running Caliptra FMC ...
3,451,877 UART:
3,452,020 UART: [state] CFI Enabled
3,462,452 UART: [fht] FMC Alias Private Key: 7
3,581,990 UART: [art] Extend RT PCRs Done
3,582,418 UART: [art] Lock RT PCRs Done
3,583,888 UART: [art] Populate DV Done
3,592,173 UART: [fht] FMC Alias Private Key: 7
3,593,131 UART: [art] Derive CDI
3,593,411 UART: [art] Store in slot 0x4
3,679,196 UART: [art] Derive Key Pair
3,679,556 UART: [art] Store priv key in slot 0x5
3,693,326 UART: [art] Derive Key Pair - Done
3,708,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,724,192 UART: [art] Erasing AUTHORITY.KEYID = 7
3,724,957 UART: [art] PUB.X = 75E490BAD11350D4175D33F7D2322642BB4D644204C853F9EBDF85E7D052F2A808F362C76E9A6FB05EFD5B8FB85AF03F
3,731,731 UART: [art] PUB.Y = 1AEDAEB3A30CCFE1232573D7D1713EC90395A0CE543AA489F2CE01C33F80C4E0C9B5CF46D5688362D7B556AA3867AFEE
3,738,690 UART: [art] SIG.R = 728A0C33C15F67B15C18493BD58ABE702C1A6D2F507EB9776CDF090927344B66514CC9C4E2BC31CB4FAF98CCBDEB59C3
3,745,467 UART: [art] SIG.S = 9DFD383A56EA0A16124ECA53E52CF7F820EFD53C2B1ECB1EDE0543F73BBDB59B2D440B85FFAD166E42744B6CFAA06DEF
3,768,866 UART: Caliptra RT
3,769,209 UART: [state] CFI Enabled
3,889,345 UART: [rt] RT listening for mailbox commands...
3,890,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,667 UART: [rt]cmd =0x41544d4e, len=14344
4,671,257 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,083 ready_for_fw is high
1,060,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,438 >>> mbox cmd response: success
3,292,247 UART:
3,292,263 UART: Running Caliptra FMC ...
3,292,671 UART:
3,292,814 UART: [state] CFI Enabled
3,302,962 UART: [fht] FMC Alias Private Key: 7
3,421,238 UART: [art] Extend RT PCRs Done
3,421,666 UART: [art] Lock RT PCRs Done
3,423,082 UART: [art] Populate DV Done
3,431,125 UART: [fht] FMC Alias Private Key: 7
3,432,299 UART: [art] Derive CDI
3,432,579 UART: [art] Store in slot 0x4
3,518,824 UART: [art] Derive Key Pair
3,519,184 UART: [art] Store priv key in slot 0x5
3,532,350 UART: [art] Derive Key Pair - Done
3,547,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,562,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,563,744 UART: [art] PUB.X = D15F261F1DFCDADC0C1ABAEB7942F783C0181C05FB2F4A00D8160DE5AF62FF23C174FBE9E3630F6289850BA3B6BD8BD8
3,570,501 UART: [art] PUB.Y = BFCFD79361BE23C72C43E1799B9DFA64E1C6D8D6BC60560A983E7FCD6A98FFA6B6C37536C4FACB466F99B82BF8EEEE88
3,577,474 UART: [art] SIG.R = B783436AB5C4DD6188EC8B3C75350EE022E14399E4424F229799C96966D61E4FB9E6C0B6610FDE6FCE98EDBD097580EE
3,584,243 UART: [art] SIG.S = 2E84AC8A5EB248A86CA4EA0C52B8139DB921B679BE5004B1FD03C3E00B59A45354833301D31500136D6959ED3B620C54
3,608,187 UART: Caliptra RT
3,608,530 UART: [state] CFI Enabled
3,728,856 UART: [rt] RT listening for mailbox commands...
3,729,526 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,568 UART: [rt]cmd =0x41544d4e, len=14344
4,531,584 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
893,486 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,611 UART: [kat] ++
897,763 UART: [kat] sha1
901,967 UART: [kat] SHA2-256
903,907 UART: [kat] SHA2-384
906,444 UART: [kat] SHA2-512-ACC
908,345 UART: [kat] ECC-384
918,252 UART: [kat] HMAC-384Kdf
922,752 UART: [kat] LMS
1,171,080 UART: [kat] --
1,172,125 UART: [cold-reset] ++
1,172,497 UART: [fht] FHT @ 0x50003400
1,175,014 UART: [idev] ++
1,175,182 UART: [idev] CDI.KEYID = 6
1,175,542 UART: [idev] SUBJECT.KEYID = 7
1,175,966 UART: [idev] UDS.KEYID = 0
1,176,311 ready_for_fw is high
1,176,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,940 UART: [idev] Erasing UDS.KEYID = 0
1,200,735 UART: [idev] Sha1 KeyId Algorithm
1,209,321 UART: [idev] --
1,210,565 UART: [ldev] ++
1,210,733 UART: [ldev] CDI.KEYID = 6
1,211,096 UART: [ldev] SUBJECT.KEYID = 5
1,211,522 UART: [ldev] AUTHORITY.KEYID = 7
1,211,985 UART: [ldev] FE.KEYID = 1
1,216,923 UART: [ldev] Erasing FE.KEYID = 1
1,243,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,557 UART: [ldev] --
1,282,972 UART: [fwproc] Wait for Commands...
1,283,756 UART: [fwproc] Recv command 0x46574c44
1,284,484 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,046 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,216 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,557 >>> mbox cmd response: success
3,372,687 UART: [afmc] ++
3,372,855 UART: [afmc] CDI.KEYID = 6
3,373,217 UART: [afmc] SUBJECT.KEYID = 7
3,373,642 UART: [afmc] AUTHORITY.KEYID = 5
3,408,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,812 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,518 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,397 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,107 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,826 UART: [afmc] --
3,451,932 UART: [cold-reset] --
3,452,690 UART: [state] Locking Datavault
3,453,807 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,411 UART: [state] Locking ICCM
3,455,017 UART: [exit] Launching FMC @ 0x40000130
3,460,347 UART:
3,460,363 UART: Running Caliptra FMC ...
3,460,771 UART:
3,460,825 UART: [state] CFI Enabled
3,471,167 UART: [fht] FMC Alias Private Key: 7
3,590,773 UART: [art] Extend RT PCRs Done
3,591,201 UART: [art] Lock RT PCRs Done
3,592,761 UART: [art] Populate DV Done
3,601,054 UART: [fht] FMC Alias Private Key: 7
3,602,190 UART: [art] Derive CDI
3,602,470 UART: [art] Store in slot 0x4
3,688,407 UART: [art] Derive Key Pair
3,688,767 UART: [art] Store priv key in slot 0x5
3,702,085 UART: [art] Derive Key Pair - Done
3,716,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,225 UART: [art] PUB.X = BE9014ED192331E4AE40980865856C054EB80CB69ED63957D123D4F8EC87E4D901379FAB50B3BBFAFE3DA4C0717D106B
3,739,993 UART: [art] PUB.Y = 8CDFEF1AD159CD250EFC8D80DD8CEAD53DE2239C3C9CFEBCF829E22D8B4C4C1E98D7EA22489E9FD0BC27D5DAC7BED2F3
3,746,980 UART: [art] SIG.R = B125BC0ACDE86D70DAD930A56506A567C3D3FC8F75DE08F6C1F2AFAD702D7BDD59BF73F6C9941A7B00065BA3C9424F03
3,753,733 UART: [art] SIG.S = 22CC25E62C55C25CDBACA98CD57AB0057B6B7C264D362B967888B771C44BF022450ED6DA97639E4A17095177AE6F520F
3,777,809 UART: Caliptra RT
3,778,060 UART: [state] CFI Enabled
3,896,920 UART: [rt] RT listening for mailbox commands...
3,897,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,042 UART: [rt]cmd =0x41544d4e, len=14344
4,694,972 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,331 ready_for_fw is high
1,059,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,210,655 >>> mbox cmd response: success
3,272,050 UART:
3,272,066 UART: Running Caliptra FMC ...
3,272,474 UART:
3,272,528 UART: [state] CFI Enabled
3,283,044 UART: [fht] FMC Alias Private Key: 7
3,402,216 UART: [art] Extend RT PCRs Done
3,402,644 UART: [art] Lock RT PCRs Done
3,404,280 UART: [art] Populate DV Done
3,412,407 UART: [fht] FMC Alias Private Key: 7
3,413,421 UART: [art] Derive CDI
3,413,701 UART: [art] Store in slot 0x4
3,499,706 UART: [art] Derive Key Pair
3,500,066 UART: [art] Store priv key in slot 0x5
3,513,548 UART: [art] Derive Key Pair - Done
3,528,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,543,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,544,340 UART: [art] PUB.X = 5CC31C367C62877F570C4F56DE75FFD5D03A6D7B573CEF97A5188745DCD95A1A9DA30AC492571B6C40199B3D40CFCDD9
3,551,118 UART: [art] PUB.Y = 891C9F4C3DE5F457928503594AE31A53C29A1BD556D5508B74D814CBED639E0404B8B9F5E4C2E24897B98FC97A62E6BC
3,558,065 UART: [art] SIG.R = CBC019564C7E6680F27CDE7D26976C2071BBAACB9C8C2177A50595A61CFCF967C3185AB0EC44CC1F3E7AB3FCF76DC2F0
3,564,854 UART: [art] SIG.S = E4D92C86F539FBFE2C952646BD79C6E11A4F26CEC43DA453A7D59A3C9EC99394D5C63215ABC7B5D996D85F162DC7F6C3
3,588,094 UART: Caliptra RT
3,588,345 UART: [state] CFI Enabled
3,708,818 UART: [rt] RT listening for mailbox commands...
3,709,488 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,832,522 UART: [rt]cmd =0x41544d4e, len=14344
4,506,740 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
893,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,524 UART: [kat] ++
897,676 UART: [kat] sha1
901,898 UART: [kat] SHA2-256
903,838 UART: [kat] SHA2-384
906,561 UART: [kat] SHA2-512-ACC
908,462 UART: [kat] ECC-384
917,975 UART: [kat] HMAC-384Kdf
922,547 UART: [kat] LMS
1,170,875 UART: [kat] --
1,171,620 UART: [cold-reset] ++
1,172,188 UART: [fht] FHT @ 0x50003400
1,174,849 UART: [idev] ++
1,175,017 UART: [idev] CDI.KEYID = 6
1,175,377 UART: [idev] SUBJECT.KEYID = 7
1,175,801 UART: [idev] UDS.KEYID = 0
1,176,146 ready_for_fw is high
1,176,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,849 UART: [idev] Erasing UDS.KEYID = 0
1,201,124 UART: [idev] Sha1 KeyId Algorithm
1,209,634 UART: [idev] --
1,210,556 UART: [ldev] ++
1,210,724 UART: [ldev] CDI.KEYID = 6
1,211,087 UART: [ldev] SUBJECT.KEYID = 5
1,211,513 UART: [ldev] AUTHORITY.KEYID = 7
1,211,976 UART: [ldev] FE.KEYID = 1
1,217,278 UART: [ldev] Erasing FE.KEYID = 1
1,243,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,774 UART: [ldev] --
1,283,103 UART: [fwproc] Wait for Commands...
1,283,819 UART: [fwproc] Recv command 0x46574c44
1,284,547 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,586 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,756 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,035 >>> mbox cmd response: success
3,372,111 UART: [afmc] ++
3,372,279 UART: [afmc] CDI.KEYID = 6
3,372,641 UART: [afmc] SUBJECT.KEYID = 7
3,373,066 UART: [afmc] AUTHORITY.KEYID = 5
3,408,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,416 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,122 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,438,001 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,711 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,694 UART: [afmc] --
3,452,714 UART: [cold-reset] --
3,453,298 UART: [state] Locking Datavault
3,454,215 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,819 UART: [state] Locking ICCM
3,455,391 UART: [exit] Launching FMC @ 0x40000130
3,460,721 UART:
3,460,737 UART: Running Caliptra FMC ...
3,461,145 UART:
3,461,288 UART: [state] CFI Enabled
3,472,322 UART: [fht] FMC Alias Private Key: 7
3,591,928 UART: [art] Extend RT PCRs Done
3,592,356 UART: [art] Lock RT PCRs Done
3,593,652 UART: [art] Populate DV Done
3,601,725 UART: [fht] FMC Alias Private Key: 7
3,602,709 UART: [art] Derive CDI
3,602,989 UART: [art] Store in slot 0x4
3,688,930 UART: [art] Derive Key Pair
3,689,290 UART: [art] Store priv key in slot 0x5
3,702,638 UART: [art] Derive Key Pair - Done
3,717,478 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,734,086 UART: [art] PUB.X = FEE4DEB5C5BC54E7CF72AB08CC5E4A613EB153F8373ACF3DE63DAB0D98DB47888A4C19A5AE8DFBFF726A63CB1184AEDF
3,740,886 UART: [art] PUB.Y = F94F2D780C59C8FD616E2B6A41F13ACC95B8883B80CEAEC0C25F6EBB1C8CE7D6200F3443BB99B93857007378FD742888
3,747,818 UART: [art] SIG.R = C3D1AFFBE39D10A93571622683B5336A113342F3552D4CDE492DB9CA4A0BEABE135FDB280F0F56C19684B8C248D42695
3,754,587 UART: [art] SIG.S = FAACD88F5417B179F7C5F81F4B877E4EE1BCB0A3E2C696E56E3DD15D8256571E87C481AB7AA9CE910501D10D59B3E2A6
3,778,514 UART: Caliptra RT
3,778,857 UART: [state] CFI Enabled
3,898,042 UART: [rt] RT listening for mailbox commands...
3,898,712 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,498 UART: [rt]cmd =0x41544d4e, len=14344
4,684,450 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,224 ready_for_fw is high
1,060,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,810 >>> mbox cmd response: success
3,279,587 UART:
3,279,603 UART: Running Caliptra FMC ...
3,280,011 UART:
3,280,154 UART: [state] CFI Enabled
3,290,484 UART: [fht] FMC Alias Private Key: 7
3,409,144 UART: [art] Extend RT PCRs Done
3,409,572 UART: [art] Lock RT PCRs Done
3,411,194 UART: [art] Populate DV Done
3,419,367 UART: [fht] FMC Alias Private Key: 7
3,420,467 UART: [art] Derive CDI
3,420,747 UART: [art] Store in slot 0x4
3,506,404 UART: [art] Derive Key Pair
3,506,764 UART: [art] Store priv key in slot 0x5
3,520,258 UART: [art] Derive Key Pair - Done
3,535,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,645 UART: [art] PUB.X = 6FCE26AC1CE6644594A9D55A65E92FF6D8E343BEA91F4827AA3B0EF9236632CAB8641AE4844BF843C47D9593BE51F00A
3,558,421 UART: [art] PUB.Y = B33A062CFFA136D99DCFDCF56FAEC830C10603CA213619311E1DB0A74804B30CFFF91EEF7AEBB89FF7FCA2DAAF24F4E4
3,565,388 UART: [art] SIG.R = 3BC365D63E27D6D72BF653FD1EF15A6EB2727479A6F5B2B36E22ACC21C24FAC526A4F9A3EDB1E3BFD32DA1124510B251
3,572,176 UART: [art] SIG.S = 8F7C3D005109F4DAAD7595E7D1A84AAD5B5C02437D2DADADE3C41B148DE32B5EEE13EF606252C9B50F2B068B987D7F6A
3,596,284 UART: Caliptra RT
3,596,627 UART: [state] CFI Enabled
3,717,343 UART: [rt] RT listening for mailbox commands...
3,718,013 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,941 UART: [rt]cmd =0x41544d4e, len=14344
4,509,311 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,074 UART:
192,429 UART: Running Caliptra ROM ...
193,746 UART:
193,909 UART: [state] CFI Enabled
265,241 UART: [state] LifecycleState = Unprovisioned
267,233 UART: [state] DebugLocked = No
269,924 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,364 UART: [kat] SHA2-256
445,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,565 UART: [kat] ++
456,214 UART: [kat] sha1
465,678 UART: [kat] SHA2-256
468,334 UART: [kat] SHA2-384
474,251 UART: [kat] SHA2-512-ACC
476,619 UART: [kat] ECC-384
2,767,738 UART: [kat] HMAC-384Kdf
2,798,377 UART: [kat] LMS
3,988,690 UART: [kat] --
3,993,341 UART: [cold-reset] ++
3,995,910 UART: [fht] Storing FHT @ 0x50003400
4,006,961 UART: [idev] ++
4,007,536 UART: [idev] CDI.KEYID = 6
4,008,487 UART: [idev] SUBJECT.KEYID = 7
4,009,737 UART: [idev] UDS.KEYID = 0
4,010,808 ready_for_fw is high
4,011,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,479 UART: [idev] Erasing UDS.KEYID = 0
7,348,415 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,372 UART: [idev] --
7,374,613 UART: [ldev] ++
7,375,179 UART: [ldev] CDI.KEYID = 6
7,376,120 UART: [ldev] SUBJECT.KEYID = 5
7,377,328 UART: [ldev] AUTHORITY.KEYID = 7
7,378,616 UART: [ldev] FE.KEYID = 1
7,422,736 UART: [ldev] Erasing FE.KEYID = 1
10,751,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,861 UART: [ldev] --
13,113,204 UART: [fwproc] Waiting for Commands...
13,114,973 UART: [fwproc] Received command 0x46574c44
13,117,156 UART: [fwproc] Received Image of size 118548 bytes
17,220,056 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,296,558 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,369,732 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,698,380 >>> mbox cmd response: success
17,703,286 UART: [afmc] ++
17,703,903 UART: [afmc] CDI.KEYID = 6
17,704,834 UART: [afmc] SUBJECT.KEYID = 7
17,706,055 UART: [afmc] AUTHORITY.KEYID = 5
21,069,401 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,312 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,597 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,058 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,745 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,187 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,305 UART: [afmc] --
23,441,037 UART: [cold-reset] --
23,442,956 UART: [state] Locking Datavault
23,448,039 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,807 UART: [state] Locking ICCM
23,451,774 UART: [exit] Launching FMC @ 0x40000130
23,460,169 UART:
23,460,401 UART: Running Caliptra FMC ...
23,461,497 UART:
23,461,651 UART: [state] CFI Enabled
23,529,369 UART: [fht] FMC Alias Private Key: 7
25,870,034 UART: [art] Extend RT PCRs Done
25,871,333 UART: [art] Lock RT PCRs Done
25,872,879 UART: [art] Populate DV Done
25,878,403 UART: [fht] FMC Alias Private Key: 7
25,879,930 UART: [art] Derive CDI
25,880,676 UART: [art] Store in slot 0x4
25,938,689 UART: [art] Derive Key Pair
25,939,682 UART: [art] Store priv key in slot 0x5
29,232,413 UART: [art] Derive Key Pair - Done
29,245,141 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,977 UART: [art] Erasing AUTHORITY.KEYID = 7
31,536,494 UART: [art] PUB.X = EABA844A18C878EAC71DDCD2382C7800F2ED867E0356BE783EA49456DCE0F0C6032334A4EDB7718ACA1C29AB68884A10
31,543,779 UART: [art] PUB.Y = 0AE97E8C5E52477D516CC0EDE2E3EE6296C5001163BC976FBA513A4E29DBA2AB85356C54AE9841CF5D5FB5C329198927
31,551,027 UART: [art] SIG.R = 9F563A6B91C3CB19F2E4D7A6448AAA94F9F4000D2F791CD762DA47B26A399269FFE6A2EAD14F13359C6FAB0E2377036B
31,558,383 UART: [art] SIG.S = B2BB6EA25C0F57AF077E628DA6D8BFD1ABA44C720B7264CC2B7384BC51E585F352F15934B14E18B836896AE4DCCB0391
32,863,595 UART: Caliptra RT
32,864,287 UART: [state] CFI Enabled
33,040,807 UART: [rt] RT listening for mailbox commands...
33,043,217 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,198,526 UART: [rt]cmd =0x41544d4e, len=14344
38,498,738 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,803,905 ready_for_fw is high
3,804,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,952,227 >>> mbox cmd response: success
23,634,726 UART:
23,635,157 UART: Running Caliptra FMC ...
23,636,281 UART:
23,636,440 UART: [state] CFI Enabled
23,701,938 UART: [fht] FMC Alias Private Key: 7
26,042,003 UART: [art] Extend RT PCRs Done
26,043,259 UART: [art] Lock RT PCRs Done
26,044,896 UART: [art] Populate DV Done
26,050,320 UART: [fht] FMC Alias Private Key: 7
26,051,973 UART: [art] Derive CDI
26,052,792 UART: [art] Store in slot 0x4
26,109,747 UART: [art] Derive Key Pair
26,110,751 UART: [art] Store priv key in slot 0x5
29,404,035 UART: [art] Derive Key Pair - Done
29,417,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,706,504 UART: [art] Erasing AUTHORITY.KEYID = 7
31,708,036 UART: [art] PUB.X = BF29EB7A98C1B4BC9284583820518BC6D2677B9A377C4736022F056A7D22471EDCE4B04FA191C7E24AD4B7F7D8C8E7B8
31,715,264 UART: [art] PUB.Y = 1C1B1BFAFBB65D88D2208C214A37976B8E692EA684F343B39E857361203B6C4100C54EEB2A4FBA2D80093D9340B09E69
31,722,537 UART: [art] SIG.R = 6AAA0F231C8AFF05BE05194E27DE2344C1C04300AFC2C3ADDFA392CABD020D3A8027BD96A9C686F0F6094E2DB2228803
31,729,903 UART: [art] SIG.S = 3B9157308902691A6BE03A7D79B931DBB3014F3EF1B1738CA621A591CF3F749831A48BE91D3BFB3BC64AC225E506211D
33,035,697 UART: Caliptra RT
33,036,432 UART: [state] CFI Enabled
33,232,690 UART: [rt] RT listening for mailbox commands...
33,235,031 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,390,358 UART: [rt]cmd =0x41544d4e, len=14344
38,691,847 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,489 UART:
192,857 UART: Running Caliptra ROM ...
193,974 UART:
603,701 UART: [state] CFI Enabled
615,737 UART: [state] LifecycleState = Unprovisioned
617,688 UART: [state] DebugLocked = No
619,995 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,067 UART: [kat] SHA2-256
793,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,312 UART: [kat] ++
804,913 UART: [kat] sha1
817,455 UART: [kat] SHA2-256
820,117 UART: [kat] SHA2-384
825,294 UART: [kat] SHA2-512-ACC
827,668 UART: [kat] ECC-384
3,110,810 UART: [kat] HMAC-384Kdf
3,121,792 UART: [kat] LMS
4,311,897 UART: [kat] --
4,317,777 UART: [cold-reset] ++
4,319,141 UART: [fht] Storing FHT @ 0x50003400
4,329,904 UART: [idev] ++
4,330,461 UART: [idev] CDI.KEYID = 6
4,331,341 UART: [idev] SUBJECT.KEYID = 7
4,332,647 UART: [idev] UDS.KEYID = 0
4,333,650 ready_for_fw is high
4,333,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,787 UART: [idev] Erasing UDS.KEYID = 0
7,618,410 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,798 UART: [idev] --
7,645,880 UART: [ldev] ++
7,646,448 UART: [ldev] CDI.KEYID = 6
7,647,381 UART: [ldev] SUBJECT.KEYID = 5
7,648,590 UART: [ldev] AUTHORITY.KEYID = 7
7,649,870 UART: [ldev] FE.KEYID = 1
7,660,885 UART: [ldev] Erasing FE.KEYID = 1
10,953,215 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,454 UART: [ldev] --
13,314,782 UART: [fwproc] Waiting for Commands...
13,316,764 UART: [fwproc] Received command 0x46574c44
13,319,002 UART: [fwproc] Received Image of size 118548 bytes
17,423,949 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,672 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,819 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,896,763 >>> mbox cmd response: success
17,901,254 UART: [afmc] ++
17,901,867 UART: [afmc] CDI.KEYID = 6
17,902,768 UART: [afmc] SUBJECT.KEYID = 7
17,904,038 UART: [afmc] AUTHORITY.KEYID = 5
21,219,314 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,009 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,324 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,703 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,437 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,865 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,581,883 UART: [afmc] --
23,585,474 UART: [cold-reset] --
23,590,247 UART: [state] Locking Datavault
23,595,538 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,293 UART: [state] Locking ICCM
23,598,497 UART: [exit] Launching FMC @ 0x40000130
23,606,882 UART:
23,607,110 UART: Running Caliptra FMC ...
23,608,227 UART:
23,608,385 UART: [state] CFI Enabled
23,616,538 UART: [fht] FMC Alias Private Key: 7
25,956,770 UART: [art] Extend RT PCRs Done
25,957,987 UART: [art] Lock RT PCRs Done
25,959,585 UART: [art] Populate DV Done
25,964,995 UART: [fht] FMC Alias Private Key: 7
25,966,593 UART: [art] Derive CDI
25,967,329 UART: [art] Store in slot 0x4
26,009,968 UART: [art] Derive Key Pair
26,010,964 UART: [art] Store priv key in slot 0x5
29,253,460 UART: [art] Derive Key Pair - Done
29,266,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,293 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,803 UART: [art] PUB.X = 2CE20D70FB93A5755FDB6B00DDC9D1F333CF4B2E5E38AB7764800D1E174D22E98D8CB2D176C63E71580DF06FA7229FE9
31,555,055 UART: [art] PUB.Y = 2426DAC822D6390E8AB9126FED77A5BF7143F9092CCF92200FC95F64DC415ADED70B021D63FE083CC5497C96D1D4AB4A
31,562,364 UART: [art] SIG.R = BE1C526CC51CF53757D1EF349DF60B244DCE679B6912E355E6B83D3CFF43F9CA3C146B0830BB29AB3ADFC5AB2EA1EF0C
31,569,754 UART: [art] SIG.S = 0856D7791AC72DEC35931AF022C0E26E9481505F5D639DF787DE253F9B236FBAB9DF6A4F479723AFB3F6AC0B1B34188C
32,875,075 UART: Caliptra RT
32,875,768 UART: [state] CFI Enabled
33,010,276 UART: [rt] RT listening for mailbox commands...
33,012,583 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,167,821 UART: [rt]cmd =0x41544d4e, len=14344
38,468,166 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
4,123,685 ready_for_fw is high
4,124,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,999 >>> mbox cmd response: success
23,791,779 UART:
23,792,216 UART: Running Caliptra FMC ...
23,793,375 UART:
23,793,538 UART: [state] CFI Enabled
23,801,333 UART: [fht] FMC Alias Private Key: 7
26,140,808 UART: [art] Extend RT PCRs Done
26,142,031 UART: [art] Lock RT PCRs Done
26,143,691 UART: [art] Populate DV Done
26,149,262 UART: [fht] FMC Alias Private Key: 7
26,150,798 UART: [art] Derive CDI
26,151,525 UART: [art] Store in slot 0x4
26,194,238 UART: [art] Derive Key Pair
26,195,232 UART: [art] Store priv key in slot 0x5
29,437,912 UART: [art] Derive Key Pair - Done
29,451,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,286 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,826 UART: [art] PUB.X = 98D144536CFF3EDD81401E3C4A145EA93C180F1F294DF35B874A66FFD643E05A002E9B69887499FAB168E30ACCA24E7C
31,740,086 UART: [art] PUB.Y = 3FC8554825A9868BD62AC3187774D9ED3855E44B7D93DEC0D633953E906A91050264035B1A94C21218C75780EFB25472
31,747,311 UART: [art] SIG.R = C6FD5B6D218FBF9819457811D21D54231B992FD270CC9B25A806534C2F02052AEB735E10D03D4336E875A88E087D5426
31,754,649 UART: [art] SIG.S = DCC602105284C3794DE381415F20E4F136B72A468E04FAF620C14D79BCDF18928EE52CBE497B7B2239D7E214447F1224
33,059,678 UART: Caliptra RT
33,060,396 UART: [state] CFI Enabled
33,193,401 UART: [rt] RT listening for mailbox commands...
33,195,716 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,351,070 UART: [rt]cmd =0x41544d4e, len=14344
38,651,699 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
191,964 UART:
192,340 UART: Running Caliptra ROM ...
193,565 UART:
193,717 UART: [state] CFI Enabled
262,741 UART: [state] LifecycleState = Unprovisioned
264,639 UART: [state] DebugLocked = No
266,387 UART: [state] WD Timer not started. Device not locked for debugging
270,348 UART: [kat] SHA2-256
450,050 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,833 UART: [kat] ++
461,314 UART: [kat] sha1
472,685 UART: [kat] SHA2-256
475,419 UART: [kat] SHA2-384
480,197 UART: [kat] SHA2-512-ACC
482,562 UART: [kat] ECC-384
2,946,969 UART: [kat] HMAC-384Kdf
2,969,504 UART: [kat] LMS
3,445,975 UART: [kat] --
3,453,305 UART: [cold-reset] ++
3,454,167 UART: [fht] FHT @ 0x50003400
3,466,127 UART: [idev] ++
3,466,680 UART: [idev] CDI.KEYID = 6
3,467,630 UART: [idev] SUBJECT.KEYID = 7
3,468,866 UART: [idev] UDS.KEYID = 0
3,469,830 ready_for_fw is high
3,470,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,159 UART: [idev] Erasing UDS.KEYID = 0
5,988,760 UART: [idev] Sha1 KeyId Algorithm
6,014,201 UART: [idev] --
6,018,631 UART: [ldev] ++
6,019,256 UART: [ldev] CDI.KEYID = 6
6,020,168 UART: [ldev] SUBJECT.KEYID = 5
6,021,381 UART: [ldev] AUTHORITY.KEYID = 7
6,022,635 UART: [ldev] FE.KEYID = 1
6,057,271 UART: [ldev] Erasing FE.KEYID = 1
8,564,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,335 UART: [ldev] --
10,374,496 UART: [fwproc] Wait for Commands...
10,376,382 UART: [fwproc] Recv command 0x46574c44
10,378,422 UART: [fwproc] Recv'd Img size: 118548 bytes
13,856,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,882 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,948 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,320 >>> mbox cmd response: success
14,342,060 UART: [afmc] ++
14,342,669 UART: [afmc] CDI.KEYID = 6
14,343,802 UART: [afmc] SUBJECT.KEYID = 7
14,344,905 UART: [afmc] AUTHORITY.KEYID = 5
16,875,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,625 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,411 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,451 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,051 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,730 UART: [afmc] --
18,695,519 UART: [cold-reset] --
18,699,873 UART: [state] Locking Datavault
18,705,438 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,187 UART: [state] Locking ICCM
18,708,817 UART: [exit] Launching FMC @ 0x40000130
18,717,255 UART:
18,717,505 UART: Running Caliptra FMC ...
18,718,525 UART:
18,718,669 UART: [state] CFI Enabled
18,772,647 UART: [fht] FMC Alias Private Key: 7
20,539,065 UART: [art] Extend RT PCRs Done
20,540,277 UART: [art] Lock RT PCRs Done
20,542,004 UART: [art] Populate DV Done
20,547,688 UART: [fht] FMC Alias Private Key: 7
20,549,278 UART: [art] Derive CDI
20,550,091 UART: [art] Store in slot 0x4
20,605,133 UART: [art] Derive Key Pair
20,606,172 UART: [art] Store priv key in slot 0x5
23,068,478 UART: [art] Derive Key Pair - Done
23,081,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,794,205 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,715 UART: [art] PUB.X = 0E643ECDEB198763E6723ACB64EBA9C77EA4BDCC3C8C9541019D11077C93FF36B3C3695188DF93C51B87C99C0FADB8A4
24,802,993 UART: [art] PUB.Y = 2B1FBC7655EA7399E5603ED69E76EF86C693B44D16B9A6E3BC8158E0F46AA459271BFDC958531CCED4CAB459BCADA698
24,810,278 UART: [art] SIG.R = 5EB2E9F2D9E5C784FC94FC46EEC37DD08C02FDF1B325D688051C7EB91902626A194E992EE10DB1D1D3840EE05C2A597A
24,817,667 UART: [art] SIG.S = 2FB566313FC2C35D1598767A9E0E4B64C925D53FF7E9F2D40EF9C35DB8A99B22736068BEBACC1EC43DFF0C1D661B1D48
25,796,559 UART: Caliptra RT
25,797,273 UART: [state] CFI Enabled
25,977,186 UART: [rt] RT listening for mailbox commands...
25,979,541 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,135,063 UART: [rt]cmd =0x41544d4e, len=14344
30,130,898 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,457,222 ready_for_fw is high
3,457,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,107 >>> mbox cmd response: success
18,509,327 UART:
18,509,715 UART: Running Caliptra FMC ...
18,510,819 UART:
18,510,970 UART: [state] CFI Enabled
18,580,000 UART: [fht] FMC Alias Private Key: 7
20,346,525 UART: [art] Extend RT PCRs Done
20,347,744 UART: [art] Lock RT PCRs Done
20,349,719 UART: [art] Populate DV Done
20,355,090 UART: [fht] FMC Alias Private Key: 7
20,356,690 UART: [art] Derive CDI
20,357,449 UART: [art] Store in slot 0x4
20,412,866 UART: [art] Derive Key Pair
20,413,869 UART: [art] Store priv key in slot 0x5
22,876,678 UART: [art] Derive Key Pair - Done
22,889,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,207 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,720 UART: [art] PUB.X = DE2C39D314FD7144A90EFF74F9A8CBE32B1A7A91CAFDE107618F345A7A59193F7374571D685A4630E6FCD7476B4508EF
24,611,974 UART: [art] PUB.Y = E6D4BA890978FA7DE1BE4458A5DCB14989D1C59ED509B52648ADB07E11560C354BA5A5F0985C26A1D0E17C0EB31FD85F
24,619,221 UART: [art] SIG.R = 0093D5215F3AB3DE41D0B2DBEC68A1EEA3386858DF7CBA8044093629D5B9F6D86D6F29F5C2F8DF296BE7A9E5DD9AA200
24,626,615 UART: [art] SIG.S = A9DF8A5CD95891B21B61BF2DCE3DF05DF54EA5569129A19D273176A722FBF1304821831301C8C541CDCE2EEB4FE46D0D
25,606,478 UART: Caliptra RT
25,607,196 UART: [state] CFI Enabled
25,786,680 UART: [rt] RT listening for mailbox commands...
25,788,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,944,404 UART: [rt]cmd =0x41544d4e, len=14344
29,940,343 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
192,713 UART:
193,100 UART: Running Caliptra ROM ...
194,321 UART:
603,736 UART: [state] CFI Enabled
619,249 UART: [state] LifecycleState = Unprovisioned
621,201 UART: [state] DebugLocked = No
622,457 UART: [state] WD Timer not started. Device not locked for debugging
627,191 UART: [kat] SHA2-256
806,856 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,674 UART: [kat] ++
818,124 UART: [kat] sha1
828,714 UART: [kat] SHA2-256
831,422 UART: [kat] SHA2-384
836,143 UART: [kat] SHA2-512-ACC
838,519 UART: [kat] ECC-384
3,278,439 UART: [kat] HMAC-384Kdf
3,289,961 UART: [kat] LMS
3,766,472 UART: [kat] --
3,771,616 UART: [cold-reset] ++
3,772,699 UART: [fht] FHT @ 0x50003400
3,783,675 UART: [idev] ++
3,784,240 UART: [idev] CDI.KEYID = 6
3,785,292 UART: [idev] SUBJECT.KEYID = 7
3,786,478 UART: [idev] UDS.KEYID = 0
3,787,413 ready_for_fw is high
3,787,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,824 UART: [idev] Erasing UDS.KEYID = 0
6,264,168 UART: [idev] Sha1 KeyId Algorithm
6,288,739 UART: [idev] --
6,294,136 UART: [ldev] ++
6,294,706 UART: [ldev] CDI.KEYID = 6
6,295,621 UART: [ldev] SUBJECT.KEYID = 5
6,296,838 UART: [ldev] AUTHORITY.KEYID = 7
6,298,079 UART: [ldev] FE.KEYID = 1
6,310,951 UART: [ldev] Erasing FE.KEYID = 1
8,786,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,930 UART: [ldev] --
10,580,303 UART: [fwproc] Wait for Commands...
10,583,215 UART: [fwproc] Recv command 0x46574c44
10,585,203 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,550 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,567 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,328 >>> mbox cmd response: success
14,556,281 UART: [afmc] ++
14,556,895 UART: [afmc] CDI.KEYID = 6
14,557,812 UART: [afmc] SUBJECT.KEYID = 7
14,559,030 UART: [afmc] AUTHORITY.KEYID = 5
17,060,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,653 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,494 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,815,586 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,118 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,723 UART: [afmc] --
18,858,322 UART: [cold-reset] --
18,861,593 UART: [state] Locking Datavault
18,866,679 UART: [state] Locking PCR0, PCR1 and PCR31
18,868,537 UART: [state] Locking ICCM
18,871,022 UART: [exit] Launching FMC @ 0x40000130
18,879,432 UART:
18,879,673 UART: Running Caliptra FMC ...
18,880,777 UART:
18,880,940 UART: [state] CFI Enabled
18,889,209 UART: [fht] FMC Alias Private Key: 7
20,655,681 UART: [art] Extend RT PCRs Done
20,656,927 UART: [art] Lock RT PCRs Done
20,658,282 UART: [art] Populate DV Done
20,663,912 UART: [fht] FMC Alias Private Key: 7
20,665,397 UART: [art] Derive CDI
20,666,164 UART: [art] Store in slot 0x4
20,708,824 UART: [art] Derive Key Pair
20,709,863 UART: [art] Store priv key in slot 0x5
23,137,012 UART: [art] Derive Key Pair - Done
23,150,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,296 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,804 UART: [art] PUB.X = 1E9A69E24D210C568BAF4BBECDEDFAB706DA6CE875992DE270AC13E3D8B1341083BE0C9605DEB33236AB1CB8E7ACF307
24,865,054 UART: [art] PUB.Y = D438A145D0FFDF8E630A5FFF04352152D35E04A696D862CCE1A11F43CB5DE6D6B48DFD590D2691A333C6D37CB35D5EE1
24,872,369 UART: [art] SIG.R = 9A5085B4689B4F009B1FD5E8B9FC10D6FB19C2A301291B3922A589AD2D6B1513CF81DE2EA9235777AF77036037F84DCA
24,879,715 UART: [art] SIG.S = 3004143AC192C5FB3E4C4CDF2C13DFDEDCD326858EE5F8ACC321632234A67AA2981D50F3D6187D7BD629522FD0A6CB57
25,858,557 UART: Caliptra RT
25,859,281 UART: [state] CFI Enabled
25,992,912 UART: [rt] RT listening for mailbox commands...
25,995,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,150,682 UART: [rt]cmd =0x41544d4e, len=14344
30,146,847 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
3,781,299 ready_for_fw is high
3,781,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,196 >>> mbox cmd response: success
18,695,805 UART:
18,696,201 UART: Running Caliptra FMC ...
18,697,315 UART:
18,697,473 UART: [state] CFI Enabled
18,705,547 UART: [fht] FMC Alias Private Key: 7
20,471,971 UART: [art] Extend RT PCRs Done
20,473,194 UART: [art] Lock RT PCRs Done
20,474,526 UART: [art] Populate DV Done
20,479,803 UART: [fht] FMC Alias Private Key: 7
20,481,311 UART: [art] Derive CDI
20,482,051 UART: [art] Store in slot 0x4
20,524,976 UART: [art] Derive Key Pair
20,525,977 UART: [art] Store priv key in slot 0x5
22,952,802 UART: [art] Derive Key Pair - Done
22,965,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,213 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,715 UART: [art] PUB.X = EE50F4BCDFBDD9F8EF686D45103351FDE26A710A53D3BA97E2684AACF20F7F408600C30F651932B54C50AC605FEFFFA0
24,681,028 UART: [art] PUB.Y = 1551EDE998D9CCDC52AA425088DBD55359F8A164C2778275C03C3744868200C1FC50EABE8F437886166B3651B6E54A23
24,688,236 UART: [art] SIG.R = EE7E6DFBE910F1035A3CEF2CA50F4A69CDA5B48F87511004317D591F605F03F65B1EA25909E7BF9348216500D099DAF3
24,695,590 UART: [art] SIG.S = 9825BD5B608ACA8AC5D1F9B249CADCB6DA51F27980149BD368DF2166E9C8259524A8A4146A9657D6626C4DEEFE7386AE
25,674,470 UART: Caliptra RT
25,675,308 UART: [state] CFI Enabled
25,808,459 UART: [rt] RT listening for mailbox commands...
25,810,852 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,966,321 UART: [rt]cmd =0x41544d4e, len=14344
29,962,448 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,063 UART:
192,425 UART: Running Caliptra ROM ...
193,621 UART:
193,776 UART: [state] CFI Enabled
267,349 UART: [state] LifecycleState = Unprovisioned
269,761 UART: [state] DebugLocked = No
271,650 UART: [state] WD Timer not started. Device not locked for debugging
276,816 UART: [kat] SHA2-256
466,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,434 UART: [kat] ++
477,885 UART: [kat] sha1
488,933 UART: [kat] SHA2-256
492,013 UART: [kat] SHA2-384
497,580 UART: [kat] SHA2-512-ACC
500,165 UART: [kat] ECC-384
2,946,671 UART: [kat] HMAC-384Kdf
2,972,333 UART: [kat] LMS
3,504,087 UART: [kat] --
3,508,600 UART: [cold-reset] ++
3,510,394 UART: [fht] FHT @ 0x50003400
3,523,355 UART: [idev] ++
3,523,997 UART: [idev] CDI.KEYID = 6
3,525,028 UART: [idev] SUBJECT.KEYID = 7
3,526,206 UART: [idev] UDS.KEYID = 0
3,527,149 ready_for_fw is high
3,527,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,642 UART: [idev] Erasing UDS.KEYID = 0
6,029,205 UART: [idev] Sha1 KeyId Algorithm
6,051,169 UART: [idev] --
6,055,588 UART: [ldev] ++
6,056,275 UART: [ldev] CDI.KEYID = 6
6,057,192 UART: [ldev] SUBJECT.KEYID = 5
6,058,348 UART: [ldev] AUTHORITY.KEYID = 7
6,059,580 UART: [ldev] FE.KEYID = 1
6,100,223 UART: [ldev] Erasing FE.KEYID = 1
8,604,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,417 UART: [ldev] --
10,415,949 UART: [fwproc] Wait for Commands...
10,418,970 UART: [fwproc] Recv command 0x46574c44
10,421,277 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,688 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,296 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,706 >>> mbox cmd response: success
14,688,423 UART: [afmc] ++
14,689,160 UART: [afmc] CDI.KEYID = 6
14,690,295 UART: [afmc] SUBJECT.KEYID = 7
14,691,792 UART: [afmc] AUTHORITY.KEYID = 5
17,238,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,978,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,979,961 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,995,044 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,010,174 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,025,089 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,047,672 UART: [afmc] --
19,051,858 UART: [cold-reset] --
19,055,944 UART: [state] Locking Datavault
19,060,075 UART: [state] Locking PCR0, PCR1 and PCR31
19,062,225 UART: [state] Locking ICCM
19,063,999 UART: [exit] Launching FMC @ 0x40000130
19,072,630 UART:
19,072,866 UART: Running Caliptra FMC ...
19,073,911 UART:
19,074,059 UART: [state] CFI Enabled
19,138,372 UART: [fht] FMC Alias Private Key: 7
20,904,732 UART: [art] Extend RT PCRs Done
20,905,955 UART: [art] Lock RT PCRs Done
20,907,769 UART: [art] Populate DV Done
20,912,854 UART: [fht] FMC Alias Private Key: 7
20,914,547 UART: [art] Derive CDI
20,915,282 UART: [art] Store in slot 0x4
20,970,784 UART: [art] Derive Key Pair
20,971,832 UART: [art] Store priv key in slot 0x5
23,434,846 UART: [art] Derive Key Pair - Done
23,448,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,161,218 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,723 UART: [art] PUB.X = 095565F6083378D687E4859FDA9F89846759DC382EA63A709A24E9F92F86BD0B1DBDC4CF1E3E2B1021B5570F9C7C0119
25,170,013 UART: [art] PUB.Y = F4E15EF75086F8DFC8F942C50C8FC6135689E90BF8D75472ABDD0460FD4940D19FFC7B85E1DB785D71019B699739382F
25,177,261 UART: [art] SIG.R = 22B87A8F1C36CD4B751C49DC89C8B630FF6C8CB76BE34C29DC3BB67F3AFE766F8F0477E333F57A6A82C4BB14AB5F42C1
25,184,650 UART: [art] SIG.S = 16EADB9EB14EC472D9C0E6914A3B572B77658F86B45D6FCBDB8640B2777B8DEB277E8B35B8561C0F68B15FC092C53398
26,163,726 UART: Caliptra RT
26,164,433 UART: [state] CFI Enabled
26,344,859 UART: [rt] RT listening for mailbox commands...
26,347,138 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,502,562 UART: [rt]cmd =0x41544d4e, len=14344
30,498,302 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
3,416,683 ready_for_fw is high
3,417,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,789 >>> mbox cmd response: success
19,111,738 UART:
19,112,129 UART: Running Caliptra FMC ...
19,113,264 UART:
19,113,424 UART: [state] CFI Enabled
19,179,182 UART: [fht] FMC Alias Private Key: 7
20,945,396 UART: [art] Extend RT PCRs Done
20,946,625 UART: [art] Lock RT PCRs Done
20,948,358 UART: [art] Populate DV Done
20,953,981 UART: [fht] FMC Alias Private Key: 7
20,955,648 UART: [art] Derive CDI
20,956,468 UART: [art] Store in slot 0x4
21,012,175 UART: [art] Derive Key Pair
21,013,225 UART: [art] Store priv key in slot 0x5
23,475,726 UART: [art] Derive Key Pair - Done
23,489,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,661 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,168 UART: [art] PUB.X = 93DAEE2A2C98647E678D897EB2440300E552826D8D0C8127561FE2CD58DC273B450B4902A12876DAE62CF1FED8E48E93
25,211,436 UART: [art] PUB.Y = 352A2B1D03F4DD440F1B0E5FE6B02A5F4867D3EFD20A42396B96560F0D675559FCE7B1FC3C249ADA6FA775BDAC3CB504
25,218,723 UART: [art] SIG.R = 614C5FDBD7A30C2B0C15986A73528D6DD293D6C4557CC399C10C00B08FC97E2F8AAF1647C3DCC024384A12AD5C8D04B7
25,226,088 UART: [art] SIG.S = D4735339F0F896ACC37D6C101383D5A19859D99E26A30FC11E1D753BCED75FFD629F6116512B4ADD683811A6ADBA8170
26,204,967 UART: Caliptra RT
26,205,671 UART: [state] CFI Enabled
26,386,446 UART: [rt] RT listening for mailbox commands...
26,388,823 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,544,128 UART: [rt]cmd =0x41544d4e, len=14344
30,539,316 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,519 UART:
192,873 UART: Running Caliptra ROM ...
194,012 UART:
603,683 UART: [state] CFI Enabled
616,114 UART: [state] LifecycleState = Unprovisioned
618,550 UART: [state] DebugLocked = No
620,799 UART: [state] WD Timer not started. Device not locked for debugging
625,413 UART: [kat] SHA2-256
815,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,098 UART: [kat] ++
826,721 UART: [kat] sha1
838,244 UART: [kat] SHA2-256
841,249 UART: [kat] SHA2-384
847,091 UART: [kat] SHA2-512-ACC
849,646 UART: [kat] ECC-384
3,291,376 UART: [kat] HMAC-384Kdf
3,303,782 UART: [kat] LMS
3,835,643 UART: [kat] --
3,839,656 UART: [cold-reset] ++
3,841,665 UART: [fht] FHT @ 0x50003400
3,853,854 UART: [idev] ++
3,854,629 UART: [idev] CDI.KEYID = 6
3,855,522 UART: [idev] SUBJECT.KEYID = 7
3,856,715 UART: [idev] UDS.KEYID = 0
3,857,632 ready_for_fw is high
3,857,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,786 UART: [idev] Erasing UDS.KEYID = 0
6,329,723 UART: [idev] Sha1 KeyId Algorithm
6,352,432 UART: [idev] --
6,356,115 UART: [ldev] ++
6,356,794 UART: [ldev] CDI.KEYID = 6
6,357,781 UART: [ldev] SUBJECT.KEYID = 5
6,358,889 UART: [ldev] AUTHORITY.KEYID = 7
6,360,122 UART: [ldev] FE.KEYID = 1
6,369,634 UART: [ldev] Erasing FE.KEYID = 1
8,848,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,986 UART: [ldev] --
10,639,847 UART: [fwproc] Wait for Commands...
10,641,885 UART: [fwproc] Recv command 0x46574c44
10,644,196 UART: [fwproc] Recv'd Img size: 118548 bytes
14,140,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,217,046 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,340,658 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,901,220 >>> mbox cmd response: success
14,904,447 UART: [afmc] ++
14,905,175 UART: [afmc] CDI.KEYID = 6
14,906,295 UART: [afmc] SUBJECT.KEYID = 7
14,907,853 UART: [afmc] AUTHORITY.KEYID = 5
17,411,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,134,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,136,800 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,151,901 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,167,099 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,181,934 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,206,181 UART: [afmc] --
19,209,079 UART: [cold-reset] --
19,212,310 UART: [state] Locking Datavault
19,217,258 UART: [state] Locking PCR0, PCR1 and PCR31
19,219,429 UART: [state] Locking ICCM
19,221,266 UART: [exit] Launching FMC @ 0x40000130
19,229,962 UART:
19,230,199 UART: Running Caliptra FMC ...
19,231,305 UART:
19,231,470 UART: [state] CFI Enabled
19,239,573 UART: [fht] FMC Alias Private Key: 7
21,005,723 UART: [art] Extend RT PCRs Done
21,007,085 UART: [art] Lock RT PCRs Done
21,008,516 UART: [art] Populate DV Done
21,013,782 UART: [fht] FMC Alias Private Key: 7
21,015,332 UART: [art] Derive CDI
21,016,157 UART: [art] Store in slot 0x4
21,058,759 UART: [art] Derive Key Pair
21,059,760 UART: [art] Store priv key in slot 0x5
23,486,256 UART: [art] Derive Key Pair - Done
23,499,069 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,110 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,593 UART: [art] PUB.X = 3ECC5BDEB191A7C8A58BB6418D64388BE657F8C2232EC1F68D6A7487C4FBD0467E74B8B7CCA4A64696C8C1D14147DBEC
25,213,917 UART: [art] PUB.Y = 3FE4986DB135B885690CA2F8E830917F47E3956DBE513353DAD14F284B65F6DD19754F563EEBD11E2249329905FC2EFC
25,221,189 UART: [art] SIG.R = 2D6745423D4B9416C307C5D30CB69D61D46FD6A6939D463843071DC6F5BC5079A0E7310B7329C4F12F6878229D0C0411
25,228,512 UART: [art] SIG.S = 547006A624AEBD603DD0FE3C08B0938F2AC78C33BA38FF67B1AEFF35E3F5DBEC8039F8C1F0009D4EAB366EFBAB045E36
26,207,606 UART: Caliptra RT
26,208,336 UART: [state] CFI Enabled
26,341,069 UART: [rt] RT listening for mailbox commands...
26,343,419 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,498,727 UART: [rt]cmd =0x41544d4e, len=14344
30,494,844 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,451 writing to cptra_bootfsm_go
3,760,985 ready_for_fw is high
3,761,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,869 >>> mbox cmd response: success
19,301,139 UART:
19,301,551 UART: Running Caliptra FMC ...
19,302,664 UART:
19,302,822 UART: [state] CFI Enabled
19,310,594 UART: [fht] FMC Alias Private Key: 7
21,076,903 UART: [art] Extend RT PCRs Done
21,078,146 UART: [art] Lock RT PCRs Done
21,079,672 UART: [art] Populate DV Done
21,085,254 UART: [fht] FMC Alias Private Key: 7
21,086,872 UART: [art] Derive CDI
21,087,617 UART: [art] Store in slot 0x4
21,130,119 UART: [art] Derive Key Pair
21,131,173 UART: [art] Store priv key in slot 0x5
23,558,458 UART: [art] Derive Key Pair - Done
23,571,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,122 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,628 UART: [art] PUB.X = 8149E30F47B70FEAF51F45523EDFE1E2BE5EE62367EC3A855A7EF562A47216EE99B0676D465CE7740700F18C0010C453
25,286,884 UART: [art] PUB.Y = A9D0AB21F9E0209881D4CCBD1E89052660B435E3DEF222A6CF8721B71BCE0CB3354468334A9AF73DF4ED3436ABAAB0B8
25,294,130 UART: [art] SIG.R = FE6986E3A4201979DBDF69D48395ED5D5746CAD1DC8626CEC075B9D10658119B7E90067477E14A93B650AFD3331DB431
25,301,528 UART: [art] SIG.S = 461BAB9D1C23D8CD8398EC9F213A440FFBDB6A59FA76FEF76575733DBE00264BA5AD9345555745AD7952BB5FEF514C04
26,280,632 UART: Caliptra RT
26,281,364 UART: [state] CFI Enabled
26,413,844 UART: [rt] RT listening for mailbox commands...
26,416,182 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,571,432 UART: [rt]cmd =0x41544d4e, len=14344
30,566,351 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,119 UART: [kat] SHA2-256
882,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,165 UART: [kat] ++
886,317 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,430 UART: [kat] SHA2-512-ACC
897,331 UART: [kat] ECC-384
902,880 UART: [kat] HMAC-384Kdf
907,452 UART: [kat] LMS
1,475,648 UART: [kat] --
1,476,341 UART: [cold-reset] ++
1,476,799 UART: [fht] Storing FHT @ 0x50003400
1,479,496 UART: [idev] ++
1,479,664 UART: [idev] CDI.KEYID = 6
1,480,024 UART: [idev] SUBJECT.KEYID = 7
1,480,448 UART: [idev] UDS.KEYID = 0
1,480,793 ready_for_fw is high
1,480,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,600 UART: [idev] Erasing UDS.KEYID = 0
1,504,354 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,936 UART: [idev] --
1,514,043 UART: [ldev] ++
1,514,211 UART: [ldev] CDI.KEYID = 6
1,514,574 UART: [ldev] SUBJECT.KEYID = 5
1,515,000 UART: [ldev] AUTHORITY.KEYID = 7
1,515,463 UART: [ldev] FE.KEYID = 1
1,520,759 UART: [ldev] Erasing FE.KEYID = 1
1,545,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,524 UART: [ldev] --
1,585,035 UART: [fwproc] Waiting for Commands...
1,585,842 UART: [fwproc] Received command 0x46574c44
1,586,633 UART: [fwproc] Received Image of size 118548 bytes
2,931,087 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,955 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,173 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,570 >>> mbox cmd response: success
3,130,644 UART: [afmc] ++
3,130,812 UART: [afmc] CDI.KEYID = 6
3,131,174 UART: [afmc] SUBJECT.KEYID = 7
3,131,599 UART: [afmc] AUTHORITY.KEYID = 5
3,166,406 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,476 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,256 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,965 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,848 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,531 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,489 UART: [afmc] --
3,209,585 UART: [cold-reset] --
3,210,435 UART: [state] Locking Datavault
3,211,462 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,066 UART: [state] Locking ICCM
3,212,544 UART: [exit] Launching FMC @ 0x40000130
3,217,874 UART:
3,217,890 UART: Running Caliptra FMC ...
3,218,298 UART:
3,218,352 UART: [state] CFI Enabled
3,228,396 UART: [fht] FMC Alias Private Key: 7
3,346,766 UART: [art] Extend RT PCRs Done
3,347,194 UART: [art] Lock RT PCRs Done
3,348,650 UART: [art] Populate DV Done
3,356,647 UART: [fht] FMC Alias Private Key: 7
3,357,729 UART: [art] Derive CDI
3,358,009 UART: [art] Store in slot 0x4
3,443,651 UART: [art] Derive Key Pair
3,444,011 UART: [art] Store priv key in slot 0x5
3,456,486 UART: [art] Derive Key Pair - Done
3,470,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,486,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,445 UART: [art] PUB.X = 067044698A9554C856F213F0C9C2128B14D2AEA4A7C460ED090B3E0F1D41B06B3F70CE5E375E4A672019C2E91E46DF78
3,494,205 UART: [art] PUB.Y = 8B2808BD0DB32677D2CAE06A3A05AF1EDC3F9726647A6D15AAA0E42C1C6757475E8628E417C28294099907CF6B3D87D9
3,501,144 UART: [art] SIG.R = C1CB12222BC210726066DE4EF12E1CB144B85EB78E68E9B71884C03357E667C3FB4250C4C456790578CAEFADDB4998A4
3,507,917 UART: [art] SIG.S = 00A16D6C9D045F368C7ED7D05976393A685FBBF355FB07403F3EA5F8ABDF997F6E8C83040EFF17AEE700F9C33AC9C546
3,531,523 UART: Caliptra RT
3,531,774 UART: [state] CFI Enabled
3,652,143 UART: [rt] RT listening for mailbox commands...
3,652,813 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,775,965 UART: [rt]cmd =0x41544d4e, len=14344
4,085,930 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,465 ready_for_fw is high
1,361,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,376 >>> mbox cmd response: success
3,041,797 UART:
3,041,813 UART: Running Caliptra FMC ...
3,042,221 UART:
3,042,275 UART: [state] CFI Enabled
3,053,017 UART: [fht] FMC Alias Private Key: 7
3,172,011 UART: [art] Extend RT PCRs Done
3,172,439 UART: [art] Lock RT PCRs Done
3,173,975 UART: [art] Populate DV Done
3,182,176 UART: [fht] FMC Alias Private Key: 7
3,183,260 UART: [art] Derive CDI
3,183,540 UART: [art] Store in slot 0x4
3,269,316 UART: [art] Derive Key Pair
3,269,676 UART: [art] Store priv key in slot 0x5
3,282,783 UART: [art] Derive Key Pair - Done
3,297,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,742 UART: [art] PUB.X = 98C57AC813B77AB88A051095A626BF7662FE373DB8655F4145F5A8955009D022DA1890428FDA87C99C595416B8F6BDE2
3,320,504 UART: [art] PUB.Y = 2AA0F0F8737E5EB3CA053B325172715481FB505F00B050F93BEB418D2C55E3AE1BDFED4C362B791CD215469E3DC551E1
3,327,439 UART: [art] SIG.R = 4798938A677C246674E51C51CE114CE08AA88AABA02F40B8FD637E4FA228B54D6E1F62DC7862492FC033169FA895F8A0
3,334,213 UART: [art] SIG.S = 15FCCC32EF6D31D8227CEF0F6C0AEF733EF9F50C73D791C31CC384C286C23F19BECC4DF3414537BD909CEB6247369B84
3,357,718 UART: Caliptra RT
3,357,969 UART: [state] CFI Enabled
3,477,580 UART: [rt] RT listening for mailbox commands...
3,478,250 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,484 UART: [rt]cmd =0x41544d4e, len=14344
3,911,889 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
86,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,544 UART: [kat] SHA2-256
882,475 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,590 UART: [kat] ++
886,742 UART: [kat] sha1
890,942 UART: [kat] SHA2-256
892,880 UART: [kat] SHA2-384
895,781 UART: [kat] SHA2-512-ACC
897,682 UART: [kat] ECC-384
903,229 UART: [kat] HMAC-384Kdf
907,901 UART: [kat] LMS
1,476,097 UART: [kat] --
1,476,788 UART: [cold-reset] ++
1,477,126 UART: [fht] Storing FHT @ 0x50003400
1,479,917 UART: [idev] ++
1,480,085 UART: [idev] CDI.KEYID = 6
1,480,445 UART: [idev] SUBJECT.KEYID = 7
1,480,869 UART: [idev] UDS.KEYID = 0
1,481,214 ready_for_fw is high
1,481,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,929 UART: [idev] Erasing UDS.KEYID = 0
1,506,093 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,679 UART: [idev] --
1,515,812 UART: [ldev] ++
1,515,980 UART: [ldev] CDI.KEYID = 6
1,516,343 UART: [ldev] SUBJECT.KEYID = 5
1,516,769 UART: [ldev] AUTHORITY.KEYID = 7
1,517,232 UART: [ldev] FE.KEYID = 1
1,522,468 UART: [ldev] Erasing FE.KEYID = 1
1,547,991 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,295 UART: [ldev] --
1,587,558 UART: [fwproc] Waiting for Commands...
1,588,299 UART: [fwproc] Received command 0x46574c44
1,589,090 UART: [fwproc] Received Image of size 118548 bytes
2,934,044 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,312 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,530 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,751 >>> mbox cmd response: success
3,133,831 UART: [afmc] ++
3,133,999 UART: [afmc] CDI.KEYID = 6
3,134,361 UART: [afmc] SUBJECT.KEYID = 7
3,134,786 UART: [afmc] AUTHORITY.KEYID = 5
3,170,439 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,579 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,359 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,068 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,951 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,634 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,700 UART: [afmc] --
3,213,740 UART: [cold-reset] --
3,214,412 UART: [state] Locking Datavault
3,215,679 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,283 UART: [state] Locking ICCM
3,216,811 UART: [exit] Launching FMC @ 0x40000130
3,222,141 UART:
3,222,157 UART: Running Caliptra FMC ...
3,222,565 UART:
3,222,708 UART: [state] CFI Enabled
3,233,380 UART: [fht] FMC Alias Private Key: 7
3,351,748 UART: [art] Extend RT PCRs Done
3,352,176 UART: [art] Lock RT PCRs Done
3,353,686 UART: [art] Populate DV Done
3,361,911 UART: [fht] FMC Alias Private Key: 7
3,362,991 UART: [art] Derive CDI
3,363,271 UART: [art] Store in slot 0x4
3,449,039 UART: [art] Derive Key Pair
3,449,399 UART: [art] Store priv key in slot 0x5
3,463,204 UART: [art] Derive Key Pair - Done
3,478,108 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,803 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,568 UART: [art] PUB.X = 85BCB48CFF8A2FC5D73E6334775F5A5031C33A8C0AC02A83B451BC8DFEB0B7130EA5621E6E9132F0FE19CA76374F930D
3,501,343 UART: [art] PUB.Y = 7E3A318690F05F265319C221F88FCA9AF1B0A7A1CC5FD8D23F75E0426DC72E00846257E1F0D3AF8E2D7C65F9A3B6DD08
3,508,280 UART: [art] SIG.R = C5E4AF14DE50BEDCBE515AD220D6E0A57044BCE76B68FE1256E0F1ADA1ABC55B07C83C4BFD384CF177A7386D3F1296A5
3,515,071 UART: [art] SIG.S = B5C473A1A8BCE208B7C43B39A1BE64219E09559064A16E7EC992AE9CB37B56325C3F800C0C9E20E1C0F4B2D110047AD7
3,538,644 UART: Caliptra RT
3,538,987 UART: [state] CFI Enabled
3,659,808 UART: [rt] RT listening for mailbox commands...
3,660,478 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,846 UART: [rt]cmd =0x41544d4e, len=14344
4,093,831 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,094 ready_for_fw is high
1,363,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,451 >>> mbox cmd response: success
3,043,506 UART:
3,043,522 UART: Running Caliptra FMC ...
3,043,930 UART:
3,044,073 UART: [state] CFI Enabled
3,054,591 UART: [fht] FMC Alias Private Key: 7
3,174,015 UART: [art] Extend RT PCRs Done
3,174,443 UART: [art] Lock RT PCRs Done
3,176,009 UART: [art] Populate DV Done
3,184,160 UART: [fht] FMC Alias Private Key: 7
3,185,312 UART: [art] Derive CDI
3,185,592 UART: [art] Store in slot 0x4
3,271,550 UART: [art] Derive Key Pair
3,271,910 UART: [art] Store priv key in slot 0x5
3,285,289 UART: [art] Derive Key Pair - Done
3,299,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,865 UART: [art] PUB.X = 600EE0BB09EC2EBDF78DC0F5C32FB5ED0D20E25F3F15BDACEE97BEF03833524B589BA21A33F7ABCD8474E161A47A4079
3,322,650 UART: [art] PUB.Y = BFB710C532C08491CACDBFBDC94EF117A0DA195EB411CB66971BACF6E2C4D1D460D8F47E8DEDF0EBC2D7A1D43C5EF7ED
3,329,636 UART: [art] SIG.R = 19276EE56A0D08E8376406BD255726BF2CCA509A3CDF27C15CCC62C6ABABEEA69091102E9D0B76D9BF7E3405CDB79332
3,336,405 UART: [art] SIG.S = 64550F7266B7C2D5845AF0100EA7631A6137B7A1A87EC45EA350E8324817F132F4AE4C361178D64E3D86CB7A3553D68C
3,360,625 UART: Caliptra RT
3,360,968 UART: [state] CFI Enabled
3,480,383 UART: [rt] RT listening for mailbox commands...
3,481,053 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,091 UART: [rt]cmd =0x41544d4e, len=14344
3,914,052 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
891,022 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,126 UART: [kat] ++
895,278 UART: [kat] sha1
899,438 UART: [kat] SHA2-256
901,378 UART: [kat] SHA2-384
904,343 UART: [kat] SHA2-512-ACC
906,244 UART: [kat] ECC-384
915,889 UART: [kat] HMAC-384Kdf
920,517 UART: [kat] LMS
1,168,829 UART: [kat] --
1,169,674 UART: [cold-reset] ++
1,170,190 UART: [fht] FHT @ 0x50003400
1,172,882 UART: [idev] ++
1,173,050 UART: [idev] CDI.KEYID = 6
1,173,411 UART: [idev] SUBJECT.KEYID = 7
1,173,836 UART: [idev] UDS.KEYID = 0
1,174,182 ready_for_fw is high
1,174,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,023 UART: [idev] Erasing UDS.KEYID = 0
1,198,801 UART: [idev] Sha1 KeyId Algorithm
1,207,729 UART: [idev] --
1,208,864 UART: [ldev] ++
1,209,032 UART: [ldev] CDI.KEYID = 6
1,209,396 UART: [ldev] SUBJECT.KEYID = 5
1,209,823 UART: [ldev] AUTHORITY.KEYID = 7
1,210,286 UART: [ldev] FE.KEYID = 1
1,215,374 UART: [ldev] Erasing FE.KEYID = 1
1,241,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,642 UART: [ldev] --
1,281,087 UART: [fwproc] Wait for Commands...
1,281,904 UART: [fwproc] Recv command 0x46574c44
1,282,637 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,213 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,388 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,777 >>> mbox cmd response: success
2,826,821 UART: [afmc] ++
2,826,989 UART: [afmc] CDI.KEYID = 6
2,827,352 UART: [afmc] SUBJECT.KEYID = 7
2,827,778 UART: [afmc] AUTHORITY.KEYID = 5
2,863,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,711 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,421 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,302 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,003 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,904 UART: [afmc] --
2,906,967 UART: [cold-reset] --
2,907,635 UART: [state] Locking Datavault
2,908,956 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,560 UART: [state] Locking ICCM
2,910,156 UART: [exit] Launching FMC @ 0x40000130
2,915,486 UART:
2,915,502 UART: Running Caliptra FMC ...
2,915,910 UART:
2,915,964 UART: [state] CFI Enabled
2,927,108 UART: [fht] FMC Alias Private Key: 7
3,046,242 UART: [art] Extend RT PCRs Done
3,046,670 UART: [art] Lock RT PCRs Done
3,048,082 UART: [art] Populate DV Done
3,056,481 UART: [fht] FMC Alias Private Key: 7
3,057,417 UART: [art] Derive CDI
3,057,697 UART: [art] Store in slot 0x4
3,143,432 UART: [art] Derive Key Pair
3,143,792 UART: [art] Store priv key in slot 0x5
3,157,254 UART: [art] Derive Key Pair - Done
3,172,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,345 UART: [art] PUB.X = 2E3C98CB41C828A4BE8EEE506EF363164D0F81BBADB31044987F78EE74F700755929D27237102E39F2D4423AC0EE45A8
3,195,094 UART: [art] PUB.Y = 1F5626A91EFCA2531F4D5BC6C120C5CE15EFC4D33CE356BA162D18D91D4902F7713BD35ACE07C55EC16995C9F34D87B2
3,202,052 UART: [art] SIG.R = D25E57749164542BA2D50F5973F1D83B7BBB047A14CC6099180C1A7E8103620EB059BA232C6B530A5E0CFBA9D72D2514
3,208,803 UART: [art] SIG.S = 419C548276E4774D0423A3964F191F054BA5570A63607541EC1E07EC784CA94AD5DB05CAB4A9D28F42A2C0B513516619
3,233,162 UART: Caliptra RT
3,233,413 UART: [state] CFI Enabled
3,353,672 UART: [rt] RT listening for mailbox commands...
3,354,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,268 UART: [rt]cmd =0x41544d4e, len=14344
3,786,747 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,234 ready_for_fw is high
1,059,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,718 >>> mbox cmd response: success
2,740,173 UART:
2,740,189 UART: Running Caliptra FMC ...
2,740,597 UART:
2,740,651 UART: [state] CFI Enabled
2,751,217 UART: [fht] FMC Alias Private Key: 7
2,869,375 UART: [art] Extend RT PCRs Done
2,869,803 UART: [art] Lock RT PCRs Done
2,871,467 UART: [art] Populate DV Done
2,879,908 UART: [fht] FMC Alias Private Key: 7
2,881,014 UART: [art] Derive CDI
2,881,294 UART: [art] Store in slot 0x4
2,967,099 UART: [art] Derive Key Pair
2,967,459 UART: [art] Store priv key in slot 0x5
2,979,979 UART: [art] Derive Key Pair - Done
2,994,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,663 UART: [art] PUB.X = A791F932EA4BECCEA82D3F4019649C442123B14D35123D3147E32159B4A52EA0536E8882F50126EC56BE4FD6ECEC80BC
3,017,438 UART: [art] PUB.Y = E41BE11582FCF9387669BE636EBA9FCDBDD63D471C6DF106A80519B1B0DD2BF204B50C73219E865C45C674B1AB8BB703
3,024,387 UART: [art] SIG.R = 55704B41246AF894FCD5EAC346299E099B6930CD18C235F6D07852E90285C66A3790898A2E91A8D66B431A3476824B4B
3,031,143 UART: [art] SIG.S = E432C6661D1F6FB6ABE02E9EB4FCF36C39E5ED8899D6B70254FE93F5F6508FA0CF46F858BF142168AA29123D82B797CB
3,054,944 UART: Caliptra RT
3,055,195 UART: [state] CFI Enabled
3,174,588 UART: [rt] RT listening for mailbox commands...
3,175,258 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,022 UART: [rt]cmd =0x41544d4e, len=14344
3,607,799 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,729 UART: [kat] ++
895,881 UART: [kat] sha1
899,957 UART: [kat] SHA2-256
901,897 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,770 UART: [kat] HMAC-384Kdf
921,496 UART: [kat] LMS
1,169,808 UART: [kat] --
1,170,633 UART: [cold-reset] ++
1,171,213 UART: [fht] FHT @ 0x50003400
1,174,025 UART: [idev] ++
1,174,193 UART: [idev] CDI.KEYID = 6
1,174,554 UART: [idev] SUBJECT.KEYID = 7
1,174,979 UART: [idev] UDS.KEYID = 0
1,175,325 ready_for_fw is high
1,175,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,836 UART: [idev] Erasing UDS.KEYID = 0
1,199,972 UART: [idev] Sha1 KeyId Algorithm
1,208,906 UART: [idev] --
1,209,907 UART: [ldev] ++
1,210,075 UART: [ldev] CDI.KEYID = 6
1,210,439 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,217,035 UART: [ldev] Erasing FE.KEYID = 1
1,243,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,911 UART: [ldev] --
1,283,266 UART: [fwproc] Wait for Commands...
1,283,973 UART: [fwproc] Recv command 0x46574c44
1,284,706 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,872 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,047 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,268 >>> mbox cmd response: success
2,827,416 UART: [afmc] ++
2,827,584 UART: [afmc] CDI.KEYID = 6
2,827,947 UART: [afmc] SUBJECT.KEYID = 7
2,828,373 UART: [afmc] AUTHORITY.KEYID = 5
2,863,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,638 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,348 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,229 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,930 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,673 UART: [afmc] --
2,906,530 UART: [cold-reset] --
2,907,456 UART: [state] Locking Datavault
2,908,779 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,383 UART: [state] Locking ICCM
2,910,015 UART: [exit] Launching FMC @ 0x40000130
2,915,345 UART:
2,915,361 UART: Running Caliptra FMC ...
2,915,769 UART:
2,915,912 UART: [state] CFI Enabled
2,926,180 UART: [fht] FMC Alias Private Key: 7
3,044,478 UART: [art] Extend RT PCRs Done
3,044,906 UART: [art] Lock RT PCRs Done
3,046,180 UART: [art] Populate DV Done
3,054,273 UART: [fht] FMC Alias Private Key: 7
3,055,455 UART: [art] Derive CDI
3,055,735 UART: [art] Store in slot 0x4
3,141,806 UART: [art] Derive Key Pair
3,142,166 UART: [art] Store priv key in slot 0x5
3,155,932 UART: [art] Derive Key Pair - Done
3,170,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,745 UART: [art] PUB.X = 44D3916828189A9328DB48460D2EB356A9A1D11E3661D42A53D8377A41774D31ED754FF17D390672BD345FCF53AD72A4
3,193,505 UART: [art] PUB.Y = 76D253062DD6E7CAABC16F2E96F02AA4C090DC9458CCA3CFD72AD98D38D61622998C414C3236CA0C832F16638A2DBCAE
3,200,465 UART: [art] SIG.R = 178257197EE93A83950BF8698EA0C15AD002397393DACFE6037EA180EFF6B11AA7329D1EBC9F5BEB1EF1FCCF0CF8168B
3,207,241 UART: [art] SIG.S = 0843A1601EE78F35AE9481D9840137FD3F7FFE7DB07941A707718001E07E5F4D07A3A07E25D58944B47334838B1D1193
3,231,266 UART: Caliptra RT
3,231,609 UART: [state] CFI Enabled
3,351,841 UART: [rt] RT listening for mailbox commands...
3,352,511 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,337 UART: [rt]cmd =0x41544d4e, len=14344
3,785,124 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,341 ready_for_fw is high
1,060,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,547 >>> mbox cmd response: success
2,740,892 UART:
2,740,908 UART: Running Caliptra FMC ...
2,741,316 UART:
2,741,459 UART: [state] CFI Enabled
2,751,889 UART: [fht] FMC Alias Private Key: 7
2,870,171 UART: [art] Extend RT PCRs Done
2,870,599 UART: [art] Lock RT PCRs Done
2,872,169 UART: [art] Populate DV Done
2,880,526 UART: [fht] FMC Alias Private Key: 7
2,881,586 UART: [art] Derive CDI
2,881,866 UART: [art] Store in slot 0x4
2,967,251 UART: [art] Derive Key Pair
2,967,611 UART: [art] Store priv key in slot 0x5
2,981,423 UART: [art] Derive Key Pair - Done
2,996,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,826 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,591 UART: [art] PUB.X = F171F7F391BB3D3C11D58B8E24D76FDAA61C8A923AB685D3DB4ED3D38BA2CBF8C114339C98A5F572652F8E5553C69611
3,019,373 UART: [art] PUB.Y = BBCD11DB67842BDE1849E75F9B320CC2304CDC8C279F6F54BA468D5956AF4AD9A53C7225E8161D9EBE49F968299F540D
3,026,329 UART: [art] SIG.R = 1C7DE24E7592530CEFD661F8C84058AF1F9AD988DAAEC17D3C00B3C9F2A221012C9F3C640C42B7A3DA58DD9A6147D604
3,033,079 UART: [art] SIG.S = E26FA2B7C24CBDAE2489BA72340EFB191AFBA01F865CC99DF481DC3594123B36425BB45BB6C83B81627DE7D0C2842B54
3,056,686 UART: Caliptra RT
3,057,029 UART: [state] CFI Enabled
3,175,876 UART: [rt] RT listening for mailbox commands...
3,176,546 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,820 UART: [rt]cmd =0x41544d4e, len=14344
3,609,711 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
86,025 UART: [state] WD Timer not started. Device not locked for debugging
87,222 UART: [kat] SHA2-256
892,872 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,997 UART: [kat] ++
897,149 UART: [kat] sha1
901,255 UART: [kat] SHA2-256
903,195 UART: [kat] SHA2-384
906,116 UART: [kat] SHA2-512-ACC
908,017 UART: [kat] ECC-384
917,446 UART: [kat] HMAC-384Kdf
922,022 UART: [kat] LMS
1,170,350 UART: [kat] --
1,171,297 UART: [cold-reset] ++
1,171,667 UART: [fht] FHT @ 0x50003400
1,174,354 UART: [idev] ++
1,174,522 UART: [idev] CDI.KEYID = 6
1,174,882 UART: [idev] SUBJECT.KEYID = 7
1,175,306 UART: [idev] UDS.KEYID = 0
1,175,651 ready_for_fw is high
1,175,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,376 UART: [idev] Erasing UDS.KEYID = 0
1,200,101 UART: [idev] Sha1 KeyId Algorithm
1,208,795 UART: [idev] --
1,209,833 UART: [ldev] ++
1,210,001 UART: [ldev] CDI.KEYID = 6
1,210,364 UART: [ldev] SUBJECT.KEYID = 5
1,210,790 UART: [ldev] AUTHORITY.KEYID = 7
1,211,253 UART: [ldev] FE.KEYID = 1
1,216,391 UART: [ldev] Erasing FE.KEYID = 1
1,243,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,365 UART: [ldev] --
1,282,626 UART: [fwproc] Wait for Commands...
1,283,226 UART: [fwproc] Recv command 0x46574c44
1,283,954 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,060 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,230 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,501 >>> mbox cmd response: success
2,828,699 UART: [afmc] ++
2,828,867 UART: [afmc] CDI.KEYID = 6
2,829,229 UART: [afmc] SUBJECT.KEYID = 7
2,829,654 UART: [afmc] AUTHORITY.KEYID = 5
2,864,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,062 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,771 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,654 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,355 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,329 UART: [afmc] --
2,908,243 UART: [cold-reset] --
2,909,233 UART: [state] Locking Datavault
2,910,380 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,984 UART: [state] Locking ICCM
2,911,616 UART: [exit] Launching FMC @ 0x40000130
2,916,946 UART:
2,916,962 UART: Running Caliptra FMC ...
2,917,370 UART:
2,917,424 UART: [state] CFI Enabled
2,927,978 UART: [fht] FMC Alias Private Key: 7
3,046,330 UART: [art] Extend RT PCRs Done
3,046,758 UART: [art] Lock RT PCRs Done
3,047,952 UART: [art] Populate DV Done
3,056,121 UART: [fht] FMC Alias Private Key: 7
3,057,109 UART: [art] Derive CDI
3,057,389 UART: [art] Store in slot 0x4
3,143,076 UART: [art] Derive Key Pair
3,143,436 UART: [art] Store priv key in slot 0x5
3,156,810 UART: [art] Derive Key Pair - Done
3,171,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,622 UART: [art] PUB.X = A467B5F95FEB1275A34E9BF7A676204FA0CF87FF493938B586E42F9B8F7513A7B79B7DBBC5AFD93D275C8920AE4D96EE
3,195,408 UART: [art] PUB.Y = B141EC28869DC279C5932D637A2E4F472CCDCB3953169C034BF267B343B18627332239B140564DA7BE1792F1CB018506
3,202,343 UART: [art] SIG.R = DB685E5C3B079C3AD88D4162108DE95D94AA684A891B232A321602BA5880382864796F7F0FEED8C9557BC8DE4B68A129
3,209,106 UART: [art] SIG.S = 0F12684054BF22C58CE9632473C81FDA8AA5F0331FC1EF9CA51CF0FEC9D41EE764202639B255B9BE19AADD42211DDC93
3,233,059 UART: Caliptra RT
3,233,310 UART: [state] CFI Enabled
3,352,721 UART: [rt] RT listening for mailbox commands...
3,353,391 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,443 UART: [rt]cmd =0x41544d4e, len=14344
3,786,340 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,641 ready_for_fw is high
1,060,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,838 >>> mbox cmd response: success
2,740,593 UART:
2,740,609 UART: Running Caliptra FMC ...
2,741,017 UART:
2,741,071 UART: [state] CFI Enabled
2,751,301 UART: [fht] FMC Alias Private Key: 7
2,869,991 UART: [art] Extend RT PCRs Done
2,870,419 UART: [art] Lock RT PCRs Done
2,871,825 UART: [art] Populate DV Done
2,880,018 UART: [fht] FMC Alias Private Key: 7
2,881,174 UART: [art] Derive CDI
2,881,454 UART: [art] Store in slot 0x4
2,967,329 UART: [art] Derive Key Pair
2,967,689 UART: [art] Store priv key in slot 0x5
2,981,265 UART: [art] Derive Key Pair - Done
2,996,206 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,326 UART: [art] PUB.X = 1951180DE1E1F5C1B5ADDB2C63BBF4A663B9069B67734102C96CFE256501C9C277789BAA9160416213F25C54C57FCF2B
3,019,088 UART: [art] PUB.Y = 6992E7994953E845AF950B5A180D75ACFFA73AAEDF5143CD21F5869E38AA186F922172DEB11C69D1D1A223620302271F
3,026,028 UART: [art] SIG.R = C88DA42D2E6B90F0578E7E8095EDEBC8F1094F7D6A4B939B2A5ACB25BABDD49A74F23B19F904AAE34AAD172C81B909DB
3,032,813 UART: [art] SIG.S = 9033D34ECBF01A81C14E0B81B7FA7B88B136C653DF09F93590EEE994FC39FD0E1C5C54A380F4ABB43B2919757A4E4615
3,057,274 UART: Caliptra RT
3,057,525 UART: [state] CFI Enabled
3,176,583 UART: [rt] RT listening for mailbox commands...
3,177,253 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,345 UART: [rt]cmd =0x41544d4e, len=14344
3,609,936 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
893,515 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,640 UART: [kat] ++
897,792 UART: [kat] sha1
901,998 UART: [kat] SHA2-256
903,938 UART: [kat] SHA2-384
906,767 UART: [kat] SHA2-512-ACC
908,668 UART: [kat] ECC-384
918,393 UART: [kat] HMAC-384Kdf
923,213 UART: [kat] LMS
1,171,541 UART: [kat] --
1,172,570 UART: [cold-reset] ++
1,173,046 UART: [fht] FHT @ 0x50003400
1,175,491 UART: [idev] ++
1,175,659 UART: [idev] CDI.KEYID = 6
1,176,019 UART: [idev] SUBJECT.KEYID = 7
1,176,443 UART: [idev] UDS.KEYID = 0
1,176,788 ready_for_fw is high
1,176,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,481 UART: [idev] Erasing UDS.KEYID = 0
1,201,386 UART: [idev] Sha1 KeyId Algorithm
1,210,036 UART: [idev] --
1,210,864 UART: [ldev] ++
1,211,032 UART: [ldev] CDI.KEYID = 6
1,211,395 UART: [ldev] SUBJECT.KEYID = 5
1,211,821 UART: [ldev] AUTHORITY.KEYID = 7
1,212,284 UART: [ldev] FE.KEYID = 1
1,217,574 UART: [ldev] Erasing FE.KEYID = 1
1,244,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,638 UART: [ldev] --
1,282,999 UART: [fwproc] Wait for Commands...
1,283,773 UART: [fwproc] Recv command 0x46574c44
1,284,501 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,495 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,665 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,838 >>> mbox cmd response: success
2,828,066 UART: [afmc] ++
2,828,234 UART: [afmc] CDI.KEYID = 6
2,828,596 UART: [afmc] SUBJECT.KEYID = 7
2,829,021 UART: [afmc] AUTHORITY.KEYID = 5
2,864,982 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,381 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,090 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,973 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,674 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,574 UART: [afmc] --
2,908,682 UART: [cold-reset] --
2,909,544 UART: [state] Locking Datavault
2,910,843 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,447 UART: [state] Locking ICCM
2,911,971 UART: [exit] Launching FMC @ 0x40000130
2,917,301 UART:
2,917,317 UART: Running Caliptra FMC ...
2,917,725 UART:
2,917,868 UART: [state] CFI Enabled
2,928,500 UART: [fht] FMC Alias Private Key: 7
3,048,408 UART: [art] Extend RT PCRs Done
3,048,836 UART: [art] Lock RT PCRs Done
3,050,400 UART: [art] Populate DV Done
3,058,849 UART: [fht] FMC Alias Private Key: 7
3,059,971 UART: [art] Derive CDI
3,060,251 UART: [art] Store in slot 0x4
3,146,180 UART: [art] Derive Key Pair
3,146,540 UART: [art] Store priv key in slot 0x5
3,159,902 UART: [art] Derive Key Pair - Done
3,174,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,216 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,981 UART: [art] PUB.X = 51F08ABAFFA584CAE806CEF1A1D820A6DFAE405365C39EABB805BFD182C8C97C0446E5B8858A764431626553F6CAEA05
3,197,755 UART: [art] PUB.Y = 169CA0367C73A789B444DD56A4905D92ADA3A4C7AC735AAFC0BEB1BD50BEBFBF5B163395BF2A3AA6FB00992F3912AF16
3,204,705 UART: [art] SIG.R = 5E871D3F5830EC41D5F9483A11A917223985B2F0725FCB07D935598DF345FBFA1C7CA766FDC62113D2117CA811E9A917
3,211,474 UART: [art] SIG.S = B6704344020AE3EFB94FE7C8691F2A170B8B2D33630834A00DC90713348703518B56E7B765597C57496835907A866ED4
3,235,329 UART: Caliptra RT
3,235,672 UART: [state] CFI Enabled
3,355,773 UART: [rt] RT listening for mailbox commands...
3,356,443 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,137 UART: [rt]cmd =0x41544d4e, len=14344
3,788,222 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,034 ready_for_fw is high
1,060,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,049 >>> mbox cmd response: success
2,741,350 UART:
2,741,366 UART: Running Caliptra FMC ...
2,741,774 UART:
2,741,917 UART: [state] CFI Enabled
2,752,651 UART: [fht] FMC Alias Private Key: 7
2,872,017 UART: [art] Extend RT PCRs Done
2,872,445 UART: [art] Lock RT PCRs Done
2,873,933 UART: [art] Populate DV Done
2,881,996 UART: [fht] FMC Alias Private Key: 7
2,882,956 UART: [art] Derive CDI
2,883,236 UART: [art] Store in slot 0x4
2,969,361 UART: [art] Derive Key Pair
2,969,721 UART: [art] Store priv key in slot 0x5
2,982,667 UART: [art] Derive Key Pair - Done
2,997,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,647 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,412 UART: [art] PUB.X = 3F48928B63B33BF0B9A9C00EB777A392FE30CE88AFD29550E67777BAA00E06E249D4144C52D40B6E77360FF1C2CC0C71
3,021,172 UART: [art] PUB.Y = 2E8DDE0BC840C1108A0F89158E7C8176F3D14A5C95EBDB32023B443536ED6D503DFFB616D4D1EF294B6477C94146FB7E
3,028,123 UART: [art] SIG.R = 0DB3BEBABB745F6FD735047116AF9D322BE3E9FB17104D05306D294236BA3FEA095FFCB634296C6BB6383F7A4965904A
3,034,891 UART: [art] SIG.S = F7E28B122900ADD0A701CE5D9A8E7061CB849AAF00004A842F87160923B54AADD6D9BF9131856C9B38C01A77B9B65EBE
3,058,993 UART: Caliptra RT
3,059,336 UART: [state] CFI Enabled
3,178,515 UART: [rt] RT listening for mailbox commands...
3,179,185 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,369 UART: [rt]cmd =0x41544d4e, len=14344
3,612,580 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
191,978 UART:
192,336 UART: Running Caliptra ROM ...
193,483 UART:
193,636 UART: [state] CFI Enabled
266,820 UART: [state] LifecycleState = Unprovisioned
268,806 UART: [state] DebugLocked = No
270,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,439 UART: [kat] SHA2-256
444,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,616 UART: [kat] ++
455,061 UART: [kat] sha1
466,007 UART: [kat] SHA2-256
468,685 UART: [kat] SHA2-384
475,669 UART: [kat] SHA2-512-ACC
478,035 UART: [kat] ECC-384
2,768,925 UART: [kat] HMAC-384Kdf
2,781,022 UART: [kat] LMS
3,971,296 UART: [kat] --
3,975,506 UART: [cold-reset] ++
3,977,997 UART: [fht] Storing FHT @ 0x50003400
3,988,263 UART: [idev] ++
3,988,832 UART: [idev] CDI.KEYID = 6
3,989,741 UART: [idev] SUBJECT.KEYID = 7
3,990,991 UART: [idev] UDS.KEYID = 0
3,992,039 ready_for_fw is high
3,992,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,331 UART: [idev] Erasing UDS.KEYID = 0
7,328,960 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,986 UART: [idev] --
7,355,039 UART: [ldev] ++
7,355,617 UART: [ldev] CDI.KEYID = 6
7,356,585 UART: [ldev] SUBJECT.KEYID = 5
7,357,738 UART: [ldev] AUTHORITY.KEYID = 7
7,359,025 UART: [ldev] FE.KEYID = 1
7,404,095 UART: [ldev] Erasing FE.KEYID = 1
10,734,609 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,876 UART: [ldev] --
13,095,342 UART: [fwproc] Waiting for Commands...
13,097,547 UART: [fwproc] Received command 0x46574c44
13,099,783 UART: [fwproc] Received Image of size 118548 bytes
17,203,289 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,197 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,350,349 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,678,363 >>> mbox cmd response: success
17,682,148 UART: [afmc] ++
17,682,820 UART: [afmc] CDI.KEYID = 6
17,683,736 UART: [afmc] SUBJECT.KEYID = 7
17,684,957 UART: [afmc] AUTHORITY.KEYID = 5
21,048,698 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,350,827 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,353,094 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,367,489 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,382,220 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,396,658 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,418,589 UART: [afmc] --
23,422,825 UART: [cold-reset] --
23,427,138 UART: [state] Locking Datavault
23,432,992 UART: [state] Locking PCR0, PCR1 and PCR31
23,434,748 UART: [state] Locking ICCM
23,437,120 UART: [exit] Launching FMC @ 0x40000130
23,445,517 UART:
23,445,750 UART: Running Caliptra FMC ...
23,446,848 UART:
23,447,013 UART: [state] CFI Enabled
23,511,131 UART: [fht] FMC Alias Private Key: 7
25,851,859 UART: [art] Extend RT PCRs Done
25,853,082 UART: [art] Lock RT PCRs Done
25,854,788 UART: [art] Populate DV Done
25,860,173 UART: [fht] FMC Alias Private Key: 7
25,861,723 UART: [art] Derive CDI
25,862,467 UART: [art] Store in slot 0x4
25,920,480 UART: [art] Derive Key Pair
25,921,505 UART: [art] Store priv key in slot 0x5
29,214,437 UART: [art] Derive Key Pair - Done
29,227,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,515,771 UART: [art] Erasing AUTHORITY.KEYID = 7
31,517,276 UART: [art] PUB.X = 0D7C49FFE431CAD4503C0D6797370E173F3454452DEB769FB3E4412F30848D2CF230C5017A5E26F30B211331EE4E03E6
31,524,558 UART: [art] PUB.Y = E5DD966879CFEB7B21141E7C78A7BF4B7F9E73CCE0BD7D0AA4E042C88F21D6C5F78DC699C2DDC3D6B28D5B632DF1C7D1
31,531,807 UART: [art] SIG.R = F4BB00679FFA558328E798B16BCE91573F45C374F58AA648481B86005F024AD7FC5B30AB07354FCA6808646404FBF89A
31,539,197 UART: [art] SIG.S = 15427CECB18FE6E5B1AEBFC7174B2F78DF254AD73292E2051BB95FD1D2ABB9B037DA67EAF1DCB3D11C45E05AEE300DE6
32,844,282 UART: Caliptra RT
32,845,004 UART: [state] CFI Enabled
33,020,389 UART: [rt] RT listening for mailbox commands...
33,022,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,053,315 UART: [rt]cmd =0x44504543, len=96
38,821,392 >>> mbox cmd response data (6236 bytes)
38,850,530 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,881,088 UART: [rt]cmd =0x53574545, len=84
44,464,625 >>> mbox cmd response data (200 bytes)
44,851,939 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,881,962 UART: [rt]cmd =0x4453424c, len=4
48,191,970 >>> mbox cmd response data (8 bytes)
48,192,516 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,222,881 UART: [rt]cmd =0x53574545, len=84
53,805,138 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
3,784,422 ready_for_fw is high
3,784,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,957,923 >>> mbox cmd response: success
23,649,267 UART:
23,649,685 UART: Running Caliptra FMC ...
23,650,819 UART:
23,650,971 UART: [state] CFI Enabled
23,718,161 UART: [fht] FMC Alias Private Key: 7
26,058,404 UART: [art] Extend RT PCRs Done
26,059,643 UART: [art] Lock RT PCRs Done
26,061,461 UART: [art] Populate DV Done
26,067,007 UART: [fht] FMC Alias Private Key: 7
26,068,543 UART: [art] Derive CDI
26,069,319 UART: [art] Store in slot 0x4
26,125,449 UART: [art] Derive Key Pair
26,126,453 UART: [art] Store priv key in slot 0x5
29,419,028 UART: [art] Derive Key Pair - Done
29,431,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,721,487 UART: [art] Erasing AUTHORITY.KEYID = 7
31,723,014 UART: [art] PUB.X = A0143C7AD9A55BB42975EBA01A6E99553D774732A16590E21FD59BC9294AA3E5F2091D79BB517C9F8EE98044C63370AB
31,730,240 UART: [art] PUB.Y = BBB2B310C5079FBCACE3C2A07BDB1B1ED8AA0CE492C30B63911AC6C46224879B4CA01E0937C702FEB831D5DAFE7AB33A
31,737,567 UART: [art] SIG.R = 81395762C121132A67AE806D888AA64E11A703293406118759B04C5042A410E34A862A6AD3BE7E8DE51F78118B4AFF35
31,744,921 UART: [art] SIG.S = 0429928C3DDAF28281CC446B8E04C6753E761F5C889DFF16A04D1D9E294656B588753CEE8FB30327A05588D66257DF00
33,049,873 UART: Caliptra RT
33,050,591 UART: [state] CFI Enabled
33,226,087 UART: [rt] RT listening for mailbox commands...
33,228,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,259,130 UART: [rt]cmd =0x44504543, len=96
39,027,481 >>> mbox cmd response data (6236 bytes)
39,056,619 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,087,508 UART: [rt]cmd =0x53574545, len=84
44,673,056 >>> mbox cmd response data (200 bytes)
45,057,151 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,087,516 UART: [rt]cmd =0x4453424c, len=4
48,399,582 >>> mbox cmd response data (8 bytes)
48,400,234 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,430,822 UART: [rt]cmd =0x53574545, len=84
54,011,416 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,539 UART:
192,934 UART: Running Caliptra ROM ...
194,112 UART:
603,705 UART: [state] CFI Enabled
617,883 UART: [state] LifecycleState = Unprovisioned
619,826 UART: [state] DebugLocked = No
622,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,548 UART: [kat] SHA2-256
797,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,863 UART: [kat] ++
808,335 UART: [kat] sha1
818,776 UART: [kat] SHA2-256
821,491 UART: [kat] SHA2-384
827,545 UART: [kat] SHA2-512-ACC
829,916 UART: [kat] ECC-384
3,113,357 UART: [kat] HMAC-384Kdf
3,125,616 UART: [kat] LMS
4,315,712 UART: [kat] --
4,320,766 UART: [cold-reset] ++
4,322,686 UART: [fht] Storing FHT @ 0x50003400
4,333,726 UART: [idev] ++
4,334,287 UART: [idev] CDI.KEYID = 6
4,335,263 UART: [idev] SUBJECT.KEYID = 7
4,336,428 UART: [idev] UDS.KEYID = 0
4,337,496 ready_for_fw is high
4,337,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,669 UART: [idev] Erasing UDS.KEYID = 0
7,625,803 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,259 UART: [idev] --
7,652,729 UART: [ldev] ++
7,653,302 UART: [ldev] CDI.KEYID = 6
7,654,312 UART: [ldev] SUBJECT.KEYID = 5
7,655,465 UART: [ldev] AUTHORITY.KEYID = 7
7,656,704 UART: [ldev] FE.KEYID = 1
7,667,283 UART: [ldev] Erasing FE.KEYID = 1
10,959,825 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,109 UART: [ldev] --
13,320,662 UART: [fwproc] Waiting for Commands...
13,322,694 UART: [fwproc] Received command 0x46574c44
13,324,894 UART: [fwproc] Received Image of size 118548 bytes
17,429,980 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,507,238 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,404 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,908,164 >>> mbox cmd response: success
17,912,197 UART: [afmc] ++
17,912,834 UART: [afmc] CDI.KEYID = 6
17,913,743 UART: [afmc] SUBJECT.KEYID = 7
17,914,956 UART: [afmc] AUTHORITY.KEYID = 5
21,229,320 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,730 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,983 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,419 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,167 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,568 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,169 UART: [afmc] --
23,593,645 UART: [cold-reset] --
23,598,522 UART: [state] Locking Datavault
23,603,005 UART: [state] Locking PCR0, PCR1 and PCR31
23,604,701 UART: [state] Locking ICCM
23,606,605 UART: [exit] Launching FMC @ 0x40000130
23,614,990 UART:
23,615,235 UART: Running Caliptra FMC ...
23,616,259 UART:
23,616,399 UART: [state] CFI Enabled
23,624,763 UART: [fht] FMC Alias Private Key: 7
25,965,061 UART: [art] Extend RT PCRs Done
25,966,287 UART: [art] Lock RT PCRs Done
25,967,938 UART: [art] Populate DV Done
25,973,724 UART: [fht] FMC Alias Private Key: 7
25,975,317 UART: [art] Derive CDI
25,976,127 UART: [art] Store in slot 0x4
26,018,769 UART: [art] Derive Key Pair
26,019,767 UART: [art] Store priv key in slot 0x5
29,261,469 UART: [art] Derive Key Pair - Done
29,274,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,147 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,657 UART: [art] PUB.X = 0F2096DE48CBCE4E4302975103E63E7043A850EF674574D04F2AB162C37CCC24CBA72F7E9B44A5DA4066B6BB6D27B28E
31,563,977 UART: [art] PUB.Y = FB1A7E489C4C9597BA8B9A85A8A4CCAFF39A66CFAE044ED8F8B770004B66DFA2BDA6551A1713537431EACF33DD60C030
31,571,192 UART: [art] SIG.R = 9F56CC1EA1AD34E28B7D9DE1D3E4B8AFC6D13117F8876538937457791AB7621F3CA7841D226C116878355112F965A01C
31,578,594 UART: [art] SIG.S = 02F1DB1ED6C099A1E2A31BA51DEE8AE9A28AD166EEEE74389C32F23E4083FFB385C0E1B4DE6EB55BDCDE769A8819937A
32,883,967 UART: Caliptra RT
32,884,671 UART: [state] CFI Enabled
33,018,106 UART: [rt] RT listening for mailbox commands...
33,020,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,051,200 UART: [rt]cmd =0x44504543, len=96
38,725,771 >>> mbox cmd response data (6236 bytes)
38,754,916 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,785,481 UART: [rt]cmd =0x53574545, len=84
44,310,214 >>> mbox cmd response data (200 bytes)
44,696,215 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,726,241 UART: [rt]cmd =0x4453424c, len=4
47,972,895 >>> mbox cmd response data (8 bytes)
47,973,448 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,003,974 UART: [rt]cmd =0x53574545, len=84
53,528,507 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
4,132,072 ready_for_fw is high
4,132,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,767 >>> mbox cmd response: success
23,798,140 UART:
23,798,530 UART: Running Caliptra FMC ...
23,799,823 UART:
23,799,991 UART: [state] CFI Enabled
23,807,629 UART: [fht] FMC Alias Private Key: 7
26,146,928 UART: [art] Extend RT PCRs Done
26,148,155 UART: [art] Lock RT PCRs Done
26,149,802 UART: [art] Populate DV Done
26,154,948 UART: [fht] FMC Alias Private Key: 7
26,156,487 UART: [art] Derive CDI
26,157,299 UART: [art] Store in slot 0x4
26,200,164 UART: [art] Derive Key Pair
26,201,205 UART: [art] Store priv key in slot 0x5
29,443,024 UART: [art] Derive Key Pair - Done
29,456,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,430 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,946 UART: [art] PUB.X = AE602E37A6E0146586A95EF29C0F4C36838E7B2B26C8C64CCE89B0A3E200205BF8E83895AC096186296DD066C804F3F2
31,745,189 UART: [art] PUB.Y = 9CAB86A6C7CA2A6A61BB797991475E23D4A23CD446F14B1A788EF2360EA1355644C5001FC4041FD63BE40E57896F42FC
31,752,437 UART: [art] SIG.R = 8134D9AC94C9E56F6909F81267C968B0453DF7E2F4147CF1B7459A41A84E6790C5677CD570A7A2B36F3C2A4EBA643698
31,759,824 UART: [art] SIG.S = BC556DC3AF080A580A6B90799F50FB53BB615BF31699684A2AE16BC04C451DCC5D641E6B9FDF6A7F08D6A1317B826AC4
33,065,041 UART: Caliptra RT
33,065,750 UART: [state] CFI Enabled
33,199,809 UART: [rt] RT listening for mailbox commands...
33,202,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,232,689 UART: [rt]cmd =0x44504543, len=96
38,907,045 >>> mbox cmd response data (6236 bytes)
38,936,630 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,967,504 UART: [rt]cmd =0x53574545, len=84
44,492,176 >>> mbox cmd response data (200 bytes)
44,878,702 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,908,639 UART: [rt]cmd =0x4453424c, len=4
48,154,765 >>> mbox cmd response data (8 bytes)
48,155,288 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,185,651 UART: [rt]cmd =0x53574545, len=84
53,710,427 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,194 UART:
192,551 UART: Running Caliptra ROM ...
193,758 UART:
193,933 UART: [state] CFI Enabled
264,557 UART: [state] LifecycleState = Unprovisioned
266,551 UART: [state] DebugLocked = No
267,947 UART: [state] WD Timer not started. Device not locked for debugging
272,625 UART: [kat] SHA2-256
452,296 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,057 UART: [kat] ++
463,597 UART: [kat] sha1
476,320 UART: [kat] SHA2-256
478,968 UART: [kat] SHA2-384
484,811 UART: [kat] SHA2-512-ACC
487,245 UART: [kat] ECC-384
2,946,099 UART: [kat] HMAC-384Kdf
2,970,579 UART: [kat] LMS
3,447,055 UART: [kat] --
3,450,906 UART: [cold-reset] ++
3,453,279 UART: [fht] FHT @ 0x50003400
3,464,826 UART: [idev] ++
3,465,384 UART: [idev] CDI.KEYID = 6
3,466,364 UART: [idev] SUBJECT.KEYID = 7
3,467,537 UART: [idev] UDS.KEYID = 0
3,468,580 ready_for_fw is high
3,468,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,868 UART: [idev] Erasing UDS.KEYID = 0
5,989,198 UART: [idev] Sha1 KeyId Algorithm
6,013,718 UART: [idev] --
6,018,088 UART: [ldev] ++
6,018,661 UART: [ldev] CDI.KEYID = 6
6,019,544 UART: [ldev] SUBJECT.KEYID = 5
6,020,804 UART: [ldev] AUTHORITY.KEYID = 7
6,022,034 UART: [ldev] FE.KEYID = 1
6,057,646 UART: [ldev] Erasing FE.KEYID = 1
8,563,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,213 UART: [ldev] --
10,371,877 UART: [fwproc] Wait for Commands...
10,373,852 UART: [fwproc] Recv command 0x46574c44
10,375,827 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,162 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,231 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,786 >>> mbox cmd response: success
14,351,757 UART: [afmc] ++
14,352,370 UART: [afmc] CDI.KEYID = 6
14,353,254 UART: [afmc] SUBJECT.KEYID = 7
14,354,487 UART: [afmc] AUTHORITY.KEYID = 5
16,897,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,065 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,861 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,905 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,450 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,313 UART: [afmc] --
18,716,608 UART: [cold-reset] --
18,720,951 UART: [state] Locking Datavault
18,728,891 UART: [state] Locking PCR0, PCR1 and PCR31
18,730,633 UART: [state] Locking ICCM
18,732,508 UART: [exit] Launching FMC @ 0x40000130
18,740,958 UART:
18,741,189 UART: Running Caliptra FMC ...
18,742,284 UART:
18,742,462 UART: [state] CFI Enabled
18,793,628 UART: [fht] FMC Alias Private Key: 7
20,560,531 UART: [art] Extend RT PCRs Done
20,561,762 UART: [art] Lock RT PCRs Done
20,563,654 UART: [art] Populate DV Done
20,569,223 UART: [fht] FMC Alias Private Key: 7
20,570,755 UART: [art] Derive CDI
20,571,563 UART: [art] Store in slot 0x4
20,626,814 UART: [art] Derive Key Pair
20,627,854 UART: [art] Store priv key in slot 0x5
23,090,588 UART: [art] Derive Key Pair - Done
23,103,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,816,844 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,339 UART: [art] PUB.X = F15AD609E51123F25E6169C3AE5D2B2FC8B7131D21AE11F5D4B8F3D256C6A08E86973FFE45DE4DBB454BEBAF07958144
24,825,638 UART: [art] PUB.Y = 5F656C587BCED3F4B9499A83643A51ABB0385BA987EE00802EABFC5574BD1870E6DAB32D9CF5BEEE57E4BF5E0ACC3E35
24,832,910 UART: [art] SIG.R = 63E4380A7248DB639D549FCD05EFE8EB10B20A4A99C1A11D8E796F4717E001B2634A5C840855582ABF65DB77CF44317C
24,840,341 UART: [art] SIG.S = 2C28F13C576BFDBE76F987DFC0747C4A20B10FC48FA3BB247A12E639FC864F64B133F3A447C2B812B7BD2F02742AEA4B
25,819,273 UART: Caliptra RT
25,820,068 UART: [state] CFI Enabled
26,000,379 UART: [rt] RT listening for mailbox commands...
26,002,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,033,505 UART: [rt]cmd =0x44504543, len=96
30,397,835 >>> mbox cmd response data (6236 bytes)
30,426,999 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,457,665 UART: [rt]cmd =0x53574545, len=84
34,636,865 >>> mbox cmd response data (200 bytes)
35,018,781 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,048,869 UART: [rt]cmd =0x4453424c, len=4
37,533,406 >>> mbox cmd response data (8 bytes)
37,533,945 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,564,367 UART: [rt]cmd =0x53574545, len=84
41,740,776 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,461,397 ready_for_fw is high
3,461,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,847 >>> mbox cmd response: success
18,513,679 UART:
18,514,070 UART: Running Caliptra FMC ...
18,515,205 UART:
18,515,363 UART: [state] CFI Enabled
18,581,943 UART: [fht] FMC Alias Private Key: 7
20,348,561 UART: [art] Extend RT PCRs Done
20,349,778 UART: [art] Lock RT PCRs Done
20,351,481 UART: [art] Populate DV Done
20,357,177 UART: [fht] FMC Alias Private Key: 7
20,358,672 UART: [art] Derive CDI
20,359,434 UART: [art] Store in slot 0x4
20,415,074 UART: [art] Derive Key Pair
20,416,132 UART: [art] Store priv key in slot 0x5
22,878,713 UART: [art] Derive Key Pair - Done
22,891,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,235 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,735 UART: [art] PUB.X = 18F9512C0F5D2BF3C5CBB1D424EA8242E0E6580C0E71F39707966E3E3D1D1FA2F484164B27CECC86A82189E9A02E7716
24,614,001 UART: [art] PUB.Y = 1C7AF25BF6A7DCFAFEB81B36C7C205D26A7A1659A40BC44BF838D508981B48D0BD730FF8A5A901DF8ECA952E57F79410
24,621,262 UART: [art] SIG.R = AB43D554B65BB507130A9172D6EB57958AD094D9082FC3D10C249731B86EE9D00A1294384546014E358C68B50C2A5BD5
24,628,645 UART: [art] SIG.S = 44B61B79E1A80E8912346519DD8F502CE6517CD519CA405A1BC157F58C2BEC917A2890A3798D86FCB8DDB3B9469FFB3B
25,607,830 UART: Caliptra RT
25,608,525 UART: [state] CFI Enabled
25,790,196 UART: [rt] RT listening for mailbox commands...
25,792,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,823,004 UART: [rt]cmd =0x44504543, len=96
30,186,159 >>> mbox cmd response data (6236 bytes)
30,215,399 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,246,030 UART: [rt]cmd =0x53574545, len=84
34,425,101 >>> mbox cmd response data (200 bytes)
34,808,602 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
34,838,733 UART: [rt]cmd =0x4453424c, len=4
37,322,006 >>> mbox cmd response data (8 bytes)
37,322,562 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,353,002 UART: [rt]cmd =0x53574545, len=84
41,528,945 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,350 UART:
192,721 UART: Running Caliptra ROM ...
193,917 UART:
603,637 UART: [state] CFI Enabled
618,876 UART: [state] LifecycleState = Unprovisioned
620,830 UART: [state] DebugLocked = No
623,644 UART: [state] WD Timer not started. Device not locked for debugging
628,005 UART: [kat] SHA2-256
807,519 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,257 UART: [kat] ++
818,783 UART: [kat] sha1
828,659 UART: [kat] SHA2-256
831,380 UART: [kat] SHA2-384
838,080 UART: [kat] SHA2-512-ACC
840,452 UART: [kat] ECC-384
3,284,346 UART: [kat] HMAC-384Kdf
3,295,743 UART: [kat] LMS
3,772,301 UART: [kat] --
3,777,096 UART: [cold-reset] ++
3,778,327 UART: [fht] FHT @ 0x50003400
3,789,590 UART: [idev] ++
3,790,163 UART: [idev] CDI.KEYID = 6
3,791,198 UART: [idev] SUBJECT.KEYID = 7
3,792,370 UART: [idev] UDS.KEYID = 0
3,793,299 ready_for_fw is high
3,793,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,342 UART: [idev] Erasing UDS.KEYID = 0
6,273,716 UART: [idev] Sha1 KeyId Algorithm
6,298,046 UART: [idev] --
6,302,957 UART: [ldev] ++
6,303,533 UART: [ldev] CDI.KEYID = 6
6,304,453 UART: [ldev] SUBJECT.KEYID = 5
6,305,668 UART: [ldev] AUTHORITY.KEYID = 7
6,306,916 UART: [ldev] FE.KEYID = 1
6,320,343 UART: [ldev] Erasing FE.KEYID = 1
8,795,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,017 UART: [ldev] --
10,589,323 UART: [fwproc] Wait for Commands...
10,591,096 UART: [fwproc] Recv command 0x46574c44
10,593,087 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,311 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,385 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,371 >>> mbox cmd response: success
14,563,308 UART: [afmc] ++
14,563,932 UART: [afmc] CDI.KEYID = 6
14,564,845 UART: [afmc] SUBJECT.KEYID = 7
14,566,069 UART: [afmc] AUTHORITY.KEYID = 5
17,067,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,745 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,570 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,647 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,171 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,814 UART: [afmc] --
18,869,339 UART: [cold-reset] --
18,873,453 UART: [state] Locking Datavault
18,877,465 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,220 UART: [state] Locking ICCM
18,881,643 UART: [exit] Launching FMC @ 0x40000130
18,890,047 UART:
18,890,313 UART: Running Caliptra FMC ...
18,891,420 UART:
18,891,586 UART: [state] CFI Enabled
18,900,065 UART: [fht] FMC Alias Private Key: 7
20,666,269 UART: [art] Extend RT PCRs Done
20,667,487 UART: [art] Lock RT PCRs Done
20,669,124 UART: [art] Populate DV Done
20,674,216 UART: [fht] FMC Alias Private Key: 7
20,675,916 UART: [art] Derive CDI
20,676,730 UART: [art] Store in slot 0x4
20,719,218 UART: [art] Derive Key Pair
20,720,258 UART: [art] Store priv key in slot 0x5
23,147,600 UART: [art] Derive Key Pair - Done
23,160,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,648 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,295 UART: [art] PUB.X = 34889421B071F5D48B1658512BBA9CFC56904B4B7FB353A2C097025678C8873A04DA75F54F8FFAC219D5981ED28FE61A
24,875,392 UART: [art] PUB.Y = 7BA7523848ABB48CFCABC6C7FE4129972F0DF2C8CC0CC20CB475B0C3509C84D982EE89F4F3D8C5BFAC1EADB5299D9916
24,882,669 UART: [art] SIG.R = 6BA080528C2114F6F526DCB0E9CF8ED8A4365F54C35BEE4122C3F376F37193F8A51AF5794152B424F3CE30A9865FAFA6
24,890,066 UART: [art] SIG.S = 095577F4C5164049F5A768EBC2B48ECAF402630F5C3FCEAAB5F944FC96FAE9061B0A8C3A8C5CD572A902BA4580D817AC
25,869,448 UART: Caliptra RT
25,870,136 UART: [state] CFI Enabled
26,002,812 UART: [rt] RT listening for mailbox commands...
26,005,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,035,826 UART: [rt]cmd =0x44504543, len=96
30,321,283 >>> mbox cmd response data (6236 bytes)
30,350,388 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,381,095 UART: [rt]cmd =0x53574545, len=84
34,517,006 >>> mbox cmd response data (200 bytes)
34,900,298 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
34,930,553 UART: [rt]cmd =0x4453424c, len=4
37,361,714 >>> mbox cmd response data (8 bytes)
37,362,238 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,392,499 UART: [rt]cmd =0x53574545, len=84
41,527,718 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,781,490 ready_for_fw is high
3,782,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,433,269 >>> mbox cmd response: success
18,689,397 UART:
18,689,803 UART: Running Caliptra FMC ...
18,690,940 UART:
18,691,101 UART: [state] CFI Enabled
18,699,336 UART: [fht] FMC Alias Private Key: 7
20,465,632 UART: [art] Extend RT PCRs Done
20,466,859 UART: [art] Lock RT PCRs Done
20,468,442 UART: [art] Populate DV Done
20,474,076 UART: [fht] FMC Alias Private Key: 7
20,475,579 UART: [art] Derive CDI
20,476,345 UART: [art] Store in slot 0x4
20,518,895 UART: [art] Derive Key Pair
20,519,934 UART: [art] Store priv key in slot 0x5
22,946,736 UART: [art] Derive Key Pair - Done
22,959,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,666,219 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,737 UART: [art] PUB.X = 4248846C3A67B2A431DD347A0491CE11AD9C0084FAACEC49C689E62731F49A24F09CC08E20592A2349186FC771AD64C2
24,674,992 UART: [art] PUB.Y = 85341C1899DF333706275780AA3444740732754E10078DA0595B04366ED28347E91D6464305611A130C29C8C83C974BB
24,682,193 UART: [art] SIG.R = 875113292EEC4E1B7E978611E51ABE177E7F8700A27323A93ABC340A5B2853B02BAD89B68053B5DEA3DC5EAD9AD494D2
24,689,546 UART: [art] SIG.S = A423741048ADAFAF3049B4B69B6D448EA45E6E276E2513A2F91B67EAF4E08D8B21434FECBD7AB32D7F1179E0F04131E6
25,668,456 UART: Caliptra RT
25,669,155 UART: [state] CFI Enabled
25,801,987 UART: [rt] RT listening for mailbox commands...
25,804,317 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,834,870 UART: [rt]cmd =0x44504543, len=96
30,121,130 >>> mbox cmd response data (6236 bytes)
30,150,148 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,180,681 UART: [rt]cmd =0x53574545, len=84
34,315,886 >>> mbox cmd response data (200 bytes)
34,697,924 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
34,727,961 UART: [rt]cmd =0x4453424c, len=4
37,158,782 >>> mbox cmd response data (8 bytes)
37,159,346 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,189,656 UART: [rt]cmd =0x53574545, len=84
41,324,990 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
191,973 UART:
192,334 UART: Running Caliptra ROM ...
193,520 UART:
193,676 UART: [state] CFI Enabled
261,728 UART: [state] LifecycleState = Unprovisioned
264,118 UART: [state] DebugLocked = No
265,715 UART: [state] WD Timer not started. Device not locked for debugging
269,961 UART: [kat] SHA2-256
459,872 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,626 UART: [kat] ++
471,073 UART: [kat] sha1
482,445 UART: [kat] SHA2-256
485,523 UART: [kat] SHA2-384
491,246 UART: [kat] SHA2-512-ACC
493,823 UART: [kat] ECC-384
2,948,219 UART: [kat] HMAC-384Kdf
2,970,716 UART: [kat] LMS
3,502,491 UART: [kat] --
3,507,362 UART: [cold-reset] ++
3,508,581 UART: [fht] FHT @ 0x50003400
3,519,561 UART: [idev] ++
3,520,272 UART: [idev] CDI.KEYID = 6
3,521,301 UART: [idev] SUBJECT.KEYID = 7
3,522,402 UART: [idev] UDS.KEYID = 0
3,523,333 ready_for_fw is high
3,523,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,589 UART: [idev] Erasing UDS.KEYID = 0
6,027,537 UART: [idev] Sha1 KeyId Algorithm
6,048,557 UART: [idev] --
6,051,873 UART: [ldev] ++
6,052,597 UART: [ldev] CDI.KEYID = 6
6,053,509 UART: [ldev] SUBJECT.KEYID = 5
6,054,673 UART: [ldev] AUTHORITY.KEYID = 7
6,055,850 UART: [ldev] FE.KEYID = 1
6,097,114 UART: [ldev] Erasing FE.KEYID = 1
8,602,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,492 UART: [ldev] --
10,410,651 UART: [fwproc] Wait for Commands...
10,412,529 UART: [fwproc] Recv command 0x46574c44
10,414,841 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,420 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,058 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,994 >>> mbox cmd response: success
14,675,237 UART: [afmc] ++
14,675,963 UART: [afmc] CDI.KEYID = 6
14,677,161 UART: [afmc] SUBJECT.KEYID = 7
14,678,605 UART: [afmc] AUTHORITY.KEYID = 5
17,221,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,963,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,965,031 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,980,133 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,995,287 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,010,187 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,033,605 UART: [afmc] --
19,037,541 UART: [cold-reset] --
19,042,219 UART: [state] Locking Datavault
19,047,118 UART: [state] Locking PCR0, PCR1 and PCR31
19,049,326 UART: [state] Locking ICCM
19,050,937 UART: [exit] Launching FMC @ 0x40000130
19,059,616 UART:
19,059,859 UART: Running Caliptra FMC ...
19,060,958 UART:
19,061,118 UART: [state] CFI Enabled
19,120,830 UART: [fht] FMC Alias Private Key: 7
20,887,256 UART: [art] Extend RT PCRs Done
20,888,495 UART: [art] Lock RT PCRs Done
20,890,174 UART: [art] Populate DV Done
20,895,417 UART: [fht] FMC Alias Private Key: 7
20,897,169 UART: [art] Derive CDI
20,897,979 UART: [art] Store in slot 0x4
20,953,783 UART: [art] Derive Key Pair
20,954,824 UART: [art] Store priv key in slot 0x5
23,417,842 UART: [art] Derive Key Pair - Done
23,430,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,143,618 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,122 UART: [art] PUB.X = C32671AAEE5FD9FE3236E94BF64D3000FB618EF0235A495F84CE130603013D8576D25B90DE2E9397FE628EADFE6F839E
25,152,337 UART: [art] PUB.Y = 83AFAE88069EFBC8949940E08FD189070CC90A51277E4017A7F1139C24CF78BB87336BB3EACA3BADFD3E0CE09A43A1EB
25,159,661 UART: [art] SIG.R = 12F65528AC30A8851CDFEA0AE750066B06DA366417187DADD7DA324B27BF2D602C43A88301CC29C5D94B32931CF378BD
25,167,029 UART: [art] SIG.S = 329757C4B9FB74E008DFA3ACC10B512F593079D3650EEC2BAB36CF9AA7053A4CAA03EA53657156D5D76DB8B0639A2967
26,146,779 UART: Caliptra RT
26,147,469 UART: [state] CFI Enabled
26,326,535 UART: [rt] RT listening for mailbox commands...
26,328,874 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,359,703 UART: [rt]cmd =0x44504543, len=96
30,724,498 >>> mbox cmd response data (6236 bytes)
30,753,620 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,784,348 UART: [rt]cmd =0x53574545, len=84
34,963,337 >>> mbox cmd response data (200 bytes)
35,345,112 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,375,358 UART: [rt]cmd =0x4453424c, len=4
37,859,778 >>> mbox cmd response data (8 bytes)
37,860,302 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,891,005 UART: [rt]cmd =0x53574545, len=84
42,065,600 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,440,533 ready_for_fw is high
3,440,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,839,365 >>> mbox cmd response: success
19,136,450 UART:
19,136,832 UART: Running Caliptra FMC ...
19,138,034 UART:
19,138,216 UART: [state] CFI Enabled
19,203,785 UART: [fht] FMC Alias Private Key: 7
20,970,186 UART: [art] Extend RT PCRs Done
20,971,403 UART: [art] Lock RT PCRs Done
20,972,975 UART: [art] Populate DV Done
20,978,523 UART: [fht] FMC Alias Private Key: 7
20,980,022 UART: [art] Derive CDI
20,980,788 UART: [art] Store in slot 0x4
21,036,592 UART: [art] Derive Key Pair
21,037,633 UART: [art] Store priv key in slot 0x5
23,500,597 UART: [art] Derive Key Pair - Done
23,513,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,488 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,003 UART: [art] PUB.X = 2CAF67D848E6D3326D980F21BBD329D98ED3F48D222A6B6A48DB45557E2FC2CA0BD5EE3AA4B935F0F46794F895743904
25,235,233 UART: [art] PUB.Y = 24557F1856DCACB0BF2EECC18C738D8EE0EE9256911C6066FCB6496CD44DAE6792294101FA5C966E43F8ED5A702B5E3A
25,242,531 UART: [art] SIG.R = 9C9EA59BA0D57F2F2C934B182BDCF582DD0D73C91E3350696267BFDCEE56D4FD930BDD0654F041B33DFBA7128E062C92
25,249,911 UART: [art] SIG.S = B55C503A107F43120BEBD4E6C4F9D9083D8EDFA22D00EDE1D5A53DBD6FB8970B2DB373164ECC8253072BF0D6F8F55321
26,229,343 UART: Caliptra RT
26,230,054 UART: [state] CFI Enabled
26,409,594 UART: [rt] RT listening for mailbox commands...
26,411,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,442,707 UART: [rt]cmd =0x44504543, len=96
30,808,040 >>> mbox cmd response data (6236 bytes)
30,837,153 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,867,509 UART: [rt]cmd =0x53574545, len=84
35,045,115 >>> mbox cmd response data (200 bytes)
35,425,122 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,454,999 UART: [rt]cmd =0x4453424c, len=4
37,940,139 >>> mbox cmd response data (8 bytes)
37,940,666 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,970,976 UART: [rt]cmd =0x53574545, len=84
42,146,577 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,344 UART:
192,719 UART: Running Caliptra ROM ...
193,853 UART:
603,456 UART: [state] CFI Enabled
616,055 UART: [state] LifecycleState = Unprovisioned
618,373 UART: [state] DebugLocked = No
620,254 UART: [state] WD Timer not started. Device not locked for debugging
624,227 UART: [kat] SHA2-256
814,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,892 UART: [kat] ++
825,413 UART: [kat] sha1
837,423 UART: [kat] SHA2-256
840,438 UART: [kat] SHA2-384
846,879 UART: [kat] SHA2-512-ACC
849,431 UART: [kat] ECC-384
3,292,359 UART: [kat] HMAC-384Kdf
3,304,599 UART: [kat] LMS
3,836,473 UART: [kat] --
3,840,754 UART: [cold-reset] ++
3,841,687 UART: [fht] FHT @ 0x50003400
3,853,517 UART: [idev] ++
3,854,220 UART: [idev] CDI.KEYID = 6
3,855,178 UART: [idev] SUBJECT.KEYID = 7
3,856,353 UART: [idev] UDS.KEYID = 0
3,857,260 ready_for_fw is high
3,857,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,352 UART: [idev] Erasing UDS.KEYID = 0
6,334,336 UART: [idev] Sha1 KeyId Algorithm
6,356,914 UART: [idev] --
6,362,750 UART: [ldev] ++
6,363,363 UART: [ldev] CDI.KEYID = 6
6,364,848 UART: [ldev] SUBJECT.KEYID = 5
6,365,969 UART: [ldev] AUTHORITY.KEYID = 7
6,367,154 UART: [ldev] FE.KEYID = 1
6,378,835 UART: [ldev] Erasing FE.KEYID = 1
8,859,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,152 UART: [ldev] --
10,652,926 UART: [fwproc] Wait for Commands...
10,654,974 UART: [fwproc] Recv command 0x46574c44
10,657,230 UART: [fwproc] Recv'd Img size: 118548 bytes
14,155,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,238,763 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,362,369 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,922,365 >>> mbox cmd response: success
14,926,487 UART: [afmc] ++
14,927,213 UART: [afmc] CDI.KEYID = 6
14,928,409 UART: [afmc] SUBJECT.KEYID = 7
14,929,854 UART: [afmc] AUTHORITY.KEYID = 5
17,431,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,152,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,154,426 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,169,507 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,184,658 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,199,553 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,223,096 UART: [afmc] --
19,225,831 UART: [cold-reset] --
19,230,675 UART: [state] Locking Datavault
19,234,383 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,542 UART: [state] Locking ICCM
19,238,868 UART: [exit] Launching FMC @ 0x40000130
19,247,509 UART:
19,247,785 UART: Running Caliptra FMC ...
19,248,907 UART:
19,249,073 UART: [state] CFI Enabled
19,257,072 UART: [fht] FMC Alias Private Key: 7
21,023,233 UART: [art] Extend RT PCRs Done
21,024,451 UART: [art] Lock RT PCRs Done
21,026,272 UART: [art] Populate DV Done
21,031,746 UART: [fht] FMC Alias Private Key: 7
21,033,308 UART: [art] Derive CDI
21,034,050 UART: [art] Store in slot 0x4
21,076,490 UART: [art] Derive Key Pair
21,077,504 UART: [art] Store priv key in slot 0x5
23,504,738 UART: [art] Derive Key Pair - Done
23,517,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,903 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,411 UART: [art] PUB.X = 7709BDA3BF88CE51B800EDB507BB8EC1379FB4C4FDDBF2BD63CE59C69E4A59A49ABD075E7A73B2AFFD0C424F27EF6D07
25,232,689 UART: [art] PUB.Y = 5A03CAB6DD5A10E515BD735B91E775D52F19416761B99DD8D78835DFBCD6A5D6613776437D53821F72B11463C8A685C1
25,239,946 UART: [art] SIG.R = F7AD59780524731B9DDC845FF31F82AFB8089565396E3BF64DBF925AA2B1F68E874484A3EA0F716A86712D0603C55965
25,247,349 UART: [art] SIG.S = 6F19451847BE632330666961EA7776EF6CA36125C0A9F7992CEC4B1160FE478378976E8D7636B93DF0B709F1FA5975F9
26,225,760 UART: Caliptra RT
26,226,482 UART: [state] CFI Enabled
26,358,559 UART: [rt] RT listening for mailbox commands...
26,360,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,391,459 UART: [rt]cmd =0x44504543, len=96
30,676,819 >>> mbox cmd response data (6236 bytes)
30,706,074 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,736,711 UART: [rt]cmd =0x53574545, len=84
34,872,414 >>> mbox cmd response data (200 bytes)
35,253,775 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,283,956 UART: [rt]cmd =0x4453424c, len=4
37,714,534 >>> mbox cmd response data (8 bytes)
37,715,084 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,745,525 UART: [rt]cmd =0x53574545, len=84
41,881,255 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,756,043 ready_for_fw is high
3,756,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,447 >>> mbox cmd response: success
19,299,151 UART:
19,300,064 UART: Running Caliptra FMC ...
19,301,190 UART:
19,301,349 UART: [state] CFI Enabled
19,308,882 UART: [fht] FMC Alias Private Key: 7
21,075,053 UART: [art] Extend RT PCRs Done
21,076,844 UART: [art] Lock RT PCRs Done
21,077,940 UART: [art] Populate DV Done
21,083,563 UART: [fht] FMC Alias Private Key: 7
21,085,227 UART: [art] Derive CDI
21,086,070 UART: [art] Store in slot 0x4
21,129,203 UART: [art] Derive Key Pair
21,130,433 UART: [art] Store priv key in slot 0x5
23,556,330 UART: [art] Derive Key Pair - Done
23,569,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,275,520 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,512 UART: [art] PUB.X = 05B86250327BD9C534ACAB58D7F8D78C475DFE85B7581A5AD36486663C328C97613292C550DE3FA06979C0050EF092AE
25,284,304 UART: [art] PUB.Y = D17CA0451B6B4ABC2CE49EFF00DDD8380C7FAA1813B8E113EB50EEDCBF6F82401F7962B144DCF64149A4F8D8E07482CF
25,291,567 UART: [art] SIG.R = 1567D679608B5D97C92B745FB85377831B8A1843AFD7941995201DBB4CD91A3A47A7A4FA32E5D0F24A45643D048D96A3
25,298,923 UART: [art] SIG.S = 7844AFC3D763FB7CF523E7EF8C91CF1914723D068B7F24989C6F26998B1184217310616DDCFA68976E21A03472D98DEE
26,277,686 UART: Caliptra RT
26,278,961 UART: [state] CFI Enabled
26,411,175 UART: [rt] RT listening for mailbox commands...
26,413,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,444,505 UART: [rt]cmd =0x44504543, len=96
30,730,447 >>> mbox cmd response data (6236 bytes)
30,760,481 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,791,140 UART: [rt]cmd =0x53574545, len=84
34,926,956 >>> mbox cmd response data (200 bytes)
35,311,465 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,341,614 UART: [rt]cmd =0x4453424c, len=4
37,772,166 >>> mbox cmd response data (8 bytes)
37,772,707 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,803,131 UART: [rt]cmd =0x53574545, len=84
41,939,278 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,169 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,801 UART: [kat] SHA2-256
881,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,847 UART: [kat] ++
885,999 UART: [kat] sha1
890,385 UART: [kat] SHA2-256
892,323 UART: [kat] SHA2-384
895,240 UART: [kat] SHA2-512-ACC
897,141 UART: [kat] ECC-384
902,416 UART: [kat] HMAC-384Kdf
906,972 UART: [kat] LMS
1,475,168 UART: [kat] --
1,476,019 UART: [cold-reset] ++
1,476,561 UART: [fht] Storing FHT @ 0x50003400
1,479,276 UART: [idev] ++
1,479,444 UART: [idev] CDI.KEYID = 6
1,479,804 UART: [idev] SUBJECT.KEYID = 7
1,480,228 UART: [idev] UDS.KEYID = 0
1,480,573 ready_for_fw is high
1,480,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,320 UART: [idev] Erasing UDS.KEYID = 0
1,505,190 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,762 UART: [idev] --
1,514,835 UART: [ldev] ++
1,515,003 UART: [ldev] CDI.KEYID = 6
1,515,366 UART: [ldev] SUBJECT.KEYID = 5
1,515,792 UART: [ldev] AUTHORITY.KEYID = 7
1,516,255 UART: [ldev] FE.KEYID = 1
1,521,789 UART: [ldev] Erasing FE.KEYID = 1
1,547,348 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,218 UART: [ldev] --
1,586,667 UART: [fwproc] Waiting for Commands...
1,587,394 UART: [fwproc] Received command 0x46574c44
1,588,185 UART: [fwproc] Received Image of size 118548 bytes
2,932,937 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,519 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,737 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,032 >>> mbox cmd response: success
3,133,098 UART: [afmc] ++
3,133,266 UART: [afmc] CDI.KEYID = 6
3,133,628 UART: [afmc] SUBJECT.KEYID = 7
3,134,053 UART: [afmc] AUTHORITY.KEYID = 5
3,169,004 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,612 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,392 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,101 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,984 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,667 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,617 UART: [afmc] --
3,212,617 UART: [cold-reset] --
3,213,557 UART: [state] Locking Datavault
3,214,762 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,366 UART: [state] Locking ICCM
3,215,874 UART: [exit] Launching FMC @ 0x40000130
3,221,204 UART:
3,221,220 UART: Running Caliptra FMC ...
3,221,628 UART:
3,221,682 UART: [state] CFI Enabled
3,232,034 UART: [fht] FMC Alias Private Key: 7
3,350,490 UART: [art] Extend RT PCRs Done
3,350,918 UART: [art] Lock RT PCRs Done
3,352,718 UART: [art] Populate DV Done
3,360,803 UART: [fht] FMC Alias Private Key: 7
3,361,871 UART: [art] Derive CDI
3,362,151 UART: [art] Store in slot 0x4
3,447,607 UART: [art] Derive Key Pair
3,447,967 UART: [art] Store priv key in slot 0x5
3,461,468 UART: [art] Derive Key Pair - Done
3,476,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,846 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,611 UART: [art] PUB.X = F285CD4E8946E78F5F84421089C118A1CF10914CA14D662997DC2F412AC793CB2A6DBBF14E83A9C16CF4C4FBF65A839E
3,499,393 UART: [art] PUB.Y = 6DEB68DCA735CC093729BD1A7BE2103872803CCB9E9DE0D9A540300D7B0D2480C0250C98EEB0D1DDD1AD59DF2BE7ADC7
3,506,353 UART: [art] SIG.R = 545EB9F5F329DA127783479DC331230EC1220EB9631DBF4B7E50588A162E075F16F89798AAD18AA1265E414987F5D643
3,513,110 UART: [art] SIG.S = 415AD6E5264BD82B6C90290357F9572BBB15A8BEEA2AE156FB35A1118BB16E1FE11922AC79ACF6DD5320482FB39E8C21
3,536,771 UART: Caliptra RT
3,537,022 UART: [state] CFI Enabled
3,657,259 UART: [rt] RT listening for mailbox commands...
3,657,929 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,307 UART: [rt]cmd =0x44504543, len=96
3,869,892 >>> mbox cmd response data (6236 bytes)
3,869,893 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,964 UART: [rt]cmd =0x53574545, len=84
3,924,787 >>> mbox cmd response data (200 bytes)
3,924,788 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,075 UART: [rt]cmd =0x4453424c, len=4
3,970,553 >>> mbox cmd response data (8 bytes)
3,970,554 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,000,561 UART: [rt]cmd =0x53574545, len=84
4,026,074 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,573 ready_for_fw is high
1,362,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,182 >>> mbox cmd response: success
3,043,177 UART:
3,043,193 UART: Running Caliptra FMC ...
3,043,601 UART:
3,043,655 UART: [state] CFI Enabled
3,054,013 UART: [fht] FMC Alias Private Key: 7
3,172,305 UART: [art] Extend RT PCRs Done
3,172,733 UART: [art] Lock RT PCRs Done
3,174,239 UART: [art] Populate DV Done
3,182,362 UART: [fht] FMC Alias Private Key: 7
3,183,420 UART: [art] Derive CDI
3,183,700 UART: [art] Store in slot 0x4
3,269,684 UART: [art] Derive Key Pair
3,270,044 UART: [art] Store priv key in slot 0x5
3,283,517 UART: [art] Derive Key Pair - Done
3,298,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,816 UART: [art] PUB.X = 361F5A836B4079E3135235C887E0967D6DAB8B53031FB91D00203EEC3EE975C9C92AC2490BBE170C0DBD968C2226F231
3,321,554 UART: [art] PUB.Y = 19CC4F05925E53827D42AF8414F7398DA5439BD112B34870C7155FBF823EFA64440878CCBF0EFC558EAC580A4E5E1EF3
3,328,500 UART: [art] SIG.R = 85B8C517DD8B49479CFE3061B89B9BE19F00973D5F222C5977E755E062B2903C75FC2D0154937E05442F6D677F6087E3
3,335,236 UART: [art] SIG.S = F0869556018045B053FC11B12394EFEE623ABCEBEA6685AEEE400131893B2DC7700F1F68420EBD7603F5D853A3957F19
3,359,315 UART: Caliptra RT
3,359,566 UART: [state] CFI Enabled
3,480,643 UART: [rt] RT listening for mailbox commands...
3,481,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,821 UART: [rt]cmd =0x44504543, len=96
3,693,600 >>> mbox cmd response data (6236 bytes)
3,693,601 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,723,520 UART: [rt]cmd =0x53574545, len=84
3,748,877 >>> mbox cmd response data (200 bytes)
3,748,878 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,199 UART: [rt]cmd =0x4453424c, len=4
3,795,407 >>> mbox cmd response data (8 bytes)
3,795,408 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,825,273 UART: [rt]cmd =0x53574545, len=84
3,850,612 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,934 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,634 UART: [kat] SHA2-256
882,565 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,680 UART: [kat] ++
886,832 UART: [kat] sha1
891,208 UART: [kat] SHA2-256
893,146 UART: [kat] SHA2-384
895,801 UART: [kat] SHA2-512-ACC
897,702 UART: [kat] ECC-384
903,123 UART: [kat] HMAC-384Kdf
907,889 UART: [kat] LMS
1,476,085 UART: [kat] --
1,476,850 UART: [cold-reset] ++
1,477,310 UART: [fht] Storing FHT @ 0x50003400
1,480,027 UART: [idev] ++
1,480,195 UART: [idev] CDI.KEYID = 6
1,480,555 UART: [idev] SUBJECT.KEYID = 7
1,480,979 UART: [idev] UDS.KEYID = 0
1,481,324 ready_for_fw is high
1,481,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,949 UART: [idev] Erasing UDS.KEYID = 0
1,505,885 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,685 UART: [idev] --
1,515,882 UART: [ldev] ++
1,516,050 UART: [ldev] CDI.KEYID = 6
1,516,413 UART: [ldev] SUBJECT.KEYID = 5
1,516,839 UART: [ldev] AUTHORITY.KEYID = 7
1,517,302 UART: [ldev] FE.KEYID = 1
1,522,562 UART: [ldev] Erasing FE.KEYID = 1
1,548,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,997 UART: [ldev] --
1,587,422 UART: [fwproc] Waiting for Commands...
1,588,063 UART: [fwproc] Received command 0x46574c44
1,588,854 UART: [fwproc] Received Image of size 118548 bytes
2,932,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,056 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,274 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,669 >>> mbox cmd response: success
3,131,749 UART: [afmc] ++
3,131,917 UART: [afmc] CDI.KEYID = 6
3,132,279 UART: [afmc] SUBJECT.KEYID = 7
3,132,704 UART: [afmc] AUTHORITY.KEYID = 5
3,168,753 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,643 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,423 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,132 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,015 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,698 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,600 UART: [afmc] --
3,212,578 UART: [cold-reset] --
3,213,388 UART: [state] Locking Datavault
3,214,491 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,095 UART: [state] Locking ICCM
3,215,575 UART: [exit] Launching FMC @ 0x40000130
3,220,905 UART:
3,220,921 UART: Running Caliptra FMC ...
3,221,329 UART:
3,221,472 UART: [state] CFI Enabled
3,232,232 UART: [fht] FMC Alias Private Key: 7
3,351,122 UART: [art] Extend RT PCRs Done
3,351,550 UART: [art] Lock RT PCRs Done
3,353,172 UART: [art] Populate DV Done
3,361,169 UART: [fht] FMC Alias Private Key: 7
3,362,125 UART: [art] Derive CDI
3,362,405 UART: [art] Store in slot 0x4
3,448,055 UART: [art] Derive Key Pair
3,448,415 UART: [art] Store priv key in slot 0x5
3,461,328 UART: [art] Derive Key Pair - Done
3,476,478 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,656 UART: [art] PUB.X = E6E0D277FE5D4251FBD075ECA25F293C809C750F2D455FDA143577B0E9BC847741574D3F10DE68A668445CDFB2EE4FF0
3,499,435 UART: [art] PUB.Y = AC4FFEAB3903FF6BF3581C55E92A280119A225CA72E0218DDB77CECA06D09A3D66228AD49CC600790756138D28430576
3,506,352 UART: [art] SIG.R = E3113881F37C96F823600BDB1E60AAAA24976B87DB3D01AE1BF078C80A6256E76AED29897B145AF9CC2C5BDE98E7B3C6
3,513,127 UART: [art] SIG.S = 9403C33094E9D1FFA05194B3D0A73CB71A1DF70C5A56AE9402DBB0206C0756C7B1C7FB93045F52C4995981B18B197D45
3,536,608 UART: Caliptra RT
3,536,951 UART: [state] CFI Enabled
3,657,186 UART: [rt] RT listening for mailbox commands...
3,657,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,276 UART: [rt]cmd =0x44504543, len=96
3,869,780 >>> mbox cmd response data (6236 bytes)
3,869,781 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,778 UART: [rt]cmd =0x53574545, len=84
3,925,825 >>> mbox cmd response data (200 bytes)
3,925,826 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,867 UART: [rt]cmd =0x4453424c, len=4
3,971,811 >>> mbox cmd response data (8 bytes)
3,971,812 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,001,759 UART: [rt]cmd =0x53574545, len=84
4,027,512 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,338 ready_for_fw is high
1,362,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,289 >>> mbox cmd response: success
3,041,552 UART:
3,041,568 UART: Running Caliptra FMC ...
3,041,976 UART:
3,042,119 UART: [state] CFI Enabled
3,052,749 UART: [fht] FMC Alias Private Key: 7
3,171,733 UART: [art] Extend RT PCRs Done
3,172,161 UART: [art] Lock RT PCRs Done
3,173,841 UART: [art] Populate DV Done
3,181,840 UART: [fht] FMC Alias Private Key: 7
3,182,938 UART: [art] Derive CDI
3,183,218 UART: [art] Store in slot 0x4
3,268,660 UART: [art] Derive Key Pair
3,269,020 UART: [art] Store priv key in slot 0x5
3,282,251 UART: [art] Derive Key Pair - Done
3,296,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,814 UART: [art] PUB.X = 7467F93E37A7B4D7BD480527514596BA2969282AA81459DE2DA11BB28D91B40F219B36BE6E6110E1D536623FE9EA7CCE
3,319,582 UART: [art] PUB.Y = 79E6634D83742E2280D8589A3029C29ECED8D5DCFB6A6AA76556D2CB9DC4C5D5E5E922CBEA15DAEED5C5C0CFBE7DB614
3,326,558 UART: [art] SIG.R = 6866AFF148DDA29E5B0DC950FAB097260AA80534389DB19BBA61DF5263DC89CC179BC0246BEC1FF1E7E8085E642F2C59
3,333,330 UART: [art] SIG.S = 5EDA1C1A08F856E309ED9F28B8C893EC96560EA7E472EC0C7A3194A9CE3F321475ACB609AF3E7D26ED42652E429D0E8E
3,357,044 UART: Caliptra RT
3,357,387 UART: [state] CFI Enabled
3,476,968 UART: [rt] RT listening for mailbox commands...
3,477,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,074 UART: [rt]cmd =0x44504543, len=96
3,690,481 >>> mbox cmd response data (6236 bytes)
3,690,482 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,311 UART: [rt]cmd =0x53574545, len=84
3,746,524 >>> mbox cmd response data (200 bytes)
3,746,525 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,776,148 UART: [rt]cmd =0x4453424c, len=4
3,793,924 >>> mbox cmd response data (8 bytes)
3,793,925 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,823,566 UART: [rt]cmd =0x53574545, len=84
3,849,737 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,689 UART: [state] WD Timer not started. Device not locked for debugging
87,952 UART: [kat] SHA2-256
891,502 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
899,862 UART: [kat] SHA2-256
901,802 UART: [kat] SHA2-384
904,433 UART: [kat] SHA2-512-ACC
906,334 UART: [kat] ECC-384
916,431 UART: [kat] HMAC-384Kdf
920,905 UART: [kat] LMS
1,169,217 UART: [kat] --
1,169,944 UART: [cold-reset] ++
1,170,364 UART: [fht] FHT @ 0x50003400
1,173,128 UART: [idev] ++
1,173,296 UART: [idev] CDI.KEYID = 6
1,173,657 UART: [idev] SUBJECT.KEYID = 7
1,174,082 UART: [idev] UDS.KEYID = 0
1,174,428 ready_for_fw is high
1,174,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,971 UART: [idev] Erasing UDS.KEYID = 0
1,199,745 UART: [idev] Sha1 KeyId Algorithm
1,208,567 UART: [idev] --
1,209,608 UART: [ldev] ++
1,209,776 UART: [ldev] CDI.KEYID = 6
1,210,140 UART: [ldev] SUBJECT.KEYID = 5
1,210,567 UART: [ldev] AUTHORITY.KEYID = 7
1,211,030 UART: [ldev] FE.KEYID = 1
1,216,224 UART: [ldev] Erasing FE.KEYID = 1
1,242,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,664 UART: [ldev] --
1,281,983 UART: [fwproc] Wait for Commands...
1,282,716 UART: [fwproc] Recv command 0x46574c44
1,283,449 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,213 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,388 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,623 >>> mbox cmd response: success
2,826,821 UART: [afmc] ++
2,826,989 UART: [afmc] CDI.KEYID = 6
2,827,352 UART: [afmc] SUBJECT.KEYID = 7
2,827,778 UART: [afmc] AUTHORITY.KEYID = 5
2,863,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,179 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,889 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,770 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,471 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,262 UART: [afmc] --
2,906,229 UART: [cold-reset] --
2,906,977 UART: [state] Locking Datavault
2,908,152 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,756 UART: [state] Locking ICCM
2,909,404 UART: [exit] Launching FMC @ 0x40000130
2,914,734 UART:
2,914,750 UART: Running Caliptra FMC ...
2,915,158 UART:
2,915,212 UART: [state] CFI Enabled
2,925,660 UART: [fht] FMC Alias Private Key: 7
3,044,582 UART: [art] Extend RT PCRs Done
3,045,010 UART: [art] Lock RT PCRs Done
3,046,406 UART: [art] Populate DV Done
3,054,379 UART: [fht] FMC Alias Private Key: 7
3,055,521 UART: [art] Derive CDI
3,055,801 UART: [art] Store in slot 0x4
3,141,744 UART: [art] Derive Key Pair
3,142,104 UART: [art] Store priv key in slot 0x5
3,154,900 UART: [art] Derive Key Pair - Done
3,169,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,499 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,264 UART: [art] PUB.X = 3154F590E7FDA6675C8BBB5D0BAA619D51666453C1D46218DA77C2A441E79C810069ED56634B80C907F0D5EEF3995E52
3,193,008 UART: [art] PUB.Y = 4AB0C4F9F5B737D744D617CF5E93C325C4A60B873C3E50A0B992207D3835AD01F5CB5BE5A75CA1B36E3A22CDBE078D62
3,199,963 UART: [art] SIG.R = 665DE9EF8C088A69F66F88063562800F08C633A16FDC0AC6CE70DB64A26399F18FC22B0DAAEA4C39FEA8ACA54EC11232
3,206,731 UART: [art] SIG.S = 3EB3B09E1C1A761765223B15CDAEA0D94ABBB8AD865377A66EDC736FE6D84C2624A8B13E56557C3B8B81FF42560E19B3
3,230,456 UART: Caliptra RT
3,230,707 UART: [state] CFI Enabled
3,349,891 UART: [rt] RT listening for mailbox commands...
3,350,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,155 UART: [rt]cmd =0x44504543, len=96
3,562,945 >>> mbox cmd response data (6236 bytes)
3,562,946 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,592,837 UART: [rt]cmd =0x53574545, len=84
3,618,959 >>> mbox cmd response data (200 bytes)
3,618,960 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,295 UART: [rt]cmd =0x4453424c, len=4
3,665,249 >>> mbox cmd response data (8 bytes)
3,665,250 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,695,037 UART: [rt]cmd =0x53574545, len=84
3,720,485 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,974 ready_for_fw is high
1,058,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,410 >>> mbox cmd response: success
2,740,165 UART:
2,740,181 UART: Running Caliptra FMC ...
2,740,589 UART:
2,740,643 UART: [state] CFI Enabled
2,751,179 UART: [fht] FMC Alias Private Key: 7
2,869,963 UART: [art] Extend RT PCRs Done
2,870,391 UART: [art] Lock RT PCRs Done
2,871,813 UART: [art] Populate DV Done
2,880,138 UART: [fht] FMC Alias Private Key: 7
2,881,114 UART: [art] Derive CDI
2,881,394 UART: [art] Store in slot 0x4
2,967,177 UART: [art] Derive Key Pair
2,967,537 UART: [art] Store priv key in slot 0x5
2,980,529 UART: [art] Derive Key Pair - Done
2,995,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,491 UART: [art] PUB.X = 926639988B2557F07D47A636CB78EAD2A4904FAA76BB9A9B70470D3675918DC69716E4061BE48F1D4319735233C925C2
3,018,247 UART: [art] PUB.Y = CBF15B466BCAA13C4EA5DABA8089FC7332DD31ED7B35AD8D8D982A9BEF8F651D3BDD92503CA3375E9C90CA81983FE69B
3,025,223 UART: [art] SIG.R = 32C012B9787D915DFD1927143DE840DB3389D7BD20D8F3859E9CB8DAACB0F2958220EB5016E947556B18FA13562474AF
3,031,995 UART: [art] SIG.S = DDD874E66BF833911BAEB4C9DAA0AC2393B9E97BD31DFFA060BBACDBBCB464E8D84EB61087299B00DCD6DF2F6189C48F
3,055,845 UART: Caliptra RT
3,056,096 UART: [state] CFI Enabled
3,176,043 UART: [rt] RT listening for mailbox commands...
3,176,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,029 UART: [rt]cmd =0x44504543, len=96
3,388,100 >>> mbox cmd response data (6236 bytes)
3,388,101 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,962 UART: [rt]cmd =0x53574545, len=84
3,443,862 >>> mbox cmd response data (200 bytes)
3,443,863 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,354 UART: [rt]cmd =0x4453424c, len=4
3,489,904 >>> mbox cmd response data (8 bytes)
3,489,905 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,802 UART: [rt]cmd =0x53574545, len=84
3,546,138 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,233 UART: [kat] SHA2-256
891,783 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,887 UART: [kat] ++
896,039 UART: [kat] sha1
900,185 UART: [kat] SHA2-256
902,125 UART: [kat] SHA2-384
904,732 UART: [kat] SHA2-512-ACC
906,633 UART: [kat] ECC-384
916,394 UART: [kat] HMAC-384Kdf
920,984 UART: [kat] LMS
1,169,296 UART: [kat] --
1,170,143 UART: [cold-reset] ++
1,170,663 UART: [fht] FHT @ 0x50003400
1,173,411 UART: [idev] ++
1,173,579 UART: [idev] CDI.KEYID = 6
1,173,940 UART: [idev] SUBJECT.KEYID = 7
1,174,365 UART: [idev] UDS.KEYID = 0
1,174,711 ready_for_fw is high
1,174,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,218 UART: [idev] Erasing UDS.KEYID = 0
1,199,376 UART: [idev] Sha1 KeyId Algorithm
1,208,110 UART: [idev] --
1,209,067 UART: [ldev] ++
1,209,235 UART: [ldev] CDI.KEYID = 6
1,209,599 UART: [ldev] SUBJECT.KEYID = 5
1,210,026 UART: [ldev] AUTHORITY.KEYID = 7
1,210,489 UART: [ldev] FE.KEYID = 1
1,215,757 UART: [ldev] Erasing FE.KEYID = 1
1,242,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,467 UART: [ldev] --
1,281,780 UART: [fwproc] Wait for Commands...
1,282,585 UART: [fwproc] Recv command 0x46574c44
1,283,318 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,746 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,921 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,284 >>> mbox cmd response: success
2,828,414 UART: [afmc] ++
2,828,582 UART: [afmc] CDI.KEYID = 6
2,828,945 UART: [afmc] SUBJECT.KEYID = 7
2,829,371 UART: [afmc] AUTHORITY.KEYID = 5
2,865,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,488 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,198 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,079 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,780 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,687 UART: [afmc] --
2,908,682 UART: [cold-reset] --
2,909,542 UART: [state] Locking Datavault
2,910,731 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,335 UART: [state] Locking ICCM
2,911,947 UART: [exit] Launching FMC @ 0x40000130
2,917,277 UART:
2,917,293 UART: Running Caliptra FMC ...
2,917,701 UART:
2,917,844 UART: [state] CFI Enabled
2,928,662 UART: [fht] FMC Alias Private Key: 7
3,048,188 UART: [art] Extend RT PCRs Done
3,048,616 UART: [art] Lock RT PCRs Done
3,050,390 UART: [art] Populate DV Done
3,058,733 UART: [fht] FMC Alias Private Key: 7
3,059,685 UART: [art] Derive CDI
3,059,965 UART: [art] Store in slot 0x4
3,145,340 UART: [art] Derive Key Pair
3,145,700 UART: [art] Store priv key in slot 0x5
3,158,970 UART: [art] Derive Key Pair - Done
3,173,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,903 UART: [art] PUB.X = FD49F801369262924F715ADC6A7A05C1D0B58DDBD8DD8286027B6168961662CA326B0A561BBD0C9AA957A6A4D3C627AD
3,196,666 UART: [art] PUB.Y = 87097C47345BA8FFFD3973D8837EB05FD45CDEF83C96847F4853D918FDE65FD409B5647D8EEAEDE669B3681EB53E2CAF
3,203,626 UART: [art] SIG.R = 1FFD5DF8BE3A4C1886A5F0F3A6D596BB03FEFE9385E173CE86DD8C7CD72FCA308595CB72E856A020AF5AE98E49F08227
3,210,413 UART: [art] SIG.S = 386C0058FD34B676530E9CB01BF317B3FB776CAD9CFD76EE42B19BAA033F63C527DD0C1F9459A9B2BFC70024B2CD9C07
3,233,755 UART: Caliptra RT
3,234,098 UART: [state] CFI Enabled
3,354,070 UART: [rt] RT listening for mailbox commands...
3,354,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,184 UART: [rt]cmd =0x44504543, len=96
3,567,409 >>> mbox cmd response data (6236 bytes)
3,567,410 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,597,503 UART: [rt]cmd =0x53574545, len=84
3,623,133 >>> mbox cmd response data (200 bytes)
3,623,134 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,652,713 UART: [rt]cmd =0x4453424c, len=4
3,670,233 >>> mbox cmd response data (8 bytes)
3,670,234 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,987 UART: [rt]cmd =0x53574545, len=84
3,725,713 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,331 ready_for_fw is high
1,059,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,843 >>> mbox cmd response: success
2,739,704 UART:
2,739,720 UART: Running Caliptra FMC ...
2,740,128 UART:
2,740,271 UART: [state] CFI Enabled
2,751,039 UART: [fht] FMC Alias Private Key: 7
2,870,509 UART: [art] Extend RT PCRs Done
2,870,937 UART: [art] Lock RT PCRs Done
2,872,299 UART: [art] Populate DV Done
2,880,390 UART: [fht] FMC Alias Private Key: 7
2,881,492 UART: [art] Derive CDI
2,881,772 UART: [art] Store in slot 0x4
2,967,171 UART: [art] Derive Key Pair
2,967,531 UART: [art] Store priv key in slot 0x5
2,980,771 UART: [art] Derive Key Pair - Done
2,995,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,621 UART: [art] PUB.X = 506014019148E2B0A358B3ABDBBD5D889B704B3EC14036C77CA4FDA719D5B2B1CB64E3767910A4AD97E4AC18851A7BAA
3,018,400 UART: [art] PUB.Y = 89C5D88649AE57DAC2E6B916DA2D18E914A85A29A80AC6FE0D5D72DAE62434C6FA869D531720A2C654BAE0F9B5CA7DFC
3,025,364 UART: [art] SIG.R = 4F42FBB8C66CD94FB765A91BCDAF6E256CB5E3F606A8AC2C33923626847FC737A05EA90CC63086050D19AC7B92C977A6
3,032,134 UART: [art] SIG.S = 838AB1350110CE6A129A8C5C17EB49073E5AE674F18849B6A3B15A6D19CB05DC157D21B95A84BCEA02460EC0DA657E4B
3,055,981 UART: Caliptra RT
3,056,324 UART: [state] CFI Enabled
3,176,457 UART: [rt] RT listening for mailbox commands...
3,177,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,711 UART: [rt]cmd =0x44504543, len=96
3,388,950 >>> mbox cmd response data (6236 bytes)
3,388,951 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,802 UART: [rt]cmd =0x53574545, len=84
3,445,562 >>> mbox cmd response data (200 bytes)
3,445,563 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,098 UART: [rt]cmd =0x4453424c, len=4
3,493,284 >>> mbox cmd response data (8 bytes)
3,493,285 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,056 UART: [rt]cmd =0x53574545, len=84
3,548,128 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,765 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
893,668 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,793 UART: [kat] ++
897,945 UART: [kat] sha1
902,179 UART: [kat] SHA2-256
904,119 UART: [kat] SHA2-384
906,674 UART: [kat] SHA2-512-ACC
908,575 UART: [kat] ECC-384
918,296 UART: [kat] HMAC-384Kdf
922,830 UART: [kat] LMS
1,171,158 UART: [kat] --
1,171,897 UART: [cold-reset] ++
1,172,379 UART: [fht] FHT @ 0x50003400
1,174,810 UART: [idev] ++
1,174,978 UART: [idev] CDI.KEYID = 6
1,175,338 UART: [idev] SUBJECT.KEYID = 7
1,175,762 UART: [idev] UDS.KEYID = 0
1,176,107 ready_for_fw is high
1,176,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,824 UART: [idev] Erasing UDS.KEYID = 0
1,200,917 UART: [idev] Sha1 KeyId Algorithm
1,209,293 UART: [idev] --
1,210,357 UART: [ldev] ++
1,210,525 UART: [ldev] CDI.KEYID = 6
1,210,888 UART: [ldev] SUBJECT.KEYID = 5
1,211,314 UART: [ldev] AUTHORITY.KEYID = 7
1,211,777 UART: [ldev] FE.KEYID = 1
1,216,899 UART: [ldev] Erasing FE.KEYID = 1
1,242,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,615 UART: [ldev] --
1,281,992 UART: [fwproc] Wait for Commands...
1,282,796 UART: [fwproc] Recv command 0x46574c44
1,283,524 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,498 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,668 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,929 >>> mbox cmd response: success
2,826,973 UART: [afmc] ++
2,827,141 UART: [afmc] CDI.KEYID = 6
2,827,503 UART: [afmc] SUBJECT.KEYID = 7
2,827,928 UART: [afmc] AUTHORITY.KEYID = 5
2,863,415 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,770 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,479 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,362 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,063 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,057 UART: [afmc] --
2,907,165 UART: [cold-reset] --
2,908,091 UART: [state] Locking Datavault
2,909,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,920 UART: [state] Locking ICCM
2,910,394 UART: [exit] Launching FMC @ 0x40000130
2,915,724 UART:
2,915,740 UART: Running Caliptra FMC ...
2,916,148 UART:
2,916,202 UART: [state] CFI Enabled
2,926,416 UART: [fht] FMC Alias Private Key: 7
3,045,656 UART: [art] Extend RT PCRs Done
3,046,084 UART: [art] Lock RT PCRs Done
3,047,708 UART: [art] Populate DV Done
3,055,625 UART: [fht] FMC Alias Private Key: 7
3,056,615 UART: [art] Derive CDI
3,056,895 UART: [art] Store in slot 0x4
3,142,782 UART: [art] Derive Key Pair
3,143,142 UART: [art] Store priv key in slot 0x5
3,156,102 UART: [art] Derive Key Pair - Done
3,171,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,603 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,368 UART: [art] PUB.X = EDF15237C88DC3D671815A8BCA89270B98196D37CFEB66AD40E1E0FAE9103923FE03A1C2AEC9E941123B4AF9E1AE1C83
3,194,148 UART: [art] PUB.Y = 554D9125B046623CC625958AE5B9DB7D59C626D50F443DF46124C871626EF4920B214F3084F5ABF7728CD6582B43865A
3,201,086 UART: [art] SIG.R = F95FDC37C4FBFF22086155A9B073CEA1CBF55B59BFD47AA975C4A1F656C722FF0436486268B6D95D65967297D96C103F
3,207,858 UART: [art] SIG.S = D76A6BC9055C794F859CDD6FA0BA860BA970B6E078B0C5113F2E4A4C000AD773576BEF6F875E5C9867125ADBD99E6123
3,231,129 UART: Caliptra RT
3,231,380 UART: [state] CFI Enabled
3,350,518 UART: [rt] RT listening for mailbox commands...
3,351,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,608 UART: [rt]cmd =0x44504543, len=96
3,563,823 >>> mbox cmd response data (6236 bytes)
3,563,824 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,593,853 UART: [rt]cmd =0x53574545, len=84
3,619,221 >>> mbox cmd response data (200 bytes)
3,619,222 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,427 UART: [rt]cmd =0x4453424c, len=4
3,665,895 >>> mbox cmd response data (8 bytes)
3,665,896 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,695,653 UART: [rt]cmd =0x53574545, len=84
3,720,979 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,661 ready_for_fw is high
1,059,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,596 >>> mbox cmd response: success
2,741,175 UART:
2,741,191 UART: Running Caliptra FMC ...
2,741,599 UART:
2,741,653 UART: [state] CFI Enabled
2,752,117 UART: [fht] FMC Alias Private Key: 7
2,871,261 UART: [art] Extend RT PCRs Done
2,871,689 UART: [art] Lock RT PCRs Done
2,872,999 UART: [art] Populate DV Done
2,881,434 UART: [fht] FMC Alias Private Key: 7
2,882,496 UART: [art] Derive CDI
2,882,776 UART: [art] Store in slot 0x4
2,968,503 UART: [art] Derive Key Pair
2,968,863 UART: [art] Store priv key in slot 0x5
2,982,055 UART: [art] Derive Key Pair - Done
2,996,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,295 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,060 UART: [art] PUB.X = F20358B499F78C9882E73E93D46FC3907C86D6891B4617F82BC86DB869D51F8F4DEB6A115D5DC0CAF4267B71FCC885FD
3,019,837 UART: [art] PUB.Y = 482666619088A9546441DA7F4B2D5A6DAAB663B46246159A5668C9F5DD6761AB865B232DD5612175AB0A3CD08834C068
3,026,778 UART: [art] SIG.R = 5D71EF96CDAC7081D74326FB17081CA17D9F13C13331B29CE982487757A27F68059F85F5FA849562236965EF61970BB7
3,033,533 UART: [art] SIG.S = A2D6A945E10567217FB09507E8ABCBFEDDDE78CDD0BE19CC246B58B7625C5F5F73D4AD56A6C0B57CDAB9F1CA46C898A3
3,057,359 UART: Caliptra RT
3,057,610 UART: [state] CFI Enabled
3,176,795 UART: [rt] RT listening for mailbox commands...
3,177,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,691 UART: [rt]cmd =0x44504543, len=96
3,389,796 >>> mbox cmd response data (6236 bytes)
3,389,797 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,419,502 UART: [rt]cmd =0x53574545, len=84
3,445,446 >>> mbox cmd response data (200 bytes)
3,445,447 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,702 UART: [rt]cmd =0x4453424c, len=4
3,492,150 >>> mbox cmd response data (8 bytes)
3,492,151 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,120 UART: [rt]cmd =0x53574545, len=84
3,548,384 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
893,173 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,298 UART: [kat] ++
897,450 UART: [kat] sha1
901,792 UART: [kat] SHA2-256
903,732 UART: [kat] SHA2-384
906,597 UART: [kat] SHA2-512-ACC
908,498 UART: [kat] ECC-384
918,247 UART: [kat] HMAC-384Kdf
922,961 UART: [kat] LMS
1,171,289 UART: [kat] --
1,172,034 UART: [cold-reset] ++
1,172,400 UART: [fht] FHT @ 0x50003400
1,175,207 UART: [idev] ++
1,175,375 UART: [idev] CDI.KEYID = 6
1,175,735 UART: [idev] SUBJECT.KEYID = 7
1,176,159 UART: [idev] UDS.KEYID = 0
1,176,504 ready_for_fw is high
1,176,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,007 UART: [idev] Erasing UDS.KEYID = 0
1,201,836 UART: [idev] Sha1 KeyId Algorithm
1,210,334 UART: [idev] --
1,211,572 UART: [ldev] ++
1,211,740 UART: [ldev] CDI.KEYID = 6
1,212,103 UART: [ldev] SUBJECT.KEYID = 5
1,212,529 UART: [ldev] AUTHORITY.KEYID = 7
1,212,992 UART: [ldev] FE.KEYID = 1
1,218,108 UART: [ldev] Erasing FE.KEYID = 1
1,245,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,162 UART: [ldev] --
1,284,597 UART: [fwproc] Wait for Commands...
1,285,363 UART: [fwproc] Recv command 0x46574c44
1,286,091 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,103 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,273 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,510 >>> mbox cmd response: success
2,830,698 UART: [afmc] ++
2,830,866 UART: [afmc] CDI.KEYID = 6
2,831,228 UART: [afmc] SUBJECT.KEYID = 7
2,831,653 UART: [afmc] AUTHORITY.KEYID = 5
2,867,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,389 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,137 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,846 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,729 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,430 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,430 UART: [afmc] --
2,911,490 UART: [cold-reset] --
2,912,344 UART: [state] Locking Datavault
2,913,173 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,777 UART: [state] Locking ICCM
2,914,303 UART: [exit] Launching FMC @ 0x40000130
2,919,633 UART:
2,919,649 UART: Running Caliptra FMC ...
2,920,057 UART:
2,920,200 UART: [state] CFI Enabled
2,930,982 UART: [fht] FMC Alias Private Key: 7
3,050,354 UART: [art] Extend RT PCRs Done
3,050,782 UART: [art] Lock RT PCRs Done
3,052,548 UART: [art] Populate DV Done
3,060,725 UART: [fht] FMC Alias Private Key: 7
3,061,779 UART: [art] Derive CDI
3,062,059 UART: [art] Store in slot 0x4
3,147,914 UART: [art] Derive Key Pair
3,148,274 UART: [art] Store priv key in slot 0x5
3,161,734 UART: [art] Derive Key Pair - Done
3,176,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,667 UART: [art] PUB.X = D5A7798F0D4EDAC27F2F7E9E98E5920E601F56EA2EF865B470DC7D58111D8384574F56B9C6FC824884CCB65D27E2E3C3
3,199,441 UART: [art] PUB.Y = 70263F2C45E2103D9CF8A14B9B3DA79BF3E1DDAA4C50E95676A29791DB0FD9745A3D00FA62E7ED3C55076884F9FB1B09
3,206,372 UART: [art] SIG.R = 3380B19FF88A33F9EC87556EF51837CD3483C20BF0A1C0DB493D26B534970B68917A1DE9A2149A1F57F46627B8C3A139
3,213,136 UART: [art] SIG.S = C03268E4B96600091B6C91D17679A4D1D1595E3A94A061962FC6B29E48CFFF94819A1BB0186713C108EBA4C4CD634228
3,237,442 UART: Caliptra RT
3,237,785 UART: [state] CFI Enabled
3,357,654 UART: [rt] RT listening for mailbox commands...
3,358,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,550 UART: [rt]cmd =0x44504543, len=96
3,570,811 >>> mbox cmd response data (6236 bytes)
3,570,812 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,600,603 UART: [rt]cmd =0x53574545, len=84
3,627,125 >>> mbox cmd response data (200 bytes)
3,627,126 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,656,353 UART: [rt]cmd =0x4453424c, len=4
3,673,795 >>> mbox cmd response data (8 bytes)
3,673,796 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,703,627 UART: [rt]cmd =0x53574545, len=84
3,729,001 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,158 ready_for_fw is high
1,060,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,231 >>> mbox cmd response: success
2,742,134 UART:
2,742,150 UART: Running Caliptra FMC ...
2,742,558 UART:
2,742,701 UART: [state] CFI Enabled
2,753,197 UART: [fht] FMC Alias Private Key: 7
2,873,111 UART: [art] Extend RT PCRs Done
2,873,539 UART: [art] Lock RT PCRs Done
2,875,469 UART: [art] Populate DV Done
2,883,790 UART: [fht] FMC Alias Private Key: 7
2,884,774 UART: [art] Derive CDI
2,885,054 UART: [art] Store in slot 0x4
2,970,867 UART: [art] Derive Key Pair
2,971,227 UART: [art] Store priv key in slot 0x5
2,984,813 UART: [art] Derive Key Pair - Done
2,999,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,070 UART: [art] PUB.X = D506F449AD66F56ED44E9199633DE7BBD17B6E4C6AD4E48D10CE87B3EABBD94D5DC05C77C7CD6312125AA8089336A196
3,022,848 UART: [art] PUB.Y = CBC6C103601D5FC5C5A053757B7B71EC6493E3BD522EDEB2770A3FFE3F5D62F97C5CB35C4227D30FDFF7AD702F273923
3,029,805 UART: [art] SIG.R = 77951F074209736D18FFAFFF7AFEDB70EDDF73CBCC9F4753C4498D2DDBE0A1A92E10900770B6202EC00231E4AC2283D8
3,036,577 UART: [art] SIG.S = 982BD59964E84B8E109D691645A4ED78432C6995484458E6CE55994597F32280BF8265EF966F296C1B896F1AA1EDBDDC
3,060,369 UART: Caliptra RT
3,060,712 UART: [state] CFI Enabled
3,180,337 UART: [rt] RT listening for mailbox commands...
3,181,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,213 UART: [rt]cmd =0x44504543, len=96
3,393,942 >>> mbox cmd response data (6236 bytes)
3,393,943 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,608 UART: [rt]cmd =0x53574545, len=84
3,448,990 >>> mbox cmd response data (200 bytes)
3,448,991 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,076 UART: [rt]cmd =0x4453424c, len=4
3,495,692 >>> mbox cmd response data (8 bytes)
3,495,693 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,698 UART: [rt]cmd =0x53574545, len=84
3,551,762 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,154 UART:
192,500 UART: Running Caliptra ROM ...
193,683 UART:
193,856 UART: [state] CFI Enabled
263,545 UART: [state] LifecycleState = Unprovisioned
265,462 UART: [state] DebugLocked = No
268,490 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,260 UART: [kat] SHA2-256
443,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,427 UART: [kat] ++
454,888 UART: [kat] sha1
465,549 UART: [kat] SHA2-256
468,201 UART: [kat] SHA2-384
474,616 UART: [kat] SHA2-512-ACC
476,988 UART: [kat] ECC-384
2,765,974 UART: [kat] HMAC-384Kdf
2,777,399 UART: [kat] LMS
3,967,697 UART: [kat] --
3,973,139 UART: [cold-reset] ++
3,975,431 UART: [fht] Storing FHT @ 0x50003400
3,986,340 UART: [idev] ++
3,986,911 UART: [idev] CDI.KEYID = 6
3,987,825 UART: [idev] SUBJECT.KEYID = 7
3,989,071 UART: [idev] UDS.KEYID = 0
3,990,094 ready_for_fw is high
3,990,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,387 UART: [idev] Erasing UDS.KEYID = 0
7,339,173 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,454 UART: [idev] --
7,365,017 UART: [ldev] ++
7,365,603 UART: [ldev] CDI.KEYID = 6
7,366,622 UART: [ldev] SUBJECT.KEYID = 5
7,367,790 UART: [ldev] AUTHORITY.KEYID = 7
7,369,024 UART: [ldev] FE.KEYID = 1
7,412,347 UART: [ldev] Erasing FE.KEYID = 1
10,750,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,059,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,074,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,089,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,103,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,122,861 UART: [ldev] --
13,126,741 UART: [fwproc] Waiting for Commands...
13,129,429 UART: [fwproc] Received command 0x46574c44
13,131,617 UART: [fwproc] Received Image of size 118548 bytes
17,243,987 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,320,095 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,393,267 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,721,527 >>> mbox cmd response: success
17,726,561 UART: [afmc] ++
17,727,176 UART: [afmc] CDI.KEYID = 6
17,728,092 UART: [afmc] SUBJECT.KEYID = 7
17,729,373 UART: [afmc] AUTHORITY.KEYID = 5
21,105,209 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,403,178 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,405,474 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,419,867 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,434,613 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,449,048 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,470,480 UART: [afmc] --
23,473,908 UART: [cold-reset] --
23,477,553 UART: [state] Locking Datavault
23,482,962 UART: [state] Locking PCR0, PCR1 and PCR31
23,484,724 UART: [state] Locking ICCM
23,485,740 UART: [exit] Launching FMC @ 0x40000130
23,494,141 UART:
23,494,376 UART: Running Caliptra FMC ...
23,495,475 UART:
23,495,637 UART: [state] CFI Enabled
23,562,703 UART: [fht] FMC Alias Private Key: 7
25,903,259 UART: [art] Extend RT PCRs Done
25,904,473 UART: [art] Lock RT PCRs Done
25,906,048 UART: [art] Populate DV Done
25,911,513 UART: [fht] FMC Alias Private Key: 7
25,913,029 UART: [art] Derive CDI
25,913,802 UART: [art] Store in slot 0x4
25,970,899 UART: [art] Derive Key Pair
25,971,897 UART: [art] Store priv key in slot 0x5
29,264,271 UART: [art] Derive Key Pair - Done
29,277,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,565,590 UART: [art] Erasing AUTHORITY.KEYID = 7
31,567,112 UART: [art] PUB.X = EEAC8CCBF445317C066BFBF19918CF321C75340EC28C47C1668ADB9D7FFB6173ACFFC468B982CDF7345BDC7B04CD88BE
31,574,381 UART: [art] PUB.Y = 898C971029B46FA46AB763C29069E9309B50BF4147EE276765270A2224FF1FA8ECE56DB3DFD0ADFFF72AB1BD27047DC2
31,581,643 UART: [art] SIG.R = 0755AC42D99554324DF9C31BF0699FE3AA1EB6888C0712EA48A0CEDDA62E1C2621D3A36331B71F97DC1431D2CD957721
31,589,146 UART: [art] SIG.S = 449F51717FA7063C15BBED34DDAAEE5B447D43B6CB99668F477A3F74B41A48EE350855BCF6753C5BE308CE416B649C3C
32,895,081 UART: Caliptra RT
32,895,816 UART: [state] CFI Enabled
33,070,809 UART: [rt] RT listening for mailbox commands...
33,072,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,103,188 UART: [rt]cmd =0x44504543, len=96
38,884,005 >>> mbox cmd response data (6236 bytes)
38,913,632 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,944,294 UART: [rt]cmd =0x53574545, len=84
44,518,423 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,783,454 ready_for_fw is high
3,783,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,837 >>> mbox cmd response: success
23,649,062 UART:
23,649,481 UART: Running Caliptra FMC ...
23,650,587 UART:
23,650,740 UART: [state] CFI Enabled
23,719,617 UART: [fht] FMC Alias Private Key: 7
26,060,659 UART: [art] Extend RT PCRs Done
26,061,893 UART: [art] Lock RT PCRs Done
26,063,872 UART: [art] Populate DV Done
26,069,457 UART: [fht] FMC Alias Private Key: 7
26,071,108 UART: [art] Derive CDI
26,071,849 UART: [art] Store in slot 0x4
26,127,922 UART: [art] Derive Key Pair
26,128,965 UART: [art] Store priv key in slot 0x5
29,421,471 UART: [art] Derive Key Pair - Done
29,434,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,763 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,281 UART: [art] PUB.X = 536E414ED5A0046E4037807ABDAC2E8364E6C3354D148ECEE58E224985556FC3E9902E069BFA0BCDF95D0139D65A4186
31,731,489 UART: [art] PUB.Y = C5075267DA3F00B497A205E1718C7B7354E4162BFE7E28FA3F386BC3BEE363490694236EF45B5D9EA3DDC931B1D9A75D
31,738,783 UART: [art] SIG.R = C8F640EC5A4029BE5028AB381BBA64D6AB81B1B0AB976461CAC876961B86F05177C8E2589E32A36BBCC74E363C6D644B
31,746,139 UART: [art] SIG.S = 730A0C77EEDE186D5C589EADB636F2E5D23DA0391B96538B8E7543699A76C54C6C6A8425BDE0CC6D393F6F29E1D2E883
33,051,606 UART: Caliptra RT
33,052,345 UART: [state] CFI Enabled
33,249,245 UART: [rt] RT listening for mailbox commands...
33,251,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,281,530 UART: [rt]cmd =0x44504543, len=96
39,059,516 >>> mbox cmd response data (6236 bytes)
39,089,070 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,119,821 UART: [rt]cmd =0x53574545, len=84
44,693,196 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,452 UART:
192,806 UART: Running Caliptra ROM ...
193,947 UART:
603,875 UART: [state] CFI Enabled
616,706 UART: [state] LifecycleState = Unprovisioned
618,690 UART: [state] DebugLocked = No
621,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,008 UART: [kat] SHA2-256
796,737 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,241 UART: [kat] ++
807,840 UART: [kat] sha1
818,789 UART: [kat] SHA2-256
821,511 UART: [kat] SHA2-384
826,925 UART: [kat] SHA2-512-ACC
829,288 UART: [kat] ECC-384
3,113,739 UART: [kat] HMAC-384Kdf
3,124,335 UART: [kat] LMS
4,314,475 UART: [kat] --
4,317,777 UART: [cold-reset] ++
4,319,492 UART: [fht] Storing FHT @ 0x50003400
4,332,523 UART: [idev] ++
4,333,084 UART: [idev] CDI.KEYID = 6
4,334,112 UART: [idev] SUBJECT.KEYID = 7
4,335,280 UART: [idev] UDS.KEYID = 0
4,336,320 ready_for_fw is high
4,336,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,386 UART: [idev] Erasing UDS.KEYID = 0
7,624,719 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,472 UART: [idev] --
7,649,772 UART: [ldev] ++
7,650,339 UART: [ldev] CDI.KEYID = 6
7,651,270 UART: [ldev] SUBJECT.KEYID = 5
7,652,529 UART: [ldev] AUTHORITY.KEYID = 7
7,653,752 UART: [ldev] FE.KEYID = 1
7,665,420 UART: [ldev] Erasing FE.KEYID = 1
10,957,763 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,543 UART: [ldev] --
13,319,857 UART: [fwproc] Waiting for Commands...
13,323,024 UART: [fwproc] Received command 0x46574c44
13,325,201 UART: [fwproc] Received Image of size 118548 bytes
17,435,232 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,512,526 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,585,698 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,913,410 >>> mbox cmd response: success
17,916,825 UART: [afmc] ++
17,917,434 UART: [afmc] CDI.KEYID = 6
17,918,370 UART: [afmc] SUBJECT.KEYID = 7
17,919,590 UART: [afmc] AUTHORITY.KEYID = 5
21,235,589 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,532,137 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,534,388 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,548,827 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,563,523 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,577,937 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,599,016 UART: [afmc] --
23,602,295 UART: [cold-reset] --
23,605,014 UART: [state] Locking Datavault
23,610,266 UART: [state] Locking PCR0, PCR1 and PCR31
23,611,960 UART: [state] Locking ICCM
23,613,782 UART: [exit] Launching FMC @ 0x40000130
23,622,170 UART:
23,622,400 UART: Running Caliptra FMC ...
23,623,517 UART:
23,623,668 UART: [state] CFI Enabled
23,632,035 UART: [fht] FMC Alias Private Key: 7
25,971,616 UART: [art] Extend RT PCRs Done
25,972,841 UART: [art] Lock RT PCRs Done
25,974,468 UART: [art] Populate DV Done
25,979,820 UART: [fht] FMC Alias Private Key: 7
25,981,554 UART: [art] Derive CDI
25,982,372 UART: [art] Store in slot 0x4
26,024,745 UART: [art] Derive Key Pair
26,025,747 UART: [art] Store priv key in slot 0x5
29,267,719 UART: [art] Derive Key Pair - Done
29,280,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,133 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,640 UART: [art] PUB.X = 4E76E964FB810627019B966F8D2A17DDA93C0C7E43F81315D749FF0F27817A027B7E3EBFD63E2D0B0BACB2619C323E73
31,569,895 UART: [art] PUB.Y = 2695C4006EB0156D9528637CED8CDF770EBFE041107624815ECE246C9C6E203C2156012D8FE8C9A416DE92FBDAB15103
31,577,156 UART: [art] SIG.R = C4223DFB37813B93B7C742E0492A5F416D84ABCBB00522991AAED182AEEF794AB70989DA3A9DA401C85A2420829ABCF2
31,584,592 UART: [art] SIG.S = 78096979079D4A1685566A12F5EAF5DE833EE70825ACAD08AA129E7365340CA794B00EA7A05B98CC46BD336EBEEE31C4
32,890,125 UART: Caliptra RT
32,890,841 UART: [state] CFI Enabled
33,023,739 UART: [rt] RT listening for mailbox commands...
33,025,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,056,420 UART: [rt]cmd =0x44504543, len=96
38,741,025 >>> mbox cmd response data (6236 bytes)
38,770,630 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,801,059 UART: [rt]cmd =0x53574545, len=84
44,325,801 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
4,127,880 ready_for_fw is high
4,128,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,160 >>> mbox cmd response: success
23,806,260 UART:
23,806,674 UART: Running Caliptra FMC ...
23,807,839 UART:
23,807,996 UART: [state] CFI Enabled
23,815,883 UART: [fht] FMC Alias Private Key: 7
26,155,279 UART: [art] Extend RT PCRs Done
26,156,503 UART: [art] Lock RT PCRs Done
26,158,292 UART: [art] Populate DV Done
26,163,980 UART: [fht] FMC Alias Private Key: 7
26,165,638 UART: [art] Derive CDI
26,166,450 UART: [art] Store in slot 0x4
26,209,483 UART: [art] Derive Key Pair
26,210,529 UART: [art] Store priv key in slot 0x5
29,452,628 UART: [art] Derive Key Pair - Done
29,465,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,737 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,715 UART: [art] PUB.X = BFDC8A6918B541E9ADA38E15DD8AF92134F2CAE1BF979DB391E741BA58CC45ACCC86923E6A8BF43DEEE4D8DBD8C77860
31,755,527 UART: [art] PUB.Y = 6D2E9F77511E68339359BC951BB73C058C2B0DE3D8C0A0011125C0643FC2EE9B261F4B7697C796A34DA39DBC05AF9BF4
31,762,789 UART: [art] SIG.R = 6E84B2F8D5D7C3D14A2B3E0B33DE04A0300C573B464F6D3050DCB53C7C5959890D0CC692C278808360C108D6DBA7076E
31,770,131 UART: [art] SIG.S = 6FAD7534EEB7CA64882EB19FDD14C89BBE8D5FDD2405030550AC0ADD260EBFB87DF91D21BB6D29602969326926B70112
33,075,483 UART: Caliptra RT
33,076,773 UART: [state] CFI Enabled
33,208,513 UART: [rt] RT listening for mailbox commands...
33,210,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,241,937 UART: [rt]cmd =0x44504543, len=96
38,925,269 >>> mbox cmd response data (6236 bytes)
38,955,356 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,986,067 UART: [rt]cmd =0x53574545, len=84
44,511,153 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,410 writing to cptra_bootfsm_go
193,568 UART:
193,927 UART: Running Caliptra ROM ...
195,023 UART:
195,175 UART: [state] CFI Enabled
260,887 UART: [state] LifecycleState = Unprovisioned
262,791 UART: [state] DebugLocked = No
264,522 UART: [state] WD Timer not started. Device not locked for debugging
269,262 UART: [kat] SHA2-256
448,895 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,660 UART: [kat] ++
460,182 UART: [kat] sha1
471,974 UART: [kat] SHA2-256
474,631 UART: [kat] SHA2-384
480,332 UART: [kat] SHA2-512-ACC
482,730 UART: [kat] ECC-384
2,927,022 UART: [kat] HMAC-384Kdf
2,952,055 UART: [kat] LMS
3,428,542 UART: [kat] --
3,432,045 UART: [cold-reset] ++
3,433,554 UART: [fht] FHT @ 0x50003400
3,446,322 UART: [idev] ++
3,446,926 UART: [idev] CDI.KEYID = 6
3,447,850 UART: [idev] SUBJECT.KEYID = 7
3,449,092 UART: [idev] UDS.KEYID = 0
3,450,017 ready_for_fw is high
3,450,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,326 UART: [idev] Erasing UDS.KEYID = 0
5,967,964 UART: [idev] Sha1 KeyId Algorithm
5,990,920 UART: [idev] --
5,996,925 UART: [ldev] ++
5,997,549 UART: [ldev] CDI.KEYID = 6
5,998,436 UART: [ldev] SUBJECT.KEYID = 5
5,999,646 UART: [ldev] AUTHORITY.KEYID = 7
6,000,930 UART: [ldev] FE.KEYID = 1
6,038,975 UART: [ldev] Erasing FE.KEYID = 1
8,542,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,128 UART: [ldev] --
10,352,966 UART: [fwproc] Wait for Commands...
10,354,526 UART: [fwproc] Recv command 0x46574c44
10,356,566 UART: [fwproc] Recv'd Img size: 118548 bytes
13,837,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,917,224 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,990,271 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,319,046 >>> mbox cmd response: success
14,323,550 UART: [afmc] ++
14,324,185 UART: [afmc] CDI.KEYID = 6
14,325,101 UART: [afmc] SUBJECT.KEYID = 7
14,326,316 UART: [afmc] AUTHORITY.KEYID = 5
16,856,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,598,512 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,600,686 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,616,478 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,632,573 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,648,176 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,671,489 UART: [afmc] --
18,675,526 UART: [cold-reset] --
18,679,232 UART: [state] Locking Datavault
18,685,395 UART: [state] Locking PCR0, PCR1 and PCR31
18,687,089 UART: [state] Locking ICCM
18,688,535 UART: [exit] Launching FMC @ 0x40000130
18,696,928 UART:
18,697,167 UART: Running Caliptra FMC ...
18,698,267 UART:
18,698,428 UART: [state] CFI Enabled
18,755,926 UART: [fht] FMC Alias Private Key: 7
20,522,804 UART: [art] Extend RT PCRs Done
20,524,027 UART: [art] Lock RT PCRs Done
20,525,650 UART: [art] Populate DV Done
20,530,897 UART: [fht] FMC Alias Private Key: 7
20,532,398 UART: [art] Derive CDI
20,533,157 UART: [art] Store in slot 0x4
20,588,150 UART: [art] Derive Key Pair
20,589,187 UART: [art] Store priv key in slot 0x5
23,051,956 UART: [art] Derive Key Pair - Done
23,064,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,777,490 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,995 UART: [art] PUB.X = 2B6417514B69EE88D80B6200F37DBA32E9D0A2E3CC8B5AE8D67C9D5BFDDF5719119517344EB0828870C8926E2B6B6C24
24,786,235 UART: [art] PUB.Y = 47776D1742F1E2584F2CF624B15924BCB891C95F4B834F42E0D1A5C51CC701D6B8E4F9819FCD80AD22765102FFCFFAB8
24,793,472 UART: [art] SIG.R = 84C3DC8B0BD6662D715953C170E88CAF5ABB6ADED91C8EBF046AA8B9475899510324A60B4FE0307E3C169BBFCC4FAE66
24,800,870 UART: [art] SIG.S = 5D285EB07E4BE94D51A61CCE7B3F61A41E165B669C85D96A58FC8AB2870D1F7BD4F80A328C23604974C8FC24555AA3D6
25,779,738 UART: Caliptra RT
25,780,450 UART: [state] CFI Enabled
25,973,513 UART: [rt] RT listening for mailbox commands...
25,975,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,006,009 UART: [rt]cmd =0x44504543, len=96
30,382,612 >>> mbox cmd response data (6236 bytes)
30,412,456 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,443,094 UART: [rt]cmd =0x53574545, len=84
34,609,731 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,461,954 ready_for_fw is high
3,462,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,451 >>> mbox cmd response: success
18,535,199 UART:
18,535,619 UART: Running Caliptra FMC ...
18,536,725 UART:
18,536,876 UART: [state] CFI Enabled
18,603,839 UART: [fht] FMC Alias Private Key: 7
20,391,305 UART: [art] Extend RT PCRs Done
20,392,527 UART: [art] Lock RT PCRs Done
20,393,960 UART: [art] Populate DV Done
20,399,268 UART: [fht] FMC Alias Private Key: 7
20,400,856 UART: [art] Derive CDI
20,401,580 UART: [art] Store in slot 0x4
20,457,549 UART: [art] Derive Key Pair
20,458,546 UART: [art] Store priv key in slot 0x5
22,921,725 UART: [art] Derive Key Pair - Done
22,934,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,647,621 UART: [art] Erasing AUTHORITY.KEYID = 7
24,649,125 UART: [art] PUB.X = F65937B17F9B9581F688A60C804280277C438E4B83C5EE9EC62103CFEBFEAE84FC67F46557754993B96E0D694E44FDD5
24,656,374 UART: [art] PUB.Y = 9CC526E2A3B3BA11C3FBDAD69A4D51EAFF7BD13849A8CBBF5E5DBB19E68D5EF308E782B23C88EC3EEEFA00BA453B8A95
24,663,683 UART: [art] SIG.R = 148160228D293CE6D618F6E06A1A157E8B8A70C13BF0FD6526DBD67B3A7A24635A2543835F78BF6DB3CBB6B2F23586C2
24,671,084 UART: [art] SIG.S = 05CFE22F78676CF4CB2D77EBBC275E5414F9566F64103169CC9FF4D42DBBBE8ACF5E1C08139624C336DB227A106B5FDB
25,649,540 UART: Caliptra RT
25,650,250 UART: [state] CFI Enabled
25,831,683 UART: [rt] RT listening for mailbox commands...
25,833,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,864,085 UART: [rt]cmd =0x44504543, len=96
30,240,401 >>> mbox cmd response data (6236 bytes)
30,270,033 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,300,654 UART: [rt]cmd =0x53574545, len=84
34,468,018 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,530 UART:
192,906 UART: Running Caliptra ROM ...
194,009 UART:
603,665 UART: [state] CFI Enabled
616,835 UART: [state] LifecycleState = Unprovisioned
618,784 UART: [state] DebugLocked = No
621,305 UART: [state] WD Timer not started. Device not locked for debugging
625,127 UART: [kat] SHA2-256
804,808 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,610 UART: [kat] ++
816,092 UART: [kat] sha1
826,547 UART: [kat] SHA2-256
829,273 UART: [kat] SHA2-384
833,631 UART: [kat] SHA2-512-ACC
836,001 UART: [kat] ECC-384
3,280,073 UART: [kat] HMAC-384Kdf
3,292,456 UART: [kat] LMS
3,768,961 UART: [kat] --
3,774,806 UART: [cold-reset] ++
3,776,529 UART: [fht] FHT @ 0x50003400
3,788,220 UART: [idev] ++
3,788,779 UART: [idev] CDI.KEYID = 6
3,789,734 UART: [idev] SUBJECT.KEYID = 7
3,790,976 UART: [idev] UDS.KEYID = 0
3,791,877 ready_for_fw is high
3,792,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,035 UART: [idev] Erasing UDS.KEYID = 0
6,271,219 UART: [idev] Sha1 KeyId Algorithm
6,296,392 UART: [idev] --
6,301,197 UART: [ldev] ++
6,301,780 UART: [ldev] CDI.KEYID = 6
6,302,718 UART: [ldev] SUBJECT.KEYID = 5
6,303,879 UART: [ldev] AUTHORITY.KEYID = 7
6,305,161 UART: [ldev] FE.KEYID = 1
6,317,268 UART: [ldev] Erasing FE.KEYID = 1
8,796,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,757 UART: [ldev] --
10,591,699 UART: [fwproc] Wait for Commands...
10,594,170 UART: [fwproc] Recv command 0x46574c44
10,596,209 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,536 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,595 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,563,539 >>> mbox cmd response: success
14,568,540 UART: [afmc] ++
14,569,130 UART: [afmc] CDI.KEYID = 6
14,570,153 UART: [afmc] SUBJECT.KEYID = 7
14,571,318 UART: [afmc] AUTHORITY.KEYID = 5
17,072,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,940 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,796,121 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,942 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,828,014 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,843,652 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,867,272 UART: [afmc] --
18,871,031 UART: [cold-reset] --
18,875,227 UART: [state] Locking Datavault
18,879,832 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,590 UART: [state] Locking ICCM
18,883,493 UART: [exit] Launching FMC @ 0x40000130
18,891,894 UART:
18,892,133 UART: Running Caliptra FMC ...
18,893,235 UART:
18,893,397 UART: [state] CFI Enabled
18,901,443 UART: [fht] FMC Alias Private Key: 7
20,667,057 UART: [art] Extend RT PCRs Done
20,668,267 UART: [art] Lock RT PCRs Done
20,669,835 UART: [art] Populate DV Done
20,675,089 UART: [fht] FMC Alias Private Key: 7
20,676,752 UART: [art] Derive CDI
20,677,571 UART: [art] Store in slot 0x4
20,720,066 UART: [art] Derive Key Pair
20,721,112 UART: [art] Store priv key in slot 0x5
23,147,830 UART: [art] Derive Key Pair - Done
23,161,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,464 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,972 UART: [art] PUB.X = 53D2F5396F06D6336F61E27BA43A8E30AAC798BEFDBB17BC6C14BD006906D7AEDCC6A646C16762732A4B7A8B249D7CD1
24,876,214 UART: [art] PUB.Y = 3DA4314DA0FEF205DF2176292C5754F3204BD9D8E251303C5B2933D677602310071B53372BBA456812D283297C312C27
24,883,443 UART: [art] SIG.R = 791A553D560699837046AD961C5B27C6D04C7383A9F87A974B5DFA44336138296F48DA5C53C46100B393882F6B288289
24,890,780 UART: [art] SIG.S = 45D520B5C9DD7F7FFD481D2804622D54B3ED0CBFC272A18BB0135A384674A0316AF2BCB62773F3321A3879DBB55F2421
25,870,236 UART: Caliptra RT
25,870,949 UART: [state] CFI Enabled
26,003,827 UART: [rt] RT listening for mailbox commands...
26,005,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,036,453 UART: [rt]cmd =0x44504543, len=96
30,332,736 >>> mbox cmd response data (6236 bytes)
30,362,569 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,393,037 UART: [rt]cmd =0x53574545, len=84
34,528,925 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,782,289 ready_for_fw is high
3,782,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,325 >>> mbox cmd response: success
18,711,132 UART:
18,711,525 UART: Running Caliptra FMC ...
18,712,723 UART:
18,712,886 UART: [state] CFI Enabled
18,720,765 UART: [fht] FMC Alias Private Key: 7
20,487,060 UART: [art] Extend RT PCRs Done
20,488,293 UART: [art] Lock RT PCRs Done
20,489,871 UART: [art] Populate DV Done
20,495,453 UART: [fht] FMC Alias Private Key: 7
20,497,104 UART: [art] Derive CDI
20,497,922 UART: [art] Store in slot 0x4
20,540,575 UART: [art] Derive Key Pair
20,541,612 UART: [art] Store priv key in slot 0x5
22,968,868 UART: [art] Derive Key Pair - Done
22,982,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,688,524 UART: [art] Erasing AUTHORITY.KEYID = 7
24,690,026 UART: [art] PUB.X = 128BEAE4606D4BD173222F5C6BF6BEFE59D4E1E6CE26F7C87D9FFDC0C108B8B14D26F0F14D5BE98D50386447FEF9A5BD
24,697,366 UART: [art] PUB.Y = 2F2047E5D384025D295FC885DD84527E2EF710EBCF4C48A0C7A80E07B49E1A2255A372682D4840DA3B775DA05827064D
24,704,564 UART: [art] SIG.R = 98151EC90550160494CD53D81EC923862283726B562509CB291E0185F02C584CD449763368CDD82465813AD43DE956DE
24,711,920 UART: [art] SIG.S = CD7B987F7AEE2C6964610C3761CA0E51DC41C7ADC7738BC2E4629761579B0130A877D0A06760C8931674896D24E1BB83
25,690,435 UART: Caliptra RT
25,691,145 UART: [state] CFI Enabled
25,823,555 UART: [rt] RT listening for mailbox commands...
25,825,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,856,328 UART: [rt]cmd =0x44504543, len=96
30,152,176 >>> mbox cmd response data (6236 bytes)
30,181,739 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,212,360 UART: [rt]cmd =0x53574545, len=84
34,348,857 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,065 UART:
192,447 UART: Running Caliptra ROM ...
193,646 UART:
193,796 UART: [state] CFI Enabled
266,037 UART: [state] LifecycleState = Unprovisioned
268,451 UART: [state] DebugLocked = No
270,345 UART: [state] WD Timer not started. Device not locked for debugging
275,151 UART: [kat] SHA2-256
464,997 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,795 UART: [kat] ++
476,237 UART: [kat] sha1
487,816 UART: [kat] SHA2-256
490,825 UART: [kat] SHA2-384
497,521 UART: [kat] SHA2-512-ACC
500,094 UART: [kat] ECC-384
2,945,786 UART: [kat] HMAC-384Kdf
2,972,840 UART: [kat] LMS
3,504,611 UART: [kat] --
3,507,898 UART: [cold-reset] ++
3,509,611 UART: [fht] FHT @ 0x50003400
3,522,004 UART: [idev] ++
3,522,651 UART: [idev] CDI.KEYID = 6
3,523,684 UART: [idev] SUBJECT.KEYID = 7
3,524,784 UART: [idev] UDS.KEYID = 0
3,525,831 ready_for_fw is high
3,526,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,122 UART: [idev] Erasing UDS.KEYID = 0
6,030,224 UART: [idev] Sha1 KeyId Algorithm
6,053,613 UART: [idev] --
6,058,148 UART: [ldev] ++
6,058,833 UART: [ldev] CDI.KEYID = 6
6,059,829 UART: [ldev] SUBJECT.KEYID = 5
6,060,932 UART: [ldev] AUTHORITY.KEYID = 7
6,062,164 UART: [ldev] FE.KEYID = 1
6,102,190 UART: [ldev] Erasing FE.KEYID = 1
8,608,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,784 UART: [ldev] --
10,414,475 UART: [fwproc] Wait for Commands...
10,417,700 UART: [fwproc] Recv command 0x46574c44
10,419,952 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,253 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,824 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,263 >>> mbox cmd response: success
14,682,598 UART: [afmc] ++
14,683,330 UART: [afmc] CDI.KEYID = 6
14,684,519 UART: [afmc] SUBJECT.KEYID = 7
14,685,954 UART: [afmc] AUTHORITY.KEYID = 5
17,213,438 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,941,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,943,620 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,958,715 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,973,861 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,988,820 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,945 UART: [afmc] --
19,015,969 UART: [cold-reset] --
19,020,269 UART: [state] Locking Datavault
19,026,182 UART: [state] Locking PCR0, PCR1 and PCR31
19,028,388 UART: [state] Locking ICCM
19,029,919 UART: [exit] Launching FMC @ 0x40000130
19,038,555 UART:
19,038,792 UART: Running Caliptra FMC ...
19,039,897 UART:
19,040,052 UART: [state] CFI Enabled
19,096,637 UART: [fht] FMC Alias Private Key: 7
20,863,192 UART: [art] Extend RT PCRs Done
20,864,411 UART: [art] Lock RT PCRs Done
20,866,119 UART: [art] Populate DV Done
20,871,844 UART: [fht] FMC Alias Private Key: 7
20,873,533 UART: [art] Derive CDI
20,874,268 UART: [art] Store in slot 0x4
20,929,894 UART: [art] Derive Key Pair
20,930,931 UART: [art] Store priv key in slot 0x5
23,393,437 UART: [art] Derive Key Pair - Done
23,406,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,676 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,178 UART: [art] PUB.X = 1ACAF69A04A359589E18B5B1D2C9ECD989DFBEB6B1B9078F1CD7CF42B2077BD849CEBE3FD86D8B0F9588654862DFB893
25,128,468 UART: [art] PUB.Y = 6BB726054DC8CA1A6AD2A2F2A2AEDB4E452B53D039B08DE1A925A5688B55216F23481BC427A584241095F84189F410FE
25,135,675 UART: [art] SIG.R = BCC47F6425A79DA5EA54BE7597283A0F9E36782A7A52C1B8755721D7C3622AC2EBD4D6CC0D39513FE03CA67CDAD1BA62
25,143,132 UART: [art] SIG.S = A042EA9179E6D496C0A535922635112B56FF162B2EC0D2C9FFB5A3B934E907F3E214438DB06E94017BE8A2ABE991928F
26,121,982 UART: Caliptra RT
26,122,671 UART: [state] CFI Enabled
26,304,472 UART: [rt] RT listening for mailbox commands...
26,306,393 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,337,042 UART: [rt]cmd =0x44504543, len=96
30,712,808 >>> mbox cmd response data (6236 bytes)
30,742,388 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,773,117 UART: [rt]cmd =0x53574545, len=84
34,940,496 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,440,292 ready_for_fw is high
3,440,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,835,358 >>> mbox cmd response: success
19,116,681 UART:
19,117,095 UART: Running Caliptra FMC ...
19,118,300 UART:
19,118,469 UART: [state] CFI Enabled
19,181,667 UART: [fht] FMC Alias Private Key: 7
20,948,771 UART: [art] Extend RT PCRs Done
20,949,991 UART: [art] Lock RT PCRs Done
20,951,246 UART: [art] Populate DV Done
20,956,393 UART: [fht] FMC Alias Private Key: 7
20,958,037 UART: [art] Derive CDI
20,958,849 UART: [art] Store in slot 0x4
21,014,588 UART: [art] Derive Key Pair
21,015,625 UART: [art] Store priv key in slot 0x5
23,478,554 UART: [art] Derive Key Pair - Done
23,491,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,165 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,680 UART: [art] PUB.X = 57DED5A8CDFCBA7D68F8BCD383228006E12AC5E034068A2C7CD3A0716748FE0FBB55498F273C0DCB9BA9CD1CAAD43BA9
25,213,040 UART: [art] PUB.Y = 61D29D5991080878E870E534E670402F90F084A92054898ED98D14DC2B169EBC1A5C5E9DFDED18AC90493E8E315124BC
25,220,263 UART: [art] SIG.R = EEC0136EF772A6773280D0E3ABBDD92D85DBE8C578CB3641E0B321F3AA65D0F3FF7364099669D12EAC457C811DE469C0
25,227,641 UART: [art] SIG.S = 45BC69A896E34869E1492E26285491E48AFB35A289E832728C079A77C8C9A458E2845417554094668964875164052B3E
26,206,471 UART: Caliptra RT
26,207,175 UART: [state] CFI Enabled
26,387,900 UART: [rt] RT listening for mailbox commands...
26,389,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,420,584 UART: [rt]cmd =0x44504543, len=96
30,795,243 >>> mbox cmd response data (6236 bytes)
30,824,918 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,855,374 UART: [rt]cmd =0x53574545, len=84
35,021,185 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,412 UART:
192,787 UART: Running Caliptra ROM ...
193,892 UART:
603,537 UART: [state] CFI Enabled
615,433 UART: [state] LifecycleState = Unprovisioned
617,820 UART: [state] DebugLocked = No
619,486 UART: [state] WD Timer not started. Device not locked for debugging
624,100 UART: [kat] SHA2-256
813,997 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,802 UART: [kat] ++
825,327 UART: [kat] sha1
836,767 UART: [kat] SHA2-256
839,796 UART: [kat] SHA2-384
845,798 UART: [kat] SHA2-512-ACC
848,387 UART: [kat] ECC-384
3,291,686 UART: [kat] HMAC-384Kdf
3,304,370 UART: [kat] LMS
3,836,160 UART: [kat] --
3,840,086 UART: [cold-reset] ++
3,842,312 UART: [fht] FHT @ 0x50003400
3,854,929 UART: [idev] ++
3,855,646 UART: [idev] CDI.KEYID = 6
3,856,558 UART: [idev] SUBJECT.KEYID = 7
3,857,812 UART: [idev] UDS.KEYID = 0
3,858,740 ready_for_fw is high
3,858,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,782 UART: [idev] Erasing UDS.KEYID = 0
6,333,061 UART: [idev] Sha1 KeyId Algorithm
6,355,981 UART: [idev] --
6,360,870 UART: [ldev] ++
6,361,558 UART: [ldev] CDI.KEYID = 6
6,362,483 UART: [ldev] SUBJECT.KEYID = 5
6,363,642 UART: [ldev] AUTHORITY.KEYID = 7
6,364,875 UART: [ldev] FE.KEYID = 1
6,377,411 UART: [ldev] Erasing FE.KEYID = 1
8,855,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,852 UART: [ldev] --
10,646,450 UART: [fwproc] Wait for Commands...
10,648,928 UART: [fwproc] Recv command 0x46574c44
10,651,236 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,737 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,340 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,518 >>> mbox cmd response: success
14,920,813 UART: [afmc] ++
14,921,539 UART: [afmc] CDI.KEYID = 6
14,922,668 UART: [afmc] SUBJECT.KEYID = 7
14,924,174 UART: [afmc] AUTHORITY.KEYID = 5
17,427,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,315 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,285 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,397 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,539 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,458 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,696 UART: [afmc] --
19,225,949 UART: [cold-reset] --
19,229,504 UART: [state] Locking Datavault
19,235,380 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,537 UART: [state] Locking ICCM
19,239,893 UART: [exit] Launching FMC @ 0x40000130
19,248,534 UART:
19,248,772 UART: Running Caliptra FMC ...
19,249,798 UART:
19,249,948 UART: [state] CFI Enabled
19,258,384 UART: [fht] FMC Alias Private Key: 7
21,025,397 UART: [art] Extend RT PCRs Done
21,026,635 UART: [art] Lock RT PCRs Done
21,028,240 UART: [art] Populate DV Done
21,033,500 UART: [fht] FMC Alias Private Key: 7
21,035,099 UART: [art] Derive CDI
21,035,848 UART: [art] Store in slot 0x4
21,078,827 UART: [art] Derive Key Pair
21,079,894 UART: [art] Store priv key in slot 0x5
23,506,842 UART: [art] Derive Key Pair - Done
23,519,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,021 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,550 UART: [art] PUB.X = 46C3FBD5283297E6950F64C4C0C3F9B282E1120D110475D380DC1790D4792E6F0B503F7F37EF04539044604C6AEC6416
25,234,770 UART: [art] PUB.Y = 538EB4475B9B2FE37F1370CB1BD1B37C9EEBECE21DDDC842E208B22482E9D2BDE5773DFCF597ADF2A66175A7B971548E
25,242,040 UART: [art] SIG.R = 4325D33AE8BB01C172054160AE71A140437B1F1690FAD6AC20FF6502E8B0BDDA4B23BC4479A85B70C447012490BC4265
25,249,416 UART: [art] SIG.S = 73FDC5BB3035B0F8BBAB79D4F8CCD43A74F7F0611CDC91045B1EEAC09CEE9F15B3C7D152F355C59E7B9CE058918C677B
26,228,680 UART: Caliptra RT
26,229,376 UART: [state] CFI Enabled
26,361,468 UART: [rt] RT listening for mailbox commands...
26,363,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,394,202 UART: [rt]cmd =0x44504543, len=96
30,689,273 >>> mbox cmd response data (6236 bytes)
30,718,704 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,749,511 UART: [rt]cmd =0x53574545, len=84
34,884,860 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,753,017 ready_for_fw is high
3,753,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,040,373 >>> mbox cmd response: success
19,292,478 UART:
19,292,885 UART: Running Caliptra FMC ...
19,294,039 UART:
19,294,220 UART: [state] CFI Enabled
19,302,240 UART: [fht] FMC Alias Private Key: 7
21,068,641 UART: [art] Extend RT PCRs Done
21,069,879 UART: [art] Lock RT PCRs Done
21,071,729 UART: [art] Populate DV Done
21,077,216 UART: [fht] FMC Alias Private Key: 7
21,078,716 UART: [art] Derive CDI
21,079,485 UART: [art] Store in slot 0x4
21,122,353 UART: [art] Derive Key Pair
21,123,356 UART: [art] Store priv key in slot 0x5
23,550,770 UART: [art] Derive Key Pair - Done
23,563,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,322 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,837 UART: [art] PUB.X = 247EB7A29208672920E76FEB89D673FC51D849629FC95E10BE161F7030DDA3574F2EDD8278CC501C2C5B8D9F42E24F6D
25,279,128 UART: [art] PUB.Y = 96F6E7B0223ACDB5DDB9FE7F71CFFB6146E1142CE4092B0C55DBB9E5553CFE90F27B2361B6FAACF69C7508FBB9CE56E0
25,286,417 UART: [art] SIG.R = 0FC641C00FD18BA0142A0F16E73C1BD76DA1D254A9156803A67085A1592D9AA04898F48F8AB0B6820B24F6E02788E952
25,293,844 UART: [art] SIG.S = 73A9309EDDE7AD3C99B4571691F006C6E264F3AA7C1C427249044DA3E3405D0B269F611E67D50D5F7760550AEDCF6EF2
26,272,782 UART: Caliptra RT
26,273,508 UART: [state] CFI Enabled
26,407,120 UART: [rt] RT listening for mailbox commands...
26,409,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,439,533 UART: [rt]cmd =0x44504543, len=96
30,736,261 >>> mbox cmd response data (6236 bytes)
30,765,831 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,796,402 UART: [rt]cmd =0x53574545, len=84
34,932,574 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,187 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,715 UART: [kat] SHA2-256
881,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,761 UART: [kat] ++
885,913 UART: [kat] sha1
890,021 UART: [kat] SHA2-256
891,959 UART: [kat] SHA2-384
894,854 UART: [kat] SHA2-512-ACC
896,755 UART: [kat] ECC-384
902,128 UART: [kat] HMAC-384Kdf
906,546 UART: [kat] LMS
1,474,742 UART: [kat] --
1,475,523 UART: [cold-reset] ++
1,475,891 UART: [fht] Storing FHT @ 0x50003400
1,478,530 UART: [idev] ++
1,478,698 UART: [idev] CDI.KEYID = 6
1,479,058 UART: [idev] SUBJECT.KEYID = 7
1,479,482 UART: [idev] UDS.KEYID = 0
1,479,827 ready_for_fw is high
1,479,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,668 UART: [idev] Erasing UDS.KEYID = 0
1,503,906 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,604 UART: [idev] --
1,513,851 UART: [ldev] ++
1,514,019 UART: [ldev] CDI.KEYID = 6
1,514,382 UART: [ldev] SUBJECT.KEYID = 5
1,514,808 UART: [ldev] AUTHORITY.KEYID = 7
1,515,271 UART: [ldev] FE.KEYID = 1
1,520,577 UART: [ldev] Erasing FE.KEYID = 1
1,545,692 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,246 UART: [ldev] --
1,584,671 UART: [fwproc] Waiting for Commands...
1,585,310 UART: [fwproc] Received command 0x46574c44
1,586,101 UART: [fwproc] Received Image of size 118548 bytes
2,930,917 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,153 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,371 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,690 >>> mbox cmd response: success
3,130,906 UART: [afmc] ++
3,131,074 UART: [afmc] CDI.KEYID = 6
3,131,436 UART: [afmc] SUBJECT.KEYID = 7
3,131,861 UART: [afmc] AUTHORITY.KEYID = 5
3,166,712 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,124 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,904 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,613 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,496 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,179 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,945 UART: [afmc] --
3,210,003 UART: [cold-reset] --
3,211,071 UART: [state] Locking Datavault
3,212,226 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,830 UART: [state] Locking ICCM
3,213,280 UART: [exit] Launching FMC @ 0x40000130
3,218,610 UART:
3,218,626 UART: Running Caliptra FMC ...
3,219,034 UART:
3,219,088 UART: [state] CFI Enabled
3,229,410 UART: [fht] FMC Alias Private Key: 7
3,348,684 UART: [art] Extend RT PCRs Done
3,349,112 UART: [art] Lock RT PCRs Done
3,350,766 UART: [art] Populate DV Done
3,359,187 UART: [fht] FMC Alias Private Key: 7
3,360,181 UART: [art] Derive CDI
3,360,461 UART: [art] Store in slot 0x4
3,446,593 UART: [art] Derive Key Pair
3,446,953 UART: [art] Store priv key in slot 0x5
3,460,022 UART: [art] Derive Key Pair - Done
3,474,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,727 UART: [art] PUB.X = EBDB2B6D9A23C6FC1369AF50C27109F9EC531C559CEC73F2365D3A7824E42FC330CB1CD693F35DA33AD5C5DA0C3A9FD2
3,497,513 UART: [art] PUB.Y = 3525BE27BA1FD482A11C91155ECF0ADEC5476EA6A593A43D7B2ADFA247ACE2D4CC191E93F46D47005B236CA6FFAA000D
3,504,435 UART: [art] SIG.R = 43A0A101458E610E060298382545333A7A64C1EBAF198762AA4BFD119CFE2451BDEC44B346F9553E3E61DD32C1AD1AFF
3,511,201 UART: [art] SIG.S = 8C7B02C82EA89217A73623BDD54B697688AD42D76F950DED7CF4BD4549DA962611E2D36F0474FCAF4AC650DC82371640
3,535,062 UART: Caliptra RT
3,535,313 UART: [state] CFI Enabled
3,655,925 UART: [rt] RT listening for mailbox commands...
3,656,595 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,107 UART: [rt]cmd =0x44504543, len=96
3,879,926 >>> mbox cmd response data (6236 bytes)
3,879,927 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,909,888 UART: [rt]cmd =0x53574545, len=84
3,934,949 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,621 ready_for_fw is high
1,362,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,770 >>> mbox cmd response: success
3,041,841 UART:
3,041,857 UART: Running Caliptra FMC ...
3,042,265 UART:
3,042,319 UART: [state] CFI Enabled
3,052,883 UART: [fht] FMC Alias Private Key: 7
3,171,927 UART: [art] Extend RT PCRs Done
3,172,355 UART: [art] Lock RT PCRs Done
3,173,873 UART: [art] Populate DV Done
3,182,316 UART: [fht] FMC Alias Private Key: 7
3,183,396 UART: [art] Derive CDI
3,183,676 UART: [art] Store in slot 0x4
3,269,686 UART: [art] Derive Key Pair
3,270,046 UART: [art] Store priv key in slot 0x5
3,283,013 UART: [art] Derive Key Pair - Done
3,297,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,747 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,512 UART: [art] PUB.X = F13FE5A12AC2FF35976BF765F4381BDA1EE77557B1CC9B65D9CF9646607BC7A34CF90586C3DE3F696D060F7D7F11EA35
3,320,287 UART: [art] PUB.Y = D16F02D3292E542D3ABF02A0AD9B5E43B64271162B9F9117D9996AB76333174BD4B5E6D95BBC2E7E69FDF4DBA700FF1C
3,327,223 UART: [art] SIG.R = FB130FA11623943302CD24B49E8E882F545BA6FFADE0C166CB00FF4668DFDA2981D50931F7B059C92C5B73D1266B4E28
3,333,970 UART: [art] SIG.S = 37A3D9178AB87DA0AA4C575395B642B7D089B12F01F031B7A60940D0CD8A93EA6F1A285CE336D7211E994E5314C85E0C
3,358,075 UART: Caliptra RT
3,358,326 UART: [state] CFI Enabled
3,478,192 UART: [rt] RT listening for mailbox commands...
3,478,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,168 UART: [rt]cmd =0x44504543, len=96
3,700,848 >>> mbox cmd response data (6236 bytes)
3,700,849 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,868 UART: [rt]cmd =0x53574545, len=84
3,756,647 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,173 UART: [state] LifecycleState = Unprovisioned
86,828 UART: [state] DebugLocked = No
87,314 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,860 UART: [kat] SHA2-256
882,791 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,906 UART: [kat] ++
887,058 UART: [kat] sha1
891,404 UART: [kat] SHA2-256
893,342 UART: [kat] SHA2-384
895,979 UART: [kat] SHA2-512-ACC
897,880 UART: [kat] ECC-384
903,805 UART: [kat] HMAC-384Kdf
908,435 UART: [kat] LMS
1,476,631 UART: [kat] --
1,477,644 UART: [cold-reset] ++
1,478,042 UART: [fht] Storing FHT @ 0x50003400
1,480,777 UART: [idev] ++
1,480,945 UART: [idev] CDI.KEYID = 6
1,481,305 UART: [idev] SUBJECT.KEYID = 7
1,481,729 UART: [idev] UDS.KEYID = 0
1,482,074 ready_for_fw is high
1,482,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,977 UART: [idev] Erasing UDS.KEYID = 0
1,506,141 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,717 UART: [idev] --
1,515,820 UART: [ldev] ++
1,515,988 UART: [ldev] CDI.KEYID = 6
1,516,351 UART: [ldev] SUBJECT.KEYID = 5
1,516,777 UART: [ldev] AUTHORITY.KEYID = 7
1,517,240 UART: [ldev] FE.KEYID = 1
1,522,832 UART: [ldev] Erasing FE.KEYID = 1
1,548,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,903 UART: [ldev] --
1,587,328 UART: [fwproc] Waiting for Commands...
1,588,179 UART: [fwproc] Received command 0x46574c44
1,588,970 UART: [fwproc] Received Image of size 118548 bytes
2,933,828 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,136 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,354 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,619 >>> mbox cmd response: success
3,133,683 UART: [afmc] ++
3,133,851 UART: [afmc] CDI.KEYID = 6
3,134,213 UART: [afmc] SUBJECT.KEYID = 7
3,134,638 UART: [afmc] AUTHORITY.KEYID = 5
3,169,993 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,285 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,065 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,774 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,657 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,340 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,234 UART: [afmc] --
3,213,244 UART: [cold-reset] --
3,214,060 UART: [state] Locking Datavault
3,215,343 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,947 UART: [state] Locking ICCM
3,216,547 UART: [exit] Launching FMC @ 0x40000130
3,221,877 UART:
3,221,893 UART: Running Caliptra FMC ...
3,222,301 UART:
3,222,444 UART: [state] CFI Enabled
3,232,964 UART: [fht] FMC Alias Private Key: 7
3,352,366 UART: [art] Extend RT PCRs Done
3,352,794 UART: [art] Lock RT PCRs Done
3,354,270 UART: [art] Populate DV Done
3,362,705 UART: [fht] FMC Alias Private Key: 7
3,363,887 UART: [art] Derive CDI
3,364,167 UART: [art] Store in slot 0x4
3,449,775 UART: [art] Derive Key Pair
3,450,135 UART: [art] Store priv key in slot 0x5
3,463,730 UART: [art] Derive Key Pair - Done
3,478,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,810 UART: [art] PUB.X = D189A158D535AA59F5F384A7BAC070998D7D689EF70B5D091A8DC23D04C55AD32A32905293393105AEBDCEE3CF1E7C9D
3,501,580 UART: [art] PUB.Y = 372C66B32BEAAF2FAD6674F29C761E485E5E803C87A35ACA34B6B1BA02F81AB0E3F78A8C0CA40D17AA6FD3ED25540FAB
3,508,542 UART: [art] SIG.R = A63868C764DEABF37AF1D1EF3671BF1CD7E0E14748D513949C7AB49669494FE2BF63E18869807D8883808A6CC7CB2EE2
3,515,320 UART: [art] SIG.S = 28512371DD0CCC1CF10060E95CAA854F8887A40DAEC7270F5CD373915BE6762B4B400CE27F2F2229EE410689AD74DDE8
3,539,257 UART: Caliptra RT
3,539,600 UART: [state] CFI Enabled
3,659,932 UART: [rt] RT listening for mailbox commands...
3,660,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,118 UART: [rt]cmd =0x44504543, len=96
3,883,045 >>> mbox cmd response data (6236 bytes)
3,883,046 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,912,831 UART: [rt]cmd =0x53574545, len=84
3,938,540 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,152 ready_for_fw is high
1,362,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,539 >>> mbox cmd response: success
3,043,346 UART:
3,043,362 UART: Running Caliptra FMC ...
3,043,770 UART:
3,043,913 UART: [state] CFI Enabled
3,054,957 UART: [fht] FMC Alias Private Key: 7
3,174,345 UART: [art] Extend RT PCRs Done
3,174,773 UART: [art] Lock RT PCRs Done
3,176,133 UART: [art] Populate DV Done
3,184,576 UART: [fht] FMC Alias Private Key: 7
3,185,620 UART: [art] Derive CDI
3,185,900 UART: [art] Store in slot 0x4
3,271,646 UART: [art] Derive Key Pair
3,272,006 UART: [art] Store priv key in slot 0x5
3,285,619 UART: [art] Derive Key Pair - Done
3,300,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,527 UART: [art] PUB.X = B3110AEBAE1EE640D763DE98384516E8FEA735DDDC0EADA7B6B8A5E655A42518ACA8B1A81BDD5E5B289D5608B84A6F78
3,323,310 UART: [art] PUB.Y = C1DC7E99843417B8701CABB01C212296E48E7657B7855EA2D6D5ABAD244446987D1D082508CA008CA1FE7A93DC172A2C
3,330,238 UART: [art] SIG.R = 768832C00431E3347128570ECF625FDEA8134A8A9E6E81F2BEFF1575382B12B165CD6121A9D2718614AF5EF5859DFDE7
3,337,004 UART: [art] SIG.S = 2124EDE33330FCF23FB11DA9D61E285764B308E6CE3C792CD3A7FA97A151A02B220C6D9B81E0E85A92E7BC0419A55C94
3,360,377 UART: Caliptra RT
3,360,720 UART: [state] CFI Enabled
3,480,731 UART: [rt] RT listening for mailbox commands...
3,481,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,939 UART: [rt]cmd =0x44504543, len=96
3,704,351 >>> mbox cmd response data (6236 bytes)
3,704,352 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,734,133 UART: [rt]cmd =0x53574545, len=84
3,759,364 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
890,952 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,056 UART: [kat] ++
895,208 UART: [kat] sha1
899,426 UART: [kat] SHA2-256
901,366 UART: [kat] SHA2-384
904,029 UART: [kat] SHA2-512-ACC
905,930 UART: [kat] ECC-384
915,521 UART: [kat] HMAC-384Kdf
919,929 UART: [kat] LMS
1,168,241 UART: [kat] --
1,168,854 UART: [cold-reset] ++
1,169,328 UART: [fht] FHT @ 0x50003400
1,172,040 UART: [idev] ++
1,172,208 UART: [idev] CDI.KEYID = 6
1,172,569 UART: [idev] SUBJECT.KEYID = 7
1,172,994 UART: [idev] UDS.KEYID = 0
1,173,340 ready_for_fw is high
1,173,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,925 UART: [idev] Erasing UDS.KEYID = 0
1,197,609 UART: [idev] Sha1 KeyId Algorithm
1,206,523 UART: [idev] --
1,207,520 UART: [ldev] ++
1,207,688 UART: [ldev] CDI.KEYID = 6
1,208,052 UART: [ldev] SUBJECT.KEYID = 5
1,208,479 UART: [ldev] AUTHORITY.KEYID = 7
1,208,942 UART: [ldev] FE.KEYID = 1
1,214,406 UART: [ldev] Erasing FE.KEYID = 1
1,240,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,442 UART: [ldev] --
1,279,777 UART: [fwproc] Wait for Commands...
1,280,522 UART: [fwproc] Recv command 0x46574c44
1,281,255 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,848 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,879 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,054 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,221 >>> mbox cmd response: success
2,824,397 UART: [afmc] ++
2,824,565 UART: [afmc] CDI.KEYID = 6
2,824,928 UART: [afmc] SUBJECT.KEYID = 7
2,825,354 UART: [afmc] AUTHORITY.KEYID = 5
2,861,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,649 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,359 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,240 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,941 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,576 UART: [afmc] --
2,904,433 UART: [cold-reset] --
2,905,421 UART: [state] Locking Datavault
2,906,810 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,414 UART: [state] Locking ICCM
2,907,996 UART: [exit] Launching FMC @ 0x40000130
2,913,326 UART:
2,913,342 UART: Running Caliptra FMC ...
2,913,750 UART:
2,913,804 UART: [state] CFI Enabled
2,924,036 UART: [fht] FMC Alias Private Key: 7
3,042,156 UART: [art] Extend RT PCRs Done
3,042,584 UART: [art] Lock RT PCRs Done
3,044,254 UART: [art] Populate DV Done
3,052,259 UART: [fht] FMC Alias Private Key: 7
3,053,357 UART: [art] Derive CDI
3,053,637 UART: [art] Store in slot 0x4
3,139,448 UART: [art] Derive Key Pair
3,139,808 UART: [art] Store priv key in slot 0x5
3,152,878 UART: [art] Derive Key Pair - Done
3,167,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,666 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,431 UART: [art] PUB.X = DBECB7CF4FA729D3F9BA112C672B464ECD7E9FA5898557DA50FACD9EB5F2187EFE31F7E2D905D38D6B4EE206B3B7DFA1
3,191,225 UART: [art] PUB.Y = 3695A0F2D11334DF818E3076CBB0500E7E9EEC3A453AA3072140C6B2D960B76FF7FBDF407C3650D211CE4607A25F24F5
3,198,172 UART: [art] SIG.R = 6FBB3B4BB193F1BF9398F151ADEAAA7859E3F0EAF47049467ADA67D94E4332A6CE265EFC9687562A13F56DBF04AA92D7
3,204,957 UART: [art] SIG.S = 9357CA160AFBD4C587C5CF8E0C28C131A0D4F0C09833093AB71C0F48BCAE7656B7A4B4D197CA3CBBA5E08375192972D1
3,228,943 UART: Caliptra RT
3,229,194 UART: [state] CFI Enabled
3,349,605 UART: [rt] RT listening for mailbox commands...
3,350,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,879 UART: [rt]cmd =0x44504543, len=96
3,572,898 >>> mbox cmd response data (6236 bytes)
3,572,899 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,528 UART: [rt]cmd =0x53574545, len=84
3,628,392 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,620 ready_for_fw is high
1,059,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,272 >>> mbox cmd response: success
2,741,169 UART:
2,741,185 UART: Running Caliptra FMC ...
2,741,593 UART:
2,741,647 UART: [state] CFI Enabled
2,752,407 UART: [fht] FMC Alias Private Key: 7
2,871,323 UART: [art] Extend RT PCRs Done
2,871,751 UART: [art] Lock RT PCRs Done
2,873,225 UART: [art] Populate DV Done
2,881,488 UART: [fht] FMC Alias Private Key: 7
2,882,606 UART: [art] Derive CDI
2,882,886 UART: [art] Store in slot 0x4
2,968,725 UART: [art] Derive Key Pair
2,969,085 UART: [art] Store priv key in slot 0x5
2,982,639 UART: [art] Derive Key Pair - Done
2,997,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,016 UART: [art] PUB.X = AD3F224F5C28B7265B01E7F91D9F8A12BDC50CA8335725BEDA8655DF9DCEDCAAC4D4FEA787652B6F2B9459B8FA596150
3,020,800 UART: [art] PUB.Y = DCD2775D0B7297440F9970F3D637D93D53F02B7EB873750726DC1D34E287F458730DF0DDD226BD752029E34C77A47A66
3,027,736 UART: [art] SIG.R = CBF60B604C3D3B283DB4796430718DE422090F3AADD37332DA4A4F28E573DAE093F595A39C5BD523476CDFC1D06BBE16
3,034,509 UART: [art] SIG.S = 81ECD2F88A820F86EF5FA343AEC023BCF68B14C03595B649C1BD79514E40E33885B5AD635D1817B6B18AAEFC7B3FAB0E
3,057,623 UART: Caliptra RT
3,057,874 UART: [state] CFI Enabled
3,176,780 UART: [rt] RT listening for mailbox commands...
3,177,450 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,934 UART: [rt]cmd =0x44504543, len=96
3,400,413 >>> mbox cmd response data (6236 bytes)
3,400,414 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,225 UART: [rt]cmd =0x53574545, len=84
3,455,641 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,196 UART: [kat] SHA2-512-ACC
906,097 UART: [kat] ECC-384
915,766 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,339 UART: [cold-reset] ++
1,169,793 UART: [fht] FHT @ 0x50003400
1,172,655 UART: [idev] ++
1,172,823 UART: [idev] CDI.KEYID = 6
1,173,184 UART: [idev] SUBJECT.KEYID = 7
1,173,609 UART: [idev] UDS.KEYID = 0
1,173,955 ready_for_fw is high
1,173,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,900 UART: [idev] Erasing UDS.KEYID = 0
1,199,506 UART: [idev] Sha1 KeyId Algorithm
1,208,254 UART: [idev] --
1,209,289 UART: [ldev] ++
1,209,457 UART: [ldev] CDI.KEYID = 6
1,209,821 UART: [ldev] SUBJECT.KEYID = 5
1,210,248 UART: [ldev] AUTHORITY.KEYID = 7
1,210,711 UART: [ldev] FE.KEYID = 1
1,216,341 UART: [ldev] Erasing FE.KEYID = 1
1,242,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,595 UART: [ldev] --
1,281,868 UART: [fwproc] Wait for Commands...
1,282,517 UART: [fwproc] Recv command 0x46574c44
1,283,250 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,548 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,723 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,112 >>> mbox cmd response: success
2,827,168 UART: [afmc] ++
2,827,336 UART: [afmc] CDI.KEYID = 6
2,827,699 UART: [afmc] SUBJECT.KEYID = 7
2,828,125 UART: [afmc] AUTHORITY.KEYID = 5
2,864,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,328 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,038 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,919 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,620 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,303 UART: [afmc] --
2,907,158 UART: [cold-reset] --
2,907,874 UART: [state] Locking Datavault
2,909,241 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,845 UART: [state] Locking ICCM
2,910,473 UART: [exit] Launching FMC @ 0x40000130
2,915,803 UART:
2,915,819 UART: Running Caliptra FMC ...
2,916,227 UART:
2,916,370 UART: [state] CFI Enabled
2,926,982 UART: [fht] FMC Alias Private Key: 7
3,046,164 UART: [art] Extend RT PCRs Done
3,046,592 UART: [art] Lock RT PCRs Done
3,048,246 UART: [art] Populate DV Done
3,056,551 UART: [fht] FMC Alias Private Key: 7
3,057,495 UART: [art] Derive CDI
3,057,775 UART: [art] Store in slot 0x4
3,143,254 UART: [art] Derive Key Pair
3,143,614 UART: [art] Store priv key in slot 0x5
3,156,942 UART: [art] Derive Key Pair - Done
3,171,905 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,059 UART: [art] PUB.X = A1D8E88819D94818FE5D975D580C4CA7BE6CF53447B62036C456A844290A6BD1405C62DDDB88F4B6E0FED6F642752523
3,194,827 UART: [art] PUB.Y = 4135883FF8E7A3CB8B7064E6C3E3E4AEDD41673FF801C97C8E7A7B9546CC0FAB2C87D3D3E4024254DEDD8DF3116512CA
3,201,784 UART: [art] SIG.R = 7603051F3C45EE153BB8F8AB1007369B1282A2F309649C3C05276F221DA81F2908CE53FD2A81FC8FAFBBE5FFBAA13502
3,208,543 UART: [art] SIG.S = BD1A4BCE061AC8C694410D365BF37275A978A1039C84DE743D47C6A4711D159A153B578B9A08D1F1D5AF903D53CB91F9
3,232,149 UART: Caliptra RT
3,232,492 UART: [state] CFI Enabled
3,351,851 UART: [rt] RT listening for mailbox commands...
3,352,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,061 UART: [rt]cmd =0x44504543, len=96
3,576,572 >>> mbox cmd response data (6236 bytes)
3,576,573 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,276 UART: [rt]cmd =0x53574545, len=84
3,631,864 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,671 ready_for_fw is high
1,059,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,411 >>> mbox cmd response: success
2,739,700 UART:
2,739,716 UART: Running Caliptra FMC ...
2,740,124 UART:
2,740,267 UART: [state] CFI Enabled
2,751,211 UART: [fht] FMC Alias Private Key: 7
2,869,367 UART: [art] Extend RT PCRs Done
2,869,795 UART: [art] Lock RT PCRs Done
2,871,305 UART: [art] Populate DV Done
2,879,502 UART: [fht] FMC Alias Private Key: 7
2,880,652 UART: [art] Derive CDI
2,880,932 UART: [art] Store in slot 0x4
2,966,939 UART: [art] Derive Key Pair
2,967,299 UART: [art] Store priv key in slot 0x5
2,981,131 UART: [art] Derive Key Pair - Done
2,995,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,019 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,784 UART: [art] PUB.X = 3412BEE2422C7E42BC205F3F0AC6824BF5384ABB9BF8A664FF0AF665186F643BED7B2FDEEB23CB663E56AF4175A2E1A8
3,018,568 UART: [art] PUB.Y = E7979E5F34E93AC93938A9BD75A63DBF534CB669D120FAEE97C2B701FB0EA79C9F5B1771F61A0A2E5029F61899BF1A16
3,025,521 UART: [art] SIG.R = 79735DFE32E2B41679FE22FAC8C05E75E5A88E3345AFD4843C4C7D455427CAD4217C168BCFC2817BCEF0AB3674B31E39
3,032,303 UART: [art] SIG.S = FC9C7310D00910FA1B6211020E74B1F29110BDBE25645A446B67EC46C5598D3E2BD4CD7810F606182A626D413E21FC44
3,056,215 UART: Caliptra RT
3,056,558 UART: [state] CFI Enabled
3,176,009 UART: [rt] RT listening for mailbox commands...
3,176,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,025 UART: [rt]cmd =0x44504543, len=96
3,398,958 >>> mbox cmd response data (6236 bytes)
3,398,959 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,428,930 UART: [rt]cmd =0x53574545, len=84
3,454,324 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
893,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,607 UART: [kat] ++
897,759 UART: [kat] sha1
902,167 UART: [kat] SHA2-256
904,107 UART: [kat] SHA2-384
906,794 UART: [kat] SHA2-512-ACC
908,695 UART: [kat] ECC-384
918,412 UART: [kat] HMAC-384Kdf
922,792 UART: [kat] LMS
1,171,120 UART: [kat] --
1,171,795 UART: [cold-reset] ++
1,172,197 UART: [fht] FHT @ 0x50003400
1,174,896 UART: [idev] ++
1,175,064 UART: [idev] CDI.KEYID = 6
1,175,424 UART: [idev] SUBJECT.KEYID = 7
1,175,848 UART: [idev] UDS.KEYID = 0
1,176,193 ready_for_fw is high
1,176,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,880 UART: [idev] Erasing UDS.KEYID = 0
1,201,067 UART: [idev] Sha1 KeyId Algorithm
1,209,723 UART: [idev] --
1,210,847 UART: [ldev] ++
1,211,015 UART: [ldev] CDI.KEYID = 6
1,211,378 UART: [ldev] SUBJECT.KEYID = 5
1,211,804 UART: [ldev] AUTHORITY.KEYID = 7
1,212,267 UART: [ldev] FE.KEYID = 1
1,217,617 UART: [ldev] Erasing FE.KEYID = 1
1,243,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,129 UART: [ldev] --
1,283,448 UART: [fwproc] Wait for Commands...
1,284,158 UART: [fwproc] Recv command 0x46574c44
1,284,886 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,370 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,540 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,915 >>> mbox cmd response: success
2,828,951 UART: [afmc] ++
2,829,119 UART: [afmc] CDI.KEYID = 6
2,829,481 UART: [afmc] SUBJECT.KEYID = 7
2,829,906 UART: [afmc] AUTHORITY.KEYID = 5
2,865,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,120 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,868 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,577 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,460 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,161 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,021 UART: [afmc] --
2,909,063 UART: [cold-reset] --
2,909,889 UART: [state] Locking Datavault
2,911,120 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,724 UART: [state] Locking ICCM
2,912,354 UART: [exit] Launching FMC @ 0x40000130
2,917,684 UART:
2,917,700 UART: Running Caliptra FMC ...
2,918,108 UART:
2,918,162 UART: [state] CFI Enabled
2,928,200 UART: [fht] FMC Alias Private Key: 7
3,046,844 UART: [art] Extend RT PCRs Done
3,047,272 UART: [art] Lock RT PCRs Done
3,049,150 UART: [art] Populate DV Done
3,057,107 UART: [fht] FMC Alias Private Key: 7
3,058,251 UART: [art] Derive CDI
3,058,531 UART: [art] Store in slot 0x4
3,144,514 UART: [art] Derive Key Pair
3,144,874 UART: [art] Store priv key in slot 0x5
3,157,916 UART: [art] Derive Key Pair - Done
3,172,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,772 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,537 UART: [art] PUB.X = 9FB0B8EB9220EC8F292527EF086F714187B66E94E50957A5A5E0B0C2FFE5BDEFD0BB5D92F5EA69CC050764159AFA4C60
3,195,311 UART: [art] PUB.Y = 8EC228C721F0B2046072575678FAB79E043A16D92A9064439FD67B2D9F5DE2B9A3C2059A3D64C7284F07860C20FC37AB
3,202,246 UART: [art] SIG.R = F62E1AC05059B449EA24F77ED9AF7228EB59A79595C6921E94A2665C4D3039A84C72B6BFD87BAE963F888D202CD43810
3,209,020 UART: [art] SIG.S = 568B7D3BFA20EFEE9DA6CE9B2532BB29B0E439119EF8BD3D368C34C169EFB91DAD820AB7EA1378400E168BFB3AB99044
3,233,082 UART: Caliptra RT
3,233,333 UART: [state] CFI Enabled
3,353,398 UART: [rt] RT listening for mailbox commands...
3,354,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,318 UART: [rt]cmd =0x44504543, len=96
3,575,323 >>> mbox cmd response data (6236 bytes)
3,575,324 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,249 UART: [rt]cmd =0x53574545, len=84
3,630,809 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,609 ready_for_fw is high
1,060,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,662 >>> mbox cmd response: success
2,742,131 UART:
2,742,147 UART: Running Caliptra FMC ...
2,742,555 UART:
2,742,609 UART: [state] CFI Enabled
2,753,199 UART: [fht] FMC Alias Private Key: 7
2,872,361 UART: [art] Extend RT PCRs Done
2,872,789 UART: [art] Lock RT PCRs Done
2,874,269 UART: [art] Populate DV Done
2,882,558 UART: [fht] FMC Alias Private Key: 7
2,883,558 UART: [art] Derive CDI
2,883,838 UART: [art] Store in slot 0x4
2,969,789 UART: [art] Derive Key Pair
2,970,149 UART: [art] Store priv key in slot 0x5
2,983,861 UART: [art] Derive Key Pair - Done
2,998,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,042 UART: [art] PUB.X = C9168E16C673E6C704A0EE704FE4A42E11533F007A9AE60258636605C037ABE61E479E9F3EAD4A553EA0EE3B5AA1BF91
3,021,791 UART: [art] PUB.Y = F9CE9DDFFB592A3E393EF01D9B847B5404817B71E5170E4060653E0B7D7E45AF325FDC5C87AFB97AF37330D358129327
3,028,738 UART: [art] SIG.R = CBCC79DC0D22C3FE646DA7BA67D0DC5B573F74E5B2164808B3C5B24814539A571B680A7365484BF5264887E369D8961B
3,035,501 UART: [art] SIG.S = 7850B955AFCE9231D7FE57A3BE67D69180DB8087B4AFED708162CE6DD2AB4413F432AA18C53D480ADA3537B9BB3CEAC5
3,059,764 UART: Caliptra RT
3,060,015 UART: [state] CFI Enabled
3,179,748 UART: [rt] RT listening for mailbox commands...
3,180,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,182 UART: [rt]cmd =0x44504543, len=96
3,403,195 >>> mbox cmd response data (6236 bytes)
3,403,196 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,175 UART: [rt]cmd =0x53574545, len=84
3,459,435 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
893,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,626 UART: [kat] ++
897,778 UART: [kat] sha1
902,056 UART: [kat] SHA2-256
903,996 UART: [kat] SHA2-384
906,817 UART: [kat] SHA2-512-ACC
908,718 UART: [kat] ECC-384
918,261 UART: [kat] HMAC-384Kdf
922,905 UART: [kat] LMS
1,171,233 UART: [kat] --
1,172,194 UART: [cold-reset] ++
1,172,714 UART: [fht] FHT @ 0x50003400
1,175,503 UART: [idev] ++
1,175,671 UART: [idev] CDI.KEYID = 6
1,176,031 UART: [idev] SUBJECT.KEYID = 7
1,176,455 UART: [idev] UDS.KEYID = 0
1,176,800 ready_for_fw is high
1,176,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,897 UART: [idev] Erasing UDS.KEYID = 0
1,202,826 UART: [idev] Sha1 KeyId Algorithm
1,211,398 UART: [idev] --
1,212,328 UART: [ldev] ++
1,212,496 UART: [ldev] CDI.KEYID = 6
1,212,859 UART: [ldev] SUBJECT.KEYID = 5
1,213,285 UART: [ldev] AUTHORITY.KEYID = 7
1,213,748 UART: [ldev] FE.KEYID = 1
1,218,954 UART: [ldev] Erasing FE.KEYID = 1
1,245,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,042 UART: [ldev] --
1,285,507 UART: [fwproc] Wait for Commands...
1,286,167 UART: [fwproc] Recv command 0x46574c44
1,286,895 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,659,235 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,405 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,620 >>> mbox cmd response: success
2,831,658 UART: [afmc] ++
2,831,826 UART: [afmc] CDI.KEYID = 6
2,832,188 UART: [afmc] SUBJECT.KEYID = 7
2,832,613 UART: [afmc] AUTHORITY.KEYID = 5
2,868,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,673 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,891,382 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,897,265 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,966 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,954 UART: [afmc] --
2,911,988 UART: [cold-reset] --
2,912,990 UART: [state] Locking Datavault
2,914,181 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,785 UART: [state] Locking ICCM
2,915,225 UART: [exit] Launching FMC @ 0x40000130
2,920,555 UART:
2,920,571 UART: Running Caliptra FMC ...
2,920,979 UART:
2,921,122 UART: [state] CFI Enabled
2,932,154 UART: [fht] FMC Alias Private Key: 7
3,050,888 UART: [art] Extend RT PCRs Done
3,051,316 UART: [art] Lock RT PCRs Done
3,052,702 UART: [art] Populate DV Done
3,060,721 UART: [fht] FMC Alias Private Key: 7
3,061,809 UART: [art] Derive CDI
3,062,089 UART: [art] Store in slot 0x4
3,147,692 UART: [art] Derive Key Pair
3,148,052 UART: [art] Store priv key in slot 0x5
3,161,224 UART: [art] Derive Key Pair - Done
3,176,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,687 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,452 UART: [art] PUB.X = 98FD269F0749FE2370E7CFF85B42AB636D8446C59A5E7D5A42285D39E78598D617A29813F50AF9EACB05393BE432B9A0
3,199,217 UART: [art] PUB.Y = FD171A3B1F9DAA597A6D58F5F2DD5E73EC46999BD25FFF62C559445A62A8D17932217FB24D7D9A26D74A50F867067F0E
3,206,171 UART: [art] SIG.R = 4F010CEB89D0BC2B10C5BC0A5BDE00340838E8904A4655E830D653240545412991DAECE58E3209D63487E3E32F08362B
3,212,896 UART: [art] SIG.S = B548A547590A1B8FA020A95529A6A3A6F2BB0F39BC05E4E210AFCC1F2B12041B6A24E7A0BC5D8B231ACBB14482CC98BD
3,236,640 UART: Caliptra RT
3,236,983 UART: [state] CFI Enabled
3,357,650 UART: [rt] RT listening for mailbox commands...
3,358,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,834 UART: [rt]cmd =0x44504543, len=96
3,581,519 >>> mbox cmd response data (6236 bytes)
3,581,520 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,523 UART: [rt]cmd =0x53574545, len=84
3,636,949 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,412 ready_for_fw is high
1,060,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,937 >>> mbox cmd response: success
2,741,586 UART:
2,741,602 UART: Running Caliptra FMC ...
2,742,010 UART:
2,742,153 UART: [state] CFI Enabled
2,752,569 UART: [fht] FMC Alias Private Key: 7
2,871,309 UART: [art] Extend RT PCRs Done
2,871,737 UART: [art] Lock RT PCRs Done
2,873,423 UART: [art] Populate DV Done
2,881,632 UART: [fht] FMC Alias Private Key: 7
2,882,784 UART: [art] Derive CDI
2,883,064 UART: [art] Store in slot 0x4
2,968,969 UART: [art] Derive Key Pair
2,969,329 UART: [art] Store priv key in slot 0x5
2,982,635 UART: [art] Derive Key Pair - Done
2,997,544 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,292 UART: [art] PUB.X = 36767F9ED2D886B2EA58875F23DC4F9146AE1AFE63F68E3596A1740EAFA174CF13160FC171371F3BECFBC7C9CDB60D8A
3,021,071 UART: [art] PUB.Y = F926059E417A25F3E04B2A14010468B61CF7A69BAA9B8206BA14E2CA78596F7EB8B8D04A6C36B21533BCED01C24666E1
3,028,012 UART: [art] SIG.R = 10FE4F6368D49504A0494E7915C4BA9FEC694F001E524DF9C1C528172E53BC396CFCFEC8EA5B822D82924C7FCD158A5C
3,034,769 UART: [art] SIG.S = 1DD188A98C99046E048916E1B466914C660C1A72B954709036E28B229DE46CEC8A5B9A9BBEA47F57E036D3FCB7CEC8DB
3,059,060 UART: Caliptra RT
3,059,403 UART: [state] CFI Enabled
3,178,809 UART: [rt] RT listening for mailbox commands...
3,179,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,613 UART: [rt]cmd =0x44504543, len=96
3,400,700 >>> mbox cmd response data (6236 bytes)
3,400,701 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,584 UART: [rt]cmd =0x53574545, len=84
3,456,718 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
191,962 UART:
192,326 UART: Running Caliptra ROM ...
193,472 UART:
193,621 UART: [state] CFI Enabled
268,411 UART: [state] LifecycleState = Unprovisioned
270,364 UART: [state] DebugLocked = No
273,118 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,141 UART: [kat] SHA2-256
447,827 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,378 UART: [kat] ++
458,857 UART: [kat] sha1
469,519 UART: [kat] SHA2-256
472,176 UART: [kat] SHA2-384
478,169 UART: [kat] SHA2-512-ACC
480,536 UART: [kat] ECC-384
2,769,050 UART: [kat] HMAC-384Kdf
2,800,894 UART: [kat] LMS
3,991,203 UART: [kat] --
3,996,217 UART: [cold-reset] ++
3,997,869 UART: [fht] Storing FHT @ 0x50003400
4,009,558 UART: [idev] ++
4,010,134 UART: [idev] CDI.KEYID = 6
4,011,068 UART: [idev] SUBJECT.KEYID = 7
4,012,322 UART: [idev] UDS.KEYID = 0
4,013,430 ready_for_fw is high
4,013,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,797 UART: [idev] Erasing UDS.KEYID = 0
7,347,592 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,813 UART: [idev] --
7,372,643 UART: [ldev] ++
7,373,260 UART: [ldev] CDI.KEYID = 6
7,374,145 UART: [ldev] SUBJECT.KEYID = 5
7,375,413 UART: [ldev] AUTHORITY.KEYID = 7
7,376,640 UART: [ldev] FE.KEYID = 1
7,424,321 UART: [ldev] Erasing FE.KEYID = 1
10,760,790 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,600 UART: [ldev] --
13,137,679 UART: [fwproc] Waiting for Commands...
13,140,366 UART: [fwproc] Received command 0x46574c44
13,142,546 UART: [fwproc] Received Image of size 118548 bytes
17,255,721 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,333,293 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,406,471 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,735,595 >>> mbox cmd response: success
17,739,075 UART: [afmc] ++
17,739,693 UART: [afmc] CDI.KEYID = 6
17,740,583 UART: [afmc] SUBJECT.KEYID = 7
17,741,854 UART: [afmc] AUTHORITY.KEYID = 5
21,114,766 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,413,587 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,415,868 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,430,328 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,445,024 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,459,456 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,480,958 UART: [afmc] --
23,485,672 UART: [cold-reset] --
23,490,460 UART: [state] Locking Datavault
23,494,734 UART: [state] Locking PCR0, PCR1 and PCR31
23,496,489 UART: [state] Locking ICCM
23,499,067 UART: [exit] Launching FMC @ 0x40000130
23,507,469 UART:
23,507,705 UART: Running Caliptra FMC ...
23,508,805 UART:
23,508,964 UART: [state] CFI Enabled
23,573,582 UART: [fht] FMC Alias Private Key: 7
25,913,639 UART: [art] Extend RT PCRs Done
25,914,880 UART: [art] Lock RT PCRs Done
25,916,269 UART: [art] Populate DV Done
25,921,683 UART: [fht] FMC Alias Private Key: 7
25,923,165 UART: [art] Derive CDI
25,923,900 UART: [art] Store in slot 0x4
25,982,179 UART: [art] Derive Key Pair
25,983,217 UART: [art] Store priv key in slot 0x5
29,276,221 UART: [art] Derive Key Pair - Done
29,289,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,577,733 UART: [art] Erasing AUTHORITY.KEYID = 7
31,579,239 UART: [art] PUB.X = 19C4541CE07166897C767509807FFA6D31CFDDD720C58596E89704D01DC767D86650D73AAD996484681CB9545D250BFF
31,586,507 UART: [art] PUB.Y = 92F99872DAA7356F3609D59C478DC1B2FA955894CD388F1AC785553556747BC1F125F7703E9AE04126A8C259DCE44A2D
31,593,760 UART: [art] SIG.R = BDC9CA1CE30C934AC485D406477AB91EC21F450FC9787C7631E2DB5456A7EDF8BDD41419FCE9D825E85510E4542A12AC
31,601,122 UART: [art] SIG.S = 549BEDD3CFB13358B305562828AB52ADFF9AE93843028921C1848724847EA9CC2FDC98F3B88C04B7203EC71C167FABDF
32,906,835 UART: Caliptra RT
32,907,553 UART: [state] CFI Enabled
33,103,138 UART: [rt] RT listening for mailbox commands...
33,105,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,136,113 UART: [rt]cmd =0x44504543, len=96
38,905,243 >>> mbox cmd response data (6236 bytes)
38,934,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,965,383 UART: [rt]cmd =0x44504543, len=96
38,996,620 >>> mbox cmd response data (56 bytes)
38,997,401 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,027,315 UART: [rt]cmd =0x52564348, len=36
39,030,235 >>> mbox cmd response data (8 bytes)
39,030,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,061,160 UART: [rt]cmd =0x44504543, len=96
44,833,953 >>> mbox cmd response data (6236 bytes)
44,862,956 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,893,506 UART: [rt]cmd =0x53574545, len=84
50,480,757 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
3,806,750 ready_for_fw is high
3,807,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,938,198 >>> mbox cmd response: success
23,624,861 UART:
23,625,287 UART: Running Caliptra FMC ...
23,626,422 UART:
23,626,584 UART: [state] CFI Enabled
23,693,607 UART: [fht] FMC Alias Private Key: 7
26,034,351 UART: [art] Extend RT PCRs Done
26,035,589 UART: [art] Lock RT PCRs Done
26,036,949 UART: [art] Populate DV Done
26,042,155 UART: [fht] FMC Alias Private Key: 7
26,043,701 UART: [art] Derive CDI
26,044,521 UART: [art] Store in slot 0x4
26,104,153 UART: [art] Derive Key Pair
26,105,155 UART: [art] Store priv key in slot 0x5
29,398,102 UART: [art] Derive Key Pair - Done
29,411,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,699,067 UART: [art] Erasing AUTHORITY.KEYID = 7
31,700,599 UART: [art] PUB.X = 98C591654BA54C3F864D94943E7A2F1FA763F8602DA84B10FC1FABC7ED506F2DA9DA5F84CE4052A6AA87C5590412B251
31,707,809 UART: [art] PUB.Y = 3A1E040951BB8496B3DBF82B785FD07DA7270EE9911BA5A5F8FB37A71115A11B5EEE906A1ABF2E2496C64F53137DAD9B
31,715,098 UART: [art] SIG.R = EC42D4CB581E2C5A3277DDB63CA3BA4706CA3203884C649315C569237612238BDAE8581B466BBDF2BAFAF079157F98F3
31,722,504 UART: [art] SIG.S = 03F22A6C53D621C06A3A807AA5CE1A7AF8131398F4FC185D282584C716ADEDEFF388332DEFD67DEB3363AF4AB6FC5F6D
33,027,707 UART: Caliptra RT
33,028,416 UART: [state] CFI Enabled
33,204,223 UART: [rt] RT listening for mailbox commands...
33,206,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,237,348 UART: [rt]cmd =0x44504543, len=96
39,005,733 >>> mbox cmd response data (6236 bytes)
39,034,929 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,065,555 UART: [rt]cmd =0x44504543, len=96
39,097,932 >>> mbox cmd response data (56 bytes)
39,098,692 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,128,403 UART: [rt]cmd =0x52564348, len=36
39,131,421 >>> mbox cmd response data (8 bytes)
39,131,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,162,430 UART: [rt]cmd =0x44504543, len=96
44,932,320 >>> mbox cmd response data (6236 bytes)
44,961,141 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,991,632 UART: [rt]cmd =0x53574545, len=84
50,577,999 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,517 UART:
192,882 UART: Running Caliptra ROM ...
194,071 UART:
603,841 UART: [state] CFI Enabled
618,598 UART: [state] LifecycleState = Unprovisioned
620,477 UART: [state] DebugLocked = No
622,745 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,409 UART: [kat] SHA2-256
798,131 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,711 UART: [kat] ++
809,191 UART: [kat] sha1
820,058 UART: [kat] SHA2-256
822,772 UART: [kat] SHA2-384
827,401 UART: [kat] SHA2-512-ACC
829,775 UART: [kat] ECC-384
3,114,830 UART: [kat] HMAC-384Kdf
3,126,776 UART: [kat] LMS
4,316,827 UART: [kat] --
4,319,393 UART: [cold-reset] ++
4,321,459 UART: [fht] Storing FHT @ 0x50003400
4,333,708 UART: [idev] ++
4,334,267 UART: [idev] CDI.KEYID = 6
4,335,325 UART: [idev] SUBJECT.KEYID = 7
4,336,422 UART: [idev] UDS.KEYID = 0
4,337,480 ready_for_fw is high
4,337,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,911 UART: [idev] Erasing UDS.KEYID = 0
7,624,384 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,735 UART: [idev] --
7,649,894 UART: [ldev] ++
7,650,461 UART: [ldev] CDI.KEYID = 6
7,651,422 UART: [ldev] SUBJECT.KEYID = 5
7,652,680 UART: [ldev] AUTHORITY.KEYID = 7
7,653,902 UART: [ldev] FE.KEYID = 1
7,665,526 UART: [ldev] Erasing FE.KEYID = 1
10,950,350 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,001 UART: [ldev] --
13,308,724 UART: [fwproc] Waiting for Commands...
13,311,676 UART: [fwproc] Received command 0x46574c44
13,313,848 UART: [fwproc] Received Image of size 118548 bytes
17,424,684 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,354 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,538 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,897,395 >>> mbox cmd response: success
17,901,976 UART: [afmc] ++
17,902,612 UART: [afmc] CDI.KEYID = 6
17,903,520 UART: [afmc] SUBJECT.KEYID = 7
17,904,728 UART: [afmc] AUTHORITY.KEYID = 5
21,219,892 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,512,974 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,515,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,529,659 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,544,369 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,558,783 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,640 UART: [afmc] --
23,585,370 UART: [cold-reset] --
23,587,759 UART: [state] Locking Datavault
23,592,739 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,489 UART: [state] Locking ICCM
23,596,362 UART: [exit] Launching FMC @ 0x40000130
23,604,753 UART:
23,604,988 UART: Running Caliptra FMC ...
23,606,085 UART:
23,606,248 UART: [state] CFI Enabled
23,614,101 UART: [fht] FMC Alias Private Key: 7
25,954,357 UART: [art] Extend RT PCRs Done
25,955,586 UART: [art] Lock RT PCRs Done
25,957,288 UART: [art] Populate DV Done
25,962,883 UART: [fht] FMC Alias Private Key: 7
25,964,419 UART: [art] Derive CDI
25,965,171 UART: [art] Store in slot 0x4
26,008,026 UART: [art] Derive Key Pair
26,009,076 UART: [art] Store priv key in slot 0x5
29,251,526 UART: [art] Derive Key Pair - Done
29,264,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,412 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,921 UART: [art] PUB.X = 1FAACF9DD967AFE70B0482C2813A1A8B510EE2895CF75C469C482DDCDA5ADE735328B6C68BE9C145AC896B01081A9B7A
31,553,237 UART: [art] PUB.Y = CD2CEFA3F69855BFE21B740D8D4D4E9DB016153C1805AD70D38C922F01116B94C1C32CB6A461685304982D662214C64C
31,560,475 UART: [art] SIG.R = 80219CEF30EA094F655C897FEE466633CD83D1AC4EA69F7DA7040927B44311A11A4F154DC9C84B850FCAE61ABF2DD92D
31,567,872 UART: [art] SIG.S = 186208379FD8FE948D1897766422843A2F5945628990352F403CF690A5E1BA7D084EEECB0B6D95A6DD5DBBE27DE6FF51
32,872,954 UART: Caliptra RT
32,873,656 UART: [state] CFI Enabled
33,006,759 UART: [rt] RT listening for mailbox commands...
33,008,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,039,568 UART: [rt]cmd =0x44504543, len=96
38,713,747 >>> mbox cmd response data (6236 bytes)
38,743,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,773,954 UART: [rt]cmd =0x44504543, len=96
38,806,072 >>> mbox cmd response data (56 bytes)
38,806,849 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,836,864 UART: [rt]cmd =0x52564348, len=36
38,839,993 >>> mbox cmd response data (8 bytes)
38,840,559 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,870,899 UART: [rt]cmd =0x44504543, len=96
44,545,917 >>> mbox cmd response data (6236 bytes)
44,574,717 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,605,189 UART: [rt]cmd =0x53574545, len=84
50,130,462 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,123,267 ready_for_fw is high
4,123,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,388 >>> mbox cmd response: success
23,795,337 UART:
23,795,725 UART: Running Caliptra FMC ...
23,796,838 UART:
23,796,998 UART: [state] CFI Enabled
23,805,042 UART: [fht] FMC Alias Private Key: 7
26,144,951 UART: [art] Extend RT PCRs Done
26,146,193 UART: [art] Lock RT PCRs Done
26,147,770 UART: [art] Populate DV Done
26,153,196 UART: [fht] FMC Alias Private Key: 7
26,154,728 UART: [art] Derive CDI
26,155,498 UART: [art] Store in slot 0x4
26,198,458 UART: [art] Derive Key Pair
26,199,456 UART: [art] Store priv key in slot 0x5
29,441,659 UART: [art] Derive Key Pair - Done
29,454,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,779 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,280 UART: [art] PUB.X = 871C86B78E25A8782D64D31143C015F07A8B4B72C848BCD7BE2B218C9AA73B249387F283D6DAE31575575869C7ADE83A
31,743,537 UART: [art] PUB.Y = 7BEEF76C47A186E9B39200750E964921F6C9A7491F929A26D2ED52453E76386EE3A060011EF4760290490ECC3A273332
31,750,879 UART: [art] SIG.R = BB818283A31B245E3A192930E6DB4434D97B9C37492654D28F9291B79783294320B63E306B3C93D09762ED7EC44AFF24
31,758,137 UART: [art] SIG.S = 74A270346FB8AB6ED3CD2A651ABF7F28C65C31B53A6B02423305BE56C739DA378A205BF1153C7B03E43383B89734454D
33,063,046 UART: Caliptra RT
33,063,766 UART: [state] CFI Enabled
33,197,391 UART: [rt] RT listening for mailbox commands...
33,199,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,230,049 UART: [rt]cmd =0x44504543, len=96
38,904,593 >>> mbox cmd response data (6236 bytes)
38,933,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,964,529 UART: [rt]cmd =0x44504543, len=96
38,996,111 >>> mbox cmd response data (56 bytes)
38,996,834 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,026,799 UART: [rt]cmd =0x52564348, len=36
39,029,875 >>> mbox cmd response data (8 bytes)
39,030,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,061,080 UART: [rt]cmd =0x44504543, len=96
44,735,231 >>> mbox cmd response data (6236 bytes)
44,764,056 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,794,439 UART: [rt]cmd =0x53574545, len=84
50,319,173 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,304 UART:
192,696 UART: Running Caliptra ROM ...
194,015 UART:
194,176 UART: [state] CFI Enabled
262,395 UART: [state] LifecycleState = Unprovisioned
264,338 UART: [state] DebugLocked = No
265,573 UART: [state] WD Timer not started. Device not locked for debugging
268,837 UART: [kat] SHA2-256
448,452 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,269 UART: [kat] ++
459,747 UART: [kat] sha1
471,186 UART: [kat] SHA2-256
473,842 UART: [kat] SHA2-384
480,042 UART: [kat] SHA2-512-ACC
482,410 UART: [kat] ECC-384
2,928,606 UART: [kat] HMAC-384Kdf
2,941,479 UART: [kat] LMS
3,417,917 UART: [kat] --
3,422,853 UART: [cold-reset] ++
3,423,860 UART: [fht] FHT @ 0x50003400
3,436,040 UART: [idev] ++
3,436,679 UART: [idev] CDI.KEYID = 6
3,437,594 UART: [idev] SUBJECT.KEYID = 7
3,438,832 UART: [idev] UDS.KEYID = 0
3,439,755 ready_for_fw is high
3,439,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,589,187 UART: [idev] Erasing UDS.KEYID = 0
5,960,116 UART: [idev] Sha1 KeyId Algorithm
5,982,867 UART: [idev] --
5,987,401 UART: [ldev] ++
5,987,968 UART: [ldev] CDI.KEYID = 6
5,988,985 UART: [ldev] SUBJECT.KEYID = 5
5,990,089 UART: [ldev] AUTHORITY.KEYID = 7
5,991,393 UART: [ldev] FE.KEYID = 1
6,028,717 UART: [ldev] Erasing FE.KEYID = 1
8,535,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,269,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,285,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,301,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,316,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,338,021 UART: [ldev] --
10,343,771 UART: [fwproc] Wait for Commands...
10,345,759 UART: [fwproc] Recv command 0x46574c44
10,347,797 UART: [fwproc] Recv'd Img size: 118548 bytes
13,833,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,912,382 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,985,448 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,313,819 >>> mbox cmd response: success
14,318,705 UART: [afmc] ++
14,319,341 UART: [afmc] CDI.KEYID = 6
14,320,257 UART: [afmc] SUBJECT.KEYID = 7
14,321,469 UART: [afmc] AUTHORITY.KEYID = 5
16,863,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,588,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,591,058 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,606,876 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,622,922 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,638,472 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,663,080 UART: [afmc] --
18,667,483 UART: [cold-reset] --
18,670,205 UART: [state] Locking Datavault
18,674,330 UART: [state] Locking PCR0, PCR1 and PCR31
18,676,069 UART: [state] Locking ICCM
18,678,790 UART: [exit] Launching FMC @ 0x40000130
18,687,184 UART:
18,687,434 UART: Running Caliptra FMC ...
18,688,458 UART:
18,688,601 UART: [state] CFI Enabled
18,744,739 UART: [fht] FMC Alias Private Key: 7
20,510,946 UART: [art] Extend RT PCRs Done
20,512,175 UART: [art] Lock RT PCRs Done
20,513,820 UART: [art] Populate DV Done
20,519,312 UART: [fht] FMC Alias Private Key: 7
20,520,807 UART: [art] Derive CDI
20,521,565 UART: [art] Store in slot 0x4
20,577,402 UART: [art] Derive Key Pair
20,578,400 UART: [art] Store priv key in slot 0x5
23,041,584 UART: [art] Derive Key Pair - Done
23,054,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,768,004 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,493 UART: [art] PUB.X = 31AADA9DEA346246C81362D3BBD3323387F8DE09589F645374BF80B307952848F5CE4CCCDCCC68C4700D44AD1EB9951D
24,776,763 UART: [art] PUB.Y = E8506055EA5C6A5352023433055B00CF941FD3E04DEEC982C9F1869054BE173B1E1926D5D94158CF7014EA8234535641
24,783,996 UART: [art] SIG.R = 208D00E589A44E9E6D949C49FEC0DABDF79F7BD730777964BE5368AB416B17F82608E94207E0600AFAF04FE4538D7093
24,791,338 UART: [art] SIG.S = CEBD986B84F5051E4E80788D83E51FDEF5EB3D7C1FE443CDA8B8954D9F84BA7129AFB6BBC579F07C017EA48990BD4FEE
25,769,823 UART: Caliptra RT
25,770,541 UART: [state] CFI Enabled
25,951,007 UART: [rt] RT listening for mailbox commands...
25,953,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,984,200 UART: [rt]cmd =0x44504543, len=96
30,349,290 >>> mbox cmd response data (6236 bytes)
30,378,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,409,340 UART: [rt]cmd =0x44504543, len=96
30,441,176 >>> mbox cmd response data (56 bytes)
30,441,955 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,471,925 UART: [rt]cmd =0x52564348, len=36
30,475,055 >>> mbox cmd response data (8 bytes)
30,475,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,506,180 UART: [rt]cmd =0x44504543, len=96
34,871,922 >>> mbox cmd response data (6236 bytes)
34,900,728 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,931,327 UART: [rt]cmd =0x53574545, len=84
39,110,844 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,458,778 ready_for_fw is high
3,459,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,242,633 >>> mbox cmd response: success
18,531,226 UART:
18,531,607 UART: Running Caliptra FMC ...
18,532,703 UART:
18,532,856 UART: [state] CFI Enabled
18,600,821 UART: [fht] FMC Alias Private Key: 7
20,367,527 UART: [art] Extend RT PCRs Done
20,368,749 UART: [art] Lock RT PCRs Done
20,370,314 UART: [art] Populate DV Done
20,375,896 UART: [fht] FMC Alias Private Key: 7
20,377,438 UART: [art] Derive CDI
20,378,249 UART: [art] Store in slot 0x4
20,433,933 UART: [art] Derive Key Pair
20,434,991 UART: [art] Store priv key in slot 0x5
22,898,105 UART: [art] Derive Key Pair - Done
22,911,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,671 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,172 UART: [art] PUB.X = 568806020918535AE6774DE3D02700CD7F8D248CE0B037AE91DF69467E75F1A8EEA91F9E8C4AC654AAADD8CCAE14A3F8
24,633,436 UART: [art] PUB.Y = A797FD1EF136E8CD8870CD8205C6C8F76E1303273F5915CA540FED8FF1A1B6C9168CBAB0AC884665413249324A7A8472
24,640,681 UART: [art] SIG.R = 42E000D40D991A2CD200412BF3CFC781EC2DB0596C7E98E95755D0B2FEE4DA9648EA6E5AE1A61987277CC25798D05884
24,648,029 UART: [art] SIG.S = 7B822C45D4FA5882398B1BB51E5CF3695D0BBA38C1CE36B13E5874CAE21F3C5C31E367454E65C8AAAB86D099CA8DECBA
25,626,865 UART: Caliptra RT
25,627,566 UART: [state] CFI Enabled
25,807,095 UART: [rt] RT listening for mailbox commands...
25,809,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,839,978 UART: [rt]cmd =0x44504543, len=96
30,204,913 >>> mbox cmd response data (6236 bytes)
30,234,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,264,845 UART: [rt]cmd =0x44504543, len=96
30,296,328 >>> mbox cmd response data (56 bytes)
30,297,050 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,326,971 UART: [rt]cmd =0x52564348, len=36
30,330,214 >>> mbox cmd response data (8 bytes)
30,330,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,361,363 UART: [rt]cmd =0x44504543, len=96
34,727,786 >>> mbox cmd response data (6236 bytes)
34,756,781 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,787,224 UART: [rt]cmd =0x53574545, len=84
38,966,259 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,401 UART:
192,785 UART: Running Caliptra ROM ...
193,975 UART:
603,653 UART: [state] CFI Enabled
618,049 UART: [state] LifecycleState = Unprovisioned
619,932 UART: [state] DebugLocked = No
621,322 UART: [state] WD Timer not started. Device not locked for debugging
625,878 UART: [kat] SHA2-256
805,561 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,364 UART: [kat] ++
816,898 UART: [kat] sha1
826,801 UART: [kat] SHA2-256
829,527 UART: [kat] SHA2-384
834,951 UART: [kat] SHA2-512-ACC
837,322 UART: [kat] ECC-384
3,278,293 UART: [kat] HMAC-384Kdf
3,291,171 UART: [kat] LMS
3,767,647 UART: [kat] --
3,770,511 UART: [cold-reset] ++
3,772,797 UART: [fht] FHT @ 0x50003400
3,784,057 UART: [idev] ++
3,784,631 UART: [idev] CDI.KEYID = 6
3,785,666 UART: [idev] SUBJECT.KEYID = 7
3,786,842 UART: [idev] UDS.KEYID = 0
3,787,776 ready_for_fw is high
3,787,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,290 UART: [idev] Erasing UDS.KEYID = 0
6,264,872 UART: [idev] Sha1 KeyId Algorithm
6,287,522 UART: [idev] --
6,292,765 UART: [ldev] ++
6,293,337 UART: [ldev] CDI.KEYID = 6
6,294,251 UART: [ldev] SUBJECT.KEYID = 5
6,295,469 UART: [ldev] AUTHORITY.KEYID = 7
6,296,725 UART: [ldev] FE.KEYID = 1
6,307,433 UART: [ldev] Erasing FE.KEYID = 1
8,790,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,420 UART: [ldev] --
10,585,686 UART: [fwproc] Wait for Commands...
10,588,918 UART: [fwproc] Recv command 0x46574c44
10,590,905 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,137 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,164 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,989 >>> mbox cmd response: success
14,556,176 UART: [afmc] ++
14,556,806 UART: [afmc] CDI.KEYID = 6
14,557,722 UART: [afmc] SUBJECT.KEYID = 7
14,558,945 UART: [afmc] AUTHORITY.KEYID = 5
17,063,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,934 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,800,626 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,661 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,243 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,388 UART: [afmc] --
18,860,795 UART: [cold-reset] --
18,864,986 UART: [state] Locking Datavault
18,869,988 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,702 UART: [state] Locking ICCM
18,872,993 UART: [exit] Launching FMC @ 0x40000130
18,881,396 UART:
18,881,663 UART: Running Caliptra FMC ...
18,882,773 UART:
18,882,937 UART: [state] CFI Enabled
18,891,095 UART: [fht] FMC Alias Private Key: 7
20,656,967 UART: [art] Extend RT PCRs Done
20,658,186 UART: [art] Lock RT PCRs Done
20,659,487 UART: [art] Populate DV Done
20,664,745 UART: [fht] FMC Alias Private Key: 7
20,666,290 UART: [art] Derive CDI
20,667,106 UART: [art] Store in slot 0x4
20,709,224 UART: [art] Derive Key Pair
20,710,266 UART: [art] Store priv key in slot 0x5
23,137,583 UART: [art] Derive Key Pair - Done
23,150,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,584 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,086 UART: [art] PUB.X = DEF11FBCE19B027739F940FD01B64F7811DB15AB420320038E030D47062C391FE02785A1607CE46A73F8A74A42155F56
24,865,414 UART: [art] PUB.Y = 9304C1B49A6DC7D867A7358F795F0BD421D2D452DA92176B72746E2F6714EA98095E92BEC22C6E6EB1B201CCDD0D0864
24,872,598 UART: [art] SIG.R = DD191FD7438C9662D1D11D49FF83FA33D2A688D1A451EB5DCE02FE0EBAB51F18BD3EE16746BA4B951CD5E61488C24347
24,880,003 UART: [art] SIG.S = F84154C041406C7D9D01BB1613D7A59600725F60223114DF4246BB22512E5730894019B278FAF539A357245D61147DE7
25,858,948 UART: Caliptra RT
25,859,668 UART: [state] CFI Enabled
25,991,709 UART: [rt] RT listening for mailbox commands...
25,994,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,024,970 UART: [rt]cmd =0x44504543, len=96
30,310,326 >>> mbox cmd response data (6236 bytes)
30,339,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,370,267 UART: [rt]cmd =0x44504543, len=96
30,401,136 >>> mbox cmd response data (56 bytes)
30,401,913 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,431,724 UART: [rt]cmd =0x52564348, len=36
30,434,586 >>> mbox cmd response data (8 bytes)
30,435,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,465,630 UART: [rt]cmd =0x44504543, len=96
34,751,275 >>> mbox cmd response data (6236 bytes)
34,780,084 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,810,572 UART: [rt]cmd =0x53574545, len=84
38,946,829 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,575 writing to cptra_bootfsm_go
3,780,695 ready_for_fw is high
3,781,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,962 >>> mbox cmd response: success
18,699,068 UART:
18,699,469 UART: Running Caliptra FMC ...
18,700,604 UART:
18,700,768 UART: [state] CFI Enabled
18,708,505 UART: [fht] FMC Alias Private Key: 7
20,475,045 UART: [art] Extend RT PCRs Done
20,476,280 UART: [art] Lock RT PCRs Done
20,477,747 UART: [art] Populate DV Done
20,483,075 UART: [fht] FMC Alias Private Key: 7
20,484,838 UART: [art] Derive CDI
20,485,659 UART: [art] Store in slot 0x4
20,528,322 UART: [art] Derive Key Pair
20,529,326 UART: [art] Store priv key in slot 0x5
22,956,866 UART: [art] Derive Key Pair - Done
22,969,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,280 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,762 UART: [art] PUB.X = 519A77AD9D77C236B4511976F5B1CFBBBD1E7508F11F3DC97B9F2A3D0A400AF73BCE6213C4B88AE38C902F6FB6E74E3F
24,685,077 UART: [art] PUB.Y = 32CA2CA0170E7B368DDB835A7FCC26636BA07DE01113D849138AC720657AF248014F911C489EAAA9CEE66C1E631E4F2E
24,692,338 UART: [art] SIG.R = FB1065073FE813D2E15C376098E7627A0C8FB97DE71DCCBA760E7D34960878E642A9C43ADE29E0C916A06CB501F2ACB3
24,699,688 UART: [art] SIG.S = EB6286A4CBD5068DA1F8CD030DD69929DBBA720A30BE9AA704648E69BFE25BB568EE1E195503E330C0D69C925638C708
25,678,722 UART: Caliptra RT
25,679,442 UART: [state] CFI Enabled
25,812,434 UART: [rt] RT listening for mailbox commands...
25,814,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,845,385 UART: [rt]cmd =0x44504543, len=96
30,130,993 >>> mbox cmd response data (6236 bytes)
30,160,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,191,134 UART: [rt]cmd =0x44504543, len=96
30,223,057 >>> mbox cmd response data (56 bytes)
30,223,790 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,253,923 UART: [rt]cmd =0x52564348, len=36
30,257,090 >>> mbox cmd response data (8 bytes)
30,257,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,287,973 UART: [rt]cmd =0x44504543, len=96
34,574,008 >>> mbox cmd response data (6236 bytes)
34,602,817 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,633,139 UART: [rt]cmd =0x53574545, len=84
38,768,966 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,177 UART:
192,544 UART: Running Caliptra ROM ...
193,740 UART:
193,900 UART: [state] CFI Enabled
261,809 UART: [state] LifecycleState = Unprovisioned
264,215 UART: [state] DebugLocked = No
266,816 UART: [state] WD Timer not started. Device not locked for debugging
271,272 UART: [kat] SHA2-256
461,203 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,941 UART: [kat] ++
472,414 UART: [kat] sha1
483,925 UART: [kat] SHA2-256
486,937 UART: [kat] SHA2-384
492,571 UART: [kat] SHA2-512-ACC
495,148 UART: [kat] ECC-384
2,945,349 UART: [kat] HMAC-384Kdf
2,970,954 UART: [kat] LMS
3,502,696 UART: [kat] --
3,507,612 UART: [cold-reset] ++
3,509,108 UART: [fht] FHT @ 0x50003400
3,521,359 UART: [idev] ++
3,522,064 UART: [idev] CDI.KEYID = 6
3,523,045 UART: [idev] SUBJECT.KEYID = 7
3,524,218 UART: [idev] UDS.KEYID = 0
3,525,140 ready_for_fw is high
3,525,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,368 UART: [idev] Erasing UDS.KEYID = 0
6,027,870 UART: [idev] Sha1 KeyId Algorithm
6,049,924 UART: [idev] --
6,054,189 UART: [ldev] ++
6,054,868 UART: [ldev] CDI.KEYID = 6
6,055,834 UART: [ldev] SUBJECT.KEYID = 5
6,057,013 UART: [ldev] AUTHORITY.KEYID = 7
6,058,392 UART: [ldev] FE.KEYID = 1
6,099,252 UART: [ldev] Erasing FE.KEYID = 1
8,607,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,357 UART: [ldev] --
10,412,348 UART: [fwproc] Wait for Commands...
10,414,761 UART: [fwproc] Recv command 0x46574c44
10,417,018 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,986,852 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,452 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,670,694 >>> mbox cmd response: success
14,675,090 UART: [afmc] ++
14,675,833 UART: [afmc] CDI.KEYID = 6
14,677,030 UART: [afmc] SUBJECT.KEYID = 7
14,678,468 UART: [afmc] AUTHORITY.KEYID = 5
17,206,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,933,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,934,952 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,950,075 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,965,195 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,980,122 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,004,096 UART: [afmc] --
19,007,528 UART: [cold-reset] --
19,010,261 UART: [state] Locking Datavault
19,016,921 UART: [state] Locking PCR0, PCR1 and PCR31
19,019,110 UART: [state] Locking ICCM
19,021,637 UART: [exit] Launching FMC @ 0x40000130
19,030,338 UART:
19,030,579 UART: Running Caliptra FMC ...
19,031,683 UART:
19,031,841 UART: [state] CFI Enabled
19,092,414 UART: [fht] FMC Alias Private Key: 7
20,879,625 UART: [art] Extend RT PCRs Done
20,880,840 UART: [art] Lock RT PCRs Done
20,882,252 UART: [art] Populate DV Done
20,887,828 UART: [fht] FMC Alias Private Key: 7
20,889,524 UART: [art] Derive CDI
20,890,331 UART: [art] Store in slot 0x4
20,946,342 UART: [art] Derive Key Pair
20,947,380 UART: [art] Store priv key in slot 0x5
23,410,513 UART: [art] Derive Key Pair - Done
23,423,554 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,071 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,592 UART: [art] PUB.X = B216070E9DB42AAE6B8AC4D514DF2495ABFBD2290DE09D5F25764007F92EF3A322AA1E058179F9CF2FABCA42B7972087
25,144,819 UART: [art] PUB.Y = B6A3C70059CA4437BFE23105C0058DD45E1DB1032C5952B0521D02ADDDC429C4A4C2E50177F8F12A208006CA2BF1811A
25,152,081 UART: [art] SIG.R = BDFD45AEAA3675401DE3139B72B7E40145917CBE3D522D40D1020399D2FF75CFDD25DACDC5E5667AACFD33FCDD57B389
25,159,519 UART: [art] SIG.S = BF7AA138417D689EC793465990552780392021DD78E8DBFA84C88196E4B4CC805C1477538705AD855F973A23D6D25E00
26,138,168 UART: Caliptra RT
26,139,011 UART: [state] CFI Enabled
26,320,260 UART: [rt] RT listening for mailbox commands...
26,322,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,353,141 UART: [rt]cmd =0x44504543, len=96
30,716,454 >>> mbox cmd response data (6236 bytes)
30,745,629 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,776,083 UART: [rt]cmd =0x44504543, len=96
30,807,598 >>> mbox cmd response data (56 bytes)
30,808,360 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,838,440 UART: [rt]cmd =0x52564348, len=36
30,841,566 >>> mbox cmd response data (8 bytes)
30,842,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,872,671 UART: [rt]cmd =0x44504543, len=96
35,239,715 >>> mbox cmd response data (6236 bytes)
35,268,685 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,299,018 UART: [rt]cmd =0x53574545, len=84
39,492,007 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,438,639 ready_for_fw is high
3,439,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,956 >>> mbox cmd response: success
19,112,631 UART:
19,113,397 UART: Running Caliptra FMC ...
19,114,519 UART:
19,114,670 UART: [state] CFI Enabled
19,184,842 UART: [fht] FMC Alias Private Key: 7
20,950,964 UART: [art] Extend RT PCRs Done
20,952,197 UART: [art] Lock RT PCRs Done
20,953,993 UART: [art] Populate DV Done
20,959,360 UART: [fht] FMC Alias Private Key: 7
20,960,856 UART: [art] Derive CDI
20,961,610 UART: [art] Store in slot 0x4
21,017,412 UART: [art] Derive Key Pair
21,018,461 UART: [art] Store priv key in slot 0x5
23,480,947 UART: [art] Derive Key Pair - Done
23,493,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,207,186 UART: [art] Erasing AUTHORITY.KEYID = 7
25,208,687 UART: [art] PUB.X = DEE0D6DD85EAF2F6CFC695137F3AD13BFD15D82A45DA88D2D37BFEBFC9846DAA98629707C1BEBF770152FB3D1E2004BC
25,215,957 UART: [art] PUB.Y = 55F66A2ED43BC508625B96BC3BD18D53D5366E85FE2FF81504A6D49140BD1D2912F5E65B874FF022BAA6E0CF1EA8FCE7
25,223,275 UART: [art] SIG.R = 3F7E0017E9E10D7258B5BED5A9C6EF30412D2CF278AB1772BA7D3A19B257777CEB86354756CCC239CF6B4790164142C0
25,230,635 UART: [art] SIG.S = AF77EA11026938ED5E4B77B0A7881C91BCCA3903D40B245BEFE49A539855475514D58803BB112059720D1601649E86C8
26,209,454 UART: Caliptra RT
26,210,163 UART: [state] CFI Enabled
26,390,787 UART: [rt] RT listening for mailbox commands...
26,393,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,424,100 UART: [rt]cmd =0x44504543, len=96
30,786,744 >>> mbox cmd response data (6236 bytes)
30,815,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,846,858 UART: [rt]cmd =0x44504543, len=96
30,878,433 >>> mbox cmd response data (56 bytes)
30,879,141 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,909,165 UART: [rt]cmd =0x52564348, len=36
30,912,455 >>> mbox cmd response data (8 bytes)
30,912,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,943,656 UART: [rt]cmd =0x44504543, len=96
35,308,134 >>> mbox cmd response data (6236 bytes)
35,337,106 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,367,762 UART: [rt]cmd =0x53574545, len=84
39,547,042 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,353 UART:
192,734 UART: Running Caliptra ROM ...
193,831 UART:
603,588 UART: [state] CFI Enabled
616,771 UART: [state] LifecycleState = Unprovisioned
619,158 UART: [state] DebugLocked = No
621,116 UART: [state] WD Timer not started. Device not locked for debugging
625,043 UART: [kat] SHA2-256
814,889 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,701 UART: [kat] ++
826,227 UART: [kat] sha1
838,400 UART: [kat] SHA2-256
841,445 UART: [kat] SHA2-384
846,596 UART: [kat] SHA2-512-ACC
849,187 UART: [kat] ECC-384
3,291,377 UART: [kat] HMAC-384Kdf
3,304,538 UART: [kat] LMS
3,836,386 UART: [kat] --
3,841,040 UART: [cold-reset] ++
3,843,194 UART: [fht] FHT @ 0x50003400
3,854,323 UART: [idev] ++
3,855,031 UART: [idev] CDI.KEYID = 6
3,855,921 UART: [idev] SUBJECT.KEYID = 7
3,857,191 UART: [idev] UDS.KEYID = 0
3,858,094 ready_for_fw is high
3,858,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,590 UART: [idev] Erasing UDS.KEYID = 0
6,332,715 UART: [idev] Sha1 KeyId Algorithm
6,354,597 UART: [idev] --
6,359,452 UART: [ldev] ++
6,360,168 UART: [ldev] CDI.KEYID = 6
6,361,062 UART: [ldev] SUBJECT.KEYID = 5
6,362,174 UART: [ldev] AUTHORITY.KEYID = 7
6,363,466 UART: [ldev] FE.KEYID = 1
6,373,336 UART: [ldev] Erasing FE.KEYID = 1
8,853,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,400 UART: [ldev] --
10,646,210 UART: [fwproc] Wait for Commands...
10,649,113 UART: [fwproc] Recv command 0x46574c44
10,651,423 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,230,863 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,454 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,826 >>> mbox cmd response: success
14,918,698 UART: [afmc] ++
14,919,392 UART: [afmc] CDI.KEYID = 6
14,920,591 UART: [afmc] SUBJECT.KEYID = 7
14,922,039 UART: [afmc] AUTHORITY.KEYID = 5
17,424,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,844 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,937 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,046 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,983 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,297 UART: [afmc] --
19,219,391 UART: [cold-reset] --
19,223,865 UART: [state] Locking Datavault
19,230,819 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,987 UART: [state] Locking ICCM
19,234,667 UART: [exit] Launching FMC @ 0x40000130
19,243,326 UART:
19,243,606 UART: Running Caliptra FMC ...
19,244,723 UART:
19,244,893 UART: [state] CFI Enabled
19,252,957 UART: [fht] FMC Alias Private Key: 7
21,019,279 UART: [art] Extend RT PCRs Done
21,020,511 UART: [art] Lock RT PCRs Done
21,022,278 UART: [art] Populate DV Done
21,027,863 UART: [fht] FMC Alias Private Key: 7
21,029,572 UART: [art] Derive CDI
21,030,392 UART: [art] Store in slot 0x4
21,073,209 UART: [art] Derive Key Pair
21,074,216 UART: [art] Store priv key in slot 0x5
23,501,533 UART: [art] Derive Key Pair - Done
23,514,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,418 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,938 UART: [art] PUB.X = 50D61DF8F6503BB979DBD725C71A703009CE12CAFFF0896C7D270ED078D4589FAA1980489753AD6F0BE40E3479CE3FC7
25,230,222 UART: [art] PUB.Y = DF126833D5DEC002F8BA6FFAF99280C61314314DF6EF4CFDF16A3968B1A5ACE9E8CECD5BF0771B9A2AFDCBBA5211A104
25,237,537 UART: [art] SIG.R = DB831A76767C1CC4402CBB58FE9E5F1770C21AD2C048F17EE4808BE62BB5E96E55689011096176CCC47D86E900F114C1
25,244,904 UART: [art] SIG.S = DFA019D12651B1C380E08ABB8A4095099421E58A0A6B384A0A5C945CB888BF8A38AF13602E8571A2729CEF33031A72A2
26,223,508 UART: Caliptra RT
26,224,199 UART: [state] CFI Enabled
26,357,863 UART: [rt] RT listening for mailbox commands...
26,360,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,391,239 UART: [rt]cmd =0x44504543, len=96
30,676,166 >>> mbox cmd response data (6236 bytes)
30,705,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,736,332 UART: [rt]cmd =0x44504543, len=96
30,767,526 >>> mbox cmd response data (56 bytes)
30,768,298 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,798,378 UART: [rt]cmd =0x52564348, len=36
30,801,134 >>> mbox cmd response data (8 bytes)
30,801,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,832,010 UART: [rt]cmd =0x44504543, len=96
35,116,361 >>> mbox cmd response data (6236 bytes)
35,145,165 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,175,710 UART: [rt]cmd =0x53574545, len=84
39,311,059 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
3,753,408 ready_for_fw is high
3,753,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,844 >>> mbox cmd response: success
19,304,304 UART:
19,304,695 UART: Running Caliptra FMC ...
19,305,901 UART:
19,306,085 UART: [state] CFI Enabled
19,313,894 UART: [fht] FMC Alias Private Key: 7
21,080,356 UART: [art] Extend RT PCRs Done
21,081,578 UART: [art] Lock RT PCRs Done
21,082,941 UART: [art] Populate DV Done
21,088,590 UART: [fht] FMC Alias Private Key: 7
21,090,204 UART: [art] Derive CDI
21,091,029 UART: [art] Store in slot 0x4
21,133,581 UART: [art] Derive Key Pair
21,134,624 UART: [art] Store priv key in slot 0x5
23,560,945 UART: [art] Derive Key Pair - Done
23,573,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,309 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,827 UART: [art] PUB.X = 0DAAE03F9F27B1302B9C0479D1A7DC83088F7FC65D1EF0468B87B638D7EB378981E2F66945ECFC641E8B4EFBAA325858
25,289,119 UART: [art] PUB.Y = 91A4CC33D25AC376ADF726307FCAFBBE81D09D0576788A1AD5CA6EEF5DAEFED069FF8BAF81F19D2798CA465EAEC68976
25,296,400 UART: [art] SIG.R = 68716BDFC6375645AFF4AEA26542107D75924F28CD41B3DF20E56C28647D05208BC4E66978E01FED627EF9596953B04D
25,303,779 UART: [art] SIG.S = F146C5ED0149D19CAE1BABBCE698EE5B6E9153D11FEB90A0A82AE949BD3C404439D7A3BBE31FA8A7A48D293E80BAB7EF
26,283,094 UART: Caliptra RT
26,283,810 UART: [state] CFI Enabled
26,416,114 UART: [rt] RT listening for mailbox commands...
26,418,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,449,242 UART: [rt]cmd =0x44504543, len=96
30,735,269 >>> mbox cmd response data (6236 bytes)
30,764,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,795,368 UART: [rt]cmd =0x44504543, len=96
30,828,360 >>> mbox cmd response data (56 bytes)
30,829,073 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,859,113 UART: [rt]cmd =0x52564348, len=36
30,862,500 >>> mbox cmd response data (8 bytes)
30,863,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,893,522 UART: [rt]cmd =0x44504543, len=96
35,179,570 >>> mbox cmd response data (6236 bytes)
35,208,372 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,238,963 UART: [rt]cmd =0x53574545, len=84
39,374,065 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,969 UART: [kat] SHA2-256
881,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,015 UART: [kat] ++
886,167 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
895,042 UART: [kat] SHA2-512-ACC
896,943 UART: [kat] ECC-384
902,260 UART: [kat] HMAC-384Kdf
907,012 UART: [kat] LMS
1,475,208 UART: [kat] --
1,476,035 UART: [cold-reset] ++
1,476,583 UART: [fht] Storing FHT @ 0x50003400
1,479,292 UART: [idev] ++
1,479,460 UART: [idev] CDI.KEYID = 6
1,479,820 UART: [idev] SUBJECT.KEYID = 7
1,480,244 UART: [idev] UDS.KEYID = 0
1,480,589 ready_for_fw is high
1,480,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,516 UART: [idev] Erasing UDS.KEYID = 0
1,504,980 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,502 UART: [idev] --
1,514,329 UART: [ldev] ++
1,514,497 UART: [ldev] CDI.KEYID = 6
1,514,860 UART: [ldev] SUBJECT.KEYID = 5
1,515,286 UART: [ldev] AUTHORITY.KEYID = 7
1,515,749 UART: [ldev] FE.KEYID = 1
1,521,009 UART: [ldev] Erasing FE.KEYID = 1
1,546,234 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,304 UART: [ldev] --
1,585,579 UART: [fwproc] Waiting for Commands...
1,586,352 UART: [fwproc] Received command 0x46574c44
1,587,143 UART: [fwproc] Received Image of size 118548 bytes
2,932,289 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,225 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,443 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,696 >>> mbox cmd response: success
3,131,838 UART: [afmc] ++
3,132,006 UART: [afmc] CDI.KEYID = 6
3,132,368 UART: [afmc] SUBJECT.KEYID = 7
3,132,793 UART: [afmc] AUTHORITY.KEYID = 5
3,167,562 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,784 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,564 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,273 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,156 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,839 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,605 UART: [afmc] --
3,210,525 UART: [cold-reset] --
3,211,631 UART: [state] Locking Datavault
3,212,696 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,300 UART: [state] Locking ICCM
3,213,808 UART: [exit] Launching FMC @ 0x40000130
3,219,138 UART:
3,219,154 UART: Running Caliptra FMC ...
3,219,562 UART:
3,219,616 UART: [state] CFI Enabled
3,230,246 UART: [fht] FMC Alias Private Key: 7
3,349,520 UART: [art] Extend RT PCRs Done
3,349,948 UART: [art] Lock RT PCRs Done
3,351,718 UART: [art] Populate DV Done
3,359,787 UART: [fht] FMC Alias Private Key: 7
3,360,791 UART: [art] Derive CDI
3,361,071 UART: [art] Store in slot 0x4
3,446,773 UART: [art] Derive Key Pair
3,447,133 UART: [art] Store priv key in slot 0x5
3,460,774 UART: [art] Derive Key Pair - Done
3,475,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,201 UART: [art] PUB.X = 4EC771B76A6A6A4CBA2E858F9A194A79CAE8F8B05272DE96179780B498BF8837E3079F7F967BAB323F275B688D8910C4
3,498,972 UART: [art] PUB.Y = F0ACEDE633CAC797990B07C1D5EC58728BA4EBBB205354B2C57AB9C4FE6CBC949D021485527FE9122C5EEE9F67BAB5C9
3,505,935 UART: [art] SIG.R = 95F453C3B0B3C76E0ECF01E3650954A381B6C4DB87FDF3B45B035A09A0B3C1489ABEA9683E5C3DDDC53A60D455640026
3,512,678 UART: [art] SIG.S = B10C36BB9729C1780AD54C197AC82B5D199777880BB06B9FE6FF7855032D9E8DC89E37CA28DCD04262D5140E947096E9
3,536,403 UART: Caliptra RT
3,536,654 UART: [state] CFI Enabled
3,657,639 UART: [rt] RT listening for mailbox commands...
3,658,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,585 UART: [rt]cmd =0x44504543, len=96
3,869,569 >>> mbox cmd response data (6236 bytes)
3,869,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,471 UART: [rt]cmd =0x44504543, len=96
3,930,978 >>> mbox cmd response data (56 bytes)
3,930,979 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,960,324 UART: [rt]cmd =0x52564348, len=36
3,963,194 >>> mbox cmd response data (8 bytes)
3,963,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,993,050 UART: [rt]cmd =0x44504543, len=96
4,174,787 >>> mbox cmd response data (6236 bytes)
4,174,788 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,204,627 UART: [rt]cmd =0x53574545, len=84
4,230,402 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,351 ready_for_fw is high
1,362,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,878 >>> mbox cmd response: success
3,040,463 UART:
3,040,479 UART: Running Caliptra FMC ...
3,040,887 UART:
3,040,941 UART: [state] CFI Enabled
3,051,459 UART: [fht] FMC Alias Private Key: 7
3,170,409 UART: [art] Extend RT PCRs Done
3,170,837 UART: [art] Lock RT PCRs Done
3,172,559 UART: [art] Populate DV Done
3,180,790 UART: [fht] FMC Alias Private Key: 7
3,181,788 UART: [art] Derive CDI
3,182,068 UART: [art] Store in slot 0x4
3,268,034 UART: [art] Derive Key Pair
3,268,394 UART: [art] Store priv key in slot 0x5
3,281,591 UART: [art] Derive Key Pair - Done
3,296,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,938 UART: [art] PUB.X = EB2D5C7D4E1544A1B63134165B1C9554ED0E9D57C1670ACBF3A81E11BE7F6215EB8DCC00187E88638A219680C8FA453F
3,319,688 UART: [art] PUB.Y = 39F8501C6180C2585EE55F1557DB2A1942548A241DBF31F44DE9F75B9C9C109631D9278421DFABC2C38B46E34E315A85
3,326,638 UART: [art] SIG.R = BF5A9CC807CA51453C2345670E6D81628E3957D29E0E9D35AE4FF1655714ABAFD2C45A5A63DDECFF7E2D70A443F30E71
3,333,410 UART: [art] SIG.S = 3CC88556121F49FFDCDCBB217CDD5AF126157C0498C411D8E430CB6C21AECFC60C414A2CB60ADEE66B7CC363D5227A44
3,357,177 UART: Caliptra RT
3,357,428 UART: [state] CFI Enabled
3,477,316 UART: [rt] RT listening for mailbox commands...
3,477,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,636 UART: [rt]cmd =0x44504543, len=96
3,691,315 >>> mbox cmd response data (6236 bytes)
3,691,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,339 UART: [rt]cmd =0x44504543, len=96
3,753,204 >>> mbox cmd response data (56 bytes)
3,753,205 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,850 UART: [rt]cmd =0x52564348, len=36
3,785,608 >>> mbox cmd response data (8 bytes)
3,785,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,370 UART: [rt]cmd =0x44504543, len=96
3,997,132 >>> mbox cmd response data (6236 bytes)
3,997,133 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,156 UART: [rt]cmd =0x53574545, len=84
4,053,063 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,987 UART: [state] LifecycleState = Unprovisioned
85,642 UART: [state] DebugLocked = No
86,138 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,702 UART: [kat] SHA2-256
881,633 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,748 UART: [kat] ++
885,900 UART: [kat] sha1
889,920 UART: [kat] SHA2-256
891,858 UART: [kat] SHA2-384
894,551 UART: [kat] SHA2-512-ACC
896,452 UART: [kat] ECC-384
902,073 UART: [kat] HMAC-384Kdf
906,495 UART: [kat] LMS
1,474,691 UART: [kat] --
1,475,404 UART: [cold-reset] ++
1,475,890 UART: [fht] Storing FHT @ 0x50003400
1,478,731 UART: [idev] ++
1,478,899 UART: [idev] CDI.KEYID = 6
1,479,259 UART: [idev] SUBJECT.KEYID = 7
1,479,683 UART: [idev] UDS.KEYID = 0
1,480,028 ready_for_fw is high
1,480,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,663 UART: [idev] Erasing UDS.KEYID = 0
1,504,037 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,757 UART: [idev] --
1,513,824 UART: [ldev] ++
1,513,992 UART: [ldev] CDI.KEYID = 6
1,514,355 UART: [ldev] SUBJECT.KEYID = 5
1,514,781 UART: [ldev] AUTHORITY.KEYID = 7
1,515,244 UART: [ldev] FE.KEYID = 1
1,520,666 UART: [ldev] Erasing FE.KEYID = 1
1,545,703 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,843 UART: [ldev] --
1,585,106 UART: [fwproc] Waiting for Commands...
1,585,735 UART: [fwproc] Received command 0x46574c44
1,586,526 UART: [fwproc] Received Image of size 118548 bytes
2,932,238 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,230 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,448 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,843 >>> mbox cmd response: success
3,133,027 UART: [afmc] ++
3,133,195 UART: [afmc] CDI.KEYID = 6
3,133,557 UART: [afmc] SUBJECT.KEYID = 7
3,133,982 UART: [afmc] AUTHORITY.KEYID = 5
3,169,091 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,473 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,253 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,962 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,845 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,528 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,462 UART: [afmc] --
3,212,570 UART: [cold-reset] --
3,213,420 UART: [state] Locking Datavault
3,214,443 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,047 UART: [state] Locking ICCM
3,215,693 UART: [exit] Launching FMC @ 0x40000130
3,221,023 UART:
3,221,039 UART: Running Caliptra FMC ...
3,221,447 UART:
3,221,590 UART: [state] CFI Enabled
3,232,162 UART: [fht] FMC Alias Private Key: 7
3,351,202 UART: [art] Extend RT PCRs Done
3,351,630 UART: [art] Lock RT PCRs Done
3,353,136 UART: [art] Populate DV Done
3,361,541 UART: [fht] FMC Alias Private Key: 7
3,362,521 UART: [art] Derive CDI
3,362,801 UART: [art] Store in slot 0x4
3,448,147 UART: [art] Derive Key Pair
3,448,507 UART: [art] Store priv key in slot 0x5
3,462,092 UART: [art] Derive Key Pair - Done
3,476,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,295 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,060 UART: [art] PUB.X = 2F3C6F7EF05C14D69D7630A112E64F8A8E8A9766092DD866CDEB126F3A6F8B145A65192AC86312A6AFF933ED502776E7
3,499,833 UART: [art] PUB.Y = 0E7F9AEF8932130C2CDFBBFDD34D72F9A89F8B608737EF98350C781391FFFA91C8BE5E21CE40152F769CAED742CE1714
3,506,790 UART: [art] SIG.R = 4046C70294CBAD5CAAA2B150835C53657ECBB424565522415A74469C73993373C0FE7DEC0F6AA8EDBAF8216011B66E88
3,513,558 UART: [art] SIG.S = 8DDBE0CE65238CFB0A84A2203F9EBED99BDB66E675D09F71EFE345AAC411691471320F0789C63BAF2E72D607A05952FD
3,537,126 UART: Caliptra RT
3,537,469 UART: [state] CFI Enabled
3,657,919 UART: [rt] RT listening for mailbox commands...
3,658,589 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,447 UART: [rt]cmd =0x44504543, len=96
3,871,855 >>> mbox cmd response data (6236 bytes)
3,871,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,902,013 UART: [rt]cmd =0x44504543, len=96
3,933,996 >>> mbox cmd response data (56 bytes)
3,933,997 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,584 UART: [rt]cmd =0x52564348, len=36
3,966,358 >>> mbox cmd response data (8 bytes)
3,966,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,996,618 UART: [rt]cmd =0x44504543, len=96
4,178,633 >>> mbox cmd response data (6236 bytes)
4,178,634 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,208,665 UART: [rt]cmd =0x53574545, len=84
4,235,286 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,226 ready_for_fw is high
1,362,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,443 >>> mbox cmd response: success
3,042,970 UART:
3,042,986 UART: Running Caliptra FMC ...
3,043,394 UART:
3,043,537 UART: [state] CFI Enabled
3,054,029 UART: [fht] FMC Alias Private Key: 7
3,173,207 UART: [art] Extend RT PCRs Done
3,173,635 UART: [art] Lock RT PCRs Done
3,175,173 UART: [art] Populate DV Done
3,183,458 UART: [fht] FMC Alias Private Key: 7
3,184,632 UART: [art] Derive CDI
3,184,912 UART: [art] Store in slot 0x4
3,271,026 UART: [art] Derive Key Pair
3,271,386 UART: [art] Store priv key in slot 0x5
3,284,799 UART: [art] Derive Key Pair - Done
3,299,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,103 UART: [art] PUB.X = 351A62861BB0E7DBA54F60519285EF224444A69942BF4366336F687471C9901374867A2981DCF6A2A56E79FB46AC56E9
3,322,865 UART: [art] PUB.Y = 9254529F374E2154C5E7C7F1BAD828A80DFDDB97B88E4747852B05700A157A3871A9C8D811AF7824212437D5C0165BF3
3,329,802 UART: [art] SIG.R = FF4A0E81C218518C1C9CFD938C6041D60BA7FB4728326F47B92DA77475405E3D0004D33EA18B21A31EB1D1BAABD237CD
3,336,553 UART: [art] SIG.S = 5D8854074DD47839473D1036EF2E95AD426491BB848D7E776A066BA62150116F4AEC85B309C3DC41F0D1EAA524FCACCE
3,360,664 UART: Caliptra RT
3,361,007 UART: [state] CFI Enabled
3,481,257 UART: [rt] RT listening for mailbox commands...
3,481,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,191 UART: [rt]cmd =0x44504543, len=96
3,694,842 >>> mbox cmd response data (6236 bytes)
3,694,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,724,944 UART: [rt]cmd =0x44504543, len=96
3,757,281 >>> mbox cmd response data (56 bytes)
3,757,282 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,786,893 UART: [rt]cmd =0x52564348, len=36
3,789,665 >>> mbox cmd response data (8 bytes)
3,789,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,691 UART: [rt]cmd =0x44504543, len=96
4,001,643 >>> mbox cmd response data (6236 bytes)
4,001,644 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,031,657 UART: [rt]cmd =0x53574545, len=84
4,058,690 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
891,078 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,182 UART: [kat] ++
895,334 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,415 UART: [kat] SHA2-512-ACC
906,316 UART: [kat] ECC-384
916,009 UART: [kat] HMAC-384Kdf
920,549 UART: [kat] LMS
1,168,861 UART: [kat] --
1,169,492 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,542 UART: [idev] ++
1,172,710 UART: [idev] CDI.KEYID = 6
1,173,071 UART: [idev] SUBJECT.KEYID = 7
1,173,496 UART: [idev] UDS.KEYID = 0
1,173,842 ready_for_fw is high
1,173,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,571 UART: [idev] Erasing UDS.KEYID = 0
1,198,409 UART: [idev] Sha1 KeyId Algorithm
1,207,361 UART: [idev] --
1,208,382 UART: [ldev] ++
1,208,550 UART: [ldev] CDI.KEYID = 6
1,208,914 UART: [ldev] SUBJECT.KEYID = 5
1,209,341 UART: [ldev] AUTHORITY.KEYID = 7
1,209,804 UART: [ldev] FE.KEYID = 1
1,215,076 UART: [ldev] Erasing FE.KEYID = 1
1,241,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,624 UART: [ldev] --
1,280,911 UART: [fwproc] Wait for Commands...
1,281,572 UART: [fwproc] Recv command 0x46574c44
1,282,305 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,647 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,822 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,113 >>> mbox cmd response: success
2,826,263 UART: [afmc] ++
2,826,431 UART: [afmc] CDI.KEYID = 6
2,826,794 UART: [afmc] SUBJECT.KEYID = 7
2,827,220 UART: [afmc] AUTHORITY.KEYID = 5
2,863,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,617 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,327 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,208 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,909 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,728 UART: [afmc] --
2,906,735 UART: [cold-reset] --
2,907,491 UART: [state] Locking Datavault
2,908,576 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,180 UART: [state] Locking ICCM
2,909,798 UART: [exit] Launching FMC @ 0x40000130
2,915,128 UART:
2,915,144 UART: Running Caliptra FMC ...
2,915,552 UART:
2,915,606 UART: [state] CFI Enabled
2,925,954 UART: [fht] FMC Alias Private Key: 7
3,044,966 UART: [art] Extend RT PCRs Done
3,045,394 UART: [art] Lock RT PCRs Done
3,046,670 UART: [art] Populate DV Done
3,055,139 UART: [fht] FMC Alias Private Key: 7
3,056,191 UART: [art] Derive CDI
3,056,471 UART: [art] Store in slot 0x4
3,142,524 UART: [art] Derive Key Pair
3,142,884 UART: [art] Store priv key in slot 0x5
3,155,918 UART: [art] Derive Key Pair - Done
3,170,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,022 UART: [art] PUB.X = 6740553BF9BAF01CD92231E05B5E06769672C46BE52BF317AF93415F4AC0626034758A6F050BD2CF3BB94E55E9BEBD39
3,193,789 UART: [art] PUB.Y = FCE2B839E79E0C6CEDC026B30CE4DA7FF5C5962B15C977168D35E7E59F8B3AB1F8E9A1EFA3C8E0DED5BCC87709F6BCA5
3,200,760 UART: [art] SIG.R = 1C40BED81DAA03980818BE0254B41E5AB4EAEDE960CFFD7C409D7F9D79AABDFFCBA34390DBED1B2648F89A58008585F9
3,207,523 UART: [art] SIG.S = B6615F5E521CC51416B24B4B380CA8DD4964C4305D6FEE9DFC048DDC79DC09674BC0BEAD57CB709D85F2BEA5E75389FE
3,231,540 UART: Caliptra RT
3,231,791 UART: [state] CFI Enabled
3,351,446 UART: [rt] RT listening for mailbox commands...
3,352,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,326 UART: [rt]cmd =0x44504543, len=96
3,563,661 >>> mbox cmd response data (6236 bytes)
3,563,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,593,645 UART: [rt]cmd =0x44504543, len=96
3,626,018 >>> mbox cmd response data (56 bytes)
3,626,019 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,655,688 UART: [rt]cmd =0x52564348, len=36
3,658,154 >>> mbox cmd response data (8 bytes)
3,658,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,106 UART: [rt]cmd =0x44504543, len=96
3,869,278 >>> mbox cmd response data (6236 bytes)
3,869,279 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,284 UART: [rt]cmd =0x53574545, len=84
3,924,592 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,896 ready_for_fw is high
1,058,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,512 >>> mbox cmd response: success
2,739,391 UART:
2,739,407 UART: Running Caliptra FMC ...
2,739,815 UART:
2,739,869 UART: [state] CFI Enabled
2,750,197 UART: [fht] FMC Alias Private Key: 7
2,869,599 UART: [art] Extend RT PCRs Done
2,870,027 UART: [art] Lock RT PCRs Done
2,871,813 UART: [art] Populate DV Done
2,880,198 UART: [fht] FMC Alias Private Key: 7
2,881,298 UART: [art] Derive CDI
2,881,578 UART: [art] Store in slot 0x4
2,967,211 UART: [art] Derive Key Pair
2,967,571 UART: [art] Store priv key in slot 0x5
2,980,801 UART: [art] Derive Key Pair - Done
2,995,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,490 UART: [art] PUB.X = 40F6EB34730C1BB7FAB13D8D3FD6C41BC4E7FA487161D8E04B46FBD260E882FB7F8ECE98D66BF1F2DCD2D367E7A4FE95
3,018,283 UART: [art] PUB.Y = C2E19CE8BC3E14D2AB2B6DA12B4DF3D9DBBAC8A611F54838383281A5A9E9E48B763ECB8CB8C343E46E4335F96717D8C2
3,025,251 UART: [art] SIG.R = 0B6BCB89E068A20404639E05E7A3D91D6289F68826A9D59D17CD1B075FA4E289460AA21B34EFC8FA4A0BFE659179EEBF
3,032,012 UART: [art] SIG.S = 079D3662BD8AE35EB9CE04200C56F6A44A1D8B015DE049D11CE0399CBFDAEFC5127E067154D321F565D735B33B75635B
3,055,247 UART: Caliptra RT
3,055,498 UART: [state] CFI Enabled
3,174,932 UART: [rt] RT listening for mailbox commands...
3,175,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,944 UART: [rt]cmd =0x44504543, len=96
3,387,345 >>> mbox cmd response data (6236 bytes)
3,387,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,219 UART: [rt]cmd =0x44504543, len=96
3,448,956 >>> mbox cmd response data (56 bytes)
3,448,957 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,432 UART: [rt]cmd =0x52564348, len=36
3,481,126 >>> mbox cmd response data (8 bytes)
3,481,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,160 UART: [rt]cmd =0x44504543, len=96
3,692,847 >>> mbox cmd response data (6236 bytes)
3,692,848 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,659 UART: [rt]cmd =0x53574545, len=84
3,748,187 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,270 UART: [state] WD Timer not started. Device not locked for debugging
87,429 UART: [kat] SHA2-256
890,979 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,083 UART: [kat] ++
895,235 UART: [kat] sha1
899,563 UART: [kat] SHA2-256
901,503 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
921,004 UART: [kat] LMS
1,169,316 UART: [kat] --
1,170,279 UART: [cold-reset] ++
1,170,751 UART: [fht] FHT @ 0x50003400
1,173,457 UART: [idev] ++
1,173,625 UART: [idev] CDI.KEYID = 6
1,173,986 UART: [idev] SUBJECT.KEYID = 7
1,174,411 UART: [idev] UDS.KEYID = 0
1,174,757 ready_for_fw is high
1,174,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,128 UART: [idev] Erasing UDS.KEYID = 0
1,199,320 UART: [idev] Sha1 KeyId Algorithm
1,208,282 UART: [idev] --
1,209,487 UART: [ldev] ++
1,209,655 UART: [ldev] CDI.KEYID = 6
1,210,019 UART: [ldev] SUBJECT.KEYID = 5
1,210,446 UART: [ldev] AUTHORITY.KEYID = 7
1,210,909 UART: [ldev] FE.KEYID = 1
1,216,025 UART: [ldev] Erasing FE.KEYID = 1
1,243,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,301 UART: [ldev] --
1,282,692 UART: [fwproc] Wait for Commands...
1,283,481 UART: [fwproc] Recv command 0x46574c44
1,284,214 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,440 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,615 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,968 >>> mbox cmd response: success
2,829,216 UART: [afmc] ++
2,829,384 UART: [afmc] CDI.KEYID = 6
2,829,747 UART: [afmc] SUBJECT.KEYID = 7
2,830,173 UART: [afmc] AUTHORITY.KEYID = 5
2,866,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,454 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,164 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,045 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,746 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,365 UART: [afmc] --
2,909,402 UART: [cold-reset] --
2,910,478 UART: [state] Locking Datavault
2,911,823 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,427 UART: [state] Locking ICCM
2,913,027 UART: [exit] Launching FMC @ 0x40000130
2,918,357 UART:
2,918,373 UART: Running Caliptra FMC ...
2,918,781 UART:
2,918,924 UART: [state] CFI Enabled
2,929,946 UART: [fht] FMC Alias Private Key: 7
3,049,172 UART: [art] Extend RT PCRs Done
3,049,600 UART: [art] Lock RT PCRs Done
3,050,906 UART: [art] Populate DV Done
3,059,233 UART: [fht] FMC Alias Private Key: 7
3,060,215 UART: [art] Derive CDI
3,060,495 UART: [art] Store in slot 0x4
3,146,300 UART: [art] Derive Key Pair
3,146,660 UART: [art] Store priv key in slot 0x5
3,160,222 UART: [art] Derive Key Pair - Done
3,174,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,797 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,562 UART: [art] PUB.X = DDE4F9881B6E988C6D93E2908F44F9C625B2AC473C616DE58CA76EAD56D53C49D58AA7B06BCAA2EBE08F96FE65E22048
3,198,350 UART: [art] PUB.Y = 4EBC0C89DA7BA75A22520EDD0453BBE58DE11DBF712DCCCCDAF8BCB083D64C3541B41015EE99ED213885B498F71A1614
3,205,311 UART: [art] SIG.R = 1DA61A141FF4C7139043FA3A0A01A4D56948CB9B4E397D3F224D266C3C70397ED05462A17E98F29A7DF492ED3EF21996
3,212,079 UART: [art] SIG.S = B3C315893CB85E1E57841087E61C6DAC2174E3B006AB5D901C054268BA7879671E7CAFADCCB2A4B99393BB51020815DB
3,235,925 UART: Caliptra RT
3,236,268 UART: [state] CFI Enabled
3,355,799 UART: [rt] RT listening for mailbox commands...
3,356,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,867 UART: [rt]cmd =0x44504543, len=96
3,570,425 >>> mbox cmd response data (6236 bytes)
3,570,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,600,627 UART: [rt]cmd =0x44504543, len=96
3,632,500 >>> mbox cmd response data (56 bytes)
3,632,501 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,970 UART: [rt]cmd =0x52564348, len=36
3,664,564 >>> mbox cmd response data (8 bytes)
3,664,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,694,456 UART: [rt]cmd =0x44504543, len=96
3,876,796 >>> mbox cmd response data (6236 bytes)
3,876,797 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,906,598 UART: [rt]cmd =0x53574545, len=84
3,931,958 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,261 ready_for_fw is high
1,060,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,295 >>> mbox cmd response: success
2,744,592 UART:
2,744,608 UART: Running Caliptra FMC ...
2,745,016 UART:
2,745,159 UART: [state] CFI Enabled
2,756,199 UART: [fht] FMC Alias Private Key: 7
2,874,293 UART: [art] Extend RT PCRs Done
2,874,721 UART: [art] Lock RT PCRs Done
2,876,025 UART: [art] Populate DV Done
2,884,270 UART: [fht] FMC Alias Private Key: 7
2,885,420 UART: [art] Derive CDI
2,885,700 UART: [art] Store in slot 0x4
2,972,079 UART: [art] Derive Key Pair
2,972,439 UART: [art] Store priv key in slot 0x5
2,985,347 UART: [art] Derive Key Pair - Done
3,000,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,211 UART: [art] PUB.X = 124558E35125598F2DD403E967437D5447CE59EBBD3B1452173529E0D86AD0075E4C46FA6C69F732F37ADDDE5B00D788
3,022,953 UART: [art] PUB.Y = 01A427FC577DBA30F1DB430C84ECE9D01ED6E1652A85320722ED36C1C5C0DF82BC49ABE19786E63C4D05D109004861CC
3,029,876 UART: [art] SIG.R = 5AE0E3C38DEDEF946FE906986A381847253BD79FEE8441ABB7876009F901D9544B8AE87A9F63F5CAAAEC292DAEFB9D39
3,036,655 UART: [art] SIG.S = CCE8E6799192A4C8032388017AEC84EF5538A67A9C80F5BC429B11FA8AAB9733B9B0EEFA3BB690716879A42988924519
3,059,855 UART: Caliptra RT
3,060,198 UART: [state] CFI Enabled
3,180,385 UART: [rt] RT listening for mailbox commands...
3,181,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,575 UART: [rt]cmd =0x44504543, len=96
3,393,981 >>> mbox cmd response data (6236 bytes)
3,393,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,989 UART: [rt]cmd =0x44504543, len=96
3,456,082 >>> mbox cmd response data (56 bytes)
3,456,083 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,485,616 UART: [rt]cmd =0x52564348, len=36
3,488,286 >>> mbox cmd response data (8 bytes)
3,488,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,234 UART: [rt]cmd =0x44504543, len=96
3,700,289 >>> mbox cmd response data (6236 bytes)
3,700,290 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,267 UART: [rt]cmd =0x53574545, len=84
3,755,929 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
893,544 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,669 UART: [kat] ++
897,821 UART: [kat] sha1
902,061 UART: [kat] SHA2-256
904,001 UART: [kat] SHA2-384
906,806 UART: [kat] SHA2-512-ACC
908,707 UART: [kat] ECC-384
918,050 UART: [kat] HMAC-384Kdf
922,570 UART: [kat] LMS
1,170,898 UART: [kat] --
1,171,809 UART: [cold-reset] ++
1,172,315 UART: [fht] FHT @ 0x50003400
1,174,750 UART: [idev] ++
1,174,918 UART: [idev] CDI.KEYID = 6
1,175,278 UART: [idev] SUBJECT.KEYID = 7
1,175,702 UART: [idev] UDS.KEYID = 0
1,176,047 ready_for_fw is high
1,176,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,714 UART: [idev] Erasing UDS.KEYID = 0
1,200,203 UART: [idev] Sha1 KeyId Algorithm
1,208,781 UART: [idev] --
1,209,735 UART: [ldev] ++
1,209,903 UART: [ldev] CDI.KEYID = 6
1,210,266 UART: [ldev] SUBJECT.KEYID = 5
1,210,692 UART: [ldev] AUTHORITY.KEYID = 7
1,211,155 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,242,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,909 UART: [ldev] --
1,282,236 UART: [fwproc] Wait for Commands...
1,282,894 UART: [fwproc] Recv command 0x46574c44
1,283,622 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,642 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,812 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,181 >>> mbox cmd response: success
2,829,429 UART: [afmc] ++
2,829,597 UART: [afmc] CDI.KEYID = 6
2,829,959 UART: [afmc] SUBJECT.KEYID = 7
2,830,384 UART: [afmc] AUTHORITY.KEYID = 5
2,864,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,064 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,773 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,656 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,357 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,095 UART: [afmc] --
2,908,109 UART: [cold-reset] --
2,908,785 UART: [state] Locking Datavault
2,909,800 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,404 UART: [state] Locking ICCM
2,910,834 UART: [exit] Launching FMC @ 0x40000130
2,916,164 UART:
2,916,180 UART: Running Caliptra FMC ...
2,916,588 UART:
2,916,642 UART: [state] CFI Enabled
2,927,250 UART: [fht] FMC Alias Private Key: 7
3,046,184 UART: [art] Extend RT PCRs Done
3,046,612 UART: [art] Lock RT PCRs Done
3,048,030 UART: [art] Populate DV Done
3,056,379 UART: [fht] FMC Alias Private Key: 7
3,057,383 UART: [art] Derive CDI
3,057,663 UART: [art] Store in slot 0x4
3,143,344 UART: [art] Derive Key Pair
3,143,704 UART: [art] Store priv key in slot 0x5
3,156,912 UART: [art] Derive Key Pair - Done
3,171,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,728 UART: [art] PUB.X = 16C3AFD1687E74E8F362F8A64231585E98F8795007E6B5E215A88DEA28093E507B9BDDC5738A6D534A268727257C5FE7
3,194,490 UART: [art] PUB.Y = 9459CAC7415F145BEEC464F9E6D6ECC4CFF8C052D10FA2891E7F5ACE07015834E0E826611955152354EA75E3FB2A4C01
3,201,436 UART: [art] SIG.R = 0AFC654F3B0726D390BC70233249C143D809A59C05E520C2D4AF3D6D25FBA802624795EA78AF18A3381BD52530D2E90B
3,208,190 UART: [art] SIG.S = 5364BE95CFDE9A5A11D361A4BE0D9FDB0069E3238567C428A78AD47DB15E807D360D20BCA0F4C035442E07E9A86EE5ED
3,232,023 UART: Caliptra RT
3,232,274 UART: [state] CFI Enabled
3,351,164 UART: [rt] RT listening for mailbox commands...
3,351,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,528 UART: [rt]cmd =0x44504543, len=96
3,564,830 >>> mbox cmd response data (6236 bytes)
3,564,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,594,856 UART: [rt]cmd =0x44504543, len=96
3,626,675 >>> mbox cmd response data (56 bytes)
3,626,676 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,656,075 UART: [rt]cmd =0x52564348, len=36
3,658,483 >>> mbox cmd response data (8 bytes)
3,658,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,509 UART: [rt]cmd =0x44504543, len=96
3,871,726 >>> mbox cmd response data (6236 bytes)
3,871,727 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,698 UART: [rt]cmd =0x53574545, len=84
3,928,078 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,453 ready_for_fw is high
1,059,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,886 >>> mbox cmd response: success
2,739,891 UART:
2,739,907 UART: Running Caliptra FMC ...
2,740,315 UART:
2,740,369 UART: [state] CFI Enabled
2,750,989 UART: [fht] FMC Alias Private Key: 7
2,870,193 UART: [art] Extend RT PCRs Done
2,870,621 UART: [art] Lock RT PCRs Done
2,872,039 UART: [art] Populate DV Done
2,880,170 UART: [fht] FMC Alias Private Key: 7
2,881,334 UART: [art] Derive CDI
2,881,614 UART: [art] Store in slot 0x4
2,967,089 UART: [art] Derive Key Pair
2,967,449 UART: [art] Store priv key in slot 0x5
2,980,379 UART: [art] Derive Key Pair - Done
2,995,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,594 UART: [art] PUB.X = 6DFB64EB760737BFED27A09A6A54517134B23AB091005C4340C5C27CC367E85B1639BE3BCF272E6FBFA7CA5365FACD6F
3,018,355 UART: [art] PUB.Y = 4B474BBA6FE24532ECE62AD72442319E71159A84893C58FE176E7A3DA30F262E92D8EC7F9A712498AFABCF5AE0D49851
3,025,312 UART: [art] SIG.R = F045950753419C30281A4DADEA17030ABC67B64EC949628439E59FE3F884A1914FAB4F1A12AD463570FEFDFDF7DAE286
3,032,083 UART: [art] SIG.S = 1F8C4B53B261D15A2F8FEE14609EC4DBC012D0537386337F30B1B16B2D5BAE83AE7F204895AF7AA70CB3679DC34F7342
3,055,526 UART: Caliptra RT
3,055,777 UART: [state] CFI Enabled
3,175,044 UART: [rt] RT listening for mailbox commands...
3,175,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,140 UART: [rt]cmd =0x44504543, len=96
3,388,445 >>> mbox cmd response data (6236 bytes)
3,388,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,449 UART: [rt]cmd =0x44504543, len=96
3,450,798 >>> mbox cmd response data (56 bytes)
3,450,799 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,424 UART: [rt]cmd =0x52564348, len=36
3,482,764 >>> mbox cmd response data (8 bytes)
3,482,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,708 UART: [rt]cmd =0x44504543, len=96
3,695,005 >>> mbox cmd response data (6236 bytes)
3,695,006 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,021 UART: [rt]cmd =0x53574545, len=84
3,750,207 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,553 UART: [state] LifecycleState = Unprovisioned
85,208 UART: [state] DebugLocked = No
85,716 UART: [state] WD Timer not started. Device not locked for debugging
86,921 UART: [kat] SHA2-256
892,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,696 UART: [kat] ++
896,848 UART: [kat] sha1
901,036 UART: [kat] SHA2-256
902,976 UART: [kat] SHA2-384
905,869 UART: [kat] SHA2-512-ACC
907,770 UART: [kat] ECC-384
917,573 UART: [kat] HMAC-384Kdf
922,215 UART: [kat] LMS
1,170,543 UART: [kat] --
1,171,192 UART: [cold-reset] ++
1,171,554 UART: [fht] FHT @ 0x50003400
1,174,133 UART: [idev] ++
1,174,301 UART: [idev] CDI.KEYID = 6
1,174,661 UART: [idev] SUBJECT.KEYID = 7
1,175,085 UART: [idev] UDS.KEYID = 0
1,175,430 ready_for_fw is high
1,175,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,089 UART: [idev] Erasing UDS.KEYID = 0
1,199,726 UART: [idev] Sha1 KeyId Algorithm
1,208,072 UART: [idev] --
1,209,172 UART: [ldev] ++
1,209,340 UART: [ldev] CDI.KEYID = 6
1,209,703 UART: [ldev] SUBJECT.KEYID = 5
1,210,129 UART: [ldev] AUTHORITY.KEYID = 7
1,210,592 UART: [ldev] FE.KEYID = 1
1,215,900 UART: [ldev] Erasing FE.KEYID = 1
1,242,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,554 UART: [ldev] --
1,281,907 UART: [fwproc] Wait for Commands...
1,282,579 UART: [fwproc] Recv command 0x46574c44
1,283,307 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,739 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,909 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,304 >>> mbox cmd response: success
2,826,506 UART: [afmc] ++
2,826,674 UART: [afmc] CDI.KEYID = 6
2,827,036 UART: [afmc] SUBJECT.KEYID = 7
2,827,461 UART: [afmc] AUTHORITY.KEYID = 5
2,863,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,031 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,740 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,623 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,324 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,046 UART: [afmc] --
2,906,974 UART: [cold-reset] --
2,907,800 UART: [state] Locking Datavault
2,908,845 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,449 UART: [state] Locking ICCM
2,910,003 UART: [exit] Launching FMC @ 0x40000130
2,915,333 UART:
2,915,349 UART: Running Caliptra FMC ...
2,915,757 UART:
2,915,900 UART: [state] CFI Enabled
2,926,422 UART: [fht] FMC Alias Private Key: 7
3,045,026 UART: [art] Extend RT PCRs Done
3,045,454 UART: [art] Lock RT PCRs Done
3,046,770 UART: [art] Populate DV Done
3,054,831 UART: [fht] FMC Alias Private Key: 7
3,056,013 UART: [art] Derive CDI
3,056,293 UART: [art] Store in slot 0x4
3,141,904 UART: [art] Derive Key Pair
3,142,264 UART: [art] Store priv key in slot 0x5
3,155,884 UART: [art] Derive Key Pair - Done
3,170,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,240 UART: [art] PUB.X = DD8863F27C32EA490AFC89D5895A3E218841730622443CB07D8B808161CA01126E9B05540B86413E363E415631B30A3B
3,193,982 UART: [art] PUB.Y = 5F5074B61E15CF4FBC41D10E8DFADEFF3E088C607F9A687E78EF39B78EFB0ED99012ABDAD8E15CFEBA24E64EB2A36F5F
3,200,955 UART: [art] SIG.R = 6BDCBF5C1DB7B4DEE575E85EDBCC81123838C8EFE75D16EF7525059EBDBFFD58E474ED11CE312138BCA4142695A416BB
3,207,746 UART: [art] SIG.S = 879643B05E02F8E45D5F046663F97FA9E64FD81C69889BA1C935C01B17AA4A5DB902CAD006970648BF4E75FA7DDDEE6B
3,231,987 UART: Caliptra RT
3,232,330 UART: [state] CFI Enabled
3,352,267 UART: [rt] RT listening for mailbox commands...
3,352,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,435 UART: [rt]cmd =0x44504543, len=96
3,566,595 >>> mbox cmd response data (6236 bytes)
3,566,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,596,681 UART: [rt]cmd =0x44504543, len=96
3,627,560 >>> mbox cmd response data (56 bytes)
3,627,561 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,657,156 UART: [rt]cmd =0x52564348, len=36
3,659,696 >>> mbox cmd response data (8 bytes)
3,659,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,666 UART: [rt]cmd =0x44504543, len=96
3,871,742 >>> mbox cmd response data (6236 bytes)
3,871,743 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,460 UART: [rt]cmd =0x53574545, len=84
3,927,716 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,288 ready_for_fw is high
1,061,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,717 >>> mbox cmd response: success
2,743,984 UART:
2,744,000 UART: Running Caliptra FMC ...
2,744,408 UART:
2,744,551 UART: [state] CFI Enabled
2,755,347 UART: [fht] FMC Alias Private Key: 7
2,874,383 UART: [art] Extend RT PCRs Done
2,874,811 UART: [art] Lock RT PCRs Done
2,876,191 UART: [art] Populate DV Done
2,884,610 UART: [fht] FMC Alias Private Key: 7
2,885,602 UART: [art] Derive CDI
2,885,882 UART: [art] Store in slot 0x4
2,971,641 UART: [art] Derive Key Pair
2,972,001 UART: [art] Store priv key in slot 0x5
2,985,409 UART: [art] Derive Key Pair - Done
3,000,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,731 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,496 UART: [art] PUB.X = E353796967607EA306B948C411C5DCE5396788CC942A728516317C369E9546E0D9236E8CF81CAC040DE8A3A95BE87E64
3,023,253 UART: [art] PUB.Y = A6F3002B9896210E9FCBA9CBC7B0BA031B55D5006F1BB233477C99CA911453CDF145461EC4D70ED50C887C6452B5B7AC
3,030,157 UART: [art] SIG.R = 936C833C51BD2C8A997AEFDBE0B9D874AE923B54D58064C03112C4C63E9C5D5A8718C8CFF3219038A734994A7C915A8C
3,036,933 UART: [art] SIG.S = BA13E0C60B4ED10218EA590EAEA0950C5EFEFB0951CA28D295F36DCB380DE12B84E45783C58DA0F7A94A2CA44B33E029
3,061,115 UART: Caliptra RT
3,061,458 UART: [state] CFI Enabled
3,181,368 UART: [rt] RT listening for mailbox commands...
3,182,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,460 UART: [rt]cmd =0x44504543, len=96
3,394,628 >>> mbox cmd response data (6236 bytes)
3,394,629 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,424,674 UART: [rt]cmd =0x44504543, len=96
3,456,315 >>> mbox cmd response data (56 bytes)
3,456,316 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,073 UART: [rt]cmd =0x52564348, len=36
3,488,627 >>> mbox cmd response data (8 bytes)
3,488,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,615 UART: [rt]cmd =0x44504543, len=96
3,700,749 >>> mbox cmd response data (6236 bytes)
3,700,750 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,525 UART: [rt]cmd =0x53574545, len=84
3,756,377 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,167 UART:
192,542 UART: Running Caliptra ROM ...
193,737 UART:
193,893 UART: [state] CFI Enabled
264,447 UART: [state] LifecycleState = Unprovisioned
266,441 UART: [state] DebugLocked = No
267,756 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,702 UART: [kat] SHA2-256
442,415 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,880 UART: [kat] ++
453,442 UART: [kat] sha1
464,461 UART: [kat] SHA2-256
467,122 UART: [kat] SHA2-384
473,075 UART: [kat] SHA2-512-ACC
475,491 UART: [kat] ECC-384
2,767,221 UART: [kat] HMAC-384Kdf
2,797,893 UART: [kat] LMS
3,988,212 UART: [kat] --
3,992,806 UART: [cold-reset] ++
3,995,113 UART: [fht] Storing FHT @ 0x50003400
4,006,100 UART: [idev] ++
4,006,674 UART: [idev] CDI.KEYID = 6
4,007,713 UART: [idev] SUBJECT.KEYID = 7
4,008,897 UART: [idev] UDS.KEYID = 0
4,009,955 ready_for_fw is high
4,010,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,242 UART: [idev] Erasing UDS.KEYID = 0
7,342,576 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,944 UART: [idev] --
7,367,847 UART: [ldev] ++
7,368,429 UART: [ldev] CDI.KEYID = 6
7,369,451 UART: [ldev] SUBJECT.KEYID = 5
7,370,612 UART: [ldev] AUTHORITY.KEYID = 7
7,371,864 UART: [ldev] FE.KEYID = 1
7,399,860 UART: [ldev] Erasing FE.KEYID = 1
10,733,386 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,312 UART: [ldev] --
13,114,272 UART: [fwproc] Waiting for Commands...
13,116,594 UART: [fwproc] Received command 0x46574c44
13,118,781 UART: [fwproc] Received Image of size 118548 bytes
17,226,607 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,376 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,553 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,704,250 >>> mbox cmd response: success
17,708,477 UART: [afmc] ++
17,709,119 UART: [afmc] CDI.KEYID = 6
17,710,093 UART: [afmc] SUBJECT.KEYID = 7
17,711,260 UART: [afmc] AUTHORITY.KEYID = 5
21,066,307 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,828 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,112 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,497 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,247 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,671 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,668 UART: [afmc] --
23,440,018 UART: [cold-reset] --
23,445,240 UART: [state] Locking Datavault
23,452,756 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,519 UART: [state] Locking ICCM
23,456,617 UART: [exit] Launching FMC @ 0x40000130
23,465,016 UART:
23,465,276 UART: Running Caliptra FMC ...
23,466,380 UART:
23,466,539 UART: [state] CFI Enabled
23,528,200 UART: [fht] FMC Alias Private Key: 7
25,867,654 UART: [art] Extend RT PCRs Done
25,868,874 UART: [art] Lock RT PCRs Done
25,870,551 UART: [art] Populate DV Done
25,875,853 UART: [fht] FMC Alias Private Key: 7
25,877,499 UART: [art] Derive CDI
25,878,313 UART: [art] Store in slot 0x4
25,936,936 UART: [art] Derive Key Pair
25,937,973 UART: [art] Store priv key in slot 0x5
29,230,662 UART: [art] Derive Key Pair - Done
29,243,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,568 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,083 UART: [art] PUB.X = 03EAD3A34A4ED3BC45F500EC9A2B6108CE95EE9CFE426BB0139E4406B003B74A511FF62BE18C21C5325C02C14147A15C
31,541,315 UART: [art] PUB.Y = 5D6FC8C2CE95946B06B27F19377B775AD0C72F3B314C995A31EA9CFA62DC566A12DF4DDAB3C9B7684BC96DC0F3AD6BFA
31,548,631 UART: [art] SIG.R = A37A56238BD5AAAEE00E73B2326B9B26E7ABDEAA714287845FEE97D30CDE3DB61FEF33580C6248EABD8987DB6DAF436F
31,556,047 UART: [art] SIG.S = 59A6C0ABE92B28DFE33C1F529C013608D8830C9F20C2E88E733011071190B38CFF17110C37C300F82D22ED9707BABAE1
32,861,000 UART: Caliptra RT
32,861,738 UART: [state] CFI Enabled
33,039,126 UART: [rt] RT listening for mailbox commands...
33,041,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,072,108 UART: [rt]cmd =0x44504543, len=96
38,841,715 >>> mbox cmd response data (6236 bytes)
38,871,191 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,901,649 UART: [rt]cmd =0x53574545, len=84
44,488,373 >>> mbox cmd response data (200 bytes)
44,877,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,908,179 UART: [rt]cmd =0x44504543, len=96
44,940,357 >>> mbox cmd response data (56 bytes)
44,941,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,971,576 UART: [rt]cmd =0x44504543, len=96
45,019,251 >>> mbox cmd response data (24 bytes)
45,019,820 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,049,978 UART: [rt]cmd =0x53574545, len=84
50,632,487 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,807,430 ready_for_fw is high
3,807,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,989,000 >>> mbox cmd response: success
23,692,570 UART:
23,692,998 UART: Running Caliptra FMC ...
23,694,163 UART:
23,694,324 UART: [state] CFI Enabled
23,759,703 UART: [fht] FMC Alias Private Key: 7
26,100,414 UART: [art] Extend RT PCRs Done
26,101,651 UART: [art] Lock RT PCRs Done
26,103,380 UART: [art] Populate DV Done
26,108,821 UART: [fht] FMC Alias Private Key: 7
26,110,257 UART: [art] Derive CDI
26,111,024 UART: [art] Store in slot 0x4
26,168,131 UART: [art] Derive Key Pair
26,169,173 UART: [art] Store priv key in slot 0x5
29,461,771 UART: [art] Derive Key Pair - Done
29,474,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,764,022 UART: [art] Erasing AUTHORITY.KEYID = 7
31,765,528 UART: [art] PUB.X = F969F1D62BD2DDAB7AF605174777D53FB2722C85B5F7F60CE20E000729A3946D19A30CE64809A0029F9BF5492C0CC53D
31,772,738 UART: [art] PUB.Y = D0634328B65ABEC002FD63CABD97040938683DD7D3D6842A91A20773740E11A21BC360453E8CF84732FAE6CF112F22D6
31,780,001 UART: [art] SIG.R = 56B2D4F2F579C2794BF4C35E33BCA11C9FF990BF6D8E0A222CB3E40D99F75A4F69EADDEBE102362E67A3572026ABA1ED
31,787,421 UART: [art] SIG.S = 081E11BF1525EF293E462F0D58F124049D4CF5C2BD30BF712FCA04D718E07E26A92B597A2591FD3069C4AD4A441DE494
33,092,622 UART: Caliptra RT
33,093,330 UART: [state] CFI Enabled
33,269,791 UART: [rt] RT listening for mailbox commands...
33,272,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,302,702 UART: [rt]cmd =0x44504543, len=96
39,073,218 >>> mbox cmd response data (6236 bytes)
39,102,634 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,133,169 UART: [rt]cmd =0x53574545, len=84
44,718,345 >>> mbox cmd response data (200 bytes)
45,103,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,134,437 UART: [rt]cmd =0x44504543, len=96
45,166,408 >>> mbox cmd response data (56 bytes)
45,167,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,197,870 UART: [rt]cmd =0x44504543, len=96
45,248,159 >>> mbox cmd response data (24 bytes)
45,248,716 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,278,985 UART: [rt]cmd =0x53574545, len=84
50,859,890 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,511 UART:
192,868 UART: Running Caliptra ROM ...
194,069 UART:
603,841 UART: [state] CFI Enabled
618,153 UART: [state] LifecycleState = Unprovisioned
620,138 UART: [state] DebugLocked = No
622,099 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,339 UART: [kat] SHA2-256
796,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,637 UART: [kat] ++
807,083 UART: [kat] sha1
818,734 UART: [kat] SHA2-256
821,451 UART: [kat] SHA2-384
826,228 UART: [kat] SHA2-512-ACC
828,590 UART: [kat] ECC-384
3,113,891 UART: [kat] HMAC-384Kdf
3,124,628 UART: [kat] LMS
4,314,794 UART: [kat] --
4,318,497 UART: [cold-reset] ++
4,320,074 UART: [fht] Storing FHT @ 0x50003400
4,331,337 UART: [idev] ++
4,331,958 UART: [idev] CDI.KEYID = 6
4,332,834 UART: [idev] SUBJECT.KEYID = 7
4,334,139 UART: [idev] UDS.KEYID = 0
4,335,120 ready_for_fw is high
4,335,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,256 UART: [idev] Erasing UDS.KEYID = 0
7,622,382 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,303 UART: [idev] --
7,647,863 UART: [ldev] ++
7,648,429 UART: [ldev] CDI.KEYID = 6
7,649,539 UART: [ldev] SUBJECT.KEYID = 5
7,650,636 UART: [ldev] AUTHORITY.KEYID = 7
7,651,855 UART: [ldev] FE.KEYID = 1
7,662,745 UART: [ldev] Erasing FE.KEYID = 1
10,954,604 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,840 UART: [ldev] --
13,315,473 UART: [fwproc] Waiting for Commands...
13,318,213 UART: [fwproc] Received command 0x46574c44
13,320,391 UART: [fwproc] Received Image of size 118548 bytes
17,427,466 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,029 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,175 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,033 >>> mbox cmd response: success
17,906,108 UART: [afmc] ++
17,906,725 UART: [afmc] CDI.KEYID = 6
17,907,649 UART: [afmc] SUBJECT.KEYID = 7
17,908,868 UART: [afmc] AUTHORITY.KEYID = 5
21,221,917 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,771 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,073 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,469 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,218 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,634 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,201 UART: [afmc] --
23,588,556 UART: [cold-reset] --
23,592,966 UART: [state] Locking Datavault
23,597,291 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,034 UART: [state] Locking ICCM
23,600,318 UART: [exit] Launching FMC @ 0x40000130
23,608,704 UART:
23,608,933 UART: Running Caliptra FMC ...
23,610,040 UART:
23,610,202 UART: [state] CFI Enabled
23,618,620 UART: [fht] FMC Alias Private Key: 7
25,958,750 UART: [art] Extend RT PCRs Done
25,959,967 UART: [art] Lock RT PCRs Done
25,961,910 UART: [art] Populate DV Done
25,967,317 UART: [fht] FMC Alias Private Key: 7
25,968,899 UART: [art] Derive CDI
25,969,702 UART: [art] Store in slot 0x4
26,012,776 UART: [art] Derive Key Pair
26,013,818 UART: [art] Store priv key in slot 0x5
29,256,013 UART: [art] Derive Key Pair - Done
29,269,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,433 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,952 UART: [art] PUB.X = 75A126053974528F9DFFA9F472F4E8B63E58786D4A651DDB539CF80F0D79669D97C119C97B1E034937BB036D6479A3DA
31,558,223 UART: [art] PUB.Y = 565CDC3D1331194B19FF5EFBFB2CF6113CFE2E55423C5DA44E0EF799BF5D483382FF877DB8CFDE3B6A8D82221A34F3D2
31,565,529 UART: [art] SIG.R = 7194556F3C2E9CBE1B0E58EF2B775A896D6CEB37CAB8E93CE5925AA561C6A5E1DD7B34175491860100F8EED881CE9289
31,572,869 UART: [art] SIG.S = ED179EB04B1C370E6BED8B45BC956CF0CC1DF7B78CDF36E4D34D1607449D52FF7D97CC8FBEBB2576044481481AC3A6A0
32,878,074 UART: Caliptra RT
32,878,785 UART: [state] CFI Enabled
33,012,106 UART: [rt] RT listening for mailbox commands...
33,014,402 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,045,073 UART: [rt]cmd =0x44504543, len=96
38,719,969 >>> mbox cmd response data (6236 bytes)
38,749,121 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,779,634 UART: [rt]cmd =0x53574545, len=84
44,304,230 >>> mbox cmd response data (200 bytes)
44,689,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,720,324 UART: [rt]cmd =0x44504543, len=96
44,752,302 >>> mbox cmd response data (56 bytes)
44,753,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,783,773 UART: [rt]cmd =0x44504543, len=96
44,822,277 >>> mbox cmd response data (24 bytes)
44,822,842 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,853,085 UART: [rt]cmd =0x53574545, len=84
50,377,493 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,127,761 ready_for_fw is high
4,128,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,048 >>> mbox cmd response: success
23,788,831 UART:
23,789,241 UART: Running Caliptra FMC ...
23,790,376 UART:
23,790,539 UART: [state] CFI Enabled
23,798,849 UART: [fht] FMC Alias Private Key: 7
26,139,269 UART: [art] Extend RT PCRs Done
26,140,496 UART: [art] Lock RT PCRs Done
26,142,066 UART: [art] Populate DV Done
26,147,653 UART: [fht] FMC Alias Private Key: 7
26,149,243 UART: [art] Derive CDI
26,150,053 UART: [art] Store in slot 0x4
26,192,327 UART: [art] Derive Key Pair
26,193,344 UART: [art] Store priv key in slot 0x5
29,435,441 UART: [art] Derive Key Pair - Done
29,448,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,426 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,930 UART: [art] PUB.X = 5EDDCE95EF6BB3E8A1A5F446070566D135D5F99DF2E5826C2992362775D586DEF7B15DCB6777E01B305F3BE90C93D192
31,737,233 UART: [art] PUB.Y = F6A74732826A50AB1E775F149E14B2692CF0A37F5E4E949EC057AE2E2C3521F62BD376EF53450DB8EA19ABFFCA750184
31,744,474 UART: [art] SIG.R = 804D6ED0BC2C01CFFA50B116A531B430571DF55479E51AC31A9C503EF9A82051552507DC58DC7CE323F183F761C44A99
31,751,865 UART: [art] SIG.S = 0E86D1FEAF6AC78B6B0F774BF1127512FEB0F16CBCA9AAF11187A4BEFA9F52A1EE6AB07A57AB31DF9E694005A3AC063F
33,057,405 UART: Caliptra RT
33,058,126 UART: [state] CFI Enabled
33,191,982 UART: [rt] RT listening for mailbox commands...
33,194,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,225,028 UART: [rt]cmd =0x44504543, len=96
38,899,635 >>> mbox cmd response data (6236 bytes)
38,928,961 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,959,464 UART: [rt]cmd =0x53574545, len=84
44,484,022 >>> mbox cmd response data (200 bytes)
44,869,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,900,527 UART: [rt]cmd =0x44504543, len=96
44,931,745 >>> mbox cmd response data (56 bytes)
44,932,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,962,953 UART: [rt]cmd =0x44504543, len=96
45,001,308 >>> mbox cmd response data (24 bytes)
45,001,905 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,032,368 UART: [rt]cmd =0x53574545, len=84
50,556,198 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,132 UART:
192,493 UART: Running Caliptra ROM ...
193,680 UART:
193,828 UART: [state] CFI Enabled
261,979 UART: [state] LifecycleState = Unprovisioned
263,913 UART: [state] DebugLocked = No
266,890 UART: [state] WD Timer not started. Device not locked for debugging
269,925 UART: [kat] SHA2-256
449,625 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,369 UART: [kat] ++
460,845 UART: [kat] sha1
471,712 UART: [kat] SHA2-256
474,370 UART: [kat] SHA2-384
480,289 UART: [kat] SHA2-512-ACC
482,651 UART: [kat] ECC-384
2,946,380 UART: [kat] HMAC-384Kdf
2,969,489 UART: [kat] LMS
3,445,970 UART: [kat] --
3,449,751 UART: [cold-reset] ++
3,452,180 UART: [fht] FHT @ 0x50003400
3,463,719 UART: [idev] ++
3,464,286 UART: [idev] CDI.KEYID = 6
3,465,334 UART: [idev] SUBJECT.KEYID = 7
3,466,509 UART: [idev] UDS.KEYID = 0
3,467,432 ready_for_fw is high
3,467,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,627 UART: [idev] Erasing UDS.KEYID = 0
5,987,358 UART: [idev] Sha1 KeyId Algorithm
6,011,022 UART: [idev] --
6,017,239 UART: [ldev] ++
6,017,813 UART: [ldev] CDI.KEYID = 6
6,018,721 UART: [ldev] SUBJECT.KEYID = 5
6,019,934 UART: [ldev] AUTHORITY.KEYID = 7
6,021,161 UART: [ldev] FE.KEYID = 1
6,054,594 UART: [ldev] Erasing FE.KEYID = 1
8,561,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,734 UART: [ldev] --
10,371,641 UART: [fwproc] Wait for Commands...
10,373,410 UART: [fwproc] Recv command 0x46574c44
10,375,451 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,280 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,041 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,057 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,201 >>> mbox cmd response: success
14,349,974 UART: [afmc] ++
14,350,594 UART: [afmc] CDI.KEYID = 6
14,351,483 UART: [afmc] SUBJECT.KEYID = 7
14,352,698 UART: [afmc] AUTHORITY.KEYID = 5
16,894,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,584 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,380 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,472 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,028 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,374 UART: [afmc] --
18,693,691 UART: [cold-reset] --
18,697,709 UART: [state] Locking Datavault
18,703,808 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,567 UART: [state] Locking ICCM
18,707,123 UART: [exit] Launching FMC @ 0x40000130
18,715,517 UART:
18,715,756 UART: Running Caliptra FMC ...
18,716,859 UART:
18,717,020 UART: [state] CFI Enabled
18,773,487 UART: [fht] FMC Alias Private Key: 7
20,561,064 UART: [art] Extend RT PCRs Done
20,562,301 UART: [art] Lock RT PCRs Done
20,563,816 UART: [art] Populate DV Done
20,569,234 UART: [fht] FMC Alias Private Key: 7
20,570,926 UART: [art] Derive CDI
20,571,661 UART: [art] Store in slot 0x4
20,627,087 UART: [art] Derive Key Pair
20,628,132 UART: [art] Store priv key in slot 0x5
23,090,718 UART: [art] Derive Key Pair - Done
23,103,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,816,533 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,034 UART: [art] PUB.X = 25A4D77BB615FE2E4EE0E66BD71B31A16D14E5A5F55C97168F2D6815F8B223927210026377BA31BEFCBCE87583484F56
24,825,283 UART: [art] PUB.Y = FF7AAD5D3A744033CB3C38F73FBBF5DD879EDFC7AA01C565685A3D5CE0349844640FA10F9847A3458391CD7F1C538654
24,832,569 UART: [art] SIG.R = 32A862099E86C200E9A4732215A9A64629F63F12D1DDC2C5D7F881E345451CA2F6ACC9D740A92FB4952C904124FC55AE
24,839,919 UART: [art] SIG.S = 9321B08E5B6AD1C841E04BB35210D7116A1E0DB93D398236C4BC561F7FCBD50B4B42CAB39450C1324F9094921EF651A1
25,818,400 UART: Caliptra RT
25,819,099 UART: [state] CFI Enabled
25,999,198 UART: [rt] RT listening for mailbox commands...
26,001,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,032,084 UART: [rt]cmd =0x44504543, len=96
30,396,305 >>> mbox cmd response data (6236 bytes)
30,425,495 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,456,096 UART: [rt]cmd =0x53574545, len=84
34,633,615 >>> mbox cmd response data (200 bytes)
35,016,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,047,701 UART: [rt]cmd =0x44504543, len=96
35,079,683 >>> mbox cmd response data (56 bytes)
35,080,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,110,806 UART: [rt]cmd =0x44504543, len=96
35,161,851 >>> mbox cmd response data (24 bytes)
35,162,420 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,192,758 UART: [rt]cmd =0x53574545, len=84
39,369,317 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,459,655 ready_for_fw is high
3,460,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,232,320 >>> mbox cmd response: success
18,512,904 UART:
18,513,293 UART: Running Caliptra FMC ...
18,514,589 UART:
18,514,755 UART: [state] CFI Enabled
18,581,127 UART: [fht] FMC Alias Private Key: 7
20,347,615 UART: [art] Extend RT PCRs Done
20,348,855 UART: [art] Lock RT PCRs Done
20,350,380 UART: [art] Populate DV Done
20,355,813 UART: [fht] FMC Alias Private Key: 7
20,357,390 UART: [art] Derive CDI
20,358,127 UART: [art] Store in slot 0x4
20,414,188 UART: [art] Derive Key Pair
20,415,185 UART: [art] Store priv key in slot 0x5
22,877,974 UART: [art] Derive Key Pair - Done
22,890,586 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,373 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,874 UART: [art] PUB.X = 577D2C134BC75AF8A2309ABD2BF24F21572C8DD4413ACC7B1540C5184425C021301AC3F3D9D0ED0C34470C0512D906A2
24,613,179 UART: [art] PUB.Y = DAD3C8A2FFE2C65BC7215007C6F01DFA97DD6D55684A3B911719711EE421600CCF300979C6C9CC380B2DFC1DC7F60769
24,620,425 UART: [art] SIG.R = F7BAC6F0C2642D7983D0A80AE09E73F9E3BFEF54CB5C34B215659639F0B41C586BE631C6A63FCA579D148123C1BE02DA
24,627,812 UART: [art] SIG.S = 745457F1E9616549E0FA4DDA45083315A30AD881487B9299FB8846D9CE579B2279826D81201588320AAAD1235CB8301B
25,606,803 UART: Caliptra RT
25,607,493 UART: [state] CFI Enabled
25,789,002 UART: [rt] RT listening for mailbox commands...
25,791,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,821,939 UART: [rt]cmd =0x44504543, len=96
30,185,354 >>> mbox cmd response data (6236 bytes)
30,214,718 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,245,186 UART: [rt]cmd =0x53574545, len=84
34,423,548 >>> mbox cmd response data (200 bytes)
34,806,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,837,686 UART: [rt]cmd =0x44504543, len=96
34,868,935 >>> mbox cmd response data (56 bytes)
34,869,718 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,900,053 UART: [rt]cmd =0x44504543, len=96
34,951,778 >>> mbox cmd response data (24 bytes)
34,952,379 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,982,737 UART: [rt]cmd =0x53574545, len=84
39,159,529 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,367 UART:
192,734 UART: Running Caliptra ROM ...
193,839 UART:
603,494 UART: [state] CFI Enabled
615,829 UART: [state] LifecycleState = Unprovisioned
617,781 UART: [state] DebugLocked = No
619,942 UART: [state] WD Timer not started. Device not locked for debugging
623,725 UART: [kat] SHA2-256
803,362 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,136 UART: [kat] ++
814,664 UART: [kat] sha1
825,397 UART: [kat] SHA2-256
828,059 UART: [kat] SHA2-384
833,416 UART: [kat] SHA2-512-ACC
835,789 UART: [kat] ECC-384
3,275,673 UART: [kat] HMAC-384Kdf
3,287,695 UART: [kat] LMS
3,764,210 UART: [kat] --
3,767,922 UART: [cold-reset] ++
3,770,561 UART: [fht] FHT @ 0x50003400
3,781,625 UART: [idev] ++
3,782,227 UART: [idev] CDI.KEYID = 6
3,783,118 UART: [idev] SUBJECT.KEYID = 7
3,784,387 UART: [idev] UDS.KEYID = 0
3,785,292 ready_for_fw is high
3,785,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,934,425 UART: [idev] Erasing UDS.KEYID = 0
6,265,335 UART: [idev] Sha1 KeyId Algorithm
6,289,916 UART: [idev] --
6,295,050 UART: [ldev] ++
6,295,632 UART: [ldev] CDI.KEYID = 6
6,296,572 UART: [ldev] SUBJECT.KEYID = 5
6,297,786 UART: [ldev] AUTHORITY.KEYID = 7
6,299,020 UART: [ldev] FE.KEYID = 1
6,312,454 UART: [ldev] Erasing FE.KEYID = 1
8,788,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,190 UART: [ldev] --
10,583,546 UART: [fwproc] Wait for Commands...
10,585,756 UART: [fwproc] Recv command 0x46574c44
10,587,739 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,405 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,450 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,460 >>> mbox cmd response: success
14,558,891 UART: [afmc] ++
14,559,513 UART: [afmc] CDI.KEYID = 6
14,560,438 UART: [afmc] SUBJECT.KEYID = 7
14,561,658 UART: [afmc] AUTHORITY.KEYID = 5
17,068,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,791,154 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,992 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,823,048 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,587 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,175 UART: [afmc] --
18,866,446 UART: [cold-reset] --
18,870,361 UART: [state] Locking Datavault
18,876,366 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,124 UART: [state] Locking ICCM
18,880,357 UART: [exit] Launching FMC @ 0x40000130
18,888,759 UART:
18,888,996 UART: Running Caliptra FMC ...
18,890,099 UART:
18,890,258 UART: [state] CFI Enabled
18,898,090 UART: [fht] FMC Alias Private Key: 7
20,664,920 UART: [art] Extend RT PCRs Done
20,666,140 UART: [art] Lock RT PCRs Done
20,667,762 UART: [art] Populate DV Done
20,673,226 UART: [fht] FMC Alias Private Key: 7
20,674,766 UART: [art] Derive CDI
20,675,582 UART: [art] Store in slot 0x4
20,718,396 UART: [art] Derive Key Pair
20,719,399 UART: [art] Store priv key in slot 0x5
23,146,553 UART: [art] Derive Key Pair - Done
23,159,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,821 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,326 UART: [art] PUB.X = 8232A89B3F0D315CAEA102B2605C6E149906BA7D539B311B9C8DD0E4DDFB89327487280B8436A07BCA7A57CFEE5EA0EA
24,874,572 UART: [art] PUB.Y = 804EEAFD6CCCA689758F001784ED6F65CBBF8E7AE9549F8D0C551F145264FC6C4EC5E968DD4E20474D4868238E79FABE
24,881,849 UART: [art] SIG.R = 9058B36DC3AB51D146D37911E3EA023ADB1A94E9E0BDF79168A6D83D6656BF49E0E8D7704DB8056860B08B0018758BBF
24,889,237 UART: [art] SIG.S = 79ED89946D4C58B3987376FA21E750196B80ACC1521D3EE6E884E6A63CD892AE8535F71D20FC2FC02858E707700C2ADB
25,868,862 UART: Caliptra RT
25,870,112 UART: [state] CFI Enabled
26,003,299 UART: [rt] RT listening for mailbox commands...
26,005,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,036,596 UART: [rt]cmd =0x44504543, len=96
30,322,612 >>> mbox cmd response data (6236 bytes)
30,352,037 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,382,875 UART: [rt]cmd =0x53574545, len=84
34,518,549 >>> mbox cmd response data (200 bytes)
34,901,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,931,959 UART: [rt]cmd =0x44504543, len=96
34,962,728 >>> mbox cmd response data (56 bytes)
34,963,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,993,893 UART: [rt]cmd =0x44504543, len=96
35,032,561 >>> mbox cmd response data (24 bytes)
35,033,124 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,063,440 UART: [rt]cmd =0x53574545, len=84
39,199,193 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,779,781 ready_for_fw is high
3,780,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,439,569 >>> mbox cmd response: success
18,696,279 UART:
18,696,669 UART: Running Caliptra FMC ...
18,697,777 UART:
18,697,936 UART: [state] CFI Enabled
18,705,515 UART: [fht] FMC Alias Private Key: 7
20,471,218 UART: [art] Extend RT PCRs Done
20,472,449 UART: [art] Lock RT PCRs Done
20,474,142 UART: [art] Populate DV Done
20,479,563 UART: [fht] FMC Alias Private Key: 7
20,481,172 UART: [art] Derive CDI
20,481,992 UART: [art] Store in slot 0x4
20,524,165 UART: [art] Derive Key Pair
20,525,225 UART: [art] Store priv key in slot 0x5
22,952,303 UART: [art] Derive Key Pair - Done
22,965,250 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,343 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,841 UART: [art] PUB.X = 6496AE09D18F8E63C4B5D9341E68921A1D727EEEA07C041FCF7B0D0AB6392D96619825BAC4859A4031C15DF2DB36ECBE
24,680,101 UART: [art] PUB.Y = 26AB6221CA8BDF6FBA6E7509727D2CBC0A08348312E4B3632D7BA46BA0497B08DFD622180A0521219C9694860A73D291
24,687,361 UART: [art] SIG.R = A807096309B5A9CA3E5FBCB3C0078633F499921D895635A757BC89618585AA4AD7794409F1EA9E64D2C49B3A34318B78
24,694,723 UART: [art] SIG.S = A14D95E3961E6244F51AE0606056BD557C0E0342110FA057AB2231A9D9524174CEEA95CB859D0487E8109F9688A4D4F2
25,673,662 UART: Caliptra RT
25,674,373 UART: [state] CFI Enabled
25,807,163 UART: [rt] RT listening for mailbox commands...
25,809,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,840,294 UART: [rt]cmd =0x44504543, len=96
30,125,410 >>> mbox cmd response data (6236 bytes)
30,154,537 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,185,159 UART: [rt]cmd =0x53574545, len=84
34,320,691 >>> mbox cmd response data (200 bytes)
34,704,192 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,735,026 UART: [rt]cmd =0x44504543, len=96
34,766,760 >>> mbox cmd response data (56 bytes)
34,767,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,798,198 UART: [rt]cmd =0x44504543, len=96
34,836,557 >>> mbox cmd response data (24 bytes)
34,837,154 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,867,617 UART: [rt]cmd =0x53574545, len=84
39,003,693 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,142 UART:
192,502 UART: Running Caliptra ROM ...
193,596 UART:
193,739 UART: [state] CFI Enabled
261,391 UART: [state] LifecycleState = Unprovisioned
263,729 UART: [state] DebugLocked = No
265,486 UART: [state] WD Timer not started. Device not locked for debugging
271,006 UART: [kat] SHA2-256
460,856 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,618 UART: [kat] ++
472,097 UART: [kat] sha1
484,626 UART: [kat] SHA2-256
487,635 UART: [kat] SHA2-384
493,339 UART: [kat] SHA2-512-ACC
495,916 UART: [kat] ECC-384
2,947,364 UART: [kat] HMAC-384Kdf
2,970,047 UART: [kat] LMS
3,501,799 UART: [kat] --
3,507,636 UART: [cold-reset] ++
3,509,987 UART: [fht] FHT @ 0x50003400
3,521,747 UART: [idev] ++
3,522,377 UART: [idev] CDI.KEYID = 6
3,523,356 UART: [idev] SUBJECT.KEYID = 7
3,524,528 UART: [idev] UDS.KEYID = 0
3,525,449 ready_for_fw is high
3,525,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,695 UART: [idev] Erasing UDS.KEYID = 0
6,032,709 UART: [idev] Sha1 KeyId Algorithm
6,054,364 UART: [idev] --
6,059,159 UART: [ldev] ++
6,059,872 UART: [ldev] CDI.KEYID = 6
6,060,798 UART: [ldev] SUBJECT.KEYID = 5
6,061,961 UART: [ldev] AUTHORITY.KEYID = 7
6,063,139 UART: [ldev] FE.KEYID = 1
6,100,525 UART: [ldev] Erasing FE.KEYID = 1
8,606,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,426 UART: [ldev] --
10,412,229 UART: [fwproc] Wait for Commands...
10,414,864 UART: [fwproc] Recv command 0x46574c44
10,417,190 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,491 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,115,094 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,674,775 >>> mbox cmd response: success
14,678,819 UART: [afmc] ++
14,679,542 UART: [afmc] CDI.KEYID = 6
14,680,796 UART: [afmc] SUBJECT.KEYID = 7
14,682,234 UART: [afmc] AUTHORITY.KEYID = 5
17,215,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,688 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,783 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,929 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,827 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,405 UART: [afmc] --
19,033,354 UART: [cold-reset] --
19,037,061 UART: [state] Locking Datavault
19,042,265 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,412 UART: [state] Locking ICCM
19,046,494 UART: [exit] Launching FMC @ 0x40000130
19,055,113 UART:
19,055,346 UART: Running Caliptra FMC ...
19,056,372 UART:
19,056,520 UART: [state] CFI Enabled
19,116,071 UART: [fht] FMC Alias Private Key: 7
20,903,477 UART: [art] Extend RT PCRs Done
20,904,698 UART: [art] Lock RT PCRs Done
20,906,132 UART: [art] Populate DV Done
20,911,707 UART: [fht] FMC Alias Private Key: 7
20,913,406 UART: [art] Derive CDI
20,914,217 UART: [art] Store in slot 0x4
20,968,632 UART: [art] Derive Key Pair
20,969,670 UART: [art] Store priv key in slot 0x5
23,432,107 UART: [art] Derive Key Pair - Done
23,444,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,157,924 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,419 UART: [art] PUB.X = 64716D5086466FA15B5A47BA0626E64DA106AC1C7ECB50DAD02124D074E77B9D5BCAE7C018FE4DDEA3ABE6051130F8A3
25,166,693 UART: [art] PUB.Y = B776265E9681F252A8CF8C6921F31D5F995E73E0056609B2FDF2C7201B7E7FBFD10879F8BE7108710E2CB06F0612C4F3
25,173,998 UART: [art] SIG.R = F11611695365847ED1EE9928ECAC8278B4D5B20B8C58959C393B3D3EF505C34BC6B9067AF72393C7048271400548DDEF
25,181,394 UART: [art] SIG.S = 572224826B2E257F2A2F8DA509C55CF322D53298ADCB1AE60E1AB25F87C3B0C7B7C447EF9E7490DB0289F3B587D0AEBF
26,160,095 UART: Caliptra RT
26,160,811 UART: [state] CFI Enabled
26,339,748 UART: [rt] RT listening for mailbox commands...
26,342,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,372,985 UART: [rt]cmd =0x44504543, len=96
30,736,734 >>> mbox cmd response data (6236 bytes)
30,765,864 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,796,779 UART: [rt]cmd =0x53574545, len=84
34,979,556 >>> mbox cmd response data (200 bytes)
35,362,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,393,920 UART: [rt]cmd =0x44504543, len=96
35,425,426 >>> mbox cmd response data (56 bytes)
35,426,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,456,779 UART: [rt]cmd =0x44504543, len=96
35,507,896 >>> mbox cmd response data (24 bytes)
35,508,481 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,538,834 UART: [rt]cmd =0x53574545, len=84
39,715,795 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,436,257 ready_for_fw is high
3,436,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,818,679 >>> mbox cmd response: success
19,110,159 UART:
19,110,542 UART: Running Caliptra FMC ...
19,111,652 UART:
19,111,802 UART: [state] CFI Enabled
19,177,392 UART: [fht] FMC Alias Private Key: 7
20,943,967 UART: [art] Extend RT PCRs Done
20,945,199 UART: [art] Lock RT PCRs Done
20,947,026 UART: [art] Populate DV Done
20,952,421 UART: [fht] FMC Alias Private Key: 7
20,954,122 UART: [art] Derive CDI
20,954,938 UART: [art] Store in slot 0x4
21,009,927 UART: [art] Derive Key Pair
21,010,935 UART: [art] Store priv key in slot 0x5
23,473,420 UART: [art] Derive Key Pair - Done
23,486,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,113 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,628 UART: [art] PUB.X = 7E58060B13A0C90E6B8177691A071A48A19830EDE606878C7E415C75BE56B3DBBEC0DAD220451AE7C65694669756102F
25,208,883 UART: [art] PUB.Y = 44A0B193B883C3E84B4AEE046686D5B10CF9EA82B2E2C4CEA1DDC94916E3DA73DC36169EC575A87E8A24305ED5D30915
25,216,105 UART: [art] SIG.R = 7253A8834B2AAFB5F0DD6B4A9E5E13C7E8B220A5DF780A02274EBDA00D64728BFA2245BEBE49DD5FB011608F85BABDE1
25,223,533 UART: [art] SIG.S = AF0918B11E0C18FE4BD298564163F3AF04495A9C6F455496BD56E7F60F86F7A4A4A6374E721BA87B596EA4F34FBEEA61
26,202,827 UART: Caliptra RT
26,203,521 UART: [state] CFI Enabled
26,384,225 UART: [rt] RT listening for mailbox commands...
26,386,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,417,448 UART: [rt]cmd =0x44504543, len=96
30,781,325 >>> mbox cmd response data (6236 bytes)
30,810,620 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,841,236 UART: [rt]cmd =0x53574545, len=84
35,018,587 >>> mbox cmd response data (200 bytes)
35,400,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,431,423 UART: [rt]cmd =0x44504543, len=96
35,462,893 >>> mbox cmd response data (56 bytes)
35,463,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,494,016 UART: [rt]cmd =0x44504543, len=96
35,546,584 >>> mbox cmd response data (24 bytes)
35,547,160 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,577,510 UART: [rt]cmd =0x53574545, len=84
39,752,696 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,318 UART:
192,683 UART: Running Caliptra ROM ...
193,783 UART:
603,683 UART: [state] CFI Enabled
616,041 UART: [state] LifecycleState = Unprovisioned
618,462 UART: [state] DebugLocked = No
620,502 UART: [state] WD Timer not started. Device not locked for debugging
624,842 UART: [kat] SHA2-256
814,718 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,474 UART: [kat] ++
826,090 UART: [kat] sha1
837,336 UART: [kat] SHA2-256
840,353 UART: [kat] SHA2-384
847,128 UART: [kat] SHA2-512-ACC
849,718 UART: [kat] ECC-384
3,295,540 UART: [kat] HMAC-384Kdf
3,309,192 UART: [kat] LMS
3,841,008 UART: [kat] --
3,845,435 UART: [cold-reset] ++
3,847,936 UART: [fht] FHT @ 0x50003400
3,859,909 UART: [idev] ++
3,860,555 UART: [idev] CDI.KEYID = 6
3,861,514 UART: [idev] SUBJECT.KEYID = 7
3,862,765 UART: [idev] UDS.KEYID = 0
3,863,689 ready_for_fw is high
3,863,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,723 UART: [idev] Erasing UDS.KEYID = 0
6,336,996 UART: [idev] Sha1 KeyId Algorithm
6,360,169 UART: [idev] --
6,365,514 UART: [ldev] ++
6,366,251 UART: [ldev] CDI.KEYID = 6
6,367,137 UART: [ldev] SUBJECT.KEYID = 5
6,368,500 UART: [ldev] AUTHORITY.KEYID = 7
6,369,698 UART: [ldev] FE.KEYID = 1
6,381,291 UART: [ldev] Erasing FE.KEYID = 1
8,859,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,024 UART: [ldev] --
10,653,350 UART: [fwproc] Wait for Commands...
10,656,416 UART: [fwproc] Recv command 0x46574c44
10,658,724 UART: [fwproc] Recv'd Img size: 118548 bytes
14,157,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,238,152 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,766 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,922,116 >>> mbox cmd response: success
14,926,194 UART: [afmc] ++
14,926,922 UART: [afmc] CDI.KEYID = 6
14,928,121 UART: [afmc] SUBJECT.KEYID = 7
14,929,573 UART: [afmc] AUTHORITY.KEYID = 5
17,435,936 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,156,680 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,158,640 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,173,754 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,188,898 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,203,822 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,227,137 UART: [afmc] --
19,230,418 UART: [cold-reset] --
19,234,994 UART: [state] Locking Datavault
19,238,854 UART: [state] Locking PCR0, PCR1 and PCR31
19,241,019 UART: [state] Locking ICCM
19,243,702 UART: [exit] Launching FMC @ 0x40000130
19,252,342 UART:
19,252,610 UART: Running Caliptra FMC ...
19,253,646 UART:
19,253,796 UART: [state] CFI Enabled
19,262,176 UART: [fht] FMC Alias Private Key: 7
21,028,418 UART: [art] Extend RT PCRs Done
21,029,651 UART: [art] Lock RT PCRs Done
21,031,366 UART: [art] Populate DV Done
21,036,588 UART: [fht] FMC Alias Private Key: 7
21,038,085 UART: [art] Derive CDI
21,038,860 UART: [art] Store in slot 0x4
21,081,459 UART: [art] Derive Key Pair
21,082,466 UART: [art] Store priv key in slot 0x5
23,509,893 UART: [art] Derive Key Pair - Done
23,522,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,229,140 UART: [art] Erasing AUTHORITY.KEYID = 7
25,230,650 UART: [art] PUB.X = 90428CE92BCB784224BFA75122E4C85DDED350483042657EF52351F98E11D55C3255CF1131CECA4ADB646C3B2FB5C19A
25,237,921 UART: [art] PUB.Y = 8AC552DCC91A52542527B84247B988E7D96956201841E6DA4064D4C9E5895EB24E24962020D116C2648763163FBF2060
25,245,122 UART: [art] SIG.R = 80F8ED9ADB43DDE533E43444368A11C0136C7A6EBE87BE4FDA2784C84BAF7A67A50E46BF861BC731E0AAE409DD2E3674
25,252,576 UART: [art] SIG.S = E7583C563D844B899CCD5166B2B7A8EA3DCC2AF3C5058B97C037BFC39CA5AD74CEE689BA8AE209A61CA4C6A21E14434A
26,231,240 UART: Caliptra RT
26,231,954 UART: [state] CFI Enabled
26,365,003 UART: [rt] RT listening for mailbox commands...
26,367,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,397,938 UART: [rt]cmd =0x44504543, len=96
30,682,927 >>> mbox cmd response data (6236 bytes)
30,712,227 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,742,807 UART: [rt]cmd =0x53574545, len=84
34,878,389 >>> mbox cmd response data (200 bytes)
35,262,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,293,624 UART: [rt]cmd =0x44504543, len=96
35,325,142 >>> mbox cmd response data (56 bytes)
35,325,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,356,321 UART: [rt]cmd =0x44504543, len=96
35,395,626 >>> mbox cmd response data (24 bytes)
35,396,214 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,426,749 UART: [rt]cmd =0x53574545, len=84
39,562,336 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
3,757,444 ready_for_fw is high
3,758,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,598 >>> mbox cmd response: success
19,295,039 UART:
19,295,447 UART: Running Caliptra FMC ...
19,296,658 UART:
19,296,866 UART: [state] CFI Enabled
19,305,041 UART: [fht] FMC Alias Private Key: 7
21,070,901 UART: [art] Extend RT PCRs Done
21,072,155 UART: [art] Lock RT PCRs Done
21,073,603 UART: [art] Populate DV Done
21,079,013 UART: [fht] FMC Alias Private Key: 7
21,080,620 UART: [art] Derive CDI
21,081,443 UART: [art] Store in slot 0x4
21,124,104 UART: [art] Derive Key Pair
21,125,109 UART: [art] Store priv key in slot 0x5
23,551,847 UART: [art] Derive Key Pair - Done
23,564,803 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,541 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,057 UART: [art] PUB.X = 3E0118BC2198A1AD32A92D9867E6585CD0305564FB07A9F2C372DA52D9C2618F5A2E30F727699EF34ABB6C3243FD331A
25,280,306 UART: [art] PUB.Y = C298E6533BEA9FFD0B6CFC4CC12BEB4330AD21E33A904B8461E4741CE75D01E0AE8635B47EF765716588FD4731603FA8
25,287,523 UART: [art] SIG.R = D9828FA7ABB314BFBBBE7CA5BB6541D8C5A244262427644B7EB0ED33CE17A99825321149FC1874BE23D67CB137B4325C
25,294,964 UART: [art] SIG.S = E1FA4A9F0F1C0740D52980FE39EA5CE264176BE7EF5EC16BBB5B67D36562F4AE2FC68CF99734B4677979DB85AA217A3E
26,273,944 UART: Caliptra RT
26,274,636 UART: [state] CFI Enabled
26,406,762 UART: [rt] RT listening for mailbox commands...
26,408,976 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,439,826 UART: [rt]cmd =0x44504543, len=96
30,725,424 >>> mbox cmd response data (6236 bytes)
30,754,790 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,785,474 UART: [rt]cmd =0x53574545, len=84
34,921,703 >>> mbox cmd response data (200 bytes)
35,308,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,339,011 UART: [rt]cmd =0x44504543, len=96
35,370,947 >>> mbox cmd response data (56 bytes)
35,371,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,402,216 UART: [rt]cmd =0x44504543, len=96
35,440,731 >>> mbox cmd response data (24 bytes)
35,441,281 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,471,982 UART: [rt]cmd =0x53574545, len=84
39,608,377 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,015 UART: [kat] SHA2-256
881,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,061 UART: [kat] ++
886,213 UART: [kat] sha1
890,449 UART: [kat] SHA2-256
892,387 UART: [kat] SHA2-384
895,178 UART: [kat] SHA2-512-ACC
897,079 UART: [kat] ECC-384
902,874 UART: [kat] HMAC-384Kdf
907,598 UART: [kat] LMS
1,475,794 UART: [kat] --
1,476,737 UART: [cold-reset] ++
1,477,313 UART: [fht] Storing FHT @ 0x50003400
1,480,182 UART: [idev] ++
1,480,350 UART: [idev] CDI.KEYID = 6
1,480,710 UART: [idev] SUBJECT.KEYID = 7
1,481,134 UART: [idev] UDS.KEYID = 0
1,481,479 ready_for_fw is high
1,481,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,164 UART: [idev] Erasing UDS.KEYID = 0
1,506,260 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,672 UART: [idev] --
1,515,813 UART: [ldev] ++
1,515,981 UART: [ldev] CDI.KEYID = 6
1,516,344 UART: [ldev] SUBJECT.KEYID = 5
1,516,770 UART: [ldev] AUTHORITY.KEYID = 7
1,517,233 UART: [ldev] FE.KEYID = 1
1,522,295 UART: [ldev] Erasing FE.KEYID = 1
1,547,740 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,250 UART: [ldev] --
1,586,575 UART: [fwproc] Waiting for Commands...
1,587,348 UART: [fwproc] Received command 0x46574c44
1,588,139 UART: [fwproc] Received Image of size 118548 bytes
2,933,185 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,547 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,046 >>> mbox cmd response: success
3,132,298 UART: [afmc] ++
3,132,466 UART: [afmc] CDI.KEYID = 6
3,132,828 UART: [afmc] SUBJECT.KEYID = 7
3,133,253 UART: [afmc] AUTHORITY.KEYID = 5
3,168,334 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,568 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,348 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,057 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,940 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,623 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,523 UART: [afmc] --
3,211,553 UART: [cold-reset] --
3,212,227 UART: [state] Locking Datavault
3,213,554 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,158 UART: [state] Locking ICCM
3,214,714 UART: [exit] Launching FMC @ 0x40000130
3,220,044 UART:
3,220,060 UART: Running Caliptra FMC ...
3,220,468 UART:
3,220,522 UART: [state] CFI Enabled
3,231,006 UART: [fht] FMC Alias Private Key: 7
3,349,774 UART: [art] Extend RT PCRs Done
3,350,202 UART: [art] Lock RT PCRs Done
3,351,576 UART: [art] Populate DV Done
3,359,785 UART: [fht] FMC Alias Private Key: 7
3,360,871 UART: [art] Derive CDI
3,361,151 UART: [art] Store in slot 0x4
3,447,047 UART: [art] Derive Key Pair
3,447,407 UART: [art] Store priv key in slot 0x5
3,460,914 UART: [art] Derive Key Pair - Done
3,475,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,696 UART: [art] PUB.X = 2695CFA0E18CFD1ECFA68B6BD55CF14F6EB627714A4AFE9E1E24D42CCD9D87EBACE90895E53C50FB8F3962C0F8380776
3,498,482 UART: [art] PUB.Y = 2653E76FAFCB53252E617469A8B5A1F6CEF4CA60C6FD47A0B379815B9DD87536A08B5AA962092DFA4168086A21E7BFFE
3,505,438 UART: [art] SIG.R = EFE6FB5D5C2A256A1C82A1148EADAD196A0873505641606BBAADDCA06A8558C240E053BDE7447BDDA7585B2937A6B63E
3,512,221 UART: [art] SIG.S = B4C31403E5E110778087AEA5A3549BE5CBB96CFAC5914C6A603964235EE5A4AD79336D00BC44988CDC5F69E088942525
3,535,814 UART: Caliptra RT
3,536,065 UART: [state] CFI Enabled
3,656,190 UART: [rt] RT listening for mailbox commands...
3,656,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,212 UART: [rt]cmd =0x44504543, len=96
3,869,428 >>> mbox cmd response data (6236 bytes)
3,869,429 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,366 UART: [rt]cmd =0x53574545, len=84
3,925,247 >>> mbox cmd response data (200 bytes)
3,925,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,955,179 UART: [rt]cmd =0x44504543, len=96
3,986,400 >>> mbox cmd response data (56 bytes)
3,986,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,240 UART: [rt]cmd =0x44504543, len=96
4,055,824 >>> mbox cmd response data (24 bytes)
4,055,825 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,085,566 UART: [rt]cmd =0x53574545, len=84
4,111,463 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,151 ready_for_fw is high
1,362,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,574 >>> mbox cmd response: success
3,039,677 UART:
3,039,693 UART: Running Caliptra FMC ...
3,040,101 UART:
3,040,155 UART: [state] CFI Enabled
3,050,749 UART: [fht] FMC Alias Private Key: 7
3,170,007 UART: [art] Extend RT PCRs Done
3,170,435 UART: [art] Lock RT PCRs Done
3,172,085 UART: [art] Populate DV Done
3,180,458 UART: [fht] FMC Alias Private Key: 7
3,181,454 UART: [art] Derive CDI
3,181,734 UART: [art] Store in slot 0x4
3,267,462 UART: [art] Derive Key Pair
3,267,822 UART: [art] Store priv key in slot 0x5
3,280,667 UART: [art] Derive Key Pair - Done
3,295,584 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,193 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,958 UART: [art] PUB.X = 1A9BAF6DA0BFD220EA54D0E429F3F0BD6ED97EFC46531E51DAC26A93350AC52A69B183565EEC654A41157EE37FD44702
3,318,738 UART: [art] PUB.Y = C589BD50AE4F76A369C069C78795D30663DAFF95EEF4C1A7FCEAF24808EA7652A5D1D9BFA840E80A1F68AC7D8B11A8CA
3,325,701 UART: [art] SIG.R = E003D7D00D7908427D49D4F65ECA8B024254BE09BE531DDF3F57F1FF74B766C1B2CDD2FFDEBFA8908658B438CBD1CBA2
3,332,478 UART: [art] SIG.S = 7768A0CA52FFE224BAB5C83B7DA66B2C2D8D5B9F53F92781083AD9DD0CBA8C75D291EF986CD7F7607C09BE02B221D7EF
3,356,004 UART: Caliptra RT
3,356,255 UART: [state] CFI Enabled
3,476,339 UART: [rt] RT listening for mailbox commands...
3,477,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,155 UART: [rt]cmd =0x44504543, len=96
3,687,547 >>> mbox cmd response data (6236 bytes)
3,687,548 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,431 UART: [rt]cmd =0x53574545, len=84
3,743,206 >>> mbox cmd response data (200 bytes)
3,743,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,773,248 UART: [rt]cmd =0x44504543, len=96
3,806,015 >>> mbox cmd response data (56 bytes)
3,806,016 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,033 UART: [rt]cmd =0x44504543, len=96
3,875,719 >>> mbox cmd response data (24 bytes)
3,875,720 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,905,381 UART: [rt]cmd =0x53574545, len=84
3,931,502 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
87,008 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,554 UART: [kat] SHA2-256
882,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,600 UART: [kat] ++
886,752 UART: [kat] sha1
891,122 UART: [kat] SHA2-256
893,060 UART: [kat] SHA2-384
895,727 UART: [kat] SHA2-512-ACC
897,628 UART: [kat] ECC-384
903,255 UART: [kat] HMAC-384Kdf
907,951 UART: [kat] LMS
1,476,147 UART: [kat] --
1,476,842 UART: [cold-reset] ++
1,477,184 UART: [fht] Storing FHT @ 0x50003400
1,480,035 UART: [idev] ++
1,480,203 UART: [idev] CDI.KEYID = 6
1,480,563 UART: [idev] SUBJECT.KEYID = 7
1,480,987 UART: [idev] UDS.KEYID = 0
1,481,332 ready_for_fw is high
1,481,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,065 UART: [idev] Erasing UDS.KEYID = 0
1,505,345 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,145 UART: [idev] --
1,515,142 UART: [ldev] ++
1,515,310 UART: [ldev] CDI.KEYID = 6
1,515,673 UART: [ldev] SUBJECT.KEYID = 5
1,516,099 UART: [ldev] AUTHORITY.KEYID = 7
1,516,562 UART: [ldev] FE.KEYID = 1
1,521,542 UART: [ldev] Erasing FE.KEYID = 1
1,546,923 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,859 UART: [ldev] --
1,586,234 UART: [fwproc] Waiting for Commands...
1,586,921 UART: [fwproc] Received command 0x46574c44
1,587,712 UART: [fwproc] Received Image of size 118548 bytes
2,931,196 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,380 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,598 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,029 >>> mbox cmd response: success
3,131,185 UART: [afmc] ++
3,131,353 UART: [afmc] CDI.KEYID = 6
3,131,715 UART: [afmc] SUBJECT.KEYID = 7
3,132,140 UART: [afmc] AUTHORITY.KEYID = 5
3,167,801 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,881 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,661 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,370 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,253 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,936 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,678 UART: [afmc] --
3,210,752 UART: [cold-reset] --
3,211,370 UART: [state] Locking Datavault
3,212,363 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,967 UART: [state] Locking ICCM
3,213,465 UART: [exit] Launching FMC @ 0x40000130
3,218,795 UART:
3,218,811 UART: Running Caliptra FMC ...
3,219,219 UART:
3,219,362 UART: [state] CFI Enabled
3,230,242 UART: [fht] FMC Alias Private Key: 7
3,348,488 UART: [art] Extend RT PCRs Done
3,348,916 UART: [art] Lock RT PCRs Done
3,350,436 UART: [art] Populate DV Done
3,358,611 UART: [fht] FMC Alias Private Key: 7
3,359,549 UART: [art] Derive CDI
3,359,829 UART: [art] Store in slot 0x4
3,445,891 UART: [art] Derive Key Pair
3,446,251 UART: [art] Store priv key in slot 0x5
3,459,674 UART: [art] Derive Key Pair - Done
3,474,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,576 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,341 UART: [art] PUB.X = 1F862B7E68C50DD9F54997108A42C286B8D413E65A7407F8AFFC535BA8260675E253F33C0D828ADD8FC6244B6889A310
3,498,099 UART: [art] PUB.Y = 0666A5A800D75FA826AB174364D6BB3669C7BBFE108B75A70632A6FA1820DAA380086A7FC030A6BB03A1C975F2766982
3,505,017 UART: [art] SIG.R = 6BCE98CEC9854A5A8AE37F7F2F4BA6D042D679D53C608D5E9C80C0B054F123669BFE97F74BBE8F2B974C4AF6DB431075
3,511,803 UART: [art] SIG.S = 32B4983E60FB004874D169B103DA78E99E488968D254E11E00D8E91A51CB36925C7F49C87B5445AD35D1B3C32616D8FC
3,534,942 UART: Caliptra RT
3,535,285 UART: [state] CFI Enabled
3,655,344 UART: [rt] RT listening for mailbox commands...
3,656,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,674 UART: [rt]cmd =0x44504543, len=96
3,868,069 >>> mbox cmd response data (6236 bytes)
3,868,070 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,889 UART: [rt]cmd =0x53574545, len=84
3,923,840 >>> mbox cmd response data (200 bytes)
3,923,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,953,906 UART: [rt]cmd =0x44504543, len=96
3,986,293 >>> mbox cmd response data (56 bytes)
3,986,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,271 UART: [rt]cmd =0x44504543, len=96
4,056,803 >>> mbox cmd response data (24 bytes)
4,056,804 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,086,733 UART: [rt]cmd =0x53574545, len=84
4,113,024 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,334 ready_for_fw is high
1,362,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,419 >>> mbox cmd response: success
3,043,374 UART:
3,043,390 UART: Running Caliptra FMC ...
3,043,798 UART:
3,043,941 UART: [state] CFI Enabled
3,054,555 UART: [fht] FMC Alias Private Key: 7
3,173,821 UART: [art] Extend RT PCRs Done
3,174,249 UART: [art] Lock RT PCRs Done
3,175,625 UART: [art] Populate DV Done
3,183,728 UART: [fht] FMC Alias Private Key: 7
3,184,684 UART: [art] Derive CDI
3,184,964 UART: [art] Store in slot 0x4
3,270,624 UART: [art] Derive Key Pair
3,270,984 UART: [art] Store priv key in slot 0x5
3,284,153 UART: [art] Derive Key Pair - Done
3,298,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,567 UART: [art] PUB.X = E8D35BD7CEB9840DB543E0CE9EE91F02A2B5EE4B4729FCDFAF199BD3B620A772EDE07BC4094BF5D55F7C65C239D29C54
3,322,352 UART: [art] PUB.Y = 03AAAB313CD9C9F5F2978DBA938BEC154B933B8E6B2EF7DC5B7E6B5742887CA41991437EF921121E35FCF73B936D7378
3,329,309 UART: [art] SIG.R = 452ED850E6A47DF2773A84A73902AC979AAAA8434C2CAD1EBF8231B1290927D6CAB97A0606127E1561D7285C2477ACF7
3,336,071 UART: [art] SIG.S = 3F64895B5F97627A748C435920E95D93EE8447F7459F51A074D5B21A146DA72101280F4E12E859A4F616B58799876F81
3,359,877 UART: Caliptra RT
3,360,220 UART: [state] CFI Enabled
3,480,559 UART: [rt] RT listening for mailbox commands...
3,481,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,525 UART: [rt]cmd =0x44504543, len=96
3,692,810 >>> mbox cmd response data (6236 bytes)
3,692,811 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,644 UART: [rt]cmd =0x53574545, len=84
3,749,473 >>> mbox cmd response data (200 bytes)
3,749,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,363 UART: [rt]cmd =0x44504543, len=96
3,810,816 >>> mbox cmd response data (56 bytes)
3,810,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,648 UART: [rt]cmd =0x44504543, len=96
3,880,404 >>> mbox cmd response data (24 bytes)
3,880,405 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,508 UART: [rt]cmd =0x53574545, len=84
3,936,637 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
891,346 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,450 UART: [kat] ++
895,602 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
915,893 UART: [kat] HMAC-384Kdf
920,587 UART: [kat] LMS
1,168,899 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,660 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,174,712 ready_for_fw is high
1,174,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,239 UART: [idev] Erasing UDS.KEYID = 0
1,199,493 UART: [idev] Sha1 KeyId Algorithm
1,208,427 UART: [idev] --
1,209,264 UART: [ldev] ++
1,209,432 UART: [ldev] CDI.KEYID = 6
1,209,796 UART: [ldev] SUBJECT.KEYID = 5
1,210,223 UART: [ldev] AUTHORITY.KEYID = 7
1,210,686 UART: [ldev] FE.KEYID = 1
1,215,608 UART: [ldev] Erasing FE.KEYID = 1
1,241,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,578 UART: [ldev] --
1,280,909 UART: [fwproc] Wait for Commands...
1,281,690 UART: [fwproc] Recv command 0x46574c44
1,282,423 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,717 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,892 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,277 >>> mbox cmd response: success
2,826,331 UART: [afmc] ++
2,826,499 UART: [afmc] CDI.KEYID = 6
2,826,862 UART: [afmc] SUBJECT.KEYID = 7
2,827,288 UART: [afmc] AUTHORITY.KEYID = 5
2,863,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,699 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,409 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,290 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,991 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,726 UART: [afmc] --
2,907,665 UART: [cold-reset] --
2,908,535 UART: [state] Locking Datavault
2,909,624 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,228 UART: [state] Locking ICCM
2,910,834 UART: [exit] Launching FMC @ 0x40000130
2,916,164 UART:
2,916,180 UART: Running Caliptra FMC ...
2,916,588 UART:
2,916,642 UART: [state] CFI Enabled
2,927,038 UART: [fht] FMC Alias Private Key: 7
3,045,722 UART: [art] Extend RT PCRs Done
3,046,150 UART: [art] Lock RT PCRs Done
3,047,582 UART: [art] Populate DV Done
3,055,781 UART: [fht] FMC Alias Private Key: 7
3,056,727 UART: [art] Derive CDI
3,057,007 UART: [art] Store in slot 0x4
3,142,610 UART: [art] Derive Key Pair
3,142,970 UART: [art] Store priv key in slot 0x5
3,155,710 UART: [art] Derive Key Pair - Done
3,170,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,425 UART: [art] PUB.X = CE0B72FBA10193309B9F27E50EF77DAC4054E2442F3D50B4A737E8AB30766AAA2E06DC5A536CFEF2069A121F4179E277
3,193,190 UART: [art] PUB.Y = B12AC787AA184A0BA4D672FB98E6499873FA4B1578517333C97F410B4BC4B2559114EEA2F45E1F46D284BD78EE7D8B10
3,200,140 UART: [art] SIG.R = 28E5BD77F536AE114A015DCDA3C5447F1405A9B7B9D613C24666806B8A9801B3044C3BBE72ED698CC9CC9D8803DCCE78
3,206,905 UART: [art] SIG.S = 48C3AB40421C7402BC5DC7041B240CFC184BE019F03C213537EAED777A039EE17C0EB0CCD36824AF13376C8AAB059E58
3,230,731 UART: Caliptra RT
3,230,982 UART: [state] CFI Enabled
3,351,720 UART: [rt] RT listening for mailbox commands...
3,352,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,020 UART: [rt]cmd =0x44504543, len=96
3,565,350 >>> mbox cmd response data (6236 bytes)
3,565,351 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,595,232 UART: [rt]cmd =0x53574545, len=84
3,621,676 >>> mbox cmd response data (200 bytes)
3,621,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,651,716 UART: [rt]cmd =0x44504543, len=96
3,683,965 >>> mbox cmd response data (56 bytes)
3,683,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,714,075 UART: [rt]cmd =0x44504543, len=96
3,754,195 >>> mbox cmd response data (24 bytes)
3,754,196 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,969 UART: [rt]cmd =0x53574545, len=84
3,809,431 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,324 ready_for_fw is high
1,059,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,876 >>> mbox cmd response: success
2,740,803 UART:
2,740,819 UART: Running Caliptra FMC ...
2,741,227 UART:
2,741,281 UART: [state] CFI Enabled
2,751,771 UART: [fht] FMC Alias Private Key: 7
2,870,453 UART: [art] Extend RT PCRs Done
2,870,881 UART: [art] Lock RT PCRs Done
2,872,443 UART: [art] Populate DV Done
2,880,368 UART: [fht] FMC Alias Private Key: 7
2,881,440 UART: [art] Derive CDI
2,881,720 UART: [art] Store in slot 0x4
2,966,927 UART: [art] Derive Key Pair
2,967,287 UART: [art] Store priv key in slot 0x5
2,980,921 UART: [art] Derive Key Pair - Done
2,995,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,289 UART: [art] PUB.X = 338F119D1A79D882E39FBA17014A8523A944978E940C1B7B76D1ABB08881B5CE45AE547656CF21103824B82C0728326B
3,018,044 UART: [art] PUB.Y = CE97A36556157373FFBE0CC5BEB39DAAEF7BE005E5EBFBC74CA0C73B4F301AC2FB3EA2A0FEFE8A4C89F9EDFF2B7F1DCA
3,025,032 UART: [art] SIG.R = 6262EFF85708507362B8ABD42C64F9F84DE6AD23209450965C9674D2D4DDBD99B14C6FF94BC2F64C3257DEB313949C69
3,031,803 UART: [art] SIG.S = B8DF18B6F4AA265AD1F99A7FB8EF2A0A041F1DC0E243999442950C57B21B75476EBDDDDE7195F40B0090AB074EED1DED
3,055,718 UART: Caliptra RT
3,055,969 UART: [state] CFI Enabled
3,175,852 UART: [rt] RT listening for mailbox commands...
3,176,522 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,918 UART: [rt]cmd =0x44504543, len=96
3,388,703 >>> mbox cmd response data (6236 bytes)
3,388,704 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,607 UART: [rt]cmd =0x53574545, len=84
3,444,011 >>> mbox cmd response data (200 bytes)
3,444,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,903 UART: [rt]cmd =0x44504543, len=96
3,506,326 >>> mbox cmd response data (56 bytes)
3,506,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,536,118 UART: [rt]cmd =0x44504543, len=96
3,576,452 >>> mbox cmd response data (24 bytes)
3,576,453 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,278 UART: [rt]cmd =0x53574545, len=84
3,632,106 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
916,642 UART: [kat] HMAC-384Kdf
921,444 UART: [kat] LMS
1,169,756 UART: [kat] --
1,170,559 UART: [cold-reset] ++
1,171,075 UART: [fht] FHT @ 0x50003400
1,173,595 UART: [idev] ++
1,173,763 UART: [idev] CDI.KEYID = 6
1,174,124 UART: [idev] SUBJECT.KEYID = 7
1,174,549 UART: [idev] UDS.KEYID = 0
1,174,895 ready_for_fw is high
1,174,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,656 UART: [idev] Erasing UDS.KEYID = 0
1,199,592 UART: [idev] Sha1 KeyId Algorithm
1,208,650 UART: [idev] --
1,209,557 UART: [ldev] ++
1,209,725 UART: [ldev] CDI.KEYID = 6
1,210,089 UART: [ldev] SUBJECT.KEYID = 5
1,210,516 UART: [ldev] AUTHORITY.KEYID = 7
1,210,979 UART: [ldev] FE.KEYID = 1
1,216,115 UART: [ldev] Erasing FE.KEYID = 1
1,242,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,503 UART: [ldev] --
1,281,932 UART: [fwproc] Wait for Commands...
1,282,577 UART: [fwproc] Recv command 0x46574c44
1,283,310 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,686 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,861 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,014 >>> mbox cmd response: success
2,827,128 UART: [afmc] ++
2,827,296 UART: [afmc] CDI.KEYID = 6
2,827,659 UART: [afmc] SUBJECT.KEYID = 7
2,828,085 UART: [afmc] AUTHORITY.KEYID = 5
2,863,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,790 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,500 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,381 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,082 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,811 UART: [afmc] --
2,906,752 UART: [cold-reset] --
2,907,612 UART: [state] Locking Datavault
2,908,613 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,217 UART: [state] Locking ICCM
2,909,773 UART: [exit] Launching FMC @ 0x40000130
2,915,103 UART:
2,915,119 UART: Running Caliptra FMC ...
2,915,527 UART:
2,915,670 UART: [state] CFI Enabled
2,926,384 UART: [fht] FMC Alias Private Key: 7
3,045,012 UART: [art] Extend RT PCRs Done
3,045,440 UART: [art] Lock RT PCRs Done
3,046,960 UART: [art] Populate DV Done
3,055,345 UART: [fht] FMC Alias Private Key: 7
3,056,341 UART: [art] Derive CDI
3,056,621 UART: [art] Store in slot 0x4
3,142,712 UART: [art] Derive Key Pair
3,143,072 UART: [art] Store priv key in slot 0x5
3,156,064 UART: [art] Derive Key Pair - Done
3,170,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,856 UART: [art] PUB.X = C8AA4BD583E1CAD5985EB60D4895D927DD8DAC3EBAB29FDBDD3753068C38E14C20EE36DAA213BF0F6941905EC264C609
3,193,634 UART: [art] PUB.Y = 506F455247EF1C3854657C359DFA22D39F10399700A20317EBABD679340333E2A774B39D7BAC46FAD05184492EB8D2DF
3,200,556 UART: [art] SIG.R = EB2DFFDBDF04C57C07B5D79776AFCA642A177BE7C23C6A010672CDC667FAE82E07D1F1288F56A210D8B4777671520EA4
3,207,322 UART: [art] SIG.S = D116016A54404F2455ADC64EA297B41E5207761F494763023CCA3E050FDB8E03063F6EBE00AA90853945624F1CA3EFA3
3,231,213 UART: Caliptra RT
3,231,556 UART: [state] CFI Enabled
3,351,188 UART: [rt] RT listening for mailbox commands...
3,351,858 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,318 UART: [rt]cmd =0x44504543, len=96
3,564,685 >>> mbox cmd response data (6236 bytes)
3,564,686 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,594,823 UART: [rt]cmd =0x53574545, len=84
3,620,567 >>> mbox cmd response data (200 bytes)
3,620,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,650,473 UART: [rt]cmd =0x44504543, len=96
3,682,168 >>> mbox cmd response data (56 bytes)
3,682,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,080 UART: [rt]cmd =0x44504543, len=96
3,752,314 >>> mbox cmd response data (24 bytes)
3,752,315 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,934 UART: [rt]cmd =0x53574545, len=84
3,808,114 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,613 ready_for_fw is high
1,059,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,871 >>> mbox cmd response: success
2,740,654 UART:
2,740,670 UART: Running Caliptra FMC ...
2,741,078 UART:
2,741,221 UART: [state] CFI Enabled
2,752,245 UART: [fht] FMC Alias Private Key: 7
2,872,299 UART: [art] Extend RT PCRs Done
2,872,727 UART: [art] Lock RT PCRs Done
2,874,387 UART: [art] Populate DV Done
2,882,672 UART: [fht] FMC Alias Private Key: 7
2,883,732 UART: [art] Derive CDI
2,884,012 UART: [art] Store in slot 0x4
2,969,615 UART: [art] Derive Key Pair
2,969,975 UART: [art] Store priv key in slot 0x5
2,983,459 UART: [art] Derive Key Pair - Done
2,998,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,700 UART: [art] PUB.X = 3470A6CE81C9B095F486949CD5F0CD34A4AC7A3978B940874E22349C2DC28F9004C6E5141A2C37256191FE867F5486BB
3,021,465 UART: [art] PUB.Y = 30C15F9F90740E4806C5AB2EEDA67481A5AC78B114F1D5EDB8A6177A36851341BAFFACAFAFE102C080C3B7DFC60449E7
3,028,421 UART: [art] SIG.R = 5CD4C1D075B00A06D005A922B4D2FAD0AA170284ECF27B72EB7E708239F9D607BAAD073F413AEC66F05D29C37A0D784E
3,035,184 UART: [art] SIG.S = B0849BAEDF854E5A8C4DCF9FB9C6A403D4343FCDCA67559D2D40ADAFC52204368716CCAF8811F09AD3359DFE07E2647F
3,058,861 UART: Caliptra RT
3,059,204 UART: [state] CFI Enabled
3,178,285 UART: [rt] RT listening for mailbox commands...
3,178,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,381 UART: [rt]cmd =0x44504543, len=96
3,391,039 >>> mbox cmd response data (6236 bytes)
3,391,040 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,420,829 UART: [rt]cmd =0x53574545, len=84
3,447,023 >>> mbox cmd response data (200 bytes)
3,447,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,983 UART: [rt]cmd =0x44504543, len=96
3,509,052 >>> mbox cmd response data (56 bytes)
3,509,053 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,100 UART: [rt]cmd =0x44504543, len=96
3,579,126 >>> mbox cmd response data (24 bytes)
3,579,127 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,608,928 UART: [rt]cmd =0x53574545, len=84
3,634,610 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
893,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,403 UART: [kat] ++
897,555 UART: [kat] sha1
901,917 UART: [kat] SHA2-256
903,857 UART: [kat] SHA2-384
906,540 UART: [kat] SHA2-512-ACC
908,441 UART: [kat] ECC-384
917,966 UART: [kat] HMAC-384Kdf
922,678 UART: [kat] LMS
1,171,006 UART: [kat] --
1,171,917 UART: [cold-reset] ++
1,172,331 UART: [fht] FHT @ 0x50003400
1,174,876 UART: [idev] ++
1,175,044 UART: [idev] CDI.KEYID = 6
1,175,404 UART: [idev] SUBJECT.KEYID = 7
1,175,828 UART: [idev] UDS.KEYID = 0
1,176,173 ready_for_fw is high
1,176,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,992 UART: [idev] Erasing UDS.KEYID = 0
1,200,499 UART: [idev] Sha1 KeyId Algorithm
1,208,987 UART: [idev] --
1,210,087 UART: [ldev] ++
1,210,255 UART: [ldev] CDI.KEYID = 6
1,210,618 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,547 UART: [ldev] Erasing FE.KEYID = 1
1,242,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,407 UART: [ldev] --
1,281,692 UART: [fwproc] Wait for Commands...
1,282,432 UART: [fwproc] Recv command 0x46574c44
1,283,160 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,080 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,250 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,619 >>> mbox cmd response: success
2,828,869 UART: [afmc] ++
2,829,037 UART: [afmc] CDI.KEYID = 6
2,829,399 UART: [afmc] SUBJECT.KEYID = 7
2,829,824 UART: [afmc] AUTHORITY.KEYID = 5
2,865,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,014 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,723 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,606 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,307 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,005 UART: [afmc] --
2,908,063 UART: [cold-reset] --
2,908,881 UART: [state] Locking Datavault
2,909,924 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,528 UART: [state] Locking ICCM
2,910,964 UART: [exit] Launching FMC @ 0x40000130
2,916,294 UART:
2,916,310 UART: Running Caliptra FMC ...
2,916,718 UART:
2,916,772 UART: [state] CFI Enabled
2,927,192 UART: [fht] FMC Alias Private Key: 7
3,046,084 UART: [art] Extend RT PCRs Done
3,046,512 UART: [art] Lock RT PCRs Done
3,048,088 UART: [art] Populate DV Done
3,056,279 UART: [fht] FMC Alias Private Key: 7
3,057,273 UART: [art] Derive CDI
3,057,553 UART: [art] Store in slot 0x4
3,143,298 UART: [art] Derive Key Pair
3,143,658 UART: [art] Store priv key in slot 0x5
3,156,008 UART: [art] Derive Key Pair - Done
3,170,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,601 UART: [art] PUB.X = 4ADE65CB55E1E2D4CBB2DB3F2036EE157A875B754FF3368CE86DE5F9748B7EC12613A25E035F411240428A34EF2B387C
3,193,378 UART: [art] PUB.Y = 47303CEA2E6605579A346957E871D2F7D58062C13C7D16AD5F7739AC18DF4A26E297F31A0DCE9CCD64086CAD46DEC3B3
3,200,329 UART: [art] SIG.R = F75AE46075020EBA286796D5C3BFFC966B1BDF8EDB3B14B88662190D8C40834C5A3457A171771CA9195206796B991112
3,207,083 UART: [art] SIG.S = 536921A8242F8DE7615100CD5AE2C04881C0D4FEEB07371C7081CDB50E42BC42047DFEBF0A32F66D3B9A3A425DBA48A6
3,230,649 UART: Caliptra RT
3,230,900 UART: [state] CFI Enabled
3,350,231 UART: [rt] RT listening for mailbox commands...
3,350,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,383 UART: [rt]cmd =0x44504543, len=96
3,563,767 >>> mbox cmd response data (6236 bytes)
3,563,768 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,593,637 UART: [rt]cmd =0x53574545, len=84
3,618,775 >>> mbox cmd response data (200 bytes)
3,618,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,853 UART: [rt]cmd =0x44504543, len=96
3,681,018 >>> mbox cmd response data (56 bytes)
3,681,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,262 UART: [rt]cmd =0x44504543, len=96
3,751,646 >>> mbox cmd response data (24 bytes)
3,751,647 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,488 UART: [rt]cmd =0x53574545, len=84
3,806,940 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,153 ready_for_fw is high
1,061,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,776 >>> mbox cmd response: success
2,742,277 UART:
2,742,293 UART: Running Caliptra FMC ...
2,742,701 UART:
2,742,755 UART: [state] CFI Enabled
2,753,095 UART: [fht] FMC Alias Private Key: 7
2,872,851 UART: [art] Extend RT PCRs Done
2,873,279 UART: [art] Lock RT PCRs Done
2,874,893 UART: [art] Populate DV Done
2,883,172 UART: [fht] FMC Alias Private Key: 7
2,884,282 UART: [art] Derive CDI
2,884,562 UART: [art] Store in slot 0x4
2,970,133 UART: [art] Derive Key Pair
2,970,493 UART: [art] Store priv key in slot 0x5
2,983,829 UART: [art] Derive Key Pair - Done
2,998,546 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,872 UART: [art] PUB.X = 8CC646395C83FE5506638B2FAA1D53D917E45A81C67E1FB77AC38A458D554A76CAE6BBCBE4E5CE3198B5F73E75E27F91
3,021,653 UART: [art] PUB.Y = B1D9AD5664848BDFC7A45454B18196DE75E274A7A7403E7720EC587DDEB545E2734B04E21458AEE40CD205A981AB8E58
3,028,600 UART: [art] SIG.R = 0341C626C22BDB7B0E8447294E70C6E025859EBC48B077AF3DF1C3C428EB6381974A3893995BFD27BA99552687BB1E43
3,035,364 UART: [art] SIG.S = 278FAE41050841BC26901E295A2820AE65260906A6F6408FEACB73D0D777D595D15FCC171156AF01412EC6AB0DDF073C
3,059,769 UART: Caliptra RT
3,060,020 UART: [state] CFI Enabled
3,179,484 UART: [rt] RT listening for mailbox commands...
3,180,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,252 UART: [rt]cmd =0x44504543, len=96
3,393,012 >>> mbox cmd response data (6236 bytes)
3,393,013 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,936 UART: [rt]cmd =0x53574545, len=84
3,449,002 >>> mbox cmd response data (200 bytes)
3,449,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,856 UART: [rt]cmd =0x44504543, len=96
3,511,223 >>> mbox cmd response data (56 bytes)
3,511,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,009 UART: [rt]cmd =0x44504543, len=96
3,581,299 >>> mbox cmd response data (24 bytes)
3,581,300 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,087 UART: [rt]cmd =0x53574545, len=84
3,636,595 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,779 UART: [state] LifecycleState = Unprovisioned
86,434 UART: [state] DebugLocked = No
87,108 UART: [state] WD Timer not started. Device not locked for debugging
88,459 UART: [kat] SHA2-256
894,109 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,234 UART: [kat] ++
898,386 UART: [kat] sha1
902,616 UART: [kat] SHA2-256
904,556 UART: [kat] SHA2-384
907,407 UART: [kat] SHA2-512-ACC
909,308 UART: [kat] ECC-384
918,607 UART: [kat] HMAC-384Kdf
923,227 UART: [kat] LMS
1,171,555 UART: [kat] --
1,172,564 UART: [cold-reset] ++
1,172,892 UART: [fht] FHT @ 0x50003400
1,175,575 UART: [idev] ++
1,175,743 UART: [idev] CDI.KEYID = 6
1,176,103 UART: [idev] SUBJECT.KEYID = 7
1,176,527 UART: [idev] UDS.KEYID = 0
1,176,872 ready_for_fw is high
1,176,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,567 UART: [idev] Erasing UDS.KEYID = 0
1,201,644 UART: [idev] Sha1 KeyId Algorithm
1,210,304 UART: [idev] --
1,211,272 UART: [ldev] ++
1,211,440 UART: [ldev] CDI.KEYID = 6
1,211,803 UART: [ldev] SUBJECT.KEYID = 5
1,212,229 UART: [ldev] AUTHORITY.KEYID = 7
1,212,692 UART: [ldev] FE.KEYID = 1
1,217,882 UART: [ldev] Erasing FE.KEYID = 1
1,244,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,114 UART: [ldev] --
1,283,531 UART: [fwproc] Wait for Commands...
1,284,193 UART: [fwproc] Recv command 0x46574c44
1,284,921 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,657 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,827 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,212 >>> mbox cmd response: success
2,830,240 UART: [afmc] ++
2,830,408 UART: [afmc] CDI.KEYID = 6
2,830,770 UART: [afmc] SUBJECT.KEYID = 7
2,831,195 UART: [afmc] AUTHORITY.KEYID = 5
2,867,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,615 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,324 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,207 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,908 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,792 UART: [afmc] --
2,910,724 UART: [cold-reset] --
2,911,782 UART: [state] Locking Datavault
2,912,969 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,573 UART: [state] Locking ICCM
2,914,047 UART: [exit] Launching FMC @ 0x40000130
2,919,377 UART:
2,919,393 UART: Running Caliptra FMC ...
2,919,801 UART:
2,919,944 UART: [state] CFI Enabled
2,930,276 UART: [fht] FMC Alias Private Key: 7
3,049,310 UART: [art] Extend RT PCRs Done
3,049,738 UART: [art] Lock RT PCRs Done
3,051,084 UART: [art] Populate DV Done
3,059,037 UART: [fht] FMC Alias Private Key: 7
3,060,009 UART: [art] Derive CDI
3,060,289 UART: [art] Store in slot 0x4
3,145,712 UART: [art] Derive Key Pair
3,146,072 UART: [art] Store priv key in slot 0x5
3,159,158 UART: [art] Derive Key Pair - Done
3,173,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,672 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,437 UART: [art] PUB.X = 98EF68E03F081B9B2933637E87871D00BFF121B98423B3EF405F8F92D4D20E425B2B28921A173F492B1D7C6A5AF69818
3,197,177 UART: [art] PUB.Y = 41421280D5018530B7CCCF9EDAE071DA435BF7C4DB9925344C1B57D87CD5C5D7FF432BD9A9F9FF8C0C0CA7A18DC73826
3,204,134 UART: [art] SIG.R = 998F564B028A8934FBF71C09EDC62EA0B05BF224FD6D903E96FF349687F2F96969F3FACC1DB1854FA3FC08DBE752F3C3
3,210,911 UART: [art] SIG.S = C1A71AA2EA1D45BFE087CE71C24392D6DA2A9344E5EB90F477E090DFBF619B5D173453A785DB47AC468BF1CD824A5F9D
3,234,703 UART: Caliptra RT
3,235,046 UART: [state] CFI Enabled
3,355,488 UART: [rt] RT listening for mailbox commands...
3,356,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,508 UART: [rt]cmd =0x44504543, len=96
3,568,240 >>> mbox cmd response data (6236 bytes)
3,568,241 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,598,114 UART: [rt]cmd =0x53574545, len=84
3,624,396 >>> mbox cmd response data (200 bytes)
3,624,397 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,654,376 UART: [rt]cmd =0x44504543, len=96
3,686,585 >>> mbox cmd response data (56 bytes)
3,686,586 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,716,615 UART: [rt]cmd =0x44504543, len=96
3,756,035 >>> mbox cmd response data (24 bytes)
3,756,036 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,785,655 UART: [rt]cmd =0x53574545, len=84
3,811,291 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,728 ready_for_fw is high
1,060,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,079 >>> mbox cmd response: success
2,740,902 UART:
2,740,918 UART: Running Caliptra FMC ...
2,741,326 UART:
2,741,469 UART: [state] CFI Enabled
2,752,409 UART: [fht] FMC Alias Private Key: 7
2,871,477 UART: [art] Extend RT PCRs Done
2,871,905 UART: [art] Lock RT PCRs Done
2,873,127 UART: [art] Populate DV Done
2,881,538 UART: [fht] FMC Alias Private Key: 7
2,882,496 UART: [art] Derive CDI
2,882,776 UART: [art] Store in slot 0x4
2,969,219 UART: [art] Derive Key Pair
2,969,579 UART: [art] Store priv key in slot 0x5
2,982,587 UART: [art] Derive Key Pair - Done
2,997,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,745 UART: [art] PUB.X = A8115EF70B93888FE673CF425C52C6931A2B1729CE81C7D4259F62EB66E6850723D2C51153F28223065AB5147822A06F
3,020,498 UART: [art] PUB.Y = D5D4E8C055EC1F9728A39F993A1740D00344F9FF9D397E2CEEA8D9D007DAC343FA40A47EB33CF922460C315BE1B2DDA8
3,027,455 UART: [art] SIG.R = 1FFBBA619432F47CF92405D60FCF878BA11F42340B7A20CD8A0892314B48F8BF9B35C01429D7DBC9384C06C6F18A66F3
3,034,218 UART: [art] SIG.S = 130EF83C5298DCB5349E9AA6154B4065FD39E52772FBDB8D0682FD0B1F375EB4E1D12C9C3EFC26B50593E337C84A73C9
3,058,270 UART: Caliptra RT
3,058,613 UART: [state] CFI Enabled
3,178,615 UART: [rt] RT listening for mailbox commands...
3,179,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,801 UART: [rt]cmd =0x44504543, len=96
3,392,540 >>> mbox cmd response data (6236 bytes)
3,392,541 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,580 UART: [rt]cmd =0x53574545, len=84
3,448,512 >>> mbox cmd response data (200 bytes)
3,448,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,472 UART: [rt]cmd =0x44504543, len=96
3,510,305 >>> mbox cmd response data (56 bytes)
3,510,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,253 UART: [rt]cmd =0x44504543, len=96
3,580,535 >>> mbox cmd response data (24 bytes)
3,580,536 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,329 UART: [rt]cmd =0x53574545, len=84
3,635,681 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
192,007 UART:
192,394 UART: Running Caliptra ROM ...
193,591 UART:
193,746 UART: [state] CFI Enabled
264,119 UART: [state] LifecycleState = Unprovisioned
266,031 UART: [state] DebugLocked = No
268,991 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,221 UART: [kat] SHA2-256
443,880 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,425 UART: [kat] ++
454,908 UART: [kat] sha1
465,715 UART: [kat] SHA2-256
468,369 UART: [kat] SHA2-384
475,209 UART: [kat] SHA2-512-ACC
477,512 UART: [kat] ECC-384
2,766,901 UART: [kat] HMAC-384Kdf
2,783,262 UART: [kat] LMS
3,973,533 UART: [kat] --
3,977,897 UART: [cold-reset] ++
3,979,130 UART: [fht] Storing FHT @ 0x50003400
3,989,900 UART: [idev] ++
3,990,462 UART: [idev] CDI.KEYID = 6
3,991,457 UART: [idev] SUBJECT.KEYID = 7
3,992,711 UART: [idev] UDS.KEYID = 0
3,993,833 ready_for_fw is high
3,994,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,185 UART: [idev] Erasing UDS.KEYID = 0
7,330,007 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,280 UART: [idev] --
7,356,809 UART: [ldev] ++
7,357,386 UART: [ldev] CDI.KEYID = 6
7,358,363 UART: [ldev] SUBJECT.KEYID = 5
7,359,574 UART: [ldev] AUTHORITY.KEYID = 7
7,360,914 UART: [ldev] FE.KEYID = 1
7,406,231 UART: [ldev] Erasing FE.KEYID = 1
10,741,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,053,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,097,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,577 UART: [ldev] --
13,120,084 UART: [fwproc] Waiting for Commands...
13,122,294 UART: [fwproc] Received command 0x46574c44
13,124,478 UART: [fwproc] Received Image of size 118548 bytes
17,230,697 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,310,333 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,383,515 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,712,649 >>> mbox cmd response: success
17,716,477 UART: [afmc] ++
17,717,129 UART: [afmc] CDI.KEYID = 6
17,718,019 UART: [afmc] SUBJECT.KEYID = 7
17,719,239 UART: [afmc] AUTHORITY.KEYID = 5
21,087,702 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,387,668 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,389,926 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,404,405 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,419,124 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,433,495 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,455,633 UART: [afmc] --
23,460,036 UART: [cold-reset] --
23,465,205 UART: [state] Locking Datavault
23,469,213 UART: [state] Locking PCR0, PCR1 and PCR31
23,470,915 UART: [state] Locking ICCM
23,473,068 UART: [exit] Launching FMC @ 0x40000130
23,481,428 UART:
23,481,733 UART: Running Caliptra FMC ...
23,482,845 UART:
23,483,006 UART: [state] CFI Enabled
23,547,345 UART: [fht] FMC Alias Private Key: 7
25,887,649 UART: [art] Extend RT PCRs Done
25,888,942 UART: [art] Lock RT PCRs Done
25,890,485 UART: [art] Populate DV Done
25,895,902 UART: [fht] FMC Alias Private Key: 7
25,897,501 UART: [art] Derive CDI
25,898,316 UART: [art] Store in slot 0x4
25,955,512 UART: [art] Derive Key Pair
25,956,754 UART: [art] Store priv key in slot 0x5
29,248,957 UART: [art] Derive Key Pair - Done
29,262,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,688 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,193 UART: [art] PUB.X = B790419CB36397C61B5D8FD18E7A27EC638291CA3081810CE1D577AC84A5B287E3F2F1E5BAB475AF98441C8627FE5378
31,559,456 UART: [art] PUB.Y = 9A367C0BE3C4AAFDE47A5A8A525D1C2A7470B0D8973EC0840E161D52C99577167694CFC2072B52E9B47E99CA9244AA93
31,566,664 UART: [art] SIG.R = 97387BEB6E1922D060D77B06946C963535D8701A7B4B721C7390CBBED3C71A21F3F5AF90FC3C8C1C64544432C0B3EC6A
31,574,086 UART: [art] SIG.S = 7F7DDF3D23D2F0DECA6AA9056EA3EE118DEE56F72981FF131C05E9151139FF9D1EC4549A51C37EFB0555FE084D304D29
32,879,673 UART: Caliptra RT
32,880,390 UART: [state] CFI Enabled
33,059,337 UART: [rt] RT listening for mailbox commands...
33,061,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,091,931 UART: [rt]cmd =0x44504543, len=96
38,861,461 >>> mbox cmd response data (6236 bytes)
38,891,289 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,921,926 UART: [rt]cmd =0x53574545, len=84
44,507,679 >>> mbox cmd response data (200 bytes)
46,968,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,119,847 UART:
47,120,231 UART: Running Caliptra ROM ...
47,121,328 UART:
47,121,489 UART: [state] CFI Enabled
47,188,701 UART: [state] LifecycleState = Unprovisioned
47,190,649 UART: [state] DebugLocked = No
47,192,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,198,353 UART: [kat] SHA2-256
47,368,074 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,378,586 UART: [kat] ++
47,379,129 UART: [kat] sha1
47,389,698 UART: [kat] SHA2-256
47,392,394 UART: [kat] SHA2-384
47,398,475 UART: [kat] SHA2-512-ACC
47,400,809 UART: [kat] ECC-384
49,691,871 UART: [kat] HMAC-384Kdf
49,702,697 UART: [kat] LMS
50,893,052 UART: [kat] --
50,898,139 UART: [update-reset] ++
55,093,771 UART: [update-reset] Image verified using Vendor ECC Key Index 0
55,096,699 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,494,434 >>> mbox cmd response: success
55,494,898 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,495,301 UART: [update-reset] Copying MAN_2 To MAN_1
55,517,432 UART: [update-reset Success] --
55,521,939 UART: [state] Locking Datavault
55,525,948 UART: [state] Locking PCR0, PCR1 and PCR31
55,527,711 UART: [state] Locking ICCM
55,530,299 UART: [exit] Launching FMC @ 0x40000130
55,538,698 UART:
55,538,935 UART: Running Caliptra FMC ...
55,540,041 UART:
55,540,204 UART: [state] CFI Enabled
55,644,079 UART: [art] Extend RT PCRs Done
55,645,279 UART: [art] Lock RT PCRs Done
55,646,736 UART: [art] Populate DV Done
55,652,044 UART: [fht] FMC Alias Private Key: 7
55,653,688 UART: [art] Derive CDI
55,654,508 UART: [art] Store in slot 0x4
55,713,687 UART: [art] Derive Key Pair
55,714,706 UART: [art] Store priv key in slot 0x5
58,988,198 UART: [art] Derive Key Pair - Done
59,001,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,289,408 UART: [art] Erasing AUTHORITY.KEYID = 7
61,290,929 UART: [art] PUB.X = B4046B083F03F0E95E38FF5917B20EF47572CE1215350ACE57A020FFBFD9FB1E68FD9385568FBFD3160F6908F5C0550E
61,298,199 UART: [art] PUB.Y = D50333258A57508AD08D12356C86AE433193F3B34989A7F42BFEA7770A7E2CBC8CDAB9B1A8830418A0A44FC53A668F07
61,305,444 UART: [art] SIG.R = B1953376E74595FDB1C8919D2119E956FD710F928F2E07A6FC05C0A8FE1A2AF686BF23808EECB4765BDB02078A7CC625
61,312,849 UART: [art] SIG.S = 561DDF96D653ED75DEDF86B929CA31DBE900087DBA1A37B5296FCD12C0DF0D7A46030C885EE7AAB5AC97CE7E3DB6F7C0
62,617,812 UART: Caliptra RT
62,618,529 UART: [state] CFI Enabled
63,032,583 UART: [rt] RT listening for mailbox commands...
63,064,220 UART: [rt]cmd =0x53574545, len=84
68,632,661 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,780,549 ready_for_fw is high
3,781,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,938,465 >>> mbox cmd response: success
23,633,276 UART:
23,633,817 UART: Running Caliptra FMC ...
23,635,040 UART:
23,635,220 UART: [state] CFI Enabled
23,702,099 UART: [fht] FMC Alias Private Key: 7
26,042,762 UART: [art] Extend RT PCRs Done
26,043,994 UART: [art] Lock RT PCRs Done
26,045,523 UART: [art] Populate DV Done
26,051,106 UART: [fht] FMC Alias Private Key: 7
26,052,756 UART: [art] Derive CDI
26,053,571 UART: [art] Store in slot 0x4
26,110,776 UART: [art] Derive Key Pair
26,111,777 UART: [art] Store priv key in slot 0x5
29,404,225 UART: [art] Derive Key Pair - Done
29,416,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,806 UART: [art] Erasing AUTHORITY.KEYID = 7
31,707,322 UART: [art] PUB.X = B2090EA17C035EC681765985BF1CAD4307F294E9340578B6A0510FA182859D705BF20A965D0783E884DF5AA03C6AB61D
31,714,618 UART: [art] PUB.Y = 8FEA0E74178BD432C78E45C1E927B2A920CD0221FACD1BDB6788C86146B7C8EDA744A6650D90902B6E2356D5BAD70F31
31,721,842 UART: [art] SIG.R = AFD258695B781D6828C1C9F9124533A25A01C7664FBCA72E8A3630842138B3F42F33D30A40498449786F49D29A61F380
31,729,200 UART: [art] SIG.S = 427C7B95A59A5C6141C718735D80CC56BF9EC9276E3B526ACD3B92F3493E314E62C19976D979DBE5360C8A7DC70653D9
33,034,713 UART: Caliptra RT
33,035,467 UART: [state] CFI Enabled
33,212,802 UART: [rt] RT listening for mailbox commands...
33,214,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,245,436 UART: [rt]cmd =0x44504543, len=96
39,013,779 >>> mbox cmd response data (6236 bytes)
39,043,421 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,074,220 UART: [rt]cmd =0x53574545, len=84
44,659,432 >>> mbox cmd response data (200 bytes)
47,120,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
55,952,846 >>> mbox cmd response: success
55,953,702 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,986,104 UART:
55,986,395 UART: Running Caliptra FMC ...
55,987,435 UART:
55,987,611 UART: [state] CFI Enabled
56,094,427 UART: [art] Extend RT PCRs Done
56,095,778 UART: [art] Lock RT PCRs Done
56,097,300 UART: [art] Populate DV Done
56,102,503 UART: [fht] FMC Alias Private Key: 7
56,104,098 UART: [art] Derive CDI
56,104,917 UART: [art] Store in slot 0x4
56,163,556 UART: [art] Derive Key Pair
56,164,597 UART: [art] Store priv key in slot 0x5
59,458,306 UART: [art] Derive Key Pair - Done
59,471,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,759,126 UART: [art] Erasing AUTHORITY.KEYID = 7
61,760,632 UART: [art] PUB.X = 952E45D4BF85FB8A5BDACCE4B6F6294A054185A3887D620A03742E55C7DCB9F58C8D236FE9EDFC999349B29A82F14580
61,767,883 UART: [art] PUB.Y = 28F083AF37AEF6C8C8D014E08CC1F4ABFD9ED67B4BDFAE0496FFE3DF58CEAB679D5E5841CCBF0AD1B6BDBF8713938A6B
61,775,178 UART: [art] SIG.R = 4C33CF99FD3D49838784ED8E09604BA957C5CED4AE7F02E99F4AC84A1C4C35724029CB6777AFB5F5C87DA54C390AF221
61,782,573 UART: [art] SIG.S = 9F4A8C1B6E914CB70E3D1B21BB15C9A9AAA1863A57B056D772E50DC4D83B482B8C96E19DDC42DF80948D0CA345CB7038
63,087,706 UART: Caliptra RT
63,088,425 UART: [state] CFI Enabled
63,503,068 UART: [rt] RT listening for mailbox commands...
63,534,876 UART: [rt]cmd =0x53574545, len=84
69,101,344 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,372 UART:
192,745 UART: Running Caliptra ROM ...
193,864 UART:
603,680 UART: [state] CFI Enabled
617,840 UART: [state] LifecycleState = Unprovisioned
619,732 UART: [state] DebugLocked = No
621,468 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,824 UART: [kat] SHA2-256
796,638 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,153 UART: [kat] ++
807,633 UART: [kat] sha1
818,146 UART: [kat] SHA2-256
820,884 UART: [kat] SHA2-384
826,697 UART: [kat] SHA2-512-ACC
829,066 UART: [kat] ECC-384
3,112,091 UART: [kat] HMAC-384Kdf
3,123,478 UART: [kat] LMS
4,313,552 UART: [kat] --
4,320,347 UART: [cold-reset] ++
4,322,297 UART: [fht] Storing FHT @ 0x50003400
4,333,558 UART: [idev] ++
4,334,125 UART: [idev] CDI.KEYID = 6
4,335,074 UART: [idev] SUBJECT.KEYID = 7
4,336,315 UART: [idev] UDS.KEYID = 0
4,337,276 ready_for_fw is high
4,337,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,422 UART: [idev] Erasing UDS.KEYID = 0
7,623,515 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,884 UART: [idev] --
7,650,264 UART: [ldev] ++
7,650,831 UART: [ldev] CDI.KEYID = 6
7,651,789 UART: [ldev] SUBJECT.KEYID = 5
7,652,992 UART: [ldev] AUTHORITY.KEYID = 7
7,654,267 UART: [ldev] FE.KEYID = 1
7,666,457 UART: [ldev] Erasing FE.KEYID = 1
10,953,289 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,283 UART: [ldev] --
13,313,214 UART: [fwproc] Waiting for Commands...
13,315,412 UART: [fwproc] Received command 0x46574c44
13,317,585 UART: [fwproc] Received Image of size 118548 bytes
17,426,976 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,507,503 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,634 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,909,360 >>> mbox cmd response: success
17,913,892 UART: [afmc] ++
17,914,483 UART: [afmc] CDI.KEYID = 6
17,915,538 UART: [afmc] SUBJECT.KEYID = 7
17,916,657 UART: [afmc] AUTHORITY.KEYID = 5
21,229,454 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,711 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,527,956 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,417 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,557,109 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,528 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,592,297 UART: [afmc] --
23,595,941 UART: [cold-reset] --
23,599,251 UART: [state] Locking Datavault
23,605,680 UART: [state] Locking PCR0, PCR1 and PCR31
23,607,434 UART: [state] Locking ICCM
23,608,764 UART: [exit] Launching FMC @ 0x40000130
23,617,158 UART:
23,617,385 UART: Running Caliptra FMC ...
23,618,479 UART:
23,618,649 UART: [state] CFI Enabled
23,626,526 UART: [fht] FMC Alias Private Key: 7
25,966,925 UART: [art] Extend RT PCRs Done
25,968,144 UART: [art] Lock RT PCRs Done
25,970,094 UART: [art] Populate DV Done
25,975,343 UART: [fht] FMC Alias Private Key: 7
25,976,880 UART: [art] Derive CDI
25,977,635 UART: [art] Store in slot 0x4
26,020,054 UART: [art] Derive Key Pair
26,021,095 UART: [art] Store priv key in slot 0x5
29,263,230 UART: [art] Derive Key Pair - Done
29,276,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,688 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,189 UART: [art] PUB.X = 4F2668E595DF1C5D5E83C0756C4D445D1D93EAD4E4C3747F8568BEF7957840CD816F66D2D27EBE90B6A95BC4C1D6F640
31,565,438 UART: [art] PUB.Y = 428AE07C3002E4F9709CC590E769CC9485BC05D0188870EBA1225AF752DEA4B9400E58B9D68164D80B456ECF1D54D07C
31,572,677 UART: [art] SIG.R = 8312846F5FEFA13E98B1968DDAA5A6AE0BCB4EF328391BBF272E2BCC8A26588D2B2DEDE200A062F8B385FB622426B341
31,580,094 UART: [art] SIG.S = 786FCF1B735776615BD3EEB836A22CF8AE6B599F01D0F271F3AF8AE3BE7D1FC8EFC5EA0CF0751BD93F672109840CC9B5
32,885,528 UART: Caliptra RT
32,886,228 UART: [state] CFI Enabled
33,019,172 UART: [rt] RT listening for mailbox commands...
33,021,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,051,744 UART: [rt]cmd =0x44504543, len=96
38,725,665 >>> mbox cmd response data (6236 bytes)
38,755,610 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,786,191 UART: [rt]cmd =0x53574545, len=84
44,311,097 >>> mbox cmd response data (200 bytes)
46,769,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
46,920,240 UART:
46,920,633 UART: Running Caliptra ROM ...
46,921,686 UART:
46,921,894 UART: [state] CFI Enabled
46,936,381 UART: [state] LifecycleState = Unprovisioned
46,938,260 UART: [state] DebugLocked = No
46,940,532 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
46,945,084 UART: [kat] SHA2-256
47,114,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,125,368 UART: [kat] ++
47,125,845 UART: [kat] sha1
47,137,914 UART: [kat] SHA2-256
47,140,610 UART: [kat] SHA2-384
47,147,603 UART: [kat] SHA2-512-ACC
47,150,006 UART: [kat] ECC-384
49,435,313 UART: [kat] HMAC-384Kdf
49,446,409 UART: [kat] LMS
50,636,447 UART: [kat] --
50,641,912 UART: [update-reset] ++
54,830,945 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,834,599 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,232,355 >>> mbox cmd response: success
55,232,778 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,233,979 UART: [update-reset] Copying MAN_2 To MAN_1
55,256,403 UART: [update-reset Success] --
55,260,570 UART: [state] Locking Datavault
55,263,882 UART: [state] Locking PCR0, PCR1 and PCR31
55,265,629 UART: [state] Locking ICCM
55,268,070 UART: [exit] Launching FMC @ 0x40000130
55,276,506 UART:
55,276,733 UART: Running Caliptra FMC ...
55,277,757 UART:
55,277,901 UART: [state] CFI Enabled
55,323,111 UART: [art] Extend RT PCRs Done
55,324,294 UART: [art] Lock RT PCRs Done
55,325,873 UART: [art] Populate DV Done
55,331,376 UART: [fht] FMC Alias Private Key: 7
55,332,960 UART: [art] Derive CDI
55,333,690 UART: [art] Store in slot 0x4
55,376,890 UART: [art] Derive Key Pair
55,377,883 UART: [art] Store priv key in slot 0x5
58,620,355 UART: [art] Derive Key Pair - Done
58,632,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
60,913,329 UART: [art] Erasing AUTHORITY.KEYID = 7
60,914,837 UART: [art] PUB.X = CA54A46D685EBCF443DD656D1441E17D83036D6503B88928FC30F81B8E9940EB6B7262881AD9D8DBF8117A2C2810608A
60,922,090 UART: [art] PUB.Y = 37ECDF2ED53B8E1253E75357C69A85BCC74DCF773D01DE6C934A8CDA176D307F750C3D2B5C609065EC8415F5E93BB6BC
60,929,385 UART: [art] SIG.R = D7DAA6D6E6022290537753C853A668A27B5145EC6840B725269E4A7DBC5B33EC8F8C6C153EC9175397D1C31770E40740
60,936,734 UART: [art] SIG.S = 3D9259B64D5FC650640CB724C03AF2146D695744CAD0413493350FFFBE721EF7B4C4100C3770ED8ED8CD5860FCDAD8E1
62,242,301 UART: Caliptra RT
62,243,002 UART: [state] CFI Enabled
62,615,748 UART: [rt] RT listening for mailbox commands...
62,647,327 UART: [rt]cmd =0x53574545, len=84
68,171,967 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
4,128,461 ready_for_fw is high
4,129,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,058 >>> mbox cmd response: success
23,794,996 UART:
23,795,479 UART: Running Caliptra FMC ...
23,796,609 UART:
23,796,763 UART: [state] CFI Enabled
23,804,404 UART: [fht] FMC Alias Private Key: 7
26,143,615 UART: [art] Extend RT PCRs Done
26,144,872 UART: [art] Lock RT PCRs Done
26,146,778 UART: [art] Populate DV Done
26,152,029 UART: [fht] FMC Alias Private Key: 7
26,153,578 UART: [art] Derive CDI
26,154,389 UART: [art] Store in slot 0x4
26,196,921 UART: [art] Derive Key Pair
26,197,922 UART: [art] Store priv key in slot 0x5
29,440,098 UART: [art] Derive Key Pair - Done
29,453,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,257 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,793 UART: [art] PUB.X = F0B363035C54944B4B17FF21D87B5A8A69503D632E494C31C68111B0AB2F7A62D3E9AAA578E85EC6DFCA21089E4D1FD1
31,742,055 UART: [art] PUB.Y = D10D39252898D1CC5CE746BDD1624EC3AAEF15A4419754E571BE9F9E3FE1A0C6AE85B3A0AA2F0A4C1F6A7EDEB2195890
31,749,335 UART: [art] SIG.R = 705A3D9181AB1C91FF57F08AAE44597B16838DF31E0B76D12158FCB4F45B2B01A2DC33BB31E69224685E86937EC5DFD5
31,756,737 UART: [art] SIG.S = 02FACDF8FFF3CBD00818ECD71D1171C73A44D191B5240616A921C4DD14DD78883750B8A74161D0910BEF13C46F3F1FD3
33,062,252 UART: Caliptra RT
33,062,989 UART: [state] CFI Enabled
33,196,028 UART: [rt] RT listening for mailbox commands...
33,197,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,228,501 UART: [rt]cmd =0x44504543, len=96
38,903,338 >>> mbox cmd response data (6236 bytes)
38,933,101 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,963,646 UART: [rt]cmd =0x53574545, len=84
44,488,687 >>> mbox cmd response data (200 bytes)
46,947,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
55,692,620 >>> mbox cmd response: success
55,693,384 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,726,045 UART:
55,726,338 UART: Running Caliptra FMC ...
55,727,453 UART:
55,727,607 UART: [state] CFI Enabled
55,772,220 UART: [art] Extend RT PCRs Done
55,773,590 UART: [art] Lock RT PCRs Done
55,774,889 UART: [art] Populate DV Done
55,780,725 UART: [fht] FMC Alias Private Key: 7
55,782,201 UART: [art] Derive CDI
55,782,963 UART: [art] Store in slot 0x4
55,825,437 UART: [art] Derive Key Pair
55,826,452 UART: [art] Store priv key in slot 0x5
59,068,918 UART: [art] Derive Key Pair - Done
59,081,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,362,376 UART: [art] Erasing AUTHORITY.KEYID = 7
61,363,903 UART: [art] PUB.X = BCA519A3C3B8CE37191A78FB10F7254344A60C1F36C172E2CF18877315E0881690ED754E07BA6ED9FB964A4E8F1B086A
61,371,153 UART: [art] PUB.Y = 0D839F355B110EBD48CBCC9142EB7E6DAFD02BB51F73E69F0AFDF7BD57C5B1633F703C80D788A0A4760C523CB2386C76
61,378,433 UART: [art] SIG.R = 290D4FB531990A8EBE7ACB679CCD894736BDB4AE63363CA3FDA62D168C64AEE16D0D5F9FEDE81541B260D5C8EE2CC2AD
61,385,815 UART: [art] SIG.S = A1425E665DF91DDC991DF467933AC373EC36BFE26406D67377A624DFC0DF4B9A6CAB336D6370D1B19D2BC2D018A7EE94
62,691,303 UART: Caliptra RT
62,692,023 UART: [state] CFI Enabled
63,068,333 UART: [rt] RT listening for mailbox commands...
63,100,133 UART: [rt]cmd =0x53574545, len=84
68,625,093 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,208 UART:
192,588 UART: Running Caliptra ROM ...
193,785 UART:
193,953 UART: [state] CFI Enabled
261,623 UART: [state] LifecycleState = Unprovisioned
263,617 UART: [state] DebugLocked = No
266,217 UART: [state] WD Timer not started. Device not locked for debugging
270,250 UART: [kat] SHA2-256
449,858 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,654 UART: [kat] ++
461,180 UART: [kat] sha1
472,130 UART: [kat] SHA2-256
474,812 UART: [kat] SHA2-384
480,521 UART: [kat] SHA2-512-ACC
482,887 UART: [kat] ECC-384
2,926,602 UART: [kat] HMAC-384Kdf
2,950,081 UART: [kat] LMS
3,426,555 UART: [kat] --
3,431,058 UART: [cold-reset] ++
3,432,593 UART: [fht] FHT @ 0x50003400
3,444,357 UART: [idev] ++
3,444,928 UART: [idev] CDI.KEYID = 6
3,445,906 UART: [idev] SUBJECT.KEYID = 7
3,447,149 UART: [idev] UDS.KEYID = 0
3,448,048 ready_for_fw is high
3,448,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,243 UART: [idev] Erasing UDS.KEYID = 0
5,967,526 UART: [idev] Sha1 KeyId Algorithm
5,990,304 UART: [idev] --
5,995,950 UART: [ldev] ++
5,996,527 UART: [ldev] CDI.KEYID = 6
5,997,499 UART: [ldev] SUBJECT.KEYID = 5
5,998,660 UART: [ldev] AUTHORITY.KEYID = 7
5,999,960 UART: [ldev] FE.KEYID = 1
6,035,675 UART: [ldev] Erasing FE.KEYID = 1
8,545,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,361 UART: [ldev] --
10,351,358 UART: [fwproc] Wait for Commands...
10,353,555 UART: [fwproc] Recv command 0x46574c44
10,355,534 UART: [fwproc] Recv'd Img size: 118548 bytes
13,838,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,916,992 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,990,004 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,317,881 >>> mbox cmd response: success
14,321,459 UART: [afmc] ++
14,322,090 UART: [afmc] CDI.KEYID = 6
14,323,006 UART: [afmc] SUBJECT.KEYID = 7
14,324,223 UART: [afmc] AUTHORITY.KEYID = 5
16,851,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,576,368 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,578,531 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,594,331 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,610,382 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,625,989 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,651,891 UART: [afmc] --
18,656,037 UART: [cold-reset] --
18,661,035 UART: [state] Locking Datavault
18,665,738 UART: [state] Locking PCR0, PCR1 and PCR31
18,667,485 UART: [state] Locking ICCM
18,669,525 UART: [exit] Launching FMC @ 0x40000130
18,677,973 UART:
18,678,223 UART: Running Caliptra FMC ...
18,679,322 UART:
18,679,477 UART: [state] CFI Enabled
18,732,749 UART: [fht] FMC Alias Private Key: 7
20,520,119 UART: [art] Extend RT PCRs Done
20,521,328 UART: [art] Lock RT PCRs Done
20,523,217 UART: [art] Populate DV Done
20,528,894 UART: [fht] FMC Alias Private Key: 7
20,530,426 UART: [art] Derive CDI
20,531,235 UART: [art] Store in slot 0x4
20,586,106 UART: [art] Derive Key Pair
20,587,134 UART: [art] Store priv key in slot 0x5
23,050,053 UART: [art] Derive Key Pair - Done
23,062,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,426 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,930 UART: [art] PUB.X = AA01DB0B352EAD722C1974AAF8AEAB8CC608FFD6C94B5E9386ED862D3229DDE68CFFA2C3C923AE681983CD5C33C0CEC7
24,785,252 UART: [art] PUB.Y = 9EF3009F898E3E2890EB419E9293ADD2886C03D67F86B9F928A72E6FFEC55F582460D87C60855B753838C0DB4B02FF69
24,792,476 UART: [art] SIG.R = 1044912AAD5D1C0C995E652593E398C1314DD0C2B84D0BE13F74552CACB226433BBC47ECCF790B4E817A376DC415DD7D
24,799,878 UART: [art] SIG.S = EF11696B0B5B5BD848A0ED98609C2BE9E7504893E491F88255E864EB12DDE9616F3566FA4F0DE5858F3283CEB64BB6CE
25,779,395 UART: Caliptra RT
25,780,103 UART: [state] CFI Enabled
25,959,752 UART: [rt] RT listening for mailbox commands...
25,961,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,992,314 UART: [rt]cmd =0x44504543, len=96
30,357,442 >>> mbox cmd response data (6236 bytes)
30,387,178 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,417,706 UART: [rt]cmd =0x53574545, len=84
34,595,156 >>> mbox cmd response data (200 bytes)
37,038,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,189,406 UART:
37,189,783 UART: Running Caliptra ROM ...
37,190,833 UART:
37,190,990 UART: [state] CFI Enabled
37,252,473 UART: [state] LifecycleState = Unprovisioned
37,254,367 UART: [state] DebugLocked = No
37,257,123 UART: [state] WD Timer not started. Device not locked for debugging
37,261,124 UART: [kat] SHA2-256
37,440,777 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,451,534 UART: [kat] ++
37,451,988 UART: [kat] sha1
37,463,894 UART: [kat] SHA2-256
37,466,589 UART: [kat] SHA2-384
37,472,682 UART: [kat] SHA2-512-ACC
37,475,023 UART: [kat] ECC-384
39,940,564 UART: [kat] HMAC-384Kdf
39,959,625 UART: [kat] LMS
40,436,122 UART: [kat] --
40,441,478 UART: [update-reset] ++
43,940,770 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,945,167 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,342,773 >>> mbox cmd response: success
44,343,252 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,343,652 UART: [update-reset] Copying MAN_2 To MAN_1
44,380,667 UART: [update-reset Success] --
44,385,025 UART: [state] Locking Datavault
44,387,311 UART: [state] Locking PCR0, PCR1 and PCR31
44,389,655 UART: [state] Locking ICCM
44,390,579 UART: [exit] Launching FMC @ 0x40000130
44,398,547 UART:
44,398,787 UART: Running Caliptra FMC ...
44,399,888 UART:
44,400,041 UART: [state] CFI Enabled
44,493,000 UART: [art] Extend RT PCRs Done
44,494,192 UART: [art] Lock RT PCRs Done
44,495,750 UART: [art] Populate DV Done
44,501,207 UART: [fht] FMC Alias Private Key: 7
44,502,953 UART: [art] Derive CDI
44,503,763 UART: [art] Store in slot 0x4
44,561,910 UART: [art] Derive Key Pair
44,562,940 UART: [art] Store priv key in slot 0x5
47,026,005 UART: [art] Derive Key Pair - Done
47,039,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,751,414 UART: [art] Erasing AUTHORITY.KEYID = 7
48,752,933 UART: [art] PUB.X = 002C9464094F39C403ECA0393620243F04C0FBF70DB7FC676E47A30B7A828810E808B1A0EDA12038847A35705FB2A67A
48,760,142 UART: [art] PUB.Y = A53DFD9FE19B6C5A05E2A9C3BA9E51932EAA73DABE4089E566D33139F08B3881FAB0565FB78FF53A7A2D6FDCFD94C039
48,767,436 UART: [art] SIG.R = E4BB08CC61ED4BF70685958CEC8ACFE553B15F7665680CEA84F009231879E1CBD8B252278B4E771C63C436B7176A6743
48,774,773 UART: [art] SIG.S = B20C3FBFDD20EA6F891CDB3929208E40B5EA861182591921E0D6050F7DEBE2E7BE32D4BAB40DF70AFC78F027F77A956B
49,753,740 UART: Caliptra RT
49,754,441 UART: [state] CFI Enabled
50,171,783 UART: [rt] RT listening for mailbox commands...
50,203,575 UART: [rt]cmd =0x53574545, len=84
54,367,446 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,459,283 ready_for_fw is high
3,459,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,213,032 >>> mbox cmd response: success
18,491,530 UART:
18,491,925 UART: Running Caliptra FMC ...
18,493,064 UART:
18,493,225 UART: [state] CFI Enabled
18,558,725 UART: [fht] FMC Alias Private Key: 7
20,325,164 UART: [art] Extend RT PCRs Done
20,326,378 UART: [art] Lock RT PCRs Done
20,327,999 UART: [art] Populate DV Done
20,333,578 UART: [fht] FMC Alias Private Key: 7
20,335,278 UART: [art] Derive CDI
20,336,091 UART: [art] Store in slot 0x4
20,390,889 UART: [art] Derive Key Pair
20,391,930 UART: [art] Store priv key in slot 0x5
22,855,222 UART: [art] Derive Key Pair - Done
22,868,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,580,570 UART: [art] Erasing AUTHORITY.KEYID = 7
24,582,053 UART: [art] PUB.X = 64607D6652AC7B3CCACEB32374EFA8D9447DA467DF0ED6FFC34F8C1984DEDCC7D501C5B22B91210063D08ABFBFCE734A
24,589,431 UART: [art] PUB.Y = E5650FDBE22C9872BEAE688883FF1B9B5B299FC2DD985CD754E3FA750352579DE51D63B83D4A065D78A5C60B8A604735
24,596,641 UART: [art] SIG.R = DF96DFB273BF0107E17602F306CF5D6845A632C45C96C11529852919813DC9D8C5C275F7468AE0786DC34E10339BCFCB
24,604,040 UART: [art] SIG.S = C8A756231B9B995780C71BB6518BC4BCFA8741C067B69AE253D975119174BF5664A0FFD690765F5D10C087CDB31408D0
25,583,563 UART: Caliptra RT
25,584,272 UART: [state] CFI Enabled
25,763,121 UART: [rt] RT listening for mailbox commands...
25,765,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,795,759 UART: [rt]cmd =0x44504543, len=96
30,161,186 >>> mbox cmd response data (6236 bytes)
30,191,106 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,221,753 UART: [rt]cmd =0x53574545, len=84
34,398,362 >>> mbox cmd response data (200 bytes)
36,851,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,170,083 >>> mbox cmd response: success
44,170,678 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,204,133 UART:
44,204,479 UART: Running Caliptra FMC ...
44,205,520 UART:
44,205,666 UART: [state] CFI Enabled
44,295,065 UART: [art] Extend RT PCRs Done
44,296,357 UART: [art] Lock RT PCRs Done
44,297,822 UART: [art] Populate DV Done
44,303,069 UART: [fht] FMC Alias Private Key: 7
44,304,720 UART: [art] Derive CDI
44,305,528 UART: [art] Store in slot 0x4
44,364,332 UART: [art] Derive Key Pair
44,365,373 UART: [art] Store priv key in slot 0x5
46,827,700 UART: [art] Derive Key Pair - Done
46,840,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,553,529 UART: [art] Erasing AUTHORITY.KEYID = 7
48,555,049 UART: [art] PUB.X = 36209B900F6CE540BAFB652D6D6E3D89E8C1A5CFFBDEB64620377541F5F2F9489CDBF70A7B625C7D1879FED02632E2FF
48,562,361 UART: [art] PUB.Y = 1D91DD0FDF85A950E8DAC540E3A85A7221F55F871A7E8188A94834963867F82B0E97C5813D403762E1FC7D8B253498CD
48,569,561 UART: [art] SIG.R = 1BC698C64D9A5C350A3B2D1DF542C10DE1F7277251A14CF58C6B1852D9FECE03FDF57B3A552F0EA30034970CEBA73854
48,576,967 UART: [art] SIG.S = D9421097EB7FD14F206CA7F682983EA90F4DECCDB489CA77D54C165379F9AD2000CBFF5BE19DA8BF956C25C4270ACE8F
49,555,960 UART: Caliptra RT
49,556,647 UART: [state] CFI Enabled
49,974,328 UART: [rt] RT listening for mailbox commands...
50,005,876 UART: [rt]cmd =0x53574545, len=84
54,168,876 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,403 UART:
192,764 UART: Running Caliptra ROM ...
193,874 UART:
603,772 UART: [state] CFI Enabled
617,792 UART: [state] LifecycleState = Unprovisioned
619,693 UART: [state] DebugLocked = No
621,155 UART: [state] WD Timer not started. Device not locked for debugging
624,997 UART: [kat] SHA2-256
804,638 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,447 UART: [kat] ++
815,932 UART: [kat] sha1
827,024 UART: [kat] SHA2-256
829,685 UART: [kat] SHA2-384
835,106 UART: [kat] SHA2-512-ACC
837,486 UART: [kat] ECC-384
3,280,774 UART: [kat] HMAC-384Kdf
3,293,466 UART: [kat] LMS
3,769,976 UART: [kat] --
3,774,217 UART: [cold-reset] ++
3,776,652 UART: [fht] FHT @ 0x50003400
3,787,839 UART: [idev] ++
3,788,478 UART: [idev] CDI.KEYID = 6
3,789,388 UART: [idev] SUBJECT.KEYID = 7
3,790,634 UART: [idev] UDS.KEYID = 0
3,791,735 ready_for_fw is high
3,791,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,786 UART: [idev] Erasing UDS.KEYID = 0
6,270,416 UART: [idev] Sha1 KeyId Algorithm
6,292,996 UART: [idev] --
6,298,180 UART: [ldev] ++
6,298,753 UART: [ldev] CDI.KEYID = 6
6,299,717 UART: [ldev] SUBJECT.KEYID = 5
6,300,881 UART: [ldev] AUTHORITY.KEYID = 7
6,302,172 UART: [ldev] FE.KEYID = 1
6,314,547 UART: [ldev] Erasing FE.KEYID = 1
8,793,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,561 UART: [ldev] --
10,586,052 UART: [fwproc] Wait for Commands...
10,589,175 UART: [fwproc] Recv command 0x46574c44
10,591,160 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,194 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,239 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,166 >>> mbox cmd response: success
14,557,136 UART: [afmc] ++
14,557,727 UART: [afmc] CDI.KEYID = 6
14,558,695 UART: [afmc] SUBJECT.KEYID = 7
14,559,911 UART: [afmc] AUTHORITY.KEYID = 5
17,062,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,020 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,858 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,942 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,485 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,321 UART: [afmc] --
18,864,457 UART: [cold-reset] --
18,869,508 UART: [state] Locking Datavault
18,876,375 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,132 UART: [state] Locking ICCM
18,879,854 UART: [exit] Launching FMC @ 0x40000130
18,888,256 UART:
18,888,496 UART: Running Caliptra FMC ...
18,889,602 UART:
18,889,765 UART: [state] CFI Enabled
18,897,940 UART: [fht] FMC Alias Private Key: 7
20,664,042 UART: [art] Extend RT PCRs Done
20,665,262 UART: [art] Lock RT PCRs Done
20,666,780 UART: [art] Populate DV Done
20,671,942 UART: [fht] FMC Alias Private Key: 7
20,673,430 UART: [art] Derive CDI
20,674,194 UART: [art] Store in slot 0x4
20,716,998 UART: [art] Derive Key Pair
20,718,000 UART: [art] Store priv key in slot 0x5
23,145,051 UART: [art] Derive Key Pair - Done
23,158,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,462 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,965 UART: [art] PUB.X = 37842CC4C93C768B7CAD559A5492B133897DDE93673F839845F06D59B092D97368E317FF66B0A3A10657DF0B6B45EB4C
24,873,216 UART: [art] PUB.Y = BAE1A41CD5647B6DBD0943902CEDC9FAD492E123D7B1880CC69CCBA858E83639717E84B37E8D0D6563D4534A95A33318
24,880,502 UART: [art] SIG.R = 5074357F4D582411B86BE5525554B6EB4B9327B01F8278BB00AEE8194E0753D42827E5127F54DACB4FF244D431C6AC4E
24,887,842 UART: [art] SIG.S = 72CF9AEE7698D20FB1AFA3A5DEA28A71A1DF79B5F36B4A80C091734416E75D98AFEDBB4C50139FDADD0C6D5FA2602A7F
25,867,080 UART: Caliptra RT
25,867,785 UART: [state] CFI Enabled
26,000,834 UART: [rt] RT listening for mailbox commands...
26,002,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,033,307 UART: [rt]cmd =0x44504543, len=96
30,318,807 >>> mbox cmd response data (6236 bytes)
30,348,783 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,379,576 UART: [rt]cmd =0x53574545, len=84
34,515,078 >>> mbox cmd response data (200 bytes)
36,972,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,123,113 UART:
37,123,508 UART: Running Caliptra ROM ...
37,124,600 UART:
37,124,767 UART: [state] CFI Enabled
37,140,182 UART: [state] LifecycleState = Unprovisioned
37,142,220 UART: [state] DebugLocked = No
37,144,614 UART: [state] WD Timer not started. Device not locked for debugging
37,148,803 UART: [kat] SHA2-256
37,328,556 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,339,320 UART: [kat] ++
37,339,974 UART: [kat] sha1
37,351,462 UART: [kat] SHA2-256
37,354,160 UART: [kat] SHA2-384
37,360,259 UART: [kat] SHA2-512-ACC
37,362,609 UART: [kat] ECC-384
39,803,118 UART: [kat] HMAC-384Kdf
39,816,722 UART: [kat] LMS
40,293,182 UART: [kat] --
40,299,347 UART: [update-reset] ++
43,796,780 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,800,371 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,198,011 >>> mbox cmd response: success
44,198,445 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,198,996 UART: [update-reset] Copying MAN_2 To MAN_1
44,236,126 UART: [update-reset Success] --
44,242,201 UART: [state] Locking Datavault
44,247,019 UART: [state] Locking PCR0, PCR1 and PCR31
44,248,787 UART: [state] Locking ICCM
44,250,359 UART: [exit] Launching FMC @ 0x40000130
44,258,697 UART:
44,258,942 UART: Running Caliptra FMC ...
44,260,051 UART:
44,260,244 UART: [state] CFI Enabled
44,303,942 UART: [art] Extend RT PCRs Done
44,305,096 UART: [art] Lock RT PCRs Done
44,306,335 UART: [art] Populate DV Done
44,312,010 UART: [fht] FMC Alias Private Key: 7
44,313,666 UART: [art] Derive CDI
44,314,483 UART: [art] Store in slot 0x4
44,356,913 UART: [art] Derive Key Pair
44,357,978 UART: [art] Store priv key in slot 0x5
46,785,035 UART: [art] Derive Key Pair - Done
46,797,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,504,449 UART: [art] Erasing AUTHORITY.KEYID = 7
48,505,954 UART: [art] PUB.X = 809A82FB6AA4828B11487B0EDE4DF7FE51491B6439536FA5401BB9A2BC6C31FFDBDF8153AC0FCFB41160501A565C635F
48,513,187 UART: [art] PUB.Y = 736AFD8825A97D73425E1E6CE5FC3727B7797EEE7A109F939862AFBDD6B3D6172749F57F8EA11C75612CCC8170E84967
48,520,515 UART: [art] SIG.R = C4353BCA27A7C0499C7E7C3190CD4F439B4E67EED71D6C2B3A308FA49BBA8A46E6666E23CCBC1259CA6DD5D8E4BD1F26
48,527,905 UART: [art] SIG.S = EDD10BF190685DE01ACBC67BB429D14AD188B1DF6CC13D4DC349645EAC1EA9077CA7493AF630B2674065B813A47010B9
49,506,522 UART: Caliptra RT
49,507,212 UART: [state] CFI Enabled
49,876,356 UART: [rt] RT listening for mailbox commands...
49,908,000 UART: [rt]cmd =0x53574545, len=84
54,043,576 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
3,780,686 ready_for_fw is high
3,781,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,040 >>> mbox cmd response: success
18,692,342 UART:
18,692,764 UART: Running Caliptra FMC ...
18,693,868 UART:
18,694,035 UART: [state] CFI Enabled
18,701,937 UART: [fht] FMC Alias Private Key: 7
20,467,772 UART: [art] Extend RT PCRs Done
20,469,005 UART: [art] Lock RT PCRs Done
20,470,372 UART: [art] Populate DV Done
20,475,791 UART: [fht] FMC Alias Private Key: 7
20,477,322 UART: [art] Derive CDI
20,478,114 UART: [art] Store in slot 0x4
20,520,832 UART: [art] Derive Key Pair
20,521,843 UART: [art] Store priv key in slot 0x5
22,948,934 UART: [art] Derive Key Pair - Done
22,961,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,098 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,609 UART: [art] PUB.X = 40C4D10E1A11839EC44BF5E48333319234CEA1EA0E3B3360F9F45D9A7824D0C9857C9CF90DE61E4FAD987FD057DD7AAE
24,676,877 UART: [art] PUB.Y = 025939B490E2005C2A255AB9F90A13A7557FFF3EE66454BD0F06C67D282989727ABE1BC20573AFEBFD419C20C50EF36E
24,684,141 UART: [art] SIG.R = BBF1591A378DB7F4A76F2239B871851854EBC0DDD7D9D77B5E9E4F07D993C85B45118F68162B153DF986AB325078C5F6
24,691,545 UART: [art] SIG.S = 6255E834BF3560C95CB27B4B478791BE848E38CA23A88588CFF441CC52F837DD28FF4945AE44890DF2F8A161375B4386
25,670,875 UART: Caliptra RT
25,671,581 UART: [state] CFI Enabled
25,804,856 UART: [rt] RT listening for mailbox commands...
25,806,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,837,715 UART: [rt]cmd =0x44504543, len=96
30,122,961 >>> mbox cmd response data (6236 bytes)
30,152,686 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,183,322 UART: [rt]cmd =0x53574545, len=84
34,319,494 >>> mbox cmd response data (200 bytes)
36,769,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,987,822 >>> mbox cmd response: success
43,988,387 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,023,679 UART:
44,024,014 UART: Running Caliptra FMC ...
44,025,146 UART:
44,025,337 UART: [state] CFI Enabled
44,069,257 UART: [art] Extend RT PCRs Done
44,070,508 UART: [art] Lock RT PCRs Done
44,071,969 UART: [art] Populate DV Done
44,077,661 UART: [fht] FMC Alias Private Key: 7
44,079,198 UART: [art] Derive CDI
44,079,981 UART: [art] Store in slot 0x4
44,123,234 UART: [art] Derive Key Pair
44,124,240 UART: [art] Store priv key in slot 0x5
46,551,434 UART: [art] Derive Key Pair - Done
46,564,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,270,155 UART: [art] Erasing AUTHORITY.KEYID = 7
48,271,668 UART: [art] PUB.X = 57C0EB715DF5C582BEAF833039DE641E796524BD83539EAB11BFA2CCA5F63F0DD1E16167E2323C699DCC3D74BBC0132C
48,278,926 UART: [art] PUB.Y = 0F8CC49A75E96905D3ED5E421D65DC2EA272BAC0DFB5F4675F252C85C4E6D800F7843E88FF07613DA7D66636B1244630
48,286,163 UART: [art] SIG.R = DF69C8755CD65E5D716826C0ECF233186A04B3298FC813C0AAD8B5C2EF6D2A4867621377283013BBB3B817B7E55A755D
48,293,568 UART: [art] SIG.S = 1D64DCF38B6F2167C6FAA68426B54FDA8BCC0D98EFEA029A0583E20249FFCAFCE589EA4B1C5DA511A11CF3A8F9995EA1
49,272,579 UART: Caliptra RT
49,273,291 UART: [state] CFI Enabled
49,648,562 UART: [rt] RT listening for mailbox commands...
49,680,313 UART: [rt]cmd =0x53574545, len=84
53,816,197 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,077 UART:
192,444 UART: Running Caliptra ROM ...
193,632 UART:
193,789 UART: [state] CFI Enabled
263,373 UART: [state] LifecycleState = Unprovisioned
265,788 UART: [state] DebugLocked = No
267,537 UART: [state] WD Timer not started. Device not locked for debugging
272,435 UART: [kat] SHA2-256
462,270 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,071 UART: [kat] ++
473,576 UART: [kat] sha1
484,757 UART: [kat] SHA2-256
487,779 UART: [kat] SHA2-384
493,772 UART: [kat] SHA2-512-ACC
496,345 UART: [kat] ECC-384
2,948,791 UART: [kat] HMAC-384Kdf
2,974,474 UART: [kat] LMS
3,506,225 UART: [kat] --
3,509,797 UART: [cold-reset] ++
3,511,857 UART: [fht] FHT @ 0x50003400
3,523,649 UART: [idev] ++
3,524,369 UART: [idev] CDI.KEYID = 6
3,525,288 UART: [idev] SUBJECT.KEYID = 7
3,526,532 UART: [idev] UDS.KEYID = 0
3,527,463 ready_for_fw is high
3,527,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,776 UART: [idev] Erasing UDS.KEYID = 0
6,032,579 UART: [idev] Sha1 KeyId Algorithm
6,054,754 UART: [idev] --
6,059,615 UART: [ldev] ++
6,060,297 UART: [ldev] CDI.KEYID = 6
6,061,263 UART: [ldev] SUBJECT.KEYID = 5
6,062,425 UART: [ldev] AUTHORITY.KEYID = 7
6,063,605 UART: [ldev] FE.KEYID = 1
6,102,451 UART: [ldev] Erasing FE.KEYID = 1
8,605,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,158 UART: [ldev] --
10,415,861 UART: [fwproc] Wait for Commands...
10,418,816 UART: [fwproc] Recv command 0x46574c44
10,421,138 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,627 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,288 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,326 >>> mbox cmd response: success
14,683,848 UART: [afmc] ++
14,684,578 UART: [afmc] CDI.KEYID = 6
14,685,767 UART: [afmc] SUBJECT.KEYID = 7
14,687,265 UART: [afmc] AUTHORITY.KEYID = 5
17,211,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,261 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,391 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,501 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,430 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,985 UART: [afmc] --
19,012,680 UART: [cold-reset] --
19,016,655 UART: [state] Locking Datavault
19,022,507 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,715 UART: [state] Locking ICCM
19,027,035 UART: [exit] Launching FMC @ 0x40000130
19,035,664 UART:
19,035,943 UART: Running Caliptra FMC ...
19,037,058 UART:
19,037,233 UART: [state] CFI Enabled
19,087,595 UART: [fht] FMC Alias Private Key: 7
20,854,304 UART: [art] Extend RT PCRs Done
20,855,534 UART: [art] Lock RT PCRs Done
20,856,887 UART: [art] Populate DV Done
20,862,199 UART: [fht] FMC Alias Private Key: 7
20,863,735 UART: [art] Derive CDI
20,864,545 UART: [art] Store in slot 0x4
20,920,198 UART: [art] Derive Key Pair
20,921,241 UART: [art] Store priv key in slot 0x5
23,384,278 UART: [art] Derive Key Pair - Done
23,397,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,110,398 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,041 UART: [art] PUB.X = D7539B6621502EC35748E5D93944FA7932266750C83CA9B02A7330AB8B115F7DBE2B34B1122B924BCBED8688D8D6676E
25,119,115 UART: [art] PUB.Y = FFCF2C12F7A4E8F6C3112AF159D176C2064E93ED21E372D766A3708D0BD62624DDB0235BFBF1BBC44F49BE12844195BA
25,126,392 UART: [art] SIG.R = 12BE6F12EA114C59785C0EBB83B2CC898A0694D068EFDBAA70C9544B89E817FCA64DAC04581BA0A7DED416A169D0BD12
25,133,819 UART: [art] SIG.S = 30A26DC4697C1936A499D0CEE2BF646442E6DDC62B61B867BF2F5B5E660709239BC747F364F0E797B9C8B16A9971DF30
26,112,249 UART: Caliptra RT
26,112,933 UART: [state] CFI Enabled
26,293,484 UART: [rt] RT listening for mailbox commands...
26,295,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,325,777 UART: [rt]cmd =0x44504543, len=96
30,689,228 >>> mbox cmd response data (6236 bytes)
30,719,099 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,749,584 UART: [rt]cmd =0x53574545, len=84
34,926,252 >>> mbox cmd response data (200 bytes)
37,375,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,525,801 UART:
37,526,172 UART: Running Caliptra ROM ...
37,527,323 UART:
37,527,494 UART: [state] CFI Enabled
37,585,943 UART: [state] LifecycleState = Unprovisioned
37,587,997 UART: [state] DebugLocked = No
37,590,241 UART: [state] WD Timer not started. Device not locked for debugging
37,594,310 UART: [kat] SHA2-256
37,784,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,794,932 UART: [kat] ++
37,795,387 UART: [kat] sha1
37,806,542 UART: [kat] SHA2-256
37,809,555 UART: [kat] SHA2-384
37,814,996 UART: [kat] SHA2-512-ACC
37,817,622 UART: [kat] ECC-384
40,268,593 UART: [kat] HMAC-384Kdf
40,285,536 UART: [kat] LMS
40,817,105 UART: [kat] --
40,821,550 UART: [update-reset] ++
44,332,824 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,336,579 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,966,302 >>> mbox cmd response: success
44,966,750 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,967,141 UART: [update-reset] Copying MAN_2 To MAN_1
45,004,126 UART: [update-reset Success] --
45,008,312 UART: [state] Locking Datavault
45,011,403 UART: [state] Locking PCR0, PCR1 and PCR31
45,013,536 UART: [state] Locking ICCM
45,015,041 UART: [exit] Launching FMC @ 0x40000130
45,023,711 UART:
45,023,947 UART: Running Caliptra FMC ...
45,025,045 UART:
45,025,206 UART: [state] CFI Enabled
45,118,493 UART: [art] Extend RT PCRs Done
45,119,699 UART: [art] Lock RT PCRs Done
45,120,941 UART: [art] Populate DV Done
45,126,505 UART: [fht] FMC Alias Private Key: 7
45,128,198 UART: [art] Derive CDI
45,129,010 UART: [art] Store in slot 0x4
45,188,024 UART: [art] Derive Key Pair
45,189,017 UART: [art] Store priv key in slot 0x5
47,651,900 UART: [art] Derive Key Pair - Done
47,664,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,377,352 UART: [art] Erasing AUTHORITY.KEYID = 7
49,378,837 UART: [art] PUB.X = DE0C54187B60A0FB1C25D2513D906FDEC718C5AA062E3537E82BFED9705259B747EEDD094487A636C089ED308EC97400
49,386,117 UART: [art] PUB.Y = 393E3278C163DDC65848943429F113F4F7358A10F2D9DE64C4FB43A7E649355D154F810870889C0DAC63C6586A0BE2C1
49,393,368 UART: [art] SIG.R = E67FA4B6BD000D6ED86775546BF72EC860A838D20BE23067C705E8D236B3C9C413FF038E5592CBAE3CDB37CA609F46C0
49,400,735 UART: [art] SIG.S = 01E93F9ECF7EFD6BDB4B5977C818F4A08087BEA29576F2A528B154DD117C8967A596BD30922C060DD11E030F11DEA396
50,379,067 UART: Caliptra RT
50,379,786 UART: [state] CFI Enabled
50,801,377 UART: [rt] RT listening for mailbox commands...
50,833,279 UART: [rt]cmd =0x53574545, len=84
54,995,266 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
3,438,253 ready_for_fw is high
3,438,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,852,182 >>> mbox cmd response: success
19,133,497 UART:
19,133,866 UART: Running Caliptra FMC ...
19,135,057 UART:
19,135,229 UART: [state] CFI Enabled
19,199,601 UART: [fht] FMC Alias Private Key: 7
20,965,184 UART: [art] Extend RT PCRs Done
20,966,406 UART: [art] Lock RT PCRs Done
20,968,004 UART: [art] Populate DV Done
20,973,310 UART: [fht] FMC Alias Private Key: 7
20,974,908 UART: [art] Derive CDI
20,975,669 UART: [art] Store in slot 0x4
21,032,437 UART: [art] Derive Key Pair
21,033,482 UART: [art] Store priv key in slot 0x5
23,496,244 UART: [art] Derive Key Pair - Done
23,509,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,215 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,724 UART: [art] PUB.X = 0B9C0FDBDA6812EDFCD3BCAF94CE14CC4C41FAA4090CBCF5F086B34FACCA78564F3C819A59127ABE6A430FDFF7A133E0
25,231,051 UART: [art] PUB.Y = D1522E3E87731492ABF2FB02299C6161DBE593505640D6B6E191D16D1D426C5856B7137F8850FDF35ACF826EF3DC19D5
25,238,270 UART: [art] SIG.R = 12599BA809ADF332265F28A29710299D3FE0FA85982C77B1A1FE6912BD7E904F50A020E15F3F28485324D61045C6C8A1
25,245,734 UART: [art] SIG.S = C23C4753F4168016A226E0F00A239D8BA48E331C75FC38E813A85C1680D5289950975C10C19BAAF2118B9B6C8C7B6B04
26,224,678 UART: Caliptra RT
26,225,365 UART: [state] CFI Enabled
26,406,085 UART: [rt] RT listening for mailbox commands...
26,408,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,438,451 UART: [rt]cmd =0x44504543, len=96
30,805,544 >>> mbox cmd response data (6236 bytes)
30,835,101 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,865,570 UART: [rt]cmd =0x53574545, len=84
35,042,459 >>> mbox cmd response data (200 bytes)
37,495,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
45,424,277 >>> mbox cmd response: success
45,424,830 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,461,004 UART:
45,461,302 UART: Running Caliptra FMC ...
45,462,424 UART:
45,462,582 UART: [state] CFI Enabled
45,560,306 UART: [art] Extend RT PCRs Done
45,561,589 UART: [art] Lock RT PCRs Done
45,562,843 UART: [art] Populate DV Done
45,568,009 UART: [fht] FMC Alias Private Key: 7
45,569,620 UART: [art] Derive CDI
45,570,398 UART: [art] Store in slot 0x4
45,629,898 UART: [art] Derive Key Pair
45,630,903 UART: [art] Store priv key in slot 0x5
48,093,312 UART: [art] Derive Key Pair - Done
48,106,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,819,578 UART: [art] Erasing AUTHORITY.KEYID = 7
49,821,090 UART: [art] PUB.X = 1B0F6B154F13A4CB09538553B607F699AA4FF4ECA244EFA45D0CA3EF0DD36EAEDA96DDB9BBED60AE1B39C80F2A5C24F4
49,828,357 UART: [art] PUB.Y = 9EB2544B31F3B2AE3E9BF10BDC63EB2EAF377857F00E562F57225737037E61C6A5625AD0A25AF299F3E9559957217B04
49,835,644 UART: [art] SIG.R = 5894F380642B0B0528716D4B8B8759142A188C034D3862D003837326CD98EE36A6499380B3A9E1BF8CAD2871FE1A3B7F
49,842,994 UART: [art] SIG.S = 37FE7ABA3848013139D9C76B5DBFED4F6612B6813F8754A54F71FA38873F6665E9A7F40F2A95E819BD54433FBAEA22F7
50,821,930 UART: Caliptra RT
50,822,624 UART: [state] CFI Enabled
51,243,473 UART: [rt] RT listening for mailbox commands...
51,275,149 UART: [rt]cmd =0x53574545, len=84
55,456,346 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,467 UART:
192,829 UART: Running Caliptra ROM ...
193,973 UART:
603,694 UART: [state] CFI Enabled
618,730 UART: [state] LifecycleState = Unprovisioned
621,148 UART: [state] DebugLocked = No
622,757 UART: [state] WD Timer not started. Device not locked for debugging
627,945 UART: [kat] SHA2-256
817,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,640 UART: [kat] ++
829,244 UART: [kat] sha1
841,125 UART: [kat] SHA2-256
844,129 UART: [kat] SHA2-384
851,628 UART: [kat] SHA2-512-ACC
854,256 UART: [kat] ECC-384
3,296,328 UART: [kat] HMAC-384Kdf
3,311,085 UART: [kat] LMS
3,842,890 UART: [kat] --
3,847,523 UART: [cold-reset] ++
3,848,967 UART: [fht] FHT @ 0x50003400
3,859,945 UART: [idev] ++
3,860,583 UART: [idev] CDI.KEYID = 6
3,861,582 UART: [idev] SUBJECT.KEYID = 7
3,862,700 UART: [idev] UDS.KEYID = 0
3,863,695 ready_for_fw is high
3,863,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,876 UART: [idev] Erasing UDS.KEYID = 0
6,345,457 UART: [idev] Sha1 KeyId Algorithm
6,367,987 UART: [idev] --
6,372,584 UART: [ldev] ++
6,373,358 UART: [ldev] CDI.KEYID = 6
6,374,252 UART: [ldev] SUBJECT.KEYID = 5
6,375,436 UART: [ldev] AUTHORITY.KEYID = 7
6,376,620 UART: [ldev] FE.KEYID = 1
6,387,648 UART: [ldev] Erasing FE.KEYID = 1
8,867,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,519 UART: [ldev] --
10,658,214 UART: [fwproc] Wait for Commands...
10,660,846 UART: [fwproc] Recv command 0x46574c44
10,663,158 UART: [fwproc] Recv'd Img size: 118548 bytes
14,159,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,242,321 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,365,924 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,926,296 >>> mbox cmd response: success
14,930,687 UART: [afmc] ++
14,931,432 UART: [afmc] CDI.KEYID = 6
14,932,552 UART: [afmc] SUBJECT.KEYID = 7
14,934,059 UART: [afmc] AUTHORITY.KEYID = 5
17,435,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,157,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,159,782 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,174,920 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,190,025 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,204,956 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,229,610 UART: [afmc] --
19,232,615 UART: [cold-reset] --
19,236,380 UART: [state] Locking Datavault
19,241,485 UART: [state] Locking PCR0, PCR1 and PCR31
19,243,654 UART: [state] Locking ICCM
19,245,202 UART: [exit] Launching FMC @ 0x40000130
19,253,863 UART:
19,254,139 UART: Running Caliptra FMC ...
19,255,180 UART:
19,255,333 UART: [state] CFI Enabled
19,263,498 UART: [fht] FMC Alias Private Key: 7
21,030,112 UART: [art] Extend RT PCRs Done
21,031,336 UART: [art] Lock RT PCRs Done
21,032,936 UART: [art] Populate DV Done
21,038,410 UART: [fht] FMC Alias Private Key: 7
21,039,948 UART: [art] Derive CDI
21,040,689 UART: [art] Store in slot 0x4
21,083,556 UART: [art] Derive Key Pair
21,084,560 UART: [art] Store priv key in slot 0x5
23,512,286 UART: [art] Derive Key Pair - Done
23,525,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,231,487 UART: [art] Erasing AUTHORITY.KEYID = 7
25,233,010 UART: [art] PUB.X = CCA2270417BBCEA937C67CDE5B3B53E3D12D71C93281A86C8E3949BF1572861A197E80DD1F82550F353F1AD93921CF45
25,240,291 UART: [art] PUB.Y = 95B8AC16A81174D6DB5A47F73953B7EB142288490F802544ADE8F7E5A4973FEED637BACBBF1E33B74DC86DDDC9D811F8
25,247,550 UART: [art] SIG.R = 897D2371A922926099A8938A4DAD5075D11272C7282D926FB81DF37783F6222D48385E948E82C910E64EE96F4EF9B79A
25,254,949 UART: [art] SIG.S = 9A242F479BBACB94FB3EC194566B6BE587418671C1F6C7BAB6612EAFF3145D964D87603302CC16757F54F1203AFBCEDA
26,233,507 UART: Caliptra RT
26,234,190 UART: [state] CFI Enabled
26,366,908 UART: [rt] RT listening for mailbox commands...
26,368,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,399,447 UART: [rt]cmd =0x44504543, len=96
30,684,824 >>> mbox cmd response data (6236 bytes)
30,714,748 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,745,320 UART: [rt]cmd =0x53574545, len=84
34,880,289 >>> mbox cmd response data (200 bytes)
37,332,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,482,771 UART:
37,483,159 UART: Running Caliptra ROM ...
37,484,302 UART:
37,484,476 UART: [state] CFI Enabled
37,495,632 UART: [state] LifecycleState = Unprovisioned
37,497,509 UART: [state] DebugLocked = No
37,499,550 UART: [state] WD Timer not started. Device not locked for debugging
37,503,408 UART: [kat] SHA2-256
37,693,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,704,040 UART: [kat] ++
37,704,565 UART: [kat] sha1
37,716,750 UART: [kat] SHA2-256
37,719,720 UART: [kat] SHA2-384
37,724,959 UART: [kat] SHA2-512-ACC
37,727,527 UART: [kat] ECC-384
40,167,350 UART: [kat] HMAC-384Kdf
40,180,218 UART: [kat] LMS
40,711,869 UART: [kat] --
40,717,263 UART: [update-reset] ++
44,227,790 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,231,167 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,860,926 >>> mbox cmd response: success
44,861,369 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,862,053 UART: [update-reset] Copying MAN_2 To MAN_1
44,899,632 UART: [update-reset Success] --
44,902,427 UART: [state] Locking Datavault
44,904,879 UART: [state] Locking PCR0, PCR1 and PCR31
44,907,023 UART: [state] Locking ICCM
44,910,021 UART: [exit] Launching FMC @ 0x40000130
44,918,704 UART:
44,918,938 UART: Running Caliptra FMC ...
44,919,970 UART:
44,920,121 UART: [state] CFI Enabled
44,964,142 UART: [art] Extend RT PCRs Done
44,965,326 UART: [art] Lock RT PCRs Done
44,966,484 UART: [art] Populate DV Done
44,971,897 UART: [fht] FMC Alias Private Key: 7
44,973,446 UART: [art] Derive CDI
44,974,264 UART: [art] Store in slot 0x4
45,016,716 UART: [art] Derive Key Pair
45,017,761 UART: [art] Store priv key in slot 0x5
47,444,890 UART: [art] Derive Key Pair - Done
47,457,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,164,338 UART: [art] Erasing AUTHORITY.KEYID = 7
49,165,840 UART: [art] PUB.X = 0D330BA3D229DBE93702FB06A357EF4B1C0A745691E802C8D130286EA6CF41CEEA8813F2374B71CEEF45480FEE34D2C6
49,173,122 UART: [art] PUB.Y = FD4790B5ADE8161B5959DB97B79DEA268AB27EF1A9FD8020AA928A4BB0D01E412EBB1E8343853513CBFB5227D216674E
49,180,385 UART: [art] SIG.R = 91F3D74E79D960C3C276658A585DE162180D970BE050EFBA53A0564B7CC8B60F11420A088D034CD3C0656B403623DA94
49,187,742 UART: [art] SIG.S = 3174B0405213E4DA5DF4C76DECF9325562D455F3889BAE491930B4C5D1B8BD0048AB6A4FC2A63498DF81D8364C47C591
50,166,799 UART: Caliptra RT
50,167,511 UART: [state] CFI Enabled
50,540,834 UART: [rt] RT listening for mailbox commands...
50,572,795 UART: [rt]cmd =0x53574545, len=84
54,708,315 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,756,017 ready_for_fw is high
3,756,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,041,236 >>> mbox cmd response: success
19,291,980 UART:
19,292,375 UART: Running Caliptra FMC ...
19,293,581 UART:
19,293,754 UART: [state] CFI Enabled
19,301,916 UART: [fht] FMC Alias Private Key: 7
21,067,633 UART: [art] Extend RT PCRs Done
21,068,873 UART: [art] Lock RT PCRs Done
21,070,248 UART: [art] Populate DV Done
21,075,688 UART: [fht] FMC Alias Private Key: 7
21,077,329 UART: [art] Derive CDI
21,078,159 UART: [art] Store in slot 0x4
21,120,654 UART: [art] Derive Key Pair
21,121,661 UART: [art] Store priv key in slot 0x5
23,548,135 UART: [art] Derive Key Pair - Done
23,561,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,268,366 UART: [art] Erasing AUTHORITY.KEYID = 7
25,269,880 UART: [art] PUB.X = 9247286E9663A0AF9A16B84B05A68A4A1B4AA603EC48753A662DF46CEC8A1B6B9EDB8230A1CE41CBB144B419A9528CAF
25,277,122 UART: [art] PUB.Y = D537C76BC2E5D6E73EFA5378848F7CB16AB3477ACE8B27B422392B5F005183A65710B06D7F977E913E6E7E44E6393F56
25,284,402 UART: [art] SIG.R = CDBCF2E01931278BEDD66009E04518877EF1A4C1F18AD53E236FDFAF580244C7FFE53B069704D77FE12B84E2D60D7EEF
25,291,784 UART: [art] SIG.S = 65264D6EB67BF957255CAE657571E6E188D3BD9149A299B9C5F255B1A0B892C9F13AD2D2A981CDB7CAED8F35BF565EB1
26,271,065 UART: Caliptra RT
26,271,805 UART: [state] CFI Enabled
26,405,078 UART: [rt] RT listening for mailbox commands...
26,407,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,437,681 UART: [rt]cmd =0x44504543, len=96
30,723,252 >>> mbox cmd response data (6236 bytes)
30,752,800 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,783,319 UART: [rt]cmd =0x53574545, len=84
34,919,322 >>> mbox cmd response data (200 bytes)
37,373,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
45,202,122 >>> mbox cmd response: success
45,202,725 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,237,807 UART:
45,238,134 UART: Running Caliptra FMC ...
45,239,264 UART:
45,239,440 UART: [state] CFI Enabled
45,283,413 UART: [art] Extend RT PCRs Done
45,284,661 UART: [art] Lock RT PCRs Done
45,286,121 UART: [art] Populate DV Done
45,291,428 UART: [fht] FMC Alias Private Key: 7
45,292,968 UART: [art] Derive CDI
45,293,784 UART: [art] Store in slot 0x4
45,336,790 UART: [art] Derive Key Pair
45,337,842 UART: [art] Store priv key in slot 0x5
47,764,917 UART: [art] Derive Key Pair - Done
47,777,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,483,951 UART: [art] Erasing AUTHORITY.KEYID = 7
49,485,464 UART: [art] PUB.X = 674CD5C2B8C91F40C75B5DFA357914765BA75D361521F249F29042B0837E7220C9A550092B412E836D9DE3B4D229A76C
49,492,681 UART: [art] PUB.Y = 2799795CAD7DDF9030F9870D6C2149C713F50948E496BE5D76105C75D04A2B0EB45FC48450B79393C881A4B9FC9CFE1F
49,499,920 UART: [art] SIG.R = 35B322CDB5D5044C5C23987453BB0F9E2E96DB4E2FCE1352518979AC1D290F3A874C6B6785384861EBD832CF183E1A3C
49,507,317 UART: [art] SIG.S = 2B8D7FC2FFB8EF6A8C0DE199264409C5CA2F967785FCDBCA49FF86EF9731A38E3AB9FFFA6532DD045698B8BB4350B1B1
50,485,998 UART: Caliptra RT
50,486,699 UART: [state] CFI Enabled
50,866,292 UART: [rt] RT listening for mailbox commands...
50,898,053 UART: [rt]cmd =0x53574545, len=84
55,034,078 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,107 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,587 UART: [kat] SHA2-256
881,518 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,633 UART: [kat] ++
885,785 UART: [kat] sha1
890,097 UART: [kat] SHA2-256
892,035 UART: [kat] SHA2-384
894,636 UART: [kat] SHA2-512-ACC
896,537 UART: [kat] ECC-384
902,146 UART: [kat] HMAC-384Kdf
906,500 UART: [kat] LMS
1,474,696 UART: [kat] --
1,475,575 UART: [cold-reset] ++
1,476,043 UART: [fht] Storing FHT @ 0x50003400
1,478,808 UART: [idev] ++
1,478,976 UART: [idev] CDI.KEYID = 6
1,479,336 UART: [idev] SUBJECT.KEYID = 7
1,479,760 UART: [idev] UDS.KEYID = 0
1,480,105 ready_for_fw is high
1,480,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,778 UART: [idev] Erasing UDS.KEYID = 0
1,503,894 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,474 UART: [idev] --
1,513,549 UART: [ldev] ++
1,513,717 UART: [ldev] CDI.KEYID = 6
1,514,080 UART: [ldev] SUBJECT.KEYID = 5
1,514,506 UART: [ldev] AUTHORITY.KEYID = 7
1,514,969 UART: [ldev] FE.KEYID = 1
1,520,013 UART: [ldev] Erasing FE.KEYID = 1
1,545,038 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,563,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,569,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,538 UART: [ldev] --
1,583,883 UART: [fwproc] Waiting for Commands...
1,584,670 UART: [fwproc] Received command 0x46574c44
1,585,461 UART: [fwproc] Received Image of size 118548 bytes
2,929,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,956,813 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,031 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,412 >>> mbox cmd response: success
3,129,440 UART: [afmc] ++
3,129,608 UART: [afmc] CDI.KEYID = 6
3,129,970 UART: [afmc] SUBJECT.KEYID = 7
3,130,395 UART: [afmc] AUTHORITY.KEYID = 5
3,166,364 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,330 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,110 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,819 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,702 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,385 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,307 UART: [afmc] --
3,209,385 UART: [cold-reset] --
3,209,997 UART: [state] Locking Datavault
3,211,022 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,626 UART: [state] Locking ICCM
3,212,196 UART: [exit] Launching FMC @ 0x40000130
3,217,526 UART:
3,217,542 UART: Running Caliptra FMC ...
3,217,950 UART:
3,218,004 UART: [state] CFI Enabled
3,228,466 UART: [fht] FMC Alias Private Key: 7
3,347,580 UART: [art] Extend RT PCRs Done
3,348,008 UART: [art] Lock RT PCRs Done
3,349,454 UART: [art] Populate DV Done
3,357,877 UART: [fht] FMC Alias Private Key: 7
3,358,867 UART: [art] Derive CDI
3,359,147 UART: [art] Store in slot 0x4
3,444,725 UART: [art] Derive Key Pair
3,445,085 UART: [art] Store priv key in slot 0x5
3,458,404 UART: [art] Derive Key Pair - Done
3,473,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,661 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,426 UART: [art] PUB.X = 50C5925EF19A8D625F8371451D098343981C9E08227A71B717E7FF602C532FEDA7C6DD0959BD542EC1B225EC3AC6B7FB
3,496,193 UART: [art] PUB.Y = BAB43F51B4067EB72CC0D600CE337B083C61C608ABA81472696BEE5D8B724758FD43AA9694D056E4A547072BF709DA0C
3,503,111 UART: [art] SIG.R = 2F8D47074192DE075B3E5FD1C70971BEF8AF528BA8E574A65C9067BDA73D1C53EFBBB08AE14F1798EA60505C4942591D
3,509,882 UART: [art] SIG.S = 4ED41B93F1D3A16996DA9E1A2961863DF038222B91C43ACFB32CA0995C8E8D21811CE688FCE4A7B632E72D05FAFACF94
3,533,667 UART: Caliptra RT
3,533,918 UART: [state] CFI Enabled
3,654,501 UART: [rt] RT listening for mailbox commands...
3,655,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,733 UART: [rt]cmd =0x44504543, len=96
3,867,603 >>> mbox cmd response data (6236 bytes)
3,867,604 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,265 UART: [rt]cmd =0x53574545, len=84
3,923,684 >>> mbox cmd response data (200 bytes)
3,923,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,924,483 UART:
3,924,499 UART: Running Caliptra ROM ...
3,924,907 UART:
3,924,961 UART: [state] CFI Enabled
3,927,637 UART: [state] LifecycleState = Unprovisioned
3,928,292 UART: [state] DebugLocked = No
3,928,950 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,930,473 UART: [kat] SHA2-256
4,724,404 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,728,519 UART: [kat] ++
4,728,671 UART: [kat] sha1
4,732,897 UART: [kat] SHA2-256
4,734,835 UART: [kat] SHA2-384
4,737,632 UART: [kat] SHA2-512-ACC
4,739,532 UART: [kat] ECC-384
4,745,109 UART: [kat] HMAC-384Kdf
4,749,661 UART: [kat] LMS
5,317,857 UART: [kat] --
5,318,516 UART: [update-reset] ++
6,699,550 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,700,678 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,855,945 >>> mbox cmd response: success
6,855,945 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,856,264 UART: [update-reset] Copying MAN_2 To MAN_1
6,864,278 UART: [update-reset Success] --
6,865,341 UART: [state] Locking Datavault
6,866,325 UART: [state] Locking PCR0, PCR1 and PCR31
6,866,929 UART: [state] Locking ICCM
6,867,357 UART: [exit] Launching FMC @ 0x40000130
6,872,687 UART:
6,872,703 UART: Running Caliptra FMC ...
6,873,111 UART:
6,873,165 UART: [state] CFI Enabled
6,961,900 UART: [art] Extend RT PCRs Done
6,962,328 UART: [art] Lock RT PCRs Done
6,963,709 UART: [art] Populate DV Done
6,972,086 UART: [fht] FMC Alias Private Key: 7
6,973,140 UART: [art] Derive CDI
6,973,420 UART: [art] Store in slot 0x4
7,059,286 UART: [art] Derive Key Pair
7,059,646 UART: [art] Store priv key in slot 0x5
7,073,309 UART: [art] Derive Key Pair - Done
7,088,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,103,276 UART: [art] Erasing AUTHORITY.KEYID = 7
7,104,041 UART: [art] PUB.X = 3F7440B318795D287D1C8A3C64964986C7F7923BA521995A575BA2BC1D7022CAEE58FA338C63E305CA95D7427D0DD520
7,110,805 UART: [art] PUB.Y = DA5999D9B3C364B3C30126FEF334E4E732236563C98233AC6CEDF59D8B16D5ACCB9AE4A4897062279C701893FEB2C873
7,117,758 UART: [art] SIG.R = 04CBCA8E0894FD37198F048413871465D07121934BBEB850BEF9C43DC0EE5726A72B951BEDB21FCC0A693CB18B8DAA64
7,124,528 UART: [art] SIG.S = 07FA92A325693F7D62D666083B50453AD01667D540AF40DE90307FFBDA35318E280926F3A89622A0B32F15AB8C54AA17
7,148,221 UART: Caliptra RT
7,148,472 UART: [state] CFI Enabled
7,514,116 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,544,867 UART: [rt]cmd =0x53574545, len=84
7,570,642 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,983 ready_for_fw is high
1,362,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,248 >>> mbox cmd response: success
3,043,909 UART:
3,043,925 UART: Running Caliptra FMC ...
3,044,333 UART:
3,044,387 UART: [state] CFI Enabled
3,054,731 UART: [fht] FMC Alias Private Key: 7
3,174,251 UART: [art] Extend RT PCRs Done
3,174,679 UART: [art] Lock RT PCRs Done
3,176,179 UART: [art] Populate DV Done
3,184,568 UART: [fht] FMC Alias Private Key: 7
3,185,726 UART: [art] Derive CDI
3,186,006 UART: [art] Store in slot 0x4
3,271,734 UART: [art] Derive Key Pair
3,272,094 UART: [art] Store priv key in slot 0x5
3,285,269 UART: [art] Derive Key Pair - Done
3,300,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,393 UART: [art] PUB.X = 5E140CD183DE3DC511F07842E7840569FD449A4DC75A9F2D8BC28D0941E0BD06E4F26AA11EE764DB6F8159A906698BDC
3,323,158 UART: [art] PUB.Y = 1B8181B68522743886B21B00F18CA483B8D7CB1CEB0752484F687162E8717971A68F74DC254D8892E8CB809A1D1E11F6
3,330,077 UART: [art] SIG.R = 1E9E0AFF29EC7B6EED8158742732C395AE6CE76B5A7B5E500C36CAF71343D7DCA09C1B37187A8546587ACA6E749660A8
3,336,851 UART: [art] SIG.S = E1ECCB8FE70606B35BD03F1C9625F23A114954915FB367C114FD87DB6D2788B62DAB0D1FB508441C59440E852BAF3A8B
3,360,950 UART: Caliptra RT
3,361,201 UART: [state] CFI Enabled
3,481,377 UART: [rt] RT listening for mailbox commands...
3,482,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,657 UART: [rt]cmd =0x44504543, len=96
3,694,993 >>> mbox cmd response data (6236 bytes)
3,694,994 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,051 UART: [rt]cmd =0x53574545, len=84
3,750,938 >>> mbox cmd response data (200 bytes)
3,750,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,566,137 >>> mbox cmd response: success
6,566,137 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,579,533 UART:
6,579,549 UART: Running Caliptra FMC ...
6,579,957 UART:
6,580,011 UART: [state] CFI Enabled
6,668,898 UART: [art] Extend RT PCRs Done
6,669,326 UART: [art] Lock RT PCRs Done
6,670,417 UART: [art] Populate DV Done
6,678,794 UART: [fht] FMC Alias Private Key: 7
6,679,840 UART: [art] Derive CDI
6,680,120 UART: [art] Store in slot 0x4
6,765,950 UART: [art] Derive Key Pair
6,766,310 UART: [art] Store priv key in slot 0x5
6,779,677 UART: [art] Derive Key Pair - Done
6,794,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,810,207 UART: [art] Erasing AUTHORITY.KEYID = 7
6,810,972 UART: [art] PUB.X = 2B71F73DDF9367BEBE9F15B89FDE6706F593499B6716714AC4A3886272C609C3600055F6D9E4127BAF780F9F748B7675
6,817,709 UART: [art] PUB.Y = 82F4D645528CD8B6BF5F1D3D4EB66AC6FB6D2F6DABFFB0140900B3C1D39533E72BFA095C2EC21CA40172C41C4A9FF3DF
6,824,652 UART: [art] SIG.R = B3EA3CD325F7C2434B7A2FD17CE6AD2153E8AE9EF3368FE83B9DCB84EB2C39901B519FEF7D968F49282F705A12CDBEC8
6,831,444 UART: [art] SIG.S = 661CD9F32E0C311DA52E9B048FCEF6700D179F000D60D19DE13DD755AFEA80DFB70B5C2CB1584769EE39B2D417FA15E6
6,855,589 UART: Caliptra RT
6,855,840 UART: [state] CFI Enabled
7,224,645 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,255,270 UART: [rt]cmd =0x53574545, len=84
7,281,165 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,348 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,988 UART: [kat] SHA2-256
881,919 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,034 UART: [kat] ++
886,186 UART: [kat] sha1
890,482 UART: [kat] SHA2-256
892,420 UART: [kat] SHA2-384
895,207 UART: [kat] SHA2-512-ACC
897,108 UART: [kat] ECC-384
902,659 UART: [kat] HMAC-384Kdf
907,347 UART: [kat] LMS
1,475,543 UART: [kat] --
1,476,602 UART: [cold-reset] ++
1,477,074 UART: [fht] Storing FHT @ 0x50003400
1,479,881 UART: [idev] ++
1,480,049 UART: [idev] CDI.KEYID = 6
1,480,409 UART: [idev] SUBJECT.KEYID = 7
1,480,833 UART: [idev] UDS.KEYID = 0
1,481,178 ready_for_fw is high
1,481,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,011 UART: [idev] Erasing UDS.KEYID = 0
1,506,039 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,837 UART: [idev] --
1,515,790 UART: [ldev] ++
1,515,958 UART: [ldev] CDI.KEYID = 6
1,516,321 UART: [ldev] SUBJECT.KEYID = 5
1,516,747 UART: [ldev] AUTHORITY.KEYID = 7
1,517,210 UART: [ldev] FE.KEYID = 1
1,522,360 UART: [ldev] Erasing FE.KEYID = 1
1,547,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,457 UART: [ldev] --
1,586,778 UART: [fwproc] Waiting for Commands...
1,587,493 UART: [fwproc] Received command 0x46574c44
1,588,284 UART: [fwproc] Received Image of size 118548 bytes
2,933,480 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,628 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,846 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,203 >>> mbox cmd response: success
3,133,429 UART: [afmc] ++
3,133,597 UART: [afmc] CDI.KEYID = 6
3,133,959 UART: [afmc] SUBJECT.KEYID = 7
3,134,384 UART: [afmc] AUTHORITY.KEYID = 5
3,169,335 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,319 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,099 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,808 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,691 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,374 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,124 UART: [afmc] --
3,212,254 UART: [cold-reset] --
3,213,110 UART: [state] Locking Datavault
3,214,287 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,891 UART: [state] Locking ICCM
3,215,443 UART: [exit] Launching FMC @ 0x40000130
3,220,773 UART:
3,220,789 UART: Running Caliptra FMC ...
3,221,197 UART:
3,221,340 UART: [state] CFI Enabled
3,232,326 UART: [fht] FMC Alias Private Key: 7
3,351,908 UART: [art] Extend RT PCRs Done
3,352,336 UART: [art] Lock RT PCRs Done
3,354,050 UART: [art] Populate DV Done
3,362,037 UART: [fht] FMC Alias Private Key: 7
3,363,007 UART: [art] Derive CDI
3,363,287 UART: [art] Store in slot 0x4
3,448,939 UART: [art] Derive Key Pair
3,449,299 UART: [art] Store priv key in slot 0x5
3,461,986 UART: [art] Derive Key Pair - Done
3,476,851 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,345 UART: [art] PUB.X = 3ADBEAF51D908E4D3B4115C168B418C2A15011ED4B84DEC6C7A23DC961D88E0EEAF119ECC14927FF7CAD681F8702DE89
3,500,129 UART: [art] PUB.Y = B3D37159A049E396B2C4B0CDA00FF3C7A0622CB180CBB2D215525F056611B9A028A8B4EE1026F6ABD83CAE06EA019F27
3,507,079 UART: [art] SIG.R = 9350751EAE9F7596290DE249D86E74012C699655A21CF4E1F9696FEA9BA9836CB0AA3B5B373DB71B94183BE04F4A1923
3,513,845 UART: [art] SIG.S = A83C7DA9FFF26407159119B20F83D5A0A06B5B4548A689354373AC14344EBB39E13E1FBFBF2B3952676BD228D91C78B8
3,537,283 UART: Caliptra RT
3,537,626 UART: [state] CFI Enabled
3,657,573 UART: [rt] RT listening for mailbox commands...
3,658,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,667 UART: [rt]cmd =0x44504543, len=96
3,870,882 >>> mbox cmd response data (6236 bytes)
3,870,883 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,926 UART: [rt]cmd =0x53574545, len=84
3,926,471 >>> mbox cmd response data (200 bytes)
3,926,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,927,418 UART:
3,927,434 UART: Running Caliptra ROM ...
3,927,842 UART:
3,927,983 UART: [state] CFI Enabled
3,931,063 UART: [state] LifecycleState = Unprovisioned
3,931,718 UART: [state] DebugLocked = No
3,932,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,934,039 UART: [kat] SHA2-256
4,727,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,732,085 UART: [kat] ++
4,732,237 UART: [kat] sha1
4,736,577 UART: [kat] SHA2-256
4,738,515 UART: [kat] SHA2-384
4,741,290 UART: [kat] SHA2-512-ACC
4,743,190 UART: [kat] ECC-384
4,748,975 UART: [kat] HMAC-384Kdf
4,753,573 UART: [kat] LMS
5,321,769 UART: [kat] --
5,322,824 UART: [update-reset] ++
6,704,536 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,705,576 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,860,843 >>> mbox cmd response: success
6,860,843 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,861,196 UART: [update-reset] Copying MAN_2 To MAN_1
6,869,210 UART: [update-reset Success] --
6,870,341 UART: [state] Locking Datavault
6,871,059 UART: [state] Locking PCR0, PCR1 and PCR31
6,871,663 UART: [state] Locking ICCM
6,872,253 UART: [exit] Launching FMC @ 0x40000130
6,877,583 UART:
6,877,599 UART: Running Caliptra FMC ...
6,878,007 UART:
6,878,150 UART: [state] CFI Enabled
6,966,755 UART: [art] Extend RT PCRs Done
6,967,183 UART: [art] Lock RT PCRs Done
6,968,298 UART: [art] Populate DV Done
6,976,627 UART: [fht] FMC Alias Private Key: 7
6,977,689 UART: [art] Derive CDI
6,977,969 UART: [art] Store in slot 0x4
7,063,883 UART: [art] Derive Key Pair
7,064,243 UART: [art] Store priv key in slot 0x5
7,077,090 UART: [art] Derive Key Pair - Done
7,092,047 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,107,934 UART: [art] Erasing AUTHORITY.KEYID = 7
7,108,699 UART: [art] PUB.X = 1F80D019D4104C4A5B9FB33A8FE2FC7B1B53606BD2E1CB5E5C7F50D6DAF4594059CED18D57D34429CC72B1882EFE967A
7,115,485 UART: [art] PUB.Y = 624BC910059A0CD5F79013EC15ACC25C158A2FC4B14B2012F0D10322210290C133A76AA1BD34EFE98306A63510E6131C
7,122,420 UART: [art] SIG.R = E070A910BC63B7471BD0AEEE9E56DF432E5E926D9566E67B29EDF0E9D833CB3151311834A17D85E23CC0EC6259405836
7,129,194 UART: [art] SIG.S = 80E582AE3FE8D6FFCDE4556F5E25E699FE827A792483E9A53DF90072399041CDBF7F0B550EA019157879302A89BA908F
7,152,562 UART: Caliptra RT
7,152,905 UART: [state] CFI Enabled
7,516,819 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,547,560 UART: [rt]cmd =0x53574545, len=84
7,573,493 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,756 ready_for_fw is high
1,362,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,671 >>> mbox cmd response: success
3,043,824 UART:
3,043,840 UART: Running Caliptra FMC ...
3,044,248 UART:
3,044,391 UART: [state] CFI Enabled
3,055,221 UART: [fht] FMC Alias Private Key: 7
3,173,863 UART: [art] Extend RT PCRs Done
3,174,291 UART: [art] Lock RT PCRs Done
3,175,983 UART: [art] Populate DV Done
3,184,368 UART: [fht] FMC Alias Private Key: 7
3,185,508 UART: [art] Derive CDI
3,185,788 UART: [art] Store in slot 0x4
3,271,880 UART: [art] Derive Key Pair
3,272,240 UART: [art] Store priv key in slot 0x5
3,285,799 UART: [art] Derive Key Pair - Done
3,300,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,134 UART: [art] PUB.X = A5193CB06B56DFB6D873633C1CF8B9BE58A5DBCF024F4ACDECE4FC1CE715892C7255C6D6536FEC5B4115EEEC6ECE4231
3,323,927 UART: [art] PUB.Y = 8A300D81FE4172FE2474AA4AB4408526CC860F364028CCFFC807BF86CB17DCF4D60E39F91ABA388C7FE9AFC5485B63F2
3,330,881 UART: [art] SIG.R = 499FC51B3D125B616EB65320BBD2C4A7E87FEEA82D18F50EAE8F5BDD164FAFD9166008833E5E336FF8889F435860F515
3,337,655 UART: [art] SIG.S = 65E24144860A37AFC411F971FACCDB373EA601637D19BB1DB6E342358AF49429CA84333F96D580DC141A1130BB6AF1E3
3,361,637 UART: Caliptra RT
3,361,980 UART: [state] CFI Enabled
3,482,575 UART: [rt] RT listening for mailbox commands...
3,483,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,793 UART: [rt]cmd =0x44504543, len=96
3,695,347 >>> mbox cmd response data (6236 bytes)
3,695,348 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,201 UART: [rt]cmd =0x53574545, len=84
3,751,506 >>> mbox cmd response data (200 bytes)
3,751,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,566,276 >>> mbox cmd response: success
6,566,276 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,579,288 UART:
6,579,304 UART: Running Caliptra FMC ...
6,579,712 UART:
6,579,855 UART: [state] CFI Enabled
6,669,028 UART: [art] Extend RT PCRs Done
6,669,456 UART: [art] Lock RT PCRs Done
6,670,981 UART: [art] Populate DV Done
6,679,172 UART: [fht] FMC Alias Private Key: 7
6,680,152 UART: [art] Derive CDI
6,680,432 UART: [art] Store in slot 0x4
6,766,246 UART: [art] Derive Key Pair
6,766,606 UART: [art] Store priv key in slot 0x5
6,779,621 UART: [art] Derive Key Pair - Done
6,794,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,809,672 UART: [art] Erasing AUTHORITY.KEYID = 7
6,810,437 UART: [art] PUB.X = 9B33E15A793F53296DCA2D48A83F9CEFF8D590648C41769B495C45FA1FEC987A465C0D45280832BA3694EC3938458E5B
6,817,203 UART: [art] PUB.Y = 4F0EA5712388752850E7DE8E445751E65CF60BBDD6C012EDFB212AB4AD19B250846764C85713BF070FBACFA16C92295A
6,824,149 UART: [art] SIG.R = 8592661396FC4FD3B11714C866A94F7106CD90F5734675A7096DD971156C6F796B38325BA85909AAD5C934BFDB8C6B7D
6,830,908 UART: [art] SIG.S = CB34D76FBF9A61EF6FF0C0975442545618E4D44F45FBC239003CF4F9835CE8E775E81A415767126C1D294F37FA2FA24C
6,855,146 UART: Caliptra RT
6,855,489 UART: [state] CFI Enabled
7,217,929 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,248,792 UART: [rt]cmd =0x53574545, len=84
7,274,649 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
891,346 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,450 UART: [kat] ++
895,602 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,525 UART: [kat] SHA2-512-ACC
906,426 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,701 UART: [kat] LMS
1,169,013 UART: [kat] --
1,170,066 UART: [cold-reset] ++
1,170,646 UART: [fht] FHT @ 0x50003400
1,173,370 UART: [idev] ++
1,173,538 UART: [idev] CDI.KEYID = 6
1,173,899 UART: [idev] SUBJECT.KEYID = 7
1,174,324 UART: [idev] UDS.KEYID = 0
1,174,670 ready_for_fw is high
1,174,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,317 UART: [idev] Erasing UDS.KEYID = 0
1,199,363 UART: [idev] Sha1 KeyId Algorithm
1,208,273 UART: [idev] --
1,209,326 UART: [ldev] ++
1,209,494 UART: [ldev] CDI.KEYID = 6
1,209,858 UART: [ldev] SUBJECT.KEYID = 5
1,210,285 UART: [ldev] AUTHORITY.KEYID = 7
1,210,748 UART: [ldev] FE.KEYID = 1
1,215,812 UART: [ldev] Erasing FE.KEYID = 1
1,241,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,900 UART: [ldev] --
1,281,263 UART: [fwproc] Wait for Commands...
1,281,998 UART: [fwproc] Recv command 0x46574c44
1,282,731 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,311 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,486 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,739 >>> mbox cmd response: success
2,825,783 UART: [afmc] ++
2,825,951 UART: [afmc] CDI.KEYID = 6
2,826,314 UART: [afmc] SUBJECT.KEYID = 7
2,826,740 UART: [afmc] AUTHORITY.KEYID = 5
2,862,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,925 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,635 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,516 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,217 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,160 UART: [afmc] --
2,906,119 UART: [cold-reset] --
2,906,879 UART: [state] Locking Datavault
2,907,954 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,558 UART: [state] Locking ICCM
2,909,206 UART: [exit] Launching FMC @ 0x40000130
2,914,536 UART:
2,914,552 UART: Running Caliptra FMC ...
2,914,960 UART:
2,915,014 UART: [state] CFI Enabled
2,925,028 UART: [fht] FMC Alias Private Key: 7
3,044,832 UART: [art] Extend RT PCRs Done
3,045,260 UART: [art] Lock RT PCRs Done
3,046,916 UART: [art] Populate DV Done
3,055,199 UART: [fht] FMC Alias Private Key: 7
3,056,277 UART: [art] Derive CDI
3,056,557 UART: [art] Store in slot 0x4
3,142,298 UART: [art] Derive Key Pair
3,142,658 UART: [art] Store priv key in slot 0x5
3,155,918 UART: [art] Derive Key Pair - Done
3,170,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,282 UART: [art] PUB.X = 4528A112CBF467FCCB6A485AD45503630286B4C50E015909456BB0C84117846501AA3618DDC23280124904ED9E317660
3,194,019 UART: [art] PUB.Y = 3B403DF9D77DCB29C726660CE8DEC21CCF782B7BA57578BE241A96118050771078B440B7C82FE85B38081D716D378D11
3,200,963 UART: [art] SIG.R = 412093CDDB4CE981F6F31936B9E81150A38D4D33028E88230D5FF95E92C88E5DBCF90C74F7035312EF89724FEDCDEB65
3,207,729 UART: [art] SIG.S = 1F8289EA68A486C4AE5A55BE0978D452C9EE4F645A8C98999D2E1860E6C1A90F09759CDA58E4979DDF6E7CA0FF36EBDE
3,231,314 UART: Caliptra RT
3,231,565 UART: [state] CFI Enabled
3,351,159 UART: [rt] RT listening for mailbox commands...
3,351,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,391 UART: [rt]cmd =0x44504543, len=96
3,564,492 >>> mbox cmd response data (6236 bytes)
3,564,493 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,594,698 UART: [rt]cmd =0x53574545, len=84
3,620,488 >>> mbox cmd response data (200 bytes)
3,620,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,621,466 UART:
3,621,482 UART: Running Caliptra ROM ...
3,621,890 UART:
3,621,945 UART: [state] CFI Enabled
3,624,167 UART: [state] LifecycleState = Unprovisioned
3,624,822 UART: [state] DebugLocked = No
3,625,416 UART: [state] WD Timer not started. Device not locked for debugging
3,626,544 UART: [kat] SHA2-256
4,430,094 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,434,198 UART: [kat] ++
4,434,350 UART: [kat] sha1
4,438,512 UART: [kat] SHA2-256
4,440,452 UART: [kat] SHA2-384
4,443,131 UART: [kat] SHA2-512-ACC
4,445,031 UART: [kat] ECC-384
4,454,924 UART: [kat] HMAC-384Kdf
4,459,462 UART: [kat] LMS
4,707,774 UART: [kat] --
4,708,754 UART: [update-reset] ++
6,067,683 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,068,868 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,224,083 >>> mbox cmd response: success
6,224,083 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,224,332 UART: [update-reset] Copying MAN_2 To MAN_1
6,232,346 UART: [update-reset Success] --
6,233,209 UART: [state] Locking Datavault
6,234,023 UART: [state] Locking PCR0, PCR1 and PCR31
6,234,627 UART: [state] Locking ICCM
6,235,077 UART: [exit] Launching FMC @ 0x40000130
6,240,407 UART:
6,240,423 UART: Running Caliptra FMC ...
6,240,831 UART:
6,240,885 UART: [state] CFI Enabled
6,329,820 UART: [art] Extend RT PCRs Done
6,330,248 UART: [art] Lock RT PCRs Done
6,331,659 UART: [art] Populate DV Done
6,339,654 UART: [fht] FMC Alias Private Key: 7
6,340,792 UART: [art] Derive CDI
6,341,072 UART: [art] Store in slot 0x4
6,426,539 UART: [art] Derive Key Pair
6,426,899 UART: [art] Store priv key in slot 0x5
6,440,159 UART: [art] Derive Key Pair - Done
6,454,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,470,161 UART: [art] Erasing AUTHORITY.KEYID = 7
6,470,926 UART: [art] PUB.X = D5B22D01C4DA97B9F71959329C4C2F96FB53778474E95328BFF74878FFBF97033D89EDBEAE4E69066DDFB27BDD043D56
6,477,696 UART: [art] PUB.Y = E38B720281BCA38531A97B78F107817C472AB8D0BC1E291B1113BF95CBBCE179FF62841DDFAE79B8BE43F2853E762792
6,484,648 UART: [art] SIG.R = EA783882B9F2E25C7C6A208E391924443FB359EB3A6CD3DEBC6DD1D5EF8678A800D6ECB5548D1DAA831C9F6D48B3C154
6,491,412 UART: [art] SIG.S = 216B90F5DD9E95B7FD7B35257B23658D73FF585B2EA96989B40B54D21401B5CE91FD56F0E3C157D3C16EE2D6020713D0
6,515,294 UART: Caliptra RT
6,515,545 UART: [state] CFI Enabled
6,874,927 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,905,338 UART: [rt]cmd =0x53574545, len=84
6,931,302 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,218 ready_for_fw is high
1,059,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,922 >>> mbox cmd response: success
2,740,223 UART:
2,740,239 UART: Running Caliptra FMC ...
2,740,647 UART:
2,740,701 UART: [state] CFI Enabled
2,751,595 UART: [fht] FMC Alias Private Key: 7
2,870,405 UART: [art] Extend RT PCRs Done
2,870,833 UART: [art] Lock RT PCRs Done
2,872,119 UART: [art] Populate DV Done
2,880,282 UART: [fht] FMC Alias Private Key: 7
2,881,354 UART: [art] Derive CDI
2,881,634 UART: [art] Store in slot 0x4
2,967,365 UART: [art] Derive Key Pair
2,967,725 UART: [art] Store priv key in slot 0x5
2,980,957 UART: [art] Derive Key Pair - Done
2,995,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,922 UART: [art] PUB.X = AB63612468721B141858BB33FBE6D52CC011B22D2E9B124E186138F861AA5E08DA62C9533C0129EE381ECE789BF8EA4C
3,018,692 UART: [art] PUB.Y = 5DC83CB39D3A87E32E09C7A41FF0F98426C83466C81580BAF9E6EB2C08E25ECB5D966DAEE6347FD121710F9693FD2B90
3,025,645 UART: [art] SIG.R = 514B17D03D532537DD32283C4404C1B2D74908605428D8AC33D7BCC2FFB978887045ABF6FF63C02BFAA2E2A7354243B6
3,032,411 UART: [art] SIG.S = E8D22493E67C4C34A30077D2E3130B4AC607CFCEAA9D711BC3056871B0E06705C59F8493880AA0BE527796CC121E0C15
3,056,543 UART: Caliptra RT
3,056,794 UART: [state] CFI Enabled
3,176,427 UART: [rt] RT listening for mailbox commands...
3,177,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,493 UART: [rt]cmd =0x44504543, len=96
3,388,749 >>> mbox cmd response data (6236 bytes)
3,388,750 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,613 UART: [rt]cmd =0x53574545, len=84
3,443,911 >>> mbox cmd response data (200 bytes)
3,443,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,931,290 >>> mbox cmd response: success
5,931,290 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
5,944,815 UART:
5,944,831 UART: Running Caliptra FMC ...
5,945,239 UART:
5,945,293 UART: [state] CFI Enabled
6,034,598 UART: [art] Extend RT PCRs Done
6,035,026 UART: [art] Lock RT PCRs Done
6,036,211 UART: [art] Populate DV Done
6,044,390 UART: [fht] FMC Alias Private Key: 7
6,045,478 UART: [art] Derive CDI
6,045,758 UART: [art] Store in slot 0x4
6,131,211 UART: [art] Derive Key Pair
6,131,571 UART: [art] Store priv key in slot 0x5
6,145,069 UART: [art] Derive Key Pair - Done
6,159,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,175,415 UART: [art] Erasing AUTHORITY.KEYID = 7
6,176,180 UART: [art] PUB.X = 0197556770B5C7B8BED295FA5420D4F0544AB6CB5E208CEFEB1C4155DBA34C8DD306BE453B0FAE91EA72846E2AECFF3E
6,182,963 UART: [art] PUB.Y = 29BFFDD1B0E3F75974ED96D6DDB8F22DDD978AB4F37193558628ADC346C520D46C4674BD63D0A72D6DE0764AE68A6803
6,189,922 UART: [art] SIG.R = 79539E33AD5B62AEB39F3A855303B92765969B3C83865A433629463C1BCEA79B24C596629D337323E5B9D098821A5F2A
6,196,681 UART: [art] SIG.S = F82E4113DAC1D21F18DA7D0E15231037B00D2599E1746D8E7FF65AC7B5EBBC386162574511101802311FDFB1133A15D4
6,220,740 UART: Caliptra RT
6,220,991 UART: [state] CFI Enabled
6,583,397 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,614,332 UART: [rt]cmd =0x53574545, len=84
6,640,576 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
891,181 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
915,680 UART: [kat] HMAC-384Kdf
920,264 UART: [kat] LMS
1,168,576 UART: [kat] --
1,169,573 UART: [cold-reset] ++
1,170,003 UART: [fht] FHT @ 0x50003400
1,172,539 UART: [idev] ++
1,172,707 UART: [idev] CDI.KEYID = 6
1,173,068 UART: [idev] SUBJECT.KEYID = 7
1,173,493 UART: [idev] UDS.KEYID = 0
1,173,839 ready_for_fw is high
1,173,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,230 UART: [idev] Erasing UDS.KEYID = 0
1,198,162 UART: [idev] Sha1 KeyId Algorithm
1,207,240 UART: [idev] --
1,208,289 UART: [ldev] ++
1,208,457 UART: [ldev] CDI.KEYID = 6
1,208,821 UART: [ldev] SUBJECT.KEYID = 5
1,209,248 UART: [ldev] AUTHORITY.KEYID = 7
1,209,711 UART: [ldev] FE.KEYID = 1
1,214,901 UART: [ldev] Erasing FE.KEYID = 1
1,241,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,307 UART: [ldev] --
1,280,680 UART: [fwproc] Wait for Commands...
1,281,449 UART: [fwproc] Recv command 0x46574c44
1,282,182 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,542 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,717 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,048 >>> mbox cmd response: success
2,826,086 UART: [afmc] ++
2,826,254 UART: [afmc] CDI.KEYID = 6
2,826,617 UART: [afmc] SUBJECT.KEYID = 7
2,827,043 UART: [afmc] AUTHORITY.KEYID = 5
2,862,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,742 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,452 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,333 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,034 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,879 UART: [afmc] --
2,905,734 UART: [cold-reset] --
2,906,494 UART: [state] Locking Datavault
2,907,609 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,213 UART: [state] Locking ICCM
2,908,813 UART: [exit] Launching FMC @ 0x40000130
2,914,143 UART:
2,914,159 UART: Running Caliptra FMC ...
2,914,567 UART:
2,914,710 UART: [state] CFI Enabled
2,925,616 UART: [fht] FMC Alias Private Key: 7
3,045,058 UART: [art] Extend RT PCRs Done
3,045,486 UART: [art] Lock RT PCRs Done
3,046,968 UART: [art] Populate DV Done
3,055,175 UART: [fht] FMC Alias Private Key: 7
3,056,159 UART: [art] Derive CDI
3,056,439 UART: [art] Store in slot 0x4
3,142,040 UART: [art] Derive Key Pair
3,142,400 UART: [art] Store priv key in slot 0x5
3,156,190 UART: [art] Derive Key Pair - Done
3,170,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,021 UART: [art] PUB.X = 6243186E3C7B9B9F52063067DC303026794CFDB9FC75B1566C2620449F7D68EB2ABCB1303E9B65D2B51E2D7ABD48CD18
3,193,794 UART: [art] PUB.Y = AE3FFD19A96E26A7B1480A974379F98864FA8DB7143820F99C329CEF5D37C28F8D67E1F8DC2976754C93CCABB7FDD66C
3,200,755 UART: [art] SIG.R = 0493D2F6204600A6811FC32D6FA60DED90F8D5EC99327D08634CB3975A7C4D89512CF034A889B27BDF9798010C26444E
3,207,486 UART: [art] SIG.S = 2B35D383897A9C54B486B7D681570C5E81FC077CC33EEE885A357416AB9DF5C8AB86192CB6CEE8DF9D6701C68F3D3B0A
3,231,518 UART: Caliptra RT
3,231,861 UART: [state] CFI Enabled
3,350,629 UART: [rt] RT listening for mailbox commands...
3,351,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,487 UART: [rt]cmd =0x44504543, len=96
3,563,329 >>> mbox cmd response data (6236 bytes)
3,563,330 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,593,353 UART: [rt]cmd =0x53574545, len=84
3,619,241 >>> mbox cmd response data (200 bytes)
3,619,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,620,117 UART:
3,620,133 UART: Running Caliptra ROM ...
3,620,541 UART:
3,620,683 UART: [state] CFI Enabled
3,623,133 UART: [state] LifecycleState = Unprovisioned
3,623,788 UART: [state] DebugLocked = No
3,624,312 UART: [state] WD Timer not started. Device not locked for debugging
3,625,524 UART: [kat] SHA2-256
4,429,074 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,433,178 UART: [kat] ++
4,433,330 UART: [kat] sha1
4,437,540 UART: [kat] SHA2-256
4,439,480 UART: [kat] SHA2-384
4,442,245 UART: [kat] SHA2-512-ACC
4,444,145 UART: [kat] ECC-384
4,454,174 UART: [kat] HMAC-384Kdf
4,458,680 UART: [kat] LMS
4,706,992 UART: [kat] --
4,707,722 UART: [update-reset] ++
6,067,195 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,068,402 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,223,617 >>> mbox cmd response: success
6,223,617 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,223,846 UART: [update-reset] Copying MAN_2 To MAN_1
6,231,860 UART: [update-reset Success] --
6,232,947 UART: [state] Locking Datavault
6,233,719 UART: [state] Locking PCR0, PCR1 and PCR31
6,234,323 UART: [state] Locking ICCM
6,234,917 UART: [exit] Launching FMC @ 0x40000130
6,240,247 UART:
6,240,263 UART: Running Caliptra FMC ...
6,240,671 UART:
6,240,814 UART: [state] CFI Enabled
6,329,977 UART: [art] Extend RT PCRs Done
6,330,405 UART: [art] Lock RT PCRs Done
6,331,608 UART: [art] Populate DV Done
6,339,789 UART: [fht] FMC Alias Private Key: 7
6,340,869 UART: [art] Derive CDI
6,341,149 UART: [art] Store in slot 0x4
6,426,676 UART: [art] Derive Key Pair
6,427,036 UART: [art] Store priv key in slot 0x5
6,440,526 UART: [art] Derive Key Pair - Done
6,455,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,470,594 UART: [art] Erasing AUTHORITY.KEYID = 7
6,471,359 UART: [art] PUB.X = B59C92DE4AA1B89BB2C44FEC4DEBC575971E6FFA164C74BF73986CB728F812C563CAFD760493342A8B1C2F7F9E687587
6,478,140 UART: [art] PUB.Y = D8878801E027F4441E375E5612D1AF9B35D3310C2DFA6B728B49AE2AFFA253160F2D50C24AF9914A917DDFD47437FCC7
6,485,089 UART: [art] SIG.R = E54F52094015E5DFAF8ABC60506ED5928F0DA4ED384E5AD5900749A1FA55500C3C14CEDB7CC4CED9214035B94AFE5A2F
6,491,865 UART: [art] SIG.S = E45E6158095A0FDD79F2F6FBC793877DAB87B039302017251EAF4D9AAFEBE80FDDC868E1431F04B077338A0CF815F961
6,516,036 UART: Caliptra RT
6,516,379 UART: [state] CFI Enabled
6,878,736 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,909,619 UART: [rt]cmd =0x53574545, len=84
6,935,339 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,403 ready_for_fw is high
1,059,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,965 >>> mbox cmd response: success
2,740,708 UART:
2,740,724 UART: Running Caliptra FMC ...
2,741,132 UART:
2,741,275 UART: [state] CFI Enabled
2,751,667 UART: [fht] FMC Alias Private Key: 7
2,870,179 UART: [art] Extend RT PCRs Done
2,870,607 UART: [art] Lock RT PCRs Done
2,871,733 UART: [art] Populate DV Done
2,879,952 UART: [fht] FMC Alias Private Key: 7
2,881,098 UART: [art] Derive CDI
2,881,378 UART: [art] Store in slot 0x4
2,967,313 UART: [art] Derive Key Pair
2,967,673 UART: [art] Store priv key in slot 0x5
2,981,061 UART: [art] Derive Key Pair - Done
2,995,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,646 UART: [art] PUB.X = 607541E0FB95F0D20F5B0358E998F805C0F97D3A17C2A94D164BCB31BF1F64A41E0085BD164E5EE0948F53BF94E7CC5C
3,018,395 UART: [art] PUB.Y = 1C0B0ABE6778EACF5267EC917CAF6EEC314B793D800AAE85F211CF0286FBA5DDDFF0B5E6FBBE767B279073092100A009
3,025,325 UART: [art] SIG.R = 7CE10209E955C77AC2F4EE0B1A75FA1641289C5D70D1066CFF589C946D41142F4943749A6F1B77DD43430C3481CCE7FC
3,032,084 UART: [art] SIG.S = DD5E29D2C9297292B11367A821572919ADBE00B29D7F5926F5B0E093F2A5193B6B68911F1FE088FD0227D14B37D0B5D5
3,055,841 UART: Caliptra RT
3,056,184 UART: [state] CFI Enabled
3,176,555 UART: [rt] RT listening for mailbox commands...
3,177,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,563 UART: [rt]cmd =0x44504543, len=96
3,388,865 >>> mbox cmd response data (6236 bytes)
3,388,866 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,753 UART: [rt]cmd =0x53574545, len=84
3,444,863 >>> mbox cmd response data (200 bytes)
3,444,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,933,289 >>> mbox cmd response: success
5,933,289 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
5,946,734 UART:
5,946,750 UART: Running Caliptra FMC ...
5,947,158 UART:
5,947,301 UART: [state] CFI Enabled
6,036,870 UART: [art] Extend RT PCRs Done
6,037,298 UART: [art] Lock RT PCRs Done
6,038,383 UART: [art] Populate DV Done
6,046,384 UART: [fht] FMC Alias Private Key: 7
6,047,346 UART: [art] Derive CDI
6,047,626 UART: [art] Store in slot 0x4
6,133,741 UART: [art] Derive Key Pair
6,134,101 UART: [art] Store priv key in slot 0x5
6,147,633 UART: [art] Derive Key Pair - Done
6,162,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,177,993 UART: [art] Erasing AUTHORITY.KEYID = 7
6,178,758 UART: [art] PUB.X = 01A92E0C861800F87FA192E48471207560F6007E08A2B1942D32B53DDDF8F9B9BBEF9D68DF3BA960BC2343BE6E27FA77
6,185,483 UART: [art] PUB.Y = 018CF749F103C2C9D5748AB0168856C71C0D1CBE8041FB36E8AEBD3BFADD2DEACEE7513E9F6109528756F8186E70D32D
6,192,435 UART: [art] SIG.R = 3FE86615C9E697E1B8F6D007632AE5DD06DAD8D60838807A3D8A01D772ED1DF2A41DE628B0313CD9D27975FF62154BD8
6,199,201 UART: [art] SIG.S = 62B92AEFEB4E8D74C02FEB561950020014B5936CF44323CEA606F70E59CDFC562BF2E704856B498D195D8F95A2E6737E
6,223,601 UART: Caliptra RT
6,223,944 UART: [state] CFI Enabled
6,588,633 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,619,258 UART: [rt]cmd =0x53574545, len=84
6,644,720 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
893,338 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,463 UART: [kat] ++
897,615 UART: [kat] sha1
901,829 UART: [kat] SHA2-256
903,769 UART: [kat] SHA2-384
906,322 UART: [kat] SHA2-512-ACC
908,223 UART: [kat] ECC-384
917,908 UART: [kat] HMAC-384Kdf
922,696 UART: [kat] LMS
1,171,024 UART: [kat] --
1,171,833 UART: [cold-reset] ++
1,172,245 UART: [fht] FHT @ 0x50003400
1,174,718 UART: [idev] ++
1,174,886 UART: [idev] CDI.KEYID = 6
1,175,246 UART: [idev] SUBJECT.KEYID = 7
1,175,670 UART: [idev] UDS.KEYID = 0
1,176,015 ready_for_fw is high
1,176,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,930 UART: [idev] Erasing UDS.KEYID = 0
1,200,975 UART: [idev] Sha1 KeyId Algorithm
1,209,531 UART: [idev] --
1,210,485 UART: [ldev] ++
1,210,653 UART: [ldev] CDI.KEYID = 6
1,211,016 UART: [ldev] SUBJECT.KEYID = 5
1,211,442 UART: [ldev] AUTHORITY.KEYID = 7
1,211,905 UART: [ldev] FE.KEYID = 1
1,216,887 UART: [ldev] Erasing FE.KEYID = 1
1,243,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,367 UART: [ldev] --
1,282,630 UART: [fwproc] Wait for Commands...
1,283,258 UART: [fwproc] Recv command 0x46574c44
1,283,986 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,496 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,666 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,831 >>> mbox cmd response: success
2,828,967 UART: [afmc] ++
2,829,135 UART: [afmc] CDI.KEYID = 6
2,829,497 UART: [afmc] SUBJECT.KEYID = 7
2,829,922 UART: [afmc] AUTHORITY.KEYID = 5
2,865,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,822 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,531 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,414 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,115 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,843 UART: [afmc] --
2,908,825 UART: [cold-reset] --
2,909,763 UART: [state] Locking Datavault
2,910,790 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,394 UART: [state] Locking ICCM
2,912,056 UART: [exit] Launching FMC @ 0x40000130
2,917,386 UART:
2,917,402 UART: Running Caliptra FMC ...
2,917,810 UART:
2,917,864 UART: [state] CFI Enabled
2,928,334 UART: [fht] FMC Alias Private Key: 7
3,047,148 UART: [art] Extend RT PCRs Done
3,047,576 UART: [art] Lock RT PCRs Done
3,049,384 UART: [art] Populate DV Done
3,057,575 UART: [fht] FMC Alias Private Key: 7
3,058,737 UART: [art] Derive CDI
3,059,017 UART: [art] Store in slot 0x4
3,144,414 UART: [art] Derive Key Pair
3,144,774 UART: [art] Store priv key in slot 0x5
3,158,304 UART: [art] Derive Key Pair - Done
3,173,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,631 UART: [art] PUB.X = EC51834866FEFAF05173202C4991E54EF3489D1AB4929EA0CA5D2A933D00A712B82BF6469A9F99081A908DB36551DE8D
3,196,380 UART: [art] PUB.Y = 59945148B1BD0B55BB44F517EC9130D6A21E82774C0EBC563C5A84C10A1D03B81493E89A5BDA6B20794B1B5FDCD39B0F
3,203,325 UART: [art] SIG.R = BD60BD9ACC862321165AB2FEA6B7358CB55CE6BF75BD066418AA89A715ED195184E47D17FD1A19C3F707EB163D2C2531
3,210,101 UART: [art] SIG.S = 4D92F3107DB81ADBF36BED46AA7E2FEEE4D59EDC7409E897E9D327A1341AE3E76A3D7B9E19B864DB8E1A828A6397570B
3,233,715 UART: Caliptra RT
3,233,966 UART: [state] CFI Enabled
3,353,293 UART: [rt] RT listening for mailbox commands...
3,353,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,269 UART: [rt]cmd =0x44504543, len=96
3,566,598 >>> mbox cmd response data (6236 bytes)
3,566,599 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,596,426 UART: [rt]cmd =0x53574545, len=84
3,622,090 >>> mbox cmd response data (200 bytes)
3,622,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,622,874 UART:
3,622,890 UART: Running Caliptra ROM ...
3,623,298 UART:
3,623,353 UART: [state] CFI Enabled
3,626,267 UART: [state] LifecycleState = Unprovisioned
3,626,922 UART: [state] DebugLocked = No
3,627,624 UART: [state] WD Timer not started. Device not locked for debugging
3,628,832 UART: [kat] SHA2-256
4,434,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,438,607 UART: [kat] ++
4,438,759 UART: [kat] sha1
4,443,011 UART: [kat] SHA2-256
4,444,951 UART: [kat] SHA2-384
4,447,508 UART: [kat] SHA2-512-ACC
4,449,408 UART: [kat] ECC-384
4,458,951 UART: [kat] HMAC-384Kdf
4,463,527 UART: [kat] LMS
4,711,855 UART: [kat] --
4,712,585 UART: [update-reset] ++
6,071,423 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,072,528 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,227,743 >>> mbox cmd response: success
6,227,743 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,228,022 UART: [update-reset] Copying MAN_2 To MAN_1
6,236,036 UART: [update-reset Success] --
6,237,013 UART: [state] Locking Datavault
6,237,919 UART: [state] Locking PCR0, PCR1 and PCR31
6,238,523 UART: [state] Locking ICCM
6,239,145 UART: [exit] Launching FMC @ 0x40000130
6,244,475 UART:
6,244,491 UART: Running Caliptra FMC ...
6,244,899 UART:
6,244,953 UART: [state] CFI Enabled
6,334,014 UART: [art] Extend RT PCRs Done
6,334,442 UART: [art] Lock RT PCRs Done
6,335,817 UART: [art] Populate DV Done
6,344,038 UART: [fht] FMC Alias Private Key: 7
6,344,988 UART: [art] Derive CDI
6,345,268 UART: [art] Store in slot 0x4
6,431,231 UART: [art] Derive Key Pair
6,431,591 UART: [art] Store priv key in slot 0x5
6,445,071 UART: [art] Derive Key Pair - Done
6,459,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,475,119 UART: [art] Erasing AUTHORITY.KEYID = 7
6,475,884 UART: [art] PUB.X = 818E2F65EA797F639E46AFED44325A162E1FC24B35499C8E06D3647ABEC943E41E138C5ABAAFDC81B5C6D9020FEA6C7E
6,482,663 UART: [art] PUB.Y = E7E08EE777F09DEE57F9BBCBFBDEFA55CEB73AAED92CC3E034900BAF88A0036EFC9CC3B7A5CA4EFDB3BD5E22E1AD4E70
6,489,651 UART: [art] SIG.R = 83D64EC11FAE9ACD2544449BDB59D4722A8113AA9DD98594743EDE6877A72DE215FA163C8843146D8BB691B4DC4F7097
6,496,427 UART: [art] SIG.S = 1C4A308409D8D7717F02A8B9342255987AFC611278B32A8D7C8372D7646D850EAC5E351A1E6A767004489E76B1D7DF89
6,520,591 UART: Caliptra RT
6,520,842 UART: [state] CFI Enabled
6,887,194 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,917,673 UART: [rt]cmd =0x53574545, len=84
6,943,519 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,827 ready_for_fw is high
1,060,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,794 >>> mbox cmd response: success
2,741,043 UART:
2,741,059 UART: Running Caliptra FMC ...
2,741,467 UART:
2,741,521 UART: [state] CFI Enabled
2,752,255 UART: [fht] FMC Alias Private Key: 7
2,871,805 UART: [art] Extend RT PCRs Done
2,872,233 UART: [art] Lock RT PCRs Done
2,873,761 UART: [art] Populate DV Done
2,882,054 UART: [fht] FMC Alias Private Key: 7
2,883,136 UART: [art] Derive CDI
2,883,416 UART: [art] Store in slot 0x4
2,969,373 UART: [art] Derive Key Pair
2,969,733 UART: [art] Store priv key in slot 0x5
2,983,055 UART: [art] Derive Key Pair - Done
2,997,813 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,390 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,155 UART: [art] PUB.X = 273E70EC27C4CFF0B1EB8F5BE88E135A1FD0D245D4EA193147BEFE45AAFE1EF04DB04259553DA9DB9BA0C6FA27AC9EEA
3,020,957 UART: [art] PUB.Y = B2F783B8D41494218F027F7D2EF232BFDD4E6FFB1084B2CFAA152C4686F3150DDF1A19A4612E6C17C3B1BAF0B71A6354
3,027,915 UART: [art] SIG.R = 4A5B666084931785645957E76E43BE1EEB7D44096FCF28A23048080C50A7CFA54356A4F9CCD1DCC30B4D9D89A1D1684F
3,034,677 UART: [art] SIG.S = EC831A72D8A127F210296AF3A3B9BF8BC0F54D82AA78514782396BA87C2337EE8FAC8E53ACEBD6DEE0E8067331CB6015
3,058,642 UART: Caliptra RT
3,058,893 UART: [state] CFI Enabled
3,178,618 UART: [rt] RT listening for mailbox commands...
3,179,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,838 UART: [rt]cmd =0x44504543, len=96
3,392,661 >>> mbox cmd response data (6236 bytes)
3,392,662 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,429 UART: [rt]cmd =0x53574545, len=84
3,448,251 >>> mbox cmd response data (200 bytes)
3,448,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,935,959 >>> mbox cmd response: success
5,935,959 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
5,949,798 UART:
5,949,814 UART: Running Caliptra FMC ...
5,950,222 UART:
5,950,276 UART: [state] CFI Enabled
6,039,049 UART: [art] Extend RT PCRs Done
6,039,477 UART: [art] Lock RT PCRs Done
6,040,782 UART: [art] Populate DV Done
6,049,121 UART: [fht] FMC Alias Private Key: 7
6,050,255 UART: [art] Derive CDI
6,050,535 UART: [art] Store in slot 0x4
6,136,348 UART: [art] Derive Key Pair
6,136,708 UART: [art] Store priv key in slot 0x5
6,149,686 UART: [art] Derive Key Pair - Done
6,164,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,179,926 UART: [art] Erasing AUTHORITY.KEYID = 7
6,180,691 UART: [art] PUB.X = FE783F3E478221E13BCF714932997515D005A1D129300B229262DB4DE9C3721DA643BD5FA496B63048F7C23B872D4B9C
6,187,453 UART: [art] PUB.Y = 3C8A8CF8FD3E0582ED0F0E14053A2A6FAFC074B1FA1BAD2C6C17AAFA61936EB1C06D480F67C30809AC0030C85BB656FE
6,194,382 UART: [art] SIG.R = 9D49CCB8E159389C524A108D44749961C60F37CFDE7D0036712D6E91323866D32915CAA24E9052E13A77BE0719850AC9
6,201,115 UART: [art] SIG.S = CCCE675616821CA1BEC917A376E45AC9A38AEA89A6CD5759E8E993B0B4E5D92E40CFC76A762B697CE8FCF4D39FAC27ED
6,225,581 UART: Caliptra RT
6,225,832 UART: [state] CFI Enabled
6,590,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,621,080 UART: [rt]cmd =0x53574545, len=84
6,647,108 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
893,489 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,614 UART: [kat] ++
897,766 UART: [kat] sha1
901,858 UART: [kat] SHA2-256
903,798 UART: [kat] SHA2-384
906,603 UART: [kat] SHA2-512-ACC
908,504 UART: [kat] ECC-384
918,683 UART: [kat] HMAC-384Kdf
923,389 UART: [kat] LMS
1,171,717 UART: [kat] --
1,172,650 UART: [cold-reset] ++
1,173,116 UART: [fht] FHT @ 0x50003400
1,175,789 UART: [idev] ++
1,175,957 UART: [idev] CDI.KEYID = 6
1,176,317 UART: [idev] SUBJECT.KEYID = 7
1,176,741 UART: [idev] UDS.KEYID = 0
1,177,086 ready_for_fw is high
1,177,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,641 UART: [idev] Erasing UDS.KEYID = 0
1,201,928 UART: [idev] Sha1 KeyId Algorithm
1,210,216 UART: [idev] --
1,211,420 UART: [ldev] ++
1,211,588 UART: [ldev] CDI.KEYID = 6
1,211,951 UART: [ldev] SUBJECT.KEYID = 5
1,212,377 UART: [ldev] AUTHORITY.KEYID = 7
1,212,840 UART: [ldev] FE.KEYID = 1
1,218,068 UART: [ldev] Erasing FE.KEYID = 1
1,244,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,648 UART: [ldev] --
1,284,095 UART: [fwproc] Wait for Commands...
1,284,837 UART: [fwproc] Recv command 0x46574c44
1,285,565 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,405 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,575 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,752 >>> mbox cmd response: success
2,829,878 UART: [afmc] ++
2,830,046 UART: [afmc] CDI.KEYID = 6
2,830,408 UART: [afmc] SUBJECT.KEYID = 7
2,830,833 UART: [afmc] AUTHORITY.KEYID = 5
2,866,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,461 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,170 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,053 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,754 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,578 UART: [afmc] --
2,909,526 UART: [cold-reset] --
2,910,466 UART: [state] Locking Datavault
2,911,629 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,233 UART: [state] Locking ICCM
2,912,835 UART: [exit] Launching FMC @ 0x40000130
2,918,165 UART:
2,918,181 UART: Running Caliptra FMC ...
2,918,589 UART:
2,918,732 UART: [state] CFI Enabled
2,929,526 UART: [fht] FMC Alias Private Key: 7
3,049,046 UART: [art] Extend RT PCRs Done
3,049,474 UART: [art] Lock RT PCRs Done
3,051,286 UART: [art] Populate DV Done
3,059,471 UART: [fht] FMC Alias Private Key: 7
3,060,571 UART: [art] Derive CDI
3,060,851 UART: [art] Store in slot 0x4
3,146,548 UART: [art] Derive Key Pair
3,146,908 UART: [art] Store priv key in slot 0x5
3,160,522 UART: [art] Derive Key Pair - Done
3,175,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,755 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,520 UART: [art] PUB.X = 241AD773F20994DFE4BFF504B00B882890CBB5BEEF99F7533617563E02082B4261DF8B9B52223E16FFB7139A1F2ADECC
3,198,285 UART: [art] PUB.Y = 0851F248BDBD89C12810C9434944539BD8E4BF41FBE6835C0100D6B71955CA42A7D4797E69038BA970EF51354BCB323D
3,205,204 UART: [art] SIG.R = 003C3ECA33615FEA5894F9F8C9FBDB637A95DD98EAD1FE3FD79614E6C03461D353785F21856DB358383915D9F0E7F3DF
3,211,962 UART: [art] SIG.S = F56F4D1E4254E57AA88C6EE5531FD606188F33BF4D296CD9D65F9186402DD0C0E73FEB65F661AE3062D776FB233C6035
3,235,827 UART: Caliptra RT
3,236,170 UART: [state] CFI Enabled
3,355,581 UART: [rt] RT listening for mailbox commands...
3,356,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,713 UART: [rt]cmd =0x44504543, len=96
3,568,966 >>> mbox cmd response data (6236 bytes)
3,568,967 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,598,850 UART: [rt]cmd =0x53574545, len=84
3,623,936 >>> mbox cmd response data (200 bytes)
3,623,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,624,740 UART:
3,624,756 UART: Running Caliptra ROM ...
3,625,164 UART:
3,625,306 UART: [state] CFI Enabled
3,628,076 UART: [state] LifecycleState = Unprovisioned
3,628,731 UART: [state] DebugLocked = No
3,629,427 UART: [state] WD Timer not started. Device not locked for debugging
3,630,645 UART: [kat] SHA2-256
4,436,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,440,420 UART: [kat] ++
4,440,572 UART: [kat] sha1
4,444,592 UART: [kat] SHA2-256
4,446,532 UART: [kat] SHA2-384
4,449,233 UART: [kat] SHA2-512-ACC
4,451,133 UART: [kat] ECC-384
4,460,858 UART: [kat] HMAC-384Kdf
4,465,480 UART: [kat] LMS
4,713,808 UART: [kat] --
4,714,760 UART: [update-reset] ++
6,074,636 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,075,771 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,230,986 >>> mbox cmd response: success
6,230,986 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,231,315 UART: [update-reset] Copying MAN_2 To MAN_1
6,239,329 UART: [update-reset Success] --
6,240,100 UART: [state] Locking Datavault
6,240,912 UART: [state] Locking PCR0, PCR1 and PCR31
6,241,516 UART: [state] Locking ICCM
6,242,158 UART: [exit] Launching FMC @ 0x40000130
6,247,488 UART:
6,247,504 UART: Running Caliptra FMC ...
6,247,912 UART:
6,248,055 UART: [state] CFI Enabled
6,336,962 UART: [art] Extend RT PCRs Done
6,337,390 UART: [art] Lock RT PCRs Done
6,338,475 UART: [art] Populate DV Done
6,346,688 UART: [fht] FMC Alias Private Key: 7
6,347,640 UART: [art] Derive CDI
6,347,920 UART: [art] Store in slot 0x4
6,433,489 UART: [art] Derive Key Pair
6,433,849 UART: [art] Store priv key in slot 0x5
6,447,007 UART: [art] Derive Key Pair - Done
6,461,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,477,652 UART: [art] Erasing AUTHORITY.KEYID = 7
6,478,417 UART: [art] PUB.X = AF95109CAAC8878A362A06856B9A7C235D9FD56B81E100DD0E43CA7A8DCD5EB74A63C5BC4AE99171088A0070C8E308C3
6,485,143 UART: [art] PUB.Y = CB76199A21DA8B29ACBABE1BD564A3D36250F14D913C63DD36C939A4109548575C6908A9EA433D12E8698AA6D4EB7F3D
6,492,100 UART: [art] SIG.R = 228BDEBF5E3AFB01081901BFA5E9B5EDCC7CA03CFBB399BBF65B0831839ED1E76F816D168ABB1377D90C103490E9D321
6,498,873 UART: [art] SIG.S = 3E24DB133E6332C8DA08FF832A40E9557060EB6E30C901B00CBAD88C6DC2020766180FFB06DC7A0B6A0FB7F99745BD11
6,522,176 UART: Caliptra RT
6,522,519 UART: [state] CFI Enabled
6,886,708 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,917,265 UART: [rt]cmd =0x53574545, len=84
6,943,201 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,552 ready_for_fw is high
1,059,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,381 >>> mbox cmd response: success
2,740,546 UART:
2,740,562 UART: Running Caliptra FMC ...
2,740,970 UART:
2,741,113 UART: [state] CFI Enabled
2,751,713 UART: [fht] FMC Alias Private Key: 7
2,870,701 UART: [art] Extend RT PCRs Done
2,871,129 UART: [art] Lock RT PCRs Done
2,872,863 UART: [art] Populate DV Done
2,881,262 UART: [fht] FMC Alias Private Key: 7
2,882,378 UART: [art] Derive CDI
2,882,658 UART: [art] Store in slot 0x4
2,968,259 UART: [art] Derive Key Pair
2,968,619 UART: [art] Store priv key in slot 0x5
2,982,511 UART: [art] Derive Key Pair - Done
2,997,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,770 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,535 UART: [art] PUB.X = 4A69AD56287FF10EC7B8167A805EFBD2F500BFC45177F7C2910C32C352E1D21FBE6D45D2C2776749B6072105FDCC317E
3,020,279 UART: [art] PUB.Y = 55869DCE46730B7C1952D0D0D92C5339AE931F0CA584F69C10E96563D635F1FE08426A6BE7109F380D5B900F5CC9110C
3,027,211 UART: [art] SIG.R = 29A6905C94B97C6645F40C92964690869A80894BBB86DB31ECD5FD69CA7A0EBABEAA27695E5602A1AAC17EB638168B38
3,033,980 UART: [art] SIG.S = 0FCCE65D937B9BAB81044FC56BD57FA478952C20A80A75E9607E5F84A01D7D6FAF3D1A170A6B89D05F9436C22BBDBCD2
3,057,834 UART: Caliptra RT
3,058,177 UART: [state] CFI Enabled
3,178,009 UART: [rt] RT listening for mailbox commands...
3,178,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,009 UART: [rt]cmd =0x44504543, len=96
3,391,644 >>> mbox cmd response data (6236 bytes)
3,391,645 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,696 UART: [rt]cmd =0x53574545, len=84
3,446,960 >>> mbox cmd response data (200 bytes)
3,446,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,936,419 >>> mbox cmd response: success
5,936,419 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
5,949,722 UART:
5,949,738 UART: Running Caliptra FMC ...
5,950,146 UART:
5,950,289 UART: [state] CFI Enabled
6,039,436 UART: [art] Extend RT PCRs Done
6,039,864 UART: [art] Lock RT PCRs Done
6,041,255 UART: [art] Populate DV Done
6,049,860 UART: [fht] FMC Alias Private Key: 7
6,050,794 UART: [art] Derive CDI
6,051,074 UART: [art] Store in slot 0x4
6,136,909 UART: [art] Derive Key Pair
6,137,269 UART: [art] Store priv key in slot 0x5
6,150,659 UART: [art] Derive Key Pair - Done
6,165,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,180,959 UART: [art] Erasing AUTHORITY.KEYID = 7
6,181,724 UART: [art] PUB.X = 6E8FA80B6385A070271B0835DD6B2FF64867AC8DF636EE60EF3C56D19BAD9A03A56E628E136320E8089FB0415C076D29
6,188,483 UART: [art] PUB.Y = 7380EE6703B410509062DA70366E7F4466DB525A27AFECB4DAE1B75C8A4F2350A4E91781CF8D6EA94AF693D6D3A94899
6,195,436 UART: [art] SIG.R = 2AEB39C583953389E25104F4C502B4DCC232FD36B6CAF7E58B3646158D13BE23593BF7680DA9BC75BC45C8D699659AEE
6,202,205 UART: [art] SIG.S = E1F1861D770A077B8B0B9AB3AE66D56D8F3BF96ABAC4312978FFFBE4AD4AA237B852053CBE3F045EAE59B73C19C2DD12
6,225,784 UART: Caliptra RT
6,226,127 UART: [state] CFI Enabled
6,587,817 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,618,166 UART: [rt]cmd =0x53574545, len=84
6,643,562 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
192,149 UART:
192,505 UART: Running Caliptra ROM ...
193,698 UART:
193,852 UART: [state] CFI Enabled
262,759 UART: [state] LifecycleState = Unprovisioned
264,680 UART: [state] DebugLocked = No
267,066 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,797 UART: [kat] SHA2-256
442,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,028 UART: [kat] ++
453,510 UART: [kat] sha1
464,599 UART: [kat] SHA2-256
467,327 UART: [kat] SHA2-384
472,442 UART: [kat] SHA2-512-ACC
474,780 UART: [kat] ECC-384
2,768,272 UART: [kat] HMAC-384Kdf
2,798,306 UART: [kat] LMS
3,988,584 UART: [kat] --
3,992,572 UART: [cold-reset] ++
3,994,544 UART: [fht] Storing FHT @ 0x50003400
4,004,615 UART: [idev] ++
4,005,311 UART: [idev] CDI.KEYID = 6
4,006,207 UART: [idev] SUBJECT.KEYID = 7
4,007,320 UART: [idev] UDS.KEYID = 0
4,008,432 ready_for_fw is high
4,008,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,157,834 UART: [idev] Erasing UDS.KEYID = 0
7,345,580 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,174 UART: [idev] --
7,372,773 UART: [ldev] ++
7,373,355 UART: [ldev] CDI.KEYID = 6
7,374,327 UART: [ldev] SUBJECT.KEYID = 5
7,375,544 UART: [ldev] AUTHORITY.KEYID = 7
7,376,778 UART: [ldev] FE.KEYID = 1
7,419,936 UART: [ldev] Erasing FE.KEYID = 1
10,754,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,033 UART: [ldev] --
13,112,760 UART: [fwproc] Waiting for Commands...
13,114,437 UART: [fwproc] Received command 0x46574c44
13,116,689 UART: [fwproc] Received Image of size 118548 bytes
17,219,567 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,296,550 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,369,721 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,698,484 >>> mbox cmd response: success
17,702,985 UART: [afmc] ++
17,703,596 UART: [afmc] CDI.KEYID = 6
17,704,508 UART: [afmc] SUBJECT.KEYID = 7
17,705,719 UART: [afmc] AUTHORITY.KEYID = 5
21,068,509 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,367,691 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,369,955 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,384,344 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,100 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,413,477 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,434,660 UART: [afmc] --
23,438,083 UART: [cold-reset] --
23,442,552 UART: [state] Locking Datavault
23,448,021 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,780 UART: [state] Locking ICCM
23,452,524 UART: [exit] Launching FMC @ 0x40000130
23,460,936 UART:
23,461,171 UART: Running Caliptra FMC ...
23,462,269 UART:
23,462,433 UART: [state] CFI Enabled
23,527,639 UART: [fht] FMC Alias Private Key: 7
25,868,058 UART: [art] Extend RT PCRs Done
25,869,294 UART: [art] Lock RT PCRs Done
25,870,865 UART: [art] Populate DV Done
25,876,440 UART: [fht] FMC Alias Private Key: 7
25,877,922 UART: [art] Derive CDI
25,878,701 UART: [art] Store in slot 0x4
25,937,696 UART: [art] Derive Key Pair
25,938,741 UART: [art] Store priv key in slot 0x5
29,231,690 UART: [art] Derive Key Pair - Done
29,244,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,830 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,337 UART: [art] PUB.X = 79ACADE2C82492B5FABAFCADD24280C3BF115282373FCA081265CCCD63316ABAF4C74ABF995DE3FB20413C7019465EE0
31,542,606 UART: [art] PUB.Y = 69FF7C6A8EF1647EAE8C3611AB7B6F8BDA104873F3F79654C59CB699ABE04253BF2FF8C1DD5A44A838E88FA3FA2A99EE
31,549,918 UART: [art] SIG.R = 699EBEFA6C02B8DB77DE2FDD8676C24A8C4D637F092FC7033041A1BC32D5055DD3DD73F84C44D38D797EB5DAA5620C16
31,557,325 UART: [art] SIG.S = 59AC39A21D16FCF7DE54B4B9750F2A438C7F699E0013B22536B20379F6CBF1AD8CFEF00D7C81F7236A3B87FC77D48D4C
32,862,284 UART: Caliptra RT
32,863,000 UART: [state] CFI Enabled
33,059,015 UART: [rt] RT listening for mailbox commands...
33,061,359 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,091,242 UART: [rt]cmd =0x44504543, len=40
33,139,980 >>> mbox cmd response data (40 bytes)
33,140,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,171,406 UART: [rt]cmd =0x44504543, len=96
33,231,593 >>> mbox cmd response data (56 bytes)
33,232,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,263,128 UART: [rt]cmd =0x44504543, len=96
39,031,599 >>> mbox cmd response data (6236 bytes)
39,060,863 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,091,416 UART: [rt]cmd =0x53574545, len=84
44,676,297 >>> mbox cmd response data (200 bytes)
47,137,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,288,395 UART:
47,288,766 UART: Running Caliptra ROM ...
47,289,907 UART:
47,290,081 UART: [state] CFI Enabled
47,353,572 UART: [state] LifecycleState = Unprovisioned
47,355,511 UART: [state] DebugLocked = No
47,357,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,361,765 UART: [kat] SHA2-256
47,531,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,541,956 UART: [kat] ++
47,542,416 UART: [kat] sha1
47,552,780 UART: [kat] SHA2-256
47,555,477 UART: [kat] SHA2-384
47,561,631 UART: [kat] SHA2-512-ACC
47,563,975 UART: [kat] ECC-384
49,856,920 UART: [kat] HMAC-384Kdf
49,890,487 UART: [kat] LMS
51,080,860 UART: [kat] --
51,087,199 UART: [update-reset] ++
55,273,723 UART: [update-reset] Image verified using Vendor ECC Key Index 0
55,277,676 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,675,443 >>> mbox cmd response: success
55,675,887 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,677,253 UART: [update-reset] Copying MAN_2 To MAN_1
55,699,690 UART: [update-reset Success] --
55,703,974 UART: [state] Locking Datavault
55,707,226 UART: [state] Locking PCR0, PCR1 and PCR31
55,709,012 UART: [state] Locking ICCM
55,711,226 UART: [exit] Launching FMC @ 0x40000130
55,719,679 UART:
55,719,917 UART: Running Caliptra FMC ...
55,721,015 UART:
55,721,176 UART: [state] CFI Enabled
55,810,513 UART: [art] Extend RT PCRs Done
55,811,701 UART: [art] Lock RT PCRs Done
55,813,432 UART: [art] Populate DV Done
55,819,003 UART: [fht] FMC Alias Private Key: 7
55,820,650 UART: [art] Derive CDI
55,821,463 UART: [art] Store in slot 0x4
55,879,289 UART: [art] Derive Key Pair
55,880,331 UART: [art] Store priv key in slot 0x5
59,173,248 UART: [art] Derive Key Pair - Done
59,186,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,474,200 UART: [art] Erasing AUTHORITY.KEYID = 7
61,475,716 UART: [art] PUB.X = 8F87964ED3D642EF6B28EC4ED5FC9947BC6716CBBFF48257B94B9AE2A699B8C3B70875F91E75D8C903C5B10936854396
61,482,987 UART: [art] PUB.Y = A51728F7668941567C65B47C6B12CC2D497A3FE190FB5C49C84E03DF50614412663D8BE5E5AC4D2EC5F87862AE44B6C9
61,490,231 UART: [art] SIG.R = 7D7E3F34E795F4FCEE593D0B3FF29203C76B5BB1D03F0B81DFAE7A4DA0B90BB8381B6B30F4114643F44BFD30B0E79635
61,497,647 UART: [art] SIG.S = D1AC529F93C64037D2964EF98392F3A6070D2AD0933902354D5AF333474A9A2357474172C8BD94EEACBB2B9D21EA2D71
62,802,745 UART: Caliptra RT
62,803,465 UART: [state] CFI Enabled
63,219,428 UART: [rt] RT listening for mailbox commands...
63,251,283 UART: [rt]cmd =0x53574545, len=84
68,838,963 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,804,492 ready_for_fw is high
3,805,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,945,334 >>> mbox cmd response: success
23,631,185 UART:
23,631,580 UART: Running Caliptra FMC ...
23,632,703 UART:
23,632,860 UART: [state] CFI Enabled
23,697,645 UART: [fht] FMC Alias Private Key: 7
26,037,335 UART: [art] Extend RT PCRs Done
26,038,575 UART: [art] Lock RT PCRs Done
26,040,500 UART: [art] Populate DV Done
26,045,895 UART: [fht] FMC Alias Private Key: 7
26,047,499 UART: [art] Derive CDI
26,048,317 UART: [art] Store in slot 0x4
26,105,920 UART: [art] Derive Key Pair
26,106,966 UART: [art] Store priv key in slot 0x5
29,399,887 UART: [art] Derive Key Pair - Done
29,412,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,701,909 UART: [art] Erasing AUTHORITY.KEYID = 7
31,703,415 UART: [art] PUB.X = 86C7D015B49C0098533928FE60BDEF4DBC1FD703BF1CFDAE121B4F6C56D31931A30160EFC0EDC07D1D05B396B643ECE3
31,710,675 UART: [art] PUB.Y = 5E644BD6DB84270D44F069E92206C8D2C23573EF871FB4A37D970CBA3D62CB39F522BB483318B70BF94D069E40EC8463
31,717,932 UART: [art] SIG.R = 90E6A8A15271CA5E16244C8A7F4FFAA85D0106D94FDAF18B176659D0A00FBCE663B877A50F68CCC1CF0B2BA2948DC200
31,725,344 UART: [art] SIG.S = 51E91E2E72A0B5F79035E5114FA7DB21F0DA5C85C1EAA6AB19A7E882359E0391580DBDA1C4930187B473274067479407
33,030,867 UART: Caliptra RT
33,031,571 UART: [state] CFI Enabled
33,208,638 UART: [rt] RT listening for mailbox commands...
33,210,907 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,241,087 UART: [rt]cmd =0x44504543, len=40
33,288,870 >>> mbox cmd response data (40 bytes)
33,289,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,320,510 UART: [rt]cmd =0x44504543, len=96
33,380,048 >>> mbox cmd response data (56 bytes)
33,380,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,411,815 UART: [rt]cmd =0x44504543, len=96
39,181,082 >>> mbox cmd response data (6236 bytes)
39,210,538 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,240,948 UART: [rt]cmd =0x53574545, len=84
44,825,147 >>> mbox cmd response data (200 bytes)
47,285,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
56,120,276 >>> mbox cmd response: success
56,120,913 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
56,154,381 UART:
56,154,668 UART: Running Caliptra FMC ...
56,155,940 UART:
56,156,100 UART: [state] CFI Enabled
56,259,107 UART: [art] Extend RT PCRs Done
56,260,308 UART: [art] Lock RT PCRs Done
56,261,915 UART: [art] Populate DV Done
56,267,293 UART: [fht] FMC Alias Private Key: 7
56,268,938 UART: [art] Derive CDI
56,269,674 UART: [art] Store in slot 0x4
56,327,711 UART: [art] Derive Key Pair
56,328,755 UART: [art] Store priv key in slot 0x5
59,620,435 UART: [art] Derive Key Pair - Done
59,633,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,921,417 UART: [art] Erasing AUTHORITY.KEYID = 7
61,922,923 UART: [art] PUB.X = A3DAB41C8E949BD25E5C53431BF8E8F71B749BDBF2FAB866AFDBDDD923E3C24A23F96DB5007003A622B3D10CEE02A450
61,930,183 UART: [art] PUB.Y = 47CC283C416DF10AE624D0F94C81D72426A2EDFAA8EF27DB3BD89319F42C31700E76E9D60AA4C1BD328DAB2A8A5B605C
61,937,467 UART: [art] SIG.R = 298D4522C26E7D37DF8B57DB1E2FAC0B2C90BE56CCF5ED60F85654FFF53BEDFEBAC6625651E57DE23D36297040601B85
61,944,858 UART: [art] SIG.S = F93A1B1080599141AF50DEAFF2D0E5B62AFEFB388EFADE52EDD5DC80419AB2B3CA8CA18D6F89B3C673971FCF3A15A15F
63,250,400 UART: Caliptra RT
63,251,121 UART: [state] CFI Enabled
63,672,906 UART: [rt] RT listening for mailbox commands...
63,704,748 UART: [rt]cmd =0x53574545, len=84
69,284,607 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
192,517 UART:
192,871 UART: Running Caliptra ROM ...
194,053 UART:
603,758 UART: [state] CFI Enabled
618,915 UART: [state] LifecycleState = Unprovisioned
620,781 UART: [state] DebugLocked = No
623,723 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,015 UART: [kat] SHA2-256
798,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,334 UART: [kat] ++
809,776 UART: [kat] sha1
820,433 UART: [kat] SHA2-256
823,083 UART: [kat] SHA2-384
829,872 UART: [kat] SHA2-512-ACC
832,223 UART: [kat] ECC-384
3,117,329 UART: [kat] HMAC-384Kdf
3,128,637 UART: [kat] LMS
4,318,791 UART: [kat] --
4,323,518 UART: [cold-reset] ++
4,325,450 UART: [fht] Storing FHT @ 0x50003400
4,336,136 UART: [idev] ++
4,336,690 UART: [idev] CDI.KEYID = 6
4,337,662 UART: [idev] SUBJECT.KEYID = 7
4,338,901 UART: [idev] UDS.KEYID = 0
4,339,934 ready_for_fw is high
4,340,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,987 UART: [idev] Erasing UDS.KEYID = 0
7,623,962 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,046 UART: [idev] --
7,648,118 UART: [ldev] ++
7,648,713 UART: [ldev] CDI.KEYID = 6
7,649,647 UART: [ldev] SUBJECT.KEYID = 5
7,650,852 UART: [ldev] AUTHORITY.KEYID = 7
7,652,127 UART: [ldev] FE.KEYID = 1
7,663,469 UART: [ldev] Erasing FE.KEYID = 1
10,955,419 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,456 UART: [ldev] --
13,316,625 UART: [fwproc] Waiting for Commands...
13,319,805 UART: [fwproc] Received command 0x46574c44
13,321,984 UART: [fwproc] Received Image of size 118548 bytes
17,421,036 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,765 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,934 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,565 >>> mbox cmd response: success
17,906,436 UART: [afmc] ++
17,907,055 UART: [afmc] CDI.KEYID = 6
17,907,942 UART: [afmc] SUBJECT.KEYID = 7
17,909,211 UART: [afmc] AUTHORITY.KEYID = 5
21,224,202 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,487 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,794 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,174 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,929 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,326 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,514 UART: [afmc] --
23,589,191 UART: [cold-reset] --
23,593,163 UART: [state] Locking Datavault
23,599,645 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,411 UART: [state] Locking ICCM
23,603,771 UART: [exit] Launching FMC @ 0x40000130
23,612,161 UART:
23,612,395 UART: Running Caliptra FMC ...
23,613,487 UART:
23,613,653 UART: [state] CFI Enabled
23,621,777 UART: [fht] FMC Alias Private Key: 7
25,961,141 UART: [art] Extend RT PCRs Done
25,962,375 UART: [art] Lock RT PCRs Done
25,963,886 UART: [art] Populate DV Done
25,969,508 UART: [fht] FMC Alias Private Key: 7
25,971,152 UART: [art] Derive CDI
25,971,903 UART: [art] Store in slot 0x4
26,014,814 UART: [art] Derive Key Pair
26,015,813 UART: [art] Store priv key in slot 0x5
29,258,010 UART: [art] Derive Key Pair - Done
29,270,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,197 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,712 UART: [art] PUB.X = 01E7423424C43EAE52B358A84E1629C63AC65B9CA7A2F52F85778D8324DD89B4CA39DD2FD4A5F61EB18067B669DE409E
31,559,921 UART: [art] PUB.Y = CCBA73340A71C1DA16ECF2C8CE2CFB11275FB985E672BA613FD946B1A03CD1F3B5245B5F4DC81AF4C9DFAF2DF1FA95DA
31,567,208 UART: [art] SIG.R = D9C5648834BD09C30810822989BC8B9239ED46C3E37B3C47796625D8F2DB9BA67BB263A3571ADEE34FB36E55C8A6A940
31,574,607 UART: [art] SIG.S = 09E6F65B47606DCF670EF9056AB4CCE1A3F357E0322694599E61CD8CEF36631F0AE6EEDD5D6DA9582AC274B5E341A104
32,879,501 UART: Caliptra RT
32,880,209 UART: [state] CFI Enabled
33,013,443 UART: [rt] RT listening for mailbox commands...
33,015,565 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,045,612 UART: [rt]cmd =0x44504543, len=40
33,073,393 >>> mbox cmd response data (40 bytes)
33,074,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,105,122 UART: [rt]cmd =0x44504543, len=96
33,148,711 >>> mbox cmd response data (56 bytes)
33,149,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,180,304 UART: [rt]cmd =0x44504543, len=96
38,854,210 >>> mbox cmd response data (6236 bytes)
38,883,438 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,913,849 UART: [rt]cmd =0x53574545, len=84
44,438,303 >>> mbox cmd response data (200 bytes)
46,901,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,052,367 UART:
47,052,726 UART: Running Caliptra ROM ...
47,053,778 UART:
47,053,988 UART: [state] CFI Enabled
47,065,565 UART: [state] LifecycleState = Unprovisioned
47,067,513 UART: [state] DebugLocked = No
47,069,144 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,073,734 UART: [kat] SHA2-256
47,243,480 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,254,009 UART: [kat] ++
47,254,472 UART: [kat] sha1
47,265,841 UART: [kat] SHA2-256
47,268,538 UART: [kat] SHA2-384
47,275,115 UART: [kat] SHA2-512-ACC
47,277,453 UART: [kat] ECC-384
49,562,539 UART: [kat] HMAC-384Kdf
49,574,066 UART: [kat] LMS
50,764,147 UART: [kat] --
50,768,540 UART: [update-reset] ++
54,962,051 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,966,205 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,363,959 >>> mbox cmd response: success
55,364,377 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,365,577 UART: [update-reset] Copying MAN_2 To MAN_1
55,388,007 UART: [update-reset Success] --
55,391,535 UART: [state] Locking Datavault
55,395,133 UART: [state] Locking PCR0, PCR1 and PCR31
55,396,826 UART: [state] Locking ICCM
55,397,999 UART: [exit] Launching FMC @ 0x40000130
55,406,435 UART:
55,406,672 UART: Running Caliptra FMC ...
55,407,756 UART:
55,407,908 UART: [state] CFI Enabled
55,451,915 UART: [art] Extend RT PCRs Done
55,453,054 UART: [art] Lock RT PCRs Done
55,454,464 UART: [art] Populate DV Done
55,460,079 UART: [fht] FMC Alias Private Key: 7
55,461,715 UART: [art] Derive CDI
55,462,517 UART: [art] Store in slot 0x4
55,505,006 UART: [art] Derive Key Pair
55,506,076 UART: [art] Store priv key in slot 0x5
58,747,863 UART: [art] Derive Key Pair - Done
58,760,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,040,808 UART: [art] Erasing AUTHORITY.KEYID = 7
61,042,336 UART: [art] PUB.X = CF53FE28BA6217EC7B932AC3F3E194B823DBADE5530D86F035127561BBD7CD72EEB088483E2397FB3CB25F4AE1C8F249
61,049,600 UART: [art] PUB.Y = 6CA8D9B2EFD6F76940DD14945F7108EFBCEEE0F7374995E33CA8DA4875B234C52A84F55466C32CB2642A8A64B4DE6726
61,056,835 UART: [art] SIG.R = 10EEB32D8C1B4E30EB43762F975E989BF6A478D2AF15655E76F18AB2BFEC25B06EC1A354938DDA7E97DECAB45CD369BC
61,064,296 UART: [art] SIG.S = 68E45AF425AC3858EE702812BA248BA67FEDA176682F32F732195D6D3AEBD4BC83C59C007968D10E63A9C0EF6BE7376D
62,369,746 UART: Caliptra RT
62,370,458 UART: [state] CFI Enabled
62,744,316 UART: [rt] RT listening for mailbox commands...
62,775,946 UART: [rt]cmd =0x53574545, len=84
68,301,067 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
4,123,764 ready_for_fw is high
4,124,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,638 >>> mbox cmd response: success
23,794,509 UART:
23,794,980 UART: Running Caliptra FMC ...
23,796,102 UART:
23,796,264 UART: [state] CFI Enabled
23,803,742 UART: [fht] FMC Alias Private Key: 7
26,143,101 UART: [art] Extend RT PCRs Done
26,144,327 UART: [art] Lock RT PCRs Done
26,145,873 UART: [art] Populate DV Done
26,151,557 UART: [fht] FMC Alias Private Key: 7
26,153,144 UART: [art] Derive CDI
26,153,953 UART: [art] Store in slot 0x4
26,196,599 UART: [art] Derive Key Pair
26,197,637 UART: [art] Store priv key in slot 0x5
29,439,222 UART: [art] Derive Key Pair - Done
29,451,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,941 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,450 UART: [art] PUB.X = 99DF70777F7551F5DC0639A7482B70FAABFF908F1C9FC91F60D2094DD89ACF8F72672CC6CFE0FE6DED81B1EC154FFFA8
31,740,782 UART: [art] PUB.Y = C6B667C36EC0B10E659B2563A33EF706F839783DBD923D57F9065A8C2B10854E68AA6AC1074AD83A4A210A5F22D8CA97
31,748,033 UART: [art] SIG.R = 848115BFD3C9CFA5E8AB43923A9E83E4B565C409E2703D8ADDE3EE68912AF61ECDD92DB0AD198A80AB853AF106172044
31,755,427 UART: [art] SIG.S = B70B4D5FBBE4CA084509C0873F39AB3D666E56CF477B370F5656BDD30BC5F80FCC11A192E77A1CF24B207B6C9CF1A12D
33,060,322 UART: Caliptra RT
33,061,038 UART: [state] CFI Enabled
33,195,086 UART: [rt] RT listening for mailbox commands...
33,197,379 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,227,668 UART: [rt]cmd =0x44504543, len=40
33,254,660 >>> mbox cmd response data (40 bytes)
33,255,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,286,155 UART: [rt]cmd =0x44504543, len=96
33,328,560 >>> mbox cmd response data (56 bytes)
33,329,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,359,994 UART: [rt]cmd =0x44504543, len=96
39,033,365 >>> mbox cmd response data (6236 bytes)
39,062,630 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,093,284 UART: [rt]cmd =0x53574545, len=84
44,617,834 >>> mbox cmd response data (200 bytes)
47,075,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
55,821,119 >>> mbox cmd response: success
55,821,886 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,857,054 UART:
55,857,344 UART: Running Caliptra FMC ...
55,858,510 UART:
55,858,657 UART: [state] CFI Enabled
55,902,804 UART: [art] Extend RT PCRs Done
55,903,998 UART: [art] Lock RT PCRs Done
55,905,424 UART: [art] Populate DV Done
55,911,149 UART: [fht] FMC Alias Private Key: 7
55,912,626 UART: [art] Derive CDI
55,913,405 UART: [art] Store in slot 0x4
55,955,834 UART: [art] Derive Key Pair
55,956,872 UART: [art] Store priv key in slot 0x5
59,198,387 UART: [art] Derive Key Pair - Done
59,211,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,491,852 UART: [art] Erasing AUTHORITY.KEYID = 7
61,493,370 UART: [art] PUB.X = 83BAC01C9A41F0CCDD460B2C156CEC1953003B401DA08136C4288353D122570FCB61F5E933E3C52BE9730E411C5D4F9A
61,500,642 UART: [art] PUB.Y = 86D3989A4A39257080B096B7552CFB33DACA190CC6620E3D0BAEEB3CFB0A2766EB89B4E4CE588B422AA8ADBF83E8ADF6
61,507,915 UART: [art] SIG.R = 33AED97388F4241FE325C83B5D008EEA0701304318A7D94FA66AA7A86D3F460E0BDDE7B4ECD738DF0B5F479D29404F6A
61,515,293 UART: [art] SIG.S = A73FAF9C0E2F74F2FF977BEFC68592C777EF5423BC0EE29324F6B942FAEAF2999943B849BFC68AB19FB31BB0DC3AF1EC
62,820,380 UART: Caliptra RT
62,821,088 UART: [state] CFI Enabled
63,194,653 UART: [rt] RT listening for mailbox commands...
63,226,186 UART: [rt]cmd =0x53574545, len=84
68,751,172 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
191,963 UART:
192,339 UART: Running Caliptra ROM ...
193,435 UART:
193,580 UART: [state] CFI Enabled
264,202 UART: [state] LifecycleState = Unprovisioned
266,124 UART: [state] DebugLocked = No
268,015 UART: [state] WD Timer not started. Device not locked for debugging
271,708 UART: [kat] SHA2-256
451,321 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,129 UART: [kat] ++
462,610 UART: [kat] sha1
473,195 UART: [kat] SHA2-256
475,910 UART: [kat] SHA2-384
483,027 UART: [kat] SHA2-512-ACC
485,412 UART: [kat] ECC-384
2,952,715 UART: [kat] HMAC-384Kdf
2,973,545 UART: [kat] LMS
3,450,043 UART: [kat] --
3,454,560 UART: [cold-reset] ++
3,455,861 UART: [fht] FHT @ 0x50003400
3,467,785 UART: [idev] ++
3,468,390 UART: [idev] CDI.KEYID = 6
3,469,301 UART: [idev] SUBJECT.KEYID = 7
3,470,544 UART: [idev] UDS.KEYID = 0
3,471,532 ready_for_fw is high
3,471,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,774 UART: [idev] Erasing UDS.KEYID = 0
5,990,196 UART: [idev] Sha1 KeyId Algorithm
6,012,284 UART: [idev] --
6,017,253 UART: [ldev] ++
6,017,847 UART: [ldev] CDI.KEYID = 6
6,018,756 UART: [ldev] SUBJECT.KEYID = 5
6,020,065 UART: [ldev] AUTHORITY.KEYID = 7
6,021,260 UART: [ldev] FE.KEYID = 1
6,060,426 UART: [ldev] Erasing FE.KEYID = 1
8,569,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,943 UART: [ldev] --
10,376,578 UART: [fwproc] Wait for Commands...
10,378,675 UART: [fwproc] Recv command 0x46574c44
10,380,659 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,696 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,745 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,878 >>> mbox cmd response: success
14,354,856 UART: [afmc] ++
14,355,481 UART: [afmc] CDI.KEYID = 6
14,356,389 UART: [afmc] SUBJECT.KEYID = 7
14,357,604 UART: [afmc] AUTHORITY.KEYID = 5
16,896,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,621,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,623,527 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,639,301 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,655,382 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,670,986 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,695,619 UART: [afmc] --
18,698,721 UART: [cold-reset] --
18,703,391 UART: [state] Locking Datavault
18,710,789 UART: [state] Locking PCR0, PCR1 and PCR31
18,712,503 UART: [state] Locking ICCM
18,713,821 UART: [exit] Launching FMC @ 0x40000130
18,722,264 UART:
18,722,500 UART: Running Caliptra FMC ...
18,723,539 UART:
18,723,682 UART: [state] CFI Enabled
18,779,229 UART: [fht] FMC Alias Private Key: 7
20,545,046 UART: [art] Extend RT PCRs Done
20,546,268 UART: [art] Lock RT PCRs Done
20,548,024 UART: [art] Populate DV Done
20,553,653 UART: [fht] FMC Alias Private Key: 7
20,555,346 UART: [art] Derive CDI
20,556,082 UART: [art] Store in slot 0x4
20,612,090 UART: [art] Derive Key Pair
20,613,138 UART: [art] Store priv key in slot 0x5
23,075,903 UART: [art] Derive Key Pair - Done
23,088,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,801,994 UART: [art] Erasing AUTHORITY.KEYID = 7
24,803,495 UART: [art] PUB.X = F6F7EDBD2A24FD9BDD92D81515924B83AEED8D3C04A4310C58C6C81ED7187F4C853474040F55612C122483356E98C3C5
24,810,743 UART: [art] PUB.Y = 190E8E45E171A5D64DC355602C81059F1B97B41C105C1894B9168DE38A597A590D2481453E8ED900C64AB5B17AC51754
24,817,977 UART: [art] SIG.R = 7DC016F7C926AD8AA34FBDE23D410F3D5FD7FACBC7C45DFE33D1365F73A25D0605B2BA501B05CE54296908C4F886DB29
24,825,433 UART: [art] SIG.S = E4CBB86BB06930871664BE9E5E3D3244BC60551C0A7C539340ED511FA4D5E270174CF0A393A1A59AABD0323822E921D3
25,804,705 UART: Caliptra RT
25,805,402 UART: [state] CFI Enabled
25,986,179 UART: [rt] RT listening for mailbox commands...
25,988,476 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,018,525 UART: [rt]cmd =0x44504543, len=40
26,046,127 >>> mbox cmd response data (40 bytes)
26,047,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,077,597 UART: [rt]cmd =0x44504543, len=96
26,138,052 >>> mbox cmd response data (56 bytes)
26,138,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,169,551 UART: [rt]cmd =0x44504543, len=96
30,533,180 >>> mbox cmd response data (6236 bytes)
30,562,416 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,592,887 UART: [rt]cmd =0x53574545, len=84
34,771,437 >>> mbox cmd response data (200 bytes)
37,222,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,372,724 UART:
37,373,107 UART: Running Caliptra ROM ...
37,374,155 UART:
37,374,304 UART: [state] CFI Enabled
37,447,307 UART: [state] LifecycleState = Unprovisioned
37,449,237 UART: [state] DebugLocked = No
37,451,687 UART: [state] WD Timer not started. Device not locked for debugging
37,455,315 UART: [kat] SHA2-256
37,634,940 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,645,768 UART: [kat] ++
37,646,223 UART: [kat] sha1
37,655,971 UART: [kat] SHA2-256
37,658,656 UART: [kat] SHA2-384
37,665,988 UART: [kat] SHA2-512-ACC
37,668,385 UART: [kat] ECC-384
40,131,754 UART: [kat] HMAC-384Kdf
40,155,130 UART: [kat] LMS
40,631,563 UART: [kat] --
40,636,086 UART: [update-reset] ++
44,143,754 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,147,237 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,544,852 >>> mbox cmd response: success
44,545,271 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,546,254 UART: [update-reset] Copying MAN_2 To MAN_1
44,583,379 UART: [update-reset Success] --
44,586,620 UART: [state] Locking Datavault
44,590,417 UART: [state] Locking PCR0, PCR1 and PCR31
44,592,168 UART: [state] Locking ICCM
44,594,422 UART: [exit] Launching FMC @ 0x40000130
44,602,769 UART:
44,603,003 UART: Running Caliptra FMC ...
44,604,110 UART:
44,604,287 UART: [state] CFI Enabled
44,710,203 UART: [art] Extend RT PCRs Done
44,711,381 UART: [art] Lock RT PCRs Done
44,712,673 UART: [art] Populate DV Done
44,717,915 UART: [fht] FMC Alias Private Key: 7
44,719,610 UART: [art] Derive CDI
44,720,419 UART: [art] Store in slot 0x4
44,779,128 UART: [art] Derive Key Pair
44,780,182 UART: [art] Store priv key in slot 0x5
47,243,102 UART: [art] Derive Key Pair - Done
47,256,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,968,636 UART: [art] Erasing AUTHORITY.KEYID = 7
48,970,138 UART: [art] PUB.X = 9775CACA6474BBF191B7F2AD64333E9EA77850BA762FCFC508D8432D7EBB491A2C14FE6BD614BCA55BA47267A89669B3
48,977,446 UART: [art] PUB.Y = CCC61BD0A3EFC46CDEB3DFE0E7DA82EBD128BC7CFECBD710477D96815A56FD118DCCD73B71ED078D74DB24412F72A61E
48,984,724 UART: [art] SIG.R = 2C5F56BCF4AA89A42FA1720F4766E7871ACCC88CBF1CEE1BBF7422489982EEFF1742DC2FCF97D0C1370FEB1187B48001
48,992,130 UART: [art] SIG.S = 193E55941181937C48D241CECC7D3D06E9DE5A30C91F5C92BF8679FAACB6D782DD0522955814B877549595CE683F372F
49,971,242 UART: Caliptra RT
49,971,955 UART: [state] CFI Enabled
50,390,026 UART: [rt] RT listening for mailbox commands...
50,421,553 UART: [rt]cmd =0x53574545, len=84
54,585,070 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,461,116 ready_for_fw is high
3,461,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,212,947 >>> mbox cmd response: success
18,490,534 UART:
18,490,950 UART: Running Caliptra FMC ...
18,492,059 UART:
18,492,218 UART: [state] CFI Enabled
18,561,206 UART: [fht] FMC Alias Private Key: 7
20,327,795 UART: [art] Extend RT PCRs Done
20,329,020 UART: [art] Lock RT PCRs Done
20,330,460 UART: [art] Populate DV Done
20,335,938 UART: [fht] FMC Alias Private Key: 7
20,337,536 UART: [art] Derive CDI
20,338,272 UART: [art] Store in slot 0x4
20,394,015 UART: [art] Derive Key Pair
20,395,057 UART: [art] Store priv key in slot 0x5
22,857,878 UART: [art] Derive Key Pair - Done
22,870,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,583,923 UART: [art] Erasing AUTHORITY.KEYID = 7
24,585,426 UART: [art] PUB.X = C54AE9E493B946BDDE48C081BAAAE990DB205CA7614CBD95A0A95A4AD6702E76D0DA14B208657F9F4897BE2EE802C768
24,592,721 UART: [art] PUB.Y = A15AD3B4F723F676881C1B0AA5A386B1B087B18C5480CC565F854749D33F1108EC66866161A858B52317D0B3BFA2C80B
24,599,933 UART: [art] SIG.R = 658DB8D6009C12B29A6D32E73446370FBD51DEACD8B21B97800DD199336F44F9FA9FC25E8AE57C748DAF677299EFF518
24,607,334 UART: [art] SIG.S = AC5D50C8D118A410BD6E4F41B6B81DA4EA0780F9E3983AFC257E90277D1A88CA23F7AC5AB3B9F838C08AA2C745C42608
25,586,737 UART: Caliptra RT
25,587,454 UART: [state] CFI Enabled
25,767,959 UART: [rt] RT listening for mailbox commands...
25,770,279 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,800,346 UART: [rt]cmd =0x44504543, len=40
25,848,829 >>> mbox cmd response data (40 bytes)
25,849,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,880,373 UART: [rt]cmd =0x44504543, len=96
25,940,682 >>> mbox cmd response data (56 bytes)
25,941,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,971,977 UART: [rt]cmd =0x44504543, len=96
30,335,964 >>> mbox cmd response data (6236 bytes)
30,365,448 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,396,081 UART: [rt]cmd =0x53574545, len=84
34,574,694 >>> mbox cmd response data (200 bytes)
37,019,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,331,782 >>> mbox cmd response: success
44,332,401 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,365,803 UART:
44,366,144 UART: Running Caliptra FMC ...
44,367,383 UART:
44,367,548 UART: [state] CFI Enabled
44,473,797 UART: [art] Extend RT PCRs Done
44,474,992 UART: [art] Lock RT PCRs Done
44,476,396 UART: [art] Populate DV Done
44,481,962 UART: [fht] FMC Alias Private Key: 7
44,483,548 UART: [art] Derive CDI
44,484,356 UART: [art] Store in slot 0x4
44,542,752 UART: [art] Derive Key Pair
44,543,782 UART: [art] Store priv key in slot 0x5
47,006,522 UART: [art] Derive Key Pair - Done
47,019,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,732,175 UART: [art] Erasing AUTHORITY.KEYID = 7
48,733,680 UART: [art] PUB.X = 7EFBF528132C480D673D2343FA3D613DA43FEB0322CB0431B19325F89F3C18E92E312B8699F7885A4AD53885AF623267
48,740,931 UART: [art] PUB.Y = 33172CF7DE821297BE34F4614652DFFEB692EF9AED1F4D0C8963A891168D557114020C8A338331CBA2FA5B8753795868
48,748,165 UART: [art] SIG.R = 4D0CDE7D5F7AFF67EFF8DAB9C500DAA40DF987B247EF05FD767557C096962D5B45DF5155108873887FBA015DE825314E
48,755,582 UART: [art] SIG.S = CAF3C74F3B8D12BD729680786967F9AB81A3F4112BF00905E3BBCC1FEEB5C634611523DBF66C5068A47AEC8A7DDA45D9
49,734,886 UART: Caliptra RT
49,735,585 UART: [state] CFI Enabled
50,152,218 UART: [rt] RT listening for mailbox commands...
50,183,756 UART: [rt]cmd =0x53574545, len=84
54,348,388 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,563 UART:
192,961 UART: Running Caliptra ROM ...
194,153 UART:
603,586 UART: [state] CFI Enabled
615,318 UART: [state] LifecycleState = Unprovisioned
617,262 UART: [state] DebugLocked = No
620,208 UART: [state] WD Timer not started. Device not locked for debugging
623,970 UART: [kat] SHA2-256
803,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,440 UART: [kat] ++
814,922 UART: [kat] sha1
826,010 UART: [kat] SHA2-256
828,672 UART: [kat] SHA2-384
832,956 UART: [kat] SHA2-512-ACC
835,331 UART: [kat] ECC-384
3,278,012 UART: [kat] HMAC-384Kdf
3,290,401 UART: [kat] LMS
3,766,888 UART: [kat] --
3,771,024 UART: [cold-reset] ++
3,772,613 UART: [fht] FHT @ 0x50003400
3,784,941 UART: [idev] ++
3,785,576 UART: [idev] CDI.KEYID = 6
3,786,499 UART: [idev] SUBJECT.KEYID = 7
3,787,746 UART: [idev] UDS.KEYID = 0
3,788,669 ready_for_fw is high
3,788,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,792 UART: [idev] Erasing UDS.KEYID = 0
6,264,784 UART: [idev] Sha1 KeyId Algorithm
6,289,468 UART: [idev] --
6,294,196 UART: [ldev] ++
6,294,780 UART: [ldev] CDI.KEYID = 6
6,295,696 UART: [ldev] SUBJECT.KEYID = 5
6,296,913 UART: [ldev] AUTHORITY.KEYID = 7
6,298,165 UART: [ldev] FE.KEYID = 1
6,310,595 UART: [ldev] Erasing FE.KEYID = 1
8,790,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,533 UART: [ldev] --
10,583,417 UART: [fwproc] Wait for Commands...
10,585,836 UART: [fwproc] Recv command 0x46574c44
10,587,821 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,013 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,070 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,557,379 >>> mbox cmd response: success
14,560,975 UART: [afmc] ++
14,561,604 UART: [afmc] CDI.KEYID = 6
14,562,499 UART: [afmc] SUBJECT.KEYID = 7
14,563,719 UART: [afmc] AUTHORITY.KEYID = 5
17,069,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,794,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,796,497 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,812,319 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,828,393 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,844,435 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,868,445 UART: [afmc] --
18,873,073 UART: [cold-reset] --
18,876,022 UART: [state] Locking Datavault
18,880,736 UART: [state] Locking PCR0, PCR1 and PCR31
18,882,438 UART: [state] Locking ICCM
18,884,591 UART: [exit] Launching FMC @ 0x40000130
18,892,990 UART:
18,893,257 UART: Running Caliptra FMC ...
18,894,366 UART:
18,894,534 UART: [state] CFI Enabled
18,902,692 UART: [fht] FMC Alias Private Key: 7
20,668,692 UART: [art] Extend RT PCRs Done
20,669,903 UART: [art] Lock RT PCRs Done
20,671,446 UART: [art] Populate DV Done
20,676,754 UART: [fht] FMC Alias Private Key: 7
20,678,347 UART: [art] Derive CDI
20,679,088 UART: [art] Store in slot 0x4
20,721,909 UART: [art] Derive Key Pair
20,722,949 UART: [art] Store priv key in slot 0x5
23,150,001 UART: [art] Derive Key Pair - Done
23,162,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,719 UART: [art] Erasing AUTHORITY.KEYID = 7
24,871,215 UART: [art] PUB.X = BB2B92CF5047C950AE090C45CE7096C7C1D71FDB179A0724C279E538DD030B742BF2A6379EA1BE51DDD6CE4848004A04
24,878,529 UART: [art] PUB.Y = 963FB359ED4FA85E8E817686DBD023C7EF9FD75AF875806CA8E47AB4FB93F5C914EB399CE25270385BA63A44C24171D3
24,885,762 UART: [art] SIG.R = B2EF064DBF6D129DF556854435971331ED4A0BB09156B115145E796368B61F236DF93CB5469205DEE6796D5163D0ECF1
24,893,162 UART: [art] SIG.S = 43C7BD2665587C7078D7C4A6777019026639CD78A51D045352F4B82D4A5835BDA32D0C957D19813C700A4CBA275B6753
25,871,937 UART: Caliptra RT
25,872,654 UART: [state] CFI Enabled
26,006,164 UART: [rt] RT listening for mailbox commands...
26,008,295 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,038,575 UART: [rt]cmd =0x44504543, len=40
26,066,028 >>> mbox cmd response data (40 bytes)
26,066,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,097,271 UART: [rt]cmd =0x44504543, len=96
26,140,234 >>> mbox cmd response data (56 bytes)
26,141,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,171,390 UART: [rt]cmd =0x44504543, len=96
30,455,622 >>> mbox cmd response data (6236 bytes)
30,484,842 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,515,204 UART: [rt]cmd =0x53574545, len=84
34,651,107 >>> mbox cmd response data (200 bytes)
37,097,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,248,271 UART:
37,248,659 UART: Running Caliptra ROM ...
37,249,792 UART:
37,249,990 UART: [state] CFI Enabled
37,264,528 UART: [state] LifecycleState = Unprovisioned
37,266,485 UART: [state] DebugLocked = No
37,269,133 UART: [state] WD Timer not started. Device not locked for debugging
37,272,931 UART: [kat] SHA2-256
37,452,605 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,463,410 UART: [kat] ++
37,464,086 UART: [kat] sha1
37,475,800 UART: [kat] SHA2-256
37,478,499 UART: [kat] SHA2-384
37,483,952 UART: [kat] SHA2-512-ACC
37,486,291 UART: [kat] ECC-384
39,929,705 UART: [kat] HMAC-384Kdf
39,940,546 UART: [kat] LMS
40,417,033 UART: [kat] --
40,421,571 UART: [update-reset] ++
43,913,766 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,916,934 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,314,552 >>> mbox cmd response: success
44,314,988 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,316,096 UART: [update-reset] Copying MAN_2 To MAN_1
44,353,222 UART: [update-reset Success] --
44,359,297 UART: [state] Locking Datavault
44,362,335 UART: [state] Locking PCR0, PCR1 and PCR31
44,364,240 UART: [state] Locking ICCM
44,366,890 UART: [exit] Launching FMC @ 0x40000130
44,375,296 UART:
44,375,542 UART: Running Caliptra FMC ...
44,376,646 UART:
44,376,807 UART: [state] CFI Enabled
44,420,980 UART: [art] Extend RT PCRs Done
44,422,125 UART: [art] Lock RT PCRs Done
44,423,753 UART: [art] Populate DV Done
44,429,273 UART: [fht] FMC Alias Private Key: 7
44,430,971 UART: [art] Derive CDI
44,431,789 UART: [art] Store in slot 0x4
44,474,463 UART: [art] Derive Key Pair
44,475,501 UART: [art] Store priv key in slot 0x5
46,902,696 UART: [art] Derive Key Pair - Done
46,915,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,621,354 UART: [art] Erasing AUTHORITY.KEYID = 7
48,622,864 UART: [art] PUB.X = 1A54097A95810960EE4F74A9F055CBE4F99185193ECED69B79293CCC148509F23D1535C2C96FA05E3818D8A03AD281DE
48,630,117 UART: [art] PUB.Y = 96D652CE89F431DEA5380069DD80D8F39EB1A196C369C844EA265F287A97AF1E6955E5EBDA3913B9A4FF4D2A006363C4
48,637,342 UART: [art] SIG.R = 53D1522876D33B89D0E56105F93BD60DE40C0268FB3997915D317096A0C1535136B0C6E10DBD253BE5592B6A052D7F8E
48,644,727 UART: [art] SIG.S = 0016D414A311AB15B902B79F4817D754199F9DB869065D551095CFEF04482A791B7B4016CAD11C0F87B31E932D58E32E
49,623,840 UART: Caliptra RT
49,624,533 UART: [state] CFI Enabled
50,000,890 UART: [rt] RT listening for mailbox commands...
50,032,611 UART: [rt]cmd =0x53574545, len=84
54,168,459 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,561 writing to cptra_bootfsm_go
3,780,593 ready_for_fw is high
3,781,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,760 >>> mbox cmd response: success
18,688,998 UART:
18,689,391 UART: Running Caliptra FMC ...
18,690,581 UART:
18,690,757 UART: [state] CFI Enabled
18,698,540 UART: [fht] FMC Alias Private Key: 7
20,464,443 UART: [art] Extend RT PCRs Done
20,465,675 UART: [art] Lock RT PCRs Done
20,467,221 UART: [art] Populate DV Done
20,472,875 UART: [fht] FMC Alias Private Key: 7
20,474,472 UART: [art] Derive CDI
20,475,212 UART: [art] Store in slot 0x4
20,518,077 UART: [art] Derive Key Pair
20,519,080 UART: [art] Store priv key in slot 0x5
22,945,323 UART: [art] Derive Key Pair - Done
22,958,535 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,664,790 UART: [art] Erasing AUTHORITY.KEYID = 7
24,666,295 UART: [art] PUB.X = AE9D470C13A0B1E8DA374FEF73E7B7DA5C903DDE2BBC6A6746CABBC4D3DFC764A4EA6C3EDF3F598401DE8F3C94AA62FF
24,673,619 UART: [art] PUB.Y = AEF8385A850D9E480F89AB7BDEC04F705DE6142F0284CEA3892A481B5C29648CCF7333DCD52B5CAE8B646951D1DF5EFC
24,680,851 UART: [art] SIG.R = 4FFA28CA1F1133BACA62E6B0450CFAED9A9937A8B3EC47B354A61541ABBE682C48717F903B267686E33DA8D4736EB9F1
24,688,260 UART: [art] SIG.S = 3EEAF68AE06792A0ECEB887EB4C3446C7359A23B968B733A54E5E0660F2578AF3A85D7B5BB117B7AD762485A38C26D3E
25,667,304 UART: Caliptra RT
25,668,014 UART: [state] CFI Enabled
25,800,500 UART: [rt] RT listening for mailbox commands...
25,802,810 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,832,882 UART: [rt]cmd =0x44504543, len=40
25,860,162 >>> mbox cmd response data (40 bytes)
25,861,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,891,828 UART: [rt]cmd =0x44504543, len=96
25,935,495 >>> mbox cmd response data (56 bytes)
25,936,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,966,913 UART: [rt]cmd =0x44504543, len=96
30,251,719 >>> mbox cmd response data (6236 bytes)
30,281,143 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,311,712 UART: [rt]cmd =0x53574545, len=84
34,447,088 >>> mbox cmd response data (200 bytes)
36,893,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,127,349 >>> mbox cmd response: success
44,128,058 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,161,201 UART:
44,161,500 UART: Running Caliptra FMC ...
44,162,722 UART:
44,162,890 UART: [state] CFI Enabled
44,206,548 UART: [art] Extend RT PCRs Done
44,207,740 UART: [art] Lock RT PCRs Done
44,209,227 UART: [art] Populate DV Done
44,214,797 UART: [fht] FMC Alias Private Key: 7
44,216,366 UART: [art] Derive CDI
44,217,136 UART: [art] Store in slot 0x4
44,259,725 UART: [art] Derive Key Pair
44,260,729 UART: [art] Store priv key in slot 0x5
46,688,116 UART: [art] Derive Key Pair - Done
46,701,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,407,914 UART: [art] Erasing AUTHORITY.KEYID = 7
48,409,411 UART: [art] PUB.X = BB098C873157ADE426604E900121ABDB0FF43E18344E1B2BC7CDF6D7EA7B57090DAACFAC74923546989D5B33CFD28EA0
48,416,668 UART: [art] PUB.Y = E97810949E59A82390BF07D7C7D37CB5D7162E13CFE1E53A716185BFE6931A0DDA5BA0FEF112E07A9347648723FAD4CE
48,423,963 UART: [art] SIG.R = 873BC5935B39743D96082159407AFBF3179DB3EA6C37C8BFBDB392D04881490DD79D1FD383C55FE7A0F52D5CBA485A0C
48,431,371 UART: [art] SIG.S = 224A03E33DDC2780EAFF7051C4F118A893BD1C5B4D3DC8683DFE647CF9C9C91F59BE5D97073CE54BE9B709306AC840E0
49,410,631 UART: Caliptra RT
49,411,341 UART: [state] CFI Enabled
49,790,960 UART: [rt] RT listening for mailbox commands...
49,822,967 UART: [rt]cmd =0x53574545, len=84
53,958,305 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,163 UART:
192,515 UART: Running Caliptra ROM ...
193,701 UART:
193,854 UART: [state] CFI Enabled
263,036 UART: [state] LifecycleState = Unprovisioned
265,446 UART: [state] DebugLocked = No
267,197 UART: [state] WD Timer not started. Device not locked for debugging
271,088 UART: [kat] SHA2-256
461,024 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,766 UART: [kat] ++
472,217 UART: [kat] sha1
484,226 UART: [kat] SHA2-256
487,227 UART: [kat] SHA2-384
494,571 UART: [kat] SHA2-512-ACC
497,147 UART: [kat] ECC-384
2,947,823 UART: [kat] HMAC-384Kdf
2,972,071 UART: [kat] LMS
3,503,863 UART: [kat] --
3,507,997 UART: [cold-reset] ++
3,509,083 UART: [fht] FHT @ 0x50003400
3,520,749 UART: [idev] ++
3,521,395 UART: [idev] CDI.KEYID = 6
3,522,429 UART: [idev] SUBJECT.KEYID = 7
3,523,600 UART: [idev] UDS.KEYID = 0
3,524,527 ready_for_fw is high
3,524,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,770 UART: [idev] Erasing UDS.KEYID = 0
6,026,832 UART: [idev] Sha1 KeyId Algorithm
6,050,009 UART: [idev] --
6,055,306 UART: [ldev] ++
6,055,994 UART: [ldev] CDI.KEYID = 6
6,056,898 UART: [ldev] SUBJECT.KEYID = 5
6,058,109 UART: [ldev] AUTHORITY.KEYID = 7
6,059,285 UART: [ldev] FE.KEYID = 1
6,100,563 UART: [ldev] Erasing FE.KEYID = 1
8,607,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,915 UART: [ldev] --
10,414,063 UART: [fwproc] Wait for Commands...
10,417,028 UART: [fwproc] Recv command 0x46574c44
10,419,362 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,044 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,652 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,522 >>> mbox cmd response: success
14,676,070 UART: [afmc] ++
14,676,810 UART: [afmc] CDI.KEYID = 6
14,678,002 UART: [afmc] SUBJECT.KEYID = 7
14,679,445 UART: [afmc] AUTHORITY.KEYID = 5
17,216,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,532 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,437 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,536 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,687 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,590 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,837 UART: [afmc] --
19,035,556 UART: [cold-reset] --
19,039,267 UART: [state] Locking Datavault
19,044,415 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,561 UART: [state] Locking ICCM
19,049,386 UART: [exit] Launching FMC @ 0x40000130
19,058,062 UART:
19,058,297 UART: Running Caliptra FMC ...
19,059,328 UART:
19,059,474 UART: [state] CFI Enabled
19,119,345 UART: [fht] FMC Alias Private Key: 7
20,885,880 UART: [art] Extend RT PCRs Done
20,887,096 UART: [art] Lock RT PCRs Done
20,889,289 UART: [art] Populate DV Done
20,894,532 UART: [fht] FMC Alias Private Key: 7
20,896,127 UART: [art] Derive CDI
20,896,941 UART: [art] Store in slot 0x4
20,951,927 UART: [art] Derive Key Pair
20,952,967 UART: [art] Store priv key in slot 0x5
23,416,379 UART: [art] Derive Key Pair - Done
23,429,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,309 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,818 UART: [art] PUB.X = AE99DA661E0DE002FB37C3D7E3F661C321F49DE5911E3F2EAD0E28DEB20F09078943E44C7107A865BFDE90FFF1617711
25,150,050 UART: [art] PUB.Y = C187240BC2D15ADDDA3CE582D25A61A70D3AB6E4013A1355688CB27B1ACFD087878F1017F8A1117CE477C5EB8D5E3D19
25,157,317 UART: [art] SIG.R = A3C6469DB598F0E22A32FEA6A9A8C418FEDF05F2F02484EAF64603EA49EB9497752947821B0381503F1D137208FD3790
25,164,689 UART: [art] SIG.S = 86A1E809A824821C463FD85B1183087E8E1F788CE3CD5FDBC950E32776AC01FBD2487C71FCA22BFF2BAD4B72368227CB
26,143,749 UART: Caliptra RT
26,144,440 UART: [state] CFI Enabled
26,326,167 UART: [rt] RT listening for mailbox commands...
26,328,543 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,358,773 UART: [rt]cmd =0x44504543, len=40
26,406,315 >>> mbox cmd response data (40 bytes)
26,407,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,438,060 UART: [rt]cmd =0x44504543, len=96
26,498,022 >>> mbox cmd response data (56 bytes)
26,498,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,529,325 UART: [rt]cmd =0x44504543, len=96
30,893,050 >>> mbox cmd response data (6236 bytes)
30,922,304 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,952,774 UART: [rt]cmd =0x53574545, len=84
35,130,481 >>> mbox cmd response data (200 bytes)
37,580,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,731,362 UART:
37,731,739 UART: Running Caliptra ROM ...
37,732,880 UART:
37,733,053 UART: [state] CFI Enabled
37,810,256 UART: [state] LifecycleState = Unprovisioned
37,812,357 UART: [state] DebugLocked = No
37,815,144 UART: [state] WD Timer not started. Device not locked for debugging
37,820,138 UART: [kat] SHA2-256
38,009,975 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
38,020,724 UART: [kat] ++
38,021,228 UART: [kat] sha1
38,033,578 UART: [kat] SHA2-256
38,036,595 UART: [kat] SHA2-384
38,043,879 UART: [kat] SHA2-512-ACC
38,046,502 UART: [kat] ECC-384
40,493,390 UART: [kat] HMAC-384Kdf
40,514,336 UART: [kat] LMS
41,045,900 UART: [kat] --
41,049,463 UART: [update-reset] ++
44,564,322 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,567,024 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
45,196,773 >>> mbox cmd response: success
45,197,226 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,197,614 UART: [update-reset] Copying MAN_2 To MAN_1
45,234,576 UART: [update-reset Success] --
45,238,911 UART: [state] Locking Datavault
45,242,109 UART: [state] Locking PCR0, PCR1 and PCR31
45,244,241 UART: [state] Locking ICCM
45,246,385 UART: [exit] Launching FMC @ 0x40000130
45,255,051 UART:
45,255,285 UART: Running Caliptra FMC ...
45,256,384 UART:
45,256,556 UART: [state] CFI Enabled
45,346,796 UART: [art] Extend RT PCRs Done
45,347,982 UART: [art] Lock RT PCRs Done
45,349,664 UART: [art] Populate DV Done
45,354,847 UART: [fht] FMC Alias Private Key: 7
45,356,365 UART: [art] Derive CDI
45,357,182 UART: [art] Store in slot 0x4
45,416,129 UART: [art] Derive Key Pair
45,417,132 UART: [art] Store priv key in slot 0x5
47,881,129 UART: [art] Derive Key Pair - Done
47,894,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,606,428 UART: [art] Erasing AUTHORITY.KEYID = 7
49,607,907 UART: [art] PUB.X = E0E8E4E08C37F035A58D4B90A27221F639F4FC14ACBCEFF08CCDE988B0483DC3A9AC8EF5ADFA4BF5F6136B98E78659AE
49,615,228 UART: [art] PUB.Y = 0D77660CFFDE1CC173BEDA7727148C40352E9BDD0090722A571B9CFC762BF65C2C79DF0AC0C5BE9803CB4BDBEEB94ADE
49,622,482 UART: [art] SIG.R = 9CC83154D7E58E2786C1A83F537ADE0E6910FD59E30DE9A09908951686F767908A39E2574D3017FBDEAF97AB9D25C799
49,629,893 UART: [art] SIG.S = 81BB1B685C8DFAC20C27298DE9066696C915631120EF70D0FC3E9CE199D7E9BB4CC4C6129B6E744033936D8F67909368
50,608,700 UART: Caliptra RT
50,609,418 UART: [state] CFI Enabled
51,027,344 UART: [rt] RT listening for mailbox commands...
51,058,954 UART: [rt]cmd =0x53574545, len=84
55,222,686 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,439,474 ready_for_fw is high
3,439,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,800 >>> mbox cmd response: success
19,109,872 UART:
19,110,275 UART: Running Caliptra FMC ...
19,111,409 UART:
19,111,568 UART: [state] CFI Enabled
19,176,824 UART: [fht] FMC Alias Private Key: 7
20,963,736 UART: [art] Extend RT PCRs Done
20,964,955 UART: [art] Lock RT PCRs Done
20,966,637 UART: [art] Populate DV Done
20,972,055 UART: [fht] FMC Alias Private Key: 7
20,973,653 UART: [art] Derive CDI
20,974,469 UART: [art] Store in slot 0x4
21,030,160 UART: [art] Derive Key Pair
21,031,207 UART: [art] Store priv key in slot 0x5
23,494,580 UART: [art] Derive Key Pair - Done
23,507,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,108 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,620 UART: [art] PUB.X = 3B5AFA203059112B25F1ED1EBCD27A43FC33964B4C72D435798F4552C5312A682288BB5472BA43655EC3032CCF829587
25,228,857 UART: [art] PUB.Y = 89AA24D492E5F63626DAE21DEEB187633E3154424543E938DAF459C2741C5E8C517BA8F7CEE41D40F0E7CDC58B837A40
25,236,092 UART: [art] SIG.R = E14397217E6F08BDB47F12C16223D349B3CC21201E9D9479CFF02DE70F98D9633D6069A1D8E4227D6261F1BCB6AD828B
25,243,524 UART: [art] SIG.S = 1A2AE061FFCFA7314B74A7E96CB23B7EE99E7238B8B7E37217E01047E5E494BA8C8261211A6A384AEDCA8F4208C1F15A
26,222,857 UART: Caliptra RT
26,223,546 UART: [state] CFI Enabled
26,404,313 UART: [rt] RT listening for mailbox commands...
26,406,654 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,437,031 UART: [rt]cmd =0x44504543, len=40
26,484,206 >>> mbox cmd response data (40 bytes)
26,485,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,515,919 UART: [rt]cmd =0x44504543, len=96
26,575,623 >>> mbox cmd response data (56 bytes)
26,576,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,606,900 UART: [rt]cmd =0x44504543, len=96
30,970,339 >>> mbox cmd response data (6236 bytes)
30,999,589 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
31,030,123 UART: [rt]cmd =0x53574545, len=84
35,208,740 >>> mbox cmd response data (200 bytes)
37,657,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
45,553,708 >>> mbox cmd response: success
45,554,306 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,587,150 UART:
45,587,487 UART: Running Caliptra FMC ...
45,588,711 UART:
45,588,878 UART: [state] CFI Enabled
45,681,621 UART: [art] Extend RT PCRs Done
45,682,814 UART: [art] Lock RT PCRs Done
45,684,437 UART: [art] Populate DV Done
45,689,739 UART: [fht] FMC Alias Private Key: 7
45,691,327 UART: [art] Derive CDI
45,692,136 UART: [art] Store in slot 0x4
45,750,546 UART: [art] Derive Key Pair
45,751,609 UART: [art] Store priv key in slot 0x5
48,214,419 UART: [art] Derive Key Pair - Done
48,227,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,940,347 UART: [art] Erasing AUTHORITY.KEYID = 7
49,941,852 UART: [art] PUB.X = C63866DCDAE06ECFC7E438687780FF5F4B2B1DF5DD257CD21923366943A0B4576E976B922165B8D5DBA6B5732B316AC5
49,949,140 UART: [art] PUB.Y = 6DACAD7488C5302A9EE49003767413D6933181C08B2C023EE84C119E2705D21BEC437145517C8AFBC0B01F52FECF4449
49,956,380 UART: [art] SIG.R = 4ACA0B0D130586A3B43DD18836C94C43D87999FEF363A56856F7101F40D019F082AAAC06EBFC87607659A80F945005A9
49,963,783 UART: [art] SIG.S = 965BDF8568DC24598EAB935C3C8525CEEA18B4765158B810B6D0F209D2A9A6CC046987CBBD3CA7E006C8FBAF42611E36
50,942,791 UART: Caliptra RT
50,943,482 UART: [state] CFI Enabled
51,357,189 UART: [rt] RT listening for mailbox commands...
51,388,926 UART: [rt]cmd =0x53574545, len=84
55,558,109 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,493 UART:
192,861 UART: Running Caliptra ROM ...
194,054 UART:
603,532 UART: [state] CFI Enabled
615,664 UART: [state] LifecycleState = Unprovisioned
618,051 UART: [state] DebugLocked = No
619,721 UART: [state] WD Timer not started. Device not locked for debugging
625,114 UART: [kat] SHA2-256
815,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,814 UART: [kat] ++
826,342 UART: [kat] sha1
836,722 UART: [kat] SHA2-256
839,731 UART: [kat] SHA2-384
844,518 UART: [kat] SHA2-512-ACC
847,105 UART: [kat] ECC-384
3,291,811 UART: [kat] HMAC-384Kdf
3,306,273 UART: [kat] LMS
3,838,069 UART: [kat] --
3,842,427 UART: [cold-reset] ++
3,845,022 UART: [fht] FHT @ 0x50003400
3,857,024 UART: [idev] ++
3,857,708 UART: [idev] CDI.KEYID = 6
3,858,702 UART: [idev] SUBJECT.KEYID = 7
3,859,882 UART: [idev] UDS.KEYID = 0
3,860,815 ready_for_fw is high
3,861,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,121 UART: [idev] Erasing UDS.KEYID = 0
6,334,267 UART: [idev] Sha1 KeyId Algorithm
6,356,684 UART: [idev] --
6,362,582 UART: [ldev] ++
6,363,265 UART: [ldev] CDI.KEYID = 6
6,364,237 UART: [ldev] SUBJECT.KEYID = 5
6,365,403 UART: [ldev] AUTHORITY.KEYID = 7
6,366,588 UART: [ldev] FE.KEYID = 1
6,376,537 UART: [ldev] Erasing FE.KEYID = 1
8,856,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,582 UART: [ldev] --
10,650,311 UART: [fwproc] Wait for Commands...
10,653,272 UART: [fwproc] Recv command 0x46574c44
10,655,582 UART: [fwproc] Recv'd Img size: 118548 bytes
14,155,839 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,005 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,628 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,921 >>> mbox cmd response: success
14,919,440 UART: [afmc] ++
14,920,155 UART: [afmc] CDI.KEYID = 6
14,921,355 UART: [afmc] SUBJECT.KEYID = 7
14,922,824 UART: [afmc] AUTHORITY.KEYID = 5
17,428,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,727 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,832 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,975 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,899 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,223,013 UART: [afmc] --
19,226,890 UART: [cold-reset] --
19,229,696 UART: [state] Locking Datavault
19,236,213 UART: [state] Locking PCR0, PCR1 and PCR31
19,238,375 UART: [state] Locking ICCM
19,240,034 UART: [exit] Launching FMC @ 0x40000130
19,248,676 UART:
19,248,911 UART: Running Caliptra FMC ...
19,249,941 UART:
19,250,110 UART: [state] CFI Enabled
19,258,217 UART: [fht] FMC Alias Private Key: 7
21,024,890 UART: [art] Extend RT PCRs Done
21,026,121 UART: [art] Lock RT PCRs Done
21,027,653 UART: [art] Populate DV Done
21,033,129 UART: [fht] FMC Alias Private Key: 7
21,034,732 UART: [art] Derive CDI
21,035,556 UART: [art] Store in slot 0x4
21,078,157 UART: [art] Derive Key Pair
21,079,207 UART: [art] Store priv key in slot 0x5
23,506,257 UART: [art] Derive Key Pair - Done
23,519,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,459 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,949 UART: [art] PUB.X = 6D04F25AB94FC63A1F5359F9ECABF04C57F88207D5F8CD0A8C32DDAFCFDEB3C9CC0557C37F387EC109DBDBF9B2338A30
25,234,273 UART: [art] PUB.Y = E0C8C66AACFF8F6D935345AE1EC079CBC2C26DCAE2C607E9A0B05901E8C8D034BC4246812ECE14838216F4B9EC97A836
25,241,540 UART: [art] SIG.R = A4075954346748DAACEA470B433042672AB6935A4F07B317AAE869A24A1DA7C0607B86A9B993F6FB77DEEF28AB43C724
25,248,930 UART: [art] SIG.S = 5BF09CFF263B7E1519ED4DDDEFCBB95CABDC2B8B4F5551B61A11B2AC9BC6BDE1841F5297F5067D08C77556964B88E117
26,228,202 UART: Caliptra RT
26,228,909 UART: [state] CFI Enabled
26,361,191 UART: [rt] RT listening for mailbox commands...
26,363,615 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,393,838 UART: [rt]cmd =0x44504543, len=40
26,421,578 >>> mbox cmd response data (40 bytes)
26,422,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,453,041 UART: [rt]cmd =0x44504543, len=96
26,495,939 >>> mbox cmd response data (56 bytes)
26,497,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,527,474 UART: [rt]cmd =0x44504543, len=96
30,812,737 >>> mbox cmd response data (6236 bytes)
30,842,140 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,872,813 UART: [rt]cmd =0x53574545, len=84
35,009,003 >>> mbox cmd response data (200 bytes)
37,461,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,612,254 UART:
37,612,606 UART: Running Caliptra ROM ...
37,613,688 UART:
37,613,850 UART: [state] CFI Enabled
37,626,646 UART: [state] LifecycleState = Unprovisioned
37,628,578 UART: [state] DebugLocked = No
37,630,454 UART: [state] WD Timer not started. Device not locked for debugging
37,635,635 UART: [kat] SHA2-256
37,825,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,836,275 UART: [kat] ++
37,836,874 UART: [kat] sha1
37,848,038 UART: [kat] SHA2-256
37,851,014 UART: [kat] SHA2-384
37,857,007 UART: [kat] SHA2-512-ACC
37,859,564 UART: [kat] ECC-384
40,302,376 UART: [kat] HMAC-384Kdf
40,315,980 UART: [kat] LMS
40,847,609 UART: [kat] --
40,851,818 UART: [update-reset] ++
44,366,567 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,369,969 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,999,729 >>> mbox cmd response: success
45,000,175 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,001,394 UART: [update-reset] Copying MAN_2 To MAN_1
45,038,981 UART: [update-reset Success] --
45,044,144 UART: [state] Locking Datavault
45,048,599 UART: [state] Locking PCR0, PCR1 and PCR31
45,050,753 UART: [state] Locking ICCM
45,052,319 UART: [exit] Launching FMC @ 0x40000130
45,060,952 UART:
45,061,235 UART: Running Caliptra FMC ...
45,062,354 UART:
45,062,519 UART: [state] CFI Enabled
45,106,866 UART: [art] Extend RT PCRs Done
45,108,015 UART: [art] Lock RT PCRs Done
45,109,583 UART: [art] Populate DV Done
45,115,010 UART: [fht] FMC Alias Private Key: 7
45,116,662 UART: [art] Derive CDI
45,117,475 UART: [art] Store in slot 0x4
45,160,059 UART: [art] Derive Key Pair
45,161,107 UART: [art] Store priv key in slot 0x5
47,587,756 UART: [art] Derive Key Pair - Done
47,600,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,307,344 UART: [art] Erasing AUTHORITY.KEYID = 7
49,308,852 UART: [art] PUB.X = 26E3A06878CAD64F7E60B930369A4DB33FD2E4F0465FB489311938EE58B08CD4E87755A16DD19B58CE4AD459CD3328BD
49,316,076 UART: [art] PUB.Y = 15392495C12F785662E622AEAADDD4B7B7031EFAA3793BC33432DD734F67729A428B093EA952301C59288054AB6D1055
49,323,336 UART: [art] SIG.R = 05B7079DB172A66B224297F73B82733FC78AD51BAD23F06D611F19A2F6D32E0082E0F05493E66935A60384B803210590
49,330,695 UART: [art] SIG.S = 7FE7A81C1D4CC568CC2D227C4233E33AF035973D21C187BF8ED78E1D76E51BF9B2CA6C9E0665F80FF06A24A9830C1F27
50,309,753 UART: Caliptra RT
50,310,458 UART: [state] CFI Enabled
50,686,080 UART: [rt] RT listening for mailbox commands...
50,717,848 UART: [rt]cmd =0x53574545, len=84
54,853,814 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,755,557 ready_for_fw is high
3,755,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,055,903 >>> mbox cmd response: success
19,308,248 UART:
19,308,651 UART: Running Caliptra FMC ...
19,309,774 UART:
19,309,931 UART: [state] CFI Enabled
19,317,780 UART: [fht] FMC Alias Private Key: 7
21,083,878 UART: [art] Extend RT PCRs Done
21,085,115 UART: [art] Lock RT PCRs Done
21,086,382 UART: [art] Populate DV Done
21,091,658 UART: [fht] FMC Alias Private Key: 7
21,093,371 UART: [art] Derive CDI
21,094,192 UART: [art] Store in slot 0x4
21,136,962 UART: [art] Derive Key Pair
21,138,006 UART: [art] Store priv key in slot 0x5
23,565,397 UART: [art] Derive Key Pair - Done
23,578,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,285,193 UART: [art] Erasing AUTHORITY.KEYID = 7
25,286,702 UART: [art] PUB.X = 907FF2347C85F84945C9FD2F31CDA1B08FF9093400866844C0424633B66F2C8FF1BDE63FFDE6E601F0BF60FEF4C54A07
25,293,961 UART: [art] PUB.Y = 7E3EED2DF6133A8FDC5E6099F2FF55D3D9D6F22752FA063C847DBBE7E1F28FC8B9AAC11C4AABB2F219B4E89709232BC3
25,301,236 UART: [art] SIG.R = 581665E0159FDD096B193035FC41A5CD97A991870BB70B96DD2833AD568F9F24C6D0898B3F8A3230531C485DF1AB3FA2
25,308,614 UART: [art] SIG.S = C7EDE52838A516E930C2F60595FAAD7C0385426A90030653E5632ACCB63DF50785CC65FAD15BC3B8B5AB2336C1B5B017
26,287,404 UART: Caliptra RT
26,288,135 UART: [state] CFI Enabled
26,420,873 UART: [rt] RT listening for mailbox commands...
26,423,174 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,453,399 UART: [rt]cmd =0x44504543, len=40
26,481,016 >>> mbox cmd response data (40 bytes)
26,481,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,512,501 UART: [rt]cmd =0x44504543, len=96
26,555,515 >>> mbox cmd response data (56 bytes)
26,556,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,587,011 UART: [rt]cmd =0x44504543, len=96
30,872,332 >>> mbox cmd response data (6236 bytes)
30,901,591 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,932,193 UART: [rt]cmd =0x53574545, len=84
35,067,600 >>> mbox cmd response data (200 bytes)
37,520,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
45,343,258 >>> mbox cmd response: success
45,343,880 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,377,145 UART:
45,377,471 UART: Running Caliptra FMC ...
45,378,742 UART:
45,378,910 UART: [state] CFI Enabled
45,422,418 UART: [art] Extend RT PCRs Done
45,423,575 UART: [art] Lock RT PCRs Done
45,425,028 UART: [art] Populate DV Done
45,430,680 UART: [fht] FMC Alias Private Key: 7
45,432,175 UART: [art] Derive CDI
45,432,947 UART: [art] Store in slot 0x4
45,475,929 UART: [art] Derive Key Pair
45,476,936 UART: [art] Store priv key in slot 0x5
47,903,550 UART: [art] Derive Key Pair - Done
47,916,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,622,942 UART: [art] Erasing AUTHORITY.KEYID = 7
49,624,450 UART: [art] PUB.X = CF08133CCAAF2EC8528A812DAC765C7F4ACB541FEE530E0B8E08F92006684CF0AEF249CB9D96C115FB2EA14FB1E113F2
49,631,765 UART: [art] PUB.Y = 215C1ED487611824D0AB0244BAB53EFEDC5E65CB074C2473A089F6B5ABC47EF5A2A9B7ADE3C4EF19422176741FB6A065
49,639,009 UART: [art] SIG.R = 0FC4B52B6A1527834AA0111D1A4350FE1E42367D43D3C5B61CE9FCDC517ACF6DEBBEF746802FC3818150037732FA3ACF
49,646,417 UART: [art] SIG.S = 3331EB16B1E113D242753DCA013C31D829EA32E6BC59E3F99D8C2D606FD61E52CA2FF8855C760BD60A1C242ED4C8E4A3
50,626,256 UART: Caliptra RT
50,626,977 UART: [state] CFI Enabled
51,002,852 UART: [rt] RT listening for mailbox commands...
51,034,517 UART: [rt]cmd =0x53574545, len=84
55,170,605 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,889 UART: [kat] SHA2-256
881,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,935 UART: [kat] ++
886,087 UART: [kat] sha1
890,461 UART: [kat] SHA2-256
892,399 UART: [kat] SHA2-384
895,244 UART: [kat] SHA2-512-ACC
897,145 UART: [kat] ECC-384
902,706 UART: [kat] HMAC-384Kdf
907,378 UART: [kat] LMS
1,475,574 UART: [kat] --
1,476,511 UART: [cold-reset] ++
1,476,935 UART: [fht] Storing FHT @ 0x50003400
1,479,644 UART: [idev] ++
1,479,812 UART: [idev] CDI.KEYID = 6
1,480,172 UART: [idev] SUBJECT.KEYID = 7
1,480,596 UART: [idev] UDS.KEYID = 0
1,480,941 ready_for_fw is high
1,480,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,506 UART: [idev] Erasing UDS.KEYID = 0
1,505,622 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,114 UART: [idev] --
1,515,057 UART: [ldev] ++
1,515,225 UART: [ldev] CDI.KEYID = 6
1,515,588 UART: [ldev] SUBJECT.KEYID = 5
1,516,014 UART: [ldev] AUTHORITY.KEYID = 7
1,516,477 UART: [ldev] FE.KEYID = 1
1,521,831 UART: [ldev] Erasing FE.KEYID = 1
1,547,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,212 UART: [ldev] --
1,586,583 UART: [fwproc] Waiting for Commands...
1,587,202 UART: [fwproc] Received command 0x46574c44
1,587,993 UART: [fwproc] Received Image of size 118548 bytes
2,933,509 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,259 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,477 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,740 >>> mbox cmd response: success
3,133,854 UART: [afmc] ++
3,134,022 UART: [afmc] CDI.KEYID = 6
3,134,384 UART: [afmc] SUBJECT.KEYID = 7
3,134,809 UART: [afmc] AUTHORITY.KEYID = 5
3,169,740 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,936 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,716 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,425 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,308 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,991 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,839 UART: [afmc] --
3,212,789 UART: [cold-reset] --
3,213,715 UART: [state] Locking Datavault
3,214,878 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,482 UART: [state] Locking ICCM
3,216,046 UART: [exit] Launching FMC @ 0x40000130
3,221,376 UART:
3,221,392 UART: Running Caliptra FMC ...
3,221,800 UART:
3,221,854 UART: [state] CFI Enabled
3,232,512 UART: [fht] FMC Alias Private Key: 7
3,351,336 UART: [art] Extend RT PCRs Done
3,351,764 UART: [art] Lock RT PCRs Done
3,353,124 UART: [art] Populate DV Done
3,361,385 UART: [fht] FMC Alias Private Key: 7
3,362,313 UART: [art] Derive CDI
3,362,593 UART: [art] Store in slot 0x4
3,447,615 UART: [art] Derive Key Pair
3,447,975 UART: [art] Store priv key in slot 0x5
3,461,072 UART: [art] Derive Key Pair - Done
3,475,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,901 UART: [art] PUB.X = F9DE9B33740785B7856948888ABE8685A774C97662195246A36489626CB2E4E73AE68A0EACB7BEB5B0402BDD8ED5F1C2
3,498,669 UART: [art] PUB.Y = 7648E2C8CA2A0599E29478F7889D0B39C379E255E49B110770304AB16B518167023CC48C4F36BB30C138A912BEE53547
3,505,599 UART: [art] SIG.R = 11123BFE0B919E013DC6816EDB99572D6403863B0540083CF65A3942CB140EACBF99B3A95D3CB8E4DA570D25B9D03A61
3,512,354 UART: [art] SIG.S = 9BE3C7112DDEE1C782DEDCD4A1DBA73DA74382D1B6D803B331E1D760C4E228FAF40A058BA9E806C683C5AC71A7BA6860
3,535,892 UART: Caliptra RT
3,536,143 UART: [state] CFI Enabled
3,655,363 UART: [rt] RT listening for mailbox commands...
3,656,033 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,997 UART: [rt]cmd =0x44504543, len=40
3,713,049 >>> mbox cmd response data (40 bytes)
3,713,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,742,753 UART: [rt]cmd =0x44504543, len=96
3,785,271 >>> mbox cmd response data (56 bytes)
3,785,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,425 UART: [rt]cmd =0x44504543, len=96
3,996,484 >>> mbox cmd response data (6236 bytes)
3,996,485 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,026,422 UART: [rt]cmd =0x53574545, len=84
4,051,921 >>> mbox cmd response data (200 bytes)
4,051,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,052,864 UART:
4,052,880 UART: Running Caliptra ROM ...
4,053,288 UART:
4,053,342 UART: [state] CFI Enabled
4,056,102 UART: [state] LifecycleState = Unprovisioned
4,056,757 UART: [state] DebugLocked = No
4,057,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,058,848 UART: [kat] SHA2-256
4,852,779 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,856,894 UART: [kat] ++
4,857,046 UART: [kat] sha1
4,861,498 UART: [kat] SHA2-256
4,863,436 UART: [kat] SHA2-384
4,866,321 UART: [kat] SHA2-512-ACC
4,868,221 UART: [kat] ECC-384
4,873,488 UART: [kat] HMAC-384Kdf
4,878,180 UART: [kat] LMS
5,446,376 UART: [kat] --
5,446,961 UART: [update-reset] ++
6,828,509 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,829,677 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,984,944 >>> mbox cmd response: success
6,984,944 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,985,167 UART: [update-reset] Copying MAN_2 To MAN_1
6,993,181 UART: [update-reset Success] --
6,994,326 UART: [state] Locking Datavault
6,995,268 UART: [state] Locking PCR0, PCR1 and PCR31
6,995,872 UART: [state] Locking ICCM
6,996,434 UART: [exit] Launching FMC @ 0x40000130
7,001,764 UART:
7,001,780 UART: Running Caliptra FMC ...
7,002,188 UART:
7,002,242 UART: [state] CFI Enabled
7,091,155 UART: [art] Extend RT PCRs Done
7,091,583 UART: [art] Lock RT PCRs Done
7,092,920 UART: [art] Populate DV Done
7,101,441 UART: [fht] FMC Alias Private Key: 7
7,102,547 UART: [art] Derive CDI
7,102,827 UART: [art] Store in slot 0x4
7,188,923 UART: [art] Derive Key Pair
7,189,283 UART: [art] Store priv key in slot 0x5
7,202,770 UART: [art] Derive Key Pair - Done
7,217,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,233,295 UART: [art] Erasing AUTHORITY.KEYID = 7
7,234,060 UART: [art] PUB.X = E04A57B2A094AEE5DDE5151651ABBD60E313C573A0AA21C8DFB12A52E6EB74EFEF11C7FD6D4FDB4289E9FBA314A913B5
7,240,856 UART: [art] PUB.Y = B88F5B75DAF7A047D6224B83B94A49059B13C08C4B238DE415D32748D353267948AEB2308D7AFEB207B74B644E5C64FF
7,247,804 UART: [art] SIG.R = B2345DF2CC74F3F8387725EDD951F7614CFB280AF59DFE7535873EA8AB2437EF7D68C3A8F7CF266A0D66325C6229F572
7,254,576 UART: [art] SIG.S = 5A027D188CEB198FBDE8AD45F082B9ECE4778F96DBC881840C1907D79EE51DE662BAF33105FD096FF8F9432F8F9357B0
7,278,271 UART: Caliptra RT
7,278,522 UART: [state] CFI Enabled
7,640,803 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,671,640 UART: [rt]cmd =0x53574545, len=84
7,696,737 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,973 ready_for_fw is high
1,361,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,446 >>> mbox cmd response: success
3,043,311 UART:
3,043,327 UART: Running Caliptra FMC ...
3,043,735 UART:
3,043,789 UART: [state] CFI Enabled
3,054,447 UART: [fht] FMC Alias Private Key: 7
3,173,535 UART: [art] Extend RT PCRs Done
3,173,963 UART: [art] Lock RT PCRs Done
3,175,571 UART: [art] Populate DV Done
3,183,564 UART: [fht] FMC Alias Private Key: 7
3,184,562 UART: [art] Derive CDI
3,184,842 UART: [art] Store in slot 0x4
3,270,362 UART: [art] Derive Key Pair
3,270,722 UART: [art] Store priv key in slot 0x5
3,283,831 UART: [art] Derive Key Pair - Done
3,298,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,899 UART: [art] PUB.X = DEBB398BFE4B2FCB2BFFAD01467917E1810C6395B92C977578F98CB28A44A63E9B52DEF1BE2EB0817BD26C0EDB95DD47
3,321,682 UART: [art] PUB.Y = C2CD300DCDC8664FFB6341CA4D2FE1563A5A0A9E881ADCDCFF7F821BF64AE5B61F0D299F808F2EAED38FD5F291759455
3,328,647 UART: [art] SIG.R = CBF507331A153BDF58FB6EEB653F2E7794BA75EE0B92E7DCD40DDB4355FC8DB854099C55C4D58448707A2091E108CE3F
3,335,416 UART: [art] SIG.S = D9233B48D4059DEFAA2E5B860656AEEF2F429EB4327C3B6BE008D80DBB1DC22FB94CDC5B682F9541E5857F6D40FBB7C0
3,358,768 UART: Caliptra RT
3,359,019 UART: [state] CFI Enabled
3,478,490 UART: [rt] RT listening for mailbox commands...
3,479,160 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,164 UART: [rt]cmd =0x44504543, len=40
3,536,358 >>> mbox cmd response data (40 bytes)
3,536,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,592 UART: [rt]cmd =0x44504543, len=96
3,608,838 >>> mbox cmd response data (56 bytes)
3,608,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,654 UART: [rt]cmd =0x44504543, len=96
3,820,107 >>> mbox cmd response data (6236 bytes)
3,820,108 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,939 UART: [rt]cmd =0x53574545, len=84
3,875,878 >>> mbox cmd response data (200 bytes)
3,875,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,689,157 >>> mbox cmd response: success
6,689,157 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,702,125 UART:
6,702,141 UART: Running Caliptra FMC ...
6,702,549 UART:
6,702,603 UART: [state] CFI Enabled
6,791,810 UART: [art] Extend RT PCRs Done
6,792,238 UART: [art] Lock RT PCRs Done
6,793,531 UART: [art] Populate DV Done
6,801,798 UART: [fht] FMC Alias Private Key: 7
6,802,922 UART: [art] Derive CDI
6,803,202 UART: [art] Store in slot 0x4
6,888,808 UART: [art] Derive Key Pair
6,889,168 UART: [art] Store priv key in slot 0x5
6,901,791 UART: [art] Derive Key Pair - Done
6,916,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,932,120 UART: [art] Erasing AUTHORITY.KEYID = 7
6,932,885 UART: [art] PUB.X = 69EE27A2C3F19BF687E702C627CFCC26E6793077EE8791E73F59215E695C36E06C175E6363107FE5898B7F799899A2BE
6,939,650 UART: [art] PUB.Y = 91D0050AEE195285A81D662AA38AD714F26F21B2AAF7ACED2A8B0F916F6B63A4A896A0497DF1B4B576E4639ABD173012
6,946,601 UART: [art] SIG.R = 8A32E78C099E99AB766F031DA3F25D5DB71B31A1B7013BB8067592E6FB4A60B832115340BB362A81A07E1E5ABE81AE29
6,953,365 UART: [art] SIG.S = 2B7EAEE9AFFEDEB1D67994F31803C41DBB7A2837E3585C10E2A25DC1B79DFEA964381897E0E5233F0614716B374F5DC9
6,976,803 UART: Caliptra RT
6,977,054 UART: [state] CFI Enabled
7,342,519 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,373,164 UART: [rt]cmd =0x53574545, len=84
7,399,461 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,458 UART: [kat] SHA2-256
882,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,504 UART: [kat] ++
886,656 UART: [kat] sha1
890,786 UART: [kat] SHA2-256
892,724 UART: [kat] SHA2-384
895,601 UART: [kat] SHA2-512-ACC
897,502 UART: [kat] ECC-384
903,375 UART: [kat] HMAC-384Kdf
908,099 UART: [kat] LMS
1,476,295 UART: [kat] --
1,477,330 UART: [cold-reset] ++
1,477,884 UART: [fht] Storing FHT @ 0x50003400
1,480,593 UART: [idev] ++
1,480,761 UART: [idev] CDI.KEYID = 6
1,481,121 UART: [idev] SUBJECT.KEYID = 7
1,481,545 UART: [idev] UDS.KEYID = 0
1,481,890 ready_for_fw is high
1,481,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,897 UART: [idev] Erasing UDS.KEYID = 0
1,506,143 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,633 UART: [idev] --
1,515,708 UART: [ldev] ++
1,515,876 UART: [ldev] CDI.KEYID = 6
1,516,239 UART: [ldev] SUBJECT.KEYID = 5
1,516,665 UART: [ldev] AUTHORITY.KEYID = 7
1,517,128 UART: [ldev] FE.KEYID = 1
1,522,258 UART: [ldev] Erasing FE.KEYID = 1
1,547,773 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,315 UART: [ldev] --
1,586,670 UART: [fwproc] Waiting for Commands...
1,587,345 UART: [fwproc] Received command 0x46574c44
1,588,136 UART: [fwproc] Received Image of size 118548 bytes
2,931,990 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,810 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,028 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,341 >>> mbox cmd response: success
3,131,535 UART: [afmc] ++
3,131,703 UART: [afmc] CDI.KEYID = 6
3,132,065 UART: [afmc] SUBJECT.KEYID = 7
3,132,490 UART: [afmc] AUTHORITY.KEYID = 5
3,168,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,193 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,973 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,682 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,565 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,248 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,092 UART: [afmc] --
3,211,070 UART: [cold-reset] --
3,212,026 UART: [state] Locking Datavault
3,213,211 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,815 UART: [state] Locking ICCM
3,214,269 UART: [exit] Launching FMC @ 0x40000130
3,219,599 UART:
3,219,615 UART: Running Caliptra FMC ...
3,220,023 UART:
3,220,166 UART: [state] CFI Enabled
3,230,630 UART: [fht] FMC Alias Private Key: 7
3,349,366 UART: [art] Extend RT PCRs Done
3,349,794 UART: [art] Lock RT PCRs Done
3,351,180 UART: [art] Populate DV Done
3,359,657 UART: [fht] FMC Alias Private Key: 7
3,360,801 UART: [art] Derive CDI
3,361,081 UART: [art] Store in slot 0x4
3,446,807 UART: [art] Derive Key Pair
3,447,167 UART: [art] Store priv key in slot 0x5
3,460,166 UART: [art] Derive Key Pair - Done
3,475,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,385 UART: [art] PUB.X = 743DF26A93F0DFE1112DAAD29E228575F8641BB31762FAF043EBAA39031EBDEB5BE3ACAF5A800E3FBFC215AF4EA0DA61
3,498,177 UART: [art] PUB.Y = B5FADB47C31DDE2F41FCBD0935026DDC34118774CB2509A104D21B7BFF91D2E9521621A8A6309032B83C9D24CF334B7C
3,505,125 UART: [art] SIG.R = 6918EA0E03D047DA6DFA9C10491FD9A3925642BF253C1D3BEC8807FC222348458BD42D0FD6EC1D41BE8104136A612BFF
3,511,890 UART: [art] SIG.S = C73FE1D240F65EAE5674D089D4A94629A72106706AF0D640387E65A9241A353E679584EACEAFCEF721FFE575525EF373
3,535,601 UART: Caliptra RT
3,535,944 UART: [state] CFI Enabled
3,655,764 UART: [rt] RT listening for mailbox commands...
3,656,434 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,640 UART: [rt]cmd =0x44504543, len=40
3,714,064 >>> mbox cmd response data (40 bytes)
3,714,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,744,014 UART: [rt]cmd =0x44504543, len=96
3,786,904 >>> mbox cmd response data (56 bytes)
3,786,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,772 UART: [rt]cmd =0x44504543, len=96
3,998,169 >>> mbox cmd response data (6236 bytes)
3,998,170 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,189 UART: [rt]cmd =0x53574545, len=84
4,053,634 >>> mbox cmd response data (200 bytes)
4,053,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,054,603 UART:
4,054,619 UART: Running Caliptra ROM ...
4,055,027 UART:
4,055,168 UART: [state] CFI Enabled
4,058,108 UART: [state] LifecycleState = Unprovisioned
4,058,763 UART: [state] DebugLocked = No
4,059,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,060,932 UART: [kat] SHA2-256
4,854,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,858,978 UART: [kat] ++
4,859,130 UART: [kat] sha1
4,863,330 UART: [kat] SHA2-256
4,865,268 UART: [kat] SHA2-384
4,868,071 UART: [kat] SHA2-512-ACC
4,869,971 UART: [kat] ECC-384
4,876,058 UART: [kat] HMAC-384Kdf
4,880,666 UART: [kat] LMS
5,448,862 UART: [kat] --
5,449,645 UART: [update-reset] ++
6,831,201 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,832,345 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,987,612 >>> mbox cmd response: success
6,987,612 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,987,969 UART: [update-reset] Copying MAN_2 To MAN_1
6,995,983 UART: [update-reset Success] --
6,996,786 UART: [state] Locking Datavault
6,997,614 UART: [state] Locking PCR0, PCR1 and PCR31
6,998,218 UART: [state] Locking ICCM
6,998,642 UART: [exit] Launching FMC @ 0x40000130
7,003,972 UART:
7,003,988 UART: Running Caliptra FMC ...
7,004,396 UART:
7,004,539 UART: [state] CFI Enabled
7,093,998 UART: [art] Extend RT PCRs Done
7,094,426 UART: [art] Lock RT PCRs Done
7,095,487 UART: [art] Populate DV Done
7,103,744 UART: [fht] FMC Alias Private Key: 7
7,104,758 UART: [art] Derive CDI
7,105,038 UART: [art] Store in slot 0x4
7,190,574 UART: [art] Derive Key Pair
7,190,934 UART: [art] Store priv key in slot 0x5
7,203,909 UART: [art] Derive Key Pair - Done
7,218,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,234,490 UART: [art] Erasing AUTHORITY.KEYID = 7
7,235,255 UART: [art] PUB.X = AC1392F6003097FFAF899DD923D531CBE53E39E9C2B36077872DDB0B873E99C203F24FA727BB881CD69A82B5C0954026
7,242,001 UART: [art] PUB.Y = 565573B13C5CE5E07BB69EFC246A73837D79546EA6212E8EFFA2FB9F1B0ACB1BE3A18F320B2ABE69B611E6BCCB6270BB
7,248,967 UART: [art] SIG.R = E64C1B7A83BF103DA196985FCE477A061E3FDA38D77DB81417CD7F82AFD1FAD2036DE92F9A7C94225A1A611A466F4543
7,255,743 UART: [art] SIG.S = 8A624934423C4BCA0123F549CA987B09CAA22A165724024180550B9E528455603916B955E7C32913A9DBDD7A8EFBC27C
7,278,949 UART: Caliptra RT
7,279,292 UART: [state] CFI Enabled
7,644,996 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,675,655 UART: [rt]cmd =0x53574545, len=84
7,701,644 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,994 ready_for_fw is high
1,362,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,901 >>> mbox cmd response: success
3,043,252 UART:
3,043,268 UART: Running Caliptra FMC ...
3,043,676 UART:
3,043,819 UART: [state] CFI Enabled
3,054,301 UART: [fht] FMC Alias Private Key: 7
3,173,875 UART: [art] Extend RT PCRs Done
3,174,303 UART: [art] Lock RT PCRs Done
3,175,815 UART: [art] Populate DV Done
3,183,964 UART: [fht] FMC Alias Private Key: 7
3,185,102 UART: [art] Derive CDI
3,185,382 UART: [art] Store in slot 0x4
3,270,890 UART: [art] Derive Key Pair
3,271,250 UART: [art] Store priv key in slot 0x5
3,284,595 UART: [art] Derive Key Pair - Done
3,299,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,086 UART: [art] PUB.X = F48EFED8C6B949B7BBC827698AAEFEB0EE9665E41FC5215F73A31A8E19722416C116596147022170CD5688CBFB28FA6E
3,322,863 UART: [art] PUB.Y = A4916150B84F5B10BACAE80EDC11FC86CA2194CD18512EEC1A09247AF285698A50C8E563267FF89E285E223C9357D05C
3,329,813 UART: [art] SIG.R = 0CABC159B08D9CC97CBFB6832D6F8DD81E49E95C1D2FED913459FE7DDA1B5D3ACDDF489EA9E9E99226B2E0D56E094E72
3,336,603 UART: [art] SIG.S = D04A92E8CA4C355EA75831B05002840596F7A70BF6F2F185C8B1E06812641DC492538E7ADFA3547E5217BAA8A1D66CCA
3,360,368 UART: Caliptra RT
3,360,711 UART: [state] CFI Enabled
3,482,169 UART: [rt] RT listening for mailbox commands...
3,482,839 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,169 UART: [rt]cmd =0x44504543, len=40
3,540,359 >>> mbox cmd response data (40 bytes)
3,540,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,570,339 UART: [rt]cmd =0x44504543, len=96
3,612,753 >>> mbox cmd response data (56 bytes)
3,612,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,509 UART: [rt]cmd =0x44504543, len=96
3,823,566 >>> mbox cmd response data (6236 bytes)
3,823,567 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,652 UART: [rt]cmd =0x53574545, len=84
3,879,071 >>> mbox cmd response data (200 bytes)
3,879,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,694,631 >>> mbox cmd response: success
6,694,631 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,707,923 UART:
6,707,939 UART: Running Caliptra FMC ...
6,708,347 UART:
6,708,490 UART: [state] CFI Enabled
6,797,659 UART: [art] Extend RT PCRs Done
6,798,087 UART: [art] Lock RT PCRs Done
6,799,444 UART: [art] Populate DV Done
6,807,553 UART: [fht] FMC Alias Private Key: 7
6,808,579 UART: [art] Derive CDI
6,808,859 UART: [art] Store in slot 0x4
6,894,559 UART: [art] Derive Key Pair
6,894,919 UART: [art] Store priv key in slot 0x5
6,908,668 UART: [art] Derive Key Pair - Done
6,923,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,939,462 UART: [art] Erasing AUTHORITY.KEYID = 7
6,940,227 UART: [art] PUB.X = ECE126B269066E9CEBB5530A9C0058631650A49CC337252C88762FE1E0DD44E8D1C3E5B016643D041C9A90964E6A2A2F
6,946,968 UART: [art] PUB.Y = B1145501F055E996519CC77D9884C4B535BF4363C794031348B4642049AC4709E3E244D61E017371D65FA33E4A250513
6,953,887 UART: [art] SIG.R = F46FB72991D8B198AA1C51D9FFEA454DD6BFA3A7938A4A46058B441FE7B8CC163AD15401BF4C326A0B7C26CF9985F3E5
6,960,664 UART: [art] SIG.S = C20B6FA4D351D25740AA2CA700B708067DFD4DA1D24C3F60BA7089DA124777F3B35ED80ABFCD6104EB4BEEFEF330B261
6,985,049 UART: Caliptra RT
6,985,392 UART: [state] CFI Enabled
7,347,654 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,378,379 UART: [rt]cmd =0x53574545, len=84
7,403,816 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [kat] SHA2-256
891,046 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,150 UART: [kat] ++
895,302 UART: [kat] sha1
899,428 UART: [kat] SHA2-256
901,368 UART: [kat] SHA2-384
904,115 UART: [kat] SHA2-512-ACC
906,016 UART: [kat] ECC-384
915,737 UART: [kat] HMAC-384Kdf
920,209 UART: [kat] LMS
1,168,521 UART: [kat] --
1,169,202 UART: [cold-reset] ++
1,169,726 UART: [fht] FHT @ 0x50003400
1,172,570 UART: [idev] ++
1,172,738 UART: [idev] CDI.KEYID = 6
1,173,099 UART: [idev] SUBJECT.KEYID = 7
1,173,524 UART: [idev] UDS.KEYID = 0
1,173,870 ready_for_fw is high
1,173,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,383 UART: [idev] Erasing UDS.KEYID = 0
1,198,067 UART: [idev] Sha1 KeyId Algorithm
1,207,059 UART: [idev] --
1,208,260 UART: [ldev] ++
1,208,428 UART: [ldev] CDI.KEYID = 6
1,208,792 UART: [ldev] SUBJECT.KEYID = 5
1,209,219 UART: [ldev] AUTHORITY.KEYID = 7
1,209,682 UART: [ldev] FE.KEYID = 1
1,215,052 UART: [ldev] Erasing FE.KEYID = 1
1,241,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,396 UART: [ldev] --
1,280,807 UART: [fwproc] Wait for Commands...
1,281,388 UART: [fwproc] Recv command 0x46574c44
1,282,121 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,551 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,726 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,053 >>> mbox cmd response: success
2,827,165 UART: [afmc] ++
2,827,333 UART: [afmc] CDI.KEYID = 6
2,827,696 UART: [afmc] SUBJECT.KEYID = 7
2,828,122 UART: [afmc] AUTHORITY.KEYID = 5
2,863,503 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,945 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,655 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,536 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,237 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,794 UART: [afmc] --
2,906,849 UART: [cold-reset] --
2,907,813 UART: [state] Locking Datavault
2,908,884 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,488 UART: [state] Locking ICCM
2,909,948 UART: [exit] Launching FMC @ 0x40000130
2,915,278 UART:
2,915,294 UART: Running Caliptra FMC ...
2,915,702 UART:
2,915,756 UART: [state] CFI Enabled
2,926,408 UART: [fht] FMC Alias Private Key: 7
3,045,210 UART: [art] Extend RT PCRs Done
3,045,638 UART: [art] Lock RT PCRs Done
3,047,618 UART: [art] Populate DV Done
3,055,609 UART: [fht] FMC Alias Private Key: 7
3,056,649 UART: [art] Derive CDI
3,056,929 UART: [art] Store in slot 0x4
3,142,412 UART: [art] Derive Key Pair
3,142,772 UART: [art] Store priv key in slot 0x5
3,155,892 UART: [art] Derive Key Pair - Done
3,170,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,613 UART: [art] PUB.X = 148866863FEDA83B853B4553CE6772CB3BF17EF4517B0C936B098CEDF07B8EF6C3183538F02BF879D33BDD3AD1CF9203
3,193,384 UART: [art] PUB.Y = A02F89B202349E85577A6D56979837C91EBC952FB97A3D4F58F33F353C88B32C0F59F6B52C8C5F54FB0A9D3B85A5A624
3,200,329 UART: [art] SIG.R = 8E4CC051357D6034C368F77A04FC7536623C6D31ABC822D5102EEC4DF50AC7D64BD65B84E4981CBB84248818415D7976
3,207,093 UART: [art] SIG.S = F6FC5174C383201808E54754DEC7F9A45605A37103677E93649AF2ACFCB1C8DDE8B952752EC0DF5C3777FDE5848BF22D
3,230,914 UART: Caliptra RT
3,231,165 UART: [state] CFI Enabled
3,351,189 UART: [rt] RT listening for mailbox commands...
3,351,859 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,019 UART: [rt]cmd =0x44504543, len=40
3,409,567 >>> mbox cmd response data (40 bytes)
3,409,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,579 UART: [rt]cmd =0x44504543, len=96
3,481,857 >>> mbox cmd response data (56 bytes)
3,481,858 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,655 UART: [rt]cmd =0x44504543, len=96
3,691,769 >>> mbox cmd response data (6236 bytes)
3,691,770 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,875 UART: [rt]cmd =0x53574545, len=84
3,747,573 >>> mbox cmd response data (200 bytes)
3,747,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,748,411 UART:
3,748,427 UART: Running Caliptra ROM ...
3,748,835 UART:
3,748,890 UART: [state] CFI Enabled
3,751,666 UART: [state] LifecycleState = Unprovisioned
3,752,321 UART: [state] DebugLocked = No
3,752,837 UART: [state] WD Timer not started. Device not locked for debugging
3,754,137 UART: [kat] SHA2-256
4,557,687 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,561,791 UART: [kat] ++
4,561,943 UART: [kat] sha1
4,566,269 UART: [kat] SHA2-256
4,568,209 UART: [kat] SHA2-384
4,571,112 UART: [kat] SHA2-512-ACC
4,573,012 UART: [kat] ECC-384
4,582,551 UART: [kat] HMAC-384Kdf
4,587,099 UART: [kat] LMS
4,835,411 UART: [kat] --
4,836,293 UART: [update-reset] ++
6,194,882 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,195,841 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,351,056 >>> mbox cmd response: success
6,351,056 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,351,293 UART: [update-reset] Copying MAN_2 To MAN_1
6,359,307 UART: [update-reset Success] --
6,360,300 UART: [state] Locking Datavault
6,360,968 UART: [state] Locking PCR0, PCR1 and PCR31
6,361,572 UART: [state] Locking ICCM
6,362,194 UART: [exit] Launching FMC @ 0x40000130
6,367,524 UART:
6,367,540 UART: Running Caliptra FMC ...
6,367,948 UART:
6,368,002 UART: [state] CFI Enabled
6,457,197 UART: [art] Extend RT PCRs Done
6,457,625 UART: [art] Lock RT PCRs Done
6,459,030 UART: [art] Populate DV Done
6,467,151 UART: [fht] FMC Alias Private Key: 7
6,468,221 UART: [art] Derive CDI
6,468,501 UART: [art] Store in slot 0x4
6,553,928 UART: [art] Derive Key Pair
6,554,288 UART: [art] Store priv key in slot 0x5
6,566,750 UART: [art] Derive Key Pair - Done
6,581,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,596,784 UART: [art] Erasing AUTHORITY.KEYID = 7
6,597,549 UART: [art] PUB.X = B87B6607405D9C654324885E42D8865F96FBFBB0DCCC43D217A96EAC875D659E4AB66EFC6F32B348B2EC68327B0106E6
6,604,318 UART: [art] PUB.Y = C2204256350D8539C3FD060998F6A7C4E9EC6CDEDEEE11247334BA74AC191B8C922F8B1EACB88A23141AEBC9A37DCC17
6,611,275 UART: [art] SIG.R = 2B0F7B30F4FCEDC47F30ADA1A036FBE74A43E152307A89CC67338838114B6726FC0591338703E55F809561DC7ECCAFC4
6,618,044 UART: [art] SIG.S = B95A17A2B2A4C382957227205F5064E1563F9DE63BC2401B1A54F25D5338EFA57FBDB94D9957896677192CA9F3BABE18
6,641,912 UART: Caliptra RT
6,642,163 UART: [state] CFI Enabled
7,007,697 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,038,426 UART: [rt]cmd =0x53574545, len=84
7,064,306 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,466 ready_for_fw is high
1,058,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,816 >>> mbox cmd response: success
2,740,897 UART:
2,740,913 UART: Running Caliptra FMC ...
2,741,321 UART:
2,741,375 UART: [state] CFI Enabled
2,751,787 UART: [fht] FMC Alias Private Key: 7
2,870,901 UART: [art] Extend RT PCRs Done
2,871,329 UART: [art] Lock RT PCRs Done
2,873,031 UART: [art] Populate DV Done
2,881,292 UART: [fht] FMC Alias Private Key: 7
2,882,406 UART: [art] Derive CDI
2,882,686 UART: [art] Store in slot 0x4
2,968,161 UART: [art] Derive Key Pair
2,968,521 UART: [art] Store priv key in slot 0x5
2,981,929 UART: [art] Derive Key Pair - Done
2,996,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,790 UART: [art] PUB.X = C83CAC6390EE9278566BBCDDC39F26602595E42B40F4FF6B8FE794D8C0769349B4352081852F50CF260D0D91987682F2
3,019,552 UART: [art] PUB.Y = 350BFE8AE6B80B53B9E12E09A50BA7900AB121DACC6FC8F6D0BD58E1FDB80A6D0AA07B4F3FF1056FA9627E701DECC522
3,026,504 UART: [art] SIG.R = 95B2F3B554497DE73A743CB38E72D658A3889B9A48FF67CF04CF0068991CEF4B711ED673146814622D511E0404F9CCE0
3,033,243 UART: [art] SIG.S = E1E9A5E62FC1F2115E7921CD179E676AB1ED160977866A05CCA1AC4553A25090034AB15D5AA1436D3DD941DBC1405D71
3,056,640 UART: Caliptra RT
3,056,891 UART: [state] CFI Enabled
3,176,417 UART: [rt] RT listening for mailbox commands...
3,177,087 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,967 UART: [rt]cmd =0x44504543, len=40
3,234,381 >>> mbox cmd response data (40 bytes)
3,234,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,359 UART: [rt]cmd =0x44504543, len=96
3,306,737 >>> mbox cmd response data (56 bytes)
3,306,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,336,833 UART: [rt]cmd =0x44504543, len=96
3,517,996 >>> mbox cmd response data (6236 bytes)
3,517,997 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,547,640 UART: [rt]cmd =0x53574545, len=84
3,572,824 >>> mbox cmd response data (200 bytes)
3,572,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,061,421 >>> mbox cmd response: success
6,061,421 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,075,016 UART:
6,075,032 UART: Running Caliptra FMC ...
6,075,440 UART:
6,075,494 UART: [state] CFI Enabled
6,165,141 UART: [art] Extend RT PCRs Done
6,165,569 UART: [art] Lock RT PCRs Done
6,166,942 UART: [art] Populate DV Done
6,175,453 UART: [fht] FMC Alias Private Key: 7
6,176,465 UART: [art] Derive CDI
6,176,745 UART: [art] Store in slot 0x4
6,262,004 UART: [art] Derive Key Pair
6,262,364 UART: [art] Store priv key in slot 0x5
6,275,370 UART: [art] Derive Key Pair - Done
6,290,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,305,713 UART: [art] Erasing AUTHORITY.KEYID = 7
6,306,478 UART: [art] PUB.X = 80964296229418EB4D567D7E2FE5DF22D9D35CA36F902A72E93C2E21731CF208518B13F9190825EAE564E66BD79027AF
6,313,240 UART: [art] PUB.Y = 58462D1B010E0AA228C71D5CB58ED3E8E835DF050169CAEFD1C36C395A4DBFF4F6BDF86F8320DFCE72CB440F216B9CA1
6,320,194 UART: [art] SIG.R = C52A6D7852329555B0F714C96ED5D072BB6B68AF0E38DE1C81F8C8082A402E05DA657150757C4CBC0F1818E628ADB06A
6,326,958 UART: [art] SIG.S = AE0318984FDF4BAF2F9AA242FE8AE0136A996C8C015E833DEBAE54CCF1C3281CD7981F644851F46534FB40B1C8E03C05
6,350,381 UART: Caliptra RT
6,350,632 UART: [state] CFI Enabled
6,712,981 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,743,444 UART: [rt]cmd =0x53574545, len=84
6,768,700 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,733 UART: [kat] ++
895,885 UART: [kat] sha1
900,031 UART: [kat] SHA2-256
901,971 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,169,949 UART: [cold-reset] ++
1,170,379 UART: [fht] FHT @ 0x50003400
1,172,847 UART: [idev] ++
1,173,015 UART: [idev] CDI.KEYID = 6
1,173,376 UART: [idev] SUBJECT.KEYID = 7
1,173,801 UART: [idev] UDS.KEYID = 0
1,174,147 ready_for_fw is high
1,174,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,886 UART: [idev] Erasing UDS.KEYID = 0
1,198,374 UART: [idev] Sha1 KeyId Algorithm
1,207,184 UART: [idev] --
1,208,319 UART: [ldev] ++
1,208,487 UART: [ldev] CDI.KEYID = 6
1,208,851 UART: [ldev] SUBJECT.KEYID = 5
1,209,278 UART: [ldev] AUTHORITY.KEYID = 7
1,209,741 UART: [ldev] FE.KEYID = 1
1,214,897 UART: [ldev] Erasing FE.KEYID = 1
1,241,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,587 UART: [ldev] --
1,280,944 UART: [fwproc] Wait for Commands...
1,281,705 UART: [fwproc] Recv command 0x46574c44
1,282,438 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,242 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,417 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,786 >>> mbox cmd response: success
2,827,044 UART: [afmc] ++
2,827,212 UART: [afmc] CDI.KEYID = 6
2,827,575 UART: [afmc] SUBJECT.KEYID = 7
2,828,001 UART: [afmc] AUTHORITY.KEYID = 5
2,863,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,538 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,248 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,129 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,830 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,601 UART: [afmc] --
2,906,434 UART: [cold-reset] --
2,907,074 UART: [state] Locking Datavault
2,908,385 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,989 UART: [state] Locking ICCM
2,909,619 UART: [exit] Launching FMC @ 0x40000130
2,914,949 UART:
2,914,965 UART: Running Caliptra FMC ...
2,915,373 UART:
2,915,516 UART: [state] CFI Enabled
2,925,708 UART: [fht] FMC Alias Private Key: 7
3,044,352 UART: [art] Extend RT PCRs Done
3,044,780 UART: [art] Lock RT PCRs Done
3,046,486 UART: [art] Populate DV Done
3,054,893 UART: [fht] FMC Alias Private Key: 7
3,055,927 UART: [art] Derive CDI
3,056,207 UART: [art] Store in slot 0x4
3,141,716 UART: [art] Derive Key Pair
3,142,076 UART: [art] Store priv key in slot 0x5
3,155,484 UART: [art] Derive Key Pair - Done
3,170,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,514 UART: [art] PUB.X = A79555E8E5B3277CFFB17E261E9CAEC89AF1A072B12E1AB74816DFB9707C94642D89170D85D30F1ADCCC8F4DB9341C71
3,193,292 UART: [art] PUB.Y = 12CEFA4A10355675C6B827182E87E186F96263729328E8F5D17955AF5FFA07B6CFA9F1C922AD2B543BDB6FD93E2C2DA2
3,200,249 UART: [art] SIG.R = 636C222F71DC7D13DE0D1BC30C0BC093DDC1C124959CEF4EA3D419D83095AAA06854023E4CE1763FDBF9C67B84C6EE37
3,207,023 UART: [art] SIG.S = 6D9B301E5275AA1EBE5F1CFACF4C5395933B562AA2046BD9C94A1356D4CEAEBF2A190DD0497BEC72FAC3CC1586AF8794
3,230,383 UART: Caliptra RT
3,230,726 UART: [state] CFI Enabled
3,350,718 UART: [rt] RT listening for mailbox commands...
3,351,388 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,030 UART: [rt]cmd =0x44504543, len=40
3,409,156 >>> mbox cmd response data (40 bytes)
3,409,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,040 UART: [rt]cmd =0x44504543, len=96
3,482,702 >>> mbox cmd response data (56 bytes)
3,482,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,696 UART: [rt]cmd =0x44504543, len=96
3,694,148 >>> mbox cmd response data (6236 bytes)
3,694,149 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,724,002 UART: [rt]cmd =0x53574545, len=84
3,749,402 >>> mbox cmd response data (200 bytes)
3,749,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,750,188 UART:
3,750,204 UART: Running Caliptra ROM ...
3,750,612 UART:
3,750,754 UART: [state] CFI Enabled
3,753,248 UART: [state] LifecycleState = Unprovisioned
3,753,903 UART: [state] DebugLocked = No
3,754,589 UART: [state] WD Timer not started. Device not locked for debugging
3,755,857 UART: [kat] SHA2-256
4,559,407 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,563,511 UART: [kat] ++
4,563,663 UART: [kat] sha1
4,568,067 UART: [kat] SHA2-256
4,570,007 UART: [kat] SHA2-384
4,572,582 UART: [kat] SHA2-512-ACC
4,574,482 UART: [kat] ECC-384
4,584,123 UART: [kat] HMAC-384Kdf
4,588,879 UART: [kat] LMS
4,837,191 UART: [kat] --
4,838,071 UART: [update-reset] ++
6,197,714 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,198,849 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,354,064 >>> mbox cmd response: success
6,354,064 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,354,299 UART: [update-reset] Copying MAN_2 To MAN_1
6,362,313 UART: [update-reset Success] --
6,363,352 UART: [state] Locking Datavault
6,364,030 UART: [state] Locking PCR0, PCR1 and PCR31
6,364,634 UART: [state] Locking ICCM
6,365,064 UART: [exit] Launching FMC @ 0x40000130
6,370,394 UART:
6,370,410 UART: Running Caliptra FMC ...
6,370,818 UART:
6,370,961 UART: [state] CFI Enabled
6,460,152 UART: [art] Extend RT PCRs Done
6,460,580 UART: [art] Lock RT PCRs Done
6,461,601 UART: [art] Populate DV Done
6,469,630 UART: [fht] FMC Alias Private Key: 7
6,470,794 UART: [art] Derive CDI
6,471,074 UART: [art] Store in slot 0x4
6,557,201 UART: [art] Derive Key Pair
6,557,561 UART: [art] Store priv key in slot 0x5
6,570,813 UART: [art] Derive Key Pair - Done
6,585,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,601,396 UART: [art] Erasing AUTHORITY.KEYID = 7
6,602,161 UART: [art] PUB.X = 3C26D134C187BC3C818A3DEA538D0FFD13FBD5DD9A720038A93DAF2DD33709A6E71A793F6D9D15FBAD8516C0407ACC65
6,608,921 UART: [art] PUB.Y = 5A1519BF2F0B93BD23E98166540A9D18350CD5382A149F1DB8D638013CB0C3B35D25EF383730AD1607BEE4AC930BFDF9
6,615,861 UART: [art] SIG.R = 9F653A302E56E1EE9958E6409BAE7A1807524655956D75985D028F6D69A9F3175015F71EA675DB1DC3B07FA76899478F
6,622,619 UART: [art] SIG.S = FEE61285762B45A5ADD55D820778489AED4E56DBC51FEC32013993E8F586B66097F5675A450635DD161B1E61587427E1
6,646,054 UART: Caliptra RT
6,646,397 UART: [state] CFI Enabled
7,007,902 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,038,835 UART: [rt]cmd =0x53574545, len=84
7,064,675 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,715 ready_for_fw is high
1,059,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,113 >>> mbox cmd response: success
2,740,712 UART:
2,740,728 UART: Running Caliptra FMC ...
2,741,136 UART:
2,741,279 UART: [state] CFI Enabled
2,751,563 UART: [fht] FMC Alias Private Key: 7
2,870,565 UART: [art] Extend RT PCRs Done
2,870,993 UART: [art] Lock RT PCRs Done
2,872,495 UART: [art] Populate DV Done
2,880,822 UART: [fht] FMC Alias Private Key: 7
2,881,988 UART: [art] Derive CDI
2,882,268 UART: [art] Store in slot 0x4
2,968,277 UART: [art] Derive Key Pair
2,968,637 UART: [art] Store priv key in slot 0x5
2,982,125 UART: [art] Derive Key Pair - Done
2,997,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,506 UART: [art] PUB.X = 631DE088BC639CE82D24B45CEE531797DC7C19CBFFACF7506CC4A4BFFAD32B0225271CCDBC1A9241FB7A2890DF3D7418
3,020,295 UART: [art] PUB.Y = 3F19AFCAE2C4053F03F44DDA55460D5D413E987CB4F99E0AD77F7039C99911ED10A34E39C60F5DC4DE127B25137CD0AD
3,027,244 UART: [art] SIG.R = 30B8185760A3CD5B74482CD4CE272223A0CAE9BC6474FC2A60C971F59A0DA26B6A2119300104B7CD4D78C2E4103EF9B9
3,034,011 UART: [art] SIG.S = F560EB267942CF7F4F6AF11116F6DD267F7AE408DB58F92B91DD21E405F954E1E324559A4A0D8CB640CBA1C95FA853F0
3,058,230 UART: Caliptra RT
3,058,573 UART: [state] CFI Enabled
3,179,318 UART: [rt] RT listening for mailbox commands...
3,179,988 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,218 UART: [rt]cmd =0x44504543, len=40
3,237,708 >>> mbox cmd response data (40 bytes)
3,237,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,726 UART: [rt]cmd =0x44504543, len=96
3,310,744 >>> mbox cmd response data (56 bytes)
3,310,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,340,820 UART: [rt]cmd =0x44504543, len=96
3,522,117 >>> mbox cmd response data (6236 bytes)
3,522,118 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,551,911 UART: [rt]cmd =0x53574545, len=84
3,578,119 >>> mbox cmd response data (200 bytes)
3,578,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,068,471 >>> mbox cmd response: success
6,068,471 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,081,868 UART:
6,081,884 UART: Running Caliptra FMC ...
6,082,292 UART:
6,082,435 UART: [state] CFI Enabled
6,172,150 UART: [art] Extend RT PCRs Done
6,172,578 UART: [art] Lock RT PCRs Done
6,174,075 UART: [art] Populate DV Done
6,182,214 UART: [fht] FMC Alias Private Key: 7
6,183,280 UART: [art] Derive CDI
6,183,560 UART: [art] Store in slot 0x4
6,269,427 UART: [art] Derive Key Pair
6,269,787 UART: [art] Store priv key in slot 0x5
6,282,885 UART: [art] Derive Key Pair - Done
6,297,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,312,989 UART: [art] Erasing AUTHORITY.KEYID = 7
6,313,754 UART: [art] PUB.X = 4F5D91EDA7B7764962BF9CB5CE3E80FB374B9531752451F617D84AE1911FA06D87D858E5C770B1075C072A709B0C0A5C
6,320,516 UART: [art] PUB.Y = 6BC9E87BD3A27D985B8F522EBB2DAE315073EBF7271DA9C354A7A49449ED38B1425CAFF8D221CD6E5F626D198A258653
6,327,478 UART: [art] SIG.R = 435767F7EF00F1AA44DBF4277EFB793A5B16478204809E22107D6E31FB1E8926A7C05F84A4B0611AD50E7F82239AE4A8
6,334,222 UART: [art] SIG.S = 41A6E0F0559E79143042A3F05F5B5E91599F1F93BCA9E7ABB8B6788CCBC1208E67BC3557EF049D969ED0266638228509
6,358,002 UART: Caliptra RT
6,358,345 UART: [state] CFI Enabled
6,721,808 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,752,409 UART: [rt]cmd =0x53574545, len=84
6,778,415 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,997 UART: [kat] SHA2-256
903,937 UART: [kat] SHA2-384
906,688 UART: [kat] SHA2-512-ACC
908,589 UART: [kat] ECC-384
918,122 UART: [kat] HMAC-384Kdf
922,620 UART: [kat] LMS
1,170,948 UART: [kat] --
1,171,981 UART: [cold-reset] ++
1,172,525 UART: [fht] FHT @ 0x50003400
1,175,214 UART: [idev] ++
1,175,382 UART: [idev] CDI.KEYID = 6
1,175,742 UART: [idev] SUBJECT.KEYID = 7
1,176,166 UART: [idev] UDS.KEYID = 0
1,176,511 ready_for_fw is high
1,176,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,460 UART: [idev] Erasing UDS.KEYID = 0
1,201,555 UART: [idev] Sha1 KeyId Algorithm
1,210,033 UART: [idev] --
1,210,953 UART: [ldev] ++
1,211,121 UART: [ldev] CDI.KEYID = 6
1,211,484 UART: [ldev] SUBJECT.KEYID = 5
1,211,910 UART: [ldev] AUTHORITY.KEYID = 7
1,212,373 UART: [ldev] FE.KEYID = 1
1,217,641 UART: [ldev] Erasing FE.KEYID = 1
1,244,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,273 UART: [ldev] --
1,283,538 UART: [fwproc] Wait for Commands...
1,284,348 UART: [fwproc] Recv command 0x46574c44
1,285,076 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,704 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,874 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,031 >>> mbox cmd response: success
2,828,105 UART: [afmc] ++
2,828,273 UART: [afmc] CDI.KEYID = 6
2,828,635 UART: [afmc] SUBJECT.KEYID = 7
2,829,060 UART: [afmc] AUTHORITY.KEYID = 5
2,864,333 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,120 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,868 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,577 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,460 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,161 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,919 UART: [afmc] --
2,907,887 UART: [cold-reset] --
2,908,829 UART: [state] Locking Datavault
2,909,824 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,428 UART: [state] Locking ICCM
2,910,978 UART: [exit] Launching FMC @ 0x40000130
2,916,308 UART:
2,916,324 UART: Running Caliptra FMC ...
2,916,732 UART:
2,916,786 UART: [state] CFI Enabled
2,927,472 UART: [fht] FMC Alias Private Key: 7
3,046,174 UART: [art] Extend RT PCRs Done
3,046,602 UART: [art] Lock RT PCRs Done
3,048,058 UART: [art] Populate DV Done
3,056,073 UART: [fht] FMC Alias Private Key: 7
3,057,093 UART: [art] Derive CDI
3,057,373 UART: [art] Store in slot 0x4
3,142,930 UART: [art] Derive Key Pair
3,143,290 UART: [art] Store priv key in slot 0x5
3,156,660 UART: [art] Derive Key Pair - Done
3,171,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,711 UART: [art] PUB.X = 73620B009BA1E4A4752CF3FB7538F3A447EF2A006B14CB8057847A53B07349970EDB4A6F48BB08275B09960B52C0B918
3,194,420 UART: [art] PUB.Y = FE089DDD43E7157A9F186BEA127949F29E908CC393DB82AC842979CDC2F5BD3EFA5FD70A22FE2562E7D2A2F4D14024A4
3,201,380 UART: [art] SIG.R = A8936C2FA3053D54B1C14A0A936E152BB110691470540F5BC0B916C3C713C1B645B7CDCA5D50697103031B3DB70A4FAF
3,208,136 UART: [art] SIG.S = 5FC809B55594529D073CADAD46AD0F378B9EF04BE0B1D9CD773F9BC4D68F0F22CE0C4952282051FE0E9AA0EBF5AAA0AA
3,231,680 UART: Caliptra RT
3,231,931 UART: [state] CFI Enabled
3,351,190 UART: [rt] RT listening for mailbox commands...
3,351,860 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,002 UART: [rt]cmd =0x44504543, len=40
3,409,446 >>> mbox cmd response data (40 bytes)
3,409,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,548 UART: [rt]cmd =0x44504543, len=96
3,481,844 >>> mbox cmd response data (56 bytes)
3,481,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,678 UART: [rt]cmd =0x44504543, len=96
3,692,957 >>> mbox cmd response data (6236 bytes)
3,692,958 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,749 UART: [rt]cmd =0x53574545, len=84
3,748,067 >>> mbox cmd response data (200 bytes)
3,748,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,748,855 UART:
3,748,871 UART: Running Caliptra ROM ...
3,749,279 UART:
3,749,334 UART: [state] CFI Enabled
3,752,140 UART: [state] LifecycleState = Unprovisioned
3,752,795 UART: [state] DebugLocked = No
3,753,303 UART: [state] WD Timer not started. Device not locked for debugging
3,754,513 UART: [kat] SHA2-256
4,560,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,564,288 UART: [kat] ++
4,564,440 UART: [kat] sha1
4,568,634 UART: [kat] SHA2-256
4,570,574 UART: [kat] SHA2-384
4,573,417 UART: [kat] SHA2-512-ACC
4,575,317 UART: [kat] ECC-384
4,585,074 UART: [kat] HMAC-384Kdf
4,589,752 UART: [kat] LMS
4,838,080 UART: [kat] --
4,838,928 UART: [update-reset] ++
6,198,608 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,199,811 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,355,026 >>> mbox cmd response: success
6,355,026 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,355,291 UART: [update-reset] Copying MAN_2 To MAN_1
6,363,305 UART: [update-reset Success] --
6,364,284 UART: [state] Locking Datavault
6,365,160 UART: [state] Locking PCR0, PCR1 and PCR31
6,365,764 UART: [state] Locking ICCM
6,366,244 UART: [exit] Launching FMC @ 0x40000130
6,371,574 UART:
6,371,590 UART: Running Caliptra FMC ...
6,371,998 UART:
6,372,052 UART: [state] CFI Enabled
6,461,287 UART: [art] Extend RT PCRs Done
6,461,715 UART: [art] Lock RT PCRs Done
6,463,018 UART: [art] Populate DV Done
6,471,091 UART: [fht] FMC Alias Private Key: 7
6,472,027 UART: [art] Derive CDI
6,472,307 UART: [art] Store in slot 0x4
6,558,150 UART: [art] Derive Key Pair
6,558,510 UART: [art] Store priv key in slot 0x5
6,571,114 UART: [art] Derive Key Pair - Done
6,586,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,601,299 UART: [art] Erasing AUTHORITY.KEYID = 7
6,602,064 UART: [art] PUB.X = 98D2BB9D6F35B43A15E7B2F00F251C7C1E5E47F91BE0AB1ED75B96361A1FE91606AE387317BECA655440EF5841C29F86
6,608,838 UART: [art] PUB.Y = F011CB0D3FD78F97294CB389F63D7CC29E6CFBDD02C3DA1D221C7F7058F7D42596F6DC7EB50267F693BFE152560C1781
6,615,788 UART: [art] SIG.R = 4686F6CC255410BE941ED6BD6ED8230B1DAB6778DF2BBD8B8087F46E94A2864D609E607658DD9E9554E27BA2A9E79FF8
6,622,565 UART: [art] SIG.S = 1D93C54690E5F8E322E344F8E67AF97EF44F622732B744040F5D8C65B9744FB9A7A2B8DB713182916A6E6EB98BC59712
6,646,697 UART: Caliptra RT
6,646,948 UART: [state] CFI Enabled
7,010,169 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,040,770 UART: [rt]cmd =0x53574545, len=84
7,066,280 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,041 ready_for_fw is high
1,060,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,692 >>> mbox cmd response: success
2,740,221 UART:
2,740,237 UART: Running Caliptra FMC ...
2,740,645 UART:
2,740,699 UART: [state] CFI Enabled
2,751,249 UART: [fht] FMC Alias Private Key: 7
2,870,529 UART: [art] Extend RT PCRs Done
2,870,957 UART: [art] Lock RT PCRs Done
2,872,535 UART: [art] Populate DV Done
2,880,530 UART: [fht] FMC Alias Private Key: 7
2,881,606 UART: [art] Derive CDI
2,881,886 UART: [art] Store in slot 0x4
2,967,603 UART: [art] Derive Key Pair
2,967,963 UART: [art] Store priv key in slot 0x5
2,981,309 UART: [art] Derive Key Pair - Done
2,996,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,120 UART: [art] PUB.X = 0D32639F2FFFA84C0732195D8C1DADA3025536D452AADBC0AA0EE33F5ECB0972C591D666B4194F3E4F532A62CE422D9E
3,018,889 UART: [art] PUB.Y = 060F01E1DF603A48CF016D9211C1F4EC81B24298C3E3F605853AA58BFFF22C2CD943A83F281F2EBB430535428D4D186B
3,025,827 UART: [art] SIG.R = 1ABFD175A8B272C66D212E7C541E1E416B489581323783EDC34B0524CFB5EF5378AAFA8AD9A6338BFBC11741C1DA9B3B
3,032,608 UART: [art] SIG.S = 265E0A6BC7C9F47A6A85224CDA402848707F9034463833B26724BD7AA38E8D9FCC87147DEC74018AED7E1EF45F82103C
3,056,156 UART: Caliptra RT
3,056,407 UART: [state] CFI Enabled
3,176,043 UART: [rt] RT listening for mailbox commands...
3,176,713 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,817 UART: [rt]cmd =0x44504543, len=40
3,234,263 >>> mbox cmd response data (40 bytes)
3,234,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,093 UART: [rt]cmd =0x44504543, len=96
3,307,247 >>> mbox cmd response data (56 bytes)
3,307,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,337,073 UART: [rt]cmd =0x44504543, len=96
3,517,759 >>> mbox cmd response data (6236 bytes)
3,517,760 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,547,461 UART: [rt]cmd =0x53574545, len=84
3,572,739 >>> mbox cmd response data (200 bytes)
3,572,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,064,103 >>> mbox cmd response: success
6,064,103 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,077,576 UART:
6,077,592 UART: Running Caliptra FMC ...
6,078,000 UART:
6,078,054 UART: [state] CFI Enabled
6,167,019 UART: [art] Extend RT PCRs Done
6,167,447 UART: [art] Lock RT PCRs Done
6,168,664 UART: [art] Populate DV Done
6,176,915 UART: [fht] FMC Alias Private Key: 7
6,178,091 UART: [art] Derive CDI
6,178,371 UART: [art] Store in slot 0x4
6,264,268 UART: [art] Derive Key Pair
6,264,628 UART: [art] Store priv key in slot 0x5
6,277,698 UART: [art] Derive Key Pair - Done
6,292,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,308,301 UART: [art] Erasing AUTHORITY.KEYID = 7
6,309,066 UART: [art] PUB.X = CB9E44A8491A568D370D948088013018D2BB133EC0F344C242C763A294E449724A080FB84D72947C3E2242088C93AD9D
6,315,813 UART: [art] PUB.Y = 19E3CED4330CADB7E00CE021792829991801DC8D624B142E0B5810B2ADE7E7FDDAD63897539F509D72626E7FEFBBFB60
6,322,763 UART: [art] SIG.R = 3E1BCDF214E5D6FEA04AA68E93E20BCDBD3A6189210848AA40EF5FCC3801A8BFA879BEAD40AEE4C9D86A87C324B95E09
6,329,547 UART: [art] SIG.S = 2998CAF4F510DDB12624679242464127031940EFB3BD446CB3C74A2D0CB771F0EA05B59D15A20AECC34D83D5EEE8BF01
6,353,590 UART: Caliptra RT
6,353,841 UART: [state] CFI Enabled
6,715,094 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,745,907 UART: [rt]cmd =0x53574545, len=84
6,771,469 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,051 UART: [state] LifecycleState = Unprovisioned
85,706 UART: [state] DebugLocked = No
86,288 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
893,175 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,300 UART: [kat] ++
897,452 UART: [kat] sha1
901,680 UART: [kat] SHA2-256
903,620 UART: [kat] SHA2-384
906,385 UART: [kat] SHA2-512-ACC
908,286 UART: [kat] ECC-384
917,833 UART: [kat] HMAC-384Kdf
922,385 UART: [kat] LMS
1,170,713 UART: [kat] --
1,171,642 UART: [cold-reset] ++
1,172,126 UART: [fht] FHT @ 0x50003400
1,174,729 UART: [idev] ++
1,174,897 UART: [idev] CDI.KEYID = 6
1,175,257 UART: [idev] SUBJECT.KEYID = 7
1,175,681 UART: [idev] UDS.KEYID = 0
1,176,026 ready_for_fw is high
1,176,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,693 UART: [idev] Erasing UDS.KEYID = 0
1,201,752 UART: [idev] Sha1 KeyId Algorithm
1,210,374 UART: [idev] --
1,211,376 UART: [ldev] ++
1,211,544 UART: [ldev] CDI.KEYID = 6
1,211,907 UART: [ldev] SUBJECT.KEYID = 5
1,212,333 UART: [ldev] AUTHORITY.KEYID = 7
1,212,796 UART: [ldev] FE.KEYID = 1
1,217,806 UART: [ldev] Erasing FE.KEYID = 1
1,244,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,584 UART: [ldev] --
1,284,021 UART: [fwproc] Wait for Commands...
1,284,655 UART: [fwproc] Recv command 0x46574c44
1,285,383 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,267 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,604 >>> mbox cmd response: success
2,829,662 UART: [afmc] ++
2,829,830 UART: [afmc] CDI.KEYID = 6
2,830,192 UART: [afmc] SUBJECT.KEYID = 7
2,830,617 UART: [afmc] AUTHORITY.KEYID = 5
2,866,126 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,455 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,164 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,047 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,748 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,528 UART: [afmc] --
2,909,606 UART: [cold-reset] --
2,910,588 UART: [state] Locking Datavault
2,911,771 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,375 UART: [state] Locking ICCM
2,912,859 UART: [exit] Launching FMC @ 0x40000130
2,918,189 UART:
2,918,205 UART: Running Caliptra FMC ...
2,918,613 UART:
2,918,756 UART: [state] CFI Enabled
2,929,150 UART: [fht] FMC Alias Private Key: 7
3,048,454 UART: [art] Extend RT PCRs Done
3,048,882 UART: [art] Lock RT PCRs Done
3,050,522 UART: [art] Populate DV Done
3,058,741 UART: [fht] FMC Alias Private Key: 7
3,059,807 UART: [art] Derive CDI
3,060,087 UART: [art] Store in slot 0x4
3,145,628 UART: [art] Derive Key Pair
3,145,988 UART: [art] Store priv key in slot 0x5
3,158,832 UART: [art] Derive Key Pair - Done
3,173,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,194 UART: [art] PUB.X = 7EC4621746EE3C6F95AC3D34958E6CF537A4D4BBC96F78587969D051820E7EF91213A1458F0B5BEA3AC4ED2C36776808
3,196,959 UART: [art] PUB.Y = 19BA135E4964810295759CA62187B4DE225D5FE404C63E2D6F0A02E84B44E183FCF6FC84902BE542ED5DD68921F13CD1
3,203,901 UART: [art] SIG.R = 4E892656142A646DCA101486B5CCD2E325ED9CFC0F26AFA1332D090730CC1F09129B43D5D51F5FA05CF70A44384E1086
3,210,660 UART: [art] SIG.S = 60980F4B72BE4D29759DED626CF616F89E43FE33C6D852F87FC2E76C4D9B2C5AF5DCCF37CA326DC494D4408F71AB9235
3,234,511 UART: Caliptra RT
3,234,854 UART: [state] CFI Enabled
3,354,252 UART: [rt] RT listening for mailbox commands...
3,354,922 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,940 UART: [rt]cmd =0x44504543, len=40
3,412,402 >>> mbox cmd response data (40 bytes)
3,412,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,214 UART: [rt]cmd =0x44504543, len=96
3,484,674 >>> mbox cmd response data (56 bytes)
3,484,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,416 UART: [rt]cmd =0x44504543, len=96
3,696,571 >>> mbox cmd response data (6236 bytes)
3,696,572 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,609 UART: [rt]cmd =0x53574545, len=84
3,752,641 >>> mbox cmd response data (200 bytes)
3,752,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,753,673 UART:
3,753,689 UART: Running Caliptra ROM ...
3,754,097 UART:
3,754,239 UART: [state] CFI Enabled
3,757,217 UART: [state] LifecycleState = Unprovisioned
3,757,872 UART: [state] DebugLocked = No
3,758,520 UART: [state] WD Timer not started. Device not locked for debugging
3,759,766 UART: [kat] SHA2-256
4,565,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,569,541 UART: [kat] ++
4,569,693 UART: [kat] sha1
4,573,931 UART: [kat] SHA2-256
4,575,871 UART: [kat] SHA2-384
4,578,624 UART: [kat] SHA2-512-ACC
4,580,524 UART: [kat] ECC-384
4,590,157 UART: [kat] HMAC-384Kdf
4,594,875 UART: [kat] LMS
4,843,203 UART: [kat] --
4,844,379 UART: [update-reset] ++
6,203,341 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,204,490 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,359,705 >>> mbox cmd response: success
6,359,705 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,360,054 UART: [update-reset] Copying MAN_2 To MAN_1
6,368,068 UART: [update-reset Success] --
6,368,987 UART: [state] Locking Datavault
6,369,763 UART: [state] Locking PCR0, PCR1 and PCR31
6,370,367 UART: [state] Locking ICCM
6,370,789 UART: [exit] Launching FMC @ 0x40000130
6,376,119 UART:
6,376,135 UART: Running Caliptra FMC ...
6,376,543 UART:
6,376,686 UART: [state] CFI Enabled
6,465,717 UART: [art] Extend RT PCRs Done
6,466,145 UART: [art] Lock RT PCRs Done
6,467,562 UART: [art] Populate DV Done
6,475,719 UART: [fht] FMC Alias Private Key: 7
6,476,881 UART: [art] Derive CDI
6,477,161 UART: [art] Store in slot 0x4
6,563,090 UART: [art] Derive Key Pair
6,563,450 UART: [art] Store priv key in slot 0x5
6,577,248 UART: [art] Derive Key Pair - Done
6,592,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,607,019 UART: [art] Erasing AUTHORITY.KEYID = 7
6,607,784 UART: [art] PUB.X = AC8A48B8BF75DF36C0549E94121A07D257B8FFE1CD8BE9FE367BDD9B19C674723110DAE7C37430C360DFBB9F757F2440
6,614,565 UART: [art] PUB.Y = 6FE0D541D5C2252AE26AB78D5FAF856CFEA441AA9557A7C16796A9F04FECB1C676C8F1EB16C9576685BA4C9046BF2B55
6,621,531 UART: [art] SIG.R = B96BCE837424CD8E58785C8C66A4616B216AA2BBE5471E38DF43676EF05DCFB58183D2981F620A52BFD623204B45F564
6,628,302 UART: [art] SIG.S = 1F56D1C5E5697AB2B53E36487F7BBFCA91885007687512805947126CC1D68380F1EC00B207320352ADCC5BA8C3C89BB4
6,651,579 UART: Caliptra RT
6,651,922 UART: [state] CFI Enabled
7,020,170 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,051,143 UART: [rt]cmd =0x53574545, len=84
7,077,271 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,866 ready_for_fw is high
1,059,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,447 >>> mbox cmd response: success
2,741,030 UART:
2,741,046 UART: Running Caliptra FMC ...
2,741,454 UART:
2,741,597 UART: [state] CFI Enabled
2,752,331 UART: [fht] FMC Alias Private Key: 7
2,871,355 UART: [art] Extend RT PCRs Done
2,871,783 UART: [art] Lock RT PCRs Done
2,873,115 UART: [art] Populate DV Done
2,881,214 UART: [fht] FMC Alias Private Key: 7
2,882,242 UART: [art] Derive CDI
2,882,522 UART: [art] Store in slot 0x4
2,967,945 UART: [art] Derive Key Pair
2,968,305 UART: [art] Store priv key in slot 0x5
2,981,669 UART: [art] Derive Key Pair - Done
2,996,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,926 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,691 UART: [art] PUB.X = FADD3B9741265E0B39B72541D46FAC5F34739CF43ADE244385F8C91FDEF9154A3F86F1AA2A5C0F0D0FC9BB48DE2956EA
3,019,469 UART: [art] PUB.Y = 8AF0B516BF6FC81ABF0E0370220017539C35F1B48921FEB7EE9F4CEFFBA6402C5A3F3A9BEDB95CDA91868F49C9F9D40C
3,026,410 UART: [art] SIG.R = DD2616A14AD3F3BD10FE1BC70ADEE248CF948038481BB19262A5EE2F8B18D6F8674C9EE3D8D402EF61CFC6288DA419C3
3,033,192 UART: [art] SIG.S = F307B04C898C9E2FFE80B59715E854199DDFE89A8AA97C87AC004FFD98154722BFD8FFEDBA9B8BEF2D4DDE6BF6520FE2
3,057,422 UART: Caliptra RT
3,057,765 UART: [state] CFI Enabled
3,177,235 UART: [rt] RT listening for mailbox commands...
3,177,905 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,221 UART: [rt]cmd =0x44504543, len=40
3,235,817 >>> mbox cmd response data (40 bytes)
3,235,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,765 UART: [rt]cmd =0x44504543, len=96
3,308,611 >>> mbox cmd response data (56 bytes)
3,308,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,338,559 UART: [rt]cmd =0x44504543, len=96
3,519,536 >>> mbox cmd response data (6236 bytes)
3,519,537 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,666 UART: [rt]cmd =0x53574545, len=84
3,574,902 >>> mbox cmd response data (200 bytes)
3,574,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,066,881 >>> mbox cmd response: success
6,066,881 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,079,744 UART:
6,079,760 UART: Running Caliptra FMC ...
6,080,168 UART:
6,080,311 UART: [state] CFI Enabled
6,170,076 UART: [art] Extend RT PCRs Done
6,170,504 UART: [art] Lock RT PCRs Done
6,171,519 UART: [art] Populate DV Done
6,179,774 UART: [fht] FMC Alias Private Key: 7
6,180,776 UART: [art] Derive CDI
6,181,056 UART: [art] Store in slot 0x4
6,266,825 UART: [art] Derive Key Pair
6,267,185 UART: [art] Store priv key in slot 0x5
6,280,351 UART: [art] Derive Key Pair - Done
6,295,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,310,561 UART: [art] Erasing AUTHORITY.KEYID = 7
6,311,326 UART: [art] PUB.X = 9EACF5F911B50D3E89F056B9AA33F16EB949D6DAE8C0381C822DABFCDA7C2B0B5F4CB9B844B41629FED4DE34D8209D0E
6,318,113 UART: [art] PUB.Y = C6E3377BF15CEEE49D7597896D39454B6A1AA1D27E7BB9D8B67C7211C615724EF9F7F43FEEBB942BD66FC789599719DA
6,325,075 UART: [art] SIG.R = 7E10CC0A28B7DEA7B66BBDE762ABB300A643B5427DC9E29A8FACEA33D2A7F37D4214D04B7C9524678C2492041187B57C
6,331,829 UART: [art] SIG.S = C0ABB1A54EE6E879023C0A891BAAD296D7E618411DDCA55764129A5C873CFE8CEAF2E36CD1FAD0537966C8CA5D05114C
6,355,490 UART: Caliptra RT
6,355,833 UART: [state] CFI Enabled
6,723,597 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,754,164 UART: [rt]cmd =0x53574545, len=84
6,780,140 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,902 writing to cptra_bootfsm_go
192,960 UART:
193,337 UART: Running Caliptra ROM ...
194,477 UART:
194,625 UART: [state] CFI Enabled
261,922 UART: [state] LifecycleState = Unprovisioned
263,840 UART: [state] DebugLocked = No
266,821 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,698 UART: [kat] SHA2-256
441,464 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,960 UART: [kat] ++
452,441 UART: [kat] sha1
463,487 UART: [kat] SHA2-256
466,208 UART: [kat] SHA2-384
471,934 UART: [kat] SHA2-512-ACC
474,304 UART: [kat] ECC-384
2,767,014 UART: [kat] HMAC-384Kdf
2,798,104 UART: [kat] LMS
3,988,409 UART: [kat] --
3,992,671 UART: [cold-reset] ++
3,993,902 UART: [fht] Storing FHT @ 0x50003400
4,005,528 UART: [idev] ++
4,006,096 UART: [idev] CDI.KEYID = 6
4,007,038 UART: [idev] SUBJECT.KEYID = 7
4,008,304 UART: [idev] UDS.KEYID = 0
4,009,424 ready_for_fw is high
4,009,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,158,801 UART: [idev] Erasing UDS.KEYID = 0
7,348,662 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,143 UART: [idev] --
7,374,516 UART: [ldev] ++
7,375,141 UART: [ldev] CDI.KEYID = 6
7,376,052 UART: [ldev] SUBJECT.KEYID = 5
7,377,269 UART: [ldev] AUTHORITY.KEYID = 7
7,378,555 UART: [ldev] FE.KEYID = 1
7,421,003 UART: [ldev] Erasing FE.KEYID = 1
10,757,378 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,632 UART: [ldev] --
13,134,606 UART: [fwproc] Waiting for Commands...
13,137,343 UART: [fwproc] Received command 0x46574c44
13,139,523 UART: [fwproc] Received Image of size 118548 bytes
17,249,199 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,326,873 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,400,043 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,728,123 >>> mbox cmd response: success
17,731,923 UART: [afmc] ++
17,732,537 UART: [afmc] CDI.KEYID = 6
17,733,453 UART: [afmc] SUBJECT.KEYID = 7
17,734,673 UART: [afmc] AUTHORITY.KEYID = 5
21,092,498 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,109 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,392 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,850 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,547 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,991 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,918 UART: [afmc] --
23,464,950 UART: [cold-reset] --
23,468,594 UART: [state] Locking Datavault
23,474,440 UART: [state] Locking PCR0, PCR1 and PCR31
23,476,194 UART: [state] Locking ICCM
23,477,263 UART: [exit] Launching FMC @ 0x40000130
23,485,662 UART:
23,485,895 UART: Running Caliptra FMC ...
23,486,992 UART:
23,487,156 UART: [state] CFI Enabled
23,554,092 UART: [fht] FMC Alias Private Key: 7
25,894,301 UART: [art] Extend RT PCRs Done
25,895,555 UART: [art] Lock RT PCRs Done
25,897,187 UART: [art] Populate DV Done
25,902,657 UART: [fht] FMC Alias Private Key: 7
25,904,189 UART: [art] Derive CDI
25,904,955 UART: [art] Store in slot 0x4
25,963,092 UART: [art] Derive Key Pair
25,964,097 UART: [art] Store priv key in slot 0x5
29,256,989 UART: [art] Derive Key Pair - Done
29,269,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,774 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,296 UART: [art] PUB.X = EE7DA354389761E1510180CD98E469A92D142B2B7632CD6DD88CFE4DE88BC8B80E8E021925CD6072AD7886F4C411586D
31,569,579 UART: [art] PUB.Y = 1D954A29FEA2ABC87F4EF6A82C88E264B604AD3C41A9E8AF28DDAF7593728B4AADBE4E0C36F838FD37848464E6A2B6AD
31,576,830 UART: [art] SIG.R = 574C2BB1C5672D55657D414DD4138DF2B9DB9AC535D9C05CBDAD48F64C807797C2579A006605EB3D8B3676C5A4A776DD
31,584,227 UART: [art] SIG.S = D3C1DC47A2306F41D3FB0DC92DC15A087CDA3C8C12DE3E9D3A35C89A96BBD843E8C54F9FC5FD51AFE57EBDADFB903FE7
32,888,789 UART: Caliptra RT
32,889,504 UART: [state] CFI Enabled
33,066,524 UART: [rt] RT listening for mailbox commands...
33,068,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,099,170 UART: [rt]cmd =0x44504543, len=96
38,879,034 >>> mbox cmd response data (6236 bytes)
38,908,339 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,938,910 UART: [rt]cmd =0x53574545, len=84
38,942,383 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,783,618 ready_for_fw is high
3,784,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,961,256 >>> mbox cmd response: success
23,649,173 UART:
23,649,580 UART: Running Caliptra FMC ...
23,650,793 UART:
23,650,987 UART: [state] CFI Enabled
23,721,157 UART: [fht] FMC Alias Private Key: 7
26,061,165 UART: [art] Extend RT PCRs Done
26,062,386 UART: [art] Lock RT PCRs Done
26,064,018 UART: [art] Populate DV Done
26,069,173 UART: [fht] FMC Alias Private Key: 7
26,070,826 UART: [art] Derive CDI
26,071,643 UART: [art] Store in slot 0x4
26,128,527 UART: [art] Derive Key Pair
26,129,570 UART: [art] Store priv key in slot 0x5
29,422,766 UART: [art] Derive Key Pair - Done
29,435,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,991 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,518 UART: [art] PUB.X = 8C1EC42A5225BC2B5C4FB674500718B97E81468D2E05D075B4DCB37C65FF61554D05F913CD743070F6387D5BBEF3FA7E
31,732,735 UART: [art] PUB.Y = FC0C8EFACCD8FC2826577384EB93B38585DF45D46F20BB744C0004F6C13CC9BBF329BD048E2608A909EDB4D96481EAE4
31,739,948 UART: [art] SIG.R = 74A570D4FEA78E364957D9CA82EE42B1AA1BFBCFFEA06E132B618FAAC9ECD6DE24063F7614088696DB29FD0E27F5B062
31,747,435 UART: [art] SIG.S = 1521EA17F07AFA6E7A70310FDF65D3CF65748AB3285DCB827EC620CECF62D1FFEBD6FB4E4441FE6AC0DA9C40FD29D1FC
33,052,645 UART: Caliptra RT
33,053,360 UART: [state] CFI Enabled
33,229,494 UART: [rt] RT listening for mailbox commands...
33,231,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,262,230 UART: [rt]cmd =0x44504543, len=96
39,041,796 >>> mbox cmd response data (6236 bytes)
39,071,318 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,102,051 UART: [rt]cmd =0x53574545, len=84
39,105,720 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,251 UART:
192,612 UART: Running Caliptra ROM ...
193,696 UART:
603,579 UART: [state] CFI Enabled
619,810 UART: [state] LifecycleState = Unprovisioned
621,686 UART: [state] DebugLocked = No
623,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,361 UART: [kat] SHA2-256
797,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,600 UART: [kat] ++
808,068 UART: [kat] sha1
819,230 UART: [kat] SHA2-256
821,949 UART: [kat] SHA2-384
827,152 UART: [kat] SHA2-512-ACC
829,521 UART: [kat] ECC-384
3,113,613 UART: [kat] HMAC-384Kdf
3,125,416 UART: [kat] LMS
4,315,525 UART: [kat] --
4,320,392 UART: [cold-reset] ++
4,321,821 UART: [fht] Storing FHT @ 0x50003400
4,334,644 UART: [idev] ++
4,335,198 UART: [idev] CDI.KEYID = 6
4,336,218 UART: [idev] SUBJECT.KEYID = 7
4,337,387 UART: [idev] UDS.KEYID = 0
4,338,424 ready_for_fw is high
4,338,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,503 UART: [idev] Erasing UDS.KEYID = 0
7,620,683 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,621 UART: [idev] --
7,646,857 UART: [ldev] ++
7,647,425 UART: [ldev] CDI.KEYID = 6
7,648,354 UART: [ldev] SUBJECT.KEYID = 5
7,649,616 UART: [ldev] AUTHORITY.KEYID = 7
7,650,823 UART: [ldev] FE.KEYID = 1
7,660,160 UART: [ldev] Erasing FE.KEYID = 1
10,948,803 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,796 UART: [ldev] --
13,310,050 UART: [fwproc] Waiting for Commands...
13,312,369 UART: [fwproc] Received command 0x46574c44
13,314,547 UART: [fwproc] Received Image of size 118548 bytes
17,414,239 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,277 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,429 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,296 >>> mbox cmd response: success
17,906,367 UART: [afmc] ++
17,906,952 UART: [afmc] CDI.KEYID = 6
17,907,910 UART: [afmc] SUBJECT.KEYID = 7
17,909,119 UART: [afmc] AUTHORITY.KEYID = 5
21,223,098 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,125 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,429 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,810 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,571 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,938 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,199 UART: [afmc] --
23,587,429 UART: [cold-reset] --
23,590,629 UART: [state] Locking Datavault
23,596,845 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,645 UART: [state] Locking ICCM
23,599,822 UART: [exit] Launching FMC @ 0x40000130
23,608,213 UART:
23,608,442 UART: Running Caliptra FMC ...
23,609,537 UART:
23,609,690 UART: [state] CFI Enabled
23,617,561 UART: [fht] FMC Alias Private Key: 7
25,957,708 UART: [art] Extend RT PCRs Done
25,958,922 UART: [art] Lock RT PCRs Done
25,960,482 UART: [art] Populate DV Done
25,966,015 UART: [fht] FMC Alias Private Key: 7
25,967,727 UART: [art] Derive CDI
25,968,538 UART: [art] Store in slot 0x4
26,011,018 UART: [art] Derive Key Pair
26,012,060 UART: [art] Store priv key in slot 0x5
29,253,213 UART: [art] Derive Key Pair - Done
29,265,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,165 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,668 UART: [art] PUB.X = F425261886E0D6A7826DD855EB4634AF5238B55CC63AAD54D170FFBA20C3F0716EE7CC189FBC4C1B00C90D3257027BC3
31,554,923 UART: [art] PUB.Y = 57CA739AE394A2CA8C2FF7B5D8CE98E67CB102ABB9F4DF8395CC376D14DEC530C6C4E84B5D5DE53383C07D4B80B926DB
31,562,215 UART: [art] SIG.R = 098567162002C3B8F999309E277736E0EAD3F67812C139F0E0C33BB5ACC1E80103AAACCD769AD6A21CE35410C7025272
31,569,559 UART: [art] SIG.S = 852B0A651465D19224CC44C3BA7456D5E09022875CF230F2664C79E5BFEDD8BE953D7B73C955F1A19EB5E03CCA6B549A
32,874,691 UART: Caliptra RT
32,875,399 UART: [state] CFI Enabled
33,008,384 UART: [rt] RT listening for mailbox commands...
33,010,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,040,962 UART: [rt]cmd =0x44504543, len=96
38,726,492 >>> mbox cmd response data (6236 bytes)
38,755,807 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,786,462 UART: [rt]cmd =0x53574545, len=84
38,790,054 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
4,129,316 ready_for_fw is high
4,129,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,153,646 >>> mbox cmd response: success
23,793,977 UART:
23,794,370 UART: Running Caliptra FMC ...
23,795,475 UART:
23,795,626 UART: [state] CFI Enabled
23,803,567 UART: [fht] FMC Alias Private Key: 7
26,143,615 UART: [art] Extend RT PCRs Done
26,144,838 UART: [art] Lock RT PCRs Done
26,146,489 UART: [art] Populate DV Done
26,151,712 UART: [fht] FMC Alias Private Key: 7
26,153,307 UART: [art] Derive CDI
26,154,040 UART: [art] Store in slot 0x4
26,196,647 UART: [art] Derive Key Pair
26,197,683 UART: [art] Store priv key in slot 0x5
29,439,620 UART: [art] Derive Key Pair - Done
29,452,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,053 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,553 UART: [art] PUB.X = 2A0242B409804AE7523B2E8700AA960662C7C7693E0F58347EB64EECA87B285BCE49E50C7478034C47AEF6502CBB37F7
31,741,852 UART: [art] PUB.Y = 2120F0488806E9B78DFCB73C0B641249C2216C6AAC0DDEDED1C83A15769517913B276F664F07E14C6E9B014099660A81
31,749,046 UART: [art] SIG.R = 384E2FC11B5B29C47B89113F13A5658A1141ED8C1748FBB2BE0E22A981220E37D446B350FE6D21FA0CCF39D887833B8F
31,756,439 UART: [art] SIG.S = B3984967CDD0A8923C2334248B978860D8FB93FD495C8E6D0D9C8029A011014A655F385CC7A714B5F09B909479310118
33,061,622 UART: Caliptra RT
33,062,341 UART: [state] CFI Enabled
33,195,918 UART: [rt] RT listening for mailbox commands...
33,197,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,228,516 UART: [rt]cmd =0x44504543, len=96
38,913,770 >>> mbox cmd response data (6236 bytes)
38,943,012 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,973,556 UART: [rt]cmd =0x53574545, len=84
38,977,804 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,833 writing to cptra_bootfsm_go
193,081 UART:
193,457 UART: Running Caliptra ROM ...
194,570 UART:
194,711 UART: [state] CFI Enabled
264,253 UART: [state] LifecycleState = Unprovisioned
266,224 UART: [state] DebugLocked = No
268,384 UART: [state] WD Timer not started. Device not locked for debugging
272,986 UART: [kat] SHA2-256
452,615 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,422 UART: [kat] ++
463,867 UART: [kat] sha1
473,742 UART: [kat] SHA2-256
476,392 UART: [kat] SHA2-384
483,254 UART: [kat] SHA2-512-ACC
485,605 UART: [kat] ECC-384
2,947,255 UART: [kat] HMAC-384Kdf
2,971,077 UART: [kat] LMS
3,447,546 UART: [kat] --
3,452,462 UART: [cold-reset] ++
3,454,177 UART: [fht] FHT @ 0x50003400
3,463,940 UART: [idev] ++
3,464,500 UART: [idev] CDI.KEYID = 6
3,465,533 UART: [idev] SUBJECT.KEYID = 7
3,466,706 UART: [idev] UDS.KEYID = 0
3,467,749 ready_for_fw is high
3,467,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,014 UART: [idev] Erasing UDS.KEYID = 0
5,984,331 UART: [idev] Sha1 KeyId Algorithm
6,009,333 UART: [idev] --
6,015,024 UART: [ldev] ++
6,015,624 UART: [ldev] CDI.KEYID = 6
6,016,540 UART: [ldev] SUBJECT.KEYID = 5
6,017,699 UART: [ldev] AUTHORITY.KEYID = 7
6,018,986 UART: [ldev] FE.KEYID = 1
6,057,235 UART: [ldev] Erasing FE.KEYID = 1
8,567,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,240 UART: [ldev] --
10,374,607 UART: [fwproc] Wait for Commands...
10,377,286 UART: [fwproc] Recv command 0x46574c44
10,379,315 UART: [fwproc] Recv'd Img size: 118548 bytes
13,870,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,263 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,018,246 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,348 >>> mbox cmd response: success
14,350,638 UART: [afmc] ++
14,351,257 UART: [afmc] CDI.KEYID = 6
14,352,165 UART: [afmc] SUBJECT.KEYID = 7
14,353,380 UART: [afmc] AUTHORITY.KEYID = 5
16,896,320 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,976 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,777 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,837 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,391 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,710,482 UART: [afmc] --
18,713,688 UART: [cold-reset] --
18,716,785 UART: [state] Locking Datavault
18,722,296 UART: [state] Locking PCR0, PCR1 and PCR31
18,724,106 UART: [state] Locking ICCM
18,725,536 UART: [exit] Launching FMC @ 0x40000130
18,733,985 UART:
18,734,224 UART: Running Caliptra FMC ...
18,735,251 UART:
18,735,399 UART: [state] CFI Enabled
18,793,484 UART: [fht] FMC Alias Private Key: 7
20,559,733 UART: [art] Extend RT PCRs Done
20,560,952 UART: [art] Lock RT PCRs Done
20,562,493 UART: [art] Populate DV Done
20,568,126 UART: [fht] FMC Alias Private Key: 7
20,569,617 UART: [art] Derive CDI
20,570,355 UART: [art] Store in slot 0x4
20,625,774 UART: [art] Derive Key Pair
20,626,775 UART: [art] Store priv key in slot 0x5
23,089,839 UART: [art] Derive Key Pair - Done
23,102,429 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,815,277 UART: [art] Erasing AUTHORITY.KEYID = 7
24,816,769 UART: [art] PUB.X = B64A0220D8655DBEC2BE02671040FB57B94D78122E3449F3295089AF919BEBD8B2C14329F2EF2F1A1B847FE526D67C05
24,824,012 UART: [art] PUB.Y = 39F02B47F7BBC15757A1B9458E6A3AFB1C6A66A36CACB94F5E7D7AB739EEF5C2D884C8AFC0A5976473712151427D5481
24,831,298 UART: [art] SIG.R = 93DAD547213F13DC259F8A00BECDA4192CA99243BE4DA39E8DF3ADE783E95CF791763BCEFC9D9AA5D912FD0AE9E1B6D0
24,838,696 UART: [art] SIG.S = F29A2C0ACDC8632273C83178B0D115FA2B91A276AAEC2E23C1ED80E1144E5751615D4AB0DB3097697A291A55CCC1C285
25,817,696 UART: Caliptra RT
25,818,408 UART: [state] CFI Enabled
25,997,782 UART: [rt] RT listening for mailbox commands...
25,999,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,030,325 UART: [rt]cmd =0x44504543, len=96
30,406,803 >>> mbox cmd response data (6236 bytes)
30,435,892 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,466,496 UART: [rt]cmd =0x53574545, len=84
30,470,207 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,463,625 ready_for_fw is high
3,464,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,200,110 >>> mbox cmd response: success
18,491,201 UART:
18,491,586 UART: Running Caliptra FMC ...
18,492,772 UART:
18,492,939 UART: [state] CFI Enabled
18,561,150 UART: [fht] FMC Alias Private Key: 7
20,348,636 UART: [art] Extend RT PCRs Done
20,349,846 UART: [art] Lock RT PCRs Done
20,351,524 UART: [art] Populate DV Done
20,357,255 UART: [fht] FMC Alias Private Key: 7
20,358,814 UART: [art] Derive CDI
20,359,629 UART: [art] Store in slot 0x4
20,414,338 UART: [art] Derive Key Pair
20,415,815 UART: [art] Store priv key in slot 0x5
22,878,077 UART: [art] Derive Key Pair - Done
22,891,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,880 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,380 UART: [art] PUB.X = 550CF39471824B499B16F754C3C3BE730A8B1E986A20E575053EEE62E4B9ED8590E4007D10549264CF40FD9A20C17017
24,612,574 UART: [art] PUB.Y = A3D01E99D7A5B14C47D492108A2ACC3CA5208CD929FDDCDB90E8EA00C33616B6FB94881702F05D51F11D6DBED74BAE49
24,619,881 UART: [art] SIG.R = 7DBC751A3B2AAAA9EF61D5A3F08A2E3F90C88AF9C1B2E22B8287A40CCCA1BE0E29341E1C3B40F439F441AD39E9A7C0EC
24,627,273 UART: [art] SIG.S = B5603B138B79AC801719A32391ADB8F359FED989CD4CAE4E40134BA05698806BEC91C60B7EE04001B765ECDA57D99432
25,606,395 UART: Caliptra RT
25,607,099 UART: [state] CFI Enabled
25,786,529 UART: [rt] RT listening for mailbox commands...
25,788,435 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,819,076 UART: [rt]cmd =0x44504543, len=96
30,193,983 >>> mbox cmd response data (6236 bytes)
30,223,171 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,253,654 UART: [rt]cmd =0x53574545, len=84
30,257,451 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
192,443 UART:
192,833 UART: Running Caliptra ROM ...
193,976 UART:
603,697 UART: [state] CFI Enabled
617,727 UART: [state] LifecycleState = Unprovisioned
619,677 UART: [state] DebugLocked = No
621,212 UART: [state] WD Timer not started. Device not locked for debugging
625,757 UART: [kat] SHA2-256
805,368 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,179 UART: [kat] ++
816,659 UART: [kat] sha1
827,608 UART: [kat] SHA2-256
830,341 UART: [kat] SHA2-384
837,043 UART: [kat] SHA2-512-ACC
839,417 UART: [kat] ECC-384
3,282,780 UART: [kat] HMAC-384Kdf
3,294,659 UART: [kat] LMS
3,771,194 UART: [kat] --
3,775,897 UART: [cold-reset] ++
3,777,052 UART: [fht] FHT @ 0x50003400
3,788,025 UART: [idev] ++
3,788,658 UART: [idev] CDI.KEYID = 6
3,789,542 UART: [idev] SUBJECT.KEYID = 7
3,790,853 UART: [idev] UDS.KEYID = 0
3,791,751 ready_for_fw is high
3,791,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,207 UART: [idev] Erasing UDS.KEYID = 0
6,265,577 UART: [idev] Sha1 KeyId Algorithm
6,289,435 UART: [idev] --
6,295,731 UART: [ldev] ++
6,296,315 UART: [ldev] CDI.KEYID = 6
6,297,202 UART: [ldev] SUBJECT.KEYID = 5
6,298,416 UART: [ldev] AUTHORITY.KEYID = 7
6,299,728 UART: [ldev] FE.KEYID = 1
6,312,398 UART: [ldev] Erasing FE.KEYID = 1
8,791,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,870 UART: [ldev] --
10,586,537 UART: [fwproc] Wait for Commands...
10,589,276 UART: [fwproc] Recv command 0x46574c44
10,591,256 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,161,733 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,234,752 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,689 >>> mbox cmd response: success
14,566,160 UART: [afmc] ++
14,566,796 UART: [afmc] CDI.KEYID = 6
14,567,724 UART: [afmc] SUBJECT.KEYID = 7
14,568,944 UART: [afmc] AUTHORITY.KEYID = 5
17,070,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,931 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,747 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,773 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,392 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,724 UART: [afmc] --
18,869,954 UART: [cold-reset] --
18,875,118 UART: [state] Locking Datavault
18,882,272 UART: [state] Locking PCR0, PCR1 and PCR31
18,884,028 UART: [state] Locking ICCM
18,885,267 UART: [exit] Launching FMC @ 0x40000130
18,893,674 UART:
18,893,931 UART: Running Caliptra FMC ...
18,895,039 UART:
18,895,206 UART: [state] CFI Enabled
18,903,049 UART: [fht] FMC Alias Private Key: 7
20,669,567 UART: [art] Extend RT PCRs Done
20,670,780 UART: [art] Lock RT PCRs Done
20,672,271 UART: [art] Populate DV Done
20,677,581 UART: [fht] FMC Alias Private Key: 7
20,679,230 UART: [art] Derive CDI
20,680,254 UART: [art] Store in slot 0x4
20,722,731 UART: [art] Derive Key Pair
20,723,737 UART: [art] Store priv key in slot 0x5
23,150,436 UART: [art] Derive Key Pair - Done
23,163,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,916 UART: [art] Erasing AUTHORITY.KEYID = 7
24,871,426 UART: [art] PUB.X = 999B7FFEFAAD0B49A3F981FA2A8A18B12381A0B910798432EE6D4CCE9B3BABFCBB0FBBB148787E418D3F79F7E1190606
24,878,751 UART: [art] PUB.Y = 94876A788AB4057668866114400D65E921E2B92F59DF566D89C67564DA5D02E76CD3D27B24341C0BF038FE40AC0A46C0
24,885,924 UART: [art] SIG.R = 387C0C26547272412E2944DC40F1C0D9786C07110DC95AF380C90C3F269840416095D621CEA6FCD20A7339C50DBBFE37
24,893,318 UART: [art] SIG.S = E48C7D08E1DB4B0F0FADF319E9052A633D055B12F4322109992B8D6CFCAF87BDB2D77F11C3037691FFB56E21A31BE664
25,871,709 UART: Caliptra RT
25,872,395 UART: [state] CFI Enabled
26,005,267 UART: [rt] RT listening for mailbox commands...
26,007,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,037,726 UART: [rt]cmd =0x44504543, len=96
30,333,256 >>> mbox cmd response data (6236 bytes)
30,362,866 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,393,480 UART: [rt]cmd =0x53574545, len=84
30,397,679 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,781,506 ready_for_fw is high
3,782,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,058 >>> mbox cmd response: success
18,692,990 UART:
18,693,391 UART: Running Caliptra FMC ...
18,694,544 UART:
18,694,709 UART: [state] CFI Enabled
18,702,794 UART: [fht] FMC Alias Private Key: 7
20,469,121 UART: [art] Extend RT PCRs Done
20,470,344 UART: [art] Lock RT PCRs Done
20,472,130 UART: [art] Populate DV Done
20,477,716 UART: [fht] FMC Alias Private Key: 7
20,479,313 UART: [art] Derive CDI
20,480,131 UART: [art] Store in slot 0x4
20,522,619 UART: [art] Derive Key Pair
20,523,661 UART: [art] Store priv key in slot 0x5
22,950,685 UART: [art] Derive Key Pair - Done
22,963,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,890 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,393 UART: [art] PUB.X = D6B13D3CF2FBA2285A1BC916898EAE7FF384EC9661A1F53A92BFF8113F6E57590C9AAF6267AB378BA199BF7581D7EE17
24,678,651 UART: [art] PUB.Y = 448D0CF63DA24D9D07893FA4F70FD588CC678E0C67CE9E59266C89355B70EA7FCFA39EE432B56A3847144917AFC916F1
24,685,964 UART: [art] SIG.R = E3FF03917E42053BD59C8345736D960E51ADC63D954F8B48D3B4462F6CC1ADAE2465163E424BD006092B3622CF1651E1
24,693,326 UART: [art] SIG.S = 369A37555E1F9E9C6B8A7E4E49A50B86A027C331933999AEB59BEC260F9E773371CAA15213A81CA98D95D63CB45018AC
25,672,547 UART: Caliptra RT
25,673,246 UART: [state] CFI Enabled
25,805,009 UART: [rt] RT listening for mailbox commands...
25,806,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,837,702 UART: [rt]cmd =0x44504543, len=96
30,132,398 >>> mbox cmd response data (6236 bytes)
30,161,647 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,192,262 UART: [rt]cmd =0x53574545, len=84
30,196,337 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,009 UART:
192,380 UART: Running Caliptra ROM ...
193,507 UART:
193,656 UART: [state] CFI Enabled
262,873 UART: [state] LifecycleState = Unprovisioned
265,284 UART: [state] DebugLocked = No
268,165 UART: [state] WD Timer not started. Device not locked for debugging
273,573 UART: [kat] SHA2-256
463,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,229 UART: [kat] ++
474,758 UART: [kat] sha1
485,849 UART: [kat] SHA2-256
488,854 UART: [kat] SHA2-384
493,899 UART: [kat] SHA2-512-ACC
496,488 UART: [kat] ECC-384
2,950,531 UART: [kat] HMAC-384Kdf
2,972,436 UART: [kat] LMS
3,504,220 UART: [kat] --
3,508,928 UART: [cold-reset] ++
3,511,351 UART: [fht] FHT @ 0x50003400
3,523,741 UART: [idev] ++
3,524,450 UART: [idev] CDI.KEYID = 6
3,525,475 UART: [idev] SUBJECT.KEYID = 7
3,526,588 UART: [idev] UDS.KEYID = 0
3,527,533 ready_for_fw is high
3,527,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,792 UART: [idev] Erasing UDS.KEYID = 0
6,030,962 UART: [idev] Sha1 KeyId Algorithm
6,053,905 UART: [idev] --
6,058,449 UART: [ldev] ++
6,059,128 UART: [ldev] CDI.KEYID = 6
6,060,052 UART: [ldev] SUBJECT.KEYID = 5
6,061,213 UART: [ldev] AUTHORITY.KEYID = 7
6,062,445 UART: [ldev] FE.KEYID = 1
6,101,429 UART: [ldev] Erasing FE.KEYID = 1
8,603,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,117 UART: [ldev] --
10,413,882 UART: [fwproc] Wait for Commands...
10,415,666 UART: [fwproc] Recv command 0x46574c44
10,417,920 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,109 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,727 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,371 >>> mbox cmd response: success
14,681,619 UART: [afmc] ++
14,682,348 UART: [afmc] CDI.KEYID = 6
14,683,457 UART: [afmc] SUBJECT.KEYID = 7
14,685,005 UART: [afmc] AUTHORITY.KEYID = 5
17,215,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,882 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,019 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,135 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,066 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,282 UART: [afmc] --
19,032,933 UART: [cold-reset] --
19,037,395 UART: [state] Locking Datavault
19,041,680 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,835 UART: [state] Locking ICCM
19,046,583 UART: [exit] Launching FMC @ 0x40000130
19,055,259 UART:
19,055,534 UART: Running Caliptra FMC ...
19,056,643 UART:
19,056,802 UART: [state] CFI Enabled
19,114,943 UART: [fht] FMC Alias Private Key: 7
20,881,323 UART: [art] Extend RT PCRs Done
20,882,538 UART: [art] Lock RT PCRs Done
20,884,395 UART: [art] Populate DV Done
20,889,906 UART: [fht] FMC Alias Private Key: 7
20,891,595 UART: [art] Derive CDI
20,892,421 UART: [art] Store in slot 0x4
20,947,356 UART: [art] Derive Key Pair
20,948,355 UART: [art] Store priv key in slot 0x5
23,411,043 UART: [art] Derive Key Pair - Done
23,423,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,135,573 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,090 UART: [art] PUB.X = 57126B9902542F2F8D52781D3026CA29779073F14F83E2689B2D5467A8C31B9CD201C1A759684969D4925068C53EE1FD
25,144,318 UART: [art] PUB.Y = 16C1C2040A0ED5051C3990046EF2B923F09A68B4AB9C82E0A44EAA98B4D81FAFF61C7415B21725D0C27F41EDD8379B99
25,151,589 UART: [art] SIG.R = 69FD5E79E9E8554F6AA34670EFEAFAF9A6EE25467187324C8E99D4FA572F069FD07EF378FBF54D31F4E0A6750B094D34
25,159,009 UART: [art] SIG.S = 92579BCF4E704A95FD0B5CE0CD118EFDAB257B8A2C06E829041B46B06261E3B74FDADA3FF7E90561A758B65098878046
26,137,525 UART: Caliptra RT
26,138,216 UART: [state] CFI Enabled
26,319,300 UART: [rt] RT listening for mailbox commands...
26,321,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,351,947 UART: [rt]cmd =0x44504543, len=96
30,727,568 >>> mbox cmd response data (6236 bytes)
30,756,989 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,787,597 UART: [rt]cmd =0x53574545, len=84
30,791,906 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,437,515 ready_for_fw is high
3,438,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,827,068 >>> mbox cmd response: success
19,129,197 UART:
19,129,610 UART: Running Caliptra FMC ...
19,130,724 UART:
19,130,876 UART: [state] CFI Enabled
19,198,045 UART: [fht] FMC Alias Private Key: 7
20,964,334 UART: [art] Extend RT PCRs Done
20,965,552 UART: [art] Lock RT PCRs Done
20,967,362 UART: [art] Populate DV Done
20,972,940 UART: [fht] FMC Alias Private Key: 7
20,974,539 UART: [art] Derive CDI
20,975,276 UART: [art] Store in slot 0x4
21,030,213 UART: [art] Derive Key Pair
21,031,256 UART: [art] Store priv key in slot 0x5
23,493,951 UART: [art] Derive Key Pair - Done
23,506,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,279 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,814 UART: [art] PUB.X = 5FAE98E9CA0C143ABD9FEBC7782708EFB1612AE8C778F9A90BDC083CE8163336EF5C0200F2A74B24FF21390BACF880C7
25,228,037 UART: [art] PUB.Y = 73D22971871DD522D13F9591911312C61FC6ED9258CD89A1CC601F7F632BF12E46AB3D51DF4FDE7D153413E9E9E45519
25,235,260 UART: [art] SIG.R = 9F6CB801D006B5856F30F74E0E4F222701EEE465AC349ECCADE00327EFD0A837757359C7A9FAD75FEA8C0BEB8CDD17BA
25,242,677 UART: [art] SIG.S = C181B30C3A1EF26231CAD4DE82F093F77FBAE7A4DAA8B23AB46A6741E72458DCCE959BE6FC74C47C3BA7CB51F454F4A4
26,221,973 UART: Caliptra RT
26,222,689 UART: [state] CFI Enabled
26,402,602 UART: [rt] RT listening for mailbox commands...
26,404,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,435,285 UART: [rt]cmd =0x44504543, len=96
30,808,682 >>> mbox cmd response data (6236 bytes)
30,837,986 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,868,500 UART: [rt]cmd =0x53574545, len=84
30,872,895 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,519 UART:
192,898 UART: Running Caliptra ROM ...
194,002 UART:
603,728 UART: [state] CFI Enabled
618,390 UART: [state] LifecycleState = Unprovisioned
620,768 UART: [state] DebugLocked = No
623,372 UART: [state] WD Timer not started. Device not locked for debugging
627,356 UART: [kat] SHA2-256
817,234 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,049 UART: [kat] ++
828,661 UART: [kat] sha1
839,688 UART: [kat] SHA2-256
842,710 UART: [kat] SHA2-384
849,418 UART: [kat] SHA2-512-ACC
852,006 UART: [kat] ECC-384
3,291,587 UART: [kat] HMAC-384Kdf
3,303,825 UART: [kat] LMS
3,835,655 UART: [kat] --
3,839,514 UART: [cold-reset] ++
3,841,447 UART: [fht] FHT @ 0x50003400
3,852,873 UART: [idev] ++
3,853,547 UART: [idev] CDI.KEYID = 6
3,854,511 UART: [idev] SUBJECT.KEYID = 7
3,855,692 UART: [idev] UDS.KEYID = 0
3,856,624 ready_for_fw is high
3,856,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,098 UART: [idev] Erasing UDS.KEYID = 0
6,326,341 UART: [idev] Sha1 KeyId Algorithm
6,348,434 UART: [idev] --
6,352,637 UART: [ldev] ++
6,353,315 UART: [ldev] CDI.KEYID = 6
6,354,198 UART: [ldev] SUBJECT.KEYID = 5
6,355,411 UART: [ldev] AUTHORITY.KEYID = 7
6,356,640 UART: [ldev] FE.KEYID = 1
6,369,290 UART: [ldev] Erasing FE.KEYID = 1
8,847,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,053 UART: [ldev] --
10,637,273 UART: [fwproc] Wait for Commands...
10,640,174 UART: [fwproc] Recv command 0x46574c44
10,642,479 UART: [fwproc] Recv'd Img size: 118548 bytes
14,134,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,212,363 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,335,980 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,896,731 >>> mbox cmd response: success
14,901,339 UART: [afmc] ++
14,902,063 UART: [afmc] CDI.KEYID = 6
14,903,268 UART: [afmc] SUBJECT.KEYID = 7
14,904,714 UART: [afmc] AUTHORITY.KEYID = 5
17,414,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,135,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,137,774 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,152,881 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,167,995 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,182,927 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,207,173 UART: [afmc] --
19,210,389 UART: [cold-reset] --
19,214,328 UART: [state] Locking Datavault
19,219,707 UART: [state] Locking PCR0, PCR1 and PCR31
19,221,869 UART: [state] Locking ICCM
19,223,489 UART: [exit] Launching FMC @ 0x40000130
19,232,127 UART:
19,232,366 UART: Running Caliptra FMC ...
19,233,469 UART:
19,233,634 UART: [state] CFI Enabled
19,241,911 UART: [fht] FMC Alias Private Key: 7
21,008,107 UART: [art] Extend RT PCRs Done
21,009,334 UART: [art] Lock RT PCRs Done
21,011,127 UART: [art] Populate DV Done
21,016,460 UART: [fht] FMC Alias Private Key: 7
21,018,113 UART: [art] Derive CDI
21,018,859 UART: [art] Store in slot 0x4
21,061,404 UART: [art] Derive Key Pair
21,062,451 UART: [art] Store priv key in slot 0x5
23,489,154 UART: [art] Derive Key Pair - Done
23,502,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,208,534 UART: [art] Erasing AUTHORITY.KEYID = 7
25,210,041 UART: [art] PUB.X = DE98F5EFCFAE91576C00E4C81799B2A139B29E8D72F2B824E377426B9AAC549A9D436735A286A44158E29DAE5CD6E699
25,217,264 UART: [art] PUB.Y = E81D5D9FFFFE23B98A7513EC5DA978C6FE56335DA0AC48F43BEDC274B4547567246A022D43C90F84739048487A48205A
25,224,532 UART: [art] SIG.R = 76C8F620262780590C02DFB6EE574AA71433F0CB30D045ADC50AA98B980DB1F70C5D3551FD0D85A081C04E7B95EF392A
25,231,896 UART: [art] SIG.S = A2246148C7F489EC64F1C324D8EA9D70358F2DC2F2F869A238EFD4888A6683BAFAB72F3A597239F16D6B9C523D4FECDA
26,210,896 UART: Caliptra RT
26,211,611 UART: [state] CFI Enabled
26,344,249 UART: [rt] RT listening for mailbox commands...
26,346,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,376,763 UART: [rt]cmd =0x44504543, len=96
30,671,759 >>> mbox cmd response data (6236 bytes)
30,700,899 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,731,532 UART: [rt]cmd =0x53574545, len=84
30,735,824 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,752,933 ready_for_fw is high
3,753,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,967 >>> mbox cmd response: success
19,300,050 UART:
19,300,459 UART: Running Caliptra FMC ...
19,301,602 UART:
19,301,766 UART: [state] CFI Enabled
19,309,671 UART: [fht] FMC Alias Private Key: 7
21,075,384 UART: [art] Extend RT PCRs Done
21,076,616 UART: [art] Lock RT PCRs Done
21,078,523 UART: [art] Populate DV Done
21,084,061 UART: [fht] FMC Alias Private Key: 7
21,085,773 UART: [art] Derive CDI
21,086,592 UART: [art] Store in slot 0x4
21,129,427 UART: [art] Derive Key Pair
21,130,469 UART: [art] Store priv key in slot 0x5
23,557,582 UART: [art] Derive Key Pair - Done
23,570,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,193 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,712 UART: [art] PUB.X = D16A0382EAE8B118FC8B766F2F908EDC489DD1BE75666E8FB558A2056F4BEFF7F1D25A750917DDC3DE3A1AE1F2B95ACD
25,285,987 UART: [art] PUB.Y = EB800B93C7DD3459A383CDC66B1E941CD5A0100B089235B3BA804E41DD0B72F17E7BF5309ED26F84C91E2F9598B47419
25,293,276 UART: [art] SIG.R = AD336F49178E1B4EC083AE6A75F48A4179E929220FAB7BF8661F7B7D0E1B5F488AD066D556081B560A59A307ABDA1083
25,300,653 UART: [art] SIG.S = 001077CE9F936D9A985CE58C2E0C5D9878AE5FE9A26CA0C1A7C2DFB80DD7212FB69443BD199FF7DB009B3F004AEF6F0B
26,279,564 UART: Caliptra RT
26,280,280 UART: [state] CFI Enabled
26,413,564 UART: [rt] RT listening for mailbox commands...
26,415,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,445,988 UART: [rt]cmd =0x44504543, len=96
30,739,985 >>> mbox cmd response data (6236 bytes)
30,769,213 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,799,830 UART: [rt]cmd =0x53574545, len=84
30,804,070 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,029 UART: [kat] SHA2-256
881,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,075 UART: [kat] ++
886,227 UART: [kat] sha1
890,453 UART: [kat] SHA2-256
892,391 UART: [kat] SHA2-384
895,192 UART: [kat] SHA2-512-ACC
897,093 UART: [kat] ECC-384
902,806 UART: [kat] HMAC-384Kdf
907,430 UART: [kat] LMS
1,475,626 UART: [kat] --
1,476,593 UART: [cold-reset] ++
1,477,147 UART: [fht] Storing FHT @ 0x50003400
1,480,008 UART: [idev] ++
1,480,176 UART: [idev] CDI.KEYID = 6
1,480,536 UART: [idev] SUBJECT.KEYID = 7
1,480,960 UART: [idev] UDS.KEYID = 0
1,481,305 ready_for_fw is high
1,481,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,892 UART: [idev] Erasing UDS.KEYID = 0
1,505,820 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,244 UART: [idev] --
1,515,215 UART: [ldev] ++
1,515,383 UART: [ldev] CDI.KEYID = 6
1,515,746 UART: [ldev] SUBJECT.KEYID = 5
1,516,172 UART: [ldev] AUTHORITY.KEYID = 7
1,516,635 UART: [ldev] FE.KEYID = 1
1,521,911 UART: [ldev] Erasing FE.KEYID = 1
1,547,380 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,432 UART: [ldev] --
1,586,865 UART: [fwproc] Waiting for Commands...
1,587,664 UART: [fwproc] Received command 0x46574c44
1,588,455 UART: [fwproc] Received Image of size 118548 bytes
2,933,283 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,735 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,953 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,276 >>> mbox cmd response: success
3,133,516 UART: [afmc] ++
3,133,684 UART: [afmc] CDI.KEYID = 6
3,134,046 UART: [afmc] SUBJECT.KEYID = 7
3,134,471 UART: [afmc] AUTHORITY.KEYID = 5
3,169,178 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,856 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,636 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,345 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,228 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,911 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,855 UART: [afmc] --
3,212,735 UART: [cold-reset] --
3,213,747 UART: [state] Locking Datavault
3,214,790 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,394 UART: [state] Locking ICCM
3,216,020 UART: [exit] Launching FMC @ 0x40000130
3,221,350 UART:
3,221,366 UART: Running Caliptra FMC ...
3,221,774 UART:
3,221,828 UART: [state] CFI Enabled
3,232,430 UART: [fht] FMC Alias Private Key: 7
3,351,874 UART: [art] Extend RT PCRs Done
3,352,302 UART: [art] Lock RT PCRs Done
3,353,816 UART: [art] Populate DV Done
3,361,975 UART: [fht] FMC Alias Private Key: 7
3,363,155 UART: [art] Derive CDI
3,363,435 UART: [art] Store in slot 0x4
3,449,127 UART: [art] Derive Key Pair
3,449,487 UART: [art] Store priv key in slot 0x5
3,461,748 UART: [art] Derive Key Pair - Done
3,476,621 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,543 UART: [art] PUB.X = 6CCE6406CE16149BFBBC77A790F2A7B170FDA4AE9B282436209A3FDA761068B0C24FBFF3B5EF24B5E4962A453BF5E032
3,499,326 UART: [art] PUB.Y = 97059AE5B55A360F19BA67DC52C0F4EDA5A4917E047F625997824A93AEE245AC37DB88ACF3D3C42E216727D32C94D38A
3,506,275 UART: [art] SIG.R = 725C0B689BEFDE12FC877DFD79A75132E2917B448888A5F228BA1FE7CA17627860A1A26DAF172F6F5A81BCD2E9FE2C7C
3,513,058 UART: [art] SIG.S = 308990CB8C0FC2F6541AF49288E781BB9676137AB6243A6C24CB1EFD534BE7AAFC1B13E89281306EA9ABF4F805EFE4DC
3,537,136 UART: Caliptra RT
3,537,387 UART: [state] CFI Enabled
3,657,876 UART: [rt] RT listening for mailbox commands...
3,658,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,774 UART: [rt]cmd =0x44504543, len=96
3,882,118 >>> mbox cmd response data (6236 bytes)
3,882,119 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,911,980 UART: [rt]cmd =0x53574545, len=84
3,915,330 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,483 ready_for_fw is high
1,362,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,318 >>> mbox cmd response: success
3,043,587 UART:
3,043,603 UART: Running Caliptra FMC ...
3,044,011 UART:
3,044,065 UART: [state] CFI Enabled
3,054,405 UART: [fht] FMC Alias Private Key: 7
3,174,107 UART: [art] Extend RT PCRs Done
3,174,535 UART: [art] Lock RT PCRs Done
3,176,079 UART: [art] Populate DV Done
3,184,516 UART: [fht] FMC Alias Private Key: 7
3,185,606 UART: [art] Derive CDI
3,185,886 UART: [art] Store in slot 0x4
3,271,256 UART: [art] Derive Key Pair
3,271,616 UART: [art] Store priv key in slot 0x5
3,284,715 UART: [art] Derive Key Pair - Done
3,299,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,892 UART: [art] PUB.X = 17CD3BC47ECEB7C21F5178A25294109A9FE09EA03CEAA94383FDF9E7390600555A4009B0D446D9C5F935DDF4934FB9C3
3,322,644 UART: [art] PUB.Y = CA481021A61239263699BA491D47A794C179B20CEDEEB403EAB815E4485C943A72007AC51805EC6201105AA907FA7F7D
3,329,557 UART: [art] SIG.R = 3F5565DCB0B8A7107718EC8C4E01B95F196BE4D2F8338E69ED894D5710052F1BE0DF0B9D5376517A04F5765BCDDED103
3,336,320 UART: [art] SIG.S = 0C25085EF568C42F5BB4155E698DA7A9AF7044B6052D263DB84BB3FF6DA2412EB03076DC9FB6950E947755E7879426D9
3,359,916 UART: Caliptra RT
3,360,167 UART: [state] CFI Enabled
3,481,764 UART: [rt] RT listening for mailbox commands...
3,482,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,036 UART: [rt]cmd =0x44504543, len=96
3,705,226 >>> mbox cmd response data (6236 bytes)
3,705,227 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,734,938 UART: [rt]cmd =0x53574545, len=84
3,738,490 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,424 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,950 UART: [kat] SHA2-256
881,881 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,996 UART: [kat] ++
886,148 UART: [kat] sha1
890,450 UART: [kat] SHA2-256
892,388 UART: [kat] SHA2-384
895,017 UART: [kat] SHA2-512-ACC
896,918 UART: [kat] ECC-384
902,707 UART: [kat] HMAC-384Kdf
907,391 UART: [kat] LMS
1,475,587 UART: [kat] --
1,476,414 UART: [cold-reset] ++
1,476,944 UART: [fht] Storing FHT @ 0x50003400
1,479,773 UART: [idev] ++
1,479,941 UART: [idev] CDI.KEYID = 6
1,480,301 UART: [idev] SUBJECT.KEYID = 7
1,480,725 UART: [idev] UDS.KEYID = 0
1,481,070 ready_for_fw is high
1,481,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,623 UART: [idev] Erasing UDS.KEYID = 0
1,505,761 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,365 UART: [idev] --
1,515,512 UART: [ldev] ++
1,515,680 UART: [ldev] CDI.KEYID = 6
1,516,043 UART: [ldev] SUBJECT.KEYID = 5
1,516,469 UART: [ldev] AUTHORITY.KEYID = 7
1,516,932 UART: [ldev] FE.KEYID = 1
1,522,384 UART: [ldev] Erasing FE.KEYID = 1
1,547,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,793 UART: [ldev] --
1,587,108 UART: [fwproc] Waiting for Commands...
1,587,839 UART: [fwproc] Received command 0x46574c44
1,588,630 UART: [fwproc] Received Image of size 118548 bytes
2,933,602 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,838 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,056 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,287 >>> mbox cmd response: success
3,133,379 UART: [afmc] ++
3,133,547 UART: [afmc] CDI.KEYID = 6
3,133,909 UART: [afmc] SUBJECT.KEYID = 7
3,134,334 UART: [afmc] AUTHORITY.KEYID = 5
3,169,085 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,273 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,053 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,762 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,645 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,328 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,076 UART: [afmc] --
3,211,958 UART: [cold-reset] --
3,212,680 UART: [state] Locking Datavault
3,213,681 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,285 UART: [state] Locking ICCM
3,214,853 UART: [exit] Launching FMC @ 0x40000130
3,220,183 UART:
3,220,199 UART: Running Caliptra FMC ...
3,220,607 UART:
3,220,750 UART: [state] CFI Enabled
3,231,270 UART: [fht] FMC Alias Private Key: 7
3,350,690 UART: [art] Extend RT PCRs Done
3,351,118 UART: [art] Lock RT PCRs Done
3,352,476 UART: [art] Populate DV Done
3,360,705 UART: [fht] FMC Alias Private Key: 7
3,361,791 UART: [art] Derive CDI
3,362,071 UART: [art] Store in slot 0x4
3,447,899 UART: [art] Derive Key Pair
3,448,259 UART: [art] Store priv key in slot 0x5
3,461,432 UART: [art] Derive Key Pair - Done
3,476,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,310 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,075 UART: [art] PUB.X = 072E74D14467025D3E8503140E19B67D723ECDF7A2E24293DDCE5D09C0CB09406898110ED9691B18987BF6B41662E49A
3,498,820 UART: [art] PUB.Y = D0DCCACD48D8455ECD09523DC2CFEFBC1C09D6CB9A5AD677B4458DFF4FEE7D8568DB5DFFF50DB82EC245AF63951D9F14
3,505,795 UART: [art] SIG.R = 6AAA574D84812C74A71B21DC25E68CAAD51D7355B70602D5A5C0CAD6EED902D471392C8AC7BB568D5C4C0BE17CA08FAE
3,512,573 UART: [art] SIG.S = 722626F7BC0C5AB206FA2848519C3950795196B8ADF0E718901E8985E08A5B188A9E87A5AFD16F6AF62780B68BD52E36
3,536,449 UART: Caliptra RT
3,536,792 UART: [state] CFI Enabled
3,656,765 UART: [rt] RT listening for mailbox commands...
3,657,435 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,893 UART: [rt]cmd =0x44504543, len=96
3,879,663 >>> mbox cmd response data (6236 bytes)
3,879,664 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,909,437 UART: [rt]cmd =0x53574545, len=84
3,912,749 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,832 ready_for_fw is high
1,362,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,155 >>> mbox cmd response: success
3,043,346 UART:
3,043,362 UART: Running Caliptra FMC ...
3,043,770 UART:
3,043,913 UART: [state] CFI Enabled
3,054,629 UART: [fht] FMC Alias Private Key: 7
3,174,057 UART: [art] Extend RT PCRs Done
3,174,485 UART: [art] Lock RT PCRs Done
3,176,047 UART: [art] Populate DV Done
3,184,336 UART: [fht] FMC Alias Private Key: 7
3,185,468 UART: [art] Derive CDI
3,185,748 UART: [art] Store in slot 0x4
3,271,216 UART: [art] Derive Key Pair
3,271,576 UART: [art] Store priv key in slot 0x5
3,284,733 UART: [art] Derive Key Pair - Done
3,298,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,728 UART: [art] PUB.X = 99EB560FAD9FE7AD9B8D09A61D23050AE3C510664E4F178868C63F041FDD51AA51D3620205D7138468DFB46A39CBB9CD
3,322,487 UART: [art] PUB.Y = 1D6950BE9E40309B1F91A5F0734C21ED10B589B61A86C31867C075C0C68756279B59046025C337E11FE14C5A1478D0CE
3,329,428 UART: [art] SIG.R = 1FF0258875F4BA0576A3900E775942C9B8F4E539675F8BDF0F47EC0C6F3D56831280015FACCBD0917837C3A5525336AE
3,336,183 UART: [art] SIG.S = 7D1AFD0AA7BAB6E42E0C99C9CE1A45AF5CAE23C045478C734D122A086C1365D4AF4626B61C6EEE23A47D025599D4B2C0
3,360,343 UART: Caliptra RT
3,360,686 UART: [state] CFI Enabled
3,481,255 UART: [rt] RT listening for mailbox commands...
3,481,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,335 UART: [rt]cmd =0x44504543, len=96
3,704,803 >>> mbox cmd response data (6236 bytes)
3,704,804 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,734,647 UART: [rt]cmd =0x53574545, len=84
3,737,959 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
891,460 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
916,445 UART: [kat] HMAC-384Kdf
920,999 UART: [kat] LMS
1,169,311 UART: [kat] --
1,170,204 UART: [cold-reset] ++
1,170,684 UART: [fht] FHT @ 0x50003400
1,173,314 UART: [idev] ++
1,173,482 UART: [idev] CDI.KEYID = 6
1,173,843 UART: [idev] SUBJECT.KEYID = 7
1,174,268 UART: [idev] UDS.KEYID = 0
1,174,614 ready_for_fw is high
1,174,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,177 UART: [idev] Erasing UDS.KEYID = 0
1,198,783 UART: [idev] Sha1 KeyId Algorithm
1,207,643 UART: [idev] --
1,208,506 UART: [ldev] ++
1,208,674 UART: [ldev] CDI.KEYID = 6
1,209,038 UART: [ldev] SUBJECT.KEYID = 5
1,209,465 UART: [ldev] AUTHORITY.KEYID = 7
1,209,928 UART: [ldev] FE.KEYID = 1
1,214,944 UART: [ldev] Erasing FE.KEYID = 1
1,241,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,342 UART: [ldev] --
1,280,775 UART: [fwproc] Wait for Commands...
1,281,598 UART: [fwproc] Recv command 0x46574c44
1,282,331 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,133 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,308 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,531 >>> mbox cmd response: success
2,826,771 UART: [afmc] ++
2,826,939 UART: [afmc] CDI.KEYID = 6
2,827,302 UART: [afmc] SUBJECT.KEYID = 7
2,827,728 UART: [afmc] AUTHORITY.KEYID = 5
2,862,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,627 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,337 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,218 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,919 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,722 UART: [afmc] --
2,905,677 UART: [cold-reset] --
2,906,353 UART: [state] Locking Datavault
2,907,726 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,330 UART: [state] Locking ICCM
2,908,876 UART: [exit] Launching FMC @ 0x40000130
2,914,206 UART:
2,914,222 UART: Running Caliptra FMC ...
2,914,630 UART:
2,914,684 UART: [state] CFI Enabled
2,925,112 UART: [fht] FMC Alias Private Key: 7
3,043,842 UART: [art] Extend RT PCRs Done
3,044,270 UART: [art] Lock RT PCRs Done
3,045,954 UART: [art] Populate DV Done
3,054,085 UART: [fht] FMC Alias Private Key: 7
3,055,057 UART: [art] Derive CDI
3,055,337 UART: [art] Store in slot 0x4
3,141,190 UART: [art] Derive Key Pair
3,141,550 UART: [art] Store priv key in slot 0x5
3,154,924 UART: [art] Derive Key Pair - Done
3,169,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,198 UART: [art] PUB.X = 62F3C2DA290D174C745147B3EFEEA6EBAF3BF33E07870AEA039574DAE3082324E302E87F2D3246354A78D23011638D81
3,192,952 UART: [art] PUB.Y = 0E8F8D073E0CA6E74FC511866BF804D46D8E8751C009C457348E8A4B3DEDEFBC07A9C647FC9A65D0CE57A0C51592CC14
3,199,898 UART: [art] SIG.R = 0B70F5F8E9711852E673398E02DAFAD4BE1303EA8E9513EDEBCD7ED30461A43E8AD26F3F93ED502A97ECABC5700B00C6
3,206,649 UART: [art] SIG.S = 88BCE63FE0A4FC8BDADE4E813DF2DCAD7BFFC8D5DC9B17CD69437BF71F757949FD3BC3D9C06B7624CB6998157EDC47E6
3,229,973 UART: Caliptra RT
3,230,224 UART: [state] CFI Enabled
3,349,397 UART: [rt] RT listening for mailbox commands...
3,350,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,543 UART: [rt]cmd =0x44504543, len=96
3,572,822 >>> mbox cmd response data (6236 bytes)
3,572,823 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,702 UART: [rt]cmd =0x53574545, len=84
3,606,448 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,542 ready_for_fw is high
1,059,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,660 >>> mbox cmd response: success
2,740,123 UART:
2,740,139 UART: Running Caliptra FMC ...
2,740,547 UART:
2,740,601 UART: [state] CFI Enabled
2,751,115 UART: [fht] FMC Alias Private Key: 7
2,870,083 UART: [art] Extend RT PCRs Done
2,870,511 UART: [art] Lock RT PCRs Done
2,871,903 UART: [art] Populate DV Done
2,880,218 UART: [fht] FMC Alias Private Key: 7
2,881,162 UART: [art] Derive CDI
2,881,442 UART: [art] Store in slot 0x4
2,967,211 UART: [art] Derive Key Pair
2,967,571 UART: [art] Store priv key in slot 0x5
2,981,079 UART: [art] Derive Key Pair - Done
2,996,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,058 UART: [art] PUB.X = 11C9CD9DA379C17A2FA3A8490CB090DCCF59E1F7773E251E0A173100BF1393EDFE880DB7AAFE3A91744A133798822DE7
3,018,809 UART: [art] PUB.Y = 63865353070BE36E43F28ED8CC996415C44B2ABF2902F2F2B3A3E18E82AFF0A175263FAB9D3F95FBC4E08C0D027CB15A
3,025,756 UART: [art] SIG.R = E09A38875AF74146198C8C7BC3FB91632B38B2D3B2B8F6F9DAC235E35CA69298CC78429874A46ED48021E8E9E9914031
3,032,526 UART: [art] SIG.S = 624546435880FE7656159E7718D6E6B76840AA58F42E484522EA716409B7B154126BB1CF9B244FECE3C1510002E36B23
3,056,338 UART: Caliptra RT
3,056,589 UART: [state] CFI Enabled
3,176,622 UART: [rt] RT listening for mailbox commands...
3,177,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,694 UART: [rt]cmd =0x44504543, len=96
3,400,017 >>> mbox cmd response data (6236 bytes)
3,400,018 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,429,969 UART: [rt]cmd =0x53574545, len=84
3,433,995 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,525 UART: [kat] ++
895,677 UART: [kat] sha1
900,013 UART: [kat] SHA2-256
901,953 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
916,338 UART: [kat] HMAC-384Kdf
921,152 UART: [kat] LMS
1,169,464 UART: [kat] --
1,170,329 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,239 UART: [idev] ++
1,173,407 UART: [idev] CDI.KEYID = 6
1,173,768 UART: [idev] SUBJECT.KEYID = 7
1,174,193 UART: [idev] UDS.KEYID = 0
1,174,539 ready_for_fw is high
1,174,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,032 UART: [idev] Erasing UDS.KEYID = 0
1,198,784 UART: [idev] Sha1 KeyId Algorithm
1,207,746 UART: [idev] --
1,208,861 UART: [ldev] ++
1,209,029 UART: [ldev] CDI.KEYID = 6
1,209,393 UART: [ldev] SUBJECT.KEYID = 5
1,209,820 UART: [ldev] AUTHORITY.KEYID = 7
1,210,283 UART: [ldev] FE.KEYID = 1
1,215,571 UART: [ldev] Erasing FE.KEYID = 1
1,241,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,877 UART: [ldev] --
1,281,258 UART: [fwproc] Wait for Commands...
1,281,927 UART: [fwproc] Recv command 0x46574c44
1,282,660 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,116 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,291 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,444 >>> mbox cmd response: success
2,825,630 UART: [afmc] ++
2,825,798 UART: [afmc] CDI.KEYID = 6
2,826,161 UART: [afmc] SUBJECT.KEYID = 7
2,826,587 UART: [afmc] AUTHORITY.KEYID = 5
2,861,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,514 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,224 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,105 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,806 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,663 UART: [afmc] --
2,904,688 UART: [cold-reset] --
2,905,394 UART: [state] Locking Datavault
2,906,529 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,133 UART: [state] Locking ICCM
2,907,791 UART: [exit] Launching FMC @ 0x40000130
2,913,121 UART:
2,913,137 UART: Running Caliptra FMC ...
2,913,545 UART:
2,913,688 UART: [state] CFI Enabled
2,924,576 UART: [fht] FMC Alias Private Key: 7
3,043,612 UART: [art] Extend RT PCRs Done
3,044,040 UART: [art] Lock RT PCRs Done
3,045,154 UART: [art] Populate DV Done
3,053,271 UART: [fht] FMC Alias Private Key: 7
3,054,443 UART: [art] Derive CDI
3,054,723 UART: [art] Store in slot 0x4
3,140,490 UART: [art] Derive Key Pair
3,140,850 UART: [art] Store priv key in slot 0x5
3,154,760 UART: [art] Derive Key Pair - Done
3,169,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,303 UART: [art] PUB.X = 566ABCD464E9321677345AA4F489E370C46D7E287A8273E74E3C3E127C25036F0E63A56E1D89097EC0616FAF786FF078
3,193,062 UART: [art] PUB.Y = 890270F85E435ECB580F0F1186D8F23C4B89460A2706E6460E12078B48DF3D49EB6EA98AE21313EC4E88BD6F23DC7237
3,199,993 UART: [art] SIG.R = 7B819C4874E93640C4A7F22F17287603A4EAAD4E216ED801783719FC5A35FAAD174E0735C21C0CF9F6D27F29C0A4AC6F
3,206,759 UART: [art] SIG.S = 48672778BC2C347EDAD4980162CEDD22115B55E96514C7F0E11AAE3AD033214F3071FD545DE409E3412509BE3BE86FA6
3,230,548 UART: Caliptra RT
3,230,891 UART: [state] CFI Enabled
3,349,655 UART: [rt] RT listening for mailbox commands...
3,350,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,113 UART: [rt]cmd =0x44504543, len=96
3,573,856 >>> mbox cmd response data (6236 bytes)
3,573,857 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,880 UART: [rt]cmd =0x53574545, len=84
3,607,600 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,123 ready_for_fw is high
1,059,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,429 >>> mbox cmd response: success
2,741,476 UART:
2,741,492 UART: Running Caliptra FMC ...
2,741,900 UART:
2,742,043 UART: [state] CFI Enabled
2,752,743 UART: [fht] FMC Alias Private Key: 7
2,872,125 UART: [art] Extend RT PCRs Done
2,872,553 UART: [art] Lock RT PCRs Done
2,874,007 UART: [art] Populate DV Done
2,881,960 UART: [fht] FMC Alias Private Key: 7
2,883,026 UART: [art] Derive CDI
2,883,306 UART: [art] Store in slot 0x4
2,969,221 UART: [art] Derive Key Pair
2,969,581 UART: [art] Store priv key in slot 0x5
2,982,731 UART: [art] Derive Key Pair - Done
2,997,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,697 UART: [art] PUB.X = 155E69402D1DCE820B6C8DBF9F5CD8EA822EA9D46A7D38FBCFEB998BB5428D4E57E0E6D691DE6CC86D2EEBAD46F63307
3,020,487 UART: [art] PUB.Y = 76A0DD10EC534CD2DB77478B9938469DCED7A5C950B2624A938E0242EB649C473531C248A477336CBAFED967D13F63ED
3,027,440 UART: [art] SIG.R = 224EC90AAB80440AB1B82950C4F2401304D716F3E39B34DE4FB2125090716B3F2A7D174804FA52C1AAAC670E8E0B6384
3,034,194 UART: [art] SIG.S = 09FCC6940AFE98C4F622069C18592CEFF22CD046015CD9430E0DF6BF38DD3756424DB08682B5A3B044B6CEB01AF75773
3,058,384 UART: Caliptra RT
3,058,727 UART: [state] CFI Enabled
3,179,389 UART: [rt] RT listening for mailbox commands...
3,180,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,177 UART: [rt]cmd =0x44504543, len=96
3,402,098 >>> mbox cmd response data (6236 bytes)
3,402,099 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,976 UART: [rt]cmd =0x53574545, len=84
3,435,628 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
88,166 UART: [kat] SHA2-256
893,816 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,941 UART: [kat] ++
898,093 UART: [kat] sha1
902,317 UART: [kat] SHA2-256
904,257 UART: [kat] SHA2-384
907,000 UART: [kat] SHA2-512-ACC
908,901 UART: [kat] ECC-384
919,048 UART: [kat] HMAC-384Kdf
923,588 UART: [kat] LMS
1,171,916 UART: [kat] --
1,172,557 UART: [cold-reset] ++
1,173,079 UART: [fht] FHT @ 0x50003400
1,175,770 UART: [idev] ++
1,175,938 UART: [idev] CDI.KEYID = 6
1,176,298 UART: [idev] SUBJECT.KEYID = 7
1,176,722 UART: [idev] UDS.KEYID = 0
1,177,067 ready_for_fw is high
1,177,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,840 UART: [idev] Erasing UDS.KEYID = 0
1,201,315 UART: [idev] Sha1 KeyId Algorithm
1,209,673 UART: [idev] --
1,210,665 UART: [ldev] ++
1,210,833 UART: [ldev] CDI.KEYID = 6
1,211,196 UART: [ldev] SUBJECT.KEYID = 5
1,211,622 UART: [ldev] AUTHORITY.KEYID = 7
1,212,085 UART: [ldev] FE.KEYID = 1
1,217,201 UART: [ldev] Erasing FE.KEYID = 1
1,243,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,421 UART: [ldev] --
1,282,760 UART: [fwproc] Wait for Commands...
1,283,404 UART: [fwproc] Recv command 0x46574c44
1,284,132 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,070 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,240 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,509 >>> mbox cmd response: success
2,828,715 UART: [afmc] ++
2,828,883 UART: [afmc] CDI.KEYID = 6
2,829,245 UART: [afmc] SUBJECT.KEYID = 7
2,829,670 UART: [afmc] AUTHORITY.KEYID = 5
2,864,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,324 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,072 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,781 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,664 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,365 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,251 UART: [afmc] --
2,908,205 UART: [cold-reset] --
2,909,097 UART: [state] Locking Datavault
2,910,360 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,964 UART: [state] Locking ICCM
2,911,396 UART: [exit] Launching FMC @ 0x40000130
2,916,726 UART:
2,916,742 UART: Running Caliptra FMC ...
2,917,150 UART:
2,917,204 UART: [state] CFI Enabled
2,927,564 UART: [fht] FMC Alias Private Key: 7
3,047,424 UART: [art] Extend RT PCRs Done
3,047,852 UART: [art] Lock RT PCRs Done
3,049,346 UART: [art] Populate DV Done
3,057,577 UART: [fht] FMC Alias Private Key: 7
3,058,557 UART: [art] Derive CDI
3,058,837 UART: [art] Store in slot 0x4
3,144,246 UART: [art] Derive Key Pair
3,144,606 UART: [art] Store priv key in slot 0x5
3,157,808 UART: [art] Derive Key Pair - Done
3,172,770 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,964 UART: [art] PUB.X = 0C05D3B977BC84A96E58F86BA959254AE25DB1B8F7A9E5A51C26D35E1E81E493B606057F9540A8393BC21DD63DBE61FB
3,195,732 UART: [art] PUB.Y = 9797C5459D471A44528EEE60E3108CD9825529E0AD473C6ACCEB2ACDF3C16EA4DE43E8CD1C9959414F446A930B9D0BC3
3,202,688 UART: [art] SIG.R = B9ED104DE83E93965D4A3D817F8EA0706F50138FDBAEF36D57389A1B87DA496A52DA0AD74AFA2729005FA4C767C19827
3,209,443 UART: [art] SIG.S = 935E8544046F99060BAA7E4EF1F415A6AAF45055CAFF51435B4D6042F9555B972E1392EE2AC18F56FD14700C556E374C
3,233,809 UART: Caliptra RT
3,234,060 UART: [state] CFI Enabled
3,353,160 UART: [rt] RT listening for mailbox commands...
3,353,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,142 UART: [rt]cmd =0x44504543, len=96
3,574,974 >>> mbox cmd response data (6236 bytes)
3,574,975 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,708 UART: [rt]cmd =0x53574545, len=84
3,608,116 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,973 ready_for_fw is high
1,059,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,330 >>> mbox cmd response: success
2,742,517 UART:
2,742,533 UART: Running Caliptra FMC ...
2,742,941 UART:
2,742,995 UART: [state] CFI Enabled
2,753,035 UART: [fht] FMC Alias Private Key: 7
2,871,529 UART: [art] Extend RT PCRs Done
2,871,957 UART: [art] Lock RT PCRs Done
2,873,435 UART: [art] Populate DV Done
2,881,946 UART: [fht] FMC Alias Private Key: 7
2,883,028 UART: [art] Derive CDI
2,883,308 UART: [art] Store in slot 0x4
2,969,311 UART: [art] Derive Key Pair
2,969,671 UART: [art] Store priv key in slot 0x5
2,982,671 UART: [art] Derive Key Pair - Done
2,997,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,995 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,760 UART: [art] PUB.X = 6388FBA6F5D4C0EB02055E4C44B824A33A9A3BA7EB4F3208CB0AE21F1EECB7A390900E0CC48F5557982052894E18A2FE
3,020,524 UART: [art] PUB.Y = 8FE22E5D618A7E04357F945AC9687438E4024E922503775D18B3401D5F2A5503F8F06B43655CD755588924083450AA2F
3,027,445 UART: [art] SIG.R = 8D2175E39914D7C9A9505DD00E1EB5B8148CC6D81547161D7CE5C8D147E5E75C03513F157A5980D40D18E3B551248B2C
3,034,204 UART: [art] SIG.S = 2E3EFB54D9C7776046C163FE0DDC9E94B7F1808A146F5A83EA7677CCB308DA2CAF5E84D090E0B496FE08B32D490020A5
3,058,223 UART: Caliptra RT
3,058,474 UART: [state] CFI Enabled
3,177,791 UART: [rt] RT listening for mailbox commands...
3,178,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,971 UART: [rt]cmd =0x44504543, len=96
3,400,942 >>> mbox cmd response data (6236 bytes)
3,400,943 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,616 UART: [rt]cmd =0x53574545, len=84
3,433,410 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
893,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,868 UART: [kat] ++
898,020 UART: [kat] sha1
902,186 UART: [kat] SHA2-256
904,126 UART: [kat] SHA2-384
906,989 UART: [kat] SHA2-512-ACC
908,890 UART: [kat] ECC-384
918,727 UART: [kat] HMAC-384Kdf
923,453 UART: [kat] LMS
1,171,781 UART: [kat] --
1,172,810 UART: [cold-reset] ++
1,173,220 UART: [fht] FHT @ 0x50003400
1,175,933 UART: [idev] ++
1,176,101 UART: [idev] CDI.KEYID = 6
1,176,461 UART: [idev] SUBJECT.KEYID = 7
1,176,885 UART: [idev] UDS.KEYID = 0
1,177,230 ready_for_fw is high
1,177,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,941 UART: [idev] Erasing UDS.KEYID = 0
1,202,254 UART: [idev] Sha1 KeyId Algorithm
1,210,568 UART: [idev] --
1,211,764 UART: [ldev] ++
1,211,932 UART: [ldev] CDI.KEYID = 6
1,212,295 UART: [ldev] SUBJECT.KEYID = 5
1,212,721 UART: [ldev] AUTHORITY.KEYID = 7
1,213,184 UART: [ldev] FE.KEYID = 1
1,218,596 UART: [ldev] Erasing FE.KEYID = 1
1,245,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,418 UART: [ldev] --
1,284,721 UART: [fwproc] Wait for Commands...
1,285,447 UART: [fwproc] Recv command 0x46574c44
1,286,175 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,649 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,819 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,112 >>> mbox cmd response: success
2,831,162 UART: [afmc] ++
2,831,330 UART: [afmc] CDI.KEYID = 6
2,831,692 UART: [afmc] SUBJECT.KEYID = 7
2,832,117 UART: [afmc] AUTHORITY.KEYID = 5
2,867,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,601 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,310 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,193 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,894 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,878 UART: [afmc] --
2,910,854 UART: [cold-reset] --
2,911,730 UART: [state] Locking Datavault
2,912,773 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,377 UART: [state] Locking ICCM
2,913,987 UART: [exit] Launching FMC @ 0x40000130
2,919,317 UART:
2,919,333 UART: Running Caliptra FMC ...
2,919,741 UART:
2,919,884 UART: [state] CFI Enabled
2,930,124 UART: [fht] FMC Alias Private Key: 7
3,048,594 UART: [art] Extend RT PCRs Done
3,049,022 UART: [art] Lock RT PCRs Done
3,050,470 UART: [art] Populate DV Done
3,058,505 UART: [fht] FMC Alias Private Key: 7
3,059,485 UART: [art] Derive CDI
3,059,765 UART: [art] Store in slot 0x4
3,145,808 UART: [art] Derive Key Pair
3,146,168 UART: [art] Store priv key in slot 0x5
3,160,088 UART: [art] Derive Key Pair - Done
3,174,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,300 UART: [art] PUB.X = 4F021E662D38C9FC331A24976C7832FC4E904DB834508FDDFA7064CFFED0E10E26628D7499C819A54589FBFA0CAB0B56
3,197,068 UART: [art] PUB.Y = D99736DE63602320730D73988A982FD3944D9C683F8A96CAB1890F01AAF3296CB2B7D22E5B851D95F8DC715A23D80B99
3,204,006 UART: [art] SIG.R = CA078CCA195DDB75CE82B23ABC2DD1AF596B6045E4B68585CB028B74AC71AA5277FF8D9FDB13602E073D515333522A57
3,210,779 UART: [art] SIG.S = 76E60F08AFD3CA693B1D21D789AA92992C28F9D7481CDF5C86958B2C93E07BDA2D3940A91328C5ADDCAD89015D97EE97
3,235,126 UART: Caliptra RT
3,235,469 UART: [state] CFI Enabled
3,355,324 UART: [rt] RT listening for mailbox commands...
3,355,994 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,294 UART: [rt]cmd =0x44504543, len=96
3,577,749 >>> mbox cmd response data (6236 bytes)
3,577,750 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,711 UART: [rt]cmd =0x53574545, len=84
3,610,935 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,720 ready_for_fw is high
1,060,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,559 >>> mbox cmd response: success
2,741,356 UART:
2,741,372 UART: Running Caliptra FMC ...
2,741,780 UART:
2,741,923 UART: [state] CFI Enabled
2,752,883 UART: [fht] FMC Alias Private Key: 7
2,871,773 UART: [art] Extend RT PCRs Done
2,872,201 UART: [art] Lock RT PCRs Done
2,873,781 UART: [art] Populate DV Done
2,881,862 UART: [fht] FMC Alias Private Key: 7
2,882,836 UART: [art] Derive CDI
2,883,116 UART: [art] Store in slot 0x4
2,968,763 UART: [art] Derive Key Pair
2,969,123 UART: [art] Store priv key in slot 0x5
2,982,849 UART: [art] Derive Key Pair - Done
2,998,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,576 UART: [art] PUB.X = E8858C785428D93A1CD65DC4448B807DABEBFB43721101A266D781671DB6A226CB49C29FCFE8C826ACE67922AC143254
3,021,349 UART: [art] PUB.Y = 952E78637CE18CD1777C727D49E17E0DC6EFA3E00CD4242D07F5855731A3154599C454271D5755CB57B4FE95E5C40077
3,028,264 UART: [art] SIG.R = 67F3B8E7317AA8C11D98A755AC9CD8C12AE1490B3630A9CF9F944E13CD0ABB1CE249143EA8AECA2D3B08D5BB91819A45
3,035,043 UART: [art] SIG.S = 4D4D2C17B4ADA864A049B0E7F27D22FB91D80210EBE144EF2FA448DE54F81DD4C359FCBB53BCD7DAA6469AE1D11AB825
3,059,088 UART: Caliptra RT
3,059,431 UART: [state] CFI Enabled
3,178,749 UART: [rt] RT listening for mailbox commands...
3,179,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,683 UART: [rt]cmd =0x44504543, len=96
3,400,765 >>> mbox cmd response data (6236 bytes)
3,400,766 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,819 UART: [rt]cmd =0x53574545, len=84
3,434,177 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,021 UART:
192,394 UART: Running Caliptra ROM ...
193,492 UART:
193,638 UART: [state] CFI Enabled
261,701 UART: [state] LifecycleState = Unprovisioned
263,624 UART: [state] DebugLocked = No
266,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,234 UART: [kat] SHA2-256
440,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,472 UART: [kat] ++
451,928 UART: [kat] sha1
462,661 UART: [kat] SHA2-256
465,319 UART: [kat] SHA2-384
469,747 UART: [kat] SHA2-512-ACC
472,113 UART: [kat] ECC-384
2,759,046 UART: [kat] HMAC-384Kdf
2,791,681 UART: [kat] LMS
3,981,967 UART: [kat] --
3,987,618 UART: [cold-reset] ++
3,988,842 UART: [fht] Storing FHT @ 0x50003400
3,999,326 UART: [idev] ++
3,999,897 UART: [idev] CDI.KEYID = 6
4,000,931 UART: [idev] SUBJECT.KEYID = 7
4,002,113 UART: [idev] UDS.KEYID = 0
4,003,176 ready_for_fw is high
4,003,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,152,556 UART: [idev] Erasing UDS.KEYID = 0
7,339,818 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,719 UART: [idev] --
7,366,551 UART: [ldev] ++
7,367,159 UART: [ldev] CDI.KEYID = 6
7,368,119 UART: [ldev] SUBJECT.KEYID = 5
7,369,279 UART: [ldev] AUTHORITY.KEYID = 7
7,370,512 UART: [ldev] FE.KEYID = 1
7,414,806 UART: [ldev] Erasing FE.KEYID = 1
10,748,435 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,059,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,074,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,089,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,103,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,123,680 UART: [ldev] --
13,128,666 UART: [fwproc] Waiting for Commands...
13,130,285 UART: [fwproc] Received command 0x46574c44
13,132,484 UART: [fwproc] Received Image of size 118548 bytes
17,243,382 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,903 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,392,077 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,720,949 >>> mbox cmd response: success
17,725,371 UART: [afmc] ++
17,725,983 UART: [afmc] CDI.KEYID = 6
17,726,868 UART: [afmc] SUBJECT.KEYID = 7
17,728,142 UART: [afmc] AUTHORITY.KEYID = 5
21,084,374 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,383,435 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,385,710 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,400,161 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,414,861 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,429,338 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,450,095 UART: [afmc] --
23,453,470 UART: [cold-reset] --
23,456,854 UART: [state] Locking Datavault
23,462,213 UART: [state] Locking PCR0, PCR1 and PCR31
23,463,976 UART: [state] Locking ICCM
23,465,015 UART: [exit] Launching FMC @ 0x40000130
23,473,419 UART:
23,473,653 UART: Running Caliptra FMC ...
23,474,753 UART:
23,474,914 UART: [state] CFI Enabled
23,543,186 UART: [fht] FMC Alias Private Key: 7
25,884,323 UART: [art] Extend RT PCRs Done
25,885,552 UART: [art] Lock RT PCRs Done
25,887,339 UART: [art] Populate DV Done
25,892,751 UART: [fht] FMC Alias Private Key: 7
25,894,406 UART: [art] Derive CDI
25,895,224 UART: [art] Store in slot 0x4
25,952,001 UART: [art] Derive Key Pair
25,953,046 UART: [art] Store priv key in slot 0x5
29,245,952 UART: [art] Derive Key Pair - Done
29,258,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,606 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,111 UART: [art] PUB.X = 9C1CC3A20BB459E06E622013C59E1D2E8DDAD0C3D98B9B48D09035F58390E71DFBFC76ECA35C1C6BA50719FF9D3E85DA
31,557,386 UART: [art] PUB.Y = B6B2C7D46ED4EFF8B07A88C37FB6FB26EE13A7B5A5877855C35D9C41539BC3E29C1F91F6FCF2174D268627C718915D61
31,564,633 UART: [art] SIG.R = 085F2CC01FEE501441574BA8422E23B6CD7EFA3670DCBF5E46477D4C34C15BA7CB065FC405BC2EAE4C215EDCFDAF5EEE
31,572,043 UART: [art] SIG.S = E52E53442BA641F0A78E5BB64AF575B24802CC6B9631AC097FC4A06E9ACE41EE8E6C97E2B92931EA9892A2C9596025DA
32,877,251 UART: Caliptra RT
32,877,981 UART: [state] CFI Enabled
33,052,675 UART: [rt] RT listening for mailbox commands...
33,054,570 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,085,102 UART: [rt]cmd =0x53574545, len=84
33,088,969 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,806,696 ready_for_fw is high
3,807,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,982,636 >>> mbox cmd response: success
23,667,756 UART:
23,668,182 UART: Running Caliptra FMC ...
23,669,336 UART:
23,669,502 UART: [state] CFI Enabled
23,738,974 UART: [fht] FMC Alias Private Key: 7
26,100,386 UART: [art] Extend RT PCRs Done
26,101,614 UART: [art] Lock RT PCRs Done
26,103,217 UART: [art] Populate DV Done
26,108,473 UART: [fht] FMC Alias Private Key: 7
26,110,176 UART: [art] Derive CDI
26,110,914 UART: [art] Store in slot 0x4
26,167,700 UART: [art] Derive Key Pair
26,168,741 UART: [art] Store priv key in slot 0x5
29,461,414 UART: [art] Derive Key Pair - Done
29,474,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,762,596 UART: [art] Erasing AUTHORITY.KEYID = 7
31,764,162 UART: [art] PUB.X = 2B13BBE44F18DFD65B078807E81ECDA09EDBACB66CA2DACEC9787E99079A71B6C1BC0C2F5B35A0CCEB38BA0A564E070D
31,771,440 UART: [art] PUB.Y = E2BE8B407DDF27B08FB4790377427C5AB15CB0777CA7BBF6B3A0064CC21278064399CE105F68C25A0A7AF64FEE1895F8
31,778,643 UART: [art] SIG.R = 35E023A4FC47A31178012EC752398B7470C17E3393BC8F4E7DB85CF8990FC6F413257691242C18F71A2EAF7F72A3687C
31,786,047 UART: [art] SIG.S = E187A0AB7AA28396899C2CEF8CA52DBE68662FD5DDBD05967FB0223F8FDC552220C3B0BB9A1F4E073188D4A5C02FF011
33,090,734 UART: Caliptra RT
33,091,454 UART: [state] CFI Enabled
33,267,484 UART: [rt] RT listening for mailbox commands...
33,269,382 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,299,741 UART: [rt]cmd =0x53574545, len=84
33,303,876 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,395 UART:
192,763 UART: Running Caliptra ROM ...
193,864 UART:
603,750 UART: [state] CFI Enabled
617,556 UART: [state] LifecycleState = Unprovisioned
619,484 UART: [state] DebugLocked = No
621,135 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,720 UART: [kat] SHA2-256
796,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,968 UART: [kat] ++
807,487 UART: [kat] sha1
819,632 UART: [kat] SHA2-256
822,352 UART: [kat] SHA2-384
829,329 UART: [kat] SHA2-512-ACC
831,688 UART: [kat] ECC-384
3,115,751 UART: [kat] HMAC-384Kdf
3,126,947 UART: [kat] LMS
4,317,086 UART: [kat] --
4,318,955 UART: [cold-reset] ++
4,321,256 UART: [fht] Storing FHT @ 0x50003400
4,333,099 UART: [idev] ++
4,333,702 UART: [idev] CDI.KEYID = 6
4,334,584 UART: [idev] SUBJECT.KEYID = 7
4,335,840 UART: [idev] UDS.KEYID = 0
4,336,791 ready_for_fw is high
4,336,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,845 UART: [idev] Erasing UDS.KEYID = 0
7,625,414 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,466 UART: [idev] --
7,651,829 UART: [ldev] ++
7,652,405 UART: [ldev] CDI.KEYID = 6
7,653,371 UART: [ldev] SUBJECT.KEYID = 5
7,654,575 UART: [ldev] AUTHORITY.KEYID = 7
7,655,850 UART: [ldev] FE.KEYID = 1
7,668,354 UART: [ldev] Erasing FE.KEYID = 1
10,959,103 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,114 UART: [ldev] --
13,317,619 UART: [fwproc] Waiting for Commands...
13,320,947 UART: [fwproc] Received command 0x46574c44
13,323,174 UART: [fwproc] Received Image of size 118548 bytes
17,419,477 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,478 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,655 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,896,408 >>> mbox cmd response: success
17,901,077 UART: [afmc] ++
17,901,676 UART: [afmc] CDI.KEYID = 6
17,902,585 UART: [afmc] SUBJECT.KEYID = 7
17,903,794 UART: [afmc] AUTHORITY.KEYID = 5
21,217,986 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,862 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,163 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,585 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,284 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,689 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,581,411 UART: [afmc] --
23,585,916 UART: [cold-reset] --
23,589,333 UART: [state] Locking Datavault
23,595,493 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,181 UART: [state] Locking ICCM
23,599,377 UART: [exit] Launching FMC @ 0x40000130
23,607,765 UART:
23,608,035 UART: Running Caliptra FMC ...
23,609,140 UART:
23,609,297 UART: [state] CFI Enabled
23,617,550 UART: [fht] FMC Alias Private Key: 7
25,957,737 UART: [art] Extend RT PCRs Done
25,958,953 UART: [art] Lock RT PCRs Done
25,960,240 UART: [art] Populate DV Done
25,965,645 UART: [fht] FMC Alias Private Key: 7
25,967,227 UART: [art] Derive CDI
25,968,032 UART: [art] Store in slot 0x4
26,010,526 UART: [art] Derive Key Pair
26,011,559 UART: [art] Store priv key in slot 0x5
29,253,678 UART: [art] Derive Key Pair - Done
29,266,512 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,673 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,175 UART: [art] PUB.X = 07D37AD0F5799237600D480D5BED850DAEB0707E19AF505BB4280FC484AAE1076ED27D83AA0AD855A312356F74491302
31,555,419 UART: [art] PUB.Y = 75DD8E9402344E28E92ECA3FFE217B0016B7392B71AB3A85634AD0A8D56F4FDFD7471CC865F9A885E94D28AC0873E368
31,562,658 UART: [art] SIG.R = DEB9E3665DA46954D149B8ADDEA026CE0A105B919AF8BF01C19AA867966725A049885A48E300EC0D131F2AB7488E26BE
31,570,048 UART: [art] SIG.S = 36303070EE9F65A7D26E68283B6BE8EE0852C4784E73DA380463D274192C9967328291E2BF7498B6255A0B1D8253A922
32,875,177 UART: Caliptra RT
32,875,890 UART: [state] CFI Enabled
33,008,582 UART: [rt] RT listening for mailbox commands...
33,010,514 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,041,086 UART: [rt]cmd =0x53574545, len=84
33,045,007 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
4,127,205 ready_for_fw is high
4,127,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,476 >>> mbox cmd response: success
23,786,262 UART:
23,786,650 UART: Running Caliptra FMC ...
23,787,748 UART:
23,787,900 UART: [state] CFI Enabled
23,795,309 UART: [fht] FMC Alias Private Key: 7
26,135,447 UART: [art] Extend RT PCRs Done
26,136,672 UART: [art] Lock RT PCRs Done
26,138,217 UART: [art] Populate DV Done
26,143,574 UART: [fht] FMC Alias Private Key: 7
26,145,106 UART: [art] Derive CDI
26,145,834 UART: [art] Store in slot 0x4
26,188,274 UART: [art] Derive Key Pair
26,189,332 UART: [art] Store priv key in slot 0x5
29,431,510 UART: [art] Derive Key Pair - Done
29,444,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,613 UART: [art] Erasing AUTHORITY.KEYID = 7
31,726,138 UART: [art] PUB.X = F058446948A27F2BA5553D604BAE9CE034BC188B0416B478E69394C617DEF52AA5DE77E4CD5BAA92438BD266528AE113
31,733,390 UART: [art] PUB.Y = 1F05729D99AA94792240D6AA173009E2203466B781D2862B02F986A3BBCC92E964A99E6178C1FE6BA9AD35D36EFEE7D8
31,740,643 UART: [art] SIG.R = D18B23C1E906DCF4B1C63D9669D197D397E258428C87F4B2A35B54F72FD65EFFC208274E137F27DBADCA4799F07AB23E
31,748,030 UART: [art] SIG.S = D793C110FB84A2E491759050C110DC7E62B94FCE7E27EC5B824A9C94A025A2420EDAB27AA9858C49489F7DEFF092CE89
33,053,447 UART: Caliptra RT
33,054,155 UART: [state] CFI Enabled
33,187,314 UART: [rt] RT listening for mailbox commands...
33,189,203 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,219,773 UART: [rt]cmd =0x53574545, len=84
33,223,457 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,183 UART:
192,550 UART: Running Caliptra ROM ...
193,747 UART:
193,894 UART: [state] CFI Enabled
261,792 UART: [state] LifecycleState = Unprovisioned
263,782 UART: [state] DebugLocked = No
265,248 UART: [state] WD Timer not started. Device not locked for debugging
269,932 UART: [kat] SHA2-256
449,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,374 UART: [kat] ++
460,904 UART: [kat] sha1
470,575 UART: [kat] SHA2-256
473,284 UART: [kat] SHA2-384
480,217 UART: [kat] SHA2-512-ACC
482,557 UART: [kat] ECC-384
2,946,403 UART: [kat] HMAC-384Kdf
2,969,602 UART: [kat] LMS
3,446,101 UART: [kat] --
3,451,374 UART: [cold-reset] ++
3,453,511 UART: [fht] FHT @ 0x50003400
3,464,766 UART: [idev] ++
3,465,321 UART: [idev] CDI.KEYID = 6
3,466,344 UART: [idev] SUBJECT.KEYID = 7
3,467,515 UART: [idev] UDS.KEYID = 0
3,468,555 ready_for_fw is high
3,468,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,818 UART: [idev] Erasing UDS.KEYID = 0
5,983,930 UART: [idev] Sha1 KeyId Algorithm
6,006,782 UART: [idev] --
6,011,564 UART: [ldev] ++
6,012,145 UART: [ldev] CDI.KEYID = 6
6,013,056 UART: [ldev] SUBJECT.KEYID = 5
6,014,269 UART: [ldev] AUTHORITY.KEYID = 7
6,015,516 UART: [ldev] FE.KEYID = 1
6,056,947 UART: [ldev] Erasing FE.KEYID = 1
8,562,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,429 UART: [ldev] --
10,375,658 UART: [fwproc] Wait for Commands...
10,377,537 UART: [fwproc] Recv command 0x46574c44
10,379,514 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,528 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,011,539 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,256 >>> mbox cmd response: success
14,343,986 UART: [afmc] ++
14,344,613 UART: [afmc] CDI.KEYID = 6
14,345,535 UART: [afmc] SUBJECT.KEYID = 7
14,346,693 UART: [afmc] AUTHORITY.KEYID = 5
16,872,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,687 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,907 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,614,686 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,630,785 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,646,359 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,670,288 UART: [afmc] --
18,674,310 UART: [cold-reset] --
18,676,709 UART: [state] Locking Datavault
18,681,788 UART: [state] Locking PCR0, PCR1 and PCR31
18,683,544 UART: [state] Locking ICCM
18,686,014 UART: [exit] Launching FMC @ 0x40000130
18,694,409 UART:
18,694,661 UART: Running Caliptra FMC ...
18,695,761 UART:
18,695,923 UART: [state] CFI Enabled
18,753,590 UART: [fht] FMC Alias Private Key: 7
20,519,717 UART: [art] Extend RT PCRs Done
20,520,935 UART: [art] Lock RT PCRs Done
20,522,612 UART: [art] Populate DV Done
20,527,963 UART: [fht] FMC Alias Private Key: 7
20,529,554 UART: [art] Derive CDI
20,530,367 UART: [art] Store in slot 0x4
20,586,360 UART: [art] Derive Key Pair
20,587,391 UART: [art] Store priv key in slot 0x5
23,050,081 UART: [art] Derive Key Pair - Done
23,062,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,350 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,860 UART: [art] PUB.X = E5F3A9D14F0328DC707DDC76D3B9E4ED51F4E4E41520540FD0143519CEB5B2E8953F64A35A34E5983B5C6DA7BDF5BD72
24,785,192 UART: [art] PUB.Y = 8E857A5C464B3A65F0760A6E462D075D54E525936CE17DFAFCBEF3BF3D2DD65C5B2FCCDD9EF9201555E4CEE0119AB0EC
24,792,435 UART: [art] SIG.R = 4CA578C9C56CABCAF424549F53C1AA9120DF25E033FB5509059F8885BC44D1D9B319D927BF5A6DA493FBB4BF7C8F77F9
24,799,970 UART: [art] SIG.S = 0C494B470521B954B6DAAA6E65269EB6AF7490BDD5C20A60219A82EA461AF383EE178F87A76E82575C5468EEE56C5F28
25,778,647 UART: Caliptra RT
25,779,356 UART: [state] CFI Enabled
25,960,349 UART: [rt] RT listening for mailbox commands...
25,962,280 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,992,960 UART: [rt]cmd =0x53574545, len=84
25,996,559 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,460,335 ready_for_fw is high
3,460,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,229,762 >>> mbox cmd response: success
18,526,891 UART:
18,527,304 UART: Running Caliptra FMC ...
18,528,420 UART:
18,528,569 UART: [state] CFI Enabled
18,593,006 UART: [fht] FMC Alias Private Key: 7
20,359,158 UART: [art] Extend RT PCRs Done
20,360,384 UART: [art] Lock RT PCRs Done
20,362,198 UART: [art] Populate DV Done
20,367,348 UART: [fht] FMC Alias Private Key: 7
20,369,046 UART: [art] Derive CDI
20,369,784 UART: [art] Store in slot 0x4
20,425,485 UART: [art] Derive Key Pair
20,426,525 UART: [art] Store priv key in slot 0x5
22,889,291 UART: [art] Derive Key Pair - Done
22,902,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,614,635 UART: [art] Erasing AUTHORITY.KEYID = 7
24,616,133 UART: [art] PUB.X = E93BCEEE936DBE71F3E1070314A8386874523DC9DBB1619525E728A5DC622A13B5642AAD0208BE3A3960FCB5C900F120
24,623,404 UART: [art] PUB.Y = AA0D6F28DCFD3F2086D6581AC05A6BFEB1C93A99CEC687DB02E8B623FB5E2CC9C8F13AECC16084BB775E410F42B18282
24,630,661 UART: [art] SIG.R = 49390CF02E8C0AE37563A32A549E5B641A2F43FD5537B785AF9EF92BD38DBEF8706AABDE93D9F2F0CA31C51A349AB98B
24,638,097 UART: [art] SIG.S = 7B8BCBB01F41D4A3553F0A28277D767E56F7970ACFF8428C9E8D4C45A6231400872E49B66C41B21042A6F29F971A3019
25,616,782 UART: Caliptra RT
25,617,479 UART: [state] CFI Enabled
25,797,703 UART: [rt] RT listening for mailbox commands...
25,799,595 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,829,956 UART: [rt]cmd =0x53574545, len=84
25,833,763 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,345 UART:
192,712 UART: Running Caliptra ROM ...
193,865 UART:
603,482 UART: [state] CFI Enabled
617,229 UART: [state] LifecycleState = Unprovisioned
619,102 UART: [state] DebugLocked = No
620,480 UART: [state] WD Timer not started. Device not locked for debugging
624,805 UART: [kat] SHA2-256
804,482 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,277 UART: [kat] ++
815,729 UART: [kat] sha1
826,670 UART: [kat] SHA2-256
829,395 UART: [kat] SHA2-384
834,556 UART: [kat] SHA2-512-ACC
836,893 UART: [kat] ECC-384
3,279,300 UART: [kat] HMAC-384Kdf
3,291,626 UART: [kat] LMS
3,768,147 UART: [kat] --
3,770,768 UART: [cold-reset] ++
3,772,350 UART: [fht] FHT @ 0x50003400
3,783,830 UART: [idev] ++
3,784,401 UART: [idev] CDI.KEYID = 6
3,785,314 UART: [idev] SUBJECT.KEYID = 7
3,786,563 UART: [idev] UDS.KEYID = 0
3,787,495 ready_for_fw is high
3,787,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,648 UART: [idev] Erasing UDS.KEYID = 0
6,262,717 UART: [idev] Sha1 KeyId Algorithm
6,286,147 UART: [idev] --
6,292,708 UART: [ldev] ++
6,293,284 UART: [ldev] CDI.KEYID = 6
6,294,198 UART: [ldev] SUBJECT.KEYID = 5
6,295,420 UART: [ldev] AUTHORITY.KEYID = 7
6,296,655 UART: [ldev] FE.KEYID = 1
6,307,104 UART: [ldev] Erasing FE.KEYID = 1
8,782,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,373 UART: [ldev] --
10,578,554 UART: [fwproc] Wait for Commands...
10,580,702 UART: [fwproc] Recv command 0x46574c44
10,582,739 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,592 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,600 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,089 >>> mbox cmd response: success
14,554,225 UART: [afmc] ++
14,554,818 UART: [afmc] CDI.KEYID = 6
14,555,860 UART: [afmc] SUBJECT.KEYID = 7
14,556,974 UART: [afmc] AUTHORITY.KEYID = 5
17,065,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,059 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,886 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,916 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,529 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,336 UART: [afmc] --
18,863,611 UART: [cold-reset] --
18,866,071 UART: [state] Locking Datavault
18,870,518 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,274 UART: [state] Locking ICCM
18,875,077 UART: [exit] Launching FMC @ 0x40000130
18,883,476 UART:
18,883,719 UART: Running Caliptra FMC ...
18,884,842 UART:
18,885,006 UART: [state] CFI Enabled
18,893,388 UART: [fht] FMC Alias Private Key: 7
20,659,349 UART: [art] Extend RT PCRs Done
20,660,569 UART: [art] Lock RT PCRs Done
20,662,573 UART: [art] Populate DV Done
20,668,099 UART: [fht] FMC Alias Private Key: 7
20,669,753 UART: [art] Derive CDI
20,670,574 UART: [art] Store in slot 0x4
20,713,550 UART: [art] Derive Key Pair
20,714,563 UART: [art] Store priv key in slot 0x5
23,141,562 UART: [art] Derive Key Pair - Done
23,154,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,111 UART: [art] Erasing AUTHORITY.KEYID = 7
24,862,610 UART: [art] PUB.X = FCDFC55F6DD9C3AE0BF25F6F135A5711B9EB32CAFDDD16A1E556998D85D43E963B76B4F72BFAB08A9EE5A9FB5259DC2C
24,869,904 UART: [art] PUB.Y = 9E17DC0DAAAE713D5F4FD0C199AA78EE7946EDF9BAB559F790832F6434A0962BCA32AD66754B1645C9BAEDEB520D38CF
24,877,213 UART: [art] SIG.R = B65C9FE5D3B7C0B2947E5CF9E0D321DCC731922FE7C8E2E8AD70C92328E6D7E8072345A8D7F2B6B53D7E581FCA799E1C
24,884,609 UART: [art] SIG.S = 56B12498D080059A159C49D266BCA08EE60A9EC7B3BD0DBC27952175E4966E66CFEE6D926FB898C5A6CE5DEAB0482AB6
25,863,366 UART: Caliptra RT
25,864,069 UART: [state] CFI Enabled
25,996,645 UART: [rt] RT listening for mailbox commands...
25,998,533 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,029,104 UART: [rt]cmd =0x53574545, len=84
26,032,712 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,777,931 ready_for_fw is high
3,778,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,209 >>> mbox cmd response: success
18,695,304 UART:
18,695,698 UART: Running Caliptra FMC ...
18,696,894 UART:
18,697,059 UART: [state] CFI Enabled
18,704,672 UART: [fht] FMC Alias Private Key: 7
20,470,727 UART: [art] Extend RT PCRs Done
20,471,953 UART: [art] Lock RT PCRs Done
20,473,422 UART: [art] Populate DV Done
20,478,570 UART: [fht] FMC Alias Private Key: 7
20,480,112 UART: [art] Derive CDI
20,480,875 UART: [art] Store in slot 0x4
20,523,658 UART: [art] Derive Key Pair
20,524,698 UART: [art] Store priv key in slot 0x5
22,951,849 UART: [art] Derive Key Pair - Done
22,964,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,287 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,789 UART: [art] PUB.X = EF0779BF4E1AE8643E5E781334E0F9EB0E0AE26C26B4389421F0968C713BF89C05EAF1A6DEEB7331849D7D4814877AED
24,680,121 UART: [art] PUB.Y = 98363D12D0A2F57AE6CBC90A60476E67130987F3C578E4DAE14ED4620D17246CA3215E02B9E922E7E1B7ED9C0EF1D5F1
24,687,343 UART: [art] SIG.R = 7A923CC5600427D258838B063799B3F82CDB076462973AAEBCDFA2DCF83BEC776CA860F87656F3C90A7F9B5A7BF115E9
24,694,704 UART: [art] SIG.S = 788E3EF39E4E0E31C1314A31833C920FA993865FCB3C2B1A35CBE54ED43E4ACB7D0446A498D598E02C8FE641C93D6A7D
25,673,462 UART: Caliptra RT
25,674,174 UART: [state] CFI Enabled
25,806,941 UART: [rt] RT listening for mailbox commands...
25,808,838 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,839,311 UART: [rt]cmd =0x53574545, len=84
25,842,903 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,037 UART:
192,405 UART: Running Caliptra ROM ...
193,545 UART:
193,696 UART: [state] CFI Enabled
264,382 UART: [state] LifecycleState = Unprovisioned
266,783 UART: [state] DebugLocked = No
268,102 UART: [state] WD Timer not started. Device not locked for debugging
273,488 UART: [kat] SHA2-256
463,390 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,150 UART: [kat] ++
474,627 UART: [kat] sha1
485,998 UART: [kat] SHA2-256
489,010 UART: [kat] SHA2-384
495,213 UART: [kat] SHA2-512-ACC
497,791 UART: [kat] ECC-384
2,947,294 UART: [kat] HMAC-384Kdf
2,972,894 UART: [kat] LMS
3,504,698 UART: [kat] --
3,509,922 UART: [cold-reset] ++
3,511,994 UART: [fht] FHT @ 0x50003400
3,523,693 UART: [idev] ++
3,524,404 UART: [idev] CDI.KEYID = 6
3,525,464 UART: [idev] SUBJECT.KEYID = 7
3,526,566 UART: [idev] UDS.KEYID = 0
3,527,466 ready_for_fw is high
3,527,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,802 UART: [idev] Erasing UDS.KEYID = 0
6,027,959 UART: [idev] Sha1 KeyId Algorithm
6,051,782 UART: [idev] --
6,056,675 UART: [ldev] ++
6,057,361 UART: [ldev] CDI.KEYID = 6
6,058,286 UART: [ldev] SUBJECT.KEYID = 5
6,059,443 UART: [ldev] AUTHORITY.KEYID = 7
6,060,668 UART: [ldev] FE.KEYID = 1
6,101,723 UART: [ldev] Erasing FE.KEYID = 1
8,609,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,881 UART: [ldev] --
10,414,247 UART: [fwproc] Wait for Commands...
10,416,602 UART: [fwproc] Recv command 0x46574c44
10,418,900 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,353 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,936 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,243 >>> mbox cmd response: success
14,684,778 UART: [afmc] ++
14,685,497 UART: [afmc] CDI.KEYID = 6
14,686,682 UART: [afmc] SUBJECT.KEYID = 7
14,688,115 UART: [afmc] AUTHORITY.KEYID = 5
17,214,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,413 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,514 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,662 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,578 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,064 UART: [afmc] --
19,010,548 UART: [cold-reset] --
19,014,907 UART: [state] Locking Datavault
19,019,788 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,999 UART: [state] Locking ICCM
19,023,285 UART: [exit] Launching FMC @ 0x40000130
19,031,902 UART:
19,032,131 UART: Running Caliptra FMC ...
19,033,229 UART:
19,033,384 UART: [state] CFI Enabled
19,096,687 UART: [fht] FMC Alias Private Key: 7
20,884,423 UART: [art] Extend RT PCRs Done
20,885,655 UART: [art] Lock RT PCRs Done
20,887,306 UART: [art] Populate DV Done
20,892,880 UART: [fht] FMC Alias Private Key: 7
20,894,582 UART: [art] Derive CDI
20,895,318 UART: [art] Store in slot 0x4
20,950,400 UART: [art] Derive Key Pair
20,951,435 UART: [art] Store priv key in slot 0x5
23,414,270 UART: [art] Derive Key Pair - Done
23,426,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,760 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,259 UART: [art] PUB.X = 36BA2D8F43D36C77A0FB8130A3D251247AAFAC7DECB6AF839419AA0C79A178E7D4386800B79B9BC6018C769C0911F9AC
25,150,538 UART: [art] PUB.Y = 633870EC71AC2EDE564A6593BAD1CDE90F9BE12A9186523CC1D0018DD8F274D70C9B7AEC894FC74B39717B79A7C7370E
25,157,797 UART: [art] SIG.R = 7B85D323715AEA0A6ECB4EC0E34E9337B6176A23A07BB5163CB5F411D5DE33FA2096B348AF1B858EDCEDF5D6A185F694
25,165,248 UART: [art] SIG.S = CDF5D1D75B451487D2C5CD03BD4525709581FBB715C897143976C3261C27E1C85AE1573F9A2FA5C015651974AA896BF3
26,143,847 UART: Caliptra RT
26,144,552 UART: [state] CFI Enabled
26,324,138 UART: [rt] RT listening for mailbox commands...
26,326,024 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,356,502 UART: [rt]cmd =0x53574545, len=84
26,360,519 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,842 writing to cptra_bootfsm_go
3,438,913 ready_for_fw is high
3,439,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,390 >>> mbox cmd response: success
19,133,176 UART:
19,133,605 UART: Running Caliptra FMC ...
19,134,750 UART:
19,134,915 UART: [state] CFI Enabled
19,201,872 UART: [fht] FMC Alias Private Key: 7
20,968,422 UART: [art] Extend RT PCRs Done
20,969,635 UART: [art] Lock RT PCRs Done
20,971,155 UART: [art] Populate DV Done
20,976,783 UART: [fht] FMC Alias Private Key: 7
20,978,544 UART: [art] Derive CDI
20,979,362 UART: [art] Store in slot 0x4
21,034,318 UART: [art] Derive Key Pair
21,035,330 UART: [art] Store priv key in slot 0x5
23,497,819 UART: [art] Derive Key Pair - Done
23,511,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,378 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,893 UART: [art] PUB.X = DE15AEE2D3ECFF5B84E298820C7D629BC2CF1A9E5D2A41E6D53F8C68BF2F96A77C00C5C19DFA5068C6B694F49F718C80
25,232,175 UART: [art] PUB.Y = CE7BB8E8C714A5C84EF5BA09F6DFFA10A269CE257963711588070FBE560A85F7395B4A9335394FD635EA4451E4C19B3A
25,239,388 UART: [art] SIG.R = 0D6EF73E43C38B395187AB5E937300AB531667C9C9E279201D31E0EED6B3168458856CB6E69EAA2D436BCC671C9EA458
25,246,804 UART: [art] SIG.S = 8B4CE1B6B69D37528802F1DCFC143FD99D8416366493BC660A5A9736C6DB44D68BC5075E816843D8F66BF0F436CD6E49
26,225,626 UART: Caliptra RT
26,226,324 UART: [state] CFI Enabled
26,406,300 UART: [rt] RT listening for mailbox commands...
26,408,172 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,438,757 UART: [rt]cmd =0x53574545, len=84
26,442,567 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,310 writing to cptra_bootfsm_go
193,434 UART:
193,790 UART: Running Caliptra ROM ...
194,904 UART:
604,830 UART: [state] CFI Enabled
617,649 UART: [state] LifecycleState = Unprovisioned
620,043 UART: [state] DebugLocked = No
622,004 UART: [state] WD Timer not started. Device not locked for debugging
625,777 UART: [kat] SHA2-256
815,437 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,247 UART: [kat] ++
826,876 UART: [kat] sha1
838,827 UART: [kat] SHA2-256
841,846 UART: [kat] SHA2-384
846,777 UART: [kat] SHA2-512-ACC
849,364 UART: [kat] ECC-384
3,292,069 UART: [kat] HMAC-384Kdf
3,305,926 UART: [kat] LMS
3,837,697 UART: [kat] --
3,840,772 UART: [cold-reset] ++
3,842,767 UART: [fht] FHT @ 0x50003400
3,853,455 UART: [idev] ++
3,854,175 UART: [idev] CDI.KEYID = 6
3,855,092 UART: [idev] SUBJECT.KEYID = 7
3,856,348 UART: [idev] UDS.KEYID = 0
3,857,276 ready_for_fw is high
3,857,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,465 UART: [idev] Erasing UDS.KEYID = 0
6,334,695 UART: [idev] Sha1 KeyId Algorithm
6,358,465 UART: [idev] --
6,364,404 UART: [ldev] ++
6,365,091 UART: [ldev] CDI.KEYID = 6
6,365,981 UART: [ldev] SUBJECT.KEYID = 5
6,367,193 UART: [ldev] AUTHORITY.KEYID = 7
6,368,425 UART: [ldev] FE.KEYID = 1
6,378,402 UART: [ldev] Erasing FE.KEYID = 1
8,855,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,564 UART: [ldev] --
10,645,457 UART: [fwproc] Wait for Commands...
10,648,048 UART: [fwproc] Recv command 0x46574c44
10,650,368 UART: [fwproc] Recv'd Img size: 118548 bytes
14,142,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,617 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,266 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,925 >>> mbox cmd response: success
14,912,651 UART: [afmc] ++
14,913,386 UART: [afmc] CDI.KEYID = 6
14,914,506 UART: [afmc] SUBJECT.KEYID = 7
14,916,012 UART: [afmc] AUTHORITY.KEYID = 5
17,422,241 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,779 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,816 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,009 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,882 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,900 UART: [afmc] --
19,219,165 UART: [cold-reset] --
19,224,287 UART: [state] Locking Datavault
19,230,154 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,330 UART: [state] Locking ICCM
19,235,253 UART: [exit] Launching FMC @ 0x40000130
19,243,896 UART:
19,244,131 UART: Running Caliptra FMC ...
19,245,235 UART:
19,245,394 UART: [state] CFI Enabled
19,253,823 UART: [fht] FMC Alias Private Key: 7
21,019,593 UART: [art] Extend RT PCRs Done
21,020,817 UART: [art] Lock RT PCRs Done
21,022,477 UART: [art] Populate DV Done
21,028,059 UART: [fht] FMC Alias Private Key: 7
21,029,713 UART: [art] Derive CDI
21,030,551 UART: [art] Store in slot 0x4
21,073,207 UART: [art] Derive Key Pair
21,074,252 UART: [art] Store priv key in slot 0x5
23,501,425 UART: [art] Derive Key Pair - Done
23,514,206 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,128 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,645 UART: [art] PUB.X = 19F4AD9C79A87D87FD13743D0A6F180D54CD85F2317F760507E86E9823D54C967E4783FCAFBD3538BE307B43AA1CEAB1
25,228,924 UART: [art] PUB.Y = F3C30CF70B2E85C6015ED5A5D03454D8539F1C236E35208C307EC028A821C993A57774765AC7512F710F5FB32BE4F361
25,236,185 UART: [art] SIG.R = F687A3690D86BBA3970924568568BCC5091FB41219B59C1088A3C0E19DE1AA35988D21429BA07F356DA7367773ED53F7
25,243,544 UART: [art] SIG.S = 191FF1EDA2091223F500CAAB0259120329478FDB016873FFDEEC7A300FF80EAE14A2B60F03CEEFEAF10CEB62CBDF2E68
26,222,518 UART: Caliptra RT
26,223,214 UART: [state] CFI Enabled
26,356,218 UART: [rt] RT listening for mailbox commands...
26,358,108 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,388,315 UART: [rt]cmd =0x53574545, len=84
26,392,137 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,750,130 ready_for_fw is high
3,750,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,609 >>> mbox cmd response: success
19,295,851 UART:
19,296,253 UART: Running Caliptra FMC ...
19,297,393 UART:
19,297,558 UART: [state] CFI Enabled
19,305,249 UART: [fht] FMC Alias Private Key: 7
21,071,637 UART: [art] Extend RT PCRs Done
21,072,889 UART: [art] Lock RT PCRs Done
21,074,289 UART: [art] Populate DV Done
21,079,774 UART: [fht] FMC Alias Private Key: 7
21,081,321 UART: [art] Derive CDI
21,082,064 UART: [art] Store in slot 0x4
21,125,003 UART: [art] Derive Key Pair
21,126,070 UART: [art] Store priv key in slot 0x5
23,553,214 UART: [art] Derive Key Pair - Done
23,566,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,419 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,924 UART: [art] PUB.X = 54FC598BB16CA9B39FF842E1613AE7AAC9F4EA8F2D5ED46EC20059382DEE1ECB26065B4DF1097F351CD9D08C1FBAE03E
25,281,177 UART: [art] PUB.Y = 0EF7A8405509E0314AE8E2220F7367EBA756AD5571A5D0B0AE7E93BD98AC753EE8ACC41884938B02C8F4812D50128396
25,288,417 UART: [art] SIG.R = F59DCAB4FA5103A3ADBD8FDF0140FD7B78D69456D7C4321479F274CDBDCA2B0F73040AB609E6A26F6092ECDB1DA49057
25,295,865 UART: [art] SIG.S = DD94299AD8A03069F3B42B1837D360773793013D58972DE99E2C387164CFA5907C33FBD53EF3B222683E72B91F0ED679
26,275,272 UART: Caliptra RT
26,275,978 UART: [state] CFI Enabled
26,408,383 UART: [rt] RT listening for mailbox commands...
26,410,298 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,440,720 UART: [rt]cmd =0x53574545, len=84
26,444,547 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,659 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,249 UART: [kat] SHA2-256
882,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,295 UART: [kat] ++
886,447 UART: [kat] sha1
890,671 UART: [kat] SHA2-256
892,609 UART: [kat] SHA2-384
895,398 UART: [kat] SHA2-512-ACC
897,299 UART: [kat] ECC-384
902,666 UART: [kat] HMAC-384Kdf
907,272 UART: [kat] LMS
1,475,468 UART: [kat] --
1,476,133 UART: [cold-reset] ++
1,476,519 UART: [fht] Storing FHT @ 0x50003400
1,479,328 UART: [idev] ++
1,479,496 UART: [idev] CDI.KEYID = 6
1,479,856 UART: [idev] SUBJECT.KEYID = 7
1,480,280 UART: [idev] UDS.KEYID = 0
1,480,625 ready_for_fw is high
1,480,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,286 UART: [idev] Erasing UDS.KEYID = 0
1,504,510 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,182 UART: [idev] --
1,514,089 UART: [ldev] ++
1,514,257 UART: [ldev] CDI.KEYID = 6
1,514,620 UART: [ldev] SUBJECT.KEYID = 5
1,515,046 UART: [ldev] AUTHORITY.KEYID = 7
1,515,509 UART: [ldev] FE.KEYID = 1
1,520,245 UART: [ldev] Erasing FE.KEYID = 1
1,545,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,340 UART: [ldev] --
1,584,653 UART: [fwproc] Waiting for Commands...
1,585,520 UART: [fwproc] Received command 0x46574c44
1,586,311 UART: [fwproc] Received Image of size 118548 bytes
2,929,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,527 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,745 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,014 >>> mbox cmd response: success
3,130,158 UART: [afmc] ++
3,130,326 UART: [afmc] CDI.KEYID = 6
3,130,688 UART: [afmc] SUBJECT.KEYID = 7
3,131,113 UART: [afmc] AUTHORITY.KEYID = 5
3,166,204 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,414 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,194 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,903 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,786 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,469 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,319 UART: [afmc] --
3,209,253 UART: [cold-reset] --
3,209,955 UART: [state] Locking Datavault
3,211,154 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,758 UART: [state] Locking ICCM
3,212,420 UART: [exit] Launching FMC @ 0x40000130
3,217,750 UART:
3,217,766 UART: Running Caliptra FMC ...
3,218,174 UART:
3,218,228 UART: [state] CFI Enabled
3,228,936 UART: [fht] FMC Alias Private Key: 7
3,347,982 UART: [art] Extend RT PCRs Done
3,348,410 UART: [art] Lock RT PCRs Done
3,349,786 UART: [art] Populate DV Done
3,358,105 UART: [fht] FMC Alias Private Key: 7
3,359,059 UART: [art] Derive CDI
3,359,339 UART: [art] Store in slot 0x4
3,445,323 UART: [art] Derive Key Pair
3,445,683 UART: [art] Store priv key in slot 0x5
3,459,322 UART: [art] Derive Key Pair - Done
3,474,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,889 UART: [art] PUB.X = B761984F3D7A93199F4C0CAFDECCC260168F0FD613AADA285E82B69B7E66D13831A42B31C65E3A90032FE3DD2F75F1BC
3,497,666 UART: [art] PUB.Y = 6A2EE3DA74CC1657564D9D7A9E60B4AD1F912260A357D5DF3B643B9E78F622BE232B59B617A847A3CC0C1FDAAB5D92BC
3,504,631 UART: [art] SIG.R = 461C545C16DDE3015735195ADEAEEA57E694F0D656C06CEC55240F081AC70AF2B3718BD7599B0E20F08F1D0844A24034
3,511,387 UART: [art] SIG.S = EF8C165736641452A57003C801968D10D7AA01F7F10586B80E345EA053DCC1A69884AD05C141F23DF8838628B20F4615
3,534,632 UART: Caliptra RT
3,534,883 UART: [state] CFI Enabled
3,654,893 UART: [rt] RT listening for mailbox commands...
3,655,563 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,679 UART: [rt]cmd =0x53574545, len=84
3,688,878 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,364,029 ready_for_fw is high
1,364,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,960 >>> mbox cmd response: success
3,045,145 UART:
3,045,161 UART: Running Caliptra FMC ...
3,045,569 UART:
3,045,623 UART: [state] CFI Enabled
3,056,105 UART: [fht] FMC Alias Private Key: 7
3,175,471 UART: [art] Extend RT PCRs Done
3,175,899 UART: [art] Lock RT PCRs Done
3,177,219 UART: [art] Populate DV Done
3,185,398 UART: [fht] FMC Alias Private Key: 7
3,186,346 UART: [art] Derive CDI
3,186,626 UART: [art] Store in slot 0x4
3,272,024 UART: [art] Derive Key Pair
3,272,384 UART: [art] Store priv key in slot 0x5
3,285,811 UART: [art] Derive Key Pair - Done
3,300,628 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,109 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,874 UART: [art] PUB.X = DF5E5383C69333253E4EDB022FD709E7F580DB0CE15754E65EBC68D248A8CBA15D3A01F681C5A86C4544F9B07A593F8A
3,323,642 UART: [art] PUB.Y = 097C025D7724A957C0B21231296F807CE59F93EACCB6C1D9AC32B4B843F6C887AF31493BA504BA6D540F2475C035C242
3,330,582 UART: [art] SIG.R = 15124FDCE17682831680CBB3FAD8A45D6FD94D45A515701D3ED681786547D8A2195725D3BFF4852C98285603F0ABA934
3,337,347 UART: [art] SIG.S = 3C7318B20DE3B065DE3D1D7E89016F6B0BA0D01E1D9E36A3022ED40D036F49A0872381BE9F2830A5F7E678D78D8BAF28
3,361,457 UART: Caliptra RT
3,361,708 UART: [state] CFI Enabled
3,482,301 UART: [rt] RT listening for mailbox commands...
3,482,971 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,335 UART: [rt]cmd =0x53574545, len=84
3,516,612 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,514 UART: [kat] SHA2-256
882,445 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,560 UART: [kat] ++
886,712 UART: [kat] sha1
891,048 UART: [kat] SHA2-256
892,986 UART: [kat] SHA2-384
895,631 UART: [kat] SHA2-512-ACC
897,532 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,401 UART: [kat] LMS
1,475,597 UART: [kat] --
1,476,426 UART: [cold-reset] ++
1,476,976 UART: [fht] Storing FHT @ 0x50003400
1,479,889 UART: [idev] ++
1,480,057 UART: [idev] CDI.KEYID = 6
1,480,417 UART: [idev] SUBJECT.KEYID = 7
1,480,841 UART: [idev] UDS.KEYID = 0
1,481,186 ready_for_fw is high
1,481,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,083 UART: [idev] Erasing UDS.KEYID = 0
1,505,819 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,329 UART: [idev] --
1,515,316 UART: [ldev] ++
1,515,484 UART: [ldev] CDI.KEYID = 6
1,515,847 UART: [ldev] SUBJECT.KEYID = 5
1,516,273 UART: [ldev] AUTHORITY.KEYID = 7
1,516,736 UART: [ldev] FE.KEYID = 1
1,521,952 UART: [ldev] Erasing FE.KEYID = 1
1,547,805 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,555 UART: [ldev] --
1,587,070 UART: [fwproc] Waiting for Commands...
1,587,801 UART: [fwproc] Received command 0x46574c44
1,588,592 UART: [fwproc] Received Image of size 118548 bytes
2,932,516 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,554 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,772 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,197 >>> mbox cmd response: success
3,133,255 UART: [afmc] ++
3,133,423 UART: [afmc] CDI.KEYID = 6
3,133,785 UART: [afmc] SUBJECT.KEYID = 7
3,134,210 UART: [afmc] AUTHORITY.KEYID = 5
3,169,799 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,093 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,873 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,582 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,465 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,148 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,118 UART: [afmc] --
3,213,026 UART: [cold-reset] --
3,213,888 UART: [state] Locking Datavault
3,215,151 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,755 UART: [state] Locking ICCM
3,216,197 UART: [exit] Launching FMC @ 0x40000130
3,221,527 UART:
3,221,543 UART: Running Caliptra FMC ...
3,221,951 UART:
3,222,094 UART: [state] CFI Enabled
3,233,038 UART: [fht] FMC Alias Private Key: 7
3,352,186 UART: [art] Extend RT PCRs Done
3,352,614 UART: [art] Lock RT PCRs Done
3,354,162 UART: [art] Populate DV Done
3,362,131 UART: [fht] FMC Alias Private Key: 7
3,363,147 UART: [art] Derive CDI
3,363,427 UART: [art] Store in slot 0x4
3,449,039 UART: [art] Derive Key Pair
3,449,399 UART: [art] Store priv key in slot 0x5
3,462,340 UART: [art] Derive Key Pair - Done
3,477,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,597 UART: [art] PUB.X = 784E278F5C5EDE6924452CC99231EDF3D4E680079A392F5AA931068F6E99C4290FFAC925DAFA16EE6869D8D0390C50D1
3,500,361 UART: [art] PUB.Y = 0D45CE86785589C3CE4882F982A7EA0372B376508F548271DBFBEF2035C7FBDE2144F3FE7016E5CD7305FBD3724731D8
3,507,306 UART: [art] SIG.R = 2DBAA4404B0311A5BE343F8F6692F9C14616F1EEC4B9AEAF0E8DC35FA960AA8A23073EB63D7E0967937F2A6611B094B5
3,514,076 UART: [art] SIG.S = 79A60401C5BE63D087893602E50483705C5906F88FEEB929D7C9F55BB2934094359DC5CF9A33991C5E23A261FC0CE049
3,537,616 UART: Caliptra RT
3,537,959 UART: [state] CFI Enabled
3,657,102 UART: [rt] RT listening for mailbox commands...
3,657,772 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,146 UART: [rt]cmd =0x53574545, len=84
3,691,341 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,888 ready_for_fw is high
1,362,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,877 >>> mbox cmd response: success
3,041,292 UART:
3,041,308 UART: Running Caliptra FMC ...
3,041,716 UART:
3,041,859 UART: [state] CFI Enabled
3,052,677 UART: [fht] FMC Alias Private Key: 7
3,172,791 UART: [art] Extend RT PCRs Done
3,173,219 UART: [art] Lock RT PCRs Done
3,174,671 UART: [art] Populate DV Done
3,182,978 UART: [fht] FMC Alias Private Key: 7
3,184,150 UART: [art] Derive CDI
3,184,430 UART: [art] Store in slot 0x4
3,270,458 UART: [art] Derive Key Pair
3,270,818 UART: [art] Store priv key in slot 0x5
3,283,467 UART: [art] Derive Key Pair - Done
3,298,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,088 UART: [art] PUB.X = A510A2A1E75787A13F0BB6F4E35CB9BB02CCD80DC2E58998CB62FAB28B142315441BDBB3FFCBCB813486FBA9BEE718BB
3,321,875 UART: [art] PUB.Y = 45BCF8C081F307C5532584CC62B3C0A421AC196E2BA4E60A79DF2D19370FDE65051535F38D97C65A6B4C2AF6054FEB63
3,328,818 UART: [art] SIG.R = 2DA03CCF689BD61C9AB5F4403033D7D740E54C07AC33DBE05084530458A6812883529EA1BC013B76AE9438EC8F5C3986
3,335,581 UART: [art] SIG.S = 4BB75FA085BE63324A32EBFBDAE3F24F472FABCF091389770D4B72268E25A3559E46B91E0FF501C4B69CD254281E8EBA
3,359,581 UART: Caliptra RT
3,359,924 UART: [state] CFI Enabled
3,480,777 UART: [rt] RT listening for mailbox commands...
3,481,447 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,705 UART: [rt]cmd =0x53574545, len=84
3,514,854 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
916,099 UART: [kat] HMAC-384Kdf
920,449 UART: [kat] LMS
1,168,761 UART: [kat] --
1,169,706 UART: [cold-reset] ++
1,170,092 UART: [fht] FHT @ 0x50003400
1,172,730 UART: [idev] ++
1,172,898 UART: [idev] CDI.KEYID = 6
1,173,259 UART: [idev] SUBJECT.KEYID = 7
1,173,684 UART: [idev] UDS.KEYID = 0
1,174,030 ready_for_fw is high
1,174,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,313 UART: [idev] Erasing UDS.KEYID = 0
1,198,513 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,590 UART: [ldev] ++
1,208,758 UART: [ldev] CDI.KEYID = 6
1,209,122 UART: [ldev] SUBJECT.KEYID = 5
1,209,549 UART: [ldev] AUTHORITY.KEYID = 7
1,210,012 UART: [ldev] FE.KEYID = 1
1,215,304 UART: [ldev] Erasing FE.KEYID = 1
1,241,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,360 UART: [ldev] --
1,280,747 UART: [fwproc] Wait for Commands...
1,281,414 UART: [fwproc] Recv command 0x46574c44
1,282,147 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,109 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,284 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,669 >>> mbox cmd response: success
2,826,907 UART: [afmc] ++
2,827,075 UART: [afmc] CDI.KEYID = 6
2,827,438 UART: [afmc] SUBJECT.KEYID = 7
2,827,864 UART: [afmc] AUTHORITY.KEYID = 5
2,863,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,309 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,019 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,900 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,601 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,388 UART: [afmc] --
2,906,413 UART: [cold-reset] --
2,907,455 UART: [state] Locking Datavault
2,908,668 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,272 UART: [state] Locking ICCM
2,909,930 UART: [exit] Launching FMC @ 0x40000130
2,915,260 UART:
2,915,276 UART: Running Caliptra FMC ...
2,915,684 UART:
2,915,738 UART: [state] CFI Enabled
2,925,904 UART: [fht] FMC Alias Private Key: 7
3,044,682 UART: [art] Extend RT PCRs Done
3,045,110 UART: [art] Lock RT PCRs Done
3,046,502 UART: [art] Populate DV Done
3,054,905 UART: [fht] FMC Alias Private Key: 7
3,056,081 UART: [art] Derive CDI
3,056,361 UART: [art] Store in slot 0x4
3,142,202 UART: [art] Derive Key Pair
3,142,562 UART: [art] Store priv key in slot 0x5
3,156,018 UART: [art] Derive Key Pair - Done
3,170,824 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,252 UART: [art] PUB.X = A7FB77974BD57650D87542815937E042FE9F2677091CF08C6EB94CA9FDEA8EF9F96C09C2331418B00758D5F75415D1FC
3,194,015 UART: [art] PUB.Y = 33E136A5CD133A4A09DF707C74ED28C67F17FB1D79780D0AFBDFC3A084633C0D04E5AECA2011A723D9FAC041C317303E
3,200,964 UART: [art] SIG.R = 6DE7C3310A0B50FAE98EDFDA7D337A87A5494C925F1B419BC7FE1AFE8A23C1EEF3FBED5365FF42DF10706D2E1BD8DCFD
3,207,760 UART: [art] SIG.S = F317A5E4AF1CAE82BC0D65A315B31E19C628EED322CCB8D28CE21E0A2DA2E4D810CD3250932450D80C5EAB8438D47C34
3,231,253 UART: Caliptra RT
3,231,504 UART: [state] CFI Enabled
3,351,269 UART: [rt] RT listening for mailbox commands...
3,351,939 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,263 UART: [rt]cmd =0x53574545, len=84
3,385,584 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,310 ready_for_fw is high
1,059,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,742 >>> mbox cmd response: success
2,739,383 UART:
2,739,399 UART: Running Caliptra FMC ...
2,739,807 UART:
2,739,861 UART: [state] CFI Enabled
2,750,373 UART: [fht] FMC Alias Private Key: 7
2,869,761 UART: [art] Extend RT PCRs Done
2,870,189 UART: [art] Lock RT PCRs Done
2,872,049 UART: [art] Populate DV Done
2,880,364 UART: [fht] FMC Alias Private Key: 7
2,881,446 UART: [art] Derive CDI
2,881,726 UART: [art] Store in slot 0x4
2,967,463 UART: [art] Derive Key Pair
2,967,823 UART: [art] Store priv key in slot 0x5
2,981,057 UART: [art] Derive Key Pair - Done
2,995,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,339 UART: [art] PUB.X = B1C76F052AC8071504658FA9C5E43AB29AD66DDFCD5EFB484C299FEB8EABFB059F1CA4FC496794521F85B36FF259D0DA
3,018,119 UART: [art] PUB.Y = 11DF71A58946CAF3E90840F9BF5CFF7756C9BE5248AF61FE40E66B8ECD0F5B0FEB29C9216D425B2C602D725B5636A4E5
3,025,074 UART: [art] SIG.R = BE30205071D4D3F7174BB00D44BC7CE4C7A605EDCB6DA00DC3A8AF827C435A1D4FFB4490FA421B46C38E9D0DC8E29123
3,031,850 UART: [art] SIG.S = F19E2500629A6A10216E7067B9E39EE28FC64A18B668888CAD2A5E42F220BB6AEEA5DD51C678E8798F9A44646A6D78AF
3,056,006 UART: Caliptra RT
3,056,257 UART: [state] CFI Enabled
3,175,641 UART: [rt] RT listening for mailbox commands...
3,176,311 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,861 UART: [rt]cmd =0x53574545, len=84
3,209,884 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,701 UART: [kat] ++
895,853 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,820 UART: [kat] SHA2-512-ACC
906,721 UART: [kat] ECC-384
916,746 UART: [kat] HMAC-384Kdf
921,238 UART: [kat] LMS
1,169,550 UART: [kat] --
1,170,577 UART: [cold-reset] ++
1,171,141 UART: [fht] FHT @ 0x50003400
1,173,795 UART: [idev] ++
1,173,963 UART: [idev] CDI.KEYID = 6
1,174,324 UART: [idev] SUBJECT.KEYID = 7
1,174,749 UART: [idev] UDS.KEYID = 0
1,175,095 ready_for_fw is high
1,175,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,846 UART: [idev] Erasing UDS.KEYID = 0
1,200,114 UART: [idev] Sha1 KeyId Algorithm
1,209,200 UART: [idev] --
1,210,399 UART: [ldev] ++
1,210,567 UART: [ldev] CDI.KEYID = 6
1,210,931 UART: [ldev] SUBJECT.KEYID = 5
1,211,358 UART: [ldev] AUTHORITY.KEYID = 7
1,211,821 UART: [ldev] FE.KEYID = 1
1,217,081 UART: [ldev] Erasing FE.KEYID = 1
1,243,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,357 UART: [ldev] --
1,282,558 UART: [fwproc] Wait for Commands...
1,283,277 UART: [fwproc] Recv command 0x46574c44
1,284,010 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,760 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,935 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,322 >>> mbox cmd response: success
2,827,436 UART: [afmc] ++
2,827,604 UART: [afmc] CDI.KEYID = 6
2,827,967 UART: [afmc] SUBJECT.KEYID = 7
2,828,393 UART: [afmc] AUTHORITY.KEYID = 5
2,864,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,294 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,004 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,885 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,586 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,339 UART: [afmc] --
2,907,158 UART: [cold-reset] --
2,908,248 UART: [state] Locking Datavault
2,909,457 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,061 UART: [state] Locking ICCM
2,910,707 UART: [exit] Launching FMC @ 0x40000130
2,916,037 UART:
2,916,053 UART: Running Caliptra FMC ...
2,916,461 UART:
2,916,604 UART: [state] CFI Enabled
2,927,240 UART: [fht] FMC Alias Private Key: 7
3,046,276 UART: [art] Extend RT PCRs Done
3,046,704 UART: [art] Lock RT PCRs Done
3,048,506 UART: [art] Populate DV Done
3,056,845 UART: [fht] FMC Alias Private Key: 7
3,057,787 UART: [art] Derive CDI
3,058,067 UART: [art] Store in slot 0x4
3,144,142 UART: [art] Derive Key Pair
3,144,502 UART: [art] Store priv key in slot 0x5
3,158,118 UART: [art] Derive Key Pair - Done
3,173,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,658 UART: [art] PUB.X = 681E8EE73253ADA747B3DD7DA61F1A7D7210B653333D0B18D28A6519D685C38AF69607ED6924F6D8D6899698CEA3AE4B
3,196,428 UART: [art] PUB.Y = 7780A8B00FA42EA7544045B2AA4F8BE06E42CD0639EE52970E8929F595A457AD9321D3A19F1EA778D56BD4D020AB20EF
3,203,377 UART: [art] SIG.R = 6154B3C5181AE003FC5E220509A7CCB21C1147B3E5F36C6314957C65C17CA0C26D373EAB7238D4E99F2E86A0A7E79077
3,210,140 UART: [art] SIG.S = 89191D6981C9D2400DD59C096FF8E715EC7FD91585BC60BEDFC094FAEFA7AE08F9F611CADD0F6679F79A47C440A2A11B
3,233,934 UART: Caliptra RT
3,234,277 UART: [state] CFI Enabled
3,354,152 UART: [rt] RT listening for mailbox commands...
3,354,822 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,186 UART: [rt]cmd =0x53574545, len=84
3,388,669 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,763 ready_for_fw is high
1,059,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,595 >>> mbox cmd response: success
2,742,694 UART:
2,742,710 UART: Running Caliptra FMC ...
2,743,118 UART:
2,743,261 UART: [state] CFI Enabled
2,753,991 UART: [fht] FMC Alias Private Key: 7
2,873,545 UART: [art] Extend RT PCRs Done
2,873,973 UART: [art] Lock RT PCRs Done
2,875,407 UART: [art] Populate DV Done
2,883,708 UART: [fht] FMC Alias Private Key: 7
2,884,820 UART: [art] Derive CDI
2,885,100 UART: [art] Store in slot 0x4
2,971,041 UART: [art] Derive Key Pair
2,971,401 UART: [art] Store priv key in slot 0x5
2,984,911 UART: [art] Derive Key Pair - Done
2,999,925 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,330 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,095 UART: [art] PUB.X = AA43DBCEA859B483DC599319C45159C69B81BA0B73FE117C42FB7F22FF98BCE0D01B2F9583957F959A89C6F761989B7F
3,022,872 UART: [art] PUB.Y = 1CC87200B3C37869E57D0D7D4C41F06C321312791C4E3F80EC360D2D649D5DA401868B61B44581338F1EA5281BC40D08
3,029,781 UART: [art] SIG.R = 194A41B7BC5A0A44D17E53A1BF2D2533D9EF6D0C6A4E9B59CB673ADFEA62178AAF3041C2795769C260329CAACDAE31A8
3,036,563 UART: [art] SIG.S = 67462610B703D825B7003968AEA9FD2F89AE7124119BE23C8CA955BDE170AD41EE579ADA7F9B96F0E43EA333BBD4F898
3,060,728 UART: Caliptra RT
3,061,071 UART: [state] CFI Enabled
3,182,199 UART: [rt] RT listening for mailbox commands...
3,182,869 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,213,155 UART: [rt]cmd =0x53574545, len=84
3,216,458 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
893,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,689 UART: [kat] ++
897,841 UART: [kat] sha1
902,021 UART: [kat] SHA2-256
903,961 UART: [kat] SHA2-384
906,822 UART: [kat] SHA2-512-ACC
908,723 UART: [kat] ECC-384
918,260 UART: [kat] HMAC-384Kdf
922,838 UART: [kat] LMS
1,171,166 UART: [kat] --
1,171,959 UART: [cold-reset] ++
1,172,375 UART: [fht] FHT @ 0x50003400
1,175,094 UART: [idev] ++
1,175,262 UART: [idev] CDI.KEYID = 6
1,175,622 UART: [idev] SUBJECT.KEYID = 7
1,176,046 UART: [idev] UDS.KEYID = 0
1,176,391 ready_for_fw is high
1,176,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,200 UART: [idev] Erasing UDS.KEYID = 0
1,200,777 UART: [idev] Sha1 KeyId Algorithm
1,209,053 UART: [idev] --
1,210,257 UART: [ldev] ++
1,210,425 UART: [ldev] CDI.KEYID = 6
1,210,788 UART: [ldev] SUBJECT.KEYID = 5
1,211,214 UART: [ldev] AUTHORITY.KEYID = 7
1,211,677 UART: [ldev] FE.KEYID = 1
1,216,751 UART: [ldev] Erasing FE.KEYID = 1
1,243,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,213 UART: [ldev] --
1,282,542 UART: [fwproc] Wait for Commands...
1,283,170 UART: [fwproc] Recv command 0x46574c44
1,283,898 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,669 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,839 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,040 >>> mbox cmd response: success
2,828,098 UART: [afmc] ++
2,828,266 UART: [afmc] CDI.KEYID = 6
2,828,628 UART: [afmc] SUBJECT.KEYID = 7
2,829,053 UART: [afmc] AUTHORITY.KEYID = 5
2,865,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,195 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,904 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,787 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,488 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,278 UART: [afmc] --
2,908,386 UART: [cold-reset] --
2,909,292 UART: [state] Locking Datavault
2,910,531 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,135 UART: [state] Locking ICCM
2,911,641 UART: [exit] Launching FMC @ 0x40000130
2,916,971 UART:
2,916,987 UART: Running Caliptra FMC ...
2,917,395 UART:
2,917,449 UART: [state] CFI Enabled
2,927,527 UART: [fht] FMC Alias Private Key: 7
3,046,347 UART: [art] Extend RT PCRs Done
3,046,775 UART: [art] Lock RT PCRs Done
3,047,865 UART: [art] Populate DV Done
3,056,158 UART: [fht] FMC Alias Private Key: 7
3,057,132 UART: [art] Derive CDI
3,057,412 UART: [art] Store in slot 0x4
3,143,181 UART: [art] Derive Key Pair
3,143,541 UART: [art] Store priv key in slot 0x5
3,156,667 UART: [art] Derive Key Pair - Done
3,171,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,981 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,746 UART: [art] PUB.X = 16E67B74009CDAEA7D7039524332AC8E9B823DE938FD501459FF31F3250D20E1DFE3CD224CA6707F8DC7A973F2423925
3,194,495 UART: [art] PUB.Y = E97E3ABF29D59470F412DF04E7C892618D3AD98521A47641E5A7A5BC8854F68FAE0AB317B9CB40A2697648D334AF713A
3,201,445 UART: [art] SIG.R = F92811C7CE4AEADF16E1DF710B0FDA2BDCFCC05051CE44E13443AE442E85AD200A312C9CD48D69D3D822B358A946DC0B
3,208,225 UART: [art] SIG.S = C1D612D4452F36CF5688D82917CF21D3E3C7C46558C8BC40B5D125F1873D90B88F622C51E61B4DF30C622F6F24A21DE5
3,232,514 UART: Caliptra RT
3,232,765 UART: [state] CFI Enabled
3,352,601 UART: [rt] RT listening for mailbox commands...
3,353,271 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,379 UART: [rt]cmd =0x53574545, len=84
3,386,600 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,873 ready_for_fw is high
1,059,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,970 >>> mbox cmd response: success
2,739,619 UART:
2,739,635 UART: Running Caliptra FMC ...
2,740,043 UART:
2,740,097 UART: [state] CFI Enabled
2,750,279 UART: [fht] FMC Alias Private Key: 7
2,869,667 UART: [art] Extend RT PCRs Done
2,870,095 UART: [art] Lock RT PCRs Done
2,871,797 UART: [art] Populate DV Done
2,879,792 UART: [fht] FMC Alias Private Key: 7
2,880,804 UART: [art] Derive CDI
2,881,084 UART: [art] Store in slot 0x4
2,967,011 UART: [art] Derive Key Pair
2,967,371 UART: [art] Store priv key in slot 0x5
2,980,619 UART: [art] Derive Key Pair - Done
2,995,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,874 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,639 UART: [art] PUB.X = D701DB69D6DB3941D47226B7AB8D939FA9962BE599A92BE71DAA3F1B30379FE8A20B53369F6D622844BE2A7D18DCEF87
3,018,415 UART: [art] PUB.Y = 1704B25BCEA7E21A38C21102F82F4F075C524947E958C2B68D0B4906E7AEF60A8D2499FF5CD9702FE4D794E4AE325746
3,025,351 UART: [art] SIG.R = 95C17235BEEB3F4FC65A8C2FCB7E7604FBCC1A1FEBDC441E1FD5EFDD6A61EC64DBFD279C0B9362056E3274313646BD6A
3,032,138 UART: [art] SIG.S = BCA9F792B18C88ACB910F5C157831BAAB550FE6F3DCFF90D4A6F0D561FA5B33FC591FF7CA15179E4DC44E5E40C90D843
3,056,007 UART: Caliptra RT
3,056,258 UART: [state] CFI Enabled
3,175,884 UART: [rt] RT listening for mailbox commands...
3,176,554 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,860 UART: [rt]cmd =0x53574545, len=84
3,209,713 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,725 UART: [kat] SHA2-256
893,375 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,500 UART: [kat] ++
897,652 UART: [kat] sha1
901,908 UART: [kat] SHA2-256
903,848 UART: [kat] SHA2-384
906,567 UART: [kat] SHA2-512-ACC
908,468 UART: [kat] ECC-384
917,871 UART: [kat] HMAC-384Kdf
922,315 UART: [kat] LMS
1,170,643 UART: [kat] --
1,171,764 UART: [cold-reset] ++
1,172,324 UART: [fht] FHT @ 0x50003400
1,174,899 UART: [idev] ++
1,175,067 UART: [idev] CDI.KEYID = 6
1,175,427 UART: [idev] SUBJECT.KEYID = 7
1,175,851 UART: [idev] UDS.KEYID = 0
1,176,196 ready_for_fw is high
1,176,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,687 UART: [idev] Erasing UDS.KEYID = 0
1,200,746 UART: [idev] Sha1 KeyId Algorithm
1,209,288 UART: [idev] --
1,210,354 UART: [ldev] ++
1,210,522 UART: [ldev] CDI.KEYID = 6
1,210,885 UART: [ldev] SUBJECT.KEYID = 5
1,211,311 UART: [ldev] AUTHORITY.KEYID = 7
1,211,774 UART: [ldev] FE.KEYID = 1
1,217,004 UART: [ldev] Erasing FE.KEYID = 1
1,243,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,552 UART: [ldev] --
1,283,043 UART: [fwproc] Wait for Commands...
1,283,623 UART: [fwproc] Recv command 0x46574c44
1,284,351 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,051 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,221 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,466 >>> mbox cmd response: success
2,828,532 UART: [afmc] ++
2,828,700 UART: [afmc] CDI.KEYID = 6
2,829,062 UART: [afmc] SUBJECT.KEYID = 7
2,829,487 UART: [afmc] AUTHORITY.KEYID = 5
2,865,122 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,249 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,958 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,841 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,542 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,402 UART: [afmc] --
2,908,328 UART: [cold-reset] --
2,909,054 UART: [state] Locking Datavault
2,910,137 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,741 UART: [state] Locking ICCM
2,911,197 UART: [exit] Launching FMC @ 0x40000130
2,916,527 UART:
2,916,543 UART: Running Caliptra FMC ...
2,916,951 UART:
2,917,094 UART: [state] CFI Enabled
2,927,786 UART: [fht] FMC Alias Private Key: 7
3,046,872 UART: [art] Extend RT PCRs Done
3,047,300 UART: [art] Lock RT PCRs Done
3,048,838 UART: [art] Populate DV Done
3,056,939 UART: [fht] FMC Alias Private Key: 7
3,057,977 UART: [art] Derive CDI
3,058,257 UART: [art] Store in slot 0x4
3,144,088 UART: [art] Derive Key Pair
3,144,448 UART: [art] Store priv key in slot 0x5
3,158,294 UART: [art] Derive Key Pair - Done
3,173,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,837 UART: [art] PUB.X = 26B140A0CBC2461DC470DB80B0CF753687798A80D920F07461034DA938252D926090570640C4F978A7EFB77700CE387C
3,196,571 UART: [art] PUB.Y = F1D738660465A73CF2CD52B9B4DB84AB15EA9644D459784A10C2792F67BD9064239C21131F4CA3D82D08463DD337221C
3,203,513 UART: [art] SIG.R = D5FB9AACA5612485B5A2456D471B285F3D943E4CF55373C274B7C3C9A7D0666D774FAB6613D89BEDE9FC15536F53F312
3,210,291 UART: [art] SIG.S = E1AF1E78703E08899F65CACB5B781C7A60D7B2BFAF5DFC93D7F3A7B50CAFA54CCEF99BA659364CEDBBE0C98CED83698F
3,233,625 UART: Caliptra RT
3,233,968 UART: [state] CFI Enabled
3,354,110 UART: [rt] RT listening for mailbox commands...
3,354,780 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,898 UART: [rt]cmd =0x53574545, len=84
3,387,931 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,268 ready_for_fw is high
1,061,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,811 >>> mbox cmd response: success
2,741,866 UART:
2,741,882 UART: Running Caliptra FMC ...
2,742,290 UART:
2,742,433 UART: [state] CFI Enabled
2,753,009 UART: [fht] FMC Alias Private Key: 7
2,871,825 UART: [art] Extend RT PCRs Done
2,872,253 UART: [art] Lock RT PCRs Done
2,873,905 UART: [art] Populate DV Done
2,882,166 UART: [fht] FMC Alias Private Key: 7
2,883,102 UART: [art] Derive CDI
2,883,382 UART: [art] Store in slot 0x4
2,969,219 UART: [art] Derive Key Pair
2,969,579 UART: [art] Store priv key in slot 0x5
2,982,973 UART: [art] Derive Key Pair - Done
2,997,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,259 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,024 UART: [art] PUB.X = E39849673A895E9BF7337F0D3D5960B64A30D0CD7C9AA0885E8E423350043BFD22F4E32753B894EBAFC3C8FCFFDBE560
3,020,800 UART: [art] PUB.Y = C69DEF900B66FEFC8EA2091EBA9DACC7E4F317D26136DF38D9C69158C490CB74B5240B99CD3B5A0BAE0C1FF70877F17E
3,027,754 UART: [art] SIG.R = F528FBEE8C87FA5ADD525349ABC418A6087C0554102019F7C7877027FFF95A2EFAE8D94161486AD6FA984E59E8082585
3,034,519 UART: [art] SIG.S = 6C0C4F4EE56AAFC4907E550B548B028AA04F462733EE24A43C8575C26F31D2F640D0437C309EA8BCB6900F51CC8ABA87
3,058,747 UART: Caliptra RT
3,059,090 UART: [state] CFI Enabled
3,178,867 UART: [rt] RT listening for mailbox commands...
3,179,537 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,201 UART: [rt]cmd =0x53574545, len=84
3,213,314 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
191,957 UART:
192,323 UART: Running Caliptra ROM ...
193,517 UART:
193,670 UART: [state] CFI Enabled
263,258 UART: [state] LifecycleState = Unprovisioned
265,242 UART: [state] DebugLocked = No
267,133 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,148 UART: [kat] SHA2-256
441,883 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,387 UART: [kat] ++
452,930 UART: [kat] sha1
463,335 UART: [kat] SHA2-256
465,992 UART: [kat] SHA2-384
473,397 UART: [kat] SHA2-512-ACC
475,771 UART: [kat] ECC-384
2,768,068 UART: [kat] HMAC-384Kdf
2,798,431 UART: [kat] LMS
3,988,713 UART: [kat] --
3,993,446 UART: [cold-reset] ++
3,994,885 UART: [fht] Storing FHT @ 0x50003400
4,007,076 UART: [idev] ++
4,007,650 UART: [idev] CDI.KEYID = 6
4,008,686 UART: [idev] SUBJECT.KEYID = 7
4,009,868 UART: [idev] UDS.KEYID = 0
4,010,918 ready_for_fw is high
4,011,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,201 UART: [idev] Erasing UDS.KEYID = 0
7,344,654 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,013 UART: [idev] --
7,370,876 UART: [ldev] ++
7,371,456 UART: [ldev] CDI.KEYID = 6
7,372,439 UART: [ldev] SUBJECT.KEYID = 5
7,373,601 UART: [ldev] AUTHORITY.KEYID = 7
7,374,893 UART: [ldev] FE.KEYID = 1
7,419,742 UART: [ldev] Erasing FE.KEYID = 1
10,753,640 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,272 UART: [ldev] --
13,113,728 UART: [fwproc] Waiting for Commands...
13,116,417 UART: [fwproc] Received command 0x46574c44
13,118,624 UART: [fwproc] Received Image of size 118548 bytes
17,223,066 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,132 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,377,258 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,890 >>> mbox cmd response: success
17,710,451 UART: [afmc] ++
17,711,078 UART: [afmc] CDI.KEYID = 6
17,711,999 UART: [afmc] SUBJECT.KEYID = 7
17,713,223 UART: [afmc] AUTHORITY.KEYID = 5
21,068,566 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,539 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,853 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,387,239 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,993 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,416,459 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,097 UART: [afmc] --
23,441,642 UART: [cold-reset] --
23,446,915 UART: [state] Locking Datavault
23,450,763 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,464 UART: [state] Locking ICCM
23,454,238 UART: [exit] Launching FMC @ 0x40000130
23,462,651 UART:
23,462,902 UART: Running Caliptra FMC ...
23,464,006 UART:
23,464,172 UART: [state] CFI Enabled
23,530,724 UART: [fht] FMC Alias Private Key: 7
25,871,278 UART: [art] Extend RT PCRs Done
25,872,506 UART: [art] Lock RT PCRs Done
25,874,265 UART: [art] Populate DV Done
25,879,621 UART: [fht] FMC Alias Private Key: 7
25,881,101 UART: [art] Derive CDI
25,881,862 UART: [art] Store in slot 0x4
25,939,948 UART: [art] Derive Key Pair
25,940,997 UART: [art] Store priv key in slot 0x5
29,234,030 UART: [art] Derive Key Pair - Done
29,246,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,415 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,923 UART: [art] PUB.X = B7A8375AAD24BE5BB2A7F51DC17ACD19A03148F54FE08AAE09B1EF56EBE900286300EA91FD9D5B08B863C31D7D6E5F59
31,545,194 UART: [art] PUB.Y = 054AE5CC66E3754BF91CF813B5A51608F11EE5063E15B4D4DA11750B23680750168D45B5CCADDD88829DD5E505D2EFCB
31,552,448 UART: [art] SIG.R = 9A8C7F427E293CA54EB2FC8B2BBC2B8472F5AA934C55B6629166417BEFC585FF2FB61475C1BEA89F9D3084C62A67F533
31,559,857 UART: [art] SIG.S = 2F95D177FC3CDA79D6CA7A6638E73CF2C7898F0FE9E0CC6A798E566F6F955846CBFFF39588AA216749B6470BB29872B5
32,865,240 UART: Caliptra RT
32,865,958 UART: [state] CFI Enabled
33,042,477 UART: [rt] RT listening for mailbox commands...
33,044,838 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,075,560 UART: [rt]cmd =0x44504543, len=96
38,856,992 >>> mbox cmd response data (6236 bytes)
38,886,261 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,916,883 UART: [rt]cmd =0x53574545, len=84
44,492,108 >>> mbox cmd response data (200 bytes)
44,878,269 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,908,496 UART: [rt]cmd =0x52564348, len=36
44,911,297 >>> mbox cmd response data (8 bytes)
44,911,662 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,941,937 UART: [rt]cmd =0x53574545, len=84
44,946,113 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,805,878 ready_for_fw is high
3,806,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,961,447 >>> mbox cmd response: success
23,647,298 UART:
23,647,721 UART: Running Caliptra FMC ...
23,648,836 UART:
23,648,989 UART: [state] CFI Enabled
23,717,866 UART: [fht] FMC Alias Private Key: 7
26,058,466 UART: [art] Extend RT PCRs Done
26,059,688 UART: [art] Lock RT PCRs Done
26,061,043 UART: [art] Populate DV Done
26,066,644 UART: [fht] FMC Alias Private Key: 7
26,068,295 UART: [art] Derive CDI
26,069,111 UART: [art] Store in slot 0x4
26,127,567 UART: [art] Derive Key Pair
26,128,601 UART: [art] Store priv key in slot 0x5
29,421,769 UART: [art] Derive Key Pair - Done
29,434,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,083 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,587 UART: [art] PUB.X = 6D1093D5CECCACBEDB38BB86AE3197CC3A39DD4162559D84D76A3C3060C1CC84DD20530505EEDC1BF4F2277AC77867A3
31,731,897 UART: [art] PUB.Y = 7C9EEE884D7646D9F77359C3E6AE28A0092EA102EAEF349D032959F6DCF5E598EBE801D46DCDA3A493C47F5632895078
31,739,118 UART: [art] SIG.R = F4F1BC7D9F52DD5D0389482A234831F8DCF918774981A9AA4BACD79B6C388C9472141C743ED3B77CE34FB975CB01A73D
31,746,518 UART: [art] SIG.S = 006AA53478426A570029D9456FC743179A5DA5E515B522313CBC1FF125284B02E83D1E9F1216F93BDA23D89471B98254
33,051,833 UART: Caliptra RT
33,052,569 UART: [state] CFI Enabled
33,229,632 UART: [rt] RT listening for mailbox commands...
33,231,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,262,627 UART: [rt]cmd =0x44504543, len=96
39,042,613 >>> mbox cmd response data (6236 bytes)
39,071,959 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,102,347 UART: [rt]cmd =0x53574545, len=84
44,678,260 >>> mbox cmd response data (200 bytes)
45,064,746 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
45,095,120 UART: [rt]cmd =0x52564348, len=36
45,098,126 >>> mbox cmd response data (8 bytes)
45,098,589 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,128,946 UART: [rt]cmd =0x53574545, len=84
45,132,721 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
193,374 UART:
193,723 UART: Running Caliptra ROM ...
194,904 UART:
604,543 UART: [state] CFI Enabled
618,576 UART: [state] LifecycleState = Unprovisioned
620,525 UART: [state] DebugLocked = No
623,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,613 UART: [kat] SHA2-256
798,346 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,924 UART: [kat] ++
809,411 UART: [kat] sha1
821,629 UART: [kat] SHA2-256
824,346 UART: [kat] SHA2-384
829,487 UART: [kat] SHA2-512-ACC
831,853 UART: [kat] ECC-384
3,115,575 UART: [kat] HMAC-384Kdf
3,126,665 UART: [kat] LMS
4,316,783 UART: [kat] --
4,320,532 UART: [cold-reset] ++
4,322,399 UART: [fht] Storing FHT @ 0x50003400
4,333,577 UART: [idev] ++
4,334,157 UART: [idev] CDI.KEYID = 6
4,335,111 UART: [idev] SUBJECT.KEYID = 7
4,336,348 UART: [idev] UDS.KEYID = 0
4,337,326 ready_for_fw is high
4,337,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,472 UART: [idev] Erasing UDS.KEYID = 0
7,624,478 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,176 UART: [idev] --
7,649,846 UART: [ldev] ++
7,650,409 UART: [ldev] CDI.KEYID = 6
7,651,388 UART: [ldev] SUBJECT.KEYID = 5
7,652,606 UART: [ldev] AUTHORITY.KEYID = 7
7,653,834 UART: [ldev] FE.KEYID = 1
7,664,688 UART: [ldev] Erasing FE.KEYID = 1
10,952,669 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,437 UART: [ldev] --
13,313,022 UART: [fwproc] Waiting for Commands...
13,315,820 UART: [fwproc] Received command 0x46574c44
13,317,993 UART: [fwproc] Received Image of size 118548 bytes
17,424,473 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,365 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,513 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,009 >>> mbox cmd response: success
17,904,771 UART: [afmc] ++
17,905,361 UART: [afmc] CDI.KEYID = 6
17,906,245 UART: [afmc] SUBJECT.KEYID = 7
17,907,506 UART: [afmc] AUTHORITY.KEYID = 5
21,221,438 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,207 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,467 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,882 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,597 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,024 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,532 UART: [afmc] --
23,585,742 UART: [cold-reset] --
23,589,434 UART: [state] Locking Datavault
23,594,890 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,579 UART: [state] Locking ICCM
23,598,207 UART: [exit] Launching FMC @ 0x40000130
23,606,616 UART:
23,606,890 UART: Running Caliptra FMC ...
23,607,995 UART:
23,608,150 UART: [state] CFI Enabled
23,616,220 UART: [fht] FMC Alias Private Key: 7
25,956,133 UART: [art] Extend RT PCRs Done
25,957,348 UART: [art] Lock RT PCRs Done
25,958,832 UART: [art] Populate DV Done
25,964,346 UART: [fht] FMC Alias Private Key: 7
25,965,927 UART: [art] Derive CDI
25,966,731 UART: [art] Store in slot 0x4
26,009,535 UART: [art] Derive Key Pair
26,010,582 UART: [art] Store priv key in slot 0x5
29,252,116 UART: [art] Derive Key Pair - Done
29,265,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,174 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,688 UART: [art] PUB.X = EB923E68E11F15D9CA07600166278E098DBBABD2A6326FD42D184F7B94B993A5827D1F35B6AA8CC300E5591298DCBC35
31,553,943 UART: [art] PUB.Y = 38B15A677867119FCF673EF113E207F47D6A4E0F3C7A684D00BE9AFBFEAD819846C0B59789671F5E688EE9C248863DB0
31,561,181 UART: [art] SIG.R = 8572EE3F8B01C0DA8CE5FAC10EB5A3B58E8E7CB16B61C03AD70DBCAB9F2273A3F01F241A786CEE2E477619689E05BD73
31,568,574 UART: [art] SIG.S = A8AB31D2F49E0543F01C7465B4611FC1BCB0F4073D6FD20BD613832E43C19AA7EBF957775DC4A198634E4E0635852C03
32,873,935 UART: Caliptra RT
32,874,648 UART: [state] CFI Enabled
33,007,655 UART: [rt] RT listening for mailbox commands...
33,009,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,040,694 UART: [rt]cmd =0x44504543, len=96
38,724,170 >>> mbox cmd response data (6236 bytes)
38,753,388 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,784,055 UART: [rt]cmd =0x53574545, len=84
44,309,356 >>> mbox cmd response data (200 bytes)
44,694,658 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,724,855 UART: [rt]cmd =0x52564348, len=36
44,727,999 >>> mbox cmd response data (8 bytes)
44,728,433 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,758,671 UART: [rt]cmd =0x53574545, len=84
44,762,151 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
4,127,598 ready_for_fw is high
4,128,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,089 >>> mbox cmd response: success
23,797,483 UART:
23,797,880 UART: Running Caliptra FMC ...
23,798,992 UART:
23,799,142 UART: [state] CFI Enabled
23,807,194 UART: [fht] FMC Alias Private Key: 7
26,147,419 UART: [art] Extend RT PCRs Done
26,148,651 UART: [art] Lock RT PCRs Done
26,150,357 UART: [art] Populate DV Done
26,155,667 UART: [fht] FMC Alias Private Key: 7
26,157,143 UART: [art] Derive CDI
26,157,874 UART: [art] Store in slot 0x4
26,200,548 UART: [art] Derive Key Pair
26,201,542 UART: [art] Store priv key in slot 0x5
29,443,734 UART: [art] Derive Key Pair - Done
29,456,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,769 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,280 UART: [art] PUB.X = 4E57741B7007B72FF0C26276A267E397861EA61CD396340053887BD399A55B682030C5A3ECAFAF74211CAC05AB2A667A
31,745,523 UART: [art] PUB.Y = 2A61DF1664369C944AF97BC1BDDE4B3A85EDB5CF756B99F62906CB29EFF8FF45BCD3ACF2055056E8854AA3CAEDFA2635
31,752,816 UART: [art] SIG.R = ED3A6EBF0B611EC252DF0B377A3F9A8094819190B486BD63970099B74C09D9C8FE23C97A6B169E8DA1CAD703E86ECCB7
31,760,206 UART: [art] SIG.S = E13F314B4FDD2A13C80B48B3D0F0B3C9A976F8DBEA640BA3641E4670027AA1DE5B9EB20F07EFE55D8D6071A6388B6568
33,065,349 UART: Caliptra RT
33,066,060 UART: [state] CFI Enabled
33,199,069 UART: [rt] RT listening for mailbox commands...
33,201,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,232,235 UART: [rt]cmd =0x44504543, len=96
38,917,284 >>> mbox cmd response data (6236 bytes)
38,946,633 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,977,104 UART: [rt]cmd =0x53574545, len=84
44,501,465 >>> mbox cmd response data (200 bytes)
44,886,300 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,916,632 UART: [rt]cmd =0x52564348, len=36
44,919,479 >>> mbox cmd response data (8 bytes)
44,919,918 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,950,390 UART: [rt]cmd =0x53574545, len=84
44,953,929 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,185 UART:
192,535 UART: Running Caliptra ROM ...
193,632 UART:
193,773 UART: [state] CFI Enabled
264,868 UART: [state] LifecycleState = Unprovisioned
266,779 UART: [state] DebugLocked = No
269,576 UART: [state] WD Timer not started. Device not locked for debugging
273,681 UART: [kat] SHA2-256
453,316 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,076 UART: [kat] ++
464,530 UART: [kat] sha1
476,504 UART: [kat] SHA2-256
479,208 UART: [kat] SHA2-384
486,052 UART: [kat] SHA2-512-ACC
488,422 UART: [kat] ECC-384
2,947,640 UART: [kat] HMAC-384Kdf
2,970,398 UART: [kat] LMS
3,446,909 UART: [kat] --
3,450,610 UART: [cold-reset] ++
3,453,240 UART: [fht] FHT @ 0x50003400
3,464,702 UART: [idev] ++
3,465,256 UART: [idev] CDI.KEYID = 6
3,466,202 UART: [idev] SUBJECT.KEYID = 7
3,467,436 UART: [idev] UDS.KEYID = 0
3,468,326 ready_for_fw is high
3,468,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,548 UART: [idev] Erasing UDS.KEYID = 0
5,986,164 UART: [idev] Sha1 KeyId Algorithm
6,009,009 UART: [idev] --
6,015,036 UART: [ldev] ++
6,015,616 UART: [ldev] CDI.KEYID = 6
6,016,546 UART: [ldev] SUBJECT.KEYID = 5
6,017,708 UART: [ldev] AUTHORITY.KEYID = 7
6,018,988 UART: [ldev] FE.KEYID = 1
6,056,778 UART: [ldev] Erasing FE.KEYID = 1
8,562,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,256 UART: [ldev] --
10,376,508 UART: [fwproc] Wait for Commands...
10,378,055 UART: [fwproc] Recv command 0x46574c44
10,380,091 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,507 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,011,525 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,338,998 >>> mbox cmd response: success
14,342,888 UART: [afmc] ++
14,343,495 UART: [afmc] CDI.KEYID = 6
14,344,517 UART: [afmc] SUBJECT.KEYID = 7
14,345,676 UART: [afmc] AUTHORITY.KEYID = 5
16,876,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,107 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,981 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,978 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,534 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,623 UART: [afmc] --
18,696,839 UART: [cold-reset] --
18,699,998 UART: [state] Locking Datavault
18,704,865 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,559 UART: [state] Locking ICCM
18,707,864 UART: [exit] Launching FMC @ 0x40000130
18,716,251 UART:
18,716,498 UART: Running Caliptra FMC ...
18,717,596 UART:
18,717,750 UART: [state] CFI Enabled
18,775,722 UART: [fht] FMC Alias Private Key: 7
20,541,956 UART: [art] Extend RT PCRs Done
20,543,172 UART: [art] Lock RT PCRs Done
20,544,661 UART: [art] Populate DV Done
20,550,343 UART: [fht] FMC Alias Private Key: 7
20,551,810 UART: [art] Derive CDI
20,552,732 UART: [art] Store in slot 0x4
20,608,417 UART: [art] Derive Key Pair
20,609,412 UART: [art] Store priv key in slot 0x5
23,072,412 UART: [art] Derive Key Pair - Done
23,085,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,989 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,484 UART: [art] PUB.X = 0590FA7226FEA50B9B7FF47466AD7D2477D43BB39EBBBC37E181451CCD6B233FFB3123ED6C9F57AB34CCC3FB5F372509
24,806,791 UART: [art] PUB.Y = B67529AD94A0310A8AF03C28BC7A020CD2835F54086C66B6CCEDE6AC6C814BDA68259E2A15ABD813A900B519097D5D0F
24,814,077 UART: [art] SIG.R = AF6D8146483665D1813D5E358B8939C9C2A10313810E46A5FD3D6A93E6494E46925322C1BA585A7792B70D98F77952E2
24,821,418 UART: [art] SIG.S = CE795D185BE207B3758A060A3AADB5377E1EC7718268B1141BE68840289B41AFAC2922F40B7C5A1316AA085D6805F59A
25,800,310 UART: Caliptra RT
25,801,016 UART: [state] CFI Enabled
25,982,396 UART: [rt] RT listening for mailbox commands...
25,984,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,015,319 UART: [rt]cmd =0x44504543, len=96
30,390,785 >>> mbox cmd response data (6236 bytes)
30,419,966 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,450,467 UART: [rt]cmd =0x53574545, len=84
34,617,907 >>> mbox cmd response data (200 bytes)
35,002,681 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,033,132 UART: [rt]cmd =0x52564348, len=36
35,036,174 >>> mbox cmd response data (8 bytes)
35,036,630 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,066,991 UART: [rt]cmd =0x53574545, len=84
35,070,587 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,460,508 ready_for_fw is high
3,460,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,261,827 >>> mbox cmd response: success
18,557,405 UART:
18,557,791 UART: Running Caliptra FMC ...
18,558,915 UART:
18,559,073 UART: [state] CFI Enabled
18,623,044 UART: [fht] FMC Alias Private Key: 7
20,389,794 UART: [art] Extend RT PCRs Done
20,391,018 UART: [art] Lock RT PCRs Done
20,392,202 UART: [art] Populate DV Done
20,397,749 UART: [fht] FMC Alias Private Key: 7
20,399,457 UART: [art] Derive CDI
20,400,217 UART: [art] Store in slot 0x4
20,456,115 UART: [art] Derive Key Pair
20,457,110 UART: [art] Store priv key in slot 0x5
22,919,684 UART: [art] Derive Key Pair - Done
22,932,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,645,877 UART: [art] Erasing AUTHORITY.KEYID = 7
24,647,383 UART: [art] PUB.X = 35A001E6630D1E7F267B4276BF89DE678333EE0E1AE9675152047A068C2F20A6AF941D9E64D3F38E4FCAF0FC1338BE8F
24,654,694 UART: [art] PUB.Y = 6B4981932C5BAA96C1F1D2C1BA2B8FF9EF90E42C989685CE6F1C65347E12C7AA21D70D7382CD2EAC49B39709A5F497FB
24,661,936 UART: [art] SIG.R = 487953F221AC2EAB550E2594933614FA41D8BA920ECAB3EA8241ECCCAD4816D6803A0F036A140F0E6E0CC84B5BF515C7
24,669,330 UART: [art] SIG.S = 056F31A623F30DD27DFC080A08349AA41605A09B5A27575BFAE678468C66C385300044A3490531FD2B6471C175B480A8
25,648,418 UART: Caliptra RT
25,649,122 UART: [state] CFI Enabled
25,828,517 UART: [rt] RT listening for mailbox commands...
25,830,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,861,213 UART: [rt]cmd =0x44504543, len=96
30,237,650 >>> mbox cmd response data (6236 bytes)
30,266,827 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,297,530 UART: [rt]cmd =0x53574545, len=84
34,465,730 >>> mbox cmd response data (200 bytes)
34,848,830 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,879,355 UART: [rt]cmd =0x52564348, len=36
34,882,564 >>> mbox cmd response data (8 bytes)
34,883,037 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,913,557 UART: [rt]cmd =0x53574545, len=84
34,917,252 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,451 UART:
192,806 UART: Running Caliptra ROM ...
193,999 UART:
603,801 UART: [state] CFI Enabled
620,104 UART: [state] LifecycleState = Unprovisioned
622,002 UART: [state] DebugLocked = No
623,332 UART: [state] WD Timer not started. Device not locked for debugging
627,222 UART: [kat] SHA2-256
806,888 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,616 UART: [kat] ++
818,223 UART: [kat] sha1
829,884 UART: [kat] SHA2-256
832,608 UART: [kat] SHA2-384
837,886 UART: [kat] SHA2-512-ACC
840,321 UART: [kat] ECC-384
3,282,114 UART: [kat] HMAC-384Kdf
3,295,196 UART: [kat] LMS
3,771,711 UART: [kat] --
3,774,995 UART: [cold-reset] ++
3,776,424 UART: [fht] FHT @ 0x50003400
3,788,113 UART: [idev] ++
3,788,706 UART: [idev] CDI.KEYID = 6
3,789,743 UART: [idev] SUBJECT.KEYID = 7
3,790,925 UART: [idev] UDS.KEYID = 0
3,791,861 ready_for_fw is high
3,792,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,008 UART: [idev] Erasing UDS.KEYID = 0
6,264,173 UART: [idev] Sha1 KeyId Algorithm
6,287,627 UART: [idev] --
6,293,436 UART: [ldev] ++
6,294,053 UART: [ldev] CDI.KEYID = 6
6,294,945 UART: [ldev] SUBJECT.KEYID = 5
6,296,106 UART: [ldev] AUTHORITY.KEYID = 7
6,297,403 UART: [ldev] FE.KEYID = 1
6,311,131 UART: [ldev] Erasing FE.KEYID = 1
8,786,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,875 UART: [ldev] --
10,578,652 UART: [fwproc] Wait for Commands...
10,580,323 UART: [fwproc] Recv command 0x46574c44
10,582,311 UART: [fwproc] Recv'd Img size: 118548 bytes
14,061,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,135,551 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,208,556 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,536,610 >>> mbox cmd response: success
14,540,096 UART: [afmc] ++
14,540,705 UART: [afmc] CDI.KEYID = 6
14,541,615 UART: [afmc] SUBJECT.KEYID = 7
14,542,832 UART: [afmc] AUTHORITY.KEYID = 5
17,043,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,767,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,769,333 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,785,142 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,801,223 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,816,801 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,841,868 UART: [afmc] --
18,846,445 UART: [cold-reset] --
18,850,454 UART: [state] Locking Datavault
18,855,009 UART: [state] Locking PCR0, PCR1 and PCR31
18,856,712 UART: [state] Locking ICCM
18,858,195 UART: [exit] Launching FMC @ 0x40000130
18,866,600 UART:
18,866,841 UART: Running Caliptra FMC ...
18,867,944 UART:
18,868,106 UART: [state] CFI Enabled
18,876,101 UART: [fht] FMC Alias Private Key: 7
20,642,371 UART: [art] Extend RT PCRs Done
20,643,589 UART: [art] Lock RT PCRs Done
20,645,484 UART: [art] Populate DV Done
20,650,893 UART: [fht] FMC Alias Private Key: 7
20,652,381 UART: [art] Derive CDI
20,653,195 UART: [art] Store in slot 0x4
20,696,242 UART: [art] Derive Key Pair
20,697,284 UART: [art] Store priv key in slot 0x5
23,124,526 UART: [art] Derive Key Pair - Done
23,137,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,843,450 UART: [art] Erasing AUTHORITY.KEYID = 7
24,844,954 UART: [art] PUB.X = 0B22BD06D606C5AC3D8C2D290C67C0A9344E09BA0FE3B7D9FDE61130F9D324883D2E54DFBC590B3172338BF9676DF109
24,852,250 UART: [art] PUB.Y = 952AF27BBD7DD1533311F334E29124D57B1F215B5F1330E7EE2451A39A47F4B6BE5A5E012CA5DB9471A83990F96CA9AC
24,859,538 UART: [art] SIG.R = 9B07BE33F540C22AABFF43031FBCD264FB881DE59F40A0A11FA36DE3DA6048317F6AFDBD6482671A85BCA27CB26E9161
24,866,926 UART: [art] SIG.S = 85C519BAFBDD0A66F4E02FC12083F772E2E6E00DFDD6EDC67B9DA1C3CD589CF0639CC025EAFFFCB3BF02982632E9D179
25,846,117 UART: Caliptra RT
25,846,844 UART: [state] CFI Enabled
25,979,643 UART: [rt] RT listening for mailbox commands...
25,981,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,012,495 UART: [rt]cmd =0x44504543, len=96
30,307,962 >>> mbox cmd response data (6236 bytes)
30,337,191 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,367,717 UART: [rt]cmd =0x53574545, len=84
34,503,153 >>> mbox cmd response data (200 bytes)
34,887,171 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,917,507 UART: [rt]cmd =0x52564348, len=36
34,920,577 >>> mbox cmd response data (8 bytes)
34,920,980 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,951,425 UART: [rt]cmd =0x53574545, len=84
34,955,236 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,783,830 ready_for_fw is high
3,784,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,561 >>> mbox cmd response: success
18,694,235 UART:
18,694,619 UART: Running Caliptra FMC ...
18,695,758 UART:
18,695,919 UART: [state] CFI Enabled
18,703,767 UART: [fht] FMC Alias Private Key: 7
20,470,160 UART: [art] Extend RT PCRs Done
20,471,382 UART: [art] Lock RT PCRs Done
20,472,986 UART: [art] Populate DV Done
20,478,578 UART: [fht] FMC Alias Private Key: 7
20,480,279 UART: [art] Derive CDI
20,481,016 UART: [art] Store in slot 0x4
20,523,347 UART: [art] Derive Key Pair
20,524,384 UART: [art] Store priv key in slot 0x5
22,950,935 UART: [art] Derive Key Pair - Done
22,963,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,670,609 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,135 UART: [art] PUB.X = AAD3EE9172081BFA24C450E84BEEAAB7A5A3B95027D349C074A745FDD7E811D6A9DDC63766164FA233693E021261CE0D
24,679,404 UART: [art] PUB.Y = 195E60D7786161D86C54D85F185E60E3B5735E3047CA477F90FD1F8AA1C637C06D72B6CD828E932F0119F493461D538A
24,686,617 UART: [art] SIG.R = CAAC38711E382938E554421E37DB0F03E1419F2D9D213C4B53BC0B2F42462998FF29D1F12F50818FBE1A1DA2471335F1
24,694,024 UART: [art] SIG.S = 54AB11CBC6A5B9F70840F0AD30A28385B6FA08EA00DEED5355ADB5C79484D9F59DB05ADDC55859FD6EFEC645F5EEB66E
25,672,533 UART: Caliptra RT
25,673,235 UART: [state] CFI Enabled
25,805,428 UART: [rt] RT listening for mailbox commands...
25,807,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,838,554 UART: [rt]cmd =0x44504543, len=96
30,134,844 >>> mbox cmd response data (6236 bytes)
30,164,096 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,194,634 UART: [rt]cmd =0x53574545, len=84
34,330,565 >>> mbox cmd response data (200 bytes)
34,715,158 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,745,447 UART: [rt]cmd =0x52564348, len=36
34,748,648 >>> mbox cmd response data (8 bytes)
34,749,079 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,779,331 UART: [rt]cmd =0x53574545, len=84
34,782,932 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,033 UART:
192,408 UART: Running Caliptra ROM ...
193,507 UART:
193,650 UART: [state] CFI Enabled
265,552 UART: [state] LifecycleState = Unprovisioned
267,968 UART: [state] DebugLocked = No
269,485 UART: [state] WD Timer not started. Device not locked for debugging
273,451 UART: [kat] SHA2-256
463,355 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,087 UART: [kat] ++
474,537 UART: [kat] sha1
486,824 UART: [kat] SHA2-256
489,846 UART: [kat] SHA2-384
496,824 UART: [kat] SHA2-512-ACC
499,469 UART: [kat] ECC-384
2,948,579 UART: [kat] HMAC-384Kdf
2,974,331 UART: [kat] LMS
3,506,075 UART: [kat] --
3,511,421 UART: [cold-reset] ++
3,513,782 UART: [fht] FHT @ 0x50003400
3,525,822 UART: [idev] ++
3,526,523 UART: [idev] CDI.KEYID = 6
3,527,518 UART: [idev] SUBJECT.KEYID = 7
3,528,684 UART: [idev] UDS.KEYID = 0
3,529,609 ready_for_fw is high
3,529,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,962 UART: [idev] Erasing UDS.KEYID = 0
6,030,815 UART: [idev] Sha1 KeyId Algorithm
6,053,312 UART: [idev] --
6,059,147 UART: [ldev] ++
6,059,832 UART: [ldev] CDI.KEYID = 6
6,060,799 UART: [ldev] SUBJECT.KEYID = 5
6,061,959 UART: [ldev] AUTHORITY.KEYID = 7
6,063,191 UART: [ldev] FE.KEYID = 1
6,101,609 UART: [ldev] Erasing FE.KEYID = 1
8,607,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,494 UART: [ldev] --
10,415,355 UART: [fwproc] Wait for Commands...
10,417,279 UART: [fwproc] Recv command 0x46574c44
10,419,585 UART: [fwproc] Recv'd Img size: 118548 bytes
13,925,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,079 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,127,714 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,688,322 >>> mbox cmd response: success
14,692,883 UART: [afmc] ++
14,693,582 UART: [afmc] CDI.KEYID = 6
14,694,768 UART: [afmc] SUBJECT.KEYID = 7
14,696,259 UART: [afmc] AUTHORITY.KEYID = 5
17,235,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,096 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,208 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,348 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,264 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,113 UART: [afmc] --
19,032,763 UART: [cold-reset] --
19,037,345 UART: [state] Locking Datavault
19,042,925 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,125 UART: [state] Locking ICCM
19,046,881 UART: [exit] Launching FMC @ 0x40000130
19,055,505 UART:
19,055,739 UART: Running Caliptra FMC ...
19,056,762 UART:
19,056,910 UART: [state] CFI Enabled
19,114,893 UART: [fht] FMC Alias Private Key: 7
20,881,758 UART: [art] Extend RT PCRs Done
20,882,984 UART: [art] Lock RT PCRs Done
20,884,425 UART: [art] Populate DV Done
20,889,792 UART: [fht] FMC Alias Private Key: 7
20,891,379 UART: [art] Derive CDI
20,892,114 UART: [art] Store in slot 0x4
20,947,317 UART: [art] Derive Key Pair
20,948,376 UART: [art] Store priv key in slot 0x5
23,411,216 UART: [art] Derive Key Pair - Done
23,424,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,239 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,745 UART: [art] PUB.X = 71962A6A9FAD5C19DDDBF1306B4F292601A80E4DC2987C2348608D64AE40C57F66B7836C719A120FFAE7482AD25F9AD8
25,146,030 UART: [art] PUB.Y = BEBE9BFA93EC69B9B79756B93A844E06CBFA8879C31FFBDF44FDD64C3CB8A57F955FF20C6E6F8F3B28E6BE6AB9A0D4B3
25,153,312 UART: [art] SIG.R = 3218F516526EF32DE7E9CD203B9296CCF11E8F05360A0BB72ED9DEC311D84D1E14CFE97FE9BAE7F1F3E01ECB522AD141
25,160,741 UART: [art] SIG.S = 47E76EA0A0FF177070F16196C4A8AB13EA5A259E1400BC05AD3F8A84736043B36CEED49A97B0C0CFE1999B9C7866AFCF
26,139,585 UART: Caliptra RT
26,140,273 UART: [state] CFI Enabled
26,321,072 UART: [rt] RT listening for mailbox commands...
26,323,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,354,071 UART: [rt]cmd =0x44504543, len=96
30,728,554 >>> mbox cmd response data (6236 bytes)
30,757,904 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,788,354 UART: [rt]cmd =0x53574545, len=84
34,956,524 >>> mbox cmd response data (200 bytes)
35,340,962 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,371,378 UART: [rt]cmd =0x52564348, len=36
35,374,118 >>> mbox cmd response data (8 bytes)
35,374,459 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,404,956 UART: [rt]cmd =0x53574545, len=84
35,408,758 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,439,652 ready_for_fw is high
3,440,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,794,439 >>> mbox cmd response: success
19,091,108 UART:
19,091,493 UART: Running Caliptra FMC ...
19,092,632 UART:
19,092,791 UART: [state] CFI Enabled
19,155,665 UART: [fht] FMC Alias Private Key: 7
20,922,108 UART: [art] Extend RT PCRs Done
20,923,335 UART: [art] Lock RT PCRs Done
20,924,903 UART: [art] Populate DV Done
20,930,267 UART: [fht] FMC Alias Private Key: 7
20,931,989 UART: [art] Derive CDI
20,932,806 UART: [art] Store in slot 0x4
20,987,793 UART: [art] Derive Key Pair
20,988,837 UART: [art] Store priv key in slot 0x5
23,451,951 UART: [art] Derive Key Pair - Done
23,464,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,177,358 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,867 UART: [art] PUB.X = 0825B29B08C6A419F12C4D7C33CA9EC9C9CE60B94190E3BBD9F485A597C224E9DB0F855A14D39838AAC289D85C43343B
25,186,164 UART: [art] PUB.Y = E4FEA0EFE774650A894433B84FBA92EEE69F0703CFCC1DF3A37B943E0F13EF86D9C226164D9BFEF0BCD3981A997887E5
25,193,453 UART: [art] SIG.R = 68731D1BC11B0A5CC24BE0259A85062B876FA146CB833ECD95A9B5C8D345E8BE641C7D4054116C0E58A62AAC6BE0F285
25,200,827 UART: [art] SIG.S = 283ACC70522811D02C519F782C6690952FF16B10D49A9FA41262577EDC3462B85A1C16D4A9E12E0FE8AAE752E2F24CB4
26,179,683 UART: Caliptra RT
26,180,402 UART: [state] CFI Enabled
26,359,401 UART: [rt] RT listening for mailbox commands...
26,361,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,392,443 UART: [rt]cmd =0x44504543, len=96
30,768,502 >>> mbox cmd response data (6236 bytes)
30,798,182 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,828,705 UART: [rt]cmd =0x53574545, len=84
34,995,094 >>> mbox cmd response data (200 bytes)
35,376,206 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,406,314 UART: [rt]cmd =0x52564348, len=36
35,409,220 >>> mbox cmd response data (8 bytes)
35,409,664 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,439,853 UART: [rt]cmd =0x53574545, len=84
35,443,384 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,369 UART:
192,740 UART: Running Caliptra ROM ...
193,837 UART:
603,621 UART: [state] CFI Enabled
620,575 UART: [state] LifecycleState = Unprovisioned
622,961 UART: [state] DebugLocked = No
625,556 UART: [state] WD Timer not started. Device not locked for debugging
630,882 UART: [kat] SHA2-256
820,784 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,524 UART: [kat] ++
832,129 UART: [kat] sha1
842,799 UART: [kat] SHA2-256
845,813 UART: [kat] SHA2-384
851,454 UART: [kat] SHA2-512-ACC
854,042 UART: [kat] ECC-384
3,294,594 UART: [kat] HMAC-384Kdf
3,308,368 UART: [kat] LMS
3,840,231 UART: [kat] --
3,845,222 UART: [cold-reset] ++
3,846,895 UART: [fht] FHT @ 0x50003400
3,857,947 UART: [idev] ++
3,858,655 UART: [idev] CDI.KEYID = 6
3,859,688 UART: [idev] SUBJECT.KEYID = 7
3,860,793 UART: [idev] UDS.KEYID = 0
3,861,727 ready_for_fw is high
3,861,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,847 UART: [idev] Erasing UDS.KEYID = 0
6,331,310 UART: [idev] Sha1 KeyId Algorithm
6,352,996 UART: [idev] --
6,357,887 UART: [ldev] ++
6,358,634 UART: [ldev] CDI.KEYID = 6
6,359,548 UART: [ldev] SUBJECT.KEYID = 5
6,360,714 UART: [ldev] AUTHORITY.KEYID = 7
6,361,895 UART: [ldev] FE.KEYID = 1
6,373,546 UART: [ldev] Erasing FE.KEYID = 1
8,852,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,312 UART: [ldev] --
10,643,854 UART: [fwproc] Wait for Commands...
10,646,382 UART: [fwproc] Recv command 0x46574c44
10,648,691 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,427 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,343,044 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,902,754 >>> mbox cmd response: success
14,907,129 UART: [afmc] ++
14,907,859 UART: [afmc] CDI.KEYID = 6
14,909,058 UART: [afmc] SUBJECT.KEYID = 7
14,910,529 UART: [afmc] AUTHORITY.KEYID = 5
17,416,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,129 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,250 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,401 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,273 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,207,967 UART: [afmc] --
19,211,453 UART: [cold-reset] --
19,216,949 UART: [state] Locking Datavault
19,221,416 UART: [state] Locking PCR0, PCR1 and PCR31
19,223,604 UART: [state] Locking ICCM
19,226,046 UART: [exit] Launching FMC @ 0x40000130
19,234,694 UART:
19,234,933 UART: Running Caliptra FMC ...
19,236,037 UART:
19,236,221 UART: [state] CFI Enabled
19,244,384 UART: [fht] FMC Alias Private Key: 7
21,010,438 UART: [art] Extend RT PCRs Done
21,011,675 UART: [art] Lock RT PCRs Done
21,013,282 UART: [art] Populate DV Done
21,018,643 UART: [fht] FMC Alias Private Key: 7
21,020,194 UART: [art] Derive CDI
21,020,935 UART: [art] Store in slot 0x4
21,063,490 UART: [art] Derive Key Pair
21,064,531 UART: [art] Store priv key in slot 0x5
23,490,877 UART: [art] Derive Key Pair - Done
23,503,869 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,210,435 UART: [art] Erasing AUTHORITY.KEYID = 7
25,211,946 UART: [art] PUB.X = 7DA557EE4E1D2A816CE22188A43BA8DF9BCD1D85EB0256A66A8F2A2FCD0DFDB989F01AC7FCBFFD88F89E2A14A30FE9B1
25,219,218 UART: [art] PUB.Y = F9CED4CC9F86BB67E2BF0EB25368306955B4EF816CD4744FE17EB7C3077EFDC51FB97C621985A31D8D101BA3C1EB5D52
25,226,547 UART: [art] SIG.R = 8D8ACF9BEDEC14C4E7FD4ACCCE8AA92BF75908C5AB60867BF08C5170922E5FC59BBF9FD0204B5EF252DBC736253A1E09
25,233,954 UART: [art] SIG.S = 248C60CB3F7D77F449A9E4A664375ABDB043FFDC891B5DA8882E641D81A7C89BF68A5B215CAF58A8EB5F0B5D0801FF23
26,212,578 UART: Caliptra RT
26,213,286 UART: [state] CFI Enabled
26,346,511 UART: [rt] RT listening for mailbox commands...
26,348,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,379,630 UART: [rt]cmd =0x44504543, len=96
30,675,303 >>> mbox cmd response data (6236 bytes)
30,704,523 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,734,961 UART: [rt]cmd =0x53574545, len=84
34,871,046 >>> mbox cmd response data (200 bytes)
35,255,719 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,285,900 UART: [rt]cmd =0x52564348, len=36
35,289,007 >>> mbox cmd response data (8 bytes)
35,289,462 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,319,806 UART: [rt]cmd =0x53574545, len=84
35,323,880 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,756,248 ready_for_fw is high
3,756,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,057,784 >>> mbox cmd response: success
19,306,305 UART:
19,306,722 UART: Running Caliptra FMC ...
19,307,855 UART:
19,308,014 UART: [state] CFI Enabled
19,316,143 UART: [fht] FMC Alias Private Key: 7
21,082,497 UART: [art] Extend RT PCRs Done
21,083,740 UART: [art] Lock RT PCRs Done
21,084,840 UART: [art] Populate DV Done
21,090,047 UART: [fht] FMC Alias Private Key: 7
21,091,663 UART: [art] Derive CDI
21,092,491 UART: [art] Store in slot 0x4
21,135,310 UART: [art] Derive Key Pair
21,136,315 UART: [art] Store priv key in slot 0x5
23,563,115 UART: [art] Derive Key Pair - Done
23,576,114 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,282,727 UART: [art] Erasing AUTHORITY.KEYID = 7
25,284,238 UART: [art] PUB.X = 275B44F0017D8F56170472D27E6841228D5547E7B710D576785F30FB98C82666D769F45A757985C08AFE934C9A49A15E
25,291,425 UART: [art] PUB.Y = 6F89FA842E56EA00B2B6779C6A1E6DD4F78EA24C6446F89FDA96771B66126BF08DFD686D68F2D191EC1970E8A545E492
25,298,710 UART: [art] SIG.R = 75C130384F0DA8B1CDB6A0EA2AEBD9521519F5E7EF3B6897AC0C9DA01C07442FCEC150A8045D0AAE1A5BB5707D22B8C2
25,306,139 UART: [art] SIG.S = 7925EE110E043BBAB6703EFAF912DBAD3B4602A30385B77DE700EEEBFFA7C4E2BA90545E9FCF8284D6791AB0CA754C17
26,285,184 UART: Caliptra RT
26,285,920 UART: [state] CFI Enabled
26,419,347 UART: [rt] RT listening for mailbox commands...
26,421,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,452,306 UART: [rt]cmd =0x44504543, len=96
30,747,384 >>> mbox cmd response data (6236 bytes)
30,776,752 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,807,326 UART: [rt]cmd =0x53574545, len=84
34,943,895 >>> mbox cmd response data (200 bytes)
35,329,083 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,359,476 UART: [rt]cmd =0x52564348, len=36
35,362,705 >>> mbox cmd response data (8 bytes)
35,363,158 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,393,631 UART: [rt]cmd =0x53574545, len=84
35,397,560 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,781 UART: [kat] SHA2-256
881,712 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,827 UART: [kat] ++
885,979 UART: [kat] sha1
890,021 UART: [kat] SHA2-256
891,959 UART: [kat] SHA2-384
894,710 UART: [kat] SHA2-512-ACC
896,611 UART: [kat] ECC-384
902,038 UART: [kat] HMAC-384Kdf
906,500 UART: [kat] LMS
1,474,696 UART: [kat] --
1,475,915 UART: [cold-reset] ++
1,476,375 UART: [fht] Storing FHT @ 0x50003400
1,479,118 UART: [idev] ++
1,479,286 UART: [idev] CDI.KEYID = 6
1,479,646 UART: [idev] SUBJECT.KEYID = 7
1,480,070 UART: [idev] UDS.KEYID = 0
1,480,415 ready_for_fw is high
1,480,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,322 UART: [idev] Erasing UDS.KEYID = 0
1,504,700 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,500 UART: [idev] --
1,514,397 UART: [ldev] ++
1,514,565 UART: [ldev] CDI.KEYID = 6
1,514,928 UART: [ldev] SUBJECT.KEYID = 5
1,515,354 UART: [ldev] AUTHORITY.KEYID = 7
1,515,817 UART: [ldev] FE.KEYID = 1
1,521,375 UART: [ldev] Erasing FE.KEYID = 1
1,546,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,960 UART: [ldev] --
1,585,355 UART: [fwproc] Waiting for Commands...
1,586,170 UART: [fwproc] Received command 0x46574c44
1,586,961 UART: [fwproc] Received Image of size 118548 bytes
2,931,507 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,623 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,841 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,240 >>> mbox cmd response: success
3,131,302 UART: [afmc] ++
3,131,470 UART: [afmc] CDI.KEYID = 6
3,131,832 UART: [afmc] SUBJECT.KEYID = 7
3,132,257 UART: [afmc] AUTHORITY.KEYID = 5
3,167,874 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,984 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,764 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,473 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,356 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,039 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,893 UART: [afmc] --
3,210,861 UART: [cold-reset] --
3,211,815 UART: [state] Locking Datavault
3,212,988 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,592 UART: [state] Locking ICCM
3,214,182 UART: [exit] Launching FMC @ 0x40000130
3,219,512 UART:
3,219,528 UART: Running Caliptra FMC ...
3,219,936 UART:
3,219,990 UART: [state] CFI Enabled
3,230,174 UART: [fht] FMC Alias Private Key: 7
3,349,222 UART: [art] Extend RT PCRs Done
3,349,650 UART: [art] Lock RT PCRs Done
3,351,194 UART: [art] Populate DV Done
3,359,355 UART: [fht] FMC Alias Private Key: 7
3,360,473 UART: [art] Derive CDI
3,360,753 UART: [art] Store in slot 0x4
3,446,379 UART: [art] Derive Key Pair
3,446,739 UART: [art] Store priv key in slot 0x5
3,460,096 UART: [art] Derive Key Pair - Done
3,474,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,959 UART: [art] PUB.X = 0A706019B36B67544FFEE7BD57C518DA900B74D6779B76FA5B38624A69DE345071D45C946C7D22CA42F0FEF92884B045
3,497,725 UART: [art] PUB.Y = 61BAC4070AA75807CF5D0E3218D5B8ED1CAE8517025E9FDD989A8AEED66C23065CA888830383B9F90D8F3493549EAC25
3,504,659 UART: [art] SIG.R = 0655DB1775A81C0EFB0D15184E6D3928FF670A43DA7CDB3DB2029750D6BA66DC0C104F72CF1AE7839EE3128C6559AE2D
3,511,423 UART: [art] SIG.S = F0D3E42205978831EC06D263065C7E22E0AA3C4FBBFE9F140E9660F564FD7697B59418A49F7A6A841323EFAB984EAB97
3,534,959 UART: Caliptra RT
3,535,210 UART: [state] CFI Enabled
3,655,176 UART: [rt] RT listening for mailbox commands...
3,655,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,092 UART: [rt]cmd =0x44504543, len=96
3,877,611 >>> mbox cmd response data (6236 bytes)
3,877,612 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,907,533 UART: [rt]cmd =0x53574545, len=84
3,933,768 >>> mbox cmd response data (200 bytes)
3,933,769 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,434 UART: [rt]cmd =0x52564348, len=36
3,965,592 >>> mbox cmd response data (8 bytes)
3,965,593 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,995,412 UART: [rt]cmd =0x53574545, len=84
3,998,337 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,979 ready_for_fw is high
1,361,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,806 >>> mbox cmd response: success
3,043,193 UART:
3,043,209 UART: Running Caliptra FMC ...
3,043,617 UART:
3,043,671 UART: [state] CFI Enabled
3,053,867 UART: [fht] FMC Alias Private Key: 7
3,172,583 UART: [art] Extend RT PCRs Done
3,173,011 UART: [art] Lock RT PCRs Done
3,174,641 UART: [art] Populate DV Done
3,182,906 UART: [fht] FMC Alias Private Key: 7
3,183,930 UART: [art] Derive CDI
3,184,210 UART: [art] Store in slot 0x4
3,269,776 UART: [art] Derive Key Pair
3,270,136 UART: [art] Store priv key in slot 0x5
3,282,929 UART: [art] Derive Key Pair - Done
3,297,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,903 UART: [art] PUB.X = 9686AB755777E4C3E46477601A8046067698A333FDBF95BF225EBA029CB975EACC75B1243EEC43B0D72D2BF58A9F033F
3,320,670 UART: [art] PUB.Y = 21654653724EC71CCD4C3A3F90E494E80980990C494193802A6DD8455FE6142B32C52F46559F3A328D162618CE07D126
3,327,599 UART: [art] SIG.R = F88E4C9866078B41CA9F2D776F03122117696DC7EA079416C051649841D4B3DF0FAB425F911BA4F78CDBBE6367F6F0AC
3,334,363 UART: [art] SIG.S = DDA5438CD918FBD0B5B85C71610871FD43A3BB1F95899969199D32DAEDBB008468DA6009E3833993709138ED7388363C
3,358,543 UART: Caliptra RT
3,358,794 UART: [state] CFI Enabled
3,479,973 UART: [rt] RT listening for mailbox commands...
3,480,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,953 UART: [rt]cmd =0x44504543, len=96
3,701,546 >>> mbox cmd response data (6236 bytes)
3,701,547 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,731,568 UART: [rt]cmd =0x53574545, len=84
3,757,457 >>> mbox cmd response data (200 bytes)
3,757,458 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,786,977 UART: [rt]cmd =0x52564348, len=36
3,789,067 >>> mbox cmd response data (8 bytes)
3,789,068 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,807 UART: [rt]cmd =0x53574545, len=84
3,821,974 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,314 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,014 UART: [kat] SHA2-256
881,945 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,060 UART: [kat] ++
886,212 UART: [kat] sha1
890,334 UART: [kat] SHA2-256
892,272 UART: [kat] SHA2-384
895,151 UART: [kat] SHA2-512-ACC
897,052 UART: [kat] ECC-384
902,515 UART: [kat] HMAC-384Kdf
906,949 UART: [kat] LMS
1,475,145 UART: [kat] --
1,476,010 UART: [cold-reset] ++
1,476,368 UART: [fht] Storing FHT @ 0x50003400
1,479,159 UART: [idev] ++
1,479,327 UART: [idev] CDI.KEYID = 6
1,479,687 UART: [idev] SUBJECT.KEYID = 7
1,480,111 UART: [idev] UDS.KEYID = 0
1,480,456 ready_for_fw is high
1,480,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,857 UART: [idev] Erasing UDS.KEYID = 0
1,504,233 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,837 UART: [idev] --
1,513,670 UART: [ldev] ++
1,513,838 UART: [ldev] CDI.KEYID = 6
1,514,201 UART: [ldev] SUBJECT.KEYID = 5
1,514,627 UART: [ldev] AUTHORITY.KEYID = 7
1,515,090 UART: [ldev] FE.KEYID = 1
1,520,530 UART: [ldev] Erasing FE.KEYID = 1
1,545,935 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,905 UART: [ldev] --
1,585,170 UART: [fwproc] Waiting for Commands...
1,585,983 UART: [fwproc] Received command 0x46574c44
1,586,774 UART: [fwproc] Received Image of size 118548 bytes
2,932,164 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,148 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,366 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,687 >>> mbox cmd response: success
3,131,873 UART: [afmc] ++
3,132,041 UART: [afmc] CDI.KEYID = 6
3,132,403 UART: [afmc] SUBJECT.KEYID = 7
3,132,828 UART: [afmc] AUTHORITY.KEYID = 5
3,168,565 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,885 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,665 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,374 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,257 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,940 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,788 UART: [afmc] --
3,211,762 UART: [cold-reset] --
3,212,696 UART: [state] Locking Datavault
3,213,663 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,267 UART: [state] Locking ICCM
3,214,795 UART: [exit] Launching FMC @ 0x40000130
3,220,125 UART:
3,220,141 UART: Running Caliptra FMC ...
3,220,549 UART:
3,220,692 UART: [state] CFI Enabled
3,231,752 UART: [fht] FMC Alias Private Key: 7
3,350,704 UART: [art] Extend RT PCRs Done
3,351,132 UART: [art] Lock RT PCRs Done
3,352,998 UART: [art] Populate DV Done
3,361,113 UART: [fht] FMC Alias Private Key: 7
3,362,053 UART: [art] Derive CDI
3,362,333 UART: [art] Store in slot 0x4
3,448,009 UART: [art] Derive Key Pair
3,448,369 UART: [art] Store priv key in slot 0x5
3,462,056 UART: [art] Derive Key Pair - Done
3,477,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,605 UART: [art] PUB.X = 7BF136B05104B282DB64904B6C0AE10EFAFC77331AA3FDB93ACE67D08B3F0FD8A890B403579A7DDAC388CAA03C45753E
3,500,378 UART: [art] PUB.Y = 25F64CDE8E45FEC797BF59F774C964A1713FF8932D3DE0D101EF6D8B4EABA9912A9531B78B71123730C75CD8F94A7609
3,507,330 UART: [art] SIG.R = 32C4B2C10EFF71084A39CB45A0FFB4A6FB92C448C9373F856CF620AB398633098E6DC4C40BD7B9CEF1643885D3726D04
3,514,093 UART: [art] SIG.S = BF509F81613C456A31CE5B6D904EF318B15D01360500CFA7526417513279C2D7545F5DB04726A6074A31005220E1336D
3,537,418 UART: Caliptra RT
3,537,761 UART: [state] CFI Enabled
3,657,375 UART: [rt] RT listening for mailbox commands...
3,658,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,803 UART: [rt]cmd =0x44504543, len=96
3,881,195 >>> mbox cmd response data (6236 bytes)
3,881,196 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,921 UART: [rt]cmd =0x53574545, len=84
3,937,060 >>> mbox cmd response data (200 bytes)
3,937,061 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,966,604 UART: [rt]cmd =0x52564348, len=36
3,969,240 >>> mbox cmd response data (8 bytes)
3,969,241 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,999,116 UART: [rt]cmd =0x53574545, len=84
4,001,993 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,978 ready_for_fw is high
1,362,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,187 >>> mbox cmd response: success
3,043,460 UART:
3,043,476 UART: Running Caliptra FMC ...
3,043,884 UART:
3,044,027 UART: [state] CFI Enabled
3,054,687 UART: [fht] FMC Alias Private Key: 7
3,174,041 UART: [art] Extend RT PCRs Done
3,174,469 UART: [art] Lock RT PCRs Done
3,175,873 UART: [art] Populate DV Done
3,184,072 UART: [fht] FMC Alias Private Key: 7
3,185,178 UART: [art] Derive CDI
3,185,458 UART: [art] Store in slot 0x4
3,271,502 UART: [art] Derive Key Pair
3,271,862 UART: [art] Store priv key in slot 0x5
3,285,873 UART: [art] Derive Key Pair - Done
3,300,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,153 UART: [art] PUB.X = 53BA944CA97960EA4B2C89200542E38A18BBF4BFCDEF0F5FD59FCF97FDC3F72280620DBF6E157D2586508D90AC24511B
3,323,928 UART: [art] PUB.Y = 5E9DD9795F38FD1B6A8D4DCB32FFC4ED1FB92CD296C58E36662D3F6422DCD191ACE5947527D9C5F5C53B8B40504AFB99
3,330,896 UART: [art] SIG.R = EB0BF000099CD04DBDE47B6A2DADE682E3F5104DA83F87E23145875C090D77C20F56CA3DD7F5D0A8594BD03F08F7D5D3
3,337,642 UART: [art] SIG.S = B939C5D0357898228DFB608F0F50DCFC12C9846C2A26A16652FA6FCD79A4D525AD5D2D9740EFBCF2F3CF6E35DE2A8FAC
3,361,707 UART: Caliptra RT
3,362,050 UART: [state] CFI Enabled
3,482,607 UART: [rt] RT listening for mailbox commands...
3,483,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,667 UART: [rt]cmd =0x44504543, len=96
3,706,494 >>> mbox cmd response data (6236 bytes)
3,706,495 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,736,234 UART: [rt]cmd =0x53574545, len=84
3,762,659 >>> mbox cmd response data (200 bytes)
3,762,660 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,792,423 UART: [rt]cmd =0x52564348, len=36
3,795,445 >>> mbox cmd response data (8 bytes)
3,795,446 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,825,371 UART: [rt]cmd =0x53574545, len=84
3,828,312 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,694 UART: [kat] SHA2-256
901,634 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,170,298 UART: [cold-reset] ++
1,170,752 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,174,590 ready_for_fw is high
1,174,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,199,135 UART: [idev] Sha1 KeyId Algorithm
1,208,105 UART: [idev] --
1,209,036 UART: [ldev] ++
1,209,204 UART: [ldev] CDI.KEYID = 6
1,209,568 UART: [ldev] SUBJECT.KEYID = 5
1,209,995 UART: [ldev] AUTHORITY.KEYID = 7
1,210,458 UART: [ldev] FE.KEYID = 1
1,215,750 UART: [ldev] Erasing FE.KEYID = 1
1,242,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,532 UART: [ldev] --
1,281,983 UART: [fwproc] Wait for Commands...
1,282,792 UART: [fwproc] Recv command 0x46574c44
1,283,525 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,207 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,382 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,545 >>> mbox cmd response: success
2,827,737 UART: [afmc] ++
2,827,905 UART: [afmc] CDI.KEYID = 6
2,828,268 UART: [afmc] SUBJECT.KEYID = 7
2,828,694 UART: [afmc] AUTHORITY.KEYID = 5
2,864,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,591 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,301 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,182 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,883 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,776 UART: [afmc] --
2,907,599 UART: [cold-reset] --
2,908,465 UART: [state] Locking Datavault
2,909,668 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,272 UART: [state] Locking ICCM
2,910,814 UART: [exit] Launching FMC @ 0x40000130
2,916,144 UART:
2,916,160 UART: Running Caliptra FMC ...
2,916,568 UART:
2,916,622 UART: [state] CFI Enabled
2,927,358 UART: [fht] FMC Alias Private Key: 7
3,046,922 UART: [art] Extend RT PCRs Done
3,047,350 UART: [art] Lock RT PCRs Done
3,048,922 UART: [art] Populate DV Done
3,057,193 UART: [fht] FMC Alias Private Key: 7
3,058,205 UART: [art] Derive CDI
3,058,485 UART: [art] Store in slot 0x4
3,144,036 UART: [art] Derive Key Pair
3,144,396 UART: [art] Store priv key in slot 0x5
3,157,468 UART: [art] Derive Key Pair - Done
3,171,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,133 UART: [art] PUB.X = F34B64C4E2537FC4C2FB84EAC8A62C14BF2C4F780569AEF2DE4EA1995172F97108E65FBA5ABDFDDE37E5DCDA07623E87
3,194,918 UART: [art] PUB.Y = 8F37CF7C3EE58C8C4CEB5B05C4D0BAF67CFAAC73ACA8C7EF6AD7DD321F673C256A5019D7AE2F98EBCE554274CC73F600
3,201,873 UART: [art] SIG.R = AA9F3618D9C15E96712BE30169F3C3553D1634739E67FC60E7BECC82F0E481DE092226629472C544CAB143CB8374F204
3,208,632 UART: [art] SIG.S = F87AC1E129A098B07A0D298CFE05499E7EEA5835A680E116D6AE218401434FE209C06F6356D61A470503A86C01268E0F
3,232,378 UART: Caliptra RT
3,232,629 UART: [state] CFI Enabled
3,351,809 UART: [rt] RT listening for mailbox commands...
3,352,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,955 UART: [rt]cmd =0x44504543, len=96
3,573,538 >>> mbox cmd response data (6236 bytes)
3,573,539 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,416 UART: [rt]cmd =0x53574545, len=84
3,629,486 >>> mbox cmd response data (200 bytes)
3,629,487 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,659,026 UART: [rt]cmd =0x52564348, len=36
3,661,804 >>> mbox cmd response data (8 bytes)
3,661,805 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,422 UART: [rt]cmd =0x53574545, len=84
3,694,677 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,232 ready_for_fw is high
1,059,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,362 >>> mbox cmd response: success
2,741,103 UART:
2,741,119 UART: Running Caliptra FMC ...
2,741,527 UART:
2,741,581 UART: [state] CFI Enabled
2,752,089 UART: [fht] FMC Alias Private Key: 7
2,871,009 UART: [art] Extend RT PCRs Done
2,871,437 UART: [art] Lock RT PCRs Done
2,873,005 UART: [art] Populate DV Done
2,881,232 UART: [fht] FMC Alias Private Key: 7
2,882,338 UART: [art] Derive CDI
2,882,618 UART: [art] Store in slot 0x4
2,968,509 UART: [art] Derive Key Pair
2,968,869 UART: [art] Store priv key in slot 0x5
2,981,669 UART: [art] Derive Key Pair - Done
2,996,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,942 UART: [art] PUB.X = 5F083726B15529691600F5E554DFDF0BD063FBFA989CF70F7AA2B7526484D2AE630C99E3F8D62142DEBD3FB8637AE316
3,019,686 UART: [art] PUB.Y = 029FB249AB50EDF6C723EC9D6CC0500BA65844A71A9C805B5A168AF41B2CB33009A71C15FC6EEEB5A9F9040F9DE1D63E
3,026,639 UART: [art] SIG.R = 2FE602537A1DF430FF046CDF86F05F67568E6C27ECDF650E6A8E49BB377F28DB7627A5182B8B006EE76A3FBB237FDDEF
3,033,396 UART: [art] SIG.S = 35D625EDB408B08EE3EE44EF4FB827EABC8B291AEA2446CE4EE44774FF1415C2E3C10A582ACD3175A1A851CA82DC1305
3,056,849 UART: Caliptra RT
3,057,100 UART: [state] CFI Enabled
3,175,964 UART: [rt] RT listening for mailbox commands...
3,176,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,174 UART: [rt]cmd =0x44504543, len=96
3,399,904 >>> mbox cmd response data (6236 bytes)
3,399,905 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,026 UART: [rt]cmd =0x53574545, len=84
3,455,346 >>> mbox cmd response data (200 bytes)
3,455,347 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,485,118 UART: [rt]cmd =0x52564348, len=36
3,487,348 >>> mbox cmd response data (8 bytes)
3,487,349 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,517,360 UART: [rt]cmd =0x53574545, len=84
3,520,857 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Unprovisioned
85,704 UART: [state] DebugLocked = No
86,252 UART: [state] WD Timer not started. Device not locked for debugging
87,413 UART: [kat] SHA2-256
890,963 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,067 UART: [kat] ++
895,219 UART: [kat] sha1
899,443 UART: [kat] SHA2-256
901,383 UART: [kat] SHA2-384
904,142 UART: [kat] SHA2-512-ACC
906,043 UART: [kat] ECC-384
915,606 UART: [kat] HMAC-384Kdf
920,410 UART: [kat] LMS
1,168,722 UART: [kat] --
1,169,651 UART: [cold-reset] ++
1,170,149 UART: [fht] FHT @ 0x50003400
1,172,751 UART: [idev] ++
1,172,919 UART: [idev] CDI.KEYID = 6
1,173,280 UART: [idev] SUBJECT.KEYID = 7
1,173,705 UART: [idev] UDS.KEYID = 0
1,174,051 ready_for_fw is high
1,174,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,680 UART: [idev] Erasing UDS.KEYID = 0
1,198,514 UART: [idev] Sha1 KeyId Algorithm
1,207,492 UART: [idev] --
1,208,541 UART: [ldev] ++
1,208,709 UART: [ldev] CDI.KEYID = 6
1,209,073 UART: [ldev] SUBJECT.KEYID = 5
1,209,500 UART: [ldev] AUTHORITY.KEYID = 7
1,209,963 UART: [ldev] FE.KEYID = 1
1,215,587 UART: [ldev] Erasing FE.KEYID = 1
1,241,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,761 UART: [ldev] --
1,281,078 UART: [fwproc] Wait for Commands...
1,281,779 UART: [fwproc] Recv command 0x46574c44
1,282,512 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,288 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,463 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,856 >>> mbox cmd response: success
2,826,114 UART: [afmc] ++
2,826,282 UART: [afmc] CDI.KEYID = 6
2,826,645 UART: [afmc] SUBJECT.KEYID = 7
2,827,071 UART: [afmc] AUTHORITY.KEYID = 5
2,863,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,643 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,392 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,102 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,983 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,684 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,709 UART: [afmc] --
2,906,632 UART: [cold-reset] --
2,907,378 UART: [state] Locking Datavault
2,908,575 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,179 UART: [state] Locking ICCM
2,909,725 UART: [exit] Launching FMC @ 0x40000130
2,915,055 UART:
2,915,071 UART: Running Caliptra FMC ...
2,915,479 UART:
2,915,622 UART: [state] CFI Enabled
2,926,332 UART: [fht] FMC Alias Private Key: 7
3,045,782 UART: [art] Extend RT PCRs Done
3,046,210 UART: [art] Lock RT PCRs Done
3,047,758 UART: [art] Populate DV Done
3,056,007 UART: [fht] FMC Alias Private Key: 7
3,057,011 UART: [art] Derive CDI
3,057,291 UART: [art] Store in slot 0x4
3,142,888 UART: [art] Derive Key Pair
3,143,248 UART: [art] Store priv key in slot 0x5
3,156,478 UART: [art] Derive Key Pair - Done
3,171,262 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,696 UART: [art] PUB.X = BE07DEC9EE907E9FCDF4F85AF89DD7C6A09DC22ACB67E4001FDCDF9C3C1DE2AA5651868831FF6095CC90B2046B9ECD5C
3,194,468 UART: [art] PUB.Y = A0B2F52FFC8574773644BBC7F6BE1D28A71C82C829551308A79D675AC61A4E13A442ECF993FB6B9B62D4F020EBA0F3E1
3,201,427 UART: [art] SIG.R = 0E9E2D69AE91893B037E22A2082926ACD7086A8338A3C99D1477AC05EDB0B868C7533683B9857FF277CDD6C880665347
3,208,178 UART: [art] SIG.S = 210A772C67EB688ADFEC31069725526E242DF1D548ED000D4174D8D621682BC70DBB7CF195770177DF6C583461D82B85
3,232,047 UART: Caliptra RT
3,232,390 UART: [state] CFI Enabled
3,352,428 UART: [rt] RT listening for mailbox commands...
3,353,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,590 UART: [rt]cmd =0x44504543, len=96
3,575,037 >>> mbox cmd response data (6236 bytes)
3,575,038 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,943 UART: [rt]cmd =0x53574545, len=84
3,630,803 >>> mbox cmd response data (200 bytes)
3,630,804 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,660,211 UART: [rt]cmd =0x52564348, len=36
3,662,735 >>> mbox cmd response data (8 bytes)
3,662,736 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,692,707 UART: [rt]cmd =0x53574545, len=84
3,695,896 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,109 ready_for_fw is high
1,059,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,559 >>> mbox cmd response: success
2,741,280 UART:
2,741,296 UART: Running Caliptra FMC ...
2,741,704 UART:
2,741,847 UART: [state] CFI Enabled
2,752,457 UART: [fht] FMC Alias Private Key: 7
2,871,853 UART: [art] Extend RT PCRs Done
2,872,281 UART: [art] Lock RT PCRs Done
2,873,769 UART: [art] Populate DV Done
2,882,094 UART: [fht] FMC Alias Private Key: 7
2,883,118 UART: [art] Derive CDI
2,883,398 UART: [art] Store in slot 0x4
2,969,501 UART: [art] Derive Key Pair
2,969,861 UART: [art] Store priv key in slot 0x5
2,983,583 UART: [art] Derive Key Pair - Done
2,998,111 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,461 UART: [art] PUB.X = 7874300EE89C94D41FECB3737CB1400C1AF0D3A5ACE987DF09711BA0C1A717859A7BEE667B83085DB6AB70B1F77B9083
3,021,229 UART: [art] PUB.Y = F6847F59FB94A7193997628D52A883049E82B5C444BF2AEF04862BEA6A7D5BD92605E13A356F3465548CCD20B801B424
3,028,165 UART: [art] SIG.R = 1F45496AF5B6ECE1EA7E064376F23CED54A80DD3D30C5843D22939734C81C5140EDF24B34C5EC76AF9B59023B77C12DD
3,034,933 UART: [art] SIG.S = F019C69A8A48316ADB559B4F57321909A388B22F2215FE26B013BE28ADEADD9BF73BB32FF5138543AD277F56E0363EA3
3,059,182 UART: Caliptra RT
3,059,525 UART: [state] CFI Enabled
3,179,258 UART: [rt] RT listening for mailbox commands...
3,179,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,098 UART: [rt]cmd =0x44504543, len=96
3,401,796 >>> mbox cmd response data (6236 bytes)
3,401,797 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,574 UART: [rt]cmd =0x53574545, len=84
3,457,120 >>> mbox cmd response data (200 bytes)
3,457,121 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,656 UART: [rt]cmd =0x52564348, len=36
3,489,328 >>> mbox cmd response data (8 bytes)
3,489,329 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,256 UART: [rt]cmd =0x53574545, len=84
3,522,381 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,782 UART: [kat] SHA2-256
893,432 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,557 UART: [kat] ++
897,709 UART: [kat] sha1
902,057 UART: [kat] SHA2-256
903,997 UART: [kat] SHA2-384
906,948 UART: [kat] SHA2-512-ACC
908,849 UART: [kat] ECC-384
918,732 UART: [kat] HMAC-384Kdf
923,380 UART: [kat] LMS
1,171,708 UART: [kat] --
1,172,631 UART: [cold-reset] ++
1,172,967 UART: [fht] FHT @ 0x50003400
1,175,590 UART: [idev] ++
1,175,758 UART: [idev] CDI.KEYID = 6
1,176,118 UART: [idev] SUBJECT.KEYID = 7
1,176,542 UART: [idev] UDS.KEYID = 0
1,176,887 ready_for_fw is high
1,176,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,742 UART: [idev] Erasing UDS.KEYID = 0
1,201,461 UART: [idev] Sha1 KeyId Algorithm
1,209,881 UART: [idev] --
1,210,823 UART: [ldev] ++
1,210,991 UART: [ldev] CDI.KEYID = 6
1,211,354 UART: [ldev] SUBJECT.KEYID = 5
1,211,780 UART: [ldev] AUTHORITY.KEYID = 7
1,212,243 UART: [ldev] FE.KEYID = 1
1,217,169 UART: [ldev] Erasing FE.KEYID = 1
1,243,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,195 UART: [ldev] --
1,282,622 UART: [fwproc] Wait for Commands...
1,283,364 UART: [fwproc] Recv command 0x46574c44
1,284,092 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,958 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,128 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,461 >>> mbox cmd response: success
2,828,593 UART: [afmc] ++
2,828,761 UART: [afmc] CDI.KEYID = 6
2,829,123 UART: [afmc] SUBJECT.KEYID = 7
2,829,548 UART: [afmc] AUTHORITY.KEYID = 5
2,865,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,016 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,725 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,608 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,309 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,007 UART: [afmc] --
2,907,973 UART: [cold-reset] --
2,909,111 UART: [state] Locking Datavault
2,910,352 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,956 UART: [state] Locking ICCM
2,911,554 UART: [exit] Launching FMC @ 0x40000130
2,916,884 UART:
2,916,900 UART: Running Caliptra FMC ...
2,917,308 UART:
2,917,362 UART: [state] CFI Enabled
2,928,002 UART: [fht] FMC Alias Private Key: 7
3,046,412 UART: [art] Extend RT PCRs Done
3,046,840 UART: [art] Lock RT PCRs Done
3,048,564 UART: [art] Populate DV Done
3,056,797 UART: [fht] FMC Alias Private Key: 7
3,057,767 UART: [art] Derive CDI
3,058,047 UART: [art] Store in slot 0x4
3,143,560 UART: [art] Derive Key Pair
3,143,920 UART: [art] Store priv key in slot 0x5
3,157,366 UART: [art] Derive Key Pair - Done
3,172,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,808 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,573 UART: [art] PUB.X = 9E94D07D5C8AF0008A637DAEA9CAFB8A9FD1A17F65069498479F7754CF4F8ECC1427F953CF6310AEF88999CB96BAF614
3,194,332 UART: [art] PUB.Y = AF701261D85F4269816E0E897B63976FA277F0398E30614707167DF5E8A0CF13A9ACDF859FF588AEEB096A5C6A30CBB8
3,201,279 UART: [art] SIG.R = 147CA6082E2D09A97D6D6D5B68DFCB126BB61D7233BD38EBC5AFD950C6211DB3E87967C5D5D413360BD3419F22602A78
3,208,048 UART: [art] SIG.S = 465498DA216191BB206726C70E3363EC1B0B04E06AB34C6CBBAC9BE6DAA771D0B29AED66640B6F43B5D4E9B27C003A7D
3,232,242 UART: Caliptra RT
3,232,493 UART: [state] CFI Enabled
3,351,491 UART: [rt] RT listening for mailbox commands...
3,352,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,597 UART: [rt]cmd =0x44504543, len=96
3,575,505 >>> mbox cmd response data (6236 bytes)
3,575,506 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,419 UART: [rt]cmd =0x53574545, len=84
3,631,621 >>> mbox cmd response data (200 bytes)
3,631,622 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,519 UART: [rt]cmd =0x52564348, len=36
3,664,097 >>> mbox cmd response data (8 bytes)
3,664,098 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,879 UART: [rt]cmd =0x53574545, len=84
3,697,244 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,313 ready_for_fw is high
1,060,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,122 >>> mbox cmd response: success
2,741,835 UART:
2,741,851 UART: Running Caliptra FMC ...
2,742,259 UART:
2,742,313 UART: [state] CFI Enabled
2,752,367 UART: [fht] FMC Alias Private Key: 7
2,871,179 UART: [art] Extend RT PCRs Done
2,871,607 UART: [art] Lock RT PCRs Done
2,873,145 UART: [art] Populate DV Done
2,881,464 UART: [fht] FMC Alias Private Key: 7
2,882,582 UART: [art] Derive CDI
2,882,862 UART: [art] Store in slot 0x4
2,968,695 UART: [art] Derive Key Pair
2,969,055 UART: [art] Store priv key in slot 0x5
2,981,799 UART: [art] Derive Key Pair - Done
2,996,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,312 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,077 UART: [art] PUB.X = 9DFD48A5973B2A867DED2CDA69678556BB86516F37CFB99DEC6A2729319ED87FC94B8588A69EED37543F598B0EC1FDC8
3,019,858 UART: [art] PUB.Y = AB099027E52F5181A657ECA918DFCFD44021307EEA0C5CC1312EBBCD98D14D05FA700F94BB14907981146B7950CABAC9
3,026,808 UART: [art] SIG.R = 60FB40513078F76917E23A8528C3ECC8126A2D8120F019243DF9829283F615BA12CEE95CFBC4F96EE242F8C94178FBF2
3,033,580 UART: [art] SIG.S = EFC4F03D48CC2E40AA6212D990BD61F9B79A6A101975E3678A5E6A65B383863882793017B03C2864DE421C9186EA17C6
3,057,360 UART: Caliptra RT
3,057,611 UART: [state] CFI Enabled
3,178,094 UART: [rt] RT listening for mailbox commands...
3,178,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,134 UART: [rt]cmd =0x44504543, len=96
3,401,508 >>> mbox cmd response data (6236 bytes)
3,401,509 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,296 UART: [rt]cmd =0x53574545, len=84
3,456,832 >>> mbox cmd response data (200 bytes)
3,456,833 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,554 UART: [rt]cmd =0x52564348, len=36
3,489,296 >>> mbox cmd response data (8 bytes)
3,489,297 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,216 UART: [rt]cmd =0x53574545, len=84
3,522,451 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,529 UART: [kat] SHA2-256
893,179 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,304 UART: [kat] ++
897,456 UART: [kat] sha1
901,496 UART: [kat] SHA2-256
903,436 UART: [kat] SHA2-384
906,307 UART: [kat] SHA2-512-ACC
908,208 UART: [kat] ECC-384
917,779 UART: [kat] HMAC-384Kdf
922,441 UART: [kat] LMS
1,170,769 UART: [kat] --
1,171,520 UART: [cold-reset] ++
1,172,098 UART: [fht] FHT @ 0x50003400
1,174,773 UART: [idev] ++
1,174,941 UART: [idev] CDI.KEYID = 6
1,175,301 UART: [idev] SUBJECT.KEYID = 7
1,175,725 UART: [idev] UDS.KEYID = 0
1,176,070 ready_for_fw is high
1,176,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,655 UART: [idev] Erasing UDS.KEYID = 0
1,201,244 UART: [idev] Sha1 KeyId Algorithm
1,209,684 UART: [idev] --
1,210,786 UART: [ldev] ++
1,210,954 UART: [ldev] CDI.KEYID = 6
1,211,317 UART: [ldev] SUBJECT.KEYID = 5
1,211,743 UART: [ldev] AUTHORITY.KEYID = 7
1,212,206 UART: [ldev] FE.KEYID = 1
1,217,242 UART: [ldev] Erasing FE.KEYID = 1
1,243,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,712 UART: [ldev] --
1,283,037 UART: [fwproc] Wait for Commands...
1,283,729 UART: [fwproc] Recv command 0x46574c44
1,284,457 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,547 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,717 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,090 >>> mbox cmd response: success
2,829,286 UART: [afmc] ++
2,829,454 UART: [afmc] CDI.KEYID = 6
2,829,816 UART: [afmc] SUBJECT.KEYID = 7
2,830,241 UART: [afmc] AUTHORITY.KEYID = 5
2,866,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,643 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,391 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,100 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,983 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,684 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,300 UART: [afmc] --
2,909,312 UART: [cold-reset] --
2,910,254 UART: [state] Locking Datavault
2,911,489 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,093 UART: [state] Locking ICCM
2,912,709 UART: [exit] Launching FMC @ 0x40000130
2,918,039 UART:
2,918,055 UART: Running Caliptra FMC ...
2,918,463 UART:
2,918,606 UART: [state] CFI Enabled
2,929,814 UART: [fht] FMC Alias Private Key: 7
3,048,986 UART: [art] Extend RT PCRs Done
3,049,414 UART: [art] Lock RT PCRs Done
3,051,080 UART: [art] Populate DV Done
3,059,253 UART: [fht] FMC Alias Private Key: 7
3,060,355 UART: [art] Derive CDI
3,060,635 UART: [art] Store in slot 0x4
3,146,444 UART: [art] Derive Key Pair
3,146,804 UART: [art] Store priv key in slot 0x5
3,160,322 UART: [art] Derive Key Pair - Done
3,174,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,637 UART: [art] PUB.X = EB37B41D4144D5683DF1A6537EA576CEE2499B754B89841A5F45BF099CA224242959E3D3C8E4C065C22984254F9D90C6
3,198,402 UART: [art] PUB.Y = 2E24712F9E14EEB4DDC0DF208ADE80EA48FDB409202D7E2A94E131ED1F02AA8727E4A05D652117B04D7D15A446BB7BC8
3,205,362 UART: [art] SIG.R = A49899C63BA96078C5AC3D8873256EF933F8EB57A5308666BD9006EBE5094D67E592799C369D35BD86268F94B5A4A167
3,212,122 UART: [art] SIG.S = 01B0FF7058D30DE76A5E98997D739F35E700E8A42D1769F537112E0C101D909015522E01B747F322228BDA5A8AE3AC05
3,235,745 UART: Caliptra RT
3,236,088 UART: [state] CFI Enabled
3,355,451 UART: [rt] RT listening for mailbox commands...
3,356,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,605 UART: [rt]cmd =0x44504543, len=96
3,578,730 >>> mbox cmd response data (6236 bytes)
3,578,731 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,608,674 UART: [rt]cmd =0x53574545, len=84
3,634,062 >>> mbox cmd response data (200 bytes)
3,634,063 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,674 UART: [rt]cmd =0x52564348, len=36
3,666,120 >>> mbox cmd response data (8 bytes)
3,666,121 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,695,744 UART: [rt]cmd =0x53574545, len=84
3,698,681 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,130 ready_for_fw is high
1,060,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,711 >>> mbox cmd response: success
2,739,636 UART:
2,739,652 UART: Running Caliptra FMC ...
2,740,060 UART:
2,740,203 UART: [state] CFI Enabled
2,750,923 UART: [fht] FMC Alias Private Key: 7
2,870,249 UART: [art] Extend RT PCRs Done
2,870,677 UART: [art] Lock RT PCRs Done
2,872,395 UART: [art] Populate DV Done
2,880,562 UART: [fht] FMC Alias Private Key: 7
2,881,702 UART: [art] Derive CDI
2,881,982 UART: [art] Store in slot 0x4
2,967,315 UART: [art] Derive Key Pair
2,967,675 UART: [art] Store priv key in slot 0x5
2,981,097 UART: [art] Derive Key Pair - Done
2,995,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,288 UART: [art] PUB.X = 0ED899284159D9D543E70B07DD0B56D039797B8AAA858B1A76A7CA9F17517DCB2B7E7196168FEC2FF8F41D5DE3367E3C
3,019,056 UART: [art] PUB.Y = 6E55D22BED54A3C2F498F46D5E05B19C7A8D29FAE41376F9406F17817BDFB2B4A1B6335B8A58F0986F79B88B24C2A1F1
3,026,013 UART: [art] SIG.R = 9807211EAFF4802024D4CCAE1750A583390A15E2B5D28CE32215A50BCF4CB4F3E74B65D947DA31B1C1177A3BDC48CAD0
3,032,786 UART: [art] SIG.S = 8C698A532801B726FEE1815996268434ED57C5938B1CB781EBC04357AAD7A324716BE96B6A13F8DDB5A7160EF5941A2D
3,056,726 UART: Caliptra RT
3,057,069 UART: [state] CFI Enabled
3,177,271 UART: [rt] RT listening for mailbox commands...
3,177,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,275 UART: [rt]cmd =0x44504543, len=96
3,400,756 >>> mbox cmd response data (6236 bytes)
3,400,757 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,656 UART: [rt]cmd =0x53574545, len=84
3,456,824 >>> mbox cmd response data (200 bytes)
3,456,825 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,430 UART: [rt]cmd =0x52564348, len=36
3,489,154 >>> mbox cmd response data (8 bytes)
3,489,155 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,906 UART: [rt]cmd =0x53574545, len=84
3,522,145 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
Truncated 2539 bytes from beginning
ED2387A2A26F6449C41B5D86AD0
13,107,087 UART: [ldev] --
13,112,032 UART: [fwproc] Waiting for Commands...
13,115,206 UART: [fwproc] Received command 0x46574c44
13,117,393 UART: [fwproc] Received Image of size 82832 bytes
16,783,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,852,657 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,925,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,129,110 >>> mbox cmd response: success
17,129,632 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,132,966 UART: [afmc] ++
17,133,546 UART: [afmc] CDI.KEYID = 6
17,134,482 UART: [afmc] SUBJECT.KEYID = 7
17,135,748 UART: [afmc] AUTHORITY.KEYID = 5
20,491,689 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,789,911 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,792,173 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,806,622 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,821,372 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,835,752 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,856,046 UART: [afmc] --
22,860,287 UART: [cold-reset] --
22,864,555 UART: [state] Locking Datavault
22,868,172 UART: [state] Locking PCR0, PCR1 and PCR31
22,869,887 UART: [state] Locking ICCM
22,872,390 UART: [exit] Launching FMC @ 0x40000130
22,880,787 UART:
22,881,020 UART: Running Caliptra FMC ...
22,882,047 UART:
22,882,197 UART: [state] CFI Enabled
22,949,030 UART: [fht] FMC Alias Private Key: 7
25,290,190 UART: [art] Extend RT PCRs Done
25,291,419 UART: [art] Lock RT PCRs Done
25,293,345 UART: [art] Populate DV Done
25,298,653 UART: [fht] FMC Alias Private Key: 7
25,300,242 UART: [art] Derive CDI
25,301,057 UART: [art] Store in slot 0x4
25,357,484 UART: [art] Derive Key Pair
25,358,536 UART: [art] Store priv key in slot 0x5
28,650,040 UART: [art] Derive Key Pair - Done
28,663,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,951,392 UART: [art] Erasing AUTHORITY.KEYID = 7
30,952,902 UART: [art] PUB.X = 11C9C3A1498C0D6C98A760D7FD3440CD34BA324D42ED56241EACF02A39D2085DA370E35DB3F24C9F91483BE1F442A7C4
30,960,171 UART: [art] PUB.Y = 6BA314E2654D3F5C4E220852DDEE04DFCA0DB9D3DAD5FE9BC02A34998DE007794F929FE243D3DFD6CEA0AF195D7E0AC3
30,967,486 UART: [art] SIG.R = A3A4F3B31B2E3F418EDAAC172486BD3541EB55591E1ABCD8B156FE1C248A3D575B325C016CF8591B56E603E7883C2167
30,974,897 UART: [art] SIG.S = 559F9409388745D9DDE677FBE917CA870C994EBFCF509CF366A0A8859F07437AB7670807B109919EA6334CE2095EA419
32,279,806 UART: mbox::rt_entry...
32,280,750 UART: ____ _ _ _ ____ _____
32,282,727 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,284,736 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,286,665 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,288,593 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,290,520 UART: |_|
32,291,325 UART:
32,423,154 UART: [rt] Runtime listening for mailbox commands...
32,425,332 >>> mbox cmd response data (48 bytes)
34,501,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,651,978 UART:
34,652,374 UART: Running Caliptra ROM ...
34,653,457 UART:
34,653,618 UART: [state] CFI Enabled
34,727,862 UART: [state] LifecycleState = Unprovisioned
34,729,799 UART: [state] DebugLocked = No
34,732,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,737,472 UART: [kat] SHA2-256
34,907,154 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,917,656 UART: [kat] ++
34,918,199 UART: [kat] sha1
34,929,581 UART: [kat] SHA2-256
34,932,288 UART: [kat] SHA2-384
34,937,892 UART: [kat] SHA2-512-ACC
34,940,241 UART: [kat] ECC-384
37,228,011 UART: [kat] HMAC-384Kdf
37,259,592 UART: [kat] LMS
38,449,923 UART: [kat] --
38,455,441 UART: [update-reset] ++
42,645,227 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,649,602 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,047,326 >>> mbox cmd response: success
43,047,749 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,048,625 UART: [update-reset] Copying MAN_2 To MAN_1
43,071,076 UART: [update-reset Success] --
43,076,506 UART: [state] Locking Datavault
43,079,111 UART: [state] Locking PCR0, PCR1 and PCR31
43,080,988 UART: [state] Locking ICCM
43,082,177 UART: [exit] Launching FMC @ 0x40000130
43,090,631 UART:
43,090,869 UART: Running Caliptra FMC ...
43,091,971 UART:
43,092,132 UART: [state] CFI Enabled
43,198,938 UART: [art] Extend RT PCRs Done
43,200,126 UART: [art] Lock RT PCRs Done
43,201,525 UART: [art] Populate DV Done
43,207,148 UART: [fht] FMC Alias Private Key: 7
43,208,680 UART: [art] Derive CDI
43,209,491 UART: [art] Store in slot 0x4
43,268,408 UART: [art] Derive Key Pair
43,269,445 UART: [art] Store priv key in slot 0x5
46,562,236 UART: [art] Derive Key Pair - Done
46,575,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,863,364 UART: [art] Erasing AUTHORITY.KEYID = 7
48,864,884 UART: [art] PUB.X = 6F5D695C4A9268284EB89714AB31A5D4243B467207866467C6234CBCE19D3B016A44EB376F23F6BAE50C218C0852B7B5
48,872,106 UART: [art] PUB.Y = 8B0F6210D925B155516D23E470C57767670234AC5E6A4016778E46C0B873444DBF7723539CAEA07D638EBBA417810D34
48,879,318 UART: [art] SIG.R = 2404858F5223FF46CC9B1862CA9D5D02C6F0F0EE34A3E8A7D1EB5E5ADF04D2A00A7B395EEB7049E10DD8C0ABE1A35B9D
48,886,738 UART: [art] SIG.S = 0C7EB7285F470FF61247FBB1D20B02B69707F1EF8D413A39259981021A708B2D3197A0C2641D3710216F96C2AFD3287E
50,192,286 UART: Caliptra RT
50,193,009 UART: [state] CFI Enabled
50,630,474 UART: [rt] RT listening for mailbox commands...
50,662,866 UART: [rt]cmd =0x4d454153, len=108
50,681,306 >>> mbox cmd response data (12 bytes)
52,743,668 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,849,275 UART:
52,849,630 UART: Running Caliptra ROM ...
52,850,721 UART:
52,850,886 UART: [state] CFI Enabled
52,915,676 UART: [state] LifecycleState = Unprovisioned
52,917,623 UART: [state] DebugLocked = No
52,920,532 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,926,258 UART: [kat] SHA2-256
53,095,957 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,106,486 UART: [kat] ++
53,107,041 UART: [kat] sha1
53,119,560 UART: [kat] SHA2-256
53,122,259 UART: [kat] SHA2-384
53,127,713 UART: [kat] SHA2-512-ACC
53,130,059 UART: [kat] ECC-384
55,418,916 UART: [kat] HMAC-384Kdf
55,448,766 UART: [kat] LMS
56,639,061 UART: [kat] --
56,643,276 UART: [update-reset] ++
60,400,650 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,403,888 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,676,617 >>> mbox cmd response: success
62,736,207 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
62,840,912 UART: [update-reset] Copying MAN_2 To MAN_1
62,842,603 UART: [update-reset Success] --
62,843,688 UART: [state] Locking Datavault
62,844,841 UART: [state] Locking PCR0, PCR1 and PCR31
62,846,377 UART: [state] Locking ICCM
62,847,274 UART: [exit] Launching FMC @ 0x40000130
62,848,617 UART:
62,848,766 UART: Running Caliptra FMC ...
62,849,866 UART:
62,850,023 UART: [state] CFI Enabled
62,850,860 UART: [art] Extend RT PCRs Done
62,851,916 UART: [art] Lock RT PCRs Done
62,852,978 UART: [art] Populate DV Done
62,853,926 UART: [fht] FMC Alias Private Key: 7
62,855,161 UART: [art] Derive CDI
62,855,885 UART: [art] Store in slot 0x4
62,856,904 UART: [art] Derive Key Pair
62,857,835 UART: [art] Store priv key in slot 0x5
64,156,521 UART: [art] Derive Key Pair - Done
64,169,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,459,006 UART: [art] Erasing AUTHORITY.KEYID = 7
66,460,538 UART: [art] PUB.X = 974EFD0699437063DF6935353FD36D2AE82326812DE075ECA3FBD8FF1945138E4EF0C5FD66F8B23E7D131AB0EE99FB98
66,467,841 UART: [art] PUB.Y = 6BC0E7E0F41811C4225E14B78816FB5118AD2CE6A21895F055F39059CB5BB5369C1972749B937F3FC35D235EF5BD6A2D
66,475,047 UART: [art] SIG.R = 32FDD10AD8F60C6445B2318C313A240C438F220FEA965EF9C1FC304FE13EA7428D74CC5CD9149BADF8223C21D4D663E3
66,482,452 UART: [art] SIG.S = A82C7BA9E68B581F686F83224C4C9730CD0644CDEE5CCB756791CECD57FC5A1DD4B23D60167394142166FC43567C3CD0
67,787,143 UART: mbox::rt_entry...
67,788,098 UART: ____ _ _ _ ____ _____
67,790,094 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,792,109 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,794,044 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,795,984 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,797,911 UART: |_|
67,798,749 UART:
68,173,021 UART: [rt] Runtime listening for mailbox commands...
68,175,106 UART:
68,175,277 UART: Running Caliptra ROM ...
68,176,381 UART:
68,176,559 UART: [state] CFI Enabled
68,247,910 UART: [state] LifecycleState = Unprovisioned
68,249,848 UART: [state] DebugLocked = No
68,252,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
68,258,249 UART: [kat] SHA2-256
68,427,967 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
68,438,452 UART: [kat] ++
68,438,934 UART: [kat] sha1
68,449,552 UART: [kat] SHA2-256
68,452,243 UART: [kat] SHA2-384
68,457,413 UART: [kat] SHA2-512-ACC
68,459,811 UART: [kat] ECC-384
70,754,069 UART: [kat] HMAC-384Kdf
70,783,255 UART: [kat] LMS
71,973,568 UART: [kat] --
71,978,692 UART: [update-reset] ++
75,735,273 UART: [update-reset] Image verified using Vendor ECC Key Index 0
75,738,675 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
76,011,370 >>> mbox cmd response: success
76,011,722 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
76,012,601 UART: [update-reset] Copying MAN_2 To MAN_1
76,035,035 UART: [update-reset Success] --
76,039,114 UART: [state] Locking Datavault
76,042,800 UART: [state] Locking PCR0, PCR1 and PCR31
76,044,559 UART: [state] Locking ICCM
76,046,983 UART: [exit] Launching FMC @ 0x40000130
76,055,433 UART:
76,055,678 UART: Running Caliptra FMC ...
76,056,781 UART:
76,056,937 UART: [state] CFI Enabled
76,149,249 UART: [art] Extend RT PCRs Done
76,150,448 UART: [art] Lock RT PCRs Done
76,151,841 UART: [art] Populate DV Done
76,157,359 UART: [fht] FMC Alias Private Key: 7
76,159,063 UART: [art] Derive CDI
76,159,806 UART: [art] Store in slot 0x4
76,218,065 UART: [art] Derive Key Pair
76,219,067 UART: [art] Store priv key in slot 0x5
79,511,494 UART: [art] Derive Key Pair - Done
79,524,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
81,813,578 UART: [art] Erasing AUTHORITY.KEYID = 7
81,815,081 UART: [art] PUB.X = 0BBEEAA7D00A0222C4FE2306A8D6A4BF5E2FB04F932D0F1304CC1C7CDD9312A12AEC7389C0D8E74B8CAB1D9EBA7BF875
81,822,353 UART: [art] PUB.Y = FBD07BD40A80E3D518A5033CE87B3FE6FE2679F36B21B5F14A5C3482EEFDABD8590F9802F61840C9B3759A0FE49A0C44
81,829,591 UART: [art] SIG.R = B58FC8E545D0CE9058335BEE23EA6E2F89183FE1EA69FD32FF82143E78DFAD5CFE9746C3C6C45444E30096CC3D521768
81,837,014 UART: [art] SIG.S = CC137403E1B81025823DD6469034748F9954E0A62C7C71D90FCFC0E6F869AD13399564F5E8135BC802C2685BF04ED63B
83,141,242 UART: mbox::rt_entry...
83,142,211 UART: ____ _ _ _ ____ _____
83,144,143 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,146,168 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,148,022 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,149,949 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,151,836 UART: |_|
83,152,662 UART:
83,522,037 UART: [rt] Runtime listening for mailbox commands...
83,524,208 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,805,065 ready_for_fw is high
3,805,658 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,241,831 >>> mbox cmd response: success
17,242,913 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
22,934,859 UART:
22,935,322 UART: Running Caliptra FMC ...
22,936,444 UART:
22,936,596 UART: [state] CFI Enabled
23,007,480 UART: [fht] FMC Alias Private Key: 7
25,347,870 UART: [art] Extend RT PCRs Done
25,349,093 UART: [art] Lock RT PCRs Done
25,350,562 UART: [art] Populate DV Done
25,356,138 UART: [fht] FMC Alias Private Key: 7
25,357,732 UART: [art] Derive CDI
25,358,546 UART: [art] Store in slot 0x4
25,417,028 UART: [art] Derive Key Pair
25,418,072 UART: [art] Store priv key in slot 0x5
28,710,444 UART: [art] Derive Key Pair - Done
28,723,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,013,387 UART: [art] Erasing AUTHORITY.KEYID = 7
31,014,907 UART: [art] PUB.X = 623F06E9C00C42CC60344BAB82239837BABB04D8422CB9394C6EC8614A562DF9EABBE6F79DF69EF193DA89B5C5C6F7BD
31,022,169 UART: [art] PUB.Y = E4FCD59AFB0FE2C0378B08A73E893578F565B82CA9D1B823F6AF882441C72CAE28A06F2B637AF9CD41183666884A677A
31,029,435 UART: [art] SIG.R = 551C859D75CC01852656DEF1F2FA064C63BD7E080868320CDA6111648E88A11E7D68A0BFD10059F1253D5A49E9369DF7
31,036,783 UART: [art] SIG.S = E6A40A38A4F037A5E854103AD07F5A2C45DBB19A8AC54156263B6CE781620892B986E3D950C8432D2D197B7E9FF8D17A
32,341,522 UART: mbox::rt_entry...
32,342,515 UART: ____ _ _ _ ____ _____
32,344,507 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,346,523 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,348,449 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,350,645 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,352,583 UART: |_|
32,353,389 UART:
32,484,222 UART: [rt] Runtime listening for mailbox commands...
32,486,403 >>> mbox cmd response data (48 bytes)
34,564,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,402,240 >>> mbox cmd response: success
43,402,966 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,437,291 UART:
43,437,581 UART: Running Caliptra FMC ...
43,438,623 UART:
43,438,774 UART: [state] CFI Enabled
43,545,191 UART: [art] Extend RT PCRs Done
43,546,380 UART: [art] Lock RT PCRs Done
43,547,590 UART: [art] Populate DV Done
43,552,843 UART: [fht] FMC Alias Private Key: 7
43,554,312 UART: [art] Derive CDI
43,555,053 UART: [art] Store in slot 0x4
43,614,363 UART: [art] Derive Key Pair
43,615,360 UART: [art] Store priv key in slot 0x5
46,908,316 UART: [art] Derive Key Pair - Done
46,921,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,208,798 UART: [art] Erasing AUTHORITY.KEYID = 7
49,210,314 UART: [art] PUB.X = 9E0B542D8E9F7A137C0A390965F10F9178172B369459C8FA8A822931159363E4C36614FEB15893A515CC496663D416E3
49,217,601 UART: [art] PUB.Y = 3891BC6E8884A051C3693F449E17BB6C355369A5031CA5E124093FFE1B16ADCB31B35862C7AD1971486BE92F4FBCB02E
49,224,791 UART: [art] SIG.R = 65289DC44BC4EB53703929417E0725816D56EF3031436FE03B52D345D3800D1976805FBB15842F93DC1FB821A43DE78D
49,232,202 UART: [art] SIG.S = AD95DD6835E524AEE7602F5E20A6CD5359667A02C7239AEBAFEE9A9A0F4134E74EE817DB06B213FC9B1D8D15DF318C6A
50,537,783 UART: Caliptra RT
50,538,493 UART: [state] CFI Enabled
50,977,350 UART: [rt] RT listening for mailbox commands...
51,009,429 UART: [rt]cmd =0x4d454153, len=108
51,028,176 >>> mbox cmd response data (12 bytes)
53,091,728 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
61,130,073 >>> mbox cmd response: success
63,194,271 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
63,299,387 UART:
63,299,776 UART: Running Caliptra FMC ...
63,300,832 UART:
63,300,985 UART: [state] CFI Enabled
63,301,861 UART: [art] Extend RT PCRs Done
63,303,010 UART: [art] Lock RT PCRs Done
63,304,197 UART: [art] Populate DV Done
63,305,175 UART: [fht] FMC Alias Private Key: 7
63,306,499 UART: [art] Derive CDI
63,307,231 UART: [art] Store in slot 0x4
63,308,208 UART: [art] Derive Key Pair
63,309,138 UART: [art] Store priv key in slot 0x5
64,630,858 UART: [art] Derive Key Pair - Done
64,643,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,932,783 UART: [art] Erasing AUTHORITY.KEYID = 7
66,934,306 UART: [art] PUB.X = 0504A5BC589528D463C6B4A97A48FD3E5CCD7AC65BE70B35376CBC05CE1DD4F4BA4E0E1C2091C5823328364545E97649
66,941,570 UART: [art] PUB.Y = 12F0BD92F9F439820FC9B830651BE44C0002C4F0376781854F771E48D61CA56063F8F958DA76D685F9053E2696DB5FF8
66,948,875 UART: [art] SIG.R = 22E2583A3E2664C0A6F836989E3C52E3ECB836839A7C0868FEE106445C25CD9FC627241A31D5EA608ADCFC2F476BEF6F
66,956,171 UART: [art] SIG.S = 10BABEF50971D86765ABA2CCCF144AF4166BA3774729A563805AC9D5D54836131279E5004E21A250CE5E5B40F9BFDBB5
68,260,872 UART: mbox::rt_entry...
68,261,841 UART: ____ _ _ _ ____ _____
68,263,834 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,265,843 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,267,772 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,269,904 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,271,768 UART: |_|
68,272,594 UART:
68,642,681 UART: [rt] Runtime listening for mailbox commands...
76,584,395 >>> mbox cmd response: success
76,584,855 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
76,619,848 UART:
76,620,151 UART: Running Caliptra FMC ...
76,621,189 UART:
76,621,341 UART: [state] CFI Enabled
76,711,366 UART: [art] Extend RT PCRs Done
76,712,577 UART: [art] Lock RT PCRs Done
76,713,849 UART: [art] Populate DV Done
76,719,150 UART: [fht] FMC Alias Private Key: 7
76,720,790 UART: [art] Derive CDI
76,721,524 UART: [art] Store in slot 0x4
76,780,321 UART: [art] Derive Key Pair
76,781,359 UART: [art] Store priv key in slot 0x5
80,073,882 UART: [art] Derive Key Pair - Done
80,086,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
82,375,020 UART: [art] Erasing AUTHORITY.KEYID = 7
82,376,576 UART: [art] PUB.X = FD66D7C30D84DE362A552362114E08B25C8FBD360815F02B7F7537A722097E78B459D8067E8E9C07CBC6BD1FB7E93F11
82,383,808 UART: [art] PUB.Y = 730F8A51EBE6987D06791553D35BA80569C77DD80A923AB4478D38BAD85006D54740B43CAE477515007CC4BBDBC56BA0
82,391,053 UART: [art] SIG.R = 337992B72855EAA0F33CCA79309D4CC177429399BC000B17314C1F865B12B9A0D76A800B4164C3A0AC693933B3F6373E
82,398,397 UART: [art] SIG.S = C535F7D7719451E913844B44CB346C2175F219DBF6A70388675A7898A6918215B023AC349094B0F066A7B19AED2D4CE8
83,703,065 UART: mbox::rt_entry...
83,704,052 UART: ____ _ _ _ ____ _____
83,706,007 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,708,126 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,710,192 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,712,141 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,714,026 UART: |_|
83,714,859 UART:
84,085,558 UART: [rt] Runtime listening for mailbox commands...
84,087,750 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.32s
Truncated 2539 bytes from beginning
ED2387A2A26F6449C41B5D86AD0
13,317,676 UART: [ldev] --
13,322,769 UART: [fwproc] Waiting for Commands...
13,325,504 UART: [fwproc] Received command 0x46574c44
13,327,736 UART: [fwproc] Received Image of size 82832 bytes
16,988,772 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,069,872 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,143,042 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,346,169 >>> mbox cmd response: success
17,347,234 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,349,750 UART: [afmc] ++
17,350,389 UART: [afmc] CDI.KEYID = 6
17,351,268 UART: [afmc] SUBJECT.KEYID = 7
17,352,531 UART: [afmc] AUTHORITY.KEYID = 5
20,666,575 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,962,740 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,964,997 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,979,433 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,994,168 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,008,583 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,030,216 UART: [afmc] --
23,034,902 UART: [cold-reset] --
23,038,276 UART: [state] Locking Datavault
23,045,247 UART: [state] Locking PCR0, PCR1 and PCR31
23,046,992 UART: [state] Locking ICCM
23,049,005 UART: [exit] Launching FMC @ 0x40000130
23,057,394 UART:
23,057,625 UART: Running Caliptra FMC ...
23,058,647 UART:
23,058,792 UART: [state] CFI Enabled
23,067,159 UART: [fht] FMC Alias Private Key: 7
25,407,309 UART: [art] Extend RT PCRs Done
25,408,535 UART: [art] Lock RT PCRs Done
25,410,077 UART: [art] Populate DV Done
25,415,444 UART: [fht] FMC Alias Private Key: 7
25,416,914 UART: [art] Derive CDI
25,417,653 UART: [art] Store in slot 0x4
25,460,180 UART: [art] Derive Key Pair
25,461,175 UART: [art] Store priv key in slot 0x5
28,703,216 UART: [art] Derive Key Pair - Done
28,716,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,996,172 UART: [art] Erasing AUTHORITY.KEYID = 7
30,997,685 UART: [art] PUB.X = 6F9BC7F5B09AF8BCA9EDA55EFBF1F9A3403A71AD213A140139042E2D58955B0EBD56B56E41CF2D59BE30534544105BA5
31,004,938 UART: [art] PUB.Y = DCAE21A25BED360D665C3DB6B8F7410A452A5004865E069005EDF7B3642661F298F5F238C46C1139FDC6367169D1686D
31,012,183 UART: [art] SIG.R = 9C0BB5F7F49A728B3DA122A9278A2C8D69847D88B820FFE196AF9D204EE92EF6CBC5652FE905E8775F7C7EEB90B76956
31,019,620 UART: [art] SIG.S = C529A2CD1BEBB2B251E48B51AF968ADD3B7A7A1DE5287509CBA80AAD02734A7606D9B050A5FD7692541AC23AB25E0A07
32,324,508 UART: mbox::rt_entry...
32,325,512 UART: ____ _ _ _ ____ _____
32,327,494 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,329,494 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,331,426 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,333,349 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,335,269 UART: |_|
32,336,068 UART:
32,466,559 UART: [rt] Runtime listening for mailbox commands...
32,468,772 >>> mbox cmd response data (48 bytes)
34,543,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,693,688 UART:
34,694,072 UART: Running Caliptra ROM ...
34,695,211 UART:
34,695,591 UART: [state] CFI Enabled
34,708,906 UART: [state] LifecycleState = Unprovisioned
34,710,802 UART: [state] DebugLocked = No
34,712,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,716,535 UART: [kat] SHA2-256
34,886,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,896,772 UART: [kat] ++
34,897,313 UART: [kat] sha1
34,908,408 UART: [kat] SHA2-256
34,911,091 UART: [kat] SHA2-384
34,916,434 UART: [kat] SHA2-512-ACC
34,918,830 UART: [kat] ECC-384
37,201,775 UART: [kat] HMAC-384Kdf
37,214,676 UART: [kat] LMS
38,404,753 UART: [kat] --
38,407,085 UART: [update-reset] ++
42,601,563 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,604,633 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,002,392 >>> mbox cmd response: success
43,002,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,003,212 UART: [update-reset] Copying MAN_2 To MAN_1
43,025,651 UART: [update-reset Success] --
43,030,626 UART: [state] Locking Datavault
43,033,557 UART: [state] Locking PCR0, PCR1 and PCR31
43,035,342 UART: [state] Locking ICCM
43,037,168 UART: [exit] Launching FMC @ 0x40000130
43,045,616 UART:
43,045,849 UART: Running Caliptra FMC ...
43,046,944 UART:
43,047,118 UART: [state] CFI Enabled
43,091,723 UART: [art] Extend RT PCRs Done
43,092,865 UART: [art] Lock RT PCRs Done
43,094,466 UART: [art] Populate DV Done
43,099,922 UART: [fht] FMC Alias Private Key: 7
43,101,629 UART: [art] Derive CDI
43,102,437 UART: [art] Store in slot 0x4
43,145,185 UART: [art] Derive Key Pair
43,146,180 UART: [art] Store priv key in slot 0x5
46,388,380 UART: [art] Derive Key Pair - Done
46,401,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,681,910 UART: [art] Erasing AUTHORITY.KEYID = 7
48,683,423 UART: [art] PUB.X = 440B39E68AE3799712661EF69C00C1D6F45261110FA2576809622DB6BD7D011B0104AD8CF208BB27D835D4E02C3CACDB
48,690,635 UART: [art] PUB.Y = FA523BB3B6AF9AFEA268BFA440BE0F38E59D2260A7F808A71C9EE6C673BC619A6DB3131799B385F8E5492E9A183AD36D
48,697,959 UART: [art] SIG.R = 6CB2BC214688ACBAD12BA213EA311656355DA12EFD14B88781C37E035EE7F1EEF8A3A3328E77A7CA0984F14810D995D0
48,705,368 UART: [art] SIG.S = 9C0B578916194C9BFD2D3BD80B04E75D536903406926DE8DB96143709CBAAC22D5E34C03A5390A5F62F91A54A6CB7713
50,010,831 UART: Caliptra RT
50,011,550 UART: [state] CFI Enabled
50,385,827 UART: [rt] RT listening for mailbox commands...
50,417,921 UART: [rt]cmd =0x4d454153, len=108
50,436,474 >>> mbox cmd response data (12 bytes)
52,496,687 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,602,506 UART:
52,602,876 UART: Running Caliptra ROM ...
52,603,931 UART:
52,604,134 UART: [state] CFI Enabled
52,612,248 UART: [state] LifecycleState = Unprovisioned
52,614,142 UART: [state] DebugLocked = No
52,616,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,621,984 UART: [kat] SHA2-256
52,791,666 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,802,220 UART: [kat] ++
52,802,753 UART: [kat] sha1
52,813,748 UART: [kat] SHA2-256
52,816,431 UART: [kat] SHA2-384
52,821,760 UART: [kat] SHA2-512-ACC
52,824,112 UART: [kat] ECC-384
55,109,585 UART: [kat] HMAC-384Kdf
55,120,291 UART: [kat] LMS
56,310,360 UART: [kat] --
56,316,314 UART: [update-reset] ++
60,080,143 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,084,732 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,357,488 >>> mbox cmd response: success
62,414,374 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
62,519,098 UART: [update-reset] Copying MAN_2 To MAN_1
62,520,792 UART: [update-reset Success] --
62,521,872 UART: [state] Locking Datavault
62,523,013 UART: [state] Locking PCR0, PCR1 and PCR31
62,524,556 UART: [state] Locking ICCM
62,525,427 UART: [exit] Launching FMC @ 0x40000130
62,526,761 UART:
62,526,905 UART: Running Caliptra FMC ...
62,528,001 UART:
62,528,157 UART: [state] CFI Enabled
62,528,984 UART: [art] Extend RT PCRs Done
62,530,029 UART: [art] Lock RT PCRs Done
62,531,099 UART: [art] Populate DV Done
62,532,238 UART: [fht] FMC Alias Private Key: 7
62,533,574 UART: [art] Derive CDI
62,534,309 UART: [art] Store in slot 0x4
62,535,557 UART: [art] Derive Key Pair
62,536,531 UART: [art] Store priv key in slot 0x5
63,742,157 UART: [art] Derive Key Pair - Done
63,755,289 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,035,926 UART: [art] Erasing AUTHORITY.KEYID = 7
66,037,468 UART: [art] PUB.X = 67469E68F7953E75F59A6393C5C527139E80122BD29138FC3CD5C0C5491EE314342C8496BCA5C38816E9E27C2F005606
66,044,673 UART: [art] PUB.Y = 267439F847A0DB672A5A6009BA86C9EBC394924F4D7FF42BF62514BDD8EA31EDBE6C3189DD94415E508A6A1E6BAD9739
66,051,954 UART: [art] SIG.R = 6C3553968E35BBCAF3AC587BB7FFE54A47D1183417E50A666F42CC5AC4CBE0D4B0FE6B647E2779493A7980B3E23BA1AC
66,059,388 UART: [art] SIG.S = 31167B51317EFC92BA8980BFECB70446D48C3F751E1BDD298BDF0C488881F5F9A9F7AF1F2588219E3A8098B53B3BC30B
67,363,802 UART: mbox::rt_entry...
67,364,786 UART: ____ _ _ _ ____ _____
67,366,769 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,368,767 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,370,687 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,372,627 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,374,552 UART: |_|
67,375,379 UART:
67,745,411 UART: [rt] Runtime listening for mailbox commands...
67,747,519 UART:
67,747,680 UART: Running Caliptra ROM ...
67,748,778 UART:
67,749,147 UART: [state] CFI Enabled
67,763,457 UART: [state] LifecycleState = Unprovisioned
67,765,391 UART: [state] DebugLocked = No
67,767,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
67,772,025 UART: [kat] SHA2-256
67,941,753 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
67,952,311 UART: [kat] ++
67,952,842 UART: [kat] sha1
67,964,483 UART: [kat] SHA2-256
67,967,186 UART: [kat] SHA2-384
67,973,704 UART: [kat] SHA2-512-ACC
67,976,047 UART: [kat] ECC-384
70,259,503 UART: [kat] HMAC-384Kdf
70,271,079 UART: [kat] LMS
71,461,115 UART: [kat] --
71,464,919 UART: [update-reset] ++
75,220,318 UART: [update-reset] Image verified using Vendor ECC Key Index 0
75,224,743 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
75,497,477 >>> mbox cmd response: success
75,497,849 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,498,129 UART: [update-reset] Copying MAN_2 To MAN_1
75,520,290 UART: [update-reset Success] --
75,523,440 UART: [state] Locking Datavault
75,526,415 UART: [state] Locking PCR0, PCR1 and PCR31
75,528,161 UART: [state] Locking ICCM
75,529,783 UART: [exit] Launching FMC @ 0x40000130
75,538,226 UART:
75,538,457 UART: Running Caliptra FMC ...
75,539,552 UART:
75,539,704 UART: [state] CFI Enabled
75,584,363 UART: [art] Extend RT PCRs Done
75,585,538 UART: [art] Lock RT PCRs Done
75,586,876 UART: [art] Populate DV Done
75,592,490 UART: [fht] FMC Alias Private Key: 7
75,594,125 UART: [art] Derive CDI
75,594,931 UART: [art] Store in slot 0x4
75,637,134 UART: [art] Derive Key Pair
75,638,128 UART: [art] Store priv key in slot 0x5
78,880,626 UART: [art] Derive Key Pair - Done
78,893,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
81,174,096 UART: [art] Erasing AUTHORITY.KEYID = 7
81,175,762 UART: [art] PUB.X = 48A1AA03A20AD0652534B38F9ECC62CFBDAB134FB2FBCDF1DC9C0D183F441B44B63D0095F523D5A473DFFC07131DA178
81,182,865 UART: [art] PUB.Y = 73A0BCA3D5485B14475D30436A97C1C3EBB817B6ACC999A04F78355DFE9310D6F75F949C098A9BA4019CB16F8907DF07
81,190,130 UART: [art] SIG.R = F5112E8D2950540DF5516A27CF50CDDC05473D2409908FE8D107A7671DD21426FB3E46718F964A05DD1A6FAF5E7AE98C
81,197,532 UART: [art] SIG.S = 40896F84186772B41ABEFE39C6ACB9211C89401A92525C77F3454A6AB911945C1F7877BBFED08D30E99DF038EA5A7E5A
82,501,991 UART: mbox::rt_entry...
82,502,943 UART: ____ _ _ _ ____ _____
82,504,920 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,506,917 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,508,839 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,510,760 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,512,675 UART: |_|
82,513,655 UART:
82,883,360 UART: [rt] Runtime listening for mailbox commands...
82,885,552 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
4,130,343 ready_for_fw is high
4,130,772 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,427,979 >>> mbox cmd response: success
17,429,311 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
23,068,112 UART:
23,068,519 UART: Running Caliptra FMC ...
23,069,669 UART:
23,069,827 UART: [state] CFI Enabled
23,077,829 UART: [fht] FMC Alias Private Key: 7
25,417,518 UART: [art] Extend RT PCRs Done
25,418,766 UART: [art] Lock RT PCRs Done
25,420,494 UART: [art] Populate DV Done
25,425,709 UART: [fht] FMC Alias Private Key: 7
25,427,407 UART: [art] Derive CDI
25,428,145 UART: [art] Store in slot 0x4
25,471,117 UART: [art] Derive Key Pair
25,472,149 UART: [art] Store priv key in slot 0x5
28,714,436 UART: [art] Derive Key Pair - Done
28,727,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,007,288 UART: [art] Erasing AUTHORITY.KEYID = 7
31,008,813 UART: [art] PUB.X = C91916A9A01D4F7CE935CE67CAA349587CD5503F9CA7BA228596BB742AFB190C816753042820363DEDFF0BE793F4B98E
31,016,127 UART: [art] PUB.Y = 697F54AEBE1CBA4C710445ECC6F4B5CE10218BFDD2EAF0BC19E411C6029BF84FADCA61DF7FA5F49B4E23D23DF7934BD6
31,023,422 UART: [art] SIG.R = E01BB6446BDCAE05BCF772C412588ACEFFC79CA2251A5FD6F57885F72725204B326CA442F9FE9C7A4FBB34A6D2CA599F
31,030,810 UART: [art] SIG.S = 6D8C6FB5F48610B29A52987C7EA6643ECF691D55230085264084932E664AAF3FA229F65A7A3BC5CF02DBDE145BFBC6DD
32,335,306 UART: mbox::rt_entry...
32,336,283 UART: ____ _ _ _ ____ _____
32,338,215 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,340,243 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,342,174 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,344,160 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,346,090 UART: |_|
32,346,926 UART:
32,478,064 UART: [rt] Runtime listening for mailbox commands...
32,480,069 >>> mbox cmd response data (48 bytes)
34,553,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,299,634 >>> mbox cmd response: success
43,300,262 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,333,319 UART:
43,333,599 UART: Running Caliptra FMC ...
43,334,736 UART:
43,334,896 UART: [state] CFI Enabled
43,379,096 UART: [art] Extend RT PCRs Done
43,380,293 UART: [art] Lock RT PCRs Done
43,381,698 UART: [art] Populate DV Done
43,387,324 UART: [fht] FMC Alias Private Key: 7
43,388,967 UART: [art] Derive CDI
43,389,781 UART: [art] Store in slot 0x4
43,432,429 UART: [art] Derive Key Pair
43,433,423 UART: [art] Store priv key in slot 0x5
46,675,632 UART: [art] Derive Key Pair - Done
46,688,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,968,896 UART: [art] Erasing AUTHORITY.KEYID = 7
48,970,411 UART: [art] PUB.X = 46632023168DD6D3CC163744781A17D21775FED5C03713107E2277FF99F6645B2E4E9D3767C2CBCB6B3001FF8A0B7518
48,977,653 UART: [art] PUB.Y = BC295B3680AE4641DC458D8797E8D6F388B20CE019DC8C41109A4802FB1E30C0018D91357202F7A0E55BAB193E8F889F
48,984,875 UART: [art] SIG.R = 68538AB173A1548C341982FB559CA65D306A7AA2C4390F2C14170EF9C59872B3917EBB8183C03F2BCF6DE47EE8890163
48,992,277 UART: [art] SIG.S = BF3848BF28419EDC5C6DA97AA87C05ADAF32A3C835D59B9264668C14B471B1AEB13E1E01EA8B9420C6410A9F5C83F833
50,297,053 UART: Caliptra RT
50,297,783 UART: [state] CFI Enabled
50,671,759 UART: [rt] RT listening for mailbox commands...
50,703,666 UART: [rt]cmd =0x4d454153, len=108
50,722,821 >>> mbox cmd response data (12 bytes)
52,784,394 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,762,370 >>> mbox cmd response: success
62,819,136 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
62,924,769 UART:
62,925,174 UART: Running Caliptra FMC ...
62,926,232 UART:
62,926,385 UART: [state] CFI Enabled
62,927,319 UART: [art] Extend RT PCRs Done
62,928,462 UART: [art] Lock RT PCRs Done
62,929,449 UART: [art] Populate DV Done
62,930,470 UART: [fht] FMC Alias Private Key: 7
62,931,705 UART: [art] Derive CDI
62,932,432 UART: [art] Store in slot 0x4
62,933,494 UART: [art] Derive Key Pair
62,934,402 UART: [art] Store priv key in slot 0x5
64,140,205 UART: [art] Derive Key Pair - Done
64,153,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,434,068 UART: [art] Erasing AUTHORITY.KEYID = 7
66,435,611 UART: [art] PUB.X = AB24CE677F5D553A929FB7AD38FA4B6FED284473B194CBDD151A079E7A9673E16F7D9FA89D01640C2270B52F61CAF4E0
66,442,867 UART: [art] PUB.Y = 9D0036A9F5383FA950A2FB3324F0A2D29D9245CE9409A18777498110ED24CCD9FA7BCFD2B5C6B54E57CD9A5C69681F06
66,450,107 UART: [art] SIG.R = 0DA0CA57AC6E78BD75C5A35738B99ECBEC25A5AD0E2467E3C5D8033A3379247977277C01DCF727A9B4A2CBD1C6548C5E
66,457,504 UART: [art] SIG.S = A02B9804023FEE08C54DB2B2E2356EAAEAD5191C5D8AA4D4974A602453E645E25D1C3E8EF2CAC6549FB8622D00B012D9
67,762,448 UART: mbox::rt_entry...
67,763,435 UART: ____ _ _ _ ____ _____
67,765,432 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,767,441 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,769,366 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,771,290 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,773,212 UART: |_|
67,774,191 UART:
68,147,957 UART: [rt] Runtime listening for mailbox commands...
76,019,473 >>> mbox cmd response: success
76,019,995 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
76,053,953 UART:
76,054,235 UART: Running Caliptra FMC ...
76,055,350 UART:
76,055,531 UART: [state] CFI Enabled
76,099,885 UART: [art] Extend RT PCRs Done
76,101,076 UART: [art] Lock RT PCRs Done
76,102,374 UART: [art] Populate DV Done
76,107,776 UART: [fht] FMC Alias Private Key: 7
76,109,258 UART: [art] Derive CDI
76,110,016 UART: [art] Store in slot 0x4
76,152,821 UART: [art] Derive Key Pair
76,153,816 UART: [art] Store priv key in slot 0x5
79,395,552 UART: [art] Derive Key Pair - Done
79,408,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
81,688,482 UART: [art] Erasing AUTHORITY.KEYID = 7
81,689,990 UART: [art] PUB.X = FBFAB1CBCCFE42BB35C538C83E4A8FEEF4516D82D7A6AA63EA2311BCB36C63081851FD0E975096EE2040BE2ED22CDEBD
81,697,283 UART: [art] PUB.Y = 53DFBCF1C0BAF0578B94C8DA7E3DF63D32ABB194DCF085240FFACE7FFBF42317CC206ADADC88E72702EF08A6578F5C36
81,704,568 UART: [art] SIG.R = 882536167DCAE4A7119D46B6B87B56ACD9264AB53332D66EBBB9308BECA7A2EBD43F051D0F60CA14D2C008046BE204DB
81,711,948 UART: [art] SIG.S = CC65D4AA317C12419D49B030291E0B7AE45D0063D102EB20FAC6995DB0F305CB5166DCA3A8B68D391E08829B459F8964
83,017,323 UART: mbox::rt_entry...
83,018,280 UART: ____ _ _ _ ____ _____
83,020,261 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,022,302 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,024,228 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,026,076 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,027,997 UART: |_|
83,028,803 UART:
83,402,634 UART: [rt] Runtime listening for mailbox commands...
83,404,771 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.29s
Truncated 2373 bytes from beginning
2B4B8088EE01D6CD5710
10,344,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,879 UART: [ldev] --
10,371,424 UART: [fwproc] Wait for Commands...
10,374,218 UART: [fwproc] Recv command 0x46574c44
10,376,257 UART: [fwproc] Recv'd Img size: 82832 bytes
13,414,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,494,087 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,567,092 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,771,234 >>> mbox cmd response: success
13,772,253 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,774,709 UART: [afmc] ++
13,775,298 UART: [afmc] CDI.KEYID = 6
13,776,232 UART: [afmc] SUBJECT.KEYID = 7
13,777,446 UART: [afmc] AUTHORITY.KEYID = 5
16,316,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,040,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,042,772 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,058,619 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,074,664 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,090,216 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,115,172 UART: [afmc] --
18,119,535 UART: [cold-reset] --
18,122,851 UART: [state] Locking Datavault
18,128,203 UART: [state] Locking PCR0, PCR1 and PCR31
18,129,953 UART: [state] Locking ICCM
18,131,290 UART: [exit] Launching FMC @ 0x40000130
18,139,733 UART:
18,139,971 UART: Running Caliptra FMC ...
18,141,069 UART:
18,141,230 UART: [state] CFI Enabled
18,194,836 UART: [fht] FMC Alias Private Key: 7
19,961,661 UART: [art] Extend RT PCRs Done
19,962,883 UART: [art] Lock RT PCRs Done
19,964,669 UART: [art] Populate DV Done
19,970,130 UART: [fht] FMC Alias Private Key: 7
19,971,717 UART: [art] Derive CDI
19,972,529 UART: [art] Store in slot 0x4
20,027,713 UART: [art] Derive Key Pair
20,028,754 UART: [art] Store priv key in slot 0x5
22,491,483 UART: [art] Derive Key Pair - Done
22,504,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,217,135 UART: [art] Erasing AUTHORITY.KEYID = 7
24,218,641 UART: [art] PUB.X = 41F2324FB1589E05A9B2431AF98F84038DEB8758D68AFBBCACBF9BAD028C038817F4F44D6894B42FF92EFDFC55A00C20
24,225,950 UART: [art] PUB.Y = D04BC5A260FBA29D1758CD00B8F59D9F16A214D2B83C2E20A94E362613B2EFD2B8BE590AE44177D4D205C3A30AC6012F
24,233,234 UART: [art] SIG.R = DCBC695B583C0A4A354B820C7B6DA38CAD289300A5C5C9DDB932841ECBE094CCC9012C01318DB419F2C07BD700AC70F3
24,240,584 UART: [art] SIG.S = FF92309326041AB74CCA9919DFCCC36DE04C473722104AADCA4A08DCFB69216A4D0F51DC596386816F37E53318293EAA
25,219,191 UART: mbox::rt_entry...
25,220,163 UART: ____ _ _ _ ____ _____
25,222,088 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,224,097 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,226,221 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,228,160 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,230,085 UART: |_|
25,230,917 UART:
25,361,754 UART: [rt] Runtime listening for mailbox commands...
25,363,916 >>> mbox cmd response data (48 bytes)
27,424,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,574,786 UART:
27,575,146 UART: Running Caliptra ROM ...
27,576,193 UART:
27,576,346 UART: [state] CFI Enabled
27,649,722 UART: [state] LifecycleState = Unprovisioned
27,651,652 UART: [state] DebugLocked = No
27,654,361 UART: [state] WD Timer not started. Device not locked for debugging
27,658,215 UART: [kat] SHA2-256
27,837,915 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,848,684 UART: [kat] ++
27,849,171 UART: [kat] sha1
27,860,325 UART: [kat] SHA2-256
27,863,011 UART: [kat] SHA2-384
27,870,036 UART: [kat] SHA2-512-ACC
27,872,379 UART: [kat] ECC-384
30,334,145 UART: [kat] HMAC-384Kdf
30,356,499 UART: [kat] LMS
30,832,952 UART: [kat] --
30,836,291 UART: [update-reset] ++
34,333,944 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,338,296 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,735,910 >>> mbox cmd response: success
34,736,339 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,736,977 UART: [update-reset] Copying MAN_2 To MAN_1
34,774,062 UART: [update-reset Success] --
34,778,610 UART: [state] Locking Datavault
34,782,297 UART: [state] Locking PCR0, PCR1 and PCR31
34,784,048 UART: [state] Locking ICCM
34,786,306 UART: [exit] Launching FMC @ 0x40000130
34,794,711 UART:
34,794,946 UART: Running Caliptra FMC ...
34,796,045 UART:
34,796,224 UART: [state] CFI Enabled
34,890,556 UART: [art] Extend RT PCRs Done
34,891,760 UART: [art] Lock RT PCRs Done
34,893,271 UART: [art] Populate DV Done
34,898,731 UART: [fht] FMC Alias Private Key: 7
34,900,318 UART: [art] Derive CDI
34,901,130 UART: [art] Store in slot 0x4
34,959,769 UART: [art] Derive Key Pair
34,960,813 UART: [art] Store priv key in slot 0x5
37,423,932 UART: [art] Derive Key Pair - Done
37,436,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,149,281 UART: [art] Erasing AUTHORITY.KEYID = 7
39,150,794 UART: [art] PUB.X = 4AA10A1E1B1BDEB48B4BF53024E5B1BDED97DC565C7C99B575B9AD9E046085940D891BC0E1519BC5D4D081CB8DBFD9D4
39,158,101 UART: [art] PUB.Y = 4C3254AB6A31A5BB640A22708D6D187B22FFB87B3046C6BCA900A4FA6299D212F8D60D8CE41808590C90FB4616FA7E3E
39,165,385 UART: [art] SIG.R = 03EF63F386207CC3CA0CE090088B8BE6B7BB6E5C5A6B6DD1216A2C483413EFDA53931B8FE0B219103CFF00B7541A0116
39,172,725 UART: [art] SIG.S = E45A19906570A01214C38BDA3DDE19A4C2EB55079B265DB5F2D8FA4AE6267E9605E2DFEBC75B45D788100DF0E4428D52
40,152,121 UART: Caliptra RT
40,152,812 UART: [state] CFI Enabled
40,574,642 UART: [rt] RT listening for mailbox commands...
40,606,538 UART: [rt]cmd =0x4d454153, len=108
40,625,996 >>> mbox cmd response data (12 bytes)
42,674,721 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,780,616 UART:
42,780,979 UART: Running Caliptra ROM ...
42,782,034 UART:
42,782,187 UART: [state] CFI Enabled
42,860,260 UART: [state] LifecycleState = Unprovisioned
42,862,248 UART: [state] DebugLocked = No
42,864,310 UART: [state] WD Timer not started. Device not locked for debugging
42,868,478 UART: [kat] SHA2-256
43,048,173 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
43,058,940 UART: [kat] ++
43,059,399 UART: [kat] sha1
43,069,793 UART: [kat] SHA2-256
43,072,526 UART: [kat] SHA2-384
43,078,685 UART: [kat] SHA2-512-ACC
43,081,039 UART: [kat] ECC-384
45,541,354 UART: [kat] HMAC-384Kdf
45,565,894 UART: [kat] LMS
46,042,326 UART: [kat] --
46,049,608 UART: [update-reset] ++
49,102,894 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,106,212 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,378,849 >>> mbox cmd response: success
51,424,792 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
51,529,488 UART: [update-reset] Copying MAN_2 To MAN_1
51,531,208 UART: [update-reset Success] --
51,532,373 UART: [state] Locking Datavault
51,533,519 UART: [state] Locking PCR0, PCR1 and PCR31
51,535,053 UART: [state] Locking ICCM
51,535,944 UART: [exit] Launching FMC @ 0x40000130
51,537,293 UART:
51,537,437 UART: Running Caliptra FMC ...
51,538,539 UART:
51,538,697 UART: [state] CFI Enabled
51,539,622 UART: [art] Extend RT PCRs Done
51,540,711 UART: [art] Lock RT PCRs Done
51,541,691 UART: [art] Populate DV Done
51,542,656 UART: [fht] FMC Alias Private Key: 7
51,543,974 UART: [art] Derive CDI
51,544,728 UART: [art] Store in slot 0x4
51,545,973 UART: [art] Derive Key Pair
51,546,954 UART: [art] Store priv key in slot 0x5
52,077,283 UART: [art] Derive Key Pair - Done
52,090,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,802,976 UART: [art] Erasing AUTHORITY.KEYID = 7
53,804,486 UART: [art] PUB.X = 25092B333B031E4C69A03973FD44AA91E9CC77E84691643863C4F70DEDE643FB568BC43D86E93D4941B6E69E3D510EB2
53,811,747 UART: [art] PUB.Y = B334ACB0CFAD2E88616B341C78A7435508C39D2FA0E2417C23E766A562C4C42B151DED6CC547E3176BF9AC327ED858F4
53,819,039 UART: [art] SIG.R = BEA567F18DB9009E247B28D938BEC83DF88C461A9F65529FC6EAA358080A79B7D61A6C70DECD3B9D2F0A89A75677E617
53,826,437 UART: [art] SIG.S = ECE027833978149291591B8EB0E5263BA1D670D4BC8F729B6396198031029FF9AD4F9247460EB55A357D0F91B6E3C86D
54,804,593 UART: mbox::rt_entry...
54,805,569 UART: ____ _ _ _ ____ _____
54,807,552 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,809,550 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,811,478 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,813,404 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,815,356 UART: |_|
54,816,163 UART:
55,186,360 UART: [rt] Runtime listening for mailbox commands...
55,188,444 UART:
55,188,614 UART: Running Caliptra ROM ...
55,189,719 UART:
55,189,878 UART: [state] CFI Enabled
55,250,705 UART: [state] LifecycleState = Unprovisioned
55,252,693 UART: [state] DebugLocked = No
55,254,085 UART: [state] WD Timer not started. Device not locked for debugging
55,257,836 UART: [kat] SHA2-256
55,437,501 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
55,448,273 UART: [kat] ++
55,448,806 UART: [kat] sha1
55,459,102 UART: [kat] SHA2-256
55,461,788 UART: [kat] SHA2-384
55,469,142 UART: [kat] SHA2-512-ACC
55,471,531 UART: [kat] ECC-384
57,934,035 UART: [kat] HMAC-384Kdf
57,957,533 UART: [kat] LMS
58,434,001 UART: [kat] --
58,437,132 UART: [update-reset] ++
61,490,132 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,494,268 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
61,766,868 >>> mbox cmd response: success
61,767,235 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,767,509 UART: [update-reset] Copying MAN_2 To MAN_1
61,804,377 UART: [update-reset Success] --
61,807,830 UART: [state] Locking Datavault
61,810,712 UART: [state] Locking PCR0, PCR1 and PCR31
61,812,414 UART: [state] Locking ICCM
61,814,507 UART: [exit] Launching FMC @ 0x40000130
61,822,919 UART:
61,823,163 UART: Running Caliptra FMC ...
61,824,261 UART:
61,824,417 UART: [state] CFI Enabled
61,915,093 UART: [art] Extend RT PCRs Done
61,916,283 UART: [art] Lock RT PCRs Done
61,917,704 UART: [art] Populate DV Done
61,923,268 UART: [fht] FMC Alias Private Key: 7
61,924,970 UART: [art] Derive CDI
61,925,780 UART: [art] Store in slot 0x4
61,984,044 UART: [art] Derive Key Pair
61,985,082 UART: [art] Store priv key in slot 0x5
64,447,663 UART: [art] Derive Key Pair - Done
64,460,439 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,173,754 UART: [art] Erasing AUTHORITY.KEYID = 7
66,175,258 UART: [art] PUB.X = 8805C99F9DD74B747F624B17B06BCC5646675D13196F16A86AE887ED7DF791732C59B977E21E21CA0D12475B292BD9D4
66,182,590 UART: [art] PUB.Y = A9ED700577A7023B16F9A80D5185F689EE918C41992C86D328C2259E8386F5A78AAC1CED3019B640CA551020A4B39E9E
66,189,807 UART: [art] SIG.R = 7DFEF47D34DACF17257DD7E3DA26BFB9503BB45B5B5624BC8211D0CBC32FF8E17721A3CBD6B11435DAA32A92FD321E9F
66,197,205 UART: [art] SIG.S = B25BF925725FD8B6D63BBFCBBE5504787E1CC03D237FB8149BA36FC9FCB975471DBE4D0494832DB6C3BFF2FA8ED3F35B
67,176,170 UART: mbox::rt_entry...
67,177,119 UART: ____ _ _ _ ____ _____
67,179,042 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,181,045 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,182,906 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,184,828 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,186,683 UART: |_|
67,187,565 UART:
67,557,771 UART: [rt] Runtime listening for mailbox commands...
67,559,937 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,464,479 ready_for_fw is high
3,465,092 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,658,113 >>> mbox cmd response: success
13,659,216 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,943,941 UART:
17,944,317 UART: Running Caliptra FMC ...
17,945,434 UART:
17,945,583 UART: [state] CFI Enabled
18,009,651 UART: [fht] FMC Alias Private Key: 7
19,776,027 UART: [art] Extend RT PCRs Done
19,777,251 UART: [art] Lock RT PCRs Done
19,779,117 UART: [art] Populate DV Done
19,784,482 UART: [fht] FMC Alias Private Key: 7
19,786,075 UART: [art] Derive CDI
19,786,894 UART: [art] Store in slot 0x4
19,843,048 UART: [art] Derive Key Pair
19,844,086 UART: [art] Store priv key in slot 0x5
22,307,191 UART: [art] Derive Key Pair - Done
22,320,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,032,557 UART: [art] Erasing AUTHORITY.KEYID = 7
24,034,066 UART: [art] PUB.X = 4DFE6E38A11CF646227DBE6E69415AB78F89D420AD4C1955AD6AE763BDC469FBCB268165F9B1D9C5370598C629B17417
24,041,325 UART: [art] PUB.Y = 2B6DE466607361A2531DCE1CCF9ADC14B89FCED70CFC25F447F00D78A1F3497D1E263E25D4057958B71272247E9FEBA9
24,048,614 UART: [art] SIG.R = A600C90D758292BF76F174B281520E1CA968556D279D4877213E572FCD1C021117C7D2F2FBA8CD34B351D44548DF5BB9
24,055,957 UART: [art] SIG.S = A6DB5E60D31871C900B6645344440E9259C63D4D22DCD6720F0E81B8ED4A4E23C8144DA762B712F7A7C0DA0C546EFD84
25,034,410 UART: mbox::rt_entry...
25,035,383 UART: ____ _ _ _ ____ _____
25,037,317 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,039,324 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,041,179 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,043,164 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,045,046 UART: |_|
25,045,872 UART:
25,177,009 UART: [rt] Runtime listening for mailbox commands...
25,179,151 >>> mbox cmd response data (48 bytes)
27,237,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,537,960 >>> mbox cmd response: success
34,538,521 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,573,403 UART:
34,573,693 UART: Running Caliptra FMC ...
34,574,722 UART:
34,574,869 UART: [state] CFI Enabled
34,662,426 UART: [art] Extend RT PCRs Done
34,663,615 UART: [art] Lock RT PCRs Done
34,665,113 UART: [art] Populate DV Done
34,670,955 UART: [fht] FMC Alias Private Key: 7
34,672,474 UART: [art] Derive CDI
34,673,212 UART: [art] Store in slot 0x4
34,731,409 UART: [art] Derive Key Pair
34,732,410 UART: [art] Store priv key in slot 0x5
37,195,427 UART: [art] Derive Key Pair - Done
37,208,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,920,406 UART: [art] Erasing AUTHORITY.KEYID = 7
38,921,915 UART: [art] PUB.X = EF50852A777D9CBF0AD08E2EF65BE18BC8D8604AFB59F145DF0658D225725F19ABAD55D231298CB29B3E4957A56AE207
38,929,169 UART: [art] PUB.Y = FD7E4682FF2FBC9ED015BCB945BB43C3CB6FBC56F5DA39D759AB246CD614ABEF19E866260512015627130DF04F0760D4
38,936,453 UART: [art] SIG.R = 5435794443F5B8941FCD01F6CBE173F0FF4CE880EECF3D2A8CC646BF55F6AE9280887C36E193A2F96A5165322AB927A6
38,943,850 UART: [art] SIG.S = F9B30CD01BD87284D0B5B5304C8CA3AB0101485381D964C0FDD00A3F2635CAF3442DE46FE078BCD1E649268B64B7CCF6
39,922,864 UART: Caliptra RT
39,923,580 UART: [state] CFI Enabled
40,343,521 UART: [rt] RT listening for mailbox commands...
40,375,440 UART: [rt]cmd =0x4d454153, len=108
40,394,253 >>> mbox cmd response data (12 bytes)
42,442,894 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
49,122,906 >>> mbox cmd response: success
51,171,240 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
51,275,970 UART:
51,276,342 UART: Running Caliptra FMC ...
51,277,389 UART:
51,277,537 UART: [state] CFI Enabled
51,278,423 UART: [art] Extend RT PCRs Done
51,279,589 UART: [art] Lock RT PCRs Done
51,280,767 UART: [art] Populate DV Done
51,281,742 UART: [fht] FMC Alias Private Key: 7
51,283,054 UART: [art] Derive CDI
51,283,784 UART: [art] Store in slot 0x4
51,284,759 UART: [art] Derive Key Pair
51,285,683 UART: [art] Store priv key in slot 0x5
51,785,732 UART: [art] Derive Key Pair - Done
51,798,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,511,831 UART: [art] Erasing AUTHORITY.KEYID = 7
53,513,345 UART: [art] PUB.X = 9B4A49F1F1FF151E61B2C938184D7EAD95E89560E0F99A5B37E581C6F411B2E583088D1FA90467B2508F27EDAE4DE621
53,520,604 UART: [art] PUB.Y = 1203E3C9892468D3890A8A658135351665FBDE9A1C6CAB299A447B440211316B02BB4568E41DFFF46C1E8B905F9C9188
53,527,834 UART: [art] SIG.R = DCF189DB99B8A06B10069CB0E77194A792F55CB50342931251EAEACE50CB75C03DF50A930FEF70B88E350CAF61C299AC
53,535,216 UART: [art] SIG.S = C3A42E91E829F5538947CD29D6F7BEEE1E680D99134D56AF25165BDFD20C6D0B848554A5C79C7B8B7A5150430EEEF566
54,513,051 UART: mbox::rt_entry...
54,514,031 UART: ____ _ _ _ ____ _____
54,515,978 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,517,984 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,519,838 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,521,760 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,523,606 UART: |_|
54,524,480 UART:
54,891,757 UART: [rt] Runtime listening for mailbox commands...
61,481,992 >>> mbox cmd response: success
61,482,377 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,516,260 UART:
61,516,516 UART: Running Caliptra FMC ...
61,517,619 UART:
61,517,775 UART: [state] CFI Enabled
61,624,543 UART: [art] Extend RT PCRs Done
61,625,733 UART: [art] Lock RT PCRs Done
61,627,188 UART: [art] Populate DV Done
61,632,612 UART: [fht] FMC Alias Private Key: 7
61,634,142 UART: [art] Derive CDI
61,634,907 UART: [art] Store in slot 0x4
61,694,071 UART: [art] Derive Key Pair
61,695,071 UART: [art] Store priv key in slot 0x5
64,157,694 UART: [art] Derive Key Pair - Done
64,170,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,883,845 UART: [art] Erasing AUTHORITY.KEYID = 7
65,885,350 UART: [art] PUB.X = 7B410A12B035504F5F2E4F1FBB4F812EC733121C81FD0786D5387FC1C30A9A1AC5B7139D297C0088B77DF5BA9390E9D6
65,892,609 UART: [art] PUB.Y = 6FE37379894BA60F4D146E642691346D9C054B35FCD6526E73B48B5803808118CDBE07D8E7CC7F024344D579A4F945AA
65,899,838 UART: [art] SIG.R = 6888959BC085D9FEBDCD4C4980B28B66EE60FFCFB1E667C838EF981CF21D17B1CE7F744BC5026089A49278E70B85CED9
65,907,222 UART: [art] SIG.S = 074A9AF29AA7960E8A029531FF4D5368D77827D3C511EC4FB06772BB693D2A1C7FE8D45334D2E6FDECE13D2341DDEFB5
66,885,882 UART: mbox::rt_entry...
66,886,842 UART: ____ _ _ _ ____ _____
66,888,828 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,890,899 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,892,847 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,894,772 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,896,705 UART: |_|
66,897,686 UART:
67,273,152 UART: [rt] Runtime listening for mailbox commands...
67,275,334 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.48s
Truncated 2373 bytes from beginning
2B4B8088EE01D6CD5710
10,552,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,160 UART: [ldev] --
10,580,687 UART: [fwproc] Wait for Commands...
10,583,275 UART: [fwproc] Recv command 0x46574c44
10,585,257 UART: [fwproc] Recv'd Img size: 82832 bytes
13,628,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,711,518 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,784,576 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,987,469 >>> mbox cmd response: success
13,988,002 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,992,202 UART: [afmc] ++
13,992,786 UART: [afmc] CDI.KEYID = 6
13,993,752 UART: [afmc] SUBJECT.KEYID = 7
13,994,971 UART: [afmc] AUTHORITY.KEYID = 5
16,502,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,224,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,226,459 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,242,366 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,258,396 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,273,924 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,298,505 UART: [afmc] --
18,303,086 UART: [cold-reset] --
18,307,227 UART: [state] Locking Datavault
18,313,232 UART: [state] Locking PCR0, PCR1 and PCR31
18,314,988 UART: [state] Locking ICCM
18,316,438 UART: [exit] Launching FMC @ 0x40000130
18,324,837 UART:
18,325,073 UART: Running Caliptra FMC ...
18,326,180 UART:
18,326,342 UART: [state] CFI Enabled
18,334,439 UART: [fht] FMC Alias Private Key: 7
20,100,458 UART: [art] Extend RT PCRs Done
20,101,882 UART: [art] Lock RT PCRs Done
20,103,483 UART: [art] Populate DV Done
20,108,880 UART: [fht] FMC Alias Private Key: 7
20,110,425 UART: [art] Derive CDI
20,111,191 UART: [art] Store in slot 0x4
20,154,172 UART: [art] Derive Key Pair
20,155,213 UART: [art] Store priv key in slot 0x5
22,582,218 UART: [art] Derive Key Pair - Done
22,595,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,301,765 UART: [art] Erasing AUTHORITY.KEYID = 7
24,303,263 UART: [art] PUB.X = 191323B954E4F59D557C602133F946FBC525531EE6C663EDEA6D80E241C3EC945532D0D83F43484E18C642983EC16CC7
24,310,507 UART: [art] PUB.Y = EA0C5A76A732BCF8A792EC8CE52B1E8075032A6AF51B0E2632CD8A7BFEF7694C1D5A2676E33D68E7B89215A086DC3F38
24,317,795 UART: [art] SIG.R = CBC4D8F5FB6BAEBC4CB5D6462F2C6398A8A9859679DAE6AB01A3A4454FA10A84D5074324C789F17562F07320F752A7BB
24,325,181 UART: [art] SIG.S = 271408424DBA88B6DE3F6BA28C84358E61C8165DF692EDB81E1DF78B2F1382B6CEA79B24A901D7BAB30D14C4B6733B37
25,303,951 UART: mbox::rt_entry...
25,304,914 UART: ____ _ _ _ ____ _____
25,306,845 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,308,847 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,310,702 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,312,632 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,314,681 UART: |_|
25,315,488 UART:
25,446,628 UART: [rt] Runtime listening for mailbox commands...
25,448,803 >>> mbox cmd response data (48 bytes)
27,513,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,663,841 UART:
27,664,225 UART: Running Caliptra ROM ...
27,665,363 UART:
27,665,554 UART: [state] CFI Enabled
27,678,044 UART: [state] LifecycleState = Unprovisioned
27,679,947 UART: [state] DebugLocked = No
27,682,738 UART: [state] WD Timer not started. Device not locked for debugging
27,686,101 UART: [kat] SHA2-256
27,865,786 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,876,591 UART: [kat] ++
27,877,053 UART: [kat] sha1
27,887,677 UART: [kat] SHA2-256
27,890,352 UART: [kat] SHA2-384
27,896,022 UART: [kat] SHA2-512-ACC
27,898,375 UART: [kat] ECC-384
30,343,461 UART: [kat] HMAC-384Kdf
30,356,034 UART: [kat] LMS
30,832,518 UART: [kat] --
30,836,724 UART: [update-reset] ++
34,333,070 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,337,258 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,734,869 >>> mbox cmd response: success
34,735,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,735,680 UART: [update-reset] Copying MAN_2 To MAN_1
34,772,751 UART: [update-reset Success] --
34,776,866 UART: [state] Locking Datavault
34,781,338 UART: [state] Locking PCR0, PCR1 and PCR31
34,783,110 UART: [state] Locking ICCM
34,784,189 UART: [exit] Launching FMC @ 0x40000130
34,792,586 UART:
34,792,826 UART: Running Caliptra FMC ...
34,793,903 UART:
34,794,059 UART: [state] CFI Enabled
34,837,603 UART: [art] Extend RT PCRs Done
34,838,751 UART: [art] Lock RT PCRs Done
34,840,204 UART: [art] Populate DV Done
34,845,528 UART: [fht] FMC Alias Private Key: 7
34,847,217 UART: [art] Derive CDI
34,848,044 UART: [art] Store in slot 0x4
34,890,914 UART: [art] Derive Key Pair
34,891,920 UART: [art] Store priv key in slot 0x5
37,318,744 UART: [art] Derive Key Pair - Done
37,332,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,037,836 UART: [art] Erasing AUTHORITY.KEYID = 7
39,039,340 UART: [art] PUB.X = A36731C5BF21B7AC9322414879C56EC411F69443FE03E32592BBADA83E850A9C5F97769BFC100F2707675A317A88A54A
39,046,591 UART: [art] PUB.Y = C441F8ACC8E301191DE53B9FE0485FD01256CEE7CE4B35A8B2A36241FA0B6A2EC18C7291A1498E2F705B494BA6AA7175
39,053,877 UART: [art] SIG.R = A596E704FE61517CE8965BB86D54BA4A84694D35395C7F37F3896226513FAD6533DA369FDE52B27E0428F5CAA893D3B5
39,061,294 UART: [art] SIG.S = 712024189715C4D1EE4781AE82AC42A242A47A7A5BD3DB46CD3600AE96A0CE03CCCBC808910AFAC86B11919889BE4FC7
40,039,871 UART: Caliptra RT
40,040,583 UART: [state] CFI Enabled
40,413,909 UART: [rt] RT listening for mailbox commands...
40,446,238 UART: [rt]cmd =0x4d454153, len=108
40,465,357 >>> mbox cmd response data (12 bytes)
42,511,525 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,617,483 UART:
42,617,852 UART: Running Caliptra ROM ...
42,618,987 UART:
42,619,159 UART: [state] CFI Enabled
42,635,046 UART: [state] LifecycleState = Unprovisioned
42,636,941 UART: [state] DebugLocked = No
42,638,699 UART: [state] WD Timer not started. Device not locked for debugging
42,643,002 UART: [kat] SHA2-256
42,822,685 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
42,833,476 UART: [kat] ++
42,833,976 UART: [kat] sha1
42,846,375 UART: [kat] SHA2-256
42,849,109 UART: [kat] SHA2-384
42,854,565 UART: [kat] SHA2-512-ACC
42,856,928 UART: [kat] ECC-384
45,295,307 UART: [kat] HMAC-384Kdf
45,308,725 UART: [kat] LMS
45,785,179 UART: [kat] --
45,790,306 UART: [update-reset] ++
48,839,825 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,842,994 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,115,603 >>> mbox cmd response: success
51,158,054 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
51,262,820 UART: [update-reset] Copying MAN_2 To MAN_1
51,264,521 UART: [update-reset Success] --
51,265,694 UART: [state] Locking Datavault
51,266,849 UART: [state] Locking PCR0, PCR1 and PCR31
51,268,385 UART: [state] Locking ICCM
51,269,313 UART: [exit] Launching FMC @ 0x40000130
51,270,738 UART:
51,270,906 UART: Running Caliptra FMC ...
51,272,012 UART:
51,272,173 UART: [state] CFI Enabled
51,273,091 UART: [art] Extend RT PCRs Done
51,274,233 UART: [art] Lock RT PCRs Done
51,275,301 UART: [art] Populate DV Done
51,276,331 UART: [fht] FMC Alias Private Key: 7
51,277,667 UART: [art] Derive CDI
51,278,408 UART: [art] Store in slot 0x4
51,279,465 UART: [art] Derive Key Pair
51,280,460 UART: [art] Store priv key in slot 0x5
51,699,264 UART: [art] Derive Key Pair - Done
51,712,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,419,100 UART: [art] Erasing AUTHORITY.KEYID = 7
53,420,608 UART: [art] PUB.X = 422BDBC8E340CC8C283E4EEB9432D8D7922337875271E0500332B388A20089B4B1EA347401AA0375DCB692C6D156EB30
53,427,871 UART: [art] PUB.Y = E814C49216FFE3B187F9018D08F1565708FDAD20BF9C3B6576D01AFE1C5101BD81AC09C972AB5356E91B327EC5EDD002
53,435,101 UART: [art] SIG.R = 49D554E068AE9FCABA8445E0FF74BA606FB9BF5ABFEE5347F5F2D678B22DBDCC2A76A326406D7C1B57800B4B6F3D40DD
53,442,543 UART: [art] SIG.S = E9A572E874C742FBEC201006A81C37002B525EB5491186AF0D8C2B671C4A02783B7E82ECB4C00C327EDD0B390AF3D8F7
54,420,216 UART: mbox::rt_entry...
54,421,182 UART: ____ _ _ _ ____ _____
54,423,166 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,425,176 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,427,106 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,429,056 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,430,999 UART: |_|
54,431,993 UART:
54,802,561 UART: [rt] Runtime listening for mailbox commands...
54,804,628 UART:
54,804,802 UART: Running Caliptra ROM ...
54,805,912 UART:
54,806,237 UART: [state] CFI Enabled
54,818,522 UART: [state] LifecycleState = Unprovisioned
54,820,402 UART: [state] DebugLocked = No
54,822,375 UART: [state] WD Timer not started. Device not locked for debugging
54,825,737 UART: [kat] SHA2-256
55,005,465 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
55,016,255 UART: [kat] ++
55,016,717 UART: [kat] sha1
55,028,634 UART: [kat] SHA2-256
55,031,346 UART: [kat] SHA2-384
55,035,987 UART: [kat] SHA2-512-ACC
55,038,340 UART: [kat] ECC-384
57,480,622 UART: [kat] HMAC-384Kdf
57,493,945 UART: [kat] LMS
57,970,424 UART: [kat] --
57,973,920 UART: [update-reset] ++
61,027,289 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,031,697 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
61,304,329 >>> mbox cmd response: success
61,304,702 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,304,992 UART: [update-reset] Copying MAN_2 To MAN_1
61,341,915 UART: [update-reset Success] --
61,345,321 UART: [state] Locking Datavault
61,348,201 UART: [state] Locking PCR0, PCR1 and PCR31
61,349,903 UART: [state] Locking ICCM
61,351,993 UART: [exit] Launching FMC @ 0x40000130
61,360,383 UART:
61,360,618 UART: Running Caliptra FMC ...
61,361,642 UART:
61,361,790 UART: [state] CFI Enabled
61,405,687 UART: [art] Extend RT PCRs Done
61,406,869 UART: [art] Lock RT PCRs Done
61,408,513 UART: [art] Populate DV Done
61,413,807 UART: [fht] FMC Alias Private Key: 7
61,415,400 UART: [art] Derive CDI
61,416,139 UART: [art] Store in slot 0x4
61,458,781 UART: [art] Derive Key Pair
61,459,780 UART: [art] Store priv key in slot 0x5
63,886,272 UART: [art] Derive Key Pair - Done
63,899,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,605,749 UART: [art] Erasing AUTHORITY.KEYID = 7
65,607,271 UART: [art] PUB.X = F8A04D00A0FF8C543B804499BFB9EF7C2841F15E388BC9FB2B1998C4BBCF58F8FE3EC4FB69C9E5155D42DD09A27A9C10
65,614,570 UART: [art] PUB.Y = E27912D4F547B9DD6F8EFC691B022126726027F4DF8BD60F2D8669C40F66BE9AD9992E664683C5F98BF479EC090B0955
65,621,790 UART: [art] SIG.R = 32C8D50B6BAE2FB02CADF05EE743B26B9C91256D7415CD52465294C70B2C6D86CAC6A22C20BAF5D1EFF0219A7A670E19
65,629,235 UART: [art] SIG.S = 41594399F9039677F7157FF4734F36D3ED2D124E5E1C72B761AD3AD42CC58745AC4A1B22FAB8DD35C98E8EDE2A3D153D
66,607,568 UART: mbox::rt_entry...
66,608,514 UART: ____ _ _ _ ____ _____
66,610,497 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,612,507 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,614,446 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,616,381 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,618,244 UART: |_|
66,619,048 UART:
66,988,702 UART: [rt] Runtime listening for mailbox commands...
66,990,903 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,773,879 ready_for_fw is high
3,774,548 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,861,630 >>> mbox cmd response: success
13,862,304 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,114,003 UART:
18,114,387 UART: Running Caliptra FMC ...
18,115,596 UART:
18,115,766 UART: [state] CFI Enabled
18,123,827 UART: [fht] FMC Alias Private Key: 7
19,889,739 UART: [art] Extend RT PCRs Done
19,890,953 UART: [art] Lock RT PCRs Done
19,892,635 UART: [art] Populate DV Done
19,898,127 UART: [fht] FMC Alias Private Key: 7
19,899,725 UART: [art] Derive CDI
19,900,540 UART: [art] Store in slot 0x4
19,943,246 UART: [art] Derive Key Pair
19,944,252 UART: [art] Store priv key in slot 0x5
22,371,449 UART: [art] Derive Key Pair - Done
22,384,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,090,625 UART: [art] Erasing AUTHORITY.KEYID = 7
24,092,148 UART: [art] PUB.X = 4B0F1458E232F332BF4A2F46DAE25B168E8F5EE0E868D055885BDC11DFD51DA45F29C2955BA49E9F469467CB0C3C99F5
24,099,413 UART: [art] PUB.Y = 938BF389772B8C9860C26E261132005208C06C12FFD3F7DB82F071866992B31AD3E344C496443630DFC67259F0A0CAF9
24,106,616 UART: [art] SIG.R = 466141CC14D88D1807D44E9F4C83F8EA6516CFD5A4D36E2A756FB5AF0D1EBCFBF8F134349AF5DF46E55CDF9B23BCD8B2
24,114,121 UART: [art] SIG.S = A9FFA8AA5E84C0B0F0885AFCDDD6D89EDD1F40103019609EC38FDB74CB3A1E45314A397F3E0B056467BC68603297C747
25,092,623 UART: mbox::rt_entry...
25,093,580 UART: ____ _ _ _ ____ _____
25,095,566 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,097,578 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,099,531 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,101,537 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,103,477 UART: |_|
25,104,282 UART:
25,235,618 UART: [rt] Runtime listening for mailbox commands...
25,237,794 >>> mbox cmd response data (48 bytes)
27,304,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,525,309 >>> mbox cmd response: success
34,525,874 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,559,322 UART:
34,559,639 UART: Running Caliptra FMC ...
34,560,765 UART:
34,560,925 UART: [state] CFI Enabled
34,604,520 UART: [art] Extend RT PCRs Done
34,605,711 UART: [art] Lock RT PCRs Done
34,607,249 UART: [art] Populate DV Done
34,612,548 UART: [fht] FMC Alias Private Key: 7
34,614,089 UART: [art] Derive CDI
34,614,827 UART: [art] Store in slot 0x4
34,657,368 UART: [art] Derive Key Pair
34,658,369 UART: [art] Store priv key in slot 0x5
37,084,929 UART: [art] Derive Key Pair - Done
37,098,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,804,590 UART: [art] Erasing AUTHORITY.KEYID = 7
38,806,093 UART: [art] PUB.X = 9D8028581715C4C227C97E82095C3A4B57D3957D8C7F6D27F658CC90838B4E790C7F2A12A8987F5EAF76DD919DAB397B
38,813,358 UART: [art] PUB.Y = BBAFC804B2BAB9B48FD91123CB83A2B7A419F696C3F3A123F4BE40CE5281C2E55E20F4D0D0261DE5648292AF4E45B6CA
38,820,625 UART: [art] SIG.R = 131A0BE700873209BAEC7709A87896015AFE7AE603E46DC52C4E62FDBBC28582254698C6007B8E0EE3D74FDF4D329D90
38,828,178 UART: [art] SIG.S = EE756F482C615574D56C577E7EE4A27A8D3CA355DD4A1938035AAF4FE9952DBADE8FB1C09EB34AC714C59094EE473779
39,807,353 UART: Caliptra RT
39,808,072 UART: [state] CFI Enabled
40,177,553 UART: [rt] RT listening for mailbox commands...
40,209,716 UART: [rt]cmd =0x4d454153, len=108
40,229,117 >>> mbox cmd response data (12 bytes)
42,275,215 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
48,877,322 >>> mbox cmd response: success
50,949,326 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
51,054,048 UART:
51,054,411 UART: Running Caliptra FMC ...
51,055,551 UART:
51,055,731 UART: [state] CFI Enabled
51,056,659 UART: [art] Extend RT PCRs Done
51,057,804 UART: [art] Lock RT PCRs Done
51,058,880 UART: [art] Populate DV Done
51,059,878 UART: [fht] FMC Alias Private Key: 7
51,061,205 UART: [art] Derive CDI
51,061,952 UART: [art] Store in slot 0x4
51,063,018 UART: [art] Derive Key Pair
51,063,967 UART: [art] Store priv key in slot 0x5
51,439,270 UART: [art] Derive Key Pair - Done
51,452,091 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,158,372 UART: [art] Erasing AUTHORITY.KEYID = 7
53,159,881 UART: [art] PUB.X = A24540EED56BF2A4BFC3117001441F7DC9C906A767CCED54428149683954A4E5AD9E404A1A5B75868F70A810FBA5D97A
53,167,151 UART: [art] PUB.Y = F247A2F16CD3FEC3636C9EA4AD262A81F8EE5FC27E737F9E21227B51037B86CBCFA614158E03467CAA3F069F4A59299A
53,174,396 UART: [art] SIG.R = 06A3CF36E258E463ABF1DF763D81497E5EE7582FD4F17185AACCB4999436B10C29B568AEC5BBC1773764C10EF867FB6B
53,181,798 UART: [art] SIG.S = DA0C1D293C01A645B609F82D4384E3EE0EFE500CD5FA3B776ED491D15B8847AB87ACDF6C2A8336B4E7D94813B0340AEC
54,160,870 UART: mbox::rt_entry...
54,161,808 UART: ____ _ _ _ ____ _____
54,163,791 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,165,794 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,167,732 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,169,673 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,171,527 UART: |_|
54,172,410 UART:
54,549,959 UART: [rt] Runtime listening for mailbox commands...
61,059,625 >>> mbox cmd response: success
61,060,009 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,092,813 UART:
61,093,109 UART: Running Caliptra FMC ...
61,094,171 UART:
61,094,325 UART: [state] CFI Enabled
61,138,893 UART: [art] Extend RT PCRs Done
61,140,042 UART: [art] Lock RT PCRs Done
61,141,797 UART: [art] Populate DV Done
61,147,473 UART: [fht] FMC Alias Private Key: 7
61,149,096 UART: [art] Derive CDI
61,149,843 UART: [art] Store in slot 0x4
61,192,624 UART: [art] Derive Key Pair
61,193,624 UART: [art] Store priv key in slot 0x5
63,620,513 UART: [art] Derive Key Pair - Done
63,633,299 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,339,366 UART: [art] Erasing AUTHORITY.KEYID = 7
65,340,863 UART: [art] PUB.X = CE02BFEEC732D67946A7639CD0B6FEE132746E11EA41B9B65420B3502E7F1EC8ECBB737431DB583C35424CC11E3F96BE
65,348,171 UART: [art] PUB.Y = BB324958EDC57FB0CBA4D09357DAC189DD3E278760042EE1A6F080FFB73375966E41691FE48EAA74DE922C824A1325E4
65,355,409 UART: [art] SIG.R = E1A1FC5D27F80654771244828DA4E8B1DFF7B218FE5D95EEBC06F65A5F4695C655011497D9616EE2B9A8AFF23385A70A
65,362,833 UART: [art] SIG.S = D116B4B3529FD6778C53232FEEB1334007518EE4824AC63DB31EFC692822D06F40EA42E442125F2694AF633F66AD9C79
66,341,090 UART: mbox::rt_entry...
66,342,055 UART: ____ _ _ _ ____ _____
66,344,053 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,346,108 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,348,192 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,350,144 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,352,086 UART: |_|
66,353,097 UART:
66,720,939 UART: [rt] Runtime listening for mailbox commands...
66,723,107 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.45s
Truncated 2373 bytes from beginning
2B4B8088EE01D6CD5710
10,387,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,419 UART: [ldev] --
10,412,585 UART: [fwproc] Wait for Commands...
10,415,647 UART: [fwproc] Recv command 0x46574c44
10,417,966 UART: [fwproc] Recv'd Img size: 82832 bytes
13,470,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,547,810 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,671,580 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,016,651 >>> mbox cmd response: success
14,017,187 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
14,019,942 UART: [afmc] ++
14,020,635 UART: [afmc] CDI.KEYID = 6
14,021,818 UART: [afmc] SUBJECT.KEYID = 7
14,023,306 UART: [afmc] AUTHORITY.KEYID = 5
16,553,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,274,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,276,570 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,291,684 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,306,833 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,321,742 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,345,146 UART: [afmc] --
18,349,008 UART: [cold-reset] --
18,353,411 UART: [state] Locking Datavault
18,360,383 UART: [state] Locking PCR0, PCR1 and PCR31
18,362,564 UART: [state] Locking ICCM
18,365,092 UART: [exit] Launching FMC @ 0x40000130
18,373,738 UART:
18,373,974 UART: Running Caliptra FMC ...
18,375,077 UART:
18,375,236 UART: [state] CFI Enabled
18,431,843 UART: [fht] FMC Alias Private Key: 7
20,198,740 UART: [art] Extend RT PCRs Done
20,199,956 UART: [art] Lock RT PCRs Done
20,202,252 UART: [art] Populate DV Done
20,207,715 UART: [fht] FMC Alias Private Key: 7
20,209,195 UART: [art] Derive CDI
20,209,924 UART: [art] Store in slot 0x4
20,264,576 UART: [art] Derive Key Pair
20,265,620 UART: [art] Store priv key in slot 0x5
22,728,229 UART: [art] Derive Key Pair - Done
22,741,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,454,152 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,678 UART: [art] PUB.X = 816D96E264DB511B115A7FF3B225BA61E3FADB2161FF620FF513D80805EAA0E3C5980193B5E98FBE5690B456D5E20B55
24,462,954 UART: [art] PUB.Y = FBFC66BC9775035C29DF37B8160D479E5726B783EE0721CCCF256FB5AD317C30879C3EB551D52A8F35048D14C61A7EF7
24,470,216 UART: [art] SIG.R = 6BB109E5F56B6F21C9E1362DD6292B3ABCCCD1F8D682517AF4A84250FE12C90588A367DEBEB48199D7482810AF15D0D4
24,477,609 UART: [art] SIG.S = 5F355CF67A7400154C07FD924AA0E1C29C4504ABED12DEF2751C3AF60B962818DBB451EA0CB85EF08719213DFAEF4EDE
25,456,401 UART: mbox::rt_entry...
25,457,354 UART: ____ _ _ _ ____ _____
25,459,332 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,461,335 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,463,264 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,465,190 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,467,114 UART: |_|
25,468,089 UART:
25,599,823 UART: [rt] Runtime listening for mailbox commands...
25,601,995 >>> mbox cmd response data (48 bytes)
27,667,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,817,693 UART:
27,818,072 UART: Running Caliptra ROM ...
27,819,131 UART:
27,819,281 UART: [state] CFI Enabled
27,885,397 UART: [state] LifecycleState = Unprovisioned
27,887,499 UART: [state] DebugLocked = No
27,888,801 UART: [state] WD Timer not started. Device not locked for debugging
27,894,216 UART: [kat] SHA2-256
28,084,090 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,094,831 UART: [kat] ++
28,095,289 UART: [kat] sha1
28,107,438 UART: [kat] SHA2-256
28,110,451 UART: [kat] SHA2-384
28,116,757 UART: [kat] SHA2-512-ACC
28,119,325 UART: [kat] ECC-384
30,570,473 UART: [kat] HMAC-384Kdf
30,594,427 UART: [kat] LMS
31,125,997 UART: [kat] --
31,129,232 UART: [update-reset] ++
34,631,573 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,635,249 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,264,989 >>> mbox cmd response: success
35,265,400 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,266,688 UART: [update-reset] Copying MAN_2 To MAN_1
35,304,245 UART: [update-reset Success] --
35,308,135 UART: [state] Locking Datavault
35,311,172 UART: [state] Locking PCR0, PCR1 and PCR31
35,313,381 UART: [state] Locking ICCM
35,315,532 UART: [exit] Launching FMC @ 0x40000130
35,324,195 UART:
35,324,427 UART: Running Caliptra FMC ...
35,325,528 UART:
35,325,681 UART: [state] CFI Enabled
35,427,081 UART: [art] Extend RT PCRs Done
35,428,276 UART: [art] Lock RT PCRs Done
35,429,705 UART: [art] Populate DV Done
35,435,277 UART: [fht] FMC Alias Private Key: 7
35,436,801 UART: [art] Derive CDI
35,437,539 UART: [art] Store in slot 0x4
35,496,493 UART: [art] Derive Key Pair
35,497,492 UART: [art] Store priv key in slot 0x5
37,959,806 UART: [art] Derive Key Pair - Done
37,972,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,686,019 UART: [art] Erasing AUTHORITY.KEYID = 7
39,687,527 UART: [art] PUB.X = 7F1A336B735529D8929879C632715527903546FA89ADAB82D740DE64C06C7CAB7E053449058D09F6C46CEC915A016830
39,694,756 UART: [art] PUB.Y = 3A3CD05B65A3228A71FF260337E117EB07266EDCE41F9FB647EFCA26D474AE4142998C197B5046C67F9F65FE76E7CD24
39,702,015 UART: [art] SIG.R = 42C970EFD7384A6B7F48E418EA7B5FF90D03DA3E02FCCEF516B89A9016199624EEB7375E5BF400168940E8CEDD6CAD00
39,709,380 UART: [art] SIG.S = D19E5407B94B3BA48BED6556AC921A95DE31A9953D7A8A2DEE09DB96C098EB771ABF3EDC05BAA0B8C1882067A87B402A
40,688,337 UART: Caliptra RT
40,689,042 UART: [state] CFI Enabled
41,105,037 UART: [rt] RT listening for mailbox commands...
41,136,900 UART: [rt]cmd =0x4d454153, len=108
41,155,811 >>> mbox cmd response data (12 bytes)
43,206,805 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,312,483 UART:
43,312,855 UART: Running Caliptra ROM ...
43,313,903 UART:
43,314,071 UART: [state] CFI Enabled
43,377,181 UART: [state] LifecycleState = Unprovisioned
43,379,280 UART: [state] DebugLocked = No
43,381,612 UART: [state] WD Timer not started. Device not locked for debugging
43,386,869 UART: [kat] SHA2-256
43,576,689 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,587,480 UART: [kat] ++
43,587,932 UART: [kat] sha1
43,598,304 UART: [kat] SHA2-256
43,601,297 UART: [kat] SHA2-384
43,607,623 UART: [kat] SHA2-512-ACC
43,610,243 UART: [kat] ECC-384
46,060,421 UART: [kat] HMAC-384Kdf
46,082,527 UART: [kat] LMS
46,614,097 UART: [kat] --
46,617,436 UART: [update-reset] ++
49,691,388 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,693,898 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
50,109,327 >>> mbox cmd response: success
52,159,582 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,264,408 UART: [update-reset] Copying MAN_2 To MAN_1
52,266,128 UART: [update-reset Success] --
52,267,210 UART: [state] Locking Datavault
52,268,317 UART: [state] Locking PCR0, PCR1 and PCR31
52,269,860 UART: [state] Locking ICCM
52,270,765 UART: [exit] Launching FMC @ 0x40000130
52,272,192 UART:
52,272,351 UART: Running Caliptra FMC ...
52,273,446 UART:
52,273,618 UART: [state] CFI Enabled
52,274,537 UART: [art] Extend RT PCRs Done
52,275,670 UART: [art] Lock RT PCRs Done
52,276,733 UART: [art] Populate DV Done
52,277,756 UART: [fht] FMC Alias Private Key: 7
52,279,068 UART: [art] Derive CDI
52,279,810 UART: [art] Store in slot 0x4
52,280,865 UART: [art] Derive Key Pair
52,281,853 UART: [art] Store priv key in slot 0x5
52,806,418 UART: [art] Derive Key Pair - Done
52,819,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,532,106 UART: [art] Erasing AUTHORITY.KEYID = 7
54,533,615 UART: [art] PUB.X = 7C9CA767157080D71CE3DDB69F8EDC2C4D9A782441E9C42BE188850ED92EC97DA3EB9B1FA872BEE2205E8F603DCE5DE4
54,540,903 UART: [art] PUB.Y = ED0CA2C9791E5CCC9F94E3E1CD5043FA54313C4D9381460CE4E19F3D8AB019ED3F437ABC3A3862A5CD124A4D5FC7F148
54,548,208 UART: [art] SIG.R = ED065ED2C953D85E82AD8BA4C15CAABC04BBB5F216417DA6F91B14001B056C63A9DE595CFBECF168D4025E8C2F116A91
54,555,597 UART: [art] SIG.S = 59FB963D0D6FA367D0589A2000032E5A21E9FB16E775784CC7F29B9B56DCF5353A5ADD5E335A648658CA279575F692E8
55,534,102 UART: mbox::rt_entry...
55,535,080 UART: ____ _ _ _ ____ _____
55,537,072 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,539,083 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,541,023 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,542,960 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,544,887 UART: |_|
55,545,726 UART:
55,918,649 UART: [rt] Runtime listening for mailbox commands...
55,920,768 UART:
55,920,934 UART: Running Caliptra ROM ...
55,922,039 UART:
55,922,196 UART: [state] CFI Enabled
55,977,616 UART: [state] LifecycleState = Unprovisioned
55,979,651 UART: [state] DebugLocked = No
55,982,371 UART: [state] WD Timer not started. Device not locked for debugging
55,986,345 UART: [kat] SHA2-256
56,176,187 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
56,186,978 UART: [kat] ++
56,187,429 UART: [kat] sha1
56,199,231 UART: [kat] SHA2-256
56,202,195 UART: [kat] SHA2-384
56,208,233 UART: [kat] SHA2-512-ACC
56,210,790 UART: [kat] ECC-384
58,663,851 UART: [kat] HMAC-384Kdf
58,687,037 UART: [kat] LMS
59,218,585 UART: [kat] --
59,222,732 UART: [update-reset] ++
62,291,934 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
62,294,768 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
62,710,204 >>> mbox cmd response: success
62,710,579 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,710,889 UART: [update-reset] Copying MAN_2 To MAN_1
62,748,212 UART: [update-reset Success] --
62,751,051 UART: [state] Locking Datavault
62,755,280 UART: [state] Locking PCR0, PCR1 and PCR31
62,757,409 UART: [state] Locking ICCM
62,760,368 UART: [exit] Launching FMC @ 0x40000130
62,768,987 UART:
62,769,220 UART: Running Caliptra FMC ...
62,770,315 UART:
62,770,471 UART: [state] CFI Enabled
62,857,045 UART: [art] Extend RT PCRs Done
62,858,232 UART: [art] Lock RT PCRs Done
62,859,573 UART: [art] Populate DV Done
62,864,978 UART: [fht] FMC Alias Private Key: 7
62,866,674 UART: [art] Derive CDI
62,867,487 UART: [art] Store in slot 0x4
62,925,863 UART: [art] Derive Key Pair
62,926,904 UART: [art] Store priv key in slot 0x5
65,389,467 UART: [art] Derive Key Pair - Done
65,402,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,116,032 UART: [art] Erasing AUTHORITY.KEYID = 7
67,117,547 UART: [art] PUB.X = A5565F26802EF666443F8B7AE3001342411C608D7A1075C9F91870AF320ABCD0058DA261ED6F0EA7E87082123D5C2398
67,124,770 UART: [art] PUB.Y = E53C0AB2AF68C43BDC2EDA84FE19FAAC59360CE917B948246C635ACBF94CD3E0BA693E7D4A93BB1718EF98D5E5567382
67,132,079 UART: [art] SIG.R = 109632219A1A4B4CE10E2AEC6EBA76AE2956D9242A73EEDBBA908A16297C4A2FB3B99E57917EB6AB7F852F838C34F165
67,139,443 UART: [art] SIG.S = 8295ACC746F4544E2FDED0AA47CC044E3F01AF7828A94579F06A02FF9ADF6437BD33DA6BE28E8FA202C60244A342D4CB
68,118,446 UART: mbox::rt_entry...
68,119,410 UART: ____ _ _ _ ____ _____
68,121,335 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,123,334 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,125,187 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,127,105 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,128,984 UART: |_|
68,129,829 UART:
68,499,116 UART: [rt] Runtime listening for mailbox commands...
68,501,342 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,439,752 ready_for_fw is high
3,440,254 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,047,398 >>> mbox cmd response: success
14,047,992 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,345,712 UART:
18,346,085 UART: Running Caliptra FMC ...
18,347,209 UART:
18,347,364 UART: [state] CFI Enabled
18,411,600 UART: [fht] FMC Alias Private Key: 7
20,178,223 UART: [art] Extend RT PCRs Done
20,179,451 UART: [art] Lock RT PCRs Done
20,181,265 UART: [art] Populate DV Done
20,186,624 UART: [fht] FMC Alias Private Key: 7
20,188,268 UART: [art] Derive CDI
20,189,082 UART: [art] Store in slot 0x4
20,244,593 UART: [art] Derive Key Pair
20,245,633 UART: [art] Store priv key in slot 0x5
22,708,946 UART: [art] Derive Key Pair - Done
22,722,366 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,434,916 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,431 UART: [art] PUB.X = 729D790CEF8A40E94849E056B655AF07D685E2EC98F1E18602713F632B3FEC57569791DE2C0E53A9A3C89125D0CE802A
24,443,645 UART: [art] PUB.Y = 8F200ABF6755DB21E25ACBA4AB743AA833F75428669023A266DC8AB2EDDA63B3479B587B5EB42DE81D8245C0938A340F
24,450,924 UART: [art] SIG.R = BEA1186D37CC288B913EE682399A9C84DF5F50D9CAA8C15808486C81D7BE4E7474A68153DD3BF3075B1341F2B9D8B32D
24,458,338 UART: [art] SIG.S = 0FEDF5C58D1B76025AED8E0F603FACAD3F655AFCB06B4EEE75EBEE40A5473782FDCE09EED8BBC9B9B01CD477A734EDC7
25,437,059 UART: mbox::rt_entry...
25,438,028 UART: ____ _ _ _ ____ _____
25,439,934 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,441,938 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,443,871 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,445,853 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,447,788 UART: |_|
25,448,640 UART:
25,580,339 UART: [rt] Runtime listening for mailbox commands...
25,582,514 >>> mbox cmd response data (48 bytes)
27,646,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,564,040 >>> mbox cmd response: success
35,564,647 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,599,547 UART:
35,599,885 UART: Running Caliptra FMC ...
35,600,926 UART:
35,601,079 UART: [state] CFI Enabled
35,704,425 UART: [art] Extend RT PCRs Done
35,705,614 UART: [art] Lock RT PCRs Done
35,707,126 UART: [art] Populate DV Done
35,712,806 UART: [fht] FMC Alias Private Key: 7
35,714,394 UART: [art] Derive CDI
35,715,219 UART: [art] Store in slot 0x4
35,773,317 UART: [art] Derive Key Pair
35,774,353 UART: [art] Store priv key in slot 0x5
38,236,768 UART: [art] Derive Key Pair - Done
38,249,629 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,963,236 UART: [art] Erasing AUTHORITY.KEYID = 7
39,964,734 UART: [art] PUB.X = F10AADA686233F4E151B4F33761298BF9621F052D4F6054C160BC6731904D8B0A23C717D480928EE7E5782E3979D16A6
39,971,994 UART: [art] PUB.Y = 8827363CFAEFC63E7A551027420B1A2944DCF7E9C42648095D19E9A6150C2DE4EE036744A0E41E34AE2CA9520982D7AE
39,979,231 UART: [art] SIG.R = CEF4D6693CFE96A853A4BBB6C96BBBE83CEAE01FF1B384A72D1157E2A5E5852A9AA1115545374CD11B75BB6B5FBCCC2C
39,986,633 UART: [art] SIG.S = 668B3587DF15889EC0810D248C254DC3561F3B2D31A752009E5A3C15D098EA37C44AC1EC511D96D409C854898CD07B7E
40,965,525 UART: Caliptra RT
40,966,241 UART: [state] CFI Enabled
41,392,394 UART: [rt] RT listening for mailbox commands...
41,424,634 UART: [rt]cmd =0x4d454153, len=108
41,443,499 >>> mbox cmd response data (12 bytes)
43,494,992 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,608,067 >>> mbox cmd response: success
52,658,025 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,762,710 UART:
52,763,071 UART: Running Caliptra FMC ...
52,764,122 UART:
52,764,273 UART: [state] CFI Enabled
52,765,143 UART: [art] Extend RT PCRs Done
52,766,287 UART: [art] Lock RT PCRs Done
52,767,359 UART: [art] Populate DV Done
52,768,309 UART: [fht] FMC Alias Private Key: 7
52,769,618 UART: [art] Derive CDI
52,770,347 UART: [art] Store in slot 0x4
52,771,323 UART: [art] Derive Key Pair
52,772,308 UART: [art] Store priv key in slot 0x5
53,277,377 UART: [art] Derive Key Pair - Done
53,290,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,003,424 UART: [art] Erasing AUTHORITY.KEYID = 7
55,004,945 UART: [art] PUB.X = B384E4C7827AEEDF0C4863D94EC8C76FF9525B93A8A59356AF373932FFE30AAD9A32D63C20657366F4DF9C986FBF9472
55,012,220 UART: [art] PUB.Y = 9AC59B145E8BE3F94BD114E85E5D65FB072BE9570C0985B25327789F1B6383449203E59112A11769570782A83F98B5C0
55,019,459 UART: [art] SIG.R = EB212F3A530AA61BD26AE9CE0C941EF083F5444B0714625C9B934173B15F43F140FCE26A150240E9C6FB7FC31F92CFAE
55,026,852 UART: [art] SIG.S = 653DD3E60EC5FB70A57DE9D831AC6882DB960C0929090DBA69D387E0D16D9EFAE7306A3692816213451DA7D2E809EEBB
56,005,515 UART: mbox::rt_entry...
56,006,461 UART: ____ _ _ _ ____ _____
56,008,393 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
56,010,401 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
56,012,260 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
56,014,186 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
56,016,072 UART: |_|
56,016,900 UART:
56,390,951 UART: [rt] Runtime listening for mailbox commands...
63,384,165 >>> mbox cmd response: success
63,384,558 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
63,420,491 UART:
63,420,757 UART: Running Caliptra FMC ...
63,421,790 UART:
63,421,939 UART: [state] CFI Enabled
63,523,463 UART: [art] Extend RT PCRs Done
63,524,662 UART: [art] Lock RT PCRs Done
63,525,833 UART: [art] Populate DV Done
63,531,403 UART: [fht] FMC Alias Private Key: 7
63,532,988 UART: [art] Derive CDI
63,533,726 UART: [art] Store in slot 0x4
63,592,352 UART: [art] Derive Key Pair
63,593,396 UART: [art] Store priv key in slot 0x5
66,056,346 UART: [art] Derive Key Pair - Done
66,069,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,781,063 UART: [art] Erasing AUTHORITY.KEYID = 7
67,782,583 UART: [art] PUB.X = EDC8D0CDC345A886B4890D5DC418A2339538C116098A2DFA52DD4283A5DCA5A8AAC8FDAD3FC557C3A186FE47979B555F
67,789,850 UART: [art] PUB.Y = 965D4BAB30B8CBC36CE8F41D7C2E3B94B8FE81D3B72D04A664CE05158BF349A94B0F7DF2B0F9D04F673320C156F54C81
67,797,140 UART: [art] SIG.R = 97CA46E5CA0A3FC2074EDF6528BE6689289021E48B8E81F5BAFF2DB4DD34579BEF6D17A4CDBDE27D071675F7CAEF7AE1
67,804,540 UART: [art] SIG.S = 2CAF553FF8A6F4C84106186D77910B4F432B512DE9C385563FCA07459DF3DDCACF2E70A4F3717C8D410FC19BFC3F084D
68,783,452 UART: mbox::rt_entry...
68,784,459 UART: ____ _ _ _ ____ _____
68,786,554 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,788,629 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,790,676 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,792,809 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,794,673 UART: |_|
68,795,473 UART:
69,161,266 UART: [rt] Runtime listening for mailbox commands...
69,163,441 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
Truncated 2373 bytes from beginning
2B4B8088EE01D6CD5710
10,613,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,866 UART: [ldev] --
10,639,134 UART: [fwproc] Wait for Commands...
10,641,076 UART: [fwproc] Recv command 0x46574c44
10,643,392 UART: [fwproc] Recv'd Img size: 82832 bytes
13,708,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,788,580 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,912,187 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,258,486 >>> mbox cmd response: success
14,258,995 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
14,262,280 UART: [afmc] ++
14,262,973 UART: [afmc] CDI.KEYID = 6
14,264,140 UART: [afmc] SUBJECT.KEYID = 7
14,265,632 UART: [afmc] AUTHORITY.KEYID = 5
16,769,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,488,756 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,490,690 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,505,794 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,520,934 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,535,855 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,559,289 UART: [afmc] --
18,563,206 UART: [cold-reset] --
18,566,866 UART: [state] Locking Datavault
18,572,483 UART: [state] Locking PCR0, PCR1 and PCR31
18,574,692 UART: [state] Locking ICCM
18,576,419 UART: [exit] Launching FMC @ 0x40000130
18,585,098 UART:
18,585,339 UART: Running Caliptra FMC ...
18,586,438 UART:
18,586,599 UART: [state] CFI Enabled
18,594,164 UART: [fht] FMC Alias Private Key: 7
20,360,429 UART: [art] Extend RT PCRs Done
20,361,672 UART: [art] Lock RT PCRs Done
20,363,379 UART: [art] Populate DV Done
20,368,736 UART: [fht] FMC Alias Private Key: 7
20,370,284 UART: [art] Derive CDI
20,371,054 UART: [art] Store in slot 0x4
20,413,814 UART: [art] Derive Key Pair
20,414,856 UART: [art] Store priv key in slot 0x5
22,841,536 UART: [art] Derive Key Pair - Done
22,854,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,560,799 UART: [art] Erasing AUTHORITY.KEYID = 7
24,562,308 UART: [art] PUB.X = FC0A80A0E0BCF5E9F930964C04E5ACE655C6E473D4C9BB64729D2CA294BDBBF95D56685C506476A83AABBF4F9A273724
24,569,594 UART: [art] PUB.Y = C448D3A63ABD4994C3D6CB4192DC85323BC08CC2A9BAFD374BF149CEA9E24458403B5BE840FD4595A436175ACDC46E44
24,576,852 UART: [art] SIG.R = BA4CD11F3B06ECB6906227DC1DA37EB8792C88B879E9B111BCAB52A3DC1C510F7BD3730F7B6B1BC34C99C1A5978C6E50
24,584,280 UART: [art] SIG.S = 2A3B28D105866235A476F829B458C9F8131432C0FC7D797DB3159E1E0043AEB8CE64DC9EA42BC76D6B6C881FF7A4846D
25,562,617 UART: mbox::rt_entry...
25,563,581 UART: ____ _ _ _ ____ _____
25,565,597 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,567,608 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,569,543 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,571,481 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,573,339 UART: |_|
25,574,226 UART:
25,704,183 UART: [rt] Runtime listening for mailbox commands...
25,706,358 >>> mbox cmd response data (48 bytes)
27,775,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,925,246 UART:
27,925,628 UART: Running Caliptra ROM ...
27,926,882 UART:
27,927,067 UART: [state] CFI Enabled
27,941,519 UART: [state] LifecycleState = Unprovisioned
27,943,372 UART: [state] DebugLocked = No
27,945,761 UART: [state] WD Timer not started. Device not locked for debugging
27,950,180 UART: [kat] SHA2-256
28,140,070 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,150,784 UART: [kat] ++
28,151,382 UART: [kat] sha1
28,164,008 UART: [kat] SHA2-256
28,167,032 UART: [kat] SHA2-384
28,171,493 UART: [kat] SHA2-512-ACC
28,174,082 UART: [kat] ECC-384
30,616,636 UART: [kat] HMAC-384Kdf
30,630,653 UART: [kat] LMS
31,162,286 UART: [kat] --
31,167,192 UART: [update-reset] ++
34,687,320 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,690,921 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,320,652 >>> mbox cmd response: success
35,321,073 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,321,496 UART: [update-reset] Copying MAN_2 To MAN_1
35,358,965 UART: [update-reset Success] --
35,363,856 UART: [state] Locking Datavault
35,369,041 UART: [state] Locking PCR0, PCR1 and PCR31
35,371,288 UART: [state] Locking ICCM
35,374,133 UART: [exit] Launching FMC @ 0x40000130
35,382,809 UART:
35,383,043 UART: Running Caliptra FMC ...
35,384,073 UART:
35,384,227 UART: [state] CFI Enabled
35,428,403 UART: [art] Extend RT PCRs Done
35,429,550 UART: [art] Lock RT PCRs Done
35,431,135 UART: [art] Populate DV Done
35,436,428 UART: [fht] FMC Alias Private Key: 7
35,437,967 UART: [art] Derive CDI
35,438,731 UART: [art] Store in slot 0x4
35,481,282 UART: [art] Derive Key Pair
35,482,321 UART: [art] Store priv key in slot 0x5
37,909,154 UART: [art] Derive Key Pair - Done
37,922,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,629,617 UART: [art] Erasing AUTHORITY.KEYID = 7
39,631,104 UART: [art] PUB.X = D0ED2DA65B76CD0C7E52B5132ADB7BBDFDF12AE49F2CE4B3414090D329A6387721E258A30904762E4EF3BAEF9384EBF5
39,638,422 UART: [art] PUB.Y = 8467FD3C82CADF13BD7FB4DA473F5012E13F54369E92DFE7211D494F2E9D3CB5D0C80B119DF8824E454C19A26B16DDF9
39,645,667 UART: [art] SIG.R = DB665E2940B77DC5CE88FA0EE6AE508EF59209309F2E6D02E484D105858987168FD5FB048EB125E49FF4A6825827EB55
39,653,083 UART: [art] SIG.S = BC5E549A3BA33AFF31587BF499F9678D7A8CE26C574ACF9753FE368F25C265FA4BC7ED22FA4932B4F9C03B3E8EF539A5
40,631,875 UART: Caliptra RT
40,632,611 UART: [state] CFI Enabled
41,006,063 UART: [rt] RT listening for mailbox commands...
41,038,306 UART: [rt]cmd =0x4d454153, len=108
41,057,022 >>> mbox cmd response data (12 bytes)
43,115,020 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,221,296 UART:
43,221,654 UART: Running Caliptra ROM ...
43,222,752 UART:
43,222,914 UART: [state] CFI Enabled
43,234,337 UART: [state] LifecycleState = Unprovisioned
43,236,184 UART: [state] DebugLocked = No
43,238,369 UART: [state] WD Timer not started. Device not locked for debugging
43,242,254 UART: [kat] SHA2-256
43,432,099 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,442,885 UART: [kat] ++
43,443,402 UART: [kat] sha1
43,455,050 UART: [kat] SHA2-256
43,458,064 UART: [kat] SHA2-384
43,463,216 UART: [kat] SHA2-512-ACC
43,465,848 UART: [kat] ECC-384
45,906,549 UART: [kat] HMAC-384Kdf
45,919,922 UART: [kat] LMS
46,451,554 UART: [kat] --
46,455,289 UART: [update-reset] ++
49,533,633 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,537,163 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,952,599 >>> mbox cmd response: success
52,003,683 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,108,470 UART: [update-reset] Copying MAN_2 To MAN_1
52,110,167 UART: [update-reset Success] --
52,111,332 UART: [state] Locking Datavault
52,112,479 UART: [state] Locking PCR0, PCR1 and PCR31
52,114,019 UART: [state] Locking ICCM
52,114,952 UART: [exit] Launching FMC @ 0x40000130
52,116,381 UART:
52,116,552 UART: Running Caliptra FMC ...
52,117,654 UART:
52,117,815 UART: [state] CFI Enabled
52,118,735 UART: [art] Extend RT PCRs Done
52,119,872 UART: [art] Lock RT PCRs Done
52,120,940 UART: [art] Populate DV Done
52,121,969 UART: [fht] FMC Alias Private Key: 7
52,123,286 UART: [art] Derive CDI
52,124,046 UART: [art] Store in slot 0x4
52,125,112 UART: [art] Derive Key Pair
52,126,059 UART: [art] Store priv key in slot 0x5
52,539,540 UART: [art] Derive Key Pair - Done
52,552,544 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,258,792 UART: [art] Erasing AUTHORITY.KEYID = 7
54,260,280 UART: [art] PUB.X = FAE06E25F50DF033061CC361B77E00A5BC4298ADCCD3743E735C0C1F24671F1B5CF502732D9FBA759FF67922088B2501
54,267,540 UART: [art] PUB.Y = 368A2A60146B4AFE7CAA252820E8642D063BCB8E1EA66162E2AC433C92D519CC8E827CD7C66F777F4E9AB18C817EEAFB
54,274,844 UART: [art] SIG.R = 7403EFFAB2E7A65381A5D34735EF6202027D9CBCE5E6D5235908CADC6166790EAE33414EA78945CA4969055DDD8EAF54
54,282,199 UART: [art] SIG.S = 6456C8012B0213FB6F3B815A42815C06FE8C306F9FB0AEC150250B5D2C1E9D4E4DC10ABA0EA76A997B5DDE59F19849E6
55,260,747 UART: mbox::rt_entry...
55,261,709 UART: ____ _ _ _ ____ _____
55,263,701 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,265,719 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,267,662 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,269,606 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,271,484 UART: |_|
55,272,376 UART:
55,642,568 UART: [rt] Runtime listening for mailbox commands...
55,644,635 UART:
55,644,798 UART: Running Caliptra ROM ...
55,645,820 UART:
55,646,243 UART: [state] CFI Enabled
55,656,896 UART: [state] LifecycleState = Unprovisioned
55,658,782 UART: [state] DebugLocked = No
55,661,003 UART: [state] WD Timer not started. Device not locked for debugging
55,664,777 UART: [kat] SHA2-256
55,854,662 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
55,865,420 UART: [kat] ++
55,865,937 UART: [kat] sha1
55,877,312 UART: [kat] SHA2-256
55,880,285 UART: [kat] SHA2-384
55,885,271 UART: [kat] SHA2-512-ACC
55,887,845 UART: [kat] ECC-384
58,329,535 UART: [kat] HMAC-384Kdf
58,341,985 UART: [kat] LMS
58,873,623 UART: [kat] --
58,878,275 UART: [update-reset] ++
61,948,691 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,952,174 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
62,367,617 >>> mbox cmd response: success
62,367,982 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,369,021 UART: [update-reset] Copying MAN_2 To MAN_1
62,406,596 UART: [update-reset Success] --
62,412,131 UART: [state] Locking Datavault
62,415,635 UART: [state] Locking PCR0, PCR1 and PCR31
62,417,796 UART: [state] Locking ICCM
62,420,495 UART: [exit] Launching FMC @ 0x40000130
62,429,197 UART:
62,429,436 UART: Running Caliptra FMC ...
62,430,543 UART:
62,430,705 UART: [state] CFI Enabled
62,474,612 UART: [art] Extend RT PCRs Done
62,475,759 UART: [art] Lock RT PCRs Done
62,477,264 UART: [art] Populate DV Done
62,482,993 UART: [fht] FMC Alias Private Key: 7
62,484,644 UART: [art] Derive CDI
62,485,458 UART: [art] Store in slot 0x4
62,527,912 UART: [art] Derive Key Pair
62,528,954 UART: [art] Store priv key in slot 0x5
64,955,627 UART: [art] Derive Key Pair - Done
64,968,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,674,932 UART: [art] Erasing AUTHORITY.KEYID = 7
66,676,419 UART: [art] PUB.X = 1699F92972C8E98BFA1BC6548D7AD0B2D6428B51D79C823C4B6660CEF1E779E6019674904F3B48C84F61BF2F473655DB
66,683,756 UART: [art] PUB.Y = 1B8E2639BB241992DCDAAA6D118C5925F3469D79C556988DEB8620C7634F9B861524A0E2EE4C3A6301D7ECB322246EA9
66,690,962 UART: [art] SIG.R = 5BB3D2C881B2909F7F874D5D00D014D6AE04D00750F24DB679B644AB2B98DABEF319F1CE1A224FA35B5723D597EE764C
66,698,383 UART: [art] SIG.S = C4174B5B5F4A5C08489EC991318EE5D858DEAFCBDB7C3D0C582CBA82314D7B4424DC07237307784FF85A041C8D60B417
67,676,254 UART: mbox::rt_entry...
67,677,222 UART: ____ _ _ _ ____ _____
67,679,211 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,681,226 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,683,158 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,685,090 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,687,207 UART: |_|
67,688,064 UART:
68,060,755 UART: [rt] Runtime listening for mailbox commands...
68,062,928 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,753,424 ready_for_fw is high
3,754,060 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,278,862 >>> mbox cmd response: success
14,279,994 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,529,346 UART:
18,529,750 UART: Running Caliptra FMC ...
18,530,899 UART:
18,531,064 UART: [state] CFI Enabled
18,538,844 UART: [fht] FMC Alias Private Key: 7
20,304,566 UART: [art] Extend RT PCRs Done
20,305,794 UART: [art] Lock RT PCRs Done
20,307,532 UART: [art] Populate DV Done
20,313,054 UART: [fht] FMC Alias Private Key: 7
20,314,763 UART: [art] Derive CDI
20,315,578 UART: [art] Store in slot 0x4
20,358,071 UART: [art] Derive Key Pair
20,359,114 UART: [art] Store priv key in slot 0x5
22,786,043 UART: [art] Derive Key Pair - Done
22,798,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,505,108 UART: [art] Erasing AUTHORITY.KEYID = 7
24,506,621 UART: [art] PUB.X = 29B7AC803EBDD6F215B94ABB9F39A115C1676758DDBF460ACC7B36121F3B72A60185845FDE176566B121C19AADDDFA03
24,513,930 UART: [art] PUB.Y = E1E6AA2D7122D43AFFA5BCC5EF07C86483357120F86C8CA57E51757A68641145F8598555DB5397C64B986A18306B88B0
24,521,169 UART: [art] SIG.R = 387B202C80371F85F65896CC1643477D26DF81B67EF89FD243845BC5D84463BCC0BCD20FEE438ACD6B795EA23E3C5EA6
24,528,567 UART: [art] SIG.S = B2D77B34C8399D79BA28FD0C93DEF27470143E05D52372FE35FDEFC0079F5B9E428B22D288F59DC6BC76FE44624D4A23
25,506,499 UART: mbox::rt_entry...
25,507,469 UART: ____ _ _ _ ____ _____
25,509,463 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,511,471 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,513,409 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,515,397 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,517,334 UART: |_|
25,518,172 UART:
25,648,598 UART: [rt] Runtime listening for mailbox commands...
25,650,773 >>> mbox cmd response data (48 bytes)
27,718,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,538,483 >>> mbox cmd response: success
35,539,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,571,223 UART:
35,571,552 UART: Running Caliptra FMC ...
35,572,681 UART:
35,572,848 UART: [state] CFI Enabled
35,616,282 UART: [art] Extend RT PCRs Done
35,617,431 UART: [art] Lock RT PCRs Done
35,618,833 UART: [art] Populate DV Done
35,624,362 UART: [fht] FMC Alias Private Key: 7
35,625,992 UART: [art] Derive CDI
35,626,759 UART: [art] Store in slot 0x4
35,669,687 UART: [art] Derive Key Pair
35,670,693 UART: [art] Store priv key in slot 0x5
38,097,349 UART: [art] Derive Key Pair - Done
38,110,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,816,644 UART: [art] Erasing AUTHORITY.KEYID = 7
39,818,145 UART: [art] PUB.X = 13ECAEFA458AFE91A994BFDD3D20F97004EB8DD7C6B35FABAB381E1A0A0C201C077E1E52724C24F947C5971ABC5A2AB4
39,825,455 UART: [art] PUB.Y = 5E03795EBC77978FA0DEDACC424B0E3EE1087DA481F5F56DA88D1175DB6127265B31E6CCA72EFF648CCF1BE98B0CF238
39,832,755 UART: [art] SIG.R = 8F1B0026B537A267F9C1D5DEDB9220C02C558B592F7C3A8C7E425E84279BBB9C01ECD85D07671EA59A2DE4B578E1798F
39,840,147 UART: [art] SIG.S = 07D3D6078CC3A43757F475D32134B573C573C5B2B1B1FAF24EDD04176724F30B2DF9EEE20487C91181D1AF4454E6EAD8
40,818,998 UART: Caliptra RT
40,819,699 UART: [state] CFI Enabled
41,197,187 UART: [rt] RT listening for mailbox commands...
41,229,354 UART: [rt]cmd =0x4d454153, len=108
41,248,380 >>> mbox cmd response data (12 bytes)
43,304,169 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,326,155 >>> mbox cmd response: success
52,377,226 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,481,899 UART:
52,482,269 UART: Running Caliptra FMC ...
52,483,331 UART:
52,483,491 UART: [state] CFI Enabled
52,484,372 UART: [art] Extend RT PCRs Done
52,485,457 UART: [art] Lock RT PCRs Done
52,486,464 UART: [art] Populate DV Done
52,487,503 UART: [fht] FMC Alias Private Key: 7
52,488,856 UART: [art] Derive CDI
52,489,597 UART: [art] Store in slot 0x4
52,490,663 UART: [art] Derive Key Pair
52,491,661 UART: [art] Store priv key in slot 0x5
52,889,045 UART: [art] Derive Key Pair - Done
52,902,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,608,834 UART: [art] Erasing AUTHORITY.KEYID = 7
54,610,346 UART: [art] PUB.X = B71A47B84AA6544A519DCBD7CD9EE76AA918F126B23D8D92D7E4D8A7FBD289B25153017AAC146B983D9A7A430BB81AC0
54,617,610 UART: [art] PUB.Y = D4846800E0A63C5C2B052062EC8B791BD3F2B7E81C35B272E9151823D50D188CF360A7C37F99AF9DC1B9B869DEF65DEB
54,624,844 UART: [art] SIG.R = 47282889395E0B7DE643385C1A84AECBA809314BB05A1338AB1D05D24996FAA82F675A61DCB2F8C4ADF1381980FD0201
54,632,241 UART: [art] SIG.S = 1C878697D4D991B1754DB266C4B2E4E65BDA0034625E3699E681913BE66F94F218EA0878B44BDFCABA785ACF020BE88B
55,610,698 UART: mbox::rt_entry...
55,611,663 UART: ____ _ _ _ ____ _____
55,613,595 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,615,611 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,617,468 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,619,420 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,621,315 UART: |_|
55,622,368 UART:
56,000,268 UART: [rt] Runtime listening for mailbox commands...
62,906,825 >>> mbox cmd response: success
62,907,221 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,943,043 UART:
62,943,309 UART: Running Caliptra FMC ...
62,944,431 UART:
62,944,593 UART: [state] CFI Enabled
62,988,626 UART: [art] Extend RT PCRs Done
62,989,812 UART: [art] Lock RT PCRs Done
62,991,436 UART: [art] Populate DV Done
62,996,902 UART: [fht] FMC Alias Private Key: 7
62,998,544 UART: [art] Derive CDI
62,999,360 UART: [art] Store in slot 0x4
63,042,368 UART: [art] Derive Key Pair
63,043,376 UART: [art] Store priv key in slot 0x5
65,470,280 UART: [art] Derive Key Pair - Done
65,483,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,189,491 UART: [art] Erasing AUTHORITY.KEYID = 7
67,191,000 UART: [art] PUB.X = E105EB5D418E67422CE5A83F2FDF645E50D926A9562843ECCFB22912C04F89608D222FE38159C9E86512C31AFAEAB097
67,198,257 UART: [art] PUB.Y = 18D7A91D805A205E8D7CF3C809FCD15113D17F34370D3E1E0D64E4651470221A1F51DBDE06DEF97F46BCBAE5D21C837F
67,205,560 UART: [art] SIG.R = B0A25EC268FACC173BF7AA4EFCA5E6FD35CB9B045072D8E93FB20C3CD36B7FFF15343F5FB35325F60390CDE0567995A2
67,212,958 UART: [art] SIG.S = C882058F6792B63122E30D4DB5C42194D3D2C6F4E228DB1BDA81646696C75C90B5912ABADE982225F4E088F5C867712D
68,191,442 UART: mbox::rt_entry...
68,192,385 UART: ____ _ _ _ ____ _____
68,194,374 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,196,436 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,198,379 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,200,320 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,202,178 UART: |_|
68,203,004 UART:
68,575,033 UART: [rt] Runtime listening for mailbox commands...
68,577,180 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
Truncated 2584 bytes from beginning
,586,394 UART: [fwproc] Received command 0x46574c44
1,587,185 UART: [fwproc] Received Image of size 82832 bytes
2,523,068 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,551,046 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,582,264 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,901 >>> mbox cmd response: success
2,668,901 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,670,049 UART: [afmc] ++
2,670,217 UART: [afmc] CDI.KEYID = 6
2,670,579 UART: [afmc] SUBJECT.KEYID = 7
2,671,004 UART: [afmc] AUTHORITY.KEYID = 5
2,706,163 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,185 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,722,965 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,728,674 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,557 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,740,240 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,748,028 UART: [afmc] --
2,749,086 UART: [cold-reset] --
2,749,886 UART: [state] Locking Datavault
2,750,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,511 UART: [state] Locking ICCM
2,752,183 UART: [exit] Launching FMC @ 0x40000130
2,757,513 UART:
2,757,529 UART: Running Caliptra FMC ...
2,757,937 UART:
2,757,991 UART: [state] CFI Enabled
2,768,615 UART: [fht] FMC Alias Private Key: 7
2,887,907 UART: [art] Extend RT PCRs Done
2,888,335 UART: [art] Lock RT PCRs Done
2,889,735 UART: [art] Populate DV Done
2,898,050 UART: [fht] FMC Alias Private Key: 7
2,899,062 UART: [art] Derive CDI
2,899,342 UART: [art] Store in slot 0x4
2,984,864 UART: [art] Derive Key Pair
2,985,224 UART: [art] Store priv key in slot 0x5
2,998,101 UART: [art] Derive Key Pair - Done
3,012,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,484 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,249 UART: [art] PUB.X = 8A8D1AB0FE5FF87776622C06130342448C0B4188DC53EB868D9CF0457AA7E8A6791381DCDF14B682510F4A230C5D158F
3,036,006 UART: [art] PUB.Y = 645E661226C1B09B77A987E6A527A4FF23CD2E4C1D6CE331644CB3EE887EB9DFE6B12A6EFB4A6E10033450C28E522E2F
3,042,965 UART: [art] SIG.R = 926F920E6A2CD68408FE0E269E100410E4DEDB58C0EADD0ED34A811234FE56D471B49E9F1CE0E009802C6B583365FFB6
3,049,727 UART: [art] SIG.S = 3E8A6519F8F76C5256380DB152DA0FB7DC04B24318A5B17EE0A993CC45AF3A5402A99134B539EDD880663337BD518512
3,074,007 UART: mbox::rt_entry...
3,074,379 UART: ____ _ _ _ ____ _____
3,075,163 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,075,963 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,076,731 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,077,499 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,078,267 UART: |_|
3,078,579 UART:
3,198,252 UART: [rt] Runtime listening for mailbox commands...
3,199,447 >>> mbox cmd response data (48 bytes)
3,199,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,199,562 UART:
3,199,578 UART: Running Caliptra ROM ...
3,199,986 UART:
3,200,040 UART: [state] CFI Enabled
3,202,570 UART: [state] LifecycleState = Unprovisioned
3,203,225 UART: [state] DebugLocked = No
3,203,955 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,205,458 UART: [kat] SHA2-256
3,999,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,003,504 UART: [kat] ++
4,003,656 UART: [kat] sha1
4,008,042 UART: [kat] SHA2-256
4,009,980 UART: [kat] SHA2-384
4,012,579 UART: [kat] SHA2-512-ACC
4,014,479 UART: [kat] ECC-384
4,020,552 UART: [kat] HMAC-384Kdf
4,025,082 UART: [kat] LMS
4,593,278 UART: [kat] --
4,594,179 UART: [update-reset] ++
5,975,129 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,976,389 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,131,656 >>> mbox cmd response: success
6,131,656 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,132,003 UART: [update-reset] Copying MAN_2 To MAN_1
6,140,017 UART: [update-reset Success] --
6,141,034 UART: [state] Locking Datavault
6,141,912 UART: [state] Locking PCR0, PCR1 and PCR31
6,142,516 UART: [state] Locking ICCM
6,143,128 UART: [exit] Launching FMC @ 0x40000130
6,148,458 UART:
6,148,474 UART: Running Caliptra FMC ...
6,148,882 UART:
6,148,936 UART: [state] CFI Enabled
6,237,997 UART: [art] Extend RT PCRs Done
6,238,425 UART: [art] Lock RT PCRs Done
6,239,596 UART: [art] Populate DV Done
6,247,857 UART: [fht] FMC Alias Private Key: 7
6,249,021 UART: [art] Derive CDI
6,249,301 UART: [art] Store in slot 0x4
6,334,925 UART: [art] Derive Key Pair
6,335,285 UART: [art] Store priv key in slot 0x5
6,348,416 UART: [art] Derive Key Pair - Done
6,363,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,378,061 UART: [art] Erasing AUTHORITY.KEYID = 7
6,378,826 UART: [art] PUB.X = 1E53A17DC41FE991525AE0098788D491243DBBC414637ADA747C3BECC337D3497A25F6A9BEA30B60EBAB360C7AE25E50
6,385,599 UART: [art] PUB.Y = 6964CE01ABF1EB9D63428520E269BF949F48DCB2859BEAD39F6D710EBA323706896DB63FC6ECA5977E445E8DCAA5B133
6,392,554 UART: [art] SIG.R = 4DAEB3D0D3EB8EA4A805E27B815EA2165656D0A7D796390B201E0380784FD5DDAFB8DE6FC032FC0D733EB758540D810F
6,399,320 UART: [art] SIG.S = 4C47E3BBCFC5A40D63CE30C5C0A6DE955187871CDB1F485358F14424542A24804D58F96AED191232CE87EB215F3598EC
6,422,713 UART: Caliptra RT
6,422,964 UART: [state] CFI Enabled
6,783,368 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,814,696 UART: [rt]cmd =0x4d454153, len=108
6,835,238 >>> mbox cmd response data (12 bytes)
6,835,239 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,835,747 UART:
6,835,763 UART: Running Caliptra ROM ...
6,836,171 UART:
6,836,225 UART: [state] CFI Enabled
6,838,799 UART: [state] LifecycleState = Unprovisioned
6,839,454 UART: [state] DebugLocked = No
6,839,998 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,841,655 UART: [kat] SHA2-256
7,635,586 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,639,701 UART: [kat] ++
7,639,853 UART: [kat] sha1
7,644,211 UART: [kat] SHA2-256
7,646,149 UART: [kat] SHA2-384
7,648,774 UART: [kat] SHA2-512-ACC
7,650,674 UART: [kat] ECC-384
7,656,373 UART: [kat] HMAC-384Kdf
7,660,989 UART: [kat] LMS
8,229,185 UART: [kat] --
8,230,066 UART: [update-reset] ++
9,202,791 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,203,835 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,305,528 >>> mbox cmd response: success
9,305,528 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
9,305,721 UART: [update-reset] Copying MAN_2 To MAN_1
9,313,735 UART: [update-reset Success] --
9,314,620 UART: [state] Locking Datavault
9,315,292 UART: [state] Locking PCR0, PCR1 and PCR31
9,315,896 UART: [state] Locking ICCM
9,316,324 UART: [exit] Launching FMC @ 0x40000130
9,321,654 UART:
9,321,670 UART: Running Caliptra FMC ...
9,322,078 UART:
9,322,132 UART: [state] CFI Enabled
9,410,673 UART: [art] Extend RT PCRs Done
9,411,101 UART: [art] Lock RT PCRs Done
9,412,462 UART: [art] Populate DV Done
9,420,577 UART: [fht] FMC Alias Private Key: 7
9,421,603 UART: [art] Derive CDI
9,421,883 UART: [art] Store in slot 0x4
9,507,403 UART: [art] Derive Key Pair
9,507,763 UART: [art] Store priv key in slot 0x5
9,520,766 UART: [art] Derive Key Pair - Done
9,535,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,551,019 UART: [art] Erasing AUTHORITY.KEYID = 7
9,551,784 UART: [art] PUB.X = 990D31D4EB1BB3626195C28667C6DF87200E1486A3DFCB54AA8FC7BAC5197891BCEEB60C5746F3924720145B5E3CE786
9,558,551 UART: [art] PUB.Y = 03923704BC1AA536AE7517BF800CCBEF21DF731B117AC684DC2B89FFE4C99B14F70AB253BC1B8604607F7C4E6EA190E0
9,565,500 UART: [art] SIG.R = F97B3F6253377E4D081AC03E56F4B8C0E4FC3BE59E73D30F2CF3A78FF686C5D8EA4D8904F7AB308E35B8505D82FBBAD8
9,572,279 UART: [art] SIG.S = A41AFA54BD7B33504D3C18A3D5448C9AD242BEFC6B6EF00650E97D36D42F06E7953D630137F8037B05584696625CF6F5
9,596,140 UART: mbox::rt_entry...
9,596,512 UART: ____ _ _ _ ____ _____
9,597,296 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,598,096 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,598,864 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,599,632 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,600,400 UART: |_|
9,600,712 UART:
9,965,956 UART: [rt] Runtime listening for mailbox commands...
9,966,929 UART:
9,966,945 UART: Running Caliptra ROM ...
9,967,353 UART:
9,967,407 UART: [state] CFI Enabled
9,969,801 UART: [state] LifecycleState = Unprovisioned
9,970,456 UART: [state] DebugLocked = No
9,971,178 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,972,687 UART: [kat] SHA2-256
10,766,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,770,733 UART: [kat] ++
10,770,885 UART: [kat] sha1
10,775,167 UART: [kat] SHA2-256
10,777,105 UART: [kat] SHA2-384
10,779,832 UART: [kat] SHA2-512-ACC
10,781,732 UART: [kat] ECC-384
10,787,421 UART: [kat] HMAC-384Kdf
10,792,007 UART: [kat] LMS
11,360,203 UART: [kat] --
11,360,994 UART: [update-reset] ++
12,332,996 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,334,064 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
12,435,757 >>> mbox cmd response: success
12,435,757 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,436,086 UART: [update-reset] Copying MAN_2 To MAN_1
12,444,100 UART: [update-reset Success] --
12,445,077 UART: [state] Locking Datavault
12,445,837 UART: [state] Locking PCR0, PCR1 and PCR31
12,446,441 UART: [state] Locking ICCM
12,447,053 UART: [exit] Launching FMC @ 0x40000130
12,452,383 UART:
12,452,399 UART: Running Caliptra FMC ...
12,452,807 UART:
12,452,861 UART: [state] CFI Enabled
12,542,354 UART: [art] Extend RT PCRs Done
12,542,782 UART: [art] Lock RT PCRs Done
12,544,125 UART: [art] Populate DV Done
12,552,524 UART: [fht] FMC Alias Private Key: 7
12,553,500 UART: [art] Derive CDI
12,553,780 UART: [art] Store in slot 0x4
12,639,560 UART: [art] Derive Key Pair
12,639,920 UART: [art] Store priv key in slot 0x5
12,652,841 UART: [art] Derive Key Pair - Done
12,667,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,683,514 UART: [art] Erasing AUTHORITY.KEYID = 7
12,684,279 UART: [art] PUB.X = B59540FEADE3ECE14BD9911DCE4E269BF3D28051F5A9337FA919F69981BCF64E320DF3BE19A6A71692AC9537775EBCC0
12,691,062 UART: [art] PUB.Y = 0935443C7899683B45C3591E4E12C081C96D0F3BE467514E2F517188AE603D3BFEE370F8E4F46BF1538E4F5EA6CD9CB9
12,698,010 UART: [art] SIG.R = 505FFD23C8C258C9D22150AD9BB8CF3A7FD8D645E6255673E22A003F9EF6BB098E1028F314B231EF29A15AF196E439E2
12,704,763 UART: [art] SIG.S = CC4FEEBBA6D782D6C6EFC90707FEE0DD43764898BEF60C01279D293CFB27A8052B02FD6E6D82105B2D4E05F8EB0CAAC8
12,728,695 UART: mbox::rt_entry...
12,729,067 UART: ____ _ _ _ ____ _____
12,729,851 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,730,651 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,731,419 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,732,187 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,732,955 UART: |_|
12,733,267 UART:
13,099,316 UART: [rt] Runtime listening for mailbox commands...
13,100,520 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,635 ready_for_fw is high
1,361,635 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,516,881 >>> mbox cmd response: success
2,516,881 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,578,404 UART:
2,578,420 UART: Running Caliptra FMC ...
2,578,828 UART:
2,578,882 UART: [state] CFI Enabled
2,589,592 UART: [fht] FMC Alias Private Key: 7
2,708,854 UART: [art] Extend RT PCRs Done
2,709,282 UART: [art] Lock RT PCRs Done
2,711,084 UART: [art] Populate DV Done
2,719,277 UART: [fht] FMC Alias Private Key: 7
2,720,275 UART: [art] Derive CDI
2,720,555 UART: [art] Store in slot 0x4
2,806,429 UART: [art] Derive Key Pair
2,806,789 UART: [art] Store priv key in slot 0x5
2,819,878 UART: [art] Derive Key Pair - Done
2,834,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,850,776 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,541 UART: [art] PUB.X = 9703D5CE52C39CBFDFCD782D466041661E77F6E35231E99564C99C938734BF8DE9B66388E1C3C32B708FD7B6F4F5F551
2,858,312 UART: [art] PUB.Y = BA9493354F8A524FD969DE680DA635AEEA3A26FDF8C34767988ACE5C8330CF06DBD59A2D7AA3B7698FFA2007B4609859
2,865,265 UART: [art] SIG.R = F80C9568989CD237C267922A246D6BE10E5E0906037B4B781749EB8AD77BA3C38D98F486DAEB61BEE9DF75EFA9668971
2,872,026 UART: [art] SIG.S = 8974AEEABC6A7479AE312F02857E5D55BEBB355357D69391F645CD63AA733C23C1B34EA3C79D296D70D314C227416A87
2,895,441 UART: mbox::rt_entry...
2,895,813 UART: ____ _ _ _ ____ _____
2,896,597 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,897,397 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,898,165 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,898,933 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,899,701 UART: |_|
2,900,013 UART:
3,019,161 UART: [rt] Runtime listening for mailbox commands...
3,020,356 >>> mbox cmd response data (48 bytes)
3,020,357 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,833,599 >>> mbox cmd response: success
5,833,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,846,703 UART:
5,846,719 UART: Running Caliptra FMC ...
5,847,127 UART:
5,847,181 UART: [state] CFI Enabled
5,935,638 UART: [art] Extend RT PCRs Done
5,936,066 UART: [art] Lock RT PCRs Done
5,937,299 UART: [art] Populate DV Done
5,945,776 UART: [fht] FMC Alias Private Key: 7
5,946,886 UART: [art] Derive CDI
5,947,166 UART: [art] Store in slot 0x4
6,032,810 UART: [art] Derive Key Pair
6,033,170 UART: [art] Store priv key in slot 0x5
6,046,383 UART: [art] Derive Key Pair - Done
6,060,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,075,805 UART: [art] Erasing AUTHORITY.KEYID = 7
6,076,570 UART: [art] PUB.X = 653DC79E5038F0A63DD950CD3694134A33DFBA73976B8768D29673F1E4C67AA1079CE2B5F869E7444CE2F32E0A474F7F
6,083,338 UART: [art] PUB.Y = 0AE0B65BD1146D5C2E2DD940E9EC5AA340B652DD9588AEDC77F6E4A889ACA46C8F1002A592820DD74FAC7655FD902CBD
6,090,299 UART: [art] SIG.R = 061601AA0C8C1D071A4A5634D8B0022DE3D61A63743179220571F59801A7C34137CB1A54332E60D9585A3F4B88FD4947
6,097,038 UART: [art] SIG.S = F752AC863FAF41BC0972DE4526425F549D4C2015CE7AE919EA4ABDA0D893BD58AA0CAE2D91915D72918A1B94C1CDF623
6,121,478 UART: Caliptra RT
6,121,729 UART: [state] CFI Enabled
6,489,926 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,521,112 UART: [rt]cmd =0x4d454153, len=108
6,541,882 >>> mbox cmd response data (12 bytes)
6,541,883 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,893,832 >>> mbox cmd response: success
8,893,832 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,907,340 UART:
8,907,356 UART: Running Caliptra FMC ...
8,907,764 UART:
8,907,818 UART: [state] CFI Enabled
8,997,213 UART: [art] Extend RT PCRs Done
8,997,641 UART: [art] Lock RT PCRs Done
8,999,066 UART: [art] Populate DV Done
9,007,213 UART: [fht] FMC Alias Private Key: 7
9,008,159 UART: [art] Derive CDI
9,008,439 UART: [art] Store in slot 0x4
9,094,139 UART: [art] Derive Key Pair
9,094,499 UART: [art] Store priv key in slot 0x5
9,107,684 UART: [art] Derive Key Pair - Done
9,122,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,137,899 UART: [art] Erasing AUTHORITY.KEYID = 7
9,138,664 UART: [art] PUB.X = A724CA91AA2C51D43951ACE2F071A125ABBCCE5388E17261A2BDE88CA83394E54746BB8076A66612F738918B1DDC5751
9,145,440 UART: [art] PUB.Y = C099373DD743A9094C2053520430CF0658FB15ED6D44B8748A3670F66C6B15AEC7E8F4D9443A616C4C56F361FABB3D87
9,152,383 UART: [art] SIG.R = 54107337A25ACF7C27A538D47FD28EE9856F2EB21012DEEF4321CA211F5229A6C3733D2B7B667C163C5D39F95917C246
9,159,153 UART: [art] SIG.S = DD79991C93498A124EACA981F657542CE284A123A4454D98E6299F5B089CF023172CD271AA260F8A986A18C5D0CBDD2B
9,183,025 UART: mbox::rt_entry...
9,183,397 UART: ____ _ _ _ ____ _____
9,184,181 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,184,981 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,185,749 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,186,517 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,187,285 UART: |_|
9,187,597 UART:
9,547,008 UART: [rt] Runtime listening for mailbox commands...
11,898,918 >>> mbox cmd response: success
11,898,918 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,912,650 UART:
11,912,666 UART: Running Caliptra FMC ...
11,913,074 UART:
11,913,128 UART: [state] CFI Enabled
12,002,355 UART: [art] Extend RT PCRs Done
12,002,783 UART: [art] Lock RT PCRs Done
12,003,784 UART: [art] Populate DV Done
12,011,923 UART: [fht] FMC Alias Private Key: 7
12,012,941 UART: [art] Derive CDI
12,013,221 UART: [art] Store in slot 0x4
12,098,797 UART: [art] Derive Key Pair
12,099,157 UART: [art] Store priv key in slot 0x5
12,112,182 UART: [art] Derive Key Pair - Done
12,127,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,142,825 UART: [art] Erasing AUTHORITY.KEYID = 7
12,143,590 UART: [art] PUB.X = 5E7DE5FCED71F7E1211BA1934A498C2ABED6C8B1D13EB700733AFC47A3549D56833D17F3A61B5731F0E0411FA8F3EF21
12,150,352 UART: [art] PUB.Y = 752787B4110B290F5BAAFBCF8D3C164DF07DD68EEB065B8C7A2E9544C8C17927B128B4D32F7B5F7AA7A4B05096FAD442
12,157,307 UART: [art] SIG.R = 3C774EFC9E04E39178DE19A7845843C80B2E4BE30D935B9C704A0C2C6C81780F51E1B3EED6CFAE9F317F6382B3267176
12,164,068 UART: [art] SIG.S = A01122F79B521BD4353E9E097B823BDB7DAECA526B5836CDCD420FCB8D5CF7CE9FB94A73D51EA3FA97DEE52789CC40A4
12,187,644 UART: mbox::rt_entry...
12,188,016 UART: ____ _ _ _ ____ _____
12,188,800 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,189,600 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,190,368 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,191,136 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,191,904 UART: |_|
12,192,216 UART:
12,558,569 UART: [rt] Runtime listening for mailbox commands...
12,559,773 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.01s
Truncated 2584 bytes from beginning
,587,671 UART: [fwproc] Received command 0x46574c44
1,588,462 UART: [fwproc] Received Image of size 82832 bytes
2,525,183 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,552,497 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,583,715 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,670,428 >>> mbox cmd response: success
2,670,428 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,671,532 UART: [afmc] ++
2,671,700 UART: [afmc] CDI.KEYID = 6
2,672,062 UART: [afmc] SUBJECT.KEYID = 7
2,672,487 UART: [afmc] AUTHORITY.KEYID = 5
2,707,554 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,723,570 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,724,350 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,730,059 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,735,942 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,741,625 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,749,367 UART: [afmc] --
2,750,313 UART: [cold-reset] --
2,751,041 UART: [state] Locking Datavault
2,752,170 UART: [state] Locking PCR0, PCR1 and PCR31
2,752,774 UART: [state] Locking ICCM
2,753,280 UART: [exit] Launching FMC @ 0x40000130
2,758,610 UART:
2,758,626 UART: Running Caliptra FMC ...
2,759,034 UART:
2,759,177 UART: [state] CFI Enabled
2,769,531 UART: [fht] FMC Alias Private Key: 7
2,888,695 UART: [art] Extend RT PCRs Done
2,889,123 UART: [art] Lock RT PCRs Done
2,890,669 UART: [art] Populate DV Done
2,898,976 UART: [fht] FMC Alias Private Key: 7
2,899,918 UART: [art] Derive CDI
2,900,198 UART: [art] Store in slot 0x4
2,985,834 UART: [art] Derive Key Pair
2,986,194 UART: [art] Store priv key in slot 0x5
2,999,927 UART: [art] Derive Key Pair - Done
3,014,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,143 UART: [art] PUB.X = 84A7DFA32ECD79660742F20D40F22847E2986014A2CF89B7DE40F8A44F25DD4B8D46FA498525631D656DF013AEB9DC0E
3,037,912 UART: [art] PUB.Y = CD68617BE9AD49FB93DF77387FAD1B537F679397DDC78AC175F0FDDC1ECC3C31078FAA150E3D2E464D167C0E799869D3
3,044,869 UART: [art] SIG.R = 318916CF0C547FE21183C19FF5C96E432632BFC8D3755F80D1C7CD4F440F9A6C5B5A800F289ECF0F64C4C9694B68E087
3,051,633 UART: [art] SIG.S = 93D23ECBD2A4FB967153291D00A57058B541C5302521BC4F84B85701742E2DD39423C1042BB5CB5A98CD8CB93DE1867F
3,075,737 UART: mbox::rt_entry...
3,076,109 UART: ____ _ _ _ ____ _____
3,076,893 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,077,693 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,078,461 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,079,229 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,079,997 UART: |_|
3,080,309 UART:
3,198,746 UART: [rt] Runtime listening for mailbox commands...
3,199,941 >>> mbox cmd response data (48 bytes)
3,199,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,200,056 UART:
3,200,072 UART: Running Caliptra ROM ...
3,200,480 UART:
3,200,621 UART: [state] CFI Enabled
3,203,101 UART: [state] LifecycleState = Unprovisioned
3,203,756 UART: [state] DebugLocked = No
3,204,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,205,915 UART: [kat] SHA2-256
3,999,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,003,961 UART: [kat] ++
4,004,113 UART: [kat] sha1
4,008,393 UART: [kat] SHA2-256
4,010,331 UART: [kat] SHA2-384
4,013,008 UART: [kat] SHA2-512-ACC
4,014,908 UART: [kat] ECC-384
4,020,431 UART: [kat] HMAC-384Kdf
4,025,251 UART: [kat] LMS
4,593,447 UART: [kat] --
4,594,262 UART: [update-reset] ++
5,975,162 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,976,366 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,131,633 >>> mbox cmd response: success
6,131,633 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,131,954 UART: [update-reset] Copying MAN_2 To MAN_1
6,139,968 UART: [update-reset Success] --
6,140,929 UART: [state] Locking Datavault
6,141,911 UART: [state] Locking PCR0, PCR1 and PCR31
6,142,515 UART: [state] Locking ICCM
6,143,151 UART: [exit] Launching FMC @ 0x40000130
6,148,481 UART:
6,148,497 UART: Running Caliptra FMC ...
6,148,905 UART:
6,149,048 UART: [state] CFI Enabled
6,238,179 UART: [art] Extend RT PCRs Done
6,238,607 UART: [art] Lock RT PCRs Done
6,240,076 UART: [art] Populate DV Done
6,248,485 UART: [fht] FMC Alias Private Key: 7
6,249,551 UART: [art] Derive CDI
6,249,831 UART: [art] Store in slot 0x4
6,335,305 UART: [art] Derive Key Pair
6,335,665 UART: [art] Store priv key in slot 0x5
6,349,086 UART: [art] Derive Key Pair - Done
6,363,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,378,825 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,590 UART: [art] PUB.X = F5A5936D8253CB58EBC38DEADB404D65B5A92A3416E3A442F4F30C4924A285C19BCD5633F8E13188741B1E79CBCE6D09
6,386,364 UART: [art] PUB.Y = DFC623AF18776F30F5BC3B3DA0890E2B561D768771629D6D97C109E2F0A4CE0719468F54D9590AFA5B125B2EA1824131
6,393,304 UART: [art] SIG.R = CF66C69F7935CABD553F75659F5422D60CDAC76E8422B4C88487F7505A931D73C5D1768290C482188CB3E489F913A7DB
6,400,071 UART: [art] SIG.S = B916CD0608F54C3373399C68039E0079E40AFBE179587664DBC05E4554CBE7DDB0904AB454483C11FE794503D927B458
6,424,172 UART: Caliptra RT
6,424,515 UART: [state] CFI Enabled
6,791,401 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,822,425 UART: [rt]cmd =0x4d454153, len=108
6,843,833 >>> mbox cmd response data (12 bytes)
6,843,834 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,844,574 UART:
6,844,590 UART: Running Caliptra ROM ...
6,844,998 UART:
6,845,139 UART: [state] CFI Enabled
6,848,195 UART: [state] LifecycleState = Unprovisioned
6,848,850 UART: [state] DebugLocked = No
6,849,396 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,851,103 UART: [kat] SHA2-256
7,645,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,649,149 UART: [kat] ++
7,649,301 UART: [kat] sha1
7,653,537 UART: [kat] SHA2-256
7,655,475 UART: [kat] SHA2-384
7,658,174 UART: [kat] SHA2-512-ACC
7,660,074 UART: [kat] ECC-384
7,665,797 UART: [kat] HMAC-384Kdf
7,670,411 UART: [kat] LMS
8,238,607 UART: [kat] --
8,239,464 UART: [update-reset] ++
9,210,995 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,212,277 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,313,970 >>> mbox cmd response: success
9,313,970 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
9,314,263 UART: [update-reset] Copying MAN_2 To MAN_1
9,322,277 UART: [update-reset Success] --
9,323,392 UART: [state] Locking Datavault
9,324,092 UART: [state] Locking PCR0, PCR1 and PCR31
9,324,696 UART: [state] Locking ICCM
9,325,284 UART: [exit] Launching FMC @ 0x40000130
9,330,614 UART:
9,330,630 UART: Running Caliptra FMC ...
9,331,038 UART:
9,331,181 UART: [state] CFI Enabled
9,420,354 UART: [art] Extend RT PCRs Done
9,420,782 UART: [art] Lock RT PCRs Done
9,422,231 UART: [art] Populate DV Done
9,430,452 UART: [fht] FMC Alias Private Key: 7
9,431,520 UART: [art] Derive CDI
9,431,800 UART: [art] Store in slot 0x4
9,517,462 UART: [art] Derive Key Pair
9,517,822 UART: [art] Store priv key in slot 0x5
9,531,329 UART: [art] Derive Key Pair - Done
9,545,925 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,562,054 UART: [art] Erasing AUTHORITY.KEYID = 7
9,562,819 UART: [art] PUB.X = 754A7A70AB7627450B6BA19D71118DCC5A6A1D74940798946DD0E0092EFB3635B135AEAF7484E513F10A4D48FC93F3C9
9,569,581 UART: [art] PUB.Y = FC29A5D5E91BA7F770D59E59AB9D644213C4B487EFDD9E0836F708223BCEEA559CF3B802B8D3A69780B3525B76FDE5EE
9,576,538 UART: [art] SIG.R = F3517FF21D0D0B4468DEA305063BFEB3FD950AF5E717597482A795564BCECFDB1916634968624C30B5D6B92590A85742
9,583,293 UART: [art] SIG.S = CA479DCEED8DD7B9E8BE12A750B0F3278208C011D77EE212BC29A6B52691CF55BC10DF0AD18C2B3E676C3CB42D938357
9,607,113 UART: mbox::rt_entry...
9,607,485 UART: ____ _ _ _ ____ _____
9,608,269 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,609,069 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,609,837 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,610,605 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,611,373 UART: |_|
9,611,685 UART:
9,977,683 UART: [rt] Runtime listening for mailbox commands...
9,978,656 UART:
9,978,672 UART: Running Caliptra ROM ...
9,979,080 UART:
9,979,221 UART: [state] CFI Enabled
9,982,019 UART: [state] LifecycleState = Unprovisioned
9,982,674 UART: [state] DebugLocked = No
9,983,332 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,985,037 UART: [kat] SHA2-256
10,778,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,783,083 UART: [kat] ++
10,783,235 UART: [kat] sha1
10,787,595 UART: [kat] SHA2-256
10,789,533 UART: [kat] SHA2-384
10,792,306 UART: [kat] SHA2-512-ACC
10,794,206 UART: [kat] ECC-384
10,799,927 UART: [kat] HMAC-384Kdf
10,804,549 UART: [kat] LMS
11,372,745 UART: [kat] --
11,373,644 UART: [update-reset] ++
12,346,017 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,347,197 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
12,448,890 >>> mbox cmd response: success
12,448,890 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,449,177 UART: [update-reset] Copying MAN_2 To MAN_1
12,457,191 UART: [update-reset Success] --
12,458,130 UART: [state] Locking Datavault
12,458,754 UART: [state] Locking PCR0, PCR1 and PCR31
12,459,358 UART: [state] Locking ICCM
12,459,908 UART: [exit] Launching FMC @ 0x40000130
12,465,238 UART:
12,465,254 UART: Running Caliptra FMC ...
12,465,662 UART:
12,465,805 UART: [state] CFI Enabled
12,554,856 UART: [art] Extend RT PCRs Done
12,555,284 UART: [art] Lock RT PCRs Done
12,556,287 UART: [art] Populate DV Done
12,564,602 UART: [fht] FMC Alias Private Key: 7
12,565,772 UART: [art] Derive CDI
12,566,052 UART: [art] Store in slot 0x4
12,651,782 UART: [art] Derive Key Pair
12,652,142 UART: [art] Store priv key in slot 0x5
12,665,397 UART: [art] Derive Key Pair - Done
12,680,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,695,966 UART: [art] Erasing AUTHORITY.KEYID = 7
12,696,731 UART: [art] PUB.X = B9712E295EB8284B9D0C6F469455CA627930DDD0B9045D0428408D2374ADBFD7666B08C7A195D5D5080EF31B0038E51F
12,703,461 UART: [art] PUB.Y = 5EEBC5136B0EFFF2FF1AC6EBEEE21AD218AE1A617F3E60AEBAA5938C4446722AF285DC525323284EB8F97D6C9B2864D1
12,710,430 UART: [art] SIG.R = 760947318F2A267DDF4705F26801E994A346E7761B181B73B3768C370943939E2C488D73A8220EB8A7609D608308609C
12,717,164 UART: [art] SIG.S = 441F5E5624724769985AB3A0A3AB8A0682D6529E46707B21A1F8C99DDE414832C1B59079BFB32C0703C8C02C2F23F6E9
12,740,837 UART: mbox::rt_entry...
12,741,209 UART: ____ _ _ _ ____ _____
12,741,993 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,742,793 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,743,561 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,744,329 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,745,097 UART: |_|
12,745,409 UART:
13,107,917 UART: [rt] Runtime listening for mailbox commands...
13,109,121 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,616 ready_for_fw is high
1,363,616 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,519,718 >>> mbox cmd response: success
2,519,718 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,581,633 UART:
2,581,649 UART: Running Caliptra FMC ...
2,582,057 UART:
2,582,200 UART: [state] CFI Enabled
2,592,746 UART: [fht] FMC Alias Private Key: 7
2,711,810 UART: [art] Extend RT PCRs Done
2,712,238 UART: [art] Lock RT PCRs Done
2,713,634 UART: [art] Populate DV Done
2,721,887 UART: [fht] FMC Alias Private Key: 7
2,722,969 UART: [art] Derive CDI
2,723,249 UART: [art] Store in slot 0x4
2,808,741 UART: [art] Derive Key Pair
2,809,101 UART: [art] Store priv key in slot 0x5
2,822,794 UART: [art] Derive Key Pair - Done
2,837,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,853,254 UART: [art] Erasing AUTHORITY.KEYID = 7
2,854,019 UART: [art] PUB.X = A7DBE51998719F8E9D51173662B8D86E3F1D237C4A54CB79903AC3B7B5F188C442274D55890FFCF1E052EBD0039CD705
2,860,784 UART: [art] PUB.Y = 9BB5AED8F2925F95EC88A282D31DCF53CFBA1EBF077CB44BA285A5193312BD4E3FA05CFA3F1865EB30E454079CF1B032
2,867,748 UART: [art] SIG.R = EB93A78112601BD441A283F7A3F76BE6F9257BBF79D773C2BE01BA2414AE2C245E742284CAF276DC3D5EFD1DDA559A7A
2,874,531 UART: [art] SIG.S = F45D3CF438D14148503B483B97F1CF41CD931EF2B7F4C4B2947674FC79149D4A10E238AC6CE89B4D82ABF1EA03B8E33F
2,899,024 UART: mbox::rt_entry...
2,899,396 UART: ____ _ _ _ ____ _____
2,900,180 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,900,980 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,901,748 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,902,516 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,903,284 UART: |_|
2,903,596 UART:
3,022,790 UART: [rt] Runtime listening for mailbox commands...
3,023,985 >>> mbox cmd response data (48 bytes)
3,023,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,838,721 >>> mbox cmd response: success
5,838,721 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,852,267 UART:
5,852,283 UART: Running Caliptra FMC ...
5,852,691 UART:
5,852,834 UART: [state] CFI Enabled
5,942,227 UART: [art] Extend RT PCRs Done
5,942,655 UART: [art] Lock RT PCRs Done
5,943,880 UART: [art] Populate DV Done
5,951,979 UART: [fht] FMC Alias Private Key: 7
5,953,067 UART: [art] Derive CDI
5,953,347 UART: [art] Store in slot 0x4
6,038,939 UART: [art] Derive Key Pair
6,039,299 UART: [art] Store priv key in slot 0x5
6,052,510 UART: [art] Derive Key Pair - Done
6,067,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,082,841 UART: [art] Erasing AUTHORITY.KEYID = 7
6,083,606 UART: [art] PUB.X = 49186513325E3B30141860E843811C3ACFD3A2F01E7BE0E288F3FD4194A9FA664B0A9C30BF7027D5ADD0E15E8A4FE4B9
6,090,381 UART: [art] PUB.Y = 8B3842D9BB131DE3A58C720236800876F913B86449CC6964875703FD92844D13AA2D4D41849A31C87C0C42167ACAC7B6
6,097,313 UART: [art] SIG.R = 88A64546E9E6A962AB9897F70B3C03EC527503D7D37DA78C9B25F9F85EF564C29AA175B605B48643D6012265C9D3CB8E
6,104,070 UART: [art] SIG.S = 02BB5618E7C3034E17C2EFA69C5ACAB36124DA1A2C4437D40E6C83E3C7898DB15F0FFF1976DC98831D2D133AC609A7CD
6,127,867 UART: Caliptra RT
6,128,210 UART: [state] CFI Enabled
6,493,569 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,524,581 UART: [rt]cmd =0x4d454153, len=108
6,545,273 >>> mbox cmd response data (12 bytes)
6,545,274 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,897,966 >>> mbox cmd response: success
8,897,966 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,911,258 UART:
8,911,274 UART: Running Caliptra FMC ...
8,911,682 UART:
8,911,825 UART: [state] CFI Enabled
9,001,338 UART: [art] Extend RT PCRs Done
9,001,766 UART: [art] Lock RT PCRs Done
9,003,105 UART: [art] Populate DV Done
9,011,366 UART: [fht] FMC Alias Private Key: 7
9,012,460 UART: [art] Derive CDI
9,012,740 UART: [art] Store in slot 0x4
9,099,156 UART: [art] Derive Key Pair
9,099,516 UART: [art] Store priv key in slot 0x5
9,112,959 UART: [art] Derive Key Pair - Done
9,127,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,143,249 UART: [art] Erasing AUTHORITY.KEYID = 7
9,144,014 UART: [art] PUB.X = D1AF506081A0121C18A222B2AAB6ADA17F60FEAD4F954D3D9BA890D5E26DCA42B98812C200B6492BD732453859AA2AF0
9,150,774 UART: [art] PUB.Y = 73AAB05CAA6450768DD9BD697DE791C7EA8EA500B4F8CEE98DE3639C02BCC11B09207AEC26B8413145431464EC02771E
9,157,703 UART: [art] SIG.R = A1050886A7F8DBB4C848CC86FB17639D6F83A15F7C54E71A126C336C1D7016479B760A17934787883CF8F346952AC0DF
9,164,462 UART: [art] SIG.S = 9499D29782AA30542CAFCEB3E146E9D152D1A1632328E9031100BB7AE55AD2002DC38D4776562E0A99752112ED9B9E8D
9,187,652 UART: mbox::rt_entry...
9,188,024 UART: ____ _ _ _ ____ _____
9,188,808 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,189,608 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,190,376 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,191,144 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,191,912 UART: |_|
9,192,224 UART:
9,556,142 UART: [rt] Runtime listening for mailbox commands...
11,909,537 >>> mbox cmd response: success
11,909,537 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,922,967 UART:
11,922,983 UART: Running Caliptra FMC ...
11,923,391 UART:
11,923,534 UART: [state] CFI Enabled
12,012,773 UART: [art] Extend RT PCRs Done
12,013,201 UART: [art] Lock RT PCRs Done
12,014,340 UART: [art] Populate DV Done
12,022,889 UART: [fht] FMC Alias Private Key: 7
12,023,909 UART: [art] Derive CDI
12,024,189 UART: [art] Store in slot 0x4
12,109,977 UART: [art] Derive Key Pair
12,110,337 UART: [art] Store priv key in slot 0x5
12,123,870 UART: [art] Derive Key Pair - Done
12,138,984 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,154,251 UART: [art] Erasing AUTHORITY.KEYID = 7
12,155,016 UART: [art] PUB.X = 09BF2B2A16A5ED59726C4BBCA9004AC302826B845B3410531497FC48B7A3B643D6F1759ABC15024DB44716C4E77BB101
12,161,754 UART: [art] PUB.Y = F9205F7A34F715B6130EE2641D6AB0082C6A2E2506565394A1A1961011D0400759EEAB0DE6C3FEBF4F9F3CF9EC5FC2E9
12,168,699 UART: [art] SIG.R = A95D30BFA20B8E124EFABDDFF3AA6968F71A98E3BBA17D2A3028FF622BE12281662BE2F15245B582A1B1A82C58795457
12,175,478 UART: [art] SIG.S = 8A7E154BC4F93C361E8FB71FCD89A996F2623085851D902495D07D7CE1D386517E900A67CC293A84E6DB58A614AA2E21
12,199,221 UART: mbox::rt_entry...
12,199,593 UART: ____ _ _ _ ____ _____
12,200,377 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,201,177 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,201,945 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,202,713 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,203,481 UART: |_|
12,203,793 UART:
12,568,913 UART: [rt] Runtime listening for mailbox commands...
12,570,117 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.27s
Truncated 2418 bytes from beginning
135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,172 UART: [ldev] --
1,280,395 UART: [fwproc] Wait for Commands...
1,281,102 UART: [fwproc] Recv command 0x46574c44
1,281,835 UART: [fwproc] Recv'd Img size: 82832 bytes
2,217,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,244,920 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,095 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,362,742 >>> mbox cmd response: success
2,362,742 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,363,840 UART: [afmc] ++
2,364,008 UART: [afmc] CDI.KEYID = 6
2,364,371 UART: [afmc] SUBJECT.KEYID = 7
2,364,797 UART: [afmc] AUTHORITY.KEYID = 5
2,400,458 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,938 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,648 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,529 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,230 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,895 UART: [afmc] --
2,443,840 UART: [cold-reset] --
2,444,436 UART: [state] Locking Datavault
2,445,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,025 UART: [state] Locking ICCM
2,446,681 UART: [exit] Launching FMC @ 0x40000130
2,452,011 UART:
2,452,027 UART: Running Caliptra FMC ...
2,452,435 UART:
2,452,489 UART: [state] CFI Enabled
2,462,999 UART: [fht] FMC Alias Private Key: 7
2,581,977 UART: [art] Extend RT PCRs Done
2,582,405 UART: [art] Lock RT PCRs Done
2,584,027 UART: [art] Populate DV Done
2,592,454 UART: [fht] FMC Alias Private Key: 7
2,593,446 UART: [art] Derive CDI
2,593,726 UART: [art] Store in slot 0x4
2,679,213 UART: [art] Derive Key Pair
2,679,573 UART: [art] Store priv key in slot 0x5
2,693,099 UART: [art] Derive Key Pair - Done
2,707,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,639 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,404 UART: [art] PUB.X = 60B3F3AB017ECE8239FDC6325E2530E557D02B0FF862994E372BC8FF1E971E50A9FEAAE00CD28C244DE58CBB76B6DFED
2,731,187 UART: [art] PUB.Y = D8CA64FC369F52E407A9F302043658A34B261E6F30A50C1DF9B0BD61F413607FE83D89ED2DDB9F92D00461226B8805EA
2,738,125 UART: [art] SIG.R = C7866A8DEDE26BEBDC66FA0055936E934EC52A78C1283894D95BAE100FDDA3116D58C5B44BCA1D3C88DEF89F784F164D
2,744,888 UART: [art] SIG.S = 6DC7C8AF9D19FA91A9A1DA5BEE2DB840E5E1DCC252F3FC4A35CAAEBF409F8AA7E5AC38370B8F34DC4F5BA0C24220B317
2,768,617 UART: mbox::rt_entry...
2,768,989 UART: ____ _ _ _ ____ _____
2,769,773 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,573 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,341 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,109 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,877 UART: |_|
2,773,189 UART:
2,891,807 UART: [rt] Runtime listening for mailbox commands...
2,893,002 >>> mbox cmd response data (48 bytes)
2,893,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,893,114 UART:
2,893,130 UART: Running Caliptra ROM ...
2,893,538 UART:
2,893,593 UART: [state] CFI Enabled
2,896,589 UART: [state] LifecycleState = Unprovisioned
2,897,244 UART: [state] DebugLocked = No
2,897,904 UART: [state] WD Timer not started. Device not locked for debugging
2,899,226 UART: [kat] SHA2-256
3,702,776 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,706,880 UART: [kat] ++
3,707,032 UART: [kat] sha1
3,711,132 UART: [kat] SHA2-256
3,713,072 UART: [kat] SHA2-384
3,715,741 UART: [kat] SHA2-512-ACC
3,717,641 UART: [kat] ECC-384
3,727,196 UART: [kat] HMAC-384Kdf
3,731,836 UART: [kat] LMS
3,980,148 UART: [kat] --
3,981,222 UART: [update-reset] ++
5,340,907 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,342,024 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,497,239 >>> mbox cmd response: success
5,497,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,497,596 UART: [update-reset] Copying MAN_2 To MAN_1
5,505,610 UART: [update-reset Success] --
5,506,445 UART: [state] Locking Datavault
5,507,153 UART: [state] Locking PCR0, PCR1 and PCR31
5,507,757 UART: [state] Locking ICCM
5,508,423 UART: [exit] Launching FMC @ 0x40000130
5,513,753 UART:
5,513,769 UART: Running Caliptra FMC ...
5,514,177 UART:
5,514,231 UART: [state] CFI Enabled
5,603,556 UART: [art] Extend RT PCRs Done
5,603,984 UART: [art] Lock RT PCRs Done
5,605,495 UART: [art] Populate DV Done
5,613,958 UART: [fht] FMC Alias Private Key: 7
5,615,074 UART: [art] Derive CDI
5,615,354 UART: [art] Store in slot 0x4
5,701,219 UART: [art] Derive Key Pair
5,701,579 UART: [art] Store priv key in slot 0x5
5,714,715 UART: [art] Derive Key Pair - Done
5,729,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,744,712 UART: [art] Erasing AUTHORITY.KEYID = 7
5,745,477 UART: [art] PUB.X = C5183E5B1396CF3C216F7E179A4085A5EDEF7F9B159F35F5AF12782B883136B39C05F61D88B4D95A178A693639366A8E
5,752,244 UART: [art] PUB.Y = 18DDE1FB2F262D666C7F6F1D5F5B02CFB49B5C199B433EF2CE7E7F73EB8D2B7B2DDACEDEEB608B99347A086BA94BAA28
5,759,218 UART: [art] SIG.R = D5C83DDBBB0F0D5876F45BA9C289BFFECE2388D454292CC508A3567B1375690764AA0BD898007B5189958EE29F154E5E
5,765,957 UART: [art] SIG.S = 45BF69267FA923BB40548B7385F195FB7DADEFE7891D5C0011BD45289905057C33AC27DDBF852D60791E1AB026149637
5,789,797 UART: Caliptra RT
5,790,048 UART: [state] CFI Enabled
6,154,928 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,185,796 UART: [rt]cmd =0x4d454153, len=108
6,206,788 >>> mbox cmd response data (12 bytes)
6,206,789 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,207,252 UART:
6,207,268 UART: Running Caliptra ROM ...
6,207,676 UART:
6,207,731 UART: [state] CFI Enabled
6,210,227 UART: [state] LifecycleState = Unprovisioned
6,210,882 UART: [state] DebugLocked = No
6,211,612 UART: [state] WD Timer not started. Device not locked for debugging
6,212,768 UART: [kat] SHA2-256
7,016,318 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,020,422 UART: [kat] ++
7,020,574 UART: [kat] sha1
7,024,846 UART: [kat] SHA2-256
7,026,786 UART: [kat] SHA2-384
7,029,491 UART: [kat] SHA2-512-ACC
7,031,391 UART: [kat] ECC-384
7,041,070 UART: [kat] HMAC-384Kdf
7,045,612 UART: [kat] LMS
7,293,924 UART: [kat] --
7,294,918 UART: [update-reset] ++
8,246,144 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,247,215 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,348,856 >>> mbox cmd response: success
8,348,856 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,349,113 UART: [update-reset] Copying MAN_2 To MAN_1
8,357,127 UART: [update-reset Success] --
8,358,230 UART: [state] Locking Datavault
8,358,998 UART: [state] Locking PCR0, PCR1 and PCR31
8,359,602 UART: [state] Locking ICCM
8,360,192 UART: [exit] Launching FMC @ 0x40000130
8,365,522 UART:
8,365,538 UART: Running Caliptra FMC ...
8,365,946 UART:
8,366,000 UART: [state] CFI Enabled
8,455,215 UART: [art] Extend RT PCRs Done
8,455,643 UART: [art] Lock RT PCRs Done
8,456,778 UART: [art] Populate DV Done
8,465,127 UART: [fht] FMC Alias Private Key: 7
8,466,217 UART: [art] Derive CDI
8,466,497 UART: [art] Store in slot 0x4
8,552,482 UART: [art] Derive Key Pair
8,552,842 UART: [art] Store priv key in slot 0x5
8,565,526 UART: [art] Derive Key Pair - Done
8,580,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,595,630 UART: [art] Erasing AUTHORITY.KEYID = 7
8,596,395 UART: [art] PUB.X = 8D967D06013E2FC25858FE28F61295E9AAF642ADB19A87C65D727F4DA06BC631A68CFDF1E64C8702446E290DB23E23CB
8,603,163 UART: [art] PUB.Y = CAA0E1047F803A7DD98E1672D73CB34733F99FF460FA1E1EF21AF8B98D05B7738026974333649DF4581390615E583928
8,610,101 UART: [art] SIG.R = 663DCF6190D4C9E5B81303BD83995C24781EB8A9EEC7A6E4D02E0DB68A238A0D52A2A88DF6504CF35A86779B78646698
8,616,866 UART: [art] SIG.S = 15FBB93E82B3640D340796CA1351C459BDA38047210DF4C437A21F66119F6E1C485A8D99E7FC4E0BF63298E537ABB565
8,640,960 UART: mbox::rt_entry...
8,641,332 UART: ____ _ _ _ ____ _____
8,642,116 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,642,916 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,643,684 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,644,452 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,645,220 UART: |_|
8,645,532 UART:
9,011,315 UART: [rt] Runtime listening for mailbox commands...
9,012,285 UART:
9,012,301 UART: Running Caliptra ROM ...
9,012,709 UART:
9,012,764 UART: [state] CFI Enabled
9,015,438 UART: [state] LifecycleState = Unprovisioned
9,016,093 UART: [state] DebugLocked = No
9,016,783 UART: [state] WD Timer not started. Device not locked for debugging
9,018,035 UART: [kat] SHA2-256
9,821,585 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,825,689 UART: [kat] ++
9,825,841 UART: [kat] sha1
9,830,077 UART: [kat] SHA2-256
9,832,017 UART: [kat] SHA2-384
9,834,762 UART: [kat] SHA2-512-ACC
9,836,662 UART: [kat] ECC-384
9,846,389 UART: [kat] HMAC-384Kdf
9,850,967 UART: [kat] LMS
10,099,279 UART: [kat] --
10,100,077 UART: [update-reset] ++
11,049,819 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
11,050,906 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
11,152,547 >>> mbox cmd response: success
11,152,547 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,152,900 UART: [update-reset] Copying MAN_2 To MAN_1
11,160,914 UART: [update-reset Success] --
11,161,953 UART: [state] Locking Datavault
11,162,851 UART: [state] Locking PCR0, PCR1 and PCR31
11,163,455 UART: [state] Locking ICCM
11,164,055 UART: [exit] Launching FMC @ 0x40000130
11,169,385 UART:
11,169,401 UART: Running Caliptra FMC ...
11,169,809 UART:
11,169,863 UART: [state] CFI Enabled
11,258,600 UART: [art] Extend RT PCRs Done
11,259,028 UART: [art] Lock RT PCRs Done
11,260,263 UART: [art] Populate DV Done
11,268,526 UART: [fht] FMC Alias Private Key: 7
11,269,528 UART: [art] Derive CDI
11,269,808 UART: [art] Store in slot 0x4
11,355,833 UART: [art] Derive Key Pair
11,356,193 UART: [art] Store priv key in slot 0x5
11,369,651 UART: [art] Derive Key Pair - Done
11,384,667 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,400,398 UART: [art] Erasing AUTHORITY.KEYID = 7
11,401,163 UART: [art] PUB.X = FE5709F2F3189049B09C42DDACCC3EEA0022C58C24C57F9E47AAEB298B1BABDC5D238BF5A900827181AF53137F0503C1
11,407,894 UART: [art] PUB.Y = 844A3EDBBFDC6FF62B4FEE953F795E94F26CAC9010CE1B7D879BA559E5F1674CADC26DD5339B63E1E58D5B5FE6CFC4D5
11,414,872 UART: [art] SIG.R = 68293F1292DEE15FAB2483931C704EEDD031A2A921EDB9B0DA2326BC926B41CC50DC2BDB36A61041FB40BAF06B93BC60
11,421,658 UART: [art] SIG.S = BF2A11978E7D03C4638DFA2743B7062ADEB62A37C23DB967E50BCCD088DD869E01DC3034735F34850A1DB6E9E03A64BF
11,445,013 UART: mbox::rt_entry...
11,445,385 UART: ____ _ _ _ ____ _____
11,446,169 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,446,969 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,447,737 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,448,505 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,449,273 UART: |_|
11,449,585 UART:
11,812,891 UART: [rt] Runtime listening for mailbox commands...
11,814,095 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,326 ready_for_fw is high
1,058,326 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,214,605 >>> mbox cmd response: success
2,214,605 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,276,806 UART:
2,276,822 UART: Running Caliptra FMC ...
2,277,230 UART:
2,277,284 UART: [state] CFI Enabled
2,287,750 UART: [fht] FMC Alias Private Key: 7
2,407,178 UART: [art] Extend RT PCRs Done
2,407,606 UART: [art] Lock RT PCRs Done
2,408,996 UART: [art] Populate DV Done
2,417,115 UART: [fht] FMC Alias Private Key: 7
2,418,143 UART: [art] Derive CDI
2,418,423 UART: [art] Store in slot 0x4
2,504,156 UART: [art] Derive Key Pair
2,504,516 UART: [art] Store priv key in slot 0x5
2,517,908 UART: [art] Derive Key Pair - Done
2,532,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,547,608 UART: [art] Erasing AUTHORITY.KEYID = 7
2,548,373 UART: [art] PUB.X = 8962DB8CF8E952B5864A8233276E25184A6A5653D76E3EEE9C1E4665AF1254770589486620745B8D983046A57EA93733
2,555,126 UART: [art] PUB.Y = 7EC8422118183460D6EB21F0CEED0B6B351F3C16EB8CAB724CF767CA5B12C0FB0C913A904E4204C2E9D3AE5A3619341F
2,562,079 UART: [art] SIG.R = 85CE4FC69EF1288DF648FC4609F9BE5BABD2D640F076538074CB260CCF58F72950020CA4C94C57FB892FCBCCA1B1ADD1
2,568,857 UART: [art] SIG.S = B6E820FB079658BA765893CD3DD22DE4A2C63351EAFF9480A7F050C49F812D117005C273C882CE64E191B8D49EEE2C0A
2,592,418 UART: mbox::rt_entry...
2,592,790 UART: ____ _ _ _ ____ _____
2,593,574 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,594,374 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,595,142 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,595,910 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,596,678 UART: |_|
2,596,990 UART:
2,714,681 UART: [rt] Runtime listening for mailbox commands...
2,715,876 >>> mbox cmd response data (48 bytes)
2,715,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,203,935 >>> mbox cmd response: success
5,203,935 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,217,418 UART:
5,217,434 UART: Running Caliptra FMC ...
5,217,842 UART:
5,217,896 UART: [state] CFI Enabled
5,307,105 UART: [art] Extend RT PCRs Done
5,307,533 UART: [art] Lock RT PCRs Done
5,308,990 UART: [art] Populate DV Done
5,317,451 UART: [fht] FMC Alias Private Key: 7
5,318,607 UART: [art] Derive CDI
5,318,887 UART: [art] Store in slot 0x4
5,404,616 UART: [art] Derive Key Pair
5,404,976 UART: [art] Store priv key in slot 0x5
5,418,234 UART: [art] Derive Key Pair - Done
5,433,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,448,489 UART: [art] Erasing AUTHORITY.KEYID = 7
5,449,254 UART: [art] PUB.X = 04324D68CE226E066C2EE2C498C1E73471C8A46C327BB4CFCE15B86D237B8993ADF1704FFAD19155518EC2BE02C9F35C
5,456,025 UART: [art] PUB.Y = D1AF7720C31CE8BC9CFFB821A77B31ED4BB08689FD13E13DEA2DF5DB99BFA6EE2F21DD97D4E3BD1918E76072EF9F5481
5,463,001 UART: [art] SIG.R = 4667E2CC8EE320CED11C65C8F86E75FFC243416C4206389C1BDFE1951CFB503A0918983CC9DD7D7DB1F525037BB633C3
5,469,772 UART: [art] SIG.S = 3EB74F1CD28C9B8B58BAE1C571BBA3915BC10C752603E053C80CD0F13403B561637D198D5B7BF8906ACC694A1B78B675
5,493,866 UART: Caliptra RT
5,494,117 UART: [state] CFI Enabled
5,860,720 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,892,208 UART: [rt]cmd =0x4d454153, len=108
5,912,654 >>> mbox cmd response data (12 bytes)
5,912,655 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,937,780 >>> mbox cmd response: success
7,937,780 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,951,547 UART:
7,951,563 UART: Running Caliptra FMC ...
7,951,971 UART:
7,952,025 UART: [state] CFI Enabled
8,040,624 UART: [art] Extend RT PCRs Done
8,041,052 UART: [art] Lock RT PCRs Done
8,042,543 UART: [art] Populate DV Done
8,050,676 UART: [fht] FMC Alias Private Key: 7
8,051,814 UART: [art] Derive CDI
8,052,094 UART: [art] Store in slot 0x4
8,138,341 UART: [art] Derive Key Pair
8,138,701 UART: [art] Store priv key in slot 0x5
8,152,297 UART: [art] Derive Key Pair - Done
8,167,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,182,869 UART: [art] Erasing AUTHORITY.KEYID = 7
8,183,634 UART: [art] PUB.X = C6BEC3F2FDDA472E9F1EAB16B1DDA28757C702880334FA2B9ACCB1C70F2EA7A6E90D8C576386AA3D7DAA918C11442AB9
8,190,416 UART: [art] PUB.Y = 362B3DF6C8F8B1824B36983FEF0AA808B894B9BD64056DC4DE6F017F14861686BD773C50A31F6214A505F699AC6395D1
8,197,353 UART: [art] SIG.R = D2C8AE0E99829645F8399680F22408AE447096B546A007678390A8A2B78AFCA7F2C2DB8DE338643A3CAC8E07E9223F71
8,204,111 UART: [art] SIG.S = E13B9711EF0922E1DB72C085ADFE40FE95694509016871679BC07D782138A61B08D071099F59B13CA7443159552E8228
8,228,188 UART: mbox::rt_entry...
8,228,560 UART: ____ _ _ _ ____ _____
8,229,344 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,230,144 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,230,912 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,231,680 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,232,448 UART: |_|
8,232,760 UART:
8,592,245 UART: [rt] Runtime listening for mailbox commands...
10,617,697 >>> mbox cmd response: success
10,617,697 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,631,194 UART:
10,631,210 UART: Running Caliptra FMC ...
10,631,618 UART:
10,631,672 UART: [state] CFI Enabled
10,721,339 UART: [art] Extend RT PCRs Done
10,721,767 UART: [art] Lock RT PCRs Done
10,723,132 UART: [art] Populate DV Done
10,731,179 UART: [fht] FMC Alias Private Key: 7
10,732,331 UART: [art] Derive CDI
10,732,611 UART: [art] Store in slot 0x4
10,818,390 UART: [art] Derive Key Pair
10,818,750 UART: [art] Store priv key in slot 0x5
10,831,932 UART: [art] Derive Key Pair - Done
10,846,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,861,564 UART: [art] Erasing AUTHORITY.KEYID = 7
10,862,329 UART: [art] PUB.X = 47CAEB78EEEB12AC1BF5E90C9CE5B75A10F37E8B67B34B249402DF553B85A465448CE194798F6F4C31614F238CF79261
10,869,101 UART: [art] PUB.Y = 4683DD5588D3F22712ECDE7ADA66CC3C22E5BEA606741E4D6747C46B0F768386DEFB270DF1D600B84067B0222C27D975
10,876,026 UART: [art] SIG.R = 2D0C2C48BB6E1F7E84070E1F6099295DB7A09BEA47B485853D60289F0B779B37DC41A2760F1CF127D300043ADB04BACE
10,882,761 UART: [art] SIG.S = 32371DBF0DA6B1A9A693E3ADF56C1811EADD1E1CB8ADC22A9BD0A68FED896984E8E749C13F46E4D1F5C6413A6AED45DA
10,906,394 UART: mbox::rt_entry...
10,906,766 UART: ____ _ _ _ ____ _____
10,907,550 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,908,350 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,909,118 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,909,886 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,910,654 UART: |_|
10,910,966 UART:
11,273,641 UART: [rt] Runtime listening for mailbox commands...
11,274,845 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.95s
Truncated 2418 bytes from beginning
135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,975 UART: [ldev] --
1,281,386 UART: [fwproc] Wait for Commands...
1,282,123 UART: [fwproc] Recv command 0x46574c44
1,282,856 UART: [fwproc] Recv'd Img size: 82832 bytes
2,217,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,305 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,480 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,103 >>> mbox cmd response: success
2,363,103 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,364,261 UART: [afmc] ++
2,364,429 UART: [afmc] CDI.KEYID = 6
2,364,792 UART: [afmc] SUBJECT.KEYID = 7
2,365,218 UART: [afmc] AUTHORITY.KEYID = 5
2,400,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,981 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,691 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,572 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,273 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,028 UART: [afmc] --
2,443,907 UART: [cold-reset] --
2,444,927 UART: [state] Locking Datavault
2,446,154 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,758 UART: [state] Locking ICCM
2,447,272 UART: [exit] Launching FMC @ 0x40000130
2,452,602 UART:
2,452,618 UART: Running Caliptra FMC ...
2,453,026 UART:
2,453,169 UART: [state] CFI Enabled
2,463,877 UART: [fht] FMC Alias Private Key: 7
2,583,075 UART: [art] Extend RT PCRs Done
2,583,503 UART: [art] Lock RT PCRs Done
2,585,077 UART: [art] Populate DV Done
2,593,222 UART: [fht] FMC Alias Private Key: 7
2,594,376 UART: [art] Derive CDI
2,594,656 UART: [art] Store in slot 0x4
2,680,311 UART: [art] Derive Key Pair
2,680,671 UART: [art] Store priv key in slot 0x5
2,694,367 UART: [art] Derive Key Pair - Done
2,709,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,212 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,977 UART: [art] PUB.X = BC71590E469FD5A7E85AD1F9A4606197DC50D4D8C74CB96741B5ED8286BD1A4FD32858BB6131FE928EFE008C2089B9BE
2,732,734 UART: [art] PUB.Y = 53CD774A3996131C3C94C377165ABDDAE8F837A62C659C290235870FF7D5B651B50ECD25A979B446EF555764773801B4
2,739,668 UART: [art] SIG.R = 8B109139D9D76843F322E4972DCA2B777CBEFBB24EB514F3C9A00DF98F508A47E13763736C187FF963A97BF8B70FFF30
2,746,440 UART: [art] SIG.S = 5A20FBBB6BE25A75DE72337847DF5BA47BF5492B31F07DDEE652C89F2F00BC41FC8AD4FB9B7FDAB72D03B0287AB3F0F7
2,770,641 UART: mbox::rt_entry...
2,771,013 UART: ____ _ _ _ ____ _____
2,771,797 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,597 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,773,365 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,774,133 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,901 UART: |_|
2,775,213 UART:
2,893,151 UART: [rt] Runtime listening for mailbox commands...
2,894,346 >>> mbox cmd response data (48 bytes)
2,894,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,894,458 UART:
2,894,474 UART: Running Caliptra ROM ...
2,894,882 UART:
2,895,024 UART: [state] CFI Enabled
2,898,060 UART: [state] LifecycleState = Unprovisioned
2,898,715 UART: [state] DebugLocked = No
2,899,255 UART: [state] WD Timer not started. Device not locked for debugging
2,900,475 UART: [kat] SHA2-256
3,704,025 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,708,129 UART: [kat] ++
3,708,281 UART: [kat] sha1
3,712,399 UART: [kat] SHA2-256
3,714,339 UART: [kat] SHA2-384
3,717,108 UART: [kat] SHA2-512-ACC
3,719,008 UART: [kat] ECC-384
3,729,071 UART: [kat] HMAC-384Kdf
3,733,571 UART: [kat] LMS
3,981,883 UART: [kat] --
3,982,821 UART: [update-reset] ++
5,341,947 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,343,108 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,498,323 >>> mbox cmd response: success
5,498,323 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,498,486 UART: [update-reset] Copying MAN_2 To MAN_1
5,506,500 UART: [update-reset Success] --
5,507,525 UART: [state] Locking Datavault
5,508,155 UART: [state] Locking PCR0, PCR1 and PCR31
5,508,759 UART: [state] Locking ICCM
5,509,367 UART: [exit] Launching FMC @ 0x40000130
5,514,697 UART:
5,514,713 UART: Running Caliptra FMC ...
5,515,121 UART:
5,515,264 UART: [state] CFI Enabled
5,604,843 UART: [art] Extend RT PCRs Done
5,605,271 UART: [art] Lock RT PCRs Done
5,606,542 UART: [art] Populate DV Done
5,614,473 UART: [fht] FMC Alias Private Key: 7
5,615,571 UART: [art] Derive CDI
5,615,851 UART: [art] Store in slot 0x4
5,701,874 UART: [art] Derive Key Pair
5,702,234 UART: [art] Store priv key in slot 0x5
5,715,632 UART: [art] Derive Key Pair - Done
5,730,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,746,064 UART: [art] Erasing AUTHORITY.KEYID = 7
5,746,829 UART: [art] PUB.X = CB2A35745289D80AC7BCBA24694A3B649B7CD56496F5A5D266679E81FA3170F387FAD3C1FB387A0BE2814F726EDA611F
5,753,603 UART: [art] PUB.Y = 1813BA560B92ACAF5CDAA37CEC9ECE336972B1FC86212C59C0522588DEAFDE55DA69947F8C977084F59A78AFF63DD0F3
5,760,568 UART: [art] SIG.R = C832E18C5CC17AAFA8C3ABD1F83BD58883E4CF7807F5D1A9CF57464B0FDA30A71E7F481A7AFD76AC58FC00C6392B0EBA
5,767,333 UART: [art] SIG.S = 021041CA41A63D628448051CC796621C027A773625FF5C157B407F4D4555670447F01E6FA0AA204710E8E321F4B2205C
5,791,167 UART: Caliptra RT
5,791,510 UART: [state] CFI Enabled
6,156,104 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,187,180 UART: [rt]cmd =0x4d454153, len=108
6,207,604 >>> mbox cmd response data (12 bytes)
6,207,605 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,208,208 UART:
6,208,224 UART: Running Caliptra ROM ...
6,208,632 UART:
6,208,774 UART: [state] CFI Enabled
6,212,000 UART: [state] LifecycleState = Unprovisioned
6,212,655 UART: [state] DebugLocked = No
6,213,217 UART: [state] WD Timer not started. Device not locked for debugging
6,214,525 UART: [kat] SHA2-256
7,018,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,022,179 UART: [kat] ++
7,022,331 UART: [kat] sha1
7,026,541 UART: [kat] SHA2-256
7,028,481 UART: [kat] SHA2-384
7,031,204 UART: [kat] SHA2-512-ACC
7,033,104 UART: [kat] ECC-384
7,043,269 UART: [kat] HMAC-384Kdf
7,047,779 UART: [kat] LMS
7,296,091 UART: [kat] --
7,296,927 UART: [update-reset] ++
8,247,065 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,248,128 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,349,769 >>> mbox cmd response: success
8,349,769 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,349,992 UART: [update-reset] Copying MAN_2 To MAN_1
8,358,006 UART: [update-reset Success] --
8,359,137 UART: [state] Locking Datavault
8,359,911 UART: [state] Locking PCR0, PCR1 and PCR31
8,360,515 UART: [state] Locking ICCM
8,361,007 UART: [exit] Launching FMC @ 0x40000130
8,366,337 UART:
8,366,353 UART: Running Caliptra FMC ...
8,366,761 UART:
8,366,904 UART: [state] CFI Enabled
8,456,435 UART: [art] Extend RT PCRs Done
8,456,863 UART: [art] Lock RT PCRs Done
8,458,212 UART: [art] Populate DV Done
8,466,397 UART: [fht] FMC Alias Private Key: 7
8,467,409 UART: [art] Derive CDI
8,467,689 UART: [art] Store in slot 0x4
8,553,692 UART: [art] Derive Key Pair
8,554,052 UART: [art] Store priv key in slot 0x5
8,567,766 UART: [art] Derive Key Pair - Done
8,582,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,598,253 UART: [art] Erasing AUTHORITY.KEYID = 7
8,599,018 UART: [art] PUB.X = 25DE9F89EEAC4D56EBCC9FDD9CA015F470B9DB17059C15CC6879C3D28EB31E86B550ECDD1A25C9A4D85F0C7151B61443
8,605,802 UART: [art] PUB.Y = 7CD3B173877436D5EA27B6734B70401CF3EB218713339A13A070BB22A0F2CE2F8A6591C14D1ECD52B4E84AFFAD86FE3E
8,612,764 UART: [art] SIG.R = 3CC3AD2BAA2F6744A95A4BF1EDE8EB1D02509D219DAA4F78173499B36B03A263EC2BB8190E394EC74CA9D96C24FD801F
8,619,543 UART: [art] SIG.S = 5FA58BD28677E9205BFEE3DED0B992F0249D9ACC7A3C07AC11724CB72CF4E73F39CB741FE34AAD860CC6B247E7304601
8,642,562 UART: mbox::rt_entry...
8,642,934 UART: ____ _ _ _ ____ _____
8,643,718 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,644,518 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,645,286 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,646,054 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,646,822 UART: |_|
8,647,134 UART:
9,013,925 UART: [rt] Runtime listening for mailbox commands...
9,014,895 UART:
9,014,911 UART: Running Caliptra ROM ...
9,015,319 UART:
9,015,461 UART: [state] CFI Enabled
9,018,327 UART: [state] LifecycleState = Unprovisioned
9,018,982 UART: [state] DebugLocked = No
9,019,632 UART: [state] WD Timer not started. Device not locked for debugging
9,020,934 UART: [kat] SHA2-256
9,824,484 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,828,588 UART: [kat] ++
9,828,740 UART: [kat] sha1
9,832,934 UART: [kat] SHA2-256
9,834,874 UART: [kat] SHA2-384
9,837,645 UART: [kat] SHA2-512-ACC
9,839,545 UART: [kat] ECC-384
9,849,150 UART: [kat] HMAC-384Kdf
9,853,886 UART: [kat] LMS
10,102,198 UART: [kat] --
10,102,948 UART: [update-reset] ++
11,053,214 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
11,054,227 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
11,155,868 >>> mbox cmd response: success
11,155,868 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,156,221 UART: [update-reset] Copying MAN_2 To MAN_1
11,164,235 UART: [update-reset Success] --
11,165,150 UART: [state] Locking Datavault
11,165,840 UART: [state] Locking PCR0, PCR1 and PCR31
11,166,444 UART: [state] Locking ICCM
11,167,056 UART: [exit] Launching FMC @ 0x40000130
11,172,386 UART:
11,172,402 UART: Running Caliptra FMC ...
11,172,810 UART:
11,172,953 UART: [state] CFI Enabled
11,262,544 UART: [art] Extend RT PCRs Done
11,262,972 UART: [art] Lock RT PCRs Done
11,264,485 UART: [art] Populate DV Done
11,272,464 UART: [fht] FMC Alias Private Key: 7
11,273,622 UART: [art] Derive CDI
11,273,902 UART: [art] Store in slot 0x4
11,359,959 UART: [art] Derive Key Pair
11,360,319 UART: [art] Store priv key in slot 0x5
11,373,637 UART: [art] Derive Key Pair - Done
11,388,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,404,433 UART: [art] Erasing AUTHORITY.KEYID = 7
11,405,198 UART: [art] PUB.X = AD16D15D06FE882C3926E3F7B5E84BBF5BBA6636367036AEA0544841D78DE09D7123E2E14A78A6DAEDAFE5D7AAFE394C
11,411,985 UART: [art] PUB.Y = 001671497E609E0E9EF302499838DEBD52748E849E266BC9BE0A70FF45A79DD02FC4D49B68115FBCDE39D178817C8CA8
11,418,910 UART: [art] SIG.R = 3AB78C46DBC4CA3717F9830F51B3B690FE098B3A6C46B6BBB4F1E251F038CE7CBE613F50A8A90F614466198579F33232
11,425,677 UART: [art] SIG.S = EA7182CB6D47E04DBE51A381262A17A2AFECA824423C2CB9E47AF81CC8191F8B62D035085FA3085A1480B97855B17C82
11,449,177 UART: mbox::rt_entry...
11,449,549 UART: ____ _ _ _ ____ _____
11,450,333 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,451,133 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,451,901 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,452,669 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,453,437 UART: |_|
11,453,749 UART:
11,817,333 UART: [rt] Runtime listening for mailbox commands...
11,818,537 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,559 ready_for_fw is high
1,059,559 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,076 >>> mbox cmd response: success
2,217,076 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,279,231 UART:
2,279,247 UART: Running Caliptra FMC ...
2,279,655 UART:
2,279,798 UART: [state] CFI Enabled
2,290,394 UART: [fht] FMC Alias Private Key: 7
2,409,646 UART: [art] Extend RT PCRs Done
2,410,074 UART: [art] Lock RT PCRs Done
2,411,438 UART: [art] Populate DV Done
2,419,899 UART: [fht] FMC Alias Private Key: 7
2,421,067 UART: [art] Derive CDI
2,421,347 UART: [art] Store in slot 0x4
2,507,568 UART: [art] Derive Key Pair
2,507,928 UART: [art] Store priv key in slot 0x5
2,521,424 UART: [art] Derive Key Pair - Done
2,536,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,552,208 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,973 UART: [art] PUB.X = E24C27C507867610EB661F32752F2FCF1E9F900642FC54B74C5118D06EE2A885899F0CD69EDC5984EA0B1712C6B43D69
2,559,733 UART: [art] PUB.Y = 62623F3B3D07340D1B97A0AAA8375CEEC5EDE9736B6406CBAA67D6B497376438512BDA58344D146339C7669C2C3CD742
2,566,676 UART: [art] SIG.R = 72DDFABA23045224CD814E6CED4A5A128920C40F53D92861704E15B2B545514C4CC2CF0EFEF4DE7E4D5A89958DB93EB6
2,573,451 UART: [art] SIG.S = A3BCAA7A6EE4F376FB9CB1EE27E0A547C87326350DA72F67A02C7D2F6BA523BFF41529007D1800278D26F691CB0749C1
2,597,449 UART: mbox::rt_entry...
2,597,821 UART: ____ _ _ _ ____ _____
2,598,605 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,599,405 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,600,173 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,941 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,709 UART: |_|
2,602,021 UART:
2,720,467 UART: [rt] Runtime listening for mailbox commands...
2,721,662 >>> mbox cmd response data (48 bytes)
2,721,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,209,448 >>> mbox cmd response: success
5,209,448 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,222,501 UART:
5,222,517 UART: Running Caliptra FMC ...
5,222,925 UART:
5,223,068 UART: [state] CFI Enabled
5,311,739 UART: [art] Extend RT PCRs Done
5,312,167 UART: [art] Lock RT PCRs Done
5,313,608 UART: [art] Populate DV Done
5,321,937 UART: [fht] FMC Alias Private Key: 7
5,323,055 UART: [art] Derive CDI
5,323,335 UART: [art] Store in slot 0x4
5,409,482 UART: [art] Derive Key Pair
5,409,842 UART: [art] Store priv key in slot 0x5
5,423,326 UART: [art] Derive Key Pair - Done
5,438,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,453,428 UART: [art] Erasing AUTHORITY.KEYID = 7
5,454,193 UART: [art] PUB.X = 1A702C0D33B60B65633CD4746A2BDF9135CD964C4C262B0220184E8D01049B1F6A0B661A3FFA0B32FD0D0C9A8348499D
5,460,940 UART: [art] PUB.Y = 7E8AB4646A148B87557AE14B4F73B15E7194B7AD5E67FBB57A2121D14519808F44D71E81987E9E8DA764D7EE7ED8054E
5,467,891 UART: [art] SIG.R = 329EF2F0BCA6FF9C3BB988C1605F6A00076C3A4313FA24A44D0BED82C6F19D5B0E79EADBD3865EFD04302429962FBE27
5,474,643 UART: [art] SIG.S = 15925B936705FF003B0EA7CF08A077242FF5F63E82150760765A84A478BECFB1D6CE0F8E50E35E0C695C5D9CA7E9C8CA
5,498,363 UART: Caliptra RT
5,498,706 UART: [state] CFI Enabled
5,863,003 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,894,313 UART: [rt]cmd =0x4d454153, len=108
5,915,111 >>> mbox cmd response data (12 bytes)
5,915,112 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,942,406 >>> mbox cmd response: success
7,942,406 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,955,803 UART:
7,955,819 UART: Running Caliptra FMC ...
7,956,227 UART:
7,956,370 UART: [state] CFI Enabled
8,045,743 UART: [art] Extend RT PCRs Done
8,046,171 UART: [art] Lock RT PCRs Done
8,047,586 UART: [art] Populate DV Done
8,056,111 UART: [fht] FMC Alias Private Key: 7
8,057,113 UART: [art] Derive CDI
8,057,393 UART: [art] Store in slot 0x4
8,143,696 UART: [art] Derive Key Pair
8,144,056 UART: [art] Store priv key in slot 0x5
8,157,240 UART: [art] Derive Key Pair - Done
8,171,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,187,054 UART: [art] Erasing AUTHORITY.KEYID = 7
8,187,819 UART: [art] PUB.X = F2D60F6FBDD6A2595B898A0488B74D12357CB27F8F916A7BAAD626E1B30A39EECE419A4D877C52FC044856EBC0E297BE
8,194,593 UART: [art] PUB.Y = A861FD7B278CB4C16E5A181DF842E58698603FDF850AE2F6EB29BA1F992CE8F5EFDC9FEE6E4E065225C7B2492372C56F
8,201,553 UART: [art] SIG.R = CC1B07CEB0AA4DA9FBB389709277D62F02175E4BD14CD19F41BAA260453A3331988710AA8A16067EE73C6934A4FB6003
8,208,317 UART: [art] SIG.S = F9BD90D502A1883F10C8648BB291416259D2400A660ADA17E1D78880FE00EA5ED5EAFAA4D4241DCC67F4064D985CADEC
8,231,469 UART: mbox::rt_entry...
8,231,841 UART: ____ _ _ _ ____ _____
8,232,625 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,233,425 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,234,193 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,234,961 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,235,729 UART: |_|
8,236,041 UART:
8,600,640 UART: [rt] Runtime listening for mailbox commands...
10,627,745 >>> mbox cmd response: success
10,627,745 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,641,154 UART:
10,641,170 UART: Running Caliptra FMC ...
10,641,578 UART:
10,641,721 UART: [state] CFI Enabled
10,730,978 UART: [art] Extend RT PCRs Done
10,731,406 UART: [art] Lock RT PCRs Done
10,732,743 UART: [art] Populate DV Done
10,740,988 UART: [fht] FMC Alias Private Key: 7
10,742,150 UART: [art] Derive CDI
10,742,430 UART: [art] Store in slot 0x4
10,828,415 UART: [art] Derive Key Pair
10,828,775 UART: [art] Store priv key in slot 0x5
10,841,473 UART: [art] Derive Key Pair - Done
10,856,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,871,161 UART: [art] Erasing AUTHORITY.KEYID = 7
10,871,926 UART: [art] PUB.X = E4C00D8F1CFA9132EE61AE7BA7C8EFCE066A751E8D2EC450DC67192A0C2167BEFDD818EEC25DD86B0EB04BFAE7E57691
10,878,712 UART: [art] PUB.Y = 195C2CF5B758A3616D638DD17D5FCE709AC2AD3C1ED9E55BE15F8B65630E5D900B18FC20092F9F5D1ED1066876415798
10,885,656 UART: [art] SIG.R = B3EC46E5402846A5E887231F009772A2A7A22452FD54B48A514BA7F33C70233655D5A561AEBDF7408CC6F2E88C247D7B
10,892,406 UART: [art] SIG.S = 2CCF4BD0DD91E268425C6D88DFB475FF88D833AD4E9CDE05C61E0F9E76FC680C2211A0E8BB9652005E182D97EC8ADD71
10,916,323 UART: mbox::rt_entry...
10,916,695 UART: ____ _ _ _ ____ _____
10,917,479 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,918,279 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,919,047 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,919,815 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,920,583 UART: |_|
10,920,895 UART:
11,283,183 UART: [rt] Runtime listening for mailbox commands...
11,284,387 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.90s
Truncated 2418 bytes from beginning
135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,163 UART: [ldev] --
1,282,572 UART: [fwproc] Wait for Commands...
1,283,186 UART: [fwproc] Recv command 0x46574c44
1,283,914 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,667 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,837 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,536 >>> mbox cmd response: success
2,363,536 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,364,608 UART: [afmc] ++
2,364,776 UART: [afmc] CDI.KEYID = 6
2,365,138 UART: [afmc] SUBJECT.KEYID = 7
2,365,563 UART: [afmc] AUTHORITY.KEYID = 5
2,401,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,271 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,980 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,863 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,564 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,566 UART: [afmc] --
2,444,518 UART: [cold-reset] --
2,445,294 UART: [state] Locking Datavault
2,446,707 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,311 UART: [state] Locking ICCM
2,447,769 UART: [exit] Launching FMC @ 0x40000130
2,453,099 UART:
2,453,115 UART: Running Caliptra FMC ...
2,453,523 UART:
2,453,577 UART: [state] CFI Enabled
2,463,781 UART: [fht] FMC Alias Private Key: 7
2,582,149 UART: [art] Extend RT PCRs Done
2,582,577 UART: [art] Lock RT PCRs Done
2,584,483 UART: [art] Populate DV Done
2,592,698 UART: [fht] FMC Alias Private Key: 7
2,593,644 UART: [art] Derive CDI
2,593,924 UART: [art] Store in slot 0x4
2,679,765 UART: [art] Derive Key Pair
2,680,125 UART: [art] Store priv key in slot 0x5
2,693,033 UART: [art] Derive Key Pair - Done
2,708,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,485 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,250 UART: [art] PUB.X = C65E9F3E4530ECE1D231CABCE1FFC713EC5BC7E34DC3C583E1094AF7B7C780353F30DB6F761984443EBA858DA6CCADC7
2,731,041 UART: [art] PUB.Y = 241CCFB0BC04B98ED7601D6A1EB7CEE0BCBB1D01CEE5EAE15F99A6E73E99F537998864766B0FF706F4A7AA12789D1554
2,737,997 UART: [art] SIG.R = 1CF640B69809E623F0BD96B8967FB481F98AD530A278432AC71A11BCB890C9548301893CC8B86B7EA4583F952A4A0C0F
2,744,757 UART: [art] SIG.S = EF0D08C2C96F85537CF1E8C95AF698139C6191E3C132D9F0FCEA19E2365CB9C9B5A363634AFC30C108DF9B0BE14603C2
2,768,876 UART: mbox::rt_entry...
2,769,248 UART: ____ _ _ _ ____ _____
2,770,032 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,832 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,600 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,368 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,136 UART: |_|
2,773,448 UART:
2,892,156 UART: [rt] Runtime listening for mailbox commands...
2,893,351 >>> mbox cmd response data (48 bytes)
2,893,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,893,463 UART:
2,893,479 UART: Running Caliptra ROM ...
2,893,887 UART:
2,893,942 UART: [state] CFI Enabled
2,896,738 UART: [state] LifecycleState = Unprovisioned
2,897,393 UART: [state] DebugLocked = No
2,898,033 UART: [state] WD Timer not started. Device not locked for debugging
2,899,169 UART: [kat] SHA2-256
3,704,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,708,944 UART: [kat] ++
3,709,096 UART: [kat] sha1
3,713,428 UART: [kat] SHA2-256
3,715,368 UART: [kat] SHA2-384
3,718,069 UART: [kat] SHA2-512-ACC
3,719,969 UART: [kat] ECC-384
3,729,774 UART: [kat] HMAC-384Kdf
3,734,354 UART: [kat] LMS
3,982,682 UART: [kat] --
3,983,668 UART: [update-reset] ++
5,342,386 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,343,485 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,498,700 >>> mbox cmd response: success
5,498,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,498,939 UART: [update-reset] Copying MAN_2 To MAN_1
5,506,953 UART: [update-reset Success] --
5,508,004 UART: [state] Locking Datavault
5,508,812 UART: [state] Locking PCR0, PCR1 and PCR31
5,509,416 UART: [state] Locking ICCM
5,510,038 UART: [exit] Launching FMC @ 0x40000130
5,515,368 UART:
5,515,384 UART: Running Caliptra FMC ...
5,515,792 UART:
5,515,846 UART: [state] CFI Enabled
5,604,871 UART: [art] Extend RT PCRs Done
5,605,299 UART: [art] Lock RT PCRs Done
5,606,650 UART: [art] Populate DV Done
5,614,647 UART: [fht] FMC Alias Private Key: 7
5,615,825 UART: [art] Derive CDI
5,616,105 UART: [art] Store in slot 0x4
5,701,894 UART: [art] Derive Key Pair
5,702,254 UART: [art] Store priv key in slot 0x5
5,715,216 UART: [art] Derive Key Pair - Done
5,729,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,745,135 UART: [art] Erasing AUTHORITY.KEYID = 7
5,745,900 UART: [art] PUB.X = BB8895C02D8521FB23E68BC68AC8FAC38172C6E0761F85FC86CA8E1C9CA1126ED730D84BD7C66E9504F9D9AE577A4F2A
5,752,683 UART: [art] PUB.Y = 83AB1464BC67F6E35D7D16E9866BBB19DCB4B0175A74BF527044D8E3403D102C7F4B1EBD87A0C10F3716AE27ADC7FB03
5,759,641 UART: [art] SIG.R = 867CD0707FBB77CB379B44BC20FFE6E3C188952280F3D20516642F5CFF5F4CFDB70955C7B3BC38598EE3151757C8D7F4
5,766,413 UART: [art] SIG.S = 1D0BF8BD5DB304BF0D17461074D4203E6113838515F11C74E478E629F9F2D443703FE39C44834DC642EDD2D5E4E83A6A
5,790,006 UART: Caliptra RT
5,790,257 UART: [state] CFI Enabled
6,155,449 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,186,437 UART: [rt]cmd =0x4d454153, len=108
6,207,501 >>> mbox cmd response data (12 bytes)
6,207,502 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,208,011 UART:
6,208,027 UART: Running Caliptra ROM ...
6,208,435 UART:
6,208,490 UART: [state] CFI Enabled
6,210,830 UART: [state] LifecycleState = Unprovisioned
6,211,485 UART: [state] DebugLocked = No
6,212,043 UART: [state] WD Timer not started. Device not locked for debugging
6,213,277 UART: [kat] SHA2-256
7,018,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,023,052 UART: [kat] ++
7,023,204 UART: [kat] sha1
7,027,290 UART: [kat] SHA2-256
7,029,230 UART: [kat] SHA2-384
7,031,899 UART: [kat] SHA2-512-ACC
7,033,799 UART: [kat] ECC-384
7,043,582 UART: [kat] HMAC-384Kdf
7,048,130 UART: [kat] LMS
7,296,458 UART: [kat] --
7,297,490 UART: [update-reset] ++
8,248,095 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,249,136 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,350,777 >>> mbox cmd response: success
8,350,777 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,351,056 UART: [update-reset] Copying MAN_2 To MAN_1
8,359,070 UART: [update-reset Success] --
8,360,157 UART: [state] Locking Datavault
8,360,901 UART: [state] Locking PCR0, PCR1 and PCR31
8,361,505 UART: [state] Locking ICCM
8,362,133 UART: [exit] Launching FMC @ 0x40000130
8,367,463 UART:
8,367,479 UART: Running Caliptra FMC ...
8,367,887 UART:
8,367,941 UART: [state] CFI Enabled
8,457,066 UART: [art] Extend RT PCRs Done
8,457,494 UART: [art] Lock RT PCRs Done
8,458,597 UART: [art] Populate DV Done
8,466,710 UART: [fht] FMC Alias Private Key: 7
8,467,710 UART: [art] Derive CDI
8,467,990 UART: [art] Store in slot 0x4
8,553,675 UART: [art] Derive Key Pair
8,554,035 UART: [art] Store priv key in slot 0x5
8,567,115 UART: [art] Derive Key Pair - Done
8,582,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,597,980 UART: [art] Erasing AUTHORITY.KEYID = 7
8,598,745 UART: [art] PUB.X = 59CE309253BC79009D52B9720DBE2FEE968570E5FD44EF1375C604BA27A17EA7C32DF93811750CFC83E32D00FA159F40
8,605,468 UART: [art] PUB.Y = 9EFEC4CC08977A9511E787BE2E93060CC68CBE8C139A0CF5CE213A08910E4AC8A4F55FD8C7E6AE7F4A27BCB1FFD1E744
8,612,424 UART: [art] SIG.R = B080E257737195D55400430EDC0B727A687DFEA7D6A1BBB866274D82EF3C6081690A68D3737DB8E97644319FB8ACE485
8,619,163 UART: [art] SIG.S = 0E6742EFDB70682D570E3C8D4F977E15417143EB121C3F45ECFA99EF4BC001CA491A5513142613729535791156245ABA
8,642,492 UART: mbox::rt_entry...
8,642,864 UART: ____ _ _ _ ____ _____
8,643,648 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,644,448 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,645,216 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,645,984 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,646,752 UART: |_|
8,647,064 UART:
9,007,582 UART: [rt] Runtime listening for mailbox commands...
9,008,552 UART:
9,008,568 UART: Running Caliptra ROM ...
9,008,976 UART:
9,009,031 UART: [state] CFI Enabled
9,011,727 UART: [state] LifecycleState = Unprovisioned
9,012,382 UART: [state] DebugLocked = No
9,013,106 UART: [state] WD Timer not started. Device not locked for debugging
9,014,404 UART: [kat] SHA2-256
9,820,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,824,179 UART: [kat] ++
9,824,331 UART: [kat] sha1
9,828,501 UART: [kat] SHA2-256
9,830,441 UART: [kat] SHA2-384
9,833,296 UART: [kat] SHA2-512-ACC
9,835,196 UART: [kat] ECC-384
9,844,471 UART: [kat] HMAC-384Kdf
9,848,835 UART: [kat] LMS
10,097,163 UART: [kat] --
10,097,839 UART: [update-reset] ++
11,048,428 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
11,049,459 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
11,151,100 >>> mbox cmd response: success
11,151,100 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,151,235 UART: [update-reset] Copying MAN_2 To MAN_1
11,159,249 UART: [update-reset Success] --
11,160,300 UART: [state] Locking Datavault
11,161,158 UART: [state] Locking PCR0, PCR1 and PCR31
11,161,762 UART: [state] Locking ICCM
11,162,272 UART: [exit] Launching FMC @ 0x40000130
11,167,602 UART:
11,167,618 UART: Running Caliptra FMC ...
11,168,026 UART:
11,168,080 UART: [state] CFI Enabled
11,257,155 UART: [art] Extend RT PCRs Done
11,257,583 UART: [art] Lock RT PCRs Done
11,258,900 UART: [art] Populate DV Done
11,267,331 UART: [fht] FMC Alias Private Key: 7
11,268,347 UART: [art] Derive CDI
11,268,627 UART: [art] Store in slot 0x4
11,354,378 UART: [art] Derive Key Pair
11,354,738 UART: [art] Store priv key in slot 0x5
11,367,480 UART: [art] Derive Key Pair - Done
11,382,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,397,612 UART: [art] Erasing AUTHORITY.KEYID = 7
11,398,377 UART: [art] PUB.X = F2B5ADB644490B57A12459A0ED1AAD466598D447DBFB57F30EF4194E68350530F7043647D5D5CB8CB7C464AF6C08E054
11,405,138 UART: [art] PUB.Y = A2DC984B56CF6017839BE260AC24BEAEF3FF0030889F4AFAD6933F1440BF09CBFCACDFEC593299786B794ECAE99320C9
11,412,083 UART: [art] SIG.R = 9F62182DFE809E9BDA9D3C1CFFD95E466FB276DF0A419BEFB46EFB38C9DF3C05938A07708B40DF4001EB9F4A58131ABE
11,418,863 UART: [art] SIG.S = F1D5A9872F3CA2AE80C3E26C06E4C1FF1A72ACF608C274368C6036BA484E8E8CB23B58F978FD9F62F9382424D9817EDE
11,443,181 UART: mbox::rt_entry...
11,443,553 UART: ____ _ _ _ ____ _____
11,444,337 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,445,137 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,445,905 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,446,673 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,447,441 UART: |_|
11,447,753 UART:
11,810,102 UART: [rt] Runtime listening for mailbox commands...
11,811,306 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,535 ready_for_fw is high
1,060,535 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,481 >>> mbox cmd response: success
2,216,481 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,278,510 UART:
2,278,526 UART: Running Caliptra FMC ...
2,278,934 UART:
2,278,988 UART: [state] CFI Enabled
2,289,504 UART: [fht] FMC Alias Private Key: 7
2,408,522 UART: [art] Extend RT PCRs Done
2,408,950 UART: [art] Lock RT PCRs Done
2,410,328 UART: [art] Populate DV Done
2,418,537 UART: [fht] FMC Alias Private Key: 7
2,419,481 UART: [art] Derive CDI
2,419,761 UART: [art] Store in slot 0x4
2,505,664 UART: [art] Derive Key Pair
2,506,024 UART: [art] Store priv key in slot 0x5
2,519,502 UART: [art] Derive Key Pair - Done
2,534,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,549,508 UART: [art] Erasing AUTHORITY.KEYID = 7
2,550,273 UART: [art] PUB.X = 75A0E199A3436C0CF4E2C0057A59138043AE67860EEE2C24169B45937614938F257045BAACF7AA3A28C30F29D260631E
2,557,027 UART: [art] PUB.Y = 692152E18F6BE02EFC53FBA48B7522F8ADD45339F7500EDA1FEABA1D57E840D4A0A775E321EF781B6ECF0965F1979871
2,563,983 UART: [art] SIG.R = 119950EEF91D331FC6DA7E7ADAA73D201CBBADEFADD9370D30DDA9C3826BF2EAADB50F776268EFD3A0F1CD70809E0385
2,570,772 UART: [art] SIG.S = A4FCE01343AFEBAB7DB524A4687C9ABD54D1858C92F4EBE13DD7CBDA93459079BEEFCCF421E23D5CA8EE8A47672C82A2
2,594,594 UART: mbox::rt_entry...
2,594,966 UART: ____ _ _ _ ____ _____
2,595,750 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,596,550 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,597,318 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,598,086 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,598,854 UART: |_|
2,599,166 UART:
2,717,316 UART: [rt] Runtime listening for mailbox commands...
2,718,511 >>> mbox cmd response data (48 bytes)
2,718,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,209,111 >>> mbox cmd response: success
5,209,111 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,222,288 UART:
5,222,304 UART: Running Caliptra FMC ...
5,222,712 UART:
5,222,766 UART: [state] CFI Enabled
5,312,325 UART: [art] Extend RT PCRs Done
5,312,753 UART: [art] Lock RT PCRs Done
5,314,028 UART: [art] Populate DV Done
5,322,217 UART: [fht] FMC Alias Private Key: 7
5,323,247 UART: [art] Derive CDI
5,323,527 UART: [art] Store in slot 0x4
5,408,690 UART: [art] Derive Key Pair
5,409,050 UART: [art] Store priv key in slot 0x5
5,422,874 UART: [art] Derive Key Pair - Done
5,437,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,453,585 UART: [art] Erasing AUTHORITY.KEYID = 7
5,454,350 UART: [art] PUB.X = AE7CB795FB92827DEAE53037CC4689837CD99FE0B7A022F1C89927FF22C78773DC847474191D8A48BB5E4DB9312651EA
5,461,126 UART: [art] PUB.Y = 36F86548C25505FA4BE024C9840D2CEA909D1D6EDA91739E6FCB3A55712957BFFA63D200E71110D98B12B9E9E6E9650D
5,468,051 UART: [art] SIG.R = A4DAE12A7BAE1F04CB66C461F07200D875E5E79BE94F01C3CB2F56C9555B9CB372B614C6EBA501516F1AF8114E8A1B05
5,474,801 UART: [art] SIG.S = 0788BACF72F4102CAB6E0E079FF5F4980802F3E95421377027F1417509CEC265208B5DAE77E67CFB5A10C12E9CC84B0F
5,498,132 UART: Caliptra RT
5,498,383 UART: [state] CFI Enabled
5,871,931 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,902,937 UART: [rt]cmd =0x4d454153, len=108
5,924,285 >>> mbox cmd response data (12 bytes)
5,924,286 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,950,420 >>> mbox cmd response: success
7,950,420 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,963,913 UART:
7,963,929 UART: Running Caliptra FMC ...
7,964,337 UART:
7,964,391 UART: [state] CFI Enabled
8,053,830 UART: [art] Extend RT PCRs Done
8,054,258 UART: [art] Lock RT PCRs Done
8,055,443 UART: [art] Populate DV Done
8,063,740 UART: [fht] FMC Alias Private Key: 7
8,064,868 UART: [art] Derive CDI
8,065,148 UART: [art] Store in slot 0x4
8,151,305 UART: [art] Derive Key Pair
8,151,665 UART: [art] Store priv key in slot 0x5
8,165,349 UART: [art] Derive Key Pair - Done
8,179,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,195,592 UART: [art] Erasing AUTHORITY.KEYID = 7
8,196,357 UART: [art] PUB.X = 91152EF7107B05C2D69A5594E38534148D3B841C6D24CC19335979E4AC07C7148BFB5C6F2DAAEB72620661F57E5D38BA
8,203,120 UART: [art] PUB.Y = 16E2EF5F9F49995D63007852717E2729AA56AC62FA32AEB815C7A08CB9E528CF2D05C4EE67FE7BA407C8740C47723BBD
8,210,049 UART: [art] SIG.R = 72A9CDE25B325FE730BA3478EFC2576343A09B494AB89043122856620B900563417D62CBC572A1A22F73E5BD15E2C9D3
8,216,811 UART: [art] SIG.S = 33B9C988A7C534D60C33C910A4104E23CC54EDB6E8AC60E77DAAA28506AD4E4EE4643C3EDC8BCCC48ABFCA9FE75C529E
8,240,327 UART: mbox::rt_entry...
8,240,699 UART: ____ _ _ _ ____ _____
8,241,483 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,242,283 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,243,051 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,243,819 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,244,587 UART: |_|
8,244,899 UART:
8,612,380 UART: [rt] Runtime listening for mailbox commands...
10,638,883 >>> mbox cmd response: success
10,638,883 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,652,164 UART:
10,652,180 UART: Running Caliptra FMC ...
10,652,588 UART:
10,652,642 UART: [state] CFI Enabled
10,741,813 UART: [art] Extend RT PCRs Done
10,742,241 UART: [art] Lock RT PCRs Done
10,743,214 UART: [art] Populate DV Done
10,751,353 UART: [fht] FMC Alias Private Key: 7
10,752,315 UART: [art] Derive CDI
10,752,595 UART: [art] Store in slot 0x4
10,838,216 UART: [art] Derive Key Pair
10,838,576 UART: [art] Store priv key in slot 0x5
10,851,828 UART: [art] Derive Key Pair - Done
10,866,662 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,881,987 UART: [art] Erasing AUTHORITY.KEYID = 7
10,882,752 UART: [art] PUB.X = B9A6A0C50C99C3321FBFA8C2B6C4FECE7E227B6FE9BA6B3DA5904243209E0F76FB52155BF2B1A6816DFFD42E4F0A7333
10,889,533 UART: [art] PUB.Y = 66F5E8D57213AA3572A9BE39F47F82B64AC570158C95B3AAB58CEA7E2F2C6814D9C9A266850AACAFD6A584ACF18D4BF7
10,896,498 UART: [art] SIG.R = EF6F6A8440F86636127965A77DAF09B84785981F8130964072BAE7C4256DF73A0DE2D0529FDF23DE04968F2A54CA92E9
10,903,259 UART: [art] SIG.S = BF5C6D63D7E69FD0595A6194F922C328D5A5F43BF9910C51F559FC9BE5FFE27A72E209C11D182BC142663F2B1BA229C1
10,927,091 UART: mbox::rt_entry...
10,927,463 UART: ____ _ _ _ ____ _____
10,928,247 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,929,047 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,929,815 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,930,583 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,931,351 UART: |_|
10,931,663 UART:
11,291,838 UART: [rt] Runtime listening for mailbox commands...
11,293,042 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.88s
Truncated 2418 bytes from beginning
135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,274 UART: [ldev] --
1,282,689 UART: [fwproc] Wait for Commands...
1,283,367 UART: [fwproc] Recv command 0x46574c44
1,284,095 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,640 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,810 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,475 >>> mbox cmd response: success
2,364,475 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,365,667 UART: [afmc] ++
2,365,835 UART: [afmc] CDI.KEYID = 6
2,366,197 UART: [afmc] SUBJECT.KEYID = 7
2,366,622 UART: [afmc] AUTHORITY.KEYID = 5
2,402,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,598 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,307 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,190 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,891 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,627 UART: [afmc] --
2,445,505 UART: [cold-reset] --
2,446,231 UART: [state] Locking Datavault
2,447,492 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,096 UART: [state] Locking ICCM
2,448,738 UART: [exit] Launching FMC @ 0x40000130
2,454,068 UART:
2,454,084 UART: Running Caliptra FMC ...
2,454,492 UART:
2,454,635 UART: [state] CFI Enabled
2,465,021 UART: [fht] FMC Alias Private Key: 7
2,583,915 UART: [art] Extend RT PCRs Done
2,584,343 UART: [art] Lock RT PCRs Done
2,585,775 UART: [art] Populate DV Done
2,594,000 UART: [fht] FMC Alias Private Key: 7
2,594,964 UART: [art] Derive CDI
2,595,244 UART: [art] Store in slot 0x4
2,680,857 UART: [art] Derive Key Pair
2,681,217 UART: [art] Store priv key in slot 0x5
2,693,951 UART: [art] Derive Key Pair - Done
2,708,929 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,544 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,309 UART: [art] PUB.X = CEC12E18DDFD991D6EADE11A089CEE6CAE362DCE07915B83C1F1FB6C646F97B1CFF0ABF97F315A018B55B48EAB0B5652
2,732,095 UART: [art] PUB.Y = 542E72F0EC074067FE9BD854C1348B42DFB0C2DF7AB40FBADBB61492E9CA9486962A1C0F81A83C6E2DB78824D0EB23F9
2,739,052 UART: [art] SIG.R = DFE46F4B7198A3A4FAFB06ADA61CADC3AE317CFAA26D97635518ECE21005CF0E44BD982DFA1D06EDB37D581E3A2F7D2A
2,745,840 UART: [art] SIG.S = 1856B6D5068B34D093ECA3BFFE225B3CC8D160882967FDBDE8E95EE1F83075D17ED0E1AFCDAF3DB049DB8D88F850138F
2,768,775 UART: mbox::rt_entry...
2,769,147 UART: ____ _ _ _ ____ _____
2,769,931 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,731 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,499 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,267 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,035 UART: |_|
2,773,347 UART:
2,891,603 UART: [rt] Runtime listening for mailbox commands...
2,892,798 >>> mbox cmd response data (48 bytes)
2,892,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,892,910 UART:
2,892,926 UART: Running Caliptra ROM ...
2,893,334 UART:
2,893,476 UART: [state] CFI Enabled
2,896,324 UART: [state] LifecycleState = Unprovisioned
2,896,979 UART: [state] DebugLocked = No
2,897,629 UART: [state] WD Timer not started. Device not locked for debugging
2,898,757 UART: [kat] SHA2-256
3,704,407 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,708,532 UART: [kat] ++
3,708,684 UART: [kat] sha1
3,712,882 UART: [kat] SHA2-256
3,714,822 UART: [kat] SHA2-384
3,717,653 UART: [kat] SHA2-512-ACC
3,719,553 UART: [kat] ECC-384
3,729,226 UART: [kat] HMAC-384Kdf
3,733,676 UART: [kat] LMS
3,982,004 UART: [kat] --
3,983,104 UART: [update-reset] ++
5,341,784 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,342,915 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,498,130 >>> mbox cmd response: success
5,498,130 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,498,291 UART: [update-reset] Copying MAN_2 To MAN_1
5,506,305 UART: [update-reset Success] --
5,507,402 UART: [state] Locking Datavault
5,508,138 UART: [state] Locking PCR0, PCR1 and PCR31
5,508,742 UART: [state] Locking ICCM
5,509,164 UART: [exit] Launching FMC @ 0x40000130
5,514,494 UART:
5,514,510 UART: Running Caliptra FMC ...
5,514,918 UART:
5,515,061 UART: [state] CFI Enabled
5,604,570 UART: [art] Extend RT PCRs Done
5,604,998 UART: [art] Lock RT PCRs Done
5,606,343 UART: [art] Populate DV Done
5,614,522 UART: [fht] FMC Alias Private Key: 7
5,615,496 UART: [art] Derive CDI
5,615,776 UART: [art] Store in slot 0x4
5,701,851 UART: [art] Derive Key Pair
5,702,211 UART: [art] Store priv key in slot 0x5
5,715,783 UART: [art] Derive Key Pair - Done
5,730,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,745,838 UART: [art] Erasing AUTHORITY.KEYID = 7
5,746,603 UART: [art] PUB.X = DCB693BF46BF0A4B31A4E77B85CD0BC01471B9EEE31F6B71635805E3E41C213E7116225F0931DD41F3E285288EA9BB90
5,753,369 UART: [art] PUB.Y = E707C19E96AB3A23FE01F1E94F7AE0EF5D59822E2CBCB34A7B68CE70E574693B5F37ACCC2ECC2CFF8202C402EDA7DFDC
5,760,337 UART: [art] SIG.R = 13B39D639B3F9B428300B1275659ED0E93C93F7B27701B748259F89BB2CFBA54F405D833792B12D4A09EA7AEF29C18B8
5,767,081 UART: [art] SIG.S = A069C8D9077F491BFD48854673B440893D03B8D90F4015974FD70AD114DFCC9884CEF3F60502BFD3DFB1650072F56784
5,790,987 UART: Caliptra RT
5,791,330 UART: [state] CFI Enabled
6,157,392 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,188,648 UART: [rt]cmd =0x4d454153, len=108
6,209,488 >>> mbox cmd response data (12 bytes)
6,209,489 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,210,252 UART:
6,210,268 UART: Running Caliptra ROM ...
6,210,676 UART:
6,210,818 UART: [state] CFI Enabled
6,213,806 UART: [state] LifecycleState = Unprovisioned
6,214,461 UART: [state] DebugLocked = No
6,215,133 UART: [state] WD Timer not started. Device not locked for debugging
6,216,381 UART: [kat] SHA2-256
7,022,031 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,026,156 UART: [kat] ++
7,026,308 UART: [kat] sha1
7,030,440 UART: [kat] SHA2-256
7,032,380 UART: [kat] SHA2-384
7,035,289 UART: [kat] SHA2-512-ACC
7,037,189 UART: [kat] ECC-384
7,046,798 UART: [kat] HMAC-384Kdf
7,051,544 UART: [kat] LMS
7,299,872 UART: [kat] --
7,300,710 UART: [update-reset] ++
8,250,823 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,251,942 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,353,583 >>> mbox cmd response: success
8,353,583 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,353,698 UART: [update-reset] Copying MAN_2 To MAN_1
8,361,712 UART: [update-reset Success] --
8,362,701 UART: [state] Locking Datavault
8,363,455 UART: [state] Locking PCR0, PCR1 and PCR31
8,364,059 UART: [state] Locking ICCM
8,364,659 UART: [exit] Launching FMC @ 0x40000130
8,369,989 UART:
8,370,005 UART: Running Caliptra FMC ...
8,370,413 UART:
8,370,556 UART: [state] CFI Enabled
8,459,845 UART: [art] Extend RT PCRs Done
8,460,273 UART: [art] Lock RT PCRs Done
8,461,754 UART: [art] Populate DV Done
8,469,739 UART: [fht] FMC Alias Private Key: 7
8,470,747 UART: [art] Derive CDI
8,471,027 UART: [art] Store in slot 0x4
8,556,902 UART: [art] Derive Key Pair
8,557,262 UART: [art] Store priv key in slot 0x5
8,570,858 UART: [art] Derive Key Pair - Done
8,585,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,600,874 UART: [art] Erasing AUTHORITY.KEYID = 7
8,601,639 UART: [art] PUB.X = F3E4316DAE5EAB7B73D3D82406BE25E7FA6AA7BE9EA860D4D3404BA7F339324884482C64796E13D8018B27C1F5713F3B
8,608,411 UART: [art] PUB.Y = 9EA2DE4FD7070B88D41805D5E62FC9C82C2E5C9CC730C904AE6CC5A6D978AB0C77683363B89BB932614E0BE7AEFD91BF
8,615,361 UART: [art] SIG.R = 448AE8A536EB1765E50C0301364911A58EA516CAD8D10A708C21B6850059A6C455DDF29D6DBC4AE7FF4F28707E4F40E5
8,622,103 UART: [art] SIG.S = B224FC5AD7BBB733204DB34376CA7FF0C64728891608102FB15DB8C3065E5048F1A2BA988E85F41B9CC7B348D75281A8
8,646,001 UART: mbox::rt_entry...
8,646,373 UART: ____ _ _ _ ____ _____
8,647,157 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,647,957 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,648,725 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,649,493 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,650,261 UART: |_|
8,650,573 UART:
9,018,591 UART: [rt] Runtime listening for mailbox commands...
9,019,561 UART:
9,019,577 UART: Running Caliptra ROM ...
9,019,985 UART:
9,020,127 UART: [state] CFI Enabled
9,022,735 UART: [state] LifecycleState = Unprovisioned
9,023,390 UART: [state] DebugLocked = No
9,024,014 UART: [state] WD Timer not started. Device not locked for debugging
9,025,176 UART: [kat] SHA2-256
9,830,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,834,951 UART: [kat] ++
9,835,103 UART: [kat] sha1
9,839,175 UART: [kat] SHA2-256
9,841,115 UART: [kat] SHA2-384
9,843,730 UART: [kat] SHA2-512-ACC
9,845,630 UART: [kat] ECC-384
9,855,623 UART: [kat] HMAC-384Kdf
9,860,267 UART: [kat] LMS
10,108,595 UART: [kat] --
10,109,467 UART: [update-reset] ++
11,058,906 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
11,060,089 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
11,161,730 >>> mbox cmd response: success
11,161,730 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,162,025 UART: [update-reset] Copying MAN_2 To MAN_1
11,170,039 UART: [update-reset Success] --
11,171,070 UART: [state] Locking Datavault
11,171,894 UART: [state] Locking PCR0, PCR1 and PCR31
11,172,498 UART: [state] Locking ICCM
11,173,030 UART: [exit] Launching FMC @ 0x40000130
11,178,360 UART:
11,178,376 UART: Running Caliptra FMC ...
11,178,784 UART:
11,178,927 UART: [state] CFI Enabled
11,268,244 UART: [art] Extend RT PCRs Done
11,268,672 UART: [art] Lock RT PCRs Done
11,269,995 UART: [art] Populate DV Done
11,277,916 UART: [fht] FMC Alias Private Key: 7
11,278,858 UART: [art] Derive CDI
11,279,138 UART: [art] Store in slot 0x4
11,364,825 UART: [art] Derive Key Pair
11,365,185 UART: [art] Store priv key in slot 0x5
11,378,751 UART: [art] Derive Key Pair - Done
11,393,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,408,819 UART: [art] Erasing AUTHORITY.KEYID = 7
11,409,584 UART: [art] PUB.X = 72AC6792903070CB46D8539DD9160E2713DA61CF89F4AC141AD6D36786CBB77D5DFBBB3AA86379D42AA8914C68A3CD24
11,416,361 UART: [art] PUB.Y = C3BC9B23F6662B60F2BA8F52963AF4A17BB1A9A1131D0F49CDE58C9DEC0145A3742B6153E7C0B1E68686A4897E7FB842
11,423,315 UART: [art] SIG.R = 5F987048BEDD980BF5D56C6F0BC117B5A0706C116E2C0111851E73E767F06CA3F4AEC0AF6DAEB36642627C51D592C250
11,430,084 UART: [art] SIG.S = 450E65BFC80766910E984F8DFF3482B3A3C94A14C249D7884D0187EF13A360A3B4E5C3A214BE8F92DF851248C71D1A0A
11,454,015 UART: mbox::rt_entry...
11,454,387 UART: ____ _ _ _ ____ _____
11,455,171 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,455,971 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,456,739 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,457,507 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,458,275 UART: |_|
11,458,587 UART:
11,818,018 UART: [rt] Runtime listening for mailbox commands...
11,819,222 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,784 ready_for_fw is high
1,059,784 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,000 >>> mbox cmd response: success
2,216,000 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,278,433 UART:
2,278,449 UART: Running Caliptra FMC ...
2,278,857 UART:
2,279,000 UART: [state] CFI Enabled
2,289,512 UART: [fht] FMC Alias Private Key: 7
2,408,136 UART: [art] Extend RT PCRs Done
2,408,564 UART: [art] Lock RT PCRs Done
2,410,008 UART: [art] Populate DV Done
2,418,339 UART: [fht] FMC Alias Private Key: 7
2,419,377 UART: [art] Derive CDI
2,419,657 UART: [art] Store in slot 0x4
2,505,728 UART: [art] Derive Key Pair
2,506,088 UART: [art] Store priv key in slot 0x5
2,519,152 UART: [art] Derive Key Pair - Done
2,533,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,549,493 UART: [art] Erasing AUTHORITY.KEYID = 7
2,550,258 UART: [art] PUB.X = 3A220F9E9BEFA9B6B2462C25223083850E2AF9149C69B1B540C16772765822FAD52D265E12C84265B3FDBB74B73E047E
2,557,019 UART: [art] PUB.Y = D7D15FDC983D1B8F84EFFDA205E451D4EE17589B992746AF5A77CAC1C4AA1BDB6AE50A0A62D232F2F5B2BCE6CF21595D
2,563,986 UART: [art] SIG.R = 61E4ABCF361519932818BD55E5CC565963AE4A9D86AC2877CCF390ACA1CA9F49D0DE491F0B28D48FE3A9A0326D987306
2,570,760 UART: [art] SIG.S = FC6D59A91B8843D07C64A225860E037C3628758CEECD734791B9E459A6CAFEE4118BA596B7F8F84CF8CC5797480D4CAA
2,594,231 UART: mbox::rt_entry...
2,594,603 UART: ____ _ _ _ ____ _____
2,595,387 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,596,187 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,955 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,723 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,598,491 UART: |_|
2,598,803 UART:
2,717,393 UART: [rt] Runtime listening for mailbox commands...
2,718,588 >>> mbox cmd response data (48 bytes)
2,718,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,209,241 >>> mbox cmd response: success
5,209,241 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,222,598 UART:
5,222,614 UART: Running Caliptra FMC ...
5,223,022 UART:
5,223,165 UART: [state] CFI Enabled
5,312,396 UART: [art] Extend RT PCRs Done
5,312,824 UART: [art] Lock RT PCRs Done
5,314,195 UART: [art] Populate DV Done
5,322,574 UART: [fht] FMC Alias Private Key: 7
5,323,678 UART: [art] Derive CDI
5,323,958 UART: [art] Store in slot 0x4
5,409,713 UART: [art] Derive Key Pair
5,410,073 UART: [art] Store priv key in slot 0x5
5,423,379 UART: [art] Derive Key Pair - Done
5,438,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,453,965 UART: [art] Erasing AUTHORITY.KEYID = 7
5,454,730 UART: [art] PUB.X = 57FE30F2BB6AB632D558C13F7783225D19BACBC3F940E6FBE99E9B7179C1043EE00719EC70B7EF218C662C53D1A804AF
5,461,503 UART: [art] PUB.Y = 782C9B06117D8EBAE437AFD0CF4BB9D0D3FFC617961F64188E024A0883EEAB1423BE597C63DAC8D65F85D09B9848E380
5,468,456 UART: [art] SIG.R = 3F87E724C4ABFE82B01DB2DD5FA3DD4C6606E7A7E1BCDCC7690E62D84C9F7AAF5AD789027913E451EE5307067920AD29
5,475,227 UART: [art] SIG.S = E8B32B43E1C9115D66BF81092D436424725A43947776FA09B3D96906CBD4C45CED6918F7E1E42A0FE757F1C3EF169467
5,499,153 UART: Caliptra RT
5,499,496 UART: [state] CFI Enabled
5,860,572 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,891,738 UART: [rt]cmd =0x4d454153, len=108
5,912,592 >>> mbox cmd response data (12 bytes)
5,912,593 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,940,688 >>> mbox cmd response: success
7,940,688 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,953,999 UART:
7,954,015 UART: Running Caliptra FMC ...
7,954,423 UART:
7,954,566 UART: [state] CFI Enabled
8,043,881 UART: [art] Extend RT PCRs Done
8,044,309 UART: [art] Lock RT PCRs Done
8,045,490 UART: [art] Populate DV Done
8,053,677 UART: [fht] FMC Alias Private Key: 7
8,054,677 UART: [art] Derive CDI
8,054,957 UART: [art] Store in slot 0x4
8,140,766 UART: [art] Derive Key Pair
8,141,126 UART: [art] Store priv key in slot 0x5
8,154,514 UART: [art] Derive Key Pair - Done
8,169,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,184,720 UART: [art] Erasing AUTHORITY.KEYID = 7
8,185,485 UART: [art] PUB.X = 522823A244CC99BE7AE7C5F0D1478715D0E74C61AEF94F29268F2D2B2BAFB15AF686FB6907432544F74AD11D6B3C75AE
8,192,262 UART: [art] PUB.Y = BB66E2B22F23868B2A63D9E1EB8456CF933D2308601576A51C825869D4B7F6C8B85BE9FA54AC85CA139057861E1D7002
8,199,206 UART: [art] SIG.R = DE029DA9E158585B0BF069E40F678F9584573486F3B31043970573816F205A89C7877C53C27A11AD48AE1A9F0F6C5DAC
8,205,959 UART: [art] SIG.S = B733499945104622947BA75483B90FF83C6BAFAACCDFDF41F22BEBD07BBC22C160781E563A988007213A386B4F616761
8,229,451 UART: mbox::rt_entry...
8,229,823 UART: ____ _ _ _ ____ _____
8,230,607 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,231,407 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,232,175 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,232,943 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,233,711 UART: |_|
8,234,023 UART:
8,594,644 UART: [rt] Runtime listening for mailbox commands...
10,623,802 >>> mbox cmd response: success
10,623,802 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,637,281 UART:
10,637,297 UART: Running Caliptra FMC ...
10,637,705 UART:
10,637,848 UART: [state] CFI Enabled
10,727,043 UART: [art] Extend RT PCRs Done
10,727,471 UART: [art] Lock RT PCRs Done
10,728,826 UART: [art] Populate DV Done
10,736,941 UART: [fht] FMC Alias Private Key: 7
10,737,965 UART: [art] Derive CDI
10,738,245 UART: [art] Store in slot 0x4
10,824,210 UART: [art] Derive Key Pair
10,824,570 UART: [art] Store priv key in slot 0x5
10,837,866 UART: [art] Derive Key Pair - Done
10,852,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,868,314 UART: [art] Erasing AUTHORITY.KEYID = 7
10,869,079 UART: [art] PUB.X = 9AEB16AC701E4750A81F1285DAA2D315BABC8745D5364E81AF48746BA3C52BDE60669B2D55419F6BC40E2101BDB6EBB1
10,875,857 UART: [art] PUB.Y = 70F6098D6C2F76942530C833FC5D8C2AF694B120F4B4CCB0796EAF4559CABF9000403634C479E890CB505C4E6AD8D8FE
10,882,790 UART: [art] SIG.R = 66EB6C697F0600C8BDC2BDE800B33459B8460B92278A98503C6224BBE39E7AA75970624EC651034BCE4F80325D735C40
10,889,505 UART: [art] SIG.S = 029C118CC2877F51E3CCECC2615E4115E6313A991C2EB9F4C2078F2FF676B4218B69AF5F967547675DC5B68EDDD9720E
10,913,332 UART: mbox::rt_entry...
10,913,704 UART: ____ _ _ _ ____ _____
10,914,488 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,915,288 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,916,056 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,916,824 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,917,592 UART: |_|
10,917,904 UART:
11,280,515 UART: [rt] Runtime listening for mailbox commands...
11,281,719 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,051 UART:
192,422 UART: Running Caliptra ROM ...
193,628 UART:
193,780 UART: [state] CFI Enabled
262,730 UART: [state] LifecycleState = Unprovisioned
264,741 UART: [state] DebugLocked = No
266,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,866 UART: [kat] SHA2-256
441,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,030 UART: [kat] ++
452,492 UART: [kat] sha1
462,019 UART: [kat] SHA2-256
464,676 UART: [kat] SHA2-384
471,661 UART: [kat] SHA2-512-ACC
474,041 UART: [kat] ECC-384
2,768,215 UART: [kat] HMAC-384Kdf
2,799,615 UART: [kat] LMS
3,989,940 UART: [kat] --
3,995,069 UART: [cold-reset] ++
3,997,573 UART: [fht] Storing FHT @ 0x50003400
4,008,554 UART: [idev] ++
4,009,141 UART: [idev] CDI.KEYID = 6
4,010,059 UART: [idev] SUBJECT.KEYID = 7
4,011,315 UART: [idev] UDS.KEYID = 0
4,012,399 ready_for_fw is high
4,012,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,796 UART: [idev] Erasing UDS.KEYID = 0
7,346,529 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,349 UART: [idev] --
7,372,012 UART: [ldev] ++
7,372,584 UART: [ldev] CDI.KEYID = 6
7,373,523 UART: [ldev] SUBJECT.KEYID = 5
7,374,737 UART: [ldev] AUTHORITY.KEYID = 7
7,376,022 UART: [ldev] FE.KEYID = 1
7,422,064 UART: [ldev] Erasing FE.KEYID = 1
10,756,967 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,585 UART: [ldev] --
13,136,630 UART: [fwproc] Waiting for Commands...
13,139,315 UART: [fwproc] Received command 0x46574c44
13,141,549 UART: [fwproc] Received Image of size 118548 bytes
17,249,237 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,324,872 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,398,046 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,727,362 >>> mbox cmd response: success
17,732,209 UART: [afmc] ++
17,732,838 UART: [afmc] CDI.KEYID = 6
17,733,754 UART: [afmc] SUBJECT.KEYID = 7
17,734,973 UART: [afmc] AUTHORITY.KEYID = 5
21,093,655 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,829 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,095 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,410,570 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,275 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,701 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,461,565 UART: [afmc] --
23,465,317 UART: [cold-reset] --
23,471,116 UART: [state] Locking Datavault
23,475,279 UART: [state] Locking PCR0, PCR1 and PCR31
23,477,030 UART: [state] Locking ICCM
23,479,105 UART: [exit] Launching FMC @ 0x40000130
23,487,451 UART:
23,487,681 UART: Running Caliptra FMC ...
23,488,901 UART:
23,489,062 UART: [state] CFI Enabled
23,555,120 UART: [fht] FMC Alias Private Key: 7
25,895,164 UART: [art] Extend RT PCRs Done
25,896,384 UART: [art] Lock RT PCRs Done
25,898,037 UART: [art] Populate DV Done
25,903,664 UART: [fht] FMC Alias Private Key: 7
25,905,252 UART: [art] Derive CDI
25,905,989 UART: [art] Store in slot 0x4
25,963,292 UART: [art] Derive Key Pair
25,964,283 UART: [art] Store priv key in slot 0x5
29,256,868 UART: [art] Derive Key Pair - Done
29,269,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,594 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,109 UART: [art] PUB.X = ACFFC21AEBB1CD8B61397E8559AB34CC6DF32EF8117E8F613BD6071C804D6D4A973A1A536B48C6A559DE7DC9BA5DB251
31,568,887 UART: [art] PUB.Y = A3B4A93CB474CE2E1D2C13397B1AB7E0A0D9C0897AC5744862FE9740123C695786E011A959E52AF2FB0CD00B1869A11C
31,575,683 UART: [art] SIG.R = 6D02D1BB0D63D7D8BCF5AB2CB34FC56DC3AF864B70EF0CBFDEBE36BD708D6BAC9EBD011B939BAE7C866E2CA669109C4C
31,583,104 UART: [art] SIG.S = 305EA5D415B708CCDE84190C6691400EB34DD29C5AC882C3687329789AA3CD8FB140514A6D753DEFDFC1013087581BAE
32,887,900 UART: Caliptra RT
32,888,622 UART: [state] CFI Enabled
33,065,810 UART: [rt] RT listening for mailbox commands...
33,068,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,098,913 UART: [rt]cmd =0x4d454153, len=108
33,117,844 >>> mbox cmd response data (12 bytes)
35,193,534 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,299,534 UART:
35,299,900 UART: Running Caliptra ROM ...
35,300,985 UART:
35,301,148 UART: [state] CFI Enabled
35,356,205 UART: [state] LifecycleState = Unprovisioned
35,358,146 UART: [state] DebugLocked = No
35,359,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,364,091 UART: [kat] SHA2-256
35,533,797 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,544,289 UART: [kat] ++
35,544,827 UART: [kat] sha1
35,555,232 UART: [kat] SHA2-256
35,557,927 UART: [kat] SHA2-384
35,563,857 UART: [kat] SHA2-512-ACC
35,566,256 UART: [kat] ECC-384
37,860,310 UART: [kat] HMAC-384Kdf
37,872,323 UART: [kat] LMS
39,062,651 UART: [kat] --
39,065,844 UART: [update-reset] ++
42,819,553 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,822,752 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,095,456 >>> mbox cmd response: success
43,095,835 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,096,396 UART: [update-reset] Copying MAN_2 To MAN_1
43,118,787 UART: [update-reset Success] --
43,123,561 UART: [state] Locking Datavault
43,125,577 UART: [state] Locking PCR0, PCR1 and PCR31
43,127,334 UART: [state] Locking ICCM
43,128,619 UART: [exit] Launching FMC @ 0x40000130
43,137,020 UART:
43,137,260 UART: Running Caliptra FMC ...
43,138,364 UART:
43,138,517 UART: [state] CFI Enabled
43,239,137 UART: [art] Extend RT PCRs Done
43,240,321 UART: [art] Lock RT PCRs Done
43,241,506 UART: [art] Populate DV Done
43,247,183 UART: [fht] FMC Alias Private Key: 7
43,248,723 UART: [art] Derive CDI
43,249,609 UART: [art] Store in slot 0x4
43,307,666 UART: [art] Derive Key Pair
43,308,671 UART: [art] Store priv key in slot 0x5
46,601,287 UART: [art] Derive Key Pair - Done
46,614,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,902,973 UART: [art] Erasing AUTHORITY.KEYID = 7
48,904,496 UART: [art] PUB.X = 43FCE92010E971E6F9CA9E5C6C459EDF95D82451210659FDD61029069BE1CB287140235604C29AE8A4E52A7F9F2FAFB8
48,911,709 UART: [art] PUB.Y = 8CF7A3813F4A19C8B54DCDE943A6F0DCBAF3D2817C5A19284CD00F5B4D731B4D8129040978F4E43456BD3988052F07A9
48,919,007 UART: [art] SIG.R = F2C256F1632BD7D3E8F27BC08B349CC5092C641471C3720A389D9EE71D656B20D446A007AE2F100ACF2779F5BC8615EC
48,926,365 UART: [art] SIG.S = EC7EFE10F85C2AF8B45288D1F380459F28DC6BDEB8E57F3860C96B6C75610BCFA1A6F74277E61BE1861FF9668A15EF2B
50,231,736 UART: mbox::rt_entry...
50,232,692 UART: ____ _ _ _ ____ _____
50,234,671 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,236,675 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,238,601 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,240,532 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,242,481 UART: |_|
50,243,318 UART:
50,616,331 UART: [rt] Runtime listening for mailbox commands...
50,618,521 >>> mbox cmd response data (48 bytes)
50,619,107 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,621,428 >>> mbox cmd response data (48 bytes)
50,622,301 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,639,404 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,803,787 ready_for_fw is high
3,804,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,963,687 >>> mbox cmd response: success
23,649,738 UART:
23,650,168 UART: Running Caliptra FMC ...
23,651,377 UART:
23,651,555 UART: [state] CFI Enabled
23,719,309 UART: [fht] FMC Alias Private Key: 7
26,059,509 UART: [art] Extend RT PCRs Done
26,060,729 UART: [art] Lock RT PCRs Done
26,062,148 UART: [art] Populate DV Done
26,067,644 UART: [fht] FMC Alias Private Key: 7
26,069,189 UART: [art] Derive CDI
26,070,010 UART: [art] Store in slot 0x4
26,127,871 UART: [art] Derive Key Pair
26,128,910 UART: [art] Store priv key in slot 0x5
29,421,288 UART: [art] Derive Key Pair - Done
29,434,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,874 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,407 UART: [art] PUB.X = F6F18B3F8166A847842238BEDB40713DE865012729E019C1C30EBFA8D218A247009D5B9280EEE00CAA1438E719C3E4BA
31,731,620 UART: [art] PUB.Y = 6C1DDB962F8B4954ADD845EA759B2EC97C6E17E3CCC901829260B8C529D4C534CB089F57B92F72B32FB8D078DA913EC6
31,738,888 UART: [art] SIG.R = 6E8B65615F5C4D0BCABC3BE1A7D37CD0996561054956C1996274B45B2CE05DD107233645A3A87A9ED87ED4A3A7D357AE
31,746,308 UART: [art] SIG.S = CFD44F68B1DED4EFF1B007D38C99A32038E73D593FEB826291A293E2CD97B8B36570DE780974CA6C258687174C1B299A
33,051,325 UART: Caliptra RT
33,052,050 UART: [state] CFI Enabled
33,229,955 UART: [rt] RT listening for mailbox commands...
33,232,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,263,285 UART: [rt]cmd =0x4d454153, len=108
33,282,186 >>> mbox cmd response data (12 bytes)
35,358,037 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,383,809 >>> mbox cmd response: success
43,384,350 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,418,394 UART:
43,418,682 UART: Running Caliptra FMC ...
43,419,744 UART:
43,419,899 UART: [state] CFI Enabled
43,508,166 UART: [art] Extend RT PCRs Done
43,509,355 UART: [art] Lock RT PCRs Done
43,510,923 UART: [art] Populate DV Done
43,516,304 UART: [fht] FMC Alias Private Key: 7
43,518,005 UART: [art] Derive CDI
43,518,827 UART: [art] Store in slot 0x4
43,577,370 UART: [art] Derive Key Pair
43,578,414 UART: [art] Store priv key in slot 0x5
46,870,830 UART: [art] Derive Key Pair - Done
46,883,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,172,742 UART: [art] Erasing AUTHORITY.KEYID = 7
49,174,265 UART: [art] PUB.X = 1B065994ADC8431CCA713385675D82261C620F5060308949977446877CB14076FD5577C87ADA7CDCFA815443262F0304
49,181,476 UART: [art] PUB.Y = 0C328D9A69508AE7CAF9CAE491706214D6D6DF3575A512654B37D4FCC10BD66CB656BE999FB4EF7400CE2B4BC3F505BB
49,188,720 UART: [art] SIG.R = C0BD557C071629FD5290238753EC8B2EB76494DA5746CD39A5C418CBABD87263705C2B6B89CA058648A6B92D362F63BE
49,196,119 UART: [art] SIG.S = 95C0EA70B8609E96CF5E4C262B60B4BC9DEC36F02C19B341D56446FC8B8F3C92AEE1B1AF8E5528DA311595C61A555854
50,501,451 UART: mbox::rt_entry...
50,502,432 UART: ____ _ _ _ ____ _____
50,504,428 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,506,437 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,508,671 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,510,625 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,512,559 UART: |_|
50,513,394 UART:
50,880,606 UART: [rt] Runtime listening for mailbox commands...
50,882,776 >>> mbox cmd response data (48 bytes)
50,883,351 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,885,734 >>> mbox cmd response data (48 bytes)
50,886,608 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,903,493 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,440 UART:
192,800 UART: Running Caliptra ROM ...
193,917 UART:
603,601 UART: [state] CFI Enabled
618,794 UART: [state] LifecycleState = Unprovisioned
620,774 UART: [state] DebugLocked = No
622,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,926 UART: [kat] SHA2-256
797,654 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,237 UART: [kat] ++
808,766 UART: [kat] sha1
820,209 UART: [kat] SHA2-256
822,932 UART: [kat] SHA2-384
827,992 UART: [kat] SHA2-512-ACC
830,362 UART: [kat] ECC-384
3,113,867 UART: [kat] HMAC-384Kdf
3,125,741 UART: [kat] LMS
4,315,871 UART: [kat] --
4,319,126 UART: [cold-reset] ++
4,320,628 UART: [fht] Storing FHT @ 0x50003400
4,331,601 UART: [idev] ++
4,332,166 UART: [idev] CDI.KEYID = 6
4,333,115 UART: [idev] SUBJECT.KEYID = 7
4,334,350 UART: [idev] UDS.KEYID = 0
4,335,312 ready_for_fw is high
4,335,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,350 UART: [idev] Erasing UDS.KEYID = 0
7,625,906 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,879 UART: [idev] --
7,650,707 UART: [ldev] ++
7,651,281 UART: [ldev] CDI.KEYID = 6
7,652,293 UART: [ldev] SUBJECT.KEYID = 5
7,653,450 UART: [ldev] AUTHORITY.KEYID = 7
7,654,729 UART: [ldev] FE.KEYID = 1
7,665,769 UART: [ldev] Erasing FE.KEYID = 1
10,950,907 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,477 UART: [ldev] --
13,313,897 UART: [fwproc] Waiting for Commands...
13,316,791 UART: [fwproc] Received command 0x46574c44
13,318,966 UART: [fwproc] Received Image of size 118548 bytes
17,420,293 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,769 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,896,584 >>> mbox cmd response: success
17,901,191 UART: [afmc] ++
17,901,804 UART: [afmc] CDI.KEYID = 6
17,902,735 UART: [afmc] SUBJECT.KEYID = 7
17,903,946 UART: [afmc] AUTHORITY.KEYID = 5
21,218,666 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,512,790 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,515,043 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,529,491 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,544,195 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,558,606 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,599 UART: [afmc] --
23,583,907 UART: [cold-reset] --
23,588,034 UART: [state] Locking Datavault
23,593,714 UART: [state] Locking PCR0, PCR1 and PCR31
23,595,405 UART: [state] Locking ICCM
23,597,873 UART: [exit] Launching FMC @ 0x40000130
23,606,260 UART:
23,606,492 UART: Running Caliptra FMC ...
23,607,606 UART:
23,607,771 UART: [state] CFI Enabled
23,615,630 UART: [fht] FMC Alias Private Key: 7
25,955,462 UART: [art] Extend RT PCRs Done
25,956,689 UART: [art] Lock RT PCRs Done
25,958,310 UART: [art] Populate DV Done
25,963,446 UART: [fht] FMC Alias Private Key: 7
25,964,974 UART: [art] Derive CDI
25,965,738 UART: [art] Store in slot 0x4
26,008,365 UART: [art] Derive Key Pair
26,009,392 UART: [art] Store priv key in slot 0x5
29,251,341 UART: [art] Derive Key Pair - Done
29,264,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,541 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,070 UART: [art] PUB.X = 347503B521179E6FE3E528200C061C7B7DB77247FE8D72D88AF7393ADFDD5CB25C32D8D5268ED75EF7AD4CC7949FE454
31,553,337 UART: [art] PUB.Y = B4BC5CD01BAD0A219970620B6926F4C1AF650C6D0992CE315F0516CEE07D49BC101A550C0066CDB8D7DD4B4E894C81CA
31,560,589 UART: [art] SIG.R = ABE8D51D28DA300C7999548823B09D23E2DF352CF95F5C8B151120A92D0243512456C48129D766C1A53629FDC022C909
31,567,981 UART: [art] SIG.S = 9B7EF6ADEADDC9BD013C0D778D590DA8E8CE388D8288A3D5193962792269B667627F5CEEC164A4CFC59BCC15F17FDF75
32,873,674 UART: Caliptra RT
32,874,382 UART: [state] CFI Enabled
33,007,829 UART: [rt] RT listening for mailbox commands...
33,010,093 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,040,819 UART: [rt]cmd =0x4d454153, len=108
33,059,388 >>> mbox cmd response data (12 bytes)
35,135,412 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,240,964 UART:
35,241,319 UART: Running Caliptra ROM ...
35,242,450 UART:
35,242,645 UART: [state] CFI Enabled
35,256,180 UART: [state] LifecycleState = Unprovisioned
35,258,110 UART: [state] DebugLocked = No
35,260,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,265,254 UART: [kat] SHA2-256
35,434,988 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,445,488 UART: [kat] ++
35,445,935 UART: [kat] sha1
35,456,813 UART: [kat] SHA2-256
35,459,555 UART: [kat] SHA2-384
35,465,315 UART: [kat] SHA2-512-ACC
35,467,652 UART: [kat] ECC-384
37,752,147 UART: [kat] HMAC-384Kdf
37,763,952 UART: [kat] LMS
38,954,007 UART: [kat] --
38,958,866 UART: [update-reset] ++
42,723,487 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,726,556 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,999,288 >>> mbox cmd response: success
42,999,634 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,000,719 UART: [update-reset] Copying MAN_2 To MAN_1
43,023,153 UART: [update-reset Success] --
43,025,964 UART: [state] Locking Datavault
43,028,732 UART: [state] Locking PCR0, PCR1 and PCR31
43,030,429 UART: [state] Locking ICCM
43,032,683 UART: [exit] Launching FMC @ 0x40000130
43,041,076 UART:
43,041,318 UART: Running Caliptra FMC ...
43,042,417 UART:
43,042,567 UART: [state] CFI Enabled
43,086,519 UART: [art] Extend RT PCRs Done
43,087,855 UART: [art] Lock RT PCRs Done
43,089,122 UART: [art] Populate DV Done
43,094,584 UART: [fht] FMC Alias Private Key: 7
43,096,063 UART: [art] Derive CDI
43,096,929 UART: [art] Store in slot 0x4
43,139,033 UART: [art] Derive Key Pair
43,140,029 UART: [art] Store priv key in slot 0x5
46,382,571 UART: [art] Derive Key Pair - Done
46,395,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,676,358 UART: [art] Erasing AUTHORITY.KEYID = 7
48,677,861 UART: [art] PUB.X = 8B183DC78A7490A1ABF2DB824915CD2CE799F96BAE21F084589B4D6751782102BDF2127793DEB305237C206195E22927
48,685,126 UART: [art] PUB.Y = 4A73F662DFB62C63BEAF7A66AFBBE768C89D77302C99B08E4BB7A3EA4C6FCA3664F753C40424A8E3ADD04F104CDD1194
48,692,445 UART: [art] SIG.R = DFF0D8E96DDCFD1336195D943C40A5ADE0C434950F3D2269487316447F432DE550BF4FF6ADD008F17C27CF7681DECA4F
48,699,850 UART: [art] SIG.S = 961D94A6DF8D8D7437699408BA103B78BADA00878F435C6E575052411ACAC1726BC711432C3B49F3AC39CB7138BB45BA
50,004,629 UART: mbox::rt_entry...
50,005,609 UART: ____ _ _ _ ____ _____
50,007,544 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,009,568 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,011,423 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,013,343 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,015,233 UART: |_|
50,016,058 UART:
50,387,553 UART: [rt] Runtime listening for mailbox commands...
50,389,724 >>> mbox cmd response data (48 bytes)
50,390,292 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,392,601 >>> mbox cmd response data (48 bytes)
50,393,468 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,410,320 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
4,129,100 ready_for_fw is high
4,129,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,507 >>> mbox cmd response: success
23,798,968 UART:
23,799,803 UART: Running Caliptra FMC ...
23,800,942 UART:
23,801,095 UART: [state] CFI Enabled
23,808,686 UART: [fht] FMC Alias Private Key: 7
26,148,993 UART: [art] Extend RT PCRs Done
26,150,221 UART: [art] Lock RT PCRs Done
26,151,745 UART: [art] Populate DV Done
26,157,335 UART: [fht] FMC Alias Private Key: 7
26,159,037 UART: [art] Derive CDI
26,159,849 UART: [art] Store in slot 0x4
26,202,238 UART: [art] Derive Key Pair
26,203,272 UART: [art] Store priv key in slot 0x5
29,445,053 UART: [art] Derive Key Pair - Done
29,458,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,898 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,412 UART: [art] PUB.X = 146BCDEBD92A5BCE6AFC2F2A0A58C2375B5683CE1499AB839192CB20FE2E0E3AE75C916E6F023373500F347AF1DAB7B4
31,746,658 UART: [art] PUB.Y = D370D64FD4599BC0640CBD8B12306CA1819A11D77FEAE8DDA7C8FFEEB889EA67DC8CC2AC7B2E1C9EA9D99970D0B63D7E
31,753,954 UART: [art] SIG.R = 418845D2E9985A7EE35CEBE1E1DA2590463790E637E1475B50B099350B189E21E3E3D8215F90385F93575754255EDA6A
31,761,343 UART: [art] SIG.S = CD77336589561D5FD2E74372731169F5AAAFC0486AA4C2ECA7F3050C915DC3B04308CCEC222FEDF5A9C908DAEB360079
33,066,252 UART: Caliptra RT
33,066,958 UART: [state] CFI Enabled
33,199,003 UART: [rt] RT listening for mailbox commands...
33,201,377 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,232,138 UART: [rt]cmd =0x4d454153, len=108
33,251,444 >>> mbox cmd response data (12 bytes)
35,322,759 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,302,978 >>> mbox cmd response: success
43,303,558 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,338,263 UART:
43,338,593 UART: Running Caliptra FMC ...
43,339,719 UART:
43,339,877 UART: [state] CFI Enabled
43,383,570 UART: [art] Extend RT PCRs Done
43,384,711 UART: [art] Lock RT PCRs Done
43,386,347 UART: [art] Populate DV Done
43,391,874 UART: [fht] FMC Alias Private Key: 7
43,393,613 UART: [art] Derive CDI
43,394,435 UART: [art] Store in slot 0x4
43,437,185 UART: [art] Derive Key Pair
43,438,177 UART: [art] Store priv key in slot 0x5
46,680,190 UART: [art] Derive Key Pair - Done
46,693,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,973,570 UART: [art] Erasing AUTHORITY.KEYID = 7
48,975,077 UART: [art] PUB.X = 5538DF63F3A64F5EA6D0CD6D874FCEEF383143A7687A7E73A93455EFF84CBBD30D2EE876443ED3C2C14475045DBF05C5
48,982,376 UART: [art] PUB.Y = FFDF12FEAED9A2EAB65414FF78F968E316378DA50780C653EEFF56536023E25418C24F7F9738D8077B7C94F3BB7BF9AC
48,989,657 UART: [art] SIG.R = 12CA8C019DF10D9942610806D346FD716B8EDA96512681908A28E7B78B97E4533960342F394F8D372A3ED1AFCE0316D1
48,997,000 UART: [art] SIG.S = 2941EB816C71E6057D284648433D505F378006D95745EA8F072F1227DCBCB79F42D20850377139E010ED44F2E23BECE6
50,302,220 UART: mbox::rt_entry...
50,303,166 UART: ____ _ _ _ ____ _____
50,305,152 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,307,155 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,309,078 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,311,003 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,312,929 UART: |_|
50,313,735 UART:
50,678,446 UART: [rt] Runtime listening for mailbox commands...
50,680,599 >>> mbox cmd response data (48 bytes)
50,681,160 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,683,481 >>> mbox cmd response data (48 bytes)
50,684,346 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,701,206 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,150 UART:
192,511 UART: Running Caliptra ROM ...
193,728 UART:
193,879 UART: [state] CFI Enabled
266,400 UART: [state] LifecycleState = Unprovisioned
268,385 UART: [state] DebugLocked = No
270,691 UART: [state] WD Timer not started. Device not locked for debugging
274,309 UART: [kat] SHA2-256
453,913 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,736 UART: [kat] ++
465,233 UART: [kat] sha1
476,884 UART: [kat] SHA2-256
479,613 UART: [kat] SHA2-384
486,452 UART: [kat] SHA2-512-ACC
488,817 UART: [kat] ECC-384
2,951,881 UART: [kat] HMAC-384Kdf
2,971,440 UART: [kat] LMS
3,447,891 UART: [kat] --
3,451,977 UART: [cold-reset] ++
3,453,265 UART: [fht] FHT @ 0x50003400
3,464,588 UART: [idev] ++
3,465,142 UART: [idev] CDI.KEYID = 6
3,466,091 UART: [idev] SUBJECT.KEYID = 7
3,467,334 UART: [idev] UDS.KEYID = 0
3,468,225 ready_for_fw is high
3,468,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,487 UART: [idev] Erasing UDS.KEYID = 0
5,986,652 UART: [idev] Sha1 KeyId Algorithm
6,011,814 UART: [idev] --
6,016,676 UART: [ldev] ++
6,017,245 UART: [ldev] CDI.KEYID = 6
6,018,126 UART: [ldev] SUBJECT.KEYID = 5
6,019,391 UART: [ldev] AUTHORITY.KEYID = 7
6,020,617 UART: [ldev] FE.KEYID = 1
6,058,111 UART: [ldev] Erasing FE.KEYID = 1
8,563,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,039 UART: [ldev] --
10,372,343 UART: [fwproc] Wait for Commands...
10,375,411 UART: [fwproc] Recv command 0x46574c44
10,377,391 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,919 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,933 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,352,774 >>> mbox cmd response: success
14,357,734 UART: [afmc] ++
14,358,342 UART: [afmc] CDI.KEYID = 6
14,359,299 UART: [afmc] SUBJECT.KEYID = 7
14,360,515 UART: [afmc] AUTHORITY.KEYID = 5
16,898,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,693 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,485 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,529 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,109 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,052 UART: [afmc] --
18,715,613 UART: [cold-reset] --
18,718,613 UART: [state] Locking Datavault
18,724,343 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,091 UART: [state] Locking ICCM
18,728,566 UART: [exit] Launching FMC @ 0x40000130
18,736,956 UART:
18,737,194 UART: Running Caliptra FMC ...
18,738,312 UART:
18,738,468 UART: [state] CFI Enabled
18,795,040 UART: [fht] FMC Alias Private Key: 7
20,562,254 UART: [art] Extend RT PCRs Done
20,563,474 UART: [art] Lock RT PCRs Done
20,565,209 UART: [art] Populate DV Done
20,570,656 UART: [fht] FMC Alias Private Key: 7
20,572,361 UART: [art] Derive CDI
20,573,177 UART: [art] Store in slot 0x4
20,628,387 UART: [art] Derive Key Pair
20,629,425 UART: [art] Store priv key in slot 0x5
23,092,363 UART: [art] Derive Key Pair - Done
23,105,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,211 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,719 UART: [art] PUB.X = A1015D766A2978CF570A60050D539A5FE0E297BEF722291A9F8AF8B5EEB594254289B297E9949358FC8A088A4B5F2797
24,826,970 UART: [art] PUB.Y = 602EA95F00924DE28BB33CCCDA8DF2C4FDA88B6AF6008484096AA3FF406D049F26CB5D6DB7905326990933B157C77737
24,834,221 UART: [art] SIG.R = 3D29B9BFF69D6F285FD7C84400419ABAA9377570C5FA5BA6EE62C9A57E6292CEF5F769FA695C26D24C007F390B7FCAEB
24,841,627 UART: [art] SIG.S = C6C3B84FD6A3E0ADC4D56FB38D722A27D0A5232EC9DC86857864BB8518AD7CC72BA780919C10EB417FA636C66409736C
25,821,019 UART: Caliptra RT
25,821,727 UART: [state] CFI Enabled
26,003,125 UART: [rt] RT listening for mailbox commands...
26,005,385 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,036,004 UART: [rt]cmd =0x4d454153, len=108
26,054,803 >>> mbox cmd response data (12 bytes)
28,113,332 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,219,360 UART:
28,219,734 UART: Running Caliptra ROM ...
28,220,863 UART:
28,221,060 UART: [state] CFI Enabled
28,292,376 UART: [state] LifecycleState = Unprovisioned
28,294,299 UART: [state] DebugLocked = No
28,296,873 UART: [state] WD Timer not started. Device not locked for debugging
28,301,428 UART: [kat] SHA2-256
28,481,114 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,491,882 UART: [kat] ++
28,492,392 UART: [kat] sha1
28,504,512 UART: [kat] SHA2-256
28,507,198 UART: [kat] SHA2-384
28,512,532 UART: [kat] SHA2-512-ACC
28,514,884 UART: [kat] ECC-384
30,978,708 UART: [kat] HMAC-384Kdf
31,001,431 UART: [kat] LMS
31,477,870 UART: [kat] --
31,484,504 UART: [update-reset] ++
34,546,617 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,549,347 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,821,937 >>> mbox cmd response: success
34,822,301 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,822,589 UART: [update-reset] Copying MAN_2 To MAN_1
34,859,444 UART: [update-reset Success] --
34,864,096 UART: [state] Locking Datavault
34,866,929 UART: [state] Locking PCR0, PCR1 and PCR31
34,868,685 UART: [state] Locking ICCM
34,871,426 UART: [exit] Launching FMC @ 0x40000130
34,879,818 UART:
34,880,050 UART: Running Caliptra FMC ...
34,881,154 UART:
34,881,322 UART: [state] CFI Enabled
34,979,895 UART: [art] Extend RT PCRs Done
34,981,073 UART: [art] Lock RT PCRs Done
34,982,380 UART: [art] Populate DV Done
34,987,949 UART: [fht] FMC Alias Private Key: 7
34,989,643 UART: [art] Derive CDI
34,990,447 UART: [art] Store in slot 0x4
35,048,971 UART: [art] Derive Key Pair
35,050,005 UART: [art] Store priv key in slot 0x5
37,513,153 UART: [art] Derive Key Pair - Done
37,526,151 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,238,857 UART: [art] Erasing AUTHORITY.KEYID = 7
39,240,357 UART: [art] PUB.X = DF17B373550F23480B2174C659156D1720A6F2F0987F2BF8C2028993BB5BB4057E1EF971707A7A8C30DF1C6B9B2A1B4C
39,247,636 UART: [art] PUB.Y = C7988748E355CA808A076FC5E24D24B188A77142E582CF33CFA41F5713A0BCAE6BACC1B1485486F1E7FFBB6F3A2D3035
39,254,930 UART: [art] SIG.R = 7F3489C36D3DD0367B5089381260BCB93629B6AA6435FC106FF0F1F304F77A3D66EB56EEF4D4F46CFB34A3B0F1EC8C18
39,262,318 UART: [art] SIG.S = E6C4076A8776558D2AB5ABF437FC29DB0EBD8F25229F0DA8CC54256861F6F18AA3C58E2D2EF158B5345CD2451C5AE36B
40,240,821 UART: mbox::rt_entry...
40,241,768 UART: ____ _ _ _ ____ _____
40,243,747 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,245,770 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,247,696 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,249,620 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,251,541 UART: |_|
40,252,369 UART:
40,618,677 UART: [rt] Runtime listening for mailbox commands...
40,620,868 >>> mbox cmd response data (48 bytes)
40,621,456 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,623,770 >>> mbox cmd response data (48 bytes)
40,624,640 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,641,556 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,465,729 ready_for_fw is high
3,466,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,240,354 >>> mbox cmd response: success
18,520,527 UART:
18,520,910 UART: Running Caliptra FMC ...
18,522,049 UART:
18,522,209 UART: [state] CFI Enabled
18,586,583 UART: [fht] FMC Alias Private Key: 7
20,353,581 UART: [art] Extend RT PCRs Done
20,354,802 UART: [art] Lock RT PCRs Done
20,356,588 UART: [art] Populate DV Done
20,361,842 UART: [fht] FMC Alias Private Key: 7
20,363,379 UART: [art] Derive CDI
20,364,188 UART: [art] Store in slot 0x4
20,419,402 UART: [art] Derive Key Pair
20,420,402 UART: [art] Store priv key in slot 0x5
22,883,251 UART: [art] Derive Key Pair - Done
22,896,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,609,666 UART: [art] Erasing AUTHORITY.KEYID = 7
24,611,175 UART: [art] PUB.X = E341223FDEFE815F427119CC9A9605A0B700667F940E1EBC3973FE378CFE4C2EF69AA92FF139F431C28F8CA9A2B34E85
24,618,425 UART: [art] PUB.Y = C468B20AF93A4D6C32A10FD86CC82BA65197D87B1E6318C4ACD468CA375878B329D9E32F7438EDCE5A1E3BD6BBDF7D3A
24,625,723 UART: [art] SIG.R = 9E40E0BED0BFF73E8071BA7271A4D88EEE602E6958ACDCF731615F6F040DCB52E0173738E157E93C7D0EB53D7DB30152
24,633,127 UART: [art] SIG.S = A437A506A6496690715C49A2E446C3E72A5864DD0D993AB01A25A53E61301B80E80689748245FC3F5C5A9C990CDFCA17
25,612,074 UART: Caliptra RT
25,612,771 UART: [state] CFI Enabled
25,795,151 UART: [rt] RT listening for mailbox commands...
25,797,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,828,066 UART: [rt]cmd =0x4d454153, len=108
25,847,071 >>> mbox cmd response data (12 bytes)
27,905,377 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,610,065 >>> mbox cmd response: success
34,610,509 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,643,521 UART:
34,643,791 UART: Running Caliptra FMC ...
34,644,904 UART:
34,645,060 UART: [state] CFI Enabled
34,750,348 UART: [art] Extend RT PCRs Done
34,751,533 UART: [art] Lock RT PCRs Done
34,753,032 UART: [art] Populate DV Done
34,758,338 UART: [fht] FMC Alias Private Key: 7
34,759,920 UART: [art] Derive CDI
34,760,728 UART: [art] Store in slot 0x4
34,819,664 UART: [art] Derive Key Pair
34,820,657 UART: [art] Store priv key in slot 0x5
37,282,996 UART: [art] Derive Key Pair - Done
37,295,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,009,343 UART: [art] Erasing AUTHORITY.KEYID = 7
39,010,858 UART: [art] PUB.X = 8F32F02958A45B13F9B564A89E9610179118F2301AEBC27447849E2C1707C0E4D67519CCC509A8FBBC37F50939449C35
39,018,115 UART: [art] PUB.Y = 8323651764AD2F74FA505F252DBAB34A96917BFEDA186D2EE96D424C79FB2273EB093BDE2D6F7942A6220D2C096041D5
39,025,349 UART: [art] SIG.R = AAFC6CBD72A6AEC33917242DAA74BC3655F5ACF879CCD8A7363FEE033ABB42BAC2F53DFB10F609DA564822E7343DE0FB
39,032,791 UART: [art] SIG.S = 48D429BD7D3BE511E06830DB15D25101D3F5D6283A51CD06A0699ACEB07085A8F74EB2DF71E3DA3F7394D58CA4BA614C
40,011,486 UART: mbox::rt_entry...
40,012,442 UART: ____ _ _ _ ____ _____
40,014,421 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,016,424 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,018,351 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,020,283 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,022,206 UART: |_|
40,023,037 UART:
40,397,393 UART: [rt] Runtime listening for mailbox commands...
40,399,592 >>> mbox cmd response data (48 bytes)
40,400,157 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,402,510 >>> mbox cmd response data (48 bytes)
40,403,371 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,420,231 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,445 UART:
192,819 UART: Running Caliptra ROM ...
193,997 UART:
603,640 UART: [state] CFI Enabled
617,396 UART: [state] LifecycleState = Unprovisioned
619,348 UART: [state] DebugLocked = No
621,314 UART: [state] WD Timer not started. Device not locked for debugging
625,918 UART: [kat] SHA2-256
805,566 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,370 UART: [kat] ++
816,815 UART: [kat] sha1
827,973 UART: [kat] SHA2-256
830,626 UART: [kat] SHA2-384
837,120 UART: [kat] SHA2-512-ACC
839,488 UART: [kat] ECC-384
3,279,935 UART: [kat] HMAC-384Kdf
3,293,233 UART: [kat] LMS
3,769,715 UART: [kat] --
3,775,005 UART: [cold-reset] ++
3,776,100 UART: [fht] FHT @ 0x50003400
3,787,724 UART: [idev] ++
3,788,288 UART: [idev] CDI.KEYID = 6
3,789,339 UART: [idev] SUBJECT.KEYID = 7
3,790,451 UART: [idev] UDS.KEYID = 0
3,791,504 ready_for_fw is high
3,791,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,558 UART: [idev] Erasing UDS.KEYID = 0
6,264,279 UART: [idev] Sha1 KeyId Algorithm
6,288,119 UART: [idev] --
6,293,410 UART: [ldev] ++
6,293,981 UART: [ldev] CDI.KEYID = 6
6,294,953 UART: [ldev] SUBJECT.KEYID = 5
6,296,118 UART: [ldev] AUTHORITY.KEYID = 7
6,297,400 UART: [ldev] FE.KEYID = 1
6,307,497 UART: [ldev] Erasing FE.KEYID = 1
8,781,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,110 UART: [ldev] --
10,577,258 UART: [fwproc] Wait for Commands...
10,579,192 UART: [fwproc] Recv command 0x46574c44
10,581,178 UART: [fwproc] Recv'd Img size: 118548 bytes
14,060,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,141,437 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,214,493 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,542,084 >>> mbox cmd response: success
14,546,326 UART: [afmc] ++
14,546,933 UART: [afmc] CDI.KEYID = 6
14,547,820 UART: [afmc] SUBJECT.KEYID = 7
14,549,042 UART: [afmc] AUTHORITY.KEYID = 5
17,058,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,531 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,376 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,464 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,992 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,287 UART: [afmc] --
18,859,913 UART: [cold-reset] --
18,862,638 UART: [state] Locking Datavault
18,869,018 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,862 UART: [state] Locking ICCM
18,872,645 UART: [exit] Launching FMC @ 0x40000130
18,881,099 UART:
18,881,344 UART: Running Caliptra FMC ...
18,882,444 UART:
18,882,606 UART: [state] CFI Enabled
18,890,166 UART: [fht] FMC Alias Private Key: 7
20,656,415 UART: [art] Extend RT PCRs Done
20,657,658 UART: [art] Lock RT PCRs Done
20,659,298 UART: [art] Populate DV Done
20,664,869 UART: [fht] FMC Alias Private Key: 7
20,666,462 UART: [art] Derive CDI
20,667,280 UART: [art] Store in slot 0x4
20,709,660 UART: [art] Derive Key Pair
20,710,850 UART: [art] Store priv key in slot 0x5
23,137,012 UART: [art] Derive Key Pair - Done
23,149,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,125 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,632 UART: [art] PUB.X = 309281F6774FCF891DA486DD87F50473FC19BEA768C24CE6B3802BDFB15A5CED5C5BDF7211FD0BB721BD356C33D868CC
24,864,929 UART: [art] PUB.Y = EB977CBDFA8F898A66C2419F1C4B95A59D63E76A180F7EBFC02BE5D9523F4A7DA716C266F3DBAA00419951AA2C27BE52
24,872,190 UART: [art] SIG.R = 219439F976B4BC7D91E036EF55A4DC8434C26163FD48CD29F49688C5C79A98E6954A2AFDFD75D4E9A69046AABC0CA0A7
24,879,594 UART: [art] SIG.S = E5E400B383A14C2773F9EE025F49FB379CDFC7EEA6F48ADC3AF4E8E04E5A9BAA56283AC913A53DDF09699B00C68BCA82
25,858,629 UART: Caliptra RT
25,859,325 UART: [state] CFI Enabled
25,992,560 UART: [rt] RT listening for mailbox commands...
25,994,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,025,772 UART: [rt]cmd =0x4d454153, len=108
26,044,562 >>> mbox cmd response data (12 bytes)
28,103,058 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,208,982 UART:
28,209,328 UART: Running Caliptra ROM ...
28,210,457 UART:
28,210,628 UART: [state] CFI Enabled
28,221,387 UART: [state] LifecycleState = Unprovisioned
28,223,275 UART: [state] DebugLocked = No
28,225,898 UART: [state] WD Timer not started. Device not locked for debugging
28,229,025 UART: [kat] SHA2-256
28,408,722 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,419,491 UART: [kat] ++
28,419,991 UART: [kat] sha1
28,431,733 UART: [kat] SHA2-256
28,434,425 UART: [kat] SHA2-384
28,440,354 UART: [kat] SHA2-512-ACC
28,442,712 UART: [kat] ECC-384
30,882,999 UART: [kat] HMAC-384Kdf
30,894,571 UART: [kat] LMS
31,371,043 UART: [kat] --
31,375,957 UART: [update-reset] ++
34,429,181 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,432,015 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,704,593 >>> mbox cmd response: success
34,704,964 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,705,264 UART: [update-reset] Copying MAN_2 To MAN_1
34,742,177 UART: [update-reset Success] --
34,748,286 UART: [state] Locking Datavault
34,753,114 UART: [state] Locking PCR0, PCR1 and PCR31
34,754,879 UART: [state] Locking ICCM
34,757,302 UART: [exit] Launching FMC @ 0x40000130
34,765,699 UART:
34,765,936 UART: Running Caliptra FMC ...
34,767,039 UART:
34,767,203 UART: [state] CFI Enabled
34,811,491 UART: [art] Extend RT PCRs Done
34,812,677 UART: [art] Lock RT PCRs Done
34,814,138 UART: [art] Populate DV Done
34,819,871 UART: [fht] FMC Alias Private Key: 7
34,821,567 UART: [art] Derive CDI
34,822,380 UART: [art] Store in slot 0x4
34,864,938 UART: [art] Derive Key Pair
34,865,942 UART: [art] Store priv key in slot 0x5
37,293,266 UART: [art] Derive Key Pair - Done
37,306,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,012,922 UART: [art] Erasing AUTHORITY.KEYID = 7
39,014,445 UART: [art] PUB.X = CABFB98044AE0199549D4FEACFA91BD57DFCE95A724DC5580A8D6F56C44183B77B47CFB06A5820BACB267ED7EAC5CABE
39,021,747 UART: [art] PUB.Y = F72647AFF4D78729DAC38123A43ED4FAAAE6589DB5196241C44919EF391A7DA4373AD1B3667C854FB87107F6B010FD61
39,028,983 UART: [art] SIG.R = E4C98AE7D4E09AFF563A6145ABA1FD33D29F4AFA2D2A59763E71C86DF052220751B7803C6E1CEF39D0AC8E0976BFCCE0
39,036,463 UART: [art] SIG.S = 941505014E61D469DF2E1803031883E811032651D1201EEFD41F92D01D28EC9B1CE53BAA01B77778D101A08A8E59E6E4
40,014,616 UART: mbox::rt_entry...
40,015,575 UART: ____ _ _ _ ____ _____
40,017,567 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,019,580 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,021,517 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,023,453 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,025,310 UART: |_|
40,026,134 UART:
40,396,987 UART: [rt] Runtime listening for mailbox commands...
40,399,151 >>> mbox cmd response data (48 bytes)
40,399,736 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,402,054 >>> mbox cmd response data (48 bytes)
40,402,955 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,419,868 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
15,140 writing to cptra_bootfsm_go
3,793,299 ready_for_fw is high
3,793,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,462,063 >>> mbox cmd response: success
18,713,797 UART:
18,714,211 UART: Running Caliptra FMC ...
18,715,321 UART:
18,715,478 UART: [state] CFI Enabled
18,723,338 UART: [fht] FMC Alias Private Key: 7
20,489,817 UART: [art] Extend RT PCRs Done
20,491,046 UART: [art] Lock RT PCRs Done
20,492,686 UART: [art] Populate DV Done
20,498,024 UART: [fht] FMC Alias Private Key: 7
20,499,628 UART: [art] Derive CDI
20,500,448 UART: [art] Store in slot 0x4
20,543,368 UART: [art] Derive Key Pair
20,544,370 UART: [art] Store priv key in slot 0x5
22,970,674 UART: [art] Derive Key Pair - Done
22,983,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,690,146 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,644 UART: [art] PUB.X = 294A3345695383C440581F3FB358B7158B270D30EE001067D7137C94D5F135D5E55EE5EE4F6A62E9CAC41888171F2F2B
24,698,851 UART: [art] PUB.Y = A9A3AE7910512988D6BA52220E8ED46067728E9821929FE2D1FA50247EE4EB1F34FBCC296310DA391D023CE578C937F5
24,706,112 UART: [art] SIG.R = A2D6673FD5469D84AE0421CFF4126AF0931024BA4017700D61E6E09C8B2AF860BE4D76DD2FEA4B03CF2A2BC69E331605
24,713,514 UART: [art] SIG.S = E65700B2DB4EB15052440595C09BA0B969339D230522B26DC2E0EFBC2F73F81067E755C4A0EA5B050B33588778B4ED7D
25,692,098 UART: Caliptra RT
25,692,821 UART: [state] CFI Enabled
25,825,766 UART: [rt] RT listening for mailbox commands...
25,828,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,858,730 UART: [rt]cmd =0x4d454153, len=108
25,877,655 >>> mbox cmd response data (12 bytes)
27,942,780 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,552,654 >>> mbox cmd response: success
34,553,137 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,589,078 UART:
34,589,402 UART: Running Caliptra FMC ...
34,590,442 UART:
34,590,594 UART: [state] CFI Enabled
34,634,838 UART: [art] Extend RT PCRs Done
34,635,990 UART: [art] Lock RT PCRs Done
34,637,613 UART: [art] Populate DV Done
34,643,165 UART: [fht] FMC Alias Private Key: 7
34,644,861 UART: [art] Derive CDI
34,645,606 UART: [art] Store in slot 0x4
34,688,262 UART: [art] Derive Key Pair
34,689,270 UART: [art] Store priv key in slot 0x5
37,116,245 UART: [art] Derive Key Pair - Done
37,129,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,835,298 UART: [art] Erasing AUTHORITY.KEYID = 7
38,836,811 UART: [art] PUB.X = EE1BE2C2BBF1D024EAF5CAD42C15166CC47BA6970EE9EE2C6D13C19F7EBA3F28124A76ED63ACCCE18727F018DEBB68B9
38,844,123 UART: [art] PUB.Y = 6772A40CFCCE4160E05B3B9DBCF98E77B1FD6FF7801FABD03A25BC965C65C2EB262E09A4AC2D808725CC636A0BC37C8A
38,851,417 UART: [art] SIG.R = 71C9B31A45DB1F84B45506125A982F5EFE590195AD383981B2E4E213E25BD013B0178BA2D43C02093D5173F92131E4B0
38,858,825 UART: [art] SIG.S = E384861CAB0D285007FC6B1B3397D1596F9D695892F4F83ADD2B998A5D09444F39A2936F704BEE2F205408779B85EB9E
39,837,205 UART: mbox::rt_entry...
39,838,149 UART: ____ _ _ _ ____ _____
39,840,132 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,842,416 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,844,418 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,846,361 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,848,293 UART: |_|
39,849,127 UART:
40,218,874 UART: [rt] Runtime listening for mailbox commands...
40,221,066 >>> mbox cmd response data (48 bytes)
40,221,628 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,223,981 >>> mbox cmd response data (48 bytes)
40,224,859 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,241,722 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,053 UART:
192,450 UART: Running Caliptra ROM ...
193,543 UART:
193,684 UART: [state] CFI Enabled
260,703 UART: [state] LifecycleState = Unprovisioned
263,127 UART: [state] DebugLocked = No
266,008 UART: [state] WD Timer not started. Device not locked for debugging
270,399 UART: [kat] SHA2-256
460,277 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,007 UART: [kat] ++
471,464 UART: [kat] sha1
483,257 UART: [kat] SHA2-256
486,341 UART: [kat] SHA2-384
492,114 UART: [kat] SHA2-512-ACC
494,693 UART: [kat] ECC-384
2,945,108 UART: [kat] HMAC-384Kdf
2,969,718 UART: [kat] LMS
3,501,453 UART: [kat] --
3,504,382 UART: [cold-reset] ++
3,506,455 UART: [fht] FHT @ 0x50003400
3,518,308 UART: [idev] ++
3,518,983 UART: [idev] CDI.KEYID = 6
3,520,025 UART: [idev] SUBJECT.KEYID = 7
3,521,138 UART: [idev] UDS.KEYID = 0
3,522,067 ready_for_fw is high
3,522,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,366 UART: [idev] Erasing UDS.KEYID = 0
6,027,854 UART: [idev] Sha1 KeyId Algorithm
6,050,559 UART: [idev] --
6,054,712 UART: [ldev] ++
6,055,393 UART: [ldev] CDI.KEYID = 6
6,056,311 UART: [ldev] SUBJECT.KEYID = 5
6,057,468 UART: [ldev] AUTHORITY.KEYID = 7
6,058,717 UART: [ldev] FE.KEYID = 1
6,099,613 UART: [ldev] Erasing FE.KEYID = 1
8,606,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,752 UART: [ldev] --
10,411,911 UART: [fwproc] Wait for Commands...
10,413,516 UART: [fwproc] Recv command 0x46574c44
10,415,817 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,426 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,076 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,674,371 >>> mbox cmd response: success
14,677,625 UART: [afmc] ++
14,678,396 UART: [afmc] CDI.KEYID = 6
14,679,534 UART: [afmc] SUBJECT.KEYID = 7
14,680,969 UART: [afmc] AUTHORITY.KEYID = 5
17,215,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,585 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,676 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,791 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,719 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,750 UART: [afmc] --
19,013,134 UART: [cold-reset] --
19,017,972 UART: [state] Locking Datavault
19,023,554 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,755 UART: [state] Locking ICCM
19,027,642 UART: [exit] Launching FMC @ 0x40000130
19,036,310 UART:
19,036,581 UART: Running Caliptra FMC ...
19,037,698 UART:
19,037,859 UART: [state] CFI Enabled
19,094,979 UART: [fht] FMC Alias Private Key: 7
20,861,919 UART: [art] Extend RT PCRs Done
20,863,123 UART: [art] Lock RT PCRs Done
20,864,685 UART: [art] Populate DV Done
20,869,922 UART: [fht] FMC Alias Private Key: 7
20,871,386 UART: [art] Derive CDI
20,872,130 UART: [art] Store in slot 0x4
20,928,142 UART: [art] Derive Key Pair
20,929,134 UART: [art] Store priv key in slot 0x5
23,392,191 UART: [art] Derive Key Pair - Done
23,404,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,892 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,392 UART: [art] PUB.X = 00D711338ABE2BBFFCE5D1759C2829DBCCEA2EF7CCEC2A451A4D8F005E3045FADEC7941D2D0270F231804215528DA9BF
25,126,629 UART: [art] PUB.Y = 4949DA08FC5D482E72231E62DEA8A8F0E4063412FE5B87F4EA92205F0C5C478356F96F85032EC3195E739104EF60CCC0
25,133,849 UART: [art] SIG.R = AE1ED57D54A6227D2E83094E29336F8843150993EF5680C6F0707463460AD6E7BE5D574ED03B0CBB7CAE7A8B9D7A7320
25,141,220 UART: [art] SIG.S = 802C7589DEE7B22105AF9F0FCB1C8578E0DA49B3BE26C826301E7BD9EBFAFE99B4A80733D4A9B3EC7F8928FDB495F73E
26,120,215 UART: Caliptra RT
26,120,908 UART: [state] CFI Enabled
26,300,707 UART: [rt] RT listening for mailbox commands...
26,303,043 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,333,629 UART: [rt]cmd =0x4d454153, len=108
26,352,224 >>> mbox cmd response data (12 bytes)
28,417,174 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,522,955 UART:
28,523,316 UART: Running Caliptra ROM ...
28,524,393 UART:
28,524,546 UART: [state] CFI Enabled
28,592,358 UART: [state] LifecycleState = Unprovisioned
28,594,457 UART: [state] DebugLocked = No
28,596,463 UART: [state] WD Timer not started. Device not locked for debugging
28,601,660 UART: [kat] SHA2-256
28,791,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,802,296 UART: [kat] ++
28,802,753 UART: [kat] sha1
28,815,686 UART: [kat] SHA2-256
28,818,698 UART: [kat] SHA2-384
28,823,548 UART: [kat] SHA2-512-ACC
28,826,175 UART: [kat] ECC-384
31,278,082 UART: [kat] HMAC-384Kdf
31,300,854 UART: [kat] LMS
31,832,430 UART: [kat] --
31,837,487 UART: [update-reset] ++
34,899,894 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,903,279 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,318,693 >>> mbox cmd response: success
35,319,058 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,320,691 UART: [update-reset] Copying MAN_2 To MAN_1
35,358,249 UART: [update-reset Success] --
35,363,814 UART: [state] Locking Datavault
35,368,590 UART: [state] Locking PCR0, PCR1 and PCR31
35,370,780 UART: [state] Locking ICCM
35,372,766 UART: [exit] Launching FMC @ 0x40000130
35,381,430 UART:
35,381,662 UART: Running Caliptra FMC ...
35,382,762 UART:
35,382,917 UART: [state] CFI Enabled
35,472,254 UART: [art] Extend RT PCRs Done
35,473,460 UART: [art] Lock RT PCRs Done
35,474,808 UART: [art] Populate DV Done
35,480,377 UART: [fht] FMC Alias Private Key: 7
35,482,070 UART: [art] Derive CDI
35,482,887 UART: [art] Store in slot 0x4
35,541,353 UART: [art] Derive Key Pair
35,542,420 UART: [art] Store priv key in slot 0x5
38,005,003 UART: [art] Derive Key Pair - Done
38,017,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,730,114 UART: [art] Erasing AUTHORITY.KEYID = 7
39,731,619 UART: [art] PUB.X = 7F447140726696138425520853354E6396FB42FADCFACB17A004D347751CF453882C087C65653B9755957556CA2B0784
39,738,789 UART: [art] PUB.Y = 22D45E7F97E4A248EC6752FA17E3A885D0BD671B49AE3946AC1619064BEBE299C56FCF8707AC09E26F175E9DA75AD4AF
39,746,108 UART: [art] SIG.R = 6D68BDB2CB9E22F1C4DBCF6403F1E66AD445B0EA81D783451FABC2DE193E2A53CE5988BBDEE6AC6FFED63BD76E8307A2
39,753,578 UART: [art] SIG.S = 341AED1195CF28C0C30D563BBF450894E986F9528DF6032E0993F97CDADE0442A8DDCDD5B7EED1A5BE124371BD2744AC
40,732,637 UART: mbox::rt_entry...
40,733,582 UART: ____ _ _ _ ____ _____
40,735,532 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,737,534 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,739,388 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,741,319 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,743,246 UART: |_|
40,744,055 UART:
41,114,750 UART: [rt] Runtime listening for mailbox commands...
41,116,919 >>> mbox cmd response data (48 bytes)
41,117,505 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,119,850 >>> mbox cmd response data (48 bytes)
41,120,739 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,137,678 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,439,527 ready_for_fw is high
3,439,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,801,127 >>> mbox cmd response: success
19,108,525 UART:
19,108,894 UART: Running Caliptra FMC ...
19,110,025 UART:
19,110,185 UART: [state] CFI Enabled
19,178,015 UART: [fht] FMC Alias Private Key: 7
20,944,572 UART: [art] Extend RT PCRs Done
20,945,802 UART: [art] Lock RT PCRs Done
20,947,315 UART: [art] Populate DV Done
20,952,779 UART: [fht] FMC Alias Private Key: 7
20,954,379 UART: [art] Derive CDI
20,955,195 UART: [art] Store in slot 0x4
21,010,909 UART: [art] Derive Key Pair
21,011,949 UART: [art] Store priv key in slot 0x5
23,475,017 UART: [art] Derive Key Pair - Done
23,488,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,325 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,835 UART: [art] PUB.X = D4430DC8F88FB31602CDB7A89D65B7C8B8864EA4247872380560FFA933C9471870376F4CD75860542082527C54C0B696
25,210,062 UART: [art] PUB.Y = 631BA6B3AF8708E9581193D338CA82F421D84510F14318CA48C925B6C640068B28694086CE13737E170413F6F64D6A96
25,217,278 UART: [art] SIG.R = 341A1500357C4BFFC2E72C6F1F3A14317FBA6E801836FC307A8A8B8967A94E66A0713A68DA1E159F1A91DBA0CDF23764
25,224,639 UART: [art] SIG.S = 797ECC9FD905968BBC7F116861AEE8244157B0E53AF3B774C259D8C44BB85B92D53703A26B62C866D02FA2B87F130726
26,202,902 UART: Caliptra RT
26,203,615 UART: [state] CFI Enabled
26,383,434 UART: [rt] RT listening for mailbox commands...
26,385,607 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,416,286 UART: [rt]cmd =0x4d454153, len=108
26,435,662 >>> mbox cmd response data (12 bytes)
28,500,857 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,599,539 >>> mbox cmd response: success
35,600,040 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,635,004 UART:
35,635,293 UART: Running Caliptra FMC ...
35,636,329 UART:
35,636,474 UART: [state] CFI Enabled
35,742,000 UART: [art] Extend RT PCRs Done
35,743,208 UART: [art] Lock RT PCRs Done
35,744,682 UART: [art] Populate DV Done
35,750,206 UART: [fht] FMC Alias Private Key: 7
35,751,797 UART: [art] Derive CDI
35,752,533 UART: [art] Store in slot 0x4
35,811,205 UART: [art] Derive Key Pair
35,812,252 UART: [art] Store priv key in slot 0x5
38,275,042 UART: [art] Derive Key Pair - Done
38,288,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,000,250 UART: [art] Erasing AUTHORITY.KEYID = 7
40,001,752 UART: [art] PUB.X = BE948E2D91E16A28CB4694E40C3F0A9F862EBE725388C4AE3D5228A39D890B25D35F5576C6DEC1D4FBD43FFDAA1AC238
40,009,073 UART: [art] PUB.Y = E7E45C03CBA9C7F97A5DAAD1EBC1256703EBCBC839A67B9D87578E18AB3C2BB32CB51B5F908963AB4F1762A6BF65ECD3
40,016,325 UART: [art] SIG.R = 4691485205659831CA10D31D0F5142F8453F2963245BED4508DA43B8AFBFACADB444CAA9B34769EC459DFB08A5806CDE
40,023,727 UART: [art] SIG.S = B756068D08B872DAC6DE477A652C12AD2CF498F7F87552209BBD6B40DF7E2BC51917B716D349C4EB64DB8660EB6319B3
41,001,878 UART: mbox::rt_entry...
41,002,855 UART: ____ _ _ _ ____ _____
41,004,795 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
41,007,008 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
41,008,965 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
41,010,904 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
41,012,833 UART: |_|
41,013,842 UART:
41,388,372 UART: [rt] Runtime listening for mailbox commands...
41,390,557 >>> mbox cmd response data (48 bytes)
41,391,131 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,393,485 >>> mbox cmd response data (48 bytes)
41,394,345 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,411,238 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,480 writing to cptra_bootfsm_go
192,602 UART:
192,979 UART: Running Caliptra ROM ...
194,128 UART:
603,624 UART: [state] CFI Enabled
618,864 UART: [state] LifecycleState = Unprovisioned
621,251 UART: [state] DebugLocked = No
623,774 UART: [state] WD Timer not started. Device not locked for debugging
627,606 UART: [kat] SHA2-256
817,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,277 UART: [kat] ++
828,817 UART: [kat] sha1
839,277 UART: [kat] SHA2-256
842,289 UART: [kat] SHA2-384
849,011 UART: [kat] SHA2-512-ACC
851,609 UART: [kat] ECC-384
3,290,482 UART: [kat] HMAC-384Kdf
3,303,984 UART: [kat] LMS
3,835,791 UART: [kat] --
3,840,562 UART: [cold-reset] ++
3,842,631 UART: [fht] FHT @ 0x50003400
3,854,319 UART: [idev] ++
3,855,029 UART: [idev] CDI.KEYID = 6
3,855,921 UART: [idev] SUBJECT.KEYID = 7
3,857,172 UART: [idev] UDS.KEYID = 0
3,858,075 ready_for_fw is high
3,858,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,191 UART: [idev] Erasing UDS.KEYID = 0
6,331,391 UART: [idev] Sha1 KeyId Algorithm
6,353,575 UART: [idev] --
6,357,167 UART: [ldev] ++
6,357,858 UART: [ldev] CDI.KEYID = 6
6,358,775 UART: [ldev] SUBJECT.KEYID = 5
6,359,938 UART: [ldev] AUTHORITY.KEYID = 7
6,361,170 UART: [ldev] FE.KEYID = 1
6,371,657 UART: [ldev] Erasing FE.KEYID = 1
8,849,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,266 UART: [ldev] --
10,637,828 UART: [fwproc] Wait for Commands...
10,639,464 UART: [fwproc] Recv command 0x46574c44
10,641,781 UART: [fwproc] Recv'd Img size: 118548 bytes
14,142,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,879 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,480 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,351 >>> mbox cmd response: success
14,911,165 UART: [afmc] ++
14,911,975 UART: [afmc] CDI.KEYID = 6
14,913,068 UART: [afmc] SUBJECT.KEYID = 7
14,914,523 UART: [afmc] AUTHORITY.KEYID = 5
17,421,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,865 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,989 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,153 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,024 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,725 UART: [afmc] --
19,218,954 UART: [cold-reset] --
19,223,695 UART: [state] Locking Datavault
19,230,208 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,455 UART: [state] Locking ICCM
19,234,466 UART: [exit] Launching FMC @ 0x40000130
19,243,117 UART:
19,243,358 UART: Running Caliptra FMC ...
19,244,465 UART:
19,244,632 UART: [state] CFI Enabled
19,253,006 UART: [fht] FMC Alias Private Key: 7
21,019,421 UART: [art] Extend RT PCRs Done
21,020,647 UART: [art] Lock RT PCRs Done
21,022,122 UART: [art] Populate DV Done
21,027,215 UART: [fht] FMC Alias Private Key: 7
21,028,653 UART: [art] Derive CDI
21,029,444 UART: [art] Store in slot 0x4
21,072,264 UART: [art] Derive Key Pair
21,073,314 UART: [art] Store priv key in slot 0x5
23,500,161 UART: [art] Derive Key Pair - Done
23,513,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,700 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,209 UART: [art] PUB.X = 98D28F024F54D94398EF9DE3471C18495AB84624B52D00F33D9FEFD5074A4517AD59D2FAB1D62338D87CA2977BFEA881
25,228,484 UART: [art] PUB.Y = AE472F2C6EA5419A1CCFA8501DE74F3AEADD433278D592FA66528966F4A40ACAB4704926D89C46F0F0DF3046DE62216D
25,235,715 UART: [art] SIG.R = 9ECBA281B035BC90B84D9BA67CCC801BBAF10E404DA6167B3C5AA5B024CE9D55E75EA132383259281C6BC7F44100ACDD
25,243,151 UART: [art] SIG.S = A7C26B9A1A024E148AB85CA829E0F71A695499CA3674897F41BB4BBFE41820981A653DD717158F5B19005817D0752DB1
26,221,700 UART: Caliptra RT
26,222,408 UART: [state] CFI Enabled
26,355,253 UART: [rt] RT listening for mailbox commands...
26,357,342 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,387,963 UART: [rt]cmd =0x4d454153, len=108
26,406,427 >>> mbox cmd response data (12 bytes)
28,475,256 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,580,988 UART:
28,581,344 UART: Running Caliptra ROM ...
28,582,402 UART:
28,582,610 UART: [state] CFI Enabled
28,595,929 UART: [state] LifecycleState = Unprovisioned
28,597,870 UART: [state] DebugLocked = No
28,600,583 UART: [state] WD Timer not started. Device not locked for debugging
28,604,782 UART: [kat] SHA2-256
28,794,640 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,805,401 UART: [kat] ++
28,805,916 UART: [kat] sha1
28,818,502 UART: [kat] SHA2-256
28,821,530 UART: [kat] SHA2-384
28,827,794 UART: [kat] SHA2-512-ACC
28,830,370 UART: [kat] ECC-384
31,272,286 UART: [kat] HMAC-384Kdf
31,286,206 UART: [kat] LMS
31,817,823 UART: [kat] --
31,822,625 UART: [update-reset] ++
34,892,935 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,895,501 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,310,938 >>> mbox cmd response: success
35,311,298 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,312,683 UART: [update-reset] Copying MAN_2 To MAN_1
35,350,262 UART: [update-reset Success] --
35,356,073 UART: [state] Locking Datavault
35,359,450 UART: [state] Locking PCR0, PCR1 and PCR31
35,361,673 UART: [state] Locking ICCM
35,364,154 UART: [exit] Launching FMC @ 0x40000130
35,372,836 UART:
35,373,072 UART: Running Caliptra FMC ...
35,374,180 UART:
35,374,342 UART: [state] CFI Enabled
35,417,820 UART: [art] Extend RT PCRs Done
35,419,003 UART: [art] Lock RT PCRs Done
35,420,413 UART: [art] Populate DV Done
35,425,821 UART: [fht] FMC Alias Private Key: 7
35,427,529 UART: [art] Derive CDI
35,428,346 UART: [art] Store in slot 0x4
35,471,161 UART: [art] Derive Key Pair
35,472,362 UART: [art] Store priv key in slot 0x5
37,899,270 UART: [art] Derive Key Pair - Done
37,912,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,618,174 UART: [art] Erasing AUTHORITY.KEYID = 7
39,619,674 UART: [art] PUB.X = E3E3709F0EFB1B89ABB50191030C87452CC0948328E6BCB454A4507FA1B4AAE878B1F042556DD36E156252351BE04886
39,626,950 UART: [art] PUB.Y = 7FCC109EA57DF7E16EDEED4AA211D2012B05AEE6C7ABB6D2E03CAA40E06E5FD5DDFC068C49E400E6F14EE931C13050A9
39,634,229 UART: [art] SIG.R = 195B2DE5D9A2406A769726029D575046E663E9791B99B33F8B8472546B28712377921588EFBB13B556858733B32EC73A
39,641,548 UART: [art] SIG.S = E33D75789F4E0D9547BC3720C9F5FAB99523402F603D1E79791327B7BC095B74FCEC09CC92121A1AA9D211AC288BE430
40,620,343 UART: mbox::rt_entry...
40,621,317 UART: ____ _ _ _ ____ _____
40,623,310 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,625,323 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,627,271 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,629,210 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,631,121 UART: |_|
40,632,010 UART:
41,001,094 UART: [rt] Runtime listening for mailbox commands...
41,003,275 >>> mbox cmd response data (48 bytes)
41,003,869 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,006,214 >>> mbox cmd response data (48 bytes)
41,007,099 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,024,024 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
3,753,611 ready_for_fw is high
3,754,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,009 >>> mbox cmd response: success
19,292,137 UART:
19,292,557 UART: Running Caliptra FMC ...
19,293,712 UART:
19,293,876 UART: [state] CFI Enabled
19,301,231 UART: [fht] FMC Alias Private Key: 7
21,067,635 UART: [art] Extend RT PCRs Done
21,068,866 UART: [art] Lock RT PCRs Done
21,070,614 UART: [art] Populate DV Done
21,076,128 UART: [fht] FMC Alias Private Key: 7
21,077,791 UART: [art] Derive CDI
21,078,544 UART: [art] Store in slot 0x4
21,121,309 UART: [art] Derive Key Pair
21,122,312 UART: [art] Store priv key in slot 0x5
23,549,009 UART: [art] Derive Key Pair - Done
23,562,085 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,268,761 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,257 UART: [art] PUB.X = C1243C6B2A9EA025A66ADAB816A55A5C60887A95864656AC7F6A6DC8D5BE615F211460DC395DC71AD01E8FD35F15B8C4
25,277,545 UART: [art] PUB.Y = A952377C5BD65E3AE9BB217ACC35BE31128F47F63F5EB8C09273EA45AA20038758DDEAA12EBDFE861DC83F4C5E595E0D
25,284,843 UART: [art] SIG.R = 24CFCBB7429762D0BE376EEFDA03F3EA592D3A241DE7B544BEC23AA7D9A7CF519B6600A9C14C589DEDED7B92D9E874B3
25,292,292 UART: [art] SIG.S = 19BA3BB6500105FD18A6FE71C7B631F853EF8D02CF25212CD114BF5BF6A08FD1F93656B5533606A717326E46EFEA865A
26,271,874 UART: Caliptra RT
26,272,589 UART: [state] CFI Enabled
26,405,049 UART: [rt] RT listening for mailbox commands...
26,407,278 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,437,954 UART: [rt]cmd =0x4d454153, len=108
26,457,049 >>> mbox cmd response data (12 bytes)
28,525,134 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,542,357 >>> mbox cmd response: success
35,542,891 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,577,591 UART:
35,577,888 UART: Running Caliptra FMC ...
35,579,018 UART:
35,579,192 UART: [state] CFI Enabled
35,623,182 UART: [art] Extend RT PCRs Done
35,624,371 UART: [art] Lock RT PCRs Done
35,625,850 UART: [art] Populate DV Done
35,631,192 UART: [fht] FMC Alias Private Key: 7
35,632,731 UART: [art] Derive CDI
35,633,470 UART: [art] Store in slot 0x4
35,676,177 UART: [art] Derive Key Pair
35,677,178 UART: [art] Store priv key in slot 0x5
38,104,162 UART: [art] Derive Key Pair - Done
38,116,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,823,581 UART: [art] Erasing AUTHORITY.KEYID = 7
39,825,075 UART: [art] PUB.X = 905FAE678EE1F2F48BCCD577094D90EC9E5382A4C969F561FBDE5B24226646903F8D97E84C518340E026B56F08B810EE
39,832,388 UART: [art] PUB.Y = 171969E17B5FEE13759E71687675AC9CA1CA12399997B5FEAB0C667A3A2977ABA73F76669CF90C273750C544FB838FFE
39,839,634 UART: [art] SIG.R = 1B83DAB873FE47D286B0E2CAD1F0379D45A423D1D500AADF57EA378D4DA449499A060CD12040F9666C6A850528A06540
39,847,032 UART: [art] SIG.S = 21B67333E95DC4FF8650ECCFE960F3F8B21B23D1C4E28A1A6BDF592A723C965C6BB23166C626CA5C71A319A371A90F0E
40,825,302 UART: mbox::rt_entry...
40,826,281 UART: ____ _ _ _ ____ _____
40,828,228 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,830,249 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,832,209 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,834,147 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,836,085 UART: |_|
40,836,907 UART:
41,205,240 UART: [rt] Runtime listening for mailbox commands...
41,207,395 >>> mbox cmd response data (48 bytes)
41,207,968 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,210,347 >>> mbox cmd response data (48 bytes)
41,211,254 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,228,126 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,657 UART: [kat] SHA2-256
881,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,703 UART: [kat] ++
885,855 UART: [kat] sha1
890,033 UART: [kat] SHA2-256
891,971 UART: [kat] SHA2-384
894,770 UART: [kat] SHA2-512-ACC
896,671 UART: [kat] ECC-384
902,096 UART: [kat] HMAC-384Kdf
906,708 UART: [kat] LMS
1,474,904 UART: [kat] --
1,476,013 UART: [cold-reset] ++
1,476,393 UART: [fht] Storing FHT @ 0x50003400
1,478,958 UART: [idev] ++
1,479,126 UART: [idev] CDI.KEYID = 6
1,479,486 UART: [idev] SUBJECT.KEYID = 7
1,479,910 UART: [idev] UDS.KEYID = 0
1,480,255 ready_for_fw is high
1,480,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,792 UART: [idev] Erasing UDS.KEYID = 0
1,504,468 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,226 UART: [idev] --
1,514,059 UART: [ldev] ++
1,514,227 UART: [ldev] CDI.KEYID = 6
1,514,590 UART: [ldev] SUBJECT.KEYID = 5
1,515,016 UART: [ldev] AUTHORITY.KEYID = 7
1,515,479 UART: [ldev] FE.KEYID = 1
1,520,601 UART: [ldev] Erasing FE.KEYID = 1
1,546,108 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,676 UART: [ldev] --
1,584,971 UART: [fwproc] Waiting for Commands...
1,585,712 UART: [fwproc] Received command 0x46574c44
1,586,503 UART: [fwproc] Received Image of size 118548 bytes
2,931,197 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,071 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,289 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,512 >>> mbox cmd response: success
3,130,752 UART: [afmc] ++
3,130,920 UART: [afmc] CDI.KEYID = 6
3,131,282 UART: [afmc] SUBJECT.KEYID = 7
3,131,707 UART: [afmc] AUTHORITY.KEYID = 5
3,166,584 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,718 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,498 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,207 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,090 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,773 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,711 UART: [afmc] --
3,209,675 UART: [cold-reset] --
3,210,583 UART: [state] Locking Datavault
3,211,686 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,290 UART: [state] Locking ICCM
3,212,762 UART: [exit] Launching FMC @ 0x40000130
3,218,092 UART:
3,218,108 UART: Running Caliptra FMC ...
3,218,516 UART:
3,218,570 UART: [state] CFI Enabled
3,229,012 UART: [fht] FMC Alias Private Key: 7
3,348,236 UART: [art] Extend RT PCRs Done
3,348,664 UART: [art] Lock RT PCRs Done
3,350,052 UART: [art] Populate DV Done
3,358,311 UART: [fht] FMC Alias Private Key: 7
3,359,345 UART: [art] Derive CDI
3,359,625 UART: [art] Store in slot 0x4
3,445,333 UART: [art] Derive Key Pair
3,445,693 UART: [art] Store priv key in slot 0x5
3,458,948 UART: [art] Derive Key Pair - Done
3,473,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,900 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,665 UART: [art] PUB.X = 7BA8579A6A27B7A43CC260C09A8F558CE145722E023D5660F2F465921D253CF8EB8897BF4B74AD8B79BC7974963DF4FA
3,496,438 UART: [art] PUB.Y = 22689C22864F7FFB44167FE4FB8F8E14298D6B0AFFB404C059582267C22FB91AED01D654163C83EC0F20C2BE2A0EA47C
3,503,383 UART: [art] SIG.R = 9720C15E3C7526A777765C227CF9AC4657F1320FD130D3AC5533C719EF5580A5FA0717878D36CB9B1375EC14C9D48E6B
3,510,147 UART: [art] SIG.S = 2E4693A80A4F3A932A8EA055916A67F9B5998761228B45EC5815EEBA3EA964A1FB6146B9F81369123E1160E603B107D8
3,534,318 UART: Caliptra RT
3,534,569 UART: [state] CFI Enabled
3,654,899 UART: [rt] RT listening for mailbox commands...
3,655,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,117 UART: [rt]cmd =0x4d454153, len=108
3,707,449 >>> mbox cmd response data (12 bytes)
3,707,450 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,708,500 UART:
3,708,516 UART: Running Caliptra ROM ...
3,708,924 UART:
3,708,978 UART: [state] CFI Enabled
3,711,820 UART: [state] LifecycleState = Unprovisioned
3,712,475 UART: [state] DebugLocked = No
3,713,145 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,714,806 UART: [kat] SHA2-256
4,508,737 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,512,852 UART: [kat] ++
4,513,004 UART: [kat] sha1
4,517,382 UART: [kat] SHA2-256
4,519,320 UART: [kat] SHA2-384
4,521,965 UART: [kat] SHA2-512-ACC
4,523,865 UART: [kat] ECC-384
4,529,116 UART: [kat] HMAC-384Kdf
4,533,744 UART: [kat] LMS
5,101,940 UART: [kat] --
5,102,775 UART: [update-reset] ++
6,073,992 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,075,156 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,176,849 >>> mbox cmd response: success
6,176,849 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,176,990 UART: [update-reset] Copying MAN_2 To MAN_1
6,185,004 UART: [update-reset Success] --
6,186,025 UART: [state] Locking Datavault
6,186,979 UART: [state] Locking PCR0, PCR1 and PCR31
6,187,583 UART: [state] Locking ICCM
6,188,249 UART: [exit] Launching FMC @ 0x40000130
6,193,579 UART:
6,193,595 UART: Running Caliptra FMC ...
6,194,003 UART:
6,194,057 UART: [state] CFI Enabled
6,283,112 UART: [art] Extend RT PCRs Done
6,283,540 UART: [art] Lock RT PCRs Done
6,285,089 UART: [art] Populate DV Done
6,293,166 UART: [fht] FMC Alias Private Key: 7
6,294,262 UART: [art] Derive CDI
6,294,542 UART: [art] Store in slot 0x4
6,380,638 UART: [art] Derive Key Pair
6,380,998 UART: [art] Store priv key in slot 0x5
6,394,369 UART: [art] Derive Key Pair - Done
6,409,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,424,937 UART: [art] Erasing AUTHORITY.KEYID = 7
6,425,702 UART: [art] PUB.X = 8742C99FB2F089725A99D3FECEC4A7A813FC6CFC981BEC85561BE9E213E188EC09CC5280199390C3ECE3941E434AF0F5
6,432,481 UART: [art] PUB.Y = 302B2DFC5C0138980313E3FA2CA9A77651FC2139E5F050BC9AEDAC27016F6D6838A65E28AC283802D5CDF2F1A3771435
6,439,425 UART: [art] SIG.R = A2A92CB05B82BD4DBEC0DF526C4E1EDB6CC89A77B62412000B9EF1A65D9ADDADFF3C26B5017E401F7CBD581C3BA083B4
6,446,195 UART: [art] SIG.S = 897DB04ED51054560D6411F6F081DD7A9B1536D1B09ECAC4B4996222983068DF05824A32CF0AC2FCBF59F804C4977F0E
6,470,158 UART: mbox::rt_entry...
6,470,530 UART: ____ _ _ _ ____ _____
6,471,314 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,472,114 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,472,882 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,473,650 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,474,418 UART: |_|
6,474,730 UART:
6,839,146 UART: [rt] Runtime listening for mailbox commands...
6,840,344 >>> mbox cmd response data (48 bytes)
6,840,345 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,843,132 >>> mbox cmd response data (48 bytes)
6,843,133 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,861,278 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,485 ready_for_fw is high
1,362,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,252 >>> mbox cmd response: success
3,041,177 UART:
3,041,193 UART: Running Caliptra FMC ...
3,041,601 UART:
3,041,655 UART: [state] CFI Enabled
3,052,223 UART: [fht] FMC Alias Private Key: 7
3,170,573 UART: [art] Extend RT PCRs Done
3,171,001 UART: [art] Lock RT PCRs Done
3,172,141 UART: [art] Populate DV Done
3,180,398 UART: [fht] FMC Alias Private Key: 7
3,181,542 UART: [art] Derive CDI
3,181,822 UART: [art] Store in slot 0x4
3,267,088 UART: [art] Derive Key Pair
3,267,448 UART: [art] Store priv key in slot 0x5
3,280,335 UART: [art] Derive Key Pair - Done
3,295,210 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,524 UART: [art] PUB.X = 780E6278E94944CB1DB2AD137A5DBB1982EF63865181FD74292BEC7850186A67384E3D0B13D072FD6B2F4CC7408EE174
3,318,290 UART: [art] PUB.Y = 0991598DE1E0D57A8FEC9D6555F5246BF1B78C9A55229634FAB4C1ED2EB3574976F0C3527BEE7A447B24A00EB60B8181
3,325,237 UART: [art] SIG.R = F7E62C7759DA65394C49FA369BEC2E2E11A70284DCEAF67C4B27E9B2C769C8729A203A325E5C202F986B3DB73CA44475
3,332,012 UART: [art] SIG.S = 95F2363CB3C7AE47C914660C13D7BF3FF39DCA6E1CA9EA7C6047B315AC49A8A0768304E65B748DDEF6BC154B6C2F9799
3,355,778 UART: Caliptra RT
3,356,029 UART: [state] CFI Enabled
3,475,936 UART: [rt] RT listening for mailbox commands...
3,476,606 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,024 UART: [rt]cmd =0x4d454153, len=108
3,527,006 >>> mbox cmd response data (12 bytes)
3,527,007 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,880,292 >>> mbox cmd response: success
5,880,292 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,893,854 UART:
5,893,870 UART: Running Caliptra FMC ...
5,894,278 UART:
5,894,332 UART: [state] CFI Enabled
5,983,315 UART: [art] Extend RT PCRs Done
5,983,743 UART: [art] Lock RT PCRs Done
5,985,084 UART: [art] Populate DV Done
5,992,907 UART: [fht] FMC Alias Private Key: 7
5,993,871 UART: [art] Derive CDI
5,994,151 UART: [art] Store in slot 0x4
6,079,783 UART: [art] Derive Key Pair
6,080,143 UART: [art] Store priv key in slot 0x5
6,092,648 UART: [art] Derive Key Pair - Done
6,107,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,122,589 UART: [art] Erasing AUTHORITY.KEYID = 7
6,123,354 UART: [art] PUB.X = BB6101884AFA554CE462A88CF738EA07A1AB28DF13CCF1BD4DDDD82C0A1E9D120804F021AE94A90835F11DC5D1D9322B
6,130,124 UART: [art] PUB.Y = F83EC2762247205852DA7F76A2FB71281BD7094739F1E9FBC5A8E12A44EA2F337F6656E7DC0DA90B4C771983005ABDF2
6,137,049 UART: [art] SIG.R = 813F5F47FC3EAF7326A9A2B08C174C14CC70F886BB37E7073FA1210D1AA594CA061F92974EA8688731ED499C9BA82B07
6,143,813 UART: [art] SIG.S = 4A05C7817B69C81F65F911D4B623FD3D27A048BF50BAC7906731A42792D927B304C73BE7BEDF568523564AC510C62133
6,167,813 UART: mbox::rt_entry...
6,168,185 UART: ____ _ _ _ ____ _____
6,168,969 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,169,769 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,170,537 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,171,305 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,172,073 UART: |_|
6,172,385 UART:
6,538,090 UART: [rt] Runtime listening for mailbox commands...
6,539,288 >>> mbox cmd response data (48 bytes)
6,539,289 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,542,076 >>> mbox cmd response data (48 bytes)
6,542,077 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,560,222 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,226 UART: [kat] SHA2-256
882,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,272 UART: [kat] ++
886,424 UART: [kat] sha1
890,622 UART: [kat] SHA2-256
892,560 UART: [kat] SHA2-384
895,105 UART: [kat] SHA2-512-ACC
897,006 UART: [kat] ECC-384
902,745 UART: [kat] HMAC-384Kdf
907,503 UART: [kat] LMS
1,475,699 UART: [kat] --
1,476,458 UART: [cold-reset] ++
1,477,002 UART: [fht] Storing FHT @ 0x50003400
1,479,595 UART: [idev] ++
1,479,763 UART: [idev] CDI.KEYID = 6
1,480,123 UART: [idev] SUBJECT.KEYID = 7
1,480,547 UART: [idev] UDS.KEYID = 0
1,480,892 ready_for_fw is high
1,480,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,369 UART: [idev] Erasing UDS.KEYID = 0
1,504,801 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,473 UART: [idev] --
1,514,392 UART: [ldev] ++
1,514,560 UART: [ldev] CDI.KEYID = 6
1,514,923 UART: [ldev] SUBJECT.KEYID = 5
1,515,349 UART: [ldev] AUTHORITY.KEYID = 7
1,515,812 UART: [ldev] FE.KEYID = 1
1,521,212 UART: [ldev] Erasing FE.KEYID = 1
1,546,197 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,251 UART: [ldev] --
1,585,738 UART: [fwproc] Waiting for Commands...
1,586,423 UART: [fwproc] Received command 0x46574c44
1,587,214 UART: [fwproc] Received Image of size 118548 bytes
2,931,566 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,756 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,974 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,423 >>> mbox cmd response: success
3,131,679 UART: [afmc] ++
3,131,847 UART: [afmc] CDI.KEYID = 6
3,132,209 UART: [afmc] SUBJECT.KEYID = 7
3,132,634 UART: [afmc] AUTHORITY.KEYID = 5
3,167,043 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,425 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,205 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,914 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,797 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,480 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,316 UART: [afmc] --
3,210,346 UART: [cold-reset] --
3,211,320 UART: [state] Locking Datavault
3,212,199 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,803 UART: [state] Locking ICCM
3,213,449 UART: [exit] Launching FMC @ 0x40000130
3,218,779 UART:
3,218,795 UART: Running Caliptra FMC ...
3,219,203 UART:
3,219,346 UART: [state] CFI Enabled
3,230,256 UART: [fht] FMC Alias Private Key: 7
3,349,750 UART: [art] Extend RT PCRs Done
3,350,178 UART: [art] Lock RT PCRs Done
3,351,780 UART: [art] Populate DV Done
3,360,093 UART: [fht] FMC Alias Private Key: 7
3,361,185 UART: [art] Derive CDI
3,361,465 UART: [art] Store in slot 0x4
3,447,049 UART: [art] Derive Key Pair
3,447,409 UART: [art] Store priv key in slot 0x5
3,460,958 UART: [art] Derive Key Pair - Done
3,475,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,106 UART: [art] PUB.X = 804FC87B61250A15175860DB32497BCCCA596BEB4B9FE3917014660E77BC625E4F7072BE26FFFB0E473DD697D273A425
3,498,871 UART: [art] PUB.Y = 24828677A17CCD0A5CFB76043E0BA9CF0DE351838C92482C58C42831E5C9A1933BAC91A461E06915A070DE40DDDCB81B
3,505,817 UART: [art] SIG.R = A061C2D2C54FB9DFA90DF72D745807619E2F9B0777D951E12F87A9F4CD9EAEBAF6158BFF095755ED7A1CADDDF76B68FD
3,512,599 UART: [art] SIG.S = 8147396B732E45A022745C618050F5056B59A8A3AC1E37A4C358C1E8D9F062DD8C15EB7BA65666693F55311284CEF4BC
3,536,888 UART: Caliptra RT
3,537,231 UART: [state] CFI Enabled
3,657,212 UART: [rt] RT listening for mailbox commands...
3,657,882 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,558 UART: [rt]cmd =0x4d454153, len=108
3,709,456 >>> mbox cmd response data (12 bytes)
3,709,457 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,710,471 UART:
3,710,487 UART: Running Caliptra ROM ...
3,710,895 UART:
3,711,036 UART: [state] CFI Enabled
3,713,768 UART: [state] LifecycleState = Unprovisioned
3,714,423 UART: [state] DebugLocked = No
3,715,111 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,716,772 UART: [kat] SHA2-256
4,510,703 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,514,818 UART: [kat] ++
4,514,970 UART: [kat] sha1
4,519,170 UART: [kat] SHA2-256
4,521,108 UART: [kat] SHA2-384
4,523,821 UART: [kat] SHA2-512-ACC
4,525,721 UART: [kat] ECC-384
4,531,572 UART: [kat] HMAC-384Kdf
4,536,086 UART: [kat] LMS
5,104,282 UART: [kat] --
5,105,085 UART: [update-reset] ++
6,077,316 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,078,518 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,180,211 >>> mbox cmd response: success
6,180,211 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,180,386 UART: [update-reset] Copying MAN_2 To MAN_1
6,188,400 UART: [update-reset Success] --
6,189,477 UART: [state] Locking Datavault
6,190,355 UART: [state] Locking PCR0, PCR1 and PCR31
6,190,959 UART: [state] Locking ICCM
6,191,587 UART: [exit] Launching FMC @ 0x40000130
6,196,917 UART:
6,196,933 UART: Running Caliptra FMC ...
6,197,341 UART:
6,197,484 UART: [state] CFI Enabled
6,286,551 UART: [art] Extend RT PCRs Done
6,286,979 UART: [art] Lock RT PCRs Done
6,288,194 UART: [art] Populate DV Done
6,296,093 UART: [fht] FMC Alias Private Key: 7
6,297,195 UART: [art] Derive CDI
6,297,475 UART: [art] Store in slot 0x4
6,383,005 UART: [art] Derive Key Pair
6,383,365 UART: [art] Store priv key in slot 0x5
6,396,984 UART: [art] Derive Key Pair - Done
6,411,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,427,051 UART: [art] Erasing AUTHORITY.KEYID = 7
6,427,816 UART: [art] PUB.X = CDB7B67E0205BF6BA93DA2E0026FA18382AC047655C5832CC07B60B9883694825CFF5647068AC36C8D0F2C6FAB367A21
6,434,574 UART: [art] PUB.Y = F1DA9119FEFC6D1521C54D6C67687DB72A0233091233B7FA0F9D7364C6E1BD6C77DAEF5DEA31F291E7BAD502776B7983
6,441,524 UART: [art] SIG.R = 56FD120CA9CEE3E84D662C72F97D86ED4003E06E305A5CD1BEE5DD3BEC50A1FA22792AB7BA31086627474A2DD0DC6148
6,448,301 UART: [art] SIG.S = 450486AE8EF440597025D2DF2E7BC4B836B156D1DCFCDB846F53DA5FFCBA1BAD4614970FDCECED26CBC7E15AB79D50A6
6,471,727 UART: mbox::rt_entry...
6,472,099 UART: ____ _ _ _ ____ _____
6,472,883 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,473,683 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,474,451 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,475,219 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,475,987 UART: |_|
6,476,299 UART:
6,840,827 UART: [rt] Runtime listening for mailbox commands...
6,842,025 >>> mbox cmd response data (48 bytes)
6,842,026 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,844,813 >>> mbox cmd response data (48 bytes)
6,844,814 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,862,959 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,352 ready_for_fw is high
1,362,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,471 >>> mbox cmd response: success
3,043,230 UART:
3,043,246 UART: Running Caliptra FMC ...
3,043,654 UART:
3,043,797 UART: [state] CFI Enabled
3,054,767 UART: [fht] FMC Alias Private Key: 7
3,173,629 UART: [art] Extend RT PCRs Done
3,174,057 UART: [art] Lock RT PCRs Done
3,175,653 UART: [art] Populate DV Done
3,183,760 UART: [fht] FMC Alias Private Key: 7
3,184,902 UART: [art] Derive CDI
3,185,182 UART: [art] Store in slot 0x4
3,270,606 UART: [art] Derive Key Pair
3,270,966 UART: [art] Store priv key in slot 0x5
3,284,043 UART: [art] Derive Key Pair - Done
3,298,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,022 UART: [art] PUB.X = 2AFCE4AD00BBC827281B66CE8CA4E00EB5E29F8306077BB95176F4D56EB3E2B502AC5F56B2B9A91CA5324EA60ED562B2
3,321,773 UART: [art] PUB.Y = CEE4C6EF21DB1502B2B888E4B9975F089D0241E7499E4EDA337AFEC04B8BF3FDB6AD0EBD74C2DF5E6ED70E0DC2962A12
3,328,731 UART: [art] SIG.R = 6719A2581F2B4937A88F094D45C3BADC84EA5CFD24588D3F413DC1A7A621D59587C04468469E29386250FFAB739DDC76
3,335,500 UART: [art] SIG.S = 5BA5AA0865C5E19926FED3F7032DE63404B54C1FBEA3BD15F4D43D106DC5FE4AAEDEBB90E88E6916D52A55C89A93A71E
3,359,379 UART: Caliptra RT
3,359,722 UART: [state] CFI Enabled
3,480,033 UART: [rt] RT listening for mailbox commands...
3,480,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,061 UART: [rt]cmd =0x4d454153, len=108
3,531,793 >>> mbox cmd response data (12 bytes)
3,531,794 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,883,800 >>> mbox cmd response: success
5,883,800 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,897,246 UART:
5,897,262 UART: Running Caliptra FMC ...
5,897,670 UART:
5,897,813 UART: [state] CFI Enabled
5,987,008 UART: [art] Extend RT PCRs Done
5,987,436 UART: [art] Lock RT PCRs Done
5,988,867 UART: [art] Populate DV Done
5,996,796 UART: [fht] FMC Alias Private Key: 7
5,997,886 UART: [art] Derive CDI
5,998,166 UART: [art] Store in slot 0x4
6,083,878 UART: [art] Derive Key Pair
6,084,238 UART: [art] Store priv key in slot 0x5
6,097,713 UART: [art] Derive Key Pair - Done
6,112,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,128,208 UART: [art] Erasing AUTHORITY.KEYID = 7
6,128,973 UART: [art] PUB.X = BFEF7666E633BCE0687E8AAF892C2AF0D204FBD1FF6E001ABC779A9FA7AF60582AA2D3E8B12BF5EAAA16A808CF11DAF6
6,135,747 UART: [art] PUB.Y = 81D8DA68324C9B038489D18AA21C1AD63BD66D6DF753A117C7FBD89BDE4A4AA8BFCDDE25FF4C58C10B85DD0761A7A9B7
6,142,712 UART: [art] SIG.R = 8AD939560B3410E3DF0991A8BA168E428780CD93E21423B69C395B2E75D4C580D010C160A15E3DE95C7BEF9D5899F473
6,149,476 UART: [art] SIG.S = AC49F81A4829D9D5E20D72477BDF7A59F3DE88E33C9E2997FE812510B053C87E9C0F82633D8CF63274D72ABA8C586025
6,173,264 UART: mbox::rt_entry...
6,173,636 UART: ____ _ _ _ ____ _____
6,174,420 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,175,220 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,175,988 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,176,756 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,177,524 UART: |_|
6,177,836 UART:
6,544,962 UART: [rt] Runtime listening for mailbox commands...
6,546,160 >>> mbox cmd response data (48 bytes)
6,546,161 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,548,948 >>> mbox cmd response data (48 bytes)
6,548,949 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,567,094 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,381 UART: [state] DebugLocked = No
85,939 UART: [state] WD Timer not started. Device not locked for debugging
87,076 UART: [kat] SHA2-256
890,626 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,730 UART: [kat] ++
894,882 UART: [kat] sha1
899,178 UART: [kat] SHA2-256
901,118 UART: [kat] SHA2-384
903,703 UART: [kat] SHA2-512-ACC
905,604 UART: [kat] ECC-384
915,355 UART: [kat] HMAC-384Kdf
919,923 UART: [kat] LMS
1,168,235 UART: [kat] --
1,169,006 UART: [cold-reset] ++
1,169,466 UART: [fht] FHT @ 0x50003400
1,172,296 UART: [idev] ++
1,172,464 UART: [idev] CDI.KEYID = 6
1,172,825 UART: [idev] SUBJECT.KEYID = 7
1,173,250 UART: [idev] UDS.KEYID = 0
1,173,596 ready_for_fw is high
1,173,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,209 UART: [idev] Erasing UDS.KEYID = 0
1,198,409 UART: [idev] Sha1 KeyId Algorithm
1,207,271 UART: [idev] --
1,208,388 UART: [ldev] ++
1,208,556 UART: [ldev] CDI.KEYID = 6
1,208,920 UART: [ldev] SUBJECT.KEYID = 5
1,209,347 UART: [ldev] AUTHORITY.KEYID = 7
1,209,810 UART: [ldev] FE.KEYID = 1
1,215,042 UART: [ldev] Erasing FE.KEYID = 1
1,241,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,940 UART: [ldev] --
1,281,265 UART: [fwproc] Wait for Commands...
1,282,036 UART: [fwproc] Recv command 0x46574c44
1,282,769 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,549 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,724 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,095 >>> mbox cmd response: success
2,826,209 UART: [afmc] ++
2,826,377 UART: [afmc] CDI.KEYID = 6
2,826,740 UART: [afmc] SUBJECT.KEYID = 7
2,827,166 UART: [afmc] AUTHORITY.KEYID = 5
2,862,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,895 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,605 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,486 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,187 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,918 UART: [afmc] --
2,905,893 UART: [cold-reset] --
2,906,671 UART: [state] Locking Datavault
2,908,010 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,614 UART: [state] Locking ICCM
2,909,088 UART: [exit] Launching FMC @ 0x40000130
2,914,418 UART:
2,914,434 UART: Running Caliptra FMC ...
2,914,842 UART:
2,914,896 UART: [state] CFI Enabled
2,925,036 UART: [fht] FMC Alias Private Key: 7
3,044,270 UART: [art] Extend RT PCRs Done
3,044,698 UART: [art] Lock RT PCRs Done
3,046,148 UART: [art] Populate DV Done
3,054,441 UART: [fht] FMC Alias Private Key: 7
3,055,617 UART: [art] Derive CDI
3,055,897 UART: [art] Store in slot 0x4
3,142,084 UART: [art] Derive Key Pair
3,142,444 UART: [art] Store priv key in slot 0x5
3,155,658 UART: [art] Derive Key Pair - Done
3,170,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,813 UART: [art] PUB.X = 91CD1ED6DE3CF119D46520AEF23E69CC69E7EA35A3B1B3C995884D9998F52D9F49E5AC3ABE0E0F22EF06B542E98170F9
3,193,590 UART: [art] PUB.Y = 57B717D7B8223897E25FC0A74D597B6D33C6F7F3DCF5BF167D38FD27E244731A4C5615F21B112C94A03843B02F32FED8
3,200,544 UART: [art] SIG.R = CA75B06547C8480FA18C3B183A60121CF18DD035609228CEDB09241ED42B99FBF38B2CD2236524362C136C060F2CA348
3,207,302 UART: [art] SIG.S = FBAF7802BA83B10F623DC80BBCF45A5F4E9DDB91492EE1F9BB70591853B62A6A7961073B7CBB4504E51E80FC04050C3C
3,230,614 UART: Caliptra RT
3,230,865 UART: [state] CFI Enabled
3,350,249 UART: [rt] RT listening for mailbox commands...
3,350,919 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,173 UART: [rt]cmd =0x4d454153, len=108
3,402,149 >>> mbox cmd response data (12 bytes)
3,402,150 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,403,023 UART:
3,403,039 UART: Running Caliptra ROM ...
3,403,447 UART:
3,403,502 UART: [state] CFI Enabled
3,405,928 UART: [state] LifecycleState = Unprovisioned
3,406,583 UART: [state] DebugLocked = No
3,407,261 UART: [state] WD Timer not started. Device not locked for debugging
3,408,443 UART: [kat] SHA2-256
4,211,993 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,216,097 UART: [kat] ++
4,216,249 UART: [kat] sha1
4,220,541 UART: [kat] SHA2-256
4,222,481 UART: [kat] SHA2-384
4,225,320 UART: [kat] SHA2-512-ACC
4,227,220 UART: [kat] ECC-384
4,236,545 UART: [kat] HMAC-384Kdf
4,240,935 UART: [kat] LMS
4,489,247 UART: [kat] --
4,489,991 UART: [update-reset] ++
5,441,139 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,442,112 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,543,753 >>> mbox cmd response: success
5,543,753 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,544,028 UART: [update-reset] Copying MAN_2 To MAN_1
5,552,042 UART: [update-reset Success] --
5,553,049 UART: [state] Locking Datavault
5,553,869 UART: [state] Locking PCR0, PCR1 and PCR31
5,554,473 UART: [state] Locking ICCM
5,555,067 UART: [exit] Launching FMC @ 0x40000130
5,560,397 UART:
5,560,413 UART: Running Caliptra FMC ...
5,560,821 UART:
5,560,875 UART: [state] CFI Enabled
5,649,906 UART: [art] Extend RT PCRs Done
5,650,334 UART: [art] Lock RT PCRs Done
5,651,597 UART: [art] Populate DV Done
5,659,862 UART: [fht] FMC Alias Private Key: 7
5,660,940 UART: [art] Derive CDI
5,661,220 UART: [art] Store in slot 0x4
5,747,147 UART: [art] Derive Key Pair
5,747,507 UART: [art] Store priv key in slot 0x5
5,761,271 UART: [art] Derive Key Pair - Done
5,775,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,791,306 UART: [art] Erasing AUTHORITY.KEYID = 7
5,792,071 UART: [art] PUB.X = 6E134AF0B3E89E638CAAB039FE3D3C6D0A7CD15606F7773801911F3EFAAD6AEFE0D726A9ED45D61D46C82A0A6715D19B
5,798,847 UART: [art] PUB.Y = C27EAC87C888A1F44531D60F1EA9D16755C8FF009C76D43390AB507974A8CD8A0EA9D3697210A39CCE64D199FE0D4B62
5,805,774 UART: [art] SIG.R = 6CB51DBAC0B07F3398DB9A76AA04592FCF2F28B799DC75CB5CC6E0A240E399BB45B7B1E27274AE717F01F3923D5CD38E
5,812,556 UART: [art] SIG.S = EEA1071DC24C6889A5677F5E9590A62562665224876BEE0665B72B5ECC5B35632A1452B6132395D3A93B647C1724040A
5,836,112 UART: mbox::rt_entry...
5,836,484 UART: ____ _ _ _ ____ _____
5,837,268 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,838,068 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,838,836 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,839,604 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,840,372 UART: |_|
5,840,684 UART:
6,201,756 UART: [rt] Runtime listening for mailbox commands...
6,202,954 >>> mbox cmd response data (48 bytes)
6,202,955 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,205,742 >>> mbox cmd response data (48 bytes)
6,205,743 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,223,888 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,782 ready_for_fw is high
1,058,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,224 >>> mbox cmd response: success
2,740,391 UART:
2,740,407 UART: Running Caliptra FMC ...
2,740,815 UART:
2,740,869 UART: [state] CFI Enabled
2,751,229 UART: [fht] FMC Alias Private Key: 7
2,870,271 UART: [art] Extend RT PCRs Done
2,870,699 UART: [art] Lock RT PCRs Done
2,872,311 UART: [art] Populate DV Done
2,880,324 UART: [fht] FMC Alias Private Key: 7
2,881,284 UART: [art] Derive CDI
2,881,564 UART: [art] Store in slot 0x4
2,967,425 UART: [art] Derive Key Pair
2,967,785 UART: [art] Store priv key in slot 0x5
2,980,855 UART: [art] Derive Key Pair - Done
2,995,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,906 UART: [art] PUB.X = 5AD63FD491C629ACAB164776E948CEC78062F88438599475ACC4E623A88492BAD57C2C1743CE26DA380B192C20034659
3,018,668 UART: [art] PUB.Y = 0F327517612DD19179F87022E53B92715BA0A4649A4FF2AA015F01AF5F28E46500671F2E24B55BCC4D63D637EB66C031
3,025,585 UART: [art] SIG.R = A0E809E978612CCAB6D58B9726B98DADE10F7E0131942539E65B16F7BE6AC2E2CA19EA7F62132092CD89EEC4D8ADD031
3,032,360 UART: [art] SIG.S = 5C558721CE6E03C87652E927D784995325814564D1B7A1395D3217BD0039E42EFC2A8A56006B4BEC27A83E4946B9C68D
3,056,225 UART: Caliptra RT
3,056,476 UART: [state] CFI Enabled
3,176,483 UART: [rt] RT listening for mailbox commands...
3,177,153 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,905 UART: [rt]cmd =0x4d454153, len=108
3,228,211 >>> mbox cmd response data (12 bytes)
3,228,212 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,254,355 >>> mbox cmd response: success
5,254,355 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,267,762 UART:
5,267,778 UART: Running Caliptra FMC ...
5,268,186 UART:
5,268,240 UART: [state] CFI Enabled
5,357,309 UART: [art] Extend RT PCRs Done
5,357,737 UART: [art] Lock RT PCRs Done
5,359,150 UART: [art] Populate DV Done
5,367,623 UART: [fht] FMC Alias Private Key: 7
5,368,557 UART: [art] Derive CDI
5,368,837 UART: [art] Store in slot 0x4
5,454,820 UART: [art] Derive Key Pair
5,455,180 UART: [art] Store priv key in slot 0x5
5,468,582 UART: [art] Derive Key Pair - Done
5,483,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,498,438 UART: [art] Erasing AUTHORITY.KEYID = 7
5,499,203 UART: [art] PUB.X = 6B717676B8450C3E4B3537179C8DCE728858665710B037793508135F88189D813C62623019C5993098E548F4E62634B9
5,505,941 UART: [art] PUB.Y = 017983B0D000C2E23889297F3E520A8F45E0A9FDBC76A6D9C9410B35BE8D1D7DE07FCA06816303F99353F4A5B883B0B1
5,512,858 UART: [art] SIG.R = 9A478DA25DABE65B71FDD7EF9C6C44BEB7B6F208963F67FA6E7D553AE5CB4F96566A935529C1B27A948655461EBB203E
5,519,639 UART: [art] SIG.S = 96D85B431B8D95692D357A13072962862E6B0C8D0EF6808A77960E6FD23BE36B8A9036E1FE681DC4F9370D279591B535
5,543,242 UART: mbox::rt_entry...
5,543,614 UART: ____ _ _ _ ____ _____
5,544,398 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,545,198 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,545,966 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,546,734 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,547,502 UART: |_|
5,547,814 UART:
5,908,993 UART: [rt] Runtime listening for mailbox commands...
5,910,191 >>> mbox cmd response data (48 bytes)
5,910,192 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,912,979 >>> mbox cmd response data (48 bytes)
5,912,980 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,931,125 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
891,285 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,389 UART: [kat] ++
895,541 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,548 UART: [kat] SHA2-512-ACC
906,449 UART: [kat] ECC-384
916,218 UART: [kat] HMAC-384Kdf
920,842 UART: [kat] LMS
1,169,154 UART: [kat] --
1,170,053 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,173,113 UART: [idev] ++
1,173,281 UART: [idev] CDI.KEYID = 6
1,173,642 UART: [idev] SUBJECT.KEYID = 7
1,174,067 UART: [idev] UDS.KEYID = 0
1,174,413 ready_for_fw is high
1,174,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,968 UART: [idev] Erasing UDS.KEYID = 0
1,198,956 UART: [idev] Sha1 KeyId Algorithm
1,207,770 UART: [idev] --
1,208,749 UART: [ldev] ++
1,208,917 UART: [ldev] CDI.KEYID = 6
1,209,281 UART: [ldev] SUBJECT.KEYID = 5
1,209,708 UART: [ldev] AUTHORITY.KEYID = 7
1,210,171 UART: [ldev] FE.KEYID = 1
1,215,565 UART: [ldev] Erasing FE.KEYID = 1
1,242,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,385 UART: [ldev] --
1,281,660 UART: [fwproc] Wait for Commands...
1,282,329 UART: [fwproc] Recv command 0x46574c44
1,283,062 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,064 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,239 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,572 >>> mbox cmd response: success
2,826,654 UART: [afmc] ++
2,826,822 UART: [afmc] CDI.KEYID = 6
2,827,185 UART: [afmc] SUBJECT.KEYID = 7
2,827,611 UART: [afmc] AUTHORITY.KEYID = 5
2,864,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,088 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,798 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,679 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,380 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,055 UART: [afmc] --
2,907,002 UART: [cold-reset] --
2,907,992 UART: [state] Locking Datavault
2,909,231 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,835 UART: [state] Locking ICCM
2,910,377 UART: [exit] Launching FMC @ 0x40000130
2,915,707 UART:
2,915,723 UART: Running Caliptra FMC ...
2,916,131 UART:
2,916,274 UART: [state] CFI Enabled
2,927,212 UART: [fht] FMC Alias Private Key: 7
3,046,182 UART: [art] Extend RT PCRs Done
3,046,610 UART: [art] Lock RT PCRs Done
3,048,324 UART: [art] Populate DV Done
3,056,309 UART: [fht] FMC Alias Private Key: 7
3,057,401 UART: [art] Derive CDI
3,057,681 UART: [art] Store in slot 0x4
3,143,394 UART: [art] Derive Key Pair
3,143,754 UART: [art] Store priv key in slot 0x5
3,156,306 UART: [art] Derive Key Pair - Done
3,171,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,593 UART: [art] PUB.X = A82C69AD15A43F410AC97B09962F28DAE0A32A8DFE5DE81946A5A076CF96E796237546B89FD1E9A06C66B4A7D85D5FBD
3,194,371 UART: [art] PUB.Y = FDAD8616D45CC8F5D622D2C8EBBA97D69ED671625BB6A1E048D797E0CD0C7A6B228068CAB723695029AA231700D3B6F9
3,201,308 UART: [art] SIG.R = B649C3BF103990FCE6EA4231E8F9075552C81E265D9A83B6BE151965CE854ED0FBCC7665C35B3852189A78214CFCF106
3,208,076 UART: [art] SIG.S = 3DC2A7DADC703ADC9134A5C0DD5C17D1CC8FCCBD88A4A456687D6C0A7D13024A1A80C3098298D8D24A7A244B5D2CB304
3,232,008 UART: Caliptra RT
3,232,351 UART: [state] CFI Enabled
3,352,686 UART: [rt] RT listening for mailbox commands...
3,353,356 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,932 UART: [rt]cmd =0x4d454153, len=108
3,405,078 >>> mbox cmd response data (12 bytes)
3,405,079 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,405,842 UART:
3,405,858 UART: Running Caliptra ROM ...
3,406,266 UART:
3,406,408 UART: [state] CFI Enabled
3,408,958 UART: [state] LifecycleState = Unprovisioned
3,409,613 UART: [state] DebugLocked = No
3,410,113 UART: [state] WD Timer not started. Device not locked for debugging
3,411,411 UART: [kat] SHA2-256
4,214,961 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,219,065 UART: [kat] ++
4,219,217 UART: [kat] sha1
4,223,417 UART: [kat] SHA2-256
4,225,357 UART: [kat] SHA2-384
4,227,862 UART: [kat] SHA2-512-ACC
4,229,762 UART: [kat] ECC-384
4,239,769 UART: [kat] HMAC-384Kdf
4,244,519 UART: [kat] LMS
4,492,831 UART: [kat] --
4,493,843 UART: [update-reset] ++
5,443,133 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,444,282 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,545,923 >>> mbox cmd response: success
5,545,923 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,546,156 UART: [update-reset] Copying MAN_2 To MAN_1
5,554,170 UART: [update-reset Success] --
5,555,361 UART: [state] Locking Datavault
5,556,061 UART: [state] Locking PCR0, PCR1 and PCR31
5,556,665 UART: [state] Locking ICCM
5,557,213 UART: [exit] Launching FMC @ 0x40000130
5,562,543 UART:
5,562,559 UART: Running Caliptra FMC ...
5,562,967 UART:
5,563,110 UART: [state] CFI Enabled
5,652,799 UART: [art] Extend RT PCRs Done
5,653,227 UART: [art] Lock RT PCRs Done
5,654,772 UART: [art] Populate DV Done
5,663,101 UART: [fht] FMC Alias Private Key: 7
5,664,117 UART: [art] Derive CDI
5,664,397 UART: [art] Store in slot 0x4
5,750,620 UART: [art] Derive Key Pair
5,750,980 UART: [art] Store priv key in slot 0x5
5,764,636 UART: [art] Derive Key Pair - Done
5,779,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,794,775 UART: [art] Erasing AUTHORITY.KEYID = 7
5,795,540 UART: [art] PUB.X = BE952B4AF911680DC31A53E86A60D64159E93CCCB90147F13AC32421730D03A4E3DB93514F487FC0250167DD30E1F7CF
5,802,299 UART: [art] PUB.Y = 7D3D5E474C41B467C13908AB9C0CA0988049681EF27C8DD9E263528026FF5E50F85CE10BE3ED0873F4D6D414E35A4DDA
5,809,245 UART: [art] SIG.R = 9B7FCA02E4BC4B10F8B785AF15A20A6C7AF3E33ABF74BDD5405CCDB6ADF9A119BD0F8FADEEF2273A761BC784793523D2
5,816,034 UART: [art] SIG.S = 628D2BCA53E2481A9E0414BBFCECC88534AF2AFDB19E8294928EC150FED2A1930FB3D73A4AF72A9803BB9BA415338DCA
5,839,399 UART: mbox::rt_entry...
5,839,771 UART: ____ _ _ _ ____ _____
5,840,555 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,841,355 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,842,123 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,842,891 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,843,659 UART: |_|
5,843,971 UART:
6,205,821 UART: [rt] Runtime listening for mailbox commands...
6,207,019 >>> mbox cmd response data (48 bytes)
6,207,020 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,209,807 >>> mbox cmd response data (48 bytes)
6,209,808 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,227,953 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,521 ready_for_fw is high
1,060,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,969 >>> mbox cmd response: success
2,743,388 UART:
2,743,404 UART: Running Caliptra FMC ...
2,743,812 UART:
2,743,955 UART: [state] CFI Enabled
2,754,611 UART: [fht] FMC Alias Private Key: 7
2,873,891 UART: [art] Extend RT PCRs Done
2,874,319 UART: [art] Lock RT PCRs Done
2,875,707 UART: [art] Populate DV Done
2,883,772 UART: [fht] FMC Alias Private Key: 7
2,884,952 UART: [art] Derive CDI
2,885,232 UART: [art] Store in slot 0x4
2,971,089 UART: [art] Derive Key Pair
2,971,449 UART: [art] Store priv key in slot 0x5
2,984,299 UART: [art] Derive Key Pair - Done
2,998,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,154 UART: [art] PUB.X = 0076A7A8DA5BEDFFD1945AF05ABD98382070F89F299BB2842732A4298F93BDDD291529F2B5DD597230CA439898668856
3,021,902 UART: [art] PUB.Y = B194C11D078B7FC02F456C55512F434FEEC227B84B32D605E2BFD20EEE5A325BC06526E3C2A75F24A2B126D3A9F9AF77
3,028,855 UART: [art] SIG.R = 3E9A04548D855D1E9F0E22B3DA6E09F0298F90C78AE9A4248513F7178590C3904432B8B8CACE28C96C30B9E2D6326F9F
3,035,618 UART: [art] SIG.S = CAAFF0C6C3099D458E4BFB7931AEAB9D542E8FBE86241C09A1292B9426CE4FCA487FEA5811EFC6463A6AF5AA5D4149C3
3,059,000 UART: Caliptra RT
3,059,343 UART: [state] CFI Enabled
3,178,248 UART: [rt] RT listening for mailbox commands...
3,178,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,398 UART: [rt]cmd =0x4d454153, len=108
3,230,176 >>> mbox cmd response data (12 bytes)
3,230,177 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,255,965 >>> mbox cmd response: success
5,255,965 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,269,138 UART:
5,269,154 UART: Running Caliptra FMC ...
5,269,562 UART:
5,269,705 UART: [state] CFI Enabled
5,358,654 UART: [art] Extend RT PCRs Done
5,359,082 UART: [art] Lock RT PCRs Done
5,360,539 UART: [art] Populate DV Done
5,368,682 UART: [fht] FMC Alias Private Key: 7
5,369,712 UART: [art] Derive CDI
5,369,992 UART: [art] Store in slot 0x4
5,455,775 UART: [art] Derive Key Pair
5,456,135 UART: [art] Store priv key in slot 0x5
5,469,203 UART: [art] Derive Key Pair - Done
5,483,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,499,254 UART: [art] Erasing AUTHORITY.KEYID = 7
5,500,019 UART: [art] PUB.X = 6D6F8E5BEAD9EC47A765B4BB199911834E48BD56207DC9792F872D2657761164454749E3B1115C108474418A8527BC1E
5,506,781 UART: [art] PUB.Y = 569B42A57D805553FDB3C8B13E5D92792F58A3CF428BEC7CE3CA895AE062BE6EF3B736E32774E14700D967E15A17BBED
5,513,721 UART: [art] SIG.R = 3F65548E13F6FE310772799B17817C4E95419F5021856E4B6B3FF8720DFC756390D78B2BF5A17F1A2E09E72527D74ACC
5,520,480 UART: [art] SIG.S = 97CC9A418B999FA494C2094A570E30D3BA89AF1DCB7C8FA0C5BABB0AEA9009D615EBCB5A24CB905823F6408AEC2FC6EA
5,543,958 UART: mbox::rt_entry...
5,544,330 UART: ____ _ _ _ ____ _____
5,545,114 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,545,914 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,546,682 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,547,450 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,548,218 UART: |_|
5,548,530 UART:
5,912,000 UART: [rt] Runtime listening for mailbox commands...
5,913,198 >>> mbox cmd response data (48 bytes)
5,913,199 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,915,986 >>> mbox cmd response data (48 bytes)
5,915,987 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,934,132 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
893,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,573 UART: [kat] ++
897,725 UART: [kat] sha1
902,067 UART: [kat] SHA2-256
904,007 UART: [kat] SHA2-384
906,772 UART: [kat] SHA2-512-ACC
908,673 UART: [kat] ECC-384
918,336 UART: [kat] HMAC-384Kdf
923,040 UART: [kat] LMS
1,171,368 UART: [kat] --
1,172,413 UART: [cold-reset] ++
1,172,777 UART: [fht] FHT @ 0x50003400
1,175,510 UART: [idev] ++
1,175,678 UART: [idev] CDI.KEYID = 6
1,176,038 UART: [idev] SUBJECT.KEYID = 7
1,176,462 UART: [idev] UDS.KEYID = 0
1,176,807 ready_for_fw is high
1,176,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,736 UART: [idev] Erasing UDS.KEYID = 0
1,201,749 UART: [idev] Sha1 KeyId Algorithm
1,210,185 UART: [idev] --
1,211,449 UART: [ldev] ++
1,211,617 UART: [ldev] CDI.KEYID = 6
1,211,980 UART: [ldev] SUBJECT.KEYID = 5
1,212,406 UART: [ldev] AUTHORITY.KEYID = 7
1,212,869 UART: [ldev] FE.KEYID = 1
1,218,003 UART: [ldev] Erasing FE.KEYID = 1
1,244,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,355 UART: [ldev] --
1,283,868 UART: [fwproc] Wait for Commands...
1,284,560 UART: [fwproc] Recv command 0x46574c44
1,285,288 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,652 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,822 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,183 >>> mbox cmd response: success
2,830,227 UART: [afmc] ++
2,830,395 UART: [afmc] CDI.KEYID = 6
2,830,757 UART: [afmc] SUBJECT.KEYID = 7
2,831,182 UART: [afmc] AUTHORITY.KEYID = 5
2,866,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,132 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,880 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,589 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,472 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,173 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,979 UART: [afmc] --
2,909,897 UART: [cold-reset] --
2,910,901 UART: [state] Locking Datavault
2,912,164 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,768 UART: [state] Locking ICCM
2,913,354 UART: [exit] Launching FMC @ 0x40000130
2,918,684 UART:
2,918,700 UART: Running Caliptra FMC ...
2,919,108 UART:
2,919,162 UART: [state] CFI Enabled
2,929,654 UART: [fht] FMC Alias Private Key: 7
3,048,436 UART: [art] Extend RT PCRs Done
3,048,864 UART: [art] Lock RT PCRs Done
3,050,310 UART: [art] Populate DV Done
3,058,705 UART: [fht] FMC Alias Private Key: 7
3,059,699 UART: [art] Derive CDI
3,059,979 UART: [art] Store in slot 0x4
3,145,388 UART: [art] Derive Key Pair
3,145,748 UART: [art] Store priv key in slot 0x5
3,159,458 UART: [art] Derive Key Pair - Done
3,174,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,120 UART: [art] PUB.X = BDF66625E6ADE42AF2E546E341E4024ACCF7EA350F40442C5BB939F22D7197298EC1FB8CD63298D49C363A0A42CC7EB5
3,196,895 UART: [art] PUB.Y = F58155AB9D479AF7AE1A07CDB4DF92BEABEC73C21A9498C320FC900148692B030004275D93E87233CF2448B994CB958E
3,203,817 UART: [art] SIG.R = E671CCBD8C2257EAF093FBA2A01778D7895141F6B244D5AA7C0CEEA55608A3FE6A1827AFC2280744E7F1752AD99824D4
3,210,588 UART: [art] SIG.S = 9FAB97FC8BB79B84A9FFA52E241C33EDAB5B953564080F3EB3CF6852BCDD94335131932DEB7D9D2A62AF5584462D174A
3,234,280 UART: Caliptra RT
3,234,531 UART: [state] CFI Enabled
3,354,311 UART: [rt] RT listening for mailbox commands...
3,354,981 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,483 UART: [rt]cmd =0x4d454153, len=108
3,405,709 >>> mbox cmd response data (12 bytes)
3,405,710 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,373 UART:
3,406,389 UART: Running Caliptra ROM ...
3,406,797 UART:
3,406,852 UART: [state] CFI Enabled
3,409,434 UART: [state] LifecycleState = Unprovisioned
3,410,089 UART: [state] DebugLocked = No
3,410,721 UART: [state] WD Timer not started. Device not locked for debugging
3,411,843 UART: [kat] SHA2-256
4,217,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,221,618 UART: [kat] ++
4,221,770 UART: [kat] sha1
4,225,980 UART: [kat] SHA2-256
4,227,920 UART: [kat] SHA2-384
4,230,569 UART: [kat] SHA2-512-ACC
4,232,469 UART: [kat] ECC-384
4,242,552 UART: [kat] HMAC-384Kdf
4,247,226 UART: [kat] LMS
4,495,554 UART: [kat] --
4,496,292 UART: [update-reset] ++
5,447,419 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,448,520 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,550,161 >>> mbox cmd response: success
5,550,161 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,550,480 UART: [update-reset] Copying MAN_2 To MAN_1
5,558,494 UART: [update-reset Success] --
5,559,549 UART: [state] Locking Datavault
5,560,391 UART: [state] Locking PCR0, PCR1 and PCR31
5,560,995 UART: [state] Locking ICCM
5,561,551 UART: [exit] Launching FMC @ 0x40000130
5,566,881 UART:
5,566,897 UART: Running Caliptra FMC ...
5,567,305 UART:
5,567,359 UART: [state] CFI Enabled
5,656,944 UART: [art] Extend RT PCRs Done
5,657,372 UART: [art] Lock RT PCRs Done
5,658,979 UART: [art] Populate DV Done
5,667,024 UART: [fht] FMC Alias Private Key: 7
5,668,040 UART: [art] Derive CDI
5,668,320 UART: [art] Store in slot 0x4
5,754,097 UART: [art] Derive Key Pair
5,754,457 UART: [art] Store priv key in slot 0x5
5,767,363 UART: [art] Derive Key Pair - Done
5,782,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,797,967 UART: [art] Erasing AUTHORITY.KEYID = 7
5,798,732 UART: [art] PUB.X = 7D3084DC34356A8BB38447D4340C2C2DC7AC0D9629C4F3FD92FAC87612F98D9E532459D6F76930E5AD573CDED19CC2AF
5,805,508 UART: [art] PUB.Y = 3B590D40337A741D93C56E4965B3DB558B49063B58E11DB178B597D7EE1C389C21DC3CCD75A03B28BF56369EE0051A60
5,812,451 UART: [art] SIG.R = EDED0173C837D0848D9E79A19B951A0BFC3ACDE07F9AFF8EE80A54AD4F73AC12365C09133A180B81A79E767CB53DD6E2
5,819,224 UART: [art] SIG.S = CE0446021B217AFE25FDB4FF7B9BDDA68D5589537566F35623228B6EF21680952CDFC37DD499EA8860662FDAE0775E45
5,842,234 UART: mbox::rt_entry...
5,842,606 UART: ____ _ _ _ ____ _____
5,843,390 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,844,190 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,844,958 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,845,726 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,846,494 UART: |_|
5,846,806 UART:
6,214,847 UART: [rt] Runtime listening for mailbox commands...
6,216,045 >>> mbox cmd response data (48 bytes)
6,216,046 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,218,833 >>> mbox cmd response data (48 bytes)
6,218,834 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,236,979 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,523 ready_for_fw is high
1,060,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,446 >>> mbox cmd response: success
2,740,845 UART:
2,740,861 UART: Running Caliptra FMC ...
2,741,269 UART:
2,741,323 UART: [state] CFI Enabled
2,751,733 UART: [fht] FMC Alias Private Key: 7
2,870,427 UART: [art] Extend RT PCRs Done
2,870,855 UART: [art] Lock RT PCRs Done
2,872,479 UART: [art] Populate DV Done
2,880,900 UART: [fht] FMC Alias Private Key: 7
2,881,978 UART: [art] Derive CDI
2,882,258 UART: [art] Store in slot 0x4
2,968,353 UART: [art] Derive Key Pair
2,968,713 UART: [art] Store priv key in slot 0x5
2,981,697 UART: [art] Derive Key Pair - Done
2,996,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,624 UART: [art] PUB.X = E94063C176154FD11B5629A50F065AA92D5ECE9D0FA3B19EF077382B6373B523A9A2B4FCF9343739D3C773AFACEF6291
3,019,393 UART: [art] PUB.Y = C5393686D8105F2E789EF551630592DD7F7240BC3048A3478DD556EC2FC3685B8C43A22207813AEC5CF5EAF3766D4480
3,026,335 UART: [art] SIG.R = 46C0DEDB2E2F8376AC08900C319E34DD5A6D11D981BBBC1FC6F8F9BCCAB1FBDFD356C0ACE8C9B6EF90A0D5471CFF4542
3,033,131 UART: [art] SIG.S = BD8196F94BB709B590DE1F503FF91A67D9D3FCADDB598E943E87DC01799DC071CB8C20EB5A8B0A168BA65F2858307AF5
3,057,224 UART: Caliptra RT
3,057,475 UART: [state] CFI Enabled
3,176,366 UART: [rt] RT listening for mailbox commands...
3,177,036 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,526 UART: [rt]cmd =0x4d454153, len=108
3,228,658 >>> mbox cmd response data (12 bytes)
3,228,659 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,256,807 >>> mbox cmd response: success
5,256,807 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,270,260 UART:
5,270,276 UART: Running Caliptra FMC ...
5,270,684 UART:
5,270,738 UART: [state] CFI Enabled
5,359,673 UART: [art] Extend RT PCRs Done
5,360,101 UART: [art] Lock RT PCRs Done
5,361,398 UART: [art] Populate DV Done
5,369,585 UART: [fht] FMC Alias Private Key: 7
5,370,697 UART: [art] Derive CDI
5,370,977 UART: [art] Store in slot 0x4
5,457,014 UART: [art] Derive Key Pair
5,457,374 UART: [art] Store priv key in slot 0x5
5,470,524 UART: [art] Derive Key Pair - Done
5,485,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,500,676 UART: [art] Erasing AUTHORITY.KEYID = 7
5,501,441 UART: [art] PUB.X = 47E4E47482927137A1F115D760D90A8045AEFA2DB428EC646F377855B68A58455DF3C0ED30CA62B90CBEBC51F11C68EB
5,508,213 UART: [art] PUB.Y = 15C4AAA6B8BD00047DE9E5EFFE1638075DE03D3DC21D16F5547205944EFAEE16CB9342E0F9A06453C292E27248C1E7DE
5,515,144 UART: [art] SIG.R = 59FBFCEC114E0C272D29FCC688292CA85AE3D5AC1D14F82624738A4A1115FCEABCBD9B5F06DBAD7A102E1CA7CC33C007
5,521,931 UART: [art] SIG.S = 26BDFDD59FB2ADBE731D2452532392C8C937D4425035711F62B7FC60CE78523B6CFBEB21E3285054735B5F76BF6F5547
5,546,431 UART: mbox::rt_entry...
5,546,803 UART: ____ _ _ _ ____ _____
5,547,587 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,548,387 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,549,155 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,549,923 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,550,691 UART: |_|
5,551,003 UART:
5,914,688 UART: [rt] Runtime listening for mailbox commands...
5,915,886 >>> mbox cmd response data (48 bytes)
5,915,887 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,918,674 >>> mbox cmd response data (48 bytes)
5,918,675 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,936,820 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
893,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,818 UART: [kat] ++
897,970 UART: [kat] sha1
902,260 UART: [kat] SHA2-256
904,200 UART: [kat] SHA2-384
906,813 UART: [kat] SHA2-512-ACC
908,714 UART: [kat] ECC-384
918,257 UART: [kat] HMAC-384Kdf
923,043 UART: [kat] LMS
1,171,371 UART: [kat] --
1,172,292 UART: [cold-reset] ++
1,172,716 UART: [fht] FHT @ 0x50003400
1,175,447 UART: [idev] ++
1,175,615 UART: [idev] CDI.KEYID = 6
1,175,975 UART: [idev] SUBJECT.KEYID = 7
1,176,399 UART: [idev] UDS.KEYID = 0
1,176,744 ready_for_fw is high
1,176,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,697 UART: [idev] Erasing UDS.KEYID = 0
1,201,668 UART: [idev] Sha1 KeyId Algorithm
1,210,140 UART: [idev] --
1,211,188 UART: [ldev] ++
1,211,356 UART: [ldev] CDI.KEYID = 6
1,211,719 UART: [ldev] SUBJECT.KEYID = 5
1,212,145 UART: [ldev] AUTHORITY.KEYID = 7
1,212,608 UART: [ldev] FE.KEYID = 1
1,217,596 UART: [ldev] Erasing FE.KEYID = 1
1,243,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,690 UART: [ldev] --
1,282,951 UART: [fwproc] Wait for Commands...
1,283,553 UART: [fwproc] Recv command 0x46574c44
1,284,281 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,401 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,571 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,812 >>> mbox cmd response: success
2,828,966 UART: [afmc] ++
2,829,134 UART: [afmc] CDI.KEYID = 6
2,829,496 UART: [afmc] SUBJECT.KEYID = 7
2,829,921 UART: [afmc] AUTHORITY.KEYID = 5
2,865,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,279 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,027 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,736 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,619 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,320 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,220 UART: [afmc] --
2,908,098 UART: [cold-reset] --
2,908,628 UART: [state] Locking Datavault
2,909,721 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,325 UART: [state] Locking ICCM
2,910,979 UART: [exit] Launching FMC @ 0x40000130
2,916,309 UART:
2,916,325 UART: Running Caliptra FMC ...
2,916,733 UART:
2,916,876 UART: [state] CFI Enabled
2,927,530 UART: [fht] FMC Alias Private Key: 7
3,046,816 UART: [art] Extend RT PCRs Done
3,047,244 UART: [art] Lock RT PCRs Done
3,048,786 UART: [art] Populate DV Done
3,056,789 UART: [fht] FMC Alias Private Key: 7
3,057,917 UART: [art] Derive CDI
3,058,197 UART: [art] Store in slot 0x4
3,144,238 UART: [art] Derive Key Pair
3,144,598 UART: [art] Store priv key in slot 0x5
3,157,958 UART: [art] Derive Key Pair - Done
3,172,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,111 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,876 UART: [art] PUB.X = D85EB9EE2F72C6CC748676CB8DD694BBA6C003ED2EA445394EF9B0F7A27DD4C4BFD0C2319563B13F515FB00651A6D3F0
3,195,658 UART: [art] PUB.Y = 41E584872E94809D9997D242A6090E4057A157914BD9A5A260E859DA6DC6AEEC97CD15DDB93073DCA2FA1F4B1B766975
3,202,606 UART: [art] SIG.R = 8CB426E42B5089F1622E9E47F45626056F3BF24F780DDFAB34354FEC4880F8F9E36D67DD071034ED5D4A6446ADD6AD1D
3,209,377 UART: [art] SIG.S = A31F3179C577E36E096B550E4221A3649761E66666B544BC20EDF0F8EFEB49F00AEDE008B7C315316A32C9B856D9E1DB
3,233,057 UART: Caliptra RT
3,233,400 UART: [state] CFI Enabled
3,352,910 UART: [rt] RT listening for mailbox commands...
3,353,580 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,968 UART: [rt]cmd =0x4d454153, len=108
3,405,480 >>> mbox cmd response data (12 bytes)
3,405,481 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,434 UART:
3,406,450 UART: Running Caliptra ROM ...
3,406,858 UART:
3,407,000 UART: [state] CFI Enabled
3,409,538 UART: [state] LifecycleState = Unprovisioned
3,410,193 UART: [state] DebugLocked = No
3,410,925 UART: [state] WD Timer not started. Device not locked for debugging
3,412,277 UART: [kat] SHA2-256
4,217,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,222,052 UART: [kat] ++
4,222,204 UART: [kat] sha1
4,226,394 UART: [kat] SHA2-256
4,228,334 UART: [kat] SHA2-384
4,231,209 UART: [kat] SHA2-512-ACC
4,233,109 UART: [kat] ECC-384
4,242,592 UART: [kat] HMAC-384Kdf
4,247,190 UART: [kat] LMS
4,495,518 UART: [kat] --
4,496,558 UART: [update-reset] ++
5,447,455 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,448,522 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,550,163 >>> mbox cmd response: success
5,550,163 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,550,388 UART: [update-reset] Copying MAN_2 To MAN_1
5,558,402 UART: [update-reset Success] --
5,559,303 UART: [state] Locking Datavault
5,560,123 UART: [state] Locking PCR0, PCR1 and PCR31
5,560,727 UART: [state] Locking ICCM
5,561,191 UART: [exit] Launching FMC @ 0x40000130
5,566,521 UART:
5,566,537 UART: Running Caliptra FMC ...
5,566,945 UART:
5,567,088 UART: [state] CFI Enabled
5,656,165 UART: [art] Extend RT PCRs Done
5,656,593 UART: [art] Lock RT PCRs Done
5,658,000 UART: [art] Populate DV Done
5,665,975 UART: [fht] FMC Alias Private Key: 7
5,666,917 UART: [art] Derive CDI
5,667,197 UART: [art] Store in slot 0x4
5,753,304 UART: [art] Derive Key Pair
5,753,664 UART: [art] Store priv key in slot 0x5
5,767,268 UART: [art] Derive Key Pair - Done
5,782,164 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,797,517 UART: [art] Erasing AUTHORITY.KEYID = 7
5,798,282 UART: [art] PUB.X = 83C36C1CF4FCF8267557A2162376C220B36713D532D1B0499F5D81593023699C4963DBFCA169ACCD14DA9777115EC732
5,805,048 UART: [art] PUB.Y = 0EA8D026F96BE57D76AC189A006CCF0F08B2B43D50B7B3AB2C89E8B305962E6A1018371FDD46DFA2FA94B4987990BF12
5,811,976 UART: [art] SIG.R = A1DD1C95658D5AA8CBF91B72B100A3CC16597E6B356CE814DB8DE93895D47B0A0977CA648CDDC2DA28179047136B97E2
5,818,728 UART: [art] SIG.S = 722BC925A5F334CA3168CFA45C2FD69EFF0CD149A24082ABA43E10B0D0CC2B1F590771C016ED86B2DCECD87BCBBB33C9
5,842,988 UART: mbox::rt_entry...
5,843,360 UART: ____ _ _ _ ____ _____
5,844,144 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,844,944 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,845,712 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,846,480 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,847,248 UART: |_|
5,847,560 UART:
6,214,742 UART: [rt] Runtime listening for mailbox commands...
6,215,940 >>> mbox cmd response data (48 bytes)
6,215,941 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,218,728 >>> mbox cmd response data (48 bytes)
6,218,729 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,236,874 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,722 ready_for_fw is high
1,060,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,463 >>> mbox cmd response: success
2,740,982 UART:
2,740,998 UART: Running Caliptra FMC ...
2,741,406 UART:
2,741,549 UART: [state] CFI Enabled
2,752,293 UART: [fht] FMC Alias Private Key: 7
2,871,483 UART: [art] Extend RT PCRs Done
2,871,911 UART: [art] Lock RT PCRs Done
2,873,701 UART: [art] Populate DV Done
2,881,662 UART: [fht] FMC Alias Private Key: 7
2,882,836 UART: [art] Derive CDI
2,883,116 UART: [art] Store in slot 0x4
2,968,963 UART: [art] Derive Key Pair
2,969,323 UART: [art] Store priv key in slot 0x5
2,982,131 UART: [art] Derive Key Pair - Done
2,996,769 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,887 UART: [art] PUB.X = 87BA26BA1D4FE59574033B372BB7F230A8D8B0896B0DF9F57E4D1AFFA70EE711AF83DCC80B8A9518A78ED7C67AD6B425
3,019,663 UART: [art] PUB.Y = 3D230E11E267FBDED1390742F855869A8FA2A71D27DDD55559F6126A92EC1E93A367B972578DAE6B59262E7CB94DD3C2
3,026,613 UART: [art] SIG.R = D95A63ED93958B894FD328ECF675A33F12344C39B6D4209B6677993C1B16C6BD7E76C228C9D9F106C0839836F14CFFC5
3,033,382 UART: [art] SIG.S = 0C66A448CBBA963814B9DD0A6B5905CC084B2FA4085DA9EEF076CC3EEF2DB3F98A993B9CA260A6E218D57735980DA52B
3,056,502 UART: Caliptra RT
3,056,845 UART: [state] CFI Enabled
3,176,762 UART: [rt] RT listening for mailbox commands...
3,177,432 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,796 UART: [rt]cmd =0x4d454153, len=108
3,228,790 >>> mbox cmd response data (12 bytes)
3,228,791 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,257,344 >>> mbox cmd response: success
5,257,344 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,270,703 UART:
5,270,719 UART: Running Caliptra FMC ...
5,271,127 UART:
5,271,270 UART: [state] CFI Enabled
5,360,125 UART: [art] Extend RT PCRs Done
5,360,553 UART: [art] Lock RT PCRs Done
5,361,812 UART: [art] Populate DV Done
5,369,945 UART: [fht] FMC Alias Private Key: 7
5,371,105 UART: [art] Derive CDI
5,371,385 UART: [art] Store in slot 0x4
5,457,354 UART: [art] Derive Key Pair
5,457,714 UART: [art] Store priv key in slot 0x5
5,471,046 UART: [art] Derive Key Pair - Done
5,485,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,501,150 UART: [art] Erasing AUTHORITY.KEYID = 7
5,501,915 UART: [art] PUB.X = 0A0278EC85FC9264772B0B02176788F247C11D4A0FD0E205A3CC58DC96E91E719D388F25CB2BA581565CA9BE6E0E890D
5,508,667 UART: [art] PUB.Y = 7D00B0CDE78098851660E384DB672A1C81981ED43078850B7A36D721DA81F152C18D92938686BFF904EEFA16ADCC2FC1
5,515,593 UART: [art] SIG.R = 84F5CAE08D5E47C243FAABBE8EA45DA8CA46F9E9C49EF3DF59FD900A02A10803885369D9C55124F57F3AE9E7A8C633BD
5,522,371 UART: [art] SIG.S = E928746C6C96C2881BAF3C577B495FF357999FB3283C981682990C78A336AC8920A10324831201FD5F87FA11249CBCBE
5,545,106 UART: mbox::rt_entry...
5,545,478 UART: ____ _ _ _ ____ _____
5,546,262 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,547,062 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,547,830 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,548,598 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,549,366 UART: |_|
5,549,678 UART:
5,912,971 UART: [rt] Runtime listening for mailbox commands...
5,914,169 >>> mbox cmd response data (48 bytes)
5,914,170 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,916,957 >>> mbox cmd response data (48 bytes)
5,916,958 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,935,103 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,132 UART:
192,490 UART: Running Caliptra ROM ...
193,597 UART:
193,741 UART: [state] CFI Enabled
264,983 UART: [state] LifecycleState = Unprovisioned
266,967 UART: [state] DebugLocked = No
268,701 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,356 UART: [kat] SHA2-256
444,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,571 UART: [kat] ++
455,091 UART: [kat] sha1
466,702 UART: [kat] SHA2-256
469,357 UART: [kat] SHA2-384
475,490 UART: [kat] SHA2-512-ACC
477,859 UART: [kat] ECC-384
2,768,935 UART: [kat] HMAC-384Kdf
2,800,345 UART: [kat] LMS
3,990,632 UART: [kat] --
3,993,792 UART: [cold-reset] ++
3,995,010 UART: [fht] Storing FHT @ 0x50003400
4,006,062 UART: [idev] ++
4,006,632 UART: [idev] CDI.KEYID = 6
4,007,590 UART: [idev] SUBJECT.KEYID = 7
4,008,841 UART: [idev] UDS.KEYID = 0
4,009,812 ready_for_fw is high
4,010,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,080 UART: [idev] Erasing UDS.KEYID = 0
7,349,595 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,758 UART: [idev] --
7,375,181 UART: [ldev] ++
7,375,751 UART: [ldev] CDI.KEYID = 6
7,376,719 UART: [ldev] SUBJECT.KEYID = 5
7,377,933 UART: [ldev] AUTHORITY.KEYID = 7
7,379,218 UART: [ldev] FE.KEYID = 1
7,423,182 UART: [ldev] Erasing FE.KEYID = 1
10,757,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,667 UART: [ldev] --
13,135,236 UART: [fwproc] Waiting for Commands...
13,137,274 UART: [fwproc] Received command 0x46574c44
13,139,475 UART: [fwproc] Received Image of size 118548 bytes
17,244,580 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,315,993 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,389,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,717,962 >>> mbox cmd response: success
17,719,010 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,722,044 UART: [afmc] ++
17,722,639 UART: [afmc] CDI.KEYID = 6
17,723,547 UART: [afmc] SUBJECT.KEYID = 7
17,724,767 UART: [afmc] AUTHORITY.KEYID = 5
21,090,992 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,815 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,074 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,407,559 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,264 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,640 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,734 UART: [afmc] --
23,462,432 UART: [cold-reset] --
23,466,719 UART: [state] Locking Datavault
23,471,319 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,082 UART: [state] Locking ICCM
23,474,316 UART: [exit] Launching FMC @ 0x40000130
23,482,700 UART:
23,482,950 UART: Running Caliptra FMC ...
23,484,057 UART:
23,484,221 UART: [state] CFI Enabled
23,551,456 UART: [fht] FMC Alias Private Key: 7
25,892,862 UART: [art] Extend RT PCRs Done
25,894,083 UART: [art] Lock RT PCRs Done
25,895,626 UART: [art] Populate DV Done
25,900,989 UART: [fht] FMC Alias Private Key: 7
25,902,595 UART: [art] Derive CDI
25,903,355 UART: [art] Store in slot 0x4
25,959,506 UART: [art] Derive Key Pair
25,960,547 UART: [art] Store priv key in slot 0x5
29,252,946 UART: [art] Derive Key Pair - Done
29,266,096 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,724 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,238 UART: [art] PUB.X = 1D3F93349A59E8241275678F4B6AE4AFCC4F7921B84C04AA1F4717394174B94A797ABD3D5F35BABACF56B137E0CC0F6E
31,562,532 UART: [art] PUB.Y = 136ABF28E729AF7726FE58878CD2C38F8F8D0D8E1692547F915F04A9556163FF298C5644D5AE7447E4F733C264123CEF
31,569,742 UART: [art] SIG.R = E113C1DF7A353158C1887BEB03F5C0417566EBCA78D0A723F9793498E66A8CFD88CD6D87B1E6CE2725016424E982E779
31,577,151 UART: [art] SIG.S = 58B761E22C6E90DED09DFBFE105E24D905C8781417271E2827C214ED8FEFBA9A81F4A21F587BBA94092315D22C0D6D4B
32,882,631 UART: Caliptra RT
32,883,347 UART: [state] CFI Enabled
33,058,595 UART: [rt] RT listening for mailbox commands...
33,090,178 UART: [rt]cmd =0x54514754, len=24
33,092,806 >>> mbox cmd response data (8 bytes)
33,093,356 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,123,300 UART: [rt]cmd =0x54514754, len=24
33,124,956 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,805,120 ready_for_fw is high
3,805,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,977,847 >>> mbox cmd response: success
17,979,500 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,669,760 UART:
23,670,184 UART: Running Caliptra FMC ...
23,671,337 UART:
23,671,506 UART: [state] CFI Enabled
23,740,221 UART: [fht] FMC Alias Private Key: 7
26,080,410 UART: [art] Extend RT PCRs Done
26,081,657 UART: [art] Lock RT PCRs Done
26,083,238 UART: [art] Populate DV Done
26,088,615 UART: [fht] FMC Alias Private Key: 7
26,090,159 UART: [art] Derive CDI
26,090,973 UART: [art] Store in slot 0x4
26,148,529 UART: [art] Derive Key Pair
26,149,531 UART: [art] Store priv key in slot 0x5
29,442,878 UART: [art] Derive Key Pair - Done
29,456,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,572 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,085 UART: [art] PUB.X = CE80BD3459E375134CE178A947418139D10EB9C672218384258CC438F190CAE55D804060D8A038B58293BBDE15B892B1
31,753,345 UART: [art] PUB.Y = ED21244682A43CBBD3479224E5347E3B826F82318883057D1FA18228B3AE65E0B202157944C8F5B85BD4192A810AD1AD
31,760,604 UART: [art] SIG.R = D142DCC66032803218371BE116EA49E60A57FF5455FD632D47028FB9E588C587E5DE0527BA44008B3E0BE5B134C2D906
31,767,971 UART: [art] SIG.S = E10AA48846E59B449D0384E6B909019195CB153CBC53B8764EF9BF7D9069CDBEB94B5105EF6BBA3AA85610D663325694
33,072,864 UART: Caliptra RT
33,073,591 UART: [state] CFI Enabled
33,251,333 UART: [rt] RT listening for mailbox commands...
33,283,175 UART: [rt]cmd =0x54514754, len=24
33,285,800 >>> mbox cmd response data (8 bytes)
33,286,306 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,316,219 UART: [rt]cmd =0x54514754, len=24
33,318,031 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,532 UART:
192,895 UART: Running Caliptra ROM ...
194,087 UART:
603,695 UART: [state] CFI Enabled
619,928 UART: [state] LifecycleState = Unprovisioned
621,873 UART: [state] DebugLocked = No
623,186 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,537 UART: [kat] SHA2-256
797,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,883 UART: [kat] ++
808,327 UART: [kat] sha1
817,984 UART: [kat] SHA2-256
820,702 UART: [kat] SHA2-384
825,688 UART: [kat] SHA2-512-ACC
828,045 UART: [kat] ECC-384
3,113,462 UART: [kat] HMAC-384Kdf
3,124,626 UART: [kat] LMS
4,314,711 UART: [kat] --
4,320,479 UART: [cold-reset] ++
4,322,761 UART: [fht] Storing FHT @ 0x50003400
4,333,453 UART: [idev] ++
4,334,007 UART: [idev] CDI.KEYID = 6
4,334,917 UART: [idev] SUBJECT.KEYID = 7
4,336,158 UART: [idev] UDS.KEYID = 0
4,337,217 ready_for_fw is high
4,337,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,274 UART: [idev] Erasing UDS.KEYID = 0
7,621,405 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,913 UART: [idev] --
7,646,620 UART: [ldev] ++
7,647,195 UART: [ldev] CDI.KEYID = 6
7,648,164 UART: [ldev] SUBJECT.KEYID = 5
7,649,371 UART: [ldev] AUTHORITY.KEYID = 7
7,650,597 UART: [ldev] FE.KEYID = 1
7,661,452 UART: [ldev] Erasing FE.KEYID = 1
10,944,908 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,248 UART: [ldev] --
13,304,072 UART: [fwproc] Waiting for Commands...
13,306,051 UART: [fwproc] Received command 0x46574c44
13,308,282 UART: [fwproc] Received Image of size 118548 bytes
17,410,168 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,484,057 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,557,247 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,885,715 >>> mbox cmd response: success
17,886,243 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,889,098 UART: [afmc] ++
17,889,736 UART: [afmc] CDI.KEYID = 6
17,890,640 UART: [afmc] SUBJECT.KEYID = 7
17,891,909 UART: [afmc] AUTHORITY.KEYID = 5
21,205,389 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,501,394 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,503,706 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,518,154 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,532,837 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,547,247 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,569,061 UART: [afmc] --
23,573,231 UART: [cold-reset] --
23,576,128 UART: [state] Locking Datavault
23,581,750 UART: [state] Locking PCR0, PCR1 and PCR31
23,583,497 UART: [state] Locking ICCM
23,586,290 UART: [exit] Launching FMC @ 0x40000130
23,594,675 UART:
23,594,915 UART: Running Caliptra FMC ...
23,596,011 UART:
23,596,172 UART: [state] CFI Enabled
23,604,212 UART: [fht] FMC Alias Private Key: 7
25,944,387 UART: [art] Extend RT PCRs Done
25,945,606 UART: [art] Lock RT PCRs Done
25,946,923 UART: [art] Populate DV Done
25,952,115 UART: [fht] FMC Alias Private Key: 7
25,953,757 UART: [art] Derive CDI
25,954,563 UART: [art] Store in slot 0x4
25,997,209 UART: [art] Derive Key Pair
25,998,246 UART: [art] Store priv key in slot 0x5
29,240,317 UART: [art] Derive Key Pair - Done
29,253,321 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,380 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,884 UART: [art] PUB.X = 27020D2C4CFAA9933CDCA6BDA03B604BE83A71059FE221058DD8FED11B35D05422B2CEE626D63E546968627111F1B6A6
31,542,147 UART: [art] PUB.Y = 48C2CCDD7700EA180A7E94927554574C77D2FBD2624E49555F4FCC41771BA81F124DF2B1344F129E0363EA994F9704F3
31,549,378 UART: [art] SIG.R = 33443C675AAEF6F3E346C861E9C3448AF57DC4F7B4C62AD3C96E2DAE6A82D18B276120994F86E201CE9C593C40A2FF8D
31,556,770 UART: [art] SIG.S = 49984C9BA6E0A25545B52537E929BD26F2C208CAB301D0BBF9BAD05AD9A6F55A086044E788357FF384C6EDCCBC0DF3B3
32,861,826 UART: Caliptra RT
32,862,549 UART: [state] CFI Enabled
32,995,413 UART: [rt] RT listening for mailbox commands...
33,027,217 UART: [rt]cmd =0x54514754, len=24
33,029,886 >>> mbox cmd response data (8 bytes)
33,030,414 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,060,149 UART: [rt]cmd =0x54514754, len=24
33,061,736 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
4,132,106 ready_for_fw is high
4,132,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,341 >>> mbox cmd response: success
18,158,336 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,791,319 UART:
23,791,740 UART: Running Caliptra FMC ...
23,792,862 UART:
23,793,021 UART: [state] CFI Enabled
23,800,716 UART: [fht] FMC Alias Private Key: 7
26,140,526 UART: [art] Extend RT PCRs Done
26,141,752 UART: [art] Lock RT PCRs Done
26,143,408 UART: [art] Populate DV Done
26,148,991 UART: [fht] FMC Alias Private Key: 7
26,150,650 UART: [art] Derive CDI
26,151,462 UART: [art] Store in slot 0x4
26,193,726 UART: [art] Derive Key Pair
26,194,720 UART: [art] Store priv key in slot 0x5
29,436,533 UART: [art] Derive Key Pair - Done
29,449,373 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,520 UART: [art] Erasing AUTHORITY.KEYID = 7
31,731,046 UART: [art] PUB.X = 8B403431BE3848454981EF6ED683E8E5D2659873C337DD001CB7F3CB18F23A08DA30A6DD321E5F7A7C2A8B030519A0BC
31,738,238 UART: [art] PUB.Y = DAE868549446003FA86CE07E6EB853BA26907D385AB12E615876F23F5BCCA8793CB41CED06193754EC933E1B00397D0E
31,745,490 UART: [art] SIG.R = 4876D45A6910EE4B922C6D5716DEC82FCFC153CBFB01CD82F16E0F5D4D33C10DA23E0CDC2E332677E6E3D1D2E78B02E0
31,752,879 UART: [art] SIG.S = 1B7E2E457DE4125BC210D3FF53F083C41B14631BD9C2B2792F17C478E805E58048B79CB6A60582389A271B78E9D171E8
33,057,748 UART: Caliptra RT
33,058,473 UART: [state] CFI Enabled
33,190,895 UART: [rt] RT listening for mailbox commands...
33,222,418 UART: [rt]cmd =0x54514754, len=24
33,225,374 >>> mbox cmd response data (8 bytes)
33,225,881 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,255,635 UART: [rt]cmd =0x54514754, len=24
33,257,215 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,136 UART:
192,491 UART: Running Caliptra ROM ...
193,585 UART:
193,726 UART: [state] CFI Enabled
266,462 UART: [state] LifecycleState = Unprovisioned
268,375 UART: [state] DebugLocked = No
270,388 UART: [state] WD Timer not started. Device not locked for debugging
274,444 UART: [kat] SHA2-256
454,137 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,935 UART: [kat] ++
465,396 UART: [kat] sha1
477,828 UART: [kat] SHA2-256
480,547 UART: [kat] SHA2-384
485,961 UART: [kat] SHA2-512-ACC
488,316 UART: [kat] ECC-384
2,948,039 UART: [kat] HMAC-384Kdf
2,971,786 UART: [kat] LMS
3,448,262 UART: [kat] --
3,451,432 UART: [cold-reset] ++
3,453,752 UART: [fht] FHT @ 0x50003400
3,464,831 UART: [idev] ++
3,465,437 UART: [idev] CDI.KEYID = 6
3,466,324 UART: [idev] SUBJECT.KEYID = 7
3,467,595 UART: [idev] UDS.KEYID = 0
3,468,522 ready_for_fw is high
3,468,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,616 UART: [idev] Erasing UDS.KEYID = 0
5,988,368 UART: [idev] Sha1 KeyId Algorithm
6,011,598 UART: [idev] --
6,017,595 UART: [ldev] ++
6,018,163 UART: [ldev] CDI.KEYID = 6
6,019,237 UART: [ldev] SUBJECT.KEYID = 5
6,020,359 UART: [ldev] AUTHORITY.KEYID = 7
6,021,596 UART: [ldev] FE.KEYID = 1
6,071,126 UART: [ldev] Erasing FE.KEYID = 1
8,582,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,314,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,330,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,346,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,361,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,046 UART: [ldev] --
10,388,252 UART: [fwproc] Wait for Commands...
10,391,532 UART: [fwproc] Recv command 0x46574c44
10,393,564 UART: [fwproc] Recv'd Img size: 118548 bytes
13,880,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,961,330 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,034,381 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,363,505 >>> mbox cmd response: success
14,364,641 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,368,421 UART: [afmc] ++
14,368,996 UART: [afmc] CDI.KEYID = 6
14,370,152 UART: [afmc] SUBJECT.KEYID = 7
14,371,182 UART: [afmc] AUTHORITY.KEYID = 5
16,914,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,381 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,168 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,246 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,798 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,197 UART: [afmc] --
18,714,025 UART: [cold-reset] --
18,718,001 UART: [state] Locking Datavault
18,721,464 UART: [state] Locking PCR0, PCR1 and PCR31
18,723,210 UART: [state] Locking ICCM
18,725,624 UART: [exit] Launching FMC @ 0x40000130
18,734,013 UART:
18,734,245 UART: Running Caliptra FMC ...
18,735,336 UART:
18,735,494 UART: [state] CFI Enabled
18,792,615 UART: [fht] FMC Alias Private Key: 7
20,559,184 UART: [art] Extend RT PCRs Done
20,560,435 UART: [art] Lock RT PCRs Done
20,561,795 UART: [art] Populate DV Done
20,567,306 UART: [fht] FMC Alias Private Key: 7
20,568,837 UART: [art] Derive CDI
20,569,646 UART: [art] Store in slot 0x4
20,624,889 UART: [art] Derive Key Pair
20,625,930 UART: [art] Store priv key in slot 0x5
23,088,746 UART: [art] Derive Key Pair - Done
23,101,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,814,103 UART: [art] Erasing AUTHORITY.KEYID = 7
24,815,602 UART: [art] PUB.X = 9696425CB3A50A2A593E3B6F6190A1C8E423242EA23D756CA7CF4E10241511EEC4CD5C5F5D2A1F30490E44F35806BEDE
24,822,927 UART: [art] PUB.Y = 3F19BD9D9015273180BA19220C6EA2CE118F24F827B954DA0C6E5BF7DCFAB53D2788103B1F920970DF2B6FC6C6DD80AC
24,830,169 UART: [art] SIG.R = 4301106B4A6FEF76A8D25624BFBE76C1B5FAD4531D2A1B4D3D913B2FA738674FD3086350C734A4297B6A7A4EA08BB5C2
24,837,568 UART: [art] SIG.S = 4C506F310FE3BBA58D45EEE84C46CAEF02DF55DA33BF7C37A5D51BA5C63220396E987ECD8132879D1250C0F3414D09C3
25,816,318 UART: Caliptra RT
25,817,012 UART: [state] CFI Enabled
25,997,297 UART: [rt] RT listening for mailbox commands...
26,028,971 UART: [rt]cmd =0x54514754, len=24
26,031,749 >>> mbox cmd response data (8 bytes)
26,032,272 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,062,232 UART: [rt]cmd =0x54514754, len=24
26,063,822 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,459,965 ready_for_fw is high
3,460,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,202,758 >>> mbox cmd response: success
14,204,475 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,488,907 UART:
18,489,284 UART: Running Caliptra FMC ...
18,490,386 UART:
18,490,542 UART: [state] CFI Enabled
18,560,020 UART: [fht] FMC Alias Private Key: 7
20,326,676 UART: [art] Extend RT PCRs Done
20,327,936 UART: [art] Lock RT PCRs Done
20,329,809 UART: [art] Populate DV Done
20,335,176 UART: [fht] FMC Alias Private Key: 7
20,336,837 UART: [art] Derive CDI
20,337,658 UART: [art] Store in slot 0x4
20,392,742 UART: [art] Derive Key Pair
20,393,807 UART: [art] Store priv key in slot 0x5
22,856,649 UART: [art] Derive Key Pair - Done
22,869,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,582,690 UART: [art] Erasing AUTHORITY.KEYID = 7
24,584,178 UART: [art] PUB.X = 12FF7905D0C481CC0828BC7B57A5CCE07F74FE9FF894C06461872A62C7C30D8CEA7E8F739648DDF92353417B0C870F7E
24,591,487 UART: [art] PUB.Y = EA9A847C796C3743D162C95C63428C7B3428C1BE473EBC1276B1F6A7D5F2CF1EF825F5CE1759ECB4B6C58A5AF412AF0A
24,598,745 UART: [art] SIG.R = 663C3692F49CD043E8C1E0299684749C9453EA8403E0ABC4BE22EE96EB9C3E0677D358742AE245967FAE12E455F92CF5
24,606,144 UART: [art] SIG.S = 71BB283949593311DB0891D436F2709392E8614544E8CFBA8D38F6F7346D5673DA9C73C86AA1F7787FA443D07D683C99
25,585,040 UART: Caliptra RT
25,585,768 UART: [state] CFI Enabled
25,766,284 UART: [rt] RT listening for mailbox commands...
25,797,974 UART: [rt]cmd =0x54514754, len=24
25,800,724 >>> mbox cmd response data (8 bytes)
25,801,241 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,831,157 UART: [rt]cmd =0x54514754, len=24
25,832,898 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,304 UART:
192,671 UART: Running Caliptra ROM ...
193,803 UART:
603,335 UART: [state] CFI Enabled
617,927 UART: [state] LifecycleState = Unprovisioned
619,875 UART: [state] DebugLocked = No
622,833 UART: [state] WD Timer not started. Device not locked for debugging
625,880 UART: [kat] SHA2-256
805,542 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,272 UART: [kat] ++
816,794 UART: [kat] sha1
827,824 UART: [kat] SHA2-256
830,520 UART: [kat] SHA2-384
835,452 UART: [kat] SHA2-512-ACC
837,827 UART: [kat] ECC-384
3,280,616 UART: [kat] HMAC-384Kdf
3,292,437 UART: [kat] LMS
3,768,920 UART: [kat] --
3,774,201 UART: [cold-reset] ++
3,775,800 UART: [fht] FHT @ 0x50003400
3,787,576 UART: [idev] ++
3,788,186 UART: [idev] CDI.KEYID = 6
3,789,184 UART: [idev] SUBJECT.KEYID = 7
3,790,368 UART: [idev] UDS.KEYID = 0
3,791,296 ready_for_fw is high
3,791,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,431 UART: [idev] Erasing UDS.KEYID = 0
6,266,069 UART: [idev] Sha1 KeyId Algorithm
6,289,907 UART: [idev] --
6,295,365 UART: [ldev] ++
6,295,994 UART: [ldev] CDI.KEYID = 6
6,297,059 UART: [ldev] SUBJECT.KEYID = 5
6,298,171 UART: [ldev] AUTHORITY.KEYID = 7
6,299,348 UART: [ldev] FE.KEYID = 1
6,311,025 UART: [ldev] Erasing FE.KEYID = 1
8,787,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,075 UART: [ldev] --
10,582,251 UART: [fwproc] Wait for Commands...
10,584,929 UART: [fwproc] Recv command 0x46574c44
10,586,976 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,782 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,837 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,425 >>> mbox cmd response: success
14,551,976 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,555,649 UART: [afmc] ++
14,556,227 UART: [afmc] CDI.KEYID = 6
14,557,265 UART: [afmc] SUBJECT.KEYID = 7
14,558,371 UART: [afmc] AUTHORITY.KEYID = 5
17,058,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,506 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,384 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,404 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,017 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,064 UART: [afmc] --
18,855,454 UART: [cold-reset] --
18,859,803 UART: [state] Locking Datavault
18,865,927 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,740 UART: [state] Locking ICCM
18,868,954 UART: [exit] Launching FMC @ 0x40000130
18,877,355 UART:
18,877,594 UART: Running Caliptra FMC ...
18,878,717 UART:
18,878,884 UART: [state] CFI Enabled
18,886,995 UART: [fht] FMC Alias Private Key: 7
20,653,000 UART: [art] Extend RT PCRs Done
20,654,224 UART: [art] Lock RT PCRs Done
20,655,902 UART: [art] Populate DV Done
20,661,355 UART: [fht] FMC Alias Private Key: 7
20,662,928 UART: [art] Derive CDI
20,663,695 UART: [art] Store in slot 0x4
20,706,349 UART: [art] Derive Key Pair
20,707,357 UART: [art] Store priv key in slot 0x5
23,134,046 UART: [art] Derive Key Pair - Done
23,147,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,085 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,584 UART: [art] PUB.X = 6709685B1ABA65E16788DFE6AF731A9E13B01AF53777BCC7C80157C5932705852C52B1F69185062BF731E441A1E730F7
24,861,879 UART: [art] PUB.Y = 6FF74FA5C9BDA02FE7E887A1A8316AAA26F6AC675F2BF60C89E114AC234E261C8DFD64CD3E8C8F0AE8627D5337F922A5
24,869,122 UART: [art] SIG.R = D3B69FD2E34D3F60C1501151D95DD56984D337D96CD473650BDE27BBE7E89665BF7AB11F2A410C61493974F0948A2704
24,876,511 UART: [art] SIG.S = 3260FAF5871854E48237101D7CFE4A5033352CBA544AD7FA7E10CC44E9BFC0F1099D836B93DF24F26F283F3B5D042914
25,855,739 UART: Caliptra RT
25,856,440 UART: [state] CFI Enabled
25,989,019 UART: [rt] RT listening for mailbox commands...
26,020,742 UART: [rt]cmd =0x54514754, len=24
26,023,198 >>> mbox cmd response data (8 bytes)
26,023,728 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,053,740 UART: [rt]cmd =0x54514754, len=24
26,055,502 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
3,777,857 ready_for_fw is high
3,778,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,474 >>> mbox cmd response: success
14,444,143 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,694,851 UART:
18,695,220 UART: Running Caliptra FMC ...
18,696,419 UART:
18,696,586 UART: [state] CFI Enabled
18,704,256 UART: [fht] FMC Alias Private Key: 7
20,470,130 UART: [art] Extend RT PCRs Done
20,471,354 UART: [art] Lock RT PCRs Done
20,472,821 UART: [art] Populate DV Done
20,478,183 UART: [fht] FMC Alias Private Key: 7
20,479,839 UART: [art] Derive CDI
20,480,659 UART: [art] Store in slot 0x4
20,523,391 UART: [art] Derive Key Pair
20,524,397 UART: [art] Store priv key in slot 0x5
22,951,133 UART: [art] Derive Key Pair - Done
22,963,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,882 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,383 UART: [art] PUB.X = 3804B9105F280FDF6F58C8931A4BD2806DDB662AD500C3B0A4196AD3CD1EBF196D26A00B4C4B179F47D6B9C32D0D37CB
24,678,696 UART: [art] PUB.Y = 446B965512A113132E67827D9FAA31DC3BBE3961E904DAB707CB0DB663EC3B7235B313B80EF3710AEC1559F054EE9D12
24,685,948 UART: [art] SIG.R = C8DE289440A69F6B0B56F253798B60DAE202DA2A77B3BEE339A793727637F02D4C14B00ED7E0EAE8234B2B41B9A90802
24,693,301 UART: [art] SIG.S = 3E5822D401D8CD685D0B78AD33AEA0494E420CE526CE71D297A19BBF5B15CD2A2498BF94E7057F045D54B192D67AE723
25,672,636 UART: Caliptra RT
25,673,338 UART: [state] CFI Enabled
25,806,759 UART: [rt] RT listening for mailbox commands...
25,838,427 UART: [rt]cmd =0x54514754, len=24
25,841,266 >>> mbox cmd response data (8 bytes)
25,841,675 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,871,572 UART: [rt]cmd =0x54514754, len=24
25,873,453 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,168 UART:
192,528 UART: Running Caliptra ROM ...
193,701 UART:
193,858 UART: [state] CFI Enabled
261,337 UART: [state] LifecycleState = Unprovisioned
263,722 UART: [state] DebugLocked = No
265,250 UART: [state] WD Timer not started. Device not locked for debugging
269,726 UART: [kat] SHA2-256
459,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,378 UART: [kat] ++
470,858 UART: [kat] sha1
482,259 UART: [kat] SHA2-256
485,263 UART: [kat] SHA2-384
491,461 UART: [kat] SHA2-512-ACC
494,037 UART: [kat] ECC-384
2,948,991 UART: [kat] HMAC-384Kdf
2,971,785 UART: [kat] LMS
3,503,598 UART: [kat] --
3,507,768 UART: [cold-reset] ++
3,509,061 UART: [fht] FHT @ 0x50003400
3,520,540 UART: [idev] ++
3,521,237 UART: [idev] CDI.KEYID = 6
3,522,191 UART: [idev] SUBJECT.KEYID = 7
3,523,433 UART: [idev] UDS.KEYID = 0
3,524,330 ready_for_fw is high
3,524,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,668 UART: [idev] Erasing UDS.KEYID = 0
6,026,502 UART: [idev] Sha1 KeyId Algorithm
6,048,550 UART: [idev] --
6,053,191 UART: [ldev] ++
6,053,868 UART: [ldev] CDI.KEYID = 6
6,054,752 UART: [ldev] SUBJECT.KEYID = 5
6,055,980 UART: [ldev] AUTHORITY.KEYID = 7
6,057,369 UART: [ldev] FE.KEYID = 1
6,101,466 UART: [ldev] Erasing FE.KEYID = 1
8,605,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,897 UART: [ldev] --
10,416,378 UART: [fwproc] Wait for Commands...
10,419,066 UART: [fwproc] Recv command 0x46574c44
10,421,372 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,979 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,592 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,063 >>> mbox cmd response: success
14,679,191 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,682,051 UART: [afmc] ++
14,682,763 UART: [afmc] CDI.KEYID = 6
14,683,948 UART: [afmc] SUBJECT.KEYID = 7
14,685,429 UART: [afmc] AUTHORITY.KEYID = 5
17,212,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,883 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,933 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,094 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,028 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,228 UART: [afmc] --
19,011,664 UART: [cold-reset] --
19,014,987 UART: [state] Locking Datavault
19,022,770 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,952 UART: [state] Locking ICCM
19,027,560 UART: [exit] Launching FMC @ 0x40000130
19,036,225 UART:
19,036,460 UART: Running Caliptra FMC ...
19,037,560 UART:
19,037,717 UART: [state] CFI Enabled
19,094,054 UART: [fht] FMC Alias Private Key: 7
20,859,806 UART: [art] Extend RT PCRs Done
20,861,029 UART: [art] Lock RT PCRs Done
20,862,794 UART: [art] Populate DV Done
20,867,988 UART: [fht] FMC Alias Private Key: 7
20,869,425 UART: [art] Derive CDI
20,870,186 UART: [art] Store in slot 0x4
20,926,704 UART: [art] Derive Key Pair
20,927,697 UART: [art] Store priv key in slot 0x5
23,390,973 UART: [art] Derive Key Pair - Done
23,404,235 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,363 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,873 UART: [art] PUB.X = 27A849A24BF236B221B4B2E8443F62D25FEC8A8EEDC325CE56A3AE74854E780111823E65F505885CBAAC092218456BB4
25,126,154 UART: [art] PUB.Y = 57C7CDB09EEF7D0E065E9C14A327E3AC8F05F0008219FC79A1C2B7FED46F9115ADC0CBE42F87D17E927BAEFCCF907F37
25,133,415 UART: [art] SIG.R = 413D1C3B48D5C9119C44335254FCD17C7ACD283A2F5DED18F12543FC009B5915755887EB659A47FB181145C2E3AA01B8
25,140,770 UART: [art] SIG.S = 043EE70EAF237E1E96B2A9D2F7FCF74697C4213809F6F2D47FB2918620265F8A9ED741328221B4FD544017258284889A
26,119,949 UART: Caliptra RT
26,120,659 UART: [state] CFI Enabled
26,301,427 UART: [rt] RT listening for mailbox commands...
26,333,064 UART: [rt]cmd =0x54514754, len=24
26,335,816 >>> mbox cmd response data (8 bytes)
26,336,309 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,366,244 UART: [rt]cmd =0x54514754, len=24
26,368,051 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,438,066 ready_for_fw is high
3,438,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,148 >>> mbox cmd response: success
14,826,510 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,110,981 UART:
19,111,364 UART: Running Caliptra FMC ...
19,112,552 UART:
19,112,717 UART: [state] CFI Enabled
19,180,771 UART: [fht] FMC Alias Private Key: 7
20,947,984 UART: [art] Extend RT PCRs Done
20,949,203 UART: [art] Lock RT PCRs Done
20,950,886 UART: [art] Populate DV Done
20,956,252 UART: [fht] FMC Alias Private Key: 7
20,957,725 UART: [art] Derive CDI
20,958,496 UART: [art] Store in slot 0x4
21,014,113 UART: [art] Derive Key Pair
21,015,120 UART: [art] Store priv key in slot 0x5
23,477,742 UART: [art] Derive Key Pair - Done
23,490,813 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,511 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,024 UART: [art] PUB.X = DEC4E3642B9B71936FF364D3527770B6B3001B93926B7BD62F61DE5B130973B7E3021943A418CC9BE845BC7B18694190
25,213,233 UART: [art] PUB.Y = D85BC876C47E2B6F11DF91909333D8671946D3DBD134E16CB1DE7D2FE61D617A09E2C87B5F5FAE9D5ECA7CBC660DB4C8
25,220,491 UART: [art] SIG.R = C6FE080A5EA07BE5A3CBC47840280817418425D3EA2DBF8881236E8C5771127A059F60AB396CD088919BEF49FEF0F168
25,227,890 UART: [art] SIG.S = 1568F296FDEBE942648F73C9975D1420D7B92C179797CEF54BB95A946AF32473763A797E756845F97804CF86417A928F
26,206,702 UART: Caliptra RT
26,207,392 UART: [state] CFI Enabled
26,387,807 UART: [rt] RT listening for mailbox commands...
26,419,196 UART: [rt]cmd =0x54514754, len=24
26,422,131 >>> mbox cmd response data (8 bytes)
26,422,630 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,452,474 UART: [rt]cmd =0x54514754, len=24
26,454,438 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,470 UART:
192,841 UART: Running Caliptra ROM ...
194,059 UART:
603,709 UART: [state] CFI Enabled
617,492 UART: [state] LifecycleState = Unprovisioned
619,912 UART: [state] DebugLocked = No
622,503 UART: [state] WD Timer not started. Device not locked for debugging
626,845 UART: [kat] SHA2-256
816,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,544 UART: [kat] ++
828,071 UART: [kat] sha1
839,663 UART: [kat] SHA2-256
842,682 UART: [kat] SHA2-384
849,116 UART: [kat] SHA2-512-ACC
851,665 UART: [kat] ECC-384
3,293,818 UART: [kat] HMAC-384Kdf
3,307,109 UART: [kat] LMS
3,838,914 UART: [kat] --
3,841,725 UART: [cold-reset] ++
3,843,805 UART: [fht] FHT @ 0x50003400
3,855,207 UART: [idev] ++
3,855,916 UART: [idev] CDI.KEYID = 6
3,856,837 UART: [idev] SUBJECT.KEYID = 7
3,858,081 UART: [idev] UDS.KEYID = 0
3,859,015 ready_for_fw is high
3,859,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,161 UART: [idev] Erasing UDS.KEYID = 0
6,334,025 UART: [idev] Sha1 KeyId Algorithm
6,356,340 UART: [idev] --
6,360,608 UART: [ldev] ++
6,361,293 UART: [ldev] CDI.KEYID = 6
6,362,209 UART: [ldev] SUBJECT.KEYID = 5
6,363,365 UART: [ldev] AUTHORITY.KEYID = 7
6,364,595 UART: [ldev] FE.KEYID = 1
6,375,924 UART: [ldev] Erasing FE.KEYID = 1
8,850,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,969 UART: [ldev] --
10,644,050 UART: [fwproc] Wait for Commands...
10,645,931 UART: [fwproc] Recv command 0x46574c44
10,648,189 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,603 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,211 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,023 >>> mbox cmd response: success
14,906,131 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,908,512 UART: [afmc] ++
14,909,228 UART: [afmc] CDI.KEYID = 6
14,910,483 UART: [afmc] SUBJECT.KEYID = 7
14,911,936 UART: [afmc] AUTHORITY.KEYID = 5
17,416,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,600 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,558 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,655 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,797 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,717 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,366 UART: [afmc] --
19,212,747 UART: [cold-reset] --
19,216,833 UART: [state] Locking Datavault
19,219,767 UART: [state] Locking PCR0, PCR1 and PCR31
19,221,970 UART: [state] Locking ICCM
19,223,802 UART: [exit] Launching FMC @ 0x40000130
19,232,484 UART:
19,232,750 UART: Running Caliptra FMC ...
19,233,859 UART:
19,234,028 UART: [state] CFI Enabled
19,242,056 UART: [fht] FMC Alias Private Key: 7
21,008,691 UART: [art] Extend RT PCRs Done
21,009,910 UART: [art] Lock RT PCRs Done
21,011,467 UART: [art] Populate DV Done
21,016,831 UART: [fht] FMC Alias Private Key: 7
21,018,538 UART: [art] Derive CDI
21,019,281 UART: [art] Store in slot 0x4
21,062,201 UART: [art] Derive Key Pair
21,063,208 UART: [art] Store priv key in slot 0x5
23,489,898 UART: [art] Derive Key Pair - Done
23,502,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,208,919 UART: [art] Erasing AUTHORITY.KEYID = 7
25,210,416 UART: [art] PUB.X = A8775BE805146E826419E72390C71620D1C60279E4741B8B4F9E3BE30065D402E7C59ED4AB408A77E388BEB405EB246A
25,217,699 UART: [art] PUB.Y = 8927BE2DD42140FA486F28A78E1904BAEB1B9721118DEED690DE1DB0AE655BCB6837EE90D6EA13AE0C9B70B65A16BD32
25,224,948 UART: [art] SIG.R = 20DFAE107C1406D89CC0F01EC301E612F64DFB1EFB074D1787B8B501F7535113D34807EA5002730FAA14BB4BA0FC1EF9
25,232,363 UART: [art] SIG.S = FC599C6AAD66CEE1C42DB7783BE2B65DB4F62C6A9D583242C1548AB4AE7ACA3EEE4D8D9480344C21E53814985C6808ED
26,211,682 UART: Caliptra RT
26,212,390 UART: [state] CFI Enabled
26,344,630 UART: [rt] RT listening for mailbox commands...
26,376,518 UART: [rt]cmd =0x54514754, len=24
26,379,190 >>> mbox cmd response data (8 bytes)
26,379,740 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,409,501 UART: [rt]cmd =0x54514754, len=24
26,411,151 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,757,089 ready_for_fw is high
3,757,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,055,838 >>> mbox cmd response: success
15,057,306 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,309,126 UART:
19,309,510 UART: Running Caliptra FMC ...
19,310,709 UART:
19,310,924 UART: [state] CFI Enabled
19,318,940 UART: [fht] FMC Alias Private Key: 7
21,084,893 UART: [art] Extend RT PCRs Done
21,086,118 UART: [art] Lock RT PCRs Done
21,087,546 UART: [art] Populate DV Done
21,092,867 UART: [fht] FMC Alias Private Key: 7
21,094,578 UART: [art] Derive CDI
21,095,400 UART: [art] Store in slot 0x4
21,138,313 UART: [art] Derive Key Pair
21,139,351 UART: [art] Store priv key in slot 0x5
23,566,248 UART: [art] Derive Key Pair - Done
23,579,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,285,840 UART: [art] Erasing AUTHORITY.KEYID = 7
25,287,352 UART: [art] PUB.X = CCC5D5D86F3EC6C3129DC92999E2B2DBCC68FD1632303B4592318EE6AC4C03C052C53A0C09C2156D6AC2C1852A7737C8
25,294,608 UART: [art] PUB.Y = DC4ADF7FA9FB9ADD38608A36A09812F17D57B0B98A7CB2551345DC4585B066ADD60DDD1FDC6FDAAEFA0482522B7C2623
25,301,877 UART: [art] SIG.R = D7B5AEFF6D7A8AB23D83CA240C6C19010659F4A1FB36B2D215069FC8599B724785A632E3A325F4E69504D938FAD1931F
25,309,296 UART: [art] SIG.S = 8869B8B7C7A3AFD061792D71B98E7F6057E2D137BD87E0A06A6FFA7B8C57DFE1BA76275898A46B4E621062C3F31FBDF7
26,287,892 UART: Caliptra RT
26,288,582 UART: [state] CFI Enabled
26,420,782 UART: [rt] RT listening for mailbox commands...
26,452,095 UART: [rt]cmd =0x54514754, len=24
26,454,587 >>> mbox cmd response data (8 bytes)
26,455,113 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,485,165 UART: [rt]cmd =0x54514754, len=24
26,486,749 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,871 UART: [kat] SHA2-256
881,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,917 UART: [kat] ++
886,069 UART: [kat] sha1
890,323 UART: [kat] SHA2-256
892,261 UART: [kat] SHA2-384
895,074 UART: [kat] SHA2-512-ACC
896,975 UART: [kat] ECC-384
902,356 UART: [kat] HMAC-384Kdf
907,032 UART: [kat] LMS
1,475,228 UART: [kat] --
1,476,165 UART: [cold-reset] ++
1,476,515 UART: [fht] Storing FHT @ 0x50003400
1,479,264 UART: [idev] ++
1,479,432 UART: [idev] CDI.KEYID = 6
1,479,792 UART: [idev] SUBJECT.KEYID = 7
1,480,216 UART: [idev] UDS.KEYID = 0
1,480,561 ready_for_fw is high
1,480,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,362 UART: [idev] Erasing UDS.KEYID = 0
1,504,478 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,302 UART: [idev] --
1,514,423 UART: [ldev] ++
1,514,591 UART: [ldev] CDI.KEYID = 6
1,514,954 UART: [ldev] SUBJECT.KEYID = 5
1,515,380 UART: [ldev] AUTHORITY.KEYID = 7
1,515,843 UART: [ldev] FE.KEYID = 1
1,521,191 UART: [ldev] Erasing FE.KEYID = 1
1,546,294 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,726 UART: [ldev] --
1,585,081 UART: [fwproc] Waiting for Commands...
1,585,928 UART: [fwproc] Received command 0x46574c44
1,586,719 UART: [fwproc] Received Image of size 118548 bytes
2,930,849 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,339 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,557 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,764 >>> mbox cmd response: success
3,128,764 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,129,946 UART: [afmc] ++
3,130,114 UART: [afmc] CDI.KEYID = 6
3,130,476 UART: [afmc] SUBJECT.KEYID = 7
3,130,901 UART: [afmc] AUTHORITY.KEYID = 5
3,165,718 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,181,992 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,182,772 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,481 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,364 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,047 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,207,887 UART: [afmc] --
3,208,803 UART: [cold-reset] --
3,209,753 UART: [state] Locking Datavault
3,210,946 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,550 UART: [state] Locking ICCM
3,212,130 UART: [exit] Launching FMC @ 0x40000130
3,217,460 UART:
3,217,476 UART: Running Caliptra FMC ...
3,217,884 UART:
3,217,938 UART: [state] CFI Enabled
3,228,558 UART: [fht] FMC Alias Private Key: 7
3,347,030 UART: [art] Extend RT PCRs Done
3,347,458 UART: [art] Lock RT PCRs Done
3,349,024 UART: [art] Populate DV Done
3,357,273 UART: [fht] FMC Alias Private Key: 7
3,358,201 UART: [art] Derive CDI
3,358,481 UART: [art] Store in slot 0x4
3,444,067 UART: [art] Derive Key Pair
3,444,427 UART: [art] Store priv key in slot 0x5
3,457,652 UART: [art] Derive Key Pair - Done
3,472,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,487,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,724 UART: [art] PUB.X = D0BA34A888E82CE15561A58A046B93E313068F760EB2960A57447C4C0576798FBCD20DDB182FE1EDB1BF7247626D233E
3,495,480 UART: [art] PUB.Y = 4076859EBCD163AE725865440F39A250AC6D84AD00C943FC81A4D03C1AF0F9FF0BE8F2564C8AB33EAD4C086394F08F53
3,502,409 UART: [art] SIG.R = 4F56BE76F36E91B1ACCC0E81EF8C85147119C6609DFC30564C3145CBC7CD54F034858FDE91373E14E1CA5854442D1958
3,509,180 UART: [art] SIG.S = E94377EEFE5448771BE93314BCE59B11A67D0C4BEC951A12E387D547CECDA7AECEF2DC13990BCD50FF9F3775062DAE72
3,532,857 UART: Caliptra RT
3,533,108 UART: [state] CFI Enabled
3,653,378 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,220 UART: [rt]cmd =0x54514754, len=24
3,686,491 >>> mbox cmd response data (8 bytes)
3,686,492 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,716,045 UART: [rt]cmd =0x54514754, len=24
3,717,761 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,587 ready_for_fw is high
1,362,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,042 >>> mbox cmd response: success
2,981,042 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,042,537 UART:
3,042,553 UART: Running Caliptra FMC ...
3,042,961 UART:
3,043,015 UART: [state] CFI Enabled
3,054,029 UART: [fht] FMC Alias Private Key: 7
3,173,243 UART: [art] Extend RT PCRs Done
3,173,671 UART: [art] Lock RT PCRs Done
3,174,951 UART: [art] Populate DV Done
3,182,920 UART: [fht] FMC Alias Private Key: 7
3,183,924 UART: [art] Derive CDI
3,184,204 UART: [art] Store in slot 0x4
3,270,116 UART: [art] Derive Key Pair
3,270,476 UART: [art] Store priv key in slot 0x5
3,283,267 UART: [art] Derive Key Pair - Done
3,297,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,272 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,037 UART: [art] PUB.X = 469FA43D67D47127984B5E7FB980EB0E63DC834736819310E49BF5BDD1DB22E9621DD4AD4CCF656B1077A36D21AA560A
3,320,809 UART: [art] PUB.Y = 94DA0092DBF6CAF3F76BF46CE712769BC366B776075F7F81F14D9B664ABFB5FA7FE49656F511345121EAB0D9631FAA73
3,327,746 UART: [art] SIG.R = CDC089FE7B68A0966710F890D3FBED15607E230FE1FB6F03CF1805B0F5923D79F56F366F2E5182A1C90CCFEE8C3104D4
3,334,513 UART: [art] SIG.S = FDF7F121897607F73D3FA6A3CA2781E3DB8C086936182AE9CA915DAAF55FDA536F6E768E5F5E4C9BDD40063469F08AD6
3,358,152 UART: Caliptra RT
3,358,403 UART: [state] CFI Enabled
3,478,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,954 UART: [rt]cmd =0x54514754, len=24
3,511,013 >>> mbox cmd response data (8 bytes)
3,511,014 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,519 UART: [rt]cmd =0x54514754, len=24
3,542,093 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,420 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,902 UART: [kat] SHA2-256
881,833 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,948 UART: [kat] ++
886,100 UART: [kat] sha1
890,400 UART: [kat] SHA2-256
892,338 UART: [kat] SHA2-384
895,213 UART: [kat] SHA2-512-ACC
897,114 UART: [kat] ECC-384
902,763 UART: [kat] HMAC-384Kdf
907,311 UART: [kat] LMS
1,475,507 UART: [kat] --
1,476,304 UART: [cold-reset] ++
1,476,704 UART: [fht] Storing FHT @ 0x50003400
1,479,551 UART: [idev] ++
1,479,719 UART: [idev] CDI.KEYID = 6
1,480,079 UART: [idev] SUBJECT.KEYID = 7
1,480,503 UART: [idev] UDS.KEYID = 0
1,480,848 ready_for_fw is high
1,480,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,137 UART: [idev] Erasing UDS.KEYID = 0
1,504,893 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,397 UART: [idev] --
1,514,476 UART: [ldev] ++
1,514,644 UART: [ldev] CDI.KEYID = 6
1,515,007 UART: [ldev] SUBJECT.KEYID = 5
1,515,433 UART: [ldev] AUTHORITY.KEYID = 7
1,515,896 UART: [ldev] FE.KEYID = 1
1,521,158 UART: [ldev] Erasing FE.KEYID = 1
1,546,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,655 UART: [ldev] --
1,585,958 UART: [fwproc] Waiting for Commands...
1,586,783 UART: [fwproc] Received command 0x46574c44
1,587,574 UART: [fwproc] Received Image of size 118548 bytes
2,933,240 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,088 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,306 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,597 >>> mbox cmd response: success
3,131,597 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,132,741 UART: [afmc] ++
3,132,909 UART: [afmc] CDI.KEYID = 6
3,133,271 UART: [afmc] SUBJECT.KEYID = 7
3,133,696 UART: [afmc] AUTHORITY.KEYID = 5
3,169,275 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,297 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,077 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,786 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,669 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,352 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,336 UART: [afmc] --
3,212,332 UART: [cold-reset] --
3,213,262 UART: [state] Locking Datavault
3,214,443 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,047 UART: [state] Locking ICCM
3,215,525 UART: [exit] Launching FMC @ 0x40000130
3,220,855 UART:
3,220,871 UART: Running Caliptra FMC ...
3,221,279 UART:
3,221,422 UART: [state] CFI Enabled
3,232,286 UART: [fht] FMC Alias Private Key: 7
3,350,822 UART: [art] Extend RT PCRs Done
3,351,250 UART: [art] Lock RT PCRs Done
3,352,940 UART: [art] Populate DV Done
3,361,293 UART: [fht] FMC Alias Private Key: 7
3,362,463 UART: [art] Derive CDI
3,362,743 UART: [art] Store in slot 0x4
3,448,317 UART: [art] Derive Key Pair
3,448,677 UART: [art] Store priv key in slot 0x5
3,461,784 UART: [art] Derive Key Pair - Done
3,476,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,601 UART: [art] PUB.X = A5061AE2B74DB8DBEBBB5C045E80AC7EC9027AABFDDD2385267E4817E58030C3289E03B73D0571D49F879D36DCA60FE8
3,499,369 UART: [art] PUB.Y = 8F6C68A27CA90DEF0B9A57D9E33E64ED4627D2736DF2DCD946F2636CAC5B564A7E128BA965DA4730B48679D5B8F7A33F
3,506,327 UART: [art] SIG.R = BE8580E3304AF175736B5B0BDE92C6918C70D4BE08F4EF26DEF5A3258F93A02C0E9490832D527C0C1220FF5304D1DD5D
3,513,090 UART: [art] SIG.S = 6073DA443CDD22A7FB17826B5C2D1824E29D59BCE22BAF9E16431DF2D4AE2F0EE103D6C1D8B4AE4956203018F5C20576
3,536,723 UART: Caliptra RT
3,537,066 UART: [state] CFI Enabled
3,656,826 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,374 UART: [rt]cmd =0x54514754, len=24
3,689,655 >>> mbox cmd response data (8 bytes)
3,689,656 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,065 UART: [rt]cmd =0x54514754, len=24
3,720,539 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,360 ready_for_fw is high
1,362,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,637 >>> mbox cmd response: success
2,982,637 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,044,812 UART:
3,044,828 UART: Running Caliptra FMC ...
3,045,236 UART:
3,045,379 UART: [state] CFI Enabled
3,055,977 UART: [fht] FMC Alias Private Key: 7
3,174,891 UART: [art] Extend RT PCRs Done
3,175,319 UART: [art] Lock RT PCRs Done
3,176,845 UART: [art] Populate DV Done
3,185,234 UART: [fht] FMC Alias Private Key: 7
3,186,272 UART: [art] Derive CDI
3,186,552 UART: [art] Store in slot 0x4
3,272,298 UART: [art] Derive Key Pair
3,272,658 UART: [art] Store priv key in slot 0x5
3,285,865 UART: [art] Derive Key Pair - Done
3,300,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,387 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,152 UART: [art] PUB.X = 960D89327D1218768413D2191CCA26FF8CA1E77AF99ED4EDD0832EFF1450A1CE1571C5BCEEF16BED8FF76A3300C3D3E9
3,323,913 UART: [art] PUB.Y = DF014F7C1DC92C849676D1504771F7CC8EE869A1801A8A4CA691668520120428A46A25C2ECB14B7082BA6EC778087A9D
3,330,854 UART: [art] SIG.R = F7A82ACA0ED325CC80FA76560D677E9F2BEA1FD62589FF14FE7B6C0D11216EA0E2D1ED6555BCB095A18D7CBF84084E95
3,337,632 UART: [art] SIG.S = B84E5CBB92F89717D8DB2425DB4CE61DDF444BDA373565E6AD436A45868202194292B0DB93C1F83DE09283EAECE67912
3,361,453 UART: Caliptra RT
3,361,796 UART: [state] CFI Enabled
3,482,275 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,947 UART: [rt]cmd =0x54514754, len=24
3,515,184 >>> mbox cmd response data (8 bytes)
3,515,185 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,544,390 UART: [rt]cmd =0x54514754, len=24
3,545,776 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,402 UART: [kat] ++
895,554 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,809 UART: [kat] LMS
1,169,121 UART: [kat] --
1,169,666 UART: [cold-reset] ++
1,170,158 UART: [fht] FHT @ 0x50003400
1,173,002 UART: [idev] ++
1,173,170 UART: [idev] CDI.KEYID = 6
1,173,531 UART: [idev] SUBJECT.KEYID = 7
1,173,956 UART: [idev] UDS.KEYID = 0
1,174,302 ready_for_fw is high
1,174,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,629 UART: [idev] Erasing UDS.KEYID = 0
1,198,791 UART: [idev] Sha1 KeyId Algorithm
1,207,733 UART: [idev] --
1,208,688 UART: [ldev] ++
1,208,856 UART: [ldev] CDI.KEYID = 6
1,209,220 UART: [ldev] SUBJECT.KEYID = 5
1,209,647 UART: [ldev] AUTHORITY.KEYID = 7
1,210,110 UART: [ldev] FE.KEYID = 1
1,215,060 UART: [ldev] Erasing FE.KEYID = 1
1,241,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,396 UART: [ldev] --
1,280,647 UART: [fwproc] Wait for Commands...
1,281,364 UART: [fwproc] Recv command 0x46574c44
1,282,097 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,959 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,134 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,383 >>> mbox cmd response: success
2,825,383 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,826,561 UART: [afmc] ++
2,826,729 UART: [afmc] CDI.KEYID = 6
2,827,092 UART: [afmc] SUBJECT.KEYID = 7
2,827,518 UART: [afmc] AUTHORITY.KEYID = 5
2,863,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,933 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,643 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,524 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,225 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,006 UART: [afmc] --
2,906,945 UART: [cold-reset] --
2,907,735 UART: [state] Locking Datavault
2,909,038 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,642 UART: [state] Locking ICCM
2,910,216 UART: [exit] Launching FMC @ 0x40000130
2,915,546 UART:
2,915,562 UART: Running Caliptra FMC ...
2,915,970 UART:
2,916,024 UART: [state] CFI Enabled
2,926,252 UART: [fht] FMC Alias Private Key: 7
3,044,418 UART: [art] Extend RT PCRs Done
3,044,846 UART: [art] Lock RT PCRs Done
3,046,222 UART: [art] Populate DV Done
3,054,459 UART: [fht] FMC Alias Private Key: 7
3,055,605 UART: [art] Derive CDI
3,055,885 UART: [art] Store in slot 0x4
3,141,410 UART: [art] Derive Key Pair
3,141,770 UART: [art] Store priv key in slot 0x5
3,155,390 UART: [art] Derive Key Pair - Done
3,170,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,093 UART: [art] PUB.X = 036BE29780043B5DE0365C61247FE262D2343D78AE0BC13B7599301293EFE53C35D348CF1399003B448764307F2EFA7B
3,192,826 UART: [art] PUB.Y = 25361AB07450119BB618639A138C588B26E3EF5316E6ED6FF2E9D9100A770B7CB4E558E5B10324B5C55D92AD37B07249
3,199,765 UART: [art] SIG.R = FD958BFAE4D86DD281600D63182A967910E01C270D851B33DB75DDF46B0DC0B8AA8FC60121302C938A41F35465D185C2
3,206,527 UART: [art] SIG.S = F9DC7BF7285720878E630162E0E30B06990E1FBFD30B49A03016EE2330CFB527DA6601CDCA7B26D8DE12D22CEB7D672D
3,230,049 UART: Caliptra RT
3,230,300 UART: [state] CFI Enabled
3,349,612 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,294 UART: [rt]cmd =0x54514754, len=24
3,382,471 >>> mbox cmd response data (8 bytes)
3,382,472 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,051 UART: [rt]cmd =0x54514754, len=24
3,413,333 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,948 ready_for_fw is high
1,058,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,642 >>> mbox cmd response: success
2,679,642 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,487 UART:
2,741,503 UART: Running Caliptra FMC ...
2,741,911 UART:
2,741,965 UART: [state] CFI Enabled
2,752,549 UART: [fht] FMC Alias Private Key: 7
2,871,685 UART: [art] Extend RT PCRs Done
2,872,113 UART: [art] Lock RT PCRs Done
2,873,805 UART: [art] Populate DV Done
2,882,284 UART: [fht] FMC Alias Private Key: 7
2,883,454 UART: [art] Derive CDI
2,883,734 UART: [art] Store in slot 0x4
2,969,647 UART: [art] Derive Key Pair
2,970,007 UART: [art] Store priv key in slot 0x5
2,983,381 UART: [art] Derive Key Pair - Done
2,998,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,666 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,431 UART: [art] PUB.X = 66026A57B057EAAF6B4E9B85101F88918659681DE05EE46911DF5EA6D4871D56FB56B454E3E66E0FED533598E89EB549
3,021,197 UART: [art] PUB.Y = 5DF70CD6665DECFC51C0026778BCCB43F5D15CB9CE6559C3EFDAE2EBCB9C3E3E01CC78B7CF75A38E0BE7387B14C1FA1B
3,028,167 UART: [art] SIG.R = E8D83602EB03B2E81A116A4C504E19C14B85742E71F8F266E997FCD26016A3092596677003518E83062405A1B2443306
3,034,900 UART: [art] SIG.S = D1311E260F93C0FEE31162F85A5402C98F8298ACFCF078192A5A869322CBD409EB6D524614F3CF1E097AB5C930C4D221
3,058,264 UART: Caliptra RT
3,058,515 UART: [state] CFI Enabled
3,177,555 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,061 UART: [rt]cmd =0x54514754, len=24
3,210,284 >>> mbox cmd response data (8 bytes)
3,210,285 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,682 UART: [rt]cmd =0x54514754, len=24
3,240,890 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
891,267 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,594 UART: [kat] HMAC-384Kdf
921,212 UART: [kat] LMS
1,169,524 UART: [kat] --
1,170,549 UART: [cold-reset] ++
1,171,055 UART: [fht] FHT @ 0x50003400
1,173,695 UART: [idev] ++
1,173,863 UART: [idev] CDI.KEYID = 6
1,174,224 UART: [idev] SUBJECT.KEYID = 7
1,174,649 UART: [idev] UDS.KEYID = 0
1,174,995 ready_for_fw is high
1,174,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,752 UART: [idev] Erasing UDS.KEYID = 0
1,200,498 UART: [idev] Sha1 KeyId Algorithm
1,209,442 UART: [idev] --
1,210,345 UART: [ldev] ++
1,210,513 UART: [ldev] CDI.KEYID = 6
1,210,877 UART: [ldev] SUBJECT.KEYID = 5
1,211,304 UART: [ldev] AUTHORITY.KEYID = 7
1,211,767 UART: [ldev] FE.KEYID = 1
1,217,095 UART: [ldev] Erasing FE.KEYID = 1
1,243,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,299 UART: [ldev] --
1,282,744 UART: [fwproc] Wait for Commands...
1,283,497 UART: [fwproc] Recv command 0x46574c44
1,284,230 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,972 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,147 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,482 >>> mbox cmd response: success
2,827,482 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,504 UART: [afmc] ++
2,828,672 UART: [afmc] CDI.KEYID = 6
2,829,035 UART: [afmc] SUBJECT.KEYID = 7
2,829,461 UART: [afmc] AUTHORITY.KEYID = 5
2,865,416 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,724 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,434 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,315 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,016 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,787 UART: [afmc] --
2,908,720 UART: [cold-reset] --
2,909,792 UART: [state] Locking Datavault
2,910,953 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,557 UART: [state] Locking ICCM
2,912,177 UART: [exit] Launching FMC @ 0x40000130
2,917,507 UART:
2,917,523 UART: Running Caliptra FMC ...
2,917,931 UART:
2,918,074 UART: [state] CFI Enabled
2,928,640 UART: [fht] FMC Alias Private Key: 7
3,047,528 UART: [art] Extend RT PCRs Done
3,047,956 UART: [art] Lock RT PCRs Done
3,049,168 UART: [art] Populate DV Done
3,057,351 UART: [fht] FMC Alias Private Key: 7
3,058,401 UART: [art] Derive CDI
3,058,681 UART: [art] Store in slot 0x4
3,144,498 UART: [art] Derive Key Pair
3,144,858 UART: [art] Store priv key in slot 0x5
3,158,538 UART: [art] Derive Key Pair - Done
3,173,259 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,483 UART: [art] PUB.X = 848DDC4517DE37B9E13F19F3243E1868EC5DD51F232C93A9F93B4E32956A30F93305634126D696524DA3B1D9AE4506F0
3,196,245 UART: [art] PUB.Y = A596B08F23B6862F60519191190DAC85DA040B272014965396D28D96690426DBCBF918F806FC02B0D87E762E45CCC774
3,203,171 UART: [art] SIG.R = A45F95F40BD2CDDAD55598F22EE08B40EE1605C31DA39F06AAAB3DAD666B2030D450C84F1BAB85BAAF5904B048CDA0E1
3,209,953 UART: [art] SIG.S = C1ED76C78145BB6612B424428D45086F4C9331FD2454835510A9686D6A0BA4129ED0F797CFBA51D6D2EE6CFAA5AA0234
3,233,986 UART: Caliptra RT
3,234,329 UART: [state] CFI Enabled
3,354,079 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,765 UART: [rt]cmd =0x54514754, len=24
3,387,024 >>> mbox cmd response data (8 bytes)
3,387,025 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,668 UART: [rt]cmd =0x54514754, len=24
3,418,100 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,165 ready_for_fw is high
1,059,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,593 >>> mbox cmd response: success
2,680,593 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,743,774 UART:
2,743,790 UART: Running Caliptra FMC ...
2,744,198 UART:
2,744,341 UART: [state] CFI Enabled
2,754,619 UART: [fht] FMC Alias Private Key: 7
2,873,987 UART: [art] Extend RT PCRs Done
2,874,415 UART: [art] Lock RT PCRs Done
2,876,055 UART: [art] Populate DV Done
2,883,942 UART: [fht] FMC Alias Private Key: 7
2,884,870 UART: [art] Derive CDI
2,885,150 UART: [art] Store in slot 0x4
2,970,651 UART: [art] Derive Key Pair
2,971,011 UART: [art] Store priv key in slot 0x5
2,984,493 UART: [art] Derive Key Pair - Done
2,999,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,202 UART: [art] PUB.X = BB36D5601E5C20FEF8760910F7B18EF19BAFEAD19714C2C88FC5304733380BBFD8F50109F828FED589D34E07DF5A2BDC
3,021,973 UART: [art] PUB.Y = C6305A68C96F5A2DD7B49C770DDA7997D8F999E60FFDFCD9B1C3B7F7ADA8B4CC259D7AD664A7F7192E8B2B98934C5921
3,028,935 UART: [art] SIG.R = 6685A3940BE05FC9D219C54A5E35324C5446795089334A641A9012229A2382A9BF34F4CACEBAA2D08C6E18BF4CE1D6E2
3,035,706 UART: [art] SIG.S = D9E82EDEE9BF6B9DC6A72F4EE67E2985CC86FC9852913B54DA820669ED5E357CA332E972B24040A371EC40A4691D034D
3,059,532 UART: Caliptra RT
3,059,875 UART: [state] CFI Enabled
3,178,650 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,236 UART: [rt]cmd =0x54514754, len=24
3,211,477 >>> mbox cmd response data (8 bytes)
3,211,478 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,911 UART: [rt]cmd =0x54514754, len=24
3,242,261 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,594 UART: [state] LifecycleState = Unprovisioned
85,249 UART: [state] DebugLocked = No
85,897 UART: [state] WD Timer not started. Device not locked for debugging
87,102 UART: [kat] SHA2-256
892,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,877 UART: [kat] ++
897,029 UART: [kat] sha1
901,289 UART: [kat] SHA2-256
903,229 UART: [kat] SHA2-384
905,952 UART: [kat] SHA2-512-ACC
907,853 UART: [kat] ECC-384
917,560 UART: [kat] HMAC-384Kdf
922,162 UART: [kat] LMS
1,170,490 UART: [kat] --
1,171,363 UART: [cold-reset] ++
1,171,689 UART: [fht] FHT @ 0x50003400
1,174,374 UART: [idev] ++
1,174,542 UART: [idev] CDI.KEYID = 6
1,174,902 UART: [idev] SUBJECT.KEYID = 7
1,175,326 UART: [idev] UDS.KEYID = 0
1,175,671 ready_for_fw is high
1,175,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,108 UART: [idev] Erasing UDS.KEYID = 0
1,199,969 UART: [idev] Sha1 KeyId Algorithm
1,208,637 UART: [idev] --
1,209,565 UART: [ldev] ++
1,209,733 UART: [ldev] CDI.KEYID = 6
1,210,096 UART: [ldev] SUBJECT.KEYID = 5
1,210,522 UART: [ldev] AUTHORITY.KEYID = 7
1,210,985 UART: [ldev] FE.KEYID = 1
1,216,057 UART: [ldev] Erasing FE.KEYID = 1
1,242,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,159 UART: [ldev] --
1,281,448 UART: [fwproc] Wait for Commands...
1,282,258 UART: [fwproc] Recv command 0x46574c44
1,282,986 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,398 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,568 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,903 >>> mbox cmd response: success
2,826,903 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,127 UART: [afmc] ++
2,828,295 UART: [afmc] CDI.KEYID = 6
2,828,657 UART: [afmc] SUBJECT.KEYID = 7
2,829,082 UART: [afmc] AUTHORITY.KEYID = 5
2,864,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,812 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,521 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,404 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,105 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,961 UART: [afmc] --
2,907,933 UART: [cold-reset] --
2,908,891 UART: [state] Locking Datavault
2,909,984 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,588 UART: [state] Locking ICCM
2,911,226 UART: [exit] Launching FMC @ 0x40000130
2,916,556 UART:
2,916,572 UART: Running Caliptra FMC ...
2,916,980 UART:
2,917,034 UART: [state] CFI Enabled
2,927,464 UART: [fht] FMC Alias Private Key: 7
3,046,372 UART: [art] Extend RT PCRs Done
3,046,800 UART: [art] Lock RT PCRs Done
3,048,338 UART: [art] Populate DV Done
3,056,673 UART: [fht] FMC Alias Private Key: 7
3,057,623 UART: [art] Derive CDI
3,057,903 UART: [art] Store in slot 0x4
3,143,704 UART: [art] Derive Key Pair
3,144,064 UART: [art] Store priv key in slot 0x5
3,156,936 UART: [art] Derive Key Pair - Done
3,171,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,023 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,788 UART: [art] PUB.X = A84FBEFD5397F9642DF6F1C92E94DB43CB2C28710F352FBE67CCDFFF45B1E714B16A7FD871B615E63B99E62FD72A3772
3,194,573 UART: [art] PUB.Y = 2CB363F990F347CED1E13F028882CBB2FE32C533E7651908E9C8A6132AC71E299726AF1F338B2D0F3309538623F38010
3,201,507 UART: [art] SIG.R = 81F70F1CA664EC25074E4B9AEBC0DB4605A1835E83F947BFFDD201C8AFA0D041EB53174EC8D0A8717D701820D5407E6C
3,208,277 UART: [art] SIG.S = 8C2CC293C74DB098C0F4088202F7336A587D0CD2F6450EE3B92BA2E0C2B78F82DBFF4745854A6F7DD6BDC4C94887F73A
3,232,347 UART: Caliptra RT
3,232,598 UART: [state] CFI Enabled
3,352,278 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,986 UART: [rt]cmd =0x54514754, len=24
3,385,217 >>> mbox cmd response data (8 bytes)
3,385,218 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,687 UART: [rt]cmd =0x54514754, len=24
3,416,105 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,861 ready_for_fw is high
1,059,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,780 >>> mbox cmd response: success
2,677,780 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,740,657 UART:
2,740,673 UART: Running Caliptra FMC ...
2,741,081 UART:
2,741,135 UART: [state] CFI Enabled
2,751,645 UART: [fht] FMC Alias Private Key: 7
2,870,637 UART: [art] Extend RT PCRs Done
2,871,065 UART: [art] Lock RT PCRs Done
2,872,591 UART: [art] Populate DV Done
2,880,666 UART: [fht] FMC Alias Private Key: 7
2,881,654 UART: [art] Derive CDI
2,881,934 UART: [art] Store in slot 0x4
2,967,479 UART: [art] Derive Key Pair
2,967,839 UART: [art] Store priv key in slot 0x5
2,980,507 UART: [art] Derive Key Pair - Done
2,995,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,942 UART: [art] PUB.X = 23C7985D4FB8FA846C3535136E43AE2AA8B76F35B9327C57DC76EA7A347696FF35313EB920FDA46662FD99914CC101EC
3,018,715 UART: [art] PUB.Y = 2FEEFBAEE58F162B196D6668E9C64B8E735957867A4046739A720AF4DA5DEBD07B4F52741CC3D762E644BE0363A2B78A
3,025,669 UART: [art] SIG.R = 4C758472D9EDA144B5957C19D9AEC79A1B0E12871E1429043EAD5DB8356D5AB399CF096D772FECA724CFAFD0544A23F5
3,032,442 UART: [art] SIG.S = F51DCBAEE76976B89A2F4DEF76FA746B74BB34FF1E18BB93B693C0CFCAA80AA16E2934D243735E9C58191D1EFB6CA37E
3,056,145 UART: Caliptra RT
3,056,396 UART: [state] CFI Enabled
3,176,479 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,113 UART: [rt]cmd =0x54514754, len=24
3,209,520 >>> mbox cmd response data (8 bytes)
3,209,521 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,718 UART: [rt]cmd =0x54514754, len=24
3,240,152 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
893,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,626 UART: [kat] ++
897,778 UART: [kat] sha1
902,040 UART: [kat] SHA2-256
903,980 UART: [kat] SHA2-384
906,801 UART: [kat] SHA2-512-ACC
908,702 UART: [kat] ECC-384
918,683 UART: [kat] HMAC-384Kdf
923,317 UART: [kat] LMS
1,171,645 UART: [kat] --
1,172,500 UART: [cold-reset] ++
1,172,928 UART: [fht] FHT @ 0x50003400
1,175,651 UART: [idev] ++
1,175,819 UART: [idev] CDI.KEYID = 6
1,176,179 UART: [idev] SUBJECT.KEYID = 7
1,176,603 UART: [idev] UDS.KEYID = 0
1,176,948 ready_for_fw is high
1,176,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,869 UART: [idev] Erasing UDS.KEYID = 0
1,202,044 UART: [idev] Sha1 KeyId Algorithm
1,210,436 UART: [idev] --
1,211,328 UART: [ldev] ++
1,211,496 UART: [ldev] CDI.KEYID = 6
1,211,859 UART: [ldev] SUBJECT.KEYID = 5
1,212,285 UART: [ldev] AUTHORITY.KEYID = 7
1,212,748 UART: [ldev] FE.KEYID = 1
1,217,716 UART: [ldev] Erasing FE.KEYID = 1
1,243,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,854 UART: [ldev] --
1,283,143 UART: [fwproc] Wait for Commands...
1,283,841 UART: [fwproc] Recv command 0x46574c44
1,284,569 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,355 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,525 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,756 >>> mbox cmd response: success
2,827,756 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,872 UART: [afmc] ++
2,829,040 UART: [afmc] CDI.KEYID = 6
2,829,402 UART: [afmc] SUBJECT.KEYID = 7
2,829,827 UART: [afmc] AUTHORITY.KEYID = 5
2,865,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,417 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,126 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,009 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,710 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,330 UART: [afmc] --
2,908,244 UART: [cold-reset] --
2,909,300 UART: [state] Locking Datavault
2,910,743 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,347 UART: [state] Locking ICCM
2,911,935 UART: [exit] Launching FMC @ 0x40000130
2,917,265 UART:
2,917,281 UART: Running Caliptra FMC ...
2,917,689 UART:
2,917,832 UART: [state] CFI Enabled
2,928,550 UART: [fht] FMC Alias Private Key: 7
3,048,208 UART: [art] Extend RT PCRs Done
3,048,636 UART: [art] Lock RT PCRs Done
3,050,164 UART: [art] Populate DV Done
3,058,089 UART: [fht] FMC Alias Private Key: 7
3,059,157 UART: [art] Derive CDI
3,059,437 UART: [art] Store in slot 0x4
3,145,150 UART: [art] Derive Key Pair
3,145,510 UART: [art] Store priv key in slot 0x5
3,158,534 UART: [art] Derive Key Pair - Done
3,173,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,748 UART: [art] PUB.X = F679C5DFBE1C5DF8DD3CB2236E42D44BA61F0A7F738AC6F812903A76D05F5148E2169EB3560357520AFC7B52A3CFB894
3,196,521 UART: [art] PUB.Y = 7EA3CB3E5EA7978CD448DEF8AF86FFB848E35C9E600FF4B81B148B4D569AACC32B1EC1EE85941246A9682B410F4D1C28
3,203,483 UART: [art] SIG.R = 7B693307C29B8A1AB7EC59E30EB66BD4048598F3B37E586647EA3584899EE3C921A1AAEB4E569ABB314835308A2328D0
3,210,246 UART: [art] SIG.S = 4B415E1D4765275DC2B229C0CF5BBFC331A674329F8A72E9D1D90401669057B00B085DBB431E4589D2631A903425ED96
3,233,726 UART: Caliptra RT
3,234,069 UART: [state] CFI Enabled
3,354,317 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,753 UART: [rt]cmd =0x54514754, len=24
3,387,002 >>> mbox cmd response data (8 bytes)
3,387,003 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,670 UART: [rt]cmd =0x54514754, len=24
3,418,512 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,158 ready_for_fw is high
1,060,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,131 >>> mbox cmd response: success
2,681,131 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,743,418 UART:
2,743,434 UART: Running Caliptra FMC ...
2,743,842 UART:
2,743,985 UART: [state] CFI Enabled
2,754,727 UART: [fht] FMC Alias Private Key: 7
2,873,551 UART: [art] Extend RT PCRs Done
2,873,979 UART: [art] Lock RT PCRs Done
2,875,515 UART: [art] Populate DV Done
2,883,760 UART: [fht] FMC Alias Private Key: 7
2,884,850 UART: [art] Derive CDI
2,885,130 UART: [art] Store in slot 0x4
2,970,681 UART: [art] Derive Key Pair
2,971,041 UART: [art] Store priv key in slot 0x5
2,984,323 UART: [art] Derive Key Pair - Done
2,998,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,483 UART: [art] PUB.X = E6738C1F91DF8BDFDC473A5553B65E272183DC234B4CD6FDCF2E9F8B2273DE5349FFBC9B9B44DDB0213777592F45AE82
3,022,269 UART: [art] PUB.Y = D721D7938AEB4402C7B3A6A80EFD9B26585867244AF26F127D2F9B9FFA0D65540EBB2EF0F5BBE82735E6937F700501D5
3,029,209 UART: [art] SIG.R = 54274650AA186208C98CA150A8135CA75BBC886664502DDF0535951BF9CE3D0E941A440A750A7ADCDADB2262E65E7A45
3,035,968 UART: [art] SIG.S = BD302DE6A45F0E7DFEEC306B122051C0C6D9E3DD88331E2C7F2FB1A8742438F53470D8045E8234D9E75320FC26AD53EE
3,059,270 UART: Caliptra RT
3,059,613 UART: [state] CFI Enabled
3,180,140 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,732 UART: [rt]cmd =0x54514754, len=24
3,213,073 >>> mbox cmd response data (8 bytes)
3,213,074 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,242,277 UART: [rt]cmd =0x54514754, len=24
3,243,881 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,064 UART:
192,452 UART: Running Caliptra ROM ...
193,594 UART:
193,744 UART: [state] CFI Enabled
263,199 UART: [state] LifecycleState = Unprovisioned
265,141 UART: [state] DebugLocked = No
267,299 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,021 UART: [kat] SHA2-256
442,719 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,254 UART: [kat] ++
453,792 UART: [kat] sha1
465,737 UART: [kat] SHA2-256
468,395 UART: [kat] SHA2-384
473,818 UART: [kat] SHA2-512-ACC
476,184 UART: [kat] ECC-384
2,766,852 UART: [kat] HMAC-384Kdf
2,779,523 UART: [kat] LMS
3,969,813 UART: [kat] --
3,973,836 UART: [cold-reset] ++
3,975,487 UART: [fht] Storing FHT @ 0x50003400
3,988,032 UART: [idev] ++
3,988,681 UART: [idev] CDI.KEYID = 6
3,989,600 UART: [idev] SUBJECT.KEYID = 7
3,990,844 UART: [idev] UDS.KEYID = 0
3,991,905 ready_for_fw is high
3,992,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,268 UART: [idev] Erasing UDS.KEYID = 0
7,323,783 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,048 UART: [idev] --
7,348,187 UART: [ldev] ++
7,348,815 UART: [ldev] CDI.KEYID = 6
7,349,725 UART: [ldev] SUBJECT.KEYID = 5
7,350,937 UART: [ldev] AUTHORITY.KEYID = 7
7,352,244 UART: [ldev] FE.KEYID = 1
7,379,580 UART: [ldev] Erasing FE.KEYID = 1
10,712,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,214 UART: [ldev] --
13,093,493 UART: [fwproc] Waiting for Commands...
13,095,373 UART: [fwproc] Received command 0x46574c44
13,097,554 UART: [fwproc] Received Image of size 118548 bytes
17,201,671 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,522 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,345,696 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,674,494 >>> mbox cmd response: success
17,675,664 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,678,944 UART: [afmc] ++
17,679,542 UART: [afmc] CDI.KEYID = 6
17,680,430 UART: [afmc] SUBJECT.KEYID = 7
17,681,697 UART: [afmc] AUTHORITY.KEYID = 5
21,047,220 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,345,550 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,347,863 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,362,260 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,377,010 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,391,386 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,413,025 UART: [afmc] --
23,417,548 UART: [cold-reset] --
23,422,759 UART: [state] Locking Datavault
23,429,135 UART: [state] Locking PCR0, PCR1 and PCR31
23,430,885 UART: [state] Locking ICCM
23,432,145 UART: [exit] Launching FMC @ 0x40000130
23,440,568 UART:
23,440,815 UART: Running Caliptra FMC ...
23,441,916 UART:
23,442,069 UART: [state] CFI Enabled
23,506,287 UART: [fht] FMC Alias Private Key: 7
25,846,232 UART: [art] Extend RT PCRs Done
25,847,455 UART: [art] Lock RT PCRs Done
25,849,194 UART: [art] Populate DV Done
25,854,554 UART: [fht] FMC Alias Private Key: 7
25,856,154 UART: [art] Derive CDI
25,856,971 UART: [art] Store in slot 0x4
25,915,125 UART: [art] Derive Key Pair
25,916,168 UART: [art] Store priv key in slot 0x5
29,208,826 UART: [art] Derive Key Pair - Done
29,221,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,511,041 UART: [art] Erasing AUTHORITY.KEYID = 7
31,512,571 UART: [art] PUB.X = E47E584583F46B64AD103F38B3C240520E2F92BD277E9C3D8EED14565D9D1D84689A5E9EE304E41B4AEF988ACE99ECAD
31,519,840 UART: [art] PUB.Y = 7F764A7DFA54A0012287940ED275093348DB23DF2E88DBE4B11E0D5EBD69D5E990F5C4B4C02672E887931360FDBAE4E7
31,527,091 UART: [art] SIG.R = 662E3222F553844E0E74E89F6115D24B18E71C204BAD9CCF6302A69E759105E9D1022D1F365420563DAD7514CAAECF0E
31,534,448 UART: [art] SIG.S = E86465E13FCCDAA9D6A4631B731B64668DE0EEA0BDB19495B1194A6DC9B4CDE33769634B81C1E69AD884CEAC76119EFF
32,839,605 UART: Caliptra RT
32,840,321 UART: [state] CFI Enabled
33,018,786 UART: [rt] RT listening for mailbox commands...
33,050,475 UART: [rt]cmd =0x47544744, len=8
33,052,682 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
3,806,229 ready_for_fw is high
3,806,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,948,591 >>> mbox cmd response: success
17,950,094 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,633,861 UART:
23,634,281 UART: Running Caliptra FMC ...
23,635,430 UART:
23,635,594 UART: [state] CFI Enabled
23,705,503 UART: [fht] FMC Alias Private Key: 7
26,045,802 UART: [art] Extend RT PCRs Done
26,047,040 UART: [art] Lock RT PCRs Done
26,048,401 UART: [art] Populate DV Done
26,053,444 UART: [fht] FMC Alias Private Key: 7
26,054,955 UART: [art] Derive CDI
26,055,720 UART: [art] Store in slot 0x4
26,114,206 UART: [art] Derive Key Pair
26,115,243 UART: [art] Store priv key in slot 0x5
29,408,431 UART: [art] Derive Key Pair - Done
29,421,486 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,710,343 UART: [art] Erasing AUTHORITY.KEYID = 7
31,711,899 UART: [art] PUB.X = 71A57A219FC93F95BCE09A001706D9748529F2ADDC45D8622ADBE37101BE2E5F4EA512FBA2C483C07031D86D656F9ABE
31,719,201 UART: [art] PUB.Y = 2589289C7184312BA21FA23AAD12A45DCBD1187D9A1FAC8C5D3F628300DD1F76552416E5A1461319DEE77DE49AFDB8EA
31,726,378 UART: [art] SIG.R = 8A0EFD47AB9CB7745D815EAD8292F7F16249CFEF9E6F61310357EF3E9B78F6C5E188B5A066690341876935A4C23F4C2C
31,733,733 UART: [art] SIG.S = 5B8706EE22E1CA401B3DB7F2D7EDEFC349659A0050CCB413AE1FC7201E1FBCE441DA0A299113C071F028A48C18F61DE1
33,039,113 UART: Caliptra RT
33,039,838 UART: [state] CFI Enabled
33,216,608 UART: [rt] RT listening for mailbox commands...
33,248,391 UART: [rt]cmd =0x47544744, len=8
33,250,200 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,440 UART:
192,828 UART: Running Caliptra ROM ...
193,951 UART:
603,783 UART: [state] CFI Enabled
620,293 UART: [state] LifecycleState = Unprovisioned
622,232 UART: [state] DebugLocked = No
624,456 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,164 UART: [kat] SHA2-256
799,895 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,408 UART: [kat] ++
810,851 UART: [kat] sha1
821,434 UART: [kat] SHA2-256
824,148 UART: [kat] SHA2-384
830,209 UART: [kat] SHA2-512-ACC
832,574 UART: [kat] ECC-384
3,117,756 UART: [kat] HMAC-384Kdf
3,129,558 UART: [kat] LMS
4,319,625 UART: [kat] --
4,323,641 UART: [cold-reset] ++
4,324,507 UART: [fht] Storing FHT @ 0x50003400
4,337,117 UART: [idev] ++
4,337,673 UART: [idev] CDI.KEYID = 6
4,338,645 UART: [idev] SUBJECT.KEYID = 7
4,339,882 UART: [idev] UDS.KEYID = 0
4,340,865 ready_for_fw is high
4,341,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,894 UART: [idev] Erasing UDS.KEYID = 0
7,626,395 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,536 UART: [idev] --
7,653,440 UART: [ldev] ++
7,654,015 UART: [ldev] CDI.KEYID = 6
7,654,951 UART: [ldev] SUBJECT.KEYID = 5
7,656,216 UART: [ldev] AUTHORITY.KEYID = 7
7,657,382 UART: [ldev] FE.KEYID = 1
7,668,965 UART: [ldev] Erasing FE.KEYID = 1
10,957,012 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,775 UART: [ldev] --
13,318,798 UART: [fwproc] Waiting for Commands...
13,321,952 UART: [fwproc] Received command 0x46574c44
13,324,141 UART: [fwproc] Received Image of size 118548 bytes
17,431,373 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,507,645 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,833 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,909,357 >>> mbox cmd response: success
17,909,876 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,913,223 UART: [afmc] ++
17,913,799 UART: [afmc] CDI.KEYID = 6
17,914,731 UART: [afmc] SUBJECT.KEYID = 7
17,915,998 UART: [afmc] AUTHORITY.KEYID = 5
21,230,788 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,844 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,528,091 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,543 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,557,275 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,635 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,592,576 UART: [afmc] --
23,596,705 UART: [cold-reset] --
23,600,996 UART: [state] Locking Datavault
23,607,756 UART: [state] Locking PCR0, PCR1 and PCR31
23,609,501 UART: [state] Locking ICCM
23,611,210 UART: [exit] Launching FMC @ 0x40000130
23,619,618 UART:
23,619,848 UART: Running Caliptra FMC ...
23,620,947 UART:
23,621,101 UART: [state] CFI Enabled
23,629,143 UART: [fht] FMC Alias Private Key: 7
25,969,330 UART: [art] Extend RT PCRs Done
25,970,548 UART: [art] Lock RT PCRs Done
25,972,382 UART: [art] Populate DV Done
25,977,570 UART: [fht] FMC Alias Private Key: 7
25,979,265 UART: [art] Derive CDI
25,980,071 UART: [art] Store in slot 0x4
26,022,620 UART: [art] Derive Key Pair
26,023,618 UART: [art] Store priv key in slot 0x5
29,266,029 UART: [art] Derive Key Pair - Done
29,279,135 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,319 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,841 UART: [art] PUB.X = 77E89ACF9090C2D2880B071ECCFB20A0CD7B6510FD724427A175C672D750395F6AF09E270299259298D8FA4C7AE521EC
31,568,093 UART: [art] PUB.Y = 17ED0EE8469FC07E4254E14934F7B1AF3D451E3B60D47E5D2C805171B55D2A5704DA9ED5F4D24855A1AA732F52CBDAA4
31,575,385 UART: [art] SIG.R = 35C49BC8E05FE2DAA1FEE61AF2C1439597360F049399A8F232C69960F4B287449F764C3DA6DF7922967ED626F107F18B
31,582,780 UART: [art] SIG.S = E4E5D4B32673D8B9961588DD7DA716E5A0009E1AB4EF90065C53634DA0B11BB430799A25296B09C7AB076F289B2E6533
32,887,968 UART: Caliptra RT
32,888,675 UART: [state] CFI Enabled
33,021,951 UART: [rt] RT listening for mailbox commands...
33,053,481 UART: [rt]cmd =0x47544744, len=8
33,055,366 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
4,130,547 ready_for_fw is high
4,130,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,203 >>> mbox cmd response: success
18,157,807 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,789,623 UART:
23,790,019 UART: Running Caliptra FMC ...
23,791,131 UART:
23,791,281 UART: [state] CFI Enabled
23,798,906 UART: [fht] FMC Alias Private Key: 7
26,139,268 UART: [art] Extend RT PCRs Done
26,140,489 UART: [art] Lock RT PCRs Done
26,142,409 UART: [art] Populate DV Done
26,147,975 UART: [fht] FMC Alias Private Key: 7
26,149,457 UART: [art] Derive CDI
26,150,186 UART: [art] Store in slot 0x4
26,192,621 UART: [art] Derive Key Pair
26,193,664 UART: [art] Store priv key in slot 0x5
29,435,560 UART: [art] Derive Key Pair - Done
29,448,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,804 UART: [art] Erasing AUTHORITY.KEYID = 7
31,730,327 UART: [art] PUB.X = 001BE4A36E9EA338AF32D7F0F17110A3BFE19476A27C16F8B8589A98576E4448E5BD3227005410489ADD5BD4E5579FBB
31,737,515 UART: [art] PUB.Y = 3113C2A0A9D74A9957E222E4FBC91CEE531BFE71DDF15BF3AA2D765CDBBB6AC1FD4ECB60CB65B670B95058199ED6EAF2
31,744,818 UART: [art] SIG.R = 7EFB23FF280511C3117F5A72CE7B40481D3519D4B1E8E2A2C9BA90C474F631C7A469C21C73FDA90643009B1CFD64577D
31,752,207 UART: [art] SIG.S = AB38009ED722B1784FDF8638B977DD0943430579F9845AFF35FA0A3CA0D90EC8BF99EC330C53A1E79CD60C28155ED714
33,056,988 UART: Caliptra RT
33,057,708 UART: [state] CFI Enabled
33,190,915 UART: [rt] RT listening for mailbox commands...
33,222,541 UART: [rt]cmd =0x47544744, len=8
33,224,510 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
191,987 UART:
192,340 UART: Running Caliptra ROM ...
193,526 UART:
193,681 UART: [state] CFI Enabled
263,428 UART: [state] LifecycleState = Unprovisioned
265,347 UART: [state] DebugLocked = No
267,093 UART: [state] WD Timer not started. Device not locked for debugging
270,227 UART: [kat] SHA2-256
449,888 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,623 UART: [kat] ++
461,224 UART: [kat] sha1
472,286 UART: [kat] SHA2-256
475,006 UART: [kat] SHA2-384
482,275 UART: [kat] SHA2-512-ACC
484,708 UART: [kat] ECC-384
2,946,865 UART: [kat] HMAC-384Kdf
2,969,894 UART: [kat] LMS
3,446,419 UART: [kat] --
3,448,771 UART: [cold-reset] ++
3,450,842 UART: [fht] FHT @ 0x50003400
3,462,783 UART: [idev] ++
3,463,357 UART: [idev] CDI.KEYID = 6
3,464,267 UART: [idev] SUBJECT.KEYID = 7
3,465,526 UART: [idev] UDS.KEYID = 0
3,466,571 ready_for_fw is high
3,466,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,248 UART: [idev] Erasing UDS.KEYID = 0
5,987,220 UART: [idev] Sha1 KeyId Algorithm
6,011,517 UART: [idev] --
6,015,714 UART: [ldev] ++
6,016,295 UART: [ldev] CDI.KEYID = 6
6,017,371 UART: [ldev] SUBJECT.KEYID = 5
6,018,475 UART: [ldev] AUTHORITY.KEYID = 7
6,019,648 UART: [ldev] FE.KEYID = 1
6,058,676 UART: [ldev] Erasing FE.KEYID = 1
8,568,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,017 UART: [ldev] --
10,375,119 UART: [fwproc] Wait for Commands...
10,377,207 UART: [fwproc] Recv command 0x46574c44
10,379,237 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,061 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,074 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,169 >>> mbox cmd response: success
14,343,209 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,346,699 UART: [afmc] ++
14,347,280 UART: [afmc] CDI.KEYID = 6
14,348,243 UART: [afmc] SUBJECT.KEYID = 7
14,349,450 UART: [afmc] AUTHORITY.KEYID = 5
16,896,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,502 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,338 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,386 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,978 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,829 UART: [afmc] --
18,693,875 UART: [cold-reset] --
18,696,597 UART: [state] Locking Datavault
18,702,495 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,244 UART: [state] Locking ICCM
18,706,118 UART: [exit] Launching FMC @ 0x40000130
18,714,556 UART:
18,714,789 UART: Running Caliptra FMC ...
18,715,887 UART:
18,716,042 UART: [state] CFI Enabled
18,776,058 UART: [fht] FMC Alias Private Key: 7
20,541,891 UART: [art] Extend RT PCRs Done
20,543,128 UART: [art] Lock RT PCRs Done
20,544,642 UART: [art] Populate DV Done
20,550,155 UART: [fht] FMC Alias Private Key: 7
20,551,795 UART: [art] Derive CDI
20,552,605 UART: [art] Store in slot 0x4
20,608,757 UART: [art] Derive Key Pair
20,609,791 UART: [art] Store priv key in slot 0x5
23,072,647 UART: [art] Derive Key Pair - Done
23,085,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,099 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,602 UART: [art] PUB.X = 2B3C2B9CF9CE9582093F4AEE712F87BD566A853C4A6BB5997DA5B1DF78A426EB4ACD99CCD4A6B205FE291E7268654904
24,807,900 UART: [art] PUB.Y = E0C0C9053983FB0B28DEA9783E718EBCD8C9AAF304D2A035EF1E31B14D9C66D70EA8D93997B17772E3F50A7259BA7989
24,815,166 UART: [art] SIG.R = EB9844AF368C8A31AA92E5E1A1D8AA204D261F0DEF5E1D8DE711D231E79D4A70234082609B375C62746E01DD6589F20D
24,822,578 UART: [art] SIG.S = E292BF21051162557126C6FA92517C07A92FFF959947BF201C9613A5CB52CA6BA4D6602233708519BC365B887CD25A74
25,801,446 UART: Caliptra RT
25,802,143 UART: [state] CFI Enabled
25,983,443 UART: [rt] RT listening for mailbox commands...
26,015,177 UART: [rt]cmd =0x47544744, len=8
26,017,040 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,460,646 ready_for_fw is high
3,461,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,700 >>> mbox cmd response: success
14,242,842 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,532,115 UART:
18,532,520 UART: Running Caliptra FMC ...
18,533,710 UART:
18,533,871 UART: [state] CFI Enabled
18,601,318 UART: [fht] FMC Alias Private Key: 7
20,368,127 UART: [art] Extend RT PCRs Done
20,369,652 UART: [art] Lock RT PCRs Done
20,371,020 UART: [art] Populate DV Done
20,376,100 UART: [fht] FMC Alias Private Key: 7
20,377,587 UART: [art] Derive CDI
20,378,355 UART: [art] Store in slot 0x4
20,435,445 UART: [art] Derive Key Pair
20,436,488 UART: [art] Store priv key in slot 0x5
22,899,419 UART: [art] Derive Key Pair - Done
22,912,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,346 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,826 UART: [art] PUB.X = 6F732B29C46071DA3119F0D3EFCD11810AC710E743C4CBD6154EC4D696327354CC837B5B3F35C002590E08A960354BB8
24,634,149 UART: [art] PUB.Y = CFC1A267A7A8516CD51C1D55F57B3C85EEE3282907121E9AE58BFE164C8D5EAA71A826A1A9A79E3759E08E76AB74EB7E
24,641,400 UART: [art] SIG.R = 3A4065A39CC4312CF7B43A324E1AFC3E17DD6C81B087DA3E1B5B771D6454ABF7CB77A30D06CA9931B182F588FF6F066D
24,648,799 UART: [art] SIG.S = 6C5E5801817B0AFA7048B1E64D416EB71D47EE90703CB5018DA58FC14F392425DC35CA69BB624DEF1B0ED5A5931AB615
25,627,249 UART: Caliptra RT
25,627,962 UART: [state] CFI Enabled
25,809,188 UART: [rt] RT listening for mailbox commands...
25,841,024 UART: [rt]cmd =0x47544744, len=8
25,842,945 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,472 UART:
192,849 UART: Running Caliptra ROM ...
193,950 UART:
603,715 UART: [state] CFI Enabled
617,828 UART: [state] LifecycleState = Unprovisioned
619,785 UART: [state] DebugLocked = No
622,098 UART: [state] WD Timer not started. Device not locked for debugging
625,098 UART: [kat] SHA2-256
804,763 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,571 UART: [kat] ++
816,021 UART: [kat] sha1
827,186 UART: [kat] SHA2-256
829,920 UART: [kat] SHA2-384
835,803 UART: [kat] SHA2-512-ACC
838,211 UART: [kat] ECC-384
3,283,599 UART: [kat] HMAC-384Kdf
3,296,466 UART: [kat] LMS
3,772,942 UART: [kat] --
3,776,481 UART: [cold-reset] ++
3,778,491 UART: [fht] FHT @ 0x50003400
3,789,115 UART: [idev] ++
3,789,687 UART: [idev] CDI.KEYID = 6
3,790,681 UART: [idev] SUBJECT.KEYID = 7
3,791,881 UART: [idev] UDS.KEYID = 0
3,792,992 ready_for_fw is high
3,793,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,971 UART: [idev] Erasing UDS.KEYID = 0
6,269,937 UART: [idev] Sha1 KeyId Algorithm
6,292,752 UART: [idev] --
6,297,476 UART: [ldev] ++
6,298,111 UART: [ldev] CDI.KEYID = 6
6,298,993 UART: [ldev] SUBJECT.KEYID = 5
6,300,208 UART: [ldev] AUTHORITY.KEYID = 7
6,301,497 UART: [ldev] FE.KEYID = 1
6,312,846 UART: [ldev] Erasing FE.KEYID = 1
8,793,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,252 UART: [ldev] --
10,588,148 UART: [fwproc] Wait for Commands...
10,589,705 UART: [fwproc] Recv command 0x46574c44
10,591,693 UART: [fwproc] Recv'd Img size: 118548 bytes
14,082,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,778 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,238,795 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,567,648 >>> mbox cmd response: success
14,568,800 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,572,018 UART: [afmc] ++
14,572,602 UART: [afmc] CDI.KEYID = 6
14,573,625 UART: [afmc] SUBJECT.KEYID = 7
14,574,784 UART: [afmc] AUTHORITY.KEYID = 5
17,079,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,802,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,804,397 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,820,219 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,836,322 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,851,867 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,877,053 UART: [afmc] --
18,881,188 UART: [cold-reset] --
18,886,023 UART: [state] Locking Datavault
18,891,495 UART: [state] Locking PCR0, PCR1 and PCR31
18,893,252 UART: [state] Locking ICCM
18,894,595 UART: [exit] Launching FMC @ 0x40000130
18,903,043 UART:
18,903,284 UART: Running Caliptra FMC ...
18,904,388 UART:
18,904,547 UART: [state] CFI Enabled
18,912,763 UART: [fht] FMC Alias Private Key: 7
20,679,625 UART: [art] Extend RT PCRs Done
20,680,866 UART: [art] Lock RT PCRs Done
20,682,519 UART: [art] Populate DV Done
20,687,876 UART: [fht] FMC Alias Private Key: 7
20,689,369 UART: [art] Derive CDI
20,690,110 UART: [art] Store in slot 0x4
20,733,185 UART: [art] Derive Key Pair
20,734,184 UART: [art] Store priv key in slot 0x5
23,160,997 UART: [art] Derive Key Pair - Done
23,173,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,880,279 UART: [art] Erasing AUTHORITY.KEYID = 7
24,881,779 UART: [art] PUB.X = 1F10E1B23C8F342A79A6A8E09297C4A62C38B27FC440679AF752ED24AEA00503E73D32AA43672687227116FCD30643CE
24,889,019 UART: [art] PUB.Y = 4A106CFFEFF369F72161ED39002CFB2D6FB33380B6B1D66473AE714AE8A1A18B9CA304A76D2BAD7E95A906F03C87C35A
24,896,304 UART: [art] SIG.R = 2D52B633A68FEF87B66C9AF4938B52F5F45D8D870A0C682154452FE7C17B22D4DD4A4FBF525649D84DC164B0F0B53DAB
24,903,698 UART: [art] SIG.S = 6AA9794F1635382CA7037EAD35A0AC6205BA6A8616CB46DB612C6FD0B741E2AD00427E86DE529A9C44C14EB39267A968
25,882,802 UART: Caliptra RT
25,883,498 UART: [state] CFI Enabled
26,015,105 UART: [rt] RT listening for mailbox commands...
26,046,447 UART: [rt]cmd =0x47544744, len=8
26,048,306 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,776,702 ready_for_fw is high
3,777,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,827 >>> mbox cmd response: success
14,445,238 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,691,236 UART:
18,691,621 UART: Running Caliptra FMC ...
18,692,817 UART:
18,692,987 UART: [state] CFI Enabled
18,700,920 UART: [fht] FMC Alias Private Key: 7
20,466,810 UART: [art] Extend RT PCRs Done
20,468,024 UART: [art] Lock RT PCRs Done
20,469,275 UART: [art] Populate DV Done
20,474,644 UART: [fht] FMC Alias Private Key: 7
20,476,402 UART: [art] Derive CDI
20,477,222 UART: [art] Store in slot 0x4
20,519,939 UART: [art] Derive Key Pair
20,520,984 UART: [art] Store priv key in slot 0x5
22,947,670 UART: [art] Derive Key Pair - Done
22,960,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,168 UART: [art] Erasing AUTHORITY.KEYID = 7
24,668,664 UART: [art] PUB.X = C656F7F3366556A8CA5C6463A42FB11ADB7F53D36118B6408E85664002BB95C6E72A3E0671C3FD1B2C8B2CFFDF58AF51
24,675,974 UART: [art] PUB.Y = 4D0EF373BCA3336E80570CAA72E118D815EA0027154D56DBA0A7D82BB3B07BFEB1C86CE5744420CBF0B3A98F5D1AA1BF
24,683,180 UART: [art] SIG.R = 3D9EB1D77122A86662577D19E5B27BDD3B413D1D135C6CA4F948A282F9A795B3C1E190F1A3AE9F5B1E1FB1BD9715C29F
24,690,588 UART: [art] SIG.S = B487EFC2E99556674EF4FBA81A62C89C68B6986BE7EF4EE988981E8437680A490AB7CB5A2272F887A1CBD3600A2DA0E0
25,669,889 UART: Caliptra RT
25,670,590 UART: [state] CFI Enabled
25,803,269 UART: [rt] RT listening for mailbox commands...
25,834,679 UART: [rt]cmd =0x47544744, len=8
25,836,669 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,093 UART:
192,480 UART: Running Caliptra ROM ...
193,617 UART:
193,765 UART: [state] CFI Enabled
265,718 UART: [state] LifecycleState = Unprovisioned
268,135 UART: [state] DebugLocked = No
269,465 UART: [state] WD Timer not started. Device not locked for debugging
273,443 UART: [kat] SHA2-256
463,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,141 UART: [kat] ++
474,591 UART: [kat] sha1
486,031 UART: [kat] SHA2-256
489,045 UART: [kat] SHA2-384
495,276 UART: [kat] SHA2-512-ACC
497,896 UART: [kat] ECC-384
2,950,350 UART: [kat] HMAC-384Kdf
2,972,851 UART: [kat] LMS
3,504,576 UART: [kat] --
3,507,893 UART: [cold-reset] ++
3,509,828 UART: [fht] FHT @ 0x50003400
3,521,651 UART: [idev] ++
3,522,346 UART: [idev] CDI.KEYID = 6
3,523,295 UART: [idev] SUBJECT.KEYID = 7
3,524,529 UART: [idev] UDS.KEYID = 0
3,525,428 ready_for_fw is high
3,525,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,757 UART: [idev] Erasing UDS.KEYID = 0
6,033,340 UART: [idev] Sha1 KeyId Algorithm
6,054,815 UART: [idev] --
6,059,139 UART: [ldev] ++
6,059,817 UART: [ldev] CDI.KEYID = 6
6,060,698 UART: [ldev] SUBJECT.KEYID = 5
6,061,908 UART: [ldev] AUTHORITY.KEYID = 7
6,063,158 UART: [ldev] FE.KEYID = 1
6,101,811 UART: [ldev] Erasing FE.KEYID = 1
8,609,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,739 UART: [ldev] --
10,405,465 UART: [fwproc] Wait for Commands...
10,407,447 UART: [fwproc] Recv command 0x46574c44
10,409,698 UART: [fwproc] Recv'd Img size: 118548 bytes
13,906,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,978,428 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,102,047 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,662,622 >>> mbox cmd response: success
14,663,672 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,667,234 UART: [afmc] ++
14,667,927 UART: [afmc] CDI.KEYID = 6
14,669,158 UART: [afmc] SUBJECT.KEYID = 7
14,670,583 UART: [afmc] AUTHORITY.KEYID = 5
17,209,807 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,954,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,956,167 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,971,467 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,986,417 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,001,292 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,625 UART: [afmc] --
19,029,411 UART: [cold-reset] --
19,033,756 UART: [state] Locking Datavault
19,037,486 UART: [state] Locking PCR0, PCR1 and PCR31
19,039,624 UART: [state] Locking ICCM
19,041,501 UART: [exit] Launching FMC @ 0x40000130
19,050,184 UART:
19,050,420 UART: Running Caliptra FMC ...
19,051,747 UART:
19,051,918 UART: [state] CFI Enabled
19,109,547 UART: [fht] FMC Alias Private Key: 7
20,876,342 UART: [art] Extend RT PCRs Done
20,877,576 UART: [art] Lock RT PCRs Done
20,879,472 UART: [art] Populate DV Done
20,884,880 UART: [fht] FMC Alias Private Key: 7
20,886,473 UART: [art] Derive CDI
20,887,287 UART: [art] Store in slot 0x4
20,942,093 UART: [art] Derive Key Pair
20,943,137 UART: [art] Store priv key in slot 0x5
23,405,613 UART: [art] Derive Key Pair - Done
23,418,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,131,655 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,182 UART: [art] PUB.X = 701A94CA49C4C61B9E592AB64C5EBE4CA5E1B0C56E43A64CA1A557BA0EF04813D54CC0CC5DCD463CA78EE1980E2B30C7
25,140,454 UART: [art] PUB.Y = 146B2FBB156B762ECE71FF396654A314D8BEA14C8D97844C54EED2082ECF76ADB4A732942B4BD5E7DF2F2142B7A824CB
25,147,713 UART: [art] SIG.R = B13CB639071920CEC627A947BA0F18010DCB6B5B67FBF1B5720EB68F7E7753905B0E4628B22CDC861B0EE786E5349A55
25,155,122 UART: [art] SIG.S = F198C8893F331DDD7E29371CBEAE97DCA4E670949BB9932B796472D3E24EE4EDCC7EDCC94C23D2AA52E0D28EF73699D4
26,134,584 UART: Caliptra RT
26,135,289 UART: [state] CFI Enabled
26,315,534 UART: [rt] RT listening for mailbox commands...
26,347,206 UART: [rt]cmd =0x47544744, len=8
26,349,222 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,438,057 ready_for_fw is high
3,438,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,830,112 >>> mbox cmd response: success
14,831,469 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,111,659 UART:
19,112,086 UART: Running Caliptra FMC ...
19,113,233 UART:
19,113,392 UART: [state] CFI Enabled
19,177,782 UART: [fht] FMC Alias Private Key: 7
20,944,791 UART: [art] Extend RT PCRs Done
20,946,019 UART: [art] Lock RT PCRs Done
20,947,319 UART: [art] Populate DV Done
20,952,581 UART: [fht] FMC Alias Private Key: 7
20,954,176 UART: [art] Derive CDI
20,954,990 UART: [art] Store in slot 0x4
21,011,040 UART: [art] Derive Key Pair
21,012,088 UART: [art] Store priv key in slot 0x5
23,474,042 UART: [art] Derive Key Pair - Done
23,487,206 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,245 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,752 UART: [art] PUB.X = 17610C66CFFE025EC346D5A81BD4071757538B9CB7D6BB9D2ECA481CDA840ADC30B35EDC487052B4BCBA6D2347C90B37
25,208,088 UART: [art] PUB.Y = 770F6D410EC3E1C8369DC967A423B0D8E18694552F765FB06A45A22BF2260BB06CFC857A39621354FDC7F9E0A8B488AA
25,215,297 UART: [art] SIG.R = BE60CF511C62E7A48E7A098E60DB36ACC86C2BACEB7F7D0139B3A04D587E5B9C78DBEC9E49730D32D5CFCD8B5C3EEFB2
25,222,748 UART: [art] SIG.S = 30E0A4EE086505802F65BE062CEFCE67FC306280DDF0299C2694ED32C681AD6B4E6EB2D9183BA3940D923976FD62577C
26,201,959 UART: Caliptra RT
26,202,653 UART: [state] CFI Enabled
26,383,245 UART: [rt] RT listening for mailbox commands...
26,414,655 UART: [rt]cmd =0x47544744, len=8
26,416,858 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,492 UART:
192,851 UART: Running Caliptra ROM ...
193,981 UART:
603,620 UART: [state] CFI Enabled
616,450 UART: [state] LifecycleState = Unprovisioned
618,855 UART: [state] DebugLocked = No
621,533 UART: [state] WD Timer not started. Device not locked for debugging
626,656 UART: [kat] SHA2-256
816,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,275 UART: [kat] ++
827,882 UART: [kat] sha1
837,845 UART: [kat] SHA2-256
840,857 UART: [kat] SHA2-384
846,989 UART: [kat] SHA2-512-ACC
849,577 UART: [kat] ECC-384
3,292,194 UART: [kat] HMAC-384Kdf
3,304,373 UART: [kat] LMS
3,836,207 UART: [kat] --
3,840,866 UART: [cold-reset] ++
3,842,521 UART: [fht] FHT @ 0x50003400
3,855,349 UART: [idev] ++
3,855,995 UART: [idev] CDI.KEYID = 6
3,857,031 UART: [idev] SUBJECT.KEYID = 7
3,858,214 UART: [idev] UDS.KEYID = 0
3,859,148 ready_for_fw is high
3,859,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,275 UART: [idev] Erasing UDS.KEYID = 0
6,337,595 UART: [idev] Sha1 KeyId Algorithm
6,360,658 UART: [idev] --
6,364,276 UART: [ldev] ++
6,365,011 UART: [ldev] CDI.KEYID = 6
6,365,919 UART: [ldev] SUBJECT.KEYID = 5
6,367,029 UART: [ldev] AUTHORITY.KEYID = 7
6,368,326 UART: [ldev] FE.KEYID = 1
6,379,059 UART: [ldev] Erasing FE.KEYID = 1
8,856,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,911 UART: [ldev] --
10,646,075 UART: [fwproc] Wait for Commands...
10,648,025 UART: [fwproc] Recv command 0x46574c44
10,650,286 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,480 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,085 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,579 >>> mbox cmd response: success
14,908,683 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,911,413 UART: [afmc] ++
14,912,106 UART: [afmc] CDI.KEYID = 6
14,913,349 UART: [afmc] SUBJECT.KEYID = 7
14,914,791 UART: [afmc] AUTHORITY.KEYID = 5
17,415,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,136,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,138,608 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,153,691 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,168,827 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,183,778 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,207,800 UART: [afmc] --
19,210,640 UART: [cold-reset] --
19,213,213 UART: [state] Locking Datavault
19,217,667 UART: [state] Locking PCR0, PCR1 and PCR31
19,219,889 UART: [state] Locking ICCM
19,222,590 UART: [exit] Launching FMC @ 0x40000130
19,231,281 UART:
19,231,519 UART: Running Caliptra FMC ...
19,232,619 UART:
19,232,778 UART: [state] CFI Enabled
19,240,938 UART: [fht] FMC Alias Private Key: 7
21,007,508 UART: [art] Extend RT PCRs Done
21,008,736 UART: [art] Lock RT PCRs Done
21,010,318 UART: [art] Populate DV Done
21,015,460 UART: [fht] FMC Alias Private Key: 7
21,017,039 UART: [art] Derive CDI
21,017,869 UART: [art] Store in slot 0x4
21,060,304 UART: [art] Derive Key Pair
21,061,309 UART: [art] Store priv key in slot 0x5
23,488,217 UART: [art] Derive Key Pair - Done
23,500,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,207,189 UART: [art] Erasing AUTHORITY.KEYID = 7
25,208,693 UART: [art] PUB.X = 644C5262FEE871F05F35F2A45BD0E9450ED1B45B789CE4B3B2F46B70D6AF7BEA85B842A1A45800FE2696B00C88872E89
25,215,901 UART: [art] PUB.Y = 6821F2654597BC844D402E235C33A9735318856305A986376A3B0C63E04B684AA6D42679D63A77F997EC30D78BD91FC3
25,223,164 UART: [art] SIG.R = F8E13D64DD96B3D5A0B9ADF212BD2CCC50E81CA3842EF7DA676892BC1AF6EE60A97228D0D5F6ACBEABC5F59A91A23952
25,230,575 UART: [art] SIG.S = 679F25012EE64C77EBF81ABB21AB509CCDF3D44D3707D1F49BC2005823CF4FC56D5E8D7F419FFD1E239D15D8D80DE438
26,210,236 UART: Caliptra RT
26,210,926 UART: [state] CFI Enabled
26,344,083 UART: [rt] RT listening for mailbox commands...
26,375,272 UART: [rt]cmd =0x47544744, len=8
26,377,565 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
3,752,592 ready_for_fw is high
3,752,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,157 >>> mbox cmd response: success
15,038,601 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,292,628 UART:
19,293,065 UART: Running Caliptra FMC ...
19,294,183 UART:
19,294,352 UART: [state] CFI Enabled
19,302,420 UART: [fht] FMC Alias Private Key: 7
21,068,639 UART: [art] Extend RT PCRs Done
21,069,866 UART: [art] Lock RT PCRs Done
21,071,665 UART: [art] Populate DV Done
21,077,045 UART: [fht] FMC Alias Private Key: 7
21,078,540 UART: [art] Derive CDI
21,079,306 UART: [art] Store in slot 0x4
21,121,774 UART: [art] Derive Key Pair
21,122,816 UART: [art] Store priv key in slot 0x5
23,549,726 UART: [art] Derive Key Pair - Done
23,562,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,244 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,765 UART: [art] PUB.X = 1C09C1898661A70A3C751FF64DB9442505453349DD7983D1860C3DC03F8FFBDD126E7D383458688F9614467024B94E16
25,277,966 UART: [art] PUB.Y = 71946248291E68164E0648680D58BE4433DA722D4A7D7423F4AA45F256FF458A48EEE467B6B4F45F7F5174258AF651C8
25,285,219 UART: [art] SIG.R = 432F7E0999B6BD0727003F8375D40C670C1EF2921188DD6062AE23D271522384FCE3AD22A6F79D4A44A0F2C2A15D8C00
25,292,567 UART: [art] SIG.S = DE6BC95039168699F34C6BA5493326C444184EEB25EF06D224C92F6AAEE2DE14AAA3028D351B2F07683D8F75941E3D2E
26,271,327 UART: Caliptra RT
26,272,018 UART: [state] CFI Enabled
26,403,834 UART: [rt] RT listening for mailbox commands...
26,435,310 UART: [rt]cmd =0x47544744, len=8
26,437,252 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,899 UART: [kat] SHA2-256
881,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,945 UART: [kat] ++
886,097 UART: [kat] sha1
890,211 UART: [kat] SHA2-256
892,149 UART: [kat] SHA2-384
894,950 UART: [kat] SHA2-512-ACC
896,851 UART: [kat] ECC-384
902,660 UART: [kat] HMAC-384Kdf
907,106 UART: [kat] LMS
1,475,302 UART: [kat] --
1,476,481 UART: [cold-reset] ++
1,476,905 UART: [fht] Storing FHT @ 0x50003400
1,479,484 UART: [idev] ++
1,479,652 UART: [idev] CDI.KEYID = 6
1,480,012 UART: [idev] SUBJECT.KEYID = 7
1,480,436 UART: [idev] UDS.KEYID = 0
1,480,781 ready_for_fw is high
1,480,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,610 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,288 UART: [idev] --
1,514,283 UART: [ldev] ++
1,514,451 UART: [ldev] CDI.KEYID = 6
1,514,814 UART: [ldev] SUBJECT.KEYID = 5
1,515,240 UART: [ldev] AUTHORITY.KEYID = 7
1,515,703 UART: [ldev] FE.KEYID = 1
1,521,055 UART: [ldev] Erasing FE.KEYID = 1
1,546,118 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,878 UART: [ldev] --
1,585,175 UART: [fwproc] Waiting for Commands...
1,585,814 UART: [fwproc] Received command 0x46574c44
1,586,605 UART: [fwproc] Received Image of size 118548 bytes
2,932,035 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,175 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,393 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,770 >>> mbox cmd response: success
3,130,770 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,131,882 UART: [afmc] ++
3,132,050 UART: [afmc] CDI.KEYID = 6
3,132,412 UART: [afmc] SUBJECT.KEYID = 7
3,132,837 UART: [afmc] AUTHORITY.KEYID = 5
3,167,578 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,654 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,434 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,143 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,026 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,709 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,527 UART: [afmc] --
3,210,419 UART: [cold-reset] --
3,211,303 UART: [state] Locking Datavault
3,212,596 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,200 UART: [state] Locking ICCM
3,213,808 UART: [exit] Launching FMC @ 0x40000130
3,219,138 UART:
3,219,154 UART: Running Caliptra FMC ...
3,219,562 UART:
3,219,616 UART: [state] CFI Enabled
3,229,834 UART: [fht] FMC Alias Private Key: 7
3,348,594 UART: [art] Extend RT PCRs Done
3,349,022 UART: [art] Lock RT PCRs Done
3,350,648 UART: [art] Populate DV Done
3,358,871 UART: [fht] FMC Alias Private Key: 7
3,359,803 UART: [art] Derive CDI
3,360,083 UART: [art] Store in slot 0x4
3,445,667 UART: [art] Derive Key Pair
3,446,027 UART: [art] Store priv key in slot 0x5
3,458,946 UART: [art] Derive Key Pair - Done
3,473,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,791 UART: [art] PUB.X = CAA7AB3835E6855A1F3266CF0700E592845CA19D466738A0FCC8ADC1C5790D81A22041B5E06DCBEEBDB9626D0E0F078C
3,496,538 UART: [art] PUB.Y = 78317F9F8710ECB92B9E1BD6CF2C376A45A4C73FA1026475535F026779CC8C16AEE6A22FCEADAC73A7F535036BDD85B2
3,503,493 UART: [art] SIG.R = E5E0EED27F9E326EC0C0BC6E77FF1F6664C796FA61B7EFD8239142C9ED1CEA8793DF30E57E10749D7F423F90DEF12D5D
3,510,283 UART: [art] SIG.S = E0CE45E42ED75350EC5B49E7CCC78C1F06A52E6CED25F1516DD8175B2A21D2A563ABDE7439EEF5DB9C6ED79CFD62910A
3,533,911 UART: Caliptra RT
3,534,162 UART: [state] CFI Enabled
3,654,211 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,799 UART: [rt]cmd =0x47544744, len=8
3,686,234 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,455 ready_for_fw is high
1,362,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,494 >>> mbox cmd response: success
2,982,494 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,043,929 UART:
3,043,945 UART: Running Caliptra FMC ...
3,044,353 UART:
3,044,407 UART: [state] CFI Enabled
3,055,059 UART: [fht] FMC Alias Private Key: 7
3,174,583 UART: [art] Extend RT PCRs Done
3,175,011 UART: [art] Lock RT PCRs Done
3,176,523 UART: [art] Populate DV Done
3,184,558 UART: [fht] FMC Alias Private Key: 7
3,185,620 UART: [art] Derive CDI
3,185,900 UART: [art] Store in slot 0x4
3,271,540 UART: [art] Derive Key Pair
3,271,900 UART: [art] Store priv key in slot 0x5
3,284,873 UART: [art] Derive Key Pair - Done
3,299,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,797 UART: [art] PUB.X = EB7EE53B6D43E4F9BBA5979FBB3C5BFA69127ADECC68BB88914E9490915381BCF753058D6ED86EE59CC64CA08970A97B
3,322,582 UART: [art] PUB.Y = D50D9D55C89D9A85276A8B4486E4B991D1A6244C7FCF2BF99A1BC9C18C90F474F2152700702A01E5524926A4E6744733
3,329,500 UART: [art] SIG.R = 1A55BA3AFCF775A975B1FE4627905680C91DB78F05D2CFA6D144ABE763FFC141EFF946B8565017612AD10DEA107A8677
3,336,274 UART: [art] SIG.S = 1EF1E71AE9E063F968F08007A4578FD108D9E99E545411902D46FA7ECBBDD1DD418057F830CBA40475EE533483DC3392
3,359,829 UART: Caliptra RT
3,360,080 UART: [state] CFI Enabled
3,479,329 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,007 UART: [rt]cmd =0x47544744, len=8
3,511,920 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,194 UART: [kat] SHA2-256
882,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,240 UART: [kat] ++
886,392 UART: [kat] sha1
890,490 UART: [kat] SHA2-256
892,428 UART: [kat] SHA2-384
895,123 UART: [kat] SHA2-512-ACC
897,024 UART: [kat] ECC-384
902,761 UART: [kat] HMAC-384Kdf
907,247 UART: [kat] LMS
1,475,443 UART: [kat] --
1,476,428 UART: [cold-reset] ++
1,476,780 UART: [fht] Storing FHT @ 0x50003400
1,479,745 UART: [idev] ++
1,479,913 UART: [idev] CDI.KEYID = 6
1,480,273 UART: [idev] SUBJECT.KEYID = 7
1,480,697 UART: [idev] UDS.KEYID = 0
1,481,042 ready_for_fw is high
1,481,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,681 UART: [idev] Erasing UDS.KEYID = 0
1,505,519 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,115 UART: [idev] --
1,515,254 UART: [ldev] ++
1,515,422 UART: [ldev] CDI.KEYID = 6
1,515,785 UART: [ldev] SUBJECT.KEYID = 5
1,516,211 UART: [ldev] AUTHORITY.KEYID = 7
1,516,674 UART: [ldev] FE.KEYID = 1
1,521,852 UART: [ldev] Erasing FE.KEYID = 1
1,547,225 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,735 UART: [ldev] --
1,586,156 UART: [fwproc] Waiting for Commands...
1,586,827 UART: [fwproc] Received command 0x46574c44
1,587,618 UART: [fwproc] Received Image of size 118548 bytes
2,933,138 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,798 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,016 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,257 >>> mbox cmd response: success
3,131,257 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,132,359 UART: [afmc] ++
3,132,527 UART: [afmc] CDI.KEYID = 6
3,132,889 UART: [afmc] SUBJECT.KEYID = 7
3,133,314 UART: [afmc] AUTHORITY.KEYID = 5
3,168,759 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,941 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,721 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,430 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,313 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,996 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,712 UART: [afmc] --
3,211,670 UART: [cold-reset] --
3,212,520 UART: [state] Locking Datavault
3,213,771 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,375 UART: [state] Locking ICCM
3,214,895 UART: [exit] Launching FMC @ 0x40000130
3,220,225 UART:
3,220,241 UART: Running Caliptra FMC ...
3,220,649 UART:
3,220,792 UART: [state] CFI Enabled
3,231,154 UART: [fht] FMC Alias Private Key: 7
3,350,194 UART: [art] Extend RT PCRs Done
3,350,622 UART: [art] Lock RT PCRs Done
3,351,954 UART: [art] Populate DV Done
3,360,319 UART: [fht] FMC Alias Private Key: 7
3,361,489 UART: [art] Derive CDI
3,361,769 UART: [art] Store in slot 0x4
3,447,649 UART: [art] Derive Key Pair
3,448,009 UART: [art] Store priv key in slot 0x5
3,461,426 UART: [art] Derive Key Pair - Done
3,475,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,196 UART: [art] PUB.X = 61F9D9DC933C9E5DF67E8ED7FE634DA7AB19A66784BD0EF5D889A373B5DA064A68CEA6A24783F85E4CAC83414A7EFE71
3,498,980 UART: [art] PUB.Y = 1F7DDB8CFE1EC73CBFE29EF98DC16393B6EDDEBFEFF16B8A738E4E0BB5C71429563E25F5F873231555ACE79DD8EF84B1
3,505,955 UART: [art] SIG.R = 0F14BC863E95C1DD29FE49BC789D68B259DDC5C7DAAE6C2D001D759CE3959864A846B0EFBF41312C39D93A8DDA3A14EA
3,512,720 UART: [art] SIG.S = 11D31C9232A68EAB845E36AC5386E177A55CEE17C25D7150CD142FE17D5F24FFF902DD3504D7A85C0A49F9C68F1ADD32
3,536,899 UART: Caliptra RT
3,537,242 UART: [state] CFI Enabled
3,658,181 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,473 UART: [rt]cmd =0x47544744, len=8
3,689,980 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,982 ready_for_fw is high
1,362,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,745 >>> mbox cmd response: success
2,982,745 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,044,024 UART:
3,044,040 UART: Running Caliptra FMC ...
3,044,448 UART:
3,044,591 UART: [state] CFI Enabled
3,055,429 UART: [fht] FMC Alias Private Key: 7
3,173,721 UART: [art] Extend RT PCRs Done
3,174,149 UART: [art] Lock RT PCRs Done
3,175,759 UART: [art] Populate DV Done
3,184,044 UART: [fht] FMC Alias Private Key: 7
3,185,174 UART: [art] Derive CDI
3,185,454 UART: [art] Store in slot 0x4
3,271,414 UART: [art] Derive Key Pair
3,271,774 UART: [art] Store priv key in slot 0x5
3,285,025 UART: [art] Derive Key Pair - Done
3,300,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,201 UART: [art] PUB.X = 60A64E983DCB71B6ACDA3A78383A58D4FBB8601EE04124538EAAF2786F21EB56067448888BAAF7CC8023DB2A7D9719D3
3,322,978 UART: [art] PUB.Y = 21097C35FF97EB3B71145DB8D528F03D70C4598F6F7CE00AD89AAA0F3A5F05E34E74AA2369DBFE6078309B925C751A26
3,329,924 UART: [art] SIG.R = 039F6AF084CD7DCE9D7540741912CD0C94A8FAD9FF67DB07B7B4E789E9618FC6630879698235F20360E9194721F41B45
3,336,677 UART: [art] SIG.S = 70207D78AA64A3789FC9FD0853B9B73738037A98E8925E0998797245F0BD05DBB79D17899490DA9013F9BB0553FE9C28
3,360,820 UART: Caliptra RT
3,361,163 UART: [state] CFI Enabled
3,480,642 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,946 UART: [rt]cmd =0x47544744, len=8
3,512,389 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,216 UART: [kat] ++
895,368 UART: [kat] sha1
899,680 UART: [kat] SHA2-256
901,620 UART: [kat] SHA2-384
904,377 UART: [kat] SHA2-512-ACC
906,278 UART: [kat] ECC-384
915,399 UART: [kat] HMAC-384Kdf
920,093 UART: [kat] LMS
1,168,405 UART: [kat] --
1,169,346 UART: [cold-reset] ++
1,169,824 UART: [fht] FHT @ 0x50003400
1,172,618 UART: [idev] ++
1,172,786 UART: [idev] CDI.KEYID = 6
1,173,147 UART: [idev] SUBJECT.KEYID = 7
1,173,572 UART: [idev] UDS.KEYID = 0
1,173,918 ready_for_fw is high
1,173,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,309 UART: [idev] Erasing UDS.KEYID = 0
1,198,433 UART: [idev] Sha1 KeyId Algorithm
1,207,297 UART: [idev] --
1,208,488 UART: [ldev] ++
1,208,656 UART: [ldev] CDI.KEYID = 6
1,209,020 UART: [ldev] SUBJECT.KEYID = 5
1,209,447 UART: [ldev] AUTHORITY.KEYID = 7
1,209,910 UART: [ldev] FE.KEYID = 1
1,215,212 UART: [ldev] Erasing FE.KEYID = 1
1,242,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,390 UART: [ldev] --
1,281,845 UART: [fwproc] Wait for Commands...
1,282,612 UART: [fwproc] Recv command 0x46574c44
1,283,345 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,267 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,442 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,815 >>> mbox cmd response: success
2,826,815 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,827,851 UART: [afmc] ++
2,828,019 UART: [afmc] CDI.KEYID = 6
2,828,382 UART: [afmc] SUBJECT.KEYID = 7
2,828,808 UART: [afmc] AUTHORITY.KEYID = 5
2,864,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,189 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,899 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,780 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,481 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,260 UART: [afmc] --
2,907,321 UART: [cold-reset] --
2,908,269 UART: [state] Locking Datavault
2,909,364 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,968 UART: [state] Locking ICCM
2,910,586 UART: [exit] Launching FMC @ 0x40000130
2,915,916 UART:
2,915,932 UART: Running Caliptra FMC ...
2,916,340 UART:
2,916,394 UART: [state] CFI Enabled
2,926,880 UART: [fht] FMC Alias Private Key: 7
3,046,262 UART: [art] Extend RT PCRs Done
3,046,690 UART: [art] Lock RT PCRs Done
3,048,460 UART: [art] Populate DV Done
3,056,647 UART: [fht] FMC Alias Private Key: 7
3,057,811 UART: [art] Derive CDI
3,058,091 UART: [art] Store in slot 0x4
3,143,400 UART: [art] Derive Key Pair
3,143,760 UART: [art] Store priv key in slot 0x5
3,156,370 UART: [art] Derive Key Pair - Done
3,171,089 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,393 UART: [art] PUB.X = 8A66EEC99D06D6739F10603DA25DE8D8B45D0B25127B5F8991DA3C62B52573BACA816CA49F825AC863552A2A9D87EF0D
3,194,164 UART: [art] PUB.Y = 3AE2A12A8CC3E46DDCC0EB234A632AE505D0449EBCDBF22D7F5FD2E454214B5E95199D0B5E4821D4F80F1D3D216C9BDB
3,201,127 UART: [art] SIG.R = 439FA75244593BD067504D651745B38EAA6C4996C44FD4629A0E09E03708CFC01A62FE5DDA7F65A0E89AE755C67624A0
3,207,890 UART: [art] SIG.S = F50530D6B517E071EFB476C1242B4D018143DF052F8B6BC25104E15E5C6ED031C6968B06B64069638CA721475CB40E14
3,231,160 UART: Caliptra RT
3,231,411 UART: [state] CFI Enabled
3,351,322 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,712 UART: [rt]cmd =0x47544744, len=8
3,383,147 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,394 ready_for_fw is high
1,058,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,290 >>> mbox cmd response: success
2,676,290 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,737,757 UART:
2,737,773 UART: Running Caliptra FMC ...
2,738,181 UART:
2,738,235 UART: [state] CFI Enabled
2,748,677 UART: [fht] FMC Alias Private Key: 7
2,867,935 UART: [art] Extend RT PCRs Done
2,868,363 UART: [art] Lock RT PCRs Done
2,870,127 UART: [art] Populate DV Done
2,878,450 UART: [fht] FMC Alias Private Key: 7
2,879,566 UART: [art] Derive CDI
2,879,846 UART: [art] Store in slot 0x4
2,965,691 UART: [art] Derive Key Pair
2,966,051 UART: [art] Store priv key in slot 0x5
2,979,543 UART: [art] Derive Key Pair - Done
2,994,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,550 UART: [art] PUB.X = 22433B3B8CBE160702EA75BF83857A3297B518D4C91B0DE7F45ECCCFC457B7C0470F0DB857ED29582EBD9CECB8EB7B56
3,017,323 UART: [art] PUB.Y = 71139EEB4C5489B6423700DF256376294594597572E4EEB25AF866193A37DAE4786694DB10C91396AD17D19E37952D52
3,024,239 UART: [art] SIG.R = BFD3585ED0E4BA9D33F8EB844DC8A8D3A0298896BB728B6D1E681DBEA8452B84443ABF1ACA6AEEBB9BD9C934C70EA6F0
3,031,034 UART: [art] SIG.S = 70979E583B1B0B99B8CEBE4D1FDBACA580EAC552CDFBFF7BE84BBCED8C0AA062D9BDD14CEBF464B7F6C525EF9F843A9C
3,055,262 UART: Caliptra RT
3,055,513 UART: [state] CFI Enabled
3,175,626 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,290 UART: [rt]cmd =0x47544744, len=8
3,208,123 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
891,517 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,621 UART: [kat] ++
895,773 UART: [kat] sha1
900,113 UART: [kat] SHA2-256
902,053 UART: [kat] SHA2-384
904,738 UART: [kat] SHA2-512-ACC
906,639 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
920,986 UART: [kat] LMS
1,169,298 UART: [kat] --
1,170,219 UART: [cold-reset] ++
1,170,751 UART: [fht] FHT @ 0x50003400
1,173,305 UART: [idev] ++
1,173,473 UART: [idev] CDI.KEYID = 6
1,173,834 UART: [idev] SUBJECT.KEYID = 7
1,174,259 UART: [idev] UDS.KEYID = 0
1,174,605 ready_for_fw is high
1,174,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,672 UART: [idev] Erasing UDS.KEYID = 0
1,199,788 UART: [idev] Sha1 KeyId Algorithm
1,208,598 UART: [idev] --
1,209,503 UART: [ldev] ++
1,209,671 UART: [ldev] CDI.KEYID = 6
1,210,035 UART: [ldev] SUBJECT.KEYID = 5
1,210,462 UART: [ldev] AUTHORITY.KEYID = 7
1,210,925 UART: [ldev] FE.KEYID = 1
1,216,143 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,325 UART: [ldev] --
1,281,768 UART: [fwproc] Wait for Commands...
1,282,513 UART: [fwproc] Recv command 0x46574c44
1,283,246 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,530 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,705 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,890 >>> mbox cmd response: success
2,826,890 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,827,978 UART: [afmc] ++
2,828,146 UART: [afmc] CDI.KEYID = 6
2,828,509 UART: [afmc] SUBJECT.KEYID = 7
2,828,935 UART: [afmc] AUTHORITY.KEYID = 5
2,864,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,106 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,816 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,697 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,398 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,151 UART: [afmc] --
2,907,074 UART: [cold-reset] --
2,907,882 UART: [state] Locking Datavault
2,909,321 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,925 UART: [state] Locking ICCM
2,910,597 UART: [exit] Launching FMC @ 0x40000130
2,915,927 UART:
2,915,943 UART: Running Caliptra FMC ...
2,916,351 UART:
2,916,494 UART: [state] CFI Enabled
2,927,486 UART: [fht] FMC Alias Private Key: 7
3,046,954 UART: [art] Extend RT PCRs Done
3,047,382 UART: [art] Lock RT PCRs Done
3,048,986 UART: [art] Populate DV Done
3,056,967 UART: [fht] FMC Alias Private Key: 7
3,058,009 UART: [art] Derive CDI
3,058,289 UART: [art] Store in slot 0x4
3,144,036 UART: [art] Derive Key Pair
3,144,396 UART: [art] Store priv key in slot 0x5
3,157,298 UART: [art] Derive Key Pair - Done
3,172,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,372 UART: [art] PUB.X = 37C907D0F202A4A3EB60E224D730B665736153B698A3CB0ABA1B968580B48720D858D1B082083AF420B924448C9E600D
3,195,121 UART: [art] PUB.Y = 0FC0A491155A5A1C45D4D0E336A4E8EE85538E452AE5A285DA9E8D6A7A713AC5CD58AD40AF7EF63EF00A02B4F5E22366
3,202,078 UART: [art] SIG.R = C3243809EB763027F19D4EE58FA87AF945E62E61084CA0E2530B05F83F49583B62EFBF7F1F8957F5C3ADC899D01B38C6
3,208,842 UART: [art] SIG.S = F6099CDA1B6C6DB235C7FD910F5AB390BECED59176C940C02D48AFA0912249A4EAA6D49F08BBFFB9E6AF62106813BEBD
3,232,725 UART: Caliptra RT
3,233,068 UART: [state] CFI Enabled
3,352,460 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,046 UART: [rt]cmd =0x47544744, len=8
3,384,695 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,657 ready_for_fw is high
1,059,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,171 >>> mbox cmd response: success
2,679,171 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,740,574 UART:
2,740,590 UART: Running Caliptra FMC ...
2,740,998 UART:
2,741,141 UART: [state] CFI Enabled
2,752,017 UART: [fht] FMC Alias Private Key: 7
2,871,305 UART: [art] Extend RT PCRs Done
2,871,733 UART: [art] Lock RT PCRs Done
2,873,377 UART: [art] Populate DV Done
2,881,552 UART: [fht] FMC Alias Private Key: 7
2,882,504 UART: [art] Derive CDI
2,882,784 UART: [art] Store in slot 0x4
2,968,739 UART: [art] Derive Key Pair
2,969,099 UART: [art] Store priv key in slot 0x5
2,982,539 UART: [art] Derive Key Pair - Done
2,997,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,712 UART: [art] PUB.X = 761E475BFD80B6C06DC07384E5F3AA3BC84FDDDE35371846C47037257077CF3A96E70C7094911A403DB0E0B7107252A9
3,020,479 UART: [art] PUB.Y = 35E32FA85F416F76F45E4AE8A4F21D28BD5783AC1E782C9CAC565129C441B0B995ED93D6586912C304AFEC1F3EE394C6
3,027,436 UART: [art] SIG.R = 757DDD224421652DBF8DC4528600EA75E1F913880CD3E4575E9490FA49A6893DD2B7ACF704B069B04CBB52FE3B9A82DA
3,034,188 UART: [art] SIG.S = C4CD0F6ABFDB164BFE17973613E2FB19BDA130275303345055425EBE1CA690FEBECFFCE2FDD867D0E58E89A645EEA45B
3,058,218 UART: Caliptra RT
3,058,561 UART: [state] CFI Enabled
3,178,138 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,742 UART: [rt]cmd =0x47544744, len=8
3,210,549 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
893,642 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,767 UART: [kat] ++
897,919 UART: [kat] sha1
902,255 UART: [kat] SHA2-256
904,195 UART: [kat] SHA2-384
907,046 UART: [kat] SHA2-512-ACC
908,947 UART: [kat] ECC-384
918,794 UART: [kat] HMAC-384Kdf
923,504 UART: [kat] LMS
1,171,832 UART: [kat] --
1,172,809 UART: [cold-reset] ++
1,173,157 UART: [fht] FHT @ 0x50003400
1,175,990 UART: [idev] ++
1,176,158 UART: [idev] CDI.KEYID = 6
1,176,518 UART: [idev] SUBJECT.KEYID = 7
1,176,942 UART: [idev] UDS.KEYID = 0
1,177,287 ready_for_fw is high
1,177,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,922 UART: [idev] Erasing UDS.KEYID = 0
1,202,081 UART: [idev] Sha1 KeyId Algorithm
1,210,677 UART: [idev] --
1,211,749 UART: [ldev] ++
1,211,917 UART: [ldev] CDI.KEYID = 6
1,212,280 UART: [ldev] SUBJECT.KEYID = 5
1,212,706 UART: [ldev] AUTHORITY.KEYID = 7
1,213,169 UART: [ldev] FE.KEYID = 1
1,218,509 UART: [ldev] Erasing FE.KEYID = 1
1,244,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,193 UART: [ldev] --
1,283,562 UART: [fwproc] Wait for Commands...
1,284,140 UART: [fwproc] Recv command 0x46574c44
1,284,868 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,184 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,354 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,731 >>> mbox cmd response: success
2,828,731 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,829,785 UART: [afmc] ++
2,829,953 UART: [afmc] CDI.KEYID = 6
2,830,315 UART: [afmc] SUBJECT.KEYID = 7
2,830,740 UART: [afmc] AUTHORITY.KEYID = 5
2,865,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,680 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,389 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,272 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,973 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,919 UART: [afmc] --
2,908,855 UART: [cold-reset] --
2,909,763 UART: [state] Locking Datavault
2,910,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,534 UART: [state] Locking ICCM
2,912,000 UART: [exit] Launching FMC @ 0x40000130
2,917,330 UART:
2,917,346 UART: Running Caliptra FMC ...
2,917,754 UART:
2,917,808 UART: [state] CFI Enabled
2,928,344 UART: [fht] FMC Alias Private Key: 7
3,046,594 UART: [art] Extend RT PCRs Done
3,047,022 UART: [art] Lock RT PCRs Done
3,048,402 UART: [art] Populate DV Done
3,056,657 UART: [fht] FMC Alias Private Key: 7
3,057,689 UART: [art] Derive CDI
3,057,969 UART: [art] Store in slot 0x4
3,143,856 UART: [art] Derive Key Pair
3,144,216 UART: [art] Store priv key in slot 0x5
3,158,204 UART: [art] Derive Key Pair - Done
3,173,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,527 UART: [art] PUB.X = 20E7224D9671EDCBB300781E887B7D08850EE63AF8027EDDC77876CF2FB7772D3885CF2BB29F3611194DE865B1D69633
3,196,268 UART: [art] PUB.Y = 226A287BF050A70F4CA289C3229BCF8683708772405C493C2FDB2B6262F8BDF5FE3F4AC68E7AE7004DC812EFA0364D75
3,203,201 UART: [art] SIG.R = F34ED425204760647F7DF6108AC576E89421CCC0684C28C54FD2E061FAE021E7795C543AF5D34AEE3A2A4D65EAED3EFB
3,209,985 UART: [art] SIG.S = 36C8FD06DE6C9A8EF58714C480A78D9FC0A617C8C3544A43BE9C8B522763D1DE52F49B16A52E3FDF2866674D186F048A
3,233,687 UART: Caliptra RT
3,233,938 UART: [state] CFI Enabled
3,353,845 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,501 UART: [rt]cmd =0x47544744, len=8
3,386,164 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,449 ready_for_fw is high
1,060,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,954 >>> mbox cmd response: success
2,680,954 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,742,811 UART:
2,742,827 UART: Running Caliptra FMC ...
2,743,235 UART:
2,743,289 UART: [state] CFI Enabled
2,753,359 UART: [fht] FMC Alias Private Key: 7
2,872,397 UART: [art] Extend RT PCRs Done
2,872,825 UART: [art] Lock RT PCRs Done
2,874,429 UART: [art] Populate DV Done
2,882,514 UART: [fht] FMC Alias Private Key: 7
2,883,612 UART: [art] Derive CDI
2,883,892 UART: [art] Store in slot 0x4
2,969,651 UART: [art] Derive Key Pair
2,970,011 UART: [art] Store priv key in slot 0x5
2,982,841 UART: [art] Derive Key Pair - Done
2,997,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,132 UART: [art] PUB.X = CFFA080239E84DC60EC60A369E20E7D2A01B1FF290B66A4C8773AA624C39E1344B0339A27980217C76F2B1B96E94F232
3,020,889 UART: [art] PUB.Y = FED069DC912221B6980F9F64E5F9F2A12DC222F04E7A5E854D84D47CD21C29C9300BC43A5B9A8559C0B2EAC4FCDB0252
3,027,844 UART: [art] SIG.R = D53D6D7FBC74356049B0944980CD4F3A7289EC52FDD11B6F1E409BD0A9A9BE178C90AC032516F09A78E69FD20C4D04F3
3,034,615 UART: [art] SIG.S = 439FBCBC7220F13A6CD31FAABF25AF51B12B99FF5D57B0C08444AB1A85B268CCF81DD058F65F2F0BBD90045ABCBB8E0C
3,058,792 UART: Caliptra RT
3,059,043 UART: [state] CFI Enabled
3,178,534 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,068 UART: [rt]cmd =0x47544744, len=8
3,210,965 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
893,665 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,790 UART: [kat] ++
897,942 UART: [kat] sha1
902,182 UART: [kat] SHA2-256
904,122 UART: [kat] SHA2-384
906,715 UART: [kat] SHA2-512-ACC
908,616 UART: [kat] ECC-384
917,867 UART: [kat] HMAC-384Kdf
922,425 UART: [kat] LMS
1,170,753 UART: [kat] --
1,171,752 UART: [cold-reset] ++
1,172,170 UART: [fht] FHT @ 0x50003400
1,174,741 UART: [idev] ++
1,174,909 UART: [idev] CDI.KEYID = 6
1,175,269 UART: [idev] SUBJECT.KEYID = 7
1,175,693 UART: [idev] UDS.KEYID = 0
1,176,038 ready_for_fw is high
1,176,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,861 UART: [idev] Erasing UDS.KEYID = 0
1,200,844 UART: [idev] Sha1 KeyId Algorithm
1,209,348 UART: [idev] --
1,210,258 UART: [ldev] ++
1,210,426 UART: [ldev] CDI.KEYID = 6
1,210,789 UART: [ldev] SUBJECT.KEYID = 5
1,211,215 UART: [ldev] AUTHORITY.KEYID = 7
1,211,678 UART: [ldev] FE.KEYID = 1
1,217,054 UART: [ldev] Erasing FE.KEYID = 1
1,243,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,242 UART: [ldev] --
1,282,681 UART: [fwproc] Wait for Commands...
1,283,259 UART: [fwproc] Recv command 0x46574c44
1,283,987 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,255 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,425 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,614 >>> mbox cmd response: success
2,826,614 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,827,800 UART: [afmc] ++
2,827,968 UART: [afmc] CDI.KEYID = 6
2,828,330 UART: [afmc] SUBJECT.KEYID = 7
2,828,755 UART: [afmc] AUTHORITY.KEYID = 5
2,864,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,597 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,306 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,189 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,890 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,934 UART: [afmc] --
2,908,018 UART: [cold-reset] --
2,908,892 UART: [state] Locking Datavault
2,910,017 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,621 UART: [state] Locking ICCM
2,911,255 UART: [exit] Launching FMC @ 0x40000130
2,916,585 UART:
2,916,601 UART: Running Caliptra FMC ...
2,917,009 UART:
2,917,152 UART: [state] CFI Enabled
2,927,802 UART: [fht] FMC Alias Private Key: 7
3,047,094 UART: [art] Extend RT PCRs Done
3,047,522 UART: [art] Lock RT PCRs Done
3,049,182 UART: [art] Populate DV Done
3,057,307 UART: [fht] FMC Alias Private Key: 7
3,058,397 UART: [art] Derive CDI
3,058,677 UART: [art] Store in slot 0x4
3,144,452 UART: [art] Derive Key Pair
3,144,812 UART: [art] Store priv key in slot 0x5
3,158,206 UART: [art] Derive Key Pair - Done
3,172,936 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,090 UART: [art] PUB.X = 25195C3365494F174E198CC4A7F13648D75FEC42B9B7F47822CBA1DE65148098945133A3454DE47B8A1759120ADD1EDA
3,195,855 UART: [art] PUB.Y = 6AC7CDFC638F1BDE28B385D4A518A12047AD60B95C4EDE1B1B9E3C2C4BE3CD22909F873C776294E45EAD970130AF8513
3,202,816 UART: [art] SIG.R = 44ECA0A94A213518A85DAF908E0BE97E670509626B23D1693D452C8F74EA649DF61017350C72245C559955AEE8F18C45
3,209,570 UART: [art] SIG.S = A060F1F6FB10D74605F4AD9CD728B6838ABD27C2BB1CA00103B432EC8F7EC9AC89FB871EE1446CB64ACBB3BC1FA3FE50
3,233,727 UART: Caliptra RT
3,234,070 UART: [state] CFI Enabled
3,354,117 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,895 UART: [rt]cmd =0x47544744, len=8
3,386,600 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,776 ready_for_fw is high
1,060,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,739 >>> mbox cmd response: success
2,679,739 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,742,156 UART:
2,742,172 UART: Running Caliptra FMC ...
2,742,580 UART:
2,742,723 UART: [state] CFI Enabled
2,753,249 UART: [fht] FMC Alias Private Key: 7
2,872,213 UART: [art] Extend RT PCRs Done
2,872,641 UART: [art] Lock RT PCRs Done
2,874,625 UART: [art] Populate DV Done
2,883,052 UART: [fht] FMC Alias Private Key: 7
2,884,196 UART: [art] Derive CDI
2,884,476 UART: [art] Store in slot 0x4
2,970,497 UART: [art] Derive Key Pair
2,970,857 UART: [art] Store priv key in slot 0x5
2,984,141 UART: [art] Derive Key Pair - Done
2,998,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,391 UART: [art] PUB.X = 61305E8F0840C7D64EEA6FD9AE01FCCA9B49576D9E2E30EB99EAB2F0EE4EBCD7F890EBC1D54BCD96195E410094F7B793
3,022,155 UART: [art] PUB.Y = 2DC2694A0FD6CA9D15B18ECE8F0811DC638B3B4A692A026834620B66F1BCA7474F2D3AF93AE59C9A7BA8491E06AC812B
3,029,104 UART: [art] SIG.R = CE94A5AB8A4208587CA58A67FDBB2CE0A62DD110B6FC2B39EFE28B01F86CDF6F941B6AD33577DE375CD294DD2579F145
3,035,888 UART: [art] SIG.S = 4EE6BA44540A354CC6DFFADACE6168F2B91D7A8827A598C80388ABC7334E25E72EE2C5128362F110B88467CF22273279
3,059,946 UART: Caliptra RT
3,060,289 UART: [state] CFI Enabled
3,179,544 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,384 UART: [rt]cmd =0x47544744, len=8
3,212,113 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,077 UART:
192,444 UART: Running Caliptra ROM ...
193,651 UART:
193,814 UART: [state] CFI Enabled
265,166 UART: [state] LifecycleState = Unprovisioned
267,270 UART: [state] DebugLocked = No
268,390 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,124 UART: [kat] SHA2-256
442,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,287 UART: [kat] ++
453,734 UART: [kat] sha1
464,963 UART: [kat] SHA2-256
467,689 UART: [kat] SHA2-384
473,387 UART: [kat] SHA2-512-ACC
475,770 UART: [kat] ECC-384
2,768,869 UART: [kat] HMAC-384Kdf
2,799,150 UART: [kat] LMS
3,989,518 UART: [kat] --
3,993,813 UART: [cold-reset] ++
3,996,310 UART: [fht] Storing FHT @ 0x50003400
4,007,501 UART: [idev] ++
4,008,078 UART: [idev] CDI.KEYID = 6
4,008,974 UART: [idev] SUBJECT.KEYID = 7
4,010,223 UART: [idev] UDS.KEYID = 0
4,011,221 ready_for_fw is high
4,011,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,537 UART: [idev] Erasing UDS.KEYID = 0
7,360,004 UART: [idev] Using Sha1 for KeyId Algorithm
7,382,103 UART: [idev] --
7,385,935 UART: [ldev] ++
7,386,560 UART: [ldev] CDI.KEYID = 6
7,387,454 UART: [ldev] SUBJECT.KEYID = 5
7,388,674 UART: [ldev] AUTHORITY.KEYID = 7
7,389,870 UART: [ldev] FE.KEYID = 1
7,435,744 UART: [ldev] Erasing FE.KEYID = 1
10,764,979 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,059,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,074,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,089,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,103,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,122,983 UART: [ldev] --
13,128,082 UART: [fwproc] Waiting for Commands...
13,129,798 UART: [fwproc] Received command 0x46574c44
13,131,980 UART: [fwproc] Received Image of size 118548 bytes
17,239,678 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,316,713 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,389,900 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,718,813 >>> mbox cmd response: success
17,719,998 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,722,213 UART: [afmc] ++
17,722,803 UART: [afmc] CDI.KEYID = 6
17,723,688 UART: [afmc] SUBJECT.KEYID = 7
17,724,954 UART: [afmc] AUTHORITY.KEYID = 5
21,087,497 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,382,909 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,385,170 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,399,645 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,414,349 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,428,726 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,449,951 UART: [afmc] --
23,453,491 UART: [cold-reset] --
23,456,702 UART: [state] Locking Datavault
23,461,269 UART: [state] Locking PCR0, PCR1 and PCR31
23,463,021 UART: [state] Locking ICCM
23,465,501 UART: [exit] Launching FMC @ 0x40000130
23,473,937 UART:
23,474,193 UART: Running Caliptra FMC ...
23,475,292 UART:
23,475,463 UART: [state] CFI Enabled
23,543,072 UART: [fht] FMC Alias Private Key: 7
25,904,624 UART: [art] Extend RT PCRs Done
25,905,847 UART: [art] Lock RT PCRs Done
25,907,504 UART: [art] Populate DV Done
25,912,966 UART: [fht] FMC Alias Private Key: 7
25,914,662 UART: [art] Derive CDI
25,915,406 UART: [art] Store in slot 0x4
25,973,502 UART: [art] Derive Key Pair
25,974,538 UART: [art] Store priv key in slot 0x5
29,267,412 UART: [art] Derive Key Pair - Done
29,280,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,569,195 UART: [art] Erasing AUTHORITY.KEYID = 7
31,570,703 UART: [art] PUB.X = 378489A5FB049D8C7DA3B7832B3DEBBDF3B85618062D47175A1931155243DB06E5CB7C7BF5F9BF09B1DD2F40D780AC18
31,577,964 UART: [art] PUB.Y = 60EB56312E56190A22174324DBBE9A71DB183A2B232947BFC42ED3203C86DCAE0F17E377D9D6493DB271EBD1095B280C
31,585,270 UART: [art] SIG.R = 2C1296B1A66C77A919F1D0A3C653E4572895E61AE432B133AF251C144F84823AE08442372A6B7D286D601285B140EB77
31,592,626 UART: [art] SIG.S = 1A967103E4A01F51278D107FB4308EEA81F1B23BA968BF1BFF46C6EE61EB7E2438003959B85C33DDC7B123178DFC522E
32,897,987 UART: Caliptra RT
32,898,701 UART: [state] CFI Enabled
33,074,377 UART: [rt] RT listening for mailbox commands...
33,106,068 UART: [rt]cmd =0x54514754, len=24
33,108,824 >>> mbox cmd response data (8 bytes)
33,109,272 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,139,057 UART: [rt]cmd =0x54514754, len=24
33,141,523 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,783,697 ready_for_fw is high
3,784,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,967,227 >>> mbox cmd response: success
17,968,512 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,651,653 UART:
23,652,060 UART: Running Caliptra FMC ...
23,653,183 UART:
23,653,341 UART: [state] CFI Enabled
23,722,412 UART: [fht] FMC Alias Private Key: 7
26,062,811 UART: [art] Extend RT PCRs Done
26,064,061 UART: [art] Lock RT PCRs Done
26,065,511 UART: [art] Populate DV Done
26,071,007 UART: [fht] FMC Alias Private Key: 7
26,072,709 UART: [art] Derive CDI
26,073,537 UART: [art] Store in slot 0x4
26,131,034 UART: [art] Derive Key Pair
26,132,038 UART: [art] Store priv key in slot 0x5
29,424,950 UART: [art] Derive Key Pair - Done
29,437,924 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,085 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,620 UART: [art] PUB.X = 217D4167DE3456A43FC9143ADF487286080235EDE2C0D3DE0C168C02B44C6C432CAEFD16DFF519DF53C1CC1F36959FED
31,735,889 UART: [art] PUB.Y = C57D2682BC1816D8CFA9656406DF46FA97F44FA786BF423FFD1E4B9B689AC5D6B324CC5FD722006026E5EC299DF36DC9
31,743,106 UART: [art] SIG.R = 3C7C348E391CDB93C344A885D592951BA6584759BC17E9FAC1802B5E2659429B7CC4ABFB267EBB3FB942EE3533EE2A0A
31,750,559 UART: [art] SIG.S = C412FD2DAC9DD8D0E3610C1585B04148176FC9B7B8983C28C589C6ECA85B9253FB87756251463ACCDCF8B69DBC881913
33,055,327 UART: Caliptra RT
33,056,052 UART: [state] CFI Enabled
33,234,258 UART: [rt] RT listening for mailbox commands...
33,265,782 UART: [rt]cmd =0x54514754, len=24
33,268,507 >>> mbox cmd response data (8 bytes)
33,269,032 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,299,065 UART: [rt]cmd =0x54514754, len=24
33,301,636 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,255 UART:
192,636 UART: Running Caliptra ROM ...
193,738 UART:
603,303 UART: [state] CFI Enabled
616,431 UART: [state] LifecycleState = Unprovisioned
618,303 UART: [state] DebugLocked = No
620,410 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,768 UART: [kat] SHA2-256
795,570 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,083 UART: [kat] ++
806,620 UART: [kat] sha1
816,003 UART: [kat] SHA2-256
818,716 UART: [kat] SHA2-384
824,863 UART: [kat] SHA2-512-ACC
827,272 UART: [kat] ECC-384
3,109,866 UART: [kat] HMAC-384Kdf
3,121,531 UART: [kat] LMS
4,311,660 UART: [kat] --
4,315,990 UART: [cold-reset] ++
4,317,495 UART: [fht] Storing FHT @ 0x50003400
4,329,961 UART: [idev] ++
4,330,525 UART: [idev] CDI.KEYID = 6
4,331,494 UART: [idev] SUBJECT.KEYID = 7
4,332,736 UART: [idev] UDS.KEYID = 0
4,333,730 ready_for_fw is high
4,333,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,856 UART: [idev] Erasing UDS.KEYID = 0
7,618,407 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,305 UART: [idev] --
7,644,166 UART: [ldev] ++
7,644,739 UART: [ldev] CDI.KEYID = 6
7,645,669 UART: [ldev] SUBJECT.KEYID = 5
7,646,927 UART: [ldev] AUTHORITY.KEYID = 7
7,648,149 UART: [ldev] FE.KEYID = 1
7,658,767 UART: [ldev] Erasing FE.KEYID = 1
10,944,772 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,388 UART: [ldev] --
13,303,115 UART: [fwproc] Waiting for Commands...
13,306,329 UART: [fwproc] Received command 0x46574c44
13,308,568 UART: [fwproc] Received Image of size 118548 bytes
17,410,718 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,492,533 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,565,716 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,526 >>> mbox cmd response: success
17,894,051 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,896,852 UART: [afmc] ++
17,897,421 UART: [afmc] CDI.KEYID = 6
17,898,354 UART: [afmc] SUBJECT.KEYID = 7
17,899,608 UART: [afmc] AUTHORITY.KEYID = 5
21,213,373 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,507,765 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,018 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,524,464 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,539,212 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,553,668 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,066 UART: [afmc] --
23,580,746 UART: [cold-reset] --
23,584,275 UART: [state] Locking Datavault
23,589,785 UART: [state] Locking PCR0, PCR1 and PCR31
23,591,473 UART: [state] Locking ICCM
23,592,594 UART: [exit] Launching FMC @ 0x40000130
23,600,978 UART:
23,601,210 UART: Running Caliptra FMC ...
23,602,259 UART:
23,602,408 UART: [state] CFI Enabled
23,610,744 UART: [fht] FMC Alias Private Key: 7
25,950,638 UART: [art] Extend RT PCRs Done
25,951,864 UART: [art] Lock RT PCRs Done
25,953,698 UART: [art] Populate DV Done
25,959,101 UART: [fht] FMC Alias Private Key: 7
25,960,735 UART: [art] Derive CDI
25,961,543 UART: [art] Store in slot 0x4
26,003,911 UART: [art] Derive Key Pair
26,004,911 UART: [art] Store priv key in slot 0x5
29,247,078 UART: [art] Derive Key Pair - Done
29,260,079 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,484 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,991 UART: [art] PUB.X = 0063A1EB73469327B175856FB8906A86E08F5555CC9CD13B2E56873B4FD85CF8B9C3B5318C181BDC0968EF49DB07340A
31,549,140 UART: [art] PUB.Y = E796E064B2E4814F0B7C2F8181164FC08F43B0DD73DAFBFDA6DEC16F1396E138672BA133E717F6CEFD9C1AC290B913AC
31,556,433 UART: [art] SIG.R = E0B012EB107DC0F77E396A2CC55C110116E683FEF9CD251339AA59F66CFFE0063173D539EA9DEFC93615DE9667F48062
31,563,825 UART: [art] SIG.S = 1B17C34EBAF6F324720E6326F69C21F364CB17404A9A13846DF6FB88D7CC8BDFE1905509BC67263AD32539DF13C4D779
32,869,025 UART: Caliptra RT
32,869,730 UART: [state] CFI Enabled
33,002,950 UART: [rt] RT listening for mailbox commands...
33,034,586 UART: [rt]cmd =0x54514754, len=24
33,037,118 >>> mbox cmd response data (8 bytes)
33,037,638 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,067,458 UART: [rt]cmd =0x54514754, len=24
33,069,522 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
4,127,158 ready_for_fw is high
4,127,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,298 >>> mbox cmd response: success
18,157,111 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,796,799 UART:
23,797,190 UART: Running Caliptra FMC ...
23,798,384 UART:
23,798,545 UART: [state] CFI Enabled
23,806,452 UART: [fht] FMC Alias Private Key: 7
26,146,613 UART: [art] Extend RT PCRs Done
26,147,874 UART: [art] Lock RT PCRs Done
26,149,618 UART: [art] Populate DV Done
26,155,103 UART: [fht] FMC Alias Private Key: 7
26,156,641 UART: [art] Derive CDI
26,157,454 UART: [art] Store in slot 0x4
26,200,479 UART: [art] Derive Key Pair
26,201,472 UART: [art] Store priv key in slot 0x5
29,443,696 UART: [art] Derive Key Pair - Done
29,456,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,243 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,757 UART: [art] PUB.X = 8A4C847AF845DC5C6BBF4E9217203520D7EF895E22FE56FCFDF6914B8B7B4035DC84E1946EB559462AA109AC41B0BC3D
31,746,009 UART: [art] PUB.Y = 1A6AA2E69E237D4B030AF26326FD2AA9097D302168C2D575C7EB292CCBC4A24121032C83475339E65B91968DD16E2873
31,753,266 UART: [art] SIG.R = AAA831BB101DE25E2344C560A64B20439BFA8710A07B4E9EEBEC85B9AC206F044DCB98749B32A48A1FE41A430F8DFD5A
31,760,649 UART: [art] SIG.S = 8334168AB9E702D8BE4EAEDF7868310EE053E9A817E830FED871C8A94A8B2494E6E1F78CB809496831E915F46F138E00
33,065,815 UART: Caliptra RT
33,066,534 UART: [state] CFI Enabled
33,199,493 UART: [rt] RT listening for mailbox commands...
33,230,802 UART: [rt]cmd =0x54514754, len=24
33,233,438 >>> mbox cmd response data (8 bytes)
33,233,932 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,263,890 UART: [rt]cmd =0x54514754, len=24
33,266,109 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,082 UART:
192,446 UART: Running Caliptra ROM ...
193,551 UART:
193,693 UART: [state] CFI Enabled
263,783 UART: [state] LifecycleState = Unprovisioned
265,749 UART: [state] DebugLocked = No
267,277 UART: [state] WD Timer not started. Device not locked for debugging
270,390 UART: [kat] SHA2-256
450,003 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,791 UART: [kat] ++
461,327 UART: [kat] sha1
472,133 UART: [kat] SHA2-256
474,843 UART: [kat] SHA2-384
480,608 UART: [kat] SHA2-512-ACC
482,995 UART: [kat] ECC-384
2,947,477 UART: [kat] HMAC-384Kdf
2,971,375 UART: [kat] LMS
3,447,824 UART: [kat] --
3,452,201 UART: [cold-reset] ++
3,454,199 UART: [fht] FHT @ 0x50003400
3,466,736 UART: [idev] ++
3,467,303 UART: [idev] CDI.KEYID = 6
3,468,252 UART: [idev] SUBJECT.KEYID = 7
3,469,492 UART: [idev] UDS.KEYID = 0
3,470,463 ready_for_fw is high
3,470,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,709 UART: [idev] Erasing UDS.KEYID = 0
5,984,609 UART: [idev] Sha1 KeyId Algorithm
6,007,896 UART: [idev] --
6,013,247 UART: [ldev] ++
6,013,842 UART: [ldev] CDI.KEYID = 6
6,014,764 UART: [ldev] SUBJECT.KEYID = 5
6,015,926 UART: [ldev] AUTHORITY.KEYID = 7
6,017,215 UART: [ldev] FE.KEYID = 1
6,057,206 UART: [ldev] Erasing FE.KEYID = 1
8,565,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,043 UART: [ldev] --
10,374,781 UART: [fwproc] Wait for Commands...
10,376,698 UART: [fwproc] Recv command 0x46574c44
10,378,691 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,416 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,007,445 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,334,952 >>> mbox cmd response: success
14,335,948 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,339,715 UART: [afmc] ++
14,340,302 UART: [afmc] CDI.KEYID = 6
14,341,320 UART: [afmc] SUBJECT.KEYID = 7
14,342,479 UART: [afmc] AUTHORITY.KEYID = 5
16,878,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,058 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,911 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,957 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,512 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,350 UART: [afmc] --
18,697,531 UART: [cold-reset] --
18,702,101 UART: [state] Locking Datavault
18,708,935 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,700 UART: [state] Locking ICCM
18,713,282 UART: [exit] Launching FMC @ 0x40000130
18,721,672 UART:
18,721,906 UART: Running Caliptra FMC ...
18,723,004 UART:
18,723,167 UART: [state] CFI Enabled
18,776,595 UART: [fht] FMC Alias Private Key: 7
20,542,881 UART: [art] Extend RT PCRs Done
20,544,082 UART: [art] Lock RT PCRs Done
20,545,703 UART: [art] Populate DV Done
20,551,222 UART: [fht] FMC Alias Private Key: 7
20,552,716 UART: [art] Derive CDI
20,553,478 UART: [art] Store in slot 0x4
20,609,728 UART: [art] Derive Key Pair
20,610,722 UART: [art] Store priv key in slot 0x5
23,073,738 UART: [art] Derive Key Pair - Done
23,086,745 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,124 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,609 UART: [art] PUB.X = 2107E5E9E1E9CCF9AF2805ED15CC4E9566A488EA758ECC27F2AAF35B3A7D4DEB9B8D8414F724F69DCCCAF510F858A55A
24,807,965 UART: [art] PUB.Y = 92658ACD6FC076BAB42107F57E1CEB9E184A06562AE531AC3DFDE2803724278A3581A76F797C6D546362E38CABED84E3
24,815,203 UART: [art] SIG.R = 4F17973DEB3CF4183DC4B7D9C59CBED13E1902EDB946675FEE3E3223595E09CF1BC16901F30048CE977B1DE90506DF26
24,822,597 UART: [art] SIG.S = 420A436E60ACAADF86C79A6E190A4298A21674992D6C3B5AB6FF24EFD65B3E8E38ACEA37FB439787CD164365F703178E
25,801,876 UART: Caliptra RT
25,802,599 UART: [state] CFI Enabled
25,981,911 UART: [rt] RT listening for mailbox commands...
26,013,608 UART: [rt]cmd =0x54514754, len=24
26,016,419 >>> mbox cmd response data (8 bytes)
26,016,889 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,047,012 UART: [rt]cmd =0x54514754, len=24
26,049,529 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,463,160 ready_for_fw is high
3,463,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,032 >>> mbox cmd response: success
14,249,255 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,538,894 UART:
18,539,280 UART: Running Caliptra FMC ...
18,540,384 UART:
18,540,535 UART: [state] CFI Enabled
18,603,620 UART: [fht] FMC Alias Private Key: 7
20,369,594 UART: [art] Extend RT PCRs Done
20,370,817 UART: [art] Lock RT PCRs Done
20,372,520 UART: [art] Populate DV Done
20,377,786 UART: [fht] FMC Alias Private Key: 7
20,379,383 UART: [art] Derive CDI
20,380,206 UART: [art] Store in slot 0x4
20,435,600 UART: [art] Derive Key Pair
20,436,599 UART: [art] Store priv key in slot 0x5
22,899,074 UART: [art] Derive Key Pair - Done
22,912,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,089 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,603 UART: [art] PUB.X = 13862FE359CA5B246880A81C20B1A9408CC8A4BF2417AE352C1D2092F704C5B3C9CEFFDECEB8D47984F99E5AE32B4077
24,633,904 UART: [art] PUB.Y = 5499E6916C851F7CFAC1CC7EC0958E29F66C265F294DEBBEB8E6132B84A277567552399A11950E3725EDB787421DF93F
24,641,157 UART: [art] SIG.R = BB4A49C0E51A92794322424E707880FCB90B8F5019BD3B0C366AA410EE58C0EE7F85F235E2A25DE5DEE86CB1C2758183
24,648,560 UART: [art] SIG.S = 836CAD1E017D43B789CB957DD96D1E73C62D1F6B57C5111EBD43B6E68E98E7B7C7A92CAF1A39482F2883D5B25441A331
25,628,160 UART: Caliptra RT
25,628,857 UART: [state] CFI Enabled
25,808,375 UART: [rt] RT listening for mailbox commands...
25,839,951 UART: [rt]cmd =0x54514754, len=24
25,842,691 >>> mbox cmd response data (8 bytes)
25,843,203 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,873,260 UART: [rt]cmd =0x54514754, len=24
25,875,662 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,342 UART:
192,699 UART: Running Caliptra ROM ...
193,879 UART:
603,589 UART: [state] CFI Enabled
618,692 UART: [state] LifecycleState = Unprovisioned
620,644 UART: [state] DebugLocked = No
622,389 UART: [state] WD Timer not started. Device not locked for debugging
626,501 UART: [kat] SHA2-256
806,139 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,899 UART: [kat] ++
817,385 UART: [kat] sha1
828,422 UART: [kat] SHA2-256
831,154 UART: [kat] SHA2-384
838,312 UART: [kat] SHA2-512-ACC
840,578 UART: [kat] ECC-384
3,279,251 UART: [kat] HMAC-384Kdf
3,291,126 UART: [kat] LMS
3,767,569 UART: [kat] --
3,773,411 UART: [cold-reset] ++
3,775,484 UART: [fht] FHT @ 0x50003400
3,787,028 UART: [idev] ++
3,787,607 UART: [idev] CDI.KEYID = 6
3,788,640 UART: [idev] SUBJECT.KEYID = 7
3,789,818 UART: [idev] UDS.KEYID = 0
3,790,744 ready_for_fw is high
3,790,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,792 UART: [idev] Erasing UDS.KEYID = 0
6,273,134 UART: [idev] Sha1 KeyId Algorithm
6,295,813 UART: [idev] --
6,301,342 UART: [ldev] ++
6,301,920 UART: [ldev] CDI.KEYID = 6
6,302,838 UART: [ldev] SUBJECT.KEYID = 5
6,304,054 UART: [ldev] AUTHORITY.KEYID = 7
6,305,293 UART: [ldev] FE.KEYID = 1
6,316,265 UART: [ldev] Erasing FE.KEYID = 1
8,796,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,201 UART: [ldev] --
10,590,105 UART: [fwproc] Wait for Commands...
10,592,213 UART: [fwproc] Recv command 0x46574c44
10,594,226 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,962 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,970 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,745 >>> mbox cmd response: success
14,559,900 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,562,922 UART: [afmc] ++
14,563,506 UART: [afmc] CDI.KEYID = 6
14,564,532 UART: [afmc] SUBJECT.KEYID = 7
14,565,691 UART: [afmc] AUTHORITY.KEYID = 5
17,063,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,654 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,469 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,543 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,121 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,859,212 UART: [afmc] --
18,863,911 UART: [cold-reset] --
18,868,372 UART: [state] Locking Datavault
18,874,755 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,511 UART: [state] Locking ICCM
18,878,498 UART: [exit] Launching FMC @ 0x40000130
18,886,902 UART:
18,887,138 UART: Running Caliptra FMC ...
18,888,245 UART:
18,888,410 UART: [state] CFI Enabled
18,896,349 UART: [fht] FMC Alias Private Key: 7
20,662,532 UART: [art] Extend RT PCRs Done
20,663,755 UART: [art] Lock RT PCRs Done
20,665,708 UART: [art] Populate DV Done
20,671,006 UART: [fht] FMC Alias Private Key: 7
20,672,548 UART: [art] Derive CDI
20,673,382 UART: [art] Store in slot 0x4
20,716,308 UART: [art] Derive Key Pair
20,717,354 UART: [art] Store priv key in slot 0x5
23,144,570 UART: [art] Derive Key Pair - Done
23,157,237 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,129 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,628 UART: [art] PUB.X = AA1AB021E8B1A253174A60323F6B442AF0277EC93D05DB20D43A5D092D768189D17B9DE8E6E3A60A6D723F4DF7984AD8
24,871,919 UART: [art] PUB.Y = 1502729600BD37D9D3D4A4D86304F2C0DE85A018F429EA92E98EAB31B1BB37F13EDA3C4074C2955E230D0190D2AC6346
24,879,143 UART: [art] SIG.R = 485145A5D5D7A8D1B229A2037699B590D972DFDF0453CBF8ABD00FF43CF31D0381F84011B67680C3039610C2A5B8840F
24,886,531 UART: [art] SIG.S = 7BF0FEA5B0D2843F8E87FD1DFCFEB3AAF6E0660929142CC79A3719D1D932424C52BAEA0F3FE4FB412BE43E6665AB295B
25,865,264 UART: Caliptra RT
25,865,975 UART: [state] CFI Enabled
25,999,033 UART: [rt] RT listening for mailbox commands...
26,030,343 UART: [rt]cmd =0x54514754, len=24
26,032,986 >>> mbox cmd response data (8 bytes)
26,033,508 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,063,223 UART: [rt]cmd =0x54514754, len=24
26,065,340 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,860 writing to cptra_bootfsm_go
3,789,400 ready_for_fw is high
3,789,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,624 >>> mbox cmd response: success
14,456,958 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,702,526 UART:
18,702,923 UART: Running Caliptra FMC ...
18,704,067 UART:
18,704,230 UART: [state] CFI Enabled
18,712,065 UART: [fht] FMC Alias Private Key: 7
20,477,987 UART: [art] Extend RT PCRs Done
20,479,233 UART: [art] Lock RT PCRs Done
20,481,016 UART: [art] Populate DV Done
20,486,256 UART: [fht] FMC Alias Private Key: 7
20,487,804 UART: [art] Derive CDI
20,488,544 UART: [art] Store in slot 0x4
20,531,299 UART: [art] Derive Key Pair
20,532,303 UART: [art] Store priv key in slot 0x5
22,958,964 UART: [art] Derive Key Pair - Done
22,972,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,881 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,393 UART: [art] PUB.X = 4DAE33E9BA4B56115D043F11A9BA02770ED5A77A592F6C6BE9F49240452B094EBCBDCA1AD0E821F44D90AA914622E6C4
24,686,657 UART: [art] PUB.Y = ACC5E077A5BB939AD9CE2C2471E30D0EE26CDEA2E2BC270A9F447FDBDC2D27F892AAC10976EA7D56DD2588886C8581EB
24,693,968 UART: [art] SIG.R = 12612A6E8002A943443D614B3DB4BABA31C8FB78FA05124F0DBC7C81F4FD8DAB580EEF12E1EB68377A934E8C62FF6217
24,701,370 UART: [art] SIG.S = BF30039C50C9FA9B5E4C8721DF4874E5A5E8490E8486F5B5040675551430FEAE138231CCEBA3D60F5ED092DC8C7AEC5B
25,680,092 UART: Caliptra RT
25,680,795 UART: [state] CFI Enabled
25,814,451 UART: [rt] RT listening for mailbox commands...
25,846,360 UART: [rt]cmd =0x54514754, len=24
25,849,079 >>> mbox cmd response data (8 bytes)
25,849,601 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,879,656 UART: [rt]cmd =0x54514754, len=24
25,882,164 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,141 UART:
192,503 UART: Running Caliptra ROM ...
193,690 UART:
193,845 UART: [state] CFI Enabled
263,317 UART: [state] LifecycleState = Unprovisioned
265,727 UART: [state] DebugLocked = No
268,539 UART: [state] WD Timer not started. Device not locked for debugging
273,446 UART: [kat] SHA2-256
463,369 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,115 UART: [kat] ++
474,760 UART: [kat] sha1
486,770 UART: [kat] SHA2-256
489,787 UART: [kat] SHA2-384
497,050 UART: [kat] SHA2-512-ACC
499,627 UART: [kat] ECC-384
2,946,459 UART: [kat] HMAC-384Kdf
2,971,423 UART: [kat] LMS
3,503,231 UART: [kat] --
3,507,934 UART: [cold-reset] ++
3,510,506 UART: [fht] FHT @ 0x50003400
3,520,997 UART: [idev] ++
3,521,739 UART: [idev] CDI.KEYID = 6
3,522,655 UART: [idev] SUBJECT.KEYID = 7
3,523,847 UART: [idev] UDS.KEYID = 0
3,524,775 ready_for_fw is high
3,524,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,960 UART: [idev] Erasing UDS.KEYID = 0
6,028,607 UART: [idev] Sha1 KeyId Algorithm
6,050,706 UART: [idev] --
6,054,805 UART: [ldev] ++
6,055,480 UART: [ldev] CDI.KEYID = 6
6,056,390 UART: [ldev] SUBJECT.KEYID = 5
6,057,601 UART: [ldev] AUTHORITY.KEYID = 7
6,058,830 UART: [ldev] FE.KEYID = 1
6,100,647 UART: [ldev] Erasing FE.KEYID = 1
8,608,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,217 UART: [ldev] --
10,415,712 UART: [fwproc] Wait for Commands...
10,417,809 UART: [fwproc] Recv command 0x46574c44
10,420,062 UART: [fwproc] Recv'd Img size: 118548 bytes
13,922,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,990 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,125,620 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,685,383 >>> mbox cmd response: success
14,686,470 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,689,555 UART: [afmc] ++
14,690,238 UART: [afmc] CDI.KEYID = 6
14,691,473 UART: [afmc] SUBJECT.KEYID = 7
14,692,914 UART: [afmc] AUTHORITY.KEYID = 5
17,235,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,890 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,003 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,162 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,037 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,703 UART: [afmc] --
19,034,296 UART: [cold-reset] --
19,038,084 UART: [state] Locking Datavault
19,044,747 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,938 UART: [state] Locking ICCM
19,049,249 UART: [exit] Launching FMC @ 0x40000130
19,057,915 UART:
19,058,148 UART: Running Caliptra FMC ...
19,059,249 UART:
19,059,411 UART: [state] CFI Enabled
19,116,231 UART: [fht] FMC Alias Private Key: 7
20,882,853 UART: [art] Extend RT PCRs Done
20,884,098 UART: [art] Lock RT PCRs Done
20,885,484 UART: [art] Populate DV Done
20,890,787 UART: [fht] FMC Alias Private Key: 7
20,892,313 UART: [art] Derive CDI
20,893,043 UART: [art] Store in slot 0x4
20,949,027 UART: [art] Derive Key Pair
20,950,019 UART: [art] Store priv key in slot 0x5
23,412,503 UART: [art] Derive Key Pair - Done
23,425,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,085 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,601 UART: [art] PUB.X = BA893930BD273E831C9185D1F876DB4BE4CDDDAFC437347D527996B973F8C8012FA9A9F7AC884893D5302FD73356963F
25,147,823 UART: [art] PUB.Y = 67737694922201C8882F785831B8B9365959F7122A872169D4D52739F8ADFAE730B7D656BA5569D8BF06928BC4329DCD
25,155,083 UART: [art] SIG.R = 6BC98EBD7EE7C59393981BC1DA389A9E4C6CC3C73C975BECD732596B378970B8CA84B80A0BFECF7A560DDC63F4F1850A
25,162,446 UART: [art] SIG.S = 547A0164DC7CB30E082D434E0681CDD5B689E3A03004CA87AA4821FFE11FD5F4E4B8206575C8DA5BAD813CBFCA34325E
26,141,291 UART: Caliptra RT
26,142,005 UART: [state] CFI Enabled
26,320,496 UART: [rt] RT listening for mailbox commands...
26,351,970 UART: [rt]cmd =0x54514754, len=24
26,354,931 >>> mbox cmd response data (8 bytes)
26,355,397 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,385,236 UART: [rt]cmd =0x54514754, len=24
26,387,640 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,439,945 ready_for_fw is high
3,440,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,806,554 >>> mbox cmd response: success
14,807,978 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,088,759 UART:
19,089,163 UART: Running Caliptra FMC ...
19,090,303 UART:
19,090,465 UART: [state] CFI Enabled
19,158,159 UART: [fht] FMC Alias Private Key: 7
20,924,811 UART: [art] Extend RT PCRs Done
20,926,039 UART: [art] Lock RT PCRs Done
20,927,581 UART: [art] Populate DV Done
20,933,112 UART: [fht] FMC Alias Private Key: 7
20,934,760 UART: [art] Derive CDI
20,935,580 UART: [art] Store in slot 0x4
20,990,606 UART: [art] Derive Key Pair
20,991,651 UART: [art] Store priv key in slot 0x5
23,454,530 UART: [art] Derive Key Pair - Done
23,467,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,179,454 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,959 UART: [art] PUB.X = 3FEDFEA50B59A2B3E802AC156CF2AD3655C66037EC33F7E5E5405DAA5ADC0DBD462BDE3B93317A83A46CA66258EB0544
25,188,224 UART: [art] PUB.Y = 41F7EF4C066959B3C11AF168D4AB6280A7D77EFA9D47F9C1257CDD3768D45981F6AF2314FDE64BC6BE42EED6E3FED68E
25,195,537 UART: [art] SIG.R = 191D0C65F7EC134132FDC12D6C2BF23FF6F6D37791B08072664B37E8EB07CEC350730C1A963D6D7444F1173A72CB2A75
25,202,934 UART: [art] SIG.S = 9679E326F34EEC42FCD3DBCC56EB9510E598C8237314E8C26BABD6E313995BFB5E0386AF2FA31BB67D64D6D599445A21
26,182,041 UART: Caliptra RT
26,182,756 UART: [state] CFI Enabled
26,363,287 UART: [rt] RT listening for mailbox commands...
26,394,938 UART: [rt]cmd =0x54514754, len=24
26,397,635 >>> mbox cmd response data (8 bytes)
26,398,133 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,427,976 UART: [rt]cmd =0x54514754, len=24
26,430,367 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,565 UART:
192,933 UART: Running Caliptra ROM ...
194,126 UART:
603,555 UART: [state] CFI Enabled
616,518 UART: [state] LifecycleState = Unprovisioned
618,892 UART: [state] DebugLocked = No
620,981 UART: [state] WD Timer not started. Device not locked for debugging
625,809 UART: [kat] SHA2-256
815,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,454 UART: [kat] ++
826,982 UART: [kat] sha1
838,071 UART: [kat] SHA2-256
841,090 UART: [kat] SHA2-384
847,090 UART: [kat] SHA2-512-ACC
849,607 UART: [kat] ECC-384
3,289,309 UART: [kat] HMAC-384Kdf
3,302,538 UART: [kat] LMS
3,834,408 UART: [kat] --
3,838,220 UART: [cold-reset] ++
3,840,509 UART: [fht] FHT @ 0x50003400
3,851,772 UART: [idev] ++
3,852,481 UART: [idev] CDI.KEYID = 6
3,853,397 UART: [idev] SUBJECT.KEYID = 7
3,854,643 UART: [idev] UDS.KEYID = 0
3,855,591 ready_for_fw is high
3,855,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,757 UART: [idev] Erasing UDS.KEYID = 0
6,332,748 UART: [idev] Sha1 KeyId Algorithm
6,355,676 UART: [idev] --
6,361,456 UART: [ldev] ++
6,362,138 UART: [ldev] CDI.KEYID = 6
6,363,053 UART: [ldev] SUBJECT.KEYID = 5
6,364,265 UART: [ldev] AUTHORITY.KEYID = 7
6,365,443 UART: [ldev] FE.KEYID = 1
6,375,629 UART: [ldev] Erasing FE.KEYID = 1
8,849,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,539 UART: [ldev] --
10,637,818 UART: [fwproc] Wait for Commands...
10,639,573 UART: [fwproc] Recv command 0x46574c44
10,641,838 UART: [fwproc] Recv'd Img size: 118548 bytes
14,131,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,209,973 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,333,591 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,893,019 >>> mbox cmd response: success
14,894,202 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,896,904 UART: [afmc] ++
14,897,597 UART: [afmc] CDI.KEYID = 6
14,898,839 UART: [afmc] SUBJECT.KEYID = 7
14,900,277 UART: [afmc] AUTHORITY.KEYID = 5
17,407,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,127,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,129,508 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,144,616 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,159,742 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,174,650 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,199,861 UART: [afmc] --
19,202,956 UART: [cold-reset] --
19,208,884 UART: [state] Locking Datavault
19,215,179 UART: [state] Locking PCR0, PCR1 and PCR31
19,217,380 UART: [state] Locking ICCM
19,219,890 UART: [exit] Launching FMC @ 0x40000130
19,228,515 UART:
19,228,755 UART: Running Caliptra FMC ...
19,229,861 UART:
19,230,021 UART: [state] CFI Enabled
19,238,076 UART: [fht] FMC Alias Private Key: 7
21,004,294 UART: [art] Extend RT PCRs Done
21,005,520 UART: [art] Lock RT PCRs Done
21,007,145 UART: [art] Populate DV Done
21,012,671 UART: [fht] FMC Alias Private Key: 7
21,014,328 UART: [art] Derive CDI
21,015,069 UART: [art] Store in slot 0x4
21,057,772 UART: [art] Derive Key Pair
21,058,816 UART: [art] Store priv key in slot 0x5
23,485,639 UART: [art] Derive Key Pair - Done
23,498,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,334 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,842 UART: [art] PUB.X = C2774E023617F36110A0EB639BA51C37EE83589C4761BBF203EF277FFD4DD138426F88A55C17E112FCD17525EA4349E8
25,214,050 UART: [art] PUB.Y = 9FCE536AC25AE33B29F4ED13CB33B83EB67F22585551B1A08495DB09D8726190AFFADAE8CCE8E073D0BA009537F4F41A
25,221,305 UART: [art] SIG.R = 927FA3365E7FAD4BC49641A1676EBF184F0A1871CB82E38AB1E01B581DDB1718C3C5FC243DD0887746AAB13B1DC18B0A
25,228,733 UART: [art] SIG.S = B702405658798AC0AB8C85EA83038ABF918952E64B52FEE7E16B17DD6E7A06C7154622C78E587E66F33FC53CDD3F4B0B
26,207,332 UART: Caliptra RT
26,208,041 UART: [state] CFI Enabled
26,339,861 UART: [rt] RT listening for mailbox commands...
26,371,561 UART: [rt]cmd =0x54514754, len=24
26,374,428 >>> mbox cmd response data (8 bytes)
26,374,951 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,405,143 UART: [rt]cmd =0x54514754, len=24
26,407,527 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,756,901 ready_for_fw is high
3,757,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,368 >>> mbox cmd response: success
15,046,796 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,300,172 UART:
19,300,574 UART: Running Caliptra FMC ...
19,301,734 UART:
19,301,900 UART: [state] CFI Enabled
19,309,692 UART: [fht] FMC Alias Private Key: 7
21,075,869 UART: [art] Extend RT PCRs Done
21,077,095 UART: [art] Lock RT PCRs Done
21,078,837 UART: [art] Populate DV Done
21,084,427 UART: [fht] FMC Alias Private Key: 7
21,086,085 UART: [art] Derive CDI
21,086,909 UART: [art] Store in slot 0x4
21,129,239 UART: [art] Derive Key Pair
21,130,245 UART: [art] Store priv key in slot 0x5
23,556,991 UART: [art] Derive Key Pair - Done
23,569,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,535 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,043 UART: [art] PUB.X = 3B30576B7818AF640C3777B62910DDC491B45EFD1593D45B04B7E781C2F7A2CCF4B501A2F86BEA9EF3B98D6FEE45809F
25,285,299 UART: [art] PUB.Y = E54F8163B75C50314FB8AAB08A785AFEAD5FDEBBC48686497D9C3C8E070A49C1E9A967F2C73926D14D7C32F3959CF791
25,292,562 UART: [art] SIG.R = BE3E6E00CDD70FFE36E8A71A01283D7CB9C75DD75AA4CDE0E37D72DE7E1D325683C56AD2618C7DBECEFA3E83FC9EBCA5
25,299,963 UART: [art] SIG.S = A4810372261EAD8549203127CE1546DC6BF5F2C0BC62B9697A22BE6819D5FBFD35E1E449003DD5218C2C53554EE1B926
26,278,987 UART: Caliptra RT
26,279,682 UART: [state] CFI Enabled
26,412,404 UART: [rt] RT listening for mailbox commands...
26,443,795 UART: [rt]cmd =0x54514754, len=24
26,446,246 >>> mbox cmd response data (8 bytes)
26,446,731 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,476,697 UART: [rt]cmd =0x54514754, len=24
26,478,948 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,587 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,157 UART: [kat] SHA2-256
882,088 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,203 UART: [kat] ++
886,355 UART: [kat] sha1
890,573 UART: [kat] SHA2-256
892,511 UART: [kat] SHA2-384
895,248 UART: [kat] SHA2-512-ACC
897,149 UART: [kat] ECC-384
902,712 UART: [kat] HMAC-384Kdf
907,328 UART: [kat] LMS
1,475,524 UART: [kat] --
1,476,427 UART: [cold-reset] ++
1,476,985 UART: [fht] Storing FHT @ 0x50003400
1,479,722 UART: [idev] ++
1,479,890 UART: [idev] CDI.KEYID = 6
1,480,250 UART: [idev] SUBJECT.KEYID = 7
1,480,674 UART: [idev] UDS.KEYID = 0
1,481,019 ready_for_fw is high
1,481,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,902 UART: [idev] Erasing UDS.KEYID = 0
1,505,576 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,244 UART: [idev] --
1,515,325 UART: [ldev] ++
1,515,493 UART: [ldev] CDI.KEYID = 6
1,515,856 UART: [ldev] SUBJECT.KEYID = 5
1,516,282 UART: [ldev] AUTHORITY.KEYID = 7
1,516,745 UART: [ldev] FE.KEYID = 1
1,522,025 UART: [ldev] Erasing FE.KEYID = 1
1,547,176 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,172 UART: [ldev] --
1,586,547 UART: [fwproc] Waiting for Commands...
1,587,302 UART: [fwproc] Received command 0x46574c44
1,588,093 UART: [fwproc] Received Image of size 118548 bytes
2,933,235 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,269 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,878 >>> mbox cmd response: success
3,131,878 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,133,066 UART: [afmc] ++
3,133,234 UART: [afmc] CDI.KEYID = 6
3,133,596 UART: [afmc] SUBJECT.KEYID = 7
3,134,021 UART: [afmc] AUTHORITY.KEYID = 5
3,168,912 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,038 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,818 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,527 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,410 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,093 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,023 UART: [afmc] --
3,212,063 UART: [cold-reset] --
3,213,049 UART: [state] Locking Datavault
3,214,174 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,778 UART: [state] Locking ICCM
3,215,430 UART: [exit] Launching FMC @ 0x40000130
3,220,760 UART:
3,220,776 UART: Running Caliptra FMC ...
3,221,184 UART:
3,221,238 UART: [state] CFI Enabled
3,231,812 UART: [fht] FMC Alias Private Key: 7
3,350,560 UART: [art] Extend RT PCRs Done
3,350,988 UART: [art] Lock RT PCRs Done
3,352,900 UART: [art] Populate DV Done
3,361,267 UART: [fht] FMC Alias Private Key: 7
3,362,399 UART: [art] Derive CDI
3,362,679 UART: [art] Store in slot 0x4
3,448,377 UART: [art] Derive Key Pair
3,448,737 UART: [art] Store priv key in slot 0x5
3,462,236 UART: [art] Derive Key Pair - Done
3,476,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,702 UART: [art] PUB.X = 9AC006FB1E85ACBA39F2D86BD5D19E4036ADFC5DC99F3C919FD6A8B7A094ACAB7827BD121721E2595E72EBFDE9FF590D
3,499,492 UART: [art] PUB.Y = 384BF499E0130BD4355B257603824A6EC75DC5482628119A09CC24EAF46FD3AFFD674AE45ACCAE234E1DE71C0DE653F2
3,506,442 UART: [art] SIG.R = 3C480066C77E523218204477AFBFAA28A6F4AC62E05FDE068969735BE0E661F7D262006C390FE8A45A029753F9E70B9C
3,513,156 UART: [art] SIG.S = 55C0787FCF67746E7BACE50AA33AF1AE66B616E9CD7207A9D6FB494FAC7A33EC2C9BB7283899BB3308276392BF4EC5A0
3,537,143 UART: Caliptra RT
3,537,394 UART: [state] CFI Enabled
3,657,587 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,911 UART: [rt]cmd =0x54514754, len=24
3,689,940 >>> mbox cmd response data (8 bytes)
3,689,941 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,638 UART: [rt]cmd =0x54514754, len=24
3,721,701 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,967 ready_for_fw is high
1,362,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,492 >>> mbox cmd response: success
2,979,492 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,041,031 UART:
3,041,047 UART: Running Caliptra FMC ...
3,041,455 UART:
3,041,509 UART: [state] CFI Enabled
3,052,445 UART: [fht] FMC Alias Private Key: 7
3,171,981 UART: [art] Extend RT PCRs Done
3,172,409 UART: [art] Lock RT PCRs Done
3,174,177 UART: [art] Populate DV Done
3,182,372 UART: [fht] FMC Alias Private Key: 7
3,183,326 UART: [art] Derive CDI
3,183,606 UART: [art] Store in slot 0x4
3,269,412 UART: [art] Derive Key Pair
3,269,772 UART: [art] Store priv key in slot 0x5
3,282,423 UART: [art] Derive Key Pair - Done
3,297,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,805 UART: [art] PUB.X = 7D29FA3DE26F21B4936A18B3B76FE07462E4480DCA379A8C1CECF23A1790A6328EDBBC532DBE50E44655A760953A8C9F
3,319,584 UART: [art] PUB.Y = 5B4C4B7D20FE47053A3E62AD44EF3EB23E885DA358C95F30C5BAE1A49FBB9C653887178A3554F27E5228D58D38DB11AE
3,326,543 UART: [art] SIG.R = C1CF38FBAA801911E31F709CF8A4162917F4BEBD4F92701519EE8A7EACE739714EFF39CE3E3A4627E7A7956E1B493F17
3,333,325 UART: [art] SIG.S = 18FCD53467BB39590CC02C2DA95257B5F1AE1AC886417E98390197445CED2A64ADE8128BBAC4956B303C25C73D1401F0
3,357,022 UART: Caliptra RT
3,357,273 UART: [state] CFI Enabled
3,477,537 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,191 UART: [rt]cmd =0x54514754, len=24
3,510,344 >>> mbox cmd response data (8 bytes)
3,510,345 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,820 UART: [rt]cmd =0x54514754, len=24
3,542,017 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,897 UART: [state] LifecycleState = Unprovisioned
85,552 UART: [state] DebugLocked = No
86,108 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,710 UART: [kat] SHA2-256
881,641 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,756 UART: [kat] ++
885,908 UART: [kat] sha1
890,080 UART: [kat] SHA2-256
892,018 UART: [kat] SHA2-384
894,751 UART: [kat] SHA2-512-ACC
896,652 UART: [kat] ECC-384
902,585 UART: [kat] HMAC-384Kdf
907,217 UART: [kat] LMS
1,475,413 UART: [kat] --
1,476,190 UART: [cold-reset] ++
1,476,706 UART: [fht] Storing FHT @ 0x50003400
1,479,347 UART: [idev] ++
1,479,515 UART: [idev] CDI.KEYID = 6
1,479,875 UART: [idev] SUBJECT.KEYID = 7
1,480,299 UART: [idev] UDS.KEYID = 0
1,480,644 ready_for_fw is high
1,480,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,229 UART: [idev] Erasing UDS.KEYID = 0
1,504,925 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,665 UART: [idev] --
1,514,694 UART: [ldev] ++
1,514,862 UART: [ldev] CDI.KEYID = 6
1,515,225 UART: [ldev] SUBJECT.KEYID = 5
1,515,651 UART: [ldev] AUTHORITY.KEYID = 7
1,516,114 UART: [ldev] FE.KEYID = 1
1,521,302 UART: [ldev] Erasing FE.KEYID = 1
1,546,523 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,369 UART: [ldev] --
1,585,840 UART: [fwproc] Waiting for Commands...
1,586,683 UART: [fwproc] Received command 0x46574c44
1,587,474 UART: [fwproc] Received Image of size 118548 bytes
2,933,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,392 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,610 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,999 >>> mbox cmd response: success
3,131,999 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,133,095 UART: [afmc] ++
3,133,263 UART: [afmc] CDI.KEYID = 6
3,133,625 UART: [afmc] SUBJECT.KEYID = 7
3,134,050 UART: [afmc] AUTHORITY.KEYID = 5
3,169,479 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,599 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,379 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,088 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,971 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,654 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,456 UART: [afmc] --
3,212,400 UART: [cold-reset] --
3,213,234 UART: [state] Locking Datavault
3,214,435 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,039 UART: [state] Locking ICCM
3,215,683 UART: [exit] Launching FMC @ 0x40000130
3,221,013 UART:
3,221,029 UART: Running Caliptra FMC ...
3,221,437 UART:
3,221,580 UART: [state] CFI Enabled
3,232,208 UART: [fht] FMC Alias Private Key: 7
3,351,178 UART: [art] Extend RT PCRs Done
3,351,606 UART: [art] Lock RT PCRs Done
3,353,268 UART: [art] Populate DV Done
3,361,347 UART: [fht] FMC Alias Private Key: 7
3,362,421 UART: [art] Derive CDI
3,362,701 UART: [art] Store in slot 0x4
3,448,485 UART: [art] Derive Key Pair
3,448,845 UART: [art] Store priv key in slot 0x5
3,461,792 UART: [art] Derive Key Pair - Done
3,476,469 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,894 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,659 UART: [art] PUB.X = 29C9C474301F5875D238533B0F42F9ED1053897C612D3ADEB376932F5B624237E63D7ABF54C7BD5EB4E8949A2F284AEE
3,499,430 UART: [art] PUB.Y = 8B62AFF2E0C924EB43F6975434D5D4714DFF239E98D7FE9720E31EFBC5E5ABC80F48A6772A801B8B282757485394FEC9
3,506,385 UART: [art] SIG.R = ED70944B93D94D715435108BC4C34BF425F890E08F3791F6A3D46C4720A1731E942B96C82A0C42E1B11C174303057291
3,513,136 UART: [art] SIG.S = F31CBA9A7D423E7F07D71ACF7937D6307EB6FB63038187FDD95D63B9E82206675F7D96CF9174C0ECA86FA750FE9405CC
3,537,160 UART: Caliptra RT
3,537,503 UART: [state] CFI Enabled
3,658,464 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,090 UART: [rt]cmd =0x54514754, len=24
3,691,193 >>> mbox cmd response data (8 bytes)
3,691,194 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,837 UART: [rt]cmd =0x54514754, len=24
3,722,804 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,708 ready_for_fw is high
1,362,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,257 >>> mbox cmd response: success
2,980,257 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,041,860 UART:
3,041,876 UART: Running Caliptra FMC ...
3,042,284 UART:
3,042,427 UART: [state] CFI Enabled
3,053,399 UART: [fht] FMC Alias Private Key: 7
3,172,919 UART: [art] Extend RT PCRs Done
3,173,347 UART: [art] Lock RT PCRs Done
3,175,055 UART: [art] Populate DV Done
3,182,980 UART: [fht] FMC Alias Private Key: 7
3,183,916 UART: [art] Derive CDI
3,184,196 UART: [art] Store in slot 0x4
3,270,198 UART: [art] Derive Key Pair
3,270,558 UART: [art] Store priv key in slot 0x5
3,283,571 UART: [art] Derive Key Pair - Done
3,298,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,432 UART: [art] PUB.X = 2041A87A901D6F7E38528361EE742924A9834F51950454DF21111EF8130A808561ED85334A6CEE15923BF3F5041C8E5B
3,321,183 UART: [art] PUB.Y = 82C23D3BC3B8C21346FD82932FDB9E3BB55269705FE4A80DFFACD61F5539566B4219634D1E9ED0D94C281A532F67359A
3,328,136 UART: [art] SIG.R = 8F7649459BBF2F1997E76B4EE234992B43D342AB67408950A76695D242F09AE1E16CE8BAC356304DEEBC5214AC96AF34
3,334,910 UART: [art] SIG.S = 273343EB7058A300D2E4224D06876E1CB1D26A3DCDFA3BAA0D6F16B9CCCAAAADA4CBD67FF1A9D3CC394CC0F6516B5162
3,358,574 UART: Caliptra RT
3,358,917 UART: [state] CFI Enabled
3,478,967 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,633 UART: [rt]cmd =0x54514754, len=24
3,511,876 >>> mbox cmd response data (8 bytes)
3,511,877 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,126 UART: [rt]cmd =0x54514754, len=24
3,542,923 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,372 UART: [kat] ++
895,524 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,529 UART: [kat] SHA2-512-ACC
906,430 UART: [kat] ECC-384
916,151 UART: [kat] HMAC-384Kdf
920,753 UART: [kat] LMS
1,169,065 UART: [kat] --
1,169,788 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,174,322 ready_for_fw is high
1,174,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,303 UART: [idev] Erasing UDS.KEYID = 0
1,199,495 UART: [idev] Sha1 KeyId Algorithm
1,208,209 UART: [idev] --
1,209,324 UART: [ldev] ++
1,209,492 UART: [ldev] CDI.KEYID = 6
1,209,856 UART: [ldev] SUBJECT.KEYID = 5
1,210,283 UART: [ldev] AUTHORITY.KEYID = 7
1,210,746 UART: [ldev] FE.KEYID = 1
1,216,052 UART: [ldev] Erasing FE.KEYID = 1
1,242,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,338 UART: [ldev] --
1,281,735 UART: [fwproc] Wait for Commands...
1,282,320 UART: [fwproc] Recv command 0x46574c44
1,283,053 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,875 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,050 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,407 >>> mbox cmd response: success
2,824,407 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,825,431 UART: [afmc] ++
2,825,599 UART: [afmc] CDI.KEYID = 6
2,825,962 UART: [afmc] SUBJECT.KEYID = 7
2,826,388 UART: [afmc] AUTHORITY.KEYID = 5
2,861,613 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,985 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,695 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,576 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,277 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,006 UART: [afmc] --
2,904,927 UART: [cold-reset] --
2,905,673 UART: [state] Locking Datavault
2,906,690 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,294 UART: [state] Locking ICCM
2,907,724 UART: [exit] Launching FMC @ 0x40000130
2,913,054 UART:
2,913,070 UART: Running Caliptra FMC ...
2,913,478 UART:
2,913,532 UART: [state] CFI Enabled
2,923,974 UART: [fht] FMC Alias Private Key: 7
3,042,872 UART: [art] Extend RT PCRs Done
3,043,300 UART: [art] Lock RT PCRs Done
3,045,032 UART: [art] Populate DV Done
3,053,259 UART: [fht] FMC Alias Private Key: 7
3,054,325 UART: [art] Derive CDI
3,054,605 UART: [art] Store in slot 0x4
3,140,494 UART: [art] Derive Key Pair
3,140,854 UART: [art] Store priv key in slot 0x5
3,153,962 UART: [art] Derive Key Pair - Done
3,168,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,731 UART: [art] PUB.X = 030F9C49FD750674D675F4D0E3BA963FDA7A13BEC1E90C37A16582442EE6C1BF1D3C8D301083F40C6784EB3180CB5150
3,191,492 UART: [art] PUB.Y = 96297EC4EEFE53D520951603EA8B9336187AB93AE87CE7E2D994CAC6FAC0594BBDB1408BB677F28C161F8D8286E62312
3,198,447 UART: [art] SIG.R = 3107DA9302FD940516F2D78B9EEA42D1E1B81F1737F35C8AEB239FB5E266C9652C35DC130FD77338B40FC5568D8C7282
3,205,206 UART: [art] SIG.S = D1B0754524437224BB77A1543CFB63CA54379BC16271C01D63C1758ECC7BE67E73890BB3E732990637B3ECB1FC2EFFE2
3,229,140 UART: Caliptra RT
3,229,391 UART: [state] CFI Enabled
3,349,504 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,046 UART: [rt]cmd =0x54514754, len=24
3,382,109 >>> mbox cmd response data (8 bytes)
3,382,110 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,487 UART: [rt]cmd =0x54514754, len=24
3,413,430 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,188 ready_for_fw is high
1,059,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,930 >>> mbox cmd response: success
2,677,930 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,941 UART:
2,739,957 UART: Running Caliptra FMC ...
2,740,365 UART:
2,740,419 UART: [state] CFI Enabled
2,750,705 UART: [fht] FMC Alias Private Key: 7
2,869,523 UART: [art] Extend RT PCRs Done
2,869,951 UART: [art] Lock RT PCRs Done
2,871,683 UART: [art] Populate DV Done
2,880,052 UART: [fht] FMC Alias Private Key: 7
2,881,146 UART: [art] Derive CDI
2,881,426 UART: [art] Store in slot 0x4
2,966,831 UART: [art] Derive Key Pair
2,967,191 UART: [art] Store priv key in slot 0x5
2,980,667 UART: [art] Derive Key Pair - Done
2,995,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,925 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,690 UART: [art] PUB.X = 837DDC2C68C574D495FD7D6F23A177BBDB30E3B7FED92A67A9BEB96C144230FC3D3DB19173C1DE6DEB1A0855A46EB037
3,018,477 UART: [art] PUB.Y = B92927820B1BB8543EBAAA9268B85973BC19C03D9BA528B73C7209951C3541ED59573F8043A9B2D0338084F549E922DB
3,025,417 UART: [art] SIG.R = FB17CD7A98184BF856B748D78A5E8131513B8C54F87E996EFA16B9B00455FD0581D459DC69322E9C3F32019A59654443
3,032,174 UART: [art] SIG.S = E2ECE7D24D1C73E0F959019E507F6D5907633C912CD2A0587A589018D1258A95AC65318F3BE41D13BD5441FE9A435B20
3,055,926 UART: Caliptra RT
3,056,177 UART: [state] CFI Enabled
3,176,041 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,889 UART: [rt]cmd =0x54514754, len=24
3,209,182 >>> mbox cmd response data (8 bytes)
3,209,183 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,626 UART: [rt]cmd =0x54514754, len=24
3,240,811 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,346 UART: [state] WD Timer not started. Device not locked for debugging
87,455 UART: [kat] SHA2-256
891,005 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,109 UART: [kat] ++
895,261 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,114 UART: [kat] SHA2-512-ACC
906,015 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,460 UART: [kat] LMS
1,168,772 UART: [kat] --
1,169,731 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,173,103 UART: [idev] ++
1,173,271 UART: [idev] CDI.KEYID = 6
1,173,632 UART: [idev] SUBJECT.KEYID = 7
1,174,057 UART: [idev] UDS.KEYID = 0
1,174,403 ready_for_fw is high
1,174,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,199,594 UART: [idev] Sha1 KeyId Algorithm
1,208,452 UART: [idev] --
1,209,479 UART: [ldev] ++
1,209,647 UART: [ldev] CDI.KEYID = 6
1,210,011 UART: [ldev] SUBJECT.KEYID = 5
1,210,438 UART: [ldev] AUTHORITY.KEYID = 7
1,210,901 UART: [ldev] FE.KEYID = 1
1,216,085 UART: [ldev] Erasing FE.KEYID = 1
1,242,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,147 UART: [ldev] --
1,281,552 UART: [fwproc] Wait for Commands...
1,282,173 UART: [fwproc] Recv command 0x46574c44
1,282,906 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,839 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,902 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,077 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,394 >>> mbox cmd response: success
2,826,394 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,408 UART: [afmc] ++
2,827,576 UART: [afmc] CDI.KEYID = 6
2,827,939 UART: [afmc] SUBJECT.KEYID = 7
2,828,365 UART: [afmc] AUTHORITY.KEYID = 5
2,863,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,265 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,014 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,724 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,605 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,306 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,043 UART: [afmc] --
2,906,942 UART: [cold-reset] --
2,907,674 UART: [state] Locking Datavault
2,908,643 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,247 UART: [state] Locking ICCM
2,909,909 UART: [exit] Launching FMC @ 0x40000130
2,915,239 UART:
2,915,255 UART: Running Caliptra FMC ...
2,915,663 UART:
2,915,806 UART: [state] CFI Enabled
2,926,288 UART: [fht] FMC Alias Private Key: 7
3,046,060 UART: [art] Extend RT PCRs Done
3,046,488 UART: [art] Lock RT PCRs Done
3,048,284 UART: [art] Populate DV Done
3,056,737 UART: [fht] FMC Alias Private Key: 7
3,057,717 UART: [art] Derive CDI
3,057,997 UART: [art] Store in slot 0x4
3,143,762 UART: [art] Derive Key Pair
3,144,122 UART: [art] Store priv key in slot 0x5
3,157,666 UART: [art] Derive Key Pair - Done
3,172,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,576 UART: [art] PUB.X = FA9ADAA08F792331D35F4BE23C7AD189A7C21CEAEB579E08C1CE9A3E6D8B3E45FAC710354FA0E17E361F990B846B7BD0
3,195,362 UART: [art] PUB.Y = 61264F7DD08B8F6C15EC92E4C7E5C25E6F39B2513037C2F0C3FBA62886B109D7C8DC46E77F8B1F8F4DCE3BF4D6137498
3,202,321 UART: [art] SIG.R = B9987C7801D2C525DF7360FF578201858B983C6AA50D33FD2C80383DBDA0AA2F11770F874D792791BB46EB8A8435EEE2
3,209,083 UART: [art] SIG.S = 8334E5F31CE55964BB24C00A70354141558E45856EFD9FAC0C6F1CC8B232896FB2286368C129D15150CEE0B63B6C9906
3,232,326 UART: Caliptra RT
3,232,669 UART: [state] CFI Enabled
3,352,755 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,545 UART: [rt]cmd =0x54514754, len=24
3,385,672 >>> mbox cmd response data (8 bytes)
3,385,673 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,340 UART: [rt]cmd =0x54514754, len=24
3,417,453 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,773 ready_for_fw is high
1,059,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,388 >>> mbox cmd response: success
2,677,388 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,939 UART:
2,739,955 UART: Running Caliptra FMC ...
2,740,363 UART:
2,740,506 UART: [state] CFI Enabled
2,750,770 UART: [fht] FMC Alias Private Key: 7
2,869,600 UART: [art] Extend RT PCRs Done
2,870,028 UART: [art] Lock RT PCRs Done
2,871,294 UART: [art] Populate DV Done
2,879,377 UART: [fht] FMC Alias Private Key: 7
2,880,493 UART: [art] Derive CDI
2,880,773 UART: [art] Store in slot 0x4
2,966,586 UART: [art] Derive Key Pair
2,966,946 UART: [art] Store priv key in slot 0x5
2,980,674 UART: [art] Derive Key Pair - Done
2,995,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,106 UART: [art] PUB.X = B32E58DDE3AB432362818EB74B58E374E2CDC38BF056BDA5D198A603E5C670644728A3BA052B4F6EFFE006F205F719DA
3,018,876 UART: [art] PUB.Y = 3B3F41BCFAC4FE4D15A86DE2420F591D7224A606E8A7F91EC9E75083C8BA0174A8F71507B94A60C65584B8F34AE53F9B
3,025,824 UART: [art] SIG.R = B1F4A33B0663F68000D1F62C69CC68838F9F148C1C10E738724DACC883153852D77824EDD77C93763A81EB9F9211DAA8
3,032,569 UART: [art] SIG.S = DE69471EA68BD83EC521080089B5608C210162AED4D0A253AE27D1D21E93780966DFAD19EC3DB58D5C6E6E275BFA2A63
3,055,994 UART: Caliptra RT
3,056,337 UART: [state] CFI Enabled
3,177,281 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,651 UART: [rt]cmd =0x54514754, len=24
3,209,720 >>> mbox cmd response data (8 bytes)
3,209,721 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,256 UART: [rt]cmd =0x54514754, len=24
3,241,339 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
893,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,571 UART: [kat] ++
897,723 UART: [kat] sha1
901,947 UART: [kat] SHA2-256
903,887 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,034 UART: [kat] HMAC-384Kdf
922,658 UART: [kat] LMS
1,170,986 UART: [kat] --
1,172,003 UART: [cold-reset] ++
1,172,533 UART: [fht] FHT @ 0x50003400
1,175,240 UART: [idev] ++
1,175,408 UART: [idev] CDI.KEYID = 6
1,175,768 UART: [idev] SUBJECT.KEYID = 7
1,176,192 UART: [idev] UDS.KEYID = 0
1,176,537 ready_for_fw is high
1,176,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,124 UART: [idev] Erasing UDS.KEYID = 0
1,201,341 UART: [idev] Sha1 KeyId Algorithm
1,209,801 UART: [idev] --
1,210,831 UART: [ldev] ++
1,210,999 UART: [ldev] CDI.KEYID = 6
1,211,362 UART: [ldev] SUBJECT.KEYID = 5
1,211,788 UART: [ldev] AUTHORITY.KEYID = 7
1,212,251 UART: [ldev] FE.KEYID = 1
1,217,601 UART: [ldev] Erasing FE.KEYID = 1
1,244,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,679 UART: [ldev] --
1,282,950 UART: [fwproc] Wait for Commands...
1,283,672 UART: [fwproc] Recv command 0x46574c44
1,284,400 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,760 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,930 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,247 >>> mbox cmd response: success
2,827,247 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,411 UART: [afmc] ++
2,828,579 UART: [afmc] CDI.KEYID = 6
2,828,941 UART: [afmc] SUBJECT.KEYID = 7
2,829,366 UART: [afmc] AUTHORITY.KEYID = 5
2,864,733 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,118 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,827 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,710 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,411 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,233 UART: [afmc] --
2,908,279 UART: [cold-reset] --
2,909,101 UART: [state] Locking Datavault
2,909,944 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,548 UART: [state] Locking ICCM
2,911,188 UART: [exit] Launching FMC @ 0x40000130
2,916,518 UART:
2,916,534 UART: Running Caliptra FMC ...
2,916,942 UART:
2,916,996 UART: [state] CFI Enabled
2,927,678 UART: [fht] FMC Alias Private Key: 7
3,046,692 UART: [art] Extend RT PCRs Done
3,047,120 UART: [art] Lock RT PCRs Done
3,048,658 UART: [art] Populate DV Done
3,056,991 UART: [fht] FMC Alias Private Key: 7
3,057,981 UART: [art] Derive CDI
3,058,261 UART: [art] Store in slot 0x4
3,143,860 UART: [art] Derive Key Pair
3,144,220 UART: [art] Store priv key in slot 0x5
3,157,492 UART: [art] Derive Key Pair - Done
3,172,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,371 UART: [art] PUB.X = A1B74747038455A699BC1643A696AFA77A0752C3940E15A5E932869FE0ECEFC6B3B797872028B338EBA167810CCD8812
3,195,127 UART: [art] PUB.Y = 24E993E128D66BE6DEEE20B646D3738DD62E77E0440DB0DB45C27CCD8B7C7A7B9EDEA225151C6CDA1DB397B4726F0434
3,202,087 UART: [art] SIG.R = 1DD6AB17823C4D69BFFA8D3E59141C887BE9F51E38E77F3D3B1CE93EFC9F985CA96C49B8BF42B9AC42022F7AC65CFDE9
3,208,878 UART: [art] SIG.S = B40A8941E43B9C5DA34A6D4A38345DE54D2901A333E9F9C54C57D0128BDAD395D9E2727612298038F986655520754359
3,233,204 UART: Caliptra RT
3,233,455 UART: [state] CFI Enabled
3,353,092 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,658 UART: [rt]cmd =0x54514754, len=24
3,386,011 >>> mbox cmd response data (8 bytes)
3,386,012 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,395 UART: [rt]cmd =0x54514754, len=24
3,417,126 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,147 ready_for_fw is high
1,060,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,870 >>> mbox cmd response: success
2,678,870 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,740,217 UART:
2,740,233 UART: Running Caliptra FMC ...
2,740,641 UART:
2,740,695 UART: [state] CFI Enabled
2,751,275 UART: [fht] FMC Alias Private Key: 7
2,870,093 UART: [art] Extend RT PCRs Done
2,870,521 UART: [art] Lock RT PCRs Done
2,872,093 UART: [art] Populate DV Done
2,880,504 UART: [fht] FMC Alias Private Key: 7
2,881,506 UART: [art] Derive CDI
2,881,786 UART: [art] Store in slot 0x4
2,967,623 UART: [art] Derive Key Pair
2,967,983 UART: [art] Store priv key in slot 0x5
2,980,841 UART: [art] Derive Key Pair - Done
2,996,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,461 UART: [art] PUB.X = D5FB01F41BA94670765DF7F4F9B864667C614BD434B3AAD23F49CB180431F8587ACA74F97F7E5C7658D926475455BC77
3,019,227 UART: [art] PUB.Y = E6DEC51BF57A0F915A585797CC8B03F2828A48B804AD2472E62914A20D2907BC6C8A4016604C6AD83044FDBEEBEEFC6F
3,026,176 UART: [art] SIG.R = F684B7DBAE399BCAA50886CFC54552639B9A934EE948EB4C1E12252E1816DE1B08435EDA31CC0D01246578E2ED0CC425
3,032,941 UART: [art] SIG.S = 36D5C6EE51C7D3C01A2F17E91A5962F3C29CC4E3C20ECED6AB82BA689221F3EE142C2C7AEAA5601E456ADA7ABCD70E27
3,056,775 UART: Caliptra RT
3,057,026 UART: [state] CFI Enabled
3,176,681 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,533 UART: [rt]cmd =0x54514754, len=24
3,209,632 >>> mbox cmd response data (8 bytes)
3,209,633 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,066 UART: [rt]cmd =0x54514754, len=24
3,241,071 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
893,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,936 UART: [kat] ++
898,088 UART: [kat] sha1
902,504 UART: [kat] SHA2-256
904,444 UART: [kat] SHA2-384
907,219 UART: [kat] SHA2-512-ACC
909,120 UART: [kat] ECC-384
918,993 UART: [kat] HMAC-384Kdf
923,697 UART: [kat] LMS
1,172,025 UART: [kat] --
1,172,868 UART: [cold-reset] ++
1,173,254 UART: [fht] FHT @ 0x50003400
1,175,849 UART: [idev] ++
1,176,017 UART: [idev] CDI.KEYID = 6
1,176,377 UART: [idev] SUBJECT.KEYID = 7
1,176,801 UART: [idev] UDS.KEYID = 0
1,177,146 ready_for_fw is high
1,177,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,161 UART: [idev] Erasing UDS.KEYID = 0
1,201,894 UART: [idev] Sha1 KeyId Algorithm
1,210,494 UART: [idev] --
1,211,638 UART: [ldev] ++
1,211,806 UART: [ldev] CDI.KEYID = 6
1,212,169 UART: [ldev] SUBJECT.KEYID = 5
1,212,595 UART: [ldev] AUTHORITY.KEYID = 7
1,213,058 UART: [ldev] FE.KEYID = 1
1,218,374 UART: [ldev] Erasing FE.KEYID = 1
1,245,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,812 UART: [ldev] --
1,284,297 UART: [fwproc] Wait for Commands...
1,284,929 UART: [fwproc] Recv command 0x46574c44
1,285,657 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,555 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,725 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,084 >>> mbox cmd response: success
2,829,084 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,830,270 UART: [afmc] ++
2,830,438 UART: [afmc] CDI.KEYID = 6
2,830,800 UART: [afmc] SUBJECT.KEYID = 7
2,831,225 UART: [afmc] AUTHORITY.KEYID = 5
2,866,750 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,733 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,442 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,325 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,026 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,808 UART: [afmc] --
2,909,912 UART: [cold-reset] --
2,910,746 UART: [state] Locking Datavault
2,912,183 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,787 UART: [state] Locking ICCM
2,913,213 UART: [exit] Launching FMC @ 0x40000130
2,918,543 UART:
2,918,559 UART: Running Caliptra FMC ...
2,918,967 UART:
2,919,110 UART: [state] CFI Enabled
2,929,620 UART: [fht] FMC Alias Private Key: 7
3,049,210 UART: [art] Extend RT PCRs Done
3,049,638 UART: [art] Lock RT PCRs Done
3,051,382 UART: [art] Populate DV Done
3,059,773 UART: [fht] FMC Alias Private Key: 7
3,060,901 UART: [art] Derive CDI
3,061,181 UART: [art] Store in slot 0x4
3,146,712 UART: [art] Derive Key Pair
3,147,072 UART: [art] Store priv key in slot 0x5
3,160,634 UART: [art] Derive Key Pair - Done
3,175,198 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,968 UART: [art] PUB.X = F95B803787EA5177692FBDBC2D81D8675D5161A561709E083C9DFF33901D2EE77B103DBFAD04C29D97A9C051D4DD5C23
3,198,740 UART: [art] PUB.Y = B9B262CC82AB6BD954BA1941405A1018C8ED558C78467A1B2101021C292971E2A487AA8A7CB48581BB8CED7FC8DD91AD
3,205,694 UART: [art] SIG.R = 6ABDE6B9E72DABA94A13B696795022298482035BB49BAEC2FBD70FB9E89B5ADD4F606877AB5489563CAB4997063DA7AD
3,212,469 UART: [art] SIG.S = 200C45C97EA4525B7BEAD93689C51B6C879778F5990A7DAB2C7BA90E681F1FC8657A120585E6B8D788080795981B2641
3,235,985 UART: Caliptra RT
3,236,328 UART: [state] CFI Enabled
3,356,374 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,000 UART: [rt]cmd =0x54514754, len=24
3,389,155 >>> mbox cmd response data (8 bytes)
3,389,156 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,567 UART: [rt]cmd =0x54514754, len=24
3,420,444 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,580 ready_for_fw is high
1,060,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,691 >>> mbox cmd response: success
2,678,691 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,534 UART:
2,741,550 UART: Running Caliptra FMC ...
2,741,958 UART:
2,742,101 UART: [state] CFI Enabled
2,752,813 UART: [fht] FMC Alias Private Key: 7
2,871,701 UART: [art] Extend RT PCRs Done
2,872,129 UART: [art] Lock RT PCRs Done
2,873,873 UART: [art] Populate DV Done
2,882,326 UART: [fht] FMC Alias Private Key: 7
2,883,460 UART: [art] Derive CDI
2,883,740 UART: [art] Store in slot 0x4
2,969,021 UART: [art] Derive Key Pair
2,969,381 UART: [art] Store priv key in slot 0x5
2,982,445 UART: [art] Derive Key Pair - Done
2,996,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,306 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,071 UART: [art] PUB.X = D080C595D1A7E203DFEA8036A4311F35B4D9D115219F09768A272835754E4F37ECD07001246EEFACDB9105C8BBBD6EB8
3,019,837 UART: [art] PUB.Y = 6B2D3AAA7B26E4D6FEAEC80420BEE54283ED825956A7A515AF74FBCB9C6168E6D9B7073E5067CA89DBA2BE965C85F583
3,026,799 UART: [art] SIG.R = 6907CAF3F18038B488EE3A03D88372CAE91D9CE8DA358293E49BF3A143CE24B85F93B91C60325670C428BE0D1E1FA9DE
3,033,570 UART: [art] SIG.S = 53A3C0F673A44EDB35CBB31A388114131C00CA4FF4CA347A97AD1376A23D1B738ADF0F9F962C40D64130DC47D39E3250
3,058,231 UART: Caliptra RT
3,058,574 UART: [state] CFI Enabled
3,178,026 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,904 UART: [rt]cmd =0x54514754, len=24
3,210,921 >>> mbox cmd response data (8 bytes)
3,210,922 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,487 UART: [rt]cmd =0x54514754, len=24
3,242,432 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,029 UART:
192,418 UART: Running Caliptra ROM ...
193,526 UART:
193,668 UART: [state] CFI Enabled
267,686 UART: [state] LifecycleState = Unprovisioned
269,673 UART: [state] DebugLocked = No
272,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,287 UART: [kat] SHA2-256
447,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,563 UART: [kat] ++
458,093 UART: [kat] sha1
468,836 UART: [kat] SHA2-256
471,555 UART: [kat] SHA2-384
478,252 UART: [kat] SHA2-512-ACC
480,618 UART: [kat] ECC-384
2,768,876 UART: [kat] HMAC-384Kdf
2,800,639 UART: [kat] LMS
3,990,965 UART: [kat] --
3,995,061 UART: [cold-reset] ++
3,996,217 UART: [fht] Storing FHT @ 0x50003400
4,008,088 UART: [idev] ++
4,008,705 UART: [idev] CDI.KEYID = 6
4,009,649 UART: [idev] SUBJECT.KEYID = 7
4,010,828 UART: [idev] UDS.KEYID = 0
4,011,945 ready_for_fw is high
4,012,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,169 UART: [idev] Erasing UDS.KEYID = 0
7,342,076 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,668 UART: [idev] --
7,368,145 UART: [ldev] ++
7,368,752 UART: [ldev] CDI.KEYID = 6
7,369,772 UART: [ldev] SUBJECT.KEYID = 5
7,370,944 UART: [ldev] AUTHORITY.KEYID = 7
7,372,172 UART: [ldev] FE.KEYID = 1
7,400,099 UART: [ldev] Erasing FE.KEYID = 1
10,732,964 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,208 UART: [ldev] --
13,096,849 UART: [fwproc] Waiting for Commands...
13,098,726 UART: [fwproc] Received command 0x46574c44
13,100,912 UART: [fwproc] Received Image of size 118548 bytes
17,211,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,285,267 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,358,391 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,687,352 >>> mbox cmd response: success
17,688,435 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,690,808 UART: [afmc] ++
17,691,386 UART: [afmc] CDI.KEYID = 6
17,692,400 UART: [afmc] SUBJECT.KEYID = 7
17,693,581 UART: [afmc] AUTHORITY.KEYID = 5
21,048,231 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,350,145 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,352,406 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,366,835 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,381,553 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,395,973 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,416,813 UART: [afmc] --
23,420,407 UART: [cold-reset] --
23,425,835 UART: [state] Locking Datavault
23,429,789 UART: [state] Locking PCR0, PCR1 and PCR31
23,431,541 UART: [state] Locking ICCM
23,432,721 UART: [exit] Launching FMC @ 0x40000130
23,441,121 UART:
23,441,355 UART: Running Caliptra FMC ...
23,442,452 UART:
23,442,633 UART: [state] CFI Enabled
23,510,624 UART: [fht] FMC Alias Private Key: 7
25,851,363 UART: [art] Extend RT PCRs Done
25,852,582 UART: [art] Lock RT PCRs Done
25,854,354 UART: [art] Populate DV Done
25,859,827 UART: [fht] FMC Alias Private Key: 7
25,861,529 UART: [art] Derive CDI
25,862,342 UART: [art] Store in slot 0x4
25,919,832 UART: [art] Derive Key Pair
25,920,826 UART: [art] Store priv key in slot 0x5
29,213,927 UART: [art] Derive Key Pair - Done
29,226,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,516,091 UART: [art] Erasing AUTHORITY.KEYID = 7
31,517,602 UART: [art] PUB.X = F436BD702150FD6AEBE556BA1F9FB68EBE4ACFF12D906F4A8A613362B7B4F6A3203EC2882A30BFA98E1E8FC0DC55B520
31,525,071 UART: [art] PUB.Y = 23102EA275BC640D56CB81972C53334A08DA495FD18DDED0CE893662867A4E595CBDE16E31C311079CC6CDA1887987D6
31,532,179 UART: [art] SIG.R = 3FB8F9639B7DC7842EC0609811265449419DEDF1070F7BC0E0FC32963021F3D3A4A8D056106345E11C034D9A50A2ECD3
31,539,576 UART: [art] SIG.S = 2B3A67CFFCF6E467C2FF4CA9F67FAC10EBD5D7F3005F48B1FA931D10688C8FB273D4FF7B82C03A244788FF7B9D1FE75E
32,844,822 UART: Caliptra RT
32,845,523 UART: [state] CFI Enabled
33,020,759 UART: [rt] RT listening for mailbox commands...
33,052,435 UART: [rt]cmd =0x54514754, len=24
33,055,001 >>> mbox cmd response data (8 bytes)
33,055,480 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,085,470 UART: [rt]cmd =0x47544744, len=8
33,088,564 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
3,784,058 ready_for_fw is high
3,784,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,942,758 >>> mbox cmd response: success
17,944,202 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,625,412 UART:
23,625,830 UART: Running Caliptra FMC ...
23,626,948 UART:
23,627,108 UART: [state] CFI Enabled
23,695,008 UART: [fht] FMC Alias Private Key: 7
26,036,002 UART: [art] Extend RT PCRs Done
26,037,258 UART: [art] Lock RT PCRs Done
26,039,066 UART: [art] Populate DV Done
26,044,399 UART: [fht] FMC Alias Private Key: 7
26,045,989 UART: [art] Derive CDI
26,046,818 UART: [art] Store in slot 0x4
26,103,782 UART: [art] Derive Key Pair
26,104,778 UART: [art] Store priv key in slot 0x5
29,397,245 UART: [art] Derive Key Pair - Done
29,409,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,698,827 UART: [art] Erasing AUTHORITY.KEYID = 7
31,700,341 UART: [art] PUB.X = EC1B8665EE20AEFC62CF672C913648733C6EE32D2501A66C3B6BF42FAE22833A62015F1DA28ED80E1A3F992C58E663F2
31,707,611 UART: [art] PUB.Y = 1DBBB3A3D5AF627B5F89186FDB8C372D2BAF19359F31FCDFF4463E82C0062E786B931D3D39E2F5487F17FDF83334224A
31,714,876 UART: [art] SIG.R = 13382B2406C41E55089EFF7B53DD64CBFC9B409F8E8D471BEAE1A0DBA2F906AE293BB3D57393D8A6DC1F6A0E56074A95
31,722,273 UART: [art] SIG.S = 307BCA8976980C45AA26DD1A3425098CA0E23D14998B40B2242035B94DD39D34D2B00275D2FF69A5CBD015EE3235F97C
33,027,475 UART: Caliptra RT
33,028,194 UART: [state] CFI Enabled
33,204,702 UART: [rt] RT listening for mailbox commands...
33,235,912 UART: [rt]cmd =0x54514754, len=24
33,238,881 >>> mbox cmd response data (8 bytes)
33,239,421 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,269,339 UART: [rt]cmd =0x47544744, len=8
33,272,080 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,524 UART:
192,885 UART: Running Caliptra ROM ...
194,073 UART:
603,730 UART: [state] CFI Enabled
617,786 UART: [state] LifecycleState = Unprovisioned
619,664 UART: [state] DebugLocked = No
622,040 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,199 UART: [kat] SHA2-256
796,967 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,476 UART: [kat] ++
807,961 UART: [kat] sha1
820,277 UART: [kat] SHA2-256
822,996 UART: [kat] SHA2-384
828,479 UART: [kat] SHA2-512-ACC
830,837 UART: [kat] ECC-384
3,116,391 UART: [kat] HMAC-384Kdf
3,128,409 UART: [kat] LMS
4,318,531 UART: [kat] --
4,322,193 UART: [cold-reset] ++
4,323,273 UART: [fht] Storing FHT @ 0x50003400
4,334,105 UART: [idev] ++
4,334,743 UART: [idev] CDI.KEYID = 6
4,335,644 UART: [idev] SUBJECT.KEYID = 7
4,336,899 UART: [idev] UDS.KEYID = 0
4,337,935 ready_for_fw is high
4,338,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,986 UART: [idev] Erasing UDS.KEYID = 0
7,626,492 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,793 UART: [idev] --
7,650,193 UART: [ldev] ++
7,650,760 UART: [ldev] CDI.KEYID = 6
7,651,694 UART: [ldev] SUBJECT.KEYID = 5
7,652,900 UART: [ldev] AUTHORITY.KEYID = 7
7,654,176 UART: [ldev] FE.KEYID = 1
7,665,007 UART: [ldev] Erasing FE.KEYID = 1
10,953,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,556 UART: [ldev] --
13,311,468 UART: [fwproc] Waiting for Commands...
13,314,039 UART: [fwproc] Received command 0x46574c44
13,316,221 UART: [fwproc] Received Image of size 118548 bytes
17,428,155 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,057 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,247 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,714 >>> mbox cmd response: success
17,903,768 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,906,567 UART: [afmc] ++
17,907,147 UART: [afmc] CDI.KEYID = 6
17,908,103 UART: [afmc] SUBJECT.KEYID = 7
17,909,304 UART: [afmc] AUTHORITY.KEYID = 5
21,221,413 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,513,522 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,515,794 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,243 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,544,939 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,345 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,581,424 UART: [afmc] --
23,585,766 UART: [cold-reset] --
23,589,681 UART: [state] Locking Datavault
23,594,773 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,560 UART: [state] Locking ICCM
23,598,332 UART: [exit] Launching FMC @ 0x40000130
23,606,774 UART:
23,607,010 UART: Running Caliptra FMC ...
23,608,110 UART:
23,608,262 UART: [state] CFI Enabled
23,616,193 UART: [fht] FMC Alias Private Key: 7
25,956,088 UART: [art] Extend RT PCRs Done
25,957,343 UART: [art] Lock RT PCRs Done
25,958,804 UART: [art] Populate DV Done
25,964,268 UART: [fht] FMC Alias Private Key: 7
25,965,961 UART: [art] Derive CDI
25,966,769 UART: [art] Store in slot 0x4
26,009,262 UART: [art] Derive Key Pair
26,010,303 UART: [art] Store priv key in slot 0x5
29,252,557 UART: [art] Derive Key Pair - Done
29,265,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,092 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,593 UART: [art] PUB.X = B4388A2F353311A9A0464BC1EC109132D13129DD14CB2C934FA59AD1179A4EB67E134205B81CF97BA31133EEEE1C53F9
31,554,907 UART: [art] PUB.Y = 43C65750C1E6AA135D7C1EB002349EFC6EEAD19BEDF0A17F4966054B03DD935D90B876C9A7113734BC3E55DE2D5349CA
31,562,200 UART: [art] SIG.R = 71222AB9DDCF61445CAAA2DF5F35D1743E1C41BB28F6B17FDCF9A6D8ACF055232F861063C57821B75A17D4D8112460B9
31,569,594 UART: [art] SIG.S = B5E41024E8EAEF2DAABDE664ED486ED0744F0F4EC3B4C439D6D504E49D3907A29683D054E457E649464E17615F81F4AF
32,874,701 UART: Caliptra RT
32,875,409 UART: [state] CFI Enabled
33,008,487 UART: [rt] RT listening for mailbox commands...
33,040,331 UART: [rt]cmd =0x54514754, len=24
33,043,099 >>> mbox cmd response data (8 bytes)
33,043,652 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,073,377 UART: [rt]cmd =0x47544744, len=8
33,076,194 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
4,131,572 ready_for_fw is high
4,132,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,749 >>> mbox cmd response: success
18,165,175 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,799,913 UART:
23,800,308 UART: Running Caliptra FMC ...
23,801,456 UART:
23,801,618 UART: [state] CFI Enabled
23,809,574 UART: [fht] FMC Alias Private Key: 7
26,149,614 UART: [art] Extend RT PCRs Done
26,151,138 UART: [art] Lock RT PCRs Done
26,152,703 UART: [art] Populate DV Done
26,158,076 UART: [fht] FMC Alias Private Key: 7
26,159,619 UART: [art] Derive CDI
26,160,359 UART: [art] Store in slot 0x4
26,202,950 UART: [art] Derive Key Pair
26,203,954 UART: [art] Store priv key in slot 0x5
29,445,587 UART: [art] Derive Key Pair - Done
29,458,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,517 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,030 UART: [art] PUB.X = 11000606B2EBDE497A7B7CB9902F5120F20D7534C601D739EB2911C65DF96AE7B187ABB36F23F878A60FD2D288155C96
31,747,281 UART: [art] PUB.Y = 3F4AE116510945426B701F6D71DF75CA18A2A2744F79C76121E4482BD4D8A5CEED94DDB2F12D618E31E22E7C56D4A41D
31,754,549 UART: [art] SIG.R = 4768E3DF6F4A186349D72C1A7AC45E7A39AFEA51F7A4E3255EC4782BEDB935231F4F3097244AE09C2E8A40E0C8816BF8
31,762,007 UART: [art] SIG.S = BAA7C36FF4C309594CFD9CF389A568455A81F4DD1ED54056BF207CA129560C2DE269008A70E9AC0B4AF113B82772246A
33,066,312 UART: Caliptra RT
33,067,028 UART: [state] CFI Enabled
33,200,847 UART: [rt] RT listening for mailbox commands...
33,232,690 UART: [rt]cmd =0x54514754, len=24
33,235,559 >>> mbox cmd response data (8 bytes)
33,236,028 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,265,547 UART: [rt]cmd =0x47544744, len=8
33,268,420 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,161 UART:
192,515 UART: Running Caliptra ROM ...
193,712 UART:
193,865 UART: [state] CFI Enabled
263,796 UART: [state] LifecycleState = Unprovisioned
265,784 UART: [state] DebugLocked = No
268,025 UART: [state] WD Timer not started. Device not locked for debugging
271,369 UART: [kat] SHA2-256
451,025 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,772 UART: [kat] ++
462,266 UART: [kat] sha1
473,494 UART: [kat] SHA2-256
476,151 UART: [kat] SHA2-384
481,585 UART: [kat] SHA2-512-ACC
483,992 UART: [kat] ECC-384
2,951,924 UART: [kat] HMAC-384Kdf
2,972,087 UART: [kat] LMS
3,448,525 UART: [kat] --
3,453,059 UART: [cold-reset] ++
3,455,349 UART: [fht] FHT @ 0x50003400
3,466,462 UART: [idev] ++
3,467,033 UART: [idev] CDI.KEYID = 6
3,468,062 UART: [idev] SUBJECT.KEYID = 7
3,469,238 UART: [idev] UDS.KEYID = 0
3,470,167 ready_for_fw is high
3,470,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,513 UART: [idev] Erasing UDS.KEYID = 0
5,990,357 UART: [idev] Sha1 KeyId Algorithm
6,013,743 UART: [idev] --
6,019,822 UART: [ldev] ++
6,020,459 UART: [ldev] CDI.KEYID = 6
6,021,371 UART: [ldev] SUBJECT.KEYID = 5
6,022,550 UART: [ldev] AUTHORITY.KEYID = 7
6,023,836 UART: [ldev] FE.KEYID = 1
6,060,424 UART: [ldev] Erasing FE.KEYID = 1
8,564,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,710 UART: [ldev] --
10,376,898 UART: [fwproc] Wait for Commands...
10,378,613 UART: [fwproc] Recv command 0x46574c44
10,380,643 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,386 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,400 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,714 >>> mbox cmd response: success
14,351,791 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,354,542 UART: [afmc] ++
14,355,118 UART: [afmc] CDI.KEYID = 6
14,356,136 UART: [afmc] SUBJECT.KEYID = 7
14,357,292 UART: [afmc] AUTHORITY.KEYID = 5
16,898,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,621,107 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,623,345 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,639,118 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,655,214 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,670,775 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,694,519 UART: [afmc] --
18,697,962 UART: [cold-reset] --
18,702,575 UART: [state] Locking Datavault
18,707,544 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,291 UART: [state] Locking ICCM
18,711,507 UART: [exit] Launching FMC @ 0x40000130
18,719,953 UART:
18,720,182 UART: Running Caliptra FMC ...
18,721,276 UART:
18,721,433 UART: [state] CFI Enabled
18,778,412 UART: [fht] FMC Alias Private Key: 7
20,545,309 UART: [art] Extend RT PCRs Done
20,546,529 UART: [art] Lock RT PCRs Done
20,548,285 UART: [art] Populate DV Done
20,553,746 UART: [fht] FMC Alias Private Key: 7
20,555,493 UART: [art] Derive CDI
20,556,311 UART: [art] Store in slot 0x4
20,611,629 UART: [art] Derive Key Pair
20,612,671 UART: [art] Store priv key in slot 0x5
23,076,090 UART: [art] Derive Key Pair - Done
23,089,085 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,801,732 UART: [art] Erasing AUTHORITY.KEYID = 7
24,803,237 UART: [art] PUB.X = D9DCB462D8530F69649CB01AD3E0F14032254E1528FCE8DC69ECEF6371E94DA8C40A185C8911BED473E2A4681B85737B
24,810,546 UART: [art] PUB.Y = E6406DC9422399D887B0CDC41D9538998670ABEF52588E69BCAFD35418DB400EDF2425F3F3B1A0DF4856E06CCF4FB0F3
24,817,781 UART: [art] SIG.R = 096D07CF432A2F2664C408A8C1833E5604F03CCD0D575F40453D7F56E76CA9C6B9021148117387A4A79B469E95C68B9B
24,825,169 UART: [art] SIG.S = DD2071138B31F0A471E15C8F9E329272DB3E84926E6886F386548E75CCD9C8E29B505F957052580141404B37ECDC8806
25,803,849 UART: Caliptra RT
25,804,547 UART: [state] CFI Enabled
25,985,626 UART: [rt] RT listening for mailbox commands...
26,017,094 UART: [rt]cmd =0x54514754, len=24
26,019,845 >>> mbox cmd response data (8 bytes)
26,020,286 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,050,019 UART: [rt]cmd =0x47544744, len=8
26,052,985 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
3,461,864 ready_for_fw is high
3,462,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,237,968 >>> mbox cmd response: success
14,239,346 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,536,199 UART:
18,536,605 UART: Running Caliptra FMC ...
18,537,708 UART:
18,537,858 UART: [state] CFI Enabled
18,602,086 UART: [fht] FMC Alias Private Key: 7
20,390,075 UART: [art] Extend RT PCRs Done
20,391,304 UART: [art] Lock RT PCRs Done
20,392,796 UART: [art] Populate DV Done
20,398,212 UART: [fht] FMC Alias Private Key: 7
20,399,803 UART: [art] Derive CDI
20,400,540 UART: [art] Store in slot 0x4
20,456,253 UART: [art] Derive Key Pair
20,457,247 UART: [art] Store priv key in slot 0x5
22,920,018 UART: [art] Derive Key Pair - Done
22,933,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,646,345 UART: [art] Erasing AUTHORITY.KEYID = 7
24,647,826 UART: [art] PUB.X = AB42AF5AE716812CB641DB8792DDC1003C3AC4FA8866030665BA304AF4F0B3D5965AC7BAB0F13C23B59844D6C1009B30
24,655,153 UART: [art] PUB.Y = 983ABE18524C6A1B54676FFFF31B7A37491E1BE3DF6313F5870FDFC4145EFC28DFA4BA7AE4CFB9783F8D657341ACA259
24,662,402 UART: [art] SIG.R = 6DBF3B8DC56E5D4A2C3A374FADFA04E65826B17A2B1EAD6F51D1C0A1D8879AC18AAC778A8BE2C6CCE17982A1D538D4B4
24,669,795 UART: [art] SIG.S = 38BF8EF31E0477844D6A266D6E8431183312FC204DFF8A90A1E47CD37011E8D8419DAB6710F218D6D666481763A08762
25,648,697 UART: Caliptra RT
25,649,413 UART: [state] CFI Enabled
25,829,850 UART: [rt] RT listening for mailbox commands...
25,861,478 UART: [rt]cmd =0x54514754, len=24
25,863,791 >>> mbox cmd response data (8 bytes)
25,864,296 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,894,069 UART: [rt]cmd =0x47544744, len=8
25,896,942 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,448 UART:
192,796 UART: Running Caliptra ROM ...
193,925 UART:
603,813 UART: [state] CFI Enabled
619,134 UART: [state] LifecycleState = Unprovisioned
621,087 UART: [state] DebugLocked = No
623,976 UART: [state] WD Timer not started. Device not locked for debugging
628,236 UART: [kat] SHA2-256
807,910 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,658 UART: [kat] ++
819,265 UART: [kat] sha1
831,282 UART: [kat] SHA2-256
834,018 UART: [kat] SHA2-384
840,282 UART: [kat] SHA2-512-ACC
842,591 UART: [kat] ECC-384
3,286,510 UART: [kat] HMAC-384Kdf
3,298,674 UART: [kat] LMS
3,775,180 UART: [kat] --
3,779,384 UART: [cold-reset] ++
3,780,461 UART: [fht] FHT @ 0x50003400
3,792,356 UART: [idev] ++
3,792,918 UART: [idev] CDI.KEYID = 6
3,793,870 UART: [idev] SUBJECT.KEYID = 7
3,795,107 UART: [idev] UDS.KEYID = 0
3,796,173 ready_for_fw is high
3,796,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,091 UART: [idev] Erasing UDS.KEYID = 0
6,271,352 UART: [idev] Sha1 KeyId Algorithm
6,293,580 UART: [idev] --
6,297,987 UART: [ldev] ++
6,298,564 UART: [ldev] CDI.KEYID = 6
6,299,506 UART: [ldev] SUBJECT.KEYID = 5
6,300,712 UART: [ldev] AUTHORITY.KEYID = 7
6,301,942 UART: [ldev] FE.KEYID = 1
6,311,190 UART: [ldev] Erasing FE.KEYID = 1
8,791,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,347 UART: [ldev] --
10,587,491 UART: [fwproc] Wait for Commands...
10,590,449 UART: [fwproc] Recv command 0x46574c44
10,592,436 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,216 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,283 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,290 >>> mbox cmd response: success
14,563,465 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,565,800 UART: [afmc] ++
14,566,445 UART: [afmc] CDI.KEYID = 6
14,567,327 UART: [afmc] SUBJECT.KEYID = 7
14,568,596 UART: [afmc] AUTHORITY.KEYID = 5
17,072,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,795,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,798,115 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,813,938 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,829,976 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,845,598 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,870,963 UART: [afmc] --
18,875,214 UART: [cold-reset] --
18,878,966 UART: [state] Locking Datavault
18,883,241 UART: [state] Locking PCR0, PCR1 and PCR31
18,884,997 UART: [state] Locking ICCM
18,887,580 UART: [exit] Launching FMC @ 0x40000130
18,895,982 UART:
18,896,227 UART: Running Caliptra FMC ...
18,897,333 UART:
18,897,494 UART: [state] CFI Enabled
18,905,702 UART: [fht] FMC Alias Private Key: 7
20,671,119 UART: [art] Extend RT PCRs Done
20,672,342 UART: [art] Lock RT PCRs Done
20,673,944 UART: [art] Populate DV Done
20,679,084 UART: [fht] FMC Alias Private Key: 7
20,680,634 UART: [art] Derive CDI
20,681,370 UART: [art] Store in slot 0x4
20,724,099 UART: [art] Derive Key Pair
20,725,106 UART: [art] Store priv key in slot 0x5
23,151,485 UART: [art] Derive Key Pair - Done
23,164,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,870,781 UART: [art] Erasing AUTHORITY.KEYID = 7
24,872,286 UART: [art] PUB.X = BE191115C8F56113706E2D4FD03BDF515C04D0F3E7A4506867AA58EAE6515810AD2BD97F9CE7664FAF9FDCDFF3931D0F
24,879,532 UART: [art] PUB.Y = 464115817B1144DAA46232E373EECD915E371ADA1491711C3603FF87D97719BE81434415923D2D66633E3DFF9EEEA0A6
24,886,819 UART: [art] SIG.R = AC1A852B2301D692572D3FF55918DF8348D12EBE278719EF7DD93A957D9E5C81B7706F9789BA73669C8D85E2702397BF
24,894,200 UART: [art] SIG.S = 46991981D43B51332B66144FC0A1CE889F2EC2E3F7F730048B55DDA0D365DDC0D31B6C6CD2494CCE6FD3D67C136F7DD6
25,872,946 UART: Caliptra RT
25,873,656 UART: [state] CFI Enabled
26,005,893 UART: [rt] RT listening for mailbox commands...
26,037,306 UART: [rt]cmd =0x54514754, len=24
26,039,891 >>> mbox cmd response data (8 bytes)
26,040,376 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,070,107 UART: [rt]cmd =0x47544744, len=8
26,073,205 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,775,471 ready_for_fw is high
3,775,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,540 >>> mbox cmd response: success
14,448,005 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,693,102 UART:
18,693,484 UART: Running Caliptra FMC ...
18,694,585 UART:
18,694,738 UART: [state] CFI Enabled
18,702,696 UART: [fht] FMC Alias Private Key: 7
20,468,977 UART: [art] Extend RT PCRs Done
20,470,205 UART: [art] Lock RT PCRs Done
20,471,696 UART: [art] Populate DV Done
20,477,006 UART: [fht] FMC Alias Private Key: 7
20,478,604 UART: [art] Derive CDI
20,479,344 UART: [art] Store in slot 0x4
20,522,214 UART: [art] Derive Key Pair
20,523,257 UART: [art] Store priv key in slot 0x5
22,949,474 UART: [art] Derive Key Pair - Done
22,962,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,579 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,079 UART: [art] PUB.X = DFE7A6DFCD330FD94BD07E970463354704EAFA6680764740023A5FE93E515A9FB383A0109C5EB7FD3BF29C989BE8651E
24,677,352 UART: [art] PUB.Y = B7AE59405C8CA542723FD75C1EC2AC275FA27D7330F973C08DF5C3FD036AA65AEC74C96A668128870B99F0FF62C360C4
24,684,622 UART: [art] SIG.R = 7C9D9614F345CD26EF382DCB46D45451B6247370EFDC13A435AC60034DA38D3336E5EAD505EDA8FE13EA563A50FD04C9
24,692,025 UART: [art] SIG.S = 6C04A66BCC2CC506112E020EDF4070D1A738C1800D9A18A10829E74BE2D443DBB02FBAB4C2A20E10EDD24067BE4E3EE2
25,671,075 UART: Caliptra RT
25,671,809 UART: [state] CFI Enabled
25,804,919 UART: [rt] RT listening for mailbox commands...
25,836,570 UART: [rt]cmd =0x54514754, len=24
25,839,217 >>> mbox cmd response data (8 bytes)
25,839,723 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,869,374 UART: [rt]cmd =0x47544744, len=8
25,872,534 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
191,952 UART:
192,319 UART: Running Caliptra ROM ...
193,498 UART:
193,677 UART: [state] CFI Enabled
261,578 UART: [state] LifecycleState = Unprovisioned
263,999 UART: [state] DebugLocked = No
266,458 UART: [state] WD Timer not started. Device not locked for debugging
271,841 UART: [kat] SHA2-256
461,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,486 UART: [kat] ++
472,974 UART: [kat] sha1
484,842 UART: [kat] SHA2-256
487,843 UART: [kat] SHA2-384
494,400 UART: [kat] SHA2-512-ACC
497,012 UART: [kat] ECC-384
2,950,804 UART: [kat] HMAC-384Kdf
2,972,502 UART: [kat] LMS
3,504,313 UART: [kat] --
3,509,647 UART: [cold-reset] ++
3,511,747 UART: [fht] FHT @ 0x50003400
3,524,431 UART: [idev] ++
3,525,065 UART: [idev] CDI.KEYID = 6
3,526,047 UART: [idev] SUBJECT.KEYID = 7
3,527,222 UART: [idev] UDS.KEYID = 0
3,528,147 ready_for_fw is high
3,528,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,739 UART: [idev] Erasing UDS.KEYID = 0
6,026,595 UART: [idev] Sha1 KeyId Algorithm
6,048,930 UART: [idev] --
6,054,761 UART: [ldev] ++
6,055,439 UART: [ldev] CDI.KEYID = 6
6,056,322 UART: [ldev] SUBJECT.KEYID = 5
6,057,534 UART: [ldev] AUTHORITY.KEYID = 7
6,058,770 UART: [ldev] FE.KEYID = 1
6,101,698 UART: [ldev] Erasing FE.KEYID = 1
8,605,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,792 UART: [ldev] --
10,414,052 UART: [fwproc] Wait for Commands...
10,415,772 UART: [fwproc] Recv command 0x46574c44
10,418,117 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,099 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,673 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,922 >>> mbox cmd response: success
14,679,451 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,683,551 UART: [afmc] ++
14,684,237 UART: [afmc] CDI.KEYID = 6
14,685,408 UART: [afmc] SUBJECT.KEYID = 7
14,686,940 UART: [afmc] AUTHORITY.KEYID = 5
17,215,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,034 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,947 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,006 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,159 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,114 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,710 UART: [afmc] --
19,012,680 UART: [cold-reset] --
19,016,930 UART: [state] Locking Datavault
19,022,768 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,956 UART: [state] Locking ICCM
19,027,566 UART: [exit] Launching FMC @ 0x40000130
19,036,227 UART:
19,036,468 UART: Running Caliptra FMC ...
19,037,586 UART:
19,037,745 UART: [state] CFI Enabled
19,094,645 UART: [fht] FMC Alias Private Key: 7
20,860,929 UART: [art] Extend RT PCRs Done
20,862,148 UART: [art] Lock RT PCRs Done
20,863,420 UART: [art] Populate DV Done
20,868,725 UART: [fht] FMC Alias Private Key: 7
20,870,258 UART: [art] Derive CDI
20,870,989 UART: [art] Store in slot 0x4
20,926,860 UART: [art] Derive Key Pair
20,927,903 UART: [art] Store priv key in slot 0x5
23,390,559 UART: [art] Derive Key Pair - Done
23,403,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,753 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,264 UART: [art] PUB.X = D4B104A0FA9846703F5912B64FFAE969ACE0B5A195ABA84F68CCFE772D9A35EE5FF5BC015708AA5A2C8B8B543A5AD78F
25,124,532 UART: [art] PUB.Y = 541426EAC3F837BC1B9AE5735196473CE71693DB44085533B5FABC74947DCD4504845C4B52601213F5477F17D00F6017
25,131,803 UART: [art] SIG.R = 812E4DD5512FDE460682B0C452CBB8BB55FBECDA91669C9D375D83989B3904FD7376C3BEDF3039D20ECD9CC57058BEF9
25,139,207 UART: [art] SIG.S = 910FF789D8AF77789D048A1FE22C7B363AAE2A119800E7F66193FA3425FDC11852CAE536073C08EAECA4EE36DAC6E66E
26,118,239 UART: Caliptra RT
26,118,932 UART: [state] CFI Enabled
26,297,997 UART: [rt] RT listening for mailbox commands...
26,329,302 UART: [rt]cmd =0x54514754, len=24
26,331,830 >>> mbox cmd response data (8 bytes)
26,332,351 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,361,920 UART: [rt]cmd =0x47544744, len=8
26,365,064 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,436,721 ready_for_fw is high
3,437,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,830,707 >>> mbox cmd response: success
14,831,351 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,114,001 UART:
19,114,389 UART: Running Caliptra FMC ...
19,115,520 UART:
19,115,676 UART: [state] CFI Enabled
19,178,498 UART: [fht] FMC Alias Private Key: 7
20,944,640 UART: [art] Extend RT PCRs Done
20,945,871 UART: [art] Lock RT PCRs Done
20,947,508 UART: [art] Populate DV Done
20,952,869 UART: [fht] FMC Alias Private Key: 7
20,954,524 UART: [art] Derive CDI
20,955,337 UART: [art] Store in slot 0x4
21,011,005 UART: [art] Derive Key Pair
21,012,057 UART: [art] Store priv key in slot 0x5
23,475,146 UART: [art] Derive Key Pair - Done
23,488,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,151 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,669 UART: [art] PUB.X = D7B50C83B82160499C25D968535D39AEE9C41C07FEAA34836D032DB78EBC1C3D2DEA8D8F5BDF1DC954C77AB0B0B21211
25,209,962 UART: [art] PUB.Y = 54F1BBD979CAA2E166E96EE2FC2CBED460B1999F48A0C6FAC15A1BE9BF3E8CAA9AC435F37CA4A71C39BE58A64D8B8211
25,217,233 UART: [art] SIG.R = 3FC3CD0BCCA1E1E7170116BA2F7C89B865CA067038D3DE23C2E6CDE13E3E9370F054C6B2331CBFF876603C378D0A5697
25,224,628 UART: [art] SIG.S = 2BD7BF9CF41E1E97084804E67DF3FE67059A71E06C569C4916027E32E7FAC42D62315A71D1884288671B9CB6AE4A2BD8
26,203,881 UART: Caliptra RT
26,204,568 UART: [state] CFI Enabled
26,384,761 UART: [rt] RT listening for mailbox commands...
26,416,646 UART: [rt]cmd =0x54514754, len=24
26,419,206 >>> mbox cmd response data (8 bytes)
26,419,684 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,449,406 UART: [rt]cmd =0x47544744, len=8
26,452,334 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,228 writing to cptra_bootfsm_go
193,405 UART:
193,766 UART: Running Caliptra ROM ...
194,874 UART:
604,585 UART: [state] CFI Enabled
616,427 UART: [state] LifecycleState = Unprovisioned
618,815 UART: [state] DebugLocked = No
620,770 UART: [state] WD Timer not started. Device not locked for debugging
624,748 UART: [kat] SHA2-256
814,630 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,393 UART: [kat] ++
825,952 UART: [kat] sha1
837,756 UART: [kat] SHA2-256
840,774 UART: [kat] SHA2-384
848,189 UART: [kat] SHA2-512-ACC
850,727 UART: [kat] ECC-384
3,292,795 UART: [kat] HMAC-384Kdf
3,305,528 UART: [kat] LMS
3,837,357 UART: [kat] --
3,843,417 UART: [cold-reset] ++
3,844,666 UART: [fht] FHT @ 0x50003400
3,857,283 UART: [idev] ++
3,857,999 UART: [idev] CDI.KEYID = 6
3,859,033 UART: [idev] SUBJECT.KEYID = 7
3,860,144 UART: [idev] UDS.KEYID = 0
3,861,075 ready_for_fw is high
3,861,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,152 UART: [idev] Erasing UDS.KEYID = 0
6,337,227 UART: [idev] Sha1 KeyId Algorithm
6,360,583 UART: [idev] --
6,366,513 UART: [ldev] ++
6,367,219 UART: [ldev] CDI.KEYID = 6
6,368,136 UART: [ldev] SUBJECT.KEYID = 5
6,369,298 UART: [ldev] AUTHORITY.KEYID = 7
6,370,526 UART: [ldev] FE.KEYID = 1
6,382,307 UART: [ldev] Erasing FE.KEYID = 1
8,861,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,408 UART: [ldev] --
10,652,442 UART: [fwproc] Wait for Commands...
10,654,116 UART: [fwproc] Recv command 0x46574c44
10,656,427 UART: [fwproc] Recv'd Img size: 118548 bytes
14,155,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,234,696 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,358,291 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,918,971 >>> mbox cmd response: success
14,919,532 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,923,539 UART: [afmc] ++
14,924,252 UART: [afmc] CDI.KEYID = 6
14,925,450 UART: [afmc] SUBJECT.KEYID = 7
14,926,895 UART: [afmc] AUTHORITY.KEYID = 5
17,432,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,155,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,157,262 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,172,350 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,187,535 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,202,427 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,225,373 UART: [afmc] --
19,229,031 UART: [cold-reset] --
19,234,683 UART: [state] Locking Datavault
19,240,178 UART: [state] Locking PCR0, PCR1 and PCR31
19,242,389 UART: [state] Locking ICCM
19,243,680 UART: [exit] Launching FMC @ 0x40000130
19,252,359 UART:
19,252,596 UART: Running Caliptra FMC ...
19,253,701 UART:
19,253,865 UART: [state] CFI Enabled
19,261,755 UART: [fht] FMC Alias Private Key: 7
21,028,110 UART: [art] Extend RT PCRs Done
21,029,348 UART: [art] Lock RT PCRs Done
21,030,910 UART: [art] Populate DV Done
21,036,329 UART: [fht] FMC Alias Private Key: 7
21,037,871 UART: [art] Derive CDI
21,038,693 UART: [art] Store in slot 0x4
21,081,094 UART: [art] Derive Key Pair
21,082,141 UART: [art] Store priv key in slot 0x5
23,508,740 UART: [art] Derive Key Pair - Done
23,521,309 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,195 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,706 UART: [art] PUB.X = 7A22AD55C6560B264E02640BA89B6AB59A32C7C2D09148BB372FF39363C18CF2BBB86D89C59F1BAA8EB2BBD451854756
25,235,975 UART: [art] PUB.Y = D6F8D5F78AAE5CFC1BD6F9CD173FFF0B757F448825751465C087EAB17A9F77C494D5E08A353CB9D1AEE882B54BEA3FCD
25,243,237 UART: [art] SIG.R = 82289C9DA038C5580FCE5AFEAFAC8C2F420DCB2550AC4D675916A37B84A37E2278034A032FFFBAE8461737978CA595D4
25,250,650 UART: [art] SIG.S = C7D6194E61658CDD5E8DA1897C5181A4E5871055D333C0F290353B3537818841E793C346A2182813EE43AFB436C85348
26,228,973 UART: Caliptra RT
26,229,685 UART: [state] CFI Enabled
26,361,610 UART: [rt] RT listening for mailbox commands...
26,393,024 UART: [rt]cmd =0x54514754, len=24
26,395,781 >>> mbox cmd response data (8 bytes)
26,396,227 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,425,899 UART: [rt]cmd =0x47544744, len=8
26,428,978 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,753,384 ready_for_fw is high
3,753,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,032,302 >>> mbox cmd response: success
15,032,917 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,286,506 UART:
19,286,881 UART: Running Caliptra FMC ...
19,287,986 UART:
19,288,144 UART: [state] CFI Enabled
19,296,478 UART: [fht] FMC Alias Private Key: 7
21,062,515 UART: [art] Extend RT PCRs Done
21,063,747 UART: [art] Lock RT PCRs Done
21,065,250 UART: [art] Populate DV Done
21,070,850 UART: [fht] FMC Alias Private Key: 7
21,072,448 UART: [art] Derive CDI
21,073,193 UART: [art] Store in slot 0x4
21,115,851 UART: [art] Derive Key Pair
21,116,897 UART: [art] Store priv key in slot 0x5
23,543,585 UART: [art] Derive Key Pair - Done
23,556,156 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,262,705 UART: [art] Erasing AUTHORITY.KEYID = 7
25,264,236 UART: [art] PUB.X = 7D3D63A7FBBBB762B6FC765AC89CB63F40CD295C8362B9F5B2FC488C2CEE1B5D04FCA9CB31F71A13A6DF1E3C3953A3E6
25,271,491 UART: [art] PUB.Y = 5D54D05A8291C62DF7BA8D9AF06449F6E81C525C35716DE9254C815797D409DD3AC0D8BC64FF21D67D3384C05834E2D8
25,278,746 UART: [art] SIG.R = B56B1392808510C94E15820FC28A14889113B8F6790346B6EB44165FF14B77FD4A11CFAD004D161688AFE49BAB5AF041
25,286,147 UART: [art] SIG.S = B55D938A699AF1F48E539E70D299EDC205E4195BB0F45C96499CCA5D635F4D29D4D99123F5FBDE6F49073B1BC50ABC79
26,265,026 UART: Caliptra RT
26,265,747 UART: [state] CFI Enabled
26,398,681 UART: [rt] RT listening for mailbox commands...
26,430,327 UART: [rt]cmd =0x54514754, len=24
26,432,864 >>> mbox cmd response data (8 bytes)
26,433,359 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,463,087 UART: [rt]cmd =0x47544744, len=8
26,465,893 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,560 UART: [state] LifecycleState = Unprovisioned
86,215 UART: [state] DebugLocked = No
86,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,591 UART: [kat] SHA2-256
882,522 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,637 UART: [kat] ++
886,789 UART: [kat] sha1
890,851 UART: [kat] SHA2-256
892,789 UART: [kat] SHA2-384
895,654 UART: [kat] SHA2-512-ACC
897,555 UART: [kat] ECC-384
903,314 UART: [kat] HMAC-384Kdf
907,730 UART: [kat] LMS
1,475,926 UART: [kat] --
1,476,761 UART: [cold-reset] ++
1,477,237 UART: [fht] Storing FHT @ 0x50003400
1,480,014 UART: [idev] ++
1,480,182 UART: [idev] CDI.KEYID = 6
1,480,542 UART: [idev] SUBJECT.KEYID = 7
1,480,966 UART: [idev] UDS.KEYID = 0
1,481,311 ready_for_fw is high
1,481,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,122 UART: [idev] Erasing UDS.KEYID = 0
1,506,090 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,872 UART: [idev] --
1,515,941 UART: [ldev] ++
1,516,109 UART: [ldev] CDI.KEYID = 6
1,516,472 UART: [ldev] SUBJECT.KEYID = 5
1,516,898 UART: [ldev] AUTHORITY.KEYID = 7
1,517,361 UART: [ldev] FE.KEYID = 1
1,522,701 UART: [ldev] Erasing FE.KEYID = 1
1,547,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,180 UART: [ldev] --
1,586,509 UART: [fwproc] Waiting for Commands...
1,587,262 UART: [fwproc] Received command 0x46574c44
1,588,053 UART: [fwproc] Received Image of size 118548 bytes
2,933,657 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,051 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,269 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,608 >>> mbox cmd response: success
3,132,608 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,133,716 UART: [afmc] ++
3,133,884 UART: [afmc] CDI.KEYID = 6
3,134,246 UART: [afmc] SUBJECT.KEYID = 7
3,134,671 UART: [afmc] AUTHORITY.KEYID = 5
3,169,058 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,182 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,962 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,671 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,554 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,237 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,277 UART: [afmc] --
3,212,247 UART: [cold-reset] --
3,212,911 UART: [state] Locking Datavault
3,214,080 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,684 UART: [state] Locking ICCM
3,215,130 UART: [exit] Launching FMC @ 0x40000130
3,220,460 UART:
3,220,476 UART: Running Caliptra FMC ...
3,220,884 UART:
3,220,938 UART: [state] CFI Enabled
3,231,866 UART: [fht] FMC Alias Private Key: 7
3,351,530 UART: [art] Extend RT PCRs Done
3,351,958 UART: [art] Lock RT PCRs Done
3,353,908 UART: [art] Populate DV Done
3,361,939 UART: [fht] FMC Alias Private Key: 7
3,362,999 UART: [art] Derive CDI
3,363,279 UART: [art] Store in slot 0x4
3,448,763 UART: [art] Derive Key Pair
3,449,123 UART: [art] Store priv key in slot 0x5
3,461,722 UART: [art] Derive Key Pair - Done
3,476,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,852 UART: [art] PUB.X = 0D5484CCA178D6E5A3ADEA90375B933D055DEF4326CC20272CFFE80D7F51D4A634AA5C820D2B171BAACC357AF5F6216C
3,499,628 UART: [art] PUB.Y = AE5B60C209E86C77D3B3A1E2699E78BBDD73DCB093614B8FE3AA5CA6E4459E461A86174EE44729FF5593D4A2835505A8
3,506,580 UART: [art] SIG.R = F5EC04B6BF94CECD74F4DB56079E10F9F8A69CFE26E35B7F3B17B9AF7C968460E791A6559CC9319CD92004CC8D0BC089
3,513,354 UART: [art] SIG.S = 0501A6011E1DDA3667C775EF0928FE30F6163DC16D88E040475510AF99B188E03E964A93AB2D864AB183312F010C3164
3,537,186 UART: Caliptra RT
3,537,437 UART: [state] CFI Enabled
3,657,637 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,149 UART: [rt]cmd =0x54514754, len=24
3,690,138 >>> mbox cmd response data (8 bytes)
3,690,139 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,552 UART: [rt]cmd =0x47544744, len=8
3,722,090 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,047 ready_for_fw is high
1,362,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,698 >>> mbox cmd response: success
2,980,698 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,042,913 UART:
3,042,929 UART: Running Caliptra FMC ...
3,043,337 UART:
3,043,391 UART: [state] CFI Enabled
3,053,813 UART: [fht] FMC Alias Private Key: 7
3,172,143 UART: [art] Extend RT PCRs Done
3,172,571 UART: [art] Lock RT PCRs Done
3,174,201 UART: [art] Populate DV Done
3,182,232 UART: [fht] FMC Alias Private Key: 7
3,183,246 UART: [art] Derive CDI
3,183,526 UART: [art] Store in slot 0x4
3,269,326 UART: [art] Derive Key Pair
3,269,686 UART: [art] Store priv key in slot 0x5
3,282,959 UART: [art] Derive Key Pair - Done
3,297,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,072 UART: [art] PUB.X = 1CD89D595A689917EE1F4F356CC6B005B28CE53E2139AAC8F6ED3470A58C6A47B20C3C2E11085939FEF040F76F302C61
3,320,839 UART: [art] PUB.Y = 69D58B640BF1FE3F9C683662BF8BFC7D2C80BD633F23161DBCEDED6589F9124347282F3254D6840D537E5590CF7183EE
3,327,789 UART: [art] SIG.R = E9C7E605A42B4F4998D61A032746427C251CFBC7A7069DE5B221AE9BC96D962755CE5043F29C3EDE17CFE56C9A26550B
3,334,555 UART: [art] SIG.S = CF0DE37833EB7A4F6274642132AC792F78FCB304895D2AC695EBF261168049CC452E2EAB5175D57A70219C3077AF588F
3,358,633 UART: Caliptra RT
3,358,884 UART: [state] CFI Enabled
3,478,201 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,881 UART: [rt]cmd =0x54514754, len=24
3,511,202 >>> mbox cmd response data (8 bytes)
3,511,203 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,618 UART: [rt]cmd =0x47544744, len=8
3,543,060 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,360 UART: [kat] SHA2-256
882,291 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,406 UART: [kat] ++
886,558 UART: [kat] sha1
890,944 UART: [kat] SHA2-256
892,882 UART: [kat] SHA2-384
895,559 UART: [kat] SHA2-512-ACC
897,460 UART: [kat] ECC-384
903,191 UART: [kat] HMAC-384Kdf
907,897 UART: [kat] LMS
1,476,093 UART: [kat] --
1,476,784 UART: [cold-reset] ++
1,477,312 UART: [fht] Storing FHT @ 0x50003400
1,480,053 UART: [idev] ++
1,480,221 UART: [idev] CDI.KEYID = 6
1,480,581 UART: [idev] SUBJECT.KEYID = 7
1,481,005 UART: [idev] UDS.KEYID = 0
1,481,350 ready_for_fw is high
1,481,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,105 UART: [idev] Erasing UDS.KEYID = 0
1,505,899 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,401 UART: [idev] --
1,515,286 UART: [ldev] ++
1,515,454 UART: [ldev] CDI.KEYID = 6
1,515,817 UART: [ldev] SUBJECT.KEYID = 5
1,516,243 UART: [ldev] AUTHORITY.KEYID = 7
1,516,706 UART: [ldev] FE.KEYID = 1
1,521,776 UART: [ldev] Erasing FE.KEYID = 1
1,546,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,665 UART: [ldev] --
1,586,140 UART: [fwproc] Waiting for Commands...
1,586,835 UART: [fwproc] Received command 0x46574c44
1,587,626 UART: [fwproc] Received Image of size 118548 bytes
2,932,840 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,130 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,348 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,635 >>> mbox cmd response: success
3,131,635 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,132,645 UART: [afmc] ++
3,132,813 UART: [afmc] CDI.KEYID = 6
3,133,175 UART: [afmc] SUBJECT.KEYID = 7
3,133,600 UART: [afmc] AUTHORITY.KEYID = 5
3,169,019 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,969 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,749 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,458 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,341 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,024 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,960 UART: [afmc] --
3,212,090 UART: [cold-reset] --
3,212,844 UART: [state] Locking Datavault
3,214,137 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,741 UART: [state] Locking ICCM
3,215,177 UART: [exit] Launching FMC @ 0x40000130
3,220,507 UART:
3,220,523 UART: Running Caliptra FMC ...
3,220,931 UART:
3,221,074 UART: [state] CFI Enabled
3,231,632 UART: [fht] FMC Alias Private Key: 7
3,349,394 UART: [art] Extend RT PCRs Done
3,349,822 UART: [art] Lock RT PCRs Done
3,351,372 UART: [art] Populate DV Done
3,359,559 UART: [fht] FMC Alias Private Key: 7
3,360,683 UART: [art] Derive CDI
3,360,963 UART: [art] Store in slot 0x4
3,447,095 UART: [art] Derive Key Pair
3,447,455 UART: [art] Store priv key in slot 0x5
3,460,566 UART: [art] Derive Key Pair - Done
3,475,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,528 UART: [art] PUB.X = 2B5A896E43676D820F24C6F9782B90831729BF43E47BA81C595B4DC65C49DEE0D392DDDDA2C45EF7808B1D1EDBF44B6F
3,498,309 UART: [art] PUB.Y = 5036A2EAFF6D6DF634A4B62936364A1D7ECBD310E6FF904C8DF05AE9D6C762D31DADEFD196040C627C382797D71A7473
3,505,265 UART: [art] SIG.R = 7D8378DD668DB0C972E3A57A19AC249F74130169C91AB9AF50F5238547052F9D56F43CB55305F13EBE6387448473B0DD
3,512,024 UART: [art] SIG.S = 66218E5A0177E3E9C034595A55D8A41CC819FD21D08D610C5C16EE8A4F12E43F2BFCDB3CBC056385E4091631E31ADD91
3,535,962 UART: Caliptra RT
3,536,305 UART: [state] CFI Enabled
3,656,332 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,702 UART: [rt]cmd =0x54514754, len=24
3,689,075 >>> mbox cmd response data (8 bytes)
3,689,076 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,543 UART: [rt]cmd =0x47544744, len=8
3,721,123 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,086 ready_for_fw is high
1,363,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,753 >>> mbox cmd response: success
2,980,753 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,042,068 UART:
3,042,084 UART: Running Caliptra FMC ...
3,042,492 UART:
3,042,635 UART: [state] CFI Enabled
3,053,253 UART: [fht] FMC Alias Private Key: 7
3,172,171 UART: [art] Extend RT PCRs Done
3,172,599 UART: [art] Lock RT PCRs Done
3,174,131 UART: [art] Populate DV Done
3,182,506 UART: [fht] FMC Alias Private Key: 7
3,183,444 UART: [art] Derive CDI
3,183,724 UART: [art] Store in slot 0x4
3,269,624 UART: [art] Derive Key Pair
3,269,984 UART: [art] Store priv key in slot 0x5
3,283,237 UART: [art] Derive Key Pair - Done
3,298,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,358 UART: [art] PUB.X = 6FBEFD470601C5D985F47E0D932BDEA9A589C3D23A1A8197DF0668326A47C1D6C2A8121E9A76101E498A7934EDE0EA00
3,321,102 UART: [art] PUB.Y = 16781D0F9673684B0BF52DCCF8E1AB40747D484A86F1553E236D3D8606C91C4702FA7152F1430474DD056F55F258A0AC
3,328,032 UART: [art] SIG.R = 553056F6615C1CD0C1761C65418962DCBB370BABA832F2AD7B1840304F012855CCAABC645B5A4386B4DB4FCC0B54BF2D
3,334,805 UART: [art] SIG.S = ACE2487F60706FBB978B3E3F78A98AF156ED402900B80842227C114B9FED12BB621AB8F2D03B143199F051AF76ECF362
3,358,706 UART: Caliptra RT
3,359,049 UART: [state] CFI Enabled
3,479,945 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,691 UART: [rt]cmd =0x54514754, len=24
3,512,762 >>> mbox cmd response data (8 bytes)
3,512,763 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,308 UART: [rt]cmd =0x47544744, len=8
3,544,878 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,286 UART: [kat] ++
895,438 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
916,229 UART: [kat] HMAC-384Kdf
920,619 UART: [kat] LMS
1,168,931 UART: [kat] --
1,169,856 UART: [cold-reset] ++
1,170,200 UART: [fht] FHT @ 0x50003400
1,172,812 UART: [idev] ++
1,172,980 UART: [idev] CDI.KEYID = 6
1,173,341 UART: [idev] SUBJECT.KEYID = 7
1,173,766 UART: [idev] UDS.KEYID = 0
1,174,112 ready_for_fw is high
1,174,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,563 UART: [idev] Erasing UDS.KEYID = 0
1,198,631 UART: [idev] Sha1 KeyId Algorithm
1,207,459 UART: [idev] --
1,208,410 UART: [ldev] ++
1,208,578 UART: [ldev] CDI.KEYID = 6
1,208,942 UART: [ldev] SUBJECT.KEYID = 5
1,209,369 UART: [ldev] AUTHORITY.KEYID = 7
1,209,832 UART: [ldev] FE.KEYID = 1
1,215,022 UART: [ldev] Erasing FE.KEYID = 1
1,241,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,630 UART: [ldev] --
1,280,839 UART: [fwproc] Wait for Commands...
1,281,602 UART: [fwproc] Recv command 0x46574c44
1,282,335 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,559 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,734 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,923 >>> mbox cmd response: success
2,824,923 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,826,047 UART: [afmc] ++
2,826,215 UART: [afmc] CDI.KEYID = 6
2,826,578 UART: [afmc] SUBJECT.KEYID = 7
2,827,004 UART: [afmc] AUTHORITY.KEYID = 5
2,863,189 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,290 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,039 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,749 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,630 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,331 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,120 UART: [afmc] --
2,905,943 UART: [cold-reset] --
2,906,547 UART: [state] Locking Datavault
2,907,510 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,114 UART: [state] Locking ICCM
2,908,738 UART: [exit] Launching FMC @ 0x40000130
2,914,068 UART:
2,914,084 UART: Running Caliptra FMC ...
2,914,492 UART:
2,914,546 UART: [state] CFI Enabled
2,924,836 UART: [fht] FMC Alias Private Key: 7
3,044,336 UART: [art] Extend RT PCRs Done
3,044,764 UART: [art] Lock RT PCRs Done
3,046,154 UART: [art] Populate DV Done
3,054,319 UART: [fht] FMC Alias Private Key: 7
3,055,301 UART: [art] Derive CDI
3,055,581 UART: [art] Store in slot 0x4
3,141,380 UART: [art] Derive Key Pair
3,141,740 UART: [art] Store priv key in slot 0x5
3,154,814 UART: [art] Derive Key Pair - Done
3,169,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,061 UART: [art] PUB.X = 609018049CC7E2DD3A2220E5462E71677176EF230EBEE88E2386B09903B1BFE7C65D4EEDACA945BF977CE42A2ED7364B
3,192,832 UART: [art] PUB.Y = 1B523771078BB49372E3DB7EC7ECD88118FC37EF4182246196BF7C4F11A791CC74654BC0288A67C9F32419E6B31FFFEE
3,199,785 UART: [art] SIG.R = F8014143CC4C7C5A9B302166642F6CA9B213578A343521D295A49540036765DA825492B2746454CA5FB108F93EA70EF4
3,206,533 UART: [art] SIG.S = 516C568AB6C9D5EC779FF5956139476C5D522A3C4F116BB67EB79502355FEE709669E1086ABA10D3CC4C8E56FC1E4796
3,230,211 UART: Caliptra RT
3,230,462 UART: [state] CFI Enabled
3,350,745 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,425 UART: [rt]cmd =0x54514754, len=24
3,383,602 >>> mbox cmd response data (8 bytes)
3,383,603 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,172 UART: [rt]cmd =0x47544744, len=8
3,415,574 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,830 ready_for_fw is high
1,058,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,854 >>> mbox cmd response: success
2,676,854 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,738,627 UART:
2,738,643 UART: Running Caliptra FMC ...
2,739,051 UART:
2,739,105 UART: [state] CFI Enabled
2,749,643 UART: [fht] FMC Alias Private Key: 7
2,867,693 UART: [art] Extend RT PCRs Done
2,868,121 UART: [art] Lock RT PCRs Done
2,869,727 UART: [art] Populate DV Done
2,877,916 UART: [fht] FMC Alias Private Key: 7
2,879,032 UART: [art] Derive CDI
2,879,312 UART: [art] Store in slot 0x4
2,964,911 UART: [art] Derive Key Pair
2,965,271 UART: [art] Store priv key in slot 0x5
2,978,911 UART: [art] Derive Key Pair - Done
2,993,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,987 UART: [art] PUB.X = 697DDA50EB37645323BA97E98A52B374526F6422189F40396F134A315555418EC298E47940DF84D2528B7E9D2734FF9A
3,016,747 UART: [art] PUB.Y = 9C757523D6EDBE8BA25397D0AC83091D593E244BBF525A57007824D1441CA60C098D7E5328CE2EF5AD6793C3C18374E5
3,023,668 UART: [art] SIG.R = 8B8E279EECB650E29A4B44F3C43E6691BA7CC639DE1568B17569AEDABB7D3E091466269FB4E131D17904B5AFAD943440
3,030,442 UART: [art] SIG.S = 8480D4B263747F109BFC96EAAE968BB1DC3D6F85450732A0637501CA88CCC608318EB8E70B9B862CC7D6C6BB894545A4
3,054,218 UART: Caliptra RT
3,054,469 UART: [state] CFI Enabled
3,174,299 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,131 UART: [rt]cmd =0x54514754, len=24
3,207,224 >>> mbox cmd response data (8 bytes)
3,207,225 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,236,402 UART: [rt]cmd =0x47544744, len=8
3,238,700 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,559 UART: [kat] SHA2-256
891,109 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,489 UART: [kat] SHA2-256
901,429 UART: [kat] SHA2-384
904,290 UART: [kat] SHA2-512-ACC
906,191 UART: [kat] ECC-384
915,652 UART: [kat] HMAC-384Kdf
920,302 UART: [kat] LMS
1,168,614 UART: [kat] --
1,169,419 UART: [cold-reset] ++
1,169,957 UART: [fht] FHT @ 0x50003400
1,172,567 UART: [idev] ++
1,172,735 UART: [idev] CDI.KEYID = 6
1,173,096 UART: [idev] SUBJECT.KEYID = 7
1,173,521 UART: [idev] UDS.KEYID = 0
1,173,867 ready_for_fw is high
1,173,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,150 UART: [idev] Sha1 KeyId Algorithm
1,207,904 UART: [idev] --
1,208,911 UART: [ldev] ++
1,209,079 UART: [ldev] CDI.KEYID = 6
1,209,443 UART: [ldev] SUBJECT.KEYID = 5
1,209,870 UART: [ldev] AUTHORITY.KEYID = 7
1,210,333 UART: [ldev] FE.KEYID = 1
1,215,803 UART: [ldev] Erasing FE.KEYID = 1
1,242,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,511 UART: [ldev] --
1,281,852 UART: [fwproc] Wait for Commands...
1,282,587 UART: [fwproc] Recv command 0x46574c44
1,283,320 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,608 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,783 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,114 >>> mbox cmd response: success
2,826,114 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,212 UART: [afmc] ++
2,827,380 UART: [afmc] CDI.KEYID = 6
2,827,743 UART: [afmc] SUBJECT.KEYID = 7
2,828,169 UART: [afmc] AUTHORITY.KEYID = 5
2,862,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,892 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,602 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,483 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,184 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,087 UART: [afmc] --
2,905,922 UART: [cold-reset] --
2,906,772 UART: [state] Locking Datavault
2,908,039 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,643 UART: [state] Locking ICCM
2,909,253 UART: [exit] Launching FMC @ 0x40000130
2,914,583 UART:
2,914,599 UART: Running Caliptra FMC ...
2,915,007 UART:
2,915,150 UART: [state] CFI Enabled
2,925,678 UART: [fht] FMC Alias Private Key: 7
3,044,678 UART: [art] Extend RT PCRs Done
3,045,106 UART: [art] Lock RT PCRs Done
3,046,790 UART: [art] Populate DV Done
3,055,037 UART: [fht] FMC Alias Private Key: 7
3,056,115 UART: [art] Derive CDI
3,056,395 UART: [art] Store in slot 0x4
3,142,294 UART: [art] Derive Key Pair
3,142,654 UART: [art] Store priv key in slot 0x5
3,156,196 UART: [art] Derive Key Pair - Done
3,171,058 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,936 UART: [art] PUB.X = FA0E94A0839D01389A9332D8986240450FFAE96B2081D9B36CB09A35F854DC7EBD05C0C1EE7A524B3E754D33D68C2CE1
3,193,702 UART: [art] PUB.Y = 1D448096653D20E031CE0D2079304269B6EF62B0D22AFB77F55771F13B3C65074C8D5EA882706CA4EBCF6BEF68830901
3,200,640 UART: [art] SIG.R = E742E904F9473BA252ED4B257CD5E190DA4D26B46D4602A15F022BBBF4017DAB6E6B40EB4242EC9CBDC099AB8556660A
3,207,409 UART: [art] SIG.S = 9B3ACC8F09B8E1BEFB6A1288AC56F6C9E5B95BD4E7CBDA6A200448C746338F32BC82E75485491C2ECD66BCEF027FDDC9
3,230,866 UART: Caliptra RT
3,231,209 UART: [state] CFI Enabled
3,351,171 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,735 UART: [rt]cmd =0x54514754, len=24
3,383,716 >>> mbox cmd response data (8 bytes)
3,383,717 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,216 UART: [rt]cmd =0x47544744, len=8
3,415,562 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,931 ready_for_fw is high
1,058,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,437 >>> mbox cmd response: success
2,678,437 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,740,650 UART:
2,740,666 UART: Running Caliptra FMC ...
2,741,074 UART:
2,741,217 UART: [state] CFI Enabled
2,751,705 UART: [fht] FMC Alias Private Key: 7
2,870,353 UART: [art] Extend RT PCRs Done
2,870,781 UART: [art] Lock RT PCRs Done
2,872,141 UART: [art] Populate DV Done
2,880,104 UART: [fht] FMC Alias Private Key: 7
2,881,142 UART: [art] Derive CDI
2,881,422 UART: [art] Store in slot 0x4
2,967,289 UART: [art] Derive Key Pair
2,967,649 UART: [art] Store priv key in slot 0x5
2,981,069 UART: [art] Derive Key Pair - Done
2,995,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,615 UART: [art] PUB.X = FC655442B242BE23CF33A41EE5EE3F7AD61F2DFF5F93A848F5D33768B83E49CE4EF6E8595497CCA8011EF2811E5EC03B
3,018,398 UART: [art] PUB.Y = A64D2BD514F0314C000D16378EEF23905B0355DC685BA60FDE11426BDC4A3B9F21A66402829CC5BBCC2D8CFD224797D4
3,025,324 UART: [art] SIG.R = 2FE67A8BD601EDACB1BCFAAB8123CB51D77A857AE83ED35DA1FBE36409BF873F380DC4E7FC2BDF979B8A19130CC233A5
3,032,110 UART: [art] SIG.S = 4D119A7646105CDEEF259D31BD4FE47CF6CC482AFF0C31D2A94211A06E3F17FDBC392374098BB09C435E18018ECDC81E
3,055,699 UART: Caliptra RT
3,056,042 UART: [state] CFI Enabled
3,176,148 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,862 UART: [rt]cmd =0x54514754, len=24
3,209,195 >>> mbox cmd response data (8 bytes)
3,209,196 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,611 UART: [rt]cmd =0x47544744, len=8
3,241,091 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
893,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,565 UART: [kat] ++
897,717 UART: [kat] sha1
901,867 UART: [kat] SHA2-256
903,807 UART: [kat] SHA2-384
906,640 UART: [kat] SHA2-512-ACC
908,541 UART: [kat] ECC-384
918,806 UART: [kat] HMAC-384Kdf
923,406 UART: [kat] LMS
1,171,734 UART: [kat] --
1,172,551 UART: [cold-reset] ++
1,172,917 UART: [fht] FHT @ 0x50003400
1,175,474 UART: [idev] ++
1,175,642 UART: [idev] CDI.KEYID = 6
1,176,002 UART: [idev] SUBJECT.KEYID = 7
1,176,426 UART: [idev] UDS.KEYID = 0
1,176,771 ready_for_fw is high
1,176,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,084 UART: [idev] Erasing UDS.KEYID = 0
1,201,315 UART: [idev] Sha1 KeyId Algorithm
1,209,699 UART: [idev] --
1,210,731 UART: [ldev] ++
1,210,899 UART: [ldev] CDI.KEYID = 6
1,211,262 UART: [ldev] SUBJECT.KEYID = 5
1,211,688 UART: [ldev] AUTHORITY.KEYID = 7
1,212,151 UART: [ldev] FE.KEYID = 1
1,217,317 UART: [ldev] Erasing FE.KEYID = 1
1,243,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,563 UART: [ldev] --
1,283,024 UART: [fwproc] Wait for Commands...
1,283,796 UART: [fwproc] Recv command 0x46574c44
1,284,524 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,194 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,364 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,751 >>> mbox cmd response: success
2,826,751 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,859 UART: [afmc] ++
2,828,027 UART: [afmc] CDI.KEYID = 6
2,828,389 UART: [afmc] SUBJECT.KEYID = 7
2,828,814 UART: [afmc] AUTHORITY.KEYID = 5
2,864,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,182 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,891 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,774 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,475 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,361 UART: [afmc] --
2,908,427 UART: [cold-reset] --
2,909,465 UART: [state] Locking Datavault
2,910,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,282 UART: [state] Locking ICCM
2,911,872 UART: [exit] Launching FMC @ 0x40000130
2,917,202 UART:
2,917,218 UART: Running Caliptra FMC ...
2,917,626 UART:
2,917,680 UART: [state] CFI Enabled
2,927,864 UART: [fht] FMC Alias Private Key: 7
3,047,104 UART: [art] Extend RT PCRs Done
3,047,532 UART: [art] Lock RT PCRs Done
3,049,190 UART: [art] Populate DV Done
3,057,391 UART: [fht] FMC Alias Private Key: 7
3,058,497 UART: [art] Derive CDI
3,058,777 UART: [art] Store in slot 0x4
3,144,572 UART: [art] Derive Key Pair
3,144,932 UART: [art] Store priv key in slot 0x5
3,158,878 UART: [art] Derive Key Pair - Done
3,173,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,846 UART: [art] PUB.X = 6237DB86A131175659AC35AA898FA18CB89E9C965B30A81CEB6AA6D5A5CDAA9D6FB8A2638428E49932719AE54E55515F
3,196,624 UART: [art] PUB.Y = FB119C526285E1D6817F21BBBEC86A81DCC3B79C0D49839589805B68E6839F6001EF1392081EBBDA676E55B63678A16E
3,203,567 UART: [art] SIG.R = B7316EFD6E0B641DCAAF4BA2E11D3198B75899896C7F52FCA088A03225532DA0DA5C92C3F308BEBA42FC654DC3CCD7AD
3,210,353 UART: [art] SIG.S = E5B748098070D386788726D17E73593FD2B0FA6D48513497DDDA5F30A15BB836D5646AD0CE56371D5115BADC1F97B260
3,233,754 UART: Caliptra RT
3,234,005 UART: [state] CFI Enabled
3,353,727 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,303 UART: [rt]cmd =0x54514754, len=24
3,386,370 >>> mbox cmd response data (8 bytes)
3,386,371 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,036 UART: [rt]cmd =0x47544744, len=8
3,418,684 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,807 ready_for_fw is high
1,059,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,802 >>> mbox cmd response: success
2,678,802 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,787 UART:
2,739,803 UART: Running Caliptra FMC ...
2,740,211 UART:
2,740,265 UART: [state] CFI Enabled
2,750,651 UART: [fht] FMC Alias Private Key: 7
2,869,281 UART: [art] Extend RT PCRs Done
2,869,709 UART: [art] Lock RT PCRs Done
2,871,313 UART: [art] Populate DV Done
2,879,746 UART: [fht] FMC Alias Private Key: 7
2,880,740 UART: [art] Derive CDI
2,881,020 UART: [art] Store in slot 0x4
2,967,201 UART: [art] Derive Key Pair
2,967,561 UART: [art] Store priv key in slot 0x5
2,980,991 UART: [art] Derive Key Pair - Done
2,995,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,572 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,337 UART: [art] PUB.X = 0EF541C03B22620D26E2A38A316493E3971A8AF4AE410B1AB94EF1C47CB655ED0175DB8A51DE793459B899B8A24957FD
3,018,101 UART: [art] PUB.Y = 77AACB9003D9E2F4508E40122EC9B17714F432AE65E2BEB755C9B8AEDAFAD4F0FC4BCB84A8255A1EDEE375CB910BAC06
3,025,068 UART: [art] SIG.R = 718FA9BB6B33C6FA34F8A5600E3097C419E4631AF9FE6A9BAA162EBD20BA89352941075D5A3D2FE13C523829EF77D0AF
3,031,844 UART: [art] SIG.S = CBB5EC23E3DE37DE2AF2E34A999123824473A937E18E08806682095A3757AAEC79B1FB2CF09A739293D6F030A54B5306
3,056,597 UART: Caliptra RT
3,056,848 UART: [state] CFI Enabled
3,176,277 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,943 UART: [rt]cmd =0x54514754, len=24
3,209,052 >>> mbox cmd response data (8 bytes)
3,209,053 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,614 UART: [rt]cmd =0x47544744, len=8
3,241,254 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
893,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,752 UART: [kat] ++
897,904 UART: [kat] sha1
902,356 UART: [kat] SHA2-256
904,296 UART: [kat] SHA2-384
907,087 UART: [kat] SHA2-512-ACC
908,988 UART: [kat] ECC-384
918,845 UART: [kat] HMAC-384Kdf
923,315 UART: [kat] LMS
1,171,643 UART: [kat] --
1,172,816 UART: [cold-reset] ++
1,173,176 UART: [fht] FHT @ 0x50003400
1,175,943 UART: [idev] ++
1,176,111 UART: [idev] CDI.KEYID = 6
1,176,471 UART: [idev] SUBJECT.KEYID = 7
1,176,895 UART: [idev] UDS.KEYID = 0
1,177,240 ready_for_fw is high
1,177,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,677 UART: [idev] Erasing UDS.KEYID = 0
1,201,640 UART: [idev] Sha1 KeyId Algorithm
1,210,104 UART: [idev] --
1,211,052 UART: [ldev] ++
1,211,220 UART: [ldev] CDI.KEYID = 6
1,211,583 UART: [ldev] SUBJECT.KEYID = 5
1,212,009 UART: [ldev] AUTHORITY.KEYID = 7
1,212,472 UART: [ldev] FE.KEYID = 1
1,217,912 UART: [ldev] Erasing FE.KEYID = 1
1,244,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,792 UART: [ldev] --
1,284,193 UART: [fwproc] Wait for Commands...
1,284,985 UART: [fwproc] Recv command 0x46574c44
1,285,713 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,483 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,653 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,860 >>> mbox cmd response: success
2,829,860 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,830,930 UART: [afmc] ++
2,831,098 UART: [afmc] CDI.KEYID = 6
2,831,460 UART: [afmc] SUBJECT.KEYID = 7
2,831,885 UART: [afmc] AUTHORITY.KEYID = 5
2,868,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,663 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,891,372 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,897,255 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,956 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,808 UART: [afmc] --
2,911,802 UART: [cold-reset] --
2,912,412 UART: [state] Locking Datavault
2,913,859 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,463 UART: [state] Locking ICCM
2,915,087 UART: [exit] Launching FMC @ 0x40000130
2,920,417 UART:
2,920,433 UART: Running Caliptra FMC ...
2,920,841 UART:
2,920,984 UART: [state] CFI Enabled
2,931,600 UART: [fht] FMC Alias Private Key: 7
3,051,086 UART: [art] Extend RT PCRs Done
3,051,514 UART: [art] Lock RT PCRs Done
3,052,878 UART: [art] Populate DV Done
3,060,901 UART: [fht] FMC Alias Private Key: 7
3,061,841 UART: [art] Derive CDI
3,062,121 UART: [art] Store in slot 0x4
3,147,896 UART: [art] Derive Key Pair
3,148,256 UART: [art] Store priv key in slot 0x5
3,161,748 UART: [art] Derive Key Pair - Done
3,176,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,666 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,431 UART: [art] PUB.X = 8E5E5A69F5013FC16B43B923C3A52244CB6965C8C1B9541791C494A2428273C505CADF76E88F2A5A8DF4BFC010AF5E55
3,199,201 UART: [art] PUB.Y = 5BC6EFA404D25B3F239BE4D19CB9B2C9BB468643EE8E34814A23A318BC8673E6317733633347ECE697D834592783FBD9
3,206,150 UART: [art] SIG.R = DE64B9529DA60AC8DC282D6426D29FB45D55C51A9A874D139398B643A6E831FEC7301D11A02FA68BA8113FE6CCE737B8
3,212,927 UART: [art] SIG.S = C2665E0D6B539E3561B758D690923DDA9293CDA23E71517C9AB9CDAB5FAAE2A0411987A311C72A5693A35FA5D423AFA0
3,237,192 UART: Caliptra RT
3,237,535 UART: [state] CFI Enabled
3,357,321 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,075 UART: [rt]cmd =0x54514754, len=24
3,390,206 >>> mbox cmd response data (8 bytes)
3,390,207 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,419,562 UART: [rt]cmd =0x47544744, len=8
3,422,220 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,980 ready_for_fw is high
1,060,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,699 >>> mbox cmd response: success
2,682,699 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,745,256 UART:
2,745,272 UART: Running Caliptra FMC ...
2,745,680 UART:
2,745,823 UART: [state] CFI Enabled
2,756,253 UART: [fht] FMC Alias Private Key: 7
2,875,727 UART: [art] Extend RT PCRs Done
2,876,155 UART: [art] Lock RT PCRs Done
2,877,795 UART: [art] Populate DV Done
2,885,712 UART: [fht] FMC Alias Private Key: 7
2,886,824 UART: [art] Derive CDI
2,887,104 UART: [art] Store in slot 0x4
2,972,779 UART: [art] Derive Key Pair
2,973,139 UART: [art] Store priv key in slot 0x5
2,986,487 UART: [art] Derive Key Pair - Done
3,001,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,017,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,807 UART: [art] PUB.X = AFE164251625466E2E09C08636BBF22E719B125F68A857D2EE9CBD056CCF6D4397E53A6A3BF4FDEFD5DBA333207A8001
3,024,580 UART: [art] PUB.Y = 47B9499DCFEA8ACC723959ED344382AC04EA5731944C5688832EBFAB4D95BF8B658E5580AD1593D5F6F7383C583EFD3C
3,031,537 UART: [art] SIG.R = 031664B11656790501D848F4681B8850EEE80CCAA341E36B0AB37548756FCE3C35EF3FEE84DD4E171F8E69F112D6DCB6
3,038,298 UART: [art] SIG.S = 4995BCDF6210238E8A5528948613072AED593B2E89DB435180FF0161F389FE5DF85B0D2DF6EF9C67B48D606CBDDD9781
3,062,193 UART: Caliptra RT
3,062,536 UART: [state] CFI Enabled
3,181,848 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,342 UART: [rt]cmd =0x54514754, len=24
3,214,567 >>> mbox cmd response data (8 bytes)
3,214,568 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,244,027 UART: [rt]cmd =0x47544744, len=8
3,246,405 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,156 UART:
192,517 UART: Running Caliptra ROM ...
193,679 UART:
193,823 UART: [state] CFI Enabled
264,150 UART: [state] LifecycleState = Unprovisioned
266,065 UART: [state] DebugLocked = No
267,523 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,616 UART: [kat] SHA2-256
441,344 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,875 UART: [kat] ++
452,325 UART: [kat] sha1
462,207 UART: [kat] SHA2-256
464,856 UART: [kat] SHA2-384
470,773 UART: [kat] SHA2-512-ACC
473,144 UART: [kat] ECC-384
2,766,139 UART: [kat] HMAC-384Kdf
2,798,709 UART: [kat] LMS
3,989,025 UART: [kat] --
3,993,376 UART: [cold-reset] ++
3,995,311 UART: [fht] Storing FHT @ 0x50003400
4,007,307 UART: [idev] ++
4,007,877 UART: [idev] CDI.KEYID = 6
4,008,800 UART: [idev] SUBJECT.KEYID = 7
4,010,058 UART: [idev] UDS.KEYID = 0
4,011,075 ready_for_fw is high
4,011,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,807 UART: [idev] Erasing UDS.KEYID = 0
7,344,842 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,475 UART: [idev] --
7,370,550 UART: [ldev] ++
7,371,175 UART: [ldev] CDI.KEYID = 6
7,372,101 UART: [ldev] SUBJECT.KEYID = 5
7,373,320 UART: [ldev] AUTHORITY.KEYID = 7
7,374,549 UART: [ldev] FE.KEYID = 1
7,421,843 UART: [ldev] Erasing FE.KEYID = 1
10,753,887 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,044 UART: [ldev] --
13,114,181 UART: [fwproc] Waiting for Commands...
13,116,928 UART: [fwproc] Received command 0x46574c44
13,119,104 UART: [fwproc] Received Image of size 118548 bytes
17,220,415 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,088 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,271 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,087 >>> mbox cmd response: success
17,697,301 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,700,718 UART: [afmc] ++
17,701,295 UART: [afmc] CDI.KEYID = 6
17,702,309 UART: [afmc] SUBJECT.KEYID = 7
17,703,486 UART: [afmc] AUTHORITY.KEYID = 5
21,070,050 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,365,035 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,367,295 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,381,754 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,396,450 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,410,900 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,432,415 UART: [afmc] --
23,437,088 UART: [cold-reset] --
23,442,412 UART: [state] Locking Datavault
23,446,957 UART: [state] Locking PCR0, PCR1 and PCR31
23,448,712 UART: [state] Locking ICCM
23,450,647 UART: [exit] Launching FMC @ 0x40000130
23,459,045 UART:
23,459,288 UART: Running Caliptra FMC ...
23,460,335 UART:
23,460,511 UART: [state] CFI Enabled
23,524,996 UART: [fht] FMC Alias Private Key: 7
25,865,304 UART: [art] Extend RT PCRs Done
25,866,528 UART: [art] Lock RT PCRs Done
25,868,255 UART: [art] Populate DV Done
25,873,779 UART: [fht] FMC Alias Private Key: 7
25,875,261 UART: [art] Derive CDI
25,876,019 UART: [art] Store in slot 0x4
25,933,738 UART: [art] Derive Key Pair
25,934,781 UART: [art] Store priv key in slot 0x5
29,227,104 UART: [art] Derive Key Pair - Done
29,240,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,527,677 UART: [art] Erasing AUTHORITY.KEYID = 7
31,529,187 UART: [art] PUB.X = 535521F3B5AA4C6C8825D401FB65AD989E0DEE2A181EEA9C4E0AFBF368DCD87107F95769338BE4DF7D85809A9233A569
31,536,447 UART: [art] PUB.Y = 3939BD06BF924050C28D70F64A9397B85861F22F687769EE9934A666AA3BD69613FFB2D74F60DF5906163C78EC11FF2B
31,543,695 UART: [art] SIG.R = CF2AFBF52CC65930B8B012534C5DD2F1F2B28094278F81CC39BD6D1B5A977B511252B5821332818B9656BD004F58EB2F
31,551,133 UART: [art] SIG.S = 8059D047B8F1FF842C3A52DE266B99FED9CF2B9834997D8C3E1F2AAA3B3B028AA74464545C724C64C746E9786E6C2E71
32,856,090 UART: Caliptra RT
32,856,799 UART: [state] CFI Enabled
33,033,609 UART: [rt] RT listening for mailbox commands...
33,065,139 UART: [rt]cmd =0x54514754, len=24
33,067,623 >>> mbox cmd response data (8 bytes)
33,068,511 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,098,573 UART: [rt]cmd =0x44504543, len=36
33,139,442 >>> mbox cmd response data (24 bytes)
33,140,047 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,169,907 UART: [rt]cmd =0x47544744, len=8
33,171,737 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,787,424 ready_for_fw is high
3,787,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,952,009 >>> mbox cmd response: success
17,953,221 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,651,004 UART:
23,651,389 UART: Running Caliptra FMC ...
23,652,539 UART:
23,652,710 UART: [state] CFI Enabled
23,719,596 UART: [fht] FMC Alias Private Key: 7
26,081,120 UART: [art] Extend RT PCRs Done
26,082,342 UART: [art] Lock RT PCRs Done
26,084,138 UART: [art] Populate DV Done
26,089,457 UART: [fht] FMC Alias Private Key: 7
26,091,168 UART: [art] Derive CDI
26,091,992 UART: [art] Store in slot 0x4
26,149,350 UART: [art] Derive Key Pair
26,150,389 UART: [art] Store priv key in slot 0x5
29,443,293 UART: [art] Derive Key Pair - Done
29,456,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,312 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,814 UART: [art] PUB.X = 856FA343AA5F362B4BDB7126E0AE3E24BAFED8BFB9375C53BA0B1A2AD6F33A9DC1C9EAC7423D5230C2C691C8E25FB7C7
31,754,116 UART: [art] PUB.Y = 1273EB9FEB9588678497B83941A0AC7925C86E75BFC047AF38B04933CE866F4A85564305EBE47C611AE363E8D40A13C9
31,761,371 UART: [art] SIG.R = B6EBE14459790D60207438181F245B41E646930648FC8F7365FD5AAF3E56D64A58EEE5F9F3A144918C5FD10427BBCFE8
31,768,715 UART: [art] SIG.S = E69EBD7C89DB2610F9F941F812998B79DEBE9AF75EBB1199FF8379D00424A331F5697015389BCF793EF294106EEB91CD
33,073,904 UART: Caliptra RT
33,074,646 UART: [state] CFI Enabled
33,251,414 UART: [rt] RT listening for mailbox commands...
33,283,343 UART: [rt]cmd =0x54514754, len=24
33,286,042 >>> mbox cmd response data (8 bytes)
33,286,816 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,316,747 UART: [rt]cmd =0x44504543, len=36
33,356,886 >>> mbox cmd response data (24 bytes)
33,357,529 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,387,258 UART: [rt]cmd =0x47544744, len=8
33,389,410 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,271 UART:
192,635 UART: Running Caliptra ROM ...
193,751 UART:
603,414 UART: [state] CFI Enabled
620,466 UART: [state] LifecycleState = Unprovisioned
622,444 UART: [state] DebugLocked = No
624,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,145 UART: [kat] SHA2-256
799,919 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,464 UART: [kat] ++
811,001 UART: [kat] sha1
821,995 UART: [kat] SHA2-256
824,721 UART: [kat] SHA2-384
830,633 UART: [kat] SHA2-512-ACC
832,997 UART: [kat] ECC-384
3,117,150 UART: [kat] HMAC-384Kdf
3,129,776 UART: [kat] LMS
4,319,881 UART: [kat] --
4,325,146 UART: [cold-reset] ++
4,327,567 UART: [fht] Storing FHT @ 0x50003400
4,338,609 UART: [idev] ++
4,339,165 UART: [idev] CDI.KEYID = 6
4,340,142 UART: [idev] SUBJECT.KEYID = 7
4,341,392 UART: [idev] UDS.KEYID = 0
4,342,463 ready_for_fw is high
4,342,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,605 UART: [idev] Erasing UDS.KEYID = 0
7,627,552 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,857 UART: [idev] --
7,654,627 UART: [ldev] ++
7,655,195 UART: [ldev] CDI.KEYID = 6
7,656,154 UART: [ldev] SUBJECT.KEYID = 5
7,657,412 UART: [ldev] AUTHORITY.KEYID = 7
7,658,639 UART: [ldev] FE.KEYID = 1
7,671,601 UART: [ldev] Erasing FE.KEYID = 1
10,960,064 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,366 UART: [ldev] --
13,322,468 UART: [fwproc] Waiting for Commands...
13,324,989 UART: [fwproc] Received command 0x46574c44
13,327,164 UART: [fwproc] Received Image of size 118548 bytes
17,429,015 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,582 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,739 >>> mbox cmd response: success
17,904,806 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,907,719 UART: [afmc] ++
17,908,355 UART: [afmc] CDI.KEYID = 6
17,909,262 UART: [afmc] SUBJECT.KEYID = 7
17,910,531 UART: [afmc] AUTHORITY.KEYID = 5
21,226,083 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,411 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,673 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,114 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,854 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,263 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,589,117 UART: [afmc] --
23,592,608 UART: [cold-reset] --
23,597,699 UART: [state] Locking Datavault
23,604,175 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,918 UART: [state] Locking ICCM
23,608,169 UART: [exit] Launching FMC @ 0x40000130
23,616,553 UART:
23,616,788 UART: Running Caliptra FMC ...
23,617,882 UART:
23,618,036 UART: [state] CFI Enabled
23,625,918 UART: [fht] FMC Alias Private Key: 7
25,966,369 UART: [art] Extend RT PCRs Done
25,967,611 UART: [art] Lock RT PCRs Done
25,969,506 UART: [art] Populate DV Done
25,975,114 UART: [fht] FMC Alias Private Key: 7
25,976,817 UART: [art] Derive CDI
25,977,548 UART: [art] Store in slot 0x4
26,020,402 UART: [art] Derive Key Pair
26,021,400 UART: [art] Store priv key in slot 0x5
29,263,955 UART: [art] Derive Key Pair - Done
29,276,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,000 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,513 UART: [art] PUB.X = 15A0F0CC5E79DD405F714855F13978CFEEA77F23C5B9F4161F7DB03F9058B11AE19DC91550577842390063444F53F7D7
31,565,779 UART: [art] PUB.Y = 02FC4E5CA9D90213775D885EFA81209D3B7A62D4412BF4DAB4A7E81B2F35F303E9926C288731AC4BECB061B2C46CCB55
31,573,045 UART: [art] SIG.R = D994D18900F7806D464022170BE5A51DA8E0AE00B326D4F504B00068637E02DD355AAEF12B833573CD3165349371B0BE
31,580,347 UART: [art] SIG.S = E11492F39BFD3CD96434D76DA6DC44C0AE46244532473B584626883D4E5D2E3186F146618AE43EBD170C2CBC579341E5
32,885,181 UART: Caliptra RT
32,885,893 UART: [state] CFI Enabled
33,019,000 UART: [rt] RT listening for mailbox commands...
33,050,423 UART: [rt]cmd =0x54514754, len=24
33,053,232 >>> mbox cmd response data (8 bytes)
33,054,016 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,084,066 UART: [rt]cmd =0x44504543, len=36
33,124,545 >>> mbox cmd response data (24 bytes)
33,125,182 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,154,735 UART: [rt]cmd =0x47544744, len=8
33,156,456 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
4,126,927 ready_for_fw is high
4,127,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,085 >>> mbox cmd response: success
18,163,312 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,798,898 UART:
23,799,303 UART: Running Caliptra FMC ...
23,800,413 UART:
23,800,564 UART: [state] CFI Enabled
23,808,355 UART: [fht] FMC Alias Private Key: 7
26,148,615 UART: [art] Extend RT PCRs Done
26,149,843 UART: [art] Lock RT PCRs Done
26,151,383 UART: [art] Populate DV Done
26,156,963 UART: [fht] FMC Alias Private Key: 7
26,158,494 UART: [art] Derive CDI
26,159,221 UART: [art] Store in slot 0x4
26,201,703 UART: [art] Derive Key Pair
26,202,741 UART: [art] Store priv key in slot 0x5
29,444,728 UART: [art] Derive Key Pair - Done
29,457,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,618 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,121 UART: [art] PUB.X = 1FAC5904F10C418314D0933295A5B9939C29ECD7F681FC9AA3AFD3CBEB9437F410971CBCB6E5E32308FDF8B57026B30C
31,746,434 UART: [art] PUB.Y = D4B749218F027ABBD8274E836A4673B9F73CB76E2B2E209504665E6E83749194E5C54DE6FEE931E109A9C3D791E86D1F
31,753,625 UART: [art] SIG.R = 0EBDA86C90D7F31CA2D8A9C3219F7A7159C8BD8D1211F2CAF91EFBE87A3B6D7259068A55079874913EACD03312D3D79A
31,761,010 UART: [art] SIG.S = 0D111607FACF96FB896B27725495BB55549CAD22DE379ED62311A2383997E4469E4ED896F1B737C1FEBFAD4458E81E02
33,065,648 UART: Caliptra RT
33,066,362 UART: [state] CFI Enabled
33,199,802 UART: [rt] RT listening for mailbox commands...
33,231,103 UART: [rt]cmd =0x54514754, len=24
33,233,831 >>> mbox cmd response data (8 bytes)
33,234,691 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,264,632 UART: [rt]cmd =0x44504543, len=36
33,304,716 >>> mbox cmd response data (24 bytes)
33,305,367 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,335,195 UART: [rt]cmd =0x47544744, len=8
33,337,185 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
191,978 UART:
192,350 UART: Running Caliptra ROM ...
193,441 UART:
193,579 UART: [state] CFI Enabled
262,392 UART: [state] LifecycleState = Unprovisioned
264,407 UART: [state] DebugLocked = No
266,070 UART: [state] WD Timer not started. Device not locked for debugging
270,046 UART: [kat] SHA2-256
449,743 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,495 UART: [kat] ++
460,947 UART: [kat] sha1
472,882 UART: [kat] SHA2-256
475,600 UART: [kat] SHA2-384
481,807 UART: [kat] SHA2-512-ACC
484,172 UART: [kat] ECC-384
2,950,370 UART: [kat] HMAC-384Kdf
2,971,378 UART: [kat] LMS
3,447,897 UART: [kat] --
3,451,409 UART: [cold-reset] ++
3,452,632 UART: [fht] FHT @ 0x50003400
3,462,821 UART: [idev] ++
3,463,396 UART: [idev] CDI.KEYID = 6
3,464,423 UART: [idev] SUBJECT.KEYID = 7
3,465,592 UART: [idev] UDS.KEYID = 0
3,466,521 ready_for_fw is high
3,466,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,420 UART: [idev] Erasing UDS.KEYID = 0
5,984,913 UART: [idev] Sha1 KeyId Algorithm
6,009,762 UART: [idev] --
6,013,320 UART: [ldev] ++
6,013,890 UART: [ldev] CDI.KEYID = 6
6,014,858 UART: [ldev] SUBJECT.KEYID = 5
6,016,019 UART: [ldev] AUTHORITY.KEYID = 7
6,017,307 UART: [ldev] FE.KEYID = 1
6,057,181 UART: [ldev] Erasing FE.KEYID = 1
8,565,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,885 UART: [ldev] --
10,373,108 UART: [fwproc] Wait for Commands...
10,376,133 UART: [fwproc] Recv command 0x46574c44
10,378,169 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,929 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,007,930 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,335,472 >>> mbox cmd response: success
14,336,548 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,338,765 UART: [afmc] ++
14,339,402 UART: [afmc] CDI.KEYID = 6
14,340,310 UART: [afmc] SUBJECT.KEYID = 7
14,341,524 UART: [afmc] AUTHORITY.KEYID = 5
16,872,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,803 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,579 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,665 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,204 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,779 UART: [afmc] --
18,694,027 UART: [cold-reset] --
18,699,570 UART: [state] Locking Datavault
18,704,773 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,469 UART: [state] Locking ICCM
18,708,321 UART: [exit] Launching FMC @ 0x40000130
18,716,706 UART:
18,716,934 UART: Running Caliptra FMC ...
18,717,952 UART:
18,718,095 UART: [state] CFI Enabled
18,774,237 UART: [fht] FMC Alias Private Key: 7
20,540,169 UART: [art] Extend RT PCRs Done
20,541,385 UART: [art] Lock RT PCRs Done
20,543,090 UART: [art] Populate DV Done
20,548,393 UART: [fht] FMC Alias Private Key: 7
20,549,927 UART: [art] Derive CDI
20,550,661 UART: [art] Store in slot 0x4
20,607,237 UART: [art] Derive Key Pair
20,608,277 UART: [art] Store priv key in slot 0x5
23,072,275 UART: [art] Derive Key Pair - Done
23,085,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,610 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,107 UART: [art] PUB.X = 704DFEBBD015F3DCEAE664CCCD4C21841083195BB0EF7F5CF008885F90EE159A8633E5C91143068AA04BAFB7E186F405
24,806,411 UART: [art] PUB.Y = 25EABB8136044E7F659AE813E2BE89E484FD70A20B7AA1DAECBA41EA0203C31F0B13C36EE66FDF0725597762CE12DFE7
24,813,688 UART: [art] SIG.R = B7AB9648BE6398021223A8FC7D12FBCBE10327A61185D146D191C7EE609114ECE55B3533F61BE0395537C2A76FFB41F9
24,821,081 UART: [art] SIG.S = 1F23C7BA1CE731D8F1EE8DC6EB8CA9924DDCFCE5B87218319B0510C46E5933480E8E041B6AF8E8E7736DE3671DC4E72C
25,799,792 UART: Caliptra RT
25,800,510 UART: [state] CFI Enabled
25,981,546 UART: [rt] RT listening for mailbox commands...
26,013,187 UART: [rt]cmd =0x54514754, len=24
26,015,827 >>> mbox cmd response data (8 bytes)
26,017,008 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,047,157 UART: [rt]cmd =0x44504543, len=36
26,087,196 >>> mbox cmd response data (24 bytes)
26,087,802 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,117,413 UART: [rt]cmd =0x47544744, len=8
26,119,556 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,460,164 ready_for_fw is high
3,460,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,255,946 >>> mbox cmd response: success
14,257,437 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,534,479 UART:
18,534,863 UART: Running Caliptra FMC ...
18,536,005 UART:
18,536,163 UART: [state] CFI Enabled
18,604,392 UART: [fht] FMC Alias Private Key: 7
20,370,526 UART: [art] Extend RT PCRs Done
20,371,750 UART: [art] Lock RT PCRs Done
20,373,618 UART: [art] Populate DV Done
20,379,028 UART: [fht] FMC Alias Private Key: 7
20,380,569 UART: [art] Derive CDI
20,381,300 UART: [art] Store in slot 0x4
20,437,014 UART: [art] Derive Key Pair
20,438,057 UART: [art] Store priv key in slot 0x5
22,900,855 UART: [art] Derive Key Pair - Done
22,913,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,501 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,022 UART: [art] PUB.X = EC89A552DF1879B3022F1E29581C988B795B4B2552E42189A029D3A5A27B8AEB392651B2CF2D340D224C9F97CEB082BA
24,635,297 UART: [art] PUB.Y = 858C6089D41B0B0C1711F4944360EB70D1B1DBC30B72F8A5AC8C2A5A119F0CB4C5E66AA13BB0F5D4B40617A71628B2F0
24,642,530 UART: [art] SIG.R = 1DA7F9DA23E13D52199B070831FFB312ADA8F4C7CAAE419EA1EEBD3E2A9D3EFB2A67ADDFECCB29B69336B08A3F90D351
24,649,925 UART: [art] SIG.S = 6D7BB93CBE79A9EDFA063B78D284FF8AF6136F8DCAD9E8FF82AD97D0CC1527E41B1F156F4B26A948F4A5796601F0DD9B
25,628,544 UART: Caliptra RT
25,629,261 UART: [state] CFI Enabled
25,810,708 UART: [rt] RT listening for mailbox commands...
25,842,051 UART: [rt]cmd =0x54514754, len=24
25,844,666 >>> mbox cmd response data (8 bytes)
25,845,697 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,876,079 UART: [rt]cmd =0x44504543, len=36
25,915,348 >>> mbox cmd response data (24 bytes)
25,915,986 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,945,888 UART: [rt]cmd =0x47544744, len=8
25,947,833 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,381 UART:
192,747 UART: Running Caliptra ROM ...
193,831 UART:
603,511 UART: [state] CFI Enabled
614,080 UART: [state] LifecycleState = Unprovisioned
615,968 UART: [state] DebugLocked = No
617,780 UART: [state] WD Timer not started. Device not locked for debugging
622,248 UART: [kat] SHA2-256
801,913 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,707 UART: [kat] ++
813,210 UART: [kat] sha1
824,401 UART: [kat] SHA2-256
827,105 UART: [kat] SHA2-384
833,316 UART: [kat] SHA2-512-ACC
835,686 UART: [kat] ECC-384
3,279,104 UART: [kat] HMAC-384Kdf
3,291,061 UART: [kat] LMS
3,767,552 UART: [kat] --
3,772,425 UART: [cold-reset] ++
3,774,457 UART: [fht] FHT @ 0x50003400
3,785,614 UART: [idev] ++
3,786,189 UART: [idev] CDI.KEYID = 6
3,787,226 UART: [idev] SUBJECT.KEYID = 7
3,788,404 UART: [idev] UDS.KEYID = 0
3,789,331 ready_for_fw is high
3,789,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,383 UART: [idev] Erasing UDS.KEYID = 0
6,268,079 UART: [idev] Sha1 KeyId Algorithm
6,290,819 UART: [idev] --
6,296,596 UART: [ldev] ++
6,297,229 UART: [ldev] CDI.KEYID = 6
6,298,109 UART: [ldev] SUBJECT.KEYID = 5
6,299,322 UART: [ldev] AUTHORITY.KEYID = 7
6,300,608 UART: [ldev] FE.KEYID = 1
6,313,363 UART: [ldev] Erasing FE.KEYID = 1
8,793,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,666 UART: [ldev] --
10,587,638 UART: [fwproc] Wait for Commands...
10,590,885 UART: [fwproc] Recv command 0x46574c44
10,592,873 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,053 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,069 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,204 >>> mbox cmd response: success
14,559,375 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,562,616 UART: [afmc] ++
14,563,205 UART: [afmc] CDI.KEYID = 6
14,564,143 UART: [afmc] SUBJECT.KEYID = 7
14,565,358 UART: [afmc] AUTHORITY.KEYID = 5
17,069,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,013 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,196 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,005 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,068 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,686 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,413 UART: [afmc] --
18,870,329 UART: [cold-reset] --
18,875,162 UART: [state] Locking Datavault
18,878,947 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,698 UART: [state] Locking ICCM
18,882,364 UART: [exit] Launching FMC @ 0x40000130
18,890,818 UART:
18,891,054 UART: Running Caliptra FMC ...
18,892,160 UART:
18,892,320 UART: [state] CFI Enabled
18,900,373 UART: [fht] FMC Alias Private Key: 7
20,667,058 UART: [art] Extend RT PCRs Done
20,668,276 UART: [art] Lock RT PCRs Done
20,669,995 UART: [art] Populate DV Done
20,675,299 UART: [fht] FMC Alias Private Key: 7
20,676,906 UART: [art] Derive CDI
20,677,645 UART: [art] Store in slot 0x4
20,720,287 UART: [art] Derive Key Pair
20,721,288 UART: [art] Store priv key in slot 0x5
23,148,332 UART: [art] Derive Key Pair - Done
23,161,063 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,435 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,931 UART: [art] PUB.X = 989C480F7D36AECDEF5225A59A9E4046DC0D3590E260AB186F714191CF8F808E42DEB542833949CB1A468E213F00539F
24,876,174 UART: [art] PUB.Y = 2D583D7C5D2781319645F5384F96FDE70F4021488E8CA318BE6E3125C66B8A38DC2E082D110185FD23E9B02B31A9B53C
24,883,399 UART: [art] SIG.R = 8CE511F994E291513D449347EE733C1C91848FEBB1D6DE5CDCC5DB9A969E34265D41D11B2B67BD4304F989CFEBA62E98
24,890,833 UART: [art] SIG.S = 170DCF20E5542FA08F6BA1D89DF7F45869EFD37E696D21CC50E3E96568F906C59E3B373E92FBC82E20EDFC88BA1BD89C
25,869,605 UART: Caliptra RT
25,870,316 UART: [state] CFI Enabled
26,003,201 UART: [rt] RT listening for mailbox commands...
26,034,769 UART: [rt]cmd =0x54514754, len=24
26,037,603 >>> mbox cmd response data (8 bytes)
26,038,525 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,068,553 UART: [rt]cmd =0x44504543, len=36
26,109,015 >>> mbox cmd response data (24 bytes)
26,109,672 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,139,237 UART: [rt]cmd =0x47544744, len=8
26,141,013 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
3,779,007 ready_for_fw is high
3,779,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,972 >>> mbox cmd response: success
14,449,303 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,696,162 UART:
18,696,542 UART: Running Caliptra FMC ...
18,697,686 UART:
18,697,847 UART: [state] CFI Enabled
18,705,589 UART: [fht] FMC Alias Private Key: 7
20,471,184 UART: [art] Extend RT PCRs Done
20,472,404 UART: [art] Lock RT PCRs Done
20,474,161 UART: [art] Populate DV Done
20,479,743 UART: [fht] FMC Alias Private Key: 7
20,481,447 UART: [art] Derive CDI
20,482,268 UART: [art] Store in slot 0x4
20,524,811 UART: [art] Derive Key Pair
20,525,815 UART: [art] Store priv key in slot 0x5
22,952,764 UART: [art] Derive Key Pair - Done
22,965,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,662 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,163 UART: [art] PUB.X = 3F130EB67393914D488866C772689A3688CB3B85B5BFE83624D472B7A6C133843FDE0A5887B762AE4CEA1FA06C60344C
24,680,422 UART: [art] PUB.Y = 523020C8CFC61E95D37F6C3E2483D2F9105E3E456600B26B112BD9CEB7B8DFEBCFC52EE84986636BAA4CFAE067F18F15
24,687,681 UART: [art] SIG.R = 8957E40ECFBFF4E4A1C326BBB7547934E001B0989EF3D697A901F61E9983D0E53FD1D64268970E65D1668468E387E9C3
24,695,086 UART: [art] SIG.S = EB9116EA34710E511D31DA8770CD9F85916ADA5A996A80F5F9212BB274A3AAE58FEA527FF48CE9A663EFCD81C787283B
25,674,194 UART: Caliptra RT
25,674,894 UART: [state] CFI Enabled
25,807,074 UART: [rt] RT listening for mailbox commands...
25,838,706 UART: [rt]cmd =0x54514754, len=24
25,841,479 >>> mbox cmd response data (8 bytes)
25,842,457 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,872,435 UART: [rt]cmd =0x44504543, len=36
25,913,121 >>> mbox cmd response data (24 bytes)
25,913,780 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,943,721 UART: [rt]cmd =0x47544744, len=8
25,945,600 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,097 UART:
192,487 UART: Running Caliptra ROM ...
193,675 UART:
193,825 UART: [state] CFI Enabled
262,337 UART: [state] LifecycleState = Unprovisioned
264,754 UART: [state] DebugLocked = No
267,003 UART: [state] WD Timer not started. Device not locked for debugging
271,192 UART: [kat] SHA2-256
461,045 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,870 UART: [kat] ++
472,316 UART: [kat] sha1
483,470 UART: [kat] SHA2-256
486,476 UART: [kat] SHA2-384
492,958 UART: [kat] SHA2-512-ACC
495,535 UART: [kat] ECC-384
2,944,649 UART: [kat] HMAC-384Kdf
2,970,245 UART: [kat] LMS
3,501,978 UART: [kat] --
3,506,425 UART: [cold-reset] ++
3,507,577 UART: [fht] FHT @ 0x50003400
3,519,474 UART: [idev] ++
3,520,185 UART: [idev] CDI.KEYID = 6
3,521,212 UART: [idev] SUBJECT.KEYID = 7
3,522,381 UART: [idev] UDS.KEYID = 0
3,523,302 ready_for_fw is high
3,523,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,518 UART: [idev] Erasing UDS.KEYID = 0
6,028,203 UART: [idev] Sha1 KeyId Algorithm
6,050,683 UART: [idev] --
6,054,627 UART: [ldev] ++
6,055,310 UART: [ldev] CDI.KEYID = 6
6,056,195 UART: [ldev] SUBJECT.KEYID = 5
6,057,511 UART: [ldev] AUTHORITY.KEYID = 7
6,058,726 UART: [ldev] FE.KEYID = 1
6,098,949 UART: [ldev] Erasing FE.KEYID = 1
8,605,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,693 UART: [ldev] --
10,410,952 UART: [fwproc] Wait for Commands...
10,412,986 UART: [fwproc] Recv command 0x46574c44
10,415,236 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,783 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,429 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,684,455 >>> mbox cmd response: success
14,685,602 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,687,729 UART: [afmc] ++
14,688,423 UART: [afmc] CDI.KEYID = 6
14,689,584 UART: [afmc] SUBJECT.KEYID = 7
14,691,120 UART: [afmc] AUTHORITY.KEYID = 5
17,233,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,954,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,956,077 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,971,137 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,986,286 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,001,218 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,023,969 UART: [afmc] --
19,028,358 UART: [cold-reset] --
19,034,816 UART: [state] Locking Datavault
19,039,848 UART: [state] Locking PCR0, PCR1 and PCR31
19,041,981 UART: [state] Locking ICCM
19,044,234 UART: [exit] Launching FMC @ 0x40000130
19,052,921 UART:
19,053,157 UART: Running Caliptra FMC ...
19,054,260 UART:
19,054,415 UART: [state] CFI Enabled
19,111,832 UART: [fht] FMC Alias Private Key: 7
20,899,988 UART: [art] Extend RT PCRs Done
20,901,203 UART: [art] Lock RT PCRs Done
20,903,334 UART: [art] Populate DV Done
20,908,524 UART: [fht] FMC Alias Private Key: 7
20,910,215 UART: [art] Derive CDI
20,910,948 UART: [art] Store in slot 0x4
20,965,361 UART: [art] Derive Key Pair
20,966,398 UART: [art] Store priv key in slot 0x5
23,429,359 UART: [art] Derive Key Pair - Done
23,442,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,154,725 UART: [art] Erasing AUTHORITY.KEYID = 7
25,156,256 UART: [art] PUB.X = 53821512636B2497B7A3E248DABEBE63E70E7A6D162FCF7BA754D64BA1E45D09D89B716EB43C5EA5DBFD020A7251F4D2
25,163,478 UART: [art] PUB.Y = 5EF7FAC762E3B9463C5340258BBF1ED6844CCD561AD2DB78CFE2C0E75900CF42A5955D3DC530D04DC9689E0C1CC03DB5
25,170,784 UART: [art] SIG.R = 770421DAAD30F7F9723052821C737FE8550B4722F57333BD015527904869073A35067AC46A36836798C6B59B1AFAEF6F
25,178,120 UART: [art] SIG.S = FCE3144333FC8515A31C9767C21AF935E898B776A406A7ED966748E1095A225D70BA8940B501F8A97385C9D3A108DC64
26,156,268 UART: Caliptra RT
26,156,961 UART: [state] CFI Enabled
26,338,409 UART: [rt] RT listening for mailbox commands...
26,370,064 UART: [rt]cmd =0x54514754, len=24
26,373,036 >>> mbox cmd response data (8 bytes)
26,373,976 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,403,855 UART: [rt]cmd =0x44504543, len=36
26,443,856 >>> mbox cmd response data (24 bytes)
26,444,471 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,474,098 UART: [rt]cmd =0x47544744, len=8
26,475,968 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,416,310 ready_for_fw is high
3,416,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,797,333 >>> mbox cmd response: success
14,798,481 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,091,635 UART:
19,092,019 UART: Running Caliptra FMC ...
19,093,154 UART:
19,093,313 UART: [state] CFI Enabled
19,159,376 UART: [fht] FMC Alias Private Key: 7
20,926,134 UART: [art] Extend RT PCRs Done
20,927,363 UART: [art] Lock RT PCRs Done
20,929,112 UART: [art] Populate DV Done
20,934,281 UART: [fht] FMC Alias Private Key: 7
20,935,827 UART: [art] Derive CDI
20,936,558 UART: [art] Store in slot 0x4
20,992,057 UART: [art] Derive Key Pair
20,993,058 UART: [art] Store priv key in slot 0x5
23,455,652 UART: [art] Derive Key Pair - Done
23,468,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,181,771 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,282 UART: [art] PUB.X = 87399900023B6D9C2031F48B618C9013F22EB329FFE76202242BC06F5886232BD9EE19B2D9D8E9E70CBC3486B8FA4A20
25,190,488 UART: [art] PUB.Y = 983206764A451E1FF549BE97F2E34A0F5F8F5B41B77E7CB38D7CA01A35329A17CBDE37DF4F374A2AC512D3037C2A62ED
25,197,760 UART: [art] SIG.R = C5225214EC30AB525A92513585AE8CFE75605B1B1AAFEB07B76A668B0296149A45803D6728B8847AD141BBB70A92A734
25,205,108 UART: [art] SIG.S = 578D3682F3B58EFF65C541B918ECFEFF95913A8B1C103B2B57EDCC01DFF76AFA247DD88DC8F2A17007AC71BE65EA70DF
26,184,368 UART: Caliptra RT
26,185,058 UART: [state] CFI Enabled
26,363,377 UART: [rt] RT listening for mailbox commands...
26,395,369 UART: [rt]cmd =0x54514754, len=24
26,398,039 >>> mbox cmd response data (8 bytes)
26,398,929 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,429,056 UART: [rt]cmd =0x44504543, len=36
26,469,097 >>> mbox cmd response data (24 bytes)
26,469,748 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,499,577 UART: [rt]cmd =0x47544744, len=8
26,501,409 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,715 UART:
193,077 UART: Running Caliptra ROM ...
194,273 UART:
603,935 UART: [state] CFI Enabled
620,956 UART: [state] LifecycleState = Unprovisioned
623,363 UART: [state] DebugLocked = No
624,905 UART: [state] WD Timer not started. Device not locked for debugging
629,535 UART: [kat] SHA2-256
819,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,142 UART: [kat] ++
830,745 UART: [kat] sha1
842,341 UART: [kat] SHA2-256
845,352 UART: [kat] SHA2-384
851,911 UART: [kat] SHA2-512-ACC
854,498 UART: [kat] ECC-384
3,297,331 UART: [kat] HMAC-384Kdf
3,310,581 UART: [kat] LMS
3,842,459 UART: [kat] --
3,845,674 UART: [cold-reset] ++
3,847,605 UART: [fht] FHT @ 0x50003400
3,859,009 UART: [idev] ++
3,859,728 UART: [idev] CDI.KEYID = 6
3,860,612 UART: [idev] SUBJECT.KEYID = 7
3,861,859 UART: [idev] UDS.KEYID = 0
3,862,766 ready_for_fw is high
3,862,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,812 UART: [idev] Erasing UDS.KEYID = 0
6,342,649 UART: [idev] Sha1 KeyId Algorithm
6,366,887 UART: [idev] --
6,371,968 UART: [ldev] ++
6,372,654 UART: [ldev] CDI.KEYID = 6
6,373,576 UART: [ldev] SUBJECT.KEYID = 5
6,374,756 UART: [ldev] AUTHORITY.KEYID = 7
6,375,941 UART: [ldev] FE.KEYID = 1
6,387,243 UART: [ldev] Erasing FE.KEYID = 1
8,867,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,775 UART: [ldev] --
10,657,856 UART: [fwproc] Wait for Commands...
10,659,576 UART: [fwproc] Recv command 0x46574c44
10,661,888 UART: [fwproc] Recv'd Img size: 118548 bytes
14,163,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,239,078 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,362,683 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,922,397 >>> mbox cmd response: success
14,922,959 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,925,655 UART: [afmc] ++
14,926,352 UART: [afmc] CDI.KEYID = 6
14,927,599 UART: [afmc] SUBJECT.KEYID = 7
14,929,035 UART: [afmc] AUTHORITY.KEYID = 5
17,434,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,154,704 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,156,674 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,171,776 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,186,891 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,201,810 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,225,566 UART: [afmc] --
19,229,979 UART: [cold-reset] --
19,235,196 UART: [state] Locking Datavault
19,239,534 UART: [state] Locking PCR0, PCR1 and PCR31
19,241,679 UART: [state] Locking ICCM
19,243,155 UART: [exit] Launching FMC @ 0x40000130
19,251,834 UART:
19,252,075 UART: Running Caliptra FMC ...
19,253,184 UART:
19,253,347 UART: [state] CFI Enabled
19,261,567 UART: [fht] FMC Alias Private Key: 7
21,027,878 UART: [art] Extend RT PCRs Done
21,029,106 UART: [art] Lock RT PCRs Done
21,030,901 UART: [art] Populate DV Done
21,036,372 UART: [fht] FMC Alias Private Key: 7
21,038,073 UART: [art] Derive CDI
21,038,895 UART: [art] Store in slot 0x4
21,082,032 UART: [art] Derive Key Pair
21,083,041 UART: [art] Store priv key in slot 0x5
23,509,046 UART: [art] Derive Key Pair - Done
23,521,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,987 UART: [art] Erasing AUTHORITY.KEYID = 7
25,229,497 UART: [art] PUB.X = F08B2B44C93A85270CA63F9E0FB3953FA7118B811042C352F397581A367B93513B727DF9B3A424F903921193653E68BB
25,236,706 UART: [art] PUB.Y = 50BC5D7102A9E083C9484FC0A85698CD002288A6BD3F82C391D5413D9CB956F9CB4920F9FE023A80A0ACC8EF9DA13E12
25,244,005 UART: [art] SIG.R = DB18372181BFC6E6C76736C30B2E9035028C2327FF3675E7664D02322A825E388EEF57DB2790B4B91E8B1C139ECCF899
25,251,369 UART: [art] SIG.S = D827C37A1A892EF080DE045FE04B5BE913BF1887224998215449E3510B8B4D4EBE6EEF81B9CC50E786EC1746A7C7BADC
26,230,547 UART: Caliptra RT
26,231,259 UART: [state] CFI Enabled
26,363,548 UART: [rt] RT listening for mailbox commands...
26,394,846 UART: [rt]cmd =0x54514754, len=24
26,397,514 >>> mbox cmd response data (8 bytes)
26,398,475 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,428,508 UART: [rt]cmd =0x44504543, len=36
26,469,399 >>> mbox cmd response data (24 bytes)
26,470,040 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,499,660 UART: [rt]cmd =0x47544744, len=8
26,501,769 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,760,988 ready_for_fw is high
3,761,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,048,855 >>> mbox cmd response: success
15,049,450 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,301,155 UART:
19,301,552 UART: Running Caliptra FMC ...
19,302,689 UART:
19,302,845 UART: [state] CFI Enabled
19,310,955 UART: [fht] FMC Alias Private Key: 7
21,076,975 UART: [art] Extend RT PCRs Done
21,078,204 UART: [art] Lock RT PCRs Done
21,079,676 UART: [art] Populate DV Done
21,085,259 UART: [fht] FMC Alias Private Key: 7
21,086,918 UART: [art] Derive CDI
21,087,738 UART: [art] Store in slot 0x4
21,130,399 UART: [art] Derive Key Pair
21,131,444 UART: [art] Store priv key in slot 0x5
23,558,209 UART: [art] Derive Key Pair - Done
23,571,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,289 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,798 UART: [art] PUB.X = 2994943B7CA7D4E65812482BFD58F9A5D40E56D078433AC8B3BF4CE8C80AA3095451CF6AF28A4CEEF71B5B7E6680C8A8
25,286,056 UART: [art] PUB.Y = 93C85A0458C795D883DE8715961E7E9FAABC54512BE43330EE58E10DA38FC23EF9D392BFE15BFC12118675070BF6FF0C
25,293,309 UART: [art] SIG.R = 39538CCF38ABB2DF92C50F31B3ACBE03E4F6E35BEE0F2047DFB5B99EBB86B404E960BE71E77D6CE1CDAA94C892AE80D3
25,300,763 UART: [art] SIG.S = 57A5540A8DB540D0F28C44353F1806A698313F293BB12A8B5DC52A2A1D798FBC1DF602489E5247C9A460D43906DA17AA
26,279,581 UART: Caliptra RT
26,280,276 UART: [state] CFI Enabled
26,413,277 UART: [rt] RT listening for mailbox commands...
26,444,964 UART: [rt]cmd =0x54514754, len=24
26,447,659 >>> mbox cmd response data (8 bytes)
26,448,486 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,478,441 UART: [rt]cmd =0x44504543, len=36
26,518,336 >>> mbox cmd response data (24 bytes)
26,518,946 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,548,542 UART: [rt]cmd =0x47544744, len=8
26,550,680 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,055 UART: [kat] SHA2-256
881,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,101 UART: [kat] ++
886,253 UART: [kat] sha1
890,289 UART: [kat] SHA2-256
892,227 UART: [kat] SHA2-384
894,848 UART: [kat] SHA2-512-ACC
896,749 UART: [kat] ECC-384
902,202 UART: [kat] HMAC-384Kdf
906,730 UART: [kat] LMS
1,474,926 UART: [kat] --
1,476,123 UART: [cold-reset] ++
1,476,629 UART: [fht] Storing FHT @ 0x50003400
1,479,486 UART: [idev] ++
1,479,654 UART: [idev] CDI.KEYID = 6
1,480,014 UART: [idev] SUBJECT.KEYID = 7
1,480,438 UART: [idev] UDS.KEYID = 0
1,480,783 ready_for_fw is high
1,480,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,352 UART: [idev] Erasing UDS.KEYID = 0
1,505,270 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,874 UART: [idev] --
1,514,909 UART: [ldev] ++
1,515,077 UART: [ldev] CDI.KEYID = 6
1,515,440 UART: [ldev] SUBJECT.KEYID = 5
1,515,866 UART: [ldev] AUTHORITY.KEYID = 7
1,516,329 UART: [ldev] FE.KEYID = 1
1,521,379 UART: [ldev] Erasing FE.KEYID = 1
1,546,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,662 UART: [ldev] --
1,585,997 UART: [fwproc] Waiting for Commands...
1,586,644 UART: [fwproc] Received command 0x46574c44
1,587,435 UART: [fwproc] Received Image of size 118548 bytes
2,931,623 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,881 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,099 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,366 >>> mbox cmd response: success
3,130,366 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,131,494 UART: [afmc] ++
3,131,662 UART: [afmc] CDI.KEYID = 6
3,132,024 UART: [afmc] SUBJECT.KEYID = 7
3,132,449 UART: [afmc] AUTHORITY.KEYID = 5
3,166,678 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,930 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,710 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,419 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,302 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,985 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,885 UART: [afmc] --
3,209,825 UART: [cold-reset] --
3,210,671 UART: [state] Locking Datavault
3,211,748 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,352 UART: [state] Locking ICCM
3,212,958 UART: [exit] Launching FMC @ 0x40000130
3,218,288 UART:
3,218,304 UART: Running Caliptra FMC ...
3,218,712 UART:
3,218,766 UART: [state] CFI Enabled
3,228,822 UART: [fht] FMC Alias Private Key: 7
3,348,272 UART: [art] Extend RT PCRs Done
3,348,700 UART: [art] Lock RT PCRs Done
3,350,200 UART: [art] Populate DV Done
3,358,373 UART: [fht] FMC Alias Private Key: 7
3,359,459 UART: [art] Derive CDI
3,359,739 UART: [art] Store in slot 0x4
3,445,199 UART: [art] Derive Key Pair
3,445,559 UART: [art] Store priv key in slot 0x5
3,458,752 UART: [art] Derive Key Pair - Done
3,473,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,973 UART: [art] PUB.X = 52BABE25D5E730930F2BD16CD1D147F85A226AD91A3D1DC2BD6D33AC9F1230BB90C20A3193BE257EE5E3527FA47F858E
3,496,753 UART: [art] PUB.Y = 3AAF5FDA28F55C75F1ED02D87AEC9A38D9388620963ABA05085461F9AB202B66855B6E0D922C2D28CA2D4698C2CB0598
3,503,696 UART: [art] SIG.R = 50E40C263FD24D380C05F67B5F51D6E06D54FDCBE9CD10498E426B84A2BA4CCC10767A99C6EEC2B0C955A9E5905FDAB0
3,510,475 UART: [art] SIG.S = 108EA7AFD94E51C56C8E4028F2156CFE19DE4F1421591F0CF08912295C0351E98A5A59544FB151C5CA57E7D1BA5C13F1
3,534,427 UART: Caliptra RT
3,534,678 UART: [state] CFI Enabled
3,654,065 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,919 UART: [rt]cmd =0x54514754, len=24
3,687,178 >>> mbox cmd response data (8 bytes)
3,687,179 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,716,980 UART: [rt]cmd =0x44504543, len=36
3,757,725 >>> mbox cmd response data (24 bytes)
3,757,726 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,787,047 UART: [rt]cmd =0x47544744, len=8
3,788,606 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,383 ready_for_fw is high
1,362,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,668 >>> mbox cmd response: success
2,979,668 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,041,835 UART:
3,041,851 UART: Running Caliptra FMC ...
3,042,259 UART:
3,042,313 UART: [state] CFI Enabled
3,052,459 UART: [fht] FMC Alias Private Key: 7
3,170,777 UART: [art] Extend RT PCRs Done
3,171,205 UART: [art] Lock RT PCRs Done
3,172,989 UART: [art] Populate DV Done
3,181,292 UART: [fht] FMC Alias Private Key: 7
3,182,284 UART: [art] Derive CDI
3,182,564 UART: [art] Store in slot 0x4
3,268,222 UART: [art] Derive Key Pair
3,268,582 UART: [art] Store priv key in slot 0x5
3,282,453 UART: [art] Derive Key Pair - Done
3,297,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,508 UART: [art] PUB.X = 82436220F40EE2850ED7F02186815650230D42518FCCD5A9CEAFC2DA725550199D7A1B764BDBC2D878C9325D4986E238
3,320,267 UART: [art] PUB.Y = 51DBC40C989387868113270DB9DD8CAEC42573F6671118D334D9C592E969574992CAC6BDAA3FF37B06583DBEA59D644C
3,327,212 UART: [art] SIG.R = 1309ADF2DBED560298655FE0F1047C0C39EDDA43691A3252C365B96B73CA41970CCACD4D6FE0FAED2142170E483E585A
3,333,976 UART: [art] SIG.S = 7B7793BE5FD6CC30AF7A4617610D5635CB7D6A292B06E81E48A24D2E2656D9C0E0646E2E65FB6279167E4A63FBD4CE8C
3,357,760 UART: Caliptra RT
3,358,011 UART: [state] CFI Enabled
3,477,164 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,178 UART: [rt]cmd =0x54514754, len=24
3,510,449 >>> mbox cmd response data (8 bytes)
3,510,450 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,867 UART: [rt]cmd =0x44504543, len=36
3,579,624 >>> mbox cmd response data (24 bytes)
3,579,625 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,608,902 UART: [rt]cmd =0x47544744, len=8
3,610,701 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,510 UART: [kat] SHA2-256
882,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,556 UART: [kat] ++
886,708 UART: [kat] sha1
891,130 UART: [kat] SHA2-256
893,068 UART: [kat] SHA2-384
895,833 UART: [kat] SHA2-512-ACC
897,734 UART: [kat] ECC-384
903,523 UART: [kat] HMAC-384Kdf
908,037 UART: [kat] LMS
1,476,233 UART: [kat] --
1,477,282 UART: [cold-reset] ++
1,477,612 UART: [fht] Storing FHT @ 0x50003400
1,480,457 UART: [idev] ++
1,480,625 UART: [idev] CDI.KEYID = 6
1,480,985 UART: [idev] SUBJECT.KEYID = 7
1,481,409 UART: [idev] UDS.KEYID = 0
1,481,754 ready_for_fw is high
1,481,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,777 UART: [idev] Erasing UDS.KEYID = 0
1,506,101 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,725 UART: [idev] --
1,515,930 UART: [ldev] ++
1,516,098 UART: [ldev] CDI.KEYID = 6
1,516,461 UART: [ldev] SUBJECT.KEYID = 5
1,516,887 UART: [ldev] AUTHORITY.KEYID = 7
1,517,350 UART: [ldev] FE.KEYID = 1
1,522,688 UART: [ldev] Erasing FE.KEYID = 1
1,548,351 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,331 UART: [ldev] --
1,587,776 UART: [fwproc] Waiting for Commands...
1,588,533 UART: [fwproc] Received command 0x46574c44
1,589,324 UART: [fwproc] Received Image of size 118548 bytes
2,934,024 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,448 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,666 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,069 >>> mbox cmd response: success
3,132,069 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,133,147 UART: [afmc] ++
3,133,315 UART: [afmc] CDI.KEYID = 6
3,133,677 UART: [afmc] SUBJECT.KEYID = 7
3,134,102 UART: [afmc] AUTHORITY.KEYID = 5
3,169,109 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,617 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,397 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,106 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,989 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,672 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,520 UART: [afmc] --
3,212,520 UART: [cold-reset] --
3,213,364 UART: [state] Locking Datavault
3,214,855 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,459 UART: [state] Locking ICCM
3,216,111 UART: [exit] Launching FMC @ 0x40000130
3,221,441 UART:
3,221,457 UART: Running Caliptra FMC ...
3,221,865 UART:
3,222,008 UART: [state] CFI Enabled
3,232,870 UART: [fht] FMC Alias Private Key: 7
3,351,990 UART: [art] Extend RT PCRs Done
3,352,418 UART: [art] Lock RT PCRs Done
3,353,960 UART: [art] Populate DV Done
3,362,225 UART: [fht] FMC Alias Private Key: 7
3,363,221 UART: [art] Derive CDI
3,363,501 UART: [art] Store in slot 0x4
3,449,349 UART: [art] Derive Key Pair
3,449,709 UART: [art] Store priv key in slot 0x5
3,462,978 UART: [art] Derive Key Pair - Done
3,477,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,196 UART: [art] PUB.X = D800319AA6E2565C46F82467260661ECB0C3C4B74283830FC43670AA04C7A2F436960CC13D6348A1B680C393FEB14C88
3,500,928 UART: [art] PUB.Y = 73079D2DEFD555FC9CB02267A0673472BC1E6F738603721747E39682A7D210069B59F99960096276ECA793C5A2296223
3,507,852 UART: [art] SIG.R = B0D27B956E2C5A5549C0696C8FBFF7BAE116226CD92E8B826494412CBF454FA0FA4C931E92C3E9937A8CA8B56698934D
3,514,630 UART: [art] SIG.S = 2DFA51FC95325AE67A97FCA71CB16534ED08386EEDDD6695A9B3A889BAA6A9AD76F037AB981B979F5BF0660A4088CBFA
3,538,668 UART: Caliptra RT
3,539,011 UART: [state] CFI Enabled
3,659,733 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,231 UART: [rt]cmd =0x54514754, len=24
3,692,452 >>> mbox cmd response data (8 bytes)
3,692,453 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,024 UART: [rt]cmd =0x44504543, len=36
3,761,763 >>> mbox cmd response data (24 bytes)
3,761,764 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,161 UART: [rt]cmd =0x47544744, len=8
3,792,780 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,072 ready_for_fw is high
1,363,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,055 >>> mbox cmd response: success
2,982,055 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,043,830 UART:
3,043,846 UART: Running Caliptra FMC ...
3,044,254 UART:
3,044,397 UART: [state] CFI Enabled
3,055,233 UART: [fht] FMC Alias Private Key: 7
3,174,067 UART: [art] Extend RT PCRs Done
3,174,495 UART: [art] Lock RT PCRs Done
3,176,217 UART: [art] Populate DV Done
3,184,720 UART: [fht] FMC Alias Private Key: 7
3,185,758 UART: [art] Derive CDI
3,186,038 UART: [art] Store in slot 0x4
3,272,130 UART: [art] Derive Key Pair
3,272,490 UART: [art] Store priv key in slot 0x5
3,285,587 UART: [art] Derive Key Pair - Done
3,300,142 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,179 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,944 UART: [art] PUB.X = 0B1CC37DC14168247CC647645F0AF1E55776135C5D16A7038C2226CAC57052DD8E9CEA4FB0ABB1250FBFBBF381B82645
3,322,712 UART: [art] PUB.Y = BE5BD1048C62C299CE6133A0AD866ED66D95700AE813EEFB294B61E94F88F031C874E01180D0E3A5B7F3E4D70BAEF529
3,329,665 UART: [art] SIG.R = D27EBCDEA2D0F36A4A908C5127BAC8994A7D51BF391E91267797F0CBFECB3FFBFFB97AA2FBA6CD632B45CDC7B4482111
3,336,463 UART: [art] SIG.S = C5E1A6B7755C24829C982661BE69AC2921215A9D317EC8E15BF1E8D9F302D9A6D563F0B3AE8729E0803ADBCB96FC03AA
3,359,729 UART: Caliptra RT
3,360,072 UART: [state] CFI Enabled
3,480,419 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,239 UART: [rt]cmd =0x54514754, len=24
3,513,710 >>> mbox cmd response data (8 bytes)
3,513,711 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,543,320 UART: [rt]cmd =0x44504543, len=36
3,583,795 >>> mbox cmd response data (24 bytes)
3,583,796 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,005 UART: [rt]cmd =0x47544744, len=8
3,614,536 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [kat] SHA2-256
891,046 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,150 UART: [kat] ++
895,302 UART: [kat] sha1
899,402 UART: [kat] SHA2-256
901,342 UART: [kat] SHA2-384
904,237 UART: [kat] SHA2-512-ACC
906,138 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,170,018 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,173,122 UART: [idev] ++
1,173,290 UART: [idev] CDI.KEYID = 6
1,173,651 UART: [idev] SUBJECT.KEYID = 7
1,174,076 UART: [idev] UDS.KEYID = 0
1,174,422 ready_for_fw is high
1,174,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,205 UART: [idev] Erasing UDS.KEYID = 0
1,199,461 UART: [idev] Sha1 KeyId Algorithm
1,208,437 UART: [idev] --
1,209,536 UART: [ldev] ++
1,209,704 UART: [ldev] CDI.KEYID = 6
1,210,068 UART: [ldev] SUBJECT.KEYID = 5
1,210,495 UART: [ldev] AUTHORITY.KEYID = 7
1,210,958 UART: [ldev] FE.KEYID = 1
1,216,094 UART: [ldev] Erasing FE.KEYID = 1
1,242,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,804 UART: [ldev] --
1,282,079 UART: [fwproc] Wait for Commands...
1,282,678 UART: [fwproc] Recv command 0x46574c44
1,283,411 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,955 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,130 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,355 >>> mbox cmd response: success
2,826,355 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,499 UART: [afmc] ++
2,827,667 UART: [afmc] CDI.KEYID = 6
2,828,030 UART: [afmc] SUBJECT.KEYID = 7
2,828,456 UART: [afmc] AUTHORITY.KEYID = 5
2,863,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,087 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,797 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,678 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,379 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,968 UART: [afmc] --
2,906,815 UART: [cold-reset] --
2,907,777 UART: [state] Locking Datavault
2,908,924 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,528 UART: [state] Locking ICCM
2,909,976 UART: [exit] Launching FMC @ 0x40000130
2,915,306 UART:
2,915,322 UART: Running Caliptra FMC ...
2,915,730 UART:
2,915,784 UART: [state] CFI Enabled
2,926,354 UART: [fht] FMC Alias Private Key: 7
3,045,708 UART: [art] Extend RT PCRs Done
3,046,136 UART: [art] Lock RT PCRs Done
3,047,984 UART: [art] Populate DV Done
3,056,283 UART: [fht] FMC Alias Private Key: 7
3,057,305 UART: [art] Derive CDI
3,057,585 UART: [art] Store in slot 0x4
3,143,302 UART: [art] Derive Key Pair
3,143,662 UART: [art] Store priv key in slot 0x5
3,157,222 UART: [art] Derive Key Pair - Done
3,172,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,772 UART: [art] PUB.X = B8EFCE5686B0D737D5AA199BF8C0EF52A6D6EFE93AA542A2BA8524E19C660BEE56FE83CE32661973348F8B2CC1E87F00
3,195,535 UART: [art] PUB.Y = AFFC9CF251F55FB0D647A0799507C896D1A610D37FB0788216965B4C4944380E2615B65395F179C95915487E2D7FCA5B
3,202,475 UART: [art] SIG.R = E48C29E2AC8D187E7C7A0255D764873545CB685052BD613B1C37DB82CA71EFEC47BC9F2CD1E35E8898796F5F9BB2D94F
3,209,254 UART: [art] SIG.S = BE810A5FB6E3AA3BA66B85883998270F67C87B785E4AE8FBA89166C86997FCD131F643B512B1C246E672C27EDBD586E3
3,232,804 UART: Caliptra RT
3,233,055 UART: [state] CFI Enabled
3,352,947 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,659 UART: [rt]cmd =0x54514754, len=24
3,385,748 >>> mbox cmd response data (8 bytes)
3,385,749 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,282 UART: [rt]cmd =0x44504543, len=36
3,457,307 >>> mbox cmd response data (24 bytes)
3,457,308 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,813 UART: [rt]cmd =0x47544744, len=8
3,488,338 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,330 ready_for_fw is high
1,059,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,634 >>> mbox cmd response: success
2,678,634 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,740,219 UART:
2,740,235 UART: Running Caliptra FMC ...
2,740,643 UART:
2,740,697 UART: [state] CFI Enabled
2,750,779 UART: [fht] FMC Alias Private Key: 7
2,869,549 UART: [art] Extend RT PCRs Done
2,869,977 UART: [art] Lock RT PCRs Done
2,871,399 UART: [art] Populate DV Done
2,879,614 UART: [fht] FMC Alias Private Key: 7
2,880,656 UART: [art] Derive CDI
2,880,936 UART: [art] Store in slot 0x4
2,966,309 UART: [art] Derive Key Pair
2,966,669 UART: [art] Store priv key in slot 0x5
2,980,153 UART: [art] Derive Key Pair - Done
2,995,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,805 UART: [art] PUB.X = F71C09006DAC0C88FB8A310CE12EF5A23E349FDEF064AC87F38FA01EC0D275FBC10E4A8ADBB53DA77D3BEDF55C1AAE93
3,018,573 UART: [art] PUB.Y = 41DE4AB06B0706FAE51EA59F29883FFDAC4FFF6B3F289C4A65B2E5C8C8163C3E33A69E4F9D723462797C46CF15FDFBBB
3,025,539 UART: [art] SIG.R = B4A8970997CA3C1B66E49038B13E0F2E5979E6727BB51337DD30347C20CC7DD409BF073E272239E2D01552D7BAA904AC
3,032,296 UART: [art] SIG.S = 4D7564BC6BB4121EF2BFC75A65B272562C68CABA246853C6F7CB02AF6F3AD9FD23D939664021000B4F19313274BCB062
3,055,962 UART: Caliptra RT
3,056,213 UART: [state] CFI Enabled
3,176,070 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,892 UART: [rt]cmd =0x54514754, len=24
3,208,661 >>> mbox cmd response data (8 bytes)
3,208,662 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,237,941 UART: [rt]cmd =0x44504543, len=36
3,278,142 >>> mbox cmd response data (24 bytes)
3,278,143 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,842 UART: [rt]cmd =0x47544744, len=8
3,309,563 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,211 UART: [kat] SHA2-256
902,151 UART: [kat] SHA2-384
904,882 UART: [kat] SHA2-512-ACC
906,783 UART: [kat] ECC-384
916,284 UART: [kat] HMAC-384Kdf
920,998 UART: [kat] LMS
1,169,310 UART: [kat] --
1,170,213 UART: [cold-reset] ++
1,170,553 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,174,353 ready_for_fw is high
1,174,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,986 UART: [idev] Erasing UDS.KEYID = 0
1,199,330 UART: [idev] Sha1 KeyId Algorithm
1,208,370 UART: [idev] --
1,209,599 UART: [ldev] ++
1,209,767 UART: [ldev] CDI.KEYID = 6
1,210,131 UART: [ldev] SUBJECT.KEYID = 5
1,210,558 UART: [ldev] AUTHORITY.KEYID = 7
1,211,021 UART: [ldev] FE.KEYID = 1
1,216,065 UART: [ldev] Erasing FE.KEYID = 1
1,242,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,985 UART: [ldev] --
1,281,238 UART: [fwproc] Wait for Commands...
1,281,841 UART: [fwproc] Recv command 0x46574c44
1,282,574 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,280 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,455 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,784 >>> mbox cmd response: success
2,824,784 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,825,892 UART: [afmc] ++
2,826,060 UART: [afmc] CDI.KEYID = 6
2,826,423 UART: [afmc] SUBJECT.KEYID = 7
2,826,849 UART: [afmc] AUTHORITY.KEYID = 5
2,862,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,016 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,726 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,607 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,308 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,111 UART: [afmc] --
2,906,128 UART: [cold-reset] --
2,906,762 UART: [state] Locking Datavault
2,907,681 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,285 UART: [state] Locking ICCM
2,908,705 UART: [exit] Launching FMC @ 0x40000130
2,914,035 UART:
2,914,051 UART: Running Caliptra FMC ...
2,914,459 UART:
2,914,602 UART: [state] CFI Enabled
2,925,410 UART: [fht] FMC Alias Private Key: 7
3,044,376 UART: [art] Extend RT PCRs Done
3,044,804 UART: [art] Lock RT PCRs Done
3,046,442 UART: [art] Populate DV Done
3,054,429 UART: [fht] FMC Alias Private Key: 7
3,055,389 UART: [art] Derive CDI
3,055,669 UART: [art] Store in slot 0x4
3,141,454 UART: [art] Derive Key Pair
3,141,814 UART: [art] Store priv key in slot 0x5
3,154,860 UART: [art] Derive Key Pair - Done
3,169,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,614 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,379 UART: [art] PUB.X = 76492CF3CD36BECD0ABD517742436925D25EC21A3D1B7F61379BFFED847C93004D2A0C3D8F4361F435B92F81D4FE33E6
3,193,131 UART: [art] PUB.Y = 6C1BAC7242ABB2D236590C7D771EFCAE6F704125B0CDCB004B5881106D739455C7B94595EC53367794D2F2EB8D421F08
3,200,057 UART: [art] SIG.R = DA1916C8BEA18A7ABE957F4AFD1D2AEDE243DC2D42FDD83D7F6A8C136E575027B144A732ECF78F199A1E400C0A8127EB
3,206,843 UART: [art] SIG.S = DBDAEBCEB14AA67AB236E9B30CD6FCE0C7871498F440394707A627ED3C170066EE26ADCD39ACA4D32FFA2DE8964FB999
3,230,357 UART: Caliptra RT
3,230,700 UART: [state] CFI Enabled
3,349,712 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,520 UART: [rt]cmd =0x54514754, len=24
3,382,513 >>> mbox cmd response data (8 bytes)
3,382,514 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,009 UART: [rt]cmd =0x44504543, len=36
3,453,042 >>> mbox cmd response data (24 bytes)
3,453,043 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,482,666 UART: [rt]cmd =0x47544744, len=8
3,484,259 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,609 ready_for_fw is high
1,059,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,199 >>> mbox cmd response: success
2,680,199 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,742,240 UART:
2,742,256 UART: Running Caliptra FMC ...
2,742,664 UART:
2,742,807 UART: [state] CFI Enabled
2,753,273 UART: [fht] FMC Alias Private Key: 7
2,872,675 UART: [art] Extend RT PCRs Done
2,873,103 UART: [art] Lock RT PCRs Done
2,874,193 UART: [art] Populate DV Done
2,882,130 UART: [fht] FMC Alias Private Key: 7
2,883,072 UART: [art] Derive CDI
2,883,352 UART: [art] Store in slot 0x4
2,968,931 UART: [art] Derive Key Pair
2,969,291 UART: [art] Store priv key in slot 0x5
2,982,789 UART: [art] Derive Key Pair - Done
2,997,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,320 UART: [art] PUB.X = DF6B73F03714F92005BB34887E567FB224A1E9ECFED4FB97439AA571A249A03CA5A45ECA3AC11F97F8F7DA4781253446
3,020,097 UART: [art] PUB.Y = C947FCE1849017447C9A4164B760B5D0A3037677A4390ADFEEDC8FB56AEC624417B0B77F40A718F5DB778262F9AB184C
3,027,047 UART: [art] SIG.R = 9D16D0F0E8860D3363C2B5C3884F5AE8AF581CD1F88F29773F2430B27D1B5039C4111BCF6DF76AFC679DCDE31BE107E4
3,033,823 UART: [art] SIG.S = 0259B66CE1D42A6C0C5077D7F132BA2F626B9D389C906083846785A8AB0BA205BE5FCCCEC144B60A6E3194015374554A
3,057,605 UART: Caliptra RT
3,057,948 UART: [state] CFI Enabled
3,177,369 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,767 UART: [rt]cmd =0x54514754, len=24
3,210,322 >>> mbox cmd response data (8 bytes)
3,210,323 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,784 UART: [rt]cmd =0x44504543, len=36
3,280,965 >>> mbox cmd response data (24 bytes)
3,280,966 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,310,465 UART: [rt]cmd =0x47544744, len=8
3,312,136 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
893,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,369 UART: [kat] ++
897,521 UART: [kat] sha1
901,855 UART: [kat] SHA2-256
903,795 UART: [kat] SHA2-384
906,416 UART: [kat] SHA2-512-ACC
908,317 UART: [kat] ECC-384
917,888 UART: [kat] HMAC-384Kdf
922,484 UART: [kat] LMS
1,170,812 UART: [kat] --
1,171,995 UART: [cold-reset] ++
1,172,559 UART: [fht] FHT @ 0x50003400
1,175,194 UART: [idev] ++
1,175,362 UART: [idev] CDI.KEYID = 6
1,175,722 UART: [idev] SUBJECT.KEYID = 7
1,176,146 UART: [idev] UDS.KEYID = 0
1,176,491 ready_for_fw is high
1,176,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,966 UART: [idev] Erasing UDS.KEYID = 0
1,201,045 UART: [idev] Sha1 KeyId Algorithm
1,209,681 UART: [idev] --
1,210,629 UART: [ldev] ++
1,210,797 UART: [ldev] CDI.KEYID = 6
1,211,160 UART: [ldev] SUBJECT.KEYID = 5
1,211,586 UART: [ldev] AUTHORITY.KEYID = 7
1,212,049 UART: [ldev] FE.KEYID = 1
1,217,053 UART: [ldev] Erasing FE.KEYID = 1
1,243,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,079 UART: [ldev] --
1,282,580 UART: [fwproc] Wait for Commands...
1,283,172 UART: [fwproc] Recv command 0x46574c44
1,283,900 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,666 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,836 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,167 >>> mbox cmd response: success
2,827,167 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,269 UART: [afmc] ++
2,828,437 UART: [afmc] CDI.KEYID = 6
2,828,799 UART: [afmc] SUBJECT.KEYID = 7
2,829,224 UART: [afmc] AUTHORITY.KEYID = 5
2,864,195 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,684 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,432 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,141 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,024 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,725 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,525 UART: [afmc] --
2,907,639 UART: [cold-reset] --
2,908,469 UART: [state] Locking Datavault
2,909,552 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,156 UART: [state] Locking ICCM
2,910,634 UART: [exit] Launching FMC @ 0x40000130
2,915,964 UART:
2,915,980 UART: Running Caliptra FMC ...
2,916,388 UART:
2,916,442 UART: [state] CFI Enabled
2,926,948 UART: [fht] FMC Alias Private Key: 7
3,045,570 UART: [art] Extend RT PCRs Done
3,045,998 UART: [art] Lock RT PCRs Done
3,047,382 UART: [art] Populate DV Done
3,055,647 UART: [fht] FMC Alias Private Key: 7
3,056,687 UART: [art] Derive CDI
3,056,967 UART: [art] Store in slot 0x4
3,142,622 UART: [art] Derive Key Pair
3,142,982 UART: [art] Store priv key in slot 0x5
3,156,254 UART: [art] Derive Key Pair - Done
3,171,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,526 UART: [art] PUB.X = 87A5E54549F190F5C78FFBCEBD8BCF0690B5DDCFA474D31B94D216C36C4B922CFC3358FA704FB2AAF4C0E0FD5541CB38
3,194,317 UART: [art] PUB.Y = 9033BEEE02687F4DD1FE430F07F4F8047F07AE828F0DC72C70AE65F64F3E99F44CF84FF45195DE31F8FFAE7BB557AD60
3,201,267 UART: [art] SIG.R = ADE3FB5CEF5B8D47D0427C5AB9AD6129F365C6B4D0BDBABA647D4388B7F8F750FC7F776D18A50615B1504A92759568CC
3,208,050 UART: [art] SIG.S = 935138601B56A0A6CAA37FD7284763318FF82DD95A6B29D24AFF1EBCC06ABD4439DC3E65907EEF8F9823680BD7C351F6
3,231,917 UART: Caliptra RT
3,232,168 UART: [state] CFI Enabled
3,351,034 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,712 UART: [rt]cmd =0x54514754, len=24
3,383,741 >>> mbox cmd response data (8 bytes)
3,383,742 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,335 UART: [rt]cmd =0x44504543, len=36
3,453,992 >>> mbox cmd response data (24 bytes)
3,453,993 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,483,344 UART: [rt]cmd =0x47544744, len=8
3,485,013 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,781 ready_for_fw is high
1,060,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,162 >>> mbox cmd response: success
2,678,162 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,740,577 UART:
2,740,593 UART: Running Caliptra FMC ...
2,741,001 UART:
2,741,055 UART: [state] CFI Enabled
2,751,141 UART: [fht] FMC Alias Private Key: 7
2,870,341 UART: [art] Extend RT PCRs Done
2,870,769 UART: [art] Lock RT PCRs Done
2,872,477 UART: [art] Populate DV Done
2,880,868 UART: [fht] FMC Alias Private Key: 7
2,881,800 UART: [art] Derive CDI
2,882,080 UART: [art] Store in slot 0x4
2,967,491 UART: [art] Derive Key Pair
2,967,851 UART: [art] Store priv key in slot 0x5
2,980,731 UART: [art] Derive Key Pair - Done
2,995,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,041 UART: [art] PUB.X = 59D20E6214679F64FE0A04C49FA76E7D0037D42C13AEDA0FFCD3464945F76FCE90EED775049B23E1E376D8FB57B83CF9
3,018,786 UART: [art] PUB.Y = E07F8546520A0BC05BFE96A5051826CCA08C22FED67B92E0202E5D43F5E7FC14567FED25A7D8508CC0F07B4C0968C893
3,025,732 UART: [art] SIG.R = D6D2C7761B394705BBE88E4544267C0AC1D8187C29BCDFFBB9911E7D32F9283B89A093F8339F7E951DD2032BD0D5D455
3,032,499 UART: [art] SIG.S = 89DB6C3771CA593A704CAA30721D003D9C704B72AC466C8A42617F52D587FCA9AE22D3055358756313900D5FF1EBB6A6
3,056,743 UART: Caliptra RT
3,056,994 UART: [state] CFI Enabled
3,176,996 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,754 UART: [rt]cmd =0x54514754, len=24
3,209,755 >>> mbox cmd response data (8 bytes)
3,209,756 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,453 UART: [rt]cmd =0x44504543, len=36
3,279,508 >>> mbox cmd response data (24 bytes)
3,279,509 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,816 UART: [rt]cmd =0x47544744, len=8
3,310,223 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
893,585 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,710 UART: [kat] ++
897,862 UART: [kat] sha1
902,174 UART: [kat] SHA2-256
904,114 UART: [kat] SHA2-384
906,711 UART: [kat] SHA2-512-ACC
908,612 UART: [kat] ECC-384
918,723 UART: [kat] HMAC-384Kdf
923,483 UART: [kat] LMS
1,171,811 UART: [kat] --
1,172,598 UART: [cold-reset] ++
1,173,166 UART: [fht] FHT @ 0x50003400
1,175,901 UART: [idev] ++
1,176,069 UART: [idev] CDI.KEYID = 6
1,176,429 UART: [idev] SUBJECT.KEYID = 7
1,176,853 UART: [idev] UDS.KEYID = 0
1,177,198 ready_for_fw is high
1,177,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,003 UART: [idev] Erasing UDS.KEYID = 0
1,202,054 UART: [idev] Sha1 KeyId Algorithm
1,210,472 UART: [idev] --
1,211,722 UART: [ldev] ++
1,211,890 UART: [ldev] CDI.KEYID = 6
1,212,253 UART: [ldev] SUBJECT.KEYID = 5
1,212,679 UART: [ldev] AUTHORITY.KEYID = 7
1,213,142 UART: [ldev] FE.KEYID = 1
1,218,808 UART: [ldev] Erasing FE.KEYID = 1
1,245,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,128 UART: [ldev] --
1,284,459 UART: [fwproc] Wait for Commands...
1,285,081 UART: [fwproc] Recv command 0x46574c44
1,285,809 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,569 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,739 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,900 >>> mbox cmd response: success
2,829,900 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,830,930 UART: [afmc] ++
2,831,098 UART: [afmc] CDI.KEYID = 6
2,831,460 UART: [afmc] SUBJECT.KEYID = 7
2,831,885 UART: [afmc] AUTHORITY.KEYID = 5
2,867,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,691 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,400 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,283 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,984 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,646 UART: [afmc] --
2,910,576 UART: [cold-reset] --
2,911,296 UART: [state] Locking Datavault
2,912,447 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,051 UART: [state] Locking ICCM
2,913,487 UART: [exit] Launching FMC @ 0x40000130
2,918,817 UART:
2,918,833 UART: Running Caliptra FMC ...
2,919,241 UART:
2,919,384 UART: [state] CFI Enabled
2,930,034 UART: [fht] FMC Alias Private Key: 7
3,049,428 UART: [art] Extend RT PCRs Done
3,049,856 UART: [art] Lock RT PCRs Done
3,051,234 UART: [art] Populate DV Done
3,059,777 UART: [fht] FMC Alias Private Key: 7
3,060,825 UART: [art] Derive CDI
3,061,105 UART: [art] Store in slot 0x4
3,147,018 UART: [art] Derive Key Pair
3,147,378 UART: [art] Store priv key in slot 0x5
3,160,720 UART: [art] Derive Key Pair - Done
3,175,708 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,069 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,834 UART: [art] PUB.X = 7A8597728235891D7E883ED3CAC87220A9D9662962972B47B33ED362E8CEF1A57D519DE83BE496551E4F5183450314DB
3,198,595 UART: [art] PUB.Y = A65ADAE43EA5EDDDB089F17B33D856F5660A22DD2C8FBC515F4831CE00BE08E47658DA8CFC2AAD2B15557A36B65C02B3
3,205,536 UART: [art] SIG.R = A3A45754D86D050C6FF33852D1347DF79D6061CB30F7B44144B4FFCD1E90B75EBF21220FDE55EA16F1A2EBAB87D7EEAB
3,212,317 UART: [art] SIG.S = C88EFA6A2BB109251750070FEE675F0FCBBD6807CF66E9DCFCFCD8DDF47F189DD5FB47A1B96038F814EA47FCDDC86DDC
3,235,706 UART: Caliptra RT
3,236,049 UART: [state] CFI Enabled
3,355,765 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,245 UART: [rt]cmd =0x54514754, len=24
3,388,018 >>> mbox cmd response data (8 bytes)
3,388,019 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,476 UART: [rt]cmd =0x44504543, len=36
3,457,723 >>> mbox cmd response data (24 bytes)
3,457,724 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,487,229 UART: [rt]cmd =0x47544744, len=8
3,488,682 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,306 ready_for_fw is high
1,060,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,843 >>> mbox cmd response: success
2,680,843 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,743,332 UART:
2,743,348 UART: Running Caliptra FMC ...
2,743,756 UART:
2,743,899 UART: [state] CFI Enabled
2,754,591 UART: [fht] FMC Alias Private Key: 7
2,873,009 UART: [art] Extend RT PCRs Done
2,873,437 UART: [art] Lock RT PCRs Done
2,875,025 UART: [art] Populate DV Done
2,883,532 UART: [fht] FMC Alias Private Key: 7
2,884,494 UART: [art] Derive CDI
2,884,774 UART: [art] Store in slot 0x4
2,970,801 UART: [art] Derive Key Pair
2,971,161 UART: [art] Store priv key in slot 0x5
2,984,433 UART: [art] Derive Key Pair - Done
2,998,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,576 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,341 UART: [art] PUB.X = 761F1EB02979A0E2DC7AF4EEF22AB6F3221099546DA18F4C8BC3D9FC52E210CA609BDE3DBADF5FFF07D423E5BF5E01D9
3,022,131 UART: [art] PUB.Y = 097E16F0FE9FD26B74324CD9FD36F38127CB144A54A64912EDB25637FEA4CDFA8A78567BDDF10713E6E0C68F9470F074
3,029,085 UART: [art] SIG.R = CF26F426AA016647B00FED42E74AFFDA1686B781D63B95976D9E24A8D00C404FF8CCCFBD75D57EBD8040F4CB06E5C326
3,035,861 UART: [art] SIG.S = 15514B0FE8C764B5A9411161E70B057D3B26AF75FE792C64D458753A63B949EEDC65EDBBC3F1AFB562B600DFFE3E33B3
3,059,220 UART: Caliptra RT
3,059,563 UART: [state] CFI Enabled
3,179,154 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,732 UART: [rt]cmd =0x54514754, len=24
3,212,009 >>> mbox cmd response data (8 bytes)
3,212,010 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,615 UART: [rt]cmd =0x44504543, len=36
3,283,160 >>> mbox cmd response data (24 bytes)
3,283,161 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,312,358 UART: [rt]cmd =0x47544744, len=8
3,313,765 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,219 UART:
192,573 UART: Running Caliptra ROM ...
193,760 UART:
193,916 UART: [state] CFI Enabled
265,652 UART: [state] LifecycleState = Unprovisioned
267,611 UART: [state] DebugLocked = No
270,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,245 UART: [kat] SHA2-256
443,959 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,497 UART: [kat] ++
454,993 UART: [kat] sha1
465,727 UART: [kat] SHA2-256
468,391 UART: [kat] SHA2-384
475,236 UART: [kat] SHA2-512-ACC
477,608 UART: [kat] ECC-384
2,764,914 UART: [kat] HMAC-384Kdf
2,777,437 UART: [kat] LMS
3,967,790 UART: [kat] --
3,972,785 UART: [cold-reset] ++
3,974,643 UART: [fht] Storing FHT @ 0x50003400
3,985,835 UART: [idev] ++
3,986,412 UART: [idev] CDI.KEYID = 6
3,987,292 UART: [idev] SUBJECT.KEYID = 7
3,988,537 UART: [idev] UDS.KEYID = 0
3,989,496 ready_for_fw is high
3,989,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,775 UART: [idev] Erasing UDS.KEYID = 0
7,325,158 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,560 UART: [idev] --
7,351,825 UART: [ldev] ++
7,352,394 UART: [ldev] CDI.KEYID = 6
7,353,332 UART: [ldev] SUBJECT.KEYID = 5
7,354,544 UART: [ldev] AUTHORITY.KEYID = 7
7,355,828 UART: [ldev] FE.KEYID = 1
7,399,019 UART: [ldev] Erasing FE.KEYID = 1
10,732,703 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,762 UART: [ldev] --
13,113,753 UART: [fwproc] Waiting for Commands...
13,115,415 UART: [fwproc] Received command 0x46574c44
13,117,601 UART: [fwproc] Received Image of size 118548 bytes
17,219,213 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,294,952 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,122 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,389 >>> mbox cmd response: success
17,697,458 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,701,408 UART: [afmc] ++
17,701,992 UART: [afmc] CDI.KEYID = 6
17,702,876 UART: [afmc] SUBJECT.KEYID = 7
17,704,155 UART: [afmc] AUTHORITY.KEYID = 5
21,069,105 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,366,681 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,368,942 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,383,380 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,398,088 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,412,477 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,433,473 UART: [afmc] --
23,436,691 UART: [cold-reset] --
23,440,992 UART: [state] Locking Datavault
23,447,366 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,131 UART: [state] Locking ICCM
23,451,498 UART: [exit] Launching FMC @ 0x40000130
23,459,895 UART:
23,460,132 UART: Running Caliptra FMC ...
23,461,231 UART:
23,461,393 UART: [state] CFI Enabled
23,526,013 UART: [fht] FMC Alias Private Key: 7
25,866,329 UART: [art] Extend RT PCRs Done
25,867,553 UART: [art] Lock RT PCRs Done
25,869,012 UART: [art] Populate DV Done
25,874,537 UART: [fht] FMC Alias Private Key: 7
25,876,126 UART: [art] Derive CDI
25,876,936 UART: [art] Store in slot 0x4
25,934,864 UART: [art] Derive Key Pair
25,935,907 UART: [art] Store priv key in slot 0x5
29,229,216 UART: [art] Derive Key Pair - Done
29,242,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,530,470 UART: [art] Erasing AUTHORITY.KEYID = 7
31,531,987 UART: [art] PUB.X = 42CCB9BF21057795D388DEF21BEC1FCA952940D6739592DC9E1527123BC67CCD612C9E886EBE58DE9DD5D2DA16301287
31,539,251 UART: [art] PUB.Y = 4F11CA9CCCDB27CD82291B0739925827682577603C27642B64E91E0DE4EF0514A90A1DC8CDFB8646B86712361FC420A7
31,546,554 UART: [art] SIG.R = CC144D63B4D31E785D179809E75FDBF8812BA2F490AC2B65739B97223C6BB9F3F676C1BF8B7D3E19BBAB3EE339C2A6D4
31,553,910 UART: [art] SIG.S = 6CF50A710FDC885D3834AEE8ABEF51FC8865776EF013C13DF6AF2A762A35E9CCE55FB5E08279701073B16409166AB935
32,859,714 UART: Caliptra RT
32,860,421 UART: [state] CFI Enabled
33,036,089 UART: [rt] RT listening for mailbox commands...
33,067,712 UART: [rt]cmd =0x54514754, len=24
33,070,199 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,784,762 ready_for_fw is high
3,785,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,945,467 >>> mbox cmd response: success
17,946,897 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,652,803 UART:
23,653,221 UART: Running Caliptra FMC ...
23,654,368 UART:
23,654,533 UART: [state] CFI Enabled
23,716,503 UART: [fht] FMC Alias Private Key: 7
26,057,348 UART: [art] Extend RT PCRs Done
26,058,582 UART: [art] Lock RT PCRs Done
26,060,168 UART: [art] Populate DV Done
26,065,485 UART: [fht] FMC Alias Private Key: 7
26,066,993 UART: [art] Derive CDI
26,067,741 UART: [art] Store in slot 0x4
26,124,455 UART: [art] Derive Key Pair
26,125,499 UART: [art] Store priv key in slot 0x5
29,418,316 UART: [art] Derive Key Pair - Done
29,431,593 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,718,853 UART: [art] Erasing AUTHORITY.KEYID = 7
31,720,357 UART: [art] PUB.X = F5FC3E8AB67D7B1BCFEA1A0B3401C21CF1E2A23C0C2A6F4F731EB22AF1A97107B2E25F47EB7B5EB21E76A69EAC9B0F86
31,727,675 UART: [art] PUB.Y = 1268A2110B1F64FEB03A83D5C8FF5AEE206BB73B91ED7622F1178B8A18B9CFFA2B796A4A50B2D85AE81E7AB156FE83A3
31,734,932 UART: [art] SIG.R = D741872447BC6C6C2F4C5237895C34F919353A07AC4EDA7EDF6CE61A580B3EBC399A698056D543C46B3EFAF2EA7E5C75
31,742,326 UART: [art] SIG.S = E91CBFA5FB59C4C06ABC7312DFA83767E39E470F570DB25EB650287AECEC0A303FA22B8D9C3C22E95DB0FE9B96A18142
33,048,035 UART: Caliptra RT
33,048,775 UART: [state] CFI Enabled
33,225,386 UART: [rt] RT listening for mailbox commands...
33,257,281 UART: [rt]cmd =0x54514754, len=24
33,259,506 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,572 UART:
192,942 UART: Running Caliptra ROM ...
194,036 UART:
603,556 UART: [state] CFI Enabled
618,098 UART: [state] LifecycleState = Unprovisioned
620,051 UART: [state] DebugLocked = No
622,074 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,430 UART: [kat] SHA2-256
797,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,744 UART: [kat] ++
808,274 UART: [kat] sha1
819,788 UART: [kat] SHA2-256
822,454 UART: [kat] SHA2-384
827,017 UART: [kat] SHA2-512-ACC
829,379 UART: [kat] ECC-384
3,113,461 UART: [kat] HMAC-384Kdf
3,124,907 UART: [kat] LMS
4,315,019 UART: [kat] --
4,319,230 UART: [cold-reset] ++
4,321,081 UART: [fht] Storing FHT @ 0x50003400
4,332,062 UART: [idev] ++
4,332,691 UART: [idev] CDI.KEYID = 6
4,333,596 UART: [idev] SUBJECT.KEYID = 7
4,334,835 UART: [idev] UDS.KEYID = 0
4,335,874 ready_for_fw is high
4,336,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,926 UART: [idev] Erasing UDS.KEYID = 0
7,621,556 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,010 UART: [idev] --
7,646,839 UART: [ldev] ++
7,647,409 UART: [ldev] CDI.KEYID = 6
7,648,420 UART: [ldev] SUBJECT.KEYID = 5
7,649,568 UART: [ldev] AUTHORITY.KEYID = 7
7,650,845 UART: [ldev] FE.KEYID = 1
7,664,188 UART: [ldev] Erasing FE.KEYID = 1
10,951,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,908 UART: [ldev] --
13,310,814 UART: [fwproc] Waiting for Commands...
13,313,173 UART: [fwproc] Received command 0x46574c44
13,315,395 UART: [fwproc] Received Image of size 118548 bytes
17,416,662 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,489,162 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,562,348 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,891,531 >>> mbox cmd response: success
17,892,716 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,896,440 UART: [afmc] ++
17,897,023 UART: [afmc] CDI.KEYID = 6
17,898,042 UART: [afmc] SUBJECT.KEYID = 7
17,899,199 UART: [afmc] AUTHORITY.KEYID = 5
21,214,217 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,508,077 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,383 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,524,758 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,539,502 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,553,958 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,573,925 UART: [afmc] --
23,577,426 UART: [cold-reset] --
23,579,013 UART: [state] Locking Datavault
23,582,740 UART: [state] Locking PCR0, PCR1 and PCR31
23,584,484 UART: [state] Locking ICCM
23,586,196 UART: [exit] Launching FMC @ 0x40000130
23,594,579 UART:
23,594,808 UART: Running Caliptra FMC ...
23,595,900 UART:
23,596,056 UART: [state] CFI Enabled
23,604,313 UART: [fht] FMC Alias Private Key: 7
25,944,220 UART: [art] Extend RT PCRs Done
25,945,441 UART: [art] Lock RT PCRs Done
25,947,203 UART: [art] Populate DV Done
25,952,230 UART: [fht] FMC Alias Private Key: 7
25,953,801 UART: [art] Derive CDI
25,954,545 UART: [art] Store in slot 0x4
25,997,474 UART: [art] Derive Key Pair
25,998,475 UART: [art] Store priv key in slot 0x5
29,240,726 UART: [art] Derive Key Pair - Done
29,253,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,176 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,677 UART: [art] PUB.X = 6751EFDE9AA3F1B9A05300CF0479E813DE7560C5A5266665A7CA5EE8E509ABD1BC1228410F3BC0B52FB4E702C6102B2B
31,542,928 UART: [art] PUB.Y = E05B8FE016D787D598B6E82422009C7CF2756493AC93B78C1770167CECDE4F7B5BFBD9C91E311FBEFB06D2A710F7C5BC
31,550,208 UART: [art] SIG.R = C2803DD46E6B230ED3A790746E11B5386A592CAE96D3229C241AE12AC0AD2B6D0A7AC99A9EB1428208BD97B6F418CB76
31,557,637 UART: [art] SIG.S = BEEB2DA3A8E1E16416FC1D460195283AAAE3E3C4E115497ACC8859DE7574A7D20BAA8573322D9B44AF6FFE261F8CD62A
32,863,322 UART: Caliptra RT
32,864,033 UART: [state] CFI Enabled
32,997,316 UART: [rt] RT listening for mailbox commands...
33,028,571 UART: [rt]cmd =0x54514754, len=24
33,030,790 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,127,283 ready_for_fw is high
4,127,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,095 >>> mbox cmd response: success
18,159,522 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,791,284 UART:
23,791,670 UART: Running Caliptra FMC ...
23,792,963 UART:
23,793,135 UART: [state] CFI Enabled
23,800,913 UART: [fht] FMC Alias Private Key: 7
26,140,914 UART: [art] Extend RT PCRs Done
26,142,131 UART: [art] Lock RT PCRs Done
26,143,707 UART: [art] Populate DV Done
26,149,233 UART: [fht] FMC Alias Private Key: 7
26,150,825 UART: [art] Derive CDI
26,151,636 UART: [art] Store in slot 0x4
26,194,117 UART: [art] Derive Key Pair
26,195,104 UART: [art] Store priv key in slot 0x5
29,437,502 UART: [art] Derive Key Pair - Done
29,450,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,306 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,947 UART: [art] PUB.X = B0AE9D37D3477E401E24927C26377C23A4C459B517AD682E2C9D4BD1F0E23D076B21DA32B8B324EC23C0136593DED44F
31,740,036 UART: [art] PUB.Y = B16A8FC93970F9DDD4201215A83BE1F3A22A0DA4C23A970999765CD9CEF176D0286227EE519FD0EE2F17D0DAACED1DE3
31,747,330 UART: [art] SIG.R = F349655E814C861B658B675C9BCF14F4D4ACFEF61F879469AF9F6DDA976DB1A9AB3BF94EE7A008B272416F3D272D2088
31,754,770 UART: [art] SIG.S = 2AC9D834E5195C26FF1DE9B92E809FB1480FABEDE6F79A40F8580F9FD9790EF9A9960DEAC35A587865EF750CB481081B
33,060,258 UART: Caliptra RT
33,060,988 UART: [state] CFI Enabled
33,194,208 UART: [rt] RT listening for mailbox commands...
33,225,546 UART: [rt]cmd =0x54514754, len=24
33,228,006 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,072 UART:
192,441 UART: Running Caliptra ROM ...
193,637 UART:
193,803 UART: [state] CFI Enabled
262,978 UART: [state] LifecycleState = Unprovisioned
264,892 UART: [state] DebugLocked = No
266,851 UART: [state] WD Timer not started. Device not locked for debugging
270,185 UART: [kat] SHA2-256
449,858 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,665 UART: [kat] ++
461,195 UART: [kat] sha1
472,448 UART: [kat] SHA2-256
475,162 UART: [kat] SHA2-384
481,014 UART: [kat] SHA2-512-ACC
483,384 UART: [kat] ECC-384
2,947,389 UART: [kat] HMAC-384Kdf
2,970,380 UART: [kat] LMS
3,446,897 UART: [kat] --
3,453,127 UART: [cold-reset] ++
3,454,495 UART: [fht] FHT @ 0x50003400
3,466,174 UART: [idev] ++
3,466,732 UART: [idev] CDI.KEYID = 6
3,467,759 UART: [idev] SUBJECT.KEYID = 7
3,468,928 UART: [idev] UDS.KEYID = 0
3,469,883 ready_for_fw is high
3,470,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,182 UART: [idev] Erasing UDS.KEYID = 0
5,984,889 UART: [idev] Sha1 KeyId Algorithm
6,008,235 UART: [idev] --
6,012,257 UART: [ldev] ++
6,012,829 UART: [ldev] CDI.KEYID = 6
6,013,740 UART: [ldev] SUBJECT.KEYID = 5
6,014,953 UART: [ldev] AUTHORITY.KEYID = 7
6,016,186 UART: [ldev] FE.KEYID = 1
6,057,721 UART: [ldev] Erasing FE.KEYID = 1
8,564,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,144 UART: [ldev] --
10,374,677 UART: [fwproc] Wait for Commands...
10,377,420 UART: [fwproc] Recv command 0x46574c44
10,379,455 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,506 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,549 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,177 >>> mbox cmd response: success
14,350,270 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,352,804 UART: [afmc] ++
14,353,437 UART: [afmc] CDI.KEYID = 6
14,354,319 UART: [afmc] SUBJECT.KEYID = 7
14,355,585 UART: [afmc] AUTHORITY.KEYID = 5
16,899,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,362 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,238 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,225 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,832 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,714,613 UART: [afmc] --
18,718,727 UART: [cold-reset] --
18,722,165 UART: [state] Locking Datavault
18,726,710 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,459 UART: [state] Locking ICCM
18,730,766 UART: [exit] Launching FMC @ 0x40000130
18,739,154 UART:
18,739,392 UART: Running Caliptra FMC ...
18,740,488 UART:
18,740,645 UART: [state] CFI Enabled
18,798,275 UART: [fht] FMC Alias Private Key: 7
20,564,062 UART: [art] Extend RT PCRs Done
20,565,283 UART: [art] Lock RT PCRs Done
20,566,711 UART: [art] Populate DV Done
20,572,401 UART: [fht] FMC Alias Private Key: 7
20,574,042 UART: [art] Derive CDI
20,574,854 UART: [art] Store in slot 0x4
20,631,992 UART: [art] Derive Key Pair
20,633,031 UART: [art] Store priv key in slot 0x5
23,095,676 UART: [art] Derive Key Pair - Done
23,108,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,821,110 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,598 UART: [art] PUB.X = AF567BA8A7075A7D9D7A104C429B8E2396372E49B45B70521D73AA7E60D2CFF3D8802AC269A16D385E6E0CCEEB797D6E
24,829,888 UART: [art] PUB.Y = 1D2E1E07420AB79B5E798EE30315AB89D429ACFA5B555B621DEFE24CE8249E0D154716D805F094753CA07DE17B01F8DD
24,837,165 UART: [art] SIG.R = 6C96C93DE9C24020FD607C6FD7DB5C142F637702ECC3E57061145F368A8501E4CB76D0520CAF4C8D63900D56C154B7CD
24,844,508 UART: [art] SIG.S = 1134F1C577A8ADD8CFAAC69C8BC66E3DE1B4CABD69E4B930CAF2E804149C1878711F3BBC24A2F1A8BB43EA7BA94247EC
25,824,069 UART: Caliptra RT
25,824,786 UART: [state] CFI Enabled
26,005,612 UART: [rt] RT listening for mailbox commands...
26,037,107 UART: [rt]cmd =0x54514754, len=24
26,039,406 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,459,022 ready_for_fw is high
3,459,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,228,776 >>> mbox cmd response: success
14,230,176 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,517,589 UART:
18,517,970 UART: Running Caliptra FMC ...
18,519,258 UART:
18,519,419 UART: [state] CFI Enabled
18,584,567 UART: [fht] FMC Alias Private Key: 7
20,351,100 UART: [art] Extend RT PCRs Done
20,352,333 UART: [art] Lock RT PCRs Done
20,353,604 UART: [art] Populate DV Done
20,358,974 UART: [fht] FMC Alias Private Key: 7
20,360,500 UART: [art] Derive CDI
20,361,235 UART: [art] Store in slot 0x4
20,417,976 UART: [art] Derive Key Pair
20,418,974 UART: [art] Store priv key in slot 0x5
22,881,703 UART: [art] Derive Key Pair - Done
22,894,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,194 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,694 UART: [art] PUB.X = D511871DF1E6B80621F3FBB8ADEE6D946202D5F68A23660E156443CAC069C4B44D9C13328E86E2D4D22306AC794D9327
24,615,935 UART: [art] PUB.Y = 2537CADB6B79AA06D3C094A528BF7CC271FA234B87D2FC4078E1AFFF96714EA873C80DF347A2475F1C498767C179D7A6
24,623,237 UART: [art] SIG.R = D5CD9B461629D933B847268F3186EDAB21497469975CF1BF45D1FA7366811250BDCC1D02D2943A90647687621B773C23
24,630,583 UART: [art] SIG.S = 2244582185DF841A63630325DB6703D1CB8230B384204C63376156D6C2C51E8531F12381E7DFC3236E12EA3D12A95595
25,609,852 UART: Caliptra RT
25,610,568 UART: [state] CFI Enabled
25,790,126 UART: [rt] RT listening for mailbox commands...
25,821,811 UART: [rt]cmd =0x54514754, len=24
25,824,196 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
192,376 UART:
192,737 UART: Running Caliptra ROM ...
194,030 UART:
603,610 UART: [state] CFI Enabled
617,501 UART: [state] LifecycleState = Unprovisioned
619,447 UART: [state] DebugLocked = No
620,698 UART: [state] WD Timer not started. Device not locked for debugging
624,955 UART: [kat] SHA2-256
804,621 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,417 UART: [kat] ++
815,971 UART: [kat] sha1
825,927 UART: [kat] SHA2-256
828,647 UART: [kat] SHA2-384
834,851 UART: [kat] SHA2-512-ACC
837,223 UART: [kat] ECC-384
3,277,911 UART: [kat] HMAC-384Kdf
3,290,359 UART: [kat] LMS
3,766,850 UART: [kat] --
3,770,823 UART: [cold-reset] ++
3,771,759 UART: [fht] FHT @ 0x50003400
3,783,022 UART: [idev] ++
3,783,588 UART: [idev] CDI.KEYID = 6
3,784,621 UART: [idev] SUBJECT.KEYID = 7
3,785,798 UART: [idev] UDS.KEYID = 0
3,786,730 ready_for_fw is high
3,786,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,180 UART: [idev] Erasing UDS.KEYID = 0
6,268,534 UART: [idev] Sha1 KeyId Algorithm
6,290,994 UART: [idev] --
6,295,745 UART: [ldev] ++
6,296,316 UART: [ldev] CDI.KEYID = 6
6,297,281 UART: [ldev] SUBJECT.KEYID = 5
6,298,498 UART: [ldev] AUTHORITY.KEYID = 7
6,299,731 UART: [ldev] FE.KEYID = 1
6,312,593 UART: [ldev] Erasing FE.KEYID = 1
8,790,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,025 UART: [ldev] --
10,585,248 UART: [fwproc] Wait for Commands...
10,587,741 UART: [fwproc] Recv command 0x46574c44
10,589,733 UART: [fwproc] Recv'd Img size: 118548 bytes
14,083,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,009 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,017 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,879 >>> mbox cmd response: success
14,563,971 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,566,942 UART: [afmc] ++
14,567,740 UART: [afmc] CDI.KEYID = 6
14,568,659 UART: [afmc] SUBJECT.KEYID = 7
14,569,766 UART: [afmc] AUTHORITY.KEYID = 5
17,073,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,795,165 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,797,339 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,813,172 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,829,252 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,844,806 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,870,791 UART: [afmc] --
18,874,921 UART: [cold-reset] --
18,878,184 UART: [state] Locking Datavault
18,884,456 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,216 UART: [state] Locking ICCM
18,888,943 UART: [exit] Launching FMC @ 0x40000130
18,897,353 UART:
18,897,586 UART: Running Caliptra FMC ...
18,898,614 UART:
18,898,760 UART: [state] CFI Enabled
18,907,075 UART: [fht] FMC Alias Private Key: 7
20,672,797 UART: [art] Extend RT PCRs Done
20,674,014 UART: [art] Lock RT PCRs Done
20,675,531 UART: [art] Populate DV Done
20,681,214 UART: [fht] FMC Alias Private Key: 7
20,682,936 UART: [art] Derive CDI
20,683,758 UART: [art] Store in slot 0x4
20,726,304 UART: [art] Derive Key Pair
20,727,504 UART: [art] Store priv key in slot 0x5
23,154,590 UART: [art] Derive Key Pair - Done
23,167,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,873,892 UART: [art] Erasing AUTHORITY.KEYID = 7
24,875,387 UART: [art] PUB.X = 3494B60C543EBD83FC1FCA538D6E7A1B2117444FF60CF1796A2D605D7A633CD5F9A5DC43207CA5BB11C70F3D9A4459AD
24,882,684 UART: [art] PUB.Y = 9FBA1665A8FEAF672FD26EA3B1C2C9E8919151398657F3756987D808EAEB0053A72F4754AA8AA6093D889377DCA7C84A
24,889,922 UART: [art] SIG.R = F966AB59181A24E81E14E59247078993C42FFE704DD3FD50564D27DD303F054935CF3BA04D03B53979A65F5D9FE9AD60
24,897,323 UART: [art] SIG.S = 77A777956BA8B2556E61BE41AD8B1CA338FFF57747C002ECF5F8D5CD0D708A3FFB2B27B76BCD2D7CBBCCB41CE658D0F2
25,876,398 UART: Caliptra RT
25,877,087 UART: [state] CFI Enabled
26,010,402 UART: [rt] RT listening for mailbox commands...
26,041,918 UART: [rt]cmd =0x54514754, len=24
26,044,385 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,783,305 ready_for_fw is high
3,783,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,202 >>> mbox cmd response: success
14,450,409 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,703,391 UART:
18,703,769 UART: Running Caliptra FMC ...
18,704,866 UART:
18,705,017 UART: [state] CFI Enabled
18,713,029 UART: [fht] FMC Alias Private Key: 7
20,478,964 UART: [art] Extend RT PCRs Done
20,480,182 UART: [art] Lock RT PCRs Done
20,481,868 UART: [art] Populate DV Done
20,487,231 UART: [fht] FMC Alias Private Key: 7
20,488,935 UART: [art] Derive CDI
20,489,749 UART: [art] Store in slot 0x4
20,532,457 UART: [art] Derive Key Pair
20,533,498 UART: [art] Store priv key in slot 0x5
22,960,566 UART: [art] Derive Key Pair - Done
22,973,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,680,330 UART: [art] Erasing AUTHORITY.KEYID = 7
24,681,831 UART: [art] PUB.X = CE300F42E36FBC2F10C077726EDB10F383504A4256A8CD6FB2A0214D56B00DACA15D906C22FD287DBCDD1CFB585BF22A
24,689,140 UART: [art] PUB.Y = 684434E9778B8C0872AFBDA0B617C25817D781CCBB94D9E99C3139C66A7BA15602F17D92021DBB1EFAC99832EE8BD40C
24,696,409 UART: [art] SIG.R = E16F9AC0A2438C6BDF1A613BDED2DB5CC28FD6741062D163B2B07A10F62C861F7B9661B8F4B53482F4C800672885D289
24,703,811 UART: [art] SIG.S = 7FCDBCA90D755BD840E8E6BB5A51EB6A2FA6439FA7E1935A473E88558503F58B833E82547DA3744B081A1EE47805BE9B
25,683,041 UART: Caliptra RT
25,683,756 UART: [state] CFI Enabled
25,816,766 UART: [rt] RT listening for mailbox commands...
25,848,400 UART: [rt]cmd =0x54514754, len=24
25,850,918 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,072 UART:
192,443 UART: Running Caliptra ROM ...
193,528 UART:
193,692 UART: [state] CFI Enabled
262,548 UART: [state] LifecycleState = Unprovisioned
264,952 UART: [state] DebugLocked = No
266,830 UART: [state] WD Timer not started. Device not locked for debugging
271,859 UART: [kat] SHA2-256
461,723 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,466 UART: [kat] ++
472,913 UART: [kat] sha1
484,016 UART: [kat] SHA2-256
487,026 UART: [kat] SHA2-384
493,240 UART: [kat] SHA2-512-ACC
495,820 UART: [kat] ECC-384
2,949,581 UART: [kat] HMAC-384Kdf
2,972,824 UART: [kat] LMS
3,504,587 UART: [kat] --
3,509,966 UART: [cold-reset] ++
3,511,707 UART: [fht] FHT @ 0x50003400
3,524,202 UART: [idev] ++
3,524,878 UART: [idev] CDI.KEYID = 6
3,525,810 UART: [idev] SUBJECT.KEYID = 7
3,527,057 UART: [idev] UDS.KEYID = 0
3,527,986 ready_for_fw is high
3,528,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,249 UART: [idev] Erasing UDS.KEYID = 0
6,030,652 UART: [idev] Sha1 KeyId Algorithm
6,053,396 UART: [idev] --
6,058,471 UART: [ldev] ++
6,059,152 UART: [ldev] CDI.KEYID = 6
6,060,063 UART: [ldev] SUBJECT.KEYID = 5
6,061,282 UART: [ldev] AUTHORITY.KEYID = 7
6,062,460 UART: [ldev] FE.KEYID = 1
6,101,512 UART: [ldev] Erasing FE.KEYID = 1
8,606,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,331 UART: [ldev] --
10,416,197 UART: [fwproc] Wait for Commands...
10,418,179 UART: [fwproc] Recv command 0x46574c44
10,420,481 UART: [fwproc] Recv'd Img size: 118548 bytes
13,929,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,717 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,318 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,052 >>> mbox cmd response: success
14,687,200 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,689,967 UART: [afmc] ++
14,690,653 UART: [afmc] CDI.KEYID = 6
14,691,917 UART: [afmc] SUBJECT.KEYID = 7
14,693,296 UART: [afmc] AUTHORITY.KEYID = 5
17,235,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,974,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,976,252 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,991,323 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,006,478 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,021,359 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,043,894 UART: [afmc] --
19,047,428 UART: [cold-reset] --
19,050,004 UART: [state] Locking Datavault
19,054,341 UART: [state] Locking PCR0, PCR1 and PCR31
19,056,471 UART: [state] Locking ICCM
19,057,919 UART: [exit] Launching FMC @ 0x40000130
19,066,583 UART:
19,066,825 UART: Running Caliptra FMC ...
19,067,873 UART:
19,068,021 UART: [state] CFI Enabled
19,132,407 UART: [fht] FMC Alias Private Key: 7
20,898,496 UART: [art] Extend RT PCRs Done
20,899,715 UART: [art] Lock RT PCRs Done
20,901,041 UART: [art] Populate DV Done
20,906,239 UART: [fht] FMC Alias Private Key: 7
20,907,934 UART: [art] Derive CDI
20,908,663 UART: [art] Store in slot 0x4
20,964,318 UART: [art] Derive Key Pair
20,965,353 UART: [art] Store priv key in slot 0x5
23,427,820 UART: [art] Derive Key Pair - Done
23,440,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,152,429 UART: [art] Erasing AUTHORITY.KEYID = 7
25,153,935 UART: [art] PUB.X = 807648CCED74BD537C1D6E7841DD2F35FBD60FBA1FB6C9B56B2639F1C08A3E40EF24B59579275E77ABD667B3051C072E
25,161,322 UART: [art] PUB.Y = C11F73C17925604DC195A2438FE5009BA6945A857EE9B7A218CBD1EC576E0942844860A61C81DD43131ED9F00A2C870F
25,168,464 UART: [art] SIG.R = B5394E2BDFED231FF86B485E013BF25448EFAB2DF8879B05FB40C448EB7F21EBC3FEE0EB082611924AD640E05D6A831A
25,175,883 UART: [art] SIG.S = 45BF73884FD90635483A88314899718B9C7AEE52F51344FEDC4916C2E65122A8CD6AFF845065F7F3CDB810EAD1C92F72
26,155,114 UART: Caliptra RT
26,155,824 UART: [state] CFI Enabled
26,336,292 UART: [rt] RT listening for mailbox commands...
26,368,026 UART: [rt]cmd =0x54514754, len=24
26,370,705 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
3,420,403 ready_for_fw is high
3,420,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,797,231 >>> mbox cmd response: success
14,798,398 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,109,644 UART:
19,110,023 UART: Running Caliptra FMC ...
19,111,134 UART:
19,111,308 UART: [state] CFI Enabled
19,179,763 UART: [fht] FMC Alias Private Key: 7
20,967,285 UART: [art] Extend RT PCRs Done
20,968,508 UART: [art] Lock RT PCRs Done
20,970,160 UART: [art] Populate DV Done
20,975,516 UART: [fht] FMC Alias Private Key: 7
20,977,106 UART: [art] Derive CDI
20,977,844 UART: [art] Store in slot 0x4
21,034,220 UART: [art] Derive Key Pair
21,035,265 UART: [art] Store priv key in slot 0x5
23,497,890 UART: [art] Derive Key Pair - Done
23,510,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,087 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,595 UART: [art] PUB.X = D6446D30EC95475AC513B8B7FAD6720A2C8A8FA5D31D4004A918DB470F275F9E063B01B0AA4C2BEC7BC7710D870E2EDD
25,233,851 UART: [art] PUB.Y = 4A4839B08B9F6283111CC6AF53540D228404FA22224CF3B4878EEBA1221C88B024243A02AB3E666BFEE6B2F8988532DC
25,241,111 UART: [art] SIG.R = C08D6F1E4FC560C76FB3E6D52316A94D676F0F08D5694FA403870EC9072A4D7DCEAAD1F997F88453FD486732B143B7CF
25,248,576 UART: [art] SIG.S = 9715DA0232589733B144613729617BE46442F2501B9432D4C0EC5A44243D5DF7A569468F81FFCC502A0240029FBBE659
26,227,404 UART: Caliptra RT
26,228,083 UART: [state] CFI Enabled
26,408,501 UART: [rt] RT listening for mailbox commands...
26,440,173 UART: [rt]cmd =0x54514754, len=24
26,442,671 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,432 UART:
192,805 UART: Running Caliptra ROM ...
193,935 UART:
603,414 UART: [state] CFI Enabled
614,465 UART: [state] LifecycleState = Unprovisioned
616,786 UART: [state] DebugLocked = No
618,743 UART: [state] WD Timer not started. Device not locked for debugging
623,366 UART: [kat] SHA2-256
813,263 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,069 UART: [kat] ++
824,683 UART: [kat] sha1
835,230 UART: [kat] SHA2-256
838,247 UART: [kat] SHA2-384
844,599 UART: [kat] SHA2-512-ACC
846,754 UART: [kat] ECC-384
3,290,359 UART: [kat] HMAC-384Kdf
3,303,453 UART: [kat] LMS
3,835,275 UART: [kat] --
3,841,467 UART: [cold-reset] ++
3,842,690 UART: [fht] FHT @ 0x50003400
3,855,162 UART: [idev] ++
3,855,876 UART: [idev] CDI.KEYID = 6
3,856,790 UART: [idev] SUBJECT.KEYID = 7
3,857,968 UART: [idev] UDS.KEYID = 0
3,858,897 ready_for_fw is high
3,859,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,965 UART: [idev] Erasing UDS.KEYID = 0
6,338,339 UART: [idev] Sha1 KeyId Algorithm
6,360,598 UART: [idev] --
6,365,391 UART: [ldev] ++
6,366,118 UART: [ldev] CDI.KEYID = 6
6,367,041 UART: [ldev] SUBJECT.KEYID = 5
6,368,158 UART: [ldev] AUTHORITY.KEYID = 7
6,369,393 UART: [ldev] FE.KEYID = 1
6,378,884 UART: [ldev] Erasing FE.KEYID = 1
8,854,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,652 UART: [ldev] --
10,645,618 UART: [fwproc] Wait for Commands...
10,647,549 UART: [fwproc] Recv command 0x46574c44
10,649,882 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,030 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,639 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,721 >>> mbox cmd response: success
14,906,913 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,909,686 UART: [afmc] ++
14,910,439 UART: [afmc] CDI.KEYID = 6
14,911,549 UART: [afmc] SUBJECT.KEYID = 7
14,913,095 UART: [afmc] AUTHORITY.KEYID = 5
17,416,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,399 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,491 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,664 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,539 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,017 UART: [afmc] --
19,213,621 UART: [cold-reset] --
19,217,377 UART: [state] Locking Datavault
19,223,875 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,019 UART: [state] Locking ICCM
19,228,501 UART: [exit] Launching FMC @ 0x40000130
19,237,180 UART:
19,237,416 UART: Running Caliptra FMC ...
19,238,519 UART:
19,238,679 UART: [state] CFI Enabled
19,246,847 UART: [fht] FMC Alias Private Key: 7
21,013,467 UART: [art] Extend RT PCRs Done
21,014,691 UART: [art] Lock RT PCRs Done
21,016,240 UART: [art] Populate DV Done
21,021,872 UART: [fht] FMC Alias Private Key: 7
21,023,475 UART: [art] Derive CDI
21,024,238 UART: [art] Store in slot 0x4
21,067,057 UART: [art] Derive Key Pair
21,068,062 UART: [art] Store priv key in slot 0x5
23,495,009 UART: [art] Derive Key Pair - Done
23,508,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,615 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,130 UART: [art] PUB.X = 6607C36498304D70F3160B712B6F17E3AAE06EEA5356859CF0D5B430CD9FA92677FBF905A8C7FB6F82B49302292E32AF
25,223,399 UART: [art] PUB.Y = 691904A50405ECDCC97A134CCA6C2B6D6FE08DDA06F4842EADC6F959366765A8C51EA3DB42453A0AEA31DDFCD328B2D7
25,230,705 UART: [art] SIG.R = A6C1E548D712F0C493886A895064C89D3F50D906D78413A0C8EC1945B957FF97288A89FE2F98AE14B4724344AC03E00F
25,238,061 UART: [art] SIG.S = B56E345ADA3E3799AF026E61616046FEEC437E10C7C77F8AD222E42C97C149248960C0E5C936E2774485114C0ED28CF7
26,216,962 UART: Caliptra RT
26,217,671 UART: [state] CFI Enabled
26,350,126 UART: [rt] RT listening for mailbox commands...
26,381,689 UART: [rt]cmd =0x54514754, len=24
26,384,292 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
3,752,508 ready_for_fw is high
3,753,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,054,881 >>> mbox cmd response: success
15,056,174 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,305,500 UART:
19,305,891 UART: Running Caliptra FMC ...
19,307,002 UART:
19,307,164 UART: [state] CFI Enabled
19,315,022 UART: [fht] FMC Alias Private Key: 7
21,080,983 UART: [art] Extend RT PCRs Done
21,082,202 UART: [art] Lock RT PCRs Done
21,084,161 UART: [art] Populate DV Done
21,089,538 UART: [fht] FMC Alias Private Key: 7
21,091,244 UART: [art] Derive CDI
21,091,991 UART: [art] Store in slot 0x4
21,135,026 UART: [art] Derive Key Pair
21,136,117 UART: [art] Store priv key in slot 0x5
23,563,117 UART: [art] Derive Key Pair - Done
23,575,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,282,346 UART: [art] Erasing AUTHORITY.KEYID = 7
25,283,860 UART: [art] PUB.X = 03439EC7D0F328D29966BB8F7A2BC377D9D601E5AD7E8906486B8528A5496CBD144F277A4AC17F4F9C86C50AF8CC667C
25,291,113 UART: [art] PUB.Y = D01AA03BAD3A6635E19A3F84D68D71483AE824AB4841FAE49DC8FA36FB92C0478767741DAEDDB70E7D948DF97ADCA6D3
25,298,412 UART: [art] SIG.R = B0DF14CB40473D7F0FEC3395E2675BA5698AA1FFA69A299A1DA7EEAA082CD3972C60473798A18CB939917C2AE9C8232D
25,305,809 UART: [art] SIG.S = F4D300B1A784610FB50C8DB333A1B9990EE1AD6344B26C8A88434748D07393BE3A96CB1F2536030484948E1C976D37D8
26,284,714 UART: Caliptra RT
26,285,408 UART: [state] CFI Enabled
26,419,068 UART: [rt] RT listening for mailbox commands...
26,450,486 UART: [rt]cmd =0x54514754, len=24
26,452,838 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,337 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,813 UART: [kat] SHA2-256
881,744 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,859 UART: [kat] ++
886,011 UART: [kat] sha1
890,333 UART: [kat] SHA2-256
892,271 UART: [kat] SHA2-384
894,988 UART: [kat] SHA2-512-ACC
896,889 UART: [kat] ECC-384
902,512 UART: [kat] HMAC-384Kdf
907,156 UART: [kat] LMS
1,475,352 UART: [kat] --
1,476,491 UART: [cold-reset] ++
1,476,989 UART: [fht] Storing FHT @ 0x50003400
1,479,978 UART: [idev] ++
1,480,146 UART: [idev] CDI.KEYID = 6
1,480,506 UART: [idev] SUBJECT.KEYID = 7
1,480,930 UART: [idev] UDS.KEYID = 0
1,481,275 ready_for_fw is high
1,481,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,078 UART: [idev] Erasing UDS.KEYID = 0
1,505,974 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,552 UART: [idev] --
1,515,671 UART: [ldev] ++
1,515,839 UART: [ldev] CDI.KEYID = 6
1,516,202 UART: [ldev] SUBJECT.KEYID = 5
1,516,628 UART: [ldev] AUTHORITY.KEYID = 7
1,517,091 UART: [ldev] FE.KEYID = 1
1,522,265 UART: [ldev] Erasing FE.KEYID = 1
1,547,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,032 UART: [ldev] --
1,587,495 UART: [fwproc] Waiting for Commands...
1,588,262 UART: [fwproc] Received command 0x46574c44
1,589,053 UART: [fwproc] Received Image of size 118548 bytes
2,933,725 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,533 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,751 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,104 >>> mbox cmd response: success
3,133,104 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,134,304 UART: [afmc] ++
3,134,472 UART: [afmc] CDI.KEYID = 6
3,134,834 UART: [afmc] SUBJECT.KEYID = 7
3,135,259 UART: [afmc] AUTHORITY.KEYID = 5
3,170,376 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,194 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,974 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,683 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,566 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,249 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,941 UART: [afmc] --
3,212,931 UART: [cold-reset] --
3,213,937 UART: [state] Locking Datavault
3,215,158 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,762 UART: [state] Locking ICCM
3,216,200 UART: [exit] Launching FMC @ 0x40000130
3,221,530 UART:
3,221,546 UART: Running Caliptra FMC ...
3,221,954 UART:
3,222,008 UART: [state] CFI Enabled
3,232,074 UART: [fht] FMC Alias Private Key: 7
3,350,626 UART: [art] Extend RT PCRs Done
3,351,054 UART: [art] Lock RT PCRs Done
3,352,510 UART: [art] Populate DV Done
3,360,909 UART: [fht] FMC Alias Private Key: 7
3,362,055 UART: [art] Derive CDI
3,362,335 UART: [art] Store in slot 0x4
3,447,631 UART: [art] Derive Key Pair
3,447,991 UART: [art] Store priv key in slot 0x5
3,461,232 UART: [art] Derive Key Pair - Done
3,476,108 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,803 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,568 UART: [art] PUB.X = 7866032E76F51248B64250ED188BC2D49E8EB5F37B69844D42DA26A6755C73F02D91959CDCA682D4D87EAF7F20AD67A9
3,499,339 UART: [art] PUB.Y = 476EF592FDEF15E7E14039F1A5A72AAE2A17012D9D00FD32AB98D68D3EA651F308BD5A6C0075B0A216BD161389300B2F
3,506,246 UART: [art] SIG.R = CC83E7A0D8050EBB40BA26EEEB5080B20DD65279341A0834A3F440B5F85CE40896C56843E19671D882D1A29B2BE967A7
3,513,005 UART: [art] SIG.S = 76231C312E522757B1EBBD0480C10A6E594124758D26A0B69662FF188DDEA0BC5988075F78371BB812A9D62D4C932190
3,536,706 UART: Caliptra RT
3,536,957 UART: [state] CFI Enabled
3,658,513 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,993 UART: [rt]cmd =0x54514754, len=24
3,690,679 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,413 ready_for_fw is high
1,362,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,737 >>> mbox cmd response: success
2,980,737 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,041,680 UART:
3,041,696 UART: Running Caliptra FMC ...
3,042,104 UART:
3,042,158 UART: [state] CFI Enabled
3,052,056 UART: [fht] FMC Alias Private Key: 7
3,171,576 UART: [art] Extend RT PCRs Done
3,172,004 UART: [art] Lock RT PCRs Done
3,173,498 UART: [art] Populate DV Done
3,181,545 UART: [fht] FMC Alias Private Key: 7
3,182,625 UART: [art] Derive CDI
3,182,905 UART: [art] Store in slot 0x4
3,268,509 UART: [art] Derive Key Pair
3,268,869 UART: [art] Store priv key in slot 0x5
3,282,064 UART: [art] Derive Key Pair - Done
3,296,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,619 UART: [art] PUB.X = 5080BB49130ED59903A601DD87607C5350A07D57F0E5CA62452AB8968582A5ABE2DD89CF469D2739BDE4402D3FF71AA7
3,319,384 UART: [art] PUB.Y = 85B3DC56F8463F600BCCE6D1165E2CD2AC2F5569039E6D47A9ECE746D187183EE469B51716BB8CB472AF5321C51D15DC
3,326,338 UART: [art] SIG.R = FDA515DB2FCAECF958B9626DA94F29CB91600E189F2A00DED23B9F70603B3FFB2429BC01AC4490BCD60961717171677C
3,333,089 UART: [art] SIG.S = C26DC4CA6EE7E173F666D33F11955BDB22E136D036C3A30DACB8828DE5F479B20D2A548135349692E06400A0AC937F55
3,356,981 UART: Caliptra RT
3,357,232 UART: [state] CFI Enabled
3,478,031 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,695 UART: [rt]cmd =0x54514754, len=24
3,510,701 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,072 UART: [kat] SHA2-256
882,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,118 UART: [kat] ++
886,270 UART: [kat] sha1
890,590 UART: [kat] SHA2-256
892,528 UART: [kat] SHA2-384
895,381 UART: [kat] SHA2-512-ACC
897,282 UART: [kat] ECC-384
902,585 UART: [kat] HMAC-384Kdf
907,093 UART: [kat] LMS
1,475,289 UART: [kat] --
1,476,342 UART: [cold-reset] ++
1,476,884 UART: [fht] Storing FHT @ 0x50003400
1,479,643 UART: [idev] ++
1,479,811 UART: [idev] CDI.KEYID = 6
1,480,171 UART: [idev] SUBJECT.KEYID = 7
1,480,595 UART: [idev] UDS.KEYID = 0
1,480,940 ready_for_fw is high
1,480,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,439 UART: [idev] Erasing UDS.KEYID = 0
1,505,237 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,859 UART: [idev] --
1,514,944 UART: [ldev] ++
1,515,112 UART: [ldev] CDI.KEYID = 6
1,515,475 UART: [ldev] SUBJECT.KEYID = 5
1,515,901 UART: [ldev] AUTHORITY.KEYID = 7
1,516,364 UART: [ldev] FE.KEYID = 1
1,521,616 UART: [ldev] Erasing FE.KEYID = 1
1,546,847 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,779 UART: [ldev] --
1,586,134 UART: [fwproc] Waiting for Commands...
1,586,947 UART: [fwproc] Received command 0x46574c44
1,587,738 UART: [fwproc] Received Image of size 118548 bytes
2,932,556 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,576 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,794 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,193 >>> mbox cmd response: success
3,132,193 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,133,223 UART: [afmc] ++
3,133,391 UART: [afmc] CDI.KEYID = 6
3,133,753 UART: [afmc] SUBJECT.KEYID = 7
3,134,178 UART: [afmc] AUTHORITY.KEYID = 5
3,169,283 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,663 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,443 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,152 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,035 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,718 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,440 UART: [afmc] --
3,212,478 UART: [cold-reset] --
3,213,274 UART: [state] Locking Datavault
3,214,159 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,763 UART: [state] Locking ICCM
3,215,353 UART: [exit] Launching FMC @ 0x40000130
3,220,683 UART:
3,220,699 UART: Running Caliptra FMC ...
3,221,107 UART:
3,221,250 UART: [state] CFI Enabled
3,231,764 UART: [fht] FMC Alias Private Key: 7
3,350,796 UART: [art] Extend RT PCRs Done
3,351,224 UART: [art] Lock RT PCRs Done
3,352,802 UART: [art] Populate DV Done
3,360,809 UART: [fht] FMC Alias Private Key: 7
3,361,867 UART: [art] Derive CDI
3,362,147 UART: [art] Store in slot 0x4
3,447,501 UART: [art] Derive Key Pair
3,447,861 UART: [art] Store priv key in slot 0x5
3,461,112 UART: [art] Derive Key Pair - Done
3,475,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,923 UART: [art] PUB.X = 2124F9671F613D9516F17B1C06DCE590ACB3EC05483A50A8AA9021CF8B63C62C16748CFB016DAAD9B0D8911ACCD46F9B
3,498,698 UART: [art] PUB.Y = 7ADA378AAA1AD3515F9460C599A89BF3459BC45A07A574A7030DCDBA7DE396D15D4022D2208C2071C7A56F61930C6979
3,505,640 UART: [art] SIG.R = 7D64C126FB905434E9F1333A874DFCC8B95C7E525E9D969888E7A6523EF4F90B154E9AF99446A6C160FDC8D9A84B198D
3,512,413 UART: [art] SIG.S = 491C5FABC79FD91C98DB6EFC5C17663E43163488B1E6F9057D41828BD57C00160273E2EF90B73A300808CCFB8F5F674B
3,536,457 UART: Caliptra RT
3,536,800 UART: [state] CFI Enabled
3,657,273 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,119 UART: [rt]cmd =0x54514754, len=24
3,690,105 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,320 ready_for_fw is high
1,363,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,423 >>> mbox cmd response: success
2,981,423 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,042,906 UART:
3,042,922 UART: Running Caliptra FMC ...
3,043,330 UART:
3,043,473 UART: [state] CFI Enabled
3,054,299 UART: [fht] FMC Alias Private Key: 7
3,172,917 UART: [art] Extend RT PCRs Done
3,173,345 UART: [art] Lock RT PCRs Done
3,174,877 UART: [art] Populate DV Done
3,182,972 UART: [fht] FMC Alias Private Key: 7
3,184,128 UART: [art] Derive CDI
3,184,408 UART: [art] Store in slot 0x4
3,270,118 UART: [art] Derive Key Pair
3,270,478 UART: [art] Store priv key in slot 0x5
3,283,549 UART: [art] Derive Key Pair - Done
3,298,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,714 UART: [art] PUB.X = 61421290CA3A27B9A00F05EFE0322FA24F4EEC3214B3535F504D674068B19DA556A62B7EC2C9CA9A7E1A2D5E25BAD129
3,321,488 UART: [art] PUB.Y = 5E1CD864B2117A866D2D7AB442BBD0B30F2E9B28230E9E7CF4A62FE9A9E818E4B2A9DADFFF14BADFFA66F6F80E359C9C
3,328,457 UART: [art] SIG.R = CA1E3AC84CFB7901799F32889EC335CAB2684B7AD78CC1A207C7126A12D341782E849BAEABA1F71573806CB9DA43EFD2
3,335,235 UART: [art] SIG.S = F79E324B808FFF044C29C6EF26FE6AF418574AEE6EBCF2D73E7FBE64BA01D2C49663DDB3AC173D4C327E2699CCC4510C
3,358,750 UART: Caliptra RT
3,359,093 UART: [state] CFI Enabled
3,480,102 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,626 UART: [rt]cmd =0x54514754, len=24
3,512,464 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,034 UART: [kat] ++
895,186 UART: [kat] sha1
899,288 UART: [kat] SHA2-256
901,228 UART: [kat] SHA2-384
903,883 UART: [kat] SHA2-512-ACC
905,784 UART: [kat] ECC-384
915,409 UART: [kat] HMAC-384Kdf
919,949 UART: [kat] LMS
1,168,261 UART: [kat] --
1,169,378 UART: [cold-reset] ++
1,169,946 UART: [fht] FHT @ 0x50003400
1,172,512 UART: [idev] ++
1,172,680 UART: [idev] CDI.KEYID = 6
1,173,041 UART: [idev] SUBJECT.KEYID = 7
1,173,466 UART: [idev] UDS.KEYID = 0
1,173,812 ready_for_fw is high
1,173,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,001 UART: [idev] Erasing UDS.KEYID = 0
1,198,171 UART: [idev] Sha1 KeyId Algorithm
1,207,033 UART: [idev] --
1,208,108 UART: [ldev] ++
1,208,276 UART: [ldev] CDI.KEYID = 6
1,208,640 UART: [ldev] SUBJECT.KEYID = 5
1,209,067 UART: [ldev] AUTHORITY.KEYID = 7
1,209,530 UART: [ldev] FE.KEYID = 1
1,214,802 UART: [ldev] Erasing FE.KEYID = 1
1,240,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,354 UART: [ldev] --
1,279,729 UART: [fwproc] Wait for Commands...
1,280,440 UART: [fwproc] Recv command 0x46574c44
1,281,173 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,595 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,770 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,987 >>> mbox cmd response: success
2,823,987 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,825,115 UART: [afmc] ++
2,825,283 UART: [afmc] CDI.KEYID = 6
2,825,646 UART: [afmc] SUBJECT.KEYID = 7
2,826,072 UART: [afmc] AUTHORITY.KEYID = 5
2,861,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,053 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,763 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,644 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,345 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,968 UART: [afmc] --
2,904,011 UART: [cold-reset] --
2,904,861 UART: [state] Locking Datavault
2,905,904 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,508 UART: [state] Locking ICCM
2,907,148 UART: [exit] Launching FMC @ 0x40000130
2,912,478 UART:
2,912,494 UART: Running Caliptra FMC ...
2,912,902 UART:
2,912,956 UART: [state] CFI Enabled
2,923,448 UART: [fht] FMC Alias Private Key: 7
3,042,470 UART: [art] Extend RT PCRs Done
3,042,898 UART: [art] Lock RT PCRs Done
3,044,556 UART: [art] Populate DV Done
3,052,689 UART: [fht] FMC Alias Private Key: 7
3,053,661 UART: [art] Derive CDI
3,053,941 UART: [art] Store in slot 0x4
3,139,860 UART: [art] Derive Key Pair
3,140,220 UART: [art] Store priv key in slot 0x5
3,152,854 UART: [art] Derive Key Pair - Done
3,167,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,835 UART: [art] PUB.X = 3A4BC1B865BF85FCD45F23811C21D751F159F159E700B7B732597B8E3C3D7994F2967C938B0255420679C633B71B1C0B
3,190,570 UART: [art] PUB.Y = 81EE9202E172A917D08C3706E8811240EAB7E164FB3944042300F469EC76ED3FDEA8DB11F91C671C81B2C6B73BBA34C0
3,197,495 UART: [art] SIG.R = 84B9D494891BED5013B93552975631070497CDC3DD9E26F388DCFBE72364321514266477931C0270FF4B06A04C29BEB2
3,204,245 UART: [art] SIG.S = DF775958274A32F4DA5C31EE7FA2F46F93036D060DE7655E2577815D34834253F1094B0F4ECAD4492FC5CE964A7BA8D5
3,228,596 UART: Caliptra RT
3,228,847 UART: [state] CFI Enabled
3,348,485 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,191 UART: [rt]cmd =0x54514754, len=24
3,380,995 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,008 ready_for_fw is high
1,060,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,758 >>> mbox cmd response: success
2,679,758 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,417 UART:
2,741,433 UART: Running Caliptra FMC ...
2,741,841 UART:
2,741,895 UART: [state] CFI Enabled
2,752,445 UART: [fht] FMC Alias Private Key: 7
2,870,867 UART: [art] Extend RT PCRs Done
2,871,295 UART: [art] Lock RT PCRs Done
2,872,481 UART: [art] Populate DV Done
2,880,388 UART: [fht] FMC Alias Private Key: 7
2,881,350 UART: [art] Derive CDI
2,881,630 UART: [art] Store in slot 0x4
2,967,443 UART: [art] Derive Key Pair
2,967,803 UART: [art] Store priv key in slot 0x5
2,980,723 UART: [art] Derive Key Pair - Done
2,995,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,697 UART: [art] PUB.X = 0EF74100503C518CD5C7F1CFE9FB69D6A21B5DCD9B46D334FB5044B2C4047AC2F35E55BEC897618CAAACEEFF490F2C83
3,018,458 UART: [art] PUB.Y = 9645FE915322592FA811EE711663E95CEED410F1EE5343AA4B139C3BC1981DD417B8F2F8C7C341D96EF4E9455B41CAB5
3,025,416 UART: [art] SIG.R = DC9F5E35399303AF96FC9D7427CB9141DEF69D191E551B9C50F7550BD6E713300306AD924981D9309FFBA8FD29FE074F
3,032,177 UART: [art] SIG.S = 84DD18DCF199E15E3B5377B673E90BA6D718FB409835880B9843A3C029D44562811EC7497C6FE748B33FD98D84DED60B
3,055,724 UART: Caliptra RT
3,055,975 UART: [state] CFI Enabled
3,175,225 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,765 UART: [rt]cmd =0x54514754, len=24
3,207,699 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,925 UART: [kat] SHA2-256
901,865 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
916,444 UART: [kat] HMAC-384Kdf
920,996 UART: [kat] LMS
1,169,308 UART: [kat] --
1,170,153 UART: [cold-reset] ++
1,170,533 UART: [fht] FHT @ 0x50003400
1,173,085 UART: [idev] ++
1,173,253 UART: [idev] CDI.KEYID = 6
1,173,614 UART: [idev] SUBJECT.KEYID = 7
1,174,039 UART: [idev] UDS.KEYID = 0
1,174,385 ready_for_fw is high
1,174,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,072 UART: [idev] Erasing UDS.KEYID = 0
1,199,678 UART: [idev] Sha1 KeyId Algorithm
1,208,470 UART: [idev] --
1,209,683 UART: [ldev] ++
1,209,851 UART: [ldev] CDI.KEYID = 6
1,210,215 UART: [ldev] SUBJECT.KEYID = 5
1,210,642 UART: [ldev] AUTHORITY.KEYID = 7
1,211,105 UART: [ldev] FE.KEYID = 1
1,216,589 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,667 UART: [ldev] --
1,281,904 UART: [fwproc] Wait for Commands...
1,282,597 UART: [fwproc] Recv command 0x46574c44
1,283,330 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,623 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,784 >>> mbox cmd response: success
2,826,784 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,918 UART: [afmc] ++
2,828,086 UART: [afmc] CDI.KEYID = 6
2,828,449 UART: [afmc] SUBJECT.KEYID = 7
2,828,875 UART: [afmc] AUTHORITY.KEYID = 5
2,864,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,776 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,486 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,367 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,068 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,789 UART: [afmc] --
2,907,696 UART: [cold-reset] --
2,908,628 UART: [state] Locking Datavault
2,909,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,353 UART: [state] Locking ICCM
2,910,781 UART: [exit] Launching FMC @ 0x40000130
2,916,111 UART:
2,916,127 UART: Running Caliptra FMC ...
2,916,535 UART:
2,916,678 UART: [state] CFI Enabled
2,927,384 UART: [fht] FMC Alias Private Key: 7
3,046,164 UART: [art] Extend RT PCRs Done
3,046,592 UART: [art] Lock RT PCRs Done
3,047,994 UART: [art] Populate DV Done
3,056,107 UART: [fht] FMC Alias Private Key: 7
3,057,159 UART: [art] Derive CDI
3,057,439 UART: [art] Store in slot 0x4
3,143,530 UART: [art] Derive Key Pair
3,143,890 UART: [art] Store priv key in slot 0x5
3,157,306 UART: [art] Derive Key Pair - Done
3,172,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,440 UART: [art] PUB.X = 9F823C5CDA3D580BB7C3990014BEE2432A3236C956F479058A30F76C6ABFFC036846B3BFE00EC576A170825B11DE3391
3,195,180 UART: [art] PUB.Y = 4BBCA8D6A606FE8FF020AD8C81540E23A5A3B1FDA7B06BCD7CE259471A0C6918ED494F12602B9237C13DAE80DB2E26E7
3,202,139 UART: [art] SIG.R = 64F4AF7DA2F8190E78F6740838537140B0A145B11F1EDF7DA51955947027AF5B8C07DC18320DDCAA24DC063BCDEA4973
3,208,902 UART: [art] SIG.S = 0A9AAC77307946B7A301DCAA91166E6EF242CA7CE1E7FA99C08FF435BF08FD6B9120BE86B2C21026784A3A2A2A3690B9
3,232,041 UART: Caliptra RT
3,232,384 UART: [state] CFI Enabled
3,351,808 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,226 UART: [rt]cmd =0x54514754, len=24
3,383,910 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,687 ready_for_fw is high
1,059,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,491 >>> mbox cmd response: success
2,680,491 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,742,274 UART:
2,742,290 UART: Running Caliptra FMC ...
2,742,698 UART:
2,742,841 UART: [state] CFI Enabled
2,753,663 UART: [fht] FMC Alias Private Key: 7
2,872,213 UART: [art] Extend RT PCRs Done
2,872,641 UART: [art] Lock RT PCRs Done
2,874,075 UART: [art] Populate DV Done
2,882,240 UART: [fht] FMC Alias Private Key: 7
2,883,206 UART: [art] Derive CDI
2,883,486 UART: [art] Store in slot 0x4
2,969,559 UART: [art] Derive Key Pair
2,969,919 UART: [art] Store priv key in slot 0x5
2,982,969 UART: [art] Derive Key Pair - Done
2,997,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,623 UART: [art] PUB.X = 3B98D39A8354515AA51AD434A2E5FC18238AD7A8510589511989481C734BB2BFA102F6E0431BA052EFFFEF60A6D08D4F
3,020,393 UART: [art] PUB.Y = C399D9AA25B3193BFD301C1B4985596ECB0D234C9CA1AACF1131DACDCB283363671DEC338D841E97B74BCA3441428552
3,027,350 UART: [art] SIG.R = F6D64F8890D61405D73F0A80798F96D2999549026CEFEB7A839550C074594406DDB679810BBDEC00D13A86DCCCFB8DD9
3,034,089 UART: [art] SIG.S = 85A53E312D1DD78372C5ADF40F03950EC0DD642760486233AF49AD2D1BD058206EB22510DCEB108B3293682165F926C9
3,058,548 UART: Caliptra RT
3,058,891 UART: [state] CFI Enabled
3,178,539 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,163 UART: [rt]cmd =0x54514754, len=24
3,210,945 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
893,202 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,327 UART: [kat] ++
897,479 UART: [kat] sha1
901,721 UART: [kat] SHA2-256
903,661 UART: [kat] SHA2-384
906,276 UART: [kat] SHA2-512-ACC
908,177 UART: [kat] ECC-384
917,930 UART: [kat] HMAC-384Kdf
922,358 UART: [kat] LMS
1,170,686 UART: [kat] --
1,171,679 UART: [cold-reset] ++
1,172,119 UART: [fht] FHT @ 0x50003400
1,174,900 UART: [idev] ++
1,175,068 UART: [idev] CDI.KEYID = 6
1,175,428 UART: [idev] SUBJECT.KEYID = 7
1,175,852 UART: [idev] UDS.KEYID = 0
1,176,197 ready_for_fw is high
1,176,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,584 UART: [idev] Erasing UDS.KEYID = 0
1,201,239 UART: [idev] Sha1 KeyId Algorithm
1,209,473 UART: [idev] --
1,210,305 UART: [ldev] ++
1,210,473 UART: [ldev] CDI.KEYID = 6
1,210,836 UART: [ldev] SUBJECT.KEYID = 5
1,211,262 UART: [ldev] AUTHORITY.KEYID = 7
1,211,725 UART: [ldev] FE.KEYID = 1
1,216,953 UART: [ldev] Erasing FE.KEYID = 1
1,243,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,769 UART: [ldev] --
1,282,240 UART: [fwproc] Wait for Commands...
1,283,004 UART: [fwproc] Recv command 0x46574c44
1,283,732 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,972 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,142 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,531 >>> mbox cmd response: success
2,827,531 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,671 UART: [afmc] ++
2,828,839 UART: [afmc] CDI.KEYID = 6
2,829,201 UART: [afmc] SUBJECT.KEYID = 7
2,829,626 UART: [afmc] AUTHORITY.KEYID = 5
2,865,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,218 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,927 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,810 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,511 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,393 UART: [afmc] --
2,909,437 UART: [cold-reset] --
2,910,191 UART: [state] Locking Datavault
2,911,402 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,006 UART: [state] Locking ICCM
2,912,502 UART: [exit] Launching FMC @ 0x40000130
2,917,832 UART:
2,917,848 UART: Running Caliptra FMC ...
2,918,256 UART:
2,918,310 UART: [state] CFI Enabled
2,928,604 UART: [fht] FMC Alias Private Key: 7
3,048,014 UART: [art] Extend RT PCRs Done
3,048,442 UART: [art] Lock RT PCRs Done
3,050,294 UART: [art] Populate DV Done
3,058,491 UART: [fht] FMC Alias Private Key: 7
3,059,445 UART: [art] Derive CDI
3,059,725 UART: [art] Store in slot 0x4
3,145,328 UART: [art] Derive Key Pair
3,145,688 UART: [art] Store priv key in slot 0x5
3,159,198 UART: [art] Derive Key Pair - Done
3,174,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,189 UART: [art] PUB.X = 91CE01E57E38E85A928F3F1BCE8F0D0919DEC4091B81FC259E4E5C9282B4BB3F63DA03207E1529F75E2FB83AAA9E1332
3,196,956 UART: [art] PUB.Y = 4C4249E489F5E94D269F8BC2DDBD171769D89995DE89B238FBD7465EB94D0E86804CCBF9BD7C175EB0EBD96A7C41E110
3,203,917 UART: [art] SIG.R = 02587B8D4C9F6069E10174F0A4C23970998E1286462F6209B9816F988E01B7F738FBB118135F990AB28D37B252C68FAD
3,210,664 UART: [art] SIG.S = 029B677D038E480EF7727462C360BF11027E1099B1CE2770131A8356ED4DBDA26F8D22DC5A65CC981D629F995DB3B4D0
3,234,092 UART: Caliptra RT
3,234,343 UART: [state] CFI Enabled
3,354,279 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,877 UART: [rt]cmd =0x54514754, len=24
3,386,691 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,431 ready_for_fw is high
1,060,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,480 >>> mbox cmd response: success
2,677,480 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,117 UART:
2,739,133 UART: Running Caliptra FMC ...
2,739,541 UART:
2,739,595 UART: [state] CFI Enabled
2,750,071 UART: [fht] FMC Alias Private Key: 7
2,868,681 UART: [art] Extend RT PCRs Done
2,869,109 UART: [art] Lock RT PCRs Done
2,870,361 UART: [art] Populate DV Done
2,878,580 UART: [fht] FMC Alias Private Key: 7
2,879,748 UART: [art] Derive CDI
2,880,028 UART: [art] Store in slot 0x4
2,965,839 UART: [art] Derive Key Pair
2,966,199 UART: [art] Store priv key in slot 0x5
2,979,763 UART: [art] Derive Key Pair - Done
2,994,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,995 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,760 UART: [art] PUB.X = 729E5401E5D1AB3C35310096CB68A7CB200358DC20D5BFCDD6BFD95B94CD8861645AB2225F01DE6B0A8E223692AADECA
3,017,512 UART: [art] PUB.Y = C1681FD999FCCF059AEA88399D2DB572EB6DC2DA6DC6F77E90A6499CBDD596C54365D3D1429E88978FF8AADC2AD11770
3,024,477 UART: [art] SIG.R = 1EAD8114FB73EF366BB0B790E02438D71DD063B50F7C2CD1AED711469CF9A57417BF1861D6E14131E2B161D4C78F8820
3,031,250 UART: [art] SIG.S = 36041971CA92321B410BA4D6273C087D90B3375284BD4087C00EF9151A39F80299F29994CDD21E651DD9BDF21737CD04
3,054,892 UART: Caliptra RT
3,055,143 UART: [state] CFI Enabled
3,174,121 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,189 UART: [rt]cmd =0x54514754, len=24
3,206,095 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
893,389 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,514 UART: [kat] ++
897,666 UART: [kat] sha1
901,710 UART: [kat] SHA2-256
903,650 UART: [kat] SHA2-384
906,407 UART: [kat] SHA2-512-ACC
908,308 UART: [kat] ECC-384
917,929 UART: [kat] HMAC-384Kdf
922,583 UART: [kat] LMS
1,170,911 UART: [kat] --
1,171,794 UART: [cold-reset] ++
1,172,254 UART: [fht] FHT @ 0x50003400
1,175,071 UART: [idev] ++
1,175,239 UART: [idev] CDI.KEYID = 6
1,175,599 UART: [idev] SUBJECT.KEYID = 7
1,176,023 UART: [idev] UDS.KEYID = 0
1,176,368 ready_for_fw is high
1,176,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,219 UART: [idev] Erasing UDS.KEYID = 0
1,201,064 UART: [idev] Sha1 KeyId Algorithm
1,209,424 UART: [idev] --
1,210,660 UART: [ldev] ++
1,210,828 UART: [ldev] CDI.KEYID = 6
1,211,191 UART: [ldev] SUBJECT.KEYID = 5
1,211,617 UART: [ldev] AUTHORITY.KEYID = 7
1,212,080 UART: [ldev] FE.KEYID = 1
1,217,008 UART: [ldev] Erasing FE.KEYID = 1
1,243,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,856 UART: [ldev] --
1,282,329 UART: [fwproc] Wait for Commands...
1,283,063 UART: [fwproc] Recv command 0x46574c44
1,283,791 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,382 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,505 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,675 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,886 >>> mbox cmd response: success
2,828,886 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,829,940 UART: [afmc] ++
2,830,108 UART: [afmc] CDI.KEYID = 6
2,830,470 UART: [afmc] SUBJECT.KEYID = 7
2,830,895 UART: [afmc] AUTHORITY.KEYID = 5
2,866,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,581 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,290 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,173 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,874 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,896 UART: [afmc] --
2,909,948 UART: [cold-reset] --
2,910,746 UART: [state] Locking Datavault
2,912,235 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,839 UART: [state] Locking ICCM
2,913,313 UART: [exit] Launching FMC @ 0x40000130
2,918,643 UART:
2,918,659 UART: Running Caliptra FMC ...
2,919,067 UART:
2,919,210 UART: [state] CFI Enabled
2,929,786 UART: [fht] FMC Alias Private Key: 7
3,048,536 UART: [art] Extend RT PCRs Done
3,048,964 UART: [art] Lock RT PCRs Done
3,050,654 UART: [art] Populate DV Done
3,058,741 UART: [fht] FMC Alias Private Key: 7
3,059,777 UART: [art] Derive CDI
3,060,057 UART: [art] Store in slot 0x4
3,146,312 UART: [art] Derive Key Pair
3,146,672 UART: [art] Store priv key in slot 0x5
3,160,076 UART: [art] Derive Key Pair - Done
3,174,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,346 UART: [art] PUB.X = 396B2BE9EE73E69C23264945F253E2591D8BDDD2627E9615FD5B1C9EB643CEF790704A8C1F992B32AE78CF1CF18265CE
3,198,126 UART: [art] PUB.Y = 6B673322DE8BEC04228229597BA3B249F42BD0AE6373476B6C19C8778B4E195E9DF79CEAEF5312E51F1C2DD903218485
3,205,072 UART: [art] SIG.R = D6DF0AA5BC91005DC1EDB0CE0E3A369B12EE39A083E563361B622D280F5A8A5B939AC5697073F1B1BD46E4FA0BCE17D3
3,211,826 UART: [art] SIG.S = CD6C686310001E710AEB1B4391156624F13BEA907A282E798A96F963B31233DAF9AB77BB3C054D0D773FD2371E8298C2
3,235,053 UART: Caliptra RT
3,235,396 UART: [state] CFI Enabled
3,355,258 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,014 UART: [rt]cmd =0x54514754, len=24
3,387,846 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,860 ready_for_fw is high
1,059,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,251 >>> mbox cmd response: success
2,679,251 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,754 UART:
2,741,770 UART: Running Caliptra FMC ...
2,742,178 UART:
2,742,321 UART: [state] CFI Enabled
2,753,165 UART: [fht] FMC Alias Private Key: 7
2,872,045 UART: [art] Extend RT PCRs Done
2,872,473 UART: [art] Lock RT PCRs Done
2,873,865 UART: [art] Populate DV Done
2,882,256 UART: [fht] FMC Alias Private Key: 7
2,883,410 UART: [art] Derive CDI
2,883,690 UART: [art] Store in slot 0x4
2,969,279 UART: [art] Derive Key Pair
2,969,639 UART: [art] Store priv key in slot 0x5
2,983,371 UART: [art] Derive Key Pair - Done
2,998,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,261 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,026 UART: [art] PUB.X = F2FB8D2974CC42D25E84A471C641BCFEB88C1648C06EE8A869FF82E06B2A5E2E70D937D9AE12883FBADA52F0EEABFD8C
3,020,822 UART: [art] PUB.Y = 8E26BC8F4E4E94D5A4659FDC90A8D5AE0BE42CAFAFB2A9B288338A2AB14E145AAB7FF55D093AB982F8962D024BF1E3C5
3,027,787 UART: [art] SIG.R = D67621BBCC56513B03C9BC94F70D7AA4FAF3FFB3447892D12484A7CD7D89195312379DD95867DC984643348D315491DA
3,034,551 UART: [art] SIG.S = 3A7AA77DE966D38AEB555DDA5BA82383690C1D84DD4FE7A3E9477677B6AC1364E398087C0767330AFCA5B7219F81C456
3,058,353 UART: Caliptra RT
3,058,696 UART: [state] CFI Enabled
3,178,405 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,087 UART: [rt]cmd =0x54514754, len=24
3,211,111 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,065 UART:
192,937 UART: Running Caliptra ROM ...
194,086 UART:
194,244 UART: [state] CFI Enabled
285,259 UART: [state] LifecycleState = Unprovisioned
287,556 UART: [state] DebugLocked = No
289,351 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
293,802 UART: [kat] SHA2-256
463,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
473,504 UART: [kat] ++
473,995 UART: [kat] sha1
484,017 UART: [kat] SHA2-256
486,763 UART: [kat] SHA2-384
491,793 UART: [kat] SHA2-512-ACC
494,163 UART: [kat] ECC-384
2,788,459 UART: [kat] HMAC-384Kdf
2,805,811 UART: [kat] LMS
3,996,138 UART: [kat] --
3,999,627 UART: [cold-reset] ++
4,001,493 UART: [fht] Storing FHT @ 0x50003400
4,013,188 UART: [idev] ++
4,013,823 UART: [idev] CDI.KEYID = 6
4,014,766 UART: [idev] SUBJECT.KEYID = 7
4,016,016 UART: [idev] UDS.KEYID = 0
4,017,152 ready_for_fw is high
4,017,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,166,600 UART: [idev] Erasing UDS.KEYID = 0
7,348,934 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,477 UART: [idev] --
7,373,386 UART: [ldev] ++
7,374,022 UART: [ldev] CDI.KEYID = 6
7,374,910 UART: [ldev] SUBJECT.KEYID = 5
7,376,181 UART: [ldev] AUTHORITY.KEYID = 7
7,377,411 UART: [ldev] FE.KEYID = 1
7,406,227 UART: [ldev] Erasing FE.KEYID = 1
10,740,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,550 UART: [ldev] --
13,119,573 UART: [fwproc] Waiting for Commands...
13,121,780 UART: [fwproc] Received command 0x46574c44
13,123,965 UART: [fwproc] Received Image of size 118548 bytes
17,230,596 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,308,561 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,719 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,710,849 >>> mbox cmd response: success
17,712,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,714,924 UART: [afmc] ++
17,715,570 UART: [afmc] CDI.KEYID = 6
17,716,451 UART: [afmc] SUBJECT.KEYID = 7
17,717,722 UART: [afmc] AUTHORITY.KEYID = 5
21,076,672 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,374,818 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,377,077 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,391,534 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,406,237 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,420,698 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,442,092 UART: [afmc] --
23,446,772 UART: [cold-reset] --
23,451,381 UART: [state] Locking Datavault
23,456,900 UART: [state] Locking PCR0, PCR1 and PCR31
23,458,607 UART: [state] Locking ICCM
23,460,033 UART: [exit] Launching FMC @ 0x40000130
23,468,429 UART:
23,468,661 UART: Running Caliptra FMC ...
23,469,761 UART:
23,469,918 UART: [state] CFI Enabled
23,533,915 UART: [fht] FMC Alias Private Key: 7
25,874,219 UART: [art] Extend RT PCRs Done
25,875,441 UART: [art] Lock RT PCRs Done
25,877,151 UART: [art] Populate DV Done
25,882,720 UART: [fht] FMC Alias Private Key: 7
25,884,363 UART: [art] Derive CDI
25,885,097 UART: [art] Store in slot 0x4
25,942,489 UART: [art] Derive Key Pair
25,943,530 UART: [art] Store priv key in slot 0x5
29,236,047 UART: [art] Derive Key Pair - Done
29,248,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,153 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,660 UART: [art] PUB.X = 53851506CCB84B7508B650D3B0B64CFD694236F7590B73B452D5CA84E8DD227E299DB56BEC075007B853147A53903844
31,545,925 UART: [art] PUB.Y = 607649B8DDB26F03DE27A01FA20E1A3D731A83253B1881DE5BF014A2E2FB16A8826205A0326E62C47BA4DB3A5D2F9C37
31,553,172 UART: [art] SIG.R = B75AE1265296E7CBE15A98A6AF06F8AC35C61F673C5875B69C861927A759687E8C4E2D5568A70F8F7F7B3B6B854EFF36
31,560,576 UART: [art] SIG.S = 16DB31D484B2E0F06824D1C35F60A1EFD7EC9D80A3258971E9108267C17D50A04B1BEF6ED005E158A03922D208F34A3C
32,866,276 UART: Caliptra RT
32,867,011 UART: [state] CFI Enabled
33,043,129 UART: [rt] RT listening for mailbox commands...
33,075,632 UART: [rt]cmd =0x44504543, len=96
33,130,668 >>> mbox cmd response data (56 bytes)
33,132,145 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,162,278 UART: [rt]cmd =0x54514754, len=24
33,164,741 >>> mbox cmd response: failed
33,165,235 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,195,066 UART: [rt]cmd =0x54514754, len=24
33,197,805 >>> mbox cmd response data (8 bytes)
33,198,393 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,229,034 UART: [rt]cmd =0x44504543, len=96
33,279,816 >>> mbox cmd response data (56 bytes)
33,280,534 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,310,301 UART: [rt]cmd =0x47544744, len=8
33,313,499 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,785,859 ready_for_fw is high
3,786,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,962,145 >>> mbox cmd response: success
17,963,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,652,036 UART:
23,652,433 UART: Running Caliptra FMC ...
23,653,542 UART:
23,653,713 UART: [state] CFI Enabled
23,719,637 UART: [fht] FMC Alias Private Key: 7
26,059,754 UART: [art] Extend RT PCRs Done
26,061,142 UART: [art] Lock RT PCRs Done
26,062,691 UART: [art] Populate DV Done
26,068,056 UART: [fht] FMC Alias Private Key: 7
26,069,600 UART: [art] Derive CDI
26,070,415 UART: [art] Store in slot 0x4
26,127,220 UART: [art] Derive Key Pair
26,128,220 UART: [art] Store priv key in slot 0x5
29,419,936 UART: [art] Derive Key Pair - Done
29,432,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,721,735 UART: [art] Erasing AUTHORITY.KEYID = 7
31,723,263 UART: [art] PUB.X = 23515E09CD02CC65B19FE8B5459B31C2B6F2724BD39B6C0B130A0094FDA2F8A975626883A1917935511FAB70CC610ACB
31,730,467 UART: [art] PUB.Y = BBE49E00102E61042FDC324B200C236CFF9ADF1B49E78CB0053AEBABD2D9058DC30C6907D3AF815D94D0867EEC45AAD2
31,737,737 UART: [art] SIG.R = 5905EC187884A165CB7456F12DF28E14D29BF372DBBF40B59EB9B5B0DAE2D794164C1996F9788DBD6F4C917C0B3EA8F4
31,745,211 UART: [art] SIG.S = A82106D957438E6358EED9EC417382090F90B370F7F9A0FF768DF5613B84FC00F3DD2CB0AF1317653B39B3722A4EF081
33,050,194 UART: Caliptra RT
33,050,903 UART: [state] CFI Enabled
33,226,459 UART: [rt] RT listening for mailbox commands...
33,258,305 UART: [rt]cmd =0x44504543, len=96
33,313,066 >>> mbox cmd response data (56 bytes)
33,314,369 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,344,520 UART: [rt]cmd =0x54514754, len=24
33,346,902 >>> mbox cmd response: failed
33,347,411 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,377,368 UART: [rt]cmd =0x54514754, len=24
33,380,120 >>> mbox cmd response data (8 bytes)
33,380,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,411,142 UART: [rt]cmd =0x44504543, len=96
33,463,059 >>> mbox cmd response data (56 bytes)
33,463,801 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,493,494 UART: [rt]cmd =0x47544744, len=8
33,496,291 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,423 UART:
192,939 UART: Running Caliptra ROM ...
194,062 UART:
603,838 UART: [state] CFI Enabled
619,512 UART: [state] LifecycleState = Unprovisioned
621,447 UART: [state] DebugLocked = No
623,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,904 UART: [kat] SHA2-256
797,661 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,190 UART: [kat] ++
808,710 UART: [kat] sha1
819,150 UART: [kat] SHA2-256
821,872 UART: [kat] SHA2-384
826,504 UART: [kat] SHA2-512-ACC
828,860 UART: [kat] ECC-384
3,113,146 UART: [kat] HMAC-384Kdf
3,125,888 UART: [kat] LMS
4,315,946 UART: [kat] --
4,321,539 UART: [cold-reset] ++
4,322,537 UART: [fht] Storing FHT @ 0x50003400
4,334,461 UART: [idev] ++
4,335,015 UART: [idev] CDI.KEYID = 6
4,335,965 UART: [idev] SUBJECT.KEYID = 7
4,337,204 UART: [idev] UDS.KEYID = 0
4,338,181 ready_for_fw is high
4,338,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,330 UART: [idev] Erasing UDS.KEYID = 0
7,621,020 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,822 UART: [idev] --
7,646,893 UART: [ldev] ++
7,647,463 UART: [ldev] CDI.KEYID = 6
7,648,446 UART: [ldev] SUBJECT.KEYID = 5
7,649,661 UART: [ldev] AUTHORITY.KEYID = 7
7,650,888 UART: [ldev] FE.KEYID = 1
7,663,634 UART: [ldev] Erasing FE.KEYID = 1
10,953,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,846 UART: [ldev] --
13,314,810 UART: [fwproc] Waiting for Commands...
13,317,984 UART: [fwproc] Received command 0x46574c44
13,320,219 UART: [fwproc] Received Image of size 118548 bytes
17,420,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,153 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,360 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,870 >>> mbox cmd response: success
17,901,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,905,086 UART: [afmc] ++
17,905,730 UART: [afmc] CDI.KEYID = 6
17,906,632 UART: [afmc] SUBJECT.KEYID = 7
17,907,884 UART: [afmc] AUTHORITY.KEYID = 5
21,222,747 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,219 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,474 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,909 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,609 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,066 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,880 UART: [afmc] --
23,587,790 UART: [cold-reset] --
23,591,596 UART: [state] Locking Datavault
23,597,376 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,139 UART: [state] Locking ICCM
23,600,315 UART: [exit] Launching FMC @ 0x40000130
23,608,709 UART:
23,608,943 UART: Running Caliptra FMC ...
23,610,038 UART:
23,610,195 UART: [state] CFI Enabled
23,618,453 UART: [fht] FMC Alias Private Key: 7
25,958,448 UART: [art] Extend RT PCRs Done
25,959,670 UART: [art] Lock RT PCRs Done
25,961,183 UART: [art] Populate DV Done
25,966,535 UART: [fht] FMC Alias Private Key: 7
25,968,173 UART: [art] Derive CDI
25,968,981 UART: [art] Store in slot 0x4
26,011,891 UART: [art] Derive Key Pair
26,012,889 UART: [art] Store priv key in slot 0x5
29,254,493 UART: [art] Derive Key Pair - Done
29,267,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,668 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,175 UART: [art] PUB.X = 0E3B713BC852290B334A053FE845A388950B37D4C02425452E7A68A95950C786CFCC31422283229CD18C3427D07C3487
31,556,453 UART: [art] PUB.Y = 1459FB42E1EBCB7603E048D431B5465C4E93A00549E826A318BAF6978151EE8B59535A05CDD44ABB1C9BAA8B6FD2B3EE
31,563,703 UART: [art] SIG.R = 5EB93D394DF0FD618590CBD27B6B390AF5938229640ACF735B7AE1D1E3EFDE46CF4E05BDA474E1B0C530FEE5EEF06805
31,571,096 UART: [art] SIG.S = 378162A4D0B8DCF579B1296C411D3C597D25086544D2FC2E2A2E8E73DC50023AC2F2FE6230F7D646F4D39E546316906E
32,876,344 UART: Caliptra RT
32,877,050 UART: [state] CFI Enabled
33,010,544 UART: [rt] RT listening for mailbox commands...
33,042,662 UART: [rt]cmd =0x44504543, len=96
33,080,223 >>> mbox cmd response data (56 bytes)
33,081,600 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,111,578 UART: [rt]cmd =0x54514754, len=24
33,113,875 >>> mbox cmd response: failed
33,114,287 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,144,015 UART: [rt]cmd =0x54514754, len=24
33,146,576 >>> mbox cmd response data (8 bytes)
33,147,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,177,599 UART: [rt]cmd =0x44504543, len=96
33,215,603 >>> mbox cmd response data (56 bytes)
33,216,295 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,246,131 UART: [rt]cmd =0x47544744, len=8
33,249,048 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
4,124,343 ready_for_fw is high
4,124,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,400 >>> mbox cmd response: success
18,160,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,804,097 UART:
23,804,497 UART: Running Caliptra FMC ...
23,805,656 UART:
23,805,809 UART: [state] CFI Enabled
23,813,876 UART: [fht] FMC Alias Private Key: 7
26,153,999 UART: [art] Extend RT PCRs Done
26,155,257 UART: [art] Lock RT PCRs Done
26,156,834 UART: [art] Populate DV Done
26,162,266 UART: [fht] FMC Alias Private Key: 7
26,163,751 UART: [art] Derive CDI
26,164,509 UART: [art] Store in slot 0x4
26,206,852 UART: [art] Derive Key Pair
26,207,920 UART: [art] Store priv key in slot 0x5
29,449,860 UART: [art] Derive Key Pair - Done
29,462,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,250 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,762 UART: [art] PUB.X = 2CFBFCC212B12F164D94844C292D368E7E2F1A95C3061DB3D5AA35DD19CD9BFD518168A5A17FEC8B227A44F7D56D57E1
31,752,002 UART: [art] PUB.Y = 98EA24A6D4E4E82A64BB18A734CEF6DEFFF24163D8F363E124728A108049A156BB3B80CD5484873D9B10E09B40162784
31,759,257 UART: [art] SIG.R = 3EEAA5FA60E7EE05083B8515C1921D02DBFA3688A35859899ECB7701D189A0981B57C4BD9D5CCD68218E4899E7A2F1E9
31,766,645 UART: [art] SIG.S = 9331906263C9753866DE299B345A0B1C57A871DE66F33EB8575AF18FB122A5978BA1E236ED37C759805F614374717876
33,072,085 UART: Caliptra RT
33,072,801 UART: [state] CFI Enabled
33,206,331 UART: [rt] RT listening for mailbox commands...
33,238,204 UART: [rt]cmd =0x44504543, len=96
33,275,623 >>> mbox cmd response data (56 bytes)
33,276,834 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,306,822 UART: [rt]cmd =0x54514754, len=24
33,309,102 >>> mbox cmd response: failed
33,309,607 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,339,342 UART: [rt]cmd =0x54514754, len=24
33,342,037 >>> mbox cmd response data (8 bytes)
33,342,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,373,296 UART: [rt]cmd =0x44504543, len=96
33,410,920 >>> mbox cmd response data (56 bytes)
33,411,619 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,441,385 UART: [rt]cmd =0x47544744, len=8
33,444,375 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,145 UART:
192,500 UART: Running Caliptra ROM ...
193,591 UART:
193,730 UART: [state] CFI Enabled
266,127 UART: [state] LifecycleState = Unprovisioned
268,075 UART: [state] DebugLocked = No
270,807 UART: [state] WD Timer not started. Device not locked for debugging
274,007 UART: [kat] SHA2-256
453,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,426 UART: [kat] ++
464,868 UART: [kat] sha1
475,595 UART: [kat] SHA2-256
478,314 UART: [kat] SHA2-384
484,301 UART: [kat] SHA2-512-ACC
486,669 UART: [kat] ECC-384
2,946,654 UART: [kat] HMAC-384Kdf
2,969,965 UART: [kat] LMS
3,446,438 UART: [kat] --
3,449,510 UART: [cold-reset] ++
3,450,516 UART: [fht] FHT @ 0x50003400
3,461,327 UART: [idev] ++
3,461,925 UART: [idev] CDI.KEYID = 6
3,462,813 UART: [idev] SUBJECT.KEYID = 7
3,464,124 UART: [idev] UDS.KEYID = 0
3,465,046 ready_for_fw is high
3,465,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,614,283 UART: [idev] Erasing UDS.KEYID = 0
5,985,786 UART: [idev] Sha1 KeyId Algorithm
6,009,700 UART: [idev] --
6,013,699 UART: [ldev] ++
6,014,312 UART: [ldev] CDI.KEYID = 6
6,015,228 UART: [ldev] SUBJECT.KEYID = 5
6,016,390 UART: [ldev] AUTHORITY.KEYID = 7
6,017,672 UART: [ldev] FE.KEYID = 1
6,056,354 UART: [ldev] Erasing FE.KEYID = 1
8,565,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,339 UART: [ldev] --
10,375,676 UART: [fwproc] Wait for Commands...
10,378,463 UART: [fwproc] Recv command 0x46574c44
10,380,437 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,418 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,431 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,336,189 >>> mbox cmd response: success
14,337,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,339,826 UART: [afmc] ++
14,340,403 UART: [afmc] CDI.KEYID = 6
14,341,367 UART: [afmc] SUBJECT.KEYID = 7
14,342,575 UART: [afmc] AUTHORITY.KEYID = 5
16,880,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,932 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,775 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,839 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,411 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,260 UART: [afmc] --
18,695,962 UART: [cold-reset] --
18,699,172 UART: [state] Locking Datavault
18,704,792 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,539 UART: [state] Locking ICCM
18,708,192 UART: [exit] Launching FMC @ 0x40000130
18,716,633 UART:
18,716,865 UART: Running Caliptra FMC ...
18,717,959 UART:
18,718,114 UART: [state] CFI Enabled
18,774,585 UART: [fht] FMC Alias Private Key: 7
20,541,123 UART: [art] Extend RT PCRs Done
20,542,347 UART: [art] Lock RT PCRs Done
20,544,133 UART: [art] Populate DV Done
20,549,484 UART: [fht] FMC Alias Private Key: 7
20,551,015 UART: [art] Derive CDI
20,551,830 UART: [art] Store in slot 0x4
20,606,899 UART: [art] Derive Key Pair
20,607,938 UART: [art] Store priv key in slot 0x5
23,070,714 UART: [art] Derive Key Pair - Done
23,083,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,121 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,627 UART: [art] PUB.X = 1170E76E080D8505D561C2884AD3CB968EBC1DCF525E8687C628FA39AFB528903F21123295F94D602C9FDE7E4D506908
24,804,873 UART: [art] PUB.Y = 7BEB1F4E76BB15A3FFA8538CD077E0E84A4257ACDC400D0B00DBD6EB0D76B7B298B0FB5F8F160B29F838A6CC282C07AE
24,812,152 UART: [art] SIG.R = 63CAA0ED8E700F849C156B820738EB3D3BDB9CBC70BAA155E9000E099ADBF28F8B16F0C7D3E5C725B6821F2CECD19A0A
24,819,556 UART: [art] SIG.S = 23458293797FE8674691A0D253085858143F51090BD8D544590135A68208D784CA4E0F6FE8DFF85279063119DA54E072
25,798,999 UART: Caliptra RT
25,799,699 UART: [state] CFI Enabled
25,979,462 UART: [rt] RT listening for mailbox commands...
26,011,402 UART: [rt]cmd =0x44504543, len=96
26,066,834 >>> mbox cmd response data (56 bytes)
26,068,145 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,097,979 UART: [rt]cmd =0x54514754, len=24
26,100,378 >>> mbox cmd response: failed
26,100,799 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,130,590 UART: [rt]cmd =0x54514754, len=24
26,133,236 >>> mbox cmd response data (8 bytes)
26,133,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,164,199 UART: [rt]cmd =0x44504543, len=96
26,215,470 >>> mbox cmd response data (56 bytes)
26,216,205 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,245,922 UART: [rt]cmd =0x47544744, len=8
26,248,923 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,440,351 ready_for_fw is high
3,440,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,218,809 >>> mbox cmd response: success
14,220,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,515,687 UART:
18,516,068 UART: Running Caliptra FMC ...
18,517,209 UART:
18,517,365 UART: [state] CFI Enabled
18,581,105 UART: [fht] FMC Alias Private Key: 7
20,347,666 UART: [art] Extend RT PCRs Done
20,348,886 UART: [art] Lock RT PCRs Done
20,350,354 UART: [art] Populate DV Done
20,355,829 UART: [fht] FMC Alias Private Key: 7
20,357,488 UART: [art] Derive CDI
20,358,228 UART: [art] Store in slot 0x4
20,413,264 UART: [art] Derive Key Pair
20,414,307 UART: [art] Store priv key in slot 0x5
22,876,748 UART: [art] Derive Key Pair - Done
22,889,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,411 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,914 UART: [art] PUB.X = 3C6F5AF78FA8B0295371ED8EB035B81AE0A1526996B8C6109B78E7AAD025C2DCD5BA926404A843DCDBB77E659F7F257C
24,611,226 UART: [art] PUB.Y = 5C53A3D9ACD9A70DAB68F17667BA4AFB9556136CE35C037316C1653AF6AE599BEF6B54FBF6C97B58BC07BB83833A01AE
24,618,486 UART: [art] SIG.R = C5352151478BE80B9529DA6232DE61F7ECB3C60AF91D46B1396578B0845DCD14C69717D3770ACB721F37E5A2D1C26E94
24,625,874 UART: [art] SIG.S = 4E9FB9AC2CBD1F36DA4067D2FE648031F05346DF9840191B4EB35CB0E05E66015371F06C815880EE783280C19646F002
25,604,473 UART: Caliptra RT
25,605,193 UART: [state] CFI Enabled
25,785,782 UART: [rt] RT listening for mailbox commands...
25,817,828 UART: [rt]cmd =0x44504543, len=96
25,872,555 >>> mbox cmd response data (56 bytes)
25,873,900 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,903,834 UART: [rt]cmd =0x54514754, len=24
25,906,065 >>> mbox cmd response: failed
25,906,493 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,936,606 UART: [rt]cmd =0x54514754, len=24
25,939,521 >>> mbox cmd response data (8 bytes)
25,939,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,970,629 UART: [rt]cmd =0x44504543, len=96
26,022,671 >>> mbox cmd response data (56 bytes)
26,023,376 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,052,941 UART: [rt]cmd =0x47544744, len=8
26,056,140 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,598 UART:
192,959 UART: Running Caliptra ROM ...
194,155 UART:
603,933 UART: [state] CFI Enabled
616,249 UART: [state] LifecycleState = Unprovisioned
618,123 UART: [state] DebugLocked = No
619,785 UART: [state] WD Timer not started. Device not locked for debugging
624,120 UART: [kat] SHA2-256
803,800 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,528 UART: [kat] ++
815,238 UART: [kat] sha1
825,697 UART: [kat] SHA2-256
828,430 UART: [kat] SHA2-384
834,279 UART: [kat] SHA2-512-ACC
836,649 UART: [kat] ECC-384
3,281,449 UART: [kat] HMAC-384Kdf
3,294,196 UART: [kat] LMS
3,770,651 UART: [kat] --
3,773,657 UART: [cold-reset] ++
3,775,678 UART: [fht] FHT @ 0x50003400
3,787,759 UART: [idev] ++
3,788,342 UART: [idev] CDI.KEYID = 6
3,789,329 UART: [idev] SUBJECT.KEYID = 7
3,790,594 UART: [idev] UDS.KEYID = 0
3,791,527 ready_for_fw is high
3,791,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,025 UART: [idev] Erasing UDS.KEYID = 0
6,266,460 UART: [idev] Sha1 KeyId Algorithm
6,290,008 UART: [idev] --
6,296,007 UART: [ldev] ++
6,296,585 UART: [ldev] CDI.KEYID = 6
6,297,495 UART: [ldev] SUBJECT.KEYID = 5
6,298,707 UART: [ldev] AUTHORITY.KEYID = 7
6,299,939 UART: [ldev] FE.KEYID = 1
6,310,746 UART: [ldev] Erasing FE.KEYID = 1
8,790,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,662 UART: [ldev] --
10,582,122 UART: [fwproc] Wait for Commands...
10,585,141 UART: [fwproc] Recv command 0x46574c44
10,587,178 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,139,485 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,212,495 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,540,708 >>> mbox cmd response: success
14,541,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,543,995 UART: [afmc] ++
14,544,638 UART: [afmc] CDI.KEYID = 6
14,545,526 UART: [afmc] SUBJECT.KEYID = 7
14,546,744 UART: [afmc] AUTHORITY.KEYID = 5
17,050,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,774,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,776,542 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,792,363 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,808,434 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,823,997 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,848,694 UART: [afmc] --
18,851,968 UART: [cold-reset] --
18,855,288 UART: [state] Locking Datavault
18,859,885 UART: [state] Locking PCR0, PCR1 and PCR31
18,861,584 UART: [state] Locking ICCM
18,864,138 UART: [exit] Launching FMC @ 0x40000130
18,872,586 UART:
18,872,822 UART: Running Caliptra FMC ...
18,873,846 UART:
18,873,993 UART: [state] CFI Enabled
18,881,986 UART: [fht] FMC Alias Private Key: 7
20,648,335 UART: [art] Extend RT PCRs Done
20,649,572 UART: [art] Lock RT PCRs Done
20,651,203 UART: [art] Populate DV Done
20,656,731 UART: [fht] FMC Alias Private Key: 7
20,658,360 UART: [art] Derive CDI
20,659,182 UART: [art] Store in slot 0x4
20,701,989 UART: [art] Derive Key Pair
20,702,992 UART: [art] Store priv key in slot 0x5
23,130,345 UART: [art] Derive Key Pair - Done
23,143,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,850,054 UART: [art] Erasing AUTHORITY.KEYID = 7
24,851,566 UART: [art] PUB.X = 258AE691A2D28EA62FAE5C3E8F18937CBE7E7F140326E8A0C74A128F1CE6F5AE56A50DDFC8AA4E1D5ACAD9633E177A56
24,858,866 UART: [art] PUB.Y = 90955AC5C35A982D2B7D70907BA968E4FF697467B9BC21A02243D60980A57EA0796063FFA72ECFDA6923D32BEC7C36B4
24,866,093 UART: [art] SIG.R = B8B4CBADC8EE1CF79E057E620683452929EDAAE501F9B1846DFB67B063E4D1F6CEEDE7985AE0282D8ACD4FE55171BED5
24,873,537 UART: [art] SIG.S = 19D640A58E24CAB15F2D81799FF28EFE8E97CBA99996923D419291A7C33219780B737A1E83A5BA6DAA8D7D92B74D3201
25,852,661 UART: Caliptra RT
25,853,362 UART: [state] CFI Enabled
25,986,559 UART: [rt] RT listening for mailbox commands...
26,018,553 UART: [rt]cmd =0x44504543, len=96
26,056,977 >>> mbox cmd response data (56 bytes)
26,058,313 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,088,178 UART: [rt]cmd =0x54514754, len=24
26,090,581 >>> mbox cmd response: failed
26,091,064 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,120,996 UART: [rt]cmd =0x54514754, len=24
26,123,455 >>> mbox cmd response data (8 bytes)
26,124,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,154,618 UART: [rt]cmd =0x44504543, len=96
26,192,162 >>> mbox cmd response data (56 bytes)
26,192,886 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,222,764 UART: [rt]cmd =0x47544744, len=8
26,225,749 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
3,775,868 ready_for_fw is high
3,776,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,426,580 >>> mbox cmd response: success
14,427,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,681,394 UART:
18,681,763 UART: Running Caliptra FMC ...
18,682,898 UART:
18,683,060 UART: [state] CFI Enabled
18,691,227 UART: [fht] FMC Alias Private Key: 7
20,457,174 UART: [art] Extend RT PCRs Done
20,458,425 UART: [art] Lock RT PCRs Done
20,459,919 UART: [art] Populate DV Done
20,465,345 UART: [fht] FMC Alias Private Key: 7
20,466,985 UART: [art] Derive CDI
20,467,734 UART: [art] Store in slot 0x4
20,510,434 UART: [art] Derive Key Pair
20,511,436 UART: [art] Store priv key in slot 0x5
22,938,089 UART: [art] Derive Key Pair - Done
22,950,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,657,431 UART: [art] Erasing AUTHORITY.KEYID = 7
24,658,933 UART: [art] PUB.X = F805D69960402E1E8750EFD983327C1D47DA191C1316612F61DC652FB4308A44AC6B08D058999D1E4B29EFDEB893ED69
24,666,191 UART: [art] PUB.Y = 0CEDBED3E9D99464F6D26C55EB256FC7095DE409212B7CD888A5A0A66FEBC65C5977BA9B15D9A2862E4B48CE59DE6142
24,673,459 UART: [art] SIG.R = A2C81C38652293DF81AA9D0391BFF23F9BC645FEDA3D82B2E0AFB18673D4E55F32703F886A7B4F3BE72C09707DC3902D
24,680,868 UART: [art] SIG.S = 982F2B5B68AB204F18FF0401E934ADF8423134CF28F9FD6AAC7EC4DDF19C096AAA61FDAC7F8CC0A80CDBB9F5C53B6D1C
25,660,152 UART: Caliptra RT
25,660,861 UART: [state] CFI Enabled
25,793,582 UART: [rt] RT listening for mailbox commands...
25,825,850 UART: [rt]cmd =0x44504543, len=96
25,862,705 >>> mbox cmd response data (56 bytes)
25,864,036 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,894,278 UART: [rt]cmd =0x54514754, len=24
25,896,907 >>> mbox cmd response: failed
25,897,398 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,927,094 UART: [rt]cmd =0x54514754, len=24
25,929,554 >>> mbox cmd response data (8 bytes)
25,930,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,960,386 UART: [rt]cmd =0x44504543, len=96
25,998,104 >>> mbox cmd response data (56 bytes)
25,998,836 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,028,663 UART: [rt]cmd =0x47544744, len=8
26,031,464 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,067 UART:
192,442 UART: Running Caliptra ROM ...
193,613 UART:
193,771 UART: [state] CFI Enabled
264,863 UART: [state] LifecycleState = Unprovisioned
267,196 UART: [state] DebugLocked = No
269,576 UART: [state] WD Timer not started. Device not locked for debugging
274,884 UART: [kat] SHA2-256
464,800 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,563 UART: [kat] ++
476,058 UART: [kat] sha1
486,793 UART: [kat] SHA2-256
489,803 UART: [kat] SHA2-384
495,649 UART: [kat] SHA2-512-ACC
498,224 UART: [kat] ECC-384
2,950,249 UART: [kat] HMAC-384Kdf
2,972,648 UART: [kat] LMS
3,504,472 UART: [kat] --
3,509,340 UART: [cold-reset] ++
3,511,127 UART: [fht] FHT @ 0x50003400
3,522,246 UART: [idev] ++
3,522,946 UART: [idev] CDI.KEYID = 6
3,523,854 UART: [idev] SUBJECT.KEYID = 7
3,525,091 UART: [idev] UDS.KEYID = 0
3,526,016 ready_for_fw is high
3,526,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,303 UART: [idev] Erasing UDS.KEYID = 0
6,033,750 UART: [idev] Sha1 KeyId Algorithm
6,056,433 UART: [idev] --
6,061,205 UART: [ldev] ++
6,061,889 UART: [ldev] CDI.KEYID = 6
6,062,800 UART: [ldev] SUBJECT.KEYID = 5
6,063,958 UART: [ldev] AUTHORITY.KEYID = 7
6,065,188 UART: [ldev] FE.KEYID = 1
6,101,533 UART: [ldev] Erasing FE.KEYID = 1
8,610,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,268 UART: [ldev] --
10,416,876 UART: [fwproc] Wait for Commands...
10,418,589 UART: [fwproc] Recv command 0x46574c44
10,420,893 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,539 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,158 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,403 >>> mbox cmd response: success
14,682,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,685,268 UART: [afmc] ++
14,685,958 UART: [afmc] CDI.KEYID = 6
14,687,193 UART: [afmc] SUBJECT.KEYID = 7
14,688,629 UART: [afmc] AUTHORITY.KEYID = 5
17,214,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,940,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,807 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,957,917 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,973,090 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,987,966 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,012,903 UART: [afmc] --
19,015,597 UART: [cold-reset] --
19,019,517 UART: [state] Locking Datavault
19,025,574 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,706 UART: [state] Locking ICCM
19,029,025 UART: [exit] Launching FMC @ 0x40000130
19,037,696 UART:
19,037,936 UART: Running Caliptra FMC ...
19,039,039 UART:
19,039,198 UART: [state] CFI Enabled
19,098,996 UART: [fht] FMC Alias Private Key: 7
20,865,713 UART: [art] Extend RT PCRs Done
20,866,933 UART: [art] Lock RT PCRs Done
20,868,798 UART: [art] Populate DV Done
20,874,116 UART: [fht] FMC Alias Private Key: 7
20,875,758 UART: [art] Derive CDI
20,876,494 UART: [art] Store in slot 0x4
20,931,777 UART: [art] Derive Key Pair
20,932,817 UART: [art] Store priv key in slot 0x5
23,395,484 UART: [art] Derive Key Pair - Done
23,408,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,121,643 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,152 UART: [art] PUB.X = 9D43B75B636D63BDEDF1E3A8EF57A9C26683AC81E018E7E319BF9D3569C59C629168907263AD4D6EFCFE5770598D545C
25,130,364 UART: [art] PUB.Y = 943C521F043D943CCF145D848C1C8E8CEC3CB892C0AA880837C795681AD0F00667E0350BB7AB37C86C92F8EAB803214D
25,137,673 UART: [art] SIG.R = 97DE23CFDDD45552FD21835B1DB91D30D273C42B716D57597F2E5BECA469AE181CE1063443C03EC53B7949F9BD633472
25,145,043 UART: [art] SIG.S = C930F4B746ED5C08BF5EF8F18E5B7553FCEFAA9593E9C2E89397C18A371D4ABD3F1050A76CC912734774D56D46160452
26,124,259 UART: Caliptra RT
26,124,949 UART: [state] CFI Enabled
26,305,280 UART: [rt] RT listening for mailbox commands...
26,337,796 UART: [rt]cmd =0x44504543, len=96
26,393,436 >>> mbox cmd response data (56 bytes)
26,394,865 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,424,780 UART: [rt]cmd =0x54514754, len=24
26,427,079 >>> mbox cmd response: failed
26,427,572 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,457,333 UART: [rt]cmd =0x54514754, len=24
26,460,067 >>> mbox cmd response data (8 bytes)
26,460,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,491,086 UART: [rt]cmd =0x44504543, len=96
26,542,556 >>> mbox cmd response data (56 bytes)
26,543,283 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,573,104 UART: [rt]cmd =0x47544744, len=8
26,576,143 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,839 writing to cptra_bootfsm_go
3,438,962 ready_for_fw is high
3,439,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,824 >>> mbox cmd response: success
14,824,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,133,782 UART:
19,134,171 UART: Running Caliptra FMC ...
19,135,317 UART:
19,135,472 UART: [state] CFI Enabled
19,201,426 UART: [fht] FMC Alias Private Key: 7
20,988,967 UART: [art] Extend RT PCRs Done
20,990,198 UART: [art] Lock RT PCRs Done
20,991,741 UART: [art] Populate DV Done
20,997,058 UART: [fht] FMC Alias Private Key: 7
20,998,655 UART: [art] Derive CDI
20,999,467 UART: [art] Store in slot 0x4
21,056,208 UART: [art] Derive Key Pair
21,057,211 UART: [art] Store priv key in slot 0x5
23,519,548 UART: [art] Derive Key Pair - Done
23,532,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,246,125 UART: [art] Erasing AUTHORITY.KEYID = 7
25,247,636 UART: [art] PUB.X = 3A132947207CE02F299B3390962A60F61051D3D233B1D43DAF292FE656255DB6194E261D0F7C11F2859CD0F7D724981A
25,254,895 UART: [art] PUB.Y = 666866CBF4EC0E1E6CAB0CA00F76690ECC7D339A30D9AEA15A6CA5F4F1EF0DC42E86510624346D316E6C2F5A6E8F7859
25,262,157 UART: [art] SIG.R = 6E0341B78ACF5558C8999FB88A836D6E43DEA786ADAC03926444FDAC719152C2F93490BC68A2C71A74BAFCC277C88460
25,269,573 UART: [art] SIG.S = 48E57A49A1008B824F2409CF7D1F1B2C52C00A03B0BDC0D7E0801AC19AFA8C47E99327ABDABF9CCC7FB569D2C11BD27C
26,248,425 UART: Caliptra RT
26,249,141 UART: [state] CFI Enabled
26,429,454 UART: [rt] RT listening for mailbox commands...
26,461,519 UART: [rt]cmd =0x44504543, len=96
26,517,020 >>> mbox cmd response data (56 bytes)
26,518,517 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,548,509 UART: [rt]cmd =0x54514754, len=24
26,551,252 >>> mbox cmd response: failed
26,551,754 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,581,437 UART: [rt]cmd =0x54514754, len=24
26,584,169 >>> mbox cmd response data (8 bytes)
26,584,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,615,107 UART: [rt]cmd =0x44504543, len=96
26,666,332 >>> mbox cmd response data (56 bytes)
26,667,060 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,696,895 UART: [rt]cmd =0x47544744, len=8
26,699,959 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,555 UART:
192,922 UART: Running Caliptra ROM ...
194,029 UART:
603,935 UART: [state] CFI Enabled
618,401 UART: [state] LifecycleState = Unprovisioned
620,986 UART: [state] DebugLocked = No
622,301 UART: [state] WD Timer not started. Device not locked for debugging
627,493 UART: [kat] SHA2-256
817,321 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,147 UART: [kat] ++
828,601 UART: [kat] sha1
840,047 UART: [kat] SHA2-256
843,062 UART: [kat] SHA2-384
848,993 UART: [kat] SHA2-512-ACC
851,588 UART: [kat] ECC-384
3,293,349 UART: [kat] HMAC-384Kdf
3,306,509 UART: [kat] LMS
3,838,378 UART: [kat] --
3,841,030 UART: [cold-reset] ++
3,843,032 UART: [fht] FHT @ 0x50003400
3,855,228 UART: [idev] ++
3,855,945 UART: [idev] CDI.KEYID = 6
3,856,981 UART: [idev] SUBJECT.KEYID = 7
3,858,092 UART: [idev] UDS.KEYID = 0
3,859,043 ready_for_fw is high
3,859,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,109 UART: [idev] Erasing UDS.KEYID = 0
6,338,024 UART: [idev] Sha1 KeyId Algorithm
6,360,062 UART: [idev] --
6,364,603 UART: [ldev] ++
6,365,287 UART: [ldev] CDI.KEYID = 6
6,366,361 UART: [ldev] SUBJECT.KEYID = 5
6,367,468 UART: [ldev] AUTHORITY.KEYID = 7
6,368,649 UART: [ldev] FE.KEYID = 1
6,378,653 UART: [ldev] Erasing FE.KEYID = 1
8,854,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,993 UART: [ldev] --
10,647,157 UART: [fwproc] Wait for Commands...
10,648,833 UART: [fwproc] Recv command 0x46574c44
10,651,089 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,332 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,940 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,503 >>> mbox cmd response: success
14,918,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,921,445 UART: [afmc] ++
14,922,147 UART: [afmc] CDI.KEYID = 6
14,923,390 UART: [afmc] SUBJECT.KEYID = 7
14,924,830 UART: [afmc] AUTHORITY.KEYID = 5
17,432,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,153,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,154,988 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,170,092 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,185,224 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,200,146 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,224,389 UART: [afmc] --
19,227,290 UART: [cold-reset] --
19,231,862 UART: [state] Locking Datavault
19,237,657 UART: [state] Locking PCR0, PCR1 and PCR31
19,239,800 UART: [state] Locking ICCM
19,241,633 UART: [exit] Launching FMC @ 0x40000130
19,250,314 UART:
19,250,549 UART: Running Caliptra FMC ...
19,251,653 UART:
19,251,818 UART: [state] CFI Enabled
19,260,138 UART: [fht] FMC Alias Private Key: 7
21,026,749 UART: [art] Extend RT PCRs Done
21,027,976 UART: [art] Lock RT PCRs Done
21,029,664 UART: [art] Populate DV Done
21,035,269 UART: [fht] FMC Alias Private Key: 7
21,036,868 UART: [art] Derive CDI
21,037,689 UART: [art] Store in slot 0x4
21,079,807 UART: [art] Derive Key Pair
21,080,816 UART: [art] Store priv key in slot 0x5
23,507,712 UART: [art] Derive Key Pair - Done
23,521,089 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,568 UART: [art] Erasing AUTHORITY.KEYID = 7
25,229,077 UART: [art] PUB.X = ED33ADD3B2D1CA97EFE09A064BAEDB76DD76F90BC4219DF674E128522AAEF37ACDDB716A5FD05DF5EC8FD646D489074F
25,236,395 UART: [art] PUB.Y = 0D57A81D11C0BD3D111AB131D860652ADEAE28C9323E310BB4D0C23E695416885EC52D398C82165F8AA3AEEC9DF07B02
25,243,658 UART: [art] SIG.R = 3356C86E58ACF9F32B3F2FBF5B52CB3072D6C6D12410C6A1BAD6D52ED6B1D68145853751267DC60C190A9F1849F4FFC4
25,251,019 UART: [art] SIG.S = 5E129949FBFCAA9F6A45A2ABBF01EF726DCF30F4B06BE906C51AB703DA02A101F72D4596A6B25BB149AC89A865A056C2
26,229,472 UART: Caliptra RT
26,230,187 UART: [state] CFI Enabled
26,364,049 UART: [rt] RT listening for mailbox commands...
26,396,372 UART: [rt]cmd =0x44504543, len=96
26,434,053 >>> mbox cmd response data (56 bytes)
26,435,297 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,465,403 UART: [rt]cmd =0x54514754, len=24
26,467,966 >>> mbox cmd response: failed
26,468,381 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,498,279 UART: [rt]cmd =0x54514754, len=24
26,501,262 >>> mbox cmd response data (8 bytes)
26,501,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,532,311 UART: [rt]cmd =0x44504543, len=96
26,569,225 >>> mbox cmd response data (56 bytes)
26,569,958 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,599,787 UART: [rt]cmd =0x47544744, len=8
26,602,886 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,759,237 ready_for_fw is high
3,759,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,594 >>> mbox cmd response: success
15,044,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,295,919 UART:
19,296,306 UART: Running Caliptra FMC ...
19,297,457 UART:
19,297,624 UART: [state] CFI Enabled
19,305,368 UART: [fht] FMC Alias Private Key: 7
21,072,088 UART: [art] Extend RT PCRs Done
21,073,309 UART: [art] Lock RT PCRs Done
21,074,804 UART: [art] Populate DV Done
21,080,089 UART: [fht] FMC Alias Private Key: 7
21,081,657 UART: [art] Derive CDI
21,082,402 UART: [art] Store in slot 0x4
21,125,056 UART: [art] Derive Key Pair
21,126,064 UART: [art] Store priv key in slot 0x5
23,552,946 UART: [art] Derive Key Pair - Done
23,565,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,428 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,930 UART: [art] PUB.X = 07C3F3AD87166A5366DB9D8E78322BAD174481C8C1335A388EA462C851D801BF91335561287AC78D056E66E5E2E78165
25,281,190 UART: [art] PUB.Y = 233232631D0A6C2A5E7CD029C8F4597372C295210636E6BB5C793462B07920D528126C424CA34D76B03815CCB7DEC439
25,288,387 UART: [art] SIG.R = 76DA36C50C684BD0576AA2D9568FDADF4A3F0D019E4E1CCF6F4FBF79B1BC2A2C6F4E33E35245B15C6255F7193ECABDAD
25,295,785 UART: [art] SIG.S = 90574AC6418A800632063EB6A380023C9C7665946AD555E326E8999142052296A155C8C4F38F3896FE647BDA6482A402
26,275,036 UART: Caliptra RT
26,275,860 UART: [state] CFI Enabled
26,408,955 UART: [rt] RT listening for mailbox commands...
26,441,004 UART: [rt]cmd =0x44504543, len=96
26,478,407 >>> mbox cmd response data (56 bytes)
26,479,717 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,509,792 UART: [rt]cmd =0x54514754, len=24
26,512,259 >>> mbox cmd response: failed
26,512,750 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,542,808 UART: [rt]cmd =0x54514754, len=24
26,545,442 >>> mbox cmd response data (8 bytes)
26,545,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,576,425 UART: [rt]cmd =0x44504543, len=96
26,613,225 >>> mbox cmd response data (56 bytes)
26,613,956 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,643,785 UART: [rt]cmd =0x47544744, len=8
26,646,946 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,197 UART: [kat] SHA2-256
882,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,243 UART: [kat] ++
886,395 UART: [kat] sha1
890,519 UART: [kat] SHA2-256
892,457 UART: [kat] SHA2-384
895,198 UART: [kat] SHA2-512-ACC
897,099 UART: [kat] ECC-384
902,462 UART: [kat] HMAC-384Kdf
906,934 UART: [kat] LMS
1,475,130 UART: [kat] --
1,475,861 UART: [cold-reset] ++
1,476,351 UART: [fht] Storing FHT @ 0x50003400
1,479,132 UART: [idev] ++
1,479,300 UART: [idev] CDI.KEYID = 6
1,479,660 UART: [idev] SUBJECT.KEYID = 7
1,480,084 UART: [idev] UDS.KEYID = 0
1,480,429 ready_for_fw is high
1,480,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,626 UART: [idev] Erasing UDS.KEYID = 0
1,504,102 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,686 UART: [idev] --
1,513,937 UART: [ldev] ++
1,514,105 UART: [ldev] CDI.KEYID = 6
1,514,468 UART: [ldev] SUBJECT.KEYID = 5
1,514,894 UART: [ldev] AUTHORITY.KEYID = 7
1,515,357 UART: [ldev] FE.KEYID = 1
1,520,263 UART: [ldev] Erasing FE.KEYID = 1
1,546,012 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,128 UART: [ldev] --
1,585,519 UART: [fwproc] Waiting for Commands...
1,586,380 UART: [fwproc] Received command 0x46574c44
1,587,171 UART: [fwproc] Received Image of size 118548 bytes
2,932,721 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,393 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,048 >>> mbox cmd response: success
3,132,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,133,292 UART: [afmc] ++
3,133,460 UART: [afmc] CDI.KEYID = 6
3,133,822 UART: [afmc] SUBJECT.KEYID = 7
3,134,247 UART: [afmc] AUTHORITY.KEYID = 5
3,169,102 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,478 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,258 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,967 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,850 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,533 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,463 UART: [afmc] --
3,212,375 UART: [cold-reset] --
3,213,021 UART: [state] Locking Datavault
3,214,260 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,864 UART: [state] Locking ICCM
3,215,360 UART: [exit] Launching FMC @ 0x40000130
3,220,690 UART:
3,220,706 UART: Running Caliptra FMC ...
3,221,114 UART:
3,221,168 UART: [state] CFI Enabled
3,231,586 UART: [fht] FMC Alias Private Key: 7
3,350,456 UART: [art] Extend RT PCRs Done
3,350,884 UART: [art] Lock RT PCRs Done
3,352,348 UART: [art] Populate DV Done
3,360,647 UART: [fht] FMC Alias Private Key: 7
3,361,657 UART: [art] Derive CDI
3,361,937 UART: [art] Store in slot 0x4
3,447,553 UART: [art] Derive Key Pair
3,447,913 UART: [art] Store priv key in slot 0x5
3,460,332 UART: [art] Derive Key Pair - Done
3,475,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,995 UART: [art] PUB.X = D19F4FAB1FC08E39A7BF380273C0D9B830A3209F0CAA0C6295818A87526F0A5BA4A86E3A1D8885CCC8BFCC8B5F1C0CB2
3,498,770 UART: [art] PUB.Y = B03B3B0E140D203FDDC160D0EF36212CC543C86B828B1572B039E4D664A2226D13239F6D9FC7B1650D2AF0AF871DBB78
3,505,719 UART: [art] SIG.R = 2B7A51F39E06F2E37AFE13244FCD2798BCAB499E4E301E685165E1E4E9E508EA55422460A3FAE4DD91B02799960D50F8
3,512,486 UART: [art] SIG.S = B1BCC832B00E9058A1B0FBBCF3C3F69284FAC23C1133056494EF0AF0D8D23D21A0C7644A1292059D0DA135929CBA95A3
3,536,391 UART: Caliptra RT
3,536,642 UART: [state] CFI Enabled
3,657,218 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,478 UART: [rt]cmd =0x44504543, len=96
3,726,465 >>> mbox cmd response data (56 bytes)
3,726,466 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,755,763 UART: [rt]cmd =0x54514754, len=24
3,757,627 >>> mbox cmd response: failed
3,757,627 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,787,125 UART: [rt]cmd =0x54514754, len=24
3,789,265 >>> mbox cmd response data (8 bytes)
3,789,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,225 UART: [rt]cmd =0x44504543, len=96
3,856,628 >>> mbox cmd response data (56 bytes)
3,856,629 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,885,934 UART: [rt]cmd =0x47544744, len=8
3,888,340 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,515 ready_for_fw is high
1,362,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,290 >>> mbox cmd response: success
2,980,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,079 UART:
3,042,095 UART: Running Caliptra FMC ...
3,042,503 UART:
3,042,557 UART: [state] CFI Enabled
3,053,373 UART: [fht] FMC Alias Private Key: 7
3,172,639 UART: [art] Extend RT PCRs Done
3,173,067 UART: [art] Lock RT PCRs Done
3,174,421 UART: [art] Populate DV Done
3,182,674 UART: [fht] FMC Alias Private Key: 7
3,183,736 UART: [art] Derive CDI
3,184,016 UART: [art] Store in slot 0x4
3,269,676 UART: [art] Derive Key Pair
3,270,036 UART: [art] Store priv key in slot 0x5
3,282,401 UART: [art] Derive Key Pair - Done
3,297,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,766 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,531 UART: [art] PUB.X = AF8F8E611D80540EA25FF73E98F3A3294FB1664A8DD2C86CC6229FA107DD1C32810DF1E4486149E210496E41826B81AB
3,320,296 UART: [art] PUB.Y = C6B8E4DC9D3BED67A102A27E80F4AEABF693008C3A7BD5C34410364D6F6F47404BD7D4F773525B302FA9A6D28C007516
3,327,209 UART: [art] SIG.R = 70DCAF00F5FD1682C9D89584E8873E72545597A84686E01D54CDFD6ED98CCF104093372FDC164B56505A7DE36EB93893
3,333,959 UART: [art] SIG.S = 3E54CCBB703D9E531C126C7ECD61A79E932A6CD3179E7566997F81E1DEC846D7750AF0C8B5F9ACC7030918DC5CF3EAF7
3,357,452 UART: Caliptra RT
3,357,703 UART: [state] CFI Enabled
3,477,522 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,698 UART: [rt]cmd =0x44504543, len=96
3,546,767 >>> mbox cmd response data (56 bytes)
3,546,768 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,576,189 UART: [rt]cmd =0x54514754, len=24
3,578,105 >>> mbox cmd response: failed
3,578,105 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,661 UART: [rt]cmd =0x54514754, len=24
3,609,617 >>> mbox cmd response data (8 bytes)
3,609,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,583 UART: [rt]cmd =0x44504543, len=96
3,677,610 >>> mbox cmd response data (56 bytes)
3,677,611 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,706,826 UART: [rt]cmd =0x47544744, len=8
3,709,208 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,604 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,082 UART: [kat] SHA2-256
882,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,128 UART: [kat] ++
886,280 UART: [kat] sha1
890,586 UART: [kat] SHA2-256
892,524 UART: [kat] SHA2-384
895,223 UART: [kat] SHA2-512-ACC
897,124 UART: [kat] ECC-384
902,769 UART: [kat] HMAC-384Kdf
907,465 UART: [kat] LMS
1,475,661 UART: [kat] --
1,476,788 UART: [cold-reset] ++
1,477,148 UART: [fht] Storing FHT @ 0x50003400
1,479,941 UART: [idev] ++
1,480,109 UART: [idev] CDI.KEYID = 6
1,480,469 UART: [idev] SUBJECT.KEYID = 7
1,480,893 UART: [idev] UDS.KEYID = 0
1,481,238 ready_for_fw is high
1,481,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,505 UART: [idev] Erasing UDS.KEYID = 0
1,506,347 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,741 UART: [idev] --
1,515,810 UART: [ldev] ++
1,515,978 UART: [ldev] CDI.KEYID = 6
1,516,341 UART: [ldev] SUBJECT.KEYID = 5
1,516,767 UART: [ldev] AUTHORITY.KEYID = 7
1,517,230 UART: [ldev] FE.KEYID = 1
1,522,366 UART: [ldev] Erasing FE.KEYID = 1
1,548,081 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,225 UART: [ldev] --
1,587,716 UART: [fwproc] Waiting for Commands...
1,588,365 UART: [fwproc] Received command 0x46574c44
1,589,156 UART: [fwproc] Received Image of size 118548 bytes
2,933,978 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,190 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,408 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,647 >>> mbox cmd response: success
3,132,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,133,779 UART: [afmc] ++
3,133,947 UART: [afmc] CDI.KEYID = 6
3,134,309 UART: [afmc] SUBJECT.KEYID = 7
3,134,734 UART: [afmc] AUTHORITY.KEYID = 5
3,170,091 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,279 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,059 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,768 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,651 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,334 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,132 UART: [afmc] --
3,213,076 UART: [cold-reset] --
3,213,942 UART: [state] Locking Datavault
3,215,135 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,739 UART: [state] Locking ICCM
3,216,243 UART: [exit] Launching FMC @ 0x40000130
3,221,573 UART:
3,221,589 UART: Running Caliptra FMC ...
3,221,997 UART:
3,222,140 UART: [state] CFI Enabled
3,232,828 UART: [fht] FMC Alias Private Key: 7
3,352,184 UART: [art] Extend RT PCRs Done
3,352,612 UART: [art] Lock RT PCRs Done
3,354,168 UART: [art] Populate DV Done
3,362,435 UART: [fht] FMC Alias Private Key: 7
3,363,597 UART: [art] Derive CDI
3,363,877 UART: [art] Store in slot 0x4
3,449,661 UART: [art] Derive Key Pair
3,450,021 UART: [art] Store priv key in slot 0x5
3,463,388 UART: [art] Derive Key Pair - Done
3,478,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,792 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,557 UART: [art] PUB.X = 509CCB517141C2300346D10D339DB373139D229A943E3F1685AAE6E178B3FDBF36E794AAE89D0C25334EF596D0B4B6D1
3,501,322 UART: [art] PUB.Y = 49EF2C2613F622898325B0662459BA00A44B8D1AB58129EF299CA51279AB8B18E4618E456C9F92548C93821F30923ED9
3,508,242 UART: [art] SIG.R = B76A1D8AA140F2EA71C0B66A00389FF8659E6436AF5219C0F368DCDD6CC768E60181CDBB93BD2B91D9C640A3E8415164
3,514,997 UART: [art] SIG.S = 55EB3DA0AA4EA83D645FC050B63D823FB149EBCB312C83F6277F2CD9B1BA053D749B12253AEDE46364824D14DBC07A46
3,538,078 UART: Caliptra RT
3,538,421 UART: [state] CFI Enabled
3,658,569 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,579 UART: [rt]cmd =0x44504543, len=96
3,727,938 >>> mbox cmd response data (56 bytes)
3,727,939 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,757,518 UART: [rt]cmd =0x54514754, len=24
3,759,470 >>> mbox cmd response: failed
3,759,470 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,788,838 UART: [rt]cmd =0x54514754, len=24
3,791,000 >>> mbox cmd response data (8 bytes)
3,791,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,832 UART: [rt]cmd =0x44504543, len=96
3,859,375 >>> mbox cmd response data (56 bytes)
3,859,376 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,888,875 UART: [rt]cmd =0x47544744, len=8
3,891,411 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,612 ready_for_fw is high
1,362,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,883 >>> mbox cmd response: success
2,981,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,043,606 UART:
3,043,622 UART: Running Caliptra FMC ...
3,044,030 UART:
3,044,173 UART: [state] CFI Enabled
3,054,855 UART: [fht] FMC Alias Private Key: 7
3,174,007 UART: [art] Extend RT PCRs Done
3,174,435 UART: [art] Lock RT PCRs Done
3,175,789 UART: [art] Populate DV Done
3,184,062 UART: [fht] FMC Alias Private Key: 7
3,185,140 UART: [art] Derive CDI
3,185,420 UART: [art] Store in slot 0x4
3,271,012 UART: [art] Derive Key Pair
3,271,372 UART: [art] Store priv key in slot 0x5
3,284,827 UART: [art] Derive Key Pair - Done
3,299,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,977 UART: [art] PUB.X = FC1916C9E4DF0B049065A82C72D7C76C570A09ADD0E5AA9B81D98CC688FFB49B71B3BEEC8497F6B3BA3D8852630E4023
3,321,746 UART: [art] PUB.Y = 546E692824F9857242AF627E0A588708EAEC017D40C8FC5F1C5AA738446C57726F52FA570D52EF322C2F50BF8BB95047
3,328,684 UART: [art] SIG.R = 3E3ACD94A9D601950FA4241775B567C473D045D17E8D0439797F45B34E2AE0540765A351C33E07034F53F4859A76D0A7
3,335,428 UART: [art] SIG.S = 8ABD72C96B100E39AA111674BA06B3B7492469747E58D7913E217D635E64D9C4248FCCF1BA7F4ED4F56D5350DEF7BAFF
3,359,364 UART: Caliptra RT
3,359,707 UART: [state] CFI Enabled
3,479,353 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,349 UART: [rt]cmd =0x44504543, len=96
3,548,114 >>> mbox cmd response data (56 bytes)
3,548,115 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,577,560 UART: [rt]cmd =0x54514754, len=24
3,579,572 >>> mbox cmd response: failed
3,579,572 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,244 UART: [rt]cmd =0x54514754, len=24
3,611,342 >>> mbox cmd response data (8 bytes)
3,611,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,314 UART: [rt]cmd =0x44504543, len=96
3,679,129 >>> mbox cmd response data (56 bytes)
3,679,130 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,708,479 UART: [rt]cmd =0x47544744, len=8
3,711,263 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,114 UART: [kat] ++
895,266 UART: [kat] sha1
899,610 UART: [kat] SHA2-256
901,550 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
915,917 UART: [kat] HMAC-384Kdf
920,607 UART: [kat] LMS
1,168,919 UART: [kat] --
1,169,790 UART: [cold-reset] ++
1,170,130 UART: [fht] FHT @ 0x50003400
1,172,968 UART: [idev] ++
1,173,136 UART: [idev] CDI.KEYID = 6
1,173,497 UART: [idev] SUBJECT.KEYID = 7
1,173,922 UART: [idev] UDS.KEYID = 0
1,174,268 ready_for_fw is high
1,174,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,683 UART: [idev] Erasing UDS.KEYID = 0
1,198,453 UART: [idev] Sha1 KeyId Algorithm
1,207,507 UART: [idev] --
1,208,574 UART: [ldev] ++
1,208,742 UART: [ldev] CDI.KEYID = 6
1,209,106 UART: [ldev] SUBJECT.KEYID = 5
1,209,533 UART: [ldev] AUTHORITY.KEYID = 7
1,209,996 UART: [ldev] FE.KEYID = 1
1,215,236 UART: [ldev] Erasing FE.KEYID = 1
1,241,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,892 UART: [ldev] --
1,281,107 UART: [fwproc] Wait for Commands...
1,281,774 UART: [fwproc] Recv command 0x46574c44
1,282,507 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,681 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,856 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,211 >>> mbox cmd response: success
2,825,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,826,279 UART: [afmc] ++
2,826,447 UART: [afmc] CDI.KEYID = 6
2,826,810 UART: [afmc] SUBJECT.KEYID = 7
2,827,236 UART: [afmc] AUTHORITY.KEYID = 5
2,863,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,547 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,257 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,138 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,839 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,598 UART: [afmc] --
2,906,457 UART: [cold-reset] --
2,907,259 UART: [state] Locking Datavault
2,908,494 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,098 UART: [state] Locking ICCM
2,909,730 UART: [exit] Launching FMC @ 0x40000130
2,915,060 UART:
2,915,076 UART: Running Caliptra FMC ...
2,915,484 UART:
2,915,538 UART: [state] CFI Enabled
2,925,844 UART: [fht] FMC Alias Private Key: 7
3,044,530 UART: [art] Extend RT PCRs Done
3,044,958 UART: [art] Lock RT PCRs Done
3,046,590 UART: [art] Populate DV Done
3,054,907 UART: [fht] FMC Alias Private Key: 7
3,056,033 UART: [art] Derive CDI
3,056,313 UART: [art] Store in slot 0x4
3,142,174 UART: [art] Derive Key Pair
3,142,534 UART: [art] Store priv key in slot 0x5
3,155,928 UART: [art] Derive Key Pair - Done
3,170,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,860 UART: [art] PUB.X = ACA55C206D10E4B4AA0880ACB48298EFE915AF7F374087FA32A7BA378F83909071A75BEC4D5FAE395289741556851B9A
3,193,633 UART: [art] PUB.Y = 0E161EC71E686B065B3ECE158778538259F4A55A52737D705D464759EE16D6D1849AE046469EB600A9CD0B5D5DDBFE72
3,200,554 UART: [art] SIG.R = CE39FAF8327F5C8357B1B6C283DC804211FEB3E6672D5CF7B5E56FFD63249AD0DC8CB3DAAB8903271B6121EC0AA59AE5
3,207,338 UART: [art] SIG.S = 484586E7095DB8DB9BD54034CBF946DC26D56591733F8EFA0981FF224507DB513CD9C69604B3F23ABAA3AB90B3061D29
3,231,509 UART: Caliptra RT
3,231,760 UART: [state] CFI Enabled
3,350,979 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,959 UART: [rt]cmd =0x44504543, len=96
3,419,596 >>> mbox cmd response data (56 bytes)
3,419,597 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,448,950 UART: [rt]cmd =0x54514754, len=24
3,450,834 >>> mbox cmd response: failed
3,450,834 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,566 UART: [rt]cmd =0x54514754, len=24
3,482,720 >>> mbox cmd response data (8 bytes)
3,482,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,616 UART: [rt]cmd =0x44504543, len=96
3,550,701 >>> mbox cmd response data (56 bytes)
3,550,702 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,323 UART: [rt]cmd =0x47544744, len=8
3,583,051 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,092 ready_for_fw is high
1,059,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,240 >>> mbox cmd response: success
2,679,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,791 UART:
2,741,807 UART: Running Caliptra FMC ...
2,742,215 UART:
2,742,269 UART: [state] CFI Enabled
2,752,725 UART: [fht] FMC Alias Private Key: 7
2,871,281 UART: [art] Extend RT PCRs Done
2,871,709 UART: [art] Lock RT PCRs Done
2,873,537 UART: [art] Populate DV Done
2,881,896 UART: [fht] FMC Alias Private Key: 7
2,883,062 UART: [art] Derive CDI
2,883,342 UART: [art] Store in slot 0x4
2,968,929 UART: [art] Derive Key Pair
2,969,289 UART: [art] Store priv key in slot 0x5
2,982,413 UART: [art] Derive Key Pair - Done
2,997,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,261 UART: [art] PUB.X = 78C1DEFF5A2EB979E94C1E05DBEB58BE2DF295F8214DEF3693351B65DE1E51A3BF98BB919BCBD430A3605EED4D522150
3,020,048 UART: [art] PUB.Y = 65323C3EA8D162097DD9BBE53B19F5C19C3E1179ABD70528EB38B06621F58EB449CC5D87498EEF5377D45503FC928E58
3,026,993 UART: [art] SIG.R = 02DEA9430B6EF548E4E1538F8D503E8A65AB0491B043666B75329ECC648CA3CD7D6CE0F401A1EC4E725CE34BFDBE5BED
3,033,771 UART: [art] SIG.S = 763B8DE032195F6CFDC0965E3D0D807298319166D3C802BCB666361BF68EC00F42BCB0CAE2901AECF8CE932D7B68E278
3,056,948 UART: Caliptra RT
3,057,199 UART: [state] CFI Enabled
3,177,107 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,997 UART: [rt]cmd =0x44504543, len=96
3,245,836 >>> mbox cmd response data (56 bytes)
3,245,837 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,275,438 UART: [rt]cmd =0x54514754, len=24
3,277,432 >>> mbox cmd response: failed
3,277,432 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,678 UART: [rt]cmd =0x54514754, len=24
3,308,728 >>> mbox cmd response data (8 bytes)
3,308,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,338,920 UART: [rt]cmd =0x44504543, len=96
3,376,781 >>> mbox cmd response data (56 bytes)
3,376,782 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,269 UART: [rt]cmd =0x47544744, len=8
3,408,611 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
87,064 UART: [state] WD Timer not started. Device not locked for debugging
88,419 UART: [kat] SHA2-256
891,969 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,073 UART: [kat] ++
896,225 UART: [kat] sha1
900,367 UART: [kat] SHA2-256
902,307 UART: [kat] SHA2-384
905,024 UART: [kat] SHA2-512-ACC
906,925 UART: [kat] ECC-384
916,920 UART: [kat] HMAC-384Kdf
921,476 UART: [kat] LMS
1,169,788 UART: [kat] --
1,170,619 UART: [cold-reset] ++
1,171,057 UART: [fht] FHT @ 0x50003400
1,173,839 UART: [idev] ++
1,174,007 UART: [idev] CDI.KEYID = 6
1,174,368 UART: [idev] SUBJECT.KEYID = 7
1,174,793 UART: [idev] UDS.KEYID = 0
1,175,139 ready_for_fw is high
1,175,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,776 UART: [idev] Erasing UDS.KEYID = 0
1,199,984 UART: [idev] Sha1 KeyId Algorithm
1,208,734 UART: [idev] --
1,209,977 UART: [ldev] ++
1,210,145 UART: [ldev] CDI.KEYID = 6
1,210,509 UART: [ldev] SUBJECT.KEYID = 5
1,210,936 UART: [ldev] AUTHORITY.KEYID = 7
1,211,399 UART: [ldev] FE.KEYID = 1
1,216,781 UART: [ldev] Erasing FE.KEYID = 1
1,243,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,119 UART: [ldev] --
1,282,550 UART: [fwproc] Wait for Commands...
1,283,321 UART: [fwproc] Recv command 0x46574c44
1,284,054 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,678 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,853 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,042 >>> mbox cmd response: success
2,828,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,829,168 UART: [afmc] ++
2,829,336 UART: [afmc] CDI.KEYID = 6
2,829,699 UART: [afmc] SUBJECT.KEYID = 7
2,830,125 UART: [afmc] AUTHORITY.KEYID = 5
2,866,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,728 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,438 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,319 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,020 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,853 UART: [afmc] --
2,909,838 UART: [cold-reset] --
2,910,730 UART: [state] Locking Datavault
2,911,909 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,513 UART: [state] Locking ICCM
2,913,127 UART: [exit] Launching FMC @ 0x40000130
2,918,457 UART:
2,918,473 UART: Running Caliptra FMC ...
2,918,881 UART:
2,919,024 UART: [state] CFI Enabled
2,929,760 UART: [fht] FMC Alias Private Key: 7
3,048,078 UART: [art] Extend RT PCRs Done
3,048,506 UART: [art] Lock RT PCRs Done
3,050,064 UART: [art] Populate DV Done
3,058,195 UART: [fht] FMC Alias Private Key: 7
3,059,203 UART: [art] Derive CDI
3,059,483 UART: [art] Store in slot 0x4
3,144,994 UART: [art] Derive Key Pair
3,145,354 UART: [art] Store priv key in slot 0x5
3,158,082 UART: [art] Derive Key Pair - Done
3,172,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,231 UART: [art] PUB.X = AD6770EE8C7F439E4ED2C96C80ED630A1F7D15592E8068DB5EE2F7FA06A72846DFA4D85E275F8FDBF7BB73E6E773DEF7
3,196,017 UART: [art] PUB.Y = F544FB282E0F3CEFE753B4E046B433759F8AAA2DB477CD07C676014A43E0F9E5D47A346341032B649FBA4871140916E1
3,202,954 UART: [art] SIG.R = E64AD2E7A8CA4CA06AE92611690A67EAF53FFE2252EFA64E973462EF390E246A3E5147EF9FB0C5EB104CDB586C1DDE84
3,209,738 UART: [art] SIG.S = CAF2500A13631B6FCCEF675C100CA5BFE0BA95147BAB3EC849F5696D7791C1219E17C263DDF4F7C79BD1FB3C04A43707
3,234,080 UART: Caliptra RT
3,234,423 UART: [state] CFI Enabled
3,353,625 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,971 UART: [rt]cmd =0x44504543, len=96
3,423,474 >>> mbox cmd response data (56 bytes)
3,423,475 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,452,954 UART: [rt]cmd =0x54514754, len=24
3,455,168 >>> mbox cmd response: failed
3,455,168 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,770 UART: [rt]cmd =0x54514754, len=24
3,486,772 >>> mbox cmd response data (8 bytes)
3,486,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,914 UART: [rt]cmd =0x44504543, len=96
3,554,563 >>> mbox cmd response data (56 bytes)
3,554,564 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,943 UART: [rt]cmd =0x47544744, len=8
3,586,665 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,451 ready_for_fw is high
1,059,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,123 >>> mbox cmd response: success
2,678,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,696 UART:
2,740,712 UART: Running Caliptra FMC ...
2,741,120 UART:
2,741,263 UART: [state] CFI Enabled
2,752,213 UART: [fht] FMC Alias Private Key: 7
2,871,281 UART: [art] Extend RT PCRs Done
2,871,709 UART: [art] Lock RT PCRs Done
2,873,193 UART: [art] Populate DV Done
2,881,564 UART: [fht] FMC Alias Private Key: 7
2,882,536 UART: [art] Derive CDI
2,882,816 UART: [art] Store in slot 0x4
2,969,111 UART: [art] Derive Key Pair
2,969,471 UART: [art] Store priv key in slot 0x5
2,982,877 UART: [art] Derive Key Pair - Done
2,997,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,998 UART: [art] PUB.X = C178CFC94033D6ECC752662850ED5F92A7966B70CA4B58FA1E9E4A1B38196DD5AF683B1BD8A242CADC52E58C7C9ADA11
3,020,786 UART: [art] PUB.Y = 07759726AACC565EB5E60BAC7DF4E0832348A9EDB496B65E0534C5D1A3EDB897C8AA7E3544D51A531456DD71FE272A0D
3,027,736 UART: [art] SIG.R = 5C2CC09187F4FAA8216AB6387049CC8C7D81F0C827AA10A8DD57B1F6B0688C351120850E77816F9EA98139FB00163674
3,034,479 UART: [art] SIG.S = 185A65C411A142A546B41757A24512779CEC20C3BF8768111451AF858019639E50595ED3531394FDC73A8BE3A18D194E
3,058,339 UART: Caliptra RT
3,058,682 UART: [state] CFI Enabled
3,178,836 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,836 UART: [rt]cmd =0x44504543, len=96
3,247,213 >>> mbox cmd response data (56 bytes)
3,247,214 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,276,775 UART: [rt]cmd =0x54514754, len=24
3,279,115 >>> mbox cmd response: failed
3,279,115 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,801 UART: [rt]cmd =0x54514754, len=24
3,310,909 >>> mbox cmd response data (8 bytes)
3,310,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,341,151 UART: [rt]cmd =0x44504543, len=96
3,379,224 >>> mbox cmd response data (56 bytes)
3,379,225 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,408,698 UART: [rt]cmd =0x47544744, len=8
3,411,310 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Unprovisioned
86,197 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
893,552 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,677 UART: [kat] ++
897,829 UART: [kat] sha1
902,217 UART: [kat] SHA2-256
904,157 UART: [kat] SHA2-384
906,866 UART: [kat] SHA2-512-ACC
908,767 UART: [kat] ECC-384
918,696 UART: [kat] HMAC-384Kdf
923,354 UART: [kat] LMS
1,171,682 UART: [kat] --
1,172,505 UART: [cold-reset] ++
1,172,969 UART: [fht] FHT @ 0x50003400
1,175,560 UART: [idev] ++
1,175,728 UART: [idev] CDI.KEYID = 6
1,176,088 UART: [idev] SUBJECT.KEYID = 7
1,176,512 UART: [idev] UDS.KEYID = 0
1,176,857 ready_for_fw is high
1,176,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,830 UART: [idev] Erasing UDS.KEYID = 0
1,201,895 UART: [idev] Sha1 KeyId Algorithm
1,210,407 UART: [idev] --
1,211,489 UART: [ldev] ++
1,211,657 UART: [ldev] CDI.KEYID = 6
1,212,020 UART: [ldev] SUBJECT.KEYID = 5
1,212,446 UART: [ldev] AUTHORITY.KEYID = 7
1,212,909 UART: [ldev] FE.KEYID = 1
1,218,005 UART: [ldev] Erasing FE.KEYID = 1
1,244,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,755 UART: [ldev] --
1,283,204 UART: [fwproc] Wait for Commands...
1,284,018 UART: [fwproc] Recv command 0x46574c44
1,284,746 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,862 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,032 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,289 >>> mbox cmd response: success
2,828,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,829,399 UART: [afmc] ++
2,829,567 UART: [afmc] CDI.KEYID = 6
2,829,929 UART: [afmc] SUBJECT.KEYID = 7
2,830,354 UART: [afmc] AUTHORITY.KEYID = 5
2,865,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,308 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,017 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,900 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,601 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,385 UART: [afmc] --
2,909,373 UART: [cold-reset] --
2,910,247 UART: [state] Locking Datavault
2,911,232 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,836 UART: [state] Locking ICCM
2,912,364 UART: [exit] Launching FMC @ 0x40000130
2,917,694 UART:
2,917,710 UART: Running Caliptra FMC ...
2,918,118 UART:
2,918,172 UART: [state] CFI Enabled
2,928,552 UART: [fht] FMC Alias Private Key: 7
3,047,546 UART: [art] Extend RT PCRs Done
3,047,974 UART: [art] Lock RT PCRs Done
3,049,550 UART: [art] Populate DV Done
3,058,013 UART: [fht] FMC Alias Private Key: 7
3,059,195 UART: [art] Derive CDI
3,059,475 UART: [art] Store in slot 0x4
3,145,442 UART: [art] Derive Key Pair
3,145,802 UART: [art] Store priv key in slot 0x5
3,159,000 UART: [art] Derive Key Pair - Done
3,173,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,541 UART: [art] PUB.X = C7AF18223A35A7C8B3A06C2F077EDDCB01FCE5997CEB2F0C42FD94C1C4B7FFE4614F324043C666357CEFFA7C5A8C0A2D
3,196,323 UART: [art] PUB.Y = 8A137974ED96DF514CF5D5311F2C53F495205BFE5C20716791F6EB4507907BF0FC46A6B01C5C74A45067DD97FFCF7515
3,203,274 UART: [art] SIG.R = 231461C10D4B8844F9400A81AD9465B0151F0B5E807B91747AF0B58DDE371AA7E0F89F7C12580117E6F8AD89F6BF34FB
3,210,036 UART: [art] SIG.S = EDABA530CEBCEB960D7701D871014657EED2379F3EF080DC69648A0E87FE0EB33086F23B183CF154913A7B775050147F
3,233,659 UART: Caliptra RT
3,233,910 UART: [state] CFI Enabled
3,353,423 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,453 UART: [rt]cmd =0x44504543, len=96
3,422,422 >>> mbox cmd response data (56 bytes)
3,422,423 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,451,918 UART: [rt]cmd =0x54514754, len=24
3,454,110 >>> mbox cmd response: failed
3,454,110 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,483,526 UART: [rt]cmd =0x54514754, len=24
3,485,638 >>> mbox cmd response data (8 bytes)
3,485,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,702 UART: [rt]cmd =0x44504543, len=96
3,553,609 >>> mbox cmd response data (56 bytes)
3,553,610 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,582,857 UART: [rt]cmd =0x47544744, len=8
3,585,383 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,665 ready_for_fw is high
1,060,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,592 >>> mbox cmd response: success
2,679,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,593 UART:
2,741,609 UART: Running Caliptra FMC ...
2,742,017 UART:
2,742,071 UART: [state] CFI Enabled
2,752,421 UART: [fht] FMC Alias Private Key: 7
2,870,577 UART: [art] Extend RT PCRs Done
2,871,005 UART: [art] Lock RT PCRs Done
2,872,443 UART: [art] Populate DV Done
2,880,734 UART: [fht] FMC Alias Private Key: 7
2,881,772 UART: [art] Derive CDI
2,882,052 UART: [art] Store in slot 0x4
2,968,087 UART: [art] Derive Key Pair
2,968,447 UART: [art] Store priv key in slot 0x5
2,982,353 UART: [art] Derive Key Pair - Done
2,997,098 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,234 UART: [art] PUB.X = 1D0D89B873BF88E49D26DE17EFFECD40282C0865A7F0C7F3CBD86C8B8168122CE25C5CA4F50E2039E594ECB371970466
3,020,002 UART: [art] PUB.Y = 7B5C92D7B66BE3FECE88DD097C48DE604DBA3DE50BB82C044DCFC913A7883759B61FA657235C7D1E374B86A4042D6A6F
3,026,956 UART: [art] SIG.R = 5FA17BAE9920DDEE1D893A990902075FE3F422E75A858B0B884D6BDC5572221F49AC086CB4674CA7327EAD2A68DC6051
3,033,719 UART: [art] SIG.S = A60D277BBC49655825083AF9E81CAD88D0CB853598D974B051444FE903AD6DD070D1337B148EC52E05832A1DAA4DDE38
3,057,955 UART: Caliptra RT
3,058,206 UART: [state] CFI Enabled
3,177,331 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,445 UART: [rt]cmd =0x44504543, len=96
3,246,052 >>> mbox cmd response data (56 bytes)
3,246,053 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,275,384 UART: [rt]cmd =0x54514754, len=24
3,277,560 >>> mbox cmd response: failed
3,277,560 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,996 UART: [rt]cmd =0x54514754, len=24
3,309,032 >>> mbox cmd response data (8 bytes)
3,309,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,339,008 UART: [rt]cmd =0x44504543, len=96
3,377,113 >>> mbox cmd response data (56 bytes)
3,377,114 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,557 UART: [rt]cmd =0x47544744, len=8
3,408,937 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
87,140 UART: [state] WD Timer not started. Device not locked for debugging
88,475 UART: [kat] SHA2-256
894,125 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,250 UART: [kat] ++
898,402 UART: [kat] sha1
902,628 UART: [kat] SHA2-256
904,568 UART: [kat] SHA2-384
907,267 UART: [kat] SHA2-512-ACC
909,168 UART: [kat] ECC-384
918,877 UART: [kat] HMAC-384Kdf
923,619 UART: [kat] LMS
1,171,947 UART: [kat] --
1,172,882 UART: [cold-reset] ++
1,173,330 UART: [fht] FHT @ 0x50003400
1,175,933 UART: [idev] ++
1,176,101 UART: [idev] CDI.KEYID = 6
1,176,461 UART: [idev] SUBJECT.KEYID = 7
1,176,885 UART: [idev] UDS.KEYID = 0
1,177,230 ready_for_fw is high
1,177,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,867 UART: [idev] Erasing UDS.KEYID = 0
1,201,888 UART: [idev] Sha1 KeyId Algorithm
1,210,378 UART: [idev] --
1,211,214 UART: [ldev] ++
1,211,382 UART: [ldev] CDI.KEYID = 6
1,211,745 UART: [ldev] SUBJECT.KEYID = 5
1,212,171 UART: [ldev] AUTHORITY.KEYID = 7
1,212,634 UART: [ldev] FE.KEYID = 1
1,218,032 UART: [ldev] Erasing FE.KEYID = 1
1,244,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,826 UART: [ldev] --
1,283,141 UART: [fwproc] Wait for Commands...
1,283,811 UART: [fwproc] Recv command 0x46574c44
1,284,539 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,667 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,837 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,172 >>> mbox cmd response: success
2,827,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,192 UART: [afmc] ++
2,828,360 UART: [afmc] CDI.KEYID = 6
2,828,722 UART: [afmc] SUBJECT.KEYID = 7
2,829,147 UART: [afmc] AUTHORITY.KEYID = 5
2,864,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,115 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,824 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,707 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,408 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,312 UART: [afmc] --
2,908,310 UART: [cold-reset] --
2,909,412 UART: [state] Locking Datavault
2,910,591 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,195 UART: [state] Locking ICCM
2,911,693 UART: [exit] Launching FMC @ 0x40000130
2,917,023 UART:
2,917,039 UART: Running Caliptra FMC ...
2,917,447 UART:
2,917,590 UART: [state] CFI Enabled
2,928,112 UART: [fht] FMC Alias Private Key: 7
3,047,334 UART: [art] Extend RT PCRs Done
3,047,762 UART: [art] Lock RT PCRs Done
3,049,064 UART: [art] Populate DV Done
3,057,199 UART: [fht] FMC Alias Private Key: 7
3,058,171 UART: [art] Derive CDI
3,058,451 UART: [art] Store in slot 0x4
3,144,428 UART: [art] Derive Key Pair
3,144,788 UART: [art] Store priv key in slot 0x5
3,158,030 UART: [art] Derive Key Pair - Done
3,173,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,019 UART: [art] PUB.X = B7830F9A71BF83280634A24E9C920D7AB9DF984DDF4523BD64A0077412147BCA77F8CE99C168ABAA5829F5E4736C7A7C
3,195,785 UART: [art] PUB.Y = E2994977522B51D9D313A9A9C10CB46E4CB63254E533DA57B567ABF93C604C7B3A59C8897A019F080B774A1F14CCD067
3,202,725 UART: [art] SIG.R = 1447B09808233D6215491D20743929EE65EDBBEB5EF9E8521346A61C794EB2F79C4AF83A256AF5035E50CF21B9636FED
3,209,491 UART: [art] SIG.S = A3E0ED96FBDDF09826F4601C5D9624B5EAEB07DADC760263246C0084A84B69DE0B736C8DD3453EE373A826A39E287794
3,233,140 UART: Caliptra RT
3,233,483 UART: [state] CFI Enabled
3,353,418 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,816 UART: [rt]cmd =0x44504543, len=96
3,423,085 >>> mbox cmd response data (56 bytes)
3,423,086 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,452,577 UART: [rt]cmd =0x54514754, len=24
3,454,675 >>> mbox cmd response: failed
3,454,675 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,041 UART: [rt]cmd =0x54514754, len=24
3,486,369 >>> mbox cmd response data (8 bytes)
3,486,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,357 UART: [rt]cmd =0x44504543, len=96
3,554,534 >>> mbox cmd response data (56 bytes)
3,554,535 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,846 UART: [rt]cmd =0x47544744, len=8
3,586,618 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,740 ready_for_fw is high
1,060,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,357 >>> mbox cmd response: success
2,680,357 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,392 UART:
2,742,408 UART: Running Caliptra FMC ...
2,742,816 UART:
2,742,959 UART: [state] CFI Enabled
2,753,793 UART: [fht] FMC Alias Private Key: 7
2,873,099 UART: [art] Extend RT PCRs Done
2,873,527 UART: [art] Lock RT PCRs Done
2,875,107 UART: [art] Populate DV Done
2,883,342 UART: [fht] FMC Alias Private Key: 7
2,884,282 UART: [art] Derive CDI
2,884,562 UART: [art] Store in slot 0x4
2,970,315 UART: [art] Derive Key Pair
2,970,675 UART: [art] Store priv key in slot 0x5
2,984,127 UART: [art] Derive Key Pair - Done
2,999,206 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,594 UART: [art] PUB.X = 8CAA9CA2CDF8970BF1782DB8ACF606BD14A94F693F439A110E5B6538FDB9ECBB3DC13B33092470BE9E7155587002BDD3
3,022,365 UART: [art] PUB.Y = 7308375F234788FB0C125FDDF40D450960FFCB0158EDDA3C62639BDFC46F18462613D2E0AA2639A91E3723727AAA6B66
3,029,304 UART: [art] SIG.R = 0068F713CBDD6DB2A998055A725F2577891E01DB1D8202325813CD6EA03D09A70B443664D34BF02E8FE6C72E65DE4C30
3,036,039 UART: [art] SIG.S = 2714F970691EEB5923777B541B6ACD3015D1D3C69E23D76E34FA397B726779E350B840AEAA957E8C16A420DDDD8F82DD
3,059,667 UART: Caliptra RT
3,060,010 UART: [state] CFI Enabled
3,180,057 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,263 UART: [rt]cmd =0x44504543, len=96
3,248,700 >>> mbox cmd response data (56 bytes)
3,248,701 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,278,460 UART: [rt]cmd =0x54514754, len=24
3,280,548 >>> mbox cmd response: failed
3,280,548 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,310,130 UART: [rt]cmd =0x54514754, len=24
3,312,550 >>> mbox cmd response data (8 bytes)
3,312,551 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,342,714 UART: [rt]cmd =0x44504543, len=96
3,380,843 >>> mbox cmd response data (56 bytes)
3,380,844 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,215 UART: [rt]cmd =0x47544744, len=8
3,412,487 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
191,972 UART:
192,332 UART: Running Caliptra ROM ...
193,454 UART:
193,600 UART: [state] CFI Enabled
266,824 UART: [state] LifecycleState = Unprovisioned
268,835 UART: [state] DebugLocked = No
270,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,091 UART: [kat] SHA2-256
444,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,334 UART: [kat] ++
455,785 UART: [kat] sha1
466,372 UART: [kat] SHA2-256
469,098 UART: [kat] SHA2-384
474,331 UART: [kat] SHA2-512-ACC
476,634 UART: [kat] ECC-384
2,768,491 UART: [kat] HMAC-384Kdf
2,800,605 UART: [kat] LMS
3,990,903 UART: [kat] --
3,996,333 UART: [cold-reset] ++
3,998,337 UART: [fht] Storing FHT @ 0x50003400
4,009,033 UART: [idev] ++
4,009,615 UART: [idev] CDI.KEYID = 6
4,010,534 UART: [idev] SUBJECT.KEYID = 7
4,011,784 UART: [idev] UDS.KEYID = 0
4,012,826 ready_for_fw is high
4,013,028 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,117,312 UART: [idev] Erasing UDS.KEYID = 0
7,346,335 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,958 UART: [idev] --
7,372,028 UART: [ldev] ++
7,372,617 UART: [ldev] CDI.KEYID = 6
7,373,534 UART: [ldev] SUBJECT.KEYID = 5
7,374,755 UART: [ldev] AUTHORITY.KEYID = 7
7,376,042 UART: [ldev] FE.KEYID = 1
7,424,681 UART: [ldev] Erasing FE.KEYID = 1
10,757,108 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,032 UART: [ldev] --
13,116,119 UART: [fwproc] Waiting for Commands...
13,118,973 UART: [fwproc] Received command 0x46574c44
13,121,154 UART: [fwproc] Received Image of size 82832 bytes
16,788,272 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,864,235 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,937,405 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,140,369 >>> mbox cmd response: success
17,140,898 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
17,144,689 UART: [afmc] ++
17,145,323 UART: [afmc] CDI.KEYID = 6
17,146,235 UART: [afmc] SUBJECT.KEYID = 7
17,147,392 UART: [afmc] AUTHORITY.KEYID = 5
20,516,406 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,817,406 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,819,664 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,834,116 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,848,845 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,863,230 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,884,009 UART: [afmc] --
22,888,100 UART: [cold-reset] --
22,893,439 UART: [state] Locking Datavault
22,900,741 UART: [state] Locking PCR0, PCR1 and PCR31
22,902,497 UART: [state] Locking ICCM
22,905,271 UART: [exit] Launching FMC @ 0x40000130
22,913,663 UART:
22,913,898 UART: Running Caliptra FMC ...
22,914,922 UART:
22,915,069 UART: [state] CFI Enabled
22,979,618 UART: [fht] FMC Alias Private Key: 7
25,340,653 UART: [art] Extend RT PCRs Done
25,341,874 UART: [art] Lock RT PCRs Done
25,343,718 UART: [art] Populate DV Done
25,349,022 UART: [fht] FMC Alias Private Key: 7
25,350,618 UART: [art] Derive CDI
25,351,427 UART: [art] Store in slot 0x4
25,409,680 UART: [art] Derive Key Pair
25,410,734 UART: [art] Store priv key in slot 0x5
28,703,536 UART: [art] Derive Key Pair - Done
28,716,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,005,562 UART: [art] Erasing AUTHORITY.KEYID = 7
31,007,075 UART: [art] PUB.X = FD3808434245F09192DC6A466286C7D2DE5B0B3B9B3166D0A0E7C492713EB3AE5E8D4CEA66CCEC33B8A4BD452A3E58C6
31,014,353 UART: [art] PUB.Y = 0185D9AE64B6D6C8F0A4616115F7E4AF910C80E304CE56BB2527920E1E1285FCEBDA322E041F511C9E393B8C5AFEF173
31,021,560 UART: [art] SIG.R = ABC4384A988BCADC984CB395FA87D1DFDF3A7745EB86B530AE64F8D981E45F4EB06DE8AACB95E966593BDE7E12C9DC49
31,029,019 UART: [art] SIG.S = 5245C4B3442C14EFD576C4ADA8CBE962AB4C92FC9FB6CAAC51C2921743189682A31D8465A583C303A929BED6207053D0
32,333,623 UART: mbox::rt_entry...
32,334,568 UART: ____ _ _ _ ____ _____
32,336,548 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,338,551 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,340,486 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,342,414 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,344,340 UART: |_|
32,345,146 UART:
32,476,826 UART: [rt] Runtime listening for mailbox commands...
32,478,846 >>> mbox cmd response data (0 bytes)
34,554,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,704,425 UART:
34,704,812 UART: Running Caliptra ROM ...
34,705,950 UART:
34,706,125 UART: [state] CFI Enabled
34,781,806 UART: [state] LifecycleState = Unprovisioned
34,783,778 UART: [state] DebugLocked = No
34,785,989 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,791,684 UART: [kat] SHA2-256
34,961,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,971,848 UART: [kat] ++
34,972,354 UART: [kat] sha1
34,983,945 UART: [kat] SHA2-256
34,986,644 UART: [kat] SHA2-384
34,992,363 UART: [kat] SHA2-512-ACC
34,994,767 UART: [kat] ECC-384
37,284,003 UART: [kat] HMAC-384Kdf
37,315,739 UART: [kat] LMS
38,506,106 UART: [kat] --
38,511,090 UART: [update-reset] ++
42,699,349 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,703,950 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,101,677 >>> mbox cmd response: success
43,106,373 UART: [update-reset] Copying MAN_2 To MAN_1
43,124,463 UART: [update-reset Success] --
43,129,750 UART: [state] Locking Datavault
43,132,523 UART: [state] Locking PCR0, PCR1 and PCR31
43,134,325 UART: [state] Locking ICCM
43,136,805 UART: [exit] Launching FMC @ 0x40000130
43,145,262 UART:
43,145,505 UART: Running Caliptra FMC ...
43,146,611 UART:
43,146,777 UART: [state] CFI Enabled
43,234,973 UART: [art] Extend RT PCRs Done
43,236,159 UART: [art] Lock RT PCRs Done
43,237,452 UART: [art] Populate DV Done
43,243,186 UART: [fht] FMC Alias Private Key: 7
43,244,772 UART: [art] Derive CDI
43,245,593 UART: [art] Store in slot 0x4
43,303,982 UART: [art] Derive Key Pair
43,304,977 UART: [art] Store priv key in slot 0x5
46,597,626 UART: [art] Derive Key Pair - Done
46,610,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,899,176 UART: [art] Erasing AUTHORITY.KEYID = 7
48,900,684 UART: [art] PUB.X = 236C7026214460DC372AB6996116371F178BB2377AA5E4E62406914A6BB40DE6DAAF7B7FED1FD5DE1D67C6F321A12EF9
48,907,960 UART: [art] PUB.Y = 0889D28897F0C02C7B0DB389EB24A1AC2B99DDC72BAE0C703F7302012D53317BC57DB6108C80B7EBC89A1E03C9E7E843
48,915,216 UART: [art] SIG.R = 2EF6D87B6E25965A6FBE23E128A65ECA6BB7CFC3E380AF5B94FEE2FCA9D1BF3BE521DEBB83DAFD9863274A24C4C17E2B
48,922,708 UART: [art] SIG.S = EB07DD742AA3DB08078A13F2218A6DE5C3F4CA6914B4A63D404045FD71B41624BB1363679597A4B3F369828B639E5CED
50,228,216 UART: Caliptra RT
50,228,929 UART: [state] CFI Enabled
50,646,372 UART: [rt] RT failed reset flow
50,647,562 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,804,817 ready_for_fw is high
3,805,423 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,265,517 >>> mbox cmd response: success
17,266,168 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
22,960,831 UART:
22,961,245 UART: Running Caliptra FMC ...
22,962,411 UART:
22,962,571 UART: [state] CFI Enabled
23,029,446 UART: [fht] FMC Alias Private Key: 7
25,369,552 UART: [art] Extend RT PCRs Done
25,370,776 UART: [art] Lock RT PCRs Done
25,372,238 UART: [art] Populate DV Done
25,377,382 UART: [fht] FMC Alias Private Key: 7
25,378,868 UART: [art] Derive CDI
25,379,629 UART: [art] Store in slot 0x4
25,437,734 UART: [art] Derive Key Pair
25,438,780 UART: [art] Store priv key in slot 0x5
28,731,991 UART: [art] Derive Key Pair - Done
28,745,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,034,816 UART: [art] Erasing AUTHORITY.KEYID = 7
31,036,333 UART: [art] PUB.X = 20D82A1BF80985054F5FC24B88312628E34DFF85E5B3C57A88E262A5CAE923B0602990E17CC5899ED422B789BF8AF466
31,043,616 UART: [art] PUB.Y = EA15ED6102DD2EF3F2964D8DB4CB7CD41893F36F78FBE8381A70BE85A74ABA17897FA71BBB2ECC457BD91FDD0A498996
31,050,885 UART: [art] SIG.R = 368BD1F789BF2366C3B9005CC03ED184370A8BFAA93462EBB83990391491633A506BBC8A2A4A55DCAA57CFA29584F3F2
31,058,245 UART: [art] SIG.S = 1409DF891E3A2EB4A8E47EDF860CB0B7AD4B7CDD57416D0716E8DB88909D0212CF4E7E40F4D33EE19A582C496E807592
32,363,072 UART: mbox::rt_entry...
32,364,031 UART: ____ _ _ _ ____ _____
32,366,020 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,368,029 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,369,965 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,371,949 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,373,878 UART: |_|
32,374,713 UART:
32,506,645 UART: [rt] Runtime listening for mailbox commands...
32,508,655 >>> mbox cmd response data (0 bytes)
34,583,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,406,199 >>> mbox cmd response: success
43,440,327 UART:
43,440,627 UART: Running Caliptra FMC ...
43,441,745 UART:
43,441,917 UART: [state] CFI Enabled
43,541,996 UART: [art] Extend RT PCRs Done
43,543,182 UART: [art] Lock RT PCRs Done
43,544,586 UART: [art] Populate DV Done
43,549,779 UART: [fht] FMC Alias Private Key: 7
43,551,468 UART: [art] Derive CDI
43,552,296 UART: [art] Store in slot 0x4
43,611,343 UART: [art] Derive Key Pair
43,612,342 UART: [art] Store priv key in slot 0x5
46,904,951 UART: [art] Derive Key Pair - Done
46,918,131 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,206,919 UART: [art] Erasing AUTHORITY.KEYID = 7
49,208,429 UART: [art] PUB.X = 4937479FC5F10E4D0FEC0C8B740D8B0ED3E592D1479A73C8FEF6EB96280116F6CA4647232A34415E56DA3B3ECE1EC155
49,215,750 UART: [art] PUB.Y = D92614558DFE9C7ED2E4BBEAA1F6914347DE7D1D42CE4C740802D3F22DA04512F1338A1B80B145AA4258FA5A4A03E9FA
49,222,954 UART: [art] SIG.R = 1A99A175109D455AFC910B4D0E6EB01256F5440222FAC88CDDBE552EADF25AAB4B39C080A45D751B7498C116B986EA2A
49,230,394 UART: [art] SIG.S = 30C83AA5FFD11B88CB09B26D665D0216E55B7634551D32676999F5258F32C30E093FB12A001EF4415EE80F8B40B8AD51
50,535,607 UART: Caliptra RT
50,536,327 UART: [state] CFI Enabled
50,947,211 UART: [rt] RT failed reset flow
50,948,417 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,505 UART:
192,872 UART: Running Caliptra ROM ...
193,994 UART:
603,623 UART: [state] CFI Enabled
616,567 UART: [state] LifecycleState = Unprovisioned
618,446 UART: [state] DebugLocked = No
620,893 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,531 UART: [kat] SHA2-256
796,328 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,859 UART: [kat] ++
807,307 UART: [kat] sha1
818,423 UART: [kat] SHA2-256
821,067 UART: [kat] SHA2-384
826,771 UART: [kat] SHA2-512-ACC
829,136 UART: [kat] ECC-384
3,113,217 UART: [kat] HMAC-384Kdf
3,124,972 UART: [kat] LMS
4,315,087 UART: [kat] --
4,318,470 UART: [cold-reset] ++
4,320,560 UART: [fht] Storing FHT @ 0x50003400
4,332,051 UART: [idev] ++
4,332,663 UART: [idev] CDI.KEYID = 6
4,333,578 UART: [idev] SUBJECT.KEYID = 7
4,334,818 UART: [idev] UDS.KEYID = 0
4,335,851 ready_for_fw is high
4,336,042 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,440,121 UART: [idev] Erasing UDS.KEYID = 0
7,624,544 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,134 UART: [idev] --
7,650,234 UART: [ldev] ++
7,650,850 UART: [ldev] CDI.KEYID = 6
7,651,789 UART: [ldev] SUBJECT.KEYID = 5
7,652,998 UART: [ldev] AUTHORITY.KEYID = 7
7,654,279 UART: [ldev] FE.KEYID = 1
7,663,546 UART: [ldev] Erasing FE.KEYID = 1
10,953,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,677 UART: [ldev] --
13,312,781 UART: [fwproc] Waiting for Commands...
13,315,839 UART: [fwproc] Received command 0x46574c44
13,318,010 UART: [fwproc] Received Image of size 82832 bytes
16,985,770 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,056,725 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,129,912 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,332,600 >>> mbox cmd response: success
17,333,835 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
17,337,214 UART: [afmc] ++
17,337,800 UART: [afmc] CDI.KEYID = 6
17,338,703 UART: [afmc] SUBJECT.KEYID = 7
17,339,968 UART: [afmc] AUTHORITY.KEYID = 5
20,656,300 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,951,614 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,953,872 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,968,319 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,983,032 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,997,399 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,018,538 UART: [afmc] --
23,022,887 UART: [cold-reset] --
23,026,581 UART: [state] Locking Datavault
23,032,308 UART: [state] Locking PCR0, PCR1 and PCR31
23,034,053 UART: [state] Locking ICCM
23,036,094 UART: [exit] Launching FMC @ 0x40000130
23,044,485 UART:
23,044,862 UART: Running Caliptra FMC ...
23,046,017 UART:
23,046,183 UART: [state] CFI Enabled
23,053,803 UART: [fht] FMC Alias Private Key: 7
25,394,075 UART: [art] Extend RT PCRs Done
25,395,303 UART: [art] Lock RT PCRs Done
25,397,125 UART: [art] Populate DV Done
25,402,428 UART: [fht] FMC Alias Private Key: 7
25,404,121 UART: [art] Derive CDI
25,404,929 UART: [art] Store in slot 0x4
25,447,800 UART: [art] Derive Key Pair
25,448,863 UART: [art] Store priv key in slot 0x5
28,689,821 UART: [art] Derive Key Pair - Done
28,702,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,983,474 UART: [art] Erasing AUTHORITY.KEYID = 7
30,984,973 UART: [art] PUB.X = 8E904A47DB1883C34EA57E8A00878E1293F4239AA590F5E4D9B66B02564BBA398AF571117D13B5614994B8794B052863
30,992,217 UART: [art] PUB.Y = F387FCCBE7CF0EDDD0D70F43F0E2824A423CE1EDEB9971F22A069FF6E0C0E6D3B7EBA31D7973513033416CA5F0418D72
30,999,462 UART: [art] SIG.R = 8515BB095B9DC765A4EA6A3B0F6CCE627EFDCFF9105CCEFCC2F26427E73B1649DEA3A1FA385E527FEF2F2FCF7ED7A63E
31,006,915 UART: [art] SIG.S = 89D7BFDD012D108C3F16C17292B26EF17BFE5958EE68444B07CE46E7EA706549219A312007F27A3DD37DCCFE04252209
32,312,103 UART: mbox::rt_entry...
32,313,042 UART: ____ _ _ _ ____ _____
32,314,969 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,316,964 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,318,817 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,320,732 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,322,580 UART: |_|
32,323,397 UART:
32,456,560 UART: [rt] Runtime listening for mailbox commands...
32,458,574 >>> mbox cmd response data (0 bytes)
34,532,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,682,567 UART:
34,682,946 UART: Running Caliptra ROM ...
34,683,995 UART:
34,684,199 UART: [state] CFI Enabled
34,697,770 UART: [state] LifecycleState = Unprovisioned
34,699,662 UART: [state] DebugLocked = No
34,701,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,705,745 UART: [kat] SHA2-256
34,875,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,885,977 UART: [kat] ++
34,886,433 UART: [kat] sha1
34,897,797 UART: [kat] SHA2-256
34,900,485 UART: [kat] SHA2-384
34,905,410 UART: [kat] SHA2-512-ACC
34,907,820 UART: [kat] ECC-384
37,192,463 UART: [kat] HMAC-384Kdf
37,204,944 UART: [kat] LMS
38,394,810 UART: [kat] --
38,399,021 UART: [update-reset] ++
42,599,609 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,602,961 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,000,744 >>> mbox cmd response: success
43,005,389 UART: [update-reset] Copying MAN_2 To MAN_1
43,024,614 UART: [update-reset Success] --
43,027,787 UART: [state] Locking Datavault
43,031,493 UART: [state] Locking PCR0, PCR1 and PCR31
43,033,265 UART: [state] Locking ICCM
43,035,476 UART: [exit] Launching FMC @ 0x40000130
43,043,873 UART:
43,044,116 UART: Running Caliptra FMC ...
43,045,676 UART:
43,045,853 UART: [state] CFI Enabled
43,089,650 UART: [art] Extend RT PCRs Done
43,090,795 UART: [art] Lock RT PCRs Done
43,092,183 UART: [art] Populate DV Done
43,097,903 UART: [fht] FMC Alias Private Key: 7
43,099,539 UART: [art] Derive CDI
43,100,343 UART: [art] Store in slot 0x4
43,143,292 UART: [art] Derive Key Pair
43,144,336 UART: [art] Store priv key in slot 0x5
46,386,722 UART: [art] Derive Key Pair - Done
46,399,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,680,006 UART: [art] Erasing AUTHORITY.KEYID = 7
48,681,516 UART: [art] PUB.X = 9CD3BE1A9FF479DB173027B53E6C9059096D9199F7C269C487E723BCFBACF9BBF5D7B120A0283639D9E247D0395D08AD
48,688,830 UART: [art] PUB.Y = 8B4E52104491C95AA459AD2D6BDF663EE9490DDD78BB61FCE4D0D80D08361C20AC41AC2548AD71D61438E123D9AE656A
48,696,062 UART: [art] SIG.R = E88DFCCD5B933A7C66021DDC563E8EF875B7F1BA0F40746C35DCD90A5A40104F5CA0F5A1AE22B7C21862E295620DA583
48,703,454 UART: [art] SIG.S = B8DC8DC33AF735C95C85B44B6A0B8C1486FE4489C6E8407E68704DFD6DE5B3AEE1C7B1E682190FCCA4A68A952C3836E6
50,008,516 UART: Caliptra RT
50,009,236 UART: [state] CFI Enabled
50,382,143 UART: [rt] RT failed reset flow
50,383,334 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
4,127,725 ready_for_fw is high
4,128,363 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,420,675 >>> mbox cmd response: success
17,421,954 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
23,062,628 UART:
23,063,049 UART: Running Caliptra FMC ...
23,064,157 UART:
23,064,318 UART: [state] CFI Enabled
23,072,348 UART: [fht] FMC Alias Private Key: 7
25,412,483 UART: [art] Extend RT PCRs Done
25,413,713 UART: [art] Lock RT PCRs Done
25,415,500 UART: [art] Populate DV Done
25,420,810 UART: [fht] FMC Alias Private Key: 7
25,422,290 UART: [art] Derive CDI
25,423,102 UART: [art] Store in slot 0x4
25,465,262 UART: [art] Derive Key Pair
25,466,459 UART: [art] Store priv key in slot 0x5
28,708,205 UART: [art] Derive Key Pair - Done
28,721,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,000,891 UART: [art] Erasing AUTHORITY.KEYID = 7
31,002,456 UART: [art] PUB.X = BF1FE562E594FE7CC064D4A42B4A84AE2373E5AAD8F73A97AB60CFE3A5694E890A5CC290CE05FAA863C40233F3563B62
31,009,675 UART: [art] PUB.Y = 6F84DE00237509FD6F16EBCD40622F986C6E256DCDEB80AA79ECA6D7EAA0D56E6A1508BAA2BCDD673CE780B1BA28C37A
31,016,976 UART: [art] SIG.R = 1B0E4E163FABE70B7AF85EC64DD00D3F34DAECE54D1815A9B0A7EC1F8877A5D71DF417A3B80A7A4067337F64D52C7323
31,024,361 UART: [art] SIG.S = 3BED5E4247F6880F2F36EABB7321EB0AF0BAEC5D8BBF3659F3113C60279D7ECF7147E6BCD43C4C84320E30C8C3881122
32,329,214 UART: mbox::rt_entry...
32,330,177 UART: ____ _ _ _ ____ _____
32,332,160 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,334,162 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,336,089 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,338,073 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,339,930 UART: |_|
32,340,723 UART:
32,472,393 UART: [rt] Runtime listening for mailbox commands...
32,474,420 >>> mbox cmd response data (0 bytes)
34,547,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,303,926 >>> mbox cmd response: success
43,339,303 UART:
43,339,664 UART: Running Caliptra FMC ...
43,340,718 UART:
43,340,867 UART: [state] CFI Enabled
43,385,212 UART: [art] Extend RT PCRs Done
43,386,568 UART: [art] Lock RT PCRs Done
43,387,949 UART: [art] Populate DV Done
43,393,681 UART: [fht] FMC Alias Private Key: 7
43,395,374 UART: [art] Derive CDI
43,396,107 UART: [art] Store in slot 0x4
43,439,130 UART: [art] Derive Key Pair
43,440,120 UART: [art] Store priv key in slot 0x5
46,682,408 UART: [art] Derive Key Pair - Done
46,695,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,975,738 UART: [art] Erasing AUTHORITY.KEYID = 7
48,977,250 UART: [art] PUB.X = 6EA274634E728AD6B2BD300DCA869A282E0960E57578AE176D23F7520E33D04A8F6E83969266272E917229621542A571
48,984,468 UART: [art] PUB.Y = 5FC9F43D08D463BA2F7C405171306C1867B40006EA8DC8C44805FD9F1013DA08A30EBFC53CCA20B60720C37EF5EDB932
48,991,722 UART: [art] SIG.R = 9A457A84D98C4BADAD5C6833643A79A111D02E2BDFE407376B7BFB4CEA7C3A342FF7A60490A86276F508D094F69BC5DF
48,999,145 UART: [art] SIG.S = 8BDF1C38BD3449D5A1879F8F67E6C6B78AFAB1AAE833BD22C3778FC384A96B994CB426C2C329B8981CAB6CF45A86D9CE
50,304,704 UART: Caliptra RT
50,305,426 UART: [state] CFI Enabled
50,675,077 UART: [rt] RT failed reset flow
50,676,278 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,176 UART:
192,544 UART: Running Caliptra ROM ...
193,728 UART:
193,877 UART: [state] CFI Enabled
263,844 UART: [state] LifecycleState = Unprovisioned
265,749 UART: [state] DebugLocked = No
268,412 UART: [state] WD Timer not started. Device not locked for debugging
271,941 UART: [kat] SHA2-256
451,583 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,338 UART: [kat] ++
462,959 UART: [kat] sha1
474,120 UART: [kat] SHA2-256
476,863 UART: [kat] SHA2-384
482,534 UART: [kat] SHA2-512-ACC
484,905 UART: [kat] ECC-384
2,946,665 UART: [kat] HMAC-384Kdf
2,970,624 UART: [kat] LMS
3,447,183 UART: [kat] --
3,451,525 UART: [cold-reset] ++
3,453,236 UART: [fht] FHT @ 0x50003400
3,465,129 UART: [idev] ++
3,465,695 UART: [idev] CDI.KEYID = 6
3,466,724 UART: [idev] SUBJECT.KEYID = 7
3,467,890 UART: [idev] UDS.KEYID = 0
3,468,813 ready_for_fw is high
3,469,001 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,573,284 UART: [idev] Erasing UDS.KEYID = 0
5,986,736 UART: [idev] Sha1 KeyId Algorithm
6,011,035 UART: [idev] --
6,015,174 UART: [ldev] ++
6,015,751 UART: [ldev] CDI.KEYID = 6
6,016,631 UART: [ldev] SUBJECT.KEYID = 5
6,017,901 UART: [ldev] AUTHORITY.KEYID = 7
6,019,134 UART: [ldev] FE.KEYID = 1
6,057,674 UART: [ldev] Erasing FE.KEYID = 1
8,566,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,144 UART: [ldev] --
10,375,212 UART: [fwproc] Wait for Commands...
10,377,376 UART: [fwproc] Recv command 0x46574c44
10,379,358 UART: [fwproc] Recv'd Img size: 82832 bytes
13,422,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,503,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,576,258 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,779,006 >>> mbox cmd response: success
13,780,111 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
13,782,554 UART: [afmc] ++
13,783,140 UART: [afmc] CDI.KEYID = 6
13,784,105 UART: [afmc] SUBJECT.KEYID = 7
13,785,322 UART: [afmc] AUTHORITY.KEYID = 5
16,316,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,043,516 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,045,745 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,061,537 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,077,615 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,093,193 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,117,391 UART: [afmc] --
18,120,651 UART: [cold-reset] --
18,124,180 UART: [state] Locking Datavault
18,129,584 UART: [state] Locking PCR0, PCR1 and PCR31
18,131,329 UART: [state] Locking ICCM
18,132,344 UART: [exit] Launching FMC @ 0x40000130
18,140,784 UART:
18,141,014 UART: Running Caliptra FMC ...
18,142,111 UART:
18,142,267 UART: [state] CFI Enabled
18,200,228 UART: [fht] FMC Alias Private Key: 7
19,966,457 UART: [art] Extend RT PCRs Done
19,967,678 UART: [art] Lock RT PCRs Done
19,969,198 UART: [art] Populate DV Done
19,974,607 UART: [fht] FMC Alias Private Key: 7
19,976,320 UART: [art] Derive CDI
19,977,129 UART: [art] Store in slot 0x4
20,033,167 UART: [art] Derive Key Pair
20,034,208 UART: [art] Store priv key in slot 0x5
22,497,609 UART: [art] Derive Key Pair - Done
22,510,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,223,333 UART: [art] Erasing AUTHORITY.KEYID = 7
24,224,826 UART: [art] PUB.X = 60500E109C131C4BE4F6D3B01798C5A610D85272CCB269F1A749871712F9B757EB91F36C09EB1D2450F0B5E257F99EBF
24,232,126 UART: [art] PUB.Y = E4EDF045B8836BFD57F6E403E7F625D43F12AD13676689CF96DFF07EF3F93AF770CCCA651D7A0369188620323427B9E9
24,239,392 UART: [art] SIG.R = 9114E2A34E3CE824DDBB67C4046914EB8402A60D37AE015605BE1C480D3B6B09AF8EFD395CF93812BA259A87EBAE77D6
24,246,804 UART: [art] SIG.S = 9441F27D43F571DD7F5591A71B740C77E0F084F1E1D5E2E0E29F85E7D83570BCCF94FEBA80FE29C8EE54A9AA1616BAA5
25,225,423 UART: mbox::rt_entry...
25,226,385 UART: ____ _ _ _ ____ _____
25,228,366 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,230,366 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,232,302 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,234,251 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,236,180 UART: |_|
25,236,986 UART:
25,366,982 UART: [rt] Runtime listening for mailbox commands...
25,368,989 >>> mbox cmd response data (0 bytes)
27,441,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,591,037 UART:
27,591,411 UART: Running Caliptra ROM ...
27,592,535 UART:
27,592,697 UART: [state] CFI Enabled
27,655,058 UART: [state] LifecycleState = Unprovisioned
27,656,994 UART: [state] DebugLocked = No
27,659,188 UART: [state] WD Timer not started. Device not locked for debugging
27,662,282 UART: [kat] SHA2-256
27,841,943 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,852,737 UART: [kat] ++
27,853,232 UART: [kat] sha1
27,864,438 UART: [kat] SHA2-256
27,867,122 UART: [kat] SHA2-384
27,872,564 UART: [kat] SHA2-512-ACC
27,874,904 UART: [kat] ECC-384
30,319,271 UART: [kat] HMAC-384Kdf
30,341,929 UART: [kat] LMS
30,818,415 UART: [kat] --
30,820,999 UART: [update-reset] ++
34,303,599 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,307,206 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,704,810 >>> mbox cmd response: success
34,709,362 UART: [update-reset] Copying MAN_2 To MAN_1
34,743,626 UART: [update-reset Success] --
34,749,811 UART: [state] Locking Datavault
34,754,096 UART: [state] Locking PCR0, PCR1 and PCR31
34,755,809 UART: [state] Locking ICCM
34,758,559 UART: [exit] Launching FMC @ 0x40000130
34,766,947 UART:
34,767,178 UART: Running Caliptra FMC ...
34,768,272 UART:
34,768,423 UART: [state] CFI Enabled
34,856,836 UART: [art] Extend RT PCRs Done
34,858,035 UART: [art] Lock RT PCRs Done
34,859,546 UART: [art] Populate DV Done
34,865,003 UART: [fht] FMC Alias Private Key: 7
34,866,709 UART: [art] Derive CDI
34,867,523 UART: [art] Store in slot 0x4
34,925,954 UART: [art] Derive Key Pair
34,927,000 UART: [art] Store priv key in slot 0x5
37,389,879 UART: [art] Derive Key Pair - Done
37,402,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,115,401 UART: [art] Erasing AUTHORITY.KEYID = 7
39,117,025 UART: [art] PUB.X = 1EF2BF502196C83E927277F0D1D402BA8F319054E40FF6190F11591470A68422F9952435C5A404ABA57D9E46DE2E6E04
39,124,132 UART: [art] PUB.Y = 6E17A468023657C1DD0329AA4A787CC0907EBB03740048F861F4CC749C73E68B4CFB5DA93E0C0D349D2575BA8E008353
39,131,373 UART: [art] SIG.R = E40AC43DE87D43176CDDB05E8606AE1A06C03C27D18774AC7AE64EBE244F6EB5981B873DCBA6CABEB10B552D84226638
39,138,768 UART: [art] SIG.S = D129456C373ED7CDEF7E9FE22BD102DDDA038C6726183C70E55CD9F44A81A6A50D7D1F34CFB16AA0E98D6F2017199D20
40,117,658 UART: Caliptra RT
40,118,446 UART: [state] CFI Enabled
40,541,342 UART: [rt] RT failed reset flow
40,542,542 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,461,462 ready_for_fw is high
3,461,852 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,661,856 >>> mbox cmd response: success
13,662,959 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
17,957,835 UART:
17,958,238 UART: Running Caliptra FMC ...
17,959,375 UART:
17,959,533 UART: [state] CFI Enabled
18,024,534 UART: [fht] FMC Alias Private Key: 7
19,790,844 UART: [art] Extend RT PCRs Done
19,792,055 UART: [art] Lock RT PCRs Done
19,793,577 UART: [art] Populate DV Done
19,798,830 UART: [fht] FMC Alias Private Key: 7
19,800,587 UART: [art] Derive CDI
19,801,397 UART: [art] Store in slot 0x4
19,857,860 UART: [art] Derive Key Pair
19,858,905 UART: [art] Store priv key in slot 0x5
22,321,334 UART: [art] Derive Key Pair - Done
22,334,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,047,990 UART: [art] Erasing AUTHORITY.KEYID = 7
24,049,515 UART: [art] PUB.X = 2C170F421AA98F4B3F43B6A1BB367609362D7A44A30276A95677F442640D2FC047296FDB6FBDA53C5EF5ED215A1700E0
24,056,769 UART: [art] PUB.Y = BFC54F8D93CBFFD7005A91E559EA515E1D6BB1274FE686437F5F66CDAC219B86515DD09A2EA5CB64D218F0A765424CA2
24,064,014 UART: [art] SIG.R = 1DC85A00CED22EBF031A6737321F6A889991B65D6B13D571EA58B93BA280CB5DF313DD7139B3DAAEF3C3C304CD2A27C4
24,071,474 UART: [art] SIG.S = F550D509D858C3BA671C0BF02FBC12D3149AC1BF723B24ACFAEA3EA4049F34ECA75577E6AE96E7E80D9FA566CFCA41BF
25,050,047 UART: mbox::rt_entry...
25,051,016 UART: ____ _ _ _ ____ _____
25,053,007 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,055,018 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,056,958 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,058,956 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,060,888 UART: |_|
25,061,697 UART:
25,192,999 UART: [rt] Runtime listening for mailbox commands...
25,195,013 >>> mbox cmd response data (0 bytes)
27,250,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,553,503 >>> mbox cmd response: success
34,589,129 UART:
34,589,425 UART: Running Caliptra FMC ...
34,590,542 UART:
34,590,714 UART: [state] CFI Enabled
34,678,472 UART: [art] Extend RT PCRs Done
34,679,657 UART: [art] Lock RT PCRs Done
34,680,951 UART: [art] Populate DV Done
34,686,517 UART: [fht] FMC Alias Private Key: 7
34,688,019 UART: [art] Derive CDI
34,688,840 UART: [art] Store in slot 0x4
34,747,823 UART: [art] Derive Key Pair
34,748,876 UART: [art] Store priv key in slot 0x5
37,211,809 UART: [art] Derive Key Pair - Done
37,224,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,937,430 UART: [art] Erasing AUTHORITY.KEYID = 7
38,938,949 UART: [art] PUB.X = C5135921B1213B7ECF777EED2122889A014EBF0A955EBD12CFE22AA8E27ADF304C47B44EDF98B9ACC98AD7EB627DFE2D
38,946,286 UART: [art] PUB.Y = E9535EC933DD93D0484B4AC9976CFE837A399863FFC0730B7E21D8F3811FFDF6AE9D6BCA1BC2DD477ACB597180973B5D
38,953,551 UART: [art] SIG.R = 3CCD34D844A70C0F3BD134E537E1C0DBF0252702524634C744CA057380BC0FBEA95617E29E0DA340C4CD53CF8A66C2D8
38,960,944 UART: [art] SIG.S = 7A2BE30EA69A52F2C654950D5BEAE6B54B73C97EAFC0175574783A69EC4031D38290DED0B1ED5353067811EC15A77646
39,940,370 UART: Caliptra RT
39,941,087 UART: [state] CFI Enabled
40,354,258 UART: [rt] RT failed reset flow
40,355,451 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,539 UART:
192,904 UART: Running Caliptra ROM ...
194,030 UART:
603,734 UART: [state] CFI Enabled
617,507 UART: [state] LifecycleState = Unprovisioned
619,491 UART: [state] DebugLocked = No
622,306 UART: [state] WD Timer not started. Device not locked for debugging
625,984 UART: [kat] SHA2-256
805,663 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,449 UART: [kat] ++
816,910 UART: [kat] sha1
827,247 UART: [kat] SHA2-256
829,906 UART: [kat] SHA2-384
834,902 UART: [kat] SHA2-512-ACC
837,271 UART: [kat] ECC-384
3,279,830 UART: [kat] HMAC-384Kdf
3,292,149 UART: [kat] LMS
3,768,608 UART: [kat] --
3,773,026 UART: [cold-reset] ++
3,774,891 UART: [fht] FHT @ 0x50003400
3,786,505 UART: [idev] ++
3,787,092 UART: [idev] CDI.KEYID = 6
3,788,064 UART: [idev] SUBJECT.KEYID = 7
3,789,241 UART: [idev] UDS.KEYID = 0
3,790,172 ready_for_fw is high
3,790,406 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,894,558 UART: [idev] Erasing UDS.KEYID = 0
6,263,069 UART: [idev] Sha1 KeyId Algorithm
6,286,079 UART: [idev] --
6,291,746 UART: [ldev] ++
6,292,321 UART: [ldev] CDI.KEYID = 6
6,293,204 UART: [ldev] SUBJECT.KEYID = 5
6,294,415 UART: [ldev] AUTHORITY.KEYID = 7
6,295,699 UART: [ldev] FE.KEYID = 1
6,307,480 UART: [ldev] Erasing FE.KEYID = 1
8,782,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,425 UART: [ldev] --
10,576,546 UART: [fwproc] Wait for Commands...
10,579,729 UART: [fwproc] Recv command 0x46574c44
10,581,717 UART: [fwproc] Recv'd Img size: 82832 bytes
13,629,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,710,035 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,783,048 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,985,741 >>> mbox cmd response: success
13,986,284 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
13,989,909 UART: [afmc] ++
13,990,491 UART: [afmc] CDI.KEYID = 6
13,991,458 UART: [afmc] SUBJECT.KEYID = 7
13,992,617 UART: [afmc] AUTHORITY.KEYID = 5
16,497,437 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,219,892 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,222,079 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,237,903 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,253,952 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,269,542 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,293,911 UART: [afmc] --
18,297,293 UART: [cold-reset] --
18,299,804 UART: [state] Locking Datavault
18,305,105 UART: [state] Locking PCR0, PCR1 and PCR31
18,306,860 UART: [state] Locking ICCM
18,309,659 UART: [exit] Launching FMC @ 0x40000130
18,318,056 UART:
18,318,298 UART: Running Caliptra FMC ...
18,319,400 UART:
18,319,562 UART: [state] CFI Enabled
18,327,852 UART: [fht] FMC Alias Private Key: 7
20,093,587 UART: [art] Extend RT PCRs Done
20,094,967 UART: [art] Lock RT PCRs Done
20,096,602 UART: [art] Populate DV Done
20,102,168 UART: [fht] FMC Alias Private Key: 7
20,103,694 UART: [art] Derive CDI
20,104,467 UART: [art] Store in slot 0x4
20,147,232 UART: [art] Derive Key Pair
20,148,226 UART: [art] Store priv key in slot 0x5
22,575,511 UART: [art] Derive Key Pair - Done
22,588,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,294,317 UART: [art] Erasing AUTHORITY.KEYID = 7
24,295,815 UART: [art] PUB.X = 6D391C88365F601C807BD025B706615E8BBB67A7973A9076587705F01182550BFB40CBAAFE924508A43BEF0B867419AB
24,303,056 UART: [art] PUB.Y = 997908B03E1ABFBC259B0D675D672D60C3157B186B0029F83AAF64BE048F77B847F02E4B0E12A1EE29BBCBFA9594C05D
24,310,335 UART: [art] SIG.R = 6F976A3A29BAC4A1B03C9DCF77A422CFA55AE057FD6F1699E5BE7FFDDDCF360B0023A478017B45C43F64535A885B38CC
24,317,717 UART: [art] SIG.S = EE2948F22610ECEBC314FB4CF369209BA01B15D568E73C3C22DE6CCF871AC56C7BB151559F2FF318CD4B49EBE07EA219
25,296,101 UART: mbox::rt_entry...
25,297,055 UART: ____ _ _ _ ____ _____
25,298,986 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,300,991 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,302,850 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,304,771 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,306,655 UART: |_|
25,307,541 UART:
25,439,460 UART: [rt] Runtime listening for mailbox commands...
25,441,464 >>> mbox cmd response data (0 bytes)
27,500,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,650,495 UART:
27,650,858 UART: Running Caliptra ROM ...
27,651,944 UART:
27,652,108 UART: [state] CFI Enabled
27,664,659 UART: [state] LifecycleState = Unprovisioned
27,666,564 UART: [state] DebugLocked = No
27,669,353 UART: [state] WD Timer not started. Device not locked for debugging
27,672,782 UART: [kat] SHA2-256
27,852,480 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,863,285 UART: [kat] ++
27,863,837 UART: [kat] sha1
27,875,323 UART: [kat] SHA2-256
27,878,023 UART: [kat] SHA2-384
27,883,367 UART: [kat] SHA2-512-ACC
27,885,719 UART: [kat] ECC-384
30,328,820 UART: [kat] HMAC-384Kdf
30,340,942 UART: [kat] LMS
30,817,430 UART: [kat] --
30,824,443 UART: [update-reset] ++
34,324,320 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,327,800 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,725,416 >>> mbox cmd response: success
34,730,233 UART: [update-reset] Copying MAN_2 To MAN_1
34,762,900 UART: [update-reset Success] --
34,766,551 UART: [state] Locking Datavault
34,770,298 UART: [state] Locking PCR0, PCR1 and PCR31
34,772,013 UART: [state] Locking ICCM
34,773,983 UART: [exit] Launching FMC @ 0x40000130
34,782,334 UART:
34,782,573 UART: Running Caliptra FMC ...
34,783,677 UART:
34,783,840 UART: [state] CFI Enabled
34,827,924 UART: [art] Extend RT PCRs Done
34,829,113 UART: [art] Lock RT PCRs Done
34,830,519 UART: [art] Populate DV Done
34,836,142 UART: [fht] FMC Alias Private Key: 7
34,837,800 UART: [art] Derive CDI
34,838,565 UART: [art] Store in slot 0x4
34,881,041 UART: [art] Derive Key Pair
34,882,055 UART: [art] Store priv key in slot 0x5
37,309,069 UART: [art] Derive Key Pair - Done
37,322,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,028,107 UART: [art] Erasing AUTHORITY.KEYID = 7
39,029,636 UART: [art] PUB.X = 914D92480A63E17D242F48E456269B20D0682691757EA558BC422CA7C35D24DDCD3856583EBFBAB04C1C15EAC2531905
39,036,841 UART: [art] PUB.Y = D2F933DA13A963CC454ACA7726400EE4515780BB31BAA9CD11396196165E912B5B95033F4093ECEBA31850AA1FFAA4B8
39,044,130 UART: [art] SIG.R = A2166D07C8B324085F5B6AB259326470D8999375DD3CBF2B14732EA228064AB5EAA972ED48DB90ACCF61542CC4906AE2
39,051,573 UART: [art] SIG.S = 6203773739D6D11DB1642D4495223F61E2D5CD6FA97D17ABF25AFBD029C12EE4C698C1333193DE664457CE6149CD7B0C
40,030,447 UART: Caliptra RT
40,031,152 UART: [state] CFI Enabled
40,405,889 UART: [rt] RT failed reset flow
40,407,094 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,776,784 ready_for_fw is high
3,777,429 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,869,218 >>> mbox cmd response: success
13,869,868 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
18,119,714 UART:
18,120,102 UART: Running Caliptra FMC ...
18,121,256 UART:
18,121,418 UART: [state] CFI Enabled
18,129,101 UART: [fht] FMC Alias Private Key: 7
19,895,499 UART: [art] Extend RT PCRs Done
19,896,699 UART: [art] Lock RT PCRs Done
19,898,480 UART: [art] Populate DV Done
19,904,075 UART: [fht] FMC Alias Private Key: 7
19,905,578 UART: [art] Derive CDI
19,906,342 UART: [art] Store in slot 0x4
19,949,091 UART: [art] Derive Key Pair
19,950,152 UART: [art] Store priv key in slot 0x5
22,377,264 UART: [art] Derive Key Pair - Done
22,390,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,096,874 UART: [art] Erasing AUTHORITY.KEYID = 7
24,098,386 UART: [art] PUB.X = BADD89A407019804ACA2CA40F7392EBDB47DFADDAEB8FB31FBCDDC66317D7D13AA5594158CD19CDC762A4AE6F933EC68
24,105,723 UART: [art] PUB.Y = CA057C696076FCD08B5787B42335824142E041D201F4AB548C450A2A2A87FBBCCAE46FE02187E5D6656AA041BF52D030
24,112,933 UART: [art] SIG.R = 4F83B42A3DF44B38C5B3E38CF6CC3C72442422D1E44AF1F8D7FD28BB1416BCDB71777BDB7953246C05D7268A80ADFE35
24,120,337 UART: [art] SIG.S = 10C8FF471E12D73F447A999CAE9A02F256820645193EA3357E83AD4C7B5A42BA733AAC79A92A1B789673D21A3F9E73F1
25,098,817 UART: mbox::rt_entry...
25,099,786 UART: ____ _ _ _ ____ _____
25,101,772 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,103,781 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,105,737 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,107,744 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,109,603 UART: |_|
25,110,491 UART:
25,241,514 UART: [rt] Runtime listening for mailbox commands...
25,243,526 >>> mbox cmd response data (0 bytes)
27,298,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,522,509 >>> mbox cmd response: success
34,557,314 UART:
34,557,618 UART: Running Caliptra FMC ...
34,558,713 UART:
34,558,880 UART: [state] CFI Enabled
34,603,088 UART: [art] Extend RT PCRs Done
34,604,292 UART: [art] Lock RT PCRs Done
34,605,919 UART: [art] Populate DV Done
34,611,505 UART: [fht] FMC Alias Private Key: 7
34,613,051 UART: [art] Derive CDI
34,613,872 UART: [art] Store in slot 0x4
34,656,686 UART: [art] Derive Key Pair
34,657,691 UART: [art] Store priv key in slot 0x5
37,084,381 UART: [art] Derive Key Pair - Done
37,097,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,804,187 UART: [art] Erasing AUTHORITY.KEYID = 7
38,805,716 UART: [art] PUB.X = FB1B95B144785C7EF1C0558DE1520F17C9FF886DF7207DBC6D4FDD39D5A45A43A0E6B10FF9F7143D318F475D97DDB332
38,812,924 UART: [art] PUB.Y = A0AD9F2CEDB72D929A84377237F2AAA450A6E1F333CDEC3783275655123664554096C28E2BE4D7A1C24994FF91CF8500
38,820,171 UART: [art] SIG.R = 2BF6BA16D701C9E7EFC057CB9ADE9020E203D3CE1901798FB8ED30C61E273BC576328F185114F54E1911E88DE89FFFC1
38,827,642 UART: [art] SIG.S = 92FB299298B1D678DF5BB3BCF9D082C6E2E77023808EA5E70208263401CE119F2EBD3DAB432C9D5494C6AC99C014F4DC
39,806,601 UART: Caliptra RT
39,807,303 UART: [state] CFI Enabled
40,177,615 UART: [rt] RT failed reset flow
40,178,812 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,003 UART:
192,380 UART: Running Caliptra ROM ...
193,551 UART:
193,707 UART: [state] CFI Enabled
267,944 UART: [state] LifecycleState = Unprovisioned
270,380 UART: [state] DebugLocked = No
272,550 UART: [state] WD Timer not started. Device not locked for debugging
276,432 UART: [kat] SHA2-256
466,306 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,052 UART: [kat] ++
477,550 UART: [kat] sha1
489,340 UART: [kat] SHA2-256
492,342 UART: [kat] SHA2-384
498,830 UART: [kat] SHA2-512-ACC
501,407 UART: [kat] ECC-384
2,948,993 UART: [kat] HMAC-384Kdf
2,970,534 UART: [kat] LMS
3,502,323 UART: [kat] --
3,506,887 UART: [cold-reset] ++
3,509,445 UART: [fht] FHT @ 0x50003400
3,522,052 UART: [idev] ++
3,522,776 UART: [idev] CDI.KEYID = 6
3,523,680 UART: [idev] SUBJECT.KEYID = 7
3,524,925 UART: [idev] UDS.KEYID = 0
3,525,828 ready_for_fw is high
3,526,023 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,630,257 UART: [idev] Erasing UDS.KEYID = 0
6,031,385 UART: [idev] Sha1 KeyId Algorithm
6,053,380 UART: [idev] --
6,057,134 UART: [ldev] ++
6,057,823 UART: [ldev] CDI.KEYID = 6
6,058,734 UART: [ldev] SUBJECT.KEYID = 5
6,059,895 UART: [ldev] AUTHORITY.KEYID = 7
6,061,126 UART: [ldev] FE.KEYID = 1
6,099,266 UART: [ldev] Erasing FE.KEYID = 1
8,607,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,708 UART: [ldev] --
10,413,485 UART: [fwproc] Wait for Commands...
10,416,446 UART: [fwproc] Recv command 0x46574c44
10,418,700 UART: [fwproc] Recv'd Img size: 82832 bytes
13,476,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,548,713 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,672,338 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,018,065 >>> mbox cmd response: success
14,019,270 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
14,021,402 UART: [afmc] ++
14,022,094 UART: [afmc] CDI.KEYID = 6
14,023,278 UART: [afmc] SUBJECT.KEYID = 7
14,024,761 UART: [afmc] AUTHORITY.KEYID = 5
16,552,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,274,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,276,890 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,292,036 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,307,157 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,322,041 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,345,483 UART: [afmc] --
18,349,716 UART: [cold-reset] --
18,353,951 UART: [state] Locking Datavault
18,359,839 UART: [state] Locking PCR0, PCR1 and PCR31
18,362,026 UART: [state] Locking ICCM
18,364,539 UART: [exit] Launching FMC @ 0x40000130
18,373,182 UART:
18,373,482 UART: Running Caliptra FMC ...
18,374,517 UART:
18,374,666 UART: [state] CFI Enabled
18,435,091 UART: [fht] FMC Alias Private Key: 7
20,202,026 UART: [art] Extend RT PCRs Done
20,203,242 UART: [art] Lock RT PCRs Done
20,204,726 UART: [art] Populate DV Done
20,210,518 UART: [fht] FMC Alias Private Key: 7
20,212,093 UART: [art] Derive CDI
20,212,833 UART: [art] Store in slot 0x4
20,268,278 UART: [art] Derive Key Pair
20,269,276 UART: [art] Store priv key in slot 0x5
22,732,560 UART: [art] Derive Key Pair - Done
22,745,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,458,742 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,228 UART: [art] PUB.X = E8201A34660B35BE03B85515AA7F179735DDF09923E9738D806AAFDD96AA23249C07082010B9B746C9EFA57B62B4B6C0
24,467,494 UART: [art] PUB.Y = B9778460B0A969AA48DFCE451662C34A12FD025864CFC3B956DAC9A25056919D582D3E5F1CD7B58979DEDEB3352F9859
24,474,808 UART: [art] SIG.R = 7F62ED7D408F7BB430455E9EC126EE6556770990C467DFDA6446122EB59C8DD8BDE6CAC67BD4966E19E3F54745E2F007
24,482,164 UART: [art] SIG.S = 8F877A00914F20F3139A8DE906D007D70F5DB042AA4E5A459779FD21DDCC32ED90D23591F15A12D8BB4F020F6BA5C3C1
25,460,837 UART: mbox::rt_entry...
25,461,804 UART: ____ _ _ _ ____ _____
25,463,731 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,465,737 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,467,668 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,469,599 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,471,524 UART: |_|
25,472,357 UART:
25,603,717 UART: [rt] Runtime listening for mailbox commands...
25,605,752 >>> mbox cmd response data (0 bytes)
27,669,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,819,039 UART:
27,819,424 UART: Running Caliptra ROM ...
27,820,504 UART:
27,820,667 UART: [state] CFI Enabled
27,890,506 UART: [state] LifecycleState = Unprovisioned
27,892,566 UART: [state] DebugLocked = No
27,894,983 UART: [state] WD Timer not started. Device not locked for debugging
27,899,154 UART: [kat] SHA2-256
28,088,992 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,099,797 UART: [kat] ++
28,100,279 UART: [kat] sha1
28,110,950 UART: [kat] SHA2-256
28,113,923 UART: [kat] SHA2-384
28,120,515 UART: [kat] SHA2-512-ACC
28,123,143 UART: [kat] ECC-384
30,578,362 UART: [kat] HMAC-384Kdf
30,598,368 UART: [kat] LMS
31,129,945 UART: [kat] --
31,133,474 UART: [update-reset] ++
34,641,642 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,644,696 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,274,447 >>> mbox cmd response: success
35,279,059 UART: [update-reset] Copying MAN_2 To MAN_1
35,313,685 UART: [update-reset Success] --
35,317,558 UART: [state] Locking Datavault
35,321,041 UART: [state] Locking PCR0, PCR1 and PCR31
35,323,195 UART: [state] Locking ICCM
35,325,263 UART: [exit] Launching FMC @ 0x40000130
35,333,884 UART:
35,334,166 UART: Running Caliptra FMC ...
35,335,277 UART:
35,335,442 UART: [state] CFI Enabled
35,430,687 UART: [art] Extend RT PCRs Done
35,431,886 UART: [art] Lock RT PCRs Done
35,433,189 UART: [art] Populate DV Done
35,438,652 UART: [fht] FMC Alias Private Key: 7
35,440,349 UART: [art] Derive CDI
35,441,157 UART: [art] Store in slot 0x4
35,500,044 UART: [art] Derive Key Pair
35,501,088 UART: [art] Store priv key in slot 0x5
37,963,630 UART: [art] Derive Key Pair - Done
37,976,897 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,689,385 UART: [art] Erasing AUTHORITY.KEYID = 7
39,690,913 UART: [art] PUB.X = F8CCF292D97A2A999B10DB69CC2DAC7D3F2806969011F9DD1ADA245D61672C61F62E1666989DED349D8B230F28F933F9
39,698,194 UART: [art] PUB.Y = 3581D482A351F035050EE8970DA935178DB903989915297F44C616F5461529DE1CF8421C1D5AAC918684CF576F2D0C5F
39,705,405 UART: [art] SIG.R = EAD3AE22B576763C87914F707179F5F4705867D6F2BDAE0B28D2F7FBE892149C18CC4FBD4E2B383210F2CD2B46391C36
39,712,787 UART: [art] SIG.S = 5DA7E86D12F66D736607DD4B3AB8E43CF93E3DA173F6AB37024BE4A856DAD48021BDB07BB03F50397EADED7B4A90F66E
40,691,669 UART: Caliptra RT
40,692,375 UART: [state] CFI Enabled
41,107,877 UART: [rt] RT failed reset flow
41,109,093 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,438,192 ready_for_fw is high
3,438,686 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,034,012 >>> mbox cmd response: success
14,035,207 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
18,321,254 UART:
18,321,630 UART: Running Caliptra FMC ...
18,322,826 UART:
18,322,989 UART: [state] CFI Enabled
18,389,212 UART: [fht] FMC Alias Private Key: 7
20,155,397 UART: [art] Extend RT PCRs Done
20,156,627 UART: [art] Lock RT PCRs Done
20,158,254 UART: [art] Populate DV Done
20,163,673 UART: [fht] FMC Alias Private Key: 7
20,165,269 UART: [art] Derive CDI
20,166,006 UART: [art] Store in slot 0x4
20,222,097 UART: [art] Derive Key Pair
20,223,120 UART: [art] Store priv key in slot 0x5
22,685,966 UART: [art] Derive Key Pair - Done
22,698,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,411,374 UART: [art] Erasing AUTHORITY.KEYID = 7
24,412,885 UART: [art] PUB.X = 2566138037763504BF8327D1BA98DDB26705BCCD2C411F7D33EF4972803FA6AA564549C314717CCAD1B884C975BF231E
24,420,094 UART: [art] PUB.Y = 2D1737171E25F45F85D5441F11204BD5C514D699FA42EE5BC52951A43FD3327D39048FF4A8E8D84769BB35579BD7F7B2
24,427,346 UART: [art] SIG.R = A47A067DEF3FD65DE40B913297AF086E167660E2E7E6A976F908EF0737367B7848777309C448D3D38E9745A4705C9C9C
24,434,685 UART: [art] SIG.S = 232CDC7790992CC2F93A1309CC563FA0B15B2F9DAD22BBE46E6084264400A4BB15F6939E16C94A8F57E19A115AC3659E
25,413,209 UART: mbox::rt_entry...
25,414,174 UART: ____ _ _ _ ____ _____
25,416,158 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,418,161 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,420,087 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,422,078 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,424,011 UART: |_|
25,424,824 UART:
25,556,028 UART: [rt] Runtime listening for mailbox commands...
25,558,039 >>> mbox cmd response data (0 bytes)
27,621,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,516,906 >>> mbox cmd response: success
35,551,273 UART:
35,551,601 UART: Running Caliptra FMC ...
35,552,727 UART:
35,552,896 UART: [state] CFI Enabled
35,659,402 UART: [art] Extend RT PCRs Done
35,660,595 UART: [art] Lock RT PCRs Done
35,661,894 UART: [art] Populate DV Done
35,667,733 UART: [fht] FMC Alias Private Key: 7
35,669,290 UART: [art] Derive CDI
35,670,316 UART: [art] Store in slot 0x4
35,728,340 UART: [art] Derive Key Pair
35,729,345 UART: [art] Store priv key in slot 0x5
38,192,256 UART: [art] Derive Key Pair - Done
38,204,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,917,167 UART: [art] Erasing AUTHORITY.KEYID = 7
39,918,687 UART: [art] PUB.X = 63EC0319BBC0A129D63EA75A0F82D6AC03CAB30EADF4BEC6BF56C9E2A62A83AF5B61B79361F23FF20EF7B15D78EE42E1
39,925,976 UART: [art] PUB.Y = 565A36C29B87007D7A43CB3DCD7696DA22B6CB4E2761EC4B3C3D9C88026833059D8F721C7D607DD22936DDC490F94299
39,933,189 UART: [art] SIG.R = 75F64C673D595558E52D8544FE4E86CA490411867389B4ABDDD9BF31420F39D86B7DEECF082054D25D5A9524C2C32E7A
39,940,559 UART: [art] SIG.S = 0B80886E6596FEE9C3365F959D2E3A110A55454043A60E32FB7602F870796830767A8F2E27AF6A72C075A15C49F60C05
40,919,386 UART: Caliptra RT
40,920,081 UART: [state] CFI Enabled
41,337,876 UART: [rt] RT failed reset flow
41,339,068 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,318 UART:
192,700 UART: Running Caliptra ROM ...
193,842 UART:
603,562 UART: [state] CFI Enabled
613,276 UART: [state] LifecycleState = Unprovisioned
615,660 UART: [state] DebugLocked = No
617,335 UART: [state] WD Timer not started. Device not locked for debugging
621,594 UART: [kat] SHA2-256
811,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
822,313 UART: [kat] ++
822,788 UART: [kat] sha1
834,300 UART: [kat] SHA2-256
837,309 UART: [kat] SHA2-384
844,282 UART: [kat] SHA2-512-ACC
846,841 UART: [kat] ECC-384
3,290,976 UART: [kat] HMAC-384Kdf
3,304,074 UART: [kat] LMS
3,835,912 UART: [kat] --
3,841,500 UART: [cold-reset] ++
3,842,731 UART: [fht] FHT @ 0x50003400
3,855,659 UART: [idev] ++
3,856,305 UART: [idev] CDI.KEYID = 6
3,857,291 UART: [idev] SUBJECT.KEYID = 7
3,858,477 UART: [idev] UDS.KEYID = 0
3,859,406 ready_for_fw is high
3,859,616 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,963,845 UART: [idev] Erasing UDS.KEYID = 0
6,333,734 UART: [idev] Sha1 KeyId Algorithm
6,357,128 UART: [idev] --
6,362,748 UART: [ldev] ++
6,363,648 UART: [ldev] CDI.KEYID = 6
6,364,576 UART: [ldev] SUBJECT.KEYID = 5
6,365,691 UART: [ldev] AUTHORITY.KEYID = 7
6,366,872 UART: [ldev] FE.KEYID = 1
6,378,335 UART: [ldev] Erasing FE.KEYID = 1
8,856,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,893 UART: [ldev] --
10,648,029 UART: [fwproc] Wait for Commands...
10,650,455 UART: [fwproc] Recv command 0x46574c44
10,652,771 UART: [fwproc] Recv'd Img size: 82832 bytes
13,708,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,783,182 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,906,791 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,253,289 >>> mbox cmd response: success
14,254,310 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
14,256,808 UART: [afmc] ++
14,257,508 UART: [afmc] CDI.KEYID = 6
14,258,699 UART: [afmc] SUBJECT.KEYID = 7
14,260,213 UART: [afmc] AUTHORITY.KEYID = 5
16,759,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,479,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,481,839 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,496,931 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,512,116 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,527,006 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,550,552 UART: [afmc] --
18,554,047 UART: [cold-reset] --
18,556,948 UART: [state] Locking Datavault
18,562,420 UART: [state] Locking PCR0, PCR1 and PCR31
18,564,621 UART: [state] Locking ICCM
18,567,529 UART: [exit] Launching FMC @ 0x40000130
18,576,211 UART:
18,576,449 UART: Running Caliptra FMC ...
18,577,554 UART:
18,577,734 UART: [state] CFI Enabled
18,585,571 UART: [fht] FMC Alias Private Key: 7
20,352,032 UART: [art] Extend RT PCRs Done
20,353,266 UART: [art] Lock RT PCRs Done
20,355,115 UART: [art] Populate DV Done
20,360,373 UART: [fht] FMC Alias Private Key: 7
20,361,969 UART: [art] Derive CDI
20,362,789 UART: [art] Store in slot 0x4
20,405,377 UART: [art] Derive Key Pair
20,406,394 UART: [art] Store priv key in slot 0x5
22,833,896 UART: [art] Derive Key Pair - Done
22,846,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,553,408 UART: [art] Erasing AUTHORITY.KEYID = 7
24,554,926 UART: [art] PUB.X = 30F60AFE09A129DE111947495F88982B29C54A7B9CC59DCD5277C0D218F29178D18556A4F50C1DD8C69B508B23A117EB
24,562,202 UART: [art] PUB.Y = 53AB6FCCD0792813763D00922FF4CF6EFD923352DCFB657675C3F175B639AB39315A644F98266F2579043F0B31D24D07
24,569,402 UART: [art] SIG.R = 7341F2EDD570EAA26B002945AC7C41F2E9D610D7E69981F33A989A949D6C3EE7AFF03236ABAF70D1AF9904FFC2208F51
24,576,835 UART: [art] SIG.S = 6F39422CA2E25004EC74E1E9AE41D891417E39E48597022426644522634E5676A16D1A9D9689B4B0FB3615C3AAC01B4C
25,555,044 UART: mbox::rt_entry...
25,556,022 UART: ____ _ _ _ ____ _____
25,558,012 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,560,025 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,561,959 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,564,097 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,566,045 UART: |_|
25,566,889 UART:
25,698,057 UART: [rt] Runtime listening for mailbox commands...
25,700,054 >>> mbox cmd response data (0 bytes)
27,768,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,918,592 UART:
27,918,985 UART: Running Caliptra ROM ...
27,920,132 UART:
27,920,304 UART: [state] CFI Enabled
27,934,318 UART: [state] LifecycleState = Unprovisioned
27,936,223 UART: [state] DebugLocked = No
27,938,260 UART: [state] WD Timer not started. Device not locked for debugging
27,943,196 UART: [kat] SHA2-256
28,133,093 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,143,856 UART: [kat] ++
28,144,463 UART: [kat] sha1
28,155,526 UART: [kat] SHA2-256
28,158,499 UART: [kat] SHA2-384
28,165,246 UART: [kat] SHA2-512-ACC
28,167,838 UART: [kat] ECC-384
30,611,338 UART: [kat] HMAC-384Kdf
30,625,368 UART: [kat] LMS
31,156,938 UART: [kat] --
31,161,250 UART: [update-reset] ++
34,673,264 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,677,409 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,307,170 >>> mbox cmd response: success
35,311,735 UART: [update-reset] Copying MAN_2 To MAN_1
35,345,046 UART: [update-reset Success] --
35,350,546 UART: [state] Locking Datavault
35,353,837 UART: [state] Locking PCR0, PCR1 and PCR31
35,356,021 UART: [state] Locking ICCM
35,357,760 UART: [exit] Launching FMC @ 0x40000130
35,366,463 UART:
35,366,706 UART: Running Caliptra FMC ...
35,367,740 UART:
35,367,894 UART: [state] CFI Enabled
35,412,079 UART: [art] Extend RT PCRs Done
35,413,298 UART: [art] Lock RT PCRs Done
35,414,791 UART: [art] Populate DV Done
35,420,314 UART: [fht] FMC Alias Private Key: 7
35,422,020 UART: [art] Derive CDI
35,422,840 UART: [art] Store in slot 0x4
35,465,601 UART: [art] Derive Key Pair
35,466,604 UART: [art] Store priv key in slot 0x5
37,893,021 UART: [art] Derive Key Pair - Done
37,906,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,612,603 UART: [art] Erasing AUTHORITY.KEYID = 7
39,614,108 UART: [art] PUB.X = 3D5B79413302D4C89BA70EAD352A35873F5E29A7CB5C022BA747118726C0D945E20E659803B1AE58FF3AFBBE28A552BD
39,621,386 UART: [art] PUB.Y = 6D8539D0DA7A9165D376E7470423314413CDE41263390D7A9C51301995AC543A6352E1A39AE05ED2A496FEB599DD221D
39,628,587 UART: [art] SIG.R = 5FED45D93E7133A5B8C7D23BC0966BDCB08F13C1B0466DF67C58FA6512CFDEDA09F377E6A0DCCCBD43440433D94668BA
39,635,965 UART: [art] SIG.S = 9892A4DD6D495C260C77900EB956FED19610A8767A426F2D79C35527D749C6977F592498AF20D0141699E5FC5B1536BF
40,614,972 UART: Caliptra RT
40,615,694 UART: [state] CFI Enabled
40,989,354 UART: [rt] RT failed reset flow
40,990,553 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,756,166 ready_for_fw is high
3,756,825 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,278,813 >>> mbox cmd response: success
14,279,983 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
18,531,637 UART:
18,532,037 UART: Running Caliptra FMC ...
18,533,171 UART:
18,533,330 UART: [state] CFI Enabled
18,541,392 UART: [fht] FMC Alias Private Key: 7
20,307,719 UART: [art] Extend RT PCRs Done
20,308,951 UART: [art] Lock RT PCRs Done
20,310,936 UART: [art] Populate DV Done
20,316,422 UART: [fht] FMC Alias Private Key: 7
20,317,918 UART: [art] Derive CDI
20,318,692 UART: [art] Store in slot 0x4
20,361,070 UART: [art] Derive Key Pair
20,362,076 UART: [art] Store priv key in slot 0x5
22,789,197 UART: [art] Derive Key Pair - Done
22,802,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,508,654 UART: [art] Erasing AUTHORITY.KEYID = 7
24,510,162 UART: [art] PUB.X = 5949DACE704EAE77116B9949D3F53FB4FC36FA802DBABBD28EB847905CCF49DD144FDC19FD945C971DEE7C841B3D4AA3
24,517,473 UART: [art] PUB.Y = 4593FEF2135966022226FBDE402E00D3ECB39297BB449435DF61EB953752543B4833E4363BFCDD980DD5176F11B40252
24,524,690 UART: [art] SIG.R = 0E3B3294D0918B935CB9C7EA2776FBE9DB58D5C0A1EDF369ABB7B02F697559066F9A44A23AA12A21E639644F99E3DCF2
24,532,118 UART: [art] SIG.S = B71FA1EF83B5D3B9AE709897F7046431341B834BD2AFE1CA00884E485C9974EAD23EFC9FDDFDF34AC794312814BDC773
25,510,640 UART: mbox::rt_entry...
25,511,609 UART: ____ _ _ _ ____ _____
25,513,598 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,515,613 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,517,554 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,519,556 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,521,501 UART: |_|
25,522,312 UART:
25,653,452 UART: [rt] Runtime listening for mailbox commands...
25,655,486 >>> mbox cmd response data (0 bytes)
27,720,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,547,684 >>> mbox cmd response: success
35,582,123 UART:
35,582,469 UART: Running Caliptra FMC ...
35,583,523 UART:
35,583,677 UART: [state] CFI Enabled
35,627,224 UART: [art] Extend RT PCRs Done
35,628,376 UART: [art] Lock RT PCRs Done
35,629,907 UART: [art] Populate DV Done
35,635,476 UART: [fht] FMC Alias Private Key: 7
35,636,966 UART: [art] Derive CDI
35,637,723 UART: [art] Store in slot 0x4
35,680,225 UART: [art] Derive Key Pair
35,681,269 UART: [art] Store priv key in slot 0x5
38,107,765 UART: [art] Derive Key Pair - Done
38,120,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,826,797 UART: [art] Erasing AUTHORITY.KEYID = 7
39,828,317 UART: [art] PUB.X = 0646610F13C655AC9B794C2BE1571B0BB7D6780E1BB417707C35B51783F12C2A20BAEEBCC661A083B6C5E9E623A9E742
39,835,554 UART: [art] PUB.Y = FD922CACA6E71C0BAA4E5BCAF707C05A4CEEFD01F6402A046C75A36394FE18D0708E561B7CED10176885376DFBDEB31E
39,842,832 UART: [art] SIG.R = 87646B5F5C4554A27B0830597084694F9CD3E82AFA56E9E930DFDF96836D755D460191F50CE8865FA4CF02CC9CBCB7D2
39,850,206 UART: [art] SIG.S = 90AAAD754C070C60A6104D4EC8F4E757D12C9512C9A32AEB9B739E059E1C44E772F3F459582A2A3F233F37C519066793
40,829,401 UART: Caliptra RT
40,830,118 UART: [state] CFI Enabled
41,203,725 UART: [rt] RT failed reset flow
41,204,927 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,775 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,485 UART: [kat] SHA2-256
882,416 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,531 UART: [kat] ++
886,683 UART: [kat] sha1
890,913 UART: [kat] SHA2-256
892,851 UART: [kat] SHA2-384
895,420 UART: [kat] SHA2-512-ACC
897,321 UART: [kat] ECC-384
902,594 UART: [kat] HMAC-384Kdf
907,266 UART: [kat] LMS
1,475,462 UART: [kat] --
1,476,547 UART: [cold-reset] ++
1,476,939 UART: [fht] Storing FHT @ 0x50003400
1,479,750 UART: [idev] ++
1,479,918 UART: [idev] CDI.KEYID = 6
1,480,278 UART: [idev] SUBJECT.KEYID = 7
1,480,702 UART: [idev] UDS.KEYID = 0
1,481,047 ready_for_fw is high
1,481,047 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,718 UART: [idev] Erasing UDS.KEYID = 0
1,504,578 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,078 UART: [idev] --
1,514,045 UART: [ldev] ++
1,514,213 UART: [ldev] CDI.KEYID = 6
1,514,576 UART: [ldev] SUBJECT.KEYID = 5
1,515,002 UART: [ldev] AUTHORITY.KEYID = 7
1,515,465 UART: [ldev] FE.KEYID = 1
1,520,253 UART: [ldev] Erasing FE.KEYID = 1
1,545,658 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,464 UART: [ldev] --
1,584,785 UART: [fwproc] Waiting for Commands...
1,585,468 UART: [fwproc] Received command 0x46574c44
1,586,259 UART: [fwproc] Received Image of size 82832 bytes
2,521,626 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,548,282 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,579,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,666,171 >>> mbox cmd response: success
2,666,171 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,667,203 UART: [afmc] ++
2,667,371 UART: [afmc] CDI.KEYID = 6
2,667,733 UART: [afmc] SUBJECT.KEYID = 7
2,668,158 UART: [afmc] AUTHORITY.KEYID = 5
2,703,065 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,719,041 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,719,821 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,725,530 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,731,413 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,737,096 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,745,010 UART: [afmc] --
2,746,078 UART: [cold-reset] --
2,747,038 UART: [state] Locking Datavault
2,748,095 UART: [state] Locking PCR0, PCR1 and PCR31
2,748,699 UART: [state] Locking ICCM
2,749,327 UART: [exit] Launching FMC @ 0x40000130
2,754,657 UART:
2,754,673 UART: Running Caliptra FMC ...
2,755,081 UART:
2,755,135 UART: [state] CFI Enabled
2,765,559 UART: [fht] FMC Alias Private Key: 7
2,884,419 UART: [art] Extend RT PCRs Done
2,884,847 UART: [art] Lock RT PCRs Done
2,886,189 UART: [art] Populate DV Done
2,894,356 UART: [fht] FMC Alias Private Key: 7
2,895,502 UART: [art] Derive CDI
2,895,782 UART: [art] Store in slot 0x4
2,981,270 UART: [art] Derive Key Pair
2,981,630 UART: [art] Store priv key in slot 0x5
2,994,169 UART: [art] Derive Key Pair - Done
3,008,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,194 UART: [art] PUB.X = 372E0720B7E0F2FDC762F0EBDF66E968DB9EAEA96AE3E9B2A865EE16BAEF7CF223FF6D00EAC780CCAB0AF39C45F3F6F0
3,031,970 UART: [art] PUB.Y = 8947D4081439E09BA9CA8B0644461177767A03485E29C34253995DEA43AD6E834CFCD514E5E2B750CFB7EED630D73AEE
3,038,915 UART: [art] SIG.R = 12716454B71CE7ACB7B23A34459BF653D80337CFEC0948D1307AC623063E685A28FF08E0D648A0E50A857C67E76FBE82
3,045,672 UART: [art] SIG.S = F4FAEFB0704DE3C55162E0F55FE447FFBFD2CAA502C5F3C6A6269D5DC23D73BB1FE4147483E6B9D89BCEA105976F93F5
3,068,976 UART: mbox::rt_entry...
3,069,348 UART: ____ _ _ _ ____ _____
3,070,132 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,070,932 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,071,700 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,072,468 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,073,236 UART: |_|
3,073,548 UART:
3,193,081 UART: [rt] Runtime listening for mailbox commands...
3,194,031 >>> mbox cmd response data (0 bytes)
3,194,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,194,146 UART:
3,194,162 UART: Running Caliptra ROM ...
3,194,570 UART:
3,194,624 UART: [state] CFI Enabled
3,197,028 UART: [state] LifecycleState = Unprovisioned
3,197,683 UART: [state] DebugLocked = No
3,198,189 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,199,762 UART: [kat] SHA2-256
3,993,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,997,808 UART: [kat] ++
3,997,960 UART: [kat] sha1
4,002,204 UART: [kat] SHA2-256
4,004,142 UART: [kat] SHA2-384
4,006,877 UART: [kat] SHA2-512-ACC
4,008,777 UART: [kat] ECC-384
4,014,428 UART: [kat] HMAC-384Kdf
4,018,930 UART: [kat] LMS
4,587,126 UART: [kat] --
4,587,883 UART: [update-reset] ++
5,969,043 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,970,137 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,125,404 >>> mbox cmd response: success
6,125,661 UART: [update-reset] Copying MAN_2 To MAN_1
6,133,675 UART: [update-reset Success] --
6,134,800 UART: [state] Locking Datavault
6,135,682 UART: [state] Locking PCR0, PCR1 and PCR31
6,136,286 UART: [state] Locking ICCM
6,136,954 UART: [exit] Launching FMC @ 0x40000130
6,142,284 UART:
6,142,300 UART: Running Caliptra FMC ...
6,142,708 UART:
6,142,762 UART: [state] CFI Enabled
6,232,051 UART: [art] Extend RT PCRs Done
6,232,479 UART: [art] Lock RT PCRs Done
6,233,628 UART: [art] Populate DV Done
6,241,543 UART: [fht] FMC Alias Private Key: 7
6,242,679 UART: [art] Derive CDI
6,242,959 UART: [art] Store in slot 0x4
6,328,633 UART: [art] Derive Key Pair
6,328,993 UART: [art] Store priv key in slot 0x5
6,341,778 UART: [art] Derive Key Pair - Done
6,356,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,371,861 UART: [art] Erasing AUTHORITY.KEYID = 7
6,372,626 UART: [art] PUB.X = 32D913721790202C435A5D9AB98A2AD26444D60D76D25B4275A9DB3C03146767E91E3D96F1680E869F951D0AEA3F8EC4
6,379,382 UART: [art] PUB.Y = 62AAC474F94B6BC3194D44D5F2B97F6F7A21C938A4F7201DEA90A31846E97A821A72D6DF90CE1CB818DD62800B0F6451
6,386,334 UART: [art] SIG.R = E200E9D4A49E88DA8D1CCBE2C14C529EA093677DDDD9155130DEA0D951184DD801FC2389CD1C92582DFB3FE4EDD791A2
6,393,097 UART: [art] SIG.S = 9586BF28AA57FBFDA337D168A0BB91266D7A48DC67CCFA1A68A8F38BAE676E5FAA920B8482AABEBB51933848FB4106F4
6,416,567 UART: Caliptra RT
6,416,818 UART: [state] CFI Enabled
6,776,301 UART: [rt] RT failed reset flow
6,776,732 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,891 ready_for_fw is high
1,362,891 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,519,925 >>> mbox cmd response: success
2,519,925 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,581,086 UART:
2,581,102 UART: Running Caliptra FMC ...
2,581,510 UART:
2,581,564 UART: [state] CFI Enabled
2,592,262 UART: [fht] FMC Alias Private Key: 7
2,711,106 UART: [art] Extend RT PCRs Done
2,711,534 UART: [art] Lock RT PCRs Done
2,713,288 UART: [art] Populate DV Done
2,721,237 UART: [fht] FMC Alias Private Key: 7
2,722,231 UART: [art] Derive CDI
2,722,511 UART: [art] Store in slot 0x4
2,808,145 UART: [art] Derive Key Pair
2,808,505 UART: [art] Store priv key in slot 0x5
2,822,000 UART: [art] Derive Key Pair - Done
2,836,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,852,138 UART: [art] Erasing AUTHORITY.KEYID = 7
2,852,903 UART: [art] PUB.X = E9F12E8799443DB24132667FA256AC3993D4CCAF3DA3EE2F0ACB90259883D124F81330EC203C72719383B411DA39338B
2,859,670 UART: [art] PUB.Y = BA60055E41A25479D5FADCE1A42D4B7909B5D1BEECE0A568880A0860731E033C8CCCD76FF15468956880B13DD38551A1
2,866,611 UART: [art] SIG.R = A74E362DA3DA4950D278CF4CD6B0EA81F9F5A9C9EFF74109B85FFDD92CE8C3476BD177852F5A7FEC2678C3F3D082F3C5
2,873,398 UART: [art] SIG.S = CA6572AC9B09E2564E9007A5C460D9B2C486A33411206B2C644A28FAEC268DA23494D9B9F153415C9FF7ABF4BD508FA3
2,897,040 UART: mbox::rt_entry...
2,897,412 UART: ____ _ _ _ ____ _____
2,898,196 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,898,996 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,899,764 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,900,532 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,901,300 UART: |_|
2,901,612 UART:
3,020,584 UART: [rt] Runtime listening for mailbox commands...
3,021,534 >>> mbox cmd response data (0 bytes)
3,021,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,834,967 >>> mbox cmd response: success
5,848,827 UART:
5,848,843 UART: Running Caliptra FMC ...
5,849,251 UART:
5,849,305 UART: [state] CFI Enabled
5,938,010 UART: [art] Extend RT PCRs Done
5,938,438 UART: [art] Lock RT PCRs Done
5,939,961 UART: [art] Populate DV Done
5,948,124 UART: [fht] FMC Alias Private Key: 7
5,949,284 UART: [art] Derive CDI
5,949,564 UART: [art] Store in slot 0x4
6,035,338 UART: [art] Derive Key Pair
6,035,698 UART: [art] Store priv key in slot 0x5
6,048,311 UART: [art] Derive Key Pair - Done
6,063,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,078,591 UART: [art] Erasing AUTHORITY.KEYID = 7
6,079,356 UART: [art] PUB.X = 21E7B1C17942A608515C0BB66AA2067548D760E982D941E3AC56237FAD351C782E8E3F701DF00A44895B5DC8A53A2A07
6,086,111 UART: [art] PUB.Y = D8EF7A79BF02EF862DA91DF37CBC51BA98102F1B04E5695F354CB519E6E7249900CBC6BAB5D864B2FA261E76CEA1D873
6,093,051 UART: [art] SIG.R = 790E7428F022FA197297D95E15A568259C1CC374563DA42D8159DD2C0DF6FBE8E17F335E315AAEE79F212F652188931E
6,099,815 UART: [art] SIG.S = A42754C93CC4A569D3270B50EB4C9BE4FD65533BD47B2E202918CB052790B9F52CAB10FF8891E2A066BF35460AFC9A10
6,123,426 UART: Caliptra RT
6,123,677 UART: [state] CFI Enabled
6,484,067 UART: [rt] RT failed reset flow
6,484,498 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,929 UART: [state] LifecycleState = Unprovisioned
85,584 UART: [state] DebugLocked = No
86,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,748 UART: [kat] SHA2-256
881,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,794 UART: [kat] ++
885,946 UART: [kat] sha1
890,288 UART: [kat] SHA2-256
892,226 UART: [kat] SHA2-384
894,947 UART: [kat] SHA2-512-ACC
896,848 UART: [kat] ECC-384
902,375 UART: [kat] HMAC-384Kdf
907,209 UART: [kat] LMS
1,475,405 UART: [kat] --
1,476,524 UART: [cold-reset] ++
1,477,068 UART: [fht] Storing FHT @ 0x50003400
1,479,657 UART: [idev] ++
1,479,825 UART: [idev] CDI.KEYID = 6
1,480,185 UART: [idev] SUBJECT.KEYID = 7
1,480,609 UART: [idev] UDS.KEYID = 0
1,480,954 ready_for_fw is high
1,480,954 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,703 UART: [idev] Erasing UDS.KEYID = 0
1,504,657 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,385 UART: [idev] --
1,514,358 UART: [ldev] ++
1,514,526 UART: [ldev] CDI.KEYID = 6
1,514,889 UART: [ldev] SUBJECT.KEYID = 5
1,515,315 UART: [ldev] AUTHORITY.KEYID = 7
1,515,778 UART: [ldev] FE.KEYID = 1
1,520,952 UART: [ldev] Erasing FE.KEYID = 1
1,546,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,855 UART: [ldev] --
1,586,278 UART: [fwproc] Waiting for Commands...
1,587,059 UART: [fwproc] Received command 0x46574c44
1,587,850 UART: [fwproc] Received Image of size 82832 bytes
2,524,497 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,551,613 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,582,831 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,669,516 >>> mbox cmd response: success
2,669,516 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,670,722 UART: [afmc] ++
2,670,890 UART: [afmc] CDI.KEYID = 6
2,671,252 UART: [afmc] SUBJECT.KEYID = 7
2,671,677 UART: [afmc] AUTHORITY.KEYID = 5
2,706,296 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,694 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,723,474 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,729,183 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,735,066 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,740,749 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,748,719 UART: [afmc] --
2,749,721 UART: [cold-reset] --
2,750,597 UART: [state] Locking Datavault
2,751,728 UART: [state] Locking PCR0, PCR1 and PCR31
2,752,332 UART: [state] Locking ICCM
2,752,840 UART: [exit] Launching FMC @ 0x40000130
2,758,170 UART:
2,758,186 UART: Running Caliptra FMC ...
2,758,594 UART:
2,758,737 UART: [state] CFI Enabled
2,769,117 UART: [fht] FMC Alias Private Key: 7
2,888,641 UART: [art] Extend RT PCRs Done
2,889,069 UART: [art] Lock RT PCRs Done
2,890,891 UART: [art] Populate DV Done
2,899,276 UART: [fht] FMC Alias Private Key: 7
2,900,308 UART: [art] Derive CDI
2,900,588 UART: [art] Store in slot 0x4
2,986,976 UART: [art] Derive Key Pair
2,987,336 UART: [art] Store priv key in slot 0x5
3,001,073 UART: [art] Derive Key Pair - Done
3,016,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,228 UART: [art] PUB.X = 07A8AD48761B3FF65A54924BCB8AE813F22E8E0012729A106BA2BAA05FF0A76826BA6B7F42DC29D536BF958A1B46FFD1
3,038,987 UART: [art] PUB.Y = E253ED0B90BF55FA873C6385F6FBE1B9848E0577FF63A44A85AE6FA7EA658F2C230FB85DD537265E0E2835A7C1D6CE34
3,045,939 UART: [art] SIG.R = 6A39A5CC3F6AEF9645D9BC656422DE7EAE33659C9D8C9CB28482F4A8737CC8E0E62FD65CA3B68F8321653A338094CE7B
3,052,721 UART: [art] SIG.S = 87C061227832E7071F18EAC1917FCFC38F648C0699B15922A400C771FC66D5AACFAAF8C8D4E67FFEE8D8D8139E1C719A
3,076,911 UART: mbox::rt_entry...
3,077,283 UART: ____ _ _ _ ____ _____
3,078,067 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,078,867 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,079,635 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,080,403 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,081,171 UART: |_|
3,081,483 UART:
3,201,164 UART: [rt] Runtime listening for mailbox commands...
3,202,114 >>> mbox cmd response data (0 bytes)
3,202,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,202,229 UART:
3,202,245 UART: Running Caliptra ROM ...
3,202,653 UART:
3,202,794 UART: [state] CFI Enabled
3,205,626 UART: [state] LifecycleState = Unprovisioned
3,206,281 UART: [state] DebugLocked = No
3,206,813 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,208,380 UART: [kat] SHA2-256
4,002,311 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,006,426 UART: [kat] ++
4,006,578 UART: [kat] sha1
4,010,754 UART: [kat] SHA2-256
4,012,692 UART: [kat] SHA2-384
4,015,461 UART: [kat] SHA2-512-ACC
4,017,361 UART: [kat] ECC-384
4,022,974 UART: [kat] HMAC-384Kdf
4,027,518 UART: [kat] LMS
4,595,714 UART: [kat] --
4,596,535 UART: [update-reset] ++
5,976,941 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,978,045 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,133,312 >>> mbox cmd response: success
6,133,503 UART: [update-reset] Copying MAN_2 To MAN_1
6,141,517 UART: [update-reset Success] --
6,142,522 UART: [state] Locking Datavault
6,143,488 UART: [state] Locking PCR0, PCR1 and PCR31
6,144,092 UART: [state] Locking ICCM
6,144,736 UART: [exit] Launching FMC @ 0x40000130
6,150,066 UART:
6,150,082 UART: Running Caliptra FMC ...
6,150,490 UART:
6,150,633 UART: [state] CFI Enabled
6,240,090 UART: [art] Extend RT PCRs Done
6,240,518 UART: [art] Lock RT PCRs Done
6,241,453 UART: [art] Populate DV Done
6,249,484 UART: [fht] FMC Alias Private Key: 7
6,250,652 UART: [art] Derive CDI
6,250,932 UART: [art] Store in slot 0x4
6,336,356 UART: [art] Derive Key Pair
6,336,716 UART: [art] Store priv key in slot 0x5
6,350,215 UART: [art] Derive Key Pair - Done
6,365,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,380,765 UART: [art] Erasing AUTHORITY.KEYID = 7
6,381,530 UART: [art] PUB.X = 51FF42C5577D7B1E74D7F20BBBD723FDEA89BC1454F354D8AFD21881FB9F031F4C603974BB3695EB1842EC02F2AFB3C6
6,388,307 UART: [art] PUB.Y = 03C8D117F41EE4C1EAFE4B74CB674D4178F417EFC483517C650FA54477BC94F4FFFE9CE800BEDA1F1233AACEB2D1D99F
6,395,253 UART: [art] SIG.R = E84467AABEAE2393E06CA4754AA3F585314D4D2ECA3C5CF721F3F93D487A3EA99D5109881CDB1F04B25D1B7CCBBED756
6,402,037 UART: [art] SIG.S = 3D0B5DC2A5D20DC447AA804A10E90D3F1934A7EE71A0A83CCBC61D2A64016A13D806347A1E9AEE0DC1538EA44EAF8319
6,426,413 UART: Caliptra RT
6,426,756 UART: [state] CFI Enabled
6,790,422 UART: [rt] RT failed reset flow
6,790,853 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,884 ready_for_fw is high
1,362,884 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,792 >>> mbox cmd response: success
2,518,792 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,580,061 UART:
2,580,077 UART: Running Caliptra FMC ...
2,580,485 UART:
2,580,628 UART: [state] CFI Enabled
2,591,162 UART: [fht] FMC Alias Private Key: 7
2,710,290 UART: [art] Extend RT PCRs Done
2,710,718 UART: [art] Lock RT PCRs Done
2,712,274 UART: [art] Populate DV Done
2,720,423 UART: [fht] FMC Alias Private Key: 7
2,721,477 UART: [art] Derive CDI
2,721,757 UART: [art] Store in slot 0x4
2,807,637 UART: [art] Derive Key Pair
2,807,997 UART: [art] Store priv key in slot 0x5
2,821,190 UART: [art] Derive Key Pair - Done
2,836,142 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,851,859 UART: [art] Erasing AUTHORITY.KEYID = 7
2,852,624 UART: [art] PUB.X = 3514451F7AEDFAEF36FF4E4A1F008C767626E3263F10947755731EF3F75BC2CE08FEADC00F208719452662323A206BE7
2,859,368 UART: [art] PUB.Y = 59BF6EDB8948A54F4757BD6CC62152B8CEB86A46027F23EFA9EDF0643D8361591FE4FCE8D34969CE12B574D5A3266FC4
2,866,327 UART: [art] SIG.R = 3A0AC820E080C9532CA03C7EEDDD55F0ED8F7ACB191E880B88E01BD5F6141CD52D4B93256EC138B311F7160FB51D419F
2,873,102 UART: [art] SIG.S = 40CCCF9A9DFE1B44443F9D5667033230E4D59656C9EF70E413E72F33A9FA96449FD26FBBF93BC6925C6B39B63A3A14DF
2,896,413 UART: mbox::rt_entry...
2,896,785 UART: ____ _ _ _ ____ _____
2,897,569 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,898,369 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,899,137 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,899,905 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,900,673 UART: |_|
2,900,985 UART:
3,020,415 UART: [rt] Runtime listening for mailbox commands...
3,021,365 >>> mbox cmd response data (0 bytes)
3,021,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,834,119 >>> mbox cmd response: success
5,847,295 UART:
5,847,311 UART: Running Caliptra FMC ...
5,847,719 UART:
5,847,862 UART: [state] CFI Enabled
5,937,203 UART: [art] Extend RT PCRs Done
5,937,631 UART: [art] Lock RT PCRs Done
5,938,754 UART: [art] Populate DV Done
5,946,953 UART: [fht] FMC Alias Private Key: 7
5,948,023 UART: [art] Derive CDI
5,948,303 UART: [art] Store in slot 0x4
6,034,511 UART: [art] Derive Key Pair
6,034,871 UART: [art] Store priv key in slot 0x5
6,048,278 UART: [art] Derive Key Pair - Done
6,062,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,078,305 UART: [art] Erasing AUTHORITY.KEYID = 7
6,079,070 UART: [art] PUB.X = 5502B8695CF7A1D9FE3E8AC0EEFC6CBBC92DA5BDB122846BD7E7FC2535D30E6E2AD4FF25CAC1CA9D7BF996C12C26645C
6,085,864 UART: [art] PUB.Y = 9B14E84BF4CF959AEDD18DEF970D04F98A8B16D0489EC75111510ED236D0FE71122D54BFD01B697D2C72F419B6BFE31E
6,092,819 UART: [art] SIG.R = 5212961211784B4C45BC1C82CD200AA40A780BA95AC466DFD1FCFD2A1DDFEB28BEC925418A933C071263AE7042D19583
6,099,585 UART: [art] SIG.S = ED8889429B4A9CAC38781E6D6D880023FCBF3CB08BB2388C22B3DEDF59B76237204E5484AA8396DF9BD2BF04381D8C46
6,122,892 UART: Caliptra RT
6,123,235 UART: [state] CFI Enabled
6,488,815 UART: [rt] RT failed reset flow
6,489,246 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,878 UART: [state] LifecycleState = Unprovisioned
86,533 UART: [state] DebugLocked = No
87,179 UART: [state] WD Timer not started. Device not locked for debugging
88,422 UART: [kat] SHA2-256
891,972 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,076 UART: [kat] ++
896,228 UART: [kat] sha1
900,340 UART: [kat] SHA2-256
902,280 UART: [kat] SHA2-384
905,119 UART: [kat] SHA2-512-ACC
907,020 UART: [kat] ECC-384
916,797 UART: [kat] HMAC-384Kdf
921,313 UART: [kat] LMS
1,169,625 UART: [kat] --
1,170,330 UART: [cold-reset] ++
1,170,756 UART: [fht] FHT @ 0x50003400
1,173,360 UART: [idev] ++
1,173,528 UART: [idev] CDI.KEYID = 6
1,173,889 UART: [idev] SUBJECT.KEYID = 7
1,174,314 UART: [idev] UDS.KEYID = 0
1,174,660 ready_for_fw is high
1,174,660 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,401 UART: [idev] Erasing UDS.KEYID = 0
1,199,145 UART: [idev] Sha1 KeyId Algorithm
1,207,993 UART: [idev] --
1,209,184 UART: [ldev] ++
1,209,352 UART: [ldev] CDI.KEYID = 6
1,209,716 UART: [ldev] SUBJECT.KEYID = 5
1,210,143 UART: [ldev] AUTHORITY.KEYID = 7
1,210,606 UART: [ldev] FE.KEYID = 1
1,215,954 UART: [ldev] Erasing FE.KEYID = 1
1,241,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,516 UART: [ldev] --
1,280,739 UART: [fwproc] Wait for Commands...
1,281,382 UART: [fwproc] Recv command 0x46574c44
1,282,115 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,244,852 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,027 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,362,810 >>> mbox cmd response: success
2,362,810 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,363,920 UART: [afmc] ++
2,364,088 UART: [afmc] CDI.KEYID = 6
2,364,451 UART: [afmc] SUBJECT.KEYID = 7
2,364,877 UART: [afmc] AUTHORITY.KEYID = 5
2,400,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,416,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,732 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,442 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,323 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,024 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,857 UART: [afmc] --
2,443,768 UART: [cold-reset] --
2,444,690 UART: [state] Locking Datavault
2,445,789 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,393 UART: [state] Locking ICCM
2,446,917 UART: [exit] Launching FMC @ 0x40000130
2,452,247 UART:
2,452,263 UART: Running Caliptra FMC ...
2,452,671 UART:
2,452,725 UART: [state] CFI Enabled
2,463,217 UART: [fht] FMC Alias Private Key: 7
2,582,063 UART: [art] Extend RT PCRs Done
2,582,491 UART: [art] Lock RT PCRs Done
2,583,847 UART: [art] Populate DV Done
2,592,088 UART: [fht] FMC Alias Private Key: 7
2,593,260 UART: [art] Derive CDI
2,593,540 UART: [art] Store in slot 0x4
2,679,451 UART: [art] Derive Key Pair
2,679,811 UART: [art] Store priv key in slot 0x5
2,693,239 UART: [art] Derive Key Pair - Done
2,707,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,434 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,199 UART: [art] PUB.X = 3C0DA256756FED5623AC9211FBA115CDA45814731725EDBB6EBAF21CC9A69513BC7F6B851618AA18C0B764ECB43853A2
2,730,978 UART: [art] PUB.Y = 5A24D2EA2C73E378FE557C4090FC4B9B379CC5BB7C4D78F6E87775CCE8161BC0F6538E88D9DDBBBF892D196B752B79D3
2,737,944 UART: [art] SIG.R = 7D3510EA38CB18A1A6FA774453B5F95FB3E1AC859F7217FB0623D0F181A3CEA01F6EAB111E0454A3737CD82AED52B733
2,744,720 UART: [art] SIG.S = 784AFDB7FA3EE6FED3897F660F4866F3104C7F4D1B7D6AA9BE50B159363386E0DFB19753EED93C5646B7E80F4E9D6A63
2,768,422 UART: mbox::rt_entry...
2,768,794 UART: ____ _ _ _ ____ _____
2,769,578 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,378 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,146 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,771,914 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,682 UART: |_|
2,772,994 UART:
2,890,387 UART: [rt] Runtime listening for mailbox commands...
2,891,337 >>> mbox cmd response data (0 bytes)
2,891,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,891,449 UART:
2,891,465 UART: Running Caliptra ROM ...
2,891,873 UART:
2,891,928 UART: [state] CFI Enabled
2,894,796 UART: [state] LifecycleState = Unprovisioned
2,895,451 UART: [state] DebugLocked = No
2,896,057 UART: [state] WD Timer not started. Device not locked for debugging
2,897,315 UART: [kat] SHA2-256
3,700,865 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,704,969 UART: [kat] ++
3,705,121 UART: [kat] sha1
3,709,349 UART: [kat] SHA2-256
3,711,289 UART: [kat] SHA2-384
3,714,056 UART: [kat] SHA2-512-ACC
3,715,956 UART: [kat] ECC-384
3,726,077 UART: [kat] HMAC-384Kdf
3,730,639 UART: [kat] LMS
3,978,951 UART: [kat] --
3,979,441 UART: [update-reset] ++
5,338,404 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,339,467 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,494,682 >>> mbox cmd response: success
5,494,893 UART: [update-reset] Copying MAN_2 To MAN_1
5,502,907 UART: [update-reset Success] --
5,503,876 UART: [state] Locking Datavault
5,504,860 UART: [state] Locking PCR0, PCR1 and PCR31
5,505,464 UART: [state] Locking ICCM
5,505,990 UART: [exit] Launching FMC @ 0x40000130
5,511,320 UART:
5,511,336 UART: Running Caliptra FMC ...
5,511,744 UART:
5,511,798 UART: [state] CFI Enabled
5,600,467 UART: [art] Extend RT PCRs Done
5,600,895 UART: [art] Lock RT PCRs Done
5,602,398 UART: [art] Populate DV Done
5,610,705 UART: [fht] FMC Alias Private Key: 7
5,611,667 UART: [art] Derive CDI
5,611,947 UART: [art] Store in slot 0x4
5,697,810 UART: [art] Derive Key Pair
5,698,170 UART: [art] Store priv key in slot 0x5
5,711,420 UART: [art] Derive Key Pair - Done
5,726,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,741,707 UART: [art] Erasing AUTHORITY.KEYID = 7
5,742,472 UART: [art] PUB.X = F0CA7B6FB0CA47546E4FCDF21C9222972029DB17EE2752B242E6F5836969544A76EFB49B0FFC68AED95905E70A717387
5,749,239 UART: [art] PUB.Y = 52E0E343527702313718D3EEA4859CB54E5369C00664D46E054953934B668780E5E0E1C974016489B006958243EA47F9
5,756,154 UART: [art] SIG.R = 56CBB3EEDA10BB1191E14AFE620F43A7EA41F85102FD1830153EEAB1405C24826EE3DD17CA1F3E378EC23DEF2F6192D9
5,762,936 UART: [art] SIG.S = 979D8FC13C11910F4C54414DE031C6FF147223DCA74C48BA4D772E3CFADCFD7BD09ECF9090A08BE12C089462F08219A7
5,786,886 UART: Caliptra RT
5,787,137 UART: [state] CFI Enabled
6,152,204 UART: [rt] RT failed reset flow
6,152,635 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,232 ready_for_fw is high
1,059,232 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,214,787 >>> mbox cmd response: success
2,214,787 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,277,394 UART:
2,277,410 UART: Running Caliptra FMC ...
2,277,818 UART:
2,277,872 UART: [state] CFI Enabled
2,288,634 UART: [fht] FMC Alias Private Key: 7
2,407,132 UART: [art] Extend RT PCRs Done
2,407,560 UART: [art] Lock RT PCRs Done
2,409,006 UART: [art] Populate DV Done
2,417,093 UART: [fht] FMC Alias Private Key: 7
2,418,195 UART: [art] Derive CDI
2,418,475 UART: [art] Store in slot 0x4
2,504,008 UART: [art] Derive Key Pair
2,504,368 UART: [art] Store priv key in slot 0x5
2,517,886 UART: [art] Derive Key Pair - Done
2,532,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,548,178 UART: [art] Erasing AUTHORITY.KEYID = 7
2,548,943 UART: [art] PUB.X = 8BC49927330CA3E51885CD0644FED782DEA381F68524D0DBD0F28CA9C8A85D9366703E59F376E773D7FD61A3DD3F6012
2,555,713 UART: [art] PUB.Y = 5430981ABD0B9B64AE89F69CAC9557986E790747C7066E5D5598A383B77B01A285B7272EC5C228C269E80F8EC305C4FC
2,562,645 UART: [art] SIG.R = 0B71F8C3B575C8AA63128394BFCA326FB09E2B8B44F615DCDBB470A2C0994725D426E0D6175D81018EB65129B4DBAC3C
2,569,419 UART: [art] SIG.S = 0F1C7EFEE8EEBA27B28EFC7D575B0536CEA922EF6854B31C807604FE8990B6913AAF01CD913DCCDA072C9FB66FDFB714
2,593,540 UART: mbox::rt_entry...
2,593,912 UART: ____ _ _ _ ____ _____
2,594,696 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,496 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,264 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,032 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,597,800 UART: |_|
2,598,112 UART:
2,716,249 UART: [rt] Runtime listening for mailbox commands...
2,717,199 >>> mbox cmd response data (0 bytes)
2,717,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,204,304 >>> mbox cmd response: success
5,217,173 UART:
5,217,189 UART: Running Caliptra FMC ...
5,217,597 UART:
5,217,651 UART: [state] CFI Enabled
5,306,752 UART: [art] Extend RT PCRs Done
5,307,180 UART: [art] Lock RT PCRs Done
5,308,599 UART: [art] Populate DV Done
5,317,018 UART: [fht] FMC Alias Private Key: 7
5,318,034 UART: [art] Derive CDI
5,318,314 UART: [art] Store in slot 0x4
5,404,077 UART: [art] Derive Key Pair
5,404,437 UART: [art] Store priv key in slot 0x5
5,417,271 UART: [art] Derive Key Pair - Done
5,432,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,447,578 UART: [art] Erasing AUTHORITY.KEYID = 7
5,448,343 UART: [art] PUB.X = 8DB88492C0447BC8B07AE418ED441967E40C45FADEEC6CC0B5AE155B0452AF2736B8E4A84597C3BA4A177026D775F3CF
5,455,119 UART: [art] PUB.Y = 80B5497AA78F5F7D1BB90659E5B63780C9722268D409E22C7EE92C7A6C4732B6B65DE489EA60573EEB58FAB6D9F2A274
5,462,069 UART: [art] SIG.R = CD0F980E5E2FDC96C5CB580F6EBE8C92D914BC97F7C6B08330B95D32E90468A048EE4283AB9F7ADD859035DEDE715F34
5,468,843 UART: [art] SIG.S = 227C93F9617FF9C21A2254C39B3926B48C1BC696FE52CBE0F4AE61378D4C71FE4DDE993B9B9C77BDE57C172324FFC3A4
5,492,917 UART: Caliptra RT
5,493,168 UART: [state] CFI Enabled
5,857,727 UART: [rt] RT failed reset flow
5,858,158 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [kat] SHA2-256
891,191 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,777 UART: [kat] SHA2-256
901,717 UART: [kat] SHA2-384
904,464 UART: [kat] SHA2-512-ACC
906,365 UART: [kat] ECC-384
915,956 UART: [kat] HMAC-384Kdf
920,408 UART: [kat] LMS
1,168,720 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,211 UART: [fht] FHT @ 0x50003400
1,172,853 UART: [idev] ++
1,173,021 UART: [idev] CDI.KEYID = 6
1,173,382 UART: [idev] SUBJECT.KEYID = 7
1,173,807 UART: [idev] UDS.KEYID = 0
1,174,153 ready_for_fw is high
1,174,153 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,568 UART: [idev] Erasing UDS.KEYID = 0
1,198,742 UART: [idev] Sha1 KeyId Algorithm
1,207,616 UART: [idev] --
1,208,667 UART: [ldev] ++
1,208,835 UART: [ldev] CDI.KEYID = 6
1,209,199 UART: [ldev] SUBJECT.KEYID = 5
1,209,626 UART: [ldev] AUTHORITY.KEYID = 7
1,210,089 UART: [ldev] FE.KEYID = 1
1,215,423 UART: [ldev] Erasing FE.KEYID = 1
1,241,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,735 UART: [ldev] --
1,281,188 UART: [fwproc] Wait for Commands...
1,281,935 UART: [fwproc] Recv command 0x46574c44
1,282,668 UART: [fwproc] Recv'd Img size: 82832 bytes
2,216,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,243,696 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,274,871 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,361,578 >>> mbox cmd response: success
2,361,578 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,362,770 UART: [afmc] ++
2,362,938 UART: [afmc] CDI.KEYID = 6
2,363,301 UART: [afmc] SUBJECT.KEYID = 7
2,363,727 UART: [afmc] AUTHORITY.KEYID = 5
2,398,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,415,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,416,144 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,421,854 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,427,735 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,433,436 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,441,107 UART: [afmc] --
2,441,968 UART: [cold-reset] --
2,442,810 UART: [state] Locking Datavault
2,444,097 UART: [state] Locking PCR0, PCR1 and PCR31
2,444,701 UART: [state] Locking ICCM
2,445,261 UART: [exit] Launching FMC @ 0x40000130
2,450,591 UART:
2,450,607 UART: Running Caliptra FMC ...
2,451,015 UART:
2,451,158 UART: [state] CFI Enabled
2,462,084 UART: [fht] FMC Alias Private Key: 7
2,580,584 UART: [art] Extend RT PCRs Done
2,581,012 UART: [art] Lock RT PCRs Done
2,582,376 UART: [art] Populate DV Done
2,590,603 UART: [fht] FMC Alias Private Key: 7
2,591,711 UART: [art] Derive CDI
2,591,991 UART: [art] Store in slot 0x4
2,678,200 UART: [art] Derive Key Pair
2,678,560 UART: [art] Store priv key in slot 0x5
2,691,820 UART: [art] Derive Key Pair - Done
2,706,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,722,406 UART: [art] Erasing AUTHORITY.KEYID = 7
2,723,171 UART: [art] PUB.X = DEE891B2A6FA1533E3665B3CCBA1A38CC55F2643EC0E584AB1918619F163EAA9716E46CF6C3F1306D2F8127C3C08CC50
2,729,944 UART: [art] PUB.Y = C95CAA99783C3B8729BE57FBE6E3679E9D3FEA59CB8C3F7987D48DE74C0D31EF1DEF0C31554E600B457FBAA34E35A067
2,736,903 UART: [art] SIG.R = FEEDBDD63F7DD1D861990A914B0E779E3316C36B2B8532A6C3195F74AFA84151A77DEF60189BA1F3C6B2C5B82FC95B08
2,743,678 UART: [art] SIG.S = F0E7707A4EF2E35177AF9F5B5A6A46740CD40B3576F67D8FC27165BEB9C0A1540B85383DA0504B3CE2002600014427D6
2,767,380 UART: mbox::rt_entry...
2,767,752 UART: ____ _ _ _ ____ _____
2,768,536 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,769,336 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,770,104 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,770,872 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,771,640 UART: |_|
2,771,952 UART:
2,890,089 UART: [rt] Runtime listening for mailbox commands...
2,891,039 >>> mbox cmd response data (0 bytes)
2,891,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,891,151 UART:
2,891,167 UART: Running Caliptra ROM ...
2,891,575 UART:
2,891,717 UART: [state] CFI Enabled
2,893,983 UART: [state] LifecycleState = Unprovisioned
2,894,638 UART: [state] DebugLocked = No
2,895,268 UART: [state] WD Timer not started. Device not locked for debugging
2,896,532 UART: [kat] SHA2-256
3,700,082 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,704,186 UART: [kat] ++
3,704,338 UART: [kat] sha1
3,708,624 UART: [kat] SHA2-256
3,710,564 UART: [kat] SHA2-384
3,713,233 UART: [kat] SHA2-512-ACC
3,715,133 UART: [kat] ECC-384
3,725,086 UART: [kat] HMAC-384Kdf
3,729,788 UART: [kat] LMS
3,978,100 UART: [kat] --
3,978,810 UART: [update-reset] ++
5,338,183 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,339,280 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,494,495 >>> mbox cmd response: success
5,494,670 UART: [update-reset] Copying MAN_2 To MAN_1
5,502,684 UART: [update-reset Success] --
5,503,733 UART: [state] Locking Datavault
5,504,309 UART: [state] Locking PCR0, PCR1 and PCR31
5,504,913 UART: [state] Locking ICCM
5,505,467 UART: [exit] Launching FMC @ 0x40000130
5,510,797 UART:
5,510,813 UART: Running Caliptra FMC ...
5,511,221 UART:
5,511,364 UART: [state] CFI Enabled
5,600,665 UART: [art] Extend RT PCRs Done
5,601,093 UART: [art] Lock RT PCRs Done
5,602,540 UART: [art] Populate DV Done
5,610,617 UART: [fht] FMC Alias Private Key: 7
5,611,669 UART: [art] Derive CDI
5,611,949 UART: [art] Store in slot 0x4
5,697,752 UART: [art] Derive Key Pair
5,698,112 UART: [art] Store priv key in slot 0x5
5,711,704 UART: [art] Derive Key Pair - Done
5,726,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,742,032 UART: [art] Erasing AUTHORITY.KEYID = 7
5,742,797 UART: [art] PUB.X = E16D7C105F8009BE24514FDC6AA20110CC3D7BD2255C63E0E5E05345FA011D6889D80B65F9BD1C8EACD1CA268F9424ED
5,749,569 UART: [art] PUB.Y = 46F5B6B5D0F1BB46AF125B11DBEDDAECA0726F73B75FEAE942BCD22458206DFFE06D70E5844F5C806F908FBF137B9974
5,756,539 UART: [art] SIG.R = 35AD1F25CED040144D325DB3F06E53C4D5571DE951D5A1A982D86FBFB1720A70D7F055FD101CD8166DDF2A32E2596F59
5,763,316 UART: [art] SIG.S = 4C2D0089A5D916A002194BE6131B4EDE8856750B2B9DA15D071B0B45B95ECCD2DBAF209C65890E622F6E2D8899C89E41
5,787,043 UART: Caliptra RT
5,787,386 UART: [state] CFI Enabled
6,147,152 UART: [rt] RT failed reset flow
6,147,583 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,895 ready_for_fw is high
1,059,895 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,970 >>> mbox cmd response: success
2,216,970 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,279,811 UART:
2,279,827 UART: Running Caliptra FMC ...
2,280,235 UART:
2,280,378 UART: [state] CFI Enabled
2,290,962 UART: [fht] FMC Alias Private Key: 7
2,410,468 UART: [art] Extend RT PCRs Done
2,410,896 UART: [art] Lock RT PCRs Done
2,412,664 UART: [art] Populate DV Done
2,420,789 UART: [fht] FMC Alias Private Key: 7
2,421,769 UART: [art] Derive CDI
2,422,049 UART: [art] Store in slot 0x4
2,507,714 UART: [art] Derive Key Pair
2,508,074 UART: [art] Store priv key in slot 0x5
2,521,892 UART: [art] Derive Key Pair - Done
2,536,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,867 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,632 UART: [art] PUB.X = 7A5B567D96BB38910D7950426063D0870143110E6ECAFBA6CD8DE7225ACC337AC32E63B396DE2DC5C76702F7EDD7D4E7
2,559,400 UART: [art] PUB.Y = 8F1B9A9DBD13513F2A706A031B569723AD65A773C44647B4A6B3E25C876E31BA69CA84EEE167EA7E6A0EAB86692AE6A3
2,566,356 UART: [art] SIG.R = A260BC3E5A61B0C221997D38540A41159B1D5BAC39CBCFD51CC5DD388C9914046A4BFB9E56DC54F691910C98D82BFD03
2,573,126 UART: [art] SIG.S = 142AD22BD252678D0EB89DA7E983A946E34668978909F3C9D9B619ABAA6265CF264913E24E2FBF72B3A8E6C0C3C7CDDB
2,596,972 UART: mbox::rt_entry...
2,597,344 UART: ____ _ _ _ ____ _____
2,598,128 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,928 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,696 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,464 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,232 UART: |_|
2,601,544 UART:
2,720,336 UART: [rt] Runtime listening for mailbox commands...
2,721,286 >>> mbox cmd response data (0 bytes)
2,721,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,208,372 >>> mbox cmd response: success
5,221,747 UART:
5,221,763 UART: Running Caliptra FMC ...
5,222,171 UART:
5,222,314 UART: [state] CFI Enabled
5,311,659 UART: [art] Extend RT PCRs Done
5,312,087 UART: [art] Lock RT PCRs Done
5,313,354 UART: [art] Populate DV Done
5,321,641 UART: [fht] FMC Alias Private Key: 7
5,322,685 UART: [art] Derive CDI
5,322,965 UART: [art] Store in slot 0x4
5,408,642 UART: [art] Derive Key Pair
5,409,002 UART: [art] Store priv key in slot 0x5
5,422,318 UART: [art] Derive Key Pair - Done
5,436,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,452,224 UART: [art] Erasing AUTHORITY.KEYID = 7
5,452,989 UART: [art] PUB.X = 853CE0F895A6C30BFFFD7E6395D4DAB6742466EE935F9E803EE26BA37800170555AF9B05C2675C26E442303D0160EAC5
5,459,729 UART: [art] PUB.Y = C5CBFEC4A4AF29869C2AB7C52F773BEB91ECEE3F24FA478FFBCFE9CD3DA67DF24A080AEF15EF1E5AE16B0A3060B18C40
5,466,706 UART: [art] SIG.R = 9F870E9030360F3D9538AEAC7ED0E36068B7E81D63ADDA36C42080D23B8828EA3650B2B8F213A548A339651432BD5763
5,473,468 UART: [art] SIG.S = AD819C6E6C8AC66AE0C2F8DA245D5EB780746DCF53E9AAC09455A3001C0F6B3F23C45204F0DD602CAD663D031CF904D7
5,497,616 UART: Caliptra RT
5,497,959 UART: [state] CFI Enabled
5,862,543 UART: [rt] RT failed reset flow
5,862,974 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
893,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,485 UART: [kat] ++
897,637 UART: [kat] sha1
902,025 UART: [kat] SHA2-256
903,965 UART: [kat] SHA2-384
906,734 UART: [kat] SHA2-512-ACC
908,635 UART: [kat] ECC-384
918,468 UART: [kat] HMAC-384Kdf
922,944 UART: [kat] LMS
1,171,272 UART: [kat] --
1,172,107 UART: [cold-reset] ++
1,172,671 UART: [fht] FHT @ 0x50003400
1,175,210 UART: [idev] ++
1,175,378 UART: [idev] CDI.KEYID = 6
1,175,738 UART: [idev] SUBJECT.KEYID = 7
1,176,162 UART: [idev] UDS.KEYID = 0
1,176,507 ready_for_fw is high
1,176,507 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,476 UART: [idev] Erasing UDS.KEYID = 0
1,201,561 UART: [idev] Sha1 KeyId Algorithm
1,209,943 UART: [idev] --
1,210,899 UART: [ldev] ++
1,211,067 UART: [ldev] CDI.KEYID = 6
1,211,430 UART: [ldev] SUBJECT.KEYID = 5
1,211,856 UART: [ldev] AUTHORITY.KEYID = 7
1,212,319 UART: [ldev] FE.KEYID = 1
1,217,281 UART: [ldev] Erasing FE.KEYID = 1
1,242,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,037 UART: [ldev] --
1,282,386 UART: [fwproc] Wait for Commands...
1,283,112 UART: [fwproc] Recv command 0x46574c44
1,283,840 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,869 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,039 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,710 >>> mbox cmd response: success
2,363,710 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,364,958 UART: [afmc] ++
2,365,126 UART: [afmc] CDI.KEYID = 6
2,365,488 UART: [afmc] SUBJECT.KEYID = 7
2,365,913 UART: [afmc] AUTHORITY.KEYID = 5
2,400,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,099 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,847 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,556 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,439 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,140 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,106 UART: [afmc] --
2,444,104 UART: [cold-reset] --
2,444,930 UART: [state] Locking Datavault
2,445,931 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,535 UART: [state] Locking ICCM
2,447,205 UART: [exit] Launching FMC @ 0x40000130
2,452,535 UART:
2,452,551 UART: Running Caliptra FMC ...
2,452,959 UART:
2,453,013 UART: [state] CFI Enabled
2,463,181 UART: [fht] FMC Alias Private Key: 7
2,582,405 UART: [art] Extend RT PCRs Done
2,582,833 UART: [art] Lock RT PCRs Done
2,584,565 UART: [art] Populate DV Done
2,593,080 UART: [fht] FMC Alias Private Key: 7
2,594,030 UART: [art] Derive CDI
2,594,310 UART: [art] Store in slot 0x4
2,680,287 UART: [art] Derive Key Pair
2,680,647 UART: [art] Store priv key in slot 0x5
2,693,509 UART: [art] Derive Key Pair - Done
2,708,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,269 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,034 UART: [art] PUB.X = D698650FE81702ED909C4ABBC1BF1DF5BA071FC19E0B27A90D934ABED1FB6F82EDF934FB2C6D855BB44863AE48186D15
2,730,809 UART: [art] PUB.Y = 3692AD161AF0CFBE501BAD5CC3C2C853677C53D0C4E90315422795057A007357B835ED95DF676265CAFF78256C269E47
2,737,731 UART: [art] SIG.R = A026D03FE2258EE39341341A5D9BDDCB2C8BD0AB9FDB7E508D89B2C6898089295E921665D3B17F4BD4739817056F67BD
2,744,504 UART: [art] SIG.S = CBE1AF8DE4D4B6ED2C934EAEB42BEF0F6BC0598AF3624B2083824E6A04F779948882C01DB2FBBF261FD9DC4F60341E37
2,768,876 UART: mbox::rt_entry...
2,769,248 UART: ____ _ _ _ ____ _____
2,770,032 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,832 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,600 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,368 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,136 UART: |_|
2,773,448 UART:
2,891,839 UART: [rt] Runtime listening for mailbox commands...
2,892,789 >>> mbox cmd response data (0 bytes)
2,892,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,892,901 UART:
2,892,917 UART: Running Caliptra ROM ...
2,893,325 UART:
2,893,380 UART: [state] CFI Enabled
2,895,678 UART: [state] LifecycleState = Unprovisioned
2,896,333 UART: [state] DebugLocked = No
2,897,035 UART: [state] WD Timer not started. Device not locked for debugging
2,898,289 UART: [kat] SHA2-256
3,703,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,708,064 UART: [kat] ++
3,708,216 UART: [kat] sha1
3,712,526 UART: [kat] SHA2-256
3,714,466 UART: [kat] SHA2-384
3,717,069 UART: [kat] SHA2-512-ACC
3,718,969 UART: [kat] ECC-384
3,728,378 UART: [kat] HMAC-384Kdf
3,732,976 UART: [kat] LMS
3,981,304 UART: [kat] --
3,982,160 UART: [update-reset] ++
5,341,202 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,342,249 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,497,464 >>> mbox cmd response: success
5,497,605 UART: [update-reset] Copying MAN_2 To MAN_1
5,505,619 UART: [update-reset Success] --
5,506,714 UART: [state] Locking Datavault
5,507,358 UART: [state] Locking PCR0, PCR1 and PCR31
5,507,962 UART: [state] Locking ICCM
5,508,442 UART: [exit] Launching FMC @ 0x40000130
5,513,772 UART:
5,513,788 UART: Running Caliptra FMC ...
5,514,196 UART:
5,514,250 UART: [state] CFI Enabled
5,604,107 UART: [art] Extend RT PCRs Done
5,604,535 UART: [art] Lock RT PCRs Done
5,605,648 UART: [art] Populate DV Done
5,613,937 UART: [fht] FMC Alias Private Key: 7
5,615,085 UART: [art] Derive CDI
5,615,365 UART: [art] Store in slot 0x4
5,701,226 UART: [art] Derive Key Pair
5,701,586 UART: [art] Store priv key in slot 0x5
5,715,188 UART: [art] Derive Key Pair - Done
5,730,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,745,140 UART: [art] Erasing AUTHORITY.KEYID = 7
5,745,905 UART: [art] PUB.X = 26B368B55003706CA3ABA00F7FB4934890456600B827F155B1CBD90ADC17580AAEFBCF444043373D813160442796F29D
5,752,637 UART: [art] PUB.Y = DFF80C16D6BFD606C33F90D6D61B15362F012C8956593DBFCDAD9C836A41FD11059F718D312F13F6F03758F1AAFB2B0E
5,759,586 UART: [art] SIG.R = B6D76828D4770558F427049A72A146EA60ED11C2C378006C85E1A036149E6333E7C26D4DECD45909BCEB401A26143C60
5,766,321 UART: [art] SIG.S = DAF80FFCD38834DEAF6C5663BEA7470C2F24EA7FC1AFB5A86EBE9264FECDE4F2F5B0DE431C1E623C286FA5A6D64E9792
5,789,459 UART: Caliptra RT
5,789,710 UART: [state] CFI Enabled
6,156,688 UART: [rt] RT failed reset flow
6,157,119 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,729 ready_for_fw is high
1,060,729 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,523 >>> mbox cmd response: success
2,217,523 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,279,782 UART:
2,279,798 UART: Running Caliptra FMC ...
2,280,206 UART:
2,280,260 UART: [state] CFI Enabled
2,290,748 UART: [fht] FMC Alias Private Key: 7
2,409,896 UART: [art] Extend RT PCRs Done
2,410,324 UART: [art] Lock RT PCRs Done
2,411,962 UART: [art] Populate DV Done
2,420,249 UART: [fht] FMC Alias Private Key: 7
2,421,197 UART: [art] Derive CDI
2,421,477 UART: [art] Store in slot 0x4
2,507,330 UART: [art] Derive Key Pair
2,507,690 UART: [art] Store priv key in slot 0x5
2,521,116 UART: [art] Derive Key Pair - Done
2,535,766 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,251 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,016 UART: [art] PUB.X = D9703BAB4DAB1C89822B4CB6FAAC8E9CE7F035CF7C66E8736CF6AB119D0070BEFD306415379586C5360CDF3650D383C9
2,558,775 UART: [art] PUB.Y = 8568B55EA6E86F6C2E469AF0F90C1FD370F551C75B833FD7940BB958135EB4DB7CF91B940A7231A38372860D7FBECFA8
2,565,723 UART: [art] SIG.R = C398CFEA89819553838B8D6714F98C086AAD9A618DD87E301B6AC762BC9066EE9AC2296E2851E28FB1E72DC5B5F00861
2,572,493 UART: [art] SIG.S = 91AF5E39405E8F88651A1FFFE221E29777080F9FB9904B99D8F00C4D02E9DD4F391DBCD801E32B991DBDDDEEF2D17425
2,596,600 UART: mbox::rt_entry...
2,596,972 UART: ____ _ _ _ ____ _____
2,597,756 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,556 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,324 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,092 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,860 UART: |_|
2,601,172 UART:
2,719,627 UART: [rt] Runtime listening for mailbox commands...
2,720,577 >>> mbox cmd response data (0 bytes)
2,720,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,210,237 >>> mbox cmd response: success
5,223,672 UART:
5,223,688 UART: Running Caliptra FMC ...
5,224,096 UART:
5,224,150 UART: [state] CFI Enabled
5,313,809 UART: [art] Extend RT PCRs Done
5,314,237 UART: [art] Lock RT PCRs Done
5,315,664 UART: [art] Populate DV Done
5,323,977 UART: [fht] FMC Alias Private Key: 7
5,324,959 UART: [art] Derive CDI
5,325,239 UART: [art] Store in slot 0x4
5,411,146 UART: [art] Derive Key Pair
5,411,506 UART: [art] Store priv key in slot 0x5
5,424,336 UART: [art] Derive Key Pair - Done
5,438,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,454,437 UART: [art] Erasing AUTHORITY.KEYID = 7
5,455,202 UART: [art] PUB.X = 89B0B44824C5DA20399E20A48514183CDD411C19ADB4C4255D4E48A24A29070613BF1C65412CEC427F21E01A97A02E8C
5,461,966 UART: [art] PUB.Y = 7C17C5CF3FF79A4B7EC1772EC9F7D8086CD9C0C8A65E051E29A942C0E73218191C08EAFD3A8FE41FB7881AC004095533
5,468,911 UART: [art] SIG.R = 1DE04D66E808F0C5098DC8A98BE140F8F16C4960079018024CBA9F3E6B00AEE02C1D4E609567058793BCA395EE5F8312
5,475,646 UART: [art] SIG.S = ECC2418CFE03D325025E329A85DBE8AB35172C40C2EC1B17F09845BDF104DEA041592FFF5055F342DDC869764EF3EA17
5,498,873 UART: Caliptra RT
5,499,124 UART: [state] CFI Enabled
5,865,001 UART: [rt] RT failed reset flow
5,865,432 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
893,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,752 UART: [kat] ++
897,904 UART: [kat] sha1
901,898 UART: [kat] SHA2-256
903,838 UART: [kat] SHA2-384
906,731 UART: [kat] SHA2-512-ACC
908,632 UART: [kat] ECC-384
918,259 UART: [kat] HMAC-384Kdf
922,715 UART: [kat] LMS
1,171,043 UART: [kat] --
1,171,826 UART: [cold-reset] ++
1,172,332 UART: [fht] FHT @ 0x50003400
1,174,835 UART: [idev] ++
1,175,003 UART: [idev] CDI.KEYID = 6
1,175,363 UART: [idev] SUBJECT.KEYID = 7
1,175,787 UART: [idev] UDS.KEYID = 0
1,176,132 ready_for_fw is high
1,176,132 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,973 UART: [idev] Erasing UDS.KEYID = 0
1,201,926 UART: [idev] Sha1 KeyId Algorithm
1,210,530 UART: [idev] --
1,211,578 UART: [ldev] ++
1,211,746 UART: [ldev] CDI.KEYID = 6
1,212,109 UART: [ldev] SUBJECT.KEYID = 5
1,212,535 UART: [ldev] AUTHORITY.KEYID = 7
1,212,998 UART: [ldev] FE.KEYID = 1
1,218,170 UART: [ldev] Erasing FE.KEYID = 1
1,244,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,284 UART: [ldev] --
1,283,765 UART: [fwproc] Wait for Commands...
1,284,459 UART: [fwproc] Recv command 0x46574c44
1,285,187 UART: [fwproc] Recv'd Img size: 82832 bytes
2,220,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,248,190 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,279,360 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,365,949 >>> mbox cmd response: success
2,365,949 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,366,971 UART: [afmc] ++
2,367,139 UART: [afmc] CDI.KEYID = 6
2,367,501 UART: [afmc] SUBJECT.KEYID = 7
2,367,926 UART: [afmc] AUTHORITY.KEYID = 5
2,403,705 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,420,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,421,166 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,426,875 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,432,758 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,438,459 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,446,321 UART: [afmc] --
2,447,421 UART: [cold-reset] --
2,448,295 UART: [state] Locking Datavault
2,449,588 UART: [state] Locking PCR0, PCR1 and PCR31
2,450,192 UART: [state] Locking ICCM
2,450,626 UART: [exit] Launching FMC @ 0x40000130
2,455,956 UART:
2,455,972 UART: Running Caliptra FMC ...
2,456,380 UART:
2,456,523 UART: [state] CFI Enabled
2,466,993 UART: [fht] FMC Alias Private Key: 7
2,586,273 UART: [art] Extend RT PCRs Done
2,586,701 UART: [art] Lock RT PCRs Done
2,588,285 UART: [art] Populate DV Done
2,596,486 UART: [fht] FMC Alias Private Key: 7
2,597,552 UART: [art] Derive CDI
2,597,832 UART: [art] Store in slot 0x4
2,683,643 UART: [art] Derive Key Pair
2,684,003 UART: [art] Store priv key in slot 0x5
2,696,643 UART: [art] Derive Key Pair - Done
2,711,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,726,902 UART: [art] Erasing AUTHORITY.KEYID = 7
2,727,667 UART: [art] PUB.X = E2666EAA47072D079F65E07DB89B43C78159153DAD6449796C1D46E11657F98ED657FF5399D47BCE559B10978538BB41
2,734,427 UART: [art] PUB.Y = 8EF13692AF16BF9D223180771373728A9A2947DFEC6250AF35CA3CAFFDC7FA4D1CE49D3719FEA4507FCA2B3F4C6F75D5
2,741,395 UART: [art] SIG.R = 4B0A8E99BB199E15F7EB8D22141B341EE8DEA33A3DB1D4F79C1305C263654EA9CDAAD41F1AB2F4A5C1C42530FE87B54B
2,748,179 UART: [art] SIG.S = 40604172190E9F656394190FBE11108FA81F1E0865D266E227151478D90440FBD09141929C9A0B846B0AC83CD5230C3A
2,772,174 UART: mbox::rt_entry...
2,772,546 UART: ____ _ _ _ ____ _____
2,773,330 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,774,130 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,774,898 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,775,666 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,776,434 UART: |_|
2,776,746 UART:
2,895,077 UART: [rt] Runtime listening for mailbox commands...
2,896,027 >>> mbox cmd response data (0 bytes)
2,896,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,896,139 UART:
2,896,155 UART: Running Caliptra ROM ...
2,896,563 UART:
2,896,705 UART: [state] CFI Enabled
2,899,627 UART: [state] LifecycleState = Unprovisioned
2,900,282 UART: [state] DebugLocked = No
2,900,970 UART: [state] WD Timer not started. Device not locked for debugging
2,902,140 UART: [kat] SHA2-256
3,707,790 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,711,915 UART: [kat] ++
3,712,067 UART: [kat] sha1
3,716,523 UART: [kat] SHA2-256
3,718,463 UART: [kat] SHA2-384
3,721,190 UART: [kat] SHA2-512-ACC
3,723,090 UART: [kat] ECC-384
3,732,923 UART: [kat] HMAC-384Kdf
3,737,587 UART: [kat] LMS
3,985,915 UART: [kat] --
3,987,023 UART: [update-reset] ++
5,346,063 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,347,072 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,502,287 >>> mbox cmd response: success
5,502,640 UART: [update-reset] Copying MAN_2 To MAN_1
5,510,654 UART: [update-reset Success] --
5,511,657 UART: [state] Locking Datavault
5,512,445 UART: [state] Locking PCR0, PCR1 and PCR31
5,513,049 UART: [state] Locking ICCM
5,513,485 UART: [exit] Launching FMC @ 0x40000130
5,518,815 UART:
5,518,831 UART: Running Caliptra FMC ...
5,519,239 UART:
5,519,382 UART: [state] CFI Enabled
5,608,889 UART: [art] Extend RT PCRs Done
5,609,317 UART: [art] Lock RT PCRs Done
5,610,416 UART: [art] Populate DV Done
5,618,677 UART: [fht] FMC Alias Private Key: 7
5,619,663 UART: [art] Derive CDI
5,619,943 UART: [art] Store in slot 0x4
5,705,694 UART: [art] Derive Key Pair
5,706,054 UART: [art] Store priv key in slot 0x5
5,719,122 UART: [art] Derive Key Pair - Done
5,734,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,749,778 UART: [art] Erasing AUTHORITY.KEYID = 7
5,750,543 UART: [art] PUB.X = 232E0BE45C0F79FDD35C1E57F5B10F8ED1E755FB4618E3B66DE0F35F8BFABEECAA396ECE66F38C8D6E67E9FF715F0C53
5,757,329 UART: [art] PUB.Y = 90F74F03E65DB42A53F93505AD3F481DACDE64C18C212539A9B17FF5F72AD448E640364918C664ED953F1B63C356D91B
5,764,277 UART: [art] SIG.R = 9A68EED91A3774AFA93C6E1A738AFF2EBF3AEDB6D06F61F2239CFD92102966D31630873B0F8D06E0D8A337A83871EF40
5,771,053 UART: [art] SIG.S = F9B2EB8254EE0E517DB548DABD2EB72F82C6890E0206D0D74A061AECE1C77993CEC232B4A52657F7691157A7DF492310
5,794,730 UART: Caliptra RT
5,795,073 UART: [state] CFI Enabled
6,155,205 UART: [rt] RT failed reset flow
6,155,636 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,460 ready_for_fw is high
1,061,460 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,218,012 >>> mbox cmd response: success
2,218,012 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,280,015 UART:
2,280,031 UART: Running Caliptra FMC ...
2,280,439 UART:
2,280,582 UART: [state] CFI Enabled
2,291,072 UART: [fht] FMC Alias Private Key: 7
2,409,538 UART: [art] Extend RT PCRs Done
2,409,966 UART: [art] Lock RT PCRs Done
2,411,254 UART: [art] Populate DV Done
2,419,279 UART: [fht] FMC Alias Private Key: 7
2,420,403 UART: [art] Derive CDI
2,420,683 UART: [art] Store in slot 0x4
2,506,738 UART: [art] Derive Key Pair
2,507,098 UART: [art] Store priv key in slot 0x5
2,521,228 UART: [art] Derive Key Pair - Done
2,536,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,750 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,515 UART: [art] PUB.X = D3F0011DD72B95C000B2A056664A2429EFA34283DE641E01B5E9A6A99C6C3EFB77354B4CCE248E384229708829797653
2,559,253 UART: [art] PUB.Y = E3853D9B76367565E33A1B2E38EAAB41D8C1877949A10DDEE1A1773FD202A7F31E415938AA0F77488AF1A1007BDABD6F
2,566,182 UART: [art] SIG.R = 4BAB89C5584945716AF1B7066AE5FB8A8E2F7FD5E3D8824C28E07162290F42E3E8C55B377A524B81BC05ABA8DCA8F880
2,572,953 UART: [art] SIG.S = D19B6C62D403E04EC5D8FAA3B8BC609F8354852EF138F03732F6AE440C86ECDA9EE75279F709DFFA68B70BF12BE80203
2,595,911 UART: mbox::rt_entry...
2,596,283 UART: ____ _ _ _ ____ _____
2,597,067 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,867 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,635 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,403 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,171 UART: |_|
2,600,483 UART:
2,718,231 UART: [rt] Runtime listening for mailbox commands...
2,719,181 >>> mbox cmd response data (0 bytes)
2,719,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,208,508 >>> mbox cmd response: success
5,222,031 UART:
5,222,047 UART: Running Caliptra FMC ...
5,222,455 UART:
5,222,598 UART: [state] CFI Enabled
5,312,043 UART: [art] Extend RT PCRs Done
5,312,471 UART: [art] Lock RT PCRs Done
5,313,876 UART: [art] Populate DV Done
5,322,129 UART: [fht] FMC Alias Private Key: 7
5,323,309 UART: [art] Derive CDI
5,323,589 UART: [art] Store in slot 0x4
5,409,148 UART: [art] Derive Key Pair
5,409,508 UART: [art] Store priv key in slot 0x5
5,422,908 UART: [art] Derive Key Pair - Done
5,437,610 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,453,169 UART: [art] Erasing AUTHORITY.KEYID = 7
5,453,934 UART: [art] PUB.X = 97988AB0FF60EB3B4874020901EE41D0E52B2DF9D0C39AF1D483393B764510472E016D40B28BB85C7963DA47EA9B4418
5,460,692 UART: [art] PUB.Y = 6ED169612242905832380C727FF9DFEF7DF23290B7C25E68424002725CAD938503E30FE1161B31C46DC7E161A4C909FD
5,467,623 UART: [art] SIG.R = 305FA1DE0B84CA217ECB6D3DEB0220342ACD617359F1B016B70150794C820BC976AF726A5C3A32A70C4193BD9D6F79AB
5,474,388 UART: [art] SIG.S = 20F0A57F08FCEA6B9EB52C8BAAFFBC9C2F82BCCAACF60DAC1E03D98E6140E72BE992BC1D935E42FB0A341590FF1B0308
5,497,624 UART: Caliptra RT
5,497,967 UART: [state] CFI Enabled
5,861,205 UART: [rt] RT failed reset flow
5,861,636 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,181 UART:
192,535 UART: Running Caliptra ROM ...
193,711 UART:
193,867 UART: [state] CFI Enabled
266,078 UART: [state] LifecycleState = Unprovisioned
268,065 UART: [state] DebugLocked = No
270,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,678 UART: [kat] SHA2-256
445,418 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,887 UART: [kat] ++
456,365 UART: [kat] sha1
466,604 UART: [kat] SHA2-256
469,330 UART: [kat] SHA2-384
475,958 UART: [kat] SHA2-512-ACC
478,333 UART: [kat] ECC-384
2,769,314 UART: [kat] HMAC-384Kdf
2,800,113 UART: [kat] LMS
3,990,430 UART: [kat] --
3,993,804 UART: [cold-reset] ++
3,995,525 UART: [fht] Storing FHT @ 0x50003400
4,006,441 UART: [idev] ++
4,007,013 UART: [idev] CDI.KEYID = 6
4,008,051 UART: [idev] SUBJECT.KEYID = 7
4,009,231 UART: [idev] UDS.KEYID = 0
4,010,268 ready_for_fw is high
4,010,464 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,114,731 UART: [idev] Erasing UDS.KEYID = 0
7,345,665 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,931 UART: [idev] --
7,372,030 UART: [ldev] ++
7,372,605 UART: [ldev] CDI.KEYID = 6
7,373,543 UART: [ldev] SUBJECT.KEYID = 5
7,374,832 UART: [ldev] AUTHORITY.KEYID = 7
7,375,987 UART: [ldev] FE.KEYID = 1
7,421,119 UART: [ldev] Erasing FE.KEYID = 1
10,754,783 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,353 UART: [ldev] --
13,135,191 UART: [fwproc] Waiting for Commands...
13,138,313 UART: [fwproc] Received command 0x46574c44
13,140,506 UART: [fwproc] Received Image of size 82832 bytes
16,809,885 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,890,469 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,963,642 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,166,408 >>> mbox cmd response: success
17,167,508 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
17,171,416 UART: [afmc] ++
17,172,053 UART: [afmc] CDI.KEYID = 6
17,172,966 UART: [afmc] SUBJECT.KEYID = 7
17,174,178 UART: [afmc] AUTHORITY.KEYID = 5
20,537,028 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,837,258 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,839,518 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,854,000 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,868,658 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,883,085 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,905,615 UART: [afmc] --
22,909,637 UART: [cold-reset] --
22,912,740 UART: [state] Locking Datavault
22,918,967 UART: [state] Locking PCR0, PCR1 and PCR31
22,920,723 UART: [state] Locking ICCM
22,923,413 UART: [exit] Launching FMC @ 0x40000130
22,931,830 UART:
22,932,073 UART: Running Caliptra FMC ...
22,933,178 UART:
22,933,339 UART: [state] CFI Enabled
22,998,681 UART: [fht] FMC Alias Private Key: 7
25,340,255 UART: [art] Extend RT PCRs Done
25,341,478 UART: [art] Lock RT PCRs Done
25,343,460 UART: [art] Populate DV Done
25,348,925 UART: [fht] FMC Alias Private Key: 7
25,350,414 UART: [art] Derive CDI
25,351,180 UART: [art] Store in slot 0x4
25,407,064 UART: [art] Derive Key Pair
25,408,107 UART: [art] Store priv key in slot 0x5
28,700,670 UART: [art] Derive Key Pair - Done
28,713,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,002,785 UART: [art] Erasing AUTHORITY.KEYID = 7
31,004,299 UART: [art] PUB.X = 99E900064738E86E45807A927B6494AA97504545BC6FA8CC52A819CB4CBB7A49882B7EAE9E9EC1531AC9961852610829
31,011,580 UART: [art] PUB.Y = 1D4870D750A1F2B42AE7E6CE9AB2A7B071BD885D78CE716F76A2B92F0F2E77963EE18004F23AFC3E5AED2B821409F337
31,018,779 UART: [art] SIG.R = 02A80BFDC04D8F03CF24863EE35A14A1F7DF75C053EB7C4D814EE43900700C932DD3E9EF75CE3F68CA437C3ED25FE13C
31,026,185 UART: [art] SIG.S = 130D39209A48D60E6DD07F82832F48CE35C7BC980FFE665D46092C998B42B61E2BAB9CF320AA5F4C708986F322972A93
32,330,850 UART: mbox::rt_entry...
32,331,793 UART: ____ _ _ _ ____ _____
32,333,772 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,335,782 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,337,713 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,339,643 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,341,577 UART: |_|
32,342,381 UART:
32,474,197 UART: [rt] Runtime listening for mailbox commands...
32,476,543 >>> mbox cmd response data (0 bytes)
34,553,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,704,427 UART:
34,704,829 UART: Running Caliptra ROM ...
34,705,881 UART:
34,706,034 UART: [state] CFI Enabled
34,778,864 UART: [state] LifecycleState = Unprovisioned
34,780,813 UART: [state] DebugLocked = No
34,782,933 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,788,460 UART: [kat] SHA2-256
34,958,159 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,968,660 UART: [kat] ++
34,969,141 UART: [kat] sha1
34,980,621 UART: [kat] SHA2-256
34,983,324 UART: [kat] SHA2-384
34,989,424 UART: [kat] SHA2-512-ACC
34,991,828 UART: [kat] ECC-384
37,281,485 UART: [kat] HMAC-384Kdf
37,314,608 UART: [kat] LMS
38,504,912 UART: [kat] --
38,508,968 UART: [update-reset] ++
42,704,597 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,708,291 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,106,034 >>> mbox cmd response: success
43,110,601 UART: [update-reset] Copying MAN_2 To MAN_1
43,130,273 UART: [update-reset Success] --
43,134,426 UART: [state] Locking Datavault
43,137,361 UART: [state] Locking PCR0, PCR1 and PCR31
43,139,204 UART: [state] Locking ICCM
43,140,179 UART: [exit] Launching FMC @ 0x40000130
43,148,579 UART:
43,148,860 UART: Running Caliptra FMC ...
43,149,922 UART:
43,150,077 UART: [state] CFI Enabled
43,255,830 UART: [art] Extend RT PCRs Done
43,257,035 UART: [art] Lock RT PCRs Done
43,258,455 UART: [art] Populate DV Done
43,264,297 UART: [fht] FMC Alias Private Key: 7
43,265,833 UART: [art] Derive CDI
43,266,650 UART: [art] Store in slot 0x4
43,325,051 UART: [art] Derive Key Pair
43,326,098 UART: [art] Store priv key in slot 0x5
46,618,644 UART: [art] Derive Key Pair - Done
46,631,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,920,174 UART: [art] Erasing AUTHORITY.KEYID = 7
48,921,815 UART: [art] PUB.X = 4957C69ECBD4B5A64DF4E026EF3F59405331ECE759DBB962288C7DF5B8C0B2EFB3C28B9772C6CDA93DF4E0CD5EA5C1BF
48,928,978 UART: [art] PUB.Y = 3963AD84F5B54A4EB7D718DE47115164BDEB247AF6033F20C1A5EC534FD11B4BBD0FBAAA64D5C2178E78F4CE1D08B9B3
48,936,288 UART: [art] SIG.R = 3869D21948045E03F116F4F784ECCE0220704BAA86E2979E77D562BF70A2C13C541CDDD4162DA8C306761FCB870B3F19
48,943,653 UART: [art] SIG.S = 2D8F4F13F8D9886B40C5715AFD9C3C290E07D6B202708BC6F0CD35DC605AB915AB38EC7EC579203ADC78F4B4F55D8354
50,249,161 UART: Caliptra RT
50,249,883 UART: [state] CFI Enabled
50,688,744 UART: [rt] RT failed reset flow
50,689,940 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,808,014 ready_for_fw is high
3,808,436 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,259,217 >>> mbox cmd response: success
17,260,311 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
22,948,495 UART:
22,948,898 UART: Running Caliptra FMC ...
22,950,052 UART:
22,950,220 UART: [state] CFI Enabled
23,018,673 UART: [fht] FMC Alias Private Key: 7
25,380,076 UART: [art] Extend RT PCRs Done
25,381,343 UART: [art] Lock RT PCRs Done
25,382,674 UART: [art] Populate DV Done
25,388,257 UART: [fht] FMC Alias Private Key: 7
25,389,848 UART: [art] Derive CDI
25,390,591 UART: [art] Store in slot 0x4
25,448,093 UART: [art] Derive Key Pair
25,449,138 UART: [art] Store priv key in slot 0x5
28,742,456 UART: [art] Derive Key Pair - Done
28,755,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,043,175 UART: [art] Erasing AUTHORITY.KEYID = 7
31,044,711 UART: [art] PUB.X = 25D4A6652CAFDFDA51D156F6FADCECB47BA693E9B8DB8E9172D1850E7D129EDCD3FB6AE631FA56B07887363C8A4310E1
31,051,982 UART: [art] PUB.Y = B24E4A006B65293349BBB4AFF4CA5087F2C11E094CD88E9E06431C6772EA900D839B6EFE47649D4498A74A78D19AFCAB
31,059,253 UART: [art] SIG.R = 5D65E4CB950FB830C6B5B6D2BC8A06DFBEB7A484ABCB4C7574B1A20A55954602CDE100CCACD9E7A5772109454E56F3FD
31,066,610 UART: [art] SIG.S = 776D3A515F2BB359ADD44D2EE4D39FFA737AA84965C45DCE537567BAA9DA3A3FF5D6BC0C951625EEB61C36680FC6A112
32,371,476 UART: mbox::rt_entry...
32,372,446 UART: ____ _ _ _ ____ _____
32,374,456 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,376,462 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,378,390 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,380,384 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,382,319 UART: |_|
32,383,126 UART:
32,514,410 UART: [rt] Runtime listening for mailbox commands...
32,516,737 >>> mbox cmd response data (0 bytes)
34,593,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,439,671 >>> mbox cmd response: success
43,474,569 UART:
43,474,880 UART: Running Caliptra FMC ...
43,476,021 UART:
43,476,200 UART: [state] CFI Enabled
43,575,012 UART: [art] Extend RT PCRs Done
43,576,218 UART: [art] Lock RT PCRs Done
43,577,468 UART: [art] Populate DV Done
43,582,768 UART: [fht] FMC Alias Private Key: 7
43,584,307 UART: [art] Derive CDI
43,585,122 UART: [art] Store in slot 0x4
43,644,380 UART: [art] Derive Key Pair
43,645,426 UART: [art] Store priv key in slot 0x5
46,937,562 UART: [art] Derive Key Pair - Done
46,950,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,240,409 UART: [art] Erasing AUTHORITY.KEYID = 7
49,241,923 UART: [art] PUB.X = 1034D151710B519E4A53D66B3B6D2DBF851DB34ED415F25CCC342C531ED8A865133040FCFE5726B0D183A40FCBC7CDCC
49,249,236 UART: [art] PUB.Y = 1D35C1B877DB1F440D6730AE3A0D1C73C983994F4F6D0279D2F995C4B6CA82838BAEAE754278982203B7E4FC2B252FD3
49,256,448 UART: [art] SIG.R = C0E7532ABC5AF864D01E6F988FA4A0266C7C1C9E4C1081195C07D651193E5CD093F8CDA0C494588930790FA2CCE99408
49,263,868 UART: [art] SIG.S = 0471081B5999B595BAE6C1F363EEDBE84080C588C505A26C3731B555E637D671AB733ED0CD164100D8B8C8010BB5533D
50,569,056 UART: Caliptra RT
50,569,775 UART: [state] CFI Enabled
50,988,000 UART: [rt] RT failed reset flow
50,989,225 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,313 UART:
192,687 UART: Running Caliptra ROM ...
193,817 UART:
603,643 UART: [state] CFI Enabled
620,993 UART: [state] LifecycleState = Unprovisioned
622,935 UART: [state] DebugLocked = No
624,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,016 UART: [kat] SHA2-256
798,738 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,249 UART: [kat] ++
809,776 UART: [kat] sha1
820,311 UART: [kat] SHA2-256
823,056 UART: [kat] SHA2-384
827,532 UART: [kat] SHA2-512-ACC
829,899 UART: [kat] ECC-384
3,111,938 UART: [kat] HMAC-384Kdf
3,123,523 UART: [kat] LMS
4,313,667 UART: [kat] --
4,319,113 UART: [cold-reset] ++
4,320,406 UART: [fht] Storing FHT @ 0x50003400
4,332,165 UART: [idev] ++
4,332,721 UART: [idev] CDI.KEYID = 6
4,333,694 UART: [idev] SUBJECT.KEYID = 7
4,334,928 UART: [idev] UDS.KEYID = 0
4,335,984 ready_for_fw is high
4,336,200 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,441,971 UART: [idev] Erasing UDS.KEYID = 0
7,623,931 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,793 UART: [idev] --
7,649,623 UART: [ldev] ++
7,650,241 UART: [ldev] CDI.KEYID = 6
7,651,170 UART: [ldev] SUBJECT.KEYID = 5
7,652,371 UART: [ldev] AUTHORITY.KEYID = 7
7,653,648 UART: [ldev] FE.KEYID = 1
7,663,936 UART: [ldev] Erasing FE.KEYID = 1
10,957,322 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,161 UART: [ldev] --
13,320,272 UART: [fwproc] Waiting for Commands...
13,323,605 UART: [fwproc] Received command 0x46574c44
13,325,800 UART: [fwproc] Received Image of size 82832 bytes
16,996,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,072,524 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,145,697 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,348,931 >>> mbox cmd response: success
17,350,117 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
17,353,445 UART: [afmc] ++
17,354,081 UART: [afmc] CDI.KEYID = 6
17,354,963 UART: [afmc] SUBJECT.KEYID = 7
17,356,223 UART: [afmc] AUTHORITY.KEYID = 5
20,672,016 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,964,341 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,966,595 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,981,017 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,995,750 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,010,172 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,030,804 UART: [afmc] --
23,034,563 UART: [cold-reset] --
23,038,851 UART: [state] Locking Datavault
23,044,792 UART: [state] Locking PCR0, PCR1 and PCR31
23,046,535 UART: [state] Locking ICCM
23,048,411 UART: [exit] Launching FMC @ 0x40000130
23,056,806 UART:
23,057,038 UART: Running Caliptra FMC ...
23,058,132 UART:
23,058,286 UART: [state] CFI Enabled
23,066,065 UART: [fht] FMC Alias Private Key: 7
25,406,129 UART: [art] Extend RT PCRs Done
25,407,352 UART: [art] Lock RT PCRs Done
25,409,109 UART: [art] Populate DV Done
25,414,408 UART: [fht] FMC Alias Private Key: 7
25,415,993 UART: [art] Derive CDI
25,416,819 UART: [art] Store in slot 0x4
25,459,680 UART: [art] Derive Key Pair
25,460,673 UART: [art] Store priv key in slot 0x5
28,702,759 UART: [art] Derive Key Pair - Done
28,715,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,995,573 UART: [art] Erasing AUTHORITY.KEYID = 7
30,997,091 UART: [art] PUB.X = 441F5F8BF88CA1356F7AB91D263489909C20EA988989A96866EE80BB84C7130B7DC388D1D1F6F6DBC71941F195A64909
31,004,354 UART: [art] PUB.Y = 0E6287364FCA8A0F9ED7645500959016A65140EF04973B293C1FC0D6CB34EAAEC2E4C5458F1A5E0678685DCC6AD774CE
31,011,593 UART: [art] SIG.R = F26382818A76D0F3A7DA605C035BA9176E0CE055DE91E2A73F5838A2309EF59B738D49F8D40059F5CFC1B8ED9F368343
31,018,990 UART: [art] SIG.S = F08AFFC88999E1FABC30F36F0B7374E7E1E8A03BDA65C3D9A82CE639E8EBD9907246B88F58EFDF3A51A148D27D0A6C4E
32,323,921 UART: mbox::rt_entry...
32,324,865 UART: ____ _ _ _ ____ _____
32,326,837 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,328,834 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,330,754 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,332,675 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,334,617 UART: |_|
32,335,421 UART:
32,466,850 UART: [rt] Runtime listening for mailbox commands...
32,469,192 >>> mbox cmd response data (0 bytes)
34,542,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,693,164 UART:
34,693,541 UART: Running Caliptra ROM ...
34,694,676 UART:
34,694,842 UART: [state] CFI Enabled
34,710,833 UART: [state] LifecycleState = Unprovisioned
34,712,742 UART: [state] DebugLocked = No
34,715,406 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,720,085 UART: [kat] SHA2-256
34,889,839 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,900,353 UART: [kat] ++
34,900,891 UART: [kat] sha1
34,912,211 UART: [kat] SHA2-256
34,914,957 UART: [kat] SHA2-384
34,920,513 UART: [kat] SHA2-512-ACC
34,922,864 UART: [kat] ECC-384
37,207,142 UART: [kat] HMAC-384Kdf
37,218,366 UART: [kat] LMS
38,408,423 UART: [kat] --
38,412,966 UART: [update-reset] ++
42,609,800 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,613,096 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,010,865 >>> mbox cmd response: success
43,015,279 UART: [update-reset] Copying MAN_2 To MAN_1
43,034,133 UART: [update-reset Success] --
43,036,326 UART: [state] Locking Datavault
43,038,939 UART: [state] Locking PCR0, PCR1 and PCR31
43,040,802 UART: [state] Locking ICCM
43,041,984 UART: [exit] Launching FMC @ 0x40000130
43,050,435 UART:
43,050,670 UART: Running Caliptra FMC ...
43,051,768 UART:
43,051,924 UART: [state] CFI Enabled
43,096,140 UART: [art] Extend RT PCRs Done
43,097,355 UART: [art] Lock RT PCRs Done
43,098,866 UART: [art] Populate DV Done
43,104,378 UART: [fht] FMC Alias Private Key: 7
43,106,015 UART: [art] Derive CDI
43,106,823 UART: [art] Store in slot 0x4
43,149,606 UART: [art] Derive Key Pair
43,150,647 UART: [art] Store priv key in slot 0x5
46,392,493 UART: [art] Derive Key Pair - Done
46,405,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,686,053 UART: [art] Erasing AUTHORITY.KEYID = 7
48,687,561 UART: [art] PUB.X = C882E8DBD5B1B7D0C8019557A557348E476338AF8E3FF51A7E18BD9A6027A74A4CA3A634A5D3E46B70C247D5502924C2
48,694,828 UART: [art] PUB.Y = 1437F46A5FE4CAB3650F0F06DB2D594154BBF9DC1F3716229B2461DAA2BE959C56E3E1CAD008702E0D61E89982EE593A
48,702,126 UART: [art] SIG.R = 613D3EF2F3C4D5C3AB93E9289AAD935BCB74AD61EABDB5AF59DE28EE009A0C469D0DFBDAA126400B75040BE3C9380C9A
48,709,475 UART: [art] SIG.S = DCCCB246F601368139BAEED2E9864FB985DFCD0D87423AAD55D7B47866A7FB89941BA88005C0B2CC280C9F992DCDF552
50,015,407 UART: Caliptra RT
50,016,128 UART: [state] CFI Enabled
50,388,121 UART: [rt] RT failed reset flow
50,389,340 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,127,362 ready_for_fw is high
4,127,956 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,444,745 >>> mbox cmd response: success
17,446,068 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
23,080,938 UART:
23,081,339 UART: Running Caliptra FMC ...
23,082,453 UART:
23,082,610 UART: [state] CFI Enabled
23,090,377 UART: [fht] FMC Alias Private Key: 7
25,430,883 UART: [art] Extend RT PCRs Done
25,432,112 UART: [art] Lock RT PCRs Done
25,433,979 UART: [art] Populate DV Done
25,439,555 UART: [fht] FMC Alias Private Key: 7
25,441,099 UART: [art] Derive CDI
25,441,919 UART: [art] Store in slot 0x4
25,484,280 UART: [art] Derive Key Pair
25,485,346 UART: [art] Store priv key in slot 0x5
28,727,477 UART: [art] Derive Key Pair - Done
28,740,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,020,677 UART: [art] Erasing AUTHORITY.KEYID = 7
31,022,201 UART: [art] PUB.X = 9ED932999ED9FB48BA11E607B9B39D3BEF58C1D5C75BACA2DFAFF1E8F159613DF1B6DAECA76ACEC167CE72EFBD5EA58F
31,029,460 UART: [art] PUB.Y = 7E322DC874B53D56314A5687970FBA7586B696A7BFB726A8E4DE7C0440835D378DFD9A242B4C35AB7FAD7F47DA996419
31,036,710 UART: [art] SIG.R = AC89529355C9C4A3D1A3606C019DC4109FA0D73C7EA8A95AA1E5F274BE315192278D53AA4C63440EEB3607B4D7882F6C
31,044,108 UART: [art] SIG.S = 7F6DF1F6CEE0C64D3D0AC8B847BBFC3D03BAB05F9B94414957DABEA196980B72F2B15EA461E2142D2D38757F29674268
32,349,028 UART: mbox::rt_entry...
32,350,010 UART: ____ _ _ _ ____ _____
32,351,994 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,353,916 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,355,841 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,357,860 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,359,790 UART: |_|
32,360,593 UART:
32,492,500 UART: [rt] Runtime listening for mailbox commands...
32,494,853 >>> mbox cmd response data (0 bytes)
34,567,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,318,032 >>> mbox cmd response: success
43,353,187 UART:
43,353,490 UART: Running Caliptra FMC ...
43,354,530 UART:
43,354,675 UART: [state] CFI Enabled
43,398,917 UART: [art] Extend RT PCRs Done
43,400,106 UART: [art] Lock RT PCRs Done
43,401,485 UART: [art] Populate DV Done
43,406,840 UART: [fht] FMC Alias Private Key: 7
43,408,319 UART: [art] Derive CDI
43,409,052 UART: [art] Store in slot 0x4
43,451,597 UART: [art] Derive Key Pair
43,452,632 UART: [art] Store priv key in slot 0x5
46,694,791 UART: [art] Derive Key Pair - Done
46,707,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,987,948 UART: [art] Erasing AUTHORITY.KEYID = 7
48,989,465 UART: [art] PUB.X = E755B484AD5BF803680A0E4ECCA68B507EEC3D48CD35881B710C41A64BDDC17B8BA1E9E5D25068174AC371B3EF4BAB07
48,996,788 UART: [art] PUB.Y = 1BF9CBF6C909B8051BD718E2D86D97BEAAA8D5DBE40E103B7D84FC7350CB84E857A6675FA89E60F1CC0BEF8E7E557CC5
49,004,020 UART: [art] SIG.R = 856AED74F23D953D02608D879D0DAB682D730E52B675A6A8BB031FF168A43B44DA5AB792ACC0DF27022BBB0F1D7BA9AE
49,011,416 UART: [art] SIG.S = 967617F1D591775D7A7DDFC0C70C2031F393004175C31DD260BCBF7563CE22B7DCB9DFE04CC1E4C91434A4FA4DDC568B
50,317,024 UART: Caliptra RT
50,317,742 UART: [state] CFI Enabled
50,689,388 UART: [rt] RT failed reset flow
50,690,587 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,760 writing to cptra_bootfsm_go
192,876 UART:
193,237 UART: Running Caliptra ROM ...
194,415 UART:
194,572 UART: [state] CFI Enabled
261,695 UART: [state] LifecycleState = Unprovisioned
263,683 UART: [state] DebugLocked = No
266,209 UART: [state] WD Timer not started. Device not locked for debugging
270,953 UART: [kat] SHA2-256
450,593 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,353 UART: [kat] ++
461,888 UART: [kat] sha1
474,132 UART: [kat] SHA2-256
476,858 UART: [kat] SHA2-384
484,154 UART: [kat] SHA2-512-ACC
486,561 UART: [kat] ECC-384
2,947,645 UART: [kat] HMAC-384Kdf
2,971,602 UART: [kat] LMS
3,448,077 UART: [kat] --
3,453,142 UART: [cold-reset] ++
3,454,008 UART: [fht] FHT @ 0x50003400
3,465,617 UART: [idev] ++
3,466,174 UART: [idev] CDI.KEYID = 6
3,467,122 UART: [idev] SUBJECT.KEYID = 7
3,468,360 UART: [idev] UDS.KEYID = 0
3,469,324 ready_for_fw is high
3,469,525 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,573,865 UART: [idev] Erasing UDS.KEYID = 0
5,987,703 UART: [idev] Sha1 KeyId Algorithm
6,011,203 UART: [idev] --
6,016,528 UART: [ldev] ++
6,017,098 UART: [ldev] CDI.KEYID = 6
6,018,040 UART: [ldev] SUBJECT.KEYID = 5
6,019,254 UART: [ldev] AUTHORITY.KEYID = 7
6,020,481 UART: [ldev] FE.KEYID = 1
6,056,547 UART: [ldev] Erasing FE.KEYID = 1
8,560,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,820 UART: [ldev] --
10,373,023 UART: [fwproc] Wait for Commands...
10,375,659 UART: [fwproc] Recv command 0x46574c44
10,377,709 UART: [fwproc] Recv'd Img size: 82832 bytes
13,420,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,502,136 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,575,196 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,778,150 >>> mbox cmd response: success
13,779,226 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
13,782,001 UART: [afmc] ++
13,782,595 UART: [afmc] CDI.KEYID = 6
13,783,474 UART: [afmc] SUBJECT.KEYID = 7
13,784,743 UART: [afmc] AUTHORITY.KEYID = 5
16,313,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,039,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,042,162 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,057,957 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,073,997 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,089,594 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,115,211 UART: [afmc] --
18,118,379 UART: [cold-reset] --
18,121,803 UART: [state] Locking Datavault
18,127,260 UART: [state] Locking PCR0, PCR1 and PCR31
18,129,008 UART: [state] Locking ICCM
18,131,052 UART: [exit] Launching FMC @ 0x40000130
18,139,456 UART:
18,139,689 UART: Running Caliptra FMC ...
18,140,787 UART:
18,140,941 UART: [state] CFI Enabled
18,197,394 UART: [fht] FMC Alias Private Key: 7
19,984,974 UART: [art] Extend RT PCRs Done
19,986,200 UART: [art] Lock RT PCRs Done
19,987,968 UART: [art] Populate DV Done
19,993,430 UART: [fht] FMC Alias Private Key: 7
19,994,966 UART: [art] Derive CDI
19,995,724 UART: [art] Store in slot 0x4
20,051,123 UART: [art] Derive Key Pair
20,052,167 UART: [art] Store priv key in slot 0x5
22,515,398 UART: [art] Derive Key Pair - Done
22,528,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,241,178 UART: [art] Erasing AUTHORITY.KEYID = 7
24,242,676 UART: [art] PUB.X = 20E16FBE510E06176FAF65EF72EAFA3125279782ECFF43D57BA8AA9D1767A2AFE6C0206A8E64200A177EFA582968676D
24,249,996 UART: [art] PUB.Y = 9FB84C0BC244A62FDF48C3799E4CFBC4534D5E994C068CBD1D9667398915C2C0332B1D62875DB67F31E97524978089B7
24,257,251 UART: [art] SIG.R = A69FD553D2C909F5A423618CC15647929D80EAB15ADDDDB53FD9519F830E158F903F6633E8FA803074ED194346782618
24,264,592 UART: [art] SIG.S = BD0F608C7D6ED53D540E6C1C0EA678EA204FD615EF627D7F3DB3D4E74F668AE4B764D524A03D9C0C5F327E562E6BA1A5
25,243,379 UART: mbox::rt_entry...
25,244,327 UART: ____ _ _ _ ____ _____
25,246,301 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,248,301 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,250,229 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,252,155 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,254,095 UART: |_|
25,254,907 UART:
25,385,915 UART: [rt] Runtime listening for mailbox commands...
25,388,272 >>> mbox cmd response data (0 bytes)
27,454,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,604,770 UART:
27,605,179 UART: Running Caliptra ROM ...
27,606,232 UART:
27,606,380 UART: [state] CFI Enabled
27,675,641 UART: [state] LifecycleState = Unprovisioned
27,677,565 UART: [state] DebugLocked = No
27,680,146 UART: [state] WD Timer not started. Device not locked for debugging
27,683,966 UART: [kat] SHA2-256
27,863,659 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,874,446 UART: [kat] ++
27,874,932 UART: [kat] sha1
27,886,468 UART: [kat] SHA2-256
27,889,166 UART: [kat] SHA2-384
27,895,094 UART: [kat] SHA2-512-ACC
27,897,445 UART: [kat] ECC-384
30,356,968 UART: [kat] HMAC-384Kdf
30,381,893 UART: [kat] LMS
30,858,329 UART: [kat] --
30,862,901 UART: [update-reset] ++
34,358,575 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,361,370 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,758,986 >>> mbox cmd response: success
34,763,644 UART: [update-reset] Copying MAN_2 To MAN_1
34,797,407 UART: [update-reset Success] --
34,801,493 UART: [state] Locking Datavault
34,805,102 UART: [state] Locking PCR0, PCR1 and PCR31
34,806,858 UART: [state] Locking ICCM
34,809,613 UART: [exit] Launching FMC @ 0x40000130
34,818,011 UART:
34,818,251 UART: Running Caliptra FMC ...
34,819,349 UART:
34,819,504 UART: [state] CFI Enabled
34,916,164 UART: [art] Extend RT PCRs Done
34,917,383 UART: [art] Lock RT PCRs Done
34,918,675 UART: [art] Populate DV Done
34,924,249 UART: [fht] FMC Alias Private Key: 7
34,926,000 UART: [art] Derive CDI
34,926,815 UART: [art] Store in slot 0x4
34,984,931 UART: [art] Derive Key Pair
34,985,974 UART: [art] Store priv key in slot 0x5
37,448,957 UART: [art] Derive Key Pair - Done
37,461,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,175,170 UART: [art] Erasing AUTHORITY.KEYID = 7
39,176,694 UART: [art] PUB.X = 6A5643C699685687D6648B80136E22CC7F200803090988DF9BD68DFF2C34701987FC4653855D3B6155FEA43583F6CACA
39,183,915 UART: [art] PUB.Y = 00859F78A6344B35DF288E5C608556A692B3F1928C1670EF82874938209FACB279EB6C6D8C62D73BCE9A4F4866061E57
39,191,176 UART: [art] SIG.R = EF90AA72133B2FDEE32BA8BC08976EFE04A311FE4FADAC7DBA706C2E39B84F1E76537636FF83ABC4715AFE1A464DEE85
39,198,598 UART: [art] SIG.S = 10BE895BC005755E9B4D612047E3EBAA7BFC04F1B77DD7BA2D1EFC232B186CE705352B2F8B51F7B15F58075C5D2E9D12
40,177,068 UART: Caliptra RT
40,177,791 UART: [state] CFI Enabled
40,597,031 UART: [rt] RT failed reset flow
40,598,229 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,457,671 ready_for_fw is high
3,458,237 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,651,289 >>> mbox cmd response: success
13,652,576 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
17,936,022 UART:
17,936,397 UART: Running Caliptra FMC ...
17,937,612 UART:
17,937,780 UART: [state] CFI Enabled
18,004,586 UART: [fht] FMC Alias Private Key: 7
19,770,928 UART: [art] Extend RT PCRs Done
19,772,152 UART: [art] Lock RT PCRs Done
19,773,563 UART: [art] Populate DV Done
19,778,834 UART: [fht] FMC Alias Private Key: 7
19,780,415 UART: [art] Derive CDI
19,781,238 UART: [art] Store in slot 0x4
19,837,283 UART: [art] Derive Key Pair
19,838,274 UART: [art] Store priv key in slot 0x5
22,301,486 UART: [art] Derive Key Pair - Done
22,314,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,027,368 UART: [art] Erasing AUTHORITY.KEYID = 7
24,028,891 UART: [art] PUB.X = 1DF5AC1F0BF8051F02C7DAC71AD75FC95A5019495BB06820AB86748C18320F5A7998E57A38B5F480F885046702A2B5B6
24,036,154 UART: [art] PUB.Y = A53A7127C1588CC6A3069EB037737C9C9D8AD73B15A785EFF67F0D2EC468A317C016D9875E3283304C20A9E277CA73EF
24,043,372 UART: [art] SIG.R = DDADDD8DCB23681039EE438BDAFF86EC0BC75C88EB138A4BEC1C374059153AFB2278D4AD36FA910B6FD019E81BF13734
24,050,775 UART: [art] SIG.S = 313EBD69F24664083CFED237EDAAEF49A7D4EE82DFEC4FFDB33B8B984BCB8FB50CED3A7DD529BAF6809442ED761D1E03
25,028,598 UART: mbox::rt_entry...
25,029,554 UART: ____ _ _ _ ____ _____
25,031,484 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,033,490 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,035,420 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,037,408 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,039,338 UART: |_|
25,040,174 UART:
25,170,759 UART: [rt] Runtime listening for mailbox commands...
25,173,092 >>> mbox cmd response data (0 bytes)
27,244,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,548,232 >>> mbox cmd response: success
34,583,510 UART:
34,583,835 UART: Running Caliptra FMC ...
34,584,958 UART:
34,585,125 UART: [state] CFI Enabled
34,679,558 UART: [art] Extend RT PCRs Done
34,680,738 UART: [art] Lock RT PCRs Done
34,681,977 UART: [art] Populate DV Done
34,687,542 UART: [fht] FMC Alias Private Key: 7
34,689,181 UART: [art] Derive CDI
34,689,990 UART: [art] Store in slot 0x4
34,748,744 UART: [art] Derive Key Pair
34,749,789 UART: [art] Store priv key in slot 0x5
37,212,981 UART: [art] Derive Key Pair - Done
37,225,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,938,229 UART: [art] Erasing AUTHORITY.KEYID = 7
38,939,742 UART: [art] PUB.X = 4A437B532ACE4E56E9800451E1EAC3E47897354CC5A92E52B866D87C89DE813B8959695FB8D69B9AD641D760AF0DB7CC
38,946,997 UART: [art] PUB.Y = 4119D5C91FE5EDE203135DF688D687668ACCB097FCE3CF247A94A754CDCF9ADE7F5DF91CC48527C2101C683DD7EB7CDD
38,954,294 UART: [art] SIG.R = E2FF783346D40720DEABAC3A2C75241BBEF9C5AFCF70D5ED45DA772C04E56CFD092511083427A1AE8787A00DF213FF9E
38,961,687 UART: [art] SIG.S = 872F6C06BD8C4B3B743BF412889CAE61D8388D45752F5342081E8254FA6C5147D8869144B32EC8EF2A2DE5AAB86B6D4F
39,941,324 UART: Caliptra RT
39,942,023 UART: [state] CFI Enabled
40,361,260 UART: [rt] RT failed reset flow
40,362,483 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,647 UART:
193,007 UART: Running Caliptra ROM ...
194,104 UART:
603,908 UART: [state] CFI Enabled
618,416 UART: [state] LifecycleState = Unprovisioned
620,396 UART: [state] DebugLocked = No
621,800 UART: [state] WD Timer not started. Device not locked for debugging
625,073 UART: [kat] SHA2-256
804,746 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,559 UART: [kat] ++
816,010 UART: [kat] sha1
828,591 UART: [kat] SHA2-256
831,315 UART: [kat] SHA2-384
837,733 UART: [kat] SHA2-512-ACC
840,097 UART: [kat] ECC-384
3,281,885 UART: [kat] HMAC-384Kdf
3,293,402 UART: [kat] LMS
3,769,954 UART: [kat] --
3,777,086 UART: [cold-reset] ++
3,778,596 UART: [fht] FHT @ 0x50003400
3,789,724 UART: [idev] ++
3,790,299 UART: [idev] CDI.KEYID = 6
3,791,351 UART: [idev] SUBJECT.KEYID = 7
3,792,534 UART: [idev] UDS.KEYID = 0
3,793,464 ready_for_fw is high
3,793,661 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,897,872 UART: [idev] Erasing UDS.KEYID = 0
6,269,527 UART: [idev] Sha1 KeyId Algorithm
6,292,635 UART: [idev] --
6,297,687 UART: [ldev] ++
6,298,321 UART: [ldev] CDI.KEYID = 6
6,299,228 UART: [ldev] SUBJECT.KEYID = 5
6,300,442 UART: [ldev] AUTHORITY.KEYID = 7
6,301,680 UART: [ldev] FE.KEYID = 1
6,311,950 UART: [ldev] Erasing FE.KEYID = 1
8,792,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,129 UART: [ldev] --
10,587,745 UART: [fwproc] Wait for Commands...
10,590,160 UART: [fwproc] Recv command 0x46574c44
10,592,150 UART: [fwproc] Recv'd Img size: 82832 bytes
13,641,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,727,999 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,801,021 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,005,178 >>> mbox cmd response: success
14,006,214 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
14,009,587 UART: [afmc] ++
14,010,171 UART: [afmc] CDI.KEYID = 6
14,011,081 UART: [afmc] SUBJECT.KEYID = 7
14,012,303 UART: [afmc] AUTHORITY.KEYID = 5
16,515,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,237,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,239,255 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,255,077 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,271,159 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,286,773 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,310,686 UART: [afmc] --
18,314,281 UART: [cold-reset] --
18,318,204 UART: [state] Locking Datavault
18,323,233 UART: [state] Locking PCR0, PCR1 and PCR31
18,324,994 UART: [state] Locking ICCM
18,326,497 UART: [exit] Launching FMC @ 0x40000130
18,334,899 UART:
18,335,139 UART: Running Caliptra FMC ...
18,336,241 UART:
18,336,414 UART: [state] CFI Enabled
18,344,471 UART: [fht] FMC Alias Private Key: 7
20,111,063 UART: [art] Extend RT PCRs Done
20,112,305 UART: [art] Lock RT PCRs Done
20,114,068 UART: [art] Populate DV Done
20,119,649 UART: [fht] FMC Alias Private Key: 7
20,121,351 UART: [art] Derive CDI
20,122,167 UART: [art] Store in slot 0x4
20,164,597 UART: [art] Derive Key Pair
20,165,634 UART: [art] Store priv key in slot 0x5
22,592,680 UART: [art] Derive Key Pair - Done
22,605,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,311,218 UART: [art] Erasing AUTHORITY.KEYID = 7
24,312,714 UART: [art] PUB.X = 9CEB5A634E664305F7699D8B206396308842467924D6750176023B884BBA4061644D9E9F4D73C6F692E6942576CB9CD0
24,319,961 UART: [art] PUB.Y = 48CC160C74546B2201BBF4143C49AE4249151A529DDEE127CF97BF325668AC3D46881D9F5232DFA27A1F798FC5CD0FFE
24,327,186 UART: [art] SIG.R = 030AF3C94C76BC9CDDF063576F8989638EBA7DB985863E8E8811B44CE2ADE2B65F445D6497DD4743F46668DAC477E5A6
24,334,571 UART: [art] SIG.S = F43C763BA9EB8581F852605EC35BEE1BCA4333DFB20CC2228711D852AC965DABB2405558F2D447F03376E6C8EFF8676D
25,313,810 UART: mbox::rt_entry...
25,314,781 UART: ____ _ _ _ ____ _____
25,316,715 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,318,719 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,320,577 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,322,497 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,324,350 UART: |_|
25,325,783 UART:
25,455,750 UART: [rt] Runtime listening for mailbox commands...
25,458,128 >>> mbox cmd response data (0 bytes)
27,519,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,669,494 UART:
27,669,869 UART: Running Caliptra ROM ...
27,670,927 UART:
27,671,142 UART: [state] CFI Enabled
27,685,926 UART: [state] LifecycleState = Unprovisioned
27,687,826 UART: [state] DebugLocked = No
27,689,389 UART: [state] WD Timer not started. Device not locked for debugging
27,692,605 UART: [kat] SHA2-256
27,872,301 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,883,091 UART: [kat] ++
27,883,579 UART: [kat] sha1
27,894,743 UART: [kat] SHA2-256
27,897,483 UART: [kat] SHA2-384
27,901,807 UART: [kat] SHA2-512-ACC
27,904,161 UART: [kat] ECC-384
30,348,398 UART: [kat] HMAC-384Kdf
30,360,705 UART: [kat] LMS
30,837,223 UART: [kat] --
30,842,127 UART: [update-reset] ++
34,334,676 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,338,068 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,735,664 >>> mbox cmd response: success
34,740,326 UART: [update-reset] Copying MAN_2 To MAN_1
34,774,044 UART: [update-reset Success] --
34,777,635 UART: [state] Locking Datavault
34,780,145 UART: [state] Locking PCR0, PCR1 and PCR31
34,781,908 UART: [state] Locking ICCM
34,783,657 UART: [exit] Launching FMC @ 0x40000130
34,792,029 UART:
34,792,276 UART: Running Caliptra FMC ...
34,793,307 UART:
34,793,455 UART: [state] CFI Enabled
34,838,436 UART: [art] Extend RT PCRs Done
34,839,599 UART: [art] Lock RT PCRs Done
34,841,023 UART: [art] Populate DV Done
34,846,698 UART: [fht] FMC Alias Private Key: 7
34,848,403 UART: [art] Derive CDI
34,849,147 UART: [art] Store in slot 0x4
34,891,852 UART: [art] Derive Key Pair
34,892,853 UART: [art] Store priv key in slot 0x5
37,319,928 UART: [art] Derive Key Pair - Done
37,332,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,039,585 UART: [art] Erasing AUTHORITY.KEYID = 7
39,041,096 UART: [art] PUB.X = 735A2E5BE5B04C6C3E66F850B935C51D012620C70DEAFAABEF2DA82F11BDBBD018EA2B970FE4105CA43C30263A475F95
39,048,443 UART: [art] PUB.Y = 32EE4FD4E4B019DA8EB849B3321FE538F9FBD7658EC688087671E439AB1D29D45556A23F7A323F103F59BC3235D0DE5B
39,055,707 UART: [art] SIG.R = 9DFF36E350E864DC7FBAD541F421B8BE8E0402DA47CAE3F2777CCADF004A6FFE509CB638CFC56ABA4508EF676888D134
39,063,081 UART: [art] SIG.S = 8DE4E18C4842421131F54FC867B0FC39C9908C0B936CF07108BD07BD1F81EEBE7E812775973AEA31EC084F01A0793AD1
40,041,938 UART: Caliptra RT
40,042,653 UART: [state] CFI Enabled
40,416,398 UART: [rt] RT failed reset flow
40,417,591 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,784,161 ready_for_fw is high
3,784,553 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,873,787 >>> mbox cmd response: success
13,874,836 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
18,127,689 UART:
18,128,069 UART: Running Caliptra FMC ...
18,129,172 UART:
18,129,349 UART: [state] CFI Enabled
18,137,034 UART: [fht] FMC Alias Private Key: 7
19,902,575 UART: [art] Extend RT PCRs Done
19,903,795 UART: [art] Lock RT PCRs Done
19,905,635 UART: [art] Populate DV Done
19,911,212 UART: [fht] FMC Alias Private Key: 7
19,912,865 UART: [art] Derive CDI
19,913,680 UART: [art] Store in slot 0x4
19,956,205 UART: [art] Derive Key Pair
19,957,222 UART: [art] Store priv key in slot 0x5
22,384,464 UART: [art] Derive Key Pair - Done
22,397,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,103,278 UART: [art] Erasing AUTHORITY.KEYID = 7
24,104,776 UART: [art] PUB.X = 0905A17B29889CF319A499518E19A109FE03CFDE2FD2A5CF833E4658426776DA7165278B6E96CD421AB2031ADB6BD202
24,112,036 UART: [art] PUB.Y = B9C80999B83C5C6DE0E57AF758410DDBC3EC8AEB3EB09F5161551350EE78399FCFB3C41B317D1D99BB3CB9AD61602FEB
24,119,344 UART: [art] SIG.R = 8285BDB52B99423A6AE6D6701BDE247EA745AE39CA7AA75BF883A5D61FEF77EE3EB5A5E631FA6B5C047C002D9984F818
24,126,765 UART: [art] SIG.S = A4946F754D2D5C442D235E362B20A206E5BDD30723B05E2586B191CADE6752C214BAE5E2DAAEDD183F09E81221A93F9D
25,105,251 UART: mbox::rt_entry...
25,106,207 UART: ____ _ _ _ ____ _____
25,108,191 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,110,197 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,112,128 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,114,113 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,116,603 UART: |_|
25,117,421 UART:
25,249,133 UART: [rt] Runtime listening for mailbox commands...
25,251,466 >>> mbox cmd response data (0 bytes)
27,322,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,545,253 >>> mbox cmd response: success
34,580,642 UART:
34,580,968 UART: Running Caliptra FMC ...
34,582,103 UART:
34,582,275 UART: [state] CFI Enabled
34,626,573 UART: [art] Extend RT PCRs Done
34,627,727 UART: [art] Lock RT PCRs Done
34,629,177 UART: [art] Populate DV Done
34,634,641 UART: [fht] FMC Alias Private Key: 7
34,636,338 UART: [art] Derive CDI
34,637,127 UART: [art] Store in slot 0x4
34,680,152 UART: [art] Derive Key Pair
34,681,155 UART: [art] Store priv key in slot 0x5
37,107,880 UART: [art] Derive Key Pair - Done
37,121,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,827,867 UART: [art] Erasing AUTHORITY.KEYID = 7
38,829,377 UART: [art] PUB.X = F1687E647C7AEE46FF577AFB6B99C436EC339B575B8BCFBC1AA3AE144674803A049DC5ACA4B51F26F15518C0487A77B7
38,836,697 UART: [art] PUB.Y = B699DC0B6954200C62E46E3AFC63C3DE4EE6911D888F3054728D22B4191A9026678F093BDBB3BD5E5FF73B6CEC977741
38,843,942 UART: [art] SIG.R = 7B032ECD99181F038FB5109646A6C3CA0CEE766F3B5BD6F9616BFFBFD06183FEA7CEED7B324AA8DDD67A495FC9DEFCA7
38,851,339 UART: [art] SIG.S = E137CBE740DAF1502FE3AF2B3DBA17EB9D5D628CB774017F2678BDE3BE0DCBF6B4D9F1BDFD4E80DF237ED60871454305
39,831,084 UART: Caliptra RT
39,831,798 UART: [state] CFI Enabled
40,206,025 UART: [rt] RT failed reset flow
40,207,234 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,301 UART:
192,649 UART: Running Caliptra ROM ...
193,824 UART:
193,977 UART: [state] CFI Enabled
262,141 UART: [state] LifecycleState = Unprovisioned
264,540 UART: [state] DebugLocked = No
265,865 UART: [state] WD Timer not started. Device not locked for debugging
270,531 UART: [kat] SHA2-256
460,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,179 UART: [kat] ++
471,636 UART: [kat] sha1
483,823 UART: [kat] SHA2-256
486,841 UART: [kat] SHA2-384
492,123 UART: [kat] SHA2-512-ACC
494,699 UART: [kat] ECC-384
2,947,218 UART: [kat] HMAC-384Kdf
2,971,247 UART: [kat] LMS
3,503,026 UART: [kat] --
3,508,404 UART: [cold-reset] ++
3,511,005 UART: [fht] FHT @ 0x50003400
3,521,948 UART: [idev] ++
3,522,668 UART: [idev] CDI.KEYID = 6
3,523,552 UART: [idev] SUBJECT.KEYID = 7
3,524,792 UART: [idev] UDS.KEYID = 0
3,525,880 ready_for_fw is high
3,526,101 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,630,592 UART: [idev] Erasing UDS.KEYID = 0
6,026,948 UART: [idev] Sha1 KeyId Algorithm
6,048,948 UART: [idev] --
6,054,134 UART: [ldev] ++
6,054,814 UART: [ldev] CDI.KEYID = 6
6,055,733 UART: [ldev] SUBJECT.KEYID = 5
6,056,944 UART: [ldev] AUTHORITY.KEYID = 7
6,058,119 UART: [ldev] FE.KEYID = 1
6,098,299 UART: [ldev] Erasing FE.KEYID = 1
8,604,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,209 UART: [ldev] --
10,412,717 UART: [fwproc] Wait for Commands...
10,414,376 UART: [fwproc] Recv command 0x46574c44
10,416,679 UART: [fwproc] Recv'd Img size: 82832 bytes
13,477,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,559,920 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,683,522 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,028,998 >>> mbox cmd response: success
14,029,502 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
14,033,627 UART: [afmc] ++
14,034,321 UART: [afmc] CDI.KEYID = 6
14,035,500 UART: [afmc] SUBJECT.KEYID = 7
14,036,988 UART: [afmc] AUTHORITY.KEYID = 5
16,565,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,293,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,295,793 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,311,038 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,326,060 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,340,935 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,364,701 UART: [afmc] --
18,368,554 UART: [cold-reset] --
18,372,634 UART: [state] Locking Datavault
18,377,772 UART: [state] Locking PCR0, PCR1 and PCR31
18,379,900 UART: [state] Locking ICCM
18,381,702 UART: [exit] Launching FMC @ 0x40000130
18,390,415 UART:
18,390,819 UART: Running Caliptra FMC ...
18,391,856 UART:
18,392,049 UART: [state] CFI Enabled
18,451,435 UART: [fht] FMC Alias Private Key: 7
20,218,150 UART: [art] Extend RT PCRs Done
20,219,373 UART: [art] Lock RT PCRs Done
20,221,184 UART: [art] Populate DV Done
20,226,933 UART: [fht] FMC Alias Private Key: 7
20,228,576 UART: [art] Derive CDI
20,229,309 UART: [art] Store in slot 0x4
20,284,165 UART: [art] Derive Key Pair
20,285,201 UART: [art] Store priv key in slot 0x5
22,748,188 UART: [art] Derive Key Pair - Done
22,761,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,474,686 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,194 UART: [art] PUB.X = 32E85879F7396841BF2A88CB8ABADE381DFE17CF6E04F3376489CA8016685C05F14FFFA496996901C555C96A4D3DC7D1
24,483,467 UART: [art] PUB.Y = B12D3FA4921EEA9023F0F3635A35C54424A1D86E3976884167D17898ACA8CD35CDFA621A6D9485712BE47CE835E4E638
24,490,718 UART: [art] SIG.R = A2E3E2BDE77D23C8B61A92A395EACA680D6DDB7B0F902D530F4E6A4CA54A8E38C59C05030EF21CFB57EFFE2FB742B3CB
24,498,127 UART: [art] SIG.S = B7BBED1EE40D5BBE763FAEAF321A31F9D72CDDAEF77804730D68B2D1ED7AF42D93D47E4814BEB860DA45544FF8C75E00
25,476,088 UART: mbox::rt_entry...
25,477,044 UART: ____ _ _ _ ____ _____
25,478,971 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,480,975 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,482,923 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,484,853 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,486,781 UART: |_|
25,487,611 UART:
25,617,870 UART: [rt] Runtime listening for mailbox commands...
25,620,203 >>> mbox cmd response data (0 bytes)
27,687,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,837,628 UART:
27,837,984 UART: Running Caliptra ROM ...
27,839,121 UART:
27,839,314 UART: [state] CFI Enabled
27,907,588 UART: [state] LifecycleState = Unprovisioned
27,909,644 UART: [state] DebugLocked = No
27,911,789 UART: [state] WD Timer not started. Device not locked for debugging
27,916,304 UART: [kat] SHA2-256
28,106,157 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,116,909 UART: [kat] ++
28,117,405 UART: [kat] sha1
28,128,780 UART: [kat] SHA2-256
28,131,806 UART: [kat] SHA2-384
28,138,176 UART: [kat] SHA2-512-ACC
28,140,750 UART: [kat] ECC-384
30,591,296 UART: [kat] HMAC-384Kdf
30,614,699 UART: [kat] LMS
31,146,256 UART: [kat] --
31,149,812 UART: [update-reset] ++
34,652,715 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,655,990 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,285,740 >>> mbox cmd response: success
35,290,372 UART: [update-reset] Copying MAN_2 To MAN_1
35,323,552 UART: [update-reset Success] --
35,325,914 UART: [state] Locking Datavault
35,329,341 UART: [state] Locking PCR0, PCR1 and PCR31
35,331,486 UART: [state] Locking ICCM
35,333,968 UART: [exit] Launching FMC @ 0x40000130
35,342,656 UART:
35,342,893 UART: Running Caliptra FMC ...
35,343,995 UART:
35,344,181 UART: [state] CFI Enabled
35,448,086 UART: [art] Extend RT PCRs Done
35,449,292 UART: [art] Lock RT PCRs Done
35,450,806 UART: [art] Populate DV Done
35,456,319 UART: [fht] FMC Alias Private Key: 7
35,458,014 UART: [art] Derive CDI
35,458,829 UART: [art] Store in slot 0x4
35,517,628 UART: [art] Derive Key Pair
35,518,662 UART: [art] Store priv key in slot 0x5
37,980,799 UART: [art] Derive Key Pair - Done
37,994,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,706,659 UART: [art] Erasing AUTHORITY.KEYID = 7
39,708,164 UART: [art] PUB.X = 2611434D17D80411E2B322E01FA0F941164EA0C159A82D918229A076D730F4831D6A7709DBA4309ABF69B4F166A926DB
39,715,396 UART: [art] PUB.Y = F47E7A7647C9E1D2673FDEAEC9B034604835F8B82186B7711064D6130B67D9551FFDF953B0EDC4352D687D645D5576A0
39,722,642 UART: [art] SIG.R = F404B594103ECEC6639F270CC4C6E2D8AAD6DB58883011CDB6937C5C40FF5782C615E4387F5F2C7C84C98E5ABD8E23BA
39,730,070 UART: [art] SIG.S = 678EB6B7D4E4808CEDB1FCFF6AC46255BAD36F2B52F543DD84EEFE0C570328672C275258459424BCC70350FA02DC4B6A
40,709,030 UART: Caliptra RT
40,709,749 UART: [state] CFI Enabled
41,129,116 UART: [rt] RT failed reset flow
41,130,319 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,438,891 ready_for_fw is high
3,439,302 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,060,766 >>> mbox cmd response: success
14,061,486 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
18,340,678 UART:
18,341,107 UART: Running Caliptra FMC ...
18,342,235 UART:
18,342,389 UART: [state] CFI Enabled
18,410,455 UART: [fht] FMC Alias Private Key: 7
20,177,161 UART: [art] Extend RT PCRs Done
20,178,387 UART: [art] Lock RT PCRs Done
20,180,284 UART: [art] Populate DV Done
20,185,656 UART: [fht] FMC Alias Private Key: 7
20,187,342 UART: [art] Derive CDI
20,188,170 UART: [art] Store in slot 0x4
20,243,949 UART: [art] Derive Key Pair
20,244,945 UART: [art] Store priv key in slot 0x5
22,707,664 UART: [art] Derive Key Pair - Done
22,720,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,433,720 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,227 UART: [art] PUB.X = D284FCB03A3253E7B5ECC48D30B87C04DA8CC65AA44E6E6FCF446DCBE05A1FB8101E42E42D78AB13927CC00FA77985F6
24,442,483 UART: [art] PUB.Y = 54E5B7AD262A50506C31B26E8B7AE7D6DC29FA9DA4522F1DB4417B31CA04D3CB2FA9A8E336DAE79B9039E5BADA75848F
24,449,793 UART: [art] SIG.R = A5D828CFE09138B0FBAEF7674E39C93C65EBA41078D968DAAC0BB8A727275908C1CC6234709838A639CBD3842B8DE098
24,457,199 UART: [art] SIG.S = F1D3EE6A5993C71C0E60B96514E8E3B21A2E22AB95413D1B8846458073C9F9D03BE8E4D0930A16A45BF538886C65F552
25,435,462 UART: mbox::rt_entry...
25,436,456 UART: ____ _ _ _ ____ _____
25,438,448 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,440,452 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,442,329 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,444,311 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,446,190 UART: |_|
25,447,018 UART:
25,577,481 UART: [rt] Runtime listening for mailbox commands...
25,579,824 >>> mbox cmd response data (0 bytes)
27,646,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,568,698 >>> mbox cmd response: success
35,602,418 UART:
35,602,752 UART: Running Caliptra FMC ...
35,603,877 UART:
35,604,045 UART: [state] CFI Enabled
35,704,073 UART: [art] Extend RT PCRs Done
35,705,382 UART: [art] Lock RT PCRs Done
35,706,814 UART: [art] Populate DV Done
35,712,504 UART: [fht] FMC Alias Private Key: 7
35,714,050 UART: [art] Derive CDI
35,714,790 UART: [art] Store in slot 0x4
35,773,231 UART: [art] Derive Key Pair
35,774,223 UART: [art] Store priv key in slot 0x5
38,236,947 UART: [art] Derive Key Pair - Done
38,249,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,962,438 UART: [art] Erasing AUTHORITY.KEYID = 7
39,963,951 UART: [art] PUB.X = 166C180843740B074B08079775A5A10C392AA3AF7B8499E6AAF8A7012D192C4E8AA6429F19FDDE2EA17D22DE076A2757
39,971,246 UART: [art] PUB.Y = 5DE7AC3C2C604034C6F83EE6CD319F73DD1B0A7496119F397881AB58BF0BFED2C003E75B75E42C45E924D43E769B771F
39,978,475 UART: [art] SIG.R = 4F0D01E183AC71B70C2F7258C4344B2958E03A3C8DC25DA0D3216D230AEBE119B028C7A3E018F4E68087F6CA18160519
39,985,854 UART: [art] SIG.S = 6F1CEDBC95E5B5DE73C1A2449B8430EB08DA1D944D1497059E7F3811ED581D418DFF5F40F6304F112F222FD7F150A2D4
40,964,622 UART: Caliptra RT
40,965,308 UART: [state] CFI Enabled
41,387,898 UART: [rt] RT failed reset flow
41,389,109 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,486 UART:
192,861 UART: Running Caliptra ROM ...
194,045 UART:
603,606 UART: [state] CFI Enabled
618,689 UART: [state] LifecycleState = Unprovisioned
621,057 UART: [state] DebugLocked = No
622,738 UART: [state] WD Timer not started. Device not locked for debugging
627,285 UART: [kat] SHA2-256
817,154 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,896 UART: [kat] ++
828,505 UART: [kat] sha1
839,036 UART: [kat] SHA2-256
842,053 UART: [kat] SHA2-384
847,837 UART: [kat] SHA2-512-ACC
850,427 UART: [kat] ECC-384
3,292,770 UART: [kat] HMAC-384Kdf
3,306,275 UART: [kat] LMS
3,838,121 UART: [kat] --
3,842,899 UART: [cold-reset] ++
3,844,266 UART: [fht] FHT @ 0x50003400
3,855,963 UART: [idev] ++
3,856,602 UART: [idev] CDI.KEYID = 6
3,857,706 UART: [idev] SUBJECT.KEYID = 7
3,858,831 UART: [idev] UDS.KEYID = 0
3,859,742 ready_for_fw is high
3,859,937 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,963,990 UART: [idev] Erasing UDS.KEYID = 0
6,338,598 UART: [idev] Sha1 KeyId Algorithm
6,361,080 UART: [idev] --
6,366,105 UART: [ldev] ++
6,366,788 UART: [ldev] CDI.KEYID = 6
6,367,708 UART: [ldev] SUBJECT.KEYID = 5
6,368,890 UART: [ldev] AUTHORITY.KEYID = 7
6,370,076 UART: [ldev] FE.KEYID = 1
6,380,479 UART: [ldev] Erasing FE.KEYID = 1
8,858,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,630 UART: [ldev] --
10,651,538 UART: [fwproc] Wait for Commands...
10,653,579 UART: [fwproc] Recv command 0x46574c44
10,655,889 UART: [fwproc] Recv'd Img size: 82832 bytes
13,720,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,803,510 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,927,121 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,272,375 >>> mbox cmd response: success
14,273,624 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
14,277,231 UART: [afmc] ++
14,277,930 UART: [afmc] CDI.KEYID = 6
14,279,171 UART: [afmc] SUBJECT.KEYID = 7
14,280,609 UART: [afmc] AUTHORITY.KEYID = 5
16,782,237 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,509,428 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,524,532 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,539,712 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,554,565 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,578,715 UART: [afmc] --
18,582,344 UART: [cold-reset] --
18,586,161 UART: [state] Locking Datavault
18,592,714 UART: [state] Locking PCR0, PCR1 and PCR31
18,594,912 UART: [state] Locking ICCM
18,597,772 UART: [exit] Launching FMC @ 0x40000130
18,606,391 UART:
18,606,628 UART: Running Caliptra FMC ...
18,607,734 UART:
18,607,898 UART: [state] CFI Enabled
18,616,329 UART: [fht] FMC Alias Private Key: 7
20,383,124 UART: [art] Extend RT PCRs Done
20,384,365 UART: [art] Lock RT PCRs Done
20,385,872 UART: [art] Populate DV Done
20,391,078 UART: [fht] FMC Alias Private Key: 7
20,392,731 UART: [art] Derive CDI
20,393,476 UART: [art] Store in slot 0x4
20,436,557 UART: [art] Derive Key Pair
20,437,602 UART: [art] Store priv key in slot 0x5
22,864,741 UART: [art] Derive Key Pair - Done
22,877,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,584,060 UART: [art] Erasing AUTHORITY.KEYID = 7
24,585,573 UART: [art] PUB.X = DF2729D0C556C0708B5982A5BA92D48FDE45B4B4E699EE38BCD0EA2DA1C645BBB6998125DC216FC9E3F6F1537454B94A
24,592,839 UART: [art] PUB.Y = B64C4A93EC26BEC8D2ADD5334B41E6B603E8DEF1F9B499D611B17FB0D10D217EA294BA84CAEB5D779B1E7646DA57669B
24,600,155 UART: [art] SIG.R = 447C58047FCCC4411524893DC21969AB4E6EA7C6797F16817C8016A9BED7753B2F4EC64551202F5B9EA7C9DFC3B79354
24,607,517 UART: [art] SIG.S = 8880E053933DE83E838ECAD0590D8159C3993649A086C91E3EB6C85E2F6B099A9D7F39E78C8EC2457687C123D7A09CE5
25,586,431 UART: mbox::rt_entry...
25,587,385 UART: ____ _ _ _ ____ _____
25,589,330 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,591,340 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,593,276 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,595,210 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,597,136 UART: |_|
25,597,973 UART:
25,729,318 UART: [rt] Runtime listening for mailbox commands...
25,731,652 >>> mbox cmd response data (0 bytes)
27,798,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,948,663 UART:
27,949,040 UART: Running Caliptra ROM ...
27,950,184 UART:
27,950,360 UART: [state] CFI Enabled
27,961,172 UART: [state] LifecycleState = Unprovisioned
27,963,074 UART: [state] DebugLocked = No
27,964,512 UART: [state] WD Timer not started. Device not locked for debugging
27,968,739 UART: [kat] SHA2-256
28,158,631 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,169,379 UART: [kat] ++
28,169,919 UART: [kat] sha1
28,180,742 UART: [kat] SHA2-256
28,183,737 UART: [kat] SHA2-384
28,189,540 UART: [kat] SHA2-512-ACC
28,192,131 UART: [kat] ECC-384
30,636,306 UART: [kat] HMAC-384Kdf
30,649,844 UART: [kat] LMS
31,181,469 UART: [kat] --
31,184,594 UART: [update-reset] ++
34,701,675 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,705,383 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,335,143 >>> mbox cmd response: success
35,339,797 UART: [update-reset] Copying MAN_2 To MAN_1
35,373,228 UART: [update-reset Success] --
35,377,471 UART: [state] Locking Datavault
35,381,328 UART: [state] Locking PCR0, PCR1 and PCR31
35,383,560 UART: [state] Locking ICCM
35,385,729 UART: [exit] Launching FMC @ 0x40000130
35,394,430 UART:
35,394,665 UART: Running Caliptra FMC ...
35,395,769 UART:
35,395,929 UART: [state] CFI Enabled
35,440,649 UART: [art] Extend RT PCRs Done
35,441,807 UART: [art] Lock RT PCRs Done
35,443,095 UART: [art] Populate DV Done
35,448,618 UART: [fht] FMC Alias Private Key: 7
35,450,106 UART: [art] Derive CDI
35,450,889 UART: [art] Store in slot 0x4
35,493,866 UART: [art] Derive Key Pair
35,494,924 UART: [art] Store priv key in slot 0x5
37,921,717 UART: [art] Derive Key Pair - Done
37,934,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,640,969 UART: [art] Erasing AUTHORITY.KEYID = 7
39,642,477 UART: [art] PUB.X = 2554A5F4EE24ECB89F7A05B9737129BC2D169FCD031E7268712E9C054AC427DEF81AC0C82D3B2AAF2DF0FAB70CAAE44F
39,649,746 UART: [art] PUB.Y = 54D715F9D395AA85E5D0A4A479BA3CFDC303F8FEB4365E1EF9FE801974B9E30CF377F751C410BB98F7A04158925DF98D
39,657,000 UART: [art] SIG.R = 3A3F6FFD46B5FB43B895941AE5EE0346E3B3C7F156E2A07AABAB29DFDE633155A4628665AE2A887B048AFCE0C55D807F
39,664,431 UART: [art] SIG.S = 119A7FF030032DB41D756FAFFF2EFE69B9D8B1E001CECC3488AAEECE224B13BD29A28D9515EE42AFCACFBF71A636C800
40,643,244 UART: Caliptra RT
40,643,970 UART: [state] CFI Enabled
41,015,484 UART: [rt] RT failed reset flow
41,016,704 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,760,301 ready_for_fw is high
3,760,671 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,282,200 >>> mbox cmd response: success
14,283,306 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
18,533,298 UART:
18,533,678 UART: Running Caliptra FMC ...
18,534,817 UART:
18,534,981 UART: [state] CFI Enabled
18,542,942 UART: [fht] FMC Alias Private Key: 7
20,309,112 UART: [art] Extend RT PCRs Done
20,310,338 UART: [art] Lock RT PCRs Done
20,311,748 UART: [art] Populate DV Done
20,317,007 UART: [fht] FMC Alias Private Key: 7
20,318,621 UART: [art] Derive CDI
20,319,365 UART: [art] Store in slot 0x4
20,362,125 UART: [art] Derive Key Pair
20,363,138 UART: [art] Store priv key in slot 0x5
22,790,055 UART: [art] Derive Key Pair - Done
22,802,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,508,951 UART: [art] Erasing AUTHORITY.KEYID = 7
24,510,452 UART: [art] PUB.X = 42A14202D0D4E87690EE6D116DA0DD8EC41D2D0DF053B48701BF3A7E902148A0FD885323BFFAA0031CFC4342C221D713
24,517,737 UART: [art] PUB.Y = C08660092606A5CEEFAB5E18B0F3FE08F350C475BE965702249DCC9E13A6FA31B10C1C4C8E20B15176020AE7388285AE
24,524,986 UART: [art] SIG.R = 7B78F36A22328364CA9CEFA35AC1C84D2D1285353751F2A31B089F9938DCEA1A143A29211318B2A7B047F65E5489E133
24,532,334 UART: [art] SIG.S = EAFADD33DC0352B1E84FA5CD93663E189474197C63C04D85248B0A48B6FDFBC7D3B0802C333AFC7617543476E89717C9
25,510,958 UART: mbox::rt_entry...
25,511,909 UART: ____ _ _ _ ____ _____
25,514,012 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,516,052 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,518,120 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,520,113 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,521,977 UART: |_|
25,522,810 UART:
25,653,893 UART: [rt] Runtime listening for mailbox commands...
25,656,199 >>> mbox cmd response data (0 bytes)
27,724,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,547,100 >>> mbox cmd response: success
35,582,656 UART:
35,582,992 UART: Running Caliptra FMC ...
35,584,044 UART:
35,584,225 UART: [state] CFI Enabled
35,628,538 UART: [art] Extend RT PCRs Done
35,629,695 UART: [art] Lock RT PCRs Done
35,631,206 UART: [art] Populate DV Done
35,636,725 UART: [fht] FMC Alias Private Key: 7
35,638,427 UART: [art] Derive CDI
35,639,242 UART: [art] Store in slot 0x4
35,681,573 UART: [art] Derive Key Pair
35,682,613 UART: [art] Store priv key in slot 0x5
38,108,910 UART: [art] Derive Key Pair - Done
38,121,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,828,326 UART: [art] Erasing AUTHORITY.KEYID = 7
39,829,836 UART: [art] PUB.X = 15A9EAD6FCB1C642296CF9485E6BDF5403E1AFA7AFC81F9F6B8E1A5FE5CED7A8E3480E307C308D8FD1D1CEC68A0E13F6
39,837,132 UART: [art] PUB.Y = 027CEFA12C45F044222803101F1CF54B7CC6ADBF423BE1E44428253CC92E412F92D96E3A0437EB54A49D83864166C779
39,844,366 UART: [art] SIG.R = 56FB57E46720893BD695362CD022595200439BF87A74F0F4D2A30A17944213803E3EF66F79155598422632EC6C110D14
39,851,743 UART: [art] SIG.S = 94B9B795618DF7AF64D68FB8701EACA55D27E78793C1831AE7062406431DFF0CD030401272757EA7D8216328D4BD3E23
40,830,664 UART: Caliptra RT
40,831,360 UART: [state] CFI Enabled
41,203,267 UART: [rt] RT failed reset flow
41,204,489 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,357 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,047 UART: [kat] SHA2-256
881,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,093 UART: [kat] ++
886,245 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,046 UART: [kat] SHA2-512-ACC
896,947 UART: [kat] ECC-384
902,424 UART: [kat] HMAC-384Kdf
907,048 UART: [kat] LMS
1,475,244 UART: [kat] --
1,475,963 UART: [cold-reset] ++
1,476,397 UART: [fht] Storing FHT @ 0x50003400
1,479,208 UART: [idev] ++
1,479,376 UART: [idev] CDI.KEYID = 6
1,479,736 UART: [idev] SUBJECT.KEYID = 7
1,480,160 UART: [idev] UDS.KEYID = 0
1,480,505 ready_for_fw is high
1,480,505 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,464 UART: [idev] Erasing UDS.KEYID = 0
1,504,926 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,672 UART: [idev] --
1,514,693 UART: [ldev] ++
1,514,861 UART: [ldev] CDI.KEYID = 6
1,515,224 UART: [ldev] SUBJECT.KEYID = 5
1,515,650 UART: [ldev] AUTHORITY.KEYID = 7
1,516,113 UART: [ldev] FE.KEYID = 1
1,521,329 UART: [ldev] Erasing FE.KEYID = 1
1,546,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,214 UART: [ldev] --
1,585,511 UART: [fwproc] Waiting for Commands...
1,586,374 UART: [fwproc] Received command 0x46574c44
1,587,165 UART: [fwproc] Received Image of size 82832 bytes
2,523,752 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,740 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,581,958 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,701 >>> mbox cmd response: success
2,668,701 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,669,729 UART: [afmc] ++
2,669,897 UART: [afmc] CDI.KEYID = 6
2,670,259 UART: [afmc] SUBJECT.KEYID = 7
2,670,684 UART: [afmc] AUTHORITY.KEYID = 5
2,705,189 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,720,991 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,721,771 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,727,480 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,733,363 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,739,046 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,746,854 UART: [afmc] --
2,747,738 UART: [cold-reset] --
2,748,904 UART: [state] Locking Datavault
2,750,195 UART: [state] Locking PCR0, PCR1 and PCR31
2,750,799 UART: [state] Locking ICCM
2,751,325 UART: [exit] Launching FMC @ 0x40000130
2,756,655 UART:
2,756,671 UART: Running Caliptra FMC ...
2,757,079 UART:
2,757,133 UART: [state] CFI Enabled
2,767,465 UART: [fht] FMC Alias Private Key: 7
2,886,779 UART: [art] Extend RT PCRs Done
2,887,207 UART: [art] Lock RT PCRs Done
2,888,677 UART: [art] Populate DV Done
2,896,816 UART: [fht] FMC Alias Private Key: 7
2,897,762 UART: [art] Derive CDI
2,898,042 UART: [art] Store in slot 0x4
2,983,696 UART: [art] Derive Key Pair
2,984,056 UART: [art] Store priv key in slot 0x5
2,997,271 UART: [art] Derive Key Pair - Done
3,012,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,385 UART: [art] PUB.X = BCD38DE6360FFCAD3BA5E6E25A9F6AEC2BC8C6FF19DDE64AB7DBD1886EDDEDE8A92300D6A47A7BECD51CF28DE0E7D5DC
3,035,176 UART: [art] PUB.Y = 0BF0331B47B106AF1864C31B166308D998775221A9C68174B00190593F8DF695753710FA21EE1618BDF674E942C81A67
3,042,102 UART: [art] SIG.R = DA74451B1A1B14AA7C592455EEDEBD2D111619D22F644130E3516B6AC81FCBA527ED4CF561D615F2D0D434A8BE68AE28
3,048,886 UART: [art] SIG.S = 25623AE9A788B0FC9CB6F885201DD1AECF0CC03A1D092ED55B6A26AC8166E632A4770EB04B94FA0C381B3F6DCA3E8D3B
3,072,418 UART: mbox::rt_entry...
3,072,790 UART: ____ _ _ _ ____ _____
3,073,574 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,074,374 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,075,142 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,075,910 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,076,678 UART: |_|
3,076,990 UART:
3,196,125 UART: [rt] Runtime listening for mailbox commands...
3,197,364 >>> mbox cmd response data (0 bytes)
3,197,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,197,480 UART:
3,197,496 UART: Running Caliptra ROM ...
3,197,904 UART:
3,197,958 UART: [state] CFI Enabled
3,200,274 UART: [state] LifecycleState = Unprovisioned
3,200,929 UART: [state] DebugLocked = No
3,201,511 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,203,160 UART: [kat] SHA2-256
3,997,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,001,206 UART: [kat] ++
4,001,358 UART: [kat] sha1
4,005,558 UART: [kat] SHA2-256
4,007,496 UART: [kat] SHA2-384
4,010,291 UART: [kat] SHA2-512-ACC
4,012,191 UART: [kat] ECC-384
4,017,634 UART: [kat] HMAC-384Kdf
4,022,318 UART: [kat] LMS
4,590,514 UART: [kat] --
4,591,271 UART: [update-reset] ++
5,972,578 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,973,654 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,128,921 >>> mbox cmd response: success
6,129,036 UART: [update-reset] Copying MAN_2 To MAN_1
6,137,050 UART: [update-reset Success] --
6,138,043 UART: [state] Locking Datavault
6,138,855 UART: [state] Locking PCR0, PCR1 and PCR31
6,139,459 UART: [state] Locking ICCM
6,140,031 UART: [exit] Launching FMC @ 0x40000130
6,145,361 UART:
6,145,377 UART: Running Caliptra FMC ...
6,145,785 UART:
6,145,839 UART: [state] CFI Enabled
6,235,284 UART: [art] Extend RT PCRs Done
6,235,712 UART: [art] Lock RT PCRs Done
6,236,773 UART: [art] Populate DV Done
6,244,958 UART: [fht] FMC Alias Private Key: 7
6,246,080 UART: [art] Derive CDI
6,246,360 UART: [art] Store in slot 0x4
6,332,396 UART: [art] Derive Key Pair
6,332,756 UART: [art] Store priv key in slot 0x5
6,346,045 UART: [art] Derive Key Pair - Done
6,360,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,376,366 UART: [art] Erasing AUTHORITY.KEYID = 7
6,377,131 UART: [art] PUB.X = F64A29216DAA7DF0ECF12D1C618DC6EC488B545A8518C3D866F753290FC78E9BD2A20CD48569AB76B10048AD9D009310
6,383,859 UART: [art] PUB.Y = B67C7AE6FA3E4C030DC65110337F47388F079ACA869DBEFBF907BEC9DEA782D73745645460021AF3478C2C44433ED281
6,390,800 UART: [art] SIG.R = BB2227F4CD98C85ECB3FF54B254A0E95BCC5A3F1C87AC38B3B0E8CD42FB640CDF2EC7B9C90971B1FBB29C73F17C5E092
6,397,590 UART: [art] SIG.S = 28323604499EF661F7B3C48A1D61934DCE338199358AEA30CFC0FE569B4B180D960CD44B3C91831BEFA7E0B5686F7B1B
6,421,305 UART: Caliptra RT
6,421,556 UART: [state] CFI Enabled
6,785,326 UART: [rt] RT failed reset flow
6,785,757 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,449 ready_for_fw is high
1,362,449 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,517,259 >>> mbox cmd response: success
2,517,259 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,579,032 UART:
2,579,048 UART: Running Caliptra FMC ...
2,579,456 UART:
2,579,510 UART: [state] CFI Enabled
2,590,078 UART: [fht] FMC Alias Private Key: 7
2,709,022 UART: [art] Extend RT PCRs Done
2,709,450 UART: [art] Lock RT PCRs Done
2,710,788 UART: [art] Populate DV Done
2,718,937 UART: [fht] FMC Alias Private Key: 7
2,719,935 UART: [art] Derive CDI
2,720,215 UART: [art] Store in slot 0x4
2,806,235 UART: [art] Derive Key Pair
2,806,595 UART: [art] Store priv key in slot 0x5
2,819,614 UART: [art] Derive Key Pair - Done
2,834,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,850,164 UART: [art] Erasing AUTHORITY.KEYID = 7
2,850,929 UART: [art] PUB.X = 91A8B8A200CAF4E92089E19552A081450C540CB29FCFEBFB12531394C8735B4684B670C3FB69F9551BA62BD08352B4D9
2,857,673 UART: [art] PUB.Y = C01F71963C7BA91083D1A37EC497AFED0139184A2D1A313549505B92D5F5B8E3558AC1F50257A0A19C79C29530677F24
2,864,613 UART: [art] SIG.R = D3505A34BF03F448DEC8233E991D569BE8F0C8EAA357E96C7FBB7143CC84CBA5830E7C41932B83C4A53D931A07F32345
2,871,382 UART: [art] SIG.S = D4CE9385F4E5F694AA36E9330CF8CBAB9A9AF813E9A5C3D38928D450D8EA4E2EBB08D7DAA5FFAE1CF3BC2AA5844C5AB2
2,895,072 UART: mbox::rt_entry...
2,895,444 UART: ____ _ _ _ ____ _____
2,896,228 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,897,028 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,897,796 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,898,564 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,899,332 UART: |_|
2,899,644 UART:
3,018,272 UART: [rt] Runtime listening for mailbox commands...
3,019,511 >>> mbox cmd response data (0 bytes)
3,019,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,832,053 >>> mbox cmd response: success
5,845,719 UART:
5,845,735 UART: Running Caliptra FMC ...
5,846,143 UART:
5,846,197 UART: [state] CFI Enabled
5,935,408 UART: [art] Extend RT PCRs Done
5,935,836 UART: [art] Lock RT PCRs Done
5,937,307 UART: [art] Populate DV Done
5,945,602 UART: [fht] FMC Alias Private Key: 7
5,946,574 UART: [art] Derive CDI
5,946,854 UART: [art] Store in slot 0x4
6,032,404 UART: [art] Derive Key Pair
6,032,764 UART: [art] Store priv key in slot 0x5
6,045,855 UART: [art] Derive Key Pair - Done
6,060,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,076,123 UART: [art] Erasing AUTHORITY.KEYID = 7
6,076,888 UART: [art] PUB.X = 45EE0AC1B2631312B124B441B659C20D9ADECB35F907909E9D1B957A3E3CB020BC13D8E3C31ABCAF72135F4A4D59C3E3
6,083,663 UART: [art] PUB.Y = 667ACBE38A584C3E7EDB0FD6B5D7FE30E3687C03F8340A96B68CD9D96306E0E0C682334931212A580D5AA6A1C7D54581
6,090,604 UART: [art] SIG.R = 2270284A7B37C3A465BF5C78CB867B1DB54893E44B765B1436DE2BCD73AA910B126E66F82FE3BA773F9B541156D3FCAC
6,097,381 UART: [art] SIG.S = F86CBCBB6C0381BFFF97721741416E4D0BCB5777C8FA9CB5A2AB6995EA1AA2E640742E07D7F721E78F1C482BAC2F2993
6,121,354 UART: Caliptra RT
6,121,605 UART: [state] CFI Enabled
6,484,273 UART: [rt] RT failed reset flow
6,484,704 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,328 UART: [kat] SHA2-256
882,259 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,374 UART: [kat] ++
886,526 UART: [kat] sha1
890,622 UART: [kat] SHA2-256
892,560 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
902,769 UART: [kat] HMAC-384Kdf
907,317 UART: [kat] LMS
1,475,513 UART: [kat] --
1,476,304 UART: [cold-reset] ++
1,476,724 UART: [fht] Storing FHT @ 0x50003400
1,479,415 UART: [idev] ++
1,479,583 UART: [idev] CDI.KEYID = 6
1,479,943 UART: [idev] SUBJECT.KEYID = 7
1,480,367 UART: [idev] UDS.KEYID = 0
1,480,712 ready_for_fw is high
1,480,712 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,319 UART: [idev] Erasing UDS.KEYID = 0
1,504,941 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,515 UART: [idev] --
1,514,494 UART: [ldev] ++
1,514,662 UART: [ldev] CDI.KEYID = 6
1,515,025 UART: [ldev] SUBJECT.KEYID = 5
1,515,451 UART: [ldev] AUTHORITY.KEYID = 7
1,515,914 UART: [ldev] FE.KEYID = 1
1,521,100 UART: [ldev] Erasing FE.KEYID = 1
1,547,601 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,389 UART: [ldev] --
1,586,808 UART: [fwproc] Waiting for Commands...
1,587,475 UART: [fwproc] Received command 0x46574c44
1,588,266 UART: [fwproc] Received Image of size 82832 bytes
2,523,477 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,369 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,581,587 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,334 >>> mbox cmd response: success
2,668,334 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,669,588 UART: [afmc] ++
2,669,756 UART: [afmc] CDI.KEYID = 6
2,670,118 UART: [afmc] SUBJECT.KEYID = 7
2,670,543 UART: [afmc] AUTHORITY.KEYID = 5
2,705,726 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,076 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,722,856 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,728,565 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,448 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,740,131 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,748,027 UART: [afmc] --
2,749,083 UART: [cold-reset] --
2,749,811 UART: [state] Locking Datavault
2,750,830 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,434 UART: [state] Locking ICCM
2,751,980 UART: [exit] Launching FMC @ 0x40000130
2,757,310 UART:
2,757,326 UART: Running Caliptra FMC ...
2,757,734 UART:
2,757,877 UART: [state] CFI Enabled
2,768,685 UART: [fht] FMC Alias Private Key: 7
2,887,503 UART: [art] Extend RT PCRs Done
2,887,931 UART: [art] Lock RT PCRs Done
2,889,577 UART: [art] Populate DV Done
2,897,696 UART: [fht] FMC Alias Private Key: 7
2,898,808 UART: [art] Derive CDI
2,899,088 UART: [art] Store in slot 0x4
2,984,982 UART: [art] Derive Key Pair
2,985,342 UART: [art] Store priv key in slot 0x5
2,998,463 UART: [art] Derive Key Pair - Done
3,013,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,969 UART: [art] PUB.X = 71657E83F4A8A58FD135E18830ADE792460E0D4D2CBB6D9D3BF56826082D55906C6A0DEE8F82F51A2FA38A0AA6EB460D
3,036,733 UART: [art] PUB.Y = 2890E11F758A8D0E1CA20FDBE6F7EBAF7D2FFAAA295A0BE29768C0BC35E14FC7C367D80BA24C47ABCBC3264E36B87BAA
3,043,701 UART: [art] SIG.R = D540B21F864D564D8DA6CBAA8AB6867E0E2CE37B8F18DB059F4E95F5E2BA00733E07808492937A26F64B02DA9540CEA3
3,050,447 UART: [art] SIG.S = B3B8986790C89839580B9FC25D1F2C436A5B2F902CE24C0295165A56F1B45FFAFC081173F5AB52884A1B10E156E9B30B
3,074,331 UART: mbox::rt_entry...
3,074,703 UART: ____ _ _ _ ____ _____
3,075,487 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,076,287 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,077,055 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,077,823 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,078,591 UART: |_|
3,078,903 UART:
3,197,557 UART: [rt] Runtime listening for mailbox commands...
3,198,796 >>> mbox cmd response data (0 bytes)
3,198,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,198,912 UART:
3,198,928 UART: Running Caliptra ROM ...
3,199,336 UART:
3,199,477 UART: [state] CFI Enabled
3,201,971 UART: [state] LifecycleState = Unprovisioned
3,202,626 UART: [state] DebugLocked = No
3,203,282 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,204,829 UART: [kat] SHA2-256
3,998,760 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,002,875 UART: [kat] ++
4,003,027 UART: [kat] sha1
4,007,195 UART: [kat] SHA2-256
4,009,133 UART: [kat] SHA2-384
4,011,658 UART: [kat] SHA2-512-ACC
4,013,558 UART: [kat] ECC-384
4,019,171 UART: [kat] HMAC-384Kdf
4,023,835 UART: [kat] LMS
4,592,031 UART: [kat] --
4,592,760 UART: [update-reset] ++
5,973,640 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,974,688 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,129,955 >>> mbox cmd response: success
6,130,058 UART: [update-reset] Copying MAN_2 To MAN_1
6,138,072 UART: [update-reset Success] --
6,138,987 UART: [state] Locking Datavault
6,139,747 UART: [state] Locking PCR0, PCR1 and PCR31
6,140,351 UART: [state] Locking ICCM
6,140,825 UART: [exit] Launching FMC @ 0x40000130
6,146,155 UART:
6,146,171 UART: Running Caliptra FMC ...
6,146,579 UART:
6,146,722 UART: [state] CFI Enabled
6,235,743 UART: [art] Extend RT PCRs Done
6,236,171 UART: [art] Lock RT PCRs Done
6,237,408 UART: [art] Populate DV Done
6,245,435 UART: [fht] FMC Alias Private Key: 7
6,246,411 UART: [art] Derive CDI
6,246,691 UART: [art] Store in slot 0x4
6,332,501 UART: [art] Derive Key Pair
6,332,861 UART: [art] Store priv key in slot 0x5
6,345,890 UART: [art] Derive Key Pair - Done
6,360,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,376,542 UART: [art] Erasing AUTHORITY.KEYID = 7
6,377,307 UART: [art] PUB.X = 93199A4A286F13A59DE43F85D467BDA7F1E3F5016CD98C54B30E6C62D473AAFBD6BE8ECC898381DFB1D7D85C93B395F6
6,384,087 UART: [art] PUB.Y = 92D3908ED640DC62892AD1FAC6611AE012D9CD4CC7E5A0E22ED3B7B02A13A197E406295A5B33DF56962A84D1D17615BE
6,391,044 UART: [art] SIG.R = 977E63ECCA26AC8BC88BC8347D7659884A7BE1C5C206889FDF4B297A4A71E8D6FD8544ADE2762B7D858E05557B5FBB1C
6,397,822 UART: [art] SIG.S = 14697B8DA1EE140F4EFCAC6215263A835DA877E44BB3969C26DFA13814B8E9DCE4FD840A6CD86607C6CEBFD5A42AC9EE
6,421,455 UART: Caliptra RT
6,421,798 UART: [state] CFI Enabled
6,783,264 UART: [rt] RT failed reset flow
6,783,695 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,312 ready_for_fw is high
1,363,312 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,280 >>> mbox cmd response: success
2,518,280 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,579,819 UART:
2,579,835 UART: Running Caliptra FMC ...
2,580,243 UART:
2,580,386 UART: [state] CFI Enabled
2,590,828 UART: [fht] FMC Alias Private Key: 7
2,709,600 UART: [art] Extend RT PCRs Done
2,710,028 UART: [art] Lock RT PCRs Done
2,711,794 UART: [art] Populate DV Done
2,719,715 UART: [fht] FMC Alias Private Key: 7
2,720,737 UART: [art] Derive CDI
2,721,017 UART: [art] Store in slot 0x4
2,806,961 UART: [art] Derive Key Pair
2,807,321 UART: [art] Store priv key in slot 0x5
2,820,628 UART: [art] Derive Key Pair - Done
2,835,478 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,851,559 UART: [art] Erasing AUTHORITY.KEYID = 7
2,852,324 UART: [art] PUB.X = 23E421D533D15FFF30F7CD1489EEDC91D98FE56CDC723D469B1A1BCC28B9D6B4C7A14DFC58B28BE2DDE629B73360676F
2,859,114 UART: [art] PUB.Y = 00D764BF99E0D284287F85FB00E2FC810580764BC0A875FA1E2FDC20AF6ED42396E31F63BC0DA21D9924E91649977FA4
2,866,020 UART: [art] SIG.R = 9391362653397D984C97DD6DF2A029AD0E82450B62FAB836B4011F0918020EA9A489E8FCE6642F4265A1F6935643CA68
2,872,766 UART: [art] SIG.S = 7E7EF5B0D63637ED223805D855E556EA9F742E59B1E7994B0E858557AD65BCE9F7B97A1B983F93DC25E1AC1BA8FCEBF7
2,896,998 UART: mbox::rt_entry...
2,897,370 UART: ____ _ _ _ ____ _____
2,898,154 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,898,954 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,899,722 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,900,490 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,901,258 UART: |_|
2,901,570 UART:
3,019,883 UART: [rt] Runtime listening for mailbox commands...
3,021,122 >>> mbox cmd response data (0 bytes)
3,021,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,836,191 >>> mbox cmd response: success
5,849,677 UART:
5,849,693 UART: Running Caliptra FMC ...
5,850,101 UART:
5,850,244 UART: [state] CFI Enabled
5,939,769 UART: [art] Extend RT PCRs Done
5,940,197 UART: [art] Lock RT PCRs Done
5,941,464 UART: [art] Populate DV Done
5,949,873 UART: [fht] FMC Alias Private Key: 7
5,950,801 UART: [art] Derive CDI
5,951,081 UART: [art] Store in slot 0x4
6,036,595 UART: [art] Derive Key Pair
6,036,955 UART: [art] Store priv key in slot 0x5
6,049,934 UART: [art] Derive Key Pair - Done
6,064,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,080,553 UART: [art] Erasing AUTHORITY.KEYID = 7
6,081,318 UART: [art] PUB.X = 5E49875C5DF22B0228E414E81EBA1444C3C380E6AFF90902ABE2610C00D6AD1BD6C402F515DCC3EE3A997E1DA15360EA
6,088,065 UART: [art] PUB.Y = 06FD338815A5A5949570147EE00837F2A33F35D8005C74B22036179F6393EB46393A75E10FC189A1FCD3E4C25CC0BE7A
6,094,982 UART: [art] SIG.R = 128EDE77D19EDA76804672307C7831917FA9F3C17C58FCB78840EE7A813CFF7661ADFC7AFB84E995AA6FD450AF407FE5
6,101,766 UART: [art] SIG.S = 37D9634AD615166E15A1DE7F21E1A192432A6C4806D76F00759A11C0EBFD38DF73B29FDAF6E4DEE290E30EF712C11563
6,125,746 UART: Caliptra RT
6,126,089 UART: [state] CFI Enabled
6,493,874 UART: [rt] RT failed reset flow
6,494,305 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,244 UART: [kat] ++
895,396 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,689 UART: [kat] SHA2-512-ACC
906,590 UART: [kat] ECC-384
915,863 UART: [kat] HMAC-384Kdf
920,583 UART: [kat] LMS
1,168,895 UART: [kat] --
1,169,796 UART: [cold-reset] ++
1,170,132 UART: [fht] FHT @ 0x50003400
1,172,810 UART: [idev] ++
1,172,978 UART: [idev] CDI.KEYID = 6
1,173,339 UART: [idev] SUBJECT.KEYID = 7
1,173,764 UART: [idev] UDS.KEYID = 0
1,174,110 ready_for_fw is high
1,174,110 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,109 UART: [idev] Erasing UDS.KEYID = 0
1,199,313 UART: [idev] Sha1 KeyId Algorithm
1,208,283 UART: [idev] --
1,209,124 UART: [ldev] ++
1,209,292 UART: [ldev] CDI.KEYID = 6
1,209,656 UART: [ldev] SUBJECT.KEYID = 5
1,210,083 UART: [ldev] AUTHORITY.KEYID = 7
1,210,546 UART: [ldev] FE.KEYID = 1
1,215,776 UART: [ldev] Erasing FE.KEYID = 1
1,241,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,770 UART: [ldev] --
1,281,185 UART: [fwproc] Wait for Commands...
1,281,960 UART: [fwproc] Recv command 0x46574c44
1,282,693 UART: [fwproc] Recv'd Img size: 82832 bytes
2,217,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,254 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,429 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,078 >>> mbox cmd response: success
2,363,078 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,364,130 UART: [afmc] ++
2,364,298 UART: [afmc] CDI.KEYID = 6
2,364,661 UART: [afmc] SUBJECT.KEYID = 7
2,365,087 UART: [afmc] AUTHORITY.KEYID = 5
2,400,320 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,416,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,466 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,176 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,057 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,434,758 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,493 UART: [afmc] --
2,443,384 UART: [cold-reset] --
2,444,188 UART: [state] Locking Datavault
2,445,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,445,693 UART: [state] Locking ICCM
2,446,357 UART: [exit] Launching FMC @ 0x40000130
2,451,687 UART:
2,451,703 UART: Running Caliptra FMC ...
2,452,111 UART:
2,452,165 UART: [state] CFI Enabled
2,462,405 UART: [fht] FMC Alias Private Key: 7
2,581,395 UART: [art] Extend RT PCRs Done
2,581,823 UART: [art] Lock RT PCRs Done
2,583,583 UART: [art] Populate DV Done
2,591,490 UART: [fht] FMC Alias Private Key: 7
2,592,660 UART: [art] Derive CDI
2,592,940 UART: [art] Store in slot 0x4
2,678,775 UART: [art] Derive Key Pair
2,679,135 UART: [art] Store priv key in slot 0x5
2,692,183 UART: [art] Derive Key Pair - Done
2,707,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,722,656 UART: [art] Erasing AUTHORITY.KEYID = 7
2,723,421 UART: [art] PUB.X = 574013C9402951FB642318916CC05B0F82DB3B22405A42E05AF65E1622D92EB78B876F56AC3B719C9C9208A9AEE5A192
2,730,183 UART: [art] PUB.Y = 1163550FE02F785354A43E43ED654B755CEB83E815CD7157DE416CA3B37F6B1E40E7F056CA3D8B8DD0CB64E86BA71CEA
2,737,144 UART: [art] SIG.R = 5FCA8C9D3F58BA703CDFCB9CCF0114FE446DAB4D55C6544698B9E4691AEC155DE5F3AEE524948A41C77C22262555EE4C
2,743,929 UART: [art] SIG.S = A6B6CBB4D03F923D3904A93C3A2A2EE8E195B887B8BD8B149F2B8FBFA6ACB8A855A03CF9AAE84F2942369C09EE94D58F
2,767,543 UART: mbox::rt_entry...
2,767,915 UART: ____ _ _ _ ____ _____
2,768,699 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,769,499 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,770,267 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,771,035 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,771,803 UART: |_|
2,772,115 UART:
2,890,747 UART: [rt] Runtime listening for mailbox commands...
2,891,986 >>> mbox cmd response data (0 bytes)
2,891,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,892,099 UART:
2,892,115 UART: Running Caliptra ROM ...
2,892,523 UART:
2,892,578 UART: [state] CFI Enabled
2,895,296 UART: [state] LifecycleState = Unprovisioned
2,895,951 UART: [state] DebugLocked = No
2,896,589 UART: [state] WD Timer not started. Device not locked for debugging
2,897,863 UART: [kat] SHA2-256
3,701,413 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,705,517 UART: [kat] ++
3,705,669 UART: [kat] sha1
3,709,863 UART: [kat] SHA2-256
3,711,803 UART: [kat] SHA2-384
3,714,586 UART: [kat] SHA2-512-ACC
3,716,486 UART: [kat] ECC-384
3,726,409 UART: [kat] HMAC-384Kdf
3,731,075 UART: [kat] LMS
3,979,387 UART: [kat] --
3,980,279 UART: [update-reset] ++
5,338,956 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,340,025 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,495,240 >>> mbox cmd response: success
5,495,543 UART: [update-reset] Copying MAN_2 To MAN_1
5,503,557 UART: [update-reset Success] --
5,504,692 UART: [state] Locking Datavault
5,505,414 UART: [state] Locking PCR0, PCR1 and PCR31
5,506,018 UART: [state] Locking ICCM
5,506,660 UART: [exit] Launching FMC @ 0x40000130
5,511,990 UART:
5,512,006 UART: Running Caliptra FMC ...
5,512,414 UART:
5,512,468 UART: [state] CFI Enabled
5,601,583 UART: [art] Extend RT PCRs Done
5,602,011 UART: [art] Lock RT PCRs Done
5,603,430 UART: [art] Populate DV Done
5,611,391 UART: [fht] FMC Alias Private Key: 7
5,612,411 UART: [art] Derive CDI
5,612,691 UART: [art] Store in slot 0x4
5,698,388 UART: [art] Derive Key Pair
5,698,748 UART: [art] Store priv key in slot 0x5
5,712,132 UART: [art] Derive Key Pair - Done
5,726,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,742,491 UART: [art] Erasing AUTHORITY.KEYID = 7
5,743,256 UART: [art] PUB.X = 1BB5496A5B1B9861AEAADC1AEDEF3019A6BA51402E6ACAB552426DDA639BB3585F045C7261122CA5D1FFF1C4A6B78343
5,750,041 UART: [art] PUB.Y = D4B85BF5E7A4351368B66423D0F7896027D23389F1A5B451210344ACB756370A2AA0B76CC6CC13D4675B4FF37EC72EA7
5,756,987 UART: [art] SIG.R = 35BFE34056CF629F43E887BFEAD1D2D99D579E104F8F9BA04CC3B0DCF25DBDAD00FF7FE65638DC22A42CB5AEA65831D2
5,763,761 UART: [art] SIG.S = 4781BC3DD01DA7B2CCEA3B1EED7AEF0A04A908FF0A7B045266FEEEDF194CDD5287FE4C9E268A4C95165ED786BC5B41D1
5,787,286 UART: Caliptra RT
5,787,537 UART: [state] CFI Enabled
6,152,719 UART: [rt] RT failed reset flow
6,153,150 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,716 ready_for_fw is high
1,058,716 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,214,477 >>> mbox cmd response: success
2,214,477 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,275,872 UART:
2,275,888 UART: Running Caliptra FMC ...
2,276,296 UART:
2,276,350 UART: [state] CFI Enabled
2,287,132 UART: [fht] FMC Alias Private Key: 7
2,405,752 UART: [art] Extend RT PCRs Done
2,406,180 UART: [art] Lock RT PCRs Done
2,407,818 UART: [art] Populate DV Done
2,415,807 UART: [fht] FMC Alias Private Key: 7
2,416,765 UART: [art] Derive CDI
2,417,045 UART: [art] Store in slot 0x4
2,502,652 UART: [art] Derive Key Pair
2,503,012 UART: [art] Store priv key in slot 0x5
2,515,776 UART: [art] Derive Key Pair - Done
2,530,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,545,880 UART: [art] Erasing AUTHORITY.KEYID = 7
2,546,645 UART: [art] PUB.X = 24C2AA16BBD5BA989204930FB6330BAE13A9EAD28431B11D5D84269B2BA0F4D7E3584E30FDF65DFB3DF373E9E4D47C73
2,553,422 UART: [art] PUB.Y = E803C976C805E838DC926B864C6CC70316322BE7EADDB146B009E7B9895EF6F8C89863DCD97DD649A02C2D63B4A61ABE
2,560,372 UART: [art] SIG.R = DCC96F8AA14933E20C56DCBD14C5F5F16D62D2413A0325241B41AB6943A6E21F0C55E2A1E772D048AD79F70DC1376BCA
2,567,142 UART: [art] SIG.S = F4793717E7080ED02CB42F0707E56DB982E0777C01EDCC06CEC15AE3AECB0B7EE737D54BBAD4407E7155A3B4271D08BC
2,590,810 UART: mbox::rt_entry...
2,591,182 UART: ____ _ _ _ ____ _____
2,591,966 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,592,766 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,593,534 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,594,302 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,595,070 UART: |_|
2,595,382 UART:
2,713,037 UART: [rt] Runtime listening for mailbox commands...
2,714,276 >>> mbox cmd response data (0 bytes)
2,714,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,202,250 >>> mbox cmd response: success
5,215,741 UART:
5,215,757 UART: Running Caliptra FMC ...
5,216,165 UART:
5,216,219 UART: [state] CFI Enabled
5,304,814 UART: [art] Extend RT PCRs Done
5,305,242 UART: [art] Lock RT PCRs Done
5,306,679 UART: [art] Populate DV Done
5,314,764 UART: [fht] FMC Alias Private Key: 7
5,315,868 UART: [art] Derive CDI
5,316,148 UART: [art] Store in slot 0x4
5,401,727 UART: [art] Derive Key Pair
5,402,087 UART: [art] Store priv key in slot 0x5
5,415,519 UART: [art] Derive Key Pair - Done
5,430,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,446,257 UART: [art] Erasing AUTHORITY.KEYID = 7
5,447,022 UART: [art] PUB.X = 6FA32824401E201605B62829694914E736C6E95EDDB9184F2A2CD635FB893447A5904189A5C2FCC77ADC1D6C410AC2DA
5,453,788 UART: [art] PUB.Y = 03AA1A67557288A26C8B16FED650DFDF60AA9020C6F3CF43521DE6CA5CE35A8DC766E4CCE89D850E1850C3D94E02DD88
5,460,745 UART: [art] SIG.R = E8EA84E1929A3B9DDC1B93CA2F6F1230999C2B07C5DC67B998E9976487AAE8E84A1EBEC6A1BC264441BA9724B699D111
5,467,524 UART: [art] SIG.S = 94D5B060B4A671011FD1C4A0365C00FFF1E1167A69911E0AF1E979CD8E316593B79E1B44F6ED635A0701D2B822682158
5,491,198 UART: Caliptra RT
5,491,449 UART: [state] CFI Enabled
5,857,247 UART: [rt] RT failed reset flow
5,857,678 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,713 UART: [kat] ++
895,865 UART: [kat] sha1
900,247 UART: [kat] SHA2-256
902,187 UART: [kat] SHA2-384
904,914 UART: [kat] SHA2-512-ACC
906,815 UART: [kat] ECC-384
916,476 UART: [kat] HMAC-384Kdf
921,180 UART: [kat] LMS
1,169,492 UART: [kat] --
1,170,341 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,573 UART: [idev] ++
1,173,741 UART: [idev] CDI.KEYID = 6
1,174,102 UART: [idev] SUBJECT.KEYID = 7
1,174,527 UART: [idev] UDS.KEYID = 0
1,174,873 ready_for_fw is high
1,174,873 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,656 UART: [idev] Erasing UDS.KEYID = 0
1,199,004 UART: [idev] Sha1 KeyId Algorithm
1,207,756 UART: [idev] --
1,208,701 UART: [ldev] ++
1,208,869 UART: [ldev] CDI.KEYID = 6
1,209,233 UART: [ldev] SUBJECT.KEYID = 5
1,209,660 UART: [ldev] AUTHORITY.KEYID = 7
1,210,123 UART: [ldev] FE.KEYID = 1
1,215,355 UART: [ldev] Erasing FE.KEYID = 1
1,241,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,829 UART: [ldev] --
1,281,272 UART: [fwproc] Wait for Commands...
1,281,999 UART: [fwproc] Recv command 0x46574c44
1,282,732 UART: [fwproc] Recv'd Img size: 82832 bytes
2,217,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,244,125 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,275,300 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,362,079 >>> mbox cmd response: success
2,362,079 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,363,265 UART: [afmc] ++
2,363,433 UART: [afmc] CDI.KEYID = 6
2,363,796 UART: [afmc] SUBJECT.KEYID = 7
2,364,222 UART: [afmc] AUTHORITY.KEYID = 5
2,399,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,416,240 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,416,989 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,422,699 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,428,580 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,434,281 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,064 UART: [afmc] --
2,442,961 UART: [cold-reset] --
2,443,769 UART: [state] Locking Datavault
2,444,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,445,572 UART: [state] Locking ICCM
2,446,128 UART: [exit] Launching FMC @ 0x40000130
2,451,458 UART:
2,451,474 UART: Running Caliptra FMC ...
2,451,882 UART:
2,452,025 UART: [state] CFI Enabled
2,462,519 UART: [fht] FMC Alias Private Key: 7
2,581,333 UART: [art] Extend RT PCRs Done
2,581,761 UART: [art] Lock RT PCRs Done
2,583,191 UART: [art] Populate DV Done
2,591,472 UART: [fht] FMC Alias Private Key: 7
2,592,600 UART: [art] Derive CDI
2,592,880 UART: [art] Store in slot 0x4
2,678,631 UART: [art] Derive Key Pair
2,678,991 UART: [art] Store priv key in slot 0x5
2,691,859 UART: [art] Derive Key Pair - Done
2,706,801 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,722,202 UART: [art] Erasing AUTHORITY.KEYID = 7
2,722,967 UART: [art] PUB.X = 35039233F2ED49781E3EB0D7C3CFD47210039112CC58E27433468C5E0D45C4B224D43EC95B8E012C1F96C160D4BD02B3
2,729,722 UART: [art] PUB.Y = 63BEA0D2AD712AA5ED48FD76C498E8D961A721A03A843A515FC4038667E1852C72BB85B409BBB884AF46894259645E9D
2,736,670 UART: [art] SIG.R = D11BBE0420F49BB49E2E249DB5F858D677B273C47D0D8A3A3ACCF6BC99BA994C002B3521BCD93DA998388971A1938E26
2,743,422 UART: [art] SIG.S = F886FCE77527F3C512B817DDBE19DF3EE7262FFF615957349F717D22FE7A1D6B1392730DD307E415C34573CF0977598F
2,766,985 UART: mbox::rt_entry...
2,767,357 UART: ____ _ _ _ ____ _____
2,768,141 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,768,941 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,769,709 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,770,477 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,771,245 UART: |_|
2,771,557 UART:
2,890,986 UART: [rt] Runtime listening for mailbox commands...
2,892,225 >>> mbox cmd response data (0 bytes)
2,892,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,892,338 UART:
2,892,354 UART: Running Caliptra ROM ...
2,892,762 UART:
2,892,904 UART: [state] CFI Enabled
2,895,928 UART: [state] LifecycleState = Unprovisioned
2,896,583 UART: [state] DebugLocked = No
2,897,093 UART: [state] WD Timer not started. Device not locked for debugging
2,898,363 UART: [kat] SHA2-256
3,701,913 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,706,017 UART: [kat] ++
3,706,169 UART: [kat] sha1
3,710,489 UART: [kat] SHA2-256
3,712,429 UART: [kat] SHA2-384
3,715,284 UART: [kat] SHA2-512-ACC
3,717,184 UART: [kat] ECC-384
3,726,919 UART: [kat] HMAC-384Kdf
3,731,599 UART: [kat] LMS
3,979,911 UART: [kat] --
3,980,797 UART: [update-reset] ++
5,339,280 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,340,381 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,495,596 >>> mbox cmd response: success
5,495,929 UART: [update-reset] Copying MAN_2 To MAN_1
5,503,943 UART: [update-reset Success] --
5,504,968 UART: [state] Locking Datavault
5,505,902 UART: [state] Locking PCR0, PCR1 and PCR31
5,506,506 UART: [state] Locking ICCM
5,507,138 UART: [exit] Launching FMC @ 0x40000130
5,512,468 UART:
5,512,484 UART: Running Caliptra FMC ...
5,512,892 UART:
5,513,035 UART: [state] CFI Enabled
5,602,008 UART: [art] Extend RT PCRs Done
5,602,436 UART: [art] Lock RT PCRs Done
5,603,535 UART: [art] Populate DV Done
5,611,494 UART: [fht] FMC Alias Private Key: 7
5,612,526 UART: [art] Derive CDI
5,612,806 UART: [art] Store in slot 0x4
5,698,539 UART: [art] Derive Key Pair
5,698,899 UART: [art] Store priv key in slot 0x5
5,712,277 UART: [art] Derive Key Pair - Done
5,726,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,742,471 UART: [art] Erasing AUTHORITY.KEYID = 7
5,743,236 UART: [art] PUB.X = 06DDCAF57C0CFBA96C33F62C4CB3DF75B56BDDADEF7F574B284678E315E96F3DF7C4B947AB675CF6127BA63B3E63773F
5,750,024 UART: [art] PUB.Y = C35840448A81F3AC991CBE511AE98A69CD7CE9E89DD13C6D4658FAA2114BC9FA11B89AAEF65220D47ACFC9F356053A64
5,756,987 UART: [art] SIG.R = 7072338E94BB36FF5903E4CE973373F9C678C775C4385F04DCF76E334AB7F516C85639C4AF96DA093A6BD1D059157F4D
5,763,750 UART: [art] SIG.S = D8DE66783A9BF5ADACDA0AE09BFD12443A0FBEE5CECC04B811B967FC7B59272445EE830DC6D0A6C364FFBEDBC5FD99A4
5,787,826 UART: Caliptra RT
5,788,169 UART: [state] CFI Enabled
6,150,922 UART: [rt] RT failed reset flow
6,151,353 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,827 ready_for_fw is high
1,059,827 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,424 >>> mbox cmd response: success
2,216,424 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,278,911 UART:
2,278,927 UART: Running Caliptra FMC ...
2,279,335 UART:
2,279,478 UART: [state] CFI Enabled
2,290,166 UART: [fht] FMC Alias Private Key: 7
2,409,036 UART: [art] Extend RT PCRs Done
2,409,464 UART: [art] Lock RT PCRs Done
2,410,730 UART: [art] Populate DV Done
2,419,155 UART: [fht] FMC Alias Private Key: 7
2,420,247 UART: [art] Derive CDI
2,420,527 UART: [art] Store in slot 0x4
2,506,244 UART: [art] Derive Key Pair
2,506,604 UART: [art] Store priv key in slot 0x5
2,520,300 UART: [art] Derive Key Pair - Done
2,535,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,213 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,978 UART: [art] PUB.X = 76627C56ACB2771B32F6AD43175D687DA9E483F599911D2C0E9E8ACC160871F60E8F558CF8DC9086FF4312A2FA1EA81A
2,558,747 UART: [art] PUB.Y = 40A890F41DB4F1E04320CE3F06CE8C984734484B1108293B250C308E25747FAB56103467FD5091B47725BD9DE325FA43
2,565,682 UART: [art] SIG.R = FDA43E4ECAAAB63D84869272E625DD97F3BD36C93F3DB94EC92B3DECD0E7E146B1087E9A98C7792257C21B35D5FB92EA
2,572,469 UART: [art] SIG.S = 19F7420652FC79EE5D14D25224AA300723EF245210FBC8D975D4A0FDC089711357393F995612306B424307EFBDE6EEE4
2,595,730 UART: mbox::rt_entry...
2,596,102 UART: ____ _ _ _ ____ _____
2,596,886 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,686 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,454 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,222 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,990 UART: |_|
2,600,302 UART:
2,718,790 UART: [rt] Runtime listening for mailbox commands...
2,720,029 >>> mbox cmd response data (0 bytes)
2,720,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,206,726 >>> mbox cmd response: success
5,220,007 UART:
5,220,023 UART: Running Caliptra FMC ...
5,220,431 UART:
5,220,574 UART: [state] CFI Enabled
5,309,677 UART: [art] Extend RT PCRs Done
5,310,105 UART: [art] Lock RT PCRs Done
5,311,436 UART: [art] Populate DV Done
5,319,615 UART: [fht] FMC Alias Private Key: 7
5,320,613 UART: [art] Derive CDI
5,320,893 UART: [art] Store in slot 0x4
5,406,720 UART: [art] Derive Key Pair
5,407,080 UART: [art] Store priv key in slot 0x5
5,419,918 UART: [art] Derive Key Pair - Done
5,434,824 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,450,111 UART: [art] Erasing AUTHORITY.KEYID = 7
5,450,876 UART: [art] PUB.X = CDD72CA7162F73B874F5A0A0C0F555A8045F5AFC03D8460199FC64DBD4B537A09B8C85BFFCE07CBF75C74B1F39128384
5,457,651 UART: [art] PUB.Y = 9D80E16E9FCDC2409EF2F8A79DDC4C2A5AE0CEF23B53130AED173BB7847ACF0326E8E66459667BC8FBEA7451CB497026
5,464,613 UART: [art] SIG.R = 27E73752631E209CE0315ECC135A1B771EA5420A829903BFCD80FFBCEF67A1BADCB9D5D3FBD095390A7232C40936864A
5,471,381 UART: [art] SIG.S = 625823A8BB58D1F2A002A32C6AEB1E6EEAB9541D85DC329E1AE7BB075D987520ABC92F14C9F399A9F5A475A79DDD1B01
5,495,540 UART: Caliptra RT
5,495,883 UART: [state] CFI Enabled
5,860,255 UART: [rt] RT failed reset flow
5,860,686 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
893,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,379 UART: [kat] ++
897,531 UART: [kat] sha1
901,821 UART: [kat] SHA2-256
903,761 UART: [kat] SHA2-384
906,458 UART: [kat] SHA2-512-ACC
908,359 UART: [kat] ECC-384
917,848 UART: [kat] HMAC-384Kdf
922,618 UART: [kat] LMS
1,170,946 UART: [kat] --
1,171,679 UART: [cold-reset] ++
1,172,191 UART: [fht] FHT @ 0x50003400
1,174,878 UART: [idev] ++
1,175,046 UART: [idev] CDI.KEYID = 6
1,175,406 UART: [idev] SUBJECT.KEYID = 7
1,175,830 UART: [idev] UDS.KEYID = 0
1,176,175 ready_for_fw is high
1,176,175 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,004 UART: [idev] Erasing UDS.KEYID = 0
1,201,279 UART: [idev] Sha1 KeyId Algorithm
1,209,753 UART: [idev] --
1,210,671 UART: [ldev] ++
1,210,839 UART: [ldev] CDI.KEYID = 6
1,211,202 UART: [ldev] SUBJECT.KEYID = 5
1,211,628 UART: [ldev] AUTHORITY.KEYID = 7
1,212,091 UART: [ldev] FE.KEYID = 1
1,217,113 UART: [ldev] Erasing FE.KEYID = 1
1,243,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,361 UART: [ldev] --
1,282,726 UART: [fwproc] Wait for Commands...
1,283,438 UART: [fwproc] Recv command 0x46574c44
1,284,166 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,247,013 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,278,183 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,888 >>> mbox cmd response: success
2,364,888 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,366,056 UART: [afmc] ++
2,366,224 UART: [afmc] CDI.KEYID = 6
2,366,586 UART: [afmc] SUBJECT.KEYID = 7
2,367,011 UART: [afmc] AUTHORITY.KEYID = 5
2,402,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,467 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,176 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,059 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,760 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,642 UART: [afmc] --
2,445,754 UART: [cold-reset] --
2,446,594 UART: [state] Locking Datavault
2,447,885 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,489 UART: [state] Locking ICCM
2,448,923 UART: [exit] Launching FMC @ 0x40000130
2,454,253 UART:
2,454,269 UART: Running Caliptra FMC ...
2,454,677 UART:
2,454,731 UART: [state] CFI Enabled
2,464,887 UART: [fht] FMC Alias Private Key: 7
2,583,883 UART: [art] Extend RT PCRs Done
2,584,311 UART: [art] Lock RT PCRs Done
2,585,505 UART: [art] Populate DV Done
2,593,616 UART: [fht] FMC Alias Private Key: 7
2,594,572 UART: [art] Derive CDI
2,594,852 UART: [art] Store in slot 0x4
2,680,911 UART: [art] Derive Key Pair
2,681,271 UART: [art] Store priv key in slot 0x5
2,694,471 UART: [art] Derive Key Pair - Done
2,709,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,480 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,245 UART: [art] PUB.X = 90CD31CA4F8DC5BD518875761C2D674BCAF29649D5373C5E34F6FF744D2BC47D6F8F12461B2395812F9487F89B9E3C95
2,732,019 UART: [art] PUB.Y = 5C3255C738C245A0E7D5CBE3AEEADD49E39ECB06F1E71020DE875B08D48EC0BD793293F2D783AC3189075B19A9E1EAEC
2,738,978 UART: [art] SIG.R = 402859533DC330E27864C38701B44139DD9431A0D59BE64DA8124BFCD896C6C6A448548EF178DA28D45E0800E7277708
2,745,709 UART: [art] SIG.S = 16C9C88F07479067E21CB5D9879870B28E067A17FAEC311F179AC98F3FFCB770340568DCF405B57B35EAC13225885618
2,769,771 UART: mbox::rt_entry...
2,770,143 UART: ____ _ _ _ ____ _____
2,770,927 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,727 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,495 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,263 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,031 UART: |_|
2,774,343 UART:
2,892,634 UART: [rt] Runtime listening for mailbox commands...
2,893,873 >>> mbox cmd response data (0 bytes)
2,893,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,893,986 UART:
2,894,002 UART: Running Caliptra ROM ...
2,894,410 UART:
2,894,465 UART: [state] CFI Enabled
2,896,933 UART: [state] LifecycleState = Unprovisioned
2,897,588 UART: [state] DebugLocked = No
2,898,102 UART: [state] WD Timer not started. Device not locked for debugging
2,899,256 UART: [kat] SHA2-256
3,704,906 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,709,031 UART: [kat] ++
3,709,183 UART: [kat] sha1
3,713,201 UART: [kat] SHA2-256
3,715,141 UART: [kat] SHA2-384
3,717,954 UART: [kat] SHA2-512-ACC
3,719,854 UART: [kat] ECC-384
3,729,539 UART: [kat] HMAC-384Kdf
3,734,177 UART: [kat] LMS
3,982,505 UART: [kat] --
3,983,423 UART: [update-reset] ++
5,341,147 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,342,220 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,497,435 >>> mbox cmd response: success
5,497,788 UART: [update-reset] Copying MAN_2 To MAN_1
5,505,802 UART: [update-reset Success] --
5,506,871 UART: [state] Locking Datavault
5,507,749 UART: [state] Locking PCR0, PCR1 and PCR31
5,508,353 UART: [state] Locking ICCM
5,508,929 UART: [exit] Launching FMC @ 0x40000130
5,514,259 UART:
5,514,275 UART: Running Caliptra FMC ...
5,514,683 UART:
5,514,737 UART: [state] CFI Enabled
5,603,964 UART: [art] Extend RT PCRs Done
5,604,392 UART: [art] Lock RT PCRs Done
5,605,515 UART: [art] Populate DV Done
5,613,572 UART: [fht] FMC Alias Private Key: 7
5,614,528 UART: [art] Derive CDI
5,614,808 UART: [art] Store in slot 0x4
5,701,007 UART: [art] Derive Key Pair
5,701,367 UART: [art] Store priv key in slot 0x5
5,714,555 UART: [art] Derive Key Pair - Done
5,729,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,745,394 UART: [art] Erasing AUTHORITY.KEYID = 7
5,746,159 UART: [art] PUB.X = F9F60357AED7A3518E3DD3908C5C4621C3E846674DDF057F7B9BD8E1B0F0FB2B68E1583CB67917995A5D60A0C847DF01
5,752,928 UART: [art] PUB.Y = 9E650574AD55F888C4D0EE5CBACD4F0ABE6A43E54A664A9D92483D1807709ECB10575D872A084E1D2B52EA16AECF694F
5,759,880 UART: [art] SIG.R = C8766B6577F1066FF11DA6138E30A974DCD93738EBBC8C00972B2479C395C4E33F044E8DD676783343ACFE84BDD70AFA
5,766,627 UART: [art] SIG.S = 0A3DDD96801C457069748D6DFE0B442083CEB4B40A790F6E87562A159D0A2F9691479E6AB3C584B3A23CB16738B1DA4D
5,790,252 UART: Caliptra RT
5,790,503 UART: [state] CFI Enabled
6,153,482 UART: [rt] RT failed reset flow
6,153,913 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,315 ready_for_fw is high
1,059,315 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,887 >>> mbox cmd response: success
2,215,887 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,277,818 UART:
2,277,834 UART: Running Caliptra FMC ...
2,278,242 UART:
2,278,296 UART: [state] CFI Enabled
2,288,622 UART: [fht] FMC Alias Private Key: 7
2,407,162 UART: [art] Extend RT PCRs Done
2,407,590 UART: [art] Lock RT PCRs Done
2,408,978 UART: [art] Populate DV Done
2,417,271 UART: [fht] FMC Alias Private Key: 7
2,418,337 UART: [art] Derive CDI
2,418,617 UART: [art] Store in slot 0x4
2,504,038 UART: [art] Derive Key Pair
2,504,398 UART: [art] Store priv key in slot 0x5
2,517,816 UART: [art] Derive Key Pair - Done
2,532,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,547,838 UART: [art] Erasing AUTHORITY.KEYID = 7
2,548,603 UART: [art] PUB.X = 20F31CC1B229F54448FBB86BF0E64D4EE0EB9E176F750EF84610F2661C9424F7167277E0E68ACDF5CE209EDF11A34AE1
2,555,382 UART: [art] PUB.Y = 9D08A31FE2C6B98A02BB6B26491EAB4C0C773B3B356063E69F5B9D8498181A8608B8DC2A4C15D14031E2897B0750BA03
2,562,316 UART: [art] SIG.R = 09FFA9284940A24D6EDFA698E588B004D430C17B23ACEB9C6E55938068A51C4CED8A6CEA143D26A33AF8307B87D1AB5A
2,569,094 UART: [art] SIG.S = 13683FE2D841A1A48EA2AC2FC914E6835C6549434651CBA0BA6272B8EE1146071A3744D724742FFA8E733771081AD7BA
2,593,074 UART: mbox::rt_entry...
2,593,446 UART: ____ _ _ _ ____ _____
2,594,230 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,030 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,595,798 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,596,566 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,597,334 UART: |_|
2,597,646 UART:
2,715,523 UART: [rt] Runtime listening for mailbox commands...
2,716,762 >>> mbox cmd response data (0 bytes)
2,716,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,204,563 >>> mbox cmd response: success
5,218,110 UART:
5,218,126 UART: Running Caliptra FMC ...
5,218,534 UART:
5,218,588 UART: [state] CFI Enabled
5,307,709 UART: [art] Extend RT PCRs Done
5,308,137 UART: [art] Lock RT PCRs Done
5,309,482 UART: [art] Populate DV Done
5,317,871 UART: [fht] FMC Alias Private Key: 7
5,318,815 UART: [art] Derive CDI
5,319,095 UART: [art] Store in slot 0x4
5,405,180 UART: [art] Derive Key Pair
5,405,540 UART: [art] Store priv key in slot 0x5
5,418,878 UART: [art] Derive Key Pair - Done
5,433,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,449,425 UART: [art] Erasing AUTHORITY.KEYID = 7
5,450,190 UART: [art] PUB.X = 94510928A97E91F210E56EAEF35B9AE5A02F01C758EB4BC6C3F17AA4CEA4F4D9735EE113E83C9424F3B521CC8CBB65CF
5,456,972 UART: [art] PUB.Y = 13BAA683E92DAC3C2289445241391C0160989307740765A40276B6A40669C219689416F5C9BD9C29831F9AFA8EFC1FEE
5,463,901 UART: [art] SIG.R = 1C24BCD7FA27A2207E62256A5BEBBBA6F206959DC82FC8D3AAC10B791B95F83B0952698841EF849AB2BB170D2040F019
5,470,669 UART: [art] SIG.S = 0356AB08C4B6713B4B0F1650533BE21FDE544FDC2A0A07BCCDEEAE882BC74C19C084F7F5A3C3DD41E1045EEA10815687
5,495,107 UART: Caliptra RT
5,495,358 UART: [state] CFI Enabled
5,860,356 UART: [rt] RT failed reset flow
5,860,787 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
893,625 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,750 UART: [kat] ++
897,902 UART: [kat] sha1
901,994 UART: [kat] SHA2-256
903,934 UART: [kat] SHA2-384
906,763 UART: [kat] SHA2-512-ACC
908,664 UART: [kat] ECC-384
918,629 UART: [kat] HMAC-384Kdf
923,255 UART: [kat] LMS
1,171,583 UART: [kat] --
1,172,460 UART: [cold-reset] ++
1,172,978 UART: [fht] FHT @ 0x50003400
1,175,573 UART: [idev] ++
1,175,741 UART: [idev] CDI.KEYID = 6
1,176,101 UART: [idev] SUBJECT.KEYID = 7
1,176,525 UART: [idev] UDS.KEYID = 0
1,176,870 ready_for_fw is high
1,176,870 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,527 UART: [idev] Erasing UDS.KEYID = 0
1,201,954 UART: [idev] Sha1 KeyId Algorithm
1,210,510 UART: [idev] --
1,211,488 UART: [ldev] ++
1,211,656 UART: [ldev] CDI.KEYID = 6
1,212,019 UART: [ldev] SUBJECT.KEYID = 5
1,212,445 UART: [ldev] AUTHORITY.KEYID = 7
1,212,908 UART: [ldev] FE.KEYID = 1
1,218,042 UART: [ldev] Erasing FE.KEYID = 1
1,244,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,248 UART: [ldev] --
1,284,723 UART: [fwproc] Wait for Commands...
1,285,403 UART: [fwproc] Recv command 0x46574c44
1,286,131 UART: [fwproc] Recv'd Img size: 82832 bytes
2,221,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,248,789 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,279,959 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,366,574 >>> mbox cmd response: success
2,366,574 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,367,658 UART: [afmc] ++
2,367,826 UART: [afmc] CDI.KEYID = 6
2,368,188 UART: [afmc] SUBJECT.KEYID = 7
2,368,613 UART: [afmc] AUTHORITY.KEYID = 5
2,404,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,420,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,421,487 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,427,196 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,433,079 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,438,780 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,446,582 UART: [afmc] --
2,447,624 UART: [cold-reset] --
2,448,488 UART: [state] Locking Datavault
2,449,619 UART: [state] Locking PCR0, PCR1 and PCR31
2,450,223 UART: [state] Locking ICCM
2,450,855 UART: [exit] Launching FMC @ 0x40000130
2,456,185 UART:
2,456,201 UART: Running Caliptra FMC ...
2,456,609 UART:
2,456,752 UART: [state] CFI Enabled
2,467,342 UART: [fht] FMC Alias Private Key: 7
2,586,694 UART: [art] Extend RT PCRs Done
2,587,122 UART: [art] Lock RT PCRs Done
2,588,726 UART: [art] Populate DV Done
2,597,009 UART: [fht] FMC Alias Private Key: 7
2,597,997 UART: [art] Derive CDI
2,598,277 UART: [art] Store in slot 0x4
2,684,272 UART: [art] Derive Key Pair
2,684,632 UART: [art] Store priv key in slot 0x5
2,698,010 UART: [art] Derive Key Pair - Done
2,712,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,728,476 UART: [art] Erasing AUTHORITY.KEYID = 7
2,729,241 UART: [art] PUB.X = 40E9A95BF9284614FC10BAB9C57B1E24AE29FDE265BAC409221EA9F4F42152CA4220D3209C110A2AFEB8F38E50A1269D
2,736,017 UART: [art] PUB.Y = 8C5FE620EDC982B0FC4EA3BAD1F09D59C2EC6D5996D7665E53A33418062F57323DAD7F1E6440537E0DBAD9EB3BB124F1
2,742,977 UART: [art] SIG.R = 4E169D0D66D6E31A954A70C4F9FFCFCE30EE8B7C880A6A1AF346847D15C2854EEA295A4643DDBEFB4905F8199245DFAE
2,749,756 UART: [art] SIG.S = 768691C6DE2D54B1795C2B0F04A51E9DCA3779D51600381DDD0DEAC976B695BD83BB92122897E0A8382593A32330B531
2,772,921 UART: mbox::rt_entry...
2,773,293 UART: ____ _ _ _ ____ _____
2,774,077 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,774,877 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,775,645 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,776,413 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,777,181 UART: |_|
2,777,493 UART:
2,896,362 UART: [rt] Runtime listening for mailbox commands...
2,897,601 >>> mbox cmd response data (0 bytes)
2,897,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,897,714 UART:
2,897,730 UART: Running Caliptra ROM ...
2,898,138 UART:
2,898,280 UART: [state] CFI Enabled
2,900,932 UART: [state] LifecycleState = Unprovisioned
2,901,587 UART: [state] DebugLocked = No
2,902,153 UART: [state] WD Timer not started. Device not locked for debugging
2,903,439 UART: [kat] SHA2-256
3,709,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,713,214 UART: [kat] ++
3,713,366 UART: [kat] sha1
3,717,532 UART: [kat] SHA2-256
3,719,472 UART: [kat] SHA2-384
3,722,159 UART: [kat] SHA2-512-ACC
3,724,059 UART: [kat] ECC-384
3,733,886 UART: [kat] HMAC-384Kdf
3,738,504 UART: [kat] LMS
3,986,832 UART: [kat] --
3,987,834 UART: [update-reset] ++
5,347,286 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,348,291 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,503,506 >>> mbox cmd response: success
5,503,675 UART: [update-reset] Copying MAN_2 To MAN_1
5,511,689 UART: [update-reset Success] --
5,512,696 UART: [state] Locking Datavault
5,513,570 UART: [state] Locking PCR0, PCR1 and PCR31
5,514,174 UART: [state] Locking ICCM
5,514,704 UART: [exit] Launching FMC @ 0x40000130
5,520,034 UART:
5,520,050 UART: Running Caliptra FMC ...
5,520,458 UART:
5,520,601 UART: [state] CFI Enabled
5,610,112 UART: [art] Extend RT PCRs Done
5,610,540 UART: [art] Lock RT PCRs Done
5,611,935 UART: [art] Populate DV Done
5,620,216 UART: [fht] FMC Alias Private Key: 7
5,621,224 UART: [art] Derive CDI
5,621,504 UART: [art] Store in slot 0x4
5,707,205 UART: [art] Derive Key Pair
5,707,565 UART: [art] Store priv key in slot 0x5
5,720,443 UART: [art] Derive Key Pair - Done
5,734,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,750,573 UART: [art] Erasing AUTHORITY.KEYID = 7
5,751,338 UART: [art] PUB.X = 2FAA36A82912549E8F8661743A45B7D5BE853480576AFE6419F372406693472814166C978E340A5FCEDBD5A591CDF491
5,758,099 UART: [art] PUB.Y = F877554DE96DA2226536BDE22DF5EB7211D153145BBEC035775EC6462F73780C8B334E7F66B1F30C570C48C2768E454F
5,765,040 UART: [art] SIG.R = AFE3AD437E981D6A3B3F4B8430805624FBD1DC0B2AFF15FCA8A826E92414DBD4A9C8328BC8CE33FDC99A5DD3B53B2875
5,771,829 UART: [art] SIG.S = 2BFAA296A5E9FD68EACC52A3F32FBA2FA865D0CCB6DBF93455FCC935F7AE9CB9B5B2C2B9C01CE647342FDDD58E07AC17
5,795,540 UART: Caliptra RT
5,795,883 UART: [state] CFI Enabled
6,155,188 UART: [rt] RT failed reset flow
6,155,619 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,958 ready_for_fw is high
1,059,958 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,032 >>> mbox cmd response: success
2,217,032 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,279,317 UART:
2,279,333 UART: Running Caliptra FMC ...
2,279,741 UART:
2,279,884 UART: [state] CFI Enabled
2,290,498 UART: [fht] FMC Alias Private Key: 7
2,409,270 UART: [art] Extend RT PCRs Done
2,409,698 UART: [art] Lock RT PCRs Done
2,411,342 UART: [art] Populate DV Done
2,419,753 UART: [fht] FMC Alias Private Key: 7
2,420,765 UART: [art] Derive CDI
2,421,045 UART: [art] Store in slot 0x4
2,507,048 UART: [art] Derive Key Pair
2,507,408 UART: [art] Store priv key in slot 0x5
2,520,338 UART: [art] Derive Key Pair - Done
2,535,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,546 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,311 UART: [art] PUB.X = BE5D95A5137F1B6E0A37EDFED2C8FF6ECBA7D3E4092CBD210F0E4FDE9C26B513E2A124E5C7FF8024A114CFEFCAE7E7D9
2,558,103 UART: [art] PUB.Y = 51581B8CC8C3EC9F4282EF156DC4B09C9512A799BFB18DD6C546923B80CB1ED4ED7E8167D07050C74AB270BB573B257F
2,565,063 UART: [art] SIG.R = E5AD005B1476B03F92F25CC1FAEA0EDE5D7D0FF62FBEF42BF4845F4EE780034C9095F3B4EEBF341434116C8555302AB1
2,571,818 UART: [art] SIG.S = D1731FE617ED8FBB9D09CA55FD44FAC68273C56C2E7A2DB1415DDC6D4351908DCE32438F6C8D3EA080408D801E98DD99
2,595,637 UART: mbox::rt_entry...
2,596,009 UART: ____ _ _ _ ____ _____
2,596,793 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,593 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,361 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,129 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,897 UART: |_|
2,600,209 UART:
2,718,716 UART: [rt] Runtime listening for mailbox commands...
2,719,955 >>> mbox cmd response data (0 bytes)
2,719,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,209,429 >>> mbox cmd response: success
5,222,680 UART:
5,222,696 UART: Running Caliptra FMC ...
5,223,104 UART:
5,223,247 UART: [state] CFI Enabled
5,312,572 UART: [art] Extend RT PCRs Done
5,313,000 UART: [art] Lock RT PCRs Done
5,314,271 UART: [art] Populate DV Done
5,322,756 UART: [fht] FMC Alias Private Key: 7
5,323,830 UART: [art] Derive CDI
5,324,110 UART: [art] Store in slot 0x4
5,409,931 UART: [art] Derive Key Pair
5,410,291 UART: [art] Store priv key in slot 0x5
5,423,429 UART: [art] Derive Key Pair - Done
5,438,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,453,703 UART: [art] Erasing AUTHORITY.KEYID = 7
5,454,468 UART: [art] PUB.X = EC1CCE7D32A8258B12D2E00028DAB84E801BB6269DC2DAC165F22C5326F02D59B5A761F06558DE17B61E7E62EDE53D09
5,461,225 UART: [art] PUB.Y = FA121D4C817EC6557240028FE2A6B65FFB1F3251D74FE843EF8228E8B5C17C5A789BCF2CEC875791373097372506D6B4
5,468,171 UART: [art] SIG.R = 5A8CC57E781048A02CE453EC48596BA822BFCED01882510BFC5F998135D61ABA7FE7F61435CB65235144B92243AD029C
5,474,939 UART: [art] SIG.S = 7D3D2A31D622969B3569FF674D3EF946C41634D42F3A8477088E66EEBFF5BD539FD7DFAB6580BB5A9B531C4BFA0B98F2
5,498,575 UART: Caliptra RT
5,498,918 UART: [state] CFI Enabled
5,863,606 UART: [rt] RT failed reset flow
5,864,037 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,236 UART:
192,587 UART: Running Caliptra ROM ...
193,694 UART:
193,840 UART: [state] CFI Enabled
266,657 UART: [state] LifecycleState = Unprovisioned
268,640 UART: [state] DebugLocked = No
270,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,701 UART: [kat] SHA2-256
445,455 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,912 UART: [kat] ++
456,406 UART: [kat] sha1
467,706 UART: [kat] SHA2-256
470,355 UART: [kat] SHA2-384
476,414 UART: [kat] SHA2-512-ACC
478,782 UART: [kat] ECC-384
2,767,131 UART: [kat] HMAC-384Kdf
2,777,929 UART: [kat] LMS
3,968,264 UART: [kat] --
3,973,259 UART: [cold-reset] ++
3,974,347 UART: [fht] Storing FHT @ 0x50003400
3,985,790 UART: [idev] ++
3,986,349 UART: [idev] CDI.KEYID = 6
3,987,324 UART: [idev] SUBJECT.KEYID = 7
3,988,571 UART: [idev] UDS.KEYID = 0
3,989,568 ready_for_fw is high
3,989,774 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,094,277 UART: [idev] Erasing UDS.KEYID = 0
7,324,331 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,082 UART: [idev] --
7,349,800 UART: [ldev] ++
7,350,377 UART: [ldev] CDI.KEYID = 6
7,351,292 UART: [ldev] SUBJECT.KEYID = 5
7,352,507 UART: [ldev] AUTHORITY.KEYID = 7
7,353,792 UART: [ldev] FE.KEYID = 1
7,379,765 UART: [ldev] Erasing FE.KEYID = 1
10,713,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,951 UART: [ldev] --
13,092,246 UART: [fwproc] Waiting for Commands...
13,094,937 UART: [fwproc] Received command 0x46574c44
13,097,128 UART: [fwproc] Received Image of size 82832 bytes
16,761,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,834,673 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,907,853 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,111,909 >>> mbox cmd response: success
17,112,975 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,116,525 UART: [afmc] ++
17,117,114 UART: [afmc] CDI.KEYID = 6
17,118,060 UART: [afmc] SUBJECT.KEYID = 7
17,119,281 UART: [afmc] AUTHORITY.KEYID = 5
20,478,673 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,787,637 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,789,955 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,804,344 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,819,086 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,833,527 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,854,761 UART: [afmc] --
22,858,958 UART: [cold-reset] --
22,862,551 UART: [state] Locking Datavault
22,869,474 UART: [state] Locking PCR0, PCR1 and PCR31
22,871,237 UART: [state] Locking ICCM
22,873,392 UART: [exit] Launching FMC @ 0x40000130
22,881,792 UART:
22,882,029 UART: Running Caliptra FMC ...
22,883,134 UART:
22,883,288 UART: [state] CFI Enabled
22,948,131 UART: [fht] FMC Alias Private Key: 7
25,288,685 UART: [art] Extend RT PCRs Done
25,289,909 UART: [art] Lock RT PCRs Done
25,291,746 UART: [art] Populate DV Done
25,297,181 UART: [fht] FMC Alias Private Key: 7
25,298,781 UART: [art] Derive CDI
25,299,600 UART: [art] Store in slot 0x4
25,348,744 UART: [art] Derive Key Pair
25,349,745 UART: [art] Store priv key in slot 0x5
28,642,239 UART: [art] Derive Key Pair - Done
28,655,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,943,662 UART: [art] Erasing AUTHORITY.KEYID = 7
30,945,170 UART: [art] PUB.X = 0F9E1550CE5BD4261118C47BC6872C50A466775C710D7DE586DFCFED19CB57CAE07D6A8E2377011B7FF7C60DDC8E5E4C
30,952,465 UART: [art] PUB.Y = 84002DE6FA93CE9454497F7FC708DDCE3BD640F298F741A98EF42121D4C74C57C9142A0EAA516618D66E5921C09D1685
30,959,714 UART: [art] SIG.R = FC70248278D07C76793F4AEBB30C7A90F0CA4759F841A4332A3DF47E6EE86A12DF514668438706EFC1385CAB14D337B3
30,967,074 UART: [art] SIG.S = 36F8BE31A187A59D30F2F7DA9D1D85D0F85EB069E088AB5DDC412EFC2306BC356FB13C67363644A166D9C908E489387E
32,272,156 UART: mbox::rt_entry...
32,273,154 UART: ____ _ _ _ ____ _____
32,275,093 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,277,109 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,279,040 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,280,974 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,282,903 UART: |_|
32,283,736 UART:
32,415,001 UART: [rt] Runtime listening for mailbox commands...
32,422,221 >>> mbox cmd response data (4360 bytes)
32,442,904 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,487,258 >>> mbox cmd response data (0 bytes)
34,562,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,712,615 UART:
34,713,021 UART: Running Caliptra ROM ...
34,714,118 UART:
34,714,277 UART: [state] CFI Enabled
34,784,360 UART: [state] LifecycleState = Unprovisioned
34,786,324 UART: [state] DebugLocked = No
34,789,020 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,794,094 UART: [kat] SHA2-256
34,963,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,974,269 UART: [kat] ++
34,974,778 UART: [kat] sha1
34,985,718 UART: [kat] SHA2-256
34,988,462 UART: [kat] SHA2-384
34,994,012 UART: [kat] SHA2-512-ACC
34,996,387 UART: [kat] ECC-384
37,286,693 UART: [kat] HMAC-384Kdf
37,318,855 UART: [kat] LMS
38,509,199 UART: [kat] --
38,512,669 UART: [update-reset] ++
42,705,893 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,709,295 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,107,085 >>> mbox cmd response: success
43,111,681 UART: [update-reset] Copying MAN_2 To MAN_1
43,131,470 UART: [update-reset Success] --
43,134,780 UART: [state] Locking Datavault
43,137,293 UART: [state] Locking PCR0, PCR1 and PCR31
43,139,036 UART: [state] Locking ICCM
43,140,897 UART: [exit] Launching FMC @ 0x40000130
43,149,300 UART:
43,149,547 UART: Running Caliptra FMC ...
43,150,654 UART:
43,150,813 UART: [state] CFI Enabled
43,238,201 UART: [art] Extend RT PCRs Done
43,239,402 UART: [art] Lock RT PCRs Done
43,240,938 UART: [art] Populate DV Done
43,246,399 UART: [fht] FMC Alias Private Key: 7
43,248,044 UART: [art] Derive CDI
43,248,862 UART: [art] Store in slot 0x4
43,307,398 UART: [art] Derive Key Pair
43,308,445 UART: [art] Store priv key in slot 0x5
46,601,458 UART: [art] Derive Key Pair - Done
46,614,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,902,634 UART: [art] Erasing AUTHORITY.KEYID = 7
48,904,145 UART: [art] PUB.X = 60587B4C71F51CA4785CE38220ED94E143EF7FE80310CD656A7FCD71E87E14CB8F176EDE6A601DE1D79CCB3893DDBB93
48,911,472 UART: [art] PUB.Y = 0B76940C15338A7B7B8DA7471C68E791CA558CF0A8E408DF3CE4252C432293A31FF4C422BDBC9EF0641907B95304DF4C
48,918,735 UART: [art] SIG.R = 09B3C3E1775B41D15D1EA718D64DA6E9D6F6F8630A7E393A7B8D0844FA70C47D9FDB441F4736AD007FB8BD10B5AC7B60
48,926,145 UART: [art] SIG.S = 8483BEC1A7F523E942F35696B44A1BA9917AA2E9770BA971139A7ED1DF5EB783D95F39CAF7AED85B2BFB41EE2490F953
50,231,384 UART: Caliptra RT
50,232,104 UART: [state] CFI Enabled
53,939,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,941,142 UART: [rt] RT listening for mailbox commands...
53,972,754 UART: [rt]cmd =0x494e464f, len=4
53,977,087 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,805,778 ready_for_fw is high
3,806,190 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,264,977 >>> mbox cmd response: success
17,266,378 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,949,662 UART:
22,950,050 UART: Running Caliptra FMC ...
22,951,370 UART:
22,951,539 UART: [state] CFI Enabled
23,021,780 UART: [fht] FMC Alias Private Key: 7
25,362,448 UART: [art] Extend RT PCRs Done
25,363,676 UART: [art] Lock RT PCRs Done
25,365,602 UART: [art] Populate DV Done
25,371,022 UART: [fht] FMC Alias Private Key: 7
25,372,538 UART: [art] Derive CDI
25,373,309 UART: [art] Store in slot 0x4
25,430,322 UART: [art] Derive Key Pair
25,431,364 UART: [art] Store priv key in slot 0x5
28,724,135 UART: [art] Derive Key Pair - Done
28,737,089 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,025,030 UART: [art] Erasing AUTHORITY.KEYID = 7
31,026,547 UART: [art] PUB.X = 91B0ABA9BA01BF0B5ADB78C0EEC43E167E566C960539807A6675B745D2DFD4DE539E747638E1B6C90DCEDF990B4BFD49
31,033,810 UART: [art] PUB.Y = ABA09E8876DC2BA0098477B8D7572CBB4AF489DE03A52D9CC608E1256654EA447665988076F878B7C457856F37E6754D
31,041,048 UART: [art] SIG.R = 0EEF6F8CAD623913731F38DB84E63E3BB7FD86A3CE91416AF2DF5878C3512C3EE1FB57F5442025FDF7AAB9C299209E55
31,048,457 UART: [art] SIG.S = 11ABC8F4034E4BBD38C9DE9759AD9B867D35E8007FB526C723E27D24D015B478E56CD0E16967D0A32B0E1BB4A06C6FD0
32,353,204 UART: mbox::rt_entry...
32,354,167 UART: ____ _ _ _ ____ _____
32,356,155 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,358,161 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,360,090 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,362,097 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,364,033 UART: |_|
32,365,023 UART:
32,496,778 UART: [rt] Runtime listening for mailbox commands...
32,503,995 >>> mbox cmd response data (4360 bytes)
32,524,752 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,569,120 >>> mbox cmd response data (0 bytes)
34,643,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,474,834 >>> mbox cmd response: success
43,508,439 UART:
43,508,760 UART: Running Caliptra FMC ...
43,509,887 UART:
43,510,078 UART: [state] CFI Enabled
43,614,101 UART: [art] Extend RT PCRs Done
43,615,295 UART: [art] Lock RT PCRs Done
43,616,752 UART: [art] Populate DV Done
43,622,545 UART: [fht] FMC Alias Private Key: 7
43,624,081 UART: [art] Derive CDI
43,624,892 UART: [art] Store in slot 0x4
43,683,227 UART: [art] Derive Key Pair
43,684,263 UART: [art] Store priv key in slot 0x5
46,976,936 UART: [art] Derive Key Pair - Done
46,990,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,277,182 UART: [art] Erasing AUTHORITY.KEYID = 7
49,278,694 UART: [art] PUB.X = 184418368D60BC73E9DDCA2150CF81AA90DBE1D7D541D2ECFC717C2D780764D0F6F7CAD68D88E0287D907050FA6BFF69
49,285,967 UART: [art] PUB.Y = 1AED285B2398BBC923FF13E86850FA155BF17D8638EC6FF1469637C737B81164CC1FFFDAC374A356E7D27EAEA5D5E98A
49,293,214 UART: [art] SIG.R = 674EC0229741663490160700A0C4148C485C388D54A84B6D79F30D62262E741A79CCAEF29C9E708C81FD6B0E0C8B92E7
49,300,572 UART: [art] SIG.S = 5176E6C4AAD6D9760261C06A561D486EDCDF82BF96675C049F3E1A6DFC522DA3A9F585BCD5D68524349FA421960D7B54
50,605,873 UART: Caliptra RT
50,606,588 UART: [state] CFI Enabled
54,314,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,315,489 UART: [rt] RT listening for mailbox commands...
54,346,985 UART: [rt]cmd =0x494e464f, len=4
54,351,336 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,493 UART:
192,849 UART: Running Caliptra ROM ...
194,059 UART:
603,862 UART: [state] CFI Enabled
620,229 UART: [state] LifecycleState = Unprovisioned
622,168 UART: [state] DebugLocked = No
623,967 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,316 UART: [kat] SHA2-256
798,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,623 UART: [kat] ++
809,068 UART: [kat] sha1
820,153 UART: [kat] SHA2-256
822,875 UART: [kat] SHA2-384
828,359 UART: [kat] SHA2-512-ACC
830,720 UART: [kat] ECC-384
3,115,783 UART: [kat] HMAC-384Kdf
3,128,581 UART: [kat] LMS
4,318,719 UART: [kat] --
4,322,729 UART: [cold-reset] ++
4,325,008 UART: [fht] Storing FHT @ 0x50003400
4,336,412 UART: [idev] ++
4,336,965 UART: [idev] CDI.KEYID = 6
4,337,914 UART: [idev] SUBJECT.KEYID = 7
4,339,149 UART: [idev] UDS.KEYID = 0
4,340,129 ready_for_fw is high
4,340,316 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,444,512 UART: [idev] Erasing UDS.KEYID = 0
7,627,678 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,410 UART: [idev] --
7,652,969 UART: [ldev] ++
7,653,594 UART: [ldev] CDI.KEYID = 6
7,654,504 UART: [ldev] SUBJECT.KEYID = 5
7,655,656 UART: [ldev] AUTHORITY.KEYID = 7
7,656,985 UART: [ldev] FE.KEYID = 1
7,668,294 UART: [ldev] Erasing FE.KEYID = 1
10,955,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,696 UART: [ldev] --
13,319,006 UART: [fwproc] Waiting for Commands...
13,321,052 UART: [fwproc] Received command 0x46574c44
13,323,236 UART: [fwproc] Received Image of size 82832 bytes
16,991,854 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,062,895 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,136,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,339,127 >>> mbox cmd response: success
17,340,121 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,342,948 UART: [afmc] ++
17,343,557 UART: [afmc] CDI.KEYID = 6
17,344,464 UART: [afmc] SUBJECT.KEYID = 7
17,345,677 UART: [afmc] AUTHORITY.KEYID = 5
20,657,679 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,952,286 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,954,511 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,968,959 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,983,686 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,998,097 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,019,696 UART: [afmc] --
23,022,652 UART: [cold-reset] --
23,027,048 UART: [state] Locking Datavault
23,031,492 UART: [state] Locking PCR0, PCR1 and PCR31
23,033,242 UART: [state] Locking ICCM
23,034,423 UART: [exit] Launching FMC @ 0x40000130
23,042,813 UART:
23,043,132 UART: Running Caliptra FMC ...
23,044,191 UART:
23,044,342 UART: [state] CFI Enabled
23,052,710 UART: [fht] FMC Alias Private Key: 7
25,392,944 UART: [art] Extend RT PCRs Done
25,394,165 UART: [art] Lock RT PCRs Done
25,395,681 UART: [art] Populate DV Done
25,401,299 UART: [fht] FMC Alias Private Key: 7
25,402,883 UART: [art] Derive CDI
25,403,614 UART: [art] Store in slot 0x4
25,446,188 UART: [art] Derive Key Pair
25,447,193 UART: [art] Store priv key in slot 0x5
28,688,992 UART: [art] Derive Key Pair - Done
28,701,935 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,982,124 UART: [art] Erasing AUTHORITY.KEYID = 7
30,983,624 UART: [art] PUB.X = 01788BBF2A5D7F690D15CE7D31F6A071F35AC8126091F9A0FD19068E526F1D0DE8BD26448731E710472ECEB4665DD771
30,990,886 UART: [art] PUB.Y = 02215E21697871020EBAF596801EDDC4C40257A89E0980B5AC825F2CAAE904450DBD1E5E1BF5450907B5DE668A259CF9
30,998,126 UART: [art] SIG.R = ECB4E6F0BC883386033E9AC58F3E93DF23787EA5595150B29DF65ACE835878A9340629DD6B9C4CFEAAD7ADE8F3FFC53C
31,005,551 UART: [art] SIG.S = 3AEC9C8D9357064044C04979E5773275B10A18194A795947F4653FBB3AB8A4861E73B1806966B45ACE967573F4B61523
32,310,867 UART: mbox::rt_entry...
32,311,826 UART: ____ _ _ _ ____ _____
32,313,751 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,315,752 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,317,603 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,319,529 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,321,455 UART: |_|
32,322,257 UART:
32,452,890 UART: [rt] Runtime listening for mailbox commands...
32,460,109 >>> mbox cmd response data (4360 bytes)
32,480,768 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,525,155 >>> mbox cmd response data (0 bytes)
34,596,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,746,252 UART:
34,746,618 UART: Running Caliptra ROM ...
34,747,698 UART:
34,747,913 UART: [state] CFI Enabled
34,762,236 UART: [state] LifecycleState = Unprovisioned
34,764,281 UART: [state] DebugLocked = No
34,766,207 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,770,444 UART: [kat] SHA2-256
34,940,185 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,950,708 UART: [kat] ++
34,951,183 UART: [kat] sha1
34,962,612 UART: [kat] SHA2-256
34,965,317 UART: [kat] SHA2-384
34,971,946 UART: [kat] SHA2-512-ACC
34,974,342 UART: [kat] ECC-384
37,256,757 UART: [kat] HMAC-384Kdf
37,269,005 UART: [kat] LMS
38,459,051 UART: [kat] --
38,464,361 UART: [update-reset] ++
42,656,367 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,660,575 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,058,330 >>> mbox cmd response: success
43,062,831 UART: [update-reset] Copying MAN_2 To MAN_1
43,082,112 UART: [update-reset Success] --
43,085,650 UART: [state] Locking Datavault
43,088,955 UART: [state] Locking PCR0, PCR1 and PCR31
43,090,713 UART: [state] Locking ICCM
43,092,139 UART: [exit] Launching FMC @ 0x40000130
43,100,527 UART:
43,100,755 UART: Running Caliptra FMC ...
43,101,774 UART:
43,101,917 UART: [state] CFI Enabled
43,146,405 UART: [art] Extend RT PCRs Done
43,147,545 UART: [art] Lock RT PCRs Done
43,149,095 UART: [art] Populate DV Done
43,154,551 UART: [fht] FMC Alias Private Key: 7
43,156,239 UART: [art] Derive CDI
43,157,044 UART: [art] Store in slot 0x4
43,199,866 UART: [art] Derive Key Pair
43,200,912 UART: [art] Store priv key in slot 0x5
46,443,158 UART: [art] Derive Key Pair - Done
46,456,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,736,828 UART: [art] Erasing AUTHORITY.KEYID = 7
48,738,338 UART: [art] PUB.X = 10FEB37B055F74060AA3E89067125EE04E461F7BE05FD804C041223BA4787EB673E15776E727B15B7B7D4A7280E89AAB
48,745,598 UART: [art] PUB.Y = 09D46DE3CB3D8135A2233B58E0C364541E0874A40D8C86A7BAE313198404220F968CCED5270E07E67B294DAB2E30B46E
48,752,831 UART: [art] SIG.R = A631F02E907555194B650FF2495AF847A66DB8946E9F59A2D1822288196E42C3B12C858D07985168BFA98C59BF6742AF
48,760,232 UART: [art] SIG.S = 0591201246456A4FB430322BE408356B685D5B1FB74B79C2C4A3CFBBECBEC482DB2C9BF22780809FD3CB7F6B112FC056
50,065,474 UART: Caliptra RT
50,066,180 UART: [state] CFI Enabled
53,670,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,671,885 UART: [rt] RT listening for mailbox commands...
53,703,274 UART: [rt]cmd =0x494e464f, len=4
53,707,650 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,127,459 ready_for_fw is high
4,127,869 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,422,389 >>> mbox cmd response: success
17,423,755 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
23,065,045 UART:
23,065,449 UART: Running Caliptra FMC ...
23,066,654 UART:
23,066,829 UART: [state] CFI Enabled
23,074,873 UART: [fht] FMC Alias Private Key: 7
25,414,636 UART: [art] Extend RT PCRs Done
25,415,852 UART: [art] Lock RT PCRs Done
25,417,585 UART: [art] Populate DV Done
25,422,898 UART: [fht] FMC Alias Private Key: 7
25,424,594 UART: [art] Derive CDI
25,425,424 UART: [art] Store in slot 0x4
25,468,445 UART: [art] Derive Key Pair
25,469,435 UART: [art] Store priv key in slot 0x5
28,711,678 UART: [art] Derive Key Pair - Done
28,724,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,004,920 UART: [art] Erasing AUTHORITY.KEYID = 7
31,006,432 UART: [art] PUB.X = 2C52D4A541D6072663CC789A2BEE1AA37EC8D1A6B28F3741577C84AE706550D7A5A69BE452ED23FCCE6043547FA715AE
31,013,714 UART: [art] PUB.Y = 6BE6362C893212DF765835744068E4FFA2E0F14DE29EED4D5B5FF0D89D91DDAEB17E61696DDF18760518EA240433270B
31,020,963 UART: [art] SIG.R = 217641C2C1105325BDFBC6A66789109938F5C3352F39AA854378BD113D61F502FFDD56DFAE14CF1B936ED951D1FC2EBB
31,028,357 UART: [art] SIG.S = 3C77423427A680116A52AD323E1C99D5F817A1B5ECD7EAB0F4B6CEA931AB1125AC9171780176BD0CEF67C3C58522284A
32,333,370 UART: mbox::rt_entry...
32,334,313 UART: ____ _ _ _ ____ _____
32,336,291 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,338,292 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,340,215 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,342,194 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,344,140 UART: |_|
32,344,948 UART:
32,475,997 UART: [rt] Runtime listening for mailbox commands...
32,483,261 >>> mbox cmd response data (4360 bytes)
32,503,865 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,548,243 >>> mbox cmd response data (0 bytes)
34,622,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,375,160 >>> mbox cmd response: success
43,409,741 UART:
43,410,072 UART: Running Caliptra FMC ...
43,411,200 UART:
43,411,383 UART: [state] CFI Enabled
43,455,640 UART: [art] Extend RT PCRs Done
43,456,790 UART: [art] Lock RT PCRs Done
43,458,108 UART: [art] Populate DV Done
43,463,840 UART: [fht] FMC Alias Private Key: 7
43,465,375 UART: [art] Derive CDI
43,466,136 UART: [art] Store in slot 0x4
43,508,787 UART: [art] Derive Key Pair
43,509,830 UART: [art] Store priv key in slot 0x5
46,752,027 UART: [art] Derive Key Pair - Done
46,765,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,044,886 UART: [art] Erasing AUTHORITY.KEYID = 7
49,046,405 UART: [art] PUB.X = 4552D359F77619AA5804722EE47689038DD4DFBE8D8320EAA3D71008CF1EF304C8E2AE4E3B5D4167DCE6D37B9E18D786
49,053,669 UART: [art] PUB.Y = E36348BDB7744BEC24E4F30AB78215C59E76A0F828F508C619981457797126DAECF6258B7DA95D8A6470A912D5489F8B
49,060,917 UART: [art] SIG.R = FD8F8110B381664F78CE33410D542D15BF98B3CF92E49FD650561C16E12B670094D8F8BFFDAD9DFCEB7E2A2A2EF15970
49,068,324 UART: [art] SIG.S = AC803607587E87BD61EF2D88E8A4940463BB35E80664577B9FE2DF3547A5B036328A5B96F1A44C96AA56F05B572542E5
50,373,755 UART: Caliptra RT
50,374,493 UART: [state] CFI Enabled
53,978,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,979,688 UART: [rt] RT listening for mailbox commands...
54,010,962 UART: [rt]cmd =0x494e464f, len=4
54,015,363 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
192,208 UART:
192,559 UART: Running Caliptra ROM ...
193,651 UART:
193,790 UART: [state] CFI Enabled
269,709 UART: [state] LifecycleState = Unprovisioned
271,696 UART: [state] DebugLocked = No
273,581 UART: [state] WD Timer not started. Device not locked for debugging
277,964 UART: [kat] SHA2-256
457,646 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
468,393 UART: [kat] ++
468,836 UART: [kat] sha1
479,350 UART: [kat] SHA2-256
482,021 UART: [kat] SHA2-384
488,157 UART: [kat] SHA2-512-ACC
490,524 UART: [kat] ECC-384
2,949,968 UART: [kat] HMAC-384Kdf
2,973,937 UART: [kat] LMS
3,450,398 UART: [kat] --
3,454,819 UART: [cold-reset] ++
3,457,168 UART: [fht] FHT @ 0x50003400
3,467,371 UART: [idev] ++
3,467,970 UART: [idev] CDI.KEYID = 6
3,468,855 UART: [idev] SUBJECT.KEYID = 7
3,470,168 UART: [idev] UDS.KEYID = 0
3,471,060 ready_for_fw is high
3,471,248 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,575,532 UART: [idev] Erasing UDS.KEYID = 0
5,988,961 UART: [idev] Sha1 KeyId Algorithm
6,011,837 UART: [idev] --
6,016,757 UART: [ldev] ++
6,017,387 UART: [ldev] CDI.KEYID = 6
6,018,306 UART: [ldev] SUBJECT.KEYID = 5
6,019,467 UART: [ldev] AUTHORITY.KEYID = 7
6,020,755 UART: [ldev] FE.KEYID = 1
6,059,220 UART: [ldev] Erasing FE.KEYID = 1
8,565,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,615 UART: [ldev] --
10,375,417 UART: [fwproc] Wait for Commands...
10,378,537 UART: [fwproc] Recv command 0x46574c44
10,380,515 UART: [fwproc] Recv'd Img size: 82832 bytes
13,428,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,512,379 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,585,392 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,789,488 >>> mbox cmd response: success
13,790,447 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,792,895 UART: [afmc] ++
13,793,482 UART: [afmc] CDI.KEYID = 6
13,794,500 UART: [afmc] SUBJECT.KEYID = 7
13,795,659 UART: [afmc] AUTHORITY.KEYID = 5
16,344,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,084,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,086,881 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,102,675 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,118,723 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,134,281 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,159,479 UART: [afmc] --
18,163,091 UART: [cold-reset] --
18,166,955 UART: [state] Locking Datavault
18,172,307 UART: [state] Locking PCR0, PCR1 and PCR31
18,174,054 UART: [state] Locking ICCM
18,176,308 UART: [exit] Launching FMC @ 0x40000130
18,184,711 UART:
18,185,008 UART: Running Caliptra FMC ...
18,186,122 UART:
18,186,279 UART: [state] CFI Enabled
18,240,886 UART: [fht] FMC Alias Private Key: 7
20,008,100 UART: [art] Extend RT PCRs Done
20,009,309 UART: [art] Lock RT PCRs Done
20,010,926 UART: [art] Populate DV Done
20,016,226 UART: [fht] FMC Alias Private Key: 7
20,017,763 UART: [art] Derive CDI
20,018,578 UART: [art] Store in slot 0x4
20,073,767 UART: [art] Derive Key Pair
20,074,795 UART: [art] Store priv key in slot 0x5
22,537,786 UART: [art] Derive Key Pair - Done
22,550,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,263,287 UART: [art] Erasing AUTHORITY.KEYID = 7
24,264,915 UART: [art] PUB.X = ED2260FFA1AA1261FD80B0F7A705FE7655D8CE70630ED6FB828D1967984EBB94CE3D82855DF19B8B66E88C00E948DFF7
24,272,053 UART: [art] PUB.Y = 006467359C487AB61D2FDCF50A0FA5B5E7488BBBD2D8336C5EF7B7096010BCE75BDD2F4AA233A108B04A748845ECBB66
24,279,341 UART: [art] SIG.R = 7D0D4D608FC4FE253B9E0AAB0EC0DD6DEE62931F8DC1E6CA37C13E41ABC75045758D82979E3F203C1450C10DA8B9B81C
24,286,766 UART: [art] SIG.S = 3516A3A80B585F202298849673C7E61C819C79D6FB288298A8F240271C30BF3B064BD1052DA8C3E72520FF0706DB595C
25,265,240 UART: mbox::rt_entry...
25,266,200 UART: ____ _ _ _ ____ _____
25,268,182 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,270,181 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,272,106 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,274,034 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,275,963 UART: |_|
25,276,827 UART:
25,408,232 UART: [rt] Runtime listening for mailbox commands...
25,415,437 >>> mbox cmd response data (4360 bytes)
25,436,015 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,480,403 >>> mbox cmd response data (0 bytes)
27,541,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,691,792 UART:
27,692,148 UART: Running Caliptra ROM ...
27,693,282 UART:
27,693,446 UART: [state] CFI Enabled
27,764,293 UART: [state] LifecycleState = Unprovisioned
27,766,223 UART: [state] DebugLocked = No
27,767,557 UART: [state] WD Timer not started. Device not locked for debugging
27,772,100 UART: [kat] SHA2-256
27,951,736 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,962,509 UART: [kat] ++
27,963,098 UART: [kat] sha1
27,975,449 UART: [kat] SHA2-256
27,978,143 UART: [kat] SHA2-384
27,984,664 UART: [kat] SHA2-512-ACC
27,987,008 UART: [kat] ECC-384
30,444,296 UART: [kat] HMAC-384Kdf
30,467,102 UART: [kat] LMS
30,943,507 UART: [kat] --
30,948,381 UART: [update-reset] ++
34,441,803 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,446,058 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,843,678 >>> mbox cmd response: success
34,848,298 UART: [update-reset] Copying MAN_2 To MAN_1
34,882,047 UART: [update-reset Success] --
34,886,839 UART: [state] Locking Datavault
34,889,116 UART: [state] Locking PCR0, PCR1 and PCR31
34,890,818 UART: [state] Locking ICCM
34,891,972 UART: [exit] Launching FMC @ 0x40000130
34,900,364 UART:
34,900,607 UART: Running Caliptra FMC ...
34,901,706 UART:
34,901,862 UART: [state] CFI Enabled
35,001,144 UART: [art] Extend RT PCRs Done
35,002,361 UART: [art] Lock RT PCRs Done
35,003,527 UART: [art] Populate DV Done
35,009,000 UART: [fht] FMC Alias Private Key: 7
35,010,655 UART: [art] Derive CDI
35,011,469 UART: [art] Store in slot 0x4
35,070,440 UART: [art] Derive Key Pair
35,071,479 UART: [art] Store priv key in slot 0x5
37,534,160 UART: [art] Derive Key Pair - Done
37,547,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,259,858 UART: [art] Erasing AUTHORITY.KEYID = 7
39,261,364 UART: [art] PUB.X = 5D89ACFB723993B0C0C4F15D0F7C0FD01DE265E55888F6D513F5AD0602FD342AFF79D9950330145AC1097D877E95C1A3
39,268,672 UART: [art] PUB.Y = CB95F0C65129ECB7A158C9E269D2FFE22CAC2D732FD048AA4452429F42B5102407026F1DAB84D96DB704B0EAD72EF7FA
39,275,965 UART: [art] SIG.R = 2DC65692EA868A2B9AE9B7A5E5CDBE7CEEC9DA80A94DF672568E9B92E3B5890A8B2514BE7597898F063A879F972E20B6
39,283,356 UART: [art] SIG.S = C838DAF763C73620194EF1209AB57F238CF6964E34EF687C75EBC91E8E836134DE3749F60188910A91D7EE95BC4BF720
40,262,188 UART: Caliptra RT
40,262,936 UART: [state] CFI Enabled
43,145,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,146,048 UART: [rt] RT listening for mailbox commands...
43,177,500 UART: [rt]cmd =0x494e464f, len=4
43,181,819 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,463,099 ready_for_fw is high
3,463,684 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,626,047 >>> mbox cmd response: success
13,627,203 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,922,399 UART:
17,922,811 UART: Running Caliptra FMC ...
17,924,011 UART:
17,924,182 UART: [state] CFI Enabled
17,987,000 UART: [fht] FMC Alias Private Key: 7
19,753,268 UART: [art] Extend RT PCRs Done
19,754,487 UART: [art] Lock RT PCRs Done
19,756,494 UART: [art] Populate DV Done
19,761,906 UART: [fht] FMC Alias Private Key: 7
19,763,446 UART: [art] Derive CDI
19,764,260 UART: [art] Store in slot 0x4
19,820,050 UART: [art] Derive Key Pair
19,821,087 UART: [art] Store priv key in slot 0x5
22,283,215 UART: [art] Derive Key Pair - Done
22,296,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,008,596 UART: [art] Erasing AUTHORITY.KEYID = 7
24,010,105 UART: [art] PUB.X = 2F3EDC64BEEEFBE53761FDFFB51E622103576228EFB23D7E590EA0D9383B85478E3450ADF72CAD0E9E576C1E7C9CC855
24,017,430 UART: [art] PUB.Y = E7516B07495D4C7A07CB6E81EBAEF146E1640448F465E0625ACBDF02DE2848B13489B5137442517629E0552CC2935FBA
24,024,628 UART: [art] SIG.R = 2C4660DF958DCF5988B0CCC148B3DAB2E86863F39A5B2338EB4851226ED8120AF8EC5596E715C5458AC870679DF74D9C
24,032,027 UART: [art] SIG.S = C5BA5C799C9438A3F26441A52974DAF73B27CB13B8E02DDABEA23805CA1AA521B06DCE37833C0A39672C2206A47840D3
25,010,616 UART: mbox::rt_entry...
25,011,566 UART: ____ _ _ _ ____ _____
25,013,544 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,015,545 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,017,477 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,019,470 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,021,327 UART: |_|
25,022,131 UART:
25,153,235 UART: [rt] Runtime listening for mailbox commands...
25,160,438 >>> mbox cmd response data (4360 bytes)
25,181,112 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,225,488 >>> mbox cmd response data (0 bytes)
27,281,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,594,204 >>> mbox cmd response: success
34,630,437 UART:
34,630,768 UART: Running Caliptra FMC ...
34,631,893 UART:
34,632,060 UART: [state] CFI Enabled
34,737,966 UART: [art] Extend RT PCRs Done
34,739,155 UART: [art] Lock RT PCRs Done
34,740,499 UART: [art] Populate DV Done
34,746,018 UART: [fht] FMC Alias Private Key: 7
34,747,555 UART: [art] Derive CDI
34,748,338 UART: [art] Store in slot 0x4
34,806,556 UART: [art] Derive Key Pair
34,807,595 UART: [art] Store priv key in slot 0x5
37,270,286 UART: [art] Derive Key Pair - Done
37,283,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,996,419 UART: [art] Erasing AUTHORITY.KEYID = 7
38,997,923 UART: [art] PUB.X = 19A4ECB9690267BB63A88ABB8B795F9BED69C13DF9E2B3D63E6D7BBA2305400019F6378F5377EB590D4DBE97417C2D0D
39,005,175 UART: [art] PUB.Y = E9D277D29468E098B0F434E15935B37A7AFDC1856BA957BE5B57B782C4B9EA8A2DBC8B0724B031EA9BF540ADABB653BA
39,012,503 UART: [art] SIG.R = FB38D563C486C63A7F7DC6F81142FA8698DC972C7FA590E75A6E80C86EBE2F5E36991DBE7D468D5732233891C636B2AC
39,019,865 UART: [art] SIG.S = 66629265789EBD367780652078757F469732CF283C92036D2AADE8097E3F538C5BBC31CF0F6ABF71B96A0D487DDB2B29
39,998,234 UART: Caliptra RT
39,998,944 UART: [state] CFI Enabled
42,881,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,882,722 UART: [rt] RT listening for mailbox commands...
42,914,106 UART: [rt]cmd =0x494e464f, len=4
42,918,531 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,459 UART:
192,823 UART: Running Caliptra ROM ...
193,922 UART:
603,556 UART: [state] CFI Enabled
620,981 UART: [state] LifecycleState = Unprovisioned
622,854 UART: [state] DebugLocked = No
625,731 UART: [state] WD Timer not started. Device not locked for debugging
629,271 UART: [kat] SHA2-256
808,967 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,709 UART: [kat] ++
820,234 UART: [kat] sha1
829,829 UART: [kat] SHA2-256
832,479 UART: [kat] SHA2-384
838,045 UART: [kat] SHA2-512-ACC
840,419 UART: [kat] ECC-384
3,282,694 UART: [kat] HMAC-384Kdf
3,296,277 UART: [kat] LMS
3,772,799 UART: [kat] --
3,776,889 UART: [cold-reset] ++
3,778,988 UART: [fht] FHT @ 0x50003400
3,789,222 UART: [idev] ++
3,789,791 UART: [idev] CDI.KEYID = 6
3,790,746 UART: [idev] SUBJECT.KEYID = 7
3,791,994 UART: [idev] UDS.KEYID = 0
3,792,984 ready_for_fw is high
3,793,172 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,897,224 UART: [idev] Erasing UDS.KEYID = 0
6,271,699 UART: [idev] Sha1 KeyId Algorithm
6,294,678 UART: [idev] --
6,300,506 UART: [ldev] ++
6,301,078 UART: [ldev] CDI.KEYID = 6
6,301,972 UART: [ldev] SUBJECT.KEYID = 5
6,303,185 UART: [ldev] AUTHORITY.KEYID = 7
6,304,470 UART: [ldev] FE.KEYID = 1
6,316,714 UART: [ldev] Erasing FE.KEYID = 1
8,797,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,519 UART: [ldev] --
10,592,798 UART: [fwproc] Wait for Commands...
10,594,364 UART: [fwproc] Recv command 0x46574c44
10,596,350 UART: [fwproc] Recv'd Img size: 82832 bytes
13,637,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,713,119 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,786,107 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,989,758 >>> mbox cmd response: success
13,990,872 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,992,999 UART: [afmc] ++
13,993,641 UART: [afmc] CDI.KEYID = 6
13,994,524 UART: [afmc] SUBJECT.KEYID = 7
13,995,795 UART: [afmc] AUTHORITY.KEYID = 5
16,495,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,217,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,219,868 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,235,706 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,251,734 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,267,342 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,291,294 UART: [afmc] --
18,295,171 UART: [cold-reset] --
18,297,253 UART: [state] Locking Datavault
18,302,341 UART: [state] Locking PCR0, PCR1 and PCR31
18,304,093 UART: [state] Locking ICCM
18,306,872 UART: [exit] Launching FMC @ 0x40000130
18,315,321 UART:
18,315,558 UART: Running Caliptra FMC ...
18,316,660 UART:
18,316,819 UART: [state] CFI Enabled
18,324,978 UART: [fht] FMC Alias Private Key: 7
20,091,711 UART: [art] Extend RT PCRs Done
20,093,087 UART: [art] Lock RT PCRs Done
20,094,608 UART: [art] Populate DV Done
20,099,908 UART: [fht] FMC Alias Private Key: 7
20,101,450 UART: [art] Derive CDI
20,102,232 UART: [art] Store in slot 0x4
20,145,195 UART: [art] Derive Key Pair
20,146,195 UART: [art] Store priv key in slot 0x5
22,573,130 UART: [art] Derive Key Pair - Done
22,586,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,292,715 UART: [art] Erasing AUTHORITY.KEYID = 7
24,294,215 UART: [art] PUB.X = 1CFE3BC83730EECBF97345A79A2091D39C7F3E29422728B8B81E073000551D2EB2535BE09695BDDD71F0E2CAAA61FA8D
24,301,508 UART: [art] PUB.Y = 81AE9C1E8E960709B39722DEAA01A542A04F3C6D7DAB489156818326E817F9069B8E4AD7A47F7DD69B11055B5843BF14
24,308,739 UART: [art] SIG.R = 2A93390C1067735C5D253428030D44470412CB61A55CE41DF51CCC49230743A5CCDF9C85830FB0B6EF654811B2BCA31B
24,316,128 UART: [art] SIG.S = 4E9FF0DAA704A051ECBDA6A8C9082CAE44AD772FF59CF67F140EB182BCF0308BD59EDF55D4931F612EC4290F1B731B27
25,295,214 UART: mbox::rt_entry...
25,296,173 UART: ____ _ _ _ ____ _____
25,298,106 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,300,327 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,302,271 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,304,206 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,306,136 UART: |_|
25,306,973 UART:
25,437,428 UART: [rt] Runtime listening for mailbox commands...
25,444,631 >>> mbox cmd response data (4360 bytes)
25,465,401 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,509,792 >>> mbox cmd response data (0 bytes)
27,578,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,728,723 UART:
27,729,099 UART: Running Caliptra ROM ...
27,730,245 UART:
27,730,415 UART: [state] CFI Enabled
27,740,579 UART: [state] LifecycleState = Unprovisioned
27,742,468 UART: [state] DebugLocked = No
27,743,740 UART: [state] WD Timer not started. Device not locked for debugging
27,746,895 UART: [kat] SHA2-256
27,926,600 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,937,396 UART: [kat] ++
27,937,939 UART: [kat] sha1
27,950,075 UART: [kat] SHA2-256
27,952,756 UART: [kat] SHA2-384
27,958,536 UART: [kat] SHA2-512-ACC
27,960,900 UART: [kat] ECC-384
30,399,924 UART: [kat] HMAC-384Kdf
30,411,542 UART: [kat] LMS
30,888,022 UART: [kat] --
30,893,329 UART: [update-reset] ++
34,388,088 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,392,392 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,790,028 >>> mbox cmd response: success
34,794,866 UART: [update-reset] Copying MAN_2 To MAN_1
34,828,144 UART: [update-reset Success] --
34,832,427 UART: [state] Locking Datavault
34,835,909 UART: [state] Locking PCR0, PCR1 and PCR31
34,837,678 UART: [state] Locking ICCM
34,840,397 UART: [exit] Launching FMC @ 0x40000130
34,848,746 UART:
34,848,983 UART: Running Caliptra FMC ...
34,850,087 UART:
34,850,246 UART: [state] CFI Enabled
34,894,929 UART: [art] Extend RT PCRs Done
34,896,091 UART: [art] Lock RT PCRs Done
34,897,598 UART: [art] Populate DV Done
34,902,947 UART: [fht] FMC Alias Private Key: 7
34,904,483 UART: [art] Derive CDI
34,905,309 UART: [art] Store in slot 0x4
34,948,122 UART: [art] Derive Key Pair
34,949,128 UART: [art] Store priv key in slot 0x5
37,375,571 UART: [art] Derive Key Pair - Done
37,388,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,094,593 UART: [art] Erasing AUTHORITY.KEYID = 7
39,096,120 UART: [art] PUB.X = FB9B52B35E91CBEF47D51ED096BC815B4F40F3DA8E7FB2773C0D9ACB2E3082596B6153E307DBBC286868BF41ADCF9EFB
39,103,396 UART: [art] PUB.Y = 87C637547CD18BAB8D2993D4AFA247E1AAEE3C92036137ED054CD8811749E717AADCC9EEC14519205D71E03F620B1109
39,110,696 UART: [art] SIG.R = A03D68F03E6AE2AC76D7866292354C8FED96897805B494A81A4C918D4EA7B9DC7DFB674B79B774AC18C0194336E938CA
39,118,055 UART: [art] SIG.S = D674EB9F458E78703E707C179D6CE0804D42E3E6635191303A601B904DF6C14FB6F734EA95AA1971F3ACA5EC410EED64
40,096,802 UART: Caliptra RT
40,097,510 UART: [state] CFI Enabled
42,884,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,886,149 UART: [rt] RT listening for mailbox commands...
42,917,418 UART: [rt]cmd =0x494e464f, len=4
42,921,639 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
3,782,885 ready_for_fw is high
3,783,270 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,871,528 >>> mbox cmd response: success
13,873,047 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,119,367 UART:
18,119,754 UART: Running Caliptra FMC ...
18,120,891 UART:
18,121,057 UART: [state] CFI Enabled
18,129,286 UART: [fht] FMC Alias Private Key: 7
19,895,549 UART: [art] Extend RT PCRs Done
19,896,770 UART: [art] Lock RT PCRs Done
19,898,477 UART: [art] Populate DV Done
19,903,731 UART: [fht] FMC Alias Private Key: 7
19,905,442 UART: [art] Derive CDI
19,906,261 UART: [art] Store in slot 0x4
19,948,591 UART: [art] Derive Key Pair
19,949,597 UART: [art] Store priv key in slot 0x5
22,376,088 UART: [art] Derive Key Pair - Done
22,388,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,095,367 UART: [art] Erasing AUTHORITY.KEYID = 7
24,097,284 UART: [art] PUB.X = C43F4538CBDA5884437AB65217ED2161399AC88A549421C2E79DE2CD27B471CCCE8814E453180C5613E362F47D6D84F5
24,104,123 UART: [art] PUB.Y = 58136A3D7A1620292DFF4190258354CDECAAC2CB2EAF61B9141BAEA796745EBDC758156E373ACB253D5B535A74BE0DBB
24,111,429 UART: [art] SIG.R = 3855203BC23BDF8980F5C558E2CC7FDCB106B1174B89E5A4C01178589BFA852069BFD4E2DBF0EE1050ADEA00EBA61949
24,118,799 UART: [art] SIG.S = 4B8E05EFCB982B10DEF393AE7A45B0A8784DF709486B1F89FCB3AA8C43AA6C91C7F057959C2DF8515919E1CE8EA9D3EA
25,097,339 UART: mbox::rt_entry...
25,098,305 UART: ____ _ _ _ ____ _____
25,100,298 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,102,312 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,104,248 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,106,261 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,108,196 UART: |_|
25,109,038 UART:
25,239,569 UART: [rt] Runtime listening for mailbox commands...
25,246,812 >>> mbox cmd response data (4360 bytes)
25,267,478 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,311,846 >>> mbox cmd response data (0 bytes)
27,365,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,583,674 >>> mbox cmd response: success
34,618,442 UART:
34,618,792 UART: Running Caliptra FMC ...
34,619,916 UART:
34,620,098 UART: [state] CFI Enabled
34,664,457 UART: [art] Extend RT PCRs Done
34,665,613 UART: [art] Lock RT PCRs Done
34,666,850 UART: [art] Populate DV Done
34,672,394 UART: [fht] FMC Alias Private Key: 7
34,673,927 UART: [art] Derive CDI
34,674,711 UART: [art] Store in slot 0x4
34,717,583 UART: [art] Derive Key Pair
34,718,589 UART: [art] Store priv key in slot 0x5
37,146,002 UART: [art] Derive Key Pair - Done
37,158,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,865,517 UART: [art] Erasing AUTHORITY.KEYID = 7
38,867,024 UART: [art] PUB.X = 4DD790518A3CC8D80AF92B932D92A737E2F44FE1515EB3EFC7ECB1C202DDE09E7C9AECC0DE80B39B21ED4684848426CB
38,874,343 UART: [art] PUB.Y = B347AB0A066C769617DA59F61B02E20A6345F3AE15A77F326417D7C615DA6037BED791B291D00C42C606CF94A96286C0
38,881,533 UART: [art] SIG.R = 20046DDBD8AA3402A22E07C7272CE0BF8279EE655F76F9AB440A2A0A37CE2D8953C54043825CE3D6E52452F4F9B573EE
38,888,927 UART: [art] SIG.S = 0F5160CA7C816545B4A7C6B79FFCE06E1746A49A81AD105CBBA745CB7D9DF38BC310551F94C931C5F27B676A721572F4
39,868,317 UART: Caliptra RT
39,869,020 UART: [state] CFI Enabled
42,663,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,664,879 UART: [rt] RT listening for mailbox commands...
42,696,351 UART: [rt]cmd =0x494e464f, len=4
42,700,626 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,054 UART:
192,423 UART: Running Caliptra ROM ...
193,510 UART:
193,647 UART: [state] CFI Enabled
265,115 UART: [state] LifecycleState = Unprovisioned
267,534 UART: [state] DebugLocked = No
269,993 UART: [state] WD Timer not started. Device not locked for debugging
275,241 UART: [kat] SHA2-256
465,115 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,924 UART: [kat] ++
476,458 UART: [kat] sha1
488,020 UART: [kat] SHA2-256
491,084 UART: [kat] SHA2-384
496,728 UART: [kat] SHA2-512-ACC
499,318 UART: [kat] ECC-384
2,947,887 UART: [kat] HMAC-384Kdf
2,971,295 UART: [kat] LMS
3,503,104 UART: [kat] --
3,507,799 UART: [cold-reset] ++
3,509,156 UART: [fht] FHT @ 0x50003400
3,519,223 UART: [idev] ++
3,519,827 UART: [idev] CDI.KEYID = 6
3,520,762 UART: [idev] SUBJECT.KEYID = 7
3,521,936 UART: [idev] UDS.KEYID = 0
3,523,125 ready_for_fw is high
3,523,329 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,627,946 UART: [idev] Erasing UDS.KEYID = 0
6,029,503 UART: [idev] Sha1 KeyId Algorithm
6,052,241 UART: [idev] --
6,056,014 UART: [ldev] ++
6,056,693 UART: [ldev] CDI.KEYID = 6
6,057,578 UART: [ldev] SUBJECT.KEYID = 5
6,058,790 UART: [ldev] AUTHORITY.KEYID = 7
6,059,972 UART: [ldev] FE.KEYID = 1
6,101,340 UART: [ldev] Erasing FE.KEYID = 1
8,602,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,423 UART: [ldev] --
10,395,220 UART: [fwproc] Wait for Commands...
10,398,127 UART: [fwproc] Recv command 0x46574c44
10,400,496 UART: [fwproc] Recv'd Img size: 82832 bytes
13,454,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,537,310 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,660,906 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,006,660 >>> mbox cmd response: success
14,007,679 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,011,545 UART: [afmc] ++
14,012,247 UART: [afmc] CDI.KEYID = 6
14,013,411 UART: [afmc] SUBJECT.KEYID = 7
14,014,948 UART: [afmc] AUTHORITY.KEYID = 5
16,554,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,275,827 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,277,739 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,292,804 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,307,961 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,322,886 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,346,966 UART: [afmc] --
18,350,999 UART: [cold-reset] --
18,355,830 UART: [state] Locking Datavault
18,361,346 UART: [state] Locking PCR0, PCR1 and PCR31
18,363,541 UART: [state] Locking ICCM
18,365,364 UART: [exit] Launching FMC @ 0x40000130
18,374,033 UART:
18,374,268 UART: Running Caliptra FMC ...
18,375,366 UART:
18,375,523 UART: [state] CFI Enabled
18,433,535 UART: [fht] FMC Alias Private Key: 7
20,200,381 UART: [art] Extend RT PCRs Done
20,201,580 UART: [art] Lock RT PCRs Done
20,202,979 UART: [art] Populate DV Done
20,208,496 UART: [fht] FMC Alias Private Key: 7
20,210,040 UART: [art] Derive CDI
20,210,874 UART: [art] Store in slot 0x4
20,266,342 UART: [art] Derive Key Pair
20,267,401 UART: [art] Store priv key in slot 0x5
22,730,196 UART: [art] Derive Key Pair - Done
22,743,029 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,456,257 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,761 UART: [art] PUB.X = 55EC9CEBB1B4F911D9011A86CCC671E911C74E667A54CEE0D4D36B53A6103C57D76E5E7598272C6DF53C5099C397195C
24,465,034 UART: [art] PUB.Y = 4AB98655AFF45DA6E98DE204FAC1F31A8FA2217862FC4D06E88D533EBBEE35FD6657A4DC85257A1961C86F888C28C6ED
24,472,340 UART: [art] SIG.R = 00EFC0553CEC16A2EEE0B4FC96D3FE6DA684F7FFA7EDE88226136F09B96507B2DD8997E0F367B3A9697476CF4B8BC101
24,479,739 UART: [art] SIG.S = BE4733C027E25513F465AEAE6EFBB88AC501A1984A83E9A87FCD24197DE7AD0B72BA70CD06AF4EBFD960B9A7128E5516
25,457,542 UART: mbox::rt_entry...
25,458,497 UART: ____ _ _ _ ____ _____
25,460,483 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,462,485 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,464,415 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,466,344 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,468,290 UART: |_|
25,469,122 UART:
25,600,356 UART: [rt] Runtime listening for mailbox commands...
25,607,568 >>> mbox cmd response data (4360 bytes)
25,628,113 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,672,467 >>> mbox cmd response data (0 bytes)
27,737,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,887,201 UART:
27,887,576 UART: Running Caliptra ROM ...
27,888,712 UART:
27,888,897 UART: [state] CFI Enabled
27,954,326 UART: [state] LifecycleState = Unprovisioned
27,956,421 UART: [state] DebugLocked = No
27,958,619 UART: [state] WD Timer not started. Device not locked for debugging
27,962,416 UART: [kat] SHA2-256
28,152,245 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,163,032 UART: [kat] ++
28,163,530 UART: [kat] sha1
28,175,227 UART: [kat] SHA2-256
28,178,242 UART: [kat] SHA2-384
28,184,561 UART: [kat] SHA2-512-ACC
28,187,180 UART: [kat] ECC-384
30,638,345 UART: [kat] HMAC-384Kdf
30,660,298 UART: [kat] LMS
31,191,865 UART: [kat] --
31,196,891 UART: [update-reset] ++
34,704,384 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,706,996 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,336,746 >>> mbox cmd response: success
35,341,337 UART: [update-reset] Copying MAN_2 To MAN_1
35,376,099 UART: [update-reset Success] --
35,380,605 UART: [state] Locking Datavault
35,383,174 UART: [state] Locking PCR0, PCR1 and PCR31
35,385,325 UART: [state] Locking ICCM
35,388,183 UART: [exit] Launching FMC @ 0x40000130
35,396,806 UART:
35,397,043 UART: Running Caliptra FMC ...
35,398,146 UART:
35,398,326 UART: [state] CFI Enabled
35,493,558 UART: [art] Extend RT PCRs Done
35,494,752 UART: [art] Lock RT PCRs Done
35,496,370 UART: [art] Populate DV Done
35,502,041 UART: [fht] FMC Alias Private Key: 7
35,503,630 UART: [art] Derive CDI
35,504,439 UART: [art] Store in slot 0x4
35,562,369 UART: [art] Derive Key Pair
35,563,414 UART: [art] Store priv key in slot 0x5
38,026,485 UART: [art] Derive Key Pair - Done
38,039,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,752,020 UART: [art] Erasing AUTHORITY.KEYID = 7
39,753,534 UART: [art] PUB.X = D05165960083757C34C57F19A451202A24F18F4F4F40C60A26EEAB2D20319807705C0183DC47B597205AFD27A8F7B8E0
39,760,779 UART: [art] PUB.Y = 2825838D0B4197A0ABBF66A3434B942C7BF5819D32BD54DDDDDAD9CD6C5F5160E3112D0DD97C8A704B33B30EEC4C2ED7
39,768,060 UART: [art] SIG.R = 3079C996B7E340560DB52196A459F8E3442CBB6845D841B8F948967027AD643EADAA49FFFA53A2FAA5117402F2769946
39,775,447 UART: [art] SIG.S = 081A070FCF70BDFE1C838339D48FCAC641BA65B54A1B2446C57DF24F5A4B4555F4AA80995D48A8AA6C0EDBFD07DE0C3C
40,754,903 UART: Caliptra RT
40,755,607 UART: [state] CFI Enabled
43,635,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,637,412 UART: [rt] RT listening for mailbox commands...
43,668,799 UART: [rt]cmd =0x494e464f, len=4
43,673,115 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,437,935 ready_for_fw is high
3,438,515 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,083,909 >>> mbox cmd response: success
14,085,044 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,378,003 UART:
18,378,396 UART: Running Caliptra FMC ...
18,379,534 UART:
18,379,688 UART: [state] CFI Enabled
18,446,226 UART: [fht] FMC Alias Private Key: 7
20,212,503 UART: [art] Extend RT PCRs Done
20,213,734 UART: [art] Lock RT PCRs Done
20,215,063 UART: [art] Populate DV Done
20,220,757 UART: [fht] FMC Alias Private Key: 7
20,222,399 UART: [art] Derive CDI
20,223,156 UART: [art] Store in slot 0x4
20,278,753 UART: [art] Derive Key Pair
20,279,789 UART: [art] Store priv key in slot 0x5
22,742,442 UART: [art] Derive Key Pair - Done
22,755,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,469,128 UART: [art] Erasing AUTHORITY.KEYID = 7
24,470,637 UART: [art] PUB.X = 9EF13346F7CCBAD803B6B50DB16055B3AC7EDC20618296EFC983A84D87A19592C36F34D2946B918BB19D194FBD6220FE
24,477,895 UART: [art] PUB.Y = CA7B0E0558D9AA855BDDAC76539114CE61361DB49AAAFAAF28BAA2EF81887E773B9D783C48F696DC3FAEA25D968432AE
24,485,141 UART: [art] SIG.R = 83B5B63743BA64F01B5A77D5753FB3A3E0B98E01479F89BCF3043BE564CE68CDF163EC9ADB939058CC16EE57A7C6029E
24,492,537 UART: [art] SIG.S = D426389BE29F2B049FDD4B6EAA876657483544B67806B9B6049DF3010172D7BE9F7F6D60B7BDA60E42ECB06523B05BB2
25,471,346 UART: mbox::rt_entry...
25,472,303 UART: ____ _ _ _ ____ _____
25,474,286 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,476,290 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,478,219 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,480,204 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,482,155 UART: |_|
25,482,965 UART:
25,613,726 UART: [rt] Runtime listening for mailbox commands...
25,620,924 >>> mbox cmd response data (4360 bytes)
25,641,631 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,686,002 >>> mbox cmd response data (0 bytes)
27,750,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,651,732 >>> mbox cmd response: success
35,686,704 UART:
35,687,011 UART: Running Caliptra FMC ...
35,688,139 UART:
35,688,310 UART: [state] CFI Enabled
35,782,639 UART: [art] Extend RT PCRs Done
35,783,840 UART: [art] Lock RT PCRs Done
35,785,196 UART: [art] Populate DV Done
35,790,941 UART: [fht] FMC Alias Private Key: 7
35,792,540 UART: [art] Derive CDI
35,793,357 UART: [art] Store in slot 0x4
35,851,419 UART: [art] Derive Key Pair
35,852,414 UART: [art] Store priv key in slot 0x5
38,314,841 UART: [art] Derive Key Pair - Done
38,327,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,040,634 UART: [art] Erasing AUTHORITY.KEYID = 7
40,042,146 UART: [art] PUB.X = 03A8063A710ED28CE5F94FA25AC8270E2C8948B7D066C239B4965ABDF6C1778D8AB758A091F5BB1ED7535BEC40AAD85F
40,049,444 UART: [art] PUB.Y = 7D0B33C26189156EEFCD18A7B28946CE820E304992D2368DAA679CB18A125B517A72EB3EAB6E35B3C24A5E860997C2F3
40,056,712 UART: [art] SIG.R = 72D8F8A5CD3EB99BB94536BD51996BC92109B13D04269EA63FF0B5F96AAD52B4EE15B4D4F166E8DAF3AD4FD563CA8CE9
40,064,083 UART: [art] SIG.S = 76D4AB4E507B6C360DE147B6A78E21BDF72B689DC9A3C1ED205F844C2A11BCE7482E3C3BF42DB889D46BE2EEE91E4BF8
41,043,536 UART: Caliptra RT
41,044,270 UART: [state] CFI Enabled
43,923,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,924,944 UART: [rt] RT listening for mailbox commands...
43,956,493 UART: [rt]cmd =0x494e464f, len=4
43,960,788 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,394 UART:
192,758 UART: Running Caliptra ROM ...
193,946 UART:
603,629 UART: [state] CFI Enabled
618,295 UART: [state] LifecycleState = Unprovisioned
620,354 UART: [state] DebugLocked = No
621,826 UART: [state] WD Timer not started. Device not locked for debugging
626,940 UART: [kat] SHA2-256
816,790 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,598 UART: [kat] ++
828,122 UART: [kat] sha1
838,944 UART: [kat] SHA2-256
841,961 UART: [kat] SHA2-384
846,396 UART: [kat] SHA2-512-ACC
848,982 UART: [kat] ECC-384
3,292,649 UART: [kat] HMAC-384Kdf
3,305,868 UART: [kat] LMS
3,837,639 UART: [kat] --
3,840,901 UART: [cold-reset] ++
3,841,850 UART: [fht] FHT @ 0x50003400
3,853,544 UART: [idev] ++
3,854,257 UART: [idev] CDI.KEYID = 6
3,855,293 UART: [idev] SUBJECT.KEYID = 7
3,856,403 UART: [idev] UDS.KEYID = 0
3,857,491 ready_for_fw is high
3,857,721 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,961,887 UART: [idev] Erasing UDS.KEYID = 0
6,332,295 UART: [idev] Sha1 KeyId Algorithm
6,354,654 UART: [idev] --
6,360,433 UART: [ldev] ++
6,361,115 UART: [ldev] CDI.KEYID = 6
6,362,000 UART: [ldev] SUBJECT.KEYID = 5
6,363,221 UART: [ldev] AUTHORITY.KEYID = 7
6,364,399 UART: [ldev] FE.KEYID = 1
6,373,619 UART: [ldev] Erasing FE.KEYID = 1
8,848,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,225 UART: [ldev] --
10,641,092 UART: [fwproc] Wait for Commands...
10,643,027 UART: [fwproc] Recv command 0x46574c44
10,645,302 UART: [fwproc] Recv'd Img size: 82832 bytes
13,706,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,783,334 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,906,952 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,253,731 >>> mbox cmd response: success
14,254,791 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,256,930 UART: [afmc] ++
14,257,628 UART: [afmc] CDI.KEYID = 6
14,258,794 UART: [afmc] SUBJECT.KEYID = 7
14,260,286 UART: [afmc] AUTHORITY.KEYID = 5
16,762,144 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,484,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,486,252 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,501,356 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,516,543 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,531,398 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,556,245 UART: [afmc] --
18,559,363 UART: [cold-reset] --
18,562,364 UART: [state] Locking Datavault
18,567,568 UART: [state] Locking PCR0, PCR1 and PCR31
18,569,715 UART: [state] Locking ICCM
18,571,795 UART: [exit] Launching FMC @ 0x40000130
18,580,478 UART:
18,580,724 UART: Running Caliptra FMC ...
18,581,783 UART:
18,581,935 UART: [state] CFI Enabled
18,590,446 UART: [fht] FMC Alias Private Key: 7
20,357,601 UART: [art] Extend RT PCRs Done
20,358,828 UART: [art] Lock RT PCRs Done
20,360,424 UART: [art] Populate DV Done
20,365,787 UART: [fht] FMC Alias Private Key: 7
20,367,322 UART: [art] Derive CDI
20,368,080 UART: [art] Store in slot 0x4
20,410,898 UART: [art] Derive Key Pair
20,411,939 UART: [art] Store priv key in slot 0x5
22,839,306 UART: [art] Derive Key Pair - Done
22,852,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,558,643 UART: [art] Erasing AUTHORITY.KEYID = 7
24,560,145 UART: [art] PUB.X = 385E6FF32123016260FED5886172FD6EC10FD308DA7EB39D6CBE3F6CD310679E7806B38CAE6D6FE30A5241D54875D1DB
24,567,417 UART: [art] PUB.Y = 19C47FAAA458B08F30468D0C4D75B1183457E151734BCB55918BC112499CACE4301EC543667414288B03D2B2E7B5977C
24,574,667 UART: [art] SIG.R = 0F9C1287B93715B25D845937E139D704CBED2FFEBC87FF23FB0BDCCC715D22E4E4E194D34C7BB2E8C53C55CB838AB7E3
24,582,017 UART: [art] SIG.S = ED68649983742D49A173CDA7FF56C5AB2AA1A00778AA1EA3ECA831BAF3149D1E5141BE698BB2AFDF88E092EC2E6F9D21
25,560,621 UART: mbox::rt_entry...
25,561,573 UART: ____ _ _ _ ____ _____
25,563,513 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,565,523 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,567,457 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,569,390 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,571,340 UART: |_|
25,572,175 UART:
25,702,490 UART: [rt] Runtime listening for mailbox commands...
25,709,705 >>> mbox cmd response data (4360 bytes)
25,730,277 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,774,856 >>> mbox cmd response data (0 bytes)
27,845,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,995,746 UART:
27,996,120 UART: Running Caliptra ROM ...
27,997,266 UART:
27,997,470 UART: [state] CFI Enabled
28,010,666 UART: [state] LifecycleState = Unprovisioned
28,012,562 UART: [state] DebugLocked = No
28,014,759 UART: [state] WD Timer not started. Device not locked for debugging
28,018,809 UART: [kat] SHA2-256
28,208,685 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,219,422 UART: [kat] ++
28,219,939 UART: [kat] sha1
28,231,104 UART: [kat] SHA2-256
28,234,136 UART: [kat] SHA2-384
28,239,643 UART: [kat] SHA2-512-ACC
28,242,213 UART: [kat] ECC-384
30,683,191 UART: [kat] HMAC-384Kdf
30,696,395 UART: [kat] LMS
31,228,028 UART: [kat] --
31,231,371 UART: [update-reset] ++
34,732,067 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,736,218 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,365,948 >>> mbox cmd response: success
35,370,567 UART: [update-reset] Copying MAN_2 To MAN_1
35,404,105 UART: [update-reset Success] --
35,409,027 UART: [state] Locking Datavault
35,413,338 UART: [state] Locking PCR0, PCR1 and PCR31
35,415,550 UART: [state] Locking ICCM
35,417,937 UART: [exit] Launching FMC @ 0x40000130
35,426,584 UART:
35,426,824 UART: Running Caliptra FMC ...
35,427,930 UART:
35,428,112 UART: [state] CFI Enabled
35,472,086 UART: [art] Extend RT PCRs Done
35,473,237 UART: [art] Lock RT PCRs Done
35,474,744 UART: [art] Populate DV Done
35,480,151 UART: [fht] FMC Alias Private Key: 7
35,481,858 UART: [art] Derive CDI
35,482,674 UART: [art] Store in slot 0x4
35,524,822 UART: [art] Derive Key Pair
35,525,878 UART: [art] Store priv key in slot 0x5
37,952,736 UART: [art] Derive Key Pair - Done
37,965,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,672,163 UART: [art] Erasing AUTHORITY.KEYID = 7
39,673,674 UART: [art] PUB.X = 52141F39A49A410BE7D3020757766CF8A4B15E030B50F0340B85711575B9A6C146E3E0FD49264E6681DFA7B0CB55D31C
39,680,953 UART: [art] PUB.Y = 66D87228ADB241EE163AA39D0327246878453C0A95BD0CBF3474A831028E7C68C76BFC289C7E667C32AC71F4A34BFA95
39,688,216 UART: [art] SIG.R = 5E42E1D2B7D0161322B20FCC3BBAE9F3D1EF3E2304B15619694BB0765FC747E95CFC8521D4A48683956DAF09D003EA84
39,695,588 UART: [art] SIG.S = 0ABC4CAA77FF59C2961556993DD6988DE5EC86DB7CE232C2291F4EEB04AEC8D36CCF0F8E05F14E757C6B224076DD991B
40,674,694 UART: Caliptra RT
40,675,411 UART: [state] CFI Enabled
43,469,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,470,858 UART: [rt] RT listening for mailbox commands...
43,502,357 UART: [rt]cmd =0x494e464f, len=4
43,506,769 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,763,216 ready_for_fw is high
3,763,631 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,289,321 >>> mbox cmd response: success
14,290,653 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,543,699 UART:
18,544,110 UART: Running Caliptra FMC ...
18,545,267 UART:
18,545,431 UART: [state] CFI Enabled
18,553,503 UART: [fht] FMC Alias Private Key: 7
20,319,438 UART: [art] Extend RT PCRs Done
20,320,682 UART: [art] Lock RT PCRs Done
20,322,287 UART: [art] Populate DV Done
20,328,043 UART: [fht] FMC Alias Private Key: 7
20,329,649 UART: [art] Derive CDI
20,330,394 UART: [art] Store in slot 0x4
20,372,886 UART: [art] Derive Key Pair
20,373,891 UART: [art] Store priv key in slot 0x5
22,800,479 UART: [art] Derive Key Pair - Done
22,813,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,519,311 UART: [art] Erasing AUTHORITY.KEYID = 7
24,520,871 UART: [art] PUB.X = 4B69C5073B0B4D3A968BD7BE539D6C9EC906B1787062F461A75338FBBCAFFB29E5564F41A760D899E5B6BE287FED2957
24,528,099 UART: [art] PUB.Y = 0DDFB2B25F8781AC2C8D59ACF8C85EAA977DF89AFE36E731AFE3456717E3ED401EA012109E208903B40E21AC4DED994E
24,535,365 UART: [art] SIG.R = CF26A698FCEEC782BB58181E68E8371ACB9D938C726236F95119E81F05C2648C3B2073D15EFE3C974D22CC435693E91A
24,542,714 UART: [art] SIG.S = 913045BBCDFF1C3DFD0D3C60510B531DDDBAB12492197A91EB605A8AEECF1C2EE53F6CAD9858CA7BE265AD90F75F1393
25,521,438 UART: mbox::rt_entry...
25,522,402 UART: ____ _ _ _ ____ _____
25,524,392 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,526,411 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,528,351 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,530,360 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,532,225 UART: |_|
25,533,113 UART:
25,664,617 UART: [rt] Runtime listening for mailbox commands...
25,671,822 >>> mbox cmd response data (4360 bytes)
25,692,415 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,736,780 >>> mbox cmd response data (0 bytes)
27,801,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,628,552 >>> mbox cmd response: success
35,664,248 UART:
35,664,560 UART: Running Caliptra FMC ...
35,665,612 UART:
35,665,766 UART: [state] CFI Enabled
35,709,867 UART: [art] Extend RT PCRs Done
35,711,064 UART: [art] Lock RT PCRs Done
35,712,833 UART: [art] Populate DV Done
35,718,517 UART: [fht] FMC Alias Private Key: 7
35,720,060 UART: [art] Derive CDI
35,720,797 UART: [art] Store in slot 0x4
35,763,517 UART: [art] Derive Key Pair
35,764,588 UART: [art] Store priv key in slot 0x5
38,191,835 UART: [art] Derive Key Pair - Done
38,204,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,910,806 UART: [art] Erasing AUTHORITY.KEYID = 7
39,912,322 UART: [art] PUB.X = F7DF0D0C90D00BE5FDC3FC2D2200869C9CFA69746ADC10E9912F213AED85B3990591A4FC5505FAD6D7CBD5E5AA0C9CBC
39,919,617 UART: [art] PUB.Y = DF27CDC65A970B461BF4E311C6CA4382173343183E34C0EB08B3FA40FECB810669F148109383AB8A2479A7E7ADD6BDA9
39,926,850 UART: [art] SIG.R = 6B4A3399853BD934CB81CF118C3CE7C1575264853282F75EB31E3A1E76A83BE6BC3CC1831BF6FB5EADF15A118D07D03F
39,934,297 UART: [art] SIG.S = CD8645FE6C5D2F7519D2B88C122B900409C1EE35B34EF4A4A6B5F3E123FA4484F1239D5EB991AAAAA858C6B0D3357205
40,913,397 UART: Caliptra RT
40,914,094 UART: [state] CFI Enabled
43,702,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,704,196 UART: [rt] RT listening for mailbox commands...
43,735,601 UART: [rt]cmd =0x494e464f, len=4
43,740,006 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,647 UART: [kat] SHA2-256
881,578 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,693 UART: [kat] ++
885,845 UART: [kat] sha1
890,199 UART: [kat] SHA2-256
892,137 UART: [kat] SHA2-384
894,744 UART: [kat] SHA2-512-ACC
896,645 UART: [kat] ECC-384
902,106 UART: [kat] HMAC-384Kdf
906,764 UART: [kat] LMS
1,474,960 UART: [kat] --
1,475,823 UART: [cold-reset] ++
1,476,269 UART: [fht] Storing FHT @ 0x50003400
1,479,102 UART: [idev] ++
1,479,270 UART: [idev] CDI.KEYID = 6
1,479,630 UART: [idev] SUBJECT.KEYID = 7
1,480,054 UART: [idev] UDS.KEYID = 0
1,480,399 ready_for_fw is high
1,480,399 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,130 UART: [idev] Erasing UDS.KEYID = 0
1,504,450 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,042 UART: [idev] --
1,514,289 UART: [ldev] ++
1,514,457 UART: [ldev] CDI.KEYID = 6
1,514,820 UART: [ldev] SUBJECT.KEYID = 5
1,515,246 UART: [ldev] AUTHORITY.KEYID = 7
1,515,709 UART: [ldev] FE.KEYID = 1
1,520,951 UART: [ldev] Erasing FE.KEYID = 1
1,546,960 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,040 UART: [ldev] --
1,586,431 UART: [fwproc] Waiting for Commands...
1,587,202 UART: [fwproc] Received command 0x46574c44
1,587,993 UART: [fwproc] Received Image of size 82832 bytes
2,522,224 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,549,708 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,580,926 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,667,779 >>> mbox cmd response: success
2,667,779 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,668,861 UART: [afmc] ++
2,669,029 UART: [afmc] CDI.KEYID = 6
2,669,391 UART: [afmc] SUBJECT.KEYID = 7
2,669,816 UART: [afmc] AUTHORITY.KEYID = 5
2,705,197 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,721,825 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,722,605 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,728,314 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,197 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,739,880 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,747,540 UART: [afmc] --
2,748,538 UART: [cold-reset] --
2,749,528 UART: [state] Locking Datavault
2,750,929 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,533 UART: [state] Locking ICCM
2,752,013 UART: [exit] Launching FMC @ 0x40000130
2,757,343 UART:
2,757,359 UART: Running Caliptra FMC ...
2,757,767 UART:
2,757,821 UART: [state] CFI Enabled
2,768,121 UART: [fht] FMC Alias Private Key: 7
2,887,153 UART: [art] Extend RT PCRs Done
2,887,581 UART: [art] Lock RT PCRs Done
2,889,157 UART: [art] Populate DV Done
2,897,560 UART: [fht] FMC Alias Private Key: 7
2,898,488 UART: [art] Derive CDI
2,898,768 UART: [art] Store in slot 0x4
2,984,434 UART: [art] Derive Key Pair
2,984,794 UART: [art] Store priv key in slot 0x5
2,997,893 UART: [art] Derive Key Pair - Done
3,012,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,169 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,934 UART: [art] PUB.X = F963A8F0050A21AE9218D237BF996DDF1034152025ED0B395AC2FBC2C37236E1A6D4481932ED0557ABB07816E0FBBCEB
3,035,702 UART: [art] PUB.Y = 9E00D62798FEAB38C6B67ECF90BB9C3EA2CD9F9D8B43416C92C4A5BC1A897C5CE8ED26A1669F11784FA62622E7408909
3,042,639 UART: [art] SIG.R = 7946A2B93A38360AE5015A0157DF7E8228489A3647CB889825CDABA8B5854FBE4FAFF7570E19E43CEF61AE14C6807B37
3,049,403 UART: [art] SIG.S = 4F2BA45E6ADF0FC73AA20C7B742F2E52A431209638A596D947D10765F2461BD2CA4FFA66B38EC861D41119B73B4F1617
3,072,958 UART: mbox::rt_entry...
3,073,330 UART: ____ _ _ _ ____ _____
3,074,114 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,074,914 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,075,682 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,076,450 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,077,218 UART: |_|
3,077,530 UART:
3,196,324 UART: [rt] Runtime listening for mailbox commands...
3,202,658 >>> mbox cmd response data (4360 bytes)
3,202,659 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,233,441 >>> mbox cmd response data (0 bytes)
3,233,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,233,563 UART:
3,233,579 UART: Running Caliptra ROM ...
3,233,987 UART:
3,234,041 UART: [state] CFI Enabled
3,236,403 UART: [state] LifecycleState = Unprovisioned
3,237,058 UART: [state] DebugLocked = No
3,237,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,239,235 UART: [kat] SHA2-256
4,033,166 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,037,281 UART: [kat] ++
4,037,433 UART: [kat] sha1
4,041,723 UART: [kat] SHA2-256
4,043,661 UART: [kat] SHA2-384
4,046,466 UART: [kat] SHA2-512-ACC
4,048,366 UART: [kat] ECC-384
4,053,969 UART: [kat] HMAC-384Kdf
4,058,773 UART: [kat] LMS
4,626,969 UART: [kat] --
4,627,820 UART: [update-reset] ++
6,009,854 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,011,112 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,166,379 >>> mbox cmd response: success
6,166,608 UART: [update-reset] Copying MAN_2 To MAN_1
6,174,622 UART: [update-reset Success] --
6,175,771 UART: [state] Locking Datavault
6,176,531 UART: [state] Locking PCR0, PCR1 and PCR31
6,177,135 UART: [state] Locking ICCM
6,177,683 UART: [exit] Launching FMC @ 0x40000130
6,183,013 UART:
6,183,029 UART: Running Caliptra FMC ...
6,183,437 UART:
6,183,491 UART: [state] CFI Enabled
6,272,820 UART: [art] Extend RT PCRs Done
6,273,248 UART: [art] Lock RT PCRs Done
6,274,425 UART: [art] Populate DV Done
6,282,810 UART: [fht] FMC Alias Private Key: 7
6,283,758 UART: [art] Derive CDI
6,284,038 UART: [art] Store in slot 0x4
6,369,792 UART: [art] Derive Key Pair
6,370,152 UART: [art] Store priv key in slot 0x5
6,383,161 UART: [art] Derive Key Pair - Done
6,398,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,413,828 UART: [art] Erasing AUTHORITY.KEYID = 7
6,414,593 UART: [art] PUB.X = 2728FC2F8E758C8CCAD1754A19C5E17B3791C5666A5B425DBD3F9B20EDFF18FE7088F090637265C433DF60FB803F9642
6,421,369 UART: [art] PUB.Y = 67048F668ECF1900F0ED8BC3307F4265B388627F6EBCE3DE712FB43AF87ADF8185543634F4D9916ADA1FB55E7510B1D5
6,428,302 UART: [art] SIG.R = 26121A825A71609506EF90A1D9C83A62ABEAF8DEE9FDF4F76206C2022B6046AC89249552145EADFA69B30E624DCEEDB0
6,435,072 UART: [art] SIG.S = 9FDCDD4B567F5DFA429B776A26AC170ED54C20489FD9B9F1E54A342BECE56564A4525B7FF3952DAC2F8EA5898450261D
6,458,715 UART: Caliptra RT
6,458,966 UART: [state] CFI Enabled
6,825,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,826,904 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,857,372 UART: [rt]cmd =0x494e464f, len=4
6,861,020 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,563 ready_for_fw is high
1,361,563 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,515,321 >>> mbox cmd response: success
2,515,321 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,576,562 UART:
2,576,578 UART: Running Caliptra FMC ...
2,576,986 UART:
2,577,040 UART: [state] CFI Enabled
2,587,118 UART: [fht] FMC Alias Private Key: 7
2,706,286 UART: [art] Extend RT PCRs Done
2,706,714 UART: [art] Lock RT PCRs Done
2,708,478 UART: [art] Populate DV Done
2,716,469 UART: [fht] FMC Alias Private Key: 7
2,717,483 UART: [art] Derive CDI
2,717,763 UART: [art] Store in slot 0x4
2,803,341 UART: [art] Derive Key Pair
2,803,701 UART: [art] Store priv key in slot 0x5
2,817,046 UART: [art] Derive Key Pair - Done
2,831,891 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,847,654 UART: [art] Erasing AUTHORITY.KEYID = 7
2,848,419 UART: [art] PUB.X = 361892AD662D99C5C42CE271C08B655CD2422284702FA3B4367E318A96893C8412CB070FBB338DE85E23706D90A10384
2,855,172 UART: [art] PUB.Y = 4DE8C624555976AEAAC38F215C742C7F11DC8924A98B21C376114E46763E654B1BC3163DA33F3297D6C5F7DD6128423A
2,862,122 UART: [art] SIG.R = A1FFFF08E52AD053D0CE8563D341149E0DEE769D269A26B30FF8A0E9E08BEDE7D58EB2C4289A38719DB4F1FB56068E17
2,868,896 UART: [art] SIG.S = 79B50ACAEA3D631B25CBA968686740EDA741EA0AA62183738A64A93DECC6E2FA812523516B6272AAE80E59F8FEEF81AF
2,892,951 UART: mbox::rt_entry...
2,893,323 UART: ____ _ _ _ ____ _____
2,894,107 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,894,907 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,895,675 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,896,443 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,897,211 UART: |_|
2,897,523 UART:
3,016,118 UART: [rt] Runtime listening for mailbox commands...
3,022,452 >>> mbox cmd response data (4360 bytes)
3,022,453 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,053,235 >>> mbox cmd response data (0 bytes)
3,053,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,867,271 >>> mbox cmd response: success
5,880,473 UART:
5,880,489 UART: Running Caliptra FMC ...
5,880,897 UART:
5,880,951 UART: [state] CFI Enabled
5,970,260 UART: [art] Extend RT PCRs Done
5,970,688 UART: [art] Lock RT PCRs Done
5,972,081 UART: [art] Populate DV Done
5,980,058 UART: [fht] FMC Alias Private Key: 7
5,981,186 UART: [art] Derive CDI
5,981,466 UART: [art] Store in slot 0x4
6,067,154 UART: [art] Derive Key Pair
6,067,514 UART: [art] Store priv key in slot 0x5
6,080,913 UART: [art] Derive Key Pair - Done
6,095,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,111,424 UART: [art] Erasing AUTHORITY.KEYID = 7
6,112,189 UART: [art] PUB.X = B4CB102F3F0F23DDD7B378CC650AC5A1F32268AD0498BC705FD01F35B46EB6A06499B4EF2DBA2E0D318EFEEC455BC574
6,118,969 UART: [art] PUB.Y = 570A3B0A8A6B47E904C29CDC0B7AB6B22E552A36FF145F47D3323B7037CFFD35DD3616063D764718940D17507778ACBA
6,125,905 UART: [art] SIG.R = 41C46D1B08A49688FAA9C69FA764E2C4092EE5DCC09BD0A1447B395F677B489F290C42C4C6C128BF9C057A04E0BC2119
6,132,668 UART: [art] SIG.S = 937CADED5EFFF0A6352725B3CFF5C86735D5AC471884FD9A94D8E6388F733089C2FF5A5EFAAFCE9061B0D026F38D090C
6,157,084 UART: Caliptra RT
6,157,335 UART: [state] CFI Enabled
6,523,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,524,811 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,554,931 UART: [rt]cmd =0x494e464f, len=4
6,558,609 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,508 UART: [kat] SHA2-256
882,439 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,554 UART: [kat] ++
886,706 UART: [kat] sha1
891,030 UART: [kat] SHA2-256
892,968 UART: [kat] SHA2-384
895,635 UART: [kat] SHA2-512-ACC
897,536 UART: [kat] ECC-384
903,075 UART: [kat] HMAC-384Kdf
907,655 UART: [kat] LMS
1,475,851 UART: [kat] --
1,476,530 UART: [cold-reset] ++
1,476,994 UART: [fht] Storing FHT @ 0x50003400
1,479,661 UART: [idev] ++
1,479,829 UART: [idev] CDI.KEYID = 6
1,480,189 UART: [idev] SUBJECT.KEYID = 7
1,480,613 UART: [idev] UDS.KEYID = 0
1,480,958 ready_for_fw is high
1,480,958 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,869 UART: [idev] Erasing UDS.KEYID = 0
1,505,407 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,889 UART: [idev] --
1,514,798 UART: [ldev] ++
1,514,966 UART: [ldev] CDI.KEYID = 6
1,515,329 UART: [ldev] SUBJECT.KEYID = 5
1,515,755 UART: [ldev] AUTHORITY.KEYID = 7
1,516,218 UART: [ldev] FE.KEYID = 1
1,521,446 UART: [ldev] Erasing FE.KEYID = 1
1,546,807 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,531 UART: [ldev] --
1,585,918 UART: [fwproc] Waiting for Commands...
1,586,621 UART: [fwproc] Received command 0x46574c44
1,587,412 UART: [fwproc] Received Image of size 82832 bytes
2,523,875 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,551,151 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,582,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,669,128 >>> mbox cmd response: success
2,669,128 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,670,204 UART: [afmc] ++
2,670,372 UART: [afmc] CDI.KEYID = 6
2,670,734 UART: [afmc] SUBJECT.KEYID = 7
2,671,159 UART: [afmc] AUTHORITY.KEYID = 5
2,705,918 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,298 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,723,078 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,728,787 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,670 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,740,353 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,748,203 UART: [afmc] --
2,749,175 UART: [cold-reset] --
2,750,127 UART: [state] Locking Datavault
2,751,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,820 UART: [state] Locking ICCM
2,752,452 UART: [exit] Launching FMC @ 0x40000130
2,757,782 UART:
2,757,798 UART: Running Caliptra FMC ...
2,758,206 UART:
2,758,349 UART: [state] CFI Enabled
2,769,163 UART: [fht] FMC Alias Private Key: 7
2,888,173 UART: [art] Extend RT PCRs Done
2,888,601 UART: [art] Lock RT PCRs Done
2,890,359 UART: [art] Populate DV Done
2,898,782 UART: [fht] FMC Alias Private Key: 7
2,899,938 UART: [art] Derive CDI
2,900,218 UART: [art] Store in slot 0x4
2,985,928 UART: [art] Derive Key Pair
2,986,288 UART: [art] Store priv key in slot 0x5
2,999,461 UART: [art] Derive Key Pair - Done
3,014,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,824 UART: [art] PUB.X = 925AE6133ED9261775D7AF89F77006C31940A550FB66C309FCCF2FEF1C413083D51A79F0637D8E772A1AA51415AE3B74
3,036,590 UART: [art] PUB.Y = 878AD35F762A7548FF8E9877015425325593FE486B8BCD5BC139DE999778ADB2FB57F048EB2480B3BD3339CE4943BF7C
3,043,541 UART: [art] SIG.R = 2EC59D8C2E746C0A097D457053FCE2AD83CAEA12A1AFDA4EF0A765CA1BE0929BC1BD4F0F08E7DCCF3B10C594179D7269
3,050,323 UART: [art] SIG.S = C6549AB6B25E98428AA184619522190FF67464C2AA48A337BDCB0EE8B7D89F047A607FE094B87BC81E13F7B4000C9A4A
3,074,315 UART: mbox::rt_entry...
3,074,687 UART: ____ _ _ _ ____ _____
3,075,471 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,076,271 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,077,039 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,077,807 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,078,575 UART: |_|
3,078,887 UART:
3,197,594 UART: [rt] Runtime listening for mailbox commands...
3,203,928 >>> mbox cmd response data (4360 bytes)
3,203,929 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,234,711 >>> mbox cmd response data (0 bytes)
3,234,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,234,833 UART:
3,234,849 UART: Running Caliptra ROM ...
3,235,257 UART:
3,235,398 UART: [state] CFI Enabled
3,238,320 UART: [state] LifecycleState = Unprovisioned
3,238,975 UART: [state] DebugLocked = No
3,239,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,241,192 UART: [kat] SHA2-256
4,035,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,039,238 UART: [kat] ++
4,039,390 UART: [kat] sha1
4,043,744 UART: [kat] SHA2-256
4,045,682 UART: [kat] SHA2-384
4,048,481 UART: [kat] SHA2-512-ACC
4,050,381 UART: [kat] ECC-384
4,056,194 UART: [kat] HMAC-384Kdf
4,060,970 UART: [kat] LMS
4,629,166 UART: [kat] --
4,629,927 UART: [update-reset] ++
6,010,661 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,011,789 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,167,056 >>> mbox cmd response: success
6,167,269 UART: [update-reset] Copying MAN_2 To MAN_1
6,175,283 UART: [update-reset Success] --
6,176,154 UART: [state] Locking Datavault
6,176,816 UART: [state] Locking PCR0, PCR1 and PCR31
6,177,420 UART: [state] Locking ICCM
6,178,092 UART: [exit] Launching FMC @ 0x40000130
6,183,422 UART:
6,183,438 UART: Running Caliptra FMC ...
6,183,846 UART:
6,183,989 UART: [state] CFI Enabled
6,272,990 UART: [art] Extend RT PCRs Done
6,273,418 UART: [art] Lock RT PCRs Done
6,275,031 UART: [art] Populate DV Done
6,283,094 UART: [fht] FMC Alias Private Key: 7
6,284,168 UART: [art] Derive CDI
6,284,448 UART: [art] Store in slot 0x4
6,370,016 UART: [art] Derive Key Pair
6,370,376 UART: [art] Store priv key in slot 0x5
6,383,425 UART: [art] Derive Key Pair - Done
6,397,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,413,737 UART: [art] Erasing AUTHORITY.KEYID = 7
6,414,502 UART: [art] PUB.X = 49FEE830312E3EA45194CD706EA6928533324B28000C8A047A8DD71DB66BBFC189CE423D5ECA55618EC259D521C843AC
6,421,250 UART: [art] PUB.Y = ADC015862E0145D110A5661AFFDD2FA227807BEA766F4FE114371B9AAE55D95B759F5184510C8CAC22086F9FEB8DF44E
6,428,203 UART: [art] SIG.R = 4D654DB0C1FCC6F301534292434533DCF6675D23B107CC98EA34ECF051A79AA1105FBB3BFA115444C94FFAE283544024
6,434,973 UART: [art] SIG.S = 3C547D517C130535C82436251E0D94D7498AF3B4EF9E547BDAC1450AD5F01786FEBCE0FB3ADE6012858DF82D81F1D595
6,458,952 UART: Caliptra RT
6,459,295 UART: [state] CFI Enabled
6,824,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,825,804 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,856,150 UART: [rt]cmd =0x494e464f, len=4
6,860,086 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,254 ready_for_fw is high
1,363,254 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,519,102 >>> mbox cmd response: success
2,519,102 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,580,701 UART:
2,580,717 UART: Running Caliptra FMC ...
2,581,125 UART:
2,581,268 UART: [state] CFI Enabled
2,591,672 UART: [fht] FMC Alias Private Key: 7
2,710,880 UART: [art] Extend RT PCRs Done
2,711,308 UART: [art] Lock RT PCRs Done
2,712,830 UART: [art] Populate DV Done
2,721,115 UART: [fht] FMC Alias Private Key: 7
2,722,281 UART: [art] Derive CDI
2,722,561 UART: [art] Store in slot 0x4
2,808,773 UART: [art] Derive Key Pair
2,809,133 UART: [art] Store priv key in slot 0x5
2,822,832 UART: [art] Derive Key Pair - Done
2,837,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,853,372 UART: [art] Erasing AUTHORITY.KEYID = 7
2,854,137 UART: [art] PUB.X = 9FEDA36F1AE16EDC118DE33481AA179BAEF765750D74726BB2FE66B919990002148566166194AA5C588B74F6334F16E3
2,860,879 UART: [art] PUB.Y = C4C94F2B8C0A64C90A8FABBF91FB30AFDF2498C3304F4610CA5ED5BAFE394A785FC572BB1DE3452A9C964CFCF5DC5799
2,867,849 UART: [art] SIG.R = 6648E6DCDDA3A27DAF66BA39AFD99959D406624EEF0B40540EAC873F12C3B87F91DBEAF31188A7D9D2F6F248D24D32D5
2,874,628 UART: [art] SIG.S = C346B6B554C823C1500701CEAE2BC21C5CA8B60742AD78D7E61C935573B6AE07019A5B5F562FDABA421D9135311517DF
2,898,205 UART: mbox::rt_entry...
2,898,577 UART: ____ _ _ _ ____ _____
2,899,361 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,900,161 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,900,929 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,901,697 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,902,465 UART: |_|
2,902,777 UART:
3,021,644 UART: [rt] Runtime listening for mailbox commands...
3,027,978 >>> mbox cmd response data (4360 bytes)
3,027,979 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,058,761 >>> mbox cmd response data (0 bytes)
3,058,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,872,368 >>> mbox cmd response: success
5,885,572 UART:
5,885,588 UART: Running Caliptra FMC ...
5,885,996 UART:
5,886,139 UART: [state] CFI Enabled
5,975,278 UART: [art] Extend RT PCRs Done
5,975,706 UART: [art] Lock RT PCRs Done
5,976,925 UART: [art] Populate DV Done
5,985,056 UART: [fht] FMC Alias Private Key: 7
5,986,136 UART: [art] Derive CDI
5,986,416 UART: [art] Store in slot 0x4
6,072,134 UART: [art] Derive Key Pair
6,072,494 UART: [art] Store priv key in slot 0x5
6,086,021 UART: [art] Derive Key Pair - Done
6,101,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,117,040 UART: [art] Erasing AUTHORITY.KEYID = 7
6,117,805 UART: [art] PUB.X = 9517FF94C2726DB9348D27707F57EE37C1FC2F9895918645353E50EF205C0E7C9B4737EA6E45043BA36A475C229A1929
6,124,563 UART: [art] PUB.Y = 000E130C5918AECA06FBF847D81C820A56263E0C0333B647AE8F961AA19866C645AD8722182AA8594C3AD3DB98C19358
6,131,473 UART: [art] SIG.R = BEA2B7DDF62F546DDF9F29E0343285F0E584A2FB4C4B77F295F25E82DF1536CD2B51BD9571DFDC1F362C94A19F518FA8
6,138,261 UART: [art] SIG.S = BDBC8DFDCCD9A22FEC2CEABA64407E2BAC04E69321D0862C651A63D67DB96BD8E4D25E20911321D9CF2BDC5F4BCAB291
6,162,686 UART: Caliptra RT
6,163,029 UART: [state] CFI Enabled
6,535,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,537,192 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,567,828 UART: [rt]cmd =0x494e464f, len=4
6,571,534 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
891,132 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,236 UART: [kat] ++
895,388 UART: [kat] sha1
899,436 UART: [kat] SHA2-256
901,376 UART: [kat] SHA2-384
904,143 UART: [kat] SHA2-512-ACC
906,044 UART: [kat] ECC-384
915,833 UART: [kat] HMAC-384Kdf
920,419 UART: [kat] LMS
1,168,731 UART: [kat] --
1,169,474 UART: [cold-reset] ++
1,169,988 UART: [fht] FHT @ 0x50003400
1,172,514 UART: [idev] ++
1,172,682 UART: [idev] CDI.KEYID = 6
1,173,043 UART: [idev] SUBJECT.KEYID = 7
1,173,468 UART: [idev] UDS.KEYID = 0
1,173,814 ready_for_fw is high
1,173,814 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,425 UART: [idev] Erasing UDS.KEYID = 0
1,198,281 UART: [idev] Sha1 KeyId Algorithm
1,207,285 UART: [idev] --
1,208,480 UART: [ldev] ++
1,208,648 UART: [ldev] CDI.KEYID = 6
1,209,012 UART: [ldev] SUBJECT.KEYID = 5
1,209,439 UART: [ldev] AUTHORITY.KEYID = 7
1,209,902 UART: [ldev] FE.KEYID = 1
1,215,238 UART: [ldev] Erasing FE.KEYID = 1
1,240,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,658 UART: [ldev] --
1,280,079 UART: [fwproc] Wait for Commands...
1,280,664 UART: [fwproc] Recv command 0x46574c44
1,281,397 UART: [fwproc] Recv'd Img size: 82832 bytes
2,215,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,243,274 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,274,449 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,361,062 >>> mbox cmd response: success
2,361,062 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,362,150 UART: [afmc] ++
2,362,318 UART: [afmc] CDI.KEYID = 6
2,362,681 UART: [afmc] SUBJECT.KEYID = 7
2,363,107 UART: [afmc] AUTHORITY.KEYID = 5
2,398,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,415,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,416,002 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,421,712 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,427,593 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,433,294 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,441,115 UART: [afmc] --
2,442,150 UART: [cold-reset] --
2,443,088 UART: [state] Locking Datavault
2,444,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,444,745 UART: [state] Locking ICCM
2,445,323 UART: [exit] Launching FMC @ 0x40000130
2,450,653 UART:
2,450,669 UART: Running Caliptra FMC ...
2,451,077 UART:
2,451,131 UART: [state] CFI Enabled
2,461,451 UART: [fht] FMC Alias Private Key: 7
2,579,969 UART: [art] Extend RT PCRs Done
2,580,397 UART: [art] Lock RT PCRs Done
2,581,969 UART: [art] Populate DV Done
2,590,084 UART: [fht] FMC Alias Private Key: 7
2,591,080 UART: [art] Derive CDI
2,591,360 UART: [art] Store in slot 0x4
2,677,461 UART: [art] Derive Key Pair
2,677,821 UART: [art] Store priv key in slot 0x5
2,691,031 UART: [art] Derive Key Pair - Done
2,705,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,721,063 UART: [art] Erasing AUTHORITY.KEYID = 7
2,721,828 UART: [art] PUB.X = 23FD462CCDF9BDDB3C02D4DA1A7AB27719E1C7E2719BB522F1F5B84FEAB0990F59FF859F83F21D5D6097B88E8CFEFB9D
2,728,618 UART: [art] PUB.Y = D0F8E2E676D42D2BE47A1D672289A5DD4BF81D4203A0C8B92540B1BCA791F18204753D9402726AB35457798E4DE31F39
2,735,559 UART: [art] SIG.R = 20D8400E8C86CD7131B2E673028ADFDEB0FF8CBE0AE1A256053E16CC880B2E491A1C2C94829553E58DAE74C4D721DDEB
2,742,330 UART: [art] SIG.S = ED5A2D917EDA8460B78B4A8E1A71044708A1C27592E0207363AFEAB334AB0E7BC352F4C83224A48F13B1C40C34ABB9A3
2,766,336 UART: mbox::rt_entry...
2,766,708 UART: ____ _ _ _ ____ _____
2,767,492 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,768,292 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,769,060 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,769,828 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,770,596 UART: |_|
2,770,908 UART:
2,889,536 UART: [rt] Runtime listening for mailbox commands...
2,895,870 >>> mbox cmd response data (4360 bytes)
2,895,871 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,926,653 >>> mbox cmd response data (0 bytes)
2,926,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,926,772 UART:
2,926,788 UART: Running Caliptra ROM ...
2,927,196 UART:
2,927,251 UART: [state] CFI Enabled
2,929,505 UART: [state] LifecycleState = Unprovisioned
2,930,160 UART: [state] DebugLocked = No
2,930,744 UART: [state] WD Timer not started. Device not locked for debugging
2,931,886 UART: [kat] SHA2-256
3,735,436 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,739,540 UART: [kat] ++
3,739,692 UART: [kat] sha1
3,743,774 UART: [kat] SHA2-256
3,745,714 UART: [kat] SHA2-384
3,748,523 UART: [kat] SHA2-512-ACC
3,750,423 UART: [kat] ECC-384
3,760,112 UART: [kat] HMAC-384Kdf
3,764,616 UART: [kat] LMS
4,012,928 UART: [kat] --
4,013,890 UART: [update-reset] ++
5,372,933 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,373,930 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,529,145 >>> mbox cmd response: success
5,529,270 UART: [update-reset] Copying MAN_2 To MAN_1
5,537,284 UART: [update-reset Success] --
5,538,327 UART: [state] Locking Datavault
5,539,119 UART: [state] Locking PCR0, PCR1 and PCR31
5,539,723 UART: [state] Locking ICCM
5,540,169 UART: [exit] Launching FMC @ 0x40000130
5,545,499 UART:
5,545,515 UART: Running Caliptra FMC ...
5,545,923 UART:
5,545,977 UART: [state] CFI Enabled
5,635,000 UART: [art] Extend RT PCRs Done
5,635,428 UART: [art] Lock RT PCRs Done
5,636,497 UART: [art] Populate DV Done
5,644,668 UART: [fht] FMC Alias Private Key: 7
5,645,830 UART: [art] Derive CDI
5,646,110 UART: [art] Store in slot 0x4
5,731,693 UART: [art] Derive Key Pair
5,732,053 UART: [art] Store priv key in slot 0x5
5,745,561 UART: [art] Derive Key Pair - Done
5,760,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,775,657 UART: [art] Erasing AUTHORITY.KEYID = 7
5,776,422 UART: [art] PUB.X = 1B3A9C1B53C451EABF315E65B299E64894FDDBC83FA89023354B4DDDB26B893FD67E2E3D6EBD7861CA192A2BE20B1075
5,783,205 UART: [art] PUB.Y = 62C5E43371E8FB7E3F5A879909FBB8E204B320A1A9E0B40E1A8256CB1DACC5B97F5E610457EC217C217925767B7870B8
5,790,147 UART: [art] SIG.R = 49BC791B1FE4D989C6092EC349541D293C2133E49F3B9EDE0D130243F36F2B106E474875E6FE983E8B47734037FD48C1
5,796,906 UART: [art] SIG.S = 197D4CAC9B1181DEC5732DA9BC05B9B40797691B0119D99CD0366DB0430864D3EB4D8D20BE5C85AB4E849D7FB0A5D860
5,821,040 UART: Caliptra RT
5,821,291 UART: [state] CFI Enabled
6,185,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,187,185 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,217,639 UART: [rt]cmd =0x494e464f, len=4
6,221,143 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,222 ready_for_fw is high
1,058,222 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,093 >>> mbox cmd response: success
2,216,093 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,277,920 UART:
2,277,936 UART: Running Caliptra FMC ...
2,278,344 UART:
2,278,398 UART: [state] CFI Enabled
2,288,922 UART: [fht] FMC Alias Private Key: 7
2,407,790 UART: [art] Extend RT PCRs Done
2,408,218 UART: [art] Lock RT PCRs Done
2,409,754 UART: [art] Populate DV Done
2,417,843 UART: [fht] FMC Alias Private Key: 7
2,418,991 UART: [art] Derive CDI
2,419,271 UART: [art] Store in slot 0x4
2,504,804 UART: [art] Derive Key Pair
2,505,164 UART: [art] Store priv key in slot 0x5
2,518,608 UART: [art] Derive Key Pair - Done
2,533,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,548,901 UART: [art] Erasing AUTHORITY.KEYID = 7
2,549,666 UART: [art] PUB.X = DDE2EDC64A2CB4578B561FF010B0D3F55890D10124574B65F0B5EF8CD2ED9A032035637496987A576290F4BE7EB5EC5C
2,556,438 UART: [art] PUB.Y = D99CCB417ACED419A3696B24C1E1DDDB8147424FA70FCCAD942555D3B82C3119197DF07E6FA6C2B10241258B5B04113A
2,563,389 UART: [art] SIG.R = B979ECA2BF0F14F3DB157B1A0B9D405432A8B31EC78391A8705A4711E113E454346716938168266B2294DA1F500241B8
2,570,142 UART: [art] SIG.S = 0D32ED7E83BA1EC07081EC29470624B7072289CE8CE0909D307134A508CA3F81C113A4318C0AC1EFAEFA382955C6F2F5
2,593,939 UART: mbox::rt_entry...
2,594,311 UART: ____ _ _ _ ____ _____
2,595,095 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,895 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,663 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,431 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,598,199 UART: |_|
2,598,511 UART:
2,717,769 UART: [rt] Runtime listening for mailbox commands...
2,724,103 >>> mbox cmd response data (4360 bytes)
2,724,104 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,754,886 >>> mbox cmd response data (0 bytes)
2,754,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,242,296 >>> mbox cmd response: success
5,256,035 UART:
5,256,051 UART: Running Caliptra FMC ...
5,256,459 UART:
5,256,513 UART: [state] CFI Enabled
5,345,142 UART: [art] Extend RT PCRs Done
5,345,570 UART: [art] Lock RT PCRs Done
5,346,903 UART: [art] Populate DV Done
5,355,106 UART: [fht] FMC Alias Private Key: 7
5,356,076 UART: [art] Derive CDI
5,356,356 UART: [art] Store in slot 0x4
5,442,031 UART: [art] Derive Key Pair
5,442,391 UART: [art] Store priv key in slot 0x5
5,455,323 UART: [art] Derive Key Pair - Done
5,470,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,485,524 UART: [art] Erasing AUTHORITY.KEYID = 7
5,486,289 UART: [art] PUB.X = A2E5517C7F058CDE8429B9A55DB9297C476C70CA16684982FFB82BABAC4EC27CBA7FD786C0EAF7EDBE6B20E0FED77A91
5,493,082 UART: [art] PUB.Y = EF0ADE15B33223EA05BF1666FA16A12D5474FC1B58D66FD6C7574EB783C9F2911D0477020D22A664DDB3B08C8BE37608
5,500,022 UART: [art] SIG.R = 87FBA444CD6C690C271D09A14748581331F7316DC5CC494770FFFDDE04E02A7764F38AECBEEBE8238367E250D7F1B3C7
5,506,793 UART: [art] SIG.S = D3C1EAE0D84F63E3DF8A16A61ED0E87081F8DCB229458286FE1F0711480FB331BEAF1D851C036B2302B1A7FCFAD12E46
5,530,865 UART: Caliptra RT
5,531,116 UART: [state] CFI Enabled
5,896,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,898,206 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,928,550 UART: [rt]cmd =0x494e464f, len=4
5,932,234 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,843 UART: [kat] SHA2-256
901,783 UART: [kat] SHA2-384
904,402 UART: [kat] SHA2-512-ACC
906,303 UART: [kat] ECC-384
915,762 UART: [kat] HMAC-384Kdf
920,324 UART: [kat] LMS
1,168,636 UART: [kat] --
1,169,681 UART: [cold-reset] ++
1,170,181 UART: [fht] FHT @ 0x50003400
1,172,757 UART: [idev] ++
1,172,925 UART: [idev] CDI.KEYID = 6
1,173,286 UART: [idev] SUBJECT.KEYID = 7
1,173,711 UART: [idev] UDS.KEYID = 0
1,174,057 ready_for_fw is high
1,174,057 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,950 UART: [idev] Erasing UDS.KEYID = 0
1,198,948 UART: [idev] Sha1 KeyId Algorithm
1,207,682 UART: [idev] --
1,208,743 UART: [ldev] ++
1,208,911 UART: [ldev] CDI.KEYID = 6
1,209,275 UART: [ldev] SUBJECT.KEYID = 5
1,209,702 UART: [ldev] AUTHORITY.KEYID = 7
1,210,165 UART: [ldev] FE.KEYID = 1
1,215,445 UART: [ldev] Erasing FE.KEYID = 1
1,241,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,889 UART: [ldev] --
1,281,240 UART: [fwproc] Wait for Commands...
1,281,987 UART: [fwproc] Recv command 0x46574c44
1,282,720 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,272 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,105 >>> mbox cmd response: success
2,363,105 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,364,143 UART: [afmc] ++
2,364,311 UART: [afmc] CDI.KEYID = 6
2,364,674 UART: [afmc] SUBJECT.KEYID = 7
2,365,100 UART: [afmc] AUTHORITY.KEYID = 5
2,400,391 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,416,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,539 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,249 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,130 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,434,831 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,554 UART: [afmc] --
2,443,529 UART: [cold-reset] --
2,444,325 UART: [state] Locking Datavault
2,445,630 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,234 UART: [state] Locking ICCM
2,446,876 UART: [exit] Launching FMC @ 0x40000130
2,452,206 UART:
2,452,222 UART: Running Caliptra FMC ...
2,452,630 UART:
2,452,773 UART: [state] CFI Enabled
2,463,517 UART: [fht] FMC Alias Private Key: 7
2,582,739 UART: [art] Extend RT PCRs Done
2,583,167 UART: [art] Lock RT PCRs Done
2,584,617 UART: [art] Populate DV Done
2,592,880 UART: [fht] FMC Alias Private Key: 7
2,593,892 UART: [art] Derive CDI
2,594,172 UART: [art] Store in slot 0x4
2,679,993 UART: [art] Derive Key Pair
2,680,353 UART: [art] Store priv key in slot 0x5
2,693,839 UART: [art] Derive Key Pair - Done
2,708,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,040 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,805 UART: [art] PUB.X = 3EE6C1A23B8872641C63B87BCFD09188BB1A3F98B5EFC100C7A21313B02BB18A6A537FA8E8C4D79318414B387472EB75
2,731,559 UART: [art] PUB.Y = 980842F86410BA56EB9C6E183AC0B2E42027F29A5ED51F4D909C23257B5B13E6FEB86BFEAA12586BE71583716A76743E
2,738,510 UART: [art] SIG.R = 404E51727897D50AE2B045C686596FC6F01192C57C0F3298D230AF64BA2CFB1240061A650C4DBDBDC728D98194D34C88
2,745,268 UART: [art] SIG.S = 6983A6E3427F1C16313B2D98F4D4A208794B8A1DD1AC3EBAC4E36DE8878FBE9528A4023A897A8C0C99B8F1A6047CAA79
2,769,346 UART: mbox::rt_entry...
2,769,718 UART: ____ _ _ _ ____ _____
2,770,502 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,302 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,070 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,838 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,606 UART: |_|
2,773,918 UART:
2,891,771 UART: [rt] Runtime listening for mailbox commands...
2,898,105 >>> mbox cmd response data (4360 bytes)
2,898,106 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,928,888 >>> mbox cmd response data (0 bytes)
2,928,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,929,007 UART:
2,929,023 UART: Running Caliptra ROM ...
2,929,431 UART:
2,929,573 UART: [state] CFI Enabled
2,932,819 UART: [state] LifecycleState = Unprovisioned
2,933,474 UART: [state] DebugLocked = No
2,934,078 UART: [state] WD Timer not started. Device not locked for debugging
2,935,324 UART: [kat] SHA2-256
3,738,874 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,742,978 UART: [kat] ++
3,743,130 UART: [kat] sha1
3,747,216 UART: [kat] SHA2-256
3,749,156 UART: [kat] SHA2-384
3,751,983 UART: [kat] SHA2-512-ACC
3,753,883 UART: [kat] ECC-384
3,763,560 UART: [kat] HMAC-384Kdf
3,768,382 UART: [kat] LMS
4,016,694 UART: [kat] --
4,017,510 UART: [update-reset] ++
5,376,751 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,377,760 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,532,975 >>> mbox cmd response: success
5,533,202 UART: [update-reset] Copying MAN_2 To MAN_1
5,541,216 UART: [update-reset Success] --
5,542,285 UART: [state] Locking Datavault
5,542,937 UART: [state] Locking PCR0, PCR1 and PCR31
5,543,541 UART: [state] Locking ICCM
5,544,151 UART: [exit] Launching FMC @ 0x40000130
5,549,481 UART:
5,549,497 UART: Running Caliptra FMC ...
5,549,905 UART:
5,550,048 UART: [state] CFI Enabled
5,639,007 UART: [art] Extend RT PCRs Done
5,639,435 UART: [art] Lock RT PCRs Done
5,640,816 UART: [art] Populate DV Done
5,649,133 UART: [fht] FMC Alias Private Key: 7
5,650,069 UART: [art] Derive CDI
5,650,349 UART: [art] Store in slot 0x4
5,736,060 UART: [art] Derive Key Pair
5,736,420 UART: [art] Store priv key in slot 0x5
5,749,314 UART: [art] Derive Key Pair - Done
5,764,023 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,779,782 UART: [art] Erasing AUTHORITY.KEYID = 7
5,780,547 UART: [art] PUB.X = C9EB50652DD216A86D8702BAD9AB00169955E88C947EF25618E757A321B21E787E22BEF0128C3ABEABD3392A7592C2E8
5,787,298 UART: [art] PUB.Y = 293B51AECECEB958B3F886B666D791F9DA293EE59CF9D0067DF52E5BFBA4381DE634E12F039C049DF755FD0D4FF7A953
5,794,254 UART: [art] SIG.R = 1A5C285756E960DF684EE42B14815E6F77FFABD60247E559A52A7DEE6DF4DDB912447D86FDCC0DFE788383CA003DE9F1
5,801,012 UART: [art] SIG.S = 0541E4CA6A199CAAD71F25E52E85A94521C32A853736275A2D8A12C044273380DDE38421D5375DC3066AAF310319BF74
5,824,369 UART: Caliptra RT
5,824,712 UART: [state] CFI Enabled
6,190,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,191,336 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,222,030 UART: [rt]cmd =0x494e464f, len=4
6,225,696 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,277 ready_for_fw is high
1,060,277 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,218,866 >>> mbox cmd response: success
2,218,866 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,280,619 UART:
2,280,635 UART: Running Caliptra FMC ...
2,281,043 UART:
2,281,186 UART: [state] CFI Enabled
2,291,884 UART: [fht] FMC Alias Private Key: 7
2,410,160 UART: [art] Extend RT PCRs Done
2,410,588 UART: [art] Lock RT PCRs Done
2,411,790 UART: [art] Populate DV Done
2,419,819 UART: [fht] FMC Alias Private Key: 7
2,420,755 UART: [art] Derive CDI
2,421,035 UART: [art] Store in slot 0x4
2,506,850 UART: [art] Derive Key Pair
2,507,210 UART: [art] Store priv key in slot 0x5
2,521,080 UART: [art] Derive Key Pair - Done
2,535,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,226 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,991 UART: [art] PUB.X = 15028A0FDD84EFA5AE13C625E668C50CB41064975D3BFDEDCFBF7D3AC648226C19C3ADDB22762F09DF64BA9F6AF71BFB
2,558,775 UART: [art] PUB.Y = BDFB2E817F137F6936699F74B26321A4631E8A5BAD6C2D9B70F5E4B1D9DECC187E02401B7424E9420C9D300E3F874705
2,565,717 UART: [art] SIG.R = D840DC07D99F68736CD9A3BF731E51DD821B2414BF215F7B87A2756D8E48DA2749D0CAF574929F8B104155C0778712B6
2,572,484 UART: [art] SIG.S = 90348B063F1A2FBA37CADF554C56E3851C9A77EE678EA3D68F8BF13C1C7E7BAC614D3586FDA3F0622076F39FDF109ABB
2,595,739 UART: mbox::rt_entry...
2,596,111 UART: ____ _ _ _ ____ _____
2,596,895 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,695 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,463 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,231 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,999 UART: |_|
2,600,311 UART:
2,718,148 UART: [rt] Runtime listening for mailbox commands...
2,724,482 >>> mbox cmd response data (4360 bytes)
2,724,483 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,755,265 >>> mbox cmd response data (0 bytes)
2,755,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,243,850 >>> mbox cmd response: success
5,257,085 UART:
5,257,101 UART: Running Caliptra FMC ...
5,257,509 UART:
5,257,652 UART: [state] CFI Enabled
5,347,235 UART: [art] Extend RT PCRs Done
5,347,663 UART: [art] Lock RT PCRs Done
5,348,982 UART: [art] Populate DV Done
5,357,227 UART: [fht] FMC Alias Private Key: 7
5,358,281 UART: [art] Derive CDI
5,358,561 UART: [art] Store in slot 0x4
5,444,784 UART: [art] Derive Key Pair
5,445,144 UART: [art] Store priv key in slot 0x5
5,458,590 UART: [art] Derive Key Pair - Done
5,473,156 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,488,279 UART: [art] Erasing AUTHORITY.KEYID = 7
5,489,044 UART: [art] PUB.X = BF947C3436D88D82E5C9A80CC171AE5B44AD4D46B72002434F80BA1B9E34951DB39AF188BE18EA492740F4387FCB0A31
5,495,813 UART: [art] PUB.Y = 99C96D9D6EC434DDC764E7A2F30F081A0208707BAC1A6E14E02BD1AD2AA66BB19B9A2CC095FD84A7ABEEAE3E09BEE7AF
5,502,778 UART: [art] SIG.R = CAFCBC380E71B0060747F59875B9318CA554D0FF6A129B2CFD93E5413CA68AF65117CC4DF61892D01BC363FAF1B6419F
5,509,551 UART: [art] SIG.S = 7AAE29E16E5D28CD3616694E05CB60A4D785DD04458732758535DF2E7C8FF274DAC51A8547054F15BDD2B8FFD38D680B
5,533,621 UART: Caliptra RT
5,533,964 UART: [state] CFI Enabled
5,897,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,899,653 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,930,243 UART: [rt]cmd =0x494e464f, len=4
5,934,117 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,109 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
893,092 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,217 UART: [kat] ++
897,369 UART: [kat] sha1
901,469 UART: [kat] SHA2-256
903,409 UART: [kat] SHA2-384
906,160 UART: [kat] SHA2-512-ACC
908,061 UART: [kat] ECC-384
917,502 UART: [kat] HMAC-384Kdf
922,064 UART: [kat] LMS
1,170,392 UART: [kat] --
1,171,329 UART: [cold-reset] ++
1,171,779 UART: [fht] FHT @ 0x50003400
1,174,260 UART: [idev] ++
1,174,428 UART: [idev] CDI.KEYID = 6
1,174,788 UART: [idev] SUBJECT.KEYID = 7
1,175,212 UART: [idev] UDS.KEYID = 0
1,175,557 ready_for_fw is high
1,175,557 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,970 UART: [idev] Erasing UDS.KEYID = 0
1,199,963 UART: [idev] Sha1 KeyId Algorithm
1,208,293 UART: [idev] --
1,209,311 UART: [ldev] ++
1,209,479 UART: [ldev] CDI.KEYID = 6
1,209,842 UART: [ldev] SUBJECT.KEYID = 5
1,210,268 UART: [ldev] AUTHORITY.KEYID = 7
1,210,731 UART: [ldev] FE.KEYID = 1
1,216,081 UART: [ldev] Erasing FE.KEYID = 1
1,241,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,201 UART: [ldev] --
1,281,472 UART: [fwproc] Wait for Commands...
1,282,180 UART: [fwproc] Recv command 0x46574c44
1,282,908 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,247,489 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,278,659 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,365,484 >>> mbox cmd response: success
2,365,484 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,366,596 UART: [afmc] ++
2,366,764 UART: [afmc] CDI.KEYID = 6
2,367,126 UART: [afmc] SUBJECT.KEYID = 7
2,367,551 UART: [afmc] AUTHORITY.KEYID = 5
2,402,554 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,737 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,446 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,329 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,437,030 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,860 UART: [afmc] --
2,445,740 UART: [cold-reset] --
2,446,500 UART: [state] Locking Datavault
2,448,035 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,639 UART: [state] Locking ICCM
2,449,067 UART: [exit] Launching FMC @ 0x40000130
2,454,397 UART:
2,454,413 UART: Running Caliptra FMC ...
2,454,821 UART:
2,454,875 UART: [state] CFI Enabled
2,465,641 UART: [fht] FMC Alias Private Key: 7
2,584,457 UART: [art] Extend RT PCRs Done
2,584,885 UART: [art] Lock RT PCRs Done
2,586,749 UART: [art] Populate DV Done
2,594,680 UART: [fht] FMC Alias Private Key: 7
2,595,784 UART: [art] Derive CDI
2,596,064 UART: [art] Store in slot 0x4
2,682,187 UART: [art] Derive Key Pair
2,682,547 UART: [art] Store priv key in slot 0x5
2,695,585 UART: [art] Derive Key Pair - Done
2,710,373 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,664 UART: [art] Erasing AUTHORITY.KEYID = 7
2,726,429 UART: [art] PUB.X = 2487D4777F72A62334CF14599D51AA3473C78E3D2CCA7D09A4EF0D4D8F74DE185F43259C968FE56D36D1E271479D5A7F
2,733,197 UART: [art] PUB.Y = BA86F7AE969876D5D14F27EC584E8F43A8D29F9C75CCCDDEFBD12AE075F08BF4DBB305E29E22981541DF59BD3875E5D6
2,740,164 UART: [art] SIG.R = 664A7C6C0ECB53D33E274BE73F0D92E59D401522540BCE2DD397D79B5D8A7452CF5E29499E9AA4760A4D3D76F9CB5710
2,746,930 UART: [art] SIG.S = 24C57BA9D6D534B4D97AAF8405CCBDD802A27A196779DECA1B9ED9EEAD347C542BD0A50C2CF01DF216259675CB105B53
2,770,673 UART: mbox::rt_entry...
2,771,045 UART: ____ _ _ _ ____ _____
2,771,829 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,629 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,773,397 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,774,165 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,933 UART: |_|
2,775,245 UART:
2,894,320 UART: [rt] Runtime listening for mailbox commands...
2,900,654 >>> mbox cmd response data (4360 bytes)
2,900,655 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,931,437 >>> mbox cmd response data (0 bytes)
2,931,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,931,556 UART:
2,931,572 UART: Running Caliptra ROM ...
2,931,980 UART:
2,932,035 UART: [state] CFI Enabled
2,935,045 UART: [state] LifecycleState = Unprovisioned
2,935,700 UART: [state] DebugLocked = No
2,936,292 UART: [state] WD Timer not started. Device not locked for debugging
2,937,454 UART: [kat] SHA2-256
3,743,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,747,229 UART: [kat] ++
3,747,381 UART: [kat] sha1
3,751,587 UART: [kat] SHA2-256
3,753,527 UART: [kat] SHA2-384
3,756,290 UART: [kat] SHA2-512-ACC
3,758,190 UART: [kat] ECC-384
3,767,657 UART: [kat] HMAC-384Kdf
3,772,261 UART: [kat] LMS
4,020,589 UART: [kat] --
4,021,635 UART: [update-reset] ++
5,381,507 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,382,536 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,537,751 >>> mbox cmd response: success
5,538,038 UART: [update-reset] Copying MAN_2 To MAN_1
5,546,052 UART: [update-reset Success] --
5,546,895 UART: [state] Locking Datavault
5,547,921 UART: [state] Locking PCR0, PCR1 and PCR31
5,548,525 UART: [state] Locking ICCM
5,549,173 UART: [exit] Launching FMC @ 0x40000130
5,554,503 UART:
5,554,519 UART: Running Caliptra FMC ...
5,554,927 UART:
5,554,981 UART: [state] CFI Enabled
5,643,824 UART: [art] Extend RT PCRs Done
5,644,252 UART: [art] Lock RT PCRs Done
5,645,557 UART: [art] Populate DV Done
5,653,684 UART: [fht] FMC Alias Private Key: 7
5,654,672 UART: [art] Derive CDI
5,654,952 UART: [art] Store in slot 0x4
5,740,855 UART: [art] Derive Key Pair
5,741,215 UART: [art] Store priv key in slot 0x5
5,754,233 UART: [art] Derive Key Pair - Done
5,769,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,784,380 UART: [art] Erasing AUTHORITY.KEYID = 7
5,785,145 UART: [art] PUB.X = 928D0920269316B5DCBE7D9CEE42A9D6AF92A29B214579CD5E1073AE24F269698EFD7C05C523EF921D6E29278574BADA
5,791,917 UART: [art] PUB.Y = C437AB2EE58C5C61724C74C34AEF35663F160BD26F6BC848D153206B400A9415DAE3346A08E5712F7AB90F56E1C54787
5,798,857 UART: [art] SIG.R = 8C4169AEF0A75C331C745885BA1E214BED7F1D1B87044492271F9C1B194F885A111BDCC43D0C09F2146DD694182A5635
5,805,618 UART: [art] SIG.S = F2B98A1419FE0D6CD2F72F8D696261C2D8A4431A96DD59706A89D369956DCDC3C5FC3CD3F9462718991EAA2E9AA7C5CF
5,829,663 UART: Caliptra RT
5,829,914 UART: [state] CFI Enabled
6,197,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,198,746 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,229,294 UART: [rt]cmd =0x494e464f, len=4
6,232,866 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,731 ready_for_fw is high
1,059,731 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,615 >>> mbox cmd response: success
2,216,615 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,278,812 UART:
2,278,828 UART: Running Caliptra FMC ...
2,279,236 UART:
2,279,290 UART: [state] CFI Enabled
2,289,674 UART: [fht] FMC Alias Private Key: 7
2,408,246 UART: [art] Extend RT PCRs Done
2,408,674 UART: [art] Lock RT PCRs Done
2,410,608 UART: [art] Populate DV Done
2,418,519 UART: [fht] FMC Alias Private Key: 7
2,419,639 UART: [art] Derive CDI
2,419,919 UART: [art] Store in slot 0x4
2,505,440 UART: [art] Derive Key Pair
2,505,800 UART: [art] Store priv key in slot 0x5
2,519,224 UART: [art] Derive Key Pair - Done
2,533,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,549,598 UART: [art] Erasing AUTHORITY.KEYID = 7
2,550,363 UART: [art] PUB.X = 7944A41E6DB776E76A9458A54510D97F97587C0BC9C34C335EAD23E965B5BFDC931E6F832F082B7E4BB5878418CCAD6A
2,557,135 UART: [art] PUB.Y = F6E52ED9C00785FEEB200AED75F2D6FCA6B67F5B35FC7483C80AA6FCC507644946E340A4D601FA363C6A091CEFAAC29C
2,564,089 UART: [art] SIG.R = E80499CD9CDC1DA57A2AC07B4E61D34681E992F51C45D75278739BA6D134980AAFABCDD8DBB92D9E375E1FF8D7A67A4A
2,570,873 UART: [art] SIG.S = D1A5813DC9326AFDC80F2D356086B0C877BB47A66867D772B0CD185C99C0FB7DDBD2D0CA98219CBDF5CFEF708E8B8EF4
2,594,868 UART: mbox::rt_entry...
2,595,240 UART: ____ _ _ _ ____ _____
2,596,024 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,596,824 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,597,592 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,598,360 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,128 UART: |_|
2,599,440 UART:
2,718,321 UART: [rt] Runtime listening for mailbox commands...
2,724,655 >>> mbox cmd response data (4360 bytes)
2,724,656 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,755,438 >>> mbox cmd response data (0 bytes)
2,755,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,245,295 >>> mbox cmd response: success
5,258,526 UART:
5,258,542 UART: Running Caliptra FMC ...
5,258,950 UART:
5,259,004 UART: [state] CFI Enabled
5,348,323 UART: [art] Extend RT PCRs Done
5,348,751 UART: [art] Lock RT PCRs Done
5,350,086 UART: [art] Populate DV Done
5,358,203 UART: [fht] FMC Alias Private Key: 7
5,359,319 UART: [art] Derive CDI
5,359,599 UART: [art] Store in slot 0x4
5,445,510 UART: [art] Derive Key Pair
5,445,870 UART: [art] Store priv key in slot 0x5
5,459,142 UART: [art] Derive Key Pair - Done
5,474,335 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,490,120 UART: [art] Erasing AUTHORITY.KEYID = 7
5,490,885 UART: [art] PUB.X = 787FA25926C3892D1D04E530998C5A6665BDF56089E552DDA2D9AAE3E1DF011486FE5CE7D7184DDB9301DB99DC54416B
5,497,654 UART: [art] PUB.Y = 34CACAFEE8482DD4A721C79DB0BB436C56982003702393C119932715DD4C6452A18153B4EE686D6A4464E4132672A3D4
5,504,597 UART: [art] SIG.R = 0665F9F15721EA2B471F35153085099EE0B95F1C8BCF637E9E94424FF60494491C44C746B0FC9964FC3656231ED50B8A
5,511,351 UART: [art] SIG.S = 4B0A224C604D4F749392AF9E3EA79D09B73DFB0A4F38B2D27B37E5F8BE9F098B8A44C2FEA0FCA3B1E03743B331A5D4A4
5,535,439 UART: Caliptra RT
5,535,690 UART: [state] CFI Enabled
5,903,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,905,062 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,935,144 UART: [rt]cmd =0x494e464f, len=4
5,938,832 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,957 UART: [state] LifecycleState = Unprovisioned
86,612 UART: [state] DebugLocked = No
87,110 UART: [state] WD Timer not started. Device not locked for debugging
88,287 UART: [kat] SHA2-256
893,937 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,062 UART: [kat] ++
898,214 UART: [kat] sha1
902,482 UART: [kat] SHA2-256
904,422 UART: [kat] SHA2-384
907,157 UART: [kat] SHA2-512-ACC
909,058 UART: [kat] ECC-384
918,523 UART: [kat] HMAC-384Kdf
923,217 UART: [kat] LMS
1,171,545 UART: [kat] --
1,172,656 UART: [cold-reset] ++
1,172,998 UART: [fht] FHT @ 0x50003400
1,175,855 UART: [idev] ++
1,176,023 UART: [idev] CDI.KEYID = 6
1,176,383 UART: [idev] SUBJECT.KEYID = 7
1,176,807 UART: [idev] UDS.KEYID = 0
1,177,152 ready_for_fw is high
1,177,152 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,185,033 UART: [idev] Erasing UDS.KEYID = 0
1,202,440 UART: [idev] Sha1 KeyId Algorithm
1,210,774 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,436 UART: [ldev] Erasing FE.KEYID = 1
1,244,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,826 UART: [ldev] --
1,284,143 UART: [fwproc] Wait for Commands...
1,284,907 UART: [fwproc] Recv command 0x46574c44
1,285,635 UART: [fwproc] Recv'd Img size: 82832 bytes
2,222,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,249,272 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,280,442 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,367,049 >>> mbox cmd response: success
2,367,049 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,368,079 UART: [afmc] ++
2,368,247 UART: [afmc] CDI.KEYID = 6
2,368,609 UART: [afmc] SUBJECT.KEYID = 7
2,369,034 UART: [afmc] AUTHORITY.KEYID = 5
2,405,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,421,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,422,320 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,428,029 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,433,912 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,439,613 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,447,329 UART: [afmc] --
2,448,343 UART: [cold-reset] --
2,449,161 UART: [state] Locking Datavault
2,450,278 UART: [state] Locking PCR0, PCR1 and PCR31
2,450,882 UART: [state] Locking ICCM
2,451,396 UART: [exit] Launching FMC @ 0x40000130
2,456,726 UART:
2,456,742 UART: Running Caliptra FMC ...
2,457,150 UART:
2,457,293 UART: [state] CFI Enabled
2,467,721 UART: [fht] FMC Alias Private Key: 7
2,586,853 UART: [art] Extend RT PCRs Done
2,587,281 UART: [art] Lock RT PCRs Done
2,588,741 UART: [art] Populate DV Done
2,597,330 UART: [fht] FMC Alias Private Key: 7
2,598,412 UART: [art] Derive CDI
2,598,692 UART: [art] Store in slot 0x4
2,684,417 UART: [art] Derive Key Pair
2,684,777 UART: [art] Store priv key in slot 0x5
2,697,597 UART: [art] Derive Key Pair - Done
2,712,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,727,642 UART: [art] Erasing AUTHORITY.KEYID = 7
2,728,407 UART: [art] PUB.X = ADAF7B16DEC01484194AEC3DD6D99DFE322B01F3E5E3872A4CADA1D5C3B5495810F800BD3D6E733B34303E5CC9103211
2,735,166 UART: [art] PUB.Y = 7CE8B9B5CC1EF83BD31875D8C031B75CE8115B6E704B77BC2715D57869D6872E4C4306F5C2C421505B19A2931F9CC6CD
2,742,119 UART: [art] SIG.R = 484D30CB22E7887838D6A86D67D24A701BACC8A4F5CBF7D5EC49BDB5B222053184AFE9ED3924C75488CEB3716C763CA0
2,748,898 UART: [art] SIG.S = FE823B5F34B0A7985955017063D207C28EFA2EBEFEB7C32DA1621A994FBB942012807D558B4F7AFE2BED4BE6D2083856
2,772,713 UART: mbox::rt_entry...
2,773,085 UART: ____ _ _ _ ____ _____
2,773,869 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,774,669 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,775,437 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,776,205 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,776,973 UART: |_|
2,777,285 UART:
2,895,383 UART: [rt] Runtime listening for mailbox commands...
2,901,717 >>> mbox cmd response data (4360 bytes)
2,901,718 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,932,500 >>> mbox cmd response data (0 bytes)
2,932,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,932,619 UART:
2,932,635 UART: Running Caliptra ROM ...
2,933,043 UART:
2,933,185 UART: [state] CFI Enabled
2,935,837 UART: [state] LifecycleState = Unprovisioned
2,936,492 UART: [state] DebugLocked = No
2,937,076 UART: [state] WD Timer not started. Device not locked for debugging
2,938,386 UART: [kat] SHA2-256
3,744,036 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,748,161 UART: [kat] ++
3,748,313 UART: [kat] sha1
3,752,605 UART: [kat] SHA2-256
3,754,545 UART: [kat] SHA2-384
3,757,198 UART: [kat] SHA2-512-ACC
3,759,098 UART: [kat] ECC-384
3,769,041 UART: [kat] HMAC-384Kdf
3,773,687 UART: [kat] LMS
4,022,015 UART: [kat] --
4,022,801 UART: [update-reset] ++
5,381,797 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,382,886 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,538,101 >>> mbox cmd response: success
5,538,342 UART: [update-reset] Copying MAN_2 To MAN_1
5,546,356 UART: [update-reset Success] --
5,547,393 UART: [state] Locking Datavault
5,548,091 UART: [state] Locking PCR0, PCR1 and PCR31
5,548,695 UART: [state] Locking ICCM
5,549,227 UART: [exit] Launching FMC @ 0x40000130
5,554,557 UART:
5,554,573 UART: Running Caliptra FMC ...
5,554,981 UART:
5,555,124 UART: [state] CFI Enabled
5,644,073 UART: [art] Extend RT PCRs Done
5,644,501 UART: [art] Lock RT PCRs Done
5,645,796 UART: [art] Populate DV Done
5,653,699 UART: [fht] FMC Alias Private Key: 7
5,654,695 UART: [art] Derive CDI
5,654,975 UART: [art] Store in slot 0x4
5,741,170 UART: [art] Derive Key Pair
5,741,530 UART: [art] Store priv key in slot 0x5
5,754,730 UART: [art] Derive Key Pair - Done
5,769,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,784,422 UART: [art] Erasing AUTHORITY.KEYID = 7
5,785,187 UART: [art] PUB.X = 6A82D45A528BE8A83288EC2543C7E6EF0797C8820AECFCFFFD5B8FDCB25152C1EF95FBF7F8D839BF7A6CF1F5F70F4A59
5,791,974 UART: [art] PUB.Y = AE3CD267590922949D6CCECCF59B5AD546A7ABA9EB5DD879C1D50A13880C2968E8092295CB95B2A2E41C0FDEDBEDD98D
5,798,931 UART: [art] SIG.R = 6E3ED2A7DC179EA9829F73BBD5B1F244B4AEBABFC32ACF41A1B1F7A99974DAB97D0CC99CBC7EEA4D9238FE11ACF34542
5,805,730 UART: [art] SIG.S = 847B7F1A5A019BCA5D102558685A21FA0B8EC10B2139619D154B8FD36D05FF5164AE3A9D9560841F9E181F5A60FBCD1B
5,829,396 UART: Caliptra RT
5,829,739 UART: [state] CFI Enabled
6,192,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,194,014 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,224,272 UART: [rt]cmd =0x494e464f, len=4
6,227,806 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,796 ready_for_fw is high
1,059,796 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,762 >>> mbox cmd response: success
2,217,762 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,279,831 UART:
2,279,847 UART: Running Caliptra FMC ...
2,280,255 UART:
2,280,398 UART: [state] CFI Enabled
2,290,926 UART: [fht] FMC Alias Private Key: 7
2,410,072 UART: [art] Extend RT PCRs Done
2,410,500 UART: [art] Lock RT PCRs Done
2,412,100 UART: [art] Populate DV Done
2,420,403 UART: [fht] FMC Alias Private Key: 7
2,421,415 UART: [art] Derive CDI
2,421,695 UART: [art] Store in slot 0x4
2,507,588 UART: [art] Derive Key Pair
2,507,948 UART: [art] Store priv key in slot 0x5
2,521,298 UART: [art] Derive Key Pair - Done
2,536,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,641 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,406 UART: [art] PUB.X = 34FB0A14E3A29422529D4D37C6CAA77305644055681ADB85287DFDD8143A803ECAE7537049355684437FE6BABE69E823
2,559,168 UART: [art] PUB.Y = 171CB6DDDCD80DAA46265B8DF9CDD3FEC6B64796A7318446ED30D27A44C97C75379ED15235D12A6B0F9187DAF6546DF5
2,566,126 UART: [art] SIG.R = 086E5C3AE0B7BB6896E032022B97023EF243AA3E9BD2C39AB6A15575BD8C43E8737805FF82BC13236859688A4264D2B3
2,572,884 UART: [art] SIG.S = 9487A8FCFC0EC701FD785065A232E838652DEC1CA7574E04B6F05115F0968D0A989510ABE8E2E10AE384A6FF69264627
2,596,973 UART: mbox::rt_entry...
2,597,345 UART: ____ _ _ _ ____ _____
2,598,129 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,929 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,697 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,465 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,233 UART: |_|
2,601,545 UART:
2,719,373 UART: [rt] Runtime listening for mailbox commands...
2,725,707 >>> mbox cmd response data (4360 bytes)
2,725,708 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,756,490 >>> mbox cmd response data (0 bytes)
2,756,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,245,624 >>> mbox cmd response: success
5,259,011 UART:
5,259,027 UART: Running Caliptra FMC ...
5,259,435 UART:
5,259,578 UART: [state] CFI Enabled
5,348,869 UART: [art] Extend RT PCRs Done
5,349,297 UART: [art] Lock RT PCRs Done
5,350,572 UART: [art] Populate DV Done
5,358,753 UART: [fht] FMC Alias Private Key: 7
5,359,833 UART: [art] Derive CDI
5,360,113 UART: [art] Store in slot 0x4
5,445,918 UART: [art] Derive Key Pair
5,446,278 UART: [art] Store priv key in slot 0x5
5,459,710 UART: [art] Derive Key Pair - Done
5,474,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,490,155 UART: [art] Erasing AUTHORITY.KEYID = 7
5,490,920 UART: [art] PUB.X = 682CFEB6256E58AEE8478ED65E8FFBC0ADC2FC8FC3A792C85477D83B6BB701F4C00408A6F2DA73A944C237AD3CEDAB83
5,497,705 UART: [art] PUB.Y = 621FECEA68F30370A385BEE1A19A765F3A404FD3F72B2BB1416FC9D9A1FB3B9CF0E8132501BA0C0B73B4DBCA4FBEC873
5,504,667 UART: [art] SIG.R = E683FE696291D9609E77E8C894D2A36D7FC6EC6AF6C8F097656E346E0BA8CBEB236C05E04AC96A11B3F8553A4516810B
5,511,436 UART: [art] SIG.S = A79DC96893301B671F4501979E8B42E2CA0DECEE21DDB0B8867565FFB749DFEC483936CC10B933C937B2C2D6B7890AF9
5,535,003 UART: Caliptra RT
5,535,346 UART: [state] CFI Enabled
5,900,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,902,342 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,932,764 UART: [rt]cmd =0x494e464f, len=4
5,936,234 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,120 UART:
192,493 UART: Running Caliptra ROM ...
193,683 UART:
193,841 UART: [state] CFI Enabled
270,164 UART: [state] LifecycleState = Unprovisioned
272,065 UART: [state] DebugLocked = No
273,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,477 UART: [kat] SHA2-256
448,216 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,689 UART: [kat] ++
459,177 UART: [kat] sha1
470,768 UART: [kat] SHA2-256
473,502 UART: [kat] SHA2-384
480,273 UART: [kat] SHA2-512-ACC
482,641 UART: [kat] ECC-384
2,767,002 UART: [kat] HMAC-384Kdf
2,799,713 UART: [kat] LMS
3,990,057 UART: [kat] --
3,994,411 UART: [cold-reset] ++
3,996,343 UART: [fht] Storing FHT @ 0x50003400
4,009,248 UART: [idev] ++
4,009,816 UART: [idev] CDI.KEYID = 6
4,010,729 UART: [idev] SUBJECT.KEYID = 7
4,011,977 UART: [idev] UDS.KEYID = 0
4,013,022 ready_for_fw is high
4,013,228 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,117,492 UART: [idev] Erasing UDS.KEYID = 0
7,346,217 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,128 UART: [idev] --
7,372,423 UART: [ldev] ++
7,372,997 UART: [ldev] CDI.KEYID = 6
7,373,964 UART: [ldev] SUBJECT.KEYID = 5
7,375,179 UART: [ldev] AUTHORITY.KEYID = 7
7,376,488 UART: [ldev] FE.KEYID = 1
7,422,512 UART: [ldev] Erasing FE.KEYID = 1
10,754,551 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,412 UART: [ldev] --
13,136,026 UART: [fwproc] Waiting for Commands...
13,137,967 UART: [fwproc] Received command 0x46574c44
13,140,149 UART: [fwproc] Received Image of size 82832 bytes
16,803,586 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,878,005 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,951,197 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,155,117 >>> mbox cmd response: success
17,156,214 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,158,469 UART: [afmc] ++
17,159,047 UART: [afmc] CDI.KEYID = 6
17,160,081 UART: [afmc] SUBJECT.KEYID = 7
17,161,255 UART: [afmc] AUTHORITY.KEYID = 5
20,516,513 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,814,212 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,816,476 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,830,927 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,845,664 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,860,047 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,882,131 UART: [afmc] --
22,885,840 UART: [cold-reset] --
22,890,691 UART: [state] Locking Datavault
22,895,730 UART: [state] Locking PCR0, PCR1 and PCR31
22,897,483 UART: [state] Locking ICCM
22,898,715 UART: [exit] Launching FMC @ 0x40000130
22,907,133 UART:
22,907,377 UART: Running Caliptra FMC ...
22,908,482 UART:
22,908,640 UART: [state] CFI Enabled
22,975,079 UART: [fht] FMC Alias Private Key: 7
25,315,348 UART: [art] Extend RT PCRs Done
25,316,570 UART: [art] Lock RT PCRs Done
25,318,464 UART: [art] Populate DV Done
25,323,984 UART: [fht] FMC Alias Private Key: 7
25,325,617 UART: [art] Derive CDI
25,326,437 UART: [art] Store in slot 0x4
25,383,889 UART: [art] Derive Key Pair
25,384,887 UART: [art] Store priv key in slot 0x5
28,678,053 UART: [art] Derive Key Pair - Done
28,691,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,980,107 UART: [art] Erasing AUTHORITY.KEYID = 7
30,981,641 UART: [art] PUB.X = 63D3D41CF53F35942353B43BEE2DB3872397FC93C3D6CE1CA8B13083888000E6C2BB1B9A7677426A8E9FE567B9C4684B
30,988,851 UART: [art] PUB.Y = 62B1B46794F0A3BC0778AE83198A2C9152303BFD30C99C5CF709517FD13877CEE0901098F58D5205FDD4C514B12FB59F
30,996,098 UART: [art] SIG.R = 6018B055B6E11D06811412331D1906626B147FD71180B9D09F6501B1097B43984AF19C2B4149A82BD2FE51F5E5854CFD
31,003,471 UART: [art] SIG.S = 6D1DDE967AE11B83E6291A8AD7760214761DA3368232A95E6AFC7F50CAA379D18D65ADBB21B4C97004873779F798D413
32,308,206 UART: mbox::rt_entry...
32,309,174 UART: ____ _ _ _ ____ _____
32,311,103 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,313,112 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,314,973 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,316,899 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,318,783 UART: |_|
32,319,666 UART:
32,450,745 UART: [rt] Runtime listening for mailbox commands...
32,458,010 >>> mbox cmd response data (4360 bytes)
32,478,743 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,523,125 >>> mbox cmd response data (0 bytes)
34,596,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,746,393 UART:
34,746,767 UART: Running Caliptra ROM ...
34,747,815 UART:
34,747,968 UART: [state] CFI Enabled
34,818,545 UART: [state] LifecycleState = Unprovisioned
34,820,499 UART: [state] DebugLocked = No
34,822,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,826,745 UART: [kat] SHA2-256
34,996,454 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,006,955 UART: [kat] ++
35,007,457 UART: [kat] sha1
35,017,809 UART: [kat] SHA2-256
35,020,514 UART: [kat] SHA2-384
35,026,125 UART: [kat] SHA2-512-ACC
35,028,528 UART: [kat] ECC-384
37,322,872 UART: [kat] HMAC-384Kdf
37,354,526 UART: [kat] LMS
38,544,841 UART: [kat] --
38,549,120 UART: [update-reset] ++
42,742,645 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,746,501 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,144,244 >>> mbox cmd response: success
43,148,847 UART: [update-reset] Copying MAN_2 To MAN_1
43,168,359 UART: [update-reset Success] --
43,172,160 UART: [state] Locking Datavault
43,175,323 UART: [state] Locking PCR0, PCR1 and PCR31
43,177,105 UART: [state] Locking ICCM
43,178,235 UART: [exit] Launching FMC @ 0x40000130
43,186,639 UART:
43,186,883 UART: Running Caliptra FMC ...
43,187,990 UART:
43,188,151 UART: [state] CFI Enabled
43,277,056 UART: [art] Extend RT PCRs Done
43,278,253 UART: [art] Lock RT PCRs Done
43,279,437 UART: [art] Populate DV Done
43,285,005 UART: [fht] FMC Alias Private Key: 7
43,286,494 UART: [art] Derive CDI
43,287,275 UART: [art] Store in slot 0x4
43,345,918 UART: [art] Derive Key Pair
43,346,961 UART: [art] Store priv key in slot 0x5
46,640,074 UART: [art] Derive Key Pair - Done
46,653,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,941,508 UART: [art] Erasing AUTHORITY.KEYID = 7
48,943,023 UART: [art] PUB.X = FFB2A3EA1303751A51FD5B5D89B38ABFE0825ACEA50F88D6E3C176F21B99C235A8D0CCCB32D17630F1DF1327B97574A6
48,950,301 UART: [art] PUB.Y = 671B382D4FC90B1B10F6267D0CB30A82F347DA671B88BF83BDD4A18032A34F1871EB27D24AA683E858DB38562F1DAB93
48,957,558 UART: [art] SIG.R = 7284C7D53D02C626FCF67FE611681EB4FEB58B1286F41A471E308AEB4398D5F25070AF8B9399CB2F707F073B6E068644
48,964,979 UART: [art] SIG.S = A3AD1A1F3668493361F8CC068318967711ADFBFC0B28C3D59243AC3E755864E39D62C41864B524C382526978FE8942A8
50,269,862 UART: Caliptra RT
50,270,573 UART: [state] CFI Enabled
53,677,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,679,434 UART: [rt] RT listening for mailbox commands...
53,710,832 UART: [rt]cmd =0x494e464f, len=4
53,714,890 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,804,861 ready_for_fw is high
3,805,288 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,258,533 >>> mbox cmd response: success
17,260,127 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,944,518 UART:
22,944,921 UART: Running Caliptra FMC ...
22,946,058 UART:
22,946,227 UART: [state] CFI Enabled
23,013,655 UART: [fht] FMC Alias Private Key: 7
25,375,223 UART: [art] Extend RT PCRs Done
25,376,443 UART: [art] Lock RT PCRs Done
25,377,796 UART: [art] Populate DV Done
25,383,098 UART: [fht] FMC Alias Private Key: 7
25,384,695 UART: [art] Derive CDI
25,385,508 UART: [art] Store in slot 0x4
25,442,741 UART: [art] Derive Key Pair
25,443,730 UART: [art] Store priv key in slot 0x5
28,736,761 UART: [art] Derive Key Pair - Done
28,749,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,038,657 UART: [art] Erasing AUTHORITY.KEYID = 7
31,040,179 UART: [art] PUB.X = F88BB30C520A84EF0017A8B86E979D433ADDD013951C6152A99624B5A24A2BEA7A47E9FC54F5848C4E0DEBA7ABD01477
31,047,468 UART: [art] PUB.Y = 90FF44FBCC4711A9ABABEADB3EB5B4047A4FAB3FDF42A92A448259A3F1CDE1B11C08E6972D65D8B8F867066BD03C58B6
31,054,744 UART: [art] SIG.R = 4CB9EB252C8072FFC1799228DDA5CDA44735215A5B0F542AA2107DBF81BA07BD03A26EE9EE0CCDCFD371D1930B91D25C
31,062,154 UART: [art] SIG.S = 84436E874D03DBFA0F3688AE9EAADF328714CE205B6ED511669D45BDEC701D879A78461D9E5A356190EEE1E3DF12B0A9
32,367,244 UART: mbox::rt_entry...
32,368,191 UART: ____ _ _ _ ____ _____
32,370,168 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,372,173 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,374,109 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,376,099 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,378,040 UART: |_|
32,378,855 UART:
32,510,581 UART: [rt] Runtime listening for mailbox commands...
32,517,799 >>> mbox cmd response data (4360 bytes)
32,538,422 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,582,811 >>> mbox cmd response data (0 bytes)
34,656,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,495,943 >>> mbox cmd response: success
43,528,877 UART:
43,529,229 UART: Running Caliptra FMC ...
43,530,306 UART:
43,530,467 UART: [state] CFI Enabled
43,633,251 UART: [art] Extend RT PCRs Done
43,634,448 UART: [art] Lock RT PCRs Done
43,635,773 UART: [art] Populate DV Done
43,641,460 UART: [fht] FMC Alias Private Key: 7
43,643,179 UART: [art] Derive CDI
43,643,919 UART: [art] Store in slot 0x4
43,702,415 UART: [art] Derive Key Pair
43,703,456 UART: [art] Store priv key in slot 0x5
46,995,967 UART: [art] Derive Key Pair - Done
47,009,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,297,033 UART: [art] Erasing AUTHORITY.KEYID = 7
49,298,558 UART: [art] PUB.X = AB9A4DCFEC8A1CBFD69FFF3E61C43E78DD59C4AF1D8E3F5E2B63C43E863508289F87EA21A9563A1F7F02CD5759F247B1
49,305,835 UART: [art] PUB.Y = 906F44A37DD6C66F2B5B55B830C77F44E1261A2F50098B891C0210169FC2CDEEB33C38D172C85A767DD8EF1A00BA38C6
49,313,087 UART: [art] SIG.R = 408FBC76D53C036A86B9C5427A25F2FE69037198E44260947CB3DD451A9714A5C4C0B7F1B28B690A4833813F181C06D9
49,320,443 UART: [art] SIG.S = 04CF7AC1313BC4ED9F3409A9ECC38EAA1B349E4E55167446CFAE3EDE7805D195F046D295C1BCF3523DF9329340F0EBEF
50,625,692 UART: Caliptra RT
50,626,408 UART: [state] CFI Enabled
54,033,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,034,614 UART: [rt] RT listening for mailbox commands...
54,065,948 UART: [rt]cmd =0x494e464f, len=4
54,070,387 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,599 UART:
192,964 UART: Running Caliptra ROM ...
194,103 UART:
603,758 UART: [state] CFI Enabled
616,151 UART: [state] LifecycleState = Unprovisioned
618,087 UART: [state] DebugLocked = No
619,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,193 UART: [kat] SHA2-256
794,919 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,439 UART: [kat] ++
805,908 UART: [kat] sha1
815,923 UART: [kat] SHA2-256
818,650 UART: [kat] SHA2-384
824,065 UART: [kat] SHA2-512-ACC
826,451 UART: [kat] ECC-384
3,110,471 UART: [kat] HMAC-384Kdf
3,122,262 UART: [kat] LMS
4,312,353 UART: [kat] --
4,318,140 UART: [cold-reset] ++
4,320,570 UART: [fht] Storing FHT @ 0x50003400
4,331,401 UART: [idev] ++
4,331,956 UART: [idev] CDI.KEYID = 6
4,332,981 UART: [idev] SUBJECT.KEYID = 7
4,334,144 UART: [idev] UDS.KEYID = 0
4,335,206 ready_for_fw is high
4,335,413 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,439,669 UART: [idev] Erasing UDS.KEYID = 0
7,621,642 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,337 UART: [idev] --
7,648,243 UART: [ldev] ++
7,648,846 UART: [ldev] CDI.KEYID = 6
7,649,763 UART: [ldev] SUBJECT.KEYID = 5
7,650,972 UART: [ldev] AUTHORITY.KEYID = 7
7,652,250 UART: [ldev] FE.KEYID = 1
7,662,296 UART: [ldev] Erasing FE.KEYID = 1
10,948,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,361 UART: [ldev] --
13,307,915 UART: [fwproc] Waiting for Commands...
13,310,581 UART: [fwproc] Received command 0x46574c44
13,312,781 UART: [fwproc] Received Image of size 82832 bytes
16,984,159 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,057,897 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,131,079 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,334,728 >>> mbox cmd response: success
17,335,768 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,338,063 UART: [afmc] ++
17,338,646 UART: [afmc] CDI.KEYID = 6
17,339,689 UART: [afmc] SUBJECT.KEYID = 7
17,340,782 UART: [afmc] AUTHORITY.KEYID = 5
20,657,616 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,951,662 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,953,973 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,968,363 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,983,100 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,997,552 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,019,186 UART: [afmc] --
23,022,344 UART: [cold-reset] --
23,024,753 UART: [state] Locking Datavault
23,029,415 UART: [state] Locking PCR0, PCR1 and PCR31
23,031,165 UART: [state] Locking ICCM
23,033,848 UART: [exit] Launching FMC @ 0x40000130
23,042,232 UART:
23,042,472 UART: Running Caliptra FMC ...
23,043,568 UART:
23,043,724 UART: [state] CFI Enabled
23,051,814 UART: [fht] FMC Alias Private Key: 7
25,391,863 UART: [art] Extend RT PCRs Done
25,393,086 UART: [art] Lock RT PCRs Done
25,394,792 UART: [art] Populate DV Done
25,400,143 UART: [fht] FMC Alias Private Key: 7
25,401,670 UART: [art] Derive CDI
25,402,401 UART: [art] Store in slot 0x4
25,445,414 UART: [art] Derive Key Pair
25,446,403 UART: [art] Store priv key in slot 0x5
28,688,432 UART: [art] Derive Key Pair - Done
28,701,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,981,780 UART: [art] Erasing AUTHORITY.KEYID = 7
30,983,290 UART: [art] PUB.X = BF679DF7229539B905B81CCB5066E190373A793D422802E185407C657818BA0D506DD25285ACB3F2BF113F0219084C7A
30,990,582 UART: [art] PUB.Y = 8CEDF7AF99FC74A59AB91100861A88F5BEF6864E04BA6F421A5263F757E7412940040DB412F507F855892AE80D0B70D8
30,997,785 UART: [art] SIG.R = 3A2F4057543B31E1750CDB4F2DFE18E02D7652AC90180F2C83136F47E62D03720889BF46A8A5D00E5AA5581F456AE7A9
31,005,120 UART: [art] SIG.S = F44A987A5DCD8D0E09F8F38885EF70A3B0DFA106577FE7C8B7227F22437811D746456208B3C1FC93E3BFCDAA0E3A3BB1
32,309,377 UART: mbox::rt_entry...
32,310,327 UART: ____ _ _ _ ____ _____
32,312,305 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,314,305 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,316,222 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,318,144 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,319,989 UART: |_|
32,320,878 UART:
32,451,565 UART: [rt] Runtime listening for mailbox commands...
32,458,791 >>> mbox cmd response data (4360 bytes)
32,479,378 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,523,754 >>> mbox cmd response data (0 bytes)
34,594,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,744,675 UART:
34,745,047 UART: Running Caliptra ROM ...
34,746,103 UART:
34,746,307 UART: [state] CFI Enabled
34,758,821 UART: [state] LifecycleState = Unprovisioned
34,760,761 UART: [state] DebugLocked = No
34,763,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,768,384 UART: [kat] SHA2-256
34,938,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,948,646 UART: [kat] ++
34,949,098 UART: [kat] sha1
34,959,116 UART: [kat] SHA2-256
34,961,858 UART: [kat] SHA2-384
34,966,648 UART: [kat] SHA2-512-ACC
34,969,041 UART: [kat] ECC-384
37,252,754 UART: [kat] HMAC-384Kdf
37,263,420 UART: [kat] LMS
38,453,489 UART: [kat] --
38,458,985 UART: [update-reset] ++
42,647,225 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,650,133 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,047,901 >>> mbox cmd response: success
43,052,526 UART: [update-reset] Copying MAN_2 To MAN_1
43,071,858 UART: [update-reset Success] --
43,075,171 UART: [state] Locking Datavault
43,078,321 UART: [state] Locking PCR0, PCR1 and PCR31
43,080,027 UART: [state] Locking ICCM
43,081,401 UART: [exit] Launching FMC @ 0x40000130
43,089,851 UART:
43,090,084 UART: Running Caliptra FMC ...
43,091,183 UART:
43,091,336 UART: [state] CFI Enabled
43,134,966 UART: [art] Extend RT PCRs Done
43,136,111 UART: [art] Lock RT PCRs Done
43,137,683 UART: [art] Populate DV Done
43,143,192 UART: [fht] FMC Alias Private Key: 7
43,144,938 UART: [art] Derive CDI
43,145,743 UART: [art] Store in slot 0x4
43,187,898 UART: [art] Derive Key Pair
43,188,945 UART: [art] Store priv key in slot 0x5
46,430,948 UART: [art] Derive Key Pair - Done
46,443,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,724,453 UART: [art] Erasing AUTHORITY.KEYID = 7
48,725,955 UART: [art] PUB.X = 21C4903A96478BE773D0187F93D28A02761CCA96B306A69FDD9E4D6FCC0A73674B1280EFA78A7DD7E32F856291CCE6F1
48,733,216 UART: [art] PUB.Y = 39A8A0D831EE6728F8F090233D32A1C0E481A9B9BA8C415D517ED3EFBCBE5E49B758B78DE890D398720F4124A0AE747A
48,740,505 UART: [art] SIG.R = 8E85BA13D24B1D12983A154CE577B315AC165F9E4734372A471BFC0ED521D6389F7FA89C8B919DEB403C3B0D6E5D7F5F
48,747,896 UART: [art] SIG.S = 2F672C0F7752026B713341A5E6C7FFEE69A3ED380A6FA614486EB6736CE51681CAFEAAEE59CBE67798756B55F74668B4
50,053,198 UART: Caliptra RT
50,053,912 UART: [state] CFI Enabled
53,352,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,353,470 UART: [rt] RT listening for mailbox commands...
53,385,073 UART: [rt]cmd =0x494e464f, len=4
53,389,577 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
4,128,221 ready_for_fw is high
4,128,885 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,435,038 >>> mbox cmd response: success
17,436,307 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
23,074,885 UART:
23,075,324 UART: Running Caliptra FMC ...
23,076,467 UART:
23,076,636 UART: [state] CFI Enabled
23,084,703 UART: [fht] FMC Alias Private Key: 7
25,424,313 UART: [art] Extend RT PCRs Done
25,425,554 UART: [art] Lock RT PCRs Done
25,427,460 UART: [art] Populate DV Done
25,433,037 UART: [fht] FMC Alias Private Key: 7
25,434,687 UART: [art] Derive CDI
25,435,499 UART: [art] Store in slot 0x4
25,478,360 UART: [art] Derive Key Pair
25,479,569 UART: [art] Store priv key in slot 0x5
28,721,290 UART: [art] Derive Key Pair - Done
28,734,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,014,261 UART: [art] Erasing AUTHORITY.KEYID = 7
31,015,789 UART: [art] PUB.X = 5129E7F555B76557957183DF2B864F4F101F2766EC5AD93A0B9B239F907A7DA21A69ECC9C2C90D252C2CD6FE14865FCC
31,023,057 UART: [art] PUB.Y = 67F4197F55BE04CDFA67A7CB8D21F35F9B311D78B8B3C85A61EF48C76996679DF6DD901C046ED15D5E2EACF5096E8006
31,030,306 UART: [art] SIG.R = C4D375BA34DBF0615836CA912DC37BAA48D09A6C511556F052D07BA1E086F00AC069E2F17FCD3505F2E1A94ADCF273CE
31,037,705 UART: [art] SIG.S = AD90D7CE6B7415008A894AFEB4C23726599C5D9C7DFBA798EDE9A62B6F1CF9B568819EA453E29D56BDBBDAC17E968064
32,342,120 UART: mbox::rt_entry...
32,343,067 UART: ____ _ _ _ ____ _____
32,345,045 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,347,045 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,348,970 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,350,959 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,352,886 UART: |_|
32,353,692 UART:
32,486,491 UART: [rt] Runtime listening for mailbox commands...
32,493,656 >>> mbox cmd response data (4360 bytes)
32,514,268 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,558,795 >>> mbox cmd response data (0 bytes)
34,631,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,380,543 >>> mbox cmd response: success
43,415,039 UART:
43,415,377 UART: Running Caliptra FMC ...
43,416,506 UART:
43,416,672 UART: [state] CFI Enabled
43,460,741 UART: [art] Extend RT PCRs Done
43,461,883 UART: [art] Lock RT PCRs Done
43,463,064 UART: [art] Populate DV Done
43,468,689 UART: [fht] FMC Alias Private Key: 7
43,470,432 UART: [art] Derive CDI
43,471,239 UART: [art] Store in slot 0x4
43,513,837 UART: [art] Derive Key Pair
43,514,902 UART: [art] Store priv key in slot 0x5
46,757,521 UART: [art] Derive Key Pair - Done
46,770,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,050,207 UART: [art] Erasing AUTHORITY.KEYID = 7
49,051,734 UART: [art] PUB.X = 2FEED5DF65AA7DEFA8FB87D6C12FA35BB88AF5FA57B3A4F7FB2FD00B4D2A7171BF5EAAA3C3BBE3CD04A4D47F33C9C151
49,058,999 UART: [art] PUB.Y = 60A86B7742954F0C38C3190E764CAA0DEB23E201F77F195B804E08E2DF28159CDBF459A0294CEAB41DB62AB06D51E125
49,066,251 UART: [art] SIG.R = C298FBE1639A9D0DA9539A742F178596493C91B62F5AE3F64AC854519D8B1C4A7B7DBC6ECB3EBC637B180B45ACAE2029
49,073,658 UART: [art] SIG.S = 927C416B45F5BC1D1E86E72985642CE230EB5D3205E29A35C6B0FC81F9C9B213103C8689700F1132D00BEC154BB0143D
50,378,993 UART: Caliptra RT
50,379,723 UART: [state] CFI Enabled
53,678,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,679,678 UART: [rt] RT listening for mailbox commands...
53,710,856 UART: [rt]cmd =0x494e464f, len=4
53,715,314 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,085 UART:
192,442 UART: Running Caliptra ROM ...
193,559 UART:
193,709 UART: [state] CFI Enabled
262,505 UART: [state] LifecycleState = Unprovisioned
264,362 UART: [state] DebugLocked = No
266,798 UART: [state] WD Timer not started. Device not locked for debugging
271,120 UART: [kat] SHA2-256
450,814 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,552 UART: [kat] ++
462,081 UART: [kat] sha1
473,806 UART: [kat] SHA2-256
476,521 UART: [kat] SHA2-384
482,644 UART: [kat] SHA2-512-ACC
485,000 UART: [kat] ECC-384
2,948,047 UART: [kat] HMAC-384Kdf
2,971,502 UART: [kat] LMS
3,447,971 UART: [kat] --
3,452,371 UART: [cold-reset] ++
3,454,019 UART: [fht] FHT @ 0x50003400
3,466,281 UART: [idev] ++
3,466,848 UART: [idev] CDI.KEYID = 6
3,467,931 UART: [idev] SUBJECT.KEYID = 7
3,469,052 UART: [idev] UDS.KEYID = 0
3,470,103 ready_for_fw is high
3,470,305 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,575,041 UART: [idev] Erasing UDS.KEYID = 0
5,985,840 UART: [idev] Sha1 KeyId Algorithm
6,009,464 UART: [idev] --
6,014,321 UART: [ldev] ++
6,014,893 UART: [ldev] CDI.KEYID = 6
6,015,801 UART: [ldev] SUBJECT.KEYID = 5
6,017,015 UART: [ldev] AUTHORITY.KEYID = 7
6,018,244 UART: [ldev] FE.KEYID = 1
6,058,514 UART: [ldev] Erasing FE.KEYID = 1
8,561,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,185 UART: [ldev] --
10,373,512 UART: [fwproc] Wait for Commands...
10,375,492 UART: [fwproc] Recv command 0x46574c44
10,377,466 UART: [fwproc] Recv'd Img size: 82832 bytes
13,426,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,508,008 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,581,016 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,785,021 >>> mbox cmd response: success
13,786,032 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,788,619 UART: [afmc] ++
13,789,258 UART: [afmc] CDI.KEYID = 6
13,790,142 UART: [afmc] SUBJECT.KEYID = 7
13,791,357 UART: [afmc] AUTHORITY.KEYID = 5
16,320,345 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,042,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,044,915 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,060,752 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,076,785 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,092,335 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,116,083 UART: [afmc] --
18,119,154 UART: [cold-reset] --
18,122,096 UART: [state] Locking Datavault
18,126,474 UART: [state] Locking PCR0, PCR1 and PCR31
18,128,219 UART: [state] Locking ICCM
18,130,174 UART: [exit] Launching FMC @ 0x40000130
18,138,615 UART:
18,138,868 UART: Running Caliptra FMC ...
18,139,968 UART:
18,140,121 UART: [state] CFI Enabled
18,200,622 UART: [fht] FMC Alias Private Key: 7
19,967,471 UART: [art] Extend RT PCRs Done
19,968,675 UART: [art] Lock RT PCRs Done
19,970,267 UART: [art] Populate DV Done
19,975,455 UART: [fht] FMC Alias Private Key: 7
19,977,202 UART: [art] Derive CDI
19,977,937 UART: [art] Store in slot 0x4
20,033,765 UART: [art] Derive Key Pair
20,034,811 UART: [art] Store priv key in slot 0x5
22,497,425 UART: [art] Derive Key Pair - Done
22,510,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,223,864 UART: [art] Erasing AUTHORITY.KEYID = 7
24,225,347 UART: [art] PUB.X = C46A32762276C58118E7F440261B58FDBE37685F8098668281B11754057F369976CFB706E705982B5CA43D765A66C1B4
24,232,616 UART: [art] PUB.Y = AB8E5A9A455AF09FBDD90498F4F7FC141FB0A6B715C06159A5001620945728D86B12450581BF255E390EDDA8975CB92A
24,239,856 UART: [art] SIG.R = 0E586B685C1B02920988168494CC30BD3AF1441316FD2B5644A944CE68E720A283884C5A7357541B4C1C78588CFF771E
24,247,203 UART: [art] SIG.S = 2C054871592E0F09D7EA92179B4059D6F978F35ED3D407672EEE336F91BC3DE7959E047D37FF996C4C6757856227A83F
25,226,745 UART: mbox::rt_entry...
25,227,836 UART: ____ _ _ _ ____ _____
25,229,826 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,231,839 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,233,766 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,235,689 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,237,613 UART: |_|
25,238,417 UART:
25,369,473 UART: [rt] Runtime listening for mailbox commands...
25,376,667 >>> mbox cmd response data (4360 bytes)
25,397,407 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,441,771 >>> mbox cmd response data (0 bytes)
27,511,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,661,647 UART:
27,662,013 UART: Running Caliptra ROM ...
27,663,065 UART:
27,663,222 UART: [state] CFI Enabled
27,718,501 UART: [state] LifecycleState = Unprovisioned
27,720,485 UART: [state] DebugLocked = No
27,721,868 UART: [state] WD Timer not started. Device not locked for debugging
27,725,711 UART: [kat] SHA2-256
27,905,382 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,916,148 UART: [kat] ++
27,916,649 UART: [kat] sha1
27,928,289 UART: [kat] SHA2-256
27,931,029 UART: [kat] SHA2-384
27,936,579 UART: [kat] SHA2-512-ACC
27,938,931 UART: [kat] ECC-384
30,383,194 UART: [kat] HMAC-384Kdf
30,406,020 UART: [kat] LMS
30,882,467 UART: [kat] --
30,886,584 UART: [update-reset] ++
34,389,532 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,392,462 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,790,110 >>> mbox cmd response: success
34,794,666 UART: [update-reset] Copying MAN_2 To MAN_1
34,829,223 UART: [update-reset Success] --
34,833,133 UART: [state] Locking Datavault
34,836,398 UART: [state] Locking PCR0, PCR1 and PCR31
34,838,169 UART: [state] Locking ICCM
34,839,780 UART: [exit] Launching FMC @ 0x40000130
34,848,125 UART:
34,848,361 UART: Running Caliptra FMC ...
34,849,462 UART:
34,849,618 UART: [state] CFI Enabled
34,939,566 UART: [art] Extend RT PCRs Done
34,940,761 UART: [art] Lock RT PCRs Done
34,942,265 UART: [art] Populate DV Done
34,947,777 UART: [fht] FMC Alias Private Key: 7
34,949,364 UART: [art] Derive CDI
34,950,174 UART: [art] Store in slot 0x4
35,008,407 UART: [art] Derive Key Pair
35,009,462 UART: [art] Store priv key in slot 0x5
37,472,099 UART: [art] Derive Key Pair - Done
37,485,156 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,197,514 UART: [art] Erasing AUTHORITY.KEYID = 7
39,199,015 UART: [art] PUB.X = FEDF5CC68122EBD02459CA90AF34BE62EA0147DF38D9F800B7646E23C2F60121D6FB767F3702546FFE16AA7715C03BDD
39,206,275 UART: [art] PUB.Y = EA5856C96583C557354F5D64AF0EC0FA87105208A8999B05B5370E886BE232F355C9334E756BE44BE6ECA68F43CC5A1C
39,213,563 UART: [art] SIG.R = 8D6DD0C48995E6B9E28113080D0448E7AF08F9BFFEC5BA63FF6A487D21AEB165E7FF95BD3F97DAE730D99807998D1FE0
39,220,962 UART: [art] SIG.S = 4659E4867BBB5750578CF1BA526D80C0C82AE92FCF7D454E32C59A3BAC333E7ACC46C53ED2F0468F7432E630CA57E5E2
40,199,992 UART: Caliptra RT
40,200,711 UART: [state] CFI Enabled
42,783,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,784,387 UART: [rt] RT listening for mailbox commands...
42,815,938 UART: [rt]cmd =0x494e464f, len=4
42,820,254 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,464,446 ready_for_fw is high
3,464,830 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,696,031 >>> mbox cmd response: success
13,697,554 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,983,479 UART:
17,983,867 UART: Running Caliptra FMC ...
17,984,979 UART:
17,985,133 UART: [state] CFI Enabled
18,050,493 UART: [fht] FMC Alias Private Key: 7
19,837,745 UART: [art] Extend RT PCRs Done
19,839,182 UART: [art] Lock RT PCRs Done
19,840,563 UART: [art] Populate DV Done
19,845,870 UART: [fht] FMC Alias Private Key: 7
19,847,412 UART: [art] Derive CDI
19,848,227 UART: [art] Store in slot 0x4
19,903,942 UART: [art] Derive Key Pair
19,904,940 UART: [art] Store priv key in slot 0x5
22,367,349 UART: [art] Derive Key Pair - Done
22,380,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,093,283 UART: [art] Erasing AUTHORITY.KEYID = 7
24,094,791 UART: [art] PUB.X = EC87E402F5888CDDF31CB63D1F78149EEE8DD0DEFFD1C2CD336C56116B040AA68B5B3D37B8BCE3FE0627D95808704238
24,102,100 UART: [art] PUB.Y = 191320F3449FD1795B4BC05BE5834815C2DA12B7246FB699616F1228ED72F43A4BE148DDF8EF70F0C39145C83D7AF4FF
24,109,340 UART: [art] SIG.R = 7F5B3E0B3D404E3C866ADE18BE52029A8B2A8394D78D50E4BCC5ED6D6A7BA61C305A8FA9D911365649BA10E1472C253D
24,116,736 UART: [art] SIG.S = 7E10DFEE516BD6AE99577B04ECC9ECD50BBDFDBD9B9D39B86887476DEB05B580B5434C37417AAC93669AE427558B4274
25,094,974 UART: mbox::rt_entry...
25,095,947 UART: ____ _ _ _ ____ _____
25,097,934 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,099,937 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,101,865 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,103,868 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,105,797 UART: |_|
25,106,605 UART:
25,236,867 UART: [rt] Runtime listening for mailbox commands...
25,244,076 >>> mbox cmd response data (4360 bytes)
25,264,617 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,308,937 >>> mbox cmd response data (0 bytes)
27,365,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,678,971 >>> mbox cmd response: success
34,715,253 UART:
34,715,567 UART: Running Caliptra FMC ...
34,716,685 UART:
34,716,849 UART: [state] CFI Enabled
34,810,366 UART: [art] Extend RT PCRs Done
34,811,588 UART: [art] Lock RT PCRs Done
34,812,915 UART: [art] Populate DV Done
34,818,333 UART: [fht] FMC Alias Private Key: 7
34,819,813 UART: [art] Derive CDI
34,820,623 UART: [art] Store in slot 0x4
34,879,563 UART: [art] Derive Key Pair
34,880,600 UART: [art] Store priv key in slot 0x5
37,343,538 UART: [art] Derive Key Pair - Done
37,356,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,069,746 UART: [art] Erasing AUTHORITY.KEYID = 7
39,071,246 UART: [art] PUB.X = AB227F5778C25568333EFC73B5EA2B6446657FC3343CFD9A0C8E68D1F12379AC42560FA816DADC7A50D3E152E3E6CCF2
39,078,494 UART: [art] PUB.Y = 2C094B0E62724CE2B26C8C0D3C55E798BD1834D2898891AF70379A751362FDAD7B9C444E1BF9A67E767542D1AB7BC2BB
39,085,786 UART: [art] SIG.R = 4C9D34ECE68848E53068CAF3E6BA5FEE549977FC2CE2AAB3786AA7F88709342D1BF905D8BECB417A0C1AAF5A56301A67
39,093,178 UART: [art] SIG.S = 8AECB48BF486A44035C91B352D586EA5471614585EB087ACAD2C9A4B42DE4E268085787F9B124098C428A0F3D23CDDF2
40,072,021 UART: Caliptra RT
40,072,728 UART: [state] CFI Enabled
42,655,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,656,768 UART: [rt] RT listening for mailbox commands...
42,688,150 UART: [rt]cmd =0x494e464f, len=4
42,692,375 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,461 UART:
192,827 UART: Running Caliptra ROM ...
193,955 UART:
603,557 UART: [state] CFI Enabled
618,287 UART: [state] LifecycleState = Unprovisioned
620,157 UART: [state] DebugLocked = No
621,695 UART: [state] WD Timer not started. Device not locked for debugging
625,240 UART: [kat] SHA2-256
804,903 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,714 UART: [kat] ++
816,161 UART: [kat] sha1
826,610 UART: [kat] SHA2-256
829,330 UART: [kat] SHA2-384
835,536 UART: [kat] SHA2-512-ACC
837,908 UART: [kat] ECC-384
3,277,853 UART: [kat] HMAC-384Kdf
3,288,895 UART: [kat] LMS
3,765,383 UART: [kat] --
3,769,806 UART: [cold-reset] ++
3,772,187 UART: [fht] FHT @ 0x50003400
3,782,530 UART: [idev] ++
3,783,096 UART: [idev] CDI.KEYID = 6
3,784,138 UART: [idev] SUBJECT.KEYID = 7
3,785,319 UART: [idev] UDS.KEYID = 0
3,786,243 ready_for_fw is high
3,786,432 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,890,646 UART: [idev] Erasing UDS.KEYID = 0
6,262,587 UART: [idev] Sha1 KeyId Algorithm
6,286,024 UART: [idev] --
6,290,974 UART: [ldev] ++
6,291,554 UART: [ldev] CDI.KEYID = 6
6,292,469 UART: [ldev] SUBJECT.KEYID = 5
6,293,685 UART: [ldev] AUTHORITY.KEYID = 7
6,294,917 UART: [ldev] FE.KEYID = 1
6,307,020 UART: [ldev] Erasing FE.KEYID = 1
8,785,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,601 UART: [ldev] --
10,582,919 UART: [fwproc] Wait for Commands...
10,586,039 UART: [fwproc] Recv command 0x46574c44
10,588,089 UART: [fwproc] Recv'd Img size: 82832 bytes
13,630,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,712,140 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,785,128 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,988,900 >>> mbox cmd response: success
13,989,906 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,993,654 UART: [afmc] ++
13,994,239 UART: [afmc] CDI.KEYID = 6
13,995,224 UART: [afmc] SUBJECT.KEYID = 7
13,996,394 UART: [afmc] AUTHORITY.KEYID = 5
16,494,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,215,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,217,823 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,233,647 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,249,669 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,265,246 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,289,424 UART: [afmc] --
18,293,274 UART: [cold-reset] --
18,297,364 UART: [state] Locking Datavault
18,304,289 UART: [state] Locking PCR0, PCR1 and PCR31
18,305,993 UART: [state] Locking ICCM
18,308,478 UART: [exit] Launching FMC @ 0x40000130
18,316,874 UART:
18,317,110 UART: Running Caliptra FMC ...
18,318,232 UART:
18,318,397 UART: [state] CFI Enabled
18,326,402 UART: [fht] FMC Alias Private Key: 7
20,092,312 UART: [art] Extend RT PCRs Done
20,093,710 UART: [art] Lock RT PCRs Done
20,095,317 UART: [art] Populate DV Done
20,100,620 UART: [fht] FMC Alias Private Key: 7
20,102,124 UART: [art] Derive CDI
20,102,886 UART: [art] Store in slot 0x4
20,145,312 UART: [art] Derive Key Pair
20,146,350 UART: [art] Store priv key in slot 0x5
22,573,171 UART: [art] Derive Key Pair - Done
22,585,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,293,092 UART: [art] Erasing AUTHORITY.KEYID = 7
24,294,607 UART: [art] PUB.X = 536C7FD42DD42663A668C57E0D8875863A579EAAD4FA07E8294B0CA733EA54DC5CCA10052DD6621BD32AB600301AB1E0
24,301,912 UART: [art] PUB.Y = BC8713220DC8B5D76529153ADF72CEEF1971BAAFA44FE8E61C3A527680023B9D13B5434F49F35A4950CF87FC46B7614F
24,309,153 UART: [art] SIG.R = 9767C1456113FE7D6BD085018A73D99F8F9C604B0DBC35AC9D89132A953F83F74B1B9B865E030A853D3A48C01BAC9326
24,316,546 UART: [art] SIG.S = 2F462F4DE605A3478145E8721453C84BA57879625DF29E3BCCAB7AE7869198BC88168490CC74CA6BDF29D617A348E702
25,294,848 UART: mbox::rt_entry...
25,295,805 UART: ____ _ _ _ ____ _____
25,297,790 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,299,799 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,301,739 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,303,678 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,305,539 UART: |_|
25,306,423 UART:
25,438,200 UART: [rt] Runtime listening for mailbox commands...
25,445,467 >>> mbox cmd response data (4360 bytes)
25,466,041 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,510,427 >>> mbox cmd response data (0 bytes)
27,570,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,720,118 UART:
27,720,485 UART: Running Caliptra ROM ...
27,721,547 UART:
27,721,753 UART: [state] CFI Enabled
27,737,542 UART: [state] LifecycleState = Unprovisioned
27,739,441 UART: [state] DebugLocked = No
27,740,798 UART: [state] WD Timer not started. Device not locked for debugging
27,744,370 UART: [kat] SHA2-256
27,924,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,934,866 UART: [kat] ++
27,935,321 UART: [kat] sha1
27,946,712 UART: [kat] SHA2-256
27,949,406 UART: [kat] SHA2-384
27,955,341 UART: [kat] SHA2-512-ACC
27,957,698 UART: [kat] ECC-384
30,401,901 UART: [kat] HMAC-384Kdf
30,414,031 UART: [kat] LMS
30,890,500 UART: [kat] --
30,895,891 UART: [update-reset] ++
34,393,763 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,397,079 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,794,688 >>> mbox cmd response: success
34,799,237 UART: [update-reset] Copying MAN_2 To MAN_1
34,832,408 UART: [update-reset Success] --
34,836,725 UART: [state] Locking Datavault
34,839,177 UART: [state] Locking PCR0, PCR1 and PCR31
34,840,936 UART: [state] Locking ICCM
34,843,016 UART: [exit] Launching FMC @ 0x40000130
34,850,993 UART:
34,851,252 UART: Running Caliptra FMC ...
34,852,358 UART:
34,852,518 UART: [state] CFI Enabled
34,896,019 UART: [art] Extend RT PCRs Done
34,897,181 UART: [art] Lock RT PCRs Done
34,898,475 UART: [art] Populate DV Done
34,904,153 UART: [fht] FMC Alias Private Key: 7
34,905,692 UART: [art] Derive CDI
34,906,512 UART: [art] Store in slot 0x4
34,949,320 UART: [art] Derive Key Pair
34,950,448 UART: [art] Store priv key in slot 0x5
37,377,176 UART: [art] Derive Key Pair - Done
37,389,845 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,096,499 UART: [art] Erasing AUTHORITY.KEYID = 7
39,098,005 UART: [art] PUB.X = 409D05E72E0D028A4BA0B1D1A229B33525209C428F322BA843632074A30BD6C8631E65DE1B573D2C321F585963440A65
39,105,220 UART: [art] PUB.Y = 06F02F1973BC6370664156C22A193B4C8CDF12D1B57B99B6FF106C4A52C9131B9E350064B63FA07B46CB4E425CE5FDA9
39,112,471 UART: [art] SIG.R = 4059C0328484CA81BB95AC29EA55A894703BB8A0696E71D7E33F90A3282E2FBAD6FBBFCA5DCA266522B4E6DC092365A1
39,119,888 UART: [art] SIG.S = F79A6FE75FB5EDBFB409FE9FB65263C402E971727BBCE8E2C6F5F1708DBCD2DE2B5D2A260ECA93D6427F070A8E9F7CF9
40,098,766 UART: Caliptra RT
40,099,468 UART: [state] CFI Enabled
42,580,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,582,404 UART: [rt] RT listening for mailbox commands...
42,613,531 UART: [rt]cmd =0x494e464f, len=4
42,617,789 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,774,979 ready_for_fw is high
3,775,543 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,871,372 >>> mbox cmd response: success
13,872,589 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,119,786 UART:
18,120,154 UART: Running Caliptra FMC ...
18,121,265 UART:
18,121,419 UART: [state] CFI Enabled
18,129,528 UART: [fht] FMC Alias Private Key: 7
19,895,739 UART: [art] Extend RT PCRs Done
19,896,950 UART: [art] Lock RT PCRs Done
19,898,792 UART: [art] Populate DV Done
19,904,257 UART: [fht] FMC Alias Private Key: 7
19,905,762 UART: [art] Derive CDI
19,906,549 UART: [art] Store in slot 0x4
19,948,824 UART: [art] Derive Key Pair
19,949,827 UART: [art] Store priv key in slot 0x5
22,376,116 UART: [art] Derive Key Pair - Done
22,389,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,095,464 UART: [art] Erasing AUTHORITY.KEYID = 7
24,096,955 UART: [art] PUB.X = 81DD4C3AF42C56C11CC1D11242D9263478B1412690613EF38B7B9BF49B79EBEACA9D102425A75BF00D16E3738F88D3AC
24,104,207 UART: [art] PUB.Y = 9EDF37BBA03EEFFCA08C843B0B09CBEBEBEEC72196A4074BB677292BD6E2F549782A3A2A7861D922ECF0268992EA61F7
24,111,508 UART: [art] SIG.R = 9B7B40AB76A7ABD7CA672D8C03D749A820E645BC138F59AD0CBEF1FF18B2E256B455159BAF4030D4A24CFEB9E86C52AF
24,118,970 UART: [art] SIG.S = 18DC39AF610F6A8CB79B083697D28063F75F1F0934F45566685557275236B93001A252F680CAF68F66BFD8333795103F
25,097,362 UART: mbox::rt_entry...
25,098,329 UART: ____ _ _ _ ____ _____
25,100,265 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,102,271 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,104,125 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,106,125 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,108,003 UART: |_|
25,108,902 UART:
25,240,999 UART: [rt] Runtime listening for mailbox commands...
25,248,201 >>> mbox cmd response data (4360 bytes)
25,268,891 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,313,269 >>> mbox cmd response data (0 bytes)
27,368,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,595,218 >>> mbox cmd response: success
34,627,999 UART:
34,628,335 UART: Running Caliptra FMC ...
34,629,405 UART:
34,629,563 UART: [state] CFI Enabled
34,673,598 UART: [art] Extend RT PCRs Done
34,674,753 UART: [art] Lock RT PCRs Done
34,675,908 UART: [art] Populate DV Done
34,681,370 UART: [fht] FMC Alias Private Key: 7
34,683,069 UART: [art] Derive CDI
34,683,812 UART: [art] Store in slot 0x4
34,726,619 UART: [art] Derive Key Pair
34,727,689 UART: [art] Store priv key in slot 0x5
37,154,313 UART: [art] Derive Key Pair - Done
37,167,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,873,446 UART: [art] Erasing AUTHORITY.KEYID = 7
38,874,948 UART: [art] PUB.X = B49296B5CF43E4763397C9D24D2DEEDF9834D8B83FA750919A5806EA2EEA413616DDA04C9B6C992B700AD7F94D5BF2F2
38,882,203 UART: [art] PUB.Y = 4E7C3C9D403689D0110B7C7BA71D7AE619340931EDF4BB7CD96CC69C0F127CC69A2B42A40E23F538B5D1FBE6022F5FEA
38,889,498 UART: [art] SIG.R = 1B15C2055F1CCA758F198BB31AAC03597C54D7BA672CC698B72F75945E20FEE7DB015F2CAE82C8D20D5C3B76FA87EA6D
38,896,906 UART: [art] SIG.S = C9BFD6C85C09484AE93C8D67D3E1DBC0914483D2BE9C79E2ABB3A1C6239A3F91A94481508998B1772B533D7CA7494234
39,875,819 UART: Caliptra RT
39,876,519 UART: [state] CFI Enabled
42,358,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,360,240 UART: [rt] RT listening for mailbox commands...
42,391,418 UART: [rt]cmd =0x494e464f, len=4
42,395,721 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,116 UART:
192,488 UART: Running Caliptra ROM ...
193,645 UART:
193,799 UART: [state] CFI Enabled
263,224 UART: [state] LifecycleState = Unprovisioned
265,578 UART: [state] DebugLocked = No
267,664 UART: [state] WD Timer not started. Device not locked for debugging
270,377 UART: [kat] SHA2-256
460,285 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,033 UART: [kat] ++
471,516 UART: [kat] sha1
482,954 UART: [kat] SHA2-256
485,953 UART: [kat] SHA2-384
492,302 UART: [kat] SHA2-512-ACC
494,880 UART: [kat] ECC-384
2,947,110 UART: [kat] HMAC-384Kdf
2,971,771 UART: [kat] LMS
3,503,556 UART: [kat] --
3,508,033 UART: [cold-reset] ++
3,510,402 UART: [fht] FHT @ 0x50003400
3,521,449 UART: [idev] ++
3,522,147 UART: [idev] CDI.KEYID = 6
3,523,065 UART: [idev] SUBJECT.KEYID = 7
3,524,305 UART: [idev] UDS.KEYID = 0
3,525,228 ready_for_fw is high
3,525,441 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,629,925 UART: [idev] Erasing UDS.KEYID = 0
6,027,088 UART: [idev] Sha1 KeyId Algorithm
6,049,198 UART: [idev] --
6,054,271 UART: [ldev] ++
6,054,951 UART: [ldev] CDI.KEYID = 6
6,055,916 UART: [ldev] SUBJECT.KEYID = 5
6,057,068 UART: [ldev] AUTHORITY.KEYID = 7
6,058,300 UART: [ldev] FE.KEYID = 1
6,099,628 UART: [ldev] Erasing FE.KEYID = 1
8,607,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,323 UART: [ldev] --
10,413,024 UART: [fwproc] Wait for Commands...
10,414,849 UART: [fwproc] Recv command 0x46574c44
10,417,098 UART: [fwproc] Recv'd Img size: 82832 bytes
13,462,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,539,948 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,663,571 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,009,108 >>> mbox cmd response: success
14,010,203 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,014,067 UART: [afmc] ++
14,014,797 UART: [afmc] CDI.KEYID = 6
14,015,996 UART: [afmc] SUBJECT.KEYID = 7
14,017,350 UART: [afmc] AUTHORITY.KEYID = 5
16,553,971 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,276,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,278,752 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,293,869 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,309,017 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,323,897 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,347,619 UART: [afmc] --
18,350,223 UART: [cold-reset] --
18,355,284 UART: [state] Locking Datavault
18,359,560 UART: [state] Locking PCR0, PCR1 and PCR31
18,361,743 UART: [state] Locking ICCM
18,363,562 UART: [exit] Launching FMC @ 0x40000130
18,372,226 UART:
18,372,475 UART: Running Caliptra FMC ...
18,373,573 UART:
18,373,729 UART: [state] CFI Enabled
18,434,055 UART: [fht] FMC Alias Private Key: 7
20,200,144 UART: [art] Extend RT PCRs Done
20,201,368 UART: [art] Lock RT PCRs Done
20,203,018 UART: [art] Populate DV Done
20,208,427 UART: [fht] FMC Alias Private Key: 7
20,210,122 UART: [art] Derive CDI
20,210,933 UART: [art] Store in slot 0x4
20,266,980 UART: [art] Derive Key Pair
20,268,014 UART: [art] Store priv key in slot 0x5
22,731,456 UART: [art] Derive Key Pair - Done
22,744,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,457,097 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,614 UART: [art] PUB.X = 880B1B4A6D30F5ACB7A8A77D34B14EDC135C473B002C5D26A0931D71EEA532A3B405F2782398DA813E38AB8B3FA2A318
24,465,901 UART: [art] PUB.Y = A22EF65C318ABB2C3DB14950B4ED4413CE90A2BE8B05DBD434FAE4A5C883317CDF91B859F4C3441C53A310DFD0306A1A
24,473,160 UART: [art] SIG.R = F4C22FC1EE3355AFEECC3045BA4C9D5D045BA187A5F0418503B12DC2DF1D901AD46CC605ED03D9A10C1FD2F52D6FC536
24,480,577 UART: [art] SIG.S = ADD2DB754CB7A19F5268725604CC60DD85D820A7F98E2F5A418085BD94E8EC579056AC55B5DBCE02B727525B0D4269A4
25,458,357 UART: mbox::rt_entry...
25,459,322 UART: ____ _ _ _ ____ _____
25,461,255 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,463,253 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,465,106 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,467,238 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,469,102 UART: |_|
25,469,927 UART:
25,601,497 UART: [rt] Runtime listening for mailbox commands...
25,608,692 >>> mbox cmd response data (4360 bytes)
25,629,523 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,673,894 >>> mbox cmd response data (0 bytes)
27,738,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,888,186 UART:
27,888,549 UART: Running Caliptra ROM ...
27,889,688 UART:
27,889,850 UART: [state] CFI Enabled
27,956,406 UART: [state] LifecycleState = Unprovisioned
27,958,448 UART: [state] DebugLocked = No
27,960,694 UART: [state] WD Timer not started. Device not locked for debugging
27,965,143 UART: [kat] SHA2-256
28,154,999 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,165,788 UART: [kat] ++
28,166,260 UART: [kat] sha1
28,177,739 UART: [kat] SHA2-256
28,180,759 UART: [kat] SHA2-384
28,187,284 UART: [kat] SHA2-512-ACC
28,189,888 UART: [kat] ECC-384
30,637,101 UART: [kat] HMAC-384Kdf
30,661,978 UART: [kat] LMS
31,193,555 UART: [kat] --
31,198,303 UART: [update-reset] ++
34,722,200 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,724,765 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,354,555 >>> mbox cmd response: success
35,359,215 UART: [update-reset] Copying MAN_2 To MAN_1
35,394,100 UART: [update-reset Success] --
35,397,139 UART: [state] Locking Datavault
35,400,355 UART: [state] Locking PCR0, PCR1 and PCR31
35,402,507 UART: [state] Locking ICCM
35,403,848 UART: [exit] Launching FMC @ 0x40000130
35,412,524 UART:
35,412,757 UART: Running Caliptra FMC ...
35,413,854 UART:
35,414,008 UART: [state] CFI Enabled
35,515,939 UART: [art] Extend RT PCRs Done
35,517,133 UART: [art] Lock RT PCRs Done
35,518,860 UART: [art] Populate DV Done
35,524,479 UART: [fht] FMC Alias Private Key: 7
35,526,173 UART: [art] Derive CDI
35,526,981 UART: [art] Store in slot 0x4
35,584,838 UART: [art] Derive Key Pair
35,585,881 UART: [art] Store priv key in slot 0x5
38,048,707 UART: [art] Derive Key Pair - Done
38,061,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,774,814 UART: [art] Erasing AUTHORITY.KEYID = 7
39,776,311 UART: [art] PUB.X = 7755499551E3FF19F043BBDEAA4565B6812FE26250621115DC4C4D8C74699F2963DDA149DA596E98137266222A176A20
39,783,593 UART: [art] PUB.Y = AC97341EBEDE3BF0A700E0D6FBC644742F7D48213B53E5641C7AAE319596D4722A284A6444E4F50A00177779D2D47DEC
39,790,802 UART: [art] SIG.R = ACD36367D3E9B67C5B2D65813E6D582F9CAC79D516CACC4850C8446015A939A624C070A5C1939D81332546837A824BF4
39,798,197 UART: [art] SIG.S = A8AC1C046CDFBA2F51126C6F2107E1187AFAA6F13B5B0E0E331DDB9BF7C65F5827DFD407D691B4C388B52C05FACF61B1
40,777,050 UART: Caliptra RT
40,777,741 UART: [state] CFI Enabled
43,360,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,361,999 UART: [rt] RT listening for mailbox commands...
43,393,171 UART: [rt]cmd =0x494e464f, len=4
43,397,424 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,417,758 ready_for_fw is high
3,418,148 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,043,612 >>> mbox cmd response: success
14,045,065 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,324,235 UART:
18,324,633 UART: Running Caliptra FMC ...
18,325,830 UART:
18,326,197 UART: [state] CFI Enabled
18,392,235 UART: [fht] FMC Alias Private Key: 7
20,159,147 UART: [art] Extend RT PCRs Done
20,160,372 UART: [art] Lock RT PCRs Done
20,161,913 UART: [art] Populate DV Done
20,167,320 UART: [fht] FMC Alias Private Key: 7
20,168,854 UART: [art] Derive CDI
20,169,595 UART: [art] Store in slot 0x4
20,225,636 UART: [art] Derive Key Pair
20,226,656 UART: [art] Store priv key in slot 0x5
22,689,572 UART: [art] Derive Key Pair - Done
22,702,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,414,938 UART: [art] Erasing AUTHORITY.KEYID = 7
24,416,444 UART: [art] PUB.X = B41935AE2D0A5A1A7C2CE1C3702DDE298E6AD186528B5FAA24D3F4047579350C79BA6D5A6B14400F0253F67D3FF594F8
24,423,696 UART: [art] PUB.Y = E036BF72E583BF4C0FFF441C5BB16888A9D37413C41DC526B30B2B87F0E7B81829E339F7D7775A0BDF46ACB90CAD6556
24,430,995 UART: [art] SIG.R = C9E6D872D0D312F3E6FFFB82C54FFB03856DD36702F447DE807812DE17BC607AA71E1C2C3F5AF06145A9D0C1C9B7477C
24,438,388 UART: [art] SIG.S = 1E05EEC65ABBE5703D15E348F5C232EBAE0CA564A6C1F3BA763ED8327706F7A093CBDD8E8280278D5B44D78F09CDD18B
25,416,570 UART: mbox::rt_entry...
25,417,524 UART: ____ _ _ _ ____ _____
25,419,449 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,421,450 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,423,384 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,425,366 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,427,299 UART: |_|
25,428,136 UART:
25,558,356 UART: [rt] Runtime listening for mailbox commands...
25,565,575 >>> mbox cmd response data (4360 bytes)
25,586,141 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,630,509 >>> mbox cmd response data (0 bytes)
27,694,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,602,007 >>> mbox cmd response: success
35,635,277 UART:
35,635,614 UART: Running Caliptra FMC ...
35,636,660 UART:
35,636,808 UART: [state] CFI Enabled
35,729,996 UART: [art] Extend RT PCRs Done
35,731,187 UART: [art] Lock RT PCRs Done
35,732,479 UART: [art] Populate DV Done
35,738,051 UART: [fht] FMC Alias Private Key: 7
35,739,811 UART: [art] Derive CDI
35,740,622 UART: [art] Store in slot 0x4
35,798,530 UART: [art] Derive Key Pair
35,799,576 UART: [art] Store priv key in slot 0x5
38,262,258 UART: [art] Derive Key Pair - Done
38,275,047 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,989,446 UART: [art] Erasing AUTHORITY.KEYID = 7
39,990,940 UART: [art] PUB.X = E463AC7594A8E025B3C22162A72CB4D374772FB4FBFC72BA61B40CC49E2458F8BA4B32952BC8DBCF453F8B5CFD12D4E7
39,998,221 UART: [art] PUB.Y = B9D26E00D75364E696944BD08F6A8A751C6003DDD807338C69F0340E064150CB649714590C15400253641065CA3E17C1
40,005,426 UART: [art] SIG.R = 6890B00F2A7AE1DA09C8C8E25735564CE2DAD5EB8C042A67EED8E643553CDB90172BB54196B723D07C362564D9BDB8C7
40,012,848 UART: [art] SIG.S = ACFC4078CB2861E328B662575D0B4064A716C083097D1C3439566A5ECBC41C74810EC0D34A115D6A2BF309296897647D
40,991,583 UART: Caliptra RT
40,992,296 UART: [state] CFI Enabled
43,574,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,576,185 UART: [rt] RT listening for mailbox commands...
43,607,406 UART: [rt]cmd =0x494e464f, len=4
43,611,762 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,438 UART:
192,800 UART: Running Caliptra ROM ...
193,934 UART:
603,726 UART: [state] CFI Enabled
616,107 UART: [state] LifecycleState = Unprovisioned
618,485 UART: [state] DebugLocked = No
620,583 UART: [state] WD Timer not started. Device not locked for debugging
625,345 UART: [kat] SHA2-256
815,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,013 UART: [kat] ++
826,549 UART: [kat] sha1
838,208 UART: [kat] SHA2-256
841,219 UART: [kat] SHA2-384
847,144 UART: [kat] SHA2-512-ACC
849,735 UART: [kat] ECC-384
3,290,772 UART: [kat] HMAC-384Kdf
3,304,659 UART: [kat] LMS
3,836,490 UART: [kat] --
3,839,137 UART: [cold-reset] ++
3,840,219 UART: [fht] FHT @ 0x50003400
3,851,492 UART: [idev] ++
3,852,173 UART: [idev] CDI.KEYID = 6
3,853,062 UART: [idev] SUBJECT.KEYID = 7
3,854,318 UART: [idev] UDS.KEYID = 0
3,855,248 ready_for_fw is high
3,855,444 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,959,511 UART: [idev] Erasing UDS.KEYID = 0
6,326,886 UART: [idev] Sha1 KeyId Algorithm
6,350,376 UART: [idev] --
6,355,454 UART: [ldev] ++
6,356,142 UART: [ldev] CDI.KEYID = 6
6,357,055 UART: [ldev] SUBJECT.KEYID = 5
6,358,242 UART: [ldev] AUTHORITY.KEYID = 7
6,359,477 UART: [ldev] FE.KEYID = 1
6,370,126 UART: [ldev] Erasing FE.KEYID = 1
8,848,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,049 UART: [ldev] --
10,639,585 UART: [fwproc] Wait for Commands...
10,642,659 UART: [fwproc] Recv command 0x46574c44
10,644,968 UART: [fwproc] Recv'd Img size: 82832 bytes
13,697,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,775,204 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,898,812 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,243,982 >>> mbox cmd response: success
14,245,110 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,247,242 UART: [afmc] ++
14,247,980 UART: [afmc] CDI.KEYID = 6
14,249,102 UART: [afmc] SUBJECT.KEYID = 7
14,250,608 UART: [afmc] AUTHORITY.KEYID = 5
16,755,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,474,376 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,476,346 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,491,458 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,506,571 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,521,473 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,544,038 UART: [afmc] --
18,548,071 UART: [cold-reset] --
18,552,538 UART: [state] Locking Datavault
18,556,713 UART: [state] Locking PCR0, PCR1 and PCR31
18,558,857 UART: [state] Locking ICCM
18,561,141 UART: [exit] Launching FMC @ 0x40000130
18,569,826 UART:
18,570,107 UART: Running Caliptra FMC ...
18,571,141 UART:
18,571,293 UART: [state] CFI Enabled
18,578,938 UART: [fht] FMC Alias Private Key: 7
20,345,145 UART: [art] Extend RT PCRs Done
20,346,368 UART: [art] Lock RT PCRs Done
20,348,107 UART: [art] Populate DV Done
20,353,794 UART: [fht] FMC Alias Private Key: 7
20,355,290 UART: [art] Derive CDI
20,356,054 UART: [art] Store in slot 0x4
20,398,756 UART: [art] Derive Key Pair
20,399,760 UART: [art] Store priv key in slot 0x5
22,826,391 UART: [art] Derive Key Pair - Done
22,838,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,545,458 UART: [art] Erasing AUTHORITY.KEYID = 7
24,546,968 UART: [art] PUB.X = C6D2D0BC9AF34A633AA58C3BDAC1A3A722A1D56F9E3B822CD343CB11E83E8487FEB338D4D3996B5CDE71826E80A3D753
24,554,284 UART: [art] PUB.Y = 5ECDCC43810AACB8AC7856BD30F5C761D8517D337473E0FDEED530AD45793BE0F9A4E0D4B43C4268CF156AADA61B15CC
24,561,536 UART: [art] SIG.R = 7FA584C3078D2FFB79378EBFECBB7770C86197B11C90B4738E4C63E4240BBAB0978AC30F566F3FEC2B0D667C742F76BB
24,568,982 UART: [art] SIG.S = E5CFC8FDD026CEA1ABEB7F21DB030AEE647A281D8B1BE1B333CBF20256FBDB260D7FF70961C0EB184CD4928A164AFA78
25,547,917 UART: mbox::rt_entry...
25,548,875 UART: ____ _ _ _ ____ _____
25,550,810 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,552,820 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,554,755 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,556,686 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,558,617 UART: |_|
25,559,455 UART:
25,691,179 UART: [rt] Runtime listening for mailbox commands...
25,698,441 >>> mbox cmd response data (4360 bytes)
25,718,972 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,763,340 >>> mbox cmd response data (0 bytes)
27,832,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,982,801 UART:
27,983,199 UART: Running Caliptra ROM ...
27,984,255 UART:
27,984,411 UART: [state] CFI Enabled
27,999,723 UART: [state] LifecycleState = Unprovisioned
28,001,618 UART: [state] DebugLocked = No
28,003,740 UART: [state] WD Timer not started. Device not locked for debugging
28,008,161 UART: [kat] SHA2-256
28,198,051 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,208,811 UART: [kat] ++
28,209,332 UART: [kat] sha1
28,220,652 UART: [kat] SHA2-256
28,223,676 UART: [kat] SHA2-384
28,229,721 UART: [kat] SHA2-512-ACC
28,232,347 UART: [kat] ECC-384
30,676,144 UART: [kat] HMAC-384Kdf
30,689,370 UART: [kat] LMS
31,220,971 UART: [kat] --
31,227,064 UART: [update-reset] ++
34,738,554 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,742,430 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,372,140 >>> mbox cmd response: success
35,376,712 UART: [update-reset] Copying MAN_2 To MAN_1
35,410,779 UART: [update-reset Success] --
35,415,483 UART: [state] Locking Datavault
35,417,735 UART: [state] Locking PCR0, PCR1 and PCR31
35,419,898 UART: [state] Locking ICCM
35,421,250 UART: [exit] Launching FMC @ 0x40000130
35,429,938 UART:
35,430,181 UART: Running Caliptra FMC ...
35,431,287 UART:
35,431,449 UART: [state] CFI Enabled
35,475,516 UART: [art] Extend RT PCRs Done
35,476,712 UART: [art] Lock RT PCRs Done
35,478,333 UART: [art] Populate DV Done
35,483,848 UART: [fht] FMC Alias Private Key: 7
35,485,513 UART: [art] Derive CDI
35,486,333 UART: [art] Store in slot 0x4
35,528,802 UART: [art] Derive Key Pair
35,529,855 UART: [art] Store priv key in slot 0x5
37,957,098 UART: [art] Derive Key Pair - Done
37,970,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,677,087 UART: [art] Erasing AUTHORITY.KEYID = 7
39,678,601 UART: [art] PUB.X = 20DDFBDF824E69C1C1535372E6E848F2775D33EBC25D2B0491160E5E4D311CB0B28254C5C134E4518120F2CD61B808A0
39,685,871 UART: [art] PUB.Y = AF15C16660F538B42F37088CA9EE97DF9E0D774B40A34BACD9AB6A659DDD2D5486534CD195932A251C691DD491B8B39E
39,693,097 UART: [art] SIG.R = E69315BFAA270F9A4979F689BAB1295226C222CAD6A70446CCCB3BC7AFFCEBF80724C33CA7C9E6AC268CC4D9BCA8E272
39,700,533 UART: [art] SIG.S = E4850F1442B8C805C27D23CD96B041805CD9082946FAA7BA47D95A9581DAC97E4E4A75C59D32C6FB9B78BBCC96AB5B92
40,679,315 UART: Caliptra RT
40,680,035 UART: [state] CFI Enabled
43,161,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,163,387 UART: [rt] RT listening for mailbox commands...
43,194,351 UART: [rt]cmd =0x494e464f, len=4
43,198,761 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
3,755,744 ready_for_fw is high
3,756,181 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,287,682 >>> mbox cmd response: success
14,288,740 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,542,930 UART:
18,543,334 UART: Running Caliptra FMC ...
18,544,487 UART:
18,544,657 UART: [state] CFI Enabled
18,552,130 UART: [fht] FMC Alias Private Key: 7
20,318,380 UART: [art] Extend RT PCRs Done
20,319,635 UART: [art] Lock RT PCRs Done
20,321,380 UART: [art] Populate DV Done
20,326,751 UART: [fht] FMC Alias Private Key: 7
20,328,308 UART: [art] Derive CDI
20,329,127 UART: [art] Store in slot 0x4
20,371,731 UART: [art] Derive Key Pair
20,372,780 UART: [art] Store priv key in slot 0x5
22,800,177 UART: [art] Derive Key Pair - Done
22,813,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,519,565 UART: [art] Erasing AUTHORITY.KEYID = 7
24,521,082 UART: [art] PUB.X = E206B0D93DB13816059C47296070EB2A13B7E88390AE1AF1749CFF72E2159001212041738443DDFC16412AD6DF41B1BC
24,528,283 UART: [art] PUB.Y = CD8FD1A8E73D08FBA3C0D7363684D75CA140E851B27B881F5F48ED9C6F0DDD61CF41325FE4CA475C8CE6736B7FF3220D
24,535,578 UART: [art] SIG.R = 7344B96B21A44AC1F95CCE04F01DBC3D30371A895E35D1D889612FF15E4AA6B7D0ACEA1FED3BF59DC8926CC33392D29F
24,542,986 UART: [art] SIG.S = E3F0E6DA99A73A3D32AA93D0E23AF5D4BDD826311FB75D7510DDFC77AA46D7E741A556D90170EC69E02C6D4239995EF0
25,521,638 UART: mbox::rt_entry...
25,522,595 UART: ____ _ _ _ ____ _____
25,524,551 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,526,565 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,528,502 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,530,488 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,532,425 UART: |_|
25,533,234 UART:
25,664,634 UART: [rt] Runtime listening for mailbox commands...
25,671,852 >>> mbox cmd response data (4360 bytes)
25,692,426 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,736,757 >>> mbox cmd response data (0 bytes)
27,804,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,624,156 >>> mbox cmd response: success
35,660,398 UART:
35,660,742 UART: Running Caliptra FMC ...
35,661,876 UART:
35,662,050 UART: [state] CFI Enabled
35,706,089 UART: [art] Extend RT PCRs Done
35,707,284 UART: [art] Lock RT PCRs Done
35,708,585 UART: [art] Populate DV Done
35,714,057 UART: [fht] FMC Alias Private Key: 7
35,715,713 UART: [art] Derive CDI
35,716,530 UART: [art] Store in slot 0x4
35,759,194 UART: [art] Derive Key Pair
35,760,196 UART: [art] Store priv key in slot 0x5
38,187,261 UART: [art] Derive Key Pair - Done
38,200,097 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,905,889 UART: [art] Erasing AUTHORITY.KEYID = 7
39,907,410 UART: [art] PUB.X = 4644FA8357CB7F2DC2396DEAD0394B146496BA302CA7A444B210A8256114F8DA346254CF8128B8889B7831E478A6D523
39,914,682 UART: [art] PUB.Y = 23742240C099441D12CA2DB606BBC21E568EF65ACDF0D5469420EE026EF7AE91A22E41DD8E8C657B1C22354BADB730E7
39,921,906 UART: [art] SIG.R = 2018A2381969FC78C0EA427FD115B5C540C5178CB705230FA1554262036A534BCDE3FD2B834D6D57AB914CEFAE215F1D
39,929,280 UART: [art] SIG.S = 4681490E4B1BA813D1BE37B305D8F9867C237DE03B895B2CEE534764AFF7D7C383BD0FC41389D811AF0A866BB5A51D46
40,907,738 UART: Caliptra RT
40,908,455 UART: [state] CFI Enabled
43,389,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,390,985 UART: [rt] RT listening for mailbox commands...
43,422,279 UART: [rt]cmd =0x494e464f, len=4
43,426,642 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,167 UART: [kat] SHA2-256
882,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,213 UART: [kat] ++
886,365 UART: [kat] sha1
890,681 UART: [kat] SHA2-256
892,619 UART: [kat] SHA2-384
895,266 UART: [kat] SHA2-512-ACC
897,167 UART: [kat] ECC-384
902,700 UART: [kat] HMAC-384Kdf
907,278 UART: [kat] LMS
1,475,474 UART: [kat] --
1,476,587 UART: [cold-reset] ++
1,477,071 UART: [fht] Storing FHT @ 0x50003400
1,479,664 UART: [idev] ++
1,479,832 UART: [idev] CDI.KEYID = 6
1,480,192 UART: [idev] SUBJECT.KEYID = 7
1,480,616 UART: [idev] UDS.KEYID = 0
1,480,961 ready_for_fw is high
1,480,961 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,788 UART: [idev] Erasing UDS.KEYID = 0
1,505,074 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,736 UART: [idev] --
1,514,899 UART: [ldev] ++
1,515,067 UART: [ldev] CDI.KEYID = 6
1,515,430 UART: [ldev] SUBJECT.KEYID = 5
1,515,856 UART: [ldev] AUTHORITY.KEYID = 7
1,516,319 UART: [ldev] FE.KEYID = 1
1,521,579 UART: [ldev] Erasing FE.KEYID = 1
1,546,330 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,396 UART: [ldev] --
1,585,823 UART: [fwproc] Waiting for Commands...
1,586,542 UART: [fwproc] Received command 0x46574c44
1,587,333 UART: [fwproc] Received Image of size 82832 bytes
2,522,870 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,494 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,581,712 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,437 >>> mbox cmd response: success
2,668,437 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,669,625 UART: [afmc] ++
2,669,793 UART: [afmc] CDI.KEYID = 6
2,670,155 UART: [afmc] SUBJECT.KEYID = 7
2,670,580 UART: [afmc] AUTHORITY.KEYID = 5
2,706,247 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,601 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,723,381 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,729,090 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,973 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,740,656 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,748,720 UART: [afmc] --
2,749,626 UART: [cold-reset] --
2,750,546 UART: [state] Locking Datavault
2,751,521 UART: [state] Locking PCR0, PCR1 and PCR31
2,752,125 UART: [state] Locking ICCM
2,752,779 UART: [exit] Launching FMC @ 0x40000130
2,758,109 UART:
2,758,125 UART: Running Caliptra FMC ...
2,758,533 UART:
2,758,587 UART: [state] CFI Enabled
2,769,069 UART: [fht] FMC Alias Private Key: 7
2,887,953 UART: [art] Extend RT PCRs Done
2,888,381 UART: [art] Lock RT PCRs Done
2,890,245 UART: [art] Populate DV Done
2,898,448 UART: [fht] FMC Alias Private Key: 7
2,899,630 UART: [art] Derive CDI
2,899,910 UART: [art] Store in slot 0x4
2,985,310 UART: [art] Derive Key Pair
2,985,670 UART: [art] Store priv key in slot 0x5
2,998,541 UART: [art] Derive Key Pair - Done
3,013,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,387 UART: [art] PUB.X = A63264FAA21F7E48B57F010A08770B1E287681740BE6B05926AC688ADB3FEE9D47F624DBB76C29CC74F5DEE43473B14A
3,036,152 UART: [art] PUB.Y = AEB0BB023FEBC462231C02CB48330B151C7575D5DF2BEFA34C594E712A088E83E4856CA58F9FF6CA7B431C6478EA724A
3,043,104 UART: [art] SIG.R = 99DD59E8D760C8CE233EF4FF5DD25A59A6B76933DFC76CB130FD47148F1B0D60D8BD2851071F209BAE17F8CB8BB17983
3,049,882 UART: [art] SIG.S = E03FB2C0CD6088C94B38BF0A2D24BDD201CD7FFFCBA55F80C674CD0A13973D68F19EE30D8CCC07F801A4D8E992CDC629
3,074,326 UART: mbox::rt_entry...
3,074,698 UART: ____ _ _ _ ____ _____
3,075,482 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,076,282 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,077,050 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,077,818 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,078,586 UART: |_|
3,078,898 UART:
3,198,090 UART: [rt] Runtime listening for mailbox commands...
3,204,424 >>> mbox cmd response data (4360 bytes)
3,204,425 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,235,207 >>> mbox cmd response data (0 bytes)
3,235,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,235,329 UART:
3,235,345 UART: Running Caliptra ROM ...
3,235,753 UART:
3,235,807 UART: [state] CFI Enabled
3,238,733 UART: [state] LifecycleState = Unprovisioned
3,239,388 UART: [state] DebugLocked = No
3,240,110 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,241,709 UART: [kat] SHA2-256
4,035,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,039,755 UART: [kat] ++
4,039,907 UART: [kat] sha1
4,044,107 UART: [kat] SHA2-256
4,046,045 UART: [kat] SHA2-384
4,048,688 UART: [kat] SHA2-512-ACC
4,050,588 UART: [kat] ECC-384
4,056,283 UART: [kat] HMAC-384Kdf
4,060,949 UART: [kat] LMS
4,629,145 UART: [kat] --
4,630,086 UART: [update-reset] ++
6,012,996 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,014,224 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,169,491 >>> mbox cmd response: success
6,169,604 UART: [update-reset] Copying MAN_2 To MAN_1
6,177,618 UART: [update-reset Success] --
6,178,575 UART: [state] Locking Datavault
6,179,513 UART: [state] Locking PCR0, PCR1 and PCR31
6,180,117 UART: [state] Locking ICCM
6,180,541 UART: [exit] Launching FMC @ 0x40000130
6,185,871 UART:
6,185,887 UART: Running Caliptra FMC ...
6,186,295 UART:
6,186,349 UART: [state] CFI Enabled
6,275,944 UART: [art] Extend RT PCRs Done
6,276,372 UART: [art] Lock RT PCRs Done
6,277,517 UART: [art] Populate DV Done
6,285,598 UART: [fht] FMC Alias Private Key: 7
6,286,606 UART: [art] Derive CDI
6,286,886 UART: [art] Store in slot 0x4
6,372,626 UART: [art] Derive Key Pair
6,372,986 UART: [art] Store priv key in slot 0x5
6,386,151 UART: [art] Derive Key Pair - Done
6,401,131 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,417,132 UART: [art] Erasing AUTHORITY.KEYID = 7
6,417,897 UART: [art] PUB.X = 9DF42B2734936898FFE49DF97D807A4D8B8487480DFD817671452482541CF0D123CB58D93AC850CE324DDFA76BACBF86
6,424,670 UART: [art] PUB.Y = 092BCBB9527A6737FA9B8724EB62CE148E3512E280A9FA4A7CF43B2F6514D8CD1770DE4A3EA09AA369FAEECE560CBCE2
6,431,636 UART: [art] SIG.R = 422A5BB941E4C11E1C10D6AA2B974CB265FFBE9F99BF09B67084FB409FF8B3AB3CA51C20A30C29BF8C6C98338104A43A
6,438,413 UART: [art] SIG.S = A3D5E98F4F6FBCA2B5E407628D6539B1A39AE22EA919A661F00A1947807F2863E2597C5B4946273F4FB6146F95FFD3B3
6,461,999 UART: Caliptra RT
6,462,250 UART: [state] CFI Enabled
6,528,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,529,682 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,560,126 UART: [rt]cmd =0x494e464f, len=4
6,563,720 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,617 ready_for_fw is high
1,361,617 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,517,983 >>> mbox cmd response: success
2,517,983 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,580,104 UART:
2,580,120 UART: Running Caliptra FMC ...
2,580,528 UART:
2,580,582 UART: [state] CFI Enabled
2,591,170 UART: [fht] FMC Alias Private Key: 7
2,709,996 UART: [art] Extend RT PCRs Done
2,710,424 UART: [art] Lock RT PCRs Done
2,712,052 UART: [art] Populate DV Done
2,720,289 UART: [fht] FMC Alias Private Key: 7
2,721,321 UART: [art] Derive CDI
2,721,601 UART: [art] Store in slot 0x4
2,807,233 UART: [art] Derive Key Pair
2,807,593 UART: [art] Store priv key in slot 0x5
2,820,486 UART: [art] Derive Key Pair - Done
2,835,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,850,572 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,337 UART: [art] PUB.X = 2CE9D1E329343EAE86BD92698201110DFF943DE2B7CA3F51479C93B71B447844C8FE231B242EA5DB4FE9BDDC72DA0207
2,858,107 UART: [art] PUB.Y = 2ECDF7217565A5C67E048B05788D7ED5BF57F4082D636F8EEDB38E26AECB72349A82BF2FFAF76FE78A179F0EBD0ABC42
2,865,064 UART: [art] SIG.R = 5AB97827A23EE068C7488DCA8B733D0435F8DC22B8A5BDAA47635E7294E03A64877F58A5E4C85849318D4208F62F498B
2,871,828 UART: [art] SIG.S = 086D930AA6D0CBF4D374678756AD538C97DF0C9BC7C7659CE3A8536540465B2889405AECB86488B3112D91FD1E81B23B
2,895,807 UART: mbox::rt_entry...
2,896,179 UART: ____ _ _ _ ____ _____
2,896,963 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,897,763 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,898,531 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,899,299 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,900,067 UART: |_|
2,900,379 UART:
3,018,819 UART: [rt] Runtime listening for mailbox commands...
3,025,153 >>> mbox cmd response data (4360 bytes)
3,025,154 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,055,936 >>> mbox cmd response data (0 bytes)
3,055,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,869,448 >>> mbox cmd response: success
5,882,790 UART:
5,882,806 UART: Running Caliptra FMC ...
5,883,214 UART:
5,883,268 UART: [state] CFI Enabled
5,972,567 UART: [art] Extend RT PCRs Done
5,972,995 UART: [art] Lock RT PCRs Done
5,974,412 UART: [art] Populate DV Done
5,982,513 UART: [fht] FMC Alias Private Key: 7
5,983,603 UART: [art] Derive CDI
5,983,883 UART: [art] Store in slot 0x4
6,069,957 UART: [art] Derive Key Pair
6,070,317 UART: [art] Store priv key in slot 0x5
6,083,552 UART: [art] Derive Key Pair - Done
6,098,120 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,113,429 UART: [art] Erasing AUTHORITY.KEYID = 7
6,114,194 UART: [art] PUB.X = F5CFE6602AA75DD687B84F4719C4D9F03AAD440647B06652F3DD958F7C27464D7185E7888F3379995E45EB6CB1E517B6
6,120,963 UART: [art] PUB.Y = F2599DA7C5C5B27548B85B9AC1E6A924C59A575372AC04F61EAE62CF7D59E5692099F21EDE7B66F3F18C9F21C07505E5
6,127,915 UART: [art] SIG.R = 84D1A1DB3D67A9B531C6956909DD7F28952BABF719150ADBF39B21E027BB130CF74DAD92F9C73A6127FC4420B8414605
6,134,679 UART: [art] SIG.S = F26B8362665E28D216B578EDE27CCC9CB3C2FE767CE7FE4DDBA08D3243A6212D80688E0750586B4525C5196065BA44E4
6,157,814 UART: Caliptra RT
6,158,065 UART: [state] CFI Enabled
6,224,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,225,826 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,256,196 UART: [rt]cmd =0x494e464f, len=4
6,259,768 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,600 UART: [kat] SHA2-256
882,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,646 UART: [kat] ++
886,798 UART: [kat] sha1
891,072 UART: [kat] SHA2-256
893,010 UART: [kat] SHA2-384
895,577 UART: [kat] SHA2-512-ACC
897,478 UART: [kat] ECC-384
903,223 UART: [kat] HMAC-384Kdf
907,855 UART: [kat] LMS
1,476,051 UART: [kat] --
1,476,936 UART: [cold-reset] ++
1,477,322 UART: [fht] Storing FHT @ 0x50003400
1,480,163 UART: [idev] ++
1,480,331 UART: [idev] CDI.KEYID = 6
1,480,691 UART: [idev] SUBJECT.KEYID = 7
1,481,115 UART: [idev] UDS.KEYID = 0
1,481,460 ready_for_fw is high
1,481,460 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,489,193 UART: [idev] Erasing UDS.KEYID = 0
1,506,309 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,909 UART: [idev] --
1,515,908 UART: [ldev] ++
1,516,076 UART: [ldev] CDI.KEYID = 6
1,516,439 UART: [ldev] SUBJECT.KEYID = 5
1,516,865 UART: [ldev] AUTHORITY.KEYID = 7
1,517,328 UART: [ldev] FE.KEYID = 1
1,522,576 UART: [ldev] Erasing FE.KEYID = 1
1,548,821 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,223 UART: [ldev] --
1,588,662 UART: [fwproc] Waiting for Commands...
1,589,423 UART: [fwproc] Received command 0x46574c44
1,590,214 UART: [fwproc] Received Image of size 82832 bytes
2,527,077 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,554,785 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,586,003 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,672,710 >>> mbox cmd response: success
2,672,710 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,673,804 UART: [afmc] ++
2,673,972 UART: [afmc] CDI.KEYID = 6
2,674,334 UART: [afmc] SUBJECT.KEYID = 7
2,674,759 UART: [afmc] AUTHORITY.KEYID = 5
2,709,488 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,725,764 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,726,544 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,732,253 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,738,136 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,743,819 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,751,711 UART: [afmc] --
2,752,687 UART: [cold-reset] --
2,753,469 UART: [state] Locking Datavault
2,754,894 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,498 UART: [state] Locking ICCM
2,756,100 UART: [exit] Launching FMC @ 0x40000130
2,761,430 UART:
2,761,446 UART: Running Caliptra FMC ...
2,761,854 UART:
2,761,997 UART: [state] CFI Enabled
2,772,641 UART: [fht] FMC Alias Private Key: 7
2,891,733 UART: [art] Extend RT PCRs Done
2,892,161 UART: [art] Lock RT PCRs Done
2,893,893 UART: [art] Populate DV Done
2,902,004 UART: [fht] FMC Alias Private Key: 7
2,903,112 UART: [art] Derive CDI
2,903,392 UART: [art] Store in slot 0x4
2,988,642 UART: [art] Derive Key Pair
2,989,002 UART: [art] Store priv key in slot 0x5
3,002,559 UART: [art] Derive Key Pair - Done
3,017,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,332 UART: [art] PUB.X = 5DB2F23EC78350722FBB1C49B957960DBD5A2EC61F798884029E348A8CE454D034BAC58563D1CFFF3325A3EA15C172D7
3,040,104 UART: [art] PUB.Y = 845C86A0D2E82D23FF26EA1DDD5CC4AC3471C66B0142FDF5C38E4FBD75CD523942835A9C72B67F78E47AE2C0D7336B1D
3,047,067 UART: [art] SIG.R = 5AE7E86F3ADE0F174DCB947FD47AD78FA95AE222CC98F6B57B4BDEA745B6CA13D19979A5BC8B92A9722CFF8B2866053A
3,053,853 UART: [art] SIG.S = A6232DD09032C29B773EF3D72E528AC1571612D1B10C96845C14267D7B7700E8A344F9F1CCDCC51934856EA7AE3094B1
3,077,798 UART: mbox::rt_entry...
3,078,170 UART: ____ _ _ _ ____ _____
3,078,954 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,079,754 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,080,522 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,081,290 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,082,058 UART: |_|
3,082,370 UART:
3,201,271 UART: [rt] Runtime listening for mailbox commands...
3,207,605 >>> mbox cmd response data (4360 bytes)
3,207,606 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,238,388 >>> mbox cmd response data (0 bytes)
3,238,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,238,510 UART:
3,238,526 UART: Running Caliptra ROM ...
3,238,934 UART:
3,239,075 UART: [state] CFI Enabled
3,242,171 UART: [state] LifecycleState = Unprovisioned
3,242,826 UART: [state] DebugLocked = No
3,243,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,245,023 UART: [kat] SHA2-256
4,038,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,043,069 UART: [kat] ++
4,043,221 UART: [kat] sha1
4,047,495 UART: [kat] SHA2-256
4,049,433 UART: [kat] SHA2-384
4,052,152 UART: [kat] SHA2-512-ACC
4,054,052 UART: [kat] ECC-384
4,059,847 UART: [kat] HMAC-384Kdf
4,064,283 UART: [kat] LMS
4,632,479 UART: [kat] --
4,633,398 UART: [update-reset] ++
6,014,596 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,015,656 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,170,923 >>> mbox cmd response: success
6,171,036 UART: [update-reset] Copying MAN_2 To MAN_1
6,179,050 UART: [update-reset Success] --
6,180,285 UART: [state] Locking Datavault
6,181,149 UART: [state] Locking PCR0, PCR1 and PCR31
6,181,753 UART: [state] Locking ICCM
6,182,331 UART: [exit] Launching FMC @ 0x40000130
6,187,661 UART:
6,187,677 UART: Running Caliptra FMC ...
6,188,085 UART:
6,188,228 UART: [state] CFI Enabled
6,277,737 UART: [art] Extend RT PCRs Done
6,278,165 UART: [art] Lock RT PCRs Done
6,279,364 UART: [art] Populate DV Done
6,287,571 UART: [fht] FMC Alias Private Key: 7
6,288,637 UART: [art] Derive CDI
6,288,917 UART: [art] Store in slot 0x4
6,374,695 UART: [art] Derive Key Pair
6,375,055 UART: [art] Store priv key in slot 0x5
6,388,396 UART: [art] Derive Key Pair - Done
6,403,206 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,419,197 UART: [art] Erasing AUTHORITY.KEYID = 7
6,419,962 UART: [art] PUB.X = 7278B49EEFF52C77C983DDE7B45BB5D6F490695E4B265F8A67B448A0DB886D4436DBFAF96C4EADFBC14CE6F5E1E20114
6,426,749 UART: [art] PUB.Y = BC675C2690F62F0AB59941EE63FA66A6295382CB407E8E6991411DCC8B9C3A25BE96A69A5565B19CE118C8505C242453
6,433,696 UART: [art] SIG.R = BBC6846370DBAE9A9E467CF8C7B71A07BD1E76D8BA123A7059B5E8CF20EEFDF9A95D6FB66077AA94BEDFBCF9EDAD5457
6,440,495 UART: [art] SIG.S = 684C970668FF4F319F3B71A2AE8DC063B96B1F9994DFB47D5E6B91079D36D64F3F218EA99DBB66196E7BAB70FED57862
6,463,637 UART: Caliptra RT
6,463,980 UART: [state] CFI Enabled
6,530,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,531,872 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,562,372 UART: [rt]cmd =0x494e464f, len=4
6,566,092 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,546 ready_for_fw is high
1,362,546 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,519,324 >>> mbox cmd response: success
2,519,324 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,581,647 UART:
2,581,663 UART: Running Caliptra FMC ...
2,582,071 UART:
2,582,214 UART: [state] CFI Enabled
2,592,728 UART: [fht] FMC Alias Private Key: 7
2,711,458 UART: [art] Extend RT PCRs Done
2,711,886 UART: [art] Lock RT PCRs Done
2,713,428 UART: [art] Populate DV Done
2,721,487 UART: [fht] FMC Alias Private Key: 7
2,722,615 UART: [art] Derive CDI
2,722,895 UART: [art] Store in slot 0x4
2,808,561 UART: [art] Derive Key Pair
2,808,921 UART: [art] Store priv key in slot 0x5
2,822,152 UART: [art] Derive Key Pair - Done
2,836,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,851,979 UART: [art] Erasing AUTHORITY.KEYID = 7
2,852,744 UART: [art] PUB.X = 4D580EB6CD26DE1AB054FCCA367168F0A0113B6E99AE744C3B5063C8F121CD1DF3D966A56EF03C895C7B086750AF7176
2,859,518 UART: [art] PUB.Y = E189677D56285E18249A55CEFC75DE160B624AEACC6D5F2DB4748328481AED1865618BA7BED27838461D4D4EE4F0D788
2,866,471 UART: [art] SIG.R = 996A1A5DFF925EDA17C204CECE91E3DFCD3DC3DCE5173FE450AFFEC2ACE0D85442E0CA4B596900D13C5434B817168409
2,873,233 UART: [art] SIG.S = 5E1A3FF31E72C43777EBDB397D5DAC60CA234D874C1E20CC9BB72644EC1A4FB560456F5170FD5C7C2C281E9DB95BBAD4
2,896,641 UART: mbox::rt_entry...
2,897,013 UART: ____ _ _ _ ____ _____
2,897,797 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,898,597 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,899,365 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,900,133 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,900,901 UART: |_|
2,901,213 UART:
3,020,388 UART: [rt] Runtime listening for mailbox commands...
3,026,722 >>> mbox cmd response data (4360 bytes)
3,026,723 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,057,505 >>> mbox cmd response data (0 bytes)
3,057,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,870,876 >>> mbox cmd response: success
5,884,438 UART:
5,884,454 UART: Running Caliptra FMC ...
5,884,862 UART:
5,885,005 UART: [state] CFI Enabled
5,974,704 UART: [art] Extend RT PCRs Done
5,975,132 UART: [art] Lock RT PCRs Done
5,976,235 UART: [art] Populate DV Done
5,984,158 UART: [fht] FMC Alias Private Key: 7
5,985,118 UART: [art] Derive CDI
5,985,398 UART: [art] Store in slot 0x4
6,070,784 UART: [art] Derive Key Pair
6,071,144 UART: [art] Store priv key in slot 0x5
6,084,497 UART: [art] Derive Key Pair - Done
6,099,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,115,184 UART: [art] Erasing AUTHORITY.KEYID = 7
6,115,949 UART: [art] PUB.X = 90EF6CA4A8AEE7BFCA905FAB2BC6AA57CE8604D7B6454C44E9F33DE2AEFF022C6E2B28BCAD19A0043B00AAC2934FD4C4
6,122,720 UART: [art] PUB.Y = EBE8F876F7C699C31F58C8C5278C5876B0FFD34458059F18F1CA78967B188741FA5F495A1C316F5BCC07012C73AA60EC
6,129,667 UART: [art] SIG.R = D5F868CA664233E6BA43DCE5902D1C2B4CBEDF0DEEA8748D0C696264838FEFDEBE554BE2D0A022ED9D59FDF16BD0C466
6,136,457 UART: [art] SIG.S = C19BFB5770C4569803318ED6C39381E15FAE54BD241EE5B009189B26F4F04A752EB057D2AB374366BAE9F8FA5EA0D563
6,159,967 UART: Caliptra RT
6,160,310 UART: [state] CFI Enabled
6,227,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,229,259 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,259,791 UART: [rt]cmd =0x494e464f, len=4
6,263,479 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
891,000 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,104 UART: [kat] ++
895,256 UART: [kat] sha1
899,536 UART: [kat] SHA2-256
901,476 UART: [kat] SHA2-384
904,057 UART: [kat] SHA2-512-ACC
905,958 UART: [kat] ECC-384
915,773 UART: [kat] HMAC-384Kdf
920,423 UART: [kat] LMS
1,168,735 UART: [kat] --
1,169,650 UART: [cold-reset] ++
1,170,100 UART: [fht] FHT @ 0x50003400
1,172,684 UART: [idev] ++
1,172,852 UART: [idev] CDI.KEYID = 6
1,173,213 UART: [idev] SUBJECT.KEYID = 7
1,173,638 UART: [idev] UDS.KEYID = 0
1,173,984 ready_for_fw is high
1,173,984 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,617 UART: [idev] Erasing UDS.KEYID = 0
1,198,351 UART: [idev] Sha1 KeyId Algorithm
1,207,187 UART: [idev] --
1,208,328 UART: [ldev] ++
1,208,496 UART: [ldev] CDI.KEYID = 6
1,208,860 UART: [ldev] SUBJECT.KEYID = 5
1,209,287 UART: [ldev] AUTHORITY.KEYID = 7
1,209,750 UART: [ldev] FE.KEYID = 1
1,214,982 UART: [ldev] Erasing FE.KEYID = 1
1,241,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,521 UART: [fwproc] Wait for Commands...
1,281,240 UART: [fwproc] Recv command 0x46574c44
1,281,973 UART: [fwproc] Recv'd Img size: 82832 bytes
2,217,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,243,742 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,274,917 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,361,744 >>> mbox cmd response: success
2,361,744 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,362,766 UART: [afmc] ++
2,362,934 UART: [afmc] CDI.KEYID = 6
2,363,297 UART: [afmc] SUBJECT.KEYID = 7
2,363,723 UART: [afmc] AUTHORITY.KEYID = 5
2,399,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,415,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,416,566 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,422,276 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,428,157 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,433,858 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,441,705 UART: [afmc] --
2,442,648 UART: [cold-reset] --
2,443,506 UART: [state] Locking Datavault
2,444,673 UART: [state] Locking PCR0, PCR1 and PCR31
2,445,277 UART: [state] Locking ICCM
2,445,901 UART: [exit] Launching FMC @ 0x40000130
2,451,231 UART:
2,451,247 UART: Running Caliptra FMC ...
2,451,655 UART:
2,451,709 UART: [state] CFI Enabled
2,462,101 UART: [fht] FMC Alias Private Key: 7
2,581,719 UART: [art] Extend RT PCRs Done
2,582,147 UART: [art] Lock RT PCRs Done
2,583,633 UART: [art] Populate DV Done
2,591,918 UART: [fht] FMC Alias Private Key: 7
2,592,920 UART: [art] Derive CDI
2,593,200 UART: [art] Store in slot 0x4
2,678,981 UART: [art] Derive Key Pair
2,679,341 UART: [art] Store priv key in slot 0x5
2,692,963 UART: [art] Derive Key Pair - Done
2,707,766 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,579 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,344 UART: [art] PUB.X = CB27A97F13F0668915C6DFDC90337BF59650D54B2672EB42945399668FBD69CD0D742EBD34C8503D9AA42A6CED3935E5
2,731,117 UART: [art] PUB.Y = B940A6B16866ABD927A182F2F918C247698FCEB47DAAC6F7D5B434316D688C5B2791988E418A1E7B6F7D990B63F25D46
2,738,068 UART: [art] SIG.R = 41BF7682734A84E179964BF340025501267A0096067BA42E6387F4F64C89484F25A9030E2556D7279E52F4D37DC51C2E
2,744,787 UART: [art] SIG.S = F5E87A0A954824D8E6D9ED4473B144D02E26927151F7A4FE504EDA327A22CA982CFFF4EC28D796816944B4155520AFAE
2,769,200 UART: mbox::rt_entry...
2,769,572 UART: ____ _ _ _ ____ _____
2,770,356 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,156 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,924 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,692 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,460 UART: |_|
2,773,772 UART:
2,891,562 UART: [rt] Runtime listening for mailbox commands...
2,897,896 >>> mbox cmd response data (4360 bytes)
2,897,897 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,928,679 >>> mbox cmd response data (0 bytes)
2,928,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,928,798 UART:
2,928,814 UART: Running Caliptra ROM ...
2,929,222 UART:
2,929,277 UART: [state] CFI Enabled
2,931,777 UART: [state] LifecycleState = Unprovisioned
2,932,432 UART: [state] DebugLocked = No
2,932,964 UART: [state] WD Timer not started. Device not locked for debugging
2,934,194 UART: [kat] SHA2-256
3,737,744 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,741,848 UART: [kat] ++
3,742,000 UART: [kat] sha1
3,746,196 UART: [kat] SHA2-256
3,748,136 UART: [kat] SHA2-384
3,750,755 UART: [kat] SHA2-512-ACC
3,752,655 UART: [kat] ECC-384
3,762,470 UART: [kat] HMAC-384Kdf
3,767,074 UART: [kat] LMS
4,015,386 UART: [kat] --
4,016,430 UART: [update-reset] ++
5,375,481 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,376,494 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,531,709 >>> mbox cmd response: success
5,531,974 UART: [update-reset] Copying MAN_2 To MAN_1
5,539,988 UART: [update-reset Success] --
5,541,185 UART: [state] Locking Datavault
5,542,037 UART: [state] Locking PCR0, PCR1 and PCR31
5,542,641 UART: [state] Locking ICCM
5,543,163 UART: [exit] Launching FMC @ 0x40000130
5,548,493 UART:
5,548,509 UART: Running Caliptra FMC ...
5,548,917 UART:
5,548,971 UART: [state] CFI Enabled
5,637,838 UART: [art] Extend RT PCRs Done
5,638,266 UART: [art] Lock RT PCRs Done
5,639,597 UART: [art] Populate DV Done
5,647,786 UART: [fht] FMC Alias Private Key: 7
5,648,724 UART: [art] Derive CDI
5,649,004 UART: [art] Store in slot 0x4
5,734,597 UART: [art] Derive Key Pair
5,734,957 UART: [art] Store priv key in slot 0x5
5,748,573 UART: [art] Derive Key Pair - Done
5,763,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,779,189 UART: [art] Erasing AUTHORITY.KEYID = 7
5,779,954 UART: [art] PUB.X = E8CC0CF1A183AB4205074CFCDE12EA46E798158F5CB7C645381D54044A8609FFC7A14D6D5C4E9D29F86A30BDE36465E8
5,786,721 UART: [art] PUB.Y = 58098B29349F45112F48FFBB3756BB56C258FBB9A3AE866E33DA737F9C7573324B1C53773FD2A6711DCD72D22470441B
5,793,668 UART: [art] SIG.R = A56777499361FCBDCB64EE172E3156732E8A49FD4C20599FF56E0E4A14B214034ED640F86852B1CFC1B9EEBE868F1DF8
5,800,442 UART: [art] SIG.S = 5D25C8642DD34F074F667E4F6A4FCDA6276ED82F3405D145302B5A2D7E01753A4BF57B7683351D1DF27001B0DD3033C0
5,824,016 UART: Caliptra RT
5,824,267 UART: [state] CFI Enabled
5,890,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,891,918 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,922,322 UART: [rt]cmd =0x494e464f, len=4
5,926,188 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,848 ready_for_fw is high
1,058,848 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,214,525 >>> mbox cmd response: success
2,214,525 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,276,498 UART:
2,276,514 UART: Running Caliptra FMC ...
2,276,922 UART:
2,276,976 UART: [state] CFI Enabled
2,287,454 UART: [fht] FMC Alias Private Key: 7
2,406,152 UART: [art] Extend RT PCRs Done
2,406,580 UART: [art] Lock RT PCRs Done
2,408,122 UART: [art] Populate DV Done
2,416,193 UART: [fht] FMC Alias Private Key: 7
2,417,291 UART: [art] Derive CDI
2,417,571 UART: [art] Store in slot 0x4
2,503,462 UART: [art] Derive Key Pair
2,503,822 UART: [art] Store priv key in slot 0x5
2,517,102 UART: [art] Derive Key Pair - Done
2,532,037 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,547,892 UART: [art] Erasing AUTHORITY.KEYID = 7
2,548,657 UART: [art] PUB.X = 1DD8CD3F0B4A724E97C4A9B433FF0FA14A7DA2925ECB7FC26179714B234DF9A308FFB51A05A3F9B7B7BAA5D5DE3E88C4
2,555,439 UART: [art] PUB.Y = 32257EF96914B2819603099FD1DC95756BBB82DB6F9A0EC0A50E919FDCA3292C534DB49CC114B73C2C6B6F4318AA0920
2,562,380 UART: [art] SIG.R = 9EDB39489BCD94C25A43CDFA8F82F549826BD3913A64FF313722305377E584AC6A71FBE1D9900F4CE9D03823AFDB1B14
2,569,157 UART: [art] SIG.S = 0D2F8384DFAF84A853985C21312CAD6FDD81ADE16A421A3DB0B8B359903B07291AC9EB0F3C3E5612CB39FACBDC204788
2,593,214 UART: mbox::rt_entry...
2,593,586 UART: ____ _ _ _ ____ _____
2,594,370 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,170 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,595,938 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,596,706 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,597,474 UART: |_|
2,597,786 UART:
2,716,676 UART: [rt] Runtime listening for mailbox commands...
2,723,010 >>> mbox cmd response data (4360 bytes)
2,723,011 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,753,793 >>> mbox cmd response data (0 bytes)
2,753,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,241,903 >>> mbox cmd response: success
5,255,622 UART:
5,255,638 UART: Running Caliptra FMC ...
5,256,046 UART:
5,256,100 UART: [state] CFI Enabled
5,345,693 UART: [art] Extend RT PCRs Done
5,346,121 UART: [art] Lock RT PCRs Done
5,347,564 UART: [art] Populate DV Done
5,355,829 UART: [fht] FMC Alias Private Key: 7
5,356,997 UART: [art] Derive CDI
5,357,277 UART: [art] Store in slot 0x4
5,443,268 UART: [art] Derive Key Pair
5,443,628 UART: [art] Store priv key in slot 0x5
5,457,066 UART: [art] Derive Key Pair - Done
5,472,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,487,477 UART: [art] Erasing AUTHORITY.KEYID = 7
5,488,242 UART: [art] PUB.X = 384649A67A65CD58925ED6149A59BD3190C9E618F7585E851D389E7C4856F377D5DFBCDDDF219894FDEE09AC6C4582AF
5,495,017 UART: [art] PUB.Y = 8365F05E66A734AF2D6D21E1B25126D13D36DBA20CEDB4996BC4FE23238C22051AAE222C3F90CEC5CF96128E464BDEFC
5,501,977 UART: [art] SIG.R = 38B097F96DF43AB4FD3E5F87A639ABEB3F3994FF5FA511A61446EBDD1435C2FD34C665EE01E02AEAE0B06F67BC79E5BC
5,508,768 UART: [art] SIG.S = ACA4A058EDA71F97442B780F6FB9897CE029E7DD61FC26EE5BBAADBCEEBACD3C7AA1967D793B579388E7A58D9006E875
5,532,534 UART: Caliptra RT
5,532,785 UART: [state] CFI Enabled
5,598,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,600,476 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,631,184 UART: [rt]cmd =0x494e464f, len=4
5,634,744 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,272 UART: [state] WD Timer not started. Device not locked for debugging
87,383 UART: [kat] SHA2-256
890,933 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,037 UART: [kat] ++
895,189 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,169,827 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,761 UART: [idev] ++
1,172,929 UART: [idev] CDI.KEYID = 6
1,173,290 UART: [idev] SUBJECT.KEYID = 7
1,173,715 UART: [idev] UDS.KEYID = 0
1,174,061 ready_for_fw is high
1,174,061 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,094 UART: [idev] Sha1 KeyId Algorithm
1,208,212 UART: [idev] --
1,209,273 UART: [ldev] ++
1,209,441 UART: [ldev] CDI.KEYID = 6
1,209,805 UART: [ldev] SUBJECT.KEYID = 5
1,210,232 UART: [ldev] AUTHORITY.KEYID = 7
1,210,695 UART: [ldev] FE.KEYID = 1
1,215,785 UART: [ldev] Erasing FE.KEYID = 1
1,242,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,835 UART: [ldev] --
1,282,066 UART: [fwproc] Wait for Commands...
1,282,785 UART: [fwproc] Recv command 0x46574c44
1,283,518 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,419 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,594 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,183 >>> mbox cmd response: success
2,363,183 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,364,371 UART: [afmc] ++
2,364,539 UART: [afmc] CDI.KEYID = 6
2,364,902 UART: [afmc] SUBJECT.KEYID = 7
2,365,328 UART: [afmc] AUTHORITY.KEYID = 5
2,401,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,255 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,965 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,846 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,547 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,214 UART: [afmc] --
2,444,203 UART: [cold-reset] --
2,444,953 UART: [state] Locking Datavault
2,446,416 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,020 UART: [state] Locking ICCM
2,447,552 UART: [exit] Launching FMC @ 0x40000130
2,452,882 UART:
2,452,898 UART: Running Caliptra FMC ...
2,453,306 UART:
2,453,449 UART: [state] CFI Enabled
2,464,169 UART: [fht] FMC Alias Private Key: 7
2,583,649 UART: [art] Extend RT PCRs Done
2,584,077 UART: [art] Lock RT PCRs Done
2,585,559 UART: [art] Populate DV Done
2,593,780 UART: [fht] FMC Alias Private Key: 7
2,594,914 UART: [art] Derive CDI
2,595,194 UART: [art] Store in slot 0x4
2,680,715 UART: [art] Derive Key Pair
2,681,075 UART: [art] Store priv key in slot 0x5
2,693,957 UART: [art] Derive Key Pair - Done
2,708,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,201 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,966 UART: [art] PUB.X = 46BE250EC819FB72E92F8890B2F28F26B8A9309F2521C0F4507DB111446368D1952F0B5549C1392DDDF196919963D3A1
2,731,724 UART: [art] PUB.Y = ABDA8F33FCB92F60DAE0901E5896B4A863C56DDE33F784ED350BB0F2DF6214E94DB5AA41F8A04970D627044819A1465D
2,738,680 UART: [art] SIG.R = 89223EEC7A78726B9EBD245063F9EC5EF89B48F86DF8ECAEB22421A1708D873481AA0A527BF13530104FBFC3EA408F3E
2,745,459 UART: [art] SIG.S = 42D3497A3C1FCBECD90F7D78953417173D0EBDFFC4F3843879464700E8ACE59C883F72BAE7E738FBA34C159C036CB955
2,769,234 UART: mbox::rt_entry...
2,769,606 UART: ____ _ _ _ ____ _____
2,770,390 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,190 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,958 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,726 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,494 UART: |_|
2,773,806 UART:
2,891,766 UART: [rt] Runtime listening for mailbox commands...
2,898,100 >>> mbox cmd response data (4360 bytes)
2,898,101 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,928,883 >>> mbox cmd response data (0 bytes)
2,928,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,929,002 UART:
2,929,018 UART: Running Caliptra ROM ...
2,929,426 UART:
2,929,568 UART: [state] CFI Enabled
2,932,334 UART: [state] LifecycleState = Unprovisioned
2,932,989 UART: [state] DebugLocked = No
2,933,651 UART: [state] WD Timer not started. Device not locked for debugging
2,934,873 UART: [kat] SHA2-256
3,738,423 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,742,527 UART: [kat] ++
3,742,679 UART: [kat] sha1
3,746,811 UART: [kat] SHA2-256
3,748,751 UART: [kat] SHA2-384
3,751,492 UART: [kat] SHA2-512-ACC
3,753,392 UART: [kat] ECC-384
3,763,069 UART: [kat] HMAC-384Kdf
3,767,651 UART: [kat] LMS
4,015,963 UART: [kat] --
4,016,759 UART: [update-reset] ++
5,375,908 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,377,033 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,532,248 >>> mbox cmd response: success
5,532,525 UART: [update-reset] Copying MAN_2 To MAN_1
5,540,539 UART: [update-reset Success] --
5,541,286 UART: [state] Locking Datavault
5,542,060 UART: [state] Locking PCR0, PCR1 and PCR31
5,542,664 UART: [state] Locking ICCM
5,543,098 UART: [exit] Launching FMC @ 0x40000130
5,548,428 UART:
5,548,444 UART: Running Caliptra FMC ...
5,548,852 UART:
5,548,995 UART: [state] CFI Enabled
5,638,796 UART: [art] Extend RT PCRs Done
5,639,224 UART: [art] Lock RT PCRs Done
5,640,513 UART: [art] Populate DV Done
5,648,742 UART: [fht] FMC Alias Private Key: 7
5,649,680 UART: [art] Derive CDI
5,649,960 UART: [art] Store in slot 0x4
5,735,815 UART: [art] Derive Key Pair
5,736,175 UART: [art] Store priv key in slot 0x5
5,749,609 UART: [art] Derive Key Pair - Done
5,764,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,779,916 UART: [art] Erasing AUTHORITY.KEYID = 7
5,780,681 UART: [art] PUB.X = D85A62C00957044B110BCB5942CEB91F57175B62351B1F5520D98993F328996C4FFB9577CE8984018FAF5DE479F411CA
5,787,437 UART: [art] PUB.Y = 877BA8971EC3C7CB26FD1E071CA147E7F41AB9C34EA880B4821FE8236C6E16EE2E0BFBAE2BBB91E33851FC0D4FEDB9B0
5,794,404 UART: [art] SIG.R = 5248C3FD883723EA646E3AA9EF4FB81442647666B9358B62E098C71D1972048E8665AEE07F852BE06AA17239555A2AE7
5,801,167 UART: [art] SIG.S = 0477B4FD546E546ACF9D836B30904B2C79026E26D8F9EEC9642A91C5A46C0E525CEBDF4A1722CCA36B40B557D716ED87
5,825,598 UART: Caliptra RT
5,825,941 UART: [state] CFI Enabled
5,893,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,894,591 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,925,099 UART: [rt]cmd =0x494e464f, len=4
5,928,801 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,355 ready_for_fw is high
1,060,355 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,376 >>> mbox cmd response: success
2,217,376 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,280,417 UART:
2,280,433 UART: Running Caliptra FMC ...
2,280,841 UART:
2,280,984 UART: [state] CFI Enabled
2,291,034 UART: [fht] FMC Alias Private Key: 7
2,409,730 UART: [art] Extend RT PCRs Done
2,410,158 UART: [art] Lock RT PCRs Done
2,412,006 UART: [art] Populate DV Done
2,420,249 UART: [fht] FMC Alias Private Key: 7
2,421,321 UART: [art] Derive CDI
2,421,601 UART: [art] Store in slot 0x4
2,507,278 UART: [art] Derive Key Pair
2,507,638 UART: [art] Store priv key in slot 0x5
2,521,040 UART: [art] Derive Key Pair - Done
2,535,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,350 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,115 UART: [art] PUB.X = 09BEE0FC6110D9C712200B4B049D29143A43001E4133D63962C35A06B69602089C05FC0B7609EF34D374D9CB87763CCD
2,558,832 UART: [art] PUB.Y = FED6C65FC83F7610467738A783DEB715F2AAAE1EF3FD28A311813CC5AED77C918F041CA940E6FC0F73FBEF758AB1B6B4
2,565,798 UART: [art] SIG.R = 67E68D0A420D0BCCDE2F0E5C6E410327F2144A3CFF7EF760E2C0EA39BED10EFC7C4E0E761FE2A6DD58D0DF8C68CD1379
2,572,573 UART: [art] SIG.S = EB676E866F38D38838AFFF6E9D51D95B2B30EC51E2FD30680BCA90E9E7C0CF6CA9A3CE049ED3862B83FDB8F6AFB9B1D6
2,596,465 UART: mbox::rt_entry...
2,596,837 UART: ____ _ _ _ ____ _____
2,597,621 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,421 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,189 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,957 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,725 UART: |_|
2,601,037 UART:
2,720,193 UART: [rt] Runtime listening for mailbox commands...
2,726,527 >>> mbox cmd response data (4360 bytes)
2,726,528 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,757,310 >>> mbox cmd response data (0 bytes)
2,757,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,244,131 >>> mbox cmd response: success
5,257,550 UART:
5,257,566 UART: Running Caliptra FMC ...
5,257,974 UART:
5,258,117 UART: [state] CFI Enabled
5,346,934 UART: [art] Extend RT PCRs Done
5,347,362 UART: [art] Lock RT PCRs Done
5,348,531 UART: [art] Populate DV Done
5,356,616 UART: [fht] FMC Alias Private Key: 7
5,357,632 UART: [art] Derive CDI
5,357,912 UART: [art] Store in slot 0x4
5,443,821 UART: [art] Derive Key Pair
5,444,181 UART: [art] Store priv key in slot 0x5
5,456,945 UART: [art] Derive Key Pair - Done
5,471,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,486,736 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,501 UART: [art] PUB.X = DEF9C56D2FF89DB1BE7ED51F63272BEDE427246346CF4484832B0412217FF2BB174853FE0E472DBB20B5598EDDD8B09A
5,494,279 UART: [art] PUB.Y = D5F5AA77FA644CF7DBFFA5C60C76E664DF3667E362AFFFFBF9BB6E3AC3174F5FC6BC55FBF7A3ED55D0A63162CEF81EA6
5,501,262 UART: [art] SIG.R = 9A5F5CA7B8105723D4E7B0DADDAE526EFB3B5B1D1B12DA061EE514600A0C488604F3CDEEB4E83F36AA1AC48A0354F758
5,508,037 UART: [art] SIG.S = 7ECEFA45CEBD01CD7393258DC8C36074B656652F31F4389A8ACB1A19B9E69C1085D943D3B5D8D93D387E778C8197D3A7
5,531,412 UART: Caliptra RT
5,531,755 UART: [state] CFI Enabled
5,599,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,600,740 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,631,224 UART: [rt]cmd =0x494e464f, len=4
5,634,978 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
893,136 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,261 UART: [kat] ++
897,413 UART: [kat] sha1
901,519 UART: [kat] SHA2-256
903,459 UART: [kat] SHA2-384
906,194 UART: [kat] SHA2-512-ACC
908,095 UART: [kat] ECC-384
918,016 UART: [kat] HMAC-384Kdf
922,594 UART: [kat] LMS
1,170,922 UART: [kat] --
1,171,683 UART: [cold-reset] ++
1,172,185 UART: [fht] FHT @ 0x50003400
1,174,804 UART: [idev] ++
1,174,972 UART: [idev] CDI.KEYID = 6
1,175,332 UART: [idev] SUBJECT.KEYID = 7
1,175,756 UART: [idev] UDS.KEYID = 0
1,176,101 ready_for_fw is high
1,176,101 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,468 UART: [idev] Erasing UDS.KEYID = 0
1,200,439 UART: [idev] Sha1 KeyId Algorithm
1,208,769 UART: [idev] --
1,209,879 UART: [ldev] ++
1,210,047 UART: [ldev] CDI.KEYID = 6
1,210,410 UART: [ldev] SUBJECT.KEYID = 5
1,210,836 UART: [ldev] AUTHORITY.KEYID = 7
1,211,299 UART: [ldev] FE.KEYID = 1
1,216,129 UART: [ldev] Erasing FE.KEYID = 1
1,243,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,199 UART: [ldev] --
1,282,686 UART: [fwproc] Wait for Commands...
1,283,510 UART: [fwproc] Recv command 0x46574c44
1,284,238 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,725 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,895 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,554 >>> mbox cmd response: success
2,364,554 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,365,754 UART: [afmc] ++
2,365,922 UART: [afmc] CDI.KEYID = 6
2,366,284 UART: [afmc] SUBJECT.KEYID = 7
2,366,709 UART: [afmc] AUTHORITY.KEYID = 5
2,401,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,865 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,574 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,457 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,158 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,144 UART: [afmc] --
2,445,204 UART: [cold-reset] --
2,445,914 UART: [state] Locking Datavault
2,447,039 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,643 UART: [state] Locking ICCM
2,448,079 UART: [exit] Launching FMC @ 0x40000130
2,453,409 UART:
2,453,425 UART: Running Caliptra FMC ...
2,453,833 UART:
2,453,887 UART: [state] CFI Enabled
2,464,001 UART: [fht] FMC Alias Private Key: 7
2,582,765 UART: [art] Extend RT PCRs Done
2,583,193 UART: [art] Lock RT PCRs Done
2,584,593 UART: [art] Populate DV Done
2,592,742 UART: [fht] FMC Alias Private Key: 7
2,593,846 UART: [art] Derive CDI
2,594,126 UART: [art] Store in slot 0x4
2,680,113 UART: [art] Derive Key Pair
2,680,473 UART: [art] Store priv key in slot 0x5
2,693,371 UART: [art] Derive Key Pair - Done
2,708,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,762 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,527 UART: [art] PUB.X = BB6FF3780D38BBD83B628E11667286AE57C4BB3A5153A937E0DB5789DF21F4F22BE71231153BB1CAE0A973B149F41881
2,731,300 UART: [art] PUB.Y = E67C5102802B7ED5287E6F7406F50A59A7B5185A0CC03373274418620F3146A6ED5A48E6F1DF6EDE767843204EA65A8F
2,738,233 UART: [art] SIG.R = 80B174B588254F27F0A926BDB556C4DF6935F3B24C84A62F0545F11196A6941F22F17F3671779FCD5EA39E14F2CA05FA
2,744,999 UART: [art] SIG.S = C9BCD2154D62264355B7EEDBD0DB5104ABA2F6D64E215A8DF29E2334C77C01397CEB0E9AB19F6BE974CC363356F0F24C
2,768,692 UART: mbox::rt_entry...
2,769,064 UART: ____ _ _ _ ____ _____
2,769,848 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,648 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,416 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,184 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,952 UART: |_|
2,773,264 UART:
2,891,767 UART: [rt] Runtime listening for mailbox commands...
2,898,101 >>> mbox cmd response data (4360 bytes)
2,898,102 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,928,884 >>> mbox cmd response data (0 bytes)
2,928,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,929,003 UART:
2,929,019 UART: Running Caliptra ROM ...
2,929,427 UART:
2,929,482 UART: [state] CFI Enabled
2,931,694 UART: [state] LifecycleState = Unprovisioned
2,932,349 UART: [state] DebugLocked = No
2,933,037 UART: [state] WD Timer not started. Device not locked for debugging
2,934,143 UART: [kat] SHA2-256
3,739,793 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,743,918 UART: [kat] ++
3,744,070 UART: [kat] sha1
3,748,204 UART: [kat] SHA2-256
3,750,144 UART: [kat] SHA2-384
3,752,987 UART: [kat] SHA2-512-ACC
3,754,887 UART: [kat] ECC-384
3,764,686 UART: [kat] HMAC-384Kdf
3,769,240 UART: [kat] LMS
4,017,568 UART: [kat] --
4,018,440 UART: [update-reset] ++
5,378,422 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,379,609 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,534,824 >>> mbox cmd response: success
5,534,951 UART: [update-reset] Copying MAN_2 To MAN_1
5,542,965 UART: [update-reset Success] --
5,544,088 UART: [state] Locking Datavault
5,544,802 UART: [state] Locking PCR0, PCR1 and PCR31
5,545,406 UART: [state] Locking ICCM
5,545,880 UART: [exit] Launching FMC @ 0x40000130
5,551,210 UART:
5,551,226 UART: Running Caliptra FMC ...
5,551,634 UART:
5,551,688 UART: [state] CFI Enabled
5,640,945 UART: [art] Extend RT PCRs Done
5,641,373 UART: [art] Lock RT PCRs Done
5,642,840 UART: [art] Populate DV Done
5,650,919 UART: [fht] FMC Alias Private Key: 7
5,651,879 UART: [art] Derive CDI
5,652,159 UART: [art] Store in slot 0x4
5,738,214 UART: [art] Derive Key Pair
5,738,574 UART: [art] Store priv key in slot 0x5
5,751,194 UART: [art] Derive Key Pair - Done
5,765,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,781,701 UART: [art] Erasing AUTHORITY.KEYID = 7
5,782,466 UART: [art] PUB.X = 311DA02C211060E595BD4D3039AA0A49E9D35E0A4A2A673A2796BA8E6679D0D3EF3A8684B71A229944AB0825834A08E6
5,789,224 UART: [art] PUB.Y = F10235C8DDAD49842C874B4C577C98B923666936130BCB65ABFA88D28493ECA8D82AB3D0947F649464277BB9CA614C52
5,796,170 UART: [art] SIG.R = 56166902012CEB8E8BCE39DF204E250B1550AF9FB3B414184CCB299999AAA761F56036DFE78478CD5A1DE8CFE101B44A
5,802,938 UART: [art] SIG.S = 5E495BF725E6D59F900E8FC078C87370FF816FB0D69561AA37F289D29D83A2892669C02BC499A6A522E671A5D72CAADE
5,826,623 UART: Caliptra RT
5,826,874 UART: [state] CFI Enabled
5,891,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,893,136 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,923,968 UART: [rt]cmd =0x494e464f, len=4
5,927,448 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,465 ready_for_fw is high
1,060,465 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,377 >>> mbox cmd response: success
2,215,377 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,277,596 UART:
2,277,612 UART: Running Caliptra FMC ...
2,278,020 UART:
2,278,074 UART: [state] CFI Enabled
2,288,438 UART: [fht] FMC Alias Private Key: 7
2,407,204 UART: [art] Extend RT PCRs Done
2,407,632 UART: [art] Lock RT PCRs Done
2,409,460 UART: [art] Populate DV Done
2,417,759 UART: [fht] FMC Alias Private Key: 7
2,418,715 UART: [art] Derive CDI
2,418,995 UART: [art] Store in slot 0x4
2,504,772 UART: [art] Derive Key Pair
2,505,132 UART: [art] Store priv key in slot 0x5
2,518,936 UART: [art] Derive Key Pair - Done
2,533,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,549,151 UART: [art] Erasing AUTHORITY.KEYID = 7
2,549,916 UART: [art] PUB.X = 46BB117E36FA0A762A7CA705E8A30A5465CDE822885CB85F2B4F3C6B95F2E92A2BDB5A0B714AC73D0855A53FCA66E532
2,556,685 UART: [art] PUB.Y = DBCA73E6AC56ACE1A9EE0D64DD50361D2779229B7D323A125B2045377F3E664ACDB8E5B3FF4CDDBC9B6F0013D1E4BE9D
2,563,634 UART: [art] SIG.R = E8EEB8FB25E7131BE562DFCBD5AC839F34A965CAB49E2A44DC0A39D883EDA21BC2A36CB8FA1055BC80FD27090705EA05
2,570,413 UART: [art] SIG.S = 5AD6BC10249EDBB2D00E4334D0B736D25929C7A54439C8347579518774A6B8837F2C57CB5B8D3B8A411E9C9E77E0730D
2,594,037 UART: mbox::rt_entry...
2,594,409 UART: ____ _ _ _ ____ _____
2,595,193 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,993 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,761 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,529 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,598,297 UART: |_|
2,598,609 UART:
2,716,997 UART: [rt] Runtime listening for mailbox commands...
2,723,331 >>> mbox cmd response data (4360 bytes)
2,723,332 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,754,114 >>> mbox cmd response data (0 bytes)
2,754,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,242,779 >>> mbox cmd response: success
5,255,900 UART:
5,255,916 UART: Running Caliptra FMC ...
5,256,324 UART:
5,256,378 UART: [state] CFI Enabled
5,345,745 UART: [art] Extend RT PCRs Done
5,346,173 UART: [art] Lock RT PCRs Done
5,347,612 UART: [art] Populate DV Done
5,356,027 UART: [fht] FMC Alias Private Key: 7
5,357,165 UART: [art] Derive CDI
5,357,445 UART: [art] Store in slot 0x4
5,443,206 UART: [art] Derive Key Pair
5,443,566 UART: [art] Store priv key in slot 0x5
5,456,426 UART: [art] Derive Key Pair - Done
5,471,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,486,381 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,146 UART: [art] PUB.X = C8B24E73A433376EE18CCFDBA1B2F2FAD13194B6811AA91E87EFB4C7EC5F3B0F86F2BCF6A0FE9F14CBF9ADFA05FA6684
5,493,942 UART: [art] PUB.Y = BEB42C524FDFAEF5EAA1036274A5B80C22C4B73F6079D6A4585BA4B9EBF72D9BCC738BAED618E5EFE06FC395408600B4
5,500,886 UART: [art] SIG.R = 32D591B239555DAC507FE67912F9FDB7E3E46B8750EE77878C9D2AEBAE82AAB96C52CF86C90CF02EC7445EC1CE4C4E04
5,507,668 UART: [art] SIG.S = 7B8A6C359759B7F4C0E8670556FF7C1B793A24968D2CE942564D3FE1825A98D8E0D8FCFF3A642F029EE2355B705A3E2F
5,531,482 UART: Caliptra RT
5,531,733 UART: [state] CFI Enabled
5,599,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,600,439 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,630,841 UART: [rt]cmd =0x494e464f, len=4
5,634,471 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
893,391 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,516 UART: [kat] ++
897,668 UART: [kat] sha1
902,050 UART: [kat] SHA2-256
903,990 UART: [kat] SHA2-384
906,861 UART: [kat] SHA2-512-ACC
908,762 UART: [kat] ECC-384
918,489 UART: [kat] HMAC-384Kdf
922,909 UART: [kat] LMS
1,171,237 UART: [kat] --
1,172,126 UART: [cold-reset] ++
1,172,682 UART: [fht] FHT @ 0x50003400
1,175,269 UART: [idev] ++
1,175,437 UART: [idev] CDI.KEYID = 6
1,175,797 UART: [idev] SUBJECT.KEYID = 7
1,176,221 UART: [idev] UDS.KEYID = 0
1,176,566 ready_for_fw is high
1,176,566 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,261 UART: [idev] Erasing UDS.KEYID = 0
1,200,778 UART: [idev] Sha1 KeyId Algorithm
1,209,194 UART: [idev] --
1,210,268 UART: [ldev] ++
1,210,436 UART: [ldev] CDI.KEYID = 6
1,210,799 UART: [ldev] SUBJECT.KEYID = 5
1,211,225 UART: [ldev] AUTHORITY.KEYID = 7
1,211,688 UART: [ldev] FE.KEYID = 1
1,217,076 UART: [ldev] Erasing FE.KEYID = 1
1,243,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,000 UART: [ldev] --
1,282,459 UART: [fwproc] Wait for Commands...
1,283,065 UART: [fwproc] Recv command 0x46574c44
1,283,793 UART: [fwproc] Recv'd Img size: 82832 bytes
2,220,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,864 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,278,034 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,757 >>> mbox cmd response: success
2,364,757 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,365,777 UART: [afmc] ++
2,365,945 UART: [afmc] CDI.KEYID = 6
2,366,307 UART: [afmc] SUBJECT.KEYID = 7
2,366,732 UART: [afmc] AUTHORITY.KEYID = 5
2,401,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,138 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,847 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,730 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,431 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,097 UART: [afmc] --
2,445,217 UART: [cold-reset] --
2,446,071 UART: [state] Locking Datavault
2,447,224 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,828 UART: [state] Locking ICCM
2,448,298 UART: [exit] Launching FMC @ 0x40000130
2,453,628 UART:
2,453,644 UART: Running Caliptra FMC ...
2,454,052 UART:
2,454,195 UART: [state] CFI Enabled
2,464,681 UART: [fht] FMC Alias Private Key: 7
2,583,127 UART: [art] Extend RT PCRs Done
2,583,555 UART: [art] Lock RT PCRs Done
2,585,297 UART: [art] Populate DV Done
2,593,664 UART: [fht] FMC Alias Private Key: 7
2,594,598 UART: [art] Derive CDI
2,594,878 UART: [art] Store in slot 0x4
2,680,211 UART: [art] Derive Key Pair
2,680,571 UART: [art] Store priv key in slot 0x5
2,694,763 UART: [art] Derive Key Pair - Done
2,709,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,969 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,734 UART: [art] PUB.X = C0B5C54EC2957E7E9DEFFB8AF5D5E361AE272B544A0F73ECCC6EB7A5D48A9C611ABC7B1F33A688B3A6731DD8F3146C4B
2,732,527 UART: [art] PUB.Y = 7D85EC76A59459AC47D5D80DDD67F80FE05DF5BA22F41F23DB2B47265549973CCB0BC59CCA50263DE53F747A82E58450
2,739,478 UART: [art] SIG.R = B2E9476AEA1D9F024F56F6342578BE7C9555D18565C6029A2F98DDF0FCDD27F71BDE7B0309793BDB88339E94549985C0
2,746,240 UART: [art] SIG.S = 64E1D31DA01956AD6BC44F77ECA6F14913769951823EAC87C4E0D11CC33B5DE6F7A167BE15FC159A90EC96A59444A85C
2,770,042 UART: mbox::rt_entry...
2,770,414 UART: ____ _ _ _ ____ _____
2,771,198 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,998 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,766 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,534 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,302 UART: |_|
2,774,614 UART:
2,893,698 UART: [rt] Runtime listening for mailbox commands...
2,900,032 >>> mbox cmd response data (4360 bytes)
2,900,033 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,930,815 >>> mbox cmd response data (0 bytes)
2,930,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,930,934 UART:
2,930,950 UART: Running Caliptra ROM ...
2,931,358 UART:
2,931,500 UART: [state] CFI Enabled
2,934,152 UART: [state] LifecycleState = Unprovisioned
2,934,807 UART: [state] DebugLocked = No
2,935,363 UART: [state] WD Timer not started. Device not locked for debugging
2,936,657 UART: [kat] SHA2-256
3,742,307 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,746,432 UART: [kat] ++
3,746,584 UART: [kat] sha1
3,750,710 UART: [kat] SHA2-256
3,752,650 UART: [kat] SHA2-384
3,755,243 UART: [kat] SHA2-512-ACC
3,757,143 UART: [kat] ECC-384
3,766,948 UART: [kat] HMAC-384Kdf
3,771,472 UART: [kat] LMS
4,019,800 UART: [kat] --
4,020,720 UART: [update-reset] ++
5,380,052 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,381,183 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,536,398 >>> mbox cmd response: success
5,536,525 UART: [update-reset] Copying MAN_2 To MAN_1
5,544,539 UART: [update-reset Success] --
5,545,670 UART: [state] Locking Datavault
5,546,610 UART: [state] Locking PCR0, PCR1 and PCR31
5,547,214 UART: [state] Locking ICCM
5,547,804 UART: [exit] Launching FMC @ 0x40000130
5,553,134 UART:
5,553,150 UART: Running Caliptra FMC ...
5,553,558 UART:
5,553,701 UART: [state] CFI Enabled
5,642,436 UART: [art] Extend RT PCRs Done
5,642,864 UART: [art] Lock RT PCRs Done
5,643,939 UART: [art] Populate DV Done
5,652,036 UART: [fht] FMC Alias Private Key: 7
5,653,188 UART: [art] Derive CDI
5,653,468 UART: [art] Store in slot 0x4
5,739,331 UART: [art] Derive Key Pair
5,739,691 UART: [art] Store priv key in slot 0x5
5,752,861 UART: [art] Derive Key Pair - Done
5,767,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,783,695 UART: [art] Erasing AUTHORITY.KEYID = 7
5,784,460 UART: [art] PUB.X = 72C4E26AF920332A76C5D9BBC37C62CAC148AC2AB3997037D9F19C134F4422DF61832B6DD7A79BBAAC6D0FB72B5D62FB
5,791,245 UART: [art] PUB.Y = 56474EC023E97D3588857E3B6391924B3D41C26B972CE2E9AE1A25B7DE7C55591E485EC9D84FCFEB02B4F6EBD8073BFA
5,798,201 UART: [art] SIG.R = 28F222A2064FB89B91E749733831E70621AF14E8C364BD03C361147C28B0144997A059DF919081CDEF52BC5CA3D1E916
5,804,958 UART: [art] SIG.S = 3A166FE19C6378888A55B45C75EDCD853E4CE39BE907C1D0E2F4853F25689A3F5986057182571B61F29A88782DCF6AF4
5,828,674 UART: Caliptra RT
5,829,017 UART: [state] CFI Enabled
5,895,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,897,421 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,928,055 UART: [rt]cmd =0x494e464f, len=4
5,931,781 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,232 ready_for_fw is high
1,061,232 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,218,448 >>> mbox cmd response: success
2,218,448 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,281,259 UART:
2,281,275 UART: Running Caliptra FMC ...
2,281,683 UART:
2,281,826 UART: [state] CFI Enabled
2,292,724 UART: [fht] FMC Alias Private Key: 7
2,411,626 UART: [art] Extend RT PCRs Done
2,412,054 UART: [art] Lock RT PCRs Done
2,413,274 UART: [art] Populate DV Done
2,421,519 UART: [fht] FMC Alias Private Key: 7
2,422,449 UART: [art] Derive CDI
2,422,729 UART: [art] Store in slot 0x4
2,508,752 UART: [art] Derive Key Pair
2,509,112 UART: [art] Store priv key in slot 0x5
2,522,536 UART: [art] Derive Key Pair - Done
2,537,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,552,971 UART: [art] Erasing AUTHORITY.KEYID = 7
2,553,736 UART: [art] PUB.X = 7322BBBE4F00A4BFCB46BFB8F33E3A524B9D3948BA7C8C4B1B51A1A1041B9700C2F705DCAD7A473B1D224919E745A84B
2,560,472 UART: [art] PUB.Y = EBF55CC5B2D0FDD2794C3549C43503B37A5F1EF35B9AAA067468A1A26E2FF48C70AF9C8B5C427E92A401983059E0753E
2,567,423 UART: [art] SIG.R = 1B6F35AC20A522A06FBC7218C43499A9EB3A3ACEFD68E8102AB089E9E661C8E405B13E704D39C923E5CCD8598642524F
2,574,198 UART: [art] SIG.S = ED248A9C5272E125AF6FC73BEDA0325441BDBB52501AACC56A4FB798D8D49C9FCDBF45CD9C60A28B4220773F42926D09
2,598,113 UART: mbox::rt_entry...
2,598,485 UART: ____ _ _ _ ____ _____
2,599,269 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,600,069 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,600,837 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,601,605 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,602,373 UART: |_|
2,602,685 UART:
2,721,395 UART: [rt] Runtime listening for mailbox commands...
2,727,729 >>> mbox cmd response data (4360 bytes)
2,727,730 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,758,512 >>> mbox cmd response data (0 bytes)
2,758,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,248,872 >>> mbox cmd response: success
5,262,495 UART:
5,262,511 UART: Running Caliptra FMC ...
5,262,919 UART:
5,263,062 UART: [state] CFI Enabled
5,352,167 UART: [art] Extend RT PCRs Done
5,352,595 UART: [art] Lock RT PCRs Done
5,353,972 UART: [art] Populate DV Done
5,362,115 UART: [fht] FMC Alias Private Key: 7
5,363,147 UART: [art] Derive CDI
5,363,427 UART: [art] Store in slot 0x4
5,449,516 UART: [art] Derive Key Pair
5,449,876 UART: [art] Store priv key in slot 0x5
5,463,060 UART: [art] Derive Key Pair - Done
5,477,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,492,791 UART: [art] Erasing AUTHORITY.KEYID = 7
5,493,556 UART: [art] PUB.X = 67F15149A74284B9A60DB535BBB06C19354DB266AB6AA81D3194D6D21524AB17FDE337A8EA033E270840FC2A70B12B61
5,500,321 UART: [art] PUB.Y = 7647EE465110A05BE87498F60E720A1DA721E3C299D023A58ED18F00DD2C51FAC34AD55F0690EB425C88DF2CEBC45112
5,507,248 UART: [art] SIG.R = 77752D3B6A04CFFF4CA12D58EDE626167EF2F10E78ACC1055D8037BEA59C3CD943460E5FACEDDCDF5961D276E620ACF5
5,514,028 UART: [art] SIG.S = 41255B370105540C3F6A327FFEB38BCA85445ADE59E04C5A09F0C791021CD6681B6305F3E2ED7505D0137C24A8E0684C
5,538,127 UART: Caliptra RT
5,538,470 UART: [state] CFI Enabled
5,603,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,605,392 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,635,944 UART: [rt]cmd =0x494e464f, len=4
5,639,588 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,017 UART:
192,386 UART: Running Caliptra ROM ...
193,498 UART:
193,640 UART: [state] CFI Enabled
258,670 UART: [state] LifecycleState = Unprovisioned
260,605 UART: [state] DebugLocked = No
263,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,739 UART: [kat] SHA2-256
438,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,936 UART: [kat] ++
449,382 UART: [kat] sha1
461,179 UART: [kat] SHA2-256
463,842 UART: [kat] SHA2-384
470,682 UART: [kat] SHA2-512-ACC
473,048 UART: [kat] ECC-384
2,764,690 UART: [kat] HMAC-384Kdf
2,777,427 UART: [kat] LMS
3,967,699 UART: [kat] --
3,971,923 UART: [cold-reset] ++
3,974,211 UART: [fht] Storing FHT @ 0x50003400
3,985,544 UART: [idev] ++
3,986,106 UART: [idev] CDI.KEYID = 6
3,987,036 UART: [idev] SUBJECT.KEYID = 7
3,988,301 UART: [idev] UDS.KEYID = 0
3,989,285 ready_for_fw is high
3,989,471 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,093,769 UART: [idev] Erasing UDS.KEYID = 0
7,322,699 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,669 UART: [idev] --
7,348,775 UART: [ldev] ++
7,349,344 UART: [ldev] CDI.KEYID = 6
7,350,308 UART: [ldev] SUBJECT.KEYID = 5
7,351,528 UART: [ldev] AUTHORITY.KEYID = 7
7,352,816 UART: [ldev] FE.KEYID = 1
7,397,820 UART: [ldev] Erasing FE.KEYID = 1
10,728,762 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,218 UART: [ldev] --
13,092,812 UART: [fwproc] Waiting for Commands...
13,095,339 UART: [fwproc] Received command 0x46574c44
13,097,527 UART: [fwproc] Received Image of size 82832 bytes
16,760,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,837,527 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,910,700 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,114,514 >>> mbox cmd response: success
17,115,544 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,119,616 UART: [afmc] ++
17,120,194 UART: [afmc] CDI.KEYID = 6
17,121,082 UART: [afmc] SUBJECT.KEYID = 7
17,122,357 UART: [afmc] AUTHORITY.KEYID = 5
20,492,801 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,788,273 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,790,538 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,804,990 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,819,693 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,834,165 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,856,318 UART: [afmc] --
22,859,485 UART: [cold-reset] --
22,863,831 UART: [state] Locking Datavault
22,870,158 UART: [state] Locking PCR0, PCR1 and PCR31
22,871,915 UART: [state] Locking ICCM
22,873,364 UART: [exit] Launching FMC @ 0x40000130
22,881,760 UART:
22,881,997 UART: Running Caliptra FMC ...
22,883,099 UART:
22,883,269 UART: [state] CFI Enabled
22,950,739 UART: [fht] FMC Alias Private Key: 7
25,290,063 UART: [art] Extend RT PCRs Done
25,291,292 UART: [art] Lock RT PCRs Done
25,292,858 UART: [art] Populate DV Done
25,298,324 UART: [fht] FMC Alias Private Key: 7
25,300,074 UART: [art] Derive CDI
25,300,889 UART: [art] Store in slot 0x4
25,358,646 UART: [art] Derive Key Pair
25,359,650 UART: [art] Store priv key in slot 0x5
28,652,675 UART: [art] Derive Key Pair - Done
28,665,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,953,721 UART: [art] Erasing AUTHORITY.KEYID = 7
30,955,236 UART: [art] PUB.X = 30AF93E24D024C48BE1734FABD9D6B4915F761C4D332E9A7235571E9597F9DFBFD5B44BA5136A974C55F0293364BE7FC
30,962,510 UART: [art] PUB.Y = F81DC6BD3124C0BC40FD4C732736A9356F4A76CD1DADC08EEFAEEF12AB32110A699D0F27BCB72F4CC0243F9188F949E1
30,969,823 UART: [art] SIG.R = 8C298006AC767BDB911D0354D93EC5E76D793DCE765A1B71D3F73FFA225E4DC8D95D8167A22AB0D4D342DD01BF475247
30,977,229 UART: [art] SIG.S = 2B8D87162A7AA260E8224A332E5DEAFA65FA8EEADEE8DFC9DAA8374DB90E3ECDB118A6963D9C4C8B0409DD15C0C54C6C
32,282,756 UART: mbox::rt_entry...
32,283,724 UART: ____ _ _ _ ____ _____
32,285,708 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,287,714 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,289,569 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,291,416 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,293,347 UART: |_|
32,294,184 UART:
32,425,783 UART: [rt] Runtime listening for mailbox commands...
32,433,009 >>> mbox cmd response data (4360 bytes)
32,453,693 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,498,059 >>> mbox cmd response data (0 bytes)
34,578,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,728,793 UART:
34,729,172 UART: Running Caliptra ROM ...
34,730,303 UART:
34,730,486 UART: [state] CFI Enabled
34,791,040 UART: [state] LifecycleState = Unprovisioned
34,793,018 UART: [state] DebugLocked = No
34,794,965 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,799,925 UART: [kat] SHA2-256
34,969,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,980,121 UART: [kat] ++
34,980,665 UART: [kat] sha1
34,993,029 UART: [kat] SHA2-256
34,995,728 UART: [kat] SHA2-384
35,001,020 UART: [kat] SHA2-512-ACC
35,003,399 UART: [kat] ECC-384
37,297,214 UART: [kat] HMAC-384Kdf
37,326,827 UART: [kat] LMS
38,517,162 UART: [kat] --
38,522,893 UART: [update-reset] ++
42,710,116 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,713,643 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,111,366 >>> mbox cmd response: success
43,115,949 UART: [update-reset] Copying MAN_2 To MAN_1
43,134,034 UART: [update-reset Success] --
43,137,974 UART: [state] Locking Datavault
43,139,937 UART: [state] Locking PCR0, PCR1 and PCR31
43,141,698 UART: [state] Locking ICCM
43,142,934 UART: [exit] Launching FMC @ 0x40000130
43,151,307 UART:
43,151,556 UART: Running Caliptra FMC ...
43,152,581 UART:
43,152,727 UART: [state] CFI Enabled
43,249,742 UART: [art] Extend RT PCRs Done
43,250,939 UART: [art] Lock RT PCRs Done
43,252,317 UART: [art] Populate DV Done
43,257,936 UART: [fht] FMC Alias Private Key: 7
43,259,533 UART: [art] Derive CDI
43,260,348 UART: [art] Store in slot 0x4
43,318,125 UART: [art] Derive Key Pair
43,319,164 UART: [art] Store priv key in slot 0x5
46,611,795 UART: [art] Derive Key Pair - Done
46,624,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,914,548 UART: [art] Erasing AUTHORITY.KEYID = 7
48,916,056 UART: [art] PUB.X = DA857839D586D162503EDC699DE4E941FB78D6A43707E87CCE85C68C01CBEAE8BFE2041CE1DC702AED6ADA33C82CCB23
48,923,390 UART: [art] PUB.Y = CB3609580D657CAB5E8C155C495611F679A2F744A605E9E2D965CF5EF3F1C2D3214704F746D7788883DEDFAA1CEE124E
48,930,588 UART: [art] SIG.R = CCB3EFA79547EDF979813DAFEC5F67385EBEF3BD6B881E5424348852B55EEC2CF6CB5D83880C04B88679CC0D878E47B3
48,938,003 UART: [art] SIG.S = 8EA8256B2A7641852A2375FF68C95BB08EE92646ADDE5CD73384A33B28B6F03105E054B50C43D95524094430A79A5EDF
50,242,983 UART: Caliptra RT
50,243,706 UART: [state] CFI Enabled
54,015,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,016,992 UART: [rt] RT listening for mailbox commands...
54,048,280 UART: [rt]cmd =0x494e464f, len=4
54,052,387 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,782,776 ready_for_fw is high
3,783,382 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,221,111 >>> mbox cmd response: success
17,222,303 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,926,012 UART:
22,926,415 UART: Running Caliptra FMC ...
22,927,566 UART:
22,927,748 UART: [state] CFI Enabled
22,994,459 UART: [fht] FMC Alias Private Key: 7
25,334,075 UART: [art] Extend RT PCRs Done
25,335,304 UART: [art] Lock RT PCRs Done
25,337,092 UART: [art] Populate DV Done
25,342,574 UART: [fht] FMC Alias Private Key: 7
25,344,075 UART: [art] Derive CDI
25,344,817 UART: [art] Store in slot 0x4
25,402,378 UART: [art] Derive Key Pair
25,403,415 UART: [art] Store priv key in slot 0x5
28,695,930 UART: [art] Derive Key Pair - Done
28,708,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,996,424 UART: [art] Erasing AUTHORITY.KEYID = 7
30,997,940 UART: [art] PUB.X = 3AFCA90867CBB6E51C40ABB0C36363044908637A88796BE3BFCD15269852173AC0DF38C044287695440B9CC3707C5673
31,005,149 UART: [art] PUB.Y = 4FAA4620AF2620739845DFA191D6EE6DEBC074E49DE96D64B2847D901C7ED047AA129F534474854FBAA06AFE5EA7AC36
31,012,423 UART: [art] SIG.R = B376D8AD9021EA9CFCB4925D2AC2BD96B90B77937443AC9D2DE57D3A18C5EDECA3AF72B54D50B719DA0D2360E2BCC66C
31,019,896 UART: [art] SIG.S = 3B0C165297AAA4B6F4BB76A81B51960D65E3E0295C7E1EF089BB33C4FC84E7E9E655D9930278C8F35AF080545F0D738B
32,324,316 UART: mbox::rt_entry...
32,325,267 UART: ____ _ _ _ ____ _____
32,327,201 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,329,207 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,331,136 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,333,119 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,335,249 UART: |_|
32,336,064 UART:
32,467,692 UART: [rt] Runtime listening for mailbox commands...
32,474,907 >>> mbox cmd response data (4360 bytes)
32,496,268 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,540,670 >>> mbox cmd response data (0 bytes)
34,621,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,451,358 >>> mbox cmd response: success
43,486,100 UART:
43,486,428 UART: Running Caliptra FMC ...
43,487,484 UART:
43,487,633 UART: [state] CFI Enabled
43,587,113 UART: [art] Extend RT PCRs Done
43,588,306 UART: [art] Lock RT PCRs Done
43,589,630 UART: [art] Populate DV Done
43,595,263 UART: [fht] FMC Alias Private Key: 7
43,596,853 UART: [art] Derive CDI
43,597,589 UART: [art] Store in slot 0x4
43,656,085 UART: [art] Derive Key Pair
43,657,127 UART: [art] Store priv key in slot 0x5
46,950,137 UART: [art] Derive Key Pair - Done
46,963,159 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,251,200 UART: [art] Erasing AUTHORITY.KEYID = 7
49,252,714 UART: [art] PUB.X = C2010DB6857483AE1CF130F799B14EE41DF1CBD0BF9FA608241F81EECBA9502EE61900FE42B87B82A53E27E0158F24F4
49,259,982 UART: [art] PUB.Y = 741403B5280CF15CE8EF954E7A67D44DE29FAC2C8B4F098D0448F56F37A5FCE2D1C596A23A14141F968A717F84704722
49,267,223 UART: [art] SIG.R = 28AED7A1DACF938AB078444E1040818AFCB195D3B9B005DABA8A998AF7B6971D73A8642B71EC337CCABA37A3F75338F3
49,274,633 UART: [art] SIG.S = 1C4FD567E460F1CAF341ACE10EBA6C5C7A1FDF86791E80DC4BDDF3EEAE14B5067173AD47DF76247F86D893A70397228D
50,579,798 UART: Caliptra RT
50,580,497 UART: [state] CFI Enabled
54,349,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,351,453 UART: [rt] RT listening for mailbox commands...
54,383,167 UART: [rt]cmd =0x494e464f, len=4
54,387,523 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,518 UART:
192,881 UART: Running Caliptra ROM ...
194,012 UART:
603,577 UART: [state] CFI Enabled
618,020 UART: [state] LifecycleState = Unprovisioned
619,893 UART: [state] DebugLocked = No
621,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,908 UART: [kat] SHA2-256
796,633 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,152 UART: [kat] ++
807,646 UART: [kat] sha1
818,402 UART: [kat] SHA2-256
821,090 UART: [kat] SHA2-384
827,440 UART: [kat] SHA2-512-ACC
829,800 UART: [kat] ECC-384
3,115,469 UART: [kat] HMAC-384Kdf
3,126,176 UART: [kat] LMS
4,316,274 UART: [kat] --
4,322,277 UART: [cold-reset] ++
4,323,352 UART: [fht] Storing FHT @ 0x50003400
4,333,564 UART: [idev] ++
4,334,167 UART: [idev] CDI.KEYID = 6
4,335,049 UART: [idev] SUBJECT.KEYID = 7
4,336,291 UART: [idev] UDS.KEYID = 0
4,337,246 ready_for_fw is high
4,337,434 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,441,539 UART: [idev] Erasing UDS.KEYID = 0
7,622,731 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,494 UART: [idev] --
7,648,261 UART: [ldev] ++
7,648,820 UART: [ldev] CDI.KEYID = 6
7,649,750 UART: [ldev] SUBJECT.KEYID = 5
7,651,007 UART: [ldev] AUTHORITY.KEYID = 7
7,652,240 UART: [ldev] FE.KEYID = 1
7,666,985 UART: [ldev] Erasing FE.KEYID = 1
10,952,225 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,575 UART: [ldev] --
13,316,949 UART: [fwproc] Waiting for Commands...
13,318,891 UART: [fwproc] Received command 0x46574c44
13,321,070 UART: [fwproc] Received Image of size 82832 bytes
16,993,376 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,069,371 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,142,548 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,345,398 >>> mbox cmd response: success
17,345,896 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,349,160 UART: [afmc] ++
17,349,730 UART: [afmc] CDI.KEYID = 6
17,350,744 UART: [afmc] SUBJECT.KEYID = 7
17,351,946 UART: [afmc] AUTHORITY.KEYID = 5
20,669,404 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,964,733 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,966,993 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,981,411 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,996,115 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,010,552 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,031,000 UART: [afmc] --
23,034,377 UART: [cold-reset] --
23,037,964 UART: [state] Locking Datavault
23,043,860 UART: [state] Locking PCR0, PCR1 and PCR31
23,045,552 UART: [state] Locking ICCM
23,047,480 UART: [exit] Launching FMC @ 0x40000130
23,055,878 UART:
23,056,153 UART: Running Caliptra FMC ...
23,057,256 UART:
23,057,413 UART: [state] CFI Enabled
23,065,510 UART: [fht] FMC Alias Private Key: 7
25,405,955 UART: [art] Extend RT PCRs Done
25,407,183 UART: [art] Lock RT PCRs Done
25,408,676 UART: [art] Populate DV Done
25,414,305 UART: [fht] FMC Alias Private Key: 7
25,415,857 UART: [art] Derive CDI
25,416,665 UART: [art] Store in slot 0x4
25,459,636 UART: [art] Derive Key Pair
25,460,665 UART: [art] Store priv key in slot 0x5
28,703,145 UART: [art] Derive Key Pair - Done
28,716,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,996,230 UART: [art] Erasing AUTHORITY.KEYID = 7
30,997,739 UART: [art] PUB.X = 4D20B8DF6B997C6248885691F11F681F6CAB15C0D47E2659C6951A2DDAACA344B145860FA9DA395475B5907B0891715D
31,004,937 UART: [art] PUB.Y = 28F3C58CA5A01418EEB9DEE78184F38FC9853B4F6AA1A6C2E7095A909140370B892CA104C8BA029F08DB90635519A5CD
31,012,238 UART: [art] SIG.R = 0249A243EBF7D857648581C05F89B3FD709F29B09DFD71790232CFC034A95C0F8C5368A02118CB4F6A8E2C9331853329
31,019,579 UART: [art] SIG.S = AEFF5C7AE147E167061D93006BDE4ECF6B4055593C07D066A8BA9A9C2F359DF3D396BEC04ACCE18B68971BBFF7F45EE5
32,323,379 UART: mbox::rt_entry...
32,324,320 UART: ____ _ _ _ ____ _____
32,326,294 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,328,295 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,330,216 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,332,354 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,334,212 UART: |_|
32,335,008 UART:
32,466,628 UART: [rt] Runtime listening for mailbox commands...
32,473,846 >>> mbox cmd response data (4360 bytes)
32,494,987 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,539,379 >>> mbox cmd response data (0 bytes)
34,618,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,767,962 UART:
34,768,340 UART: Running Caliptra ROM ...
34,769,412 UART:
34,769,619 UART: [state] CFI Enabled
34,781,249 UART: [state] LifecycleState = Unprovisioned
34,783,192 UART: [state] DebugLocked = No
34,785,679 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,791,429 UART: [kat] SHA2-256
34,961,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,971,672 UART: [kat] ++
34,972,135 UART: [kat] sha1
34,982,475 UART: [kat] SHA2-256
34,985,220 UART: [kat] SHA2-384
34,992,068 UART: [kat] SHA2-512-ACC
34,994,482 UART: [kat] ECC-384
37,279,647 UART: [kat] HMAC-384Kdf
37,290,628 UART: [kat] LMS
38,480,725 UART: [kat] --
38,484,148 UART: [update-reset] ++
42,673,826 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,676,843 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,074,595 >>> mbox cmd response: success
43,079,131 UART: [update-reset] Copying MAN_2 To MAN_1
43,098,294 UART: [update-reset Success] --
43,103,251 UART: [state] Locking Datavault
43,105,531 UART: [state] Locking PCR0, PCR1 and PCR31
43,107,279 UART: [state] Locking ICCM
43,109,620 UART: [exit] Launching FMC @ 0x40000130
43,118,008 UART:
43,118,243 UART: Running Caliptra FMC ...
43,119,357 UART:
43,119,511 UART: [state] CFI Enabled
43,163,662 UART: [art] Extend RT PCRs Done
43,164,876 UART: [art] Lock RT PCRs Done
43,166,333 UART: [art] Populate DV Done
43,171,846 UART: [fht] FMC Alias Private Key: 7
43,173,443 UART: [art] Derive CDI
43,174,253 UART: [art] Store in slot 0x4
43,216,619 UART: [art] Derive Key Pair
43,217,669 UART: [art] Store priv key in slot 0x5
46,460,395 UART: [art] Derive Key Pair - Done
46,473,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,753,769 UART: [art] Erasing AUTHORITY.KEYID = 7
48,755,289 UART: [art] PUB.X = 72C118BE55AE0F994F59D3411132622ECFD9055E8590EE46320660290380B670052C9696D4675CEAC9CF991BA1C5081A
48,762,550 UART: [art] PUB.Y = E64CFB9247DA692A251CF41B25127FBCA69D56D2470F057AD3C82A81D7FBA0FE22FE528EE5BEE4AF390F8E08631FD021
48,769,843 UART: [art] SIG.R = E544E3264E6F2B2CE7A3625F76C2C0FBF50E3535AE7261CA1C87685C511888C6C7CABE332397E72937E9A6363A1B8854
48,777,249 UART: [art] SIG.S = 4F1AA726F9EDEBFBDC35D9080F89FEE7E406AB1960FC4DC43825D74F39FC536A041E1028C4EE1D3E8242759E02849284
50,082,528 UART: Caliptra RT
50,083,246 UART: [state] CFI Enabled
53,748,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,750,270 UART: [rt] RT listening for mailbox commands...
53,781,929 UART: [rt]cmd =0x494e464f, len=4
53,786,240 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
4,124,364 ready_for_fw is high
4,124,991 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,432,784 >>> mbox cmd response: success
17,433,422 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
23,075,731 UART:
23,076,156 UART: Running Caliptra FMC ...
23,077,273 UART:
23,077,428 UART: [state] CFI Enabled
23,085,116 UART: [fht] FMC Alias Private Key: 7
25,424,797 UART: [art] Extend RT PCRs Done
25,426,018 UART: [art] Lock RT PCRs Done
25,427,397 UART: [art] Populate DV Done
25,432,808 UART: [fht] FMC Alias Private Key: 7
25,434,298 UART: [art] Derive CDI
25,435,058 UART: [art] Store in slot 0x4
25,477,947 UART: [art] Derive Key Pair
25,479,011 UART: [art] Store priv key in slot 0x5
28,721,900 UART: [art] Derive Key Pair - Done
28,735,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,014,875 UART: [art] Erasing AUTHORITY.KEYID = 7
31,016,392 UART: [art] PUB.X = 401B1C55293F406C3586C8FE317B6F4862E5A3E4702296CEA33156637D2A51F11F66D425C315210CAF25DFBE7194429D
31,023,638 UART: [art] PUB.Y = B600ADDC541A37D3AAAD25B4B700C1E01FA9996780FEC5ADC56E82E5412278D89E88BBF695AAE5A15CB92D37990C3413
31,030,878 UART: [art] SIG.R = 60E74D15ADF90C35B33325F2A9B1E0E024E692FE15E9A24CD1552A99E6B253826889357441D7A49EC16686537F03E701
31,038,268 UART: [art] SIG.S = FF2BB1D4E2B489FC2EDA0C4722F5EDA31D87AB4EADADAFFCF9B36E2DE3813212F605C8F4D8B141BD89991B2C8A728E42
32,343,562 UART: mbox::rt_entry...
32,344,503 UART: ____ _ _ _ ____ _____
32,346,432 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,348,450 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,350,305 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,352,291 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,354,169 UART: |_|
32,354,993 UART:
32,486,946 UART: [rt] Runtime listening for mailbox commands...
32,494,167 >>> mbox cmd response data (4360 bytes)
32,515,071 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,559,446 >>> mbox cmd response data (0 bytes)
34,646,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,395,897 >>> mbox cmd response: success
43,430,667 UART:
43,430,992 UART: Running Caliptra FMC ...
43,432,034 UART:
43,432,188 UART: [state] CFI Enabled
43,476,706 UART: [art] Extend RT PCRs Done
43,477,903 UART: [art] Lock RT PCRs Done
43,479,219 UART: [art] Populate DV Done
43,484,304 UART: [fht] FMC Alias Private Key: 7
43,485,891 UART: [art] Derive CDI
43,486,623 UART: [art] Store in slot 0x4
43,529,164 UART: [art] Derive Key Pair
43,530,155 UART: [art] Store priv key in slot 0x5
46,772,335 UART: [art] Derive Key Pair - Done
46,785,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,064,826 UART: [art] Erasing AUTHORITY.KEYID = 7
49,066,346 UART: [art] PUB.X = B3F9E22DFCE920CF1E0331B2E8CF0E5C0C035E999A6D445E32D01325F07E888DDE63A779ED70BC7D73EBF3F774D8FBB4
49,073,618 UART: [art] PUB.Y = A8516DF2D2E661254999616CEE34477C6FF3A5F83A82A2AEF6542D52F3516A5298611F62B134EC0019DF2642125A73F1
49,080,837 UART: [art] SIG.R = 027370788551D5D0484367F63A81D743E6F26792716F3A212FE21FDE5403AF9F010A94C60CB98942FFC6CAE61477A022
49,088,190 UART: [art] SIG.S = 16CF679E8267C70EE3A7B99C1137244FE55C9D7FD2E079E1F3B08CAE0CAC23195604686C6996B58F6517C03931800E97
50,393,668 UART: Caliptra RT
50,394,390 UART: [state] CFI Enabled
54,060,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,062,021 UART: [rt] RT listening for mailbox commands...
54,093,628 UART: [rt]cmd =0x494e464f, len=4
54,098,062 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
192,094 UART:
192,475 UART: Running Caliptra ROM ...
193,661 UART:
193,809 UART: [state] CFI Enabled
263,529 UART: [state] LifecycleState = Unprovisioned
265,435 UART: [state] DebugLocked = No
267,249 UART: [state] WD Timer not started. Device not locked for debugging
271,560 UART: [kat] SHA2-256
451,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,007 UART: [kat] ++
462,489 UART: [kat] sha1
472,435 UART: [kat] SHA2-256
475,130 UART: [kat] SHA2-384
479,399 UART: [kat] SHA2-512-ACC
481,780 UART: [kat] ECC-384
2,926,620 UART: [kat] HMAC-384Kdf
2,950,720 UART: [kat] LMS
3,427,227 UART: [kat] --
3,431,027 UART: [cold-reset] ++
3,432,464 UART: [fht] FHT @ 0x50003400
3,444,509 UART: [idev] ++
3,445,086 UART: [idev] CDI.KEYID = 6
3,446,123 UART: [idev] SUBJECT.KEYID = 7
3,447,294 UART: [idev] UDS.KEYID = 0
3,448,215 ready_for_fw is high
3,448,399 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,552,657 UART: [idev] Erasing UDS.KEYID = 0
5,965,291 UART: [idev] Sha1 KeyId Algorithm
5,989,287 UART: [idev] --
5,993,278 UART: [ldev] ++
5,994,099 UART: [ldev] CDI.KEYID = 6
5,994,997 UART: [ldev] SUBJECT.KEYID = 5
5,996,045 UART: [ldev] AUTHORITY.KEYID = 7
5,997,301 UART: [ldev] FE.KEYID = 1
6,035,579 UART: [ldev] Erasing FE.KEYID = 1
8,543,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,664 UART: [ldev] --
10,352,411 UART: [fwproc] Wait for Commands...
10,354,229 UART: [fwproc] Recv command 0x46574c44
10,356,266 UART: [fwproc] Recv'd Img size: 82832 bytes
13,398,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,477,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,550,217 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,753,177 >>> mbox cmd response: success
13,754,677 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,756,491 UART: [afmc] ++
13,757,089 UART: [afmc] CDI.KEYID = 6
13,758,031 UART: [afmc] SUBJECT.KEYID = 7
13,759,251 UART: [afmc] AUTHORITY.KEYID = 5
16,297,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,019,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,021,702 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,037,486 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,053,570 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,069,114 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,094,144 UART: [afmc] --
18,098,341 UART: [cold-reset] --
18,100,960 UART: [state] Locking Datavault
18,106,145 UART: [state] Locking PCR0, PCR1 and PCR31
18,107,893 UART: [state] Locking ICCM
18,109,686 UART: [exit] Launching FMC @ 0x40000130
18,118,096 UART:
18,118,341 UART: Running Caliptra FMC ...
18,119,440 UART:
18,119,595 UART: [state] CFI Enabled
18,177,739 UART: [fht] FMC Alias Private Key: 7
19,943,935 UART: [art] Extend RT PCRs Done
19,945,135 UART: [art] Lock RT PCRs Done
19,946,667 UART: [art] Populate DV Done
19,952,072 UART: [fht] FMC Alias Private Key: 7
19,953,768 UART: [art] Derive CDI
19,954,502 UART: [art] Store in slot 0x4
20,010,484 UART: [art] Derive Key Pair
20,011,551 UART: [art] Store priv key in slot 0x5
22,474,488 UART: [art] Derive Key Pair - Done
22,487,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,200,765 UART: [art] Erasing AUTHORITY.KEYID = 7
24,202,283 UART: [art] PUB.X = 8981602262AD9242003B2963BD4409672B2717C7B6A3A8BB040789BB7421AF46BCFBC09C4953F97AA91FE22BE08A2AED
24,209,534 UART: [art] PUB.Y = D2C7BA6C2844B45184B89D7CC77D2DFD2FAE043DDB8369C0E3F59D544960644D7766111BA5C3B7D841EBF3ABB5E46827
24,216,775 UART: [art] SIG.R = F12EC0557B6BC2633C4B49BDCA1FDEB7F5615488CE467A769DC5F03899B6D35600915863EDC9A01CC902FC26A73A98D7
24,224,164 UART: [art] SIG.S = C24DD985F9DB2BC657972E719CB4B71AEBD32C4A580BC504B431678EDC29B6D9B2993E4D51627357B693578C3C32E462
25,202,781 UART: mbox::rt_entry...
25,203,751 UART: ____ _ _ _ ____ _____
25,205,733 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,207,732 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,209,654 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,211,578 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,213,498 UART: |_|
25,214,329 UART:
25,344,855 UART: [rt] Runtime listening for mailbox commands...
25,352,061 >>> mbox cmd response data (4360 bytes)
25,372,885 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,417,259 >>> mbox cmd response data (0 bytes)
27,477,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,627,181 UART:
27,627,558 UART: Running Caliptra ROM ...
27,628,642 UART:
27,628,801 UART: [state] CFI Enabled
27,696,503 UART: [state] LifecycleState = Unprovisioned
27,698,445 UART: [state] DebugLocked = No
27,700,972 UART: [state] WD Timer not started. Device not locked for debugging
27,704,379 UART: [kat] SHA2-256
27,884,006 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,894,812 UART: [kat] ++
27,895,349 UART: [kat] sha1
27,906,606 UART: [kat] SHA2-256
27,909,288 UART: [kat] SHA2-384
27,915,162 UART: [kat] SHA2-512-ACC
27,917,546 UART: [kat] ECC-384
30,379,847 UART: [kat] HMAC-384Kdf
30,403,171 UART: [kat] LMS
30,879,643 UART: [kat] --
30,883,361 UART: [update-reset] ++
34,380,713 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,383,431 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,781,054 >>> mbox cmd response: success
34,785,592 UART: [update-reset] Copying MAN_2 To MAN_1
34,819,178 UART: [update-reset Success] --
34,825,041 UART: [state] Locking Datavault
34,828,900 UART: [state] Locking PCR0, PCR1 and PCR31
34,830,667 UART: [state] Locking ICCM
34,832,703 UART: [exit] Launching FMC @ 0x40000130
34,841,096 UART:
34,841,333 UART: Running Caliptra FMC ...
34,842,431 UART:
34,842,584 UART: [state] CFI Enabled
34,934,915 UART: [art] Extend RT PCRs Done
34,936,107 UART: [art] Lock RT PCRs Done
34,937,294 UART: [art] Populate DV Done
34,942,811 UART: [fht] FMC Alias Private Key: 7
34,944,292 UART: [art] Derive CDI
34,945,118 UART: [art] Store in slot 0x4
35,003,986 UART: [art] Derive Key Pair
35,005,040 UART: [art] Store priv key in slot 0x5
37,467,753 UART: [art] Derive Key Pair - Done
37,480,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,192,645 UART: [art] Erasing AUTHORITY.KEYID = 7
39,194,295 UART: [art] PUB.X = 2687DDAC3C71F21EF12AE8E4DD4FD07236D904296418E36C1D50F8BD8158690518CEF156299FDDD9FA05D0A2F373BDD0
39,201,456 UART: [art] PUB.Y = 0BA6121C1CBB859445B01C1ECD2FE9B29A683CD18D64B51BF5100FA68F80C2836A040CE715E5D571A599F7A39D4E35F2
39,208,751 UART: [art] SIG.R = AA4CE09FD26F957CE5EB9A4655CFEADC3C9AA54C7EA60B7407837210751E912380C377D0B852AE772A8D8BBFE1965C06
39,216,152 UART: [art] SIG.S = D342EE0B66C9D4DD041085030BC1B365AAE269E2632D9F418EF629914F0EEB65C4C5702C446051FAC4E2FA36F86FB178
40,194,934 UART: Caliptra RT
40,195,629 UART: [state] CFI Enabled
43,141,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,143,185 UART: [rt] RT listening for mailbox commands...
43,174,524 UART: [rt]cmd =0x494e464f, len=4
43,178,797 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,463,887 ready_for_fw is high
3,464,469 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,669,142 >>> mbox cmd response: success
13,670,360 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,960,452 UART:
17,960,838 UART: Running Caliptra FMC ...
17,961,970 UART:
17,962,123 UART: [state] CFI Enabled
18,029,108 UART: [fht] FMC Alias Private Key: 7
19,795,707 UART: [art] Extend RT PCRs Done
19,796,937 UART: [art] Lock RT PCRs Done
19,798,375 UART: [art] Populate DV Done
19,803,794 UART: [fht] FMC Alias Private Key: 7
19,805,440 UART: [art] Derive CDI
19,806,251 UART: [art] Store in slot 0x4
19,862,289 UART: [art] Derive Key Pair
19,863,282 UART: [art] Store priv key in slot 0x5
22,326,313 UART: [art] Derive Key Pair - Done
22,338,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,052,291 UART: [art] Erasing AUTHORITY.KEYID = 7
24,053,797 UART: [art] PUB.X = 9F2E999183616796FE6EE8BAFC9428D23CCB278C1B408B3C76CA54A0D4E211A214DF48D2C41C67FBA9B242C157EA9420
24,061,103 UART: [art] PUB.Y = C8343834A53056FF642DB6CFC095080F618D0767DDB5AA77822B68B850675734783E2249407B33092A565E0B0879F688
24,068,337 UART: [art] SIG.R = 57CFC725B8400E8B302F92A477DDD10F99962DB0F22288E43C53D44726498C3BF3BADE22E06E759F14364F9FED3E03E0
24,075,681 UART: [art] SIG.S = CBFE98FEEBF8A47E04F766C1118A3EBC521F75A5AF346699C4C8CB07A59312419061FDB52AF10031C30FFB40CE195156
25,054,117 UART: mbox::rt_entry...
25,055,108 UART: ____ _ _ _ ____ _____
25,057,040 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,059,051 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,060,992 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,062,994 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,064,927 UART: |_|
25,065,761 UART:
25,196,524 UART: [rt] Runtime listening for mailbox commands...
25,203,756 >>> mbox cmd response data (4360 bytes)
25,224,343 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,268,890 >>> mbox cmd response data (0 bytes)
27,325,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,637,082 >>> mbox cmd response: success
34,672,767 UART:
34,673,095 UART: Running Caliptra FMC ...
34,674,143 UART:
34,674,290 UART: [state] CFI Enabled
34,768,304 UART: [art] Extend RT PCRs Done
34,769,485 UART: [art] Lock RT PCRs Done
34,770,964 UART: [art] Populate DV Done
34,776,582 UART: [fht] FMC Alias Private Key: 7
34,778,280 UART: [art] Derive CDI
34,779,091 UART: [art] Store in slot 0x4
34,838,116 UART: [art] Derive Key Pair
34,839,165 UART: [art] Store priv key in slot 0x5
37,301,728 UART: [art] Derive Key Pair - Done
37,314,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,026,783 UART: [art] Erasing AUTHORITY.KEYID = 7
39,028,271 UART: [art] PUB.X = B80FF30A9F0F0C93E7651E6513A8B20ACAEDA91A3A2FAA8429024DEA89FA2F0D742E754ADC6E9AE23DCCD0A8A4686822
39,035,582 UART: [art] PUB.Y = BE23138F803D4F13F627FCE18AC27FF9E977893B1355895A0E4627D1B67F3882260AD96A6FC17AF875DCB59849440F06
39,042,816 UART: [art] SIG.R = E08F1F4F35B1D0B8CA7EE33F906AF5F21EB5A1E0937BDD3155CCF4B7B8DB07B635033B828D51F1A15F146D0BD535DE0D
39,050,218 UART: [art] SIG.S = D4FB0FC9A1C641679E331CBD0628F034952498981BC23134675D5E74317DF806CAC7841C724FCCF1B4B47B7974E3DD4B
40,029,162 UART: Caliptra RT
40,029,873 UART: [state] CFI Enabled
42,975,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,977,002 UART: [rt] RT listening for mailbox commands...
43,008,395 UART: [rt]cmd =0x494e464f, len=4
43,012,604 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,504 UART:
192,858 UART: Running Caliptra ROM ...
194,044 UART:
603,861 UART: [state] CFI Enabled
612,981 UART: [state] LifecycleState = Unprovisioned
614,889 UART: [state] DebugLocked = No
616,992 UART: [state] WD Timer not started. Device not locked for debugging
620,810 UART: [kat] SHA2-256
800,474 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
811,287 UART: [kat] ++
811,775 UART: [kat] sha1
822,606 UART: [kat] SHA2-256
825,263 UART: [kat] SHA2-384
831,966 UART: [kat] SHA2-512-ACC
834,336 UART: [kat] ECC-384
3,276,032 UART: [kat] HMAC-384Kdf
3,288,844 UART: [kat] LMS
3,765,313 UART: [kat] --
3,769,485 UART: [cold-reset] ++
3,771,288 UART: [fht] FHT @ 0x50003400
3,783,479 UART: [idev] ++
3,784,052 UART: [idev] CDI.KEYID = 6
3,784,942 UART: [idev] SUBJECT.KEYID = 7
3,786,190 UART: [idev] UDS.KEYID = 0
3,787,196 ready_for_fw is high
3,787,419 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,891,715 UART: [idev] Erasing UDS.KEYID = 0
6,265,261 UART: [idev] Sha1 KeyId Algorithm
6,288,442 UART: [idev] --
6,293,091 UART: [ldev] ++
6,293,713 UART: [ldev] CDI.KEYID = 6
6,294,632 UART: [ldev] SUBJECT.KEYID = 5
6,295,800 UART: [ldev] AUTHORITY.KEYID = 7
6,297,043 UART: [ldev] FE.KEYID = 1
6,311,477 UART: [ldev] Erasing FE.KEYID = 1
8,789,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,655 UART: [ldev] --
10,584,462 UART: [fwproc] Wait for Commands...
10,586,027 UART: [fwproc] Recv command 0x46574c44
10,588,034 UART: [fwproc] Recv'd Img size: 82832 bytes
13,635,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,713,850 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,786,905 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,990,891 >>> mbox cmd response: success
13,991,400 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,994,342 UART: [afmc] ++
13,994,916 UART: [afmc] CDI.KEYID = 6
13,995,852 UART: [afmc] SUBJECT.KEYID = 7
13,997,064 UART: [afmc] AUTHORITY.KEYID = 5
16,502,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,225,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,227,338 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,243,161 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,259,236 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,274,817 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,299,561 UART: [afmc] --
18,302,737 UART: [cold-reset] --
18,307,136 UART: [state] Locking Datavault
18,313,946 UART: [state] Locking PCR0, PCR1 and PCR31
18,315,698 UART: [state] Locking ICCM
18,317,093 UART: [exit] Launching FMC @ 0x40000130
18,325,545 UART:
18,325,782 UART: Running Caliptra FMC ...
18,326,883 UART:
18,327,043 UART: [state] CFI Enabled
18,334,929 UART: [fht] FMC Alias Private Key: 7
20,100,994 UART: [art] Extend RT PCRs Done
20,102,396 UART: [art] Lock RT PCRs Done
20,104,056 UART: [art] Populate DV Done
20,109,542 UART: [fht] FMC Alias Private Key: 7
20,111,029 UART: [art] Derive CDI
20,111,791 UART: [art] Store in slot 0x4
20,154,497 UART: [art] Derive Key Pair
20,155,536 UART: [art] Store priv key in slot 0x5
22,581,931 UART: [art] Derive Key Pair - Done
22,594,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,300,887 UART: [art] Erasing AUTHORITY.KEYID = 7
24,302,387 UART: [art] PUB.X = 80AEE62647061C69CB87DABF6791D4D6A9BF1026545FA85CE8EB37D562393E986F65650F3DE1932DD72F62A9C89674BD
24,309,630 UART: [art] PUB.Y = 8A7E32D67F137AA7DB13CBFCE0CACFD6CFE265B568DA5E0EB91246E130DF793968CD0CD6C4C5FEE0919FF1E1868B08ED
24,316,911 UART: [art] SIG.R = 620E75605BF35BF069514190F27C3BAF94641594A9F82CEC0648C5D588F1ADB435F54070DB657DD4B60AF3574674B1FB
24,324,302 UART: [art] SIG.S = 8E274529A615978B1C2EE8230106DE9270187C49C894A3388B44C7CDEFE2302A2A80D79F6547BB3C71D272C85CEA605E
25,302,970 UART: mbox::rt_entry...
25,303,939 UART: ____ _ _ _ ____ _____
25,305,927 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,307,936 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,309,868 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,311,796 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,313,753 UART: |_|
25,314,568 UART:
25,445,919 UART: [rt] Runtime listening for mailbox commands...
25,453,189 >>> mbox cmd response data (4360 bytes)
25,474,088 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,518,473 >>> mbox cmd response data (0 bytes)
27,584,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,734,061 UART:
27,734,432 UART: Running Caliptra ROM ...
27,735,491 UART:
27,735,673 UART: [state] CFI Enabled
27,750,547 UART: [state] LifecycleState = Unprovisioned
27,752,443 UART: [state] DebugLocked = No
27,753,689 UART: [state] WD Timer not started. Device not locked for debugging
27,758,349 UART: [kat] SHA2-256
27,938,081 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,948,881 UART: [kat] ++
27,949,343 UART: [kat] sha1
27,960,608 UART: [kat] SHA2-256
27,963,311 UART: [kat] SHA2-384
27,968,976 UART: [kat] SHA2-512-ACC
27,971,306 UART: [kat] ECC-384
30,413,210 UART: [kat] HMAC-384Kdf
30,424,310 UART: [kat] LMS
30,900,732 UART: [kat] --
30,904,238 UART: [update-reset] ++
34,403,371 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,407,560 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,805,188 >>> mbox cmd response: success
34,809,789 UART: [update-reset] Copying MAN_2 To MAN_1
34,842,994 UART: [update-reset Success] --
34,846,285 UART: [state] Locking Datavault
34,850,626 UART: [state] Locking PCR0, PCR1 and PCR31
34,852,437 UART: [state] Locking ICCM
34,853,578 UART: [exit] Launching FMC @ 0x40000130
34,861,945 UART:
34,862,183 UART: Running Caliptra FMC ...
34,863,286 UART:
34,863,462 UART: [state] CFI Enabled
34,907,858 UART: [art] Extend RT PCRs Done
34,909,024 UART: [art] Lock RT PCRs Done
34,910,858 UART: [art] Populate DV Done
34,916,595 UART: [fht] FMC Alias Private Key: 7
34,918,247 UART: [art] Derive CDI
34,919,062 UART: [art] Store in slot 0x4
34,961,603 UART: [art] Derive Key Pair
34,962,652 UART: [art] Store priv key in slot 0x5
37,389,344 UART: [art] Derive Key Pair - Done
37,402,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,108,802 UART: [art] Erasing AUTHORITY.KEYID = 7
39,110,296 UART: [art] PUB.X = A90DFE0A086728A57B06E0780209F43DB6F5B60F4DA9893512BDEA8CBB971654062440170C7EDEC1596E19C90B45FA6E
39,117,598 UART: [art] PUB.Y = AAFE6EE7963D7CBA8C55ECC8F5AE8AFC62089BA97AF7EAD325DA52E0FBA0083FC1EA7DAD63362E030AC6DF912C7FFCAD
39,124,881 UART: [art] SIG.R = 9E98BFD94CA181816DC4012FD8A9AB065B0529075C3EA4272373EADD80BCB99F0FA20C91CBCBDE6AA4DB6287B55AF6EE
39,132,328 UART: [art] SIG.S = 7277E8FBE6E298EF2C48763BA83BF231775D4B382587CBB69214998171AFCAC56B2A76208D19627DB2BD3B79C85EA9EC
40,110,761 UART: Caliptra RT
40,111,735 UART: [state] CFI Enabled
42,957,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,959,437 UART: [rt] RT listening for mailbox commands...
42,990,872 UART: [rt]cmd =0x494e464f, len=4
42,994,941 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,576 writing to cptra_bootfsm_go
3,778,052 ready_for_fw is high
3,778,467 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,864,450 >>> mbox cmd response: success
13,865,172 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,114,506 UART:
18,114,905 UART: Running Caliptra FMC ...
18,116,044 UART:
18,116,211 UART: [state] CFI Enabled
18,124,201 UART: [fht] FMC Alias Private Key: 7
19,889,833 UART: [art] Extend RT PCRs Done
19,891,067 UART: [art] Lock RT PCRs Done
19,892,560 UART: [art] Populate DV Done
19,898,091 UART: [fht] FMC Alias Private Key: 7
19,899,835 UART: [art] Derive CDI
19,900,664 UART: [art] Store in slot 0x4
19,942,892 UART: [art] Derive Key Pair
19,943,895 UART: [art] Store priv key in slot 0x5
22,370,689 UART: [art] Derive Key Pair - Done
22,383,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,090,363 UART: [art] Erasing AUTHORITY.KEYID = 7
24,091,873 UART: [art] PUB.X = A0EA01D979A1D94616EF0771E2B799DFBC3BCD39BA7EE2F308955CEA9BB34AD4C988E767A2570C1701021C435C71ED10
24,099,136 UART: [art] PUB.Y = AB16A09083D3C2C4BAB9CE52E43966E03131EBBB310BCA75373BB13BE1A4760DFA1355FAFFFD3471944EE39FA3A55F64
24,106,384 UART: [art] SIG.R = 6CD47E6C712AF5939565D5A7C07930E55746FCEAFE3BE6C6FE00AA4F4EB368DFA725F92C92900A54CE619F31D1461FC0
24,113,781 UART: [art] SIG.S = 9917067DF7CBCDE64D445AF48E4970C71FDB22B204ED94B28885A1513070F9084BE6DC6748FBE00DA902D6300D5834BA
25,092,111 UART: mbox::rt_entry...
25,093,080 UART: ____ _ _ _ ____ _____
25,095,208 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,097,246 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,099,190 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,101,190 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,103,127 UART: |_|
25,103,967 UART:
25,233,819 UART: [rt] Runtime listening for mailbox commands...
25,241,036 >>> mbox cmd response data (4360 bytes)
25,262,113 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,306,504 >>> mbox cmd response data (0 bytes)
27,368,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,594,639 >>> mbox cmd response: success
34,627,184 UART:
34,627,523 UART: Running Caliptra FMC ...
34,628,652 UART:
34,628,829 UART: [state] CFI Enabled
34,672,369 UART: [art] Extend RT PCRs Done
34,673,543 UART: [art] Lock RT PCRs Done
34,675,000 UART: [art] Populate DV Done
34,680,582 UART: [fht] FMC Alias Private Key: 7
34,682,119 UART: [art] Derive CDI
34,682,887 UART: [art] Store in slot 0x4
34,725,267 UART: [art] Derive Key Pair
34,726,344 UART: [art] Store priv key in slot 0x5
37,153,488 UART: [art] Derive Key Pair - Done
37,166,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,873,036 UART: [art] Erasing AUTHORITY.KEYID = 7
38,874,553 UART: [art] PUB.X = 8C86E8CFE13A25A88EA8FE04FF3F6F67DB7FDD6C67C115BA9B4BC0FE274991E3A8CD5171A0038F28D1CE284F522E3205
38,881,828 UART: [art] PUB.Y = 42A5CF525D67834AFC568C05F9A31BEFD9EC23CD1BC0AF7816B0B21918DED451A6773BDB4E613E98225BF68210EED17B
38,889,124 UART: [art] SIG.R = 705F46D698DFDEAEAC6EA6DA4DFFB6CE0668DF60551269B919C2B275A257E0367936E8CC5FD831479DAB152225F696DC
38,896,531 UART: [art] SIG.S = 67D9564F712F85B2CD8AE50F8935E5E98C6FCB0581D9D2BF0969CD659E1387AE944EB0EA98D16B1E8FEC343DE3F69D6A
39,875,388 UART: Caliptra RT
39,876,102 UART: [state] CFI Enabled
42,723,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,725,055 UART: [rt] RT listening for mailbox commands...
42,756,452 UART: [rt]cmd =0x494e464f, len=4
42,760,703 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,056 UART:
192,447 UART: Running Caliptra ROM ...
193,573 UART:
193,719 UART: [state] CFI Enabled
264,958 UART: [state] LifecycleState = Unprovisioned
267,365 UART: [state] DebugLocked = No
269,469 UART: [state] WD Timer not started. Device not locked for debugging
274,214 UART: [kat] SHA2-256
464,142 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,900 UART: [kat] ++
475,399 UART: [kat] sha1
486,705 UART: [kat] SHA2-256
489,715 UART: [kat] SHA2-384
495,234 UART: [kat] SHA2-512-ACC
497,859 UART: [kat] ECC-384
2,946,516 UART: [kat] HMAC-384Kdf
2,971,616 UART: [kat] LMS
3,503,373 UART: [kat] --
3,508,645 UART: [cold-reset] ++
3,510,999 UART: [fht] FHT @ 0x50003400
3,522,539 UART: [idev] ++
3,523,240 UART: [idev] CDI.KEYID = 6
3,524,266 UART: [idev] SUBJECT.KEYID = 7
3,525,373 UART: [idev] UDS.KEYID = 0
3,526,300 ready_for_fw is high
3,526,492 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,630,907 UART: [idev] Erasing UDS.KEYID = 0
6,028,496 UART: [idev] Sha1 KeyId Algorithm
6,050,976 UART: [idev] --
6,056,804 UART: [ldev] ++
6,057,482 UART: [ldev] CDI.KEYID = 6
6,058,497 UART: [ldev] SUBJECT.KEYID = 5
6,059,549 UART: [ldev] AUTHORITY.KEYID = 7
6,060,828 UART: [ldev] FE.KEYID = 1
6,098,272 UART: [ldev] Erasing FE.KEYID = 1
8,605,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,708 UART: [ldev] --
10,413,905 UART: [fwproc] Wait for Commands...
10,415,633 UART: [fwproc] Recv command 0x46574c44
10,417,946 UART: [fwproc] Recv'd Img size: 82832 bytes
13,471,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,552,397 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,676,011 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,022,907 >>> mbox cmd response: success
14,023,989 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,026,413 UART: [afmc] ++
14,027,115 UART: [afmc] CDI.KEYID = 6
14,028,351 UART: [afmc] SUBJECT.KEYID = 7
14,029,780 UART: [afmc] AUTHORITY.KEYID = 5
16,575,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,317,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,319,265 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,334,411 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,349,513 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,364,408 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,389,202 UART: [afmc] --
18,392,089 UART: [cold-reset] --
18,396,705 UART: [state] Locking Datavault
18,403,196 UART: [state] Locking PCR0, PCR1 and PCR31
18,405,381 UART: [state] Locking ICCM
18,408,282 UART: [exit] Launching FMC @ 0x40000130
18,416,954 UART:
18,417,235 UART: Running Caliptra FMC ...
18,418,344 UART:
18,418,500 UART: [state] CFI Enabled
18,474,048 UART: [fht] FMC Alias Private Key: 7
20,240,946 UART: [art] Extend RT PCRs Done
20,242,165 UART: [art] Lock RT PCRs Done
20,243,924 UART: [art] Populate DV Done
20,249,326 UART: [fht] FMC Alias Private Key: 7
20,251,041 UART: [art] Derive CDI
20,251,860 UART: [art] Store in slot 0x4
20,307,426 UART: [art] Derive Key Pair
20,308,473 UART: [art] Store priv key in slot 0x5
22,772,052 UART: [art] Derive Key Pair - Done
22,784,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,497,950 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,456 UART: [art] PUB.X = 9F279958BB15E23A147F1207102FFED675E5A1E784553E9B219C997588B68235F59570EF7DD37214A9A6FADF9B91D126
24,506,680 UART: [art] PUB.Y = EC6816DDE925C7C8C1862C56DDD5ABB915B918C77D72C5D04D76FCC0210C5FE72E3A5CF862965F5BFE7D2B9FD51E04BD
24,513,989 UART: [art] SIG.R = CF154AFB52B7B5C6B961FB434613BEA7658749FA93BD60470167172518C13B97BB5A2213EDBA85B5D928C8D148C0E9B6
24,521,356 UART: [art] SIG.S = 78DBAFBF6CAE865EC2BC87409068CE70216CD0DDC70F9FA28A13F0CB806933BC2AEA2EA9BA86F6B77B89889C76A5B939
25,499,938 UART: mbox::rt_entry...
25,500,903 UART: ____ _ _ _ ____ _____
25,502,885 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,504,887 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,506,818 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,508,771 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,510,701 UART: |_|
25,511,507 UART:
25,642,365 UART: [rt] Runtime listening for mailbox commands...
25,649,571 >>> mbox cmd response data (4360 bytes)
25,670,214 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,714,561 >>> mbox cmd response data (0 bytes)
27,787,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,937,334 UART:
27,937,714 UART: Running Caliptra ROM ...
27,938,794 UART:
27,938,948 UART: [state] CFI Enabled
28,015,229 UART: [state] LifecycleState = Unprovisioned
28,017,334 UART: [state] DebugLocked = No
28,019,614 UART: [state] WD Timer not started. Device not locked for debugging
28,023,521 UART: [kat] SHA2-256
28,213,387 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,224,128 UART: [kat] ++
28,224,583 UART: [kat] sha1
28,235,490 UART: [kat] SHA2-256
28,238,512 UART: [kat] SHA2-384
28,243,689 UART: [kat] SHA2-512-ACC
28,246,305 UART: [kat] ECC-384
30,700,618 UART: [kat] HMAC-384Kdf
30,723,871 UART: [kat] LMS
31,255,437 UART: [kat] --
31,259,364 UART: [update-reset] ++
34,773,043 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,777,231 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,406,932 >>> mbox cmd response: success
35,411,580 UART: [update-reset] Copying MAN_2 To MAN_1
35,446,025 UART: [update-reset Success] --
35,451,894 UART: [state] Locking Datavault
35,454,384 UART: [state] Locking PCR0, PCR1 and PCR31
35,456,590 UART: [state] Locking ICCM
35,459,463 UART: [exit] Launching FMC @ 0x40000130
35,468,150 UART:
35,468,394 UART: Running Caliptra FMC ...
35,469,519 UART:
35,469,677 UART: [state] CFI Enabled
35,556,286 UART: [art] Extend RT PCRs Done
35,557,478 UART: [art] Lock RT PCRs Done
35,558,796 UART: [art] Populate DV Done
35,564,319 UART: [fht] FMC Alias Private Key: 7
35,565,908 UART: [art] Derive CDI
35,566,652 UART: [art] Store in slot 0x4
35,625,251 UART: [art] Derive Key Pair
35,626,299 UART: [art] Store priv key in slot 0x5
38,088,392 UART: [art] Derive Key Pair - Done
38,101,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,815,357 UART: [art] Erasing AUTHORITY.KEYID = 7
39,816,871 UART: [art] PUB.X = 403B4BFBFF9F6FFAF272103B9401D5ACDDBBC91B60DF0AC6C212CF22C1CDAB9EE75F1F64A8FEBCA2E9BE76EE87A27F30
39,824,200 UART: [art] PUB.Y = A6DE79650AC6FA6994B35098EA01EB7217E33774E4F4B70FBD1EF73D129E2D9E327CDEE96DF6FB4C8909823F7E914C03
39,831,471 UART: [art] SIG.R = 6D141D790DB5BAE9B22C323408873499B06871E33DF61CEC3052729D78A6F161F78707831F240ABCF160B9490C296481
39,838,855 UART: [art] SIG.S = BEF39A5D8C4B433F3B70655644F4A9977EB0DBA482377679D9B65E44E0CAFDA82D26DCA772489C3B04DC08C341843354
40,818,336 UART: Caliptra RT
40,819,051 UART: [state] CFI Enabled
43,763,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,764,645 UART: [rt] RT listening for mailbox commands...
43,796,250 UART: [rt]cmd =0x494e464f, len=4
43,800,725 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,451,697 ready_for_fw is high
3,452,280 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,059,661 >>> mbox cmd response: success
14,060,905 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,337,172 UART:
18,337,553 UART: Running Caliptra FMC ...
18,338,760 UART:
18,338,926 UART: [state] CFI Enabled
18,405,629 UART: [fht] FMC Alias Private Key: 7
20,171,931 UART: [art] Extend RT PCRs Done
20,173,153 UART: [art] Lock RT PCRs Done
20,174,727 UART: [art] Populate DV Done
20,179,997 UART: [fht] FMC Alias Private Key: 7
20,181,525 UART: [art] Derive CDI
20,182,291 UART: [art] Store in slot 0x4
20,238,983 UART: [art] Derive Key Pair
20,239,976 UART: [art] Store priv key in slot 0x5
22,702,705 UART: [art] Derive Key Pair - Done
22,715,593 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,428,956 UART: [art] Erasing AUTHORITY.KEYID = 7
24,430,477 UART: [art] PUB.X = 0F0E40E1A3118B28DE1BA7ED878E2AD08C2AB6E3AE77E4851071C4051EE953EDE8906037664A8DFE96A145B25815599A
24,437,732 UART: [art] PUB.Y = 0D8BACBE168DD08D3A913B605C572686C4030927BEEDA53643AB21238D36B17BF6623EE7379EE08D7CFA15CDFEFC2DEE
24,445,045 UART: [art] SIG.R = 26F541F26ADE59D013EAF9CB8DDA8B19C36AAA510DB3723E65EE679EBBFEBB449C5A928AFD36FC764FFB323B74A3B7B8
24,452,456 UART: [art] SIG.S = FDB1C4695543300E763A1C1BB278203E92580A1216B53B73CA7228800B0D65E0A8C16DC3FA3495BB9B0BFC2D3C5BDAC9
25,430,989 UART: mbox::rt_entry...
25,431,960 UART: ____ _ _ _ ____ _____
25,433,948 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,435,956 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,437,881 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,439,861 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,441,719 UART: |_|
25,442,519 UART:
25,573,701 UART: [rt] Runtime listening for mailbox commands...
25,580,909 >>> mbox cmd response data (4360 bytes)
25,601,567 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,645,938 >>> mbox cmd response data (0 bytes)
27,716,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,618,385 >>> mbox cmd response: success
35,651,707 UART:
35,652,044 UART: Running Caliptra FMC ...
35,653,180 UART:
35,653,350 UART: [state] CFI Enabled
35,742,932 UART: [art] Extend RT PCRs Done
35,744,123 UART: [art] Lock RT PCRs Done
35,745,581 UART: [art] Populate DV Done
35,751,198 UART: [fht] FMC Alias Private Key: 7
35,752,781 UART: [art] Derive CDI
35,753,593 UART: [art] Store in slot 0x4
35,812,681 UART: [art] Derive Key Pair
35,813,717 UART: [art] Store priv key in slot 0x5
38,276,217 UART: [art] Derive Key Pair - Done
38,288,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,002,343 UART: [art] Erasing AUTHORITY.KEYID = 7
40,003,878 UART: [art] PUB.X = B44FCD60591F7E159BAB49623BD238B9A3BCC2A3CCEE5423650C87DD84E05F3B219BB608628CD4D17F672EE02B848123
40,011,129 UART: [art] PUB.Y = 442F16BADFFE10C16710C2EB9AEBA483B20FC296156A2E0A5B4199CA20115E49717A9C54085AC4393FD68FDBFC619B86
40,018,395 UART: [art] SIG.R = D26A971E435A5632760E3335158CA7C91E0189E76884A52D131376C3EEA598CFF795BA3D14E038BF3D94EEF7F186DC03
40,025,818 UART: [art] SIG.S = CA684E43B8D5EA2F3EA46F0FD7335D11C438AA0266C974B5BEAAED59E8E01F0F8ED738638EA332634402F36010D9E670
41,004,905 UART: Caliptra RT
41,005,623 UART: [state] CFI Enabled
43,950,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,952,044 UART: [rt] RT listening for mailbox commands...
43,983,392 UART: [rt]cmd =0x494e464f, len=4
43,987,680 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,377 UART:
192,741 UART: Running Caliptra ROM ...
193,932 UART:
603,510 UART: [state] CFI Enabled
619,090 UART: [state] LifecycleState = Unprovisioned
621,407 UART: [state] DebugLocked = No
622,797 UART: [state] WD Timer not started. Device not locked for debugging
627,775 UART: [kat] SHA2-256
817,666 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,410 UART: [kat] ++
829,021 UART: [kat] sha1
839,908 UART: [kat] SHA2-256
842,984 UART: [kat] SHA2-384
849,553 UART: [kat] SHA2-512-ACC
852,138 UART: [kat] ECC-384
3,296,779 UART: [kat] HMAC-384Kdf
3,310,747 UART: [kat] LMS
3,842,607 UART: [kat] --
3,848,045 UART: [cold-reset] ++
3,849,501 UART: [fht] FHT @ 0x50003400
3,861,225 UART: [idev] ++
3,861,911 UART: [idev] CDI.KEYID = 6
3,862,810 UART: [idev] SUBJECT.KEYID = 7
3,864,015 UART: [idev] UDS.KEYID = 0
3,864,922 ready_for_fw is high
3,865,143 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,969,274 UART: [idev] Erasing UDS.KEYID = 0
6,340,228 UART: [idev] Sha1 KeyId Algorithm
6,362,373 UART: [idev] --
6,366,418 UART: [ldev] ++
6,367,093 UART: [ldev] CDI.KEYID = 6
6,368,013 UART: [ldev] SUBJECT.KEYID = 5
6,369,198 UART: [ldev] AUTHORITY.KEYID = 7
6,370,429 UART: [ldev] FE.KEYID = 1
6,380,211 UART: [ldev] Erasing FE.KEYID = 1
8,855,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,763 UART: [ldev] --
10,646,971 UART: [fwproc] Wait for Commands...
10,649,398 UART: [fwproc] Recv command 0x46574c44
10,651,710 UART: [fwproc] Recv'd Img size: 82832 bytes
13,714,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,790,576 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,914,237 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,260,536 >>> mbox cmd response: success
14,261,069 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,265,258 UART: [afmc] ++
14,265,962 UART: [afmc] CDI.KEYID = 6
14,267,157 UART: [afmc] SUBJECT.KEYID = 7
14,268,650 UART: [afmc] AUTHORITY.KEYID = 5
16,771,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,491,427 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,493,389 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,508,501 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,523,654 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,538,504 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,561,595 UART: [afmc] --
18,564,649 UART: [cold-reset] --
18,568,416 UART: [state] Locking Datavault
18,574,540 UART: [state] Locking PCR0, PCR1 and PCR31
18,576,684 UART: [state] Locking ICCM
18,578,320 UART: [exit] Launching FMC @ 0x40000130
18,586,987 UART:
18,587,252 UART: Running Caliptra FMC ...
18,588,365 UART:
18,588,529 UART: [state] CFI Enabled
18,596,500 UART: [fht] FMC Alias Private Key: 7
20,362,968 UART: [art] Extend RT PCRs Done
20,364,178 UART: [art] Lock RT PCRs Done
20,366,023 UART: [art] Populate DV Done
20,371,507 UART: [fht] FMC Alias Private Key: 7
20,373,049 UART: [art] Derive CDI
20,373,874 UART: [art] Store in slot 0x4
20,416,411 UART: [art] Derive Key Pair
20,417,410 UART: [art] Store priv key in slot 0x5
22,844,293 UART: [art] Derive Key Pair - Done
22,857,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,562,932 UART: [art] Erasing AUTHORITY.KEYID = 7
24,564,421 UART: [art] PUB.X = 4812BAFAE0B4CDEC04699B5CEA785A5E2D2EDDF96C841BA186FE00080395D35A60B9E87BEA7DEA3605C8053A2F4B148F
24,571,680 UART: [art] PUB.Y = FA525F450ABE3888A98BE8FC3F2B50B2820C9C889C31181C211ECACF130A06CA829F6347DF8748DF8FEDB1083922E398
24,578,935 UART: [art] SIG.R = D7489D089EF5C45E54A7D36D1632527B0B14D99EB9A82AD0F37BC240B2D0874FBACDE710D6638C29F389187DF004B168
24,586,404 UART: [art] SIG.S = 3747A1F0A06A440EFDFC1269B60FBCDFF8105958BEC45968A0526181CE7217C32DB5C08B0EF96A20E1CA7633804C59F8
25,565,121 UART: mbox::rt_entry...
25,566,104 UART: ____ _ _ _ ____ _____
25,568,101 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,570,113 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,572,047 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,573,985 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,575,914 UART: |_|
25,576,729 UART:
25,708,110 UART: [rt] Runtime listening for mailbox commands...
25,715,323 >>> mbox cmd response data (4360 bytes)
25,736,087 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,780,509 >>> mbox cmd response data (0 bytes)
27,857,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,007,683 UART:
28,008,103 UART: Running Caliptra ROM ...
28,009,257 UART:
28,009,435 UART: [state] CFI Enabled
28,021,293 UART: [state] LifecycleState = Unprovisioned
28,023,180 UART: [state] DebugLocked = No
28,024,847 UART: [state] WD Timer not started. Device not locked for debugging
28,028,730 UART: [kat] SHA2-256
28,218,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,229,404 UART: [kat] ++
28,229,949 UART: [kat] sha1
28,242,733 UART: [kat] SHA2-256
28,245,700 UART: [kat] SHA2-384
28,251,205 UART: [kat] SHA2-512-ACC
28,253,782 UART: [kat] ECC-384
30,695,437 UART: [kat] HMAC-384Kdf
30,707,804 UART: [kat] LMS
31,239,396 UART: [kat] --
31,244,009 UART: [update-reset] ++
34,754,196 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,756,699 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,386,433 >>> mbox cmd response: success
35,391,074 UART: [update-reset] Copying MAN_2 To MAN_1
35,425,851 UART: [update-reset Success] --
35,428,667 UART: [state] Locking Datavault
35,432,057 UART: [state] Locking PCR0, PCR1 and PCR31
35,434,225 UART: [state] Locking ICCM
35,435,685 UART: [exit] Launching FMC @ 0x40000130
35,444,323 UART:
35,444,561 UART: Running Caliptra FMC ...
35,445,663 UART:
35,445,826 UART: [state] CFI Enabled
35,489,661 UART: [art] Extend RT PCRs Done
35,490,859 UART: [art] Lock RT PCRs Done
35,492,107 UART: [art] Populate DV Done
35,497,467 UART: [fht] FMC Alias Private Key: 7
35,499,076 UART: [art] Derive CDI
35,499,897 UART: [art] Store in slot 0x4
35,542,694 UART: [art] Derive Key Pair
35,543,744 UART: [art] Store priv key in slot 0x5
37,971,480 UART: [art] Derive Key Pair - Done
37,984,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,690,840 UART: [art] Erasing AUTHORITY.KEYID = 7
39,692,348 UART: [art] PUB.X = 0306C6367BA16099ABF154C4DBE680D6D11447C16E0CAEDF0F8CB7959694EB8E539CCCCEEC37E228D3AA2EB609A0497B
39,699,759 UART: [art] PUB.Y = 91F5EBB74C67E9E00ABE4CACB161570C8BD4CC9405572B0809B747B98A51694D16D0E3AB0B9C1F1A8648B8B14A3E88D3
39,706,879 UART: [art] SIG.R = 11A4BEF45092EE1E7FEE1CF58952A762F79690DC92E589E44F63184090CA2F01E8310CDFD1EFD3015963B7FB21C2C3AB
39,714,257 UART: [art] SIG.S = D7627C8849E362E581932AF180A419767578638711EE374E9AEB5E77EF5EE2593AE9B991B563BDA5A035A556D99E1394
40,693,290 UART: Caliptra RT
40,693,994 UART: [state] CFI Enabled
43,543,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,544,752 UART: [rt] RT listening for mailbox commands...
43,576,093 UART: [rt]cmd =0x494e464f, len=4
43,580,401 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,756,553 ready_for_fw is high
3,757,357 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,292,576 >>> mbox cmd response: success
14,293,260 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,549,428 UART:
18,549,817 UART: Running Caliptra FMC ...
18,551,030 UART:
18,551,209 UART: [state] CFI Enabled
18,559,369 UART: [fht] FMC Alias Private Key: 7
20,325,094 UART: [art] Extend RT PCRs Done
20,326,321 UART: [art] Lock RT PCRs Done
20,328,220 UART: [art] Populate DV Done
20,333,695 UART: [fht] FMC Alias Private Key: 7
20,335,374 UART: [art] Derive CDI
20,336,202 UART: [art] Store in slot 0x4
20,378,974 UART: [art] Derive Key Pair
20,379,981 UART: [art] Store priv key in slot 0x5
22,806,986 UART: [art] Derive Key Pair - Done
22,820,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,526,591 UART: [art] Erasing AUTHORITY.KEYID = 7
24,528,096 UART: [art] PUB.X = 1FB44E9B4F05C1687522A719C9426F859845430DEC8A6C52F1FCC4B8A21663F197B4C20D0D3A71ECD2A3DE9824B572A2
24,535,360 UART: [art] PUB.Y = 5FED1B7A47A1E7844232646E933209B0C3105F8EE8DE6EF2B5AF45DF5C57645707109EDFBD5B1EBB1897A6F2158F1223
24,542,606 UART: [art] SIG.R = 8A2D923BD0B1E65210CC7695F4E734B06712FA9584EACD698AB58CE840B23B9CFC55E705E07DBF11AE78AA3DDC30B04B
24,550,056 UART: [art] SIG.S = 5502BA671EFA5B1373D734ADA01EE130B054FF7280E426EBA2DF81410C5B685CED25761C791032E82A987232CF1A4750
25,529,284 UART: mbox::rt_entry...
25,530,242 UART: ____ _ _ _ ____ _____
25,532,228 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,534,241 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,536,177 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,538,193 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,540,129 UART: |_|
25,540,944 UART:
25,672,320 UART: [rt] Runtime listening for mailbox commands...
25,679,556 >>> mbox cmd response data (4360 bytes)
25,700,451 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,744,787 >>> mbox cmd response data (0 bytes)
27,819,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,646,510 >>> mbox cmd response: success
35,682,243 UART:
35,682,588 UART: Running Caliptra FMC ...
35,683,728 UART:
35,683,921 UART: [state] CFI Enabled
35,728,216 UART: [art] Extend RT PCRs Done
35,729,369 UART: [art] Lock RT PCRs Done
35,730,550 UART: [art] Populate DV Done
35,735,857 UART: [fht] FMC Alias Private Key: 7
35,737,341 UART: [art] Derive CDI
35,738,113 UART: [art] Store in slot 0x4
35,780,501 UART: [art] Derive Key Pair
35,781,548 UART: [art] Store priv key in slot 0x5
38,208,619 UART: [art] Derive Key Pair - Done
38,221,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,927,943 UART: [art] Erasing AUTHORITY.KEYID = 7
39,929,456 UART: [art] PUB.X = F543B21CDA6733BA29964D920B8BED8DAC2772BB798A21E00BF6280322B50E82640CB0912DFE755E54C622FA76B2E014
39,936,694 UART: [art] PUB.Y = EBEF34BF275937FB1677D5B1877FFFA09931894E3B783A979F7FA9BBC76F4D3688A8279F9B5B76E8E08DCF1F036D6488
39,943,966 UART: [art] SIG.R = F4077C74829F3A65CD9D53E39D462DF8089860A4549A80EB40F61B7C64E86FBBFFC807825C3E78539DCEC029FAB7ADD6
39,951,393 UART: [art] SIG.S = 8431671F5B81F17E3B18FE68700DFC9BB3982543FB323EE2DDABDA239B9F851DD63D63DCC4A7A3274CF03150B7A5A596
40,930,050 UART: Caliptra RT
40,930,750 UART: [state] CFI Enabled
43,782,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,783,941 UART: [rt] RT listening for mailbox commands...
43,815,563 UART: [rt]cmd =0x494e464f, len=4
43,819,914 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,193 UART: [kat] SHA2-256
882,124 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,239 UART: [kat] ++
886,391 UART: [kat] sha1
890,667 UART: [kat] SHA2-256
892,605 UART: [kat] SHA2-384
895,480 UART: [kat] SHA2-512-ACC
897,381 UART: [kat] ECC-384
903,008 UART: [kat] HMAC-384Kdf
907,666 UART: [kat] LMS
1,475,862 UART: [kat] --
1,476,843 UART: [cold-reset] ++
1,477,231 UART: [fht] Storing FHT @ 0x50003400
1,479,956 UART: [idev] ++
1,480,124 UART: [idev] CDI.KEYID = 6
1,480,484 UART: [idev] SUBJECT.KEYID = 7
1,480,908 UART: [idev] UDS.KEYID = 0
1,481,253 ready_for_fw is high
1,481,253 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,489,168 UART: [idev] Erasing UDS.KEYID = 0
1,505,786 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,342 UART: [idev] --
1,515,553 UART: [ldev] ++
1,515,721 UART: [ldev] CDI.KEYID = 6
1,516,084 UART: [ldev] SUBJECT.KEYID = 5
1,516,510 UART: [ldev] AUTHORITY.KEYID = 7
1,516,973 UART: [ldev] FE.KEYID = 1
1,521,883 UART: [ldev] Erasing FE.KEYID = 1
1,547,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,536 UART: [ldev] --
1,587,035 UART: [fwproc] Waiting for Commands...
1,587,708 UART: [fwproc] Received command 0x46574c44
1,588,499 UART: [fwproc] Received Image of size 82832 bytes
2,523,820 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,551,156 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,582,374 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,669,163 >>> mbox cmd response: success
2,669,163 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,670,315 UART: [afmc] ++
2,670,483 UART: [afmc] CDI.KEYID = 6
2,670,845 UART: [afmc] SUBJECT.KEYID = 7
2,671,270 UART: [afmc] AUTHORITY.KEYID = 5
2,706,385 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,815 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,723,595 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,729,304 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,735,187 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,740,870 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,748,760 UART: [afmc] --
2,749,846 UART: [cold-reset] --
2,750,832 UART: [state] Locking Datavault
2,752,397 UART: [state] Locking PCR0, PCR1 and PCR31
2,753,001 UART: [state] Locking ICCM
2,753,591 UART: [exit] Launching FMC @ 0x40000130
2,758,921 UART:
2,758,937 UART: Running Caliptra FMC ...
2,759,345 UART:
2,759,399 UART: [state] CFI Enabled
2,770,085 UART: [fht] FMC Alias Private Key: 7
2,889,057 UART: [art] Extend RT PCRs Done
2,889,485 UART: [art] Lock RT PCRs Done
2,891,365 UART: [art] Populate DV Done
2,899,654 UART: [fht] FMC Alias Private Key: 7
2,900,644 UART: [art] Derive CDI
2,900,924 UART: [art] Store in slot 0x4
2,986,568 UART: [art] Derive Key Pair
2,986,928 UART: [art] Store priv key in slot 0x5
3,000,231 UART: [art] Derive Key Pair - Done
3,015,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,843 UART: [art] PUB.X = 71748DF5F887309C5DBA7B13388B7BE66C5EBD27ED351A59B724AB63C5C3C8E56874AF891BA98F4E19B692DA68E947FC
3,038,625 UART: [art] PUB.Y = BF4BF682EBBCBAB0995FCAC7D635C407CDBC5A5210CF05290560CECF51AB40CDD2A9E0CF4BF7697954E43AE70928A777
3,045,587 UART: [art] SIG.R = 0569326063A53136E10FD1FD869EC154641D185977ADDC8E4A33DC7FC2B9622EE19992AED78598E4C652F8E25B8B3097
3,052,351 UART: [art] SIG.S = A6171FE0D35FBB118202B7460E8925523815C508AAACCB2B9A3BBD20E9E3DD290D75D44A41B9BCA2D626AE41CB0678CD
3,075,910 UART: mbox::rt_entry...
3,076,282 UART: ____ _ _ _ ____ _____
3,077,066 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,077,866 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,078,634 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,079,402 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,080,170 UART: |_|
3,080,482 UART:
3,199,833 UART: [rt] Runtime listening for mailbox commands...
3,206,167 >>> mbox cmd response data (4360 bytes)
3,206,168 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,236,950 >>> mbox cmd response data (0 bytes)
3,236,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,237,072 UART:
3,237,088 UART: Running Caliptra ROM ...
3,237,496 UART:
3,237,550 UART: [state] CFI Enabled
3,240,134 UART: [state] LifecycleState = Unprovisioned
3,240,789 UART: [state] DebugLocked = No
3,241,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,242,872 UART: [kat] SHA2-256
4,036,803 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,040,918 UART: [kat] ++
4,041,070 UART: [kat] sha1
4,045,244 UART: [kat] SHA2-256
4,047,182 UART: [kat] SHA2-384
4,049,995 UART: [kat] SHA2-512-ACC
4,051,895 UART: [kat] ECC-384
4,057,540 UART: [kat] HMAC-384Kdf
4,062,138 UART: [kat] LMS
4,630,334 UART: [kat] --
4,631,175 UART: [update-reset] ++
6,011,705 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,012,965 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,168,232 >>> mbox cmd response: success
6,168,457 UART: [update-reset] Copying MAN_2 To MAN_1
6,176,471 UART: [update-reset Success] --
6,177,432 UART: [state] Locking Datavault
6,178,154 UART: [state] Locking PCR0, PCR1 and PCR31
6,178,758 UART: [state] Locking ICCM
6,179,416 UART: [exit] Launching FMC @ 0x40000130
6,184,746 UART:
6,184,762 UART: Running Caliptra FMC ...
6,185,170 UART:
6,185,224 UART: [state] CFI Enabled
6,274,393 UART: [art] Extend RT PCRs Done
6,274,821 UART: [art] Lock RT PCRs Done
6,276,182 UART: [art] Populate DV Done
6,284,355 UART: [fht] FMC Alias Private Key: 7
6,285,295 UART: [art] Derive CDI
6,285,575 UART: [art] Store in slot 0x4
6,371,377 UART: [art] Derive Key Pair
6,371,737 UART: [art] Store priv key in slot 0x5
6,384,534 UART: [art] Derive Key Pair - Done
6,399,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,414,902 UART: [art] Erasing AUTHORITY.KEYID = 7
6,415,667 UART: [art] PUB.X = 33131A9A18CAD9A9BCE12C5133F0186326249BC34EA4162F26D600F32EC3C85C9ED4CD43315111E8F195D8C888FD66BC
6,422,421 UART: [art] PUB.Y = 7C36E45675D82D99501024E61BBE474B4DE1E5D83A2ED1F66C89AEE703B31F5C6EF3008A931623B147516600064A2115
6,429,317 UART: [art] SIG.R = 4FD06620893A7CB413CB2EF14A2D26C4087785B80603783E27A86304B09143C7EE3F04886CEF1B9AB26895E216D933CA
6,436,070 UART: [art] SIG.S = D29F0E7469EBBF84B77A8E830D7AAC1FCAF2A5F21E9A7354C1DAF95EE12E048144C7181893F3B069E4E01A764295899A
6,459,575 UART: Caliptra RT
6,459,826 UART: [state] CFI Enabled
6,839,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,840,900 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,871,578 UART: [rt]cmd =0x494e464f, len=4
6,875,402 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,005 ready_for_fw is high
1,362,005 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,517,453 >>> mbox cmd response: success
2,517,453 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,579,124 UART:
2,579,140 UART: Running Caliptra FMC ...
2,579,548 UART:
2,579,602 UART: [state] CFI Enabled
2,589,884 UART: [fht] FMC Alias Private Key: 7
2,709,448 UART: [art] Extend RT PCRs Done
2,709,876 UART: [art] Lock RT PCRs Done
2,711,274 UART: [art] Populate DV Done
2,719,633 UART: [fht] FMC Alias Private Key: 7
2,720,645 UART: [art] Derive CDI
2,720,925 UART: [art] Store in slot 0x4
2,806,439 UART: [art] Derive Key Pair
2,806,799 UART: [art] Store priv key in slot 0x5
2,820,192 UART: [art] Derive Key Pair - Done
2,834,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,850,450 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,215 UART: [art] PUB.X = 31BB1051A01FA9DF5A304F4B0B7868AF27324CA2F432065E92B0147B87CB81C3847F96FD169F476F1F69AFD0AC0F6072
2,857,982 UART: [art] PUB.Y = 7CFEF7F106EA149F31C125DEDF3937EF98DFD4B385F3523A4DA68D6375F56556A0D54C2897AA2A5AAFEC023988B35B50
2,864,940 UART: [art] SIG.R = AF9083F842B5868D35D8E74D4CC0CBF4A6FE496B2D3EB6538DAEA4C3EACDAC3E51D861BA38E07F685A86AE04F6201DB4
2,871,731 UART: [art] SIG.S = D6E01808DE11490EEC47672942B88656859F5F9FD98D6BAB825855E66E18D4F79B10D9DA0A215FD6FAE45BB79C795C61
2,895,316 UART: mbox::rt_entry...
2,895,688 UART: ____ _ _ _ ____ _____
2,896,472 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,897,272 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,898,040 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,898,808 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,899,576 UART: |_|
2,899,888 UART:
3,018,816 UART: [rt] Runtime listening for mailbox commands...
3,025,150 >>> mbox cmd response data (4360 bytes)
3,025,151 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,055,933 >>> mbox cmd response data (0 bytes)
3,055,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,868,817 >>> mbox cmd response: success
5,882,283 UART:
5,882,299 UART: Running Caliptra FMC ...
5,882,707 UART:
5,882,761 UART: [state] CFI Enabled
5,971,346 UART: [art] Extend RT PCRs Done
5,971,774 UART: [art] Lock RT PCRs Done
5,973,065 UART: [art] Populate DV Done
5,981,474 UART: [fht] FMC Alias Private Key: 7
5,982,542 UART: [art] Derive CDI
5,982,822 UART: [art] Store in slot 0x4
6,068,292 UART: [art] Derive Key Pair
6,068,652 UART: [art] Store priv key in slot 0x5
6,082,039 UART: [art] Derive Key Pair - Done
6,096,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,112,131 UART: [art] Erasing AUTHORITY.KEYID = 7
6,112,896 UART: [art] PUB.X = 426E5966D215105B6422A54A3465EC46CAE68B5C81E7B78AC8C196F1CBF0F3FB8D1E1C51D19303C0A7AF8925DC200A1B
6,119,670 UART: [art] PUB.Y = 52F5D91D3A8807725F66858C836B465E0786431DEA22C8552CF4E28201C3DE1634778761ED886CEC3CE0892D01C2ED3B
6,126,606 UART: [art] SIG.R = 4E0893E6D89158F1719004105AC095F1D04846DE4C95D846D8B71B4791F0383ABBCD626EFFD72B4E475E2AB563D4C878
6,133,372 UART: [art] SIG.S = FBBF18C7E7C021614B41A82F07C94CCF1949DBDCDFBFE683B4E6B47846E770F5D9B7B2D51BD198D57DD185C68D3CB5A7
6,157,049 UART: Caliptra RT
6,157,300 UART: [state] CFI Enabled
6,533,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,534,646 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,565,212 UART: [rt]cmd =0x494e464f, len=4
6,568,940 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,118 UART: [kat] SHA2-256
882,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,164 UART: [kat] ++
886,316 UART: [kat] sha1
890,706 UART: [kat] SHA2-256
892,644 UART: [kat] SHA2-384
895,259 UART: [kat] SHA2-512-ACC
897,160 UART: [kat] ECC-384
902,785 UART: [kat] HMAC-384Kdf
907,549 UART: [kat] LMS
1,475,745 UART: [kat] --
1,476,566 UART: [cold-reset] ++
1,477,058 UART: [fht] Storing FHT @ 0x50003400
1,479,737 UART: [idev] ++
1,479,905 UART: [idev] CDI.KEYID = 6
1,480,265 UART: [idev] SUBJECT.KEYID = 7
1,480,689 UART: [idev] UDS.KEYID = 0
1,481,034 ready_for_fw is high
1,481,034 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,715 UART: [idev] Erasing UDS.KEYID = 0
1,504,629 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,167 UART: [idev] --
1,514,328 UART: [ldev] ++
1,514,496 UART: [ldev] CDI.KEYID = 6
1,514,859 UART: [ldev] SUBJECT.KEYID = 5
1,515,285 UART: [ldev] AUTHORITY.KEYID = 7
1,515,748 UART: [ldev] FE.KEYID = 1
1,521,246 UART: [ldev] Erasing FE.KEYID = 1
1,547,015 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,229 UART: [ldev] --
1,586,544 UART: [fwproc] Waiting for Commands...
1,587,351 UART: [fwproc] Received command 0x46574c44
1,588,142 UART: [fwproc] Received Image of size 82832 bytes
2,523,247 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,969 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,582,187 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,669,062 >>> mbox cmd response: success
2,669,062 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,670,176 UART: [afmc] ++
2,670,344 UART: [afmc] CDI.KEYID = 6
2,670,706 UART: [afmc] SUBJECT.KEYID = 7
2,671,131 UART: [afmc] AUTHORITY.KEYID = 5
2,706,196 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,874 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,723,654 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,729,363 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,735,246 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,740,929 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,748,785 UART: [afmc] --
2,749,719 UART: [cold-reset] --
2,750,459 UART: [state] Locking Datavault
2,751,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,752,522 UART: [state] Locking ICCM
2,753,018 UART: [exit] Launching FMC @ 0x40000130
2,758,348 UART:
2,758,364 UART: Running Caliptra FMC ...
2,758,772 UART:
2,758,915 UART: [state] CFI Enabled
2,769,605 UART: [fht] FMC Alias Private Key: 7
2,888,677 UART: [art] Extend RT PCRs Done
2,889,105 UART: [art] Lock RT PCRs Done
2,890,419 UART: [art] Populate DV Done
2,898,642 UART: [fht] FMC Alias Private Key: 7
2,899,628 UART: [art] Derive CDI
2,899,908 UART: [art] Store in slot 0x4
2,985,860 UART: [art] Derive Key Pair
2,986,220 UART: [art] Store priv key in slot 0x5
2,999,801 UART: [art] Derive Key Pair - Done
3,014,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,064 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,829 UART: [art] PUB.X = 26C03BFBE9692FA1DCE70DA5548DB65F054B39662C598ACD49DCD654092F64FBD60B390FC4000A587E12D66B54F37574
3,037,567 UART: [art] PUB.Y = 25C2132AAB38763162F502506BD0BA22D715DE407767B21893DCE2E22660F7072423A1D3103A7CDF8F199C95F3D8F4D6
3,044,509 UART: [art] SIG.R = 3E2CDA46FCC489EA66AE6E3B7E7DEF3E9DA82F02F27946243820F09BF38045CB113A3832E668AFFB55F5841B500C961D
3,051,285 UART: [art] SIG.S = 018D2EEF04FA5C2F6B4A5902EA80A609F1758976755A3A3B1C2ED68AA45FCE7FC70841ED10A6FAAFBFC56BB96FE4037B
3,075,477 UART: mbox::rt_entry...
3,075,849 UART: ____ _ _ _ ____ _____
3,076,633 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,077,433 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,078,201 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,078,969 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,079,737 UART: |_|
3,080,049 UART:
3,198,871 UART: [rt] Runtime listening for mailbox commands...
3,205,205 >>> mbox cmd response data (4360 bytes)
3,205,206 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,235,988 >>> mbox cmd response data (0 bytes)
3,235,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,236,110 UART:
3,236,126 UART: Running Caliptra ROM ...
3,236,534 UART:
3,236,675 UART: [state] CFI Enabled
3,239,325 UART: [state] LifecycleState = Unprovisioned
3,239,980 UART: [state] DebugLocked = No
3,240,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,242,109 UART: [kat] SHA2-256
4,036,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,040,155 UART: [kat] ++
4,040,307 UART: [kat] sha1
4,044,407 UART: [kat] SHA2-256
4,046,345 UART: [kat] SHA2-384
4,049,080 UART: [kat] SHA2-512-ACC
4,050,980 UART: [kat] ECC-384
4,056,631 UART: [kat] HMAC-384Kdf
4,061,209 UART: [kat] LMS
4,629,405 UART: [kat] --
4,630,248 UART: [update-reset] ++
6,010,996 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,012,162 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,167,429 >>> mbox cmd response: success
6,167,612 UART: [update-reset] Copying MAN_2 To MAN_1
6,175,626 UART: [update-reset Success] --
6,176,545 UART: [state] Locking Datavault
6,177,239 UART: [state] Locking PCR0, PCR1 and PCR31
6,177,843 UART: [state] Locking ICCM
6,178,331 UART: [exit] Launching FMC @ 0x40000130
6,183,661 UART:
6,183,677 UART: Running Caliptra FMC ...
6,184,085 UART:
6,184,228 UART: [state] CFI Enabled
6,273,595 UART: [art] Extend RT PCRs Done
6,274,023 UART: [art] Lock RT PCRs Done
6,275,288 UART: [art] Populate DV Done
6,283,511 UART: [fht] FMC Alias Private Key: 7
6,284,587 UART: [art] Derive CDI
6,284,867 UART: [art] Store in slot 0x4
6,370,389 UART: [art] Derive Key Pair
6,370,749 UART: [art] Store priv key in slot 0x5
6,383,876 UART: [art] Derive Key Pair - Done
6,398,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,414,285 UART: [art] Erasing AUTHORITY.KEYID = 7
6,415,050 UART: [art] PUB.X = CD25F588235D8F5197C31EA8EA5C8B67E451F0A9C2DE7A86DB8320284F7EE5F09BC04107484047E9FD4D6C884A939C38
6,421,823 UART: [art] PUB.Y = 590022B7A1DBBE467B7EDE126A9EADB81D7F6B493DCB3C3D6897EA2CC1ACD82C76F555CC183B0775956B25384107E79C
6,428,759 UART: [art] SIG.R = A57609E52F85177078662AAB234976804D6347E26621E78C8CA1FB85177650D1E85CC0EB07849C6FAD3A1FFE7FF94E6E
6,435,525 UART: [art] SIG.S = 0B94D0F1BC9123488506F18675464AC4F3E9ADE5D184649E4D6261242A09F3136EF1F642B94D6A97E25A5FDD5D688FDE
6,459,244 UART: Caliptra RT
6,459,587 UART: [state] CFI Enabled
6,833,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,835,287 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,865,675 UART: [rt]cmd =0x494e464f, len=4
6,869,501 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,574 ready_for_fw is high
1,362,574 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,826 >>> mbox cmd response: success
2,518,826 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,581,057 UART:
2,581,073 UART: Running Caliptra FMC ...
2,581,481 UART:
2,581,624 UART: [state] CFI Enabled
2,592,164 UART: [fht] FMC Alias Private Key: 7
2,711,794 UART: [art] Extend RT PCRs Done
2,712,222 UART: [art] Lock RT PCRs Done
2,713,490 UART: [art] Populate DV Done
2,721,835 UART: [fht] FMC Alias Private Key: 7
2,722,855 UART: [art] Derive CDI
2,723,135 UART: [art] Store in slot 0x4
2,809,073 UART: [art] Derive Key Pair
2,809,433 UART: [art] Store priv key in slot 0x5
2,822,998 UART: [art] Derive Key Pair - Done
2,837,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,853,249 UART: [art] Erasing AUTHORITY.KEYID = 7
2,854,014 UART: [art] PUB.X = D8594E96D690DF8FA44612E736FA1FE943B970ECEF2DFE6AF1A5BC27DD295183E028CC94749F58995BDEFD7E2C4CB198
2,860,802 UART: [art] PUB.Y = 3F19570C219CA0792F36DF4ACB44A23547590F041B975396DB7F6D2533CF3B636DA3411926A576A390664D402AEE56F7
2,867,739 UART: [art] SIG.R = DA6D29EA0602194F7F5C4E7539784515560FB2B5C939CE075DAFB1462746AD7808B37267A4DBB3796796030388104750
2,874,478 UART: [art] SIG.S = 121A13D8E95EBFEE55CC986D40C2F6C1CC7DA65417F77EA125A0C9B0AED4F4B4C05449774E7A86701CFBB8D1B7F2E97F
2,898,468 UART: mbox::rt_entry...
2,898,840 UART: ____ _ _ _ ____ _____
2,899,624 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,900,424 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,901,192 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,901,960 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,902,728 UART: |_|
2,903,040 UART:
3,022,781 UART: [rt] Runtime listening for mailbox commands...
3,029,115 >>> mbox cmd response data (4360 bytes)
3,029,116 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,059,898 >>> mbox cmd response data (0 bytes)
3,059,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,873,785 >>> mbox cmd response: success
5,887,273 UART:
5,887,289 UART: Running Caliptra FMC ...
5,887,697 UART:
5,887,840 UART: [state] CFI Enabled
5,977,051 UART: [art] Extend RT PCRs Done
5,977,479 UART: [art] Lock RT PCRs Done
5,978,710 UART: [art] Populate DV Done
5,986,923 UART: [fht] FMC Alias Private Key: 7
5,987,971 UART: [art] Derive CDI
5,988,251 UART: [art] Store in slot 0x4
6,074,617 UART: [art] Derive Key Pair
6,074,977 UART: [art] Store priv key in slot 0x5
6,088,324 UART: [art] Derive Key Pair - Done
6,103,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,118,751 UART: [art] Erasing AUTHORITY.KEYID = 7
6,119,516 UART: [art] PUB.X = E1694F8FFC76D7A06240D828A047F4D29B671ABC414D2D6E148306FB6157483098057D865AD3C48964364CDF5E5FAF44
6,126,280 UART: [art] PUB.Y = CD341505E6503411C3FC972A6BA892AF33C4EF7D6A8D7F036F2312314093CEE749B9039B052541EA185EE16088C28F80
6,133,216 UART: [art] SIG.R = 7594A5C299CC1EEEF35D2D555441BB61E5B74383A6A2AE0F2020F02058E47FC699909D0AC83E2A12ECD6FDE00A038F4D
6,139,986 UART: [art] SIG.S = E5CB5CDAEDF0A5721267E6F6E35A9E339413F8E4E5968F6CD3CFE46FED27707EC47DE6FAAC91983E82C985F8C34A7A47
6,163,440 UART: Caliptra RT
6,163,783 UART: [state] CFI Enabled
6,545,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,547,433 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,578,005 UART: [rt]cmd =0x494e464f, len=4
6,581,731 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,535 UART: [state] DebugLocked = No
87,235 UART: [state] WD Timer not started. Device not locked for debugging
88,472 UART: [kat] SHA2-256
892,022 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,126 UART: [kat] ++
896,278 UART: [kat] sha1
900,598 UART: [kat] SHA2-256
902,538 UART: [kat] SHA2-384
905,267 UART: [kat] SHA2-512-ACC
907,168 UART: [kat] ECC-384
916,991 UART: [kat] HMAC-384Kdf
921,625 UART: [kat] LMS
1,169,937 UART: [kat] --
1,170,742 UART: [cold-reset] ++
1,171,156 UART: [fht] FHT @ 0x50003400
1,173,778 UART: [idev] ++
1,173,946 UART: [idev] CDI.KEYID = 6
1,174,307 UART: [idev] SUBJECT.KEYID = 7
1,174,732 UART: [idev] UDS.KEYID = 0
1,175,078 ready_for_fw is high
1,175,078 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,073 UART: [idev] Erasing UDS.KEYID = 0
1,200,039 UART: [idev] Sha1 KeyId Algorithm
1,208,919 UART: [idev] --
1,210,004 UART: [ldev] ++
1,210,172 UART: [ldev] CDI.KEYID = 6
1,210,536 UART: [ldev] SUBJECT.KEYID = 5
1,210,963 UART: [ldev] AUTHORITY.KEYID = 7
1,211,426 UART: [ldev] FE.KEYID = 1
1,216,444 UART: [ldev] Erasing FE.KEYID = 1
1,242,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,786 UART: [ldev] --
1,282,193 UART: [fwproc] Wait for Commands...
1,282,876 UART: [fwproc] Recv command 0x46574c44
1,283,609 UART: [fwproc] Recv'd Img size: 82832 bytes
2,217,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,395 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,570 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,275 >>> mbox cmd response: success
2,363,275 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,364,423 UART: [afmc] ++
2,364,591 UART: [afmc] CDI.KEYID = 6
2,364,954 UART: [afmc] SUBJECT.KEYID = 7
2,365,380 UART: [afmc] AUTHORITY.KEYID = 5
2,400,779 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,911 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,621 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,502 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,203 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,990 UART: [afmc] --
2,444,031 UART: [cold-reset] --
2,444,795 UART: [state] Locking Datavault
2,445,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,282 UART: [state] Locking ICCM
2,446,810 UART: [exit] Launching FMC @ 0x40000130
2,452,140 UART:
2,452,156 UART: Running Caliptra FMC ...
2,452,564 UART:
2,452,618 UART: [state] CFI Enabled
2,462,704 UART: [fht] FMC Alias Private Key: 7
2,581,682 UART: [art] Extend RT PCRs Done
2,582,110 UART: [art] Lock RT PCRs Done
2,583,892 UART: [art] Populate DV Done
2,592,065 UART: [fht] FMC Alias Private Key: 7
2,593,005 UART: [art] Derive CDI
2,593,285 UART: [art] Store in slot 0x4
2,679,320 UART: [art] Derive Key Pair
2,679,680 UART: [art] Store priv key in slot 0x5
2,693,170 UART: [art] Derive Key Pair - Done
2,708,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,747 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,512 UART: [art] PUB.X = 0D76ACD887C6EAD2D7F156426296BAABCF1AED6F56F058843E17A71B11E123DE0584CF8799DF3ACE426E916BCDF24ADA
2,731,298 UART: [art] PUB.Y = FC04C33292D9E0E3E9632E717DC91F5024CD5357D346F7964421431D94A2BD3C2D6F31BD339C685F3EC0CE1A0CF78D24
2,738,248 UART: [art] SIG.R = FEC2613EE36B95C6B4F90907A702323ACA73D5B1ED2F45E2F0611C614EAF7D8BC8584A071D1248F904DD25AD6C84C75D
2,745,015 UART: [art] SIG.S = EBF6729ED2FC68219243B6D5ACFBAA2D0F59EFC2A4ECC46AAC75CA3CCE39FDFF90D741FCDF4B7F4A4EE9F12D08D87732
2,768,235 UART: mbox::rt_entry...
2,768,607 UART: ____ _ _ _ ____ _____
2,769,391 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,191 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,770,959 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,771,727 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,495 UART: |_|
2,772,807 UART:
2,890,934 UART: [rt] Runtime listening for mailbox commands...
2,897,268 >>> mbox cmd response data (4360 bytes)
2,897,269 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,928,051 >>> mbox cmd response data (0 bytes)
2,928,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,928,170 UART:
2,928,186 UART: Running Caliptra ROM ...
2,928,594 UART:
2,928,649 UART: [state] CFI Enabled
2,931,417 UART: [state] LifecycleState = Unprovisioned
2,932,072 UART: [state] DebugLocked = No
2,932,686 UART: [state] WD Timer not started. Device not locked for debugging
2,933,836 UART: [kat] SHA2-256
3,737,386 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,741,490 UART: [kat] ++
3,741,642 UART: [kat] sha1
3,746,046 UART: [kat] SHA2-256
3,747,986 UART: [kat] SHA2-384
3,750,691 UART: [kat] SHA2-512-ACC
3,752,591 UART: [kat] ECC-384
3,762,034 UART: [kat] HMAC-384Kdf
3,766,644 UART: [kat] LMS
4,014,956 UART: [kat] --
4,015,814 UART: [update-reset] ++
5,374,689 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,375,664 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,530,879 >>> mbox cmd response: success
5,531,042 UART: [update-reset] Copying MAN_2 To MAN_1
5,539,056 UART: [update-reset Success] --
5,540,053 UART: [state] Locking Datavault
5,540,987 UART: [state] Locking PCR0, PCR1 and PCR31
5,541,591 UART: [state] Locking ICCM
5,542,013 UART: [exit] Launching FMC @ 0x40000130
5,547,343 UART:
5,547,359 UART: Running Caliptra FMC ...
5,547,767 UART:
5,547,821 UART: [state] CFI Enabled
5,637,372 UART: [art] Extend RT PCRs Done
5,637,800 UART: [art] Lock RT PCRs Done
5,639,237 UART: [art] Populate DV Done
5,647,592 UART: [fht] FMC Alias Private Key: 7
5,648,596 UART: [art] Derive CDI
5,648,876 UART: [art] Store in slot 0x4
5,734,369 UART: [art] Derive Key Pair
5,734,729 UART: [art] Store priv key in slot 0x5
5,747,919 UART: [art] Derive Key Pair - Done
5,762,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,777,958 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,723 UART: [art] PUB.X = 8AAD73DF7A94BF12B2FE10C28828F65C99085E6906E44D2ECA26D0D92D5801CFECB54EA987A592FCBABFCD250B54D80E
5,785,500 UART: [art] PUB.Y = A4B7005AB212F97E0D3CA3BA1D7A0901697B0D60B7FAC225AAE2F1EFB70ED5DCA8FDCF9CE5AB8E39B7F6FF6A8ADE701D
5,792,449 UART: [art] SIG.R = E04A1DC5ACA6CFF73F941364B5EA2FFB730739230358D0A3EDCCD1519EDFCFD5D795A022AE80504805C62E3AEB35D385
5,799,228 UART: [art] SIG.S = 910B979E4E11F61354C2C8C79AAA93802A69EBA420F00A0AE7515A33F9699108E70D205519EB18127142EC16E10FF874
5,822,952 UART: Caliptra RT
5,823,203 UART: [state] CFI Enabled
6,197,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,198,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,229,321 UART: [rt]cmd =0x494e464f, len=4
6,233,115 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,702 ready_for_fw is high
1,059,702 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,363 >>> mbox cmd response: success
2,216,363 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,278,582 UART:
2,278,598 UART: Running Caliptra FMC ...
2,279,006 UART:
2,279,060 UART: [state] CFI Enabled
2,289,666 UART: [fht] FMC Alias Private Key: 7
2,408,644 UART: [art] Extend RT PCRs Done
2,409,072 UART: [art] Lock RT PCRs Done
2,410,500 UART: [art] Populate DV Done
2,418,381 UART: [fht] FMC Alias Private Key: 7
2,419,391 UART: [art] Derive CDI
2,419,671 UART: [art] Store in slot 0x4
2,505,682 UART: [art] Derive Key Pair
2,506,042 UART: [art] Store priv key in slot 0x5
2,519,554 UART: [art] Derive Key Pair - Done
2,534,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,007 UART: [art] Erasing AUTHORITY.KEYID = 7
2,550,772 UART: [art] PUB.X = 0677DAC4C3A3D023C93095B3C180AD6288E5080ABD38E416CCC24BD7E63A7693580CA6C656E5640B6DE64E5CD3D8E3D9
2,557,537 UART: [art] PUB.Y = 9BDBB4C8DD5970FC71B0AB2A255B397716B50209D95020F156BF31187F6F988ABC7BC96EF9ECBED07EC752D77B170DDA
2,564,496 UART: [art] SIG.R = 1FF30C02BEFF914DC721D23A5CB30B67FC54D0D92972A11F9E13C8B4EB6586CC1F1FC2F21681BA17531BAC93B5DCC438
2,571,275 UART: [art] SIG.S = 21170F92D6AFF1F4427E97AD629C7577369B89E3ED5204F83D2EC94309FDE63893778A8C153D7CCB55B0C2273DBBE51E
2,595,048 UART: mbox::rt_entry...
2,595,420 UART: ____ _ _ _ ____ _____
2,596,204 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,004 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,597,772 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,598,540 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,308 UART: |_|
2,599,620 UART:
2,718,375 UART: [rt] Runtime listening for mailbox commands...
2,724,709 >>> mbox cmd response data (4360 bytes)
2,724,710 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,755,492 >>> mbox cmd response data (0 bytes)
2,755,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,243,186 >>> mbox cmd response: success
5,256,595 UART:
5,256,611 UART: Running Caliptra FMC ...
5,257,019 UART:
5,257,073 UART: [state] CFI Enabled
5,346,680 UART: [art] Extend RT PCRs Done
5,347,108 UART: [art] Lock RT PCRs Done
5,348,089 UART: [art] Populate DV Done
5,356,170 UART: [fht] FMC Alias Private Key: 7
5,357,186 UART: [art] Derive CDI
5,357,466 UART: [art] Store in slot 0x4
5,442,977 UART: [art] Derive Key Pair
5,443,337 UART: [art] Store priv key in slot 0x5
5,456,587 UART: [art] Derive Key Pair - Done
5,471,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,487,216 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,981 UART: [art] PUB.X = 38178179757EA97ED143CC05E17A3B594C75E6721C0ACFA861D3E26D8F42393C64CB5685370270165FE483F8B86FDAAF
5,494,744 UART: [art] PUB.Y = 273F27AA50734FC4E98BA132B752D0677ABA7460F2E0AD443EAF5C07B9AB00837B01F4F92574DD8615DA054762AFE9C7
5,501,671 UART: [art] SIG.R = 1BE9F8F692C4213CADE6FDC6BAE9296912EC462CD9A5F0F64BBF90E2D5B020DE10A373663D8CB1E51696B07B8D9D1EE3
5,508,461 UART: [art] SIG.S = 744589070C68F812714DA71D25E09ACA9D5B5BD8FCE5ADC64FF19037779CE9E1C8EAB523844AD6A6B08FC797F89AAFAD
5,531,907 UART: Caliptra RT
5,532,158 UART: [state] CFI Enabled
5,910,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,912,170 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,942,922 UART: [rt]cmd =0x494e464f, len=4
5,946,772 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,833 UART: [kat] ++
895,985 UART: [kat] sha1
900,025 UART: [kat] SHA2-256
901,965 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,550 UART: [kat] HMAC-384Kdf
921,080 UART: [kat] LMS
1,169,392 UART: [kat] --
1,170,283 UART: [cold-reset] ++
1,170,723 UART: [fht] FHT @ 0x50003400
1,173,529 UART: [idev] ++
1,173,697 UART: [idev] CDI.KEYID = 6
1,174,058 UART: [idev] SUBJECT.KEYID = 7
1,174,483 UART: [idev] UDS.KEYID = 0
1,174,829 ready_for_fw is high
1,174,829 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,444 UART: [idev] Erasing UDS.KEYID = 0
1,199,064 UART: [idev] Sha1 KeyId Algorithm
1,207,810 UART: [idev] --
1,208,879 UART: [ldev] ++
1,209,047 UART: [ldev] CDI.KEYID = 6
1,209,411 UART: [ldev] SUBJECT.KEYID = 5
1,209,838 UART: [ldev] AUTHORITY.KEYID = 7
1,210,301 UART: [ldev] FE.KEYID = 1
1,215,425 UART: [ldev] Erasing FE.KEYID = 1
1,241,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,317 UART: [ldev] --
1,279,758 UART: [fwproc] Wait for Commands...
1,280,513 UART: [fwproc] Recv command 0x46574c44
1,281,246 UART: [fwproc] Recv'd Img size: 82832 bytes
2,215,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,243,465 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,274,640 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,361,249 >>> mbox cmd response: success
2,361,249 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,362,477 UART: [afmc] ++
2,362,645 UART: [afmc] CDI.KEYID = 6
2,363,008 UART: [afmc] SUBJECT.KEYID = 7
2,363,434 UART: [afmc] AUTHORITY.KEYID = 5
2,398,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,415,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,415,799 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,421,509 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,427,390 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,433,091 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,440,746 UART: [afmc] --
2,441,769 UART: [cold-reset] --
2,442,695 UART: [state] Locking Datavault
2,443,912 UART: [state] Locking PCR0, PCR1 and PCR31
2,444,516 UART: [state] Locking ICCM
2,445,018 UART: [exit] Launching FMC @ 0x40000130
2,450,348 UART:
2,450,364 UART: Running Caliptra FMC ...
2,450,772 UART:
2,450,915 UART: [state] CFI Enabled
2,461,339 UART: [fht] FMC Alias Private Key: 7
2,580,641 UART: [art] Extend RT PCRs Done
2,581,069 UART: [art] Lock RT PCRs Done
2,582,339 UART: [art] Populate DV Done
2,590,782 UART: [fht] FMC Alias Private Key: 7
2,591,950 UART: [art] Derive CDI
2,592,230 UART: [art] Store in slot 0x4
2,678,321 UART: [art] Derive Key Pair
2,678,681 UART: [art] Store priv key in slot 0x5
2,692,753 UART: [art] Derive Key Pair - Done
2,707,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,354 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,119 UART: [art] PUB.X = 03B1ED7AAA427966F186D2FD767398E5FDC095DCC3BA014CAA28731C4AB0938C6C9EB65693477FD4EE63A999E33166F5
2,730,893 UART: [art] PUB.Y = 61432EEB8E39A4E260B1FD5EB2969409E72E83617272A43EF3C16C68A66896D920A239244A1513F7A862F3600029097D
2,737,805 UART: [art] SIG.R = 91FBACFBA4AEF956B386C93B36F1DB1CB3899C644B0A86F88E73289B7D994FCBB966C7FEC9573DFCF5836AFBAADFA3C2
2,744,602 UART: [art] SIG.S = A37E0F6CC088087165E32B507BD339468038FB98D9E8BB77A63EF8DF52C503089A25CDE9968CD0B0B9E30FDBFE44754F
2,767,695 UART: mbox::rt_entry...
2,768,067 UART: ____ _ _ _ ____ _____
2,768,851 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,769,651 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,770,419 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,771,187 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,771,955 UART: |_|
2,772,267 UART:
2,890,532 UART: [rt] Runtime listening for mailbox commands...
2,896,866 >>> mbox cmd response data (4360 bytes)
2,896,867 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,927,649 >>> mbox cmd response data (0 bytes)
2,927,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,927,768 UART:
2,927,784 UART: Running Caliptra ROM ...
2,928,192 UART:
2,928,334 UART: [state] CFI Enabled
2,931,194 UART: [state] LifecycleState = Unprovisioned
2,931,849 UART: [state] DebugLocked = No
2,932,383 UART: [state] WD Timer not started. Device not locked for debugging
2,933,701 UART: [kat] SHA2-256
3,737,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,741,355 UART: [kat] ++
3,741,507 UART: [kat] sha1
3,745,715 UART: [kat] SHA2-256
3,747,655 UART: [kat] SHA2-384
3,750,540 UART: [kat] SHA2-512-ACC
3,752,440 UART: [kat] ECC-384
3,762,571 UART: [kat] HMAC-384Kdf
3,767,089 UART: [kat] LMS
4,015,401 UART: [kat] --
4,016,231 UART: [update-reset] ++
5,375,896 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,376,919 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,532,134 >>> mbox cmd response: success
5,532,253 UART: [update-reset] Copying MAN_2 To MAN_1
5,540,267 UART: [update-reset Success] --
5,541,346 UART: [state] Locking Datavault
5,541,924 UART: [state] Locking PCR0, PCR1 and PCR31
5,542,528 UART: [state] Locking ICCM
5,543,150 UART: [exit] Launching FMC @ 0x40000130
5,548,480 UART:
5,548,496 UART: Running Caliptra FMC ...
5,548,904 UART:
5,549,047 UART: [state] CFI Enabled
5,638,454 UART: [art] Extend RT PCRs Done
5,638,882 UART: [art] Lock RT PCRs Done
5,639,947 UART: [art] Populate DV Done
5,648,228 UART: [fht] FMC Alias Private Key: 7
5,649,268 UART: [art] Derive CDI
5,649,548 UART: [art] Store in slot 0x4
5,735,403 UART: [art] Derive Key Pair
5,735,763 UART: [art] Store priv key in slot 0x5
5,749,111 UART: [art] Derive Key Pair - Done
5,763,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,779,030 UART: [art] Erasing AUTHORITY.KEYID = 7
5,779,795 UART: [art] PUB.X = 8F833E20DFCF9BB87DFCB674957C30320A4922A1F3ED234B4E3C440B6F4F7FD5717E35A8EFAE88B9DEDBF9776CD371A8
5,786,579 UART: [art] PUB.Y = 58768B5F8D357345A7BCCBDF5567F3A2C06D705465553907E86107FF14A3C9C58F3C3BF05AA8A348EF56D270813DA9F0
5,793,527 UART: [art] SIG.R = 8D223985004B33F10582E093D4E53FADA056DA4856CF8658BCC1FA666CF1B3B5EC8402C72DD62E43769A4DCDCED0B080
5,800,281 UART: [art] SIG.S = F4707FCFEA81EEEAAD8734260ECAB1780CA8D507E1F09B84A4BCE5CAD722E0772DD13C73F582B9FFE64926BD7919B994
5,824,468 UART: Caliptra RT
5,824,811 UART: [state] CFI Enabled
6,194,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,196,287 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,226,839 UART: [rt]cmd =0x494e464f, len=4
6,230,553 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,469 ready_for_fw is high
1,059,469 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,654 >>> mbox cmd response: success
2,215,654 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,278,331 UART:
2,278,347 UART: Running Caliptra FMC ...
2,278,755 UART:
2,278,898 UART: [state] CFI Enabled
2,289,798 UART: [fht] FMC Alias Private Key: 7
2,409,098 UART: [art] Extend RT PCRs Done
2,409,526 UART: [art] Lock RT PCRs Done
2,411,276 UART: [art] Populate DV Done
2,419,339 UART: [fht] FMC Alias Private Key: 7
2,420,513 UART: [art] Derive CDI
2,420,793 UART: [art] Store in slot 0x4
2,506,910 UART: [art] Derive Key Pair
2,507,270 UART: [art] Store priv key in slot 0x5
2,520,912 UART: [art] Derive Key Pair - Done
2,535,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,078 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,843 UART: [art] PUB.X = 7D4866DABC8F41072F8B7679EEE73159876D46702B666F56147244286E287A6D3D35774710FBB708A825FBEA28062483
2,558,594 UART: [art] PUB.Y = 6C3608F3F2640FF4E572C86EA5A3B6973BEDC03989235C5EAEBD1F44060775B0D0AD528F92BB3F6A28BF4AB8AD0128FB
2,565,545 UART: [art] SIG.R = A67B8E2300261DDA1F7C281D247A8AA1F9A531ED382AE7E7F7E3949065A791A527F5AC27ACF4281C526229EC754319A4
2,572,297 UART: [art] SIG.S = 0B0DE914C2D92FF4DCE2C117D806A740852E14D0F65E76061E0444F7F0C18D444ACD9539D625680CC4451A98368EF126
2,595,807 UART: mbox::rt_entry...
2,596,179 UART: ____ _ _ _ ____ _____
2,596,963 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,763 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,531 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,299 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,067 UART: |_|
2,600,379 UART:
2,719,301 UART: [rt] Runtime listening for mailbox commands...
2,725,635 >>> mbox cmd response data (4360 bytes)
2,725,636 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,756,418 >>> mbox cmd response data (0 bytes)
2,756,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,243,299 >>> mbox cmd response: success
5,256,770 UART:
5,256,786 UART: Running Caliptra FMC ...
5,257,194 UART:
5,257,337 UART: [state] CFI Enabled
5,346,502 UART: [art] Extend RT PCRs Done
5,346,930 UART: [art] Lock RT PCRs Done
5,348,049 UART: [art] Populate DV Done
5,356,058 UART: [fht] FMC Alias Private Key: 7
5,357,034 UART: [art] Derive CDI
5,357,314 UART: [art] Store in slot 0x4
5,443,465 UART: [art] Derive Key Pair
5,443,825 UART: [art] Store priv key in slot 0x5
5,457,501 UART: [art] Derive Key Pair - Done
5,472,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,488,453 UART: [art] Erasing AUTHORITY.KEYID = 7
5,489,218 UART: [art] PUB.X = F3BAE33B541A40DEFA3D62C711B46D73B5E79BA88B9F5532B0D0D63BE8630C326B896B27EF527FC7B8D0BE1B68086BE1
5,495,998 UART: [art] PUB.Y = D137ABD4E1817A85111DE8EF8F554AAE086F0AA8CDD4E42EA48C56A3142924FBF5928E8D813338F45702349ED4F20DB4
5,502,946 UART: [art] SIG.R = 4D6CD2796AA88AFB256CEA31B724C5BDE12D2AFD6A82E9912E8C077698A5EE8BD72A84500C840B00805E3D8D7FA367BF
5,509,701 UART: [art] SIG.S = BF24CF892DAD451AA19E1A27900B872FF3653752211C28590F417BF925A5C1FE7F5157FCB67CB439D0B9DDA2403392C4
5,533,295 UART: Caliptra RT
5,533,638 UART: [state] CFI Enabled
5,907,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,909,217 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,939,863 UART: [rt]cmd =0x494e464f, len=4
5,943,541 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
893,314 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,439 UART: [kat] ++
897,591 UART: [kat] sha1
902,063 UART: [kat] SHA2-256
904,003 UART: [kat] SHA2-384
906,700 UART: [kat] SHA2-512-ACC
908,601 UART: [kat] ECC-384
918,562 UART: [kat] HMAC-384Kdf
923,264 UART: [kat] LMS
1,171,592 UART: [kat] --
1,172,301 UART: [cold-reset] ++
1,172,875 UART: [fht] FHT @ 0x50003400
1,175,538 UART: [idev] ++
1,175,706 UART: [idev] CDI.KEYID = 6
1,176,066 UART: [idev] SUBJECT.KEYID = 7
1,176,490 UART: [idev] UDS.KEYID = 0
1,176,835 ready_for_fw is high
1,176,835 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,318 UART: [idev] Erasing UDS.KEYID = 0
1,201,753 UART: [idev] Sha1 KeyId Algorithm
1,210,181 UART: [idev] --
1,211,073 UART: [ldev] ++
1,211,241 UART: [ldev] CDI.KEYID = 6
1,211,604 UART: [ldev] SUBJECT.KEYID = 5
1,212,030 UART: [ldev] AUTHORITY.KEYID = 7
1,212,493 UART: [ldev] FE.KEYID = 1
1,217,547 UART: [ldev] Erasing FE.KEYID = 1
1,244,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,319 UART: [ldev] --
1,283,818 UART: [fwproc] Wait for Commands...
1,284,526 UART: [fwproc] Recv command 0x46574c44
1,285,254 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,247,169 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,278,339 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,365,096 >>> mbox cmd response: success
2,365,096 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,366,300 UART: [afmc] ++
2,366,468 UART: [afmc] CDI.KEYID = 6
2,366,830 UART: [afmc] SUBJECT.KEYID = 7
2,367,255 UART: [afmc] AUTHORITY.KEYID = 5
2,402,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,419,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,420,393 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,426,102 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,985 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,437,686 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,378 UART: [afmc] --
2,446,336 UART: [cold-reset] --
2,446,982 UART: [state] Locking Datavault
2,447,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,491 UART: [state] Locking ICCM
2,448,985 UART: [exit] Launching FMC @ 0x40000130
2,454,315 UART:
2,454,331 UART: Running Caliptra FMC ...
2,454,739 UART:
2,454,793 UART: [state] CFI Enabled
2,465,103 UART: [fht] FMC Alias Private Key: 7
2,584,371 UART: [art] Extend RT PCRs Done
2,584,799 UART: [art] Lock RT PCRs Done
2,586,077 UART: [art] Populate DV Done
2,594,646 UART: [fht] FMC Alias Private Key: 7
2,595,584 UART: [art] Derive CDI
2,595,864 UART: [art] Store in slot 0x4
2,681,565 UART: [art] Derive Key Pair
2,681,925 UART: [art] Store priv key in slot 0x5
2,695,035 UART: [art] Derive Key Pair - Done
2,709,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,234 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,999 UART: [art] PUB.X = B5501695F2A1A3C9D865EFD8B22A09BDAFE4B14AA355B9A420F1A42D21C01FC5A2218BF2112F94BEC0FD3F46EA96E1C5
2,732,786 UART: [art] PUB.Y = E4AF74AF8FCFA439DE99F0D281D46336C6E4BB7F002905A2B284233DC53CB28C0266E16BDEF66C23D0211B6F3A2AE75D
2,739,724 UART: [art] SIG.R = DA8EF8D05D62E0261D7675C04D17CD7C3FE6D5AD68B43E13BDB195927473264406972F4156D00218F8A0EFD63B40906F
2,746,490 UART: [art] SIG.S = 6DF0CD7F4486C6A8F7DC0DBF0F3051EF10E70420DC885F779197644A57B24741E5FAB8E2C75701A400053924D4F4611B
2,770,055 UART: mbox::rt_entry...
2,770,427 UART: ____ _ _ _ ____ _____
2,771,211 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,011 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,779 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,547 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,315 UART: |_|
2,774,627 UART:
2,892,367 UART: [rt] Runtime listening for mailbox commands...
2,898,701 >>> mbox cmd response data (4360 bytes)
2,898,702 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,929,484 >>> mbox cmd response data (0 bytes)
2,929,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,929,603 UART:
2,929,619 UART: Running Caliptra ROM ...
2,930,027 UART:
2,930,082 UART: [state] CFI Enabled
2,932,868 UART: [state] LifecycleState = Unprovisioned
2,933,523 UART: [state] DebugLocked = No
2,934,123 UART: [state] WD Timer not started. Device not locked for debugging
2,935,289 UART: [kat] SHA2-256
3,740,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,745,064 UART: [kat] ++
3,745,216 UART: [kat] sha1
3,749,430 UART: [kat] SHA2-256
3,751,370 UART: [kat] SHA2-384
3,754,295 UART: [kat] SHA2-512-ACC
3,756,195 UART: [kat] ECC-384
3,765,830 UART: [kat] HMAC-384Kdf
3,770,524 UART: [kat] LMS
4,018,852 UART: [kat] --
4,019,862 UART: [update-reset] ++
5,379,122 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,380,141 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,535,356 >>> mbox cmd response: success
5,535,595 UART: [update-reset] Copying MAN_2 To MAN_1
5,543,609 UART: [update-reset Success] --
5,544,698 UART: [state] Locking Datavault
5,545,632 UART: [state] Locking PCR0, PCR1 and PCR31
5,546,236 UART: [state] Locking ICCM
5,546,726 UART: [exit] Launching FMC @ 0x40000130
5,552,056 UART:
5,552,072 UART: Running Caliptra FMC ...
5,552,480 UART:
5,552,534 UART: [state] CFI Enabled
5,641,339 UART: [art] Extend RT PCRs Done
5,641,767 UART: [art] Lock RT PCRs Done
5,642,996 UART: [art] Populate DV Done
5,650,979 UART: [fht] FMC Alias Private Key: 7
5,652,063 UART: [art] Derive CDI
5,652,343 UART: [art] Store in slot 0x4
5,738,158 UART: [art] Derive Key Pair
5,738,518 UART: [art] Store priv key in slot 0x5
5,751,660 UART: [art] Derive Key Pair - Done
5,766,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,781,959 UART: [art] Erasing AUTHORITY.KEYID = 7
5,782,724 UART: [art] PUB.X = A5AD2E01E24DF0792836B9F63A26E22270C302E14561B74C3083F05D0BA5CB6491D15013A38C9F005B4F674EA23235BD
5,789,463 UART: [art] PUB.Y = DDA94F4CAA7CD3145DB6FFBCC0EA12397EBC6B8E0230A4924F144C6ACFE51DE87ECE26AD3FAA21B2BF5BD7964EE59FFF
5,796,448 UART: [art] SIG.R = 5C8F4C5D9CA581157A44BB6E05B0371108163C6C09431E35EB9F44234662C306848FDD866B82AB960AA8E1647883EFE2
5,803,201 UART: [art] SIG.S = 3BDA88659970521565B758BF7EC16DB4F00F8371B5677F29EAD60FAEF4A2BE61E7935B0644D44B7FEF42C42E3FAD98B6
5,827,496 UART: Caliptra RT
5,827,747 UART: [state] CFI Enabled
6,203,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,205,141 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,235,461 UART: [rt]cmd =0x494e464f, len=4
6,239,155 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,509 ready_for_fw is high
1,059,509 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,214,371 >>> mbox cmd response: success
2,214,371 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,275,406 UART:
2,275,422 UART: Running Caliptra FMC ...
2,275,830 UART:
2,275,884 UART: [state] CFI Enabled
2,286,186 UART: [fht] FMC Alias Private Key: 7
2,403,990 UART: [art] Extend RT PCRs Done
2,404,418 UART: [art] Lock RT PCRs Done
2,405,968 UART: [art] Populate DV Done
2,414,491 UART: [fht] FMC Alias Private Key: 7
2,415,453 UART: [art] Derive CDI
2,415,733 UART: [art] Store in slot 0x4
2,501,252 UART: [art] Derive Key Pair
2,501,612 UART: [art] Store priv key in slot 0x5
2,514,812 UART: [art] Derive Key Pair - Done
2,529,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,545,348 UART: [art] Erasing AUTHORITY.KEYID = 7
2,546,113 UART: [art] PUB.X = F93C38A018B43E83848A8D2F790242A07B94F033B4D799669F6A0E19D2AB3A166393577D0295D174E52A02E2F9DA4A17
2,552,867 UART: [art] PUB.Y = 347A488B054FA763E373658E9F94A2C4923351B7F6E08A95505131FF21F0F256F8C73BE4D6EFBE4E9D353DFD83C5A2D8
2,559,820 UART: [art] SIG.R = 7823D486B99C827BB1D1AE4B0E5A01C2D32CF42BCF5E926941E7E275429C04AFE5818BE584C93E563A9EAF0ED829679A
2,566,588 UART: [art] SIG.S = DC0413AEDC16CA60581324EA6F7B5791D95E00D5CB5511A6C28CE8DF521C22A0B8E442D8E48CA2AA757D1FAD3ACB15E3
2,590,513 UART: mbox::rt_entry...
2,590,885 UART: ____ _ _ _ ____ _____
2,591,669 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,592,469 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,593,237 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,594,005 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,594,773 UART: |_|
2,595,085 UART:
2,713,139 UART: [rt] Runtime listening for mailbox commands...
2,719,473 >>> mbox cmd response data (4360 bytes)
2,719,474 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,750,256 >>> mbox cmd response data (0 bytes)
2,750,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,239,561 >>> mbox cmd response: success
5,253,146 UART:
5,253,162 UART: Running Caliptra FMC ...
5,253,570 UART:
5,253,624 UART: [state] CFI Enabled
5,343,107 UART: [art] Extend RT PCRs Done
5,343,535 UART: [art] Lock RT PCRs Done
5,344,822 UART: [art] Populate DV Done
5,352,765 UART: [fht] FMC Alias Private Key: 7
5,353,801 UART: [art] Derive CDI
5,354,081 UART: [art] Store in slot 0x4
5,439,588 UART: [art] Derive Key Pair
5,439,948 UART: [art] Store priv key in slot 0x5
5,453,042 UART: [art] Derive Key Pair - Done
5,467,809 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,483,026 UART: [art] Erasing AUTHORITY.KEYID = 7
5,483,791 UART: [art] PUB.X = 086A608FD26BB652ABAA6507A3AA8E49B0D38D3C0CF98D4B789903C245339BCAAC39480D2E57CD1254B07B76F5D32C1D
5,490,558 UART: [art] PUB.Y = A409DBC199574A97A9EBA1F65DFEA86D4447751B47E35013A2C4972ED04735823AF0CC51E2DFF471593C2A963A3216FD
5,497,511 UART: [art] SIG.R = DA718E09CC9D2EA5D1CDD39198CABE0E90BAFD83F6E63354868DA7A5F1F6DF92B2196E5FE26A9DC2AAE5FCF02620F84F
5,504,303 UART: [art] SIG.S = B8D062D0070F18DA12B313C644D761CAD4C6143212B624B52ED40A3DD83C1523FBE92286EEF73C46EFCEB0C734691A25
5,527,992 UART: Caliptra RT
5,528,243 UART: [state] CFI Enabled
5,904,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,905,775 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,936,357 UART: [rt]cmd =0x494e464f, len=4
5,939,933 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,849 UART: [state] LifecycleState = Unprovisioned
86,504 UART: [state] DebugLocked = No
87,176 UART: [state] WD Timer not started. Device not locked for debugging
88,427 UART: [kat] SHA2-256
894,077 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,202 UART: [kat] ++
898,354 UART: [kat] sha1
902,698 UART: [kat] SHA2-256
904,638 UART: [kat] SHA2-384
907,373 UART: [kat] SHA2-512-ACC
909,274 UART: [kat] ECC-384
919,235 UART: [kat] HMAC-384Kdf
923,979 UART: [kat] LMS
1,172,307 UART: [kat] --
1,173,356 UART: [cold-reset] ++
1,173,814 UART: [fht] FHT @ 0x50003400
1,176,463 UART: [idev] ++
1,176,631 UART: [idev] CDI.KEYID = 6
1,176,991 UART: [idev] SUBJECT.KEYID = 7
1,177,415 UART: [idev] UDS.KEYID = 0
1,177,760 ready_for_fw is high
1,177,760 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,185,193 UART: [idev] Erasing UDS.KEYID = 0
1,202,096 UART: [idev] Sha1 KeyId Algorithm
1,210,476 UART: [idev] --
1,211,508 UART: [ldev] ++
1,211,676 UART: [ldev] CDI.KEYID = 6
1,212,039 UART: [ldev] SUBJECT.KEYID = 5
1,212,465 UART: [ldev] AUTHORITY.KEYID = 7
1,212,928 UART: [ldev] FE.KEYID = 1
1,218,012 UART: [ldev] Erasing FE.KEYID = 1
1,243,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,024 UART: [ldev] --
1,283,447 UART: [fwproc] Wait for Commands...
1,284,245 UART: [fwproc] Recv command 0x46574c44
1,284,973 UART: [fwproc] Recv'd Img size: 82832 bytes
2,220,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,756 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,926 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,753 >>> mbox cmd response: success
2,364,753 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,365,825 UART: [afmc] ++
2,365,993 UART: [afmc] CDI.KEYID = 6
2,366,355 UART: [afmc] SUBJECT.KEYID = 7
2,366,780 UART: [afmc] AUTHORITY.KEYID = 5
2,402,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,419,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,966 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,675 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,558 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,437,259 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,139 UART: [afmc] --
2,446,259 UART: [cold-reset] --
2,447,213 UART: [state] Locking Datavault
2,448,306 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,910 UART: [state] Locking ICCM
2,449,436 UART: [exit] Launching FMC @ 0x40000130
2,454,766 UART:
2,454,782 UART: Running Caliptra FMC ...
2,455,190 UART:
2,455,333 UART: [state] CFI Enabled
2,466,011 UART: [fht] FMC Alias Private Key: 7
2,585,137 UART: [art] Extend RT PCRs Done
2,585,565 UART: [art] Lock RT PCRs Done
2,587,161 UART: [art] Populate DV Done
2,595,698 UART: [fht] FMC Alias Private Key: 7
2,596,772 UART: [art] Derive CDI
2,597,052 UART: [art] Store in slot 0x4
2,682,607 UART: [art] Derive Key Pair
2,682,967 UART: [art] Store priv key in slot 0x5
2,696,429 UART: [art] Derive Key Pair - Done
2,711,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,727,252 UART: [art] Erasing AUTHORITY.KEYID = 7
2,728,017 UART: [art] PUB.X = 543E63832A9C2CA952F7788911056F6529CBCC5869FA15861F51939CEDF2F5CE615F569F09E28957DB127B255D606594
2,734,775 UART: [art] PUB.Y = B28FA0EF453FFD287EEAE8ECFF82DBE26CF8B02D293B17A20282C5B34E6AC6D681E829B513F3521167BFEB37BAAC3D3C
2,741,748 UART: [art] SIG.R = 0A9D4D4C8D2CBABF97D389F1F250F3809295AD823DE7D6C38EBB4C8A89DE3D25515A398FCF3AC5317502E3705AB56E64
2,748,526 UART: [art] SIG.S = F676C038689C9B8C04CC5A73E91B284A867D702473BB16EDE3F8BEBAB2936507DFBB2E912CF46E33345D0EA4D5526970
2,772,565 UART: mbox::rt_entry...
2,772,937 UART: ____ _ _ _ ____ _____
2,773,721 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,774,521 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,775,289 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,776,057 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,776,825 UART: |_|
2,777,137 UART:
2,895,897 UART: [rt] Runtime listening for mailbox commands...
2,902,231 >>> mbox cmd response data (4360 bytes)
2,902,232 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,933,014 >>> mbox cmd response data (0 bytes)
2,933,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,933,133 UART:
2,933,149 UART: Running Caliptra ROM ...
2,933,557 UART:
2,933,699 UART: [state] CFI Enabled
2,936,545 UART: [state] LifecycleState = Unprovisioned
2,937,200 UART: [state] DebugLocked = No
2,937,832 UART: [state] WD Timer not started. Device not locked for debugging
2,938,948 UART: [kat] SHA2-256
3,744,598 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,748,723 UART: [kat] ++
3,748,875 UART: [kat] sha1
3,753,195 UART: [kat] SHA2-256
3,755,135 UART: [kat] SHA2-384
3,757,802 UART: [kat] SHA2-512-ACC
3,759,702 UART: [kat] ECC-384
3,769,383 UART: [kat] HMAC-384Kdf
3,774,163 UART: [kat] LMS
4,022,491 UART: [kat] --
4,023,461 UART: [update-reset] ++
5,383,339 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,384,516 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,539,731 >>> mbox cmd response: success
5,539,860 UART: [update-reset] Copying MAN_2 To MAN_1
5,547,874 UART: [update-reset Success] --
5,549,037 UART: [state] Locking Datavault
5,550,019 UART: [state] Locking PCR0, PCR1 and PCR31
5,550,623 UART: [state] Locking ICCM
5,551,279 UART: [exit] Launching FMC @ 0x40000130
5,556,609 UART:
5,556,625 UART: Running Caliptra FMC ...
5,557,033 UART:
5,557,176 UART: [state] CFI Enabled
5,646,243 UART: [art] Extend RT PCRs Done
5,646,671 UART: [art] Lock RT PCRs Done
5,648,070 UART: [art] Populate DV Done
5,656,457 UART: [fht] FMC Alias Private Key: 7
5,657,557 UART: [art] Derive CDI
5,657,837 UART: [art] Store in slot 0x4
5,743,914 UART: [art] Derive Key Pair
5,744,274 UART: [art] Store priv key in slot 0x5
5,757,842 UART: [art] Derive Key Pair - Done
5,772,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,788,110 UART: [art] Erasing AUTHORITY.KEYID = 7
5,788,875 UART: [art] PUB.X = 7EE29270DA11FA47A5BA2D518E4C200C20EFE86566431A96E9FA99A8A354B82F342C7594CD3E4717A674C5673FE74C12
5,795,646 UART: [art] PUB.Y = 7C5F37A87EDD93FDC2716D7ECC463F196F1A05C24D057BB3CD754EEF566729225156FA64E6B3C9837AC71A4C3D9BBD8D
5,802,606 UART: [art] SIG.R = 404F007E5AF24DA88A4E84C6F20550C19A8ED0A5CE43747A0D81386E53DAD8C65B13D8DB3790695A0F9882478B3C02FB
5,809,348 UART: [art] SIG.S = 8CAF4198F880563573978492B1D4B10D98F9A01DECF2409B62B4CBDF6FEFCB5708BF54FA9E514213829D34879FDC29BE
5,833,342 UART: Caliptra RT
5,833,685 UART: [state] CFI Enabled
6,212,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,214,564 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,245,212 UART: [rt]cmd =0x494e464f, len=4
6,248,894 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,844 ready_for_fw is high
1,060,844 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,396 >>> mbox cmd response: success
2,217,396 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,279,813 UART:
2,279,829 UART: Running Caliptra FMC ...
2,280,237 UART:
2,280,380 UART: [state] CFI Enabled
2,290,878 UART: [fht] FMC Alias Private Key: 7
2,410,224 UART: [art] Extend RT PCRs Done
2,410,652 UART: [art] Lock RT PCRs Done
2,412,384 UART: [art] Populate DV Done
2,420,633 UART: [fht] FMC Alias Private Key: 7
2,421,715 UART: [art] Derive CDI
2,421,995 UART: [art] Store in slot 0x4
2,507,954 UART: [art] Derive Key Pair
2,508,314 UART: [art] Store priv key in slot 0x5
2,522,022 UART: [art] Derive Key Pair - Done
2,536,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,552,325 UART: [art] Erasing AUTHORITY.KEYID = 7
2,553,090 UART: [art] PUB.X = 56F5CC43AFFAD9F6B129F9522F4C2D6B993658E029F6D5BA9CBEC5334820F6EF2376B84342DC449D2744662CBB2D94BF
2,559,872 UART: [art] PUB.Y = 7D760F35D3E56652B58111F6A477A86019F93FC79F54E9CEF09D22E0F959D82E2A6C636A6DF7DE15A07BE60DCA1DBEBF
2,566,832 UART: [art] SIG.R = FF17A49FAB3836AAD759333643A512A5F5C4355B3ABEBF7196F0CB5F512399C7A6425A707A21A5E16276C68CFA7386A6
2,573,608 UART: [art] SIG.S = 05B196FDD28B4F09A2F65DE0F2EC911D180E2DAFDC8D308742C43C45ED8B3ADCA70D8281F07BCB0260B5165840720629
2,598,496 UART: mbox::rt_entry...
2,598,868 UART: ____ _ _ _ ____ _____
2,599,652 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,600,452 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,601,220 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,601,988 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,602,756 UART: |_|
2,603,068 UART:
2,721,758 UART: [rt] Runtime listening for mailbox commands...
2,728,092 >>> mbox cmd response data (4360 bytes)
2,728,093 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,758,875 >>> mbox cmd response data (0 bytes)
2,758,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,248,059 >>> mbox cmd response: success
5,261,668 UART:
5,261,684 UART: Running Caliptra FMC ...
5,262,092 UART:
5,262,235 UART: [state] CFI Enabled
5,351,062 UART: [art] Extend RT PCRs Done
5,351,490 UART: [art] Lock RT PCRs Done
5,352,731 UART: [art] Populate DV Done
5,360,896 UART: [fht] FMC Alias Private Key: 7
5,361,936 UART: [art] Derive CDI
5,362,216 UART: [art] Store in slot 0x4
5,448,085 UART: [art] Derive Key Pair
5,448,445 UART: [art] Store priv key in slot 0x5
5,461,607 UART: [art] Derive Key Pair - Done
5,476,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,492,422 UART: [art] Erasing AUTHORITY.KEYID = 7
5,493,187 UART: [art] PUB.X = 95B9C3B4E4043128DC8290EE4F95A8A5C16ACB113B366587476E2178B8F0862AE04419AD57BE99BE678AF7131914A0CF
5,499,956 UART: [art] PUB.Y = BF27DC2CABEADCFE326F2841DDC5C486866F7288A9A7E0721473957E3F43BC9338E67744686534E42CEDB9F17AD6DCFB
5,506,922 UART: [art] SIG.R = 89FD8AE41BD90C4EB94C57D2E86A6BDB20C9494700B7168085D434877C4F92FBE1E42D51404C97A34A52CA1902BADE47
5,513,672 UART: [art] SIG.S = 4822D1D8729EE45C6428DBBD70E4C00C761235707629DA139750C18CE0B95C3DC30BC01B3F68456B07D16F063AC512DB
5,537,476 UART: Caliptra RT
5,537,819 UART: [state] CFI Enabled
5,915,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,916,956 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,947,672 UART: [rt]cmd =0x494e464f, len=4
5,951,310 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,012 UART:
192,363 UART: Running Caliptra ROM ...
193,457 UART:
193,601 UART: [state] CFI Enabled
266,111 UART: [state] LifecycleState = Unprovisioned
268,104 UART: [state] DebugLocked = No
269,344 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,804 UART: [kat] SHA2-256
444,519 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,052 UART: [kat] ++
455,508 UART: [kat] sha1
467,022 UART: [kat] SHA2-256
469,685 UART: [kat] SHA2-384
475,674 UART: [kat] SHA2-512-ACC
478,043 UART: [kat] ECC-384
2,767,328 UART: [kat] HMAC-384Kdf
2,800,223 UART: [kat] LMS
3,990,502 UART: [kat] --
3,993,813 UART: [cold-reset] ++
3,994,822 UART: [fht] Storing FHT @ 0x50003400
4,005,964 UART: [idev] ++
4,006,531 UART: [idev] CDI.KEYID = 6
4,007,488 UART: [idev] SUBJECT.KEYID = 7
4,008,756 UART: [idev] UDS.KEYID = 0
4,009,763 ready_for_fw is high
4,009,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,553 UART: [idev] Erasing UDS.KEYID = 0
7,347,455 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,805 UART: [idev] --
7,372,883 UART: [ldev] ++
7,373,456 UART: [ldev] CDI.KEYID = 6
7,374,475 UART: [ldev] SUBJECT.KEYID = 5
7,375,637 UART: [ldev] AUTHORITY.KEYID = 7
7,376,924 UART: [ldev] FE.KEYID = 1
7,421,761 UART: [ldev] Erasing FE.KEYID = 1
10,751,213 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,489 UART: [ldev] --
13,115,642 UART: [fwproc] Waiting for Commands...
13,117,247 UART: [fwproc] Received command 0x46574c44
13,119,430 UART: [fwproc] Received Image of size 118548 bytes
17,225,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,480 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,377,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,706,736 >>> mbox cmd response: success
17,710,156 UART: [afmc] ++
17,710,780 UART: [afmc] CDI.KEYID = 6
17,711,695 UART: [afmc] SUBJECT.KEYID = 7
17,712,908 UART: [afmc] AUTHORITY.KEYID = 5
21,074,479 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,716 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,974 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,442 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,138 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,600 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,217 UART: [afmc] --
23,442,274 UART: [cold-reset] --
23,446,080 UART: [state] Locking Datavault
23,452,954 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,663 UART: [state] Locking ICCM
23,457,411 UART: [exit] Launching FMC @ 0x40000130
23,465,811 UART:
23,466,047 UART: Running Caliptra FMC ...
23,467,151 UART:
23,467,313 UART: [state] CFI Enabled
23,533,496 UART: [fht] FMC Alias Private Key: 7
25,873,079 UART: [art] Extend RT PCRs Done
25,874,303 UART: [art] Lock RT PCRs Done
25,876,030 UART: [art] Populate DV Done
25,881,452 UART: [fht] FMC Alias Private Key: 7
25,883,046 UART: [art] Derive CDI
25,883,866 UART: [art] Store in slot 0x4
25,942,209 UART: [art] Derive Key Pair
25,943,252 UART: [art] Store priv key in slot 0x5
29,236,598 UART: [art] Derive Key Pair - Done
29,249,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,637 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,143 UART: [art] PUB.X = FE878368957D9418691ACD7055AF12560A2FA0FBCCCA36C3A3690E9BAEB3B2C32F6E5B7DA1F4A3F4652E6ACE48EB85B0
31,547,473 UART: [art] PUB.Y = 422D596D7596EC89D20EE2C7F499A74920F24FE28505E85EFD38DCFFF646FEACCAA077E0FCC76E119EEEA7AD01D5559F
31,554,720 UART: [art] SIG.R = 7DAFA141B04FACD9B7FAC2C4C7C905DE41BFFF5C82F1E2432644ECA1B999AD8AB15ACA98B1E3050AA2A445BA1DBAC436
31,562,132 UART: [art] SIG.S = 7EB1F6E5380977E7713E5CF516ECE730CBD42E6B05EF99E70415E907295C5FD1B842C8AB8F431842A5FAAE6B040F01E9
32,867,589 UART: Caliptra RT
32,868,292 UART: [state] CFI Enabled
33,044,574 UART: [rt] RT listening for mailbox commands...
33,046,876 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,076,660 UART: [rt]cmd =0x50435252, len=8
33,078,750 >>> mbox cmd response data (8 bytes)
35,148,904 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,255,489 UART:
35,255,878 UART: Running Caliptra ROM ...
35,256,959 UART:
35,257,122 UART: [state] CFI Enabled
35,315,627 UART: [state] LifecycleState = Unprovisioned
35,317,584 UART: [state] DebugLocked = No
35,320,022 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,325,093 UART: [kat] SHA2-256
35,494,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,505,255 UART: [kat] ++
35,505,715 UART: [kat] sha1
35,516,226 UART: [kat] SHA2-256
35,518,920 UART: [kat] SHA2-384
35,525,070 UART: [kat] SHA2-512-ACC
35,527,478 UART: [kat] ECC-384
37,817,519 UART: [kat] HMAC-384Kdf
37,848,109 UART: [kat] LMS
39,038,427 UART: [kat] --
39,042,751 UART: [update-reset] ++
42,800,275 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,804,659 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,077,374 >>> mbox cmd response: success
43,077,782 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,079,160 UART: [update-reset] Copying MAN_2 To MAN_1
43,101,585 UART: [update-reset Success] --
43,105,759 UART: [state] Locking Datavault
43,108,808 UART: [state] Locking PCR0, PCR1 and PCR31
43,110,565 UART: [state] Locking ICCM
43,111,856 UART: [exit] Launching FMC @ 0x40000130
43,120,309 UART:
43,120,546 UART: Running Caliptra FMC ...
43,121,648 UART:
43,121,808 UART: [state] CFI Enabled
43,214,480 UART: [art] Extend RT PCRs Done
43,215,657 UART: [art] Lock RT PCRs Done
43,216,900 UART: [art] Populate DV Done
43,222,634 UART: [fht] FMC Alias Private Key: 7
43,224,278 UART: [art] Derive CDI
43,225,140 UART: [art] Store in slot 0x4
43,283,345 UART: [art] Derive Key Pair
43,284,401 UART: [art] Store priv key in slot 0x5
46,577,998 UART: [art] Derive Key Pair - Done
46,590,674 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,878,676 UART: [art] Erasing AUTHORITY.KEYID = 7
48,880,188 UART: [art] PUB.X = 993A6F4E7FBBF40D4C95D32490AABB607A877740A2B53E3C8F7ADE9EC36CBC145461B430D513340F05727A5B0865FB47
48,887,452 UART: [art] PUB.Y = 1BAFAD10FE5C347C437F4DB98FC64180E22350A6DD35B6DD197FD19F8DFD7E0C4C455E5F4DDA17DD14E0C9078367AA76
48,894,766 UART: [art] SIG.R = 51F99EE61314D6AA8282E28FE1B0F7BE6F48487474253244A28AB302E488CB8084ACC7F917A3E4228F68508A0BD2582A
48,902,122 UART: [art] SIG.S = 6C1673590B1DCE57383E8F9DD8F02AA6A2540095E7CEF305A9ABDD1338BAC28C71F0D71E9CFC7EDB1FC2D5F4D25E4181
50,206,988 UART: mbox::rt_entry...
50,207,953 UART: ____ _ _ _ ____ _____
50,210,134 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,212,164 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,214,100 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,216,035 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,217,967 UART: |_|
50,218,775 UART:
50,590,493 UART: [rt] Runtime listening for mailbox commands...
50,592,502 >>> mbox cmd response data (128 bytes)
52,657,805 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,762,924 UART:
52,763,285 UART: Running Caliptra ROM ...
52,764,418 UART:
52,764,596 UART: [state] CFI Enabled
52,822,953 UART: [state] LifecycleState = Unprovisioned
52,824,882 UART: [state] DebugLocked = No
52,826,271 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,831,444 UART: [kat] SHA2-256
53,001,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,011,639 UART: [kat] ++
53,012,129 UART: [kat] sha1
53,022,363 UART: [kat] SHA2-256
53,025,021 UART: [kat] SHA2-384
53,030,099 UART: [kat] SHA2-512-ACC
53,032,454 UART: [kat] ECC-384
55,328,681 UART: [kat] HMAC-384Kdf
55,359,178 UART: [kat] LMS
56,549,530 UART: [kat] --
56,551,535 UART: [update-reset] ++
60,302,685 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,307,221 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,579,993 >>> mbox cmd response: success
60,580,361 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,580,699 UART: [update-reset] Copying MAN_2 To MAN_1
60,603,136 UART: [update-reset Success] --
60,606,089 UART: [state] Locking Datavault
60,608,000 UART: [state] Locking PCR0, PCR1 and PCR31
60,609,908 UART: [state] Locking ICCM
60,610,826 UART: [exit] Launching FMC @ 0x40000130
60,619,241 UART:
60,619,480 UART: Running Caliptra FMC ...
60,620,584 UART:
60,620,741 UART: [state] CFI Enabled
60,724,969 UART: [art] Extend RT PCRs Done
60,726,147 UART: [art] Lock RT PCRs Done
60,727,707 UART: [art] Populate DV Done
60,733,115 UART: [fht] FMC Alias Private Key: 7
60,734,810 UART: [art] Derive CDI
60,735,624 UART: [art] Store in slot 0x4
60,794,360 UART: [art] Derive Key Pair
60,795,391 UART: [art] Store priv key in slot 0x5
64,087,882 UART: [art] Derive Key Pair - Done
64,101,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,389,425 UART: [art] Erasing AUTHORITY.KEYID = 7
66,390,934 UART: [art] PUB.X = 3900D62337A10D91AD6C1D7A138C21C1E5B6B4D92BF14F76FDFA7387DECF46414A3E4147B4186D4171E50B88A5258541
66,398,142 UART: [art] PUB.Y = 40A65108A0BD7079AEFC1C4A47C6FE29BA067B68A0A370BCB3D6095E1E57DD847DC907B4DB3F0F5A8F416A24AAF4AB71
66,405,448 UART: [art] SIG.R = 24FEFCD0AA67E7661151ED00AE2262D19D1584359A815F57CB25BACCB34D0B5692990737F236A8E7F7A4D616ADF22DF9
66,412,806 UART: [art] SIG.S = 3D2CADDB0D19D227A75CF9BED10BC0D34ED3FFE64BC2BCA308A473967B86EBC37702DD2BC9CAE5438060EB70BC183C6A
67,717,408 UART: mbox::rt_entry...
67,718,374 UART: ____ _ _ _ ____ _____
67,720,361 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,722,370 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,724,306 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,726,233 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,728,159 UART: |_|
67,728,993 UART:
68,101,885 UART: [rt] Runtime listening for mailbox commands...
68,103,917 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,783,913 ready_for_fw is high
3,784,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,967,116 >>> mbox cmd response: success
23,659,930 UART:
23,660,970 UART: Running Caliptra FMC ...
23,662,108 UART:
23,662,264 UART: [state] CFI Enabled
23,720,021 UART: [fht] FMC Alias Private Key: 7
26,059,966 UART: [art] Extend RT PCRs Done
26,061,219 UART: [art] Lock RT PCRs Done
26,062,561 UART: [art] Populate DV Done
26,068,278 UART: [fht] FMC Alias Private Key: 7
26,069,932 UART: [art] Derive CDI
26,070,672 UART: [art] Store in slot 0x4
26,128,052 UART: [art] Derive Key Pair
26,129,099 UART: [art] Store priv key in slot 0x5
29,421,688 UART: [art] Derive Key Pair - Done
29,434,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,844 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,365 UART: [art] PUB.X = 6B85DF736999DA96C1FAF567AC98861D4EF16D6FF2E6D1F97A7437DCC3D12EAB18E83EE5901DFA2DD31DCBCB245C8FF5
31,731,658 UART: [art] PUB.Y = E9125085ED4127E518F7FF7B57D841FD2C4E734EA4D7AF54758A0B252A28A6371FAB3A0C7F5B35C42BCEC2960EAC065D
31,738,930 UART: [art] SIG.R = 9D56AE6D11A6ABBA52D56A084C28FD99A56406BD972A613031C908BBF123D8A2596AF860C064FBE632430C8C16BBBF17
31,746,333 UART: [art] SIG.S = F30C91B42954DC910C8E7ADE00D2CAF9333F3F90D3D91DEDAD95079552D2C8699BC46F3D733C55AA50675A5ABCD5A994
33,051,732 UART: Caliptra RT
33,052,449 UART: [state] CFI Enabled
33,248,066 UART: [rt] RT listening for mailbox commands...
33,250,507 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,280,470 UART: [rt]cmd =0x50435252, len=8
33,282,544 >>> mbox cmd response data (8 bytes)
35,351,457 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,386,791 >>> mbox cmd response: success
43,387,419 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,420,277 UART:
43,420,560 UART: Running Caliptra FMC ...
43,421,674 UART:
43,421,838 UART: [state] CFI Enabled
43,524,517 UART: [art] Extend RT PCRs Done
43,525,701 UART: [art] Lock RT PCRs Done
43,527,288 UART: [art] Populate DV Done
43,532,864 UART: [fht] FMC Alias Private Key: 7
43,534,399 UART: [art] Derive CDI
43,535,162 UART: [art] Store in slot 0x4
43,593,045 UART: [art] Derive Key Pair
43,594,083 UART: [art] Store priv key in slot 0x5
46,886,489 UART: [art] Derive Key Pair - Done
46,899,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,187,391 UART: [art] Erasing AUTHORITY.KEYID = 7
49,188,911 UART: [art] PUB.X = AD29F069AD7EC1FB12784B01B45B4EC6684600495AE96457D8176E83EE08D0A6D36A30ADD8E94028A61F20CE0F84FDA9
49,196,140 UART: [art] PUB.Y = 400B56B4F4D4AC8E2D4C94A6A7D6E02E9C2AC443591E4B54958EA759F1E1BDEFCD87D98FEC285900CB7BB7FA69AC3E55
49,203,386 UART: [art] SIG.R = A68A2DFC9A7A8F89A5E09AB91766329A6DDBDC7B6370DB9AE80D59E699DF549914F7E9FDD8AAB8315E7CC53AA113A426
49,210,829 UART: [art] SIG.S = 94179784B9BB2E413E8DEB603E77C7100721206490574C2C3385EAA8AD00EA340B3D4ED311439371F1FAC0ABD34A4EA0
50,515,861 UART: mbox::rt_entry...
50,516,816 UART: ____ _ _ _ ____ _____
50,518,746 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,520,752 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,522,611 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,524,536 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,526,416 UART: |_|
50,527,245 UART:
50,902,463 UART: [rt] Runtime listening for mailbox commands...
50,904,510 >>> mbox cmd response data (128 bytes)
52,972,223 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
61,013,244 >>> mbox cmd response: success
61,013,856 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
61,048,191 UART:
61,048,484 UART: Running Caliptra FMC ...
61,049,609 UART:
61,049,772 UART: [state] CFI Enabled
61,137,423 UART: [art] Extend RT PCRs Done
61,138,609 UART: [art] Lock RT PCRs Done
61,139,744 UART: [art] Populate DV Done
61,145,497 UART: [fht] FMC Alias Private Key: 7
61,147,053 UART: [art] Derive CDI
61,147,794 UART: [art] Store in slot 0x4
61,206,265 UART: [art] Derive Key Pair
61,207,266 UART: [art] Store priv key in slot 0x5
64,499,937 UART: [art] Derive Key Pair - Done
64,512,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,801,396 UART: [art] Erasing AUTHORITY.KEYID = 7
66,802,906 UART: [art] PUB.X = B15628E64C6D7FCF0CB171C1C187083CF369B080FE92FAF6CA9C590D79686D3465D2805C46046151D4CF0026C276C98A
66,810,162 UART: [art] PUB.Y = AAAB370E0F10340CB93EF5BC1526149B1719D8ACB2C78D34D0135BF76A073EB2E6D71FBBDA4804CA72F534A163EBDF6D
66,817,405 UART: [art] SIG.R = B9AE34082900A55364684377CD3D0A8EA05F143800E082286F55777BE124BA58BB4FC93F4D688C047878A8CA68ED0F5F
66,824,787 UART: [art] SIG.S = 33A8E23F7D923C646077CECB06756E6C9F27F73E8E6DBBCBF1F08AB64F2C69BE2CB3B4A8FB37436B17BBDC56410342E2
68,129,146 UART: mbox::rt_entry...
68,130,111 UART: ____ _ _ _ ____ _____
68,132,038 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,134,052 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,135,909 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,137,831 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,139,713 UART: |_|
68,140,543 UART:
68,517,063 UART: [rt] Runtime listening for mailbox commands...
68,519,093 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,448 UART:
192,877 UART: Running Caliptra ROM ...
194,015 UART:
603,680 UART: [state] CFI Enabled
621,000 UART: [state] LifecycleState = Unprovisioned
622,884 UART: [state] DebugLocked = No
625,117 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,647 UART: [kat] SHA2-256
799,385 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,905 UART: [kat] ++
810,420 UART: [kat] sha1
821,286 UART: [kat] SHA2-256
824,011 UART: [kat] SHA2-384
830,919 UART: [kat] SHA2-512-ACC
833,284 UART: [kat] ECC-384
3,117,421 UART: [kat] HMAC-384Kdf
3,128,673 UART: [kat] LMS
4,318,765 UART: [kat] --
4,322,131 UART: [cold-reset] ++
4,323,415 UART: [fht] Storing FHT @ 0x50003400
4,334,323 UART: [idev] ++
4,334,882 UART: [idev] CDI.KEYID = 6
4,335,909 UART: [idev] SUBJECT.KEYID = 7
4,337,083 UART: [idev] UDS.KEYID = 0
4,338,204 ready_for_fw is high
4,338,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,422 UART: [idev] Erasing UDS.KEYID = 0
7,630,200 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,755 UART: [idev] --
7,654,982 UART: [ldev] ++
7,655,544 UART: [ldev] CDI.KEYID = 6
7,656,474 UART: [ldev] SUBJECT.KEYID = 5
7,657,730 UART: [ldev] AUTHORITY.KEYID = 7
7,658,920 UART: [ldev] FE.KEYID = 1
7,669,537 UART: [ldev] Erasing FE.KEYID = 1
10,955,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,586 UART: [ldev] --
13,316,520 UART: [fwproc] Waiting for Commands...
13,318,720 UART: [fwproc] Received command 0x46574c44
13,320,955 UART: [fwproc] Received Image of size 118548 bytes
17,429,124 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,984 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,078 >>> mbox cmd response: success
17,908,612 UART: [afmc] ++
17,909,203 UART: [afmc] CDI.KEYID = 6
17,910,112 UART: [afmc] SUBJECT.KEYID = 7
17,911,379 UART: [afmc] AUTHORITY.KEYID = 5
21,228,414 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,523,570 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,828 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,540,267 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,986 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,569,404 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,639 UART: [afmc] --
23,594,628 UART: [cold-reset] --
23,599,893 UART: [state] Locking Datavault
23,605,836 UART: [state] Locking PCR0, PCR1 and PCR31
23,607,582 UART: [state] Locking ICCM
23,609,021 UART: [exit] Launching FMC @ 0x40000130
23,617,410 UART:
23,617,646 UART: Running Caliptra FMC ...
23,618,739 UART:
23,618,891 UART: [state] CFI Enabled
23,627,257 UART: [fht] FMC Alias Private Key: 7
25,967,121 UART: [art] Extend RT PCRs Done
25,968,339 UART: [art] Lock RT PCRs Done
25,969,956 UART: [art] Populate DV Done
25,975,544 UART: [fht] FMC Alias Private Key: 7
25,977,186 UART: [art] Derive CDI
25,977,994 UART: [art] Store in slot 0x4
26,020,214 UART: [art] Derive Key Pair
26,021,252 UART: [art] Store priv key in slot 0x5
29,263,240 UART: [art] Derive Key Pair - Done
29,276,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,257 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,757 UART: [art] PUB.X = 13E00ACCFECDD29D9E73FD8F843F539493C676B59A58F887E3AA98BC2A7425D68CC19545C26AFD5302DAF1D4BFD2057B
31,566,020 UART: [art] PUB.Y = FA53D9DEF4ED23966390BFBED1094AC3031A5ABC7B9379C65640B3905AB866C5BF938D757E9A7FFAC62795F2C94229E3
31,573,267 UART: [art] SIG.R = 259E59F5D2AB0C7BCD222F47E1A7EEC373B899BCD6591E88D9F38FA7B8F677805B03BEFC0B722422052AFB77F8207258
31,580,664 UART: [art] SIG.S = 391D141D7C2EA356A947F4E9900C6468BE48CF2B1D528D000BAA3C3408704A55D744238BABA2231B5EAEB0ED048A7451
32,885,766 UART: Caliptra RT
32,886,480 UART: [state] CFI Enabled
33,019,527 UART: [rt] RT listening for mailbox commands...
33,021,872 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,051,800 UART: [rt]cmd =0x50435252, len=8
33,053,968 >>> mbox cmd response data (8 bytes)
35,122,244 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,228,040 UART:
35,228,397 UART: Running Caliptra ROM ...
35,229,523 UART:
35,229,690 UART: [state] CFI Enabled
35,245,737 UART: [state] LifecycleState = Unprovisioned
35,247,613 UART: [state] DebugLocked = No
35,249,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,254,952 UART: [kat] SHA2-256
35,424,662 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,435,238 UART: [kat] ++
35,435,695 UART: [kat] sha1
35,446,881 UART: [kat] SHA2-256
35,449,578 UART: [kat] SHA2-384
35,455,070 UART: [kat] SHA2-512-ACC
35,457,408 UART: [kat] ECC-384
37,742,810 UART: [kat] HMAC-384Kdf
37,754,549 UART: [kat] LMS
38,944,629 UART: [kat] --
38,951,017 UART: [update-reset] ++
42,710,650 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,714,090 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,986,831 >>> mbox cmd response: success
42,987,205 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
42,988,358 UART: [update-reset] Copying MAN_2 To MAN_1
43,010,742 UART: [update-reset Success] --
43,014,184 UART: [state] Locking Datavault
43,018,245 UART: [state] Locking PCR0, PCR1 and PCR31
43,019,993 UART: [state] Locking ICCM
43,022,058 UART: [exit] Launching FMC @ 0x40000130
43,030,490 UART:
43,030,742 UART: Running Caliptra FMC ...
43,031,846 UART:
43,032,001 UART: [state] CFI Enabled
43,076,394 UART: [art] Extend RT PCRs Done
43,077,535 UART: [art] Lock RT PCRs Done
43,078,707 UART: [art] Populate DV Done
43,084,049 UART: [fht] FMC Alias Private Key: 7
43,085,691 UART: [art] Derive CDI
43,086,545 UART: [art] Store in slot 0x4
43,129,142 UART: [art] Derive Key Pair
43,130,176 UART: [art] Store priv key in slot 0x5
46,371,957 UART: [art] Derive Key Pair - Done
46,384,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,664,865 UART: [art] Erasing AUTHORITY.KEYID = 7
48,666,370 UART: [art] PUB.X = 81682D9EFDAF8522B249FF69F35E304DB8E87E77CBFFD4E9CD9D295558AA41B7046FDF57340FB7EA1BD155A6644C568A
48,673,686 UART: [art] PUB.Y = BEF98685AC4EBDE82B3339CA42DD450A71B9A1D62359B26CF7C90A999DDFEB9FEC2CF564973CB2428AEF52E9AC7FBDE8
48,680,976 UART: [art] SIG.R = 94F79342E0159FACE38F61F74FCAE270F206DB3B1226FCE06858B46A6BA7AA61B39D96D3CC659A5BD376897151A7AF8F
48,688,412 UART: [art] SIG.S = 3E7944612CEED4AAD591D61A1616311EFF4761CBC94B9FFE4C68737E7436C15A24480F19043A9091F730014054724EA5
49,994,270 UART: mbox::rt_entry...
49,995,226 UART: ____ _ _ _ ____ _____
49,997,206 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,999,209 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,001,133 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,003,061 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,004,987 UART: |_|
50,005,796 UART:
50,380,960 UART: [rt] Runtime listening for mailbox commands...
50,382,992 >>> mbox cmd response data (128 bytes)
52,447,416 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,553,025 UART:
52,553,423 UART: Running Caliptra ROM ...
52,554,520 UART:
52,554,670 UART: [state] CFI Enabled
52,568,291 UART: [state] LifecycleState = Unprovisioned
52,570,224 UART: [state] DebugLocked = No
52,571,705 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,577,301 UART: [kat] SHA2-256
52,747,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,757,567 UART: [kat] ++
52,758,121 UART: [kat] sha1
52,769,550 UART: [kat] SHA2-256
52,772,291 UART: [kat] SHA2-384
52,779,509 UART: [kat] SHA2-512-ACC
52,781,901 UART: [kat] ECC-384
55,068,321 UART: [kat] HMAC-384Kdf
55,081,026 UART: [kat] LMS
56,271,128 UART: [kat] --
56,275,443 UART: [update-reset] ++
60,025,897 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,030,098 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,302,874 >>> mbox cmd response: success
60,303,244 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,304,667 UART: [update-reset] Copying MAN_2 To MAN_1
60,327,135 UART: [update-reset Success] --
60,332,014 UART: [state] Locking Datavault
60,334,697 UART: [state] Locking PCR0, PCR1 and PCR31
60,336,399 UART: [state] Locking ICCM
60,338,845 UART: [exit] Launching FMC @ 0x40000130
60,347,283 UART:
60,347,509 UART: Running Caliptra FMC ...
60,348,599 UART:
60,348,753 UART: [state] CFI Enabled
60,393,563 UART: [art] Extend RT PCRs Done
60,394,738 UART: [art] Lock RT PCRs Done
60,396,183 UART: [art] Populate DV Done
60,401,474 UART: [fht] FMC Alias Private Key: 7
60,403,109 UART: [art] Derive CDI
60,403,911 UART: [art] Store in slot 0x4
60,446,391 UART: [art] Derive Key Pair
60,447,376 UART: [art] Store priv key in slot 0x5
63,689,492 UART: [art] Derive Key Pair - Done
63,702,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,983,064 UART: [art] Erasing AUTHORITY.KEYID = 7
65,984,698 UART: [art] PUB.X = 9BBE5CBBF6238F0C0D2A76FD71182E3B36B6F0117443C30F42030552EFAC9071526F427A357AC706E103EB9FC8940026
65,991,847 UART: [art] PUB.Y = 3E554C377A7FD6ADE6801024C27CB8D71D8F570BEAD16167B972B9DE985ED47DC9D7AE8E92EBBA41B31253B5DA98434B
65,999,143 UART: [art] SIG.R = B95AE3AC8DD2ACC5F8527B5140EAA5D28E743187C6919CCBADCFDD2051A50D50BBEF7AEAA2C38B4DBCC9FD84E7BE84D6
66,006,586 UART: [art] SIG.S = 13EEE6391BCD7B681276E223249FAE76B7230EC8C0B9EEA3E2A90D14629D304DD9CE1C09CD1DBC45BF0DA32934D2B2D5
67,311,197 UART: mbox::rt_entry...
67,312,172 UART: ____ _ _ _ ____ _____
67,314,156 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,316,153 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,318,075 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,320,001 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,321,931 UART: |_|
67,322,733 UART:
67,688,513 UART: [rt] Runtime listening for mailbox commands...
67,690,522 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,129,622 ready_for_fw is high
4,130,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,880 >>> mbox cmd response: success
23,808,214 UART:
23,808,613 UART: Running Caliptra FMC ...
23,809,724 UART:
23,809,873 UART: [state] CFI Enabled
23,817,882 UART: [fht] FMC Alias Private Key: 7
26,158,126 UART: [art] Extend RT PCRs Done
26,159,513 UART: [art] Lock RT PCRs Done
26,161,065 UART: [art] Populate DV Done
26,166,181 UART: [fht] FMC Alias Private Key: 7
26,167,721 UART: [art] Derive CDI
26,168,486 UART: [art] Store in slot 0x4
26,211,404 UART: [art] Derive Key Pair
26,212,404 UART: [art] Store priv key in slot 0x5
29,454,491 UART: [art] Derive Key Pair - Done
29,467,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,627 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,140 UART: [art] PUB.X = 74BF173283081491CD03E271A245C25C3874869BB2F1A0ADEDCCF6F80F80E942896432688E1688E75D146F3B22AAA727
31,756,383 UART: [art] PUB.Y = 9F4A4FE0BEA1E4DD255D919FBFB4DF668754DC0551E4354B68B550846DF924F4EDCCEE7B441474F031A412C25D6D8FF3
31,763,707 UART: [art] SIG.R = 3FD0A54F5276AE318ECAF6CF84DBB82D1134A6C54AB3B353177BF37CE4336AB4BAD08EFF5FF0B319209FE132D3600574
31,771,063 UART: [art] SIG.S = EFC014732722F1968B90971DFC061FE87D3567D839FB6CC7349BFC83C4C78120819AAE08B3341BD2ABD9BAF0AF91D737
33,076,877 UART: Caliptra RT
33,077,584 UART: [state] CFI Enabled
33,210,984 UART: [rt] RT listening for mailbox commands...
33,213,357 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,243,254 UART: [rt]cmd =0x50435252, len=8
33,245,275 >>> mbox cmd response data (8 bytes)
35,311,086 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,290,699 >>> mbox cmd response: success
43,291,430 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,328,145 UART:
43,328,414 UART: Running Caliptra FMC ...
43,329,520 UART:
43,329,675 UART: [state] CFI Enabled
43,373,825 UART: [art] Extend RT PCRs Done
43,375,031 UART: [art] Lock RT PCRs Done
43,376,706 UART: [art] Populate DV Done
43,382,221 UART: [fht] FMC Alias Private Key: 7
43,383,965 UART: [art] Derive CDI
43,384,770 UART: [art] Store in slot 0x4
43,426,705 UART: [art] Derive Key Pair
43,427,699 UART: [art] Store priv key in slot 0x5
46,669,580 UART: [art] Derive Key Pair - Done
46,682,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,963,531 UART: [art] Erasing AUTHORITY.KEYID = 7
48,965,050 UART: [art] PUB.X = 45399BB6C578CF6E98F9B5648CC5AAC1857DC9186F27A7FC1CA0CBD57087B4182234489A3EA640F340232936BCEBE6CF
48,972,296 UART: [art] PUB.Y = A6210A672AA461CE5445692196E35EE6BE10B779239B90DD119F9B61ACDA896AB00110994E611183605486B9D71D9D2E
48,979,584 UART: [art] SIG.R = ECB8EAC0DE1ED16B11E343C17DC3425939E271024635C866F546263AF18B4D44A015D1694AF5E492B9275028D988A736
48,986,914 UART: [art] SIG.S = 4B8AE8467F1B68B432862A494256564B8B42623CA028708F8916F9F2AF24AF7DF9FD3D6FBE4314E213C848C84C0A167C
50,291,851 UART: mbox::rt_entry...
50,292,803 UART: ____ _ _ _ ____ _____
50,294,749 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,296,748 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,298,673 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,300,596 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,302,517 UART: |_|
50,303,501 UART:
50,672,928 UART: [rt] Runtime listening for mailbox commands...
50,675,014 >>> mbox cmd response data (128 bytes)
52,736,421 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,713,658 >>> mbox cmd response: success
60,714,222 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,747,574 UART:
60,747,916 UART: Running Caliptra FMC ...
60,748,955 UART:
60,749,103 UART: [state] CFI Enabled
60,793,125 UART: [art] Extend RT PCRs Done
60,794,274 UART: [art] Lock RT PCRs Done
60,795,829 UART: [art] Populate DV Done
60,801,453 UART: [fht] FMC Alias Private Key: 7
60,803,086 UART: [art] Derive CDI
60,803,916 UART: [art] Store in slot 0x4
60,846,726 UART: [art] Derive Key Pair
60,847,728 UART: [art] Store priv key in slot 0x5
64,089,750 UART: [art] Derive Key Pair - Done
64,102,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,382,988 UART: [art] Erasing AUTHORITY.KEYID = 7
66,384,505 UART: [art] PUB.X = 8EE51F3CDDAC1966923151D23F06CEC15762F94BD065D1A96704304A8989B901142157071D7311294F60754DC8FD74C7
66,391,696 UART: [art] PUB.Y = 0BEF47DC4FF33C98A759A9DB52205868BD46A00E31B7D2926666F6EF147172936FE469F5B4ECA46F8B651A347C688CBE
66,398,977 UART: [art] SIG.R = 7A9D907BEF5F4ACB9187E4C4A93C7ADC015D41D0E71FA078374F81D95484AFD1EB0A96543E90B1D9630151F57CB88909
66,406,386 UART: [art] SIG.S = 76AC36DB5D180F71D703FEFD57166044DD9F1B98EED21A9BC021D2864AE67DC1925628044C5428D3A8CD1DB2EE621FE8
67,711,490 UART: mbox::rt_entry...
67,712,461 UART: ____ _ _ _ ____ _____
67,714,446 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,716,448 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,718,376 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,720,300 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,722,150 UART: |_|
67,723,005 UART:
68,094,423 UART: [rt] Runtime listening for mailbox commands...
68,096,433 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,215 UART:
192,552 UART: Running Caliptra ROM ...
193,741 UART:
193,895 UART: [state] CFI Enabled
265,712 UART: [state] LifecycleState = Unprovisioned
267,707 UART: [state] DebugLocked = No
269,947 UART: [state] WD Timer not started. Device not locked for debugging
274,195 UART: [kat] SHA2-256
453,855 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,665 UART: [kat] ++
465,197 UART: [kat] sha1
474,826 UART: [kat] SHA2-256
477,522 UART: [kat] SHA2-384
483,514 UART: [kat] SHA2-512-ACC
485,884 UART: [kat] ECC-384
2,951,137 UART: [kat] HMAC-384Kdf
2,974,477 UART: [kat] LMS
3,451,009 UART: [kat] --
3,455,436 UART: [cold-reset] ++
3,456,511 UART: [fht] FHT @ 0x50003400
3,467,412 UART: [idev] ++
3,468,041 UART: [idev] CDI.KEYID = 6
3,468,959 UART: [idev] SUBJECT.KEYID = 7
3,470,200 UART: [idev] UDS.KEYID = 0
3,471,141 ready_for_fw is high
3,471,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,459 UART: [idev] Erasing UDS.KEYID = 0
5,989,722 UART: [idev] Sha1 KeyId Algorithm
6,014,238 UART: [idev] --
6,019,361 UART: [ldev] ++
6,019,930 UART: [ldev] CDI.KEYID = 6
6,020,893 UART: [ldev] SUBJECT.KEYID = 5
6,022,107 UART: [ldev] AUTHORITY.KEYID = 7
6,023,336 UART: [ldev] FE.KEYID = 1
6,061,952 UART: [ldev] Erasing FE.KEYID = 1
8,567,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,610 UART: [ldev] --
10,378,716 UART: [fwproc] Wait for Commands...
10,381,020 UART: [fwproc] Recv command 0x46574c44
10,383,056 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,658 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,725 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,845 >>> mbox cmd response: success
14,349,505 UART: [afmc] ++
14,350,114 UART: [afmc] CDI.KEYID = 6
14,351,028 UART: [afmc] SUBJECT.KEYID = 7
14,352,244 UART: [afmc] AUTHORITY.KEYID = 5
16,901,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,645,371 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,647,596 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,663,375 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,679,443 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,694,991 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,720,420 UART: [afmc] --
18,723,925 UART: [cold-reset] --
18,726,492 UART: [state] Locking Datavault
18,732,923 UART: [state] Locking PCR0, PCR1 and PCR31
18,734,673 UART: [state] Locking ICCM
18,736,818 UART: [exit] Launching FMC @ 0x40000130
18,745,264 UART:
18,745,503 UART: Running Caliptra FMC ...
18,746,598 UART:
18,746,753 UART: [state] CFI Enabled
18,801,002 UART: [fht] FMC Alias Private Key: 7
20,588,779 UART: [art] Extend RT PCRs Done
20,589,991 UART: [art] Lock RT PCRs Done
20,591,613 UART: [art] Populate DV Done
20,597,194 UART: [fht] FMC Alias Private Key: 7
20,598,885 UART: [art] Derive CDI
20,599,694 UART: [art] Store in slot 0x4
20,654,943 UART: [art] Derive Key Pair
20,655,973 UART: [art] Store priv key in slot 0x5
23,118,693 UART: [art] Derive Key Pair - Done
23,131,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,844,836 UART: [art] Erasing AUTHORITY.KEYID = 7
24,846,340 UART: [art] PUB.X = 65460E5D8343A46E2E6718EF2A4A5C63C84D8C77BE7355658ED8C5237574D31971BAA2F601FE316A70B56310E10E3340
24,853,642 UART: [art] PUB.Y = 97A08CB5A33912F1448F00F5AF2E2F8F3496B692E607A02EAB3120B1BAB3413D0E0EB578781D11C38A76BCC7DADBE6C3
24,860,870 UART: [art] SIG.R = CC77197C1429271C88D216685E245FA3CB63A20B96FB986CB57BAF9386900420BE6E19167102F7FFB5CEBE0AAEB46CD6
24,868,314 UART: [art] SIG.S = 9BA281C4F4272BD566490A04BB4704D4B6734FEDC9B14B49DB870D5445CE428CB1C617A3F7D4CB04DDDFCFF9E42D9844
25,846,686 UART: Caliptra RT
25,847,383 UART: [state] CFI Enabled
26,028,285 UART: [rt] RT listening for mailbox commands...
26,030,551 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,060,406 UART: [rt]cmd =0x50435252, len=8
26,062,273 >>> mbox cmd response data (8 bytes)
28,127,869 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,234,017 UART:
28,234,384 UART: Running Caliptra ROM ...
28,235,515 UART:
28,235,682 UART: [state] CFI Enabled
28,295,800 UART: [state] LifecycleState = Unprovisioned
28,297,692 UART: [state] DebugLocked = No
28,299,727 UART: [state] WD Timer not started. Device not locked for debugging
28,303,681 UART: [kat] SHA2-256
28,483,325 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,494,114 UART: [kat] ++
28,494,655 UART: [kat] sha1
28,505,167 UART: [kat] SHA2-256
28,507,851 UART: [kat] SHA2-384
28,513,993 UART: [kat] SHA2-512-ACC
28,516,345 UART: [kat] ECC-384
30,962,525 UART: [kat] HMAC-384Kdf
30,985,223 UART: [kat] LMS
31,461,676 UART: [kat] --
31,466,369 UART: [update-reset] ++
34,532,315 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,536,556 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,809,162 >>> mbox cmd response: success
34,809,540 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,809,824 UART: [update-reset] Copying MAN_2 To MAN_1
34,846,727 UART: [update-reset Success] --
34,850,976 UART: [state] Locking Datavault
34,853,252 UART: [state] Locking PCR0, PCR1 and PCR31
34,854,948 UART: [state] Locking ICCM
34,856,826 UART: [exit] Launching FMC @ 0x40000130
34,865,166 UART:
34,865,398 UART: Running Caliptra FMC ...
34,866,496 UART:
34,866,647 UART: [state] CFI Enabled
34,964,750 UART: [art] Extend RT PCRs Done
34,965,943 UART: [art] Lock RT PCRs Done
34,967,403 UART: [art] Populate DV Done
34,972,812 UART: [fht] FMC Alias Private Key: 7
34,974,456 UART: [art] Derive CDI
34,975,270 UART: [art] Store in slot 0x4
35,033,750 UART: [art] Derive Key Pair
35,034,795 UART: [art] Store priv key in slot 0x5
37,497,655 UART: [art] Derive Key Pair - Done
37,510,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,223,750 UART: [art] Erasing AUTHORITY.KEYID = 7
39,225,254 UART: [art] PUB.X = FAF03D5CAB3DBF889FCDD9501C41DABEF7A9060EF676FCA8C19BA96D6BB3B607C817830EA89DB3E8641F9BD01BB30B65
39,232,571 UART: [art] PUB.Y = D3607FC6AF40223CAE8BA4293E592184D5763EABD8CB76B6F609EB4453A225BF1A6F787A9BCF2FB46DD5DADC435432CF
39,239,861 UART: [art] SIG.R = 7297DC98EFB6B0D8890F791B04C47B7F1EBA956D641E8693F4C1B3EC067E837B9F395FB2044DD1C6ADAF0AF18AADFBCA
39,247,249 UART: [art] SIG.S = ED3DD0737FF0B97788FB2B212B7B0848B401883AC7993C761B8D5623D6AD3696267CD48A55FE177693C43BE79DECBCE4
40,225,561 UART: mbox::rt_entry...
40,226,515 UART: ____ _ _ _ ____ _____
40,228,685 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,230,702 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,232,632 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,234,560 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,236,491 UART: |_|
40,237,324 UART:
40,610,506 UART: [rt] Runtime listening for mailbox commands...
40,612,559 >>> mbox cmd response data (128 bytes)
42,674,339 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,779,421 UART:
42,779,764 UART: Running Caliptra ROM ...
42,780,860 UART:
42,781,024 UART: [state] CFI Enabled
42,846,498 UART: [state] LifecycleState = Unprovisioned
42,848,437 UART: [state] DebugLocked = No
42,849,937 UART: [state] WD Timer not started. Device not locked for debugging
42,853,405 UART: [kat] SHA2-256
43,033,096 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
43,043,868 UART: [kat] ++
43,044,434 UART: [kat] sha1
43,056,032 UART: [kat] SHA2-256
43,058,718 UART: [kat] SHA2-384
43,066,050 UART: [kat] SHA2-512-ACC
43,068,411 UART: [kat] ECC-384
45,532,628 UART: [kat] HMAC-384Kdf
45,555,397 UART: [kat] LMS
46,031,837 UART: [kat] --
46,036,314 UART: [update-reset] ++
49,097,769 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,100,929 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,373,578 >>> mbox cmd response: success
49,373,952 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,375,092 UART: [update-reset] Copying MAN_2 To MAN_1
49,412,165 UART: [update-reset Success] --
49,416,117 UART: [state] Locking Datavault
49,419,433 UART: [state] Locking PCR0, PCR1 and PCR31
49,421,182 UART: [state] Locking ICCM
49,423,006 UART: [exit] Launching FMC @ 0x40000130
49,431,416 UART:
49,431,694 UART: Running Caliptra FMC ...
49,432,807 UART:
49,432,967 UART: [state] CFI Enabled
49,533,582 UART: [art] Extend RT PCRs Done
49,534,756 UART: [art] Lock RT PCRs Done
49,536,098 UART: [art] Populate DV Done
49,541,512 UART: [fht] FMC Alias Private Key: 7
49,543,258 UART: [art] Derive CDI
49,544,069 UART: [art] Store in slot 0x4
49,603,316 UART: [art] Derive Key Pair
49,604,358 UART: [art] Store priv key in slot 0x5
52,066,922 UART: [art] Derive Key Pair - Done
52,080,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,793,313 UART: [art] Erasing AUTHORITY.KEYID = 7
53,794,820 UART: [art] PUB.X = 05B057299F4F7985C15D85D0EF7B71091EC0C3A91DF3290CCAE16D0BB15B4451DC72CE36D7FF2890FF63B64A9B10E43F
53,802,129 UART: [art] PUB.Y = C404FA2689BAD8AB59E54FDD1B4BDF4B0DEEF987622043A198BF78D643946F46FF45BA0A2B7A86D75E610A8E2FDBF0EF
53,809,417 UART: [art] SIG.R = 8842F9FC06129FEA765BB9677B57540396040D10455047E894CCEDB32552B9B339164EFDB4B269F0DCBE5784C6BE8ECC
53,816,813 UART: [art] SIG.S = 5D050B4CA2DFF503E2B8636566484D92BD0811DC2EB735FA6826A40C6D38D5BD12FBEA733ECDDBF98BCBF406D789A997
54,795,321 UART: mbox::rt_entry...
54,796,275 UART: ____ _ _ _ ____ _____
54,798,254 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,800,255 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,802,183 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,804,111 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,806,034 UART: |_|
54,806,866 UART:
55,174,648 UART: [rt] Runtime listening for mailbox commands...
55,176,679 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,462,955 ready_for_fw is high
3,463,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,227,108 >>> mbox cmd response: success
18,513,455 UART:
18,513,835 UART: Running Caliptra FMC ...
18,514,948 UART:
18,515,097 UART: [state] CFI Enabled
18,580,799 UART: [fht] FMC Alias Private Key: 7
20,347,163 UART: [art] Extend RT PCRs Done
20,348,384 UART: [art] Lock RT PCRs Done
20,349,955 UART: [art] Populate DV Done
20,355,669 UART: [fht] FMC Alias Private Key: 7
20,357,381 UART: [art] Derive CDI
20,358,193 UART: [art] Store in slot 0x4
20,413,282 UART: [art] Derive Key Pair
20,414,323 UART: [art] Store priv key in slot 0x5
22,877,144 UART: [art] Derive Key Pair - Done
22,890,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,269 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,889 UART: [art] PUB.X = 65FF9B45796F043B255C21BA8C23437DFD2F24BA4F964731BF1A7D692D8E3D8120B59D20EEA9E3BBE5C4AAF494BAF97A
24,611,043 UART: [art] PUB.Y = 8909F92AAD1882F049678252D4B171ADD9E513B2B302476C86990B9DF726522E151FF898A583D44EE0F122B62083E4F4
24,618,290 UART: [art] SIG.R = ED1DDA139FA0784FF902102766C773B46BA88E6EBC00D389D0CBF7D77C02A3DD3209AC7260B51E4C41AE79F4AE6DA0FD
24,625,682 UART: [art] SIG.S = 941D1027A2A96784354AF43668BF148CC95962424DC8EC3339213AA875781A50E7FA03775DB3556C7A11FF914C759AC8
25,604,238 UART: Caliptra RT
25,604,937 UART: [state] CFI Enabled
25,784,681 UART: [rt] RT listening for mailbox commands...
25,786,939 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,817,027 UART: [rt]cmd =0x50435252, len=8
25,819,028 >>> mbox cmd response data (8 bytes)
27,875,979 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,578,215 >>> mbox cmd response: success
34,578,726 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,612,618 UART:
34,612,941 UART: Running Caliptra FMC ...
34,614,016 UART:
34,614,172 UART: [state] CFI Enabled
34,717,912 UART: [art] Extend RT PCRs Done
34,719,100 UART: [art] Lock RT PCRs Done
34,720,429 UART: [art] Populate DV Done
34,726,294 UART: [fht] FMC Alias Private Key: 7
34,727,935 UART: [art] Derive CDI
34,728,746 UART: [art] Store in slot 0x4
34,786,884 UART: [art] Derive Key Pair
34,787,936 UART: [art] Store priv key in slot 0x5
37,250,277 UART: [art] Derive Key Pair - Done
37,263,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,976,092 UART: [art] Erasing AUTHORITY.KEYID = 7
38,977,594 UART: [art] PUB.X = E9FEA0A4369F6D43041C8F5342EF26A392D5ED83DD2D0383CAD4071C21040B4AC87A59C8B8CAF93AA8E4237E2165F2F4
38,984,841 UART: [art] PUB.Y = 670EDB9442B7BE6975555FC973762608435D7A31880787B6CE4F1933518817FC0C6660180EAF136B27B1592C3ABAE263
38,992,126 UART: [art] SIG.R = 6E4F6B1F29B7E73D79C934F53228D0AC56C4F9E5784BAB205BE1B135EED3600CA5F060C6DF2E4A1A007074A2DD855662
38,999,465 UART: [art] SIG.S = A7FBED9E0E86D94C54DBBF6694052B93B29055445E4C5BC387825A553C01FB9D1CBCF797094E3B0E1C316D17A95652B9
39,978,365 UART: mbox::rt_entry...
39,979,329 UART: ____ _ _ _ ____ _____
39,981,228 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,983,225 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,985,095 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,987,021 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,988,873 UART: |_|
39,989,748 UART:
40,359,847 UART: [rt] Runtime listening for mailbox commands...
40,361,889 >>> mbox cmd response data (128 bytes)
42,416,807 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
49,097,910 >>> mbox cmd response: success
49,098,476 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,131,780 UART:
49,132,070 UART: Running Caliptra FMC ...
49,133,187 UART:
49,133,363 UART: [state] CFI Enabled
49,222,709 UART: [art] Extend RT PCRs Done
49,223,887 UART: [art] Lock RT PCRs Done
49,225,289 UART: [art] Populate DV Done
49,230,588 UART: [fht] FMC Alias Private Key: 7
49,232,293 UART: [art] Derive CDI
49,233,107 UART: [art] Store in slot 0x4
49,291,913 UART: [art] Derive Key Pair
49,292,948 UART: [art] Store priv key in slot 0x5
51,755,735 UART: [art] Derive Key Pair - Done
51,768,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,481,482 UART: [art] Erasing AUTHORITY.KEYID = 7
53,482,988 UART: [art] PUB.X = 1A3DBE907F8CD75609B0E59A7A5983D8BB5163914F0949B0DA6C6EFB0A73DD6264F7475E73D36B5F1A6B17657F6B917D
53,490,272 UART: [art] PUB.Y = D4D400607E805D2A9EF584AB348F9200F453D005AD1AE31D228C58B0BD230B21D2234084042BC358D8A14DAAF4A1B72C
53,497,465 UART: [art] SIG.R = 0AB532A26E847EFBC4AAA62D642CE43E50A2728E073E9B7FE617AFD6FF7B25C0E3042F8C3ACE7056A1604D745EE193EC
53,504,913 UART: [art] SIG.S = B35A13571C308871C0575D174D9E2C3F5870645213F0F524905775E798324F4BAAB38A65572698D3068DA3733E9AFB4F
54,483,524 UART: mbox::rt_entry...
54,484,464 UART: ____ _ _ _ ____ _____
54,486,388 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,488,388 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,490,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,492,162 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,494,041 UART: |_|
54,494,868 UART:
54,864,092 UART: [rt] Runtime listening for mailbox commands...
54,866,115 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,363 UART:
192,734 UART: Running Caliptra ROM ...
193,822 UART:
603,348 UART: [state] CFI Enabled
619,083 UART: [state] LifecycleState = Unprovisioned
620,961 UART: [state] DebugLocked = No
623,342 UART: [state] WD Timer not started. Device not locked for debugging
627,391 UART: [kat] SHA2-256
807,026 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,837 UART: [kat] ++
818,310 UART: [kat] sha1
828,619 UART: [kat] SHA2-256
831,272 UART: [kat] SHA2-384
837,687 UART: [kat] SHA2-512-ACC
840,054 UART: [kat] ECC-384
3,280,739 UART: [kat] HMAC-384Kdf
3,292,040 UART: [kat] LMS
3,768,540 UART: [kat] --
3,772,466 UART: [cold-reset] ++
3,773,834 UART: [fht] FHT @ 0x50003400
3,783,536 UART: [idev] ++
3,784,097 UART: [idev] CDI.KEYID = 6
3,785,134 UART: [idev] SUBJECT.KEYID = 7
3,786,315 UART: [idev] UDS.KEYID = 0
3,787,245 ready_for_fw is high
3,787,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,289 UART: [idev] Erasing UDS.KEYID = 0
6,260,294 UART: [idev] Sha1 KeyId Algorithm
6,284,005 UART: [idev] --
6,289,950 UART: [ldev] ++
6,290,519 UART: [ldev] CDI.KEYID = 6
6,291,502 UART: [ldev] SUBJECT.KEYID = 5
6,292,664 UART: [ldev] AUTHORITY.KEYID = 7
6,293,898 UART: [ldev] FE.KEYID = 1
6,305,572 UART: [ldev] Erasing FE.KEYID = 1
8,782,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,092 UART: [ldev] --
10,577,930 UART: [fwproc] Wait for Commands...
10,580,726 UART: [fwproc] Recv command 0x46574c44
10,582,764 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,140,887 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,213,937 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,541,944 >>> mbox cmd response: success
14,545,311 UART: [afmc] ++
14,545,923 UART: [afmc] CDI.KEYID = 6
14,546,837 UART: [afmc] SUBJECT.KEYID = 7
14,548,058 UART: [afmc] AUTHORITY.KEYID = 5
17,053,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,776,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,778,380 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,794,245 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,810,285 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,825,873 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,850,775 UART: [afmc] --
18,853,944 UART: [cold-reset] --
18,857,535 UART: [state] Locking Datavault
18,863,107 UART: [state] Locking PCR0, PCR1 and PCR31
18,864,865 UART: [state] Locking ICCM
18,867,091 UART: [exit] Launching FMC @ 0x40000130
18,875,487 UART:
18,875,737 UART: Running Caliptra FMC ...
18,876,843 UART:
18,877,008 UART: [state] CFI Enabled
18,885,279 UART: [fht] FMC Alias Private Key: 7
20,652,339 UART: [art] Extend RT PCRs Done
20,653,542 UART: [art] Lock RT PCRs Done
20,655,192 UART: [art] Populate DV Done
20,660,441 UART: [fht] FMC Alias Private Key: 7
20,662,142 UART: [art] Derive CDI
20,662,960 UART: [art] Store in slot 0x4
20,705,337 UART: [art] Derive Key Pair
20,706,341 UART: [art] Store priv key in slot 0x5
23,133,381 UART: [art] Derive Key Pair - Done
23,146,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,059 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,546 UART: [art] PUB.X = C530028D807C6C9721234293A6C674AC808E5B35476D14E29F981A818716CABFE899EAA0EF45F63B685EB9AAA7D4E6E6
24,861,838 UART: [art] PUB.Y = C989054F679DA4E2C040B043C25E747C127CF8EBCC8135E67BB6637BDE7DA8A9439E16DB982ECB56240503513F64F9E9
24,869,135 UART: [art] SIG.R = E873BF849461E112DE18921E65C7E0AEDFA1B84D20352938DAAD6F0CCBF8E3AC42CAA81AF451BE8019C1AAF4CAAA174A
24,876,535 UART: [art] SIG.S = 4F7377C81080D4DB30A6C30524133F742680306560CBBF2FCDBAFBFB15E2F2B06E82E7A83FE9B5544AF942BA2F7CECBB
25,855,022 UART: Caliptra RT
25,855,737 UART: [state] CFI Enabled
25,988,534 UART: [rt] RT listening for mailbox commands...
25,990,745 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,020,538 UART: [rt]cmd =0x50435252, len=8
26,022,728 >>> mbox cmd response data (8 bytes)
28,077,351 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,183,199 UART:
28,183,602 UART: Running Caliptra ROM ...
28,184,665 UART:
28,184,819 UART: [state] CFI Enabled
28,199,315 UART: [state] LifecycleState = Unprovisioned
28,201,210 UART: [state] DebugLocked = No
28,202,459 UART: [state] WD Timer not started. Device not locked for debugging
28,206,633 UART: [kat] SHA2-256
28,386,337 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,397,116 UART: [kat] ++
28,397,636 UART: [kat] sha1
28,408,896 UART: [kat] SHA2-256
28,411,592 UART: [kat] SHA2-384
28,418,723 UART: [kat] SHA2-512-ACC
28,421,068 UART: [kat] ECC-384
30,862,962 UART: [kat] HMAC-384Kdf
30,876,829 UART: [kat] LMS
31,353,302 UART: [kat] --
31,357,797 UART: [update-reset] ++
34,415,252 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,419,447 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,692,026 >>> mbox cmd response: success
34,692,442 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,693,866 UART: [update-reset] Copying MAN_2 To MAN_1
34,731,001 UART: [update-reset Success] --
34,735,222 UART: [state] Locking Datavault
34,738,913 UART: [state] Locking PCR0, PCR1 and PCR31
34,740,616 UART: [state] Locking ICCM
34,742,796 UART: [exit] Launching FMC @ 0x40000130
34,751,140 UART:
34,751,379 UART: Running Caliptra FMC ...
34,752,486 UART:
34,752,666 UART: [state] CFI Enabled
34,797,060 UART: [art] Extend RT PCRs Done
34,798,246 UART: [art] Lock RT PCRs Done
34,799,868 UART: [art] Populate DV Done
34,805,171 UART: [fht] FMC Alias Private Key: 7
34,806,653 UART: [art] Derive CDI
34,807,418 UART: [art] Store in slot 0x4
34,850,494 UART: [art] Derive Key Pair
34,851,496 UART: [art] Store priv key in slot 0x5
37,278,379 UART: [art] Derive Key Pair - Done
37,291,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,997,733 UART: [art] Erasing AUTHORITY.KEYID = 7
38,999,231 UART: [art] PUB.X = 62796B336810E193F8069793C9E50E7AB186FA619798A39873D7488439D15603BB37330169802987A0E712E56BD30277
39,006,487 UART: [art] PUB.Y = 605C3135DFFD941A9827601130DF5EC3DA1F720157E40370494EB9F57FCED07B20AB7E7F00CF7EA87F791223E7EAA128
39,013,778 UART: [art] SIG.R = 0CA9724E79FD50796E0BB0EA7ED639409895D4A69936E4E4FD427F7B253AF548237AFA8D6AAD6D85671E4957A8C16619
39,021,117 UART: [art] SIG.S = 0A90B9CF8F782BEEAF98154C7237146FC361B0F556BE9818BFFC450268CB1D43E99FC67D674E8ACD92EBD60489DC7BB7
39,999,402 UART: mbox::rt_entry...
40,000,370 UART: ____ _ _ _ ____ _____
40,002,361 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,004,372 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,006,306 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,008,248 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,010,183 UART: |_|
40,011,023 UART:
40,381,261 UART: [rt] Runtime listening for mailbox commands...
40,383,261 >>> mbox cmd response data (128 bytes)
42,434,456 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,539,513 UART:
42,539,891 UART: Running Caliptra ROM ...
42,541,030 UART:
42,541,219 UART: [state] CFI Enabled
42,555,341 UART: [state] LifecycleState = Unprovisioned
42,557,271 UART: [state] DebugLocked = No
42,559,848 UART: [state] WD Timer not started. Device not locked for debugging
42,563,809 UART: [kat] SHA2-256
42,743,532 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
42,754,317 UART: [kat] ++
42,754,818 UART: [kat] sha1
42,764,682 UART: [kat] SHA2-256
42,767,370 UART: [kat] SHA2-384
42,772,156 UART: [kat] SHA2-512-ACC
42,774,512 UART: [kat] ECC-384
45,216,555 UART: [kat] HMAC-384Kdf
45,229,386 UART: [kat] LMS
45,705,867 UART: [kat] --
45,710,723 UART: [update-reset] ++
48,770,961 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,774,550 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,047,183 >>> mbox cmd response: success
49,047,568 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,048,830 UART: [update-reset] Copying MAN_2 To MAN_1
49,085,958 UART: [update-reset Success] --
49,089,652 UART: [state] Locking Datavault
49,092,960 UART: [state] Locking PCR0, PCR1 and PCR31
49,094,715 UART: [state] Locking ICCM
49,095,760 UART: [exit] Launching FMC @ 0x40000130
49,104,156 UART:
49,104,388 UART: Running Caliptra FMC ...
49,105,414 UART:
49,105,559 UART: [state] CFI Enabled
49,150,516 UART: [art] Extend RT PCRs Done
49,151,701 UART: [art] Lock RT PCRs Done
49,152,916 UART: [art] Populate DV Done
49,158,436 UART: [fht] FMC Alias Private Key: 7
49,160,025 UART: [art] Derive CDI
49,160,768 UART: [art] Store in slot 0x4
49,203,359 UART: [art] Derive Key Pair
49,204,396 UART: [art] Store priv key in slot 0x5
51,631,511 UART: [art] Derive Key Pair - Done
51,644,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,351,002 UART: [art] Erasing AUTHORITY.KEYID = 7
53,352,528 UART: [art] PUB.X = F5CA6CC3505DBFE43BB9F52DAC10229E8191EC1DCE238AD56C2C925E4B2D176459AE5D73ADB673D7208D8D179D089E7D
53,359,832 UART: [art] PUB.Y = EA3A2A67091EC12CD4907E0E24FE09B03F4987B123C45DE6A62A9C75B795598249E761654DA10B544D1FCCE0B5DB7990
53,367,067 UART: [art] SIG.R = A3EB3B080ED78935AA7100C8F7B06BB2F3A444609A1E59AA71E39A67E9E269FBE9C3094275C52422A2AC0252958B9EC7
53,374,463 UART: [art] SIG.S = 8FB672AD23E697E4F76B27BC74607E28BAC0C0210508F3E9282AA7807D50AFB2F7B31B892A2BAAD7CC402DBE71A18D50
54,353,040 UART: mbox::rt_entry...
54,354,023 UART: ____ _ _ _ ____ _____
54,355,957 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,357,966 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,359,897 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,361,825 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,363,754 UART: |_|
54,364,589 UART:
54,735,977 UART: [rt] Runtime listening for mailbox commands...
54,737,997 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
3,778,601 ready_for_fw is high
3,779,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,043 >>> mbox cmd response: success
18,697,775 UART:
18,698,157 UART: Running Caliptra FMC ...
18,699,288 UART:
18,699,450 UART: [state] CFI Enabled
18,707,287 UART: [fht] FMC Alias Private Key: 7
20,473,428 UART: [art] Extend RT PCRs Done
20,474,653 UART: [art] Lock RT PCRs Done
20,476,116 UART: [art] Populate DV Done
20,481,567 UART: [fht] FMC Alias Private Key: 7
20,483,270 UART: [art] Derive CDI
20,484,090 UART: [art] Store in slot 0x4
20,527,182 UART: [art] Derive Key Pair
20,528,185 UART: [art] Store priv key in slot 0x5
22,954,598 UART: [art] Derive Key Pair - Done
22,967,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,140 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,636 UART: [art] PUB.X = 9DC72A4910F4AAA9B94EE9853A8E15A160B0A42B7FA10E7044B9AC303E00EBB6BA0F3BED6534995EE7CA800597CB4664
24,682,886 UART: [art] PUB.Y = 017BE02CBBAACC7910008FAC625FAA66C2A498B1160E3EE30F5BD8AE4A051F4425788BE6B4E77CB949C00C6BDDA7F88D
24,690,163 UART: [art] SIG.R = 2F26253039D8BBA7419AF15CCD482D41E6BB80A42CC8DEEA2761C80107C36E1059D416757711E670BB30EA42193E90F0
24,697,562 UART: [art] SIG.S = 77C309BBB75CA87B04A4AA9DD8D9585EFD0C2DFAD461482D0219E3BC234C3F2B8E4470B15E22D53A58D517CD89FC933B
25,675,922 UART: Caliptra RT
25,676,636 UART: [state] CFI Enabled
25,809,357 UART: [rt] RT listening for mailbox commands...
25,811,619 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,841,816 UART: [rt]cmd =0x50435252, len=8
25,843,870 >>> mbox cmd response data (8 bytes)
27,910,367 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,519,319 >>> mbox cmd response: success
34,519,868 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,552,692 UART:
34,553,007 UART: Running Caliptra FMC ...
34,554,051 UART:
34,554,206 UART: [state] CFI Enabled
34,598,662 UART: [art] Extend RT PCRs Done
34,599,814 UART: [art] Lock RT PCRs Done
34,601,155 UART: [art] Populate DV Done
34,606,539 UART: [fht] FMC Alias Private Key: 7
34,608,024 UART: [art] Derive CDI
34,608,764 UART: [art] Store in slot 0x4
34,652,012 UART: [art] Derive Key Pair
34,653,058 UART: [art] Store priv key in slot 0x5
37,079,725 UART: [art] Derive Key Pair - Done
37,092,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,799,199 UART: [art] Erasing AUTHORITY.KEYID = 7
38,800,705 UART: [art] PUB.X = 503253E119BC7996E49100BA778927E9A5185535779A27C7DAED87347EA31671BB508F0C46F1815487223C5791B55C25
38,807,914 UART: [art] PUB.Y = 5B73ECBAA097975E4B4265FED6F7F3A5BA98307C894057D1913376F372DF715E1A6C07B4D372CC0D02BC615FC2BA964E
38,815,205 UART: [art] SIG.R = 7336CCFD6413BA859291CC8B393061C84D541BA9E0E0EFDC3994EC5B0B9E7F5FC3F1E738E16D0E42A4B9BA179C407CF1
38,822,599 UART: [art] SIG.S = 36D079BAAA3663BD5408B92645F153CA59F5CEF7F102A3D1E9C71A369589234A4C3CCEB6E8D420CD620D399B3DDD469B
39,800,990 UART: mbox::rt_entry...
39,801,937 UART: ____ _ _ _ ____ _____
39,803,914 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,805,921 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,807,874 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,809,811 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,811,742 UART: |_|
39,812,582 UART:
40,183,786 UART: [rt] Runtime listening for mailbox commands...
40,185,842 >>> mbox cmd response data (128 bytes)
42,236,256 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
48,839,635 >>> mbox cmd response: success
48,840,098 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,874,324 UART:
48,874,640 UART: Running Caliptra FMC ...
48,875,767 UART:
48,875,949 UART: [state] CFI Enabled
48,920,130 UART: [art] Extend RT PCRs Done
48,921,284 UART: [art] Lock RT PCRs Done
48,923,011 UART: [art] Populate DV Done
48,928,475 UART: [fht] FMC Alias Private Key: 7
48,930,014 UART: [art] Derive CDI
48,930,834 UART: [art] Store in slot 0x4
48,973,540 UART: [art] Derive Key Pair
48,974,580 UART: [art] Store priv key in slot 0x5
51,401,098 UART: [art] Derive Key Pair - Done
51,414,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,120,830 UART: [art] Erasing AUTHORITY.KEYID = 7
53,122,331 UART: [art] PUB.X = A9F6C804595690DC0A6C8FB784C179B3483A24F1B3115C0CFB324A4FC22ACEE11CAFBDE56B2552CD4C075DFC2131C6CB
53,129,645 UART: [art] PUB.Y = 44CEF5B150AC2EF96BF7B907B02CA214A8BD0269138B8C35B06DA2634C0D4FD05C50F91B92A66CFB1C3736373AA5C627
53,136,885 UART: [art] SIG.R = F2C33265ABBDB7BB414F0F7E5244776F0E7713BC42624129E275C66175E67B3C68A9BE04ECBE19957E26B3E1A129429E
53,144,285 UART: [art] SIG.S = 29649DCD4926D72B8F5DD71BF7162E8311E9B280D0063B3209B650D9029AD59566BA30CD07E8D20B78C5F46A8C08DA0E
54,122,426 UART: mbox::rt_entry...
54,123,391 UART: ____ _ _ _ ____ _____
54,125,372 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,127,376 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,129,306 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,131,236 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,133,167 UART: |_|
54,133,977 UART:
54,498,562 UART: [rt] Runtime listening for mailbox commands...
54,500,568 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,239 UART:
192,602 UART: Running Caliptra ROM ...
193,777 UART:
193,927 UART: [state] CFI Enabled
262,292 UART: [state] LifecycleState = Unprovisioned
264,637 UART: [state] DebugLocked = No
266,455 UART: [state] WD Timer not started. Device not locked for debugging
271,830 UART: [kat] SHA2-256
461,727 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,473 UART: [kat] ++
472,951 UART: [kat] sha1
483,553 UART: [kat] SHA2-256
486,562 UART: [kat] SHA2-384
493,045 UART: [kat] SHA2-512-ACC
495,697 UART: [kat] ECC-384
2,946,418 UART: [kat] HMAC-384Kdf
2,971,811 UART: [kat] LMS
3,503,618 UART: [kat] --
3,506,788 UART: [cold-reset] ++
3,508,084 UART: [fht] FHT @ 0x50003400
3,519,565 UART: [idev] ++
3,520,192 UART: [idev] CDI.KEYID = 6
3,521,141 UART: [idev] SUBJECT.KEYID = 7
3,522,382 UART: [idev] UDS.KEYID = 0
3,523,281 ready_for_fw is high
3,523,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,614 UART: [idev] Erasing UDS.KEYID = 0
6,029,761 UART: [idev] Sha1 KeyId Algorithm
6,051,642 UART: [idev] --
6,056,069 UART: [ldev] ++
6,056,744 UART: [ldev] CDI.KEYID = 6
6,057,723 UART: [ldev] SUBJECT.KEYID = 5
6,058,882 UART: [ldev] AUTHORITY.KEYID = 7
6,060,059 UART: [ldev] FE.KEYID = 1
6,101,456 UART: [ldev] Erasing FE.KEYID = 1
8,608,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,297 UART: [ldev] --
10,418,532 UART: [fwproc] Wait for Commands...
10,421,266 UART: [fwproc] Recv command 0x46574c44
10,423,595 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,228 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,843 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,568 >>> mbox cmd response: success
14,681,310 UART: [afmc] ++
14,682,019 UART: [afmc] CDI.KEYID = 6
14,683,211 UART: [afmc] SUBJECT.KEYID = 7
14,684,705 UART: [afmc] AUTHORITY.KEYID = 5
17,216,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,152 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,219 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,383 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,259 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,892 UART: [afmc] --
19,012,612 UART: [cold-reset] --
19,016,046 UART: [state] Locking Datavault
19,021,632 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,832 UART: [state] Locking ICCM
19,026,262 UART: [exit] Launching FMC @ 0x40000130
19,034,887 UART:
19,035,121 UART: Running Caliptra FMC ...
19,036,221 UART:
19,036,383 UART: [state] CFI Enabled
19,097,766 UART: [fht] FMC Alias Private Key: 7
20,864,280 UART: [art] Extend RT PCRs Done
20,865,501 UART: [art] Lock RT PCRs Done
20,867,123 UART: [art] Populate DV Done
20,872,208 UART: [fht] FMC Alias Private Key: 7
20,873,849 UART: [art] Derive CDI
20,874,659 UART: [art] Store in slot 0x4
20,930,845 UART: [art] Derive Key Pair
20,931,844 UART: [art] Store priv key in slot 0x5
23,394,738 UART: [art] Derive Key Pair - Done
23,407,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,714 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,220 UART: [art] PUB.X = 0A131E28A3C35AB809B03222F46BDC56D2619CC003A96F9A65BFE064E2A3F0E1DD9B5B0EB780D001BFF437418294CF01
25,129,505 UART: [art] PUB.Y = 69B9C504DD088AEA3D65E4DD0259BFB8325BAE8EF55206A06063151C22EBD0F88A664C040DC05EBDA29134E68D573AE1
25,136,771 UART: [art] SIG.R = 13C687B8A29DB36B6286790E5AD14DE5C8B4359BE9AE51B399FCB9A837CDB94302D02546D8AE8C64DA3F8AC04C6502DA
25,144,194 UART: [art] SIG.S = 42DB75692658296B067828E0B4722D40E4D06AF36BF84DBE22837FAC408A1CCD5E0F9DA16A52AB0C3781F2E06D3DC489
26,122,940 UART: Caliptra RT
26,123,626 UART: [state] CFI Enabled
26,303,905 UART: [rt] RT listening for mailbox commands...
26,306,213 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,336,158 UART: [rt]cmd =0x50435252, len=8
26,338,284 >>> mbox cmd response data (8 bytes)
28,397,264 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,503,704 UART:
28,504,102 UART: Running Caliptra ROM ...
28,505,177 UART:
28,505,338 UART: [state] CFI Enabled
28,574,850 UART: [state] LifecycleState = Unprovisioned
28,576,956 UART: [state] DebugLocked = No
28,579,376 UART: [state] WD Timer not started. Device not locked for debugging
28,583,100 UART: [kat] SHA2-256
28,772,940 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,783,693 UART: [kat] ++
28,784,184 UART: [kat] sha1
28,794,851 UART: [kat] SHA2-256
28,797,833 UART: [kat] SHA2-384
28,802,747 UART: [kat] SHA2-512-ACC
28,805,314 UART: [kat] ECC-384
31,258,192 UART: [kat] HMAC-384Kdf
31,281,036 UART: [kat] LMS
31,812,571 UART: [kat] --
31,817,315 UART: [update-reset] ++
34,890,169 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,893,812 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,309,301 >>> mbox cmd response: success
35,309,676 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,310,554 UART: [update-reset] Copying MAN_2 To MAN_1
35,348,166 UART: [update-reset Success] --
35,352,869 UART: [state] Locking Datavault
35,354,881 UART: [state] Locking PCR0, PCR1 and PCR31
35,357,069 UART: [state] Locking ICCM
35,358,704 UART: [exit] Launching FMC @ 0x40000130
35,367,314 UART:
35,367,545 UART: Running Caliptra FMC ...
35,368,641 UART:
35,368,799 UART: [state] CFI Enabled
35,471,550 UART: [art] Extend RT PCRs Done
35,472,732 UART: [art] Lock RT PCRs Done
35,474,346 UART: [art] Populate DV Done
35,480,021 UART: [fht] FMC Alias Private Key: 7
35,481,557 UART: [art] Derive CDI
35,482,367 UART: [art] Store in slot 0x4
35,541,430 UART: [art] Derive Key Pair
35,542,470 UART: [art] Store priv key in slot 0x5
38,004,971 UART: [art] Derive Key Pair - Done
38,017,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,730,418 UART: [art] Erasing AUTHORITY.KEYID = 7
39,731,955 UART: [art] PUB.X = C79B8C49B20192101DB06FB4E28F2373D577B8586F17C2FD1A9A817761A2A5A9D20F2A3EDED314E2588187EBDEB89E0E
39,739,184 UART: [art] PUB.Y = C3BDC3426D723E6E781DC330C95EE5CAABAB63159217151B2C6BAF65177E679C0801565AC65349FAF27302DEB1F896A7
39,746,465 UART: [art] SIG.R = 5DDC060B86D50D1249109D34495451D26C9D8A0EFDE1D290C37225CAE64596EAED9B3E3B073549B6D6E3BA62610986FD
39,753,843 UART: [art] SIG.S = 3CEEB4B5419B335FBDF25920F003504350BD56AAE3A9C90F94FFDB5D204784A7FBD884AC8B64E46B044D407755D2F368
40,732,586 UART: mbox::rt_entry...
40,733,527 UART: ____ _ _ _ ____ _____
40,735,617 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,737,615 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,739,468 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,741,387 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,743,238 UART: |_|
40,744,115 UART:
41,114,758 UART: [rt] Runtime listening for mailbox commands...
41,116,787 >>> mbox cmd response data (128 bytes)
43,172,069 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,277,258 UART:
43,277,640 UART: Running Caliptra ROM ...
43,278,702 UART:
43,278,850 UART: [state] CFI Enabled
43,351,780 UART: [state] LifecycleState = Unprovisioned
43,353,881 UART: [state] DebugLocked = No
43,355,831 UART: [state] WD Timer not started. Device not locked for debugging
43,360,384 UART: [kat] SHA2-256
43,550,246 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,561,033 UART: [kat] ++
43,561,519 UART: [kat] sha1
43,573,808 UART: [kat] SHA2-256
43,576,825 UART: [kat] SHA2-384
43,582,836 UART: [kat] SHA2-512-ACC
43,585,447 UART: [kat] ECC-384
46,037,413 UART: [kat] HMAC-384Kdf
46,060,245 UART: [kat] LMS
46,591,821 UART: [kat] --
46,597,057 UART: [update-reset] ++
49,656,152 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,660,231 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
50,075,715 >>> mbox cmd response: success
50,076,132 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,077,028 UART: [update-reset] Copying MAN_2 To MAN_1
50,114,597 UART: [update-reset Success] --
50,118,885 UART: [state] Locking Datavault
50,122,078 UART: [state] Locking PCR0, PCR1 and PCR31
50,124,273 UART: [state] Locking ICCM
50,126,209 UART: [exit] Launching FMC @ 0x40000130
50,134,897 UART:
50,135,130 UART: Running Caliptra FMC ...
50,136,229 UART:
50,136,390 UART: [state] CFI Enabled
50,232,959 UART: [art] Extend RT PCRs Done
50,234,172 UART: [art] Lock RT PCRs Done
50,235,308 UART: [art] Populate DV Done
50,241,042 UART: [fht] FMC Alias Private Key: 7
50,242,577 UART: [art] Derive CDI
50,243,389 UART: [art] Store in slot 0x4
50,302,199 UART: [art] Derive Key Pair
50,303,242 UART: [art] Store priv key in slot 0x5
52,765,862 UART: [art] Derive Key Pair - Done
52,778,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,491,670 UART: [art] Erasing AUTHORITY.KEYID = 7
54,493,177 UART: [art] PUB.X = 614792E90ADEC5CD579248C1BF92A5B2C2FC9E09686E87CB12D9141EC4A212A2186021782D769D1CAF8184F78CAD9574
54,500,465 UART: [art] PUB.Y = AA4A8BC21EA3799A5122AB7472A4A29855942D085D4C241F5AFFD604584DE0FF5A1392B56F500C5E8401D4F49FF20784
54,507,674 UART: [art] SIG.R = B8C90B6CF9FFBBA0CF5AD7D37D2655557A954297A08185C859AC5C8D3F8555B508C630DB837DCEE0FC7F1AD86704A77C
54,515,081 UART: [art] SIG.S = FB0B27FBF4DC6451392A57605CC334F7547AE589F06473EA4C8A116FBB5772F830C1B72CED83FB1AE590110209FA6574
55,493,338 UART: mbox::rt_entry...
55,494,292 UART: ____ _ _ _ ____ _____
55,496,216 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,498,219 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,500,075 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,502,559 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,504,513 UART: |_|
55,505,322 UART:
55,875,218 UART: [rt] Runtime listening for mailbox commands...
55,877,230 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,403,081 ready_for_fw is high
3,403,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,786,992 >>> mbox cmd response: success
19,074,655 UART:
19,075,054 UART: Running Caliptra FMC ...
19,076,176 UART:
19,076,330 UART: [state] CFI Enabled
19,140,506 UART: [fht] FMC Alias Private Key: 7
20,907,378 UART: [art] Extend RT PCRs Done
20,908,601 UART: [art] Lock RT PCRs Done
20,910,089 UART: [art] Populate DV Done
20,915,624 UART: [fht] FMC Alias Private Key: 7
20,917,173 UART: [art] Derive CDI
20,917,990 UART: [art] Store in slot 0x4
20,972,645 UART: [art] Derive Key Pair
20,973,657 UART: [art] Store priv key in slot 0x5
23,436,321 UART: [art] Derive Key Pair - Done
23,449,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,162,636 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,145 UART: [art] PUB.X = 45D0C4FC7D9CABF816A0621927999F39547E02C9AC6C426D542B715A157E523141B5552AB4DE07205B4C03ADBCE7F395
25,171,359 UART: [art] PUB.Y = 712FED3CC0C23FC11DDC0F16BFA143FDF2A0AD0676F5CD0E50F82ADDD9D5CABE91E23E0CE124B88AE82C6AE21F5EB1FB
25,178,685 UART: [art] SIG.R = 7E0F87ED29FA5907E6643F4A158E0AF8906A9186E3730A87A1D84BF09EB35D7BED913C6930417985FF5E7B4940E30F3D
25,186,052 UART: [art] SIG.S = F0BD52B24C67E56C65BC094A3559FD99900E2976E36B44743DCCE594005389D350F4B458EACD7A752B7CFA30F97A8800
26,165,213 UART: Caliptra RT
26,165,926 UART: [state] CFI Enabled
26,347,092 UART: [rt] RT listening for mailbox commands...
26,349,478 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,379,318 UART: [rt]cmd =0x50435252, len=8
26,381,375 >>> mbox cmd response data (8 bytes)
28,439,492 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,539,618 >>> mbox cmd response: success
35,540,124 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,574,781 UART:
35,575,106 UART: Running Caliptra FMC ...
35,576,234 UART:
35,576,396 UART: [state] CFI Enabled
35,666,245 UART: [art] Extend RT PCRs Done
35,667,433 UART: [art] Lock RT PCRs Done
35,668,863 UART: [art] Populate DV Done
35,674,166 UART: [fht] FMC Alias Private Key: 7
35,675,806 UART: [art] Derive CDI
35,676,617 UART: [art] Store in slot 0x4
35,735,683 UART: [art] Derive Key Pair
35,736,723 UART: [art] Store priv key in slot 0x5
38,199,142 UART: [art] Derive Key Pair - Done
38,212,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,925,414 UART: [art] Erasing AUTHORITY.KEYID = 7
39,926,928 UART: [art] PUB.X = 18CEFC1739F309616B1DBE6BD8C1CFA179D1669E39CE5524A517AA729BA34DB202B16A0CA573AD7BD820DDEF183F2FE1
39,934,189 UART: [art] PUB.Y = 6AD302E48BC950885C0CC66B060CE79A8A21637107B5F36666F535C9995E07841B4B03F5D9EC112823EC79A8672B11B3
39,941,431 UART: [art] SIG.R = 2901771B60749B0EC2005B295222949F715FE6C68B53402949E6AD7675BC924B1406440C8635A437DEC05F2C6A4B3A38
39,948,774 UART: [art] SIG.S = 4042B50DF1E66EBACD556CADFF4356B034751079492C6615A4F1B3FBC6DF472BEC1EC35481188A37302BAFDF732D35A0
40,927,265 UART: mbox::rt_entry...
40,928,259 UART: ____ _ _ _ ____ _____
40,930,191 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,932,198 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,934,130 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,936,056 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,937,986 UART: |_|
40,938,791 UART:
41,308,931 UART: [rt] Runtime listening for mailbox commands...
41,310,994 >>> mbox cmd response data (128 bytes)
43,365,594 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,457,379 >>> mbox cmd response: success
50,457,888 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,491,204 UART:
50,491,501 UART: Running Caliptra FMC ...
50,492,532 UART:
50,492,681 UART: [state] CFI Enabled
50,596,929 UART: [art] Extend RT PCRs Done
50,598,123 UART: [art] Lock RT PCRs Done
50,599,579 UART: [art] Populate DV Done
50,604,851 UART: [fht] FMC Alias Private Key: 7
50,606,388 UART: [art] Derive CDI
50,607,120 UART: [art] Store in slot 0x4
50,665,646 UART: [art] Derive Key Pair
50,666,641 UART: [art] Store priv key in slot 0x5
53,129,492 UART: [art] Derive Key Pair - Done
53,142,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,855,099 UART: [art] Erasing AUTHORITY.KEYID = 7
54,856,612 UART: [art] PUB.X = DE7181BAA6EC49357044193D1220F6968AB08ADB598E7E15FAF643492683F64057FAB1AF574DFF797D419137A4D165B1
54,863,897 UART: [art] PUB.Y = 37B2A0344BEEE341FCF7F4D530EEA9FB2DC9D041C7A07157A082ABAAC7FA45BDD5D7CBC688CFA318D8CF11DDBE1E4993
54,871,142 UART: [art] SIG.R = 81E31FB05550408E9DBEEB757DCC764C9BA0FF0FB4A7AE960C757766C7B3C15660101E78B0C25636CB7AA1EC651F8FC4
54,878,541 UART: [art] SIG.S = 34E1B6A18CF7FAEAD9AFB957EDFA3627ECA8B3944BC1EC132CC40CDD2AA027379845ED278C52565ADEF035D31C287108
55,857,096 UART: mbox::rt_entry...
55,858,067 UART: ____ _ _ _ ____ _____
55,860,001 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,862,009 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,863,871 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,865,792 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,867,645 UART: |_|
55,868,523 UART:
56,240,746 UART: [rt] Runtime listening for mailbox commands...
56,242,756 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,414 UART:
192,781 UART: Running Caliptra ROM ...
193,932 UART:
603,432 UART: [state] CFI Enabled
618,278 UART: [state] LifecycleState = Unprovisioned
620,716 UART: [state] DebugLocked = No
623,467 UART: [state] WD Timer not started. Device not locked for debugging
628,312 UART: [kat] SHA2-256
818,212 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,020 UART: [kat] ++
829,501 UART: [kat] sha1
839,385 UART: [kat] SHA2-256
842,401 UART: [kat] SHA2-384
847,638 UART: [kat] SHA2-512-ACC
850,258 UART: [kat] ECC-384
3,292,088 UART: [kat] HMAC-384Kdf
3,304,822 UART: [kat] LMS
3,836,634 UART: [kat] --
3,842,408 UART: [cold-reset] ++
3,843,628 UART: [fht] FHT @ 0x50003400
3,854,570 UART: [idev] ++
3,855,302 UART: [idev] CDI.KEYID = 6
3,856,197 UART: [idev] SUBJECT.KEYID = 7
3,857,446 UART: [idev] UDS.KEYID = 0
3,858,349 ready_for_fw is high
3,858,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,509 UART: [idev] Erasing UDS.KEYID = 0
6,332,595 UART: [idev] Sha1 KeyId Algorithm
6,354,073 UART: [idev] --
6,359,534 UART: [ldev] ++
6,360,217 UART: [ldev] CDI.KEYID = 6
6,361,129 UART: [ldev] SUBJECT.KEYID = 5
6,362,293 UART: [ldev] AUTHORITY.KEYID = 7
6,363,529 UART: [ldev] FE.KEYID = 1
6,377,096 UART: [ldev] Erasing FE.KEYID = 1
8,857,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,081 UART: [ldev] --
10,649,976 UART: [fwproc] Wait for Commands...
10,651,581 UART: [fwproc] Recv command 0x46574c44
10,653,895 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,736 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,342 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,930 >>> mbox cmd response: success
14,911,599 UART: [afmc] ++
14,912,313 UART: [afmc] CDI.KEYID = 6
14,913,487 UART: [afmc] SUBJECT.KEYID = 7
14,914,988 UART: [afmc] AUTHORITY.KEYID = 5
17,417,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,509 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,442 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,544 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,718 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,609 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,532 UART: [afmc] --
19,214,592 UART: [cold-reset] --
19,218,303 UART: [state] Locking Datavault
19,225,566 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,729 UART: [state] Locking ICCM
19,229,250 UART: [exit] Launching FMC @ 0x40000130
19,237,896 UART:
19,238,137 UART: Running Caliptra FMC ...
19,239,244 UART:
19,239,404 UART: [state] CFI Enabled
19,247,571 UART: [fht] FMC Alias Private Key: 7
21,014,088 UART: [art] Extend RT PCRs Done
21,015,309 UART: [art] Lock RT PCRs Done
21,016,805 UART: [art] Populate DV Done
21,022,176 UART: [fht] FMC Alias Private Key: 7
21,023,884 UART: [art] Derive CDI
21,024,709 UART: [art] Store in slot 0x4
21,067,376 UART: [art] Derive Key Pair
21,068,384 UART: [art] Store priv key in slot 0x5
23,495,020 UART: [art] Derive Key Pair - Done
23,508,359 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,329 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,823 UART: [art] PUB.X = A0CDEDDC2AF3ED6F10E838083BF07D68E2BA53962F47A6C159E14208F2243B07AEBD55586BF1F06003D6002CF0BD13E5
25,223,093 UART: [art] PUB.Y = 12DFF62E19AE2DBCD18E5FFE15AEDD721EBCCA83176929B0948ED4624AF97DDD8B8E3A671AC10653A4FCD3452FE9E0ED
25,230,412 UART: [art] SIG.R = 3CEBCAE81DABAA96273641484B9005F3777D8F00D34ACF5F088FC427D4953695D67221311F3CF2F3241201AA0FED4D2D
25,237,778 UART: [art] SIG.S = EEE2F14AE9A022D2D4805192BEA53D92117DA45282D0077CE0E2FACA927A93743C5FEEBD92EC2068ACB2B8C2805CD55B
26,217,109 UART: Caliptra RT
26,217,832 UART: [state] CFI Enabled
26,350,851 UART: [rt] RT listening for mailbox commands...
26,353,187 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,383,002 UART: [rt]cmd =0x50435252, len=8
26,384,953 >>> mbox cmd response data (8 bytes)
28,449,326 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,555,227 UART:
28,555,582 UART: Running Caliptra ROM ...
28,556,644 UART:
28,556,798 UART: [state] CFI Enabled
28,573,187 UART: [state] LifecycleState = Unprovisioned
28,575,094 UART: [state] DebugLocked = No
28,576,262 UART: [state] WD Timer not started. Device not locked for debugging
28,579,629 UART: [kat] SHA2-256
28,769,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,780,218 UART: [kat] ++
28,780,733 UART: [kat] sha1
28,791,192 UART: [kat] SHA2-256
28,794,225 UART: [kat] SHA2-384
28,799,790 UART: [kat] SHA2-512-ACC
28,802,421 UART: [kat] ECC-384
31,244,814 UART: [kat] HMAC-384Kdf
31,256,562 UART: [kat] LMS
31,788,185 UART: [kat] --
31,793,006 UART: [update-reset] ++
34,863,260 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,867,404 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,282,846 >>> mbox cmd response: success
35,283,292 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,283,601 UART: [update-reset] Copying MAN_2 To MAN_1
35,321,192 UART: [update-reset Success] --
35,325,600 UART: [state] Locking Datavault
35,329,113 UART: [state] Locking PCR0, PCR1 and PCR31
35,331,274 UART: [state] Locking ICCM
35,333,010 UART: [exit] Launching FMC @ 0x40000130
35,341,638 UART:
35,341,874 UART: Running Caliptra FMC ...
35,342,906 UART:
35,343,056 UART: [state] CFI Enabled
35,386,642 UART: [art] Extend RT PCRs Done
35,387,787 UART: [art] Lock RT PCRs Done
35,389,053 UART: [art] Populate DV Done
35,394,573 UART: [fht] FMC Alias Private Key: 7
35,396,057 UART: [art] Derive CDI
35,396,815 UART: [art] Store in slot 0x4
35,440,129 UART: [art] Derive Key Pair
35,441,171 UART: [art] Store priv key in slot 0x5
37,868,154 UART: [art] Derive Key Pair - Done
37,881,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,587,733 UART: [art] Erasing AUTHORITY.KEYID = 7
39,589,237 UART: [art] PUB.X = B32C2DFF243F13A2341A7BFC80E12203F2ABE6BFFC791CAE60692A26DEFC18E2C4592BF31F415D60CC2A0E9F1942A48B
39,596,559 UART: [art] PUB.Y = 7BF2BD6960AB8732CE2513722D1AF3035224B241C94E4668CAC53CF76E67F36D2E3CD10EDA4696DCF1FF3DF7F3EDFE86
39,603,809 UART: [art] SIG.R = 2657499DC08985501AC8452F562B54D7338BEE2DFFA2637E7D1C5746A5740A3E38E98F6738159A787C6582827CC2878C
39,611,178 UART: [art] SIG.S = 8937E487BF217A8870FD1294C6FC23FEAAE8C436A95563D24D055C38EA58BE12ECC93529CC508C662F23488C4EB6FC4A
40,589,189 UART: mbox::rt_entry...
40,590,166 UART: ____ _ _ _ ____ _____
40,592,165 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,594,178 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,596,116 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,598,050 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,600,007 UART: |_|
40,600,856 UART:
40,976,237 UART: [rt] Runtime listening for mailbox commands...
40,978,247 >>> mbox cmd response data (128 bytes)
43,038,124 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,143,192 UART:
43,143,545 UART: Running Caliptra ROM ...
43,144,687 UART:
43,144,857 UART: [state] CFI Enabled
43,156,808 UART: [state] LifecycleState = Unprovisioned
43,158,711 UART: [state] DebugLocked = No
43,160,631 UART: [state] WD Timer not started. Device not locked for debugging
43,165,068 UART: [kat] SHA2-256
43,354,962 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,365,684 UART: [kat] ++
43,366,203 UART: [kat] sha1
43,377,492 UART: [kat] SHA2-256
43,380,516 UART: [kat] SHA2-384
43,386,088 UART: [kat] SHA2-512-ACC
43,388,667 UART: [kat] ECC-384
45,831,382 UART: [kat] HMAC-384Kdf
45,846,000 UART: [kat] LMS
46,377,612 UART: [kat] --
46,382,768 UART: [update-reset] ++
49,448,754 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,452,349 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,867,827 >>> mbox cmd response: success
49,868,199 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,869,057 UART: [update-reset] Copying MAN_2 To MAN_1
49,906,593 UART: [update-reset Success] --
49,910,774 UART: [state] Locking Datavault
49,913,019 UART: [state] Locking PCR0, PCR1 and PCR31
49,915,174 UART: [state] Locking ICCM
49,917,174 UART: [exit] Launching FMC @ 0x40000130
49,925,859 UART:
49,926,104 UART: Running Caliptra FMC ...
49,927,136 UART:
49,927,286 UART: [state] CFI Enabled
49,971,733 UART: [art] Extend RT PCRs Done
49,972,910 UART: [art] Lock RT PCRs Done
49,974,121 UART: [art] Populate DV Done
49,979,367 UART: [fht] FMC Alias Private Key: 7
49,980,901 UART: [art] Derive CDI
49,981,638 UART: [art] Store in slot 0x4
50,023,979 UART: [art] Derive Key Pair
50,024,988 UART: [art] Store priv key in slot 0x5
52,452,357 UART: [art] Derive Key Pair - Done
52,465,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,171,686 UART: [art] Erasing AUTHORITY.KEYID = 7
54,173,173 UART: [art] PUB.X = 02E0E2B09082109F6A2C313093C3D4F99FC78619E62DD1CA6BDB72E2A32F2B2BBC4EF47C9742256DDA6239CDE193DDED
54,180,436 UART: [art] PUB.Y = A3FAECDA2F7CBDB9BD08E703B2666F6AB73837D83CE1CD0CACC2DCA54CFF4D48F484AAA1D5E401F05114EF9A64CF5DCC
54,187,737 UART: [art] SIG.R = F3A2B25635C64473E3C19D3DEB3C725424A00787CC92A58E43C05FE00CC656A7568CF3475730861595A84ED339FF3A02
54,195,144 UART: [art] SIG.S = D8D8CA721F639B8522B9C91F1D1DD8CBA7FF1EB1704F73FE14C1A736FD9646F8A0F6C0812A346AE9BAF3C1E1F840ACD8
55,173,656 UART: mbox::rt_entry...
55,174,659 UART: ____ _ _ _ ____ _____
55,176,656 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,178,669 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,180,602 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,182,532 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,184,464 UART: |_|
55,185,295 UART:
55,558,162 UART: [rt] Runtime listening for mailbox commands...
55,560,179 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,752,130 ready_for_fw is high
3,752,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,925 >>> mbox cmd response: success
19,288,438 UART:
19,288,941 UART: Running Caliptra FMC ...
19,290,068 UART:
19,290,237 UART: [state] CFI Enabled
19,297,985 UART: [fht] FMC Alias Private Key: 7
21,063,956 UART: [art] Extend RT PCRs Done
21,065,189 UART: [art] Lock RT PCRs Done
21,066,561 UART: [art] Populate DV Done
21,071,826 UART: [fht] FMC Alias Private Key: 7
21,073,324 UART: [art] Derive CDI
21,074,148 UART: [art] Store in slot 0x4
21,116,754 UART: [art] Derive Key Pair
21,117,758 UART: [art] Store priv key in slot 0x5
23,544,329 UART: [art] Derive Key Pair - Done
23,557,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,263,585 UART: [art] Erasing AUTHORITY.KEYID = 7
25,265,098 UART: [art] PUB.X = 6AE6D44277BA4C3B8D22A1B16246A280A1187986E7D84DFB3B449D5FEA0DFA7A4DB460DB0E44854DCD2C279E25BA177B
25,272,403 UART: [art] PUB.Y = 8851E1F8C8A4EFCA7970255D4CB465527801C9DC9BCE98FBAED74C7BF3BCD51082D548E495971EAEAF717F8BDBD9C3B6
25,279,698 UART: [art] SIG.R = 24837B2F0DA58FECB0FE95028A662CE06C2D868565B9F23249D4424FBFE1536A0316E9699780D158909D7A37BD2DD76B
25,287,085 UART: [art] SIG.S = BBDEE2284EFE85DD9E362FB6C942B6C20C56A991B25EE964C38B3D3D7FD4A2399093A275D9A6668127ED13188F314269
26,265,611 UART: Caliptra RT
26,266,303 UART: [state] CFI Enabled
26,399,024 UART: [rt] RT listening for mailbox commands...
26,401,308 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,431,010 UART: [rt]cmd =0x50435252, len=8
26,433,077 >>> mbox cmd response data (8 bytes)
28,493,431 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,510,469 >>> mbox cmd response: success
35,511,038 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,545,818 UART:
35,546,144 UART: Running Caliptra FMC ...
35,547,277 UART:
35,547,447 UART: [state] CFI Enabled
35,591,204 UART: [art] Extend RT PCRs Done
35,592,355 UART: [art] Lock RT PCRs Done
35,593,813 UART: [art] Populate DV Done
35,599,507 UART: [fht] FMC Alias Private Key: 7
35,601,102 UART: [art] Derive CDI
35,601,847 UART: [art] Store in slot 0x4
35,644,370 UART: [art] Derive Key Pair
35,645,422 UART: [art] Store priv key in slot 0x5
38,072,900 UART: [art] Derive Key Pair - Done
38,085,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,792,330 UART: [art] Erasing AUTHORITY.KEYID = 7
39,793,843 UART: [art] PUB.X = BC5ABB0C2818FBDB331AD472E88107AB37B50624642B7A2EA620D95056BE40C778EEC4662E9FAC23DE2533EE98E78F06
39,801,097 UART: [art] PUB.Y = 721E0D76D389ABB0BDB07D7DC1304D2DD185D59164F34C2ED0837EC923E8486B72FE9D433A9A84E3E0FA056A6702ED08
39,808,392 UART: [art] SIG.R = C35CE0E16AB69B80B55A828917E1AC267C578BAA87B2F20A822D7099A632076504E7EF02EB42A5C853B8657F3A42CF0D
39,815,796 UART: [art] SIG.S = 0D42C505912517CAD7619EDB80CFAC6D03BFD999384790EDD24C0F5F588B028D6CC704BEC294F2C1E56B277BCAA6B942
40,793,981 UART: mbox::rt_entry...
40,794,937 UART: ____ _ _ _ ____ _____
40,796,872 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,798,882 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,800,746 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,802,674 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,804,727 UART: |_|
40,805,596 UART:
41,175,934 UART: [rt] Runtime listening for mailbox commands...
41,177,992 >>> mbox cmd response data (128 bytes)
43,239,833 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,257,262 >>> mbox cmd response: success
50,257,860 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,291,052 UART:
50,291,357 UART: Running Caliptra FMC ...
50,292,395 UART:
50,292,548 UART: [state] CFI Enabled
50,336,856 UART: [art] Extend RT PCRs Done
50,338,056 UART: [art] Lock RT PCRs Done
50,339,383 UART: [art] Populate DV Done
50,344,807 UART: [fht] FMC Alias Private Key: 7
50,346,374 UART: [art] Derive CDI
50,347,198 UART: [art] Store in slot 0x4
50,389,959 UART: [art] Derive Key Pair
50,390,966 UART: [art] Store priv key in slot 0x5
52,817,559 UART: [art] Derive Key Pair - Done
52,830,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,537,259 UART: [art] Erasing AUTHORITY.KEYID = 7
54,538,798 UART: [art] PUB.X = CBFD8D0A6A74A52C653F51242ED5E59C07AFA5E2D69510112487C4F39B4A7383DA49C0C1F78B2E09499306FDB9F63FB6
54,546,054 UART: [art] PUB.Y = CAF989BAEF0D4635E4E3DBC4A630E1D8E553C8F633E9176345501EC3B38B78CB424326AE163AF032E02B8B266A8DE597
54,553,291 UART: [art] SIG.R = FABBBBA75AC36B297C08680F3F17BB91B9B030A49DC3BD895D06D25D954BFF5648664AA0EA4AD7CE08270E6379F8EB66
54,560,702 UART: [art] SIG.S = 45382FBA9A34FED09A0A692C54A3DCA3E8438F5F01010074BB664432632FD18C8EA045CEB080D3A26FC168CAC3FDDB1D
55,538,914 UART: mbox::rt_entry...
55,539,869 UART: ____ _ _ _ ____ _____
55,541,857 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,543,860 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,545,792 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,547,743 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,549,677 UART: |_|
55,550,533 UART:
55,921,469 UART: [rt] Runtime listening for mailbox commands...
55,923,478 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,497 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,997 UART: [kat] SHA2-256
881,928 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,043 UART: [kat] ++
886,195 UART: [kat] sha1
890,641 UART: [kat] SHA2-256
892,579 UART: [kat] SHA2-384
895,274 UART: [kat] SHA2-512-ACC
897,175 UART: [kat] ECC-384
903,080 UART: [kat] HMAC-384Kdf
907,728 UART: [kat] LMS
1,475,924 UART: [kat] --
1,476,799 UART: [cold-reset] ++
1,477,145 UART: [fht] Storing FHT @ 0x50003400
1,479,916 UART: [idev] ++
1,480,084 UART: [idev] CDI.KEYID = 6
1,480,444 UART: [idev] SUBJECT.KEYID = 7
1,480,868 UART: [idev] UDS.KEYID = 0
1,481,213 ready_for_fw is high
1,481,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,658 UART: [idev] Erasing UDS.KEYID = 0
1,504,852 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,534 UART: [idev] --
1,514,769 UART: [ldev] ++
1,514,937 UART: [ldev] CDI.KEYID = 6
1,515,300 UART: [ldev] SUBJECT.KEYID = 5
1,515,726 UART: [ldev] AUTHORITY.KEYID = 7
1,516,189 UART: [ldev] FE.KEYID = 1
1,521,239 UART: [ldev] Erasing FE.KEYID = 1
1,546,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,696 UART: [ldev] --
1,586,175 UART: [fwproc] Waiting for Commands...
1,586,872 UART: [fwproc] Received command 0x46574c44
1,587,663 UART: [fwproc] Received Image of size 118548 bytes
2,931,929 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,231 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,449 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,770 >>> mbox cmd response: success
3,131,842 UART: [afmc] ++
3,132,010 UART: [afmc] CDI.KEYID = 6
3,132,372 UART: [afmc] SUBJECT.KEYID = 7
3,132,797 UART: [afmc] AUTHORITY.KEYID = 5
3,167,848 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,826 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,606 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,315 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,198 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,881 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,825 UART: [afmc] --
3,210,893 UART: [cold-reset] --
3,211,571 UART: [state] Locking Datavault
3,212,790 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,394 UART: [state] Locking ICCM
3,213,840 UART: [exit] Launching FMC @ 0x40000130
3,219,170 UART:
3,219,186 UART: Running Caliptra FMC ...
3,219,594 UART:
3,219,648 UART: [state] CFI Enabled
3,229,832 UART: [fht] FMC Alias Private Key: 7
3,348,296 UART: [art] Extend RT PCRs Done
3,348,724 UART: [art] Lock RT PCRs Done
3,349,978 UART: [art] Populate DV Done
3,357,979 UART: [fht] FMC Alias Private Key: 7
3,359,085 UART: [art] Derive CDI
3,359,365 UART: [art] Store in slot 0x4
3,444,789 UART: [art] Derive Key Pair
3,445,149 UART: [art] Store priv key in slot 0x5
3,458,292 UART: [art] Derive Key Pair - Done
3,473,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,354 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,119 UART: [art] PUB.X = 752609161C06B0FB5D860B4BF21693D76B5AE345DE5AADDE86A40007AB92BA19C8F4700787D2426E8A77F0FA9CFA9E3C
3,495,864 UART: [art] PUB.Y = 6142BD87FB7E89DADBEE4844B35AAB95D20ADE6DF68A617F2B4C62245E545FC4434C03D70AAE77F76FB78B8D92F31AE7
3,502,825 UART: [art] SIG.R = 971CCB16AB5D7707CBA45728858D626D5064F70EC2FDE54204178262219FFC748E3AD2E870EA2C13FBC447AEFCD122F0
3,509,596 UART: [art] SIG.S = 181EE8077B5FF228526FA9F5A03189C7E547C557C020C352F75A2E69E02919E81E65587B2DBFB326EDCE16BF6F3C7D7A
3,533,891 UART: Caliptra RT
3,534,142 UART: [state] CFI Enabled
3,653,732 UART: [rt] RT listening for mailbox commands...
3,654,402 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,238 UART: [rt]cmd =0x50435252, len=8
3,685,976 >>> mbox cmd response data (8 bytes)
3,685,977 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,757 UART:
3,686,773 UART: Running Caliptra ROM ...
3,687,181 UART:
3,687,235 UART: [state] CFI Enabled
3,689,609 UART: [state] LifecycleState = Unprovisioned
3,690,264 UART: [state] DebugLocked = No
3,690,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,692,419 UART: [kat] SHA2-256
4,486,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,490,465 UART: [kat] ++
4,490,617 UART: [kat] sha1
4,494,921 UART: [kat] SHA2-256
4,496,859 UART: [kat] SHA2-384
4,499,628 UART: [kat] SHA2-512-ACC
4,501,528 UART: [kat] ECC-384
4,506,853 UART: [kat] HMAC-384Kdf
4,511,359 UART: [kat] LMS
5,079,555 UART: [kat] --
5,080,418 UART: [update-reset] ++
6,052,155 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,053,305 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,154,998 >>> mbox cmd response: success
6,154,998 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,155,109 UART: [update-reset] Copying MAN_2 To MAN_1
6,163,123 UART: [update-reset Success] --
6,164,034 UART: [state] Locking Datavault
6,164,808 UART: [state] Locking PCR0, PCR1 and PCR31
6,165,412 UART: [state] Locking ICCM
6,165,868 UART: [exit] Launching FMC @ 0x40000130
6,171,198 UART:
6,171,214 UART: Running Caliptra FMC ...
6,171,622 UART:
6,171,676 UART: [state] CFI Enabled
6,260,803 UART: [art] Extend RT PCRs Done
6,261,231 UART: [art] Lock RT PCRs Done
6,262,536 UART: [art] Populate DV Done
6,270,725 UART: [fht] FMC Alias Private Key: 7
6,271,797 UART: [art] Derive CDI
6,272,077 UART: [art] Store in slot 0x4
6,357,589 UART: [art] Derive Key Pair
6,357,949 UART: [art] Store priv key in slot 0x5
6,370,840 UART: [art] Derive Key Pair - Done
6,385,780 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,401,311 UART: [art] Erasing AUTHORITY.KEYID = 7
6,402,076 UART: [art] PUB.X = 867326A0A79225D5419CF01DD08F83894014EE3659C0D65EB9E84C5C233489BC2AB28F6AEE0E2A8466F41C989D0FC3C5
6,408,844 UART: [art] PUB.Y = 11E217286E3737E0D2617AD7B8D09EB182AF90ABC111307E7D509E3CEA5CA27D83B0163D56B654467345492A025094B5
6,415,787 UART: [art] SIG.R = D96C75219FFCFD5C89D79AD402D4FD1ED613690EDA7C7AFEA4447E91B1972C022AF8E2F2CCAE1825106F402C40E3F0BD
6,422,568 UART: [art] SIG.S = 378756C613A93F9A86D1F576F0D0AC7E66CC0A01544EAEAFDD142F88923F5CD566B0FD044EBC077208FD98DA2A0EF799
6,446,884 UART: mbox::rt_entry...
6,447,256 UART: ____ _ _ _ ____ _____
6,448,040 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,448,840 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,449,608 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,450,376 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,451,144 UART: |_|
6,451,456 UART:
6,819,765 UART: [rt] Runtime listening for mailbox commands...
6,820,818 >>> mbox cmd response data (128 bytes)
6,820,819 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,820,933 UART:
6,820,949 UART: Running Caliptra ROM ...
6,821,357 UART:
6,821,411 UART: [state] CFI Enabled
6,824,041 UART: [state] LifecycleState = Unprovisioned
6,824,696 UART: [state] DebugLocked = No
6,825,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,827,065 UART: [kat] SHA2-256
7,620,996 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,625,111 UART: [kat] ++
7,625,263 UART: [kat] sha1
7,629,325 UART: [kat] SHA2-256
7,631,263 UART: [kat] SHA2-384
7,634,064 UART: [kat] SHA2-512-ACC
7,635,964 UART: [kat] ECC-384
7,641,569 UART: [kat] HMAC-384Kdf
7,646,077 UART: [kat] LMS
8,214,273 UART: [kat] --
8,215,334 UART: [update-reset] ++
9,188,357 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,189,529 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,291,222 >>> mbox cmd response: success
9,291,222 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,291,353 UART: [update-reset] Copying MAN_2 To MAN_1
9,299,367 UART: [update-reset Success] --
9,300,272 UART: [state] Locking Datavault
9,301,068 UART: [state] Locking PCR0, PCR1 and PCR31
9,301,672 UART: [state] Locking ICCM
9,302,166 UART: [exit] Launching FMC @ 0x40000130
9,307,496 UART:
9,307,512 UART: Running Caliptra FMC ...
9,307,920 UART:
9,307,974 UART: [state] CFI Enabled
9,397,285 UART: [art] Extend RT PCRs Done
9,397,713 UART: [art] Lock RT PCRs Done
9,398,936 UART: [art] Populate DV Done
9,407,261 UART: [fht] FMC Alias Private Key: 7
9,408,317 UART: [art] Derive CDI
9,408,597 UART: [art] Store in slot 0x4
9,494,101 UART: [art] Derive Key Pair
9,494,461 UART: [art] Store priv key in slot 0x5
9,507,466 UART: [art] Derive Key Pair - Done
9,522,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,538,140 UART: [art] Erasing AUTHORITY.KEYID = 7
9,538,905 UART: [art] PUB.X = FC00E22C8D4BDB306CEF16C20E3C073D3BA2C9E96E4976348507756D1D35EDD399AB3240ECC5F39C7365FB0E0C7A69AA
9,545,654 UART: [art] PUB.Y = 95646D01082A411D1EF12002764AFC5062E3C6CF342496387F2698EC47D2E29A727F0EE7B154FABDAC8910AD1BAF22AC
9,552,600 UART: [art] SIG.R = 513DDB8EF0CA007CD2CE55C3A670E579FE0C289426832985EC47DFB8997A08A0A3C71E5FDF278F8B1C7C08362DAD3752
9,559,351 UART: [art] SIG.S = 44E4995AE0720879DDE132D85E2E977903C2EA9F3B2EEE55174D9F3FAD9FF7740544ADB1433B82C50E6E7225EA2DEEB0
9,583,133 UART: mbox::rt_entry...
9,583,505 UART: ____ _ _ _ ____ _____
9,584,289 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,585,089 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,585,857 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,586,625 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,587,393 UART: |_|
9,587,705 UART:
9,951,085 UART: [rt] Runtime listening for mailbox commands...
9,952,138 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,785 ready_for_fw is high
1,362,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,496 >>> mbox cmd response: success
3,042,623 UART:
3,042,639 UART: Running Caliptra FMC ...
3,043,047 UART:
3,043,101 UART: [state] CFI Enabled
3,053,435 UART: [fht] FMC Alias Private Key: 7
3,172,619 UART: [art] Extend RT PCRs Done
3,173,047 UART: [art] Lock RT PCRs Done
3,174,551 UART: [art] Populate DV Done
3,182,688 UART: [fht] FMC Alias Private Key: 7
3,183,852 UART: [art] Derive CDI
3,184,132 UART: [art] Store in slot 0x4
3,270,362 UART: [art] Derive Key Pair
3,270,722 UART: [art] Store priv key in slot 0x5
3,283,951 UART: [art] Derive Key Pair - Done
3,298,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,693 UART: [art] PUB.X = 227146FB80DA3749CEAC1E820E2DC45F541E64EED156E92903604D59F701CB36CF5A72AEE49755684DF5ACD0E24D755E
3,321,464 UART: [art] PUB.Y = 88E551FA98A5F9F9B096F7A785B4A8A854F57D7825A67A7AA7565F7D551A2DEA7BA5B342C983C012C7CC0A41BCA8A3DE
3,328,427 UART: [art] SIG.R = C494B6A933A6AE4DB2450E81FEB714DE94A694418BE84A3FCBFE7D7F52AADDC8E3D5A4E081E6213B447B5A607DB21ECF
3,335,218 UART: [art] SIG.S = 13B0DF5865CE27B563DBC5D7CEA7972A79E92C5F23262F9D9686ACCA19B8FA94D711C2C2526B36EFD4965301F6BE82EF
3,358,965 UART: Caliptra RT
3,359,216 UART: [state] CFI Enabled
3,479,078 UART: [rt] RT listening for mailbox commands...
3,479,748 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,760 UART: [rt]cmd =0x50435252, len=8
3,511,220 >>> mbox cmd response data (8 bytes)
3,511,221 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,864,056 >>> mbox cmd response: success
5,864,056 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,877,288 UART:
5,877,304 UART: Running Caliptra FMC ...
5,877,712 UART:
5,877,766 UART: [state] CFI Enabled
5,967,101 UART: [art] Extend RT PCRs Done
5,967,529 UART: [art] Lock RT PCRs Done
5,968,928 UART: [art] Populate DV Done
5,977,019 UART: [fht] FMC Alias Private Key: 7
5,978,107 UART: [art] Derive CDI
5,978,387 UART: [art] Store in slot 0x4
6,063,995 UART: [art] Derive Key Pair
6,064,355 UART: [art] Store priv key in slot 0x5
6,077,730 UART: [art] Derive Key Pair - Done
6,092,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,108,000 UART: [art] Erasing AUTHORITY.KEYID = 7
6,108,765 UART: [art] PUB.X = 27CEB81F250D3A61722F95C3C111DC22755933D58911F9DFD4303D5C4B14FE4E397ACA90275F43A51918C764B8EED4CF
6,115,538 UART: [art] PUB.Y = 253FCEF95420BA58B61C5C56C6012B4C9432BE08D5E238AD141DB3BBED04880EEBB90C8C2B00A193BB487628C108256A
6,122,458 UART: [art] SIG.R = D6BBA5114DC53C4CD9CD86963E3932E2FAAE2C49CB6784142FACD2E58AF6128AFDDB9ACF66A281B43EAC29D2DD57E08E
6,129,256 UART: [art] SIG.S = 7E6B4FBE9B20D7A478992CABC67E725635FFAD892C3A5E54B5E1BED2B6730926742D0BAD4E992D48D560E5A8BD226373
6,153,274 UART: mbox::rt_entry...
6,153,646 UART: ____ _ _ _ ____ _____
6,154,430 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,155,230 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,155,998 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,156,766 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,157,534 UART: |_|
6,157,846 UART:
6,521,229 UART: [rt] Runtime listening for mailbox commands...
6,522,282 >>> mbox cmd response data (128 bytes)
6,522,283 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,872,742 >>> mbox cmd response: success
8,872,742 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,886,098 UART:
8,886,114 UART: Running Caliptra FMC ...
8,886,522 UART:
8,886,576 UART: [state] CFI Enabled
8,975,693 UART: [art] Extend RT PCRs Done
8,976,121 UART: [art] Lock RT PCRs Done
8,977,360 UART: [art] Populate DV Done
8,985,347 UART: [fht] FMC Alias Private Key: 7
8,986,345 UART: [art] Derive CDI
8,986,625 UART: [art] Store in slot 0x4
9,072,251 UART: [art] Derive Key Pair
9,072,611 UART: [art] Store priv key in slot 0x5
9,085,560 UART: [art] Derive Key Pair - Done
9,100,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,115,812 UART: [art] Erasing AUTHORITY.KEYID = 7
9,116,577 UART: [art] PUB.X = 87C88D57DDC253D3B077D6A19867D7130BC6E8B8454F649C0D8CA5EE4458FBF73B5CBCF66AD74E4CD03A8286C45E980C
9,123,352 UART: [art] PUB.Y = 775CC974582EA715D07680C611B007920B21F2BB9308A5A0F9193942BE4F76CCC3FBA56A12CE160A3EA21B447F3A9BC0
9,130,296 UART: [art] SIG.R = D2CFB026B6C643CCBA4C7C6521EA1048FA5D383D6C9EE415071063BC0718B6B14C8BC9619563CDF7943F13E0F56EE783
9,137,070 UART: [art] SIG.S = 9AC7A93686286DBEB45C56C92F3E58B6CA9D2F33A1BA89E67391C9F9D108B3974002D13A32C374870B29335207FFB6A5
9,161,236 UART: mbox::rt_entry...
9,161,608 UART: ____ _ _ _ ____ _____
9,162,392 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,163,192 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,163,960 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,164,728 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,165,496 UART: |_|
9,165,808 UART:
9,535,340 UART: [rt] Runtime listening for mailbox commands...
9,536,393 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,206 UART: [kat] SHA2-256
882,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,252 UART: [kat] ++
886,404 UART: [kat] sha1
890,580 UART: [kat] SHA2-256
892,518 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
902,785 UART: [kat] HMAC-384Kdf
907,521 UART: [kat] LMS
1,475,717 UART: [kat] --
1,476,530 UART: [cold-reset] ++
1,476,922 UART: [fht] Storing FHT @ 0x50003400
1,479,583 UART: [idev] ++
1,479,751 UART: [idev] CDI.KEYID = 6
1,480,111 UART: [idev] SUBJECT.KEYID = 7
1,480,535 UART: [idev] UDS.KEYID = 0
1,480,880 ready_for_fw is high
1,480,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,397 UART: [idev] Erasing UDS.KEYID = 0
1,505,245 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,681 UART: [idev] --
1,514,720 UART: [ldev] ++
1,514,888 UART: [ldev] CDI.KEYID = 6
1,515,251 UART: [ldev] SUBJECT.KEYID = 5
1,515,677 UART: [ldev] AUTHORITY.KEYID = 7
1,516,140 UART: [ldev] FE.KEYID = 1
1,521,266 UART: [ldev] Erasing FE.KEYID = 1
1,546,127 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,525 UART: [ldev] --
1,585,854 UART: [fwproc] Waiting for Commands...
1,586,685 UART: [fwproc] Received command 0x46574c44
1,587,476 UART: [fwproc] Received Image of size 118548 bytes
2,932,900 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,266 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,484 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,681 >>> mbox cmd response: success
3,132,863 UART: [afmc] ++
3,133,031 UART: [afmc] CDI.KEYID = 6
3,133,393 UART: [afmc] SUBJECT.KEYID = 7
3,133,818 UART: [afmc] AUTHORITY.KEYID = 5
3,168,663 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,953 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,733 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,442 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,325 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,008 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,688 UART: [afmc] --
3,211,666 UART: [cold-reset] --
3,212,400 UART: [state] Locking Datavault
3,213,491 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,095 UART: [state] Locking ICCM
3,214,707 UART: [exit] Launching FMC @ 0x40000130
3,220,037 UART:
3,220,053 UART: Running Caliptra FMC ...
3,220,461 UART:
3,220,604 UART: [state] CFI Enabled
3,231,132 UART: [fht] FMC Alias Private Key: 7
3,349,508 UART: [art] Extend RT PCRs Done
3,349,936 UART: [art] Lock RT PCRs Done
3,351,560 UART: [art] Populate DV Done
3,359,481 UART: [fht] FMC Alias Private Key: 7
3,360,515 UART: [art] Derive CDI
3,360,795 UART: [art] Store in slot 0x4
3,446,631 UART: [art] Derive Key Pair
3,446,991 UART: [art] Store priv key in slot 0x5
3,460,664 UART: [art] Derive Key Pair - Done
3,475,470 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,610 UART: [art] PUB.X = 14DD6636AE3AE55A5A7BF106F7D65F29DD567041F4084EE8343FA064C1F7B7CBC1137A54B2937F99B0D44CD53BF51D0C
3,498,383 UART: [art] PUB.Y = 091D5458BB57FE0722D15FF2CA0055B3964A23F22C1162E2738756965550FBEB663ED47084112BA318D1663AB483C629
3,505,297 UART: [art] SIG.R = A3277D99F53207DC89AC23A86C9C4681EAEDA889E462B6AEDC935C559BAE2A6AFF798A7C2AD906B046B9FBC513738D9C
3,512,079 UART: [art] SIG.S = FD2BA2F6769D9E3EADDBE6A6A2C270C3A2248934EA3C4CBB7DF856C8EC7670B2B405F6D0547E0A6A7394F91C3C69698C
3,536,167 UART: Caliptra RT
3,536,510 UART: [state] CFI Enabled
3,655,489 UART: [rt] RT listening for mailbox commands...
3,656,159 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,217 UART: [rt]cmd =0x50435252, len=8
3,687,543 >>> mbox cmd response data (8 bytes)
3,687,544 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,326 UART:
3,688,342 UART: Running Caliptra ROM ...
3,688,750 UART:
3,688,891 UART: [state] CFI Enabled
3,691,925 UART: [state] LifecycleState = Unprovisioned
3,692,580 UART: [state] DebugLocked = No
3,693,166 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,694,889 UART: [kat] SHA2-256
4,488,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,492,935 UART: [kat] ++
4,493,087 UART: [kat] sha1
4,497,265 UART: [kat] SHA2-256
4,499,203 UART: [kat] SHA2-384
4,501,890 UART: [kat] SHA2-512-ACC
4,503,790 UART: [kat] ECC-384
4,509,513 UART: [kat] HMAC-384Kdf
4,514,217 UART: [kat] LMS
5,082,413 UART: [kat] --
5,083,446 UART: [update-reset] ++
6,055,369 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,056,463 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,158,156 >>> mbox cmd response: success
6,158,156 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,158,507 UART: [update-reset] Copying MAN_2 To MAN_1
6,166,521 UART: [update-reset Success] --
6,167,506 UART: [state] Locking Datavault
6,168,480 UART: [state] Locking PCR0, PCR1 and PCR31
6,169,084 UART: [state] Locking ICCM
6,169,630 UART: [exit] Launching FMC @ 0x40000130
6,174,960 UART:
6,174,976 UART: Running Caliptra FMC ...
6,175,384 UART:
6,175,527 UART: [state] CFI Enabled
6,264,346 UART: [art] Extend RT PCRs Done
6,264,774 UART: [art] Lock RT PCRs Done
6,265,811 UART: [art] Populate DV Done
6,273,980 UART: [fht] FMC Alias Private Key: 7
6,275,066 UART: [art] Derive CDI
6,275,346 UART: [art] Store in slot 0x4
6,361,138 UART: [art] Derive Key Pair
6,361,498 UART: [art] Store priv key in slot 0x5
6,374,273 UART: [art] Derive Key Pair - Done
6,389,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,404,769 UART: [art] Erasing AUTHORITY.KEYID = 7
6,405,534 UART: [art] PUB.X = 4D345F2A3BC45AD4CE5F1A1EFBD67FE4203A5DB817BC0DF35D4C52C4F02775EBB6942C3E47D455CBB732E6497D6B4B69
6,412,321 UART: [art] PUB.Y = 1552CAB898A915BCD0077045C2F9035B6AED8F2EE430D497F9EFACDE0EB0C761A6F431ED11CE8424C546BAF7AA574535
6,419,278 UART: [art] SIG.R = E5FFCE375F9D801BF30204D249160859C53B1A6FE4E86A8BB14EE7AF3E9B88F1496AB748907D967FEF88BC2AC6C3C69E
6,426,055 UART: [art] SIG.S = A87D705689F281550B6EADE8A999FDD6B89A007C4DEDC451CF4BCFA187A7DB61206B18EDFC3B52D9E03D24CEB67FF7D1
6,449,550 UART: mbox::rt_entry...
6,449,922 UART: ____ _ _ _ ____ _____
6,450,706 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,451,506 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,452,274 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,453,042 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,453,810 UART: |_|
6,454,122 UART:
6,824,600 UART: [rt] Runtime listening for mailbox commands...
6,825,653 >>> mbox cmd response data (128 bytes)
6,825,654 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,825,768 UART:
6,825,784 UART: Running Caliptra ROM ...
6,826,192 UART:
6,826,333 UART: [state] CFI Enabled
6,829,243 UART: [state] LifecycleState = Unprovisioned
6,829,898 UART: [state] DebugLocked = No
6,830,494 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,832,181 UART: [kat] SHA2-256
7,626,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,630,227 UART: [kat] ++
7,630,379 UART: [kat] sha1
7,634,559 UART: [kat] SHA2-256
7,636,497 UART: [kat] SHA2-384
7,639,236 UART: [kat] SHA2-512-ACC
7,641,136 UART: [kat] ECC-384
7,646,721 UART: [kat] HMAC-384Kdf
7,651,305 UART: [kat] LMS
8,219,501 UART: [kat] --
8,220,404 UART: [update-reset] ++
9,192,335 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,193,401 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,295,094 >>> mbox cmd response: success
9,295,094 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,295,301 UART: [update-reset] Copying MAN_2 To MAN_1
9,303,315 UART: [update-reset Success] --
9,304,382 UART: [state] Locking Datavault
9,305,056 UART: [state] Locking PCR0, PCR1 and PCR31
9,305,660 UART: [state] Locking ICCM
9,306,232 UART: [exit] Launching FMC @ 0x40000130
9,311,562 UART:
9,311,578 UART: Running Caliptra FMC ...
9,311,986 UART:
9,312,129 UART: [state] CFI Enabled
9,401,596 UART: [art] Extend RT PCRs Done
9,402,024 UART: [art] Lock RT PCRs Done
9,403,239 UART: [art] Populate DV Done
9,411,714 UART: [fht] FMC Alias Private Key: 7
9,412,828 UART: [art] Derive CDI
9,413,108 UART: [art] Store in slot 0x4
9,498,752 UART: [art] Derive Key Pair
9,499,112 UART: [art] Store priv key in slot 0x5
9,512,725 UART: [art] Derive Key Pair - Done
9,527,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,543,209 UART: [art] Erasing AUTHORITY.KEYID = 7
9,543,974 UART: [art] PUB.X = 20D5D5D2E11B1D1E7FA8CFEEDCFBEC992BBFA45AA055C5DB958EC6EEFA7DBF1E5621DD065D51B30E648D3701D682331D
9,550,765 UART: [art] PUB.Y = B8744DADF271452448491DB607B5326A9F4929C8C49438F74F57460E91AA1C8A9F1459B74E93FA13F26B855458C0ABD9
9,557,707 UART: [art] SIG.R = 4737E30645717552743722B3271CEA677B0E187B4CAD954DEBD9B58DE31AEF5AB50416819511B697AA8203DFE8FE1C20
9,564,467 UART: [art] SIG.S = 77F07062B409EF4084316D553B11920B04C42FD8118A170D63CDCFCE4FDAD0C08DFD2FD93F5D051651DBBB393CF0E595
9,588,954 UART: mbox::rt_entry...
9,589,326 UART: ____ _ _ _ ____ _____
9,590,110 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,590,910 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,591,678 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,592,446 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,593,214 UART: |_|
9,593,526 UART:
9,959,564 UART: [rt] Runtime listening for mailbox commands...
9,960,617 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,208 ready_for_fw is high
1,363,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,683 >>> mbox cmd response: success
3,043,214 UART:
3,043,230 UART: Running Caliptra FMC ...
3,043,638 UART:
3,043,781 UART: [state] CFI Enabled
3,054,595 UART: [fht] FMC Alias Private Key: 7
3,173,243 UART: [art] Extend RT PCRs Done
3,173,671 UART: [art] Lock RT PCRs Done
3,175,153 UART: [art] Populate DV Done
3,183,100 UART: [fht] FMC Alias Private Key: 7
3,184,216 UART: [art] Derive CDI
3,184,496 UART: [art] Store in slot 0x4
3,270,370 UART: [art] Derive Key Pair
3,270,730 UART: [art] Store priv key in slot 0x5
3,284,179 UART: [art] Derive Key Pair - Done
3,298,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,103 UART: [art] PUB.X = 8EE675FE07F5D4A7CDA25E12D5BE5160249E5E1947A2DBC61713FAC2948BB3FBA02ACCF08C6310DECBD969C936307353
3,321,886 UART: [art] PUB.Y = FD48F24736D5277651FDAC6EA22F62D4A4288A07E827DD5024C7106C6A42ACADA853F830E0A596C61EEF288F38BD8506
3,328,838 UART: [art] SIG.R = E00F5C2A82A99BAB893776D97AD704C20439FCBA914A021A4138EE49A438F56F937F37BF0A3B8C3FA8E58FDF13E3C116
3,335,605 UART: [art] SIG.S = B39C24F9306C50CFF27B9C7AA69FB32B8E437F4458EC38C968E3204D742D0F643FE6A2589AD3014617129321D8B74E61
3,359,341 UART: Caliptra RT
3,359,684 UART: [state] CFI Enabled
3,479,851 UART: [rt] RT listening for mailbox commands...
3,480,521 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,137 UART: [rt]cmd =0x50435252, len=8
3,511,691 >>> mbox cmd response data (8 bytes)
3,511,692 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,863,508 >>> mbox cmd response: success
5,863,508 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,876,722 UART:
5,876,738 UART: Running Caliptra FMC ...
5,877,146 UART:
5,877,289 UART: [state] CFI Enabled
5,966,428 UART: [art] Extend RT PCRs Done
5,966,856 UART: [art] Lock RT PCRs Done
5,968,235 UART: [art] Populate DV Done
5,976,502 UART: [fht] FMC Alias Private Key: 7
5,977,568 UART: [art] Derive CDI
5,977,848 UART: [art] Store in slot 0x4
6,063,238 UART: [art] Derive Key Pair
6,063,598 UART: [art] Store priv key in slot 0x5
6,077,273 UART: [art] Derive Key Pair - Done
6,092,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,107,213 UART: [art] Erasing AUTHORITY.KEYID = 7
6,107,978 UART: [art] PUB.X = 793D48B7A1CDD1DE0D3640CB94D6A97A25F49FBE74A1A4C5F62D82BF1320C310EAE766C456DAF29669AC74EABD284947
6,114,761 UART: [art] PUB.Y = D7F73A19B188F4C86390CAD9F0AF1D3B215C664ECEA6C69B764EAE16DDC2BA6D87F33EF8B8AF688C3B0F8691D09E271A
6,121,730 UART: [art] SIG.R = 6A7EAFA8E9DA0B1993732BB7FB689219E1EC3CC44C004C969C906791C746339030883783A31C0AB3E36B39B82824DB28
6,128,472 UART: [art] SIG.S = 62FBCA2FBE98924D7F56A04BACE45521A6AF9E9DD0654BD13F50C2B3401E9E9B8B8BB5CAB8B9DAF42D597ECFCAC68FBD
6,151,994 UART: mbox::rt_entry...
6,152,366 UART: ____ _ _ _ ____ _____
6,153,150 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,153,950 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,154,718 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,155,486 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,156,254 UART: |_|
6,156,566 UART:
6,520,546 UART: [rt] Runtime listening for mailbox commands...
6,521,599 >>> mbox cmd response data (128 bytes)
6,521,600 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,872,298 >>> mbox cmd response: success
8,872,298 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,885,788 UART:
8,885,804 UART: Running Caliptra FMC ...
8,886,212 UART:
8,886,355 UART: [state] CFI Enabled
8,975,930 UART: [art] Extend RT PCRs Done
8,976,358 UART: [art] Lock RT PCRs Done
8,977,599 UART: [art] Populate DV Done
8,985,916 UART: [fht] FMC Alias Private Key: 7
8,987,056 UART: [art] Derive CDI
8,987,336 UART: [art] Store in slot 0x4
9,073,218 UART: [art] Derive Key Pair
9,073,578 UART: [art] Store priv key in slot 0x5
9,087,127 UART: [art] Derive Key Pair - Done
9,101,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,117,607 UART: [art] Erasing AUTHORITY.KEYID = 7
9,118,372 UART: [art] PUB.X = E0C7D20251D7732E3C8EA45DB8256EEDCA596F2481C4A14356D191636826E45B6E906B2F9067784366A333A83CEEE1C2
9,125,139 UART: [art] PUB.Y = B9E3DFCB6BFB826367C871AA75E358752B7631349A81BE586A04ED9C933AABCF63C270814E87FFC3F16C9001E2B84504
9,132,088 UART: [art] SIG.R = D64414754EB7E908609D6D4A1B2DBD1161D3FAA8C435C7B3C9BA68533BEF4AD65447501655EF7CE37B26C7DD4D6CAA65
9,138,869 UART: [art] SIG.S = 3F4EF7DD3772F738CF1FD815AE3782B946AF4083D59DBA96A86F9A01FEC9E5708EA4564CC0CCBF037754D8E2581DF9CF
9,162,907 UART: mbox::rt_entry...
9,163,279 UART: ____ _ _ _ ____ _____
9,164,063 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,164,863 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,165,631 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,166,399 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,167,167 UART: |_|
9,167,479 UART:
9,529,986 UART: [rt] Runtime listening for mailbox commands...
9,531,039 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
891,484 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
899,952 UART: [kat] SHA2-256
901,892 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
915,767 UART: [kat] HMAC-384Kdf
920,365 UART: [kat] LMS
1,168,677 UART: [kat] --
1,169,716 UART: [cold-reset] ++
1,170,252 UART: [fht] FHT @ 0x50003400
1,172,944 UART: [idev] ++
1,173,112 UART: [idev] CDI.KEYID = 6
1,173,473 UART: [idev] SUBJECT.KEYID = 7
1,173,898 UART: [idev] UDS.KEYID = 0
1,174,244 ready_for_fw is high
1,174,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,921 UART: [idev] Erasing UDS.KEYID = 0
1,199,093 UART: [idev] Sha1 KeyId Algorithm
1,207,881 UART: [idev] --
1,208,798 UART: [ldev] ++
1,208,966 UART: [ldev] CDI.KEYID = 6
1,209,330 UART: [ldev] SUBJECT.KEYID = 5
1,209,757 UART: [ldev] AUTHORITY.KEYID = 7
1,210,220 UART: [ldev] FE.KEYID = 1
1,215,436 UART: [ldev] Erasing FE.KEYID = 1
1,241,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,920 UART: [ldev] --
1,281,203 UART: [fwproc] Wait for Commands...
1,281,864 UART: [fwproc] Recv command 0x46574c44
1,282,597 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,275 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,450 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,845 >>> mbox cmd response: success
2,826,891 UART: [afmc] ++
2,827,059 UART: [afmc] CDI.KEYID = 6
2,827,422 UART: [afmc] SUBJECT.KEYID = 7
2,827,848 UART: [afmc] AUTHORITY.KEYID = 5
2,863,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,277 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,987 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,868 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,569 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,404 UART: [afmc] --
2,906,343 UART: [cold-reset] --
2,907,285 UART: [state] Locking Datavault
2,908,486 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,090 UART: [state] Locking ICCM
2,909,648 UART: [exit] Launching FMC @ 0x40000130
2,914,978 UART:
2,914,994 UART: Running Caliptra FMC ...
2,915,402 UART:
2,915,456 UART: [state] CFI Enabled
2,926,082 UART: [fht] FMC Alias Private Key: 7
3,045,322 UART: [art] Extend RT PCRs Done
3,045,750 UART: [art] Lock RT PCRs Done
3,047,128 UART: [art] Populate DV Done
3,055,253 UART: [fht] FMC Alias Private Key: 7
3,056,323 UART: [art] Derive CDI
3,056,603 UART: [art] Store in slot 0x4
3,142,024 UART: [art] Derive Key Pair
3,142,384 UART: [art] Store priv key in slot 0x5
3,155,722 UART: [art] Derive Key Pair - Done
3,170,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,716 UART: [art] PUB.X = 60F55FF1FBDED7BAF7974895EA148EC89DDCC3DDD10FCABEFA56D6A24ADC5559CDD6128A673E273B9B44893930B3172C
3,193,507 UART: [art] PUB.Y = E8F6118909C746C874293688391370020394DD7FF42C7451012EC993B33EB5A5F46472ED865AEFBA7348FA81E5577882
3,200,435 UART: [art] SIG.R = FF4C34A68D0893ECA3C467EB876866F77104B19177F531AF526553ECF7783D4115273E378D48CA646EFF4A5E809837F0
3,207,197 UART: [art] SIG.S = DE5FF56D22EB6CF3E82CE7429142C232CE7A34D8B0C3FE99CFF3BE4898EAB728A8ABB400B08FC867027EC3D5F3C671C1
3,231,032 UART: Caliptra RT
3,231,283 UART: [state] CFI Enabled
3,350,917 UART: [rt] RT listening for mailbox commands...
3,351,587 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,379 UART: [rt]cmd =0x50435252, len=8
3,383,025 >>> mbox cmd response data (8 bytes)
3,383,026 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,929 UART:
3,383,945 UART: Running Caliptra ROM ...
3,384,353 UART:
3,384,408 UART: [state] CFI Enabled
3,386,834 UART: [state] LifecycleState = Unprovisioned
3,387,489 UART: [state] DebugLocked = No
3,387,975 UART: [state] WD Timer not started. Device not locked for debugging
3,389,171 UART: [kat] SHA2-256
4,192,721 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,196,825 UART: [kat] ++
4,196,977 UART: [kat] sha1
4,201,097 UART: [kat] SHA2-256
4,203,037 UART: [kat] SHA2-384
4,205,742 UART: [kat] SHA2-512-ACC
4,207,642 UART: [kat] ECC-384
4,216,867 UART: [kat] HMAC-384Kdf
4,221,495 UART: [kat] LMS
4,469,807 UART: [kat] --
4,470,379 UART: [update-reset] ++
5,421,679 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,422,788 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,524,429 >>> mbox cmd response: success
5,524,429 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,524,622 UART: [update-reset] Copying MAN_2 To MAN_1
5,532,636 UART: [update-reset Success] --
5,533,667 UART: [state] Locking Datavault
5,534,523 UART: [state] Locking PCR0, PCR1 and PCR31
5,535,127 UART: [state] Locking ICCM
5,535,801 UART: [exit] Launching FMC @ 0x40000130
5,541,131 UART:
5,541,147 UART: Running Caliptra FMC ...
5,541,555 UART:
5,541,609 UART: [state] CFI Enabled
5,630,310 UART: [art] Extend RT PCRs Done
5,630,738 UART: [art] Lock RT PCRs Done
5,631,921 UART: [art] Populate DV Done
5,640,440 UART: [fht] FMC Alias Private Key: 7
5,641,516 UART: [art] Derive CDI
5,641,796 UART: [art] Store in slot 0x4
5,727,547 UART: [art] Derive Key Pair
5,727,907 UART: [art] Store priv key in slot 0x5
5,741,357 UART: [art] Derive Key Pair - Done
5,755,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,771,254 UART: [art] Erasing AUTHORITY.KEYID = 7
5,772,019 UART: [art] PUB.X = E83E3CBCC70768913356E0F40A851785E8D92F87803ED664C7040A333E9D0C11414DAEE8CD26D530BB4495A9DEEEEE71
5,778,782 UART: [art] PUB.Y = D8160865519394834038876E1BDCF5E1B3E68DF4DE8D5E6DB3B0B7BD5EB2D4B5E0D8C1A014CEC4320E10F6259AE4C9AA
5,785,742 UART: [art] SIG.R = 109111120B2ABAEE8F177DB2443B2DC2CE28C109F4FF9671B90302E8C8CF1D5832C4B147916D70830F9B6F897FAE8CB0
5,792,505 UART: [art] SIG.S = 3611D9ECC4B9F638F87D38B7B3005D3B5EE756E6ED57A9689C1D744239BF73F1A572B4E1CB27D270A34FCB9EDD13C2B8
5,816,041 UART: mbox::rt_entry...
5,816,413 UART: ____ _ _ _ ____ _____
5,817,197 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,817,997 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,818,765 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,819,533 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,820,301 UART: |_|
5,820,613 UART:
6,184,824 UART: [rt] Runtime listening for mailbox commands...
6,185,877 >>> mbox cmd response data (128 bytes)
6,185,878 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,185,989 UART:
6,186,005 UART: Running Caliptra ROM ...
6,186,413 UART:
6,186,468 UART: [state] CFI Enabled
6,188,792 UART: [state] LifecycleState = Unprovisioned
6,189,447 UART: [state] DebugLocked = No
6,190,011 UART: [state] WD Timer not started. Device not locked for debugging
6,191,215 UART: [kat] SHA2-256
6,994,765 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,998,869 UART: [kat] ++
6,999,021 UART: [kat] sha1
7,003,377 UART: [kat] SHA2-256
7,005,317 UART: [kat] SHA2-384
7,008,066 UART: [kat] SHA2-512-ACC
7,009,966 UART: [kat] ECC-384
7,019,643 UART: [kat] HMAC-384Kdf
7,024,105 UART: [kat] LMS
7,272,417 UART: [kat] --
7,273,423 UART: [update-reset] ++
8,222,557 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,223,552 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,325,193 >>> mbox cmd response: success
8,325,193 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,325,482 UART: [update-reset] Copying MAN_2 To MAN_1
8,333,496 UART: [update-reset Success] --
8,334,381 UART: [state] Locking Datavault
8,335,145 UART: [state] Locking PCR0, PCR1 and PCR31
8,335,749 UART: [state] Locking ICCM
8,336,243 UART: [exit] Launching FMC @ 0x40000130
8,341,573 UART:
8,341,589 UART: Running Caliptra FMC ...
8,341,997 UART:
8,342,051 UART: [state] CFI Enabled
8,431,186 UART: [art] Extend RT PCRs Done
8,431,614 UART: [art] Lock RT PCRs Done
8,433,161 UART: [art] Populate DV Done
8,441,126 UART: [fht] FMC Alias Private Key: 7
8,442,190 UART: [art] Derive CDI
8,442,470 UART: [art] Store in slot 0x4
8,527,985 UART: [art] Derive Key Pair
8,528,345 UART: [art] Store priv key in slot 0x5
8,541,419 UART: [art] Derive Key Pair - Done
8,556,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,571,232 UART: [art] Erasing AUTHORITY.KEYID = 7
8,571,997 UART: [art] PUB.X = DB65F3F77BE506581829381862D6040CA451B8F54DA92202033D00EFFAF55E7155644771FCD72272E1D6D5ECDE93F448
8,578,730 UART: [art] PUB.Y = A62FEB9821D8C29B0263CE5F2913D92B35139E2FDF33151BCA9C2FD051B92D22A64446961C6D48CC8E5EDB32F5FC1DC6
8,585,691 UART: [art] SIG.R = 3139EDA5DB207BA0085CD2E31ECC16EC4F66F74CEF543BA109F662D8A3FE92DA7E935BC61E321B2A9984C527AB5D7E67
8,592,473 UART: [art] SIG.S = 9BDD63918F5E0D78C85C73F3D9ACFC308519E1DCA2A65B4D6316508C8B8F1A3E6B070162D465326CC52E7A5EA36181A2
8,615,828 UART: mbox::rt_entry...
8,616,200 UART: ____ _ _ _ ____ _____
8,616,984 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,617,784 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,618,552 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,619,320 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,620,088 UART: |_|
8,620,400 UART:
8,979,568 UART: [rt] Runtime listening for mailbox commands...
8,980,621 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,806 ready_for_fw is high
1,058,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,236 >>> mbox cmd response: success
2,739,851 UART:
2,739,867 UART: Running Caliptra FMC ...
2,740,275 UART:
2,740,329 UART: [state] CFI Enabled
2,750,619 UART: [fht] FMC Alias Private Key: 7
2,869,415 UART: [art] Extend RT PCRs Done
2,869,843 UART: [art] Lock RT PCRs Done
2,871,439 UART: [art] Populate DV Done
2,879,518 UART: [fht] FMC Alias Private Key: 7
2,880,568 UART: [art] Derive CDI
2,880,848 UART: [art] Store in slot 0x4
2,966,391 UART: [art] Derive Key Pair
2,966,751 UART: [art] Store priv key in slot 0x5
2,980,289 UART: [art] Derive Key Pair - Done
2,994,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,507 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,272 UART: [art] PUB.X = BB39BDA0C92FB0021CC6ABA22E98DF59AA8F32663EC589CC896C8F8D14F3BC058778C43CD79F5298336E60314A3CE3C6
3,018,050 UART: [art] PUB.Y = BC6B4A0B473129C808C077ADAC79BB1D8F201999CDF7FAE4C186BF6BD180C0965C18765210BEA7C759E42410258337DB
3,025,002 UART: [art] SIG.R = 98052F9579B7DC9B3C0414A80FD003BE59B697418476FC5B814F43F2D3D472BCC6863B0C6F87AA20DA95B372C7D7714B
3,031,761 UART: [art] SIG.S = B18DDF105B943E2D86DE1F3EAE8825EDBDF04B069E042DD1406D7A667162C77E2E06B479B997A26CB2CBBD86008A17FF
3,055,860 UART: Caliptra RT
3,056,111 UART: [state] CFI Enabled
3,175,549 UART: [rt] RT listening for mailbox commands...
3,176,219 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,073 UART: [rt]cmd =0x50435252, len=8
3,207,527 >>> mbox cmd response data (8 bytes)
3,207,528 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,233,013 >>> mbox cmd response: success
5,233,013 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,246,770 UART:
5,246,786 UART: Running Caliptra FMC ...
5,247,194 UART:
5,247,248 UART: [state] CFI Enabled
5,336,517 UART: [art] Extend RT PCRs Done
5,336,945 UART: [art] Lock RT PCRs Done
5,337,912 UART: [art] Populate DV Done
5,346,559 UART: [fht] FMC Alias Private Key: 7
5,347,605 UART: [art] Derive CDI
5,347,885 UART: [art] Store in slot 0x4
5,433,964 UART: [art] Derive Key Pair
5,434,324 UART: [art] Store priv key in slot 0x5
5,446,960 UART: [art] Derive Key Pair - Done
5,461,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,477,065 UART: [art] Erasing AUTHORITY.KEYID = 7
5,477,830 UART: [art] PUB.X = 6456FF9A41E236DD826335DB26E57DC68E898CBF20192A89731EF93815BC576154236F8521C817037B86BCF0BF2EE34D
5,484,597 UART: [art] PUB.Y = 0BD3A800703FE4632A857DFCA82DB8E3E1A296C05616E01CB03AEF3EDB5F0D35EE7B59E9F5CFBC7C97637EFC98637F1D
5,491,541 UART: [art] SIG.R = 04F70326A0340474686E836B8D900AD1B98FBA2F5905450B6E57E909A34F71F19ED9FBA7CB77440440493D96FC874356
5,498,281 UART: [art] SIG.S = 5211366A66B6C1E6C7EE38BF33527D6B08CEFA8FFA38D93F3754470400F228A1D0A5967D2995A3CB031982F8006E4FD4
5,522,454 UART: mbox::rt_entry...
5,522,826 UART: ____ _ _ _ ____ _____
5,523,610 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,524,410 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,525,178 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,525,946 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,526,714 UART: |_|
5,527,026 UART:
5,889,863 UART: [rt] Runtime listening for mailbox commands...
5,890,916 >>> mbox cmd response data (128 bytes)
5,890,917 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,915,872 >>> mbox cmd response: success
7,915,872 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,929,313 UART:
7,929,329 UART: Running Caliptra FMC ...
7,929,737 UART:
7,929,791 UART: [state] CFI Enabled
8,018,870 UART: [art] Extend RT PCRs Done
8,019,298 UART: [art] Lock RT PCRs Done
8,020,691 UART: [art] Populate DV Done
8,029,054 UART: [fht] FMC Alias Private Key: 7
8,030,004 UART: [art] Derive CDI
8,030,284 UART: [art] Store in slot 0x4
8,115,869 UART: [art] Derive Key Pair
8,116,229 UART: [art] Store priv key in slot 0x5
8,129,737 UART: [art] Derive Key Pair - Done
8,144,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,159,873 UART: [art] Erasing AUTHORITY.KEYID = 7
8,160,638 UART: [art] PUB.X = 72E6F6E06899080DC33F33AE83589275F182ECF02A9D42463B85C882E8F4662D8E00C40885E0A7B015C23A84A8C0CCCC
8,167,379 UART: [art] PUB.Y = 119C6C4CCD62A4F301E11FCA14CC580887A6B4D49539F8EDC8F1F1BCFAFB14BF325B820B6D261F1ABC013E11B1CAE989
8,174,339 UART: [art] SIG.R = D7EC324705B4F0A4FB29F608533612EDAE92ABF7AE8F93CCFAAB6387B24E13C646830CA2E446AA120FE45FB90AE81FB0
8,181,114 UART: [art] SIG.S = C04D3026B27ED3A6969F799A4C3575A5DF349A38021F6F33C4380BFC8D26EB0A57CF1087FD34912F53D515D3302CE825
8,204,369 UART: mbox::rt_entry...
8,204,741 UART: ____ _ _ _ ____ _____
8,205,525 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,206,325 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,207,093 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,207,861 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,208,629 UART: |_|
8,208,941 UART:
8,572,360 UART: [rt] Runtime listening for mailbox commands...
8,573,413 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
891,711 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,815 UART: [kat] ++
895,967 UART: [kat] sha1
900,323 UART: [kat] SHA2-256
902,263 UART: [kat] SHA2-384
904,922 UART: [kat] SHA2-512-ACC
906,823 UART: [kat] ECC-384
916,276 UART: [kat] HMAC-384Kdf
920,954 UART: [kat] LMS
1,169,266 UART: [kat] --
1,170,169 UART: [cold-reset] ++
1,170,617 UART: [fht] FHT @ 0x50003400
1,173,273 UART: [idev] ++
1,173,441 UART: [idev] CDI.KEYID = 6
1,173,802 UART: [idev] SUBJECT.KEYID = 7
1,174,227 UART: [idev] UDS.KEYID = 0
1,174,573 ready_for_fw is high
1,174,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,212 UART: [idev] Erasing UDS.KEYID = 0
1,199,850 UART: [idev] Sha1 KeyId Algorithm
1,208,650 UART: [idev] --
1,209,727 UART: [ldev] ++
1,209,895 UART: [ldev] CDI.KEYID = 6
1,210,259 UART: [ldev] SUBJECT.KEYID = 5
1,210,686 UART: [ldev] AUTHORITY.KEYID = 7
1,211,149 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,729 UART: [ldev] --
1,282,120 UART: [fwproc] Wait for Commands...
1,282,779 UART: [fwproc] Recv command 0x46574c44
1,283,512 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,930 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,105 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,372 >>> mbox cmd response: success
2,826,548 UART: [afmc] ++
2,826,716 UART: [afmc] CDI.KEYID = 6
2,827,079 UART: [afmc] SUBJECT.KEYID = 7
2,827,505 UART: [afmc] AUTHORITY.KEYID = 5
2,862,732 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,102 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,812 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,693 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,394 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,137 UART: [afmc] --
2,906,040 UART: [cold-reset] --
2,906,536 UART: [state] Locking Datavault
2,907,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,197 UART: [state] Locking ICCM
2,908,643 UART: [exit] Launching FMC @ 0x40000130
2,913,973 UART:
2,913,989 UART: Running Caliptra FMC ...
2,914,397 UART:
2,914,540 UART: [state] CFI Enabled
2,925,162 UART: [fht] FMC Alias Private Key: 7
3,044,006 UART: [art] Extend RT PCRs Done
3,044,434 UART: [art] Lock RT PCRs Done
3,046,108 UART: [art] Populate DV Done
3,054,465 UART: [fht] FMC Alias Private Key: 7
3,055,431 UART: [art] Derive CDI
3,055,711 UART: [art] Store in slot 0x4
3,141,384 UART: [art] Derive Key Pair
3,141,744 UART: [art] Store priv key in slot 0x5
3,155,168 UART: [art] Derive Key Pair - Done
3,169,770 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,551 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,316 UART: [art] PUB.X = F949A74A43803B04CA319F297372814CDE997FF59E42A31549933E4F6732067B41B0A55699E54878079E153EBC9CF51F
3,193,069 UART: [art] PUB.Y = 66AB9EBECD4340F335F89797954DD57AD243EDA8274F8B1743E00B03E9B98FF8EBF70E387F1FD88E3D4E07999D2C42EE
3,200,021 UART: [art] SIG.R = 030B971BB8F63C84F999B3799C7BA485BCA7D76C0561AC1782B7F53CAC0EBD290575F5A919D663BB43199453150B1F3A
3,206,777 UART: [art] SIG.S = 79DEA01E14FE421E76A6818A7D7001607D69FD908948A14BD43344002CCF80A1A1B269832F51AD028050AB04A87383B4
3,230,234 UART: Caliptra RT
3,230,577 UART: [state] CFI Enabled
3,350,059 UART: [rt] RT listening for mailbox commands...
3,350,729 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,697 UART: [rt]cmd =0x50435252, len=8
3,382,073 >>> mbox cmd response data (8 bytes)
3,382,074 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,787 UART:
3,382,803 UART: Running Caliptra ROM ...
3,383,211 UART:
3,383,353 UART: [state] CFI Enabled
3,386,073 UART: [state] LifecycleState = Unprovisioned
3,386,728 UART: [state] DebugLocked = No
3,387,314 UART: [state] WD Timer not started. Device not locked for debugging
3,388,584 UART: [kat] SHA2-256
4,192,134 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,196,238 UART: [kat] ++
4,196,390 UART: [kat] sha1
4,200,620 UART: [kat] SHA2-256
4,202,560 UART: [kat] SHA2-384
4,205,331 UART: [kat] SHA2-512-ACC
4,207,231 UART: [kat] ECC-384
4,217,004 UART: [kat] HMAC-384Kdf
4,221,474 UART: [kat] LMS
4,469,786 UART: [kat] --
4,470,634 UART: [update-reset] ++
5,420,118 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,421,205 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,522,846 >>> mbox cmd response: success
5,522,846 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,523,015 UART: [update-reset] Copying MAN_2 To MAN_1
5,531,029 UART: [update-reset Success] --
5,532,138 UART: [state] Locking Datavault
5,533,132 UART: [state] Locking PCR0, PCR1 and PCR31
5,533,736 UART: [state] Locking ICCM
5,534,278 UART: [exit] Launching FMC @ 0x40000130
5,539,608 UART:
5,539,624 UART: Running Caliptra FMC ...
5,540,032 UART:
5,540,175 UART: [state] CFI Enabled
5,629,936 UART: [art] Extend RT PCRs Done
5,630,364 UART: [art] Lock RT PCRs Done
5,631,557 UART: [art] Populate DV Done
5,639,650 UART: [fht] FMC Alias Private Key: 7
5,640,716 UART: [art] Derive CDI
5,640,996 UART: [art] Store in slot 0x4
5,726,689 UART: [art] Derive Key Pair
5,727,049 UART: [art] Store priv key in slot 0x5
5,740,819 UART: [art] Derive Key Pair - Done
5,755,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,770,606 UART: [art] Erasing AUTHORITY.KEYID = 7
5,771,371 UART: [art] PUB.X = 66BBFBA14D691315C20B74201B42CDEFC56C1349ED1317F0E9C36101171AC6D3EE5E1539A070BF9DDA09BDEABE96F113
5,778,148 UART: [art] PUB.Y = 6A677EBB6A16461BF9518A4D634AC5ADBB7068B1129C02DD296B053BD785E287A12D7FAF859D68B346FFFAD03BF8252F
5,785,106 UART: [art] SIG.R = BBF9883F83618AB78173FCFB3A5C24A88D61BEF3D8309832BC168E3FFE9B6CC46BC7CC4C8710A89AB4FE68258C88A5A4
5,791,894 UART: [art] SIG.S = FA8FDE34EB0D59BFD82BE34ECB484A6AA66440AACA362267823CD8D8BE1C8F8584D0AA0D77353C97645D140BA2F87796
5,815,649 UART: mbox::rt_entry...
5,816,021 UART: ____ _ _ _ ____ _____
5,816,805 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,817,605 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,818,373 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,819,141 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,819,909 UART: |_|
5,820,221 UART:
6,184,666 UART: [rt] Runtime listening for mailbox commands...
6,185,719 >>> mbox cmd response data (128 bytes)
6,185,720 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,185,831 UART:
6,185,847 UART: Running Caliptra ROM ...
6,186,255 UART:
6,186,397 UART: [state] CFI Enabled
6,189,377 UART: [state] LifecycleState = Unprovisioned
6,190,032 UART: [state] DebugLocked = No
6,190,754 UART: [state] WD Timer not started. Device not locked for debugging
6,192,068 UART: [kat] SHA2-256
6,995,618 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,999,722 UART: [kat] ++
6,999,874 UART: [kat] sha1
7,004,254 UART: [kat] SHA2-256
7,006,194 UART: [kat] SHA2-384
7,008,887 UART: [kat] SHA2-512-ACC
7,010,787 UART: [kat] ECC-384
7,020,332 UART: [kat] HMAC-384Kdf
7,025,056 UART: [kat] LMS
7,273,368 UART: [kat] --
7,274,304 UART: [update-reset] ++
8,224,816 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,225,975 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,327,616 >>> mbox cmd response: success
8,327,616 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,327,819 UART: [update-reset] Copying MAN_2 To MAN_1
8,335,833 UART: [update-reset Success] --
8,336,822 UART: [state] Locking Datavault
8,337,772 UART: [state] Locking PCR0, PCR1 and PCR31
8,338,376 UART: [state] Locking ICCM
8,338,950 UART: [exit] Launching FMC @ 0x40000130
8,344,280 UART:
8,344,296 UART: Running Caliptra FMC ...
8,344,704 UART:
8,344,847 UART: [state] CFI Enabled
8,434,172 UART: [art] Extend RT PCRs Done
8,434,600 UART: [art] Lock RT PCRs Done
8,435,965 UART: [art] Populate DV Done
8,444,138 UART: [fht] FMC Alias Private Key: 7
8,445,180 UART: [art] Derive CDI
8,445,460 UART: [art] Store in slot 0x4
8,531,323 UART: [art] Derive Key Pair
8,531,683 UART: [art] Store priv key in slot 0x5
8,545,185 UART: [art] Derive Key Pair - Done
8,560,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,575,874 UART: [art] Erasing AUTHORITY.KEYID = 7
8,576,639 UART: [art] PUB.X = 21CDFF8DE7E88504F526EED4CC5B5C7AFE464F1B8CC5217CF05D9A42A979F4F3F74F38245D311D9D5640511F366D8DDA
8,583,422 UART: [art] PUB.Y = 00CDCC10096A37AE8F7ECBDDE0E41DC9ECD4301B7B68CFC0A7E07B01CFFCD96866F6848F82D390F96964A3B3B17FE601
8,590,363 UART: [art] SIG.R = F79516383CEC1636E23A08ACED176C66904F65B28261982783254B17AA01D95923C38E68FFF1D4A4DBD3E4C2980741C1
8,597,122 UART: [art] SIG.S = 4EFF1C775C303A33B7B109C13668FF0B159F2665CD3001C43C8A6D4D20A1E0CA532189DCD1382DB6EFC4FC603247DDAA
8,620,657 UART: mbox::rt_entry...
8,621,029 UART: ____ _ _ _ ____ _____
8,621,813 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,622,613 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,623,381 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,624,149 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,624,917 UART: |_|
8,625,229 UART:
8,987,385 UART: [rt] Runtime listening for mailbox commands...
8,988,438 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,329 ready_for_fw is high
1,058,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,931 >>> mbox cmd response: success
2,740,348 UART:
2,740,364 UART: Running Caliptra FMC ...
2,740,772 UART:
2,740,915 UART: [state] CFI Enabled
2,751,309 UART: [fht] FMC Alias Private Key: 7
2,870,739 UART: [art] Extend RT PCRs Done
2,871,167 UART: [art] Lock RT PCRs Done
2,872,375 UART: [art] Populate DV Done
2,880,474 UART: [fht] FMC Alias Private Key: 7
2,881,614 UART: [art] Derive CDI
2,881,894 UART: [art] Store in slot 0x4
2,967,431 UART: [art] Derive Key Pair
2,967,791 UART: [art] Store priv key in slot 0x5
2,981,147 UART: [art] Derive Key Pair - Done
2,995,844 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,553 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,318 UART: [art] PUB.X = 9FAC8945B20BE0290B2BEC622F6F14860E95C5532EDC9BE984C50F2E5937BAFB8B6829B1960CA556AE066D3B75F72904
3,019,075 UART: [art] PUB.Y = 64BCF8A4474EE7086120F044BC9620DC83FEE4FC0C36A3A4F1CF38AE5BE7D3AEC209A6F8A7EC494F6192C6C7CBDA0176
3,026,035 UART: [art] SIG.R = B3BF4D8A0E1C42FD3018B5F4F1AC0F2C6704D3DAC182366EC14418C0EE82988B53E9595A9DC6B8F0A2D45DA23E9D58BC
3,032,814 UART: [art] SIG.S = 8EFB17AABD3A46794C345E2F4294379E9E3CC1D5D4D24DAD2C20C25BE72CC55F16B6EB0C517519B9190DCC2B9B407744
3,056,310 UART: Caliptra RT
3,056,653 UART: [state] CFI Enabled
3,176,395 UART: [rt] RT listening for mailbox commands...
3,177,065 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,893 UART: [rt]cmd =0x50435252, len=8
3,208,225 >>> mbox cmd response data (8 bytes)
3,208,226 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,235,038 >>> mbox cmd response: success
5,235,038 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,248,227 UART:
5,248,243 UART: Running Caliptra FMC ...
5,248,651 UART:
5,248,794 UART: [state] CFI Enabled
5,338,351 UART: [art] Extend RT PCRs Done
5,338,779 UART: [art] Lock RT PCRs Done
5,340,092 UART: [art] Populate DV Done
5,348,405 UART: [fht] FMC Alias Private Key: 7
5,349,377 UART: [art] Derive CDI
5,349,657 UART: [art] Store in slot 0x4
5,435,494 UART: [art] Derive Key Pair
5,435,854 UART: [art] Store priv key in slot 0x5
5,449,416 UART: [art] Derive Key Pair - Done
5,464,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,479,404 UART: [art] Erasing AUTHORITY.KEYID = 7
5,480,169 UART: [art] PUB.X = E3150BE8312157A6458E63C31FF699555AAD0B7C2464C6C912F1C0B959AA0F2DCA1E604DB04EAB0DAFEAA90A690115C7
5,486,935 UART: [art] PUB.Y = F792E1C50AAF4ADC6339708EBC69A44B4AD3EC8BA5F0A6C311C29B3BA93C1E71F8A1D09EA12A9B2C0F92A7D2D80C3036
5,493,898 UART: [art] SIG.R = 3D6CF16E87DA21EF5426B64EE46F7542BA1D8757E07169DCA51165F2419BD13C75E122AAE8BBC0699338ABFD58BA6A06
5,500,677 UART: [art] SIG.S = A66C75EEE4FDB0C11D089848E4E9093557F1F684C5995CCA29E26443E20E52DDD733D9C200F57DEF693C1E742C3E08F5
5,524,289 UART: mbox::rt_entry...
5,524,661 UART: ____ _ _ _ ____ _____
5,525,445 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,526,245 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,527,013 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,527,781 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,528,549 UART: |_|
5,528,861 UART:
5,890,407 UART: [rt] Runtime listening for mailbox commands...
5,891,460 >>> mbox cmd response data (128 bytes)
5,891,461 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,917,437 >>> mbox cmd response: success
7,917,437 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,930,838 UART:
7,930,854 UART: Running Caliptra FMC ...
7,931,262 UART:
7,931,405 UART: [state] CFI Enabled
8,020,700 UART: [art] Extend RT PCRs Done
8,021,128 UART: [art] Lock RT PCRs Done
8,022,343 UART: [art] Populate DV Done
8,030,454 UART: [fht] FMC Alias Private Key: 7
8,031,582 UART: [art] Derive CDI
8,031,862 UART: [art] Store in slot 0x4
8,117,209 UART: [art] Derive Key Pair
8,117,569 UART: [art] Store priv key in slot 0x5
8,131,399 UART: [art] Derive Key Pair - Done
8,146,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,161,831 UART: [art] Erasing AUTHORITY.KEYID = 7
8,162,596 UART: [art] PUB.X = FB13B6D008333D444B62CC479B3483A86450D2C1ECDE0168C9C905783D6E101D40B0CE6882DE2A35625A9338279CDBEA
8,169,361 UART: [art] PUB.Y = 233B62BE0D643E6E530A81542C4939E03F0B2325641B1E6AEBB25FDB0742CE3964836717865C6D5B55ECA695D2BD02D8
8,176,298 UART: [art] SIG.R = 8A26F5B54E10E491B048362D738F892B7A31C1504070455862111F1A6C087CC01634394C5C154829B60CEC07639CC11A
8,183,047 UART: [art] SIG.S = 6A6C9DD1570164401FCB7168FA28465D5D2C1429A3C941EA6499B72DC4BAB894ACDC390C5578EE4565360A08259C5294
8,206,113 UART: mbox::rt_entry...
8,206,485 UART: ____ _ _ _ ____ _____
8,207,269 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,208,069 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,208,837 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,209,605 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,210,373 UART: |_|
8,210,685 UART:
8,573,131 UART: [rt] Runtime listening for mailbox commands...
8,574,184 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,087 UART: [state] WD Timer not started. Device not locked for debugging
87,276 UART: [kat] SHA2-256
892,926 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,051 UART: [kat] ++
897,203 UART: [kat] sha1
901,625 UART: [kat] SHA2-256
903,565 UART: [kat] SHA2-384
906,166 UART: [kat] SHA2-512-ACC
908,067 UART: [kat] ECC-384
917,768 UART: [kat] HMAC-384Kdf
922,346 UART: [kat] LMS
1,170,674 UART: [kat] --
1,171,463 UART: [cold-reset] ++
1,171,859 UART: [fht] FHT @ 0x50003400
1,174,620 UART: [idev] ++
1,174,788 UART: [idev] CDI.KEYID = 6
1,175,148 UART: [idev] SUBJECT.KEYID = 7
1,175,572 UART: [idev] UDS.KEYID = 0
1,175,917 ready_for_fw is high
1,175,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,666 UART: [idev] Erasing UDS.KEYID = 0
1,201,065 UART: [idev] Sha1 KeyId Algorithm
1,209,527 UART: [idev] --
1,210,437 UART: [ldev] ++
1,210,605 UART: [ldev] CDI.KEYID = 6
1,210,968 UART: [ldev] SUBJECT.KEYID = 5
1,211,394 UART: [ldev] AUTHORITY.KEYID = 7
1,211,857 UART: [ldev] FE.KEYID = 1
1,216,873 UART: [ldev] Erasing FE.KEYID = 1
1,243,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,613 UART: [ldev] --
1,282,948 UART: [fwproc] Wait for Commands...
1,283,610 UART: [fwproc] Recv command 0x46574c44
1,284,338 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,028 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,198 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,561 >>> mbox cmd response: success
2,827,771 UART: [afmc] ++
2,827,939 UART: [afmc] CDI.KEYID = 6
2,828,301 UART: [afmc] SUBJECT.KEYID = 7
2,828,726 UART: [afmc] AUTHORITY.KEYID = 5
2,863,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,338 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,047 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,930 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,631 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,573 UART: [afmc] --
2,906,493 UART: [cold-reset] --
2,907,191 UART: [state] Locking Datavault
2,908,270 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,874 UART: [state] Locking ICCM
2,909,514 UART: [exit] Launching FMC @ 0x40000130
2,914,844 UART:
2,914,860 UART: Running Caliptra FMC ...
2,915,268 UART:
2,915,322 UART: [state] CFI Enabled
2,925,802 UART: [fht] FMC Alias Private Key: 7
3,044,612 UART: [art] Extend RT PCRs Done
3,045,040 UART: [art] Lock RT PCRs Done
3,046,724 UART: [art] Populate DV Done
3,054,763 UART: [fht] FMC Alias Private Key: 7
3,055,877 UART: [art] Derive CDI
3,056,157 UART: [art] Store in slot 0x4
3,141,904 UART: [art] Derive Key Pair
3,142,264 UART: [art] Store priv key in slot 0x5
3,154,668 UART: [art] Derive Key Pair - Done
3,169,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,111 UART: [art] PUB.X = 8D4FEDB15EE6DC6C3A9B29A1A67D6AE966C4EFC2B982067A461F33C1B09CA670CC70B4F9FD17564B6C3AC73D49486F80
3,191,896 UART: [art] PUB.Y = A8CB99F78238DC7714EB989AF6EB38D9CA9BA9994232B931B495EE64A62ECCEB8F23702EB3C089DFBB72582914288E0B
3,198,855 UART: [art] SIG.R = 16DE0D4BBF46D847C4C798BFA27A61F48298E2D5638335A90E121C2C24F2BE5E691549504005D41A49C9F32E39A1AF66
3,205,618 UART: [art] SIG.S = 286E107ACEC013D5D1287C3FF9D23FFEFB094BDB77B85DE4960261C03AC7BA821396D13CDA23C8F3745FB1313DE4447E
3,229,626 UART: Caliptra RT
3,229,877 UART: [state] CFI Enabled
3,350,649 UART: [rt] RT listening for mailbox commands...
3,351,319 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,327 UART: [rt]cmd =0x50435252, len=8
3,382,745 >>> mbox cmd response data (8 bytes)
3,382,746 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,459 UART:
3,383,475 UART: Running Caliptra ROM ...
3,383,883 UART:
3,383,938 UART: [state] CFI Enabled
3,386,688 UART: [state] LifecycleState = Unprovisioned
3,387,343 UART: [state] DebugLocked = No
3,387,891 UART: [state] WD Timer not started. Device not locked for debugging
3,389,153 UART: [kat] SHA2-256
4,194,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,198,928 UART: [kat] ++
4,199,080 UART: [kat] sha1
4,203,244 UART: [kat] SHA2-256
4,205,184 UART: [kat] SHA2-384
4,207,893 UART: [kat] SHA2-512-ACC
4,209,793 UART: [kat] ECC-384
4,219,562 UART: [kat] HMAC-384Kdf
4,224,186 UART: [kat] LMS
4,472,514 UART: [kat] --
4,473,400 UART: [update-reset] ++
5,423,411 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,468 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,526,109 >>> mbox cmd response: success
5,526,109 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,526,324 UART: [update-reset] Copying MAN_2 To MAN_1
5,534,338 UART: [update-reset Success] --
5,535,481 UART: [state] Locking Datavault
5,536,239 UART: [state] Locking PCR0, PCR1 and PCR31
5,536,843 UART: [state] Locking ICCM
5,537,365 UART: [exit] Launching FMC @ 0x40000130
5,542,695 UART:
5,542,711 UART: Running Caliptra FMC ...
5,543,119 UART:
5,543,173 UART: [state] CFI Enabled
5,632,446 UART: [art] Extend RT PCRs Done
5,632,874 UART: [art] Lock RT PCRs Done
5,634,033 UART: [art] Populate DV Done
5,642,248 UART: [fht] FMC Alias Private Key: 7
5,643,194 UART: [art] Derive CDI
5,643,474 UART: [art] Store in slot 0x4
5,729,091 UART: [art] Derive Key Pair
5,729,451 UART: [art] Store priv key in slot 0x5
5,742,627 UART: [art] Derive Key Pair - Done
5,757,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,772,772 UART: [art] Erasing AUTHORITY.KEYID = 7
5,773,537 UART: [art] PUB.X = A6EA3D75AF603F4BEC4045CC15AA717DA6142BAC54983DB32638F4DCC3E4970001E59C1EE9D296193C272E1C2D55089C
5,780,289 UART: [art] PUB.Y = 0B3EDF391EE004A5BBD9DADFA7D0D6019D641CD1BB401F8646C2868CC67CD0F83A30B72CA73DE2526BC02542553AD0F8
5,787,248 UART: [art] SIG.R = 3D2C9EC5F3924993280105D58C96A247E27E3CCF9DBEE51200293EB6838FC45E9CA022AA3921E2A2B7206D3458FD90CF
5,793,996 UART: [art] SIG.S = 7839BB84353404D2492C32C05496CAC3C689153B2D41C12A06185504EA65ED9178EA121B51941B3BAB6FD796957E0B6D
5,818,398 UART: mbox::rt_entry...
5,818,770 UART: ____ _ _ _ ____ _____
5,819,554 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,820,354 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,821,122 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,821,890 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,822,658 UART: |_|
5,822,970 UART:
6,187,395 UART: [rt] Runtime listening for mailbox commands...
6,188,448 >>> mbox cmd response data (128 bytes)
6,188,449 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,188,560 UART:
6,188,576 UART: Running Caliptra ROM ...
6,188,984 UART:
6,189,039 UART: [state] CFI Enabled
6,191,551 UART: [state] LifecycleState = Unprovisioned
6,192,206 UART: [state] DebugLocked = No
6,192,824 UART: [state] WD Timer not started. Device not locked for debugging
6,194,058 UART: [kat] SHA2-256
6,999,708 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,003,833 UART: [kat] ++
7,003,985 UART: [kat] sha1
7,008,293 UART: [kat] SHA2-256
7,010,233 UART: [kat] SHA2-384
7,012,904 UART: [kat] SHA2-512-ACC
7,014,804 UART: [kat] ECC-384
7,024,527 UART: [kat] HMAC-384Kdf
7,029,175 UART: [kat] LMS
7,277,503 UART: [kat] --
7,278,333 UART: [update-reset] ++
8,229,648 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,230,747 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,332,388 >>> mbox cmd response: success
8,332,388 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,332,645 UART: [update-reset] Copying MAN_2 To MAN_1
8,340,659 UART: [update-reset Success] --
8,341,570 UART: [state] Locking Datavault
8,342,560 UART: [state] Locking PCR0, PCR1 and PCR31
8,343,164 UART: [state] Locking ICCM
8,343,816 UART: [exit] Launching FMC @ 0x40000130
8,349,146 UART:
8,349,162 UART: Running Caliptra FMC ...
8,349,570 UART:
8,349,624 UART: [state] CFI Enabled
8,438,759 UART: [art] Extend RT PCRs Done
8,439,187 UART: [art] Lock RT PCRs Done
8,440,378 UART: [art] Populate DV Done
8,448,623 UART: [fht] FMC Alias Private Key: 7
8,449,785 UART: [art] Derive CDI
8,450,065 UART: [art] Store in slot 0x4
8,536,070 UART: [art] Derive Key Pair
8,536,430 UART: [art] Store priv key in slot 0x5
8,549,666 UART: [art] Derive Key Pair - Done
8,564,478 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,579,751 UART: [art] Erasing AUTHORITY.KEYID = 7
8,580,516 UART: [art] PUB.X = 224C42B281F0C86DA9F255AC27EDFC73C9F71EBF89DC08FB0CEE0BA9AD1F69BD5E67D0BE5CF7099C1E7B03E0A170E4EC
8,587,301 UART: [art] PUB.Y = 43B181CD6FC0F51907438FE904DAFCE7F899AFBED95335A6B24E412640F9940E046D3C21049EFC4182AEA4605B6CC786
8,594,244 UART: [art] SIG.R = B34C3D487B5FA3A01B3E376C7C050B8595FAE2D7FEECC767C120F3814F402B4EBD60817A56077B216D13AC0228736D8E
8,601,010 UART: [art] SIG.S = 1554BD2C82D1A4E73C0BE3C800E6DCEB62057E070427FB94E9778045BF3F772BDB179F494B3479BF22FB6321FBEBBE53
8,624,758 UART: mbox::rt_entry...
8,625,130 UART: ____ _ _ _ ____ _____
8,625,914 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,626,714 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,627,482 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,628,250 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,629,018 UART: |_|
8,629,330 UART:
8,990,066 UART: [rt] Runtime listening for mailbox commands...
8,991,119 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,885 ready_for_fw is high
1,059,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,474 >>> mbox cmd response: success
2,741,129 UART:
2,741,145 UART: Running Caliptra FMC ...
2,741,553 UART:
2,741,607 UART: [state] CFI Enabled
2,752,253 UART: [fht] FMC Alias Private Key: 7
2,870,819 UART: [art] Extend RT PCRs Done
2,871,247 UART: [art] Lock RT PCRs Done
2,872,661 UART: [art] Populate DV Done
2,880,582 UART: [fht] FMC Alias Private Key: 7
2,881,524 UART: [art] Derive CDI
2,881,804 UART: [art] Store in slot 0x4
2,967,381 UART: [art] Derive Key Pair
2,967,741 UART: [art] Store priv key in slot 0x5
2,980,899 UART: [art] Derive Key Pair - Done
2,995,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,710 UART: [art] PUB.X = 504E0D14BCF9C2E216A0DF67CDCA5217D40B1F054A7F57D3F58B45C8831638B170F90D249904FF4B8C25BCF26E4A8096
3,018,473 UART: [art] PUB.Y = 3754243C0EDF7B8FF53C2BE354DE295E3B8D5A3102C05EC11752A2600730AC4E0D46C1D1E21F898602EAF886558A19CF
3,025,414 UART: [art] SIG.R = 7CCF8662BB3D887549969218E1EE4E43CD127116DF1888E983F7DD948E38C3A3386C60617422AFE66823F74B667A584C
3,032,180 UART: [art] SIG.S = D66E99FA7ACAEC1B6600BF84B713BA0D48E9AB970AC4BECDE905CC132B62EBCA24C4ECD363B214575FE94A26D2BC5428
3,056,233 UART: Caliptra RT
3,056,484 UART: [state] CFI Enabled
3,175,895 UART: [rt] RT listening for mailbox commands...
3,176,565 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,179 UART: [rt]cmd =0x50435252, len=8
3,207,857 >>> mbox cmd response data (8 bytes)
3,207,858 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,235,234 >>> mbox cmd response: success
5,235,234 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,248,379 UART:
5,248,395 UART: Running Caliptra FMC ...
5,248,803 UART:
5,248,857 UART: [state] CFI Enabled
5,337,478 UART: [art] Extend RT PCRs Done
5,337,906 UART: [art] Lock RT PCRs Done
5,339,179 UART: [art] Populate DV Done
5,347,464 UART: [fht] FMC Alias Private Key: 7
5,348,620 UART: [art] Derive CDI
5,348,900 UART: [art] Store in slot 0x4
5,434,841 UART: [art] Derive Key Pair
5,435,201 UART: [art] Store priv key in slot 0x5
5,449,273 UART: [art] Derive Key Pair - Done
5,464,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,479,243 UART: [art] Erasing AUTHORITY.KEYID = 7
5,480,008 UART: [art] PUB.X = 2AF9584FB0AD49851E7193FF69BB577A3D7D4A91D15EEE4FA9FDCFAE716E63E92FA60BECA2855B203CE17D06D42DBD73
5,486,796 UART: [art] PUB.Y = DE3AAF7B7ECC43CEEFBD7441899091DBBDC1AE970ABCC85E8CA926E51A44D4580D0AB10256F33D79C558E4341F8C51F8
5,493,756 UART: [art] SIG.R = ED28BF2EC8E8E9803EDB69B28D52B9416E161403A07CA1BB8FF752801775B57E13D898E73432D32A2BDB4793EAAE2EF3
5,500,535 UART: [art] SIG.S = C36A9B706100A1BD6CB2E79D74C9829A9736DE9F2B674CFA1E4313BB7C528DDCA84DC0A402FF4DA7548CBC5879CBAC71
5,524,658 UART: mbox::rt_entry...
5,525,030 UART: ____ _ _ _ ____ _____
5,525,814 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,526,614 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,527,382 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,528,150 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,528,918 UART: |_|
5,529,230 UART:
5,886,585 UART: [rt] Runtime listening for mailbox commands...
5,887,638 >>> mbox cmd response data (128 bytes)
5,887,639 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,915,277 >>> mbox cmd response: success
7,915,277 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,928,632 UART:
7,928,648 UART: Running Caliptra FMC ...
7,929,056 UART:
7,929,110 UART: [state] CFI Enabled
8,017,689 UART: [art] Extend RT PCRs Done
8,018,117 UART: [art] Lock RT PCRs Done
8,019,568 UART: [art] Populate DV Done
8,027,823 UART: [fht] FMC Alias Private Key: 7
8,028,973 UART: [art] Derive CDI
8,029,253 UART: [art] Store in slot 0x4
8,115,172 UART: [art] Derive Key Pair
8,115,532 UART: [art] Store priv key in slot 0x5
8,128,546 UART: [art] Derive Key Pair - Done
8,143,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,158,567 UART: [art] Erasing AUTHORITY.KEYID = 7
8,159,332 UART: [art] PUB.X = AF268587A4E7C88FCAB2FC1E45FF37DB214DC174CAD60BFF0DEB5F6FA0F98733D350757176BF32451968CE0086D162C9
8,166,088 UART: [art] PUB.Y = 6C63727DA41E45A02F01AA80BD0E3ABA82751A3ECF405EC5A59C2A152DAEB96570A69072B5AC41BBFCC1410E23A8F0BA
8,173,049 UART: [art] SIG.R = 1C63796A293F2ECA41C96C09F3D9448A82393643C21FF576679A348C69E80F632DE081C6FE776AFF6CE900DAD8C457D8
8,179,795 UART: [art] SIG.S = 558540B1E6463F9979DCDB06848133F4727F4A33FA3DA7F1F49B0F1D95CC11B615837F62F15ADE1DB51EEF2DB99225D7
8,203,225 UART: mbox::rt_entry...
8,203,597 UART: ____ _ _ _ ____ _____
8,204,381 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,205,181 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,205,949 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,206,717 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,207,485 UART: |_|
8,207,797 UART:
8,575,136 UART: [rt] Runtime listening for mailbox commands...
8,576,189 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,817 UART: [state] LifecycleState = Unprovisioned
86,472 UART: [state] DebugLocked = No
87,112 UART: [state] WD Timer not started. Device not locked for debugging
88,349 UART: [kat] SHA2-256
893,999 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,124 UART: [kat] ++
898,276 UART: [kat] sha1
902,652 UART: [kat] SHA2-256
904,592 UART: [kat] SHA2-384
907,159 UART: [kat] SHA2-512-ACC
909,060 UART: [kat] ECC-384
918,649 UART: [kat] HMAC-384Kdf
923,365 UART: [kat] LMS
1,171,693 UART: [kat] --
1,172,732 UART: [cold-reset] ++
1,173,250 UART: [fht] FHT @ 0x50003400
1,175,917 UART: [idev] ++
1,176,085 UART: [idev] CDI.KEYID = 6
1,176,445 UART: [idev] SUBJECT.KEYID = 7
1,176,869 UART: [idev] UDS.KEYID = 0
1,177,214 ready_for_fw is high
1,177,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,977 UART: [idev] Erasing UDS.KEYID = 0
1,201,690 UART: [idev] Sha1 KeyId Algorithm
1,210,366 UART: [idev] --
1,211,516 UART: [ldev] ++
1,211,684 UART: [ldev] CDI.KEYID = 6
1,212,047 UART: [ldev] SUBJECT.KEYID = 5
1,212,473 UART: [ldev] AUTHORITY.KEYID = 7
1,212,936 UART: [ldev] FE.KEYID = 1
1,218,072 UART: [ldev] Erasing FE.KEYID = 1
1,244,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,048 UART: [ldev] --
1,284,507 UART: [fwproc] Wait for Commands...
1,285,173 UART: [fwproc] Recv command 0x46574c44
1,285,901 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,515 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,685 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,986 >>> mbox cmd response: success
2,830,014 UART: [afmc] ++
2,830,182 UART: [afmc] CDI.KEYID = 6
2,830,544 UART: [afmc] SUBJECT.KEYID = 7
2,830,969 UART: [afmc] AUTHORITY.KEYID = 5
2,866,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,485 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,194 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,077 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,778 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,540 UART: [afmc] --
2,909,530 UART: [cold-reset] --
2,910,210 UART: [state] Locking Datavault
2,911,347 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,951 UART: [state] Locking ICCM
2,912,429 UART: [exit] Launching FMC @ 0x40000130
2,917,759 UART:
2,917,775 UART: Running Caliptra FMC ...
2,918,183 UART:
2,918,326 UART: [state] CFI Enabled
2,928,778 UART: [fht] FMC Alias Private Key: 7
3,047,806 UART: [art] Extend RT PCRs Done
3,048,234 UART: [art] Lock RT PCRs Done
3,049,976 UART: [art] Populate DV Done
3,058,265 UART: [fht] FMC Alias Private Key: 7
3,059,217 UART: [art] Derive CDI
3,059,497 UART: [art] Store in slot 0x4
3,145,246 UART: [art] Derive Key Pair
3,145,606 UART: [art] Store priv key in slot 0x5
3,159,120 UART: [art] Derive Key Pair - Done
3,173,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,803 UART: [art] PUB.X = DCDF724E1A292E078EED68B88AB1C89B7DDCD9F2738DBF8CD28739682962ECCE572C96494C6DF633EEAC953EF8FF9814
3,195,590 UART: [art] PUB.Y = 1BB930F6018DA4E3321F4E19321D787BFC4AC667724E726C39EFFE55609B95F905925183C955AC00E1FB8F4BC54E1497
3,202,514 UART: [art] SIG.R = 1F34D4BF49F8373CD09947A6715D9EC7F71AEC6236B60CECCBD3727FFE2D28A1A0E688B4EE6359EEDF33B9719CF3A956
3,209,299 UART: [art] SIG.S = 5EDD708B650DA97A56FD35F9C723C933EAD04A14292E52FC35F21BAA63631DFB46ACD05F81CDFF82D14E4A921DE99623
3,232,934 UART: Caliptra RT
3,233,277 UART: [state] CFI Enabled
3,352,341 UART: [rt] RT listening for mailbox commands...
3,353,011 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,773 UART: [rt]cmd =0x50435252, len=8
3,384,213 >>> mbox cmd response data (8 bytes)
3,384,214 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,219 UART:
3,385,235 UART: Running Caliptra ROM ...
3,385,643 UART:
3,385,785 UART: [state] CFI Enabled
3,388,131 UART: [state] LifecycleState = Unprovisioned
3,388,786 UART: [state] DebugLocked = No
3,389,510 UART: [state] WD Timer not started. Device not locked for debugging
3,390,722 UART: [kat] SHA2-256
4,196,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,200,497 UART: [kat] ++
4,200,649 UART: [kat] sha1
4,204,857 UART: [kat] SHA2-256
4,206,797 UART: [kat] SHA2-384
4,209,640 UART: [kat] SHA2-512-ACC
4,211,540 UART: [kat] ECC-384
4,221,135 UART: [kat] HMAC-384Kdf
4,225,649 UART: [kat] LMS
4,473,977 UART: [kat] --
4,474,763 UART: [update-reset] ++
5,426,138 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,427,263 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,528,904 >>> mbox cmd response: success
5,528,904 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,529,131 UART: [update-reset] Copying MAN_2 To MAN_1
5,537,145 UART: [update-reset Success] --
5,537,994 UART: [state] Locking Datavault
5,538,724 UART: [state] Locking PCR0, PCR1 and PCR31
5,539,328 UART: [state] Locking ICCM
5,539,802 UART: [exit] Launching FMC @ 0x40000130
5,545,132 UART:
5,545,148 UART: Running Caliptra FMC ...
5,545,556 UART:
5,545,699 UART: [state] CFI Enabled
5,635,366 UART: [art] Extend RT PCRs Done
5,635,794 UART: [art] Lock RT PCRs Done
5,637,007 UART: [art] Populate DV Done
5,645,222 UART: [fht] FMC Alias Private Key: 7
5,646,224 UART: [art] Derive CDI
5,646,504 UART: [art] Store in slot 0x4
5,732,329 UART: [art] Derive Key Pair
5,732,689 UART: [art] Store priv key in slot 0x5
5,745,995 UART: [art] Derive Key Pair - Done
5,760,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,776,390 UART: [art] Erasing AUTHORITY.KEYID = 7
5,777,155 UART: [art] PUB.X = 8CCCF23949F04D8454AFEAAEADA392E8D21D8DFAC2F6AD094D40D2348771DE261D337C5A330A066BDAFC77EBEC46EBF8
5,783,944 UART: [art] PUB.Y = 67584F6D4A3B97AB49075FD44951B0CEA1DB7BCDE2DE0927ADC38AAC45608E3F77D2626802706CD8B1FE298E45002CA9
5,790,875 UART: [art] SIG.R = 17D1AFB4351C05E9F2F3E8B0D917D09014FA280B0DCD62683F85FEDF8AF2169E3286B94A641DB7E64D1463FD86A378E1
5,797,646 UART: [art] SIG.S = C212EC90EF9B0FBD5D9E10E1D1A3E40F97E5319ED06008015458F719D67F2DEC080633793F63F243BBE918BA2188061F
5,821,663 UART: mbox::rt_entry...
5,822,035 UART: ____ _ _ _ ____ _____
5,822,819 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,823,619 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,824,387 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,825,155 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,825,923 UART: |_|
5,826,235 UART:
6,191,867 UART: [rt] Runtime listening for mailbox commands...
6,192,920 >>> mbox cmd response data (128 bytes)
6,192,921 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,193,032 UART:
6,193,048 UART: Running Caliptra ROM ...
6,193,456 UART:
6,193,598 UART: [state] CFI Enabled
6,196,558 UART: [state] LifecycleState = Unprovisioned
6,197,213 UART: [state] DebugLocked = No
6,197,821 UART: [state] WD Timer not started. Device not locked for debugging
6,199,159 UART: [kat] SHA2-256
7,004,809 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,008,934 UART: [kat] ++
7,009,086 UART: [kat] sha1
7,013,298 UART: [kat] SHA2-256
7,015,238 UART: [kat] SHA2-384
7,018,153 UART: [kat] SHA2-512-ACC
7,020,053 UART: [kat] ECC-384
7,029,852 UART: [kat] HMAC-384Kdf
7,034,594 UART: [kat] LMS
7,282,922 UART: [kat] --
7,283,792 UART: [update-reset] ++
8,234,923 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,236,114 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,337,755 >>> mbox cmd response: success
8,337,755 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,337,986 UART: [update-reset] Copying MAN_2 To MAN_1
8,346,000 UART: [update-reset Success] --
8,347,119 UART: [state] Locking Datavault
8,347,915 UART: [state] Locking PCR0, PCR1 and PCR31
8,348,519 UART: [state] Locking ICCM
8,349,185 UART: [exit] Launching FMC @ 0x40000130
8,354,515 UART:
8,354,531 UART: Running Caliptra FMC ...
8,354,939 UART:
8,355,082 UART: [state] CFI Enabled
8,443,731 UART: [art] Extend RT PCRs Done
8,444,159 UART: [art] Lock RT PCRs Done
8,445,398 UART: [art] Populate DV Done
8,453,917 UART: [fht] FMC Alias Private Key: 7
8,455,081 UART: [art] Derive CDI
8,455,361 UART: [art] Store in slot 0x4
8,541,232 UART: [art] Derive Key Pair
8,541,592 UART: [art] Store priv key in slot 0x5
8,555,300 UART: [art] Derive Key Pair - Done
8,569,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,585,135 UART: [art] Erasing AUTHORITY.KEYID = 7
8,585,900 UART: [art] PUB.X = 7EA1F3247E0BBA1CB1C7DB36E1408C89149E51FDFB584F1CEBC3EE079FFE4263A891C81DF7600F89ECB35A7D1DE9541F
8,592,683 UART: [art] PUB.Y = F916709D93DD50952F1B48A85F1F1D479BF3A3B0005AD5A1FE34CB03ABBDB544CEDD8F18D8763DA2761E10F830D86EFC
8,599,626 UART: [art] SIG.R = 8F58396B9D9A2ACD4AFD05EC9D1889CE5059032FC2BE4A8825F31D53D889EDC21B85FAF8E3F20709F491CBE36644D687
8,606,396 UART: [art] SIG.S = B3C6AE537CCE7715E24D41D2F6BF0FBA338A52BE1E2B9AE837BC13B6DF1F792AE03EDB4F5A73186211E2D6A524B9F800
8,630,125 UART: mbox::rt_entry...
8,630,497 UART: ____ _ _ _ ____ _____
8,631,281 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,632,081 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,632,849 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,633,617 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,634,385 UART: |_|
8,634,697 UART:
9,000,278 UART: [rt] Runtime listening for mailbox commands...
9,001,331 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,542 ready_for_fw is high
1,060,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,161 >>> mbox cmd response: success
2,742,506 UART:
2,742,522 UART: Running Caliptra FMC ...
2,742,930 UART:
2,743,073 UART: [state] CFI Enabled
2,753,685 UART: [fht] FMC Alias Private Key: 7
2,873,249 UART: [art] Extend RT PCRs Done
2,873,677 UART: [art] Lock RT PCRs Done
2,875,153 UART: [art] Populate DV Done
2,883,556 UART: [fht] FMC Alias Private Key: 7
2,884,524 UART: [art] Derive CDI
2,884,804 UART: [art] Store in slot 0x4
2,970,861 UART: [art] Derive Key Pair
2,971,221 UART: [art] Store priv key in slot 0x5
2,984,149 UART: [art] Derive Key Pair - Done
2,998,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,373 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,138 UART: [art] PUB.X = 678C882D2279593B049A7C458D356880C0427FBD2ED07204ED7E5331A9BF68EEE33301CB635CADD9F136A75A3C30EA6E
3,021,905 UART: [art] PUB.Y = 7F21F41B6C3EC7C45DDA1388426C90BF681A064E9D8EF75DD79334B3140AEA89DA56AB6878FC44F1F220ED4298FF608E
3,028,861 UART: [art] SIG.R = 40160B31EB460F3E11651EC573D144068920A87540B6D0D05960CF09AEBB5F0F92FE2B2CBD50F2EF5DEB0085C20BFEE1
3,035,603 UART: [art] SIG.S = 65C441A13261376AB0E21DEC2C4A006C5A69B9486900FA033138D0B27076418737C46975D4D219E082A1F4222F780E5F
3,059,353 UART: Caliptra RT
3,059,696 UART: [state] CFI Enabled
3,179,460 UART: [rt] RT listening for mailbox commands...
3,180,130 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,194 UART: [rt]cmd =0x50435252, len=8
3,211,488 >>> mbox cmd response data (8 bytes)
3,211,489 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,240,376 >>> mbox cmd response: success
5,240,376 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,253,759 UART:
5,253,775 UART: Running Caliptra FMC ...
5,254,183 UART:
5,254,326 UART: [state] CFI Enabled
5,343,837 UART: [art] Extend RT PCRs Done
5,344,265 UART: [art] Lock RT PCRs Done
5,345,328 UART: [art] Populate DV Done
5,353,279 UART: [fht] FMC Alias Private Key: 7
5,354,457 UART: [art] Derive CDI
5,354,737 UART: [art] Store in slot 0x4
5,440,522 UART: [art] Derive Key Pair
5,440,882 UART: [art] Store priv key in slot 0x5
5,454,268 UART: [art] Derive Key Pair - Done
5,469,063 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,484,404 UART: [art] Erasing AUTHORITY.KEYID = 7
5,485,169 UART: [art] PUB.X = 306A5ECCD7EC3B86E6DFA0D723BAC4DE53D31B9DEC2275DDD10E67C2D21F24BA46196653B3E8FCEB90FB1C2715EB126A
5,491,962 UART: [art] PUB.Y = 822944C30E57CA09084A463EFF12DA49ABCCAF0A539BB617B8AC1839B1320599B9DC364F2FD28928A8588DFDCEC76742
5,498,907 UART: [art] SIG.R = B372176BEB4DEE62C41B6520441B08F247908C70C64B90CB136FADB5F528B670356D15E5D5134BBDB33532DC225B2C40
5,505,678 UART: [art] SIG.S = 663F8A56187D9054448F9C23A51DE3ED04B8134777066E93B6EFEAF63EED653F81C91EAF5644A1C6B159E761F9F8141F
5,529,592 UART: mbox::rt_entry...
5,529,964 UART: ____ _ _ _ ____ _____
5,530,748 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,531,548 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,532,316 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,533,084 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,533,852 UART: |_|
5,534,164 UART:
5,900,026 UART: [rt] Runtime listening for mailbox commands...
5,901,079 >>> mbox cmd response data (128 bytes)
5,901,080 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,928,185 >>> mbox cmd response: success
7,928,185 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,941,680 UART:
7,941,696 UART: Running Caliptra FMC ...
7,942,104 UART:
7,942,247 UART: [state] CFI Enabled
8,031,158 UART: [art] Extend RT PCRs Done
8,031,586 UART: [art] Lock RT PCRs Done
8,032,915 UART: [art] Populate DV Done
8,041,086 UART: [fht] FMC Alias Private Key: 7
8,042,262 UART: [art] Derive CDI
8,042,542 UART: [art] Store in slot 0x4
8,128,629 UART: [art] Derive Key Pair
8,128,989 UART: [art] Store priv key in slot 0x5
8,142,335 UART: [art] Derive Key Pair - Done
8,157,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,172,826 UART: [art] Erasing AUTHORITY.KEYID = 7
8,173,591 UART: [art] PUB.X = 0E171C9632AEBFA2A544ADF6B60CEB346FFF41513A9B3EB7D183BE41C7B6A1397A93D24C4CD62BDF284F409FF77AE62F
8,180,377 UART: [art] PUB.Y = 0AFB2334446EDE1F8F0DFD05B595FCB80BE544F9001E223C12539E3B5458285C2F2DBF82B3C3BF2FB5A99404CEDF6730
8,187,304 UART: [art] SIG.R = 98984C14FA82D153761C455F024B7BEF54234E77CACC9B8CB247DADAB8CF9EE2C4C753541B9FA0F5C93FA05E4B16E1B0
8,194,089 UART: [art] SIG.S = A8CD8917D81D32DC145E23069FAD4982221B36286517C7822697DD79883A5587AAB76B9B9E2CAF4734031A82E30FE040
8,217,584 UART: mbox::rt_entry...
8,217,956 UART: ____ _ _ _ ____ _____
8,218,740 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,219,540 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,220,308 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,221,076 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,221,844 UART: |_|
8,222,156 UART:
8,583,333 UART: [rt] Runtime listening for mailbox commands...
8,584,386 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,046 UART:
192,412 UART: Running Caliptra ROM ...
193,516 UART:
193,660 UART: [state] CFI Enabled
265,406 UART: [state] LifecycleState = Unprovisioned
267,400 UART: [state] DebugLocked = No
268,996 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,716 UART: [kat] SHA2-256
444,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,912 UART: [kat] ++
455,358 UART: [kat] sha1
466,709 UART: [kat] SHA2-256
469,450 UART: [kat] SHA2-384
475,154 UART: [kat] SHA2-512-ACC
477,527 UART: [kat] ECC-384
2,767,553 UART: [kat] HMAC-384Kdf
2,800,250 UART: [kat] LMS
3,990,528 UART: [kat] --
3,994,471 UART: [cold-reset] ++
3,995,407 UART: [fht] Storing FHT @ 0x50003400
4,006,320 UART: [idev] ++
4,006,892 UART: [idev] CDI.KEYID = 6
4,007,929 UART: [idev] SUBJECT.KEYID = 7
4,009,107 UART: [idev] UDS.KEYID = 0
4,010,160 ready_for_fw is high
4,010,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,509 UART: [idev] Erasing UDS.KEYID = 0
7,346,114 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,011 UART: [idev] --
7,370,553 UART: [ldev] ++
7,371,121 UART: [ldev] CDI.KEYID = 6
7,372,061 UART: [ldev] SUBJECT.KEYID = 5
7,373,201 UART: [ldev] AUTHORITY.KEYID = 7
7,374,538 UART: [ldev] FE.KEYID = 1
7,421,793 UART: [ldev] Erasing FE.KEYID = 1
10,753,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,019 UART: [ldev] --
13,116,017 UART: [fwproc] Waiting for Commands...
13,118,000 UART: [fwproc] Received command 0x46574c44
13,120,192 UART: [fwproc] Received Image of size 118548 bytes
17,225,102 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,297,353 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,370,475 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,698,573 >>> mbox cmd response: success
17,702,014 UART: [afmc] ++
17,702,655 UART: [afmc] CDI.KEYID = 6
17,703,574 UART: [afmc] SUBJECT.KEYID = 7
17,704,795 UART: [afmc] AUTHORITY.KEYID = 5
21,070,823 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,556 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,813 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,288 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,946 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,374 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,051 UART: [afmc] --
23,443,113 UART: [cold-reset] --
23,447,154 UART: [state] Locking Datavault
23,451,864 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,616 UART: [state] Locking ICCM
23,455,983 UART: [exit] Launching FMC @ 0x40000130
23,464,392 UART:
23,464,664 UART: Running Caliptra FMC ...
23,465,775 UART:
23,465,937 UART: [state] CFI Enabled
23,530,411 UART: [fht] FMC Alias Private Key: 7
25,871,156 UART: [art] Extend RT PCRs Done
25,872,379 UART: [art] Lock RT PCRs Done
25,873,489 UART: [art] Populate DV Done
25,879,014 UART: [fht] FMC Alias Private Key: 7
25,880,552 UART: [art] Derive CDI
25,881,364 UART: [art] Store in slot 0x4
25,939,596 UART: [art] Derive Key Pair
25,940,656 UART: [art] Store priv key in slot 0x5
29,233,020 UART: [art] Derive Key Pair - Done
29,246,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,535,685 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,192 UART: [art] PUB.X = 171E269D0DB99AC5204D09D67E0636A43EC439EE05935E85ECBBF08D2C46A739F0CECBC6271A468AF1AABF5A4B57ECFB
31,544,540 UART: [art] PUB.Y = F0C04AAEFBCD01ED3A52BB94E8BB95604D941849C1ACE4B3962D43482F87786EADA817488100946C64D251E7D61A3DDB
31,551,752 UART: [art] SIG.R = FE7E59BBD30706DE51898E51F49A8D1F85F502383DAC3ECB91B702C12AF35E75ED9A01170AACBD6E488D903AB01D0B8D
31,559,121 UART: [art] SIG.S = F88F90A842E297963CB7889B2E5724BFF81A5D619BC8A9EA8196CF8AB63417EDB41801B97673C7C9C66B96C2B852F111
32,864,798 UART: Caliptra RT
32,865,519 UART: [state] CFI Enabled
33,043,015 UART: [rt] RT listening for mailbox commands...
35,110,929 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,216,890 UART:
35,217,257 UART: Running Caliptra ROM ...
35,218,388 UART:
35,218,556 UART: [state] CFI Enabled
35,292,550 UART: [state] LifecycleState = Unprovisioned
35,294,475 UART: [state] DebugLocked = No
35,297,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,302,048 UART: [kat] SHA2-256
35,471,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,482,262 UART: [kat] ++
35,482,801 UART: [kat] sha1
35,494,557 UART: [kat] SHA2-256
35,497,244 UART: [kat] SHA2-384
35,502,100 UART: [kat] SHA2-512-ACC
35,504,503 UART: [kat] ECC-384
37,793,671 UART: [kat] HMAC-384Kdf
37,825,476 UART: [kat] LMS
39,015,844 UART: [kat] --
39,021,748 UART: [update-reset] ++
42,772,398 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,776,936 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,049,660 >>> mbox cmd response: success
43,050,039 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,050,820 UART: [update-reset] Copying MAN_2 To MAN_1
43,073,266 UART: [update-reset Success] --
43,077,379 UART: [state] Locking Datavault
43,080,857 UART: [state] Locking PCR0, PCR1 and PCR31
43,082,622 UART: [state] Locking ICCM
43,084,942 UART: [exit] Launching FMC @ 0x40000130
43,093,401 UART:
43,093,636 UART: Running Caliptra FMC ...
43,094,665 UART:
43,094,836 UART: [state] CFI Enabled
43,191,731 UART: [art] Extend RT PCRs Done
43,192,914 UART: [art] Lock RT PCRs Done
43,194,022 UART: [art] Populate DV Done
43,199,593 UART: [fht] FMC Alias Private Key: 7
43,201,285 UART: [art] Derive CDI
43,202,023 UART: [art] Store in slot 0x4
43,260,663 UART: [art] Derive Key Pair
43,261,703 UART: [art] Store priv key in slot 0x5
46,554,860 UART: [art] Derive Key Pair - Done
46,567,743 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,856,068 UART: [art] Erasing AUTHORITY.KEYID = 7
48,857,576 UART: [art] PUB.X = 0FA00CE225D1FF7215D95E5ECD36186FD1851955CDF9E3E6CF71B66DC49F889DC933AB43D9AFE41E04515F0664118C00
48,864,786 UART: [art] PUB.Y = D2DB870D083C3D9AEA7582404ACFF6D3F44BB67706C1C7AB28848FE715146503DC7009F048865F78E3FDDE5C55E6919C
48,872,087 UART: [art] SIG.R = 36C2E1297FF057025423828824FCD3945A281B8A510837ACF7565B99FEDCDCD064444D3899AD4D216671E55EB6636B76
48,879,453 UART: [art] SIG.S = 84C5C1DECFBA29D2734B8966E5D159C32796371F2C19DD5F03BE6C69F7AB5BA5E1BE16E0B82C3266CEA0BC21F2643D26
50,184,107 UART: mbox::rt_entry...
50,185,074 UART: ____ _ _ _ ____ _____
50,187,061 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,189,070 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,191,006 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,192,936 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,194,860 UART: |_|
50,195,670 UART:
50,569,542 UART: [rt] Runtime listening for mailbox commands...
50,571,762 >>> mbox cmd response data (48 bytes)
50,572,342 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,572,772 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
3,782,002 ready_for_fw is high
3,782,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,934,160 >>> mbox cmd response: success
23,624,593 UART:
23,625,021 UART: Running Caliptra FMC ...
23,626,176 UART:
23,626,341 UART: [state] CFI Enabled
23,695,806 UART: [fht] FMC Alias Private Key: 7
26,035,884 UART: [art] Extend RT PCRs Done
26,037,111 UART: [art] Lock RT PCRs Done
26,039,066 UART: [art] Populate DV Done
26,044,542 UART: [fht] FMC Alias Private Key: 7
26,046,050 UART: [art] Derive CDI
26,046,872 UART: [art] Store in slot 0x4
26,103,919 UART: [art] Derive Key Pair
26,104,960 UART: [art] Store priv key in slot 0x5
29,397,694 UART: [art] Derive Key Pair - Done
29,410,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,700,278 UART: [art] Erasing AUTHORITY.KEYID = 7
31,701,785 UART: [art] PUB.X = A559CF70B571D5A4A1158F2DA2F492CFEA871EA1B9C7983F86BD583ADE154AF8A40CE4A1A347AC71E62A1F2740284CDB
31,709,052 UART: [art] PUB.Y = 95F966A5E5370A52490D615D106A17870BF0E556880197463DEC7489AF2C24EA365CC0B1B4B653D3FE8364BEF2B80049
31,716,314 UART: [art] SIG.R = 5E0FA35149DBB5E065096AEE3DBC3C28CF5A44C9C4120EAD09A66DB83F0A95727E08E30C4E5AD14DF02E3A3D4F1446B9
31,723,717 UART: [art] SIG.S = DADCC997717480C5B5B5E05D69AA121ACC44FC5041FB48B338D3124A0BCA76708FF0016E6DA13A9B4A5AAA1A05D017E3
33,029,060 UART: Caliptra RT
33,029,787 UART: [state] CFI Enabled
33,225,446 UART: [rt] RT listening for mailbox commands...
35,295,136 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,358,589 >>> mbox cmd response: success
43,359,174 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,394,209 UART:
43,394,492 UART: Running Caliptra FMC ...
43,395,525 UART:
43,395,673 UART: [state] CFI Enabled
43,483,618 UART: [art] Extend RT PCRs Done
43,484,814 UART: [art] Lock RT PCRs Done
43,486,352 UART: [art] Populate DV Done
43,491,598 UART: [fht] FMC Alias Private Key: 7
43,493,122 UART: [art] Derive CDI
43,494,069 UART: [art] Store in slot 0x4
43,552,029 UART: [art] Derive Key Pair
43,553,058 UART: [art] Store priv key in slot 0x5
46,845,721 UART: [art] Derive Key Pair - Done
46,858,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,146,810 UART: [art] Erasing AUTHORITY.KEYID = 7
49,148,325 UART: [art] PUB.X = B59F74E132009D015F126BE1D8B9595EA2079B567372F63939FA7A388B4F561329BD0D6A1210028E1ED88619BCAAFF9A
49,155,533 UART: [art] PUB.Y = DE3A97E07392EF09AC8E6FE7488FF2F115EB15C9C288CCE9062AB8E43F239010B3DAB3F89A18B6386930002376BE1966
49,162,782 UART: [art] SIG.R = BB6148E5520FABB2EE8BF8C92D96B988384035F89D79AAFC2ABE8B6BBA4F7325B9D0E4E2CF6DC997C5F21EBBE752CF3F
49,170,241 UART: [art] SIG.S = 0C62A91E383A0EE4CECF8B15B49CACFB48D8FBA9CC6CE39B8BB30EC2D0CF560BD12DE2973DFC7C8B384F417D0FE0D813
50,474,836 UART: mbox::rt_entry...
50,475,807 UART: ____ _ _ _ ____ _____
50,477,911 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,479,917 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,481,841 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,483,766 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,485,690 UART: |_|
50,486,497 UART:
50,856,824 UART: [rt] Runtime listening for mailbox commands...
50,858,998 >>> mbox cmd response data (48 bytes)
50,859,579 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,860,035 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,535 UART:
192,886 UART: Running Caliptra ROM ...
194,072 UART:
603,688 UART: [state] CFI Enabled
618,138 UART: [state] LifecycleState = Unprovisioned
620,120 UART: [state] DebugLocked = No
621,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,435 UART: [kat] SHA2-256
796,133 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,716 UART: [kat] ++
807,158 UART: [kat] sha1
818,098 UART: [kat] SHA2-256
820,744 UART: [kat] SHA2-384
826,300 UART: [kat] SHA2-512-ACC
828,730 UART: [kat] ECC-384
3,110,741 UART: [kat] HMAC-384Kdf
3,122,401 UART: [kat] LMS
4,312,493 UART: [kat] --
4,317,296 UART: [cold-reset] ++
4,319,870 UART: [fht] Storing FHT @ 0x50003400
4,331,996 UART: [idev] ++
4,332,563 UART: [idev] CDI.KEYID = 6
4,333,538 UART: [idev] SUBJECT.KEYID = 7
4,334,704 UART: [idev] UDS.KEYID = 0
4,335,845 ready_for_fw is high
4,336,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,923 UART: [idev] Erasing UDS.KEYID = 0
7,626,436 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,559 UART: [idev] --
7,652,221 UART: [ldev] ++
7,652,981 UART: [ldev] CDI.KEYID = 6
7,653,871 UART: [ldev] SUBJECT.KEYID = 5
7,654,967 UART: [ldev] AUTHORITY.KEYID = 7
7,656,251 UART: [ldev] FE.KEYID = 1
7,666,330 UART: [ldev] Erasing FE.KEYID = 1
10,954,886 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,629 UART: [ldev] --
13,317,883 UART: [fwproc] Waiting for Commands...
13,321,263 UART: [fwproc] Received command 0x46574c44
13,323,445 UART: [fwproc] Received Image of size 118548 bytes
17,433,821 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,877 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,075 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,490 >>> mbox cmd response: success
17,910,351 UART: [afmc] ++
17,910,975 UART: [afmc] CDI.KEYID = 6
17,911,890 UART: [afmc] SUBJECT.KEYID = 7
17,913,155 UART: [afmc] AUTHORITY.KEYID = 5
21,226,119 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,450 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,748 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,141 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,890 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,302 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,260 UART: [afmc] --
23,591,646 UART: [cold-reset] --
23,595,180 UART: [state] Locking Datavault
23,599,288 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,988 UART: [state] Locking ICCM
23,603,511 UART: [exit] Launching FMC @ 0x40000130
23,611,902 UART:
23,612,132 UART: Running Caliptra FMC ...
23,613,224 UART:
23,613,379 UART: [state] CFI Enabled
23,621,709 UART: [fht] FMC Alias Private Key: 7
25,961,798 UART: [art] Extend RT PCRs Done
25,963,013 UART: [art] Lock RT PCRs Done
25,964,634 UART: [art] Populate DV Done
25,969,881 UART: [fht] FMC Alias Private Key: 7
25,971,480 UART: [art] Derive CDI
25,972,294 UART: [art] Store in slot 0x4
26,014,853 UART: [art] Derive Key Pair
26,015,877 UART: [art] Store priv key in slot 0x5
29,257,558 UART: [art] Derive Key Pair - Done
29,270,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,534 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,038 UART: [art] PUB.X = 4B6845A426262E21E530CADA6D619AF7BC24BBB828C2F185881CF60F95B9A381A0360CF875BC363978C880AB88EB5A7C
31,560,344 UART: [art] PUB.Y = E2597677D6FFAB7C4E34F56120B22C51C99423DFB17EF67F4ECDF0DB250119CAAA950732F3BE1E5BBBEF834D8B7E9703
31,567,584 UART: [art] SIG.R = BDB807E788ACC13ECAC74F1F877A91F266C9EF3E229A7312A597D5E9F5350859EF8216B615952179282CAF700B758F32
31,575,017 UART: [art] SIG.S = 00DA7836E770B3E08DCA22F932193CF8C049D3265410569D90BEC6DE591655796EE6ACE99702FF2EAAC6EE4C7F35E873
32,880,692 UART: Caliptra RT
32,881,387 UART: [state] CFI Enabled
33,015,230 UART: [rt] RT listening for mailbox commands...
35,078,515 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,184,702 UART:
35,185,081 UART: Running Caliptra ROM ...
35,186,141 UART:
35,186,349 UART: [state] CFI Enabled
35,202,904 UART: [state] LifecycleState = Unprovisioned
35,204,852 UART: [state] DebugLocked = No
35,206,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,211,915 UART: [kat] SHA2-256
35,381,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,392,194 UART: [kat] ++
35,392,734 UART: [kat] sha1
35,404,538 UART: [kat] SHA2-256
35,407,224 UART: [kat] SHA2-384
35,412,500 UART: [kat] SHA2-512-ACC
35,414,899 UART: [kat] ECC-384
37,697,340 UART: [kat] HMAC-384Kdf
37,709,801 UART: [kat] LMS
38,899,859 UART: [kat] --
38,906,014 UART: [update-reset] ++
42,662,990 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,667,424 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,940,157 >>> mbox cmd response: success
42,940,535 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,940,979 UART: [update-reset] Copying MAN_2 To MAN_1
42,963,381 UART: [update-reset Success] --
42,968,201 UART: [state] Locking Datavault
42,972,467 UART: [state] Locking PCR0, PCR1 and PCR31
42,974,212 UART: [state] Locking ICCM
42,976,977 UART: [exit] Launching FMC @ 0x40000130
42,985,413 UART:
42,985,639 UART: Running Caliptra FMC ...
42,986,655 UART:
42,986,797 UART: [state] CFI Enabled
43,030,706 UART: [art] Extend RT PCRs Done
43,031,894 UART: [art] Lock RT PCRs Done
43,033,326 UART: [art] Populate DV Done
43,038,897 UART: [fht] FMC Alias Private Key: 7
43,040,551 UART: [art] Derive CDI
43,041,365 UART: [art] Store in slot 0x4
43,084,047 UART: [art] Derive Key Pair
43,085,077 UART: [art] Store priv key in slot 0x5
46,327,086 UART: [art] Derive Key Pair - Done
46,340,141 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,620,228 UART: [art] Erasing AUTHORITY.KEYID = 7
48,621,734 UART: [art] PUB.X = 19337359C6CE71E3E39266DFBF14EF02E6F97EC8790489118829038229CB8031B65D97CB2A21D191310271F11895CFB3
48,628,985 UART: [art] PUB.Y = ED1F5FE9C6B9FB5D6CAFFC679213710DBABBE35B18590786794840E77E2373EC1A112A1C843DA4EA56155B82D5F5CE0D
48,636,271 UART: [art] SIG.R = A6EFA380D566990F5ECF2DC9FBCF01319A8F09993C43FA9A5A563280F623F19D0C25100C2C5529BBBB7EFFF1E4BDFBDB
48,643,677 UART: [art] SIG.S = F275D14AD1665F98D4212740BB1F641D6A7692F192C83F1BA2179F0007BA1EECF1566D9012CDAF425C9B4701700AF96E
49,948,551 UART: mbox::rt_entry...
49,949,523 UART: ____ _ _ _ ____ _____
49,951,508 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,953,508 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,955,429 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,957,349 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,959,278 UART: |_|
49,960,112 UART:
50,335,626 UART: [rt] Runtime listening for mailbox commands...
50,337,802 >>> mbox cmd response data (48 bytes)
50,338,367 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,338,740 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
4,123,154 ready_for_fw is high
4,123,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,067 >>> mbox cmd response: success
23,796,065 UART:
23,796,497 UART: Running Caliptra FMC ...
23,797,612 UART:
23,797,768 UART: [state] CFI Enabled
23,805,605 UART: [fht] FMC Alias Private Key: 7
26,145,466 UART: [art] Extend RT PCRs Done
26,146,718 UART: [art] Lock RT PCRs Done
26,148,324 UART: [art] Populate DV Done
26,153,797 UART: [fht] FMC Alias Private Key: 7
26,155,548 UART: [art] Derive CDI
26,156,282 UART: [art] Store in slot 0x4
26,199,253 UART: [art] Derive Key Pair
26,200,251 UART: [art] Store priv key in slot 0x5
29,442,480 UART: [art] Derive Key Pair - Done
29,455,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,883 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,390 UART: [art] PUB.X = F654734F055923BC713C7053E828FC23BD730A3934F51EF35B7A382EE05AB52B78FCEACE0C8B2EBC61626390D2D437D3
31,744,642 UART: [art] PUB.Y = 44B99777952710C9C1778C4A8A8FC5B2A3F8A872111D5533DE6113D4A317AD8488808F64A17EA58B64306566F32A1F88
31,751,907 UART: [art] SIG.R = 3146F5C3F949F5F7BE53A73EB1CA1C026D27E386D459EA80BE7365ECB316648D696780F4B4DDFAE0CADEB137C3CEA234
31,759,308 UART: [art] SIG.S = 8F644F079B59801746912D215A12A5165ECC6436BCFF08FB099942C98EA9F266B1C36625A47150330CBA45D99B6832A9
33,064,839 UART: Caliptra RT
33,065,561 UART: [state] CFI Enabled
33,199,303 UART: [rt] RT listening for mailbox commands...
35,265,792 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,252,082 >>> mbox cmd response: success
43,252,621 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,284,906 UART:
43,285,217 UART: Running Caliptra FMC ...
43,286,253 UART:
43,286,400 UART: [state] CFI Enabled
43,330,955 UART: [art] Extend RT PCRs Done
43,332,101 UART: [art] Lock RT PCRs Done
43,333,583 UART: [art] Populate DV Done
43,339,043 UART: [fht] FMC Alias Private Key: 7
43,340,762 UART: [art] Derive CDI
43,341,508 UART: [art] Store in slot 0x4
43,384,344 UART: [art] Derive Key Pair
43,385,342 UART: [art] Store priv key in slot 0x5
46,627,083 UART: [art] Derive Key Pair - Done
46,640,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,920,985 UART: [art] Erasing AUTHORITY.KEYID = 7
48,922,491 UART: [art] PUB.X = 755AE3BECFC46A7B488B1B040219C0942BEA4A650F60DE5C44AD959DDA23B9A9F080211E94F83D2DA43D23C0E96672E4
48,929,735 UART: [art] PUB.Y = 94BF5462D53B5F9DC4D9E0638FE2F2370F7D0D71C308C619AB338A0A338DF19782958E3A2F1A07CCB45A2F6699477BBD
48,937,020 UART: [art] SIG.R = 512D3147FFF14FA63E80D5717A754750B5CE8D6EA5BEE27FC4009CEE097829B25EF628964ADD89E88492D57772C191A7
48,944,446 UART: [art] SIG.S = FDED21684D654BA3D7F9E922FE171156D6173BB8179E85E3AC48342119D535A66ACEAF191CB1D2AD0E34CB9456FBADBC
50,249,015 UART: mbox::rt_entry...
50,249,983 UART: ____ _ _ _ ____ _____
50,251,915 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,253,915 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,255,843 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,257,784 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,259,710 UART: |_|
50,260,693 UART:
50,632,395 UART: [rt] Runtime listening for mailbox commands...
50,634,566 >>> mbox cmd response data (48 bytes)
50,635,179 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,635,607 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,080 UART:
192,445 UART: Running Caliptra ROM ...
193,647 UART:
193,801 UART: [state] CFI Enabled
260,509 UART: [state] LifecycleState = Unprovisioned
262,486 UART: [state] DebugLocked = No
264,266 UART: [state] WD Timer not started. Device not locked for debugging
268,957 UART: [kat] SHA2-256
448,667 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,593 UART: [kat] ++
460,071 UART: [kat] sha1
470,884 UART: [kat] SHA2-256
473,550 UART: [kat] SHA2-384
478,208 UART: [kat] SHA2-512-ACC
480,571 UART: [kat] ECC-384
2,925,177 UART: [kat] HMAC-384Kdf
2,949,306 UART: [kat] LMS
3,425,791 UART: [kat] --
3,430,631 UART: [cold-reset] ++
3,432,771 UART: [fht] FHT @ 0x50003400
3,443,880 UART: [idev] ++
3,444,516 UART: [idev] CDI.KEYID = 6
3,445,396 UART: [idev] SUBJECT.KEYID = 7
3,446,637 UART: [idev] UDS.KEYID = 0
3,447,628 ready_for_fw is high
3,447,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,902 UART: [idev] Erasing UDS.KEYID = 0
5,966,057 UART: [idev] Sha1 KeyId Algorithm
5,990,527 UART: [idev] --
5,995,808 UART: [ldev] ++
5,996,433 UART: [ldev] CDI.KEYID = 6
5,997,314 UART: [ldev] SUBJECT.KEYID = 5
5,998,527 UART: [ldev] AUTHORITY.KEYID = 7
5,999,812 UART: [ldev] FE.KEYID = 1
6,034,247 UART: [ldev] Erasing FE.KEYID = 1
8,544,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,101 UART: [ldev] --
10,353,691 UART: [fwproc] Wait for Commands...
10,355,888 UART: [fwproc] Recv command 0x46574c44
10,357,924 UART: [fwproc] Recv'd Img size: 118548 bytes
13,846,673 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,926,770 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,999,795 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,327,896 >>> mbox cmd response: success
14,332,485 UART: [afmc] ++
14,333,104 UART: [afmc] CDI.KEYID = 6
14,334,014 UART: [afmc] SUBJECT.KEYID = 7
14,335,228 UART: [afmc] AUTHORITY.KEYID = 5
16,876,348 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,419 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,615 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,405 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,448 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,056 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,551 UART: [afmc] --
18,697,098 UART: [cold-reset] --
18,699,834 UART: [state] Locking Datavault
18,704,761 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,525 UART: [state] Locking ICCM
18,708,974 UART: [exit] Launching FMC @ 0x40000130
18,717,370 UART:
18,717,602 UART: Running Caliptra FMC ...
18,718,699 UART:
18,718,855 UART: [state] CFI Enabled
18,777,317 UART: [fht] FMC Alias Private Key: 7
20,543,474 UART: [art] Extend RT PCRs Done
20,544,692 UART: [art] Lock RT PCRs Done
20,546,365 UART: [art] Populate DV Done
20,551,989 UART: [fht] FMC Alias Private Key: 7
20,553,574 UART: [art] Derive CDI
20,554,387 UART: [art] Store in slot 0x4
20,609,686 UART: [art] Derive Key Pair
20,610,679 UART: [art] Store priv key in slot 0x5
23,073,185 UART: [art] Derive Key Pair - Done
23,086,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,799 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,314 UART: [art] PUB.X = BC4FE9CBE8228BC24D02A8B4D6C2BDA989073650DD43F24CC83D390C1C355E4E9596D05462879B22DED6A2566F120D13
24,808,566 UART: [art] PUB.Y = 5A1D71EF6EBC355F0EDFFD075C4F4EB368EA3E393D8160511B9EA6EC00913EF3547239CF8F5F08A8D9AC8B80E336A8CC
24,815,805 UART: [art] SIG.R = 6FAC0DFF0BBB301A854A53726B8F20DE8AC68EA31B7F9E795B3DE2F78F65C04EB003DF257C3EB608E846DDF9E78CEF2C
24,823,199 UART: [art] SIG.S = D5AC37BC372C627F89C670466A142777FA2CB50FF36FFA6B272CB556413DAD67CBE760F841D9EA953C0196A2579565EF
25,801,751 UART: Caliptra RT
25,802,436 UART: [state] CFI Enabled
25,983,221 UART: [rt] RT listening for mailbox commands...
28,038,353 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,144,589 UART:
28,144,969 UART: Running Caliptra ROM ...
28,146,096 UART:
28,146,271 UART: [state] CFI Enabled
28,210,816 UART: [state] LifecycleState = Unprovisioned
28,212,767 UART: [state] DebugLocked = No
28,214,681 UART: [state] WD Timer not started. Device not locked for debugging
28,217,996 UART: [kat] SHA2-256
28,397,631 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,408,426 UART: [kat] ++
28,408,966 UART: [kat] sha1
28,420,019 UART: [kat] SHA2-256
28,422,716 UART: [kat] SHA2-384
28,427,727 UART: [kat] SHA2-512-ACC
28,430,069 UART: [kat] ECC-384
30,893,252 UART: [kat] HMAC-384Kdf
30,917,312 UART: [kat] LMS
31,393,731 UART: [kat] --
31,399,390 UART: [update-reset] ++
34,456,933 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,459,927 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,732,393 >>> mbox cmd response: success
34,732,767 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,734,137 UART: [update-reset] Copying MAN_2 To MAN_1
34,771,263 UART: [update-reset Success] --
34,776,677 UART: [state] Locking Datavault
34,779,948 UART: [state] Locking PCR0, PCR1 and PCR31
34,781,742 UART: [state] Locking ICCM
34,783,791 UART: [exit] Launching FMC @ 0x40000130
34,792,189 UART:
34,792,421 UART: Running Caliptra FMC ...
34,793,518 UART:
34,793,674 UART: [state] CFI Enabled
34,897,124 UART: [art] Extend RT PCRs Done
34,898,313 UART: [art] Lock RT PCRs Done
34,899,686 UART: [art] Populate DV Done
34,905,411 UART: [fht] FMC Alias Private Key: 7
34,906,994 UART: [art] Derive CDI
34,907,803 UART: [art] Store in slot 0x4
34,966,272 UART: [art] Derive Key Pair
34,967,339 UART: [art] Store priv key in slot 0x5
37,429,830 UART: [art] Derive Key Pair - Done
37,442,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,155,401 UART: [art] Erasing AUTHORITY.KEYID = 7
39,156,910 UART: [art] PUB.X = 30DDE6BC3EA86E6C14A9E95424EB0AD75E308970C34549E03E7E88B01166B2A4BDD22F80FF458CAE08BA05BE08A3DCCC
39,164,212 UART: [art] PUB.Y = EF7AE08FC8CFBB8DE78BE2626983E3CD17E9E02F49CE6978DAB720DEA5BC42C2F6ED19B553735D86B0254BF8EB3AA18B
39,171,499 UART: [art] SIG.R = 2415145D381369346272FE75D2EAE64E9DB7A65A15CB02969D9207F29CFDA1305C4458391164F0D8BA5094325F4F8621
39,178,898 UART: [art] SIG.S = C475A155BAD0C42977184703D57F000A8D88CE206AA4E3481786681AB8688C6BE7DC11CE90B53433EDFD483EB2E8D62C
40,157,889 UART: mbox::rt_entry...
40,158,862 UART: ____ _ _ _ ____ _____
40,160,789 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,162,791 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,164,716 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,166,637 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,168,561 UART: |_|
40,169,390 UART:
40,540,569 UART: [rt] Runtime listening for mailbox commands...
40,542,789 >>> mbox cmd response data (48 bytes)
40,543,370 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,543,869 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,459,292 ready_for_fw is high
3,459,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,214,490 >>> mbox cmd response: success
18,494,129 UART:
18,494,557 UART: Running Caliptra FMC ...
18,495,671 UART:
18,495,832 UART: [state] CFI Enabled
18,562,070 UART: [fht] FMC Alias Private Key: 7
20,328,722 UART: [art] Extend RT PCRs Done
20,329,949 UART: [art] Lock RT PCRs Done
20,331,635 UART: [art] Populate DV Done
20,337,044 UART: [fht] FMC Alias Private Key: 7
20,338,583 UART: [art] Derive CDI
20,339,393 UART: [art] Store in slot 0x4
20,394,710 UART: [art] Derive Key Pair
20,395,745 UART: [art] Store priv key in slot 0x5
22,858,896 UART: [art] Derive Key Pair - Done
22,872,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,584,552 UART: [art] Erasing AUTHORITY.KEYID = 7
24,586,058 UART: [art] PUB.X = 2A6F58F3A09EF5A3C7D1D227526790E9282A8271F721AD0C25379A0181A679DFF109642B0794F259F7795442D26D0907
24,593,317 UART: [art] PUB.Y = 7007D35F7C976DB8721BD73559F57E22F06407838823B7719139B377AE076DC33FE95DC4F95B1C7BB1688A76E82CBAD2
24,600,548 UART: [art] SIG.R = DEB9BCC3179BD629954999632813D619F1370828974CE555CF5C37092AC7BC87C492A2240C6138BEA7DB400E87972F8D
24,607,894 UART: [art] SIG.S = E7A29377F02DA1DB6616974C4CA14178DF15C77F888B8780E2F87982296A4BF121CEAF3CAB08B51F163BE4C74C7C51DB
25,587,008 UART: Caliptra RT
25,587,729 UART: [state] CFI Enabled
25,766,906 UART: [rt] RT listening for mailbox commands...
27,826,292 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,517,988 >>> mbox cmd response: success
34,518,460 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,552,829 UART:
34,553,142 UART: Running Caliptra FMC ...
34,554,264 UART:
34,554,425 UART: [state] CFI Enabled
34,641,368 UART: [art] Extend RT PCRs Done
34,642,561 UART: [art] Lock RT PCRs Done
34,644,017 UART: [art] Populate DV Done
34,649,587 UART: [fht] FMC Alias Private Key: 7
34,651,154 UART: [art] Derive CDI
34,651,919 UART: [art] Store in slot 0x4
34,711,151 UART: [art] Derive Key Pair
34,712,197 UART: [art] Store priv key in slot 0x5
37,174,990 UART: [art] Derive Key Pair - Done
37,188,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,900,602 UART: [art] Erasing AUTHORITY.KEYID = 7
38,902,108 UART: [art] PUB.X = 99D5AF553DB2F2D99CA83A119CADF48636CD13DE83AAF5FADDDA061738930D3F2BCAD921405D3F849DACA50AFBEC2394
38,909,411 UART: [art] PUB.Y = DE2237EFDC44976ADD8EB7AB2EACE58C2F2F28908876535AAEAAC6B6B52BD856F42FB5F4B7FF85A6B99AE17EACF046A3
38,916,668 UART: [art] SIG.R = 5A672398224FFB5E9B1A733C1854DE098265F6A3D24BB1581D076E004B5CD5D83DE1E683519749629F9611D6B7933A0B
38,924,096 UART: [art] SIG.S = 3753330BB6256F50B886820E4B9E42C4089DDEEC32BE6B6D6D51D6E93106075F3D3DDC0316922C5C862F2BB273E18017
39,902,297 UART: mbox::rt_entry...
39,903,249 UART: ____ _ _ _ ____ _____
39,905,227 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,907,230 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,909,158 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,911,079 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,912,935 UART: |_|
39,913,729 UART:
40,286,621 UART: [rt] Runtime listening for mailbox commands...
40,288,790 >>> mbox cmd response data (48 bytes)
40,289,349 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,289,775 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,474 UART:
192,829 UART: Running Caliptra ROM ...
194,155 UART:
603,614 UART: [state] CFI Enabled
618,923 UART: [state] LifecycleState = Unprovisioned
620,879 UART: [state] DebugLocked = No
622,693 UART: [state] WD Timer not started. Device not locked for debugging
625,810 UART: [kat] SHA2-256
805,499 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,246 UART: [kat] ++
816,703 UART: [kat] sha1
828,072 UART: [kat] SHA2-256
830,732 UART: [kat] SHA2-384
835,531 UART: [kat] SHA2-512-ACC
837,934 UART: [kat] ECC-384
3,278,169 UART: [kat] HMAC-384Kdf
3,291,396 UART: [kat] LMS
3,767,902 UART: [kat] --
3,773,487 UART: [cold-reset] ++
3,774,860 UART: [fht] FHT @ 0x50003400
3,787,473 UART: [idev] ++
3,788,034 UART: [idev] CDI.KEYID = 6
3,789,104 UART: [idev] SUBJECT.KEYID = 7
3,790,210 UART: [idev] UDS.KEYID = 0
3,791,140 ready_for_fw is high
3,791,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,284 UART: [idev] Erasing UDS.KEYID = 0
6,264,441 UART: [idev] Sha1 KeyId Algorithm
6,287,325 UART: [idev] --
6,292,477 UART: [ldev] ++
6,293,108 UART: [ldev] CDI.KEYID = 6
6,293,995 UART: [ldev] SUBJECT.KEYID = 5
6,295,153 UART: [ldev] AUTHORITY.KEYID = 7
6,296,446 UART: [ldev] FE.KEYID = 1
6,307,357 UART: [ldev] Erasing FE.KEYID = 1
8,786,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,724 UART: [ldev] --
10,583,017 UART: [fwproc] Wait for Commands...
10,585,603 UART: [fwproc] Recv command 0x46574c44
10,587,590 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,844 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,859 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,084 >>> mbox cmd response: success
14,551,691 UART: [afmc] ++
14,552,310 UART: [afmc] CDI.KEYID = 6
14,553,252 UART: [afmc] SUBJECT.KEYID = 7
14,554,478 UART: [afmc] AUTHORITY.KEYID = 5
17,059,733 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,218 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,054 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,084 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,676 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,024 UART: [afmc] --
18,857,155 UART: [cold-reset] --
18,862,907 UART: [state] Locking Datavault
18,868,153 UART: [state] Locking PCR0, PCR1 and PCR31
18,869,856 UART: [state] Locking ICCM
18,872,182 UART: [exit] Launching FMC @ 0x40000130
18,880,590 UART:
18,880,830 UART: Running Caliptra FMC ...
18,881,951 UART:
18,882,121 UART: [state] CFI Enabled
18,890,121 UART: [fht] FMC Alias Private Key: 7
20,656,239 UART: [art] Extend RT PCRs Done
20,657,465 UART: [art] Lock RT PCRs Done
20,659,386 UART: [art] Populate DV Done
20,664,642 UART: [fht] FMC Alias Private Key: 7
20,666,347 UART: [art] Derive CDI
20,667,167 UART: [art] Store in slot 0x4
20,709,830 UART: [art] Derive Key Pair
20,710,877 UART: [art] Store priv key in slot 0x5
23,138,361 UART: [art] Derive Key Pair - Done
23,151,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,382 UART: [art] Erasing AUTHORITY.KEYID = 7
24,859,875 UART: [art] PUB.X = B69228F3F4D15C4CC7A55D7EBE76C8C14CC04157706A1FC6C70ACBB83E8F3C54A2844B3BD118EA897EE40389AF20ADBE
24,867,172 UART: [art] PUB.Y = C4B6E67D05EEE07555A458584516E6C89BEE91AF1D69A2B95AF0DEFF42FC4FC5D2D602C8107CC4B3EC96ED141C572251
24,874,529 UART: [art] SIG.R = 491BF1D8B24DF0A1428E100D9B79F592CFAD8740772A250C0D2719310E4B05FEDB077859DCE777BEA4B73071F8CF93D3
24,881,869 UART: [art] SIG.S = C172560EF848F6E4E5BD74988F8BF99C65D669CB06E8C146E33067462B19294E6C712E649DD22B9E72FC958E200B061C
25,861,122 UART: Caliptra RT
25,861,819 UART: [state] CFI Enabled
25,994,175 UART: [rt] RT listening for mailbox commands...
28,047,652 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,153,637 UART:
28,153,990 UART: Running Caliptra ROM ...
28,155,078 UART:
28,155,246 UART: [state] CFI Enabled
28,170,989 UART: [state] LifecycleState = Unprovisioned
28,172,898 UART: [state] DebugLocked = No
28,174,684 UART: [state] WD Timer not started. Device not locked for debugging
28,179,259 UART: [kat] SHA2-256
28,358,964 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,369,741 UART: [kat] ++
28,370,230 UART: [kat] sha1
28,380,098 UART: [kat] SHA2-256
28,382,803 UART: [kat] SHA2-384
28,388,738 UART: [kat] SHA2-512-ACC
28,391,090 UART: [kat] ECC-384
30,832,528 UART: [kat] HMAC-384Kdf
30,845,894 UART: [kat] LMS
31,322,382 UART: [kat] --
31,327,776 UART: [update-reset] ++
34,384,773 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,388,529 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,661,120 >>> mbox cmd response: success
34,661,520 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,661,812 UART: [update-reset] Copying MAN_2 To MAN_1
34,698,648 UART: [update-reset Success] --
34,704,456 UART: [state] Locking Datavault
34,707,775 UART: [state] Locking PCR0, PCR1 and PCR31
34,709,533 UART: [state] Locking ICCM
34,712,015 UART: [exit] Launching FMC @ 0x40000130
34,720,425 UART:
34,720,664 UART: Running Caliptra FMC ...
34,721,718 UART:
34,721,871 UART: [state] CFI Enabled
34,766,336 UART: [art] Extend RT PCRs Done
34,767,527 UART: [art] Lock RT PCRs Done
34,768,988 UART: [art] Populate DV Done
34,774,618 UART: [fht] FMC Alias Private Key: 7
34,776,316 UART: [art] Derive CDI
34,777,150 UART: [art] Store in slot 0x4
34,819,423 UART: [art] Derive Key Pair
34,820,426 UART: [art] Store priv key in slot 0x5
37,247,101 UART: [art] Derive Key Pair - Done
37,260,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,966,599 UART: [art] Erasing AUTHORITY.KEYID = 7
38,968,090 UART: [art] PUB.X = FF4BBAE67B4BFC2F66E34E6D20AC99F5C6EE6D9ED4992FABCA2DAD04540C15F8CBD1C167117EB51399814B9D3582291E
38,975,396 UART: [art] PUB.Y = A7A238BE55E9145A20F0B59E095501846C9A3726B1D33C740C413915B9ADC4E116093A143B134A06B1C834EB1D63F67B
38,982,675 UART: [art] SIG.R = B63C8CABB476C378B2AAD5041B855F129DEB4DF5EF6FF4B0379E396338D872672E3BA1F4440E0FAAAA7B0C3E5841B009
38,990,060 UART: [art] SIG.S = F8831562A99D3515DA28F75B297480F31F8B5759A05E9B221D83FBB0144ED6191050DFA6F81523E5C24D1D6AC6700E6D
39,968,985 UART: mbox::rt_entry...
39,969,949 UART: ____ _ _ _ ____ _____
39,971,939 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,973,949 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,975,882 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,977,819 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,979,694 UART: |_|
39,980,495 UART:
40,354,732 UART: [rt] Runtime listening for mailbox commands...
40,356,900 >>> mbox cmd response data (48 bytes)
40,357,520 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,357,954 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,786,091 ready_for_fw is high
3,786,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,715 >>> mbox cmd response: success
18,689,376 UART:
18,689,770 UART: Running Caliptra FMC ...
18,690,914 UART:
18,691,078 UART: [state] CFI Enabled
18,698,930 UART: [fht] FMC Alias Private Key: 7
20,464,876 UART: [art] Extend RT PCRs Done
20,466,107 UART: [art] Lock RT PCRs Done
20,467,661 UART: [art] Populate DV Done
20,473,249 UART: [fht] FMC Alias Private Key: 7
20,474,741 UART: [art] Derive CDI
20,475,497 UART: [art] Store in slot 0x4
20,518,424 UART: [art] Derive Key Pair
20,519,457 UART: [art] Store priv key in slot 0x5
22,946,444 UART: [art] Derive Key Pair - Done
22,959,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,666,246 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,747 UART: [art] PUB.X = 4D11D991E00B645C642A0D539DB5212063A50AB7025AC38E8041C3B55B7B33DADBCE35E80AD3FCA68963627A2B292C24
24,675,022 UART: [art] PUB.Y = 13C42D8C7111E30A54FA3C70F49E02B2F63B2A60A6D2417DC8A1360ACFA29F32DC298046DFC93EBD315BA2D61E1859C0
24,682,304 UART: [art] SIG.R = D8B648B6AEF618C1B4BB5856D24F6BD7FEED89DD006C67395A7C54B4FEDDC4CD7D42A6D35232DBDB0A1BE40B60C8CD46
24,689,719 UART: [art] SIG.S = 5DE62C7DFA5CCA774A462642A6430F570D97B69EE115FEC81005FFAFDF53C9334CEFAADA0EC093B90BB0F3B0676CC24F
25,668,669 UART: Caliptra RT
25,669,371 UART: [state] CFI Enabled
25,802,073 UART: [rt] RT listening for mailbox commands...
27,853,433 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,460,461 >>> mbox cmd response: success
34,460,994 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,494,567 UART:
34,494,843 UART: Running Caliptra FMC ...
34,495,914 UART:
34,496,069 UART: [state] CFI Enabled
34,540,002 UART: [art] Extend RT PCRs Done
34,541,203 UART: [art] Lock RT PCRs Done
34,542,666 UART: [art] Populate DV Done
34,548,295 UART: [fht] FMC Alias Private Key: 7
34,549,863 UART: [art] Derive CDI
34,550,627 UART: [art] Store in slot 0x4
34,593,125 UART: [art] Derive Key Pair
34,594,169 UART: [art] Store priv key in slot 0x5
37,020,829 UART: [art] Derive Key Pair - Done
37,033,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,740,205 UART: [art] Erasing AUTHORITY.KEYID = 7
38,741,995 UART: [art] PUB.X = 722EF0902E90EA9705CFFA02241536F1F6A079CC1BDCBFC197B1A4E84BBC3166FBC327E8D6459C1A664AE4909D316D8A
38,748,994 UART: [art] PUB.Y = 79A7EB66AB3DFD9466FC18C3EE8252E3EC2BA80CC68368A9C09663A6943A439B411F19C00D1BB5460EBE51B101E38F2B
38,756,283 UART: [art] SIG.R = 0584E20643BE8C253796ED2709509DAFBC38B220AF3FF6C46C7A036A97288F3AF6FA712A66D03EF478AD934CC0C93531
38,763,692 UART: [art] SIG.S = 8F16D6E7FA5A8FE4DA418228FE7DFE311894098D218B6DC30298A6DF3F56C30F600896DC64BED528F62CBDB48CECF344
39,742,996 UART: mbox::rt_entry...
39,743,974 UART: ____ _ _ _ ____ _____
39,745,960 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,748,078 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,750,016 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,751,876 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,753,801 UART: |_|
39,754,613 UART:
40,129,348 UART: [rt] Runtime listening for mailbox commands...
40,131,599 >>> mbox cmd response data (48 bytes)
40,132,287 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,132,772 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,040 UART:
192,412 UART: Running Caliptra ROM ...
193,502 UART:
193,643 UART: [state] CFI Enabled
250,531 UART: [state] LifecycleState = Unprovisioned
252,937 UART: [state] DebugLocked = No
255,666 UART: [state] WD Timer not started. Device not locked for debugging
260,835 UART: [kat] SHA2-256
450,744 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,489 UART: [kat] ++
461,939 UART: [kat] sha1
474,019 UART: [kat] SHA2-256
477,050 UART: [kat] SHA2-384
484,538 UART: [kat] SHA2-512-ACC
487,116 UART: [kat] ECC-384
2,934,634 UART: [kat] HMAC-384Kdf
2,958,391 UART: [kat] LMS
3,490,147 UART: [kat] --
3,496,910 UART: [cold-reset] ++
3,499,548 UART: [fht] FHT @ 0x50003400
3,510,944 UART: [idev] ++
3,511,585 UART: [idev] CDI.KEYID = 6
3,512,585 UART: [idev] SUBJECT.KEYID = 7
3,513,754 UART: [idev] UDS.KEYID = 0
3,514,679 ready_for_fw is high
3,514,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,664,040 UART: [idev] Erasing UDS.KEYID = 0
6,035,831 UART: [idev] Sha1 KeyId Algorithm
6,057,692 UART: [idev] --
6,062,445 UART: [ldev] ++
6,063,138 UART: [ldev] CDI.KEYID = 6
6,064,052 UART: [ldev] SUBJECT.KEYID = 5
6,065,217 UART: [ldev] AUTHORITY.KEYID = 7
6,066,449 UART: [ldev] FE.KEYID = 1
6,107,554 UART: [ldev] Erasing FE.KEYID = 1
8,610,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,350,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,365,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,380,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,396,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,415,479 UART: [ldev] --
10,420,794 UART: [fwproc] Wait for Commands...
10,423,261 UART: [fwproc] Recv command 0x46574c44
10,425,567 UART: [fwproc] Recv'd Img size: 118548 bytes
13,922,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,964 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,572 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,544 >>> mbox cmd response: success
14,682,390 UART: [afmc] ++
14,683,119 UART: [afmc] CDI.KEYID = 6
14,684,311 UART: [afmc] SUBJECT.KEYID = 7
14,685,748 UART: [afmc] AUTHORITY.KEYID = 5
17,220,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,946,257 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,948,168 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,963,247 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,978,401 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,993,276 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,016,161 UART: [afmc] --
19,019,331 UART: [cold-reset] --
19,024,299 UART: [state] Locking Datavault
19,029,992 UART: [state] Locking PCR0, PCR1 and PCR31
19,032,147 UART: [state] Locking ICCM
19,034,844 UART: [exit] Launching FMC @ 0x40000130
19,043,520 UART:
19,043,752 UART: Running Caliptra FMC ...
19,044,853 UART:
19,045,013 UART: [state] CFI Enabled
19,101,513 UART: [fht] FMC Alias Private Key: 7
20,868,347 UART: [art] Extend RT PCRs Done
20,869,574 UART: [art] Lock RT PCRs Done
20,870,981 UART: [art] Populate DV Done
20,876,446 UART: [fht] FMC Alias Private Key: 7
20,878,152 UART: [art] Derive CDI
20,878,966 UART: [art] Store in slot 0x4
20,934,113 UART: [art] Derive Key Pair
20,935,164 UART: [art] Store priv key in slot 0x5
23,397,805 UART: [art] Derive Key Pair - Done
23,410,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,124,254 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,760 UART: [art] PUB.X = DE088B4E338133352962A01B3AF08FF599E668793CD07A5A5281309FD1C463DD9A1E670BBEC147FB7E444679FA7F99DD
25,133,042 UART: [art] PUB.Y = 8FBF4B4E88ADB9A9F0A8BA19C6D77CB4E5E112E9966B237370272F4AD885C180792AB7F7A8E5FD6848B083FCAE9767C7
25,140,306 UART: [art] SIG.R = F46ECD5F8C32E47411E21AE597A76F1DB34DD943BEC513FB4905702D89FC6A9785181EEED8CD360E7926DB177E2D567D
25,147,729 UART: [art] SIG.S = 7D2B77DD54586A648D42E8B299AB132C2161C3636E707DC07FF19E496D1B92A14839529F2C276BA8C53B8D5B299AA196
26,126,719 UART: Caliptra RT
26,127,401 UART: [state] CFI Enabled
26,307,015 UART: [rt] RT listening for mailbox commands...
28,365,512 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,471,563 UART:
28,471,926 UART: Running Caliptra ROM ...
28,473,057 UART:
28,473,235 UART: [state] CFI Enabled
28,533,969 UART: [state] LifecycleState = Unprovisioned
28,536,022 UART: [state] DebugLocked = No
28,538,497 UART: [state] WD Timer not started. Device not locked for debugging
28,543,421 UART: [kat] SHA2-256
28,733,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,744,049 UART: [kat] ++
28,744,588 UART: [kat] sha1
28,755,645 UART: [kat] SHA2-256
28,758,658 UART: [kat] SHA2-384
28,763,680 UART: [kat] SHA2-512-ACC
28,766,262 UART: [kat] ECC-384
31,218,457 UART: [kat] HMAC-384Kdf
31,240,925 UART: [kat] LMS
31,772,455 UART: [kat] --
31,777,907 UART: [update-reset] ++
34,851,697 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,855,197 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,270,618 >>> mbox cmd response: success
35,271,022 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,272,071 UART: [update-reset] Copying MAN_2 To MAN_1
35,309,641 UART: [update-reset Success] --
35,313,925 UART: [state] Locking Datavault
35,318,109 UART: [state] Locking PCR0, PCR1 and PCR31
35,320,233 UART: [state] Locking ICCM
35,322,393 UART: [exit] Launching FMC @ 0x40000130
35,331,010 UART:
35,331,247 UART: Running Caliptra FMC ...
35,332,346 UART:
35,332,524 UART: [state] CFI Enabled
35,432,269 UART: [art] Extend RT PCRs Done
35,433,454 UART: [art] Lock RT PCRs Done
35,434,751 UART: [art] Populate DV Done
35,440,153 UART: [fht] FMC Alias Private Key: 7
35,441,740 UART: [art] Derive CDI
35,442,551 UART: [art] Store in slot 0x4
35,500,852 UART: [art] Derive Key Pair
35,501,891 UART: [art] Store priv key in slot 0x5
37,964,816 UART: [art] Derive Key Pair - Done
37,977,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,689,768 UART: [art] Erasing AUTHORITY.KEYID = 7
39,691,275 UART: [art] PUB.X = 9EB4A22F7209A32985CBD62F0AB2AF206DF0C62A8F8BC5A28A1ADBC0C3A9F28B642CA6DC15A6E0C159FBCB540B1656E1
39,698,550 UART: [art] PUB.Y = E7B77A1FC1B5EA8BE553A8E8AC9EDCBB57ED8DCE953D3259FDF03EF750B123A80A65421E9C613313E10E780AD940AEF8
39,705,856 UART: [art] SIG.R = 5F7FE51C61331C5DD65DE9B3324B5FB6668B326CB5C4B08DDE59AD500AB7EAEA219ECE40D52201878DD5E762E56B59E3
39,713,273 UART: [art] SIG.S = 05863594A0C1AB13795B98220165FD426F840CF3D071079DC855940E81B7CAABC90A0C5CE0F836CF8920EF1E22C9BD3E
40,691,454 UART: mbox::rt_entry...
40,692,424 UART: ____ _ _ _ ____ _____
40,694,359 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,696,366 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,698,218 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,700,143 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,702,192 UART: |_|
40,702,999 UART:
41,075,458 UART: [rt] Runtime listening for mailbox commands...
41,077,630 >>> mbox cmd response data (48 bytes)
41,078,390 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,078,850 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,437,365 ready_for_fw is high
3,437,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,626 >>> mbox cmd response: success
19,115,011 UART:
19,115,434 UART: Running Caliptra FMC ...
19,116,627 UART:
19,116,802 UART: [state] CFI Enabled
19,179,947 UART: [fht] FMC Alias Private Key: 7
20,946,874 UART: [art] Extend RT PCRs Done
20,948,098 UART: [art] Lock RT PCRs Done
20,949,842 UART: [art] Populate DV Done
20,955,099 UART: [fht] FMC Alias Private Key: 7
20,956,747 UART: [art] Derive CDI
20,957,557 UART: [art] Store in slot 0x4
21,012,706 UART: [art] Derive Key Pair
21,013,749 UART: [art] Store priv key in slot 0x5
23,476,519 UART: [art] Derive Key Pair - Done
23,489,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,719 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,232 UART: [art] PUB.X = D8B887E190E7786D77C729AC12B469A00E133B39DB0B6DC12BA1077D8F1AD526DA99C8E1AB9537936703680B2A32EF67
25,210,461 UART: [art] PUB.Y = A4CCFC8BF7F0D6EF4FD43ACD6DC5D9980AC7D8DFD36EBE1B677AE09E7A5C5FA3088458D2D1A52794648337ED0127772A
25,217,736 UART: [art] SIG.R = 3FEA977E732AC2273EE534D98753731BC76E20C1CFB20CA3D9F038AFD175B6F119CBA953707C0ECF89FD0A9737F19C81
25,225,110 UART: [art] SIG.S = 47DD0AE9BA19A704EEFCCA22373D8239A7BABC9C1C5C68D206C1CAA9C7FA72F27CF9347ADB25451D87D2D1643CF0D520
26,204,324 UART: Caliptra RT
26,205,016 UART: [state] CFI Enabled
26,384,773 UART: [rt] RT listening for mailbox commands...
28,442,420 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,546,403 >>> mbox cmd response: success
35,546,986 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,581,647 UART:
35,581,974 UART: Running Caliptra FMC ...
35,583,094 UART:
35,583,264 UART: [state] CFI Enabled
35,680,011 UART: [art] Extend RT PCRs Done
35,681,203 UART: [art] Lock RT PCRs Done
35,682,878 UART: [art] Populate DV Done
35,688,071 UART: [fht] FMC Alias Private Key: 7
35,689,772 UART: [art] Derive CDI
35,690,593 UART: [art] Store in slot 0x4
35,749,344 UART: [art] Derive Key Pair
35,750,382 UART: [art] Store priv key in slot 0x5
38,213,265 UART: [art] Derive Key Pair - Done
38,226,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,938,905 UART: [art] Erasing AUTHORITY.KEYID = 7
39,940,439 UART: [art] PUB.X = 96BF40FC0AF828A682DA914C21659362BC089C01F0F2240A219ED0260AC95ADBF05E0D124E0AE80053CC876F601EA0CC
39,947,652 UART: [art] PUB.Y = 6A76F2729634A6180EB1CC7FA01933FBA953F2C1890C5A036C084C996425E09D3E6258E66FA312C64BFE924D0D8B4376
39,954,888 UART: [art] SIG.R = 5A9600E80FECC8EEE43C2E1596C03ECD52248A299E09CCD770194BADE6BF493B3CF4A02A19CE1D4B52EE354DCC0E442C
39,962,292 UART: [art] SIG.S = 7E677BBCAA068F45D3441E9F30A3EC1D406ADAA4158587FA781873123557BC25F3AED9E2CF88C716D6B684312BBB75F0
40,940,912 UART: mbox::rt_entry...
40,941,861 UART: ____ _ _ _ ____ _____
40,943,846 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,945,848 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,947,773 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,949,699 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,951,623 UART: |_|
40,952,447 UART:
41,323,648 UART: [rt] Runtime listening for mailbox commands...
41,325,787 >>> mbox cmd response data (48 bytes)
41,326,372 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,326,836 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,406 UART:
192,778 UART: Running Caliptra ROM ...
193,914 UART:
603,685 UART: [state] CFI Enabled
617,151 UART: [state] LifecycleState = Unprovisioned
619,532 UART: [state] DebugLocked = No
621,692 UART: [state] WD Timer not started. Device not locked for debugging
626,444 UART: [kat] SHA2-256
816,322 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,069 UART: [kat] ++
827,599 UART: [kat] sha1
837,906 UART: [kat] SHA2-256
840,916 UART: [kat] SHA2-384
848,329 UART: [kat] SHA2-512-ACC
850,928 UART: [kat] ECC-384
3,292,650 UART: [kat] HMAC-384Kdf
3,304,737 UART: [kat] LMS
3,836,608 UART: [kat] --
3,841,482 UART: [cold-reset] ++
3,842,563 UART: [fht] FHT @ 0x50003400
3,853,933 UART: [idev] ++
3,854,610 UART: [idev] CDI.KEYID = 6
3,855,647 UART: [idev] SUBJECT.KEYID = 7
3,856,755 UART: [idev] UDS.KEYID = 0
3,857,691 ready_for_fw is high
3,857,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,774 UART: [idev] Erasing UDS.KEYID = 0
6,338,102 UART: [idev] Sha1 KeyId Algorithm
6,360,965 UART: [idev] --
6,365,282 UART: [ldev] ++
6,366,012 UART: [ldev] CDI.KEYID = 6
6,366,930 UART: [ldev] SUBJECT.KEYID = 5
6,368,091 UART: [ldev] AUTHORITY.KEYID = 7
6,369,327 UART: [ldev] FE.KEYID = 1
6,380,567 UART: [ldev] Erasing FE.KEYID = 1
8,857,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,187 UART: [ldev] --
10,648,806 UART: [fwproc] Wait for Commands...
10,650,565 UART: [fwproc] Recv command 0x46574c44
10,652,884 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,875 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,488 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,243 >>> mbox cmd response: success
14,913,565 UART: [afmc] ++
14,914,238 UART: [afmc] CDI.KEYID = 6
14,915,499 UART: [afmc] SUBJECT.KEYID = 7
14,916,899 UART: [afmc] AUTHORITY.KEYID = 5
17,420,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,293 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,399 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,536 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,478 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,409 UART: [afmc] --
19,215,313 UART: [cold-reset] --
19,218,333 UART: [state] Locking Datavault
19,223,117 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,336 UART: [state] Locking ICCM
19,227,655 UART: [exit] Launching FMC @ 0x40000130
19,236,298 UART:
19,236,535 UART: Running Caliptra FMC ...
19,237,640 UART:
19,237,807 UART: [state] CFI Enabled
19,245,750 UART: [fht] FMC Alias Private Key: 7
21,012,043 UART: [art] Extend RT PCRs Done
21,013,274 UART: [art] Lock RT PCRs Done
21,014,880 UART: [art] Populate DV Done
21,020,138 UART: [fht] FMC Alias Private Key: 7
21,021,714 UART: [art] Derive CDI
21,022,536 UART: [art] Store in slot 0x4
21,064,976 UART: [art] Derive Key Pair
21,066,023 UART: [art] Store priv key in slot 0x5
23,493,048 UART: [art] Derive Key Pair - Done
23,505,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,520 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,019 UART: [art] PUB.X = 8D46DEFD8C448F99CAB9F96220FB3707A4080F0EE6A1FF3C85F610E34D4C3F4069F8523B4CB51DECB818A296586B78ED
25,221,345 UART: [art] PUB.Y = 813E8E5E3CC893B8F8AC9E55A1DC0B1EF311EADAC98B43AFF127C29076290D22DB02DCFE7DC135CC8162A6BDCB6D6903
25,228,608 UART: [art] SIG.R = 811D7560F7C91FD03B7B8CB4F9F8A750F4B932FACBCE46ADA25FF5F146DD1BCC2AC5B05D1C1B735323AE48A038D9C6D9
25,236,037 UART: [art] SIG.S = B62F9CD0498F92B4D07C125B7C6F0BAC12381324B9A47A15266590394D9964BBF02A67945BE3D4D79C4C165DC463D024
26,215,158 UART: Caliptra RT
26,215,869 UART: [state] CFI Enabled
26,347,879 UART: [rt] RT listening for mailbox commands...
28,410,435 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,516,184 UART:
28,516,548 UART: Running Caliptra ROM ...
28,517,604 UART:
28,517,816 UART: [state] CFI Enabled
28,532,476 UART: [state] LifecycleState = Unprovisioned
28,534,321 UART: [state] DebugLocked = No
28,536,329 UART: [state] WD Timer not started. Device not locked for debugging
28,540,172 UART: [kat] SHA2-256
28,730,074 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,740,830 UART: [kat] ++
28,741,288 UART: [kat] sha1
28,751,319 UART: [kat] SHA2-256
28,754,348 UART: [kat] SHA2-384
28,761,605 UART: [kat] SHA2-512-ACC
28,764,194 UART: [kat] ECC-384
31,205,491 UART: [kat] HMAC-384Kdf
31,217,423 UART: [kat] LMS
31,749,064 UART: [kat] --
31,755,940 UART: [update-reset] ++
34,826,762 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,830,254 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,245,713 >>> mbox cmd response: success
35,246,099 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,246,401 UART: [update-reset] Copying MAN_2 To MAN_1
35,283,589 UART: [update-reset Success] --
35,289,295 UART: [state] Locking Datavault
35,292,320 UART: [state] Locking PCR0, PCR1 and PCR31
35,294,533 UART: [state] Locking ICCM
35,296,262 UART: [exit] Launching FMC @ 0x40000130
35,304,962 UART:
35,305,210 UART: Running Caliptra FMC ...
35,306,316 UART:
35,306,473 UART: [state] CFI Enabled
35,350,708 UART: [art] Extend RT PCRs Done
35,351,853 UART: [art] Lock RT PCRs Done
35,353,193 UART: [art] Populate DV Done
35,358,494 UART: [fht] FMC Alias Private Key: 7
35,360,033 UART: [art] Derive CDI
35,360,853 UART: [art] Store in slot 0x4
35,403,498 UART: [art] Derive Key Pair
35,404,543 UART: [art] Store priv key in slot 0x5
37,831,122 UART: [art] Derive Key Pair - Done
37,844,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,550,894 UART: [art] Erasing AUTHORITY.KEYID = 7
39,552,380 UART: [art] PUB.X = BDF8A111370B58F0B51AC98BF5FC32DFF76ED3D5BCDA50C24C12CA77DF43B03CE6C3045EAE1D7BB3578EE7BCC66A5C0A
39,559,722 UART: [art] PUB.Y = B0308FB94D119A8A1E78F379EB46AB8D5B9FEDDB9CF16C4A310D458E59AF9F3A25B1B1C756C4107164A1261C308273A7
39,566,977 UART: [art] SIG.R = E62427D984396A37E86AE921329BA406ED0A6797AC1DA6CE02CCF2A6C65C7AAD4529EBB20174A2C5E8D79CCF3A97D8E6
39,574,394 UART: [art] SIG.S = A5958990845D5CD105F396C80A6959BF77989EBB84ED9F536C1D4987712774B469B7188B93DA05B2508ADE5330B17A90
40,552,278 UART: mbox::rt_entry...
40,553,261 UART: ____ _ _ _ ____ _____
40,555,262 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,557,280 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,559,216 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,561,149 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,563,075 UART: |_|
40,563,917 UART:
40,935,346 UART: [rt] Runtime listening for mailbox commands...
40,937,520 >>> mbox cmd response data (48 bytes)
40,938,096 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,938,642 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
3,758,215 ready_for_fw is high
3,758,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,763 >>> mbox cmd response: success
19,299,212 UART:
19,299,643 UART: Running Caliptra FMC ...
19,300,765 UART:
19,300,922 UART: [state] CFI Enabled
19,308,725 UART: [fht] FMC Alias Private Key: 7
21,075,038 UART: [art] Extend RT PCRs Done
21,076,271 UART: [art] Lock RT PCRs Done
21,077,856 UART: [art] Populate DV Done
21,083,347 UART: [fht] FMC Alias Private Key: 7
21,084,950 UART: [art] Derive CDI
21,085,698 UART: [art] Store in slot 0x4
21,128,675 UART: [art] Derive Key Pair
21,129,677 UART: [art] Store priv key in slot 0x5
23,556,421 UART: [art] Derive Key Pair - Done
23,569,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,005 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,527 UART: [art] PUB.X = 5470474E9EB48F5AEF7E891F9AFF2ACA4552F0CB6FF122FF059DC9E0B81AC35669BCFC490E0983F66F3D2E51077E0326
25,284,811 UART: [art] PUB.Y = 06A83255A0836353463F7095F9C91A45A10E0B2B86AD6D3C4BB797055995D3EC158C725E8A74C639C110CD1AA0A0C2D7
25,292,007 UART: [art] SIG.R = E2A8E25822EC373855B92B01215A1D85DA828EAA593D0BA078D89301951653A862FB012BC3528A13203CBC8405D31694
25,299,385 UART: [art] SIG.S = AB314AABD012BB342E42738CAF20B44BB1CFBFF27A81066B63870C5B8E8B81835BB9D564BDF82188A186A24C6019FD52
26,278,207 UART: Caliptra RT
26,278,909 UART: [state] CFI Enabled
26,411,583 UART: [rt] RT listening for mailbox commands...
28,471,319 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,490,054 >>> mbox cmd response: success
35,490,611 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,523,486 UART:
35,523,785 UART: Running Caliptra FMC ...
35,524,905 UART:
35,525,067 UART: [state] CFI Enabled
35,569,701 UART: [art] Extend RT PCRs Done
35,570,897 UART: [art] Lock RT PCRs Done
35,572,370 UART: [art] Populate DV Done
35,577,726 UART: [fht] FMC Alias Private Key: 7
35,579,357 UART: [art] Derive CDI
35,580,202 UART: [art] Store in slot 0x4
35,623,460 UART: [art] Derive Key Pair
35,624,508 UART: [art] Store priv key in slot 0x5
38,050,697 UART: [art] Derive Key Pair - Done
38,063,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,770,395 UART: [art] Erasing AUTHORITY.KEYID = 7
39,771,902 UART: [art] PUB.X = 7246802569610868983E4661B1A63BBE860C5F3E6A64D777269FD4BAD30F245B0BFB96837632805C3871A0BA7290C923
39,779,192 UART: [art] PUB.Y = F65392BFFEBEB23F7AEDA9DF7EAC1AD9EBC976BB3BF6E6E04001D94B4122D08D01D24DD2D89B90B5804D2F8D4E8BB189
39,786,439 UART: [art] SIG.R = 68D7AE7465E84D87AC58C449A137C2C8CBD6B6F5308FA4A6A275C10998F7FCD53E721C88D6D0057CE2B93E9C6D8CFDDD
39,793,838 UART: [art] SIG.S = 706CF095B761B6D7C30C21FDA47387BF9EA47F4865449BFB6CE9F067C7555DBEA8647445B420E3B2466512018926CAC1
40,771,868 UART: mbox::rt_entry...
40,772,821 UART: ____ _ _ _ ____ _____
40,774,807 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,776,818 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,778,755 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,780,691 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,782,641 UART: |_|
40,783,453 UART:
41,154,953 UART: [rt] Runtime listening for mailbox commands...
41,157,126 >>> mbox cmd response data (48 bytes)
41,157,690 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,158,157 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,235 UART: [kat] SHA2-256
882,166 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,281 UART: [kat] ++
886,433 UART: [kat] sha1
890,751 UART: [kat] SHA2-256
892,689 UART: [kat] SHA2-384
895,238 UART: [kat] SHA2-512-ACC
897,139 UART: [kat] ECC-384
902,930 UART: [kat] HMAC-384Kdf
907,426 UART: [kat] LMS
1,475,622 UART: [kat] --
1,476,523 UART: [cold-reset] ++
1,476,905 UART: [fht] Storing FHT @ 0x50003400
1,479,578 UART: [idev] ++
1,479,746 UART: [idev] CDI.KEYID = 6
1,480,106 UART: [idev] SUBJECT.KEYID = 7
1,480,530 UART: [idev] UDS.KEYID = 0
1,480,875 ready_for_fw is high
1,480,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,554 UART: [idev] Erasing UDS.KEYID = 0
1,505,364 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,224 UART: [idev] --
1,515,175 UART: [ldev] ++
1,515,343 UART: [ldev] CDI.KEYID = 6
1,515,706 UART: [ldev] SUBJECT.KEYID = 5
1,516,132 UART: [ldev] AUTHORITY.KEYID = 7
1,516,595 UART: [ldev] FE.KEYID = 1
1,521,683 UART: [ldev] Erasing FE.KEYID = 1
1,546,956 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,074 UART: [ldev] --
1,586,367 UART: [fwproc] Waiting for Commands...
1,587,226 UART: [fwproc] Received command 0x46574c44
1,588,017 UART: [fwproc] Received Image of size 118548 bytes
2,932,565 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,231 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,449 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,776 >>> mbox cmd response: success
3,132,888 UART: [afmc] ++
3,133,056 UART: [afmc] CDI.KEYID = 6
3,133,418 UART: [afmc] SUBJECT.KEYID = 7
3,133,843 UART: [afmc] AUTHORITY.KEYID = 5
3,169,310 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,788 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,568 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,277 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,160 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,843 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,879 UART: [afmc] --
3,212,799 UART: [cold-reset] --
3,213,667 UART: [state] Locking Datavault
3,215,020 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,624 UART: [state] Locking ICCM
3,216,242 UART: [exit] Launching FMC @ 0x40000130
3,221,572 UART:
3,221,588 UART: Running Caliptra FMC ...
3,221,996 UART:
3,222,050 UART: [state] CFI Enabled
3,232,620 UART: [fht] FMC Alias Private Key: 7
3,350,658 UART: [art] Extend RT PCRs Done
3,351,086 UART: [art] Lock RT PCRs Done
3,352,700 UART: [art] Populate DV Done
3,360,785 UART: [fht] FMC Alias Private Key: 7
3,361,841 UART: [art] Derive CDI
3,362,121 UART: [art] Store in slot 0x4
3,448,103 UART: [art] Derive Key Pair
3,448,463 UART: [art] Store priv key in slot 0x5
3,462,164 UART: [art] Derive Key Pair - Done
3,477,022 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,268 UART: [art] PUB.X = 7ED0CA36D3AF394EBDB7C3EE4343BB78F9E00AC4A9A31EECCF49459963898911BBD5447288211CD8989B3F44B49E0751
3,500,042 UART: [art] PUB.Y = FEBBBB9E97412D9EB1819CEF3EE97AC43792D9B915FAA5AC07A9FC0913681FB4153A0C9FD5782CC72692D015E74D13DB
3,507,001 UART: [art] SIG.R = AD01C2319E59714EAA915C0B4F58DDE5919B31EFE6E46CA1BF95900F8A8C0EF1CF11AD9BFB933B04F3658BCBE723F161
3,513,776 UART: [art] SIG.S = 02A064F1BF7AC28020D1498129E8BF0CE0C78CC6564206A54A8D1C1A6F395D2EB54883565F05A5DBEC0D08CBB3B6BFBB
3,537,768 UART: Caliptra RT
3,538,019 UART: [state] CFI Enabled
3,658,515 UART: [rt] RT listening for mailbox commands...
3,659,185 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,660,700 UART:
3,660,716 UART: Running Caliptra ROM ...
3,661,124 UART:
3,661,178 UART: [state] CFI Enabled
3,663,750 UART: [state] LifecycleState = Unprovisioned
3,664,405 UART: [state] DebugLocked = No
3,665,131 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,666,784 UART: [kat] SHA2-256
4,460,715 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,464,830 UART: [kat] ++
4,464,982 UART: [kat] sha1
4,469,216 UART: [kat] SHA2-256
4,471,154 UART: [kat] SHA2-384
4,473,795 UART: [kat] SHA2-512-ACC
4,475,695 UART: [kat] ECC-384
4,481,406 UART: [kat] HMAC-384Kdf
4,485,852 UART: [kat] LMS
5,054,048 UART: [kat] --
5,054,773 UART: [update-reset] ++
6,025,280 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,026,512 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,128,205 >>> mbox cmd response: success
6,128,205 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,128,556 UART: [update-reset] Copying MAN_2 To MAN_1
6,136,570 UART: [update-reset Success] --
6,137,567 UART: [state] Locking Datavault
6,138,189 UART: [state] Locking PCR0, PCR1 and PCR31
6,138,793 UART: [state] Locking ICCM
6,139,257 UART: [exit] Launching FMC @ 0x40000130
6,144,587 UART:
6,144,603 UART: Running Caliptra FMC ...
6,145,011 UART:
6,145,065 UART: [state] CFI Enabled
6,234,008 UART: [art] Extend RT PCRs Done
6,234,436 UART: [art] Lock RT PCRs Done
6,235,641 UART: [art] Populate DV Done
6,243,896 UART: [fht] FMC Alias Private Key: 7
6,244,852 UART: [art] Derive CDI
6,245,132 UART: [art] Store in slot 0x4
6,331,078 UART: [art] Derive Key Pair
6,331,438 UART: [art] Store priv key in slot 0x5
6,343,969 UART: [art] Derive Key Pair - Done
6,359,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,374,859 UART: [art] Erasing AUTHORITY.KEYID = 7
6,375,624 UART: [art] PUB.X = 062AAF519C784A505C6486642FF535B0B7EA99C85B97A4CEA890478D2A935306D54BD692312ADBDD9B32CA8B7FD39FCB
6,382,400 UART: [art] PUB.Y = C14C3A45F0ADDEA0C3C914D59FA222502249FBBE3D6B7195EB4D435C4F9298929D2F39A8A3E1CD731A411A27B6DBFA37
6,389,366 UART: [art] SIG.R = DC6A36012F5F951014B8B86DABCBFC7CE197C2C2C6C2C89CDFE15906C29653715182E65A76DBE3EEFE9973A3F38199DF
6,396,146 UART: [art] SIG.S = 524B071FD92DFDA1F5677F278EC6CF532192D0A38164F049C28DD92D9FB315F5194FC1897FC9FA6714EAE8500A23ED7B
6,419,404 UART: mbox::rt_entry...
6,419,776 UART: ____ _ _ _ ____ _____
6,420,560 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,421,360 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,422,128 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,422,896 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,423,664 UART: |_|
6,423,976 UART:
6,793,235 UART: [rt] Runtime listening for mailbox commands...
6,794,433 >>> mbox cmd response data (48 bytes)
6,794,434 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,794,542 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,797 ready_for_fw is high
1,362,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,988 >>> mbox cmd response: success
3,042,093 UART:
3,042,109 UART: Running Caliptra FMC ...
3,042,517 UART:
3,042,571 UART: [state] CFI Enabled
3,053,261 UART: [fht] FMC Alias Private Key: 7
3,172,461 UART: [art] Extend RT PCRs Done
3,172,889 UART: [art] Lock RT PCRs Done
3,174,667 UART: [art] Populate DV Done
3,183,046 UART: [fht] FMC Alias Private Key: 7
3,184,150 UART: [art] Derive CDI
3,184,430 UART: [art] Store in slot 0x4
3,270,420 UART: [art] Derive Key Pair
3,270,780 UART: [art] Store priv key in slot 0x5
3,283,849 UART: [art] Derive Key Pair - Done
3,298,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,561 UART: [art] PUB.X = 9C6A2E6E6B803EEF95C6FCA56E3B489E6D844059EF56403F7979DA80EFE34F7A94498307D029CBBB65A31E32A1FF77D8
3,321,340 UART: [art] PUB.Y = 75FC37E4A08B05CC08FCD5C651F94350FC813C0DDEC251D5B88B75B251A02BAB04D1EB29816862C0A697BF6689E7855A
3,328,288 UART: [art] SIG.R = 3ECFFB16DB16A0891FF80E818F7C38E1BA4EB56B89CAD1EDFC94D52D887F68580EB2CE93F6C949D377B26B42C6E66E24
3,335,072 UART: [art] SIG.S = 9D4C34EFC0B5C1E5A6963B615EF67B0AEB80F740BAB0EFE507BB8970F9E31816EDA614798694434A5A93D99B7DAAFD93
3,358,802 UART: Caliptra RT
3,359,053 UART: [state] CFI Enabled
3,480,125 UART: [rt] RT listening for mailbox commands...
3,480,795 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,833,749 >>> mbox cmd response: success
5,833,749 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,847,437 UART:
5,847,453 UART: Running Caliptra FMC ...
5,847,861 UART:
5,847,915 UART: [state] CFI Enabled
5,936,730 UART: [art] Extend RT PCRs Done
5,937,158 UART: [art] Lock RT PCRs Done
5,938,441 UART: [art] Populate DV Done
5,946,560 UART: [fht] FMC Alias Private Key: 7
5,947,612 UART: [art] Derive CDI
5,947,892 UART: [art] Store in slot 0x4
6,033,200 UART: [art] Derive Key Pair
6,033,560 UART: [art] Store priv key in slot 0x5
6,046,545 UART: [art] Derive Key Pair - Done
6,061,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,077,115 UART: [art] Erasing AUTHORITY.KEYID = 7
6,077,880 UART: [art] PUB.X = 51FAAF037BE7E64A3DF13CF3010C9E388222FD3EE71CB944E54ACB2DC3B692E55951B6F824BE8CB49E7206AF0818AEA2
6,084,653 UART: [art] PUB.Y = 426C74B2D5064CD0E0323CFB911AC03DA1684CA87D2D8A9F63FF437348465EBD7E06A4DF61ABF7CE0EF7AACC0CFBD9F1
6,091,617 UART: [art] SIG.R = 223304F42EACB548FAD03C021A1CC7C36030226546CC846D24B1E824D7CAA4AE64C2C125468115D4F21F1834F9B39E6E
6,098,385 UART: [art] SIG.S = 2D582C46BE1EEE8AA04D95A5B8E7780158DE5C8E75E6F38961A94BF4ACCDF8514300F2218C68CAC045575B3925521540
6,122,086 UART: mbox::rt_entry...
6,122,458 UART: ____ _ _ _ ____ _____
6,123,242 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,124,042 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,124,810 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,125,578 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,126,346 UART: |_|
6,126,658 UART:
6,483,422 UART: [rt] Runtime listening for mailbox commands...
6,484,620 >>> mbox cmd response data (48 bytes)
6,484,621 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,484,729 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,176 UART: [kat] SHA2-256
882,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,222 UART: [kat] ++
886,374 UART: [kat] sha1
890,638 UART: [kat] SHA2-256
892,576 UART: [kat] SHA2-384
895,377 UART: [kat] SHA2-512-ACC
897,278 UART: [kat] ECC-384
902,749 UART: [kat] HMAC-384Kdf
907,371 UART: [kat] LMS
1,475,567 UART: [kat] --
1,476,344 UART: [cold-reset] ++
1,476,896 UART: [fht] Storing FHT @ 0x50003400
1,479,711 UART: [idev] ++
1,479,879 UART: [idev] CDI.KEYID = 6
1,480,239 UART: [idev] SUBJECT.KEYID = 7
1,480,663 UART: [idev] UDS.KEYID = 0
1,481,008 ready_for_fw is high
1,481,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,461 UART: [idev] Erasing UDS.KEYID = 0
1,505,229 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,837 UART: [idev] --
1,514,828 UART: [ldev] ++
1,514,996 UART: [ldev] CDI.KEYID = 6
1,515,359 UART: [ldev] SUBJECT.KEYID = 5
1,515,785 UART: [ldev] AUTHORITY.KEYID = 7
1,516,248 UART: [ldev] FE.KEYID = 1
1,521,710 UART: [ldev] Erasing FE.KEYID = 1
1,546,759 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,657 UART: [ldev] --
1,586,120 UART: [fwproc] Waiting for Commands...
1,586,775 UART: [fwproc] Received command 0x46574c44
1,587,566 UART: [fwproc] Received Image of size 118548 bytes
2,931,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,442 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,660 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,089 >>> mbox cmd response: success
3,131,257 UART: [afmc] ++
3,131,425 UART: [afmc] CDI.KEYID = 6
3,131,787 UART: [afmc] SUBJECT.KEYID = 7
3,132,212 UART: [afmc] AUTHORITY.KEYID = 5
3,166,835 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,125 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,905 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,614 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,497 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,180 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,170 UART: [afmc] --
3,210,198 UART: [cold-reset] --
3,210,994 UART: [state] Locking Datavault
3,212,003 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,607 UART: [state] Locking ICCM
3,213,155 UART: [exit] Launching FMC @ 0x40000130
3,218,485 UART:
3,218,501 UART: Running Caliptra FMC ...
3,218,909 UART:
3,219,052 UART: [state] CFI Enabled
3,229,612 UART: [fht] FMC Alias Private Key: 7
3,348,540 UART: [art] Extend RT PCRs Done
3,348,968 UART: [art] Lock RT PCRs Done
3,350,414 UART: [art] Populate DV Done
3,358,791 UART: [fht] FMC Alias Private Key: 7
3,359,735 UART: [art] Derive CDI
3,360,015 UART: [art] Store in slot 0x4
3,446,299 UART: [art] Derive Key Pair
3,446,659 UART: [art] Store priv key in slot 0x5
3,460,298 UART: [art] Derive Key Pair - Done
3,474,824 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,491 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,256 UART: [art] PUB.X = 3A6B29C20C6C4646DC650A0C885CB6B86C448A3FD20D8ED440C4651E292D6E747B1DB2C291E7B33B7F6BE7CA15CC97CA
3,498,030 UART: [art] PUB.Y = F6FDF6EBA8CB5EF9456D408E5177134B60CA2122D5BF1AB6123A9D8921E0C44425F4CE5EDA03E2027A6BEFCBE6F04C0A
3,504,993 UART: [art] SIG.R = 15E90E40585338E69A79A5B60EE141D9948211DC93F39CA3DC1ABF48AEB108BCF81A2EB2EFBB94CD5BFAAC392E8AF7DC
3,511,780 UART: [art] SIG.S = CA304A1DACCF200E518B51AEF2DF2C08015DC7A5FFE1B7562EB1AC450ACF8F5D4C2002A8C85CAF78EEE92F785883D4F8
3,536,015 UART: Caliptra RT
3,536,358 UART: [state] CFI Enabled
3,656,522 UART: [rt] RT listening for mailbox commands...
3,657,192 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,658,671 UART:
3,658,687 UART: Running Caliptra ROM ...
3,659,095 UART:
3,659,236 UART: [state] CFI Enabled
3,661,444 UART: [state] LifecycleState = Unprovisioned
3,662,099 UART: [state] DebugLocked = No
3,662,789 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,664,282 UART: [kat] SHA2-256
4,458,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,462,328 UART: [kat] ++
4,462,480 UART: [kat] sha1
4,466,704 UART: [kat] SHA2-256
4,468,642 UART: [kat] SHA2-384
4,471,397 UART: [kat] SHA2-512-ACC
4,473,297 UART: [kat] ECC-384
4,478,834 UART: [kat] HMAC-384Kdf
4,483,522 UART: [kat] LMS
5,051,718 UART: [kat] --
5,052,537 UART: [update-reset] ++
6,025,530 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,026,762 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,128,455 >>> mbox cmd response: success
6,128,455 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,128,734 UART: [update-reset] Copying MAN_2 To MAN_1
6,136,748 UART: [update-reset Success] --
6,137,785 UART: [state] Locking Datavault
6,138,595 UART: [state] Locking PCR0, PCR1 and PCR31
6,139,199 UART: [state] Locking ICCM
6,139,859 UART: [exit] Launching FMC @ 0x40000130
6,145,189 UART:
6,145,205 UART: Running Caliptra FMC ...
6,145,613 UART:
6,145,756 UART: [state] CFI Enabled
6,234,977 UART: [art] Extend RT PCRs Done
6,235,405 UART: [art] Lock RT PCRs Done
6,236,784 UART: [art] Populate DV Done
6,244,999 UART: [fht] FMC Alias Private Key: 7
6,246,095 UART: [art] Derive CDI
6,246,375 UART: [art] Store in slot 0x4
6,332,339 UART: [art] Derive Key Pair
6,332,699 UART: [art] Store priv key in slot 0x5
6,346,504 UART: [art] Derive Key Pair - Done
6,361,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,376,612 UART: [art] Erasing AUTHORITY.KEYID = 7
6,377,377 UART: [art] PUB.X = 311EB62026FD13AF3BCA47608435C344DAB02A8C44C01732F1DFF404067DEF7C42B7FE955FBAE411039A67B6CF861949
6,384,146 UART: [art] PUB.Y = 4F398051FD4D88898405635B821515DAE9720DA2FC59C3E60B940C5BDCB255ECA1DC4BA186E65B4DCEB5C2C175E3F775
6,391,096 UART: [art] SIG.R = BE9E0308AE63117E8A7EE4EE3BF870FF92DA0D18FD5331B5765AB234866AD9A09740FA5BA8207E323D5C93EF9BAD4515
6,397,871 UART: [art] SIG.S = D5A53B2FE49940483A6A9CB9C864684E42D99FD81FDB8C3073F5818D9240E98012403FFD67C6A36B719999DBABE3269D
6,421,629 UART: mbox::rt_entry...
6,422,001 UART: ____ _ _ _ ____ _____
6,422,785 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,423,585 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,424,353 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,425,121 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,425,889 UART: |_|
6,426,201 UART:
6,791,169 UART: [rt] Runtime listening for mailbox commands...
6,792,367 >>> mbox cmd response data (48 bytes)
6,792,368 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,792,476 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,142 ready_for_fw is high
1,363,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,984,275 >>> mbox cmd response: success
3,046,060 UART:
3,046,076 UART: Running Caliptra FMC ...
3,046,484 UART:
3,046,627 UART: [state] CFI Enabled
3,057,655 UART: [fht] FMC Alias Private Key: 7
3,176,265 UART: [art] Extend RT PCRs Done
3,176,693 UART: [art] Lock RT PCRs Done
3,177,951 UART: [art] Populate DV Done
3,186,618 UART: [fht] FMC Alias Private Key: 7
3,187,756 UART: [art] Derive CDI
3,188,036 UART: [art] Store in slot 0x4
3,274,062 UART: [art] Derive Key Pair
3,274,422 UART: [art] Store priv key in slot 0x5
3,288,269 UART: [art] Derive Key Pair - Done
3,302,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,318,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,319,387 UART: [art] PUB.X = 8F44C4CC786D1EF2CF93F218E6AB86CCBEA57DBC20AA6874B6B02859AAF9A9B55EB7B4F17713B13E172072DBCC915FA2
3,326,179 UART: [art] PUB.Y = BD7711B65C457D62006DB2BEEAF60CC2E07B0662824DF01C0CEA36F168B284DCCB25704AFECABC8286822C3D2312305A
3,333,112 UART: [art] SIG.R = A09CF7677E89706F6B6C4ACC69266F9D42DE42AC57179F5116E8A2A3C340D0570160EE3520C006F6D0AE5F57B4CD565B
3,339,882 UART: [art] SIG.S = D19EA53C80713D972DBECC8E225B5031CC515D55A4ACEC9F16D348456B38801E8F2741258F03F302CB1260A94E6CBD09
3,364,129 UART: Caliptra RT
3,364,472 UART: [state] CFI Enabled
3,484,903 UART: [rt] RT listening for mailbox commands...
3,485,573 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,837,624 >>> mbox cmd response: success
5,837,624 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,850,940 UART:
5,850,956 UART: Running Caliptra FMC ...
5,851,364 UART:
5,851,507 UART: [state] CFI Enabled
5,941,230 UART: [art] Extend RT PCRs Done
5,941,658 UART: [art] Lock RT PCRs Done
5,942,917 UART: [art] Populate DV Done
5,951,330 UART: [fht] FMC Alias Private Key: 7
5,952,510 UART: [art] Derive CDI
5,952,790 UART: [art] Store in slot 0x4
6,038,524 UART: [art] Derive Key Pair
6,038,884 UART: [art] Store priv key in slot 0x5
6,052,425 UART: [art] Derive Key Pair - Done
6,066,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,082,442 UART: [art] Erasing AUTHORITY.KEYID = 7
6,083,207 UART: [art] PUB.X = 71F56475A92C922C5153B3048A1FC46F48FF3333986A8974D4913D3E19334917FCC0D0A5EB896C66E2301EC1CE591C18
6,089,970 UART: [art] PUB.Y = D06FA980E9B45DA68C7DA136DBE758FD54E7519F54EC50144A5D44B77A0FF2E2F1119436AA1CFF58463936CE276F23A5
6,096,927 UART: [art] SIG.R = 5D2858AA1CA4EAA72149B025E2BCF6BC50F13A7BC5D6A4120D0AD5192C1DB4522AAC67B4E030FD244ED310389426AD2F
6,103,707 UART: [art] SIG.S = C6BE2FCF6B96F20BAC85F61BC24230E83DCB8C308EBF2F7A2429D53E76724721486D1DC1119C6214963AB7759461EA8A
6,127,774 UART: mbox::rt_entry...
6,128,146 UART: ____ _ _ _ ____ _____
6,128,930 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,129,730 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,130,498 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,131,266 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,132,034 UART: |_|
6,132,346 UART:
6,496,741 UART: [rt] Runtime listening for mailbox commands...
6,497,939 >>> mbox cmd response data (48 bytes)
6,497,940 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,498,048 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,676 UART: [state] LifecycleState = Unprovisioned
86,331 UART: [state] DebugLocked = No
86,853 UART: [state] WD Timer not started. Device not locked for debugging
88,088 UART: [kat] SHA2-256
891,638 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,742 UART: [kat] ++
895,894 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,355 UART: [kat] HMAC-384Kdf
921,067 UART: [kat] LMS
1,169,379 UART: [kat] --
1,170,062 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,218 UART: [idev] ++
1,173,386 UART: [idev] CDI.KEYID = 6
1,173,747 UART: [idev] SUBJECT.KEYID = 7
1,174,172 UART: [idev] UDS.KEYID = 0
1,174,518 ready_for_fw is high
1,174,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,919 UART: [idev] Erasing UDS.KEYID = 0
1,198,455 UART: [idev] Sha1 KeyId Algorithm
1,207,359 UART: [idev] --
1,208,590 UART: [ldev] ++
1,208,758 UART: [ldev] CDI.KEYID = 6
1,209,122 UART: [ldev] SUBJECT.KEYID = 5
1,209,549 UART: [ldev] AUTHORITY.KEYID = 7
1,210,012 UART: [ldev] FE.KEYID = 1
1,215,136 UART: [ldev] Erasing FE.KEYID = 1
1,241,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,670 UART: [ldev] --
1,280,981 UART: [fwproc] Wait for Commands...
1,281,646 UART: [fwproc] Recv command 0x46574c44
1,282,379 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,499 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,674 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,051 >>> mbox cmd response: success
2,827,211 UART: [afmc] ++
2,827,379 UART: [afmc] CDI.KEYID = 6
2,827,742 UART: [afmc] SUBJECT.KEYID = 7
2,828,168 UART: [afmc] AUTHORITY.KEYID = 5
2,863,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,153 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,863 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,744 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,445 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,142 UART: [afmc] --
2,907,195 UART: [cold-reset] --
2,908,129 UART: [state] Locking Datavault
2,909,258 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,862 UART: [state] Locking ICCM
2,910,510 UART: [exit] Launching FMC @ 0x40000130
2,915,840 UART:
2,915,856 UART: Running Caliptra FMC ...
2,916,264 UART:
2,916,318 UART: [state] CFI Enabled
2,926,756 UART: [fht] FMC Alias Private Key: 7
3,045,246 UART: [art] Extend RT PCRs Done
3,045,674 UART: [art] Lock RT PCRs Done
3,047,260 UART: [art] Populate DV Done
3,055,721 UART: [fht] FMC Alias Private Key: 7
3,056,899 UART: [art] Derive CDI
3,057,179 UART: [art] Store in slot 0x4
3,142,928 UART: [art] Derive Key Pair
3,143,288 UART: [art] Store priv key in slot 0x5
3,156,268 UART: [art] Derive Key Pair - Done
3,171,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,335 UART: [art] PUB.X = E3725D16E85312CAFA12B84830448E3F73BD823D4AD04C07DF617F5791BC46E221FE3F059C76E7B8EEC04D5A667459A9
3,194,105 UART: [art] PUB.Y = 1B66A7FD8B9460DDD3E5E0480B367BB05ABB6E2B2047E429B0070B56E71EA91731939E4A26EF244973DA5AFB4F8667B0
3,201,054 UART: [art] SIG.R = B6DE1BE28ECA3B7086C381D6F6C6501ADB6B9C6485D3E8F3C74B8900CE0951ED84C732EC281BA0299055D4F7E063180D
3,207,806 UART: [art] SIG.S = 73BA531B11845409E3E333C76D06DB0801135285B720D222FE39B6ED886CECA4CE7807CFD66B0CDCDC3B109F120B9FAE
3,231,467 UART: Caliptra RT
3,231,718 UART: [state] CFI Enabled
3,351,691 UART: [rt] RT listening for mailbox commands...
3,352,361 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,509 UART:
3,353,525 UART: Running Caliptra ROM ...
3,353,933 UART:
3,353,988 UART: [state] CFI Enabled
3,356,550 UART: [state] LifecycleState = Unprovisioned
3,357,205 UART: [state] DebugLocked = No
3,357,929 UART: [state] WD Timer not started. Device not locked for debugging
3,359,159 UART: [kat] SHA2-256
4,162,709 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,166,813 UART: [kat] ++
4,166,965 UART: [kat] sha1
4,171,309 UART: [kat] SHA2-256
4,173,249 UART: [kat] SHA2-384
4,175,818 UART: [kat] SHA2-512-ACC
4,177,718 UART: [kat] ECC-384
4,187,801 UART: [kat] HMAC-384Kdf
4,192,295 UART: [kat] LMS
4,440,607 UART: [kat] --
4,441,617 UART: [update-reset] ++
5,391,545 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,392,606 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,494,247 >>> mbox cmd response: success
5,494,247 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,494,546 UART: [update-reset] Copying MAN_2 To MAN_1
5,502,560 UART: [update-reset Success] --
5,503,601 UART: [state] Locking Datavault
5,504,483 UART: [state] Locking PCR0, PCR1 and PCR31
5,505,087 UART: [state] Locking ICCM
5,505,585 UART: [exit] Launching FMC @ 0x40000130
5,510,915 UART:
5,510,931 UART: Running Caliptra FMC ...
5,511,339 UART:
5,511,393 UART: [state] CFI Enabled
5,600,970 UART: [art] Extend RT PCRs Done
5,601,398 UART: [art] Lock RT PCRs Done
5,602,671 UART: [art] Populate DV Done
5,611,114 UART: [fht] FMC Alias Private Key: 7
5,612,166 UART: [art] Derive CDI
5,612,446 UART: [art] Store in slot 0x4
5,698,409 UART: [art] Derive Key Pair
5,698,769 UART: [art] Store priv key in slot 0x5
5,711,621 UART: [art] Derive Key Pair - Done
5,726,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,741,849 UART: [art] Erasing AUTHORITY.KEYID = 7
5,742,614 UART: [art] PUB.X = 6B4759EB26F2B04E43CA7D6D898DBFFB9FF2714C7F9348F613AEAFFB04CB374764AA97779E319E2FCAF34467AB0866AC
5,749,396 UART: [art] PUB.Y = D1E888BE6D5004A8C7112E65362703BB0BA2F31FC59E1EAF9907D6B3533FABA5470C7705FA4B1FF18E094E870D740549
5,756,325 UART: [art] SIG.R = 43680CCDABFA92438AD06AC406E8BD3CEDF6B58627B7F3CD06B4B97BDB5FB26EA52546CE26F2C8D0EDD7786F9194BB35
5,763,110 UART: [art] SIG.S = 11597332928630DD2223BF6856F81166BF15BB33F304DC3CD7DE798DCFA72C890F51239898298F7B70BC082370A6CE87
5,786,695 UART: mbox::rt_entry...
5,787,067 UART: ____ _ _ _ ____ _____
5,787,851 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,788,651 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,789,419 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,790,187 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,790,955 UART: |_|
5,791,267 UART:
6,160,484 UART: [rt] Runtime listening for mailbox commands...
6,161,682 >>> mbox cmd response data (48 bytes)
6,161,683 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,161,791 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,662 ready_for_fw is high
1,058,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,756 >>> mbox cmd response: success
2,741,649 UART:
2,741,665 UART: Running Caliptra FMC ...
2,742,073 UART:
2,742,127 UART: [state] CFI Enabled
2,752,387 UART: [fht] FMC Alias Private Key: 7
2,870,771 UART: [art] Extend RT PCRs Done
2,871,199 UART: [art] Lock RT PCRs Done
2,872,597 UART: [art] Populate DV Done
2,880,700 UART: [fht] FMC Alias Private Key: 7
2,881,876 UART: [art] Derive CDI
2,882,156 UART: [art] Store in slot 0x4
2,968,129 UART: [art] Derive Key Pair
2,968,489 UART: [art] Store priv key in slot 0x5
2,982,205 UART: [art] Derive Key Pair - Done
2,996,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,301 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,066 UART: [art] PUB.X = 2AC81EA72C308B194C8F7046B15006DA3B68A165E94BFD6228EBDAFF0E2555133D098B6E2F7C634835FB6220896881DF
3,019,831 UART: [art] PUB.Y = AF503D45CA253A2700A1709CE4AA2E1767E95CC03F97C2F3F9A1A1EE5CF029348210AC23EE16F2F3B27839EA4C311FEE
3,026,773 UART: [art] SIG.R = 56A0ADA5D53C0FD34CDDFBC0F50785F1DF7CA9EC8EA401BED0198ACD9147AE3AE07D21C9BFEA7E1D73975FE224B3DB22
3,033,566 UART: [art] SIG.S = 49DC0179CB7E173A29B419AC7154C891E6530F36B0C58CAADBEC3F1A7D9DA78FEE1E98E67760BB528A2D3988F5277F24
3,057,156 UART: Caliptra RT
3,057,407 UART: [state] CFI Enabled
3,177,343 UART: [rt] RT listening for mailbox commands...
3,178,013 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,204,497 >>> mbox cmd response: success
5,204,497 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,218,080 UART:
5,218,096 UART: Running Caliptra FMC ...
5,218,504 UART:
5,218,558 UART: [state] CFI Enabled
5,307,549 UART: [art] Extend RT PCRs Done
5,307,977 UART: [art] Lock RT PCRs Done
5,309,470 UART: [art] Populate DV Done
5,317,633 UART: [fht] FMC Alias Private Key: 7
5,318,639 UART: [art] Derive CDI
5,318,919 UART: [art] Store in slot 0x4
5,404,530 UART: [art] Derive Key Pair
5,404,890 UART: [art] Store priv key in slot 0x5
5,417,760 UART: [art] Derive Key Pair - Done
5,432,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,447,437 UART: [art] Erasing AUTHORITY.KEYID = 7
5,448,202 UART: [art] PUB.X = FAB0EF49C777E53ABFFD9435D295D8D1BAE256C157CDDDCC270537E3EA7BB712BD92DCDE4EE7C2C10166547D545DC2E9
5,454,992 UART: [art] PUB.Y = 827B145A05943F33C81E775AD7CC9FDD9E9BAB71C20C9EF8787545C5D373DA6D1A9374D2929013D3E87236E51E86DD31
5,461,940 UART: [art] SIG.R = F6ED6320D8C2069928A9117835146284FC96CD3C6BF6B10639CAD036E56CF0900761B55E3A0E633E0ED904E9409B1579
5,468,688 UART: [art] SIG.S = CCDC366607BFB6B58EFF6AD9ADA3E4B67B53AC2E75BC23524ADE07E0444B00E0DC081A1511E4C21C462469FA3844EC02
5,492,476 UART: mbox::rt_entry...
5,492,848 UART: ____ _ _ _ ____ _____
5,493,632 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,494,432 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,495,200 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,495,968 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,496,736 UART: |_|
5,497,048 UART:
5,864,959 UART: [rt] Runtime listening for mailbox commands...
5,866,157 >>> mbox cmd response data (48 bytes)
5,866,158 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,866,266 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,090 UART: [state] WD Timer not started. Device not locked for debugging
88,405 UART: [kat] SHA2-256
891,955 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,059 UART: [kat] ++
896,211 UART: [kat] sha1
900,373 UART: [kat] SHA2-256
902,313 UART: [kat] SHA2-384
905,046 UART: [kat] SHA2-512-ACC
906,947 UART: [kat] ECC-384
916,842 UART: [kat] HMAC-384Kdf
921,272 UART: [kat] LMS
1,169,584 UART: [kat] --
1,170,675 UART: [cold-reset] ++
1,171,177 UART: [fht] FHT @ 0x50003400
1,173,801 UART: [idev] ++
1,173,969 UART: [idev] CDI.KEYID = 6
1,174,330 UART: [idev] SUBJECT.KEYID = 7
1,174,755 UART: [idev] UDS.KEYID = 0
1,175,101 ready_for_fw is high
1,175,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,700 UART: [idev] Erasing UDS.KEYID = 0
1,199,788 UART: [idev] Sha1 KeyId Algorithm
1,208,832 UART: [idev] --
1,209,959 UART: [ldev] ++
1,210,127 UART: [ldev] CDI.KEYID = 6
1,210,491 UART: [ldev] SUBJECT.KEYID = 5
1,210,918 UART: [ldev] AUTHORITY.KEYID = 7
1,211,381 UART: [ldev] FE.KEYID = 1
1,216,483 UART: [ldev] Erasing FE.KEYID = 1
1,242,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,723 UART: [ldev] --
1,282,128 UART: [fwproc] Wait for Commands...
1,282,897 UART: [fwproc] Recv command 0x46574c44
1,283,630 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,572 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,747 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,050 >>> mbox cmd response: success
2,828,098 UART: [afmc] ++
2,828,266 UART: [afmc] CDI.KEYID = 6
2,828,629 UART: [afmc] SUBJECT.KEYID = 7
2,829,055 UART: [afmc] AUTHORITY.KEYID = 5
2,864,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,118 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,828 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,709 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,410 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,159 UART: [afmc] --
2,907,990 UART: [cold-reset] --
2,908,784 UART: [state] Locking Datavault
2,909,913 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,517 UART: [state] Locking ICCM
2,911,123 UART: [exit] Launching FMC @ 0x40000130
2,916,453 UART:
2,916,469 UART: Running Caliptra FMC ...
2,916,877 UART:
2,917,020 UART: [state] CFI Enabled
2,927,632 UART: [fht] FMC Alias Private Key: 7
3,046,126 UART: [art] Extend RT PCRs Done
3,046,554 UART: [art] Lock RT PCRs Done
3,048,180 UART: [art] Populate DV Done
3,056,645 UART: [fht] FMC Alias Private Key: 7
3,057,667 UART: [art] Derive CDI
3,057,947 UART: [art] Store in slot 0x4
3,143,530 UART: [art] Derive Key Pair
3,143,890 UART: [art] Store priv key in slot 0x5
3,157,488 UART: [art] Derive Key Pair - Done
3,172,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,468 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,233 UART: [art] PUB.X = 2E379760A1E4B565ACB59F58EB90F31CFC96A9E18290D50F8779DC709B47B552790E827458FF786F7D07425C83650B11
3,194,987 UART: [art] PUB.Y = 7817095993DD439B3DDB6F7776BD1FB003B95D037A8429F019DC94827FF11E1982CB4AC3996DC7276F3AB66FF1136F2C
3,201,932 UART: [art] SIG.R = 2D3BE1014A540CE4B06825706F2DDB9A7276C5FE6FAE964350C8F5DE61000A29C2FABAFC48BF45F303410426F4935065
3,208,671 UART: [art] SIG.S = 00FBFE6A2EF40E99D9DD5176EB0D4F85A12EC73C702A34A7075B5BCB3607CDF2C08B03AA0244CA9D1749081709257E00
3,232,527 UART: Caliptra RT
3,232,870 UART: [state] CFI Enabled
3,351,127 UART: [rt] RT listening for mailbox commands...
3,351,797 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,925 UART:
3,352,941 UART: Running Caliptra ROM ...
3,353,349 UART:
3,353,491 UART: [state] CFI Enabled
3,356,299 UART: [state] LifecycleState = Unprovisioned
3,356,954 UART: [state] DebugLocked = No
3,357,654 UART: [state] WD Timer not started. Device not locked for debugging
3,358,868 UART: [kat] SHA2-256
4,162,418 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,166,522 UART: [kat] ++
4,166,674 UART: [kat] sha1
4,170,778 UART: [kat] SHA2-256
4,172,718 UART: [kat] SHA2-384
4,175,545 UART: [kat] SHA2-512-ACC
4,177,445 UART: [kat] ECC-384
4,187,286 UART: [kat] HMAC-384Kdf
4,191,916 UART: [kat] LMS
4,440,228 UART: [kat] --
4,441,234 UART: [update-reset] ++
5,392,082 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,393,149 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,494,790 >>> mbox cmd response: success
5,494,790 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,495,115 UART: [update-reset] Copying MAN_2 To MAN_1
5,503,129 UART: [update-reset Success] --
5,503,930 UART: [state] Locking Datavault
5,504,804 UART: [state] Locking PCR0, PCR1 and PCR31
5,505,408 UART: [state] Locking ICCM
5,505,830 UART: [exit] Launching FMC @ 0x40000130
5,511,160 UART:
5,511,176 UART: Running Caliptra FMC ...
5,511,584 UART:
5,511,727 UART: [state] CFI Enabled
5,600,552 UART: [art] Extend RT PCRs Done
5,600,980 UART: [art] Lock RT PCRs Done
5,602,267 UART: [art] Populate DV Done
5,610,498 UART: [fht] FMC Alias Private Key: 7
5,611,534 UART: [art] Derive CDI
5,611,814 UART: [art] Store in slot 0x4
5,697,345 UART: [art] Derive Key Pair
5,697,705 UART: [art] Store priv key in slot 0x5
5,710,997 UART: [art] Derive Key Pair - Done
5,725,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,741,300 UART: [art] Erasing AUTHORITY.KEYID = 7
5,742,065 UART: [art] PUB.X = D1A0AB5A7B8FDFD613FD06FE8840EAA3F13AB6718115588283FA1F39740A0184D2DC2A4D6C4F86894BFD6C9AEFA39476
5,748,842 UART: [art] PUB.Y = 64ADBDFF4CF8E43695CC9D4E2934754CD0B57A772EF55BA38044EF863A5E2307D4F6854D5AAD6565C0AAEFB966E687C6
5,755,805 UART: [art] SIG.R = DB55111C0A727130A2DE51827384416962F6B8110EC0720755CC799D7F1CD82088AF8A71ED4C9276F99962D6A31ADC6C
5,762,564 UART: [art] SIG.S = BB80D10F6CBCB3E3E47A5AE0144A15DA07096592A24A277CFE832B0BC9BE8DFCF518C5C6CE41F0B7774A496324180BE0
5,786,511 UART: mbox::rt_entry...
5,786,883 UART: ____ _ _ _ ____ _____
5,787,667 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,788,467 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,789,235 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,790,003 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,790,771 UART: |_|
5,791,083 UART:
6,154,862 UART: [rt] Runtime listening for mailbox commands...
6,156,060 >>> mbox cmd response data (48 bytes)
6,156,061 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,156,169 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,759 ready_for_fw is high
1,059,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,429 >>> mbox cmd response: success
2,740,618 UART:
2,740,634 UART: Running Caliptra FMC ...
2,741,042 UART:
2,741,185 UART: [state] CFI Enabled
2,751,939 UART: [fht] FMC Alias Private Key: 7
2,870,759 UART: [art] Extend RT PCRs Done
2,871,187 UART: [art] Lock RT PCRs Done
2,872,993 UART: [art] Populate DV Done
2,880,954 UART: [fht] FMC Alias Private Key: 7
2,882,120 UART: [art] Derive CDI
2,882,400 UART: [art] Store in slot 0x4
2,968,247 UART: [art] Derive Key Pair
2,968,607 UART: [art] Store priv key in slot 0x5
2,982,047 UART: [art] Derive Key Pair - Done
2,997,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,614 UART: [art] PUB.X = 85BED21E39034DD637CC830635AB4962D9622CAFEE6FA3F10DB71D357EE8231E87BB344711B40A010C194919695DD65C
3,020,370 UART: [art] PUB.Y = 41178AD4C81027D4CA66DC08BF8044DBC41F4FAE297C6E79110B09AB4BEFD0491EDEDB2668F879BDFFF4C351539D096C
3,027,326 UART: [art] SIG.R = CC0E0575F4C88A7DC83D83DB8C4B65CC2ECF426FC1B428BC94426916A6E6CF028A2CA0F8BF4D110A6653EE79840AD9EF
3,034,101 UART: [art] SIG.S = C42F1ABCA008045B3ED5C482A93FFD5B37EF76BA493D676FE8032CA9BBA485F4DB3C6788CB61552866F0D63E980A41D1
3,057,587 UART: Caliptra RT
3,057,930 UART: [state] CFI Enabled
3,177,458 UART: [rt] RT listening for mailbox commands...
3,178,128 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,203,933 >>> mbox cmd response: success
5,203,933 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,217,410 UART:
5,217,426 UART: Running Caliptra FMC ...
5,217,834 UART:
5,217,977 UART: [state] CFI Enabled
5,307,468 UART: [art] Extend RT PCRs Done
5,307,896 UART: [art] Lock RT PCRs Done
5,309,103 UART: [art] Populate DV Done
5,317,432 UART: [fht] FMC Alias Private Key: 7
5,318,446 UART: [art] Derive CDI
5,318,726 UART: [art] Store in slot 0x4
5,404,435 UART: [art] Derive Key Pair
5,404,795 UART: [art] Store priv key in slot 0x5
5,417,995 UART: [art] Derive Key Pair - Done
5,432,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,448,185 UART: [art] Erasing AUTHORITY.KEYID = 7
5,448,950 UART: [art] PUB.X = 904D4F009585E7DF1B83B9485B1841DD0DC345EB7FE09293209B1F40471D5029C9178F00133A23E17724D415FA928413
5,455,663 UART: [art] PUB.Y = 1B30E89292349875E5CC4EEE4282E8ADCB84335012E54C9A35D646A738EDAA38623D6FC4D49E9BCF7A9218DEAA25D977
5,462,623 UART: [art] SIG.R = 1A7E64C1F678AF639CA50D24CD72F129D863725F2E2F4C8BF1B57FE14E6DE6CE9365B924F20EEA30701EF30F8ECD9B4C
5,469,402 UART: [art] SIG.S = BE75E86CA4F3C1720C47DB6FAA5A249296C2CB3868F5FA14F566EE2941FED89FC662401E8B5069AF70953390F4CF3E53
5,493,565 UART: mbox::rt_entry...
5,493,937 UART: ____ _ _ _ ____ _____
5,494,721 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,495,521 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,496,289 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,497,057 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,497,825 UART: |_|
5,498,137 UART:
5,865,383 UART: [rt] Runtime listening for mailbox commands...
5,866,581 >>> mbox cmd response data (48 bytes)
5,866,582 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,866,690 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
893,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,635 UART: [kat] ++
897,787 UART: [kat] sha1
902,033 UART: [kat] SHA2-256
903,973 UART: [kat] SHA2-384
906,576 UART: [kat] SHA2-512-ACC
908,477 UART: [kat] ECC-384
918,312 UART: [kat] HMAC-384Kdf
922,836 UART: [kat] LMS
1,171,164 UART: [kat] --
1,172,029 UART: [cold-reset] ++
1,172,591 UART: [fht] FHT @ 0x50003400
1,175,404 UART: [idev] ++
1,175,572 UART: [idev] CDI.KEYID = 6
1,175,932 UART: [idev] SUBJECT.KEYID = 7
1,176,356 UART: [idev] UDS.KEYID = 0
1,176,701 ready_for_fw is high
1,176,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,430 UART: [idev] Erasing UDS.KEYID = 0
1,201,317 UART: [idev] Sha1 KeyId Algorithm
1,209,771 UART: [idev] --
1,210,823 UART: [ldev] ++
1,210,991 UART: [ldev] CDI.KEYID = 6
1,211,354 UART: [ldev] SUBJECT.KEYID = 5
1,211,780 UART: [ldev] AUTHORITY.KEYID = 7
1,212,243 UART: [ldev] FE.KEYID = 1
1,217,207 UART: [ldev] Erasing FE.KEYID = 1
1,243,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,555 UART: [ldev] --
1,282,870 UART: [fwproc] Wait for Commands...
1,283,606 UART: [fwproc] Recv command 0x46574c44
1,284,334 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,418 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,588 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,735 >>> mbox cmd response: success
2,829,919 UART: [afmc] ++
2,830,087 UART: [afmc] CDI.KEYID = 6
2,830,449 UART: [afmc] SUBJECT.KEYID = 7
2,830,874 UART: [afmc] AUTHORITY.KEYID = 5
2,866,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,144 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,853 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,736 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,437 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,483 UART: [afmc] --
2,909,463 UART: [cold-reset] --
2,910,367 UART: [state] Locking Datavault
2,911,490 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,094 UART: [state] Locking ICCM
2,912,706 UART: [exit] Launching FMC @ 0x40000130
2,918,036 UART:
2,918,052 UART: Running Caliptra FMC ...
2,918,460 UART:
2,918,514 UART: [state] CFI Enabled
2,929,160 UART: [fht] FMC Alias Private Key: 7
3,047,774 UART: [art] Extend RT PCRs Done
3,048,202 UART: [art] Lock RT PCRs Done
3,049,616 UART: [art] Populate DV Done
3,057,639 UART: [fht] FMC Alias Private Key: 7
3,058,767 UART: [art] Derive CDI
3,059,047 UART: [art] Store in slot 0x4
3,144,534 UART: [art] Derive Key Pair
3,144,894 UART: [art] Store priv key in slot 0x5
3,157,812 UART: [art] Derive Key Pair - Done
3,172,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,415 UART: [art] PUB.X = 39E61A8E0DFFB25109D6E43DBDBE5866272520135AAF37C2B3CD1AFB0856B1D5DC7C9F9E25FF11571AB2D03C877DCD03
3,196,191 UART: [art] PUB.Y = DD82E6EAE2158A523FD1D145919158174CD318BBBE8CCE298E78D15011E0F1BA6BB0F2A661CEE09147470F9631315696
3,203,142 UART: [art] SIG.R = A711CA038D723A3349B331E764114388A644F4296B30409DD3F33E905698AC5A53207739E6C9C4D50DC82946022AB025
3,209,891 UART: [art] SIG.S = 7FD2D143D88B287C31563C70A26EEC8C8ED4BF9BB618BDE9E33E423283C1005BF22FBBCB58DFD55A313D37B4E8B44D72
3,233,811 UART: Caliptra RT
3,234,062 UART: [state] CFI Enabled
3,354,621 UART: [rt] RT listening for mailbox commands...
3,355,291 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,356,705 UART:
3,356,721 UART: Running Caliptra ROM ...
3,357,129 UART:
3,357,184 UART: [state] CFI Enabled
3,360,026 UART: [state] LifecycleState = Unprovisioned
3,360,681 UART: [state] DebugLocked = No
3,361,393 UART: [state] WD Timer not started. Device not locked for debugging
3,362,661 UART: [kat] SHA2-256
4,168,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,172,436 UART: [kat] ++
4,172,588 UART: [kat] sha1
4,176,598 UART: [kat] SHA2-256
4,178,538 UART: [kat] SHA2-384
4,181,227 UART: [kat] SHA2-512-ACC
4,183,127 UART: [kat] ECC-384
4,193,040 UART: [kat] HMAC-384Kdf
4,197,602 UART: [kat] LMS
4,445,930 UART: [kat] --
4,446,890 UART: [update-reset] ++
5,397,771 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,398,900 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,500,541 >>> mbox cmd response: success
5,500,541 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,500,668 UART: [update-reset] Copying MAN_2 To MAN_1
5,508,682 UART: [update-reset Success] --
5,509,401 UART: [state] Locking Datavault
5,510,265 UART: [state] Locking PCR0, PCR1 and PCR31
5,510,869 UART: [state] Locking ICCM
5,511,509 UART: [exit] Launching FMC @ 0x40000130
5,516,839 UART:
5,516,855 UART: Running Caliptra FMC ...
5,517,263 UART:
5,517,317 UART: [state] CFI Enabled
5,606,692 UART: [art] Extend RT PCRs Done
5,607,120 UART: [art] Lock RT PCRs Done
5,608,265 UART: [art] Populate DV Done
5,616,762 UART: [fht] FMC Alias Private Key: 7
5,617,702 UART: [art] Derive CDI
5,617,982 UART: [art] Store in slot 0x4
5,703,701 UART: [art] Derive Key Pair
5,704,061 UART: [art] Store priv key in slot 0x5
5,717,473 UART: [art] Derive Key Pair - Done
5,732,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,748,064 UART: [art] Erasing AUTHORITY.KEYID = 7
5,748,829 UART: [art] PUB.X = 049D93ACC859AB194B4232DAD2DFDE077BA26E23831C33F0092BCA2D7237335A74C192A91FC412941C55D30ADADFB884
5,755,597 UART: [art] PUB.Y = 8675331348487760D20E3AC1042CE387B6C3AE13E8DB53008F8BD7B0E2C3814E4860ED53D558A1ED7418545C76F9A2F2
5,762,517 UART: [art] SIG.R = CE4A0453C92C297772B37CD5D4E58F9BA9C00BDE8867499020FA3E89367E0FC61341FF3CDD5AADB5AE8DDECAE9283664
5,769,296 UART: [art] SIG.S = E1FA9B946D53606D65EF8BE72E411A316EA4507037CD5AA7F3F6F35C48AB839EED57BD9E7921F446F9E26A51BE3B2479
5,792,744 UART: mbox::rt_entry...
5,793,116 UART: ____ _ _ _ ____ _____
5,793,900 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,794,700 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,795,468 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,796,236 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,797,004 UART: |_|
5,797,316 UART:
6,167,083 UART: [rt] Runtime listening for mailbox commands...
6,168,281 >>> mbox cmd response data (48 bytes)
6,168,282 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,168,390 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,743 ready_for_fw is high
1,059,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,840 >>> mbox cmd response: success
2,738,837 UART:
2,738,853 UART: Running Caliptra FMC ...
2,739,261 UART:
2,739,315 UART: [state] CFI Enabled
2,749,835 UART: [fht] FMC Alias Private Key: 7
2,868,581 UART: [art] Extend RT PCRs Done
2,869,009 UART: [art] Lock RT PCRs Done
2,870,389 UART: [art] Populate DV Done
2,878,528 UART: [fht] FMC Alias Private Key: 7
2,879,644 UART: [art] Derive CDI
2,879,924 UART: [art] Store in slot 0x4
2,965,571 UART: [art] Derive Key Pair
2,965,931 UART: [art] Store priv key in slot 0x5
2,979,313 UART: [art] Derive Key Pair - Done
2,994,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,822 UART: [art] PUB.X = 8097394B6DA149025BAC9E95222BC806481A5AD5D29BB81A76D7A568F9373F36417C618079A2ED8FDDB00F4882FD669A
3,016,585 UART: [art] PUB.Y = 9BC7A4E42159708250CBE91C459932B05733066EFE7073F0F923BA6026650F4F61397B733A07C1FD5F12FC66E79173C6
3,023,520 UART: [art] SIG.R = 18075C7F46C6FFECE74368851B590CE22BEB6A18F38F321D020D3105030CFFE88719D443CA948508AB40F7A81F8ECCEE
3,030,276 UART: [art] SIG.S = CBF841C5B09C5D549F29ADEA85B233D011E3B73BB157159A0C9A9EBFD7F6F66DFE9313DAC7561640C01D6C7CA7B3EA20
3,053,949 UART: Caliptra RT
3,054,200 UART: [state] CFI Enabled
3,174,591 UART: [rt] RT listening for mailbox commands...
3,175,261 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,201,642 >>> mbox cmd response: success
5,201,642 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,215,103 UART:
5,215,119 UART: Running Caliptra FMC ...
5,215,527 UART:
5,215,581 UART: [state] CFI Enabled
5,305,196 UART: [art] Extend RT PCRs Done
5,305,624 UART: [art] Lock RT PCRs Done
5,307,061 UART: [art] Populate DV Done
5,315,434 UART: [fht] FMC Alias Private Key: 7
5,316,462 UART: [art] Derive CDI
5,316,742 UART: [art] Store in slot 0x4
5,402,885 UART: [art] Derive Key Pair
5,403,245 UART: [art] Store priv key in slot 0x5
5,416,859 UART: [art] Derive Key Pair - Done
5,431,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,446,766 UART: [art] Erasing AUTHORITY.KEYID = 7
5,447,531 UART: [art] PUB.X = 4866A403961B13B292BDBF36B7DF181AB7E1F096D37B08332475C4D2E9C0B375F2C1903A66469589150F193D2FF8DC22
5,454,290 UART: [art] PUB.Y = DD0B586A408714336E51C78B7CF46A224F8AF00F8443F94A57CD27993A2F4B19782C8B0E752052C923581EEA5AC5938C
5,461,231 UART: [art] SIG.R = 0FCB6A69400FD1AE9AE4524A4996A77CDFEBA16DF77E57032DD3EFC7041887AC4D81AAF24B26AE32E646407A885CA2D1
5,468,007 UART: [art] SIG.S = A2BD3DB554E182B0DCA8CF97AEDFB9DE08B23C5E8B02E93E391B2AF3BC8FA9F9D63320CD934B2EC722D7E07F2BDC8F2B
5,492,209 UART: mbox::rt_entry...
5,492,581 UART: ____ _ _ _ ____ _____
5,493,365 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,494,165 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,494,933 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,495,701 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,496,469 UART: |_|
5,496,781 UART:
5,864,203 UART: [rt] Runtime listening for mailbox commands...
5,865,401 >>> mbox cmd response data (48 bytes)
5,865,402 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,865,510 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
893,563 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,688 UART: [kat] ++
897,840 UART: [kat] sha1
902,262 UART: [kat] SHA2-256
904,202 UART: [kat] SHA2-384
906,787 UART: [kat] SHA2-512-ACC
908,688 UART: [kat] ECC-384
918,565 UART: [kat] HMAC-384Kdf
923,121 UART: [kat] LMS
1,171,449 UART: [kat] --
1,172,264 UART: [cold-reset] ++
1,172,600 UART: [fht] FHT @ 0x50003400
1,175,279 UART: [idev] ++
1,175,447 UART: [idev] CDI.KEYID = 6
1,175,807 UART: [idev] SUBJECT.KEYID = 7
1,176,231 UART: [idev] UDS.KEYID = 0
1,176,576 ready_for_fw is high
1,176,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,173 UART: [idev] Erasing UDS.KEYID = 0
1,201,332 UART: [idev] Sha1 KeyId Algorithm
1,209,782 UART: [idev] --
1,210,822 UART: [ldev] ++
1,210,990 UART: [ldev] CDI.KEYID = 6
1,211,353 UART: [ldev] SUBJECT.KEYID = 5
1,211,779 UART: [ldev] AUTHORITY.KEYID = 7
1,212,242 UART: [ldev] FE.KEYID = 1
1,217,274 UART: [ldev] Erasing FE.KEYID = 1
1,243,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,154 UART: [ldev] --
1,282,465 UART: [fwproc] Wait for Commands...
1,283,169 UART: [fwproc] Recv command 0x46574c44
1,283,897 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,815 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,985 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,292 >>> mbox cmd response: success
2,829,398 UART: [afmc] ++
2,829,566 UART: [afmc] CDI.KEYID = 6
2,829,928 UART: [afmc] SUBJECT.KEYID = 7
2,830,353 UART: [afmc] AUTHORITY.KEYID = 5
2,865,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,877 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,586 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,469 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,170 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,062 UART: [afmc] --
2,908,954 UART: [cold-reset] --
2,909,858 UART: [state] Locking Datavault
2,910,765 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,369 UART: [state] Locking ICCM
2,911,951 UART: [exit] Launching FMC @ 0x40000130
2,917,281 UART:
2,917,297 UART: Running Caliptra FMC ...
2,917,705 UART:
2,917,848 UART: [state] CFI Enabled
2,928,076 UART: [fht] FMC Alias Private Key: 7
3,047,496 UART: [art] Extend RT PCRs Done
3,047,924 UART: [art] Lock RT PCRs Done
3,049,310 UART: [art] Populate DV Done
3,057,349 UART: [fht] FMC Alias Private Key: 7
3,058,449 UART: [art] Derive CDI
3,058,729 UART: [art] Store in slot 0x4
3,144,500 UART: [art] Derive Key Pair
3,144,860 UART: [art] Store priv key in slot 0x5
3,158,272 UART: [art] Derive Key Pair - Done
3,173,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,312 UART: [art] PUB.X = 0C066C2B5B97621C97DB5EDB83F8E5F2E359EA383F178A593D08FB93ED84CF90C482F6990B514FF5A7C213B173B96922
3,196,076 UART: [art] PUB.Y = 231558FA4CC45F0A7DC0CE492E84A8D71BD851CC2D8F736319D6683F17AF7DFEB892668581A670F9BCA21D75C8FD6C24
3,203,035 UART: [art] SIG.R = 9ED35A861250BCA707C8E36D50CF7EB25AB582A7C8DAB04F148BF81F927228A65A619553F0B101AC4EFD620A31C3B95E
3,209,808 UART: [art] SIG.S = BEBC4FB313761D0E1F17119F5413622B4DCF5F752D8B93048F6BCD755E37AD1076038C4D5E80C018569F08A2573D3FDE
3,233,350 UART: Caliptra RT
3,233,693 UART: [state] CFI Enabled
3,352,983 UART: [rt] RT listening for mailbox commands...
3,353,653 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,725 UART:
3,354,741 UART: Running Caliptra ROM ...
3,355,149 UART:
3,355,291 UART: [state] CFI Enabled
3,358,339 UART: [state] LifecycleState = Unprovisioned
3,358,994 UART: [state] DebugLocked = No
3,359,686 UART: [state] WD Timer not started. Device not locked for debugging
3,360,948 UART: [kat] SHA2-256
4,166,598 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,170,723 UART: [kat] ++
4,170,875 UART: [kat] sha1
4,175,201 UART: [kat] SHA2-256
4,177,141 UART: [kat] SHA2-384
4,179,902 UART: [kat] SHA2-512-ACC
4,181,802 UART: [kat] ECC-384
4,191,185 UART: [kat] HMAC-384Kdf
4,195,937 UART: [kat] LMS
4,444,265 UART: [kat] --
4,445,179 UART: [update-reset] ++
5,395,376 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,396,405 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,498,046 >>> mbox cmd response: success
5,498,046 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,498,239 UART: [update-reset] Copying MAN_2 To MAN_1
5,506,253 UART: [update-reset Success] --
5,507,076 UART: [state] Locking Datavault
5,507,684 UART: [state] Locking PCR0, PCR1 and PCR31
5,508,288 UART: [state] Locking ICCM
5,508,836 UART: [exit] Launching FMC @ 0x40000130
5,514,166 UART:
5,514,182 UART: Running Caliptra FMC ...
5,514,590 UART:
5,514,733 UART: [state] CFI Enabled
5,603,756 UART: [art] Extend RT PCRs Done
5,604,184 UART: [art] Lock RT PCRs Done
5,605,371 UART: [art] Populate DV Done
5,613,760 UART: [fht] FMC Alias Private Key: 7
5,614,710 UART: [art] Derive CDI
5,614,990 UART: [art] Store in slot 0x4
5,700,843 UART: [art] Derive Key Pair
5,701,203 UART: [art] Store priv key in slot 0x5
5,714,409 UART: [art] Derive Key Pair - Done
5,729,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,744,985 UART: [art] Erasing AUTHORITY.KEYID = 7
5,745,750 UART: [art] PUB.X = 95D7EF73A13DDE368DCF37F4E0518F820FD1E17D5D81066017CB43E8FEA9621B9A083EC5E7E95966D3A288905077E242
5,752,515 UART: [art] PUB.Y = 648115580E9F65796638AB53E7ABEE3180D3E4C7AA0F8AB3CD475CA6F8474871278457636EEEEB2C9AA9503392B6CAD2
5,759,465 UART: [art] SIG.R = E52236D93381A6F48BD21FF08A9797986489892312B28E8D7B4CA3BCA55C9F7162353DDB94AC776750E808FABF9E0253
5,766,229 UART: [art] SIG.S = 8BCDA3608574693F545C1BE933D7BD342466D9A7568C1337D76EEC1FD9B8C858B61715C1BC6A733BE37E9D176F18616B
5,789,719 UART: mbox::rt_entry...
5,790,091 UART: ____ _ _ _ ____ _____
5,790,875 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,791,675 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,792,443 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,793,211 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,793,979 UART: |_|
5,794,291 UART:
6,159,006 UART: [rt] Runtime listening for mailbox commands...
6,160,204 >>> mbox cmd response data (48 bytes)
6,160,205 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,160,313 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,188 ready_for_fw is high
1,060,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,055 >>> mbox cmd response: success
2,740,440 UART:
2,740,456 UART: Running Caliptra FMC ...
2,740,864 UART:
2,741,007 UART: [state] CFI Enabled
2,751,261 UART: [fht] FMC Alias Private Key: 7
2,870,035 UART: [art] Extend RT PCRs Done
2,870,463 UART: [art] Lock RT PCRs Done
2,871,779 UART: [art] Populate DV Done
2,880,180 UART: [fht] FMC Alias Private Key: 7
2,881,292 UART: [art] Derive CDI
2,881,572 UART: [art] Store in slot 0x4
2,967,291 UART: [art] Derive Key Pair
2,967,651 UART: [art] Store priv key in slot 0x5
2,980,881 UART: [art] Derive Key Pair - Done
2,995,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,801 UART: [art] PUB.X = F3B4AF2BCBAFCDA27960A51EEE45EAE3C20A40ED1A90A6CC3923A6EBF5C747DCD299C65E864145B0AA672A536D4050D9
3,018,592 UART: [art] PUB.Y = F8D896EC82DB36D5C6721C1396823154F13DFBAA286BC134634E30A170B9A4AE87F57236E24A1730F660924F2A2F0F14
3,025,539 UART: [art] SIG.R = 823B29EBC744A54D63AAEB512DFA279969542680AF53E11424315C65BD04BB5428B2D2DF9DE8176803FC600170AB5E1D
3,032,304 UART: [art] SIG.S = ADDB1A88E30898C23FBBBD3B8F9D9708DD455CBE57D1E70A59D9F1A39EF8F5B4877695FFC6A1CB842FFA4C2A1F3838DF
3,056,113 UART: Caliptra RT
3,056,456 UART: [state] CFI Enabled
3,174,934 UART: [rt] RT listening for mailbox commands...
3,175,604 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,203,898 >>> mbox cmd response: success
5,203,898 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,217,101 UART:
5,217,117 UART: Running Caliptra FMC ...
5,217,525 UART:
5,217,668 UART: [state] CFI Enabled
5,306,945 UART: [art] Extend RT PCRs Done
5,307,373 UART: [art] Lock RT PCRs Done
5,308,756 UART: [art] Populate DV Done
5,316,731 UART: [fht] FMC Alias Private Key: 7
5,317,877 UART: [art] Derive CDI
5,318,157 UART: [art] Store in slot 0x4
5,403,966 UART: [art] Derive Key Pair
5,404,326 UART: [art] Store priv key in slot 0x5
5,418,028 UART: [art] Derive Key Pair - Done
5,433,058 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,448,637 UART: [art] Erasing AUTHORITY.KEYID = 7
5,449,402 UART: [art] PUB.X = 66081724BFA3B61ACB8919D0EB2683DDC957E43A0783B80A20306B99E3BE8302797C2EF70E55A93E8161E0D5475924FC
5,456,157 UART: [art] PUB.Y = 2A7196355154E49F1991B4ECB1EB3ECD56C819B021DA60293B0BA7F8376446D69D8269060468DC01E0E7E6CE0D46CEC7
5,463,096 UART: [art] SIG.R = 872B7A01F81A5A9F6DFD3BE487AA8ED7A934ED2C54333AFDF724713E74D9B8729E540CE80197F3C7B0F4CDF7C73586C2
5,469,871 UART: [art] SIG.S = B853C28055CE32B97CBB1439117B661D90F900E520995F8C32C205DE1F27189A158C5C62B20F7C1435EADC6760FBAA4B
5,493,043 UART: mbox::rt_entry...
5,493,415 UART: ____ _ _ _ ____ _____
5,494,199 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,494,999 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,495,767 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,496,535 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,497,303 UART: |_|
5,497,615 UART:
5,861,038 UART: [rt] Runtime listening for mailbox commands...
5,862,236 >>> mbox cmd response data (48 bytes)
5,862,237 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,862,345 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
192,217 UART:
192,594 UART: Running Caliptra ROM ...
193,793 UART:
193,946 UART: [state] CFI Enabled
265,635 UART: [state] LifecycleState = Unprovisioned
267,625 UART: [state] DebugLocked = No
269,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,812 UART: [kat] SHA2-256
444,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,023 UART: [kat] ++
455,503 UART: [kat] sha1
467,089 UART: [kat] SHA2-256
469,820 UART: [kat] SHA2-384
475,954 UART: [kat] SHA2-512-ACC
478,322 UART: [kat] ECC-384
2,769,690 UART: [kat] HMAC-384Kdf
2,801,456 UART: [kat] LMS
3,991,793 UART: [kat] --
3,995,793 UART: [cold-reset] ++
3,997,577 UART: [fht] Storing FHT @ 0x50003400
4,008,220 UART: [idev] ++
4,008,836 UART: [idev] CDI.KEYID = 6
4,009,733 UART: [idev] SUBJECT.KEYID = 7
4,010,984 UART: [idev] UDS.KEYID = 0
4,011,943 ready_for_fw is high
4,012,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,436 UART: [idev] Erasing UDS.KEYID = 0
7,347,871 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,681 UART: [idev] --
7,372,681 UART: [ldev] ++
7,373,314 UART: [ldev] CDI.KEYID = 6
7,374,240 UART: [ldev] SUBJECT.KEYID = 5
7,375,455 UART: [ldev] AUTHORITY.KEYID = 7
7,376,736 UART: [ldev] FE.KEYID = 1
7,424,264 UART: [ldev] Erasing FE.KEYID = 1
10,755,209 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,239 UART: [ldev] --
13,118,041 UART: [fwproc] Waiting for Commands...
13,120,845 UART: [fwproc] Received command 0x46574c44
13,123,024 UART: [fwproc] Received Image of size 118548 bytes
17,233,146 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,310,773 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,383,945 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,711,565 >>> mbox cmd response: success
17,715,518 UART: [afmc] ++
17,716,132 UART: [afmc] CDI.KEYID = 6
17,717,023 UART: [afmc] SUBJECT.KEYID = 7
17,718,298 UART: [afmc] AUTHORITY.KEYID = 5
21,091,513 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,395,207 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,397,470 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,411,920 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,426,611 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,441,058 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,463,546 UART: [afmc] --
23,466,609 UART: [cold-reset] --
23,472,683 UART: [state] Locking Datavault
23,478,369 UART: [state] Locking PCR0, PCR1 and PCR31
23,480,123 UART: [state] Locking ICCM
23,481,194 UART: [exit] Launching FMC @ 0x40000130
23,489,589 UART:
23,489,821 UART: Running Caliptra FMC ...
23,490,926 UART:
23,491,088 UART: [state] CFI Enabled
23,554,598 UART: [fht] FMC Alias Private Key: 7
25,895,122 UART: [art] Extend RT PCRs Done
25,896,343 UART: [art] Lock RT PCRs Done
25,898,024 UART: [art] Populate DV Done
25,903,438 UART: [fht] FMC Alias Private Key: 7
25,905,111 UART: [art] Derive CDI
25,905,932 UART: [art] Store in slot 0x4
25,962,543 UART: [art] Derive Key Pair
25,963,581 UART: [art] Store priv key in slot 0x5
29,256,316 UART: [art] Derive Key Pair - Done
29,269,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,426 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,921 UART: [art] PUB.X = D74496E0AFA6755E66AA89B333C591F4BAAF85BCEF3A940322B94EA8FC674AB6640C0D3F9E5D7438F55F7071822DDC87
31,567,192 UART: [art] PUB.Y = 0FA35F03C4B354958C0CB7B1A55B1B42A042804C71F8850835F1D188262121B1C734413CC431E1B30C9F7119B323CBD9
31,574,390 UART: [art] SIG.R = 0AB2EBF8DA0A920AF88D0E4B4AB4159FDBB174B18C7A422F5D11AE703FC7ACBBF6DB1ACDAA78CF1BEE061189E567CB95
31,581,848 UART: [art] SIG.S = 2A540D7A0B6F485BE7CA171D9490708362081DFB5E60BBB6264A0D972570E103C880839DE37A8CF5D1009AF8B65328B3
32,886,340 UART: Caliptra RT
32,887,038 UART: [state] CFI Enabled
33,066,851 UART: [rt] RT listening for mailbox commands...
33,068,979 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,099,181 UART: [rt]cmd =0x54514754, len=24
33,101,862 >>> mbox cmd response data (8 bytes)
35,173,361 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,279,134 UART:
35,279,474 UART: Running Caliptra ROM ...
35,280,526 UART:
35,280,722 UART: [state] CFI Enabled
35,355,587 UART: [state] LifecycleState = Unprovisioned
35,357,551 UART: [state] DebugLocked = No
35,359,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,364,640 UART: [kat] SHA2-256
35,534,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,544,816 UART: [kat] ++
35,545,295 UART: [kat] sha1
35,556,940 UART: [kat] SHA2-256
35,559,637 UART: [kat] SHA2-384
35,566,489 UART: [kat] SHA2-512-ACC
35,568,892 UART: [kat] ECC-384
37,862,280 UART: [kat] HMAC-384Kdf
37,893,829 UART: [kat] LMS
39,084,125 UART: [kat] --
39,089,006 UART: [update-reset] ++
42,845,017 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,848,434 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,121,192 >>> mbox cmd response: success
43,121,593 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,122,206 UART: [update-reset] Copying MAN_2 To MAN_1
43,144,646 UART: [update-reset Success] --
43,147,462 UART: [state] Locking Datavault
43,151,394 UART: [state] Locking PCR0, PCR1 and PCR31
43,153,099 UART: [state] Locking ICCM
43,155,444 UART: [exit] Launching FMC @ 0x40000130
43,163,890 UART:
43,164,129 UART: Running Caliptra FMC ...
43,165,168 UART:
43,165,317 UART: [state] CFI Enabled
43,259,279 UART: [art] Extend RT PCRs Done
43,260,463 UART: [art] Lock RT PCRs Done
43,262,105 UART: [art] Populate DV Done
43,267,614 UART: [fht] FMC Alias Private Key: 7
43,269,204 UART: [art] Derive CDI
43,270,011 UART: [art] Store in slot 0x4
43,328,228 UART: [art] Derive Key Pair
43,329,265 UART: [art] Store priv key in slot 0x5
46,622,002 UART: [art] Derive Key Pair - Done
46,635,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,924,294 UART: [art] Erasing AUTHORITY.KEYID = 7
48,925,805 UART: [art] PUB.X = EFAC38E8BB2E4D37695A7FC9C9C037A4C79C7EA851E83B283852F5E5ED99CF335C043330BB8EEAC466842EFF982EEF04
48,933,076 UART: [art] PUB.Y = AA6A7620B1EFA0FFAD3B9C6B13B714474BA403DACDEDD1CCEEE7A8FEB50B89469997432555A3B66ABD92C9C9563BE8BB
48,940,382 UART: [art] SIG.R = 0075A09E7567EDDEB5311B75D808DCA0CE260C435900882D79F42AA0D6BF2523FBF8527AEC8B321ECE00852403DB117E
48,947,731 UART: [art] SIG.S = EBF96ECCC10C6BE93FB851F6C84667D2FD3D51990894031B3045CB4E3E4B6246D85EADA9FC24398D13E6628AD14195AD
50,252,212 UART: mbox::rt_entry...
50,253,177 UART: ____ _ _ _ ____ _____
50,255,110 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,257,115 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,258,969 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,260,893 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,262,822 UART: |_|
50,263,653 UART:
50,635,260 UART: [rt] Runtime listening for mailbox commands...
50,637,533 >>> mbox cmd response data (160 bytes)
52,704,470 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,809,698 UART:
52,810,049 UART: Running Caliptra ROM ...
52,811,184 UART:
52,811,352 UART: [state] CFI Enabled
52,871,263 UART: [state] LifecycleState = Unprovisioned
52,873,157 UART: [state] DebugLocked = No
52,875,507 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,880,509 UART: [kat] SHA2-256
53,050,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,060,745 UART: [kat] ++
53,061,289 UART: [kat] sha1
53,073,772 UART: [kat] SHA2-256
53,076,466 UART: [kat] SHA2-384
53,082,130 UART: [kat] SHA2-512-ACC
53,084,543 UART: [kat] ECC-384
55,376,461 UART: [kat] HMAC-384Kdf
55,406,740 UART: [kat] LMS
56,597,062 UART: [kat] --
56,601,133 UART: [update-reset] ++
60,357,915 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,362,029 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,634,780 >>> mbox cmd response: success
60,635,163 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,635,933 UART: [update-reset] Copying MAN_2 To MAN_1
60,658,319 UART: [update-reset Success] --
60,661,670 UART: [state] Locking Datavault
60,664,659 UART: [state] Locking PCR0, PCR1 and PCR31
60,666,434 UART: [state] Locking ICCM
60,668,965 UART: [exit] Launching FMC @ 0x40000130
60,677,420 UART:
60,677,660 UART: Running Caliptra FMC ...
60,678,764 UART:
60,678,924 UART: [state] CFI Enabled
60,771,859 UART: [art] Extend RT PCRs Done
60,773,036 UART: [art] Lock RT PCRs Done
60,774,492 UART: [art] Populate DV Done
60,779,734 UART: [fht] FMC Alias Private Key: 7
60,781,327 UART: [art] Derive CDI
60,782,137 UART: [art] Store in slot 0x4
60,841,090 UART: [art] Derive Key Pair
60,842,127 UART: [art] Store priv key in slot 0x5
64,134,780 UART: [art] Derive Key Pair - Done
64,148,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,435,812 UART: [art] Erasing AUTHORITY.KEYID = 7
66,437,312 UART: [art] PUB.X = 544D82429D5BF3C96F51FF7C3A6E5088A005FAFA2587B313364F6F64B9A4E86ABF3EFC9631DE231B34CED1C10DD4EFC8
66,444,638 UART: [art] PUB.Y = 70DAB3502CC5FD28B2E438431E9D64081441B7AD7AA1D2E8A0219C65F704E97DA0842BA9040CBBBA205123E62B9BFFDA
66,451,891 UART: [art] SIG.R = 0D1C8542B75607262CEFE1E3581CAECACAB16695373D1EEDB1201B997ACA76787908D1A040F0BA005618367FEBA7023E
66,459,246 UART: [art] SIG.S = 9E718EE380445E423BDB1BACFB18C60C5FA405DB20C7BEEF2FAA2305900C600B11FCEB7DCE4564AE0CEB9D1110D067C9
67,764,076 UART: mbox::rt_entry...
67,765,055 UART: ____ _ _ _ ____ _____
67,767,260 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,769,280 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,771,212 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,773,066 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,774,945 UART: |_|
67,775,747 UART:
68,144,747 UART: [rt] Runtime listening for mailbox commands...
68,146,979 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,785,412 ready_for_fw is high
3,785,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,972,147 >>> mbox cmd response: success
23,674,793 UART:
23,675,199 UART: Running Caliptra FMC ...
23,676,311 UART:
23,676,470 UART: [state] CFI Enabled
23,741,599 UART: [fht] FMC Alias Private Key: 7
26,081,456 UART: [art] Extend RT PCRs Done
26,082,713 UART: [art] Lock RT PCRs Done
26,084,372 UART: [art] Populate DV Done
26,089,705 UART: [fht] FMC Alias Private Key: 7
26,091,301 UART: [art] Derive CDI
26,092,044 UART: [art] Store in slot 0x4
26,148,978 UART: [art] Derive Key Pair
26,149,979 UART: [art] Store priv key in slot 0x5
29,442,965 UART: [art] Derive Key Pair - Done
29,455,844 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,618 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,133 UART: [art] PUB.X = 97F4FA2304A22A372DDE762BC7087E9C05396E88FB08FF79670C8DB65F6E30E29AA35A678583644675E53430B0BF243E
31,755,406 UART: [art] PUB.Y = DB89086D328637DCA29304C6F15BD7B9BEFFFCBC1C7BE933AB0AA47AD48A5F030863C06A0AD28EEFB9BA74AAB84C5048
31,762,718 UART: [art] SIG.R = CB9226543F98D9D3AB448AE612280060FA12DA31C1167E4969BBBDC5731FC9213B1D1E3564275DE0CF6D1BBCDEE05148
31,770,108 UART: [art] SIG.S = 5A60DEDCD85807DE3C78480E82DD58FF3AB67D293BCFC201F13986CB3CBB31C4CE123D28A27DB2CBDEF0DC51B432B7F6
33,074,976 UART: Caliptra RT
33,075,702 UART: [state] CFI Enabled
33,252,554 UART: [rt] RT listening for mailbox commands...
33,254,768 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,284,682 UART: [rt]cmd =0x54514754, len=24
33,287,605 >>> mbox cmd response data (8 bytes)
35,357,555 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,386,533 >>> mbox cmd response: success
43,387,067 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,419,343 UART:
43,419,627 UART: Running Caliptra FMC ...
43,420,664 UART:
43,420,812 UART: [state] CFI Enabled
43,527,600 UART: [art] Extend RT PCRs Done
43,528,964 UART: [art] Lock RT PCRs Done
43,530,449 UART: [art] Populate DV Done
43,535,706 UART: [fht] FMC Alias Private Key: 7
43,537,358 UART: [art] Derive CDI
43,538,093 UART: [art] Store in slot 0x4
43,596,667 UART: [art] Derive Key Pair
43,597,665 UART: [art] Store priv key in slot 0x5
46,890,663 UART: [art] Derive Key Pair - Done
46,903,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,191,693 UART: [art] Erasing AUTHORITY.KEYID = 7
49,193,212 UART: [art] PUB.X = 87AD9A479D50DD8B9815C2C13CA00DEFD791E22A39CAA7658CE5ADBE2404A5D7349C18BBD587B1CC961B145E51F6FA89
49,200,477 UART: [art] PUB.Y = 02827B689128359A82771B93156650832B9C12310CF0F05A5F9E701CC6E0ABB3AAD5343E9ECD005F9C250E4C6FE19EC2
49,207,880 UART: [art] SIG.R = 64E829782576B4523B7B02D1CE5D1855A2B4A1859A6B3EA57B0026198858A0DAB29299289772D77DE9FA564A44D6ECE8
49,215,102 UART: [art] SIG.S = 061263C93B8D46EDB38E62FC10AB406570158E6864917999BB2A6A94E306CAA79BC63D30BAF6F6DF37EA4045A0820D8C
50,519,829 UART: mbox::rt_entry...
50,520,792 UART: ____ _ _ _ ____ _____
50,522,745 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,524,757 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,526,693 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,528,621 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,530,550 UART: |_|
50,531,356 UART:
50,904,603 UART: [rt] Runtime listening for mailbox commands...
50,906,876 >>> mbox cmd response data (160 bytes)
52,974,314 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,996,052 >>> mbox cmd response: success
60,996,610 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
61,031,645 UART:
61,031,955 UART: Running Caliptra FMC ...
61,033,076 UART:
61,033,246 UART: [state] CFI Enabled
61,121,465 UART: [art] Extend RT PCRs Done
61,122,664 UART: [art] Lock RT PCRs Done
61,124,389 UART: [art] Populate DV Done
61,130,026 UART: [fht] FMC Alias Private Key: 7
61,131,501 UART: [art] Derive CDI
61,132,243 UART: [art] Store in slot 0x4
61,191,335 UART: [art] Derive Key Pair
61,192,345 UART: [art] Store priv key in slot 0x5
64,484,769 UART: [art] Derive Key Pair - Done
64,497,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,785,859 UART: [art] Erasing AUTHORITY.KEYID = 7
66,787,373 UART: [art] PUB.X = A7BD8B9AE3639EEFCA472BD40A24459E477BB03E4EA1CF3A4D7AA1D4C16FABA19246AAE00BAE0AE7FBBC00597629C6FF
66,794,693 UART: [art] PUB.Y = E4727388F8F8B2CF289E4DBB83523980E4621AC10FD9EE8085937F925FDFE01726F17DEED0C9EFF13DF307CF5729F3A8
66,801,951 UART: [art] SIG.R = E89B228E258F67A1F7F3BD8946E17FAB3E01750FB45684D20D035787C5E88BE34BCA4E283119A0593BAC4B5E248D796B
66,809,330 UART: [art] SIG.S = C0370848C820306EE9C944C19520C372FACAA652CC6B7425ADAD1817F6D41566B0E08FE7852BBA160FA7AF5AE4168E8F
68,114,676 UART: mbox::rt_entry...
68,115,649 UART: ____ _ _ _ ____ _____
68,117,634 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,119,563 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,121,487 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,123,367 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,125,288 UART: |_|
68,126,099 UART:
68,495,820 UART: [rt] Runtime listening for mailbox commands...
68,498,105 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,323 UART:
192,729 UART: Running Caliptra ROM ...
193,868 UART:
603,471 UART: [state] CFI Enabled
617,339 UART: [state] LifecycleState = Unprovisioned
619,280 UART: [state] DebugLocked = No
621,311 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,088 UART: [kat] SHA2-256
796,823 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,355 UART: [kat] ++
807,829 UART: [kat] sha1
819,478 UART: [kat] SHA2-256
822,192 UART: [kat] SHA2-384
829,532 UART: [kat] SHA2-512-ACC
831,962 UART: [kat] ECC-384
3,115,320 UART: [kat] HMAC-384Kdf
3,127,338 UART: [kat] LMS
4,317,446 UART: [kat] --
4,321,327 UART: [cold-reset] ++
4,322,832 UART: [fht] Storing FHT @ 0x50003400
4,334,666 UART: [idev] ++
4,335,222 UART: [idev] CDI.KEYID = 6
4,336,246 UART: [idev] SUBJECT.KEYID = 7
4,337,414 UART: [idev] UDS.KEYID = 0
4,338,444 ready_for_fw is high
4,338,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,567 UART: [idev] Erasing UDS.KEYID = 0
7,627,187 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,930 UART: [idev] --
7,652,737 UART: [ldev] ++
7,653,308 UART: [ldev] CDI.KEYID = 6
7,654,270 UART: [ldev] SUBJECT.KEYID = 5
7,655,475 UART: [ldev] AUTHORITY.KEYID = 7
7,656,805 UART: [ldev] FE.KEYID = 1
7,668,564 UART: [ldev] Erasing FE.KEYID = 1
10,954,914 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,723 UART: [ldev] --
13,316,998 UART: [fwproc] Waiting for Commands...
13,318,922 UART: [fwproc] Received command 0x46574c44
13,321,122 UART: [fwproc] Received Image of size 118548 bytes
17,422,138 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,319 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,504 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,753 >>> mbox cmd response: success
17,902,781 UART: [afmc] ++
17,903,392 UART: [afmc] CDI.KEYID = 6
17,904,301 UART: [afmc] SUBJECT.KEYID = 7
17,905,567 UART: [afmc] AUTHORITY.KEYID = 5
21,218,862 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,639 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,898 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,528,329 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,543,080 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,557,695 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,023 UART: [afmc] --
23,582,352 UART: [cold-reset] --
23,586,478 UART: [state] Locking Datavault
23,593,279 UART: [state] Locking PCR0, PCR1 and PCR31
23,595,025 UART: [state] Locking ICCM
23,596,147 UART: [exit] Launching FMC @ 0x40000130
23,604,529 UART:
23,604,757 UART: Running Caliptra FMC ...
23,605,847 UART:
23,606,001 UART: [state] CFI Enabled
23,614,075 UART: [fht] FMC Alias Private Key: 7
25,954,388 UART: [art] Extend RT PCRs Done
25,955,604 UART: [art] Lock RT PCRs Done
25,957,008 UART: [art] Populate DV Done
25,962,447 UART: [fht] FMC Alias Private Key: 7
25,964,017 UART: [art] Derive CDI
25,964,838 UART: [art] Store in slot 0x4
26,007,692 UART: [art] Derive Key Pair
26,008,691 UART: [art] Store priv key in slot 0x5
29,250,043 UART: [art] Derive Key Pair - Done
29,263,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,634 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,149 UART: [art] PUB.X = 0624765928767489BABB47E2FC0A0ED57D3A31F3475A0B4E861B5A24813A5913C93B48F62ED8B516C3F730D132C4DCDE
31,552,399 UART: [art] PUB.Y = CBEC90913E7E75C403402F90547CAA3AAC292F8820B983ABF2F08F0071C80E13BBACA3A8CA8A2EAE6AA652C71C1857B7
31,559,675 UART: [art] SIG.R = 3247B77A11886EEEC9D0798B45A5F9DC4A8D10EB028D7F57F4C3D28D21562AF44A19AB47B4D82F09A645D61B27443713
31,567,092 UART: [art] SIG.S = 2C15A43AAA681D0B390D09C5DC98986D39C724B705C180329F4FFB8F75C0D0F239989210959B7DFE9F01A62135903722
32,872,980 UART: Caliptra RT
32,873,678 UART: [state] CFI Enabled
33,006,246 UART: [rt] RT listening for mailbox commands...
33,008,326 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,038,245 UART: [rt]cmd =0x54514754, len=24
33,040,922 >>> mbox cmd response data (8 bytes)
35,105,874 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,211,906 UART:
35,212,251 UART: Running Caliptra ROM ...
35,213,386 UART:
35,213,553 UART: [state] CFI Enabled
35,226,952 UART: [state] LifecycleState = Unprovisioned
35,228,883 UART: [state] DebugLocked = No
35,230,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,234,920 UART: [kat] SHA2-256
35,404,631 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,415,167 UART: [kat] ++
35,415,692 UART: [kat] sha1
35,427,116 UART: [kat] SHA2-256
35,429,812 UART: [kat] SHA2-384
35,435,685 UART: [kat] SHA2-512-ACC
35,438,026 UART: [kat] ECC-384
37,723,817 UART: [kat] HMAC-384Kdf
37,736,151 UART: [kat] LMS
38,926,183 UART: [kat] --
38,930,440 UART: [update-reset] ++
42,685,501 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,688,941 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,961,688 >>> mbox cmd response: success
42,962,059 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
42,962,724 UART: [update-reset] Copying MAN_2 To MAN_1
42,985,150 UART: [update-reset Success] --
42,990,130 UART: [state] Locking Datavault
42,993,391 UART: [state] Locking PCR0, PCR1 and PCR31
42,995,144 UART: [state] Locking ICCM
42,996,211 UART: [exit] Launching FMC @ 0x40000130
43,004,654 UART:
43,004,909 UART: Running Caliptra FMC ...
43,006,012 UART:
43,006,174 UART: [state] CFI Enabled
43,050,073 UART: [art] Extend RT PCRs Done
43,051,209 UART: [art] Lock RT PCRs Done
43,052,597 UART: [art] Populate DV Done
43,057,940 UART: [fht] FMC Alias Private Key: 7
43,059,451 UART: [art] Derive CDI
43,060,257 UART: [art] Store in slot 0x4
43,102,916 UART: [art] Derive Key Pair
43,103,961 UART: [art] Store priv key in slot 0x5
46,346,420 UART: [art] Derive Key Pair - Done
46,359,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,639,123 UART: [art] Erasing AUTHORITY.KEYID = 7
48,640,627 UART: [art] PUB.X = B6BE273192AC51DA5F5ABE60092EBBF6E38A03C2D9319FD0A8EC2AFE97E09F3151AB3042766F39F621CE0A42C3998530
48,647,938 UART: [art] PUB.Y = 0F185B881FF5805AACBFAB6B34416C8F1B8BBCFE04218CA19211860926E1894445625DB9D54F7201A84BF5500B860B74
48,655,169 UART: [art] SIG.R = 98232CAA5D79DA5FE2C1ACA5CAEDB1BDB86435CD09A1F48DF06ACAB3881496179FA7D4CCDF3DD6A04BD4CE9D219A60E4
48,662,623 UART: [art] SIG.S = D39A809FC5BBB1DD7D3C83ACBFB17942D6D34D7C6308239A6A6EE5B9F92E8AE08560AA7FD6999C3366448CA57E7E4A96
49,967,415 UART: mbox::rt_entry...
49,968,379 UART: ____ _ _ _ ____ _____
49,970,360 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,972,389 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,974,317 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,976,244 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,978,164 UART: |_|
49,978,993 UART:
50,348,832 UART: [rt] Runtime listening for mailbox commands...
50,351,056 >>> mbox cmd response data (160 bytes)
52,413,301 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,518,449 UART:
52,518,790 UART: Running Caliptra ROM ...
52,519,910 UART:
52,520,070 UART: [state] CFI Enabled
52,533,639 UART: [state] LifecycleState = Unprovisioned
52,535,527 UART: [state] DebugLocked = No
52,537,168 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,541,728 UART: [kat] SHA2-256
52,711,416 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,721,958 UART: [kat] ++
52,722,456 UART: [kat] sha1
52,734,006 UART: [kat] SHA2-256
52,736,710 UART: [kat] SHA2-384
52,743,124 UART: [kat] SHA2-512-ACC
52,745,515 UART: [kat] ECC-384
55,030,292 UART: [kat] HMAC-384Kdf
55,041,695 UART: [kat] LMS
56,231,765 UART: [kat] --
56,236,804 UART: [update-reset] ++
59,989,504 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,993,321 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,266,120 >>> mbox cmd response: success
60,266,495 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,267,316 UART: [update-reset] Copying MAN_2 To MAN_1
60,289,770 UART: [update-reset Success] --
60,293,728 UART: [state] Locking Datavault
60,297,580 UART: [state] Locking PCR0, PCR1 and PCR31
60,299,360 UART: [state] Locking ICCM
60,300,805 UART: [exit] Launching FMC @ 0x40000130
60,309,243 UART:
60,309,472 UART: Running Caliptra FMC ...
60,310,571 UART:
60,310,720 UART: [state] CFI Enabled
60,354,738 UART: [art] Extend RT PCRs Done
60,355,866 UART: [art] Lock RT PCRs Done
60,357,311 UART: [art] Populate DV Done
60,362,882 UART: [fht] FMC Alias Private Key: 7
60,364,481 UART: [art] Derive CDI
60,365,290 UART: [art] Store in slot 0x4
60,407,711 UART: [art] Derive Key Pair
60,408,702 UART: [art] Store priv key in slot 0x5
63,650,938 UART: [art] Derive Key Pair - Done
63,664,259 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,944,779 UART: [art] Erasing AUTHORITY.KEYID = 7
65,946,277 UART: [art] PUB.X = 40152B03EE7C7FEF536747BA62E2CE1278E8D5D15362D6BA391C55A7E143AB88F547E9728D4AF2A7E477D9E2F32A5444
65,953,534 UART: [art] PUB.Y = 6445A7D8630CDD72EFD0CB983147D8AD3B54DFA2A2401BC7EE58CEBF86E92359E31956A128C4DBA1437408BEC79128FB
65,960,816 UART: [art] SIG.R = D885A8B383B131858804235FEA4DB43E566F3565233ADEDF203A90731085C8B254CC52D4B22654E2366A11BBB3AEBB91
65,968,214 UART: [art] SIG.S = 4122B1FF74D8A8B3B4F66E7F02ED1DC9087529779067F9F5F6300A3B601E35142AEF62A0BBFA5ACA7925C6EA99AC4924
67,272,881 UART: mbox::rt_entry...
67,273,839 UART: ____ _ _ _ ____ _____
67,275,814 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,277,811 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,279,735 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,281,655 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,283,574 UART: |_|
67,284,404 UART:
67,658,298 UART: [rt] Runtime listening for mailbox commands...
67,660,521 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
4,123,469 ready_for_fw is high
4,124,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,630 >>> mbox cmd response: success
23,800,837 UART:
23,801,871 UART: Running Caliptra FMC ...
23,803,002 UART:
23,803,167 UART: [state] CFI Enabled
23,810,932 UART: [fht] FMC Alias Private Key: 7
26,151,099 UART: [art] Extend RT PCRs Done
26,152,351 UART: [art] Lock RT PCRs Done
26,154,169 UART: [art] Populate DV Done
26,159,656 UART: [fht] FMC Alias Private Key: 7
26,161,309 UART: [art] Derive CDI
26,162,122 UART: [art] Store in slot 0x4
26,204,568 UART: [art] Derive Key Pair
26,205,563 UART: [art] Store priv key in slot 0x5
29,448,114 UART: [art] Derive Key Pair - Done
29,460,797 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,521 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,020 UART: [art] PUB.X = B8A8E563E2E62BE612FC53AA5EE79EF30465FC5CC4007FC2D7035A36C983EC7B7DB5F14ABB3B0CD80B2C3166B785126F
31,750,324 UART: [art] PUB.Y = 6022A385F08C91A6C48EA80EF2874161586BA3C06F8F62C090A052C8B189413E9497BF4F6C7876FB50DEF655D5D2A61B
31,757,573 UART: [art] SIG.R = 8035053D4CF45538D974DBA5174E14E64A06781DB3BBC670EC7BABC964E01BD0DCEDB1FAE3BF7B88120EDAAEABB675A6
31,765,017 UART: [art] SIG.S = 14190161CD29B6784D2919AE3CD801D031B2B885DFECB00410D081A968B585F6098FA7BD930BA198495FF8AF11CCED56
33,070,501 UART: Caliptra RT
33,071,210 UART: [state] CFI Enabled
33,204,281 UART: [rt] RT listening for mailbox commands...
33,206,724 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,236,450 UART: [rt]cmd =0x54514754, len=24
33,238,890 >>> mbox cmd response data (8 bytes)
35,311,106 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,287,300 >>> mbox cmd response: success
43,287,913 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,323,261 UART:
43,323,528 UART: Running Caliptra FMC ...
43,324,594 UART:
43,324,760 UART: [state] CFI Enabled
43,369,359 UART: [art] Extend RT PCRs Done
43,370,562 UART: [art] Lock RT PCRs Done
43,371,916 UART: [art] Populate DV Done
43,377,214 UART: [fht] FMC Alias Private Key: 7
43,378,796 UART: [art] Derive CDI
43,379,604 UART: [art] Store in slot 0x4
43,422,222 UART: [art] Derive Key Pair
43,423,259 UART: [art] Store priv key in slot 0x5
46,665,032 UART: [art] Derive Key Pair - Done
46,678,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,958,283 UART: [art] Erasing AUTHORITY.KEYID = 7
48,959,798 UART: [art] PUB.X = 2D433EE9718248422181B04466AD57A444B4A1632655E7D785FBD97C3851577DE8C836CC4FF547AC0CAEEB4733DB7F75
48,967,039 UART: [art] PUB.Y = 07CEFAB9580C01D30F68C1451771C4D3D36AD561A881F3515FB4A0AB73CB3FE0FC489DBE82A6F9BD6225C01EE355F0AA
48,974,325 UART: [art] SIG.R = C68D6AFB80727082AF681C8EDF26251EEDA6A0F9766263E2516970FF0CDFA2473107F140AC1BDEE0E399865229112E69
48,981,763 UART: [art] SIG.S = 8A934370CB43C651818033B84FE7B6FC3A5268B7EB8B5B7802DC5A8F56BB721C4312CC6652933F52C69559008B2FE76A
50,286,765 UART: mbox::rt_entry...
50,287,864 UART: ____ _ _ _ ____ _____
50,289,865 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,291,869 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,293,802 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,295,732 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,297,581 UART: |_|
50,298,457 UART:
50,672,059 UART: [rt] Runtime listening for mailbox commands...
50,674,319 >>> mbox cmd response data (160 bytes)
52,738,453 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,715,347 >>> mbox cmd response: success
60,715,943 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,750,424 UART:
60,750,690 UART: Running Caliptra FMC ...
60,751,808 UART:
60,751,970 UART: [state] CFI Enabled
60,796,053 UART: [art] Extend RT PCRs Done
60,797,240 UART: [art] Lock RT PCRs Done
60,798,742 UART: [art] Populate DV Done
60,804,371 UART: [fht] FMC Alias Private Key: 7
60,806,065 UART: [art] Derive CDI
60,806,874 UART: [art] Store in slot 0x4
60,850,061 UART: [art] Derive Key Pair
60,851,095 UART: [art] Store priv key in slot 0x5
64,093,327 UART: [art] Derive Key Pair - Done
64,106,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,386,440 UART: [art] Erasing AUTHORITY.KEYID = 7
66,387,993 UART: [art] PUB.X = B46BE9036259BCAF8D16EF2196633AD17ADAD4B20F3A7A758085FD04A3EDAA599EBD4E2641350B4F9A207EEA673E7137
66,395,241 UART: [art] PUB.Y = E7ED5EDE071C607BD0CFD3ACB9D80648CB3B811F00D86CC28F5E6B4B573B56F947F700E4B61DCECEE69543AEA0832FA6
66,402,474 UART: [art] SIG.R = DF26E15CDFEE0FC21995DCC00FFE71A9B600488A3D51B99DAAC65BA618A38ED795C853CE3EE3C054A609D90A5354F2B5
66,409,858 UART: [art] SIG.S = 3F2D4443520F405CC0E8AF0E6214B0BDAFB4FAD8D2F8CA8B02A4F0BE76727F89430F0FFB3F5C4D3520CF81F6D828C15D
67,714,802 UART: mbox::rt_entry...
67,715,749 UART: ____ _ _ _ ____ _____
67,717,723 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,719,723 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,721,651 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,723,583 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,725,513 UART: |_|
67,726,318 UART:
68,098,141 UART: [rt] Runtime listening for mailbox commands...
68,100,375 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
192,195 UART:
192,563 UART: Running Caliptra ROM ...
193,748 UART:
193,897 UART: [state] CFI Enabled
265,097 UART: [state] LifecycleState = Unprovisioned
267,018 UART: [state] DebugLocked = No
269,397 UART: [state] WD Timer not started. Device not locked for debugging
273,777 UART: [kat] SHA2-256
453,496 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,224 UART: [kat] ++
464,672 UART: [kat] sha1
476,680 UART: [kat] SHA2-256
479,389 UART: [kat] SHA2-384
484,326 UART: [kat] SHA2-512-ACC
486,693 UART: [kat] ECC-384
2,949,554 UART: [kat] HMAC-384Kdf
2,971,282 UART: [kat] LMS
3,447,820 UART: [kat] --
3,453,441 UART: [cold-reset] ++
3,454,516 UART: [fht] FHT @ 0x50003400
3,465,487 UART: [idev] ++
3,466,053 UART: [idev] CDI.KEYID = 6
3,466,977 UART: [idev] SUBJECT.KEYID = 7
3,468,218 UART: [idev] UDS.KEYID = 0
3,469,139 ready_for_fw is high
3,469,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,521 UART: [idev] Erasing UDS.KEYID = 0
5,984,310 UART: [idev] Sha1 KeyId Algorithm
6,007,531 UART: [idev] --
6,011,546 UART: [ldev] ++
6,012,120 UART: [ldev] CDI.KEYID = 6
6,013,059 UART: [ldev] SUBJECT.KEYID = 5
6,014,271 UART: [ldev] AUTHORITY.KEYID = 7
6,015,499 UART: [ldev] FE.KEYID = 1
6,058,068 UART: [ldev] Erasing FE.KEYID = 1
8,563,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,509 UART: [ldev] --
10,372,606 UART: [fwproc] Wait for Commands...
10,374,853 UART: [fwproc] Recv command 0x46574c44
10,376,930 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,374 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,380 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,220 >>> mbox cmd response: success
14,348,252 UART: [afmc] ++
14,348,865 UART: [afmc] CDI.KEYID = 6
14,349,748 UART: [afmc] SUBJECT.KEYID = 7
14,350,962 UART: [afmc] AUTHORITY.KEYID = 5
16,888,226 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,612,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,614,173 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,630,028 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,646,042 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,661,595 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,686,689 UART: [afmc] --
18,689,958 UART: [cold-reset] --
18,692,790 UART: [state] Locking Datavault
18,699,053 UART: [state] Locking PCR0, PCR1 and PCR31
18,700,801 UART: [state] Locking ICCM
18,703,044 UART: [exit] Launching FMC @ 0x40000130
18,711,437 UART:
18,711,678 UART: Running Caliptra FMC ...
18,712,778 UART:
18,712,932 UART: [state] CFI Enabled
18,768,800 UART: [fht] FMC Alias Private Key: 7
20,535,501 UART: [art] Extend RT PCRs Done
20,536,715 UART: [art] Lock RT PCRs Done
20,538,390 UART: [art] Populate DV Done
20,543,687 UART: [fht] FMC Alias Private Key: 7
20,545,380 UART: [art] Derive CDI
20,546,192 UART: [art] Store in slot 0x4
20,601,819 UART: [art] Derive Key Pair
20,602,822 UART: [art] Store priv key in slot 0x5
23,065,629 UART: [art] Derive Key Pair - Done
23,078,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,791,494 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,976 UART: [art] PUB.X = 0D210E720402533493B39D50BA620E1504FF463EE7348074D79DDDA1679AB39AE2854C983CE8CDC547966213FB49693C
24,800,280 UART: [art] PUB.Y = 17DED90438AFDC78FD1D5D86D9E215C900F2295ACB8B2BDF40A8C7F50515D09312D12E9A276D22063289B15A977EDD47
24,807,512 UART: [art] SIG.R = E3DEA642CBF5166FFF6EA8D12274E48DEF6D01D77B3BAF2A6B8DDBE0FB67453A8283E417E90B1A080E83F64896D842B2
24,814,904 UART: [art] SIG.S = 51027F1AA16F007C85FB1BC5B91F65A37E0ACFD0FC0E35ECEDE40A432C4E7F691C1415B91FBA34CDE65E493A68879C74
25,794,014 UART: Caliptra RT
25,794,728 UART: [state] CFI Enabled
25,974,868 UART: [rt] RT listening for mailbox commands...
25,977,084 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,007,381 UART: [rt]cmd =0x54514754, len=24
26,009,994 >>> mbox cmd response data (8 bytes)
28,061,061 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,166,901 UART:
28,167,283 UART: Running Caliptra ROM ...
28,168,413 UART:
28,168,578 UART: [state] CFI Enabled
28,225,463 UART: [state] LifecycleState = Unprovisioned
28,227,396 UART: [state] DebugLocked = No
28,229,705 UART: [state] WD Timer not started. Device not locked for debugging
28,233,221 UART: [kat] SHA2-256
28,412,851 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,423,681 UART: [kat] ++
28,424,135 UART: [kat] sha1
28,435,286 UART: [kat] SHA2-256
28,437,971 UART: [kat] SHA2-384
28,443,372 UART: [kat] SHA2-512-ACC
28,445,683 UART: [kat] ECC-384
30,908,760 UART: [kat] HMAC-384Kdf
30,932,228 UART: [kat] LMS
31,408,719 UART: [kat] --
31,413,375 UART: [update-reset] ++
34,473,984 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,477,421 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,750,006 >>> mbox cmd response: success
34,750,384 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,751,424 UART: [update-reset] Copying MAN_2 To MAN_1
34,788,563 UART: [update-reset Success] --
34,791,262 UART: [state] Locking Datavault
34,795,230 UART: [state] Locking PCR0, PCR1 and PCR31
34,796,931 UART: [state] Locking ICCM
34,799,562 UART: [exit] Launching FMC @ 0x40000130
34,807,960 UART:
34,808,215 UART: Running Caliptra FMC ...
34,809,316 UART:
34,809,470 UART: [state] CFI Enabled
34,911,370 UART: [art] Extend RT PCRs Done
34,912,566 UART: [art] Lock RT PCRs Done
34,913,975 UART: [art] Populate DV Done
34,919,488 UART: [fht] FMC Alias Private Key: 7
34,921,132 UART: [art] Derive CDI
34,921,947 UART: [art] Store in slot 0x4
34,980,476 UART: [art] Derive Key Pair
34,981,516 UART: [art] Store priv key in slot 0x5
37,444,068 UART: [art] Derive Key Pair - Done
37,457,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,169,635 UART: [art] Erasing AUTHORITY.KEYID = 7
39,171,148 UART: [art] PUB.X = F2239E0346384B3258143341074EFBA76E02322FDB3667EA385BBF833C9D7921FECC30ADFAD9D20736A0E1D9F6BA9025
39,178,433 UART: [art] PUB.Y = 0C906AC31EA6D497AC0CCF7EA2789497D1D3CB9215FDEA6698C189CF34D592E91003F15F0BBBC73593CEA0376830CA8F
39,185,645 UART: [art] SIG.R = 135F0315830D2CB7EEBF60B34D83019A154C83A8D046D324F50FF7399D4AD09EBC58035092AE042D9D79521D0B55A1DB
39,193,033 UART: [art] SIG.S = 72E86A05C5D3A99FFD1B86A80E1F7F6F44BC067EEF6EB084C102296E85C6A8BFCC1BCB247A9840845E2F0084C60BCAC3
40,171,717 UART: mbox::rt_entry...
40,172,688 UART: ____ _ _ _ ____ _____
40,174,673 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,176,676 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,178,605 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,180,530 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,182,452 UART: |_|
40,183,256 UART:
40,553,629 UART: [rt] Runtime listening for mailbox commands...
40,555,909 >>> mbox cmd response data (160 bytes)
42,604,729 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,709,920 UART:
42,710,288 UART: Running Caliptra ROM ...
42,711,421 UART:
42,711,588 UART: [state] CFI Enabled
42,772,296 UART: [state] LifecycleState = Unprovisioned
42,774,237 UART: [state] DebugLocked = No
42,776,277 UART: [state] WD Timer not started. Device not locked for debugging
42,780,359 UART: [kat] SHA2-256
42,960,001 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
42,970,791 UART: [kat] ++
42,971,245 UART: [kat] sha1
42,982,988 UART: [kat] SHA2-256
42,985,675 UART: [kat] SHA2-384
42,991,604 UART: [kat] SHA2-512-ACC
42,993,958 UART: [kat] ECC-384
45,458,665 UART: [kat] HMAC-384Kdf
45,480,504 UART: [kat] LMS
45,956,946 UART: [kat] --
45,962,033 UART: [update-reset] ++
49,014,687 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,018,609 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,291,197 >>> mbox cmd response: success
49,291,566 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,291,842 UART: [update-reset] Copying MAN_2 To MAN_1
49,328,801 UART: [update-reset Success] --
49,333,304 UART: [state] Locking Datavault
49,335,968 UART: [state] Locking PCR0, PCR1 and PCR31
49,337,704 UART: [state] Locking ICCM
49,339,880 UART: [exit] Launching FMC @ 0x40000130
49,348,270 UART:
49,348,513 UART: Running Caliptra FMC ...
49,349,630 UART:
49,349,786 UART: [state] CFI Enabled
49,439,168 UART: [art] Extend RT PCRs Done
49,440,349 UART: [art] Lock RT PCRs Done
49,441,637 UART: [art] Populate DV Done
49,447,094 UART: [fht] FMC Alias Private Key: 7
49,448,681 UART: [art] Derive CDI
49,449,487 UART: [art] Store in slot 0x4
49,507,462 UART: [art] Derive Key Pair
49,508,489 UART: [art] Store priv key in slot 0x5
51,972,006 UART: [art] Derive Key Pair - Done
51,985,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,697,021 UART: [art] Erasing AUTHORITY.KEYID = 7
53,698,533 UART: [art] PUB.X = E95CA7E86E78671D3C5BCA58E0AE9797701C086B2A3853F1428CA26ABCCDB682360F727531538AC658C837E5C3743108
53,705,835 UART: [art] PUB.Y = CF572DC891F4AD1800E9107911EABA8BD8DD14F94E379D90A4E2EDBAF6B324D51540A95741C35AB69847E8D1EF7D8B1A
53,713,078 UART: [art] SIG.R = CBFCA536E53C65440B4C71D3A7558B7CF3AEE99B96E7B5A816C7A831EBAB17200EBDAFE8F2B3D57840B6C7961FEEAE88
53,720,542 UART: [art] SIG.S = 05397D7B2D11333B8136FA2693F6430EE2447CEC10A30CC4149112AB18135845E42D2F3B1EFAFCF03641234EC889D4E7
54,699,103 UART: mbox::rt_entry...
54,700,079 UART: ____ _ _ _ ____ _____
54,702,063 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,704,072 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,706,003 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,707,934 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,709,859 UART: |_|
54,710,692 UART:
55,083,377 UART: [rt] Runtime listening for mailbox commands...
55,085,664 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,464,344 ready_for_fw is high
3,464,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,227,707 >>> mbox cmd response: success
18,515,498 UART:
18,515,934 UART: Running Caliptra FMC ...
18,517,043 UART:
18,517,210 UART: [state] CFI Enabled
18,585,235 UART: [fht] FMC Alias Private Key: 7
20,351,974 UART: [art] Extend RT PCRs Done
20,353,279 UART: [art] Lock RT PCRs Done
20,354,609 UART: [art] Populate DV Done
20,359,823 UART: [fht] FMC Alias Private Key: 7
20,361,309 UART: [art] Derive CDI
20,362,106 UART: [art] Store in slot 0x4
20,418,269 UART: [art] Derive Key Pair
20,419,315 UART: [art] Store priv key in slot 0x5
22,882,522 UART: [art] Derive Key Pair - Done
22,895,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,608,685 UART: [art] Erasing AUTHORITY.KEYID = 7
24,610,179 UART: [art] PUB.X = 56130DF771484B4F4990AD978F4F3EE654B075C306CCE95680137C805E33B1C60BB9E49283D82E94128F46EBE24115F4
24,617,425 UART: [art] PUB.Y = 7AF63F3BB436BD6814BD4682AAB6A7BA5765224C9F6E211D634CEDCCABDF39F3478B74E955FE74A8D85CD483A8C48FBB
24,624,663 UART: [art] SIG.R = AAF2917E68580648DF7991660183D9CB27B50C70DC7FC2A434679F14CEAAF5C4416667774DFACEBE3A964815BD9D9D2A
24,632,072 UART: [art] SIG.S = D679A8C1FDE30FA82BB5F82D84AC332AB969326685F2E8A51156D026414D549BA02DE82A3A47893A2F4E6ADA647547D6
25,611,500 UART: Caliptra RT
25,612,215 UART: [state] CFI Enabled
25,792,292 UART: [rt] RT listening for mailbox commands...
25,794,704 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,824,705 UART: [rt]cmd =0x54514754, len=24
25,827,442 >>> mbox cmd response data (8 bytes)
27,879,931 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,590,040 >>> mbox cmd response: success
34,590,538 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,626,105 UART:
34,626,429 UART: Running Caliptra FMC ...
34,627,553 UART:
34,627,713 UART: [state] CFI Enabled
34,727,629 UART: [art] Extend RT PCRs Done
34,728,816 UART: [art] Lock RT PCRs Done
34,730,193 UART: [art] Populate DV Done
34,735,931 UART: [fht] FMC Alias Private Key: 7
34,737,629 UART: [art] Derive CDI
34,738,455 UART: [art] Store in slot 0x4
34,797,149 UART: [art] Derive Key Pair
34,798,189 UART: [art] Store priv key in slot 0x5
37,261,056 UART: [art] Derive Key Pair - Done
37,273,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,987,082 UART: [art] Erasing AUTHORITY.KEYID = 7
38,988,598 UART: [art] PUB.X = 346B09DA4601EEC71464FA851968A69F7270E0DF7C1643A1EE5959E21AF2936CB2A57FE0466107AFF6280A0A901B4F15
38,995,852 UART: [art] PUB.Y = 2DEEDB6242B7550477DA61AEECB732C791E14B9B2E8955E361B9F510CE6E633D4545C879AC052CE0321B8D80987D8650
39,003,139 UART: [art] SIG.R = 087EEF0E5E147ECFE4E3E96AAAED74C321F71E5CE922E3033BEB0D0FC9A20CF0C0CDABBC6489F836D4ED7E1593B4CEC8
39,010,534 UART: [art] SIG.S = FC0B1B36B4D8D80F56DE7460C607CFC89DE4CAD360F48BB24EA8C230F9845B6AAFCCF1B412588773C4C33A997E086526
39,989,138 UART: mbox::rt_entry...
39,990,090 UART: ____ _ _ _ ____ _____
39,992,069 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,994,069 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,995,992 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,997,918 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,999,861 UART: |_|
40,000,697 UART:
40,368,625 UART: [rt] Runtime listening for mailbox commands...
40,370,849 >>> mbox cmd response data (160 bytes)
42,420,861 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
49,122,402 >>> mbox cmd response: success
49,122,918 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,154,916 UART:
49,155,194 UART: Running Caliptra FMC ...
49,156,266 UART:
49,156,416 UART: [state] CFI Enabled
49,259,096 UART: [art] Extend RT PCRs Done
49,260,312 UART: [art] Lock RT PCRs Done
49,261,680 UART: [art] Populate DV Done
49,267,039 UART: [fht] FMC Alias Private Key: 7
49,268,735 UART: [art] Derive CDI
49,269,543 UART: [art] Store in slot 0x4
49,328,111 UART: [art] Derive Key Pair
49,329,105 UART: [art] Store priv key in slot 0x5
51,792,507 UART: [art] Derive Key Pair - Done
51,805,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,518,266 UART: [art] Erasing AUTHORITY.KEYID = 7
53,519,771 UART: [art] PUB.X = 7D86B37F62AB81F7A1FB20BA0B36B6A72B225584A9DB6BCABB9F2F1DA742FB562D0BD8A7714B6CE17537ED29541B7CF1
53,527,125 UART: [art] PUB.Y = 6C8BDCD2563E5E5856B752EE1C906B0B653D20A234F7BF0459CA7948D870A74D68EE898C83450FAB945893A4FD2648C2
53,534,318 UART: [art] SIG.R = 264431D3FF454E1C1C59741144899ECBC95456E06FAF85456C4168C83E2515F6F2FDD313DBDF395C0C9091D4953679D2
53,541,661 UART: [art] SIG.S = 7FF6BDE90CF0264581D3ECACDF9CD01370CF010D365274424F98E0DBECC90E1411B3B4780CEA53270E42A5BDD58719E0
54,520,033 UART: mbox::rt_entry...
54,520,981 UART: ____ _ _ _ ____ _____
54,522,976 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,524,978 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,526,913 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,528,842 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,530,766 UART: |_|
54,531,745 UART:
54,900,397 UART: [rt] Runtime listening for mailbox commands...
54,902,595 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,301 UART:
192,666 UART: Running Caliptra ROM ...
193,879 UART:
603,440 UART: [state] CFI Enabled
618,865 UART: [state] LifecycleState = Unprovisioned
620,778 UART: [state] DebugLocked = No
623,583 UART: [state] WD Timer not started. Device not locked for debugging
627,839 UART: [kat] SHA2-256
807,438 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,238 UART: [kat] ++
818,689 UART: [kat] sha1
829,916 UART: [kat] SHA2-256
832,646 UART: [kat] SHA2-384
838,923 UART: [kat] SHA2-512-ACC
841,295 UART: [kat] ECC-384
3,282,902 UART: [kat] HMAC-384Kdf
3,295,626 UART: [kat] LMS
3,772,127 UART: [kat] --
3,777,554 UART: [cold-reset] ++
3,779,060 UART: [fht] FHT @ 0x50003400
3,791,392 UART: [idev] ++
3,792,026 UART: [idev] CDI.KEYID = 6
3,792,912 UART: [idev] SUBJECT.KEYID = 7
3,794,229 UART: [idev] UDS.KEYID = 0
3,795,127 ready_for_fw is high
3,795,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,181 UART: [idev] Erasing UDS.KEYID = 0
6,271,019 UART: [idev] Sha1 KeyId Algorithm
6,294,027 UART: [idev] --
6,298,804 UART: [ldev] ++
6,299,382 UART: [ldev] CDI.KEYID = 6
6,300,289 UART: [ldev] SUBJECT.KEYID = 5
6,301,507 UART: [ldev] AUTHORITY.KEYID = 7
6,302,745 UART: [ldev] FE.KEYID = 1
6,311,365 UART: [ldev] Erasing FE.KEYID = 1
8,790,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,083 UART: [ldev] --
10,586,359 UART: [fwproc] Wait for Commands...
10,589,584 UART: [fwproc] Recv command 0x46574c44
10,591,569 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,986 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,052 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,204 >>> mbox cmd response: success
14,562,916 UART: [afmc] ++
14,563,537 UART: [afmc] CDI.KEYID = 6
14,564,481 UART: [afmc] SUBJECT.KEYID = 7
14,565,652 UART: [afmc] AUTHORITY.KEYID = 5
17,070,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,779 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,957 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,785 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,859 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,394 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,015 UART: [afmc] --
18,870,011 UART: [cold-reset] --
18,874,904 UART: [state] Locking Datavault
18,879,560 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,259 UART: [state] Locking ICCM
18,883,143 UART: [exit] Launching FMC @ 0x40000130
18,891,543 UART:
18,891,782 UART: Running Caliptra FMC ...
18,892,906 UART:
18,893,073 UART: [state] CFI Enabled
18,901,395 UART: [fht] FMC Alias Private Key: 7
20,667,949 UART: [art] Extend RT PCRs Done
20,669,169 UART: [art] Lock RT PCRs Done
20,670,793 UART: [art] Populate DV Done
20,676,046 UART: [fht] FMC Alias Private Key: 7
20,677,589 UART: [art] Derive CDI
20,678,406 UART: [art] Store in slot 0x4
20,721,327 UART: [art] Derive Key Pair
20,722,369 UART: [art] Store priv key in slot 0x5
23,148,877 UART: [art] Derive Key Pair - Done
23,161,708 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,948 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,432 UART: [art] PUB.X = BD75CA7B442109C0248EFBD578259DE10696C8426AB129EC69A4F55C5AC2117EA51C1276B8C7D25F1AFB4739AC99D9B7
24,876,723 UART: [art] PUB.Y = E4E0962C3B2ACB06480B7C42DA8EF26123D3383BA995F164AEDD9E4F12F3529DF5880FAB8F5A75AD11A1B9466C755666
24,883,977 UART: [art] SIG.R = 2A9700E7D625A1FD5A3B2B940B8DA2D2B906A83CC010E77B270054CCC9DD74DD002142A6B28181C03F7D007221B01D21
24,891,314 UART: [art] SIG.S = 97DF81B07240572369DAD42BF8A973437FDE2802F65BF52F4EDA057CD7F850A07A1D89BD750AB8DA512E461CB29CA222
25,870,893 UART: Caliptra RT
25,871,607 UART: [state] CFI Enabled
26,004,892 UART: [rt] RT listening for mailbox commands...
26,007,126 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,037,046 UART: [rt]cmd =0x54514754, len=24
26,039,978 >>> mbox cmd response data (8 bytes)
28,093,445 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,199,493 UART:
28,199,870 UART: Running Caliptra ROM ...
28,200,999 UART:
28,201,195 UART: [state] CFI Enabled
28,215,320 UART: [state] LifecycleState = Unprovisioned
28,217,316 UART: [state] DebugLocked = No
28,218,651 UART: [state] WD Timer not started. Device not locked for debugging
28,221,912 UART: [kat] SHA2-256
28,401,641 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,412,434 UART: [kat] ++
28,412,972 UART: [kat] sha1
28,423,707 UART: [kat] SHA2-256
28,426,449 UART: [kat] SHA2-384
28,432,863 UART: [kat] SHA2-512-ACC
28,435,211 UART: [kat] ECC-384
30,877,495 UART: [kat] HMAC-384Kdf
30,889,563 UART: [kat] LMS
31,366,041 UART: [kat] --
31,369,463 UART: [update-reset] ++
34,426,163 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,428,887 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,701,515 >>> mbox cmd response: success
34,701,890 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,702,438 UART: [update-reset] Copying MAN_2 To MAN_1
34,739,565 UART: [update-reset Success] --
34,743,853 UART: [state] Locking Datavault
34,748,024 UART: [state] Locking PCR0, PCR1 and PCR31
34,749,783 UART: [state] Locking ICCM
34,752,429 UART: [exit] Launching FMC @ 0x40000130
34,760,775 UART:
34,761,022 UART: Running Caliptra FMC ...
34,762,135 UART:
34,762,294 UART: [state] CFI Enabled
34,806,865 UART: [art] Extend RT PCRs Done
34,808,053 UART: [art] Lock RT PCRs Done
34,809,669 UART: [art] Populate DV Done
34,815,189 UART: [fht] FMC Alias Private Key: 7
34,816,887 UART: [art] Derive CDI
34,817,623 UART: [art] Store in slot 0x4
34,860,576 UART: [art] Derive Key Pair
34,861,629 UART: [art] Store priv key in slot 0x5
37,288,612 UART: [art] Derive Key Pair - Done
37,301,429 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,007,789 UART: [art] Erasing AUTHORITY.KEYID = 7
39,009,295 UART: [art] PUB.X = 8B775B767529527948978926A2D3B1941191D5E6A422E4D5D2B7EF4CC89E88D8A22D7C3E3312868BE6625A82C8F4FE2D
39,016,577 UART: [art] PUB.Y = 6437D03F14A557ECFDB5A31D00352064DF7E69DA207BC6CB79C6180A1C56385A76FDC8C0FD0C4C079CFAD5EFFE5FF5E9
39,023,815 UART: [art] SIG.R = CCD3B09F185A2C7A73E8D9E852AD0F2BFFE306CCEA4366C8F834920A0057E7F17E171E6A9BD97C9B69F80E8D813754C2
39,031,204 UART: [art] SIG.S = BF19F889F5199D971D398F865480A3A5136F5E85D86F781EB7F182381FCFEB0D2549E18EC8E90ADE4E0099B196D3DC81
40,009,872 UART: mbox::rt_entry...
40,010,844 UART: ____ _ _ _ ____ _____
40,012,778 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,014,810 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,016,673 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,018,608 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,020,493 UART: |_|
40,021,383 UART:
40,392,535 UART: [rt] Runtime listening for mailbox commands...
40,394,812 >>> mbox cmd response data (160 bytes)
42,445,243 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,550,421 UART:
42,550,785 UART: Running Caliptra ROM ...
42,551,842 UART:
42,552,049 UART: [state] CFI Enabled
42,568,403 UART: [state] LifecycleState = Unprovisioned
42,570,306 UART: [state] DebugLocked = No
42,573,283 UART: [state] WD Timer not started. Device not locked for debugging
42,576,261 UART: [kat] SHA2-256
42,755,962 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
42,766,755 UART: [kat] ++
42,767,215 UART: [kat] sha1
42,777,459 UART: [kat] SHA2-256
42,780,143 UART: [kat] SHA2-384
42,785,869 UART: [kat] SHA2-512-ACC
42,788,221 UART: [kat] ECC-384
45,230,808 UART: [kat] HMAC-384Kdf
45,243,639 UART: [kat] LMS
45,720,064 UART: [kat] --
45,724,917 UART: [update-reset] ++
48,778,755 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,782,878 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,055,515 >>> mbox cmd response: success
49,055,922 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,057,242 UART: [update-reset] Copying MAN_2 To MAN_1
49,094,366 UART: [update-reset Success] --
49,098,631 UART: [state] Locking Datavault
49,102,214 UART: [state] Locking PCR0, PCR1 and PCR31
49,103,984 UART: [state] Locking ICCM
49,106,355 UART: [exit] Launching FMC @ 0x40000130
49,114,753 UART:
49,114,989 UART: Running Caliptra FMC ...
49,116,091 UART:
49,116,253 UART: [state] CFI Enabled
49,160,645 UART: [art] Extend RT PCRs Done
49,161,785 UART: [art] Lock RT PCRs Done
49,163,282 UART: [art] Populate DV Done
49,168,868 UART: [fht] FMC Alias Private Key: 7
49,170,450 UART: [art] Derive CDI
49,171,198 UART: [art] Store in slot 0x4
49,214,220 UART: [art] Derive Key Pair
49,215,222 UART: [art] Store priv key in slot 0x5
51,642,506 UART: [art] Derive Key Pair - Done
51,655,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,362,098 UART: [art] Erasing AUTHORITY.KEYID = 7
53,363,625 UART: [art] PUB.X = 6BDCBFA3A9A7566FE8FD8DABE559D89DAE46EFDDBF18B8F9E61A150C06C4D8F43C108019967090A44DE0639F1180D0A6
53,370,874 UART: [art] PUB.Y = D4AE15AD069A9DEBDA6728BE4344BB7E1A27A60F720BB97AE42961CB4C7FAF0C1E442AB205AA3D6F2C09649DADF76944
53,378,210 UART: [art] SIG.R = 042C32CBF885FABB69F913E38822D3D160DB63BAA4BA7886E1C9BF132E827225F81D599229BF3C6DDC0CC6627A1283E1
53,385,552 UART: [art] SIG.S = 7AB765E66584B18CD289A925773ACA14E66B16653C6350846D1AE4372E640AFDB763FC23DB59452DA966AC16FFDF2CA1
54,363,995 UART: mbox::rt_entry...
54,364,954 UART: ____ _ _ _ ____ _____
54,366,947 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,368,903 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,371,067 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,373,020 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,374,960 UART: |_|
54,375,797 UART:
54,746,633 UART: [rt] Runtime listening for mailbox commands...
54,748,867 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,779,305 ready_for_fw is high
3,779,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,012 >>> mbox cmd response: success
18,696,417 UART:
18,696,812 UART: Running Caliptra FMC ...
18,697,921 UART:
18,698,074 UART: [state] CFI Enabled
18,706,180 UART: [fht] FMC Alias Private Key: 7
20,471,723 UART: [art] Extend RT PCRs Done
20,472,967 UART: [art] Lock RT PCRs Done
20,474,626 UART: [art] Populate DV Done
20,479,997 UART: [fht] FMC Alias Private Key: 7
20,481,490 UART: [art] Derive CDI
20,482,229 UART: [art] Store in slot 0x4
20,524,723 UART: [art] Derive Key Pair
20,525,766 UART: [art] Store priv key in slot 0x5
22,952,768 UART: [art] Derive Key Pair - Done
22,965,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,314 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,811 UART: [art] PUB.X = F84D80F430B36A8DBD9C9C70474921CBA8968E475792CCF260F2B48286E9AC538199EE2A90667E24AE42A77AADDD08DA
24,681,066 UART: [art] PUB.Y = 077C9A003E78B7B1E30B3A833F777A32C9704FCD594566034F363F09B421F4EB397AD9E9C921E1ED559DF29A447BD496
24,688,324 UART: [art] SIG.R = 3F580CC62F13F1094B5DDEE29E97A1F4889D4D286314BA43F4D36AAEDD289019F44A6B733D23C08CE6C295E6E6041DA1
24,695,721 UART: [art] SIG.S = E45122AE8FD3517A643608548A74EE57B1DC9C183229D0126C9C22E56392E104413B1554CB7F9F45926D71409464D401
25,674,621 UART: Caliptra RT
25,675,333 UART: [state] CFI Enabled
25,809,169 UART: [rt] RT listening for mailbox commands...
25,811,447 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,841,528 UART: [rt]cmd =0x54514754, len=24
25,844,132 >>> mbox cmd response data (8 bytes)
27,903,329 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,513,500 >>> mbox cmd response: success
34,514,059 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,547,533 UART:
34,547,821 UART: Running Caliptra FMC ...
34,548,900 UART:
34,549,052 UART: [state] CFI Enabled
34,593,186 UART: [art] Extend RT PCRs Done
34,594,402 UART: [art] Lock RT PCRs Done
34,595,752 UART: [art] Populate DV Done
34,600,900 UART: [fht] FMC Alias Private Key: 7
34,602,394 UART: [art] Derive CDI
34,603,158 UART: [art] Store in slot 0x4
34,646,135 UART: [art] Derive Key Pair
34,647,138 UART: [art] Store priv key in slot 0x5
37,074,276 UART: [art] Derive Key Pair - Done
37,087,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,793,529 UART: [art] Erasing AUTHORITY.KEYID = 7
38,795,036 UART: [art] PUB.X = DEE3D02535094B6A69A7A1904BC91F733AC20B9A39B6D0E2422A82507EBBA8405DEF0D5FD016FD0BC53D727BB885C47C
38,802,294 UART: [art] PUB.Y = 6828507DD75DFB54AA3EA801B892A19C18A5C87910C2868C3DB7CCC002FDA780ADB396AFBB3EBAC4CB8A9CCF41D88CEF
38,809,560 UART: [art] SIG.R = E1E7F803A525A303A4AACA3367398C2250E2CD859FDACA5A767E8A8A0E6364C6B9784837634F872C238FC6850416FB94
38,816,980 UART: [art] SIG.S = C261491217246887D00B3A0F1E9F40D51F39F05E28737EC21CB692220B1A44F2942B6BB192F1103E03FD8B9ED394C18C
39,795,461 UART: mbox::rt_entry...
39,796,401 UART: ____ _ _ _ ____ _____
39,798,350 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,800,362 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,802,218 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,804,148 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,806,005 UART: |_|
39,806,896 UART:
40,179,531 UART: [rt] Runtime listening for mailbox commands...
40,181,802 >>> mbox cmd response data (160 bytes)
42,232,750 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
48,839,549 >>> mbox cmd response: success
48,840,075 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,871,873 UART:
48,872,175 UART: Running Caliptra FMC ...
48,873,293 UART:
48,873,458 UART: [state] CFI Enabled
48,917,434 UART: [art] Extend RT PCRs Done
48,918,623 UART: [art] Lock RT PCRs Done
48,919,927 UART: [art] Populate DV Done
48,925,181 UART: [fht] FMC Alias Private Key: 7
48,926,673 UART: [art] Derive CDI
48,927,441 UART: [art] Store in slot 0x4
48,970,208 UART: [art] Derive Key Pair
48,971,255 UART: [art] Store priv key in slot 0x5
51,397,941 UART: [art] Derive Key Pair - Done
51,410,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,117,238 UART: [art] Erasing AUTHORITY.KEYID = 7
53,118,738 UART: [art] PUB.X = CA7653FE1EAC4E5B0652AF80E27B7D325E9DD369069D3A0068F5C30BC43EDD39E29B08548D63EB75167F412E13AD8D08
53,126,001 UART: [art] PUB.Y = E5650094211846C99B554995319352EF6270D1CE7680465B5C3D0B5665DBE6D598CAB50442533E811538C22C0FDBEDDE
53,133,188 UART: [art] SIG.R = B2BAFA9833AAEC9E36FEA897CF49B89A352989FAE7A988F840326FC6B44EBD999330EE35B84D1740A4DF35188C226410
53,140,610 UART: [art] SIG.S = 9A12B8372A70D5A0649146A9D42D17ECEA69911AD8AAA90D037CD03AF2D5CC6534AE452F4374118AA0EFCA5F7A6B0894
54,118,881 UART: mbox::rt_entry...
54,119,820 UART: ____ _ _ _ ____ _____
54,121,800 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,123,807 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,125,664 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,127,588 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,129,448 UART: |_|
54,130,332 UART:
54,501,704 UART: [rt] Runtime listening for mailbox commands...
54,503,925 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,063 UART:
192,438 UART: Running Caliptra ROM ...
193,554 UART:
193,700 UART: [state] CFI Enabled
267,470 UART: [state] LifecycleState = Unprovisioned
269,896 UART: [state] DebugLocked = No
272,639 UART: [state] WD Timer not started. Device not locked for debugging
276,536 UART: [kat] SHA2-256
466,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,233 UART: [kat] ++
477,708 UART: [kat] sha1
488,582 UART: [kat] SHA2-256
491,625 UART: [kat] SHA2-384
498,936 UART: [kat] SHA2-512-ACC
501,524 UART: [kat] ECC-384
2,950,298 UART: [kat] HMAC-384Kdf
2,974,325 UART: [kat] LMS
3,506,075 UART: [kat] --
3,511,588 UART: [cold-reset] ++
3,514,019 UART: [fht] FHT @ 0x50003400
3,525,637 UART: [idev] ++
3,526,339 UART: [idev] CDI.KEYID = 6
3,527,314 UART: [idev] SUBJECT.KEYID = 7
3,528,484 UART: [idev] UDS.KEYID = 0
3,529,407 ready_for_fw is high
3,529,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,646 UART: [idev] Erasing UDS.KEYID = 0
6,029,669 UART: [idev] Sha1 KeyId Algorithm
6,052,488 UART: [idev] --
6,057,882 UART: [ldev] ++
6,058,557 UART: [ldev] CDI.KEYID = 6
6,059,467 UART: [ldev] SUBJECT.KEYID = 5
6,060,677 UART: [ldev] AUTHORITY.KEYID = 7
6,061,856 UART: [ldev] FE.KEYID = 1
6,103,079 UART: [ldev] Erasing FE.KEYID = 1
8,608,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,030 UART: [ldev] --
10,419,067 UART: [fwproc] Wait for Commands...
10,422,031 UART: [fwproc] Recv command 0x46574c44
10,424,341 UART: [fwproc] Recv'd Img size: 118548 bytes
13,935,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,014,626 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,138,282 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,698,972 >>> mbox cmd response: success
14,702,547 UART: [afmc] ++
14,703,275 UART: [afmc] CDI.KEYID = 6
14,704,466 UART: [afmc] SUBJECT.KEYID = 7
14,705,903 UART: [afmc] AUTHORITY.KEYID = 5
17,234,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,963,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,965,579 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,980,709 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,995,844 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,010,714 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,034,382 UART: [afmc] --
19,037,487 UART: [cold-reset] --
19,041,645 UART: [state] Locking Datavault
19,049,011 UART: [state] Locking PCR0, PCR1 and PCR31
19,051,265 UART: [state] Locking ICCM
19,053,063 UART: [exit] Launching FMC @ 0x40000130
19,061,748 UART:
19,061,984 UART: Running Caliptra FMC ...
19,063,088 UART:
19,063,252 UART: [state] CFI Enabled
19,117,823 UART: [fht] FMC Alias Private Key: 7
20,884,596 UART: [art] Extend RT PCRs Done
20,885,812 UART: [art] Lock RT PCRs Done
20,887,649 UART: [art] Populate DV Done
20,893,161 UART: [fht] FMC Alias Private Key: 7
20,894,799 UART: [art] Derive CDI
20,895,625 UART: [art] Store in slot 0x4
20,951,200 UART: [art] Derive Key Pair
20,952,211 UART: [art] Store priv key in slot 0x5
23,414,968 UART: [art] Derive Key Pair - Done
23,428,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,210 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,723 UART: [art] PUB.X = 17C56B455E37B71B3188BABC53A1763628DAC84040B1E2A6A02CC81FEB443068EEC0BD36699CAF940312D47854ECCEA5
25,150,007 UART: [art] PUB.Y = 5753163B12AB9981C69C37D7BA190FE799D3806D9FE16535E7A02D7F9EFC3304C2A8665B48B86E6D697D7409E63AE8D9
25,157,277 UART: [art] SIG.R = 90F7098BCF8FD1F3C1E48AA5368F4C2C98CB42937212092534AB89B789783E08466C4895D20F8A67EE9D07C1F6043158
25,164,591 UART: [art] SIG.S = C620CAF74DF24CBE9AC620F216250DEEFB19872BF293151D88CFAE4B7362E1B5FCA4E213D74B1B54862A15D1B622AB3A
26,143,780 UART: Caliptra RT
26,144,489 UART: [state] CFI Enabled
26,324,198 UART: [rt] RT listening for mailbox commands...
26,326,484 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,356,422 UART: [rt]cmd =0x54514754, len=24
26,359,108 >>> mbox cmd response data (8 bytes)
28,417,541 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,523,656 UART:
28,524,025 UART: Running Caliptra ROM ...
28,525,176 UART:
28,525,353 UART: [state] CFI Enabled
28,593,972 UART: [state] LifecycleState = Unprovisioned
28,596,016 UART: [state] DebugLocked = No
28,598,058 UART: [state] WD Timer not started. Device not locked for debugging
28,602,884 UART: [kat] SHA2-256
28,792,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,803,513 UART: [kat] ++
28,803,972 UART: [kat] sha1
28,815,397 UART: [kat] SHA2-256
28,818,397 UART: [kat] SHA2-384
28,824,418 UART: [kat] SHA2-512-ACC
28,827,040 UART: [kat] ECC-384
31,278,271 UART: [kat] HMAC-384Kdf
31,301,850 UART: [kat] LMS
31,833,418 UART: [kat] --
31,838,809 UART: [update-reset] ++
34,908,451 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,911,288 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,326,730 >>> mbox cmd response: success
35,327,113 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,328,530 UART: [update-reset] Copying MAN_2 To MAN_1
35,366,090 UART: [update-reset Success] --
35,369,138 UART: [state] Locking Datavault
35,372,924 UART: [state] Locking PCR0, PCR1 and PCR31
35,375,125 UART: [state] Locking ICCM
35,377,058 UART: [exit] Launching FMC @ 0x40000130
35,385,745 UART:
35,385,991 UART: Running Caliptra FMC ...
35,387,092 UART:
35,387,251 UART: [state] CFI Enabled
35,494,222 UART: [art] Extend RT PCRs Done
35,495,400 UART: [art] Lock RT PCRs Done
35,496,799 UART: [art] Populate DV Done
35,502,366 UART: [fht] FMC Alias Private Key: 7
35,503,949 UART: [art] Derive CDI
35,504,761 UART: [art] Store in slot 0x4
35,563,120 UART: [art] Derive Key Pair
35,564,160 UART: [art] Store priv key in slot 0x5
38,027,433 UART: [art] Derive Key Pair - Done
38,040,047 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,752,777 UART: [art] Erasing AUTHORITY.KEYID = 7
39,754,284 UART: [art] PUB.X = 61F58533733B8AFFD46BF9B7C7BD225372DA3763B2161010E2D5D46466BC52FE00C4CD295102323AF4FBADCC67D0A49F
39,761,523 UART: [art] PUB.Y = F7F5B97C1FA0733796A5E5A1BE0B4077A20D2B0EF2AE1F66F1AF55AA90B16D650A5317440C8B811E7BF3B9E73720858A
39,768,785 UART: [art] SIG.R = 7EFD86853874BCC76A93573EC1913DCCB6D2F57CC09B70C983A7CD44CBF34B583A610E1DBE770B772C6CB5E225A49328
39,776,232 UART: [art] SIG.S = 42C799FE53F515360F8E5ABDB343DBB1B439F206F8EF07D7FEFD8BDBEC33CC0CFF02568E59F3B61061EFEB725533B372
40,754,118 UART: mbox::rt_entry...
40,755,091 UART: ____ _ _ _ ____ _____
40,757,088 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,759,099 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,761,036 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,762,971 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,764,826 UART: |_|
40,765,709 UART:
41,141,330 UART: [rt] Runtime listening for mailbox commands...
41,143,614 >>> mbox cmd response data (160 bytes)
43,199,189 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,304,362 UART:
43,304,714 UART: Running Caliptra ROM ...
43,305,845 UART:
43,306,011 UART: [state] CFI Enabled
43,378,470 UART: [state] LifecycleState = Unprovisioned
43,380,562 UART: [state] DebugLocked = No
43,382,488 UART: [state] WD Timer not started. Device not locked for debugging
43,386,502 UART: [kat] SHA2-256
43,576,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,587,109 UART: [kat] ++
43,587,592 UART: [kat] sha1
43,599,992 UART: [kat] SHA2-256
43,603,005 UART: [kat] SHA2-384
43,608,953 UART: [kat] SHA2-512-ACC
43,611,544 UART: [kat] ECC-384
46,065,607 UART: [kat] HMAC-384Kdf
46,086,805 UART: [kat] LMS
46,618,334 UART: [kat] --
46,623,073 UART: [update-reset] ++
49,692,790 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,695,794 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
50,111,256 >>> mbox cmd response: success
50,111,640 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,111,925 UART: [update-reset] Copying MAN_2 To MAN_1
50,149,057 UART: [update-reset Success] --
50,154,044 UART: [state] Locking Datavault
50,157,349 UART: [state] Locking PCR0, PCR1 and PCR31
50,159,531 UART: [state] Locking ICCM
50,162,432 UART: [exit] Launching FMC @ 0x40000130
50,171,105 UART:
50,171,401 UART: Running Caliptra FMC ...
50,172,513 UART:
50,172,671 UART: [state] CFI Enabled
50,278,035 UART: [art] Extend RT PCRs Done
50,279,218 UART: [art] Lock RT PCRs Done
50,280,776 UART: [art] Populate DV Done
50,286,449 UART: [fht] FMC Alias Private Key: 7
50,288,090 UART: [art] Derive CDI
50,288,901 UART: [art] Store in slot 0x4
50,347,634 UART: [art] Derive Key Pair
50,348,665 UART: [art] Store priv key in slot 0x5
52,811,140 UART: [art] Derive Key Pair - Done
52,823,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,537,145 UART: [art] Erasing AUTHORITY.KEYID = 7
54,538,656 UART: [art] PUB.X = 3C02794DFD632394EB24B7DB89E37700F10853B2A59D8346B0304FC115CAD10394684AD9C878D24B44BD667D9E7E5BE1
54,545,931 UART: [art] PUB.Y = 3BC9FFEDAE427522C8DF1A84079A6BE96E6594F012B1ACC539D4A21CC713D0117366617C42AE464D49F6FC0B23C8D4E8
54,553,159 UART: [art] SIG.R = 7FF4BEDA4A815A92CB7BB0D22A988D95486C00291FA8D3C9791237D687D3F099E8868FE84225F68545A898E54C28D0DC
54,560,577 UART: [art] SIG.S = 7B1F5C53FDD3024ADE7447C59D1C0DE46D2DBCD21E9F426E31DB8495474C8F3B0C853FC9EAA055118B20F72CC22AC6D3
55,539,305 UART: mbox::rt_entry...
55,540,277 UART: ____ _ _ _ ____ _____
55,542,264 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,544,268 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,546,198 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,548,132 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,550,059 UART: |_|
55,550,872 UART:
55,923,558 UART: [rt] Runtime listening for mailbox commands...
55,925,840 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,422,282 ready_for_fw is high
3,422,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,525 >>> mbox cmd response: success
19,113,947 UART:
19,114,339 UART: Running Caliptra FMC ...
19,115,445 UART:
19,115,595 UART: [state] CFI Enabled
19,182,379 UART: [fht] FMC Alias Private Key: 7
20,948,444 UART: [art] Extend RT PCRs Done
20,949,670 UART: [art] Lock RT PCRs Done
20,951,269 UART: [art] Populate DV Done
20,956,582 UART: [fht] FMC Alias Private Key: 7
20,958,069 UART: [art] Derive CDI
20,958,835 UART: [art] Store in slot 0x4
21,015,309 UART: [art] Derive Key Pair
21,016,383 UART: [art] Store priv key in slot 0x5
23,479,430 UART: [art] Derive Key Pair - Done
23,492,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,272 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,804 UART: [art] PUB.X = 92911992CB9805B0580A858B9F71B8E90031E6BCCC435624F204AA6F51537EBACE3E521572E46CE33FC2B82C5E64AC9C
25,214,031 UART: [art] PUB.Y = 3197A62F1D5C4118DEB10F0E1EDE36D472707337C5A73CEE4C85D6FF2731ADC510AEF508D5E36F6C3356BF0A0B749D3E
25,221,300 UART: [art] SIG.R = 2513EA753A510F10DC51AED89AB316E05B7B136A1636445ECA61D5A634259C734F5CBA36FFCF7BEC50F19636B28C46FB
25,228,827 UART: [art] SIG.S = 982A08723523D64C1EA0D5319ECECE502D8B45BC5F13F1A4B4629923AFCB0462D2226BEE2FDADD8646C9AB596AECC8E7
26,207,757 UART: Caliptra RT
26,208,447 UART: [state] CFI Enabled
26,389,365 UART: [rt] RT listening for mailbox commands...
26,391,641 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,421,772 UART: [rt]cmd =0x54514754, len=24
26,424,433 >>> mbox cmd response data (8 bytes)
28,492,723 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,586,882 >>> mbox cmd response: success
35,587,489 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,621,009 UART:
35,621,319 UART: Running Caliptra FMC ...
35,622,440 UART:
35,622,601 UART: [state] CFI Enabled
35,709,648 UART: [art] Extend RT PCRs Done
35,710,842 UART: [art] Lock RT PCRs Done
35,712,343 UART: [art] Populate DV Done
35,717,872 UART: [fht] FMC Alias Private Key: 7
35,719,404 UART: [art] Derive CDI
35,720,214 UART: [art] Store in slot 0x4
35,778,255 UART: [art] Derive Key Pair
35,779,254 UART: [art] Store priv key in slot 0x5
38,241,977 UART: [art] Derive Key Pair - Done
38,254,708 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,967,954 UART: [art] Erasing AUTHORITY.KEYID = 7
39,969,484 UART: [art] PUB.X = E2321DB97592C2736A07062432BE415978911D08F98E10C4F3B9BDE22ACAD8ADBF5D74FF5EAEAAE88AE512BD0DB7620B
39,976,749 UART: [art] PUB.Y = 6B3D572C39BB8EDDF3710F22624FBF4E8D0C2BF0773C7CBB74E0FA05FA13A722AF0CFF6C725D6A77821D16EE66CC7476
39,984,038 UART: [art] SIG.R = A8F192BC4F8C7C4E69053BD661EA1FEE3597902ECBF5DCC0A040A5AF33CD7D2FB6924515509F751B408FB4849F3228DA
39,991,439 UART: [art] SIG.S = 9EB25E74E42BD5AD71E7BDB75521F680E0A9F63318A13F5945F8EECD26E54289DE67AE96B7AB17885FBF0677C3A69D22
40,969,783 UART: mbox::rt_entry...
40,970,747 UART: ____ _ _ _ ____ _____
40,972,678 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,974,676 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,976,529 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,978,453 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,980,301 UART: |_|
40,981,123 UART:
41,354,895 UART: [rt] Runtime listening for mailbox commands...
41,357,151 >>> mbox cmd response data (160 bytes)
43,413,734 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,496,861 >>> mbox cmd response: success
50,497,372 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,530,509 UART:
50,530,833 UART: Running Caliptra FMC ...
50,531,959 UART:
50,532,127 UART: [state] CFI Enabled
50,639,068 UART: [art] Extend RT PCRs Done
50,640,264 UART: [art] Lock RT PCRs Done
50,641,504 UART: [art] Populate DV Done
50,646,919 UART: [fht] FMC Alias Private Key: 7
50,648,565 UART: [art] Derive CDI
50,649,376 UART: [art] Store in slot 0x4
50,707,848 UART: [art] Derive Key Pair
50,708,908 UART: [art] Store priv key in slot 0x5
53,171,495 UART: [art] Derive Key Pair - Done
53,184,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,897,018 UART: [art] Erasing AUTHORITY.KEYID = 7
54,898,539 UART: [art] PUB.X = 1D76820AEC64F42AA5106ED5FFE7254872E4EFC39FCFDC7D41FBD97F717F88E6141764A49BA3595E816373B46647D1EB
54,905,801 UART: [art] PUB.Y = 8BD880BB1195D0FAAE7BA4ED2ECF785509699E5C3AA66A108AA0B0C224AF04EBD6C5E11F06557A6C6F6FE139D2746D24
54,913,110 UART: [art] SIG.R = 67E20FD0C28A4B4AB75EC2FC14E3BEA00BB2F5631681A27CC55A8BD7E8058C19469F9846A58E59463F5F46BED31385BC
54,920,466 UART: [art] SIG.S = 022B703D984862E48387153D8C2A6DEBA428F563A5EE3953DA2BBD8F55B104FD63E04EA3D31627EA00190D89BCA24BF9
55,899,294 UART: mbox::rt_entry...
55,900,259 UART: ____ _ _ _ ____ _____
55,902,205 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,904,210 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,906,064 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,907,991 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,909,920 UART: |_|
55,910,725 UART:
56,282,314 UART: [rt] Runtime listening for mailbox commands...
56,284,542 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.93s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,350 UART:
192,716 UART: Running Caliptra ROM ...
193,813 UART:
603,676 UART: [state] CFI Enabled
619,364 UART: [state] LifecycleState = Unprovisioned
621,747 UART: [state] DebugLocked = No
623,780 UART: [state] WD Timer not started. Device not locked for debugging
629,110 UART: [kat] SHA2-256
819,011 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,774 UART: [kat] ++
830,335 UART: [kat] sha1
841,658 UART: [kat] SHA2-256
844,680 UART: [kat] SHA2-384
851,672 UART: [kat] SHA2-512-ACC
854,258 UART: [kat] ECC-384
3,294,663 UART: [kat] HMAC-384Kdf
3,307,615 UART: [kat] LMS
3,839,472 UART: [kat] --
3,845,736 UART: [cold-reset] ++
3,846,962 UART: [fht] FHT @ 0x50003400
3,858,869 UART: [idev] ++
3,859,506 UART: [idev] CDI.KEYID = 6
3,860,465 UART: [idev] SUBJECT.KEYID = 7
3,861,711 UART: [idev] UDS.KEYID = 0
3,862,609 ready_for_fw is high
3,862,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,726 UART: [idev] Erasing UDS.KEYID = 0
6,341,770 UART: [idev] Sha1 KeyId Algorithm
6,363,804 UART: [idev] --
6,368,153 UART: [ldev] ++
6,368,841 UART: [ldev] CDI.KEYID = 6
6,369,728 UART: [ldev] SUBJECT.KEYID = 5
6,370,941 UART: [ldev] AUTHORITY.KEYID = 7
6,372,176 UART: [ldev] FE.KEYID = 1
6,383,447 UART: [ldev] Erasing FE.KEYID = 1
8,861,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,322 UART: [ldev] --
10,650,207 UART: [fwproc] Wait for Commands...
10,651,923 UART: [fwproc] Recv command 0x46574c44
10,654,196 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,157 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,763 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,762 >>> mbox cmd response: success
14,910,156 UART: [afmc] ++
14,910,895 UART: [afmc] CDI.KEYID = 6
14,912,013 UART: [afmc] SUBJECT.KEYID = 7
14,913,577 UART: [afmc] AUTHORITY.KEYID = 5
17,416,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,965 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,072 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,233 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,101 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,834 UART: [afmc] --
19,214,504 UART: [cold-reset] --
19,217,680 UART: [state] Locking Datavault
19,223,978 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,138 UART: [state] Locking ICCM
19,229,128 UART: [exit] Launching FMC @ 0x40000130
19,237,798 UART:
19,238,050 UART: Running Caliptra FMC ...
19,239,165 UART:
19,239,329 UART: [state] CFI Enabled
19,247,762 UART: [fht] FMC Alias Private Key: 7
21,014,452 UART: [art] Extend RT PCRs Done
21,015,659 UART: [art] Lock RT PCRs Done
21,017,506 UART: [art] Populate DV Done
21,022,711 UART: [fht] FMC Alias Private Key: 7
21,024,370 UART: [art] Derive CDI
21,025,114 UART: [art] Store in slot 0x4
21,068,055 UART: [art] Derive Key Pair
21,069,103 UART: [art] Store priv key in slot 0x5
23,496,050 UART: [art] Derive Key Pair - Done
23,509,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,231 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,724 UART: [art] PUB.X = B01ACA913CD7DE13BE58A2D297ADA7865BA8F4E8B1FD30D9C53D035FCA7C39402259C4074E776AF0927DB2D971377E84
25,223,993 UART: [art] PUB.Y = AD71E24F0781F1278405C57A841A4647236DB98636998345012AE2CC31320CF307E8A0614B0CC4114BCD23C6C64F79DF
25,231,216 UART: [art] SIG.R = E2C90C8FC0942A78865330947445B40571A211C97211E5433B55A14BBCDA04E37C8DC54C1BD84D9A571E597C6330AFCF
25,238,602 UART: [art] SIG.S = DFC3EE9C9C99AEAF08A65EC4C9949C3DFE9F3A004F656ECF27931EB278DEA2774E8CE79BA91A71A835AFA01255ABFA99
26,217,514 UART: Caliptra RT
26,218,225 UART: [state] CFI Enabled
26,350,095 UART: [rt] RT listening for mailbox commands...
26,352,187 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,382,109 UART: [rt]cmd =0x54514754, len=24
26,385,044 >>> mbox cmd response data (8 bytes)
28,449,275 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,555,401 UART:
28,555,775 UART: Running Caliptra ROM ...
28,556,911 UART:
28,557,081 UART: [state] CFI Enabled
28,573,512 UART: [state] LifecycleState = Unprovisioned
28,575,411 UART: [state] DebugLocked = No
28,578,031 UART: [state] WD Timer not started. Device not locked for debugging
28,583,530 UART: [kat] SHA2-256
28,773,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,784,154 UART: [kat] ++
28,784,671 UART: [kat] sha1
28,795,993 UART: [kat] SHA2-256
28,798,983 UART: [kat] SHA2-384
28,805,899 UART: [kat] SHA2-512-ACC
28,808,524 UART: [kat] ECC-384
31,248,696 UART: [kat] HMAC-384Kdf
31,261,695 UART: [kat] LMS
31,793,304 UART: [kat] --
31,796,121 UART: [update-reset] ++
34,863,578 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,867,710 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,283,142 >>> mbox cmd response: success
35,283,521 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,284,456 UART: [update-reset] Copying MAN_2 To MAN_1
35,322,036 UART: [update-reset Success] --
35,326,650 UART: [state] Locking Datavault
35,329,921 UART: [state] Locking PCR0, PCR1 and PCR31
35,332,070 UART: [state] Locking ICCM
35,334,736 UART: [exit] Launching FMC @ 0x40000130
35,343,364 UART:
35,343,650 UART: Running Caliptra FMC ...
35,344,825 UART:
35,344,990 UART: [state] CFI Enabled
35,389,016 UART: [art] Extend RT PCRs Done
35,390,209 UART: [art] Lock RT PCRs Done
35,391,426 UART: [art] Populate DV Done
35,396,838 UART: [fht] FMC Alias Private Key: 7
35,398,484 UART: [art] Derive CDI
35,399,228 UART: [art] Store in slot 0x4
35,441,715 UART: [art] Derive Key Pair
35,442,714 UART: [art] Store priv key in slot 0x5
37,870,251 UART: [art] Derive Key Pair - Done
37,883,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,589,294 UART: [art] Erasing AUTHORITY.KEYID = 7
39,590,797 UART: [art] PUB.X = 167D16F5866AA0FB56126B7223887953FDACF838BB47F459FBB23DAC77491E2030095F67532C29155645C55CD390A7DA
39,598,011 UART: [art] PUB.Y = 5C89B5B199360E2A6F35DFE19F47244224DFAACD6BD22FAAF67CCF69096C1680ED0564F22BD58A05F8C642E49585DE80
39,605,330 UART: [art] SIG.R = 2111BF53BE2A92082687F10A835EA8BA36304354F7D474EFB8054F350380198989D883AA28DF1266848B6BBDBA02ABC6
39,612,694 UART: [art] SIG.S = 2BBC0B373A4CE903C96A4E2793A659B72C73491271285E6C40DD7AF31617DD92EEE58376E1849B9262894463DA8881C8
40,591,405 UART: mbox::rt_entry...
40,592,385 UART: ____ _ _ _ ____ _____
40,594,383 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,596,398 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,598,330 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,600,260 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,602,188 UART: |_|
40,602,997 UART:
40,975,516 UART: [rt] Runtime listening for mailbox commands...
40,977,742 >>> mbox cmd response data (160 bytes)
43,036,165 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,141,203 UART:
43,141,587 UART: Running Caliptra ROM ...
43,142,738 UART:
43,142,907 UART: [state] CFI Enabled
43,157,945 UART: [state] LifecycleState = Unprovisioned
43,159,830 UART: [state] DebugLocked = No
43,162,033 UART: [state] WD Timer not started. Device not locked for debugging
43,167,325 UART: [kat] SHA2-256
43,357,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,367,938 UART: [kat] ++
43,368,535 UART: [kat] sha1
43,378,840 UART: [kat] SHA2-256
43,381,817 UART: [kat] SHA2-384
43,387,342 UART: [kat] SHA2-512-ACC
43,389,947 UART: [kat] ECC-384
45,830,536 UART: [kat] HMAC-384Kdf
45,843,745 UART: [kat] LMS
46,375,354 UART: [kat] --
46,379,739 UART: [update-reset] ++
49,455,031 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,458,946 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,874,422 >>> mbox cmd response: success
49,874,806 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,876,172 UART: [update-reset] Copying MAN_2 To MAN_1
49,913,756 UART: [update-reset Success] --
49,919,023 UART: [state] Locking Datavault
49,922,077 UART: [state] Locking PCR0, PCR1 and PCR31
49,924,231 UART: [state] Locking ICCM
49,925,692 UART: [exit] Launching FMC @ 0x40000130
49,934,344 UART:
49,934,585 UART: Running Caliptra FMC ...
49,935,616 UART:
49,935,769 UART: [state] CFI Enabled
49,979,845 UART: [art] Extend RT PCRs Done
49,981,029 UART: [art] Lock RT PCRs Done
49,982,683 UART: [art] Populate DV Done
49,988,257 UART: [fht] FMC Alias Private Key: 7
49,989,845 UART: [art] Derive CDI
49,990,579 UART: [art] Store in slot 0x4
50,033,766 UART: [art] Derive Key Pair
50,034,804 UART: [art] Store priv key in slot 0x5
52,461,561 UART: [art] Derive Key Pair - Done
52,474,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,180,640 UART: [art] Erasing AUTHORITY.KEYID = 7
54,182,127 UART: [art] PUB.X = F5D792BB709C1F4AE5C1235BDF2533DC383BC393E0FAE11371E1E69D953CEB0A6CC33FE0FE86794BD26F720773BC920B
54,189,473 UART: [art] PUB.Y = EF31B3FD83995041500F494FF49DA8B2928F62363358E86EB981910280E7CBDF92DE4AF810E76FE0C8C8D421FC474233
54,196,674 UART: [art] SIG.R = 0FF933FBD8AE729FD91AF4B8BB1DA8C34E519167ABB047FD4B0D9E82B55AD6FD8BEA9F71A2B665D234B0AFEF2C8B84B6
54,204,084 UART: [art] SIG.S = D6F3B308FBB44E203D307CF96D8738729A96340727EA33C31F8B7627C740879C871EEAA6D9DA367EA1BB6FCEBC1BEB82
55,183,375 UART: mbox::rt_entry...
55,184,343 UART: ____ _ _ _ ____ _____
55,186,332 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,188,340 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,190,272 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,192,203 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,194,131 UART: |_|
55,194,943 UART:
55,571,573 UART: [rt] Runtime listening for mailbox commands...
55,573,803 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
3,759,830 ready_for_fw is high
3,760,407 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,939 >>> mbox cmd response: success
19,288,572 UART:
19,288,973 UART: Running Caliptra FMC ...
19,290,087 UART:
19,290,246 UART: [state] CFI Enabled
19,298,213 UART: [fht] FMC Alias Private Key: 7
21,064,461 UART: [art] Extend RT PCRs Done
21,065,689 UART: [art] Lock RT PCRs Done
21,067,329 UART: [art] Populate DV Done
21,072,820 UART: [fht] FMC Alias Private Key: 7
21,074,529 UART: [art] Derive CDI
21,075,354 UART: [art] Store in slot 0x4
21,118,171 UART: [art] Derive Key Pair
21,119,230 UART: [art] Store priv key in slot 0x5
23,545,825 UART: [art] Derive Key Pair - Done
23,558,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,265,250 UART: [art] Erasing AUTHORITY.KEYID = 7
25,266,770 UART: [art] PUB.X = 2326ACD2D13246D4A562FC1A47CBD52987AA3DBB17189B62C66A920289D809DF36278B9D28754AC1FEED52610CAE427A
25,273,623 UART: [art] PUB.Y = 7D1B68DF389539F44A3664B6E73BD48F195563EA0F54BA3EF6B0416647F96144A8A44565EF48A5626839BB57AAE0AB9F
25,280,872 UART: [art] SIG.R = C78AA85327CBF67A55BE28739ADA5F763F990D861AD85C1F18A8536DAB98166B6A086205166F651843BD360214FF29AE
25,288,242 UART: [art] SIG.S = A60049D117A51F7BE77E1710684956F29D7426042031B7EF7BE7F06190AB24D6E6E6DF76491EFB0F93E1E1A751E87952
26,267,593 UART: Caliptra RT
26,268,290 UART: [state] CFI Enabled
26,400,650 UART: [rt] RT listening for mailbox commands...
26,402,901 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,432,772 UART: [rt]cmd =0x54514754, len=24
26,435,545 >>> mbox cmd response data (8 bytes)
28,496,648 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,514,897 >>> mbox cmd response: success
35,515,689 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,550,618 UART:
35,550,920 UART: Running Caliptra FMC ...
35,551,960 UART:
35,552,112 UART: [state] CFI Enabled
35,596,206 UART: [art] Extend RT PCRs Done
35,597,404 UART: [art] Lock RT PCRs Done
35,598,865 UART: [art] Populate DV Done
35,604,564 UART: [fht] FMC Alias Private Key: 7
35,606,164 UART: [art] Derive CDI
35,607,142 UART: [art] Store in slot 0x4
35,649,834 UART: [art] Derive Key Pair
35,650,847 UART: [art] Store priv key in slot 0x5
38,077,538 UART: [art] Derive Key Pair - Done
38,090,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,797,344 UART: [art] Erasing AUTHORITY.KEYID = 7
39,798,855 UART: [art] PUB.X = BEF43E2B4EC58B1AC896828AFFA57CCABEDE1066A89EF4B8EE1C09E9CAFA89426199ED249D0919BB7F72529B42075D56
39,806,159 UART: [art] PUB.Y = 5A5C2204C849F08EB9F6ED8493F7F4AA1C82CB2F5390EE853C9DB75B894888F6934E69464F6FF782238E3471728E7292
39,813,394 UART: [art] SIG.R = 124FC8F009AEC022203E12CD8FA0610C1E37F82C0A00588E668C752F4514C02327447944FAF5D1C1AB404580A8013A02
39,820,735 UART: [art] SIG.S = 5670FEF25FBCA85EA6A6597477AFFAFE2D83639AFBC77E6FD3847C2764CA82788F8E5EAC3F7CD78B9C8E23565F93DBB0
40,799,244 UART: mbox::rt_entry...
40,800,217 UART: ____ _ _ _ ____ _____
40,802,159 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,804,177 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,806,114 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,808,049 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,809,988 UART: |_|
40,810,833 UART:
41,178,244 UART: [rt] Runtime listening for mailbox commands...
41,180,454 >>> mbox cmd response data (160 bytes)
43,241,553 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,267,935 >>> mbox cmd response: success
50,268,404 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,302,580 UART:
50,302,872 UART: Running Caliptra FMC ...
50,303,945 UART:
50,304,102 UART: [state] CFI Enabled
50,348,042 UART: [art] Extend RT PCRs Done
50,349,223 UART: [art] Lock RT PCRs Done
50,350,414 UART: [art] Populate DV Done
50,355,886 UART: [fht] FMC Alias Private Key: 7
50,357,481 UART: [art] Derive CDI
50,358,304 UART: [art] Store in slot 0x4
50,401,225 UART: [art] Derive Key Pair
50,402,287 UART: [art] Store priv key in slot 0x5
52,829,175 UART: [art] Derive Key Pair - Done
52,841,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,548,192 UART: [art] Erasing AUTHORITY.KEYID = 7
54,549,702 UART: [art] PUB.X = 0B70BB6C34A5769993431B4EF90C4DAA1BA3D4DF74BEAB784B881CB133C71EB3C714FCA9802E08B958E65DF63099F2D7
54,557,009 UART: [art] PUB.Y = D979B7D1DAF251136BC28C8F75EF5693EA0EFDA5C9CF9F056BCCC699044C400759550B93579B09CD858B6FE14F7CD7F8
54,564,253 UART: [art] SIG.R = 03B2495AAD551C388BFD3A208DFFA262BA824475E4C59D2E66B55747B220999F503DD40E0F1E2E40063229D4F2E7D603
54,571,655 UART: [art] SIG.S = B2BD5FA72251D1E83B5820C23981BA5B82ACCE038FD1CA1CFAE726AF7EA4E3331D1BD707F3AB65CE286E97C5FDFCECE2
55,550,584 UART: mbox::rt_entry...
55,551,543 UART: ____ _ _ _ ____ _____
55,553,526 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,555,533 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,557,464 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,559,397 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,561,330 UART: |_|
55,562,145 UART:
55,938,224 UART: [rt] Runtime listening for mailbox commands...
55,940,452 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,705 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,255 UART: [kat] SHA2-256
882,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,301 UART: [kat] ++
886,453 UART: [kat] sha1
890,677 UART: [kat] SHA2-256
892,615 UART: [kat] SHA2-384
895,544 UART: [kat] SHA2-512-ACC
897,445 UART: [kat] ECC-384
903,320 UART: [kat] HMAC-384Kdf
907,842 UART: [kat] LMS
1,476,038 UART: [kat] --
1,476,917 UART: [cold-reset] ++
1,477,415 UART: [fht] Storing FHT @ 0x50003400
1,480,226 UART: [idev] ++
1,480,394 UART: [idev] CDI.KEYID = 6
1,480,754 UART: [idev] SUBJECT.KEYID = 7
1,481,178 UART: [idev] UDS.KEYID = 0
1,481,523 ready_for_fw is high
1,481,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,582 UART: [idev] Erasing UDS.KEYID = 0
1,506,100 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,674 UART: [idev] --
1,515,633 UART: [ldev] ++
1,515,801 UART: [ldev] CDI.KEYID = 6
1,516,164 UART: [ldev] SUBJECT.KEYID = 5
1,516,590 UART: [ldev] AUTHORITY.KEYID = 7
1,517,053 UART: [ldev] FE.KEYID = 1
1,522,245 UART: [ldev] Erasing FE.KEYID = 1
1,547,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,636 UART: [ldev] --
1,587,025 UART: [fwproc] Waiting for Commands...
1,587,858 UART: [fwproc] Received command 0x46574c44
1,588,649 UART: [fwproc] Received Image of size 118548 bytes
2,933,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,343 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,561 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,962 >>> mbox cmd response: success
3,133,176 UART: [afmc] ++
3,133,344 UART: [afmc] CDI.KEYID = 6
3,133,706 UART: [afmc] SUBJECT.KEYID = 7
3,134,131 UART: [afmc] AUTHORITY.KEYID = 5
3,169,342 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,482 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,262 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,971 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,854 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,537 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,473 UART: [afmc] --
3,212,469 UART: [cold-reset] --
3,213,543 UART: [state] Locking Datavault
3,214,818 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,422 UART: [state] Locking ICCM
3,215,982 UART: [exit] Launching FMC @ 0x40000130
3,221,312 UART:
3,221,328 UART: Running Caliptra FMC ...
3,221,736 UART:
3,221,790 UART: [state] CFI Enabled
3,232,440 UART: [fht] FMC Alias Private Key: 7
3,351,024 UART: [art] Extend RT PCRs Done
3,351,452 UART: [art] Lock RT PCRs Done
3,353,008 UART: [art] Populate DV Done
3,360,953 UART: [fht] FMC Alias Private Key: 7
3,361,969 UART: [art] Derive CDI
3,362,249 UART: [art] Store in slot 0x4
3,447,529 UART: [art] Derive Key Pair
3,447,889 UART: [art] Store priv key in slot 0x5
3,461,236 UART: [art] Derive Key Pair - Done
3,475,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,023 UART: [art] PUB.X = 74BCE49E175DB09D5DBD1148D6B4277337EA41F4B6A1F99CEA010B09683EF991C2D61FE57C4ABD2816B86103DD141EAA
3,498,795 UART: [art] PUB.Y = F3997EED4515ADA048166D166D21E623F57241CB702759B51A963295E07D3E91B4A2A30E2889FC1BA743792E63699E03
3,505,733 UART: [art] SIG.R = D15E03FB66F425D5CE208EFF299F35A1189B8519EA8D78AED0A3C8234E60A299FDC734D41D5C57735233CB62D6280041
3,512,482 UART: [art] SIG.S = 7D8B4C9376AB3874169F003E54127A759A7163959B49BDC229387F4EF59E7B2A5827D710F3218CE90F9A71A9DDA11EDD
3,536,175 UART: Caliptra RT
3,536,426 UART: [state] CFI Enabled
3,656,710 UART: [rt] RT listening for mailbox commands...
3,657,380 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,332 UART: [rt]cmd =0x54514754, len=24
3,689,445 >>> mbox cmd response data (8 bytes)
3,689,446 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,444 UART:
3,690,460 UART: Running Caliptra ROM ...
3,690,868 UART:
3,690,922 UART: [state] CFI Enabled
3,693,492 UART: [state] LifecycleState = Unprovisioned
3,694,147 UART: [state] DebugLocked = No
3,694,699 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,696,186 UART: [kat] SHA2-256
4,490,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,494,232 UART: [kat] ++
4,494,384 UART: [kat] sha1
4,498,642 UART: [kat] SHA2-256
4,500,580 UART: [kat] SHA2-384
4,503,351 UART: [kat] SHA2-512-ACC
4,505,251 UART: [kat] ECC-384
4,510,826 UART: [kat] HMAC-384Kdf
4,515,316 UART: [kat] LMS
5,083,512 UART: [kat] --
5,084,295 UART: [update-reset] ++
6,057,376 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,058,582 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,160,275 >>> mbox cmd response: success
6,160,275 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,160,528 UART: [update-reset] Copying MAN_2 To MAN_1
6,168,542 UART: [update-reset Success] --
6,169,469 UART: [state] Locking Datavault
6,170,409 UART: [state] Locking PCR0, PCR1 and PCR31
6,171,013 UART: [state] Locking ICCM
6,171,469 UART: [exit] Launching FMC @ 0x40000130
6,176,799 UART:
6,176,815 UART: Running Caliptra FMC ...
6,177,223 UART:
6,177,277 UART: [state] CFI Enabled
6,266,246 UART: [art] Extend RT PCRs Done
6,266,674 UART: [art] Lock RT PCRs Done
6,267,777 UART: [art] Populate DV Done
6,275,826 UART: [fht] FMC Alias Private Key: 7
6,276,796 UART: [art] Derive CDI
6,277,076 UART: [art] Store in slot 0x4
6,362,952 UART: [art] Derive Key Pair
6,363,312 UART: [art] Store priv key in slot 0x5
6,376,359 UART: [art] Derive Key Pair - Done
6,391,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,406,273 UART: [art] Erasing AUTHORITY.KEYID = 7
6,407,038 UART: [art] PUB.X = D1E10D736009D4BC4BD017B00628E3E4E19DE1F552B6C50053966F62A4C677993F248E4A5BC3F9E88F75C8EBC04835AC
6,413,783 UART: [art] PUB.Y = 2E3123741D38CA650F20EB795CCAC2FC519675BC05D6FDA7ECA1B2BE323E77E9D9BAA0E818FB7B999D0EB28FFCB70034
6,420,724 UART: [art] SIG.R = D6F9DBD2D7D4FF5A45B1A0BBAF61CADF9730BD40FF304790B6D355582D82B59F8F1FB0C70796FC93FBA0D4B31A9E410E
6,427,512 UART: [art] SIG.S = D751B293D3438FB1C71990B8E6348C6DE1B7786DF5784DD7FECC02EA5CBAEC3F53234DC55C9383488054C3E85F8D4174
6,450,851 UART: mbox::rt_entry...
6,451,223 UART: ____ _ _ _ ____ _____
6,452,007 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,452,807 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,453,575 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,454,343 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,455,111 UART: |_|
6,455,423 UART:
6,815,219 UART: [rt] Runtime listening for mailbox commands...
6,816,565 >>> mbox cmd response data (160 bytes)
6,816,566 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,816,680 UART:
6,816,696 UART: Running Caliptra ROM ...
6,817,104 UART:
6,817,158 UART: [state] CFI Enabled
6,820,112 UART: [state] LifecycleState = Unprovisioned
6,820,767 UART: [state] DebugLocked = No
6,821,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,823,046 UART: [kat] SHA2-256
7,616,977 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,621,092 UART: [kat] ++
7,621,244 UART: [kat] sha1
7,625,394 UART: [kat] SHA2-256
7,627,332 UART: [kat] SHA2-384
7,630,271 UART: [kat] SHA2-512-ACC
7,632,171 UART: [kat] ECC-384
7,637,590 UART: [kat] HMAC-384Kdf
7,642,182 UART: [kat] LMS
8,210,378 UART: [kat] --
8,211,195 UART: [update-reset] ++
9,183,692 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,184,892 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,286,585 >>> mbox cmd response: success
9,286,585 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,286,764 UART: [update-reset] Copying MAN_2 To MAN_1
9,294,778 UART: [update-reset Success] --
9,296,055 UART: [state] Locking Datavault
9,296,739 UART: [state] Locking PCR0, PCR1 and PCR31
9,297,343 UART: [state] Locking ICCM
9,297,835 UART: [exit] Launching FMC @ 0x40000130
9,303,165 UART:
9,303,181 UART: Running Caliptra FMC ...
9,303,589 UART:
9,303,643 UART: [state] CFI Enabled
9,392,592 UART: [art] Extend RT PCRs Done
9,393,020 UART: [art] Lock RT PCRs Done
9,394,059 UART: [art] Populate DV Done
9,402,148 UART: [fht] FMC Alias Private Key: 7
9,403,260 UART: [art] Derive CDI
9,403,540 UART: [art] Store in slot 0x4
9,489,010 UART: [art] Derive Key Pair
9,489,370 UART: [art] Store priv key in slot 0x5
9,502,027 UART: [art] Derive Key Pair - Done
9,516,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,532,228 UART: [art] Erasing AUTHORITY.KEYID = 7
9,532,993 UART: [art] PUB.X = C540EC037019D3902BDCC86207FDA3B9D2D0E61945F32EE8F41FA42B97A9AF188B7F3A75F78B4EC21D9B9A19AC4B2B2A
9,539,775 UART: [art] PUB.Y = F33FDA0143E0037559417A62CF170A3E9137E150101BC97AD50C176ABECD00EB8C23AADDFBC45A941E4AAC336BE5EB85
9,546,709 UART: [art] SIG.R = 3636DA3B88223D8DB8210E8DAC93FD157FD23D45AC603726EA17E7C1ED4D318808415524EC96D1BA83629B9967A396CB
9,553,477 UART: [art] SIG.S = E574B2078752A3441B6B50C15CB2C7A6A18D4471E60BB3EE4CE91F57EF47A11B25E32A0C54181321CE021A2B9F9C3F9A
9,577,235 UART: mbox::rt_entry...
9,577,607 UART: ____ _ _ _ ____ _____
9,578,391 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,579,191 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,579,959 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,580,727 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,581,495 UART: |_|
9,581,807 UART:
9,942,748 UART: [rt] Runtime listening for mailbox commands...
9,944,094 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,609 ready_for_fw is high
1,362,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,846 >>> mbox cmd response: success
3,042,411 UART:
3,042,427 UART: Running Caliptra FMC ...
3,042,835 UART:
3,042,889 UART: [state] CFI Enabled
3,053,277 UART: [fht] FMC Alias Private Key: 7
3,172,171 UART: [art] Extend RT PCRs Done
3,172,599 UART: [art] Lock RT PCRs Done
3,174,053 UART: [art] Populate DV Done
3,182,294 UART: [fht] FMC Alias Private Key: 7
3,183,306 UART: [art] Derive CDI
3,183,586 UART: [art] Store in slot 0x4
3,269,650 UART: [art] Derive Key Pair
3,270,010 UART: [art] Store priv key in slot 0x5
3,283,441 UART: [art] Derive Key Pair - Done
3,298,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,673 UART: [art] PUB.X = 2C21D5E54ED49300DAB514F8B669F000AF4ACEB83692C9B833AF1DC36BCA0282CE1CC8284B6A5BAE4ECDFBD635B00D7D
3,321,419 UART: [art] PUB.Y = AFD8650FB48835DF77A8B39BD0B7C5B6C4F2F5D5AD90ED88776FF3B4DB364B5C46928AF8C83D453900D9E75F23755D24
3,328,356 UART: [art] SIG.R = 9AC8887A15FC038F937589FA423BCD94F2949D548068943977D93354250FCAFF4C1D440A30151F0A46E653B3421FF49D
3,335,110 UART: [art] SIG.S = 18D4735B12251D7DA519DFD046F0BBAA661937E2F92B6AD26E4194107C8FC17D48886787B3545DDD803B1FD5A6EE3831
3,359,454 UART: Caliptra RT
3,359,705 UART: [state] CFI Enabled
3,479,731 UART: [rt] RT listening for mailbox commands...
3,480,401 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,519 UART: [rt]cmd =0x54514754, len=24
3,512,720 >>> mbox cmd response data (8 bytes)
3,512,721 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,864,246 >>> mbox cmd response: success
5,864,246 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,877,694 UART:
5,877,710 UART: Running Caliptra FMC ...
5,878,118 UART:
5,878,172 UART: [state] CFI Enabled
5,967,271 UART: [art] Extend RT PCRs Done
5,967,699 UART: [art] Lock RT PCRs Done
5,968,962 UART: [art] Populate DV Done
5,977,021 UART: [fht] FMC Alias Private Key: 7
5,978,085 UART: [art] Derive CDI
5,978,365 UART: [art] Store in slot 0x4
6,064,043 UART: [art] Derive Key Pair
6,064,403 UART: [art] Store priv key in slot 0x5
6,077,636 UART: [art] Derive Key Pair - Done
6,092,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,107,939 UART: [art] Erasing AUTHORITY.KEYID = 7
6,108,704 UART: [art] PUB.X = F45FD6CBAFC3250F60BEBF6C7E030511EAD84A75C9644B4FA67D85EAD9D72891B6C2FD0BCFAC902E5966587E7E538ABD
6,115,486 UART: [art] PUB.Y = 1356D6D7FD38751A7ABC431AEDC6D8746B35B5F0AA6DE80834346BB9FF3BC9BC94516F1D8CCD97D74A4F2B9FEB45B80B
6,122,452 UART: [art] SIG.R = 07D2BA89759C1D3E03DBE1E156386FB6303A5D71C5F0BF6DD9B94D9F956DC63FA47B3F3ED303B1C1711730106764EDB1
6,129,223 UART: [art] SIG.S = 06731A9086805FB7C9D068FE15861DDA9D17F4F586D00B910528D05D65DA09310095ADC3BDEAAA6EC2B47A3900CAA384
6,153,617 UART: mbox::rt_entry...
6,153,989 UART: ____ _ _ _ ____ _____
6,154,773 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,155,573 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,156,341 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,157,109 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,157,877 UART: |_|
6,158,189 UART:
6,526,427 UART: [rt] Runtime listening for mailbox commands...
6,527,773 >>> mbox cmd response data (160 bytes)
6,527,774 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,879,123 >>> mbox cmd response: success
8,879,123 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,892,541 UART:
8,892,557 UART: Running Caliptra FMC ...
8,892,965 UART:
8,893,019 UART: [state] CFI Enabled
8,982,154 UART: [art] Extend RT PCRs Done
8,982,582 UART: [art] Lock RT PCRs Done
8,983,811 UART: [art] Populate DV Done
8,991,820 UART: [fht] FMC Alias Private Key: 7
8,992,754 UART: [art] Derive CDI
8,993,034 UART: [art] Store in slot 0x4
9,078,698 UART: [art] Derive Key Pair
9,079,058 UART: [art] Store priv key in slot 0x5
9,092,027 UART: [art] Derive Key Pair - Done
9,106,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,122,277 UART: [art] Erasing AUTHORITY.KEYID = 7
9,123,042 UART: [art] PUB.X = 3E62F573B28A6C1B42329F59D37CF419BE0E18C7149BC637F1D849E19FF0A6BC56C4C571DA84585E6AD1FA041CC3DE3D
9,129,820 UART: [art] PUB.Y = 2EEB4E474C0D40C869BAF3AF5BD3670EC4D82366A0CC683BF29D8BAE6F04F3F83F4D702889C1A8F8881D642C7DF0F0BC
9,136,781 UART: [art] SIG.R = 9CB3119063B62E710EE3DED6D694756DFE244AE18A9ABB50E15E57EAB12EFBD9AE269BF639C118F2EB099FAB80555F87
9,143,563 UART: [art] SIG.S = 0372C559AFF0499C8D342607F797596D525185683D18C4083349CD2558AB5795519C64F08DB47049D9EFB58CCDC7A5FD
9,167,280 UART: mbox::rt_entry...
9,167,652 UART: ____ _ _ _ ____ _____
9,168,436 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,169,236 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,170,004 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,170,772 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,171,540 UART: |_|
9,171,852 UART:
9,536,453 UART: [rt] Runtime listening for mailbox commands...
9,537,799 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
87,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,480 UART: [kat] SHA2-256
882,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,526 UART: [kat] ++
886,678 UART: [kat] sha1
890,880 UART: [kat] SHA2-256
892,818 UART: [kat] SHA2-384
895,539 UART: [kat] SHA2-512-ACC
897,440 UART: [kat] ECC-384
903,385 UART: [kat] HMAC-384Kdf
907,889 UART: [kat] LMS
1,476,085 UART: [kat] --
1,477,156 UART: [cold-reset] ++
1,477,592 UART: [fht] Storing FHT @ 0x50003400
1,480,499 UART: [idev] ++
1,480,667 UART: [idev] CDI.KEYID = 6
1,481,027 UART: [idev] SUBJECT.KEYID = 7
1,481,451 UART: [idev] UDS.KEYID = 0
1,481,796 ready_for_fw is high
1,481,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,605 UART: [idev] Erasing UDS.KEYID = 0
1,506,223 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,661 UART: [idev] --
1,515,580 UART: [ldev] ++
1,515,748 UART: [ldev] CDI.KEYID = 6
1,516,111 UART: [ldev] SUBJECT.KEYID = 5
1,516,537 UART: [ldev] AUTHORITY.KEYID = 7
1,517,000 UART: [ldev] FE.KEYID = 1
1,522,312 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,827 UART: [ldev] --
1,587,164 UART: [fwproc] Waiting for Commands...
1,587,801 UART: [fwproc] Received command 0x46574c44
1,588,592 UART: [fwproc] Received Image of size 118548 bytes
2,933,380 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,806 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,024 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,247 >>> mbox cmd response: success
3,133,335 UART: [afmc] ++
3,133,503 UART: [afmc] CDI.KEYID = 6
3,133,865 UART: [afmc] SUBJECT.KEYID = 7
3,134,290 UART: [afmc] AUTHORITY.KEYID = 5
3,168,937 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,097 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,877 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,586 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,469 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,152 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,068 UART: [afmc] --
3,212,036 UART: [cold-reset] --
3,213,002 UART: [state] Locking Datavault
3,214,295 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,899 UART: [state] Locking ICCM
3,215,561 UART: [exit] Launching FMC @ 0x40000130
3,220,891 UART:
3,220,907 UART: Running Caliptra FMC ...
3,221,315 UART:
3,221,458 UART: [state] CFI Enabled
3,232,532 UART: [fht] FMC Alias Private Key: 7
3,352,284 UART: [art] Extend RT PCRs Done
3,352,712 UART: [art] Lock RT PCRs Done
3,354,172 UART: [art] Populate DV Done
3,362,301 UART: [fht] FMC Alias Private Key: 7
3,363,395 UART: [art] Derive CDI
3,363,675 UART: [art] Store in slot 0x4
3,449,223 UART: [art] Derive Key Pair
3,449,583 UART: [art] Store priv key in slot 0x5
3,463,778 UART: [art] Derive Key Pair - Done
3,478,366 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,954 UART: [art] PUB.X = 10AD23BFB2CFFC145029DDD6D7747DC475E31647789246B334B52E837D94EB800337C62B7E456032832491F933650690
3,501,708 UART: [art] PUB.Y = 0DF2F243CC82E7499F73C839FE4E62BC2BB32C12A9095E79D07FA4A590D827DBD791CE89E4CC77F846A869FD7EB87E4C
3,508,668 UART: [art] SIG.R = 034BA0790D196C82566D901BCF423B82CC74E490AB3F1E871ABBF7C8260B8654E248C981C939CD846AF70B4A7133F0FF
3,515,432 UART: [art] SIG.S = FF6F4DAE7DA5D57D44814E77F1E0407F5E2F743173E440643A38BDF5A4A50EA0CE9CC0598AF7847428B101EA2E6AB2AF
3,538,728 UART: Caliptra RT
3,539,071 UART: [state] CFI Enabled
3,659,157 UART: [rt] RT listening for mailbox commands...
3,659,827 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,851 UART: [rt]cmd =0x54514754, len=24
3,691,870 >>> mbox cmd response data (8 bytes)
3,691,871 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,692,605 UART:
3,692,621 UART: Running Caliptra ROM ...
3,693,029 UART:
3,693,170 UART: [state] CFI Enabled
3,695,650 UART: [state] LifecycleState = Unprovisioned
3,696,305 UART: [state] DebugLocked = No
3,696,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,698,478 UART: [kat] SHA2-256
4,492,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,496,524 UART: [kat] ++
4,496,676 UART: [kat] sha1
4,501,038 UART: [kat] SHA2-256
4,502,976 UART: [kat] SHA2-384
4,505,787 UART: [kat] SHA2-512-ACC
4,507,687 UART: [kat] ECC-384
4,513,500 UART: [kat] HMAC-384Kdf
4,518,224 UART: [kat] LMS
5,086,420 UART: [kat] --
5,087,273 UART: [update-reset] ++
6,059,554 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,060,616 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,162,309 >>> mbox cmd response: success
6,162,309 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,162,584 UART: [update-reset] Copying MAN_2 To MAN_1
6,170,598 UART: [update-reset Success] --
6,171,413 UART: [state] Locking Datavault
6,172,233 UART: [state] Locking PCR0, PCR1 and PCR31
6,172,837 UART: [state] Locking ICCM
6,173,379 UART: [exit] Launching FMC @ 0x40000130
6,178,709 UART:
6,178,725 UART: Running Caliptra FMC ...
6,179,133 UART:
6,179,276 UART: [state] CFI Enabled
6,268,687 UART: [art] Extend RT PCRs Done
6,269,115 UART: [art] Lock RT PCRs Done
6,270,270 UART: [art] Populate DV Done
6,278,513 UART: [fht] FMC Alias Private Key: 7
6,279,623 UART: [art] Derive CDI
6,279,903 UART: [art] Store in slot 0x4
6,365,815 UART: [art] Derive Key Pair
6,366,175 UART: [art] Store priv key in slot 0x5
6,378,874 UART: [art] Derive Key Pair - Done
6,393,526 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,408,883 UART: [art] Erasing AUTHORITY.KEYID = 7
6,409,648 UART: [art] PUB.X = 21331EF2C98FD6DEC4A59A90CF0EFCBB2BB063AE722BC7D6AE47D4788D417A72395A4C68A05F329EFF28CE2744C2631F
6,416,433 UART: [art] PUB.Y = F73C3F1F737CFB66A002C807674BB5BDE6AF1BC675AB98B0D84A4B81DE64BB105A92D681F956F0F7EA21A09DC4A870CA
6,423,397 UART: [art] SIG.R = D1C94F3B2082B9148258ADCFD1C8A8A90FFB914F88E69D7CF881AAED7DEE2A241978309D3B67F244257CFCAF44B269AF
6,430,182 UART: [art] SIG.S = 44A9DAA8B578D368701307A0C73AC23F5269094AF7097E13CB51E5962F10B5DA9155D977273048565948CDED922AE1F2
6,453,827 UART: mbox::rt_entry...
6,454,199 UART: ____ _ _ _ ____ _____
6,454,983 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,455,783 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,456,551 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,457,319 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,458,087 UART: |_|
6,458,399 UART:
6,820,006 UART: [rt] Runtime listening for mailbox commands...
6,821,352 >>> mbox cmd response data (160 bytes)
6,821,353 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,821,467 UART:
6,821,483 UART: Running Caliptra ROM ...
6,821,891 UART:
6,822,032 UART: [state] CFI Enabled
6,824,874 UART: [state] LifecycleState = Unprovisioned
6,825,529 UART: [state] DebugLocked = No
6,826,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,827,770 UART: [kat] SHA2-256
7,621,701 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,625,816 UART: [kat] ++
7,625,968 UART: [kat] sha1
7,630,114 UART: [kat] SHA2-256
7,632,052 UART: [kat] SHA2-384
7,634,781 UART: [kat] SHA2-512-ACC
7,636,681 UART: [kat] ECC-384
7,642,398 UART: [kat] HMAC-384Kdf
7,646,932 UART: [kat] LMS
8,215,128 UART: [kat] --
8,215,953 UART: [update-reset] ++
9,187,960 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,189,096 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,290,789 >>> mbox cmd response: success
9,290,789 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,290,922 UART: [update-reset] Copying MAN_2 To MAN_1
9,298,936 UART: [update-reset Success] --
9,299,925 UART: [state] Locking Datavault
9,300,803 UART: [state] Locking PCR0, PCR1 and PCR31
9,301,407 UART: [state] Locking ICCM
9,302,027 UART: [exit] Launching FMC @ 0x40000130
9,307,357 UART:
9,307,373 UART: Running Caliptra FMC ...
9,307,781 UART:
9,307,924 UART: [state] CFI Enabled
9,397,267 UART: [art] Extend RT PCRs Done
9,397,695 UART: [art] Lock RT PCRs Done
9,398,832 UART: [art] Populate DV Done
9,407,219 UART: [fht] FMC Alias Private Key: 7
9,408,149 UART: [art] Derive CDI
9,408,429 UART: [art] Store in slot 0x4
9,494,283 UART: [art] Derive Key Pair
9,494,643 UART: [art] Store priv key in slot 0x5
9,507,704 UART: [art] Derive Key Pair - Done
9,522,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,537,834 UART: [art] Erasing AUTHORITY.KEYID = 7
9,538,599 UART: [art] PUB.X = 4E714B7D17A61B8DBE6EA20A4F7C4E06D00735A4157006704FD5366C0CAC7B6C38EA4D1411579F13AC3BE8806BC3651D
9,545,362 UART: [art] PUB.Y = 357D4AF2DE198BB7C3DF8E6F04755197F616806FBAE203701FDDBE8C39C431C42ECC7B210282355EA0E8E419A9CDCEAA
9,552,321 UART: [art] SIG.R = E492A65058BA2F68A1724969E0035EDFE8AFB6DA9949FC4BACCA7193912664BB41DC3478FD7AB7B6ED5749DCB4853E24
9,559,102 UART: [art] SIG.S = 631C9DBCB6C9156019A1EDAA1A8109341183D56C79A8468B518D7B7BCCD345561BF3A051B9B5B3020303758E4BBD411A
9,582,896 UART: mbox::rt_entry...
9,583,268 UART: ____ _ _ _ ____ _____
9,584,052 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,584,852 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,585,620 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,586,388 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,587,156 UART: |_|
9,587,468 UART:
9,952,217 UART: [rt] Runtime listening for mailbox commands...
9,953,563 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,074 ready_for_fw is high
1,362,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,375 >>> mbox cmd response: success
3,042,692 UART:
3,042,708 UART: Running Caliptra FMC ...
3,043,116 UART:
3,043,259 UART: [state] CFI Enabled
3,054,127 UART: [fht] FMC Alias Private Key: 7
3,173,109 UART: [art] Extend RT PCRs Done
3,173,537 UART: [art] Lock RT PCRs Done
3,175,117 UART: [art] Populate DV Done
3,183,246 UART: [fht] FMC Alias Private Key: 7
3,184,248 UART: [art] Derive CDI
3,184,528 UART: [art] Store in slot 0x4
3,270,174 UART: [art] Derive Key Pair
3,270,534 UART: [art] Store priv key in slot 0x5
3,283,805 UART: [art] Derive Key Pair - Done
3,298,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,708 UART: [art] PUB.X = A08850E33E2AC527C151A4D1A438DC2D88232AEE3D85A35D4DA525F59BFA50E4CFC7B5E2433041FA9DD8999006A41199
3,321,483 UART: [art] PUB.Y = FDA88BAF853927C43619262F20CD09A8F3223E77D3386510D05C933674357AAA0BC9E836A2368FFE48CC6CED1B8BCDA1
3,328,437 UART: [art] SIG.R = 22AFFA2D4E3CB2F6B4D269D59B4F16F0C783C40DD8E5D9B664B6C745FD7D576E177DFF42B1A00446389E308374645E95
3,335,209 UART: [art] SIG.S = 157695C4A9E7B8A978713171A628DC066CC12929A40CE1E36B357C86069A1129E4DD2BD76A2D35DC2326F1FDE046DC7F
3,358,812 UART: Caliptra RT
3,359,155 UART: [state] CFI Enabled
3,479,570 UART: [rt] RT listening for mailbox commands...
3,480,240 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,184 UART: [rt]cmd =0x54514754, len=24
3,512,447 >>> mbox cmd response data (8 bytes)
3,512,448 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,864,032 >>> mbox cmd response: success
5,864,032 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,877,716 UART:
5,877,732 UART: Running Caliptra FMC ...
5,878,140 UART:
5,878,283 UART: [state] CFI Enabled
5,967,872 UART: [art] Extend RT PCRs Done
5,968,300 UART: [art] Lock RT PCRs Done
5,969,343 UART: [art] Populate DV Done
5,977,652 UART: [fht] FMC Alias Private Key: 7
5,978,732 UART: [art] Derive CDI
5,979,012 UART: [art] Store in slot 0x4
6,065,334 UART: [art] Derive Key Pair
6,065,694 UART: [art] Store priv key in slot 0x5
6,079,739 UART: [art] Derive Key Pair - Done
6,094,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,109,592 UART: [art] Erasing AUTHORITY.KEYID = 7
6,110,357 UART: [art] PUB.X = 904AEC13B8869479A3603C1FF9B066CC6053D4FE28069F0F33778CEBE17448163234CAF4FE5A59095A43A9FDA89ED9CD
6,117,126 UART: [art] PUB.Y = 91B6D855CC69CF6F7A204A46132502F9682B4EF8A4D023464A7A4925CD9ED84FEA1E44E833CFDAAEB2976670C93EC86A
6,124,085 UART: [art] SIG.R = F993E03E931F93C3707DD34A494289735286F0FE451F9B0A1FCCC6AA7AB5EEB3266227ECCBF6BEFCE0FBD85E34792E98
6,130,870 UART: [art] SIG.S = 79BE807BA2CB152C97D1B609B3A9C1FFC850BE57F542B69234E14A353682EBE0E0734D3BCC1BD7F3FD7B89594DA4C0C3
6,154,915 UART: mbox::rt_entry...
6,155,287 UART: ____ _ _ _ ____ _____
6,156,071 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,156,871 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,157,639 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,158,407 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,159,175 UART: |_|
6,159,487 UART:
6,517,368 UART: [rt] Runtime listening for mailbox commands...
6,518,714 >>> mbox cmd response data (160 bytes)
6,518,715 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,870,251 >>> mbox cmd response: success
8,870,251 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,883,635 UART:
8,883,651 UART: Running Caliptra FMC ...
8,884,059 UART:
8,884,202 UART: [state] CFI Enabled
8,973,753 UART: [art] Extend RT PCRs Done
8,974,181 UART: [art] Lock RT PCRs Done
8,975,404 UART: [art] Populate DV Done
8,983,531 UART: [fht] FMC Alias Private Key: 7
8,984,469 UART: [art] Derive CDI
8,984,749 UART: [art] Store in slot 0x4
9,070,055 UART: [art] Derive Key Pair
9,070,415 UART: [art] Store priv key in slot 0x5
9,084,018 UART: [art] Derive Key Pair - Done
9,098,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,114,043 UART: [art] Erasing AUTHORITY.KEYID = 7
9,114,808 UART: [art] PUB.X = 14D42366436F582F36D76C6DC1D3EC7490DFBB7E54D7D5C1CE028A695C22F5FF21880A8331CCA5721626B69C3288AA0A
9,121,575 UART: [art] PUB.Y = F3F3F08FA8BCC28419066F9351410E9EC8494E4D504E0AD1ACECAE10915B7CDBEDCE7530823DEECC15DA1B1EC377D105
9,128,535 UART: [art] SIG.R = 78664879B1FF6E916FEFDE41AEDB58E1CE5AEE29397B40E4CE539B6DB6E52AA61BCFEEB9ECAFF01EB1F01E1B5A682416
9,135,335 UART: [art] SIG.S = D80F356E80A85A23D96EBA0FC1FD32718D8E8F8305BE5B9BDE220DE656ECB5318010255C32F12C978F8A9A7F485C2D56
9,159,419 UART: mbox::rt_entry...
9,159,791 UART: ____ _ _ _ ____ _____
9,160,575 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,161,375 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,162,143 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,162,911 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,163,679 UART: |_|
9,163,991 UART:
9,525,326 UART: [rt] Runtime listening for mailbox commands...
9,526,672 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,700 UART: [state] LifecycleState = Unprovisioned
86,355 UART: [state] DebugLocked = No
86,853 UART: [state] WD Timer not started. Device not locked for debugging
88,090 UART: [kat] SHA2-256
891,640 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,338 UART: [kat] SHA2-256
902,278 UART: [kat] SHA2-384
904,899 UART: [kat] SHA2-512-ACC
906,800 UART: [kat] ECC-384
916,211 UART: [kat] HMAC-384Kdf
920,649 UART: [kat] LMS
1,168,961 UART: [kat] --
1,169,770 UART: [cold-reset] ++
1,170,336 UART: [fht] FHT @ 0x50003400
1,172,974 UART: [idev] ++
1,173,142 UART: [idev] CDI.KEYID = 6
1,173,503 UART: [idev] SUBJECT.KEYID = 7
1,173,928 UART: [idev] UDS.KEYID = 0
1,174,274 ready_for_fw is high
1,174,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,457 UART: [idev] Erasing UDS.KEYID = 0
1,199,421 UART: [idev] Sha1 KeyId Algorithm
1,208,251 UART: [idev] --
1,209,330 UART: [ldev] ++
1,209,498 UART: [ldev] CDI.KEYID = 6
1,209,862 UART: [ldev] SUBJECT.KEYID = 5
1,210,289 UART: [ldev] AUTHORITY.KEYID = 7
1,210,752 UART: [ldev] FE.KEYID = 1
1,215,790 UART: [ldev] Erasing FE.KEYID = 1
1,241,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,334 UART: [ldev] --
1,280,757 UART: [fwproc] Wait for Commands...
1,281,488 UART: [fwproc] Recv command 0x46574c44
1,282,221 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,755 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,930 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,137 >>> mbox cmd response: success
2,827,225 UART: [afmc] ++
2,827,393 UART: [afmc] CDI.KEYID = 6
2,827,756 UART: [afmc] SUBJECT.KEYID = 7
2,828,182 UART: [afmc] AUTHORITY.KEYID = 5
2,863,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,496 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,245 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,955 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,836 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,537 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,338 UART: [afmc] --
2,907,311 UART: [cold-reset] --
2,908,063 UART: [state] Locking Datavault
2,909,136 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,740 UART: [state] Locking ICCM
2,910,396 UART: [exit] Launching FMC @ 0x40000130
2,915,726 UART:
2,915,742 UART: Running Caliptra FMC ...
2,916,150 UART:
2,916,204 UART: [state] CFI Enabled
2,926,600 UART: [fht] FMC Alias Private Key: 7
3,044,924 UART: [art] Extend RT PCRs Done
3,045,352 UART: [art] Lock RT PCRs Done
3,046,772 UART: [art] Populate DV Done
3,054,857 UART: [fht] FMC Alias Private Key: 7
3,055,831 UART: [art] Derive CDI
3,056,111 UART: [art] Store in slot 0x4
3,141,694 UART: [art] Derive Key Pair
3,142,054 UART: [art] Store priv key in slot 0x5
3,155,872 UART: [art] Derive Key Pair - Done
3,170,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,234 UART: [art] PUB.X = 720DA9E090E50B78636E02063BD88BF7E6B97ECBA02591D86F7FE01A129E6EEFDAEDD7FEEB6065743BF60AB7A6B0CBCF
3,194,015 UART: [art] PUB.Y = EF05FF28421A5285CDC63BB683A3443230534A2D65F2354501147B8F2C4A69E9F0DBEC6C29F107B962410B82FC816B16
3,200,953 UART: [art] SIG.R = C16695E6BC9AA7269D139DBE4E8677DF440BB68D131A5A5B7B6D9434C28CA7A07951A7959B007A00F34425D3D9800A52
3,207,675 UART: [art] SIG.S = 1797F56491E23264610421BF90776E672F65EE630E78844A980836B35930FAC19D079DEF1C7E0951F2C8865D54AFB67F
3,231,772 UART: Caliptra RT
3,232,023 UART: [state] CFI Enabled
3,351,108 UART: [rt] RT listening for mailbox commands...
3,351,778 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,826 UART: [rt]cmd =0x54514754, len=24
3,383,893 >>> mbox cmd response data (8 bytes)
3,383,894 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,721 UART:
3,384,737 UART: Running Caliptra ROM ...
3,385,145 UART:
3,385,200 UART: [state] CFI Enabled
3,388,076 UART: [state] LifecycleState = Unprovisioned
3,388,731 UART: [state] DebugLocked = No
3,389,437 UART: [state] WD Timer not started. Device not locked for debugging
3,390,583 UART: [kat] SHA2-256
4,194,133 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,198,237 UART: [kat] ++
4,198,389 UART: [kat] sha1
4,202,599 UART: [kat] SHA2-256
4,204,539 UART: [kat] SHA2-384
4,207,286 UART: [kat] SHA2-512-ACC
4,209,186 UART: [kat] ECC-384
4,218,755 UART: [kat] HMAC-384Kdf
4,223,331 UART: [kat] LMS
4,471,643 UART: [kat] --
4,472,535 UART: [update-reset] ++
5,422,431 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,402 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,525,043 >>> mbox cmd response: success
5,525,043 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,525,248 UART: [update-reset] Copying MAN_2 To MAN_1
5,533,262 UART: [update-reset Success] --
5,534,189 UART: [state] Locking Datavault
5,534,857 UART: [state] Locking PCR0, PCR1 and PCR31
5,535,461 UART: [state] Locking ICCM
5,536,003 UART: [exit] Launching FMC @ 0x40000130
5,541,333 UART:
5,541,349 UART: Running Caliptra FMC ...
5,541,757 UART:
5,541,811 UART: [state] CFI Enabled
5,631,264 UART: [art] Extend RT PCRs Done
5,631,692 UART: [art] Lock RT PCRs Done
5,632,845 UART: [art] Populate DV Done
5,641,036 UART: [fht] FMC Alias Private Key: 7
5,642,058 UART: [art] Derive CDI
5,642,338 UART: [art] Store in slot 0x4
5,727,955 UART: [art] Derive Key Pair
5,728,315 UART: [art] Store priv key in slot 0x5
5,741,077 UART: [art] Derive Key Pair - Done
5,755,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,771,511 UART: [art] Erasing AUTHORITY.KEYID = 7
5,772,276 UART: [art] PUB.X = 65B3918E7D64C753D42AC548EC33A434EA0613F483F0BDCA2739907A24A1CCD462C7C225F3393681662059ADF6271154
5,779,039 UART: [art] PUB.Y = 4C6885F9E449B7BC9E28865581F54927225FD1C0373ABA875D34BF3E2BA010A95F5CE59885017CAB2C7D056D42B76412
5,785,983 UART: [art] SIG.R = 70C9DD28883601A2D2B4A3A4C862CFE316E759EFE008189CF981E32128B06F2693B5D5189A388A22178B7B9920DEFBC7
5,792,749 UART: [art] SIG.S = 2941C312F17D9C154C1475D297D55349F9038478368D9F0717D4EE52518B009171B63AE29B07AAA3882F97483ABBE225
5,816,582 UART: mbox::rt_entry...
5,816,954 UART: ____ _ _ _ ____ _____
5,817,738 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,818,538 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,819,306 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,820,074 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,820,842 UART: |_|
5,821,154 UART:
6,185,247 UART: [rt] Runtime listening for mailbox commands...
6,186,593 >>> mbox cmd response data (160 bytes)
6,186,594 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,186,705 UART:
6,186,721 UART: Running Caliptra ROM ...
6,187,129 UART:
6,187,184 UART: [state] CFI Enabled
6,190,044 UART: [state] LifecycleState = Unprovisioned
6,190,699 UART: [state] DebugLocked = No
6,191,241 UART: [state] WD Timer not started. Device not locked for debugging
6,192,365 UART: [kat] SHA2-256
6,995,915 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,000,019 UART: [kat] ++
7,000,171 UART: [kat] sha1
7,004,631 UART: [kat] SHA2-256
7,006,571 UART: [kat] SHA2-384
7,009,234 UART: [kat] SHA2-512-ACC
7,011,134 UART: [kat] ECC-384
7,020,671 UART: [kat] HMAC-384Kdf
7,025,331 UART: [kat] LMS
7,273,643 UART: [kat] --
7,274,401 UART: [update-reset] ++
8,224,589 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,225,782 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,327,423 >>> mbox cmd response: success
8,327,423 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,327,762 UART: [update-reset] Copying MAN_2 To MAN_1
8,335,776 UART: [update-reset Success] --
8,336,919 UART: [state] Locking Datavault
8,337,833 UART: [state] Locking PCR0, PCR1 and PCR31
8,338,437 UART: [state] Locking ICCM
8,339,091 UART: [exit] Launching FMC @ 0x40000130
8,344,421 UART:
8,344,437 UART: Running Caliptra FMC ...
8,344,845 UART:
8,344,899 UART: [state] CFI Enabled
8,433,376 UART: [art] Extend RT PCRs Done
8,433,804 UART: [art] Lock RT PCRs Done
8,435,117 UART: [art] Populate DV Done
8,443,522 UART: [fht] FMC Alias Private Key: 7
8,444,654 UART: [art] Derive CDI
8,444,934 UART: [art] Store in slot 0x4
8,531,089 UART: [art] Derive Key Pair
8,531,449 UART: [art] Store priv key in slot 0x5
8,544,537 UART: [art] Derive Key Pair - Done
8,559,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,574,773 UART: [art] Erasing AUTHORITY.KEYID = 7
8,575,538 UART: [art] PUB.X = CC874DE93F8C3E5EAB6375A411E670487176094623874FF1E3DA0414DA042BB9729FF88F1CA839B76B903F8AED961146
8,582,301 UART: [art] PUB.Y = 93F822A17EA26F7DDAAC75CE74FBD89AC52C441C541D08EE35980E5A0140E2B3927A03912EB6D7F5C1C12EF536B2015D
8,589,248 UART: [art] SIG.R = 4C888FE0E78F21466D253E69FF9BA3888A1E7883C6B6E161D10C79B7FBFD164A87A958384191ED0AD528D609EC199E82
8,596,013 UART: [art] SIG.S = CD011E2B714869A60B7864F2C18E067BFF422F9A1808FECD43CB4ECAB74C6380E051D5CEE20820E23FAF70BCF485A487
8,619,628 UART: mbox::rt_entry...
8,620,000 UART: ____ _ _ _ ____ _____
8,620,784 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,621,584 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,622,352 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,623,120 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,623,888 UART: |_|
8,624,200 UART:
8,993,054 UART: [rt] Runtime listening for mailbox commands...
8,994,400 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,972 ready_for_fw is high
1,058,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,016 >>> mbox cmd response: success
2,740,433 UART:
2,740,449 UART: Running Caliptra FMC ...
2,740,857 UART:
2,740,911 UART: [state] CFI Enabled
2,751,597 UART: [fht] FMC Alias Private Key: 7
2,870,585 UART: [art] Extend RT PCRs Done
2,871,013 UART: [art] Lock RT PCRs Done
2,872,607 UART: [art] Populate DV Done
2,880,794 UART: [fht] FMC Alias Private Key: 7
2,881,796 UART: [art] Derive CDI
2,882,076 UART: [art] Store in slot 0x4
2,967,999 UART: [art] Derive Key Pair
2,968,359 UART: [art] Store priv key in slot 0x5
2,981,345 UART: [art] Derive Key Pair - Done
2,996,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,411 UART: [art] PUB.X = 41CC8FCD01CBD9A94DD220A47E9B7D62C22C72101B8518EA2688C7E0A96E055B30D743386F6BDCEDE2A45D6660C33506
3,019,182 UART: [art] PUB.Y = 4247B1FF9BACBB371E25A798C2D171811D9EE1CAF36C895694CC99D0C82633B7C2552E0CF1491165E06E4D7F81EC7194
3,026,135 UART: [art] SIG.R = 19F9378F15FF566C5EDA711CE8ED961141F1A8C57397ACCDFCFA80F3B09E69190EA6005D33A36B21067180FE48A8E9D7
3,032,887 UART: [art] SIG.S = BF18948FD1436FAE41699CD7F48335A7C45A2A519E5D6421277686DA79BF48363F1CF23FBC0AE531D3F2B588049FEC79
3,056,331 UART: Caliptra RT
3,056,582 UART: [state] CFI Enabled
3,176,419 UART: [rt] RT listening for mailbox commands...
3,177,089 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,373 UART: [rt]cmd =0x54514754, len=24
3,209,458 >>> mbox cmd response data (8 bytes)
3,209,459 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,235,416 >>> mbox cmd response: success
5,235,416 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,248,973 UART:
5,248,989 UART: Running Caliptra FMC ...
5,249,397 UART:
5,249,451 UART: [state] CFI Enabled
5,339,248 UART: [art] Extend RT PCRs Done
5,339,676 UART: [art] Lock RT PCRs Done
5,341,115 UART: [art] Populate DV Done
5,349,462 UART: [fht] FMC Alias Private Key: 7
5,350,582 UART: [art] Derive CDI
5,350,862 UART: [art] Store in slot 0x4
5,436,421 UART: [art] Derive Key Pair
5,436,781 UART: [art] Store priv key in slot 0x5
5,450,153 UART: [art] Derive Key Pair - Done
5,464,769 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,480,374 UART: [art] Erasing AUTHORITY.KEYID = 7
5,481,139 UART: [art] PUB.X = 5D0010BEE19CF00563D96C0784FBF50CF859C606B531037EA7F90D2624BBB01E758F4F7B50C9500DD0575838F4C9BD95
5,487,870 UART: [art] PUB.Y = B4B9EE2EEEC1F0684B7D7F931887E03AFC0C3F81FF7E121529C8AF5A3ED87F33D4BB327CB68179ED69E5A3A30728C1F1
5,494,832 UART: [art] SIG.R = 9237FD823D67FFEB60C5DE8AD3498C7A8E42D7C4257CC9F9B023193CFB87B1B96DB1FCDC945A26001F1F71E192BA3653
5,501,594 UART: [art] SIG.S = 3BCFECA9708BC4CE229AD80C7BCDE32CA2CEA00451B63321632F649660B7B45F90D0F046F8569CCB48DFCE0F402B859E
5,525,423 UART: mbox::rt_entry...
5,525,795 UART: ____ _ _ _ ____ _____
5,526,579 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,527,379 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,528,147 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,528,915 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,529,683 UART: |_|
5,529,995 UART:
5,891,971 UART: [rt] Runtime listening for mailbox commands...
5,893,317 >>> mbox cmd response data (160 bytes)
5,893,318 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,918,521 >>> mbox cmd response: success
7,918,521 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,931,818 UART:
7,931,834 UART: Running Caliptra FMC ...
7,932,242 UART:
7,932,296 UART: [state] CFI Enabled
8,021,701 UART: [art] Extend RT PCRs Done
8,022,129 UART: [art] Lock RT PCRs Done
8,023,326 UART: [art] Populate DV Done
8,031,403 UART: [fht] FMC Alias Private Key: 7
8,032,535 UART: [art] Derive CDI
8,032,815 UART: [art] Store in slot 0x4
8,118,636 UART: [art] Derive Key Pair
8,118,996 UART: [art] Store priv key in slot 0x5
8,131,854 UART: [art] Derive Key Pair - Done
8,146,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,162,304 UART: [art] Erasing AUTHORITY.KEYID = 7
8,163,069 UART: [art] PUB.X = 755672FAB9C790535DABF10D17F5B5DB0059EAA527ADC3269580A95035974FAC08B3FFDD7D1CE0F2172BA7DA8DB003BF
8,169,826 UART: [art] PUB.Y = 49D771661383FC9C0CD0789AF0B5108EAA7A3C35C254EC3EC0BF7E7FC31634FFEFA281474286225B297A7F81E6B3ACEE
8,176,787 UART: [art] SIG.R = AFCA3DBD3297456DC961C6D543D0A4749EF0E3CBB873A04E48387A646C0D0861748B58F5495E154798AC49AA931BCA44
8,183,557 UART: [art] SIG.S = 777BD2BFA3A3BCD8640D743DD61D2D4B61A0ABD79153DEB3D0EE10F06B7AC84D19D8822FA5B2CAB8CEDDC47C4B0E5915
8,207,205 UART: mbox::rt_entry...
8,207,577 UART: ____ _ _ _ ____ _____
8,208,361 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,209,161 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,209,929 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,210,697 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,211,465 UART: |_|
8,211,777 UART:
8,574,789 UART: [rt] Runtime listening for mailbox commands...
8,576,135 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,267 UART: [kat] SHA2-256
891,817 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,921 UART: [kat] ++
896,073 UART: [kat] sha1
900,191 UART: [kat] SHA2-256
902,131 UART: [kat] SHA2-384
904,938 UART: [kat] SHA2-512-ACC
906,839 UART: [kat] ECC-384
916,280 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,343 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,174,279 ready_for_fw is high
1,174,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,199,130 UART: [idev] Sha1 KeyId Algorithm
1,207,966 UART: [idev] --
1,209,153 UART: [ldev] ++
1,209,321 UART: [ldev] CDI.KEYID = 6
1,209,685 UART: [ldev] SUBJECT.KEYID = 5
1,210,112 UART: [ldev] AUTHORITY.KEYID = 7
1,210,575 UART: [ldev] FE.KEYID = 1
1,215,795 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,137 UART: [ldev] --
1,281,420 UART: [fwproc] Wait for Commands...
1,282,091 UART: [fwproc] Recv command 0x46574c44
1,282,824 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,012 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,187 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,410 >>> mbox cmd response: success
2,826,588 UART: [afmc] ++
2,826,756 UART: [afmc] CDI.KEYID = 6
2,827,119 UART: [afmc] SUBJECT.KEYID = 7
2,827,545 UART: [afmc] AUTHORITY.KEYID = 5
2,863,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,268 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,978 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,859 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,560 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,145 UART: [afmc] --
2,906,190 UART: [cold-reset] --
2,907,020 UART: [state] Locking Datavault
2,908,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,657 UART: [state] Locking ICCM
2,909,143 UART: [exit] Launching FMC @ 0x40000130
2,914,473 UART:
2,914,489 UART: Running Caliptra FMC ...
2,914,897 UART:
2,915,040 UART: [state] CFI Enabled
2,925,780 UART: [fht] FMC Alias Private Key: 7
3,044,612 UART: [art] Extend RT PCRs Done
3,045,040 UART: [art] Lock RT PCRs Done
3,046,950 UART: [art] Populate DV Done
3,054,945 UART: [fht] FMC Alias Private Key: 7
3,055,941 UART: [art] Derive CDI
3,056,221 UART: [art] Store in slot 0x4
3,141,664 UART: [art] Derive Key Pair
3,142,024 UART: [art] Store priv key in slot 0x5
3,155,528 UART: [art] Derive Key Pair - Done
3,170,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,627 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,392 UART: [art] PUB.X = 5E3FFF830D738298B8297CC3B43E537B837274AF2D7466FE0C3C150C04A3ED051CB64A1771E87BE0C3FC931AB4481937
3,193,151 UART: [art] PUB.Y = 7DE44F53FA8D9131CE8FFF9D436FA08C5CD169F0E1E265F31DFB907B1D1FA4D14FBCCD74F47B8FAE8DA79169192E3468
3,200,123 UART: [art] SIG.R = 8FC8255B27FAD791D90B7280B5A3A2841E278554181DB8C07D96D409C0A2FEADDFD32C79CF288A19F28FA5144AC2BBEB
3,206,903 UART: [art] SIG.S = 1C35C6ADE071896BB6FDD464E95E3F6849D45A6380F3D4411493DDDE2A3CE2AD5407134FC0485DEFE8D18034656797ED
3,231,112 UART: Caliptra RT
3,231,455 UART: [state] CFI Enabled
3,351,686 UART: [rt] RT listening for mailbox commands...
3,352,356 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,318 UART: [rt]cmd =0x54514754, len=24
3,384,517 >>> mbox cmd response data (8 bytes)
3,384,518 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,241 UART:
3,385,257 UART: Running Caliptra ROM ...
3,385,665 UART:
3,385,807 UART: [state] CFI Enabled
3,388,301 UART: [state] LifecycleState = Unprovisioned
3,388,956 UART: [state] DebugLocked = No
3,389,620 UART: [state] WD Timer not started. Device not locked for debugging
3,390,906 UART: [kat] SHA2-256
4,194,456 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,198,560 UART: [kat] ++
4,198,712 UART: [kat] sha1
4,203,022 UART: [kat] SHA2-256
4,204,962 UART: [kat] SHA2-384
4,207,769 UART: [kat] SHA2-512-ACC
4,209,669 UART: [kat] ECC-384
4,219,262 UART: [kat] HMAC-384Kdf
4,223,796 UART: [kat] LMS
4,472,108 UART: [kat] --
4,473,210 UART: [update-reset] ++
5,423,048 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,213 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,525,854 >>> mbox cmd response: success
5,525,854 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,526,197 UART: [update-reset] Copying MAN_2 To MAN_1
5,534,211 UART: [update-reset Success] --
5,535,232 UART: [state] Locking Datavault
5,535,868 UART: [state] Locking PCR0, PCR1 and PCR31
5,536,472 UART: [state] Locking ICCM
5,536,898 UART: [exit] Launching FMC @ 0x40000130
5,542,228 UART:
5,542,244 UART: Running Caliptra FMC ...
5,542,652 UART:
5,542,795 UART: [state] CFI Enabled
5,631,528 UART: [art] Extend RT PCRs Done
5,631,956 UART: [art] Lock RT PCRs Done
5,633,341 UART: [art] Populate DV Done
5,641,442 UART: [fht] FMC Alias Private Key: 7
5,642,434 UART: [art] Derive CDI
5,642,714 UART: [art] Store in slot 0x4
5,728,971 UART: [art] Derive Key Pair
5,729,331 UART: [art] Store priv key in slot 0x5
5,742,991 UART: [art] Derive Key Pair - Done
5,757,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,773,048 UART: [art] Erasing AUTHORITY.KEYID = 7
5,773,813 UART: [art] PUB.X = 9EDCF7FD7AF322E9D16246306C3CEA4973FE9BB5CB8D90E78F7628977307D5D63184B5D6D29F4CA5CEE971B20262C03C
5,780,589 UART: [art] PUB.Y = CCC7EAB5CD1653C0D3143CB24C5B567809D16A5AF6956752BDD346354235623219883095A0EC016056F3708C6E8C04FB
5,787,528 UART: [art] SIG.R = 11FEC1E2D81A827D40CBEBD435A208ED1B3AF98B7F108D838725613472BA36665079BF3C3EA93AB2A41E100C6D8418A5
5,794,300 UART: [art] SIG.S = 69342047447F56A6CAE63AA40F8B696810FBA721F0D411D0170D6001E543D6CCA86547522C5C6C185E22B1E4DE03BEA3
5,818,276 UART: mbox::rt_entry...
5,818,648 UART: ____ _ _ _ ____ _____
5,819,432 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,820,232 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,821,000 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,821,768 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,822,536 UART: |_|
5,822,848 UART:
6,191,551 UART: [rt] Runtime listening for mailbox commands...
6,192,897 >>> mbox cmd response data (160 bytes)
6,192,898 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,193,009 UART:
6,193,025 UART: Running Caliptra ROM ...
6,193,433 UART:
6,193,575 UART: [state] CFI Enabled
6,196,671 UART: [state] LifecycleState = Unprovisioned
6,197,326 UART: [state] DebugLocked = No
6,197,972 UART: [state] WD Timer not started. Device not locked for debugging
6,199,174 UART: [kat] SHA2-256
7,002,724 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,006,828 UART: [kat] ++
7,006,980 UART: [kat] sha1
7,011,324 UART: [kat] SHA2-256
7,013,264 UART: [kat] SHA2-384
7,016,157 UART: [kat] SHA2-512-ACC
7,018,057 UART: [kat] ECC-384
7,027,910 UART: [kat] HMAC-384Kdf
7,032,610 UART: [kat] LMS
7,280,922 UART: [kat] --
7,281,944 UART: [update-reset] ++
8,232,568 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,233,573 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,335,214 >>> mbox cmd response: success
8,335,214 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,335,449 UART: [update-reset] Copying MAN_2 To MAN_1
8,343,463 UART: [update-reset Success] --
8,344,634 UART: [state] Locking Datavault
8,345,498 UART: [state] Locking PCR0, PCR1 and PCR31
8,346,102 UART: [state] Locking ICCM
8,346,664 UART: [exit] Launching FMC @ 0x40000130
8,351,994 UART:
8,352,010 UART: Running Caliptra FMC ...
8,352,418 UART:
8,352,561 UART: [state] CFI Enabled
8,441,468 UART: [art] Extend RT PCRs Done
8,441,896 UART: [art] Lock RT PCRs Done
8,443,263 UART: [art] Populate DV Done
8,451,690 UART: [fht] FMC Alias Private Key: 7
8,452,728 UART: [art] Derive CDI
8,453,008 UART: [art] Store in slot 0x4
8,538,525 UART: [art] Derive Key Pair
8,538,885 UART: [art] Store priv key in slot 0x5
8,552,273 UART: [art] Derive Key Pair - Done
8,567,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,582,729 UART: [art] Erasing AUTHORITY.KEYID = 7
8,583,494 UART: [art] PUB.X = C2231004D76C03770B1B7A45D90261030C6305E379CB06268183F33F9D23FBC9F86FD0A029FC54D2DB383184C9665E24
8,590,234 UART: [art] PUB.Y = AE179A47068A5C58F54A3CA26A8FECC35B89C60FE8B9F766E0CA761B12A8CC62A8F460C7BEADFD56FD3BF78FDF6F8290
8,597,204 UART: [art] SIG.R = 508404B3F752815C4DEBB249B8F30F00504C70ED9C1639CF5F3494DB9C91594BECA03F291A042F19D51466C993BDA696
8,603,945 UART: [art] SIG.S = F93D18AF6527EBF18C489BBA797D387B3195E83F88846AFFDDB2DAB10E400436C764B8931D56406BAA0889AAFF4305FD
8,627,161 UART: mbox::rt_entry...
8,627,533 UART: ____ _ _ _ ____ _____
8,628,317 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,629,117 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,629,885 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,630,653 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,631,421 UART: |_|
8,631,733 UART:
8,995,791 UART: [rt] Runtime listening for mailbox commands...
8,997,137 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,759 ready_for_fw is high
1,059,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,805 >>> mbox cmd response: success
2,741,690 UART:
2,741,706 UART: Running Caliptra FMC ...
2,742,114 UART:
2,742,257 UART: [state] CFI Enabled
2,752,645 UART: [fht] FMC Alias Private Key: 7
2,871,703 UART: [art] Extend RT PCRs Done
2,872,131 UART: [art] Lock RT PCRs Done
2,873,993 UART: [art] Populate DV Done
2,882,194 UART: [fht] FMC Alias Private Key: 7
2,883,196 UART: [art] Derive CDI
2,883,476 UART: [art] Store in slot 0x4
2,969,329 UART: [art] Derive Key Pair
2,969,689 UART: [art] Store priv key in slot 0x5
2,983,145 UART: [art] Derive Key Pair - Done
2,997,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,419 UART: [art] PUB.X = 642EAF6B57C5488263158B8DA8DA46CE6FD975109A13BC45BB6B833FEF8B0FF1720756A5B57A1A53411E5DCD93BF8E25
3,021,195 UART: [art] PUB.Y = 68C5D63A2D98A51FE0A87BC72725AC7E082975D8AF747421A8BB8B9D45C29222B1956DF54384F7BD8458E7727A5B5E3F
3,028,146 UART: [art] SIG.R = AD99B5CC024B59571975C718D06B16CBCED3394AAF542035632493B3511A967B372B6EAC557983286171A8F8E31E0139
3,034,904 UART: [art] SIG.S = F9FB88672AC10796CC361302E53CE78C54EA5F5923752733001B46EC0BB98DA81515D7872FF6956246BE1C093CC2BA08
3,059,165 UART: Caliptra RT
3,059,508 UART: [state] CFI Enabled
3,178,612 UART: [rt] RT listening for mailbox commands...
3,179,282 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,190 UART: [rt]cmd =0x54514754, len=24
3,211,273 >>> mbox cmd response data (8 bytes)
3,211,274 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,237,506 >>> mbox cmd response: success
5,237,506 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,250,631 UART:
5,250,647 UART: Running Caliptra FMC ...
5,251,055 UART:
5,251,198 UART: [state] CFI Enabled
5,339,881 UART: [art] Extend RT PCRs Done
5,340,309 UART: [art] Lock RT PCRs Done
5,341,584 UART: [art] Populate DV Done
5,349,777 UART: [fht] FMC Alias Private Key: 7
5,350,943 UART: [art] Derive CDI
5,351,223 UART: [art] Store in slot 0x4
5,437,016 UART: [art] Derive Key Pair
5,437,376 UART: [art] Store priv key in slot 0x5
5,451,366 UART: [art] Derive Key Pair - Done
5,466,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,482,053 UART: [art] Erasing AUTHORITY.KEYID = 7
5,482,818 UART: [art] PUB.X = C577D9BD3E04C5040CE49ACC040F7074A06EAF4675A24A817916471C7C00A6648B35D001281DB5120B03183E2D535917
5,489,536 UART: [art] PUB.Y = DAFCA6B9B5EC4A3C191C9B706CBB35ED548C311BCFAA678C8ABBECC1530BBEAC2B267F405C3B7134050DE3EEA9BDF891
5,496,511 UART: [art] SIG.R = 63D3976554F7BF637BE3A8A5D7B28153C0CC5B2373495CCF377B706E1A8D3814F6624F746DEB495892E7D907A36A8638
5,503,276 UART: [art] SIG.S = F677340565EF9572A6DEBCA4E9FF40440D2D3AA2A282EDF1280501B1FFB1473F4CC9B6FB464C0A27FA9CD68C90EC5C30
5,527,497 UART: mbox::rt_entry...
5,527,869 UART: ____ _ _ _ ____ _____
5,528,653 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,529,453 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,530,221 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,530,989 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,531,757 UART: |_|
5,532,069 UART:
5,896,519 UART: [rt] Runtime listening for mailbox commands...
5,897,865 >>> mbox cmd response data (160 bytes)
5,897,866 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,922,848 >>> mbox cmd response: success
7,922,848 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,936,371 UART:
7,936,387 UART: Running Caliptra FMC ...
7,936,795 UART:
7,936,938 UART: [state] CFI Enabled
8,026,539 UART: [art] Extend RT PCRs Done
8,026,967 UART: [art] Lock RT PCRs Done
8,028,398 UART: [art] Populate DV Done
8,036,573 UART: [fht] FMC Alias Private Key: 7
8,037,521 UART: [art] Derive CDI
8,037,801 UART: [art] Store in slot 0x4
8,123,134 UART: [art] Derive Key Pair
8,123,494 UART: [art] Store priv key in slot 0x5
8,137,102 UART: [art] Derive Key Pair - Done
8,152,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,167,696 UART: [art] Erasing AUTHORITY.KEYID = 7
8,168,461 UART: [art] PUB.X = DFBF80B7F463BFC356B52078238F322A1A18E2BCE02EDC1CD675F672314F4C272E2D2C76F985E6FBE652639D9975945F
8,175,239 UART: [art] PUB.Y = 7ADE7EA921415C69A878D3CD02B7B6489B99F4BF1B7505AB79D3A2939BD82F791DDC9D131B55BAB1FF2105971106E8C0
8,182,187 UART: [art] SIG.R = A142020CD72C0EE6A11262FABCB800A28392B88996B08AC943ED5FCCA94E2A20B3F28736AC765A2EE85C9AB28B44B2C0
8,188,940 UART: [art] SIG.S = 95E6698611BCA8CA666441DDA696A9FBB537F2826C70FA999CF5656FB9C8F4C7F5C26F773DE7E75712AB7653A54AD0F7
8,212,396 UART: mbox::rt_entry...
8,212,768 UART: ____ _ _ _ ____ _____
8,213,552 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,214,352 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,215,120 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,215,888 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,216,656 UART: |_|
8,216,968 UART:
8,583,537 UART: [rt] Runtime listening for mailbox commands...
8,584,883 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,747 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [kat] SHA2-256
893,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,821 UART: [kat] ++
897,973 UART: [kat] sha1
902,267 UART: [kat] SHA2-256
904,207 UART: [kat] SHA2-384
906,950 UART: [kat] SHA2-512-ACC
908,851 UART: [kat] ECC-384
918,716 UART: [kat] HMAC-384Kdf
923,516 UART: [kat] LMS
1,171,844 UART: [kat] --
1,172,429 UART: [cold-reset] ++
1,172,959 UART: [fht] FHT @ 0x50003400
1,175,680 UART: [idev] ++
1,175,848 UART: [idev] CDI.KEYID = 6
1,176,208 UART: [idev] SUBJECT.KEYID = 7
1,176,632 UART: [idev] UDS.KEYID = 0
1,176,977 ready_for_fw is high
1,176,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,732 UART: [idev] Erasing UDS.KEYID = 0
1,201,405 UART: [idev] Sha1 KeyId Algorithm
1,209,763 UART: [idev] --
1,210,913 UART: [ldev] ++
1,211,081 UART: [ldev] CDI.KEYID = 6
1,211,444 UART: [ldev] SUBJECT.KEYID = 5
1,211,870 UART: [ldev] AUTHORITY.KEYID = 7
1,212,333 UART: [ldev] FE.KEYID = 1
1,217,591 UART: [ldev] Erasing FE.KEYID = 1
1,243,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,445 UART: [ldev] --
1,282,758 UART: [fwproc] Wait for Commands...
1,283,484 UART: [fwproc] Recv command 0x46574c44
1,284,212 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,884 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,054 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,415 >>> mbox cmd response: success
2,829,575 UART: [afmc] ++
2,829,743 UART: [afmc] CDI.KEYID = 6
2,830,105 UART: [afmc] SUBJECT.KEYID = 7
2,830,530 UART: [afmc] AUTHORITY.KEYID = 5
2,865,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,724 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,472 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,181 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,064 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,765 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,757 UART: [afmc] --
2,908,879 UART: [cold-reset] --
2,909,887 UART: [state] Locking Datavault
2,911,202 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,806 UART: [state] Locking ICCM
2,912,314 UART: [exit] Launching FMC @ 0x40000130
2,917,644 UART:
2,917,660 UART: Running Caliptra FMC ...
2,918,068 UART:
2,918,122 UART: [state] CFI Enabled
2,928,830 UART: [fht] FMC Alias Private Key: 7
3,047,694 UART: [art] Extend RT PCRs Done
3,048,122 UART: [art] Lock RT PCRs Done
3,049,278 UART: [art] Populate DV Done
3,057,333 UART: [fht] FMC Alias Private Key: 7
3,058,263 UART: [art] Derive CDI
3,058,543 UART: [art] Store in slot 0x4
3,144,254 UART: [art] Derive Key Pair
3,144,614 UART: [art] Store priv key in slot 0x5
3,157,540 UART: [art] Derive Key Pair - Done
3,172,400 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,137 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,902 UART: [art] PUB.X = 57BDF0DF0012438D971BB17649E85FAD74540DAADB24CF915D7BAB25689534A46A31A2E780A9B28F3E2924D76214A064
3,195,651 UART: [art] PUB.Y = ACF9667ADAF774D487912809495F488C3D3A5DD281728EB6F67372F374873EDB19497AFF3DD6A9D8B436EC652F0D099B
3,202,598 UART: [art] SIG.R = F7C498EC9B838D775DAAC37E3894E40A3CF78C92AB2FE15C6522F206BA84B66A1F3A86D0D158FE3BD326452C82511AF3
3,209,374 UART: [art] SIG.S = F4CC6CD1FD3671423BB53DF4DD14C599A68C5A8FF92008BDE1AAA87E07A1D9860E3E4669CF05BDB01F4B9DCF73D84218
3,233,390 UART: Caliptra RT
3,233,641 UART: [state] CFI Enabled
3,353,435 UART: [rt] RT listening for mailbox commands...
3,354,105 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,921 UART: [rt]cmd =0x54514754, len=24
3,385,984 >>> mbox cmd response data (8 bytes)
3,385,985 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,914 UART:
3,386,930 UART: Running Caliptra ROM ...
3,387,338 UART:
3,387,393 UART: [state] CFI Enabled
3,390,285 UART: [state] LifecycleState = Unprovisioned
3,390,940 UART: [state] DebugLocked = No
3,391,546 UART: [state] WD Timer not started. Device not locked for debugging
3,392,690 UART: [kat] SHA2-256
4,198,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,202,465 UART: [kat] ++
4,202,617 UART: [kat] sha1
4,206,933 UART: [kat] SHA2-256
4,208,873 UART: [kat] SHA2-384
4,211,764 UART: [kat] SHA2-512-ACC
4,213,664 UART: [kat] ECC-384
4,223,161 UART: [kat] HMAC-384Kdf
4,227,635 UART: [kat] LMS
4,475,963 UART: [kat] --
4,476,901 UART: [update-reset] ++
5,426,788 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,427,965 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,529,606 >>> mbox cmd response: success
5,529,606 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,529,835 UART: [update-reset] Copying MAN_2 To MAN_1
5,537,849 UART: [update-reset Success] --
5,538,874 UART: [state] Locking Datavault
5,539,714 UART: [state] Locking PCR0, PCR1 and PCR31
5,540,318 UART: [state] Locking ICCM
5,540,902 UART: [exit] Launching FMC @ 0x40000130
5,546,232 UART:
5,546,248 UART: Running Caliptra FMC ...
5,546,656 UART:
5,546,710 UART: [state] CFI Enabled
5,635,815 UART: [art] Extend RT PCRs Done
5,636,243 UART: [art] Lock RT PCRs Done
5,637,606 UART: [art] Populate DV Done
5,646,177 UART: [fht] FMC Alias Private Key: 7
5,647,141 UART: [art] Derive CDI
5,647,421 UART: [art] Store in slot 0x4
5,732,914 UART: [art] Derive Key Pair
5,733,274 UART: [art] Store priv key in slot 0x5
5,746,818 UART: [art] Derive Key Pair - Done
5,761,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,777,105 UART: [art] Erasing AUTHORITY.KEYID = 7
5,777,870 UART: [art] PUB.X = 3314BE50B5B673D90ECC1DADF962803BF27BB7618D626A14E2A93BBBC9843896D939C898E1BDAB6BB33CEB21DD18374D
5,784,653 UART: [art] PUB.Y = 9715141DDEC08A5E014F6F2D4B6A5A6E096409987D3623AE431830A213228D5E973214B124FBAFF08846FA2AA692A19B
5,791,594 UART: [art] SIG.R = 682205CCC95C6ADBA8743832D345258FD7550F658FCD3C217C64EC147E1D0028BAF301C9A271800821C61834ADDC4584
5,798,330 UART: [art] SIG.S = 3698710F79ABD7BC2428D374CE66BCAE299588F6F5AAE50F812EB8C22B9CC2C441ABE399D9B3CFFB036D96E706166F96
5,822,112 UART: mbox::rt_entry...
5,822,484 UART: ____ _ _ _ ____ _____
5,823,268 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,824,068 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,824,836 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,825,604 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,826,372 UART: |_|
5,826,684 UART:
6,191,503 UART: [rt] Runtime listening for mailbox commands...
6,192,849 >>> mbox cmd response data (160 bytes)
6,192,850 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,192,961 UART:
6,192,977 UART: Running Caliptra ROM ...
6,193,385 UART:
6,193,440 UART: [state] CFI Enabled
6,196,030 UART: [state] LifecycleState = Unprovisioned
6,196,685 UART: [state] DebugLocked = No
6,197,377 UART: [state] WD Timer not started. Device not locked for debugging
6,198,579 UART: [kat] SHA2-256
7,004,229 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,008,354 UART: [kat] ++
7,008,506 UART: [kat] sha1
7,012,872 UART: [kat] SHA2-256
7,014,812 UART: [kat] SHA2-384
7,017,499 UART: [kat] SHA2-512-ACC
7,019,399 UART: [kat] ECC-384
7,029,042 UART: [kat] HMAC-384Kdf
7,033,642 UART: [kat] LMS
7,281,970 UART: [kat] --
7,283,060 UART: [update-reset] ++
8,232,489 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,233,644 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,335,285 >>> mbox cmd response: success
8,335,285 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,335,630 UART: [update-reset] Copying MAN_2 To MAN_1
8,343,644 UART: [update-reset Success] --
8,344,721 UART: [state] Locking Datavault
8,345,659 UART: [state] Locking PCR0, PCR1 and PCR31
8,346,263 UART: [state] Locking ICCM
8,346,799 UART: [exit] Launching FMC @ 0x40000130
8,352,129 UART:
8,352,145 UART: Running Caliptra FMC ...
8,352,553 UART:
8,352,607 UART: [state] CFI Enabled
8,441,780 UART: [art] Extend RT PCRs Done
8,442,208 UART: [art] Lock RT PCRs Done
8,443,431 UART: [art] Populate DV Done
8,451,722 UART: [fht] FMC Alias Private Key: 7
8,452,884 UART: [art] Derive CDI
8,453,164 UART: [art] Store in slot 0x4
8,538,515 UART: [art] Derive Key Pair
8,538,875 UART: [art] Store priv key in slot 0x5
8,551,817 UART: [art] Derive Key Pair - Done
8,566,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,581,761 UART: [art] Erasing AUTHORITY.KEYID = 7
8,582,526 UART: [art] PUB.X = 9CEA43CD93DE4EA7793203687DE3A219A001577EBE44EE9473E7BE9EEFFE1B01D7E367A52FCD10DE9D3CAD45E00B08D0
8,589,303 UART: [art] PUB.Y = 83C54FDBFCCAB1FA064B442C22526C6C6FD1B805BB0997F722CB18AE2D7FD74885A328285899E932D0941B06A941E1D6
8,596,249 UART: [art] SIG.R = A03074EF6590C976ADD91613A9E2C6F1DB659111402434918F6B7F70D490550760097CDFA93FFB1B3A7E416C4BFAC6A1
8,603,017 UART: [art] SIG.S = 22DB4A2A50061248DBF81B4E83B7ADDB806361E305C7695C955DAC44715019D6B836FE3A359764A2731F447AF3806035
8,627,405 UART: mbox::rt_entry...
8,627,777 UART: ____ _ _ _ ____ _____
8,628,561 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,629,361 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,630,129 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,630,897 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,631,665 UART: |_|
8,631,977 UART:
8,993,701 UART: [rt] Runtime listening for mailbox commands...
8,995,047 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,071 ready_for_fw is high
1,060,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,584 >>> mbox cmd response: success
2,741,373 UART:
2,741,389 UART: Running Caliptra FMC ...
2,741,797 UART:
2,741,851 UART: [state] CFI Enabled
2,752,431 UART: [fht] FMC Alias Private Key: 7
2,871,795 UART: [art] Extend RT PCRs Done
2,872,223 UART: [art] Lock RT PCRs Done
2,873,659 UART: [art] Populate DV Done
2,881,640 UART: [fht] FMC Alias Private Key: 7
2,882,806 UART: [art] Derive CDI
2,883,086 UART: [art] Store in slot 0x4
2,968,869 UART: [art] Derive Key Pair
2,969,229 UART: [art] Store priv key in slot 0x5
2,982,705 UART: [art] Derive Key Pair - Done
2,997,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,307 UART: [art] PUB.X = 5E24F13351817879C27F03A175A0F8C467B2BDD2D30BD906094497E8D51BCEC9F3617815D3C02BE756E9D85BAD75D4C8
3,020,069 UART: [art] PUB.Y = 76BD7E2205468BA774D44420C1B177FB4E735B5F508E13B3C2DFCDDAE9AA04F84704E397ECCB8DBB128875D2857CBFDD
3,027,028 UART: [art] SIG.R = C309D73CFEF2BEFC1BF4BB7F1A52A62179089C4646F434E6916DC640C06A854067F5A055C4450105B7A81301B3960C21
3,033,780 UART: [art] SIG.S = 8680D044A1EF72008F1381C562A7AA9A578518EEB1D5735B8616F78E0372F2FB7E7DCDCE3A0E74F06BB8EC294DE32746
3,057,740 UART: Caliptra RT
3,057,991 UART: [state] CFI Enabled
3,178,155 UART: [rt] RT listening for mailbox commands...
3,178,825 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,725 UART: [rt]cmd =0x54514754, len=24
3,210,672 >>> mbox cmd response data (8 bytes)
3,210,673 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,237,629 >>> mbox cmd response: success
5,237,629 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,251,334 UART:
5,251,350 UART: Running Caliptra FMC ...
5,251,758 UART:
5,251,812 UART: [state] CFI Enabled
5,341,291 UART: [art] Extend RT PCRs Done
5,341,719 UART: [art] Lock RT PCRs Done
5,343,074 UART: [art] Populate DV Done
5,351,321 UART: [fht] FMC Alias Private Key: 7
5,352,409 UART: [art] Derive CDI
5,352,689 UART: [art] Store in slot 0x4
5,438,168 UART: [art] Derive Key Pair
5,438,528 UART: [art] Store priv key in slot 0x5
5,451,826 UART: [art] Derive Key Pair - Done
5,466,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,482,413 UART: [art] Erasing AUTHORITY.KEYID = 7
5,483,178 UART: [art] PUB.X = 9F9DB2630381147AF0391FAD76ECADCA019F5363F20E4C80BA96C54D788FEAC441BF8CD28A2C7DF79E88649BA74413C2
5,489,953 UART: [art] PUB.Y = 2963987EFC8CDD51CD790D511F4EAD7004059CF442D4B70E15AA0E644BB3CED5863C89DC47B750A811746FDFE8638E8C
5,496,900 UART: [art] SIG.R = FDD6EC21062C27AE33437CF8821E20D70C249A40D1CB80E4944A5CE61E69F4A41B4519B445DCA4CA1E1CB36EE66674B1
5,503,676 UART: [art] SIG.S = 4FD8A53B3C00350F09A0052AC32B1DE313D7129A1E69D0FFE08C1A53ECD5C81307A2909637BAE2EBE57799F0412B64E1
5,527,348 UART: mbox::rt_entry...
5,527,720 UART: ____ _ _ _ ____ _____
5,528,504 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,529,304 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,530,072 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,530,840 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,531,608 UART: |_|
5,531,920 UART:
5,898,022 UART: [rt] Runtime listening for mailbox commands...
5,899,368 >>> mbox cmd response data (160 bytes)
5,899,369 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,925,865 >>> mbox cmd response: success
7,925,865 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,939,354 UART:
7,939,370 UART: Running Caliptra FMC ...
7,939,778 UART:
7,939,832 UART: [state] CFI Enabled
8,028,647 UART: [art] Extend RT PCRs Done
8,029,075 UART: [art] Lock RT PCRs Done
8,030,264 UART: [art] Populate DV Done
8,038,447 UART: [fht] FMC Alias Private Key: 7
8,039,621 UART: [art] Derive CDI
8,039,901 UART: [art] Store in slot 0x4
8,125,658 UART: [art] Derive Key Pair
8,126,018 UART: [art] Store priv key in slot 0x5
8,139,862 UART: [art] Derive Key Pair - Done
8,154,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,169,663 UART: [art] Erasing AUTHORITY.KEYID = 7
8,170,428 UART: [art] PUB.X = 125B37656CDA2B47DE3D599FC37C529B8B7659950DC950FB6A142D0524B1CCF9F2E2EBD0DFBE59D1FCFDCC358065A8A9
8,177,212 UART: [art] PUB.Y = 978A9810B083C67B91987C4364FDC94E677D448652D8B0A0813F0B3619BA909F64DF2A4C816A659A583F2E35C0C2A0BB
8,184,159 UART: [art] SIG.R = 6FD62FFBC421E625E80087AE4A9509FEBB11B9642858D83A1F1272A8DB247ACB5DD25E72979F38AB9BDD13979F9C5F4F
8,190,918 UART: [art] SIG.S = 8695DA3BD2682A17CDC9A651046F49F4A8CC53708E87166A1E99F0DE8B25D1F67339F24B0409A5D798C88F3B6F0BF261
8,214,850 UART: mbox::rt_entry...
8,215,222 UART: ____ _ _ _ ____ _____
8,216,006 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,216,806 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,217,574 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,218,342 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,219,110 UART: |_|
8,219,422 UART:
8,582,428 UART: [rt] Runtime listening for mailbox commands...
8,583,774 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
893,633 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,758 UART: [kat] ++
897,910 UART: [kat] sha1
902,318 UART: [kat] SHA2-256
904,258 UART: [kat] SHA2-384
906,811 UART: [kat] SHA2-512-ACC
908,712 UART: [kat] ECC-384
918,459 UART: [kat] HMAC-384Kdf
923,231 UART: [kat] LMS
1,171,559 UART: [kat] --
1,172,572 UART: [cold-reset] ++
1,173,014 UART: [fht] FHT @ 0x50003400
1,175,761 UART: [idev] ++
1,175,929 UART: [idev] CDI.KEYID = 6
1,176,289 UART: [idev] SUBJECT.KEYID = 7
1,176,713 UART: [idev] UDS.KEYID = 0
1,177,058 ready_for_fw is high
1,177,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,759 UART: [idev] Erasing UDS.KEYID = 0
1,202,000 UART: [idev] Sha1 KeyId Algorithm
1,210,544 UART: [idev] --
1,211,402 UART: [ldev] ++
1,211,570 UART: [ldev] CDI.KEYID = 6
1,211,933 UART: [ldev] SUBJECT.KEYID = 5
1,212,359 UART: [ldev] AUTHORITY.KEYID = 7
1,212,822 UART: [ldev] FE.KEYID = 1
1,217,938 UART: [ldev] Erasing FE.KEYID = 1
1,244,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,650 UART: [ldev] --
1,284,125 UART: [fwproc] Wait for Commands...
1,284,823 UART: [fwproc] Recv command 0x46574c44
1,285,551 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,589 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,759 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,960 >>> mbox cmd response: success
2,830,032 UART: [afmc] ++
2,830,200 UART: [afmc] CDI.KEYID = 6
2,830,562 UART: [afmc] SUBJECT.KEYID = 7
2,830,987 UART: [afmc] AUTHORITY.KEYID = 5
2,865,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,801 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,510 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,393 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,094 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,956 UART: [afmc] --
2,908,954 UART: [cold-reset] --
2,909,928 UART: [state] Locking Datavault
2,911,253 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,857 UART: [state] Locking ICCM
2,912,519 UART: [exit] Launching FMC @ 0x40000130
2,917,849 UART:
2,917,865 UART: Running Caliptra FMC ...
2,918,273 UART:
2,918,416 UART: [state] CFI Enabled
2,928,854 UART: [fht] FMC Alias Private Key: 7
3,048,380 UART: [art] Extend RT PCRs Done
3,048,808 UART: [art] Lock RT PCRs Done
3,050,344 UART: [art] Populate DV Done
3,058,675 UART: [fht] FMC Alias Private Key: 7
3,059,841 UART: [art] Derive CDI
3,060,121 UART: [art] Store in slot 0x4
3,145,638 UART: [art] Derive Key Pair
3,145,998 UART: [art] Store priv key in slot 0x5
3,159,888 UART: [art] Derive Key Pair - Done
3,174,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,964 UART: [art] PUB.X = 4C88053A5132A2F2EDBEE1C6359D2F2A024B88A5E15C80871E50D7A7253B3D17238293314A5D607515B04B06478513AD
3,197,719 UART: [art] PUB.Y = 76FA207C6A2615B01C1041A1B79FAB33CBDAFD909F421D7DFDF45A5EC976414DF00EFAA6F6934BA41AF1EBFAF24E7DA5
3,204,694 UART: [art] SIG.R = BA721475B4F16EAC38E469524AD37ACAE07F5FB4D7CA6EB9C06CFFC3863E9AE5415641648EF5B662A266B7ED5096494B
3,211,478 UART: [art] SIG.S = 0F79B7EEBCF085CD6A00947BB59E546619AA67E011B834F58480884AD2CEA847C12FA241F8326BE2AAD4FE4F1677CECA
3,235,475 UART: Caliptra RT
3,235,818 UART: [state] CFI Enabled
3,356,189 UART: [rt] RT listening for mailbox commands...
3,356,859 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,077 UART: [rt]cmd =0x54514754, len=24
3,389,202 >>> mbox cmd response data (8 bytes)
3,389,203 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,390,114 UART:
3,390,130 UART: Running Caliptra ROM ...
3,390,538 UART:
3,390,680 UART: [state] CFI Enabled
3,393,472 UART: [state] LifecycleState = Unprovisioned
3,394,127 UART: [state] DebugLocked = No
3,394,679 UART: [state] WD Timer not started. Device not locked for debugging
3,396,031 UART: [kat] SHA2-256
4,201,681 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,205,806 UART: [kat] ++
4,205,958 UART: [kat] sha1
4,209,988 UART: [kat] SHA2-256
4,211,928 UART: [kat] SHA2-384
4,214,585 UART: [kat] SHA2-512-ACC
4,216,485 UART: [kat] ECC-384
4,225,944 UART: [kat] HMAC-384Kdf
4,230,792 UART: [kat] LMS
4,479,120 UART: [kat] --
4,480,092 UART: [update-reset] ++
5,430,639 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,431,764 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,533,405 >>> mbox cmd response: success
5,533,405 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,533,654 UART: [update-reset] Copying MAN_2 To MAN_1
5,541,668 UART: [update-reset Success] --
5,542,601 UART: [state] Locking Datavault
5,543,421 UART: [state] Locking PCR0, PCR1 and PCR31
5,544,025 UART: [state] Locking ICCM
5,544,619 UART: [exit] Launching FMC @ 0x40000130
5,549,949 UART:
5,549,965 UART: Running Caliptra FMC ...
5,550,373 UART:
5,550,516 UART: [state] CFI Enabled
5,639,825 UART: [art] Extend RT PCRs Done
5,640,253 UART: [art] Lock RT PCRs Done
5,641,580 UART: [art] Populate DV Done
5,649,867 UART: [fht] FMC Alias Private Key: 7
5,650,795 UART: [art] Derive CDI
5,651,075 UART: [art] Store in slot 0x4
5,736,794 UART: [art] Derive Key Pair
5,737,154 UART: [art] Store priv key in slot 0x5
5,751,012 UART: [art] Derive Key Pair - Done
5,765,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,781,108 UART: [art] Erasing AUTHORITY.KEYID = 7
5,781,873 UART: [art] PUB.X = 4409085734867B68662AB687E25BAE67A1496B85B166FC8DFCFA4BAD0568FB026050AF699C9D9FE8B2FA0FBDFCF92867
5,788,640 UART: [art] PUB.Y = AC1089DBD1BBD29788A0E3547EB854D91B9C4B32E88699775F6480C3B0BC915D7C378A73B75F24F19C123A39622AD4AB
5,795,596 UART: [art] SIG.R = 3F38AD467AA3F1E22DB201C295E93D321DB8397BA1C9785D8511279C74E095A8A7B5EC95DF7CCFEAB39204813A2A7D29
5,802,370 UART: [art] SIG.S = 6D3E6E1FDF876448E0CFDC2095DCA5641EB8FF89A58CD563702C5D0E2C3BF05C03322AC4255A23A19B9114A742BD4BE6
5,826,452 UART: mbox::rt_entry...
5,826,824 UART: ____ _ _ _ ____ _____
5,827,608 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,828,408 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,829,176 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,829,944 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,830,712 UART: |_|
5,831,024 UART:
6,191,493 UART: [rt] Runtime listening for mailbox commands...
6,192,839 >>> mbox cmd response data (160 bytes)
6,192,840 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,192,951 UART:
6,192,967 UART: Running Caliptra ROM ...
6,193,375 UART:
6,193,517 UART: [state] CFI Enabled
6,196,433 UART: [state] LifecycleState = Unprovisioned
6,197,088 UART: [state] DebugLocked = No
6,197,794 UART: [state] WD Timer not started. Device not locked for debugging
6,199,076 UART: [kat] SHA2-256
7,004,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,008,851 UART: [kat] ++
7,009,003 UART: [kat] sha1
7,013,337 UART: [kat] SHA2-256
7,015,277 UART: [kat] SHA2-384
7,017,966 UART: [kat] SHA2-512-ACC
7,019,866 UART: [kat] ECC-384
7,029,347 UART: [kat] HMAC-384Kdf
7,033,983 UART: [kat] LMS
7,282,311 UART: [kat] --
7,283,143 UART: [update-reset] ++
8,234,282 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,235,325 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,336,966 >>> mbox cmd response: success
8,336,966 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,337,109 UART: [update-reset] Copying MAN_2 To MAN_1
8,345,123 UART: [update-reset Success] --
8,346,110 UART: [state] Locking Datavault
8,346,904 UART: [state] Locking PCR0, PCR1 and PCR31
8,347,508 UART: [state] Locking ICCM
8,347,982 UART: [exit] Launching FMC @ 0x40000130
8,353,312 UART:
8,353,328 UART: Running Caliptra FMC ...
8,353,736 UART:
8,353,879 UART: [state] CFI Enabled
8,443,196 UART: [art] Extend RT PCRs Done
8,443,624 UART: [art] Lock RT PCRs Done
8,445,009 UART: [art] Populate DV Done
8,453,248 UART: [fht] FMC Alias Private Key: 7
8,454,254 UART: [art] Derive CDI
8,454,534 UART: [art] Store in slot 0x4
8,540,363 UART: [art] Derive Key Pair
8,540,723 UART: [art] Store priv key in slot 0x5
8,554,593 UART: [art] Derive Key Pair - Done
8,569,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,585,201 UART: [art] Erasing AUTHORITY.KEYID = 7
8,585,966 UART: [art] PUB.X = BB1A6C5BB30197744B993BD3B54BA78F729CED629FB2D5C6B28835241FCAD9C65D6CCDB80904A2FC869A0E2792FBAD5F
8,592,744 UART: [art] PUB.Y = 60C8B75C0EA23D47779B208678C06B40D5440CD28D453B5D5DFC955E14F2E0001A345D7249BE1CE55D04660AAC9C7789
8,599,662 UART: [art] SIG.R = E61D1C7E09CC48755B7B5D1E4E8E2439BE60ECF014B9D34C103F03F9D6C92CC0E0F76711E93CEC56BF6CAE9E458D865C
8,606,444 UART: [art] SIG.S = DD67D00E5FC2C68182331BB3CB0CB132107D54221927F281A509DAF51E11ADFDA08D01CAEBBF692155D01F48174B38CD
8,630,044 UART: mbox::rt_entry...
8,630,416 UART: ____ _ _ _ ____ _____
8,631,200 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,632,000 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,632,768 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,633,536 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,634,304 UART: |_|
8,634,616 UART:
8,996,309 UART: [rt] Runtime listening for mailbox commands...
8,997,655 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,108 ready_for_fw is high
1,060,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,381 >>> mbox cmd response: success
2,741,808 UART:
2,741,824 UART: Running Caliptra FMC ...
2,742,232 UART:
2,742,375 UART: [state] CFI Enabled
2,752,859 UART: [fht] FMC Alias Private Key: 7
2,871,467 UART: [art] Extend RT PCRs Done
2,871,895 UART: [art] Lock RT PCRs Done
2,873,235 UART: [art] Populate DV Done
2,881,552 UART: [fht] FMC Alias Private Key: 7
2,882,544 UART: [art] Derive CDI
2,882,824 UART: [art] Store in slot 0x4
2,968,109 UART: [art] Derive Key Pair
2,968,469 UART: [art] Store priv key in slot 0x5
2,982,359 UART: [art] Derive Key Pair - Done
2,997,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,516 UART: [art] PUB.X = 68EC108DEFD07F6DB7CB6301FD5A90E3428242B8A54BABB0A42B7B1B2F83AF7C86E9720B4BD69E8033EB23025CC84437
3,020,291 UART: [art] PUB.Y = F28FE1A8794D48F2065DEFF5AC4DECD7334271E2247790FDA87BCC71E5B16E5D5470C7FC4E51746BF5E16B57045F97EE
3,027,249 UART: [art] SIG.R = 7D95C1EEF49A54F386D5D1954D495463C15C01C3D82D07D58AE6270FC762AB58407852C63587AEF0AD21945BCEEC1596
3,034,014 UART: [art] SIG.S = CBB01B4BBABB4864E660927A991CAB712FFC496D701990EA0BE0A14677CF0E8BC7DF598D8B647200C6E53C238339E8F7
3,057,910 UART: Caliptra RT
3,058,253 UART: [state] CFI Enabled
3,177,248 UART: [rt] RT listening for mailbox commands...
3,177,918 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,772 UART: [rt]cmd =0x54514754, len=24
3,210,091 >>> mbox cmd response data (8 bytes)
3,210,092 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,237,297 >>> mbox cmd response: success
5,237,297 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,250,788 UART:
5,250,804 UART: Running Caliptra FMC ...
5,251,212 UART:
5,251,355 UART: [state] CFI Enabled
5,340,714 UART: [art] Extend RT PCRs Done
5,341,142 UART: [art] Lock RT PCRs Done
5,342,337 UART: [art] Populate DV Done
5,350,558 UART: [fht] FMC Alias Private Key: 7
5,351,720 UART: [art] Derive CDI
5,352,000 UART: [art] Store in slot 0x4
5,438,273 UART: [art] Derive Key Pair
5,438,633 UART: [art] Store priv key in slot 0x5
5,452,185 UART: [art] Derive Key Pair - Done
5,466,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,482,038 UART: [art] Erasing AUTHORITY.KEYID = 7
5,482,803 UART: [art] PUB.X = A53120B386993FBE8CE7B9D387826ECE9173C2BB4149A82347DD6B92C2D76D03ABEDAF0CFC7EE8B90E5B183C5CF28CD5
5,489,584 UART: [art] PUB.Y = 3748DA60792241B11E97EC1D8C4F9CF3ACBCF1A5FC3B8230B24792BBFC072C521B9E404F98E2BBF9A8A2C427578B83F7
5,496,545 UART: [art] SIG.R = C52144D90BC0477AFCE7CDF9A40B257613057822184604E354D9E7FBE4B31BA85CBD41FA443F961E11E564A3291928DF
5,503,307 UART: [art] SIG.S = AB3D77328C0A0795CFECBED104E44CF096AA5361956E0E8C08E9DD3FF698710356AEC20A2B550F73218659744E217B67
5,527,335 UART: mbox::rt_entry...
5,527,707 UART: ____ _ _ _ ____ _____
5,528,491 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,529,291 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,530,059 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,530,827 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,531,595 UART: |_|
5,531,907 UART:
5,892,534 UART: [rt] Runtime listening for mailbox commands...
5,893,880 >>> mbox cmd response data (160 bytes)
5,893,881 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,920,424 >>> mbox cmd response: success
7,920,424 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,933,719 UART:
7,933,735 UART: Running Caliptra FMC ...
7,934,143 UART:
7,934,286 UART: [state] CFI Enabled
8,023,517 UART: [art] Extend RT PCRs Done
8,023,945 UART: [art] Lock RT PCRs Done
8,025,414 UART: [art] Populate DV Done
8,033,507 UART: [fht] FMC Alias Private Key: 7
8,034,441 UART: [art] Derive CDI
8,034,721 UART: [art] Store in slot 0x4
8,120,556 UART: [art] Derive Key Pair
8,120,916 UART: [art] Store priv key in slot 0x5
8,134,106 UART: [art] Derive Key Pair - Done
8,148,512 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,164,327 UART: [art] Erasing AUTHORITY.KEYID = 7
8,165,092 UART: [art] PUB.X = DF006BE83D755BF82377B379509F30DDD35113A4BDE51DD63D7DFF6C192886E74761842E6B0563CBB6868A8910D10ED3
8,171,838 UART: [art] PUB.Y = 109CE8F9472FFDFD3F7764B08658D987475107E6E81E6A7432EB416C237C7B553B9FC17E41EF78AEA6571A133A992221
8,178,785 UART: [art] SIG.R = 33B3ABDC88637790FB47D6EC9F1B07374D2D286CD9E3610048DCCD2A6C768BF885B9EC210DFED3AC162544D11FF15E24
8,185,541 UART: [art] SIG.S = 2437DA94ED88D4C756CC870B54A608131D60034919AEB5664C758730EF704B1203D4961DEDEE3B0D6A8CBAF793FAC9C2
8,209,516 UART: mbox::rt_entry...
8,209,888 UART: ____ _ _ _ ____ _____
8,210,672 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,211,472 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,212,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,213,008 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,213,776 UART: |_|
8,214,088 UART:
8,579,805 UART: [rt] Runtime listening for mailbox commands...
8,581,151 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
191,696 UART:
192,082 UART: Running Caliptra ROM ...
193,228 UART:
193,377 UART: [state] CFI Enabled
265,371 UART: [state] LifecycleState = Production
267,165 UART: [state] DebugLocked = Yes
269,445 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,834 UART: [kat] SHA2-256
443,562 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,125 UART: [kat] ++
454,692 UART: [kat] sha1
464,509 UART: [kat] SHA2-256
467,162 UART: [kat] SHA2-384
473,102 UART: [kat] SHA2-512-ACC
475,473 UART: [kat] ECC-384
2,768,780 UART: [kat] HMAC-384Kdf
2,802,120 UART: [kat] LMS
3,992,410 UART: [kat] --
3,996,340 UART: [cold-reset] ++
3,998,481 UART: [fht] Storing FHT @ 0x50003400
4,009,825 UART: [idev] ++
4,010,392 UART: [idev] CDI.KEYID = 6
4,011,428 UART: [idev] SUBJECT.KEYID = 7
4,012,605 UART: [idev] UDS.KEYID = 0
4,013,534 ready_for_fw is high
4,013,727 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,118,007 UART: [idev] Erasing UDS.KEYID = 0
7,344,579 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,317 UART: [idev] --
7,369,314 UART: [ldev] ++
7,369,887 UART: [ldev] CDI.KEYID = 6
7,370,830 UART: [ldev] SUBJECT.KEYID = 5
7,371,990 UART: [ldev] AUTHORITY.KEYID = 7
7,373,335 UART: [ldev] FE.KEYID = 1
7,402,107 UART: [ldev] Erasing FE.KEYID = 1
10,738,825 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,984 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,065,518 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,080,214 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,094,577 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,112,127 UART: [ldev] --
13,116,635 UART: [fwproc] Waiting for Commands...
13,119,645 UART: [fwproc] Received command 0x46574c44
13,121,825 UART: [fwproc] Received Image of size 82832 bytes
16,827,126 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,906,501 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,979,728 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,183,410 >>> mbox cmd response: success
17,186,969 UART: [afmc] ++
17,187,578 UART: [afmc] CDI.KEYID = 6
17,188,499 UART: [afmc] SUBJECT.KEYID = 7
17,189,716 UART: [afmc] AUTHORITY.KEYID = 5
20,562,457 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,863,027 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,865,300 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
22,879,814 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
22,894,565 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
22,908,938 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
22,930,423 UART: [afmc] --
22,933,759 UART: [cold-reset] --
22,937,620 UART: [state] Locking Datavault
22,941,276 UART: [state] Locking PCR0, PCR1 and PCR31
22,943,033 UART: [state] Locking ICCM
22,944,108 UART: [exit] Launching FMC @ 0x40000130
22,952,506 UART:
22,952,741 UART: Running Caliptra FMC ...
22,953,839 UART:
22,953,996 UART: [state] CFI Enabled
23,021,540 UART: [fht] FMC Alias Private Key: 7
25,361,790 UART: [art] Extend RT PCRs Done
25,363,010 UART: [art] Lock RT PCRs Done
25,364,639 UART: [art] Populate DV Done
25,370,374 UART: [fht] FMC Alias Private Key: 7
25,371,976 UART: [art] Derive CDI
25,372,794 UART: [art] Store in slot 0x4
25,429,671 UART: [art] Derive Key Pair
25,430,712 UART: [art] Store priv key in slot 0x5
28,723,176 UART: [art] Derive Key Pair - Done
28,736,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,024,330 UART: [art] Erasing AUTHORITY.KEYID = 7
31,025,844 UART: [art] PUB.X = 6A7F5DDC0FFB9F1D4824405E98293F07F37EF67DF84B01544EE832E5728A32BCE09E27CA6D10C6A4E5861EFE7E232177
31,033,117 UART: [art] PUB.Y = 0A1598AB115A9BCAD5205A0545044B851D72A2541840F0E9E8A623B1E831569F98A1158DCA62DE7767BA642809B8B14A
31,040,317 UART: [art] SIG.R = 14072645705D7E58AA94B3E74AE48482F3180924F5756A4B7435B51C91CB10C44DD70E596752E526C1726777324DE66C
31,047,676 UART: [art] SIG.S = 0E5027EE302F01602769D16A2B09FFD9BF4450AFDD3773CD592CC29867BFAB51F4CD6A399C44CAE810F876DAE659BB8C
32,352,972 UART: mbox::rt_entry...
32,353,940 UART: ____ _ _ _ ____ _____
32,355,925 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,357,929 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,359,857 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,362,095 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,364,044 UART: |_|
32,364,859 UART:
32,495,873 UART: [rt] Runtime listening for mailbox commands...
32,497,912 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
32,498,863 >>> mbox cmd response data (0 bytes)
296 writing to cptra_bootfsm_go
619 UART:
772 UART: Running Caliptra ROM ...
1,865 UART:
2,023 UART: [state] CFI Enabled
61,919 UART: [state] LifecycleState = Production
63,752 UART: [state] DebugLocked = Yes
65,774 UART: [state] Starting the Watchdog Timer 40000000 cycles
71,050 UART: [kat] SHA2-256
240,826 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
251,314 UART: [kat] ++
251,763 UART: [kat] sha1
263,611 UART: [kat] SHA2-256
266,281 UART: [kat] SHA2-384
272,126 UART: [kat] SHA2-512-ACC
274,471 UART: [kat] ECC-384
2,564,346 UART: [kat] HMAC-384Kdf
2,595,804 UART: [kat] LMS
3,786,155 UART: [kat] --
3,791,246 UART: [warm-reset] ++
3,796,314 UART: [warm-reset] --
3,802,298 UART: [state] Locking Datavault
3,806,263 UART: [state] Locking PCR0, PCR1 and PCR31
3,807,969 UART: [state] Locking ICCM
3,809,284 UART: [exit] Launching FMC @ 0x40000130
3,817,679 UART:
3,817,921 UART: Running Caliptra FMC ...
3,818,962 UART:
3,819,112 UART: [state] CFI Enabled
3,867,152 UART: [art] Skip pcr extension
3,868,319 UART: [art] Extend RT PCRs Done
3,869,417 UART: [art] Lock RT PCRs Done
3,870,684 UART: [art] Populate DV Done
3,876,198 UART: [fht] FMC Alias Private Key: 7
3,878,002 UART: [art] Derive CDI
3,878,759 UART: [art] Store in slot 0x4
3,936,020 UART: [art] Derive Key Pair
3,937,024 UART: [art] Store priv key in slot 0x5
7,229,712 UART: [art] Derive Key Pair - Done
7,242,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,531,117 UART: [art] Erasing AUTHORITY.KEYID = 7
9,532,683 UART: [art] PUB.X = 6A7F5DDC0FFB9F1D4824405E98293F07F37EF67DF84B01544EE832E5728A32BCE09E27CA6D10C6A4E5861EFE7E232177
9,539,854 UART: [art] PUB.Y = 0A1598AB115A9BCAD5205A0545044B851D72A2541840F0E9E8A623B1E831569F98A1158DCA62DE7767BA642809B8B14A
9,547,139 UART: [art] SIG.R = 14072645705D7E58AA94B3E74AE48482F3180924F5756A4B7435B51C91CB10C44DD70E596752E526C1726777324DE66C
9,554,465 UART: [art] SIG.S = 0E5027EE302F01602769D16A2B09FFD9BF4450AFDD3773CD592CC29867BFAB51F4CD6A399C44CAE810F876DAE659BB8C
10,859,249 UART: mbox::rt_entry...
10,860,244 UART: ____ _ _ _ ____ _____
10,862,238 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,864,256 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,866,190 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,868,120 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,870,046 UART: |_|
10,870,886 UART:
11,245,129 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,798,024 ready_for_fw is high
3,798,538 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,269,198 >>> mbox cmd response: success
22,962,232 UART:
22,962,656 UART: Running Caliptra FMC ...
22,963,817 UART:
22,963,979 UART: [state] CFI Enabled
23,029,607 UART: [fht] FMC Alias Private Key: 7
25,369,886 UART: [art] Extend RT PCRs Done
25,371,125 UART: [art] Lock RT PCRs Done
25,372,230 UART: [art] Populate DV Done
25,377,586 UART: [fht] FMC Alias Private Key: 7
25,379,130 UART: [art] Derive CDI
25,379,946 UART: [art] Store in slot 0x4
25,438,712 UART: [art] Derive Key Pair
25,439,715 UART: [art] Store priv key in slot 0x5
28,732,312 UART: [art] Derive Key Pair - Done
28,745,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,034,150 UART: [art] Erasing AUTHORITY.KEYID = 7
31,035,659 UART: [art] PUB.X = 70156E96C09B1A6C80D434510833EFF00AE870B3333774AEB2EA2B7CCBD1A854348CF81D40B31BF436D4937EB7F031AF
31,042,926 UART: [art] PUB.Y = 0484F989F4224CAE3B95068FFC242AF54A9474CB8932D5BF72C94BC17B21A4389E00F2BEFCC9827E31D6EACCF9A7060A
31,050,206 UART: [art] SIG.R = 0CD5747B392B8EB0335C5676854D68DFFC53FAC4D034ABBBD74D1772611941523DCE5611D4638D7A287C776EDA188AAB
31,057,580 UART: [art] SIG.S = 7046F30D7B900659D7079A4119B77BF8628BB5197D3EF8A907DC5C8CED477BFD2650A5407B850CC4421D467503A0A1D7
32,362,374 UART: mbox::rt_entry...
32,363,342 UART: ____ _ _ _ ____ _____
32,365,277 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,367,305 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,369,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,371,127 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,372,976 UART: |_|
32,373,801 UART:
32,504,897 UART: [rt] Runtime listening for mailbox commands...
32,506,923 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
32,507,869 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
3,611,419 UART:
3,611,761 UART: Running Caliptra FMC ...
3,612,800 UART:
3,612,953 UART: [state] CFI Enabled
3,677,134 UART: [art] Skip pcr extension
3,678,305 UART: [art] Extend RT PCRs Done
3,679,466 UART: [art] Lock RT PCRs Done
3,680,779 UART: [art] Populate DV Done
3,686,247 UART: [fht] FMC Alias Private Key: 7
3,687,854 UART: [art] Derive CDI
3,688,593 UART: [art] Store in slot 0x4
3,745,749 UART: [art] Derive Key Pair
3,746,795 UART: [art] Store priv key in slot 0x5
7,039,516 UART: [art] Derive Key Pair - Done
7,052,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,341,221 UART: [art] Erasing AUTHORITY.KEYID = 7
9,342,733 UART: [art] PUB.X = 70156E96C09B1A6C80D434510833EFF00AE870B3333774AEB2EA2B7CCBD1A854348CF81D40B31BF436D4937EB7F031AF
9,350,050 UART: [art] PUB.Y = 0484F989F4224CAE3B95068FFC242AF54A9474CB8932D5BF72C94BC17B21A4389E00F2BEFCC9827E31D6EACCF9A7060A
9,357,291 UART: [art] SIG.R = 0CD5747B392B8EB0335C5676854D68DFFC53FAC4D034ABBBD74D1772611941523DCE5611D4638D7A287C776EDA188AAB
9,364,682 UART: [art] SIG.S = 7046F30D7B900659D7079A4119B77BF8628BB5197D3EF8A907DC5C8CED477BFD2650A5407B850CC4421D467503A0A1D7
10,669,053 UART: mbox::rt_entry...
10,670,037 UART: ____ _ _ _ ____ _____
10,672,095 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,674,124 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,676,055 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,677,986 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,679,912 UART: |_|
10,680,744 UART:
11,052,637 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
191,862 UART:
192,225 UART: Running Caliptra ROM ...
193,392 UART:
603,256 UART: [state] CFI Enabled
618,781 UART: [state] LifecycleState = Production
620,604 UART: [state] DebugLocked = Yes
623,448 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,046 UART: [kat] SHA2-256
797,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,394 UART: [kat] ++
808,911 UART: [kat] sha1
820,564 UART: [kat] SHA2-256
823,284 UART: [kat] SHA2-384
829,855 UART: [kat] SHA2-512-ACC
832,218 UART: [kat] ECC-384
3,117,590 UART: [kat] HMAC-384Kdf
3,128,894 UART: [kat] LMS
4,319,034 UART: [kat] --
4,323,663 UART: [cold-reset] ++
4,325,724 UART: [fht] Storing FHT @ 0x50003400
4,337,972 UART: [idev] ++
4,338,539 UART: [idev] CDI.KEYID = 6
4,339,438 UART: [idev] SUBJECT.KEYID = 7
4,340,681 UART: [idev] UDS.KEYID = 0
4,341,670 ready_for_fw is high
4,341,848 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,445,896 UART: [idev] Erasing UDS.KEYID = 0
7,631,913 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,494 UART: [idev] --
7,656,213 UART: [ldev] ++
7,656,784 UART: [ldev] CDI.KEYID = 6
7,657,797 UART: [ldev] SUBJECT.KEYID = 5
7,658,947 UART: [ldev] AUTHORITY.KEYID = 7
7,660,222 UART: [ldev] FE.KEYID = 1
7,670,703 UART: [ldev] Erasing FE.KEYID = 1
10,958,149 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,492 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,262,012 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,276,671 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,291,043 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,309,647 UART: [ldev] --
13,314,857 UART: [fwproc] Waiting for Commands...
13,317,053 UART: [fwproc] Received command 0x46574c44
13,319,229 UART: [fwproc] Received Image of size 82832 bytes
17,013,267 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,092,605 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,165,813 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,368,753 >>> mbox cmd response: success
17,373,452 UART: [afmc] ++
17,374,062 UART: [afmc] CDI.KEYID = 6
17,374,976 UART: [afmc] SUBJECT.KEYID = 7
17,376,188 UART: [afmc] AUTHORITY.KEYID = 5
20,694,407 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,989,111 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,991,416 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
23,005,912 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
23,020,680 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
23,035,096 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
23,056,708 UART: [afmc] --
23,059,921 UART: [cold-reset] --
23,063,237 UART: [state] Locking Datavault
23,068,225 UART: [state] Locking PCR0, PCR1 and PCR31
23,069,977 UART: [state] Locking ICCM
23,071,915 UART: [exit] Launching FMC @ 0x40000130
23,080,305 UART:
23,080,536 UART: Running Caliptra FMC ...
23,081,630 UART:
23,081,789 UART: [state] CFI Enabled
23,090,426 UART: [fht] FMC Alias Private Key: 7
25,430,476 UART: [art] Extend RT PCRs Done
25,431,857 UART: [art] Lock RT PCRs Done
25,433,702 UART: [art] Populate DV Done
25,439,112 UART: [fht] FMC Alias Private Key: 7
25,440,593 UART: [art] Derive CDI
25,441,348 UART: [art] Store in slot 0x4
25,483,932 UART: [art] Derive Key Pair
25,484,932 UART: [art] Store priv key in slot 0x5
28,727,098 UART: [art] Derive Key Pair - Done
28,739,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,020,321 UART: [art] Erasing AUTHORITY.KEYID = 7
31,021,833 UART: [art] PUB.X = 1575786FEBDBE2833C69EE80317CD34F05547B77AEDE6E47AE13092AE3D86891D1FF518C58E6F3DF394755831F93A434
31,029,143 UART: [art] PUB.Y = 0B8B51DE81B12A90E8CF78A512ED1828F49B68546AF1237E34EBD3A0243CEF1BBCFB8FADDAB8D6F3369E01F0075A9D85
31,036,421 UART: [art] SIG.R = 2CCA82169DED4E4CCC252CE0900645C34F645589EA088271B4DB9DC7D4A1B6D49097B22D1A4B0807433CF8905846310E
31,043,777 UART: [art] SIG.S = B931FD49059F682F73E77991C8BEEA6FFB63A0B03129133CD560F4A47EE0F11608884BD82969644F46214639AB405D64
32,348,589 UART: mbox::rt_entry...
32,349,559 UART: ____ _ _ _ ____ _____
32,351,539 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,353,539 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,355,459 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,357,381 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,359,301 UART: |_|
32,360,286 UART:
32,490,835 UART: [rt] Runtime listening for mailbox commands...
32,492,879 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
32,493,744 >>> mbox cmd response data (0 bytes)
296 writing to cptra_bootfsm_go
613 UART:
760 UART: Running Caliptra ROM ...
1,845 UART:
8,036,528 UART: [state] CFI Enabled
8,053,968 UART: [state] LifecycleState = Production
8,055,766 UART: [state] DebugLocked = Yes
8,058,623 UART: [state] Starting the Watchdog Timer 40000000 cycles
8,064,241 UART: [kat] SHA2-256
8,233,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,244,552 UART: [kat] ++
8,245,088 UART: [kat] sha1
8,256,032 UART: [kat] SHA2-256
8,258,766 UART: [kat] SHA2-384
8,265,034 UART: [kat] SHA2-512-ACC
8,267,384 UART: [kat] ECC-384
10,550,385 UART: [kat] HMAC-384Kdf
10,562,058 UART: [kat] LMS
11,752,200 UART: [kat] --
11,757,992 UART: [warm-reset] ++
11,760,894 UART: [warm-reset] --
11,764,692 UART: [state] Locking Datavault
11,768,424 UART: [state] Locking PCR0, PCR1 and PCR31
11,770,177 UART: [state] Locking ICCM
11,771,349 UART: [exit] Launching FMC @ 0x40000130
11,779,738 UART:
11,779,967 UART: Running Caliptra FMC ...
11,781,059 UART:
11,781,214 UART: [state] CFI Enabled
11,783,313 UART: [art] Skip pcr extension
11,784,424 UART: [art] Extend RT PCRs Done
11,785,554 UART: [art] Lock RT PCRs Done
11,787,048 UART: [art] Populate DV Done
11,792,613 UART: [fht] FMC Alias Private Key: 7
11,794,358 UART: [art] Derive CDI
11,795,099 UART: [art] Store in slot 0x4
11,837,873 UART: [art] Derive Key Pair
11,838,922 UART: [art] Store priv key in slot 0x5
15,080,445 UART: [art] Derive Key Pair - Done
15,093,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
17,374,321 UART: [art] Erasing AUTHORITY.KEYID = 7
17,375,831 UART: [art] PUB.X = 1575786FEBDBE2833C69EE80317CD34F05547B77AEDE6E47AE13092AE3D86891D1FF518C58E6F3DF394755831F93A434
17,383,136 UART: [art] PUB.Y = 0B8B51DE81B12A90E8CF78A512ED1828F49B68546AF1237E34EBD3A0243CEF1BBCFB8FADDAB8D6F3369E01F0075A9D85
17,390,382 UART: [art] SIG.R = 2CCA82169DED4E4CCC252CE0900645C34F645589EA088271B4DB9DC7D4A1B6D49097B22D1A4B0807433CF8905846310E
17,397,785 UART: [art] SIG.S = B931FD49059F682F73E77991C8BEEA6FFB63A0B03129133CD560F4A47EE0F11608884BD82969644F46214639AB405D64
18,702,886 UART: mbox::rt_entry...
18,703,864 UART: ____ _ _ _ ____ _____
18,705,847 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,707,845 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,709,766 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,711,683 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,713,603 UART: |_|
18,714,429 UART:
19,088,373 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,124,941 ready_for_fw is high
4,125,543 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,473,197 >>> mbox cmd response: success
23,115,794 UART:
23,116,204 UART: Running Caliptra FMC ...
23,117,353 UART:
23,117,519 UART: [state] CFI Enabled
23,125,032 UART: [fht] FMC Alias Private Key: 7
25,464,750 UART: [art] Extend RT PCRs Done
25,465,974 UART: [art] Lock RT PCRs Done
25,467,703 UART: [art] Populate DV Done
25,473,065 UART: [fht] FMC Alias Private Key: 7
25,474,656 UART: [art] Derive CDI
25,475,413 UART: [art] Store in slot 0x4
25,518,060 UART: [art] Derive Key Pair
25,519,102 UART: [art] Store priv key in slot 0x5
28,761,890 UART: [art] Derive Key Pair - Done
28,775,077 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,055,339 UART: [art] Erasing AUTHORITY.KEYID = 7
31,056,854 UART: [art] PUB.X = 3854E4C0FB5782A93BD87202973EDE14A6696BDF592210795655389DF73007BB80713E9E9EEBD3695AA4700B2F3D1921
31,064,106 UART: [art] PUB.Y = BACB631B46BE326E3583491F993078359D51EADE8D4501C140D8850A2984449F98DF1010738E40C9A63C4FEE780D14B7
31,071,326 UART: [art] SIG.R = B5F3974DBBC191D612F50C82CB4F3B302F29E0FA2A60A9F2F4F11A293EE6731FD785C07569D9AF9CCAADCD8A6E765AD3
31,078,765 UART: [art] SIG.S = 013E9119274D6736C6041D1B9A1CA69F3236334F932F6BBFFD31F595A44FF32880FCE4635F1B356280168D35E23A2E11
32,383,484 UART: mbox::rt_entry...
32,384,498 UART: ____ _ _ _ ____ _____
32,386,488 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,388,488 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,390,421 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,392,385 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,394,305 UART: |_|
32,395,123 UART:
32,525,946 UART: [rt] Runtime listening for mailbox commands...
32,527,979 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
32,528,966 >>> mbox cmd response data (0 bytes)
294 writing to cptra_bootfsm_go
11,537,418 UART:
11,537,750 UART: Running Caliptra FMC ...
11,538,818 UART:
11,538,968 UART: [state] CFI Enabled
11,540,800 UART: [art] Skip pcr extension
11,541,910 UART: [art] Extend RT PCRs Done
11,543,085 UART: [art] Lock RT PCRs Done
11,544,247 UART: [art] Populate DV Done
11,549,648 UART: [fht] FMC Alias Private Key: 7
11,551,288 UART: [art] Derive CDI
11,552,094 UART: [art] Store in slot 0x4
11,594,648 UART: [art] Derive Key Pair
11,595,682 UART: [art] Store priv key in slot 0x5
14,837,565 UART: [art] Derive Key Pair - Done
14,850,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
17,131,154 UART: [art] Erasing AUTHORITY.KEYID = 7
17,132,663 UART: [art] PUB.X = 3854E4C0FB5782A93BD87202973EDE14A6696BDF592210795655389DF73007BB80713E9E9EEBD3695AA4700B2F3D1921
17,139,896 UART: [art] PUB.Y = BACB631B46BE326E3583491F993078359D51EADE8D4501C140D8850A2984449F98DF1010738E40C9A63C4FEE780D14B7
17,147,172 UART: [art] SIG.R = B5F3974DBBC191D612F50C82CB4F3B302F29E0FA2A60A9F2F4F11A293EE6731FD785C07569D9AF9CCAADCD8A6E765AD3
17,154,609 UART: [art] SIG.S = 013E9119274D6736C6041D1B9A1CA69F3236334F932F6BBFFD31F595A44FF32880FCE4635F1B356280168D35E23A2E11
18,459,524 UART: mbox::rt_entry...
18,460,499 UART: ____ _ _ _ ____ _____
18,462,538 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,464,544 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,466,467 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,468,609 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,470,553 UART: |_|
18,471,383 UART:
18,839,772 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
191,625 UART:
191,980 UART: Running Caliptra ROM ...
193,148 UART:
193,297 UART: [state] CFI Enabled
265,028 UART: [state] LifecycleState = Production
266,847 UART: [state] DebugLocked = Yes
268,203 UART: [state] Starting the WD Timer 40000000 cycles
273,179 UART: [kat] SHA2-256
452,839 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,609 UART: [kat] ++
464,134 UART: [kat] sha1
475,253 UART: [kat] SHA2-256
477,994 UART: [kat] SHA2-384
483,397 UART: [kat] SHA2-512-ACC
485,768 UART: [kat] ECC-384
2,948,266 UART: [kat] HMAC-384Kdf
2,972,977 UART: [kat] LMS
3,449,479 UART: [kat] --
3,452,786 UART: [cold-reset] ++
3,453,937 UART: [fht] FHT @ 0x50003400
3,465,080 UART: [idev] ++
3,465,638 UART: [idev] CDI.KEYID = 6
3,466,586 UART: [idev] SUBJECT.KEYID = 7
3,467,852 UART: [idev] UDS.KEYID = 0
3,468,833 ready_for_fw is high
3,469,032 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,573,369 UART: [idev] Erasing UDS.KEYID = 0
5,988,316 UART: [idev] Sha1 KeyId Algorithm
6,012,065 UART: [idev] --
6,016,529 UART: [ldev] ++
6,017,157 UART: [ldev] CDI.KEYID = 6
6,018,037 UART: [ldev] SUBJECT.KEYID = 5
6,019,253 UART: [ldev] AUTHORITY.KEYID = 7
6,020,538 UART: [ldev] FE.KEYID = 1
6,058,324 UART: [ldev] Erasing FE.KEYID = 1
8,563,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,609 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,316,700 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,332,255 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,348,065 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,370,249 UART: [ldev] --
10,374,807 UART: [fwproc] Wait for Commands...
10,376,468 UART: [fwproc] Recv command 0x46574c44
10,378,500 UART: [fwproc] Recv'd Img size: 82832 bytes
13,459,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,535,058 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,608,056 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,812,055 >>> mbox cmd response: success
13,816,345 UART: [afmc] ++
13,816,963 UART: [afmc] CDI.KEYID = 6
13,817,845 UART: [afmc] SUBJECT.KEYID = 7
13,819,059 UART: [afmc] AUTHORITY.KEYID = 5
16,365,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,107,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,110,005 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,125,904 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,141,977 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,157,542 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,182,363 UART: [afmc] --
18,185,566 UART: [cold-reset] --
18,188,558 UART: [state] Locking Datavault
18,194,067 UART: [state] Locking PCR0, PCR1 and PCR31
18,195,813 UART: [state] Locking ICCM
18,197,452 UART: [exit] Launching FMC @ 0x40000130
18,205,847 UART:
18,206,079 UART: Running Caliptra FMC ...
18,207,176 UART:
18,207,328 UART: [state] CFI Enabled
18,263,093 UART: [fht] FMC Alias Private Key: 7
20,029,165 UART: [art] Extend RT PCRs Done
20,030,387 UART: [art] Lock RT PCRs Done
20,032,060 UART: [art] Populate DV Done
20,037,589 UART: [fht] FMC Alias Private Key: 7
20,039,292 UART: [art] Derive CDI
20,040,108 UART: [art] Store in slot 0x4
20,095,700 UART: [art] Derive Key Pair
20,096,748 UART: [art] Store priv key in slot 0x5
22,559,173 UART: [art] Derive Key Pair - Done
22,572,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,285,299 UART: [art] Erasing AUTHORITY.KEYID = 7
24,286,802 UART: [art] PUB.X = 90D7C7C15769219993B55805AC0B0C788C17FBD8270201EE25C9756122D5B30BE05978E1911C33BDF48D22CFC047CC51
24,294,070 UART: [art] PUB.Y = B7310DB0FA171CC10D18AC78B1D5899039715C45A92119E36E685F306A6E5992E4496072138E2007EE1C5502A976CD03
24,301,280 UART: [art] SIG.R = 703A1FF261A2CABED1E8B901498417DB9B2913659B56A9AB74AE95968AD5413D80E93AB7B0C33F043503C8E9FB79A4F8
24,308,688 UART: [art] SIG.S = D38811C7B47C678344D4297726BB62187A4F49A01408398BFBD1018426D2A70D861488B1DFAD4D85B674C66EDB3B0228
25,287,463 UART: mbox::rt_entry...
25,288,414 UART: ____ _ _ _ ____ _____
25,290,392 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,292,410 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,294,334 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,296,258 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,298,178 UART: |_|
25,299,157 UART:
25,429,521 UART: [rt] Runtime listening for mailbox commands...
25,431,523 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,432,371 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
608 UART:
756 UART: Running Caliptra ROM ...
1,839 UART:
1,993 UART: [state] CFI Enabled
69,534 UART: [state] LifecycleState = Production
71,353 UART: [state] DebugLocked = Yes
73,041 UART: [state] Starting the WD Timer 40000000 cycles
78,481 UART: [kat] SHA2-256
258,179 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
268,986 UART: [kat] ++
269,520 UART: [kat] sha1
279,269 UART: [kat] SHA2-256
281,953 UART: [kat] SHA2-384
287,980 UART: [kat] SHA2-512-ACC
290,368 UART: [kat] ECC-384
2,750,019 UART: [kat] HMAC-384Kdf
2,773,597 UART: [kat] LMS
3,250,066 UART: [kat] --
3,255,734 UART: [warm-reset] ++
3,259,287 UART: [warm-reset] --
3,263,420 UART: [state] Locking Datavault
3,266,992 UART: [state] Locking PCR0, PCR1 and PCR31
3,268,684 UART: [state] Locking ICCM
3,270,796 UART: [exit] Launching FMC @ 0x40000130
3,279,201 UART:
3,279,437 UART: Running Caliptra FMC ...
3,280,536 UART:
3,280,693 UART: [state] CFI Enabled
3,340,199 UART: [art] Skip pcr extension
3,341,347 UART: [art] Extend RT PCRs Done
3,342,492 UART: [art] Lock RT PCRs Done
3,343,775 UART: [art] Populate DV Done
3,349,176 UART: [fht] FMC Alias Private Key: 7
3,350,759 UART: [art] Derive CDI
3,351,568 UART: [art] Store in slot 0x4
3,408,603 UART: [art] Derive Key Pair
3,410,079 UART: [art] Store priv key in slot 0x5
5,873,317 UART: [art] Derive Key Pair - Done
5,886,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,598,750 UART: [art] Erasing AUTHORITY.KEYID = 7
7,600,271 UART: [art] PUB.X = 90D7C7C15769219993B55805AC0B0C788C17FBD8270201EE25C9756122D5B30BE05978E1911C33BDF48D22CFC047CC51
7,607,509 UART: [art] PUB.Y = B7310DB0FA171CC10D18AC78B1D5899039715C45A92119E36E685F306A6E5992E4496072138E2007EE1C5502A976CD03
7,614,732 UART: [art] SIG.R = 703A1FF261A2CABED1E8B901498417DB9B2913659B56A9AB74AE95968AD5413D80E93AB7B0C33F043503C8E9FB79A4F8
7,622,099 UART: [art] SIG.S = D38811C7B47C678344D4297726BB62187A4F49A01408398BFBD1018426D2A70D861488B1DFAD4D85B674C66EDB3B0228
8,600,224 UART: mbox::rt_entry...
8,601,185 UART: ____ _ _ _ ____ _____
8,603,161 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,605,091 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,607,014 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,609,061 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,610,989 UART: |_|
8,611,790 UART:
8,984,224 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,458,599 ready_for_fw is high
3,459,005 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,675,983 >>> mbox cmd response: success
17,963,124 UART:
17,963,514 UART: Running Caliptra FMC ...
17,964,671 UART:
17,964,837 UART: [state] CFI Enabled
18,029,481 UART: [fht] FMC Alias Private Key: 7
19,796,083 UART: [art] Extend RT PCRs Done
19,797,329 UART: [art] Lock RT PCRs Done
19,799,199 UART: [art] Populate DV Done
19,804,917 UART: [fht] FMC Alias Private Key: 7
19,806,631 UART: [art] Derive CDI
19,807,456 UART: [art] Store in slot 0x4
19,862,606 UART: [art] Derive Key Pair
19,863,605 UART: [art] Store priv key in slot 0x5
22,326,892 UART: [art] Derive Key Pair - Done
22,339,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,052,581 UART: [art] Erasing AUTHORITY.KEYID = 7
24,054,087 UART: [art] PUB.X = 295D88D19868122BE278100400D160F6EB3315513F8733B1C9441FD71FE45855DAD2DCADF1C53B06E81D7F16D39F21D8
24,061,357 UART: [art] PUB.Y = 74469DA1A66B5A6D0A441C9EADFF2C30C5BB43674D4CACE2A34B2E8AD118522114CF836C6EC1A636ED8E53589E89D532
24,068,572 UART: [art] SIG.R = 7E5BD20E682DC7FCA8E4D1B2EE91CD1A10F039F97AC70323D4489B7EFD4C45633F35D81B8230301210A008AEDC60DA1B
24,075,981 UART: [art] SIG.S = 731E5B824C0F89D65F492FB31672DA3567BFCBB17325DAAFDE2CAD20AEEDA80B11FEDAAC271400CE77686464E40004E6
25,055,557 UART: mbox::rt_entry...
25,056,517 UART: ____ _ _ _ ____ _____
25,058,465 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,060,475 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,062,331 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,064,285 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,066,139 UART: |_|
25,067,020 UART:
25,197,238 UART: [rt] Runtime listening for mailbox commands...
25,199,253 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,200,128 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
3,267,310 UART:
3,267,646 UART: Running Caliptra FMC ...
3,268,884 UART:
3,269,042 UART: [state] CFI Enabled
3,318,475 UART: [art] Skip pcr extension
3,319,619 UART: [art] Extend RT PCRs Done
3,320,707 UART: [art] Lock RT PCRs Done
3,321,834 UART: [art] Populate DV Done
3,327,243 UART: [fht] FMC Alias Private Key: 7
3,328,885 UART: [art] Derive CDI
3,329,694 UART: [art] Store in slot 0x4
3,387,222 UART: [art] Derive Key Pair
3,388,222 UART: [art] Store priv key in slot 0x5
5,851,474 UART: [art] Derive Key Pair - Done
5,864,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,576,638 UART: [art] Erasing AUTHORITY.KEYID = 7
7,578,149 UART: [art] PUB.X = 295D88D19868122BE278100400D160F6EB3315513F8733B1C9441FD71FE45855DAD2DCADF1C53B06E81D7F16D39F21D8
7,585,414 UART: [art] PUB.Y = 74469DA1A66B5A6D0A441C9EADFF2C30C5BB43674D4CACE2A34B2E8AD118522114CF836C6EC1A636ED8E53589E89D532
7,592,654 UART: [art] SIG.R = 7E5BD20E682DC7FCA8E4D1B2EE91CD1A10F039F97AC70323D4489B7EFD4C45633F35D81B8230301210A008AEDC60DA1B
7,600,044 UART: [art] SIG.S = 731E5B824C0F89D65F492FB31672DA3567BFCBB17325DAAFDE2CAD20AEEDA80B11FEDAAC271400CE77686464E40004E6
8,578,610 UART: mbox::rt_entry...
8,579,573 UART: ____ _ _ _ ____ _____
8,581,553 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,583,565 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,585,422 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,587,344 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,589,194 UART: |_|
8,590,072 UART:
8,963,216 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
191,770 UART:
192,130 UART: Running Caliptra ROM ...
193,225 UART:
602,884 UART: [state] CFI Enabled
616,972 UART: [state] LifecycleState = Production
618,749 UART: [state] DebugLocked = Yes
621,521 UART: [state] Starting the WD Timer 40000000 cycles
626,291 UART: [kat] SHA2-256
805,949 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,728 UART: [kat] ++
817,231 UART: [kat] sha1
828,212 UART: [kat] SHA2-256
830,865 UART: [kat] SHA2-384
836,428 UART: [kat] SHA2-512-ACC
838,796 UART: [kat] ECC-384
3,281,713 UART: [kat] HMAC-384Kdf
3,294,727 UART: [kat] LMS
3,771,237 UART: [kat] --
3,775,372 UART: [cold-reset] ++
3,776,942 UART: [fht] FHT @ 0x50003400
3,788,490 UART: [idev] ++
3,789,127 UART: [idev] CDI.KEYID = 6
3,790,014 UART: [idev] SUBJECT.KEYID = 7
3,791,277 UART: [idev] UDS.KEYID = 0
3,792,251 ready_for_fw is high
3,792,459 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,896,589 UART: [idev] Erasing UDS.KEYID = 0
6,271,478 UART: [idev] Sha1 KeyId Algorithm
6,295,377 UART: [idev] --
6,299,320 UART: [ldev] ++
6,299,888 UART: [ldev] CDI.KEYID = 6
6,300,802 UART: [ldev] SUBJECT.KEYID = 5
6,302,014 UART: [ldev] AUTHORITY.KEYID = 7
6,303,302 UART: [ldev] FE.KEYID = 1
6,313,683 UART: [ldev] Erasing FE.KEYID = 1
8,790,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,372 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,525,138 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,541,005 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,556,792 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,578,440 UART: [ldev] --
10,584,730 UART: [fwproc] Wait for Commands...
10,587,259 UART: [fwproc] Recv command 0x46574c44
10,589,243 UART: [fwproc] Recv'd Img size: 82832 bytes
13,654,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,732,930 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,805,934 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,010,141 >>> mbox cmd response: success
14,013,871 UART: [afmc] ++
14,014,456 UART: [afmc] CDI.KEYID = 6
14,015,371 UART: [afmc] SUBJECT.KEYID = 7
14,016,593 UART: [afmc] AUTHORITY.KEYID = 5
16,520,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,243,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,245,393 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,261,292 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,277,363 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,292,889 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,318,274 UART: [afmc] --
18,321,235 UART: [cold-reset] --
18,326,291 UART: [state] Locking Datavault
18,333,105 UART: [state] Locking PCR0, PCR1 and PCR31
18,334,859 UART: [state] Locking ICCM
18,336,094 UART: [exit] Launching FMC @ 0x40000130
18,344,494 UART:
18,344,737 UART: Running Caliptra FMC ...
18,345,841 UART:
18,346,002 UART: [state] CFI Enabled
18,354,326 UART: [fht] FMC Alias Private Key: 7
20,119,967 UART: [art] Extend RT PCRs Done
20,121,205 UART: [art] Lock RT PCRs Done
20,122,774 UART: [art] Populate DV Done
20,128,084 UART: [fht] FMC Alias Private Key: 7
20,129,741 UART: [art] Derive CDI
20,130,477 UART: [art] Store in slot 0x4
20,173,233 UART: [art] Derive Key Pair
20,174,271 UART: [art] Store priv key in slot 0x5
22,600,978 UART: [art] Derive Key Pair - Done
22,613,651 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,319,725 UART: [art] Erasing AUTHORITY.KEYID = 7
24,321,225 UART: [art] PUB.X = E963506BBF7BCE63E21E19356504E8B92262F65CBEFFB1A85B535F15DD7155DD7C01D2B72274CED01D017C2BD177E794
24,328,515 UART: [art] PUB.Y = 4941F26B6D5689E8603A849FC55F4661932112331DE9467073D0D014831EC59E1E93C672580DDB35061678690FFB332C
24,335,743 UART: [art] SIG.R = 622E5904820143B3422B9A664325BF33E37E903E8D6B9064C70C30A795DB0D610B293B1B500D6E32A52AE0AE430C6656
24,343,080 UART: [art] SIG.S = B395108B2AE64D6144DACBD0314EF22CF53B537350DAD92A5CA2BD15EE16E00C3A139EF34B9CDE4E3319E24DD6BA4743
25,321,712 UART: mbox::rt_entry...
25,322,675 UART: ____ _ _ _ ____ _____
25,324,601 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,326,627 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,328,488 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,330,410 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,332,292 UART: |_|
25,333,125 UART:
25,464,579 UART: [rt] Runtime listening for mailbox commands...
25,466,601 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,467,684 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
606 UART:
757 UART: Running Caliptra ROM ...
1,759 UART:
15,060,262 UART: [state] CFI Enabled
15,073,203 UART: [state] LifecycleState = Production
15,075,008 UART: [state] DebugLocked = Yes
15,076,957 UART: [state] Starting the WD Timer 40000000 cycles
15,082,093 UART: [kat] SHA2-256
15,261,789 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
15,272,561 UART: [kat] ++
15,273,017 UART: [kat] sha1
15,284,289 UART: [kat] SHA2-256
15,286,976 UART: [kat] SHA2-384
15,292,043 UART: [kat] SHA2-512-ACC
15,294,455 UART: [kat] ECC-384
17,735,002 UART: [kat] HMAC-384Kdf
17,746,693 UART: [kat] LMS
18,223,169 UART: [kat] --
18,226,507 UART: [warm-reset] ++
18,232,705 UART: [warm-reset] --
18,236,297 UART: [state] Locking Datavault
18,239,443 UART: [state] Locking PCR0, PCR1 and PCR31
18,241,198 UART: [state] Locking ICCM
18,242,489 UART: [exit] Launching FMC @ 0x40000130
18,250,921 UART:
18,251,164 UART: Running Caliptra FMC ...
18,252,273 UART:
18,252,440 UART: [state] CFI Enabled
18,254,556 UART: [art] Skip pcr extension
18,255,669 UART: [art] Extend RT PCRs Done
18,256,809 UART: [art] Lock RT PCRs Done
18,258,072 UART: [art] Populate DV Done
18,263,868 UART: [fht] FMC Alias Private Key: 7
18,265,619 UART: [art] Derive CDI
18,266,438 UART: [art] Store in slot 0x4
18,308,984 UART: [art] Derive Key Pair
18,310,574 UART: [art] Store priv key in slot 0x5
20,736,865 UART: [art] Derive Key Pair - Done
20,749,646 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,456,330 UART: [art] Erasing AUTHORITY.KEYID = 7
22,457,820 UART: [art] PUB.X = E963506BBF7BCE63E21E19356504E8B92262F65CBEFFB1A85B535F15DD7155DD7C01D2B72274CED01D017C2BD177E794
22,465,096 UART: [art] PUB.Y = 4941F26B6D5689E8603A849FC55F4661932112331DE9467073D0D014831EC59E1E93C672580DDB35061678690FFB332C
22,472,351 UART: [art] SIG.R = 622E5904820143B3422B9A664325BF33E37E903E8D6B9064C70C30A795DB0D610B293B1B500D6E32A52AE0AE430C6656
22,479,704 UART: [art] SIG.S = B395108B2AE64D6144DACBD0314EF22CF53B537350DAD92A5CA2BD15EE16E00C3A139EF34B9CDE4E3319E24DD6BA4743
23,458,519 UART: mbox::rt_entry...
23,459,475 UART: ____ _ _ _ ____ _____
23,461,456 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,463,459 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,465,387 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,467,314 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,469,243 UART: |_|
23,470,053 UART:
23,842,206 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
3,784,396 ready_for_fw is high
3,785,135 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,912,160 >>> mbox cmd response: success
18,162,050 UART:
18,162,426 UART: Running Caliptra FMC ...
18,163,628 UART:
18,163,802 UART: [state] CFI Enabled
18,172,029 UART: [fht] FMC Alias Private Key: 7
19,937,822 UART: [art] Extend RT PCRs Done
19,939,054 UART: [art] Lock RT PCRs Done
19,940,905 UART: [art] Populate DV Done
19,946,118 UART: [fht] FMC Alias Private Key: 7
19,947,778 UART: [art] Derive CDI
19,948,601 UART: [art] Store in slot 0x4
19,991,450 UART: [art] Derive Key Pair
19,992,497 UART: [art] Store priv key in slot 0x5
22,419,350 UART: [art] Derive Key Pair - Done
22,432,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,138,307 UART: [art] Erasing AUTHORITY.KEYID = 7
24,139,804 UART: [art] PUB.X = AC1534407D239DFD135462DA8CD0657698B5B9C917BC7ADDB2C4B79FB783CB169FE5513A018133EFFB4F9EDADCA857F4
24,147,134 UART: [art] PUB.Y = F42DB7BCDE165700332D46974440F028A31F5319FDC0969D5C42FFBFF67807F9174108864887F6FFD94C6E18A9B1243C
24,154,365 UART: [art] SIG.R = D4ACFCFCB046092503C98D1B1E533F258494C2B42154861ECF8A0183421549FD5C917D3D879C645CEB31B0EFEF424638
24,161,727 UART: [art] SIG.S = D303C8E7833409DF19CE0B024CD4C19F13600FE229C9EC259369FA7A1FE4C2E6ABA9A085CABD2B850EDB76678BADE968
25,140,763 UART: mbox::rt_entry...
25,141,751 UART: ____ _ _ _ ____ _____
25,143,656 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,145,671 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,147,557 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,149,515 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,151,566 UART: |_|
25,152,378 UART:
25,283,673 UART: [rt] Runtime listening for mailbox commands...
25,285,700 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,286,778 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
18,427,488 UART:
18,427,815 UART: Running Caliptra FMC ...
18,428,856 UART:
18,429,010 UART: [state] CFI Enabled
18,430,710 UART: [art] Skip pcr extension
18,431,837 UART: [art] Extend RT PCRs Done
18,432,897 UART: [art] Lock RT PCRs Done
18,434,075 UART: [art] Populate DV Done
18,439,538 UART: [fht] FMC Alias Private Key: 7
18,441,140 UART: [art] Derive CDI
18,441,881 UART: [art] Store in slot 0x4
18,484,803 UART: [art] Derive Key Pair
18,485,847 UART: [art] Store priv key in slot 0x5
20,912,673 UART: [art] Derive Key Pair - Done
20,925,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,632,333 UART: [art] Erasing AUTHORITY.KEYID = 7
22,633,837 UART: [art] PUB.X = AC1534407D239DFD135462DA8CD0657698B5B9C917BC7ADDB2C4B79FB783CB169FE5513A018133EFFB4F9EDADCA857F4
22,641,087 UART: [art] PUB.Y = F42DB7BCDE165700332D46974440F028A31F5319FDC0969D5C42FFBFF67807F9174108864887F6FFD94C6E18A9B1243C
22,648,327 UART: [art] SIG.R = D4ACFCFCB046092503C98D1B1E533F258494C2B42154861ECF8A0183421549FD5C917D3D879C645CEB31B0EFEF424638
22,655,723 UART: [art] SIG.S = D303C8E7833409DF19CE0B024CD4C19F13600FE229C9EC259369FA7A1FE4C2E6ABA9A085CABD2B850EDB76678BADE968
23,633,984 UART: mbox::rt_entry...
23,634,948 UART: ____ _ _ _ ____ _____
23,636,907 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,638,923 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,640,857 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,642,790 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,644,716 UART: |_|
23,645,523 UART:
24,016,828 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
191,836 UART:
192,497 UART: Running Caliptra ROM ...
193,605 UART:
193,747 UART: [state] CFI Enabled
269,197 UART: [state] LifecycleState = Production
271,393 UART: [state] DebugLocked = Yes
274,086 UART: [state] Starting the WD Timer 40000000 cycles
279,994 UART: [kat] SHA2-256
469,921 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
480,629 UART: [kat] ++
481,190 UART: [kat] sha1
493,327 UART: [kat] SHA2-256
496,336 UART: [kat] SHA2-384
502,674 UART: [kat] SHA2-512-ACC
505,259 UART: [kat] ECC-384
2,970,537 UART: [kat] HMAC-384Kdf
2,994,863 UART: [kat] LMS
3,526,597 UART: [kat] --
3,531,254 UART: [cold-reset] ++
3,533,467 UART: [fht] FHT @ 0x50003400
3,543,942 UART: [idev] ++
3,544,652 UART: [idev] CDI.KEYID = 6
3,545,680 UART: [idev] SUBJECT.KEYID = 7
3,546,850 UART: [idev] UDS.KEYID = 0
3,547,770 ready_for_fw is high
3,547,978 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,652,441 UART: [idev] Erasing UDS.KEYID = 0
6,055,727 UART: [idev] Sha1 KeyId Algorithm
6,078,763 UART: [idev] --
6,084,755 UART: [ldev] ++
6,085,440 UART: [ldev] CDI.KEYID = 6
6,086,350 UART: [ldev] SUBJECT.KEYID = 5
6,087,507 UART: [ldev] AUTHORITY.KEYID = 7
6,088,740 UART: [ldev] FE.KEYID = 1
6,123,906 UART: [ldev] Erasing FE.KEYID = 1
8,632,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,368,138 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,383,308 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,398,416 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,413,386 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,434,041 UART: [ldev] --
10,439,073 UART: [fwproc] Wait for Commands...
10,440,792 UART: [fwproc] Recv command 0x46574c44
10,442,741 UART: [fwproc] Recv'd Img size: 82832 bytes
13,538,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,619,585 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,743,197 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,088,680 >>> mbox cmd response: success
14,092,679 UART: [afmc] ++
14,093,405 UART: [afmc] CDI.KEYID = 6
14,094,602 UART: [afmc] SUBJECT.KEYID = 7
14,095,702 UART: [afmc] AUTHORITY.KEYID = 5
16,642,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,385,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,387,685 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,402,731 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,417,865 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,432,937 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,457,089 UART: [afmc] --
18,461,388 UART: [cold-reset] --
18,465,749 UART: [state] Locking Datavault
18,469,809 UART: [state] Locking PCR0, PCR1 and PCR31
18,471,991 UART: [state] Locking ICCM
18,474,840 UART: [exit] Launching FMC @ 0x40000130
18,483,504 UART:
18,483,737 UART: Running Caliptra FMC ...
18,484,836 UART:
18,484,995 UART: [state] CFI Enabled
18,544,009 UART: [fht] FMC Alias Private Key: 7
20,310,551 UART: [art] Extend RT PCRs Done
20,311,771 UART: [art] Lock RT PCRs Done
20,313,364 UART: [art] Populate DV Done
20,319,096 UART: [fht] FMC Alias Private Key: 7
20,320,699 UART: [art] Derive CDI
20,321,513 UART: [art] Store in slot 0x4
20,376,244 UART: [art] Derive Key Pair
20,377,280 UART: [art] Store priv key in slot 0x5
22,840,389 UART: [art] Derive Key Pair - Done
22,853,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,565,411 UART: [art] Erasing AUTHORITY.KEYID = 7
24,566,910 UART: [art] PUB.X = FBBA8476B54D7F85BC953632C5278068D314EFC18AD65AE0E40CD716249BF699182B4143D43BB0CACCC54DA5B652A670
24,574,226 UART: [art] PUB.Y = 1D80EB6E700F49EBE18565B08C783D07CCD74A2886AB6BA66621FAE297FE9811450CD7E119E84D8ADB3B6994049A32FF
24,581,466 UART: [art] SIG.R = 289B4C27A106E3A0ED12E36F7620A71F0DEB21F4A904CD2862A4ADCD4C82B3BEBC49DF2F1ED595E687B06C7FAFA78AF3
24,588,912 UART: [art] SIG.S = F9BC27405F97222465EAF0839DDF03908AE7F18C5758098A10986D81E9952102AFBA9D1BA74B7A7F49B65A5000AC20E2
25,567,340 UART: mbox::rt_entry...
25,568,292 UART: ____ _ _ _ ____ _____
25,570,267 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,572,269 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,574,200 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,576,126 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,578,055 UART: |_|
25,578,880 UART:
25,709,179 UART: [rt] Runtime listening for mailbox commands...
25,711,201 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,712,055 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
625 UART:
774 UART: Running Caliptra ROM ...
1,775 UART:
1,915 UART: [state] CFI Enabled
64,730 UART: [state] LifecycleState = Production
66,618 UART: [state] DebugLocked = Yes
68,918 UART: [state] Starting the WD Timer 40000000 cycles
73,805 UART: [kat] SHA2-256
263,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
274,449 UART: [kat] ++
274,964 UART: [kat] sha1
285,916 UART: [kat] SHA2-256
288,931 UART: [kat] SHA2-384
293,732 UART: [kat] SHA2-512-ACC
296,291 UART: [kat] ECC-384
2,748,859 UART: [kat] HMAC-384Kdf
2,771,943 UART: [kat] LMS
3,303,498 UART: [kat] --
3,305,543 UART: [warm-reset] ++
3,308,333 UART: [warm-reset] --
3,313,279 UART: [state] Locking Datavault
3,316,211 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,854 UART: [state] Locking ICCM
3,319,849 UART: [exit] Launching FMC @ 0x40000130
3,328,519 UART:
3,328,753 UART: Running Caliptra FMC ...
3,329,800 UART:
3,329,971 UART: [state] CFI Enabled
3,381,906 UART: [art] Skip pcr extension
3,383,058 UART: [art] Extend RT PCRs Done
3,384,211 UART: [art] Lock RT PCRs Done
3,385,281 UART: [art] Populate DV Done
3,390,683 UART: [fht] FMC Alias Private Key: 7
3,392,386 UART: [art] Derive CDI
3,393,201 UART: [art] Store in slot 0x4
3,450,347 UART: [art] Derive Key Pair
3,451,786 UART: [art] Store priv key in slot 0x5
5,914,044 UART: [art] Derive Key Pair - Done
5,926,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,640,159 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,674 UART: [art] PUB.X = FBBA8476B54D7F85BC953632C5278068D314EFC18AD65AE0E40CD716249BF699182B4143D43BB0CACCC54DA5B652A670
7,648,914 UART: [art] PUB.Y = 1D80EB6E700F49EBE18565B08C783D07CCD74A2886AB6BA66621FAE297FE9811450CD7E119E84D8ADB3B6994049A32FF
7,656,188 UART: [art] SIG.R = 289B4C27A106E3A0ED12E36F7620A71F0DEB21F4A904CD2862A4ADCD4C82B3BEBC49DF2F1ED595E687B06C7FAFA78AF3
7,663,640 UART: [art] SIG.S = F9BC27405F97222465EAF0839DDF03908AE7F18C5758098A10986D81E9952102AFBA9D1BA74B7A7F49B65A5000AC20E2
8,641,725 UART: mbox::rt_entry...
8,642,695 UART: ____ _ _ _ ____ _____
8,644,620 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,646,627 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,648,557 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,650,491 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,652,419 UART: |_|
8,653,252 UART:
9,020,715 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
3,439,161 ready_for_fw is high
3,439,735 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,104,375 >>> mbox cmd response: success
18,383,345 UART:
18,383,738 UART: Running Caliptra FMC ...
18,384,875 UART:
18,385,031 UART: [state] CFI Enabled
18,452,925 UART: [fht] FMC Alias Private Key: 7
20,219,790 UART: [art] Extend RT PCRs Done
20,221,014 UART: [art] Lock RT PCRs Done
20,222,535 UART: [art] Populate DV Done
20,227,947 UART: [fht] FMC Alias Private Key: 7
20,229,647 UART: [art] Derive CDI
20,230,464 UART: [art] Store in slot 0x4
20,285,780 UART: [art] Derive Key Pair
20,286,822 UART: [art] Store priv key in slot 0x5
22,749,695 UART: [art] Derive Key Pair - Done
22,762,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,475,960 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,488 UART: [art] PUB.X = 7A058C765D970B8260243C89341B69ACE26D1F15129DB6603872973FB0F17809006B564DB6A4CDB56740BE096D326753
24,484,649 UART: [art] PUB.Y = D5EF83B5A5FA9570216143F1C3A6747386FE1E2D7D3FFDAB322CA93405B42235D6569A0CF5AAF80322D2AFBD0F188050
24,491,901 UART: [art] SIG.R = FC00D0A22478F1621F657ECD2EE2A650E12CDFAD9C5968D1D5BF51E704E93AE0A9D4505659E535124BC1F8077CD96009
24,499,317 UART: [art] SIG.S = 9390348FFCE616090027E5ADCCB59170C99102474BB9E21600C8AE954652C76B8652DFF4CC38739D9B3F87D73726489A
25,477,335 UART: mbox::rt_entry...
25,478,301 UART: ____ _ _ _ ____ _____
25,480,283 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,482,278 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,484,206 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,486,169 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,488,103 UART: |_|
25,488,913 UART:
25,619,129 UART: [rt] Runtime listening for mailbox commands...
25,621,154 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,621,964 >>> mbox cmd response data (0 bytes)
294 writing to cptra_bootfsm_go
3,246,871 UART:
3,247,197 UART: Running Caliptra FMC ...
3,248,239 UART:
3,248,384 UART: [state] CFI Enabled
3,296,756 UART: [art] Skip pcr extension
3,297,909 UART: [art] Extend RT PCRs Done
3,298,978 UART: [art] Lock RT PCRs Done
3,300,096 UART: [art] Populate DV Done
3,305,670 UART: [fht] FMC Alias Private Key: 7
3,307,318 UART: [art] Derive CDI
3,308,054 UART: [art] Store in slot 0x4
3,365,263 UART: [art] Derive Key Pair
3,366,296 UART: [art] Store priv key in slot 0x5
5,829,269 UART: [art] Derive Key Pair - Done
5,842,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,554,538 UART: [art] Erasing AUTHORITY.KEYID = 7
7,556,057 UART: [art] PUB.X = 7A058C765D970B8260243C89341B69ACE26D1F15129DB6603872973FB0F17809006B564DB6A4CDB56740BE096D326753
7,563,235 UART: [art] PUB.Y = D5EF83B5A5FA9570216143F1C3A6747386FE1E2D7D3FFDAB322CA93405B42235D6569A0CF5AAF80322D2AFBD0F188050
7,570,493 UART: [art] SIG.R = FC00D0A22478F1621F657ECD2EE2A650E12CDFAD9C5968D1D5BF51E704E93AE0A9D4505659E535124BC1F8077CD96009
7,577,865 UART: [art] SIG.S = 9390348FFCE616090027E5ADCCB59170C99102474BB9E21600C8AE954652C76B8652DFF4CC38739D9B3F87D73726489A
8,556,006 UART: mbox::rt_entry...
8,556,983 UART: ____ _ _ _ ____ _____
8,558,960 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,560,979 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,562,857 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,564,785 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,566,634 UART: |_|
8,567,514 UART:
8,939,768 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
191,814 UART:
192,183 UART: Running Caliptra ROM ...
193,359 UART:
603,206 UART: [state] CFI Enabled
618,012 UART: [state] LifecycleState = Production
620,221 UART: [state] DebugLocked = Yes
622,062 UART: [state] Starting the WD Timer 40000000 cycles
627,589 UART: [kat] SHA2-256
817,475 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,314 UART: [kat] ++
828,834 UART: [kat] sha1
841,087 UART: [kat] SHA2-256
844,102 UART: [kat] SHA2-384
850,808 UART: [kat] SHA2-512-ACC
853,400 UART: [kat] ECC-384
3,294,237 UART: [kat] HMAC-384Kdf
3,306,381 UART: [kat] LMS
3,838,199 UART: [kat] --
3,840,009 UART: [cold-reset] ++
3,842,053 UART: [fht] FHT @ 0x50003400
3,853,820 UART: [idev] ++
3,854,542 UART: [idev] CDI.KEYID = 6
3,855,435 UART: [idev] SUBJECT.KEYID = 7
3,856,682 UART: [idev] UDS.KEYID = 0
3,857,586 ready_for_fw is high
3,857,808 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,961,953 UART: [idev] Erasing UDS.KEYID = 0
6,334,510 UART: [idev] Sha1 KeyId Algorithm
6,357,800 UART: [idev] --
6,362,820 UART: [ldev] ++
6,363,499 UART: [ldev] CDI.KEYID = 6
6,364,437 UART: [ldev] SUBJECT.KEYID = 5
6,365,612 UART: [ldev] AUTHORITY.KEYID = 7
6,366,797 UART: [ldev] FE.KEYID = 1
6,375,616 UART: [ldev] Erasing FE.KEYID = 1
8,855,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,423 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,590,602 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,605,674 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,620,661 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,641,496 UART: [ldev] --
10,646,370 UART: [fwproc] Wait for Commands...
10,648,751 UART: [fwproc] Recv command 0x46574c44
10,650,742 UART: [fwproc] Recv'd Img size: 82832 bytes
13,742,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,821,269 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,944,878 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,290,715 >>> mbox cmd response: success
14,295,160 UART: [afmc] ++
14,295,896 UART: [afmc] CDI.KEYID = 6
14,297,097 UART: [afmc] SUBJECT.KEYID = 7
14,298,542 UART: [afmc] AUTHORITY.KEYID = 5
16,799,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,522,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,524,244 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,539,292 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,554,432 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,569,444 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,593,819 UART: [afmc] --
18,597,090 UART: [cold-reset] --
18,600,529 UART: [state] Locking Datavault
18,607,354 UART: [state] Locking PCR0, PCR1 and PCR31
18,609,554 UART: [state] Locking ICCM
18,611,838 UART: [exit] Launching FMC @ 0x40000130
18,620,529 UART:
18,620,767 UART: Running Caliptra FMC ...
18,621,872 UART:
18,622,036 UART: [state] CFI Enabled
18,629,818 UART: [fht] FMC Alias Private Key: 7
20,395,528 UART: [art] Extend RT PCRs Done
20,397,234 UART: [art] Lock RT PCRs Done
20,398,370 UART: [art] Populate DV Done
20,403,921 UART: [fht] FMC Alias Private Key: 7
20,405,466 UART: [art] Derive CDI
20,406,208 UART: [art] Store in slot 0x4
20,448,749 UART: [art] Derive Key Pair
20,449,754 UART: [art] Store priv key in slot 0x5
22,876,591 UART: [art] Derive Key Pair - Done
22,889,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,596,644 UART: [art] Erasing AUTHORITY.KEYID = 7
24,598,156 UART: [art] PUB.X = 9B13463FD4FFACFCD7558A73ADFE5D16BE33AC3BA34111D12E7AF70C13DC36A760B6BD87CC5111AE11D2A59654CED111
24,605,487 UART: [art] PUB.Y = D1C62B5EBC4A37856D6D7E08262BD262D32BB255123DCFA589843209B27D81EF42138AC215A46636F1832C526130A25F
24,612,695 UART: [art] SIG.R = 4A4EE81539279D596B830659CC3ACD59F0ED0AF30840139462B6F4C0548E9581812843D0B786938EC33EECC625FB9AAB
24,620,118 UART: [art] SIG.S = DB0B9C4DCAA838FCBBE30DF4EED388596D9415FA17EE8243904C20E3AD85E6D8D7C0092B9D2DF5FEB31136E82FBE6819
25,598,509 UART: mbox::rt_entry...
25,599,467 UART: ____ _ _ _ ____ _____
25,601,396 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,603,405 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,605,262 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,607,191 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,609,075 UART: |_|
25,609,968 UART:
25,740,604 UART: [rt] Runtime listening for mailbox commands...
25,742,622 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,743,476 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
620 UART:
773 UART: Running Caliptra ROM ...
1,790 UART:
14,785,114 UART: [state] CFI Enabled
14,798,453 UART: [state] LifecycleState = Production
14,800,254 UART: [state] DebugLocked = Yes
14,801,867 UART: [state] Starting the WD Timer 40000000 cycles
14,807,646 UART: [kat] SHA2-256
14,997,536 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
15,008,412 UART: [kat] ++
15,008,934 UART: [kat] sha1
15,020,534 UART: [kat] SHA2-256
15,023,506 UART: [kat] SHA2-384
15,029,717 UART: [kat] SHA2-512-ACC
15,032,293 UART: [kat] ECC-384
17,474,520 UART: [kat] HMAC-384Kdf
17,486,692 UART: [kat] LMS
18,018,287 UART: [kat] --
18,021,813 UART: [warm-reset] ++
18,025,914 UART: [warm-reset] --
18,029,785 UART: [state] Locking Datavault
18,032,779 UART: [state] Locking PCR0, PCR1 and PCR31
18,034,499 UART: [state] Locking ICCM
18,036,988 UART: [exit] Launching FMC @ 0x40000130
18,045,678 UART:
18,045,921 UART: Running Caliptra FMC ...
18,047,032 UART:
18,047,198 UART: [state] CFI Enabled
18,049,040 UART: [art] Skip pcr extension
18,050,149 UART: [art] Extend RT PCRs Done
18,051,291 UART: [art] Lock RT PCRs Done
18,052,544 UART: [art] Populate DV Done
18,057,903 UART: [fht] FMC Alias Private Key: 7
18,059,504 UART: [art] Derive CDI
18,060,324 UART: [art] Store in slot 0x4
18,103,416 UART: [art] Derive Key Pair
18,104,891 UART: [art] Store priv key in slot 0x5
20,531,257 UART: [art] Derive Key Pair - Done
20,544,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,250,411 UART: [art] Erasing AUTHORITY.KEYID = 7
22,251,915 UART: [art] PUB.X = 9B13463FD4FFACFCD7558A73ADFE5D16BE33AC3BA34111D12E7AF70C13DC36A760B6BD87CC5111AE11D2A59654CED111
22,259,207 UART: [art] PUB.Y = D1C62B5EBC4A37856D6D7E08262BD262D32BB255123DCFA589843209B27D81EF42138AC215A46636F1832C526130A25F
22,266,413 UART: [art] SIG.R = 4A4EE81539279D596B830659CC3ACD59F0ED0AF30840139462B6F4C0548E9581812843D0B786938EC33EECC625FB9AAB
22,273,837 UART: [art] SIG.S = DB0B9C4DCAA838FCBBE30DF4EED388596D9415FA17EE8243904C20E3AD85E6D8D7C0092B9D2DF5FEB31136E82FBE6819
23,252,765 UART: mbox::rt_entry...
23,253,707 UART: ____ _ _ _ ____ _____
23,255,636 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,257,665 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,259,526 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,261,453 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,263,351 UART: |_|
23,264,237 UART:
23,635,900 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,754,795 ready_for_fw is high
3,755,232 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,325,630 >>> mbox cmd response: success
18,581,841 UART:
18,582,294 UART: Running Caliptra FMC ...
18,583,428 UART:
18,583,588 UART: [state] CFI Enabled
18,591,709 UART: [fht] FMC Alias Private Key: 7
20,357,217 UART: [art] Extend RT PCRs Done
20,358,444 UART: [art] Lock RT PCRs Done
20,360,213 UART: [art] Populate DV Done
20,365,854 UART: [fht] FMC Alias Private Key: 7
20,367,298 UART: [art] Derive CDI
20,368,037 UART: [art] Store in slot 0x4
20,410,995 UART: [art] Derive Key Pair
20,412,038 UART: [art] Store priv key in slot 0x5
22,838,847 UART: [art] Derive Key Pair - Done
22,852,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,558,246 UART: [art] Erasing AUTHORITY.KEYID = 7
24,559,748 UART: [art] PUB.X = 4C089EE207033DAE8AE9A9F8CBD110CA09D6979B01952DEFE09E803EA7D2F13BDCB45D8A06BADF54C797CCD601108285
24,567,081 UART: [art] PUB.Y = 3D227F50EC46D62C807BA5952110664BEE2C70141C456C2A37B549BC6AC1E9BB84861D45C951FCA39956B49B85CB32F7
24,574,320 UART: [art] SIG.R = C7A7FB2A562D4D168F956912DA429949EFCCE471CCE5353635C76AD8DE54CD90A2EAAD74096E71157EC8D69A80C8F8A4
24,581,725 UART: [art] SIG.S = 085859034556477FFF67CD149943270F3535C6E868AEC14A2F01A1715C89800EB7E078756F05223BA4960ECA69F89438
25,560,542 UART: mbox::rt_entry...
25,561,513 UART: ____ _ _ _ ____ _____
25,563,451 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,565,469 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,567,405 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,569,370 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,571,306 UART: |_|
25,572,329 UART:
25,703,711 UART: [rt] Runtime listening for mailbox commands...
25,705,729 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,706,599 >>> mbox cmd response data (0 bytes)
290 writing to cptra_bootfsm_go
17,983,708 UART:
17,984,090 UART: Running Caliptra FMC ...
17,985,151 UART:
17,985,317 UART: [state] CFI Enabled
17,987,129 UART: [art] Skip pcr extension
17,988,255 UART: [art] Extend RT PCRs Done
17,989,410 UART: [art] Lock RT PCRs Done
17,990,484 UART: [art] Populate DV Done
17,996,058 UART: [fht] FMC Alias Private Key: 7
17,997,765 UART: [art] Derive CDI
17,998,581 UART: [art] Store in slot 0x4
18,041,114 UART: [art] Derive Key Pair
18,042,167 UART: [art] Store priv key in slot 0x5
20,469,539 UART: [art] Derive Key Pair - Done
20,482,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,188,890 UART: [art] Erasing AUTHORITY.KEYID = 7
22,190,395 UART: [art] PUB.X = 4C089EE207033DAE8AE9A9F8CBD110CA09D6979B01952DEFE09E803EA7D2F13BDCB45D8A06BADF54C797CCD601108285
22,197,726 UART: [art] PUB.Y = 3D227F50EC46D62C807BA5952110664BEE2C70141C456C2A37B549BC6AC1E9BB84861D45C951FCA39956B49B85CB32F7
22,204,930 UART: [art] SIG.R = C7A7FB2A562D4D168F956912DA429949EFCCE471CCE5353635C76AD8DE54CD90A2EAAD74096E71157EC8D69A80C8F8A4
22,212,326 UART: [art] SIG.S = 085859034556477FFF67CD149943270F3535C6E868AEC14A2F01A1715C89800EB7E078756F05223BA4960ECA69F89438
23,190,602 UART: mbox::rt_entry...
23,191,546 UART: ____ _ _ _ ____ _____
23,193,582 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,195,596 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,197,532 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,199,393 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,201,323 UART: |_|
23,202,136 UART:
23,568,158 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Production
85,803 UART: [state] DebugLocked = Yes
86,317 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,109 UART: [kat] SHA2-256
882,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,155 UART: [kat] ++
886,307 UART: [kat] sha1
890,551 UART: [kat] SHA2-256
892,489 UART: [kat] SHA2-384
895,300 UART: [kat] SHA2-512-ACC
897,201 UART: [kat] ECC-384
902,840 UART: [kat] HMAC-384Kdf
907,326 UART: [kat] LMS
1,475,522 UART: [kat] --
1,476,553 UART: [cold-reset] ++
1,477,132 UART: [fht] Storing FHT @ 0x50003400
1,479,973 UART: [idev] ++
1,480,141 UART: [idev] CDI.KEYID = 6
1,480,501 UART: [idev] SUBJECT.KEYID = 7
1,480,925 UART: [idev] UDS.KEYID = 0
1,481,270 ready_for_fw is high
1,481,270 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,584 UART: [idev] Erasing UDS.KEYID = 0
1,505,297 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,768 UART: [idev] --
1,514,857 UART: [ldev] ++
1,515,025 UART: [ldev] CDI.KEYID = 6
1,515,388 UART: [ldev] SUBJECT.KEYID = 5
1,515,814 UART: [ldev] AUTHORITY.KEYID = 7
1,516,277 UART: [ldev] FE.KEYID = 1
1,521,525 UART: [ldev] Erasing FE.KEYID = 1
1,546,460 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,169 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,863 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,735 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,441 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,485 UART: [ldev] --
1,585,890 UART: [fwproc] Waiting for Commands...
1,586,513 UART: [fwproc] Received command 0x46574c44
1,587,304 UART: [fwproc] Received Image of size 82832 bytes
2,547,405 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,574,006 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,605,224 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,691,980 >>> mbox cmd response: success
2,693,185 UART: [afmc] ++
2,693,353 UART: [afmc] CDI.KEYID = 6
2,693,715 UART: [afmc] SUBJECT.KEYID = 7
2,694,140 UART: [afmc] AUTHORITY.KEYID = 5
2,729,381 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,745,145 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,745,925 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,751,640 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,757,525 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
2,763,228 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
2,771,190 UART: [afmc] --
2,772,223 UART: [cold-reset] --
2,773,245 UART: [state] Locking Datavault
2,774,320 UART: [state] Locking PCR0, PCR1 and PCR31
2,774,924 UART: [state] Locking ICCM
2,775,544 UART: [exit] Launching FMC @ 0x40000130
2,780,874 UART:
2,780,890 UART: Running Caliptra FMC ...
2,781,298 UART:
2,781,352 UART: [state] CFI Enabled
2,792,064 UART: [fht] FMC Alias Private Key: 7
2,910,845 UART: [art] Extend RT PCRs Done
2,911,273 UART: [art] Lock RT PCRs Done
2,912,889 UART: [art] Populate DV Done
2,921,101 UART: [fht] FMC Alias Private Key: 7
2,922,113 UART: [art] Derive CDI
2,922,393 UART: [art] Store in slot 0x4
3,007,635 UART: [art] Derive Key Pair
3,007,995 UART: [art] Store priv key in slot 0x5
3,021,742 UART: [art] Derive Key Pair - Done
3,036,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,052,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,052,790 UART: [art] PUB.X = 3F9A12D529076B5E7CF0044A18FA2C5EB4C8DDEFC0A338298B66E42CFCAAB0F4F3FCBAD18FE23F7DDA202EA2D388FB8B
3,059,586 UART: [art] PUB.Y = D2DC7C0161F8D798BE2C52516671EDFC3DA6A5D6C3E4275353E2DB518FD48C76ABC201F24829398B138EF71BB95CE638
3,066,540 UART: [art] SIG.R = 078C6E9045BFFBA206D6B1C630A66438323B1D90F8D41DEA5AE1BABC7D35B14DD8A5366919328772EECFDD8312A529AA
3,073,318 UART: [art] SIG.S = BD10E5721DE76F1B7DC91104A2D156793C72639510C1BE32ECEECCE132CF50D33C3D06454E58F66ABC4405D1AB3CCD23
3,096,913 UART: mbox::rt_entry...
3,097,285 UART: ____ _ _ _ ____ _____
3,098,069 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,098,869 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,099,637 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,100,405 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,101,173 UART: |_|
3,101,485 UART:
3,219,321 UART: [rt] Runtime listening for mailbox commands...
3,220,083 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
3,220,204 >>> mbox cmd response data (0 bytes)
3,220,206 writing to cptra_bootfsm_go
3,220,301 UART:
3,220,317 UART: Running Caliptra ROM ...
3,220,725 UART:
3,220,779 UART: [state] CFI Enabled
3,223,224 UART: [state] LifecycleState = Production
3,223,832 UART: [state] DebugLocked = Yes
3,224,576 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,226,196 UART: [kat] SHA2-256
4,020,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,024,242 UART: [kat] ++
4,024,394 UART: [kat] sha1
4,028,818 UART: [kat] SHA2-256
4,030,756 UART: [kat] SHA2-384
4,033,493 UART: [kat] SHA2-512-ACC
4,035,394 UART: [kat] ECC-384
4,041,289 UART: [kat] HMAC-384Kdf
4,045,721 UART: [kat] LMS
4,613,917 UART: [kat] --
4,614,577 UART: [warm-reset] ++
4,615,326 UART: [warm-reset] --
4,616,191 UART: [state] Locking Datavault
4,617,139 UART: [state] Locking PCR0, PCR1 and PCR31
4,617,743 UART: [state] Locking ICCM
4,618,281 UART: [exit] Launching FMC @ 0x40000130
4,623,611 UART:
4,623,627 UART: Running Caliptra FMC ...
4,624,035 UART:
4,624,089 UART: [state] CFI Enabled
4,625,188 UART: [art] Skip pcr extension
4,625,597 UART: [art] Extend RT PCRs Done
4,626,025 UART: [art] Lock RT PCRs Done
4,627,442 UART: [art] Populate DV Done
4,635,646 UART: [fht] FMC Alias Private Key: 7
4,636,748 UART: [art] Derive CDI
4,637,028 UART: [art] Store in slot 0x4
4,722,506 UART: [art] Derive Key Pair
4,722,866 UART: [art] Store priv key in slot 0x5
4,735,461 UART: [art] Derive Key Pair - Done
4,750,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,765,542 UART: [art] Erasing AUTHORITY.KEYID = 7
4,766,307 UART: [art] PUB.X = 3F9A12D529076B5E7CF0044A18FA2C5EB4C8DDEFC0A338298B66E42CFCAAB0F4F3FCBAD18FE23F7DDA202EA2D388FB8B
4,773,103 UART: [art] PUB.Y = D2DC7C0161F8D798BE2C52516671EDFC3DA6A5D6C3E4275353E2DB518FD48C76ABC201F24829398B138EF71BB95CE638
4,780,057 UART: [art] SIG.R = 078C6E9045BFFBA206D6B1C630A66438323B1D90F8D41DEA5AE1BABC7D35B14DD8A5366919328772EECFDD8312A529AA
4,786,835 UART: [art] SIG.S = BD10E5721DE76F1B7DC91104A2D156793C72639510C1BE32ECEECCE132CF50D33C3D06454E58F66ABC4405D1AB3CCD23
4,811,040 UART: mbox::rt_entry...
4,811,412 UART: ____ _ _ _ ____ _____
4,812,196 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,812,996 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,813,764 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,814,532 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,815,300 UART: |_|
4,815,612 UART:
5,178,550 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,704 ready_for_fw is high
1,362,704 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,544,542 >>> mbox cmd response: success
2,606,232 UART:
2,606,248 UART: Running Caliptra FMC ...
2,606,656 UART:
2,606,710 UART: [state] CFI Enabled
2,617,354 UART: [fht] FMC Alias Private Key: 7
2,736,415 UART: [art] Extend RT PCRs Done
2,736,843 UART: [art] Lock RT PCRs Done
2,738,233 UART: [art] Populate DV Done
2,746,335 UART: [fht] FMC Alias Private Key: 7
2,747,365 UART: [art] Derive CDI
2,747,645 UART: [art] Store in slot 0x4
2,833,229 UART: [art] Derive Key Pair
2,833,589 UART: [art] Store priv key in slot 0x5
2,846,958 UART: [art] Derive Key Pair - Done
2,861,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,877,152 UART: [art] Erasing AUTHORITY.KEYID = 7
2,877,917 UART: [art] PUB.X = 42522E0A2B2802C623AA50BB830AB4AC48137973500E1EE77CA312B9A913B7E4DC871CCB0F084C6208E0452E1DDF7BF4
2,884,674 UART: [art] PUB.Y = B5FA583210D1A1DB00CA0541BCDBDACECF8D7D58CEF8688F508F37CF511109A68307F3FDFAFE962271400D70FC9AF212
2,891,610 UART: [art] SIG.R = CF6ACDE636FAE05DBC8FA4814F1C6D9410FED0DA05F033D1FC88BC58A469869D4080DF5EC6A007084C06567DA6D2D9C6
2,898,388 UART: [art] SIG.S = 96A659AE440F232688F58EE185BCEF39EE72B682E68C4694BECC95DBC924FD19AA9551851BC01655F0AE607670FFBBFA
2,921,995 UART: mbox::rt_entry...
2,922,367 UART: ____ _ _ _ ____ _____
2,923,151 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,923,951 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,924,719 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,925,487 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,926,255 UART: |_|
2,926,567 UART:
3,045,100 UART: [rt] Runtime listening for mailbox commands...
3,045,862 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
3,045,983 >>> mbox cmd response data (0 bytes)
3,045,985 writing to cptra_bootfsm_go
4,331,144 UART:
4,331,160 UART: Running Caliptra FMC ...
4,331,568 UART:
4,331,622 UART: [state] CFI Enabled
4,332,829 UART: [art] Skip pcr extension
4,333,238 UART: [art] Extend RT PCRs Done
4,333,666 UART: [art] Lock RT PCRs Done
4,334,701 UART: [art] Populate DV Done
4,343,131 UART: [fht] FMC Alias Private Key: 7
4,344,199 UART: [art] Derive CDI
4,344,479 UART: [art] Store in slot 0x4
4,429,969 UART: [art] Derive Key Pair
4,430,329 UART: [art] Store priv key in slot 0x5
4,443,946 UART: [art] Derive Key Pair - Done
4,458,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,474,672 UART: [art] Erasing AUTHORITY.KEYID = 7
4,475,437 UART: [art] PUB.X = 42522E0A2B2802C623AA50BB830AB4AC48137973500E1EE77CA312B9A913B7E4DC871CCB0F084C6208E0452E1DDF7BF4
4,482,194 UART: [art] PUB.Y = B5FA583210D1A1DB00CA0541BCDBDACECF8D7D58CEF8688F508F37CF511109A68307F3FDFAFE962271400D70FC9AF212
4,489,130 UART: [art] SIG.R = CF6ACDE636FAE05DBC8FA4814F1C6D9410FED0DA05F033D1FC88BC58A469869D4080DF5EC6A007084C06567DA6D2D9C6
4,495,908 UART: [art] SIG.S = 96A659AE440F232688F58EE185BCEF39EE72B682E68C4694BECC95DBC924FD19AA9551851BC01655F0AE607670FFBBFA
4,519,541 UART: mbox::rt_entry...
4,519,913 UART: ____ _ _ _ ____ _____
4,520,697 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,521,497 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,522,265 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,523,033 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,523,801 UART: |_|
4,524,113 UART:
4,887,212 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Production
85,672 UART: [state] DebugLocked = Yes
86,360 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,132 UART: [kat] SHA2-256
882,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,178 UART: [kat] ++
886,330 UART: [kat] sha1
890,490 UART: [kat] SHA2-256
892,428 UART: [kat] SHA2-384
895,241 UART: [kat] SHA2-512-ACC
897,142 UART: [kat] ECC-384
902,679 UART: [kat] HMAC-384Kdf
907,345 UART: [kat] LMS
1,475,541 UART: [kat] --
1,476,630 UART: [cold-reset] ++
1,477,115 UART: [fht] Storing FHT @ 0x50003400
1,479,882 UART: [idev] ++
1,480,050 UART: [idev] CDI.KEYID = 6
1,480,410 UART: [idev] SUBJECT.KEYID = 7
1,480,834 UART: [idev] UDS.KEYID = 0
1,481,179 ready_for_fw is high
1,481,179 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,919 UART: [idev] Erasing UDS.KEYID = 0
1,505,522 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,127 UART: [idev] --
1,515,188 UART: [ldev] ++
1,515,356 UART: [ldev] CDI.KEYID = 6
1,515,719 UART: [ldev] SUBJECT.KEYID = 5
1,516,145 UART: [ldev] AUTHORITY.KEYID = 7
1,516,608 UART: [ldev] FE.KEYID = 1
1,521,850 UART: [ldev] Erasing FE.KEYID = 1
1,547,569 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,446 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,140 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,012 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,718 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,740 UART: [ldev] --
1,587,227 UART: [fwproc] Waiting for Commands...
1,587,868 UART: [fwproc] Received command 0x46574c44
1,588,659 UART: [fwproc] Received Image of size 82832 bytes
2,548,672 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,575,835 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,607,053 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,693,839 >>> mbox cmd response: success
2,695,092 UART: [afmc] ++
2,695,260 UART: [afmc] CDI.KEYID = 6
2,695,622 UART: [afmc] SUBJECT.KEYID = 7
2,696,047 UART: [afmc] AUTHORITY.KEYID = 5
2,730,586 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,746,776 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,747,556 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,753,271 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,759,156 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
2,764,859 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
2,772,727 UART: [afmc] --
2,773,802 UART: [cold-reset] --
2,774,538 UART: [state] Locking Datavault
2,775,919 UART: [state] Locking PCR0, PCR1 and PCR31
2,776,523 UART: [state] Locking ICCM
2,777,177 UART: [exit] Launching FMC @ 0x40000130
2,782,507 UART:
2,782,523 UART: Running Caliptra FMC ...
2,782,931 UART:
2,783,074 UART: [state] CFI Enabled
2,793,848 UART: [fht] FMC Alias Private Key: 7
2,911,983 UART: [art] Extend RT PCRs Done
2,912,411 UART: [art] Lock RT PCRs Done
2,914,039 UART: [art] Populate DV Done
2,922,029 UART: [fht] FMC Alias Private Key: 7
2,923,099 UART: [art] Derive CDI
2,923,379 UART: [art] Store in slot 0x4
3,009,075 UART: [art] Derive Key Pair
3,009,435 UART: [art] Store priv key in slot 0x5
3,022,736 UART: [art] Derive Key Pair - Done
3,037,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,052,733 UART: [art] Erasing AUTHORITY.KEYID = 7
3,053,498 UART: [art] PUB.X = 0BF541C0FEF154A2B19CA04185AEFA209BE8BEE328D0CBDDE0C086EEE2142D65551FA62E50F10C746145B38F7AFB8FF6
3,060,284 UART: [art] PUB.Y = 992B6589E8851AC1BAAE32910719CF12A32D508337DF7BA81564CC5C35535D783362BF5BDFFA6A1A7059071EA88D7AFE
3,067,236 UART: [art] SIG.R = C7052E879677E00273AF1C9756DF268AD8F9AEF7F02E1054A878F94075E1517E00528E40BCD69DDDA155E79A81EE994D
3,073,982 UART: [art] SIG.S = DA909A60E7F15D4AD502C37D9583E8D7D4E2126CE800BAB07730CA73395F7C0C16401F717729B51DBBA1CF48E94C4BBE
3,098,120 UART: mbox::rt_entry...
3,098,492 UART: ____ _ _ _ ____ _____
3,099,276 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,100,076 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,100,844 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,101,612 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,102,380 UART: |_|
3,102,692 UART:
3,221,399 UART: [rt] Runtime listening for mailbox commands...
3,222,161 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
3,222,282 >>> mbox cmd response data (0 bytes)
3,222,284 writing to cptra_bootfsm_go
3,222,379 UART:
3,222,395 UART: Running Caliptra ROM ...
3,222,803 UART:
3,222,944 UART: [state] CFI Enabled
3,225,551 UART: [state] LifecycleState = Production
3,226,159 UART: [state] DebugLocked = Yes
3,226,731 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,228,455 UART: [kat] SHA2-256
4,022,386 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,026,501 UART: [kat] ++
4,026,653 UART: [kat] sha1
4,030,731 UART: [kat] SHA2-256
4,032,669 UART: [kat] SHA2-384
4,035,412 UART: [kat] SHA2-512-ACC
4,037,313 UART: [kat] ECC-384
4,042,864 UART: [kat] HMAC-384Kdf
4,047,492 UART: [kat] LMS
4,615,688 UART: [kat] --
4,616,774 UART: [warm-reset] ++
4,618,013 UART: [warm-reset] --
4,618,836 UART: [state] Locking Datavault
4,619,658 UART: [state] Locking PCR0, PCR1 and PCR31
4,620,262 UART: [state] Locking ICCM
4,620,876 UART: [exit] Launching FMC @ 0x40000130
4,626,206 UART:
4,626,222 UART: Running Caliptra FMC ...
4,626,630 UART:
4,626,773 UART: [state] CFI Enabled
4,628,094 UART: [art] Skip pcr extension
4,628,503 UART: [art] Extend RT PCRs Done
4,628,931 UART: [art] Lock RT PCRs Done
4,630,382 UART: [art] Populate DV Done
4,638,394 UART: [fht] FMC Alias Private Key: 7
4,639,522 UART: [art] Derive CDI
4,639,802 UART: [art] Store in slot 0x4
4,725,484 UART: [art] Derive Key Pair
4,725,844 UART: [art] Store priv key in slot 0x5
4,739,075 UART: [art] Derive Key Pair - Done
4,753,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,769,572 UART: [art] Erasing AUTHORITY.KEYID = 7
4,770,337 UART: [art] PUB.X = 0BF541C0FEF154A2B19CA04185AEFA209BE8BEE328D0CBDDE0C086EEE2142D65551FA62E50F10C746145B38F7AFB8FF6
4,777,123 UART: [art] PUB.Y = 992B6589E8851AC1BAAE32910719CF12A32D508337DF7BA81564CC5C35535D783362BF5BDFFA6A1A7059071EA88D7AFE
4,784,075 UART: [art] SIG.R = C7052E879677E00273AF1C9756DF268AD8F9AEF7F02E1054A878F94075E1517E00528E40BCD69DDDA155E79A81EE994D
4,790,821 UART: [art] SIG.S = DA909A60E7F15D4AD502C37D9583E8D7D4E2126CE800BAB07730CA73395F7C0C16401F717729B51DBBA1CF48E94C4BBE
4,814,927 UART: mbox::rt_entry...
4,815,299 UART: ____ _ _ _ ____ _____
4,816,083 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,816,883 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,817,651 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,818,419 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,819,187 UART: |_|
4,819,499 UART:
5,182,656 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,705 ready_for_fw is high
1,363,705 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,544,417 >>> mbox cmd response: success
2,605,929 UART:
2,605,945 UART: Running Caliptra FMC ...
2,606,353 UART:
2,606,496 UART: [state] CFI Enabled
2,616,846 UART: [fht] FMC Alias Private Key: 7
2,735,273 UART: [art] Extend RT PCRs Done
2,735,701 UART: [art] Lock RT PCRs Done
2,737,277 UART: [art] Populate DV Done
2,745,605 UART: [fht] FMC Alias Private Key: 7
2,746,611 UART: [art] Derive CDI
2,746,891 UART: [art] Store in slot 0x4
2,833,045 UART: [art] Derive Key Pair
2,833,405 UART: [art] Store priv key in slot 0x5
2,846,832 UART: [art] Derive Key Pair - Done
2,861,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,876,566 UART: [art] Erasing AUTHORITY.KEYID = 7
2,877,331 UART: [art] PUB.X = FC98302E146B4D40FD191658DA8142EE349F06B4F5C85630836234187CA09B5917AFAED18CB63063BC93580D5BC98914
2,884,093 UART: [art] PUB.Y = 6B3B0EF46415B7F41B1DFEC787A32CBA573F1B4997EA1110132EDFCDEC323DB000BC9C4F81330F525E4D9CBA7C5DCA2A
2,891,039 UART: [art] SIG.R = 9B9CC3DD2FADF1028DF2881E54CAA6ADD461D44D82CBEADEA49ACFD069B7B2FE3E42CAA1EFDC78E1671EE5B52F3BD162
2,897,844 UART: [art] SIG.S = 866337C30BD4C51AC778C49BCB14784CC3089C96FC244535AB6FA7528E25825E6DB0A38CE4AA2D5A0FF062A4F94DC081
2,921,433 UART: mbox::rt_entry...
2,921,805 UART: ____ _ _ _ ____ _____
2,922,589 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,923,389 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,924,157 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,924,925 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,925,693 UART: |_|
2,926,005 UART:
3,043,906 UART: [rt] Runtime listening for mailbox commands...
3,044,668 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
3,044,789 >>> mbox cmd response data (0 bytes)
3,044,791 writing to cptra_bootfsm_go
4,330,057 UART:
4,330,073 UART: Running Caliptra FMC ...
4,330,481 UART:
4,330,624 UART: [state] CFI Enabled
4,332,229 UART: [art] Skip pcr extension
4,332,638 UART: [art] Extend RT PCRs Done
4,333,066 UART: [art] Lock RT PCRs Done
4,334,237 UART: [art] Populate DV Done
4,342,459 UART: [fht] FMC Alias Private Key: 7
4,343,639 UART: [art] Derive CDI
4,343,919 UART: [art] Store in slot 0x4
4,429,433 UART: [art] Derive Key Pair
4,429,793 UART: [art] Store priv key in slot 0x5
4,443,254 UART: [art] Derive Key Pair - Done
4,458,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,473,410 UART: [art] Erasing AUTHORITY.KEYID = 7
4,474,175 UART: [art] PUB.X = FC98302E146B4D40FD191658DA8142EE349F06B4F5C85630836234187CA09B5917AFAED18CB63063BC93580D5BC98914
4,480,937 UART: [art] PUB.Y = 6B3B0EF46415B7F41B1DFEC787A32CBA573F1B4997EA1110132EDFCDEC323DB000BC9C4F81330F525E4D9CBA7C5DCA2A
4,487,883 UART: [art] SIG.R = 9B9CC3DD2FADF1028DF2881E54CAA6ADD461D44D82CBEADEA49ACFD069B7B2FE3E42CAA1EFDC78E1671EE5B52F3BD162
4,494,688 UART: [art] SIG.S = 866337C30BD4C51AC778C49BCB14784CC3089C96FC244535AB6FA7528E25825E6DB0A38CE4AA2D5A0FF062A4F94DC081
4,518,145 UART: mbox::rt_entry...
4,518,517 UART: ____ _ _ _ ____ _____
4,519,301 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,520,101 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,520,869 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,521,637 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,522,405 UART: |_|
4,522,717 UART:
4,887,466 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,897 UART: [state] LifecycleState = Production
85,505 UART: [state] DebugLocked = Yes
86,189 UART: [state] Starting the WD Timer 40000000 cycles
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,888 UART: [kat] SHA2-256
901,828 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
915,685 UART: [kat] HMAC-384Kdf
920,419 UART: [kat] LMS
1,168,731 UART: [kat] --
1,169,722 UART: [cold-reset] ++
1,170,267 UART: [fht] FHT @ 0x50003400
1,172,847 UART: [idev] ++
1,173,015 UART: [idev] CDI.KEYID = 6
1,173,376 UART: [idev] SUBJECT.KEYID = 7
1,173,801 UART: [idev] UDS.KEYID = 0
1,174,147 ready_for_fw is high
1,174,147 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,858 UART: [idev] Sha1 KeyId Algorithm
1,207,733 UART: [idev] --
1,208,710 UART: [ldev] ++
1,208,878 UART: [ldev] CDI.KEYID = 6
1,209,242 UART: [ldev] SUBJECT.KEYID = 5
1,209,669 UART: [ldev] AUTHORITY.KEYID = 7
1,210,132 UART: [ldev] FE.KEYID = 1
1,215,546 UART: [ldev] Erasing FE.KEYID = 1
1,241,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,563 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,257 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,127 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,833 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,811 UART: [ldev] --
1,281,012 UART: [fwproc] Wait for Commands...
1,281,771 UART: [fwproc] Recv command 0x46574c44
1,282,504 UART: [fwproc] Recv'd Img size: 82832 bytes
2,243,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,270,028 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,301,203 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,388,025 >>> mbox cmd response: success
2,389,146 UART: [afmc] ++
2,389,314 UART: [afmc] CDI.KEYID = 6
2,389,677 UART: [afmc] SUBJECT.KEYID = 7
2,390,103 UART: [afmc] AUTHORITY.KEYID = 5
2,425,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,441,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,442,440 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,448,156 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,454,039 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,459,744 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,467,378 UART: [afmc] --
2,468,302 UART: [cold-reset] --
2,469,110 UART: [state] Locking Datavault
2,470,371 UART: [state] Locking PCR0, PCR1 and PCR31
2,470,975 UART: [state] Locking ICCM
2,471,639 UART: [exit] Launching FMC @ 0x40000130
2,476,969 UART:
2,476,985 UART: Running Caliptra FMC ...
2,477,393 UART:
2,477,447 UART: [state] CFI Enabled
2,487,991 UART: [fht] FMC Alias Private Key: 7
2,606,724 UART: [art] Extend RT PCRs Done
2,607,152 UART: [art] Lock RT PCRs Done
2,608,732 UART: [art] Populate DV Done
2,616,920 UART: [fht] FMC Alias Private Key: 7
2,618,040 UART: [art] Derive CDI
2,618,320 UART: [art] Store in slot 0x4
2,703,939 UART: [art] Derive Key Pair
2,704,299 UART: [art] Store priv key in slot 0x5
2,717,595 UART: [art] Derive Key Pair - Done
2,732,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,748,310 UART: [art] Erasing AUTHORITY.KEYID = 7
2,749,075 UART: [art] PUB.X = 7DFB64EC893D1A2F6F58F5D394F6F7CAE58EF1A64519AA19DEEDAF651EC8DF83756704E5128FCE48B06BA9804B4E7AA1
2,755,864 UART: [art] PUB.Y = DFC4E88A4E339CADE85D164B1139C933196391EE5D1C87B3036F69C055D1074279FB345EE55BEE60B3F7DE31D49D720A
2,762,813 UART: [art] SIG.R = D892DEA796592E39EB5844FAB46C9412348D67016813A0A69CD2C620D67DBCAE3DA842DA024BE109CE3A536A377157B1
2,769,580 UART: [art] SIG.S = E317B91259ABA691990D4902A7141DC77D6C1CD0B6D361F39C40DDA5AAE952A74957F21202C45442D51DF7E7226A5C3A
2,793,351 UART: mbox::rt_entry...
2,793,723 UART: ____ _ _ _ ____ _____
2,794,507 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,795,307 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,796,075 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,796,843 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,797,611 UART: |_|
2,797,923 UART:
2,916,828 UART: [rt] Runtime listening for mailbox commands...
2,917,590 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,917,711 >>> mbox cmd response data (0 bytes)
2,917,713 writing to cptra_bootfsm_go
2,917,805 UART:
2,917,821 UART: Running Caliptra ROM ...
2,918,229 UART:
2,918,284 UART: [state] CFI Enabled
2,921,153 UART: [state] LifecycleState = Production
2,921,761 UART: [state] DebugLocked = Yes
2,922,443 UART: [state] Starting the WD Timer 40000000 cycles
2,924,082 UART: [kat] SHA2-256
3,727,632 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,731,736 UART: [kat] ++
3,731,888 UART: [kat] sha1
3,736,206 UART: [kat] SHA2-256
3,738,146 UART: [kat] SHA2-384
3,740,813 UART: [kat] SHA2-512-ACC
3,742,714 UART: [kat] ECC-384
3,752,389 UART: [kat] HMAC-384Kdf
3,757,043 UART: [kat] LMS
4,005,355 UART: [kat] --
4,006,145 UART: [warm-reset] ++
4,006,936 UART: [warm-reset] --
4,007,717 UART: [state] Locking Datavault
4,008,407 UART: [state] Locking PCR0, PCR1 and PCR31
4,009,011 UART: [state] Locking ICCM
4,009,589 UART: [exit] Launching FMC @ 0x40000130
4,014,919 UART:
4,014,935 UART: Running Caliptra FMC ...
4,015,343 UART:
4,015,397 UART: [state] CFI Enabled
4,016,676 UART: [art] Skip pcr extension
4,017,085 UART: [art] Extend RT PCRs Done
4,017,513 UART: [art] Lock RT PCRs Done
4,018,686 UART: [art] Populate DV Done
4,026,934 UART: [fht] FMC Alias Private Key: 7
4,027,930 UART: [art] Derive CDI
4,028,210 UART: [art] Store in slot 0x4
4,113,733 UART: [art] Derive Key Pair
4,114,093 UART: [art] Store priv key in slot 0x5
4,127,881 UART: [art] Derive Key Pair - Done
4,142,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,157,842 UART: [art] Erasing AUTHORITY.KEYID = 7
4,158,607 UART: [art] PUB.X = 7DFB64EC893D1A2F6F58F5D394F6F7CAE58EF1A64519AA19DEEDAF651EC8DF83756704E5128FCE48B06BA9804B4E7AA1
4,165,396 UART: [art] PUB.Y = DFC4E88A4E339CADE85D164B1139C933196391EE5D1C87B3036F69C055D1074279FB345EE55BEE60B3F7DE31D49D720A
4,172,345 UART: [art] SIG.R = D892DEA796592E39EB5844FAB46C9412348D67016813A0A69CD2C620D67DBCAE3DA842DA024BE109CE3A536A377157B1
4,179,112 UART: [art] SIG.S = E317B91259ABA691990D4902A7141DC77D6C1CD0B6D361F39C40DDA5AAE952A74957F21202C45442D51DF7E7226A5C3A
4,202,825 UART: mbox::rt_entry...
4,203,197 UART: ____ _ _ _ ____ _____
4,203,981 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,204,781 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,205,549 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,206,317 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,207,085 UART: |_|
4,207,397 UART:
4,574,992 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,633 ready_for_fw is high
1,058,633 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,238,288 >>> mbox cmd response: success
2,301,335 UART:
2,301,351 UART: Running Caliptra FMC ...
2,301,759 UART:
2,301,813 UART: [state] CFI Enabled
2,312,007 UART: [fht] FMC Alias Private Key: 7
2,430,698 UART: [art] Extend RT PCRs Done
2,431,126 UART: [art] Lock RT PCRs Done
2,432,498 UART: [art] Populate DV Done
2,440,848 UART: [fht] FMC Alias Private Key: 7
2,441,922 UART: [art] Derive CDI
2,442,202 UART: [art] Store in slot 0x4
2,528,179 UART: [art] Derive Key Pair
2,528,539 UART: [art] Store priv key in slot 0x5
2,541,723 UART: [art] Derive Key Pair - Done
2,556,341 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,571,828 UART: [art] Erasing AUTHORITY.KEYID = 7
2,572,593 UART: [art] PUB.X = C135F9C47B96CD002858CA0B36A58CF2C2B75B19B84036BC199760B162988F4E747C20F3E3566E3675D5C5AD8C4A84E0
2,579,340 UART: [art] PUB.Y = 71704AD29B6E8AB29069559F5081585893259D10E394CC9C44009085D717AB904CA285BF88DBE7632B59EA033A94538A
2,586,257 UART: [art] SIG.R = 497D67C261C85A7E29F0A5501A7F9F802016D345AC492364CD7D61D74C7F3D673AB30771850C2BCEA9661736F56D3314
2,593,017 UART: [art] SIG.S = BC9269BCF5BB6F344339332C0E63357AB6C94C645ECE577087FBFA0E5AFC0F29FD65581F1A8FB791B21502BFC0A6C01D
2,616,121 UART: mbox::rt_entry...
2,616,493 UART: ____ _ _ _ ____ _____
2,617,277 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,618,077 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,618,845 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,619,613 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,620,381 UART: |_|
2,620,693 UART:
2,739,332 UART: [rt] Runtime listening for mailbox commands...
2,740,094 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,740,215 >>> mbox cmd response data (0 bytes)
2,740,217 writing to cptra_bootfsm_go
3,721,030 UART:
3,721,046 UART: Running Caliptra FMC ...
3,721,454 UART:
3,721,508 UART: [state] CFI Enabled
3,722,711 UART: [art] Skip pcr extension
3,723,120 UART: [art] Extend RT PCRs Done
3,723,548 UART: [art] Lock RT PCRs Done
3,724,563 UART: [art] Populate DV Done
3,732,447 UART: [fht] FMC Alias Private Key: 7
3,733,529 UART: [art] Derive CDI
3,733,809 UART: [art] Store in slot 0x4
3,819,658 UART: [art] Derive Key Pair
3,820,018 UART: [art] Store priv key in slot 0x5
3,832,904 UART: [art] Derive Key Pair - Done
3,847,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,863,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,863,928 UART: [art] PUB.X = C135F9C47B96CD002858CA0B36A58CF2C2B75B19B84036BC199760B162988F4E747C20F3E3566E3675D5C5AD8C4A84E0
3,870,675 UART: [art] PUB.Y = 71704AD29B6E8AB29069559F5081585893259D10E394CC9C44009085D717AB904CA285BF88DBE7632B59EA033A94538A
3,877,592 UART: [art] SIG.R = 497D67C261C85A7E29F0A5501A7F9F802016D345AC492364CD7D61D74C7F3D673AB30771850C2BCEA9661736F56D3314
3,884,352 UART: [art] SIG.S = BC9269BCF5BB6F344339332C0E63357AB6C94C645ECE577087FBFA0E5AFC0F29FD65581F1A8FB791B21502BFC0A6C01D
3,908,194 UART: mbox::rt_entry...
3,908,566 UART: ____ _ _ _ ____ _____
3,909,350 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,910,150 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,910,918 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,911,686 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,912,454 UART: |_|
3,912,766 UART:
4,277,303 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Production
85,950 UART: [state] DebugLocked = Yes
86,582 UART: [state] Starting the WD Timer 40000000 cycles
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,801 UART: [kat] ++
895,953 UART: [kat] sha1
900,305 UART: [kat] SHA2-256
902,245 UART: [kat] SHA2-384
904,896 UART: [kat] SHA2-512-ACC
906,797 UART: [kat] ECC-384
916,214 UART: [kat] HMAC-384Kdf
920,966 UART: [kat] LMS
1,169,278 UART: [kat] --
1,170,363 UART: [cold-reset] ++
1,170,782 UART: [fht] FHT @ 0x50003400
1,173,528 UART: [idev] ++
1,173,696 UART: [idev] CDI.KEYID = 6
1,174,057 UART: [idev] SUBJECT.KEYID = 7
1,174,482 UART: [idev] UDS.KEYID = 0
1,174,828 ready_for_fw is high
1,174,828 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,548 UART: [idev] Erasing UDS.KEYID = 0
1,199,829 UART: [idev] Sha1 KeyId Algorithm
1,208,784 UART: [idev] --
1,209,853 UART: [ldev] ++
1,210,021 UART: [ldev] CDI.KEYID = 6
1,210,385 UART: [ldev] SUBJECT.KEYID = 5
1,210,812 UART: [ldev] AUTHORITY.KEYID = 7
1,211,275 UART: [ldev] FE.KEYID = 1
1,216,743 UART: [ldev] Erasing FE.KEYID = 1
1,243,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,824 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,518 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,388 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,094 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,998 UART: [ldev] --
1,282,423 UART: [fwproc] Wait for Commands...
1,283,232 UART: [fwproc] Recv command 0x46574c44
1,283,965 UART: [fwproc] Recv'd Img size: 82832 bytes
2,244,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,271,401 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,302,576 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,389,286 >>> mbox cmd response: success
2,390,345 UART: [afmc] ++
2,390,513 UART: [afmc] CDI.KEYID = 6
2,390,876 UART: [afmc] SUBJECT.KEYID = 7
2,391,302 UART: [afmc] AUTHORITY.KEYID = 5
2,427,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,443,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,444,083 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,449,799 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,455,682 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,461,387 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,469,153 UART: [afmc] --
2,470,083 UART: [cold-reset] --
2,470,851 UART: [state] Locking Datavault
2,471,842 UART: [state] Locking PCR0, PCR1 and PCR31
2,472,446 UART: [state] Locking ICCM
2,472,972 UART: [exit] Launching FMC @ 0x40000130
2,478,302 UART:
2,478,318 UART: Running Caliptra FMC ...
2,478,726 UART:
2,478,869 UART: [state] CFI Enabled
2,489,159 UART: [fht] FMC Alias Private Key: 7
2,607,454 UART: [art] Extend RT PCRs Done
2,607,882 UART: [art] Lock RT PCRs Done
2,609,396 UART: [art] Populate DV Done
2,617,390 UART: [fht] FMC Alias Private Key: 7
2,618,366 UART: [art] Derive CDI
2,618,646 UART: [art] Store in slot 0x4
2,704,631 UART: [art] Derive Key Pair
2,704,991 UART: [art] Store priv key in slot 0x5
2,718,559 UART: [art] Derive Key Pair - Done
2,733,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,749,054 UART: [art] Erasing AUTHORITY.KEYID = 7
2,749,819 UART: [art] PUB.X = 4BB62CF1EE266FA6342FBF4227ECC07E804B89BD59AF69C3C4C754017C67715ECCDD65A672702C447D4C1359B0B6D067
2,756,596 UART: [art] PUB.Y = AC68D7C836F7ED3753C3441C1A7DFC460CC24BC5A102BD720274EE9FC743DA53E1603A187387A6205BFEE303524C0F25
2,763,539 UART: [art] SIG.R = 1E1E2E6436072FABD514984B37D10863ED66889BA74A1403847F2CD417828EE21E6F917C5E22EE9FC6697EBF1DF1CDAF
2,770,310 UART: [art] SIG.S = 5F76A1581133579575008EC9CB0E5040403212AB25CEF9E7FF4FBDE3BF3B2A661EF66C1636624C07A418E98AA7FCBD30
2,793,536 UART: mbox::rt_entry...
2,793,908 UART: ____ _ _ _ ____ _____
2,794,692 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,795,492 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,796,260 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,797,028 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,797,796 UART: |_|
2,798,108 UART:
2,915,980 UART: [rt] Runtime listening for mailbox commands...
2,916,742 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,916,863 >>> mbox cmd response data (0 bytes)
2,916,865 writing to cptra_bootfsm_go
2,916,957 UART:
2,916,973 UART: Running Caliptra ROM ...
2,917,381 UART:
2,917,523 UART: [state] CFI Enabled
2,919,856 UART: [state] LifecycleState = Production
2,920,464 UART: [state] DebugLocked = Yes
2,920,978 UART: [state] Starting the WD Timer 40000000 cycles
2,922,555 UART: [kat] SHA2-256
3,726,105 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,730,209 UART: [kat] ++
3,730,361 UART: [kat] sha1
3,734,547 UART: [kat] SHA2-256
3,736,487 UART: [kat] SHA2-384
3,739,134 UART: [kat] SHA2-512-ACC
3,741,035 UART: [kat] ECC-384
3,750,512 UART: [kat] HMAC-384Kdf
3,754,986 UART: [kat] LMS
4,003,298 UART: [kat] --
4,004,346 UART: [warm-reset] ++
4,005,325 UART: [warm-reset] --
4,006,258 UART: [state] Locking Datavault
4,007,092 UART: [state] Locking PCR0, PCR1 and PCR31
4,007,696 UART: [state] Locking ICCM
4,008,236 UART: [exit] Launching FMC @ 0x40000130
4,013,566 UART:
4,013,582 UART: Running Caliptra FMC ...
4,013,990 UART:
4,014,133 UART: [state] CFI Enabled
4,015,838 UART: [art] Skip pcr extension
4,016,247 UART: [art] Extend RT PCRs Done
4,016,675 UART: [art] Lock RT PCRs Done
4,017,870 UART: [art] Populate DV Done
4,026,280 UART: [fht] FMC Alias Private Key: 7
4,027,232 UART: [art] Derive CDI
4,027,512 UART: [art] Store in slot 0x4
4,113,257 UART: [art] Derive Key Pair
4,113,617 UART: [art] Store priv key in slot 0x5
4,127,061 UART: [art] Derive Key Pair - Done
4,141,897 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,157,526 UART: [art] Erasing AUTHORITY.KEYID = 7
4,158,291 UART: [art] PUB.X = 4BB62CF1EE266FA6342FBF4227ECC07E804B89BD59AF69C3C4C754017C67715ECCDD65A672702C447D4C1359B0B6D067
4,165,068 UART: [art] PUB.Y = AC68D7C836F7ED3753C3441C1A7DFC460CC24BC5A102BD720274EE9FC743DA53E1603A187387A6205BFEE303524C0F25
4,172,011 UART: [art] SIG.R = 1E1E2E6436072FABD514984B37D10863ED66889BA74A1403847F2CD417828EE21E6F917C5E22EE9FC6697EBF1DF1CDAF
4,178,782 UART: [art] SIG.S = 5F76A1581133579575008EC9CB0E5040403212AB25CEF9E7FF4FBDE3BF3B2A661EF66C1636624C07A418E98AA7FCBD30
4,202,254 UART: mbox::rt_entry...
4,202,626 UART: ____ _ _ _ ____ _____
4,203,410 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,204,210 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,204,978 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,205,746 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,206,514 UART: |_|
4,206,826 UART:
4,572,072 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,516 ready_for_fw is high
1,059,516 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,241,765 >>> mbox cmd response: success
2,303,610 UART:
2,303,626 UART: Running Caliptra FMC ...
2,304,034 UART:
2,304,177 UART: [state] CFI Enabled
2,314,853 UART: [fht] FMC Alias Private Key: 7
2,433,592 UART: [art] Extend RT PCRs Done
2,434,020 UART: [art] Lock RT PCRs Done
2,435,536 UART: [art] Populate DV Done
2,443,790 UART: [fht] FMC Alias Private Key: 7
2,444,830 UART: [art] Derive CDI
2,445,110 UART: [art] Store in slot 0x4
2,531,373 UART: [art] Derive Key Pair
2,531,733 UART: [art] Store priv key in slot 0x5
2,545,157 UART: [art] Derive Key Pair - Done
2,559,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,575,097 UART: [art] Erasing AUTHORITY.KEYID = 7
2,575,862 UART: [art] PUB.X = 36C8B6C809B69E0CBF4E95954FA0B26017A846229EABA99C99097E0AAB27BBDDCDB489FBDA190413216FDB715D4E0F8C
2,582,632 UART: [art] PUB.Y = 7BBB653CE3D34C7C2F23D615CA9C44EB05DC3018E4A9AC18791DEED58599DC6480B68A5E14B132ED8B2AA4AC66235C19
2,589,595 UART: [art] SIG.R = EF39030DD99FFB3E55F2501EE19C0DED34B3E9F3EAB086B1C2B0A1EB2D4D0D2EE0808803AB5B3377943DDF79C6B19636
2,596,368 UART: [art] SIG.S = 1C7157DBC9D813FA1B76CB38F59E6F70EBFDCD0A464F8E16BE7BCCA9013D68A9DFD317B5D5AEDF35E7DBEADF9264B6A9
2,620,144 UART: mbox::rt_entry...
2,620,516 UART: ____ _ _ _ ____ _____
2,621,300 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,622,100 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,622,868 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,623,636 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,624,404 UART: |_|
2,624,716 UART:
2,743,347 UART: [rt] Runtime listening for mailbox commands...
2,744,109 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,744,230 >>> mbox cmd response data (0 bytes)
2,744,232 writing to cptra_bootfsm_go
3,726,318 UART:
3,726,334 UART: Running Caliptra FMC ...
3,726,742 UART:
3,726,885 UART: [state] CFI Enabled
3,728,066 UART: [art] Skip pcr extension
3,728,475 UART: [art] Extend RT PCRs Done
3,728,903 UART: [art] Lock RT PCRs Done
3,730,160 UART: [art] Populate DV Done
3,738,356 UART: [fht] FMC Alias Private Key: 7
3,739,470 UART: [art] Derive CDI
3,739,750 UART: [art] Store in slot 0x4
3,825,677 UART: [art] Derive Key Pair
3,826,037 UART: [art] Store priv key in slot 0x5
3,839,513 UART: [art] Derive Key Pair - Done
3,854,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,869,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,869,820 UART: [art] PUB.X = 36C8B6C809B69E0CBF4E95954FA0B26017A846229EABA99C99097E0AAB27BBDDCDB489FBDA190413216FDB715D4E0F8C
3,876,590 UART: [art] PUB.Y = 7BBB653CE3D34C7C2F23D615CA9C44EB05DC3018E4A9AC18791DEED58599DC6480B68A5E14B132ED8B2AA4AC66235C19
3,883,553 UART: [art] SIG.R = EF39030DD99FFB3E55F2501EE19C0DED34B3E9F3EAB086B1C2B0A1EB2D4D0D2EE0808803AB5B3377943DDF79C6B19636
3,890,326 UART: [art] SIG.S = 1C7157DBC9D813FA1B76CB38F59E6F70EBFDCD0A464F8E16BE7BCCA9013D68A9DFD317B5D5AEDF35E7DBEADF9264B6A9
3,913,956 UART: mbox::rt_entry...
3,914,328 UART: ____ _ _ _ ____ _____
3,915,112 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,915,912 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,916,680 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,917,448 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,918,216 UART: |_|
3,918,528 UART:
4,285,273 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,959 UART: [state] LifecycleState = Production
85,567 UART: [state] DebugLocked = Yes
86,225 UART: [state] Starting the WD Timer 40000000 cycles
87,928 UART: [kat] SHA2-256
893,578 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,703 UART: [kat] ++
897,855 UART: [kat] sha1
902,047 UART: [kat] SHA2-256
903,987 UART: [kat] SHA2-384
906,812 UART: [kat] SHA2-512-ACC
908,713 UART: [kat] ECC-384
918,852 UART: [kat] HMAC-384Kdf
923,440 UART: [kat] LMS
1,171,768 UART: [kat] --
1,172,815 UART: [cold-reset] ++
1,173,144 UART: [fht] FHT @ 0x50003400
1,175,901 UART: [idev] ++
1,176,069 UART: [idev] CDI.KEYID = 6
1,176,429 UART: [idev] SUBJECT.KEYID = 7
1,176,853 UART: [idev] UDS.KEYID = 0
1,177,198 ready_for_fw is high
1,177,198 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,185,068 UART: [idev] Erasing UDS.KEYID = 0
1,202,414 UART: [idev] Sha1 KeyId Algorithm
1,210,907 UART: [idev] --
1,211,857 UART: [ldev] ++
1,212,025 UART: [ldev] CDI.KEYID = 6
1,212,388 UART: [ldev] SUBJECT.KEYID = 5
1,212,814 UART: [ldev] AUTHORITY.KEYID = 7
1,213,277 UART: [ldev] FE.KEYID = 1
1,218,429 UART: [ldev] Erasing FE.KEYID = 1
1,244,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,907 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,601 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,473 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,179 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,270 UART: [ldev] --
1,283,629 UART: [fwproc] Wait for Commands...
1,284,425 UART: [fwproc] Recv command 0x46574c44
1,285,153 UART: [fwproc] Recv'd Img size: 82832 bytes
2,244,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,272,421 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,303,591 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,390,221 >>> mbox cmd response: success
2,391,406 UART: [afmc] ++
2,391,574 UART: [afmc] CDI.KEYID = 6
2,391,936 UART: [afmc] SUBJECT.KEYID = 7
2,392,361 UART: [afmc] AUTHORITY.KEYID = 5
2,427,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,444,161 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,444,909 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,450,624 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,456,509 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,462,214 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,470,158 UART: [afmc] --
2,471,205 UART: [cold-reset] --
2,471,979 UART: [state] Locking Datavault
2,473,214 UART: [state] Locking PCR0, PCR1 and PCR31
2,473,818 UART: [state] Locking ICCM
2,474,432 UART: [exit] Launching FMC @ 0x40000130
2,479,762 UART:
2,479,778 UART: Running Caliptra FMC ...
2,480,186 UART:
2,480,240 UART: [state] CFI Enabled
2,490,536 UART: [fht] FMC Alias Private Key: 7
2,608,927 UART: [art] Extend RT PCRs Done
2,609,355 UART: [art] Lock RT PCRs Done
2,610,951 UART: [art] Populate DV Done
2,619,017 UART: [fht] FMC Alias Private Key: 7
2,620,157 UART: [art] Derive CDI
2,620,437 UART: [art] Store in slot 0x4
2,705,916 UART: [art] Derive Key Pair
2,706,276 UART: [art] Store priv key in slot 0x5
2,719,144 UART: [art] Derive Key Pair - Done
2,733,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,749,118 UART: [art] Erasing AUTHORITY.KEYID = 7
2,749,883 UART: [art] PUB.X = 0F9DC7B859DDB1AF6B2E4E633557118EC316C9F5B2BFE6D56C2D05BC622229CBF804127E288285C264AE657B5031457C
2,756,650 UART: [art] PUB.Y = 26C702A4F3786887C270759DBDD5138A7C402E9F40E05CB85360B1C6BE86D62AAE9FFA151B5E58826BADF845C61DA73D
2,763,607 UART: [art] SIG.R = 6D5AB81E72AB5CDF657F3E977D9F08095B357C55884CB02DF98F28F90CAA2BB17723807ACCF913F289266524352E68D3
2,770,372 UART: [art] SIG.S = 8AE4A468C7CF73CCBB5D9683E158B4885EA7B8D945C7D7CD11E586D5699CBDAB6A122F831AB293FA5FC400BC3FAB9B21
2,794,092 UART: mbox::rt_entry...
2,794,464 UART: ____ _ _ _ ____ _____
2,795,248 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,796,048 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,796,816 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,797,584 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,798,352 UART: |_|
2,798,664 UART:
2,916,673 UART: [rt] Runtime listening for mailbox commands...
2,917,435 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,917,556 >>> mbox cmd response data (0 bytes)
2,917,558 writing to cptra_bootfsm_go
2,917,650 UART:
2,917,666 UART: Running Caliptra ROM ...
2,918,074 UART:
2,918,129 UART: [state] CFI Enabled
2,921,150 UART: [state] LifecycleState = Production
2,921,758 UART: [state] DebugLocked = Yes
2,922,428 UART: [state] Starting the WD Timer 40000000 cycles
2,923,917 UART: [kat] SHA2-256
3,729,567 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,733,692 UART: [kat] ++
3,733,844 UART: [kat] sha1
3,738,176 UART: [kat] SHA2-256
3,740,116 UART: [kat] SHA2-384
3,742,847 UART: [kat] SHA2-512-ACC
3,744,748 UART: [kat] ECC-384
3,754,437 UART: [kat] HMAC-384Kdf
3,758,869 UART: [kat] LMS
4,007,197 UART: [kat] --
4,008,245 UART: [warm-reset] ++
4,009,350 UART: [warm-reset] --
4,010,185 UART: [state] Locking Datavault
4,011,139 UART: [state] Locking PCR0, PCR1 and PCR31
4,011,743 UART: [state] Locking ICCM
4,012,349 UART: [exit] Launching FMC @ 0x40000130
4,017,679 UART:
4,017,695 UART: Running Caliptra FMC ...
4,018,103 UART:
4,018,157 UART: [state] CFI Enabled
4,019,542 UART: [art] Skip pcr extension
4,019,951 UART: [art] Extend RT PCRs Done
4,020,379 UART: [art] Lock RT PCRs Done
4,021,562 UART: [art] Populate DV Done
4,029,966 UART: [fht] FMC Alias Private Key: 7
4,031,132 UART: [art] Derive CDI
4,031,412 UART: [art] Store in slot 0x4
4,116,695 UART: [art] Derive Key Pair
4,117,055 UART: [art] Store priv key in slot 0x5
4,129,893 UART: [art] Derive Key Pair - Done
4,144,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,159,977 UART: [art] Erasing AUTHORITY.KEYID = 7
4,160,742 UART: [art] PUB.X = 0F9DC7B859DDB1AF6B2E4E633557118EC316C9F5B2BFE6D56C2D05BC622229CBF804127E288285C264AE657B5031457C
4,167,509 UART: [art] PUB.Y = 26C702A4F3786887C270759DBDD5138A7C402E9F40E05CB85360B1C6BE86D62AAE9FFA151B5E58826BADF845C61DA73D
4,174,466 UART: [art] SIG.R = 6D5AB81E72AB5CDF657F3E977D9F08095B357C55884CB02DF98F28F90CAA2BB17723807ACCF913F289266524352E68D3
4,181,231 UART: [art] SIG.S = 8AE4A468C7CF73CCBB5D9683E158B4885EA7B8D945C7D7CD11E586D5699CBDAB6A122F831AB293FA5FC400BC3FAB9B21
4,205,367 UART: mbox::rt_entry...
4,205,739 UART: ____ _ _ _ ____ _____
4,206,523 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,207,323 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,208,091 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,208,859 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,209,627 UART: |_|
4,209,939 UART:
4,574,698 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,062 ready_for_fw is high
1,061,062 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,243,658 >>> mbox cmd response: success
2,306,268 UART:
2,306,284 UART: Running Caliptra FMC ...
2,306,692 UART:
2,306,746 UART: [state] CFI Enabled
2,317,306 UART: [fht] FMC Alias Private Key: 7
2,436,345 UART: [art] Extend RT PCRs Done
2,436,773 UART: [art] Lock RT PCRs Done
2,438,685 UART: [art] Populate DV Done
2,447,031 UART: [fht] FMC Alias Private Key: 7
2,448,175 UART: [art] Derive CDI
2,448,455 UART: [art] Store in slot 0x4
2,534,592 UART: [art] Derive Key Pair
2,534,952 UART: [art] Store priv key in slot 0x5
2,547,718 UART: [art] Derive Key Pair - Done
2,562,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,578,141 UART: [art] Erasing AUTHORITY.KEYID = 7
2,578,906 UART: [art] PUB.X = 5E9F1EE7B3D2D671828B1E36F2006893472834C7A0DDB6ED6E0CCF8DD0A1E63F810973A6A6D6ED7F157D829FC4453CB2
2,585,660 UART: [art] PUB.Y = 67F33F6BC387CF06965B3FDCB9BDE1C2DE655D5D24F20E8BCD5E9FA7B70AD8DC96A821A1F1CF901DBCE45DA2292A0473
2,592,624 UART: [art] SIG.R = E8BC8111CAB2099EB84E55DE2DB40FC1D1ACA1AA6E397223045CBDA6055A7490A18DCFD7285AD62F81328EFEBA9D949F
2,599,404 UART: [art] SIG.S = 7B3EB913D28153D431F33C3B2C8EEDFF99562AF584DF36244CBD98039E6B1595126C1AEC5D7D744F5EE7AEECA3AF9C1A
2,623,207 UART: mbox::rt_entry...
2,623,579 UART: ____ _ _ _ ____ _____
2,624,363 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,625,163 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,625,931 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,626,699 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,627,467 UART: |_|
2,627,779 UART:
2,746,634 UART: [rt] Runtime listening for mailbox commands...
2,747,396 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,747,517 >>> mbox cmd response data (0 bytes)
2,747,519 writing to cptra_bootfsm_go
3,729,750 UART:
3,729,766 UART: Running Caliptra FMC ...
3,730,174 UART:
3,730,228 UART: [state] CFI Enabled
3,731,539 UART: [art] Skip pcr extension
3,731,948 UART: [art] Extend RT PCRs Done
3,732,376 UART: [art] Lock RT PCRs Done
3,733,795 UART: [art] Populate DV Done
3,742,297 UART: [fht] FMC Alias Private Key: 7
3,743,371 UART: [art] Derive CDI
3,743,651 UART: [art] Store in slot 0x4
3,829,414 UART: [art] Derive Key Pair
3,829,774 UART: [art] Store priv key in slot 0x5
3,842,522 UART: [art] Derive Key Pair - Done
3,857,238 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,872,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,873,566 UART: [art] PUB.X = 5E9F1EE7B3D2D671828B1E36F2006893472834C7A0DDB6ED6E0CCF8DD0A1E63F810973A6A6D6ED7F157D829FC4453CB2
3,880,320 UART: [art] PUB.Y = 67F33F6BC387CF06965B3FDCB9BDE1C2DE655D5D24F20E8BCD5E9FA7B70AD8DC96A821A1F1CF901DBCE45DA2292A0473
3,887,284 UART: [art] SIG.R = E8BC8111CAB2099EB84E55DE2DB40FC1D1ACA1AA6E397223045CBDA6055A7490A18DCFD7285AD62F81328EFEBA9D949F
3,894,064 UART: [art] SIG.S = 7B3EB913D28153D431F33C3B2C8EEDFF99562AF584DF36244CBD98039E6B1595126C1AEC5D7D744F5EE7AEECA3AF9C1A
3,918,229 UART: mbox::rt_entry...
3,918,601 UART: ____ _ _ _ ____ _____
3,919,385 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,920,185 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,920,953 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,921,721 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,922,489 UART: |_|
3,922,801 UART:
4,280,982 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,606 UART: [state] LifecycleState = Production
86,214 UART: [state] DebugLocked = Yes
86,974 UART: [state] Starting the WD Timer 40000000 cycles
88,661 UART: [kat] SHA2-256
894,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,436 UART: [kat] ++
898,588 UART: [kat] sha1
902,602 UART: [kat] SHA2-256
904,542 UART: [kat] SHA2-384
907,309 UART: [kat] SHA2-512-ACC
909,210 UART: [kat] ECC-384
918,721 UART: [kat] HMAC-384Kdf
923,161 UART: [kat] LMS
1,171,489 UART: [kat] --
1,172,134 UART: [cold-reset] ++
1,172,493 UART: [fht] FHT @ 0x50003400
1,175,140 UART: [idev] ++
1,175,308 UART: [idev] CDI.KEYID = 6
1,175,668 UART: [idev] SUBJECT.KEYID = 7
1,176,092 UART: [idev] UDS.KEYID = 0
1,176,437 ready_for_fw is high
1,176,437 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,683 UART: [idev] Erasing UDS.KEYID = 0
1,200,673 UART: [idev] Sha1 KeyId Algorithm
1,209,150 UART: [idev] --
1,210,216 UART: [ldev] ++
1,210,384 UART: [ldev] CDI.KEYID = 6
1,210,747 UART: [ldev] SUBJECT.KEYID = 5
1,211,173 UART: [ldev] AUTHORITY.KEYID = 7
1,211,636 UART: [ldev] FE.KEYID = 1
1,216,832 UART: [ldev] Erasing FE.KEYID = 1
1,242,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,560 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,254 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,126 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,832 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,903 UART: [ldev] --
1,282,296 UART: [fwproc] Wait for Commands...
1,282,940 UART: [fwproc] Recv command 0x46574c44
1,283,668 UART: [fwproc] Recv'd Img size: 82832 bytes
2,245,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,271,416 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,302,586 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,389,222 >>> mbox cmd response: success
2,390,313 UART: [afmc] ++
2,390,481 UART: [afmc] CDI.KEYID = 6
2,390,843 UART: [afmc] SUBJECT.KEYID = 7
2,391,268 UART: [afmc] AUTHORITY.KEYID = 5
2,427,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,443,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,444,594 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,450,309 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,456,194 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,461,899 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,469,759 UART: [afmc] --
2,470,836 UART: [cold-reset] --
2,471,592 UART: [state] Locking Datavault
2,472,461 UART: [state] Locking PCR0, PCR1 and PCR31
2,473,065 UART: [state] Locking ICCM
2,473,709 UART: [exit] Launching FMC @ 0x40000130
2,479,039 UART:
2,479,055 UART: Running Caliptra FMC ...
2,479,463 UART:
2,479,606 UART: [state] CFI Enabled
2,490,502 UART: [fht] FMC Alias Private Key: 7
2,608,993 UART: [art] Extend RT PCRs Done
2,609,421 UART: [art] Lock RT PCRs Done
2,611,129 UART: [art] Populate DV Done
2,619,425 UART: [fht] FMC Alias Private Key: 7
2,620,451 UART: [art] Derive CDI
2,620,731 UART: [art] Store in slot 0x4
2,706,866 UART: [art] Derive Key Pair
2,707,226 UART: [art] Store priv key in slot 0x5
2,720,676 UART: [art] Derive Key Pair - Done
2,735,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,751,072 UART: [art] Erasing AUTHORITY.KEYID = 7
2,751,837 UART: [art] PUB.X = 38F2A23DB5D9506CDD40BC71705F66879BC47AED989D2DD64DE4C6509B872BA98C22B9D8CCB4AE340F407F8E1A327511
2,758,616 UART: [art] PUB.Y = 33B43232FC3C935704F151B250DD4E2CEBFD97BCAFABF954428F3073581F1A9EA82C180D51C45603B8396CDAC61342D4
2,765,565 UART: [art] SIG.R = 6C7828181664D90A75D729322E287E9B9AD0474C80EBBF9215F2EB82C5D1A8BD7B90C8075E5E9BD806F0B45F12714D3A
2,772,330 UART: [art] SIG.S = BEE7820CF0FBB7E81F3450F7A01EB49666729DCD61DE8954DCC2B3C0A1C522B7B15B271D70A38134A6E2ADE5B27C1D39
2,796,123 UART: mbox::rt_entry...
2,796,495 UART: ____ _ _ _ ____ _____
2,797,279 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,798,079 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,798,847 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,799,615 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,800,383 UART: |_|
2,800,695 UART:
2,919,526 UART: [rt] Runtime listening for mailbox commands...
2,920,288 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,920,409 >>> mbox cmd response data (0 bytes)
2,920,411 writing to cptra_bootfsm_go
2,920,503 UART:
2,920,519 UART: Running Caliptra ROM ...
2,920,927 UART:
2,921,069 UART: [state] CFI Enabled
2,923,804 UART: [state] LifecycleState = Production
2,924,412 UART: [state] DebugLocked = Yes
2,924,980 UART: [state] Starting the WD Timer 40000000 cycles
2,926,459 UART: [kat] SHA2-256
3,732,109 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,736,234 UART: [kat] ++
3,736,386 UART: [kat] sha1
3,740,734 UART: [kat] SHA2-256
3,742,674 UART: [kat] SHA2-384
3,745,423 UART: [kat] SHA2-512-ACC
3,747,324 UART: [kat] ECC-384
3,756,847 UART: [kat] HMAC-384Kdf
3,761,317 UART: [kat] LMS
4,009,645 UART: [kat] --
4,010,581 UART: [warm-reset] ++
4,011,222 UART: [warm-reset] --
4,012,199 UART: [state] Locking Datavault
4,012,891 UART: [state] Locking PCR0, PCR1 and PCR31
4,013,495 UART: [state] Locking ICCM
4,014,127 UART: [exit] Launching FMC @ 0x40000130
4,019,457 UART:
4,019,473 UART: Running Caliptra FMC ...
4,019,881 UART:
4,020,024 UART: [state] CFI Enabled
4,021,461 UART: [art] Skip pcr extension
4,021,870 UART: [art] Extend RT PCRs Done
4,022,298 UART: [art] Lock RT PCRs Done
4,023,893 UART: [art] Populate DV Done
4,031,749 UART: [fht] FMC Alias Private Key: 7
4,032,855 UART: [art] Derive CDI
4,033,135 UART: [art] Store in slot 0x4
4,119,100 UART: [art] Derive Key Pair
4,119,460 UART: [art] Store priv key in slot 0x5
4,132,784 UART: [art] Derive Key Pair - Done
4,147,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,163,000 UART: [art] Erasing AUTHORITY.KEYID = 7
4,163,765 UART: [art] PUB.X = 38F2A23DB5D9506CDD40BC71705F66879BC47AED989D2DD64DE4C6509B872BA98C22B9D8CCB4AE340F407F8E1A327511
4,170,544 UART: [art] PUB.Y = 33B43232FC3C935704F151B250DD4E2CEBFD97BCAFABF954428F3073581F1A9EA82C180D51C45603B8396CDAC61342D4
4,177,493 UART: [art] SIG.R = 6C7828181664D90A75D729322E287E9B9AD0474C80EBBF9215F2EB82C5D1A8BD7B90C8075E5E9BD806F0B45F12714D3A
4,184,258 UART: [art] SIG.S = BEE7820CF0FBB7E81F3450F7A01EB49666729DCD61DE8954DCC2B3C0A1C522B7B15B271D70A38134A6E2ADE5B27C1D39
4,207,759 UART: mbox::rt_entry...
4,208,131 UART: ____ _ _ _ ____ _____
4,208,915 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,209,715 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,210,483 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,211,251 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,212,019 UART: |_|
4,212,331 UART:
4,573,902 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,633 ready_for_fw is high
1,060,633 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,243,093 >>> mbox cmd response: success
2,305,175 UART:
2,305,191 UART: Running Caliptra FMC ...
2,305,599 UART:
2,305,742 UART: [state] CFI Enabled
2,316,646 UART: [fht] FMC Alias Private Key: 7
2,435,705 UART: [art] Extend RT PCRs Done
2,436,133 UART: [art] Lock RT PCRs Done
2,437,905 UART: [art] Populate DV Done
2,446,483 UART: [fht] FMC Alias Private Key: 7
2,447,617 UART: [art] Derive CDI
2,447,897 UART: [art] Store in slot 0x4
2,534,150 UART: [art] Derive Key Pair
2,534,510 UART: [art] Store priv key in slot 0x5
2,547,950 UART: [art] Derive Key Pair - Done
2,562,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,577,844 UART: [art] Erasing AUTHORITY.KEYID = 7
2,578,609 UART: [art] PUB.X = 4D9C09F7F7EECF28FA246A56D8A01AAA9309D258BDED7E29A029BD9CED726D7BEEC9876D5D65F0FBABBE73CF9411B636
2,585,401 UART: [art] PUB.Y = 2A9C207FF6BD317BBFFC4F1AB2114AB9E77C92D107B0BC4B9A7FE7B792D81CB87FFF187F0BE2BDBA80CF31931DB79841
2,592,371 UART: [art] SIG.R = 9A9BE7FDF8A96ECE2A6EA5BB1B52A976612191775B61A6E966B94FC715836C8510E10CB3C5C5D8286830BF5F567802BC
2,599,143 UART: [art] SIG.S = B01645E2DC1263C9A678634D4D271E419D6F15D225E278CE39F2E1F8DDE6272E627887FACD03CE11F115062770DA4588
2,622,503 UART: mbox::rt_entry...
2,622,875 UART: ____ _ _ _ ____ _____
2,623,659 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,624,459 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,625,227 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,625,995 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,626,763 UART: |_|
2,627,075 UART:
2,745,428 UART: [rt] Runtime listening for mailbox commands...
2,746,190 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,746,311 >>> mbox cmd response data (0 bytes)
2,746,313 writing to cptra_bootfsm_go
3,729,115 UART:
3,729,131 UART: Running Caliptra FMC ...
3,729,539 UART:
3,729,682 UART: [state] CFI Enabled
3,730,887 UART: [art] Skip pcr extension
3,731,296 UART: [art] Extend RT PCRs Done
3,731,724 UART: [art] Lock RT PCRs Done
3,732,941 UART: [art] Populate DV Done
3,740,861 UART: [fht] FMC Alias Private Key: 7
3,741,949 UART: [art] Derive CDI
3,742,229 UART: [art] Store in slot 0x4
3,828,348 UART: [art] Derive Key Pair
3,828,708 UART: [art] Store priv key in slot 0x5
3,842,262 UART: [art] Derive Key Pair - Done
3,856,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,872,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,873,375 UART: [art] PUB.X = 4D9C09F7F7EECF28FA246A56D8A01AAA9309D258BDED7E29A029BD9CED726D7BEEC9876D5D65F0FBABBE73CF9411B636
3,880,167 UART: [art] PUB.Y = 2A9C207FF6BD317BBFFC4F1AB2114AB9E77C92D107B0BC4B9A7FE7B792D81CB87FFF187F0BE2BDBA80CF31931DB79841
3,887,137 UART: [art] SIG.R = 9A9BE7FDF8A96ECE2A6EA5BB1B52A976612191775B61A6E966B94FC715836C8510E10CB3C5C5D8286830BF5F567802BC
3,893,909 UART: [art] SIG.S = B01645E2DC1263C9A678634D4D271E419D6F15D225E278CE39F2E1F8DDE6272E627887FACD03CE11F115062770DA4588
3,918,043 UART: mbox::rt_entry...
3,918,415 UART: ____ _ _ _ ____ _____
3,919,199 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,919,999 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,920,767 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,921,535 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,922,303 UART: |_|
3,922,615 UART:
4,289,006 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Production
85,729 UART: [state] DebugLocked = Yes
86,291 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,015 UART: [kat] SHA2-256
881,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,061 UART: [kat] ++
886,213 UART: [kat] sha1
890,489 UART: [kat] SHA2-256
892,427 UART: [kat] SHA2-384
895,106 UART: [kat] SHA2-512-ACC
897,007 UART: [kat] ECC-384
902,616 UART: [kat] HMAC-384Kdf
907,084 UART: [kat] LMS
1,475,280 UART: [kat] --
1,476,171 UART: [cold-reset] ++
1,476,638 UART: [fht] Storing FHT @ 0x50003400
1,479,201 UART: [idev] ++
1,479,369 UART: [idev] CDI.KEYID = 6
1,479,729 UART: [idev] SUBJECT.KEYID = 7
1,480,153 UART: [idev] UDS.KEYID = 0
1,480,498 ready_for_fw is high
1,480,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,154 UART: [idev] Erasing UDS.KEYID = 0
1,504,799 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,504 UART: [idev] --
1,514,545 UART: [ldev] ++
1,514,713 UART: [ldev] CDI.KEYID = 6
1,515,076 UART: [ldev] SUBJECT.KEYID = 5
1,515,502 UART: [ldev] AUTHORITY.KEYID = 7
1,515,965 UART: [ldev] FE.KEYID = 1
1,520,945 UART: [ldev] Erasing FE.KEYID = 1
1,546,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,921 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,615 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,487 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,193 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,383 UART: [ldev] --
1,585,862 UART: [fwproc] Waiting for Commands...
1,586,589 UART: [fwproc] Received command 0x46574c44
1,587,380 UART: [fwproc] Received Image of size 118548 bytes
2,957,432 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,984,395 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,015,613 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,155,911 >>> mbox cmd response: success
3,157,024 UART: [afmc] ++
3,157,192 UART: [afmc] CDI.KEYID = 6
3,157,554 UART: [afmc] SUBJECT.KEYID = 7
3,157,979 UART: [afmc] AUTHORITY.KEYID = 5
3,192,602 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,209,032 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,209,812 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
3,215,527 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
3,221,412 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
3,227,115 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
3,234,977 UART: [afmc] --
3,236,098 UART: [cold-reset] --
3,236,896 UART: [state] Locking Datavault
3,238,003 UART: [state] Locking PCR0, PCR1 and PCR31
3,238,607 UART: [state] Locking ICCM
3,239,197 UART: [exit] Launching FMC @ 0x40000130
3,244,527 UART:
3,244,543 UART: Running Caliptra FMC ...
3,244,951 UART:
3,245,005 UART: [state] CFI Enabled
3,255,523 UART: [fht] FMC Alias Private Key: 7
3,374,712 UART: [art] Extend RT PCRs Done
3,375,140 UART: [art] Lock RT PCRs Done
3,376,748 UART: [art] Populate DV Done
3,384,950 UART: [fht] FMC Alias Private Key: 7
3,386,008 UART: [art] Derive CDI
3,386,288 UART: [art] Store in slot 0x4
3,472,208 UART: [art] Derive Key Pair
3,472,568 UART: [art] Store priv key in slot 0x5
3,485,327 UART: [art] Derive Key Pair - Done
3,499,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,515,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,515,986 UART: [art] PUB.X = FEEE8B2B4CD23FB4DD826638B34D23966797B97CE3E03EFF9FEB84394D110E95C9FAFF44436E0D196D607C899EBA3D64
3,522,766 UART: [art] PUB.Y = 0C978699A0BC088986FEE6491907ECBACAC27236E5D62464D6A421CF91C19465B8D523889D9116D9040E6039397C52A1
3,529,695 UART: [art] SIG.R = C0E00F26A19032728A6DEE10496B8C23A2AA7024E3D5EDBB7194D50647DF491B10FD3B977E85CE8330212D9870815A8A
3,536,461 UART: [art] SIG.S = 6782CAD8A7E9183883A3658EF9F381EB535D968A215423A6EF069804C40DAF3A710693915E253021EBAA98C4176E497E
3,560,089 UART: Caliptra RT
3,560,340 UART: [state] CFI Enabled
3,679,723 UART: [rt] RT listening for mailbox commands...
3,680,933 writing to cptra_bootfsm_go
3,681,028 UART:
3,681,044 UART: Running Caliptra ROM ...
3,681,452 UART:
3,681,506 UART: [state] CFI Enabled
3,683,621 UART: [state] LifecycleState = Production
3,684,229 UART: [state] DebugLocked = Yes
3,684,895 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,686,665 UART: [kat] SHA2-256
4,480,596 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,484,711 UART: [kat] ++
4,484,863 UART: [kat] sha1
4,489,149 UART: [kat] SHA2-256
4,491,087 UART: [kat] SHA2-384
4,493,802 UART: [kat] SHA2-512-ACC
4,495,703 UART: [kat] ECC-384
4,501,486 UART: [kat] HMAC-384Kdf
4,506,146 UART: [kat] LMS
5,074,342 UART: [kat] --
5,075,196 UART: [warm-reset] ++
5,076,029 UART: [warm-reset] --
5,076,914 UART: [state] Locking Datavault
5,077,800 UART: [state] Locking PCR0, PCR1 and PCR31
5,078,404 UART: [state] Locking ICCM
5,078,860 UART: [exit] Launching FMC @ 0x40000130
5,084,190 UART:
5,084,206 UART: Running Caliptra FMC ...
5,084,614 UART:
5,084,668 UART: [state] CFI Enabled
5,085,835 UART: [art] Skip pcr extension
5,086,244 UART: [art] Extend RT PCRs Done
5,086,672 UART: [art] Lock RT PCRs Done
5,087,745 UART: [art] Populate DV Done
5,095,893 UART: [fht] FMC Alias Private Key: 7
5,096,879 UART: [art] Derive CDI
5,097,159 UART: [art] Store in slot 0x4
5,182,901 UART: [art] Derive Key Pair
5,183,261 UART: [art] Store priv key in slot 0x5
5,196,354 UART: [art] Derive Key Pair - Done
5,210,801 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,226,364 UART: [art] Erasing AUTHORITY.KEYID = 7
5,227,129 UART: [art] PUB.X = FEEE8B2B4CD23FB4DD826638B34D23966797B97CE3E03EFF9FEB84394D110E95C9FAFF44436E0D196D607C899EBA3D64
5,233,909 UART: [art] PUB.Y = 0C978699A0BC088986FEE6491907ECBACAC27236E5D62464D6A421CF91C19465B8D523889D9116D9040E6039397C52A1
5,240,838 UART: [art] SIG.R = C0E00F26A19032728A6DEE10496B8C23A2AA7024E3D5EDBB7194D50647DF491B10FD3B977E85CE8330212D9870815A8A
5,247,604 UART: [art] SIG.S = 6782CAD8A7E9183883A3658EF9F381EB535D968A215423A6EF069804C40DAF3A710693915E253021EBAA98C4176E497E
5,271,462 UART: Caliptra RT
5,271,713 UART: [state] CFI Enabled
5,639,533 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,342 ready_for_fw is high
1,362,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,006,209 >>> mbox cmd response: success
3,067,471 UART:
3,067,487 UART: Running Caliptra FMC ...
3,067,895 UART:
3,067,949 UART: [state] CFI Enabled
3,078,305 UART: [fht] FMC Alias Private Key: 7
3,197,224 UART: [art] Extend RT PCRs Done
3,197,652 UART: [art] Lock RT PCRs Done
3,199,044 UART: [art] Populate DV Done
3,207,140 UART: [fht] FMC Alias Private Key: 7
3,208,198 UART: [art] Derive CDI
3,208,478 UART: [art] Store in slot 0x4
3,294,144 UART: [art] Derive Key Pair
3,294,504 UART: [art] Store priv key in slot 0x5
3,307,449 UART: [art] Derive Key Pair - Done
3,322,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,337,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,337,848 UART: [art] PUB.X = ECA3A870AD0E2B818479A3F176660A6AE4CA08F86079443C37324F5FF5F6EC3E97D9F1534046DDE9285EB6032A61D002
3,344,607 UART: [art] PUB.Y = A988D3397201DD8DF473B56B389C58615C9921E51346A877E660159727C07C71DC60FF76DA7B44F11BE3D9C919AB5F39
3,351,552 UART: [art] SIG.R = 88ECBF445C4A2184BC03D9E0DAA23E8C7F6C9A94E110F51EEA4D683648ED2868B582EC5EDE30A7B672866C2B030C0D33
3,358,324 UART: [art] SIG.S = F15F40A735BBFE323C43513F562A76D2331E1DB73647255CDE19B04FADA0C58B11510CDDCBD11BADC73ACD57F0C3121C
3,382,473 UART: Caliptra RT
3,382,724 UART: [state] CFI Enabled
3,502,262 UART: [rt] RT listening for mailbox commands...
3,503,400 writing to cptra_bootfsm_go
4,787,957 UART:
4,787,973 UART: Running Caliptra FMC ...
4,788,381 UART:
4,788,435 UART: [state] CFI Enabled
4,789,548 UART: [art] Skip pcr extension
4,789,957 UART: [art] Extend RT PCRs Done
4,790,385 UART: [art] Lock RT PCRs Done
4,791,484 UART: [art] Populate DV Done
4,799,786 UART: [fht] FMC Alias Private Key: 7
4,800,930 UART: [art] Derive CDI
4,801,210 UART: [art] Store in slot 0x4
4,886,994 UART: [art] Derive Key Pair
4,887,354 UART: [art] Store priv key in slot 0x5
4,900,873 UART: [art] Derive Key Pair - Done
4,915,548 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,930,669 UART: [art] Erasing AUTHORITY.KEYID = 7
4,931,434 UART: [art] PUB.X = ECA3A870AD0E2B818479A3F176660A6AE4CA08F86079443C37324F5FF5F6EC3E97D9F1534046DDE9285EB6032A61D002
4,938,193 UART: [art] PUB.Y = A988D3397201DD8DF473B56B389C58615C9921E51346A877E660159727C07C71DC60FF76DA7B44F11BE3D9C919AB5F39
4,945,138 UART: [art] SIG.R = 88ECBF445C4A2184BC03D9E0DAA23E8C7F6C9A94E110F51EEA4D683648ED2868B582EC5EDE30A7B672866C2B030C0D33
4,951,910 UART: [art] SIG.S = F15F40A735BBFE323C43513F562A76D2331E1DB73647255CDE19B04FADA0C58B11510CDDCBD11BADC73ACD57F0C3121C
4,975,949 UART: Caliptra RT
4,976,200 UART: [state] CFI Enabled
5,340,817 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,774 UART: [state] LifecycleState = Production
86,382 UART: [state] DebugLocked = Yes
87,034 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,794 UART: [kat] SHA2-256
882,725 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,840 UART: [kat] ++
886,992 UART: [kat] sha1
891,190 UART: [kat] SHA2-256
893,128 UART: [kat] SHA2-384
895,943 UART: [kat] SHA2-512-ACC
897,844 UART: [kat] ECC-384
903,283 UART: [kat] HMAC-384Kdf
907,965 UART: [kat] LMS
1,476,161 UART: [kat] --
1,477,098 UART: [cold-reset] ++
1,477,477 UART: [fht] Storing FHT @ 0x50003400
1,480,254 UART: [idev] ++
1,480,422 UART: [idev] CDI.KEYID = 6
1,480,782 UART: [idev] SUBJECT.KEYID = 7
1,481,206 UART: [idev] UDS.KEYID = 0
1,481,551 ready_for_fw is high
1,481,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,449 UART: [idev] Erasing UDS.KEYID = 0
1,505,878 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,565 UART: [idev] --
1,515,510 UART: [ldev] ++
1,515,678 UART: [ldev] CDI.KEYID = 6
1,516,041 UART: [ldev] SUBJECT.KEYID = 5
1,516,467 UART: [ldev] AUTHORITY.KEYID = 7
1,516,930 UART: [ldev] FE.KEYID = 1
1,522,254 UART: [ldev] Erasing FE.KEYID = 1
1,547,905 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,606 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,300 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,172 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,878 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,958 UART: [ldev] --
1,587,299 UART: [fwproc] Waiting for Commands...
1,587,978 UART: [fwproc] Received command 0x46574c44
1,588,769 UART: [fwproc] Received Image of size 118548 bytes
2,958,677 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,986,474 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,017,692 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,157,980 >>> mbox cmd response: success
3,159,105 UART: [afmc] ++
3,159,273 UART: [afmc] CDI.KEYID = 6
3,159,635 UART: [afmc] SUBJECT.KEYID = 7
3,160,060 UART: [afmc] AUTHORITY.KEYID = 5
3,195,445 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,211,699 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,212,479 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
3,218,194 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
3,224,079 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
3,229,782 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
3,237,570 UART: [afmc] --
3,238,501 UART: [cold-reset] --
3,239,315 UART: [state] Locking Datavault
3,240,548 UART: [state] Locking PCR0, PCR1 and PCR31
3,241,152 UART: [state] Locking ICCM
3,241,720 UART: [exit] Launching FMC @ 0x40000130
3,247,050 UART:
3,247,066 UART: Running Caliptra FMC ...
3,247,474 UART:
3,247,617 UART: [state] CFI Enabled
3,258,633 UART: [fht] FMC Alias Private Key: 7
3,377,982 UART: [art] Extend RT PCRs Done
3,378,410 UART: [art] Lock RT PCRs Done
3,379,818 UART: [art] Populate DV Done
3,388,050 UART: [fht] FMC Alias Private Key: 7
3,389,030 UART: [art] Derive CDI
3,389,310 UART: [art] Store in slot 0x4
3,475,114 UART: [art] Derive Key Pair
3,475,474 UART: [art] Store priv key in slot 0x5
3,488,799 UART: [art] Derive Key Pair - Done
3,503,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,519,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,519,832 UART: [art] PUB.X = 80E9DFDAFCC7B2A97526BE9D02AC66A51BC636F7E9B94DF963F8695B0F62DA967DA7F583517219DC79CA89EA9D099565
3,526,607 UART: [art] PUB.Y = 1287470199B7129698EDFB3316AED92A6DFCD5DCA0F6C4C74551E7CB4ECD676445C6ADBACFA77AD4E78F4AB6A79CB125
3,533,576 UART: [art] SIG.R = 99D69A78EA01CDDD3C0697FC51557109B849D0CE7256E678EFCFDA58BDFD6145B3FDB713338C039FCE584E2A77A0C4A2
3,540,350 UART: [art] SIG.S = FB0B8DF37AEADCD4C66DEA1F377A4838DB16913683E8BC9601EDE45EA9F6C457C96B7B6BA632742DC39205D2B364C63E
3,564,305 UART: Caliptra RT
3,564,648 UART: [state] CFI Enabled
3,684,150 UART: [rt] RT listening for mailbox commands...
3,685,336 writing to cptra_bootfsm_go
3,685,431 UART:
3,685,447 UART: Running Caliptra ROM ...
3,685,855 UART:
3,685,996 UART: [state] CFI Enabled
3,689,051 UART: [state] LifecycleState = Production
3,689,659 UART: [state] DebugLocked = Yes
3,690,305 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,691,869 UART: [kat] SHA2-256
4,485,800 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,489,915 UART: [kat] ++
4,490,067 UART: [kat] sha1
4,494,213 UART: [kat] SHA2-256
4,496,151 UART: [kat] SHA2-384
4,499,012 UART: [kat] SHA2-512-ACC
4,500,913 UART: [kat] ECC-384
4,506,838 UART: [kat] HMAC-384Kdf
4,511,416 UART: [kat] LMS
5,079,612 UART: [kat] --
5,080,544 UART: [warm-reset] ++
5,081,287 UART: [warm-reset] --
5,082,054 UART: [state] Locking Datavault
5,082,662 UART: [state] Locking PCR0, PCR1 and PCR31
5,083,266 UART: [state] Locking ICCM
5,083,864 UART: [exit] Launching FMC @ 0x40000130
5,089,194 UART:
5,089,210 UART: Running Caliptra FMC ...
5,089,618 UART:
5,089,761 UART: [state] CFI Enabled
5,091,318 UART: [art] Skip pcr extension
5,091,727 UART: [art] Extend RT PCRs Done
5,092,155 UART: [art] Lock RT PCRs Done
5,093,540 UART: [art] Populate DV Done
5,101,594 UART: [fht] FMC Alias Private Key: 7
5,102,662 UART: [art] Derive CDI
5,102,942 UART: [art] Store in slot 0x4
5,188,492 UART: [art] Derive Key Pair
5,188,852 UART: [art] Store priv key in slot 0x5
5,202,079 UART: [art] Derive Key Pair - Done
5,216,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,232,815 UART: [art] Erasing AUTHORITY.KEYID = 7
5,233,580 UART: [art] PUB.X = 80E9DFDAFCC7B2A97526BE9D02AC66A51BC636F7E9B94DF963F8695B0F62DA967DA7F583517219DC79CA89EA9D099565
5,240,355 UART: [art] PUB.Y = 1287470199B7129698EDFB3316AED92A6DFCD5DCA0F6C4C74551E7CB4ECD676445C6ADBACFA77AD4E78F4AB6A79CB125
5,247,324 UART: [art] SIG.R = 99D69A78EA01CDDD3C0697FC51557109B849D0CE7256E678EFCFDA58BDFD6145B3FDB713338C039FCE584E2A77A0C4A2
5,254,098 UART: [art] SIG.S = FB0B8DF37AEADCD4C66DEA1F377A4838DB16913683E8BC9601EDE45EA9F6C457C96B7B6BA632742DC39205D2B364C63E
5,278,055 UART: Caliptra RT
5,278,398 UART: [state] CFI Enabled
5,639,017 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,941 ready_for_fw is high
1,362,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,004,826 >>> mbox cmd response: success
3,066,630 UART:
3,066,646 UART: Running Caliptra FMC ...
3,067,054 UART:
3,067,197 UART: [state] CFI Enabled
3,077,561 UART: [fht] FMC Alias Private Key: 7
3,196,626 UART: [art] Extend RT PCRs Done
3,197,054 UART: [art] Lock RT PCRs Done
3,198,796 UART: [art] Populate DV Done
3,206,682 UART: [fht] FMC Alias Private Key: 7
3,207,656 UART: [art] Derive CDI
3,207,936 UART: [art] Store in slot 0x4
3,294,028 UART: [art] Derive Key Pair
3,294,388 UART: [art] Store priv key in slot 0x5
3,307,379 UART: [art] Derive Key Pair - Done
3,321,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,338,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,338,777 UART: [art] PUB.X = 1EF9DA0BD965F48CE81EAA4FC3B48081EB9C71FCB0E78C7166096792B4D92167AB7BA65DDB8CDFFA0EBD6CDF373AA183
3,345,566 UART: [art] PUB.Y = 5648FD34044C60EB261DF4AD1568D906A41252BBB92EE9ECFC2CFFE88D33BE32B392F3B1401E93BF0D380D4A8FAC4BB0
3,352,524 UART: [art] SIG.R = 9C8C9667064BE8C594352B4A8402E1D0AC34B001B650A9EB756B8BED4782F7FA8F8B70662092217055D902398FF7030F
3,359,272 UART: [art] SIG.S = D75489DE7C91005B216D8D1D4A58A0C95825190FDB3A0DB265722859EBE3106CC79E49BAB1772099C7990C8ED110977F
3,383,279 UART: Caliptra RT
3,383,622 UART: [state] CFI Enabled
3,503,700 UART: [rt] RT listening for mailbox commands...
3,504,948 writing to cptra_bootfsm_go
4,790,812 UART:
4,790,828 UART: Running Caliptra FMC ...
4,791,236 UART:
4,791,379 UART: [state] CFI Enabled
4,792,732 UART: [art] Skip pcr extension
4,793,141 UART: [art] Extend RT PCRs Done
4,793,569 UART: [art] Lock RT PCRs Done
4,794,812 UART: [art] Populate DV Done
4,802,824 UART: [fht] FMC Alias Private Key: 7
4,803,826 UART: [art] Derive CDI
4,804,106 UART: [art] Store in slot 0x4
4,889,624 UART: [art] Derive Key Pair
4,889,984 UART: [art] Store priv key in slot 0x5
4,903,487 UART: [art] Derive Key Pair - Done
4,918,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,934,134 UART: [art] Erasing AUTHORITY.KEYID = 7
4,934,899 UART: [art] PUB.X = 1EF9DA0BD965F48CE81EAA4FC3B48081EB9C71FCB0E78C7166096792B4D92167AB7BA65DDB8CDFFA0EBD6CDF373AA183
4,941,688 UART: [art] PUB.Y = 5648FD34044C60EB261DF4AD1568D906A41252BBB92EE9ECFC2CFFE88D33BE32B392F3B1401E93BF0D380D4A8FAC4BB0
4,948,646 UART: [art] SIG.R = 9C8C9667064BE8C594352B4A8402E1D0AC34B001B650A9EB756B8BED4782F7FA8F8B70662092217055D902398FF7030F
4,955,394 UART: [art] SIG.S = D75489DE7C91005B216D8D1D4A58A0C95825190FDB3A0DB265722859EBE3106CC79E49BAB1772099C7990C8ED110977F
4,979,581 UART: Caliptra RT
4,979,924 UART: [state] CFI Enabled
5,347,043 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Production
85,841 UART: [state] DebugLocked = Yes
86,523 UART: [state] Starting the WD Timer 40000000 cycles
88,140 UART: [kat] SHA2-256
891,690 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,794 UART: [kat] ++
895,946 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,693 UART: [kat] SHA2-512-ACC
906,594 UART: [kat] ECC-384
915,901 UART: [kat] HMAC-384Kdf
920,635 UART: [kat] LMS
1,168,947 UART: [kat] --
1,170,074 UART: [cold-reset] ++
1,170,509 UART: [fht] FHT @ 0x50003400
1,172,951 UART: [idev] ++
1,173,119 UART: [idev] CDI.KEYID = 6
1,173,480 UART: [idev] SUBJECT.KEYID = 7
1,173,905 UART: [idev] UDS.KEYID = 0
1,174,251 ready_for_fw is high
1,174,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,571 UART: [idev] Erasing UDS.KEYID = 0
1,199,112 UART: [idev] Sha1 KeyId Algorithm
1,208,171 UART: [idev] --
1,209,312 UART: [ldev] ++
1,209,480 UART: [ldev] CDI.KEYID = 6
1,209,844 UART: [ldev] SUBJECT.KEYID = 5
1,210,271 UART: [ldev] AUTHORITY.KEYID = 7
1,210,734 UART: [ldev] FE.KEYID = 1
1,215,988 UART: [ldev] Erasing FE.KEYID = 1
1,241,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,213 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,907 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,777 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,483 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,557 UART: [ldev] --
1,280,814 UART: [fwproc] Wait for Commands...
1,281,393 UART: [fwproc] Recv command 0x46574c44
1,282,126 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,491 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,666 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,868 >>> mbox cmd response: success
2,852,003 UART: [afmc] ++
2,852,171 UART: [afmc] CDI.KEYID = 6
2,852,534 UART: [afmc] SUBJECT.KEYID = 7
2,852,960 UART: [afmc] AUTHORITY.KEYID = 5
2,889,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,584 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,333 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,912,049 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,932 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,637 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,351 UART: [afmc] --
2,932,167 UART: [cold-reset] --
2,933,073 UART: [state] Locking Datavault
2,934,190 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,794 UART: [state] Locking ICCM
2,935,260 UART: [exit] Launching FMC @ 0x40000130
2,940,590 UART:
2,940,606 UART: Running Caliptra FMC ...
2,941,014 UART:
2,941,068 UART: [state] CFI Enabled
2,951,716 UART: [fht] FMC Alias Private Key: 7
3,069,549 UART: [art] Extend RT PCRs Done
3,069,977 UART: [art] Lock RT PCRs Done
3,071,443 UART: [art] Populate DV Done
3,079,717 UART: [fht] FMC Alias Private Key: 7
3,080,785 UART: [art] Derive CDI
3,081,065 UART: [art] Store in slot 0x4
3,166,848 UART: [art] Derive Key Pair
3,167,208 UART: [art] Store priv key in slot 0x5
3,180,446 UART: [art] Derive Key Pair - Done
3,195,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,039 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,804 UART: [art] PUB.X = 2506504BDA07F5BD2AC382BEC22AEC784FE93E09D0D25711FA573FB6F2874B9270B582C5DAD096B947CC6B9F5FF9C16A
3,218,581 UART: [art] PUB.Y = A026E8BC6D9CB5AF3037D8B0158150322A0E7E10B20EDA61B2212E07D00A911646E33B8A37DE7AAB908160CDDA2E9DE9
3,225,531 UART: [art] SIG.R = 8F7041B2807D935BFD567733F7C0B5FB04A928F52ACE7D800D711F00CB69BC1F5ADF4CBE9C042A326ED2137037B29047
3,232,278 UART: [art] SIG.S = 45F051E4818CA2EA575684D903AFA0A7C99CD8938C6B7B9D91BE7E771459AB1267F685BCF9090EA341EF08208D3D31E3
3,256,122 UART: Caliptra RT
3,256,373 UART: [state] CFI Enabled
3,377,007 UART: [rt] RT listening for mailbox commands...
3,378,119 writing to cptra_bootfsm_go
3,378,211 UART:
3,378,227 UART: Running Caliptra ROM ...
3,378,635 UART:
3,378,690 UART: [state] CFI Enabled
3,381,395 UART: [state] LifecycleState = Production
3,382,003 UART: [state] DebugLocked = Yes
3,382,695 UART: [state] Starting the WD Timer 40000000 cycles
3,384,376 UART: [kat] SHA2-256
4,187,926 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,192,030 UART: [kat] ++
4,192,182 UART: [kat] sha1
4,196,344 UART: [kat] SHA2-256
4,198,284 UART: [kat] SHA2-384
4,201,053 UART: [kat] SHA2-512-ACC
4,202,954 UART: [kat] ECC-384
4,212,337 UART: [kat] HMAC-384Kdf
4,216,905 UART: [kat] LMS
4,465,217 UART: [kat] --
4,465,909 UART: [warm-reset] ++
4,467,244 UART: [warm-reset] --
4,468,247 UART: [state] Locking Datavault
4,469,001 UART: [state] Locking PCR0, PCR1 and PCR31
4,469,605 UART: [state] Locking ICCM
4,470,055 UART: [exit] Launching FMC @ 0x40000130
4,475,385 UART:
4,475,401 UART: Running Caliptra FMC ...
4,475,809 UART:
4,475,863 UART: [state] CFI Enabled
4,476,976 UART: [art] Skip pcr extension
4,477,385 UART: [art] Extend RT PCRs Done
4,477,813 UART: [art] Lock RT PCRs Done
4,479,278 UART: [art] Populate DV Done
4,487,526 UART: [fht] FMC Alias Private Key: 7
4,488,566 UART: [art] Derive CDI
4,488,846 UART: [art] Store in slot 0x4
4,575,167 UART: [art] Derive Key Pair
4,575,527 UART: [art] Store priv key in slot 0x5
4,588,333 UART: [art] Derive Key Pair - Done
4,602,869 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,618,236 UART: [art] Erasing AUTHORITY.KEYID = 7
4,619,001 UART: [art] PUB.X = 2506504BDA07F5BD2AC382BEC22AEC784FE93E09D0D25711FA573FB6F2874B9270B582C5DAD096B947CC6B9F5FF9C16A
4,625,778 UART: [art] PUB.Y = A026E8BC6D9CB5AF3037D8B0158150322A0E7E10B20EDA61B2212E07D00A911646E33B8A37DE7AAB908160CDDA2E9DE9
4,632,728 UART: [art] SIG.R = 8F7041B2807D935BFD567733F7C0B5FB04A928F52ACE7D800D711F00CB69BC1F5ADF4CBE9C042A326ED2137037B29047
4,639,475 UART: [art] SIG.S = 45F051E4818CA2EA575684D903AFA0A7C99CD8938C6B7B9D91BE7E771459AB1267F685BCF9090EA341EF08208D3D31E3
4,663,019 UART: Caliptra RT
4,663,270 UART: [state] CFI Enabled
5,025,931 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,395 ready_for_fw is high
1,059,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,355 >>> mbox cmd response: success
2,764,034 UART:
2,764,050 UART: Running Caliptra FMC ...
2,764,458 UART:
2,764,512 UART: [state] CFI Enabled
2,775,232 UART: [fht] FMC Alias Private Key: 7
2,893,337 UART: [art] Extend RT PCRs Done
2,893,765 UART: [art] Lock RT PCRs Done
2,895,513 UART: [art] Populate DV Done
2,903,709 UART: [fht] FMC Alias Private Key: 7
2,904,659 UART: [art] Derive CDI
2,904,939 UART: [art] Store in slot 0x4
2,990,626 UART: [art] Derive Key Pair
2,990,986 UART: [art] Store priv key in slot 0x5
3,004,296 UART: [art] Derive Key Pair - Done
3,018,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,034,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,035,072 UART: [art] PUB.X = 72B2F8245B7F22A868A69B0A6EDB15CB9986A2865A574C7042099F69201CD92A9784B25573321ACF8FAB6664E2A21E41
3,041,834 UART: [art] PUB.Y = C80C036DE3B4239B4E148822348A4F903C71F415939F8E30C7845A0AC859193A338777F5FE318598CFC3383583D0954C
3,048,765 UART: [art] SIG.R = C4F47DF79CD24CB665922E6E1E15432925E74829E4BBCC1BFA9F57377EF55AA14693C9C2A2CCACE00FEA2BAE8E0CF4F4
3,055,553 UART: [art] SIG.S = BD190F8ADEA68EF47DBE92A01559024BFDA37BF5CBF2A1BBEBE022B5EDF2BEDB1628C4ADAFD84FC7EF738878510D2874
3,079,788 UART: Caliptra RT
3,080,039 UART: [state] CFI Enabled
3,199,567 UART: [rt] RT listening for mailbox commands...
3,200,707 writing to cptra_bootfsm_go
4,182,400 UART:
4,182,416 UART: Running Caliptra FMC ...
4,182,824 UART:
4,182,878 UART: [state] CFI Enabled
4,184,009 UART: [art] Skip pcr extension
4,184,418 UART: [art] Extend RT PCRs Done
4,184,846 UART: [art] Lock RT PCRs Done
4,186,125 UART: [art] Populate DV Done
4,194,447 UART: [fht] FMC Alias Private Key: 7
4,195,611 UART: [art] Derive CDI
4,195,891 UART: [art] Store in slot 0x4
4,282,022 UART: [art] Derive Key Pair
4,282,382 UART: [art] Store priv key in slot 0x5
4,295,928 UART: [art] Derive Key Pair - Done
4,310,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,325,647 UART: [art] Erasing AUTHORITY.KEYID = 7
4,326,412 UART: [art] PUB.X = 72B2F8245B7F22A868A69B0A6EDB15CB9986A2865A574C7042099F69201CD92A9784B25573321ACF8FAB6664E2A21E41
4,333,174 UART: [art] PUB.Y = C80C036DE3B4239B4E148822348A4F903C71F415939F8E30C7845A0AC859193A338777F5FE318598CFC3383583D0954C
4,340,105 UART: [art] SIG.R = C4F47DF79CD24CB665922E6E1E15432925E74829E4BBCC1BFA9F57377EF55AA14693C9C2A2CCACE00FEA2BAE8E0CF4F4
4,346,893 UART: [art] SIG.S = BD190F8ADEA68EF47DBE92A01559024BFDA37BF5CBF2A1BBEBE022B5EDF2BEDB1628C4ADAFD84FC7EF738878510D2874
4,370,834 UART: Caliptra RT
4,371,085 UART: [state] CFI Enabled
4,732,434 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Production
86,002 UART: [state] DebugLocked = Yes
86,688 UART: [state] Starting the WD Timer 40000000 cycles
88,353 UART: [kat] SHA2-256
891,903 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,007 UART: [kat] ++
896,159 UART: [kat] sha1
900,537 UART: [kat] SHA2-256
902,477 UART: [kat] SHA2-384
905,184 UART: [kat] SHA2-512-ACC
907,085 UART: [kat] ECC-384
917,098 UART: [kat] HMAC-384Kdf
921,662 UART: [kat] LMS
1,169,974 UART: [kat] --
1,170,901 UART: [cold-reset] ++
1,171,434 UART: [fht] FHT @ 0x50003400
1,174,142 UART: [idev] ++
1,174,310 UART: [idev] CDI.KEYID = 6
1,174,671 UART: [idev] SUBJECT.KEYID = 7
1,175,096 UART: [idev] UDS.KEYID = 0
1,175,442 ready_for_fw is high
1,175,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,030 UART: [idev] Erasing UDS.KEYID = 0
1,200,285 UART: [idev] Sha1 KeyId Algorithm
1,209,022 UART: [idev] --
1,210,003 UART: [ldev] ++
1,210,171 UART: [ldev] CDI.KEYID = 6
1,210,535 UART: [ldev] SUBJECT.KEYID = 5
1,210,962 UART: [ldev] AUTHORITY.KEYID = 7
1,211,425 UART: [ldev] FE.KEYID = 1
1,216,741 UART: [ldev] Erasing FE.KEYID = 1
1,242,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,344 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,038 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,908 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,614 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,668 UART: [ldev] --
1,281,959 UART: [fwproc] Wait for Commands...
1,282,708 UART: [fwproc] Recv command 0x46574c44
1,283,441 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,610 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,785 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,163 >>> mbox cmd response: success
2,852,354 UART: [afmc] ++
2,852,522 UART: [afmc] CDI.KEYID = 6
2,852,885 UART: [afmc] SUBJECT.KEYID = 7
2,853,311 UART: [afmc] AUTHORITY.KEYID = 5
2,889,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,730 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,912,446 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,918,329 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,924,034 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,780 UART: [afmc] --
2,932,756 UART: [cold-reset] --
2,933,406 UART: [state] Locking Datavault
2,934,509 UART: [state] Locking PCR0, PCR1 and PCR31
2,935,113 UART: [state] Locking ICCM
2,935,557 UART: [exit] Launching FMC @ 0x40000130
2,940,887 UART:
2,940,903 UART: Running Caliptra FMC ...
2,941,311 UART:
2,941,454 UART: [state] CFI Enabled
2,951,690 UART: [fht] FMC Alias Private Key: 7
3,070,285 UART: [art] Extend RT PCRs Done
3,070,713 UART: [art] Lock RT PCRs Done
3,072,203 UART: [art] Populate DV Done
3,080,409 UART: [fht] FMC Alias Private Key: 7
3,081,461 UART: [art] Derive CDI
3,081,741 UART: [art] Store in slot 0x4
3,167,800 UART: [art] Derive Key Pair
3,168,160 UART: [art] Store priv key in slot 0x5
3,181,570 UART: [art] Derive Key Pair - Done
3,196,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,505 UART: [art] PUB.X = F4F74183C3FA7627D70F6FC410F62F3768DADEAB2C9F5834AE7C93CFAB0F1F9F14AC5A34FBA95BCFB443E30FFACB19A8
3,219,296 UART: [art] PUB.Y = 9E8C5D23F097EF4ABB0499BAF47E8FC46120232364D898F2DC26D2A378A3746EF735D5F5C1A1EA234A9EF62F5297CA40
3,226,253 UART: [art] SIG.R = 0D2B212F330D245EC7902FAE0BED0292C8DAA92F939405A23E2172352BFC409EB5E3008CC2C950D848A85119A829E60A
3,232,987 UART: [art] SIG.S = 1F966619020A7ECDC75F7159355BEBE074DF90706A3DBD353A19320F2AF26BC790CAC2F1DEC1043AF6E2DACD1618FBF3
3,257,255 UART: Caliptra RT
3,257,598 UART: [state] CFI Enabled
3,377,505 UART: [rt] RT listening for mailbox commands...
3,378,631 writing to cptra_bootfsm_go
3,378,723 UART:
3,378,739 UART: Running Caliptra ROM ...
3,379,147 UART:
3,379,289 UART: [state] CFI Enabled
3,381,980 UART: [state] LifecycleState = Production
3,382,588 UART: [state] DebugLocked = Yes
3,383,166 UART: [state] Starting the WD Timer 40000000 cycles
3,384,729 UART: [kat] SHA2-256
4,188,279 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,192,383 UART: [kat] ++
4,192,535 UART: [kat] sha1
4,196,777 UART: [kat] SHA2-256
4,198,717 UART: [kat] SHA2-384
4,201,426 UART: [kat] SHA2-512-ACC
4,203,327 UART: [kat] ECC-384
4,213,348 UART: [kat] HMAC-384Kdf
4,217,996 UART: [kat] LMS
4,466,308 UART: [kat] --
4,467,354 UART: [warm-reset] ++
4,468,233 UART: [warm-reset] --
4,468,988 UART: [state] Locking Datavault
4,469,696 UART: [state] Locking PCR0, PCR1 and PCR31
4,470,300 UART: [state] Locking ICCM
4,470,892 UART: [exit] Launching FMC @ 0x40000130
4,476,222 UART:
4,476,238 UART: Running Caliptra FMC ...
4,476,646 UART:
4,476,789 UART: [state] CFI Enabled
4,478,116 UART: [art] Skip pcr extension
4,478,525 UART: [art] Extend RT PCRs Done
4,478,953 UART: [art] Lock RT PCRs Done
4,480,480 UART: [art] Populate DV Done
4,488,718 UART: [fht] FMC Alias Private Key: 7
4,489,818 UART: [art] Derive CDI
4,490,098 UART: [art] Store in slot 0x4
4,575,331 UART: [art] Derive Key Pair
4,575,691 UART: [art] Store priv key in slot 0x5
4,589,343 UART: [art] Derive Key Pair - Done
4,604,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,620,025 UART: [art] Erasing AUTHORITY.KEYID = 7
4,620,790 UART: [art] PUB.X = F4F74183C3FA7627D70F6FC410F62F3768DADEAB2C9F5834AE7C93CFAB0F1F9F14AC5A34FBA95BCFB443E30FFACB19A8
4,627,581 UART: [art] PUB.Y = 9E8C5D23F097EF4ABB0499BAF47E8FC46120232364D898F2DC26D2A378A3746EF735D5F5C1A1EA234A9EF62F5297CA40
4,634,538 UART: [art] SIG.R = 0D2B212F330D245EC7902FAE0BED0292C8DAA92F939405A23E2172352BFC409EB5E3008CC2C950D848A85119A829E60A
4,641,272 UART: [art] SIG.S = 1F966619020A7ECDC75F7159355BEBE074DF90706A3DBD353A19320F2AF26BC790CAC2F1DEC1043AF6E2DACD1618FBF3
4,665,098 UART: Caliptra RT
4,665,441 UART: [state] CFI Enabled
5,033,369 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,560 ready_for_fw is high
1,059,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,840 >>> mbox cmd response: success
2,766,125 UART:
2,766,141 UART: Running Caliptra FMC ...
2,766,549 UART:
2,766,692 UART: [state] CFI Enabled
2,777,336 UART: [fht] FMC Alias Private Key: 7
2,895,661 UART: [art] Extend RT PCRs Done
2,896,089 UART: [art] Lock RT PCRs Done
2,897,551 UART: [art] Populate DV Done
2,905,711 UART: [fht] FMC Alias Private Key: 7
2,906,639 UART: [art] Derive CDI
2,906,919 UART: [art] Store in slot 0x4
2,992,880 UART: [art] Derive Key Pair
2,993,240 UART: [art] Store priv key in slot 0x5
3,006,874 UART: [art] Derive Key Pair - Done
3,021,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,037,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,038,238 UART: [art] PUB.X = 93E23E687C171C397A626CF7F5D273A4D8DF92F5321CD47363B7DD9F98463EABB940AA6FF5E6E3E171E3CB4F5EE714DA
3,045,024 UART: [art] PUB.Y = D52FB55F6B248BA53F3CBE86EB999046396A0E3F12F08B0DFB3012589E69DE33ACE39386A0D0F2464F9A1F66208A6898
3,051,974 UART: [art] SIG.R = 6422A4606836581102D1F8B461F5E15373F43B7CE56C663C7C3198993A18ED56BA45F878A8A11F45A0BDECC0271BAFC3
3,058,743 UART: [art] SIG.S = 223058CE966045355B96548C4E26B9EE37A4A92D91E2E7B94F419C5A469111765DA3CF90A7624B5CBC4EE5CA09B4C0AE
3,081,802 UART: Caliptra RT
3,082,145 UART: [state] CFI Enabled
3,202,568 UART: [rt] RT listening for mailbox commands...
3,203,718 writing to cptra_bootfsm_go
4,185,390 UART:
4,185,406 UART: Running Caliptra FMC ...
4,185,814 UART:
4,185,957 UART: [state] CFI Enabled
4,187,360 UART: [art] Skip pcr extension
4,187,769 UART: [art] Extend RT PCRs Done
4,188,197 UART: [art] Lock RT PCRs Done
4,189,210 UART: [art] Populate DV Done
4,197,522 UART: [fht] FMC Alias Private Key: 7
4,198,500 UART: [art] Derive CDI
4,198,780 UART: [art] Store in slot 0x4
4,284,381 UART: [art] Derive Key Pair
4,284,741 UART: [art] Store priv key in slot 0x5
4,297,953 UART: [art] Derive Key Pair - Done
4,312,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,328,282 UART: [art] Erasing AUTHORITY.KEYID = 7
4,329,047 UART: [art] PUB.X = 93E23E687C171C397A626CF7F5D273A4D8DF92F5321CD47363B7DD9F98463EABB940AA6FF5E6E3E171E3CB4F5EE714DA
4,335,833 UART: [art] PUB.Y = D52FB55F6B248BA53F3CBE86EB999046396A0E3F12F08B0DFB3012589E69DE33ACE39386A0D0F2464F9A1F66208A6898
4,342,783 UART: [art] SIG.R = 6422A4606836581102D1F8B461F5E15373F43B7CE56C663C7C3198993A18ED56BA45F878A8A11F45A0BDECC0271BAFC3
4,349,552 UART: [art] SIG.S = 223058CE966045355B96548C4E26B9EE37A4A92D91E2E7B94F419C5A469111765DA3CF90A7624B5CBC4EE5CA09B4C0AE
4,373,177 UART: Caliptra RT
4,373,520 UART: [state] CFI Enabled
4,740,538 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Production
85,851 UART: [state] DebugLocked = Yes
86,409 UART: [state] Starting the WD Timer 40000000 cycles
88,090 UART: [kat] SHA2-256
893,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,865 UART: [kat] ++
898,017 UART: [kat] sha1
902,397 UART: [kat] SHA2-256
904,337 UART: [kat] SHA2-384
906,856 UART: [kat] SHA2-512-ACC
908,757 UART: [kat] ECC-384
918,262 UART: [kat] HMAC-384Kdf
922,912 UART: [kat] LMS
1,171,240 UART: [kat] --
1,172,309 UART: [cold-reset] ++
1,172,792 UART: [fht] FHT @ 0x50003400
1,175,407 UART: [idev] ++
1,175,575 UART: [idev] CDI.KEYID = 6
1,175,935 UART: [idev] SUBJECT.KEYID = 7
1,176,359 UART: [idev] UDS.KEYID = 0
1,176,704 ready_for_fw is high
1,176,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,626 UART: [idev] Erasing UDS.KEYID = 0
1,201,504 UART: [idev] Sha1 KeyId Algorithm
1,210,043 UART: [idev] --
1,211,209 UART: [ldev] ++
1,211,377 UART: [ldev] CDI.KEYID = 6
1,211,740 UART: [ldev] SUBJECT.KEYID = 5
1,212,166 UART: [ldev] AUTHORITY.KEYID = 7
1,212,629 UART: [ldev] FE.KEYID = 1
1,217,921 UART: [ldev] Erasing FE.KEYID = 1
1,244,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,073 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,767 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,639 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,345 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,444 UART: [ldev] --
1,283,849 UART: [fwproc] Wait for Commands...
1,284,463 UART: [fwproc] Recv command 0x46574c44
1,285,191 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,681,992 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,713,162 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,853,546 >>> mbox cmd response: success
2,854,741 UART: [afmc] ++
2,854,909 UART: [afmc] CDI.KEYID = 6
2,855,271 UART: [afmc] SUBJECT.KEYID = 7
2,855,696 UART: [afmc] AUTHORITY.KEYID = 5
2,891,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,907,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,908,064 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,913,779 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,919,664 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,925,369 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,933,063 UART: [afmc] --
2,934,116 UART: [cold-reset] --
2,934,930 UART: [state] Locking Datavault
2,935,935 UART: [state] Locking PCR0, PCR1 and PCR31
2,936,539 UART: [state] Locking ICCM
2,937,127 UART: [exit] Launching FMC @ 0x40000130
2,942,457 UART:
2,942,473 UART: Running Caliptra FMC ...
2,942,881 UART:
2,942,935 UART: [state] CFI Enabled
2,953,617 UART: [fht] FMC Alias Private Key: 7
3,072,014 UART: [art] Extend RT PCRs Done
3,072,442 UART: [art] Lock RT PCRs Done
3,073,958 UART: [art] Populate DV Done
3,082,220 UART: [fht] FMC Alias Private Key: 7
3,083,310 UART: [art] Derive CDI
3,083,590 UART: [art] Store in slot 0x4
3,169,573 UART: [art] Derive Key Pair
3,169,933 UART: [art] Store priv key in slot 0x5
3,183,219 UART: [art] Derive Key Pair - Done
3,197,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,213,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,977 UART: [art] PUB.X = 8AE174F553BE52F31DFFEBD7757BD33782ABBF484C564EEDADA4035603B7F91B9B561290E6FA37DA703B3BDB6B5FDFBC
3,220,767 UART: [art] PUB.Y = AFD7497062471050FE2EB48F3C1BB4BDE7D23B6C5A0FC834E71EC4B449754E095712C16C803C8583C480E9CB9F4CEBF8
3,227,723 UART: [art] SIG.R = F9676A0023B1D39C4D20F4B4CB59E44F604EF5D8427DD4C36BFC278379492AE8CC531BCA37292B7AD2B9309D1AE6CE39
3,234,483 UART: [art] SIG.S = E140AB549DEB4DD40720217AC080C6E2BB144F67F9A032A2F0E2C9EFB65216AF227790959CAFEF5EE7F9C3DEB772811A
3,258,582 UART: Caliptra RT
3,258,833 UART: [state] CFI Enabled
3,379,185 UART: [rt] RT listening for mailbox commands...
3,380,513 writing to cptra_bootfsm_go
3,380,605 UART:
3,380,621 UART: Running Caliptra ROM ...
3,381,029 UART:
3,381,084 UART: [state] CFI Enabled
3,384,087 UART: [state] LifecycleState = Production
3,384,695 UART: [state] DebugLocked = Yes
3,385,349 UART: [state] Starting the WD Timer 40000000 cycles
3,386,878 UART: [kat] SHA2-256
4,192,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,196,653 UART: [kat] ++
4,196,805 UART: [kat] sha1
4,201,121 UART: [kat] SHA2-256
4,203,061 UART: [kat] SHA2-384
4,205,890 UART: [kat] SHA2-512-ACC
4,207,791 UART: [kat] ECC-384
4,217,424 UART: [kat] HMAC-384Kdf
4,221,974 UART: [kat] LMS
4,470,302 UART: [kat] --
4,471,420 UART: [warm-reset] ++
4,472,433 UART: [warm-reset] --
4,473,452 UART: [state] Locking Datavault
4,474,188 UART: [state] Locking PCR0, PCR1 and PCR31
4,474,792 UART: [state] Locking ICCM
4,475,282 UART: [exit] Launching FMC @ 0x40000130
4,480,612 UART:
4,480,628 UART: Running Caliptra FMC ...
4,481,036 UART:
4,481,090 UART: [state] CFI Enabled
4,482,387 UART: [art] Skip pcr extension
4,482,796 UART: [art] Extend RT PCRs Done
4,483,224 UART: [art] Lock RT PCRs Done
4,484,353 UART: [art] Populate DV Done
4,492,857 UART: [fht] FMC Alias Private Key: 7
4,493,929 UART: [art] Derive CDI
4,494,209 UART: [art] Store in slot 0x4
4,580,188 UART: [art] Derive Key Pair
4,580,548 UART: [art] Store priv key in slot 0x5
4,593,866 UART: [art] Derive Key Pair - Done
4,608,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,624,369 UART: [art] Erasing AUTHORITY.KEYID = 7
4,625,134 UART: [art] PUB.X = 8AE174F553BE52F31DFFEBD7757BD33782ABBF484C564EEDADA4035603B7F91B9B561290E6FA37DA703B3BDB6B5FDFBC
4,631,924 UART: [art] PUB.Y = AFD7497062471050FE2EB48F3C1BB4BDE7D23B6C5A0FC834E71EC4B449754E095712C16C803C8583C480E9CB9F4CEBF8
4,638,880 UART: [art] SIG.R = F9676A0023B1D39C4D20F4B4CB59E44F604EF5D8427DD4C36BFC278379492AE8CC531BCA37292B7AD2B9309D1AE6CE39
4,645,640 UART: [art] SIG.S = E140AB549DEB4DD40720217AC080C6E2BB144F67F9A032A2F0E2C9EFB65216AF227790959CAFEF5EE7F9C3DEB772811A
4,669,169 UART: Caliptra RT
4,669,420 UART: [state] CFI Enabled
5,035,453 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,228 ready_for_fw is high
1,060,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,719 >>> mbox cmd response: success
2,767,067 UART:
2,767,083 UART: Running Caliptra FMC ...
2,767,491 UART:
2,767,545 UART: [state] CFI Enabled
2,778,103 UART: [fht] FMC Alias Private Key: 7
2,896,670 UART: [art] Extend RT PCRs Done
2,897,098 UART: [art] Lock RT PCRs Done
2,898,474 UART: [art] Populate DV Done
2,906,914 UART: [fht] FMC Alias Private Key: 7
2,907,890 UART: [art] Derive CDI
2,908,170 UART: [art] Store in slot 0x4
2,994,265 UART: [art] Derive Key Pair
2,994,625 UART: [art] Store priv key in slot 0x5
3,007,885 UART: [art] Derive Key Pair - Done
3,022,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,038,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,039,007 UART: [art] PUB.X = 8473EF7A839DF2A89A2793D387EE6FEAE1CFFA7B522C4401B9E52A82F15F3199A62EBF1FC901F01D89475A3D87FC9747
3,045,783 UART: [art] PUB.Y = 7058BDF0D602EC55ABE73308021A45D1997B81A8A91395D436B5548E676E90361D41370C133DBF7B657B0F4D846F2CB5
3,052,716 UART: [art] SIG.R = 765339DF5F57930C5F80F5DA8044EE58E34777A0481F4455DB02CB782E68D802DBE2AA987919E30E8DF9A9E7BF4A1130
3,059,478 UART: [art] SIG.S = 7C140C940C8A08B0C06DAA4E1A51C79E5D9907DC3135C6A60FB089A81B96250F3F72E3BA9371DC459109D17BDBA2C252
3,084,065 UART: Caliptra RT
3,084,316 UART: [state] CFI Enabled
3,203,715 UART: [rt] RT listening for mailbox commands...
3,204,911 writing to cptra_bootfsm_go
4,186,924 UART:
4,186,940 UART: Running Caliptra FMC ...
4,187,348 UART:
4,187,402 UART: [state] CFI Enabled
4,188,827 UART: [art] Skip pcr extension
4,189,236 UART: [art] Extend RT PCRs Done
4,189,664 UART: [art] Lock RT PCRs Done
4,190,769 UART: [art] Populate DV Done
4,199,023 UART: [fht] FMC Alias Private Key: 7
4,200,021 UART: [art] Derive CDI
4,200,301 UART: [art] Store in slot 0x4
4,286,346 UART: [art] Derive Key Pair
4,286,706 UART: [art] Store priv key in slot 0x5
4,300,030 UART: [art] Derive Key Pair - Done
4,314,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,330,223 UART: [art] Erasing AUTHORITY.KEYID = 7
4,330,988 UART: [art] PUB.X = 8473EF7A839DF2A89A2793D387EE6FEAE1CFFA7B522C4401B9E52A82F15F3199A62EBF1FC901F01D89475A3D87FC9747
4,337,764 UART: [art] PUB.Y = 7058BDF0D602EC55ABE73308021A45D1997B81A8A91395D436B5548E676E90361D41370C133DBF7B657B0F4D846F2CB5
4,344,697 UART: [art] SIG.R = 765339DF5F57930C5F80F5DA8044EE58E34777A0481F4455DB02CB782E68D802DBE2AA987919E30E8DF9A9E7BF4A1130
4,351,459 UART: [art] SIG.S = 7C140C940C8A08B0C06DAA4E1A51C79E5D9907DC3135C6A60FB089A81B96250F3F72E3BA9371DC459109D17BDBA2C252
4,375,624 UART: Caliptra RT
4,375,875 UART: [state] CFI Enabled
4,740,747 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,588 UART: [state] LifecycleState = Production
86,196 UART: [state] DebugLocked = Yes
86,834 UART: [state] Starting the WD Timer 40000000 cycles
88,403 UART: [kat] SHA2-256
894,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,178 UART: [kat] ++
898,330 UART: [kat] sha1
902,666 UART: [kat] SHA2-256
904,606 UART: [kat] SHA2-384
907,355 UART: [kat] SHA2-512-ACC
909,256 UART: [kat] ECC-384
918,751 UART: [kat] HMAC-384Kdf
923,371 UART: [kat] LMS
1,171,699 UART: [kat] --
1,172,438 UART: [cold-reset] ++
1,172,843 UART: [fht] FHT @ 0x50003400
1,175,344 UART: [idev] ++
1,175,512 UART: [idev] CDI.KEYID = 6
1,175,872 UART: [idev] SUBJECT.KEYID = 7
1,176,296 UART: [idev] UDS.KEYID = 0
1,176,641 ready_for_fw is high
1,176,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,013 UART: [idev] Erasing UDS.KEYID = 0
1,201,207 UART: [idev] Sha1 KeyId Algorithm
1,209,642 UART: [idev] --
1,210,516 UART: [ldev] ++
1,210,684 UART: [ldev] CDI.KEYID = 6
1,211,047 UART: [ldev] SUBJECT.KEYID = 5
1,211,473 UART: [ldev] AUTHORITY.KEYID = 7
1,211,936 UART: [ldev] FE.KEYID = 1
1,217,150 UART: [ldev] Erasing FE.KEYID = 1
1,244,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,154 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,848 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,720 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,426 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,467 UART: [ldev] --
1,283,764 UART: [fwproc] Wait for Commands...
1,284,338 UART: [fwproc] Recv command 0x46574c44
1,285,066 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,729 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,899 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,133 >>> mbox cmd response: success
2,853,256 UART: [afmc] ++
2,853,424 UART: [afmc] CDI.KEYID = 6
2,853,786 UART: [afmc] SUBJECT.KEYID = 7
2,854,211 UART: [afmc] AUTHORITY.KEYID = 5
2,890,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,906,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,907,447 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,913,162 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,919,047 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,924,752 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,932,564 UART: [afmc] --
2,933,629 UART: [cold-reset] --
2,934,497 UART: [state] Locking Datavault
2,935,642 UART: [state] Locking PCR0, PCR1 and PCR31
2,936,246 UART: [state] Locking ICCM
2,936,714 UART: [exit] Launching FMC @ 0x40000130
2,942,044 UART:
2,942,060 UART: Running Caliptra FMC ...
2,942,468 UART:
2,942,611 UART: [state] CFI Enabled
2,953,225 UART: [fht] FMC Alias Private Key: 7
3,071,650 UART: [art] Extend RT PCRs Done
3,072,078 UART: [art] Lock RT PCRs Done
3,073,646 UART: [art] Populate DV Done
3,081,576 UART: [fht] FMC Alias Private Key: 7
3,082,550 UART: [art] Derive CDI
3,082,830 UART: [art] Store in slot 0x4
3,168,821 UART: [art] Derive Key Pair
3,169,181 UART: [art] Store priv key in slot 0x5
3,182,091 UART: [art] Derive Key Pair - Done
3,196,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,313 UART: [art] PUB.X = AC39673AF561689E2156A5E69023B89BE93A1514D068A0E28931697AE185AA17437E34F348DB374CC4696B107CD5DEDC
3,220,083 UART: [art] PUB.Y = 1771E36AC61E5859CCF0A287D5AB7A3A2D67079ED4A6BBD06779E4A6BA08EC98362B737EEBA3D756D75FA499CAC97A7D
3,227,045 UART: [art] SIG.R = C0C37B893B4FB9DF70CFCBB50C4000D83A3D411A9B421B5AED850CA352658F53AF08AA35669AD900FF6D37EBA2FBF282
3,233,782 UART: [art] SIG.S = B2DC9D85A636A94FEED3DC385B784E1BB055894FD1DE4E2DF588B052DC8C6E392CA664AD670E94894C1D35318F248000
3,257,531 UART: Caliptra RT
3,257,874 UART: [state] CFI Enabled
3,378,170 UART: [rt] RT listening for mailbox commands...
3,379,320 writing to cptra_bootfsm_go
3,379,412 UART:
3,379,428 UART: Running Caliptra ROM ...
3,379,836 UART:
3,379,978 UART: [state] CFI Enabled
3,382,821 UART: [state] LifecycleState = Production
3,383,429 UART: [state] DebugLocked = Yes
3,384,027 UART: [state] Starting the WD Timer 40000000 cycles
3,385,688 UART: [kat] SHA2-256
4,191,338 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,195,463 UART: [kat] ++
4,195,615 UART: [kat] sha1
4,199,885 UART: [kat] SHA2-256
4,201,825 UART: [kat] SHA2-384
4,204,422 UART: [kat] SHA2-512-ACC
4,206,323 UART: [kat] ECC-384
4,215,888 UART: [kat] HMAC-384Kdf
4,220,364 UART: [kat] LMS
4,468,692 UART: [kat] --
4,469,708 UART: [warm-reset] ++
4,470,447 UART: [warm-reset] --
4,471,324 UART: [state] Locking Datavault
4,472,096 UART: [state] Locking PCR0, PCR1 and PCR31
4,472,700 UART: [state] Locking ICCM
4,473,202 UART: [exit] Launching FMC @ 0x40000130
4,478,532 UART:
4,478,548 UART: Running Caliptra FMC ...
4,478,956 UART:
4,479,099 UART: [state] CFI Enabled
4,480,656 UART: [art] Skip pcr extension
4,481,065 UART: [art] Extend RT PCRs Done
4,481,493 UART: [art] Lock RT PCRs Done
4,482,648 UART: [art] Populate DV Done
4,490,930 UART: [fht] FMC Alias Private Key: 7
4,492,056 UART: [art] Derive CDI
4,492,336 UART: [art] Store in slot 0x4
4,578,643 UART: [art] Derive Key Pair
4,579,003 UART: [art] Store priv key in slot 0x5
4,592,535 UART: [art] Derive Key Pair - Done
4,607,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,623,304 UART: [art] Erasing AUTHORITY.KEYID = 7
4,624,069 UART: [art] PUB.X = AC39673AF561689E2156A5E69023B89BE93A1514D068A0E28931697AE185AA17437E34F348DB374CC4696B107CD5DEDC
4,630,839 UART: [art] PUB.Y = 1771E36AC61E5859CCF0A287D5AB7A3A2D67079ED4A6BBD06779E4A6BA08EC98362B737EEBA3D756D75FA499CAC97A7D
4,637,801 UART: [art] SIG.R = C0C37B893B4FB9DF70CFCBB50C4000D83A3D411A9B421B5AED850CA352658F53AF08AA35669AD900FF6D37EBA2FBF282
4,644,538 UART: [art] SIG.S = B2DC9D85A636A94FEED3DC385B784E1BB055894FD1DE4E2DF588B052DC8C6E392CA664AD670E94894C1D35318F248000
4,668,359 UART: Caliptra RT
4,668,702 UART: [state] CFI Enabled
5,028,957 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,813 ready_for_fw is high
1,060,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,552 >>> mbox cmd response: success
2,767,616 UART:
2,767,632 UART: Running Caliptra FMC ...
2,768,040 UART:
2,768,183 UART: [state] CFI Enabled
2,778,553 UART: [fht] FMC Alias Private Key: 7
2,896,988 UART: [art] Extend RT PCRs Done
2,897,416 UART: [art] Lock RT PCRs Done
2,899,088 UART: [art] Populate DV Done
2,907,220 UART: [fht] FMC Alias Private Key: 7
2,908,186 UART: [art] Derive CDI
2,908,466 UART: [art] Store in slot 0x4
2,994,241 UART: [art] Derive Key Pair
2,994,601 UART: [art] Store priv key in slot 0x5
3,007,767 UART: [art] Derive Key Pair - Done
3,022,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,038,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,039,046 UART: [art] PUB.X = 936B214304557CA553D83FBB9549C11FDC0E1CBDF684ED897F59B8B758ACF91D70539E93B33FF90DF102FE90C6CBABDA
3,045,822 UART: [art] PUB.Y = FC0CAAFBE38993B59092332054F47D46B6F7C53AA9DF75699EDD3AD4C76D480FBC3146ED8E85AD63C3E17447EA9351F0
3,052,780 UART: [art] SIG.R = 3203AF587195459AA03E79A11F4B7A515BB7B0595FFB509C8FB7688E818329295BA37F977AD654E0B76706DAC582E121
3,059,542 UART: [art] SIG.S = BAC36D60E5C0283A569F9AE8E77B465423DB5D3E47AF7AB7EC6E379C41512E35E76ED19594C3CBB62F268028B7837EB8
3,083,510 UART: Caliptra RT
3,083,853 UART: [state] CFI Enabled
3,204,191 UART: [rt] RT listening for mailbox commands...
3,205,191 writing to cptra_bootfsm_go
4,188,711 UART:
4,188,727 UART: Running Caliptra FMC ...
4,189,135 UART:
4,189,278 UART: [state] CFI Enabled
4,190,489 UART: [art] Skip pcr extension
4,190,898 UART: [art] Extend RT PCRs Done
4,191,326 UART: [art] Lock RT PCRs Done
4,192,577 UART: [art] Populate DV Done
4,200,919 UART: [fht] FMC Alias Private Key: 7
4,201,891 UART: [art] Derive CDI
4,202,171 UART: [art] Store in slot 0x4
4,288,276 UART: [art] Derive Key Pair
4,288,636 UART: [art] Store priv key in slot 0x5
4,302,128 UART: [art] Derive Key Pair - Done
4,316,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,332,478 UART: [art] Erasing AUTHORITY.KEYID = 7
4,333,243 UART: [art] PUB.X = 936B214304557CA553D83FBB9549C11FDC0E1CBDF684ED897F59B8B758ACF91D70539E93B33FF90DF102FE90C6CBABDA
4,340,019 UART: [art] PUB.Y = FC0CAAFBE38993B59092332054F47D46B6F7C53AA9DF75699EDD3AD4C76D480FBC3146ED8E85AD63C3E17447EA9351F0
4,346,977 UART: [art] SIG.R = 3203AF587195459AA03E79A11F4B7A515BB7B0595FFB509C8FB7688E818329295BA37F977AD654E0B76706DAC582E121
4,353,739 UART: [art] SIG.S = BAC36D60E5C0283A569F9AE8E77B465423DB5D3E47AF7AB7EC6E379C41512E35E76ED19594C3CBB62F268028B7837EB8
4,377,243 UART: Caliptra RT
4,377,586 UART: [state] CFI Enabled
4,741,945 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
191,614 UART:
192,013 UART: Running Caliptra ROM ...
193,146 UART:
193,298 UART: [state] CFI Enabled
264,872 UART: [state] LifecycleState = Production
266,723 UART: [state] DebugLocked = Yes
268,163 UART: [state] Starting the Watchdog Timer 40000000 cycles
272,936 UART: [kat] SHA2-256
442,667 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,173 UART: [kat] ++
453,684 UART: [kat] sha1
464,945 UART: [kat] SHA2-256
467,654 UART: [kat] SHA2-384
473,012 UART: [kat] SHA2-512-ACC
475,408 UART: [kat] ECC-384
2,767,623 UART: [kat] HMAC-384Kdf
2,799,620 UART: [kat] LMS
3,989,936 UART: [kat] --
3,995,302 UART: [cold-reset] ++
3,997,502 UART: [fht] Storing FHT @ 0x50003400
4,009,126 UART: [idev] ++
4,009,703 UART: [idev] CDI.KEYID = 6
4,010,622 UART: [idev] SUBJECT.KEYID = 7
4,011,870 UART: [idev] UDS.KEYID = 0
4,012,801 ready_for_fw is high
4,013,008 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,117,377 UART: [idev] Erasing UDS.KEYID = 0
7,348,350 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,596 UART: [idev] --
7,374,702 UART: [ldev] ++
7,375,291 UART: [ldev] CDI.KEYID = 6
7,376,261 UART: [ldev] SUBJECT.KEYID = 5
7,377,425 UART: [ldev] AUTHORITY.KEYID = 7
7,378,715 UART: [ldev] FE.KEYID = 1
7,421,342 UART: [ldev] Erasing FE.KEYID = 1
10,755,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,621 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,061,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,075,786 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,090,139 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,108,142 UART: [ldev] --
13,113,583 UART: [fwproc] Waiting for Commands...
13,116,548 UART: [fwproc] Received command 0x46574c44
13,118,729 UART: [fwproc] Received Image of size 82832 bytes
16,821,777 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,898,184 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,971,410 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,175,085 >>> mbox cmd response: success
17,178,408 UART: [afmc] ++
17,179,045 UART: [afmc] CDI.KEYID = 6
17,179,938 UART: [afmc] SUBJECT.KEYID = 7
17,181,067 UART: [afmc] AUTHORITY.KEYID = 5
20,557,959 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,855,647 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,857,913 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
22,872,390 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
22,887,099 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
22,901,532 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
22,923,245 UART: [afmc] --
22,927,224 UART: [cold-reset] --
22,930,817 UART: [state] Locking Datavault
22,936,227 UART: [state] Locking PCR0, PCR1 and PCR31
22,938,003 UART: [state] Locking ICCM
22,940,468 UART: [exit] Launching FMC @ 0x40000130
22,948,897 UART:
22,949,138 UART: Running Caliptra FMC ...
22,950,173 UART:
22,950,322 UART: [state] CFI Enabled
23,014,909 UART: [fht] FMC Alias Private Key: 7
25,355,774 UART: [art] Extend RT PCRs Done
25,357,030 UART: [art] Lock RT PCRs Done
25,358,585 UART: [art] Populate DV Done
25,364,173 UART: [fht] FMC Alias Private Key: 7
25,365,740 UART: [art] Derive CDI
25,366,484 UART: [art] Store in slot 0x4
25,423,044 UART: [art] Derive Key Pair
25,424,340 UART: [art] Store priv key in slot 0x5
28,716,254 UART: [art] Derive Key Pair - Done
28,729,029 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,018,677 UART: [art] Erasing AUTHORITY.KEYID = 7
31,020,809 UART: [art] PUB.X = C4A3A6BADC0FFCD6F94BA9F5DBC18B343D6B9F1D9A8CA93372ECF6FB3E5EF81C85B06084F125D2D4A2D5FCFCEC758A41
31,027,541 UART: [art] PUB.Y = FA2240E08C125FC7A6A35A1B1029E77A3B1E5FBE515BA608F9CA883AD5420567A441D1BB00A2B87D3EBDBFF035F78937
31,034,752 UART: [art] SIG.R = 1F6F539D28E4D4EECCD2CD3FEEE068FCF01537FEC32BAA8A39EA1928F2913EF9020F5015AAA0AB7524ECAEA370AF18FD
31,042,187 UART: [art] SIG.S = CCB01199F18BED26F53228F24725D277B5B620D011915A02007D06358FF4300F11D590CE895E688C27D2C4B279541F4D
32,347,109 UART: mbox::rt_entry...
32,348,692 UART: ____ _ _ _ ____ _____
32,350,607 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,352,615 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,354,549 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,356,483 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,358,417 UART: |_|
32,359,229 UART:
32,488,702 UART: [rt] Runtime listening for mailbox commands...
32,491,302 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
32,492,838 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
561 UART:
718 UART: Running Caliptra ROM ...
1,828 UART:
1,979 UART: [state] CFI Enabled
65,362 UART: [state] LifecycleState = Production
67,364 UART: [state] DebugLocked = Yes
70,071 UART: [state] Starting the Watchdog Timer 40000000 cycles
75,525 UART: [kat] SHA2-256
245,286 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
255,778 UART: [kat] ++
256,243 UART: [kat] sha1
267,146 UART: [kat] SHA2-256
269,838 UART: [kat] SHA2-384
276,149 UART: [kat] SHA2-512-ACC
278,523 UART: [kat] ECC-384
2,569,889 UART: [kat] HMAC-384Kdf
2,584,417 UART: [kat] LMS
3,774,709 UART: [kat] --
3,777,864 UART: [warm-reset] ++
3,782,879 UART: [warm-reset] --
3,786,424 UART: [state] Locking Datavault
3,791,194 UART: [state] Locking PCR0, PCR1 and PCR31
3,792,954 UART: [state] Locking ICCM
3,794,206 UART: [exit] Launching FMC @ 0x40000130
3,802,564 UART:
3,802,800 UART: Running Caliptra FMC ...
3,803,902 UART:
3,804,072 UART: [state] CFI Enabled
3,855,264 UART: [art] Skip pcr extension
3,856,391 UART: [art] Extend RT PCRs Done
3,857,555 UART: [art] Lock RT PCRs Done
3,858,626 UART: [art] Populate DV Done
3,864,407 UART: [fht] FMC Alias Private Key: 7
3,866,429 UART: [art] Derive CDI
3,867,178 UART: [art] Store in slot 0x4
3,923,958 UART: [art] Derive Key Pair
3,924,998 UART: [art] Store priv key in slot 0x5
7,217,480 UART: [art] Derive Key Pair - Done
7,230,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,518,602 UART: [art] Erasing AUTHORITY.KEYID = 7
9,520,124 UART: [art] PUB.X = C4A3A6BADC0FFCD6F94BA9F5DBC18B343D6B9F1D9A8CA93372ECF6FB3E5EF81C85B06084F125D2D4A2D5FCFCEC758A41
9,527,455 UART: [art] PUB.Y = FA2240E08C125FC7A6A35A1B1029E77A3B1E5FBE515BA608F9CA883AD5420567A441D1BB00A2B87D3EBDBFF035F78937
9,534,709 UART: [art] SIG.R = 1F6F539D28E4D4EECCD2CD3FEEE068FCF01537FEC32BAA8A39EA1928F2913EF9020F5015AAA0AB7524ECAEA370AF18FD
9,542,126 UART: [art] SIG.S = CCB01199F18BED26F53228F24725D277B5B620D011915A02007D06358FF4300F11D590CE895E688C27D2C4B279541F4D
10,846,483 UART: mbox::rt_entry...
10,847,441 UART: ____ _ _ _ ____ _____
10,849,559 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,851,566 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,853,494 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,855,426 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,857,354 UART: |_|
10,858,190 UART:
14,531,365 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
3,782,953 ready_for_fw is high
3,783,537 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,279,218 >>> mbox cmd response: success
22,964,855 UART:
22,965,312 UART: Running Caliptra FMC ...
22,966,442 UART:
22,966,610 UART: [state] CFI Enabled
23,016,692 UART: [fht] FMC Alias Private Key: 7
25,356,726 UART: [art] Extend RT PCRs Done
25,357,945 UART: [art] Lock RT PCRs Done
25,359,433 UART: [art] Populate DV Done
25,364,634 UART: [fht] FMC Alias Private Key: 7
25,366,119 UART: [art] Derive CDI
25,366,853 UART: [art] Store in slot 0x4
25,424,485 UART: [art] Derive Key Pair
25,425,502 UART: [art] Store priv key in slot 0x5
28,718,053 UART: [art] Derive Key Pair - Done
28,730,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,018,779 UART: [art] Erasing AUTHORITY.KEYID = 7
31,020,287 UART: [art] PUB.X = B3E1F6275D69A3D757E2299F6813179A3298654B7A3E73B76627B2E22290C18F1BFC1FA9606C93C3488800A8324EA391
31,027,495 UART: [art] PUB.Y = 6FF35217BBE824AE347D298137A7260F0CC9A9C9E698BB643DB495EF1A2610C61CF134D9353867D6CE8DE9B7ADB168D0
31,034,782 UART: [art] SIG.R = 728350DA96189CB91FA9404BAECE9664903ADBA2A4F423486FAF8303BE20F79693ED4D99DFA90F030F86AEACDB8C6DC4
31,042,207 UART: [art] SIG.S = DC09E5CF7F425A704232C1FEE0793FBC3DFD975C9517398C5F949EDD9ADB63912220791F52C38DF50AC7573E32E0E867
32,346,449 UART: mbox::rt_entry...
32,347,404 UART: ____ _ _ _ ____ _____
32,349,385 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,351,391 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,353,320 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,355,283 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,357,227 UART: |_|
32,358,038 UART:
32,488,274 UART: [rt] Runtime listening for mailbox commands...
32,490,300 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
32,491,467 >>> mbox cmd response data (0 bytes)
294 writing to cptra_bootfsm_go
3,609,899 UART:
3,610,238 UART: Running Caliptra FMC ...
3,611,288 UART:
3,611,442 UART: [state] CFI Enabled
3,676,198 UART: [art] Skip pcr extension
3,677,348 UART: [art] Extend RT PCRs Done
3,678,501 UART: [art] Lock RT PCRs Done
3,679,629 UART: [art] Populate DV Done
3,685,470 UART: [fht] FMC Alias Private Key: 7
3,686,958 UART: [art] Derive CDI
3,687,705 UART: [art] Store in slot 0x4
3,744,945 UART: [art] Derive Key Pair
3,746,010 UART: [art] Store priv key in slot 0x5
7,039,738 UART: [art] Derive Key Pair - Done
7,052,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,340,525 UART: [art] Erasing AUTHORITY.KEYID = 7
9,342,032 UART: [art] PUB.X = B3E1F6275D69A3D757E2299F6813179A3298654B7A3E73B76627B2E22290C18F1BFC1FA9606C93C3488800A8324EA391
9,349,300 UART: [art] PUB.Y = 6FF35217BBE824AE347D298137A7260F0CC9A9C9E698BB643DB495EF1A2610C61CF134D9353867D6CE8DE9B7ADB168D0
9,356,547 UART: [art] SIG.R = 728350DA96189CB91FA9404BAECE9664903ADBA2A4F423486FAF8303BE20F79693ED4D99DFA90F030F86AEACDB8C6DC4
9,363,943 UART: [art] SIG.S = DC09E5CF7F425A704232C1FEE0793FBC3DFD975C9517398C5F949EDD9ADB63912220791F52C38DF50AC7573E32E0E867
10,669,045 UART: mbox::rt_entry...
10,670,004 UART: ____ _ _ _ ____ _____
10,672,031 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,674,040 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,675,968 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,677,893 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,679,821 UART: |_|
10,680,703 UART:
14,356,071 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
191,830 UART:
192,200 UART: Running Caliptra ROM ...
193,338 UART:
603,205 UART: [state] CFI Enabled
616,983 UART: [state] LifecycleState = Production
618,740 UART: [state] DebugLocked = Yes
620,868 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,597 UART: [kat] SHA2-256
796,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,892 UART: [kat] ++
807,451 UART: [kat] sha1
817,541 UART: [kat] SHA2-256
820,217 UART: [kat] SHA2-384
826,561 UART: [kat] SHA2-512-ACC
828,922 UART: [kat] ECC-384
3,112,673 UART: [kat] HMAC-384Kdf
3,125,111 UART: [kat] LMS
4,315,186 UART: [kat] --
4,320,498 UART: [cold-reset] ++
4,321,929 UART: [fht] Storing FHT @ 0x50003400
4,332,049 UART: [idev] ++
4,332,615 UART: [idev] CDI.KEYID = 6
4,333,641 UART: [idev] SUBJECT.KEYID = 7
4,334,806 UART: [idev] UDS.KEYID = 0
4,335,844 ready_for_fw is high
4,336,189 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,440,325 UART: [idev] Erasing UDS.KEYID = 0
7,621,215 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,925 UART: [idev] --
7,646,910 UART: [ldev] ++
7,647,466 UART: [ldev] CDI.KEYID = 6
7,648,473 UART: [ldev] SUBJECT.KEYID = 5
7,649,680 UART: [ldev] AUTHORITY.KEYID = 7
7,650,903 UART: [ldev] FE.KEYID = 1
7,660,867 UART: [ldev] Erasing FE.KEYID = 1
10,947,211 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,621 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,253,139 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,267,821 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,282,195 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,302,426 UART: [ldev] --
13,307,205 UART: [fwproc] Waiting for Commands...
13,309,463 UART: [fwproc] Received command 0x46574c44
13,311,642 UART: [fwproc] Received Image of size 82832 bytes
17,015,589 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,090,112 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,163,317 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,366,655 >>> mbox cmd response: success
17,370,148 UART: [afmc] ++
17,370,727 UART: [afmc] CDI.KEYID = 6
17,371,759 UART: [afmc] SUBJECT.KEYID = 7
17,372,914 UART: [afmc] AUTHORITY.KEYID = 5
20,686,874 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,980,475 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,982,784 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
22,997,285 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
23,012,031 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
23,026,454 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
23,048,477 UART: [afmc] --
23,051,901 UART: [cold-reset] --
23,057,199 UART: [state] Locking Datavault
23,062,919 UART: [state] Locking PCR0, PCR1 and PCR31
23,064,675 UART: [state] Locking ICCM
23,066,393 UART: [exit] Launching FMC @ 0x40000130
23,074,805 UART:
23,075,038 UART: Running Caliptra FMC ...
23,076,139 UART:
23,076,295 UART: [state] CFI Enabled
23,084,714 UART: [fht] FMC Alias Private Key: 7
25,424,635 UART: [art] Extend RT PCRs Done
25,425,845 UART: [art] Lock RT PCRs Done
25,427,517 UART: [art] Populate DV Done
25,433,189 UART: [fht] FMC Alias Private Key: 7
25,434,773 UART: [art] Derive CDI
25,435,528 UART: [art] Store in slot 0x4
25,478,352 UART: [art] Derive Key Pair
25,479,377 UART: [art] Store priv key in slot 0x5
28,721,862 UART: [art] Derive Key Pair - Done
28,734,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,015,570 UART: [art] Erasing AUTHORITY.KEYID = 7
31,017,085 UART: [art] PUB.X = 5D98A146C9E981752B1A25600BCB1E30768E6070FD93EE302CAC60FF821C1ABFF7AE10637762F200BAD618C157265397
31,024,290 UART: [art] PUB.Y = F5FFA5CD9B0093B0245DAC39BA4721D8DE0CE711E63FB6ED654B17ECCC9F0F36BCF2FD2E6EDB87057798B088C746EC36
31,031,588 UART: [art] SIG.R = AA88A8A57F2338EFE88D7E2A2C12032333A683E2930E6CB18842C3BDEB314D839982C648CC32D9663C043D56E4AA0881
31,038,930 UART: [art] SIG.S = BBBE75349A9DFE904975B8C290A4E6C502112A43390FE86C341F1114E6693DAFA11101011311AF2B0864543EFAE352EE
32,343,566 UART: mbox::rt_entry...
32,344,502 UART: ____ _ _ _ ____ _____
32,346,476 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,348,480 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,350,406 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,352,326 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,354,243 UART: |_|
32,355,044 UART:
32,486,171 UART: [rt] Runtime listening for mailbox commands...
32,488,186 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
32,489,605 >>> mbox cmd response data (0 bytes)
293 writing to cptra_bootfsm_go
603 UART:
748 UART: Running Caliptra ROM ...
1,830 UART:
8,025,017 UART: [state] CFI Enabled
8,040,198 UART: [state] LifecycleState = Production
8,042,006 UART: [state] DebugLocked = Yes
8,044,350 UART: [state] Starting the Watchdog Timer 40000000 cycles
8,049,087 UART: [kat] SHA2-256
8,218,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,229,360 UART: [kat] ++
8,229,837 UART: [kat] sha1
8,240,611 UART: [kat] SHA2-256
8,243,294 UART: [kat] SHA2-384
8,249,197 UART: [kat] SHA2-512-ACC
8,251,554 UART: [kat] ECC-384
10,535,207 UART: [kat] HMAC-384Kdf
10,546,887 UART: [kat] LMS
11,736,962 UART: [kat] --
11,741,174 UART: [warm-reset] ++
11,747,907 UART: [warm-reset] --
11,751,018 UART: [state] Locking Datavault
11,752,650 UART: [state] Locking PCR0, PCR1 and PCR31
11,754,341 UART: [state] Locking ICCM
11,756,859 UART: [exit] Launching FMC @ 0x40000130
11,765,246 UART:
11,765,473 UART: Running Caliptra FMC ...
11,766,748 UART:
11,766,913 UART: [state] CFI Enabled
11,768,799 UART: [art] Skip pcr extension
11,769,904 UART: [art] Extend RT PCRs Done
11,771,057 UART: [art] Lock RT PCRs Done
11,772,284 UART: [art] Populate DV Done
11,778,012 UART: [fht] FMC Alias Private Key: 7
11,779,770 UART: [art] Derive CDI
11,780,514 UART: [art] Store in slot 0x4
11,822,990 UART: [art] Derive Key Pair
11,823,978 UART: [art] Store priv key in slot 0x5
15,065,750 UART: [art] Derive Key Pair - Done
15,078,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
17,359,254 UART: [art] Erasing AUTHORITY.KEYID = 7
17,360,759 UART: [art] PUB.X = 5D98A146C9E981752B1A25600BCB1E30768E6070FD93EE302CAC60FF821C1ABFF7AE10637762F200BAD618C157265397
17,368,032 UART: [art] PUB.Y = F5FFA5CD9B0093B0245DAC39BA4721D8DE0CE711E63FB6ED654B17ECCC9F0F36BCF2FD2E6EDB87057798B088C746EC36
17,375,280 UART: [art] SIG.R = AA88A8A57F2338EFE88D7E2A2C12032333A683E2930E6CB18842C3BDEB314D839982C648CC32D9663C043D56E4AA0881
17,382,672 UART: [art] SIG.S = BBBE75349A9DFE904975B8C290A4E6C502112A43390FE86C341F1114E6693DAFA11101011311AF2B0864543EFAE352EE
18,687,420 UART: mbox::rt_entry...
18,688,378 UART: ____ _ _ _ ____ _____
18,690,381 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,692,382 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,694,307 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,696,230 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,698,149 UART: |_|
18,698,978 UART:
22,313,152 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
4,131,706 ready_for_fw is high
4,132,154 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,475,722 >>> mbox cmd response: success
23,118,196 UART:
23,118,582 UART: Running Caliptra FMC ...
23,119,723 UART:
23,119,877 UART: [state] CFI Enabled
23,127,612 UART: [fht] FMC Alias Private Key: 7
25,466,643 UART: [art] Extend RT PCRs Done
25,467,857 UART: [art] Lock RT PCRs Done
25,469,640 UART: [art] Populate DV Done
25,474,954 UART: [fht] FMC Alias Private Key: 7
25,476,598 UART: [art] Derive CDI
25,477,408 UART: [art] Store in slot 0x4
25,520,030 UART: [art] Derive Key Pair
25,521,059 UART: [art] Store priv key in slot 0x5
28,763,525 UART: [art] Derive Key Pair - Done
28,776,582 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,056,977 UART: [art] Erasing AUTHORITY.KEYID = 7
31,058,489 UART: [art] PUB.X = 05D2621E5738059C4FCEAD975ACB83BF1A1433477F6CD7C34869230E57EED70854D030BCAADAE90715A98ED3F8D67CD7
31,065,734 UART: [art] PUB.Y = 326711C85446777E0C411F3395D122B17A933A0F16B4D7D387648293F334A0D4D8E50811951C5C80C32AED5E0F2CB89D
31,073,010 UART: [art] SIG.R = 139C802F90A96234171678A209B9107A6CBF2ACA7D378F4BDBACC8F3518ACA7E4C5FA0AF7C4A914F20D3EAAE615B1931
31,080,448 UART: [art] SIG.S = A0C4FD75E2D07ED262BF67EFD4FAA542C2F8B1ABCE83DB1526A0A262CBA53176D2B41463460FD50A4ECCBE72073FCCD6
32,384,811 UART: mbox::rt_entry...
32,385,775 UART: ____ _ _ _ ____ _____
32,387,763 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,389,758 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,391,699 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,393,659 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,395,583 UART: |_|
32,396,568 UART:
32,526,984 UART: [rt] Runtime listening for mailbox commands...
32,529,006 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
32,530,574 >>> mbox cmd response data (0 bytes)
293 writing to cptra_bootfsm_go
11,530,075 UART:
11,530,897 UART: Running Caliptra FMC ...
11,531,956 UART:
11,532,110 UART: [state] CFI Enabled
11,533,544 UART: [art] Skip pcr extension
11,534,644 UART: [art] Extend RT PCRs Done
11,535,786 UART: [art] Lock RT PCRs Done
11,537,119 UART: [art] Populate DV Done
11,542,862 UART: [fht] FMC Alias Private Key: 7
11,544,567 UART: [art] Derive CDI
11,545,380 UART: [art] Store in slot 0x4
11,587,723 UART: [art] Derive Key Pair
11,588,767 UART: [art] Store priv key in slot 0x5
14,830,770 UART: [art] Derive Key Pair - Done
14,843,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
17,124,227 UART: [art] Erasing AUTHORITY.KEYID = 7
17,125,725 UART: [art] PUB.X = 05D2621E5738059C4FCEAD975ACB83BF1A1433477F6CD7C34869230E57EED70854D030BCAADAE90715A98ED3F8D67CD7
17,132,961 UART: [art] PUB.Y = 326711C85446777E0C411F3395D122B17A933A0F16B4D7D387648293F334A0D4D8E50811951C5C80C32AED5E0F2CB89D
17,140,236 UART: [art] SIG.R = 139C802F90A96234171678A209B9107A6CBF2ACA7D378F4BDBACC8F3518ACA7E4C5FA0AF7C4A914F20D3EAAE615B1931
17,147,612 UART: [art] SIG.S = A0C4FD75E2D07ED262BF67EFD4FAA542C2F8B1ABCE83DB1526A0A262CBA53176D2B41463460FD50A4ECCBE72073FCCD6
18,452,663 UART: mbox::rt_entry...
18,453,618 UART: ____ _ _ _ ____ _____
18,455,711 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,457,713 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,459,655 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,461,580 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,463,500 UART: |_|
18,464,492 UART:
22,080,715 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
191,573 UART:
191,944 UART: Running Caliptra ROM ...
193,234 UART:
193,386 UART: [state] CFI Enabled
263,832 UART: [state] LifecycleState = Production
265,633 UART: [state] DebugLocked = Yes
268,196 UART: [state] Starting the WD Timer 40000000 cycles
272,371 UART: [kat] SHA2-256
452,001 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,783 UART: [kat] ++
463,260 UART: [kat] sha1
475,158 UART: [kat] SHA2-256
477,885 UART: [kat] SHA2-384
483,797 UART: [kat] SHA2-512-ACC
486,164 UART: [kat] ECC-384
2,948,357 UART: [kat] HMAC-384Kdf
2,970,634 UART: [kat] LMS
3,447,127 UART: [kat] --
3,452,822 UART: [cold-reset] ++
3,454,181 UART: [fht] FHT @ 0x50003400
3,466,308 UART: [idev] ++
3,466,874 UART: [idev] CDI.KEYID = 6
3,467,822 UART: [idev] SUBJECT.KEYID = 7
3,469,063 UART: [idev] UDS.KEYID = 0
3,470,037 ready_for_fw is high
3,470,230 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,574,599 UART: [idev] Erasing UDS.KEYID = 0
5,987,031 UART: [idev] Sha1 KeyId Algorithm
6,009,983 UART: [idev] --
6,013,663 UART: [ldev] ++
6,014,242 UART: [ldev] CDI.KEYID = 6
6,015,180 UART: [ldev] SUBJECT.KEYID = 5
6,016,415 UART: [ldev] AUTHORITY.KEYID = 7
6,017,652 UART: [ldev] FE.KEYID = 1
6,057,624 UART: [ldev] Erasing FE.KEYID = 1
8,567,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,276 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,317,049 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,332,925 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,348,709 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,370,396 UART: [ldev] --
10,375,155 UART: [fwproc] Wait for Commands...
10,378,062 UART: [fwproc] Recv command 0x46574c44
10,380,043 UART: [fwproc] Recv'd Img size: 82832 bytes
13,449,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,519,713 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,592,721 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,796,778 >>> mbox cmd response: success
13,800,072 UART: [afmc] ++
13,800,684 UART: [afmc] CDI.KEYID = 6
13,801,708 UART: [afmc] SUBJECT.KEYID = 7
13,802,869 UART: [afmc] AUTHORITY.KEYID = 5
16,341,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,082,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,085,172 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,101,044 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,117,070 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,132,696 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,158,609 UART: [afmc] --
18,163,159 UART: [cold-reset] --
18,167,394 UART: [state] Locking Datavault
18,172,697 UART: [state] Locking PCR0, PCR1 and PCR31
18,174,443 UART: [state] Locking ICCM
18,176,377 UART: [exit] Launching FMC @ 0x40000130
18,184,790 UART:
18,185,028 UART: Running Caliptra FMC ...
18,186,134 UART:
18,186,289 UART: [state] CFI Enabled
18,241,673 UART: [fht] FMC Alias Private Key: 7
20,007,439 UART: [art] Extend RT PCRs Done
20,008,670 UART: [art] Lock RT PCRs Done
20,010,411 UART: [art] Populate DV Done
20,015,820 UART: [fht] FMC Alias Private Key: 7
20,017,353 UART: [art] Derive CDI
20,018,166 UART: [art] Store in slot 0x4
20,074,014 UART: [art] Derive Key Pair
20,075,057 UART: [art] Store priv key in slot 0x5
22,538,033 UART: [art] Derive Key Pair - Done
22,550,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,263,153 UART: [art] Erasing AUTHORITY.KEYID = 7
24,264,684 UART: [art] PUB.X = CD8A88D97EB20203AE6F1395264551914EFE58514E8AECB8FBCD29D99A243377F2FC4254CD91F6B8F365134DEF571BCF
24,271,902 UART: [art] PUB.Y = 78D57F65188E7132C6F5810878D343FBA05545863A21732A938A7A3B29A8F371BECFB29BA3321DFE963F22F5B4A187CA
24,279,158 UART: [art] SIG.R = 635BFCC19987EE93C6430A846F2AC5719AEF18E9E3B42747D902163A046C5037F8A7B593AD24BC0F5E8FA09ECE09ADA4
24,286,579 UART: [art] SIG.S = 84171197A2A72A42284ACB6792EE807EB4FB631DA960065A979D773CBF2FC624966206927CC04F15B5EF690763FFFAB4
25,265,115 UART: mbox::rt_entry...
25,266,065 UART: ____ _ _ _ ____ _____
25,268,047 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,270,051 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,271,978 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,273,902 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,275,835 UART: |_|
25,276,644 UART:
25,407,324 UART: [rt] Runtime listening for mailbox commands...
25,409,482 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,410,577 >>> mbox cmd response data (0 bytes)
290 writing to cptra_bootfsm_go
626 UART:
779 UART: Running Caliptra ROM ...
1,876 UART:
2,030 UART: [state] CFI Enabled
66,141 UART: [state] LifecycleState = Production
67,919 UART: [state] DebugLocked = Yes
70,410 UART: [state] Starting the WD Timer 40000000 cycles
75,677 UART: [kat] SHA2-256
255,385 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
266,148 UART: [kat] ++
266,649 UART: [kat] sha1
278,172 UART: [kat] SHA2-256
280,900 UART: [kat] SHA2-384
286,761 UART: [kat] SHA2-512-ACC
289,104 UART: [kat] ECC-384
2,747,639 UART: [kat] HMAC-384Kdf
2,770,476 UART: [kat] LMS
3,246,947 UART: [kat] --
3,250,828 UART: [warm-reset] ++
3,256,808 UART: [warm-reset] --
3,261,749 UART: [state] Locking Datavault
3,264,300 UART: [state] Locking PCR0, PCR1 and PCR31
3,266,050 UART: [state] Locking ICCM
3,267,961 UART: [exit] Launching FMC @ 0x40000130
3,276,351 UART:
3,276,584 UART: Running Caliptra FMC ...
3,277,803 UART:
3,277,966 UART: [state] CFI Enabled
3,338,336 UART: [art] Skip pcr extension
3,339,450 UART: [art] Extend RT PCRs Done
3,340,509 UART: [art] Lock RT PCRs Done
3,341,793 UART: [art] Populate DV Done
3,347,384 UART: [fht] FMC Alias Private Key: 7
3,349,027 UART: [art] Derive CDI
3,349,766 UART: [art] Store in slot 0x4
3,407,017 UART: [art] Derive Key Pair
3,408,449 UART: [art] Store priv key in slot 0x5
5,870,554 UART: [art] Derive Key Pair - Done
5,883,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,596,401 UART: [art] Erasing AUTHORITY.KEYID = 7
7,598,030 UART: [art] PUB.X = CD8A88D97EB20203AE6F1395264551914EFE58514E8AECB8FBCD29D99A243377F2FC4254CD91F6B8F365134DEF571BCF
7,605,187 UART: [art] PUB.Y = 78D57F65188E7132C6F5810878D343FBA05545863A21732A938A7A3B29A8F371BECFB29BA3321DFE963F22F5B4A187CA
7,612,421 UART: [art] SIG.R = 635BFCC19987EE93C6430A846F2AC5719AEF18E9E3B42747D902163A046C5037F8A7B593AD24BC0F5E8FA09ECE09ADA4
7,619,815 UART: [art] SIG.S = 84171197A2A72A42284ACB6792EE807EB4FB631DA960065A979D773CBF2FC624966206927CC04F15B5EF690763FFFAB4
8,598,349 UART: mbox::rt_entry...
8,599,292 UART: ____ _ _ _ ____ _____
8,601,266 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,603,269 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,605,217 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,607,144 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,609,081 UART: |_|
8,609,894 UART:
11,459,349 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,463,068 ready_for_fw is high
3,463,703 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,683,499 >>> mbox cmd response: success
17,979,137 UART:
17,979,524 UART: Running Caliptra FMC ...
17,980,646 UART:
17,980,797 UART: [state] CFI Enabled
18,049,719 UART: [fht] FMC Alias Private Key: 7
19,815,889 UART: [art] Extend RT PCRs Done
19,817,107 UART: [art] Lock RT PCRs Done
19,818,378 UART: [art] Populate DV Done
19,823,861 UART: [fht] FMC Alias Private Key: 7
19,825,458 UART: [art] Derive CDI
19,826,196 UART: [art] Store in slot 0x4
19,882,492 UART: [art] Derive Key Pair
19,883,546 UART: [art] Store priv key in slot 0x5
22,346,346 UART: [art] Derive Key Pair - Done
22,359,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,072,030 UART: [art] Erasing AUTHORITY.KEYID = 7
24,073,550 UART: [art] PUB.X = 7619868E047FC819F914327E3FF7813A03AEC1A344F7E1925C2C783706D90EFCE9451D017B32FC166AA75A2AEE3EE247
24,080,821 UART: [art] PUB.Y = F0DB0B29FDED60A9272F6C83CB4F8DBA0A49C906226C94DBCC2EB3EDB8C626E3A68ABE424F2D93BA46398F57ACD36D7B
24,088,112 UART: [art] SIG.R = C61273BC306B3DE248FB78172F0D41C22D50A699E414903E77F43EB3E92E3CBBB8922CE1398CC36CE23E1AC21ED6ACF6
24,095,521 UART: [art] SIG.S = F749947255A23F23329CDA4112161B5B81AA7F0A40A64EAB7BE0CC4405E23A8025E80101CBD97230628CA0A23B4884E0
25,074,012 UART: mbox::rt_entry...
25,074,969 UART: ____ _ _ _ ____ _____
25,076,955 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,079,175 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,081,127 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,083,013 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,084,949 UART: |_|
25,085,759 UART:
25,216,522 UART: [rt] Runtime listening for mailbox commands...
25,218,535 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,219,585 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
3,262,122 UART:
3,262,455 UART: Running Caliptra FMC ...
3,263,492 UART:
3,263,642 UART: [state] CFI Enabled
3,315,373 UART: [art] Skip pcr extension
3,316,528 UART: [art] Extend RT PCRs Done
3,317,594 UART: [art] Lock RT PCRs Done
3,318,825 UART: [art] Populate DV Done
3,324,448 UART: [fht] FMC Alias Private Key: 7
3,326,148 UART: [art] Derive CDI
3,326,965 UART: [art] Store in slot 0x4
3,383,901 UART: [art] Derive Key Pair
3,384,953 UART: [art] Store priv key in slot 0x5
5,847,586 UART: [art] Derive Key Pair - Done
5,860,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,573,621 UART: [art] Erasing AUTHORITY.KEYID = 7
7,575,135 UART: [art] PUB.X = 7619868E047FC819F914327E3FF7813A03AEC1A344F7E1925C2C783706D90EFCE9451D017B32FC166AA75A2AEE3EE247
7,582,389 UART: [art] PUB.Y = F0DB0B29FDED60A9272F6C83CB4F8DBA0A49C906226C94DBCC2EB3EDB8C626E3A68ABE424F2D93BA46398F57ACD36D7B
7,589,687 UART: [art] SIG.R = C61273BC306B3DE248FB78172F0D41C22D50A699E414903E77F43EB3E92E3CBBB8922CE1398CC36CE23E1AC21ED6ACF6
7,597,081 UART: [art] SIG.S = F749947255A23F23329CDA4112161B5B81AA7F0A40A64EAB7BE0CC4405E23A8025E80101CBD97230628CA0A23B4884E0
8,575,379 UART: mbox::rt_entry...
8,576,325 UART: ____ _ _ _ ____ _____
8,578,866 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,580,895 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,582,833 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,584,771 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,586,703 UART: |_|
8,587,511 UART:
11,435,951 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
191,860 UART:
192,216 UART: Running Caliptra ROM ...
193,391 UART:
603,019 UART: [state] CFI Enabled
617,487 UART: [state] LifecycleState = Production
619,336 UART: [state] DebugLocked = Yes
622,248 UART: [state] Starting the WD Timer 40000000 cycles
627,353 UART: [kat] SHA2-256
807,014 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,769 UART: [kat] ++
818,244 UART: [kat] sha1
829,878 UART: [kat] SHA2-256
832,572 UART: [kat] SHA2-384
837,861 UART: [kat] SHA2-512-ACC
840,231 UART: [kat] ECC-384
3,281,688 UART: [kat] HMAC-384Kdf
3,295,022 UART: [kat] LMS
3,771,540 UART: [kat] --
3,778,590 UART: [cold-reset] ++
3,780,364 UART: [fht] FHT @ 0x50003400
3,790,541 UART: [idev] ++
3,791,114 UART: [idev] CDI.KEYID = 6
3,791,994 UART: [idev] SUBJECT.KEYID = 7
3,793,312 UART: [idev] UDS.KEYID = 0
3,794,207 ready_for_fw is high
3,794,398 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,898,472 UART: [idev] Erasing UDS.KEYID = 0
6,269,818 UART: [idev] Sha1 KeyId Algorithm
6,292,746 UART: [idev] --
6,297,332 UART: [ldev] ++
6,297,903 UART: [ldev] CDI.KEYID = 6
6,298,787 UART: [ldev] SUBJECT.KEYID = 5
6,300,076 UART: [ldev] AUTHORITY.KEYID = 7
6,301,317 UART: [ldev] FE.KEYID = 1
6,312,425 UART: [ldev] Erasing FE.KEYID = 1
8,793,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,555 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,530,312 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,546,184 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,561,922 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,583,121 UART: [ldev] --
10,588,804 UART: [fwproc] Wait for Commands...
10,591,283 UART: [fwproc] Recv command 0x46574c44
10,593,264 UART: [fwproc] Recv'd Img size: 82832 bytes
13,659,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,741,895 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,814,949 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,018,440 >>> mbox cmd response: success
14,022,284 UART: [afmc] ++
14,022,921 UART: [afmc] CDI.KEYID = 6
14,023,843 UART: [afmc] SUBJECT.KEYID = 7
14,025,066 UART: [afmc] AUTHORITY.KEYID = 5
16,527,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,249,939 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,252,115 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,268,059 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,284,048 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,299,640 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,325,754 UART: [afmc] --
18,328,832 UART: [cold-reset] --
18,333,122 UART: [state] Locking Datavault
18,339,775 UART: [state] Locking PCR0, PCR1 and PCR31
18,341,558 UART: [state] Locking ICCM
18,343,636 UART: [exit] Launching FMC @ 0x40000130
18,352,063 UART:
18,352,308 UART: Running Caliptra FMC ...
18,353,334 UART:
18,353,482 UART: [state] CFI Enabled
18,361,593 UART: [fht] FMC Alias Private Key: 7
20,127,414 UART: [art] Extend RT PCRs Done
20,128,629 UART: [art] Lock RT PCRs Done
20,130,443 UART: [art] Populate DV Done
20,136,075 UART: [fht] FMC Alias Private Key: 7
20,137,673 UART: [art] Derive CDI
20,138,410 UART: [art] Store in slot 0x4
20,180,733 UART: [art] Derive Key Pair
20,181,775 UART: [art] Store priv key in slot 0x5
22,608,637 UART: [art] Derive Key Pair - Done
22,621,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,327,840 UART: [art] Erasing AUTHORITY.KEYID = 7
24,329,360 UART: [art] PUB.X = 2EFC3211788E8AED9DC952E7C286D42BD02CE649F54DF20F7126F25548432CC5369A25EE4D55386C7D3DD17ACB9F10AC
24,336,609 UART: [art] PUB.Y = 9EE173F43CB23E07C109ED3FD5B7A7D67EE4FBA3CFAD116F5F3058BEFAB83E3E7A00F600FBD4C98DEFAE33208808686A
24,343,859 UART: [art] SIG.R = D97E2C75429DFAAB7D56E9C54EE67ED3CFB041791F8BC875228DC4F0AA22CDBF8F201F62213A122CADACD104FF8C4E49
24,351,308 UART: [art] SIG.S = BB15D95BCC5E1C34B57342A1D8D91B874A58F632EFBF8398D750A64A3D0C6587345F707C1518E39A641815A714F7E6CF
25,329,569 UART: mbox::rt_entry...
25,330,532 UART: ____ _ _ _ ____ _____
25,332,514 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,334,470 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,336,398 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,338,447 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,340,371 UART: |_|
25,341,181 UART:
25,471,613 UART: [rt] Runtime listening for mailbox commands...
25,473,637 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,474,760 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
527 UART:
672 UART: Running Caliptra ROM ...
1,779 UART:
15,055,307 UART: [state] CFI Enabled
15,069,066 UART: [state] LifecycleState = Production
15,070,831 UART: [state] DebugLocked = Yes
15,073,017 UART: [state] Starting the WD Timer 40000000 cycles
15,077,921 UART: [kat] SHA2-256
15,257,597 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
15,268,352 UART: [kat] ++
15,268,809 UART: [kat] sha1
15,279,535 UART: [kat] SHA2-256
15,282,231 UART: [kat] SHA2-384
15,288,489 UART: [kat] SHA2-512-ACC
15,290,835 UART: [kat] ECC-384
17,735,959 UART: [kat] HMAC-384Kdf
17,747,233 UART: [kat] LMS
18,223,709 UART: [kat] --
18,229,034 UART: [warm-reset] ++
18,233,316 UART: [warm-reset] --
18,237,075 UART: [state] Locking Datavault
18,240,491 UART: [state] Locking PCR0, PCR1 and PCR31
18,242,193 UART: [state] Locking ICCM
18,243,266 UART: [exit] Launching FMC @ 0x40000130
18,251,666 UART:
18,251,904 UART: Running Caliptra FMC ...
18,253,012 UART:
18,253,173 UART: [state] CFI Enabled
18,255,287 UART: [art] Skip pcr extension
18,256,395 UART: [art] Extend RT PCRs Done
18,257,530 UART: [art] Lock RT PCRs Done
18,258,813 UART: [art] Populate DV Done
18,264,723 UART: [fht] FMC Alias Private Key: 7
18,266,261 UART: [art] Derive CDI
18,267,074 UART: [art] Store in slot 0x4
18,310,104 UART: [art] Derive Key Pair
18,311,517 UART: [art] Store priv key in slot 0x5
20,737,649 UART: [art] Derive Key Pair - Done
20,750,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,456,451 UART: [art] Erasing AUTHORITY.KEYID = 7
22,457,947 UART: [art] PUB.X = 2EFC3211788E8AED9DC952E7C286D42BD02CE649F54DF20F7126F25548432CC5369A25EE4D55386C7D3DD17ACB9F10AC
22,465,265 UART: [art] PUB.Y = 9EE173F43CB23E07C109ED3FD5B7A7D67EE4FBA3CFAD116F5F3058BEFAB83E3E7A00F600FBD4C98DEFAE33208808686A
22,472,508 UART: [art] SIG.R = D97E2C75429DFAAB7D56E9C54EE67ED3CFB041791F8BC875228DC4F0AA22CDBF8F201F62213A122CADACD104FF8C4E49
22,479,949 UART: [art] SIG.S = BB15D95BCC5E1C34B57342A1D8D91B874A58F632EFBF8398D750A64A3D0C6587345F707C1518E39A641815A714F7E6CF
23,458,594 UART: mbox::rt_entry...
23,459,553 UART: ____ _ _ _ ____ _____
23,461,540 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,463,543 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,465,492 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,467,421 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,469,350 UART: |_|
23,470,159 UART:
26,275,715 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,781,289 ready_for_fw is high
3,781,925 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,902,881 >>> mbox cmd response: success
18,156,762 UART:
18,157,143 UART: Running Caliptra FMC ...
18,158,264 UART:
18,158,421 UART: [state] CFI Enabled
18,166,540 UART: [fht] FMC Alias Private Key: 7
19,932,205 UART: [art] Extend RT PCRs Done
19,933,423 UART: [art] Lock RT PCRs Done
19,934,805 UART: [art] Populate DV Done
19,940,224 UART: [fht] FMC Alias Private Key: 7
19,941,874 UART: [art] Derive CDI
19,942,693 UART: [art] Store in slot 0x4
19,985,242 UART: [art] Derive Key Pair
19,986,301 UART: [art] Store priv key in slot 0x5
22,412,260 UART: [art] Derive Key Pair - Done
22,424,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,131,177 UART: [art] Erasing AUTHORITY.KEYID = 7
24,132,680 UART: [art] PUB.X = 5264693A58D1D469E9D6A86ED42C10387F69999DF37BE68C3148BD69F6B22B1249C91FE7829E0A0EED96FF77DBFC6B95
24,139,940 UART: [art] PUB.Y = 148A85A4C2677BF70B0A38440A4D7C6827DC627BE1D288ADE77F4558EE8686BA56B7CB0AAB4F7683DC9D3107A61C2825
24,147,178 UART: [art] SIG.R = FF567C9CB75ACD95CD38F30EF55F683479BE700A73DBFE05AB799426DFCD8C2735AE0B3EFDE38D6049B8916F23CFA1A3
24,154,636 UART: [art] SIG.S = 47B8EB266527410697A9D3FBC52DD37773DEA36FD389AB83311E99D7372B861F01E67D95E410DB709F945CB4038F4DAA
25,132,860 UART: mbox::rt_entry...
25,133,843 UART: ____ _ _ _ ____ _____
25,135,832 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,137,841 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,139,775 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,141,740 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,143,672 UART: |_|
25,144,510 UART:
25,275,156 UART: [rt] Runtime listening for mailbox commands...
25,277,174 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,278,232 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
18,433,332 UART:
18,433,667 UART: Running Caliptra FMC ...
18,434,743 UART:
18,434,902 UART: [state] CFI Enabled
18,436,747 UART: [art] Skip pcr extension
18,437,885 UART: [art] Extend RT PCRs Done
18,439,033 UART: [art] Lock RT PCRs Done
18,440,220 UART: [art] Populate DV Done
18,445,684 UART: [fht] FMC Alias Private Key: 7
18,447,223 UART: [art] Derive CDI
18,448,041 UART: [art] Store in slot 0x4
18,490,699 UART: [art] Derive Key Pair
18,491,705 UART: [art] Store priv key in slot 0x5
20,918,410 UART: [art] Derive Key Pair - Done
20,931,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,637,774 UART: [art] Erasing AUTHORITY.KEYID = 7
22,639,276 UART: [art] PUB.X = 5264693A58D1D469E9D6A86ED42C10387F69999DF37BE68C3148BD69F6B22B1249C91FE7829E0A0EED96FF77DBFC6B95
22,646,531 UART: [art] PUB.Y = 148A85A4C2677BF70B0A38440A4D7C6827DC627BE1D288ADE77F4558EE8686BA56B7CB0AAB4F7683DC9D3107A61C2825
22,653,832 UART: [art] SIG.R = FF567C9CB75ACD95CD38F30EF55F683479BE700A73DBFE05AB799426DFCD8C2735AE0B3EFDE38D6049B8916F23CFA1A3
22,661,230 UART: [art] SIG.S = 47B8EB266527410697A9D3FBC52DD37773DEA36FD389AB83311E99D7372B861F01E67D95E410DB709F945CB4038F4DAA
23,639,527 UART: mbox::rt_entry...
23,640,484 UART: ____ _ _ _ ____ _____
23,642,498 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,644,505 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,646,438 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,648,369 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,650,300 UART: |_|
23,651,134 UART:
26,449,907 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
191,586 UART:
191,979 UART: Running Caliptra ROM ...
193,167 UART:
193,324 UART: [state] CFI Enabled
266,228 UART: [state] LifecycleState = Production
268,457 UART: [state] DebugLocked = Yes
269,873 UART: [state] Starting the WD Timer 40000000 cycles
275,387 UART: [kat] SHA2-256
465,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,000 UART: [kat] ++
476,528 UART: [kat] sha1
486,365 UART: [kat] SHA2-256
489,374 UART: [kat] SHA2-384
495,287 UART: [kat] SHA2-512-ACC
497,941 UART: [kat] ECC-384
2,947,038 UART: [kat] HMAC-384Kdf
2,972,197 UART: [kat] LMS
3,503,974 UART: [kat] --
3,507,490 UART: [cold-reset] ++
3,509,777 UART: [fht] FHT @ 0x50003400
3,520,817 UART: [idev] ++
3,521,448 UART: [idev] CDI.KEYID = 6
3,522,439 UART: [idev] SUBJECT.KEYID = 7
3,523,611 UART: [idev] UDS.KEYID = 0
3,524,549 ready_for_fw is high
3,524,752 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,629,088 UART: [idev] Erasing UDS.KEYID = 0
6,026,530 UART: [idev] Sha1 KeyId Algorithm
6,049,085 UART: [idev] --
6,053,057 UART: [ldev] ++
6,053,760 UART: [ldev] CDI.KEYID = 6
6,054,648 UART: [ldev] SUBJECT.KEYID = 5
6,055,810 UART: [ldev] AUTHORITY.KEYID = 7
6,056,984 UART: [ldev] FE.KEYID = 1
6,100,979 UART: [ldev] Erasing FE.KEYID = 1
8,607,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,535 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,767 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,849 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,386,837 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,446 UART: [ldev] --
10,414,761 UART: [fwproc] Wait for Commands...
10,417,183 UART: [fwproc] Recv command 0x46574c44
10,419,164 UART: [fwproc] Recv'd Img size: 82832 bytes
13,514,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,589,560 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,713,161 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,058,526 >>> mbox cmd response: success
14,061,906 UART: [afmc] ++
14,062,650 UART: [afmc] CDI.KEYID = 6
14,063,789 UART: [afmc] SUBJECT.KEYID = 7
14,065,274 UART: [afmc] AUTHORITY.KEYID = 5
16,591,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,319,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,321,862 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,336,881 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,352,014 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,367,068 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,391,489 UART: [afmc] --
18,395,377 UART: [cold-reset] --
18,399,344 UART: [state] Locking Datavault
18,405,182 UART: [state] Locking PCR0, PCR1 and PCR31
18,407,364 UART: [state] Locking ICCM
18,409,558 UART: [exit] Launching FMC @ 0x40000130
18,418,224 UART:
18,418,476 UART: Running Caliptra FMC ...
18,419,576 UART:
18,419,733 UART: [state] CFI Enabled
18,477,932 UART: [fht] FMC Alias Private Key: 7
20,243,739 UART: [art] Extend RT PCRs Done
20,244,954 UART: [art] Lock RT PCRs Done
20,246,579 UART: [art] Populate DV Done
20,251,988 UART: [fht] FMC Alias Private Key: 7
20,253,591 UART: [art] Derive CDI
20,254,404 UART: [art] Store in slot 0x4
20,310,579 UART: [art] Derive Key Pair
20,311,615 UART: [art] Store priv key in slot 0x5
22,774,782 UART: [art] Derive Key Pair - Done
22,787,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,500,678 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,183 UART: [art] PUB.X = 29982480DA393F289DBC52B20A9CD262771EBC1C16D496E33AB7589CEFDCBF7E2FC669FD3CCA862B39B6437B96DA7571
24,509,522 UART: [art] PUB.Y = 04C22A5529B51290FE16C3294DB041B53BE7B07F676A73FB65CF4F17375B3D1E8317EF8753B8A6740EC1C6D47E9AEE7C
24,516,765 UART: [art] SIG.R = 4E12FD93D999D56E6CA4A060BB100EC0B4A55AFC48955A7B10B7087B99DF35F18640C6B3FF0E594CBDE84E940702B17E
24,524,203 UART: [art] SIG.S = CC4371081C1479F6F80F08325C2663457AA0590AD0A6B6F17B62AD3F37E8531AFB958A7C106414A8D419FF6FF41A8853
25,502,369 UART: mbox::rt_entry...
25,503,339 UART: ____ _ _ _ ____ _____
25,505,325 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,507,332 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,509,271 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,511,205 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,513,057 UART: |_|
25,513,859 UART:
25,645,307 UART: [rt] Runtime listening for mailbox commands...
25,647,331 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,648,427 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
611 UART:
781 UART: Running Caliptra ROM ...
1,781 UART:
1,921 UART: [state] CFI Enabled
68,962 UART: [state] LifecycleState = Production
70,733 UART: [state] DebugLocked = Yes
73,147 UART: [state] Starting the WD Timer 40000000 cycles
78,273 UART: [kat] SHA2-256
268,149 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
278,909 UART: [kat] ++
279,416 UART: [kat] sha1
290,668 UART: [kat] SHA2-256
293,687 UART: [kat] SHA2-384
298,263 UART: [kat] SHA2-512-ACC
300,876 UART: [kat] ECC-384
2,749,507 UART: [kat] HMAC-384Kdf
2,773,286 UART: [kat] LMS
3,304,867 UART: [kat] --
3,309,990 UART: [warm-reset] ++
3,314,402 UART: [warm-reset] --
3,319,127 UART: [state] Locking Datavault
3,323,254 UART: [state] Locking PCR0, PCR1 and PCR31
3,324,956 UART: [state] Locking ICCM
3,327,013 UART: [exit] Launching FMC @ 0x40000130
3,335,699 UART:
3,335,932 UART: Running Caliptra FMC ...
3,336,958 UART:
3,337,107 UART: [state] CFI Enabled
3,382,551 UART: [art] Skip pcr extension
3,383,702 UART: [art] Extend RT PCRs Done
3,384,766 UART: [art] Lock RT PCRs Done
3,386,051 UART: [art] Populate DV Done
3,391,568 UART: [fht] FMC Alias Private Key: 7
3,393,235 UART: [art] Derive CDI
3,393,976 UART: [art] Store in slot 0x4
3,451,170 UART: [art] Derive Key Pair
3,452,620 UART: [art] Store priv key in slot 0x5
5,915,289 UART: [art] Derive Key Pair - Done
5,928,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,640,897 UART: [art] Erasing AUTHORITY.KEYID = 7
7,642,410 UART: [art] PUB.X = 29982480DA393F289DBC52B20A9CD262771EBC1C16D496E33AB7589CEFDCBF7E2FC669FD3CCA862B39B6437B96DA7571
7,649,695 UART: [art] PUB.Y = 04C22A5529B51290FE16C3294DB041B53BE7B07F676A73FB65CF4F17375B3D1E8317EF8753B8A6740EC1C6D47E9AEE7C
7,656,895 UART: [art] SIG.R = 4E12FD93D999D56E6CA4A060BB100EC0B4A55AFC48955A7B10B7087B99DF35F18640C6B3FF0E594CBDE84E940702B17E
7,664,314 UART: [art] SIG.S = CC4371081C1479F6F80F08325C2663457AA0590AD0A6B6F17B62AD3F37E8531AFB958A7C106414A8D419FF6FF41A8853
8,642,841 UART: mbox::rt_entry...
8,643,807 UART: ____ _ _ _ ____ _____
8,645,744 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,647,745 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,649,599 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,651,543 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,653,603 UART: |_|
8,654,414 UART:
11,504,169 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
3,440,000 ready_for_fw is high
3,440,398 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,099,141 >>> mbox cmd response: success
18,388,225 UART:
18,388,662 UART: Running Caliptra FMC ...
18,389,786 UART:
18,389,947 UART: [state] CFI Enabled
18,456,653 UART: [fht] FMC Alias Private Key: 7
20,222,751 UART: [art] Extend RT PCRs Done
20,223,964 UART: [art] Lock RT PCRs Done
20,225,703 UART: [art] Populate DV Done
20,231,410 UART: [fht] FMC Alias Private Key: 7
20,232,965 UART: [art] Derive CDI
20,233,786 UART: [art] Store in slot 0x4
20,289,804 UART: [art] Derive Key Pair
20,290,840 UART: [art] Store priv key in slot 0x5
22,754,080 UART: [art] Derive Key Pair - Done
22,766,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,479,248 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,758 UART: [art] PUB.X = 8449EEBD3DB4D4287E612523EB1111EC3C6160BC2CFEFF25B0894D118B4F6E586AEDB3EDB570C0AD2DFD9A3A27851ABF
24,488,073 UART: [art] PUB.Y = 838CA065FBD27B9915DD61AC534B1B06C6C4E23702D84523FBF98D03D76D0A520157EC6A5098DFE4D0DE3638ACFF99F0
24,495,344 UART: [art] SIG.R = 59A45415C067C01DCF41101CCC9A60E247E7D69D2147B4767B13082191452ECE23782DBAA5F9A5DE73EEEFAFDA6E555E
24,502,749 UART: [art] SIG.S = D6C196C7C32682598DB953EAC5C557B1EAA0C108DEE615C3A25696DA20DAA2A2DAB77B23D135C2046B372A720E3B7D5C
25,481,158 UART: mbox::rt_entry...
25,482,126 UART: ____ _ _ _ ____ _____
25,484,055 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,486,068 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,488,019 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,489,989 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,491,920 UART: |_|
25,492,905 UART:
25,623,488 UART: [rt] Runtime listening for mailbox commands...
25,625,498 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,626,692 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
3,242,883 UART:
3,243,212 UART: Running Caliptra FMC ...
3,244,252 UART:
3,244,404 UART: [state] CFI Enabled
3,294,299 UART: [art] Skip pcr extension
3,295,453 UART: [art] Extend RT PCRs Done
3,296,522 UART: [art] Lock RT PCRs Done
3,297,587 UART: [art] Populate DV Done
3,303,124 UART: [fht] FMC Alias Private Key: 7
3,304,653 UART: [art] Derive CDI
3,305,386 UART: [art] Store in slot 0x4
3,362,904 UART: [art] Derive Key Pair
3,363,894 UART: [art] Store priv key in slot 0x5
5,826,614 UART: [art] Derive Key Pair - Done
5,839,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,552,038 UART: [art] Erasing AUTHORITY.KEYID = 7
7,553,543 UART: [art] PUB.X = 8449EEBD3DB4D4287E612523EB1111EC3C6160BC2CFEFF25B0894D118B4F6E586AEDB3EDB570C0AD2DFD9A3A27851ABF
7,560,867 UART: [art] PUB.Y = 838CA065FBD27B9915DD61AC534B1B06C6C4E23702D84523FBF98D03D76D0A520157EC6A5098DFE4D0DE3638ACFF99F0
7,568,133 UART: [art] SIG.R = 59A45415C067C01DCF41101CCC9A60E247E7D69D2147B4767B13082191452ECE23782DBAA5F9A5DE73EEEFAFDA6E555E
7,575,548 UART: [art] SIG.S = D6C196C7C32682598DB953EAC5C557B1EAA0C108DEE615C3A25696DA20DAA2A2DAB77B23D135C2046B372A720E3B7D5C
8,553,991 UART: mbox::rt_entry...
8,554,955 UART: ____ _ _ _ ____ _____
8,556,967 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,558,976 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,560,921 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,562,852 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,564,779 UART: |_|
8,565,779 UART:
11,413,477 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
191,829 UART:
192,196 UART: Running Caliptra ROM ...
193,273 UART:
602,819 UART: [state] CFI Enabled
618,130 UART: [state] LifecycleState = Production
620,328 UART: [state] DebugLocked = Yes
623,101 UART: [state] Starting the WD Timer 40000000 cycles
627,946 UART: [kat] SHA2-256
817,813 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,666 UART: [kat] ++
829,115 UART: [kat] sha1
841,158 UART: [kat] SHA2-256
844,113 UART: [kat] SHA2-384
850,540 UART: [kat] SHA2-512-ACC
853,132 UART: [kat] ECC-384
3,297,597 UART: [kat] HMAC-384Kdf
3,311,105 UART: [kat] LMS
3,842,961 UART: [kat] --
3,847,524 UART: [cold-reset] ++
3,849,596 UART: [fht] FHT @ 0x50003400
3,861,288 UART: [idev] ++
3,862,007 UART: [idev] CDI.KEYID = 6
3,862,934 UART: [idev] SUBJECT.KEYID = 7
3,864,132 UART: [idev] UDS.KEYID = 0
3,865,065 ready_for_fw is high
3,865,288 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,969,403 UART: [idev] Erasing UDS.KEYID = 0
6,340,457 UART: [idev] Sha1 KeyId Algorithm
6,362,609 UART: [idev] --
6,367,842 UART: [ldev] ++
6,368,521 UART: [ldev] CDI.KEYID = 6
6,369,435 UART: [ldev] SUBJECT.KEYID = 5
6,370,650 UART: [ldev] AUTHORITY.KEYID = 7
6,371,829 UART: [ldev] FE.KEYID = 1
6,381,612 UART: [ldev] Erasing FE.KEYID = 1
8,857,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,712 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,592,844 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,607,964 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,622,964 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,643,191 UART: [ldev] --
10,647,822 UART: [fwproc] Wait for Commands...
10,649,600 UART: [fwproc] Recv command 0x46574c44
10,651,585 UART: [fwproc] Recv'd Img size: 82832 bytes
13,741,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,824,646 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,948,271 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,294,587 >>> mbox cmd response: success
14,298,579 UART: [afmc] ++
14,299,311 UART: [afmc] CDI.KEYID = 6
14,300,508 UART: [afmc] SUBJECT.KEYID = 7
14,301,945 UART: [afmc] AUTHORITY.KEYID = 5
16,806,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,280 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,247 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,546,302 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,561,381 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,576,430 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,601,061 UART: [afmc] --
18,604,265 UART: [cold-reset] --
18,607,320 UART: [state] Locking Datavault
18,611,932 UART: [state] Locking PCR0, PCR1 and PCR31
18,614,078 UART: [state] Locking ICCM
18,616,978 UART: [exit] Launching FMC @ 0x40000130
18,625,607 UART:
18,625,842 UART: Running Caliptra FMC ...
18,626,870 UART:
18,627,023 UART: [state] CFI Enabled
18,634,968 UART: [fht] FMC Alias Private Key: 7
20,401,007 UART: [art] Extend RT PCRs Done
20,402,234 UART: [art] Lock RT PCRs Done
20,404,026 UART: [art] Populate DV Done
20,409,288 UART: [fht] FMC Alias Private Key: 7
20,410,885 UART: [art] Derive CDI
20,411,704 UART: [art] Store in slot 0x4
20,454,462 UART: [art] Derive Key Pair
20,455,466 UART: [art] Store priv key in slot 0x5
22,882,234 UART: [art] Derive Key Pair - Done
22,894,925 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,601,079 UART: [art] Erasing AUTHORITY.KEYID = 7
24,602,583 UART: [art] PUB.X = 8B447995685D7A097E154B7512E83653947E089912D170B7331BD02C0B316FD14B264764392EA26F2C04B1597F482EF6
24,609,801 UART: [art] PUB.Y = 32C7FDD88E5D2BF84CB4A5C5EAB9CB3C918C427171CEB53204F8C4394964F3824B7FCDEDE35E77A26548C56221C8112D
24,617,065 UART: [art] SIG.R = A49F1E43F5270D7C4F0B380861857602F9DB19D474CC68D707BEE711983979CADF3884F7AFD2C5BBA0B5FC346980EFE8
24,624,431 UART: [art] SIG.S = 6E498E7B33CA0659A3A35A6050321B7142230C2CC52BC674C3E419CA813778663DD10229F89DEEC58F3A23223F20E3E0
25,602,745 UART: mbox::rt_entry...
25,603,714 UART: ____ _ _ _ ____ _____
25,605,708 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,607,742 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,609,692 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,611,631 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,613,487 UART: |_|
25,614,292 UART:
25,745,727 UART: [rt] Runtime listening for mailbox commands...
25,747,746 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,748,924 >>> mbox cmd response data (0 bytes)
289 writing to cptra_bootfsm_go
502 UART:
649 UART: Running Caliptra ROM ...
1,763 UART:
14,774,984 UART: [state] CFI Enabled
14,789,199 UART: [state] LifecycleState = Production
14,790,960 UART: [state] DebugLocked = Yes
14,793,041 UART: [state] Starting the WD Timer 40000000 cycles
14,799,077 UART: [kat] SHA2-256
14,988,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,999,834 UART: [kat] ++
15,000,430 UART: [kat] sha1
15,012,736 UART: [kat] SHA2-256
15,015,716 UART: [kat] SHA2-384
15,022,364 UART: [kat] SHA2-512-ACC
15,024,946 UART: [kat] ECC-384
17,464,991 UART: [kat] HMAC-384Kdf
17,478,517 UART: [kat] LMS
18,010,099 UART: [kat] --
18,013,547 UART: [warm-reset] ++
18,019,651 UART: [warm-reset] --
18,025,306 UART: [state] Locking Datavault
18,028,684 UART: [state] Locking PCR0, PCR1 and PCR31
18,030,394 UART: [state] Locking ICCM
18,032,068 UART: [exit] Launching FMC @ 0x40000130
18,040,780 UART:
18,041,024 UART: Running Caliptra FMC ...
18,042,136 UART:
18,042,300 UART: [state] CFI Enabled
18,044,420 UART: [art] Skip pcr extension
18,045,530 UART: [art] Extend RT PCRs Done
18,046,676 UART: [art] Lock RT PCRs Done
18,048,128 UART: [art] Populate DV Done
18,053,598 UART: [fht] FMC Alias Private Key: 7
18,055,253 UART: [art] Derive CDI
18,056,080 UART: [art] Store in slot 0x4
18,098,849 UART: [art] Derive Key Pair
18,100,312 UART: [art] Store priv key in slot 0x5
20,526,825 UART: [art] Derive Key Pair - Done
20,539,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,246,393 UART: [art] Erasing AUTHORITY.KEYID = 7
22,247,906 UART: [art] PUB.X = 8B447995685D7A097E154B7512E83653947E089912D170B7331BD02C0B316FD14B264764392EA26F2C04B1597F482EF6
22,255,125 UART: [art] PUB.Y = 32C7FDD88E5D2BF84CB4A5C5EAB9CB3C918C427171CEB53204F8C4394964F3824B7FCDEDE35E77A26548C56221C8112D
22,262,382 UART: [art] SIG.R = A49F1E43F5270D7C4F0B380861857602F9DB19D474CC68D707BEE711983979CADF3884F7AFD2C5BBA0B5FC346980EFE8
22,269,809 UART: [art] SIG.S = 6E498E7B33CA0659A3A35A6050321B7142230C2CC52BC674C3E419CA813778663DD10229F89DEEC58F3A23223F20E3E0
23,248,926 UART: mbox::rt_entry...
23,249,889 UART: ____ _ _ _ ____ _____
23,251,828 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,253,843 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,255,789 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,257,725 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,259,656 UART: |_|
23,260,495 UART:
26,062,104 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,752,231 ready_for_fw is high
3,753,003 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,326,302 >>> mbox cmd response: success
18,578,182 UART:
18,578,602 UART: Running Caliptra FMC ...
18,579,730 UART:
18,579,890 UART: [state] CFI Enabled
18,587,901 UART: [fht] FMC Alias Private Key: 7
20,354,191 UART: [art] Extend RT PCRs Done
20,355,420 UART: [art] Lock RT PCRs Done
20,356,798 UART: [art] Populate DV Done
20,362,282 UART: [fht] FMC Alias Private Key: 7
20,363,892 UART: [art] Derive CDI
20,364,738 UART: [art] Store in slot 0x4
20,407,287 UART: [art] Derive Key Pair
20,408,335 UART: [art] Store priv key in slot 0x5
22,835,703 UART: [art] Derive Key Pair - Done
22,848,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,554,926 UART: [art] Erasing AUTHORITY.KEYID = 7
24,556,430 UART: [art] PUB.X = 94B4252663A96602C1F0A3396DA5E34D60681FD9CEDC134FF0229AB3CB9312CBFE3C8E63F8B475D2EA65E973B18432B7
24,563,679 UART: [art] PUB.Y = B30BCE89652D6E760A7F600B90DDC8090BE716603F7B67FA61E440F8EB39D03BF5439D1DBA2277C4EF80F27C6150BE99
24,570,956 UART: [art] SIG.R = B4827386FE015A9FE74A14F823393796482082AD463F5B7C7CFB53F5982DFD446876678571F58C680A4FAF8162A67B4A
24,578,365 UART: [art] SIG.S = EC9F11465EBCF5AA280F97CBD498F4E06CB7567FA2932B68C3553360BC5198C319D98D34E727CF1E29A28C5B1CA364DF
25,556,487 UART: mbox::rt_entry...
25,557,448 UART: ____ _ _ _ ____ _____
25,559,440 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,561,457 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,563,408 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,565,389 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,567,271 UART: |_|
25,568,114 UART:
25,699,304 UART: [rt] Runtime listening for mailbox commands...
25,701,329 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,702,466 >>> mbox cmd response data (0 bytes)
293 writing to cptra_bootfsm_go
17,986,173 UART:
17,986,589 UART: Running Caliptra FMC ...
17,987,641 UART:
17,987,805 UART: [state] CFI Enabled
17,989,720 UART: [art] Skip pcr extension
17,990,834 UART: [art] Extend RT PCRs Done
17,991,981 UART: [art] Lock RT PCRs Done
17,993,051 UART: [art] Populate DV Done
17,998,792 UART: [fht] FMC Alias Private Key: 7
18,000,342 UART: [art] Derive CDI
18,001,191 UART: [art] Store in slot 0x4
18,043,691 UART: [art] Derive Key Pair
18,044,699 UART: [art] Store priv key in slot 0x5
20,471,708 UART: [art] Derive Key Pair - Done
20,484,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,191,341 UART: [art] Erasing AUTHORITY.KEYID = 7
22,192,852 UART: [art] PUB.X = 94B4252663A96602C1F0A3396DA5E34D60681FD9CEDC134FF0229AB3CB9312CBFE3C8E63F8B475D2EA65E973B18432B7
22,200,092 UART: [art] PUB.Y = B30BCE89652D6E760A7F600B90DDC8090BE716603F7B67FA61E440F8EB39D03BF5439D1DBA2277C4EF80F27C6150BE99
22,207,373 UART: [art] SIG.R = B4827386FE015A9FE74A14F823393796482082AD463F5B7C7CFB53F5982DFD446876678571F58C680A4FAF8162A67B4A
22,214,799 UART: [art] SIG.S = EC9F11465EBCF5AA280F97CBD498F4E06CB7567FA2932B68C3553360BC5198C319D98D34E727CF1E29A28C5B1CA364DF
23,193,879 UART: mbox::rt_entry...
23,194,816 UART: ____ _ _ _ ____ _____
23,196,849 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,198,867 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,200,799 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,202,734 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,204,685 UART: |_|
23,205,499 UART:
26,011,026 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Production
86,083 UART: [state] DebugLocked = Yes
86,631 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,399 UART: [kat] SHA2-256
882,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,445 UART: [kat] ++
886,597 UART: [kat] sha1
890,935 UART: [kat] SHA2-256
892,873 UART: [kat] SHA2-384
895,728 UART: [kat] SHA2-512-ACC
897,629 UART: [kat] ECC-384
903,064 UART: [kat] HMAC-384Kdf
907,714 UART: [kat] LMS
1,475,910 UART: [kat] --
1,477,019 UART: [cold-reset] ++
1,477,390 UART: [fht] Storing FHT @ 0x50003400
1,480,163 UART: [idev] ++
1,480,331 UART: [idev] CDI.KEYID = 6
1,480,691 UART: [idev] SUBJECT.KEYID = 7
1,481,115 UART: [idev] UDS.KEYID = 0
1,481,460 ready_for_fw is high
1,481,460 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,489,222 UART: [idev] Erasing UDS.KEYID = 0
1,505,627 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,230 UART: [idev] --
1,515,439 UART: [ldev] ++
1,515,607 UART: [ldev] CDI.KEYID = 6
1,515,970 UART: [ldev] SUBJECT.KEYID = 5
1,516,396 UART: [ldev] AUTHORITY.KEYID = 7
1,516,859 UART: [ldev] FE.KEYID = 1
1,522,155 UART: [ldev] Erasing FE.KEYID = 1
1,547,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,569 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,263 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,135 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,841 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,915 UART: [ldev] --
1,587,252 UART: [fwproc] Waiting for Commands...
1,587,991 UART: [fwproc] Received command 0x46574c44
1,588,782 UART: [fwproc] Received Image of size 82832 bytes
2,550,257 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,577,244 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,608,462 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,695,322 >>> mbox cmd response: success
2,696,557 UART: [afmc] ++
2,696,725 UART: [afmc] CDI.KEYID = 6
2,697,087 UART: [afmc] SUBJECT.KEYID = 7
2,697,512 UART: [afmc] AUTHORITY.KEYID = 5
2,732,499 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,748,969 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,749,749 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,755,464 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,761,349 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
2,767,052 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
2,774,884 UART: [afmc] --
2,775,789 UART: [cold-reset] --
2,776,657 UART: [state] Locking Datavault
2,777,614 UART: [state] Locking PCR0, PCR1 and PCR31
2,778,218 UART: [state] Locking ICCM
2,778,708 UART: [exit] Launching FMC @ 0x40000130
2,784,038 UART:
2,784,054 UART: Running Caliptra FMC ...
2,784,462 UART:
2,784,516 UART: [state] CFI Enabled
2,795,180 UART: [fht] FMC Alias Private Key: 7
2,913,849 UART: [art] Extend RT PCRs Done
2,914,277 UART: [art] Lock RT PCRs Done
2,915,787 UART: [art] Populate DV Done
2,924,203 UART: [fht] FMC Alias Private Key: 7
2,925,349 UART: [art] Derive CDI
2,925,629 UART: [art] Store in slot 0x4
3,011,717 UART: [art] Derive Key Pair
3,012,077 UART: [art] Store priv key in slot 0x5
3,025,224 UART: [art] Derive Key Pair - Done
3,039,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,055,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,056,303 UART: [art] PUB.X = 33FB9FD7870710F2A3D59C069744A9948DEAF857D4DE5CC6A05DDCE9BFBB685FD0071E580FA62C584B7D5DF28CB60CE4
3,063,078 UART: [art] PUB.Y = F4FD757D8567A1A1E6415D39E89E00BEC919660AEF0247CAEC988B659080D8B942B0FB72470844CC57FD498267CCC123
3,070,001 UART: [art] SIG.R = CED7C48D61E3D3198D24FA8F407EB0940EAEBBD99E948B05E5B3F7F7B99D07D095E0E92991A81ABE67541E541555B724
3,076,772 UART: [art] SIG.S = 3196F6A758473D8AA21164CF583EFABC79AFFE1AB02888D11E86DF3CCA71418B9387C31A5C3AED06E8E9D4E892994E8B
3,100,375 UART: mbox::rt_entry...
3,100,747 UART: ____ _ _ _ ____ _____
3,101,531 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,102,331 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,103,099 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,103,867 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,104,635 UART: |_|
3,104,947 UART:
3,224,455 UART: [rt] Runtime listening for mailbox commands...
3,225,217 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
3,225,443 >>> mbox cmd response data (0 bytes)
3,225,445 writing to cptra_bootfsm_go
3,225,540 UART:
3,225,556 UART: Running Caliptra ROM ...
3,225,964 UART:
3,226,018 UART: [state] CFI Enabled
3,228,879 UART: [state] LifecycleState = Production
3,229,487 UART: [state] DebugLocked = Yes
3,230,003 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,231,561 UART: [kat] SHA2-256
4,025,492 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,029,607 UART: [kat] ++
4,029,759 UART: [kat] sha1
4,033,897 UART: [kat] SHA2-256
4,035,835 UART: [kat] SHA2-384
4,038,624 UART: [kat] SHA2-512-ACC
4,040,525 UART: [kat] ECC-384
4,046,190 UART: [kat] HMAC-384Kdf
4,050,622 UART: [kat] LMS
4,618,818 UART: [kat] --
4,619,862 UART: [warm-reset] ++
4,620,793 UART: [warm-reset] --
4,621,430 UART: [state] Locking Datavault
4,622,218 UART: [state] Locking PCR0, PCR1 and PCR31
4,622,822 UART: [state] Locking ICCM
4,623,344 UART: [exit] Launching FMC @ 0x40000130
4,628,674 UART:
4,628,690 UART: Running Caliptra FMC ...
4,629,098 UART:
4,629,152 UART: [state] CFI Enabled
4,630,469 UART: [art] Skip pcr extension
4,630,878 UART: [art] Extend RT PCRs Done
4,631,306 UART: [art] Lock RT PCRs Done
4,632,569 UART: [art] Populate DV Done
4,640,823 UART: [fht] FMC Alias Private Key: 7
4,641,957 UART: [art] Derive CDI
4,642,237 UART: [art] Store in slot 0x4
4,728,075 UART: [art] Derive Key Pair
4,728,435 UART: [art] Store priv key in slot 0x5
4,741,646 UART: [art] Derive Key Pair - Done
4,756,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,771,992 UART: [art] Erasing AUTHORITY.KEYID = 7
4,772,757 UART: [art] PUB.X = 33FB9FD7870710F2A3D59C069744A9948DEAF857D4DE5CC6A05DDCE9BFBB685FD0071E580FA62C584B7D5DF28CB60CE4
4,779,532 UART: [art] PUB.Y = F4FD757D8567A1A1E6415D39E89E00BEC919660AEF0247CAEC988B659080D8B942B0FB72470844CC57FD498267CCC123
4,786,455 UART: [art] SIG.R = CED7C48D61E3D3198D24FA8F407EB0940EAEBBD99E948B05E5B3F7F7B99D07D095E0E92991A81ABE67541E541555B724
4,793,226 UART: [art] SIG.S = 3196F6A758473D8AA21164CF583EFABC79AFFE1AB02888D11E86DF3CCA71418B9387C31A5C3AED06E8E9D4E892994E8B
4,816,795 UART: mbox::rt_entry...
4,817,167 UART: ____ _ _ _ ____ _____
4,817,951 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,818,751 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,819,519 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,820,287 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,821,055 UART: |_|
4,821,367 UART:
5,201,657 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,244 ready_for_fw is high
1,363,244 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,542,822 >>> mbox cmd response: success
2,604,154 UART:
2,604,170 UART: Running Caliptra FMC ...
2,604,578 UART:
2,604,632 UART: [state] CFI Enabled
2,615,484 UART: [fht] FMC Alias Private Key: 7
2,733,951 UART: [art] Extend RT PCRs Done
2,734,379 UART: [art] Lock RT PCRs Done
2,736,331 UART: [art] Populate DV Done
2,744,707 UART: [fht] FMC Alias Private Key: 7
2,745,769 UART: [art] Derive CDI
2,746,049 UART: [art] Store in slot 0x4
2,831,759 UART: [art] Derive Key Pair
2,832,119 UART: [art] Store priv key in slot 0x5
2,844,820 UART: [art] Derive Key Pair - Done
2,859,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,874,975 UART: [art] Erasing AUTHORITY.KEYID = 7
2,875,740 UART: [art] PUB.X = 19AC581531F47097D4E149DA2BE289207B448438741956E7AC1CCA6127A9407009FEFA2239BE3AAE83F0731F089B057B
2,882,499 UART: [art] PUB.Y = 19AF1B129DD387089C300A388505AE6AEF5DDE4B926A6658C02D6787A606A3FC6A603D813637FAF36B7ED7FCA5CC0454
2,889,444 UART: [art] SIG.R = CDBBD892610533B75E4E40F90BF581AB58E0A7498D9581E50AC27634819836ADEEDD6EFDE182EBF41FFBE7BDB538B38A
2,896,225 UART: [art] SIG.S = B4E04ADDF323764E9068E66BBD780E8167CFECE406E9248A303697D0B4DE6121C08B8EE303E8EF44CC25C08B5B298D51
2,919,576 UART: mbox::rt_entry...
2,919,948 UART: ____ _ _ _ ____ _____
2,920,732 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,921,532 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,922,300 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,923,068 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,923,836 UART: |_|
2,924,148 UART:
3,042,311 UART: [rt] Runtime listening for mailbox commands...
3,043,073 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
3,043,299 >>> mbox cmd response data (0 bytes)
3,043,301 writing to cptra_bootfsm_go
4,328,416 UART:
4,328,432 UART: Running Caliptra FMC ...
4,328,840 UART:
4,328,894 UART: [state] CFI Enabled
4,330,423 UART: [art] Skip pcr extension
4,330,832 UART: [art] Extend RT PCRs Done
4,331,260 UART: [art] Lock RT PCRs Done
4,332,587 UART: [art] Populate DV Done
4,340,943 UART: [fht] FMC Alias Private Key: 7
4,342,119 UART: [art] Derive CDI
4,342,399 UART: [art] Store in slot 0x4
4,428,143 UART: [art] Derive Key Pair
4,428,503 UART: [art] Store priv key in slot 0x5
4,442,110 UART: [art] Derive Key Pair - Done
4,456,844 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,472,307 UART: [art] Erasing AUTHORITY.KEYID = 7
4,473,072 UART: [art] PUB.X = 19AC581531F47097D4E149DA2BE289207B448438741956E7AC1CCA6127A9407009FEFA2239BE3AAE83F0731F089B057B
4,479,831 UART: [art] PUB.Y = 19AF1B129DD387089C300A388505AE6AEF5DDE4B926A6658C02D6787A606A3FC6A603D813637FAF36B7ED7FCA5CC0454
4,486,776 UART: [art] SIG.R = CDBBD892610533B75E4E40F90BF581AB58E0A7498D9581E50AC27634819836ADEEDD6EFDE182EBF41FFBE7BDB538B38A
4,493,557 UART: [art] SIG.S = B4E04ADDF323764E9068E66BBD780E8167CFECE406E9248A303697D0B4DE6121C08B8EE303E8EF44CC25C08B5B298D51
4,516,676 UART: mbox::rt_entry...
4,517,048 UART: ____ _ _ _ ____ _____
4,517,832 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,518,632 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,519,400 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,520,168 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,520,936 UART: |_|
4,521,248 UART:
4,900,901 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Production
85,988 UART: [state] DebugLocked = Yes
86,646 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,334 UART: [kat] SHA2-256
882,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,380 UART: [kat] ++
886,532 UART: [kat] sha1
890,542 UART: [kat] SHA2-256
892,480 UART: [kat] SHA2-384
895,201 UART: [kat] SHA2-512-ACC
897,102 UART: [kat] ECC-384
902,401 UART: [kat] HMAC-384Kdf
906,991 UART: [kat] LMS
1,475,187 UART: [kat] --
1,476,202 UART: [cold-reset] ++
1,476,567 UART: [fht] Storing FHT @ 0x50003400
1,479,398 UART: [idev] ++
1,479,566 UART: [idev] CDI.KEYID = 6
1,479,926 UART: [idev] SUBJECT.KEYID = 7
1,480,350 UART: [idev] UDS.KEYID = 0
1,480,695 ready_for_fw is high
1,480,695 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,837 UART: [idev] Erasing UDS.KEYID = 0
1,505,584 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,213 UART: [idev] --
1,515,172 UART: [ldev] ++
1,515,340 UART: [ldev] CDI.KEYID = 6
1,515,703 UART: [ldev] SUBJECT.KEYID = 5
1,516,129 UART: [ldev] AUTHORITY.KEYID = 7
1,516,592 UART: [ldev] FE.KEYID = 1
1,522,166 UART: [ldev] Erasing FE.KEYID = 1
1,547,675 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,196 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,890 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,762 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,468 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,654 UART: [ldev] --
1,587,121 UART: [fwproc] Waiting for Commands...
1,587,870 UART: [fwproc] Received command 0x46574c44
1,588,661 UART: [fwproc] Received Image of size 82832 bytes
2,548,418 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,575,103 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,606,321 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,692,949 >>> mbox cmd response: success
2,694,072 UART: [afmc] ++
2,694,240 UART: [afmc] CDI.KEYID = 6
2,694,602 UART: [afmc] SUBJECT.KEYID = 7
2,695,027 UART: [afmc] AUTHORITY.KEYID = 5
2,731,060 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,747,304 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,748,084 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,753,799 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,759,684 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
2,765,387 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
2,773,363 UART: [afmc] --
2,774,350 UART: [cold-reset] --
2,775,524 UART: [state] Locking Datavault
2,776,817 UART: [state] Locking PCR0, PCR1 and PCR31
2,777,421 UART: [state] Locking ICCM
2,778,051 UART: [exit] Launching FMC @ 0x40000130
2,783,381 UART:
2,783,397 UART: Running Caliptra FMC ...
2,783,805 UART:
2,783,948 UART: [state] CFI Enabled
2,794,460 UART: [fht] FMC Alias Private Key: 7
2,913,219 UART: [art] Extend RT PCRs Done
2,913,647 UART: [art] Lock RT PCRs Done
2,915,145 UART: [art] Populate DV Done
2,923,459 UART: [fht] FMC Alias Private Key: 7
2,924,539 UART: [art] Derive CDI
2,924,819 UART: [art] Store in slot 0x4
3,010,711 UART: [art] Derive Key Pair
3,011,071 UART: [art] Store priv key in slot 0x5
3,024,596 UART: [art] Derive Key Pair - Done
3,039,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,054,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,055,146 UART: [art] PUB.X = 62EB85B9557B1685F0B74AC9130E47C647749BC20BE8AA6EBF1F15C6A8B3B95E695D44DAEA24CB23DB25D200D172D1A0
3,061,902 UART: [art] PUB.Y = C6CC94B2C4ED76745C121CBEAD713FFA640A962307C6DBDE53240D09B78342BD186A22385100935697B2496FB339710D
3,068,815 UART: [art] SIG.R = 98E9869B70F3DF6352B2B563027D3F5A8DA52D824D7B349FDB57713F64D4B442238D16C0BF10822DF93C3F10BA1903B4
3,075,581 UART: [art] SIG.S = 879B936DA1130237FE0854845AFBA6B9704EFAADFC3E84EA5C657C102F09BA9D6DEA22B205EE61F081FB709B0F3FD3B7
3,099,904 UART: mbox::rt_entry...
3,100,276 UART: ____ _ _ _ ____ _____
3,101,060 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,101,860 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,102,628 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,103,396 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,104,164 UART: |_|
3,104,476 UART:
3,222,399 UART: [rt] Runtime listening for mailbox commands...
3,223,161 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
3,223,387 >>> mbox cmd response data (0 bytes)
3,223,389 writing to cptra_bootfsm_go
3,223,484 UART:
3,223,500 UART: Running Caliptra ROM ...
3,223,908 UART:
3,224,049 UART: [state] CFI Enabled
3,226,474 UART: [state] LifecycleState = Production
3,227,082 UART: [state] DebugLocked = Yes
3,227,778 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,229,392 UART: [kat] SHA2-256
4,023,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,027,438 UART: [kat] ++
4,027,590 UART: [kat] sha1
4,031,932 UART: [kat] SHA2-256
4,033,870 UART: [kat] SHA2-384
4,036,609 UART: [kat] SHA2-512-ACC
4,038,510 UART: [kat] ECC-384
4,044,045 UART: [kat] HMAC-384Kdf
4,048,725 UART: [kat] LMS
4,616,921 UART: [kat] --
4,617,753 UART: [warm-reset] ++
4,618,640 UART: [warm-reset] --
4,619,633 UART: [state] Locking Datavault
4,620,519 UART: [state] Locking PCR0, PCR1 and PCR31
4,621,123 UART: [state] Locking ICCM
4,621,709 UART: [exit] Launching FMC @ 0x40000130
4,627,039 UART:
4,627,055 UART: Running Caliptra FMC ...
4,627,463 UART:
4,627,606 UART: [state] CFI Enabled
4,628,975 UART: [art] Skip pcr extension
4,629,384 UART: [art] Extend RT PCRs Done
4,629,812 UART: [art] Lock RT PCRs Done
4,631,173 UART: [art] Populate DV Done
4,639,529 UART: [fht] FMC Alias Private Key: 7
4,640,523 UART: [art] Derive CDI
4,640,803 UART: [art] Store in slot 0x4
4,726,741 UART: [art] Derive Key Pair
4,727,101 UART: [art] Store priv key in slot 0x5
4,740,542 UART: [art] Derive Key Pair - Done
4,755,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,771,055 UART: [art] Erasing AUTHORITY.KEYID = 7
4,771,820 UART: [art] PUB.X = 62EB85B9557B1685F0B74AC9130E47C647749BC20BE8AA6EBF1F15C6A8B3B95E695D44DAEA24CB23DB25D200D172D1A0
4,778,576 UART: [art] PUB.Y = C6CC94B2C4ED76745C121CBEAD713FFA640A962307C6DBDE53240D09B78342BD186A22385100935697B2496FB339710D
4,785,489 UART: [art] SIG.R = 98E9869B70F3DF6352B2B563027D3F5A8DA52D824D7B349FDB57713F64D4B442238D16C0BF10822DF93C3F10BA1903B4
4,792,255 UART: [art] SIG.S = 879B936DA1130237FE0854845AFBA6B9704EFAADFC3E84EA5C657C102F09BA9D6DEA22B205EE61F081FB709B0F3FD3B7
4,816,030 UART: mbox::rt_entry...
4,816,402 UART: ____ _ _ _ ____ _____
4,817,186 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,817,986 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,818,754 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,819,522 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,820,290 UART: |_|
4,820,602 UART:
5,202,527 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,969 ready_for_fw is high
1,363,969 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,546,529 >>> mbox cmd response: success
2,608,561 UART:
2,608,577 UART: Running Caliptra FMC ...
2,608,985 UART:
2,609,128 UART: [state] CFI Enabled
2,619,720 UART: [fht] FMC Alias Private Key: 7
2,738,897 UART: [art] Extend RT PCRs Done
2,739,325 UART: [art] Lock RT PCRs Done
2,740,611 UART: [art] Populate DV Done
2,748,913 UART: [fht] FMC Alias Private Key: 7
2,749,913 UART: [art] Derive CDI
2,750,193 UART: [art] Store in slot 0x4
2,835,969 UART: [art] Derive Key Pair
2,836,329 UART: [art] Store priv key in slot 0x5
2,849,448 UART: [art] Derive Key Pair - Done
2,864,142 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,879,379 UART: [art] Erasing AUTHORITY.KEYID = 7
2,880,144 UART: [art] PUB.X = 3829CB7C678A9EE3E5C8D79DDEE4D8E047C1B30064DD1068C326ECC7CC33598A3DDC08BFAFD923F878660892F9F60FD6
2,886,899 UART: [art] PUB.Y = ADA628434815710F3B4ACBD28C18BB6DCE7351EE5F7A0DC7A48C1A4BF6EE9A8DC15E846FAD644C73C5E8301B5882DCCC
2,893,867 UART: [art] SIG.R = 4FA75FA49191B8E278CAC57B729EC617AB77186AA89CC15246F4FE69F5A02E63E5C08DEA3060959636C04CFE55B5768E
2,900,645 UART: [art] SIG.S = AD3BD74A906FC863E674A2BC26F653318E1AFD646F156E4CB449177CE6D59C216F7CA039A5322497487DE773EC8FBD04
2,924,966 UART: mbox::rt_entry...
2,925,338 UART: ____ _ _ _ ____ _____
2,926,122 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,926,922 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,927,690 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,928,458 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,929,226 UART: |_|
2,929,538 UART:
3,047,794 UART: [rt] Runtime listening for mailbox commands...
3,048,556 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
3,048,782 >>> mbox cmd response data (0 bytes)
3,048,784 writing to cptra_bootfsm_go
4,334,950 UART:
4,334,966 UART: Running Caliptra FMC ...
4,335,374 UART:
4,335,517 UART: [state] CFI Enabled
4,336,910 UART: [art] Skip pcr extension
4,337,319 UART: [art] Extend RT PCRs Done
4,337,747 UART: [art] Lock RT PCRs Done
4,339,002 UART: [art] Populate DV Done
4,347,224 UART: [fht] FMC Alias Private Key: 7
4,348,354 UART: [art] Derive CDI
4,348,634 UART: [art] Store in slot 0x4
4,434,392 UART: [art] Derive Key Pair
4,434,752 UART: [art] Store priv key in slot 0x5
4,448,323 UART: [art] Derive Key Pair - Done
4,463,309 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,478,750 UART: [art] Erasing AUTHORITY.KEYID = 7
4,479,515 UART: [art] PUB.X = 3829CB7C678A9EE3E5C8D79DDEE4D8E047C1B30064DD1068C326ECC7CC33598A3DDC08BFAFD923F878660892F9F60FD6
4,486,270 UART: [art] PUB.Y = ADA628434815710F3B4ACBD28C18BB6DCE7351EE5F7A0DC7A48C1A4BF6EE9A8DC15E846FAD644C73C5E8301B5882DCCC
4,493,238 UART: [art] SIG.R = 4FA75FA49191B8E278CAC57B729EC617AB77186AA89CC15246F4FE69F5A02E63E5C08DEA3060959636C04CFE55B5768E
4,500,016 UART: [art] SIG.S = AD3BD74A906FC863E674A2BC26F653318E1AFD646F156E4CB449177CE6D59C216F7CA039A5322497487DE773EC8FBD04
4,523,829 UART: mbox::rt_entry...
4,524,201 UART: ____ _ _ _ ____ _____
4,524,985 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,525,785 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,526,553 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,527,321 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,528,089 UART: |_|
4,528,401 UART:
4,912,339 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Production
86,057 UART: [state] DebugLocked = Yes
86,813 UART: [state] Starting the WD Timer 40000000 cycles
88,354 UART: [kat] SHA2-256
891,904 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,008 UART: [kat] ++
896,160 UART: [kat] sha1
900,396 UART: [kat] SHA2-256
902,336 UART: [kat] SHA2-384
905,029 UART: [kat] SHA2-512-ACC
906,930 UART: [kat] ECC-384
916,373 UART: [kat] HMAC-384Kdf
920,923 UART: [kat] LMS
1,169,235 UART: [kat] --
1,170,444 UART: [cold-reset] ++
1,170,919 UART: [fht] FHT @ 0x50003400
1,173,769 UART: [idev] ++
1,173,937 UART: [idev] CDI.KEYID = 6
1,174,298 UART: [idev] SUBJECT.KEYID = 7
1,174,723 UART: [idev] UDS.KEYID = 0
1,175,069 ready_for_fw is high
1,175,069 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,391 UART: [idev] Erasing UDS.KEYID = 0
1,199,328 UART: [idev] Sha1 KeyId Algorithm
1,208,395 UART: [idev] --
1,209,484 UART: [ldev] ++
1,209,652 UART: [ldev] CDI.KEYID = 6
1,210,016 UART: [ldev] SUBJECT.KEYID = 5
1,210,443 UART: [ldev] AUTHORITY.KEYID = 7
1,210,906 UART: [ldev] FE.KEYID = 1
1,216,488 UART: [ldev] Erasing FE.KEYID = 1
1,242,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,977 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,671 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,541 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,247 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,345 UART: [ldev] --
1,281,654 UART: [fwproc] Wait for Commands...
1,282,369 UART: [fwproc] Recv command 0x46574c44
1,283,102 UART: [fwproc] Recv'd Img size: 82832 bytes
2,244,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,271,090 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,302,265 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,389,029 >>> mbox cmd response: success
2,390,100 UART: [afmc] ++
2,390,268 UART: [afmc] CDI.KEYID = 6
2,390,631 UART: [afmc] SUBJECT.KEYID = 7
2,391,057 UART: [afmc] AUTHORITY.KEYID = 5
2,425,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,442,535 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,443,284 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,449,000 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,454,883 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,460,588 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,468,314 UART: [afmc] --
2,469,242 UART: [cold-reset] --
2,470,282 UART: [state] Locking Datavault
2,471,347 UART: [state] Locking PCR0, PCR1 and PCR31
2,471,951 UART: [state] Locking ICCM
2,472,439 UART: [exit] Launching FMC @ 0x40000130
2,477,769 UART:
2,477,785 UART: Running Caliptra FMC ...
2,478,193 UART:
2,478,247 UART: [state] CFI Enabled
2,488,801 UART: [fht] FMC Alias Private Key: 7
2,607,786 UART: [art] Extend RT PCRs Done
2,608,214 UART: [art] Lock RT PCRs Done
2,609,836 UART: [art] Populate DV Done
2,618,170 UART: [fht] FMC Alias Private Key: 7
2,619,256 UART: [art] Derive CDI
2,619,536 UART: [art] Store in slot 0x4
2,705,175 UART: [art] Derive Key Pair
2,705,535 UART: [art] Store priv key in slot 0x5
2,719,261 UART: [art] Derive Key Pair - Done
2,734,535 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,750,298 UART: [art] Erasing AUTHORITY.KEYID = 7
2,751,063 UART: [art] PUB.X = 2D963BD81EC966AB08DBF6237A2D5DB26AB54E344FB43F37931162D66D80C5BBC78614C3353584ADDF4E4CCB774911B2
2,757,840 UART: [art] PUB.Y = F472B8B8B081EA8854DA27715801DB1C683D943E27E68872A8F8D05DB4DD8E7E13547CDBB620CE1DA82C95665E3D8E0E
2,764,794 UART: [art] SIG.R = 26993745E2DDA82678E5A72BB53CC6E84026AEF9E8E48D0CB987794319026010513D3EE57299C61D2BBC150EC44D1B07
2,771,552 UART: [art] SIG.S = 25AF17998A16B9849D170879F093022B70A5803C8BF67971BEE7AEE7746F7F14268582C532361F5A3054D04555AB5860
2,794,884 UART: mbox::rt_entry...
2,795,256 UART: ____ _ _ _ ____ _____
2,796,040 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,796,840 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,797,608 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,798,376 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,799,144 UART: |_|
2,799,456 UART:
2,918,848 UART: [rt] Runtime listening for mailbox commands...
2,919,610 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,919,836 >>> mbox cmd response data (0 bytes)
2,919,838 writing to cptra_bootfsm_go
2,919,930 UART:
2,919,946 UART: Running Caliptra ROM ...
2,920,354 UART:
2,920,409 UART: [state] CFI Enabled
2,923,402 UART: [state] LifecycleState = Production
2,924,010 UART: [state] DebugLocked = Yes
2,924,634 UART: [state] Starting the WD Timer 40000000 cycles
2,926,105 UART: [kat] SHA2-256
3,729,655 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,733,759 UART: [kat] ++
3,733,911 UART: [kat] sha1
3,738,087 UART: [kat] SHA2-256
3,740,027 UART: [kat] SHA2-384
3,742,616 UART: [kat] SHA2-512-ACC
3,744,517 UART: [kat] ECC-384
3,754,152 UART: [kat] HMAC-384Kdf
3,758,662 UART: [kat] LMS
4,006,974 UART: [kat] --
4,007,634 UART: [warm-reset] ++
4,008,231 UART: [warm-reset] --
4,009,166 UART: [state] Locking Datavault
4,009,952 UART: [state] Locking PCR0, PCR1 and PCR31
4,010,556 UART: [state] Locking ICCM
4,010,998 UART: [exit] Launching FMC @ 0x40000130
4,016,328 UART:
4,016,344 UART: Running Caliptra FMC ...
4,016,752 UART:
4,016,806 UART: [state] CFI Enabled
4,017,993 UART: [art] Skip pcr extension
4,018,402 UART: [art] Extend RT PCRs Done
4,018,830 UART: [art] Lock RT PCRs Done
4,020,183 UART: [art] Populate DV Done
4,028,473 UART: [fht] FMC Alias Private Key: 7
4,029,449 UART: [art] Derive CDI
4,029,729 UART: [art] Store in slot 0x4
4,115,398 UART: [art] Derive Key Pair
4,115,758 UART: [art] Store priv key in slot 0x5
4,128,634 UART: [art] Derive Key Pair - Done
4,143,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,159,133 UART: [art] Erasing AUTHORITY.KEYID = 7
4,159,898 UART: [art] PUB.X = 2D963BD81EC966AB08DBF6237A2D5DB26AB54E344FB43F37931162D66D80C5BBC78614C3353584ADDF4E4CCB774911B2
4,166,675 UART: [art] PUB.Y = F472B8B8B081EA8854DA27715801DB1C683D943E27E68872A8F8D05DB4DD8E7E13547CDBB620CE1DA82C95665E3D8E0E
4,173,629 UART: [art] SIG.R = 26993745E2DDA82678E5A72BB53CC6E84026AEF9E8E48D0CB987794319026010513D3EE57299C61D2BBC150EC44D1B07
4,180,387 UART: [art] SIG.S = 25AF17998A16B9849D170879F093022B70A5803C8BF67971BEE7AEE7746F7F14268582C532361F5A3054D04555AB5860
4,204,127 UART: mbox::rt_entry...
4,204,499 UART: ____ _ _ _ ____ _____
4,205,283 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,206,083 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,206,851 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,207,619 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,208,387 UART: |_|
4,208,699 UART:
4,586,133 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,893 ready_for_fw is high
1,058,893 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,239,564 >>> mbox cmd response: success
2,301,691 UART:
2,301,707 UART: Running Caliptra FMC ...
2,302,115 UART:
2,302,169 UART: [state] CFI Enabled
2,312,851 UART: [fht] FMC Alias Private Key: 7
2,430,850 UART: [art] Extend RT PCRs Done
2,431,278 UART: [art] Lock RT PCRs Done
2,432,852 UART: [art] Populate DV Done
2,440,938 UART: [fht] FMC Alias Private Key: 7
2,441,946 UART: [art] Derive CDI
2,442,226 UART: [art] Store in slot 0x4
2,527,271 UART: [art] Derive Key Pair
2,527,631 UART: [art] Store priv key in slot 0x5
2,540,801 UART: [art] Derive Key Pair - Done
2,555,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,571,006 UART: [art] Erasing AUTHORITY.KEYID = 7
2,571,771 UART: [art] PUB.X = D1BB190B78C00F5B01ADA038C5A77A93B06CAA8A0EA862D345ED9BDB6593A825CCFEC5DF66B93C3AE64B0237201C3F63
2,578,546 UART: [art] PUB.Y = EE1D28BEBC10939B28A6A05BF9C9BFE7A451F90C974C545874201FF979E3F5DB2CAC33B93B8EE659DD2F70C0452A976F
2,585,509 UART: [art] SIG.R = 2F965C6F7CF8ECCAABC11D45E86508BA4531CEADA18ED52DE9E5452303E1CFD1F575AA8295FAFA75EDA71B4B4CE5AC31
2,592,303 UART: [art] SIG.S = 74F613A4DFDE38B6BF8BAF6D99D823D3827B450F0ACE1AA14AB9E59EA0E7BA0F006B1DB6F20CA854B464B530901A01D2
2,616,052 UART: mbox::rt_entry...
2,616,424 UART: ____ _ _ _ ____ _____
2,617,208 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,618,008 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,618,776 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,619,544 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,620,312 UART: |_|
2,620,624 UART:
2,738,614 UART: [rt] Runtime listening for mailbox commands...
2,739,376 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,739,602 >>> mbox cmd response data (0 bytes)
2,739,604 writing to cptra_bootfsm_go
3,721,829 UART:
3,721,845 UART: Running Caliptra FMC ...
3,722,253 UART:
3,722,307 UART: [state] CFI Enabled
3,723,782 UART: [art] Skip pcr extension
3,724,191 UART: [art] Extend RT PCRs Done
3,724,619 UART: [art] Lock RT PCRs Done
3,725,896 UART: [art] Populate DV Done
3,734,020 UART: [fht] FMC Alias Private Key: 7
3,735,202 UART: [art] Derive CDI
3,735,482 UART: [art] Store in slot 0x4
3,820,933 UART: [art] Derive Key Pair
3,821,293 UART: [art] Store priv key in slot 0x5
3,834,743 UART: [art] Derive Key Pair - Done
3,849,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,865,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,865,769 UART: [art] PUB.X = D1BB190B78C00F5B01ADA038C5A77A93B06CAA8A0EA862D345ED9BDB6593A825CCFEC5DF66B93C3AE64B0237201C3F63
3,872,544 UART: [art] PUB.Y = EE1D28BEBC10939B28A6A05BF9C9BFE7A451F90C974C545874201FF979E3F5DB2CAC33B93B8EE659DD2F70C0452A976F
3,879,507 UART: [art] SIG.R = 2F965C6F7CF8ECCAABC11D45E86508BA4531CEADA18ED52DE9E5452303E1CFD1F575AA8295FAFA75EDA71B4B4CE5AC31
3,886,301 UART: [art] SIG.S = 74F613A4DFDE38B6BF8BAF6D99D823D3827B450F0ACE1AA14AB9E59EA0E7BA0F006B1DB6F20CA854B464B530901A01D2
3,910,094 UART: mbox::rt_entry...
3,910,466 UART: ____ _ _ _ ____ _____
3,911,250 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,912,050 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,912,818 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,913,586 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,914,354 UART: |_|
3,914,666 UART:
4,294,254 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Production
85,746 UART: [state] DebugLocked = Yes
86,448 UART: [state] Starting the WD Timer 40000000 cycles
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,733 UART: [kat] ++
895,885 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,578 UART: [kat] HMAC-384Kdf
921,288 UART: [kat] LMS
1,169,600 UART: [kat] --
1,170,445 UART: [cold-reset] ++
1,170,914 UART: [fht] FHT @ 0x50003400
1,173,602 UART: [idev] ++
1,173,770 UART: [idev] CDI.KEYID = 6
1,174,131 UART: [idev] SUBJECT.KEYID = 7
1,174,556 UART: [idev] UDS.KEYID = 0
1,174,902 ready_for_fw is high
1,174,902 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,418 UART: [idev] Erasing UDS.KEYID = 0
1,199,785 UART: [idev] Sha1 KeyId Algorithm
1,208,820 UART: [idev] --
1,209,745 UART: [ldev] ++
1,209,913 UART: [ldev] CDI.KEYID = 6
1,210,277 UART: [ldev] SUBJECT.KEYID = 5
1,210,704 UART: [ldev] AUTHORITY.KEYID = 7
1,211,167 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,242,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,712 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,406 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,276 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,982 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,152 UART: [ldev] --
1,282,459 UART: [fwproc] Wait for Commands...
1,283,046 UART: [fwproc] Recv command 0x46574c44
1,283,779 UART: [fwproc] Recv'd Img size: 82832 bytes
2,244,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,271,841 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,303,016 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,389,754 >>> mbox cmd response: success
2,390,805 UART: [afmc] ++
2,390,973 UART: [afmc] CDI.KEYID = 6
2,391,336 UART: [afmc] SUBJECT.KEYID = 7
2,391,762 UART: [afmc] AUTHORITY.KEYID = 5
2,427,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,444,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,444,773 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,450,489 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,456,372 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,462,077 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,470,037 UART: [afmc] --
2,470,903 UART: [cold-reset] --
2,471,735 UART: [state] Locking Datavault
2,472,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,473,542 UART: [state] Locking ICCM
2,473,972 UART: [exit] Launching FMC @ 0x40000130
2,479,302 UART:
2,479,318 UART: Running Caliptra FMC ...
2,479,726 UART:
2,479,869 UART: [state] CFI Enabled
2,490,749 UART: [fht] FMC Alias Private Key: 7
2,609,048 UART: [art] Extend RT PCRs Done
2,609,476 UART: [art] Lock RT PCRs Done
2,610,932 UART: [art] Populate DV Done
2,618,988 UART: [fht] FMC Alias Private Key: 7
2,619,996 UART: [art] Derive CDI
2,620,276 UART: [art] Store in slot 0x4
2,706,063 UART: [art] Derive Key Pair
2,706,423 UART: [art] Store priv key in slot 0x5
2,719,983 UART: [art] Derive Key Pair - Done
2,734,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,750,670 UART: [art] Erasing AUTHORITY.KEYID = 7
2,751,435 UART: [art] PUB.X = 554F7423C6E549E0899489B175C1C68640B7D5212D463473D2A5900031FF6B3D9CA104A390B85FC0B25EBFD690C47B1A
2,758,178 UART: [art] PUB.Y = B507BF9C4ED725880E022709E2DA09ADAE65A6F1764345EF813D5D9CB9866486D082658D74DAF5FEF1D5313C6C902E3B
2,765,121 UART: [art] SIG.R = 12C3A446FD90D5BC664E2DD81B9D677B6D4306CD71DEF649A43F1EAD3A1B310B5DBBD384495D199627B288F2EE661808
2,771,892 UART: [art] SIG.S = 302175F14CF1154D8BC01D353F9485699E6F9FC3BDD485AABE0307A506A146E072A4B428A3C5D3B9D81E2C635AF63618
2,795,751 UART: mbox::rt_entry...
2,796,123 UART: ____ _ _ _ ____ _____
2,796,907 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,797,707 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,798,475 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,799,243 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,800,011 UART: |_|
2,800,323 UART:
2,918,115 UART: [rt] Runtime listening for mailbox commands...
2,918,877 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,919,103 >>> mbox cmd response data (0 bytes)
2,919,105 writing to cptra_bootfsm_go
2,919,197 UART:
2,919,213 UART: Running Caliptra ROM ...
2,919,621 UART:
2,919,763 UART: [state] CFI Enabled
2,922,390 UART: [state] LifecycleState = Production
2,922,998 UART: [state] DebugLocked = Yes
2,923,544 UART: [state] Starting the WD Timer 40000000 cycles
2,925,079 UART: [kat] SHA2-256
3,728,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,732,733 UART: [kat] ++
3,732,885 UART: [kat] sha1
3,737,353 UART: [kat] SHA2-256
3,739,293 UART: [kat] SHA2-384
3,742,054 UART: [kat] SHA2-512-ACC
3,743,955 UART: [kat] ECC-384
3,753,932 UART: [kat] HMAC-384Kdf
3,758,520 UART: [kat] LMS
4,006,832 UART: [kat] --
4,008,010 UART: [warm-reset] ++
4,008,977 UART: [warm-reset] --
4,009,776 UART: [state] Locking Datavault
4,010,572 UART: [state] Locking PCR0, PCR1 and PCR31
4,011,176 UART: [state] Locking ICCM
4,011,716 UART: [exit] Launching FMC @ 0x40000130
4,017,046 UART:
4,017,062 UART: Running Caliptra FMC ...
4,017,470 UART:
4,017,613 UART: [state] CFI Enabled
4,018,918 UART: [art] Skip pcr extension
4,019,327 UART: [art] Extend RT PCRs Done
4,019,755 UART: [art] Lock RT PCRs Done
4,021,050 UART: [art] Populate DV Done
4,029,266 UART: [fht] FMC Alias Private Key: 7
4,030,326 UART: [art] Derive CDI
4,030,606 UART: [art] Store in slot 0x4
4,116,169 UART: [art] Derive Key Pair
4,116,529 UART: [art] Store priv key in slot 0x5
4,130,309 UART: [art] Derive Key Pair - Done
4,145,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,160,196 UART: [art] Erasing AUTHORITY.KEYID = 7
4,160,961 UART: [art] PUB.X = 554F7423C6E549E0899489B175C1C68640B7D5212D463473D2A5900031FF6B3D9CA104A390B85FC0B25EBFD690C47B1A
4,167,704 UART: [art] PUB.Y = B507BF9C4ED725880E022709E2DA09ADAE65A6F1764345EF813D5D9CB9866486D082658D74DAF5FEF1D5313C6C902E3B
4,174,647 UART: [art] SIG.R = 12C3A446FD90D5BC664E2DD81B9D677B6D4306CD71DEF649A43F1EAD3A1B310B5DBBD384495D199627B288F2EE661808
4,181,418 UART: [art] SIG.S = 302175F14CF1154D8BC01D353F9485699E6F9FC3BDD485AABE0307A506A146E072A4B428A3C5D3B9D81E2C635AF63618
4,205,341 UART: mbox::rt_entry...
4,205,713 UART: ____ _ _ _ ____ _____
4,206,497 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,207,297 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,208,065 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,208,833 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,209,601 UART: |_|
4,209,913 UART:
4,590,731 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,248 ready_for_fw is high
1,060,248 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,241,071 >>> mbox cmd response: success
2,303,688 UART:
2,303,704 UART: Running Caliptra FMC ...
2,304,112 UART:
2,304,255 UART: [state] CFI Enabled
2,315,107 UART: [fht] FMC Alias Private Key: 7
2,433,676 UART: [art] Extend RT PCRs Done
2,434,104 UART: [art] Lock RT PCRs Done
2,435,718 UART: [art] Populate DV Done
2,443,806 UART: [fht] FMC Alias Private Key: 7
2,444,764 UART: [art] Derive CDI
2,445,044 UART: [art] Store in slot 0x4
2,531,227 UART: [art] Derive Key Pair
2,531,587 UART: [art] Store priv key in slot 0x5
2,544,729 UART: [art] Derive Key Pair - Done
2,559,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,574,164 UART: [art] Erasing AUTHORITY.KEYID = 7
2,574,929 UART: [art] PUB.X = 7E3CD226326A45D0C76A6A9B2BA72A7E9411595FCACABE163A945DDCAB621AEC3B80161FF05B86464A2252E69BB3523E
2,581,713 UART: [art] PUB.Y = F2F22592652BF07132B02BE311D6F5CC48D854A3D5268D9AD96215538987FC476DFABB5728E2FA8BB35C71B61A92D42B
2,588,669 UART: [art] SIG.R = 95F6C576832703E6F62FDC99A7919032F6E032E75C9DEC4D450CDAE8DBA77D284319A4792817A7EF78A9924AAB8B0139
2,595,434 UART: [art] SIG.S = A409258BFF36B85A47FEB493D867DB89CE7300464980859E296165C7230977DAB9564C33D041FA81CD31F204D6619BC7
2,619,067 UART: mbox::rt_entry...
2,619,439 UART: ____ _ _ _ ____ _____
2,620,223 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,621,023 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,621,791 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,622,559 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,623,327 UART: |_|
2,623,639 UART:
2,741,962 UART: [rt] Runtime listening for mailbox commands...
2,742,724 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,742,950 >>> mbox cmd response data (0 bytes)
2,742,952 writing to cptra_bootfsm_go
3,724,770 UART:
3,724,786 UART: Running Caliptra FMC ...
3,725,194 UART:
3,725,337 UART: [state] CFI Enabled
3,726,772 UART: [art] Skip pcr extension
3,727,181 UART: [art] Extend RT PCRs Done
3,727,609 UART: [art] Lock RT PCRs Done
3,728,820 UART: [art] Populate DV Done
3,737,436 UART: [fht] FMC Alias Private Key: 7
3,738,500 UART: [art] Derive CDI
3,738,780 UART: [art] Store in slot 0x4
3,824,899 UART: [art] Derive Key Pair
3,825,259 UART: [art] Store priv key in slot 0x5
3,838,829 UART: [art] Derive Key Pair - Done
3,853,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,869,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,870,237 UART: [art] PUB.X = 7E3CD226326A45D0C76A6A9B2BA72A7E9411595FCACABE163A945DDCAB621AEC3B80161FF05B86464A2252E69BB3523E
3,877,021 UART: [art] PUB.Y = F2F22592652BF07132B02BE311D6F5CC48D854A3D5268D9AD96215538987FC476DFABB5728E2FA8BB35C71B61A92D42B
3,883,977 UART: [art] SIG.R = 95F6C576832703E6F62FDC99A7919032F6E032E75C9DEC4D450CDAE8DBA77D284319A4792817A7EF78A9924AAB8B0139
3,890,742 UART: [art] SIG.S = A409258BFF36B85A47FEB493D867DB89CE7300464980859E296165C7230977DAB9564C33D041FA81CD31F204D6619BC7
3,914,361 UART: mbox::rt_entry...
3,914,733 UART: ____ _ _ _ ____ _____
3,915,517 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,916,317 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,917,085 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,917,853 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,918,621 UART: |_|
3,918,933 UART:
4,302,206 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Production
85,917 UART: [state] DebugLocked = Yes
86,673 UART: [state] Starting the WD Timer 40000000 cycles
88,272 UART: [kat] SHA2-256
893,922 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,047 UART: [kat] ++
898,199 UART: [kat] sha1
902,275 UART: [kat] SHA2-256
904,215 UART: [kat] SHA2-384
906,846 UART: [kat] SHA2-512-ACC
908,747 UART: [kat] ECC-384
917,940 UART: [kat] HMAC-384Kdf
922,688 UART: [kat] LMS
1,171,016 UART: [kat] --
1,172,107 UART: [cold-reset] ++
1,172,594 UART: [fht] FHT @ 0x50003400
1,175,233 UART: [idev] ++
1,175,401 UART: [idev] CDI.KEYID = 6
1,175,761 UART: [idev] SUBJECT.KEYID = 7
1,176,185 UART: [idev] UDS.KEYID = 0
1,176,530 ready_for_fw is high
1,176,530 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,728 UART: [idev] Erasing UDS.KEYID = 0
1,200,672 UART: [idev] Sha1 KeyId Algorithm
1,209,189 UART: [idev] --
1,210,163 UART: [ldev] ++
1,210,331 UART: [ldev] CDI.KEYID = 6
1,210,694 UART: [ldev] SUBJECT.KEYID = 5
1,211,120 UART: [ldev] AUTHORITY.KEYID = 7
1,211,583 UART: [ldev] FE.KEYID = 1
1,216,943 UART: [ldev] Erasing FE.KEYID = 1
1,243,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,821 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,515 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,387 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,093 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,192 UART: [ldev] --
1,282,507 UART: [fwproc] Wait for Commands...
1,283,223 UART: [fwproc] Recv command 0x46574c44
1,283,951 UART: [fwproc] Recv'd Img size: 82832 bytes
2,244,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,271,939 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,303,109 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,389,863 >>> mbox cmd response: success
2,390,984 UART: [afmc] ++
2,391,152 UART: [afmc] CDI.KEYID = 6
2,391,514 UART: [afmc] SUBJECT.KEYID = 7
2,391,939 UART: [afmc] AUTHORITY.KEYID = 5
2,427,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,443,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,444,477 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,450,192 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,456,077 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,461,782 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,469,676 UART: [afmc] --
2,470,787 UART: [cold-reset] --
2,471,521 UART: [state] Locking Datavault
2,472,504 UART: [state] Locking PCR0, PCR1 and PCR31
2,473,108 UART: [state] Locking ICCM
2,473,654 UART: [exit] Launching FMC @ 0x40000130
2,478,984 UART:
2,479,000 UART: Running Caliptra FMC ...
2,479,408 UART:
2,479,462 UART: [state] CFI Enabled
2,490,212 UART: [fht] FMC Alias Private Key: 7
2,609,469 UART: [art] Extend RT PCRs Done
2,609,897 UART: [art] Lock RT PCRs Done
2,611,709 UART: [art] Populate DV Done
2,619,793 UART: [fht] FMC Alias Private Key: 7
2,620,887 UART: [art] Derive CDI
2,621,167 UART: [art] Store in slot 0x4
2,706,570 UART: [art] Derive Key Pair
2,706,930 UART: [art] Store priv key in slot 0x5
2,720,050 UART: [art] Derive Key Pair - Done
2,734,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,750,481 UART: [art] Erasing AUTHORITY.KEYID = 7
2,751,246 UART: [art] PUB.X = 4CECC4CDE5F6CBC30F008272BC3F3456E6522EAE9251D72E70306ADD18A5A897FDC46E6F5DED7403CC91B79BC9FCB54F
2,758,012 UART: [art] PUB.Y = 43AD290D08E099835464D814B07A67934A97C87317619A80DD1311F041BD68C3813CF398C2266972E874E5A7FC021AA2
2,764,943 UART: [art] SIG.R = 9048F8418BCCE4C816CF2B9792CFD3C5D1DD42373BEF1C5FB8E87C224C91346246887D13D6F48AF4F499636EEB854EEE
2,771,725 UART: [art] SIG.S = 3AB14798DC309E07A615B8E7D5E04992EAD81474287A1D2676C93684C7DC5A0519B86DBF6D65ED665EC48AB9DFC144E7
2,795,489 UART: mbox::rt_entry...
2,795,861 UART: ____ _ _ _ ____ _____
2,796,645 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,797,445 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,798,213 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,798,981 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,799,749 UART: |_|
2,800,061 UART:
2,919,250 UART: [rt] Runtime listening for mailbox commands...
2,920,012 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,920,238 >>> mbox cmd response data (0 bytes)
2,920,240 writing to cptra_bootfsm_go
2,920,332 UART:
2,920,348 UART: Running Caliptra ROM ...
2,920,756 UART:
2,920,811 UART: [state] CFI Enabled
2,923,702 UART: [state] LifecycleState = Production
2,924,310 UART: [state] DebugLocked = Yes
2,925,002 UART: [state] Starting the WD Timer 40000000 cycles
2,926,677 UART: [kat] SHA2-256
3,732,327 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,736,452 UART: [kat] ++
3,736,604 UART: [kat] sha1
3,740,652 UART: [kat] SHA2-256
3,742,592 UART: [kat] SHA2-384
3,745,349 UART: [kat] SHA2-512-ACC
3,747,250 UART: [kat] ECC-384
3,756,835 UART: [kat] HMAC-384Kdf
3,761,509 UART: [kat] LMS
4,009,837 UART: [kat] --
4,010,805 UART: [warm-reset] ++
4,011,556 UART: [warm-reset] --
4,012,297 UART: [state] Locking Datavault
4,013,121 UART: [state] Locking PCR0, PCR1 and PCR31
4,013,725 UART: [state] Locking ICCM
4,014,207 UART: [exit] Launching FMC @ 0x40000130
4,019,537 UART:
4,019,553 UART: Running Caliptra FMC ...
4,019,961 UART:
4,020,015 UART: [state] CFI Enabled
4,021,188 UART: [art] Skip pcr extension
4,021,597 UART: [art] Extend RT PCRs Done
4,022,025 UART: [art] Lock RT PCRs Done
4,023,374 UART: [art] Populate DV Done
4,031,652 UART: [fht] FMC Alias Private Key: 7
4,032,812 UART: [art] Derive CDI
4,033,092 UART: [art] Store in slot 0x4
4,118,991 UART: [art] Derive Key Pair
4,119,351 UART: [art] Store priv key in slot 0x5
4,132,297 UART: [art] Derive Key Pair - Done
4,146,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,162,466 UART: [art] Erasing AUTHORITY.KEYID = 7
4,163,231 UART: [art] PUB.X = 4CECC4CDE5F6CBC30F008272BC3F3456E6522EAE9251D72E70306ADD18A5A897FDC46E6F5DED7403CC91B79BC9FCB54F
4,169,997 UART: [art] PUB.Y = 43AD290D08E099835464D814B07A67934A97C87317619A80DD1311F041BD68C3813CF398C2266972E874E5A7FC021AA2
4,176,928 UART: [art] SIG.R = 9048F8418BCCE4C816CF2B9792CFD3C5D1DD42373BEF1C5FB8E87C224C91346246887D13D6F48AF4F499636EEB854EEE
4,183,710 UART: [art] SIG.S = 3AB14798DC309E07A615B8E7D5E04992EAD81474287A1D2676C93684C7DC5A0519B86DBF6D65ED665EC48AB9DFC144E7
4,206,726 UART: mbox::rt_entry...
4,207,098 UART: ____ _ _ _ ____ _____
4,207,882 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,208,682 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,209,450 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,210,218 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,210,986 UART: |_|
4,211,298 UART:
4,590,919 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,754 ready_for_fw is high
1,060,754 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,242,320 >>> mbox cmd response: success
2,304,038 UART:
2,304,054 UART: Running Caliptra FMC ...
2,304,462 UART:
2,304,516 UART: [state] CFI Enabled
2,314,984 UART: [fht] FMC Alias Private Key: 7
2,434,085 UART: [art] Extend RT PCRs Done
2,434,513 UART: [art] Lock RT PCRs Done
2,436,015 UART: [art] Populate DV Done
2,444,241 UART: [fht] FMC Alias Private Key: 7
2,445,279 UART: [art] Derive CDI
2,445,559 UART: [art] Store in slot 0x4
2,531,146 UART: [art] Derive Key Pair
2,531,506 UART: [art] Store priv key in slot 0x5
2,544,832 UART: [art] Derive Key Pair - Done
2,559,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,575,074 UART: [art] Erasing AUTHORITY.KEYID = 7
2,575,839 UART: [art] PUB.X = 21DB478F85704B4B7D9705E082C598D19DA317CB5100DEFB0A4116F6418BD819A1601E4BE1AABCE23B6092BC7994E02E
2,582,589 UART: [art] PUB.Y = 59AD99E9BD092D8433ABBB69F92791B901A25A33B7E37D44A15D33B2803EB632798C27BBDE2057F6242A9111EB506AE0
2,589,537 UART: [art] SIG.R = A53692F5AF2E9E37DF604D1C6C4EF08AD0EA9285DCDA52E03A886967A2F6AD9BA3F2DECF163602A320C3F7136826ED5D
2,596,322 UART: [art] SIG.S = 28F661FAB7C8D66FB5E36D4AF4413685E40E86F013C57139529E6378C002481E9CC94EF4B5B5891EFA995D1D18C70725
2,620,125 UART: mbox::rt_entry...
2,620,497 UART: ____ _ _ _ ____ _____
2,621,281 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,622,081 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,622,849 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,623,617 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,624,385 UART: |_|
2,624,697 UART:
2,743,446 UART: [rt] Runtime listening for mailbox commands...
2,744,208 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,744,434 >>> mbox cmd response data (0 bytes)
2,744,436 writing to cptra_bootfsm_go
3,727,283 UART:
3,727,299 UART: Running Caliptra FMC ...
3,727,707 UART:
3,727,761 UART: [state] CFI Enabled
3,728,914 UART: [art] Skip pcr extension
3,729,323 UART: [art] Extend RT PCRs Done
3,729,751 UART: [art] Lock RT PCRs Done
3,730,920 UART: [art] Populate DV Done
3,739,150 UART: [fht] FMC Alias Private Key: 7
3,740,332 UART: [art] Derive CDI
3,740,612 UART: [art] Store in slot 0x4
3,826,071 UART: [art] Derive Key Pair
3,826,431 UART: [art] Store priv key in slot 0x5
3,839,821 UART: [art] Derive Key Pair - Done
3,854,400 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,869,879 UART: [art] Erasing AUTHORITY.KEYID = 7
3,870,644 UART: [art] PUB.X = 21DB478F85704B4B7D9705E082C598D19DA317CB5100DEFB0A4116F6418BD819A1601E4BE1AABCE23B6092BC7994E02E
3,877,394 UART: [art] PUB.Y = 59AD99E9BD092D8433ABBB69F92791B901A25A33B7E37D44A15D33B2803EB632798C27BBDE2057F6242A9111EB506AE0
3,884,342 UART: [art] SIG.R = A53692F5AF2E9E37DF604D1C6C4EF08AD0EA9285DCDA52E03A886967A2F6AD9BA3F2DECF163602A320C3F7136826ED5D
3,891,127 UART: [art] SIG.S = 28F661FAB7C8D66FB5E36D4AF4413685E40E86F013C57139529E6378C002481E9CC94EF4B5B5891EFA995D1D18C70725
3,915,362 UART: mbox::rt_entry...
3,915,734 UART: ____ _ _ _ ____ _____
3,916,518 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,917,318 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,918,086 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,918,854 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,919,622 UART: |_|
3,919,934 UART:
4,298,763 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Production
86,018 UART: [state] DebugLocked = Yes
86,666 UART: [state] Starting the WD Timer 40000000 cycles
88,363 UART: [kat] SHA2-256
894,013 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,138 UART: [kat] ++
898,290 UART: [kat] sha1
902,420 UART: [kat] SHA2-256
904,360 UART: [kat] SHA2-384
907,059 UART: [kat] SHA2-512-ACC
908,960 UART: [kat] ECC-384
918,575 UART: [kat] HMAC-384Kdf
923,297 UART: [kat] LMS
1,171,625 UART: [kat] --
1,172,288 UART: [cold-reset] ++
1,172,831 UART: [fht] FHT @ 0x50003400
1,175,492 UART: [idev] ++
1,175,660 UART: [idev] CDI.KEYID = 6
1,176,020 UART: [idev] SUBJECT.KEYID = 7
1,176,444 UART: [idev] UDS.KEYID = 0
1,176,789 ready_for_fw is high
1,176,789 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,369 UART: [idev] Erasing UDS.KEYID = 0
1,201,637 UART: [idev] Sha1 KeyId Algorithm
1,210,112 UART: [idev] --
1,210,992 UART: [ldev] ++
1,211,160 UART: [ldev] CDI.KEYID = 6
1,211,523 UART: [ldev] SUBJECT.KEYID = 5
1,211,949 UART: [ldev] AUTHORITY.KEYID = 7
1,212,412 UART: [ldev] FE.KEYID = 1
1,217,906 UART: [ldev] Erasing FE.KEYID = 1
1,243,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,206 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,900 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,772 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,478 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,533 UART: [ldev] --
1,282,868 UART: [fwproc] Wait for Commands...
1,283,506 UART: [fwproc] Recv command 0x46574c44
1,284,234 UART: [fwproc] Recv'd Img size: 82832 bytes
2,245,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,273,194 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,304,364 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,390,986 >>> mbox cmd response: success
2,392,161 UART: [afmc] ++
2,392,329 UART: [afmc] CDI.KEYID = 6
2,392,691 UART: [afmc] SUBJECT.KEYID = 7
2,393,116 UART: [afmc] AUTHORITY.KEYID = 5
2,428,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,445,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,446,098 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,451,813 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,457,698 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,463,403 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,471,257 UART: [afmc] --
2,472,174 UART: [cold-reset] --
2,473,044 UART: [state] Locking Datavault
2,474,095 UART: [state] Locking PCR0, PCR1 and PCR31
2,474,699 UART: [state] Locking ICCM
2,475,339 UART: [exit] Launching FMC @ 0x40000130
2,480,669 UART:
2,480,685 UART: Running Caliptra FMC ...
2,481,093 UART:
2,481,236 UART: [state] CFI Enabled
2,492,084 UART: [fht] FMC Alias Private Key: 7
2,610,829 UART: [art] Extend RT PCRs Done
2,611,257 UART: [art] Lock RT PCRs Done
2,612,575 UART: [art] Populate DV Done
2,620,615 UART: [fht] FMC Alias Private Key: 7
2,621,779 UART: [art] Derive CDI
2,622,059 UART: [art] Store in slot 0x4
2,707,780 UART: [art] Derive Key Pair
2,708,140 UART: [art] Store priv key in slot 0x5
2,721,624 UART: [art] Derive Key Pair - Done
2,736,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,752,038 UART: [art] Erasing AUTHORITY.KEYID = 7
2,752,803 UART: [art] PUB.X = AA5A16566BCA2FE1507EEF52BD9624F3C0441A72FF53048D5ED830D7A8D556FE4FA98C38BA5A8C49C871D1F3D0E9A626
2,759,586 UART: [art] PUB.Y = FCB191A867631ACFC295F7EA7BCD47649BD9CD0EA453DFD0A027F6DD3361C2E119DE18E1EE12B4C7B720582EB869153A
2,766,551 UART: [art] SIG.R = DDF833B9A99186D4F3A37F29D833760A7FF3BC4749B974F86413E5C58FD5D1FF140F13758E893E9F607231F2503D1A0D
2,773,314 UART: [art] SIG.S = 6D473DF978CA92124E4FF5495AF2CD4F5EA6883DFBE29D746DAAA50F2D2F8F2637581B60A54A07F42E467227A26EBC80
2,797,388 UART: mbox::rt_entry...
2,797,760 UART: ____ _ _ _ ____ _____
2,798,544 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,799,344 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,800,112 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,800,880 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,801,648 UART: |_|
2,801,960 UART:
2,920,605 UART: [rt] Runtime listening for mailbox commands...
2,921,367 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,921,593 >>> mbox cmd response data (0 bytes)
2,921,595 writing to cptra_bootfsm_go
2,921,687 UART:
2,921,703 UART: Running Caliptra ROM ...
2,922,111 UART:
2,922,253 UART: [state] CFI Enabled
2,925,358 UART: [state] LifecycleState = Production
2,925,966 UART: [state] DebugLocked = Yes
2,926,528 UART: [state] Starting the WD Timer 40000000 cycles
2,928,173 UART: [kat] SHA2-256
3,733,823 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,737,948 UART: [kat] ++
3,738,100 UART: [kat] sha1
3,742,322 UART: [kat] SHA2-256
3,744,262 UART: [kat] SHA2-384
3,747,043 UART: [kat] SHA2-512-ACC
3,748,944 UART: [kat] ECC-384
3,758,861 UART: [kat] HMAC-384Kdf
3,763,531 UART: [kat] LMS
4,011,859 UART: [kat] --
4,012,819 UART: [warm-reset] ++
4,013,836 UART: [warm-reset] --
4,014,473 UART: [state] Locking Datavault
4,015,257 UART: [state] Locking PCR0, PCR1 and PCR31
4,015,861 UART: [state] Locking ICCM
4,016,415 UART: [exit] Launching FMC @ 0x40000130
4,021,745 UART:
4,021,761 UART: Running Caliptra FMC ...
4,022,169 UART:
4,022,312 UART: [state] CFI Enabled
4,024,005 UART: [art] Skip pcr extension
4,024,414 UART: [art] Extend RT PCRs Done
4,024,842 UART: [art] Lock RT PCRs Done
4,026,177 UART: [art] Populate DV Done
4,034,289 UART: [fht] FMC Alias Private Key: 7
4,035,395 UART: [art] Derive CDI
4,035,675 UART: [art] Store in slot 0x4
4,121,482 UART: [art] Derive Key Pair
4,121,842 UART: [art] Store priv key in slot 0x5
4,135,378 UART: [art] Derive Key Pair - Done
4,150,153 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,165,718 UART: [art] Erasing AUTHORITY.KEYID = 7
4,166,483 UART: [art] PUB.X = AA5A16566BCA2FE1507EEF52BD9624F3C0441A72FF53048D5ED830D7A8D556FE4FA98C38BA5A8C49C871D1F3D0E9A626
4,173,266 UART: [art] PUB.Y = FCB191A867631ACFC295F7EA7BCD47649BD9CD0EA453DFD0A027F6DD3361C2E119DE18E1EE12B4C7B720582EB869153A
4,180,231 UART: [art] SIG.R = DDF833B9A99186D4F3A37F29D833760A7FF3BC4749B974F86413E5C58FD5D1FF140F13758E893E9F607231F2503D1A0D
4,186,994 UART: [art] SIG.S = 6D473DF978CA92124E4FF5495AF2CD4F5EA6883DFBE29D746DAAA50F2D2F8F2637581B60A54A07F42E467227A26EBC80
4,210,080 UART: mbox::rt_entry...
4,210,452 UART: ____ _ _ _ ____ _____
4,211,236 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,212,036 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,212,804 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,213,572 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,214,340 UART: |_|
4,214,652 UART:
4,594,151 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,233 ready_for_fw is high
1,061,233 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,244,857 >>> mbox cmd response: success
2,307,697 UART:
2,307,713 UART: Running Caliptra FMC ...
2,308,121 UART:
2,308,264 UART: [state] CFI Enabled
2,318,978 UART: [fht] FMC Alias Private Key: 7
2,438,327 UART: [art] Extend RT PCRs Done
2,438,755 UART: [art] Lock RT PCRs Done
2,440,545 UART: [art] Populate DV Done
2,448,907 UART: [fht] FMC Alias Private Key: 7
2,449,927 UART: [art] Derive CDI
2,450,207 UART: [art] Store in slot 0x4
2,535,964 UART: [art] Derive Key Pair
2,536,324 UART: [art] Store priv key in slot 0x5
2,549,072 UART: [art] Derive Key Pair - Done
2,563,809 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,579,780 UART: [art] Erasing AUTHORITY.KEYID = 7
2,580,545 UART: [art] PUB.X = 0F0ADF4F194908C5BFA4DBDDFE60171E95E33A08FE50D604E573AF8B8A72C4CCFBB9A5FF08385D6C87ABDB7A02291673
2,587,316 UART: [art] PUB.Y = 48F4F493BD36237A21AFFC35174A4CFA64860509125D9D8131139F1249B5F773C12D54959C87322895A4112A32714852
2,594,244 UART: [art] SIG.R = F00AF6973B016BB037F38A783EA55FC7CDE3E60D8F4FA32A21AC4D5BDB2D27F7F6431DDB2A9CBB31D46A8A84A5B0D4EE
2,601,033 UART: [art] SIG.S = 167F8C889A1592E5354A2997513C9D28A94F96FADE26F67E635D5688BCDE83B0D0C3A89B19C0BC7642D840C48A54A529
2,625,019 UART: mbox::rt_entry...
2,625,391 UART: ____ _ _ _ ____ _____
2,626,175 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,626,975 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,627,743 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,628,511 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,629,279 UART: |_|
2,629,591 UART:
2,748,590 UART: [rt] Runtime listening for mailbox commands...
2,749,352 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,749,578 >>> mbox cmd response data (0 bytes)
2,749,580 writing to cptra_bootfsm_go
3,731,730 UART:
3,731,746 UART: Running Caliptra FMC ...
3,732,154 UART:
3,732,297 UART: [state] CFI Enabled
3,733,738 UART: [art] Skip pcr extension
3,734,147 UART: [art] Extend RT PCRs Done
3,734,575 UART: [art] Lock RT PCRs Done
3,735,834 UART: [art] Populate DV Done
3,744,200 UART: [fht] FMC Alias Private Key: 7
3,745,322 UART: [art] Derive CDI
3,745,602 UART: [art] Store in slot 0x4
3,831,545 UART: [art] Derive Key Pair
3,831,905 UART: [art] Store priv key in slot 0x5
3,845,427 UART: [art] Derive Key Pair - Done
3,860,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,875,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,875,996 UART: [art] PUB.X = 0F0ADF4F194908C5BFA4DBDDFE60171E95E33A08FE50D604E573AF8B8A72C4CCFBB9A5FF08385D6C87ABDB7A02291673
3,882,767 UART: [art] PUB.Y = 48F4F493BD36237A21AFFC35174A4CFA64860509125D9D8131139F1249B5F773C12D54959C87322895A4112A32714852
3,889,695 UART: [art] SIG.R = F00AF6973B016BB037F38A783EA55FC7CDE3E60D8F4FA32A21AC4D5BDB2D27F7F6431DDB2A9CBB31D46A8A84A5B0D4EE
3,896,484 UART: [art] SIG.S = 167F8C889A1592E5354A2997513C9D28A94F96FADE26F67E635D5688BCDE83B0D0C3A89B19C0BC7642D840C48A54A529
3,920,114 UART: mbox::rt_entry...
3,920,486 UART: ____ _ _ _ ____ _____
3,921,270 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,922,070 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,922,838 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,923,606 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,924,374 UART: |_|
3,924,686 UART:
4,307,885 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.34s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.36s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
192,288 UART:
192,645 UART: Running Caliptra ROM ...
193,844 UART:
193,995 UART: [state] CFI Enabled
265,158 UART: [state] LifecycleState = Unprovisioned
266,924 UART: [state] DebugLocked = No
269,456 UART: [state] WD Timer not started. Device not locked for debugging
274,634 UART: [fake-rom-cold-reset] ++
276,951 ready_for_fw is high
277,208 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
406,178 UART: [fht] FHT @ 0x50003400
407,278 UART: [fwproc] Wait for Commands...
408,572 UART: [fwproc] Recv command 0x46574c44
409,989 UART: [fwproc] Recv'd Img size: 102604 bytes
1,766,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,840,186 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,867,586 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,427,730 >>> mbox cmd response: success
2,433,598 UART: [fake-rom-cold-reset] --
2,438,035 UART: [state] Locking Datavault
2,441,947 UART: [state] Locking PCR0, PCR1 and PCR31
2,443,544 UART: [state] Locking ICCM
2,445,802 UART: [exit] Launching FMC @ 0x40000130
2,454,154 UART:
2,454,392 UART: Running Caliptra FMC ...
2,455,439 UART:
2,455,587 UART: [state] CFI Enabled
2,516,136 UART: Caliptra RT
2,516,819 UART: [state] CFI Enabled
2,701,507 UART: [rt] RT listening for mailbox commands...
2,703,697 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,733,710 UART: [rt]cmd =0x4c444556, len=4
2,744,783 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,153,194 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,183,093 UART: [rt]cmd =0x43455246, len=4
3,195,835 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,112 UART:
192,478 UART: Running Caliptra ROM ...
193,576 UART:
193,715 UART: [state] CFI Enabled
267,085 UART: [state] LifecycleState = Unprovisioned
268,871 UART: [state] DebugLocked = No
271,543 UART: [state] WD Timer not started. Device not locked for debugging
276,515 UART: [fake-rom-cold-reset] ++
278,839 ready_for_fw is high
279,097 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
408,053 UART: [fht] FHT @ 0x50003400
409,176 UART: [fwproc] Wait for Commands...
410,461 UART: [fwproc] Recv command 0x46574c44
411,870 UART: [fwproc] Recv'd Img size: 102604 bytes
1,768,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,838,932 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,866,336 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,426,588 >>> mbox cmd response: success
2,432,442 UART: [fake-rom-cold-reset] --
2,435,907 UART: [state] Locking Datavault
2,441,590 UART: [state] Locking PCR0, PCR1 and PCR31
2,443,128 UART: [state] Locking ICCM
2,444,335 UART: [exit] Launching FMC @ 0x40000130
2,452,849 UART:
2,453,131 UART: Running Caliptra FMC ...
2,454,161 UART:
2,454,306 UART: [state] CFI Enabled
2,517,720 UART: Caliptra RT
2,518,366 UART: [state] CFI Enabled
2,703,142 UART: [rt] RT listening for mailbox commands...
2,705,320 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,735,081 UART: [rt]cmd =0x4c444556, len=4
2,746,177 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,154,522 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,184,058 UART: [rt]cmd =0x43455246, len=4
3,196,711 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,089 writing to cptra_bootfsm_go
193,291 UART:
193,672 UART: Running Caliptra ROM ...
194,785 UART:
604,502 UART: [state] CFI Enabled
617,097 UART: [state] LifecycleState = Unprovisioned
618,838 UART: [state] DebugLocked = No
620,006 UART: [state] WD Timer not started. Device not locked for debugging
625,968 UART: [fake-rom-cold-reset] ++
628,288 ready_for_fw is high
628,469 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
757,743 UART: [fht] FHT @ 0x50003400
758,854 UART: [fwproc] Wait for Commands...
760,147 UART: [fwproc] Recv command 0x46574c44
761,709 UART: [fwproc] Recv'd Img size: 102604 bytes
2,116,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,191,750 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,219,152 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,689 >>> mbox cmd response: success
2,785,522 UART: [fake-rom-cold-reset] --
2,789,642 UART: [state] Locking Datavault
2,794,506 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,047 UART: [state] Locking ICCM
2,796,988 UART: [exit] Launching FMC @ 0x40000130
2,805,382 UART:
2,805,615 UART: Running Caliptra FMC ...
2,806,639 UART:
2,806,786 UART: [state] CFI Enabled
2,810,672 UART: Caliptra RT
2,811,361 UART: [state] CFI Enabled
2,935,552 UART: [rt] RT listening for mailbox commands...
2,937,748 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,968,369 UART: [rt]cmd =0x4c444556, len=4
2,979,317 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,387,535 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,417,457 UART: [rt]cmd =0x43455246, len=4
3,430,326 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,064 writing to cptra_bootfsm_go
193,264 UART:
193,635 UART: Running Caliptra ROM ...
194,767 UART:
604,263 UART: [state] CFI Enabled
616,211 UART: [state] LifecycleState = Unprovisioned
617,931 UART: [state] DebugLocked = No
619,237 UART: [state] WD Timer not started. Device not locked for debugging
623,049 UART: [fake-rom-cold-reset] ++
625,317 ready_for_fw is high
625,499 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
754,387 UART: [fht] FHT @ 0x50003400
755,479 UART: [fwproc] Wait for Commands...
756,683 UART: [fwproc] Recv command 0x46574c44
758,093 UART: [fwproc] Recv'd Img size: 102604 bytes
2,112,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,187,007 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,214,368 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,774,656 >>> mbox cmd response: success
2,780,475 UART: [fake-rom-cold-reset] --
2,784,095 UART: [state] Locking Datavault
2,790,716 UART: [state] Locking PCR0, PCR1 and PCR31
2,792,259 UART: [state] Locking ICCM
2,793,569 UART: [exit] Launching FMC @ 0x40000130
2,801,909 UART:
2,802,146 UART: Running Caliptra FMC ...
2,803,245 UART:
2,803,401 UART: [state] CFI Enabled
2,807,516 UART: Caliptra RT
2,808,193 UART: [state] CFI Enabled
2,932,807 UART: [rt] RT listening for mailbox commands...
2,934,971 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,964,878 UART: [rt]cmd =0x4c444556, len=4
2,976,178 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,384,325 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,414,075 UART: [rt]cmd =0x43455246, len=4
3,426,706 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,107 UART:
192,467 UART: Running Caliptra ROM ...
193,676 UART:
193,837 UART: [state] CFI Enabled
263,344 UART: [state] LifecycleState = Unprovisioned
265,121 UART: [state] DebugLocked = No
266,735 UART: [state] WD Timer not started. Device not locked for debugging
270,630 UART: [fake-rom-cold-reset] ++
272,886 ready_for_fw is high
273,148 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
402,165 UART: [fht] FHT @ 0x50003400
403,280 UART: [fwproc] Wait for Commands...
404,579 UART: [fwproc] Recv command 0x46574c44
405,997 UART: [fwproc] Recv'd Img size: 102604 bytes
1,755,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,823,515 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,850,878 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,410,109 >>> mbox cmd response: success
2,415,955 UART: [fake-rom-cold-reset] --
2,418,069 UART: [state] Locking Datavault
2,423,771 UART: [state] Locking PCR0, PCR1 and PCR31
2,425,332 UART: [state] Locking ICCM
2,426,413 UART: [exit] Launching FMC @ 0x40000130
2,434,769 UART:
2,435,017 UART: Running Caliptra FMC ...
2,436,129 UART:
2,436,294 UART: [state] CFI Enabled
2,496,685 UART: Caliptra RT
2,497,377 UART: [state] CFI Enabled
2,683,086 UART: [rt] RT listening for mailbox commands...
2,685,260 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,715,126 UART: [rt]cmd =0x4c444556, len=4
2,726,418 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,133,254 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,163,162 UART: [rt]cmd =0x43455246, len=4
3,175,822 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
192,105 UART:
192,482 UART: Running Caliptra ROM ...
193,666 UART:
193,825 UART: [state] CFI Enabled
265,681 UART: [state] LifecycleState = Unprovisioned
267,461 UART: [state] DebugLocked = No
268,779 UART: [state] WD Timer not started. Device not locked for debugging
274,240 UART: [fake-rom-cold-reset] ++
276,570 ready_for_fw is high
276,834 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
405,624 UART: [fht] FHT @ 0x50003400
406,727 UART: [fwproc] Wait for Commands...
408,022 UART: [fwproc] Recv command 0x46574c44
409,446 UART: [fwproc] Recv'd Img size: 102604 bytes
1,763,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,831,075 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,858,412 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,418,086 >>> mbox cmd response: success
2,423,933 UART: [fake-rom-cold-reset] --
2,427,014 UART: [state] Locking Datavault
2,432,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,433,630 UART: [state] Locking ICCM
2,435,301 UART: [exit] Launching FMC @ 0x40000130
2,443,648 UART:
2,443,889 UART: Running Caliptra FMC ...
2,445,000 UART:
2,445,170 UART: [state] CFI Enabled
2,497,294 UART: Caliptra RT
2,497,990 UART: [state] CFI Enabled
2,681,732 UART: [rt] RT listening for mailbox commands...
2,683,909 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,713,633 UART: [rt]cmd =0x4c444556, len=4
2,724,842 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,131,664 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,161,637 UART: [rt]cmd =0x43455246, len=4
3,174,399 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
192,411 UART:
192,777 UART: Running Caliptra ROM ...
193,903 UART:
603,676 UART: [state] CFI Enabled
616,010 UART: [state] LifecycleState = Unprovisioned
617,702 UART: [state] DebugLocked = No
620,433 UART: [state] WD Timer not started. Device not locked for debugging
625,045 UART: [fake-rom-cold-reset] ++
627,396 ready_for_fw is high
627,582 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
756,330 UART: [fht] FHT @ 0x50003400
757,423 UART: [fwproc] Wait for Commands...
758,622 UART: [fwproc] Recv command 0x46574c44
760,035 UART: [fwproc] Recv'd Img size: 102604 bytes
2,109,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,182,383 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,209,788 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,769,001 >>> mbox cmd response: success
2,774,845 UART: [fake-rom-cold-reset] --
2,777,245 UART: [state] Locking Datavault
2,782,506 UART: [state] Locking PCR0, PCR1 and PCR31
2,784,052 UART: [state] Locking ICCM
2,785,424 UART: [exit] Launching FMC @ 0x40000130
2,793,769 UART:
2,794,022 UART: Running Caliptra FMC ...
2,795,126 UART:
2,795,281 UART: [state] CFI Enabled
2,798,954 UART: Caliptra RT
2,799,645 UART: [state] CFI Enabled
2,924,997 UART: [rt] RT listening for mailbox commands...
2,927,164 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,956,940 UART: [rt]cmd =0x4c444556, len=4
2,968,277 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,375,093 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,404,915 UART: [rt]cmd =0x43455246, len=4
3,417,488 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,159 UART:
192,515 UART: Running Caliptra ROM ...
193,695 UART:
603,108 UART: [state] CFI Enabled
617,917 UART: [state] LifecycleState = Unprovisioned
619,679 UART: [state] DebugLocked = No
621,921 UART: [state] WD Timer not started. Device not locked for debugging
627,437 UART: [fake-rom-cold-reset] ++
629,756 ready_for_fw is high
630,009 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
758,778 UART: [fht] FHT @ 0x50003400
759,868 UART: [fwproc] Wait for Commands...
761,148 UART: [fwproc] Recv command 0x46574c44
762,550 UART: [fwproc] Recv'd Img size: 102604 bytes
2,111,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,182,374 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,209,737 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,768,880 >>> mbox cmd response: success
2,774,780 UART: [fake-rom-cold-reset] --
2,776,235 UART: [state] Locking Datavault
2,782,619 UART: [state] Locking PCR0, PCR1 and PCR31
2,784,216 UART: [state] Locking ICCM
2,786,609 UART: [exit] Launching FMC @ 0x40000130
2,794,998 UART:
2,795,225 UART: Running Caliptra FMC ...
2,796,251 UART:
2,796,397 UART: [state] CFI Enabled
2,800,564 UART: Caliptra RT
2,801,249 UART: [state] CFI Enabled
2,925,979 UART: [rt] RT listening for mailbox commands...
2,928,268 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,958,037 UART: [rt]cmd =0x4c444556, len=4
2,969,039 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,375,386 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,405,167 UART: [rt]cmd =0x43455246, len=4
3,417,713 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,179 UART:
192,538 UART: Running Caliptra ROM ...
193,728 UART:
193,883 UART: [state] CFI Enabled
263,449 UART: [state] LifecycleState = Unprovisioned
265,132 UART: [state] DebugLocked = No
267,961 UART: [state] WD Timer not started. Device not locked for debugging
272,638 UART: [fake-rom-cold-reset] ++
274,968 ready_for_fw is high
275,226 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
404,333 UART: [fht] FHT @ 0x50003400
405,444 UART: [fwproc] Wait for Commands...
406,742 UART: [fwproc] Recv command 0x46574c44
408,162 UART: [fwproc] Recv'd Img size: 102604 bytes
1,756,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,834,176 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,861,577 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,420,576 >>> mbox cmd response: success
2,426,449 UART: [fake-rom-cold-reset] --
2,430,815 UART: [state] Locking Datavault
2,435,461 UART: [state] Locking PCR0, PCR1 and PCR31
2,436,997 UART: [state] Locking ICCM
2,439,007 UART: [exit] Launching FMC @ 0x40000130
2,447,407 UART:
2,447,643 UART: Running Caliptra FMC ...
2,448,746 UART:
2,448,902 UART: [state] CFI Enabled
2,494,896 UART: Caliptra RT
2,495,643 UART: [state] CFI Enabled
2,681,312 UART: [rt] RT listening for mailbox commands...
2,683,509 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,713,256 UART: [rt]cmd =0x4c444556, len=4
2,724,491 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,131,747 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,161,824 UART: [rt]cmd =0x43455246, len=4
3,174,543 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,146 UART:
192,525 UART: Running Caliptra ROM ...
193,616 UART:
193,753 UART: [state] CFI Enabled
265,221 UART: [state] LifecycleState = Unprovisioned
267,003 UART: [state] DebugLocked = No
268,322 UART: [state] WD Timer not started. Device not locked for debugging
273,369 UART: [fake-rom-cold-reset] ++
275,624 ready_for_fw is high
275,803 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
404,571 UART: [fht] FHT @ 0x50003400
405,671 UART: [fwproc] Wait for Commands...
406,873 UART: [fwproc] Recv command 0x46574c44
408,283 UART: [fwproc] Recv'd Img size: 102604 bytes
1,759,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,833,068 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,860,420 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,420,949 >>> mbox cmd response: success
2,426,785 UART: [fake-rom-cold-reset] --
2,429,478 UART: [state] Locking Datavault
2,434,732 UART: [state] Locking PCR0, PCR1 and PCR31
2,436,324 UART: [state] Locking ICCM
2,438,338 UART: [exit] Launching FMC @ 0x40000130
2,446,696 UART:
2,446,930 UART: Running Caliptra FMC ...
2,447,964 UART:
2,448,111 UART: [state] CFI Enabled
2,493,977 UART: Caliptra RT
2,494,608 UART: [state] CFI Enabled
2,678,791 UART: [rt] RT listening for mailbox commands...
2,680,971 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,710,743 UART: [rt]cmd =0x4c444556, len=4
2,721,887 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,128,306 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,158,162 UART: [rt]cmd =0x43455246, len=4
3,170,874 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,347 UART:
192,711 UART: Running Caliptra ROM ...
194,247 UART:
603,595 UART: [state] CFI Enabled
619,954 UART: [state] LifecycleState = Unprovisioned
621,681 UART: [state] DebugLocked = No
623,271 UART: [state] WD Timer not started. Device not locked for debugging
628,926 UART: [fake-rom-cold-reset] ++
631,244 ready_for_fw is high
631,429 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
760,318 UART: [fht] FHT @ 0x50003400
761,407 UART: [fwproc] Wait for Commands...
762,607 UART: [fwproc] Recv command 0x46574c44
764,016 UART: [fwproc] Recv'd Img size: 102604 bytes
2,119,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,192,548 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,219,952 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,921 >>> mbox cmd response: success
2,785,783 UART: [fake-rom-cold-reset] --
2,788,492 UART: [state] Locking Datavault
2,793,590 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,131 UART: [state] Locking ICCM
2,797,254 UART: [exit] Launching FMC @ 0x40000130
2,805,652 UART:
2,805,888 UART: Running Caliptra FMC ...
2,806,916 UART:
2,807,065 UART: [state] CFI Enabled
2,810,850 UART: Caliptra RT
2,811,535 UART: [state] CFI Enabled
2,936,494 UART: [rt] RT listening for mailbox commands...
2,938,650 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,968,529 UART: [rt]cmd =0x4c444556, len=4
2,979,621 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,386,323 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,415,889 UART: [rt]cmd =0x43455246, len=4
3,428,758 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,292 UART:
192,645 UART: Running Caliptra ROM ...
193,837 UART:
603,251 UART: [state] CFI Enabled
616,283 UART: [state] LifecycleState = Unprovisioned
618,011 UART: [state] DebugLocked = No
620,820 UART: [state] WD Timer not started. Device not locked for debugging
626,704 UART: [fake-rom-cold-reset] ++
629,025 ready_for_fw is high
629,289 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
758,207 UART: [fht] FHT @ 0x50003400
759,293 UART: [fwproc] Wait for Commands...
760,581 UART: [fwproc] Recv command 0x46574c44
761,994 UART: [fwproc] Recv'd Img size: 102604 bytes
2,109,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,177,211 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,204,553 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,764,970 >>> mbox cmd response: success
2,770,823 UART: [fake-rom-cold-reset] --
2,774,500 UART: [state] Locking Datavault
2,781,337 UART: [state] Locking PCR0, PCR1 and PCR31
2,782,891 UART: [state] Locking ICCM
2,784,890 UART: [exit] Launching FMC @ 0x40000130
2,793,293 UART:
2,793,532 UART: Running Caliptra FMC ...
2,794,638 UART:
2,794,799 UART: [state] CFI Enabled
2,798,527 UART: Caliptra RT
2,799,217 UART: [state] CFI Enabled
2,925,221 UART: [rt] RT listening for mailbox commands...
2,927,413 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,957,086 UART: [rt]cmd =0x4c444556, len=4
2,968,298 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,375,513 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,405,422 UART: [rt]cmd =0x43455246, len=4
3,418,209 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,162 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [fake-rom-cold-reset] ++
88,504 ready_for_fw is high
88,504 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
88,760 UART: [fht] FHT @ 0x50003400
92,207 UART: [fwproc] Wait for Commands...
92,972 UART: [fwproc] Recv command 0x46574c44
93,700 UART: [fwproc] Recv'd Img size: 102604 bytes
1,252,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,984 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,286,212 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,426,558 >>> mbox cmd response: success
1,427,716 UART: [fake-rom-cold-reset] --
1,428,442 UART: [state] Locking Datavault
1,429,473 UART: [state] Locking PCR0, PCR1 and PCR31
1,430,077 UART: [state] Locking ICCM
1,430,661 UART: [exit] Launching FMC @ 0x40000130
1,435,983 UART:
1,435,999 UART: Running Caliptra FMC ...
1,436,407 UART:
1,436,461 UART: [state] CFI Enabled
1,439,184 UART: Caliptra RT
1,439,435 UART: [state] CFI Enabled
1,551,509 UART: [rt] RT listening for mailbox commands...
1,552,179 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,582,011 UART: [rt]cmd =0x4c444556, len=4
1,592,411 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,592,412 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,785 UART: [rt]cmd =0x43455246, len=4
1,633,855 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [fake-rom-cold-reset] ++
88,852 ready_for_fw is high
88,852 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,052 UART: [fht] FHT @ 0x50003400
92,387 UART: [fwproc] Wait for Commands...
93,002 UART: [fwproc] Recv command 0x46574c44
93,730 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,277,940 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,168 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,422 >>> mbox cmd response: success
1,426,580 UART: [fake-rom-cold-reset] --
1,427,524 UART: [state] Locking Datavault
1,428,487 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,091 UART: [state] Locking ICCM
1,429,579 UART: [exit] Launching FMC @ 0x40000130
1,434,901 UART:
1,434,917 UART: Running Caliptra FMC ...
1,435,325 UART:
1,435,379 UART: [state] CFI Enabled
1,438,088 UART: Caliptra RT
1,438,339 UART: [state] CFI Enabled
1,550,391 UART: [rt] RT listening for mailbox commands...
1,551,061 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,580,917 UART: [rt]cmd =0x4c444556, len=4
1,591,319 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,591,320 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,620,819 UART: [rt]cmd =0x43455246, len=4
1,632,861 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,027 UART: [state] LifecycleState = Unprovisioned
85,686 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,427 UART: [fake-rom-cold-reset] ++
88,355 ready_for_fw is high
88,355 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
88,505 UART: [fht] FHT @ 0x50003400
91,956 UART: [fwproc] Wait for Commands...
92,553 UART: [fwproc] Recv command 0x46574c44
93,281 UART: [fwproc] Recv'd Img size: 102604 bytes
1,250,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,277,589 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,284,817 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,063 >>> mbox cmd response: success
1,426,221 UART: [fake-rom-cold-reset] --
1,427,195 UART: [state] Locking Datavault
1,428,500 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,104 UART: [state] Locking ICCM
1,429,684 UART: [exit] Launching FMC @ 0x40000130
1,435,006 UART:
1,435,022 UART: Running Caliptra FMC ...
1,435,430 UART:
1,435,571 UART: [state] CFI Enabled
1,438,523 UART: Caliptra RT
1,438,866 UART: [state] CFI Enabled
1,550,206 UART: [rt] RT listening for mailbox commands...
1,550,876 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,580,738 UART: [rt]cmd =0x4c444556, len=4
1,591,196 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,591,197 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,620,632 UART: [rt]cmd =0x43455246, len=4
1,632,784 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [fake-rom-cold-reset] ++
88,815 ready_for_fw is high
88,815 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,101 UART: [fht] FHT @ 0x50003400
92,518 UART: [fwproc] Wait for Commands...
93,253 UART: [fwproc] Recv command 0x46574c44
93,981 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,315 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,543 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,755 >>> mbox cmd response: success
1,426,913 UART: [fake-rom-cold-reset] --
1,427,781 UART: [state] Locking Datavault
1,428,832 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,436 UART: [state] Locking ICCM
1,429,884 UART: [exit] Launching FMC @ 0x40000130
1,435,206 UART:
1,435,222 UART: Running Caliptra FMC ...
1,435,630 UART:
1,435,771 UART: [state] CFI Enabled
1,438,579 UART: Caliptra RT
1,438,922 UART: [state] CFI Enabled
1,551,246 UART: [rt] RT listening for mailbox commands...
1,551,916 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,581,924 UART: [rt]cmd =0x4c444556, len=4
1,592,434 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,592,435 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,756 UART: [rt]cmd =0x43455246, len=4
1,633,794 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
88,138 UART: [fake-rom-cold-reset] ++
89,066 ready_for_fw is high
89,066 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,202 UART: [fht] FHT @ 0x50003400
92,541 UART: [fwproc] Wait for Commands...
93,270 UART: [fwproc] Recv command 0x46574c44
93,998 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,277,794 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,022 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,276 >>> mbox cmd response: success
1,426,434 UART: [fake-rom-cold-reset] --
1,427,182 UART: [state] Locking Datavault
1,428,317 UART: [state] Locking PCR0, PCR1 and PCR31
1,428,921 UART: [state] Locking ICCM
1,429,471 UART: [exit] Launching FMC @ 0x40000130
1,434,793 UART:
1,434,809 UART: Running Caliptra FMC ...
1,435,217 UART:
1,435,271 UART: [state] CFI Enabled
1,437,916 UART: Caliptra RT
1,438,167 UART: [state] CFI Enabled
1,549,959 UART: [rt] RT listening for mailbox commands...
1,550,629 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,580,267 UART: [rt]cmd =0x4c444556, len=4
1,590,605 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,590,606 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,619,987 UART: [rt]cmd =0x43455246, len=4
1,632,173 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
88,230 UART: [fake-rom-cold-reset] ++
89,158 ready_for_fw is high
89,158 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,356 UART: [fht] FHT @ 0x50003400
92,811 UART: [fwproc] Wait for Commands...
93,458 UART: [fwproc] Recv command 0x46574c44
94,186 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,736 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,964 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,426,338 >>> mbox cmd response: success
1,427,496 UART: [fake-rom-cold-reset] --
1,428,444 UART: [state] Locking Datavault
1,429,925 UART: [state] Locking PCR0, PCR1 and PCR31
1,430,529 UART: [state] Locking ICCM
1,431,011 UART: [exit] Launching FMC @ 0x40000130
1,436,333 UART:
1,436,349 UART: Running Caliptra FMC ...
1,436,757 UART:
1,436,811 UART: [state] CFI Enabled
1,439,450 UART: Caliptra RT
1,439,701 UART: [state] CFI Enabled
1,551,455 UART: [rt] RT listening for mailbox commands...
1,552,125 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,581,907 UART: [rt]cmd =0x4c444556, len=4
1,592,371 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,592,372 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,715 UART: [rt]cmd =0x43455246, len=4
1,633,785 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,759 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [fake-rom-cold-reset] ++
89,125 ready_for_fw is high
89,125 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,227 UART: [fht] FHT @ 0x50003400
92,596 UART: [fwproc] Wait for Commands...
93,335 UART: [fwproc] Recv command 0x46574c44
94,063 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,213 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,441 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,827 >>> mbox cmd response: success
1,426,985 UART: [fake-rom-cold-reset] --
1,427,837 UART: [state] Locking Datavault
1,429,128 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,732 UART: [state] Locking ICCM
1,430,318 UART: [exit] Launching FMC @ 0x40000130
1,435,640 UART:
1,435,656 UART: Running Caliptra FMC ...
1,436,064 UART:
1,436,205 UART: [state] CFI Enabled
1,439,069 UART: Caliptra RT
1,439,412 UART: [state] CFI Enabled
1,552,430 UART: [rt] RT listening for mailbox commands...
1,553,100 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,582,610 UART: [rt]cmd =0x4c444556, len=4
1,592,918 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,592,919 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,110 UART: [rt]cmd =0x43455246, len=4
1,634,006 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [fake-rom-cold-reset] ++
88,789 ready_for_fw is high
88,789 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,101 UART: [fht] FHT @ 0x50003400
92,486 UART: [fwproc] Wait for Commands...
93,151 UART: [fwproc] Recv command 0x46574c44
93,879 UART: [fwproc] Recv'd Img size: 102604 bytes
1,252,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,279,299 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,286,527 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,426,769 >>> mbox cmd response: success
1,427,927 UART: [fake-rom-cold-reset] --
1,428,723 UART: [state] Locking Datavault
1,429,862 UART: [state] Locking PCR0, PCR1 and PCR31
1,430,466 UART: [state] Locking ICCM
1,430,918 UART: [exit] Launching FMC @ 0x40000130
1,436,240 UART:
1,436,256 UART: Running Caliptra FMC ...
1,436,664 UART:
1,436,805 UART: [state] CFI Enabled
1,439,531 UART: Caliptra RT
1,439,874 UART: [state] CFI Enabled
1,551,628 UART: [rt] RT listening for mailbox commands...
1,552,298 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,582,396 UART: [rt]cmd =0x4c444556, len=4
1,593,038 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,593,039 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,074 UART: [rt]cmd =0x43455246, len=4
1,633,982 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [fake-rom-cold-reset] ++
88,962 ready_for_fw is high
88,962 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,090 UART: [fht] FHT @ 0x50003400
92,387 UART: [fwproc] Wait for Commands...
93,168 UART: [fwproc] Recv command 0x46574c44
93,896 UART: [fwproc] Recv'd Img size: 102604 bytes
1,250,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,277,208 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,284,436 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,424,818 >>> mbox cmd response: success
1,425,976 UART: [fake-rom-cold-reset] --
1,426,796 UART: [state] Locking Datavault
1,427,911 UART: [state] Locking PCR0, PCR1 and PCR31
1,428,515 UART: [state] Locking ICCM
1,429,055 UART: [exit] Launching FMC @ 0x40000130
1,434,377 UART:
1,434,393 UART: Running Caliptra FMC ...
1,434,801 UART:
1,434,855 UART: [state] CFI Enabled
1,437,454 UART: Caliptra RT
1,437,705 UART: [state] CFI Enabled
1,550,257 UART: [rt] RT listening for mailbox commands...
1,550,927 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,580,791 UART: [rt]cmd =0x4c444556, len=4
1,591,099 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,591,100 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,620,547 UART: [rt]cmd =0x43455246, len=4
1,632,517 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,984 UART: [fake-rom-cold-reset] ++
88,912 ready_for_fw is high
88,912 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,090 UART: [fht] FHT @ 0x50003400
92,327 UART: [fwproc] Wait for Commands...
93,030 UART: [fwproc] Recv command 0x46574c44
93,758 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,170 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,398 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,600 >>> mbox cmd response: success
1,426,758 UART: [fake-rom-cold-reset] --
1,427,522 UART: [state] Locking Datavault
1,428,619 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,223 UART: [state] Locking ICCM
1,429,873 UART: [exit] Launching FMC @ 0x40000130
1,435,195 UART:
1,435,211 UART: Running Caliptra FMC ...
1,435,619 UART:
1,435,673 UART: [state] CFI Enabled
1,438,480 UART: Caliptra RT
1,438,731 UART: [state] CFI Enabled
1,550,871 UART: [rt] RT listening for mailbox commands...
1,551,541 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,581,377 UART: [rt]cmd =0x4c444556, len=4
1,592,007 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,592,008 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,485 UART: [rt]cmd =0x43455246, len=4
1,633,419 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [fake-rom-cold-reset] ++
88,773 ready_for_fw is high
88,773 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,065 UART: [fht] FHT @ 0x50003400
92,404 UART: [fwproc] Wait for Commands...
93,117 UART: [fwproc] Recv command 0x46574c44
93,845 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,279,553 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,286,781 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,426,981 >>> mbox cmd response: success
1,428,139 UART: [fake-rom-cold-reset] --
1,428,947 UART: [state] Locking Datavault
1,429,932 UART: [state] Locking PCR0, PCR1 and PCR31
1,430,536 UART: [state] Locking ICCM
1,431,142 UART: [exit] Launching FMC @ 0x40000130
1,436,464 UART:
1,436,480 UART: Running Caliptra FMC ...
1,436,888 UART:
1,437,029 UART: [state] CFI Enabled
1,439,899 UART: Caliptra RT
1,440,242 UART: [state] CFI Enabled
1,552,190 UART: [rt] RT listening for mailbox commands...
1,552,860 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,582,610 UART: [rt]cmd =0x4c444556, len=4
1,593,032 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,593,033 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,478 UART: [rt]cmd =0x43455246, len=4
1,634,434 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [fake-rom-cold-reset] ++
88,937 ready_for_fw is high
88,937 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,029 UART: [fht] FHT @ 0x50003400
92,404 UART: [fwproc] Wait for Commands...
93,073 UART: [fwproc] Recv command 0x46574c44
93,801 UART: [fwproc] Recv'd Img size: 102604 bytes
1,250,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,277,405 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,284,633 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,424,921 >>> mbox cmd response: success
1,426,079 UART: [fake-rom-cold-reset] --
1,427,085 UART: [state] Locking Datavault
1,428,092 UART: [state] Locking PCR0, PCR1 and PCR31
1,428,696 UART: [state] Locking ICCM
1,429,156 UART: [exit] Launching FMC @ 0x40000130
1,434,478 UART:
1,434,494 UART: Running Caliptra FMC ...
1,434,902 UART:
1,435,043 UART: [state] CFI Enabled
1,437,877 UART: Caliptra RT
1,438,220 UART: [state] CFI Enabled
1,550,750 UART: [rt] RT listening for mailbox commands...
1,551,420 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,581,586 UART: [rt]cmd =0x4c444556, len=4
1,592,062 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,592,063 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,462 UART: [rt]cmd =0x43455246, len=4
1,633,572 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,931 writing to cptra_bootfsm_go
193,175 UART:
193,541 UART: Running Caliptra ROM ...
194,628 UART:
194,771 UART: [state] CFI Enabled
264,379 UART: [state] LifecycleState = Production
266,243 UART: [state] DebugLocked = No
269,039 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,901 UART: [kat] SHA2-256
443,597 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,112 UART: [kat] ++
454,628 UART: [kat] sha1
465,997 UART: [kat] SHA2-256
468,641 UART: [kat] SHA2-384
475,195 UART: [kat] SHA2-512-ACC
477,559 UART: [kat] ECC-384
2,767,102 UART: [kat] HMAC-384Kdf
2,799,820 UART: [kat] LMS
3,990,129 UART: [kat] --
3,995,645 UART: [cold-reset] ++
3,998,223 UART: [fht] Storing FHT @ 0x50003400
4,011,212 UART: [idev] ++
4,011,821 UART: [idev] CDI.KEYID = 6
4,012,715 UART: [idev] SUBJECT.KEYID = 7
4,013,960 UART: [idev] UDS.KEYID = 0
4,015,019 ready_for_fw is high
4,015,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,430 UART: [idev] Erasing UDS.KEYID = 0
7,345,432 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,874 UART: [idev] --
7,371,328 UART: [ldev] ++
7,371,905 UART: [ldev] CDI.KEYID = 6
7,372,921 UART: [ldev] SUBJECT.KEYID = 5
7,374,078 UART: [ldev] AUTHORITY.KEYID = 7
7,375,310 UART: [ldev] FE.KEYID = 1
7,423,107 UART: [ldev] Erasing FE.KEYID = 1
10,757,787 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,237 UART: [ldev] --
13,139,190 UART: [fwproc] Waiting for Commands...
13,141,226 UART: [fwproc] Received command 0x46574c44
13,143,405 UART: [fwproc] Received Image of size 118548 bytes
22,105,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,189,472 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,262,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,590,336 >>> mbox cmd response: success
22,594,073 UART: [afmc] ++
22,594,740 UART: [afmc] CDI.KEYID = 6
22,595,697 UART: [afmc] SUBJECT.KEYID = 7
22,596,837 UART: [afmc] AUTHORITY.KEYID = 5
25,954,172 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,253,275 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,255,527 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
28,270,047 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
28,284,798 UART: [afmc] SIG.R = 07DA8956422B67BE520AE0F3F19018E6413FE1DE68004414FFC970884079A4DE78CC68B1AF11F9488D6BA52138DE7256
28,299,205 UART: [afmc] SIG.S = F365DA2001D0DAC9DE7816A6A536E7BAA763EB876E3E406ABB2FA06DFD0780670CA799570BF6F73554BEFF879A841F5A
28,320,248 UART: [afmc] --
28,323,370 UART: [cold-reset] --
28,326,570 UART: [state] Locking Datavault
28,331,281 UART: [state] Locking PCR0, PCR1 and PCR31
28,333,020 UART: [state] Locking ICCM
28,335,615 UART: [exit] Launching FMC @ 0x40000130
28,343,997 UART:
28,344,252 UART: Running Caliptra FMC ...
28,345,393 UART:
28,345,550 UART: [state] CFI Enabled
28,414,899 UART: [fht] FMC Alias Private Key: 7
30,755,674 UART: [art] Extend RT PCRs Done
30,756,942 UART: [art] Lock RT PCRs Done
30,758,570 UART: [art] Populate DV Done
30,764,185 UART: [fht] FMC Alias Private Key: 7
30,765,704 UART: [art] Derive CDI
30,766,565 UART: [art] Store in slot 0x4
30,823,817 UART: [art] Derive Key Pair
30,824,916 UART: [art] Store priv key in slot 0x5
34,117,535 UART: [art] Derive Key Pair - Done
34,130,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,419,027 UART: [art] Erasing AUTHORITY.KEYID = 7
36,420,593 UART: [art] PUB.X = 368597F60E28A87AD4C80B7311D79CE036B3D19E2AABBBD5F242173DA32269C132D7EEFEC99AE5DAB6E3070B5C329806
36,427,826 UART: [art] PUB.Y = E65C24ECABAB244615435DDBE9041FF485BD19A15BE4F9865C7193A9815E1F75CA3972541CF0F62E1C7AE0A9D47796BA
36,435,145 UART: [art] SIG.R = 4D500429B78EB58CE73F7F2AB288382C4D0292D856FF8ECB272AC8EEBEDC29F188A4A788692BC5F1E349018F978F95A4
36,442,533 UART: [art] SIG.S = 9F4B2B3CD0FFAF9439FD0D0B39B3F731A90D16332118635F21DBB771323B6A4277480340623FEC19FD52ED662AC931CA
37,747,762 UART: Caliptra RT
37,748,497 UART: [state] CFI Enabled
37,922,940 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,780,245 ready_for_fw is high
3,780,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,017,726 >>> mbox cmd response: success
27,702,526 UART:
27,702,915 UART: Running Caliptra FMC ...
27,704,113 UART:
27,704,272 UART: [state] CFI Enabled
27,771,617 UART: [fht] FMC Alias Private Key: 7
30,112,396 UART: [art] Extend RT PCRs Done
30,113,675 UART: [art] Lock RT PCRs Done
30,115,473 UART: [art] Populate DV Done
30,120,843 UART: [fht] FMC Alias Private Key: 7
30,122,402 UART: [art] Derive CDI
30,123,174 UART: [art] Store in slot 0x4
30,180,417 UART: [art] Derive Key Pair
30,181,503 UART: [art] Store priv key in slot 0x5
33,474,775 UART: [art] Derive Key Pair - Done
33,488,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,776,137 UART: [art] Erasing AUTHORITY.KEYID = 7
35,777,708 UART: [art] PUB.X = 357C882BDA7121ACC70D479FA13E35DA3155306E028789EB3B21856EE4A1269165939183A5B5EA0EA51FA379CF34655C
35,784,923 UART: [art] PUB.Y = 937F1334574DF4B2145ECDD94009CDF2555E63FC7F1C8B379E3909FE0D039AAC407B279A1855040757C75388FAF4F735
35,792,147 UART: [art] SIG.R = C5ED43351803FD9291B16E9A31B4344528159C84D8BA5BA8238EF09DF058E77FF3C63873D6D7F83D7BA5A955B6A8D4E2
35,799,526 UART: [art] SIG.S = A2B8E3CF91E0EFDCF0627A1CFEC838F7B8AB04987A6342781927B4223EF88FB31A35E973E9064EB0DEEEBD1EC3F37A20
37,104,500 UART: Caliptra RT
37,105,236 UART: [state] CFI Enabled
37,282,184 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,436 UART:
192,791 UART: Running Caliptra ROM ...
193,972 UART:
603,741 UART: [state] CFI Enabled
617,116 UART: [state] LifecycleState = Production
619,546 UART: [state] DebugLocked = No
621,614 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,788 UART: [kat] SHA2-256
795,542 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,063 UART: [kat] ++
806,516 UART: [kat] sha1
816,036 UART: [kat] SHA2-256
818,759 UART: [kat] SHA2-384
823,611 UART: [kat] SHA2-512-ACC
825,974 UART: [kat] ECC-384
3,109,281 UART: [kat] HMAC-384Kdf
3,121,305 UART: [kat] LMS
4,311,381 UART: [kat] --
4,316,371 UART: [cold-reset] ++
4,318,439 UART: [fht] Storing FHT @ 0x50003400
4,329,063 UART: [idev] ++
4,329,637 UART: [idev] CDI.KEYID = 6
4,330,617 UART: [idev] SUBJECT.KEYID = 7
4,331,793 UART: [idev] UDS.KEYID = 0
4,332,880 ready_for_fw is high
4,333,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,954 UART: [idev] Erasing UDS.KEYID = 0
7,621,811 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,520 UART: [idev] --
7,647,787 UART: [ldev] ++
7,648,357 UART: [ldev] CDI.KEYID = 6
7,649,322 UART: [ldev] SUBJECT.KEYID = 5
7,650,534 UART: [ldev] AUTHORITY.KEYID = 7
7,651,764 UART: [ldev] FE.KEYID = 1
7,663,269 UART: [ldev] Erasing FE.KEYID = 1
10,950,874 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,469 UART: [ldev] --
13,312,692 UART: [fwproc] Waiting for Commands...
13,314,893 UART: [fwproc] Received command 0x46574c44
13,317,069 UART: [fwproc] Received Image of size 118548 bytes
22,119,175 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,201,601 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,274,779 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,603,078 >>> mbox cmd response: success
22,607,913 UART: [afmc] ++
22,608,529 UART: [afmc] CDI.KEYID = 6
22,609,470 UART: [afmc] SUBJECT.KEYID = 7
22,610,783 UART: [afmc] AUTHORITY.KEYID = 5
25,922,268 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,217,718 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,220,016 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
28,234,507 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
28,249,265 UART: [afmc] SIG.R = 07DA8956422B67BE520AE0F3F19018E6413FE1DE68004414FFC970884079A4DE78CC68B1AF11F9488D6BA52138DE7256
28,263,689 UART: [afmc] SIG.S = F365DA2001D0DAC9DE7816A6A536E7BAA763EB876E3E406ABB2FA06DFD0780670CA799570BF6F73554BEFF879A841F5A
28,284,205 UART: [afmc] --
28,287,584 UART: [cold-reset] --
28,292,443 UART: [state] Locking Datavault
28,298,404 UART: [state] Locking PCR0, PCR1 and PCR31
28,300,221 UART: [state] Locking ICCM
28,301,806 UART: [exit] Launching FMC @ 0x40000130
28,310,208 UART:
28,310,460 UART: Running Caliptra FMC ...
28,311,604 UART:
28,311,760 UART: [state] CFI Enabled
28,319,735 UART: [fht] FMC Alias Private Key: 7
30,659,072 UART: [art] Extend RT PCRs Done
30,660,351 UART: [art] Lock RT PCRs Done
30,661,956 UART: [art] Populate DV Done
30,667,561 UART: [fht] FMC Alias Private Key: 7
30,669,255 UART: [art] Derive CDI
30,670,125 UART: [art] Store in slot 0x4
30,712,768 UART: [art] Derive Key Pair
30,713,851 UART: [art] Store priv key in slot 0x5
33,956,442 UART: [art] Derive Key Pair - Done
33,969,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,249,685 UART: [art] Erasing AUTHORITY.KEYID = 7
36,251,241 UART: [art] PUB.X = A813DBCC72E9CC03996740B5FF5409EE57222788C37911B0B52EC8ECB7F154B7D946E21EF0ED9E1442F3836D8142AB59
36,258,475 UART: [art] PUB.Y = A0868B39E6EFAE3108FD8FAFB6BA9B390987F70C9425A2A64013321A58B0BAF121C98B490C0AD5613696B13FFC09EA79
36,265,772 UART: [art] SIG.R = 3AAB404F9361F495B6DFE14463C567712770428E05C49E67BB2DDA91166DBF4933A1D576D0B91F2CCAB9FD3C12A47923
36,273,207 UART: [art] SIG.S = 4BBA6400474EF0DD9E56938CB01B25AF360540370F749FC84D8337D57A9D275E26D4D398583FCC735AC8FE6A5FDFB1EE
37,578,447 UART: Caliptra RT
37,579,303 UART: [state] CFI Enabled
37,713,267 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
4,133,858 ready_for_fw is high
4,134,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,249,247 >>> mbox cmd response: success
27,899,524 UART:
27,899,914 UART: Running Caliptra FMC ...
27,901,122 UART:
27,901,285 UART: [state] CFI Enabled
27,909,101 UART: [fht] FMC Alias Private Key: 7
30,248,882 UART: [art] Extend RT PCRs Done
30,250,182 UART: [art] Lock RT PCRs Done
30,251,464 UART: [art] Populate DV Done
30,257,020 UART: [fht] FMC Alias Private Key: 7
30,258,600 UART: [art] Derive CDI
30,259,397 UART: [art] Store in slot 0x4
30,302,100 UART: [art] Derive Key Pair
30,303,188 UART: [art] Store priv key in slot 0x5
33,545,549 UART: [art] Derive Key Pair - Done
33,557,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,838,240 UART: [art] Erasing AUTHORITY.KEYID = 7
35,839,805 UART: [art] PUB.X = DBFB1F2B3090D0566E77D1603ADBD4C7E19D1A4FF59580F6DBDD2FEF21D58EF3304A19625910BF77221E6EE9E892B480
35,847,019 UART: [art] PUB.Y = A4D6EC7EC72A8238083A8D3DB9E489FBBF44EC1BD8A92D8BB33C64B156CDB26BF9339AB6A8F435C22E492D0FE70AB4ED
35,854,353 UART: [art] SIG.R = 440E38A6357EFDBC9F061F6B4D01F7C826740C21D3E7796080CC6708A60FBE677ECF274B81E069761D1514407464E24C
35,861,733 UART: [art] SIG.S = 607AE741F8383B3CD9F0D4DA4BF2A1EC47E634273A18C40CCEC60F34F20E19A7332BB34A9365764A8EA789CB80565F0E
37,166,932 UART: Caliptra RT
37,167,647 UART: [state] CFI Enabled
37,300,864 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
192,298 UART:
192,673 UART: Running Caliptra ROM ...
193,881 UART:
194,038 UART: [state] CFI Enabled
264,307 UART: [state] LifecycleState = Production
266,151 UART: [state] DebugLocked = No
267,624 UART: [state] WD Timer not started. Device not locked for debugging
271,198 UART: [kat] SHA2-256
450,860 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,664 UART: [kat] ++
462,199 UART: [kat] sha1
472,371 UART: [kat] SHA2-256
475,021 UART: [kat] SHA2-384
481,587 UART: [kat] SHA2-512-ACC
483,968 UART: [kat] ECC-384
2,948,132 UART: [kat] HMAC-384Kdf
2,970,802 UART: [kat] LMS
3,447,348 UART: [kat] --
3,453,549 UART: [cold-reset] ++
3,455,126 UART: [fht] FHT @ 0x50003400
3,465,400 UART: [idev] ++
3,465,977 UART: [idev] CDI.KEYID = 6
3,466,866 UART: [idev] SUBJECT.KEYID = 7
3,468,204 UART: [idev] UDS.KEYID = 0
3,469,147 ready_for_fw is high
3,469,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,508 UART: [idev] Erasing UDS.KEYID = 0
5,987,261 UART: [idev] Sha1 KeyId Algorithm
6,011,307 UART: [idev] --
6,016,389 UART: [ldev] ++
6,016,968 UART: [ldev] CDI.KEYID = 6
6,017,886 UART: [ldev] SUBJECT.KEYID = 5
6,019,104 UART: [ldev] AUTHORITY.KEYID = 7
6,020,340 UART: [ldev] FE.KEYID = 1
6,057,902 UART: [ldev] Erasing FE.KEYID = 1
8,567,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,708 UART: [ldev] --
10,378,199 UART: [fwproc] Wait for Commands...
10,379,921 UART: [fwproc] Recv command 0x46574c44
10,381,915 UART: [fwproc] Recv'd Img size: 118548 bytes
14,947,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,033,176 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,106,213 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,433,681 >>> mbox cmd response: success
15,438,344 UART: [afmc] ++
15,438,963 UART: [afmc] CDI.KEYID = 6
15,439,998 UART: [afmc] SUBJECT.KEYID = 7
15,441,140 UART: [afmc] AUTHORITY.KEYID = 5
17,985,982 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,732,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,734,255 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
19,750,109 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
19,765,999 UART: [afmc] SIG.R = EEF9D85620300560282D1C96AFDDBC4E52F572713C243B5F1A5074E5156216C58C685F9141E745A8833E7BC3BD76DE04
19,781,621 UART: [afmc] SIG.S = 184605AA705F3954109587DB320D6D01E428901529F0191F9F69B63A824F1A8ADD6E5A9B142A8283DB301B4D5A8CDD8E
19,806,683 UART: [afmc] --
19,810,780 UART: [cold-reset] --
19,815,142 UART: [state] Locking Datavault
19,820,676 UART: [state] Locking PCR0, PCR1 and PCR31
19,822,440 UART: [state] Locking ICCM
19,824,073 UART: [exit] Launching FMC @ 0x40000130
19,832,494 UART:
19,832,746 UART: Running Caliptra FMC ...
19,833,806 UART:
19,833,962 UART: [state] CFI Enabled
19,887,442 UART: [fht] FMC Alias Private Key: 7
21,653,510 UART: [art] Extend RT PCRs Done
21,654,774 UART: [art] Lock RT PCRs Done
21,656,178 UART: [art] Populate DV Done
21,661,619 UART: [fht] FMC Alias Private Key: 7
21,663,187 UART: [art] Derive CDI
21,664,054 UART: [art] Store in slot 0x4
21,719,896 UART: [art] Derive Key Pair
21,720,975 UART: [art] Store priv key in slot 0x5
24,184,520 UART: [art] Derive Key Pair - Done
24,197,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,910,117 UART: [art] Erasing AUTHORITY.KEYID = 7
25,911,674 UART: [art] PUB.X = 86E660E17CB8740213136C3932B69E236837AF5BB87540E7F28D3114B0484D6EADA872804C65D8095F1EF642F1D7C760
25,918,891 UART: [art] PUB.Y = E98385DABC0330200FD749DA50FD4432A4851D5CA341791472D49D14225E082B131F849330C62556E2F0DA220A78FA0A
25,926,112 UART: [art] SIG.R = 1CE04C4E5C7DFFCB690017170B3FB570D67DDA706FAC0833522FE13EC37A807B16638C598108F775B57A2786694ADF63
25,933,471 UART: [art] SIG.S = 36D3463B38E7E080410B1F9CE8BB0FE7F80FD865FBAADCB821C445BDEFE889C82BF927F53D3DAC1F80C01279A349E55E
26,912,073 UART: Caliptra RT
26,912,790 UART: [state] CFI Enabled
27,093,726 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,463,699 ready_for_fw is high
3,464,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,447,130 >>> mbox cmd response: success
19,732,409 UART:
19,732,789 UART: Running Caliptra FMC ...
19,734,025 UART:
19,734,203 UART: [state] CFI Enabled
19,797,577 UART: [fht] FMC Alias Private Key: 7
21,564,012 UART: [art] Extend RT PCRs Done
21,565,285 UART: [art] Lock RT PCRs Done
21,567,036 UART: [art] Populate DV Done
21,572,608 UART: [fht] FMC Alias Private Key: 7
21,574,318 UART: [art] Derive CDI
21,575,097 UART: [art] Store in slot 0x4
21,629,968 UART: [art] Derive Key Pair
21,631,054 UART: [art] Store priv key in slot 0x5
24,093,970 UART: [art] Derive Key Pair - Done
24,106,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,819,727 UART: [art] Erasing AUTHORITY.KEYID = 7
25,821,291 UART: [art] PUB.X = 80BB558E6826B31319A99975258F9D9708BDAD75827DA200BD9D35BBA631E346106A4A6C5AF99C8EFC24BA55466C445D
25,828,577 UART: [art] PUB.Y = 45431220F8111A151FB85886685CE521366C9853D4798948CB3BE424AFFB019519B7CABEAAC20EBBAD4A64FA65314A99
25,835,791 UART: [art] SIG.R = 65398A811C4D1F6D77C4C4B87B9DC90661D79F5B035F986176C33F17B0FDDE6B4863ECEFDFDA2A33661B17D326F2DEA0
25,843,159 UART: [art] SIG.S = D0B50E6AD5540FAA30190D513CC3930E1CBF7C65AAB9FF9F307353C5AF9248BCC698E7BFB2C480DEE12FC5625AA2FCC7
26,822,954 UART: Caliptra RT
26,823,673 UART: [state] CFI Enabled
27,004,822 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 5.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,355 UART:
192,777 UART: Running Caliptra ROM ...
193,909 UART:
603,523 UART: [state] CFI Enabled
619,111 UART: [state] LifecycleState = Production
620,890 UART: [state] DebugLocked = No
623,912 UART: [state] WD Timer not started. Device not locked for debugging
627,955 UART: [kat] SHA2-256
807,578 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,362 UART: [kat] ++
818,805 UART: [kat] sha1
830,032 UART: [kat] SHA2-256
832,758 UART: [kat] SHA2-384
838,537 UART: [kat] SHA2-512-ACC
840,925 UART: [kat] ECC-384
3,286,929 UART: [kat] HMAC-384Kdf
3,299,751 UART: [kat] LMS
3,776,294 UART: [kat] --
3,779,248 UART: [cold-reset] ++
3,780,753 UART: [fht] FHT @ 0x50003400
3,791,586 UART: [idev] ++
3,792,157 UART: [idev] CDI.KEYID = 6
3,793,186 UART: [idev] SUBJECT.KEYID = 7
3,794,359 UART: [idev] UDS.KEYID = 0
3,795,279 ready_for_fw is high
3,795,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,397 UART: [idev] Erasing UDS.KEYID = 0
6,269,802 UART: [idev] Sha1 KeyId Algorithm
6,293,839 UART: [idev] --
6,298,905 UART: [ldev] ++
6,299,504 UART: [ldev] CDI.KEYID = 6
6,300,413 UART: [ldev] SUBJECT.KEYID = 5
6,301,569 UART: [ldev] AUTHORITY.KEYID = 7
6,302,857 UART: [ldev] FE.KEYID = 1
6,313,613 UART: [ldev] Erasing FE.KEYID = 1
8,793,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,845 UART: [ldev] --
10,588,565 UART: [fwproc] Wait for Commands...
10,590,654 UART: [fwproc] Recv command 0x46574c44
10,592,637 UART: [fwproc] Recv'd Img size: 118548 bytes
15,190,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,267,919 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,340,947 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,668,387 >>> mbox cmd response: success
15,672,832 UART: [afmc] ++
15,673,440 UART: [afmc] CDI.KEYID = 6
15,674,457 UART: [afmc] SUBJECT.KEYID = 7
15,675,586 UART: [afmc] AUTHORITY.KEYID = 5
18,182,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,902,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,904,652 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
19,920,482 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
19,936,371 UART: [afmc] SIG.R = EEF9D85620300560282D1C96AFDDBC4E52F572713C243B5F1A5074E5156216C58C685F9141E745A8833E7BC3BD76DE04
19,951,994 UART: [afmc] SIG.S = 184605AA705F3954109587DB320D6D01E428901529F0191F9F69B63A824F1A8ADD6E5A9B142A8283DB301B4D5A8CDD8E
19,976,038 UART: [afmc] --
19,979,776 UART: [cold-reset] --
19,984,946 UART: [state] Locking Datavault
19,988,937 UART: [state] Locking PCR0, PCR1 and PCR31
19,990,694 UART: [state] Locking ICCM
19,992,197 UART: [exit] Launching FMC @ 0x40000130
20,000,611 UART:
20,000,863 UART: Running Caliptra FMC ...
20,002,009 UART:
20,002,177 UART: [state] CFI Enabled
20,010,440 UART: [fht] FMC Alias Private Key: 7
21,776,515 UART: [art] Extend RT PCRs Done
21,777,779 UART: [art] Lock RT PCRs Done
21,779,765 UART: [art] Populate DV Done
21,785,144 UART: [fht] FMC Alias Private Key: 7
21,786,816 UART: [art] Derive CDI
21,787,674 UART: [art] Store in slot 0x4
21,830,677 UART: [art] Derive Key Pair
21,831,762 UART: [art] Store priv key in slot 0x5
24,258,687 UART: [art] Derive Key Pair - Done
24,271,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,978,512 UART: [art] Erasing AUTHORITY.KEYID = 7
25,980,084 UART: [art] PUB.X = 8065BED3495C06947E08F25F3425620113FD9AD94B0A52C78F43B1C24A4419CA2D0D8EC9891CFE6734B4FDD369CD6D2D
25,987,311 UART: [art] PUB.Y = 689BD8D45B19B02D0FFEAEA967B28518672CC301761FEBD9DC4FBE37BCCFEFEE02490E5CE494208D4566EA85CBA76825
25,994,607 UART: [art] SIG.R = CC35C9F4846C5E4CC24BF4F48071F722E853510D6108CD694B06C3ACFD027773B9BC4F5F85C67094F3BEFC8A622BA1C3
26,001,979 UART: [art] SIG.S = 4FFB7304B4B9906FB7E6C6526EE510F004A6F2F1EC691725D04A3B8AA31E23FBC905B03C452037348E392DF6A7A7C507
26,981,028 UART: Caliptra RT
26,981,737 UART: [state] CFI Enabled
27,114,058 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,779,210 ready_for_fw is high
3,779,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,662,928 >>> mbox cmd response: success
19,914,688 UART:
19,915,056 UART: Running Caliptra FMC ...
19,916,308 UART:
19,916,482 UART: [state] CFI Enabled
19,924,439 UART: [fht] FMC Alias Private Key: 7
21,690,341 UART: [art] Extend RT PCRs Done
21,691,621 UART: [art] Lock RT PCRs Done
21,692,947 UART: [art] Populate DV Done
21,698,681 UART: [fht] FMC Alias Private Key: 7
21,700,186 UART: [art] Derive CDI
21,701,043 UART: [art] Store in slot 0x4
21,743,873 UART: [art] Derive Key Pair
21,744,958 UART: [art] Store priv key in slot 0x5
24,172,194 UART: [art] Derive Key Pair - Done
24,185,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,891,785 UART: [art] Erasing AUTHORITY.KEYID = 7
25,893,358 UART: [art] PUB.X = 983035193F32EA1DC3CDE3191ADDB79F4381110119453762DB78C835A8760EC958E607630EDF00E68097287028A9F854
25,900,575 UART: [art] PUB.Y = 9B28B158FDF8A0BA68A444897F6A5ABDF954C09052F73ADC08C6BB60A909E63C16EE30B3379B9072CF9EB26033E30E33
25,907,788 UART: [art] SIG.R = 7CCC818B274B5A550560C5DBDF32E762983D0293CFD1BCA7DCEE644032554BC6A8C4D4DFE7D33809E9058C847AD6FA2E
25,915,161 UART: [art] SIG.S = BD8CE93064832B8BF6B5D798006790CBFC7512636BBEA8E2E4FB7C2785E40D4FA1889C514042604F0335E460F8A52C89
26,894,803 UART: Caliptra RT
26,895,520 UART: [state] CFI Enabled
27,028,710 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,032 UART:
192,398 UART: Running Caliptra ROM ...
193,597 UART:
193,749 UART: [state] CFI Enabled
266,611 UART: [state] LifecycleState = Production
268,841 UART: [state] DebugLocked = No
270,512 UART: [state] WD Timer not started. Device not locked for debugging
275,958 UART: [kat] SHA2-256
465,810 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,608 UART: [kat] ++
477,092 UART: [kat] sha1
488,000 UART: [kat] SHA2-256
490,981 UART: [kat] SHA2-384
497,187 UART: [kat] SHA2-512-ACC
499,765 UART: [kat] ECC-384
2,950,934 UART: [kat] HMAC-384Kdf
2,973,001 UART: [kat] LMS
3,504,769 UART: [kat] --
3,509,835 UART: [cold-reset] ++
3,510,835 UART: [fht] FHT @ 0x50003400
3,523,722 UART: [idev] ++
3,524,419 UART: [idev] CDI.KEYID = 6
3,525,394 UART: [idev] SUBJECT.KEYID = 7
3,526,704 UART: [idev] UDS.KEYID = 0
3,527,712 ready_for_fw is high
3,527,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,804 UART: [idev] Erasing UDS.KEYID = 0
6,053,003 UART: [idev] Sha1 KeyId Algorithm
6,075,798 UART: [idev] --
6,079,574 UART: [ldev] ++
6,080,250 UART: [ldev] CDI.KEYID = 6
6,081,177 UART: [ldev] SUBJECT.KEYID = 5
6,082,335 UART: [ldev] AUTHORITY.KEYID = 7
6,083,573 UART: [ldev] FE.KEYID = 1
6,122,472 UART: [ldev] Erasing FE.KEYID = 1
8,632,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,365,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,380,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,396,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,411,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,970 UART: [ldev] --
10,436,877 UART: [fwproc] Wait for Commands...
10,439,611 UART: [fwproc] Recv command 0x46574c44
10,441,863 UART: [fwproc] Recv'd Img size: 118548 bytes
15,145,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,221,548 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,345,136 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,904,917 >>> mbox cmd response: success
15,909,039 UART: [afmc] ++
15,909,747 UART: [afmc] CDI.KEYID = 6
15,910,920 UART: [afmc] SUBJECT.KEYID = 7
15,912,463 UART: [afmc] AUTHORITY.KEYID = 5
18,446,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,175,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,177,481 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
20,192,579 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
20,207,760 UART: [afmc] SIG.R = EEF9D85620300560282D1C96AFDDBC4E52F572713C243B5F1A5074E5156216C58C685F9141E745A8833E7BC3BD76DE04
20,222,708 UART: [afmc] SIG.S = 184605AA705F3954109587DB320D6D01E428901529F0191F9F69B63A824F1A8ADD6E5A9B142A8283DB301B4D5A8CDD8E
20,246,171 UART: [afmc] --
20,250,088 UART: [cold-reset] --
20,254,623 UART: [state] Locking Datavault
20,258,584 UART: [state] Locking PCR0, PCR1 and PCR31
20,260,776 UART: [state] Locking ICCM
20,263,198 UART: [exit] Launching FMC @ 0x40000130
20,271,842 UART:
20,272,091 UART: Running Caliptra FMC ...
20,273,239 UART:
20,273,399 UART: [state] CFI Enabled
20,332,219 UART: [fht] FMC Alias Private Key: 7
22,098,292 UART: [art] Extend RT PCRs Done
22,100,250 UART: [art] Lock RT PCRs Done
22,101,453 UART: [art] Populate DV Done
22,106,799 UART: [fht] FMC Alias Private Key: 7
22,108,316 UART: [art] Derive CDI
22,109,144 UART: [art] Store in slot 0x4
22,153,588 UART: [art] Derive Key Pair
22,154,635 UART: [art] Store priv key in slot 0x5
24,618,449 UART: [art] Derive Key Pair - Done
24,631,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,344,421 UART: [art] Erasing AUTHORITY.KEYID = 7
26,346,456 UART: [art] PUB.X = 712B92AA1C1B41680FE0995880C9985D6EEFCCC8009E536E0C1FB4020955B8867721FCE369E9C0F17A04336F3F26B3D3
26,353,216 UART: [art] PUB.Y = DEC0C82CBEF1CC0BF6B538F9AFA0FB0F10692574EADEB062393832DF268F9163AC00A53B910C4AFA29F466086B52C892
26,360,435 UART: [art] SIG.R = BB4DE7CB7DF8287F021735A664B87F96DE70F8B135817EAD4110098DD2160AE2EA247FA5DFEDBF3DAC9CA12764820019
26,367,802 UART: [art] SIG.S = 0B93DB76B5EEC03D7A8314F8257E8707F73A53DF6F675B07018BB83DF471E13DA886697844656359CAB0D2B44BB2414B
27,347,262 UART: Caliptra RT
27,347,974 UART: [state] CFI Enabled
27,528,390 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,438,947 ready_for_fw is high
3,439,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,967,258 >>> mbox cmd response: success
20,261,472 UART:
20,261,833 UART: Running Caliptra FMC ...
20,263,081 UART:
20,263,248 UART: [state] CFI Enabled
20,327,444 UART: [fht] FMC Alias Private Key: 7
22,093,463 UART: [art] Extend RT PCRs Done
22,094,720 UART: [art] Lock RT PCRs Done
22,096,188 UART: [art] Populate DV Done
22,101,238 UART: [fht] FMC Alias Private Key: 7
22,102,796 UART: [art] Derive CDI
22,103,651 UART: [art] Store in slot 0x4
22,159,860 UART: [art] Derive Key Pair
22,160,945 UART: [art] Store priv key in slot 0x5
24,624,085 UART: [art] Derive Key Pair - Done
24,637,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,349,286 UART: [art] Erasing AUTHORITY.KEYID = 7
26,350,846 UART: [art] PUB.X = 3CF2C68EDACF879C19F71355E02DA1F2FDD9E5936C04E39E4BDCD43F1369BD9627505C6E680A4B76C0945A49F50388FB
26,358,047 UART: [art] PUB.Y = 51974781ABBAEF1B228CFD4C5C0BFE2250E0485E0522429F7D3281F55BE827D000AB9573BF1683F54D423DBFCC9EED55
26,365,302 UART: [art] SIG.R = C31870D33FDD0085DA7E9BD6859BBA6C53306D0184ECD522E42A29048EC43B102AC80B3F031F9DBE722FD278A3A4D5DB
26,373,024 UART: [art] SIG.S = 0A5265EE2B67B0B783B3E0C5BE38BAC744B8D39942840608FB02885CE7FF06011C39CCCAB37AA85BC894932BA15A0A90
27,352,463 UART: Caliptra RT
27,353,179 UART: [state] CFI Enabled
27,532,498 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,340 UART:
192,688 UART: Running Caliptra ROM ...
193,819 UART:
603,477 UART: [state] CFI Enabled
616,164 UART: [state] LifecycleState = Production
618,361 UART: [state] DebugLocked = No
620,811 UART: [state] WD Timer not started. Device not locked for debugging
625,845 UART: [kat] SHA2-256
815,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,534 UART: [kat] ++
827,003 UART: [kat] sha1
838,522 UART: [kat] SHA2-256
841,531 UART: [kat] SHA2-384
846,454 UART: [kat] SHA2-512-ACC
849,015 UART: [kat] ECC-384
3,288,801 UART: [kat] HMAC-384Kdf
3,302,079 UART: [kat] LMS
3,833,953 UART: [kat] --
3,837,529 UART: [cold-reset] ++
3,838,464 UART: [fht] FHT @ 0x50003400
3,851,139 UART: [idev] ++
3,851,839 UART: [idev] CDI.KEYID = 6
3,852,794 UART: [idev] SUBJECT.KEYID = 7
3,854,031 UART: [idev] UDS.KEYID = 0
3,854,931 ready_for_fw is high
3,855,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,074 UART: [idev] Erasing UDS.KEYID = 0
6,331,839 UART: [idev] Sha1 KeyId Algorithm
6,355,003 UART: [idev] --
6,360,891 UART: [ldev] ++
6,361,588 UART: [ldev] CDI.KEYID = 6
6,362,500 UART: [ldev] SUBJECT.KEYID = 5
6,363,824 UART: [ldev] AUTHORITY.KEYID = 7
6,364,952 UART: [ldev] FE.KEYID = 1
6,375,513 UART: [ldev] Erasing FE.KEYID = 1
8,854,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,811 UART: [ldev] --
10,645,877 UART: [fwproc] Wait for Commands...
10,647,315 UART: [fwproc] Recv command 0x46574c44
10,649,294 UART: [fwproc] Recv'd Img size: 118548 bytes
15,361,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,448,130 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,571,717 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,132,557 >>> mbox cmd response: success
16,136,728 UART: [afmc] ++
16,137,541 UART: [afmc] CDI.KEYID = 6
16,138,671 UART: [afmc] SUBJECT.KEYID = 7
16,140,134 UART: [afmc] AUTHORITY.KEYID = 5
18,644,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,368,908 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,370,853 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
20,385,989 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
20,401,189 UART: [afmc] SIG.R = EEF9D85620300560282D1C96AFDDBC4E52F572713C243B5F1A5074E5156216C58C685F9141E745A8833E7BC3BD76DE04
20,416,109 UART: [afmc] SIG.S = 184605AA705F3954109587DB320D6D01E428901529F0191F9F69B63A824F1A8ADD6E5A9B142A8283DB301B4D5A8CDD8E
20,440,326 UART: [afmc] --
20,443,222 UART: [cold-reset] --
20,446,624 UART: [state] Locking Datavault
20,451,597 UART: [state] Locking PCR0, PCR1 and PCR31
20,453,807 UART: [state] Locking ICCM
20,455,431 UART: [exit] Launching FMC @ 0x40000130
20,464,067 UART:
20,464,326 UART: Running Caliptra FMC ...
20,465,477 UART:
20,465,642 UART: [state] CFI Enabled
20,473,905 UART: [fht] FMC Alias Private Key: 7
22,239,905 UART: [art] Extend RT PCRs Done
22,241,179 UART: [art] Lock RT PCRs Done
22,242,963 UART: [art] Populate DV Done
22,248,554 UART: [fht] FMC Alias Private Key: 7
22,250,114 UART: [art] Derive CDI
22,250,915 UART: [art] Store in slot 0x4
22,294,226 UART: [art] Derive Key Pair
22,295,313 UART: [art] Store priv key in slot 0x5
24,722,415 UART: [art] Derive Key Pair - Done
24,735,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,441,776 UART: [art] Erasing AUTHORITY.KEYID = 7
26,443,487 UART: [art] PUB.X = CA4D0588FCFA40A0C048C6A5707940728BABC1DA1FECBA420E9EE21D15D5A6C50A80EAA6BC6850325FD2CE147683EFE7
26,450,544 UART: [art] PUB.Y = 14B18C72813DE9AD87A7EF73B90116CAB62E2433BE367795B2E5E36142064072C724C381B19EE00A4FF06FEE5DA84179
26,457,775 UART: [art] SIG.R = 21C100B4C4AF26B799EEE80C20F628B84BBC02EE492F1AAE96191194A2AFD3DD2440541286E769E141CC470429643AF3
26,465,232 UART: [art] SIG.S = 408BD7D4C9AF0208819B92B1C28417452271A0E1C14BB0A748AB472FC619D9FE8605CE098F83CBD5138D428368012479
27,444,916 UART: Caliptra RT
27,445,653 UART: [state] CFI Enabled
27,578,179 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 5.91s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
3,757,293 ready_for_fw is high
3,757,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,195,608 >>> mbox cmd response: success
20,450,789 UART:
20,451,166 UART: Running Caliptra FMC ...
20,452,410 UART:
20,452,584 UART: [state] CFI Enabled
20,460,491 UART: [fht] FMC Alias Private Key: 7
22,226,850 UART: [art] Extend RT PCRs Done
22,228,124 UART: [art] Lock RT PCRs Done
22,229,809 UART: [art] Populate DV Done
22,235,084 UART: [fht] FMC Alias Private Key: 7
22,236,800 UART: [art] Derive CDI
22,237,658 UART: [art] Store in slot 0x4
22,280,345 UART: [art] Derive Key Pair
22,281,437 UART: [art] Store priv key in slot 0x5
24,708,329 UART: [art] Derive Key Pair - Done
24,721,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,427,402 UART: [art] Erasing AUTHORITY.KEYID = 7
26,428,972 UART: [art] PUB.X = 532602791CCBC857E581369E452EA840F162825BA757C0DD870AEFB37F131B435A1BD32CAC91296349D5D7EC7CFE7A5F
26,436,201 UART: [art] PUB.Y = BC7F7BF63F40C024533D706B539C7EE113D2B4F7A6500908AE717A1DCBD8C38986F1F8586964D281540A4E9B11BABFA9
26,443,462 UART: [art] SIG.R = 935509213F27CB0A0B496CAB2AD6C615B8153042AEA4822A696D084C460ECE7523D521FF4E219CD133F7D01B37CE08AB
26,450,846 UART: [art] SIG.S = 31AE1124942959B3BC0A07617E1980D104D858DC55312BC3C90DA853B274C8014BE11EAD1C2A5444CE33918BEF9511B7
27,430,101 UART: Caliptra RT
27,430,855 UART: [state] CFI Enabled
27,563,279 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 5.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
192,069 UART:
193,021 UART: Running Caliptra ROM ...
194,221 UART:
194,367 UART: [state] CFI Enabled
270,213 UART: [state] LifecycleState = Unprovisioned
272,520 UART: [state] DebugLocked = Yes
274,938 UART: [state] Starting the Watchdog Timer 40000000 cycles
279,499 UART: [kat] SHA2-256
449,255 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
459,765 UART: [kat] ++
460,307 UART: [kat] sha1
471,309 UART: [kat] SHA2-256
473,980 UART: [kat] SHA2-384
479,517 UART: [kat] SHA2-512-ACC
481,886 UART: [kat] ECC-384
2,772,516 UART: [kat] HMAC-384Kdf
2,804,859 UART: [kat] LMS
3,995,173 UART: [kat] --
4,000,306 UART: [cold-reset] ++
4,001,444 UART: [fht] Storing FHT @ 0x50003400
4,012,993 UART: [idev] ++
4,013,562 UART: [idev] CDI.KEYID = 6
4,014,504 UART: [idev] SUBJECT.KEYID = 7
4,015,778 UART: [idev] UDS.KEYID = 0
4,039,073 UART: [idev] Erasing UDS.KEYID = 0
7,349,547 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,389 UART: [idev] CSR upload requested
7,375,535 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,683,541 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,698,071 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,712,861 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,727,144 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
9,750,125 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,668 writing to cptra_bootfsm_go
192,278 UART:
193,454 UART: Running Caliptra ROM ...
194,657 UART:
603,428 UART: [state] CFI Enabled
617,896 UART: [state] LifecycleState = Unprovisioned
619,949 UART: [state] DebugLocked = Yes
621,603 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,581 UART: [kat] SHA2-256
796,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,906 UART: [kat] ++
807,576 UART: [kat] sha1
819,219 UART: [kat] SHA2-256
821,930 UART: [kat] SHA2-384
826,505 UART: [kat] SHA2-512-ACC
828,867 UART: [kat] ECC-384
3,113,976 UART: [kat] HMAC-384Kdf
3,126,599 UART: [kat] LMS
4,316,727 UART: [kat] --
4,319,069 UART: [cold-reset] ++
4,320,431 UART: [fht] Storing FHT @ 0x50003400
4,333,213 UART: [idev] ++
4,333,833 UART: [idev] CDI.KEYID = 6
4,334,717 UART: [idev] SUBJECT.KEYID = 7
4,335,981 UART: [idev] UDS.KEYID = 0
4,354,578 UART: [idev] Erasing UDS.KEYID = 0
7,628,493 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,134 UART: [idev] CSR upload requested
7,655,295 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,945,660 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,960,264 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,975,008 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,989,287 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
10,012,263 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,587 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
191,919 UART:
193,005 UART: Running Caliptra ROM ...
194,230 UART:
194,388 UART: [state] CFI Enabled
264,164 UART: [state] LifecycleState = Unprovisioned
266,476 UART: [state] DebugLocked = Yes
268,350 UART: [state] Starting the WD Timer 40000000 cycles
272,429 UART: [kat] SHA2-256
452,080 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,837 UART: [kat] ++
463,382 UART: [kat] sha1
474,270 UART: [kat] SHA2-256
476,992 UART: [kat] SHA2-384
482,613 UART: [kat] SHA2-512-ACC
484,966 UART: [kat] ECC-384
2,946,974 UART: [kat] HMAC-384Kdf
2,977,077 UART: [kat] LMS
3,453,588 UART: [kat] --
3,458,441 UART: [cold-reset] ++
3,459,374 UART: [fht] FHT @ 0x50003400
3,471,442 UART: [idev] ++
3,472,044 UART: [idev] CDI.KEYID = 6
3,473,023 UART: [idev] SUBJECT.KEYID = 7
3,474,197 UART: [idev] UDS.KEYID = 0
3,507,570 UART: [idev] Erasing UDS.KEYID = 0
5,992,288 UART: [idev] Sha1 KeyId Algorithm
6,017,922 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,745,441 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,761,334 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,777,305 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,792,876 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,819,178 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,637 writing to cptra_bootfsm_go
192,237 UART:
193,204 UART: Running Caliptra ROM ...
194,432 UART:
603,309 UART: [state] CFI Enabled
619,141 UART: [state] LifecycleState = Unprovisioned
621,054 UART: [state] DebugLocked = Yes
622,694 UART: [state] Starting the WD Timer 40000000 cycles
627,272 UART: [kat] SHA2-256
806,938 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,667 UART: [kat] ++
818,156 UART: [kat] sha1
829,066 UART: [kat] SHA2-256
831,771 UART: [kat] SHA2-384
837,156 UART: [kat] SHA2-512-ACC
839,548 UART: [kat] ECC-384
3,280,501 UART: [kat] HMAC-384Kdf
3,292,592 UART: [kat] LMS
3,769,129 UART: [kat] --
3,773,870 UART: [cold-reset] ++
3,776,293 UART: [fht] FHT @ 0x50003400
3,788,194 UART: [idev] ++
3,788,763 UART: [idev] CDI.KEYID = 6
3,789,733 UART: [idev] SUBJECT.KEYID = 7
3,790,942 UART: [idev] UDS.KEYID = 0
3,809,833 UART: [idev] Erasing UDS.KEYID = 0
6,269,850 UART: [idev] Sha1 KeyId Algorithm
6,293,857 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,012,963 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,028,881 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,044,838 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,060,388 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,086,714 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
6,699 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,501 writing to cptra_bootfsm_go
193,795 UART:
194,993 UART: Running Caliptra ROM ...
196,237 UART:
196,382 UART: [state] CFI Enabled
263,764 UART: [state] LifecycleState = Unprovisioned
266,351 UART: [state] DebugLocked = Yes
268,697 UART: [state] Starting the WD Timer 40000000 cycles
274,272 UART: [kat] SHA2-256
464,154 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,903 UART: [kat] ++
475,534 UART: [kat] sha1
485,705 UART: [kat] SHA2-256
488,707 UART: [kat] SHA2-384
495,337 UART: [kat] SHA2-512-ACC
497,897 UART: [kat] ECC-384
2,947,195 UART: [kat] HMAC-384Kdf
2,973,274 UART: [kat] LMS
3,505,059 UART: [kat] --
3,510,314 UART: [cold-reset] ++
3,512,579 UART: [fht] FHT @ 0x50003400
3,522,905 UART: [idev] ++
3,523,574 UART: [idev] CDI.KEYID = 6
3,524,541 UART: [idev] SUBJECT.KEYID = 7
3,525,750 UART: [idev] UDS.KEYID = 0
3,546,801 UART: [idev] Erasing UDS.KEYID = 0
6,032,582 UART: [idev] Sha1 KeyId Algorithm
6,053,451 UART: [idev] CSR upload begun
6,058,494 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,788,318 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,803,523 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,818,607 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,833,568 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,858,757 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,728 writing to cptra_bootfsm_go
192,349 UART:
193,513 UART: Running Caliptra ROM ...
194,730 UART:
603,861 UART: [state] CFI Enabled
615,513 UART: [state] LifecycleState = Unprovisioned
617,972 UART: [state] DebugLocked = Yes
619,502 UART: [state] Starting the WD Timer 40000000 cycles
623,964 UART: [kat] SHA2-256
813,650 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,448 UART: [kat] ++
825,008 UART: [kat] sha1
835,530 UART: [kat] SHA2-256
838,545 UART: [kat] SHA2-384
844,747 UART: [kat] SHA2-512-ACC
847,302 UART: [kat] ECC-384
3,290,229 UART: [kat] HMAC-384Kdf
3,303,799 UART: [kat] LMS
3,835,618 UART: [kat] --
3,839,838 UART: [cold-reset] ++
3,841,939 UART: [fht] FHT @ 0x50003400
3,854,762 UART: [idev] ++
3,855,437 UART: [idev] CDI.KEYID = 6
3,856,451 UART: [idev] SUBJECT.KEYID = 7
3,857,636 UART: [idev] UDS.KEYID = 0
3,875,994 UART: [idev] Erasing UDS.KEYID = 0
6,337,443 UART: [idev] Sha1 KeyId Algorithm
6,358,838 UART: [idev] CSR upload begun
6,363,938 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,082,757 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,097,970 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,113,069 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,128,097 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,153,196 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,041 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = Yes
86,547 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,293 UART: [kat] SHA2-256
882,224 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,339 UART: [kat] ++
886,491 UART: [kat] sha1
890,703 UART: [kat] SHA2-256
892,641 UART: [kat] SHA2-384
895,576 UART: [kat] SHA2-512-ACC
897,477 UART: [kat] ECC-384
902,868 UART: [kat] HMAC-384Kdf
907,468 UART: [kat] LMS
1,475,664 UART: [kat] --
1,476,501 UART: [cold-reset] ++
1,477,066 UART: [fht] Storing FHT @ 0x50003400
1,480,005 UART: [idev] ++
1,480,173 UART: [idev] CDI.KEYID = 6
1,480,533 UART: [idev] SUBJECT.KEYID = 7
1,480,957 UART: [idev] UDS.KEYID = 0
1,489,040 UART: [idev] Erasing UDS.KEYID = 0
1,505,139 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,605 UART: [idev] CSR upload requested
1,515,451 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,525,716 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,531,428 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,537,330 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,543,034 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,551,569 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = Yes
86,352 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,100 UART: [kat] SHA2-256
882,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,146 UART: [kat] ++
886,298 UART: [kat] sha1
890,376 UART: [kat] SHA2-256
892,314 UART: [kat] SHA2-384
895,155 UART: [kat] SHA2-512-ACC
897,056 UART: [kat] ECC-384
902,655 UART: [kat] HMAC-384Kdf
907,333 UART: [kat] LMS
1,475,529 UART: [kat] --
1,476,548 UART: [cold-reset] ++
1,477,031 UART: [fht] Storing FHT @ 0x50003400
1,479,592 UART: [idev] ++
1,479,760 UART: [idev] CDI.KEYID = 6
1,480,120 UART: [idev] SUBJECT.KEYID = 7
1,480,544 UART: [idev] UDS.KEYID = 0
1,488,623 UART: [idev] Erasing UDS.KEYID = 0
1,504,980 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,348 UART: [idev] CSR upload requested
1,515,194 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,151 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,531,863 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,537,765 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,543,469 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,552,004 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = Yes
86,457 UART: [state] Starting the WD Timer 40000000 cycles
88,002 UART: [kat] SHA2-256
891,552 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
900,096 UART: [kat] SHA2-256
902,036 UART: [kat] SHA2-384
904,887 UART: [kat] SHA2-512-ACC
906,788 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
920,949 UART: [kat] LMS
1,169,261 UART: [kat] --
1,169,926 UART: [cold-reset] ++
1,170,501 UART: [fht] FHT @ 0x50003400
1,173,373 UART: [idev] ++
1,173,541 UART: [idev] CDI.KEYID = 6
1,173,902 UART: [idev] SUBJECT.KEYID = 7
1,174,327 UART: [idev] UDS.KEYID = 0
1,182,619 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,209,289 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,709 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,225,422 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,231,327 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,237,032 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,245,576 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = Yes
86,750 UART: [state] Starting the WD Timer 40000000 cycles
88,269 UART: [kat] SHA2-256
891,819 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,923 UART: [kat] ++
896,075 UART: [kat] sha1
900,507 UART: [kat] SHA2-256
902,447 UART: [kat] SHA2-384
905,448 UART: [kat] SHA2-512-ACC
907,349 UART: [kat] ECC-384
917,140 UART: [kat] HMAC-384Kdf
921,710 UART: [kat] LMS
1,170,022 UART: [kat] --
1,170,711 UART: [cold-reset] ++
1,171,262 UART: [fht] FHT @ 0x50003400
1,173,836 UART: [idev] ++
1,174,004 UART: [idev] CDI.KEYID = 6
1,174,365 UART: [idev] SUBJECT.KEYID = 7
1,174,790 UART: [idev] UDS.KEYID = 0
1,182,486 UART: [idev] Erasing UDS.KEYID = 0
1,199,209 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,204 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,224,917 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,230,822 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,236,527 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,245,071 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,963 UART: [state] LifecycleState = Unprovisioned
86,619 UART: [state] DebugLocked = Yes
87,359 UART: [state] Starting the WD Timer 40000000 cycles
88,850 UART: [kat] SHA2-256
894,500 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,625 UART: [kat] ++
898,777 UART: [kat] sha1
902,983 UART: [kat] SHA2-256
904,923 UART: [kat] SHA2-384
907,764 UART: [kat] SHA2-512-ACC
909,665 UART: [kat] ECC-384
919,326 UART: [kat] HMAC-384Kdf
923,896 UART: [kat] LMS
1,172,224 UART: [kat] --
1,173,291 UART: [cold-reset] ++
1,173,632 UART: [fht] FHT @ 0x50003400
1,176,209 UART: [idev] ++
1,176,377 UART: [idev] CDI.KEYID = 6
1,176,737 UART: [idev] SUBJECT.KEYID = 7
1,177,161 UART: [idev] UDS.KEYID = 0
1,185,216 UART: [idev] Erasing UDS.KEYID = 0
1,201,988 UART: [idev] Sha1 KeyId Algorithm
1,210,289 UART: [idev] CSR upload begun
1,212,070 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,520 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,228,232 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,234,134 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,838 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,248,373 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = Yes
86,700 UART: [state] Starting the WD Timer 40000000 cycles
88,341 UART: [kat] SHA2-256
893,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,116 UART: [kat] ++
898,268 UART: [kat] sha1
902,434 UART: [kat] SHA2-256
904,374 UART: [kat] SHA2-384
907,169 UART: [kat] SHA2-512-ACC
909,070 UART: [kat] ECC-384
919,005 UART: [kat] HMAC-384Kdf
923,647 UART: [kat] LMS
1,171,975 UART: [kat] --
1,172,838 UART: [cold-reset] ++
1,173,315 UART: [fht] FHT @ 0x50003400
1,176,020 UART: [idev] ++
1,176,188 UART: [idev] CDI.KEYID = 6
1,176,548 UART: [idev] SUBJECT.KEYID = 7
1,176,972 UART: [idev] UDS.KEYID = 0
1,185,033 UART: [idev] Erasing UDS.KEYID = 0
1,201,807 UART: [idev] Sha1 KeyId Algorithm
1,209,912 UART: [idev] CSR upload begun
1,211,693 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,473 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,228,185 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,234,087 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,791 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,248,326 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.43s
Truncated 6867 bytes from beginning
t Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,476,711 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
38,910,893 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
39,301,423 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:72:5c:03:56:bb:df:73:45:b9:3d:6a:7e:51:c2:b1:dc:85:76:f1
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=CA725C0356BBDF7345B93D6A7E51C2B1DC8576F1B820576F6A035A0099E158C4
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:37:74:64:41:30:d4:b5:17:d8:d1:43:b1:ff:50:
c8:97:af:e5:1f:08:b6:19:cf:7b:ea:1f:c9:d8:f6:
99:97:49:b2:4b:31:4d:fc:7b:fb:74:04:55:59:78:
1f:a2:d3:a3:db:1f:ce:41:37:b5:3c:06:cf:22:45:
0d:fd:45:1a:b1:b2:73:8c:f8:4d:bd:77:e1:83:ec:
e9:29:2f:d3:43:78:13:40:4d:5d:c7:c4:5b:ae:db:
0b:4d:d6:15:f1:6d:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
CA:72:5C:03:56:BB:DF:73:45:B9:3D:6A:7E:51:C2:B1:DC:85:76:F1
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:d7:7d:9b:cf:89:96:0c:f0:25:b1:f3:14:5f:
2a:8f:8c:b7:02:a3:71:61:ec:25:54:90:89:ce:0b:2b:b3:32:
79:ec:fd:c2:e1:aa:99:35:41:55:db:fc:89:54:1a:e0:44:02:
31:00:8b:84:5d:44:65:e4:02:70:09:c6:f1:71:26:a1:74:b6:
56:cb:cd:a4:4c:ae:eb:d1:b0:4c:06:31:99:71:5f:a2:c8:d6:
26:9f:80:ac:bc:75:cf:97:e4:d4:5d:bd:dd:f8
41,773,709 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
41,921,991 UART:
41,922,363 UART: Running Caliptra ROM ...
41,923,556 UART:
41,923,726 UART: [state] CFI Enabled
41,994,004 UART: [state] LifecycleState = Production
41,995,843 UART: [state] DebugLocked = Yes
41,997,430 UART: [state] Starting the Watchdog Timer 40000000 cycles
42,002,374 UART: [kat] SHA2-256
42,172,066 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
42,182,545 UART: [kat] ++
42,183,057 UART: [kat] sha1
42,194,318 UART: [kat] SHA2-256
42,197,026 UART: [kat] SHA2-384
42,202,868 UART: [kat] SHA2-512-ACC
42,205,213 UART: [kat] ECC-384
44,495,635 UART: [kat] HMAC-384Kdf
44,527,409 UART: [kat] LMS
45,717,761 UART: [kat] --
45,723,020 UART: [update-reset] ++
54,508,642 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,513,110 UART: [update-reset] Loading Runtime at address 0x40005000 len 90872
54,904,755 >>> mbox cmd response: success
54,906,335 UART: [update-reset] Copying MAN_2 To MAN_1
54,928,762 UART: [update-reset Success] --
54,932,005 UART: [state] Locking Datavault
54,936,412 UART: [state] Locking PCR0, PCR1 and PCR31
54,938,118 UART: [state] Locking ICCM
54,940,921 UART: [exit] Launching FMC @ 0x40000130
54,949,340 UART:
54,949,577 UART: Running Caliptra FMC ...
54,950,687 UART:
54,950,852 UART: [state] CFI Enabled
55,052,932 UART: [art] Extend RT PCRs Done
55,054,114 UART: [art] Lock RT PCRs Done
55,055,517 UART: [art] Populate DV Done
55,061,088 UART: [fht] FMC Alias Private Key: 7
55,062,737 UART: [art] Derive CDI
55,063,551 UART: [art] Store in slot 0x4
55,122,129 UART: [art] Derive Key Pair
55,123,166 UART: [art] Store priv key in slot 0x5
58,416,495 UART: [art] Derive Key Pair - Done
58,429,929 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
60,718,148 UART: [art] Erasing AUTHORITY.KEYID = 7
60,719,657 UART: [art] PUB.X = B337CF9164B261F92499C8ED4A038647E001C9BA8ECAAC5A58116B6EE04E993A29B17D730D8EE40CAF222A1569D5AF33
60,726,950 UART: [art] PUB.Y = E7DB3AD8EDF203983BFEB9822A266C659145D8A96C60A3BD6EB7EEAF2C7EC97574011AF6A31A89962D1AC0B3C34F34CD
60,734,210 UART: [art] SIG.R = 6CC0E7750230B708551998A4FE837DE9BF55FC6A6F98E4EA43467DE0016BD18FCBD1CF1D3DC702A2A77E6201FC375FC7
60,741,638 UART: [art] SIG.S = EB4F4A443852C85839B0C285AD98762F961A23034AC5B0A06A4BDD82726814926F6718388BBDE8B98772E403BAD102DF
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3f:df:4a:1b:6d:03:ff:ac:8e:29:c8:44:00:5b:e3:57:5d:81:93:86
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=3FDF4A1B6D03FFAC8E29C844005BE3575D8193866334C1CDCCDC018A0EC861EB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b3:37:cf:91:64:b2:61:f9:24:99:c8:ed:4a:03:
86:47:e0:01:c9:ba:8e:ca:ac:5a:58:11:6b:6e:e0:
4e:99:3a:29:b1:7d:73:0d:8e:e4:0c:af:22:2a:15:
69:d5:af:33:e7:db:3a:d8:ed:f2:03:98:3b:fe:b9:
82:2a:26:6c:65:91:45:d8:a9:6c:60:a3:bd:6e:b7:
ee:af:2c:7e:c9:75:74:01:1a:f6:a3:1a:89:96:2d:
1a:c0:b3:c3:4f:34:cd
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
3F:DF:4A:1B:6D:03:FF:AC:8E:29:C8:44:00:5B:E3:57:5D:81:93:86
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:6c:c0:e7:75:02:30:b7:08:55:19:98:a4:fe:83:
7d:e9:bf:55:fc:6a:6f:98:e4:ea:43:46:7d:e0:01:6b:d1:8f:
cb:d1:cf:1d:3d:c7:02:a2:a7:7e:62:01:fc:37:5f:c7:02:31:
00:eb:4f:4a:44:38:52:c8:58:39:b0:c2:85:ad:98:76:2f:96:
1a:23:03:4a:c5:b0:a0:6a:4b:dd:82:72:68:14:92:6f:67:18:
38:8b:bd:e8:b9:87:72:e4:03:ba:d1:02:df
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.26s
Truncated 2341 bytes from beginning
9DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,856,294 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
38,292,449 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
38,683,187 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:15:7f:5b:1c:f7:11:7c:cf:65:a0:45:19:94:4d:d3:71:6c:75
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=944A157F5B1CF7117CCF65A04519944DD3716C75DC5F64DEF6FFD390AF21225E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:1f:7e:f3:87:2b:83:17:3b:04:e1:e8:58:11:38:
1b:b0:9d:a0:58:89:68:6f:25:72:54:11:bf:42:09:
5f:6a:11:08:e1:13:4f:9e:fa:31:7f:b6:1f:15:94:
1a:1c:3e:7a:79:41:98:b6:50:f2:ec:30:d2:3d:12:
e9:ea:02:e8:79:ba:d2:9c:7b:50:26:a9:11:c3:21:
78:63:5e:0c:fa:13:7c:dd:50:a0:7a:94:34:9f:20:
88:4f:67:29:fd:0a:2d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
94:4A:15:7F:5B:1C:F7:11:7C:CF:65:A0:45:19:94:4D:D3:71:6C:75
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e4:e9:fe:08:f8:1b:c2:57:e0:b7:90:19:ae:
e4:c9:20:b0:a5:fd:3b:a9:a2:e1:8a:7d:22:fd:4e:2d:80:55:
2f:a9:c0:0a:5f:f8:7a:aa:8b:7f:e6:bf:ea:ab:3f:2e:2c:02:
30:2a:9b:70:4e:7a:5e:58:40:62:54:ce:3a:92:9d:a5:f9:5d:
31:55:05:3d:d7:4b:04:23:04:07:7d:0c:05:c9:cd:d7:ab:02:
93:d0:2d:ee:c3:2c:d4:b6:a3:dd:60:4b:0b
41,153,302 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
54,104,886 >>> mbox cmd response: success
54,138,786 UART:
54,139,127 UART: Running Caliptra FMC ...
54,140,280 UART:
54,140,432 UART: [state] CFI Enabled
54,226,917 UART: [art] Extend RT PCRs Done
54,228,115 UART: [art] Lock RT PCRs Done
54,229,489 UART: [art] Populate DV Done
54,234,842 UART: [fht] FMC Alias Private Key: 7
54,236,594 UART: [art] Derive CDI
54,237,410 UART: [art] Store in slot 0x4
54,295,736 UART: [art] Derive Key Pair
54,296,783 UART: [art] Store priv key in slot 0x5
57,589,886 UART: [art] Derive Key Pair - Done
57,602,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,891,598 UART: [art] Erasing AUTHORITY.KEYID = 7
59,893,126 UART: [art] PUB.X = 92B74914D352A7A921AE3740B31E4A13E9305F07154E175504B63C0BBB5A26FBAEF43D7AA5589B0CA20637BF25041F17
59,900,399 UART: [art] PUB.Y = 93BD20EE0C99667AD8782B9755D7C9DAA1F8C94E16D887F4A99D1FEF58AE17AF762C9E58821EFB672EDC64DCDAB9AD26
59,907,630 UART: [art] SIG.R = 5749EC4C57091D49AE038A5FABC3B547718508C6BCCD65A4CF475A2716A0A206F9AF12711261F4B693DB53BA9A9DEE4E
59,915,074 UART: [art] SIG.S = 5815E2CDFE2137F019ED63D003F7F0E89408BB1A6B7FCE8DBA859A2C7935BC5AB4F6BE04EBC8419A8070696D225E0581
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7e:d4:05:ab:8e:60:52:81:f7:10:a6:34:a1:c9:2e:aa:cf:cc:f1:64
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7AD405AB8E605281F710A634A1C92EAACFCCF164AB8E2A12C6EF295F95A4BD00
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:92:b7:49:14:d3:52:a7:a9:21:ae:37:40:b3:1e:
4a:13:e9:30:5f:07:15:4e:17:55:04:b6:3c:0b:bb:
5a:26:fb:ae:f4:3d:7a:a5:58:9b:0c:a2:06:37:bf:
25:04:1f:17:93:bd:20:ee:0c:99:66:7a:d8:78:2b:
97:55:d7:c9:da:a1:f8:c9:4e:16:d8:87:f4:a9:9d:
1f:ef:58:ae:17:af:76:2c:9e:58:82:1e:fb:67:2e:
dc:64:dc:da:b9:ad:26
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
7A:D4:05:AB:8E:60:52:81:F7:10:A6:34:A1:C9:2E:AA:CF:CC:F1:64
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:57:49:ec:4c:57:09:1d:49:ae:03:8a:5f:ab:c3:
b5:47:71:85:08:c6:bc:cd:65:a4:cf:47:5a:27:16:a0:a2:06:
f9:af:12:71:12:61:f4:b6:93:db:53:ba:9a:9d:ee:4e:02:30:
58:15:e2:cd:fe:21:37:f0:19:ed:63:d0:03:f7:f0:e8:94:08:
bb:1a:6b:7f:ce:8d:ba:85:9a:2c:79:35:bc:5a:b4:f6:be:04:
eb:c8:41:9a:80:70:69:6d:22:5e:05:81
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.22s
Truncated 6870 bytes from beginning
ey Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,412,595 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
38,849,172 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
39,240,284 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6f:ae:de:eb:a9:d1:40:d7:bd:07:5e:42:ac:43:b6:83:16:0b:59:35
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=EBAEDEEBA9D140D7BD075E42AC43B683160B5935ACBAD1B15E0589F7B1E75E9E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:6d:3e:ac:f8:e1:08:70:11:ac:89:36:6a:e3:68:
48:2b:16:17:b9:0d:26:2d:61:06:6e:77:f9:d4:b5:
11:3e:92:fc:2e:ed:0d:d8:3e:cd:47:21:c9:e7:6b:
a0:6a:48:b8:e8:58:f8:64:f7:0c:e3:fc:a5:2b:ee:
53:e3:0d:aa:fe:fb:07:41:67:2f:33:3d:8a:53:04:
a6:71:33:d0:3e:bf:7f:9e:bb:d6:7e:c0:6d:cf:74:
5d:4f:71:42:8f:d5:e6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
EB:AE:DE:EB:A9:D1:40:D7:BD:07:5E:42:AC:43:B6:83:16:0B:59:35
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:e6:f4:3b:5a:47:96:51:74:8d:2c:ef:b4:8b:
5b:a2:96:6a:f1:44:b5:09:e3:ab:e4:12:5b:ef:f3:f5:bb:a3:
6c:0b:a3:4e:ec:d4:94:99:b7:07:0e:dc:3b:0b:8e:a6:bf:02:
31:00:cd:f0:4c:3a:aa:6b:08:c4:ef:3e:b6:0a:64:ba:ff:89:
7c:d9:59:3c:f3:d3:b9:22:d6:75:e0:dc:3c:df:cc:86:eb:6e:
09:3a:b3:4c:af:d4:b4:86:f9:6a:d1:f2:6a:93
41,704,328 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
41,852,893 UART:
41,853,276 UART: Running Caliptra ROM ...
41,854,378 UART:
41,854,530 UART: [state] CFI Enabled
41,870,598 UART: [state] LifecycleState = Production
41,872,387 UART: [state] DebugLocked = Yes
41,875,395 UART: [state] Starting the Watchdog Timer 40000000 cycles
41,880,655 UART: [kat] SHA2-256
42,050,402 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
42,060,930 UART: [kat] ++
42,061,388 UART: [kat] sha1
42,073,781 UART: [kat] SHA2-256
42,076,514 UART: [kat] SHA2-384
42,083,991 UART: [kat] SHA2-512-ACC
42,086,357 UART: [kat] ECC-384
44,370,706 UART: [kat] HMAC-384Kdf
44,383,203 UART: [kat] LMS
45,573,304 UART: [kat] --
45,578,612 UART: [update-reset] ++
54,526,259 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,529,812 UART: [update-reset] Loading Runtime at address 0x40005000 len 90872
54,921,442 >>> mbox cmd response: success
54,922,726 UART: [update-reset] Copying MAN_2 To MAN_1
54,945,188 UART: [update-reset Success] --
54,949,239 UART: [state] Locking Datavault
54,951,799 UART: [state] Locking PCR0, PCR1 and PCR31
54,953,558 UART: [state] Locking ICCM
54,954,900 UART: [exit] Launching FMC @ 0x40000130
54,963,297 UART:
54,963,551 UART: Running Caliptra FMC ...
54,964,652 UART:
54,964,823 UART: [state] CFI Enabled
55,009,378 UART: [art] Extend RT PCRs Done
55,010,530 UART: [art] Lock RT PCRs Done
55,012,032 UART: [art] Populate DV Done
55,017,280 UART: [fht] FMC Alias Private Key: 7
55,018,979 UART: [art] Derive CDI
55,019,793 UART: [art] Store in slot 0x4
55,062,281 UART: [art] Derive Key Pair
55,063,323 UART: [art] Store priv key in slot 0x5
58,306,060 UART: [art] Derive Key Pair - Done
58,319,120 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
60,599,321 UART: [art] Erasing AUTHORITY.KEYID = 7
60,600,837 UART: [art] PUB.X = 7D86A5964DB98F985E29EB123DA99C08B9640FA5A97A195561BEFB8D7247C3BAE92042A84613C03F7EAF29C5F5519169
60,608,116 UART: [art] PUB.Y = 52A8189C480D4870425B27DA299DD5843C167FC368C571AB03A19CC9F75D72758EF26E77904652D09E09F35183701502
60,615,310 UART: [art] SIG.R = DC7BD45D9F4F1B6FD342C1AF31952701BA974410F8E1C0141DA9C303F9BB77561E140BE2BFB2A9698118D79AD937074D
60,622,734 UART: [art] SIG.S = 82B2F61C37CB6E9F4513EC2078BCC2BFA1C059DE9365AE45460487DDBBBE764347DF5DF2A4ECD6BBCEEEC11BF3089C6B
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7c:1b:4e:a9:75:5a:89:35:39:8c:6c:f5:b8:03:e9:e8:48:6a:ac:5a
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=781B4EA9755A8935398C6CF5B803E9E8486AAC5A7BB946D8D201DFA2D647E150
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:7d:86:a5:96:4d:b9:8f:98:5e:29:eb:12:3d:a9:
9c:08:b9:64:0f:a5:a9:7a:19:55:61:be:fb:8d:72:
47:c3:ba:e9:20:42:a8:46:13:c0:3f:7e:af:29:c5:
f5:51:91:69:52:a8:18:9c:48:0d:48:70:42:5b:27:
da:29:9d:d5:84:3c:16:7f:c3:68:c5:71:ab:03:a1:
9c:c9:f7:5d:72:75:8e:f2:6e:77:90:46:52:d0:9e:
09:f3:51:83:70:15:02
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
78:1B:4E:A9:75:5A:89:35:39:8C:6C:F5:B8:03:E9:E8:48:6A:AC:5A
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:dc:7b:d4:5d:9f:4f:1b:6f:d3:42:c1:af:31:
95:27:01:ba:97:44:10:f8:e1:c0:14:1d:a9:c3:03:f9:bb:77:
56:1e:14:0b:e2:bf:b2:a9:69:81:18:d7:9a:d9:37:07:4d:02:
31:00:82:b2:f6:1c:37:cb:6e:9f:45:13:ec:20:78:bc:c2:bf:
a1:c0:59:de:93:65:ae:45:46:04:87:dd:bb:be:76:43:47:df:
5d:f2:a4:ec:d6:bb:ce:ee:c1:1b:f3:08:9c:6b
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.25s
Truncated 2347 bytes from beginning
DC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,624,640 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
38,061,536 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
38,450,882 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5f:c4:a6:22:84:e8:9a:a4:1c:e5:29:30:4d:34:30:fb:10:31:f7:db
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=DBC4A62284E89AA41CE529304D3430FB1031F7DB6ACA333DA5CFDD1BC6450024
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:81:d9:53:19:df:f3:4b:17:d7:c2:44:53:67:1c:
fd:c5:e0:fb:26:75:e2:0f:ee:ec:4a:ef:0b:3d:a7:
ec:19:ee:e5:94:00:58:08:8c:e6:c5:06:d3:0f:2a:
56:b8:c5:34:30:4a:b5:26:f5:ee:e4:c3:49:c1:8e:
7f:f1:d6:73:71:69:07:e7:fb:4c:e6:85:00:dd:5a:
bf:0f:d1:a7:91:c4:33:ab:ef:79:d8:05:dc:a1:75:
69:86:27:51:bf:6d:cf
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
DB:C4:A6:22:84:E8:9A:A4:1C:E5:29:30:4D:34:30:FB:10:31:F7:DB
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a7:6d:98:66:d8:f3:cd:1d:24:39:ff:a9:4e:
b4:44:ec:64:5c:3a:4f:ad:92:10:95:9b:aa:e5:38:a5:25:9a:
e2:2e:87:e8:ff:41:da:0c:72:26:4d:85:20:b1:e7:fb:4e:02:
30:5d:17:70:d2:a3:9c:cb:3b:53:3a:0c:9b:cd:e6:5a:66:2c:
0a:cc:3c:98:f1:e0:c2:23:9d:3c:38:e0:8b:89:58:12:c6:94:
43:35:24:f6:e1:e8:a1:6b:a8:6f:b4:30:ca
40,918,803 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
53,706,088 >>> mbox cmd response: success
53,741,100 UART:
53,741,461 UART: Running Caliptra FMC ...
53,742,694 UART:
53,742,872 UART: [state] CFI Enabled
53,787,498 UART: [art] Extend RT PCRs Done
53,788,650 UART: [art] Lock RT PCRs Done
53,790,120 UART: [art] Populate DV Done
53,795,261 UART: [fht] FMC Alias Private Key: 7
53,796,851 UART: [art] Derive CDI
53,797,586 UART: [art] Store in slot 0x4
53,839,974 UART: [art] Derive Key Pair
53,841,039 UART: [art] Store priv key in slot 0x5
57,083,314 UART: [art] Derive Key Pair - Done
57,096,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,376,710 UART: [art] Erasing AUTHORITY.KEYID = 7
59,378,219 UART: [art] PUB.X = 92074BE5A5E967F1417CE79F69094823557BF0ED95825E9369AD0CC70FAB1E4B1545569699812F7E320A49D6A4B97F8E
59,385,513 UART: [art] PUB.Y = 59C34DD313B5921C7E633C2938F9C6AA75D752C6950EB1936FCCD7A33A07D24D9FFB8894F18A104E63E78682F800C159
59,392,721 UART: [art] SIG.R = DB0FC200F167090629F16346FEB925A0EC1FE7091C3C18AD914D23CBD8153D922493F586E6DB0F8A3279AC4F0FD9EE6C
59,400,080 UART: [art] SIG.S = 95C2538A0E136BE682C8D1AAE13ED40396B4A92FC7D1F2DB190B7B791E36B6535DE71A4443E34E6850696D71C8048A39
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
17:45:6f:0f:a7:d0:55:92:5a:3f:c6:5f:c8:77:a1:eb:c3:50:d0:e7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=97456F0FA7D055925A3FC65FC877A1EBC350D0E74447CAC608E6E0FD947A6AA0
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:92:07:4b:e5:a5:e9:67:f1:41:7c:e7:9f:69:09:
48:23:55:7b:f0:ed:95:82:5e:93:69:ad:0c:c7:0f:
ab:1e:4b:15:45:56:96:99:81:2f:7e:32:0a:49:d6:
a4:b9:7f:8e:59:c3:4d:d3:13:b5:92:1c:7e:63:3c:
29:38:f9:c6:aa:75:d7:52:c6:95:0e:b1:93:6f:cc:
d7:a3:3a:07:d2:4d:9f:fb:88:94:f1:8a:10:4e:63:
e7:86:82:f8:00:c1:59
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
97:45:6F:0F:A7:D0:55:92:5A:3F:C6:5F:C8:77:A1:EB:C3:50:D0:E7
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:db:0f:c2:00:f1:67:09:06:29:f1:63:46:fe:
b9:25:a0:ec:1f:e7:09:1c:3c:18:ad:91:4d:23:cb:d8:15:3d:
92:24:93:f5:86:e6:db:0f:8a:32:79:ac:4f:0f:d9:ee:6c:02:
31:00:95:c2:53:8a:0e:13:6b:e6:82:c8:d1:aa:e1:3e:d4:03:
96:b4:a9:2f:c7:d1:f2:db:19:0b:7b:79:1e:36:b6:53:5d:e7:
1a:44:43:e3:4e:68:50:69:6d:71:c8:04:8a:39
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.19s
Truncated 6768 bytes from beginning
.................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,771,431 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,206,533 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,595,811 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7c:1f:2c:2b:aa:c9:f7:25:c2:8c:e0:c0:8c:85:b1:6c:42:9d:2e:70
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7C1F2C2BAAC9F725C28CE0C08C85B16C429D2E70D8772FBC3E08126B21B52B4C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e2:e0:81:c6:1a:db:3b:87:31:da:1a:1e:99:25:
0d:93:68:3d:52:c0:16:ec:7b:0d:fc:3a:9c:ea:2a:
43:d2:02:b0:48:92:b2:83:a3:4f:14:90:ba:5f:19:
7d:1d:6a:01:97:1d:ac:54:6a:7f:2a:a0:b6:68:b3:
ce:47:8b:bf:f9:8c:ff:89:db:2f:62:df:1d:90:95:
d0:d4:bf:9f:60:9d:c4:14:3c:63:68:27:dc:6d:03:
f1:6e:39:1f:1c:19:e1
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
7C:1F:2C:2B:AA:C9:F7:25:C2:8C:E0:C0:8C:85:B1:6C:42:9D:2E:70
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:91:a0:49:5f:ae:71:f5:ea:b0:c5:96:58:0b:
b5:a8:58:f7:7e:cf:f5:ea:20:18:45:f6:b2:0d:d5:01:68:d2:
90:a9:1f:14:55:d7:a8:35:37:91:b0:a9:45:da:17:63:e6:02:
31:00:e5:0e:9b:3a:01:f6:e6:d0:0e:92:98:7b:7e:ff:99:c3:
ff:55:1c:af:c8:6e:2d:a3:cb:5c:43:af:6c:b1:76:a3:40:fe:
94:27:8a:cc:ec:3c:1e:37:36:0b:e0:c3:43:0b
31,062,583 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
31,210,918 UART:
31,211,293 UART: Running Caliptra ROM ...
31,212,518 UART:
31,212,692 UART: [state] CFI Enabled
31,289,614 UART: [state] LifecycleState = Production
31,291,449 UART: [state] DebugLocked = Yes
31,292,986 UART: [state] Starting the WD Timer 40000000 cycles
31,298,341 UART: [kat] SHA2-256
31,478,059 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
31,488,829 UART: [kat] ++
31,489,326 UART: [kat] sha1
31,500,385 UART: [kat] SHA2-256
31,503,085 UART: [kat] SHA2-384
31,510,537 UART: [kat] SHA2-512-ACC
31,512,898 UART: [kat] ECC-384
33,971,996 UART: [kat] HMAC-384Kdf
33,994,382 UART: [kat] LMS
34,470,862 UART: [kat] --
34,474,630 UART: [update-reset] ++
39,048,949 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,052,039 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
39,443,561 >>> mbox cmd response: success
39,444,994 UART: [update-reset] Copying MAN_2 To MAN_1
39,482,130 UART: [update-reset Success] --
39,485,314 UART: [state] Locking Datavault
39,487,495 UART: [state] Locking PCR0, PCR1 and PCR31
39,489,253 UART: [state] Locking ICCM
39,491,164 UART: [exit] Launching FMC @ 0x40000130
39,499,560 UART:
39,499,807 UART: Running Caliptra FMC ...
39,500,915 UART:
39,501,075 UART: [state] CFI Enabled
39,593,965 UART: [art] Extend RT PCRs Done
39,595,154 UART: [art] Lock RT PCRs Done
39,596,453 UART: [art] Populate DV Done
39,602,191 UART: [fht] FMC Alias Private Key: 7
39,603,647 UART: [art] Derive CDI
39,604,416 UART: [art] Store in slot 0x4
39,663,629 UART: [art] Derive Key Pair
39,664,682 UART: [art] Store priv key in slot 0x5
42,126,870 UART: [art] Derive Key Pair - Done
42,139,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,852,859 UART: [art] Erasing AUTHORITY.KEYID = 7
43,854,351 UART: [art] PUB.X = 5315469D4D1D2E04C729BA5A132749D09494E1B50FB328CD74C374734DBD8E4CA89AFCF3E77C05E3CFCDEF2CC2D71FC4
43,861,652 UART: [art] PUB.Y = B958252BFC6BE03C8F188645BC5003539DFE5568886D1F7E55F072AC3FF16A6765CC468CDDA14F15A569D8FF020089CE
43,868,880 UART: [art] SIG.R = D9B6AE8D566DB9AC1AB34929D4CC72441A086DAAF142390F6BC950129E6514D77581786F77237487B7607595A3EE8DBB
43,876,315 UART: [art] SIG.S = C875AFFC09D28685CEB061E099D6273E42BE5A56F7994313DF42C72ABC67997DC235A59D32EA627CA1C8603F87D2F517
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0f:bc:75:62:09:49:5f:3d:cc:f8:a5:12:f5:90:ee:98:01:7b:66:95
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8FBC756209495F3DCCF8A512F590EE98017B6695917AA811C0D2353FABE7D58E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:53:15:46:9d:4d:1d:2e:04:c7:29:ba:5a:13:27:
49:d0:94:94:e1:b5:0f:b3:28:cd:74:c3:74:73:4d:
bd:8e:4c:a8:9a:fc:f3:e7:7c:05:e3:cf:cd:ef:2c:
c2:d7:1f:c4:b9:58:25:2b:fc:6b:e0:3c:8f:18:86:
45:bc:50:03:53:9d:fe:55:68:88:6d:1f:7e:55:f0:
72:ac:3f:f1:6a:67:65:cc:46:8c:dd:a1:4f:15:a5:
69:d8:ff:02:00:89:ce
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
8F:BC:75:62:09:49:5F:3D:CC:F8:A5:12:F5:90:EE:98:01:7B:66:95
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:d9:b6:ae:8d:56:6d:b9:ac:1a:b3:49:29:d4:
cc:72:44:1a:08:6d:aa:f1:42:39:0f:6b:c9:50:12:9e:65:14:
d7:75:81:78:6f:77:23:74:87:b7:60:75:95:a3:ee:8d:bb:02:
31:00:c8:75:af:fc:09:d2:86:85:ce:b0:61:e0:99:d6:27:3e:
42:be:5a:56:f7:99:43:13:df:42:c7:2a:bc:67:99:7d:c2:35:
a5:9d:32:ea:62:7c:a1:c8:60:3f:87:d2:f5:17
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.40s
Truncated 2312 bytes from beginning
C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,421,305 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
27,858,891 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,248,745 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
76:9d:fd:63:fb:9e:fb:fe:95:aa:21:92:1e:9b:6c:85:ca:fc:74:d7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F69DFD63FB9EFBFE95AA21921E9B6C85CAFC74D7F83D8B06A27C9B0607448A05
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:36:1a:a3:f2:f2:40:6f:83:15:3a:b7:2b:1c:3b:
5e:70:79:e4:82:7a:d6:a1:30:68:c8:a3:01:bb:48:
c9:a6:92:50:97:a3:c4:83:29:a5:dc:80:aa:ba:63:
58:ac:91:2f:c3:a4:de:37:74:6d:6c:62:83:28:2c:
94:be:65:ac:71:0c:d3:3e:ef:0b:11:5c:e9:b1:e7:
4a:a3:67:f1:85:d4:54:a1:5b:8d:5a:eb:ee:a4:31:
23:63:f3:b1:08:e0:1a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
F6:9D:FD:63:FB:9E:FB:FE:95:AA:21:92:1E:9B:6C:85:CA:FC:74:D7
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:0e:3a:45:72:a8:af:76:d7:bd:f3:bb:a6:1d:0d:
4f:a3:70:99:a3:df:90:41:c4:4a:30:e6:dd:38:1f:e2:71:d0:
ae:fb:6d:e7:7d:2d:5c:e3:ba:06:dd:58:4f:09:00:82:02:31:
00:cb:21:e5:f9:81:fa:da:17:27:18:bd:3e:38:6b:22:97:9f:
4d:c3:dc:51:2f:b3:e5:7d:e0:ab:2a:9c:e1:56:14:66:0f:1a:
eb:b0:bf:4e:37:b7:1a:15:b0:a0:95:3d:d6
30,714,606 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
39,155,141 >>> mbox cmd response: success
39,189,419 UART:
39,189,752 UART: Running Caliptra FMC ...
39,190,979 UART:
39,191,153 UART: [state] CFI Enabled
39,295,998 UART: [art] Extend RT PCRs Done
39,297,204 UART: [art] Lock RT PCRs Done
39,298,726 UART: [art] Populate DV Done
39,304,142 UART: [fht] FMC Alias Private Key: 7
39,305,631 UART: [art] Derive CDI
39,306,398 UART: [art] Store in slot 0x4
39,365,417 UART: [art] Derive Key Pair
39,366,458 UART: [art] Store priv key in slot 0x5
41,829,259 UART: [art] Derive Key Pair - Done
41,842,210 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,554,658 UART: [art] Erasing AUTHORITY.KEYID = 7
43,556,160 UART: [art] PUB.X = 98A581477001C9975F753119F835EC7DD4C988E68F1B36E3BD17F6E6AAC64283FA098354293FEA35981C59B3E04F3BBF
43,563,420 UART: [art] PUB.Y = BCBF26D32BE535F1DAC26EBBDBF16324E34635EAF50A25BE973E42AD0A24F7E8D6B6602B06718B8C760EF88034289D00
43,570,666 UART: [art] SIG.R = A4D81EBC80573B4732DCC11569C2AE935C0558A88B36EB45DFE7C1A13B7E6328562876885C04AAD8D7B9ABD902308DA2
43,578,108 UART: [art] SIG.S = 3CC1F7E87E089E0E3BAA0D4E2D85A434462A2881D140477C23A9CEE31D2825B60FF84D5E4903A61801C7CE521ADF8F01
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
17:d2:60:9f:a5:53:cd:ae:54:0d:22:50:31:6a:c2:2f:b7:e5:7f:35
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=97D2609FA553CDAE540D2250316AC22FB7E57F358F169E1CB9467FD5D4890FC6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:98:a5:81:47:70:01:c9:97:5f:75:31:19:f8:35:
ec:7d:d4:c9:88:e6:8f:1b:36:e3:bd:17:f6:e6:aa:
c6:42:83:fa:09:83:54:29:3f:ea:35:98:1c:59:b3:
e0:4f:3b:bf:bc:bf:26:d3:2b:e5:35:f1:da:c2:6e:
bb:db:f1:63:24:e3:46:35:ea:f5:0a:25:be:97:3e:
42:ad:0a:24:f7:e8:d6:b6:60:2b:06:71:8b:8c:76:
0e:f8:80:34:28:9d:00
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
97:D2:60:9F:A5:53:CD:AE:54:0D:22:50:31:6A:C2:2F:B7:E5:7F:35
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a4:d8:1e:bc:80:57:3b:47:32:dc:c1:15:69:
c2:ae:93:5c:05:58:a8:8b:36:eb:45:df:e7:c1:a1:3b:7e:63:
28:56:28:76:88:5c:04:aa:d8:d7:b9:ab:d9:02:30:8d:a2:02:
30:3c:c1:f7:e8:7e:08:9e:0e:3b:aa:0d:4e:2d:85:a4:34:46:
2a:28:81:d1:40:47:7c:23:a9:ce:e3:1d:28:25:b6:0f:f8:4d:
5e:49:03:a6:18:01:c7:ce:52:1a:df:8f:01
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.39s
Truncated 6765 bytes from beginning
....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,799,581 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,233,810 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,621,950 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:8f:bc:fb:b4:de:cc:0e:7d:a7:53:b2:a9:ab:b3:31:00:74:b2:3e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=998FBCFBB4DECC0E7DA753B2A9ABB3310074B23EC0EA13CF8523FB9ACADABC4C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:bd:c7:31:fd:f8:98:d0:51:65:ff:90:38:94:8d:
6e:6b:ca:b8:21:35:64:5b:d3:0e:a8:14:7b:e8:7a:
56:70:18:50:b0:f0:bf:80:61:7b:67:5f:da:b2:62:
15:96:fa:ce:fc:a6:11:28:57:5d:e6:46:cb:26:e4:
40:5b:76:e2:56:78:d3:4c:0b:ea:f8:11:77:35:6c:
1f:e3:68:8a:76:29:07:54:10:76:c2:d2:77:45:4f:
46:f8:b4:63:14:3f:99
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
99:8F:BC:FB:B4:DE:CC:0E:7D:A7:53:B2:A9:AB:B3:31:00:74:B2:3E
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:de:f3:63:b7:18:1b:95:ff:ad:5f:ec:09:46:
75:2e:e1:9b:6c:28:48:83:43:12:3d:f7:ed:85:ec:9d:a2:29:
c8:de:1c:4c:65:aa:b8:61:c2:03:6e:64:9e:ab:26:a1:10:02:
31:00:cb:01:78:3b:f1:13:66:17:16:3b:b4:10:35:09:70:48:
d4:b0:f8:35:94:7c:09:05:73:12:fc:77:bf:57:7a:49:8c:72:
69:75:31:d0:23:21:06:a8:97:44:c4:9b:2b:ce
31,090,377 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
31,238,678 UART:
31,239,046 UART: Running Caliptra ROM ...
31,240,252 UART:
31,240,427 UART: [state] CFI Enabled
31,259,410 UART: [state] LifecycleState = Production
31,261,239 UART: [state] DebugLocked = Yes
31,264,225 UART: [state] Starting the WD Timer 40000000 cycles
31,268,730 UART: [kat] SHA2-256
31,448,466 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
31,459,240 UART: [kat] ++
31,459,780 UART: [kat] sha1
31,470,946 UART: [kat] SHA2-256
31,473,642 UART: [kat] SHA2-384
31,479,091 UART: [kat] SHA2-512-ACC
31,481,439 UART: [kat] ECC-384
33,922,880 UART: [kat] HMAC-384Kdf
33,935,737 UART: [kat] LMS
34,412,219 UART: [kat] --
34,417,452 UART: [update-reset] ++
38,985,336 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,988,817 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
39,380,322 >>> mbox cmd response: success
39,380,858 UART: [update-reset] Copying MAN_2 To MAN_1
39,417,729 UART: [update-reset Success] --
39,421,195 UART: [state] Locking Datavault
39,425,859 UART: [state] Locking PCR0, PCR1 and PCR31
39,427,563 UART: [state] Locking ICCM
39,430,098 UART: [exit] Launching FMC @ 0x40000130
39,438,492 UART:
39,438,734 UART: Running Caliptra FMC ...
39,439,835 UART:
39,439,996 UART: [state] CFI Enabled
39,484,396 UART: [art] Extend RT PCRs Done
39,485,538 UART: [art] Lock RT PCRs Done
39,487,090 UART: [art] Populate DV Done
39,492,437 UART: [fht] FMC Alias Private Key: 7
39,493,959 UART: [art] Derive CDI
39,494,724 UART: [art] Store in slot 0x4
39,537,097 UART: [art] Derive Key Pair
39,538,100 UART: [art] Store priv key in slot 0x5
41,964,910 UART: [art] Derive Key Pair - Done
41,977,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,684,370 UART: [art] Erasing AUTHORITY.KEYID = 7
43,685,880 UART: [art] PUB.X = 27018B72B634FDBE334F2559017C1F77B1FF463A6C2E9ED57301D085EFAA5D184F3E4FDD6B2DB927536158E20D74D1BB
43,693,150 UART: [art] PUB.Y = 74211DD0D7D44E6D33B0A56B0DC6CDA5F7EB1AABA93B524E5094DDC021DBBC9FD7BA68BF168617FB509C28F8ABF28242
43,700,446 UART: [art] SIG.R = A6925FD8C66D2B59396F3AF9C16E3F9256DF8AF41AB5B2BA752A43B3D4E4B4EBCFCE702BF11A00732CCEA3103D3865DB
43,707,851 UART: [art] SIG.S = 1CCFE9475752437E7153A5FE720D495772F777B0149711A80654CA8356E78DAAD49B6157D4497BAB59BD40A54FBD7BCE
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
15:ff:0a:5e:d4:aa:3b:cc:2e:ba:0f:2c:0d:70:51:fe:f7:1c:d7:c5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=95FF0A5ED4AA3BCC2EBA0F2C0D7051FEF71CD7C5F6017C8D9BD083CE8F4F76FD
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:27:01:8b:72:b6:34:fd:be:33:4f:25:59:01:7c:
1f:77:b1:ff:46:3a:6c:2e:9e:d5:73:01:d0:85:ef:
aa:5d:18:4f:3e:4f:dd:6b:2d:b9:27:53:61:58:e2:
0d:74:d1:bb:74:21:1d:d0:d7:d4:4e:6d:33:b0:a5:
6b:0d:c6:cd:a5:f7:eb:1a:ab:a9:3b:52:4e:50:94:
dd:c0:21:db:bc:9f:d7:ba:68:bf:16:86:17:fb:50:
9c:28:f8:ab:f2:82:42
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
95:FF:0A:5E:D4:AA:3B:CC:2E:BA:0F:2C:0D:70:51:FE:F7:1C:D7:C5
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a6:92:5f:d8:c6:6d:2b:59:39:6f:3a:f9:c1:
6e:3f:92:56:df:8a:f4:1a:b5:b2:ba:75:2a:43:b3:d4:e4:b4:
eb:cf:ce:70:2b:f1:1a:00:73:2c:ce:a3:10:3d:38:65:db:02:
30:1c:cf:e9:47:57:52:43:7e:71:53:a5:fe:72:0d:49:57:72:
f7:77:b0:14:97:11:a8:06:54:ca:83:56:e7:8d:aa:d4:9b:61:
57:d4:49:7b:ab:59:bd:40:a5:4f:bd:7b:ce
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.39s
Truncated 2312 bytes from beginning
C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,472,876 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
27,908,059 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,295,954 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
55:5f:bf:18:04:4c:36:09:08:42:a0:a5:eb:8b:48:cc:f3:9f:fa:d8
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=555FBF18044C36090842A0A5EB8B48CCF39FFAD89EE414B2716A0E2BF5893B92
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b8:7e:c7:a0:2f:56:4d:e5:d5:bd:12:48:6f:15:
ac:55:aa:21:31:e5:4e:d7:45:aa:2b:06:8c:ce:ec:
be:f3:b1:af:a1:0f:40:00:69:29:59:04:2d:15:f8:
11:a6:37:b2:e3:90:1c:82:2b:85:8b:4f:ac:2e:f8:
95:2c:ee:de:ec:f0:2f:ee:25:69:cd:52:2c:9b:af:
a2:bd:07:43:10:97:da:71:0a:25:d1:6b:f2:80:6d:
0d:e4:89:39:50:a3:e0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
55:5F:BF:18:04:4C:36:09:08:42:A0:A5:EB:8B:48:CC:F3:9F:FA:D8
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:95:ff:4a:79:06:c5:90:07:ce:80:a4:94:87:
08:72:a6:7a:25:3b:1e:d6:19:55:73:7f:0d:82:a4:b7:7b:d0:
5f:b1:8e:f3:b0:7e:30:3d:f0:93:0f:37:ab:37:88:3f:de:02:
30:0d:4e:15:cb:15:f1:f9:4c:81:e1:7d:3a:37:55:b2:96:a2:
18:a7:30:b9:dc:8a:79:67:b0:a0:21:2b:9f:f9:68:2c:05:f9:
89:39:f2:73:fc:99:aa:81:6e:db:ee:14:5c
30,762,997 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
39,151,361 >>> mbox cmd response: success
39,184,457 UART:
39,184,763 UART: Running Caliptra FMC ...
39,185,897 UART:
39,186,045 UART: [state] CFI Enabled
39,230,365 UART: [art] Extend RT PCRs Done
39,231,546 UART: [art] Lock RT PCRs Done
39,232,753 UART: [art] Populate DV Done
39,238,320 UART: [fht] FMC Alias Private Key: 7
39,239,798 UART: [art] Derive CDI
39,240,532 UART: [art] Store in slot 0x4
39,283,526 UART: [art] Derive Key Pair
39,284,524 UART: [art] Store priv key in slot 0x5
41,711,625 UART: [art] Derive Key Pair - Done
41,724,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,430,822 UART: [art] Erasing AUTHORITY.KEYID = 7
43,432,324 UART: [art] PUB.X = 027D42FA41DE43AA5B11F3BD7805DBD63710F46BD9996F0A360FB898BE049A52B7B10747F1CD29D75B27B9EDC0314E5D
43,439,578 UART: [art] PUB.Y = A7909AF87C1DAAB40FA291FE91AB7F04034553B5B6466BEA3ACC92A1239775BCED6DC18246918FA4F8C39763557BC0A3
43,446,866 UART: [art] SIG.R = 6FAECD81E3CB538CB8AE8DD378CA35DD503C9F3BDD33C57E1E2AA82849D631C46953E74E202F65CE29DE89F9DE626674
43,454,260 UART: [art] SIG.S = B2A6E390FB547BCBB84FFFD0D0E18FD7DDADDCADA997793EEE07BCE801794D288CBD14E82A697F9A14D1BCF99BE7F487
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:ef:51:dd:f5:fb:36:db:34:49:51:ad:6d:1a:d1:45:59:e0:84:3a
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=C4EF51DDF5FB36DB344951AD6D1AD14559E0843A189B23EF53E12685169181A4
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:02:7d:42:fa:41:de:43:aa:5b:11:f3:bd:78:05:
db:d6:37:10:f4:6b:d9:99:6f:0a:36:0f:b8:98:be:
04:9a:52:b7:b1:07:47:f1:cd:29:d7:5b:27:b9:ed:
c0:31:4e:5d:a7:90:9a:f8:7c:1d:aa:b4:0f:a2:91:
fe:91:ab:7f:04:03:45:53:b5:b6:46:6b:ea:3a:cc:
92:a1:23:97:75:bc:ed:6d:c1:82:46:91:8f:a4:f8:
c3:97:63:55:7b:c0:a3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
C4:EF:51:DD:F5:FB:36:DB:34:49:51:AD:6D:1A:D1:45:59:E0:84:3A
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:6f:ae:cd:81:e3:cb:53:8c:b8:ae:8d:d3:78:ca:
35:dd:50:3c:9f:3b:dd:33:c5:7e:1e:2a:a8:28:49:d6:31:c4:
69:53:e7:4e:20:2f:65:ce:29:de:89:f9:de:62:66:74:02:31:
00:b2:a6:e3:90:fb:54:7b:cb:b8:4f:ff:d0:d0:e1:8f:d7:dd:
ad:dc:ad:a9:97:79:3e:ee:07:bc:e8:01:79:4d:28:8c:bd:14:
e8:2a:69:7f:9a:14:d1:bc:f9:9b:e7:f4:87
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.38s
Truncated 6762 bytes from beginning
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,201,595 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,634,071 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
29,021,590 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
36:36:d3:b3:60:74:b0:37:fa:27:6d:57:79:f7:d7:10:bd:72:34:6d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B636D3B36074B037FA276D5779F7D710BD72346D1E4A51AFE330B955BA9EDBC0
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:cc:7d:e6:77:c7:fa:29:9e:87:b7:14:7c:69:ec:
b4:86:64:e1:77:cb:be:33:8f:96:1e:70:66:42:73:
37:89:a8:91:ff:48:3a:80:0a:2f:ef:d1:52:8a:57:
95:5c:d2:7f:8c:d3:48:44:7b:cb:74:02:59:af:d4:
b7:b2:08:3e:5c:43:98:0e:eb:57:be:1b:41:16:60:
15:66:3e:38:59:f8:16:0e:2b:84:cf:cf:56:d0:3d:
e5:98:11:c6:aa:61:0d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
B6:36:D3:B3:60:74:B0:37:FA:27:6D:57:79:F7:D7:10:BD:72:34:6D
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:54:14:c9:1a:a0:fa:ac:25:56:55:01:54:5b:bb:
e7:4e:b5:2c:89:f7:7b:7f:ac:d6:78:08:d8:6f:d7:40:3e:3e:
18:03:8c:a1:fc:b4:ae:7d:09:74:21:be:b5:5f:50:0d:02:31:
00:85:7b:9e:ca:7f:92:16:18:23:c7:1e:de:54:cc:e9:62:18:
4c:07:9c:53:16:56:a3:24:dc:a6:60:a2:f4:80:27:2e:84:ac:
ce:54:94:2b:f8:10:e1:53:2b:a8:05:e5:1b
31,488,460 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
31,636,665 UART:
31,637,051 UART: Running Caliptra ROM ...
31,638,254 UART:
31,638,424 UART: [state] CFI Enabled
31,701,642 UART: [state] LifecycleState = Production
31,703,577 UART: [state] DebugLocked = Yes
31,706,025 UART: [state] Starting the WD Timer 40000000 cycles
31,711,571 UART: [kat] SHA2-256
31,901,411 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,912,174 UART: [kat] ++
31,912,686 UART: [kat] sha1
31,923,894 UART: [kat] SHA2-256
31,926,856 UART: [kat] SHA2-384
31,932,948 UART: [kat] SHA2-512-ACC
31,935,565 UART: [kat] ECC-384
34,382,149 UART: [kat] HMAC-384Kdf
34,407,417 UART: [kat] LMS
34,938,983 UART: [kat] --
34,942,614 UART: [update-reset] ++
39,645,843 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,649,120 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
40,268,346 >>> mbox cmd response: success
40,270,043 UART: [update-reset] Copying MAN_2 To MAN_1
40,307,637 UART: [update-reset Success] --
40,312,442 UART: [state] Locking Datavault
40,315,714 UART: [state] Locking PCR0, PCR1 and PCR31
40,317,854 UART: [state] Locking ICCM
40,320,818 UART: [exit] Launching FMC @ 0x40000130
40,329,494 UART:
40,329,725 UART: Running Caliptra FMC ...
40,330,824 UART:
40,330,999 UART: [state] CFI Enabled
40,433,724 UART: [art] Extend RT PCRs Done
40,434,905 UART: [art] Lock RT PCRs Done
40,436,249 UART: [art] Populate DV Done
40,441,864 UART: [fht] FMC Alias Private Key: 7
40,443,455 UART: [art] Derive CDI
40,444,268 UART: [art] Store in slot 0x4
40,502,629 UART: [art] Derive Key Pair
40,503,663 UART: [art] Store priv key in slot 0x5
42,966,340 UART: [art] Derive Key Pair - Done
42,979,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,692,130 UART: [art] Erasing AUTHORITY.KEYID = 7
44,693,637 UART: [art] PUB.X = E9064DCCE29BCD7CC1FA473A2C4D0E596056BFE93BB66461DB7FA47E92FD98868092796958E709377732F5B46AD8D22D
44,700,888 UART: [art] PUB.Y = B8CC79C0E0B50D6E45AC3346E14D1877583402AC1EFA23F7B310602995B6BD41B9B589209A6A54D25BB971253C60FF49
44,708,145 UART: [art] SIG.R = 4803D62C490DC02D5BCC8235ED372C592A2DDACC16C8B1F1E7E5A4CCBB0B95BF37731C72E5AFA27412C263E71B236561
44,715,542 UART: [art] SIG.S = EEEA1E827E3E5D6519291A3FA87B3AE610A3B007E9A9A88215FF51608C6ED99EA5AF2FCE607AE01F0541D9DD32033BF2
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0f:aa:08:18:da:cf:74:0f:76:11:49:4f:7b:12:f9:1a:0c:2c:e0:c4
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0BAA0818DACF740F7611494F7B12F91A0C2CE0C4CA01DF512D3C82CEDCFD752C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e9:06:4d:cc:e2:9b:cd:7c:c1:fa:47:3a:2c:4d:
0e:59:60:56:bf:e9:3b:b6:64:61:db:7f:a4:7e:92:
fd:98:86:80:92:79:69:58:e7:09:37:77:32:f5:b4:
6a:d8:d2:2d:b8:cc:79:c0:e0:b5:0d:6e:45:ac:33:
46:e1:4d:18:77:58:34:02:ac:1e:fa:23:f7:b3:10:
60:29:95:b6:bd:41:b9:b5:89:20:9a:6a:54:d2:5b:
b9:71:25:3c:60:ff:49
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
0B:AA:08:18:DA:CF:74:0F:76:11:49:4F:7B:12:F9:1A:0C:2C:E0:C4
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:48:03:d6:2c:49:0d:c0:2d:5b:cc:82:35:ed:37:
2c:59:2a:2d:da:cc:16:c8:b1:f1:e7:e5:a4:cc:bb:0b:95:bf:
37:73:1c:72:e5:af:a2:74:12:c2:63:e7:1b:23:65:61:02:31:
00:ee:ea:1e:82:7e:3e:5d:65:19:29:1a:3f:a8:7b:3a:e6:10:
a3:b0:07:e9:a9:a8:82:15:ff:51:60:8c:6e:d9:9e:a5:af:2f:
ce:60:7a:e0:1f:05:41:d9:dd:32:03:3b:f2
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.44s
Truncated 2315 bytes from beginning
058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,039,877 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,473,187 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,860,332 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
07:29:ed:7d:e5:86:a7:1e:9a:18:fd:62:53:a4:11:b0:e4:19:1d:ac
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8329ED7DE586A71E9A18FD6253A411B0E4191DACC6AC262DC7A680A84DBAE348
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:be:3a:f4:ca:d9:48:3a:9a:26:70:55:aa:f6:44:
41:15:20:3f:e8:cc:95:99:14:b2:44:58:f3:23:d4:
f2:65:e5:58:15:1f:07:8d:c4:ce:fe:96:97:3a:ed:
fa:03:a4:ec:e3:35:98:2e:c5:b6:8c:0c:16:9f:9b:
b5:92:00:fd:ca:24:a2:4f:96:41:bc:8f:9b:68:16:
e6:c3:30:45:c5:10:8a:0f:d6:91:83:00:77:4b:fd:
88:a5:c7:7c:e8:58:48
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
83:29:ED:7D:E5:86:A7:1E:9A:18:FD:62:53:A4:11:B0:E4:19:1D:AC
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d9:6d:c3:6b:ec:b9:e1:34:aa:b5:fd:24:6b:
9e:00:ca:8b:3c:f3:2b:a9:6f:b1:f3:91:7d:ad:ac:c7:4f:b6:
cf:5d:ea:4a:37:12:77:26:24:6f:f7:41:b9:e9:59:6f:7e:02:
30:34:6f:df:17:f6:64:10:52:e9:68:af:92:22:bb:63:c4:5c:
bf:d6:c5:98:d2:a5:f2:37:52:b8:64:f0:f1:e6:6d:bf:11:f9:
7f:bc:9c:7f:83:38:e5:7f:dd:ce:14:d3:80
31,341,695 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
40,345,705 >>> mbox cmd response: success
40,380,931 UART:
40,381,240 UART: Running Caliptra FMC ...
40,382,368 UART:
40,382,516 UART: [state] CFI Enabled
40,486,432 UART: [art] Extend RT PCRs Done
40,487,631 UART: [art] Lock RT PCRs Done
40,489,181 UART: [art] Populate DV Done
40,494,610 UART: [fht] FMC Alias Private Key: 7
40,496,359 UART: [art] Derive CDI
40,497,093 UART: [art] Store in slot 0x4
40,555,294 UART: [art] Derive Key Pair
40,556,292 UART: [art] Store priv key in slot 0x5
43,018,595 UART: [art] Derive Key Pair - Done
43,031,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,758,272 UART: [art] Erasing AUTHORITY.KEYID = 7
44,759,786 UART: [art] PUB.X = C78415E18DE3D903862F02190712BF290A4074A6F8EDB4E322D7A97500796EF46B08C48A695A6BA385D2C4D0F602A766
44,766,980 UART: [art] PUB.Y = 9300F7BB788624D6BDCA44596D59E866542D83B05612A23049555DD7EF7203D5ACBD7807284DA5F2CD9307E6A1547E17
44,774,212 UART: [art] SIG.R = C8440516B362B0CCAD803885DD4952D4D8229588F18636BD776DD382BB37B8C8EBDC2B06A02C84EB560CAF33B11BA359
44,781,603 UART: [art] SIG.S = E3A215C7A9CE2085E7E1FFF6F453984A9043D7E9E63AB9FC09C865D6CCE5225F254287A76F0A485A581842B581766063
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
75:7f:a7:ee:7a:72:29:ed:25:b2:30:71:b7:2d:56:2a:cc:69:65:e4
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F17FA7EE7A7229ED25B23071B72D562ACC6965E4698E9187FAE866BF24AAC845
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c7:84:15:e1:8d:e3:d9:03:86:2f:02:19:07:12:
bf:29:0a:40:74:a6:f8:ed:b4:e3:22:d7:a9:75:00:
79:6e:f4:6b:08:c4:8a:69:5a:6b:a3:85:d2:c4:d0:
f6:02:a7:66:93:00:f7:bb:78:86:24:d6:bd:ca:44:
59:6d:59:e8:66:54:2d:83:b0:56:12:a2:30:49:55:
5d:d7:ef:72:03:d5:ac:bd:78:07:28:4d:a5:f2:cd:
93:07:e6:a1:54:7e:17
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
F1:7F:A7:EE:7A:72:29:ED:25:B2:30:71:B7:2D:56:2A:CC:69:65:E4
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:c8:44:05:16:b3:62:b0:cc:ad:80:38:85:dd:
49:52:d4:d8:22:95:88:f1:86:36:bd:77:6d:d3:82:bb:37:b8:
c8:eb:dc:2b:06:a0:2c:84:eb:56:0c:af:33:b1:1b:a3:59:02:
31:00:e3:a2:15:c7:a9:ce:20:85:e7:e1:ff:f6:f4:53:98:4a:
90:43:d7:e9:e6:3a:b9:fc:09:c8:65:d6:cc:e5:22:5f:25:42:
87:a7:6f:0a:48:5a:58:18:42:b5:81:76:60:63
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.44s
Truncated 6765 bytes from beginning
....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,291,552 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,726,068 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
29,115,731 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
35:d3:4a:bb:c5:b1:54:3e:0e:10:66:7e:d9:81:9a:06:87:b8:82:92
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=35D34ABBC5B1543E0E10667ED9819A0687B88292C32BF6C377C9FF8B5CE071A8
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:bb:fa:7c:9e:9a:ff:61:fa:0e:15:19:24:d6:b3:
c0:f0:a3:2e:b1:61:ea:bc:40:63:3d:4c:d9:5d:5a:
cb:0f:4a:53:36:f1:59:56:d8:5f:d3:ff:a8:3a:0b:
b8:a0:02:40:91:06:72:4f:53:86:26:71:87:b2:0e:
82:df:f6:ef:cf:fa:1e:7d:92:76:77:82:ab:c1:85:
e6:83:ae:c0:a9:0e:a6:9a:38:b8:df:58:ce:4f:c5:
5f:49:2c:9e:22:8e:d8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
35:D3:4A:BB:C5:B1:54:3E:0E:10:66:7E:D9:81:9A:06:87:B8:82:92
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:ff:04:8a:cf:d3:58:08:6e:c9:1c:46:96:4e:
54:5c:d6:1f:f0:ec:47:8c:6e:9b:97:39:43:71:69:2b:55:e3:
8a:5d:51:ca:d5:89:e9:33:77:9e:b3:61:a1:32:57:63:30:02:
31:00:89:e3:56:48:2c:f5:90:12:4c:e9:2c:5c:13:ee:7c:56:
6e:dd:e9:51:3b:06:0c:33:be:72:26:34:9b:23:de:07:1f:1c:
84:fb:ed:4c:66:c4:5f:38:cf:ea:d3:30:74:85
31,583,815 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
31,732,092 UART:
31,732,454 UART: Running Caliptra ROM ...
31,733,647 UART:
31,733,819 UART: [state] CFI Enabled
31,748,141 UART: [state] LifecycleState = Production
31,749,876 UART: [state] DebugLocked = Yes
31,751,837 UART: [state] Starting the WD Timer 40000000 cycles
31,757,815 UART: [kat] SHA2-256
31,947,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,958,594 UART: [kat] ++
31,959,130 UART: [kat] sha1
31,970,182 UART: [kat] SHA2-256
31,973,145 UART: [kat] SHA2-384
31,979,892 UART: [kat] SHA2-512-ACC
31,982,467 UART: [kat] ECC-384
34,425,498 UART: [kat] HMAC-384Kdf
34,438,665 UART: [kat] LMS
34,970,261 UART: [kat] --
34,975,823 UART: [update-reset] ++
39,670,666 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,673,941 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
40,293,210 >>> mbox cmd response: success
40,294,320 UART: [update-reset] Copying MAN_2 To MAN_1
40,331,896 UART: [update-reset Success] --
40,335,434 UART: [state] Locking Datavault
40,340,255 UART: [state] Locking PCR0, PCR1 and PCR31
40,342,480 UART: [state] Locking ICCM
40,344,512 UART: [exit] Launching FMC @ 0x40000130
40,353,182 UART:
40,353,411 UART: Running Caliptra FMC ...
40,354,444 UART:
40,354,591 UART: [state] CFI Enabled
40,398,654 UART: [art] Extend RT PCRs Done
40,399,797 UART: [art] Lock RT PCRs Done
40,401,161 UART: [art] Populate DV Done
40,406,778 UART: [fht] FMC Alias Private Key: 7
40,408,261 UART: [art] Derive CDI
40,408,998 UART: [art] Store in slot 0x4
40,452,053 UART: [art] Derive Key Pair
40,453,090 UART: [art] Store priv key in slot 0x5
42,879,559 UART: [art] Derive Key Pair - Done
42,892,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,598,790 UART: [art] Erasing AUTHORITY.KEYID = 7
44,600,303 UART: [art] PUB.X = 2F88FA4A1E9E0A4AE6BE8B73D4CA2FB5C5C9259B2951A23F3FFC64475E75FC367D8CCAB48801938E08CA9513E4EE0E90
44,607,608 UART: [art] PUB.Y = B7A5EC372FB37DF06AA65E14665EF16359C01C0C8430EC2CECF39289838ABABFE9E743646437F00D0783C764BF169BC3
44,614,850 UART: [art] SIG.R = F69BBDD1067C20BD31DBB7143882DE42DE23EAFDE0EFD15D19A8A88F532FAAB3BC2D2EB85A4AC6DB32ACE1A3DEBB6778
44,622,296 UART: [art] SIG.S = 05E83CD3B7B5E2D5E649544C408FC4D3C47056B372C6961D30A68EA32F182B8829997C749EE28FCA41C3AB2443C7528F
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
57:22:62:8b:3e:07:90:03:ae:7e:8c:51:59:4d:d5:a1:41:d3:0e:a5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D322628B3E079003AE7E8C51594DD5A141D30EA500F91AA6CCA4F9619E8BDFB2
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2f:88:fa:4a:1e:9e:0a:4a:e6:be:8b:73:d4:ca:
2f:b5:c5:c9:25:9b:29:51:a2:3f:3f:fc:64:47:5e:
75:fc:36:7d:8c:ca:b4:88:01:93:8e:08:ca:95:13:
e4:ee:0e:90:b7:a5:ec:37:2f:b3:7d:f0:6a:a6:5e:
14:66:5e:f1:63:59:c0:1c:0c:84:30:ec:2c:ec:f3:
92:89:83:8a:ba:bf:e9:e7:43:64:64:37:f0:0d:07:
83:c7:64:bf:16:9b:c3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
D3:22:62:8B:3E:07:90:03:AE:7E:8C:51:59:4D:D5:A1:41:D3:0E:A5
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:f6:9b:bd:d1:06:7c:20:bd:31:db:b7:14:38:
82:de:42:de:23:ea:fd:e0:ef:d1:5d:19:a8:a8:8f:53:2f:aa:
b3:bc:2d:2e:b8:5a:4a:c6:db:32:ac:e1:a3:de:bb:67:78:02:
30:05:e8:3c:d3:b7:b5:e2:d5:e6:49:54:4c:40:8f:c4:d3:c4:
70:56:b3:72:c6:96:1d:30:a6:8e:a3:2f:18:2b:88:29:99:7c:
74:9e:e2:8f:ca:41:c3:ab:24:43:c7:52:8f
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.43s
Truncated 2315 bytes from beginning
058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,071,249 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,504,791 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,892,454 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
35:b3:2b:6b:ba:f5:b7:3d:be:bf:57:9c:f5:d9:14:9d:7c:c6:8c:a5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B1B32B6BBAF5B73DBEBF579CF5D9149D7CC68CA5E00E1B8D5FA1A63A0BA6E580
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:29:b6:47:10:f7:04:61:bf:6b:3c:98:ca:19:
ba:e9:af:91:2f:b8:e6:d0:0b:06:47:35:cd:18:06:
31:48:fe:12:76:c4:7a:69:cc:d2:55:3c:23:f0:fa:
be:e9:ea:09:da:e9:b3:1a:24:80:58:06:93:c3:15:
c3:d3:6b:9e:dd:99:cd:24:49:0d:0a:14:0c:db:59:
56:c9:c2:3f:6f:cf:3d:51:e4:aa:bf:38:ac:22:97:
28:f4:c7:af:bc:fb:0b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
B1:B3:2B:6B:BA:F5:B7:3D:BE:BF:57:9C:F5:D9:14:9D:7C:C6:8C:A5
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:e7:69:16:1f:12:9c:ab:ac:01:30:3f:d8:9a:
d9:92:2d:3f:1e:07:55:df:a9:8a:b0:42:1c:00:52:40:07:d6:
39:7c:1a:1e:91:db:26:fe:2e:73:10:ff:53:a8:d1:3f:e1:02:
31:00:c9:db:d0:56:59:1f:94:f0:20:1f:97:8d:39:d9:47:b9:
82:8b:a5:a8:96:0d:7c:fc:60:c5:eb:10:12:4d:a8:c3:72:b8:
01:99:3c:73:de:54:c5:72:2f:75:7c:ab:bd:b7
31,364,785 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
40,294,761 >>> mbox cmd response: success
40,328,907 UART:
40,329,255 UART: Running Caliptra FMC ...
40,330,405 UART:
40,330,556 UART: [state] CFI Enabled
40,374,775 UART: [art] Extend RT PCRs Done
40,375,929 UART: [art] Lock RT PCRs Done
40,377,521 UART: [art] Populate DV Done
40,382,924 UART: [fht] FMC Alias Private Key: 7
40,384,510 UART: [art] Derive CDI
40,385,244 UART: [art] Store in slot 0x4
40,428,331 UART: [art] Derive Key Pair
40,429,375 UART: [art] Store priv key in slot 0x5
42,856,028 UART: [art] Derive Key Pair - Done
42,869,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,575,619 UART: [art] Erasing AUTHORITY.KEYID = 7
44,577,122 UART: [art] PUB.X = 64750D5DD28AF739D0F05035E61FBE5EC19544B0D0118144E572EEFBD59D05DE7935C476A84625066D92F1DF01A60A8F
44,584,443 UART: [art] PUB.Y = 93343B0E5AFFB7E7AF4E71BBABEA121EF7524DE80B1B25C20EBBA6372CBF60175CE3337254BEB2E6C06CA24CF61597A3
44,591,732 UART: [art] SIG.R = EF11ECBEC919B1D6A0E1BCE76948944AC6487DF5B289E1D7F6ED8F5AAFC113C6D37FEEAB88ED198B93E0F062E04E58DD
44,599,110 UART: [art] SIG.S = 0DE54408FC09E1C0F5C2504693E5225A3B00068CDD1FD02C3E7125996C8A251A6BFBAF71B151D0E0517495A8F6F22744
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3c:66:82:aa:8c:ee:5b:f6:f1:8f:88:35:31:82:4c:c5:9b:be:61:89
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=386682AA8CEE5BF6F18F883531824CC59BBE6189307E7B88313EB861BCDB6F1F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:64:75:0d:5d:d2:8a:f7:39:d0:f0:50:35:e6:1f:
be:5e:c1:95:44:b0:d0:11:81:44:e5:72:ee:fb:d5:
9d:05:de:79:35:c4:76:a8:46:25:06:6d:92:f1:df:
01:a6:0a:8f:93:34:3b:0e:5a:ff:b7:e7:af:4e:71:
bb:ab:ea:12:1e:f7:52:4d:e8:0b:1b:25:c2:0e:bb:
a6:37:2c:bf:60:17:5c:e3:33:72:54:be:b2:e6:c0:
6c:a2:4c:f6:15:97:a3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
38:66:82:AA:8C:EE:5B:F6:F1:8F:88:35:31:82:4C:C5:9B:BE:61:89
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:ef:11:ec:be:c9:19:b1:d6:a0:e1:bc:e7:69:
48:94:4a:c6:48:7d:f5:b2:89:e1:d7:f6:ed:8f:5a:af:c1:13:
c6:d3:7f:ee:ab:88:ed:19:8b:93:e0:f0:62:e0:4e:58:dd:02:
30:0d:e5:44:08:fc:09:e1:c0:f5:c2:50:46:93:e5:22:5a:3b:
00:06:8c:dd:1f:d0:2c:3e:71:25:99:6c:8a:25:1a:6b:fb:af:
71:b1:51:d0:e0:51:74:95:a8:f6:f2:27:44
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.43s
Truncated 7237 bytes from beginning
c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,025,617 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,067,235 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,106,274 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3d:cb:02:17:27:69:32:be:1d:89:d6:91:5f:da:2e:f8:65:9f:78:e0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=BDCB0217276932BE1D89D6915FDA2EF8659F78E0AEC6BC5120F444B1E816F1D3
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:63:42:5a:22:eb:f6:8f:bc:e0:d2:84:56:3f:90:
72:95:f7:23:37:f7:15:53:15:36:f6:83:0a:fb:48:
1a:a4:54:80:af:fc:09:ec:59:2b:60:13:ba:fd:c9:
18:e4:68:d9:20:34:fa:c7:5c:0a:f9:0b:c6:a0:90:
22:08:16:68:25:13:41:85:50:e4:6d:8f:6f:77:da:
22:95:3c:33:8b:49:61:8d:00:cc:63:57:02:f0:10:
f8:50:0a:ca:bf:89:d6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
BD:CB:02:17:27:69:32:BE:1D:89:D6:91:5F:DA:2E:F8:65:9F:78:E0
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d0:3a:31:ac:6c:f1:04:35:99:bd:1b:63:4c:
87:c9:93:b6:6a:1a:a6:c9:03:89:0b:1c:9e:29:39:79:21:97:
39:bd:33:07:ce:c0:cf:e7:d1:33:79:b3:be:c4:92:27:3d:02:
30:6c:cc:85:fc:f1:3b:26:2c:ad:7c:f2:20:8c:80:61:74:f4:
5a:dd:71:ec:66:56:39:aa:55:fb:00:ea:1e:cb:db:e3:b9:0b:
61:27:92:bc:a0:eb:de:f8:a7:c7:76:5c:76
6,117,073 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,117,966 UART:
6,117,982 UART: Running Caliptra ROM ...
6,118,390 UART:
6,118,444 UART: [state] CFI Enabled
6,121,681 UART: [state] LifecycleState = Production
6,122,289 UART: [state] DebugLocked = Yes
6,123,011 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,124,664 UART: [kat] SHA2-256
6,918,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,922,710 UART: [kat] ++
6,922,862 UART: [kat] sha1
6,927,168 UART: [kat] SHA2-256
6,929,106 UART: [kat] SHA2-384
6,931,883 UART: [kat] SHA2-512-ACC
6,933,783 UART: [kat] ECC-384
6,938,932 UART: [kat] HMAC-384Kdf
6,943,482 UART: [kat] LMS
7,511,678 UART: [kat] --
7,512,443 UART: [update-reset] ++
11,287,797 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,289,037 UART: [update-reset] Loading Runtime at address 0x40005000 len 90872
11,441,682 >>> mbox cmd response: success
11,442,016 UART: [update-reset] Copying MAN_2 To MAN_1
11,450,028 UART: [update-reset Success] --
11,451,259 UART: [state] Locking Datavault
11,452,173 UART: [state] Locking PCR0, PCR1 and PCR31
11,452,777 UART: [state] Locking ICCM
11,453,379 UART: [exit] Launching FMC @ 0x40000130
11,458,709 UART:
11,458,725 UART: Running Caliptra FMC ...
11,459,133 UART:
11,459,187 UART: [state] CFI Enabled
11,548,300 UART: [art] Extend RT PCRs Done
11,548,728 UART: [art] Lock RT PCRs Done
11,549,799 UART: [art] Populate DV Done
11,558,037 UART: [fht] FMC Alias Private Key: 7
11,559,031 UART: [art] Derive CDI
11,559,311 UART: [art] Store in slot 0x4
11,645,187 UART: [art] Derive Key Pair
11,645,547 UART: [art] Store priv key in slot 0x5
11,658,924 UART: [art] Derive Key Pair - Done
11,674,275 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,689,576 UART: [art] Erasing AUTHORITY.KEYID = 7
11,690,341 UART: [art] PUB.X = 86B0FE9CFA2E2E38E60B0734A34176097A469AE9E23C5960DC0601C2927F3FB4F536F1C0857C905E764FA628EFCE8265
11,697,100 UART: [art] PUB.Y = 69CB551530917D4BAAA4D55ABD9D0CA84B9060737D113D980DB93BCBEA4989379084D214CB047EC4A6B4DEDD84401A0D
11,704,050 UART: [art] SIG.R = 63C979FFD30337460320722A74CEF5F31C398042751D01D711AAEC3EF09567F8DE8618CB1D60AFF00513101859775D48
11,710,802 UART: [art] SIG.S = 71C14F88FE8438AC6C299B1F5182E7B47D8458683898635BE2F6474C3324815AAC09D779C0DC1679615D0B768C0F3E45
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
67:1e:fb:76:74:93:08:c0:5c:24:30:03:3f:50:5d:f5:c5:25:58:01
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=E71EFB76749308C05C2430033F505DF5C5255801EB739E5ABF8194D3915F6EDF
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:86:b0:fe:9c:fa:2e:2e:38:e6:0b:07:34:a3:41:
76:09:7a:46:9a:e9:e2:3c:59:60:dc:06:01:c2:92:
7f:3f:b4:f5:36:f1:c0:85:7c:90:5e:76:4f:a6:28:
ef:ce:82:65:69:cb:55:15:30:91:7d:4b:aa:a4:d5:
5a:bd:9d:0c:a8:4b:90:60:73:7d:11:3d:98:0d:b9:
3b:cb:ea:49:89:37:90:84:d2:14:cb:04:7e:c4:a6:
b4:de:dd:84:40:1a:0d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
E7:1E:FB:76:74:93:08:C0:5C:24:30:03:3F:50:5D:F5:C5:25:58:01
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:63:c9:79:ff:d3:03:37:46:03:20:72:2a:74:ce:
f5:f3:1c:39:80:42:75:1d:01:d7:11:aa:ec:3e:f0:95:67:f8:
de:86:18:cb:1d:60:af:f0:05:13:10:18:59:77:5d:48:02:30:
71:c1:4f:88:fe:84:38:ac:6c:29:9b:1f:51:82:e7:b4:7d:84:
58:68:38:98:63:5b:e2:f6:47:4c:33:24:81:5a:ac:09:d7:79:
c0:dc:16:79:61:5d:0b:76:8c:0f:3e:45
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.05s
Truncated 2720 bytes from beginning
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,846,336 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,888,004 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,927,063 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
35:81:28:f1:11:ce:32:0c:a3:2e:b1:7b:aa:f8:6c:ea:e7:02:9b:a9
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B58128F111CE320CA32EB17BAAF86CEAE7029BA96AB58DB9DA2DAA3B112C7F60
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b6:d8:c2:29:bb:58:88:a6:20:15:af:26:34:e9:
a3:2d:60:ce:1c:58:38:fb:2f:9e:0b:be:bc:4f:0c:
fb:15:b7:9f:8a:35:36:89:f9:cc:a4:2c:a4:9f:59:
bb:6b:72:28:80:aa:43:df:87:17:28:1d:98:fd:b5:
d4:9e:e8:17:ee:21:d5:41:08:97:a3:f2:82:e1:9a:
5b:52:fa:e1:64:bd:c0:b7:10:20:85:aa:ee:23:0f:
b1:d3:7c:39:24:84:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
B5:81:28:F1:11:CE:32:0C:A3:2E:B1:7B:AA:F8:6C:EA:E7:02:9B:A9
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:96:ac:b0:76:e4:6a:c5:c3:56:41:dc:68:02:
27:09:8f:56:a5:5a:66:17:13:70:48:c4:71:4a:4e:af:27:c4:
df:91:84:62:10:a1:a4:1d:e0:f4:d9:b8:1d:e7:a3:51:cd:02:
30:33:25:0a:06:74:ed:2a:e6:4b:1d:ad:85:26:7a:da:c2:c5:
e2:0d:ae:f9:99:56:b5:4a:d2:4e:60:6f:8b:a6:3c:f5:1e:50:
6b:7b:30:b2:73:c6:05:00:13:76:6d:47:84
5,937,906 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,878,114 >>> mbox cmd response: success
10,891,563 UART:
10,891,579 UART: Running Caliptra FMC ...
10,891,987 UART:
10,892,041 UART: [state] CFI Enabled
10,980,952 UART: [art] Extend RT PCRs Done
10,981,380 UART: [art] Lock RT PCRs Done
10,982,995 UART: [art] Populate DV Done
10,991,303 UART: [fht] FMC Alias Private Key: 7
10,992,305 UART: [art] Derive CDI
10,992,585 UART: [art] Store in slot 0x4
11,078,147 UART: [art] Derive Key Pair
11,078,507 UART: [art] Store priv key in slot 0x5
11,091,640 UART: [art] Derive Key Pair - Done
11,106,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,121,792 UART: [art] Erasing AUTHORITY.KEYID = 7
11,122,557 UART: [art] PUB.X = 62CCAA39ADD38A31A9A07E9AEB76E764CC398E2044B7FC61D93291B20D5DE304F11317F4F6785A7B2BBF93FDADBEBA77
11,129,343 UART: [art] PUB.Y = DE1DACAF826B2E84EC9A103AFA2CB183A62D3222C9EB1190C8EA03D3C5CA03F86F519594BDB52CC13BC6E3936610523D
11,136,305 UART: [art] SIG.R = BAECE51CC0EBC10EB4F82D06C215AEE19D92938CB02FC4E107D26562E7F7EE77E8D2E02DA550D4EF3C6CE3D0694D29A7
11,143,090 UART: [art] SIG.S = 3FBBB44935C364D9A691E12B217193625A4B6337D53A817C805D954D7D7EA265CE266893770D5736E1C0472741BFF69C
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
05:34:bb:5e:ff:eb:86:76:19:a6:da:cb:e8:20:6c:25:5b:35:42:2b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8534BB5EFFEB867619A6DACBE8206C255B35422BBE918D9A4543D0E4251ADF88
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:62:cc:aa:39:ad:d3:8a:31:a9:a0:7e:9a:eb:76:
e7:64:cc:39:8e:20:44:b7:fc:61:d9:32:91:b2:0d:
5d:e3:04:f1:13:17:f4:f6:78:5a:7b:2b:bf:93:fd:
ad:be:ba:77:de:1d:ac:af:82:6b:2e:84:ec:9a:10:
3a:fa:2c:b1:83:a6:2d:32:22:c9:eb:11:90:c8:ea:
03:d3:c5:ca:03:f8:6f:51:95:94:bd:b5:2c:c1:3b:
c6:e3:93:66:10:52:3d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
85:34:BB:5E:FF:EB:86:76:19:A6:DA:CB:E8:20:6C:25:5B:35:42:2B
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:ba:ec:e5:1c:c0:eb:c1:0e:b4:f8:2d:06:c2:
15:ae:e1:9d:92:93:8c:b0:2f:c4:e1:07:d2:65:62:e7:f7:ee:
77:e8:d2:e0:2d:a5:50:d4:ef:3c:6c:e3:d0:69:4d:29:a7:02:
30:3f:bb:b4:49:35:c3:64:d9:a6:91:e1:2b:21:71:93:62:5a:
4b:63:37:d5:3a:81:7c:80:5d:95:4d:7d:7e:a2:65:ce:26:68:
93:77:0d:57:36:e1:c0:47:27:41:bf:f6:9c
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.09s
Truncated 7237 bytes from beginning
c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,948,538 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,990,170 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,029,409 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2e:34:5e:49:e5:31:c9:7c:84:5c:b3:fa:49:83:02:8b:32:48:47:28
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=2A345E49E531C97C845CB3FA4983028B32484728FCD676885E4459E7BBC26280
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:bd:e9:3c:d0:3e:60:d0:fa:db:06:57:94:30:28:
b4:42:77:e1:a0:83:bb:d0:0a:58:ad:09:d4:29:b3:
61:b4:ce:79:2d:4c:2e:b1:16:67:5b:77:e4:0d:75:
ac:f1:a2:da:56:fa:98:38:df:27:f2:d2:bb:17:c3:
fc:9d:86:8c:1a:da:c9:bf:a8:af:a1:b9:3d:ad:d8:
d2:61:c8:05:76:a1:89:8e:9f:7b:b6:81:a6:4b:2d:
51:b6:05:5e:9e:48:cd
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
2A:34:5E:49:E5:31:C9:7C:84:5C:B3:FA:49:83:02:8B:32:48:47:28
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7e:1d:c3:b2:e4:ac:41:3c:62:18:d3:3d:19:30:
f8:fa:cc:7f:e1:88:fb:c4:90:a9:d7:4b:e2:3d:6e:d8:a6:e9:
18:f6:03:37:7c:26:5e:49:ba:87:87:4e:84:f0:89:16:02:30:
0f:89:47:a9:66:6b:42:87:4f:56:fe:7b:cb:a7:c2:12:7d:41:
e8:b1:cd:a9:c5:75:b4:d0:c2:c7:2b:51:65:90:f6:b6:c2:7b:
21:92:c8:6a:88:dc:69:9f:0b:db:1d:f8
6,040,182 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,040,827 UART:
6,040,843 UART: Running Caliptra ROM ...
6,041,251 UART:
6,041,392 UART: [state] CFI Enabled
6,044,721 UART: [state] LifecycleState = Production
6,045,329 UART: [state] DebugLocked = Yes
6,046,065 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,047,872 UART: [kat] SHA2-256
6,841,803 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,845,918 UART: [kat] ++
6,846,070 UART: [kat] sha1
6,850,434 UART: [kat] SHA2-256
6,852,372 UART: [kat] SHA2-384
6,854,955 UART: [kat] SHA2-512-ACC
6,856,855 UART: [kat] ECC-384
6,862,498 UART: [kat] HMAC-384Kdf
6,867,072 UART: [kat] LMS
7,435,268 UART: [kat] --
7,436,063 UART: [update-reset] ++
11,058,239 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,059,479 UART: [update-reset] Loading Runtime at address 0x40005000 len 90872
11,212,124 >>> mbox cmd response: success
11,212,336 UART: [update-reset] Copying MAN_2 To MAN_1
11,220,348 UART: [update-reset Success] --
11,221,417 UART: [state] Locking Datavault
11,222,339 UART: [state] Locking PCR0, PCR1 and PCR31
11,222,943 UART: [state] Locking ICCM
11,223,425 UART: [exit] Launching FMC @ 0x40000130
11,228,755 UART:
11,228,771 UART: Running Caliptra FMC ...
11,229,179 UART:
11,229,322 UART: [state] CFI Enabled
11,318,109 UART: [art] Extend RT PCRs Done
11,318,537 UART: [art] Lock RT PCRs Done
11,320,064 UART: [art] Populate DV Done
11,328,026 UART: [fht] FMC Alias Private Key: 7
11,328,970 UART: [art] Derive CDI
11,329,250 UART: [art] Store in slot 0x4
11,415,132 UART: [art] Derive Key Pair
11,415,492 UART: [art] Store priv key in slot 0x5
11,428,831 UART: [art] Derive Key Pair - Done
11,443,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,459,428 UART: [art] Erasing AUTHORITY.KEYID = 7
11,460,193 UART: [art] PUB.X = 9DD550441C7636177061952369352C7E12B5B068E8BFED99591DF386C96601B4BDC4A4AC739D3954C37176463756EA50
11,466,950 UART: [art] PUB.Y = 75C4404AE51F5A344FEDC8004F3CE7952ABD31451F540C686DBBD49FFEB76FB68E8D9911AEB12883CE78964AC58CD7F3
11,473,891 UART: [art] SIG.R = 68E6B25FFBF7A0093BB25B8AE6BDD151BC03E0FE55F6506FC587D6964BA9DC178C86CB6A9574AB44F8DEBCDED88AEDCB
11,480,687 UART: [art] SIG.S = F244866BEEB1F555557E0B161AD6B6E6388A09D27BF410726635F20126EA8E473B33E412739EDECB030A4BC048947794
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
75:d8:52:91:10:a8:f6:a2:67:44:7c:6a:bf:d1:7c:54:00:9b:b8:7e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F1D8529110A8F6A267447C6ABFD17C54009BB87E5020E25DAC90F8CB24060ECD
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:9d:d5:50:44:1c:76:36:17:70:61:95:23:69:35:
2c:7e:12:b5:b0:68:e8:bf:ed:99:59:1d:f3:86:c9:
66:01:b4:bd:c4:a4:ac:73:9d:39:54:c3:71:76:46:
37:56:ea:50:75:c4:40:4a:e5:1f:5a:34:4f:ed:c8:
00:4f:3c:e7:95:2a:bd:31:45:1f:54:0c:68:6d:bb:
d4:9f:fe:b7:6f:b6:8e:8d:99:11:ae:b1:28:83:ce:
78:96:4a:c5:8c:d7:f3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
F1:D8:52:91:10:A8:F6:A2:67:44:7C:6A:BF:D1:7C:54:00:9B:B8:7E
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:68:e6:b2:5f:fb:f7:a0:09:3b:b2:5b:8a:e6:bd:
d1:51:bc:03:e0:fe:55:f6:50:6f:c5:87:d6:96:4b:a9:dc:17:
8c:86:cb:6a:95:74:ab:44:f8:de:bc:de:d8:8a:ed:cb:02:31:
00:f2:44:86:6b:ee:b1:f5:55:55:7e:0b:16:1a:d6:b6:e6:38:
8a:09:d2:7b:f4:10:72:66:35:f2:01:26:ea:8e:47:3b:33:e4:
12:73:9e:de:cb:03:0a:4b:c0:48:94:77:94
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.04s
Truncated 2717 bytes from beginning
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,960,622 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,002,242 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,041,585 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6e:67:1c:a8:5f:1d:ad:02:3c:53:f1:09:9a:a5:56:dc:e1:9f:75:a8
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6A671CA85F1DAD023C53F1099AA556DCE19F75A8380086FBC2FEECC69BC378DC
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2f:0a:83:3b:e1:4b:cc:cd:58:0d:84:54:63:1b:
39:f2:82:37:0c:63:66:bf:21:07:f4:8c:19:7d:ec:
c8:e4:80:10:24:68:9f:5c:78:98:86:01:c3:28:02:
b2:f9:68:e0:07:45:8e:43:58:7f:22:d8:a3:72:26:
83:bf:b6:82:59:dd:69:e1:95:bf:1e:e9:ff:52:8c:
65:30:2d:ce:8e:83:f7:23:e6:30:42:02:69:ff:19:
0f:61:3b:63:a5:03:38
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
6A:67:1C:A8:5F:1D:AD:02:3C:53:F1:09:9A:A5:56:DC:E1:9F:75:A8
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:02:a5:ac:8e:f5:d4:69:f6:d6:bc:76:8d:5d:b6:
c2:36:1a:ad:2e:0a:a1:1e:7e:b4:40:db:bf:e9:ac:06:36:59:
27:86:5b:fe:d5:41:ef:bc:11:65:c5:de:05:63:81:61:02:30:
5d:fb:ec:78:17:d2:b9:db:a8:ed:a5:3c:e5:d6:74:f1:23:64:
9f:f9:d1:66:8a:13:a2:b7:67:f4:4a:f2:d1:9a:f6:61:8c:44:
15:e3:07:9e:48:26:9a:4a:89:92:0e:85
6,052,436 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,144,339 >>> mbox cmd response: success
11,157,856 UART:
11,157,872 UART: Running Caliptra FMC ...
11,158,280 UART:
11,158,423 UART: [state] CFI Enabled
11,247,390 UART: [art] Extend RT PCRs Done
11,247,818 UART: [art] Lock RT PCRs Done
11,249,109 UART: [art] Populate DV Done
11,257,411 UART: [fht] FMC Alias Private Key: 7
11,258,343 UART: [art] Derive CDI
11,258,623 UART: [art] Store in slot 0x4
11,344,389 UART: [art] Derive Key Pair
11,344,749 UART: [art] Store priv key in slot 0x5
11,358,828 UART: [art] Derive Key Pair - Done
11,373,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,388,889 UART: [art] Erasing AUTHORITY.KEYID = 7
11,389,654 UART: [art] PUB.X = E9ACF60A561FFA2811758CB1C0143A62E28F3C1995C4154E93F3232468B1BFD9C8D67A7FECE9AEBBF0CAF65A09F18272
11,396,434 UART: [art] PUB.Y = D580396F5A80894D62E92E573FE7B16CDBC250AB81A8F747505DB311D712FCEB4171A1D343CFFFDD29953F7E8048A71E
11,403,394 UART: [art] SIG.R = E954ACEB3DE0C39D8405B2EBDD08C21327C3F1826A6A4E1DD17D7510EFAED3F82DE4E5225A31314D648DC21567182515
11,410,168 UART: [art] SIG.S = 46D7162A693FC9F9FB0EBB087B9875AAB42F877E02132595F2048512C84C2385AB4FE05737E54F254C24B71D34C451BE
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
17:8c:4e:fa:01:8a:86:b1:10:f6:6f:eb:a9:c5:c9:c8:b8:b5:39:5e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=138C4EFA018A86B110F66FEBA9C5C9C8B8B5395E18E08D6BBA063E70D7DABBEB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e9:ac:f6:0a:56:1f:fa:28:11:75:8c:b1:c0:14:
3a:62:e2:8f:3c:19:95:c4:15:4e:93:f3:23:24:68:
b1:bf:d9:c8:d6:7a:7f:ec:e9:ae:bb:f0:ca:f6:5a:
09:f1:82:72:d5:80:39:6f:5a:80:89:4d:62:e9:2e:
57:3f:e7:b1:6c:db:c2:50:ab:81:a8:f7:47:50:5d:
b3:11:d7:12:fc:eb:41:71:a1:d3:43:cf:ff:dd:29:
95:3f:7e:80:48:a7:1e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
13:8C:4E:FA:01:8A:86:B1:10:F6:6F:EB:A9:C5:C9:C8:B8:B5:39:5E
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:54:ac:eb:3d:e0:c3:9d:84:05:b2:eb:dd:
08:c2:13:27:c3:f1:82:6a:6a:4e:1d:d1:7d:75:10:ef:ae:d3:
f8:2d:e4:e5:22:5a:31:31:4d:64:8d:c2:15:67:18:25:15:02:
30:46:d7:16:2a:69:3f:c9:f9:fb:0e:bb:08:7b:98:75:aa:b4:
2f:87:7e:02:13:25:95:f2:04:85:12:c8:4c:23:85:ab:4f:e0:
57:37:e5:4f:25:4c:24:b7:1d:34:c4:51:be
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.23s
Truncated 7134 bytes from beginning
:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,979,466 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,896 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,059,959 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:70:75:d6:a9:01:25:b2:5b:78:98:3c:fe:f2:ea:71:ec:d8:e4:a7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=147075D6A90125B25B78983CFEF2EA71ECD8E4A706FBC27A82ECCB3CE4FE7DE2
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:1a:a6:29:e2:f0:61:07:fe:6c:9d:0e:49:21:fc:
6c:7f:a8:34:40:23:6e:75:dc:6c:e9:a3:7b:fb:5f:
4c:0f:10:16:5e:35:ef:01:22:f9:be:0b:73:8f:d3:
b4:30:90:09:fc:ba:50:a5:8c:1a:d7:04:6e:0c:79:
29:9c:38:9a:1f:5b:67:d5:1c:a6:18:68:3d:e8:1f:
f9:52:31:c5:b2:5c:c1:77:41:ca:d1:ac:e1:40:76:
5b:7c:4d:87:ef:d4:d4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
14:70:75:D6:A9:01:25:B2:5B:78:98:3C:FE:F2:EA:71:EC:D8:E4:A7
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:01:05:42:d1:47:eb:14:f4:3f:1b:f2:ec:04:2b:
cd:18:ef:52:49:59:93:9f:b8:0d:31:61:dc:61:0a:88:95:14:
6e:b7:41:62:41:c3:06:19:48:29:e8:2f:17:f9:0f:24:02:30:
79:f7:d8:1f:7b:30:2e:07:d5:6b:32:53:9f:e9:01:7f:c1:a0:
a1:fc:d2:15:0b:1f:47:37:08:4d:cb:8c:44:15:52:14:00:9d:
7f:33:bd:49:89:a4:33:4d:ec:b6:3e:4b
4,070,772 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,071,464 UART:
4,071,480 UART: Running Caliptra ROM ...
4,071,888 UART:
4,071,943 UART: [state] CFI Enabled
4,074,760 UART: [state] LifecycleState = Production
4,075,368 UART: [state] DebugLocked = Yes
4,076,116 UART: [state] Starting the WD Timer 40000000 cycles
4,077,632 UART: [kat] SHA2-256
4,881,182 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,885,286 UART: [kat] ++
4,885,438 UART: [kat] sha1
4,889,736 UART: [kat] SHA2-256
4,891,676 UART: [kat] SHA2-384
4,894,483 UART: [kat] SHA2-512-ACC
4,896,383 UART: [kat] ECC-384
4,906,238 UART: [kat] HMAC-384Kdf
4,910,698 UART: [kat] LMS
5,159,010 UART: [kat] --
5,159,670 UART: [update-reset] ++
7,073,778 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,074,897 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
7,227,490 >>> mbox cmd response: success
7,227,838 UART: [update-reset] Copying MAN_2 To MAN_1
7,235,850 UART: [update-reset Success] --
7,236,779 UART: [state] Locking Datavault
7,237,481 UART: [state] Locking PCR0, PCR1 and PCR31
7,238,085 UART: [state] Locking ICCM
7,238,613 UART: [exit] Launching FMC @ 0x40000130
7,243,943 UART:
7,243,959 UART: Running Caliptra FMC ...
7,244,367 UART:
7,244,421 UART: [state] CFI Enabled
7,333,218 UART: [art] Extend RT PCRs Done
7,333,646 UART: [art] Lock RT PCRs Done
7,334,581 UART: [art] Populate DV Done
7,342,761 UART: [fht] FMC Alias Private Key: 7
7,343,765 UART: [art] Derive CDI
7,344,045 UART: [art] Store in slot 0x4
7,430,112 UART: [art] Derive Key Pair
7,430,472 UART: [art] Store priv key in slot 0x5
7,443,672 UART: [art] Derive Key Pair - Done
7,458,153 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,473,740 UART: [art] Erasing AUTHORITY.KEYID = 7
7,474,505 UART: [art] PUB.X = 03A14550BF160937AF80AA71153D43BF4F0D72EDFF6D050C148151486C3C39A581F68249E8AEFD0C808FD7F2101968AA
7,481,261 UART: [art] PUB.Y = 189A2D1D2D747D1A5D9154BD9D0E80C83F950C3D8D0636A23122D982EB69F99853A5CFB18810A419C03DB4AF090625C9
7,488,198 UART: [art] SIG.R = 2B0179DF5077598ACBB4352622E1E468B9DF373E513E02BCB734724EC7DE0152A9457BCE64C1743E1245BDD2AA7457F5
7,494,963 UART: [art] SIG.S = FDF0B8C31FC7F825ADA27A2851C2CCC647B75D868F61128387A7BF961A8D36B6F2C8E3547E89E577B846C8A0158FB2DF
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7e:28:28:34:1d:72:c6:39:a5:0e:85:1f:49:61:4a:f9:d3:2c:11:ca
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=FA2828341D72C639A50E851F49614AF9D32C11CA5F3C30EEDB8879F19D88E51F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:03:a1:45:50:bf:16:09:37:af:80:aa:71:15:3d:
43:bf:4f:0d:72:ed:ff:6d:05:0c:14:81:51:48:6c:
3c:39:a5:81:f6:82:49:e8:ae:fd:0c:80:8f:d7:f2:
10:19:68:aa:18:9a:2d:1d:2d:74:7d:1a:5d:91:54:
bd:9d:0e:80:c8:3f:95:0c:3d:8d:06:36:a2:31:22:
d9:82:eb:69:f9:98:53:a5:cf:b1:88:10:a4:19:c0:
3d:b4:af:09:06:25:c9
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
FA:28:28:34:1D:72:C6:39:A5:0E:85:1F:49:61:4A:F9:D3:2C:11:CA
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:2b:01:79:df:50:77:59:8a:cb:b4:35:26:22:e1:
e4:68:b9:df:37:3e:51:3e:02:bc:b7:34:72:4e:c7:de:01:52:
a9:45:7b:ce:64:c1:74:3e:12:45:bd:d2:aa:74:57:f5:02:31:
00:fd:f0:b8:c3:1f:c7:f8:25:ad:a2:7a:28:51:c2:cc:c6:47:
b7:5d:86:8f:61:12:83:87:a7:bf:96:1a:8d:36:b6:f2:c8:e3:
54:7e:89:e5:77:b8:46:c8:a0:15:8f:b2:df
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.48s
Truncated 2693 bytes from beginning
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,199 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,857,467 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,896,838 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
55:76:1c:90:d8:57:14:20:e7:39:c3:5f:fd:91:fa:55:f1:37:bd:3e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=51761C90D8571420E739C35FFD91FA55F137BD3E0758228F555AF4744C3B6D5F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d4:ee:5b:c9:c7:b4:91:dd:fe:3d:6f:ae:d9:bd:
df:81:02:06:ec:67:07:b8:12:f8:da:a3:69:f9:8d:
0b:27:81:15:70:08:58:68:9a:75:3a:7d:53:92:93:
05:63:30:69:c9:af:bd:b6:09:93:d2:68:0e:54:6b:
ca:e4:64:a9:2e:c1:bd:bd:49:84:cb:61:8c:90:43:
5f:fd:d2:ae:8b:6e:b1:56:b5:c3:aa:df:a4:2a:97:
77:4f:ad:e5:b1:0c:34
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
51:76:1C:90:D8:57:14:20:E7:39:C3:5F:FD:91:FA:55:F1:37:BD:3E
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:86:3a:68:bc:27:c8:7b:de:ca:0c:19:5e:f5:
b5:5f:f6:e2:44:01:f4:61:50:4c:5a:64:77:96:b1:70:90:6b:
8e:a0:09:f0:66:e9:60:27:73:75:89:22:8e:6a:15:62:0b:02:
31:00:cb:fe:88:61:8f:da:81:1d:51:30:50:34:11:8b:66:85:
de:59:c8:00:b1:5f:ac:99:e3:03:05:8a:36:79:9b:0b:89:6f:
dc:20:22:d9:d2:5d:d9:70:71:1c:21:5f:df:06
3,907,756 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,950,915 >>> mbox cmd response: success
6,964,153 UART:
6,964,169 UART: Running Caliptra FMC ...
6,964,577 UART:
6,964,631 UART: [state] CFI Enabled
7,052,946 UART: [art] Extend RT PCRs Done
7,053,374 UART: [art] Lock RT PCRs Done
7,054,673 UART: [art] Populate DV Done
7,062,961 UART: [fht] FMC Alias Private Key: 7
7,064,087 UART: [art] Derive CDI
7,064,367 UART: [art] Store in slot 0x4
7,150,264 UART: [art] Derive Key Pair
7,150,624 UART: [art] Store priv key in slot 0x5
7,163,904 UART: [art] Derive Key Pair - Done
7,178,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,194,318 UART: [art] Erasing AUTHORITY.KEYID = 7
7,195,083 UART: [art] PUB.X = 600F911F47EF25AE75C736AAE26DE5BEB3F73446892728C4ED8A0724D127C75AC131446DE29C5FDF70AD14DD2D8CA321
7,201,859 UART: [art] PUB.Y = 5DFE9E0952F453E88084361CDB37B2FA7BD4F84FA34B0FF6A03C19ECD9D716512B63A6361C8F10C3EB9EDC302C5A9F7A
7,208,821 UART: [art] SIG.R = EDF7E99BDDEC93B53FA3FCCC5D754ABD5BF1F5690707F62CFC1A2247C5CB4606E2768413845C487D476E8B38E5F46090
7,215,596 UART: [art] SIG.S = 96C6B906F8319A3B7E6477EF4C4667EAAD2387564A57808D79B5449F96144A6A5A81DC6D76F6F64B307E984ADF698F06
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
26:58:45:80:b3:8e:df:85:b5:a2:24:72:78:4f:70:a8:90:9b:32:6b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=22584580B38EDF85B5A22472784F70A8909B326BC2326FDA4324A35DC8050665
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:60:0f:91:1f:47:ef:25:ae:75:c7:36:aa:e2:6d:
e5:be:b3:f7:34:46:89:27:28:c4:ed:8a:07:24:d1:
27:c7:5a:c1:31:44:6d:e2:9c:5f:df:70:ad:14:dd:
2d:8c:a3:21:5d:fe:9e:09:52:f4:53:e8:80:84:36:
1c:db:37:b2:fa:7b:d4:f8:4f:a3:4b:0f:f6:a0:3c:
19:ec:d9:d7:16:51:2b:63:a6:36:1c:8f:10:c3:eb:
9e:dc:30:2c:5a:9f:7a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
22:58:45:80:B3:8E:DF:85:B5:A2:24:72:78:4F:70:A8:90:9B:32:6B
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:ed:f7:e9:9b:dd:ec:93:b5:3f:a3:fc:cc:5d:
75:4a:bd:5b:f1:f5:69:07:07:f6:2c:fc:1a:22:47:c5:cb:46:
06:e2:76:84:13:84:5c:48:7d:47:6e:8b:38:e5:f4:60:90:02:
31:00:96:c6:b9:06:f8:31:9a:3b:7e:64:77:ef:4c:46:67:ea:
ad:23:87:56:4a:57:80:8d:79:b5:44:9f:96:14:4a:6a:5a:81:
dc:6d:76:f6:f6:4b:30:7e:98:4a:df:69:8f:06
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.47s
Truncated 7134 bytes from beginning
:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,001,131 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,042,691 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,081,850 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0f:a7:00:c4:43:9c:c1:b1:a6:e7:98:f1:8d:16:ba:c6:49:48:d4:49
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0BA700C4439CC1B1A6E798F18D16BAC64948D449C4A296EC66C7657401BC0683
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:0a:6f:99:86:df:73:d6:11:c4:51:57:4e:3e:c0:
8e:a9:10:20:ca:c4:22:e2:1d:8b:d1:a1:57:d3:d6:
e3:1d:c1:86:b9:60:d9:5c:f3:33:a4:8f:ae:33:da:
55:35:f9:db:2e:5b:97:ee:79:f6:81:69:51:aa:de:
96:63:1c:5c:3b:2d:42:2c:91:75:c1:38:d9:9c:ed:
d4:de:04:d6:66:03:74:97:bc:80:f3:70:16:c7:05:
af:c3:2e:65:fd:15:b9
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
0B:A7:00:C4:43:9C:C1:B1:A6:E7:98:F1:8D:16:BA:C6:49:48:D4:49
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:3a:13:74:95:66:b7:33:43:e0:4d:46:98:26:c5:
39:e0:7c:62:7d:44:0c:31:3f:72:3c:c3:c0:49:d0:44:59:db:
fc:33:6c:82:5d:1b:65:85:58:f0:3c:ee:18:66:c7:57:02:31:
00:92:e6:83:f3:81:f9:0c:d9:3b:82:a0:7f:56:d5:9c:ee:c7:
b5:39:55:54:b7:2a:ff:e9:91:f3:9b:20:b1:db:86:1c:b2:2e:
70:e6:92:67:a8:b7:81:81:1b:67:0c:7a:1b
4,092,937 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,093,685 UART:
4,093,701 UART: Running Caliptra ROM ...
4,094,109 UART:
4,094,251 UART: [state] CFI Enabled
4,097,030 UART: [state] LifecycleState = Production
4,097,638 UART: [state] DebugLocked = Yes
4,098,292 UART: [state] Starting the WD Timer 40000000 cycles
4,099,778 UART: [kat] SHA2-256
4,903,328 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,907,432 UART: [kat] ++
4,907,584 UART: [kat] sha1
4,911,728 UART: [kat] SHA2-256
4,913,668 UART: [kat] SHA2-384
4,916,483 UART: [kat] SHA2-512-ACC
4,918,383 UART: [kat] ECC-384
4,928,154 UART: [kat] HMAC-384Kdf
4,932,910 UART: [kat] LMS
5,181,222 UART: [kat] --
5,182,190 UART: [update-reset] ++
7,096,624 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,097,795 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
7,250,388 >>> mbox cmd response: success
7,250,716 UART: [update-reset] Copying MAN_2 To MAN_1
7,258,728 UART: [update-reset Success] --
7,259,901 UART: [state] Locking Datavault
7,260,691 UART: [state] Locking PCR0, PCR1 and PCR31
7,261,295 UART: [state] Locking ICCM
7,261,769 UART: [exit] Launching FMC @ 0x40000130
7,267,099 UART:
7,267,115 UART: Running Caliptra FMC ...
7,267,523 UART:
7,267,666 UART: [state] CFI Enabled
7,356,731 UART: [art] Extend RT PCRs Done
7,357,159 UART: [art] Lock RT PCRs Done
7,358,492 UART: [art] Populate DV Done
7,366,664 UART: [fht] FMC Alias Private Key: 7
7,367,718 UART: [art] Derive CDI
7,367,998 UART: [art] Store in slot 0x4
7,453,597 UART: [art] Derive Key Pair
7,453,957 UART: [art] Store priv key in slot 0x5
7,467,005 UART: [art] Derive Key Pair - Done
7,481,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,497,208 UART: [art] Erasing AUTHORITY.KEYID = 7
7,497,973 UART: [art] PUB.X = 2CAD282699921036DA266AA78DEA9EBBB287ECF2E489E2AF0A69D17297CEFEE178C75CD7C47FE81C70DCD44878FDE9C1
7,504,762 UART: [art] PUB.Y = EE427E5E9B42C615564AEA11042EE2896EBBE8D5D9B2C511CA9DE1585E0F0C1388D556C0594B12516DBCF914EC96A6CA
7,511,717 UART: [art] SIG.R = 08842B7FC4E1E4B41BABA2FFF779ABB3E38B222AF5A5497373CC89D1E12007A6C8A0B78266DE0D7239747F31F845D00C
7,518,485 UART: [art] SIG.S = 5FEDE72A596102AD2E4DDCDAA1747BB7BFE19C01091EB4EDD366CD8DD6BBD34101AF90ECDDE41882571802235DF80805
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:7a:ce:d4:54:5b:e3:88:38:d4:b8:ae:ac:c5:9e:c9:18:2e:43:9b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=197ACED4545BE38838D4B8AEACC59EC9182E439B69545366EAB103F0A70C9B34
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2c:ad:28:26:99:92:10:36:da:26:6a:a7:8d:ea:
9e:bb:b2:87:ec:f2:e4:89:e2:af:0a:69:d1:72:97:
ce:fe:e1:78:c7:5c:d7:c4:7f:e8:1c:70:dc:d4:48:
78:fd:e9:c1:ee:42:7e:5e:9b:42:c6:15:56:4a:ea:
11:04:2e:e2:89:6e:bb:e8:d5:d9:b2:c5:11:ca:9d:
e1:58:5e:0f:0c:13:88:d5:56:c0:59:4b:12:51:6d:
bc:f9:14:ec:96:a6:ca
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
19:7A:CE:D4:54:5B:E3:88:38:D4:B8:AE:AC:C5:9E:C9:18:2E:43:9B
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:08:84:2b:7f:c4:e1:e4:b4:1b:ab:a2:ff:f7:79:
ab:b3:e3:8b:22:2a:f5:a5:49:73:73:cc:89:d1:e1:20:07:a6:
c8:a0:b7:82:66:de:0d:72:39:74:7f:31:f8:45:d0:0c:02:30:
5f:ed:e7:2a:59:61:02:ad:2e:4d:dc:da:a1:74:7b:b7:bf:e1:
9c:01:09:1e:b4:ed:d3:66:cd:8d:d6:bb:d3:41:01:af:90:ec:
dd:e4:18:82:57:18:02:23:5d:f8:08:05
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.43s
Truncated 2684 bytes from beginning
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,822,232 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,863,924 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,903,157 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:cf:58:03:ed:9e:6d:0d:5f:e6:23:ba:ff:a5:47:d8:5a:58:a7:1a
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A1CF5803ED9E6D0D5FE623BAFFA547D85A58A71AA3A8A4D3DEAD6FD7BB7C9064
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b8:3a:54:ff:9a:b3:04:da:61:52:52:e5:12:e3:
7f:95:3e:a4:05:d9:55:02:5a:81:d7:67:83:ac:13:
c4:96:34:ec:16:92:d3:52:f6:56:12:0c:c9:46:a3:
d5:1c:e2:a9:9d:21:0e:8c:08:e3:7f:6f:b0:50:96:
10:16:99:16:3d:f4:fc:d9:6e:47:5d:b6:0d:5a:bf:
03:67:f5:6a:d9:f3:63:2e:ec:3d:52:42:d1:64:7d:
15:8d:74:ab:4f:ac:8f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
A1:CF:58:03:ED:9E:6D:0D:5F:E6:23:BA:FF:A5:47:D8:5A:58:A7:1A
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:68:fa:e6:1e:de:01:1b:3a:e4:db:81:c1:f8:02:
c5:8a:51:6e:11:62:b7:8b:42:a5:aa:ae:8d:13:27:7c:5e:f0:
22:43:c4:e0:0a:c4:ed:de:bb:7e:45:86:4d:bd:d7:34:02:31:
00:84:ec:0d:24:93:99:1c:a2:36:dc:a8:17:41:0b:19:64:9d:
51:dc:a8:78:9b:f9:bd:69:5c:7f:8f:77:5f:56:6d:15:02:e3:
57:41:07:06:01:78:86:2e:4e:82:6a:7a:8e
3,913,916 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,945,815 >>> mbox cmd response: success
6,959,561 UART:
6,959,577 UART: Running Caliptra FMC ...
6,959,985 UART:
6,960,128 UART: [state] CFI Enabled
7,049,249 UART: [art] Extend RT PCRs Done
7,049,677 UART: [art] Lock RT PCRs Done
7,050,808 UART: [art] Populate DV Done
7,058,922 UART: [fht] FMC Alias Private Key: 7
7,059,854 UART: [art] Derive CDI
7,060,134 UART: [art] Store in slot 0x4
7,145,965 UART: [art] Derive Key Pair
7,146,325 UART: [art] Store priv key in slot 0x5
7,159,613 UART: [art] Derive Key Pair - Done
7,174,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,189,584 UART: [art] Erasing AUTHORITY.KEYID = 7
7,190,349 UART: [art] PUB.X = AD61E7AD090C5BB19CA21FA2CC8B365AD37D12D18D7D6BCE53D12442DEBFFB6855FA496A0520DF0A73589D0C839A648A
7,197,124 UART: [art] PUB.Y = E0276D88C914667812FF5E46F70F25690D508377A7513BF3B5812D096B9F9C1373E9F8DD8489CED5404366D4964F6861
7,204,055 UART: [art] SIG.R = 29BAF080527DFA3F66402C984301226C6E1FB0C77EE6CAA5039EA18281A7480DC9F337B1AE650EDE95AA85649362C5D5
7,210,819 UART: [art] SIG.S = 42BB4AE13B83A90E353893342070E4D2367B652A9503BDAA1CC003C1550434130423A3E28D52218ECA4A201A2DCF63C7
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
45:d5:ed:01:f6:eb:d7:93:d7:b8:ee:a8:b4:aa:c0:c5:95:34:53:ec
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=45D5ED01F6EBD793D7B8EEA8B4AAC0C5953453EC401F1387F62A9EDBDCE6C40A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ad:61:e7:ad:09:0c:5b:b1:9c:a2:1f:a2:cc:8b:
36:5a:d3:7d:12:d1:8d:7d:6b:ce:53:d1:24:42:de:
bf:fb:68:55:fa:49:6a:05:20:df:0a:73:58:9d:0c:
83:9a:64:8a:e0:27:6d:88:c9:14:66:78:12:ff:5e:
46:f7:0f:25:69:0d:50:83:77:a7:51:3b:f3:b5:81:
2d:09:6b:9f:9c:13:73:e9:f8:dd:84:89:ce:d5:40:
43:66:d4:96:4f:68:61
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
45:D5:ED:01:F6:EB:D7:93:D7:B8:EE:A8:B4:AA:C0:C5:95:34:53:EC
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:29:ba:f0:80:52:7d:fa:3f:66:40:2c:98:43:01:
22:6c:6e:1f:b0:c7:7e:e6:ca:a5:03:9e:a1:82:81:a7:48:0d:
c9:f3:37:b1:ae:65:0e:de:95:aa:85:64:93:62:c5:d5:02:30:
42:bb:4a:e1:3b:83:a9:0e:35:38:93:34:20:70:e4:d2:36:7b:
65:2a:95:03:bd:aa:1c:c0:03:c1:55:04:34:13:04:23:a3:e2:
8d:52:21:8e:ca:4a:20:1a:2d:cf:63:c7
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.54s
Truncated 7137 bytes from beginning
:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,988,189 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,649 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,068,652 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6f:d7:31:ed:c0:89:dd:ef:0d:fe:f2:b2:8d:8d:8a:ec:e6:1c:d4:32
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6FD731EDC089DDEF0DFEF2B28D8D8AECE61CD432ACDB4F1F28BC83ECC202F7D2
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:21:53:5b:c7:ef:dd:72:bf:b6:06:44:44:8b:41:
6c:6d:2c:56:58:fb:52:99:34:fb:6b:a4:d2:2a:4b:
22:d3:19:26:fc:9f:11:9b:3d:57:06:8c:92:7e:37:
8f:99:9a:a6:3d:f2:c8:a4:84:c1:09:81:c7:de:fe:
d0:25:19:a7:0f:f7:57:14:6b:ec:8a:6e:92:66:ae:
3e:2b:b2:01:a6:5b:5b:46:04:dc:d5:de:77:f3:87:
d4:39:fa:62:22:f8:78
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
6F:D7:31:ED:C0:89:DD:EF:0D:FE:F2:B2:8D:8D:8A:EC:E6:1C:D4:32
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:47:e9:5c:8e:6d:f5:20:2c:50:70:0c:e3:c0:04:
ec:a5:11:f5:17:98:85:fa:26:b9:0a:32:b0:4f:97:22:ff:47:
74:d0:16:5e:b9:f9:39:b1:d5:74:89:1f:76:db:f1:05:02:30:
12:7c:79:e8:ed:cc:bc:fe:81:06:f7:39:c4:a6:11:dc:65:cc:
c1:e2:a3:8b:ca:b2:f9:b9:38:68:2e:e0:88:e4:e4:8f:7e:28:
73:b2:69:e0:7d:e0:26:c0:f1:de:8f:04
4,079,667 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,080,363 UART:
4,080,379 UART: Running Caliptra ROM ...
4,080,787 UART:
4,080,842 UART: [state] CFI Enabled
4,083,751 UART: [state] LifecycleState = Production
4,084,359 UART: [state] DebugLocked = Yes
4,084,997 UART: [state] Starting the WD Timer 40000000 cycles
4,086,609 UART: [kat] SHA2-256
4,892,259 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,896,384 UART: [kat] ++
4,896,536 UART: [kat] sha1
4,900,696 UART: [kat] SHA2-256
4,902,636 UART: [kat] SHA2-384
4,905,549 UART: [kat] SHA2-512-ACC
4,907,449 UART: [kat] ECC-384
4,916,836 UART: [kat] HMAC-384Kdf
4,921,482 UART: [kat] LMS
5,169,810 UART: [kat] --
5,170,802 UART: [update-reset] ++
7,083,436 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,084,605 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
7,237,198 >>> mbox cmd response: success
7,237,304 UART: [update-reset] Copying MAN_2 To MAN_1
7,245,316 UART: [update-reset Success] --
7,246,373 UART: [state] Locking Datavault
7,247,067 UART: [state] Locking PCR0, PCR1 and PCR31
7,247,671 UART: [state] Locking ICCM
7,248,301 UART: [exit] Launching FMC @ 0x40000130
7,253,631 UART:
7,253,647 UART: Running Caliptra FMC ...
7,254,055 UART:
7,254,109 UART: [state] CFI Enabled
7,342,950 UART: [art] Extend RT PCRs Done
7,343,378 UART: [art] Lock RT PCRs Done
7,344,567 UART: [art] Populate DV Done
7,352,595 UART: [fht] FMC Alias Private Key: 7
7,353,683 UART: [art] Derive CDI
7,353,963 UART: [art] Store in slot 0x4
7,439,922 UART: [art] Derive Key Pair
7,440,282 UART: [art] Store priv key in slot 0x5
7,453,436 UART: [art] Derive Key Pair - Done
7,468,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,484,091 UART: [art] Erasing AUTHORITY.KEYID = 7
7,484,856 UART: [art] PUB.X = D49C666DFE028A27A3DD31E6C09663A2C7D2302B8ED7B710AAAD84891892AAD79675F23D441EA7D48CC01DBA98B9C1C3
7,491,637 UART: [art] PUB.Y = 9F20C5F256A8C7727D806BC6D444B8916E730FB7655D45D9EADC207133BBF51D8B1A2CE15220398B56653A51F953D38C
7,498,586 UART: [art] SIG.R = 9D40E2C20BCF0D470A4314A5B0FFB1A9DB290471C566442A1CDEAB4A61EAF26DEB336AE61D8274C1317A9F5A3649F511
7,505,358 UART: [art] SIG.S = DFF25FC84E4329D31C5FA3CF38EEE86BA1E65524C33F77A7A135BA6C8F94FABF60C8FAF6F89E3AC008713436E3060EE2
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
57:20:89:b7:f8:c1:2a:5f:11:3f:2e:1f:3b:68:6f:29:13:51:dc:bf
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=532089B7F8C12A5F113F2E1F3B686F291351DCBFE3E3D51B0B0F20CE0C1ED2E6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d4:9c:66:6d:fe:02:8a:27:a3:dd:31:e6:c0:96:
63:a2:c7:d2:30:2b:8e:d7:b7:10:aa:ad:84:89:18:
92:aa:d7:96:75:f2:3d:44:1e:a7:d4:8c:c0:1d:ba:
98:b9:c1:c3:9f:20:c5:f2:56:a8:c7:72:7d:80:6b:
c6:d4:44:b8:91:6e:73:0f:b7:65:5d:45:d9:ea:dc:
20:71:33:bb:f5:1d:8b:1a:2c:e1:52:20:39:8b:56:
65:3a:51:f9:53:d3:8c
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
53:20:89:B7:F8:C1:2A:5F:11:3F:2E:1F:3B:68:6F:29:13:51:DC:BF
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9d:40:e2:c2:0b:cf:0d:47:0a:43:14:a5:b0:
ff:b1:a9:db:29:04:71:c5:66:44:2a:1c:de:ab:4a:61:ea:f2:
6d:eb:33:6a:e6:1d:82:74:c1:31:7a:9f:5a:36:49:f5:11:02:
31:00:df:f2:5f:c8:4e:43:29:d3:1c:5f:a3:cf:38:ee:e8:6b:
a1:e6:55:24:c3:3f:77:a7:a1:35:ba:6c:8f:94:fa:bf:60:c8:
fa:f6:f8:9e:3a:c0:08:71:34:36:e3:06:0e:e2
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.62s
Truncated 2684 bytes from beginning
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,352 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,859,052 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,898,145 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
36:11:31:9a:74:29:21:0b:57:53:fb:6f:87:0d:73:d2:81:8c:a0:15
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B211319A7429210B5753FB6F870D73D2818CA015FAB40223ED611A7F1F88337F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:aa:91:1a:84:43:a2:5c:cc:e7:a8:6c:73:00:2a:
5b:58:3e:60:ec:19:81:58:8b:99:ee:65:f1:2e:c6:
a1:bb:0f:5b:f5:d6:3e:7e:26:67:a5:3a:a5:7b:24:
a4:7d:bd:45:de:2e:cc:fe:7c:ce:b0:7a:27:a7:5d:
c2:b7:91:19:1d:3d:c0:55:3d:9d:7c:8d:7c:33:9c:
17:03:c8:5e:8c:92:5f:5b:63:1f:10:3b:ea:d2:63:
54:0d:d2:90:fb:80:3b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
B2:11:31:9A:74:29:21:0B:57:53:FB:6F:87:0D:73:D2:81:8C:A0:15
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:69:b5:dd:1f:ef:d0:c4:80:09:57:f8:1c:a2:9e:
a2:6d:d0:ec:f5:1a:87:62:c8:69:43:0e:74:86:dd:14:10:a6:
69:f7:55:3f:57:b4:3b:52:8f:2d:f0:52:de:77:b9:fc:02:30:
2d:b2:55:d4:84:ce:8c:15:49:c8:34:fd:8c:cf:2f:ba:25:77:
29:49:44:7e:a9:68:aa:73:76:e5:57:31:b2:63:c5:b7:2a:c0:
c5:cb:01:01:6e:ae:28:64:d2:0e:c7:a4
3,908,846 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,957,015 >>> mbox cmd response: success
6,970,749 UART:
6,970,765 UART: Running Caliptra FMC ...
6,971,173 UART:
6,971,227 UART: [state] CFI Enabled
7,060,106 UART: [art] Extend RT PCRs Done
7,060,534 UART: [art] Lock RT PCRs Done
7,061,645 UART: [art] Populate DV Done
7,069,785 UART: [fht] FMC Alias Private Key: 7
7,070,871 UART: [art] Derive CDI
7,071,151 UART: [art] Store in slot 0x4
7,157,068 UART: [art] Derive Key Pair
7,157,428 UART: [art] Store priv key in slot 0x5
7,170,632 UART: [art] Derive Key Pair - Done
7,185,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,200,389 UART: [art] Erasing AUTHORITY.KEYID = 7
7,201,154 UART: [art] PUB.X = 7A2D77B397F1AE766A178F7EBE3786A9312B82486389E96946991C00EF0A74DC7449D1C591FFA732B735E1CF693BA8D8
7,207,901 UART: [art] PUB.Y = 8F2ACA08C4CE2945E6587903497AD57359317503656FDFC91D3D635DC4AB4DDB1B6C637E04AE017011926420ADF8447F
7,214,838 UART: [art] SIG.R = B91E5D6F1429A0FFEFEA805E2293A6A8186ED6C3C0198CBBF0F4A43DBF48B2304EB4397FE98D8B26D20BBD0F87B1BB5A
7,221,626 UART: [art] SIG.S = 2271992A77ACB583EAFDB583CC0F9EA7939E56028C4B587C2901D409635F46F5982756A8F27816AE31C0C25B3FF62EAD
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0f:0f:fb:90:35:b3:d4:ff:f8:01:30:05:3c:f5:55:8d:bf:3c:99:76
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0F0FFB9035B3D4FFF80130053CF5558DBF3C997605DB8B0462779D0AB254233E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:7a:2d:77:b3:97:f1:ae:76:6a:17:8f:7e:be:37:
86:a9:31:2b:82:48:63:89:e9:69:46:99:1c:00:ef:
0a:74:dc:74:49:d1:c5:91:ff:a7:32:b7:35:e1:cf:
69:3b:a8:d8:8f:2a:ca:08:c4:ce:29:45:e6:58:79:
03:49:7a:d5:73:59:31:75:03:65:6f:df:c9:1d:3d:
63:5d:c4:ab:4d:db:1b:6c:63:7e:04:ae:01:70:11:
92:64:20:ad:f8:44:7f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
0F:0F:FB:90:35:B3:D4:FF:F8:01:30:05:3C:F5:55:8D:BF:3C:99:76
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:b9:1e:5d:6f:14:29:a0:ff:ef:ea:80:5e:22:
93:a6:a8:18:6e:d6:c3:c0:19:8c:bb:f0:f4:a4:3d:bf:48:b2:
30:4e:b4:39:7f:e9:8d:8b:26:d2:0b:bd:0f:87:b1:bb:5a:02:
30:22:71:99:2a:77:ac:b5:83:ea:fd:b5:83:cc:0f:9e:a7:93:
9e:56:02:8c:4b:58:7c:29:01:d4:09:63:5f:46:f5:98:27:56:
a8:f2:78:16:ae:31:c0:c2:5b:3f:f6:2e:ad
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.44s
Truncated 7137 bytes from beginning
:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,997,110 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,038,682 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,077,737 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0c:5b:59:97:6e:3f:c9:f4:aa:46:09:81:ca:f8:81:e9:71:32:9c:03
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0C5B59976E3FC9F4AA460981CAF881E971329C03ED5359BF5BDA36A1FA5C5E35
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ce:a7:8a:99:0c:77:f1:c5:48:bf:62:0f:4d:56:
a2:a7:a0:8f:ef:97:8f:9a:52:b8:92:87:83:3d:fe:
37:6f:ad:4a:d1:18:96:d7:f2:15:ae:ad:bd:4c:a5:
85:67:0e:7e:ec:6d:6e:5c:89:00:f8:8a:71:29:10:
21:74:ef:12:c5:5a:fe:4b:c9:88:d8:ed:3d:8c:c3:
d1:35:b8:25:06:b2:38:5b:2b:6c:99:16:0c:eb:7e:
fa:ec:23:06:3d:89:e8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
0C:5B:59:97:6E:3F:C9:F4:AA:46:09:81:CA:F8:81:E9:71:32:9C:03
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:54:d9:23:f7:8c:8a:d6:97:ef:47:6f:28:17:1c:
be:e1:7f:1d:89:0a:16:0b:e3:62:b6:8e:53:45:8c:78:ac:07:
9c:ec:e9:83:5b:13:78:92:b5:05:96:28:d5:10:2c:c0:02:31:
00:e6:fe:51:00:8f:98:11:52:42:0b:bd:18:a8:33:0b:f6:5e:
19:34:a9:5a:d8:9a:58:2b:1b:5a:1e:3f:45:dd:e3:36:40:87:
63:d0:6b:8d:47:1e:ad:e0:f1:be:b5:bb:45
4,088,690 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,089,218 UART:
4,089,234 UART: Running Caliptra ROM ...
4,089,642 UART:
4,089,784 UART: [state] CFI Enabled
4,092,625 UART: [state] LifecycleState = Production
4,093,233 UART: [state] DebugLocked = Yes
4,093,887 UART: [state] Starting the WD Timer 40000000 cycles
4,095,545 UART: [kat] SHA2-256
4,901,195 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,905,320 UART: [kat] ++
4,905,472 UART: [kat] sha1
4,909,522 UART: [kat] SHA2-256
4,911,462 UART: [kat] SHA2-384
4,914,095 UART: [kat] SHA2-512-ACC
4,915,995 UART: [kat] ECC-384
4,925,890 UART: [kat] HMAC-384Kdf
4,930,496 UART: [kat] LMS
5,178,824 UART: [kat] --
5,179,620 UART: [update-reset] ++
7,100,642 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,101,791 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
7,254,384 >>> mbox cmd response: success
7,254,538 UART: [update-reset] Copying MAN_2 To MAN_1
7,262,550 UART: [update-reset Success] --
7,263,405 UART: [state] Locking Datavault
7,264,135 UART: [state] Locking PCR0, PCR1 and PCR31
7,264,739 UART: [state] Locking ICCM
7,265,365 UART: [exit] Launching FMC @ 0x40000130
7,270,695 UART:
7,270,711 UART: Running Caliptra FMC ...
7,271,119 UART:
7,271,262 UART: [state] CFI Enabled
7,360,233 UART: [art] Extend RT PCRs Done
7,360,661 UART: [art] Lock RT PCRs Done
7,361,892 UART: [art] Populate DV Done
7,370,238 UART: [fht] FMC Alias Private Key: 7
7,371,282 UART: [art] Derive CDI
7,371,562 UART: [art] Store in slot 0x4
7,457,055 UART: [art] Derive Key Pair
7,457,415 UART: [art] Store priv key in slot 0x5
7,470,899 UART: [art] Derive Key Pair - Done
7,485,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,500,833 UART: [art] Erasing AUTHORITY.KEYID = 7
7,501,598 UART: [art] PUB.X = 043341BD78EBA82F2B1FAC97A3035FAC1A165819A902C08E47A9197960623D81F89B592CD1375E8D4ED20E5A445A4ECC
7,508,362 UART: [art] PUB.Y = 9AF937A26756B77E6234748E323166D9368B06C444106F03236CF60A6020F8C92001C6A1B069D90BBD03AE15B35F78F1
7,515,286 UART: [art] SIG.R = 6CD9CF175079817C80952C8B9261D3801530008D72C1CE339763ABF9D7F07C61354533608C2D8FDB9FDF2FE8B4908045
7,522,030 UART: [art] SIG.S = B2AC05F2468FCFEB4F8770163E0204575C6427A51A2BB82258F8E9C78CDB27352946126560128E1FBA521E0D7B72E057
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0e:2b:c8:67:ed:d6:bf:75:dd:4c:10:4c:3d:ae:f0:ce:61:04:6f:c8
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8A2BC867EDD6BF75DD4C104C3DAEF0CE61046FC827904417F006C59DDA595162
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:04:33:41:bd:78:eb:a8:2f:2b:1f:ac:97:a3:03:
5f:ac:1a:16:58:19:a9:02:c0:8e:47:a9:19:79:60:
62:3d:81:f8:9b:59:2c:d1:37:5e:8d:4e:d2:0e:5a:
44:5a:4e:cc:9a:f9:37:a2:67:56:b7:7e:62:34:74:
8e:32:31:66:d9:36:8b:06:c4:44:10:6f:03:23:6c:
f6:0a:60:20:f8:c9:20:01:c6:a1:b0:69:d9:0b:bd:
03:ae:15:b3:5f:78:f1
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
8A:2B:C8:67:ED:D6:BF:75:DD:4C:10:4C:3D:AE:F0:CE:61:04:6F:C8
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:6c:d9:cf:17:50:79:81:7c:80:95:2c:8b:92:61:
d3:80:15:30:00:8d:72:c1:ce:33:97:63:ab:f9:d7:f0:7c:61:
35:45:33:60:8c:2d:8f:db:9f:df:2f:e8:b4:90:80:45:02:31:
00:b2:ac:05:f2:46:8f:cf:eb:4f:87:70:16:3e:02:04:57:5c:
64:27:a5:1a:2b:b8:22:58:f8:e9:c7:8c:db:27:35:29:46:12:
65:60:12:8e:1f:ba:52:1e:0d:7b:72:e0:57
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.39s
Truncated 2690 bytes from beginning
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,411 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,862,059 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,024 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
55:d5:0c:bc:ad:b9:9f:72:c8:7c:f5:bb:be:c2:9b:c5:e0:dd:45:8b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D5D50CBCADB99F72C87CF5BBBEC29BC5E0DD458B31667742DD6636A2A87C6622
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ce:31:6b:ad:cc:a3:a7:06:b6:fd:20:ca:ad:5f:
65:fa:8a:8a:7e:f2:51:b5:68:10:f1:b4:e9:d7:eb:
6f:8d:e8:08:ac:ac:2d:9f:f5:7e:d7:ef:5d:fd:fa:
40:8c:b9:39:1f:3e:04:4d:65:7b:a5:fb:9e:0d:d1:
b5:66:63:e9:7e:c7:3c:60:40:ed:6d:b6:fc:f1:9a:
0b:80:c1:f1:98:5e:4d:a3:4f:80:f3:e8:0c:3a:54:
d1:b0:ea:24:32:1d:d1
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
D5:D5:0C:BC:AD:B9:9F:72:C8:7C:F5:BB:BE:C2:9B:C5:E0:DD:45:8B
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:f7:63:25:c6:2f:bb:67:14:33:76:76:6d:
39:6c:ce:77:46:c2:02:88:fd:43:cc:74:03:18:f6:7c:6d:54:
6e:c5:ee:20:91:92:52:61:4e:f6:b5:1c:6b:9c:9b:b4:0b:02:
31:00:8b:79:62:5d:a2:6f:fd:08:3e:09:ae:04:6f:40:19:b2:
65:51:54:22:48:15:90:01:7e:41:f7:4d:44:bb:15:ed:d5:b9:
21:d6:d6:63:ad:7a:e4:76:19:a2:2a:ec:fe:0e
3,911,910 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,947,253 >>> mbox cmd response: success
6,960,457 UART:
6,960,473 UART: Running Caliptra FMC ...
6,960,881 UART:
6,961,024 UART: [state] CFI Enabled
7,050,659 UART: [art] Extend RT PCRs Done
7,051,087 UART: [art] Lock RT PCRs Done
7,052,076 UART: [art] Populate DV Done
7,060,180 UART: [fht] FMC Alias Private Key: 7
7,061,146 UART: [art] Derive CDI
7,061,426 UART: [art] Store in slot 0x4
7,147,173 UART: [art] Derive Key Pair
7,147,533 UART: [art] Store priv key in slot 0x5
7,161,225 UART: [art] Derive Key Pair - Done
7,176,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,191,586 UART: [art] Erasing AUTHORITY.KEYID = 7
7,192,351 UART: [art] PUB.X = 9F461B43D605D67B0C12902D05BB080825BC0C2DF7365935780E26E9CA26AE4E0BFACF214AD0E86F306CDC1957864C3C
7,199,105 UART: [art] PUB.Y = 1347C7EB30EC4CE9DBB5E84E48A1360F728812F85BE67B67D1FCA8EB7A7CC2D4F2A65C1308941D06D1AB1DC284E5D669
7,206,062 UART: [art] SIG.R = CDEFACD1C1502EAD0398D0CA5AD44BBC1E50617098AF303377176C5F297661F26619BADFA51D123E4996E672558D05B7
7,212,834 UART: [art] SIG.S = 1A567DD6786337995C0652E91C97992C570D073ED30DFFA768EF602E85351C6E5086C0F809C2F4E972EA3C70C5BFA6E6
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
16:c0:4f:2d:ec:1b:bd:36:56:5a:6d:a6:2c:04:25:78:7c:8b:a6:1d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=92C04F2DEC1BBD36565A6DA62C0425787C8BA61D6B9A9640F60293D7EA2D8A22
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:9f:46:1b:43:d6:05:d6:7b:0c:12:90:2d:05:bb:
08:08:25:bc:0c:2d:f7:36:59:35:78:0e:26:e9:ca:
26:ae:4e:0b:fa:cf:21:4a:d0:e8:6f:30:6c:dc:19:
57:86:4c:3c:13:47:c7:eb:30:ec:4c:e9:db:b5:e8:
4e:48:a1:36:0f:72:88:12:f8:5b:e6:7b:67:d1:fc:
a8:eb:7a:7c:c2:d4:f2:a6:5c:13:08:94:1d:06:d1:
ab:1d:c2:84:e5:d6:69
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
92:C0:4F:2D:EC:1B:BD:36:56:5A:6D:A6:2C:04:25:78:7C:8B:A6:1D
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:cd:ef:ac:d1:c1:50:2e:ad:03:98:d0:ca:5a:
d4:4b:bc:1e:50:61:70:98:af:30:33:77:17:6c:5f:29:76:61:
f2:66:19:ba:df:a5:1d:12:3e:49:96:e6:72:55:8d:05:b7:02:
30:1a:56:7d:d6:78:63:37:99:5c:06:52:e9:1c:97:99:2c:57:
0d:07:3e:d3:0d:ff:a7:68:ef:60:2e:85:35:1c:6e:50:86:c0:
f8:09:c2:f4:e9:72:ea:3c:70:c5:bf:a6:e6
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,061 UART:
192,426 UART: Running Caliptra ROM ...
193,604 UART:
193,755 UART: [state] CFI Enabled
263,509 UART: [state] LifecycleState = Unprovisioned
265,491 UART: [state] DebugLocked = No
267,202 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
426,142 UART: [kat] SHA2-256
441,799 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,328 UART: [kat] ++
452,814 UART: [kat] sha1
462,938 UART: [kat] SHA2-256
465,633 UART: [kat] SHA2-384
470,752 UART: [kat] SHA2-512-ACC
473,096 UART: [kat] ECC-384
2,768,266 UART: [kat] HMAC-384Kdf
2,799,138 UART: [kat] LMS
3,989,432 UART: [kat] --
3,992,613 UART: [cold-reset] ++
3,994,598 UART: [fht] Storing FHT @ 0x50003400
4,005,162 UART: [idev] ++
4,005,742 UART: [idev] CDI.KEYID = 6
4,006,690 UART: [idev] SUBJECT.KEYID = 7
4,007,986 UART: [idev] UDS.KEYID = 0
4,033,021 UART: [idev] Erasing UDS.KEYID = 0
7,342,550 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,790 UART: [idev] --
7,370,116 UART: [ldev] ++
7,370,689 UART: [ldev] CDI.KEYID = 6
7,371,708 UART: [ldev] SUBJECT.KEYID = 5
7,372,873 UART: [ldev] AUTHORITY.KEYID = 7
7,374,107 UART: [ldev] FE.KEYID = 1
7,421,772 UART: [ldev] Erasing FE.KEYID = 1
10,751,927 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,057,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,072,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,087,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,101,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,121,125 UART: [ldev] --
13,125,059 UART: [fwproc] Waiting for Commands...
13,128,363 UART: [fwproc] Received command 0x46574c44
13,130,559 UART: [fwproc] Received Image of size 118548 bytes
17,230,261 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,305,754 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,950 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,707,680 >>> mbox cmd response: success
17,712,444 UART: [afmc] ++
17,713,034 UART: [afmc] CDI.KEYID = 6
17,713,950 UART: [afmc] SUBJECT.KEYID = 7
17,715,212 UART: [afmc] AUTHORITY.KEYID = 5
21,078,551 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,381,039 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,383,320 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,397,762 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,412,473 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,426,908 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,449,862 UART: [afmc] --
23,453,722 UART: [cold-reset] --
23,456,611 UART: [state] Locking Datavault
23,460,402 UART: [state] Locking PCR0, PCR1 and PCR31
23,462,162 UART: [state] Locking ICCM
23,464,146 UART: [exit] Launching FMC @ 0x40000130
23,472,555 UART:
23,472,793 UART: Running Caliptra FMC ...
23,473,890 UART:
23,474,049 UART: [state] CFI Enabled
23,538,460 UART: [fht] FMC Alias Private Key: 7
25,878,986 UART: [art] Extend RT PCRs Done
25,880,325 UART: [art] Lock RT PCRs Done
25,881,841 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
191,595 UART:
191,962 UART: Running Caliptra ROM ...
193,106 UART:
193,250 UART: [state] CFI Enabled
261,143 UART: [state] LifecycleState = Unprovisioned
263,069 UART: [state] DebugLocked = Yes
264,867 UART: [state] Starting the Watchdog Timer 25610850 cycles
270,170 UART: [kat] SHA2-256
439,868 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,358 UART: [kat] ++
450,840 UART: [kat] sha1
461,001 UART: [kat] SHA2-256
463,670 UART: [kat] SHA2-384
468,809 UART: [kat] SHA2-512-ACC
471,170 UART: [kat] ECC-384
2,765,786 UART: [kat] HMAC-384Kdf
2,797,496 UART: [kat] LMS
3,987,799 UART: [kat] --
3,990,963 UART: [cold-reset] ++
3,992,898 UART: [fht] Storing FHT @ 0x50003400
4,003,520 UART: [idev] ++
4,004,114 UART: [idev] CDI.KEYID = 6
4,005,000 UART: [idev] SUBJECT.KEYID = 7
4,006,249 UART: [idev] UDS.KEYID = 0
4,007,220 ready_for_fw is high
4,007,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,156,476 UART: [idev] Erasing UDS.KEYID = 0
7,342,126 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,440 UART: [idev] --
7,369,702 UART: [ldev] ++
7,370,324 UART: [ldev] CDI.KEYID = 6
7,371,285 UART: [ldev] SUBJECT.KEYID = 5
7,372,490 UART: [ldev] AUTHORITY.KEYID = 7
7,373,722 UART: [ldev] FE.KEYID = 1
7,420,910 UART: [ldev] Erasing FE.KEYID = 1
10,751,150 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,873 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,060,452 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,075,089 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,089,412 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,109,001 UART: [ldev] --
13,112,970 UART: [fwproc] Waiting for Commands...
13,116,304 UART: [fwproc] Received command 0x46574c44
13,118,481 UART: [fwproc] Received Image of size 118548 bytes
17,218,130 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,293,629 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,366,829 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,695,575 >>> mbox cmd response: success
17,700,365 UART: [afmc] ++
17,701,008 UART: [afmc] CDI.KEYID = 6
17,701,936 UART: [afmc] SUBJECT.KEYID = 7
17,703,155 UART: [afmc] AUTHORITY.KEYID = 5
21,067,989 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,188 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,417 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
23,390,113 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
23,404,847 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
23,419,192 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
23,442,151 UART: [afmc] --
23,446,021 UART: [cold-reset] --
23,448,915 UART: [state] Locking Datavault
23,452,705 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,463 UART: [state] Locking ICCM
23,456,450 UART: [exit] Launching FMC @ 0x40000130
23,464,854 UART:
23,465,164 UART: Running Caliptra FMC ...
23,466,282 UART:
23,466,446 UART: [state] CFI Enabled
23,530,047 UART: [fht] FMC Alias Private Key: 7
25,870,604 UART: [art] Extend RT PCRs Done
25,871,827 UART: [art] Lock RT PCRs Done
25,873,423 UART: [art] Populate DV Done
25,878,841 UART: [fht] FMC Alias Private KeyFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002BA0error_internal_intr_r=00000040
25,883,352 UART: WDT Expired
25,883,908 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
271,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,957,508 >>> mbox cmd response: success
23,651,701 UART:
23,652,118 UART: Running Caliptra FMC ...
23,653,227 UART:
23,653,391 UART: [state] CFI Enabled
23,719,682 UART: [fht] FMC Alias Private Key: 7
26,060,081 UART: [art] Extend RT PCRs Done
26,061,337 UART: [art] Lock RT PCRs Done
26,062,945 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
3,801,597 ready_for_fw is high
3,801,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,956,018 >>> mbox cmd response: success
23,649,833 UART:
23,650,278 UART: Running Caliptra FMC ...
23,651,411 UART:
23,651,560 UART: [state] CFI Enabled
23,719,139 UART: [fht] FMC Alias Private Key: 7
26,059,604 UART: [art] Extend RT PCRs Done
26,060,828 UART: [art] Lock RT PCRsFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002BA0error_internal_intr_r=00000040
26,065,063 UART: WDT Expired
26,065,628 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,499 UART:
192,835 UART: Running Caliptra ROM ...
193,944 UART:
603,592 UART: [state] CFI Enabled
620,943 UART: [state] LifecycleState = Unprovisioned
622,854 UART: [state] DebugLocked = No
625,777 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
635,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
784,679 UART: [kat] SHA2-256
800,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,003 UART: [kat] ++
811,456 UART: [kat] sha1
822,191 UART: [kat] SHA2-256
824,880 UART: [kat] SHA2-384
830,429 UART: [kat] SHA2-512-ACC
832,821 UART: [kat] ECC-384
3,118,209 UART: [kat] HMAC-384Kdf
3,130,225 UART: [kat] LMS
4,320,348 UART: [kat] --
4,324,338 UART: [cold-reset] ++
4,325,901 UART: [fht] Storing FHT @ 0x50003400
4,336,796 UART: [idev] ++
4,337,363 UART: [idev] CDI.KEYID = 6
4,338,331 UART: [idev] SUBJECT.KEYID = 7
4,339,547 UART: [idev] UDS.KEYID = 0
4,355,359 UART: [idev] Erasing UDS.KEYID = 0
7,628,253 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,122 UART: [idev] --
7,654,296 UART: [ldev] ++
7,654,900 UART: [ldev] CDI.KEYID = 6
7,655,786 UART: [ldev] SUBJECT.KEYID = 5
7,657,061 UART: [ldev] AUTHORITY.KEYID = 7
7,658,298 UART: [ldev] FE.KEYID = 1
7,670,160 UART: [ldev] Erasing FE.KEYID = 1
10,956,649 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,313 UART: [ldev] --
13,316,419 UART: [fwproc] Waiting for Commands...
13,318,895 UART: [fwproc] Received command 0x46574c44
13,321,079 UART: [fwproc] Received Image of size 118548 bytes
17,416,142 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,489,576 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,562,750 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,892,172 >>> mbox cmd response: success
17,897,009 UART: [afmc] ++
17,897,634 UART: [afmc] CDI.KEYID = 6
17,898,715 UART: [afmc] SUBJECT.KEYID = 7
17,899,818 UART: [afmc] AUTHORITY.KEYID = 5
21,217,084 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,710 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,975 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,528,383 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,543,095 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,557,543 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,567 UART: [afmc] --
23,582,960 UART: [cold-reset] --
23,587,541 UART: [state] Locking Datavault
23,592,759 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,522 UART: [state] Locking ICCM
23,596,831 UART: [exit] Launching FMC @ 0x40000130
23,605,241 UART:
23,605,477 UART: Running Caliptra FMC ...
23,606,577 UART:
23,606,732 UART: [state] CFI Enabled
23,614,885 UART: [fht] FMC Alias Private Key: 7
25,955,003 UART: [art] Extend RT PCRs Done
25,956,232 UART: [art] Lock RT PCRs Done
25,957,748 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
191,829 UART:
192,179 UART: Running Caliptra ROM ...
193,350 UART:
602,876 UART: [state] CFI Enabled
620,173 UART: [state] LifecycleState = Unprovisioned
622,150 UART: [state] DebugLocked = Yes
625,072 UART: [state] Starting the Watchdog Timer 25328127 cycles
630,457 UART: [kat] SHA2-256
800,257 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,748 UART: [kat] ++
811,317 UART: [kat] sha1
821,911 UART: [kat] SHA2-256
824,640 UART: [kat] SHA2-384
830,202 UART: [kat] SHA2-512-ACC
832,567 UART: [kat] ECC-384
3,117,928 UART: [kat] HMAC-384Kdf
3,129,945 UART: [kat] LMS
4,320,137 UART: [kat] --
4,324,083 UART: [cold-reset] ++
4,325,733 UART: [fht] Storing FHT @ 0x50003400
4,336,562 UART: [idev] ++
4,337,132 UART: [idev] CDI.KEYID = 6
4,338,079 UART: [idev] SUBJECT.KEYID = 7
4,339,324 UART: [idev] UDS.KEYID = 0
4,340,290 ready_for_fw is high
4,340,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,371 UART: [idev] Erasing UDS.KEYID = 0
7,628,059 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,912 UART: [idev] --
7,654,097 UART: [ldev] ++
7,654,679 UART: [ldev] CDI.KEYID = 6
7,655,655 UART: [ldev] SUBJECT.KEYID = 5
7,656,865 UART: [ldev] AUTHORITY.KEYID = 7
7,658,092 UART: [ldev] FE.KEYID = 1
7,669,980 UART: [ldev] Erasing FE.KEYID = 1
10,956,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,956 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,263,461 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,278,146 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,292,473 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,310,856 UART: [ldev] --
13,315,968 UART: [fwproc] Waiting for Commands...
13,318,435 UART: [fwproc] Received command 0x46574c44
13,320,669 UART: [fwproc] Received Image of size 118548 bytes
17,415,731 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,489,194 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,562,419 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,891,832 >>> mbox cmd response: success
17,896,703 UART: [afmc] ++
17,897,292 UART: [afmc] CDI.KEYID = 6
17,898,205 UART: [afmc] SUBJECT.KEYID = 7
17,899,420 UART: [afmc] AUTHORITY.KEYID = 5
21,216,742 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,350 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,602 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
23,528,239 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
23,542,942 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
23,557,268 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
23,579,320 UART: [afmc] --
23,582,708 UART: [cold-reset] --
23,587,272 UART: [state] Locking Datavault
23,592,466 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,226 UART: [state] Locking ICCM
23,596,594 UART: [exit] Launching FMC @ 0x40000130
23,604,987 UART:
23,605,224 UART: Running Caliptra FMC ...
23,606,325 UART:
23,606,481 UART: [state] CFI Enabled
23,614,636 UART: [fht] FMC Alias Private Key: 7
25,954,803 UART: [art] Extend RT PCRs Done
25,956,022 UART: [art] Lock RT PCRs Done
25,957,378 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000298Aerror_internal_intr_r=00000040
25,960,872 UART: WDT Expired
25,961,451 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
626,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,339 >>> mbox cmd response: success
23,795,473 UART:
23,795,942 UART: Running Caliptra FMC ...
23,797,058 UART:
23,797,214 UART: [state] CFI Enabled
23,805,195 UART: [fht] FMC Alias Private Key: 7
26,145,169 UART: [art] Extend RT PCRs Done
26,146,412 UART: [art] Lock RT PCRs Done
26,147,941 UART: [art] Populate DV Done
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
4,131,714 ready_for_fw is high
4,132,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,619 >>> mbox cmd response: success
23,795,720 UART:
23,796,107 UART: Running Caliptra FMC ...
23,797,430 UART:
23,797,601 UART: [state] CFI Enabled
23,805,460 UART: [fht] FMC Alias Private Key: 7
26,145,542 UART: [art] Extend RT PCRs Done
26,146,771 UART: [art] Lock RT PCRs Done
26,148,371 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B7Aerror_internal_intr_r=00000040
26,151,930 UART: WDT Expired
26,152,488 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
192,254 UART:
192,611 UART: Running Caliptra ROM ...
193,789 UART:
193,946 UART: [state] CFI Enabled
262,497 UART: [state] LifecycleState = Unprovisioned
264,421 UART: [state] DebugLocked = No
266,133 UART: [state] WD Timer not started. Device not locked for debugging
274,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
423,510 UART: [kat] SHA2-256
449,658 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,459 UART: [kat] ++
460,998 UART: [kat] sha1
471,023 UART: [kat] SHA2-256
473,764 UART: [kat] SHA2-384
478,845 UART: [kat] SHA2-512-ACC
481,246 UART: [kat] ECC-384
2,926,468 UART: [kat] HMAC-384Kdf
2,949,405 UART: [kat] LMS
3,425,928 UART: [kat] --
3,430,273 UART: [cold-reset] ++
3,432,163 UART: [fht] FHT @ 0x50003400
3,444,175 UART: [idev] ++
3,444,746 UART: [idev] CDI.KEYID = 6
3,445,764 UART: [idev] SUBJECT.KEYID = 7
3,446,929 UART: [idev] UDS.KEYID = 0
3,479,225 UART: [idev] Erasing UDS.KEYID = 0
5,964,119 UART: [idev] Sha1 KeyId Algorithm
5,986,937 UART: [idev] --
5,993,114 UART: [ldev] ++
5,993,695 UART: [ldev] CDI.KEYID = 6
5,994,647 UART: [ldev] SUBJECT.KEYID = 5
5,995,818 UART: [ldev] AUTHORITY.KEYID = 7
5,997,116 UART: [ldev] FE.KEYID = 1
6,036,439 UART: [ldev] Erasing FE.KEYID = 1
8,552,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,292,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,308,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,324,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,339,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,361,230 UART: [ldev] --
10,366,342 UART: [fwproc] Wait for Commands...
10,368,715 UART: [fwproc] Recv command 0x46574c44
10,370,704 UART: [fwproc] Recv'd Img size: 118548 bytes
13,848,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,927,817 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,000,824 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,328,543 >>> mbox cmd response: success
14,332,827 UART: [afmc] ++
14,333,416 UART: [afmc] CDI.KEYID = 6
14,334,308 UART: [afmc] SUBJECT.KEYID = 7
14,335,580 UART: [afmc] AUTHORITY.KEYID = 5
16,869,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,608,254 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,610,496 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,626,288 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,642,325 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,657,917 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,681,903 UART: [afmc] --
18,686,095 UART: [cold-reset] --
18,690,557 UART: [state] Locking Datavault
18,696,079 UART: [state] Locking PCR0, PCR1 and PCR31
18,697,940 UART: [state] Locking ICCM
18,698,856 UART: [exit] Launching FMC @ 0x40000130
18,707,260 UART:
18,707,501 UART: Running Caliptra FMC ...
18,708,604 UART:
18,708,763 UART: [state] CFI Enabled
18,766,639 UART: [fht] FMC Alias Private Key: 7
20,532,635 UART: [art] Extend RT PCRs Done
20,533,890 UART: [art] Lock RT PCRs Done
20,535,705 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
191,628 UART:
192,006 UART: Running Caliptra ROM ...
193,171 UART:
193,323 UART: [state] CFI Enabled
260,862 UART: [state] LifecycleState = Unprovisioned
262,796 UART: [state] DebugLocked = Yes
264,582 UART: [state] Starting the WD Timer 20266831 cycles
269,531 UART: [kat] SHA2-256
449,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,993 UART: [kat] ++
460,572 UART: [kat] sha1
470,535 UART: [kat] SHA2-256
473,268 UART: [kat] SHA2-384
478,360 UART: [kat] SHA2-512-ACC
480,708 UART: [kat] ECC-384
2,945,335 UART: [kat] HMAC-384Kdf
2,967,480 UART: [kat] LMS
3,444,034 UART: [kat] --
3,448,384 UART: [cold-reset] ++
3,450,251 UART: [fht] FHT @ 0x50003400
3,462,245 UART: [idev] ++
3,462,896 UART: [idev] CDI.KEYID = 6
3,463,808 UART: [idev] SUBJECT.KEYID = 7
3,465,054 UART: [idev] UDS.KEYID = 0
3,465,961 ready_for_fw is high
3,466,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,230 UART: [idev] Erasing UDS.KEYID = 0
5,982,841 UART: [idev] Sha1 KeyId Algorithm
6,005,639 UART: [idev] --
6,011,829 UART: [ldev] ++
6,012,417 UART: [ldev] CDI.KEYID = 6
6,013,334 UART: [ldev] SUBJECT.KEYID = 5
6,014,557 UART: [ldev] AUTHORITY.KEYID = 7
6,015,850 UART: [ldev] FE.KEYID = 1
6,054,361 UART: [ldev] Erasing FE.KEYID = 1
8,557,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,616 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,312,460 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,328,318 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,344,075 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,365,611 UART: [ldev] --
10,370,723 UART: [fwproc] Wait for Commands...
10,373,035 UART: [fwproc] Recv command 0x46574c44
10,375,084 UART: [fwproc] Recv'd Img size: 118548 bytes
13,852,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,932,119 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,005,138 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,332,908 >>> mbox cmd response: success
14,337,142 UART: [afmc] ++
14,337,742 UART: [afmc] CDI.KEYID = 6
14,338,720 UART: [afmc] SUBJECT.KEYID = 7
14,339,940 UART: [afmc] AUTHORITY.KEYID = 5
16,872,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,611,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,613,712 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
18,629,491 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
18,645,540 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
18,661,301 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
18,685,212 UART: [afmc] --
18,689,437 UART: [cold-reset] --
18,693,901 UART: [state] Locking Datavault
18,699,422 UART: [state] Locking PCR0, PCR1 and PCR31
18,701,126 UART: [state] Locking ICCM
18,702,175 UART: [exit] Launching FMC @ 0x40000130
18,710,574 UART:
18,710,820 UART: Running Caliptra FMC ...
18,711,850 UART:
18,711,999 UART: [state] CFI Enabled
18,769,797 UART: [fht] FMC Alias Private Key: 7
20,535,177 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Aerror_internal_intr_r=00000040
20,538,748 UART: WDT Expired
20,539,320 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
269,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,237,760 >>> mbox cmd response: success
18,512,111 UART:
18,512,508 UART: Running Caliptra FMC ...
18,513,646 UART:
18,513,816 UART: [state] CFI Enabled
18,581,032 UART: [fht] FMC Alias Private Key: 7
20,346,927 UART: [art] Extend RT PCRs Done
20,348,151 UART: [art] Lock RT PCRs Done
20,349,996 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,458,333 ready_for_fw is high
3,458,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,233,490 >>> mbox cmd response: success
18,508,137 UART:
18,508,517 UART: Running Caliptra FMC ...
18,509,666 UART:
18,509,829 UART: [state] CFI Enabled
18,578,507 UART: [fht] FMC Alias Private Key: 7
20,344,451 UART: [art] Extend RT PCRs Done
20,345,705 UART: [art] Lock RT PCRs Done
20,347,532 UART: [art] Populate DV Done
20,349,720 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002C5Cerror_internal_intr_r=00000040
20,353,216 UART: WDT Expired
20,353,780 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,541 UART:
192,911 UART: Running Caliptra ROM ...
193,997 UART:
603,823 UART: [state] CFI Enabled
620,932 UART: [state] LifecycleState = Unprovisioned
622,828 UART: [state] DebugLocked = No
625,693 UART: [state] WD Timer not started. Device not locked for debugging
633,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
783,656 UART: [kat] SHA2-256
809,341 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,143 UART: [kat] ++
820,666 UART: [kat] sha1
831,283 UART: [kat] SHA2-256
833,968 UART: [kat] SHA2-384
839,569 UART: [kat] SHA2-512-ACC
841,906 UART: [kat] ECC-384
3,284,797 UART: [kat] HMAC-384Kdf
3,297,272 UART: [kat] LMS
3,773,806 UART: [kat] --
3,777,963 UART: [cold-reset] ++
3,779,517 UART: [fht] FHT @ 0x50003400
3,792,167 UART: [idev] ++
3,792,789 UART: [idev] CDI.KEYID = 6
3,793,672 UART: [idev] SUBJECT.KEYID = 7
3,794,955 UART: [idev] UDS.KEYID = 0
3,809,489 UART: [idev] Erasing UDS.KEYID = 0
6,272,979 UART: [idev] Sha1 KeyId Algorithm
6,297,063 UART: [idev] --
6,302,442 UART: [ldev] ++
6,303,024 UART: [ldev] CDI.KEYID = 6
6,303,932 UART: [ldev] SUBJECT.KEYID = 5
6,305,145 UART: [ldev] AUTHORITY.KEYID = 7
6,306,378 UART: [ldev] FE.KEYID = 1
6,317,565 UART: [ldev] Erasing FE.KEYID = 1
8,793,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,116 UART: [ldev] --
10,588,107 UART: [fwproc] Wait for Commands...
10,589,722 UART: [fwproc] Recv command 0x46574c44
10,591,708 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,407 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,432 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,545,429 >>> mbox cmd response: success
14,548,687 UART: [afmc] ++
14,549,328 UART: [afmc] CDI.KEYID = 6
14,550,236 UART: [afmc] SUBJECT.KEYID = 7
14,551,451 UART: [afmc] AUTHORITY.KEYID = 5
17,059,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,637 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,826 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,644 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,815,726 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,286 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,096 UART: [afmc] --
18,858,947 UART: [cold-reset] --
18,864,264 UART: [state] Locking Datavault
18,870,867 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,571 UART: [state] Locking ICCM
18,873,997 UART: [exit] Launching FMC @ 0x40000130
18,882,445 UART:
18,882,683 UART: Running Caliptra FMC ...
18,883,783 UART:
18,883,941 UART: [state] CFI Enabled
18,891,987 UART: [fht] FMC Alias Private Key: 7
20,657,609 UART: [art] Extend RT PCRs Done
20,658,822 UART: [art] Lock RT PCRs Done
20,660,440 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
191,892 UART:
192,249 UART: Running Caliptra ROM ...
193,348 UART:
603,185 UART: [state] CFI Enabled
620,276 UART: [state] LifecycleState = Unprovisioned
622,217 UART: [state] DebugLocked = Yes
625,190 UART: [state] Starting the WD Timer 20031909 cycles
630,201 UART: [kat] SHA2-256
809,871 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,686 UART: [kat] ++
821,185 UART: [kat] sha1
831,773 UART: [kat] SHA2-256
834,499 UART: [kat] SHA2-384
840,060 UART: [kat] SHA2-512-ACC
842,457 UART: [kat] ECC-384
3,285,289 UART: [kat] HMAC-384Kdf
3,297,824 UART: [kat] LMS
3,774,315 UART: [kat] --
3,778,508 UART: [cold-reset] ++
3,780,018 UART: [fht] FHT @ 0x50003400
3,792,696 UART: [idev] ++
3,793,260 UART: [idev] CDI.KEYID = 6
3,794,287 UART: [idev] SUBJECT.KEYID = 7
3,795,455 UART: [idev] UDS.KEYID = 0
3,796,502 ready_for_fw is high
3,796,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,539 UART: [idev] Erasing UDS.KEYID = 0
6,273,468 UART: [idev] Sha1 KeyId Algorithm
6,297,605 UART: [idev] --
6,302,938 UART: [ldev] ++
6,303,525 UART: [ldev] CDI.KEYID = 6
6,304,542 UART: [ldev] SUBJECT.KEYID = 5
6,305,643 UART: [ldev] AUTHORITY.KEYID = 7
6,306,931 UART: [ldev] FE.KEYID = 1
6,318,113 UART: [ldev] Erasing FE.KEYID = 1
8,794,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,154 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,529,976 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,545,795 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,561,532 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,582,828 UART: [ldev] --
10,588,801 UART: [fwproc] Wait for Commands...
10,590,411 UART: [fwproc] Recv command 0x46574c44
10,592,393 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,084 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,111 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,125 >>> mbox cmd response: success
14,549,415 UART: [afmc] ++
14,550,036 UART: [afmc] CDI.KEYID = 6
14,550,952 UART: [afmc] SUBJECT.KEYID = 7
14,552,169 UART: [afmc] AUTHORITY.KEYID = 5
17,059,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,284 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,472 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
18,800,209 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
18,816,302 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
18,832,040 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
18,856,783 UART: [afmc] --
18,859,643 UART: [cold-reset] --
18,864,973 UART: [state] Locking Datavault
18,871,567 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,294 UART: [state] Locking ICCM
18,874,689 UART: [exit] Launching FMC @ 0x40000130
18,883,082 UART:
18,883,322 UART: Running Caliptra FMC ...
18,884,422 UART:
18,884,582 UART: [state] CFI Enabled
18,892,681 UART: [fht] FMC Alias Private Key: 7
20,658,355 UART: [art] Extend RT PCRs Done
20,659,581 UART: [art] Lock RT PCRs Done
20,660,931 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Aerror_internal_intr_r=00000040
20,664,416 UART: WDT Expired
20,664,973 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
626,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,704 >>> mbox cmd response: success
18,692,521 UART:
18,692,942 UART: Running Caliptra FMC ...
18,694,046 UART:
18,694,205 UART: [state] CFI Enabled
18,702,127 UART: [fht] FMC Alias Private Key: 7
20,467,627 UART: [art] Extend RT PCRs Done
20,468,849 UART: [art] Lock RT PCRs Done
20,470,476 UART: [art] Populate DV Done
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
3,785,235 ready_for_fw is high
3,785,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,189 >>> mbox cmd response: success
18,692,984 UART:
18,693,379 UART: Running Caliptra FMC ...
18,694,527 UART:
18,694,682 UART: [state] CFI Enabled
18,702,616 UART: [fht] FMC Alias Private Key: 7
20,468,209 UART: [art] Extend RT PCRs Done
20,469,432 UART: [art] Lock RT PCRs Done
20,470,945 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Cerror_internal_intr_r=00000040
20,474,515 UART: WDT Expired
20,475,077 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,209 UART:
192,592 UART: Running Caliptra ROM ...
193,702 UART:
193,846 UART: [state] CFI Enabled
264,278 UART: [state] LifecycleState = Unprovisioned
266,687 UART: [state] DebugLocked = No
268,338 UART: [state] WD Timer not started. Device not locked for debugging
277,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
426,635 UART: [kat] SHA2-256
462,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,624 UART: [kat] ++
474,152 UART: [kat] sha1
484,660 UART: [kat] SHA2-256
487,675 UART: [kat] SHA2-384
492,963 UART: [kat] SHA2-512-ACC
495,516 UART: [kat] ECC-384
2,949,393 UART: [kat] HMAC-384Kdf
2,972,697 UART: [kat] LMS
3,504,452 UART: [kat] --
3,508,764 UART: [cold-reset] ++
3,510,693 UART: [fht] FHT @ 0x50003400
3,522,807 UART: [idev] ++
3,523,481 UART: [idev] CDI.KEYID = 6
3,524,495 UART: [idev] SUBJECT.KEYID = 7
3,526,288 UART: [idev] UDS.KEYID = 0
3,544,882 UART: [idev] Erasing UDS.KEYID = 0
6,028,643 UART: [idev] Sha1 KeyId Algorithm
6,050,205 UART: [idev] --
6,056,359 UART: [ldev] ++
6,057,040 UART: [ldev] CDI.KEYID = 6
6,057,947 UART: [ldev] SUBJECT.KEYID = 5
6,059,106 UART: [ldev] AUTHORITY.KEYID = 7
6,060,332 UART: [ldev] FE.KEYID = 1
6,101,991 UART: [ldev] Erasing FE.KEYID = 1
8,604,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,229 UART: [ldev] --
10,415,370 UART: [fwproc] Wait for Commands...
10,417,633 UART: [fwproc] Recv command 0x46574c44
10,419,917 UART: [fwproc] Recv'd Img size: 118548 bytes
13,910,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,972 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,598 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,672,302 >>> mbox cmd response: success
14,676,529 UART: [afmc] ++
14,677,277 UART: [afmc] CDI.KEYID = 6
14,678,390 UART: [afmc] SUBJECT.KEYID = 7
14,679,929 UART: [afmc] AUTHORITY.KEYID = 5
17,215,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,955,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,957,931 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,030 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,988,157 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,052 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,245 UART: [afmc] --
19,030,233 UART: [cold-reset] --
19,034,861 UART: [state] Locking Datavault
19,040,546 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,736 UART: [state] Locking ICCM
19,044,002 UART: [exit] Launching FMC @ 0x40000130
19,052,315 UART:
19,052,557 UART: Running Caliptra FMC ...
19,053,597 UART:
19,053,745 UART: [state] CFI Enabled
19,114,374 UART: [fht] FMC Alias Private Key: 7
20,880,390 UART: [art] Extend RT PCRs Done
20,881,608 UART: [art] Lock RT PCRs Done
20,883,472 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
191,548 UART:
191,898 UART: Running Caliptra ROM ...
192,968 UART:
193,107 UART: [state] CFI Enabled
262,260 UART: [state] LifecycleState = Unprovisioned
264,622 UART: [state] DebugLocked = Yes
266,675 UART: [state] Starting the WD Timer 20611621 cycles
271,751 UART: [kat] SHA2-256
461,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,421 UART: [kat] ++
472,977 UART: [kat] sha1
483,562 UART: [kat] SHA2-256
486,575 UART: [kat] SHA2-384
491,783 UART: [kat] SHA2-512-ACC
494,367 UART: [kat] ECC-384
2,946,649 UART: [kat] HMAC-384Kdf
2,970,186 UART: [kat] LMS
3,501,930 UART: [kat] --
3,506,303 UART: [cold-reset] ++
3,508,160 UART: [fht] FHT @ 0x50003400
3,520,342 UART: [idev] ++
3,521,049 UART: [idev] CDI.KEYID = 6
3,521,962 UART: [idev] SUBJECT.KEYID = 7
3,523,223 UART: [idev] UDS.KEYID = 0
3,524,146 ready_for_fw is high
3,524,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,390 UART: [idev] Erasing UDS.KEYID = 0
6,026,819 UART: [idev] Sha1 KeyId Algorithm
6,048,432 UART: [idev] --
6,054,682 UART: [ldev] ++
6,055,354 UART: [ldev] CDI.KEYID = 6
6,056,259 UART: [ldev] SUBJECT.KEYID = 5
6,057,463 UART: [ldev] AUTHORITY.KEYID = 7
6,058,691 UART: [ldev] FE.KEYID = 1
6,099,193 UART: [ldev] Erasing FE.KEYID = 1
8,602,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,903 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,093 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,159 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,386,182 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,111 UART: [ldev] --
10,412,260 UART: [fwproc] Wait for Commands...
10,414,517 UART: [fwproc] Recv command 0x46574c44
10,416,500 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,548 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,109,170 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,668,925 >>> mbox cmd response: success
14,673,151 UART: [afmc] ++
14,673,854 UART: [afmc] CDI.KEYID = 6
14,675,097 UART: [afmc] SUBJECT.KEYID = 7
14,676,535 UART: [afmc] AUTHORITY.KEYID = 5
17,211,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,931,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,933,006 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
18,948,201 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
18,963,414 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
18,978,454 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
19,001,812 UART: [afmc] --
19,005,833 UART: [cold-reset] --
19,010,402 UART: [state] Locking Datavault
19,016,095 UART: [state] Locking PCR0, PCR1 and PCR31
19,018,290 UART: [state] Locking ICCM
19,019,256 UART: [exit] Launching FMC @ 0x40000130
19,027,598 UART:
19,027,835 UART: Running Caliptra FMC ...
19,028,936 UART:
19,029,091 UART: [state] CFI Enabled
19,090,381 UART: [fht] FMC Alias Private Key: 7
20,856,463 UART: [art] Extend RT PCRs Done
20,857,676 UART: [art] Lock RT PCRs Done
20,859,506 UART: [art] Populate DV Done
20,865,027 UART: [fht] FMC Alias Private Key: 7
20,866,572 UART: [art] Derive CDI
20,867,333 UART: [art] Store in slot 0x4
20,882,273 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002C30error_internal_intr_r=00000040
20,885,758 UART: WDT Expired
20,886,310 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
269,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,793,663 >>> mbox cmd response: success
19,087,593 UART:
19,088,000 UART: Running Caliptra FMC ...
19,089,112 UART:
19,089,274 UART: [state] CFI Enabled
19,157,290 UART: [fht] FMC Alias Private Key: 7
20,923,161 UART: [art] Extend RT PCRs Done
20,924,391 UART: [art] Lock RT PCRs Done
20,926,242 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,437,171 ready_for_fw is high
3,437,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,814,246 >>> mbox cmd response: success
19,107,645 UART:
19,108,053 UART: Running Caliptra FMC ...
19,109,375 UART:
19,109,551 UART: [state] CFI Enabled
19,178,120 UART: [fht] FMC Alias Private Key: 7
20,925,789 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002C72error_internal_intr_r=00000040
20,929,418 UART: WDT Expired
20,929,987 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,465 UART:
192,817 UART: Running Caliptra ROM ...
193,889 UART:
603,679 UART: [state] CFI Enabled
620,647 UART: [state] LifecycleState = Unprovisioned
623,020 UART: [state] DebugLocked = No
625,857 UART: [state] WD Timer not started. Device not locked for debugging
634,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
783,911 UART: [kat] SHA2-256
820,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,243 UART: [kat] ++
831,830 UART: [kat] sha1
842,877 UART: [kat] SHA2-256
845,886 UART: [kat] SHA2-384
851,591 UART: [kat] SHA2-512-ACC
854,203 UART: [kat] ECC-384
3,296,996 UART: [kat] HMAC-384Kdf
3,310,223 UART: [kat] LMS
3,842,047 UART: [kat] --
3,846,181 UART: [cold-reset] ++
3,847,739 UART: [fht] FHT @ 0x50003400
3,860,522 UART: [idev] ++
3,861,245 UART: [idev] CDI.KEYID = 6
3,862,171 UART: [idev] SUBJECT.KEYID = 7
3,863,386 UART: [idev] UDS.KEYID = 0
3,877,801 UART: [idev] Erasing UDS.KEYID = 0
6,340,816 UART: [idev] Sha1 KeyId Algorithm
6,363,606 UART: [idev] --
6,368,896 UART: [ldev] ++
6,369,628 UART: [ldev] CDI.KEYID = 6
6,370,539 UART: [ldev] SUBJECT.KEYID = 5
6,371,697 UART: [ldev] AUTHORITY.KEYID = 7
6,372,930 UART: [ldev] FE.KEYID = 1
6,383,898 UART: [ldev] Erasing FE.KEYID = 1
8,859,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,841 UART: [ldev] --
10,650,820 UART: [fwproc] Wait for Commands...
10,652,371 UART: [fwproc] Recv command 0x46574c44
10,654,715 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,888 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,343,534 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,543 >>> mbox cmd response: success
14,906,754 UART: [afmc] ++
14,907,449 UART: [afmc] CDI.KEYID = 6
14,908,692 UART: [afmc] SUBJECT.KEYID = 7
14,910,131 UART: [afmc] AUTHORITY.KEYID = 5
17,417,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,365 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,444 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,610 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,497 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,676 UART: [afmc] --
19,213,196 UART: [cold-reset] --
19,218,640 UART: [state] Locking Datavault
19,225,407 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,604 UART: [state] Locking ICCM
19,229,221 UART: [exit] Launching FMC @ 0x40000130
19,237,903 UART:
19,238,139 UART: Running Caliptra FMC ...
19,239,243 UART:
19,239,404 UART: [state] CFI Enabled
19,247,447 UART: [fht] FMC Alias Private Key: 7
21,013,133 UART: [art] Extend RT PCRs Done
21,014,352 UART: [art] Lock RT PCRs Done
21,015,947 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
191,844 UART:
192,199 UART: Running Caliptra ROM ...
193,383 UART:
602,918 UART: [state] CFI Enabled
619,865 UART: [state] LifecycleState = Unprovisioned
622,297 UART: [state] DebugLocked = Yes
625,213 UART: [state] Starting the WD Timer 20386534 cycles
630,605 UART: [kat] SHA2-256
820,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,343 UART: [kat] ++
831,882 UART: [kat] sha1
842,968 UART: [kat] SHA2-256
845,979 UART: [kat] SHA2-384
851,690 UART: [kat] SHA2-512-ACC
854,265 UART: [kat] ECC-384
3,297,101 UART: [kat] HMAC-384Kdf
3,310,262 UART: [kat] LMS
3,842,081 UART: [kat] --
3,846,291 UART: [cold-reset] ++
3,847,793 UART: [fht] FHT @ 0x50003400
3,860,610 UART: [idev] ++
3,861,320 UART: [idev] CDI.KEYID = 6
3,862,202 UART: [idev] SUBJECT.KEYID = 7
3,863,458 UART: [idev] UDS.KEYID = 0
3,864,384 ready_for_fw is high
3,864,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,417 UART: [idev] Erasing UDS.KEYID = 0
6,340,847 UART: [idev] Sha1 KeyId Algorithm
6,363,748 UART: [idev] --
6,369,144 UART: [ldev] ++
6,369,818 UART: [ldev] CDI.KEYID = 6
6,370,752 UART: [ldev] SUBJECT.KEYID = 5
6,371,901 UART: [ldev] AUTHORITY.KEYID = 7
6,373,125 UART: [ldev] FE.KEYID = 1
6,384,134 UART: [ldev] Erasing FE.KEYID = 1
8,859,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,089 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,594,216 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,609,330 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,624,338 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,645,011 UART: [ldev] --
10,650,978 UART: [fwproc] Wait for Commands...
10,652,528 UART: [fwproc] Recv command 0x46574c44
10,654,410 UART: [fwproc] Recv'd Img size: 118548 bytes
14,140,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,688 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,343,350 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,371 >>> mbox cmd response: success
14,906,615 UART: [afmc] ++
14,907,333 UART: [afmc] CDI.KEYID = 6
14,908,444 UART: [afmc] SUBJECT.KEYID = 7
14,909,983 UART: [afmc] AUTHORITY.KEYID = 5
17,417,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,218 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
19,156,416 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
19,171,594 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
19,186,638 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
19,210,770 UART: [afmc] --
19,213,482 UART: [cold-reset] --
19,218,915 UART: [state] Locking Datavault
19,225,678 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,872 UART: [state] Locking ICCM
19,229,215 UART: [exit] Launching FMC @ 0x40000130
19,237,896 UART:
19,238,134 UART: Running Caliptra FMC ...
19,239,235 UART:
19,239,394 UART: [state] CFI Enabled
19,247,438 UART: [fht] FMC Alias Private Key: 7
21,013,207 UART: [art] Extend RT PCRs Done
21,014,437 UART: [art] Lock RT PCRs Done
21,016,000 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Aerror_internal_intr_r=00000040
21,019,493 UART: WDT Expired
21,020,250 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
625,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,407 >>> mbox cmd response: success
19,293,595 UART:
19,294,047 UART: Running Caliptra FMC ...
19,295,205 UART:
19,295,386 UART: [state] CFI Enabled
19,303,212 UART: [fht] FMC Alias Private Key: 7
21,068,774 UART: [art] Extend RT PCRs Done
21,069,997 UART: [art] Lock RT PCRs Done
21,071,573 UART: [art] Populate DV Done
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
3,760,977 ready_for_fw is high
3,761,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,769 >>> mbox cmd response: success
19,294,053 UART:
19,294,473 UART: Running Caliptra FMC ...
19,295,629 UART:
19,295,789 UART: [state] CFI Enabled
19,303,658 UART: [fht] FMC Alias Private Key: 7
21,069,258 UART: [art] Extend RT PCRs Done
21,070,509 UART: [art] Lock RT PCRs Done
21,072,005 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Cerror_internal_intr_r=00000040
21,075,577 UART: WDT Expired
21,076,138 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 118548 bytes
2,930,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,763 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,336 >>> mbox cmd response: success
3,130,556 UART: [afmc] ++
3,130,724 UART: [afmc] CDI.KEYID = 6
3,131,086 UART: [afmc] SUBJECT.KEYID = 7
3,131,511 UART: [afmc] AUTHORITY.KEYID = 5
3,165,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,468 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,248 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,957 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,840 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,523 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,597 UART: [afmc] --
3,209,605 UART: [cold-reset] --
3,210,299 UART: [state] Locking Datavault
3,211,252 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,856 UART: [state] Locking ICCM
3,212,412 UART: [exit] Launching FMC @ 0x40000130
3,217,742 UART:
3,217,758 UART: Running Caliptra FMC ...
3,218,166 UART:
3,218,220 UART: [state] CFI Enabled
3,228,588 UART: [fht] FMC Alias Private Key: 7
3,347,540 UART: [art] Extend RT PCRs Done
3,347,968 UART: [art] Lock RT PCRs Done
3,349,456 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3261959 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 118548 bytes
2,930,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,723 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,295 >>> mbox cmd response: success
3,130,512 UART: [afmc] ++
3,130,680 UART: [afmc] CDI.KEYID = 6
3,131,042 UART: [afmc] SUBJECT.KEYID = 7
3,131,467 UART: [afmc] AUTHORITY.KEYID = 5
3,165,873 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,421 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,201 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
3,188,907 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
3,194,782 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
3,200,481 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
3,208,562 UART: [afmc] --
3,209,569 UART: [cold-reset] --
3,210,263 UART: [state] Locking Datavault
3,211,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,820 UART: [state] Locking ICCM
3,212,376 UART: [exit] Launching FMC @ 0x40000130
3,217,706 UART:
3,217,722 UART: Running Caliptra FMC ...
3,218,130 UART:
3,218,184 UART: [state] CFI Enabled
3,228,554 UART: [fht] FMC Alias Private Key: 7
3,347,574 UART: [art] Extend RT PCRs Done
3,348,002 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,349,490 UART: [art] PFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002BA6error_internal_intr_r=00000040
3,351,776 UART: WDT Expired
3,351,985 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,972 >>> mbox cmd response: success
3,040,061 UART:
3,040,077 UART: Running Caliptra FMC ...
3,040,485 UART:
3,040,539 UART: [state] CFI Enabled
3,050,907 UART: [fht] FMC Alias Private Key: 7
3,169,859 UART: [art] Extend RT PCRs Done
3,170,287 UART: [art] Lock RT PCRs Done
3,171,775 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,219 >>> mbox cmd response: success
3,040,298 UART:
3,040,314 UART: Running Caliptra FMC ...
3,040,722 UART:
3,040,776 UART: [state] CFI Enabled
3,051,146 UART: [fht] FMC Alias Private Key: 7
3,170,166 UART: [art] Extend RT PCRs Done
3,170,594 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,172,082 UART: [art] FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B7Eerror_internal_intr_r=00000040
3,174,341 UART: WDT Expired
3,174,550 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 118548 bytes
2,931,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,828 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,046 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,495 >>> mbox cmd response: success
3,131,727 UART: [afmc] ++
3,131,895 UART: [afmc] CDI.KEYID = 6
3,132,257 UART: [afmc] SUBJECT.KEYID = 7
3,132,682 UART: [afmc] AUTHORITY.KEYID = 5
3,168,251 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,591 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,371 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,080 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,963 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,646 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,590 UART: [afmc] --
3,211,530 UART: [cold-reset] --
3,212,466 UART: [state] Locking Datavault
3,213,623 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,227 UART: [state] Locking ICCM
3,214,833 UART: [exit] Launching FMC @ 0x40000130
3,220,163 UART:
3,220,179 UART: Running Caliptra FMC ...
3,220,587 UART:
3,220,730 UART: [state] CFI Enabled
3,231,360 UART: [fht] FMC Alias Private Key: 7
3,350,136 UART: [art] Extend RT PCRs Done
3,350,564 UART: [art] Lock RT PCRs Done
3,351,866 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3263380 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 118548 bytes
2,931,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,788 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,006 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,454 >>> mbox cmd response: success
3,131,683 UART: [afmc] ++
3,131,851 UART: [afmc] CDI.KEYID = 6
3,132,213 UART: [afmc] SUBJECT.KEYID = 7
3,132,638 UART: [afmc] AUTHORITY.KEYID = 5
3,168,204 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,324 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
3,191,030 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
3,196,905 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
3,202,604 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
3,210,555 UART: [afmc] --
3,211,494 UART: [cold-reset] --
3,212,430 UART: [state] Locking Datavault
3,213,587 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,191 UART: [state] Locking ICCM
3,214,797 UART: [exit] Launching FMC @ 0x40000130
3,220,127 UART:
3,220,143 UART: Running Caliptra FMC ...
3,220,551 UART:
3,220,694 UART: [state] CFI Enabled
3,231,326 UART: [fht] FMC Alias Private Key: 7
3,350,170 UART: [art] Extend RT PCRs Done
3,350,598 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,351,900 UART: [art] PFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B8Aerror_internal_intr_r=00000040
3,354,178 UART: WDT Expired
3,354,387 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,131 >>> mbox cmd response: success
3,042,482 UART:
3,042,498 UART: Running Caliptra FMC ...
3,042,906 UART:
3,043,049 UART: [state] CFI Enabled
3,053,679 UART: [fht] FMC Alias Private Key: 7
3,172,455 UART: [art] Extend RT PCRs Done
3,172,883 UART: [art] Lock RT PCRs Done
3,174,185 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,378 >>> mbox cmd response: success
3,042,719 UART:
3,042,735 UART: Running Caliptra FMC ...
3,043,143 UART:
3,043,286 UART: [state] CFI Enabled
3,053,918 UART: [fht] FMC Alias Private Key: 7
3,172,762 UART: [art] Extend RT PCRs Done
3,173,190 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,174,492 UART: [art]FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B9Cerror_internal_intr_r=00000040
3,176,743 UART: WDT Expired
3,176,952 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,136 UART: [kat] ++
895,288 UART: [kat] sha1
899,398 UART: [kat] SHA2-256
901,338 UART: [kat] SHA2-384
903,979 UART: [kat] SHA2-512-ACC
905,880 UART: [kat] ECC-384
915,571 UART: [kat] HMAC-384Kdf
920,055 UART: [kat] LMS
1,168,367 UART: [kat] --
1,169,228 UART: [cold-reset] ++
1,169,700 UART: [fht] FHT @ 0x50003400
1,172,448 UART: [idev] ++
1,172,616 UART: [idev] CDI.KEYID = 6
1,172,977 UART: [idev] SUBJECT.KEYID = 7
1,173,402 UART: [idev] UDS.KEYID = 0
1,181,725 UART: [idev] Erasing UDS.KEYID = 0
1,198,267 UART: [idev] Sha1 KeyId Algorithm
1,207,019 UART: [idev] --
1,208,246 UART: [ldev] ++
1,208,414 UART: [ldev] CDI.KEYID = 6
1,208,778 UART: [ldev] SUBJECT.KEYID = 5
1,209,205 UART: [ldev] AUTHORITY.KEYID = 7
1,209,668 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,240,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,832 UART: [ldev] --
1,280,115 UART: [fwproc] Wait for Commands...
1,280,802 UART: [fwproc] Recv command 0x46574c44
1,281,535 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,203 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,378 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,579 >>> mbox cmd response: success
2,824,741 UART: [afmc] ++
2,824,909 UART: [afmc] CDI.KEYID = 6
2,825,272 UART: [afmc] SUBJECT.KEYID = 7
2,825,698 UART: [afmc] AUTHORITY.KEYID = 5
2,861,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,901 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,611 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,492 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,193 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,888 UART: [afmc] --
2,903,893 UART: [cold-reset] --
2,904,813 UART: [state] Locking Datavault
2,906,004 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,608 UART: [state] Locking ICCM
2,907,028 UART: [exit] Launching FMC @ 0x40000130
2,912,358 UART:
2,912,374 UART: Running Caliptra FMC ...
2,912,782 UART:
2,912,836 UART: [state] CFI Enabled
2,923,424 UART: [fht] FMC Alias Private Key: 7
3,041,792 UART: [art] Extend RT PCRs Done
3,042,220 UART: [art] Lock RT PCRs Done
3,043,952 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 2956854 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,267 UART: [kat] SHA2-512-ACC
906,168 UART: [kat] ECC-384
915,859 UART: [kat] HMAC-384Kdf
920,343 UART: [kat] LMS
1,168,655 UART: [kat] --
1,169,516 UART: [cold-reset] ++
1,169,987 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,174,035 ready_for_fw is high
1,174,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,009 UART: [idev] Erasing UDS.KEYID = 0
1,198,552 UART: [idev] Sha1 KeyId Algorithm
1,207,303 UART: [idev] --
1,208,528 UART: [ldev] ++
1,208,696 UART: [ldev] CDI.KEYID = 6
1,209,060 UART: [ldev] SUBJECT.KEYID = 5
1,209,487 UART: [ldev] AUTHORITY.KEYID = 7
1,209,950 UART: [ldev] FE.KEYID = 1
1,215,208 UART: [ldev] Erasing FE.KEYID = 1
1,241,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,737 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,431 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,301 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,007 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,071 UART: [ldev] --
1,280,352 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,435 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,610 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,810 >>> mbox cmd response: success
2,824,969 UART: [afmc] ++
2,825,137 UART: [afmc] CDI.KEYID = 6
2,825,500 UART: [afmc] SUBJECT.KEYID = 7
2,825,926 UART: [afmc] AUTHORITY.KEYID = 5
2,861,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,126 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,883,833 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,889,706 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,895,415 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,903,105 UART: [afmc] --
2,904,109 UART: [cold-reset] --
2,905,029 UART: [state] Locking Datavault
2,906,220 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,824 UART: [state] Locking ICCM
2,907,244 UART: [exit] Launching FMC @ 0x40000130
2,912,574 UART:
2,912,590 UART: Running Caliptra FMC ...
2,912,998 UART:
2,913,052 UART: [state] CFI Enabled
2,923,642 UART: [fht] FMC Alias Private Key: 7
3,042,078 UART: [art] Extend RT PCRs Done
3,042,506 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,044,238 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B76error_internal_intr_r=00000040
3,046,541 UART: WDT Expired
3,046,750 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,638 >>> mbox cmd response: success
2,738,111 UART:
2,738,127 UART: Running Caliptra FMC ...
2,738,535 UART:
2,738,589 UART: [state] CFI Enabled
2,749,177 UART: [fht] FMC Alias Private Key: 7
2,867,545 UART: [art] Extend RT PCRs Done
2,867,973 UART: [art] Lock RT PCRs Done
2,869,705 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,995 ready_for_fw is high
1,058,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,885 >>> mbox cmd response: success
2,738,349 UART:
2,738,365 UART: Running Caliptra FMC ...
2,738,773 UART:
2,738,827 UART: [state] CFI Enabled
2,749,417 UART: [fht] FMC Alias Private Key: 7
2,867,853 UART: [art] Extend RT PCRs Done
2,868,281 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,870,013 UART: [art] FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B76error_internal_intr_r=00000040
2,872,268 UART: WDT Expired
2,872,477 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,125 UART: [kat] ++
896,277 UART: [kat] sha1
900,463 UART: [kat] SHA2-256
902,403 UART: [kat] SHA2-384
905,108 UART: [kat] SHA2-512-ACC
907,009 UART: [kat] ECC-384
916,916 UART: [kat] HMAC-384Kdf
921,566 UART: [kat] LMS
1,169,878 UART: [kat] --
1,170,715 UART: [cold-reset] ++
1,171,135 UART: [fht] FHT @ 0x50003400
1,173,977 UART: [idev] ++
1,174,145 UART: [idev] CDI.KEYID = 6
1,174,506 UART: [idev] SUBJECT.KEYID = 7
1,174,931 UART: [idev] UDS.KEYID = 0
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,200,128 UART: [idev] Sha1 KeyId Algorithm
1,209,062 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,701 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,216,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,781 UART: [ldev] --
1,282,184 UART: [fwproc] Wait for Commands...
1,282,767 UART: [fwproc] Recv command 0x46574c44
1,283,500 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,719 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,960 >>> mbox cmd response: success
2,825,982 UART: [afmc] ++
2,826,150 UART: [afmc] CDI.KEYID = 6
2,826,513 UART: [afmc] SUBJECT.KEYID = 7
2,826,939 UART: [afmc] AUTHORITY.KEYID = 5
2,863,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,913 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,614 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,425 UART: [afmc] --
2,906,236 UART: [cold-reset] --
2,907,280 UART: [state] Locking Datavault
2,908,623 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,227 UART: [state] Locking ICCM
2,909,701 UART: [exit] Launching FMC @ 0x40000130
2,915,031 UART:
2,915,047 UART: Running Caliptra FMC ...
2,915,455 UART:
2,915,598 UART: [state] CFI Enabled
2,926,530 UART: [fht] FMC Alias Private Key: 7
3,046,266 UART: [art] Extend RT PCRs Done
3,046,694 UART: [art] Lock RT PCRs Done
3,048,302 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 2960215 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,413 UART: [kat] ++
896,565 UART: [kat] sha1
900,751 UART: [kat] SHA2-256
902,691 UART: [kat] SHA2-384
905,396 UART: [kat] SHA2-512-ACC
907,297 UART: [kat] ECC-384
917,204 UART: [kat] HMAC-384Kdf
921,854 UART: [kat] LMS
1,170,166 UART: [kat] --
1,171,003 UART: [cold-reset] ++
1,171,422 UART: [fht] FHT @ 0x50003400
1,174,264 UART: [idev] ++
1,174,432 UART: [idev] CDI.KEYID = 6
1,174,793 UART: [idev] SUBJECT.KEYID = 7
1,175,218 UART: [idev] UDS.KEYID = 0
1,175,564 ready_for_fw is high
1,175,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,413 UART: [idev] Sha1 KeyId Algorithm
1,209,346 UART: [idev] --
1,210,451 UART: [ldev] ++
1,210,619 UART: [ldev] CDI.KEYID = 6
1,210,983 UART: [ldev] SUBJECT.KEYID = 5
1,211,410 UART: [ldev] AUTHORITY.KEYID = 7
1,211,873 UART: [ldev] FE.KEYID = 1
1,217,135 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,722 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,416 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,286 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,992 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,020 UART: [ldev] --
1,282,421 UART: [fwproc] Wait for Commands...
1,283,004 UART: [fwproc] Recv command 0x46574c44
1,283,737 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,191 >>> mbox cmd response: success
2,826,210 UART: [afmc] ++
2,826,378 UART: [afmc] CDI.KEYID = 6
2,826,741 UART: [afmc] SUBJECT.KEYID = 7
2,827,167 UART: [afmc] AUTHORITY.KEYID = 5
2,863,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,547 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,886,254 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,892,127 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,897,836 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,905,642 UART: [afmc] --
2,906,452 UART: [cold-reset] --
2,907,496 UART: [state] Locking Datavault
2,908,839 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,443 UART: [state] Locking ICCM
2,909,917 UART: [exit] Launching FMC @ 0x40000130
2,915,247 UART:
2,915,263 UART: Running Caliptra FMC ...
2,915,671 UART:
2,915,814 UART: [state] CFI Enabled
2,926,748 UART: [fht] FMC Alias Private Key: 7
3,046,552 UART: [art] Extend RT PCRs Done
3,046,980 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,048,588 UART: [art] PoFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B94error_internal_intr_r=00000040
3,050,883 UART: WDT Expired
3,051,092 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,019 >>> mbox cmd response: success
2,740,784 UART:
2,740,800 UART: Running Caliptra FMC ...
2,741,208 UART:
2,741,351 UART: [state] CFI Enabled
2,752,283 UART: [fht] FMC Alias Private Key: 7
2,872,019 UART: [art] Extend RT PCRs Done
2,872,447 UART: [art] Lock RT PCRs Done
2,874,055 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,524 ready_for_fw is high
1,060,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,266 >>> mbox cmd response: success
2,741,022 UART:
2,741,038 UART: Running Caliptra FMC ...
2,741,446 UART:
2,741,589 UART: [state] CFI Enabled
2,752,523 UART: [fht] FMC Alias Private Key: 7
2,872,327 UART: [art] Extend RT PCRs Done
2,872,755 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,874,363 UART: [art]FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B94error_internal_intr_r=00000040
2,876,610 UART: WDT Expired
2,876,819 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,200 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,370 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,565 >>> mbox cmd response: success
2,826,721 UART: [afmc] ++
2,826,889 UART: [afmc] CDI.KEYID = 6
2,827,251 UART: [afmc] SUBJECT.KEYID = 7
2,827,676 UART: [afmc] AUTHORITY.KEYID = 5
2,863,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,854 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,563 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,446 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,147 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,901 UART: [afmc] --
2,905,973 UART: [cold-reset] --
2,906,893 UART: [state] Locking Datavault
2,908,084 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,688 UART: [state] Locking ICCM
2,909,108 UART: [exit] Launching FMC @ 0x40000130
2,914,438 UART:
2,914,454 UART: Running Caliptra FMC ...
2,914,862 UART:
2,914,916 UART: [state] CFI Enabled
2,925,504 UART: [fht] FMC Alias Private Key: 7
3,043,872 UART: [art] Extend RT PCRs Done
3,044,300 UART: [art] Lock RT PCRs Done
3,046,032 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 2958904 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,432 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,602 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,796 >>> mbox cmd response: success
2,826,949 UART: [afmc] ++
2,827,117 UART: [afmc] CDI.KEYID = 6
2,827,479 UART: [afmc] SUBJECT.KEYID = 7
2,827,904 UART: [afmc] AUTHORITY.KEYID = 5
2,863,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,079 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,885,785 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,891,660 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,897,369 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,905,117 UART: [afmc] --
2,906,188 UART: [cold-reset] --
2,907,108 UART: [state] Locking Datavault
2,908,299 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,903 UART: [state] Locking ICCM
2,909,323 UART: [exit] Launching FMC @ 0x40000130
2,914,653 UART:
2,914,669 UART: Running Caliptra FMC ...
2,915,077 UART:
2,915,131 UART: [state] CFI Enabled
2,925,721 UART: [fht] FMC Alias Private Key: 7
3,044,157 UART: [art] Extend RT PCRs Done
3,044,585 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,046,317 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B7Aerror_internal_intr_r=00000040
3,048,623 UART: WDT Expired
3,048,832 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,546 >>> mbox cmd response: success
2,739,117 UART:
2,739,133 UART: Running Caliptra FMC ...
2,739,541 UART:
2,739,595 UART: [state] CFI Enabled
2,750,183 UART: [fht] FMC Alias Private Key: 7
2,868,551 UART: [art] Extend RT PCRs Done
2,868,979 UART: [art] Lock RT PCRs Done
2,870,711 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,793 >>> mbox cmd response: success
2,739,354 UART:
2,739,370 UART: Running Caliptra FMC ...
2,739,778 UART:
2,739,832 UART: [state] CFI Enabled
2,750,422 UART: [fht] FMC Alias Private Key: 7
2,868,858 UART: [art] Extend RT PCRs Done
2,869,286 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,871,018 UART: [art] FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B7Aerror_internal_intr_r=00000040
2,873,276 UART: WDT Expired
2,873,485 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,541 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,711 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,946 >>> mbox cmd response: success
2,827,962 UART: [afmc] ++
2,828,130 UART: [afmc] CDI.KEYID = 6
2,828,492 UART: [afmc] SUBJECT.KEYID = 7
2,828,917 UART: [afmc] AUTHORITY.KEYID = 5
2,865,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,275 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,984 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,867 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,568 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,438 UART: [afmc] --
2,908,316 UART: [cold-reset] --
2,909,360 UART: [state] Locking Datavault
2,910,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,307 UART: [state] Locking ICCM
2,911,781 UART: [exit] Launching FMC @ 0x40000130
2,917,111 UART:
2,917,127 UART: Running Caliptra FMC ...
2,917,535 UART:
2,917,678 UART: [state] CFI Enabled
2,928,610 UART: [fht] FMC Alias Private Key: 7
3,048,346 UART: [art] Extend RT PCRs Done
3,048,774 UART: [art] Lock RT PCRs Done
3,050,382 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 2962265 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,773 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,177 >>> mbox cmd response: success
2,828,190 UART: [afmc] ++
2,828,358 UART: [afmc] CDI.KEYID = 6
2,828,720 UART: [afmc] SUBJECT.KEYID = 7
2,829,145 UART: [afmc] AUTHORITY.KEYID = 5
2,865,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,500 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,888,206 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,894,081 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,899,790 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,907,654 UART: [afmc] --
2,908,531 UART: [cold-reset] --
2,909,575 UART: [state] Locking Datavault
2,910,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,522 UART: [state] Locking ICCM
2,911,996 UART: [exit] Launching FMC @ 0x40000130
2,917,326 UART:
2,917,342 UART: Running Caliptra FMC ...
2,917,750 UART:
2,917,893 UART: [state] CFI Enabled
2,928,827 UART: [fht] FMC Alias Private Key: 7
3,048,631 UART: [art] Extend RT PCRs Done
3,049,059 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,050,667 UART: [art] PoFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B9Aerror_internal_intr_r=00000040
3,052,965 UART: WDT Expired
3,053,174 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,927 >>> mbox cmd response: success
2,741,790 UART:
2,741,806 UART: Running Caliptra FMC ...
2,742,214 UART:
2,742,357 UART: [state] CFI Enabled
2,753,289 UART: [fht] FMC Alias Private Key: 7
2,873,025 UART: [art] Extend RT PCRs Done
2,873,453 UART: [art] Lock RT PCRs Done
2,875,061 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,174 >>> mbox cmd response: success
2,742,027 UART:
2,742,043 UART: Running Caliptra FMC ...
2,742,451 UART:
2,742,594 UART: [state] CFI Enabled
2,753,528 UART: [fht] FMC Alias Private Key: 7
2,873,332 UART: [art] Extend RT PCRs Done
2,873,760 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,875,368 UART: [art]FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B9Aerror_internal_intr_r=00000040
2,877,618 UART: WDT Expired
2,877,827 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.23s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 118548 bytes
2,930,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,763 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,336 >>> mbox cmd response: success
3,130,556 UART: [afmc] ++
3,130,724 UART: [afmc] CDI.KEYID = 6
3,131,086 UART: [afmc] SUBJECT.KEYID = 7
3,131,511 UART: [afmc] AUTHORITY.KEYID = 5
3,165,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,468 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,248 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,957 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,840 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,523 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,597 UART: [afmc] --
3,209,605 UART: [cold-reset] --
3,210,299 UART: [state] Locking Datavault
3,211,252 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,856 UART: [state] Locking ICCM
3,212,412 UART: [exit] Launching FMC @ 0x40000130
3,217,742 UART:
3,217,758 UART: Running Caliptra FMC ...
3,218,166 UART:
3,218,220 UART: [state] CFI Enabled
3,228,588 UART: [fht] FMC Alias Private Key: 7
3,347,540 UART: [art] Extend RT PCRs Done
3,347,968 UART: [art] Lock RT PCRs Done
3,349,456 UART: [art] Populate DV Done
3,357,675 UART: [fht] FMC Alias Private Key: 7
3,358,699 UART: [art] Derive CDI
3,358,979 UART: [art] Store in slot 0x4
3,444,237 UART: [art] Derive Key Pair
3,444,597 UART: [art] Store priv key in slot 0x5
3,457,722 UART: [art] Derive Key Pair - Done
3,472,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,487,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,749 UART: [art] PUB.X = 6CD7A24AE533F71E770C7BDF84C9B410FF657584CAE2A84209EB089DCF9E371EDDD223DB48E41425616064AC96DE429F
3,495,522 UART: [art] PUB.Y = 83CEFEAFFDD21C43621A259FF6AD42F5E2FE9DCBE1C190403BC7318F17CA39D302A545950D6F8B1FDECC0184B2A21846
3,502,483 UART: [art] SIG.R = 26D72CA4A9361AAABAAA8E4A0211F35796E395C342B9F7CA43838EFDA37EE5E3633F68ECDCBC5A5A7E50510A3E0B0B16
3,509,261 UART: [art] SIG.S = E0F56D83E353CA4212F53D036A47589D2B6700B3A7F9A4F15B4671B7CD20558698E8379DCB0582CE83C2799700B3F32D
3,533,529 UART: Caliptra RT
3,533,780 UART: [state] CFI Enabled
3,653,654 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3561465 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 118548 bytes
2,930,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,723 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,295 >>> mbox cmd response: success
3,130,512 UART: [afmc] ++
3,130,680 UART: [afmc] CDI.KEYID = 6
3,131,042 UART: [afmc] SUBJECT.KEYID = 7
3,131,467 UART: [afmc] AUTHORITY.KEYID = 5
3,165,873 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,421 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,201 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
3,188,907 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
3,194,782 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
3,200,481 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
3,208,562 UART: [afmc] --
3,209,569 UART: [cold-reset] --
3,210,263 UART: [state] Locking Datavault
3,211,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,820 UART: [state] Locking ICCM
3,212,376 UART: [exit] Launching FMC @ 0x40000130
3,217,706 UART:
3,217,722 UART: Running Caliptra FMC ...
3,218,130 UART:
3,218,184 UART: [state] CFI Enabled
3,228,554 UART: [fht] FMC Alias Private Key: 7
3,347,574 UART: [art] Extend RT PCRs Done
3,348,002 UART: [art] Lock RT PCRs Done
3,349,490 UART: [art] Populate DV Done
3,357,710 UART: [fht] FMC Alias Private Key: 7
3,358,734 UART: [art] Derive CDI
3,359,014 UART: [art] Store in slot 0x4
3,444,270 UART: [art] Derive Key Pair
3,444,630 UART: [art] Store priv key in slot 0x5
3,457,755 UART: [art] Derive Key Pair - Done
3,472,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,778 UART: [art] PUB.X = A61E9D72ADFBF3826F20D8E12A18909BFB0F8C4D2C48E878E6816DC7377CD81311DD8F08E77123A04FFA3DFDCC8C1B61
3,495,560 UART: [art] PUB.Y = 364DD126B03786778D58DC14F6E3F843170324986396981C980905A8DC3E71C364F12E8764069A5EB64450893BE1F9AD
3,502,486 UART: [art] SIG.R = 76374139C15CAAEF6E649348632D630A8B114C7BC454F5899617461B15FC826315C3F4D88852A0CB8BB213A48639714A
3,509,245 UART: [art] SIG.S = 89AE8E7011F767FEE8DE264F1A5725507752768BE4400B46C143D36305C05F9978C22578A0105647815B28200D649615
3,533,536 UART: Caliptra RT
3,533,787 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,649,185 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9DA ra=0x400078B0 error_internal_intr_r=00000040
3,651,631 UART: [rt] WDT Expired
3,651,918 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,972 >>> mbox cmd response: success
3,040,061 UART:
3,040,077 UART: Running Caliptra FMC ...
3,040,485 UART:
3,040,539 UART: [state] CFI Enabled
3,050,907 UART: [fht] FMC Alias Private Key: 7
3,169,859 UART: [art] Extend RT PCRs Done
3,170,287 UART: [art] Lock RT PCRs Done
3,171,775 UART: [art] Populate DV Done
3,179,994 UART: [fht] FMC Alias Private Key: 7
3,181,018 UART: [art] Derive CDI
3,181,298 UART: [art] Store in slot 0x4
3,266,556 UART: [art] Derive Key Pair
3,266,916 UART: [art] Store priv key in slot 0x5
3,280,041 UART: [art] Derive Key Pair - Done
3,294,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,302 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,067 UART: [art] PUB.X = FFBB92B5CD9B33AA1B17E070DB1842B950D2005726AEDE9C4A0118B88F13D37EE85AB37EFCD2A254DC11AC31E5A30F71
3,317,829 UART: [art] PUB.Y = EC58F397691BFC29862C64D9FEC3FA6B0AEA33B3D11D0923015239920F51C8B754CF352D0A6AFC618FDBD47287EA8AA0
3,324,778 UART: [art] SIG.R = F4B882DAE420485E7568F35267D4BAE90EB21C8E0A3828ECFB1CC918A9E6D7628FE519BBB8B2533E2C39C20445EDC544
3,331,551 UART: [art] SIG.S = 16B1AB9ACE3CB64106F5CB351974F3AC4B586DECFC920C3B943343DF34A72FE6260F872009C6AE79394882FF6F5C9872
3,355,867 UART: Caliptra RT
3,356,118 UART: [state] CFI Enabled
3,475,924 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,219 >>> mbox cmd response: success
3,040,298 UART:
3,040,314 UART: Running Caliptra FMC ...
3,040,722 UART:
3,040,776 UART: [state] CFI Enabled
3,051,146 UART: [fht] FMC Alias Private Key: 7
3,170,166 UART: [art] Extend RT PCRs Done
3,170,594 UART: [art] Lock RT PCRs Done
3,172,082 UART: [art] Populate DV Done
3,180,302 UART: [fht] FMC Alias Private Key: 7
3,181,326 UART: [art] Derive CDI
3,181,606 UART: [art] Store in slot 0x4
3,266,862 UART: [art] Derive Key Pair
3,267,222 UART: [art] Store priv key in slot 0x5
3,280,347 UART: [art] Derive Key Pair - Done
3,294,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,370 UART: [art] PUB.X = BB15C5D728AAD62E94D59005E296B1F372256E44DFCE6D5E161B7AE837C7D8BA276B0B6CC41CC67CF56D2C67CE7F30DB
3,318,154 UART: [art] PUB.Y = 942A1488E710DAA4F4B3C17BEA7099036565D35AFE7617C6D28D9B77ECF9673C80FC6BD6828C8D34B9977B5FC4C6E747
3,325,109 UART: [art] SIG.R = 076997B07C14AE029875219852738AA87BEDDD0E1E3EA7961E922F8812569F01D26A0AA702B77F44CBC45CF5D4E80561
3,331,858 UART: [art] SIG.S = 0E1B57B1F45ECB1BCC679914F85FEE94B8EC5CE280F76F660825C385B154D2B34BEBB948F5D92A4D4C9D15DD2D29B70D
3,356,185 UART: Caliptra RT
3,356,436 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,471,701 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,474,145 UART: [rt] WDT Expired
3,474,432 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 118548 bytes
2,931,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,828 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,046 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,495 >>> mbox cmd response: success
3,131,727 UART: [afmc] ++
3,131,895 UART: [afmc] CDI.KEYID = 6
3,132,257 UART: [afmc] SUBJECT.KEYID = 7
3,132,682 UART: [afmc] AUTHORITY.KEYID = 5
3,168,251 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,591 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,371 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,080 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,963 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,646 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,590 UART: [afmc] --
3,211,530 UART: [cold-reset] --
3,212,466 UART: [state] Locking Datavault
3,213,623 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,227 UART: [state] Locking ICCM
3,214,833 UART: [exit] Launching FMC @ 0x40000130
3,220,163 UART:
3,220,179 UART: Running Caliptra FMC ...
3,220,587 UART:
3,220,730 UART: [state] CFI Enabled
3,231,360 UART: [fht] FMC Alias Private Key: 7
3,350,136 UART: [art] Extend RT PCRs Done
3,350,564 UART: [art] Lock RT PCRs Done
3,351,866 UART: [art] Populate DV Done
3,360,105 UART: [fht] FMC Alias Private Key: 7
3,361,119 UART: [art] Derive CDI
3,361,399 UART: [art] Store in slot 0x4
3,447,233 UART: [art] Derive Key Pair
3,447,593 UART: [art] Store priv key in slot 0x5
3,460,832 UART: [art] Derive Key Pair - Done
3,475,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,059 UART: [art] PUB.X = 88EB91E37BEB7F77E9212E58E49C8DC6BAE56F7CC6D96B708A454BC4186B0B864205EF627BDBDB0EA2030DB9ECC641F2
3,498,834 UART: [art] PUB.Y = C6619235712E06D02EF657406F801B7597B17A1F79483F9190022F484651D8323BFC9E17627CB5A9A122B1870181CBEE
3,505,765 UART: [art] SIG.R = A1E298F8E90032F52CBF9C26E08408E7F78D6E142CC50534081986F8F82CE0F14DFC8671A79F77BBD33A457DE41E511C
3,512,510 UART: [art] SIG.S = 9A0D93793DF4C57A3D07C32FE306A9836806B26B673B57A273042BAD626478578782FF6903352AFB0D4C5D8A59BCFCFC
3,536,119 UART: Caliptra RT
3,536,462 UART: [state] CFI Enabled
3,657,137 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3563959 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 118548 bytes
2,931,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,788 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,006 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,454 >>> mbox cmd response: success
3,131,683 UART: [afmc] ++
3,131,851 UART: [afmc] CDI.KEYID = 6
3,132,213 UART: [afmc] SUBJECT.KEYID = 7
3,132,638 UART: [afmc] AUTHORITY.KEYID = 5
3,168,204 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,324 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
3,191,030 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
3,196,905 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
3,202,604 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
3,210,555 UART: [afmc] --
3,211,494 UART: [cold-reset] --
3,212,430 UART: [state] Locking Datavault
3,213,587 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,191 UART: [state] Locking ICCM
3,214,797 UART: [exit] Launching FMC @ 0x40000130
3,220,127 UART:
3,220,143 UART: Running Caliptra FMC ...
3,220,551 UART:
3,220,694 UART: [state] CFI Enabled
3,231,326 UART: [fht] FMC Alias Private Key: 7
3,350,170 UART: [art] Extend RT PCRs Done
3,350,598 UART: [art] Lock RT PCRs Done
3,351,900 UART: [art] Populate DV Done
3,360,140 UART: [fht] FMC Alias Private Key: 7
3,361,154 UART: [art] Derive CDI
3,361,434 UART: [art] Store in slot 0x4
3,447,266 UART: [art] Derive Key Pair
3,447,626 UART: [art] Store priv key in slot 0x5
3,460,865 UART: [art] Derive Key Pair - Done
3,475,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,078 UART: [art] PUB.X = 3BB65E985B7F20865D1DCFD0A15913732A1309CF7B249937392B0DC017E8A9D2957469013A234B229465A984FFA46DB2
3,498,835 UART: [art] PUB.Y = 28BF84CCE20E687AEBC3129D97D0798BF00E8BE09B49C7DEDE125DD933A87EE43C16D8DEFD45523AE0F00C05D34BF53D
3,505,795 UART: [art] SIG.R = 1FC08E015F15F2134AFD15B35C145D7A9EE23B38745A6CE3882BDBAC2AE1149D0FE02A5808AED9F953548226D806E81D
3,512,563 UART: [art] SIG.S = 0957FD9C0CB8BCD70BFF271611CCC2AFB443BF8F3B184C13F4C7572C7EABE9B37DF45BC67561C88ADA9392785476CF85
3,536,196 UART: Caliptra RT
3,536,539 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,652,660 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D0 ra=0x400078B0 error_internal_intr_r=00000040
3,655,104 UART: [rt] WDT Expired
3,655,391 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,131 >>> mbox cmd response: success
3,042,482 UART:
3,042,498 UART: Running Caliptra FMC ...
3,042,906 UART:
3,043,049 UART: [state] CFI Enabled
3,053,679 UART: [fht] FMC Alias Private Key: 7
3,172,455 UART: [art] Extend RT PCRs Done
3,172,883 UART: [art] Lock RT PCRs Done
3,174,185 UART: [art] Populate DV Done
3,182,424 UART: [fht] FMC Alias Private Key: 7
3,183,438 UART: [art] Derive CDI
3,183,718 UART: [art] Store in slot 0x4
3,269,552 UART: [art] Derive Key Pair
3,269,912 UART: [art] Store priv key in slot 0x5
3,283,151 UART: [art] Derive Key Pair - Done
3,297,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,611 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,376 UART: [art] PUB.X = 8F2D21742728274C7505090A465E4F6348E4B6C0E05B62BA78C67E98CC87D1A92F628167940B8F5E2CA92BA0DB0E113B
3,321,131 UART: [art] PUB.Y = B7A1D054E5C50C8939D524A1167EA465A20A811867E388377E03C786A5A5002E31A6C70D5D8D99391089D4DAA934F30A
3,328,040 UART: [art] SIG.R = A044C167044440DE33AE68525E446B4AE964D18E63739850BA581558FF00CAAB925550CC30E9984FA0EEBDB0F9A520AF
3,334,791 UART: [art] SIG.S = 95ECA4438E022227B192F508587F62F732329E2D60756C25954DCB2EC16EEBCD96B0C850BA876D29CB973905D7CCD02A
3,358,412 UART: Caliptra RT
3,358,755 UART: [state] CFI Enabled
3,479,430 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,378 >>> mbox cmd response: success
3,042,719 UART:
3,042,735 UART: Running Caliptra FMC ...
3,043,143 UART:
3,043,286 UART: [state] CFI Enabled
3,053,918 UART: [fht] FMC Alias Private Key: 7
3,172,762 UART: [art] Extend RT PCRs Done
3,173,190 UART: [art] Lock RT PCRs Done
3,174,492 UART: [art] Populate DV Done
3,182,732 UART: [fht] FMC Alias Private Key: 7
3,183,746 UART: [art] Derive CDI
3,184,026 UART: [art] Store in slot 0x4
3,269,858 UART: [art] Derive Key Pair
3,270,218 UART: [art] Store priv key in slot 0x5
3,283,457 UART: [art] Derive Key Pair - Done
3,298,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,674 UART: [art] PUB.X = D5E763D7BADCC2175EABE2E70C0C904F09C2F89D01687EC4AD726BB0D446B9E2C722C314FD6EC76900ACB913C5606DEB
3,321,430 UART: [art] PUB.Y = 8A345FDD9C8E248F8C90308ECB94D61D22E2E34C99E65688E754F40DFD8B7A4F4901168EC239E2E05BB748455F1FCEC9
3,328,384 UART: [art] SIG.R = B4512C8AC6DF0B7474672F0D399C4A3A8FFBC6084F9DD7108C2B82E0E7BFBD6A8E2852B1A0C941B6B5E763C16C5EEEF7
3,335,165 UART: [art] SIG.S = 54A4FFE5A8AECCC842909D96253599D997DCFC1B2C3255C832507D8360A4AE42E44830D48A8120CEC78592D197677C24
3,358,789 UART: Caliptra RT
3,359,132 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,475,199 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D6 ra=0x400078B0 error_internal_intr_r=00000040
3,477,643 UART: [rt] WDT Expired
3,477,930 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,136 UART: [kat] ++
895,288 UART: [kat] sha1
899,398 UART: [kat] SHA2-256
901,338 UART: [kat] SHA2-384
903,979 UART: [kat] SHA2-512-ACC
905,880 UART: [kat] ECC-384
915,571 UART: [kat] HMAC-384Kdf
920,055 UART: [kat] LMS
1,168,367 UART: [kat] --
1,169,228 UART: [cold-reset] ++
1,169,700 UART: [fht] FHT @ 0x50003400
1,172,448 UART: [idev] ++
1,172,616 UART: [idev] CDI.KEYID = 6
1,172,977 UART: [idev] SUBJECT.KEYID = 7
1,173,402 UART: [idev] UDS.KEYID = 0
1,181,725 UART: [idev] Erasing UDS.KEYID = 0
1,198,267 UART: [idev] Sha1 KeyId Algorithm
1,207,019 UART: [idev] --
1,208,246 UART: [ldev] ++
1,208,414 UART: [ldev] CDI.KEYID = 6
1,208,778 UART: [ldev] SUBJECT.KEYID = 5
1,209,205 UART: [ldev] AUTHORITY.KEYID = 7
1,209,668 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,240,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,832 UART: [ldev] --
1,280,115 UART: [fwproc] Wait for Commands...
1,280,802 UART: [fwproc] Recv command 0x46574c44
1,281,535 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,203 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,378 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,579 >>> mbox cmd response: success
2,824,741 UART: [afmc] ++
2,824,909 UART: [afmc] CDI.KEYID = 6
2,825,272 UART: [afmc] SUBJECT.KEYID = 7
2,825,698 UART: [afmc] AUTHORITY.KEYID = 5
2,861,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,901 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,611 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,492 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,193 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,888 UART: [afmc] --
2,903,893 UART: [cold-reset] --
2,904,813 UART: [state] Locking Datavault
2,906,004 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,608 UART: [state] Locking ICCM
2,907,028 UART: [exit] Launching FMC @ 0x40000130
2,912,358 UART:
2,912,374 UART: Running Caliptra FMC ...
2,912,782 UART:
2,912,836 UART: [state] CFI Enabled
2,923,424 UART: [fht] FMC Alias Private Key: 7
3,041,792 UART: [art] Extend RT PCRs Done
3,042,220 UART: [art] Lock RT PCRs Done
3,043,952 UART: [art] Populate DV Done
3,052,231 UART: [fht] FMC Alias Private Key: 7
3,053,223 UART: [art] Derive CDI
3,053,503 UART: [art] Store in slot 0x4
3,138,706 UART: [art] Derive Key Pair
3,139,066 UART: [art] Store priv key in slot 0x5
3,152,776 UART: [art] Derive Key Pair - Done
3,167,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,986 UART: [art] PUB.X = A81AB452EA0C373C6261A5ADEA60E8D576FC67DCD715651CECBDB113DBE8B0E1EE8E573141F30AA757BA1B27C2772F45
3,190,770 UART: [art] PUB.Y = C38FD10CFDBBDC7239096FC14C8EB41031860A0A6331C1F9FB094DF6867A20DC05452EC0C1B5730E785BA3D6366426FE
3,197,709 UART: [art] SIG.R = 98D40809F52B84E0B5239568A0FAAFBFE691AF282767977315554B2CDF85AED264B52FBAF0461D2F72E87616E06EA811
3,204,477 UART: [art] SIG.S = 521FE8B6C827261D17883219C47D6F7D4B49AC48C5FF3AD675A4AD2C4A55FC73E92299175D9E40A66658FA53322E1401
3,228,044 UART: Caliptra RT
3,228,295 UART: [state] CFI Enabled
3,347,930 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 3256140 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,267 UART: [kat] SHA2-512-ACC
906,168 UART: [kat] ECC-384
915,859 UART: [kat] HMAC-384Kdf
920,343 UART: [kat] LMS
1,168,655 UART: [kat] --
1,169,516 UART: [cold-reset] ++
1,169,987 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,174,035 ready_for_fw is high
1,174,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,009 UART: [idev] Erasing UDS.KEYID = 0
1,198,552 UART: [idev] Sha1 KeyId Algorithm
1,207,303 UART: [idev] --
1,208,528 UART: [ldev] ++
1,208,696 UART: [ldev] CDI.KEYID = 6
1,209,060 UART: [ldev] SUBJECT.KEYID = 5
1,209,487 UART: [ldev] AUTHORITY.KEYID = 7
1,209,950 UART: [ldev] FE.KEYID = 1
1,215,208 UART: [ldev] Erasing FE.KEYID = 1
1,241,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,737 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,431 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,301 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,007 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,071 UART: [ldev] --
1,280,352 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,435 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,610 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,810 >>> mbox cmd response: success
2,824,969 UART: [afmc] ++
2,825,137 UART: [afmc] CDI.KEYID = 6
2,825,500 UART: [afmc] SUBJECT.KEYID = 7
2,825,926 UART: [afmc] AUTHORITY.KEYID = 5
2,861,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,126 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,883,833 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,889,706 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,895,415 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,903,105 UART: [afmc] --
2,904,109 UART: [cold-reset] --
2,905,029 UART: [state] Locking Datavault
2,906,220 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,824 UART: [state] Locking ICCM
2,907,244 UART: [exit] Launching FMC @ 0x40000130
2,912,574 UART:
2,912,590 UART: Running Caliptra FMC ...
2,912,998 UART:
2,913,052 UART: [state] CFI Enabled
2,923,642 UART: [fht] FMC Alias Private Key: 7
3,042,078 UART: [art] Extend RT PCRs Done
3,042,506 UART: [art] Lock RT PCRs Done
3,044,238 UART: [art] Populate DV Done
3,052,518 UART: [fht] FMC Alias Private Key: 7
3,053,510 UART: [art] Derive CDI
3,053,790 UART: [art] Store in slot 0x4
3,138,991 UART: [art] Derive Key Pair
3,139,351 UART: [art] Store priv key in slot 0x5
3,153,061 UART: [art] Derive Key Pair - Done
3,168,058 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,282 UART: [art] PUB.X = 2DB6B3FC6ACEDECD8B5F97067E727FA435A4DC3D65611D42176A3F3898BC4078FA06092EFC4F66FA94AB949CC3F52937
3,191,059 UART: [art] PUB.Y = 7A3DD8EE36A244026D0AAB3D80F7F599934026E69D8637556FD9084B38553E732438D2A94B0F459B1B77B5EE4EA3DF27
3,197,999 UART: [art] SIG.R = A3543EA20327E7F1CD950FAEFEFFE78144CCF3CB7DA68640026D6027314866D78A9D816874BDD8DB77BEA997E05EEACB
3,204,778 UART: [art] SIG.S = 82A3E1A32FFA91149CB946BE76F0D805D12A938BED70BBAC65D7CD79C1861E1823C5D0976B539B1447D53C1E9447C3E3
3,228,351 UART: Caliptra RT
3,228,602 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,343,732 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9DA ra=0x400078B0 error_internal_intr_r=00000040
3,346,178 UART: [rt] WDT Expired
3,346,465 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,638 >>> mbox cmd response: success
2,738,111 UART:
2,738,127 UART: Running Caliptra FMC ...
2,738,535 UART:
2,738,589 UART: [state] CFI Enabled
2,749,177 UART: [fht] FMC Alias Private Key: 7
2,867,545 UART: [art] Extend RT PCRs Done
2,867,973 UART: [art] Lock RT PCRs Done
2,869,705 UART: [art] Populate DV Done
2,877,984 UART: [fht] FMC Alias Private Key: 7
2,878,976 UART: [art] Derive CDI
2,879,256 UART: [art] Store in slot 0x4
2,964,459 UART: [art] Derive Key Pair
2,964,819 UART: [art] Store priv key in slot 0x5
2,978,529 UART: [art] Derive Key Pair - Done
2,993,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,741 UART: [art] PUB.X = E5FE781474F450BE3161FABA312D341469B74B49DF8F392C3832359EFCC80711D9593E439D149F410CE39AB31F093817
3,016,500 UART: [art] PUB.Y = 497D1FE8E26BC1D840178490394C023E744361B11EB19C215BAD6AE6FFA7843EFA748C1151F9DDC81B1CBE51A3B6CEF8
3,023,461 UART: [art] SIG.R = 5095C7DE00763A92ED1FE30F33CF33F4C465A83EB76D213CF96E4BCC3B9C064D58FD2693D604052D5B96A0C512C7B16D
3,030,207 UART: [art] SIG.S = 036FC7AACB9807C9B7A717628A49EB779524D7B7E84C9423A88FF7270955FE2619BA340A449C6278E90D3F6697C2208E
3,053,760 UART: Caliptra RT
3,054,011 UART: [state] CFI Enabled
3,173,697 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,995 ready_for_fw is high
1,058,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,885 >>> mbox cmd response: success
2,738,349 UART:
2,738,365 UART: Running Caliptra FMC ...
2,738,773 UART:
2,738,827 UART: [state] CFI Enabled
2,749,417 UART: [fht] FMC Alias Private Key: 7
2,867,853 UART: [art] Extend RT PCRs Done
2,868,281 UART: [art] Lock RT PCRs Done
2,870,013 UART: [art] Populate DV Done
2,878,293 UART: [fht] FMC Alias Private Key: 7
2,879,285 UART: [art] Derive CDI
2,879,565 UART: [art] Store in slot 0x4
2,964,766 UART: [art] Derive Key Pair
2,965,126 UART: [art] Store priv key in slot 0x5
2,978,836 UART: [art] Derive Key Pair - Done
2,993,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,041 UART: [art] PUB.X = D0E9D8FB18F5FEFD47B968E67BA78A9BACBB449A7A7B42CC2D916A872373C069D927209528E1190A159F1322BF87838E
3,016,816 UART: [art] PUB.Y = 6BAF7CACD857DA16888D2273132CE1B980C9B1D959B6579FEC49978139330ABCDC52A5E938B7D4DF9E98FE69443F6138
3,023,771 UART: [art] SIG.R = F6C620B03FD07EBBE5C20E944F837CBD07F6B8CFF55AE247CE194CB898739C7FA3D499A624F96934FED43CEBEBED57D9
3,030,559 UART: [art] SIG.S = 5118B181E0031825755AD4B7B69E48FBA03B722C800EB4D9060E0BEB6474D91D90CA0538B3E41D7D2A09E175263FAC8E
3,054,110 UART: Caliptra RT
3,054,361 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,169,473 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,171,917 UART: [rt] WDT Expired
3,172,204 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,125 UART: [kat] ++
896,277 UART: [kat] sha1
900,463 UART: [kat] SHA2-256
902,403 UART: [kat] SHA2-384
905,108 UART: [kat] SHA2-512-ACC
907,009 UART: [kat] ECC-384
916,916 UART: [kat] HMAC-384Kdf
921,566 UART: [kat] LMS
1,169,878 UART: [kat] --
1,170,715 UART: [cold-reset] ++
1,171,135 UART: [fht] FHT @ 0x50003400
1,173,977 UART: [idev] ++
1,174,145 UART: [idev] CDI.KEYID = 6
1,174,506 UART: [idev] SUBJECT.KEYID = 7
1,174,931 UART: [idev] UDS.KEYID = 0
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,200,128 UART: [idev] Sha1 KeyId Algorithm
1,209,062 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,701 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,216,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,781 UART: [ldev] --
1,282,184 UART: [fwproc] Wait for Commands...
1,282,767 UART: [fwproc] Recv command 0x46574c44
1,283,500 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,719 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,960 >>> mbox cmd response: success
2,825,982 UART: [afmc] ++
2,826,150 UART: [afmc] CDI.KEYID = 6
2,826,513 UART: [afmc] SUBJECT.KEYID = 7
2,826,939 UART: [afmc] AUTHORITY.KEYID = 5
2,863,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,913 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,614 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,425 UART: [afmc] --
2,906,236 UART: [cold-reset] --
2,907,280 UART: [state] Locking Datavault
2,908,623 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,227 UART: [state] Locking ICCM
2,909,701 UART: [exit] Launching FMC @ 0x40000130
2,915,031 UART:
2,915,047 UART: Running Caliptra FMC ...
2,915,455 UART:
2,915,598 UART: [state] CFI Enabled
2,926,530 UART: [fht] FMC Alias Private Key: 7
3,046,266 UART: [art] Extend RT PCRs Done
3,046,694 UART: [art] Lock RT PCRs Done
3,048,302 UART: [art] Populate DV Done
3,056,377 UART: [fht] FMC Alias Private Key: 7
3,057,317 UART: [art] Derive CDI
3,057,597 UART: [art] Store in slot 0x4
3,143,310 UART: [art] Derive Key Pair
3,143,670 UART: [art] Store priv key in slot 0x5
3,157,060 UART: [art] Derive Key Pair - Done
3,171,929 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,167 UART: [art] PUB.X = 99CD8EFB7E99BD028C8A89A13B886647B0102EAA06E4CBDED7B5839A768C9A0BBF0868E58ED61EE7DF293A7D8A721A58
3,194,943 UART: [art] PUB.Y = B6EC8B728E09EE6C52FFC4A6C4F59F938D262BD8BF53704CF957C1A8040BD3D39888E09764730CE4B5BF1D7F42230E9C
3,201,890 UART: [art] SIG.R = 3A973A43486D45A91123340F4C36D2535380F5431312E4005EA6208B8A906C31636C1E1C569055A609C14F822E52C3AF
3,208,618 UART: [art] SIG.S = A5FE482D547C09EFDA45B4087BC90D3E5D8C43CDC653259E57689FAFAAD496A23C23FA7ED2A1731F1BF76AF29FCEFB45
3,232,931 UART: Caliptra RT
3,233,274 UART: [state] CFI Enabled
3,353,165 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 3260386 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,413 UART: [kat] ++
896,565 UART: [kat] sha1
900,751 UART: [kat] SHA2-256
902,691 UART: [kat] SHA2-384
905,396 UART: [kat] SHA2-512-ACC
907,297 UART: [kat] ECC-384
917,204 UART: [kat] HMAC-384Kdf
921,854 UART: [kat] LMS
1,170,166 UART: [kat] --
1,171,003 UART: [cold-reset] ++
1,171,422 UART: [fht] FHT @ 0x50003400
1,174,264 UART: [idev] ++
1,174,432 UART: [idev] CDI.KEYID = 6
1,174,793 UART: [idev] SUBJECT.KEYID = 7
1,175,218 UART: [idev] UDS.KEYID = 0
1,175,564 ready_for_fw is high
1,175,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,413 UART: [idev] Sha1 KeyId Algorithm
1,209,346 UART: [idev] --
1,210,451 UART: [ldev] ++
1,210,619 UART: [ldev] CDI.KEYID = 6
1,210,983 UART: [ldev] SUBJECT.KEYID = 5
1,211,410 UART: [ldev] AUTHORITY.KEYID = 7
1,211,873 UART: [ldev] FE.KEYID = 1
1,217,135 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,722 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,416 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,286 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,992 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,020 UART: [ldev] --
1,282,421 UART: [fwproc] Wait for Commands...
1,283,004 UART: [fwproc] Recv command 0x46574c44
1,283,737 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,191 >>> mbox cmd response: success
2,826,210 UART: [afmc] ++
2,826,378 UART: [afmc] CDI.KEYID = 6
2,826,741 UART: [afmc] SUBJECT.KEYID = 7
2,827,167 UART: [afmc] AUTHORITY.KEYID = 5
2,863,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,547 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,886,254 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,892,127 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,897,836 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,905,642 UART: [afmc] --
2,906,452 UART: [cold-reset] --
2,907,496 UART: [state] Locking Datavault
2,908,839 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,443 UART: [state] Locking ICCM
2,909,917 UART: [exit] Launching FMC @ 0x40000130
2,915,247 UART:
2,915,263 UART: Running Caliptra FMC ...
2,915,671 UART:
2,915,814 UART: [state] CFI Enabled
2,926,748 UART: [fht] FMC Alias Private Key: 7
3,046,552 UART: [art] Extend RT PCRs Done
3,046,980 UART: [art] Lock RT PCRs Done
3,048,588 UART: [art] Populate DV Done
3,056,664 UART: [fht] FMC Alias Private Key: 7
3,057,604 UART: [art] Derive CDI
3,057,884 UART: [art] Store in slot 0x4
3,143,595 UART: [art] Derive Key Pair
3,143,955 UART: [art] Store priv key in slot 0x5
3,157,345 UART: [art] Derive Key Pair - Done
3,172,216 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,454 UART: [art] PUB.X = BF4C83C32AA500B5B0AF691DCB175E37C9DC3AA338BBE23D749DCABF23F03CB37D617B3EECF29BCA96DFF97F57424AB3
3,195,232 UART: [art] PUB.Y = BD3AFF41A60A72EF3820676C8FBF668715CD4D584F6469580940FFFDB5B3329543297588D1105C2AF783A57D9B9A9F6B
3,202,180 UART: [art] SIG.R = 8144F4D68D0982FE87CC126CC132F9477653C5818E078E394C68AEAFE0F2C56DF14331AC7D4D351DD4A4A3B3329F3679
3,208,948 UART: [art] SIG.S = E368830BC346FF699FF790DA4E204D9CA89A5DBE6DB188B31F0689E3B16B510A927893B1C0CBFBFA53E2E50AF37141A0
3,233,246 UART: Caliptra RT
3,233,589 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,348,959 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,351,403 UART: [rt] WDT Expired
3,351,690 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,019 >>> mbox cmd response: success
2,740,784 UART:
2,740,800 UART: Running Caliptra FMC ...
2,741,208 UART:
2,741,351 UART: [state] CFI Enabled
2,752,283 UART: [fht] FMC Alias Private Key: 7
2,872,019 UART: [art] Extend RT PCRs Done
2,872,447 UART: [art] Lock RT PCRs Done
2,874,055 UART: [art] Populate DV Done
2,882,130 UART: [fht] FMC Alias Private Key: 7
2,883,070 UART: [art] Derive CDI
2,883,350 UART: [art] Store in slot 0x4
2,969,063 UART: [art] Derive Key Pair
2,969,423 UART: [art] Store priv key in slot 0x5
2,982,813 UART: [art] Derive Key Pair - Done
2,997,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,159 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,924 UART: [art] PUB.X = 384F0F0EE65E1746B259D556940CE90AAE670A20977C3EF0A98CF4C0E651070EB41ACE65876C302BD34DA79A6C6EE4AF
3,020,685 UART: [art] PUB.Y = 77D7321F6904C886E12AF8CC3C8A69B45F8FD8DBDC1AE724D0EA97770086009AF9CD05EDFB4616209665A60F16B20E5C
3,027,589 UART: [art] SIG.R = 8B6F7FD8655A7BE28AA5A130091AC514678237ADF4562C4A6CA3939A3A658E51380A162EB4CB0E42418A9D6AAAE6664D
3,034,358 UART: [art] SIG.S = 699C56F0C65D218687A68FC62D2EB8457926CF7EF3E22FA35313198D21ADC58AD8F64B46E82558377E854ACEAF95AC88
3,058,662 UART: Caliptra RT
3,059,005 UART: [state] CFI Enabled
3,178,828 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,524 ready_for_fw is high
1,060,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,266 >>> mbox cmd response: success
2,741,022 UART:
2,741,038 UART: Running Caliptra FMC ...
2,741,446 UART:
2,741,589 UART: [state] CFI Enabled
2,752,523 UART: [fht] FMC Alias Private Key: 7
2,872,327 UART: [art] Extend RT PCRs Done
2,872,755 UART: [art] Lock RT PCRs Done
2,874,363 UART: [art] Populate DV Done
2,882,439 UART: [fht] FMC Alias Private Key: 7
2,883,379 UART: [art] Derive CDI
2,883,659 UART: [art] Store in slot 0x4
2,969,370 UART: [art] Derive Key Pair
2,969,730 UART: [art] Store priv key in slot 0x5
2,983,120 UART: [art] Derive Key Pair - Done
2,997,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,223 UART: [art] PUB.X = 16504903D95F7E12B5A072BEC5CA15429A0E306ABAC45C25FC1172D14A5D2C9E5E8E05B5CDAD4FB6FDDC982F842D0301
3,020,994 UART: [art] PUB.Y = 1C4CC4B16B514C3784EFAE4BD7EE65668DD71170A22AC392AE0B1ECBD4C81DA98861E09FD1F6AE65331A45AE662D341B
3,027,959 UART: [art] SIG.R = 77AA86F0CC9EA7F4CA7F696B296E7C8B385BB5A932241B8EF7615582D686F9401DB86F08D55FC588EEFDFA307EECF3CB
3,034,746 UART: [art] SIG.S = 06A12EB0A1A4E45DFCDECCF1A42C0ECD0539575FE7B873DB4108DA5B29042676AB065DED87BA57B3A31B91DE576E2BC4
3,059,046 UART: Caliptra RT
3,059,389 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,174,596 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D2 ra=0x400078B0 error_internal_intr_r=00000040
3,177,040 UART: [rt] WDT Expired
3,177,327 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,200 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,370 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,565 >>> mbox cmd response: success
2,826,721 UART: [afmc] ++
2,826,889 UART: [afmc] CDI.KEYID = 6
2,827,251 UART: [afmc] SUBJECT.KEYID = 7
2,827,676 UART: [afmc] AUTHORITY.KEYID = 5
2,863,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,854 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,563 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,446 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,147 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,901 UART: [afmc] --
2,905,973 UART: [cold-reset] --
2,906,893 UART: [state] Locking Datavault
2,908,084 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,688 UART: [state] Locking ICCM
2,909,108 UART: [exit] Launching FMC @ 0x40000130
2,914,438 UART:
2,914,454 UART: Running Caliptra FMC ...
2,914,862 UART:
2,914,916 UART: [state] CFI Enabled
2,925,504 UART: [fht] FMC Alias Private Key: 7
3,043,872 UART: [art] Extend RT PCRs Done
3,044,300 UART: [art] Lock RT PCRs Done
3,046,032 UART: [art] Populate DV Done
3,054,311 UART: [fht] FMC Alias Private Key: 7
3,055,303 UART: [art] Derive CDI
3,055,583 UART: [art] Store in slot 0x4
3,140,786 UART: [art] Derive Key Pair
3,141,146 UART: [art] Store priv key in slot 0x5
3,154,856 UART: [art] Derive Key Pair - Done
3,169,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,070 UART: [art] PUB.X = D252215A865C649D5FA2E889B6E82ECB80987AB98DF2637B02057930C4E24828C22DB2A59A083D0C929A1420796EDE31
3,192,826 UART: [art] PUB.Y = 7672636CDF6D0C61F246B8B942B78CF28A4F791EEE600E0AF1E7046273147E51B796B2352D234AC5D557EC4A844A2E68
3,199,766 UART: [art] SIG.R = 170818FCA202C836F9A614C163702FAA3DF703C0A57FC948B3FB3CA82AD4D1DAF343B449EEBF818B0F6D193CC1D96FA9
3,206,542 UART: [art] SIG.S = 1AC9B4F7C1228FA51C7E5D1576E1136E4635510CFBCDE9AB7EA6D980DA1AEF40A3C459EB019241EE42BB3B8EAC99F2CB
3,230,130 UART: Caliptra RT
3,230,381 UART: [state] CFI Enabled
3,350,067 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 3258247 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,432 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,602 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,796 >>> mbox cmd response: success
2,826,949 UART: [afmc] ++
2,827,117 UART: [afmc] CDI.KEYID = 6
2,827,479 UART: [afmc] SUBJECT.KEYID = 7
2,827,904 UART: [afmc] AUTHORITY.KEYID = 5
2,863,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,079 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,885,785 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,891,660 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,897,369 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,905,117 UART: [afmc] --
2,906,188 UART: [cold-reset] --
2,907,108 UART: [state] Locking Datavault
2,908,299 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,903 UART: [state] Locking ICCM
2,909,323 UART: [exit] Launching FMC @ 0x40000130
2,914,653 UART:
2,914,669 UART: Running Caliptra FMC ...
2,915,077 UART:
2,915,131 UART: [state] CFI Enabled
2,925,721 UART: [fht] FMC Alias Private Key: 7
3,044,157 UART: [art] Extend RT PCRs Done
3,044,585 UART: [art] Lock RT PCRs Done
3,046,317 UART: [art] Populate DV Done
3,054,597 UART: [fht] FMC Alias Private Key: 7
3,055,589 UART: [art] Derive CDI
3,055,869 UART: [art] Store in slot 0x4
3,141,070 UART: [art] Derive Key Pair
3,141,430 UART: [art] Store priv key in slot 0x5
3,155,140 UART: [art] Derive Key Pair - Done
3,170,123 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,582 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,347 UART: [art] PUB.X = EA85065948B96E39820082C3319442E3AF68BA4DFC1E2FC42A7D2441A286F76A6918CDEE435F012C8E42007B6541CFF1
3,193,069 UART: [art] PUB.Y = F54333EC8E51FB4F92935D254B6ED637199F0EDFE740A15D559B90B2E097EBCD11DCC322B34EED85B04BB9AF35BD93EA
3,200,036 UART: [art] SIG.R = 11C63787024F982E291F3E23326F3F14935300593988BD3A902C8F1C3511AECBF11EB20A736E48FDED1AC5341FDB18B3
3,206,780 UART: [art] SIG.S = A5B79EF9879A0B4EE871E5B71CDCE1EB25792ABB54824376144155611AD7E3D84AE526CF8E44A79E6847C7F50CCAE8E3
3,230,354 UART: Caliptra RT
3,230,605 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,345,869 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D6 ra=0x400078B0 error_internal_intr_r=00000040
3,348,313 UART: [rt] WDT Expired
3,348,600 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,546 >>> mbox cmd response: success
2,739,117 UART:
2,739,133 UART: Running Caliptra FMC ...
2,739,541 UART:
2,739,595 UART: [state] CFI Enabled
2,750,183 UART: [fht] FMC Alias Private Key: 7
2,868,551 UART: [art] Extend RT PCRs Done
2,868,979 UART: [art] Lock RT PCRs Done
2,870,711 UART: [art] Populate DV Done
2,878,990 UART: [fht] FMC Alias Private Key: 7
2,879,982 UART: [art] Derive CDI
2,880,262 UART: [art] Store in slot 0x4
2,965,465 UART: [art] Derive Key Pair
2,965,825 UART: [art] Store priv key in slot 0x5
2,979,535 UART: [art] Derive Key Pair - Done
2,994,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,747 UART: [art] PUB.X = CCCD64CAEE12D8D51DF94DDBF6BB54881675008A88A741F5CB6C3FE71E9408DF51FD11B13A41EC69DBE7F1EAA564937A
3,017,516 UART: [art] PUB.Y = F645CCD71223BD18D57513D729AB4B3C82B358385AD3C2782C48D9FE4B3788162EBF4ADC2ECF30515944F6BB344F5B87
3,024,474 UART: [art] SIG.R = 693774AE2F4CB58854FCEE1EA53531E1054BB302B2A1075F1520C2036A8D358B31CE33F79D1F137D49947FD4D46C54F2
3,031,234 UART: [art] SIG.S = B3C861858266E467F9E2792260D389DB44616E89AB555B4AB4F694D22670188C79A1AE40FF391C97531321E1D4DA4081
3,054,796 UART: Caliptra RT
3,055,047 UART: [state] CFI Enabled
3,174,750 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,793 >>> mbox cmd response: success
2,739,354 UART:
2,739,370 UART: Running Caliptra FMC ...
2,739,778 UART:
2,739,832 UART: [state] CFI Enabled
2,750,422 UART: [fht] FMC Alias Private Key: 7
2,868,858 UART: [art] Extend RT PCRs Done
2,869,286 UART: [art] Lock RT PCRs Done
2,871,018 UART: [art] Populate DV Done
2,879,298 UART: [fht] FMC Alias Private Key: 7
2,880,290 UART: [art] Derive CDI
2,880,570 UART: [art] Store in slot 0x4
2,965,771 UART: [art] Derive Key Pair
2,966,131 UART: [art] Store priv key in slot 0x5
2,979,841 UART: [art] Derive Key Pair - Done
2,994,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,290 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,055 UART: [art] PUB.X = 7A15AA110C1145EB3A721D1645BA018B45A85B2E8E82419362CA7480122A7F2E2D40CBDDB38A5D7EA604439EB0ED25CF
3,017,826 UART: [art] PUB.Y = 017BA8462791F8A72CBC982C4D033362AACA5CE5DD5ECC4A4E4BFF77431E97EAD56BDAB1536642E6FC8AF77F822F45CF
3,024,792 UART: [art] SIG.R = 86EFA153AD00547FCB5C39B4D3FD108EA651C1727003CE7B81E2FF5AC0B42FEE63FA26174A5C9DB360418BC8EF6FEE8F
3,031,559 UART: [art] SIG.S = F786696B4617C3545D254A8E6F215328E047DB97282B7145434A952A9F632368B155B909CE90418ACC52FA7EABEBCBDB
3,055,126 UART: Caliptra RT
3,055,377 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,170,526 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,172,970 UART: [rt] WDT Expired
3,173,257 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,541 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,711 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,946 >>> mbox cmd response: success
2,827,962 UART: [afmc] ++
2,828,130 UART: [afmc] CDI.KEYID = 6
2,828,492 UART: [afmc] SUBJECT.KEYID = 7
2,828,917 UART: [afmc] AUTHORITY.KEYID = 5
2,865,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,275 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,984 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,867 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,568 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,438 UART: [afmc] --
2,908,316 UART: [cold-reset] --
2,909,360 UART: [state] Locking Datavault
2,910,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,307 UART: [state] Locking ICCM
2,911,781 UART: [exit] Launching FMC @ 0x40000130
2,917,111 UART:
2,917,127 UART: Running Caliptra FMC ...
2,917,535 UART:
2,917,678 UART: [state] CFI Enabled
2,928,610 UART: [fht] FMC Alias Private Key: 7
3,048,346 UART: [art] Extend RT PCRs Done
3,048,774 UART: [art] Lock RT PCRs Done
3,050,382 UART: [art] Populate DV Done
3,058,457 UART: [fht] FMC Alias Private Key: 7
3,059,397 UART: [art] Derive CDI
3,059,677 UART: [art] Store in slot 0x4
3,145,390 UART: [art] Derive Key Pair
3,145,750 UART: [art] Store priv key in slot 0x5
3,159,140 UART: [art] Derive Key Pair - Done
3,174,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,246 UART: [art] PUB.X = F4F60C4D58CB8D3BC23907ED5A4F80E752D53E3D8EC784CD1EDCB19786A3AA8F1A411FA03F22A5BF816B9E2E521279AE
3,197,030 UART: [art] PUB.Y = 6B8532721A55B3B63AED790DD0EFA2674ECC28FA8E4DF1843F8BD87C3D3EC51C7C648E54FEFFFB91EBE8110C3A8035CD
3,203,998 UART: [art] SIG.R = 610034B69813758FF40506453569FCE3F96264F4B5984B98A85E60BE1B26993924999FFAC85C93D82347AB5C1FB81B5C
3,210,734 UART: [art] SIG.S = 5040DBCEF0F7411F04AB2A119B5F87078B883463CD24D8CEB19379747B7B72C7C9AE83646E86755BAF84305244DA8C19
3,235,028 UART: Caliptra RT
3,235,371 UART: [state] CFI Enabled
3,355,245 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 3262436 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,773 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,177 >>> mbox cmd response: success
2,828,190 UART: [afmc] ++
2,828,358 UART: [afmc] CDI.KEYID = 6
2,828,720 UART: [afmc] SUBJECT.KEYID = 7
2,829,145 UART: [afmc] AUTHORITY.KEYID = 5
2,865,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,500 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,888,206 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,894,081 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,899,790 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,907,654 UART: [afmc] --
2,908,531 UART: [cold-reset] --
2,909,575 UART: [state] Locking Datavault
2,910,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,522 UART: [state] Locking ICCM
2,911,996 UART: [exit] Launching FMC @ 0x40000130
2,917,326 UART:
2,917,342 UART: Running Caliptra FMC ...
2,917,750 UART:
2,917,893 UART: [state] CFI Enabled
2,928,827 UART: [fht] FMC Alias Private Key: 7
3,048,631 UART: [art] Extend RT PCRs Done
3,049,059 UART: [art] Lock RT PCRs Done
3,050,667 UART: [art] Populate DV Done
3,058,743 UART: [fht] FMC Alias Private Key: 7
3,059,683 UART: [art] Derive CDI
3,059,963 UART: [art] Store in slot 0x4
3,145,674 UART: [art] Derive Key Pair
3,146,034 UART: [art] Store priv key in slot 0x5
3,159,424 UART: [art] Derive Key Pair - Done
3,174,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,530 UART: [art] PUB.X = A862ABC1D1688F1AD5DDB24B3F77824A8D77D1A6234F725C1A1B7A6EB15F59F5601865F66EC2CD66777745C9037C575F
3,197,303 UART: [art] PUB.Y = A683DA7998EB3A576883A9E238DA7D471B3362F76918F32C2C4BB9BE53B2B481B42E90CDFAE4B43D8507A6CC7A94412E
3,204,260 UART: [art] SIG.R = 9C58626EF68EC6C262B6183763FC50A8BA4370095670B15AE81C727E014CB701BB89E679B028F176111724C31681D020
3,211,011 UART: [art] SIG.S = 6C704D4F418BA5D66078BFFA99B0044DADE91AD7C56093B2EF937AE30BA38AB409B581E31F12A8DF7975E6BFB881D331
3,235,312 UART: Caliptra RT
3,235,655 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,351,039 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9DA ra=0x400078B0 error_internal_intr_r=00000040
3,353,485 UART: [rt] WDT Expired
3,353,772 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,927 >>> mbox cmd response: success
2,741,790 UART:
2,741,806 UART: Running Caliptra FMC ...
2,742,214 UART:
2,742,357 UART: [state] CFI Enabled
2,753,289 UART: [fht] FMC Alias Private Key: 7
2,873,025 UART: [art] Extend RT PCRs Done
2,873,453 UART: [art] Lock RT PCRs Done
2,875,061 UART: [art] Populate DV Done
2,883,136 UART: [fht] FMC Alias Private Key: 7
2,884,076 UART: [art] Derive CDI
2,884,356 UART: [art] Store in slot 0x4
2,970,069 UART: [art] Derive Key Pair
2,970,429 UART: [art] Store priv key in slot 0x5
2,983,819 UART: [art] Derive Key Pair - Done
2,998,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,931 UART: [art] PUB.X = 0EFAF119B62ED859E1F3D70434A67CCB446CFDE7D185B837691091842474EFD973E70BD5325F9B984B29483ECFD3FB41
3,021,700 UART: [art] PUB.Y = 8F2C1ED20ED1D52F3E78A0EAB997C3B7982EA8200AE77E7F56F504BBAF44D92530DE435AC50EF73ECED9BDA9D042CE54
3,028,662 UART: [art] SIG.R = B570BC3B03BD29480DECC606EDDE1182DE0A5F44E9DC39DF2CC14E475F0C32FA01CF45B47855AE9BB3F074F293A878DC
3,035,436 UART: [art] SIG.S = 29C4C32A4C4E2C0D914147727B05C901DBD313E59D6566225316D47DD5156452CEB0529E6BA14A6F4F32C639D5336FC7
3,059,723 UART: Caliptra RT
3,060,066 UART: [state] CFI Enabled
3,179,889 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,174 >>> mbox cmd response: success
2,742,027 UART:
2,742,043 UART: Running Caliptra FMC ...
2,742,451 UART:
2,742,594 UART: [state] CFI Enabled
2,753,528 UART: [fht] FMC Alias Private Key: 7
2,873,332 UART: [art] Extend RT PCRs Done
2,873,760 UART: [art] Lock RT PCRs Done
2,875,368 UART: [art] Populate DV Done
2,883,444 UART: [fht] FMC Alias Private Key: 7
2,884,384 UART: [art] Derive CDI
2,884,664 UART: [art] Store in slot 0x4
2,970,375 UART: [art] Derive Key Pair
2,970,735 UART: [art] Store priv key in slot 0x5
2,984,125 UART: [art] Derive Key Pair - Done
2,998,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,226 UART: [art] PUB.X = 53FB87E40F39D4D70DFCF6C2842202264D5FBC75980F7104C34256AC05A74F5D7DC14BD1BDCAC558D2023684D4A17492
3,021,981 UART: [art] PUB.Y = 8C14ACB901F60152F94B2DBBB59F4BA8165795DE1C1BB1CDABFA7EAE2C05C65EFBBE982F9B1B4F2C9C38E8918E8816FB
3,028,950 UART: [art] SIG.R = A46B9AD503D6FDC81F22BC53D5994DB832480CFAB425C4736989985B61EE2BDD44C716CEA7133D77CFE54EA45CD643BE
3,035,730 UART: [art] SIG.S = AD08F9419794D36E848BBAD2EC25F8D82E2FEEEBF119AE3C464087F2F1811170FE158F70072DD6713D94C4C719D7702B
3,060,028 UART: Caliptra RT
3,060,371 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,175,657 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9DA ra=0x400078B0 error_internal_intr_r=00000040
3,178,103 UART: [rt] WDT Expired
3,178,390 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,330 UART: [kat] ++
895,482 UART: [kat] sha1
899,630 UART: [kat] SHA2-256
901,570 UART: [kat] SHA2-384
904,165 UART: [kat] SHA2-512-ACC
906,066 UART: [kat] ECC-384
916,127 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,170,150 UART: [cold-reset] ++
1,170,562 UART: [fht] FHT @ 0x50003400
1,173,136 UART: [idev] ++
1,173,304 UART: [idev] CDI.KEYID = 6
1,173,665 UART: [idev] SUBJECT.KEYID = 7
1,174,090 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3794 , 3794
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,585 UART: [kat] SHA2-256
901,525 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
916,442 UART: [kat] HMAC-384Kdf
920,932 UART: [kat] LMS
1,169,244 UART: [kat] --
1,170,205 UART: [cold-reset] ++
1,170,785 UART: [fht] FHT @ 0x50003400
1,173,623 UART: [idev] ++
1,173,791 UART: [idev] CDI.KEYID = 6
1,174,152 UART: [idev] SUBJECT.KEYID = 7
1,174,577 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3949 , 3949
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,688 UART: [state] LifecycleState = Unprovisioned
86,343 UART: [state] DebugLocked = No
86,863 UART: [state] WD Timer not started. Device not locked for debugging
88,180 UART: [kat] SHA2-256
891,730 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,834 UART: [kat] ++
895,986 UART: [kat] sha1
900,254 UART: [kat] SHA2-256
902,194 UART: [kat] SHA2-384
904,917 UART: [kat] SHA2-512-ACC
906,818 UART: [kat] ECC-384
916,839 UART: [kat] HMAC-384Kdf
921,307 UART: [kat] LMS
1,169,619 UART: [kat] --
1,170,578 UART: [cold-reset] ++
1,171,092 UART: [fht] FHT @ 0x50003400
1,173,754 UART: [idev] ++
1,173,922 UART: [idev] CDI.KEYID = 6
1,174,283 UART: [idev] SUBJECT.KEYID = 7
1,174,708 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3794 , 3794
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,534 UART: [kat] HMAC-384Kdf
921,044 UART: [kat] LMS
1,169,356 UART: [kat] --
1,170,203 UART: [cold-reset] ++
1,170,609 UART: [fht] FHT @ 0x50003400
1,173,283 UART: [idev] ++
1,173,451 UART: [idev] CDI.KEYID = 6
1,173,812 UART: [idev] SUBJECT.KEYID = 7
1,174,237 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3949 , 3949
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 8.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,910 UART: [kat] SHA2-256
901,850 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
915,965 UART: [kat] HMAC-384Kdf
920,367 UART: [kat] LMS
1,168,679 UART: [kat] --
1,169,652 UART: [cold-reset] ++
1,170,032 UART: [fht] FHT @ 0x50003400
1,172,688 UART: [idev] ++
1,172,856 UART: [idev] CDI.KEYID = 6
1,173,217 UART: [idev] SUBJECT.KEYID = 7
1,173,642 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3794 , 3794
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 8.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,677 UART: [kat] SHA2-256
891,227 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
915,660 UART: [kat] HMAC-384Kdf
920,362 UART: [kat] LMS
1,168,674 UART: [kat] --
1,169,467 UART: [cold-reset] ++
1,169,929 UART: [fht] FHT @ 0x50003400
1,172,729 UART: [idev] ++
1,172,897 UART: [idev] CDI.KEYID = 6
1,173,258 UART: [idev] SUBJECT.KEYID = 7
1,173,683 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3949 , 3949
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
191,490 UART:
191,865 UART: Running Caliptra ROM ...
192,972 UART:
193,111 UART: [state] CFI Enabled
263,892 UART: [state] LifecycleState = Production
265,657 UART: [state] DebugLocked = Yes
267,066 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,037 UART: [kat] SHA2-256
442,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,283 UART: [kat] ++
453,801 UART: [kat] sha1
464,528 UART: [kat] SHA2-256
467,252 UART: [kat] SHA2-384
474,304 UART: [kat] SHA2-512-ACC
476,678 UART: [kat] ECC-384
2,767,895 UART: [kat] HMAC-384Kdf
2,779,578 UART: [kat] LMS
3,969,832 UART: [kat] --
3,973,329 UART: [cold-reset] ++
3,974,698 UART: [fht] Storing FHT @ 0x50003400
3,985,818 UART: [idev] ++
3,986,450 UART: [idev] CDI.KEYID = 6
3,987,364 UART: [idev] SUBJECT.KEYID = 7
3,988,607 UART: [idev] UDS.KEYID = 0
3,989,653 ready_for_fw is high
3,989,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,938 UART: [idev] Erasing UDS.KEYID = 0
7,326,444 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,515 UART: [idev] --
7,352,518 UART: [ldev] ++
7,353,093 UART: [ldev] CDI.KEYID = 6
7,354,133 UART: [ldev] SUBJECT.KEYID = 5
7,355,241 UART: [ldev] AUTHORITY.KEYID = 7
7,356,525 UART: [ldev] FE.KEYID = 1
7,401,244 UART: [ldev] Erasing FE.KEYID = 1
10,734,224 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,619 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,062,157 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,076,837 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,091,193 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,111,482 UART: [ldev] --
13,115,937 UART: [fwproc] Waiting for Commands...
13,118,403 UART: [fwproc] Received command 0x46574c44
13,120,581 UART: [fwproc] Received Image of size 118548 bytes
17,261,554 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,339,205 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,412,433 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,740,988 >>> mbox cmd response: success
17,744,345 UART: [afmc] ++
17,744,937 UART: [afmc] CDI.KEYID = 6
17,745,850 UART: [afmc] SUBJECT.KEYID = 7
17,747,124 UART: [afmc] AUTHORITY.KEYID = 5
21,111,594 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,412,931 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,415,189 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
23,429,692 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
23,444,424 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
23,458,820 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
23,480,832 UART: [afmc] --
23,485,362 UART: [cold-reset] --
23,490,088 UART: [state] Locking Datavault
23,494,318 UART: [state] Locking PCR0, PCR1 and PCR31
23,496,080 UART: [state] Locking ICCM
23,497,689 UART: [exit] Launching FMC @ 0x40000130
23,506,057 UART:
23,506,301 UART: Running Caliptra FMC ...
23,507,403 UART:
23,507,558 UART: [state] CFI Enabled
23,573,324 UART: [fht] FMC Alias Private Key: 7
25,913,520 UART: [art] Extend RT PCRs Done
25,914,765 UART: [art] Lock RT PCRs Done
25,916,452 UART: [art] Populate DV Done
25,921,924 UART: [fht] FMC Alias Private Key: 7
25,923,569 UART: [art] Derive CDI
25,924,382 UART: [art] Store in slot 0x4
25,982,298 UART: [art] Derive Key Pair
25,983,331 UART: [art] Store priv key in slot 0x5
29,275,836 UART: [art] Derive Key Pair - Done
29,288,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,578,183 UART: [art] Erasing AUTHORITY.KEYID = 7
31,579,691 UART: [art] PUB.X = F7046A0B6F711A18AD60A6C7C38261E5D8A4AB02689C8B93FAE7E4B4C642F50221E55EF9EEF10AE34F1EB0243D9ADFF3
31,586,966 UART: [art] PUB.Y = 493E133C28AF55F76D1F28D7786D66A3A3050DFF7E5095E28EA4CEC2A359B117E831CC6D52D3F1B22033D5BB46A8533F
31,594,254 UART: [art] SIG.R = BE4AD94FEB40B93DC16D5C8DB39529B1F3C323CDAA5694E02547842B61042E4E2410B60D9E4ACA7CAD786B76555B35E8
31,601,638 UART: [art] SIG.S = 50E859649BC037567CFB627BF517F2D805E1573FB60EA7D30AD0FCD2F3217F9A519C7D457AC2454A771951CB025BD50E
32,906,601 UART: Caliptra RT
32,907,321 UART: [state] CFI Enabled
33,085,121 UART: [rt] RT listening for mailbox commands...
298 writing to cptra_bootfsm_go
552 UART:
703 UART: Running Caliptra ROM ...
1,803 UART:
1,957 UART: [state] CFI Enabled
69,386 UART: [state] LifecycleState = Production
71,160 UART: [state] DebugLocked = Yes
73,283 UART: [state] Starting the Watchdog Timer 40000000 cycles
77,825 UART: [kat] SHA2-256
247,571 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
258,045 UART: [kat] ++
258,562 UART: [kat] sha1
268,788 UART: [kat] SHA2-256
271,478 UART: [kat] SHA2-384
277,031 UART: [kat] SHA2-512-ACC
279,430 UART: [kat] ECC-384
2,574,074 UART: [kat] HMAC-384Kdf
2,605,947 UART: [kat] LMS
3,796,277 UART: [kat] --
3,801,758 UART: [warm-reset] ++
3,805,647 UART: [warm-reset] --
3,810,220 UART: [state] Locking Datavault
3,814,070 UART: [state] Locking PCR0, PCR1 and PCR31
3,815,837 UART: [state] Locking ICCM
3,818,061 UART: [exit] Launching FMC @ 0x40000130
3,826,423 UART:
3,826,701 UART: Running Caliptra FMC ...
3,827,815 UART:
3,827,972 UART: [state] CFI Enabled
3,877,418 UART: [art] Skip pcr extension
3,878,536 UART: [art] Extend RT PCRs Done
3,879,680 UART: [art] Lock RT PCRs Done
3,880,912 UART: [art] Populate DV Done
3,886,374 UART: [fht] FMC Alias Private Key: 7
3,888,126 UART: [art] Derive CDI
3,888,942 UART: [art] Store in slot 0x4
3,945,924 UART: [art] Derive Key Pair
3,946,967 UART: [art] Store priv key in slot 0x5
7,239,913 UART: [art] Derive Key Pair - Done
7,252,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,541,910 UART: [art] Erasing AUTHORITY.KEYID = 7
9,543,430 UART: [art] PUB.X = F7046A0B6F711A18AD60A6C7C38261E5D8A4AB02689C8B93FAE7E4B4C642F50221E55EF9EEF10AE34F1EB0243D9ADFF3
9,550,696 UART: [art] PUB.Y = 493E133C28AF55F76D1F28D7786D66A3A3050DFF7E5095E28EA4CEC2A359B117E831CC6D52D3F1B22033D5BB46A8533F
9,557,986 UART: [art] SIG.R = BE4AD94FEB40B93DC16D5C8DB39529B1F3C323CDAA5694E02547842B61042E4E2410B60D9E4ACA7CAD786B76555B35E8
9,565,354 UART: [art] SIG.S = 50E859649BC037567CFB627BF517F2D805E1573FB60EA7D30AD0FCD2F3217F9A519C7D457AC2454A771951CB025BD50E
10,870,281 UART: Caliptra RT
10,870,971 UART: [state] CFI Enabled
11,313,145 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,805,686 ready_for_fw is high
3,806,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,018,340 >>> mbox cmd response: success
23,715,543 UART:
23,715,952 UART: Running Caliptra FMC ...
23,717,128 UART:
23,717,295 UART: [state] CFI Enabled
23,783,349 UART: [fht] FMC Alias Private Key: 7
26,123,629 UART: [art] Extend RT PCRs Done
26,124,844 UART: [art] Lock RT PCRs Done
26,126,366 UART: [art] Populate DV Done
26,131,831 UART: [fht] FMC Alias Private Key: 7
26,133,370 UART: [art] Derive CDI
26,134,137 UART: [art] Store in slot 0x4
26,191,609 UART: [art] Derive Key Pair
26,192,617 UART: [art] Store priv key in slot 0x5
29,485,126 UART: [art] Derive Key Pair - Done
29,497,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,785,830 UART: [art] Erasing AUTHORITY.KEYID = 7
31,787,400 UART: [art] PUB.X = 192819B66C37AF5E238A1DE1377D84752B9CA50DB8A8E619B8D887CBDC12FBE072EA69BFC2254E3E7F6E6F1A8B1C0EF6
31,794,649 UART: [art] PUB.Y = B6C63B17266DCAC7095CB388CB71489AEF53EDA15A9235B7C255C456B39A7CA5D1865C6C91D979073FA95C774A00F089
31,801,881 UART: [art] SIG.R = 1358D643EC27AD6ABDA6BC761CDB701E20ADDE36764EB9DC96484894E63ECBC90C6B64100F113A168C8941B87714C2FF
31,809,306 UART: [art] SIG.S = D3BBF39FCC9EFE61866E86C603C4CBEE31E0457F26CE0D35840921389305E83295BD6FA288D63E8365F0EDF942C70595
33,114,070 UART: Caliptra RT
33,114,798 UART: [state] CFI Enabled
33,291,357 UART: [rt] RT listening for mailbox commands...
300 writing to cptra_bootfsm_go
3,592,022 UART:
3,592,363 UART: Running Caliptra FMC ...
3,593,431 UART:
3,593,588 UART: [state] CFI Enabled
3,642,758 UART: [art] Skip pcr extension
3,643,908 UART: [art] Extend RT PCRs Done
3,645,060 UART: [art] Lock RT PCRs Done
3,646,259 UART: [art] Populate DV Done
3,652,049 UART: [fht] FMC Alias Private Key: 7
3,653,590 UART: [art] Derive CDI
3,654,404 UART: [art] Store in slot 0x4
3,711,333 UART: [art] Derive Key Pair
3,712,327 UART: [art] Store priv key in slot 0x5
7,004,373 UART: [art] Derive Key Pair - Done
7,017,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,306,403 UART: [art] Erasing AUTHORITY.KEYID = 7
9,307,912 UART: [art] PUB.X = 192819B66C37AF5E238A1DE1377D84752B9CA50DB8A8E619B8D887CBDC12FBE072EA69BFC2254E3E7F6E6F1A8B1C0EF6
9,315,223 UART: [art] PUB.Y = B6C63B17266DCAC7095CB388CB71489AEF53EDA15A9235B7C255C456B39A7CA5D1865C6C91D979073FA95C774A00F089
9,322,458 UART: [art] SIG.R = 1358D643EC27AD6ABDA6BC761CDB701E20ADDE36764EB9DC96484894E63ECBC90C6B64100F113A168C8941B87714C2FF
9,329,899 UART: [art] SIG.S = D3BBF39FCC9EFE61866E86C603C4CBEE31E0457F26CE0D35840921389305E83295BD6FA288D63E8365F0EDF942C70595
10,635,231 UART: Caliptra RT
10,635,930 UART: [state] CFI Enabled
11,050,647 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
191,876 UART:
192,234 UART: Running Caliptra ROM ...
193,328 UART:
602,940 UART: [state] CFI Enabled
621,944 UART: [state] LifecycleState = Production
623,754 UART: [state] DebugLocked = Yes
626,322 UART: [state] Starting the Watchdog Timer 40000000 cycles
632,131 UART: [kat] SHA2-256
801,925 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,469 UART: [kat] ++
813,031 UART: [kat] sha1
824,201 UART: [kat] SHA2-256
826,914 UART: [kat] SHA2-384
831,620 UART: [kat] SHA2-512-ACC
834,053 UART: [kat] ECC-384
3,117,837 UART: [kat] HMAC-384Kdf
3,129,442 UART: [kat] LMS
4,319,608 UART: [kat] --
4,322,280 UART: [cold-reset] ++
4,324,284 UART: [fht] Storing FHT @ 0x50003400
4,335,904 UART: [idev] ++
4,336,470 UART: [idev] CDI.KEYID = 6
4,337,420 UART: [idev] SUBJECT.KEYID = 7
4,338,658 UART: [idev] UDS.KEYID = 0
4,339,626 ready_for_fw is high
4,339,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,783 UART: [idev] Erasing UDS.KEYID = 0
7,630,313 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,044 UART: [idev] --
7,657,506 UART: [ldev] ++
7,658,086 UART: [ldev] CDI.KEYID = 6
7,659,024 UART: [ldev] SUBJECT.KEYID = 5
7,660,312 UART: [ldev] AUTHORITY.KEYID = 7
7,661,462 UART: [ldev] FE.KEYID = 1
7,672,827 UART: [ldev] Erasing FE.KEYID = 1
10,964,359 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,256,111 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,270,666 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,285,291 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,299,673 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,318,823 UART: [ldev] --
13,323,000 UART: [fwproc] Waiting for Commands...
13,325,040 UART: [fwproc] Received command 0x46574c44
13,327,281 UART: [fwproc] Received Image of size 118548 bytes
17,467,999 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,537,622 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,610,847 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,940,148 >>> mbox cmd response: success
17,944,304 UART: [afmc] ++
17,944,898 UART: [afmc] CDI.KEYID = 6
17,945,777 UART: [afmc] SUBJECT.KEYID = 7
17,947,047 UART: [afmc] AUTHORITY.KEYID = 5
21,265,215 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,559,743 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,562,009 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
23,576,499 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
23,591,277 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
23,605,674 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
23,627,645 UART: [afmc] --
23,632,216 UART: [cold-reset] --
23,637,376 UART: [state] Locking Datavault
23,644,618 UART: [state] Locking PCR0, PCR1 and PCR31
23,646,379 UART: [state] Locking ICCM
23,648,206 UART: [exit] Launching FMC @ 0x40000130
23,656,603 UART:
23,656,852 UART: Running Caliptra FMC ...
23,657,953 UART:
23,658,108 UART: [state] CFI Enabled
23,665,995 UART: [fht] FMC Alias Private Key: 7
26,005,533 UART: [art] Extend RT PCRs Done
26,006,773 UART: [art] Lock RT PCRs Done
26,008,074 UART: [art] Populate DV Done
26,013,604 UART: [fht] FMC Alias Private Key: 7
26,015,306 UART: [art] Derive CDI
26,016,118 UART: [art] Store in slot 0x4
26,058,882 UART: [art] Derive Key Pair
26,059,924 UART: [art] Store priv key in slot 0x5
29,302,209 UART: [art] Derive Key Pair - Done
29,315,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,595,347 UART: [art] Erasing AUTHORITY.KEYID = 7
31,596,871 UART: [art] PUB.X = 18A9D20ED8F4A513801A9430C2819DF217F047C02DA7820E7BF148A7505280668ACAE1BABD7C79B1E9135EF83362B129
31,604,103 UART: [art] PUB.Y = 56EA2B553909F4FEA9B9B58E1D18EBF09DB3943CFFD51EDF61FADFADD961CE54FA20C16F41BAC430762D8A26D84AC383
31,611,393 UART: [art] SIG.R = 4526152EE5AA29F5F259FF39D515219EB28D3B3B0A1F60D8D93D3DBC319BC771215CDBE06118AE4608E67B20944F1426
31,618,783 UART: [art] SIG.S = 303EFA2C1C71BDF93026F48AFFD98A7D039690ADADDD71D0C34E46290C5272491BC1170E0FBA26E3D1C02A06DB31E388
32,923,394 UART: Caliptra RT
32,924,109 UART: [state] CFI Enabled
33,057,328 UART: [rt] RT listening for mailbox commands...
297 writing to cptra_bootfsm_go
543 UART:
685 UART: Running Caliptra ROM ...
1,719 UART:
7,471,818 UART: [state] CFI Enabled
7,484,300 UART: [state] LifecycleState = Production
7,486,109 UART: [state] DebugLocked = Yes
7,487,936 UART: [state] Starting the Watchdog Timer 40000000 cycles
7,492,728 UART: [kat] SHA2-256
7,662,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,673,038 UART: [kat] ++
7,673,500 UART: [kat] sha1
7,684,762 UART: [kat] SHA2-256
7,687,455 UART: [kat] SHA2-384
7,692,420 UART: [kat] SHA2-512-ACC
7,694,775 UART: [kat] ECC-384
9,979,221 UART: [kat] HMAC-384Kdf
9,990,106 UART: [kat] LMS
11,180,230 UART: [kat] --
11,184,489 UART: [warm-reset] ++
11,189,445 UART: [warm-reset] --
11,192,711 UART: [state] Locking Datavault
11,195,579 UART: [state] Locking PCR0, PCR1 and PCR31
11,197,335 UART: [state] Locking ICCM
11,198,399 UART: [exit] Launching FMC @ 0x40000130
11,206,815 UART:
11,207,053 UART: Running Caliptra FMC ...
11,208,103 UART:
11,208,251 UART: [state] CFI Enabled
11,210,355 UART: [art] Skip pcr extension
11,211,460 UART: [art] Extend RT PCRs Done
11,212,596 UART: [art] Lock RT PCRs Done
11,213,660 UART: [art] Populate DV Done
11,219,224 UART: [fht] FMC Alias Private Key: 7
11,220,917 UART: [art] Derive CDI
11,221,736 UART: [art] Store in slot 0x4
11,264,598 UART: [art] Derive Key Pair
11,265,635 UART: [art] Store priv key in slot 0x5
14,508,299 UART: [art] Derive Key Pair - Done
14,521,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
16,801,704 UART: [art] Erasing AUTHORITY.KEYID = 7
16,803,230 UART: [art] PUB.X = 18A9D20ED8F4A513801A9430C2819DF217F047C02DA7820E7BF148A7505280668ACAE1BABD7C79B1E9135EF83362B129
16,810,455 UART: [art] PUB.Y = 56EA2B553909F4FEA9B9B58E1D18EBF09DB3943CFFD51EDF61FADFADD961CE54FA20C16F41BAC430762D8A26D84AC383
16,817,790 UART: [art] SIG.R = 4526152EE5AA29F5F259FF39D515219EB28D3B3B0A1F60D8D93D3DBC319BC771215CDBE06118AE4608E67B20944F1426
16,825,158 UART: [art] SIG.S = 303EFA2C1C71BDF93026F48AFFD98A7D039690ADADDD71D0C34E46290C5272491BC1170E0FBA26E3D1C02A06DB31E388
18,130,557 UART: Caliptra RT
18,131,265 UART: [state] CFI Enabled
18,501,137 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
4,127,419 ready_for_fw is high
4,127,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,199,759 >>> mbox cmd response: success
23,844,332 UART:
23,844,891 UART: Running Caliptra FMC ...
23,846,070 UART:
23,846,240 UART: [state] CFI Enabled
23,854,070 UART: [fht] FMC Alias Private Key: 7
26,192,783 UART: [art] Extend RT PCRs Done
26,194,005 UART: [art] Lock RT PCRs Done
26,195,741 UART: [art] Populate DV Done
26,201,207 UART: [fht] FMC Alias Private Key: 7
26,202,793 UART: [art] Derive CDI
26,203,608 UART: [art] Store in slot 0x4
26,245,996 UART: [art] Derive Key Pair
26,247,054 UART: [art] Store priv key in slot 0x5
29,488,743 UART: [art] Derive Key Pair - Done
29,501,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,782,454 UART: [art] Erasing AUTHORITY.KEYID = 7
31,783,986 UART: [art] PUB.X = 2FECB9DA6EBC5053820120215261423B32A2BBD646BB3B78EDECD612F93D705A5F8281B78D0F2CA81BBD934D9869B6FA
31,791,244 UART: [art] PUB.Y = 8F31BFBD33B115E0943199A60E6F4028328ECE3B7C17BBEAEDA644BF84912AD0121166585A805A21721DF80CFD2D02D2
31,798,486 UART: [art] SIG.R = 40399FD09740654FA9ACF5F4E423888A6B1812AE88D4C05340E0EB56FDCAC968A664BB8CE3B2455375114A833A1CCA9F
31,805,900 UART: [art] SIG.S = E78AA2C2190D58C36407D8E382F33864D5DD66435B58D95F203EB6A6333AC02A799CB22A063DED1C6719F7DF03865C1B
33,111,330 UART: Caliptra RT
33,112,046 UART: [state] CFI Enabled
33,243,744 UART: [rt] RT listening for mailbox commands...
294 writing to cptra_bootfsm_go
10,813,832 UART:
10,814,241 UART: Running Caliptra FMC ...
10,815,289 UART:
10,815,441 UART: [state] CFI Enabled
10,817,404 UART: [art] Skip pcr extension
10,818,530 UART: [art] Extend RT PCRs Done
10,819,592 UART: [art] Lock RT PCRs Done
10,820,771 UART: [art] Populate DV Done
10,826,320 UART: [fht] FMC Alias Private Key: 7
10,827,904 UART: [art] Derive CDI
10,828,642 UART: [art] Store in slot 0x4
10,871,786 UART: [art] Derive Key Pair
10,872,827 UART: [art] Store priv key in slot 0x5
14,115,006 UART: [art] Derive Key Pair - Done
14,127,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
16,408,217 UART: [art] Erasing AUTHORITY.KEYID = 7
16,409,747 UART: [art] PUB.X = 2FECB9DA6EBC5053820120215261423B32A2BBD646BB3B78EDECD612F93D705A5F8281B78D0F2CA81BBD934D9869B6FA
16,416,994 UART: [art] PUB.Y = 8F31BFBD33B115E0943199A60E6F4028328ECE3B7C17BBEAEDA644BF84912AD0121166585A805A21721DF80CFD2D02D2
16,424,217 UART: [art] SIG.R = 40399FD09740654FA9ACF5F4E423888A6B1812AE88D4C05340E0EB56FDCAC968A664BB8CE3B2455375114A833A1CCA9F
16,431,660 UART: [art] SIG.S = E78AA2C2190D58C36407D8E382F33864D5DD66435B58D95F203EB6A6333AC02A799CB22A063DED1C6719F7DF03865C1B
17,736,977 UART: Caliptra RT
17,737,717 UART: [state] CFI Enabled
18,112,769 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
191,576 UART:
191,937 UART: Running Caliptra ROM ...
193,127 UART:
193,282 UART: [state] CFI Enabled
263,905 UART: [state] LifecycleState = Production
265,909 UART: [state] DebugLocked = Yes
267,842 UART: [state] Starting the WD Timer 40000000 cycles
273,237 UART: [kat] SHA2-256
452,927 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,692 UART: [kat] ++
464,295 UART: [kat] sha1
473,996 UART: [kat] SHA2-256
476,730 UART: [kat] SHA2-384
482,508 UART: [kat] SHA2-512-ACC
484,874 UART: [kat] ECC-384
2,949,193 UART: [kat] HMAC-384Kdf
2,971,544 UART: [kat] LMS
3,448,105 UART: [kat] --
3,453,326 UART: [cold-reset] ++
3,454,547 UART: [fht] FHT @ 0x50003400
3,466,324 UART: [idev] ++
3,466,927 UART: [idev] CDI.KEYID = 6
3,467,847 UART: [idev] SUBJECT.KEYID = 7
3,469,096 UART: [idev] UDS.KEYID = 0
3,470,026 ready_for_fw is high
3,470,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,196 UART: [idev] Erasing UDS.KEYID = 0
5,985,666 UART: [idev] Sha1 KeyId Algorithm
6,010,906 UART: [idev] --
6,016,062 UART: [ldev] ++
6,016,646 UART: [ldev] CDI.KEYID = 6
6,017,587 UART: [ldev] SUBJECT.KEYID = 5
6,018,757 UART: [ldev] AUTHORITY.KEYID = 7
6,020,046 UART: [ldev] FE.KEYID = 1
6,059,105 UART: [ldev] Erasing FE.KEYID = 1
8,563,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,329 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,315,124 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,331,012 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,346,792 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,369,147 UART: [ldev] --
10,374,480 UART: [fwproc] Wait for Commands...
10,376,146 UART: [fwproc] Recv command 0x46574c44
10,378,134 UART: [fwproc] Recv'd Img size: 118548 bytes
13,896,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,975,338 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,048,347 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,377,259 >>> mbox cmd response: success
14,381,905 UART: [afmc] ++
14,382,492 UART: [afmc] CDI.KEYID = 6
14,383,514 UART: [afmc] SUBJECT.KEYID = 7
14,384,674 UART: [afmc] AUTHORITY.KEYID = 5
16,919,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,659,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,661,758 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,677,708 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,693,689 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,709,284 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,734,705 UART: [afmc] --
18,737,860 UART: [cold-reset] --
18,742,054 UART: [state] Locking Datavault
18,747,427 UART: [state] Locking PCR0, PCR1 and PCR31
18,749,166 UART: [state] Locking ICCM
18,751,736 UART: [exit] Launching FMC @ 0x40000130
18,760,138 UART:
18,760,386 UART: Running Caliptra FMC ...
18,761,493 UART:
18,761,655 UART: [state] CFI Enabled
18,817,047 UART: [fht] FMC Alias Private Key: 7
20,583,567 UART: [art] Extend RT PCRs Done
20,584,940 UART: [art] Lock RT PCRs Done
20,586,542 UART: [art] Populate DV Done
20,591,962 UART: [fht] FMC Alias Private Key: 7
20,593,666 UART: [art] Derive CDI
20,594,485 UART: [art] Store in slot 0x4
20,649,256 UART: [art] Derive Key Pair
20,650,263 UART: [art] Store priv key in slot 0x5
23,112,516 UART: [art] Derive Key Pair - Done
23,125,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,839,339 UART: [art] Erasing AUTHORITY.KEYID = 7
24,840,841 UART: [art] PUB.X = FA033DBA173D0B4FE9EB63C19CE2B13C1DE6E0D92CC518FA0DE0E708C9D1E51C38576574EEBF9CBA094405A7EDAA4291
24,848,143 UART: [art] PUB.Y = 3FC870861E209CD51C5B1C25298534E75A27F4F8EB4814DF38534F44116B2AEA35789FDC123C919539D7B13F721A7B51
24,855,375 UART: [art] SIG.R = EDDBF867D93030065B4985FBE0DABEB190D880DDC4A3EE3D7CFCC74D9E2B022CCF3B76A93CA24E7B9BD451A2E7428C0B
24,862,834 UART: [art] SIG.S = 19B207CDA7BC58BB07254C6C834015D3816F89657226C121EA5480EA59115E5523DDCF80BDC0395F5D6613882F25F684
25,841,878 UART: Caliptra RT
25,842,598 UART: [state] CFI Enabled
26,024,345 UART: [rt] RT listening for mailbox commands...
298 writing to cptra_bootfsm_go
570 UART:
717 UART: Running Caliptra ROM ...
1,820 UART:
1,979 UART: [state] CFI Enabled
69,329 UART: [state] LifecycleState = Production
71,106 UART: [state] DebugLocked = Yes
73,523 UART: [state] Starting the WD Timer 40000000 cycles
77,963 UART: [kat] SHA2-256
257,520 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
268,310 UART: [kat] ++
268,811 UART: [kat] sha1
280,336 UART: [kat] SHA2-256
283,026 UART: [kat] SHA2-384
288,525 UART: [kat] SHA2-512-ACC
290,924 UART: [kat] ECC-384
2,753,145 UART: [kat] HMAC-384Kdf
2,775,845 UART: [kat] LMS
3,252,283 UART: [kat] --
3,256,937 UART: [warm-reset] ++
3,261,734 UART: [warm-reset] --
3,266,143 UART: [state] Locking Datavault
3,268,155 UART: [state] Locking PCR0, PCR1 and PCR31
3,269,863 UART: [state] Locking ICCM
3,271,255 UART: [exit] Launching FMC @ 0x40000130
3,279,684 UART:
3,279,963 UART: Running Caliptra FMC ...
3,280,998 UART:
3,281,153 UART: [state] CFI Enabled
3,342,832 UART: [art] Skip pcr extension
3,343,945 UART: [art] Extend RT PCRs Done
3,345,010 UART: [art] Lock RT PCRs Done
3,346,407 UART: [art] Populate DV Done
3,352,146 UART: [fht] FMC Alias Private Key: 7
3,353,739 UART: [art] Derive CDI
3,354,483 UART: [art] Store in slot 0x4
3,411,725 UART: [art] Derive Key Pair
3,412,766 UART: [art] Store priv key in slot 0x5
5,875,075 UART: [art] Derive Key Pair - Done
5,888,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,602,264 UART: [art] Erasing AUTHORITY.KEYID = 7
7,603,776 UART: [art] PUB.X = FA033DBA173D0B4FE9EB63C19CE2B13C1DE6E0D92CC518FA0DE0E708C9D1E51C38576574EEBF9CBA094405A7EDAA4291
7,611,025 UART: [art] PUB.Y = 3FC870861E209CD51C5B1C25298534E75A27F4F8EB4814DF38534F44116B2AEA35789FDC123C919539D7B13F721A7B51
7,618,294 UART: [art] SIG.R = EDDBF867D93030065B4985FBE0DABEB190D880DDC4A3EE3D7CFCC74D9E2B022CCF3B76A93CA24E7B9BD451A2E7428C0B
7,625,702 UART: [art] SIG.S = 19B207CDA7BC58BB07254C6C834015D3816F89657226C121EA5480EA59115E5523DDCF80BDC0395F5D6613882F25F684
8,604,648 UART: Caliptra RT
8,605,363 UART: [state] CFI Enabled
9,024,081 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
3,459,698 ready_for_fw is high
3,460,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,256,056 >>> mbox cmd response: success
18,535,216 UART:
18,535,585 UART: Running Caliptra FMC ...
18,536,749 UART:
18,536,914 UART: [state] CFI Enabled
18,601,609 UART: [fht] FMC Alias Private Key: 7
20,368,274 UART: [art] Extend RT PCRs Done
20,369,497 UART: [art] Lock RT PCRs Done
20,371,123 UART: [art] Populate DV Done
20,376,710 UART: [fht] FMC Alias Private Key: 7
20,378,257 UART: [art] Derive CDI
20,379,076 UART: [art] Store in slot 0x4
20,433,640 UART: [art] Derive Key Pair
20,434,682 UART: [art] Store priv key in slot 0x5
22,897,256 UART: [art] Derive Key Pair - Done
22,910,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,622,565 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,067 UART: [art] PUB.X = ACE07DA2BAC94A10A113B5ACE3E508C14AFB127920067E1B59F997B0BDD60DA91A026EA84F6CBF99BB13A6F62124083E
24,631,355 UART: [art] PUB.Y = BF59E6E7F86E3EE41444F3BA09E9999B9C70AF249CFBF6B88A62DE11A35C26C08E39F72101FAD86C001A5E26115D89E4
24,638,568 UART: [art] SIG.R = B3E0331A0C522A1209EC8E74015C1759F95305A94DB4EA60A31A34DC6E279E8482A42F514DBC4440865249A375C009B6
24,645,929 UART: [art] SIG.S = D8457615A3CE725FC00AF109D3FFB99597D10018ECA0DC326506D074B9B378BCB27A661424C1D7D3EFB32F474E7F7B96
25,624,667 UART: Caliptra RT
25,625,367 UART: [state] CFI Enabled
25,805,887 UART: [rt] RT listening for mailbox commands...
298 writing to cptra_bootfsm_go
3,270,647 UART:
3,270,966 UART: Running Caliptra FMC ...
3,272,036 UART:
3,272,198 UART: [state] CFI Enabled
3,322,781 UART: [art] Skip pcr extension
3,323,896 UART: [art] Extend RT PCRs Done
3,325,056 UART: [art] Lock RT PCRs Done
3,326,460 UART: [art] Populate DV Done
3,332,093 UART: [fht] FMC Alias Private Key: 7
3,333,747 UART: [art] Derive CDI
3,334,568 UART: [art] Store in slot 0x4
3,391,991 UART: [art] Derive Key Pair
3,393,028 UART: [art] Store priv key in slot 0x5
5,855,893 UART: [art] Derive Key Pair - Done
5,868,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,581,314 UART: [art] Erasing AUTHORITY.KEYID = 7
7,582,820 UART: [art] PUB.X = ACE07DA2BAC94A10A113B5ACE3E508C14AFB127920067E1B59F997B0BDD60DA91A026EA84F6CBF99BB13A6F62124083E
7,590,113 UART: [art] PUB.Y = BF59E6E7F86E3EE41444F3BA09E9999B9C70AF249CFBF6B88A62DE11A35C26C08E39F72101FAD86C001A5E26115D89E4
7,597,384 UART: [art] SIG.R = B3E0331A0C522A1209EC8E74015C1759F95305A94DB4EA60A31A34DC6E279E8482A42F514DBC4440865249A375C009B6
7,604,748 UART: [art] SIG.S = D8457615A3CE725FC00AF109D3FFB99597D10018ECA0DC326506D074B9B378BCB27A661424C1D7D3EFB32F474E7F7B96
8,583,218 UART: Caliptra RT
8,583,907 UART: [state] CFI Enabled
9,006,868 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
191,799 UART:
192,163 UART: Running Caliptra ROM ...
193,382 UART:
603,139 UART: [state] CFI Enabled
614,379 UART: [state] LifecycleState = Production
616,216 UART: [state] DebugLocked = Yes
618,624 UART: [state] Starting the WD Timer 40000000 cycles
623,571 UART: [kat] SHA2-256
803,238 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,005 UART: [kat] ++
814,485 UART: [kat] sha1
826,377 UART: [kat] SHA2-256
829,101 UART: [kat] SHA2-384
834,448 UART: [kat] SHA2-512-ACC
836,821 UART: [kat] ECC-384
3,278,952 UART: [kat] HMAC-384Kdf
3,290,767 UART: [kat] LMS
3,767,224 UART: [kat] --
3,771,945 UART: [cold-reset] ++
3,774,087 UART: [fht] FHT @ 0x50003400
3,784,567 UART: [idev] ++
3,785,124 UART: [idev] CDI.KEYID = 6
3,786,149 UART: [idev] SUBJECT.KEYID = 7
3,787,319 UART: [idev] UDS.KEYID = 0
3,788,244 ready_for_fw is high
3,788,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,694 UART: [idev] Erasing UDS.KEYID = 0
6,263,580 UART: [idev] Sha1 KeyId Algorithm
6,286,683 UART: [idev] --
6,292,620 UART: [ldev] ++
6,293,184 UART: [ldev] CDI.KEYID = 6
6,294,248 UART: [ldev] SUBJECT.KEYID = 5
6,295,349 UART: [ldev] AUTHORITY.KEYID = 7
6,296,577 UART: [ldev] FE.KEYID = 1
6,307,332 UART: [ldev] Erasing FE.KEYID = 1
8,784,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,656 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,521,475 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,537,338 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,553,085 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,574,673 UART: [ldev] --
10,579,340 UART: [fwproc] Wait for Commands...
10,580,943 UART: [fwproc] Recv command 0x46574c44
10,582,924 UART: [fwproc] Recv'd Img size: 118548 bytes
14,098,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,075 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,248,130 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,576,860 >>> mbox cmd response: success
14,581,777 UART: [afmc] ++
14,582,415 UART: [afmc] CDI.KEYID = 6
14,583,350 UART: [afmc] SUBJECT.KEYID = 7
14,584,571 UART: [afmc] AUTHORITY.KEYID = 5
17,084,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,806,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,808,718 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,824,587 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,840,664 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,856,193 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,880,951 UART: [afmc] --
18,885,017 UART: [cold-reset] --
18,888,775 UART: [state] Locking Datavault
18,893,924 UART: [state] Locking PCR0, PCR1 and PCR31
18,895,679 UART: [state] Locking ICCM
18,897,773 UART: [exit] Launching FMC @ 0x40000130
18,906,163 UART:
18,906,395 UART: Running Caliptra FMC ...
18,907,516 UART:
18,907,679 UART: [state] CFI Enabled
18,915,886 UART: [fht] FMC Alias Private Key: 7
20,681,710 UART: [art] Extend RT PCRs Done
20,682,931 UART: [art] Lock RT PCRs Done
20,684,554 UART: [art] Populate DV Done
20,689,807 UART: [fht] FMC Alias Private Key: 7
20,691,462 UART: [art] Derive CDI
20,692,275 UART: [art] Store in slot 0x4
20,734,872 UART: [art] Derive Key Pair
20,735,906 UART: [art] Store priv key in slot 0x5
23,162,964 UART: [art] Derive Key Pair - Done
23,175,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,881,819 UART: [art] Erasing AUTHORITY.KEYID = 7
24,883,316 UART: [art] PUB.X = 54E3767A8C5B7B0FBC98C97D4474DDEF0FD8A6BF338D683BCDEB83245412E9CFC3A5D786E642622EF524D7DDB4D2EE73
24,890,615 UART: [art] PUB.Y = E5D4600122BD3D2FA3A41F5AB32FE9EAAF43FE92EC5E37987B160A1DA7D19FE0731380A4EFB6C40CD441510CBA3E5352
24,897,909 UART: [art] SIG.R = 1CEB4BFC008FFFB118E47B888A6DC796E370AFA37E9B16D1241173A68739423879A91F817F02B1AB6DD3266CAFB84401
24,905,297 UART: [art] SIG.S = 1BDB297AFEEC77551875F40A1D6BBEE48C25A99576534A34B07BFAFBF64B0230EB260D7AB687DAF30BAB3CB4E8E69929
25,884,010 UART: Caliptra RT
25,884,711 UART: [state] CFI Enabled
26,017,311 UART: [rt] RT listening for mailbox commands...
303 writing to cptra_bootfsm_go
544 UART:
683 UART: Running Caliptra ROM ...
1,780 UART:
14,517,687 UART: [state] CFI Enabled
14,531,790 UART: [state] LifecycleState = Production
14,533,562 UART: [state] DebugLocked = Yes
14,536,122 UART: [state] Starting the WD Timer 40000000 cycles
14,540,618 UART: [kat] SHA2-256
14,720,300 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,731,089 UART: [kat] ++
14,731,567 UART: [kat] sha1
14,743,424 UART: [kat] SHA2-256
14,746,115 UART: [kat] SHA2-384
14,752,746 UART: [kat] SHA2-512-ACC
14,755,144 UART: [kat] ECC-384
17,196,953 UART: [kat] HMAC-384Kdf
17,209,013 UART: [kat] LMS
17,685,485 UART: [kat] --
17,689,868 UART: [warm-reset] ++
17,694,175 UART: [warm-reset] --
17,699,057 UART: [state] Locking Datavault
17,703,556 UART: [state] Locking PCR0, PCR1 and PCR31
17,705,308 UART: [state] Locking ICCM
17,707,212 UART: [exit] Launching FMC @ 0x40000130
17,715,602 UART:
17,715,838 UART: Running Caliptra FMC ...
17,716,911 UART:
17,717,064 UART: [state] CFI Enabled
17,719,011 UART: [art] Skip pcr extension
17,720,114 UART: [art] Extend RT PCRs Done
17,721,250 UART: [art] Lock RT PCRs Done
17,722,370 UART: [art] Populate DV Done
17,727,788 UART: [fht] FMC Alias Private Key: 7
17,729,307 UART: [art] Derive CDI
17,730,075 UART: [art] Store in slot 0x4
17,772,723 UART: [art] Derive Key Pair
17,773,723 UART: [art] Store priv key in slot 0x5
20,200,658 UART: [art] Derive Key Pair - Done
20,213,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,919,800 UART: [art] Erasing AUTHORITY.KEYID = 7
21,921,305 UART: [art] PUB.X = 54E3767A8C5B7B0FBC98C97D4474DDEF0FD8A6BF338D683BCDEB83245412E9CFC3A5D786E642622EF524D7DDB4D2EE73
21,928,599 UART: [art] PUB.Y = E5D4600122BD3D2FA3A41F5AB32FE9EAAF43FE92EC5E37987B160A1DA7D19FE0731380A4EFB6C40CD441510CBA3E5352
21,935,880 UART: [art] SIG.R = 1CEB4BFC008FFFB118E47B888A6DC796E370AFA37E9B16D1241173A68739423879A91F817F02B1AB6DD3266CAFB84401
21,943,273 UART: [art] SIG.S = 1BDB297AFEEC77551875F40A1D6BBEE48C25A99576534A34B07BFAFBF64B0230EB260D7AB687DAF30BAB3CB4E8E69929
22,922,098 UART: Caliptra RT
22,922,794 UART: [state] CFI Enabled
23,298,769 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,776,755 ready_for_fw is high
3,777,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,462,676 >>> mbox cmd response: success
18,714,685 UART:
18,715,071 UART: Running Caliptra FMC ...
18,716,240 UART:
18,716,400 UART: [state] CFI Enabled
18,724,236 UART: [fht] FMC Alias Private Key: 7
20,489,844 UART: [art] Extend RT PCRs Done
20,491,077 UART: [art] Lock RT PCRs Done
20,492,596 UART: [art] Populate DV Done
20,498,021 UART: [fht] FMC Alias Private Key: 7
20,499,675 UART: [art] Derive CDI
20,500,493 UART: [art] Store in slot 0x4
20,543,250 UART: [art] Derive Key Pair
20,544,249 UART: [art] Store priv key in slot 0x5
22,971,274 UART: [art] Derive Key Pair - Done
22,984,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,690,777 UART: [art] Erasing AUTHORITY.KEYID = 7
24,692,285 UART: [art] PUB.X = 7A0AFB2C50F584D5981CE79C6211A98F6B689AD63ED09B1615D65109C5980E457EF47D14EFB7976148BCB330A0C1C6A0
24,699,553 UART: [art] PUB.Y = 97861F20E66356AA40A2B8C8A69892D78F0CC0433095026A20E2AD49E55735BCDF64506CA7F5D06AC09EB5EAE00CC13D
24,706,779 UART: [art] SIG.R = A7EABD0E9D1341D91EBE81A1FA6B88C2C73C034B1F8023CACA21D15B4AA9863B62056945B8C21502773DE31E23DEA09B
24,714,188 UART: [art] SIG.S = 81E120A1539EFF463A7DFEB7D593D467C49A39BA88723E370A83B2F4397E63148044422C7356D5B31B61192B47641EA5
25,693,344 UART: Caliptra RT
25,694,047 UART: [state] CFI Enabled
25,826,825 UART: [rt] RT listening for mailbox commands...
300 writing to cptra_bootfsm_go
17,882,449 UART:
17,883,152 UART: Running Caliptra FMC ...
17,884,205 UART:
17,884,353 UART: [state] CFI Enabled
17,886,054 UART: [art] Skip pcr extension
17,887,168 UART: [art] Extend RT PCRs Done
17,888,259 UART: [art] Lock RT PCRs Done
17,889,527 UART: [art] Populate DV Done
17,895,106 UART: [fht] FMC Alias Private Key: 7
17,896,751 UART: [art] Derive CDI
17,897,487 UART: [art] Store in slot 0x4
17,940,585 UART: [art] Derive Key Pair
17,941,625 UART: [art] Store priv key in slot 0x5
20,368,324 UART: [art] Derive Key Pair - Done
20,381,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,087,255 UART: [art] Erasing AUTHORITY.KEYID = 7
22,088,770 UART: [art] PUB.X = 7A0AFB2C50F584D5981CE79C6211A98F6B689AD63ED09B1615D65109C5980E457EF47D14EFB7976148BCB330A0C1C6A0
22,096,095 UART: [art] PUB.Y = 97861F20E66356AA40A2B8C8A69892D78F0CC0433095026A20E2AD49E55735BCDF64506CA7F5D06AC09EB5EAE00CC13D
22,103,302 UART: [art] SIG.R = A7EABD0E9D1341D91EBE81A1FA6B88C2C73C034B1F8023CACA21D15B4AA9863B62056945B8C21502773DE31E23DEA09B
22,110,704 UART: [art] SIG.S = 81E120A1539EFF463A7DFEB7D593D467C49A39BA88723E370A83B2F4397E63148044422C7356D5B31B61192B47641EA5
23,089,405 UART: Caliptra RT
23,090,117 UART: [state] CFI Enabled
23,466,370 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
191,610 UART:
191,967 UART: Running Caliptra ROM ...
193,164 UART:
193,320 UART: [state] CFI Enabled
260,649 UART: [state] LifecycleState = Production
262,872 UART: [state] DebugLocked = Yes
265,575 UART: [state] Starting the WD Timer 40000000 cycles
271,307 UART: [kat] SHA2-256
461,207 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,991 UART: [kat] ++
472,594 UART: [kat] sha1
483,516 UART: [kat] SHA2-256
486,601 UART: [kat] SHA2-384
492,379 UART: [kat] SHA2-512-ACC
494,955 UART: [kat] ECC-384
2,947,991 UART: [kat] HMAC-384Kdf
2,971,905 UART: [kat] LMS
3,503,627 UART: [kat] --
3,508,411 UART: [cold-reset] ++
3,509,658 UART: [fht] FHT @ 0x50003400
3,521,348 UART: [idev] ++
3,522,049 UART: [idev] CDI.KEYID = 6
3,523,110 UART: [idev] SUBJECT.KEYID = 7
3,524,214 UART: [idev] UDS.KEYID = 0
3,525,148 ready_for_fw is high
3,525,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,472 UART: [idev] Erasing UDS.KEYID = 0
6,030,877 UART: [idev] Sha1 KeyId Algorithm
6,054,129 UART: [idev] --
6,058,715 UART: [ldev] ++
6,059,388 UART: [ldev] CDI.KEYID = 6
6,060,299 UART: [ldev] SUBJECT.KEYID = 5
6,061,507 UART: [ldev] AUTHORITY.KEYID = 7
6,062,602 UART: [ldev] FE.KEYID = 1
6,099,966 UART: [ldev] Erasing FE.KEYID = 1
8,607,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,950 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,151 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,215 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,226 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,135 UART: [ldev] --
10,413,753 UART: [fwproc] Wait for Commands...
10,416,222 UART: [fwproc] Recv command 0x46574c44
10,418,221 UART: [fwproc] Recv'd Img size: 118548 bytes
13,947,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,027,464 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,151,080 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,711,738 >>> mbox cmd response: success
14,715,421 UART: [afmc] ++
14,716,125 UART: [afmc] CDI.KEYID = 6
14,717,307 UART: [afmc] SUBJECT.KEYID = 7
14,718,795 UART: [afmc] AUTHORITY.KEYID = 5
17,259,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,000,349 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,002,256 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
19,017,264 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
19,032,418 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
19,047,429 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
19,071,601 UART: [afmc] --
19,074,329 UART: [cold-reset] --
19,078,083 UART: [state] Locking Datavault
19,082,308 UART: [state] Locking PCR0, PCR1 and PCR31
19,084,451 UART: [state] Locking ICCM
19,087,252 UART: [exit] Launching FMC @ 0x40000130
19,095,922 UART:
19,096,155 UART: Running Caliptra FMC ...
19,097,252 UART:
19,097,412 UART: [state] CFI Enabled
19,160,104 UART: [fht] FMC Alias Private Key: 7
20,925,994 UART: [art] Extend RT PCRs Done
20,927,203 UART: [art] Lock RT PCRs Done
20,928,716 UART: [art] Populate DV Done
20,934,177 UART: [fht] FMC Alias Private Key: 7
20,935,773 UART: [art] Derive CDI
20,936,588 UART: [art] Store in slot 0x4
20,992,950 UART: [art] Derive Key Pair
20,993,987 UART: [art] Store priv key in slot 0x5
23,457,099 UART: [art] Derive Key Pair - Done
23,470,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,182,823 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,321 UART: [art] PUB.X = 4DC60AFD0CD4455D344B1F3642C941D9E4A0E47C94426F85189F22E7B2575893A5E96AE01B8857B41DDF63B2BB7805A2
25,191,626 UART: [art] PUB.Y = E03CFE10FC48CFAFB23504482FCF49102745E3DFAB6756FE2ED09B373EAFFDD8E7FD55C255F85EAC75C7964C73CF0B93
25,198,917 UART: [art] SIG.R = 295DE935E22224D6856772489ABD1A99E632C5CC260F08EA612FA8DE5360E5ED090D3D64D3C43F2641789B7AB0A7461B
25,206,301 UART: [art] SIG.S = DED05863269E2C6958D0636F51F758A6360A0D14D6A05D7D75B546C2CA71CF8D96FF5114D373E93ACD9B82C91FF14516
26,184,761 UART: Caliptra RT
26,185,444 UART: [state] CFI Enabled
26,367,140 UART: [rt] RT listening for mailbox commands...
298 writing to cptra_bootfsm_go
549 UART:
690 UART: Running Caliptra ROM ...
1,783 UART:
1,962 UART: [state] CFI Enabled
66,685 UART: [state] LifecycleState = Production
68,549 UART: [state] DebugLocked = Yes
70,560 UART: [state] Starting the WD Timer 40000000 cycles
75,676 UART: [kat] SHA2-256
265,563 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
276,285 UART: [kat] ++
276,866 UART: [kat] sha1
287,044 UART: [kat] SHA2-256
290,059 UART: [kat] SHA2-384
294,851 UART: [kat] SHA2-512-ACC
297,403 UART: [kat] ECC-384
2,754,914 UART: [kat] HMAC-384Kdf
2,778,745 UART: [kat] LMS
3,310,329 UART: [kat] --
3,314,274 UART: [warm-reset] ++
3,321,133 UART: [warm-reset] --
3,324,747 UART: [state] Locking Datavault
3,328,657 UART: [state] Locking PCR0, PCR1 and PCR31
3,330,309 UART: [state] Locking ICCM
3,332,137 UART: [exit] Launching FMC @ 0x40000130
3,340,811 UART:
3,341,045 UART: Running Caliptra FMC ...
3,342,149 UART:
3,342,306 UART: [state] CFI Enabled
3,387,410 UART: [art] Skip pcr extension
3,388,596 UART: [art] Extend RT PCRs Done
3,389,743 UART: [art] Lock RT PCRs Done
3,390,971 UART: [art] Populate DV Done
3,396,427 UART: [fht] FMC Alias Private Key: 7
3,398,051 UART: [art] Derive CDI
3,398,826 UART: [art] Store in slot 0x4
3,455,969 UART: [art] Derive Key Pair
3,457,016 UART: [art] Store priv key in slot 0x5
5,920,176 UART: [art] Derive Key Pair - Done
5,933,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,645,478 UART: [art] Erasing AUTHORITY.KEYID = 7
7,646,984 UART: [art] PUB.X = 4DC60AFD0CD4455D344B1F3642C941D9E4A0E47C94426F85189F22E7B2575893A5E96AE01B8857B41DDF63B2BB7805A2
7,654,232 UART: [art] PUB.Y = E03CFE10FC48CFAFB23504482FCF49102745E3DFAB6756FE2ED09B373EAFFDD8E7FD55C255F85EAC75C7964C73CF0B93
7,661,567 UART: [art] SIG.R = 295DE935E22224D6856772489ABD1A99E632C5CC260F08EA612FA8DE5360E5ED090D3D64D3C43F2641789B7AB0A7461B
7,668,909 UART: [art] SIG.S = DED05863269E2C6958D0636F51F758A6360A0D14D6A05D7D75B546C2CA71CF8D96FF5114D373E93ACD9B82C91FF14516
8,648,033 UART: Caliptra RT
8,648,739 UART: [state] CFI Enabled
9,072,723 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,440,594 ready_for_fw is high
3,441,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,870,047 >>> mbox cmd response: success
19,156,233 UART:
19,156,631 UART: Running Caliptra FMC ...
19,157,767 UART:
19,157,919 UART: [state] CFI Enabled
19,226,926 UART: [fht] FMC Alias Private Key: 7
20,992,919 UART: [art] Extend RT PCRs Done
20,994,138 UART: [art] Lock RT PCRs Done
20,995,841 UART: [art] Populate DV Done
21,001,469 UART: [fht] FMC Alias Private Key: 7
21,003,171 UART: [art] Derive CDI
21,003,988 UART: [art] Store in slot 0x4
21,059,677 UART: [art] Derive Key Pair
21,060,679 UART: [art] Store priv key in slot 0x5
23,523,806 UART: [art] Derive Key Pair - Done
23,536,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,249,982 UART: [art] Erasing AUTHORITY.KEYID = 7
25,251,494 UART: [art] PUB.X = 4CA2E6FEEF0855848E6BDBB97DD3CB9AAEA0596F3A6A47AA08E64676CC57F221696E9C5D4DCA96EE3791F38D7DA9F23D
25,258,817 UART: [art] PUB.Y = E9673AE6FE995717E73146ECC47E1D1DDAD35138A9B64B83D9AF38A0E82A3BE6739195B78B4A297B140EE0F39D7D5420
25,266,105 UART: [art] SIG.R = C5896F82A5B0C51C02F20D9555B40141F65F85DA832654FD8253CC6D1233205E34135D12E6CB0A514CA926D05AF71B36
25,273,445 UART: [art] SIG.S = 532EE092EA9A7771E8E9026C30A9AA044CE8D9DDE8BC7173E99580B843678CEBDC79624B6E3C636C3B3818C4A43E4AF9
26,252,482 UART: Caliptra RT
26,253,232 UART: [state] CFI Enabled
26,434,157 UART: [rt] RT listening for mailbox commands...
301 writing to cptra_bootfsm_go
3,253,455 UART:
3,253,794 UART: Running Caliptra FMC ...
3,254,839 UART:
3,254,992 UART: [state] CFI Enabled
3,302,627 UART: [art] Skip pcr extension
3,303,777 UART: [art] Extend RT PCRs Done
3,304,925 UART: [art] Lock RT PCRs Done
3,306,171 UART: [art] Populate DV Done
3,311,742 UART: [fht] FMC Alias Private Key: 7
3,313,466 UART: [art] Derive CDI
3,314,284 UART: [art] Store in slot 0x4
3,371,423 UART: [art] Derive Key Pair
3,372,453 UART: [art] Store priv key in slot 0x5
5,835,515 UART: [art] Derive Key Pair - Done
5,848,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,560,810 UART: [art] Erasing AUTHORITY.KEYID = 7
7,562,314 UART: [art] PUB.X = 4CA2E6FEEF0855848E6BDBB97DD3CB9AAEA0596F3A6A47AA08E64676CC57F221696E9C5D4DCA96EE3791F38D7DA9F23D
7,569,615 UART: [art] PUB.Y = E9673AE6FE995717E73146ECC47E1D1DDAD35138A9B64B83D9AF38A0E82A3BE6739195B78B4A297B140EE0F39D7D5420
7,576,902 UART: [art] SIG.R = C5896F82A5B0C51C02F20D9555B40141F65F85DA832654FD8253CC6D1233205E34135D12E6CB0A514CA926D05AF71B36
7,584,289 UART: [art] SIG.S = 532EE092EA9A7771E8E9026C30A9AA044CE8D9DDE8BC7173E99580B843678CEBDC79624B6E3C636C3B3818C4A43E4AF9
8,563,143 UART: Caliptra RT
8,563,852 UART: [state] CFI Enabled
8,983,707 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
191,988 UART:
192,346 UART: Running Caliptra ROM ...
193,449 UART:
603,149 UART: [state] CFI Enabled
618,361 UART: [state] LifecycleState = Production
620,457 UART: [state] DebugLocked = Yes
622,806 UART: [state] Starting the WD Timer 40000000 cycles
628,891 UART: [kat] SHA2-256
818,785 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,618 UART: [kat] ++
830,103 UART: [kat] sha1
840,595 UART: [kat] SHA2-256
843,606 UART: [kat] SHA2-384
850,305 UART: [kat] SHA2-512-ACC
852,954 UART: [kat] ECC-384
3,296,412 UART: [kat] HMAC-384Kdf
3,309,347 UART: [kat] LMS
3,841,209 UART: [kat] --
3,846,579 UART: [cold-reset] ++
3,848,720 UART: [fht] FHT @ 0x50003400
3,859,623 UART: [idev] ++
3,860,261 UART: [idev] CDI.KEYID = 6
3,861,216 UART: [idev] SUBJECT.KEYID = 7
3,862,451 UART: [idev] UDS.KEYID = 0
3,863,348 ready_for_fw is high
3,863,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,384 UART: [idev] Erasing UDS.KEYID = 0
6,341,472 UART: [idev] Sha1 KeyId Algorithm
6,363,814 UART: [idev] --
6,368,565 UART: [ldev] ++
6,369,243 UART: [ldev] CDI.KEYID = 6
6,370,151 UART: [ldev] SUBJECT.KEYID = 5
6,371,307 UART: [ldev] AUTHORITY.KEYID = 7
6,372,538 UART: [ldev] FE.KEYID = 1
6,384,971 UART: [ldev] Erasing FE.KEYID = 1
8,857,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,058 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,592,233 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,607,341 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,622,320 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,643,966 UART: [ldev] --
10,649,387 UART: [fwproc] Wait for Commands...
10,652,395 UART: [fwproc] Recv command 0x46574c44
10,654,349 UART: [fwproc] Recv'd Img size: 118548 bytes
14,182,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,254,569 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,378,174 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,939,033 >>> mbox cmd response: success
14,943,330 UART: [afmc] ++
14,944,022 UART: [afmc] CDI.KEYID = 6
14,945,271 UART: [afmc] SUBJECT.KEYID = 7
14,946,708 UART: [afmc] AUTHORITY.KEYID = 5
17,447,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,169,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,171,832 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
19,186,865 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
19,201,988 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
19,217,039 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
19,239,976 UART: [afmc] --
19,244,106 UART: [cold-reset] --
19,247,754 UART: [state] Locking Datavault
19,251,440 UART: [state] Locking PCR0, PCR1 and PCR31
19,253,627 UART: [state] Locking ICCM
19,255,834 UART: [exit] Launching FMC @ 0x40000130
19,264,482 UART:
19,264,777 UART: Running Caliptra FMC ...
19,265,893 UART:
19,266,061 UART: [state] CFI Enabled
19,274,273 UART: [fht] FMC Alias Private Key: 7
21,040,261 UART: [art] Extend RT PCRs Done
21,041,472 UART: [art] Lock RT PCRs Done
21,042,867 UART: [art] Populate DV Done
21,048,225 UART: [fht] FMC Alias Private Key: 7
21,049,982 UART: [art] Derive CDI
21,050,799 UART: [art] Store in slot 0x4
21,093,843 UART: [art] Derive Key Pair
21,094,849 UART: [art] Store priv key in slot 0x5
23,522,274 UART: [art] Derive Key Pair - Done
23,535,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,241,273 UART: [art] Erasing AUTHORITY.KEYID = 7
25,242,786 UART: [art] PUB.X = 514160DD7355504782B5EE12384F33373E93324F91FEAE144EFD83F992F5706C2D63075898CAF140749AF62C68D274A3
25,250,045 UART: [art] PUB.Y = FF31A5DD5C4C3272127B04E4B783D635717B5B400788AB096D0A5A311FB28381B811CDD579CE0072D66FE325A0732646
25,257,283 UART: [art] SIG.R = 926FCD626F883CB3DBE8B46B5B8D7971AED44F4D0603731BF5B0BFBAD3AF84B35316172BEE5B3A334C0BBC6C775D0EC2
25,264,720 UART: [art] SIG.S = 12C45A12E341F8E162BA0DBC1A30E6FD197C19CE9A23A8075C11BF9E3BBCFE94C2A7F8869E94CF22C329DA749768AE3E
26,243,015 UART: Caliptra RT
26,243,728 UART: [state] CFI Enabled
26,377,427 UART: [rt] RT listening for mailbox commands...
298 writing to cptra_bootfsm_go
547 UART:
693 UART: Running Caliptra ROM ...
1,793 UART:
14,154,584 UART: [state] CFI Enabled
14,169,944 UART: [state] LifecycleState = Production
14,171,719 UART: [state] DebugLocked = Yes
14,174,231 UART: [state] Starting the WD Timer 40000000 cycles
14,179,905 UART: [kat] SHA2-256
14,369,789 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,380,699 UART: [kat] ++
14,381,219 UART: [kat] sha1
14,394,161 UART: [kat] SHA2-256
14,397,180 UART: [kat] SHA2-384
14,403,764 UART: [kat] SHA2-512-ACC
14,406,318 UART: [kat] ECC-384
16,847,969 UART: [kat] HMAC-384Kdf
16,860,793 UART: [kat] LMS
17,392,389 UART: [kat] --
17,396,054 UART: [warm-reset] ++
17,400,705 UART: [warm-reset] --
17,404,139 UART: [state] Locking Datavault
17,406,530 UART: [state] Locking PCR0, PCR1 and PCR31
17,408,236 UART: [state] Locking ICCM
17,410,014 UART: [exit] Launching FMC @ 0x40000130
17,418,693 UART:
17,418,928 UART: Running Caliptra FMC ...
17,420,027 UART:
17,420,193 UART: [state] CFI Enabled
17,422,185 UART: [art] Skip pcr extension
17,423,284 UART: [art] Extend RT PCRs Done
17,424,417 UART: [art] Lock RT PCRs Done
17,425,591 UART: [art] Populate DV Done
17,431,264 UART: [fht] FMC Alias Private Key: 7
17,432,964 UART: [art] Derive CDI
17,433,777 UART: [art] Store in slot 0x4
17,476,608 UART: [art] Derive Key Pair
17,477,649 UART: [art] Store priv key in slot 0x5
19,904,823 UART: [art] Derive Key Pair - Done
19,917,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,624,180 UART: [art] Erasing AUTHORITY.KEYID = 7
21,625,680 UART: [art] PUB.X = 514160DD7355504782B5EE12384F33373E93324F91FEAE144EFD83F992F5706C2D63075898CAF140749AF62C68D274A3
21,632,924 UART: [art] PUB.Y = FF31A5DD5C4C3272127B04E4B783D635717B5B400788AB096D0A5A311FB28381B811CDD579CE0072D66FE325A0732646
21,640,150 UART: [art] SIG.R = 926FCD626F883CB3DBE8B46B5B8D7971AED44F4D0603731BF5B0BFBAD3AF84B35316172BEE5B3A334C0BBC6C775D0EC2
21,647,607 UART: [art] SIG.S = 12C45A12E341F8E162BA0DBC1A30E6FD197C19CE9A23A8075C11BF9E3BBCFE94C2A7F8869E94CF22C329DA749768AE3E
22,626,407 UART: Caliptra RT
22,627,118 UART: [state] CFI Enabled
22,998,494 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,751,871 ready_for_fw is high
3,752,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,090,310 >>> mbox cmd response: success
19,347,164 UART:
19,347,585 UART: Running Caliptra FMC ...
19,348,736 UART:
19,348,894 UART: [state] CFI Enabled
19,356,860 UART: [fht] FMC Alias Private Key: 7
21,123,113 UART: [art] Extend RT PCRs Done
21,124,401 UART: [art] Lock RT PCRs Done
21,126,165 UART: [art] Populate DV Done
21,131,653 UART: [fht] FMC Alias Private Key: 7
21,133,247 UART: [art] Derive CDI
21,134,061 UART: [art] Store in slot 0x4
21,176,996 UART: [art] Derive Key Pair
21,178,042 UART: [art] Store priv key in slot 0x5
23,604,884 UART: [art] Derive Key Pair - Done
23,617,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,323,739 UART: [art] Erasing AUTHORITY.KEYID = 7
25,325,242 UART: [art] PUB.X = A2C824C543C46CC6E8DF8102B0E7E37B13C1CE4C197B909177E7FEA79916BC93D22A32257C3808C19B19A490245CD6B5
25,332,495 UART: [art] PUB.Y = 1D7F0104E29FE8E83542938D473395765FD56D309D86D586F0E79B4B9741BD8502C825594778D8E9149562BE44CF8199
25,339,722 UART: [art] SIG.R = AEBA1345A945B5BB7C8C5E67FC95D5AB50168B0482254C6935D2256925A84A5145DE7A86952A02681D9BD12DBC65967F
25,347,065 UART: [art] SIG.S = 2D306AB7A3DD1EF99369B23B646932E4FE69C90488FAC3708E6225BAC9117745905D2C49A2A592132335EC4497C564E7
26,325,345 UART: Caliptra RT
26,326,048 UART: [state] CFI Enabled
26,458,647 UART: [rt] RT listening for mailbox commands...
302 writing to cptra_bootfsm_go
17,238,807 UART:
17,239,277 UART: Running Caliptra FMC ...
17,240,325 UART:
17,240,476 UART: [state] CFI Enabled
17,242,450 UART: [art] Skip pcr extension
17,243,553 UART: [art] Extend RT PCRs Done
17,244,694 UART: [art] Lock RT PCRs Done
17,245,860 UART: [art] Populate DV Done
17,251,376 UART: [fht] FMC Alias Private Key: 7
17,253,016 UART: [art] Derive CDI
17,253,832 UART: [art] Store in slot 0x4
17,297,017 UART: [art] Derive Key Pair
17,298,019 UART: [art] Store priv key in slot 0x5
19,724,968 UART: [art] Derive Key Pair - Done
19,738,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,444,195 UART: [art] Erasing AUTHORITY.KEYID = 7
21,445,742 UART: [art] PUB.X = A2C824C543C46CC6E8DF8102B0E7E37B13C1CE4C197B909177E7FEA79916BC93D22A32257C3808C19B19A490245CD6B5
21,452,953 UART: [art] PUB.Y = 1D7F0104E29FE8E83542938D473395765FD56D309D86D586F0E79B4B9741BD8502C825594778D8E9149562BE44CF8199
21,460,144 UART: [art] SIG.R = AEBA1345A945B5BB7C8C5E67FC95D5AB50168B0482254C6935D2256925A84A5145DE7A86952A02681D9BD12DBC65967F
21,467,547 UART: [art] SIG.S = 2D306AB7A3DD1EF99369B23B646932E4FE69C90488FAC3708E6225BAC9117745905D2C49A2A592132335EC4497C564E7
22,446,758 UART: Caliptra RT
22,447,450 UART: [state] CFI Enabled
22,824,984 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Production
85,835 UART: [state] DebugLocked = Yes
86,521 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,311 UART: [kat] SHA2-256
882,242 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,357 UART: [kat] ++
886,509 UART: [kat] sha1
890,643 UART: [kat] SHA2-256
892,581 UART: [kat] SHA2-384
895,234 UART: [kat] SHA2-512-ACC
897,135 UART: [kat] ECC-384
902,736 UART: [kat] HMAC-384Kdf
907,214 UART: [kat] LMS
1,475,410 UART: [kat] --
1,476,265 UART: [cold-reset] ++
1,476,694 UART: [fht] Storing FHT @ 0x50003400
1,479,503 UART: [idev] ++
1,479,671 UART: [idev] CDI.KEYID = 6
1,480,031 UART: [idev] SUBJECT.KEYID = 7
1,480,455 UART: [idev] UDS.KEYID = 0
1,480,800 ready_for_fw is high
1,480,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,736 UART: [idev] Erasing UDS.KEYID = 0
1,505,361 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,090 UART: [idev] --
1,515,023 UART: [ldev] ++
1,515,191 UART: [ldev] CDI.KEYID = 6
1,515,554 UART: [ldev] SUBJECT.KEYID = 5
1,515,980 UART: [ldev] AUTHORITY.KEYID = 7
1,516,443 UART: [ldev] FE.KEYID = 1
1,522,039 UART: [ldev] Erasing FE.KEYID = 1
1,547,100 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,537 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,231 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,103 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,809 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,957 UART: [ldev] --
1,586,446 UART: [fwproc] Waiting for Commands...
1,587,315 UART: [fwproc] Received command 0x46574c44
1,588,106 UART: [fwproc] Received Image of size 118548 bytes
2,958,154 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,986,049 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,017,267 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,157,541 >>> mbox cmd response: success
3,158,780 UART: [afmc] ++
3,158,948 UART: [afmc] CDI.KEYID = 6
3,159,310 UART: [afmc] SUBJECT.KEYID = 7
3,159,735 UART: [afmc] AUTHORITY.KEYID = 5
3,194,586 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,210,996 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,211,776 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
3,217,491 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
3,223,376 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
3,229,079 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
3,236,999 UART: [afmc] --
3,237,946 UART: [cold-reset] --
3,238,884 UART: [state] Locking Datavault
3,240,209 UART: [state] Locking PCR0, PCR1 and PCR31
3,240,813 UART: [state] Locking ICCM
3,241,371 UART: [exit] Launching FMC @ 0x40000130
3,246,701 UART:
3,246,717 UART: Running Caliptra FMC ...
3,247,125 UART:
3,247,179 UART: [state] CFI Enabled
3,257,767 UART: [fht] FMC Alias Private Key: 7
3,376,638 UART: [art] Extend RT PCRs Done
3,377,066 UART: [art] Lock RT PCRs Done
3,378,780 UART: [art] Populate DV Done
3,386,730 UART: [fht] FMC Alias Private Key: 7
3,387,684 UART: [art] Derive CDI
3,387,964 UART: [art] Store in slot 0x4
3,473,734 UART: [art] Derive Key Pair
3,474,094 UART: [art] Store priv key in slot 0x5
3,487,679 UART: [art] Derive Key Pair - Done
3,502,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,517,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,518,521 UART: [art] PUB.X = 136CE4CF865209D2E9708DEF30BCF0D73F210388F01B74A847003ED16E6D1DA04F56B6EEA6903CADAA856B80BC8AB8D9
3,525,279 UART: [art] PUB.Y = B281AFE0754A9D9D7BE067ED79301697F63957EC6FA958A908466D196929630C6D56463205540357A57F58B89DC7A8AD
3,532,211 UART: [art] SIG.R = 1138AF99669712C71AAD7C9C28BA00810B692A935B93660FB5480109B97E0DB913DD67717594B9998B5825BB53B36947
3,538,934 UART: [art] SIG.S = 97485093F809EC43D0B2258731B825A540D27AEC631936933B733093A951C0B17680A9BF6E93DCCB80C047B6585759F6
3,562,961 UART: Caliptra RT
3,563,212 UART: [state] CFI Enabled
3,681,869 UART: [rt] RT listening for mailbox commands...
3,682,533 writing to cptra_bootfsm_go
3,682,628 UART:
3,682,644 UART: Running Caliptra ROM ...
3,683,052 UART:
3,683,106 UART: [state] CFI Enabled
3,685,931 UART: [state] LifecycleState = Production
3,686,539 UART: [state] DebugLocked = Yes
3,687,205 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,689,009 UART: [kat] SHA2-256
4,482,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,487,055 UART: [kat] ++
4,487,207 UART: [kat] sha1
4,491,579 UART: [kat] SHA2-256
4,493,517 UART: [kat] SHA2-384
4,496,474 UART: [kat] SHA2-512-ACC
4,498,375 UART: [kat] ECC-384
4,504,020 UART: [kat] HMAC-384Kdf
4,508,818 UART: [kat] LMS
5,077,014 UART: [kat] --
5,077,690 UART: [warm-reset] ++
5,078,645 UART: [warm-reset] --
5,079,448 UART: [state] Locking Datavault
5,080,392 UART: [state] Locking PCR0, PCR1 and PCR31
5,080,996 UART: [state] Locking ICCM
5,081,558 UART: [exit] Launching FMC @ 0x40000130
5,086,888 UART:
5,086,904 UART: Running Caliptra FMC ...
5,087,312 UART:
5,087,366 UART: [state] CFI Enabled
5,088,793 UART: [art] Skip pcr extension
5,089,202 UART: [art] Extend RT PCRs Done
5,089,630 UART: [art] Lock RT PCRs Done
5,090,861 UART: [art] Populate DV Done
5,098,915 UART: [fht] FMC Alias Private Key: 7
5,099,971 UART: [art] Derive CDI
5,100,251 UART: [art] Store in slot 0x4
5,185,871 UART: [art] Derive Key Pair
5,186,231 UART: [art] Store priv key in slot 0x5
5,199,064 UART: [art] Derive Key Pair - Done
5,213,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,229,013 UART: [art] Erasing AUTHORITY.KEYID = 7
5,229,778 UART: [art] PUB.X = 136CE4CF865209D2E9708DEF30BCF0D73F210388F01B74A847003ED16E6D1DA04F56B6EEA6903CADAA856B80BC8AB8D9
5,236,536 UART: [art] PUB.Y = B281AFE0754A9D9D7BE067ED79301697F63957EC6FA958A908466D196929630C6D56463205540357A57F58B89DC7A8AD
5,243,468 UART: [art] SIG.R = 1138AF99669712C71AAD7C9C28BA00810B692A935B93660FB5480109B97E0DB913DD67717594B9998B5825BB53B36947
5,250,191 UART: [art] SIG.S = 97485093F809EC43D0B2258731B825A540D27AEC631936933B733093A951C0B17680A9BF6E93DCCB80C047B6585759F6
5,274,510 UART: Caliptra RT
5,274,761 UART: [state] CFI Enabled
5,638,229 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,826 ready_for_fw is high
1,362,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,004,765 >>> mbox cmd response: success
3,065,783 UART:
3,065,799 UART: Running Caliptra FMC ...
3,066,207 UART:
3,066,261 UART: [state] CFI Enabled
3,076,947 UART: [fht] FMC Alias Private Key: 7
3,195,772 UART: [art] Extend RT PCRs Done
3,196,200 UART: [art] Lock RT PCRs Done
3,197,552 UART: [art] Populate DV Done
3,205,768 UART: [fht] FMC Alias Private Key: 7
3,206,754 UART: [art] Derive CDI
3,207,034 UART: [art] Store in slot 0x4
3,292,538 UART: [art] Derive Key Pair
3,292,898 UART: [art] Store priv key in slot 0x5
3,306,391 UART: [art] Derive Key Pair - Done
3,321,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,336,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,337,043 UART: [art] PUB.X = 13CB3597D3493E93DF55343578E0D1CB64132E50C01285552FCC4CCA8F9168028B94B9324CF12067892064D253124B58
3,343,798 UART: [art] PUB.Y = 6BB366741E0FDEDC2BDE4704214BB018A9DEC1FB3EB8A20DB2CD3F77059E1D36B9A6305343AB3A9113E96F611F1F6B85
3,350,752 UART: [art] SIG.R = C49EAD5B688FF62856C3AC01DAFF0B4DEABF31CEB9B070D859C777CC87DAA323BD507975255F89C5943D92FB064D091F
3,357,528 UART: [art] SIG.S = 151D1169956915079B2F97CE633CFA282DBE4013951AB289E11BD5680ADBDF74AFBA9599F408087D61611EBA9F90F1E4
3,381,152 UART: Caliptra RT
3,381,403 UART: [state] CFI Enabled
3,501,228 UART: [rt] RT listening for mailbox commands...
3,501,892 writing to cptra_bootfsm_go
4,786,131 UART:
4,786,147 UART: Running Caliptra FMC ...
4,786,555 UART:
4,786,609 UART: [state] CFI Enabled
4,787,770 UART: [art] Skip pcr extension
4,788,179 UART: [art] Extend RT PCRs Done
4,788,607 UART: [art] Lock RT PCRs Done
4,789,848 UART: [art] Populate DV Done
4,797,972 UART: [fht] FMC Alias Private Key: 7
4,799,044 UART: [art] Derive CDI
4,799,324 UART: [art] Store in slot 0x4
4,884,878 UART: [art] Derive Key Pair
4,885,238 UART: [art] Store priv key in slot 0x5
4,898,823 UART: [art] Derive Key Pair - Done
4,913,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,928,970 UART: [art] Erasing AUTHORITY.KEYID = 7
4,929,735 UART: [art] PUB.X = 13CB3597D3493E93DF55343578E0D1CB64132E50C01285552FCC4CCA8F9168028B94B9324CF12067892064D253124B58
4,936,490 UART: [art] PUB.Y = 6BB366741E0FDEDC2BDE4704214BB018A9DEC1FB3EB8A20DB2CD3F77059E1D36B9A6305343AB3A9113E96F611F1F6B85
4,943,444 UART: [art] SIG.R = C49EAD5B688FF62856C3AC01DAFF0B4DEABF31CEB9B070D859C777CC87DAA323BD507975255F89C5943D92FB064D091F
4,950,220 UART: [art] SIG.S = 151D1169956915079B2F97CE633CFA282DBE4013951AB289E11BD5680ADBDF74AFBA9599F408087D61611EBA9F90F1E4
4,973,494 UART: Caliptra RT
4,973,745 UART: [state] CFI Enabled
5,341,267 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,680 UART: [state] LifecycleState = Production
86,288 UART: [state] DebugLocked = Yes
86,978 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,712 UART: [kat] SHA2-256
882,643 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,758 UART: [kat] ++
886,910 UART: [kat] sha1
891,300 UART: [kat] SHA2-256
893,238 UART: [kat] SHA2-384
896,037 UART: [kat] SHA2-512-ACC
897,938 UART: [kat] ECC-384
903,809 UART: [kat] HMAC-384Kdf
908,563 UART: [kat] LMS
1,476,759 UART: [kat] --
1,477,662 UART: [cold-reset] ++
1,478,057 UART: [fht] Storing FHT @ 0x50003400
1,480,740 UART: [idev] ++
1,480,908 UART: [idev] CDI.KEYID = 6
1,481,268 UART: [idev] SUBJECT.KEYID = 7
1,481,692 UART: [idev] UDS.KEYID = 0
1,482,037 ready_for_fw is high
1,482,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,561 UART: [idev] Erasing UDS.KEYID = 0
1,506,218 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,015 UART: [idev] --
1,515,934 UART: [ldev] ++
1,516,102 UART: [ldev] CDI.KEYID = 6
1,516,465 UART: [ldev] SUBJECT.KEYID = 5
1,516,891 UART: [ldev] AUTHORITY.KEYID = 7
1,517,354 UART: [ldev] FE.KEYID = 1
1,522,636 UART: [ldev] Erasing FE.KEYID = 1
1,548,207 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,736 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,430 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,302 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,579,008 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,586,090 UART: [ldev] --
1,587,457 UART: [fwproc] Waiting for Commands...
1,588,130 UART: [fwproc] Received command 0x46574c44
1,588,921 UART: [fwproc] Received Image of size 118548 bytes
2,959,055 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,985,890 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,017,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,157,322 >>> mbox cmd response: success
3,158,497 UART: [afmc] ++
3,158,665 UART: [afmc] CDI.KEYID = 6
3,159,027 UART: [afmc] SUBJECT.KEYID = 7
3,159,452 UART: [afmc] AUTHORITY.KEYID = 5
3,194,577 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,210,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,211,577 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
3,217,292 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
3,223,177 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
3,228,880 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
3,236,662 UART: [afmc] --
3,237,655 UART: [cold-reset] --
3,238,571 UART: [state] Locking Datavault
3,240,068 UART: [state] Locking PCR0, PCR1 and PCR31
3,240,672 UART: [state] Locking ICCM
3,241,340 UART: [exit] Launching FMC @ 0x40000130
3,246,670 UART:
3,246,686 UART: Running Caliptra FMC ...
3,247,094 UART:
3,247,237 UART: [state] CFI Enabled
3,258,175 UART: [fht] FMC Alias Private Key: 7
3,376,358 UART: [art] Extend RT PCRs Done
3,376,786 UART: [art] Lock RT PCRs Done
3,378,398 UART: [art] Populate DV Done
3,386,844 UART: [fht] FMC Alias Private Key: 7
3,387,964 UART: [art] Derive CDI
3,388,244 UART: [art] Store in slot 0x4
3,474,028 UART: [art] Derive Key Pair
3,474,388 UART: [art] Store priv key in slot 0x5
3,487,465 UART: [art] Derive Key Pair - Done
3,502,651 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,518,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,518,769 UART: [art] PUB.X = D2C9DE0868DE0AD18201BB36A9CB879614608C55B23901D37DCAB1AC13980B358DD02D395E6A90C39D15536CEB2C4478
3,525,530 UART: [art] PUB.Y = CF1BF62E0E2822F079B11AC71856306B212796D30DF248DEFC87BE47DF6ED9E686C84C86EF9678FE3F59F1BCEB6E77F1
3,532,490 UART: [art] SIG.R = 83FC993A0833F8620651AF55B17B6DC0BAE1D22762484C34E3397F5B3AFAB3525AFB9962E810427803B152AA1483AD08
3,539,248 UART: [art] SIG.S = 47CD40292FC5723AEDEB73FC276845A7A3AE96EC702BE20E9B1D1A5F2171B9225366536E9EB0731E862253EFC8001577
3,562,879 UART: Caliptra RT
3,563,222 UART: [state] CFI Enabled
3,684,621 UART: [rt] RT listening for mailbox commands...
3,685,285 writing to cptra_bootfsm_go
3,685,380 UART:
3,685,396 UART: Running Caliptra ROM ...
3,685,804 UART:
3,685,945 UART: [state] CFI Enabled
3,688,468 UART: [state] LifecycleState = Production
3,689,076 UART: [state] DebugLocked = Yes
3,689,758 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,691,382 UART: [kat] SHA2-256
4,485,313 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,489,428 UART: [kat] ++
4,489,580 UART: [kat] sha1
4,493,812 UART: [kat] SHA2-256
4,495,750 UART: [kat] SHA2-384
4,498,469 UART: [kat] SHA2-512-ACC
4,500,370 UART: [kat] ECC-384
4,506,237 UART: [kat] HMAC-384Kdf
4,510,839 UART: [kat] LMS
5,079,035 UART: [kat] --
5,080,161 UART: [warm-reset] ++
5,081,158 UART: [warm-reset] --
5,082,071 UART: [state] Locking Datavault
5,082,951 UART: [state] Locking PCR0, PCR1 and PCR31
5,083,555 UART: [state] Locking ICCM
5,084,169 UART: [exit] Launching FMC @ 0x40000130
5,089,499 UART:
5,089,515 UART: Running Caliptra FMC ...
5,089,923 UART:
5,090,066 UART: [state] CFI Enabled
5,091,645 UART: [art] Skip pcr extension
5,092,054 UART: [art] Extend RT PCRs Done
5,092,482 UART: [art] Lock RT PCRs Done
5,093,817 UART: [art] Populate DV Done
5,101,867 UART: [fht] FMC Alias Private Key: 7
5,102,947 UART: [art] Derive CDI
5,103,227 UART: [art] Store in slot 0x4
5,188,925 UART: [art] Derive Key Pair
5,189,285 UART: [art] Store priv key in slot 0x5
5,203,110 UART: [art] Derive Key Pair - Done
5,218,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,233,703 UART: [art] Erasing AUTHORITY.KEYID = 7
5,234,468 UART: [art] PUB.X = D2C9DE0868DE0AD18201BB36A9CB879614608C55B23901D37DCAB1AC13980B358DD02D395E6A90C39D15536CEB2C4478
5,241,229 UART: [art] PUB.Y = CF1BF62E0E2822F079B11AC71856306B212796D30DF248DEFC87BE47DF6ED9E686C84C86EF9678FE3F59F1BCEB6E77F1
5,248,189 UART: [art] SIG.R = 83FC993A0833F8620651AF55B17B6DC0BAE1D22762484C34E3397F5B3AFAB3525AFB9962E810427803B152AA1483AD08
5,254,947 UART: [art] SIG.S = 47CD40292FC5723AEDEB73FC276845A7A3AE96EC702BE20E9B1D1A5F2171B9225366536E9EB0731E862253EFC8001577
5,278,794 UART: Caliptra RT
5,279,137 UART: [state] CFI Enabled
5,645,939 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,515 ready_for_fw is high
1,363,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,008,748 >>> mbox cmd response: success
3,070,590 UART:
3,070,606 UART: Running Caliptra FMC ...
3,071,014 UART:
3,071,157 UART: [state] CFI Enabled
3,081,607 UART: [fht] FMC Alias Private Key: 7
3,200,532 UART: [art] Extend RT PCRs Done
3,200,960 UART: [art] Lock RT PCRs Done
3,202,518 UART: [art] Populate DV Done
3,210,652 UART: [fht] FMC Alias Private Key: 7
3,211,670 UART: [art] Derive CDI
3,211,950 UART: [art] Store in slot 0x4
3,297,870 UART: [art] Derive Key Pair
3,298,230 UART: [art] Store priv key in slot 0x5
3,312,001 UART: [art] Derive Key Pair - Done
3,326,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,341,704 UART: [art] Erasing AUTHORITY.KEYID = 7
3,342,469 UART: [art] PUB.X = E5E55179652AC9C10BC1E87763B307749F7DECD4E4B70E510DE6A4782975CD2FB9CE8BC39B3826A93FC397AEF76B6A7F
3,349,241 UART: [art] PUB.Y = C455E448879C5B5DAE24FC9850F3B5726300BBFC394385015CF8C2D3AD6EA5BA5D48EB2DA508DBC3EBFF8754CBC1393E
3,356,183 UART: [art] SIG.R = 828F33386597590812E555A3EE86BEE685BBF2987F7BBDA2E68AB91E85746FDEFA73ADB95A1FA4B1859334FE2B17B77F
3,362,962 UART: [art] SIG.S = 2F010FC814465FFE8BB11186118D2FFF12B1EAF6A15F3B2F826345C4782822D6699013EB760EF5E9A4BF7C4B34C7C98F
3,387,299 UART: Caliptra RT
3,387,642 UART: [state] CFI Enabled
3,506,981 UART: [rt] RT listening for mailbox commands...
3,507,645 writing to cptra_bootfsm_go
4,793,951 UART:
4,793,967 UART: Running Caliptra FMC ...
4,794,375 UART:
4,794,518 UART: [state] CFI Enabled
4,795,965 UART: [art] Skip pcr extension
4,796,374 UART: [art] Extend RT PCRs Done
4,796,802 UART: [art] Lock RT PCRs Done
4,798,141 UART: [art] Populate DV Done
4,806,505 UART: [fht] FMC Alias Private Key: 7
4,807,551 UART: [art] Derive CDI
4,807,831 UART: [art] Store in slot 0x4
4,893,595 UART: [art] Derive Key Pair
4,893,955 UART: [art] Store priv key in slot 0x5
4,907,304 UART: [art] Derive Key Pair - Done
4,921,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,937,391 UART: [art] Erasing AUTHORITY.KEYID = 7
4,938,156 UART: [art] PUB.X = E5E55179652AC9C10BC1E87763B307749F7DECD4E4B70E510DE6A4782975CD2FB9CE8BC39B3826A93FC397AEF76B6A7F
4,944,928 UART: [art] PUB.Y = C455E448879C5B5DAE24FC9850F3B5726300BBFC394385015CF8C2D3AD6EA5BA5D48EB2DA508DBC3EBFF8754CBC1393E
4,951,870 UART: [art] SIG.R = 828F33386597590812E555A3EE86BEE685BBF2987F7BBDA2E68AB91E85746FDEFA73ADB95A1FA4B1859334FE2B17B77F
4,958,649 UART: [art] SIG.S = 2F010FC814465FFE8BB11186118D2FFF12B1EAF6A15F3B2F826345C4782822D6699013EB760EF5E9A4BF7C4B34C7C98F
4,982,232 UART: Caliptra RT
4,982,575 UART: [state] CFI Enabled
5,349,441 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Production
85,965 UART: [state] DebugLocked = Yes
86,629 UART: [state] Starting the WD Timer 40000000 cycles
88,268 UART: [kat] SHA2-256
891,818 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,922 UART: [kat] ++
896,074 UART: [kat] sha1
900,320 UART: [kat] SHA2-256
902,260 UART: [kat] SHA2-384
905,035 UART: [kat] SHA2-512-ACC
906,936 UART: [kat] ECC-384
916,847 UART: [kat] HMAC-384Kdf
921,269 UART: [kat] LMS
1,169,581 UART: [kat] --
1,170,380 UART: [cold-reset] ++
1,170,783 UART: [fht] FHT @ 0x50003400
1,173,671 UART: [idev] ++
1,173,839 UART: [idev] CDI.KEYID = 6
1,174,200 UART: [idev] SUBJECT.KEYID = 7
1,174,625 UART: [idev] UDS.KEYID = 0
1,174,971 ready_for_fw is high
1,174,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,607 UART: [idev] Erasing UDS.KEYID = 0
1,200,032 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,176 UART: [ldev] ++
1,210,344 UART: [ldev] CDI.KEYID = 6
1,210,708 UART: [ldev] SUBJECT.KEYID = 5
1,211,135 UART: [ldev] AUTHORITY.KEYID = 7
1,211,598 UART: [ldev] FE.KEYID = 1
1,216,710 UART: [ldev] Erasing FE.KEYID = 1
1,243,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,467 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,161 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,031 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,737 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,961 UART: [ldev] --
1,282,374 UART: [fwproc] Wait for Commands...
1,283,025 UART: [fwproc] Recv command 0x46574c44
1,283,758 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,295 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,470 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,664 >>> mbox cmd response: success
2,852,847 UART: [afmc] ++
2,853,015 UART: [afmc] CDI.KEYID = 6
2,853,378 UART: [afmc] SUBJECT.KEYID = 7
2,853,804 UART: [afmc] AUTHORITY.KEYID = 5
2,889,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,778 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,527 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,912,243 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,918,126 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,831 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,509 UART: [afmc] --
2,932,327 UART: [cold-reset] --
2,933,093 UART: [state] Locking Datavault
2,934,368 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,972 UART: [state] Locking ICCM
2,935,566 UART: [exit] Launching FMC @ 0x40000130
2,940,896 UART:
2,940,912 UART: Running Caliptra FMC ...
2,941,320 UART:
2,941,374 UART: [state] CFI Enabled
2,952,140 UART: [fht] FMC Alias Private Key: 7
3,071,451 UART: [art] Extend RT PCRs Done
3,071,879 UART: [art] Lock RT PCRs Done
3,073,485 UART: [art] Populate DV Done
3,081,649 UART: [fht] FMC Alias Private Key: 7
3,082,779 UART: [art] Derive CDI
3,083,059 UART: [art] Store in slot 0x4
3,168,790 UART: [art] Derive Key Pair
3,169,150 UART: [art] Store priv key in slot 0x5
3,182,072 UART: [art] Derive Key Pair - Done
3,196,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,661 UART: [art] PUB.X = E713FB5D786F7D92E25B7E07874F8C7AC5C33C1D089DBABFF5F1707F2C2FBCFDBE0EACD4150408B6B4C884E4E6ED08C6
3,219,439 UART: [art] PUB.Y = 1981142D9A1DB4215885BAD01AC3570071CD3059F8902E42C45C39262218AC010936A703153AEECE5E56EF7C1E3443E2
3,226,354 UART: [art] SIG.R = CDB3D5542BEF93215252FC348826C205A7DC64B979986B607DC7B91528E5B3FF481301C43571075549FF626835117D5C
3,233,107 UART: [art] SIG.S = C2489B1190A213A7061DCA0062EDC7EB5D703A43EB17EDBA7A799E70954638786488E5A3D487AFFF369E668404FD862F
3,257,065 UART: Caliptra RT
3,257,316 UART: [state] CFI Enabled
3,376,544 UART: [rt] RT listening for mailbox commands...
3,377,208 writing to cptra_bootfsm_go
3,377,300 UART:
3,377,316 UART: Running Caliptra ROM ...
3,377,724 UART:
3,377,779 UART: [state] CFI Enabled
3,380,484 UART: [state] LifecycleState = Production
3,381,092 UART: [state] DebugLocked = Yes
3,381,744 UART: [state] Starting the WD Timer 40000000 cycles
3,383,259 UART: [kat] SHA2-256
4,186,809 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,190,913 UART: [kat] ++
4,191,065 UART: [kat] sha1
4,195,149 UART: [kat] SHA2-256
4,197,089 UART: [kat] SHA2-384
4,199,622 UART: [kat] SHA2-512-ACC
4,201,523 UART: [kat] ECC-384
4,211,220 UART: [kat] HMAC-384Kdf
4,215,934 UART: [kat] LMS
4,464,246 UART: [kat] --
4,465,368 UART: [warm-reset] ++
4,466,407 UART: [warm-reset] --
4,467,130 UART: [state] Locking Datavault
4,467,912 UART: [state] Locking PCR0, PCR1 and PCR31
4,468,516 UART: [state] Locking ICCM
4,469,126 UART: [exit] Launching FMC @ 0x40000130
4,474,456 UART:
4,474,472 UART: Running Caliptra FMC ...
4,474,880 UART:
4,474,934 UART: [state] CFI Enabled
4,476,355 UART: [art] Skip pcr extension
4,476,764 UART: [art] Extend RT PCRs Done
4,477,192 UART: [art] Lock RT PCRs Done
4,478,449 UART: [art] Populate DV Done
4,486,835 UART: [fht] FMC Alias Private Key: 7
4,487,815 UART: [art] Derive CDI
4,488,095 UART: [art] Store in slot 0x4
4,573,766 UART: [art] Derive Key Pair
4,574,126 UART: [art] Store priv key in slot 0x5
4,587,742 UART: [art] Derive Key Pair - Done
4,602,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,617,872 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,637 UART: [art] PUB.X = E713FB5D786F7D92E25B7E07874F8C7AC5C33C1D089DBABFF5F1707F2C2FBCFDBE0EACD4150408B6B4C884E4E6ED08C6
4,625,415 UART: [art] PUB.Y = 1981142D9A1DB4215885BAD01AC3570071CD3059F8902E42C45C39262218AC010936A703153AEECE5E56EF7C1E3443E2
4,632,330 UART: [art] SIG.R = CDB3D5542BEF93215252FC348826C205A7DC64B979986B607DC7B91528E5B3FF481301C43571075549FF626835117D5C
4,639,083 UART: [art] SIG.S = C2489B1190A213A7061DCA0062EDC7EB5D703A43EB17EDBA7A799E70954638786488E5A3D487AFFF369E668404FD862F
4,662,309 UART: Caliptra RT
4,662,560 UART: [state] CFI Enabled
5,030,593 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,939 ready_for_fw is high
1,058,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,255 >>> mbox cmd response: success
2,766,274 UART:
2,766,290 UART: Running Caliptra FMC ...
2,766,698 UART:
2,766,752 UART: [state] CFI Enabled
2,776,948 UART: [fht] FMC Alias Private Key: 7
2,895,215 UART: [art] Extend RT PCRs Done
2,895,643 UART: [art] Lock RT PCRs Done
2,896,771 UART: [art] Populate DV Done
2,905,083 UART: [fht] FMC Alias Private Key: 7
2,906,105 UART: [art] Derive CDI
2,906,385 UART: [art] Store in slot 0x4
2,991,962 UART: [art] Derive Key Pair
2,992,322 UART: [art] Store priv key in slot 0x5
3,005,298 UART: [art] Derive Key Pair - Done
3,020,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,035,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,036,571 UART: [art] PUB.X = 8D1580BC80804D8DA898458ACF58AF8DACC5A1E9CD48FADCA254C5C687FEDB32430411B1C1CDF57CF640FF512892E8C9
3,043,358 UART: [art] PUB.Y = 283C6D2E39A5BE304D7DD9C524880127A27D101A16257972D9C3D5C05006E699AF6BA075565F8C3362D9404478B2907E
3,050,294 UART: [art] SIG.R = 1F0FCD304B2F45209CD2F3D578361A4F6BDFB960394FDD859E9C39196EF3F49E8D223D80EC6971377E0823E08C7BE5F7
3,057,066 UART: [art] SIG.S = 6354F91B612E0894F157CC2142B2A09D496B18DF6CB9D0183B7FD29126ADFDFB6DC58FF483058F9E5B20D175E77E4066
3,081,186 UART: Caliptra RT
3,081,437 UART: [state] CFI Enabled
3,200,460 UART: [rt] RT listening for mailbox commands...
3,201,124 writing to cptra_bootfsm_go
4,182,025 UART:
4,182,041 UART: Running Caliptra FMC ...
4,182,449 UART:
4,182,503 UART: [state] CFI Enabled
4,183,762 UART: [art] Skip pcr extension
4,184,171 UART: [art] Extend RT PCRs Done
4,184,599 UART: [art] Lock RT PCRs Done
4,185,946 UART: [art] Populate DV Done
4,194,112 UART: [fht] FMC Alias Private Key: 7
4,195,212 UART: [art] Derive CDI
4,195,492 UART: [art] Store in slot 0x4
4,281,275 UART: [art] Derive Key Pair
4,281,635 UART: [art] Store priv key in slot 0x5
4,295,203 UART: [art] Derive Key Pair - Done
4,309,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,325,241 UART: [art] Erasing AUTHORITY.KEYID = 7
4,326,006 UART: [art] PUB.X = 8D1580BC80804D8DA898458ACF58AF8DACC5A1E9CD48FADCA254C5C687FEDB32430411B1C1CDF57CF640FF512892E8C9
4,332,793 UART: [art] PUB.Y = 283C6D2E39A5BE304D7DD9C524880127A27D101A16257972D9C3D5C05006E699AF6BA075565F8C3362D9404478B2907E
4,339,729 UART: [art] SIG.R = 1F0FCD304B2F45209CD2F3D578361A4F6BDFB960394FDD859E9C39196EF3F49E8D223D80EC6971377E0823E08C7BE5F7
4,346,501 UART: [art] SIG.S = 6354F91B612E0894F157CC2142B2A09D496B18DF6CB9D0183B7FD29126ADFDFB6DC58FF483058F9E5B20D175E77E4066
4,370,349 UART: Caliptra RT
4,370,600 UART: [state] CFI Enabled
4,730,026 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Production
85,934 UART: [state] DebugLocked = Yes
86,612 UART: [state] Starting the WD Timer 40000000 cycles
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,829 UART: [kat] ++
895,981 UART: [kat] sha1
900,059 UART: [kat] SHA2-256
901,999 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,440 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,170,031 UART: [cold-reset] ++
1,170,382 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,174,350 ready_for_fw is high
1,174,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,018 UART: [idev] Erasing UDS.KEYID = 0
1,199,875 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,407 UART: [ldev] ++
1,209,575 UART: [ldev] CDI.KEYID = 6
1,209,939 UART: [ldev] SUBJECT.KEYID = 5
1,210,366 UART: [ldev] AUTHORITY.KEYID = 7
1,210,829 UART: [ldev] FE.KEYID = 1
1,216,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,298 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,992 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,862 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,568 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,802 UART: [ldev] --
1,282,145 UART: [fwproc] Wait for Commands...
1,282,886 UART: [fwproc] Recv command 0x46574c44
1,283,619 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,536 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,711 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,901 >>> mbox cmd response: success
2,853,116 UART: [afmc] ++
2,853,284 UART: [afmc] CDI.KEYID = 6
2,853,647 UART: [afmc] SUBJECT.KEYID = 7
2,854,073 UART: [afmc] AUTHORITY.KEYID = 5
2,889,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,398 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,912,114 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,997 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,702 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,592 UART: [afmc] --
2,932,530 UART: [cold-reset] --
2,933,414 UART: [state] Locking Datavault
2,934,379 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,983 UART: [state] Locking ICCM
2,935,533 UART: [exit] Launching FMC @ 0x40000130
2,940,863 UART:
2,940,879 UART: Running Caliptra FMC ...
2,941,287 UART:
2,941,430 UART: [state] CFI Enabled
2,952,156 UART: [fht] FMC Alias Private Key: 7
3,069,691 UART: [art] Extend RT PCRs Done
3,070,119 UART: [art] Lock RT PCRs Done
3,071,523 UART: [art] Populate DV Done
3,079,769 UART: [fht] FMC Alias Private Key: 7
3,080,753 UART: [art] Derive CDI
3,081,033 UART: [art] Store in slot 0x4
3,166,936 UART: [art] Derive Key Pair
3,167,296 UART: [art] Store priv key in slot 0x5
3,180,944 UART: [art] Derive Key Pair - Done
3,195,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,884 UART: [art] PUB.X = FAAED6756D0771158DB25A4F1EDD6581ACDD60E1F0CE6AFB433AC9C0061FAB35FDAC4E0C065F2CA69CB4FFE785ACBB74
3,218,676 UART: [art] PUB.Y = 8148A183D5EAEC0FD5F6E89C8C35E0139776E678BA626F6D24DFC056C09F7E0CC4755BDF3570DA705ED64236E5F4FF8A
3,225,634 UART: [art] SIG.R = 0D587D96219510DEE48149D9DBD5D516B6C4C83B82424ED793F2441C9AE4E201BA6211EE71B221C2A7C5B1F75DD064B1
3,232,404 UART: [art] SIG.S = D7CBFF458A3C8E79FECA2E43F1EEE9FB58372408D7789FEF5BAAF6077703109753F6252E2E68EAA41E1E54A7C405E432
3,256,340 UART: Caliptra RT
3,256,683 UART: [state] CFI Enabled
3,376,871 UART: [rt] RT listening for mailbox commands...
3,377,535 writing to cptra_bootfsm_go
3,377,627 UART:
3,377,643 UART: Running Caliptra ROM ...
3,378,051 UART:
3,378,193 UART: [state] CFI Enabled
3,380,682 UART: [state] LifecycleState = Production
3,381,290 UART: [state] DebugLocked = Yes
3,381,960 UART: [state] Starting the WD Timer 40000000 cycles
3,383,537 UART: [kat] SHA2-256
4,187,087 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,191,191 UART: [kat] ++
4,191,343 UART: [kat] sha1
4,195,753 UART: [kat] SHA2-256
4,197,693 UART: [kat] SHA2-384
4,200,256 UART: [kat] SHA2-512-ACC
4,202,157 UART: [kat] ECC-384
4,211,784 UART: [kat] HMAC-384Kdf
4,216,352 UART: [kat] LMS
4,464,664 UART: [kat] --
4,465,438 UART: [warm-reset] ++
4,466,303 UART: [warm-reset] --
4,467,134 UART: [state] Locking Datavault
4,467,896 UART: [state] Locking PCR0, PCR1 and PCR31
4,468,500 UART: [state] Locking ICCM
4,469,024 UART: [exit] Launching FMC @ 0x40000130
4,474,354 UART:
4,474,370 UART: Running Caliptra FMC ...
4,474,778 UART:
4,474,921 UART: [state] CFI Enabled
4,476,396 UART: [art] Skip pcr extension
4,476,805 UART: [art] Extend RT PCRs Done
4,477,233 UART: [art] Lock RT PCRs Done
4,478,632 UART: [art] Populate DV Done
4,487,022 UART: [fht] FMC Alias Private Key: 7
4,488,088 UART: [art] Derive CDI
4,488,368 UART: [art] Store in slot 0x4
4,574,375 UART: [art] Derive Key Pair
4,574,735 UART: [art] Store priv key in slot 0x5
4,587,759 UART: [art] Derive Key Pair - Done
4,602,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,617,614 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,379 UART: [art] PUB.X = FAAED6756D0771158DB25A4F1EDD6581ACDD60E1F0CE6AFB433AC9C0061FAB35FDAC4E0C065F2CA69CB4FFE785ACBB74
4,625,171 UART: [art] PUB.Y = 8148A183D5EAEC0FD5F6E89C8C35E0139776E678BA626F6D24DFC056C09F7E0CC4755BDF3570DA705ED64236E5F4FF8A
4,632,129 UART: [art] SIG.R = 0D587D96219510DEE48149D9DBD5D516B6C4C83B82424ED793F2441C9AE4E201BA6211EE71B221C2A7C5B1F75DD064B1
4,638,899 UART: [art] SIG.S = D7CBFF458A3C8E79FECA2E43F1EEE9FB58372408D7789FEF5BAAF6077703109753F6252E2E68EAA41E1E54A7C405E432
4,662,715 UART: Caliptra RT
4,663,058 UART: [state] CFI Enabled
5,031,619 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,980 ready_for_fw is high
1,059,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,568 >>> mbox cmd response: success
2,764,883 UART:
2,764,899 UART: Running Caliptra FMC ...
2,765,307 UART:
2,765,450 UART: [state] CFI Enabled
2,776,164 UART: [fht] FMC Alias Private Key: 7
2,894,805 UART: [art] Extend RT PCRs Done
2,895,233 UART: [art] Lock RT PCRs Done
2,896,865 UART: [art] Populate DV Done
2,904,997 UART: [fht] FMC Alias Private Key: 7
2,906,089 UART: [art] Derive CDI
2,906,369 UART: [art] Store in slot 0x4
2,992,398 UART: [art] Derive Key Pair
2,992,758 UART: [art] Store priv key in slot 0x5
3,006,056 UART: [art] Derive Key Pair - Done
3,020,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,036,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,036,982 UART: [art] PUB.X = 7DDA12D3E0BE18E5CF04FD2D47E747E4159A77A3E4C3BA89763774609FB50503FACDFB50B57596A9B7660D1207923F6B
3,043,745 UART: [art] PUB.Y = 35679399FA4137F3C3A72CE2D7EC5302E0B4BE6124A134C9EEF9513D06CC94957550ED9B31376FDC8D9EF29C12D0051A
3,050,692 UART: [art] SIG.R = 2165ACB7791573F7A8D1CEAA97E54DE9B003BEB12E6023F2788D7263A5E6F3FA0B436215CC56BB9E95B64C3A0D19FDE4
3,057,467 UART: [art] SIG.S = 1115D9B4EA9B4F488B47DD592A1DE5ECCA4931202D00B74F31A38BFDE0C4AA0889704B495986EABB249832E75D44B187
3,081,190 UART: Caliptra RT
3,081,533 UART: [state] CFI Enabled
3,201,006 UART: [rt] RT listening for mailbox commands...
3,201,670 writing to cptra_bootfsm_go
4,183,174 UART:
4,183,190 UART: Running Caliptra FMC ...
4,183,598 UART:
4,183,741 UART: [state] CFI Enabled
4,185,266 UART: [art] Skip pcr extension
4,185,675 UART: [art] Extend RT PCRs Done
4,186,103 UART: [art] Lock RT PCRs Done
4,187,468 UART: [art] Populate DV Done
4,195,738 UART: [fht] FMC Alias Private Key: 7
4,196,728 UART: [art] Derive CDI
4,197,008 UART: [art] Store in slot 0x4
4,283,301 UART: [art] Derive Key Pair
4,283,661 UART: [art] Store priv key in slot 0x5
4,297,377 UART: [art] Derive Key Pair - Done
4,312,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,327,772 UART: [art] Erasing AUTHORITY.KEYID = 7
4,328,537 UART: [art] PUB.X = 7DDA12D3E0BE18E5CF04FD2D47E747E4159A77A3E4C3BA89763774609FB50503FACDFB50B57596A9B7660D1207923F6B
4,335,300 UART: [art] PUB.Y = 35679399FA4137F3C3A72CE2D7EC5302E0B4BE6124A134C9EEF9513D06CC94957550ED9B31376FDC8D9EF29C12D0051A
4,342,247 UART: [art] SIG.R = 2165ACB7791573F7A8D1CEAA97E54DE9B003BEB12E6023F2788D7263A5E6F3FA0B436215CC56BB9E95B64C3A0D19FDE4
4,349,022 UART: [art] SIG.S = 1115D9B4EA9B4F488B47DD592A1DE5ECCA4931202D00B74F31A38BFDE0C4AA0889704B495986EABB249832E75D44B187
4,372,961 UART: Caliptra RT
4,373,304 UART: [state] CFI Enabled
4,733,768 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Production
85,891 UART: [state] DebugLocked = Yes
86,493 UART: [state] Starting the WD Timer 40000000 cycles
88,032 UART: [kat] SHA2-256
893,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,807 UART: [kat] ++
897,959 UART: [kat] sha1
902,035 UART: [kat] SHA2-256
903,975 UART: [kat] SHA2-384
906,636 UART: [kat] SHA2-512-ACC
908,537 UART: [kat] ECC-384
918,380 UART: [kat] HMAC-384Kdf
922,930 UART: [kat] LMS
1,171,258 UART: [kat] --
1,172,067 UART: [cold-reset] ++
1,172,458 UART: [fht] FHT @ 0x50003400
1,175,081 UART: [idev] ++
1,175,249 UART: [idev] CDI.KEYID = 6
1,175,609 UART: [idev] SUBJECT.KEYID = 7
1,176,033 UART: [idev] UDS.KEYID = 0
1,176,378 ready_for_fw is high
1,176,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,000 UART: [idev] Erasing UDS.KEYID = 0
1,200,822 UART: [idev] Sha1 KeyId Algorithm
1,209,205 UART: [idev] --
1,210,217 UART: [ldev] ++
1,210,385 UART: [ldev] CDI.KEYID = 6
1,210,748 UART: [ldev] SUBJECT.KEYID = 5
1,211,174 UART: [ldev] AUTHORITY.KEYID = 7
1,211,637 UART: [ldev] FE.KEYID = 1
1,216,817 UART: [ldev] Erasing FE.KEYID = 1
1,243,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,613 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,307 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,179 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,885 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,966 UART: [ldev] --
1,282,369 UART: [fwproc] Wait for Commands...
1,283,053 UART: [fwproc] Recv command 0x46574c44
1,283,781 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,708 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,878 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,178 >>> mbox cmd response: success
2,853,431 UART: [afmc] ++
2,853,599 UART: [afmc] CDI.KEYID = 6
2,853,961 UART: [afmc] SUBJECT.KEYID = 7
2,854,386 UART: [afmc] AUTHORITY.KEYID = 5
2,889,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,906,286 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,907,034 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,912,749 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,918,634 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,924,339 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,985 UART: [afmc] --
2,932,986 UART: [cold-reset] --
2,933,846 UART: [state] Locking Datavault
2,934,675 UART: [state] Locking PCR0, PCR1 and PCR31
2,935,279 UART: [state] Locking ICCM
2,935,843 UART: [exit] Launching FMC @ 0x40000130
2,941,173 UART:
2,941,189 UART: Running Caliptra FMC ...
2,941,597 UART:
2,941,651 UART: [state] CFI Enabled
2,952,293 UART: [fht] FMC Alias Private Key: 7
3,071,196 UART: [art] Extend RT PCRs Done
3,071,624 UART: [art] Lock RT PCRs Done
3,072,904 UART: [art] Populate DV Done
3,080,974 UART: [fht] FMC Alias Private Key: 7
3,082,118 UART: [art] Derive CDI
3,082,398 UART: [art] Store in slot 0x4
3,168,215 UART: [art] Derive Key Pair
3,168,575 UART: [art] Store priv key in slot 0x5
3,181,945 UART: [art] Derive Key Pair - Done
3,196,713 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,861 UART: [art] PUB.X = 3B246E38E614F1E9382EAFAE276F1FC69525DC63EC7E37193D08565EEF433D1F19FC8EEA5171BEC497A07F405E82775B
3,219,638 UART: [art] PUB.Y = 970BE36C86B7F3CB2D160193D6D92BDEF8A9713BF6364B984577EE35C66F646721254ABD5EEEA0021E5FFDE83E392512
3,226,587 UART: [art] SIG.R = BA4291DF1E18B0FB63433F2725F79D8B3311CAA0A0E67E4A26ABF57AA8856F301B74547B8061EF45E33F1FEBB2D5AB41
3,233,371 UART: [art] SIG.S = ADFC6709273816D280EA7572DC37491A782D2AAA6A80324581DA58E54E910A6D39554516E799492D64FD75821EF7BC4F
3,256,911 UART: Caliptra RT
3,257,162 UART: [state] CFI Enabled
3,377,322 UART: [rt] RT listening for mailbox commands...
3,377,986 writing to cptra_bootfsm_go
3,378,078 UART:
3,378,094 UART: Running Caliptra ROM ...
3,378,502 UART:
3,378,557 UART: [state] CFI Enabled
3,381,100 UART: [state] LifecycleState = Production
3,381,708 UART: [state] DebugLocked = Yes
3,382,306 UART: [state] Starting the WD Timer 40000000 cycles
3,383,915 UART: [kat] SHA2-256
4,189,565 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,193,690 UART: [kat] ++
4,193,842 UART: [kat] sha1
4,198,248 UART: [kat] SHA2-256
4,200,188 UART: [kat] SHA2-384
4,202,799 UART: [kat] SHA2-512-ACC
4,204,700 UART: [kat] ECC-384
4,214,351 UART: [kat] HMAC-384Kdf
4,218,971 UART: [kat] LMS
4,467,299 UART: [kat] --
4,468,307 UART: [warm-reset] ++
4,469,376 UART: [warm-reset] --
4,470,247 UART: [state] Locking Datavault
4,471,127 UART: [state] Locking PCR0, PCR1 and PCR31
4,471,731 UART: [state] Locking ICCM
4,472,271 UART: [exit] Launching FMC @ 0x40000130
4,477,601 UART:
4,477,617 UART: Running Caliptra FMC ...
4,478,025 UART:
4,478,079 UART: [state] CFI Enabled
4,479,272 UART: [art] Skip pcr extension
4,479,681 UART: [art] Extend RT PCRs Done
4,480,109 UART: [art] Lock RT PCRs Done
4,481,432 UART: [art] Populate DV Done
4,489,780 UART: [fht] FMC Alias Private Key: 7
4,490,784 UART: [art] Derive CDI
4,491,064 UART: [art] Store in slot 0x4
4,576,703 UART: [art] Derive Key Pair
4,577,063 UART: [art] Store priv key in slot 0x5
4,590,391 UART: [art] Derive Key Pair - Done
4,605,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,620,232 UART: [art] Erasing AUTHORITY.KEYID = 7
4,620,997 UART: [art] PUB.X = 3B246E38E614F1E9382EAFAE276F1FC69525DC63EC7E37193D08565EEF433D1F19FC8EEA5171BEC497A07F405E82775B
4,627,774 UART: [art] PUB.Y = 970BE36C86B7F3CB2D160193D6D92BDEF8A9713BF6364B984577EE35C66F646721254ABD5EEEA0021E5FFDE83E392512
4,634,723 UART: [art] SIG.R = BA4291DF1E18B0FB63433F2725F79D8B3311CAA0A0E67E4A26ABF57AA8856F301B74547B8061EF45E33F1FEBB2D5AB41
4,641,507 UART: [art] SIG.S = ADFC6709273816D280EA7572DC37491A782D2AAA6A80324581DA58E54E910A6D39554516E799492D64FD75821EF7BC4F
4,664,953 UART: Caliptra RT
4,665,204 UART: [state] CFI Enabled
5,026,097 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,732 ready_for_fw is high
1,060,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,223 >>> mbox cmd response: success
2,767,189 UART:
2,767,205 UART: Running Caliptra FMC ...
2,767,613 UART:
2,767,667 UART: [state] CFI Enabled
2,777,983 UART: [fht] FMC Alias Private Key: 7
2,896,800 UART: [art] Extend RT PCRs Done
2,897,228 UART: [art] Lock RT PCRs Done
2,898,594 UART: [art] Populate DV Done
2,906,724 UART: [fht] FMC Alias Private Key: 7
2,907,822 UART: [art] Derive CDI
2,908,102 UART: [art] Store in slot 0x4
2,993,655 UART: [art] Derive Key Pair
2,994,015 UART: [art] Store priv key in slot 0x5
3,007,261 UART: [art] Derive Key Pair - Done
3,022,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,037,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,038,109 UART: [art] PUB.X = 4547BD03A6700D4BE9C939B4A9A85644C750A608B82CA01AD43A7A2D65FBF3264B7B99F9C800DF8D398735F17BA5198C
3,044,854 UART: [art] PUB.Y = 18A2A1406C1F16AA06346179A773F1E0164215705EA9D376A3E03050262B8F5BB50C1824ABFB3F935AEA3906CB6F2CC5
3,051,797 UART: [art] SIG.R = F7E3ACAC517DBB8017EAF52C4B8F7F365134F03B8D0F9E0398FB3C4E661F36F93985D1F9326151751143219A0EDF3DAA
3,058,568 UART: [art] SIG.S = C7AF2F58515B065A3BE9B608AAEEEB7305983DF9AD679B25B2C157B3DC17CAAF5A32826BEF94DCA7BA740C691D57D359
3,082,718 UART: Caliptra RT
3,082,969 UART: [state] CFI Enabled
3,202,863 UART: [rt] RT listening for mailbox commands...
3,203,527 writing to cptra_bootfsm_go
4,186,524 UART:
4,186,540 UART: Running Caliptra FMC ...
4,186,948 UART:
4,187,002 UART: [state] CFI Enabled
4,188,231 UART: [art] Skip pcr extension
4,188,640 UART: [art] Extend RT PCRs Done
4,189,068 UART: [art] Lock RT PCRs Done
4,190,321 UART: [art] Populate DV Done
4,198,803 UART: [fht] FMC Alias Private Key: 7
4,199,733 UART: [art] Derive CDI
4,200,013 UART: [art] Store in slot 0x4
4,286,298 UART: [art] Derive Key Pair
4,286,658 UART: [art] Store priv key in slot 0x5
4,299,838 UART: [art] Derive Key Pair - Done
4,314,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,330,129 UART: [art] Erasing AUTHORITY.KEYID = 7
4,330,894 UART: [art] PUB.X = 4547BD03A6700D4BE9C939B4A9A85644C750A608B82CA01AD43A7A2D65FBF3264B7B99F9C800DF8D398735F17BA5198C
4,337,639 UART: [art] PUB.Y = 18A2A1406C1F16AA06346179A773F1E0164215705EA9D376A3E03050262B8F5BB50C1824ABFB3F935AEA3906CB6F2CC5
4,344,582 UART: [art] SIG.R = F7E3ACAC517DBB8017EAF52C4B8F7F365134F03B8D0F9E0398FB3C4E661F36F93985D1F9326151751143219A0EDF3DAA
4,351,353 UART: [art] SIG.S = C7AF2F58515B065A3BE9B608AAEEEB7305983DF9AD679B25B2C157B3DC17CAAF5A32826BEF94DCA7BA740C691D57D359
4,375,003 UART: Caliptra RT
4,375,254 UART: [state] CFI Enabled
4,740,159 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,606 UART: [state] LifecycleState = Production
86,214 UART: [state] DebugLocked = Yes
86,906 UART: [state] Starting the WD Timer 40000000 cycles
88,377 UART: [kat] SHA2-256
894,027 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,152 UART: [kat] ++
898,304 UART: [kat] sha1
902,544 UART: [kat] SHA2-256
904,484 UART: [kat] SHA2-384
907,207 UART: [kat] SHA2-512-ACC
909,108 UART: [kat] ECC-384
918,897 UART: [kat] HMAC-384Kdf
923,561 UART: [kat] LMS
1,171,889 UART: [kat] --
1,172,988 UART: [cold-reset] ++
1,173,343 UART: [fht] FHT @ 0x50003400
1,175,868 UART: [idev] ++
1,176,036 UART: [idev] CDI.KEYID = 6
1,176,396 UART: [idev] SUBJECT.KEYID = 7
1,176,820 UART: [idev] UDS.KEYID = 0
1,177,165 ready_for_fw is high
1,177,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,507 UART: [idev] Erasing UDS.KEYID = 0
1,201,531 UART: [idev] Sha1 KeyId Algorithm
1,209,878 UART: [idev] --
1,210,924 UART: [ldev] ++
1,211,092 UART: [ldev] CDI.KEYID = 6
1,211,455 UART: [ldev] SUBJECT.KEYID = 5
1,211,881 UART: [ldev] AUTHORITY.KEYID = 7
1,212,344 UART: [ldev] FE.KEYID = 1
1,217,324 UART: [ldev] Erasing FE.KEYID = 1
1,243,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,300 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,994 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,866 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,572 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,605 UART: [ldev] --
1,282,998 UART: [fwproc] Wait for Commands...
1,283,612 UART: [fwproc] Recv command 0x46574c44
1,284,340 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,682,189 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,713,359 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,853,747 >>> mbox cmd response: success
2,854,924 UART: [afmc] ++
2,855,092 UART: [afmc] CDI.KEYID = 6
2,855,454 UART: [afmc] SUBJECT.KEYID = 7
2,855,879 UART: [afmc] AUTHORITY.KEYID = 5
2,891,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,907,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,908,497 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,914,212 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,920,097 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,925,802 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,933,802 UART: [afmc] --
2,934,927 UART: [cold-reset] --
2,935,875 UART: [state] Locking Datavault
2,937,160 UART: [state] Locking PCR0, PCR1 and PCR31
2,937,764 UART: [state] Locking ICCM
2,938,436 UART: [exit] Launching FMC @ 0x40000130
2,943,766 UART:
2,943,782 UART: Running Caliptra FMC ...
2,944,190 UART:
2,944,333 UART: [state] CFI Enabled
2,954,801 UART: [fht] FMC Alias Private Key: 7
3,073,320 UART: [art] Extend RT PCRs Done
3,073,748 UART: [art] Lock RT PCRs Done
3,075,722 UART: [art] Populate DV Done
3,084,104 UART: [fht] FMC Alias Private Key: 7
3,085,144 UART: [art] Derive CDI
3,085,424 UART: [art] Store in slot 0x4
3,171,471 UART: [art] Derive Key Pair
3,171,831 UART: [art] Store priv key in slot 0x5
3,185,301 UART: [art] Derive Key Pair - Done
3,199,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,215,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,104 UART: [art] PUB.X = DD9BFB666364B9B74D8D6D1CE6BAC0D4D8794FFB4414524D94A7BBEE2F24CC615953F8ECA1A26D3571ADD0C3F69E8AF6
3,222,898 UART: [art] PUB.Y = FBE6E9013C94E6F5F68B2F38D46DBF9E9150F1407ACEAB76BFC7785B0184C31B35F0973A1128247F73A2D65B0D6EB829
3,229,849 UART: [art] SIG.R = 1084D8337C66F1C7FCC9079C5E9F27D99514EA9153715619FAB89D9C5E2D550ACD7D9F04CD09775BCEB7B4EE626F2210
3,236,615 UART: [art] SIG.S = 27D5DD16AE0BE7FC4A94C8918E438FA99CD1C00EAB57373D999E25EE2904DD3E92C56540C209EA2943FB93195A925DC9
3,260,221 UART: Caliptra RT
3,260,564 UART: [state] CFI Enabled
3,381,761 UART: [rt] RT listening for mailbox commands...
3,382,425 writing to cptra_bootfsm_go
3,382,517 UART:
3,382,533 UART: Running Caliptra ROM ...
3,382,941 UART:
3,383,083 UART: [state] CFI Enabled
3,386,106 UART: [state] LifecycleState = Production
3,386,714 UART: [state] DebugLocked = Yes
3,387,352 UART: [state] Starting the WD Timer 40000000 cycles
3,388,971 UART: [kat] SHA2-256
4,194,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,198,746 UART: [kat] ++
4,198,898 UART: [kat] sha1
4,203,066 UART: [kat] SHA2-256
4,205,006 UART: [kat] SHA2-384
4,207,851 UART: [kat] SHA2-512-ACC
4,209,752 UART: [kat] ECC-384
4,219,779 UART: [kat] HMAC-384Kdf
4,224,507 UART: [kat] LMS
4,472,835 UART: [kat] --
4,473,459 UART: [warm-reset] ++
4,474,298 UART: [warm-reset] --
4,475,027 UART: [state] Locking Datavault
4,475,765 UART: [state] Locking PCR0, PCR1 and PCR31
4,476,369 UART: [state] Locking ICCM
4,476,891 UART: [exit] Launching FMC @ 0x40000130
4,482,221 UART:
4,482,237 UART: Running Caliptra FMC ...
4,482,645 UART:
4,482,788 UART: [state] CFI Enabled
4,483,995 UART: [art] Skip pcr extension
4,484,404 UART: [art] Extend RT PCRs Done
4,484,832 UART: [art] Lock RT PCRs Done
4,486,053 UART: [art] Populate DV Done
4,494,085 UART: [fht] FMC Alias Private Key: 7
4,495,105 UART: [art] Derive CDI
4,495,385 UART: [art] Store in slot 0x4
4,581,616 UART: [art] Derive Key Pair
4,581,976 UART: [art] Store priv key in slot 0x5
4,595,274 UART: [art] Derive Key Pair - Done
4,609,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,625,674 UART: [art] Erasing AUTHORITY.KEYID = 7
4,626,439 UART: [art] PUB.X = DD9BFB666364B9B74D8D6D1CE6BAC0D4D8794FFB4414524D94A7BBEE2F24CC615953F8ECA1A26D3571ADD0C3F69E8AF6
4,633,233 UART: [art] PUB.Y = FBE6E9013C94E6F5F68B2F38D46DBF9E9150F1407ACEAB76BFC7785B0184C31B35F0973A1128247F73A2D65B0D6EB829
4,640,184 UART: [art] SIG.R = 1084D8337C66F1C7FCC9079C5E9F27D99514EA9153715619FAB89D9C5E2D550ACD7D9F04CD09775BCEB7B4EE626F2210
4,646,950 UART: [art] SIG.S = 27D5DD16AE0BE7FC4A94C8918E438FA99CD1C00EAB57373D999E25EE2904DD3E92C56540C209EA2943FB93195A925DC9
4,670,408 UART: Caliptra RT
4,670,751 UART: [state] CFI Enabled
5,035,887 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,107 ready_for_fw is high
1,060,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,294 >>> mbox cmd response: success
2,767,170 UART:
2,767,186 UART: Running Caliptra FMC ...
2,767,594 UART:
2,767,737 UART: [state] CFI Enabled
2,778,359 UART: [fht] FMC Alias Private Key: 7
2,897,030 UART: [art] Extend RT PCRs Done
2,897,458 UART: [art] Lock RT PCRs Done
2,898,830 UART: [art] Populate DV Done
2,906,918 UART: [fht] FMC Alias Private Key: 7
2,908,062 UART: [art] Derive CDI
2,908,342 UART: [art] Store in slot 0x4
2,994,367 UART: [art] Derive Key Pair
2,994,727 UART: [art] Store priv key in slot 0x5
3,008,645 UART: [art] Derive Key Pair - Done
3,023,016 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,038,299 UART: [art] Erasing AUTHORITY.KEYID = 7
3,039,064 UART: [art] PUB.X = 5A765F8CBCF58B23BB5D4C5D7FA2A107BE7BC733AAF212BFB3A377241A2B5909D9D7538E7FC6BFF98F79E10AEE8C2D14
3,045,849 UART: [art] PUB.Y = 3637E364EDD3622C8687375A9CB3318DB0E8C839EA32F72435C8A28C89955B53844F3304097643579C88E82260B839BE
3,052,781 UART: [art] SIG.R = 6380AF5C124987F99AD226A7AE802128747EF57E964AEE87DCA4544956BEF6D85044984E7170F9BF0B28FD45F7B63420
3,059,548 UART: [art] SIG.S = F460C743EA8CD347B971FDA6B4E79F6B5539ADAC9BF0972BF12AB655C123CA6CCDCB701AD1F9398E3190FF5CB0AF3084
3,083,316 UART: Caliptra RT
3,083,659 UART: [state] CFI Enabled
3,203,173 UART: [rt] RT listening for mailbox commands...
3,203,837 writing to cptra_bootfsm_go
4,186,819 UART:
4,186,835 UART: Running Caliptra FMC ...
4,187,243 UART:
4,187,386 UART: [state] CFI Enabled
4,188,823 UART: [art] Skip pcr extension
4,189,232 UART: [art] Extend RT PCRs Done
4,189,660 UART: [art] Lock RT PCRs Done
4,191,185 UART: [art] Populate DV Done
4,199,381 UART: [fht] FMC Alias Private Key: 7
4,200,397 UART: [art] Derive CDI
4,200,677 UART: [art] Store in slot 0x4
4,286,282 UART: [art] Derive Key Pair
4,286,642 UART: [art] Store priv key in slot 0x5
4,300,110 UART: [art] Derive Key Pair - Done
4,314,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,330,426 UART: [art] Erasing AUTHORITY.KEYID = 7
4,331,191 UART: [art] PUB.X = 5A765F8CBCF58B23BB5D4C5D7FA2A107BE7BC733AAF212BFB3A377241A2B5909D9D7538E7FC6BFF98F79E10AEE8C2D14
4,337,976 UART: [art] PUB.Y = 3637E364EDD3622C8687375A9CB3318DB0E8C839EA32F72435C8A28C89955B53844F3304097643579C88E82260B839BE
4,344,908 UART: [art] SIG.R = 6380AF5C124987F99AD226A7AE802128747EF57E964AEE87DCA4544956BEF6D85044984E7170F9BF0B28FD45F7B63420
4,351,675 UART: [art] SIG.S = F460C743EA8CD347B971FDA6B4E79F6B5539ADAC9BF0972BF12AB655C123CA6CCDCB701AD1F9398E3190FF5CB0AF3084
4,375,729 UART: Caliptra RT
4,376,072 UART: [state] CFI Enabled
4,740,867 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
191,637 UART:
192,009 UART: Running Caliptra ROM ...
193,216 UART:
193,364 UART: [state] CFI Enabled
262,447 UART: [state] LifecycleState = Production
264,256 UART: [state] DebugLocked = Yes
267,346 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,241 UART: [kat] SHA2-256
442,988 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,460 UART: [kat] ++
454,028 UART: [kat] sha1
464,396 UART: [kat] SHA2-256
467,126 UART: [kat] SHA2-384
472,870 UART: [kat] SHA2-512-ACC
475,277 UART: [kat] ECC-384
2,766,812 UART: [kat] HMAC-384Kdf
2,800,347 UART: [kat] LMS
3,990,668 UART: [kat] --
3,997,485 UART: [cold-reset] ++
3,999,156 UART: [fht] Storing FHT @ 0x50003400
4,009,619 UART: [idev] ++
4,010,199 UART: [idev] CDI.KEYID = 6
4,011,137 UART: [idev] SUBJECT.KEYID = 7
4,012,394 UART: [idev] UDS.KEYID = 0
299 writing to cptra_bootfsm_go
726 UART: [idev] Erasing UDS.KEYID = 0
1,989 UART:
2,140 UART: Running Caliptra ROM ...
3,188 UART:
3,333 UART: [state] CFI Enabled
65,926 UART: [state] LifecycleState = Production
67,756 UART: [state] DebugLocked = Yes
70,586 UART: [state] Starting the Watchdog Timer 40000000 cycles
76,197 UART: [kat] SHA2-256
245,937 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
256,408 UART: [kat] ++
256,940 UART: [kat] sha1
268,091 UART: [kat] SHA2-256
270,780 UART: [kat] SHA2-384
276,545 UART: [kat] SHA2-512-ACC
278,942 UART: [kat] ECC-384
2,570,172 UART: [kat] HMAC-384Kdf
2,601,056 UART: [kat] LMS
3,791,398 UART: [kat] --
3,796,059 UART: [warm-reset] ++
3,796,859 UART: [warm-reset] Previous Cold-Reset was not successful.
3,801,642 UART: ROM Fatal Error: 0x01040010test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
294 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
191,863 UART:
192,246 UART: Running Caliptra ROM ...
193,365 UART:
603,017 UART: [state] CFI Enabled
617,624 UART: [state] LifecycleState = Production
619,453 UART: [state] DebugLocked = Yes
622,486 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,050 UART: [kat] SHA2-256
796,856 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,355 UART: [kat] ++
807,914 UART: [kat] sha1
820,003 UART: [kat] SHA2-256
822,685 UART: [kat] SHA2-384
827,519 UART: [kat] SHA2-512-ACC
829,902 UART: [kat] ECC-384
3,115,336 UART: [kat] HMAC-384Kdf
3,127,862 UART: [kat] LMS
4,318,001 UART: [kat] --
4,323,304 UART: [cold-reset] ++
4,325,636 UART: [fht] Storing FHT @ 0x50003400
4,336,659 UART: [idev] ++
4,337,226 UART: [idev] CDI.KEYID = 6
4,338,185 UART: [idev] SUBJECT.KEYID = 7
4,339,387 UART: [idev] UDS.KEYID = 0
293 writing to cptra_bootfsm_go
740 UART: [idev] Erasing UDS.KEYID = 0
2,059 UART:
2,229 UART: Running Caliptra ROM ...
3,292 UART:
15,975,758 UART: [state] CFI Enabled
15,991,770 UART: [state] LifecycleState = Production
15,993,592 UART: [state] DebugLocked = Yes
15,995,648 UART: [state] Starting the Watchdog Timer 40000000 cycles
16,001,297 UART: [kat] SHA2-256
16,171,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
16,181,535 UART: [kat] ++
16,181,992 UART: [kat] sha1
16,194,064 UART: [kat] SHA2-256
16,196,765 UART: [kat] SHA2-384
16,202,916 UART: [kat] SHA2-512-ACC
16,205,319 UART: [kat] ECC-384
18,490,082 UART: [kat] HMAC-384Kdf
18,502,364 UART: [kat] LMS
19,692,480 UART: [kat] --
19,697,214 UART: [warm-reset] ++
19,698,096 UART: [warm-reset] Previous Cold-Reset was not successful.
19,702,680 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
299 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
191,635 UART:
191,991 UART: Running Caliptra ROM ...
193,208 UART:
193,367 UART: [state] CFI Enabled
266,555 UART: [state] LifecycleState = Production
268,414 UART: [state] DebugLocked = Yes
271,091 UART: [state] Starting the WD Timer 40000000 cycles
276,569 UART: [kat] SHA2-256
456,268 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
467,007 UART: [kat] ++
467,625 UART: [kat] sha1
477,650 UART: [kat] SHA2-256
480,370 UART: [kat] SHA2-384
487,034 UART: [kat] SHA2-512-ACC
489,396 UART: [kat] ECC-384
2,947,529 UART: [kat] HMAC-384Kdf
2,971,751 UART: [kat] LMS
3,448,294 UART: [kat] --
3,453,417 UART: [cold-reset] ++
3,455,742 UART: [fht] FHT @ 0x50003400
3,467,595 UART: [idev] ++
3,468,167 UART: [idev] CDI.KEYID = 6
3,469,106 UART: [idev] SUBJECT.KEYID = 7
3,470,364 UART: [idev] UDS.KEYID = 0
294 writing to cptra_bootfsm_go
739 UART: [idev] Erasing UDS.KEYID = 0
1,917 UART:
2,168 UART: Running Caliptra ROM ...
3,233 UART:
3,387 UART: [state] CFI Enabled
74,102 UART: [state] LifecycleState = Production
75,873 UART: [state] DebugLocked = Yes
78,672 UART: [state] Starting the WD Timer 40000000 cycles
83,129 UART: [kat] SHA2-256
262,850 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
273,642 UART: [kat] ++
274,090 UART: [kat] sha1
284,056 UART: [kat] SHA2-256
286,749 UART: [kat] SHA2-384
292,726 UART: [kat] SHA2-512-ACC
295,106 UART: [kat] ECC-384
2,758,275 UART: [kat] HMAC-384Kdf
2,781,996 UART: [kat] LMS
3,258,436 UART: [kat] --
3,263,938 UART: [warm-reset] ++
3,264,792 UART: [warm-reset] Prev Cold-Reset failed
3,267,709 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
298 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
191,895 UART:
192,262 UART: Running Caliptra ROM ...
193,467 UART:
603,032 UART: [state] CFI Enabled
618,308 UART: [state] LifecycleState = Production
620,082 UART: [state] DebugLocked = Yes
623,116 UART: [state] Starting the WD Timer 40000000 cycles
628,448 UART: [kat] SHA2-256
808,140 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,909 UART: [kat] ++
819,384 UART: [kat] sha1
830,564 UART: [kat] SHA2-256
833,263 UART: [kat] SHA2-384
839,100 UART: [kat] SHA2-512-ACC
841,457 UART: [kat] ECC-384
3,285,087 UART: [kat] HMAC-384Kdf
3,296,989 UART: [kat] LMS
3,773,502 UART: [kat] --
3,779,394 UART: [cold-reset] ++
3,780,471 UART: [fht] FHT @ 0x50003400
3,792,129 UART: [idev] ++
3,792,701 UART: [idev] CDI.KEYID = 6
3,793,672 UART: [idev] SUBJECT.KEYID = 7
3,794,875 UART: [idev] UDS.KEYID = 0
297 writing to cptra_bootfsm_go
753 UART: [idev] Erasing UDS.KEYID = 0
2,035 UART:
2,264 UART: Running Caliptra ROM ...
3,367 UART:
16,517,183 UART: [state] CFI Enabled
16,532,149 UART: [state] LifecycleState = Production
16,533,903 UART: [state] DebugLocked = Yes
16,536,115 UART: [state] Starting the WD Timer 40000000 cycles
16,540,465 UART: [kat] SHA2-256
16,720,164 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
16,730,920 UART: [kat] ++
16,731,374 UART: [kat] sha1
16,741,450 UART: [kat] SHA2-256
16,744,139 UART: [kat] SHA2-384
16,749,471 UART: [kat] SHA2-512-ACC
16,751,868 UART: [kat] ECC-384
19,193,866 UART: [kat] HMAC-384Kdf
19,206,112 UART: [kat] LMS
19,682,587 UART: [kat] --
19,688,945 UART: [warm-reset] ++
19,689,793 UART: [warm-reset] Prev Cold-Reset failed
19,693,525 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
295 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
191,647 UART:
192,023 UART: Running Caliptra ROM ...
193,128 UART:
193,265 UART: [state] CFI Enabled
267,620 UART: [state] LifecycleState = Production
269,880 UART: [state] DebugLocked = Yes
271,146 UART: [state] Starting the WD Timer 40000000 cycles
276,916 UART: [kat] SHA2-256
466,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,495 UART: [kat] ++
478,042 UART: [kat] sha1
488,738 UART: [kat] SHA2-256
491,753 UART: [kat] SHA2-384
496,529 UART: [kat] SHA2-512-ACC
499,094 UART: [kat] ECC-384
2,949,231 UART: [kat] HMAC-384Kdf
2,972,128 UART: [kat] LMS
3,503,900 UART: [kat] --
3,508,312 UART: [cold-reset] ++
3,509,765 UART: [fht] FHT @ 0x50003400
3,522,692 UART: [idev] ++
3,523,375 UART: [idev] CDI.KEYID = 6
3,524,389 UART: [idev] SUBJECT.KEYID = 7
3,525,544 UART: [idev] UDS.KEYID = 0
295 writing to cptra_bootfsm_go
748 UART: [idev] Erasing UDS.KEYID = 0
2,015 UART:
2,252 UART: Running Caliptra ROM ...
3,297 UART:
3,442 UART: [state] CFI Enabled
63,783 UART: [state] LifecycleState = Production
65,718 UART: [state] DebugLocked = Yes
68,437 UART: [state] Starting the WD Timer 40000000 cycles
73,066 UART: [kat] SHA2-256
262,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
273,706 UART: [kat] ++
274,232 UART: [kat] sha1
284,892 UART: [kat] SHA2-256
287,896 UART: [kat] SHA2-384
293,548 UART: [kat] SHA2-512-ACC
296,163 UART: [kat] ECC-384
2,747,973 UART: [kat] HMAC-384Kdf
2,771,345 UART: [kat] LMS
3,302,874 UART: [kat] --
3,305,727 UART: [warm-reset] ++
3,306,571 UART: [warm-reset] Prev Cold-Reset failed
3,310,180 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
294 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
191,782 UART:
192,152 UART: Running Caliptra ROM ...
193,303 UART:
603,121 UART: [state] CFI Enabled
616,239 UART: [state] LifecycleState = Production
618,485 UART: [state] DebugLocked = Yes
621,365 UART: [state] Starting the WD Timer 40000000 cycles
626,785 UART: [kat] SHA2-256
816,689 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,515 UART: [kat] ++
828,097 UART: [kat] sha1
839,863 UART: [kat] SHA2-256
842,918 UART: [kat] SHA2-384
849,959 UART: [kat] SHA2-512-ACC
852,129 UART: [kat] ECC-384
3,294,420 UART: [kat] HMAC-384Kdf
3,306,995 UART: [kat] LMS
3,838,827 UART: [kat] --
3,843,796 UART: [cold-reset] ++
3,845,459 UART: [fht] FHT @ 0x50003400
3,857,611 UART: [idev] ++
3,858,332 UART: [idev] CDI.KEYID = 6
3,859,293 UART: [idev] SUBJECT.KEYID = 7
3,860,442 UART: [idev] UDS.KEYID = 0
294 writing to cptra_bootfsm_go
748 UART: [idev] Erasing UDS.KEYID = 0
2,011 UART:
2,274 UART: Running Caliptra ROM ...
3,384 UART:
16,453,722 UART: [state] CFI Enabled
16,466,863 UART: [state] LifecycleState = Production
16,468,625 UART: [state] DebugLocked = Yes
16,470,515 UART: [state] Starting the WD Timer 40000000 cycles
16,476,398 UART: [kat] SHA2-256
16,666,279 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
16,677,189 UART: [kat] ++
16,677,713 UART: [kat] sha1
16,689,304 UART: [kat] SHA2-256
16,692,327 UART: [kat] SHA2-384
16,697,834 UART: [kat] SHA2-512-ACC
16,700,397 UART: [kat] ECC-384
19,139,472 UART: [kat] HMAC-384Kdf
19,152,515 UART: [kat] LMS
19,684,087 UART: [kat] --
19,687,322 UART: [warm-reset] ++
19,688,168 UART: [warm-reset] Prev Cold-Reset failed
19,690,267 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
297 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,947 UART: [state] LifecycleState = Production
85,555 UART: [state] DebugLocked = Yes
86,313 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,957 UART: [kat] SHA2-256
881,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,003 UART: [kat] ++
886,155 UART: [kat] sha1
890,221 UART: [kat] SHA2-256
892,159 UART: [kat] SHA2-384
894,832 UART: [kat] SHA2-512-ACC
896,733 UART: [kat] ECC-384
902,530 UART: [kat] HMAC-384Kdf
907,290 UART: [kat] LMS
1,475,486 UART: [kat] --
1,476,377 UART: [cold-reset] ++
1,476,956 UART: [fht] Storing FHT @ 0x50003400
1,479,683 UART: [idev] ++
1,479,851 UART: [idev] CDI.KEYID = 6
1,480,211 UART: [idev] SUBJECT.KEYID = 7
1,480,635 UART: [idev] UDS.KEYID = 0
1,480,981 writing to cptra_bootfsm_go
1,481,076 UART:
1,481,092 UART: Running Caliptra ROM ...
1,481,500 UART:
1,481,554 UART: [state] CFI Enabled
1,483,651 UART: [state] LifecycleState = Production
1,484,259 UART: [state] DebugLocked = Yes
1,484,817 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,486,391 UART: [kat] SHA2-256
2,280,322 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,284,437 UART: [kat] ++
2,284,589 UART: [kat] sha1
2,288,757 UART: [kat] SHA2-256
2,290,695 UART: [kat] SHA2-384
2,293,526 UART: [kat] SHA2-512-ACC
2,295,427 UART: [kat] ECC-384
2,301,198 UART: [kat] HMAC-384Kdf
2,305,686 UART: [kat] LMS
2,873,882 UART: [kat] --
2,874,688 UART: [warm-reset] ++
2,874,959 UART: [warm-reset] Previous Cold-Reset was not successful.
2,876,280 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,903 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,754 UART: [state] LifecycleState = Production
86,362 UART: [state] DebugLocked = Yes
87,040 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,746 UART: [kat] SHA2-256
882,677 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,792 UART: [kat] ++
886,944 UART: [kat] sha1
891,134 UART: [kat] SHA2-256
893,072 UART: [kat] SHA2-384
895,737 UART: [kat] SHA2-512-ACC
897,638 UART: [kat] ECC-384
903,171 UART: [kat] HMAC-384Kdf
907,863 UART: [kat] LMS
1,476,059 UART: [kat] --
1,476,854 UART: [cold-reset] ++
1,477,413 UART: [fht] Storing FHT @ 0x50003400
1,480,306 UART: [idev] ++
1,480,474 UART: [idev] CDI.KEYID = 6
1,480,834 UART: [idev] SUBJECT.KEYID = 7
1,481,258 UART: [idev] UDS.KEYID = 0
1,481,604 writing to cptra_bootfsm_go
1,481,699 UART:
1,481,715 UART: Running Caliptra ROM ...
1,482,123 UART:
1,482,264 UART: [state] CFI Enabled
1,485,225 UART: [state] LifecycleState = Production
1,485,833 UART: [state] DebugLocked = Yes
1,486,549 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,488,327 UART: [kat] SHA2-256
2,282,258 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,286,373 UART: [kat] ++
2,286,525 UART: [kat] sha1
2,290,781 UART: [kat] SHA2-256
2,292,719 UART: [kat] SHA2-384
2,295,650 UART: [kat] SHA2-512-ACC
2,297,551 UART: [kat] ECC-384
2,303,048 UART: [kat] HMAC-384Kdf
2,307,662 UART: [kat] LMS
2,875,858 UART: [kat] --
2,876,850 UART: [warm-reset] ++
2,877,121 UART: [warm-reset] Previous Cold-Reset was not successful.
2,878,414 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,414 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Production
85,685 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 40000000 cycles
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,420 UART: [kat] ++
895,572 UART: [kat] sha1
899,794 UART: [kat] SHA2-256
901,734 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,453 UART: [kat] HMAC-384Kdf
921,097 UART: [kat] LMS
1,169,409 UART: [kat] --
1,170,432 UART: [cold-reset] ++
1,170,939 UART: [fht] FHT @ 0x50003400
1,173,607 UART: [idev] ++
1,173,775 UART: [idev] CDI.KEYID = 6
1,174,136 UART: [idev] SUBJECT.KEYID = 7
1,174,561 UART: [idev] UDS.KEYID = 0
1,174,908 writing to cptra_bootfsm_go
1,175,000 UART:
1,175,016 UART: Running Caliptra ROM ...
1,175,424 UART:
1,175,479 UART: [state] CFI Enabled
1,178,208 UART: [state] LifecycleState = Production
1,178,816 UART: [state] DebugLocked = Yes
1,179,548 UART: [state] Starting the WD Timer 40000000 cycles
1,181,247 UART: [kat] SHA2-256
1,984,797 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,988,901 UART: [kat] ++
1,989,053 UART: [kat] sha1
1,993,185 UART: [kat] SHA2-256
1,995,125 UART: [kat] SHA2-384
1,997,876 UART: [kat] SHA2-512-ACC
1,999,777 UART: [kat] ECC-384
2,009,088 UART: [kat] HMAC-384Kdf
2,013,534 UART: [kat] LMS
2,261,846 UART: [kat] --
2,262,710 UART: [warm-reset] ++
2,262,978 UART: [warm-reset] Prev Cold-Reset failed
2,263,985 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,960 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,622 UART: [state] LifecycleState = Production
86,230 UART: [state] DebugLocked = Yes
86,962 UART: [state] Starting the WD Timer 40000000 cycles
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,125 UART: [kat] ++
896,277 UART: [kat] sha1
900,641 UART: [kat] SHA2-256
902,581 UART: [kat] SHA2-384
905,468 UART: [kat] SHA2-512-ACC
907,369 UART: [kat] ECC-384
917,230 UART: [kat] HMAC-384Kdf
921,870 UART: [kat] LMS
1,170,182 UART: [kat] --
1,171,211 UART: [cold-reset] ++
1,171,674 UART: [fht] FHT @ 0x50003400
1,174,378 UART: [idev] ++
1,174,546 UART: [idev] CDI.KEYID = 6
1,174,907 UART: [idev] SUBJECT.KEYID = 7
1,175,332 UART: [idev] UDS.KEYID = 0
1,175,679 writing to cptra_bootfsm_go
1,175,771 UART:
1,175,787 UART: Running Caliptra ROM ...
1,176,195 UART:
1,176,337 UART: [state] CFI Enabled
1,179,098 UART: [state] LifecycleState = Production
1,179,706 UART: [state] DebugLocked = Yes
1,180,392 UART: [state] Starting the WD Timer 40000000 cycles
1,182,057 UART: [kat] SHA2-256
1,985,607 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,989,711 UART: [kat] ++
1,989,863 UART: [kat] sha1
1,994,153 UART: [kat] SHA2-256
1,996,093 UART: [kat] SHA2-384
1,998,698 UART: [kat] SHA2-512-ACC
2,000,599 UART: [kat] ECC-384
2,010,560 UART: [kat] HMAC-384Kdf
2,015,128 UART: [kat] LMS
2,263,440 UART: [kat] --
2,264,482 UART: [warm-reset] ++
2,264,750 UART: [warm-reset] Prev Cold-Reset failed
2,265,917 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,769 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Production
86,061 UART: [state] DebugLocked = Yes
86,665 UART: [state] Starting the WD Timer 40000000 cycles
88,316 UART: [kat] SHA2-256
893,966 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,091 UART: [kat] ++
898,243 UART: [kat] sha1
902,619 UART: [kat] SHA2-256
904,559 UART: [kat] SHA2-384
907,390 UART: [kat] SHA2-512-ACC
909,291 UART: [kat] ECC-384
919,112 UART: [kat] HMAC-384Kdf
923,642 UART: [kat] LMS
1,171,970 UART: [kat] --
1,173,037 UART: [cold-reset] ++
1,173,486 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,177,431 writing to cptra_bootfsm_go
1,177,523 UART:
1,177,539 UART: Running Caliptra ROM ...
1,177,947 UART:
1,178,002 UART: [state] CFI Enabled
1,180,847 UART: [state] LifecycleState = Production
1,181,455 UART: [state] DebugLocked = Yes
1,182,123 UART: [state] Starting the WD Timer 40000000 cycles
1,183,822 UART: [kat] SHA2-256
1,989,472 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,993,597 UART: [kat] ++
1,993,749 UART: [kat] sha1
1,997,955 UART: [kat] SHA2-256
1,999,895 UART: [kat] SHA2-384
2,002,572 UART: [kat] SHA2-512-ACC
2,004,473 UART: [kat] ECC-384
2,014,382 UART: [kat] HMAC-384Kdf
2,018,922 UART: [kat] LMS
2,267,250 UART: [kat] --
2,268,432 UART: [warm-reset] ++
2,268,703 UART: [warm-reset] Prev Cold-Reset failed
2,269,606 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,069 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,628 UART: [state] LifecycleState = Production
86,236 UART: [state] DebugLocked = Yes
86,818 UART: [state] Starting the WD Timer 40000000 cycles
88,285 UART: [kat] SHA2-256
893,935 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,060 UART: [kat] ++
898,212 UART: [kat] sha1
902,466 UART: [kat] SHA2-256
904,406 UART: [kat] SHA2-384
907,085 UART: [kat] SHA2-512-ACC
908,986 UART: [kat] ECC-384
919,039 UART: [kat] HMAC-384Kdf
923,575 UART: [kat] LMS
1,171,903 UART: [kat] --
1,172,798 UART: [cold-reset] ++
1,173,311 UART: [fht] FHT @ 0x50003400
1,175,818 UART: [idev] ++
1,175,986 UART: [idev] CDI.KEYID = 6
1,176,346 UART: [idev] SUBJECT.KEYID = 7
1,176,770 UART: [idev] UDS.KEYID = 0
1,177,116 writing to cptra_bootfsm_go
1,177,208 UART:
1,177,224 UART: Running Caliptra ROM ...
1,177,632 UART:
1,177,774 UART: [state] CFI Enabled
1,180,905 UART: [state] LifecycleState = Production
1,181,513 UART: [state] DebugLocked = Yes
1,182,263 UART: [state] Starting the WD Timer 40000000 cycles
1,183,774 UART: [kat] SHA2-256
1,989,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,993,549 UART: [kat] ++
1,993,701 UART: [kat] sha1
1,998,025 UART: [kat] SHA2-256
1,999,965 UART: [kat] SHA2-384
2,002,606 UART: [kat] SHA2-512-ACC
2,004,507 UART: [kat] ECC-384
2,014,004 UART: [kat] HMAC-384Kdf
2,018,516 UART: [kat] LMS
2,266,844 UART: [kat] --
2,267,790 UART: [warm-reset] ++
2,268,061 UART: [warm-reset] Prev Cold-Reset failed
2,269,158 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,640 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,233 UART:
192,602 UART: Running Caliptra ROM ...
193,707 UART:
193,856 UART: [state] CFI Enabled
260,096 UART: [state] LifecycleState = Unprovisioned
262,065 UART: [state] DebugLocked = No
264,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,100 UART: [kat] SHA2-256
439,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,319 UART: [kat] ++
450,795 UART: [kat] sha1
461,891 UART: [kat] SHA2-256
464,592 UART: [kat] SHA2-384
470,523 UART: [kat] SHA2-512-ACC
472,921 UART: [kat] ECC-384
2,765,087 UART: [kat] HMAC-384Kdf
2,776,976 UART: [kat] LMS
3,967,303 UART: [kat] --
3,969,758 UART: [cold-reset] ++
3,971,853 UART: [fht] Storing FHT @ 0x50003400
3,983,928 UART: [idev] ++
3,984,494 UART: [idev] CDI.KEYID = 6
3,985,411 UART: [idev] SUBJECT.KEYID = 7
3,986,682 UART: [idev] UDS.KEYID = 0
6,583,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,733,635 UART: [idev] Erasing UDS.KEYID = 0
7,318,541 UART: [idev] Using Sha1 for KeyId Algorithm
7,340,278 UART: [idev] --
7,345,455 UART: [ldev] ++
7,346,031 UART: [ldev] CDI.KEYID = 6
7,347,031 UART: [ldev] SUBJECT.KEYID = 5
7,348,139 UART: [ldev] AUTHORITY.KEYID = 7
7,349,489 UART: [ldev] FE.KEYID = 1
7,394,275 UART: [ldev] Erasing FE.KEYID = 1
10,729,664 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,053,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,068,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,282 UART: [ldev] --
13,106,422 UART: [fwproc] Waiting for Commands...
13,108,474 UART: [fwproc] Received command 0x46574c44
13,110,676 UART: [fwproc] Received Image of size 118548 bytes
17,211,177 UART: ROM Fatal Error: 0x000B0016
17,214,664 >>> mbox cmd response: failed
17,215,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,215,448 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
6,398,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,203,689 >>> mbox cmd response: failed
17,204,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,204,839 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,455 writing to cptra_bootfsm_go
192,589 UART:
192,975 UART: Running Caliptra ROM ...
194,150 UART:
603,737 UART: [state] CFI Enabled
617,453 UART: [state] LifecycleState = Unprovisioned
619,425 UART: [state] DebugLocked = No
621,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,790 UART: [kat] SHA2-256
796,548 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,083 UART: [kat] ++
807,567 UART: [kat] sha1
817,802 UART: [kat] SHA2-256
820,490 UART: [kat] SHA2-384
826,530 UART: [kat] SHA2-512-ACC
828,877 UART: [kat] ECC-384
3,109,921 UART: [kat] HMAC-384Kdf
3,121,982 UART: [kat] LMS
4,312,073 UART: [kat] --
4,315,535 UART: [cold-reset] ++
4,316,498 UART: [fht] Storing FHT @ 0x50003400
4,328,391 UART: [idev] ++
4,328,964 UART: [idev] CDI.KEYID = 6
4,329,887 UART: [idev] SUBJECT.KEYID = 7
4,331,105 UART: [idev] UDS.KEYID = 0
6,872,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,023,136 UART: [idev] Erasing UDS.KEYID = 0
7,623,570 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,095 UART: [idev] --
7,649,853 UART: [ldev] ++
7,650,442 UART: [ldev] CDI.KEYID = 6
7,651,338 UART: [ldev] SUBJECT.KEYID = 5
7,652,624 UART: [ldev] AUTHORITY.KEYID = 7
7,653,889 UART: [ldev] FE.KEYID = 1
7,664,196 UART: [ldev] Erasing FE.KEYID = 1
10,949,586 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,770 UART: [ldev] --
13,308,768 UART: [fwproc] Waiting for Commands...
13,312,062 UART: [fwproc] Received command 0x46574c44
13,314,258 UART: [fwproc] Received Image of size 118548 bytes
17,422,647 UART: ROM Fatal Error: 0x000B0016
17,426,109 >>> mbox cmd response: failed
17,426,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,426,850 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
6,716,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,388,629 >>> mbox cmd response: failed
17,389,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,389,776 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,205 UART:
192,596 UART: Running Caliptra ROM ...
193,785 UART:
193,940 UART: [state] CFI Enabled
264,014 UART: [state] LifecycleState = Unprovisioned
265,928 UART: [state] DebugLocked = No
267,683 UART: [state] WD Timer not started. Device not locked for debugging
272,219 UART: [kat] SHA2-256
451,867 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,671 UART: [kat] ++
463,130 UART: [kat] sha1
474,983 UART: [kat] SHA2-256
477,677 UART: [kat] SHA2-384
484,145 UART: [kat] SHA2-512-ACC
486,535 UART: [kat] ECC-384
2,947,197 UART: [kat] HMAC-384Kdf
2,969,816 UART: [kat] LMS
3,446,359 UART: [kat] --
3,449,702 UART: [cold-reset] ++
3,450,677 UART: [fht] FHT @ 0x50003400
3,462,309 UART: [idev] ++
3,462,878 UART: [idev] CDI.KEYID = 6
3,463,901 UART: [idev] SUBJECT.KEYID = 7
3,465,120 UART: [idev] UDS.KEYID = 0
5,962,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,112,333 UART: [idev] Erasing UDS.KEYID = 0
6,113,776 UART: [idev] Sha1 KeyId Algorithm
6,114,941 UART: [idev] --
6,115,428 UART: [ldev] ++
6,115,908 UART: [ldev] CDI.KEYID = 6
6,116,879 UART: [ldev] SUBJECT.KEYID = 5
6,117,911 UART: [ldev] AUTHORITY.KEYID = 7
6,119,007 UART: [ldev] FE.KEYID = 1
6,119,855 UART: [ldev] Erasing FE.KEYID = 1
8,567,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,292 UART: [ldev] --
10,375,340 UART: [fwproc] Wait for Commands...
10,376,906 UART: [fwproc] Recv command 0x46574c44
10,378,958 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,303 UART: ROM Fatal Error: 0x000B0016
13,866,540 >>> mbox cmd response: failed
13,866,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,867,208 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,601 writing to cptra_bootfsm_go
5,951,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,764,789 >>> mbox cmd response: failed
13,765,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,765,813 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
192,639 UART:
193,023 UART: Running Caliptra ROM ...
194,216 UART:
603,832 UART: [state] CFI Enabled
614,035 UART: [state] LifecycleState = Unprovisioned
615,953 UART: [state] DebugLocked = No
617,654 UART: [state] WD Timer not started. Device not locked for debugging
620,711 UART: [kat] SHA2-256
800,402 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
811,157 UART: [kat] ++
811,637 UART: [kat] sha1
823,763 UART: [kat] SHA2-256
826,438 UART: [kat] SHA2-384
830,813 UART: [kat] SHA2-512-ACC
833,154 UART: [kat] ECC-384
3,276,208 UART: [kat] HMAC-384Kdf
3,287,465 UART: [kat] LMS
3,763,954 UART: [kat] --
3,768,866 UART: [cold-reset] ++
3,770,907 UART: [fht] FHT @ 0x50003400
3,782,217 UART: [idev] ++
3,782,823 UART: [idev] CDI.KEYID = 6
3,783,779 UART: [idev] SUBJECT.KEYID = 7
3,784,997 UART: [idev] UDS.KEYID = 0
6,274,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,424,668 UART: [idev] Erasing UDS.KEYID = 0
6,426,140 UART: [idev] Sha1 KeyId Algorithm
6,427,392 UART: [idev] --
6,427,893 UART: [ldev] ++
6,428,372 UART: [ldev] CDI.KEYID = 6
6,429,278 UART: [ldev] SUBJECT.KEYID = 5
6,430,391 UART: [ldev] AUTHORITY.KEYID = 7
6,431,574 UART: [ldev] FE.KEYID = 1
6,432,426 UART: [ldev] Erasing FE.KEYID = 1
8,780,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,905 UART: [ldev] --
10,575,663 UART: [fwproc] Wait for Commands...
10,578,589 UART: [fwproc] Recv command 0x46574c44
10,580,624 UART: [fwproc] Recv'd Img size: 118548 bytes
14,062,791 UART: ROM Fatal Error: 0x000B0016
14,066,037 >>> mbox cmd response: failed
14,066,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,067,095 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,035 writing to cptra_bootfsm_go
6,263,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,974,678 >>> mbox cmd response: failed
13,975,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,975,691 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
192,204 UART:
192,571 UART: Running Caliptra ROM ...
193,751 UART:
193,908 UART: [state] CFI Enabled
262,523 UART: [state] LifecycleState = Unprovisioned
264,913 UART: [state] DebugLocked = No
267,218 UART: [state] WD Timer not started. Device not locked for debugging
272,612 UART: [kat] SHA2-256
462,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,251 UART: [kat] ++
473,738 UART: [kat] sha1
485,485 UART: [kat] SHA2-256
488,546 UART: [kat] SHA2-384
494,477 UART: [kat] SHA2-512-ACC
497,068 UART: [kat] ECC-384
2,946,842 UART: [kat] HMAC-384Kdf
2,971,746 UART: [kat] LMS
3,503,541 UART: [kat] --
3,510,444 UART: [cold-reset] ++
3,511,894 UART: [fht] FHT @ 0x50003400
3,524,725 UART: [idev] ++
3,525,411 UART: [idev] CDI.KEYID = 6
3,526,382 UART: [idev] SUBJECT.KEYID = 7
3,527,551 UART: [idev] UDS.KEYID = 0
6,058,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,208,752 UART: [idev] Erasing UDS.KEYID = 0
6,210,206 UART: [idev] Sha1 KeyId Algorithm
6,211,451 UART: [idev] --
6,211,946 UART: [ldev] ++
6,212,435 UART: [ldev] CDI.KEYID = 6
6,213,400 UART: [ldev] SUBJECT.KEYID = 5
6,214,514 UART: [ldev] AUTHORITY.KEYID = 7
6,215,693 UART: [ldev] FE.KEYID = 1
6,216,546 UART: [ldev] Erasing FE.KEYID = 1
8,609,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,307 UART: [ldev] --
10,415,741 UART: [fwproc] Wait for Commands...
10,417,277 UART: [fwproc] Recv command 0x46574c44
10,419,548 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,423 UART: ROM Fatal Error: 0x000B0016
13,911,100 >>> mbox cmd response: failed
13,911,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,911,923 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
5,969,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,355,350 >>> mbox cmd response: failed
14,355,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,356,318 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,454 writing to cptra_bootfsm_go
192,617 UART:
193,015 UART: Running Caliptra ROM ...
194,138 UART:
603,832 UART: [state] CFI Enabled
617,874 UART: [state] LifecycleState = Unprovisioned
620,237 UART: [state] DebugLocked = No
622,082 UART: [state] WD Timer not started. Device not locked for debugging
626,559 UART: [kat] SHA2-256
816,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,206 UART: [kat] ++
827,734 UART: [kat] sha1
838,290 UART: [kat] SHA2-256
841,312 UART: [kat] SHA2-384
847,358 UART: [kat] SHA2-512-ACC
849,988 UART: [kat] ECC-384
3,292,469 UART: [kat] HMAC-384Kdf
3,305,263 UART: [kat] LMS
3,837,134 UART: [kat] --
3,840,132 UART: [cold-reset] ++
3,841,703 UART: [fht] FHT @ 0x50003400
3,853,288 UART: [idev] ++
3,853,981 UART: [idev] CDI.KEYID = 6
3,854,954 UART: [idev] SUBJECT.KEYID = 7
3,856,178 UART: [idev] UDS.KEYID = 0
6,396,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,546,027 UART: [idev] Erasing UDS.KEYID = 0
6,547,488 UART: [idev] Sha1 KeyId Algorithm
6,548,663 UART: [idev] --
6,549,177 UART: [ldev] ++
6,549,661 UART: [ldev] CDI.KEYID = 6
6,550,634 UART: [ldev] SUBJECT.KEYID = 5
6,551,669 UART: [ldev] AUTHORITY.KEYID = 7
6,552,766 UART: [ldev] FE.KEYID = 1
6,553,653 UART: [ldev] Erasing FE.KEYID = 1
8,856,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,237 UART: [ldev] --
10,648,806 UART: [fwproc] Wait for Commands...
10,650,586 UART: [fwproc] Recv command 0x46574c44
10,652,858 UART: [fwproc] Recv'd Img size: 118548 bytes
14,142,636 UART: ROM Fatal Error: 0x000B0016
14,146,284 >>> mbox cmd response: failed
14,146,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,147,067 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
6,294,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,576,839 >>> mbox cmd response: failed
14,577,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,577,950 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,835 UART: [kat] SHA2-256
881,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,881 UART: [kat] ++
886,033 UART: [kat] sha1
890,297 UART: [kat] SHA2-256
892,235 UART: [kat] SHA2-384
895,024 UART: [kat] SHA2-512-ACC
896,925 UART: [kat] ECC-384
902,352 UART: [kat] HMAC-384Kdf
907,136 UART: [kat] LMS
1,475,332 UART: [kat] --
1,476,013 UART: [cold-reset] ++
1,476,361 UART: [fht] Storing FHT @ 0x50003400
1,479,224 UART: [idev] ++
1,479,392 UART: [idev] CDI.KEYID = 6
1,479,752 UART: [idev] SUBJECT.KEYID = 7
1,480,176 UART: [idev] UDS.KEYID = 0
1,480,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,972 UART: [idev] Erasing UDS.KEYID = 0
1,504,754 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,560 UART: [idev] --
1,514,547 UART: [ldev] ++
1,514,715 UART: [ldev] CDI.KEYID = 6
1,515,078 UART: [ldev] SUBJECT.KEYID = 5
1,515,504 UART: [ldev] AUTHORITY.KEYID = 7
1,515,967 UART: [ldev] FE.KEYID = 1
1,520,897 UART: [ldev] Erasing FE.KEYID = 1
1,546,564 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,422 UART: [ldev] --
1,585,735 UART: [fwproc] Waiting for Commands...
1,586,558 UART: [fwproc] Received command 0x46574c44
1,587,349 UART: [fwproc] Received Image of size 118548 bytes
2,931,513 UART: ROM Fatal Error: 0x000B0016
2,932,670 >>> mbox cmd response: failed
2,932,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,676 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,784,167 >>> mbox cmd response: failed
2,784,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,173 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,084 UART: [kat] SHA2-256
882,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,130 UART: [kat] ++
886,282 UART: [kat] sha1
890,626 UART: [kat] SHA2-256
892,564 UART: [kat] SHA2-384
895,297 UART: [kat] SHA2-512-ACC
897,198 UART: [kat] ECC-384
902,751 UART: [kat] HMAC-384Kdf
907,589 UART: [kat] LMS
1,475,785 UART: [kat] --
1,476,542 UART: [cold-reset] ++
1,477,070 UART: [fht] Storing FHT @ 0x50003400
1,479,837 UART: [idev] ++
1,480,005 UART: [idev] CDI.KEYID = 6
1,480,365 UART: [idev] SUBJECT.KEYID = 7
1,480,789 UART: [idev] UDS.KEYID = 0
1,481,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,975 UART: [idev] Erasing UDS.KEYID = 0
1,505,605 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,139 UART: [idev] --
1,515,388 UART: [ldev] ++
1,515,556 UART: [ldev] CDI.KEYID = 6
1,515,919 UART: [ldev] SUBJECT.KEYID = 5
1,516,345 UART: [ldev] AUTHORITY.KEYID = 7
1,516,808 UART: [ldev] FE.KEYID = 1
1,521,996 UART: [ldev] Erasing FE.KEYID = 1
1,547,065 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,861 UART: [ldev] --
1,586,304 UART: [fwproc] Waiting for Commands...
1,587,085 UART: [fwproc] Received command 0x46574c44
1,587,876 UART: [fwproc] Received Image of size 118548 bytes
2,931,734 UART: ROM Fatal Error: 0x000B0016
2,932,891 >>> mbox cmd response: failed
2,932,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,897 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,783,626 >>> mbox cmd response: failed
2,783,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,632 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,440 UART: [kat] ++
895,592 UART: [kat] sha1
899,664 UART: [kat] SHA2-256
901,604 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
916,293 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,170,162 UART: [cold-reset] ++
1,170,592 UART: [fht] FHT @ 0x50003400
1,173,382 UART: [idev] ++
1,173,550 UART: [idev] CDI.KEYID = 6
1,173,911 UART: [idev] SUBJECT.KEYID = 7
1,174,336 UART: [idev] UDS.KEYID = 0
1,174,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,105 UART: [idev] Erasing UDS.KEYID = 0
1,199,369 UART: [idev] Sha1 KeyId Algorithm
1,208,413 UART: [idev] --
1,209,524 UART: [ldev] ++
1,209,692 UART: [ldev] CDI.KEYID = 6
1,210,056 UART: [ldev] SUBJECT.KEYID = 5
1,210,483 UART: [ldev] AUTHORITY.KEYID = 7
1,210,946 UART: [ldev] FE.KEYID = 1
1,216,196 UART: [ldev] Erasing FE.KEYID = 1
1,242,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,952 UART: [ldev] --
1,281,379 UART: [fwproc] Wait for Commands...
1,281,994 UART: [fwproc] Recv command 0x46574c44
1,282,727 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,918 UART: ROM Fatal Error: 0x000B0016
2,628,075 >>> mbox cmd response: failed
2,628,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,081 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,696 >>> mbox cmd response: failed
2,480,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,480,702 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,807 UART: [state] LifecycleState = Unprovisioned
85,462 UART: [state] DebugLocked = No
85,980 UART: [state] WD Timer not started. Device not locked for debugging
87,165 UART: [kat] SHA2-256
890,715 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,819 UART: [kat] ++
894,971 UART: [kat] sha1
898,993 UART: [kat] SHA2-256
900,933 UART: [kat] SHA2-384
903,798 UART: [kat] SHA2-512-ACC
905,699 UART: [kat] ECC-384
915,512 UART: [kat] HMAC-384Kdf
920,076 UART: [kat] LMS
1,168,388 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,169,945 UART: [fht] FHT @ 0x50003400
1,172,667 UART: [idev] ++
1,172,835 UART: [idev] CDI.KEYID = 6
1,173,196 UART: [idev] SUBJECT.KEYID = 7
1,173,621 UART: [idev] UDS.KEYID = 0
1,173,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,488 UART: [idev] Erasing UDS.KEYID = 0
1,198,218 UART: [idev] Sha1 KeyId Algorithm
1,206,866 UART: [idev] --
1,207,921 UART: [ldev] ++
1,208,089 UART: [ldev] CDI.KEYID = 6
1,208,453 UART: [ldev] SUBJECT.KEYID = 5
1,208,880 UART: [ldev] AUTHORITY.KEYID = 7
1,209,343 UART: [ldev] FE.KEYID = 1
1,214,789 UART: [ldev] Erasing FE.KEYID = 1
1,241,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,817 UART: [ldev] --
1,281,256 UART: [fwproc] Wait for Commands...
1,282,013 UART: [fwproc] Recv command 0x46574c44
1,282,746 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,447 UART: ROM Fatal Error: 0x000B0016
2,627,604 >>> mbox cmd response: failed
2,627,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,610 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,161 >>> mbox cmd response: failed
2,483,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,167 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Unprovisioned
86,097 UART: [state] DebugLocked = No
86,817 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
893,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,725 UART: [kat] ++
897,877 UART: [kat] sha1
902,047 UART: [kat] SHA2-256
903,987 UART: [kat] SHA2-384
906,764 UART: [kat] SHA2-512-ACC
908,665 UART: [kat] ECC-384
918,330 UART: [kat] HMAC-384Kdf
922,806 UART: [kat] LMS
1,171,134 UART: [kat] --
1,172,085 UART: [cold-reset] ++
1,172,661 UART: [fht] FHT @ 0x50003400
1,175,340 UART: [idev] ++
1,175,508 UART: [idev] CDI.KEYID = 6
1,175,868 UART: [idev] SUBJECT.KEYID = 7
1,176,292 UART: [idev] UDS.KEYID = 0
1,176,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,252 UART: [idev] Erasing UDS.KEYID = 0
1,201,321 UART: [idev] Sha1 KeyId Algorithm
1,209,783 UART: [idev] --
1,210,647 UART: [ldev] ++
1,210,815 UART: [ldev] CDI.KEYID = 6
1,211,178 UART: [ldev] SUBJECT.KEYID = 5
1,211,604 UART: [ldev] AUTHORITY.KEYID = 7
1,212,067 UART: [ldev] FE.KEYID = 1
1,217,153 UART: [ldev] Erasing FE.KEYID = 1
1,244,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,671 UART: [ldev] --
1,282,988 UART: [fwproc] Wait for Commands...
1,283,802 UART: [fwproc] Recv command 0x46574c44
1,284,530 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,354 UART: ROM Fatal Error: 0x000B0016
2,629,511 >>> mbox cmd response: failed
2,629,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,517 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,818 >>> mbox cmd response: failed
2,480,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,480,824 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
893,567 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,692 UART: [kat] ++
897,844 UART: [kat] sha1
901,890 UART: [kat] SHA2-256
903,830 UART: [kat] SHA2-384
906,599 UART: [kat] SHA2-512-ACC
908,500 UART: [kat] ECC-384
918,435 UART: [kat] HMAC-384Kdf
923,247 UART: [kat] LMS
1,171,575 UART: [kat] --
1,172,610 UART: [cold-reset] ++
1,173,174 UART: [fht] FHT @ 0x50003400
1,175,917 UART: [idev] ++
1,176,085 UART: [idev] CDI.KEYID = 6
1,176,445 UART: [idev] SUBJECT.KEYID = 7
1,176,869 UART: [idev] UDS.KEYID = 0
1,177,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,929 UART: [idev] Erasing UDS.KEYID = 0
1,202,680 UART: [idev] Sha1 KeyId Algorithm
1,211,184 UART: [idev] --
1,212,244 UART: [ldev] ++
1,212,412 UART: [ldev] CDI.KEYID = 6
1,212,775 UART: [ldev] SUBJECT.KEYID = 5
1,213,201 UART: [ldev] AUTHORITY.KEYID = 7
1,213,664 UART: [ldev] FE.KEYID = 1
1,218,958 UART: [ldev] Erasing FE.KEYID = 1
1,245,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,248 UART: [ldev] --
1,284,583 UART: [fwproc] Wait for Commands...
1,285,219 UART: [fwproc] Recv command 0x46574c44
1,285,947 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,787 UART: ROM Fatal Error: 0x000B0016
2,630,944 >>> mbox cmd response: failed
2,630,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,950 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,929 >>> mbox cmd response: failed
2,483,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,935 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,818 writing to cptra_bootfsm_go
192,967 UART:
193,328 UART: Running Caliptra ROM ...
194,413 UART:
194,559 UART: [state] CFI Enabled
267,340 UART: [state] LifecycleState = Production
269,173 UART: [state] DebugLocked = No
271,555 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,953 UART: [kat] SHA2-256
445,677 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,196 UART: [kat] ++
456,737 UART: [kat] sha1
468,345 UART: [kat] SHA2-256
471,038 UART: [kat] SHA2-384
477,133 UART: [kat] SHA2-512-ACC
479,473 UART: [kat] ECC-384
2,768,927 UART: [kat] HMAC-384Kdf
2,801,301 UART: [kat] LMS
3,991,444 UART: [kat] --
3,996,153 UART: [cold-reset] ++
3,998,141 UART: [fht] Storing FHT @ 0x50003400
4,010,077 UART: [idev] ++
4,010,691 UART: [idev] CDI.KEYID = 6
4,011,586 UART: [idev] SUBJECT.KEYID = 7
4,012,813 UART: [idev] UDS.KEYID = 0
4,016,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,165,322 UART: [idev] Erasing UDS.KEYID = 0
7,347,948 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,542 UART: [idev] --
7,375,195 UART: [ldev] ++
7,375,777 UART: [ldev] CDI.KEYID = 6
7,376,767 UART: [ldev] SUBJECT.KEYID = 5
7,377,986 UART: [ldev] AUTHORITY.KEYID = 7
7,379,171 UART: [ldev] FE.KEYID = 1
7,425,131 UART: [ldev] Erasing FE.KEYID = 1
10,758,263 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,457 UART: [ldev] --
13,118,750 UART: [fwproc] Waiting for Commands...
13,120,960 UART: [fwproc] Received command 0x46574c44
13,123,260 UART: [fwproc] Received Image of size 118548 bytes
13,221,418 UART: ROM Fatal Error: 0x000B0007
13,224,905 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,787,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,964,178 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,439 UART:
192,985 UART: Running Caliptra ROM ...
194,102 UART:
603,571 UART: [state] CFI Enabled
620,996 UART: [state] LifecycleState = Production
622,775 UART: [state] DebugLocked = No
624,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,010 UART: [kat] SHA2-256
798,714 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,242 UART: [kat] ++
809,834 UART: [kat] sha1
819,969 UART: [kat] SHA2-256
822,657 UART: [kat] SHA2-384
828,853 UART: [kat] SHA2-512-ACC
831,228 UART: [kat] ECC-384
3,117,305 UART: [kat] HMAC-384Kdf
3,128,469 UART: [kat] LMS
4,318,591 UART: [kat] --
4,323,556 UART: [cold-reset] ++
4,325,989 UART: [fht] Storing FHT @ 0x50003400
4,337,643 UART: [idev] ++
4,338,217 UART: [idev] CDI.KEYID = 6
4,339,274 UART: [idev] SUBJECT.KEYID = 7
4,340,403 UART: [idev] UDS.KEYID = 0
4,343,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,493,628 UART: [idev] Erasing UDS.KEYID = 0
7,625,820 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,446 UART: [idev] --
7,650,015 UART: [ldev] ++
7,650,595 UART: [ldev] CDI.KEYID = 6
7,651,619 UART: [ldev] SUBJECT.KEYID = 5
7,652,787 UART: [ldev] AUTHORITY.KEYID = 7
7,654,025 UART: [ldev] FE.KEYID = 1
7,665,600 UART: [ldev] Erasing FE.KEYID = 1
10,954,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,491 UART: [ldev] --
13,311,399 UART: [fwproc] Waiting for Commands...
13,313,890 UART: [fwproc] Received command 0x46574c44
13,316,139 UART: [fwproc] Received Image of size 118548 bytes
13,417,383 UART: ROM Fatal Error: 0x000B0007
13,420,897 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
4,121,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,157,708 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,101 UART:
192,468 UART: Running Caliptra ROM ...
193,664 UART:
193,830 UART: [state] CFI Enabled
263,230 UART: [state] LifecycleState = Production
265,049 UART: [state] DebugLocked = No
267,042 UART: [state] WD Timer not started. Device not locked for debugging
270,297 UART: [kat] SHA2-256
449,937 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,749 UART: [kat] ++
461,209 UART: [kat] sha1
471,498 UART: [kat] SHA2-256
474,185 UART: [kat] SHA2-384
479,733 UART: [kat] SHA2-512-ACC
482,082 UART: [kat] ECC-384
2,930,349 UART: [kat] HMAC-384Kdf
2,952,143 UART: [kat] LMS
3,428,641 UART: [kat] --
3,432,446 UART: [cold-reset] ++
3,433,737 UART: [fht] FHT @ 0x50003400
3,445,604 UART: [idev] ++
3,446,185 UART: [idev] CDI.KEYID = 6
3,447,161 UART: [idev] SUBJECT.KEYID = 7
3,448,379 UART: [idev] UDS.KEYID = 0
3,451,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,600,811 UART: [idev] Erasing UDS.KEYID = 0
5,967,081 UART: [idev] Sha1 KeyId Algorithm
5,990,376 UART: [idev] --
5,995,455 UART: [ldev] ++
5,996,038 UART: [ldev] CDI.KEYID = 6
5,996,959 UART: [ldev] SUBJECT.KEYID = 5
5,998,179 UART: [ldev] AUTHORITY.KEYID = 7
5,999,416 UART: [ldev] FE.KEYID = 1
6,037,242 UART: [ldev] Erasing FE.KEYID = 1
8,545,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,632 UART: [ldev] --
10,356,509 UART: [fwproc] Wait for Commands...
10,358,459 UART: [fwproc] Recv command 0x46574c44
10,360,452 UART: [fwproc] Recv'd Img size: 118548 bytes
10,473,888 UART: ROM Fatal Error: 0x000B0007
10,477,131 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,466,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,369,636 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,520 writing to cptra_bootfsm_go
192,788 UART:
193,141 UART: Running Caliptra ROM ...
194,335 UART:
604,125 UART: [state] CFI Enabled
614,611 UART: [state] LifecycleState = Production
616,547 UART: [state] DebugLocked = No
618,366 UART: [state] WD Timer not started. Device not locked for debugging
621,322 UART: [kat] SHA2-256
800,969 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
811,793 UART: [kat] ++
812,331 UART: [kat] sha1
824,625 UART: [kat] SHA2-256
827,315 UART: [kat] SHA2-384
834,485 UART: [kat] SHA2-512-ACC
836,833 UART: [kat] ECC-384
3,275,952 UART: [kat] HMAC-384Kdf
3,287,128 UART: [kat] LMS
3,763,675 UART: [kat] --
3,768,833 UART: [cold-reset] ++
3,770,126 UART: [fht] FHT @ 0x50003400
3,781,434 UART: [idev] ++
3,782,013 UART: [idev] CDI.KEYID = 6
3,783,043 UART: [idev] SUBJECT.KEYID = 7
3,784,232 UART: [idev] UDS.KEYID = 0
3,787,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,195 UART: [idev] Erasing UDS.KEYID = 0
6,263,981 UART: [idev] Sha1 KeyId Algorithm
6,288,404 UART: [idev] --
6,295,050 UART: [ldev] ++
6,295,628 UART: [ldev] CDI.KEYID = 6
6,296,718 UART: [ldev] SUBJECT.KEYID = 5
6,297,843 UART: [ldev] AUTHORITY.KEYID = 7
6,299,032 UART: [ldev] FE.KEYID = 1
6,309,990 UART: [ldev] Erasing FE.KEYID = 1
8,790,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,119 UART: [ldev] --
10,582,880 UART: [fwproc] Wait for Commands...
10,584,600 UART: [fwproc] Recv command 0x46574c44
10,586,594 UART: [fwproc] Recv'd Img size: 118548 bytes
10,701,011 UART: ROM Fatal Error: 0x000B0007
10,704,266 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,784,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,593,197 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
192,294 UART:
192,661 UART: Running Caliptra ROM ...
193,868 UART:
194,025 UART: [state] CFI Enabled
263,360 UART: [state] LifecycleState = Production
265,830 UART: [state] DebugLocked = No
268,152 UART: [state] WD Timer not started. Device not locked for debugging
273,359 UART: [kat] SHA2-256
463,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,041 UART: [kat] ++
474,506 UART: [kat] sha1
486,281 UART: [kat] SHA2-256
489,297 UART: [kat] SHA2-384
495,716 UART: [kat] SHA2-512-ACC
498,308 UART: [kat] ECC-384
2,950,501 UART: [kat] HMAC-384Kdf
2,972,893 UART: [kat] LMS
3,504,633 UART: [kat] --
3,508,688 UART: [cold-reset] ++
3,511,222 UART: [fht] FHT @ 0x50003400
3,524,048 UART: [idev] ++
3,524,735 UART: [idev] CDI.KEYID = 6
3,525,759 UART: [idev] SUBJECT.KEYID = 7
3,526,926 UART: [idev] UDS.KEYID = 0
3,529,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,972 UART: [idev] Erasing UDS.KEYID = 0
6,025,227 UART: [idev] Sha1 KeyId Algorithm
6,047,897 UART: [idev] --
6,052,443 UART: [ldev] ++
6,053,140 UART: [ldev] CDI.KEYID = 6
6,054,052 UART: [ldev] SUBJECT.KEYID = 5
6,055,222 UART: [ldev] AUTHORITY.KEYID = 7
6,056,467 UART: [ldev] FE.KEYID = 1
6,100,990 UART: [ldev] Erasing FE.KEYID = 1
8,607,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,954 UART: [ldev] --
10,414,086 UART: [fwproc] Wait for Commands...
10,415,934 UART: [fwproc] Recv command 0x46574c44
10,418,197 UART: [fwproc] Recv'd Img size: 118548 bytes
10,551,835 UART: ROM Fatal Error: 0x000B0007
10,555,482 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,440,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,375,264 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,456 UART:
192,838 UART: Running Caliptra ROM ...
193,937 UART:
603,497 UART: [state] CFI Enabled
618,788 UART: [state] LifecycleState = Production
621,047 UART: [state] DebugLocked = No
623,572 UART: [state] WD Timer not started. Device not locked for debugging
627,478 UART: [kat] SHA2-256
817,385 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,154 UART: [kat] ++
828,660 UART: [kat] sha1
841,168 UART: [kat] SHA2-256
844,182 UART: [kat] SHA2-384
850,546 UART: [kat] SHA2-512-ACC
853,110 UART: [kat] ECC-384
3,294,676 UART: [kat] HMAC-384Kdf
3,306,999 UART: [kat] LMS
3,838,820 UART: [kat] --
3,843,521 UART: [cold-reset] ++
3,844,830 UART: [fht] FHT @ 0x50003400
3,855,508 UART: [idev] ++
3,856,190 UART: [idev] CDI.KEYID = 6
3,857,176 UART: [idev] SUBJECT.KEYID = 7
3,858,279 UART: [idev] UDS.KEYID = 0
3,861,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,520 UART: [idev] Erasing UDS.KEYID = 0
6,337,138 UART: [idev] Sha1 KeyId Algorithm
6,359,436 UART: [idev] --
6,365,125 UART: [ldev] ++
6,365,817 UART: [ldev] CDI.KEYID = 6
6,366,736 UART: [ldev] SUBJECT.KEYID = 5
6,367,929 UART: [ldev] AUTHORITY.KEYID = 7
6,369,115 UART: [ldev] FE.KEYID = 1
6,379,441 UART: [ldev] Erasing FE.KEYID = 1
8,859,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,565 UART: [ldev] --
10,650,629 UART: [fwproc] Wait for Commands...
10,653,013 UART: [fwproc] Recv command 0x46574c44
10,655,291 UART: [fwproc] Recv'd Img size: 118548 bytes
10,788,589 UART: ROM Fatal Error: 0x000B0007
10,792,237 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
3,762,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,582,125 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Production
85,517 UART: [state] DebugLocked = No
86,079 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,665 UART: [kat] SHA2-256
881,596 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,711 UART: [kat] ++
885,863 UART: [kat] sha1
890,017 UART: [kat] SHA2-256
891,955 UART: [kat] SHA2-384
894,578 UART: [kat] SHA2-512-ACC
896,479 UART: [kat] ECC-384
901,914 UART: [kat] HMAC-384Kdf
906,658 UART: [kat] LMS
1,474,854 UART: [kat] --
1,475,859 UART: [cold-reset] ++
1,476,431 UART: [fht] Storing FHT @ 0x50003400
1,479,210 UART: [idev] ++
1,479,378 UART: [idev] CDI.KEYID = 6
1,479,738 UART: [idev] SUBJECT.KEYID = 7
1,480,162 UART: [idev] UDS.KEYID = 0
1,480,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,014 UART: [idev] Erasing UDS.KEYID = 0
1,504,656 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,324 UART: [idev] --
1,514,319 UART: [ldev] ++
1,514,487 UART: [ldev] CDI.KEYID = 6
1,514,850 UART: [ldev] SUBJECT.KEYID = 5
1,515,276 UART: [ldev] AUTHORITY.KEYID = 7
1,515,739 UART: [ldev] FE.KEYID = 1
1,521,011 UART: [ldev] Erasing FE.KEYID = 1
1,546,286 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,464 UART: [ldev] --
1,585,765 UART: [fwproc] Waiting for Commands...
1,586,408 UART: [fwproc] Received command 0x46574c44
1,587,199 UART: [fwproc] Received Image of size 118548 bytes
1,636,726 UART: ROM Fatal Error: 0x000B0007
1,637,883 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,784 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Production
85,868 UART: [state] DebugLocked = No
86,482 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,000 UART: [kat] SHA2-256
881,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,046 UART: [kat] ++
886,198 UART: [kat] sha1
890,314 UART: [kat] SHA2-256
892,252 UART: [kat] SHA2-384
895,153 UART: [kat] SHA2-512-ACC
897,054 UART: [kat] ECC-384
902,717 UART: [kat] HMAC-384Kdf
907,345 UART: [kat] LMS
1,475,541 UART: [kat] --
1,476,140 UART: [cold-reset] ++
1,476,694 UART: [fht] Storing FHT @ 0x50003400
1,479,313 UART: [idev] ++
1,479,481 UART: [idev] CDI.KEYID = 6
1,479,841 UART: [idev] SUBJECT.KEYID = 7
1,480,265 UART: [idev] UDS.KEYID = 0
1,480,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,187 UART: [idev] Erasing UDS.KEYID = 0
1,504,521 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,259 UART: [idev] --
1,514,238 UART: [ldev] ++
1,514,406 UART: [ldev] CDI.KEYID = 6
1,514,769 UART: [ldev] SUBJECT.KEYID = 5
1,515,195 UART: [ldev] AUTHORITY.KEYID = 7
1,515,658 UART: [ldev] FE.KEYID = 1
1,520,806 UART: [ldev] Erasing FE.KEYID = 1
1,546,299 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,387 UART: [ldev] --
1,585,884 UART: [fwproc] Waiting for Commands...
1,586,655 UART: [fwproc] Received command 0x46574c44
1,587,446 UART: [fwproc] Received Image of size 118548 bytes
1,636,959 UART: ROM Fatal Error: 0x000B0007
1,638,116 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,491,785 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Production
86,135 UART: [state] DebugLocked = No
86,865 UART: [state] WD Timer not started. Device not locked for debugging
88,198 UART: [kat] SHA2-256
891,748 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,212 UART: [kat] SHA2-256
902,152 UART: [kat] SHA2-384
904,785 UART: [kat] SHA2-512-ACC
906,686 UART: [kat] ECC-384
916,465 UART: [kat] HMAC-384Kdf
921,089 UART: [kat] LMS
1,169,401 UART: [kat] --
1,170,344 UART: [cold-reset] ++
1,170,704 UART: [fht] FHT @ 0x50003400
1,173,382 UART: [idev] ++
1,173,550 UART: [idev] CDI.KEYID = 6
1,173,911 UART: [idev] SUBJECT.KEYID = 7
1,174,336 UART: [idev] UDS.KEYID = 0
1,174,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,441 UART: [idev] Erasing UDS.KEYID = 0
1,199,075 UART: [idev] Sha1 KeyId Algorithm
1,207,849 UART: [idev] --
1,208,686 UART: [ldev] ++
1,208,854 UART: [ldev] CDI.KEYID = 6
1,209,218 UART: [ldev] SUBJECT.KEYID = 5
1,209,645 UART: [ldev] AUTHORITY.KEYID = 7
1,210,108 UART: [ldev] FE.KEYID = 1
1,215,328 UART: [ldev] Erasing FE.KEYID = 1
1,242,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,340 UART: [ldev] --
1,281,739 UART: [fwproc] Wait for Commands...
1,282,364 UART: [fwproc] Recv command 0x46574c44
1,283,097 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,215 UART: ROM Fatal Error: 0x000B0007
1,333,372 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,321 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Production
85,880 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,697 UART: [kat] SHA2-256
901,637 UART: [kat] SHA2-384
904,466 UART: [kat] SHA2-512-ACC
906,367 UART: [kat] ECC-384
915,718 UART: [kat] HMAC-384Kdf
920,298 UART: [kat] LMS
1,168,610 UART: [kat] --
1,169,583 UART: [cold-reset] ++
1,169,959 UART: [fht] FHT @ 0x50003400
1,172,639 UART: [idev] ++
1,172,807 UART: [idev] CDI.KEYID = 6
1,173,168 UART: [idev] SUBJECT.KEYID = 7
1,173,593 UART: [idev] UDS.KEYID = 0
1,173,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,052 UART: [idev] Erasing UDS.KEYID = 0
1,198,616 UART: [idev] Sha1 KeyId Algorithm
1,207,532 UART: [idev] --
1,208,621 UART: [ldev] ++
1,208,789 UART: [ldev] CDI.KEYID = 6
1,209,153 UART: [ldev] SUBJECT.KEYID = 5
1,209,580 UART: [ldev] AUTHORITY.KEYID = 7
1,210,043 UART: [ldev] FE.KEYID = 1
1,215,507 UART: [ldev] Erasing FE.KEYID = 1
1,242,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,261 UART: [ldev] --
1,281,572 UART: [fwproc] Wait for Commands...
1,282,223 UART: [fwproc] Recv command 0x46574c44
1,282,956 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,262 UART: ROM Fatal Error: 0x000B0007
1,333,419 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,658 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Production
85,669 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
893,032 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,157 UART: [kat] ++
897,309 UART: [kat] sha1
901,685 UART: [kat] SHA2-256
903,625 UART: [kat] SHA2-384
906,338 UART: [kat] SHA2-512-ACC
908,239 UART: [kat] ECC-384
917,448 UART: [kat] HMAC-384Kdf
922,086 UART: [kat] LMS
1,170,414 UART: [kat] --
1,171,243 UART: [cold-reset] ++
1,171,687 UART: [fht] FHT @ 0x50003400
1,174,264 UART: [idev] ++
1,174,432 UART: [idev] CDI.KEYID = 6
1,174,792 UART: [idev] SUBJECT.KEYID = 7
1,175,216 UART: [idev] UDS.KEYID = 0
1,175,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,260 UART: [idev] Erasing UDS.KEYID = 0
1,200,307 UART: [idev] Sha1 KeyId Algorithm
1,208,771 UART: [idev] --
1,209,737 UART: [ldev] ++
1,209,905 UART: [ldev] CDI.KEYID = 6
1,210,268 UART: [ldev] SUBJECT.KEYID = 5
1,210,694 UART: [ldev] AUTHORITY.KEYID = 7
1,211,157 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,963 UART: [ldev] --
1,282,322 UART: [fwproc] Wait for Commands...
1,283,124 UART: [fwproc] Recv command 0x46574c44
1,283,852 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,147 UART: ROM Fatal Error: 0x000B0007
1,334,304 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,195 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Production
85,986 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
893,629 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,754 UART: [kat] ++
897,906 UART: [kat] sha1
902,270 UART: [kat] SHA2-256
904,210 UART: [kat] SHA2-384
906,835 UART: [kat] SHA2-512-ACC
908,736 UART: [kat] ECC-384
918,537 UART: [kat] HMAC-384Kdf
923,163 UART: [kat] LMS
1,171,491 UART: [kat] --
1,172,272 UART: [cold-reset] ++
1,172,800 UART: [fht] FHT @ 0x50003400
1,175,539 UART: [idev] ++
1,175,707 UART: [idev] CDI.KEYID = 6
1,176,067 UART: [idev] SUBJECT.KEYID = 7
1,176,491 UART: [idev] UDS.KEYID = 0
1,176,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,881 UART: [idev] Erasing UDS.KEYID = 0
1,201,686 UART: [idev] Sha1 KeyId Algorithm
1,209,956 UART: [idev] --
1,211,046 UART: [ldev] ++
1,211,214 UART: [ldev] CDI.KEYID = 6
1,211,577 UART: [ldev] SUBJECT.KEYID = 5
1,212,003 UART: [ldev] AUTHORITY.KEYID = 7
1,212,466 UART: [ldev] FE.KEYID = 1
1,217,696 UART: [ldev] Erasing FE.KEYID = 1
1,244,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,946 UART: [ldev] --
1,284,411 UART: [fwproc] Wait for Commands...
1,285,181 UART: [fwproc] Recv command 0x46574c44
1,285,909 UART: [fwproc] Recv'd Img size: 118548 bytes
1,335,720 UART: ROM Fatal Error: 0x000B0007
1,336,877 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,189,194 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,134 UART:
192,519 UART: Running Caliptra ROM ...
193,670 UART:
193,817 UART: [state] CFI Enabled
266,505 UART: [state] LifecycleState = Production
268,337 UART: [state] DebugLocked = No
269,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,591 UART: [kat] SHA2-256
445,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,785 UART: [kat] ++
456,316 UART: [kat] sha1
466,981 UART: [kat] SHA2-256
469,661 UART: [kat] SHA2-384
476,069 UART: [kat] SHA2-512-ACC
478,466 UART: [kat] ECC-384
2,766,958 UART: [kat] HMAC-384Kdf
2,779,303 UART: [kat] LMS
3,969,620 UART: [kat] --
3,973,007 UART: [cold-reset] ++
3,974,192 UART: [fht] Storing FHT @ 0x50003400
3,985,250 UART: [idev] ++
3,985,824 UART: [idev] CDI.KEYID = 6
3,986,768 UART: [idev] SUBJECT.KEYID = 7
3,987,983 UART: [idev] UDS.KEYID = 0
3,991,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,459 UART: [idev] Erasing UDS.KEYID = 0
7,324,078 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,504 UART: [idev] --
7,348,285 UART: [ldev] ++
7,348,855 UART: [ldev] CDI.KEYID = 6
7,349,795 UART: [ldev] SUBJECT.KEYID = 5
7,351,009 UART: [ldev] AUTHORITY.KEYID = 7
7,352,247 UART: [ldev] FE.KEYID = 1
7,383,084 UART: [ldev] Erasing FE.KEYID = 1
10,718,327 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,476 UART: [ldev] --
13,095,747 UART: [fwproc] Waiting for Commands...
13,099,150 UART: [fwproc] Received command 0x46574c44
13,101,346 UART: [fwproc] Received Image of size 118548 bytes
13,200,272 UART: ROM Fatal Error: 0x000B0007
13,203,744 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,787,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,919,007 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,359 UART:
192,737 UART: Running Caliptra ROM ...
193,964 UART:
603,631 UART: [state] CFI Enabled
617,354 UART: [state] LifecycleState = Production
619,157 UART: [state] DebugLocked = No
621,299 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,714 UART: [kat] SHA2-256
796,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,002 UART: [kat] ++
807,550 UART: [kat] sha1
817,681 UART: [kat] SHA2-256
820,352 UART: [kat] SHA2-384
826,935 UART: [kat] SHA2-512-ACC
829,343 UART: [kat] ECC-384
3,111,681 UART: [kat] HMAC-384Kdf
3,124,879 UART: [kat] LMS
4,314,994 UART: [kat] --
4,317,961 UART: [cold-reset] ++
4,319,261 UART: [fht] Storing FHT @ 0x50003400
4,329,892 UART: [idev] ++
4,330,475 UART: [idev] CDI.KEYID = 6
4,331,502 UART: [idev] SUBJECT.KEYID = 7
4,332,822 UART: [idev] UDS.KEYID = 0
4,336,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,009 UART: [idev] Erasing UDS.KEYID = 0
7,618,409 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,497 UART: [idev] --
7,644,312 UART: [ldev] ++
7,644,889 UART: [ldev] CDI.KEYID = 6
7,645,808 UART: [ldev] SUBJECT.KEYID = 5
7,647,035 UART: [ldev] AUTHORITY.KEYID = 7
7,648,286 UART: [ldev] FE.KEYID = 1
7,658,834 UART: [ldev] Erasing FE.KEYID = 1
10,944,829 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,264,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,681 UART: [ldev] --
13,303,700 UART: [fwproc] Waiting for Commands...
13,306,248 UART: [fwproc] Received command 0x46574c44
13,308,441 UART: [fwproc] Received Image of size 118548 bytes
13,404,285 UART: ROM Fatal Error: 0x000B0007
13,407,759 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
46 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
4,131,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,156,660 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,207 UART:
192,569 UART: Running Caliptra ROM ...
193,755 UART:
193,913 UART: [state] CFI Enabled
262,322 UART: [state] LifecycleState = Production
264,166 UART: [state] DebugLocked = No
266,692 UART: [state] WD Timer not started. Device not locked for debugging
270,595 UART: [kat] SHA2-256
450,226 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,023 UART: [kat] ++
461,475 UART: [kat] sha1
472,463 UART: [kat] SHA2-256
475,143 UART: [kat] SHA2-384
480,415 UART: [kat] SHA2-512-ACC
482,759 UART: [kat] ECC-384
2,928,774 UART: [kat] HMAC-384Kdf
2,950,490 UART: [kat] LMS
3,427,012 UART: [kat] --
3,431,625 UART: [cold-reset] ++
3,432,979 UART: [fht] FHT @ 0x50003400
3,443,962 UART: [idev] ++
3,444,540 UART: [idev] CDI.KEYID = 6
3,445,567 UART: [idev] SUBJECT.KEYID = 7
3,446,731 UART: [idev] UDS.KEYID = 0
3,449,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,052 UART: [idev] Erasing UDS.KEYID = 0
5,968,360 UART: [idev] Sha1 KeyId Algorithm
5,992,403 UART: [idev] --
5,998,018 UART: [ldev] ++
5,998,598 UART: [ldev] CDI.KEYID = 6
5,999,490 UART: [ldev] SUBJECT.KEYID = 5
6,000,712 UART: [ldev] AUTHORITY.KEYID = 7
6,002,033 UART: [ldev] FE.KEYID = 1
6,037,576 UART: [ldev] Erasing FE.KEYID = 1
8,543,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,520 UART: [ldev] --
10,352,954 UART: [fwproc] Wait for Commands...
10,355,703 UART: [fwproc] Recv command 0x46574c44
10,357,993 UART: [fwproc] Recv'd Img size: 118548 bytes
10,469,221 UART: ROM Fatal Error: 0x000B0007
10,472,476 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,462,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,359,620 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,509 UART:
192,880 UART: Running Caliptra ROM ...
194,060 UART:
603,843 UART: [state] CFI Enabled
617,723 UART: [state] LifecycleState = Production
619,461 UART: [state] DebugLocked = No
621,732 UART: [state] WD Timer not started. Device not locked for debugging
625,347 UART: [kat] SHA2-256
805,000 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,764 UART: [kat] ++
816,214 UART: [kat] sha1
826,715 UART: [kat] SHA2-256
829,389 UART: [kat] SHA2-384
834,694 UART: [kat] SHA2-512-ACC
837,042 UART: [kat] ECC-384
3,280,978 UART: [kat] HMAC-384Kdf
3,292,307 UART: [kat] LMS
3,768,828 UART: [kat] --
3,774,062 UART: [cold-reset] ++
3,776,435 UART: [fht] FHT @ 0x50003400
3,787,684 UART: [idev] ++
3,788,291 UART: [idev] CDI.KEYID = 6
3,789,237 UART: [idev] SUBJECT.KEYID = 7
3,790,454 UART: [idev] UDS.KEYID = 0
3,793,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,275 UART: [idev] Erasing UDS.KEYID = 0
6,268,713 UART: [idev] Sha1 KeyId Algorithm
6,293,751 UART: [idev] --
6,299,321 UART: [ldev] ++
6,299,979 UART: [ldev] CDI.KEYID = 6
6,300,896 UART: [ldev] SUBJECT.KEYID = 5
6,302,061 UART: [ldev] AUTHORITY.KEYID = 7
6,303,301 UART: [ldev] FE.KEYID = 1
6,315,248 UART: [ldev] Erasing FE.KEYID = 1
8,791,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,992 UART: [ldev] --
10,584,657 UART: [fwproc] Wait for Commands...
10,586,156 UART: [fwproc] Recv command 0x46574c44
10,588,157 UART: [fwproc] Recv'd Img size: 118548 bytes
10,702,877 UART: ROM Fatal Error: 0x000B0007
10,706,127 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,785,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,594,168 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,176 UART:
192,534 UART: Running Caliptra ROM ...
193,718 UART:
193,874 UART: [state] CFI Enabled
266,552 UART: [state] LifecycleState = Production
268,825 UART: [state] DebugLocked = No
271,049 UART: [state] WD Timer not started. Device not locked for debugging
275,376 UART: [kat] SHA2-256
465,292 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,053 UART: [kat] ++
476,704 UART: [kat] sha1
487,540 UART: [kat] SHA2-256
490,556 UART: [kat] SHA2-384
496,631 UART: [kat] SHA2-512-ACC
499,262 UART: [kat] ECC-384
2,949,268 UART: [kat] HMAC-384Kdf
2,973,654 UART: [kat] LMS
3,505,415 UART: [kat] --
3,510,254 UART: [cold-reset] ++
3,512,091 UART: [fht] FHT @ 0x50003400
3,523,782 UART: [idev] ++
3,524,464 UART: [idev] CDI.KEYID = 6
3,525,503 UART: [idev] SUBJECT.KEYID = 7
3,526,675 UART: [idev] UDS.KEYID = 0
3,529,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,679,820 UART: [idev] Erasing UDS.KEYID = 0
6,031,936 UART: [idev] Sha1 KeyId Algorithm
6,055,351 UART: [idev] --
6,058,866 UART: [ldev] ++
6,059,556 UART: [ldev] CDI.KEYID = 6
6,060,474 UART: [ldev] SUBJECT.KEYID = 5
6,061,699 UART: [ldev] AUTHORITY.KEYID = 7
6,062,886 UART: [ldev] FE.KEYID = 1
6,102,611 UART: [ldev] Erasing FE.KEYID = 1
8,612,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,554 UART: [ldev] --
10,416,132 UART: [fwproc] Wait for Commands...
10,419,161 UART: [fwproc] Recv command 0x46574c44
10,421,484 UART: [fwproc] Recv'd Img size: 118548 bytes
10,546,390 UART: ROM Fatal Error: 0x000B0007
10,550,028 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,439,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,374,659 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,373 UART:
192,731 UART: Running Caliptra ROM ...
193,918 UART:
603,756 UART: [state] CFI Enabled
614,945 UART: [state] LifecycleState = Production
617,191 UART: [state] DebugLocked = No
618,488 UART: [state] WD Timer not started. Device not locked for debugging
623,019 UART: [kat] SHA2-256
812,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,485 UART: [kat] ++
824,088 UART: [kat] sha1
835,690 UART: [kat] SHA2-256
838,702 UART: [kat] SHA2-384
844,857 UART: [kat] SHA2-512-ACC
847,422 UART: [kat] ECC-384
3,289,729 UART: [kat] HMAC-384Kdf
3,302,831 UART: [kat] LMS
3,834,700 UART: [kat] --
3,838,753 UART: [cold-reset] ++
3,840,855 UART: [fht] FHT @ 0x50003400
3,852,059 UART: [idev] ++
3,852,744 UART: [idev] CDI.KEYID = 6
3,853,738 UART: [idev] SUBJECT.KEYID = 7
3,854,847 UART: [idev] UDS.KEYID = 0
3,857,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,840 UART: [idev] Erasing UDS.KEYID = 0
6,332,133 UART: [idev] Sha1 KeyId Algorithm
6,354,675 UART: [idev] --
6,359,159 UART: [ldev] ++
6,359,844 UART: [ldev] CDI.KEYID = 6
6,360,756 UART: [ldev] SUBJECT.KEYID = 5
6,361,980 UART: [ldev] AUTHORITY.KEYID = 7
6,363,179 UART: [ldev] FE.KEYID = 1
6,377,133 UART: [ldev] Erasing FE.KEYID = 1
8,855,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,131 UART: [ldev] --
10,647,114 UART: [fwproc] Wait for Commands...
10,650,297 UART: [fwproc] Recv command 0x46574c44
10,652,569 UART: [fwproc] Recv'd Img size: 118548 bytes
10,781,802 UART: ROM Fatal Error: 0x000B0007
10,785,483 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
3,757,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,571,786 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Production
85,615 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,705 UART: [kat] SHA2-256
881,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,751 UART: [kat] ++
885,903 UART: [kat] sha1
890,119 UART: [kat] SHA2-256
892,057 UART: [kat] SHA2-384
894,752 UART: [kat] SHA2-512-ACC
896,653 UART: [kat] ECC-384
902,206 UART: [kat] HMAC-384Kdf
906,740 UART: [kat] LMS
1,474,936 UART: [kat] --
1,475,439 UART: [cold-reset] ++
1,475,963 UART: [fht] Storing FHT @ 0x50003400
1,478,640 UART: [idev] ++
1,478,808 UART: [idev] CDI.KEYID = 6
1,479,168 UART: [idev] SUBJECT.KEYID = 7
1,479,592 UART: [idev] UDS.KEYID = 0
1,479,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,554 UART: [idev] Erasing UDS.KEYID = 0
1,503,996 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,780 UART: [idev] --
1,513,651 UART: [ldev] ++
1,513,819 UART: [ldev] CDI.KEYID = 6
1,514,182 UART: [ldev] SUBJECT.KEYID = 5
1,514,608 UART: [ldev] AUTHORITY.KEYID = 7
1,515,071 UART: [ldev] FE.KEYID = 1
1,520,261 UART: [ldev] Erasing FE.KEYID = 1
1,545,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,012 UART: [ldev] --
1,584,393 UART: [fwproc] Waiting for Commands...
1,585,200 UART: [fwproc] Received command 0x46574c44
1,585,991 UART: [fwproc] Received Image of size 118548 bytes
1,635,600 UART: ROM Fatal Error: 0x000B0007
1,636,757 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,491,112 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Production
86,148 UART: [state] DebugLocked = No
86,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,362 UART: [kat] SHA2-256
882,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,408 UART: [kat] ++
886,560 UART: [kat] sha1
890,628 UART: [kat] SHA2-256
892,566 UART: [kat] SHA2-384
895,377 UART: [kat] SHA2-512-ACC
897,278 UART: [kat] ECC-384
902,769 UART: [kat] HMAC-384Kdf
907,389 UART: [kat] LMS
1,475,585 UART: [kat] --
1,476,622 UART: [cold-reset] ++
1,477,166 UART: [fht] Storing FHT @ 0x50003400
1,480,005 UART: [idev] ++
1,480,173 UART: [idev] CDI.KEYID = 6
1,480,533 UART: [idev] SUBJECT.KEYID = 7
1,480,957 UART: [idev] UDS.KEYID = 0
1,481,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,107 UART: [idev] Erasing UDS.KEYID = 0
1,505,429 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,017 UART: [idev] --
1,515,050 UART: [ldev] ++
1,515,218 UART: [ldev] CDI.KEYID = 6
1,515,581 UART: [ldev] SUBJECT.KEYID = 5
1,516,007 UART: [ldev] AUTHORITY.KEYID = 7
1,516,470 UART: [ldev] FE.KEYID = 1
1,521,702 UART: [ldev] Erasing FE.KEYID = 1
1,546,823 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,581 UART: [ldev] --
1,585,848 UART: [fwproc] Waiting for Commands...
1,586,513 UART: [fwproc] Received command 0x46574c44
1,587,304 UART: [fwproc] Received Image of size 118548 bytes
1,637,065 UART: ROM Fatal Error: 0x000B0007
1,638,222 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,492,411 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Production
85,685 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,300 UART: [kat] SHA2-256
890,850 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,954 UART: [kat] ++
895,106 UART: [kat] sha1
899,166 UART: [kat] SHA2-256
901,106 UART: [kat] SHA2-384
903,921 UART: [kat] SHA2-512-ACC
905,822 UART: [kat] ECC-384
915,585 UART: [kat] HMAC-384Kdf
919,969 UART: [kat] LMS
1,168,281 UART: [kat] --
1,169,242 UART: [cold-reset] ++
1,169,592 UART: [fht] FHT @ 0x50003400
1,172,406 UART: [idev] ++
1,172,574 UART: [idev] CDI.KEYID = 6
1,172,935 UART: [idev] SUBJECT.KEYID = 7
1,173,360 UART: [idev] UDS.KEYID = 0
1,173,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,209 UART: [idev] Erasing UDS.KEYID = 0
1,198,103 UART: [idev] Sha1 KeyId Algorithm
1,206,973 UART: [idev] --
1,208,010 UART: [ldev] ++
1,208,178 UART: [ldev] CDI.KEYID = 6
1,208,542 UART: [ldev] SUBJECT.KEYID = 5
1,208,969 UART: [ldev] AUTHORITY.KEYID = 7
1,209,432 UART: [ldev] FE.KEYID = 1
1,214,576 UART: [ldev] Erasing FE.KEYID = 1
1,240,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,488 UART: [ldev] --
1,279,775 UART: [fwproc] Wait for Commands...
1,280,370 UART: [fwproc] Recv command 0x46574c44
1,281,103 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,623 UART: ROM Fatal Error: 0x000B0007
1,330,780 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,497 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Production
85,798 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
891,057 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,473 UART: [kat] SHA2-256
901,413 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
915,790 UART: [kat] HMAC-384Kdf
920,528 UART: [kat] LMS
1,168,840 UART: [kat] --
1,169,817 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,174,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,010 UART: [idev] Erasing UDS.KEYID = 0
1,199,132 UART: [idev] Sha1 KeyId Algorithm
1,207,974 UART: [idev] --
1,208,917 UART: [ldev] ++
1,209,085 UART: [ldev] CDI.KEYID = 6
1,209,449 UART: [ldev] SUBJECT.KEYID = 5
1,209,876 UART: [ldev] AUTHORITY.KEYID = 7
1,210,339 UART: [ldev] FE.KEYID = 1
1,215,715 UART: [ldev] Erasing FE.KEYID = 1
1,242,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,815 UART: [ldev] --
1,282,088 UART: [fwproc] Wait for Commands...
1,282,743 UART: [fwproc] Recv command 0x46574c44
1,283,476 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,482 UART: ROM Fatal Error: 0x000B0007
1,332,639 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,560 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Production
85,571 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
893,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,179 UART: [kat] ++
897,331 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,476 UART: [kat] SHA2-512-ACC
908,377 UART: [kat] ECC-384
917,870 UART: [kat] HMAC-384Kdf
922,530 UART: [kat] LMS
1,170,858 UART: [kat] --
1,171,851 UART: [cold-reset] ++
1,172,305 UART: [fht] FHT @ 0x50003400
1,174,980 UART: [idev] ++
1,175,148 UART: [idev] CDI.KEYID = 6
1,175,508 UART: [idev] SUBJECT.KEYID = 7
1,175,932 UART: [idev] UDS.KEYID = 0
1,176,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,252 UART: [idev] Erasing UDS.KEYID = 0
1,201,425 UART: [idev] Sha1 KeyId Algorithm
1,209,755 UART: [idev] --
1,210,785 UART: [ldev] ++
1,210,953 UART: [ldev] CDI.KEYID = 6
1,211,316 UART: [ldev] SUBJECT.KEYID = 5
1,211,742 UART: [ldev] AUTHORITY.KEYID = 7
1,212,205 UART: [ldev] FE.KEYID = 1
1,217,513 UART: [ldev] Erasing FE.KEYID = 1
1,244,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,993 UART: [ldev] --
1,283,394 UART: [fwproc] Wait for Commands...
1,284,172 UART: [fwproc] Recv command 0x46574c44
1,284,900 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,777 UART: ROM Fatal Error: 0x000B0007
1,334,934 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,189,217 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,997 UART: [state] LifecycleState = Production
85,604 UART: [state] DebugLocked = No
86,144 UART: [state] WD Timer not started. Device not locked for debugging
87,321 UART: [kat] SHA2-256
892,971 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,096 UART: [kat] ++
897,248 UART: [kat] sha1
901,436 UART: [kat] SHA2-256
903,376 UART: [kat] SHA2-384
906,245 UART: [kat] SHA2-512-ACC
908,146 UART: [kat] ECC-384
917,949 UART: [kat] HMAC-384Kdf
922,503 UART: [kat] LMS
1,170,831 UART: [kat] --
1,171,734 UART: [cold-reset] ++
1,172,164 UART: [fht] FHT @ 0x50003400
1,174,773 UART: [idev] ++
1,174,941 UART: [idev] CDI.KEYID = 6
1,175,301 UART: [idev] SUBJECT.KEYID = 7
1,175,725 UART: [idev] UDS.KEYID = 0
1,176,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,701 UART: [idev] Erasing UDS.KEYID = 0
1,201,364 UART: [idev] Sha1 KeyId Algorithm
1,209,844 UART: [idev] --
1,210,766 UART: [ldev] ++
1,210,934 UART: [ldev] CDI.KEYID = 6
1,211,297 UART: [ldev] SUBJECT.KEYID = 5
1,211,723 UART: [ldev] AUTHORITY.KEYID = 7
1,212,186 UART: [ldev] FE.KEYID = 1
1,217,242 UART: [ldev] Erasing FE.KEYID = 1
1,243,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,722 UART: [ldev] --
1,283,117 UART: [fwproc] Wait for Commands...
1,283,915 UART: [fwproc] Recv command 0x46574c44
1,284,643 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,694 UART: ROM Fatal Error: 0x000B0007
1,334,851 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,382 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,267 UART:
192,623 UART: Running Caliptra ROM ...
193,814 UART:
193,966 UART: [state] CFI Enabled
267,526 UART: [state] LifecycleState = Production
269,357 UART: [state] DebugLocked = No
270,582 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,723 UART: [kat] SHA2-256
444,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,917 UART: [kat] ++
455,425 UART: [kat] sha1
466,444 UART: [kat] SHA2-256
469,144 UART: [kat] SHA2-384
475,506 UART: [kat] SHA2-512-ACC
477,909 UART: [kat] ECC-384
2,767,568 UART: [kat] HMAC-384Kdf
2,781,042 UART: [kat] LMS
3,971,341 UART: [kat] --
3,975,445 UART: [cold-reset] ++
3,977,431 UART: [fht] Storing FHT @ 0x50003400
3,988,267 UART: [idev] ++
3,988,831 UART: [idev] CDI.KEYID = 6
3,989,797 UART: [idev] SUBJECT.KEYID = 7
3,991,036 UART: [idev] UDS.KEYID = 0
3,993,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,578 UART: [idev] Erasing UDS.KEYID = 0
7,328,590 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,159 UART: [idev] --
7,354,108 UART: [ldev] ++
7,354,683 UART: [ldev] CDI.KEYID = 6
7,355,705 UART: [ldev] SUBJECT.KEYID = 5
7,356,865 UART: [ldev] AUTHORITY.KEYID = 7
7,358,099 UART: [ldev] FE.KEYID = 1
7,404,750 UART: [ldev] Erasing FE.KEYID = 1
10,735,367 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,102 UART: [ldev] --
13,097,684 UART: [fwproc] Waiting for Commands...
13,100,066 UART: [fwproc] Received command 0x46574c44
13,102,262 UART: [fwproc] Received Image of size 118548 bytes
13,193,723 UART: ROM Fatal Error: 0x000B0005
13,197,245 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,806,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,957,967 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,421 UART:
192,787 UART: Running Caliptra ROM ...
193,914 UART:
603,502 UART: [state] CFI Enabled
619,171 UART: [state] LifecycleState = Production
620,968 UART: [state] DebugLocked = No
622,624 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,171 UART: [kat] SHA2-256
796,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,460 UART: [kat] ++
807,943 UART: [kat] sha1
819,038 UART: [kat] SHA2-256
821,742 UART: [kat] SHA2-384
826,054 UART: [kat] SHA2-512-ACC
828,400 UART: [kat] ECC-384
3,112,298 UART: [kat] HMAC-384Kdf
3,122,862 UART: [kat] LMS
4,312,985 UART: [kat] --
4,316,914 UART: [cold-reset] ++
4,319,404 UART: [fht] Storing FHT @ 0x50003400
4,332,141 UART: [idev] ++
4,332,771 UART: [idev] CDI.KEYID = 6
4,333,694 UART: [idev] SUBJECT.KEYID = 7
4,334,913 UART: [idev] UDS.KEYID = 0
4,338,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,479 UART: [idev] Erasing UDS.KEYID = 0
7,621,109 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,168 UART: [idev] --
7,646,129 UART: [ldev] ++
7,646,719 UART: [ldev] CDI.KEYID = 6
7,647,636 UART: [ldev] SUBJECT.KEYID = 5
7,648,862 UART: [ldev] AUTHORITY.KEYID = 7
7,650,127 UART: [ldev] FE.KEYID = 1
7,661,431 UART: [ldev] Erasing FE.KEYID = 1
10,952,089 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,731 UART: [ldev] --
13,312,046 UART: [fwproc] Waiting for Commands...
13,314,469 UART: [fwproc] Received command 0x46574c44
13,316,673 UART: [fwproc] Received Image of size 118548 bytes
13,411,062 UART: ROM Fatal Error: 0x000B0005
13,414,585 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
4,134,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,152,677 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,254 UART:
192,610 UART: Running Caliptra ROM ...
193,800 UART:
193,954 UART: [state] CFI Enabled
261,959 UART: [state] LifecycleState = Production
263,748 UART: [state] DebugLocked = No
265,950 UART: [state] WD Timer not started. Device not locked for debugging
269,035 UART: [kat] SHA2-256
448,701 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,459 UART: [kat] ++
459,956 UART: [kat] sha1
470,527 UART: [kat] SHA2-256
473,206 UART: [kat] SHA2-384
478,891 UART: [kat] SHA2-512-ACC
481,234 UART: [kat] ECC-384
2,926,242 UART: [kat] HMAC-384Kdf
2,948,928 UART: [kat] LMS
3,425,406 UART: [kat] --
3,428,809 UART: [cold-reset] ++
3,429,909 UART: [fht] FHT @ 0x50003400
3,441,825 UART: [idev] ++
3,442,399 UART: [idev] CDI.KEYID = 6
3,443,421 UART: [idev] SUBJECT.KEYID = 7
3,444,595 UART: [idev] UDS.KEYID = 0
3,447,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,981 UART: [idev] Erasing UDS.KEYID = 0
5,963,270 UART: [idev] Sha1 KeyId Algorithm
5,985,571 UART: [idev] --
5,992,178 UART: [ldev] ++
5,992,797 UART: [ldev] CDI.KEYID = 6
5,993,695 UART: [ldev] SUBJECT.KEYID = 5
5,994,919 UART: [ldev] AUTHORITY.KEYID = 7
5,996,162 UART: [ldev] FE.KEYID = 1
6,034,062 UART: [ldev] Erasing FE.KEYID = 1
8,537,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,171 UART: [ldev] --
10,350,738 UART: [fwproc] Wait for Commands...
10,352,434 UART: [fwproc] Recv command 0x46574c44
10,354,430 UART: [fwproc] Recv'd Img size: 118548 bytes
10,460,295 UART: ROM Fatal Error: 0x000B0005
10,463,495 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,461,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,378,487 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,349 UART:
192,716 UART: Running Caliptra ROM ...
193,889 UART:
603,639 UART: [state] CFI Enabled
617,198 UART: [state] LifecycleState = Production
619,026 UART: [state] DebugLocked = No
620,700 UART: [state] WD Timer not started. Device not locked for debugging
624,709 UART: [kat] SHA2-256
804,382 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,137 UART: [kat] ++
815,647 UART: [kat] sha1
827,825 UART: [kat] SHA2-256
830,518 UART: [kat] SHA2-384
836,775 UART: [kat] SHA2-512-ACC
839,144 UART: [kat] ECC-384
3,280,883 UART: [kat] HMAC-384Kdf
3,293,258 UART: [kat] LMS
3,769,746 UART: [kat] --
3,775,276 UART: [cold-reset] ++
3,777,270 UART: [fht] FHT @ 0x50003400
3,787,716 UART: [idev] ++
3,788,295 UART: [idev] CDI.KEYID = 6
3,789,212 UART: [idev] SUBJECT.KEYID = 7
3,790,507 UART: [idev] UDS.KEYID = 0
3,793,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,560 UART: [idev] Erasing UDS.KEYID = 0
6,267,234 UART: [idev] Sha1 KeyId Algorithm
6,290,763 UART: [idev] --
6,294,715 UART: [ldev] ++
6,295,300 UART: [ldev] CDI.KEYID = 6
6,296,234 UART: [ldev] SUBJECT.KEYID = 5
6,297,403 UART: [ldev] AUTHORITY.KEYID = 7
6,298,644 UART: [ldev] FE.KEYID = 1
6,308,053 UART: [ldev] Erasing FE.KEYID = 1
8,779,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,498,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,514,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,530,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,546,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,568,040 UART: [ldev] --
10,574,392 UART: [fwproc] Wait for Commands...
10,576,222 UART: [fwproc] Recv command 0x46574c44
10,578,219 UART: [fwproc] Recv'd Img size: 118548 bytes
10,684,034 UART: ROM Fatal Error: 0x000B0005
10,687,278 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,787,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,582,132 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,293 UART:
192,673 UART: Running Caliptra ROM ...
193,805 UART:
193,956 UART: [state] CFI Enabled
263,996 UART: [state] LifecycleState = Production
266,214 UART: [state] DebugLocked = No
268,976 UART: [state] WD Timer not started. Device not locked for debugging
272,782 UART: [kat] SHA2-256
462,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,459 UART: [kat] ++
473,910 UART: [kat] sha1
485,172 UART: [kat] SHA2-256
488,201 UART: [kat] SHA2-384
493,401 UART: [kat] SHA2-512-ACC
495,967 UART: [kat] ECC-384
2,948,292 UART: [kat] HMAC-384Kdf
2,973,157 UART: [kat] LMS
3,504,926 UART: [kat] --
3,508,119 UART: [cold-reset] ++
3,510,167 UART: [fht] FHT @ 0x50003400
3,521,698 UART: [idev] ++
3,522,379 UART: [idev] CDI.KEYID = 6
3,523,353 UART: [idev] SUBJECT.KEYID = 7
3,524,571 UART: [idev] UDS.KEYID = 0
3,527,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,621 UART: [idev] Erasing UDS.KEYID = 0
6,029,375 UART: [idev] Sha1 KeyId Algorithm
6,052,631 UART: [idev] --
6,058,525 UART: [ldev] ++
6,059,213 UART: [ldev] CDI.KEYID = 6
6,060,105 UART: [ldev] SUBJECT.KEYID = 5
6,061,270 UART: [ldev] AUTHORITY.KEYID = 7
6,062,515 UART: [ldev] FE.KEYID = 1
6,104,993 UART: [ldev] Erasing FE.KEYID = 1
8,610,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,944 UART: [ldev] --
10,417,388 UART: [fwproc] Wait for Commands...
10,420,407 UART: [fwproc] Recv command 0x46574c44
10,422,673 UART: [fwproc] Recv'd Img size: 118548 bytes
10,537,482 UART: ROM Fatal Error: 0x000B0005
10,541,177 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
3,440,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,347,338 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
192,632 UART:
192,983 UART: Running Caliptra ROM ...
194,172 UART:
603,739 UART: [state] CFI Enabled
615,254 UART: [state] LifecycleState = Production
617,479 UART: [state] DebugLocked = No
620,427 UART: [state] WD Timer not started. Device not locked for debugging
625,409 UART: [kat] SHA2-256
815,307 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,066 UART: [kat] ++
826,664 UART: [kat] sha1
838,207 UART: [kat] SHA2-256
841,221 UART: [kat] SHA2-384
847,688 UART: [kat] SHA2-512-ACC
850,250 UART: [kat] ECC-384
3,294,197 UART: [kat] HMAC-384Kdf
3,305,859 UART: [kat] LMS
3,837,666 UART: [kat] --
3,841,841 UART: [cold-reset] ++
3,843,026 UART: [fht] FHT @ 0x50003400
3,854,834 UART: [idev] ++
3,855,521 UART: [idev] CDI.KEYID = 6
3,856,544 UART: [idev] SUBJECT.KEYID = 7
3,857,654 UART: [idev] UDS.KEYID = 0
3,860,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,769 UART: [idev] Erasing UDS.KEYID = 0
6,335,851 UART: [idev] Sha1 KeyId Algorithm
6,357,440 UART: [idev] --
6,363,709 UART: [ldev] ++
6,364,393 UART: [ldev] CDI.KEYID = 6
6,365,310 UART: [ldev] SUBJECT.KEYID = 5
6,366,420 UART: [ldev] AUTHORITY.KEYID = 7
6,367,736 UART: [ldev] FE.KEYID = 1
6,379,903 UART: [ldev] Erasing FE.KEYID = 1
8,860,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,307 UART: [ldev] --
10,651,659 UART: [fwproc] Wait for Commands...
10,653,498 UART: [fwproc] Recv command 0x46574c44
10,655,770 UART: [fwproc] Recv'd Img size: 118548 bytes
10,780,202 UART: ROM Fatal Error: 0x000B0005
10,783,890 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,756,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,572,507 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Production
85,435 UART: [state] DebugLocked = No
86,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,777 UART: [kat] SHA2-256
881,708 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,823 UART: [kat] ++
885,975 UART: [kat] sha1
890,157 UART: [kat] SHA2-256
892,095 UART: [kat] SHA2-384
894,692 UART: [kat] SHA2-512-ACC
896,593 UART: [kat] ECC-384
901,926 UART: [kat] HMAC-384Kdf
906,638 UART: [kat] LMS
1,474,834 UART: [kat] --
1,475,821 UART: [cold-reset] ++
1,476,185 UART: [fht] Storing FHT @ 0x50003400
1,478,904 UART: [idev] ++
1,479,072 UART: [idev] CDI.KEYID = 6
1,479,432 UART: [idev] SUBJECT.KEYID = 7
1,479,856 UART: [idev] UDS.KEYID = 0
1,480,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,750 UART: [idev] Erasing UDS.KEYID = 0
1,504,356 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,948 UART: [idev] --
1,513,929 UART: [ldev] ++
1,514,097 UART: [ldev] CDI.KEYID = 6
1,514,460 UART: [ldev] SUBJECT.KEYID = 5
1,514,886 UART: [ldev] AUTHORITY.KEYID = 7
1,515,349 UART: [ldev] FE.KEYID = 1
1,520,605 UART: [ldev] Erasing FE.KEYID = 1
1,545,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,092 UART: [ldev] --
1,584,485 UART: [fwproc] Waiting for Commands...
1,585,116 UART: [fwproc] Received command 0x46574c44
1,585,907 UART: [fwproc] Received Image of size 118548 bytes
1,631,086 UART: ROM Fatal Error: 0x000B0005
1,632,243 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,485,984 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Production
85,936 UART: [state] DebugLocked = No
86,532 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,184 UART: [kat] SHA2-256
882,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,230 UART: [kat] ++
886,382 UART: [kat] sha1
890,698 UART: [kat] SHA2-256
892,636 UART: [kat] SHA2-384
895,469 UART: [kat] SHA2-512-ACC
897,370 UART: [kat] ECC-384
903,129 UART: [kat] HMAC-384Kdf
907,777 UART: [kat] LMS
1,475,973 UART: [kat] --
1,476,940 UART: [cold-reset] ++
1,477,386 UART: [fht] Storing FHT @ 0x50003400
1,480,001 UART: [idev] ++
1,480,169 UART: [idev] CDI.KEYID = 6
1,480,529 UART: [idev] SUBJECT.KEYID = 7
1,480,953 UART: [idev] UDS.KEYID = 0
1,481,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,749 UART: [idev] Erasing UDS.KEYID = 0
1,505,871 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,371 UART: [idev] --
1,515,320 UART: [ldev] ++
1,515,488 UART: [ldev] CDI.KEYID = 6
1,515,851 UART: [ldev] SUBJECT.KEYID = 5
1,516,277 UART: [ldev] AUTHORITY.KEYID = 7
1,516,740 UART: [ldev] FE.KEYID = 1
1,521,892 UART: [ldev] Erasing FE.KEYID = 1
1,546,873 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,901 UART: [ldev] --
1,586,220 UART: [fwproc] Waiting for Commands...
1,586,925 UART: [fwproc] Received command 0x46574c44
1,587,716 UART: [fwproc] Received Image of size 118548 bytes
1,632,511 UART: ROM Fatal Error: 0x000B0005
1,633,668 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,485,951 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Production
85,691 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,048 UART: [kat] ++
895,200 UART: [kat] sha1
899,526 UART: [kat] SHA2-256
901,466 UART: [kat] SHA2-384
904,005 UART: [kat] SHA2-512-ACC
905,906 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,623 UART: [kat] LMS
1,168,935 UART: [kat] --
1,169,966 UART: [cold-reset] ++
1,170,326 UART: [fht] FHT @ 0x50003400
1,173,082 UART: [idev] ++
1,173,250 UART: [idev] CDI.KEYID = 6
1,173,611 UART: [idev] SUBJECT.KEYID = 7
1,174,036 UART: [idev] UDS.KEYID = 0
1,174,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,895 UART: [idev] Erasing UDS.KEYID = 0
1,198,595 UART: [idev] Sha1 KeyId Algorithm
1,207,467 UART: [idev] --
1,208,322 UART: [ldev] ++
1,208,490 UART: [ldev] CDI.KEYID = 6
1,208,854 UART: [ldev] SUBJECT.KEYID = 5
1,209,281 UART: [ldev] AUTHORITY.KEYID = 7
1,209,744 UART: [ldev] FE.KEYID = 1
1,214,890 UART: [ldev] Erasing FE.KEYID = 1
1,240,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,704 UART: [ldev] --
1,279,965 UART: [fwproc] Wait for Commands...
1,280,694 UART: [fwproc] Recv command 0x46574c44
1,281,427 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,833 UART: ROM Fatal Error: 0x000B0005
1,327,990 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,833 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Production
85,844 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,475 UART: [kat] ++
895,627 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,794 UART: [kat] SHA2-512-ACC
906,695 UART: [kat] ECC-384
916,210 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,170,101 UART: [cold-reset] ++
1,170,671 UART: [fht] FHT @ 0x50003400
1,173,283 UART: [idev] ++
1,173,451 UART: [idev] CDI.KEYID = 6
1,173,812 UART: [idev] SUBJECT.KEYID = 7
1,174,237 UART: [idev] UDS.KEYID = 0
1,174,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,676 UART: [idev] Sha1 KeyId Algorithm
1,208,522 UART: [idev] --
1,209,697 UART: [ldev] ++
1,209,865 UART: [ldev] CDI.KEYID = 6
1,210,229 UART: [ldev] SUBJECT.KEYID = 5
1,210,656 UART: [ldev] AUTHORITY.KEYID = 7
1,211,119 UART: [ldev] FE.KEYID = 1
1,216,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,483 UART: [ldev] --
1,281,898 UART: [fwproc] Wait for Commands...
1,282,521 UART: [fwproc] Recv command 0x46574c44
1,283,254 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,886 UART: ROM Fatal Error: 0x000B0005
1,329,043 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,440 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Production
85,827 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
893,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,379 UART: [kat] ++
897,531 UART: [kat] sha1
901,715 UART: [kat] SHA2-256
903,655 UART: [kat] SHA2-384
906,342 UART: [kat] SHA2-512-ACC
908,243 UART: [kat] ECC-384
918,338 UART: [kat] HMAC-384Kdf
922,954 UART: [kat] LMS
1,171,282 UART: [kat] --
1,172,061 UART: [cold-reset] ++
1,172,537 UART: [fht] FHT @ 0x50003400
1,175,302 UART: [idev] ++
1,175,470 UART: [idev] CDI.KEYID = 6
1,175,830 UART: [idev] SUBJECT.KEYID = 7
1,176,254 UART: [idev] UDS.KEYID = 0
1,176,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,864 UART: [idev] Erasing UDS.KEYID = 0
1,201,015 UART: [idev] Sha1 KeyId Algorithm
1,209,355 UART: [idev] --
1,210,617 UART: [ldev] ++
1,210,785 UART: [ldev] CDI.KEYID = 6
1,211,148 UART: [ldev] SUBJECT.KEYID = 5
1,211,574 UART: [ldev] AUTHORITY.KEYID = 7
1,212,037 UART: [ldev] FE.KEYID = 1
1,216,871 UART: [ldev] Erasing FE.KEYID = 1
1,243,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,481 UART: [ldev] --
1,282,914 UART: [fwproc] Wait for Commands...
1,283,698 UART: [fwproc] Recv command 0x46574c44
1,284,426 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,651 UART: ROM Fatal Error: 0x000B0005
1,330,808 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,627 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,013 UART: [state] LifecycleState = Production
86,620 UART: [state] DebugLocked = No
87,302 UART: [state] WD Timer not started. Device not locked for debugging
88,593 UART: [kat] SHA2-256
894,243 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,368 UART: [kat] ++
898,520 UART: [kat] sha1
902,850 UART: [kat] SHA2-256
904,790 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,165 UART: [kat] HMAC-384Kdf
923,765 UART: [kat] LMS
1,172,093 UART: [kat] --
1,172,816 UART: [cold-reset] ++
1,173,326 UART: [fht] FHT @ 0x50003400
1,175,957 UART: [idev] ++
1,176,125 UART: [idev] CDI.KEYID = 6
1,176,485 UART: [idev] SUBJECT.KEYID = 7
1,176,909 UART: [idev] UDS.KEYID = 0
1,177,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,833 UART: [idev] Erasing UDS.KEYID = 0
1,202,318 UART: [idev] Sha1 KeyId Algorithm
1,210,804 UART: [idev] --
1,211,918 UART: [ldev] ++
1,212,086 UART: [ldev] CDI.KEYID = 6
1,212,449 UART: [ldev] SUBJECT.KEYID = 5
1,212,875 UART: [ldev] AUTHORITY.KEYID = 7
1,213,338 UART: [ldev] FE.KEYID = 1
1,218,600 UART: [ldev] Erasing FE.KEYID = 1
1,244,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,918 UART: [ldev] --
1,284,233 UART: [fwproc] Wait for Commands...
1,284,805 UART: [fwproc] Recv command 0x46574c44
1,285,533 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,492 UART: ROM Fatal Error: 0x000B0005
1,331,649 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,040 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,072 UART:
192,454 UART: Running Caliptra ROM ...
193,545 UART:
193,689 UART: [state] CFI Enabled
261,666 UART: [state] LifecycleState = Production
263,442 UART: [state] DebugLocked = No
266,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,322 UART: [kat] SHA2-256
441,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,513 UART: [kat] ++
452,050 UART: [kat] sha1
462,454 UART: [kat] SHA2-256
465,136 UART: [kat] SHA2-384
470,091 UART: [kat] SHA2-512-ACC
472,502 UART: [kat] ECC-384
2,767,815 UART: [kat] HMAC-384Kdf
2,801,045 UART: [kat] LMS
3,991,357 UART: [kat] --
3,994,564 UART: [cold-reset] ++
3,996,126 UART: [fht] Storing FHT @ 0x50003400
4,006,480 UART: [idev] ++
4,007,048 UART: [idev] CDI.KEYID = 6
4,007,993 UART: [idev] SUBJECT.KEYID = 7
4,009,232 UART: [idev] UDS.KEYID = 0
4,012,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,400 UART: [idev] Erasing UDS.KEYID = 0
7,343,339 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,837 UART: [idev] --
7,371,045 UART: [ldev] ++
7,371,625 UART: [ldev] CDI.KEYID = 6
7,372,644 UART: [ldev] SUBJECT.KEYID = 5
7,373,810 UART: [ldev] AUTHORITY.KEYID = 7
7,375,041 UART: [ldev] FE.KEYID = 1
7,422,793 UART: [ldev] Erasing FE.KEYID = 1
10,754,400 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,717 UART: [ldev] --
13,113,878 UART: [fwproc] Waiting for Commands...
13,115,551 UART: [fwproc] Received command 0x46574c44
13,117,744 UART: [fwproc] Received Image of size 118548 bytes
13,209,104 UART: ROM Fatal Error: 0x000B0005
13,212,632 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,787,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,918,969 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,372 UART:
192,752 UART: Running Caliptra ROM ...
193,851 UART:
603,619 UART: [state] CFI Enabled
619,048 UART: [state] LifecycleState = Production
620,853 UART: [state] DebugLocked = No
622,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,122 UART: [kat] SHA2-256
796,877 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,467 UART: [kat] ++
807,950 UART: [kat] sha1
818,343 UART: [kat] SHA2-256
821,069 UART: [kat] SHA2-384
826,741 UART: [kat] SHA2-512-ACC
829,095 UART: [kat] ECC-384
3,112,073 UART: [kat] HMAC-384Kdf
3,123,093 UART: [kat] LMS
4,313,242 UART: [kat] --
4,317,895 UART: [cold-reset] ++
4,319,889 UART: [fht] Storing FHT @ 0x50003400
4,332,260 UART: [idev] ++
4,332,841 UART: [idev] CDI.KEYID = 6
4,333,811 UART: [idev] SUBJECT.KEYID = 7
4,335,034 UART: [idev] UDS.KEYID = 0
4,338,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,613 UART: [idev] Erasing UDS.KEYID = 0
7,617,442 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,419 UART: [idev] --
7,644,101 UART: [ldev] ++
7,644,680 UART: [ldev] CDI.KEYID = 6
7,645,656 UART: [ldev] SUBJECT.KEYID = 5
7,646,886 UART: [ldev] AUTHORITY.KEYID = 7
7,648,130 UART: [ldev] FE.KEYID = 1
7,656,252 UART: [ldev] Erasing FE.KEYID = 1
10,943,821 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,233,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,248,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,263,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,277,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,297,455 UART: [ldev] --
13,301,421 UART: [fwproc] Waiting for Commands...
13,304,628 UART: [fwproc] Received command 0x46574c44
13,306,875 UART: [fwproc] Received Image of size 118548 bytes
13,401,623 UART: ROM Fatal Error: 0x000B0005
13,405,094 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
4,131,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,150,643 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,180 UART:
192,549 UART: Running Caliptra ROM ...
193,647 UART:
193,793 UART: [state] CFI Enabled
260,711 UART: [state] LifecycleState = Production
262,502 UART: [state] DebugLocked = No
264,960 UART: [state] WD Timer not started. Device not locked for debugging
268,220 UART: [kat] SHA2-256
447,909 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,690 UART: [kat] ++
459,148 UART: [kat] sha1
471,213 UART: [kat] SHA2-256
473,919 UART: [kat] SHA2-384
480,392 UART: [kat] SHA2-512-ACC
482,738 UART: [kat] ECC-384
2,947,491 UART: [kat] HMAC-384Kdf
2,971,343 UART: [kat] LMS
3,447,843 UART: [kat] --
3,451,521 UART: [cold-reset] ++
3,454,163 UART: [fht] FHT @ 0x50003400
3,465,795 UART: [idev] ++
3,466,367 UART: [idev] CDI.KEYID = 6
3,467,354 UART: [idev] SUBJECT.KEYID = 7
3,468,581 UART: [idev] UDS.KEYID = 0
3,471,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,654 UART: [idev] Erasing UDS.KEYID = 0
5,986,385 UART: [idev] Sha1 KeyId Algorithm
6,010,329 UART: [idev] --
6,014,717 UART: [ldev] ++
6,015,301 UART: [ldev] CDI.KEYID = 6
6,016,195 UART: [ldev] SUBJECT.KEYID = 5
6,017,415 UART: [ldev] AUTHORITY.KEYID = 7
6,018,657 UART: [ldev] FE.KEYID = 1
6,058,158 UART: [ldev] Erasing FE.KEYID = 1
8,561,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,156 UART: [ldev] --
10,376,314 UART: [fwproc] Wait for Commands...
10,377,882 UART: [fwproc] Recv command 0x46574c44
10,379,877 UART: [fwproc] Recv'd Img size: 118548 bytes
10,486,762 UART: ROM Fatal Error: 0x000B0005
10,490,009 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,458,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,379,237 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,541 UART:
192,923 UART: Running Caliptra ROM ...
194,016 UART:
603,749 UART: [state] CFI Enabled
621,844 UART: [state] LifecycleState = Production
623,634 UART: [state] DebugLocked = No
626,500 UART: [state] WD Timer not started. Device not locked for debugging
630,980 UART: [kat] SHA2-256
810,634 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
821,453 UART: [kat] ++
821,903 UART: [kat] sha1
833,723 UART: [kat] SHA2-256
836,396 UART: [kat] SHA2-384
841,526 UART: [kat] SHA2-512-ACC
843,866 UART: [kat] ECC-384
3,285,758 UART: [kat] HMAC-384Kdf
3,298,824 UART: [kat] LMS
3,775,332 UART: [kat] --
3,779,720 UART: [cold-reset] ++
3,781,607 UART: [fht] FHT @ 0x50003400
3,794,262 UART: [idev] ++
3,794,880 UART: [idev] CDI.KEYID = 6
3,795,823 UART: [idev] SUBJECT.KEYID = 7
3,797,046 UART: [idev] UDS.KEYID = 0
3,800,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,949,271 UART: [idev] Erasing UDS.KEYID = 0
6,274,788 UART: [idev] Sha1 KeyId Algorithm
6,298,888 UART: [idev] --
6,304,344 UART: [ldev] ++
6,304,919 UART: [ldev] CDI.KEYID = 6
6,305,831 UART: [ldev] SUBJECT.KEYID = 5
6,307,047 UART: [ldev] AUTHORITY.KEYID = 7
6,308,280 UART: [ldev] FE.KEYID = 1
6,318,552 UART: [ldev] Erasing FE.KEYID = 1
8,795,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,663 UART: [ldev] --
10,592,857 UART: [fwproc] Wait for Commands...
10,594,702 UART: [fwproc] Recv command 0x46574c44
10,596,697 UART: [fwproc] Recv'd Img size: 118548 bytes
10,703,427 UART: ROM Fatal Error: 0x000B0005
10,706,678 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,461 writing to cptra_bootfsm_go
3,785,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,584,661 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,454 UART:
192,813 UART: Running Caliptra ROM ...
194,112 UART:
194,271 UART: [state] CFI Enabled
264,770 UART: [state] LifecycleState = Production
266,704 UART: [state] DebugLocked = No
268,927 UART: [state] WD Timer not started. Device not locked for debugging
273,052 UART: [kat] SHA2-256
462,891 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,656 UART: [kat] ++
474,510 UART: [kat] sha1
485,104 UART: [kat] SHA2-256
488,151 UART: [kat] SHA2-384
493,821 UART: [kat] SHA2-512-ACC
496,441 UART: [kat] ECC-384
2,948,339 UART: [kat] HMAC-384Kdf
2,972,212 UART: [kat] LMS
3,503,982 UART: [kat] --
3,509,107 UART: [cold-reset] ++
3,511,370 UART: [fht] FHT @ 0x50003400
3,523,975 UART: [idev] ++
3,524,704 UART: [idev] CDI.KEYID = 6
3,525,622 UART: [idev] SUBJECT.KEYID = 7
3,526,846 UART: [idev] UDS.KEYID = 0
3,530,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,679,612 UART: [idev] Erasing UDS.KEYID = 0
6,025,150 UART: [idev] Sha1 KeyId Algorithm
6,048,147 UART: [idev] --
6,053,505 UART: [ldev] ++
6,054,190 UART: [ldev] CDI.KEYID = 6
6,055,120 UART: [ldev] SUBJECT.KEYID = 5
6,056,287 UART: [ldev] AUTHORITY.KEYID = 7
6,057,524 UART: [ldev] FE.KEYID = 1
6,099,789 UART: [ldev] Erasing FE.KEYID = 1
8,605,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,932 UART: [ldev] --
10,412,052 UART: [fwproc] Wait for Commands...
10,415,025 UART: [fwproc] Recv command 0x46574c44
10,417,346 UART: [fwproc] Recv'd Img size: 118548 bytes
10,538,868 UART: ROM Fatal Error: 0x000B0005
10,542,539 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,430,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,330,270 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,424 UART:
192,783 UART: Running Caliptra ROM ...
193,984 UART:
603,740 UART: [state] CFI Enabled
615,729 UART: [state] LifecycleState = Production
617,623 UART: [state] DebugLocked = No
620,091 UART: [state] WD Timer not started. Device not locked for debugging
625,002 UART: [kat] SHA2-256
814,855 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,674 UART: [kat] ++
826,165 UART: [kat] sha1
836,890 UART: [kat] SHA2-256
839,914 UART: [kat] SHA2-384
845,145 UART: [kat] SHA2-512-ACC
847,764 UART: [kat] ECC-384
3,291,687 UART: [kat] HMAC-384Kdf
3,305,561 UART: [kat] LMS
3,837,383 UART: [kat] --
3,840,783 UART: [cold-reset] ++
3,842,398 UART: [fht] FHT @ 0x50003400
3,852,911 UART: [idev] ++
3,853,599 UART: [idev] CDI.KEYID = 6
3,854,583 UART: [idev] SUBJECT.KEYID = 7
3,855,747 UART: [idev] UDS.KEYID = 0
3,858,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,713 UART: [idev] Erasing UDS.KEYID = 0
6,332,468 UART: [idev] Sha1 KeyId Algorithm
6,354,110 UART: [idev] --
6,357,950 UART: [ldev] ++
6,358,699 UART: [ldev] CDI.KEYID = 6
6,359,611 UART: [ldev] SUBJECT.KEYID = 5
6,360,779 UART: [ldev] AUTHORITY.KEYID = 7
6,361,960 UART: [ldev] FE.KEYID = 1
6,373,582 UART: [ldev] Erasing FE.KEYID = 1
8,854,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,939 UART: [ldev] --
10,645,381 UART: [fwproc] Wait for Commands...
10,647,550 UART: [fwproc] Recv command 0x46574c44
10,649,840 UART: [fwproc] Recv'd Img size: 118548 bytes
10,770,151 UART: ROM Fatal Error: 0x000B0005
10,773,797 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,751,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,550,551 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Production
86,105 UART: [state] DebugLocked = No
86,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,149 UART: [kat] SHA2-256
882,080 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,195 UART: [kat] ++
886,347 UART: [kat] sha1
890,683 UART: [kat] SHA2-256
892,621 UART: [kat] SHA2-384
895,566 UART: [kat] SHA2-512-ACC
897,467 UART: [kat] ECC-384
903,100 UART: [kat] HMAC-384Kdf
907,758 UART: [kat] LMS
1,475,954 UART: [kat] --
1,476,619 UART: [cold-reset] ++
1,477,109 UART: [fht] Storing FHT @ 0x50003400
1,479,916 UART: [idev] ++
1,480,084 UART: [idev] CDI.KEYID = 6
1,480,444 UART: [idev] SUBJECT.KEYID = 7
1,480,868 UART: [idev] UDS.KEYID = 0
1,481,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,392 UART: [idev] Erasing UDS.KEYID = 0
1,505,280 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,900 UART: [idev] --
1,514,855 UART: [ldev] ++
1,515,023 UART: [ldev] CDI.KEYID = 6
1,515,386 UART: [ldev] SUBJECT.KEYID = 5
1,515,812 UART: [ldev] AUTHORITY.KEYID = 7
1,516,275 UART: [ldev] FE.KEYID = 1
1,521,391 UART: [ldev] Erasing FE.KEYID = 1
1,547,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,142 UART: [ldev] --
1,586,531 UART: [fwproc] Waiting for Commands...
1,587,314 UART: [fwproc] Received command 0x46574c44
1,588,105 UART: [fwproc] Received Image of size 118548 bytes
1,632,640 UART: ROM Fatal Error: 0x000B0005
1,633,797 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,484,608 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Production
86,164 UART: [state] DebugLocked = No
86,740 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,226 UART: [kat] SHA2-256
882,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,272 UART: [kat] ++
886,424 UART: [kat] sha1
890,770 UART: [kat] SHA2-256
892,708 UART: [kat] SHA2-384
895,569 UART: [kat] SHA2-512-ACC
897,470 UART: [kat] ECC-384
903,121 UART: [kat] HMAC-384Kdf
907,695 UART: [kat] LMS
1,475,891 UART: [kat] --
1,477,098 UART: [cold-reset] ++
1,477,494 UART: [fht] Storing FHT @ 0x50003400
1,480,069 UART: [idev] ++
1,480,237 UART: [idev] CDI.KEYID = 6
1,480,597 UART: [idev] SUBJECT.KEYID = 7
1,481,021 UART: [idev] UDS.KEYID = 0
1,481,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,503 UART: [idev] Erasing UDS.KEYID = 0
1,506,389 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,841 UART: [idev] --
1,515,790 UART: [ldev] ++
1,515,958 UART: [ldev] CDI.KEYID = 6
1,516,321 UART: [ldev] SUBJECT.KEYID = 5
1,516,747 UART: [ldev] AUTHORITY.KEYID = 7
1,517,210 UART: [ldev] FE.KEYID = 1
1,522,574 UART: [ldev] Erasing FE.KEYID = 1
1,548,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,435 UART: [ldev] --
1,587,820 UART: [fwproc] Waiting for Commands...
1,588,613 UART: [fwproc] Received command 0x46574c44
1,589,404 UART: [fwproc] Received Image of size 118548 bytes
1,634,235 UART: ROM Fatal Error: 0x000B0005
1,635,392 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,993 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,570 UART: [state] LifecycleState = Production
86,177 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
891,512 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,616 UART: [kat] ++
895,768 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,719 UART: [kat] SHA2-512-ACC
906,620 UART: [kat] ECC-384
916,557 UART: [kat] HMAC-384Kdf
921,147 UART: [kat] LMS
1,169,459 UART: [kat] --
1,170,452 UART: [cold-reset] ++
1,170,846 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,174,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,359 UART: [idev] Erasing UDS.KEYID = 0
1,199,519 UART: [idev] Sha1 KeyId Algorithm
1,208,569 UART: [idev] --
1,209,584 UART: [ldev] ++
1,209,752 UART: [ldev] CDI.KEYID = 6
1,210,116 UART: [ldev] SUBJECT.KEYID = 5
1,210,543 UART: [ldev] AUTHORITY.KEYID = 7
1,211,006 UART: [ldev] FE.KEYID = 1
1,215,834 UART: [ldev] Erasing FE.KEYID = 1
1,242,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,534 UART: [ldev] --
1,281,981 UART: [fwproc] Wait for Commands...
1,282,614 UART: [fwproc] Recv command 0x46574c44
1,283,347 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,001 UART: ROM Fatal Error: 0x000B0005
1,329,158 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,983 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Production
85,824 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
891,173 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,277 UART: [kat] ++
895,429 UART: [kat] sha1
899,629 UART: [kat] SHA2-256
901,569 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,902 UART: [kat] LMS
1,169,214 UART: [kat] --
1,170,155 UART: [cold-reset] ++
1,170,603 UART: [fht] FHT @ 0x50003400
1,173,249 UART: [idev] ++
1,173,417 UART: [idev] CDI.KEYID = 6
1,173,778 UART: [idev] SUBJECT.KEYID = 7
1,174,203 UART: [idev] UDS.KEYID = 0
1,174,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,964 UART: [idev] Erasing UDS.KEYID = 0
1,199,420 UART: [idev] Sha1 KeyId Algorithm
1,208,088 UART: [idev] --
1,209,261 UART: [ldev] ++
1,209,429 UART: [ldev] CDI.KEYID = 6
1,209,793 UART: [ldev] SUBJECT.KEYID = 5
1,210,220 UART: [ldev] AUTHORITY.KEYID = 7
1,210,683 UART: [ldev] FE.KEYID = 1
1,215,913 UART: [ldev] Erasing FE.KEYID = 1
1,242,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,697 UART: [ldev] --
1,281,918 UART: [fwproc] Wait for Commands...
1,282,513 UART: [fwproc] Recv command 0x46574c44
1,283,246 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,696 UART: ROM Fatal Error: 0x000B0005
1,328,853 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,776 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Production
85,455 UART: [state] DebugLocked = No
86,021 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
892,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,061 UART: [kat] ++
897,213 UART: [kat] sha1
901,561 UART: [kat] SHA2-256
903,501 UART: [kat] SHA2-384
906,096 UART: [kat] SHA2-512-ACC
907,997 UART: [kat] ECC-384
917,694 UART: [kat] HMAC-384Kdf
922,486 UART: [kat] LMS
1,170,814 UART: [kat] --
1,171,623 UART: [cold-reset] ++
1,171,983 UART: [fht] FHT @ 0x50003400
1,174,490 UART: [idev] ++
1,174,658 UART: [idev] CDI.KEYID = 6
1,175,018 UART: [idev] SUBJECT.KEYID = 7
1,175,442 UART: [idev] UDS.KEYID = 0
1,175,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,618 UART: [idev] Erasing UDS.KEYID = 0
1,200,583 UART: [idev] Sha1 KeyId Algorithm
1,208,981 UART: [idev] --
1,210,139 UART: [ldev] ++
1,210,307 UART: [ldev] CDI.KEYID = 6
1,210,670 UART: [ldev] SUBJECT.KEYID = 5
1,211,096 UART: [ldev] AUTHORITY.KEYID = 7
1,211,559 UART: [ldev] FE.KEYID = 1
1,216,375 UART: [ldev] Erasing FE.KEYID = 1
1,242,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,585 UART: [ldev] --
1,282,092 UART: [fwproc] Wait for Commands...
1,282,752 UART: [fwproc] Recv command 0x46574c44
1,283,480 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,005 UART: ROM Fatal Error: 0x000B0005
1,330,162 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,941 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Production
86,150 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
893,515 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,640 UART: [kat] ++
897,792 UART: [kat] sha1
902,058 UART: [kat] SHA2-256
903,998 UART: [kat] SHA2-384
906,803 UART: [kat] SHA2-512-ACC
908,704 UART: [kat] ECC-384
918,263 UART: [kat] HMAC-384Kdf
922,765 UART: [kat] LMS
1,171,093 UART: [kat] --
1,171,944 UART: [cold-reset] ++
1,172,428 UART: [fht] FHT @ 0x50003400
1,175,279 UART: [idev] ++
1,175,447 UART: [idev] CDI.KEYID = 6
1,175,807 UART: [idev] SUBJECT.KEYID = 7
1,176,231 UART: [idev] UDS.KEYID = 0
1,176,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,105 UART: [idev] Erasing UDS.KEYID = 0
1,200,890 UART: [idev] Sha1 KeyId Algorithm
1,209,412 UART: [idev] --
1,210,392 UART: [ldev] ++
1,210,560 UART: [ldev] CDI.KEYID = 6
1,210,923 UART: [ldev] SUBJECT.KEYID = 5
1,211,349 UART: [ldev] AUTHORITY.KEYID = 7
1,211,812 UART: [ldev] FE.KEYID = 1
1,217,028 UART: [ldev] Erasing FE.KEYID = 1
1,243,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,498 UART: [ldev] --
1,282,797 UART: [fwproc] Wait for Commands...
1,283,565 UART: [fwproc] Recv command 0x46574c44
1,284,293 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,408 UART: ROM Fatal Error: 0x000B0005
1,330,565 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,132 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,122 UART:
192,484 UART: Running Caliptra ROM ...
193,563 UART:
193,712 UART: [state] CFI Enabled
263,725 UART: [state] LifecycleState = Production
265,549 UART: [state] DebugLocked = No
267,929 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,980 UART: [kat] SHA2-256
441,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,200 UART: [kat] ++
452,684 UART: [kat] sha1
463,037 UART: [kat] SHA2-256
465,727 UART: [kat] SHA2-384
470,908 UART: [kat] SHA2-512-ACC
473,265 UART: [kat] ECC-384
2,768,374 UART: [kat] HMAC-384Kdf
2,798,990 UART: [kat] LMS
3,989,336 UART: [kat] --
3,994,879 UART: [cold-reset] ++
3,996,500 UART: [fht] Storing FHT @ 0x50003400
4,009,122 UART: [idev] ++
4,009,694 UART: [idev] CDI.KEYID = 6
4,010,713 UART: [idev] SUBJECT.KEYID = 7
4,011,877 UART: [idev] UDS.KEYID = 0
4,017,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,167,272 UART: [idev] Erasing UDS.KEYID = 0
7,349,461 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,000 UART: [idev] --
7,377,355 UART: [ldev] ++
7,377,927 UART: [ldev] CDI.KEYID = 6
7,378,892 UART: [ldev] SUBJECT.KEYID = 5
7,380,108 UART: [ldev] AUTHORITY.KEYID = 7
7,381,343 UART: [ldev] FE.KEYID = 1
7,423,324 UART: [ldev] Erasing FE.KEYID = 1
10,756,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,275 UART: [ldev] --
13,118,767 UART: [fwproc] Waiting for Commands...
13,121,573 UART: [fwproc] Received command 0x46574c44
13,123,764 UART: [fwproc] Received Image of size 118548 bytes
13,187,324 UART: ROM Fatal Error: 0x000B0003
13,190,844 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,858 writing to cptra_bootfsm_go
3,808,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,922,553 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,424 UART:
192,785 UART: Running Caliptra ROM ...
193,879 UART:
603,544 UART: [state] CFI Enabled
617,763 UART: [state] LifecycleState = Production
619,611 UART: [state] DebugLocked = No
622,451 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,227 UART: [kat] SHA2-256
797,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,504 UART: [kat] ++
808,989 UART: [kat] sha1
821,282 UART: [kat] SHA2-256
824,005 UART: [kat] SHA2-384
830,702 UART: [kat] SHA2-512-ACC
833,057 UART: [kat] ECC-384
3,117,078 UART: [kat] HMAC-384Kdf
3,130,157 UART: [kat] LMS
4,320,242 UART: [kat] --
4,324,701 UART: [cold-reset] ++
4,326,429 UART: [fht] Storing FHT @ 0x50003400
4,337,485 UART: [idev] ++
4,338,065 UART: [idev] CDI.KEYID = 6
4,339,041 UART: [idev] SUBJECT.KEYID = 7
4,340,266 UART: [idev] UDS.KEYID = 0
4,345,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,494,964 UART: [idev] Erasing UDS.KEYID = 0
7,627,656 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,897 UART: [idev] --
7,652,604 UART: [ldev] ++
7,653,186 UART: [ldev] CDI.KEYID = 6
7,654,162 UART: [ldev] SUBJECT.KEYID = 5
7,655,385 UART: [ldev] AUTHORITY.KEYID = 7
7,656,630 UART: [ldev] FE.KEYID = 1
7,668,366 UART: [ldev] Erasing FE.KEYID = 1
10,955,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,933 UART: [ldev] --
13,316,023 UART: [fwproc] Waiting for Commands...
13,318,529 UART: [fwproc] Received command 0x46574c44
13,320,719 UART: [fwproc] Received Image of size 118548 bytes
13,379,096 UART: ROM Fatal Error: 0x000B0003
13,382,567 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
4,133,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,117,070 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,118 UART:
192,495 UART: Running Caliptra ROM ...
193,675 UART:
193,832 UART: [state] CFI Enabled
262,786 UART: [state] LifecycleState = Production
264,585 UART: [state] DebugLocked = No
267,601 UART: [state] WD Timer not started. Device not locked for debugging
271,127 UART: [kat] SHA2-256
450,740 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,564 UART: [kat] ++
462,102 UART: [kat] sha1
474,016 UART: [kat] SHA2-256
476,710 UART: [kat] SHA2-384
482,206 UART: [kat] SHA2-512-ACC
484,553 UART: [kat] ECC-384
2,948,003 UART: [kat] HMAC-384Kdf
2,971,001 UART: [kat] LMS
3,447,493 UART: [kat] --
3,451,169 UART: [cold-reset] ++
3,453,377 UART: [fht] FHT @ 0x50003400
3,463,279 UART: [idev] ++
3,463,913 UART: [idev] CDI.KEYID = 6
3,464,822 UART: [idev] SUBJECT.KEYID = 7
3,466,121 UART: [idev] UDS.KEYID = 0
3,469,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,629 UART: [idev] Erasing UDS.KEYID = 0
5,984,094 UART: [idev] Sha1 KeyId Algorithm
6,007,898 UART: [idev] --
6,013,311 UART: [ldev] ++
6,013,893 UART: [ldev] CDI.KEYID = 6
6,014,825 UART: [ldev] SUBJECT.KEYID = 5
6,015,996 UART: [ldev] AUTHORITY.KEYID = 7
6,017,292 UART: [ldev] FE.KEYID = 1
6,057,275 UART: [ldev] Erasing FE.KEYID = 1
8,563,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,852 UART: [ldev] --
10,374,291 UART: [fwproc] Wait for Commands...
10,376,175 UART: [fwproc] Recv command 0x46574c44
10,378,175 UART: [fwproc] Recv'd Img size: 118548 bytes
10,452,254 UART: ROM Fatal Error: 0x000B0003
10,455,503 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
3,463,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,349,819 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
192,606 UART:
192,989 UART: Running Caliptra ROM ...
194,167 UART:
603,772 UART: [state] CFI Enabled
618,622 UART: [state] LifecycleState = Production
620,387 UART: [state] DebugLocked = No
622,961 UART: [state] WD Timer not started. Device not locked for debugging
625,937 UART: [kat] SHA2-256
805,587 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,382 UART: [kat] ++
816,835 UART: [kat] sha1
828,524 UART: [kat] SHA2-256
831,248 UART: [kat] SHA2-384
836,966 UART: [kat] SHA2-512-ACC
839,366 UART: [kat] ECC-384
3,281,405 UART: [kat] HMAC-384Kdf
3,294,204 UART: [kat] LMS
3,770,689 UART: [kat] --
3,775,549 UART: [cold-reset] ++
3,778,136 UART: [fht] FHT @ 0x50003400
3,789,223 UART: [idev] ++
3,789,852 UART: [idev] CDI.KEYID = 6
3,790,790 UART: [idev] SUBJECT.KEYID = 7
3,792,018 UART: [idev] UDS.KEYID = 0
3,795,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,052 UART: [idev] Erasing UDS.KEYID = 0
6,269,939 UART: [idev] Sha1 KeyId Algorithm
6,292,850 UART: [idev] --
6,297,556 UART: [ldev] ++
6,298,132 UART: [ldev] CDI.KEYID = 6
6,299,021 UART: [ldev] SUBJECT.KEYID = 5
6,300,244 UART: [ldev] AUTHORITY.KEYID = 7
6,301,534 UART: [ldev] FE.KEYID = 1
6,312,670 UART: [ldev] Erasing FE.KEYID = 1
8,788,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,442 UART: [ldev] --
10,582,571 UART: [fwproc] Wait for Commands...
10,585,808 UART: [fwproc] Recv command 0x46574c44
10,587,850 UART: [fwproc] Recv'd Img size: 118548 bytes
10,666,079 UART: ROM Fatal Error: 0x000B0003
10,669,319 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,779,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,548,497 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,071 UART:
192,451 UART: Running Caliptra ROM ...
193,587 UART:
193,734 UART: [state] CFI Enabled
265,867 UART: [state] LifecycleState = Production
268,127 UART: [state] DebugLocked = No
270,506 UART: [state] WD Timer not started. Device not locked for debugging
275,847 UART: [kat] SHA2-256
465,736 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,477 UART: [kat] ++
476,952 UART: [kat] sha1
488,488 UART: [kat] SHA2-256
491,505 UART: [kat] SHA2-384
497,061 UART: [kat] SHA2-512-ACC
499,640 UART: [kat] ECC-384
2,951,162 UART: [kat] HMAC-384Kdf
2,973,039 UART: [kat] LMS
3,504,835 UART: [kat] --
3,507,752 UART: [cold-reset] ++
3,508,775 UART: [fht] FHT @ 0x50003400
3,519,926 UART: [idev] ++
3,520,617 UART: [idev] CDI.KEYID = 6
3,521,643 UART: [idev] SUBJECT.KEYID = 7
3,522,812 UART: [idev] UDS.KEYID = 0
3,528,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,583 UART: [idev] Erasing UDS.KEYID = 0
6,031,553 UART: [idev] Sha1 KeyId Algorithm
6,055,013 UART: [idev] --
6,060,125 UART: [ldev] ++
6,060,821 UART: [ldev] CDI.KEYID = 6
6,061,711 UART: [ldev] SUBJECT.KEYID = 5
6,062,820 UART: [ldev] AUTHORITY.KEYID = 7
6,064,122 UART: [ldev] FE.KEYID = 1
6,100,514 UART: [ldev] Erasing FE.KEYID = 1
8,607,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,460 UART: [ldev] --
10,414,352 UART: [fwproc] Wait for Commands...
10,416,368 UART: [fwproc] Recv command 0x46574c44
10,418,632 UART: [fwproc] Recv'd Img size: 118548 bytes
10,507,985 UART: ROM Fatal Error: 0x000B0003
10,511,668 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,826 writing to cptra_bootfsm_go
3,442,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,307,735 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,476 UART:
192,841 UART: Running Caliptra ROM ...
194,014 UART:
603,488 UART: [state] CFI Enabled
617,664 UART: [state] LifecycleState = Production
619,838 UART: [state] DebugLocked = No
621,950 UART: [state] WD Timer not started. Device not locked for debugging
627,122 UART: [kat] SHA2-256
816,976 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,784 UART: [kat] ++
828,301 UART: [kat] sha1
838,675 UART: [kat] SHA2-256
841,732 UART: [kat] SHA2-384
846,861 UART: [kat] SHA2-512-ACC
849,435 UART: [kat] ECC-384
3,291,021 UART: [kat] HMAC-384Kdf
3,303,336 UART: [kat] LMS
3,835,148 UART: [kat] --
3,839,947 UART: [cold-reset] ++
3,841,558 UART: [fht] FHT @ 0x50003400
3,852,114 UART: [idev] ++
3,852,795 UART: [idev] CDI.KEYID = 6
3,853,818 UART: [idev] SUBJECT.KEYID = 7
3,854,988 UART: [idev] UDS.KEYID = 0
3,860,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,776 UART: [idev] Erasing UDS.KEYID = 0
6,331,648 UART: [idev] Sha1 KeyId Algorithm
6,355,123 UART: [idev] --
6,361,390 UART: [ldev] ++
6,362,115 UART: [ldev] CDI.KEYID = 6
6,363,040 UART: [ldev] SUBJECT.KEYID = 5
6,364,210 UART: [ldev] AUTHORITY.KEYID = 7
6,365,387 UART: [ldev] FE.KEYID = 1
6,375,772 UART: [ldev] Erasing FE.KEYID = 1
8,856,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,544 UART: [ldev] --
10,646,245 UART: [fwproc] Wait for Commands...
10,649,481 UART: [fwproc] Recv command 0x46574c44
10,651,766 UART: [fwproc] Recv'd Img size: 118548 bytes
10,741,040 UART: ROM Fatal Error: 0x000B0003
10,744,737 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
3,760,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,528,343 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Production
85,419 UART: [state] DebugLocked = No
86,131 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,707 UART: [kat] SHA2-256
881,638 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,753 UART: [kat] ++
885,905 UART: [kat] sha1
890,095 UART: [kat] SHA2-256
892,033 UART: [kat] SHA2-384
894,716 UART: [kat] SHA2-512-ACC
896,617 UART: [kat] ECC-384
902,276 UART: [kat] HMAC-384Kdf
906,802 UART: [kat] LMS
1,474,998 UART: [kat] --
1,476,033 UART: [cold-reset] ++
1,476,579 UART: [fht] Storing FHT @ 0x50003400
1,479,272 UART: [idev] ++
1,479,440 UART: [idev] CDI.KEYID = 6
1,479,800 UART: [idev] SUBJECT.KEYID = 7
1,480,224 UART: [idev] UDS.KEYID = 0
1,480,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,222 UART: [idev] Erasing UDS.KEYID = 0
1,504,768 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,358 UART: [idev] --
1,514,499 UART: [ldev] ++
1,514,667 UART: [ldev] CDI.KEYID = 6
1,515,030 UART: [ldev] SUBJECT.KEYID = 5
1,515,456 UART: [ldev] AUTHORITY.KEYID = 7
1,515,919 UART: [ldev] FE.KEYID = 1
1,521,013 UART: [ldev] Erasing FE.KEYID = 1
1,546,748 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,442 UART: [ldev] --
1,585,827 UART: [fwproc] Waiting for Commands...
1,586,572 UART: [fwproc] Received command 0x46574c44
1,587,363 UART: [fwproc] Received Image of size 118548 bytes
1,608,149 UART: ROM Fatal Error: 0x000B0003
1,609,306 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,460,331 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Production
85,910 UART: [state] DebugLocked = No
86,532 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,240 UART: [kat] SHA2-256
882,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,286 UART: [kat] ++
886,438 UART: [kat] sha1
890,676 UART: [kat] SHA2-256
892,614 UART: [kat] SHA2-384
895,505 UART: [kat] SHA2-512-ACC
897,406 UART: [kat] ECC-384
902,935 UART: [kat] HMAC-384Kdf
907,687 UART: [kat] LMS
1,475,883 UART: [kat] --
1,476,808 UART: [cold-reset] ++
1,477,226 UART: [fht] Storing FHT @ 0x50003400
1,480,001 UART: [idev] ++
1,480,169 UART: [idev] CDI.KEYID = 6
1,480,529 UART: [idev] SUBJECT.KEYID = 7
1,480,953 UART: [idev] UDS.KEYID = 0
1,481,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,183 UART: [idev] Erasing UDS.KEYID = 0
1,506,449 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,009 UART: [idev] --
1,516,188 UART: [ldev] ++
1,516,356 UART: [ldev] CDI.KEYID = 6
1,516,719 UART: [ldev] SUBJECT.KEYID = 5
1,517,145 UART: [ldev] AUTHORITY.KEYID = 7
1,517,608 UART: [ldev] FE.KEYID = 1
1,523,028 UART: [ldev] Erasing FE.KEYID = 1
1,548,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,415 UART: [ldev] --
1,587,902 UART: [fwproc] Waiting for Commands...
1,588,747 UART: [fwproc] Received command 0x46574c44
1,589,538 UART: [fwproc] Received Image of size 118548 bytes
1,609,952 UART: ROM Fatal Error: 0x000B0003
1,611,109 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,461,934 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Production
85,769 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,208 UART: [kat] ++
895,360 UART: [kat] sha1
899,780 UART: [kat] SHA2-256
901,720 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,643 UART: [kat] LMS
1,168,955 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,392 UART: [fht] FHT @ 0x50003400
1,173,120 UART: [idev] ++
1,173,288 UART: [idev] CDI.KEYID = 6
1,173,649 UART: [idev] SUBJECT.KEYID = 7
1,174,074 UART: [idev] UDS.KEYID = 0
1,174,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,435 UART: [idev] Erasing UDS.KEYID = 0
1,199,041 UART: [idev] Sha1 KeyId Algorithm
1,208,083 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,215,518 UART: [ldev] Erasing FE.KEYID = 1
1,242,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,460 UART: [ldev] --
1,281,779 UART: [fwproc] Wait for Commands...
1,282,478 UART: [fwproc] Recv command 0x46574c44
1,283,211 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,601 UART: ROM Fatal Error: 0x000B0003
1,304,758 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,287 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Production
86,120 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
891,377 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,546 UART: [kat] SHA2-512-ACC
906,447 UART: [kat] ECC-384
916,288 UART: [kat] HMAC-384Kdf
920,956 UART: [kat] LMS
1,169,268 UART: [kat] --
1,170,245 UART: [cold-reset] ++
1,170,733 UART: [fht] FHT @ 0x50003400
1,173,357 UART: [idev] ++
1,173,525 UART: [idev] CDI.KEYID = 6
1,173,886 UART: [idev] SUBJECT.KEYID = 7
1,174,311 UART: [idev] UDS.KEYID = 0
1,174,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,058 UART: [idev] Erasing UDS.KEYID = 0
1,198,718 UART: [idev] Sha1 KeyId Algorithm
1,207,698 UART: [idev] --
1,208,863 UART: [ldev] ++
1,209,031 UART: [ldev] CDI.KEYID = 6
1,209,395 UART: [ldev] SUBJECT.KEYID = 5
1,209,822 UART: [ldev] AUTHORITY.KEYID = 7
1,210,285 UART: [ldev] FE.KEYID = 1
1,215,669 UART: [ldev] Erasing FE.KEYID = 1
1,242,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,247 UART: [ldev] --
1,281,666 UART: [fwproc] Wait for Commands...
1,282,289 UART: [fwproc] Recv command 0x46574c44
1,283,022 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,448 UART: ROM Fatal Error: 0x000B0003
1,304,605 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,298 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Production
85,721 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
893,292 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,417 UART: [kat] ++
897,569 UART: [kat] sha1
901,661 UART: [kat] SHA2-256
903,601 UART: [kat] SHA2-384
906,342 UART: [kat] SHA2-512-ACC
908,243 UART: [kat] ECC-384
917,296 UART: [kat] HMAC-384Kdf
921,970 UART: [kat] LMS
1,170,298 UART: [kat] --
1,171,225 UART: [cold-reset] ++
1,171,745 UART: [fht] FHT @ 0x50003400
1,174,418 UART: [idev] ++
1,174,586 UART: [idev] CDI.KEYID = 6
1,174,946 UART: [idev] SUBJECT.KEYID = 7
1,175,370 UART: [idev] UDS.KEYID = 0
1,175,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,682 UART: [idev] Erasing UDS.KEYID = 0
1,200,143 UART: [idev] Sha1 KeyId Algorithm
1,208,513 UART: [idev] --
1,209,583 UART: [ldev] ++
1,209,751 UART: [ldev] CDI.KEYID = 6
1,210,114 UART: [ldev] SUBJECT.KEYID = 5
1,210,540 UART: [ldev] AUTHORITY.KEYID = 7
1,211,003 UART: [ldev] FE.KEYID = 1
1,215,927 UART: [ldev] Erasing FE.KEYID = 1
1,242,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,319 UART: [ldev] --
1,281,834 UART: [fwproc] Wait for Commands...
1,282,650 UART: [fwproc] Recv command 0x46574c44
1,283,378 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,794 UART: ROM Fatal Error: 0x000B0003
1,304,951 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,660 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Production
86,090 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
893,679 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,804 UART: [kat] ++
897,956 UART: [kat] sha1
902,128 UART: [kat] SHA2-256
904,068 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,559 UART: [kat] HMAC-384Kdf
923,131 UART: [kat] LMS
1,171,459 UART: [kat] --
1,172,584 UART: [cold-reset] ++
1,173,010 UART: [fht] FHT @ 0x50003400
1,175,777 UART: [idev] ++
1,175,945 UART: [idev] CDI.KEYID = 6
1,176,305 UART: [idev] SUBJECT.KEYID = 7
1,176,729 UART: [idev] UDS.KEYID = 0
1,177,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,715 UART: [idev] Erasing UDS.KEYID = 0
1,201,768 UART: [idev] Sha1 KeyId Algorithm
1,210,412 UART: [idev] --
1,211,288 UART: [ldev] ++
1,211,456 UART: [ldev] CDI.KEYID = 6
1,211,819 UART: [ldev] SUBJECT.KEYID = 5
1,212,245 UART: [ldev] AUTHORITY.KEYID = 7
1,212,708 UART: [ldev] FE.KEYID = 1
1,217,880 UART: [ldev] Erasing FE.KEYID = 1
1,244,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,074 UART: [ldev] --
1,284,463 UART: [fwproc] Wait for Commands...
1,285,237 UART: [fwproc] Recv command 0x46574c44
1,285,965 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,393 UART: ROM Fatal Error: 0x000B0003
1,307,550 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,579 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,063 UART:
192,427 UART: Running Caliptra ROM ...
193,558 UART:
193,704 UART: [state] CFI Enabled
266,936 UART: [state] LifecycleState = Production
268,712 UART: [state] DebugLocked = No
271,884 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,337 UART: [kat] SHA2-256
446,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,577 UART: [kat] ++
457,043 UART: [kat] sha1
466,953 UART: [kat] SHA2-256
469,641 UART: [kat] SHA2-384
475,949 UART: [kat] SHA2-512-ACC
478,352 UART: [kat] ECC-384
2,768,418 UART: [kat] HMAC-384Kdf
2,800,306 UART: [kat] LMS
3,990,630 UART: [kat] --
3,995,717 UART: [cold-reset] ++
3,996,734 UART: [fht] Storing FHT @ 0x50003400
4,008,387 UART: [idev] ++
4,009,015 UART: [idev] CDI.KEYID = 6
4,009,905 UART: [idev] SUBJECT.KEYID = 7
4,011,183 UART: [idev] UDS.KEYID = 0
4,014,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,624 UART: [idev] Erasing UDS.KEYID = 0
7,354,862 UART: [idev] Using Sha1 for KeyId Algorithm
7,376,854 UART: [idev] --
7,380,422 UART: [ldev] ++
7,380,999 UART: [ldev] CDI.KEYID = 6
7,382,022 UART: [ldev] SUBJECT.KEYID = 5
7,383,188 UART: [ldev] AUTHORITY.KEYID = 7
7,384,422 UART: [ldev] FE.KEYID = 1
7,412,258 UART: [ldev] Erasing FE.KEYID = 1
10,744,395 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,038,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,053,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,082,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,253 UART: [ldev] --
13,107,796 UART: [fwproc] Waiting for Commands...
13,109,465 UART: [fwproc] Received command 0x46574c44
13,111,678 UART: [fwproc] Received Image of size 118548 bytes
13,204,908 UART: ROM Fatal Error: 0x000B0005
13,208,377 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,805,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,959,172 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,453 UART:
192,810 UART: Running Caliptra ROM ...
193,914 UART:
603,472 UART: [state] CFI Enabled
617,046 UART: [state] LifecycleState = Production
618,849 UART: [state] DebugLocked = No
620,832 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,125 UART: [kat] SHA2-256
794,850 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,386 UART: [kat] ++
805,987 UART: [kat] sha1
816,123 UART: [kat] SHA2-256
818,814 UART: [kat] SHA2-384
823,986 UART: [kat] SHA2-512-ACC
826,350 UART: [kat] ECC-384
3,110,085 UART: [kat] HMAC-384Kdf
3,123,401 UART: [kat] LMS
4,313,507 UART: [kat] --
4,320,368 UART: [cold-reset] ++
4,321,602 UART: [fht] Storing FHT @ 0x50003400
4,332,606 UART: [idev] ++
4,333,185 UART: [idev] CDI.KEYID = 6
4,334,113 UART: [idev] SUBJECT.KEYID = 7
4,335,333 UART: [idev] UDS.KEYID = 0
4,338,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,216 UART: [idev] Erasing UDS.KEYID = 0
7,625,824 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,759 UART: [idev] --
7,651,552 UART: [ldev] ++
7,652,132 UART: [ldev] CDI.KEYID = 6
7,653,133 UART: [ldev] SUBJECT.KEYID = 5
7,654,306 UART: [ldev] AUTHORITY.KEYID = 7
7,655,608 UART: [ldev] FE.KEYID = 1
7,666,347 UART: [ldev] Erasing FE.KEYID = 1
10,959,559 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,926 UART: [ldev] --
13,319,663 UART: [fwproc] Waiting for Commands...
13,322,096 UART: [fwproc] Received command 0x46574c44
13,324,292 UART: [fwproc] Received Image of size 118548 bytes
13,418,785 UART: ROM Fatal Error: 0x000B0005
13,422,313 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
4,130,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,157,683 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
192,221 UART:
192,573 UART: Running Caliptra ROM ...
193,768 UART:
193,927 UART: [state] CFI Enabled
263,821 UART: [state] LifecycleState = Production
265,682 UART: [state] DebugLocked = No
267,995 UART: [state] WD Timer not started. Device not locked for debugging
271,194 UART: [kat] SHA2-256
450,852 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,645 UART: [kat] ++
462,182 UART: [kat] sha1
472,934 UART: [kat] SHA2-256
475,656 UART: [kat] SHA2-384
480,884 UART: [kat] SHA2-512-ACC
483,230 UART: [kat] ECC-384
2,948,484 UART: [kat] HMAC-384Kdf
2,971,694 UART: [kat] LMS
3,448,217 UART: [kat] --
3,452,116 UART: [cold-reset] ++
3,454,436 UART: [fht] FHT @ 0x50003400
3,466,016 UART: [idev] ++
3,466,616 UART: [idev] CDI.KEYID = 6
3,467,595 UART: [idev] SUBJECT.KEYID = 7
3,468,815 UART: [idev] UDS.KEYID = 0
3,471,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,976 UART: [idev] Erasing UDS.KEYID = 0
5,988,374 UART: [idev] Sha1 KeyId Algorithm
6,011,666 UART: [idev] --
6,016,675 UART: [ldev] ++
6,017,261 UART: [ldev] CDI.KEYID = 6
6,018,157 UART: [ldev] SUBJECT.KEYID = 5
6,019,323 UART: [ldev] AUTHORITY.KEYID = 7
6,020,624 UART: [ldev] FE.KEYID = 1
6,059,340 UART: [ldev] Erasing FE.KEYID = 1
8,569,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,195 UART: [ldev] --
10,374,090 UART: [fwproc] Wait for Commands...
10,377,062 UART: [fwproc] Recv command 0x46574c44
10,379,113 UART: [fwproc] Recv'd Img size: 118548 bytes
10,488,557 UART: ROM Fatal Error: 0x000B0005
10,491,826 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,467,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,377,584 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,576 UART:
192,948 UART: Running Caliptra ROM ...
194,071 UART:
603,614 UART: [state] CFI Enabled
620,255 UART: [state] LifecycleState = Production
622,059 UART: [state] DebugLocked = No
624,857 UART: [state] WD Timer not started. Device not locked for debugging
628,406 UART: [kat] SHA2-256
808,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,822 UART: [kat] ++
819,278 UART: [kat] sha1
830,696 UART: [kat] SHA2-256
833,438 UART: [kat] SHA2-384
838,990 UART: [kat] SHA2-512-ACC
841,391 UART: [kat] ECC-384
3,284,111 UART: [kat] HMAC-384Kdf
3,296,563 UART: [kat] LMS
3,773,080 UART: [kat] --
3,778,356 UART: [cold-reset] ++
3,780,239 UART: [fht] FHT @ 0x50003400
3,792,312 UART: [idev] ++
3,792,943 UART: [idev] CDI.KEYID = 6
3,793,831 UART: [idev] SUBJECT.KEYID = 7
3,795,122 UART: [idev] UDS.KEYID = 0
3,798,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,105 UART: [idev] Erasing UDS.KEYID = 0
6,275,591 UART: [idev] Sha1 KeyId Algorithm
6,300,697 UART: [idev] --
6,305,180 UART: [ldev] ++
6,305,754 UART: [ldev] CDI.KEYID = 6
6,306,643 UART: [ldev] SUBJECT.KEYID = 5
6,307,821 UART: [ldev] AUTHORITY.KEYID = 7
6,309,179 UART: [ldev] FE.KEYID = 1
6,321,529 UART: [ldev] Erasing FE.KEYID = 1
8,804,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,525,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,541,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,557,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,572,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,594,937 UART: [ldev] --
10,599,689 UART: [fwproc] Wait for Commands...
10,602,825 UART: [fwproc] Recv command 0x46574c44
10,604,871 UART: [fwproc] Recv'd Img size: 118548 bytes
10,711,569 UART: ROM Fatal Error: 0x000B0005
10,714,825 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,515 writing to cptra_bootfsm_go
3,781,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,578,103 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,296 UART:
192,653 UART: Running Caliptra ROM ...
193,832 UART:
193,992 UART: [state] CFI Enabled
263,950 UART: [state] LifecycleState = Production
266,149 UART: [state] DebugLocked = No
268,639 UART: [state] WD Timer not started. Device not locked for debugging
272,973 UART: [kat] SHA2-256
462,836 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,596 UART: [kat] ++
474,081 UART: [kat] sha1
485,942 UART: [kat] SHA2-256
488,961 UART: [kat] SHA2-384
495,376 UART: [kat] SHA2-512-ACC
497,995 UART: [kat] ECC-384
2,947,146 UART: [kat] HMAC-384Kdf
2,972,198 UART: [kat] LMS
3,503,980 UART: [kat] --
3,509,456 UART: [cold-reset] ++
3,511,456 UART: [fht] FHT @ 0x50003400
3,522,317 UART: [idev] ++
3,523,006 UART: [idev] CDI.KEYID = 6
3,524,053 UART: [idev] SUBJECT.KEYID = 7
3,525,171 UART: [idev] UDS.KEYID = 0
3,528,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,295 UART: [idev] Erasing UDS.KEYID = 0
6,026,721 UART: [idev] Sha1 KeyId Algorithm
6,049,282 UART: [idev] --
6,054,857 UART: [ldev] ++
6,055,550 UART: [ldev] CDI.KEYID = 6
6,056,479 UART: [ldev] SUBJECT.KEYID = 5
6,057,644 UART: [ldev] AUTHORITY.KEYID = 7
6,058,829 UART: [ldev] FE.KEYID = 1
6,099,514 UART: [ldev] Erasing FE.KEYID = 1
8,603,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,949 UART: [ldev] --
10,411,592 UART: [fwproc] Wait for Commands...
10,413,049 UART: [fwproc] Recv command 0x46574c44
10,415,319 UART: [fwproc] Recv'd Img size: 118548 bytes
10,535,530 UART: ROM Fatal Error: 0x000B0005
10,539,223 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,443,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,342,754 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,608 UART:
192,962 UART: Running Caliptra ROM ...
194,145 UART:
603,642 UART: [state] CFI Enabled
618,070 UART: [state] LifecycleState = Production
620,252 UART: [state] DebugLocked = No
621,958 UART: [state] WD Timer not started. Device not locked for debugging
627,275 UART: [kat] SHA2-256
817,136 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,920 UART: [kat] ++
828,464 UART: [kat] sha1
840,974 UART: [kat] SHA2-256
843,997 UART: [kat] SHA2-384
848,906 UART: [kat] SHA2-512-ACC
851,473 UART: [kat] ECC-384
3,293,116 UART: [kat] HMAC-384Kdf
3,305,091 UART: [kat] LMS
3,836,918 UART: [kat] --
3,841,255 UART: [cold-reset] ++
3,842,551 UART: [fht] FHT @ 0x50003400
3,854,946 UART: [idev] ++
3,855,634 UART: [idev] CDI.KEYID = 6
3,856,602 UART: [idev] SUBJECT.KEYID = 7
3,857,825 UART: [idev] UDS.KEYID = 0
3,860,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,764 UART: [idev] Erasing UDS.KEYID = 0
6,329,286 UART: [idev] Sha1 KeyId Algorithm
6,352,807 UART: [idev] --
6,358,057 UART: [ldev] ++
6,358,750 UART: [ldev] CDI.KEYID = 6
6,359,667 UART: [ldev] SUBJECT.KEYID = 5
6,360,830 UART: [ldev] AUTHORITY.KEYID = 7
6,362,016 UART: [ldev] FE.KEYID = 1
6,371,432 UART: [ldev] Erasing FE.KEYID = 1
8,854,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,816 UART: [ldev] --
10,642,477 UART: [fwproc] Wait for Commands...
10,645,470 UART: [fwproc] Recv command 0x46574c44
10,647,801 UART: [fwproc] Recv'd Img size: 118548 bytes
10,767,317 UART: ROM Fatal Error: 0x000B0005
10,771,004 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,759,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,581,293 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Production
85,543 UART: [state] DebugLocked = No
86,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,819 UART: [kat] SHA2-256
881,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,865 UART: [kat] ++
886,017 UART: [kat] sha1
890,391 UART: [kat] SHA2-256
892,329 UART: [kat] SHA2-384
895,214 UART: [kat] SHA2-512-ACC
897,115 UART: [kat] ECC-384
902,790 UART: [kat] HMAC-384Kdf
907,212 UART: [kat] LMS
1,475,408 UART: [kat] --
1,476,593 UART: [cold-reset] ++
1,477,101 UART: [fht] Storing FHT @ 0x50003400
1,479,916 UART: [idev] ++
1,480,084 UART: [idev] CDI.KEYID = 6
1,480,444 UART: [idev] SUBJECT.KEYID = 7
1,480,868 UART: [idev] UDS.KEYID = 0
1,481,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,692 UART: [idev] Erasing UDS.KEYID = 0
1,505,334 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,832 UART: [idev] --
1,514,741 UART: [ldev] ++
1,514,909 UART: [ldev] CDI.KEYID = 6
1,515,272 UART: [ldev] SUBJECT.KEYID = 5
1,515,698 UART: [ldev] AUTHORITY.KEYID = 7
1,516,161 UART: [ldev] FE.KEYID = 1
1,521,597 UART: [ldev] Erasing FE.KEYID = 1
1,546,682 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,568 UART: [ldev] --
1,585,919 UART: [fwproc] Waiting for Commands...
1,586,562 UART: [fwproc] Received command 0x46574c44
1,587,353 UART: [fwproc] Received Image of size 118548 bytes
1,632,732 UART: ROM Fatal Error: 0x000B0005
1,633,889 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,486,152 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,887 UART: [state] LifecycleState = Production
86,494 UART: [state] DebugLocked = No
87,166 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,876 UART: [kat] SHA2-256
882,807 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,922 UART: [kat] ++
887,074 UART: [kat] sha1
891,508 UART: [kat] SHA2-256
893,446 UART: [kat] SHA2-384
896,303 UART: [kat] SHA2-512-ACC
898,204 UART: [kat] ECC-384
903,661 UART: [kat] HMAC-384Kdf
908,127 UART: [kat] LMS
1,476,323 UART: [kat] --
1,477,078 UART: [cold-reset] ++
1,477,488 UART: [fht] Storing FHT @ 0x50003400
1,480,165 UART: [idev] ++
1,480,333 UART: [idev] CDI.KEYID = 6
1,480,693 UART: [idev] SUBJECT.KEYID = 7
1,481,117 UART: [idev] UDS.KEYID = 0
1,481,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,825 UART: [idev] Erasing UDS.KEYID = 0
1,505,579 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,221 UART: [idev] --
1,515,184 UART: [ldev] ++
1,515,352 UART: [ldev] CDI.KEYID = 6
1,515,715 UART: [ldev] SUBJECT.KEYID = 5
1,516,141 UART: [ldev] AUTHORITY.KEYID = 7
1,516,604 UART: [ldev] FE.KEYID = 1
1,522,122 UART: [ldev] Erasing FE.KEYID = 1
1,548,323 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,699 UART: [ldev] --
1,588,070 UART: [fwproc] Waiting for Commands...
1,588,751 UART: [fwproc] Received command 0x46574c44
1,589,542 UART: [fwproc] Received Image of size 118548 bytes
1,634,341 UART: ROM Fatal Error: 0x000B0005
1,635,498 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,063 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Production
85,553 UART: [state] DebugLocked = No
86,051 UART: [state] WD Timer not started. Device not locked for debugging
87,366 UART: [kat] SHA2-256
890,916 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,020 UART: [kat] ++
895,172 UART: [kat] sha1
899,254 UART: [kat] SHA2-256
901,194 UART: [kat] SHA2-384
904,001 UART: [kat] SHA2-512-ACC
905,902 UART: [kat] ECC-384
915,073 UART: [kat] HMAC-384Kdf
919,653 UART: [kat] LMS
1,167,965 UART: [kat] --
1,168,962 UART: [cold-reset] ++
1,169,332 UART: [fht] FHT @ 0x50003400
1,172,014 UART: [idev] ++
1,172,182 UART: [idev] CDI.KEYID = 6
1,172,543 UART: [idev] SUBJECT.KEYID = 7
1,172,968 UART: [idev] UDS.KEYID = 0
1,173,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,873 UART: [idev] Erasing UDS.KEYID = 0
1,197,653 UART: [idev] Sha1 KeyId Algorithm
1,206,337 UART: [idev] --
1,207,512 UART: [ldev] ++
1,207,680 UART: [ldev] CDI.KEYID = 6
1,208,044 UART: [ldev] SUBJECT.KEYID = 5
1,208,471 UART: [ldev] AUTHORITY.KEYID = 7
1,208,934 UART: [ldev] FE.KEYID = 1
1,214,248 UART: [ldev] Erasing FE.KEYID = 1
1,240,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,196 UART: [ldev] --
1,279,545 UART: [fwproc] Wait for Commands...
1,280,334 UART: [fwproc] Recv command 0x46574c44
1,281,067 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,501 UART: ROM Fatal Error: 0x000B0005
1,326,658 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,555 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Production
86,236 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
891,777 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,881 UART: [kat] ++
896,033 UART: [kat] sha1
900,301 UART: [kat] SHA2-256
902,241 UART: [kat] SHA2-384
905,112 UART: [kat] SHA2-512-ACC
907,013 UART: [kat] ECC-384
917,196 UART: [kat] HMAC-384Kdf
921,994 UART: [kat] LMS
1,170,306 UART: [kat] --
1,171,283 UART: [cold-reset] ++
1,171,691 UART: [fht] FHT @ 0x50003400
1,174,423 UART: [idev] ++
1,174,591 UART: [idev] CDI.KEYID = 6
1,174,952 UART: [idev] SUBJECT.KEYID = 7
1,175,377 UART: [idev] UDS.KEYID = 0
1,175,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,680 UART: [idev] Erasing UDS.KEYID = 0
1,200,638 UART: [idev] Sha1 KeyId Algorithm
1,209,524 UART: [idev] --
1,210,469 UART: [ldev] ++
1,210,637 UART: [ldev] CDI.KEYID = 6
1,211,001 UART: [ldev] SUBJECT.KEYID = 5
1,211,428 UART: [ldev] AUTHORITY.KEYID = 7
1,211,891 UART: [ldev] FE.KEYID = 1
1,217,353 UART: [ldev] Erasing FE.KEYID = 1
1,243,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,159 UART: [ldev] --
1,282,498 UART: [fwproc] Wait for Commands...
1,283,205 UART: [fwproc] Recv command 0x46574c44
1,283,938 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,536 UART: ROM Fatal Error: 0x000B0005
1,329,693 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,550 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Production
85,707 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
893,048 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,173 UART: [kat] ++
897,325 UART: [kat] sha1
901,469 UART: [kat] SHA2-256
903,409 UART: [kat] SHA2-384
906,164 UART: [kat] SHA2-512-ACC
908,065 UART: [kat] ECC-384
917,926 UART: [kat] HMAC-384Kdf
922,430 UART: [kat] LMS
1,170,758 UART: [kat] --
1,171,593 UART: [cold-reset] ++
1,172,173 UART: [fht] FHT @ 0x50003400
1,175,048 UART: [idev] ++
1,175,216 UART: [idev] CDI.KEYID = 6
1,175,576 UART: [idev] SUBJECT.KEYID = 7
1,176,000 UART: [idev] UDS.KEYID = 0
1,176,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,832 UART: [idev] Erasing UDS.KEYID = 0
1,200,693 UART: [idev] Sha1 KeyId Algorithm
1,209,265 UART: [idev] --
1,210,353 UART: [ldev] ++
1,210,521 UART: [ldev] CDI.KEYID = 6
1,210,884 UART: [ldev] SUBJECT.KEYID = 5
1,211,310 UART: [ldev] AUTHORITY.KEYID = 7
1,211,773 UART: [ldev] FE.KEYID = 1
1,217,075 UART: [ldev] Erasing FE.KEYID = 1
1,244,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,321 UART: [ldev] --
1,283,604 UART: [fwproc] Wait for Commands...
1,284,422 UART: [fwproc] Recv command 0x46574c44
1,285,150 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,833 UART: ROM Fatal Error: 0x000B0005
1,330,990 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,715 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Production
86,296 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
893,827 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,952 UART: [kat] ++
898,104 UART: [kat] sha1
902,502 UART: [kat] SHA2-256
904,442 UART: [kat] SHA2-384
907,391 UART: [kat] SHA2-512-ACC
909,292 UART: [kat] ECC-384
918,939 UART: [kat] HMAC-384Kdf
923,597 UART: [kat] LMS
1,171,925 UART: [kat] --
1,173,008 UART: [cold-reset] ++
1,173,552 UART: [fht] FHT @ 0x50003400
1,176,123 UART: [idev] ++
1,176,291 UART: [idev] CDI.KEYID = 6
1,176,651 UART: [idev] SUBJECT.KEYID = 7
1,177,075 UART: [idev] UDS.KEYID = 0
1,177,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,353 UART: [idev] Erasing UDS.KEYID = 0
1,202,072 UART: [idev] Sha1 KeyId Algorithm
1,210,644 UART: [idev] --
1,211,634 UART: [ldev] ++
1,211,802 UART: [ldev] CDI.KEYID = 6
1,212,165 UART: [ldev] SUBJECT.KEYID = 5
1,212,591 UART: [ldev] AUTHORITY.KEYID = 7
1,213,054 UART: [ldev] FE.KEYID = 1
1,218,252 UART: [ldev] Erasing FE.KEYID = 1
1,244,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,200 UART: [ldev] --
1,283,667 UART: [fwproc] Wait for Commands...
1,284,305 UART: [fwproc] Recv command 0x46574c44
1,285,033 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,266 UART: ROM Fatal Error: 0x000B0005
1,331,423 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,286 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,447,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,366,510 >>> mbox cmd response: failed
12,367,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,367,605 >>> mbox cmd response: failed
12,367,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,368,175 >>> mbox cmd response: failed
Initializing fuses
2,060,668 writing to cptra_bootfsm_go
5,516,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,351,820 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
3,446,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,386,363 >>> mbox cmd response: failed
12,387,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,387,487 >>> mbox cmd response: failed
12,387,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,388,135 >>> mbox cmd response: failed
Initializing fuses
2,063,892 writing to cptra_bootfsm_go
5,521,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,341,336 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
3,783,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,594,108 >>> mbox cmd response: failed
12,594,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,595,012 >>> mbox cmd response: failed
12,595,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,595,575 >>> mbox cmd response: failed
Initializing fuses
2,064,343 writing to cptra_bootfsm_go
11,057,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,773,579 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,770,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,578,257 >>> mbox cmd response: failed
12,578,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,579,357 >>> mbox cmd response: failed
12,579,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,579,925 >>> mbox cmd response: failed
Initializing fuses
2,061,662 writing to cptra_bootfsm_go
11,065,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,769,541 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,468,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,369,229 >>> mbox cmd response: failed
12,369,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,370,241 >>> mbox cmd response: failed
12,370,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,370,807 >>> mbox cmd response: failed
Initializing fuses
2,077,175 writing to cptra_bootfsm_go
5,519,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,380,760 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,449,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,373,137 >>> mbox cmd response: failed
12,373,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,374,299 >>> mbox cmd response: failed
12,374,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,374,825 >>> mbox cmd response: failed
Initializing fuses
2,062,531 writing to cptra_bootfsm_go
5,507,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,364,140 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,782,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,588,763 >>> mbox cmd response: failed
12,589,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,589,878 >>> mbox cmd response: failed
12,590,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,590,464 >>> mbox cmd response: failed
Initializing fuses
2,062,038 writing to cptra_bootfsm_go
11,055,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,776,775 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,780,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,580,958 >>> mbox cmd response: failed
12,581,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,582,131 >>> mbox cmd response: failed
12,582,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,582,792 >>> mbox cmd response: failed
Initializing fuses
2,062,052 writing to cptra_bootfsm_go
11,063,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,775,121 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,210,194 >>> mbox cmd response: failed
1,210,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,200 >>> mbox cmd response: failed
1,210,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,087 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,010 UART: [kat] ++
895,162 UART: [kat] sha1
899,220 UART: [kat] SHA2-256
901,160 UART: [kat] SHA2-384
903,911 UART: [kat] SHA2-512-ACC
905,812 UART: [kat] ECC-384
915,343 UART: [kat] HMAC-384Kdf
919,963 UART: [kat] LMS
1,168,275 UART: [kat] --
1,169,398 UART: [cold-reset] ++
1,169,724 UART: [fht] FHT @ 0x50003400
1,172,612 UART: [idev] ++
1,172,780 UART: [idev] CDI.KEYID = 6
1,173,141 UART: [idev] SUBJECT.KEYID = 7
1,173,566 UART: [idev] UDS.KEYID = 0
1,173,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,495 UART: [idev] Erasing UDS.KEYID = 0
1,198,289 UART: [idev] Sha1 KeyId Algorithm
1,207,169 UART: [idev] --
1,208,280 UART: [ldev] ++
1,208,448 UART: [ldev] CDI.KEYID = 6
1,208,812 UART: [ldev] SUBJECT.KEYID = 5
1,209,239 UART: [ldev] AUTHORITY.KEYID = 7
1,209,702 UART: [ldev] FE.KEYID = 1
1,214,990 UART: [ldev] Erasing FE.KEYID = 1
1,241,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,694 UART: [ldev] --
1,280,149 UART: [fwproc] Wait for Commands...
1,280,730 UART: [fwproc] Recv command 0x46574c44
1,281,463 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,708 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,883 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,218 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,210,600 >>> mbox cmd response: failed
1,210,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,606 >>> mbox cmd response: failed
1,210,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,612 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,871 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,210,743 >>> mbox cmd response: failed
1,210,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,749 >>> mbox cmd response: failed
1,210,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,755 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,637 UART: [kat] SHA2-256
891,187 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,617 UART: [kat] SHA2-256
901,557 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
916,046 UART: [kat] HMAC-384Kdf
920,616 UART: [kat] LMS
1,168,928 UART: [kat] --
1,169,861 UART: [cold-reset] ++
1,170,295 UART: [fht] FHT @ 0x50003400
1,172,991 UART: [idev] ++
1,173,159 UART: [idev] CDI.KEYID = 6
1,173,520 UART: [idev] SUBJECT.KEYID = 7
1,173,945 UART: [idev] UDS.KEYID = 0
1,174,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,548 UART: [idev] Erasing UDS.KEYID = 0
1,198,590 UART: [idev] Sha1 KeyId Algorithm
1,207,424 UART: [idev] --
1,208,641 UART: [ldev] ++
1,208,809 UART: [ldev] CDI.KEYID = 6
1,209,173 UART: [ldev] SUBJECT.KEYID = 5
1,209,600 UART: [ldev] AUTHORITY.KEYID = 7
1,210,063 UART: [ldev] FE.KEYID = 1
1,215,399 UART: [ldev] Erasing FE.KEYID = 1
1,241,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,177 UART: [ldev] --
1,280,502 UART: [fwproc] Wait for Commands...
1,281,213 UART: [fwproc] Recv command 0x46574c44
1,281,946 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,547 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,722 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,075 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,212,479 >>> mbox cmd response: failed
1,212,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,212,485 >>> mbox cmd response: failed
1,212,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,212,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,420 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,211,810 >>> mbox cmd response: failed
1,211,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,211,816 >>> mbox cmd response: failed
1,211,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,211,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
893,206 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,331 UART: [kat] ++
897,483 UART: [kat] sha1
901,863 UART: [kat] SHA2-256
903,803 UART: [kat] SHA2-384
906,614 UART: [kat] SHA2-512-ACC
908,515 UART: [kat] ECC-384
918,084 UART: [kat] HMAC-384Kdf
922,608 UART: [kat] LMS
1,170,936 UART: [kat] --
1,171,779 UART: [cold-reset] ++
1,172,313 UART: [fht] FHT @ 0x50003400
1,174,892 UART: [idev] ++
1,175,060 UART: [idev] CDI.KEYID = 6
1,175,420 UART: [idev] SUBJECT.KEYID = 7
1,175,844 UART: [idev] UDS.KEYID = 0
1,176,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,852 UART: [idev] Erasing UDS.KEYID = 0
1,201,113 UART: [idev] Sha1 KeyId Algorithm
1,209,455 UART: [idev] --
1,210,495 UART: [ldev] ++
1,210,663 UART: [ldev] CDI.KEYID = 6
1,211,026 UART: [ldev] SUBJECT.KEYID = 5
1,211,452 UART: [ldev] AUTHORITY.KEYID = 7
1,211,915 UART: [ldev] FE.KEYID = 1
1,217,045 UART: [ldev] Erasing FE.KEYID = 1
1,243,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,725 UART: [ldev] --
1,283,064 UART: [fwproc] Wait for Commands...
1,283,866 UART: [fwproc] Recv command 0x46574c44
1,284,594 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,557 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,727 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,070 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,210,118 >>> mbox cmd response: failed
1,210,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,124 >>> mbox cmd response: failed
1,210,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,130 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,865 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,211,337 >>> mbox cmd response: failed
1,211,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,211,343 >>> mbox cmd response: failed
1,211,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,211,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
87,140 UART: [state] WD Timer not started. Device not locked for debugging
88,453 UART: [kat] SHA2-256
894,103 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,228 UART: [kat] ++
898,380 UART: [kat] sha1
902,764 UART: [kat] SHA2-256
904,704 UART: [kat] SHA2-384
907,507 UART: [kat] SHA2-512-ACC
909,408 UART: [kat] ECC-384
919,397 UART: [kat] HMAC-384Kdf
924,089 UART: [kat] LMS
1,172,417 UART: [kat] --
1,173,166 UART: [cold-reset] ++
1,173,728 UART: [fht] FHT @ 0x50003400
1,176,225 UART: [idev] ++
1,176,393 UART: [idev] CDI.KEYID = 6
1,176,753 UART: [idev] SUBJECT.KEYID = 7
1,177,177 UART: [idev] UDS.KEYID = 0
1,177,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,093 UART: [idev] Erasing UDS.KEYID = 0
1,202,084 UART: [idev] Sha1 KeyId Algorithm
1,210,476 UART: [idev] --
1,211,726 UART: [ldev] ++
1,211,894 UART: [ldev] CDI.KEYID = 6
1,212,257 UART: [ldev] SUBJECT.KEYID = 5
1,212,683 UART: [ldev] AUTHORITY.KEYID = 7
1,213,146 UART: [ldev] FE.KEYID = 1
1,218,060 UART: [ldev] Erasing FE.KEYID = 1
1,244,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,346 UART: [ldev] --
1,283,659 UART: [fwproc] Wait for Commands...
1,284,475 UART: [fwproc] Recv command 0x46574c44
1,285,203 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,534 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,704 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,045 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,212,985 >>> mbox cmd response: failed
1,212,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,212,991 >>> mbox cmd response: failed
1,212,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,212,997 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,986 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,755 writing to cptra_bootfsm_go
193,009 UART:
193,374 UART: Running Caliptra ROM ...
194,459 UART:
194,604 UART: [state] CFI Enabled
266,205 UART: [state] LifecycleState = Unprovisioned
267,976 UART: [state] DebugLocked = No
269,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,822 UART: [kat] SHA2-256
444,520 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,023 UART: [kat] ++
455,475 UART: [kat] sha1
466,520 UART: [kat] SHA2-256
469,206 UART: [kat] SHA2-384
475,615 UART: [kat] SHA2-512-ACC
477,963 UART: [kat] ECC-384
2,769,271 UART: [kat] HMAC-384Kdf
2,800,644 UART: [kat] LMS
3,990,972 UART: [kat] --
3,993,537 UART: [cold-reset] ++
3,995,368 UART: [fht] Storing FHT @ 0x50003400
4,006,470 UART: [idev] ++
4,007,102 UART: [idev] CDI.KEYID = 6
4,008,000 UART: [idev] SUBJECT.KEYID = 7
4,009,233 UART: [idev] UDS.KEYID = 0
4,012,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,341 UART: [idev] Erasing UDS.KEYID = 0
7,349,083 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,046 UART: [idev] --
7,373,844 UART: [ldev] ++
7,374,427 UART: [ldev] CDI.KEYID = 6
7,375,450 UART: [ldev] SUBJECT.KEYID = 5
7,376,612 UART: [ldev] AUTHORITY.KEYID = 7
7,377,848 UART: [ldev] FE.KEYID = 1
7,422,913 UART: [ldev] Erasing FE.KEYID = 1
10,753,797 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,640 UART: [ldev] --
13,117,014 UART: [fwproc] Waiting for Commands...
13,120,100 UART: [fwproc] Received command 0x46574c44
13,122,349 UART: [fwproc] Received Image of size 118548 bytes
16,084,129 UART: ROM Fatal Error: 0x000B0014
16,087,595 >>> mbox cmd response: failed
16,088,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,088,393 >>> mbox cmd response: failed
16,088,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,088,966 >>> mbox cmd response: failed
Initializing fuses
2,056,189 writing to cptra_bootfsm_go
2,245,504 UART:
2,245,880 UART: Running Caliptra ROM ...
2,246,927 UART:
2,247,085 UART: [state] CFI Enabled
2,305,025 UART: [state] LifecycleState = Unprovisioned
2,306,983 UART: [state] DebugLocked = No
2,308,233 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,313,344 UART: [kat] SHA2-256
2,483,064 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,493,590 UART: [kat] ++
2,494,056 UART: [kat] sha1
2,506,296 UART: [kat] SHA2-256
2,508,994 UART: [kat] SHA2-384
2,515,261 UART: [kat] SHA2-512-ACC
2,517,609 UART: [kat] ECC-384
4,808,759 UART: [kat] HMAC-384Kdf
4,841,195 UART: [kat] LMS
6,031,513 UART: [kat] --
6,035,529 UART: [cold-reset] ++
6,037,037 UART: [fht] Storing FHT @ 0x50003400
6,048,256 UART: [idev] ++
6,048,887 UART: [idev] CDI.KEYID = 6
6,049,803 UART: [idev] SUBJECT.KEYID = 7
6,051,021 UART: [idev] UDS.KEYID = 0
6,053,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,202,713 UART: [idev] Erasing UDS.KEYID = 0
9,388,287 UART: [idev] Using Sha1 for KeyId Algorithm
9,409,245 UART: [idev] --
9,413,241 UART: [ldev] ++
9,413,810 UART: [ldev] CDI.KEYID = 6
9,414,750 UART: [ldev] SUBJECT.KEYID = 5
9,416,018 UART: [ldev] AUTHORITY.KEYID = 7
9,417,273 UART: [ldev] FE.KEYID = 1
9,462,750 UART: [ldev] Erasing FE.KEYID = 1
12,791,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,086,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,101,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,116,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,130,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,150,273 UART: [ldev] --
15,154,895 UART: [fwproc] Waiting for Commands...
15,157,590 UART: [fwproc] Received command 0x46574c44
15,159,785 UART: [fwproc] Received Image of size 118548 bytes
19,259,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,337,109 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,410,298 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,738,528 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,080 writing to cptra_bootfsm_go
3,786,357 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,861,943 >>> mbox cmd response: failed
15,862,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,863,076 >>> mbox cmd response: failed
15,863,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,863,718 >>> mbox cmd response: failed
Initializing fuses
2,050,934 writing to cptra_bootfsm_go
5,858,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,009,492 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,547 UART:
192,906 UART: Running Caliptra ROM ...
194,054 UART:
603,953 UART: [state] CFI Enabled
621,454 UART: [state] LifecycleState = Unprovisioned
623,406 UART: [state] DebugLocked = No
624,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,267 UART: [kat] SHA2-256
800,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,595 UART: [kat] ++
811,050 UART: [kat] sha1
822,849 UART: [kat] SHA2-256
825,589 UART: [kat] SHA2-384
832,218 UART: [kat] SHA2-512-ACC
834,568 UART: [kat] ECC-384
3,117,938 UART: [kat] HMAC-384Kdf
3,129,531 UART: [kat] LMS
4,319,640 UART: [kat] --
4,324,576 UART: [cold-reset] ++
4,327,233 UART: [fht] Storing FHT @ 0x50003400
4,339,152 UART: [idev] ++
4,339,733 UART: [idev] CDI.KEYID = 6
4,340,705 UART: [idev] SUBJECT.KEYID = 7
4,341,926 UART: [idev] UDS.KEYID = 0
4,345,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,494,180 UART: [idev] Erasing UDS.KEYID = 0
7,628,103 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,989 UART: [idev] --
7,653,995 UART: [ldev] ++
7,654,570 UART: [ldev] CDI.KEYID = 6
7,655,547 UART: [ldev] SUBJECT.KEYID = 5
7,656,768 UART: [ldev] AUTHORITY.KEYID = 7
7,658,013 UART: [ldev] FE.KEYID = 1
7,670,403 UART: [ldev] Erasing FE.KEYID = 1
10,959,341 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,501 UART: [ldev] --
13,318,234 UART: [fwproc] Waiting for Commands...
13,321,583 UART: [fwproc] Received command 0x46574c44
13,323,774 UART: [fwproc] Received Image of size 118548 bytes
16,280,827 UART: ROM Fatal Error: 0x000B0014
16,284,307 >>> mbox cmd response: failed
16,284,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,285,131 >>> mbox cmd response: failed
16,285,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,285,706 >>> mbox cmd response: failed
Initializing fuses
2,055,939 writing to cptra_bootfsm_go
2,245,297 UART:
2,245,667 UART: Running Caliptra ROM ...
2,246,817 UART:
4,187,860 UART: [state] CFI Enabled
4,202,049 UART: [state] LifecycleState = Unprovisioned
4,203,974 UART: [state] DebugLocked = No
4,205,772 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,210,456 UART: [kat] SHA2-256
4,380,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,390,735 UART: [kat] ++
4,391,196 UART: [kat] sha1
4,402,036 UART: [kat] SHA2-256
4,404,755 UART: [kat] SHA2-384
4,410,646 UART: [kat] SHA2-512-ACC
4,413,005 UART: [kat] ECC-384
6,697,474 UART: [kat] HMAC-384Kdf
6,710,030 UART: [kat] LMS
7,900,149 UART: [kat] --
7,904,141 UART: [cold-reset] ++
7,906,451 UART: [fht] Storing FHT @ 0x50003400
7,918,045 UART: [idev] ++
7,918,618 UART: [idev] CDI.KEYID = 6
7,919,559 UART: [idev] SUBJECT.KEYID = 7
7,920,836 UART: [idev] UDS.KEYID = 0
7,923,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,072,052 UART: [idev] Erasing UDS.KEYID = 0
11,207,918 UART: [idev] Using Sha1 for KeyId Algorithm
11,229,728 UART: [idev] --
11,233,397 UART: [ldev] ++
11,233,983 UART: [ldev] CDI.KEYID = 6
11,234,867 UART: [ldev] SUBJECT.KEYID = 5
11,236,114 UART: [ldev] AUTHORITY.KEYID = 7
11,237,410 UART: [ldev] FE.KEYID = 1
11,249,278 UART: [ldev] Erasing FE.KEYID = 1
14,536,604 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,831,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,846,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,861,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,875,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,894,511 UART: [ldev] --
16,899,728 UART: [fwproc] Waiting for Commands...
16,902,314 UART: [fwproc] Received command 0x46574c44
16,904,508 UART: [fwproc] Received Image of size 118548 bytes
21,008,294 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,083,540 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,156,725 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,485,101 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
4,135,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,069,935 >>> mbox cmd response: failed
16,070,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,071,308 >>> mbox cmd response: failed
16,071,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,071,905 >>> mbox cmd response: failed
Initializing fuses
2,049,104 writing to cptra_bootfsm_go
7,929,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,961,137 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,074 UART:
192,453 UART: Running Caliptra ROM ...
193,555 UART:
193,700 UART: [state] CFI Enabled
266,892 UART: [state] LifecycleState = Unprovisioned
268,837 UART: [state] DebugLocked = No
271,436 UART: [state] WD Timer not started. Device not locked for debugging
275,391 UART: [kat] SHA2-256
455,008 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,816 UART: [kat] ++
466,360 UART: [kat] sha1
478,059 UART: [kat] SHA2-256
480,758 UART: [kat] SHA2-384
487,496 UART: [kat] SHA2-512-ACC
489,860 UART: [kat] ECC-384
2,947,535 UART: [kat] HMAC-384Kdf
2,972,917 UART: [kat] LMS
3,449,400 UART: [kat] --
3,453,365 UART: [cold-reset] ++
3,454,712 UART: [fht] FHT @ 0x50003400
3,465,839 UART: [idev] ++
3,466,449 UART: [idev] CDI.KEYID = 6
3,467,341 UART: [idev] SUBJECT.KEYID = 7
3,468,618 UART: [idev] UDS.KEYID = 0
3,471,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,975 UART: [idev] Erasing UDS.KEYID = 0
5,986,868 UART: [idev] Sha1 KeyId Algorithm
6,010,821 UART: [idev] --
6,014,177 UART: [ldev] ++
6,014,756 UART: [ldev] CDI.KEYID = 6
6,015,699 UART: [ldev] SUBJECT.KEYID = 5
6,018,008 UART: [ldev] AUTHORITY.KEYID = 7
6,019,221 UART: [ldev] FE.KEYID = 1
6,058,651 UART: [ldev] Erasing FE.KEYID = 1
8,565,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,630 UART: [ldev] --
10,377,824 UART: [fwproc] Wait for Commands...
10,380,851 UART: [fwproc] Recv command 0x46574c44
10,382,845 UART: [fwproc] Recv'd Img size: 118548 bytes
12,701,428 UART: ROM Fatal Error: 0x000B0014
12,704,662 >>> mbox cmd response: failed
12,705,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,705,312 >>> mbox cmd response: failed
12,705,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,705,920 >>> mbox cmd response: failed
Initializing fuses
2,059,846 writing to cptra_bootfsm_go
2,249,117 UART:
2,249,464 UART: Running Caliptra ROM ...
2,250,543 UART:
2,250,701 UART: [state] CFI Enabled
2,320,400 UART: [state] LifecycleState = Unprovisioned
2,322,340 UART: [state] DebugLocked = No
2,324,549 UART: [state] WD Timer not started. Device not locked for debugging
2,328,087 UART: [kat] SHA2-256
2,507,788 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,518,551 UART: [kat] ++
2,519,104 UART: [kat] sha1
2,530,706 UART: [kat] SHA2-256
2,533,401 UART: [kat] SHA2-384
2,539,336 UART: [kat] SHA2-512-ACC
2,541,689 UART: [kat] ECC-384
5,004,745 UART: [kat] HMAC-384Kdf
5,027,313 UART: [kat] LMS
5,503,802 UART: [kat] --
5,506,472 UART: [cold-reset] ++
5,509,064 UART: [fht] FHT @ 0x50003400
5,520,706 UART: [idev] ++
5,521,278 UART: [idev] CDI.KEYID = 6
5,522,301 UART: [idev] SUBJECT.KEYID = 7
5,523,466 UART: [idev] UDS.KEYID = 0
5,526,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,675,448 UART: [idev] Erasing UDS.KEYID = 0
8,043,601 UART: [idev] Sha1 KeyId Algorithm
8,066,672 UART: [idev] --
8,072,562 UART: [ldev] ++
8,073,139 UART: [ldev] CDI.KEYID = 6
8,074,057 UART: [ldev] SUBJECT.KEYID = 5
8,075,282 UART: [ldev] AUTHORITY.KEYID = 7
8,076,523 UART: [ldev] FE.KEYID = 1
8,113,431 UART: [ldev] Erasing FE.KEYID = 1
10,618,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,355,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,371,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,387,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,402,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,424,842 UART: [ldev] --
12,430,617 UART: [fwproc] Wait for Commands...
12,432,494 UART: [fwproc] Recv command 0x46574c44
12,434,500 UART: [fwproc] Recv'd Img size: 118548 bytes
15,910,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,986,438 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,059,456 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,387,640 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,464,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,597,185 >>> mbox cmd response: failed
12,597,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,598,175 >>> mbox cmd response: failed
12,598,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,598,755 >>> mbox cmd response: failed
Initializing fuses
2,059,391 writing to cptra_bootfsm_go
5,518,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,270,386 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,529 UART:
192,895 UART: Running Caliptra ROM ...
194,017 UART:
603,746 UART: [state] CFI Enabled
617,689 UART: [state] LifecycleState = Unprovisioned
619,603 UART: [state] DebugLocked = No
621,642 UART: [state] WD Timer not started. Device not locked for debugging
626,247 UART: [kat] SHA2-256
805,876 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,667 UART: [kat] ++
817,121 UART: [kat] sha1
828,433 UART: [kat] SHA2-256
831,128 UART: [kat] SHA2-384
837,125 UART: [kat] SHA2-512-ACC
839,471 UART: [kat] ECC-384
3,282,777 UART: [kat] HMAC-384Kdf
3,294,788 UART: [kat] LMS
3,771,278 UART: [kat] --
3,775,492 UART: [cold-reset] ++
3,777,266 UART: [fht] FHT @ 0x50003400
3,789,655 UART: [idev] ++
3,790,277 UART: [idev] CDI.KEYID = 6
3,791,164 UART: [idev] SUBJECT.KEYID = 7
3,792,469 UART: [idev] UDS.KEYID = 0
3,795,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,560 UART: [idev] Erasing UDS.KEYID = 0
6,269,725 UART: [idev] Sha1 KeyId Algorithm
6,294,468 UART: [idev] --
6,298,985 UART: [ldev] ++
6,299,570 UART: [ldev] CDI.KEYID = 6
6,300,506 UART: [ldev] SUBJECT.KEYID = 5
6,301,614 UART: [ldev] AUTHORITY.KEYID = 7
6,302,958 UART: [ldev] FE.KEYID = 1
6,315,988 UART: [ldev] Erasing FE.KEYID = 1
8,793,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,865 UART: [ldev] --
10,590,866 UART: [fwproc] Wait for Commands...
10,594,001 UART: [fwproc] Recv command 0x46574c44
10,596,011 UART: [fwproc] Recv'd Img size: 118548 bytes
12,917,340 UART: ROM Fatal Error: 0x000B0014
12,920,570 >>> mbox cmd response: failed
12,920,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,261 >>> mbox cmd response: failed
12,921,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,938 >>> mbox cmd response: failed
Initializing fuses
2,058,370 writing to cptra_bootfsm_go
2,247,672 UART:
2,248,030 UART: Running Caliptra ROM ...
2,249,080 UART:
7,550,259 UART: [state] CFI Enabled
7,564,774 UART: [state] LifecycleState = Unprovisioned
7,566,692 UART: [state] DebugLocked = No
7,568,251 UART: [state] WD Timer not started. Device not locked for debugging
7,571,999 UART: [kat] SHA2-256
7,751,660 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,762,465 UART: [kat] ++
7,763,015 UART: [kat] sha1
7,772,409 UART: [kat] SHA2-256
7,775,115 UART: [kat] SHA2-384
7,780,781 UART: [kat] SHA2-512-ACC
7,783,145 UART: [kat] ECC-384
10,222,524 UART: [kat] HMAC-384Kdf
10,235,450 UART: [kat] LMS
10,711,959 UART: [kat] --
10,715,808 UART: [cold-reset] ++
10,718,127 UART: [fht] FHT @ 0x50003400
10,729,540 UART: [idev] ++
10,730,108 UART: [idev] CDI.KEYID = 6
10,731,078 UART: [idev] SUBJECT.KEYID = 7
10,732,296 UART: [idev] UDS.KEYID = 0
10,735,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,884,347 UART: [idev] Erasing UDS.KEYID = 0
13,214,032 UART: [idev] Sha1 KeyId Algorithm
13,238,561 UART: [idev] --
13,244,065 UART: [ldev] ++
13,244,640 UART: [ldev] CDI.KEYID = 6
13,245,550 UART: [ldev] SUBJECT.KEYID = 5
13,246,765 UART: [ldev] AUTHORITY.KEYID = 7
13,248,003 UART: [ldev] FE.KEYID = 1
13,258,391 UART: [ldev] Erasing FE.KEYID = 1
15,741,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,463,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,479,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,495,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,511,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,533,185 UART: [ldev] --
17,539,294 UART: [fwproc] Wait for Commands...
17,541,400 UART: [fwproc] Recv command 0x46574c44
17,543,448 UART: [fwproc] Recv'd Img size: 118548 bytes
21,022,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,098,994 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,172,064 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,500,585 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
3,780,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,788,799 >>> mbox cmd response: failed
12,789,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,789,684 >>> mbox cmd response: failed
12,789,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,790,250 >>> mbox cmd response: failed
Initializing fuses
2,057,769 writing to cptra_bootfsm_go
10,856,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,528,653 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,212 UART:
192,574 UART: Running Caliptra ROM ...
193,727 UART:
193,880 UART: [state] CFI Enabled
265,150 UART: [state] LifecycleState = Unprovisioned
267,576 UART: [state] DebugLocked = No
269,829 UART: [state] WD Timer not started. Device not locked for debugging
273,961 UART: [kat] SHA2-256
463,852 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,622 UART: [kat] ++
475,103 UART: [kat] sha1
487,826 UART: [kat] SHA2-256
490,854 UART: [kat] SHA2-384
496,956 UART: [kat] SHA2-512-ACC
499,558 UART: [kat] ECC-384
2,946,890 UART: [kat] HMAC-384Kdf
2,972,668 UART: [kat] LMS
3,504,418 UART: [kat] --
3,508,276 UART: [cold-reset] ++
3,509,352 UART: [fht] FHT @ 0x50003400
3,522,337 UART: [idev] ++
3,523,013 UART: [idev] CDI.KEYID = 6
3,523,958 UART: [idev] SUBJECT.KEYID = 7
3,525,173 UART: [idev] UDS.KEYID = 0
3,527,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,212 UART: [idev] Erasing UDS.KEYID = 0
6,031,715 UART: [idev] Sha1 KeyId Algorithm
6,054,166 UART: [idev] --
6,058,444 UART: [ldev] ++
6,059,130 UART: [ldev] CDI.KEYID = 6
6,060,018 UART: [ldev] SUBJECT.KEYID = 5
6,061,187 UART: [ldev] AUTHORITY.KEYID = 7
6,062,427 UART: [ldev] FE.KEYID = 1
6,100,260 UART: [ldev] Erasing FE.KEYID = 1
8,606,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,809 UART: [ldev] --
10,415,902 UART: [fwproc] Wait for Commands...
10,417,510 UART: [fwproc] Recv command 0x46574c44
10,419,788 UART: [fwproc] Recv'd Img size: 118548 bytes
12,758,649 UART: ROM Fatal Error: 0x000B0014
12,762,328 >>> mbox cmd response: failed
12,762,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,763,096 >>> mbox cmd response: failed
12,763,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,763,666 >>> mbox cmd response: failed
Initializing fuses
2,059,931 writing to cptra_bootfsm_go
2,249,248 UART:
2,249,603 UART: Running Caliptra ROM ...
2,250,743 UART:
2,250,915 UART: [state] CFI Enabled
2,323,900 UART: [state] LifecycleState = Unprovisioned
2,326,338 UART: [state] DebugLocked = No
2,328,710 UART: [state] WD Timer not started. Device not locked for debugging
2,333,453 UART: [kat] SHA2-256
2,523,314 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,534,077 UART: [kat] ++
2,534,599 UART: [kat] sha1
2,545,984 UART: [kat] SHA2-256
2,549,030 UART: [kat] SHA2-384
2,555,688 UART: [kat] SHA2-512-ACC
2,558,267 UART: [kat] ECC-384
5,009,402 UART: [kat] HMAC-384Kdf
5,033,377 UART: [kat] LMS
5,565,164 UART: [kat] --
5,570,452 UART: [cold-reset] ++
5,573,081 UART: [fht] FHT @ 0x50003400
5,584,732 UART: [idev] ++
5,585,418 UART: [idev] CDI.KEYID = 6
5,586,395 UART: [idev] SUBJECT.KEYID = 7
5,587,564 UART: [idev] UDS.KEYID = 0
5,590,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,740,300 UART: [idev] Erasing UDS.KEYID = 0
8,091,494 UART: [idev] Sha1 KeyId Algorithm
8,115,502 UART: [idev] --
8,119,028 UART: [ldev] ++
8,119,732 UART: [ldev] CDI.KEYID = 6
8,120,651 UART: [ldev] SUBJECT.KEYID = 5
8,121,820 UART: [ldev] AUTHORITY.KEYID = 7
8,123,060 UART: [ldev] FE.KEYID = 1
8,161,059 UART: [ldev] Erasing FE.KEYID = 1
10,667,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,403,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,418,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,433,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,448,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,468,729 UART: [ldev] --
12,474,322 UART: [fwproc] Wait for Commands...
12,476,979 UART: [fwproc] Recv command 0x46574c44
12,479,251 UART: [fwproc] Recv'd Img size: 118548 bytes
15,982,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,061,011 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,184,636 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,744,687 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,440,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,665,082 >>> mbox cmd response: failed
12,665,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,666,068 >>> mbox cmd response: failed
12,666,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,666,636 >>> mbox cmd response: failed
Initializing fuses
2,057,668 writing to cptra_bootfsm_go
5,472,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,855,976 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,532 UART:
192,885 UART: Running Caliptra ROM ...
193,981 UART:
603,646 UART: [state] CFI Enabled
616,927 UART: [state] LifecycleState = Unprovisioned
619,260 UART: [state] DebugLocked = No
620,662 UART: [state] WD Timer not started. Device not locked for debugging
624,361 UART: [kat] SHA2-256
814,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,826 UART: [kat] ++
825,428 UART: [kat] sha1
837,727 UART: [kat] SHA2-256
840,745 UART: [kat] SHA2-384
846,896 UART: [kat] SHA2-512-ACC
849,464 UART: [kat] ECC-384
3,290,194 UART: [kat] HMAC-384Kdf
3,304,869 UART: [kat] LMS
3,836,709 UART: [kat] --
3,840,597 UART: [cold-reset] ++
3,842,319 UART: [fht] FHT @ 0x50003400
3,854,013 UART: [idev] ++
3,854,700 UART: [idev] CDI.KEYID = 6
3,855,662 UART: [idev] SUBJECT.KEYID = 7
3,856,880 UART: [idev] UDS.KEYID = 0
3,859,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,801 UART: [idev] Erasing UDS.KEYID = 0
6,332,325 UART: [idev] Sha1 KeyId Algorithm
6,354,575 UART: [idev] --
6,359,466 UART: [ldev] ++
6,360,162 UART: [ldev] CDI.KEYID = 6
6,361,079 UART: [ldev] SUBJECT.KEYID = 5
6,362,304 UART: [ldev] AUTHORITY.KEYID = 7
6,363,485 UART: [ldev] FE.KEYID = 1
6,373,435 UART: [ldev] Erasing FE.KEYID = 1
8,852,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,099 UART: [ldev] --
10,644,697 UART: [fwproc] Wait for Commands...
10,646,372 UART: [fwproc] Recv command 0x46574c44
10,648,643 UART: [fwproc] Recv'd Img size: 118548 bytes
12,982,402 UART: ROM Fatal Error: 0x000B0014
12,986,023 >>> mbox cmd response: failed
12,986,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,986,742 >>> mbox cmd response: failed
12,987,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,987,441 >>> mbox cmd response: failed
Initializing fuses
2,060,033 writing to cptra_bootfsm_go
2,249,375 UART:
2,249,724 UART: Running Caliptra ROM ...
2,250,869 UART:
7,479,864 UART: [state] CFI Enabled
7,499,053 UART: [state] LifecycleState = Unprovisioned
7,501,416 UART: [state] DebugLocked = No
7,502,949 UART: [state] WD Timer not started. Device not locked for debugging
7,507,629 UART: [kat] SHA2-256
7,697,536 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,708,281 UART: [kat] ++
7,708,801 UART: [kat] sha1
7,721,638 UART: [kat] SHA2-256
7,724,671 UART: [kat] SHA2-384
7,730,018 UART: [kat] SHA2-512-ACC
7,732,598 UART: [kat] ECC-384
10,172,804 UART: [kat] HMAC-384Kdf
10,185,500 UART: [kat] LMS
10,717,346 UART: [kat] --
10,722,576 UART: [cold-reset] ++
10,724,621 UART: [fht] FHT @ 0x50003400
10,737,057 UART: [idev] ++
10,737,731 UART: [idev] CDI.KEYID = 6
10,738,671 UART: [idev] SUBJECT.KEYID = 7
10,739,882 UART: [idev] UDS.KEYID = 0
10,742,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,891,233 UART: [idev] Erasing UDS.KEYID = 0
13,217,040 UART: [idev] Sha1 KeyId Algorithm
13,239,855 UART: [idev] --
13,244,121 UART: [ldev] ++
13,244,807 UART: [ldev] CDI.KEYID = 6
13,245,746 UART: [ldev] SUBJECT.KEYID = 5
13,246,905 UART: [ldev] AUTHORITY.KEYID = 7
13,248,157 UART: [ldev] FE.KEYID = 1
13,259,459 UART: [ldev] Erasing FE.KEYID = 1
15,738,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,456,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,472,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,487,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,502,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,522,411 UART: [ldev] --
17,528,446 UART: [fwproc] Wait for Commands...
17,531,253 UART: [fwproc] Recv command 0x46574c44
17,533,520 UART: [fwproc] Recv'd Img size: 118548 bytes
21,030,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,110,841 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,234,464 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,794,732 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,756,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,888,697 >>> mbox cmd response: failed
12,889,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,889,768 >>> mbox cmd response: failed
12,890,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,890,365 >>> mbox cmd response: failed
Initializing fuses
2,053,860 writing to cptra_bootfsm_go
10,735,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,024,784 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,243 UART: [kat] SHA2-256
882,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,289 UART: [kat] ++
886,441 UART: [kat] sha1
890,719 UART: [kat] SHA2-256
892,657 UART: [kat] SHA2-384
895,488 UART: [kat] SHA2-512-ACC
897,389 UART: [kat] ECC-384
902,992 UART: [kat] HMAC-384Kdf
907,522 UART: [kat] LMS
1,475,718 UART: [kat] --
1,476,645 UART: [cold-reset] ++
1,476,991 UART: [fht] Storing FHT @ 0x50003400
1,479,956 UART: [idev] ++
1,480,124 UART: [idev] CDI.KEYID = 6
1,480,484 UART: [idev] SUBJECT.KEYID = 7
1,480,908 UART: [idev] UDS.KEYID = 0
1,481,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,006 UART: [idev] Erasing UDS.KEYID = 0
1,505,714 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,410 UART: [idev] --
1,515,449 UART: [ldev] ++
1,515,617 UART: [ldev] CDI.KEYID = 6
1,515,980 UART: [ldev] SUBJECT.KEYID = 5
1,516,406 UART: [ldev] AUTHORITY.KEYID = 7
1,516,869 UART: [ldev] FE.KEYID = 1
1,521,955 UART: [ldev] Erasing FE.KEYID = 1
1,547,222 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,326 UART: [ldev] --
1,586,601 UART: [fwproc] Waiting for Commands...
1,587,226 UART: [fwproc] Received command 0x46574c44
1,588,017 UART: [fwproc] Received Image of size 118548 bytes
1,866,896 UART: ROM Fatal Error: 0x000B0014
1,868,053 >>> mbox cmd response: failed
1,868,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,059 >>> mbox cmd response: failed
1,868,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,161 UART: [kat] SHA2-256
882,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,207 UART: [kat] ++
886,359 UART: [kat] sha1
890,715 UART: [kat] SHA2-256
892,653 UART: [kat] SHA2-384
895,396 UART: [kat] SHA2-512-ACC
897,297 UART: [kat] ECC-384
902,814 UART: [kat] HMAC-384Kdf
907,556 UART: [kat] LMS
1,475,752 UART: [kat] --
1,476,757 UART: [cold-reset] ++
1,477,241 UART: [fht] Storing FHT @ 0x50003400
1,480,082 UART: [idev] ++
1,480,250 UART: [idev] CDI.KEYID = 6
1,480,610 UART: [idev] SUBJECT.KEYID = 7
1,481,034 UART: [idev] UDS.KEYID = 0
1,481,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,886 UART: [idev] Erasing UDS.KEYID = 0
1,505,304 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,960 UART: [idev] --
1,515,015 UART: [ldev] ++
1,515,183 UART: [ldev] CDI.KEYID = 6
1,515,546 UART: [ldev] SUBJECT.KEYID = 5
1,515,972 UART: [ldev] AUTHORITY.KEYID = 7
1,516,435 UART: [ldev] FE.KEYID = 1
1,521,533 UART: [ldev] Erasing FE.KEYID = 1
1,545,948 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,838 UART: [ldev] --
1,585,305 UART: [fwproc] Waiting for Commands...
1,586,172 UART: [fwproc] Received command 0x46574c44
1,586,963 UART: [fwproc] Received Image of size 118548 bytes
2,931,420 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,250 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,468 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,665 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,719,524 >>> mbox cmd response: failed
1,719,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,530 >>> mbox cmd response: failed
1,719,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,001 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,246 UART: [kat] SHA2-256
882,177 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,292 UART: [kat] ++
886,444 UART: [kat] sha1
890,844 UART: [kat] SHA2-256
892,782 UART: [kat] SHA2-384
895,363 UART: [kat] SHA2-512-ACC
897,264 UART: [kat] ECC-384
902,789 UART: [kat] HMAC-384Kdf
907,451 UART: [kat] LMS
1,475,647 UART: [kat] --
1,476,518 UART: [cold-reset] ++
1,476,992 UART: [fht] Storing FHT @ 0x50003400
1,479,717 UART: [idev] ++
1,479,885 UART: [idev] CDI.KEYID = 6
1,480,245 UART: [idev] SUBJECT.KEYID = 7
1,480,669 UART: [idev] UDS.KEYID = 0
1,481,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,835 UART: [idev] Erasing UDS.KEYID = 0
1,506,021 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,573 UART: [idev] --
1,515,470 UART: [ldev] ++
1,515,638 UART: [ldev] CDI.KEYID = 6
1,516,001 UART: [ldev] SUBJECT.KEYID = 5
1,516,427 UART: [ldev] AUTHORITY.KEYID = 7
1,516,890 UART: [ldev] FE.KEYID = 1
1,522,312 UART: [ldev] Erasing FE.KEYID = 1
1,547,475 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,503 UART: [ldev] --
1,586,960 UART: [fwproc] Waiting for Commands...
1,587,793 UART: [fwproc] Received command 0x46574c44
1,588,584 UART: [fwproc] Received Image of size 118548 bytes
1,866,573 UART: ROM Fatal Error: 0x000B0014
1,867,730 >>> mbox cmd response: failed
1,867,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,736 >>> mbox cmd response: failed
1,867,736 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,742 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,408 UART: [kat] SHA2-256
882,339 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,454 UART: [kat] ++
886,606 UART: [kat] sha1
890,844 UART: [kat] SHA2-256
892,782 UART: [kat] SHA2-384
895,439 UART: [kat] SHA2-512-ACC
897,340 UART: [kat] ECC-384
902,891 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,704 UART: [cold-reset] ++
1,477,112 UART: [fht] Storing FHT @ 0x50003400
1,479,735 UART: [idev] ++
1,479,903 UART: [idev] CDI.KEYID = 6
1,480,263 UART: [idev] SUBJECT.KEYID = 7
1,480,687 UART: [idev] UDS.KEYID = 0
1,481,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,735 UART: [idev] Erasing UDS.KEYID = 0
1,505,747 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,471 UART: [idev] --
1,515,586 UART: [ldev] ++
1,515,754 UART: [ldev] CDI.KEYID = 6
1,516,117 UART: [ldev] SUBJECT.KEYID = 5
1,516,543 UART: [ldev] AUTHORITY.KEYID = 7
1,517,006 UART: [ldev] FE.KEYID = 1
1,522,130 UART: [ldev] Erasing FE.KEYID = 1
1,547,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,657 UART: [ldev] --
1,586,966 UART: [fwproc] Waiting for Commands...
1,587,769 UART: [fwproc] Received command 0x46574c44
1,588,560 UART: [fwproc] Received Image of size 118548 bytes
2,931,909 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,143 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,361 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,558 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,721,907 >>> mbox cmd response: failed
1,721,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,913 >>> mbox cmd response: failed
1,721,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,470 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,290 UART: [kat] ++
895,442 UART: [kat] sha1
899,646 UART: [kat] SHA2-256
901,586 UART: [kat] SHA2-384
904,267 UART: [kat] SHA2-512-ACC
906,168 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,170,192 UART: [cold-reset] ++
1,170,678 UART: [fht] FHT @ 0x50003400
1,173,254 UART: [idev] ++
1,173,422 UART: [idev] CDI.KEYID = 6
1,173,783 UART: [idev] SUBJECT.KEYID = 7
1,174,208 UART: [idev] UDS.KEYID = 0
1,174,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,305 UART: [idev] Erasing UDS.KEYID = 0
1,199,707 UART: [idev] Sha1 KeyId Algorithm
1,208,435 UART: [idev] --
1,209,590 UART: [ldev] ++
1,209,758 UART: [ldev] CDI.KEYID = 6
1,210,122 UART: [ldev] SUBJECT.KEYID = 5
1,210,549 UART: [ldev] AUTHORITY.KEYID = 7
1,211,012 UART: [ldev] FE.KEYID = 1
1,216,010 UART: [ldev] Erasing FE.KEYID = 1
1,241,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,312 UART: [ldev] --
1,281,727 UART: [fwproc] Wait for Commands...
1,282,354 UART: [fwproc] Recv command 0x46574c44
1,283,087 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,832 UART: ROM Fatal Error: 0x000B0014
1,562,989 >>> mbox cmd response: failed
1,562,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,995 >>> mbox cmd response: failed
1,562,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,001 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Unprovisioned
85,511 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,268 UART: [kat] SHA2-256
890,818 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,922 UART: [kat] ++
895,074 UART: [kat] sha1
899,100 UART: [kat] SHA2-256
901,040 UART: [kat] SHA2-384
903,641 UART: [kat] SHA2-512-ACC
905,542 UART: [kat] ECC-384
915,367 UART: [kat] HMAC-384Kdf
919,841 UART: [kat] LMS
1,168,153 UART: [kat] --
1,169,014 UART: [cold-reset] ++
1,169,442 UART: [fht] FHT @ 0x50003400
1,172,156 UART: [idev] ++
1,172,324 UART: [idev] CDI.KEYID = 6
1,172,685 UART: [idev] SUBJECT.KEYID = 7
1,173,110 UART: [idev] UDS.KEYID = 0
1,173,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,127 UART: [idev] Erasing UDS.KEYID = 0
1,197,353 UART: [idev] Sha1 KeyId Algorithm
1,206,289 UART: [idev] --
1,207,456 UART: [ldev] ++
1,207,624 UART: [ldev] CDI.KEYID = 6
1,207,988 UART: [ldev] SUBJECT.KEYID = 5
1,208,415 UART: [ldev] AUTHORITY.KEYID = 7
1,208,878 UART: [ldev] FE.KEYID = 1
1,213,966 UART: [ldev] Erasing FE.KEYID = 1
1,240,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,538 UART: [ldev] --
1,279,847 UART: [fwproc] Wait for Commands...
1,280,452 UART: [fwproc] Recv command 0x46574c44
1,281,185 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,564 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,739 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,960 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,444 >>> mbox cmd response: failed
1,416,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,416,450 >>> mbox cmd response: failed
1,416,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,416,456 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,411 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
891,411 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
916,352 UART: [kat] HMAC-384Kdf
921,140 UART: [kat] LMS
1,169,452 UART: [kat] --
1,170,115 UART: [cold-reset] ++
1,170,619 UART: [fht] FHT @ 0x50003400
1,173,235 UART: [idev] ++
1,173,403 UART: [idev] CDI.KEYID = 6
1,173,764 UART: [idev] SUBJECT.KEYID = 7
1,174,189 UART: [idev] UDS.KEYID = 0
1,174,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,192 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,446 UART: [idev] --
1,209,429 UART: [ldev] ++
1,209,597 UART: [ldev] CDI.KEYID = 6
1,209,961 UART: [ldev] SUBJECT.KEYID = 5
1,210,388 UART: [ldev] AUTHORITY.KEYID = 7
1,210,851 UART: [ldev] FE.KEYID = 1
1,216,035 UART: [ldev] Erasing FE.KEYID = 1
1,242,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,251 UART: [ldev] --
1,281,580 UART: [fwproc] Wait for Commands...
1,282,329 UART: [fwproc] Recv command 0x46574c44
1,283,062 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,709 UART: ROM Fatal Error: 0x000B0014
1,563,866 >>> mbox cmd response: failed
1,563,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,872 >>> mbox cmd response: failed
1,563,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
891,175 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
921,012 UART: [kat] LMS
1,169,324 UART: [kat] --
1,170,283 UART: [cold-reset] ++
1,170,797 UART: [fht] FHT @ 0x50003400
1,173,531 UART: [idev] ++
1,173,699 UART: [idev] CDI.KEYID = 6
1,174,060 UART: [idev] SUBJECT.KEYID = 7
1,174,485 UART: [idev] UDS.KEYID = 0
1,174,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,199,164 UART: [idev] Sha1 KeyId Algorithm
1,208,136 UART: [idev] --
1,209,207 UART: [ldev] ++
1,209,375 UART: [ldev] CDI.KEYID = 6
1,209,739 UART: [ldev] SUBJECT.KEYID = 5
1,210,166 UART: [ldev] AUTHORITY.KEYID = 7
1,210,629 UART: [ldev] FE.KEYID = 1
1,215,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,175 UART: [ldev] --
1,281,590 UART: [fwproc] Wait for Commands...
1,282,291 UART: [fwproc] Recv command 0x46574c44
1,283,024 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,239 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,414 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,651 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,517 >>> mbox cmd response: failed
1,418,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,523 >>> mbox cmd response: failed
1,418,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,529 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,804 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,620 UART: [state] LifecycleState = Unprovisioned
86,275 UART: [state] DebugLocked = No
86,881 UART: [state] WD Timer not started. Device not locked for debugging
88,234 UART: [kat] SHA2-256
893,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,009 UART: [kat] ++
898,161 UART: [kat] sha1
902,413 UART: [kat] SHA2-256
904,353 UART: [kat] SHA2-384
907,106 UART: [kat] SHA2-512-ACC
909,007 UART: [kat] ECC-384
918,826 UART: [kat] HMAC-384Kdf
923,520 UART: [kat] LMS
1,171,848 UART: [kat] --
1,172,863 UART: [cold-reset] ++
1,173,253 UART: [fht] FHT @ 0x50003400
1,175,888 UART: [idev] ++
1,176,056 UART: [idev] CDI.KEYID = 6
1,176,416 UART: [idev] SUBJECT.KEYID = 7
1,176,840 UART: [idev] UDS.KEYID = 0
1,177,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,968 UART: [idev] Erasing UDS.KEYID = 0
1,201,899 UART: [idev] Sha1 KeyId Algorithm
1,210,365 UART: [idev] --
1,211,453 UART: [ldev] ++
1,211,621 UART: [ldev] CDI.KEYID = 6
1,211,984 UART: [ldev] SUBJECT.KEYID = 5
1,212,410 UART: [ldev] AUTHORITY.KEYID = 7
1,212,873 UART: [ldev] FE.KEYID = 1
1,217,651 UART: [ldev] Erasing FE.KEYID = 1
1,244,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,525 UART: [ldev] --
1,283,838 UART: [fwproc] Wait for Commands...
1,284,416 UART: [fwproc] Recv command 0x46574c44
1,285,144 UART: [fwproc] Recv'd Img size: 118548 bytes
1,564,701 UART: ROM Fatal Error: 0x000B0014
1,565,858 >>> mbox cmd response: failed
1,565,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,864 >>> mbox cmd response: failed
1,565,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,870 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
893,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,159 UART: [kat] ++
897,311 UART: [kat] sha1
901,405 UART: [kat] SHA2-256
903,345 UART: [kat] SHA2-384
906,188 UART: [kat] SHA2-512-ACC
908,089 UART: [kat] ECC-384
917,844 UART: [kat] HMAC-384Kdf
922,342 UART: [kat] LMS
1,170,670 UART: [kat] --
1,171,353 UART: [cold-reset] ++
1,171,829 UART: [fht] FHT @ 0x50003400
1,174,554 UART: [idev] ++
1,174,722 UART: [idev] CDI.KEYID = 6
1,175,082 UART: [idev] SUBJECT.KEYID = 7
1,175,506 UART: [idev] UDS.KEYID = 0
1,175,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,858 UART: [idev] Erasing UDS.KEYID = 0
1,200,789 UART: [idev] Sha1 KeyId Algorithm
1,209,159 UART: [idev] --
1,210,263 UART: [ldev] ++
1,210,431 UART: [ldev] CDI.KEYID = 6
1,210,794 UART: [ldev] SUBJECT.KEYID = 5
1,211,220 UART: [ldev] AUTHORITY.KEYID = 7
1,211,683 UART: [ldev] FE.KEYID = 1
1,216,859 UART: [ldev] Erasing FE.KEYID = 1
1,243,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,147 UART: [ldev] --
1,282,578 UART: [fwproc] Wait for Commands...
1,283,260 UART: [fwproc] Recv command 0x46574c44
1,283,988 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,003 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,173 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,360 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,795 >>> mbox cmd response: failed
1,417,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,801 >>> mbox cmd response: failed
1,417,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,807 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,701 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
893,449 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,574 UART: [kat] ++
897,726 UART: [kat] sha1
902,010 UART: [kat] SHA2-256
903,950 UART: [kat] SHA2-384
906,629 UART: [kat] SHA2-512-ACC
908,530 UART: [kat] ECC-384
918,025 UART: [kat] HMAC-384Kdf
922,613 UART: [kat] LMS
1,170,941 UART: [kat] --
1,171,790 UART: [cold-reset] ++
1,172,172 UART: [fht] FHT @ 0x50003400
1,175,073 UART: [idev] ++
1,175,241 UART: [idev] CDI.KEYID = 6
1,175,601 UART: [idev] SUBJECT.KEYID = 7
1,176,025 UART: [idev] UDS.KEYID = 0
1,176,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,129 UART: [idev] Erasing UDS.KEYID = 0
1,201,876 UART: [idev] Sha1 KeyId Algorithm
1,210,398 UART: [idev] --
1,211,338 UART: [ldev] ++
1,211,506 UART: [ldev] CDI.KEYID = 6
1,211,869 UART: [ldev] SUBJECT.KEYID = 5
1,212,295 UART: [ldev] AUTHORITY.KEYID = 7
1,212,758 UART: [ldev] FE.KEYID = 1
1,218,334 UART: [ldev] Erasing FE.KEYID = 1
1,244,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,328 UART: [ldev] --
1,283,715 UART: [fwproc] Wait for Commands...
1,284,391 UART: [fwproc] Recv command 0x46574c44
1,285,119 UART: [fwproc] Recv'd Img size: 118548 bytes
1,564,172 UART: ROM Fatal Error: 0x000B0014
1,565,329 >>> mbox cmd response: failed
1,565,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,335 >>> mbox cmd response: failed
1,565,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,341 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
893,777 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,902 UART: [kat] ++
898,054 UART: [kat] sha1
902,346 UART: [kat] SHA2-256
904,286 UART: [kat] SHA2-384
907,109 UART: [kat] SHA2-512-ACC
909,010 UART: [kat] ECC-384
918,751 UART: [kat] HMAC-384Kdf
923,199 UART: [kat] LMS
1,171,527 UART: [kat] --
1,172,732 UART: [cold-reset] ++
1,173,230 UART: [fht] FHT @ 0x50003400
1,175,993 UART: [idev] ++
1,176,161 UART: [idev] CDI.KEYID = 6
1,176,521 UART: [idev] SUBJECT.KEYID = 7
1,176,945 UART: [idev] UDS.KEYID = 0
1,177,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,221 UART: [idev] Erasing UDS.KEYID = 0
1,202,496 UART: [idev] Sha1 KeyId Algorithm
1,211,162 UART: [idev] --
1,212,002 UART: [ldev] ++
1,212,170 UART: [ldev] CDI.KEYID = 6
1,212,533 UART: [ldev] SUBJECT.KEYID = 5
1,212,959 UART: [ldev] AUTHORITY.KEYID = 7
1,213,422 UART: [ldev] FE.KEYID = 1
1,218,530 UART: [ldev] Erasing FE.KEYID = 1
1,244,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,526 UART: [ldev] --
1,284,015 UART: [fwproc] Wait for Commands...
1,284,745 UART: [fwproc] Recv command 0x46574c44
1,285,473 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,250 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,420 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,645 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,492 >>> mbox cmd response: failed
1,419,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,498 >>> mbox cmd response: failed
1,419,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,282 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,269 UART:
192,641 UART: Running Caliptra ROM ...
193,836 UART:
193,991 UART: [state] CFI Enabled
266,425 UART: [state] LifecycleState = Unprovisioned
268,360 UART: [state] DebugLocked = No
270,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,561 UART: [kat] SHA2-256
444,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,801 UART: [kat] ++
455,250 UART: [kat] sha1
466,885 UART: [kat] SHA2-256
469,565 UART: [kat] SHA2-384
475,817 UART: [kat] SHA2-512-ACC
478,167 UART: [kat] ECC-384
2,765,953 UART: [kat] HMAC-384Kdf
2,798,018 UART: [kat] LMS
3,988,323 UART: [kat] --
3,991,835 UART: [cold-reset] ++
3,994,371 UART: [fht] Storing FHT @ 0x50003400
4,007,316 UART: [idev] ++
4,007,896 UART: [idev] CDI.KEYID = 6
4,008,822 UART: [idev] SUBJECT.KEYID = 7
4,010,103 UART: [idev] UDS.KEYID = 0
4,013,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,523 UART: [idev] Erasing UDS.KEYID = 0
7,345,020 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,033 UART: [idev] --
7,371,143 UART: [ldev] ++
7,371,716 UART: [ldev] CDI.KEYID = 6
7,372,736 UART: [ldev] SUBJECT.KEYID = 5
7,373,896 UART: [ldev] AUTHORITY.KEYID = 7
7,375,184 UART: [ldev] FE.KEYID = 1
7,420,323 UART: [ldev] Erasing FE.KEYID = 1
10,753,058 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,655 UART: [ldev] --
13,116,031 UART: [fwproc] Waiting for Commands...
13,119,435 UART: [fwproc] Received command 0x46574c44
13,121,625 UART: [fwproc] Received Image of size 118548 bytes
16,084,066 UART: ROM Fatal Error: 0x000B0023
16,087,535 >>> mbox cmd response: failed
16,087,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,088,327 >>> mbox cmd response: failed
16,088,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,088,909 >>> mbox cmd response: failed
Initializing fuses
2,057,365 writing to cptra_bootfsm_go
2,246,759 UART:
2,247,104 UART: Running Caliptra ROM ...
2,248,251 UART:
2,248,443 UART: [state] CFI Enabled
2,305,609 UART: [state] LifecycleState = Unprovisioned
2,307,551 UART: [state] DebugLocked = No
2,310,317 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,314,362 UART: [kat] SHA2-256
2,484,071 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,600 UART: [kat] ++
2,495,064 UART: [kat] sha1
2,506,279 UART: [kat] SHA2-256
2,508,987 UART: [kat] SHA2-384
2,514,516 UART: [kat] SHA2-512-ACC
2,516,873 UART: [kat] ECC-384
4,808,821 UART: [kat] HMAC-384Kdf
4,841,505 UART: [kat] LMS
6,031,812 UART: [kat] --
6,037,126 UART: [cold-reset] ++
6,039,366 UART: [fht] Storing FHT @ 0x50003400
6,051,183 UART: [idev] ++
6,051,763 UART: [idev] CDI.KEYID = 6
6,052,678 UART: [idev] SUBJECT.KEYID = 7
6,053,957 UART: [idev] UDS.KEYID = 0
6,056,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,205,608 UART: [idev] Erasing UDS.KEYID = 0
9,390,481 UART: [idev] Using Sha1 for KeyId Algorithm
9,411,440 UART: [idev] --
9,415,327 UART: [ldev] ++
9,415,903 UART: [ldev] CDI.KEYID = 6
9,416,867 UART: [ldev] SUBJECT.KEYID = 5
9,418,163 UART: [ldev] AUTHORITY.KEYID = 7
9,419,350 UART: [ldev] FE.KEYID = 1
9,466,461 UART: [ldev] Erasing FE.KEYID = 1
12,802,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,112,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,127,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,142,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,156,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,174,964 UART: [ldev] --
15,179,862 UART: [fwproc] Waiting for Commands...
15,182,233 UART: [fwproc] Received command 0x46574c44
15,184,423 UART: [fwproc] Received Image of size 118548 bytes
19,280,037 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,353,381 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,426,570 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,755,176 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,807,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,853,015 >>> mbox cmd response: failed
15,853,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,854,121 >>> mbox cmd response: failed
15,854,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,854,687 >>> mbox cmd response: failed
Initializing fuses
2,057,537 writing to cptra_bootfsm_go
5,863,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,031,577 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,855 writing to cptra_bootfsm_go
194,124 UART:
194,474 UART: Running Caliptra ROM ...
195,667 UART:
605,218 UART: [state] CFI Enabled
615,805 UART: [state] LifecycleState = Unprovisioned
617,764 UART: [state] DebugLocked = No
620,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,606 UART: [kat] SHA2-256
794,364 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,880 UART: [kat] ++
805,366 UART: [kat] sha1
816,300 UART: [kat] SHA2-256
818,989 UART: [kat] SHA2-384
824,105 UART: [kat] SHA2-512-ACC
826,456 UART: [kat] ECC-384
3,112,136 UART: [kat] HMAC-384Kdf
3,123,776 UART: [kat] LMS
4,313,927 UART: [kat] --
4,319,190 UART: [cold-reset] ++
4,321,776 UART: [fht] Storing FHT @ 0x50003400
4,334,057 UART: [idev] ++
4,334,637 UART: [idev] CDI.KEYID = 6
4,335,554 UART: [idev] SUBJECT.KEYID = 7
4,336,776 UART: [idev] UDS.KEYID = 0
4,339,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,825 UART: [idev] Erasing UDS.KEYID = 0
7,625,552 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,541 UART: [idev] --
7,653,570 UART: [ldev] ++
7,654,208 UART: [ldev] CDI.KEYID = 6
7,655,099 UART: [ldev] SUBJECT.KEYID = 5
7,656,328 UART: [ldev] AUTHORITY.KEYID = 7
7,657,623 UART: [ldev] FE.KEYID = 1
7,668,683 UART: [ldev] Erasing FE.KEYID = 1
10,958,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,401 UART: [ldev] --
13,317,616 UART: [fwproc] Waiting for Commands...
13,320,749 UART: [fwproc] Received command 0x46574c44
13,322,948 UART: [fwproc] Received Image of size 118548 bytes
16,285,260 UART: ROM Fatal Error: 0x000B0023
16,288,725 >>> mbox cmd response: failed
16,289,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,289,396 >>> mbox cmd response: failed
16,289,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,290,092 >>> mbox cmd response: failed
Initializing fuses
2,056,719 writing to cptra_bootfsm_go
2,246,054 UART:
2,246,451 UART: Running Caliptra ROM ...
2,247,511 UART:
4,165,154 UART: [state] CFI Enabled
4,179,337 UART: [state] LifecycleState = Unprovisioned
4,181,249 UART: [state] DebugLocked = No
4,183,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,188,853 UART: [kat] SHA2-256
4,358,615 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,369,135 UART: [kat] ++
4,369,603 UART: [kat] sha1
4,380,310 UART: [kat] SHA2-256
4,383,007 UART: [kat] SHA2-384
4,388,896 UART: [kat] SHA2-512-ACC
4,391,253 UART: [kat] ECC-384
6,675,342 UART: [kat] HMAC-384Kdf
6,687,529 UART: [kat] LMS
7,877,642 UART: [kat] --
7,879,867 UART: [cold-reset] ++
7,881,940 UART: [fht] Storing FHT @ 0x50003400
7,893,653 UART: [idev] ++
7,894,237 UART: [idev] CDI.KEYID = 6
7,895,263 UART: [idev] SUBJECT.KEYID = 7
7,896,434 UART: [idev] UDS.KEYID = 0
7,898,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,047,797 UART: [idev] Erasing UDS.KEYID = 0
11,180,824 UART: [idev] Using Sha1 for KeyId Algorithm
11,201,687 UART: [idev] --
11,206,070 UART: [ldev] ++
11,206,645 UART: [ldev] CDI.KEYID = 6
11,207,615 UART: [ldev] SUBJECT.KEYID = 5
11,208,819 UART: [ldev] AUTHORITY.KEYID = 7
11,210,072 UART: [ldev] FE.KEYID = 1
11,221,601 UART: [ldev] Erasing FE.KEYID = 1
14,509,557 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,802,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,817,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,831,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,846,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,865,851 UART: [ldev] --
16,871,283 UART: [fwproc] Waiting for Commands...
16,873,663 UART: [fwproc] Received command 0x46574c44
16,875,854 UART: [fwproc] Received Image of size 118548 bytes
20,980,875 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,056,590 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,129,776 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,457,458 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
4,131,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,057,323 >>> mbox cmd response: failed
16,057,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,058,355 >>> mbox cmd response: failed
16,058,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,058,932 >>> mbox cmd response: failed
Initializing fuses
2,059,278 writing to cptra_bootfsm_go
7,943,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,964,865 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
192,452 UART:
192,822 UART: Running Caliptra ROM ...
193,956 UART:
194,102 UART: [state] CFI Enabled
263,300 UART: [state] LifecycleState = Unprovisioned
265,230 UART: [state] DebugLocked = No
266,476 UART: [state] WD Timer not started. Device not locked for debugging
270,981 UART: [kat] SHA2-256
450,652 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,417 UART: [kat] ++
461,875 UART: [kat] sha1
472,442 UART: [kat] SHA2-256
475,135 UART: [kat] SHA2-384
480,952 UART: [kat] SHA2-512-ACC
483,349 UART: [kat] ECC-384
2,945,857 UART: [kat] HMAC-384Kdf
2,971,333 UART: [kat] LMS
3,447,809 UART: [kat] --
3,451,921 UART: [cold-reset] ++
3,454,347 UART: [fht] FHT @ 0x50003400
3,464,863 UART: [idev] ++
3,465,432 UART: [idev] CDI.KEYID = 6
3,466,457 UART: [idev] SUBJECT.KEYID = 7
3,467,625 UART: [idev] UDS.KEYID = 0
3,470,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,451 UART: [idev] Erasing UDS.KEYID = 0
5,988,539 UART: [idev] Sha1 KeyId Algorithm
6,012,039 UART: [idev] --
6,017,343 UART: [ldev] ++
6,017,920 UART: [ldev] CDI.KEYID = 6
6,018,849 UART: [ldev] SUBJECT.KEYID = 5
6,020,072 UART: [ldev] AUTHORITY.KEYID = 7
6,021,315 UART: [ldev] FE.KEYID = 1
6,056,656 UART: [ldev] Erasing FE.KEYID = 1
8,563,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,712 UART: [ldev] --
10,374,574 UART: [fwproc] Wait for Commands...
10,376,251 UART: [fwproc] Recv command 0x46574c44
10,378,297 UART: [fwproc] Recv'd Img size: 118548 bytes
12,708,530 UART: ROM Fatal Error: 0x000B0023
12,711,778 >>> mbox cmd response: failed
12,712,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,712,574 >>> mbox cmd response: failed
12,712,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,713,218 >>> mbox cmd response: failed
Initializing fuses
2,060,707 writing to cptra_bootfsm_go
2,250,046 UART:
2,250,403 UART: Running Caliptra ROM ...
2,251,538 UART:
2,251,712 UART: [state] CFI Enabled
2,312,062 UART: [state] LifecycleState = Unprovisioned
2,314,004 UART: [state] DebugLocked = No
2,316,645 UART: [state] WD Timer not started. Device not locked for debugging
2,320,557 UART: [kat] SHA2-256
2,500,225 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,511,009 UART: [kat] ++
2,511,510 UART: [kat] sha1
2,521,839 UART: [kat] SHA2-256
2,524,526 UART: [kat] SHA2-384
2,530,532 UART: [kat] SHA2-512-ACC
2,532,896 UART: [kat] ECC-384
4,996,118 UART: [kat] HMAC-384Kdf
5,020,834 UART: [kat] LMS
5,497,337 UART: [kat] --
5,503,227 UART: [cold-reset] ++
5,504,625 UART: [fht] FHT @ 0x50003400
5,515,392 UART: [idev] ++
5,515,966 UART: [idev] CDI.KEYID = 6
5,516,877 UART: [idev] SUBJECT.KEYID = 7
5,518,149 UART: [idev] UDS.KEYID = 0
5,520,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,669,731 UART: [idev] Erasing UDS.KEYID = 0
8,033,422 UART: [idev] Sha1 KeyId Algorithm
8,057,483 UART: [idev] --
8,062,227 UART: [ldev] ++
8,062,816 UART: [ldev] CDI.KEYID = 6
8,063,734 UART: [ldev] SUBJECT.KEYID = 5
8,064,926 UART: [ldev] AUTHORITY.KEYID = 7
8,066,168 UART: [ldev] FE.KEYID = 1
8,105,232 UART: [ldev] Erasing FE.KEYID = 1
10,612,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,348,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,364,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,380,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,396,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,418,141 UART: [ldev] --
12,423,636 UART: [fwproc] Wait for Commands...
12,425,469 UART: [fwproc] Recv command 0x46574c44
12,427,523 UART: [fwproc] Recv'd Img size: 118548 bytes
15,912,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,992,250 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,065,266 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,393,317 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
3,455,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,591,781 >>> mbox cmd response: failed
12,592,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,592,683 >>> mbox cmd response: failed
12,592,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,593,276 >>> mbox cmd response: failed
Initializing fuses
2,064,638 writing to cptra_bootfsm_go
5,516,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,305,054 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
192,678 UART:
193,043 UART: Running Caliptra ROM ...
194,257 UART:
603,879 UART: [state] CFI Enabled
620,509 UART: [state] LifecycleState = Unprovisioned
622,414 UART: [state] DebugLocked = No
624,098 UART: [state] WD Timer not started. Device not locked for debugging
628,248 UART: [kat] SHA2-256
807,874 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,657 UART: [kat] ++
819,109 UART: [kat] sha1
829,217 UART: [kat] SHA2-256
831,908 UART: [kat] SHA2-384
837,944 UART: [kat] SHA2-512-ACC
840,294 UART: [kat] ECC-384
3,282,934 UART: [kat] HMAC-384Kdf
3,295,079 UART: [kat] LMS
3,771,624 UART: [kat] --
3,774,929 UART: [cold-reset] ++
3,775,947 UART: [fht] FHT @ 0x50003400
3,786,932 UART: [idev] ++
3,787,554 UART: [idev] CDI.KEYID = 6
3,788,574 UART: [idev] SUBJECT.KEYID = 7
3,789,741 UART: [idev] UDS.KEYID = 0
3,792,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,888 UART: [idev] Erasing UDS.KEYID = 0
6,272,528 UART: [idev] Sha1 KeyId Algorithm
6,297,117 UART: [idev] --
6,303,058 UART: [ldev] ++
6,303,674 UART: [ldev] CDI.KEYID = 6
6,304,569 UART: [ldev] SUBJECT.KEYID = 5
6,305,807 UART: [ldev] AUTHORITY.KEYID = 7
6,307,053 UART: [ldev] FE.KEYID = 1
6,318,792 UART: [ldev] Erasing FE.KEYID = 1
8,796,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,364 UART: [ldev] --
10,592,234 UART: [fwproc] Wait for Commands...
10,593,853 UART: [fwproc] Recv command 0x46574c44
10,595,909 UART: [fwproc] Recv'd Img size: 118548 bytes
12,922,351 UART: ROM Fatal Error: 0x000B0023
12,925,581 >>> mbox cmd response: failed
12,926,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,926,339 >>> mbox cmd response: failed
12,926,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,927,152 >>> mbox cmd response: failed
Initializing fuses
2,062,633 writing to cptra_bootfsm_go
2,251,954 UART:
2,252,303 UART: Running Caliptra ROM ...
2,253,439 UART:
7,524,786 UART: [state] CFI Enabled
7,539,422 UART: [state] LifecycleState = Unprovisioned
7,541,372 UART: [state] DebugLocked = No
7,543,747 UART: [state] WD Timer not started. Device not locked for debugging
7,548,202 UART: [kat] SHA2-256
7,727,841 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,738,609 UART: [kat] ++
7,739,104 UART: [kat] sha1
7,749,515 UART: [kat] SHA2-256
7,752,219 UART: [kat] SHA2-384
7,758,808 UART: [kat] SHA2-512-ACC
7,761,163 UART: [kat] ECC-384
10,201,217 UART: [kat] HMAC-384Kdf
10,213,603 UART: [kat] LMS
10,690,072 UART: [kat] --
10,694,184 UART: [cold-reset] ++
10,696,117 UART: [fht] FHT @ 0x50003400
10,708,553 UART: [idev] ++
10,709,125 UART: [idev] CDI.KEYID = 6
10,710,097 UART: [idev] SUBJECT.KEYID = 7
10,711,313 UART: [idev] UDS.KEYID = 0
10,713,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,862,720 UART: [idev] Erasing UDS.KEYID = 0
13,189,940 UART: [idev] Sha1 KeyId Algorithm
13,213,202 UART: [idev] --
13,217,919 UART: [ldev] ++
13,218,501 UART: [ldev] CDI.KEYID = 6
13,219,467 UART: [ldev] SUBJECT.KEYID = 5
13,220,630 UART: [ldev] AUTHORITY.KEYID = 7
13,221,922 UART: [ldev] FE.KEYID = 1
13,233,974 UART: [ldev] Erasing FE.KEYID = 1
15,712,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,433,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,449,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,465,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,481,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,501,218 UART: [ldev] --
17,507,298 UART: [fwproc] Wait for Commands...
17,510,105 UART: [fwproc] Recv command 0x46574c44
17,512,113 UART: [fwproc] Recv'd Img size: 118548 bytes
20,997,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,077,388 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,150,401 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,478,230 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
3,779,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,802,970 >>> mbox cmd response: failed
12,803,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,803,852 >>> mbox cmd response: failed
12,804,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,804,422 >>> mbox cmd response: failed
Initializing fuses
2,067,604 writing to cptra_bootfsm_go
10,835,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,503,040 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,134 UART:
192,503 UART: Running Caliptra ROM ...
193,620 UART:
193,766 UART: [state] CFI Enabled
260,407 UART: [state] LifecycleState = Unprovisioned
262,839 UART: [state] DebugLocked = No
264,543 UART: [state] WD Timer not started. Device not locked for debugging
269,524 UART: [kat] SHA2-256
459,389 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,186 UART: [kat] ++
470,642 UART: [kat] sha1
482,067 UART: [kat] SHA2-256
485,083 UART: [kat] SHA2-384
490,264 UART: [kat] SHA2-512-ACC
492,887 UART: [kat] ECC-384
2,943,072 UART: [kat] HMAC-384Kdf
2,968,557 UART: [kat] LMS
3,500,331 UART: [kat] --
3,505,489 UART: [cold-reset] ++
3,507,493 UART: [fht] FHT @ 0x50003400
3,519,130 UART: [idev] ++
3,519,812 UART: [idev] CDI.KEYID = 6
3,520,824 UART: [idev] SUBJECT.KEYID = 7
3,521,994 UART: [idev] UDS.KEYID = 0
3,524,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,258 UART: [idev] Erasing UDS.KEYID = 0
6,025,254 UART: [idev] Sha1 KeyId Algorithm
6,046,460 UART: [idev] --
6,051,169 UART: [ldev] ++
6,051,854 UART: [ldev] CDI.KEYID = 6
6,052,749 UART: [ldev] SUBJECT.KEYID = 5
6,053,987 UART: [ldev] AUTHORITY.KEYID = 7
6,055,205 UART: [ldev] FE.KEYID = 1
6,096,246 UART: [ldev] Erasing FE.KEYID = 1
8,601,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,155 UART: [ldev] --
10,409,435 UART: [fwproc] Wait for Commands...
10,411,216 UART: [fwproc] Recv command 0x46574c44
10,413,541 UART: [fwproc] Recv'd Img size: 118548 bytes
12,757,384 UART: ROM Fatal Error: 0x000B0023
12,761,053 >>> mbox cmd response: failed
12,761,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,761,915 >>> mbox cmd response: failed
12,762,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,762,486 >>> mbox cmd response: failed
Initializing fuses
2,062,745 writing to cptra_bootfsm_go
2,252,087 UART:
2,252,466 UART: Running Caliptra ROM ...
2,253,609 UART:
2,253,784 UART: [state] CFI Enabled
2,320,685 UART: [state] LifecycleState = Unprovisioned
2,323,023 UART: [state] DebugLocked = No
2,324,201 UART: [state] WD Timer not started. Device not locked for debugging
2,327,312 UART: [kat] SHA2-256
2,517,171 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,974 UART: [kat] ++
2,528,436 UART: [kat] sha1
2,540,574 UART: [kat] SHA2-256
2,543,599 UART: [kat] SHA2-384
2,550,189 UART: [kat] SHA2-512-ACC
2,552,774 UART: [kat] ECC-384
5,005,399 UART: [kat] HMAC-384Kdf
5,026,277 UART: [kat] LMS
5,558,025 UART: [kat] --
5,561,704 UART: [cold-reset] ++
5,562,940 UART: [fht] FHT @ 0x50003400
5,575,503 UART: [idev] ++
5,576,192 UART: [idev] CDI.KEYID = 6
5,577,134 UART: [idev] SUBJECT.KEYID = 7
5,578,403 UART: [idev] UDS.KEYID = 0
5,580,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,730,034 UART: [idev] Erasing UDS.KEYID = 0
8,084,497 UART: [idev] Sha1 KeyId Algorithm
8,106,225 UART: [idev] --
8,111,562 UART: [ldev] ++
8,112,254 UART: [ldev] CDI.KEYID = 6
8,113,141 UART: [ldev] SUBJECT.KEYID = 5
8,114,254 UART: [ldev] AUTHORITY.KEYID = 7
8,115,460 UART: [ldev] FE.KEYID = 1
8,154,972 UART: [ldev] Erasing FE.KEYID = 1
10,659,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,424,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,439,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,046 UART: [ldev] --
12,465,612 UART: [fwproc] Wait for Commands...
12,467,334 UART: [fwproc] Recv command 0x46574c44
12,469,601 UART: [fwproc] Recv'd Img size: 118548 bytes
15,970,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,052,833 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,176,425 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,735,982 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,442,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,665,777 >>> mbox cmd response: failed
12,666,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,666,657 >>> mbox cmd response: failed
12,666,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,667,232 >>> mbox cmd response: failed
Initializing fuses
2,062,008 writing to cptra_bootfsm_go
5,492,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,874,838 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,430 UART:
192,786 UART: Running Caliptra ROM ...
193,936 UART:
603,539 UART: [state] CFI Enabled
618,277 UART: [state] LifecycleState = Unprovisioned
620,710 UART: [state] DebugLocked = No
622,313 UART: [state] WD Timer not started. Device not locked for debugging
626,749 UART: [kat] SHA2-256
816,634 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,418 UART: [kat] ++
828,033 UART: [kat] sha1
838,604 UART: [kat] SHA2-256
841,616 UART: [kat] SHA2-384
848,246 UART: [kat] SHA2-512-ACC
850,818 UART: [kat] ECC-384
3,294,296 UART: [kat] HMAC-384Kdf
3,308,157 UART: [kat] LMS
3,839,997 UART: [kat] --
3,846,807 UART: [cold-reset] ++
3,848,598 UART: [fht] FHT @ 0x50003400
3,861,697 UART: [idev] ++
3,862,381 UART: [idev] CDI.KEYID = 6
3,863,322 UART: [idev] SUBJECT.KEYID = 7
3,864,592 UART: [idev] UDS.KEYID = 0
3,867,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,016,546 UART: [idev] Erasing UDS.KEYID = 0
6,342,213 UART: [idev] Sha1 KeyId Algorithm
6,365,037 UART: [idev] --
6,369,260 UART: [ldev] ++
6,369,950 UART: [ldev] CDI.KEYID = 6
6,370,864 UART: [ldev] SUBJECT.KEYID = 5
6,372,028 UART: [ldev] AUTHORITY.KEYID = 7
6,373,269 UART: [ldev] FE.KEYID = 1
6,384,354 UART: [ldev] Erasing FE.KEYID = 1
8,864,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,733 UART: [ldev] --
10,655,221 UART: [fwproc] Wait for Commands...
10,657,325 UART: [fwproc] Recv command 0x46574c44
10,659,663 UART: [fwproc] Recv'd Img size: 118548 bytes
12,998,786 UART: ROM Fatal Error: 0x000B0023
13,002,460 >>> mbox cmd response: failed
13,002,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,003,255 >>> mbox cmd response: failed
13,003,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,003,843 >>> mbox cmd response: failed
Initializing fuses
2,062,243 writing to cptra_bootfsm_go
2,251,567 UART:
2,251,923 UART: Running Caliptra ROM ...
2,253,070 UART:
7,446,187 UART: [state] CFI Enabled
7,459,703 UART: [state] LifecycleState = Unprovisioned
7,462,126 UART: [state] DebugLocked = No
7,464,669 UART: [state] WD Timer not started. Device not locked for debugging
7,469,088 UART: [kat] SHA2-256
7,658,962 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,669,762 UART: [kat] ++
7,670,310 UART: [kat] sha1
7,680,781 UART: [kat] SHA2-256
7,683,809 UART: [kat] SHA2-384
7,691,046 UART: [kat] SHA2-512-ACC
7,693,614 UART: [kat] ECC-384
10,134,877 UART: [kat] HMAC-384Kdf
10,147,108 UART: [kat] LMS
10,678,942 UART: [kat] --
10,684,130 UART: [cold-reset] ++
10,685,152 UART: [fht] FHT @ 0x50003400
10,697,004 UART: [idev] ++
10,697,712 UART: [idev] CDI.KEYID = 6
10,698,630 UART: [idev] SUBJECT.KEYID = 7
10,699,852 UART: [idev] UDS.KEYID = 0
10,702,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,851,526 UART: [idev] Erasing UDS.KEYID = 0
13,179,314 UART: [idev] Sha1 KeyId Algorithm
13,200,768 UART: [idev] --
13,205,304 UART: [ldev] ++
13,205,983 UART: [ldev] CDI.KEYID = 6
13,206,876 UART: [ldev] SUBJECT.KEYID = 5
13,208,090 UART: [ldev] AUTHORITY.KEYID = 7
13,209,331 UART: [ldev] FE.KEYID = 1
13,220,832 UART: [ldev] Erasing FE.KEYID = 1
15,697,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,415,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,431,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,446,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,461,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,482,611 UART: [ldev] --
17,488,314 UART: [fwproc] Wait for Commands...
17,490,794 UART: [fwproc] Recv command 0x46574c44
17,493,118 UART: [fwproc] Recv'd Img size: 118548 bytes
20,997,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,076,178 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,199,809 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,760,459 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,761,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,898,732 >>> mbox cmd response: failed
12,899,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,899,773 >>> mbox cmd response: failed
12,900,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,900,351 >>> mbox cmd response: failed
Initializing fuses
2,064,024 writing to cptra_bootfsm_go
10,713,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,993,755 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,696 UART: [state] LifecycleState = Unprovisioned
85,351 UART: [state] DebugLocked = No
85,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,503 UART: [kat] SHA2-256
881,434 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,549 UART: [kat] ++
885,701 UART: [kat] sha1
889,753 UART: [kat] SHA2-256
891,691 UART: [kat] SHA2-384
894,354 UART: [kat] SHA2-512-ACC
896,255 UART: [kat] ECC-384
902,108 UART: [kat] HMAC-384Kdf
906,594 UART: [kat] LMS
1,474,790 UART: [kat] --
1,475,701 UART: [cold-reset] ++
1,476,093 UART: [fht] Storing FHT @ 0x50003400
1,478,806 UART: [idev] ++
1,478,974 UART: [idev] CDI.KEYID = 6
1,479,334 UART: [idev] SUBJECT.KEYID = 7
1,479,758 UART: [idev] UDS.KEYID = 0
1,480,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,174 UART: [idev] Erasing UDS.KEYID = 0
1,503,494 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,080 UART: [idev] --
1,512,955 UART: [ldev] ++
1,513,123 UART: [ldev] CDI.KEYID = 6
1,513,486 UART: [ldev] SUBJECT.KEYID = 5
1,513,912 UART: [ldev] AUTHORITY.KEYID = 7
1,514,375 UART: [ldev] FE.KEYID = 1
1,519,621 UART: [ldev] Erasing FE.KEYID = 1
1,544,828 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,814 UART: [ldev] --
1,584,305 UART: [fwproc] Waiting for Commands...
1,584,970 UART: [fwproc] Received command 0x46574c44
1,585,761 UART: [fwproc] Received Image of size 118548 bytes
1,864,357 UART: ROM Fatal Error: 0x000B0023
1,865,514 >>> mbox cmd response: failed
1,865,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,865,520 >>> mbox cmd response: failed
1,865,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,865,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,215 UART: [kat] SHA2-256
882,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,261 UART: [kat] ++
886,413 UART: [kat] sha1
890,825 UART: [kat] SHA2-256
892,763 UART: [kat] SHA2-384
895,508 UART: [kat] SHA2-512-ACC
897,409 UART: [kat] ECC-384
903,350 UART: [kat] HMAC-384Kdf
908,066 UART: [kat] LMS
1,476,262 UART: [kat] --
1,477,249 UART: [cold-reset] ++
1,477,805 UART: [fht] Storing FHT @ 0x50003400
1,480,468 UART: [idev] ++
1,480,636 UART: [idev] CDI.KEYID = 6
1,480,996 UART: [idev] SUBJECT.KEYID = 7
1,481,420 UART: [idev] UDS.KEYID = 0
1,481,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,468 UART: [idev] Erasing UDS.KEYID = 0
1,506,016 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,788 UART: [idev] --
1,516,015 UART: [ldev] ++
1,516,183 UART: [ldev] CDI.KEYID = 6
1,516,546 UART: [ldev] SUBJECT.KEYID = 5
1,516,972 UART: [ldev] AUTHORITY.KEYID = 7
1,517,435 UART: [ldev] FE.KEYID = 1
1,522,645 UART: [ldev] Erasing FE.KEYID = 1
1,547,860 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,428 UART: [ldev] --
1,586,815 UART: [fwproc] Waiting for Commands...
1,587,552 UART: [fwproc] Received command 0x46574c44
1,588,343 UART: [fwproc] Received Image of size 118548 bytes
2,932,724 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,812 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,030 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,275 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,719,705 >>> mbox cmd response: failed
1,719,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,711 >>> mbox cmd response: failed
1,719,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,399 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,778 UART: [kat] SHA2-256
881,709 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,824 UART: [kat] ++
885,976 UART: [kat] sha1
890,160 UART: [kat] SHA2-256
892,098 UART: [kat] SHA2-384
894,915 UART: [kat] SHA2-512-ACC
896,816 UART: [kat] ECC-384
902,593 UART: [kat] HMAC-384Kdf
907,301 UART: [kat] LMS
1,475,497 UART: [kat] --
1,476,300 UART: [cold-reset] ++
1,476,806 UART: [fht] Storing FHT @ 0x50003400
1,479,751 UART: [idev] ++
1,479,919 UART: [idev] CDI.KEYID = 6
1,480,279 UART: [idev] SUBJECT.KEYID = 7
1,480,703 UART: [idev] UDS.KEYID = 0
1,481,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,651 UART: [idev] Erasing UDS.KEYID = 0
1,505,385 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,125 UART: [idev] --
1,515,064 UART: [ldev] ++
1,515,232 UART: [ldev] CDI.KEYID = 6
1,515,595 UART: [ldev] SUBJECT.KEYID = 5
1,516,021 UART: [ldev] AUTHORITY.KEYID = 7
1,516,484 UART: [ldev] FE.KEYID = 1
1,521,516 UART: [ldev] Erasing FE.KEYID = 1
1,546,553 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,423 UART: [ldev] --
1,585,736 UART: [fwproc] Waiting for Commands...
1,586,435 UART: [fwproc] Received command 0x46574c44
1,587,226 UART: [fwproc] Received Image of size 118548 bytes
1,866,188 UART: ROM Fatal Error: 0x000B0023
1,867,345 >>> mbox cmd response: failed
1,867,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,351 >>> mbox cmd response: failed
1,867,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,357 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,566 UART: [kat] SHA2-256
882,497 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,612 UART: [kat] ++
886,764 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,589 UART: [kat] SHA2-512-ACC
897,490 UART: [kat] ECC-384
903,357 UART: [kat] HMAC-384Kdf
908,019 UART: [kat] LMS
1,476,215 UART: [kat] --
1,476,790 UART: [cold-reset] ++
1,477,176 UART: [fht] Storing FHT @ 0x50003400
1,479,959 UART: [idev] ++
1,480,127 UART: [idev] CDI.KEYID = 6
1,480,487 UART: [idev] SUBJECT.KEYID = 7
1,480,911 UART: [idev] UDS.KEYID = 0
1,481,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,933 UART: [idev] Erasing UDS.KEYID = 0
1,505,905 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,535 UART: [idev] --
1,515,428 UART: [ldev] ++
1,515,596 UART: [ldev] CDI.KEYID = 6
1,515,959 UART: [ldev] SUBJECT.KEYID = 5
1,516,385 UART: [ldev] AUTHORITY.KEYID = 7
1,516,848 UART: [ldev] FE.KEYID = 1
1,522,194 UART: [ldev] Erasing FE.KEYID = 1
1,548,115 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,009 UART: [ldev] --
1,587,414 UART: [fwproc] Waiting for Commands...
1,588,249 UART: [fwproc] Received command 0x46574c44
1,589,040 UART: [fwproc] Received Image of size 118548 bytes
2,934,057 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,567 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,785 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,134,058 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,720,590 >>> mbox cmd response: failed
1,720,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,596 >>> mbox cmd response: failed
1,720,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,736 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,911 UART: [state] WD Timer not started. Device not locked for debugging
88,134 UART: [kat] SHA2-256
891,684 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,246 UART: [kat] SHA2-256
902,186 UART: [kat] SHA2-384
904,943 UART: [kat] SHA2-512-ACC
906,844 UART: [kat] ECC-384
916,407 UART: [kat] HMAC-384Kdf
920,975 UART: [kat] LMS
1,169,287 UART: [kat] --
1,170,356 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,452 UART: [idev] ++
1,173,620 UART: [idev] CDI.KEYID = 6
1,173,981 UART: [idev] SUBJECT.KEYID = 7
1,174,406 UART: [idev] UDS.KEYID = 0
1,174,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,619 UART: [idev] Erasing UDS.KEYID = 0
1,199,457 UART: [idev] Sha1 KeyId Algorithm
1,208,127 UART: [idev] --
1,209,040 UART: [ldev] ++
1,209,208 UART: [ldev] CDI.KEYID = 6
1,209,572 UART: [ldev] SUBJECT.KEYID = 5
1,209,999 UART: [ldev] AUTHORITY.KEYID = 7
1,210,462 UART: [ldev] FE.KEYID = 1
1,215,890 UART: [ldev] Erasing FE.KEYID = 1
1,242,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,972 UART: [ldev] --
1,281,311 UART: [fwproc] Wait for Commands...
1,281,998 UART: [fwproc] Recv command 0x46574c44
1,282,731 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,501 UART: ROM Fatal Error: 0x000B0023
1,562,658 >>> mbox cmd response: failed
1,562,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,664 >>> mbox cmd response: failed
1,562,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,670 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,694 UART: [kat] SHA2-256
901,634 UART: [kat] SHA2-384
904,401 UART: [kat] SHA2-512-ACC
906,302 UART: [kat] ECC-384
915,913 UART: [kat] HMAC-384Kdf
920,383 UART: [kat] LMS
1,168,695 UART: [kat] --
1,169,660 UART: [cold-reset] ++
1,170,048 UART: [fht] FHT @ 0x50003400
1,172,522 UART: [idev] ++
1,172,690 UART: [idev] CDI.KEYID = 6
1,173,051 UART: [idev] SUBJECT.KEYID = 7
1,173,476 UART: [idev] UDS.KEYID = 0
1,173,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,103 UART: [idev] Erasing UDS.KEYID = 0
1,198,037 UART: [idev] Sha1 KeyId Algorithm
1,206,965 UART: [idev] --
1,207,882 UART: [ldev] ++
1,208,050 UART: [ldev] CDI.KEYID = 6
1,208,414 UART: [ldev] SUBJECT.KEYID = 5
1,208,841 UART: [ldev] AUTHORITY.KEYID = 7
1,209,304 UART: [ldev] FE.KEYID = 1
1,214,588 UART: [ldev] Erasing FE.KEYID = 1
1,240,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,594 UART: [ldev] --
1,279,965 UART: [fwproc] Wait for Commands...
1,280,600 UART: [fwproc] Recv command 0x46574c44
1,281,333 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,164 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,339 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,692 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,009 >>> mbox cmd response: failed
1,417,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,015 >>> mbox cmd response: failed
1,417,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,021 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,879 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,461 UART: [kat] ++
895,613 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,732 UART: [kat] SHA2-512-ACC
906,633 UART: [kat] ECC-384
916,256 UART: [kat] HMAC-384Kdf
920,938 UART: [kat] LMS
1,169,250 UART: [kat] --
1,170,213 UART: [cold-reset] ++
1,170,779 UART: [fht] FHT @ 0x50003400
1,173,321 UART: [idev] ++
1,173,489 UART: [idev] CDI.KEYID = 6
1,173,850 UART: [idev] SUBJECT.KEYID = 7
1,174,275 UART: [idev] UDS.KEYID = 0
1,174,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,199,652 UART: [idev] Sha1 KeyId Algorithm
1,208,448 UART: [idev] --
1,209,397 UART: [ldev] ++
1,209,565 UART: [ldev] CDI.KEYID = 6
1,209,929 UART: [ldev] SUBJECT.KEYID = 5
1,210,356 UART: [ldev] AUTHORITY.KEYID = 7
1,210,819 UART: [ldev] FE.KEYID = 1
1,215,889 UART: [ldev] Erasing FE.KEYID = 1
1,242,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,167 UART: [ldev] --
1,282,466 UART: [fwproc] Wait for Commands...
1,283,175 UART: [fwproc] Recv command 0x46574c44
1,283,908 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,750 UART: ROM Fatal Error: 0x000B0023
1,563,907 >>> mbox cmd response: failed
1,563,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,913 >>> mbox cmd response: failed
1,563,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
899,989 UART: [kat] SHA2-256
901,929 UART: [kat] SHA2-384
904,838 UART: [kat] SHA2-512-ACC
906,739 UART: [kat] ECC-384
916,864 UART: [kat] HMAC-384Kdf
921,672 UART: [kat] LMS
1,169,984 UART: [kat] --
1,170,691 UART: [cold-reset] ++
1,171,037 UART: [fht] FHT @ 0x50003400
1,173,655 UART: [idev] ++
1,173,823 UART: [idev] CDI.KEYID = 6
1,174,184 UART: [idev] SUBJECT.KEYID = 7
1,174,609 UART: [idev] UDS.KEYID = 0
1,174,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,822 UART: [idev] Erasing UDS.KEYID = 0
1,199,882 UART: [idev] Sha1 KeyId Algorithm
1,208,818 UART: [idev] --
1,209,787 UART: [ldev] ++
1,209,955 UART: [ldev] CDI.KEYID = 6
1,210,319 UART: [ldev] SUBJECT.KEYID = 5
1,210,746 UART: [ldev] AUTHORITY.KEYID = 7
1,211,209 UART: [ldev] FE.KEYID = 1
1,216,597 UART: [ldev] Erasing FE.KEYID = 1
1,243,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,209 UART: [ldev] --
1,282,566 UART: [fwproc] Wait for Commands...
1,283,205 UART: [fwproc] Recv command 0x46574c44
1,283,938 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,063 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,238 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,449 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,820 >>> mbox cmd response: failed
1,418,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,826 >>> mbox cmd response: failed
1,418,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,832 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,828 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
893,526 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,651 UART: [kat] ++
897,803 UART: [kat] sha1
902,247 UART: [kat] SHA2-256
904,187 UART: [kat] SHA2-384
906,820 UART: [kat] SHA2-512-ACC
908,721 UART: [kat] ECC-384
918,618 UART: [kat] HMAC-384Kdf
923,310 UART: [kat] LMS
1,171,638 UART: [kat] --
1,172,429 UART: [cold-reset] ++
1,172,877 UART: [fht] FHT @ 0x50003400
1,175,738 UART: [idev] ++
1,175,906 UART: [idev] CDI.KEYID = 6
1,176,266 UART: [idev] SUBJECT.KEYID = 7
1,176,690 UART: [idev] UDS.KEYID = 0
1,177,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,668 UART: [idev] Erasing UDS.KEYID = 0
1,201,845 UART: [idev] Sha1 KeyId Algorithm
1,210,251 UART: [idev] --
1,211,409 UART: [ldev] ++
1,211,577 UART: [ldev] CDI.KEYID = 6
1,211,940 UART: [ldev] SUBJECT.KEYID = 5
1,212,366 UART: [ldev] AUTHORITY.KEYID = 7
1,212,829 UART: [ldev] FE.KEYID = 1
1,218,183 UART: [ldev] Erasing FE.KEYID = 1
1,244,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,503 UART: [ldev] --
1,283,996 UART: [fwproc] Wait for Commands...
1,284,592 UART: [fwproc] Recv command 0x46574c44
1,285,320 UART: [fwproc] Recv'd Img size: 118548 bytes
1,565,254 UART: ROM Fatal Error: 0x000B0023
1,566,411 >>> mbox cmd response: failed
1,566,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,566,417 >>> mbox cmd response: failed
1,566,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,566,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
893,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,385 UART: [kat] ++
897,537 UART: [kat] sha1
901,723 UART: [kat] SHA2-256
903,663 UART: [kat] SHA2-384
906,378 UART: [kat] SHA2-512-ACC
908,279 UART: [kat] ECC-384
918,188 UART: [kat] HMAC-384Kdf
922,834 UART: [kat] LMS
1,171,162 UART: [kat] --
1,172,097 UART: [cold-reset] ++
1,172,567 UART: [fht] FHT @ 0x50003400
1,175,012 UART: [idev] ++
1,175,180 UART: [idev] CDI.KEYID = 6
1,175,540 UART: [idev] SUBJECT.KEYID = 7
1,175,964 UART: [idev] UDS.KEYID = 0
1,176,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,878 UART: [idev] Erasing UDS.KEYID = 0
1,200,687 UART: [idev] Sha1 KeyId Algorithm
1,209,191 UART: [idev] --
1,210,141 UART: [ldev] ++
1,210,309 UART: [ldev] CDI.KEYID = 6
1,210,672 UART: [ldev] SUBJECT.KEYID = 5
1,211,098 UART: [ldev] AUTHORITY.KEYID = 7
1,211,561 UART: [ldev] FE.KEYID = 1
1,216,705 UART: [ldev] Erasing FE.KEYID = 1
1,242,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,001 UART: [ldev] --
1,282,318 UART: [fwproc] Wait for Commands...
1,283,108 UART: [fwproc] Recv command 0x46574c44
1,283,836 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,401 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,571 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,952 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,254 >>> mbox cmd response: failed
1,418,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,260 >>> mbox cmd response: failed
1,418,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,266 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,277 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
893,305 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,430 UART: [kat] ++
897,582 UART: [kat] sha1
901,762 UART: [kat] SHA2-256
903,702 UART: [kat] SHA2-384
906,637 UART: [kat] SHA2-512-ACC
908,538 UART: [kat] ECC-384
918,475 UART: [kat] HMAC-384Kdf
923,153 UART: [kat] LMS
1,171,481 UART: [kat] --
1,172,410 UART: [cold-reset] ++
1,172,976 UART: [fht] FHT @ 0x50003400
1,175,417 UART: [idev] ++
1,175,585 UART: [idev] CDI.KEYID = 6
1,175,945 UART: [idev] SUBJECT.KEYID = 7
1,176,369 UART: [idev] UDS.KEYID = 0
1,176,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,361 UART: [idev] Erasing UDS.KEYID = 0
1,201,406 UART: [idev] Sha1 KeyId Algorithm
1,209,954 UART: [idev] --
1,210,954 UART: [ldev] ++
1,211,122 UART: [ldev] CDI.KEYID = 6
1,211,485 UART: [ldev] SUBJECT.KEYID = 5
1,211,911 UART: [ldev] AUTHORITY.KEYID = 7
1,212,374 UART: [ldev] FE.KEYID = 1
1,217,780 UART: [ldev] Erasing FE.KEYID = 1
1,243,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,854 UART: [ldev] --
1,283,155 UART: [fwproc] Wait for Commands...
1,283,831 UART: [fwproc] Recv command 0x46574c44
1,284,559 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,655 UART: ROM Fatal Error: 0x000B0023
1,564,812 >>> mbox cmd response: failed
1,564,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,818 >>> mbox cmd response: failed
1,564,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
87,000 UART: [state] WD Timer not started. Device not locked for debugging
88,245 UART: [kat] SHA2-256
893,895 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,020 UART: [kat] ++
898,172 UART: [kat] sha1
902,228 UART: [kat] SHA2-256
904,168 UART: [kat] SHA2-384
906,829 UART: [kat] SHA2-512-ACC
908,730 UART: [kat] ECC-384
918,261 UART: [kat] HMAC-384Kdf
922,901 UART: [kat] LMS
1,171,229 UART: [kat] --
1,172,308 UART: [cold-reset] ++
1,172,786 UART: [fht] FHT @ 0x50003400
1,175,293 UART: [idev] ++
1,175,461 UART: [idev] CDI.KEYID = 6
1,175,821 UART: [idev] SUBJECT.KEYID = 7
1,176,245 UART: [idev] UDS.KEYID = 0
1,176,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,197 UART: [idev] Erasing UDS.KEYID = 0
1,201,622 UART: [idev] Sha1 KeyId Algorithm
1,209,974 UART: [idev] --
1,210,984 UART: [ldev] ++
1,211,152 UART: [ldev] CDI.KEYID = 6
1,211,515 UART: [ldev] SUBJECT.KEYID = 5
1,211,941 UART: [ldev] AUTHORITY.KEYID = 7
1,212,404 UART: [ldev] FE.KEYID = 1
1,217,754 UART: [ldev] Erasing FE.KEYID = 1
1,243,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,532 UART: [ldev] --
1,282,865 UART: [fwproc] Wait for Commands...
1,283,559 UART: [fwproc] Recv command 0x46574c44
1,284,287 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,308 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,478 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,679 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,771 >>> mbox cmd response: failed
1,420,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,777 >>> mbox cmd response: failed
1,420,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,120 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,332 UART:
192,682 UART: Running Caliptra ROM ...
193,875 UART:
194,031 UART: [state] CFI Enabled
263,396 UART: [state] LifecycleState = Unprovisioned
265,385 UART: [state] DebugLocked = No
267,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,435 UART: [kat] SHA2-256
441,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,653 UART: [kat] ++
452,183 UART: [kat] sha1
463,740 UART: [kat] SHA2-256
466,474 UART: [kat] SHA2-384
472,515 UART: [kat] SHA2-512-ACC
474,869 UART: [kat] ECC-384
2,766,275 UART: [kat] HMAC-384Kdf
2,798,218 UART: [kat] LMS
3,988,552 UART: [kat] --
3,991,433 UART: [cold-reset] ++
3,993,106 UART: [fht] Storing FHT @ 0x50003400
4,004,322 UART: [idev] ++
4,004,900 UART: [idev] CDI.KEYID = 6
4,005,819 UART: [idev] SUBJECT.KEYID = 7
4,007,039 UART: [idev] UDS.KEYID = 0
4,009,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,258 UART: [idev] Erasing UDS.KEYID = 0
7,347,207 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,782 UART: [idev] --
7,372,244 UART: [ldev] ++
7,372,816 UART: [ldev] CDI.KEYID = 6
7,373,759 UART: [ldev] SUBJECT.KEYID = 5
7,374,975 UART: [ldev] AUTHORITY.KEYID = 7
7,376,268 UART: [ldev] FE.KEYID = 1
7,422,243 UART: [ldev] Erasing FE.KEYID = 1
10,756,166 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,166 UART: [ldev] --
13,137,410 UART: [fwproc] Waiting for Commands...
13,139,898 UART: [fwproc] Received command 0x46574c44
13,142,143 UART: [fwproc] Received Image of size 118548 bytes
16,103,075 UART: ROM Fatal Error: 0x000B0024
16,106,532 >>> mbox cmd response: failed
16,106,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,107,203 >>> mbox cmd response: failed
16,107,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,107,803 >>> mbox cmd response: failed
Initializing fuses
2,062,953 writing to cptra_bootfsm_go
2,252,274 UART:
2,252,629 UART: Running Caliptra ROM ...
2,253,773 UART:
2,253,939 UART: [state] CFI Enabled
2,311,344 UART: [state] LifecycleState = Unprovisioned
2,313,310 UART: [state] DebugLocked = No
2,315,016 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,719 UART: [kat] SHA2-256
2,489,399 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,499,934 UART: [kat] ++
2,500,422 UART: [kat] sha1
2,512,016 UART: [kat] SHA2-256
2,514,699 UART: [kat] SHA2-384
2,520,108 UART: [kat] SHA2-512-ACC
2,522,520 UART: [kat] ECC-384
4,812,485 UART: [kat] HMAC-384Kdf
4,824,468 UART: [kat] LMS
6,014,771 UART: [kat] --
6,020,349 UART: [cold-reset] ++
6,022,888 UART: [fht] Storing FHT @ 0x50003400
6,034,749 UART: [idev] ++
6,035,354 UART: [idev] CDI.KEYID = 6
6,036,292 UART: [idev] SUBJECT.KEYID = 7
6,037,464 UART: [idev] UDS.KEYID = 0
6,039,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,188,918 UART: [idev] Erasing UDS.KEYID = 0
9,371,867 UART: [idev] Using Sha1 for KeyId Algorithm
9,394,213 UART: [idev] --
9,399,586 UART: [ldev] ++
9,400,164 UART: [ldev] CDI.KEYID = 6
9,401,134 UART: [ldev] SUBJECT.KEYID = 5
9,402,344 UART: [ldev] AUTHORITY.KEYID = 7
9,403,591 UART: [ldev] FE.KEYID = 1
9,449,295 UART: [ldev] Erasing FE.KEYID = 1
12,781,695 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,075,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,090,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,104,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,119,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,139,464 UART: [ldev] --
15,143,600 UART: [fwproc] Waiting for Commands...
15,146,133 UART: [fwproc] Received command 0x46574c44
15,148,334 UART: [fwproc] Received Image of size 118548 bytes
19,258,691 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,338,387 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,411,574 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,739,302 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,806,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,881,067 >>> mbox cmd response: failed
15,881,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,882,052 >>> mbox cmd response: failed
15,882,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,882,638 >>> mbox cmd response: failed
Initializing fuses
2,059,322 writing to cptra_bootfsm_go
5,859,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,992,164 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,403 UART:
192,803 UART: Running Caliptra ROM ...
193,940 UART:
603,609 UART: [state] CFI Enabled
617,819 UART: [state] LifecycleState = Unprovisioned
619,726 UART: [state] DebugLocked = No
621,709 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,101 UART: [kat] SHA2-256
795,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,401 UART: [kat] ++
806,854 UART: [kat] sha1
816,223 UART: [kat] SHA2-256
818,970 UART: [kat] SHA2-384
824,141 UART: [kat] SHA2-512-ACC
826,487 UART: [kat] ECC-384
3,107,284 UART: [kat] HMAC-384Kdf
3,118,922 UART: [kat] LMS
4,309,040 UART: [kat] --
4,315,071 UART: [cold-reset] ++
4,316,856 UART: [fht] Storing FHT @ 0x50003400
4,327,213 UART: [idev] ++
4,327,784 UART: [idev] CDI.KEYID = 6
4,328,752 UART: [idev] SUBJECT.KEYID = 7
4,329,970 UART: [idev] UDS.KEYID = 0
4,332,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,930 UART: [idev] Erasing UDS.KEYID = 0
7,620,509 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,465 UART: [idev] --
7,644,715 UART: [ldev] ++
7,645,348 UART: [ldev] CDI.KEYID = 6
7,646,263 UART: [ldev] SUBJECT.KEYID = 5
7,647,509 UART: [ldev] AUTHORITY.KEYID = 7
7,648,753 UART: [ldev] FE.KEYID = 1
7,659,619 UART: [ldev] Erasing FE.KEYID = 1
10,948,328 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,105 UART: [ldev] --
13,309,052 UART: [fwproc] Waiting for Commands...
13,311,003 UART: [fwproc] Received command 0x46574c44
13,313,200 UART: [fwproc] Received Image of size 118548 bytes
16,275,508 UART: ROM Fatal Error: 0x000B0024
16,279,015 >>> mbox cmd response: failed
16,279,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,279,680 >>> mbox cmd response: failed
16,279,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,280,274 >>> mbox cmd response: failed
Initializing fuses
2,057,580 writing to cptra_bootfsm_go
2,246,909 UART:
2,247,263 UART: Running Caliptra ROM ...
2,248,363 UART:
4,177,392 UART: [state] CFI Enabled
4,190,466 UART: [state] LifecycleState = Unprovisioned
4,192,406 UART: [state] DebugLocked = No
4,194,942 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,199,690 UART: [kat] SHA2-256
4,369,460 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,379,970 UART: [kat] ++
4,380,482 UART: [kat] sha1
4,391,162 UART: [kat] SHA2-256
4,393,866 UART: [kat] SHA2-384
4,398,999 UART: [kat] SHA2-512-ACC
4,401,354 UART: [kat] ECC-384
6,685,014 UART: [kat] HMAC-384Kdf
6,697,962 UART: [kat] LMS
7,888,103 UART: [kat] --
7,892,071 UART: [cold-reset] ++
7,893,048 UART: [fht] Storing FHT @ 0x50003400
7,903,132 UART: [idev] ++
7,903,705 UART: [idev] CDI.KEYID = 6
7,904,728 UART: [idev] SUBJECT.KEYID = 7
7,905,897 UART: [idev] UDS.KEYID = 0
7,908,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,057,269 UART: [idev] Erasing UDS.KEYID = 0
11,191,033 UART: [idev] Using Sha1 for KeyId Algorithm
11,212,359 UART: [idev] --
11,216,734 UART: [ldev] ++
11,217,360 UART: [ldev] CDI.KEYID = 6
11,218,243 UART: [ldev] SUBJECT.KEYID = 5
11,219,553 UART: [ldev] AUTHORITY.KEYID = 7
11,220,714 UART: [ldev] FE.KEYID = 1
11,230,799 UART: [ldev] Erasing FE.KEYID = 1
14,520,157 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,813,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,827,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,842,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,857,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,876,897 UART: [ldev] --
16,881,952 UART: [fwproc] Waiting for Commands...
16,884,487 UART: [fwproc] Received command 0x46574c44
16,886,698 UART: [fwproc] Received Image of size 118548 bytes
20,993,011 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,068,290 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,141,480 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,469,304 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
4,126,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,062,433 >>> mbox cmd response: failed
16,063,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,063,559 >>> mbox cmd response: failed
16,063,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,064,146 >>> mbox cmd response: failed
Initializing fuses
2,059,893 writing to cptra_bootfsm_go
7,932,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,963,976 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
192,196 UART:
192,570 UART: Running Caliptra ROM ...
193,803 UART:
193,965 UART: [state] CFI Enabled
266,039 UART: [state] LifecycleState = Unprovisioned
268,004 UART: [state] DebugLocked = No
270,129 UART: [state] WD Timer not started. Device not locked for debugging
273,627 UART: [kat] SHA2-256
453,278 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,076 UART: [kat] ++
464,542 UART: [kat] sha1
476,329 UART: [kat] SHA2-256
479,025 UART: [kat] SHA2-384
484,527 UART: [kat] SHA2-512-ACC
486,872 UART: [kat] ECC-384
2,947,164 UART: [kat] HMAC-384Kdf
2,969,249 UART: [kat] LMS
3,445,740 UART: [kat] --
3,450,815 UART: [cold-reset] ++
3,452,265 UART: [fht] FHT @ 0x50003400
3,463,147 UART: [idev] ++
3,463,727 UART: [idev] CDI.KEYID = 6
3,464,751 UART: [idev] SUBJECT.KEYID = 7
3,465,914 UART: [idev] UDS.KEYID = 0
3,468,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,983 UART: [idev] Erasing UDS.KEYID = 0
5,986,280 UART: [idev] Sha1 KeyId Algorithm
6,010,495 UART: [idev] --
6,016,062 UART: [ldev] ++
6,016,648 UART: [ldev] CDI.KEYID = 6
6,017,595 UART: [ldev] SUBJECT.KEYID = 5
6,018,815 UART: [ldev] AUTHORITY.KEYID = 7
6,020,056 UART: [ldev] FE.KEYID = 1
6,055,883 UART: [ldev] Erasing FE.KEYID = 1
8,564,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,020 UART: [ldev] --
10,372,131 UART: [fwproc] Wait for Commands...
10,374,352 UART: [fwproc] Recv command 0x46574c44
10,376,346 UART: [fwproc] Recv'd Img size: 118548 bytes
12,694,644 UART: ROM Fatal Error: 0x000B0024
12,697,880 >>> mbox cmd response: failed
12,698,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,698,637 >>> mbox cmd response: failed
12,698,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,699,203 >>> mbox cmd response: failed
Initializing fuses
2,067,345 writing to cptra_bootfsm_go
2,256,617 UART:
2,256,970 UART: Running Caliptra ROM ...
2,258,110 UART:
2,258,302 UART: [state] CFI Enabled
2,323,795 UART: [state] LifecycleState = Unprovisioned
2,325,744 UART: [state] DebugLocked = No
2,327,248 UART: [state] WD Timer not started. Device not locked for debugging
2,331,429 UART: [kat] SHA2-256
2,511,104 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,521,882 UART: [kat] ++
2,522,430 UART: [kat] sha1
2,533,599 UART: [kat] SHA2-256
2,536,324 UART: [kat] SHA2-384
2,543,249 UART: [kat] SHA2-512-ACC
2,545,599 UART: [kat] ECC-384
5,006,133 UART: [kat] HMAC-384Kdf
5,029,803 UART: [kat] LMS
5,506,287 UART: [kat] --
5,512,115 UART: [cold-reset] ++
5,513,042 UART: [fht] FHT @ 0x50003400
5,524,030 UART: [idev] ++
5,524,611 UART: [idev] CDI.KEYID = 6
5,525,585 UART: [idev] SUBJECT.KEYID = 7
5,526,807 UART: [idev] UDS.KEYID = 0
5,529,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,678,330 UART: [idev] Erasing UDS.KEYID = 0
8,043,317 UART: [idev] Sha1 KeyId Algorithm
8,067,348 UART: [idev] --
8,073,000 UART: [ldev] ++
8,073,592 UART: [ldev] CDI.KEYID = 6
8,074,510 UART: [ldev] SUBJECT.KEYID = 5
8,075,735 UART: [ldev] AUTHORITY.KEYID = 7
8,076,973 UART: [ldev] FE.KEYID = 1
8,115,761 UART: [ldev] Erasing FE.KEYID = 1
10,621,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,357,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,373,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,389,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,404,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,425,118 UART: [ldev] --
12,430,821 UART: [fwproc] Wait for Commands...
12,433,357 UART: [fwproc] Recv command 0x46574c44
12,435,363 UART: [fwproc] Recv'd Img size: 118548 bytes
15,921,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,005,320 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,078,343 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,405,979 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,462,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,554,687 >>> mbox cmd response: failed
12,555,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,555,720 >>> mbox cmd response: failed
12,555,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,556,291 >>> mbox cmd response: failed
Initializing fuses
2,067,771 writing to cptra_bootfsm_go
5,520,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,273,881 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,500 UART:
192,873 UART: Running Caliptra ROM ...
194,097 UART:
603,841 UART: [state] CFI Enabled
618,277 UART: [state] LifecycleState = Unprovisioned
620,156 UART: [state] DebugLocked = No
621,727 UART: [state] WD Timer not started. Device not locked for debugging
624,884 UART: [kat] SHA2-256
804,583 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,348 UART: [kat] ++
815,799 UART: [kat] sha1
827,428 UART: [kat] SHA2-256
830,119 UART: [kat] SHA2-384
835,786 UART: [kat] SHA2-512-ACC
838,141 UART: [kat] ECC-384
3,282,042 UART: [kat] HMAC-384Kdf
3,293,637 UART: [kat] LMS
3,770,118 UART: [kat] --
3,774,731 UART: [cold-reset] ++
3,777,051 UART: [fht] FHT @ 0x50003400
3,787,716 UART: [idev] ++
3,788,290 UART: [idev] CDI.KEYID = 6
3,789,258 UART: [idev] SUBJECT.KEYID = 7
3,790,507 UART: [idev] UDS.KEYID = 0
3,792,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,908 UART: [idev] Erasing UDS.KEYID = 0
6,271,891 UART: [idev] Sha1 KeyId Algorithm
6,295,402 UART: [idev] --
6,300,809 UART: [ldev] ++
6,301,408 UART: [ldev] CDI.KEYID = 6
6,302,378 UART: [ldev] SUBJECT.KEYID = 5
6,303,488 UART: [ldev] AUTHORITY.KEYID = 7
6,304,781 UART: [ldev] FE.KEYID = 1
6,315,058 UART: [ldev] Erasing FE.KEYID = 1
8,792,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,490 UART: [ldev] --
10,590,619 UART: [fwproc] Wait for Commands...
10,592,916 UART: [fwproc] Recv command 0x46574c44
10,594,915 UART: [fwproc] Recv'd Img size: 118548 bytes
12,917,171 UART: ROM Fatal Error: 0x000B0024
12,920,412 >>> mbox cmd response: failed
12,920,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,193 >>> mbox cmd response: failed
12,921,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,809 >>> mbox cmd response: failed
Initializing fuses
2,059,677 writing to cptra_bootfsm_go
2,248,982 UART:
2,249,326 UART: Running Caliptra ROM ...
2,250,380 UART:
7,536,528 UART: [state] CFI Enabled
7,552,526 UART: [state] LifecycleState = Unprovisioned
7,554,454 UART: [state] DebugLocked = No
7,556,821 UART: [state] WD Timer not started. Device not locked for debugging
7,559,922 UART: [kat] SHA2-256
7,739,573 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,750,350 UART: [kat] ++
7,750,821 UART: [kat] sha1
7,761,550 UART: [kat] SHA2-256
7,764,252 UART: [kat] SHA2-384
7,769,272 UART: [kat] SHA2-512-ACC
7,771,638 UART: [kat] ECC-384
10,213,805 UART: [kat] HMAC-384Kdf
10,226,658 UART: [kat] LMS
10,703,167 UART: [kat] --
10,707,172 UART: [cold-reset] ++
10,708,315 UART: [fht] FHT @ 0x50003400
10,718,631 UART: [idev] ++
10,719,198 UART: [idev] CDI.KEYID = 6
10,720,146 UART: [idev] SUBJECT.KEYID = 7
10,721,361 UART: [idev] UDS.KEYID = 0
10,724,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,873,057 UART: [idev] Erasing UDS.KEYID = 0
13,204,043 UART: [idev] Sha1 KeyId Algorithm
13,228,084 UART: [idev] --
13,232,950 UART: [ldev] ++
13,233,519 UART: [ldev] CDI.KEYID = 6
13,234,464 UART: [ldev] SUBJECT.KEYID = 5
13,235,677 UART: [ldev] AUTHORITY.KEYID = 7
13,236,910 UART: [ldev] FE.KEYID = 1
13,249,427 UART: [ldev] Erasing FE.KEYID = 1
15,729,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,450,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,465,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,481,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,497,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,519,454 UART: [ldev] --
17,524,648 UART: [fwproc] Wait for Commands...
17,526,265 UART: [fwproc] Recv command 0x46574c44
17,528,260 UART: [fwproc] Recv'd Img size: 118548 bytes
21,015,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,096,646 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,169,670 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,498,099 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,784,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,796,588 >>> mbox cmd response: failed
12,797,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,797,480 >>> mbox cmd response: failed
12,797,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,798,040 >>> mbox cmd response: failed
Initializing fuses
2,061,427 writing to cptra_bootfsm_go
10,847,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,510,916 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,185 UART:
192,565 UART: Running Caliptra ROM ...
193,702 UART:
193,872 UART: [state] CFI Enabled
264,200 UART: [state] LifecycleState = Unprovisioned
266,634 UART: [state] DebugLocked = No
268,456 UART: [state] WD Timer not started. Device not locked for debugging
272,839 UART: [kat] SHA2-256
462,685 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,472 UART: [kat] ++
474,010 UART: [kat] sha1
485,234 UART: [kat] SHA2-256
488,254 UART: [kat] SHA2-384
493,772 UART: [kat] SHA2-512-ACC
496,407 UART: [kat] ECC-384
2,944,331 UART: [kat] HMAC-384Kdf
2,971,153 UART: [kat] LMS
3,502,936 UART: [kat] --
3,508,400 UART: [cold-reset] ++
3,509,441 UART: [fht] FHT @ 0x50003400
3,520,486 UART: [idev] ++
3,521,181 UART: [idev] CDI.KEYID = 6
3,522,094 UART: [idev] SUBJECT.KEYID = 7
3,523,319 UART: [idev] UDS.KEYID = 0
3,526,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,365 UART: [idev] Erasing UDS.KEYID = 0
6,027,640 UART: [idev] Sha1 KeyId Algorithm
6,048,564 UART: [idev] --
6,053,861 UART: [ldev] ++
6,054,552 UART: [ldev] CDI.KEYID = 6
6,055,443 UART: [ldev] SUBJECT.KEYID = 5
6,056,669 UART: [ldev] AUTHORITY.KEYID = 7
6,057,801 UART: [ldev] FE.KEYID = 1
6,099,784 UART: [ldev] Erasing FE.KEYID = 1
8,607,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,426 UART: [ldev] --
10,412,033 UART: [fwproc] Wait for Commands...
10,414,311 UART: [fwproc] Recv command 0x46574c44
10,416,579 UART: [fwproc] Recv'd Img size: 118548 bytes
12,746,736 UART: ROM Fatal Error: 0x000B0024
12,750,355 >>> mbox cmd response: failed
12,750,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,751,066 >>> mbox cmd response: failed
12,751,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,751,678 >>> mbox cmd response: failed
Initializing fuses
2,062,151 writing to cptra_bootfsm_go
2,251,465 UART:
2,251,818 UART: Running Caliptra ROM ...
2,252,967 UART:
2,253,144 UART: [state] CFI Enabled
2,319,130 UART: [state] LifecycleState = Unprovisioned
2,321,536 UART: [state] DebugLocked = No
2,323,210 UART: [state] WD Timer not started. Device not locked for debugging
2,328,607 UART: [kat] SHA2-256
2,518,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,529,272 UART: [kat] ++
2,529,819 UART: [kat] sha1
2,540,018 UART: [kat] SHA2-256
2,543,038 UART: [kat] SHA2-384
2,548,726 UART: [kat] SHA2-512-ACC
2,551,276 UART: [kat] ECC-384
5,001,767 UART: [kat] HMAC-384Kdf
5,025,828 UART: [kat] LMS
5,557,563 UART: [kat] --
5,561,768 UART: [cold-reset] ++
5,563,975 UART: [fht] FHT @ 0x50003400
5,574,833 UART: [idev] ++
5,575,508 UART: [idev] CDI.KEYID = 6
5,576,437 UART: [idev] SUBJECT.KEYID = 7
5,577,607 UART: [idev] UDS.KEYID = 0
5,580,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,729,060 UART: [idev] Erasing UDS.KEYID = 0
8,079,445 UART: [idev] Sha1 KeyId Algorithm
8,103,013 UART: [idev] --
8,107,768 UART: [ldev] ++
8,108,456 UART: [ldev] CDI.KEYID = 6
8,109,392 UART: [ldev] SUBJECT.KEYID = 5
8,110,561 UART: [ldev] AUTHORITY.KEYID = 7
8,111,801 UART: [ldev] FE.KEYID = 1
8,154,549 UART: [ldev] Erasing FE.KEYID = 1
10,661,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,396,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,748 UART: [ldev] --
12,467,358 UART: [fwproc] Wait for Commands...
12,470,442 UART: [fwproc] Recv command 0x46574c44
12,472,707 UART: [fwproc] Recv'd Img size: 118548 bytes
15,975,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,052,537 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,176,143 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,736,381 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
3,441,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,642,661 >>> mbox cmd response: failed
12,643,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,644,038 >>> mbox cmd response: failed
12,644,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,644,631 >>> mbox cmd response: failed
Initializing fuses
2,062,476 writing to cptra_bootfsm_go
5,498,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,868,828 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,478 UART:
192,853 UART: Running Caliptra ROM ...
194,050 UART:
603,524 UART: [state] CFI Enabled
614,212 UART: [state] LifecycleState = Unprovisioned
616,591 UART: [state] DebugLocked = No
619,381 UART: [state] WD Timer not started. Device not locked for debugging
623,876 UART: [kat] SHA2-256
813,757 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,505 UART: [kat] ++
825,101 UART: [kat] sha1
837,616 UART: [kat] SHA2-256
840,591 UART: [kat] SHA2-384
845,613 UART: [kat] SHA2-512-ACC
848,181 UART: [kat] ECC-384
3,290,756 UART: [kat] HMAC-384Kdf
3,302,394 UART: [kat] LMS
3,834,243 UART: [kat] --
3,839,074 UART: [cold-reset] ++
3,841,457 UART: [fht] FHT @ 0x50003400
3,852,668 UART: [idev] ++
3,853,366 UART: [idev] CDI.KEYID = 6
3,854,252 UART: [idev] SUBJECT.KEYID = 7
3,855,530 UART: [idev] UDS.KEYID = 0
3,858,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,707 UART: [idev] Erasing UDS.KEYID = 0
6,335,129 UART: [idev] Sha1 KeyId Algorithm
6,357,242 UART: [idev] --
6,362,893 UART: [ldev] ++
6,363,590 UART: [ldev] CDI.KEYID = 6
6,364,505 UART: [ldev] SUBJECT.KEYID = 5
6,365,690 UART: [ldev] AUTHORITY.KEYID = 7
6,366,878 UART: [ldev] FE.KEYID = 1
6,376,610 UART: [ldev] Erasing FE.KEYID = 1
8,855,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,043 UART: [ldev] --
10,646,828 UART: [fwproc] Wait for Commands...
10,649,367 UART: [fwproc] Recv command 0x46574c44
10,651,639 UART: [fwproc] Recv'd Img size: 118548 bytes
12,986,561 UART: ROM Fatal Error: 0x000B0024
12,990,201 >>> mbox cmd response: failed
12,990,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,990,934 >>> mbox cmd response: failed
12,991,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,991,575 >>> mbox cmd response: failed
Initializing fuses
2,062,426 writing to cptra_bootfsm_go
2,251,746 UART:
2,252,097 UART: Running Caliptra ROM ...
2,253,148 UART:
7,466,795 UART: [state] CFI Enabled
7,477,242 UART: [state] LifecycleState = Unprovisioned
7,479,611 UART: [state] DebugLocked = No
7,481,714 UART: [state] WD Timer not started. Device not locked for debugging
7,486,838 UART: [kat] SHA2-256
7,676,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,687,481 UART: [kat] ++
7,688,070 UART: [kat] sha1
7,700,911 UART: [kat] SHA2-256
7,703,944 UART: [kat] SHA2-384
7,709,405 UART: [kat] SHA2-512-ACC
7,711,983 UART: [kat] ECC-384
10,152,643 UART: [kat] HMAC-384Kdf
10,165,902 UART: [kat] LMS
10,697,760 UART: [kat] --
10,701,269 UART: [cold-reset] ++
10,703,741 UART: [fht] FHT @ 0x50003400
10,715,470 UART: [idev] ++
10,716,187 UART: [idev] CDI.KEYID = 6
10,717,108 UART: [idev] SUBJECT.KEYID = 7
10,718,332 UART: [idev] UDS.KEYID = 0
10,720,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,869,805 UART: [idev] Erasing UDS.KEYID = 0
13,199,536 UART: [idev] Sha1 KeyId Algorithm
13,222,180 UART: [idev] --
13,225,796 UART: [ldev] ++
13,226,479 UART: [ldev] CDI.KEYID = 6
13,227,389 UART: [ldev] SUBJECT.KEYID = 5
13,228,549 UART: [ldev] AUTHORITY.KEYID = 7
13,229,785 UART: [ldev] FE.KEYID = 1
13,240,705 UART: [ldev] Erasing FE.KEYID = 1
15,716,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,436,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,451,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,466,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,481,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,502,870 UART: [ldev] --
17,507,708 UART: [fwproc] Wait for Commands...
17,510,879 UART: [fwproc] Recv command 0x46574c44
17,513,179 UART: [fwproc] Recv'd Img size: 118548 bytes
21,011,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,088,350 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,211,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,771,447 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,495 writing to cptra_bootfsm_go
3,758,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,883,149 >>> mbox cmd response: failed
12,883,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,884,114 >>> mbox cmd response: failed
12,884,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,884,690 >>> mbox cmd response: failed
Initializing fuses
2,074,486 writing to cptra_bootfsm_go
10,733,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,018,642 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,507 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,165 UART: [kat] SHA2-256
882,096 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,211 UART: [kat] ++
886,363 UART: [kat] sha1
890,705 UART: [kat] SHA2-256
892,643 UART: [kat] SHA2-384
895,310 UART: [kat] SHA2-512-ACC
897,211 UART: [kat] ECC-384
902,660 UART: [kat] HMAC-384Kdf
907,368 UART: [kat] LMS
1,475,564 UART: [kat] --
1,476,409 UART: [cold-reset] ++
1,476,865 UART: [fht] Storing FHT @ 0x50003400
1,479,680 UART: [idev] ++
1,479,848 UART: [idev] CDI.KEYID = 6
1,480,208 UART: [idev] SUBJECT.KEYID = 7
1,480,632 UART: [idev] UDS.KEYID = 0
1,480,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,438 UART: [idev] Erasing UDS.KEYID = 0
1,505,532 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,040 UART: [idev] --
1,515,115 UART: [ldev] ++
1,515,283 UART: [ldev] CDI.KEYID = 6
1,515,646 UART: [ldev] SUBJECT.KEYID = 5
1,516,072 UART: [ldev] AUTHORITY.KEYID = 7
1,516,535 UART: [ldev] FE.KEYID = 1
1,521,589 UART: [ldev] Erasing FE.KEYID = 1
1,547,004 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,870 UART: [ldev] --
1,586,317 UART: [fwproc] Waiting for Commands...
1,586,998 UART: [fwproc] Received command 0x46574c44
1,587,789 UART: [fwproc] Received Image of size 118548 bytes
1,867,408 UART: ROM Fatal Error: 0x000B0024
1,868,565 >>> mbox cmd response: failed
1,868,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,571 >>> mbox cmd response: failed
1,868,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,577 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,911 UART: [kat] SHA2-256
881,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,957 UART: [kat] ++
886,109 UART: [kat] sha1
890,271 UART: [kat] SHA2-256
892,209 UART: [kat] SHA2-384
894,984 UART: [kat] SHA2-512-ACC
896,885 UART: [kat] ECC-384
902,318 UART: [kat] HMAC-384Kdf
906,750 UART: [kat] LMS
1,474,946 UART: [kat] --
1,475,757 UART: [cold-reset] ++
1,476,155 UART: [fht] Storing FHT @ 0x50003400
1,478,912 UART: [idev] ++
1,479,080 UART: [idev] CDI.KEYID = 6
1,479,440 UART: [idev] SUBJECT.KEYID = 7
1,479,864 UART: [idev] UDS.KEYID = 0
1,480,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,740 UART: [idev] Erasing UDS.KEYID = 0
1,504,556 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,070 UART: [idev] --
1,514,105 UART: [ldev] ++
1,514,273 UART: [ldev] CDI.KEYID = 6
1,514,636 UART: [ldev] SUBJECT.KEYID = 5
1,515,062 UART: [ldev] AUTHORITY.KEYID = 7
1,515,525 UART: [ldev] FE.KEYID = 1
1,520,911 UART: [ldev] Erasing FE.KEYID = 1
1,546,640 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,466 UART: [ldev] --
1,585,945 UART: [fwproc] Waiting for Commands...
1,586,598 UART: [fwproc] Received command 0x46574c44
1,587,389 UART: [fwproc] Received Image of size 118548 bytes
2,932,000 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,806 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,024 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,371 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,721,442 >>> mbox cmd response: failed
1,721,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,448 >>> mbox cmd response: failed
1,721,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,454 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,425 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,855 UART: [state] LifecycleState = Unprovisioned
86,510 UART: [state] DebugLocked = No
87,208 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,764 UART: [kat] SHA2-256
882,695 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,810 UART: [kat] ++
886,962 UART: [kat] sha1
891,278 UART: [kat] SHA2-256
893,216 UART: [kat] SHA2-384
895,969 UART: [kat] SHA2-512-ACC
897,870 UART: [kat] ECC-384
903,411 UART: [kat] HMAC-384Kdf
907,875 UART: [kat] LMS
1,476,071 UART: [kat] --
1,476,916 UART: [cold-reset] ++
1,477,276 UART: [fht] Storing FHT @ 0x50003400
1,480,189 UART: [idev] ++
1,480,357 UART: [idev] CDI.KEYID = 6
1,480,717 UART: [idev] SUBJECT.KEYID = 7
1,481,141 UART: [idev] UDS.KEYID = 0
1,481,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,369 UART: [idev] Erasing UDS.KEYID = 0
1,506,209 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,805 UART: [idev] --
1,515,808 UART: [ldev] ++
1,515,976 UART: [ldev] CDI.KEYID = 6
1,516,339 UART: [ldev] SUBJECT.KEYID = 5
1,516,765 UART: [ldev] AUTHORITY.KEYID = 7
1,517,228 UART: [ldev] FE.KEYID = 1
1,522,290 UART: [ldev] Erasing FE.KEYID = 1
1,547,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,317 UART: [ldev] --
1,586,644 UART: [fwproc] Waiting for Commands...
1,587,463 UART: [fwproc] Received command 0x46574c44
1,588,254 UART: [fwproc] Received Image of size 118548 bytes
1,867,241 UART: ROM Fatal Error: 0x000B0024
1,868,398 >>> mbox cmd response: failed
1,868,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,404 >>> mbox cmd response: failed
1,868,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,410 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
87,014 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,602 UART: [kat] SHA2-256
882,533 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,648 UART: [kat] ++
886,800 UART: [kat] sha1
891,096 UART: [kat] SHA2-256
893,034 UART: [kat] SHA2-384
895,975 UART: [kat] SHA2-512-ACC
897,876 UART: [kat] ECC-384
903,405 UART: [kat] HMAC-384Kdf
908,071 UART: [kat] LMS
1,476,267 UART: [kat] --
1,476,876 UART: [cold-reset] ++
1,477,256 UART: [fht] Storing FHT @ 0x50003400
1,480,049 UART: [idev] ++
1,480,217 UART: [idev] CDI.KEYID = 6
1,480,577 UART: [idev] SUBJECT.KEYID = 7
1,481,001 UART: [idev] UDS.KEYID = 0
1,481,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,881 UART: [idev] Erasing UDS.KEYID = 0
1,505,615 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,223 UART: [idev] --
1,515,444 UART: [ldev] ++
1,515,612 UART: [ldev] CDI.KEYID = 6
1,515,975 UART: [ldev] SUBJECT.KEYID = 5
1,516,401 UART: [ldev] AUTHORITY.KEYID = 7
1,516,864 UART: [ldev] FE.KEYID = 1
1,522,148 UART: [ldev] Erasing FE.KEYID = 1
1,548,087 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,019 UART: [ldev] --
1,587,438 UART: [fwproc] Waiting for Commands...
1,588,135 UART: [fwproc] Received command 0x46574c44
1,588,926 UART: [fwproc] Received Image of size 118548 bytes
2,933,605 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,907 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,125 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,518 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,721,547 >>> mbox cmd response: failed
1,721,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,553 >>> mbox cmd response: failed
1,721,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,559 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,828 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,402 UART: [kat] ++
895,554 UART: [kat] sha1
899,666 UART: [kat] SHA2-256
901,606 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
915,867 UART: [kat] HMAC-384Kdf
920,583 UART: [kat] LMS
1,168,895 UART: [kat] --
1,169,534 UART: [cold-reset] ++
1,169,998 UART: [fht] FHT @ 0x50003400
1,172,612 UART: [idev] ++
1,172,780 UART: [idev] CDI.KEYID = 6
1,173,141 UART: [idev] SUBJECT.KEYID = 7
1,173,566 UART: [idev] UDS.KEYID = 0
1,173,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,459 UART: [idev] Erasing UDS.KEYID = 0
1,199,021 UART: [idev] Sha1 KeyId Algorithm
1,207,809 UART: [idev] --
1,209,038 UART: [ldev] ++
1,209,206 UART: [ldev] CDI.KEYID = 6
1,209,570 UART: [ldev] SUBJECT.KEYID = 5
1,209,997 UART: [ldev] AUTHORITY.KEYID = 7
1,210,460 UART: [ldev] FE.KEYID = 1
1,215,618 UART: [ldev] Erasing FE.KEYID = 1
1,241,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,526 UART: [ldev] --
1,280,787 UART: [fwproc] Wait for Commands...
1,281,498 UART: [fwproc] Recv command 0x46574c44
1,282,231 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,856 UART: ROM Fatal Error: 0x000B0024
1,563,013 >>> mbox cmd response: failed
1,563,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,019 >>> mbox cmd response: failed
1,563,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,025 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,808 UART: [state] LifecycleState = Unprovisioned
85,463 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,220 UART: [kat] SHA2-256
890,770 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,874 UART: [kat] ++
895,026 UART: [kat] sha1
899,056 UART: [kat] SHA2-256
900,996 UART: [kat] SHA2-384
903,835 UART: [kat] SHA2-512-ACC
905,736 UART: [kat] ECC-384
915,429 UART: [kat] HMAC-384Kdf
919,919 UART: [kat] LMS
1,168,231 UART: [kat] --
1,169,260 UART: [cold-reset] ++
1,169,830 UART: [fht] FHT @ 0x50003400
1,172,692 UART: [idev] ++
1,172,860 UART: [idev] CDI.KEYID = 6
1,173,221 UART: [idev] SUBJECT.KEYID = 7
1,173,646 UART: [idev] UDS.KEYID = 0
1,173,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,397 UART: [idev] Erasing UDS.KEYID = 0
1,198,587 UART: [idev] Sha1 KeyId Algorithm
1,207,399 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,214,990 UART: [ldev] Erasing FE.KEYID = 1
1,241,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,328 UART: [ldev] --
1,280,589 UART: [fwproc] Wait for Commands...
1,281,254 UART: [fwproc] Recv command 0x46574c44
1,281,987 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,644 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,819 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,122 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,218 >>> mbox cmd response: failed
1,416,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,416,224 >>> mbox cmd response: failed
1,416,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,416,230 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,687 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,789 UART: [kat] SHA2-256
901,729 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
916,362 UART: [kat] HMAC-384Kdf
921,182 UART: [kat] LMS
1,169,494 UART: [kat] --
1,170,485 UART: [cold-reset] ++
1,170,975 UART: [fht] FHT @ 0x50003400
1,173,665 UART: [idev] ++
1,173,833 UART: [idev] CDI.KEYID = 6
1,174,194 UART: [idev] SUBJECT.KEYID = 7
1,174,619 UART: [idev] UDS.KEYID = 0
1,174,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,048 UART: [idev] Erasing UDS.KEYID = 0
1,200,008 UART: [idev] Sha1 KeyId Algorithm
1,208,786 UART: [idev] --
1,209,939 UART: [ldev] ++
1,210,107 UART: [ldev] CDI.KEYID = 6
1,210,471 UART: [ldev] SUBJECT.KEYID = 5
1,210,898 UART: [ldev] AUTHORITY.KEYID = 7
1,211,361 UART: [ldev] FE.KEYID = 1
1,216,537 UART: [ldev] Erasing FE.KEYID = 1
1,243,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,821 UART: [ldev] --
1,282,138 UART: [fwproc] Wait for Commands...
1,282,893 UART: [fwproc] Recv command 0x46574c44
1,283,626 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,095 UART: ROM Fatal Error: 0x000B0024
1,563,252 >>> mbox cmd response: failed
1,563,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,258 >>> mbox cmd response: failed
1,563,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,264 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
891,513 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
899,959 UART: [kat] SHA2-256
901,899 UART: [kat] SHA2-384
904,756 UART: [kat] SHA2-512-ACC
906,657 UART: [kat] ECC-384
916,550 UART: [kat] HMAC-384Kdf
920,986 UART: [kat] LMS
1,169,298 UART: [kat] --
1,170,269 UART: [cold-reset] ++
1,170,691 UART: [fht] FHT @ 0x50003400
1,173,523 UART: [idev] ++
1,173,691 UART: [idev] CDI.KEYID = 6
1,174,052 UART: [idev] SUBJECT.KEYID = 7
1,174,477 UART: [idev] UDS.KEYID = 0
1,174,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,199,186 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,209,149 UART: [ldev] ++
1,209,317 UART: [ldev] CDI.KEYID = 6
1,209,681 UART: [ldev] SUBJECT.KEYID = 5
1,210,108 UART: [ldev] AUTHORITY.KEYID = 7
1,210,571 UART: [ldev] FE.KEYID = 1
1,215,659 UART: [ldev] Erasing FE.KEYID = 1
1,242,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,243 UART: [ldev] --
1,281,552 UART: [fwproc] Wait for Commands...
1,282,325 UART: [fwproc] Recv command 0x46574c44
1,283,058 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,989 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,164 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,453 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,441 >>> mbox cmd response: failed
1,420,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,447 >>> mbox cmd response: failed
1,420,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,780 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
893,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,259 UART: [kat] ++
897,411 UART: [kat] sha1
901,671 UART: [kat] SHA2-256
903,611 UART: [kat] SHA2-384
906,346 UART: [kat] SHA2-512-ACC
908,247 UART: [kat] ECC-384
917,742 UART: [kat] HMAC-384Kdf
922,364 UART: [kat] LMS
1,170,692 UART: [kat] --
1,171,595 UART: [cold-reset] ++
1,172,011 UART: [fht] FHT @ 0x50003400
1,174,706 UART: [idev] ++
1,174,874 UART: [idev] CDI.KEYID = 6
1,175,234 UART: [idev] SUBJECT.KEYID = 7
1,175,658 UART: [idev] UDS.KEYID = 0
1,176,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,488 UART: [idev] Erasing UDS.KEYID = 0
1,199,875 UART: [idev] Sha1 KeyId Algorithm
1,208,513 UART: [idev] --
1,209,511 UART: [ldev] ++
1,209,679 UART: [ldev] CDI.KEYID = 6
1,210,042 UART: [ldev] SUBJECT.KEYID = 5
1,210,468 UART: [ldev] AUTHORITY.KEYID = 7
1,210,931 UART: [ldev] FE.KEYID = 1
1,215,925 UART: [ldev] Erasing FE.KEYID = 1
1,242,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,791 UART: [ldev] --
1,281,122 UART: [fwproc] Wait for Commands...
1,281,824 UART: [fwproc] Recv command 0x46574c44
1,282,552 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,447 UART: ROM Fatal Error: 0x000B0024
1,562,604 >>> mbox cmd response: failed
1,562,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,610 >>> mbox cmd response: failed
1,562,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,616 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
893,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,491 UART: [kat] ++
897,643 UART: [kat] sha1
901,961 UART: [kat] SHA2-256
903,901 UART: [kat] SHA2-384
906,664 UART: [kat] SHA2-512-ACC
908,565 UART: [kat] ECC-384
918,542 UART: [kat] HMAC-384Kdf
923,192 UART: [kat] LMS
1,171,520 UART: [kat] --
1,172,537 UART: [cold-reset] ++
1,172,953 UART: [fht] FHT @ 0x50003400
1,175,720 UART: [idev] ++
1,175,888 UART: [idev] CDI.KEYID = 6
1,176,248 UART: [idev] SUBJECT.KEYID = 7
1,176,672 UART: [idev] UDS.KEYID = 0
1,177,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,218 UART: [idev] Erasing UDS.KEYID = 0
1,200,893 UART: [idev] Sha1 KeyId Algorithm
1,209,553 UART: [idev] --
1,210,501 UART: [ldev] ++
1,210,669 UART: [ldev] CDI.KEYID = 6
1,211,032 UART: [ldev] SUBJECT.KEYID = 5
1,211,458 UART: [ldev] AUTHORITY.KEYID = 7
1,211,921 UART: [ldev] FE.KEYID = 1
1,216,965 UART: [ldev] Erasing FE.KEYID = 1
1,242,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,751 UART: [ldev] --
1,282,158 UART: [fwproc] Wait for Commands...
1,282,768 UART: [fwproc] Recv command 0x46574c44
1,283,496 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,579 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,749 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,980 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,863 >>> mbox cmd response: failed
1,419,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,869 >>> mbox cmd response: failed
1,419,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,805 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,989 UART: [state] LifecycleState = Unprovisioned
86,644 UART: [state] DebugLocked = No
87,174 UART: [state] WD Timer not started. Device not locked for debugging
88,313 UART: [kat] SHA2-256
893,963 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,088 UART: [kat] ++
898,240 UART: [kat] sha1
902,546 UART: [kat] SHA2-256
904,486 UART: [kat] SHA2-384
907,281 UART: [kat] SHA2-512-ACC
909,182 UART: [kat] ECC-384
918,955 UART: [kat] HMAC-384Kdf
923,487 UART: [kat] LMS
1,171,815 UART: [kat] --
1,172,640 UART: [cold-reset] ++
1,173,004 UART: [fht] FHT @ 0x50003400
1,175,735 UART: [idev] ++
1,175,903 UART: [idev] CDI.KEYID = 6
1,176,263 UART: [idev] SUBJECT.KEYID = 7
1,176,687 UART: [idev] UDS.KEYID = 0
1,177,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,885 UART: [idev] Erasing UDS.KEYID = 0
1,202,232 UART: [idev] Sha1 KeyId Algorithm
1,210,606 UART: [idev] --
1,211,670 UART: [ldev] ++
1,211,838 UART: [ldev] CDI.KEYID = 6
1,212,201 UART: [ldev] SUBJECT.KEYID = 5
1,212,627 UART: [ldev] AUTHORITY.KEYID = 7
1,213,090 UART: [ldev] FE.KEYID = 1
1,218,416 UART: [ldev] Erasing FE.KEYID = 1
1,245,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,574 UART: [ldev] --
1,284,927 UART: [fwproc] Wait for Commands...
1,285,641 UART: [fwproc] Recv command 0x46574c44
1,286,369 UART: [fwproc] Recv'd Img size: 118548 bytes
1,565,874 UART: ROM Fatal Error: 0x000B0024
1,567,031 >>> mbox cmd response: failed
1,567,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,567,037 >>> mbox cmd response: failed
1,567,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,567,043 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
893,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,888 UART: [kat] ++
898,040 UART: [kat] sha1
902,080 UART: [kat] SHA2-256
904,020 UART: [kat] SHA2-384
906,769 UART: [kat] SHA2-512-ACC
908,670 UART: [kat] ECC-384
918,405 UART: [kat] HMAC-384Kdf
922,897 UART: [kat] LMS
1,171,225 UART: [kat] --
1,172,214 UART: [cold-reset] ++
1,172,722 UART: [fht] FHT @ 0x50003400
1,175,473 UART: [idev] ++
1,175,641 UART: [idev] CDI.KEYID = 6
1,176,001 UART: [idev] SUBJECT.KEYID = 7
1,176,425 UART: [idev] UDS.KEYID = 0
1,176,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,239 UART: [idev] Erasing UDS.KEYID = 0
1,200,800 UART: [idev] Sha1 KeyId Algorithm
1,209,218 UART: [idev] --
1,210,202 UART: [ldev] ++
1,210,370 UART: [ldev] CDI.KEYID = 6
1,210,733 UART: [ldev] SUBJECT.KEYID = 5
1,211,159 UART: [ldev] AUTHORITY.KEYID = 7
1,211,622 UART: [ldev] FE.KEYID = 1
1,216,914 UART: [ldev] Erasing FE.KEYID = 1
1,243,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,256 UART: [ldev] --
1,282,571 UART: [fwproc] Wait for Commands...
1,283,315 UART: [fwproc] Recv command 0x46574c44
1,284,043 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,296 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,466 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,831 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,974 >>> mbox cmd response: failed
1,419,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,980 >>> mbox cmd response: failed
1,419,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,986 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,958 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,284 UART:
192,658 UART: Running Caliptra ROM ...
193,860 UART:
194,012 UART: [state] CFI Enabled
264,442 UART: [state] LifecycleState = Unprovisioned
266,368 UART: [state] DebugLocked = No
268,783 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,474 UART: [kat] SHA2-256
444,162 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,683 UART: [kat] ++
455,135 UART: [kat] sha1
465,800 UART: [kat] SHA2-256
468,492 UART: [kat] SHA2-384
473,720 UART: [kat] SHA2-512-ACC
476,115 UART: [kat] ECC-384
2,765,594 UART: [kat] HMAC-384Kdf
2,798,251 UART: [kat] LMS
3,988,564 UART: [kat] --
3,994,536 UART: [cold-reset] ++
3,996,855 UART: [fht] Storing FHT @ 0x50003400
4,007,533 UART: [idev] ++
4,008,148 UART: [idev] CDI.KEYID = 6
4,009,072 UART: [idev] SUBJECT.KEYID = 7
4,010,300 UART: [idev] UDS.KEYID = 0
4,013,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,320 UART: [idev] Erasing UDS.KEYID = 0
7,342,529 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,450 UART: [idev] --
7,368,965 UART: [ldev] ++
7,369,549 UART: [ldev] CDI.KEYID = 6
7,370,572 UART: [ldev] SUBJECT.KEYID = 5
7,371,757 UART: [ldev] AUTHORITY.KEYID = 7
7,372,996 UART: [ldev] FE.KEYID = 1
7,420,959 UART: [ldev] Erasing FE.KEYID = 1
10,752,879 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,084 UART: [ldev] --
13,113,485 UART: [fwproc] Waiting for Commands...
13,116,610 UART: [fwproc] Received command 0x46574c44
13,118,798 UART: [fwproc] Received Image of size 118548 bytes
16,070,229 UART: ROM Fatal Error: 0x000B0021
16,073,690 >>> mbox cmd response: failed
16,074,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,074,368 >>> mbox cmd response: failed
16,074,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,074,997 >>> mbox cmd response: failed
Initializing fuses
2,057,504 writing to cptra_bootfsm_go
2,246,855 UART:
2,247,211 UART: Running Caliptra ROM ...
2,248,293 UART:
2,248,453 UART: [state] CFI Enabled
2,324,699 UART: [state] LifecycleState = Unprovisioned
2,326,632 UART: [state] DebugLocked = No
2,328,077 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,333,352 UART: [kat] SHA2-256
2,503,059 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,513,591 UART: [kat] ++
2,514,157 UART: [kat] sha1
2,524,026 UART: [kat] SHA2-256
2,526,720 UART: [kat] SHA2-384
2,533,358 UART: [kat] SHA2-512-ACC
2,535,721 UART: [kat] ECC-384
4,826,696 UART: [kat] HMAC-384Kdf
4,858,071 UART: [kat] LMS
6,048,359 UART: [kat] --
6,053,837 UART: [cold-reset] ++
6,056,433 UART: [fht] Storing FHT @ 0x50003400
6,067,550 UART: [idev] ++
6,068,172 UART: [idev] CDI.KEYID = 6
6,069,059 UART: [idev] SUBJECT.KEYID = 7
6,070,331 UART: [idev] UDS.KEYID = 0
6,072,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,222,016 UART: [idev] Erasing UDS.KEYID = 0
9,407,152 UART: [idev] Using Sha1 for KeyId Algorithm
9,429,828 UART: [idev] --
9,434,852 UART: [ldev] ++
9,435,422 UART: [ldev] CDI.KEYID = 6
9,436,361 UART: [ldev] SUBJECT.KEYID = 5
9,437,611 UART: [ldev] AUTHORITY.KEYID = 7
9,438,766 UART: [ldev] FE.KEYID = 1
9,479,638 UART: [ldev] Erasing FE.KEYID = 1
12,812,421 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,125,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,139,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,154,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,169,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,187,714 UART: [ldev] --
15,191,740 UART: [fwproc] Waiting for Commands...
15,194,382 UART: [fwproc] Received command 0x46574c44
15,196,600 UART: [fwproc] Received Image of size 118548 bytes
19,310,749 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,391,893 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,465,109 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,793,325 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,785,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,840,115 >>> mbox cmd response: failed
15,840,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,841,173 >>> mbox cmd response: failed
15,841,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,841,748 >>> mbox cmd response: failed
Initializing fuses
2,056,778 writing to cptra_bootfsm_go
5,860,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,990,280 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,186 writing to cptra_bootfsm_go
193,496 UART:
193,840 UART: Running Caliptra ROM ...
194,936 UART:
604,834 UART: [state] CFI Enabled
616,389 UART: [state] LifecycleState = Unprovisioned
618,328 UART: [state] DebugLocked = No
621,276 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,440 UART: [kat] SHA2-256
795,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,708 UART: [kat] ++
806,206 UART: [kat] sha1
816,980 UART: [kat] SHA2-256
819,667 UART: [kat] SHA2-384
825,813 UART: [kat] SHA2-512-ACC
828,162 UART: [kat] ECC-384
3,111,181 UART: [kat] HMAC-384Kdf
3,122,610 UART: [kat] LMS
4,312,714 UART: [kat] --
4,317,439 UART: [cold-reset] ++
4,318,410 UART: [fht] Storing FHT @ 0x50003400
4,329,811 UART: [idev] ++
4,330,430 UART: [idev] CDI.KEYID = 6
4,331,354 UART: [idev] SUBJECT.KEYID = 7
4,332,583 UART: [idev] UDS.KEYID = 0
4,335,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,687 UART: [idev] Erasing UDS.KEYID = 0
7,617,515 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,791 UART: [idev] --
7,641,295 UART: [ldev] ++
7,641,908 UART: [ldev] CDI.KEYID = 6
7,643,021 UART: [ldev] SUBJECT.KEYID = 5
7,644,143 UART: [ldev] AUTHORITY.KEYID = 7
7,645,326 UART: [ldev] FE.KEYID = 1
7,655,505 UART: [ldev] Erasing FE.KEYID = 1
10,943,883 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,816 UART: [ldev] --
13,308,475 UART: [fwproc] Waiting for Commands...
13,310,851 UART: [fwproc] Received command 0x46574c44
13,313,047 UART: [fwproc] Received Image of size 118548 bytes
16,272,418 UART: ROM Fatal Error: 0x000B0021
16,275,932 >>> mbox cmd response: failed
16,276,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,276,745 >>> mbox cmd response: failed
16,277,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,277,321 >>> mbox cmd response: failed
Initializing fuses
2,058,089 writing to cptra_bootfsm_go
2,247,419 UART:
2,247,770 UART: Running Caliptra ROM ...
2,248,915 UART:
4,168,792 UART: [state] CFI Enabled
4,182,232 UART: [state] LifecycleState = Unprovisioned
4,184,146 UART: [state] DebugLocked = No
4,186,568 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,190,825 UART: [kat] SHA2-256
4,360,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,371,145 UART: [kat] ++
4,371,625 UART: [kat] sha1
4,382,136 UART: [kat] SHA2-256
4,384,832 UART: [kat] SHA2-384
4,389,855 UART: [kat] SHA2-512-ACC
4,392,211 UART: [kat] ECC-384
6,678,336 UART: [kat] HMAC-384Kdf
6,691,105 UART: [kat] LMS
7,881,192 UART: [kat] --
7,887,824 UART: [cold-reset] ++
7,889,850 UART: [fht] Storing FHT @ 0x50003400
7,901,130 UART: [idev] ++
7,901,704 UART: [idev] CDI.KEYID = 6
7,902,682 UART: [idev] SUBJECT.KEYID = 7
7,903,905 UART: [idev] UDS.KEYID = 0
7,906,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,055,230 UART: [idev] Erasing UDS.KEYID = 0
11,193,272 UART: [idev] Using Sha1 for KeyId Algorithm
11,214,389 UART: [idev] --
11,218,979 UART: [ldev] ++
11,219,552 UART: [ldev] CDI.KEYID = 6
11,220,522 UART: [ldev] SUBJECT.KEYID = 5
11,221,749 UART: [ldev] AUTHORITY.KEYID = 7
11,222,991 UART: [ldev] FE.KEYID = 1
11,233,425 UART: [ldev] Erasing FE.KEYID = 1
14,523,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,815,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,830,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,845,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,859,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,878,745 UART: [ldev] --
16,883,529 UART: [fwproc] Waiting for Commands...
16,886,448 UART: [fwproc] Received command 0x46574c44
16,888,696 UART: [fwproc] Received Image of size 118548 bytes
20,996,204 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,070,078 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,143,260 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,471,858 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,129,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,054,291 >>> mbox cmd response: failed
16,054,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,055,260 >>> mbox cmd response: failed
16,055,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,055,842 >>> mbox cmd response: failed
Initializing fuses
2,059,314 writing to cptra_bootfsm_go
7,935,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,970,113 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,092 UART:
192,465 UART: Running Caliptra ROM ...
193,693 UART:
193,852 UART: [state] CFI Enabled
266,212 UART: [state] LifecycleState = Unprovisioned
268,155 UART: [state] DebugLocked = No
269,922 UART: [state] WD Timer not started. Device not locked for debugging
274,324 UART: [kat] SHA2-256
453,968 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,724 UART: [kat] ++
465,268 UART: [kat] sha1
476,157 UART: [kat] SHA2-256
478,848 UART: [kat] SHA2-384
485,043 UART: [kat] SHA2-512-ACC
487,445 UART: [kat] ECC-384
2,948,506 UART: [kat] HMAC-384Kdf
2,970,634 UART: [kat] LMS
3,447,089 UART: [kat] --
3,451,001 UART: [cold-reset] ++
3,452,569 UART: [fht] FHT @ 0x50003400
3,464,474 UART: [idev] ++
3,465,109 UART: [idev] CDI.KEYID = 6
3,466,031 UART: [idev] SUBJECT.KEYID = 7
3,467,263 UART: [idev] UDS.KEYID = 0
3,469,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,863 UART: [idev] Erasing UDS.KEYID = 0
5,983,368 UART: [idev] Sha1 KeyId Algorithm
6,007,315 UART: [idev] --
6,013,754 UART: [ldev] ++
6,014,333 UART: [ldev] CDI.KEYID = 6
6,015,224 UART: [ldev] SUBJECT.KEYID = 5
6,016,448 UART: [ldev] AUTHORITY.KEYID = 7
6,017,749 UART: [ldev] FE.KEYID = 1
6,056,357 UART: [ldev] Erasing FE.KEYID = 1
8,560,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,866 UART: [ldev] --
10,372,349 UART: [fwproc] Wait for Commands...
10,375,638 UART: [fwproc] Recv command 0x46574c44
10,377,636 UART: [fwproc] Recv'd Img size: 118548 bytes
12,702,699 UART: ROM Fatal Error: 0x000B0021
12,705,942 >>> mbox cmd response: failed
12,706,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,706,614 >>> mbox cmd response: failed
12,706,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,707,220 >>> mbox cmd response: failed
Initializing fuses
2,060,350 writing to cptra_bootfsm_go
2,249,659 UART:
2,250,007 UART: Running Caliptra ROM ...
2,251,060 UART:
2,251,215 UART: [state] CFI Enabled
2,318,922 UART: [state] LifecycleState = Unprovisioned
2,320,943 UART: [state] DebugLocked = No
2,322,638 UART: [state] WD Timer not started. Device not locked for debugging
2,326,779 UART: [kat] SHA2-256
2,506,427 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,517,173 UART: [kat] ++
2,517,639 UART: [kat] sha1
2,529,500 UART: [kat] SHA2-256
2,532,199 UART: [kat] SHA2-384
2,537,438 UART: [kat] SHA2-512-ACC
2,539,845 UART: [kat] ECC-384
5,003,686 UART: [kat] HMAC-384Kdf
5,023,096 UART: [kat] LMS
5,499,603 UART: [kat] --
5,504,737 UART: [cold-reset] ++
5,507,162 UART: [fht] FHT @ 0x50003400
5,518,369 UART: [idev] ++
5,518,945 UART: [idev] CDI.KEYID = 6
5,519,970 UART: [idev] SUBJECT.KEYID = 7
5,521,138 UART: [idev] UDS.KEYID = 0
5,523,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,672,705 UART: [idev] Erasing UDS.KEYID = 0
8,037,279 UART: [idev] Sha1 KeyId Algorithm
8,061,222 UART: [idev] --
8,066,577 UART: [ldev] ++
8,067,158 UART: [ldev] CDI.KEYID = 6
8,068,138 UART: [ldev] SUBJECT.KEYID = 5
8,069,307 UART: [ldev] AUTHORITY.KEYID = 7
8,070,573 UART: [ldev] FE.KEYID = 1
8,110,881 UART: [ldev] Erasing FE.KEYID = 1
10,616,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,353,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,368,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,384,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,400,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,421,483 UART: [ldev] --
12,427,513 UART: [fwproc] Wait for Commands...
12,430,108 UART: [fwproc] Recv command 0x46574c44
12,432,106 UART: [fwproc] Recv'd Img size: 118548 bytes
15,919,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,999,257 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,072,280 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,400,463 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,459,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,570,677 >>> mbox cmd response: failed
12,571,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,571,590 >>> mbox cmd response: failed
12,571,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,572,163 >>> mbox cmd response: failed
Initializing fuses
2,061,864 writing to cptra_bootfsm_go
5,523,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,286,271 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
192,687 UART:
193,036 UART: Running Caliptra ROM ...
194,163 UART:
603,798 UART: [state] CFI Enabled
620,093 UART: [state] LifecycleState = Unprovisioned
622,075 UART: [state] DebugLocked = No
623,652 UART: [state] WD Timer not started. Device not locked for debugging
626,661 UART: [kat] SHA2-256
806,294 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,065 UART: [kat] ++
817,557 UART: [kat] sha1
827,410 UART: [kat] SHA2-256
830,097 UART: [kat] SHA2-384
836,676 UART: [kat] SHA2-512-ACC
839,018 UART: [kat] ECC-384
3,278,301 UART: [kat] HMAC-384Kdf
3,290,379 UART: [kat] LMS
3,766,867 UART: [kat] --
3,770,937 UART: [cold-reset] ++
3,773,528 UART: [fht] FHT @ 0x50003400
3,785,375 UART: [idev] ++
3,785,950 UART: [idev] CDI.KEYID = 6
3,786,885 UART: [idev] SUBJECT.KEYID = 7
3,788,104 UART: [idev] UDS.KEYID = 0
3,790,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,696 UART: [idev] Erasing UDS.KEYID = 0
6,267,949 UART: [idev] Sha1 KeyId Algorithm
6,291,720 UART: [idev] --
6,295,287 UART: [ldev] ++
6,295,859 UART: [ldev] CDI.KEYID = 6
6,296,830 UART: [ldev] SUBJECT.KEYID = 5
6,297,993 UART: [ldev] AUTHORITY.KEYID = 7
6,299,287 UART: [ldev] FE.KEYID = 1
6,311,651 UART: [ldev] Erasing FE.KEYID = 1
8,789,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,331 UART: [ldev] --
10,584,572 UART: [fwproc] Wait for Commands...
10,586,894 UART: [fwproc] Recv command 0x46574c44
10,588,888 UART: [fwproc] Recv'd Img size: 118548 bytes
12,918,702 UART: ROM Fatal Error: 0x000B0021
12,921,945 >>> mbox cmd response: failed
12,922,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,605 >>> mbox cmd response: failed
12,922,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,923,212 >>> mbox cmd response: failed
Initializing fuses
2,060,488 writing to cptra_bootfsm_go
2,249,777 UART:
2,250,140 UART: Running Caliptra ROM ...
2,251,277 UART:
7,526,696 UART: [state] CFI Enabled
7,539,193 UART: [state] LifecycleState = Unprovisioned
7,541,141 UART: [state] DebugLocked = No
7,542,760 UART: [state] WD Timer not started. Device not locked for debugging
7,547,271 UART: [kat] SHA2-256
7,726,945 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,737,738 UART: [kat] ++
7,738,286 UART: [kat] sha1
7,748,972 UART: [kat] SHA2-256
7,751,675 UART: [kat] SHA2-384
7,756,267 UART: [kat] SHA2-512-ACC
7,758,675 UART: [kat] ECC-384
10,198,451 UART: [kat] HMAC-384Kdf
10,210,086 UART: [kat] LMS
10,686,573 UART: [kat] --
10,690,468 UART: [cold-reset] ++
10,692,079 UART: [fht] FHT @ 0x50003400
10,702,470 UART: [idev] ++
10,703,097 UART: [idev] CDI.KEYID = 6
10,703,987 UART: [idev] SUBJECT.KEYID = 7
10,705,258 UART: [idev] UDS.KEYID = 0
10,707,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,856,612 UART: [idev] Erasing UDS.KEYID = 0
13,186,850 UART: [idev] Sha1 KeyId Algorithm
13,211,433 UART: [idev] --
13,216,719 UART: [ldev] ++
13,217,330 UART: [ldev] CDI.KEYID = 6
13,218,258 UART: [ldev] SUBJECT.KEYID = 5
13,219,425 UART: [ldev] AUTHORITY.KEYID = 7
13,220,666 UART: [ldev] FE.KEYID = 1
13,230,150 UART: [ldev] Erasing FE.KEYID = 1
15,712,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,431,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,446,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,462,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,478,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,500,428 UART: [ldev] --
17,505,813 UART: [fwproc] Wait for Commands...
17,507,970 UART: [fwproc] Recv command 0x46574c44
17,510,015 UART: [fwproc] Recv'd Img size: 118548 bytes
20,986,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,063,224 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,136,354 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,465,265 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,780,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,797,195 >>> mbox cmd response: failed
12,798,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,798,493 >>> mbox cmd response: failed
12,798,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,799,070 >>> mbox cmd response: failed
Initializing fuses
2,061,800 writing to cptra_bootfsm_go
10,846,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,519,312 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,262 UART:
192,616 UART: Running Caliptra ROM ...
193,823 UART:
193,979 UART: [state] CFI Enabled
264,727 UART: [state] LifecycleState = Unprovisioned
267,100 UART: [state] DebugLocked = No
268,944 UART: [state] WD Timer not started. Device not locked for debugging
273,348 UART: [kat] SHA2-256
463,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,013 UART: [kat] ++
474,469 UART: [kat] sha1
486,431 UART: [kat] SHA2-256
489,449 UART: [kat] SHA2-384
495,703 UART: [kat] SHA2-512-ACC
498,264 UART: [kat] ECC-384
2,945,111 UART: [kat] HMAC-384Kdf
2,970,925 UART: [kat] LMS
3,502,720 UART: [kat] --
3,507,373 UART: [cold-reset] ++
3,509,315 UART: [fht] FHT @ 0x50003400
3,520,955 UART: [idev] ++
3,521,637 UART: [idev] CDI.KEYID = 6
3,522,656 UART: [idev] SUBJECT.KEYID = 7
3,523,850 UART: [idev] UDS.KEYID = 0
3,526,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,817 UART: [idev] Erasing UDS.KEYID = 0
6,049,616 UART: [idev] Sha1 KeyId Algorithm
6,071,138 UART: [idev] --
6,075,930 UART: [ldev] ++
6,076,624 UART: [ldev] CDI.KEYID = 6
6,077,546 UART: [ldev] SUBJECT.KEYID = 5
6,078,713 UART: [ldev] AUTHORITY.KEYID = 7
6,079,950 UART: [ldev] FE.KEYID = 1
6,121,129 UART: [ldev] Erasing FE.KEYID = 1
8,626,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,428,120 UART: [ldev] --
10,433,123 UART: [fwproc] Wait for Commands...
10,435,332 UART: [fwproc] Recv command 0x46574c44
10,437,599 UART: [fwproc] Recv'd Img size: 118548 bytes
12,780,604 UART: ROM Fatal Error: 0x000B0021
12,784,235 >>> mbox cmd response: failed
12,784,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,784,995 >>> mbox cmd response: failed
12,785,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,785,571 >>> mbox cmd response: failed
Initializing fuses
2,061,347 writing to cptra_bootfsm_go
2,250,728 UART:
2,251,083 UART: Running Caliptra ROM ...
2,252,250 UART:
2,252,428 UART: [state] CFI Enabled
2,326,193 UART: [state] LifecycleState = Unprovisioned
2,328,602 UART: [state] DebugLocked = No
2,329,791 UART: [state] WD Timer not started. Device not locked for debugging
2,334,484 UART: [kat] SHA2-256
2,524,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,535,153 UART: [kat] ++
2,535,622 UART: [kat] sha1
2,546,841 UART: [kat] SHA2-256
2,549,872 UART: [kat] SHA2-384
2,555,977 UART: [kat] SHA2-512-ACC
2,558,594 UART: [kat] ECC-384
5,012,157 UART: [kat] HMAC-384Kdf
5,033,797 UART: [kat] LMS
5,565,549 UART: [kat] --
5,569,888 UART: [cold-reset] ++
5,572,098 UART: [fht] FHT @ 0x50003400
5,584,276 UART: [idev] ++
5,584,955 UART: [idev] CDI.KEYID = 6
5,585,898 UART: [idev] SUBJECT.KEYID = 7
5,587,120 UART: [idev] UDS.KEYID = 0
5,589,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,738,639 UART: [idev] Erasing UDS.KEYID = 0
8,090,378 UART: [idev] Sha1 KeyId Algorithm
8,112,382 UART: [idev] --
8,118,169 UART: [ldev] ++
8,118,863 UART: [ldev] CDI.KEYID = 6
8,119,778 UART: [ldev] SUBJECT.KEYID = 5
8,120,948 UART: [ldev] AUTHORITY.KEYID = 7
8,122,189 UART: [ldev] FE.KEYID = 1
8,161,044 UART: [ldev] Erasing FE.KEYID = 1
10,673,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,403,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,418,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,434,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,449,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,470,311 UART: [ldev] --
12,476,222 UART: [fwproc] Wait for Commands...
12,479,211 UART: [fwproc] Recv command 0x46574c44
12,481,547 UART: [fwproc] Recv'd Img size: 118548 bytes
15,979,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,058,189 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,181,826 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,742,785 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,445,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,663,470 >>> mbox cmd response: failed
12,664,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,664,489 >>> mbox cmd response: failed
12,664,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,665,136 >>> mbox cmd response: failed
Initializing fuses
2,062,512 writing to cptra_bootfsm_go
5,472,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,855,549 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,470 UART:
192,828 UART: Running Caliptra ROM ...
194,032 UART:
603,839 UART: [state] CFI Enabled
618,893 UART: [state] LifecycleState = Unprovisioned
621,331 UART: [state] DebugLocked = No
623,881 UART: [state] WD Timer not started. Device not locked for debugging
628,326 UART: [kat] SHA2-256
818,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,979 UART: [kat] ++
829,490 UART: [kat] sha1
841,993 UART: [kat] SHA2-256
845,062 UART: [kat] SHA2-384
851,546 UART: [kat] SHA2-512-ACC
854,150 UART: [kat] ECC-384
3,295,602 UART: [kat] HMAC-384Kdf
3,308,244 UART: [kat] LMS
3,840,069 UART: [kat] --
3,845,822 UART: [cold-reset] ++
3,847,555 UART: [fht] FHT @ 0x50003400
3,859,410 UART: [idev] ++
3,860,111 UART: [idev] CDI.KEYID = 6
3,861,045 UART: [idev] SUBJECT.KEYID = 7
3,862,274 UART: [idev] UDS.KEYID = 0
3,865,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,288 UART: [idev] Erasing UDS.KEYID = 0
6,341,860 UART: [idev] Sha1 KeyId Algorithm
6,364,791 UART: [idev] --
6,369,223 UART: [ldev] ++
6,369,909 UART: [ldev] CDI.KEYID = 6
6,370,825 UART: [ldev] SUBJECT.KEYID = 5
6,372,126 UART: [ldev] AUTHORITY.KEYID = 7
6,373,328 UART: [ldev] FE.KEYID = 1
6,385,068 UART: [ldev] Erasing FE.KEYID = 1
8,864,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,909 UART: [ldev] --
10,655,236 UART: [fwproc] Wait for Commands...
10,657,014 UART: [fwproc] Recv command 0x46574c44
10,659,287 UART: [fwproc] Recv'd Img size: 118548 bytes
12,998,107 UART: ROM Fatal Error: 0x000B0021
13,001,739 >>> mbox cmd response: failed
13,002,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,002,547 >>> mbox cmd response: failed
13,002,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,003,123 >>> mbox cmd response: failed
Initializing fuses
2,063,403 writing to cptra_bootfsm_go
2,252,755 UART:
2,253,114 UART: Running Caliptra ROM ...
2,254,199 UART:
7,441,981 UART: [state] CFI Enabled
7,456,521 UART: [state] LifecycleState = Unprovisioned
7,458,906 UART: [state] DebugLocked = No
7,460,922 UART: [state] WD Timer not started. Device not locked for debugging
7,466,095 UART: [kat] SHA2-256
7,655,989 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,666,734 UART: [kat] ++
7,667,255 UART: [kat] sha1
7,677,606 UART: [kat] SHA2-256
7,680,630 UART: [kat] SHA2-384
7,685,610 UART: [kat] SHA2-512-ACC
7,688,240 UART: [kat] ECC-384
10,126,351 UART: [kat] HMAC-384Kdf
10,139,419 UART: [kat] LMS
10,671,263 UART: [kat] --
10,676,668 UART: [cold-reset] ++
10,677,630 UART: [fht] FHT @ 0x50003400
10,690,126 UART: [idev] ++
10,690,807 UART: [idev] CDI.KEYID = 6
10,691,821 UART: [idev] SUBJECT.KEYID = 7
10,692,925 UART: [idev] UDS.KEYID = 0
10,695,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,844,299 UART: [idev] Erasing UDS.KEYID = 0
13,172,115 UART: [idev] Sha1 KeyId Algorithm
13,194,757 UART: [idev] --
13,198,216 UART: [ldev] ++
13,198,902 UART: [ldev] CDI.KEYID = 6
13,199,818 UART: [ldev] SUBJECT.KEYID = 5
13,200,981 UART: [ldev] AUTHORITY.KEYID = 7
13,202,234 UART: [ldev] FE.KEYID = 1
13,210,783 UART: [ldev] Erasing FE.KEYID = 1
15,689,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,411,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,426,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,441,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,456,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,478,200 UART: [ldev] --
17,484,123 UART: [fwproc] Wait for Commands...
17,485,683 UART: [fwproc] Recv command 0x46574c44
17,488,008 UART: [fwproc] Recv'd Img size: 118548 bytes
20,992,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,067,445 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,191,073 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,751,183 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,758,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,885,945 >>> mbox cmd response: failed
12,886,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,886,902 >>> mbox cmd response: failed
12,887,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,887,540 >>> mbox cmd response: failed
Initializing fuses
2,068,060 writing to cptra_bootfsm_go
10,731,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,025,301 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,692 UART: [state] LifecycleState = Unprovisioned
86,347 UART: [state] DebugLocked = No
87,055 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,737 UART: [kat] SHA2-256
882,668 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,783 UART: [kat] ++
886,935 UART: [kat] sha1
891,399 UART: [kat] SHA2-256
893,337 UART: [kat] SHA2-384
896,114 UART: [kat] SHA2-512-ACC
898,015 UART: [kat] ECC-384
903,422 UART: [kat] HMAC-384Kdf
907,988 UART: [kat] LMS
1,476,184 UART: [kat] --
1,477,071 UART: [cold-reset] ++
1,477,555 UART: [fht] Storing FHT @ 0x50003400
1,480,346 UART: [idev] ++
1,480,514 UART: [idev] CDI.KEYID = 6
1,480,874 UART: [idev] SUBJECT.KEYID = 7
1,481,298 UART: [idev] UDS.KEYID = 0
1,481,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,784 UART: [idev] Erasing UDS.KEYID = 0
1,506,304 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,992 UART: [idev] --
1,516,031 UART: [ldev] ++
1,516,199 UART: [ldev] CDI.KEYID = 6
1,516,562 UART: [ldev] SUBJECT.KEYID = 5
1,516,988 UART: [ldev] AUTHORITY.KEYID = 7
1,517,451 UART: [ldev] FE.KEYID = 1
1,522,577 UART: [ldev] Erasing FE.KEYID = 1
1,547,878 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,546 UART: [ldev] --
1,587,037 UART: [fwproc] Waiting for Commands...
1,587,808 UART: [fwproc] Received command 0x46574c44
1,588,599 UART: [fwproc] Received Image of size 118548 bytes
1,867,800 UART: ROM Fatal Error: 0x000B0021
1,868,957 >>> mbox cmd response: failed
1,868,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,963 >>> mbox cmd response: failed
1,868,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,969 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,343 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,983 UART: [kat] SHA2-256
881,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,029 UART: [kat] ++
886,181 UART: [kat] sha1
890,559 UART: [kat] SHA2-256
892,497 UART: [kat] SHA2-384
895,234 UART: [kat] SHA2-512-ACC
897,135 UART: [kat] ECC-384
902,800 UART: [kat] HMAC-384Kdf
907,262 UART: [kat] LMS
1,475,458 UART: [kat] --
1,476,475 UART: [cold-reset] ++
1,476,833 UART: [fht] Storing FHT @ 0x50003400
1,479,508 UART: [idev] ++
1,479,676 UART: [idev] CDI.KEYID = 6
1,480,036 UART: [idev] SUBJECT.KEYID = 7
1,480,460 UART: [idev] UDS.KEYID = 0
1,480,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,130 UART: [idev] Erasing UDS.KEYID = 0
1,504,258 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,012 UART: [idev] --
1,513,925 UART: [ldev] ++
1,514,093 UART: [ldev] CDI.KEYID = 6
1,514,456 UART: [ldev] SUBJECT.KEYID = 5
1,514,882 UART: [ldev] AUTHORITY.KEYID = 7
1,515,345 UART: [ldev] FE.KEYID = 1
1,520,275 UART: [ldev] Erasing FE.KEYID = 1
1,545,292 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,996 UART: [ldev] --
1,584,257 UART: [fwproc] Waiting for Commands...
1,585,056 UART: [fwproc] Received command 0x46574c44
1,585,847 UART: [fwproc] Received Image of size 118548 bytes
2,929,844 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,062 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,280 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,651 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,720,644 >>> mbox cmd response: failed
1,720,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,650 >>> mbox cmd response: failed
1,720,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,656 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,505 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,454 UART: [kat] SHA2-256
882,385 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,500 UART: [kat] ++
886,652 UART: [kat] sha1
890,920 UART: [kat] SHA2-256
892,858 UART: [kat] SHA2-384
895,719 UART: [kat] SHA2-512-ACC
897,620 UART: [kat] ECC-384
903,385 UART: [kat] HMAC-384Kdf
907,939 UART: [kat] LMS
1,476,135 UART: [kat] --
1,476,750 UART: [cold-reset] ++
1,477,156 UART: [fht] Storing FHT @ 0x50003400
1,480,125 UART: [idev] ++
1,480,293 UART: [idev] CDI.KEYID = 6
1,480,653 UART: [idev] SUBJECT.KEYID = 7
1,481,077 UART: [idev] UDS.KEYID = 0
1,481,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,249 UART: [idev] Erasing UDS.KEYID = 0
1,506,737 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,393 UART: [idev] --
1,516,272 UART: [ldev] ++
1,516,440 UART: [ldev] CDI.KEYID = 6
1,516,803 UART: [ldev] SUBJECT.KEYID = 5
1,517,229 UART: [ldev] AUTHORITY.KEYID = 7
1,517,692 UART: [ldev] FE.KEYID = 1
1,522,854 UART: [ldev] Erasing FE.KEYID = 1
1,548,547 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,847 UART: [ldev] --
1,588,222 UART: [fwproc] Waiting for Commands...
1,588,915 UART: [fwproc] Received command 0x46574c44
1,589,706 UART: [fwproc] Received Image of size 118548 bytes
1,868,885 UART: ROM Fatal Error: 0x000B0021
1,870,042 >>> mbox cmd response: failed
1,870,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,048 >>> mbox cmd response: failed
1,870,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,026 UART: [kat] SHA2-256
881,957 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,072 UART: [kat] ++
886,224 UART: [kat] sha1
890,504 UART: [kat] SHA2-256
892,442 UART: [kat] SHA2-384
895,261 UART: [kat] SHA2-512-ACC
897,162 UART: [kat] ECC-384
902,663 UART: [kat] HMAC-384Kdf
907,227 UART: [kat] LMS
1,475,423 UART: [kat] --
1,476,418 UART: [cold-reset] ++
1,476,978 UART: [fht] Storing FHT @ 0x50003400
1,479,767 UART: [idev] ++
1,479,935 UART: [idev] CDI.KEYID = 6
1,480,295 UART: [idev] SUBJECT.KEYID = 7
1,480,719 UART: [idev] UDS.KEYID = 0
1,481,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,919 UART: [idev] Erasing UDS.KEYID = 0
1,505,639 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,393 UART: [idev] --
1,515,606 UART: [ldev] ++
1,515,774 UART: [ldev] CDI.KEYID = 6
1,516,137 UART: [ldev] SUBJECT.KEYID = 5
1,516,563 UART: [ldev] AUTHORITY.KEYID = 7
1,517,026 UART: [ldev] FE.KEYID = 1
1,522,270 UART: [ldev] Erasing FE.KEYID = 1
1,548,137 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,091 UART: [ldev] --
1,587,362 UART: [fwproc] Waiting for Commands...
1,587,979 UART: [fwproc] Received command 0x46574c44
1,588,770 UART: [fwproc] Received Image of size 118548 bytes
2,933,199 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,975 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,193 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,432 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,720,801 >>> mbox cmd response: failed
1,720,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,807 >>> mbox cmd response: failed
1,720,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,813 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,130 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,552 UART: [state] LifecycleState = Unprovisioned
86,207 UART: [state] DebugLocked = No
86,925 UART: [state] WD Timer not started. Device not locked for debugging
88,084 UART: [kat] SHA2-256
891,634 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,738 UART: [kat] ++
895,890 UART: [kat] sha1
900,100 UART: [kat] SHA2-256
902,040 UART: [kat] SHA2-384
905,027 UART: [kat] SHA2-512-ACC
906,928 UART: [kat] ECC-384
916,649 UART: [kat] HMAC-384Kdf
921,179 UART: [kat] LMS
1,169,491 UART: [kat] --
1,170,190 UART: [cold-reset] ++
1,170,652 UART: [fht] FHT @ 0x50003400
1,173,526 UART: [idev] ++
1,173,694 UART: [idev] CDI.KEYID = 6
1,174,055 UART: [idev] SUBJECT.KEYID = 7
1,174,480 UART: [idev] UDS.KEYID = 0
1,174,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,671 UART: [idev] Erasing UDS.KEYID = 0
1,199,229 UART: [idev] Sha1 KeyId Algorithm
1,208,081 UART: [idev] --
1,209,184 UART: [ldev] ++
1,209,352 UART: [ldev] CDI.KEYID = 6
1,209,716 UART: [ldev] SUBJECT.KEYID = 5
1,210,143 UART: [ldev] AUTHORITY.KEYID = 7
1,210,606 UART: [ldev] FE.KEYID = 1
1,215,418 UART: [ldev] Erasing FE.KEYID = 1
1,241,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,840 UART: [ldev] --
1,280,215 UART: [fwproc] Wait for Commands...
1,280,822 UART: [fwproc] Recv command 0x46574c44
1,281,555 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,780 UART: ROM Fatal Error: 0x000B0021
1,561,937 >>> mbox cmd response: failed
1,561,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,561,943 >>> mbox cmd response: failed
1,561,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,561,949 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,108 UART: [kat] ++
895,260 UART: [kat] sha1
899,410 UART: [kat] SHA2-256
901,350 UART: [kat] SHA2-384
904,201 UART: [kat] SHA2-512-ACC
906,102 UART: [kat] ECC-384
915,935 UART: [kat] HMAC-384Kdf
920,509 UART: [kat] LMS
1,168,821 UART: [kat] --
1,169,706 UART: [cold-reset] ++
1,170,142 UART: [fht] FHT @ 0x50003400
1,172,768 UART: [idev] ++
1,172,936 UART: [idev] CDI.KEYID = 6
1,173,297 UART: [idev] SUBJECT.KEYID = 7
1,173,722 UART: [idev] UDS.KEYID = 0
1,174,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,693 UART: [idev] Erasing UDS.KEYID = 0
1,198,623 UART: [idev] Sha1 KeyId Algorithm
1,207,675 UART: [idev] --
1,208,634 UART: [ldev] ++
1,208,802 UART: [ldev] CDI.KEYID = 6
1,209,166 UART: [ldev] SUBJECT.KEYID = 5
1,209,593 UART: [ldev] AUTHORITY.KEYID = 7
1,210,056 UART: [ldev] FE.KEYID = 1
1,215,412 UART: [ldev] Erasing FE.KEYID = 1
1,241,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,316 UART: [ldev] --
1,280,761 UART: [fwproc] Wait for Commands...
1,281,424 UART: [fwproc] Recv command 0x46574c44
1,282,157 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,440 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,615 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,884 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,908 >>> mbox cmd response: failed
1,417,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,914 >>> mbox cmd response: failed
1,417,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,920 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,527 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,741 UART: [kat] ++
895,893 UART: [kat] sha1
900,267 UART: [kat] SHA2-256
902,207 UART: [kat] SHA2-384
905,082 UART: [kat] SHA2-512-ACC
906,983 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,528 UART: [kat] LMS
1,169,840 UART: [kat] --
1,170,901 UART: [cold-reset] ++
1,171,375 UART: [fht] FHT @ 0x50003400
1,174,263 UART: [idev] ++
1,174,431 UART: [idev] CDI.KEYID = 6
1,174,792 UART: [idev] SUBJECT.KEYID = 7
1,175,217 UART: [idev] UDS.KEYID = 0
1,175,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,620 UART: [idev] Erasing UDS.KEYID = 0
1,200,020 UART: [idev] Sha1 KeyId Algorithm
1,208,984 UART: [idev] --
1,209,899 UART: [ldev] ++
1,210,067 UART: [ldev] CDI.KEYID = 6
1,210,431 UART: [ldev] SUBJECT.KEYID = 5
1,210,858 UART: [ldev] AUTHORITY.KEYID = 7
1,211,321 UART: [ldev] FE.KEYID = 1
1,216,539 UART: [ldev] Erasing FE.KEYID = 1
1,243,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,755 UART: [ldev] --
1,281,978 UART: [fwproc] Wait for Commands...
1,282,621 UART: [fwproc] Recv command 0x46574c44
1,283,354 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,427 UART: ROM Fatal Error: 0x000B0021
1,564,584 >>> mbox cmd response: failed
1,564,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,590 >>> mbox cmd response: failed
1,564,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
891,565 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,726 UART: [kat] SHA2-512-ACC
906,627 UART: [kat] ECC-384
916,636 UART: [kat] HMAC-384Kdf
921,404 UART: [kat] LMS
1,169,716 UART: [kat] --
1,170,423 UART: [cold-reset] ++
1,170,857 UART: [fht] FHT @ 0x50003400
1,173,465 UART: [idev] ++
1,173,633 UART: [idev] CDI.KEYID = 6
1,173,994 UART: [idev] SUBJECT.KEYID = 7
1,174,419 UART: [idev] UDS.KEYID = 0
1,174,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,494 UART: [idev] Erasing UDS.KEYID = 0
1,199,422 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,333 UART: [ldev] ++
1,209,501 UART: [ldev] CDI.KEYID = 6
1,209,865 UART: [ldev] SUBJECT.KEYID = 5
1,210,292 UART: [ldev] AUTHORITY.KEYID = 7
1,210,755 UART: [ldev] FE.KEYID = 1
1,215,867 UART: [ldev] Erasing FE.KEYID = 1
1,241,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,995 UART: [ldev] --
1,281,272 UART: [fwproc] Wait for Commands...
1,281,933 UART: [fwproc] Recv command 0x46574c44
1,282,666 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,313 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,488 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,877 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,009 >>> mbox cmd response: failed
1,419,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,015 >>> mbox cmd response: failed
1,419,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,021 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,829 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
893,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,475 UART: [kat] ++
897,627 UART: [kat] sha1
901,945 UART: [kat] SHA2-256
903,885 UART: [kat] SHA2-384
906,572 UART: [kat] SHA2-512-ACC
908,473 UART: [kat] ECC-384
918,146 UART: [kat] HMAC-384Kdf
922,648 UART: [kat] LMS
1,170,976 UART: [kat] --
1,171,929 UART: [cold-reset] ++
1,172,409 UART: [fht] FHT @ 0x50003400
1,174,904 UART: [idev] ++
1,175,072 UART: [idev] CDI.KEYID = 6
1,175,432 UART: [idev] SUBJECT.KEYID = 7
1,175,856 UART: [idev] UDS.KEYID = 0
1,176,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,916 UART: [idev] Erasing UDS.KEYID = 0
1,200,235 UART: [idev] Sha1 KeyId Algorithm
1,208,529 UART: [idev] --
1,209,391 UART: [ldev] ++
1,209,559 UART: [ldev] CDI.KEYID = 6
1,209,922 UART: [ldev] SUBJECT.KEYID = 5
1,210,348 UART: [ldev] AUTHORITY.KEYID = 7
1,210,811 UART: [ldev] FE.KEYID = 1
1,215,967 UART: [ldev] Erasing FE.KEYID = 1
1,242,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,887 UART: [ldev] --
1,282,158 UART: [fwproc] Wait for Commands...
1,282,756 UART: [fwproc] Recv command 0x46574c44
1,283,484 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,963 UART: ROM Fatal Error: 0x000B0021
1,564,120 >>> mbox cmd response: failed
1,564,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,126 >>> mbox cmd response: failed
1,564,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
893,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,605 UART: [kat] ++
897,757 UART: [kat] sha1
901,955 UART: [kat] SHA2-256
903,895 UART: [kat] SHA2-384
906,658 UART: [kat] SHA2-512-ACC
908,559 UART: [kat] ECC-384
917,850 UART: [kat] HMAC-384Kdf
922,516 UART: [kat] LMS
1,170,844 UART: [kat] --
1,171,531 UART: [cold-reset] ++
1,171,975 UART: [fht] FHT @ 0x50003400
1,174,592 UART: [idev] ++
1,174,760 UART: [idev] CDI.KEYID = 6
1,175,120 UART: [idev] SUBJECT.KEYID = 7
1,175,544 UART: [idev] UDS.KEYID = 0
1,175,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,220 UART: [idev] Erasing UDS.KEYID = 0
1,200,211 UART: [idev] Sha1 KeyId Algorithm
1,208,625 UART: [idev] --
1,209,791 UART: [ldev] ++
1,209,959 UART: [ldev] CDI.KEYID = 6
1,210,322 UART: [ldev] SUBJECT.KEYID = 5
1,210,748 UART: [ldev] AUTHORITY.KEYID = 7
1,211,211 UART: [ldev] FE.KEYID = 1
1,216,543 UART: [ldev] Erasing FE.KEYID = 1
1,242,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,939 UART: [ldev] --
1,282,430 UART: [fwproc] Wait for Commands...
1,283,026 UART: [fwproc] Recv command 0x46574c44
1,283,754 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,387 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,557 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,834 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,867 >>> mbox cmd response: failed
1,417,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,873 >>> mbox cmd response: failed
1,417,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,879 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,761 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
893,325 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,450 UART: [kat] ++
897,602 UART: [kat] sha1
901,992 UART: [kat] SHA2-256
903,932 UART: [kat] SHA2-384
906,765 UART: [kat] SHA2-512-ACC
908,666 UART: [kat] ECC-384
918,579 UART: [kat] HMAC-384Kdf
923,219 UART: [kat] LMS
1,171,547 UART: [kat] --
1,172,652 UART: [cold-reset] ++
1,173,226 UART: [fht] FHT @ 0x50003400
1,175,831 UART: [idev] ++
1,175,999 UART: [idev] CDI.KEYID = 6
1,176,359 UART: [idev] SUBJECT.KEYID = 7
1,176,783 UART: [idev] UDS.KEYID = 0
1,177,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,853 UART: [idev] Erasing UDS.KEYID = 0
1,202,044 UART: [idev] Sha1 KeyId Algorithm
1,210,360 UART: [idev] --
1,211,410 UART: [ldev] ++
1,211,578 UART: [ldev] CDI.KEYID = 6
1,211,941 UART: [ldev] SUBJECT.KEYID = 5
1,212,367 UART: [ldev] AUTHORITY.KEYID = 7
1,212,830 UART: [ldev] FE.KEYID = 1
1,218,014 UART: [ldev] Erasing FE.KEYID = 1
1,244,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,838 UART: [ldev] --
1,284,147 UART: [fwproc] Wait for Commands...
1,284,923 UART: [fwproc] Recv command 0x46574c44
1,285,651 UART: [fwproc] Recv'd Img size: 118548 bytes
1,565,166 UART: ROM Fatal Error: 0x000B0021
1,566,323 >>> mbox cmd response: failed
1,566,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,566,329 >>> mbox cmd response: failed
1,566,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,566,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
902,102 UART: [kat] SHA2-256
904,042 UART: [kat] SHA2-384
906,991 UART: [kat] SHA2-512-ACC
908,892 UART: [kat] ECC-384
918,615 UART: [kat] HMAC-384Kdf
923,149 UART: [kat] LMS
1,171,477 UART: [kat] --
1,172,190 UART: [cold-reset] ++
1,172,532 UART: [fht] FHT @ 0x50003400
1,175,305 UART: [idev] ++
1,175,473 UART: [idev] CDI.KEYID = 6
1,175,833 UART: [idev] SUBJECT.KEYID = 7
1,176,257 UART: [idev] UDS.KEYID = 0
1,176,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,329 UART: [idev] Erasing UDS.KEYID = 0
1,201,286 UART: [idev] Sha1 KeyId Algorithm
1,209,664 UART: [idev] --
1,210,666 UART: [ldev] ++
1,210,834 UART: [ldev] CDI.KEYID = 6
1,211,197 UART: [ldev] SUBJECT.KEYID = 5
1,211,623 UART: [ldev] AUTHORITY.KEYID = 7
1,212,086 UART: [ldev] FE.KEYID = 1
1,217,716 UART: [ldev] Erasing FE.KEYID = 1
1,243,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,712 UART: [ldev] --
1,282,977 UART: [fwproc] Wait for Commands...
1,283,793 UART: [fwproc] Recv command 0x46574c44
1,284,521 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,394 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,564 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,775 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,266 >>> mbox cmd response: failed
1,420,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,272 >>> mbox cmd response: failed
1,420,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,984 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,132 UART:
192,501 UART: Running Caliptra ROM ...
193,630 UART:
193,778 UART: [state] CFI Enabled
262,467 UART: [state] LifecycleState = Unprovisioned
264,400 UART: [state] DebugLocked = No
267,146 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,620 UART: [kat] SHA2-256
442,313 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,827 UART: [kat] ++
453,302 UART: [kat] sha1
463,807 UART: [kat] SHA2-256
466,500 UART: [kat] SHA2-384
471,941 UART: [kat] SHA2-512-ACC
474,313 UART: [kat] ECC-384
2,767,235 UART: [kat] HMAC-384Kdf
2,799,834 UART: [kat] LMS
3,990,124 UART: [kat] --
3,994,194 UART: [cold-reset] ++
3,996,519 UART: [fht] Storing FHT @ 0x50003400
4,007,897 UART: [idev] ++
4,008,471 UART: [idev] CDI.KEYID = 6
4,009,458 UART: [idev] SUBJECT.KEYID = 7
4,010,679 UART: [idev] UDS.KEYID = 0
4,014,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,780 UART: [idev] Erasing UDS.KEYID = 0
7,350,080 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,424 UART: [idev] --
7,375,748 UART: [ldev] ++
7,376,322 UART: [ldev] CDI.KEYID = 6
7,377,285 UART: [ldev] SUBJECT.KEYID = 5
7,378,505 UART: [ldev] AUTHORITY.KEYID = 7
7,379,843 UART: [ldev] FE.KEYID = 1
7,425,418 UART: [ldev] Erasing FE.KEYID = 1
10,756,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,153 UART: [ldev] --
13,120,152 UART: [fwproc] Waiting for Commands...
13,122,577 UART: [fwproc] Received command 0x46574c44
13,124,769 UART: [fwproc] Received Image of size 118548 bytes
16,084,702 UART: ROM Fatal Error: 0x000B0022
16,088,163 >>> mbox cmd response: failed
16,088,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,088,937 >>> mbox cmd response: failed
16,089,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,089,518 >>> mbox cmd response: failed
Initializing fuses
2,057,494 writing to cptra_bootfsm_go
2,246,810 UART:
2,247,150 UART: Running Caliptra ROM ...
2,248,191 UART:
2,248,343 UART: [state] CFI Enabled
2,302,141 UART: [state] LifecycleState = Unprovisioned
2,304,081 UART: [state] DebugLocked = No
2,306,995 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,311,635 UART: [kat] SHA2-256
2,481,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,491,827 UART: [kat] ++
2,492,319 UART: [kat] sha1
2,503,750 UART: [kat] SHA2-256
2,506,456 UART: [kat] SHA2-384
2,511,692 UART: [kat] SHA2-512-ACC
2,514,099 UART: [kat] ECC-384
4,806,197 UART: [kat] HMAC-384Kdf
4,818,791 UART: [kat] LMS
6,009,088 UART: [kat] --
6,013,394 UART: [cold-reset] ++
6,015,683 UART: [fht] Storing FHT @ 0x50003400
6,026,691 UART: [idev] ++
6,027,260 UART: [idev] CDI.KEYID = 6
6,028,283 UART: [idev] SUBJECT.KEYID = 7
6,029,444 UART: [idev] UDS.KEYID = 0
6,031,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,181,048 UART: [idev] Erasing UDS.KEYID = 0
9,367,344 UART: [idev] Using Sha1 for KeyId Algorithm
9,389,691 UART: [idev] --
9,394,205 UART: [ldev] ++
9,394,782 UART: [ldev] CDI.KEYID = 6
9,395,749 UART: [ldev] SUBJECT.KEYID = 5
9,396,887 UART: [ldev] AUTHORITY.KEYID = 7
9,398,242 UART: [ldev] FE.KEYID = 1
9,441,332 UART: [ldev] Erasing FE.KEYID = 1
12,771,162 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,069,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,084,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,099,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,113,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,132,895 UART: [ldev] --
15,138,366 UART: [fwproc] Waiting for Commands...
15,140,439 UART: [fwproc] Received command 0x46574c44
15,142,636 UART: [fwproc] Received Image of size 118548 bytes
19,247,159 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,321,129 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,394,318 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,723,506 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
3,812,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,888,915 >>> mbox cmd response: failed
15,889,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,889,954 >>> mbox cmd response: failed
15,890,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,890,530 >>> mbox cmd response: failed
Initializing fuses
2,059,190 writing to cptra_bootfsm_go
5,853,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,027,636 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,539 UART:
192,920 UART: Running Caliptra ROM ...
194,084 UART:
603,775 UART: [state] CFI Enabled
617,010 UART: [state] LifecycleState = Unprovisioned
618,921 UART: [state] DebugLocked = No
620,198 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,884 UART: [kat] SHA2-256
795,620 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,157 UART: [kat] ++
806,699 UART: [kat] sha1
818,829 UART: [kat] SHA2-256
821,562 UART: [kat] SHA2-384
826,838 UART: [kat] SHA2-512-ACC
829,222 UART: [kat] ECC-384
3,113,431 UART: [kat] HMAC-384Kdf
3,125,182 UART: [kat] LMS
4,315,327 UART: [kat] --
4,320,122 UART: [cold-reset] ++
4,322,388 UART: [fht] Storing FHT @ 0x50003400
4,332,687 UART: [idev] ++
4,333,268 UART: [idev] CDI.KEYID = 6
4,334,240 UART: [idev] SUBJECT.KEYID = 7
4,335,460 UART: [idev] UDS.KEYID = 0
4,338,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,332 UART: [idev] Erasing UDS.KEYID = 0
7,623,789 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,889 UART: [idev] --
7,651,079 UART: [ldev] ++
7,651,670 UART: [ldev] CDI.KEYID = 6
7,652,582 UART: [ldev] SUBJECT.KEYID = 5
7,653,811 UART: [ldev] AUTHORITY.KEYID = 7
7,655,047 UART: [ldev] FE.KEYID = 1
7,665,001 UART: [ldev] Erasing FE.KEYID = 1
10,952,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,661 UART: [ldev] --
13,314,663 UART: [fwproc] Waiting for Commands...
13,316,995 UART: [fwproc] Received command 0x46574c44
13,319,191 UART: [fwproc] Received Image of size 118548 bytes
16,274,468 UART: ROM Fatal Error: 0x000B0022
16,277,939 >>> mbox cmd response: failed
16,278,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,278,679 >>> mbox cmd response: failed
16,279,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,279,376 >>> mbox cmd response: failed
Initializing fuses
2,056,579 writing to cptra_bootfsm_go
2,245,883 UART:
2,246,227 UART: Running Caliptra ROM ...
2,247,283 UART:
4,176,428 UART: [state] CFI Enabled
4,189,549 UART: [state] LifecycleState = Unprovisioned
4,191,461 UART: [state] DebugLocked = No
4,193,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,198,432 UART: [kat] SHA2-256
4,368,177 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,378,684 UART: [kat] ++
4,379,148 UART: [kat] sha1
4,391,059 UART: [kat] SHA2-256
4,393,798 UART: [kat] SHA2-384
4,399,602 UART: [kat] SHA2-512-ACC
4,401,969 UART: [kat] ECC-384
6,685,676 UART: [kat] HMAC-384Kdf
6,697,090 UART: [kat] LMS
7,887,228 UART: [kat] --
7,890,433 UART: [cold-reset] ++
7,893,081 UART: [fht] Storing FHT @ 0x50003400
7,903,652 UART: [idev] ++
7,904,223 UART: [idev] CDI.KEYID = 6
7,905,247 UART: [idev] SUBJECT.KEYID = 7
7,906,410 UART: [idev] UDS.KEYID = 0
7,908,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,057,752 UART: [idev] Erasing UDS.KEYID = 0
11,195,710 UART: [idev] Using Sha1 for KeyId Algorithm
11,217,516 UART: [idev] --
11,222,052 UART: [ldev] ++
11,222,652 UART: [ldev] CDI.KEYID = 6
11,223,675 UART: [ldev] SUBJECT.KEYID = 5
11,224,917 UART: [ldev] AUTHORITY.KEYID = 7
11,226,101 UART: [ldev] FE.KEYID = 1
11,237,620 UART: [ldev] Erasing FE.KEYID = 1
14,523,575 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,815,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,830,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,845,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,859,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,879,915 UART: [ldev] --
16,883,802 UART: [fwproc] Waiting for Commands...
16,886,941 UART: [fwproc] Received command 0x46574c44
16,889,136 UART: [fwproc] Received Image of size 118548 bytes
20,997,620 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,076,573 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,149,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,478,757 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,129,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,067,430 >>> mbox cmd response: failed
16,068,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,068,447 >>> mbox cmd response: failed
16,068,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,069,077 >>> mbox cmd response: failed
Initializing fuses
2,058,434 writing to cptra_bootfsm_go
7,927,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,948,288 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,144 UART:
192,541 UART: Running Caliptra ROM ...
193,679 UART:
193,849 UART: [state] CFI Enabled
262,770 UART: [state] LifecycleState = Unprovisioned
264,702 UART: [state] DebugLocked = No
266,687 UART: [state] WD Timer not started. Device not locked for debugging
270,338 UART: [kat] SHA2-256
449,975 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,735 UART: [kat] ++
461,293 UART: [kat] sha1
471,526 UART: [kat] SHA2-256
474,220 UART: [kat] SHA2-384
480,744 UART: [kat] SHA2-512-ACC
483,084 UART: [kat] ECC-384
2,946,883 UART: [kat] HMAC-384Kdf
2,969,678 UART: [kat] LMS
3,446,175 UART: [kat] --
3,449,898 UART: [cold-reset] ++
3,451,106 UART: [fht] FHT @ 0x50003400
3,462,883 UART: [idev] ++
3,463,365 UART: [idev] CDI.KEYID = 6
3,464,349 UART: [idev] SUBJECT.KEYID = 7
3,465,527 UART: [idev] UDS.KEYID = 0
3,468,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,215 UART: [idev] Erasing UDS.KEYID = 0
5,985,610 UART: [idev] Sha1 KeyId Algorithm
6,010,516 UART: [idev] --
6,014,716 UART: [ldev] ++
6,015,303 UART: [ldev] CDI.KEYID = 6
6,016,229 UART: [ldev] SUBJECT.KEYID = 5
6,017,399 UART: [ldev] AUTHORITY.KEYID = 7
6,018,643 UART: [ldev] FE.KEYID = 1
6,057,537 UART: [ldev] Erasing FE.KEYID = 1
8,563,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,551 UART: [ldev] --
10,372,637 UART: [fwproc] Wait for Commands...
10,374,903 UART: [fwproc] Recv command 0x46574c44
10,376,898 UART: [fwproc] Recv'd Img size: 118548 bytes
12,706,124 UART: ROM Fatal Error: 0x000B0022
12,709,352 >>> mbox cmd response: failed
12,709,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,709,994 >>> mbox cmd response: failed
12,710,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,710,618 >>> mbox cmd response: failed
Initializing fuses
2,059,799 writing to cptra_bootfsm_go
2,249,080 UART:
2,249,434 UART: Running Caliptra ROM ...
2,250,579 UART:
2,250,745 UART: [state] CFI Enabled
2,312,756 UART: [state] LifecycleState = Unprovisioned
2,314,697 UART: [state] DebugLocked = No
2,316,688 UART: [state] WD Timer not started. Device not locked for debugging
2,320,117 UART: [kat] SHA2-256
2,499,746 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,510,536 UART: [kat] ++
2,511,087 UART: [kat] sha1
2,522,097 UART: [kat] SHA2-256
2,524,801 UART: [kat] SHA2-384
2,530,527 UART: [kat] SHA2-512-ACC
2,532,899 UART: [kat] ECC-384
4,997,729 UART: [kat] HMAC-384Kdf
5,021,263 UART: [kat] LMS
5,497,730 UART: [kat] --
5,502,408 UART: [cold-reset] ++
5,503,757 UART: [fht] FHT @ 0x50003400
5,514,799 UART: [idev] ++
5,515,370 UART: [idev] CDI.KEYID = 6
5,516,395 UART: [idev] SUBJECT.KEYID = 7
5,517,558 UART: [idev] UDS.KEYID = 0
5,520,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,669,435 UART: [idev] Erasing UDS.KEYID = 0
8,035,955 UART: [idev] Sha1 KeyId Algorithm
8,059,156 UART: [idev] --
8,065,485 UART: [ldev] ++
8,066,063 UART: [ldev] CDI.KEYID = 6
8,067,002 UART: [ldev] SUBJECT.KEYID = 5
8,068,181 UART: [ldev] AUTHORITY.KEYID = 7
8,069,422 UART: [ldev] FE.KEYID = 1
8,108,478 UART: [ldev] Erasing FE.KEYID = 1
10,614,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,353,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,369,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,385,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,400,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,422,671 UART: [ldev] --
12,427,765 UART: [fwproc] Wait for Commands...
12,430,204 UART: [fwproc] Recv command 0x46574c44
12,432,196 UART: [fwproc] Recv'd Img size: 118548 bytes
15,915,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,989,040 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,062,067 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,391,130 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,462,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,577,415 >>> mbox cmd response: failed
12,577,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,578,330 >>> mbox cmd response: failed
12,578,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,578,904 >>> mbox cmd response: failed
Initializing fuses
2,067,471 writing to cptra_bootfsm_go
5,515,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,290,782 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
192,680 UART:
193,066 UART: Running Caliptra ROM ...
194,277 UART:
603,795 UART: [state] CFI Enabled
616,401 UART: [state] LifecycleState = Unprovisioned
618,348 UART: [state] DebugLocked = No
620,379 UART: [state] WD Timer not started. Device not locked for debugging
624,136 UART: [kat] SHA2-256
803,762 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,587 UART: [kat] ++
815,246 UART: [kat] sha1
825,109 UART: [kat] SHA2-256
827,850 UART: [kat] SHA2-384
833,562 UART: [kat] SHA2-512-ACC
835,913 UART: [kat] ECC-384
3,276,610 UART: [kat] HMAC-384Kdf
3,289,656 UART: [kat] LMS
3,766,147 UART: [kat] --
3,769,989 UART: [cold-reset] ++
3,772,424 UART: [fht] FHT @ 0x50003400
3,783,568 UART: [idev] ++
3,784,139 UART: [idev] CDI.KEYID = 6
3,785,124 UART: [idev] SUBJECT.KEYID = 7
3,786,346 UART: [idev] UDS.KEYID = 0
3,788,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,856 UART: [idev] Erasing UDS.KEYID = 0
6,263,924 UART: [idev] Sha1 KeyId Algorithm
6,288,891 UART: [idev] --
6,294,003 UART: [ldev] ++
6,294,587 UART: [ldev] CDI.KEYID = 6
6,295,532 UART: [ldev] SUBJECT.KEYID = 5
6,296,747 UART: [ldev] AUTHORITY.KEYID = 7
6,297,983 UART: [ldev] FE.KEYID = 1
6,309,176 UART: [ldev] Erasing FE.KEYID = 1
8,788,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,235 UART: [ldev] --
10,582,233 UART: [fwproc] Wait for Commands...
10,583,795 UART: [fwproc] Recv command 0x46574c44
10,585,793 UART: [fwproc] Recv'd Img size: 118548 bytes
12,907,609 UART: ROM Fatal Error: 0x000B0022
12,910,851 >>> mbox cmd response: failed
12,911,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,911,592 >>> mbox cmd response: failed
12,911,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,912,164 >>> mbox cmd response: failed
Initializing fuses
2,059,961 writing to cptra_bootfsm_go
2,249,281 UART:
2,249,625 UART: Running Caliptra ROM ...
2,250,726 UART:
7,537,709 UART: [state] CFI Enabled
7,549,103 UART: [state] LifecycleState = Unprovisioned
7,551,029 UART: [state] DebugLocked = No
7,553,508 UART: [state] WD Timer not started. Device not locked for debugging
7,558,013 UART: [kat] SHA2-256
7,737,646 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,748,454 UART: [kat] ++
7,748,948 UART: [kat] sha1
7,759,462 UART: [kat] SHA2-256
7,762,185 UART: [kat] SHA2-384
7,767,177 UART: [kat] SHA2-512-ACC
7,769,547 UART: [kat] ECC-384
10,211,129 UART: [kat] HMAC-384Kdf
10,223,303 UART: [kat] LMS
10,699,813 UART: [kat] --
10,704,846 UART: [cold-reset] ++
10,706,676 UART: [fht] FHT @ 0x50003400
10,718,028 UART: [idev] ++
10,718,608 UART: [idev] CDI.KEYID = 6
10,719,575 UART: [idev] SUBJECT.KEYID = 7
10,720,792 UART: [idev] UDS.KEYID = 0
10,723,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,872,216 UART: [idev] Erasing UDS.KEYID = 0
13,196,389 UART: [idev] Sha1 KeyId Algorithm
13,220,515 UART: [idev] --
13,225,310 UART: [ldev] ++
13,225,883 UART: [ldev] CDI.KEYID = 6
13,226,903 UART: [ldev] SUBJECT.KEYID = 5
13,228,014 UART: [ldev] AUTHORITY.KEYID = 7
13,229,253 UART: [ldev] FE.KEYID = 1
13,239,197 UART: [ldev] Erasing FE.KEYID = 1
15,717,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,437,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,453,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,469,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,484,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,506,866 UART: [ldev] --
17,512,623 UART: [fwproc] Wait for Commands...
17,514,351 UART: [fwproc] Recv command 0x46574c44
17,516,396 UART: [fwproc] Recv'd Img size: 118548 bytes
21,005,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,088,775 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,161,752 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,489,891 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,780,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,816,481 >>> mbox cmd response: failed
12,817,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,817,442 >>> mbox cmd response: failed
12,817,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,818,015 >>> mbox cmd response: failed
Initializing fuses
2,061,074 writing to cptra_bootfsm_go
10,829,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,483,069 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,717 writing to cptra_bootfsm_go
192,905 UART:
193,263 UART: Running Caliptra ROM ...
194,458 UART:
194,620 UART: [state] CFI Enabled
264,036 UART: [state] LifecycleState = Unprovisioned
266,420 UART: [state] DebugLocked = No
268,623 UART: [state] WD Timer not started. Device not locked for debugging
272,744 UART: [kat] SHA2-256
462,598 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,380 UART: [kat] ++
473,829 UART: [kat] sha1
485,818 UART: [kat] SHA2-256
488,826 UART: [kat] SHA2-384
495,312 UART: [kat] SHA2-512-ACC
497,934 UART: [kat] ECC-384
2,945,269 UART: [kat] HMAC-384Kdf
2,971,932 UART: [kat] LMS
3,503,706 UART: [kat] --
3,508,704 UART: [cold-reset] ++
3,510,973 UART: [fht] FHT @ 0x50003400
3,522,391 UART: [idev] ++
3,523,324 UART: [idev] CDI.KEYID = 6
3,524,220 UART: [idev] SUBJECT.KEYID = 7
3,525,291 UART: [idev] UDS.KEYID = 0
3,528,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,450 UART: [idev] Erasing UDS.KEYID = 0
6,036,000 UART: [idev] Sha1 KeyId Algorithm
6,058,403 UART: [idev] --
6,063,755 UART: [ldev] ++
6,064,445 UART: [ldev] CDI.KEYID = 6
6,065,333 UART: [ldev] SUBJECT.KEYID = 5
6,066,557 UART: [ldev] AUTHORITY.KEYID = 7
6,067,746 UART: [ldev] FE.KEYID = 1
6,109,546 UART: [ldev] Erasing FE.KEYID = 1
8,617,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,351,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,366,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,381,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,396,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,417,292 UART: [ldev] --
10,423,218 UART: [fwproc] Wait for Commands...
10,425,749 UART: [fwproc] Recv command 0x46574c44
10,428,067 UART: [fwproc] Recv'd Img size: 118548 bytes
12,768,702 UART: ROM Fatal Error: 0x000B0022
12,772,158 >>> mbox cmd response: failed
12,772,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,773,044 >>> mbox cmd response: failed
12,773,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,773,739 >>> mbox cmd response: failed
Initializing fuses
2,068,862 writing to cptra_bootfsm_go
2,258,198 UART:
2,258,552 UART: Running Caliptra ROM ...
2,259,605 UART:
2,259,763 UART: [state] CFI Enabled
2,327,418 UART: [state] LifecycleState = Unprovisioned
2,329,800 UART: [state] DebugLocked = No
2,332,211 UART: [state] WD Timer not started. Device not locked for debugging
2,336,261 UART: [kat] SHA2-256
2,526,137 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,536,882 UART: [kat] ++
2,537,350 UART: [kat] sha1
2,549,109 UART: [kat] SHA2-256
2,552,139 UART: [kat] SHA2-384
2,558,303 UART: [kat] SHA2-512-ACC
2,560,939 UART: [kat] ECC-384
5,010,170 UART: [kat] HMAC-384Kdf
5,032,780 UART: [kat] LMS
5,564,527 UART: [kat] --
5,569,677 UART: [cold-reset] ++
5,571,463 UART: [fht] FHT @ 0x50003400
5,583,206 UART: [idev] ++
5,583,894 UART: [idev] CDI.KEYID = 6
5,584,845 UART: [idev] SUBJECT.KEYID = 7
5,586,013 UART: [idev] UDS.KEYID = 0
5,588,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,737,679 UART: [idev] Erasing UDS.KEYID = 0
8,089,466 UART: [idev] Sha1 KeyId Algorithm
8,112,113 UART: [idev] --
8,118,257 UART: [ldev] ++
8,118,959 UART: [ldev] CDI.KEYID = 6
8,119,875 UART: [ldev] SUBJECT.KEYID = 5
8,121,045 UART: [ldev] AUTHORITY.KEYID = 7
8,122,286 UART: [ldev] FE.KEYID = 1
8,160,541 UART: [ldev] Erasing FE.KEYID = 1
10,666,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,401,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,416,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,432,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,447,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,469,332 UART: [ldev] --
12,474,442 UART: [fwproc] Wait for Commands...
12,477,298 UART: [fwproc] Recv command 0x46574c44
12,479,566 UART: [fwproc] Recv'd Img size: 118548 bytes
15,974,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,052,824 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,176,445 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,736,506 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
3,437,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,671,688 >>> mbox cmd response: failed
12,672,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,672,590 >>> mbox cmd response: failed
12,672,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,673,159 >>> mbox cmd response: failed
Initializing fuses
2,063,760 writing to cptra_bootfsm_go
5,506,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,886,494 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,445 UART:
192,819 UART: Running Caliptra ROM ...
193,941 UART:
603,728 UART: [state] CFI Enabled
618,029 UART: [state] LifecycleState = Unprovisioned
620,369 UART: [state] DebugLocked = No
622,755 UART: [state] WD Timer not started. Device not locked for debugging
627,250 UART: [kat] SHA2-256
817,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,954 UART: [kat] ++
828,408 UART: [kat] sha1
839,995 UART: [kat] SHA2-256
842,972 UART: [kat] SHA2-384
849,066 UART: [kat] SHA2-512-ACC
851,691 UART: [kat] ECC-384
3,291,194 UART: [kat] HMAC-384Kdf
3,303,959 UART: [kat] LMS
3,835,828 UART: [kat] --
3,839,287 UART: [cold-reset] ++
3,840,849 UART: [fht] FHT @ 0x50003400
3,852,445 UART: [idev] ++
3,853,135 UART: [idev] CDI.KEYID = 6
3,854,105 UART: [idev] SUBJECT.KEYID = 7
3,855,269 UART: [idev] UDS.KEYID = 0
3,858,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,238 UART: [idev] Erasing UDS.KEYID = 0
6,333,819 UART: [idev] Sha1 KeyId Algorithm
6,355,480 UART: [idev] --
6,361,337 UART: [ldev] ++
6,362,029 UART: [ldev] CDI.KEYID = 6
6,362,923 UART: [ldev] SUBJECT.KEYID = 5
6,364,150 UART: [ldev] AUTHORITY.KEYID = 7
6,365,284 UART: [ldev] FE.KEYID = 1
6,376,099 UART: [ldev] Erasing FE.KEYID = 1
8,856,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,481 UART: [ldev] --
10,648,769 UART: [fwproc] Wait for Commands...
10,650,827 UART: [fwproc] Recv command 0x46574c44
10,653,097 UART: [fwproc] Recv'd Img size: 118548 bytes
12,991,456 UART: ROM Fatal Error: 0x000B0022
12,995,071 >>> mbox cmd response: failed
12,995,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,995,829 >>> mbox cmd response: failed
12,996,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,996,400 >>> mbox cmd response: failed
Initializing fuses
2,067,196 writing to cptra_bootfsm_go
2,256,506 UART:
2,256,849 UART: Running Caliptra ROM ...
2,257,896 UART:
7,457,773 UART: [state] CFI Enabled
7,470,997 UART: [state] LifecycleState = Unprovisioned
7,473,353 UART: [state] DebugLocked = No
7,475,102 UART: [state] WD Timer not started. Device not locked for debugging
7,479,086 UART: [kat] SHA2-256
7,669,018 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,679,781 UART: [kat] ++
7,680,303 UART: [kat] sha1
7,692,387 UART: [kat] SHA2-256
7,695,414 UART: [kat] SHA2-384
7,701,639 UART: [kat] SHA2-512-ACC
7,704,226 UART: [kat] ECC-384
10,145,185 UART: [kat] HMAC-384Kdf
10,157,303 UART: [kat] LMS
10,689,117 UART: [kat] --
10,693,227 UART: [cold-reset] ++
10,695,671 UART: [fht] FHT @ 0x50003400
10,707,154 UART: [idev] ++
10,707,876 UART: [idev] CDI.KEYID = 6
10,709,022 UART: [idev] SUBJECT.KEYID = 7
10,710,138 UART: [idev] UDS.KEYID = 0
10,712,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,861,524 UART: [idev] Erasing UDS.KEYID = 0
13,182,685 UART: [idev] Sha1 KeyId Algorithm
13,205,006 UART: [idev] --
13,209,924 UART: [ldev] ++
13,210,607 UART: [ldev] CDI.KEYID = 6
13,211,517 UART: [ldev] SUBJECT.KEYID = 5
13,212,676 UART: [ldev] AUTHORITY.KEYID = 7
13,213,910 UART: [ldev] FE.KEYID = 1
13,224,880 UART: [ldev] Erasing FE.KEYID = 1
15,698,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,415,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,430,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,445,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,460,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,483,355 UART: [ldev] --
17,489,379 UART: [fwproc] Wait for Commands...
17,491,972 UART: [fwproc] Recv command 0x46574c44
17,494,296 UART: [fwproc] Recv'd Img size: 118548 bytes
20,990,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,061,642 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,185,254 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,745,635 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
3,761,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,902,396 >>> mbox cmd response: failed
12,903,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,903,446 >>> mbox cmd response: failed
12,903,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,904,014 >>> mbox cmd response: failed
Initializing fuses
2,061,787 writing to cptra_bootfsm_go
10,714,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,998,015 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,157 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,701 UART: [kat] SHA2-256
881,632 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,747 UART: [kat] ++
885,899 UART: [kat] sha1
890,171 UART: [kat] SHA2-256
892,109 UART: [kat] SHA2-384
894,834 UART: [kat] SHA2-512-ACC
896,735 UART: [kat] ECC-384
902,352 UART: [kat] HMAC-384Kdf
906,986 UART: [kat] LMS
1,475,182 UART: [kat] --
1,475,901 UART: [cold-reset] ++
1,476,437 UART: [fht] Storing FHT @ 0x50003400
1,479,368 UART: [idev] ++
1,479,536 UART: [idev] CDI.KEYID = 6
1,479,896 UART: [idev] SUBJECT.KEYID = 7
1,480,320 UART: [idev] UDS.KEYID = 0
1,480,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,138 UART: [idev] Erasing UDS.KEYID = 0
1,505,076 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,706 UART: [idev] --
1,514,939 UART: [ldev] ++
1,515,107 UART: [ldev] CDI.KEYID = 6
1,515,470 UART: [ldev] SUBJECT.KEYID = 5
1,515,896 UART: [ldev] AUTHORITY.KEYID = 7
1,516,359 UART: [ldev] FE.KEYID = 1
1,521,811 UART: [ldev] Erasing FE.KEYID = 1
1,547,264 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,780 UART: [ldev] --
1,587,261 UART: [fwproc] Waiting for Commands...
1,588,042 UART: [fwproc] Received command 0x46574c44
1,588,833 UART: [fwproc] Received Image of size 118548 bytes
1,867,916 UART: ROM Fatal Error: 0x000B0022
1,869,073 >>> mbox cmd response: failed
1,869,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,869,079 >>> mbox cmd response: failed
1,869,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,869,085 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,685 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,249 UART: [kat] SHA2-256
882,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,295 UART: [kat] ++
886,447 UART: [kat] sha1
890,865 UART: [kat] SHA2-256
892,803 UART: [kat] SHA2-384
895,498 UART: [kat] SHA2-512-ACC
897,399 UART: [kat] ECC-384
902,624 UART: [kat] HMAC-384Kdf
907,084 UART: [kat] LMS
1,475,280 UART: [kat] --
1,476,043 UART: [cold-reset] ++
1,476,501 UART: [fht] Storing FHT @ 0x50003400
1,479,356 UART: [idev] ++
1,479,524 UART: [idev] CDI.KEYID = 6
1,479,884 UART: [idev] SUBJECT.KEYID = 7
1,480,308 UART: [idev] UDS.KEYID = 0
1,480,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,334 UART: [idev] Erasing UDS.KEYID = 0
1,504,456 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,192 UART: [idev] --
1,514,099 UART: [ldev] ++
1,514,267 UART: [ldev] CDI.KEYID = 6
1,514,630 UART: [ldev] SUBJECT.KEYID = 5
1,515,056 UART: [ldev] AUTHORITY.KEYID = 7
1,515,519 UART: [ldev] FE.KEYID = 1
1,520,837 UART: [ldev] Erasing FE.KEYID = 1
1,546,118 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,040 UART: [ldev] --
1,585,331 UART: [fwproc] Waiting for Commands...
1,586,098 UART: [fwproc] Received command 0x46574c44
1,586,889 UART: [fwproc] Received Image of size 118548 bytes
2,930,978 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,902 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,120 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,519 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,721,228 >>> mbox cmd response: failed
1,721,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,234 >>> mbox cmd response: failed
1,721,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,045 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
86,838 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,320 UART: [kat] SHA2-256
882,251 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,366 UART: [kat] ++
886,518 UART: [kat] sha1
890,942 UART: [kat] SHA2-256
892,880 UART: [kat] SHA2-384
895,509 UART: [kat] SHA2-512-ACC
897,410 UART: [kat] ECC-384
902,821 UART: [kat] HMAC-384Kdf
907,621 UART: [kat] LMS
1,475,817 UART: [kat] --
1,476,630 UART: [cold-reset] ++
1,477,020 UART: [fht] Storing FHT @ 0x50003400
1,479,613 UART: [idev] ++
1,479,781 UART: [idev] CDI.KEYID = 6
1,480,141 UART: [idev] SUBJECT.KEYID = 7
1,480,565 UART: [idev] UDS.KEYID = 0
1,480,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,585 UART: [idev] Erasing UDS.KEYID = 0
1,505,307 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,803 UART: [idev] --
1,514,864 UART: [ldev] ++
1,515,032 UART: [ldev] CDI.KEYID = 6
1,515,395 UART: [ldev] SUBJECT.KEYID = 5
1,515,821 UART: [ldev] AUTHORITY.KEYID = 7
1,516,284 UART: [ldev] FE.KEYID = 1
1,521,260 UART: [ldev] Erasing FE.KEYID = 1
1,546,809 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,667 UART: [ldev] --
1,586,030 UART: [fwproc] Waiting for Commands...
1,586,675 UART: [fwproc] Received command 0x46574c44
1,587,466 UART: [fwproc] Received Image of size 118548 bytes
1,866,545 UART: ROM Fatal Error: 0x000B0022
1,867,702 >>> mbox cmd response: failed
1,867,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,708 >>> mbox cmd response: failed
1,867,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,714 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,957 UART: [state] LifecycleState = Unprovisioned
85,612 UART: [state] DebugLocked = No
86,288 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,994 UART: [kat] SHA2-256
881,925 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,040 UART: [kat] ++
886,192 UART: [kat] sha1
890,314 UART: [kat] SHA2-256
892,252 UART: [kat] SHA2-384
894,851 UART: [kat] SHA2-512-ACC
896,752 UART: [kat] ECC-384
902,557 UART: [kat] HMAC-384Kdf
907,297 UART: [kat] LMS
1,475,493 UART: [kat] --
1,476,218 UART: [cold-reset] ++
1,476,674 UART: [fht] Storing FHT @ 0x50003400
1,479,519 UART: [idev] ++
1,479,687 UART: [idev] CDI.KEYID = 6
1,480,047 UART: [idev] SUBJECT.KEYID = 7
1,480,471 UART: [idev] UDS.KEYID = 0
1,480,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,683 UART: [idev] Erasing UDS.KEYID = 0
1,505,677 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,419 UART: [idev] --
1,515,462 UART: [ldev] ++
1,515,630 UART: [ldev] CDI.KEYID = 6
1,515,993 UART: [ldev] SUBJECT.KEYID = 5
1,516,419 UART: [ldev] AUTHORITY.KEYID = 7
1,516,882 UART: [ldev] FE.KEYID = 1
1,522,184 UART: [ldev] Erasing FE.KEYID = 1
1,547,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,709 UART: [ldev] --
1,586,056 UART: [fwproc] Waiting for Commands...
1,586,729 UART: [fwproc] Received command 0x46574c44
1,587,520 UART: [fwproc] Received Image of size 118548 bytes
2,932,369 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,415 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,633 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,036 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,721,505 >>> mbox cmd response: failed
1,721,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,511 >>> mbox cmd response: failed
1,721,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,444 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
891,438 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
900,000 UART: [kat] SHA2-256
901,940 UART: [kat] SHA2-384
904,731 UART: [kat] SHA2-512-ACC
906,632 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,571 UART: [kat] LMS
1,168,883 UART: [kat] --
1,169,714 UART: [cold-reset] ++
1,170,236 UART: [fht] FHT @ 0x50003400
1,172,972 UART: [idev] ++
1,173,140 UART: [idev] CDI.KEYID = 6
1,173,501 UART: [idev] SUBJECT.KEYID = 7
1,173,926 UART: [idev] UDS.KEYID = 0
1,174,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,139 UART: [idev] Erasing UDS.KEYID = 0
1,199,597 UART: [idev] Sha1 KeyId Algorithm
1,208,493 UART: [idev] --
1,209,602 UART: [ldev] ++
1,209,770 UART: [ldev] CDI.KEYID = 6
1,210,134 UART: [ldev] SUBJECT.KEYID = 5
1,210,561 UART: [ldev] AUTHORITY.KEYID = 7
1,211,024 UART: [ldev] FE.KEYID = 1
1,215,910 UART: [ldev] Erasing FE.KEYID = 1
1,242,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,504 UART: [ldev] --
1,281,715 UART: [fwproc] Wait for Commands...
1,282,458 UART: [fwproc] Recv command 0x46574c44
1,283,191 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,816 UART: ROM Fatal Error: 0x000B0022
1,562,973 >>> mbox cmd response: failed
1,562,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,979 >>> mbox cmd response: failed
1,562,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,985 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,127 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
890,878 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,982 UART: [kat] ++
895,134 UART: [kat] sha1
899,324 UART: [kat] SHA2-256
901,264 UART: [kat] SHA2-384
903,947 UART: [kat] SHA2-512-ACC
905,848 UART: [kat] ECC-384
915,851 UART: [kat] HMAC-384Kdf
920,415 UART: [kat] LMS
1,168,727 UART: [kat] --
1,169,684 UART: [cold-reset] ++
1,170,168 UART: [fht] FHT @ 0x50003400
1,172,672 UART: [idev] ++
1,172,840 UART: [idev] CDI.KEYID = 6
1,173,201 UART: [idev] SUBJECT.KEYID = 7
1,173,626 UART: [idev] UDS.KEYID = 0
1,173,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,659 UART: [idev] Erasing UDS.KEYID = 0
1,198,383 UART: [idev] Sha1 KeyId Algorithm
1,207,253 UART: [idev] --
1,208,306 UART: [ldev] ++
1,208,474 UART: [ldev] CDI.KEYID = 6
1,208,838 UART: [ldev] SUBJECT.KEYID = 5
1,209,265 UART: [ldev] AUTHORITY.KEYID = 7
1,209,728 UART: [ldev] FE.KEYID = 1
1,214,856 UART: [ldev] Erasing FE.KEYID = 1
1,241,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,672 UART: [ldev] --
1,281,113 UART: [fwproc] Wait for Commands...
1,281,914 UART: [fwproc] Recv command 0x46574c44
1,282,647 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,506 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,681 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,982 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,626 >>> mbox cmd response: failed
1,417,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,632 >>> mbox cmd response: failed
1,417,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,991 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
891,593 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,697 UART: [kat] ++
895,849 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,730 UART: [kat] SHA2-512-ACC
906,631 UART: [kat] ECC-384
916,274 UART: [kat] HMAC-384Kdf
920,832 UART: [kat] LMS
1,169,144 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,172,801 UART: [idev] ++
1,172,969 UART: [idev] CDI.KEYID = 6
1,173,330 UART: [idev] SUBJECT.KEYID = 7
1,173,755 UART: [idev] UDS.KEYID = 0
1,174,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,264 UART: [idev] Erasing UDS.KEYID = 0
1,199,400 UART: [idev] Sha1 KeyId Algorithm
1,208,168 UART: [idev] --
1,209,227 UART: [ldev] ++
1,209,395 UART: [ldev] CDI.KEYID = 6
1,209,759 UART: [ldev] SUBJECT.KEYID = 5
1,210,186 UART: [ldev] AUTHORITY.KEYID = 7
1,210,649 UART: [ldev] FE.KEYID = 1
1,215,717 UART: [ldev] Erasing FE.KEYID = 1
1,242,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,083 UART: [ldev] --
1,281,526 UART: [fwproc] Wait for Commands...
1,282,331 UART: [fwproc] Recv command 0x46574c44
1,283,064 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,461 UART: ROM Fatal Error: 0x000B0022
1,563,618 >>> mbox cmd response: failed
1,563,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,624 >>> mbox cmd response: failed
1,563,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
87,090 UART: [state] WD Timer not started. Device not locked for debugging
88,387 UART: [kat] SHA2-256
891,937 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,041 UART: [kat] ++
896,193 UART: [kat] sha1
900,341 UART: [kat] SHA2-256
902,281 UART: [kat] SHA2-384
904,946 UART: [kat] SHA2-512-ACC
906,847 UART: [kat] ECC-384
916,626 UART: [kat] HMAC-384Kdf
921,364 UART: [kat] LMS
1,169,676 UART: [kat] --
1,170,635 UART: [cold-reset] ++
1,170,995 UART: [fht] FHT @ 0x50003400
1,173,733 UART: [idev] ++
1,173,901 UART: [idev] CDI.KEYID = 6
1,174,262 UART: [idev] SUBJECT.KEYID = 7
1,174,687 UART: [idev] UDS.KEYID = 0
1,175,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,199,758 UART: [idev] Sha1 KeyId Algorithm
1,208,596 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,137 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,137 UART: [ldev] Erasing FE.KEYID = 1
1,242,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,023 UART: [ldev] --
1,282,238 UART: [fwproc] Wait for Commands...
1,283,007 UART: [fwproc] Recv command 0x46574c44
1,283,740 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,705 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,880 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,195 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,197 >>> mbox cmd response: failed
1,419,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,203 >>> mbox cmd response: failed
1,419,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,810 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,065 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
892,968 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,093 UART: [kat] ++
897,245 UART: [kat] sha1
901,313 UART: [kat] SHA2-256
903,253 UART: [kat] SHA2-384
906,074 UART: [kat] SHA2-512-ACC
907,975 UART: [kat] ECC-384
917,824 UART: [kat] HMAC-384Kdf
922,378 UART: [kat] LMS
1,170,706 UART: [kat] --
1,171,579 UART: [cold-reset] ++
1,172,017 UART: [fht] FHT @ 0x50003400
1,174,786 UART: [idev] ++
1,174,954 UART: [idev] CDI.KEYID = 6
1,175,314 UART: [idev] SUBJECT.KEYID = 7
1,175,738 UART: [idev] UDS.KEYID = 0
1,176,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,270 UART: [idev] Erasing UDS.KEYID = 0
1,200,563 UART: [idev] Sha1 KeyId Algorithm
1,209,061 UART: [idev] --
1,210,233 UART: [ldev] ++
1,210,401 UART: [ldev] CDI.KEYID = 6
1,210,764 UART: [ldev] SUBJECT.KEYID = 5
1,211,190 UART: [ldev] AUTHORITY.KEYID = 7
1,211,653 UART: [ldev] FE.KEYID = 1
1,217,053 UART: [ldev] Erasing FE.KEYID = 1
1,243,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,381 UART: [ldev] --
1,282,706 UART: [fwproc] Wait for Commands...
1,283,444 UART: [fwproc] Recv command 0x46574c44
1,284,172 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,689 UART: ROM Fatal Error: 0x000B0022
1,564,846 >>> mbox cmd response: failed
1,564,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,852 >>> mbox cmd response: failed
1,564,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,858 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
893,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,637 UART: [kat] ++
897,789 UART: [kat] sha1
902,069 UART: [kat] SHA2-256
904,009 UART: [kat] SHA2-384
906,886 UART: [kat] SHA2-512-ACC
908,787 UART: [kat] ECC-384
918,546 UART: [kat] HMAC-384Kdf
923,126 UART: [kat] LMS
1,171,454 UART: [kat] --
1,172,347 UART: [cold-reset] ++
1,172,887 UART: [fht] FHT @ 0x50003400
1,175,608 UART: [idev] ++
1,175,776 UART: [idev] CDI.KEYID = 6
1,176,136 UART: [idev] SUBJECT.KEYID = 7
1,176,560 UART: [idev] UDS.KEYID = 0
1,176,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,712 UART: [idev] Erasing UDS.KEYID = 0
1,201,623 UART: [idev] Sha1 KeyId Algorithm
1,210,153 UART: [idev] --
1,211,135 UART: [ldev] ++
1,211,303 UART: [ldev] CDI.KEYID = 6
1,211,666 UART: [ldev] SUBJECT.KEYID = 5
1,212,092 UART: [ldev] AUTHORITY.KEYID = 7
1,212,555 UART: [ldev] FE.KEYID = 1
1,217,639 UART: [ldev] Erasing FE.KEYID = 1
1,243,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,437 UART: [ldev] --
1,282,902 UART: [fwproc] Wait for Commands...
1,283,544 UART: [fwproc] Recv command 0x46574c44
1,284,272 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,275 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,445 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,736 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,185 >>> mbox cmd response: failed
1,419,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,191 >>> mbox cmd response: failed
1,419,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,197 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,313 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
893,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,736 UART: [kat] ++
897,888 UART: [kat] sha1
902,076 UART: [kat] SHA2-256
904,016 UART: [kat] SHA2-384
906,875 UART: [kat] SHA2-512-ACC
908,776 UART: [kat] ECC-384
918,849 UART: [kat] HMAC-384Kdf
923,621 UART: [kat] LMS
1,171,949 UART: [kat] --
1,172,844 UART: [cold-reset] ++
1,173,408 UART: [fht] FHT @ 0x50003400
1,175,857 UART: [idev] ++
1,176,025 UART: [idev] CDI.KEYID = 6
1,176,385 UART: [idev] SUBJECT.KEYID = 7
1,176,809 UART: [idev] UDS.KEYID = 0
1,177,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,673 UART: [idev] Erasing UDS.KEYID = 0
1,201,548 UART: [idev] Sha1 KeyId Algorithm
1,210,058 UART: [idev] --
1,210,964 UART: [ldev] ++
1,211,132 UART: [ldev] CDI.KEYID = 6
1,211,495 UART: [ldev] SUBJECT.KEYID = 5
1,211,921 UART: [ldev] AUTHORITY.KEYID = 7
1,212,384 UART: [ldev] FE.KEYID = 1
1,217,372 UART: [ldev] Erasing FE.KEYID = 1
1,243,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,854 UART: [ldev] --
1,283,297 UART: [fwproc] Wait for Commands...
1,283,969 UART: [fwproc] Recv command 0x46574c44
1,284,697 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,238 UART: ROM Fatal Error: 0x000B0022
1,564,395 >>> mbox cmd response: failed
1,564,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,401 >>> mbox cmd response: failed
1,564,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,407 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,296 UART: [state] WD Timer not started. Device not locked for debugging
87,423 UART: [kat] SHA2-256
893,073 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,198 UART: [kat] ++
897,350 UART: [kat] sha1
901,654 UART: [kat] SHA2-256
903,594 UART: [kat] SHA2-384
906,409 UART: [kat] SHA2-512-ACC
908,310 UART: [kat] ECC-384
918,363 UART: [kat] HMAC-384Kdf
923,045 UART: [kat] LMS
1,171,373 UART: [kat] --
1,172,112 UART: [cold-reset] ++
1,172,444 UART: [fht] FHT @ 0x50003400
1,175,231 UART: [idev] ++
1,175,399 UART: [idev] CDI.KEYID = 6
1,175,759 UART: [idev] SUBJECT.KEYID = 7
1,176,183 UART: [idev] UDS.KEYID = 0
1,176,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,503 UART: [idev] Erasing UDS.KEYID = 0
1,201,716 UART: [idev] Sha1 KeyId Algorithm
1,210,116 UART: [idev] --
1,211,004 UART: [ldev] ++
1,211,172 UART: [ldev] CDI.KEYID = 6
1,211,535 UART: [ldev] SUBJECT.KEYID = 5
1,211,961 UART: [ldev] AUTHORITY.KEYID = 7
1,212,424 UART: [ldev] FE.KEYID = 1
1,217,754 UART: [ldev] Erasing FE.KEYID = 1
1,243,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,264 UART: [ldev] --
1,283,693 UART: [fwproc] Wait for Commands...
1,284,395 UART: [fwproc] Recv command 0x46574c44
1,285,123 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,728 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,898 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,151 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,440 >>> mbox cmd response: failed
1,419,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,446 >>> mbox cmd response: failed
1,419,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,452 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,998 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,221 UART:
192,572 UART: Running Caliptra ROM ...
193,753 UART:
193,908 UART: [state] CFI Enabled
262,694 UART: [state] LifecycleState = Unprovisioned
264,625 UART: [state] DebugLocked = No
266,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,419 UART: [kat] SHA2-256
441,105 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,592 UART: [kat] ++
452,133 UART: [kat] sha1
463,396 UART: [kat] SHA2-256
466,084 UART: [kat] SHA2-384
472,404 UART: [kat] SHA2-512-ACC
474,783 UART: [kat] ECC-384
2,766,251 UART: [kat] HMAC-384Kdf
2,796,514 UART: [kat] LMS
3,986,794 UART: [kat] --
3,991,754 UART: [cold-reset] ++
3,993,997 UART: [fht] Storing FHT @ 0x50003400
4,007,062 UART: [idev] ++
4,007,646 UART: [idev] CDI.KEYID = 6
4,008,563 UART: [idev] SUBJECT.KEYID = 7
4,009,844 UART: [idev] UDS.KEYID = 0
4,012,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,285 UART: [idev] Erasing UDS.KEYID = 0
7,341,551 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,964 UART: [idev] --
7,367,471 UART: [ldev] ++
7,368,058 UART: [ldev] CDI.KEYID = 6
7,368,976 UART: [ldev] SUBJECT.KEYID = 5
7,370,201 UART: [ldev] AUTHORITY.KEYID = 7
7,371,439 UART: [ldev] FE.KEYID = 1
7,399,536 UART: [ldev] Erasing FE.KEYID = 1
10,732,351 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,259 UART: [ldev] --
13,110,676 UART: [fwproc] Waiting for Commands...
13,113,598 UART: [fwproc] Received command 0x46574c44
13,115,809 UART: [fwproc] Received Image of size 118548 bytes
15,818,178 UART: ROM Fatal Error: 0x000B003E
15,821,640 >>> mbox cmd response: failed
15,822,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,822,432 >>> mbox cmd response: failed
15,822,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,823,008 >>> mbox cmd response: failed
Initializing fuses
2,056,726 writing to cptra_bootfsm_go
2,246,017 UART:
2,246,365 UART: Running Caliptra ROM ...
2,247,521 UART:
2,247,693 UART: [state] CFI Enabled
2,309,408 UART: [state] LifecycleState = Unprovisioned
2,311,311 UART: [state] DebugLocked = No
2,313,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,767 UART: [kat] SHA2-256
2,487,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,497,999 UART: [kat] ++
2,498,554 UART: [kat] sha1
2,508,325 UART: [kat] SHA2-256
2,511,016 UART: [kat] SHA2-384
2,516,952 UART: [kat] SHA2-512-ACC
2,519,307 UART: [kat] ECC-384
4,814,193 UART: [kat] HMAC-384Kdf
4,846,670 UART: [kat] LMS
6,036,998 UART: [kat] --
6,040,902 UART: [cold-reset] ++
6,041,875 UART: [fht] Storing FHT @ 0x50003400
6,054,573 UART: [idev] ++
6,055,143 UART: [idev] CDI.KEYID = 6
6,056,131 UART: [idev] SUBJECT.KEYID = 7
6,057,347 UART: [idev] UDS.KEYID = 0
6,059,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,209,393 UART: [idev] Erasing UDS.KEYID = 0
9,395,677 UART: [idev] Using Sha1 for KeyId Algorithm
9,417,221 UART: [idev] --
9,421,114 UART: [ldev] ++
9,421,686 UART: [ldev] CDI.KEYID = 6
9,422,661 UART: [ldev] SUBJECT.KEYID = 5
9,423,871 UART: [ldev] AUTHORITY.KEYID = 7
9,425,061 UART: [ldev] FE.KEYID = 1
9,471,686 UART: [ldev] Erasing FE.KEYID = 1
12,801,411 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,096,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,110,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,125,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,140,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,157,697 UART: [ldev] --
15,163,132 UART: [fwproc] Waiting for Commands...
15,166,370 UART: [fwproc] Received command 0x46574c44
15,168,562 UART: [fwproc] Received Image of size 118548 bytes
19,271,782 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,349,393 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,422,587 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,751,859 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,808,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,587,911 >>> mbox cmd response: failed
15,588,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,588,915 >>> mbox cmd response: failed
15,589,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,589,482 >>> mbox cmd response: failed
Initializing fuses
2,057,963 writing to cptra_bootfsm_go
5,834,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,985,188 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
192,602 UART:
192,959 UART: Running Caliptra ROM ...
194,170 UART:
603,689 UART: [state] CFI Enabled
618,667 UART: [state] LifecycleState = Unprovisioned
620,592 UART: [state] DebugLocked = No
622,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,019 UART: [kat] SHA2-256
797,767 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,312 UART: [kat] ++
808,768 UART: [kat] sha1
819,539 UART: [kat] SHA2-256
822,283 UART: [kat] SHA2-384
828,212 UART: [kat] SHA2-512-ACC
830,575 UART: [kat] ECC-384
3,113,837 UART: [kat] HMAC-384Kdf
3,125,993 UART: [kat] LMS
4,316,091 UART: [kat] --
4,320,535 UART: [cold-reset] ++
4,322,106 UART: [fht] Storing FHT @ 0x50003400
4,333,866 UART: [idev] ++
4,334,440 UART: [idev] CDI.KEYID = 6
4,335,388 UART: [idev] SUBJECT.KEYID = 7
4,336,674 UART: [idev] UDS.KEYID = 0
4,339,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,733 UART: [idev] Erasing UDS.KEYID = 0
7,628,343 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,300 UART: [idev] --
7,653,249 UART: [ldev] ++
7,653,829 UART: [ldev] CDI.KEYID = 6
7,654,933 UART: [ldev] SUBJECT.KEYID = 5
7,655,999 UART: [ldev] AUTHORITY.KEYID = 7
7,657,249 UART: [ldev] FE.KEYID = 1
7,667,342 UART: [ldev] Erasing FE.KEYID = 1
10,952,353 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,129 UART: [ldev] --
13,313,861 UART: [fwproc] Waiting for Commands...
13,316,939 UART: [fwproc] Received command 0x46574c44
13,319,138 UART: [fwproc] Received Image of size 118548 bytes
16,026,668 UART: ROM Fatal Error: 0x000B003E
16,030,137 >>> mbox cmd response: failed
16,030,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,030,934 >>> mbox cmd response: failed
16,031,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,031,510 >>> mbox cmd response: failed
Initializing fuses
2,057,782 writing to cptra_bootfsm_go
2,247,099 UART:
2,247,444 UART: Running Caliptra ROM ...
2,248,594 UART:
4,426,421 UART: [state] CFI Enabled
4,440,951 UART: [state] LifecycleState = Unprovisioned
4,442,884 UART: [state] DebugLocked = No
4,444,180 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,448,435 UART: [kat] SHA2-256
4,618,220 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,628,744 UART: [kat] ++
4,629,208 UART: [kat] sha1
4,639,243 UART: [kat] SHA2-256
4,641,941 UART: [kat] SHA2-384
4,647,893 UART: [kat] SHA2-512-ACC
4,650,254 UART: [kat] ECC-384
6,932,127 UART: [kat] HMAC-384Kdf
6,943,881 UART: [kat] LMS
8,133,969 UART: [kat] --
8,139,769 UART: [cold-reset] ++
8,142,254 UART: [fht] Storing FHT @ 0x50003400
8,154,346 UART: [idev] ++
8,154,974 UART: [idev] CDI.KEYID = 6
8,155,895 UART: [idev] SUBJECT.KEYID = 7
8,157,116 UART: [idev] UDS.KEYID = 0
8,159,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,308,527 UART: [idev] Erasing UDS.KEYID = 0
11,446,667 UART: [idev] Using Sha1 for KeyId Algorithm
11,469,465 UART: [idev] --
11,473,237 UART: [ldev] ++
11,473,822 UART: [ldev] CDI.KEYID = 6
11,474,737 UART: [ldev] SUBJECT.KEYID = 5
11,476,000 UART: [ldev] AUTHORITY.KEYID = 7
11,477,245 UART: [ldev] FE.KEYID = 1
11,486,927 UART: [ldev] Erasing FE.KEYID = 1
14,776,598 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,071,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,085,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,100,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,115,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,134,390 UART: [ldev] --
17,139,283 UART: [fwproc] Waiting for Commands...
17,142,553 UART: [fwproc] Received command 0x46574c44
17,144,790 UART: [fwproc] Received Image of size 118548 bytes
21,246,148 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,322,540 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,395,729 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,724,861 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
4,124,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,756,372 >>> mbox cmd response: failed
15,757,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,757,409 >>> mbox cmd response: failed
15,757,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,757,993 >>> mbox cmd response: failed
Initializing fuses
2,059,885 writing to cptra_bootfsm_go
8,247,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,269,865 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,108 UART:
192,514 UART: Running Caliptra ROM ...
193,648 UART:
193,796 UART: [state] CFI Enabled
262,663 UART: [state] LifecycleState = Unprovisioned
264,586 UART: [state] DebugLocked = No
267,455 UART: [state] WD Timer not started. Device not locked for debugging
271,915 UART: [kat] SHA2-256
451,589 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,369 UART: [kat] ++
462,827 UART: [kat] sha1
474,351 UART: [kat] SHA2-256
477,044 UART: [kat] SHA2-384
482,226 UART: [kat] SHA2-512-ACC
484,626 UART: [kat] ECC-384
2,944,709 UART: [kat] HMAC-384Kdf
2,970,492 UART: [kat] LMS
3,446,997 UART: [kat] --
3,451,586 UART: [cold-reset] ++
3,452,822 UART: [fht] FHT @ 0x50003400
3,464,644 UART: [idev] ++
3,465,266 UART: [idev] CDI.KEYID = 6
3,466,162 UART: [idev] SUBJECT.KEYID = 7
3,467,384 UART: [idev] UDS.KEYID = 0
3,469,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,369 UART: [idev] Erasing UDS.KEYID = 0
5,985,814 UART: [idev] Sha1 KeyId Algorithm
6,009,210 UART: [idev] --
6,015,568 UART: [ldev] ++
6,016,213 UART: [ldev] CDI.KEYID = 6
6,017,111 UART: [ldev] SUBJECT.KEYID = 5
6,018,232 UART: [ldev] AUTHORITY.KEYID = 7
6,019,534 UART: [ldev] FE.KEYID = 1
6,056,547 UART: [ldev] Erasing FE.KEYID = 1
8,564,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,482 UART: [ldev] --
10,374,461 UART: [fwproc] Wait for Commands...
10,376,075 UART: [fwproc] Recv command 0x46574c44
10,378,076 UART: [fwproc] Recv'd Img size: 118548 bytes
12,443,486 UART: ROM Fatal Error: 0x000B003E
12,446,734 >>> mbox cmd response: failed
12,447,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,447,533 >>> mbox cmd response: failed
12,447,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,448,153 >>> mbox cmd response: failed
Initializing fuses
2,060,639 writing to cptra_bootfsm_go
2,249,983 UART:
2,250,359 UART: Running Caliptra ROM ...
2,251,503 UART:
2,251,678 UART: [state] CFI Enabled
2,318,840 UART: [state] LifecycleState = Unprovisioned
2,320,784 UART: [state] DebugLocked = No
2,323,159 UART: [state] WD Timer not started. Device not locked for debugging
2,326,918 UART: [kat] SHA2-256
2,506,604 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,517,370 UART: [kat] ++
2,517,864 UART: [kat] sha1
2,527,517 UART: [kat] SHA2-256
2,530,220 UART: [kat] SHA2-384
2,535,254 UART: [kat] SHA2-512-ACC
2,537,620 UART: [kat] ECC-384
4,981,200 UART: [kat] HMAC-384Kdf
5,005,604 UART: [kat] LMS
5,482,085 UART: [kat] --
5,487,912 UART: [cold-reset] ++
5,490,257 UART: [fht] FHT @ 0x50003400
5,501,525 UART: [idev] ++
5,502,155 UART: [idev] CDI.KEYID = 6
5,503,068 UART: [idev] SUBJECT.KEYID = 7
5,504,311 UART: [idev] UDS.KEYID = 0
5,506,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,655,876 UART: [idev] Erasing UDS.KEYID = 0
8,023,109 UART: [idev] Sha1 KeyId Algorithm
8,047,158 UART: [idev] --
8,051,752 UART: [ldev] ++
8,052,349 UART: [ldev] CDI.KEYID = 6
8,053,272 UART: [ldev] SUBJECT.KEYID = 5
8,054,498 UART: [ldev] AUTHORITY.KEYID = 7
8,055,742 UART: [ldev] FE.KEYID = 1
8,092,268 UART: [ldev] Erasing FE.KEYID = 1
10,599,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,335,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,351,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,367,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,382,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,403,489 UART: [ldev] --
12,408,547 UART: [fwproc] Wait for Commands...
12,410,270 UART: [fwproc] Recv command 0x46574c44
12,412,274 UART: [fwproc] Recv'd Img size: 118548 bytes
15,898,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,979,922 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,052,949 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,381,828 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,463,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,352,555 >>> mbox cmd response: failed
12,353,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,353,507 >>> mbox cmd response: failed
12,353,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,354,136 >>> mbox cmd response: failed
Initializing fuses
2,061,226 writing to cptra_bootfsm_go
5,504,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,290,790 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
192,527 UART:
192,910 UART: Running Caliptra ROM ...
194,056 UART:
603,520 UART: [state] CFI Enabled
621,089 UART: [state] LifecycleState = Unprovisioned
622,990 UART: [state] DebugLocked = No
625,532 UART: [state] WD Timer not started. Device not locked for debugging
628,904 UART: [kat] SHA2-256
808,574 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,347 UART: [kat] ++
819,800 UART: [kat] sha1
831,166 UART: [kat] SHA2-256
833,825 UART: [kat] SHA2-384
839,704 UART: [kat] SHA2-512-ACC
842,109 UART: [kat] ECC-384
3,283,872 UART: [kat] HMAC-384Kdf
3,295,147 UART: [kat] LMS
3,771,676 UART: [kat] --
3,777,021 UART: [cold-reset] ++
3,778,532 UART: [fht] FHT @ 0x50003400
3,789,843 UART: [idev] ++
3,790,450 UART: [idev] CDI.KEYID = 6
3,791,423 UART: [idev] SUBJECT.KEYID = 7
3,792,643 UART: [idev] UDS.KEYID = 0
3,795,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,227 UART: [idev] Erasing UDS.KEYID = 0
6,269,731 UART: [idev] Sha1 KeyId Algorithm
6,293,291 UART: [idev] --
6,299,072 UART: [ldev] ++
6,299,649 UART: [ldev] CDI.KEYID = 6
6,300,595 UART: [ldev] SUBJECT.KEYID = 5
6,301,813 UART: [ldev] AUTHORITY.KEYID = 7
6,303,047 UART: [ldev] FE.KEYID = 1
6,315,751 UART: [ldev] Erasing FE.KEYID = 1
8,798,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,618 UART: [ldev] --
10,591,915 UART: [fwproc] Wait for Commands...
10,593,491 UART: [fwproc] Recv command 0x46574c44
10,595,486 UART: [fwproc] Recv'd Img size: 118548 bytes
12,664,630 UART: ROM Fatal Error: 0x000B003E
12,667,868 >>> mbox cmd response: failed
12,668,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,668,613 >>> mbox cmd response: failed
12,668,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,669,174 >>> mbox cmd response: failed
Initializing fuses
2,067,011 writing to cptra_bootfsm_go
2,256,291 UART:
2,256,651 UART: Running Caliptra ROM ...
2,257,701 UART:
7,785,998 UART: [state] CFI Enabled
7,798,081 UART: [state] LifecycleState = Unprovisioned
7,800,002 UART: [state] DebugLocked = No
7,801,806 UART: [state] WD Timer not started. Device not locked for debugging
7,806,094 UART: [kat] SHA2-256
7,985,737 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,996,514 UART: [kat] ++
7,996,979 UART: [kat] sha1
8,006,682 UART: [kat] SHA2-256
8,009,381 UART: [kat] SHA2-384
8,014,460 UART: [kat] SHA2-512-ACC
8,016,816 UART: [kat] ECC-384
10,457,187 UART: [kat] HMAC-384Kdf
10,468,983 UART: [kat] LMS
10,945,485 UART: [kat] --
10,950,509 UART: [cold-reset] ++
10,952,192 UART: [fht] FHT @ 0x50003400
10,964,322 UART: [idev] ++
10,964,950 UART: [idev] CDI.KEYID = 6
10,965,858 UART: [idev] SUBJECT.KEYID = 7
10,967,127 UART: [idev] UDS.KEYID = 0
10,969,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,118,397 UART: [idev] Erasing UDS.KEYID = 0
13,438,677 UART: [idev] Sha1 KeyId Algorithm
13,463,479 UART: [idev] --
13,468,773 UART: [ldev] ++
13,469,398 UART: [ldev] CDI.KEYID = 6
13,470,451 UART: [ldev] SUBJECT.KEYID = 5
13,471,557 UART: [ldev] AUTHORITY.KEYID = 7
13,472,728 UART: [ldev] FE.KEYID = 1
13,486,427 UART: [ldev] Erasing FE.KEYID = 1
15,967,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,688,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,703,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,719,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,735,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,758,014 UART: [ldev] --
17,762,596 UART: [fwproc] Wait for Commands...
17,765,193 UART: [fwproc] Recv command 0x46574c44
17,767,182 UART: [fwproc] Recv'd Img size: 118548 bytes
21,251,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,329,932 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,402,952 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,731,653 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
3,784,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,540,348 >>> mbox cmd response: failed
12,541,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,541,750 >>> mbox cmd response: failed
12,542,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,542,326 >>> mbox cmd response: failed
Initializing fuses
2,062,048 writing to cptra_bootfsm_go
11,096,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,763,126 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,169 UART:
192,531 UART: Running Caliptra ROM ...
193,674 UART:
193,846 UART: [state] CFI Enabled
264,774 UART: [state] LifecycleState = Unprovisioned
266,836 UART: [state] DebugLocked = No
269,199 UART: [state] WD Timer not started. Device not locked for debugging
274,558 UART: [kat] SHA2-256
464,463 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,243 UART: [kat] ++
475,784 UART: [kat] sha1
487,323 UART: [kat] SHA2-256
490,331 UART: [kat] SHA2-384
495,994 UART: [kat] SHA2-512-ACC
498,612 UART: [kat] ECC-384
2,946,574 UART: [kat] HMAC-384Kdf
2,971,606 UART: [kat] LMS
3,503,345 UART: [kat] --
3,506,690 UART: [cold-reset] ++
3,508,967 UART: [fht] FHT @ 0x50003400
3,520,768 UART: [idev] ++
3,521,459 UART: [idev] CDI.KEYID = 6
3,522,346 UART: [idev] SUBJECT.KEYID = 7
3,523,619 UART: [idev] UDS.KEYID = 0
3,526,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,692 UART: [idev] Erasing UDS.KEYID = 0
6,031,178 UART: [idev] Sha1 KeyId Algorithm
6,053,281 UART: [idev] --
6,059,645 UART: [ldev] ++
6,060,349 UART: [ldev] CDI.KEYID = 6
6,061,271 UART: [ldev] SUBJECT.KEYID = 5
6,062,438 UART: [ldev] AUTHORITY.KEYID = 7
6,063,625 UART: [ldev] FE.KEYID = 1
6,101,993 UART: [ldev] Erasing FE.KEYID = 1
8,608,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,103 UART: [ldev] --
10,414,378 UART: [fwproc] Wait for Commands...
10,416,961 UART: [fwproc] Recv command 0x46574c44
10,419,237 UART: [fwproc] Recv'd Img size: 118548 bytes
12,505,207 UART: ROM Fatal Error: 0x000B003E
12,508,881 >>> mbox cmd response: failed
12,509,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,509,585 >>> mbox cmd response: failed
12,509,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,156 >>> mbox cmd response: failed
Initializing fuses
2,068,770 writing to cptra_bootfsm_go
2,258,084 UART:
2,258,451 UART: Running Caliptra ROM ...
2,259,541 UART:
2,259,705 UART: [state] CFI Enabled
2,325,667 UART: [state] LifecycleState = Unprovisioned
2,328,010 UART: [state] DebugLocked = No
2,329,418 UART: [state] WD Timer not started. Device not locked for debugging
2,333,214 UART: [kat] SHA2-256
2,523,093 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,533,897 UART: [kat] ++
2,534,379 UART: [kat] sha1
2,546,838 UART: [kat] SHA2-256
2,549,873 UART: [kat] SHA2-384
2,555,658 UART: [kat] SHA2-512-ACC
2,558,201 UART: [kat] ECC-384
5,007,824 UART: [kat] HMAC-384Kdf
5,032,551 UART: [kat] LMS
5,564,341 UART: [kat] --
5,569,092 UART: [cold-reset] ++
5,571,090 UART: [fht] FHT @ 0x50003400
5,582,791 UART: [idev] ++
5,583,479 UART: [idev] CDI.KEYID = 6
5,584,451 UART: [idev] SUBJECT.KEYID = 7
5,585,672 UART: [idev] UDS.KEYID = 0
5,588,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,737,249 UART: [idev] Erasing UDS.KEYID = 0
8,087,537 UART: [idev] Sha1 KeyId Algorithm
8,110,109 UART: [idev] --
8,114,651 UART: [ldev] ++
8,115,338 UART: [ldev] CDI.KEYID = 6
8,116,272 UART: [ldev] SUBJECT.KEYID = 5
8,117,444 UART: [ldev] AUTHORITY.KEYID = 7
8,118,625 UART: [ldev] FE.KEYID = 1
8,161,575 UART: [ldev] Erasing FE.KEYID = 1
10,671,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,403,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,418,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,433,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,448,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,469,118 UART: [ldev] --
12,475,359 UART: [fwproc] Wait for Commands...
12,477,353 UART: [fwproc] Recv command 0x46574c44
12,479,617 UART: [fwproc] Recv'd Img size: 118548 bytes
15,976,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,048,251 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,171,901 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,732,737 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,442,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,310,502 >>> mbox cmd response: failed
12,311,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,311,427 >>> mbox cmd response: failed
12,311,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,312,059 >>> mbox cmd response: failed
Initializing fuses
2,063,009 writing to cptra_bootfsm_go
5,483,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,857,622 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,508 UART:
192,881 UART: Running Caliptra ROM ...
194,082 UART:
603,879 UART: [state] CFI Enabled
616,997 UART: [state] LifecycleState = Unprovisioned
619,389 UART: [state] DebugLocked = No
622,067 UART: [state] WD Timer not started. Device not locked for debugging
626,873 UART: [kat] SHA2-256
816,755 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,540 UART: [kat] ++
828,134 UART: [kat] sha1
839,891 UART: [kat] SHA2-256
842,926 UART: [kat] SHA2-384
847,512 UART: [kat] SHA2-512-ACC
850,077 UART: [kat] ECC-384
3,292,480 UART: [kat] HMAC-384Kdf
3,305,798 UART: [kat] LMS
3,837,662 UART: [kat] --
3,842,251 UART: [cold-reset] ++
3,843,864 UART: [fht] FHT @ 0x50003400
3,854,472 UART: [idev] ++
3,855,147 UART: [idev] CDI.KEYID = 6
3,856,085 UART: [idev] SUBJECT.KEYID = 7
3,857,303 UART: [idev] UDS.KEYID = 0
3,860,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,115 UART: [idev] Erasing UDS.KEYID = 0
6,335,659 UART: [idev] Sha1 KeyId Algorithm
6,356,745 UART: [idev] --
6,360,979 UART: [ldev] ++
6,361,664 UART: [ldev] CDI.KEYID = 6
6,362,604 UART: [ldev] SUBJECT.KEYID = 5
6,363,772 UART: [ldev] AUTHORITY.KEYID = 7
6,364,952 UART: [ldev] FE.KEYID = 1
6,376,688 UART: [ldev] Erasing FE.KEYID = 1
8,853,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,135 UART: [ldev] --
10,641,746 UART: [fwproc] Wait for Commands...
10,643,689 UART: [fwproc] Recv command 0x46574c44
10,646,014 UART: [fwproc] Recv'd Img size: 118548 bytes
12,726,609 UART: ROM Fatal Error: 0x000B003E
12,730,244 >>> mbox cmd response: failed
12,730,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,731,030 >>> mbox cmd response: failed
12,731,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,731,608 >>> mbox cmd response: failed
Initializing fuses
2,062,236 writing to cptra_bootfsm_go
2,251,518 UART:
2,251,939 UART: Running Caliptra ROM ...
2,252,991 UART:
7,722,320 UART: [state] CFI Enabled
7,737,876 UART: [state] LifecycleState = Unprovisioned
7,740,266 UART: [state] DebugLocked = No
7,743,148 UART: [state] WD Timer not started. Device not locked for debugging
7,747,423 UART: [kat] SHA2-256
7,937,290 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,948,041 UART: [kat] ++
7,948,565 UART: [kat] sha1
7,959,729 UART: [kat] SHA2-256
7,962,752 UART: [kat] SHA2-384
7,969,400 UART: [kat] SHA2-512-ACC
7,972,080 UART: [kat] ECC-384
10,413,584 UART: [kat] HMAC-384Kdf
10,426,739 UART: [kat] LMS
10,958,538 UART: [kat] --
10,964,805 UART: [cold-reset] ++
10,966,579 UART: [fht] FHT @ 0x50003400
10,978,696 UART: [idev] ++
10,979,375 UART: [idev] CDI.KEYID = 6
10,980,343 UART: [idev] SUBJECT.KEYID = 7
10,981,523 UART: [idev] UDS.KEYID = 0
10,983,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,132,936 UART: [idev] Erasing UDS.KEYID = 0
13,460,737 UART: [idev] Sha1 KeyId Algorithm
13,484,093 UART: [idev] --
13,489,877 UART: [ldev] ++
13,490,562 UART: [ldev] CDI.KEYID = 6
13,491,472 UART: [ldev] SUBJECT.KEYID = 5
13,492,791 UART: [ldev] AUTHORITY.KEYID = 7
13,493,925 UART: [ldev] FE.KEYID = 1
13,502,544 UART: [ldev] Erasing FE.KEYID = 1
15,977,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,696,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,711,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,726,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,741,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,762,760 UART: [ldev] --
17,768,795 UART: [fwproc] Wait for Commands...
17,771,113 UART: [fwproc] Recv command 0x46574c44
17,773,435 UART: [fwproc] Recv'd Img size: 118548 bytes
21,269,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,347,945 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,471,578 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,031,261 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
3,758,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,530,773 >>> mbox cmd response: failed
12,531,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,531,799 >>> mbox cmd response: failed
12,532,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,532,382 >>> mbox cmd response: failed
Initializing fuses
2,060,670 writing to cptra_bootfsm_go
11,082,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,370,087 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,495 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,215 UART: [kat] SHA2-256
882,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,261 UART: [kat] ++
886,413 UART: [kat] sha1
890,835 UART: [kat] SHA2-256
892,773 UART: [kat] SHA2-384
895,564 UART: [kat] SHA2-512-ACC
897,465 UART: [kat] ECC-384
903,182 UART: [kat] HMAC-384Kdf
907,822 UART: [kat] LMS
1,476,018 UART: [kat] --
1,476,771 UART: [cold-reset] ++
1,477,325 UART: [fht] Storing FHT @ 0x50003400
1,479,986 UART: [idev] ++
1,480,154 UART: [idev] CDI.KEYID = 6
1,480,514 UART: [idev] SUBJECT.KEYID = 7
1,480,938 UART: [idev] UDS.KEYID = 0
1,481,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,164 UART: [idev] Erasing UDS.KEYID = 0
1,506,060 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,618 UART: [idev] --
1,515,791 UART: [ldev] ++
1,515,959 UART: [ldev] CDI.KEYID = 6
1,516,322 UART: [ldev] SUBJECT.KEYID = 5
1,516,748 UART: [ldev] AUTHORITY.KEYID = 7
1,517,211 UART: [ldev] FE.KEYID = 1
1,522,359 UART: [ldev] Erasing FE.KEYID = 1
1,547,918 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,780 UART: [ldev] --
1,587,125 UART: [fwproc] Waiting for Commands...
1,587,774 UART: [fwproc] Received command 0x46574c44
1,588,565 UART: [fwproc] Received Image of size 118548 bytes
1,636,025 UART: ROM Fatal Error: 0x000B003E
1,637,184 >>> mbox cmd response: failed
1,637,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,190 >>> mbox cmd response: failed
1,637,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,196 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,379 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,873 UART: [kat] SHA2-256
881,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,919 UART: [kat] ++
886,071 UART: [kat] sha1
890,087 UART: [kat] SHA2-256
892,025 UART: [kat] SHA2-384
894,700 UART: [kat] SHA2-512-ACC
896,601 UART: [kat] ECC-384
902,268 UART: [kat] HMAC-384Kdf
906,852 UART: [kat] LMS
1,475,048 UART: [kat] --
1,475,851 UART: [cold-reset] ++
1,476,221 UART: [fht] Storing FHT @ 0x50003400
1,478,880 UART: [idev] ++
1,479,048 UART: [idev] CDI.KEYID = 6
1,479,408 UART: [idev] SUBJECT.KEYID = 7
1,479,832 UART: [idev] UDS.KEYID = 0
1,480,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,128 UART: [idev] Erasing UDS.KEYID = 0
1,504,948 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,664 UART: [idev] --
1,514,777 UART: [ldev] ++
1,514,945 UART: [ldev] CDI.KEYID = 6
1,515,308 UART: [ldev] SUBJECT.KEYID = 5
1,515,734 UART: [ldev] AUTHORITY.KEYID = 7
1,516,197 UART: [ldev] FE.KEYID = 1
1,521,329 UART: [ldev] Erasing FE.KEYID = 1
1,546,252 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,022 UART: [ldev] --
1,585,497 UART: [fwproc] Waiting for Commands...
1,586,366 UART: [fwproc] Received command 0x46574c44
1,587,157 UART: [fwproc] Received Image of size 118548 bytes
2,931,294 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,520 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,738 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,031 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,859 >>> mbox cmd response: failed
1,487,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,865 >>> mbox cmd response: failed
1,487,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,871 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,897 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,406 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,088 UART: [kat] SHA2-256
882,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,134 UART: [kat] ++
886,286 UART: [kat] sha1
890,356 UART: [kat] SHA2-256
892,294 UART: [kat] SHA2-384
895,071 UART: [kat] SHA2-512-ACC
896,972 UART: [kat] ECC-384
902,743 UART: [kat] HMAC-384Kdf
907,259 UART: [kat] LMS
1,475,455 UART: [kat] --
1,476,446 UART: [cold-reset] ++
1,476,794 UART: [fht] Storing FHT @ 0x50003400
1,479,645 UART: [idev] ++
1,479,813 UART: [idev] CDI.KEYID = 6
1,480,173 UART: [idev] SUBJECT.KEYID = 7
1,480,597 UART: [idev] UDS.KEYID = 0
1,480,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,827 UART: [idev] Erasing UDS.KEYID = 0
1,505,455 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,229 UART: [idev] --
1,515,354 UART: [ldev] ++
1,515,522 UART: [ldev] CDI.KEYID = 6
1,515,885 UART: [ldev] SUBJECT.KEYID = 5
1,516,311 UART: [ldev] AUTHORITY.KEYID = 7
1,516,774 UART: [ldev] FE.KEYID = 1
1,522,080 UART: [ldev] Erasing FE.KEYID = 1
1,547,319 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,437 UART: [ldev] --
1,586,888 UART: [fwproc] Waiting for Commands...
1,587,605 UART: [fwproc] Received command 0x46574c44
1,588,396 UART: [fwproc] Received Image of size 118548 bytes
1,636,728 UART: ROM Fatal Error: 0x000B003E
1,637,887 >>> mbox cmd response: failed
1,637,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,893 >>> mbox cmd response: failed
1,637,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,230 UART: [kat] SHA2-256
882,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,276 UART: [kat] ++
886,428 UART: [kat] sha1
890,618 UART: [kat] SHA2-256
892,556 UART: [kat] SHA2-384
895,373 UART: [kat] SHA2-512-ACC
897,274 UART: [kat] ECC-384
902,875 UART: [kat] HMAC-384Kdf
907,465 UART: [kat] LMS
1,475,661 UART: [kat] --
1,476,374 UART: [cold-reset] ++
1,476,918 UART: [fht] Storing FHT @ 0x50003400
1,479,721 UART: [idev] ++
1,479,889 UART: [idev] CDI.KEYID = 6
1,480,249 UART: [idev] SUBJECT.KEYID = 7
1,480,673 UART: [idev] UDS.KEYID = 0
1,481,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,405 UART: [idev] Erasing UDS.KEYID = 0
1,504,979 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,539 UART: [idev] --
1,514,680 UART: [ldev] ++
1,514,848 UART: [ldev] CDI.KEYID = 6
1,515,211 UART: [ldev] SUBJECT.KEYID = 5
1,515,637 UART: [ldev] AUTHORITY.KEYID = 7
1,516,100 UART: [ldev] FE.KEYID = 1
1,521,350 UART: [ldev] Erasing FE.KEYID = 1
1,546,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,867 UART: [ldev] --
1,585,332 UART: [fwproc] Waiting for Commands...
1,586,095 UART: [fwproc] Received command 0x46574c44
1,586,886 UART: [fwproc] Received Image of size 118548 bytes
2,931,797 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,005 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,223 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,518 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,472 >>> mbox cmd response: failed
1,488,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,478 >>> mbox cmd response: failed
1,488,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,484 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,634 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
88,052 UART: [kat] SHA2-256
891,602 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
904,877 UART: [kat] SHA2-512-ACC
906,778 UART: [kat] ECC-384
916,517 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,568 UART: [fht] FHT @ 0x50003400
1,173,204 UART: [idev] ++
1,173,372 UART: [idev] CDI.KEYID = 6
1,173,733 UART: [idev] SUBJECT.KEYID = 7
1,174,158 UART: [idev] UDS.KEYID = 0
1,174,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,735 UART: [idev] Erasing UDS.KEYID = 0
1,199,587 UART: [idev] Sha1 KeyId Algorithm
1,208,555 UART: [idev] --
1,209,690 UART: [ldev] ++
1,209,858 UART: [ldev] CDI.KEYID = 6
1,210,222 UART: [ldev] SUBJECT.KEYID = 5
1,210,649 UART: [ldev] AUTHORITY.KEYID = 7
1,211,112 UART: [ldev] FE.KEYID = 1
1,216,262 UART: [ldev] Erasing FE.KEYID = 1
1,242,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,490 UART: [ldev] --
1,281,753 UART: [fwproc] Wait for Commands...
1,282,478 UART: [fwproc] Recv command 0x46574c44
1,283,211 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,101 UART: ROM Fatal Error: 0x000B003E
1,332,260 >>> mbox cmd response: failed
1,332,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,266 >>> mbox cmd response: failed
1,332,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,680 UART: [kat] SHA2-256
901,620 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
916,077 UART: [kat] HMAC-384Kdf
920,597 UART: [kat] LMS
1,168,909 UART: [kat] --
1,169,484 UART: [cold-reset] ++
1,169,906 UART: [fht] FHT @ 0x50003400
1,172,578 UART: [idev] ++
1,172,746 UART: [idev] CDI.KEYID = 6
1,173,107 UART: [idev] SUBJECT.KEYID = 7
1,173,532 UART: [idev] UDS.KEYID = 0
1,173,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,629 UART: [idev] Erasing UDS.KEYID = 0
1,198,465 UART: [idev] Sha1 KeyId Algorithm
1,207,351 UART: [idev] --
1,208,462 UART: [ldev] ++
1,208,630 UART: [ldev] CDI.KEYID = 6
1,208,994 UART: [ldev] SUBJECT.KEYID = 5
1,209,421 UART: [ldev] AUTHORITY.KEYID = 7
1,209,884 UART: [ldev] FE.KEYID = 1
1,214,842 UART: [ldev] Erasing FE.KEYID = 1
1,241,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,214 UART: [ldev] --
1,280,439 UART: [fwproc] Wait for Commands...
1,281,128 UART: [fwproc] Recv command 0x46574c44
1,281,861 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,792 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,967 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,208 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,893 >>> mbox cmd response: failed
1,185,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,899 >>> mbox cmd response: failed
1,185,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,905 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,333 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,128 UART: [kat] SHA2-512-ACC
906,029 UART: [kat] ECC-384
915,824 UART: [kat] HMAC-384Kdf
920,504 UART: [kat] LMS
1,168,816 UART: [kat] --
1,169,713 UART: [cold-reset] ++
1,170,043 UART: [fht] FHT @ 0x50003400
1,172,529 UART: [idev] ++
1,172,697 UART: [idev] CDI.KEYID = 6
1,173,058 UART: [idev] SUBJECT.KEYID = 7
1,173,483 UART: [idev] UDS.KEYID = 0
1,173,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,764 UART: [idev] Erasing UDS.KEYID = 0
1,198,244 UART: [idev] Sha1 KeyId Algorithm
1,207,248 UART: [idev] --
1,208,193 UART: [ldev] ++
1,208,361 UART: [ldev] CDI.KEYID = 6
1,208,725 UART: [ldev] SUBJECT.KEYID = 5
1,209,152 UART: [ldev] AUTHORITY.KEYID = 7
1,209,615 UART: [ldev] FE.KEYID = 1
1,214,629 UART: [ldev] Erasing FE.KEYID = 1
1,241,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,525 UART: [ldev] --
1,280,950 UART: [fwproc] Wait for Commands...
1,281,529 UART: [fwproc] Recv command 0x46574c44
1,282,262 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,180 UART: ROM Fatal Error: 0x000B003E
1,330,339 >>> mbox cmd response: failed
1,330,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,345 >>> mbox cmd response: failed
1,330,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,569 UART: [kat] ++
895,721 UART: [kat] sha1
899,781 UART: [kat] SHA2-256
901,721 UART: [kat] SHA2-384
904,286 UART: [kat] SHA2-512-ACC
906,187 UART: [kat] ECC-384
915,932 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,169,957 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,173,103 UART: [idev] ++
1,173,271 UART: [idev] CDI.KEYID = 6
1,173,632 UART: [idev] SUBJECT.KEYID = 7
1,174,057 UART: [idev] UDS.KEYID = 0
1,174,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,190 UART: [idev] Erasing UDS.KEYID = 0
1,199,330 UART: [idev] Sha1 KeyId Algorithm
1,208,138 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,215,733 UART: [ldev] Erasing FE.KEYID = 1
1,242,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,149 UART: [ldev] --
1,281,368 UART: [fwproc] Wait for Commands...
1,281,947 UART: [fwproc] Recv command 0x46574c44
1,282,680 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,657 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,832 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,161 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,030 >>> mbox cmd response: failed
1,187,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,036 >>> mbox cmd response: failed
1,187,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,042 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,134 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
893,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,303 UART: [kat] ++
897,455 UART: [kat] sha1
901,613 UART: [kat] SHA2-256
903,553 UART: [kat] SHA2-384
906,218 UART: [kat] SHA2-512-ACC
908,119 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,632 UART: [kat] LMS
1,170,960 UART: [kat] --
1,171,747 UART: [cold-reset] ++
1,172,079 UART: [fht] FHT @ 0x50003400
1,174,554 UART: [idev] ++
1,174,722 UART: [idev] CDI.KEYID = 6
1,175,082 UART: [idev] SUBJECT.KEYID = 7
1,175,506 UART: [idev] UDS.KEYID = 0
1,175,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,199,149 UART: [idev] Sha1 KeyId Algorithm
1,207,435 UART: [idev] --
1,208,597 UART: [ldev] ++
1,208,765 UART: [ldev] CDI.KEYID = 6
1,209,128 UART: [ldev] SUBJECT.KEYID = 5
1,209,554 UART: [ldev] AUTHORITY.KEYID = 7
1,210,017 UART: [ldev] FE.KEYID = 1
1,214,933 UART: [ldev] Erasing FE.KEYID = 1
1,240,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,757 UART: [ldev] --
1,280,044 UART: [fwproc] Wait for Commands...
1,280,824 UART: [fwproc] Recv command 0x46574c44
1,281,552 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,008 UART: ROM Fatal Error: 0x000B003E
1,330,167 >>> mbox cmd response: failed
1,330,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,173 >>> mbox cmd response: failed
1,330,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,179 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,564 UART: [state] LifecycleState = Unprovisioned
85,219 UART: [state] DebugLocked = No
85,829 UART: [state] WD Timer not started. Device not locked for debugging
87,104 UART: [kat] SHA2-256
892,754 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,879 UART: [kat] ++
897,031 UART: [kat] sha1
901,211 UART: [kat] SHA2-256
903,151 UART: [kat] SHA2-384
905,748 UART: [kat] SHA2-512-ACC
907,649 UART: [kat] ECC-384
917,374 UART: [kat] HMAC-384Kdf
921,836 UART: [kat] LMS
1,170,164 UART: [kat] --
1,171,291 UART: [cold-reset] ++
1,171,803 UART: [fht] FHT @ 0x50003400
1,174,506 UART: [idev] ++
1,174,674 UART: [idev] CDI.KEYID = 6
1,175,034 UART: [idev] SUBJECT.KEYID = 7
1,175,458 UART: [idev] UDS.KEYID = 0
1,175,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,748 UART: [idev] Erasing UDS.KEYID = 0
1,200,693 UART: [idev] Sha1 KeyId Algorithm
1,209,149 UART: [idev] --
1,210,411 UART: [ldev] ++
1,210,579 UART: [ldev] CDI.KEYID = 6
1,210,942 UART: [ldev] SUBJECT.KEYID = 5
1,211,368 UART: [ldev] AUTHORITY.KEYID = 7
1,211,831 UART: [ldev] FE.KEYID = 1
1,217,063 UART: [ldev] Erasing FE.KEYID = 1
1,243,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,527 UART: [ldev] --
1,282,984 UART: [fwproc] Wait for Commands...
1,283,724 UART: [fwproc] Recv command 0x46574c44
1,284,452 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,814 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,984 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,377 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,894 >>> mbox cmd response: failed
1,186,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,900 >>> mbox cmd response: failed
1,186,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,906 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,723 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
893,293 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,418 UART: [kat] ++
897,570 UART: [kat] sha1
901,838 UART: [kat] SHA2-256
903,778 UART: [kat] SHA2-384
906,381 UART: [kat] SHA2-512-ACC
908,282 UART: [kat] ECC-384
918,247 UART: [kat] HMAC-384Kdf
922,929 UART: [kat] LMS
1,171,257 UART: [kat] --
1,171,996 UART: [cold-reset] ++
1,172,484 UART: [fht] FHT @ 0x50003400
1,175,271 UART: [idev] ++
1,175,439 UART: [idev] CDI.KEYID = 6
1,175,799 UART: [idev] SUBJECT.KEYID = 7
1,176,223 UART: [idev] UDS.KEYID = 0
1,176,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,593 UART: [idev] Erasing UDS.KEYID = 0
1,201,446 UART: [idev] Sha1 KeyId Algorithm
1,209,782 UART: [idev] --
1,210,920 UART: [ldev] ++
1,211,088 UART: [ldev] CDI.KEYID = 6
1,211,451 UART: [ldev] SUBJECT.KEYID = 5
1,211,877 UART: [ldev] AUTHORITY.KEYID = 7
1,212,340 UART: [ldev] FE.KEYID = 1
1,217,698 UART: [ldev] Erasing FE.KEYID = 1
1,244,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,232 UART: [ldev] --
1,283,713 UART: [fwproc] Wait for Commands...
1,284,467 UART: [fwproc] Recv command 0x46574c44
1,285,195 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,127 UART: ROM Fatal Error: 0x000B003E
1,333,286 >>> mbox cmd response: failed
1,333,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,292 >>> mbox cmd response: failed
1,333,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,298 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
893,687 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,812 UART: [kat] ++
897,964 UART: [kat] sha1
902,094 UART: [kat] SHA2-256
904,034 UART: [kat] SHA2-384
906,759 UART: [kat] SHA2-512-ACC
908,660 UART: [kat] ECC-384
918,501 UART: [kat] HMAC-384Kdf
923,233 UART: [kat] LMS
1,171,561 UART: [kat] --
1,172,446 UART: [cold-reset] ++
1,172,996 UART: [fht] FHT @ 0x50003400
1,175,605 UART: [idev] ++
1,175,773 UART: [idev] CDI.KEYID = 6
1,176,133 UART: [idev] SUBJECT.KEYID = 7
1,176,557 UART: [idev] UDS.KEYID = 0
1,176,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,317 UART: [idev] Erasing UDS.KEYID = 0
1,201,318 UART: [idev] Sha1 KeyId Algorithm
1,209,784 UART: [idev] --
1,210,736 UART: [ldev] ++
1,210,904 UART: [ldev] CDI.KEYID = 6
1,211,267 UART: [ldev] SUBJECT.KEYID = 5
1,211,693 UART: [ldev] AUTHORITY.KEYID = 7
1,212,156 UART: [ldev] FE.KEYID = 1
1,217,306 UART: [ldev] Erasing FE.KEYID = 1
1,244,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,982 UART: [ldev] --
1,283,353 UART: [fwproc] Wait for Commands...
1,284,033 UART: [fwproc] Recv command 0x46574c44
1,284,761 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,842 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,012 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,223 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,999 >>> mbox cmd response: failed
1,186,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,005 >>> mbox cmd response: failed
1,187,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,368 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
192,002 UART:
192,371 UART: Running Caliptra ROM ...
193,508 UART:
193,661 UART: [state] CFI Enabled
260,000 UART: [state] LifecycleState = Unprovisioned
261,887 UART: [state] DebugLocked = No
264,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,541 UART: [kat] SHA2-256
439,009 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,527 UART: [kat] ++
450,002 UART: [kat] sha1
461,369 UART: [kat] SHA2-256
464,057 UART: [kat] SHA2-384
470,746 UART: [kat] SHA2-512-ACC
473,151 UART: [kat] ECC-384
2,765,277 UART: [kat] HMAC-384Kdf
2,777,354 UART: [kat] LMS
3,967,615 UART: [kat] --
3,971,911 UART: [cold-reset] ++
3,973,043 UART: [fht] Storing FHT @ 0x50003400
3,984,752 UART: [idev] ++
3,985,323 UART: [idev] CDI.KEYID = 6
3,986,343 UART: [idev] SUBJECT.KEYID = 7
3,987,507 UART: [idev] UDS.KEYID = 0
3,990,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,895 UART: [idev] Erasing UDS.KEYID = 0
7,323,152 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,218 UART: [idev] --
7,350,834 UART: [ldev] ++
7,351,460 UART: [ldev] CDI.KEYID = 6
7,352,372 UART: [ldev] SUBJECT.KEYID = 5
7,353,611 UART: [ldev] AUTHORITY.KEYID = 7
7,354,843 UART: [ldev] FE.KEYID = 1
7,381,162 UART: [ldev] Erasing FE.KEYID = 1
10,715,455 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,344 UART: [ldev] --
13,094,453 UART: [fwproc] Waiting for Commands...
13,097,748 UART: [fwproc] Received command 0x46574c44
13,099,942 UART: [fwproc] Received Image of size 118548 bytes
15,803,004 UART: ROM Fatal Error: 0x000B0018
15,806,514 >>> mbox cmd response: failed
15,806,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,807,384 >>> mbox cmd response: failed
15,807,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,807,987 >>> mbox cmd response: failed
Initializing fuses
2,063,824 writing to cptra_bootfsm_go
2,253,187 UART:
2,253,536 UART: Running Caliptra ROM ...
2,254,675 UART:
2,254,838 UART: [state] CFI Enabled
2,314,400 UART: [state] LifecycleState = Unprovisioned
2,316,343 UART: [state] DebugLocked = No
2,317,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,839 UART: [kat] SHA2-256
2,492,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,018 UART: [kat] ++
2,503,505 UART: [kat] sha1
2,515,425 UART: [kat] SHA2-256
2,518,123 UART: [kat] SHA2-384
2,524,707 UART: [kat] SHA2-512-ACC
2,527,061 UART: [kat] ECC-384
4,814,152 UART: [kat] HMAC-384Kdf
4,848,148 UART: [kat] LMS
6,038,466 UART: [kat] --
6,041,605 UART: [cold-reset] ++
6,043,542 UART: [fht] Storing FHT @ 0x50003400
6,055,085 UART: [idev] ++
6,055,664 UART: [idev] CDI.KEYID = 6
6,056,639 UART: [idev] SUBJECT.KEYID = 7
6,057,866 UART: [idev] UDS.KEYID = 0
6,060,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,209,344 UART: [idev] Erasing UDS.KEYID = 0
9,394,091 UART: [idev] Using Sha1 for KeyId Algorithm
9,415,755 UART: [idev] --
9,419,113 UART: [ldev] ++
9,419,686 UART: [ldev] CDI.KEYID = 6
9,420,656 UART: [ldev] SUBJECT.KEYID = 5
9,422,062 UART: [ldev] AUTHORITY.KEYID = 7
9,423,262 UART: [ldev] FE.KEYID = 1
9,469,700 UART: [ldev] Erasing FE.KEYID = 1
12,802,455 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,095,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,110,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,125,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,139,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,157,546 UART: [ldev] --
15,161,737 UART: [fwproc] Waiting for Commands...
15,164,919 UART: [fwproc] Received command 0x46574c44
15,167,128 UART: [fwproc] Received Image of size 118548 bytes
19,266,799 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,342,129 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,415,326 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,744,675 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,785,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,555,006 >>> mbox cmd response: failed
15,555,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,556,055 >>> mbox cmd response: failed
15,556,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,556,650 >>> mbox cmd response: failed
Initializing fuses
2,059,177 writing to cptra_bootfsm_go
5,835,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,007,238 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,650 UART:
193,008 UART: Running Caliptra ROM ...
194,197 UART:
603,805 UART: [state] CFI Enabled
617,259 UART: [state] LifecycleState = Unprovisioned
619,212 UART: [state] DebugLocked = No
621,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,240 UART: [kat] SHA2-256
796,001 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,563 UART: [kat] ++
807,017 UART: [kat] sha1
818,438 UART: [kat] SHA2-256
821,182 UART: [kat] SHA2-384
826,193 UART: [kat] SHA2-512-ACC
828,556 UART: [kat] ECC-384
3,114,179 UART: [kat] HMAC-384Kdf
3,126,435 UART: [kat] LMS
4,316,562 UART: [kat] --
4,319,625 UART: [cold-reset] ++
4,321,358 UART: [fht] Storing FHT @ 0x50003400
4,332,040 UART: [idev] ++
4,332,619 UART: [idev] CDI.KEYID = 6
4,333,532 UART: [idev] SUBJECT.KEYID = 7
4,334,750 UART: [idev] UDS.KEYID = 0
4,337,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,672 UART: [idev] Erasing UDS.KEYID = 0
7,619,229 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,783 UART: [idev] --
7,644,298 UART: [ldev] ++
7,644,880 UART: [ldev] CDI.KEYID = 6
7,645,931 UART: [ldev] SUBJECT.KEYID = 5
7,647,050 UART: [ldev] AUTHORITY.KEYID = 7
7,648,349 UART: [ldev] FE.KEYID = 1
7,658,192 UART: [ldev] Erasing FE.KEYID = 1
10,946,455 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,822 UART: [ldev] --
13,305,910 UART: [fwproc] Waiting for Commands...
13,308,236 UART: [fwproc] Received command 0x46574c44
13,310,428 UART: [fwproc] Received Image of size 118548 bytes
16,020,471 UART: ROM Fatal Error: 0x000B0018
16,023,998 >>> mbox cmd response: failed
16,024,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,695 >>> mbox cmd response: failed
16,024,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,025,273 >>> mbox cmd response: failed
Initializing fuses
2,058,756 writing to cptra_bootfsm_go
2,248,054 UART:
2,248,403 UART: Running Caliptra ROM ...
2,249,455 UART:
4,431,335 UART: [state] CFI Enabled
4,445,543 UART: [state] LifecycleState = Unprovisioned
4,447,520 UART: [state] DebugLocked = No
4,450,001 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,455,650 UART: [kat] SHA2-256
4,625,406 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,635,937 UART: [kat] ++
4,636,437 UART: [kat] sha1
4,647,544 UART: [kat] SHA2-256
4,650,246 UART: [kat] SHA2-384
4,656,240 UART: [kat] SHA2-512-ACC
4,658,600 UART: [kat] ECC-384
6,943,266 UART: [kat] HMAC-384Kdf
6,956,469 UART: [kat] LMS
8,146,608 UART: [kat] --
8,151,559 UART: [cold-reset] ++
8,153,023 UART: [fht] Storing FHT @ 0x50003400
8,165,975 UART: [idev] ++
8,166,549 UART: [idev] CDI.KEYID = 6
8,167,465 UART: [idev] SUBJECT.KEYID = 7
8,168,743 UART: [idev] UDS.KEYID = 0
8,171,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,319,997 UART: [idev] Erasing UDS.KEYID = 0
11,457,439 UART: [idev] Using Sha1 for KeyId Algorithm
11,478,245 UART: [idev] --
11,483,544 UART: [ldev] ++
11,484,122 UART: [ldev] CDI.KEYID = 6
11,485,092 UART: [ldev] SUBJECT.KEYID = 5
11,486,378 UART: [ldev] AUTHORITY.KEYID = 7
11,487,565 UART: [ldev] FE.KEYID = 1
11,501,440 UART: [ldev] Erasing FE.KEYID = 1
14,790,534 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,085,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,100,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,115,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,129,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,148,494 UART: [ldev] --
17,152,629 UART: [fwproc] Waiting for Commands...
17,155,779 UART: [fwproc] Received command 0x46574c44
17,158,027 UART: [fwproc] Received Image of size 118548 bytes
21,262,675 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,338,396 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,411,592 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,739,350 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
4,131,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,775,732 >>> mbox cmd response: failed
15,776,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,776,717 >>> mbox cmd response: failed
15,776,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,777,293 >>> mbox cmd response: failed
Initializing fuses
2,057,854 writing to cptra_bootfsm_go
8,221,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,246,449 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
192,294 UART:
192,656 UART: Running Caliptra ROM ...
193,886 UART:
194,043 UART: [state] CFI Enabled
264,254 UART: [state] LifecycleState = Unprovisioned
266,237 UART: [state] DebugLocked = No
267,792 UART: [state] WD Timer not started. Device not locked for debugging
272,199 UART: [kat] SHA2-256
451,866 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,664 UART: [kat] ++
463,171 UART: [kat] sha1
473,609 UART: [kat] SHA2-256
476,308 UART: [kat] SHA2-384
482,565 UART: [kat] SHA2-512-ACC
484,917 UART: [kat] ECC-384
2,950,615 UART: [kat] HMAC-384Kdf
2,971,406 UART: [kat] LMS
3,447,919 UART: [kat] --
3,453,279 UART: [cold-reset] ++
3,455,169 UART: [fht] FHT @ 0x50003400
3,465,880 UART: [idev] ++
3,466,460 UART: [idev] CDI.KEYID = 6
3,467,374 UART: [idev] SUBJECT.KEYID = 7
3,468,652 UART: [idev] UDS.KEYID = 0
3,471,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,409 UART: [idev] Erasing UDS.KEYID = 0
5,986,718 UART: [idev] Sha1 KeyId Algorithm
6,010,330 UART: [idev] --
6,015,414 UART: [ldev] ++
6,016,047 UART: [ldev] CDI.KEYID = 6
6,016,966 UART: [ldev] SUBJECT.KEYID = 5
6,018,134 UART: [ldev] AUTHORITY.KEYID = 7
6,019,451 UART: [ldev] FE.KEYID = 1
6,058,409 UART: [ldev] Erasing FE.KEYID = 1
8,562,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,689 UART: [ldev] --
10,376,850 UART: [fwproc] Wait for Commands...
10,379,226 UART: [fwproc] Recv command 0x46574c44
10,381,260 UART: [fwproc] Recv'd Img size: 118548 bytes
12,452,715 UART: ROM Fatal Error: 0x000B0018
12,455,953 >>> mbox cmd response: failed
12,456,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,456,606 >>> mbox cmd response: failed
12,456,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,235 >>> mbox cmd response: failed
Initializing fuses
2,060,367 writing to cptra_bootfsm_go
2,249,654 UART:
2,250,008 UART: Running Caliptra ROM ...
2,251,069 UART:
2,251,234 UART: [state] CFI Enabled
2,314,573 UART: [state] LifecycleState = Unprovisioned
2,316,471 UART: [state] DebugLocked = No
2,318,803 UART: [state] WD Timer not started. Device not locked for debugging
2,322,065 UART: [kat] SHA2-256
2,501,732 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,512,512 UART: [kat] ++
2,512,976 UART: [kat] sha1
2,522,863 UART: [kat] SHA2-256
2,525,568 UART: [kat] SHA2-384
2,530,917 UART: [kat] SHA2-512-ACC
2,533,324 UART: [kat] ECC-384
4,997,921 UART: [kat] HMAC-384Kdf
5,021,030 UART: [kat] LMS
5,497,567 UART: [kat] --
5,502,481 UART: [cold-reset] ++
5,503,499 UART: [fht] FHT @ 0x50003400
5,513,998 UART: [idev] ++
5,514,569 UART: [idev] CDI.KEYID = 6
5,515,499 UART: [idev] SUBJECT.KEYID = 7
5,516,718 UART: [idev] UDS.KEYID = 0
5,519,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,668,240 UART: [idev] Erasing UDS.KEYID = 0
8,035,883 UART: [idev] Sha1 KeyId Algorithm
8,059,045 UART: [idev] --
8,062,668 UART: [ldev] ++
8,063,260 UART: [ldev] CDI.KEYID = 6
8,064,350 UART: [ldev] SUBJECT.KEYID = 5
8,065,470 UART: [ldev] AUTHORITY.KEYID = 7
8,066,656 UART: [ldev] FE.KEYID = 1
8,107,277 UART: [ldev] Erasing FE.KEYID = 1
10,617,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,354,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,370,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,386,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,401,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,423,014 UART: [ldev] --
12,428,027 UART: [fwproc] Wait for Commands...
12,430,243 UART: [fwproc] Recv command 0x46574c44
12,432,236 UART: [fwproc] Recv'd Img size: 118548 bytes
15,921,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,997,665 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,070,653 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,398,501 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,462,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,323,246 >>> mbox cmd response: failed
12,323,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,324,166 >>> mbox cmd response: failed
12,324,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,324,731 >>> mbox cmd response: failed
Initializing fuses
2,061,182 writing to cptra_bootfsm_go
5,503,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,256,392 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,451 writing to cptra_bootfsm_go
192,603 UART:
192,978 UART: Running Caliptra ROM ...
194,194 UART:
603,916 UART: [state] CFI Enabled
619,589 UART: [state] LifecycleState = Unprovisioned
621,473 UART: [state] DebugLocked = No
622,714 UART: [state] WD Timer not started. Device not locked for debugging
627,217 UART: [kat] SHA2-256
806,884 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,690 UART: [kat] ++
818,144 UART: [kat] sha1
827,995 UART: [kat] SHA2-256
830,711 UART: [kat] SHA2-384
837,669 UART: [kat] SHA2-512-ACC
840,026 UART: [kat] ECC-384
3,281,071 UART: [kat] HMAC-384Kdf
3,293,204 UART: [kat] LMS
3,769,722 UART: [kat] --
3,773,676 UART: [cold-reset] ++
3,775,189 UART: [fht] FHT @ 0x50003400
3,786,386 UART: [idev] ++
3,786,955 UART: [idev] CDI.KEYID = 6
3,787,982 UART: [idev] SUBJECT.KEYID = 7
3,789,147 UART: [idev] UDS.KEYID = 0
3,791,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,777 UART: [idev] Erasing UDS.KEYID = 0
6,269,033 UART: [idev] Sha1 KeyId Algorithm
6,293,624 UART: [idev] --
6,298,344 UART: [ldev] ++
6,298,922 UART: [ldev] CDI.KEYID = 6
6,299,838 UART: [ldev] SUBJECT.KEYID = 5
6,301,059 UART: [ldev] AUTHORITY.KEYID = 7
6,302,301 UART: [ldev] FE.KEYID = 1
6,314,714 UART: [ldev] Erasing FE.KEYID = 1
8,789,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,139 UART: [ldev] --
10,585,304 UART: [fwproc] Wait for Commands...
10,587,623 UART: [fwproc] Recv command 0x46574c44
10,589,614 UART: [fwproc] Recv'd Img size: 118548 bytes
12,657,956 UART: ROM Fatal Error: 0x000B0018
12,661,219 >>> mbox cmd response: failed
12,661,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,661,916 >>> mbox cmd response: failed
12,662,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,662,528 >>> mbox cmd response: failed
Initializing fuses
2,067,244 writing to cptra_bootfsm_go
2,256,547 UART:
2,256,904 UART: Running Caliptra ROM ...
2,258,167 UART:
7,793,894 UART: [state] CFI Enabled
7,806,999 UART: [state] LifecycleState = Unprovisioned
7,808,951 UART: [state] DebugLocked = No
7,810,954 UART: [state] WD Timer not started. Device not locked for debugging
7,815,165 UART: [kat] SHA2-256
7,994,795 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,005,594 UART: [kat] ++
8,006,153 UART: [kat] sha1
8,016,084 UART: [kat] SHA2-256
8,018,760 UART: [kat] SHA2-384
8,025,573 UART: [kat] SHA2-512-ACC
8,027,935 UART: [kat] ECC-384
10,469,722 UART: [kat] HMAC-384Kdf
10,481,193 UART: [kat] LMS
10,957,711 UART: [kat] --
10,962,250 UART: [cold-reset] ++
10,964,455 UART: [fht] FHT @ 0x50003400
10,976,568 UART: [idev] ++
10,977,143 UART: [idev] CDI.KEYID = 6
10,978,112 UART: [idev] SUBJECT.KEYID = 7
10,979,352 UART: [idev] UDS.KEYID = 0
10,981,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,131,020 UART: [idev] Erasing UDS.KEYID = 0
13,458,176 UART: [idev] Sha1 KeyId Algorithm
13,481,462 UART: [idev] --
13,486,747 UART: [ldev] ++
13,487,359 UART: [ldev] CDI.KEYID = 6
13,488,256 UART: [ldev] SUBJECT.KEYID = 5
13,489,475 UART: [ldev] AUTHORITY.KEYID = 7
13,490,771 UART: [ldev] FE.KEYID = 1
13,503,554 UART: [ldev] Erasing FE.KEYID = 1
15,980,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,700,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,716,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,732,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,747,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,769,269 UART: [ldev] --
17,775,187 UART: [fwproc] Wait for Commands...
17,777,719 UART: [fwproc] Recv command 0x46574c44
17,779,710 UART: [fwproc] Recv'd Img size: 118548 bytes
21,259,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,337,294 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,410,317 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,739,214 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
3,782,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,542,299 >>> mbox cmd response: failed
12,542,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,543,254 >>> mbox cmd response: failed
12,543,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,543,828 >>> mbox cmd response: failed
Initializing fuses
2,068,001 writing to cptra_bootfsm_go
11,097,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,765,164 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
192,042 UART:
192,411 UART: Running Caliptra ROM ...
193,551 UART:
193,722 UART: [state] CFI Enabled
264,631 UART: [state] LifecycleState = Unprovisioned
267,064 UART: [state] DebugLocked = No
268,350 UART: [state] WD Timer not started. Device not locked for debugging
272,092 UART: [kat] SHA2-256
461,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,718 UART: [kat] ++
473,196 UART: [kat] sha1
486,026 UART: [kat] SHA2-256
489,035 UART: [kat] SHA2-384
494,500 UART: [kat] SHA2-512-ACC
497,098 UART: [kat] ECC-384
2,947,611 UART: [kat] HMAC-384Kdf
2,970,952 UART: [kat] LMS
3,502,722 UART: [kat] --
3,506,886 UART: [cold-reset] ++
3,507,822 UART: [fht] FHT @ 0x50003400
3,519,029 UART: [idev] ++
3,519,721 UART: [idev] CDI.KEYID = 6
3,520,638 UART: [idev] SUBJECT.KEYID = 7
3,521,858 UART: [idev] UDS.KEYID = 0
3,525,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,969 UART: [idev] Erasing UDS.KEYID = 0
6,029,042 UART: [idev] Sha1 KeyId Algorithm
6,051,444 UART: [idev] --
6,054,969 UART: [ldev] ++
6,055,665 UART: [ldev] CDI.KEYID = 6
6,056,581 UART: [ldev] SUBJECT.KEYID = 5
6,057,752 UART: [ldev] AUTHORITY.KEYID = 7
6,058,991 UART: [ldev] FE.KEYID = 1
6,099,195 UART: [ldev] Erasing FE.KEYID = 1
8,604,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,950 UART: [ldev] --
10,411,647 UART: [fwproc] Wait for Commands...
10,414,824 UART: [fwproc] Recv command 0x46574c44
10,417,102 UART: [fwproc] Recv'd Img size: 118548 bytes
12,502,241 UART: ROM Fatal Error: 0x000B0018
12,505,869 >>> mbox cmd response: failed
12,506,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,645 >>> mbox cmd response: failed
12,506,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,507,222 >>> mbox cmd response: failed
Initializing fuses
2,067,894 writing to cptra_bootfsm_go
2,257,204 UART:
2,257,548 UART: Running Caliptra ROM ...
2,258,687 UART:
2,258,867 UART: [state] CFI Enabled
2,323,058 UART: [state] LifecycleState = Unprovisioned
2,325,434 UART: [state] DebugLocked = No
2,328,401 UART: [state] WD Timer not started. Device not locked for debugging
2,332,296 UART: [kat] SHA2-256
2,522,164 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,904 UART: [kat] ++
2,533,366 UART: [kat] sha1
2,546,241 UART: [kat] SHA2-256
2,549,289 UART: [kat] SHA2-384
2,554,440 UART: [kat] SHA2-512-ACC
2,557,046 UART: [kat] ECC-384
5,008,071 UART: [kat] HMAC-384Kdf
5,031,647 UART: [kat] LMS
5,563,380 UART: [kat] --
5,569,210 UART: [cold-reset] ++
5,571,744 UART: [fht] FHT @ 0x50003400
5,584,613 UART: [idev] ++
5,585,342 UART: [idev] CDI.KEYID = 6
5,586,269 UART: [idev] SUBJECT.KEYID = 7
5,587,439 UART: [idev] UDS.KEYID = 0
5,589,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,738,899 UART: [idev] Erasing UDS.KEYID = 0
8,107,795 UART: [idev] Sha1 KeyId Algorithm
8,130,763 UART: [idev] --
8,135,090 UART: [ldev] ++
8,135,781 UART: [ldev] CDI.KEYID = 6
8,136,713 UART: [ldev] SUBJECT.KEYID = 5
8,137,878 UART: [ldev] AUTHORITY.KEYID = 7
8,139,057 UART: [ldev] FE.KEYID = 1
8,183,122 UART: [ldev] Erasing FE.KEYID = 1
10,691,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,426,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,442,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,457,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,472,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,493,120 UART: [ldev] --
12,497,852 UART: [fwproc] Wait for Commands...
12,499,526 UART: [fwproc] Recv command 0x46574c44
12,501,850 UART: [fwproc] Recv'd Img size: 118548 bytes
15,995,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,072,379 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,196,005 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,756,542 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,841 writing to cptra_bootfsm_go
3,441,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,299,801 >>> mbox cmd response: failed
12,300,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,300,748 >>> mbox cmd response: failed
12,301,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,301,320 >>> mbox cmd response: failed
Initializing fuses
2,068,504 writing to cptra_bootfsm_go
5,466,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,855,905 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,542 UART:
192,904 UART: Running Caliptra ROM ...
194,118 UART:
603,784 UART: [state] CFI Enabled
620,302 UART: [state] LifecycleState = Unprovisioned
622,706 UART: [state] DebugLocked = No
623,873 UART: [state] WD Timer not started. Device not locked for debugging
628,135 UART: [kat] SHA2-256
817,961 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,746 UART: [kat] ++
829,344 UART: [kat] sha1
840,076 UART: [kat] SHA2-256
843,085 UART: [kat] SHA2-384
848,434 UART: [kat] SHA2-512-ACC
851,009 UART: [kat] ECC-384
3,293,875 UART: [kat] HMAC-384Kdf
3,307,577 UART: [kat] LMS
3,839,377 UART: [kat] --
3,844,165 UART: [cold-reset] ++
3,845,458 UART: [fht] FHT @ 0x50003400
3,857,588 UART: [idev] ++
3,858,269 UART: [idev] CDI.KEYID = 6
3,859,241 UART: [idev] SUBJECT.KEYID = 7
3,860,456 UART: [idev] UDS.KEYID = 0
3,863,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,345 UART: [idev] Erasing UDS.KEYID = 0
6,340,781 UART: [idev] Sha1 KeyId Algorithm
6,363,815 UART: [idev] --
6,368,711 UART: [ldev] ++
6,369,405 UART: [ldev] CDI.KEYID = 6
6,370,320 UART: [ldev] SUBJECT.KEYID = 5
6,371,491 UART: [ldev] AUTHORITY.KEYID = 7
6,372,726 UART: [ldev] FE.KEYID = 1
6,385,377 UART: [ldev] Erasing FE.KEYID = 1
8,867,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,587,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,603,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,618,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,633,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,654,126 UART: [ldev] --
10,659,774 UART: [fwproc] Wait for Commands...
10,662,798 UART: [fwproc] Recv command 0x46574c44
10,665,130 UART: [fwproc] Recv'd Img size: 118548 bytes
12,752,061 UART: ROM Fatal Error: 0x000B0018
12,755,739 >>> mbox cmd response: failed
12,756,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,756,503 >>> mbox cmd response: failed
12,756,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,757,073 >>> mbox cmd response: failed
Initializing fuses
2,060,148 writing to cptra_bootfsm_go
2,249,504 UART:
2,249,853 UART: Running Caliptra ROM ...
2,250,999 UART:
7,695,963 UART: [state] CFI Enabled
7,711,904 UART: [state] LifecycleState = Unprovisioned
7,714,270 UART: [state] DebugLocked = No
7,716,480 UART: [state] WD Timer not started. Device not locked for debugging
7,720,745 UART: [kat] SHA2-256
7,910,586 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,921,422 UART: [kat] ++
7,921,976 UART: [kat] sha1
7,932,341 UART: [kat] SHA2-256
7,935,373 UART: [kat] SHA2-384
7,941,286 UART: [kat] SHA2-512-ACC
7,943,862 UART: [kat] ECC-384
10,384,878 UART: [kat] HMAC-384Kdf
10,397,970 UART: [kat] LMS
10,929,769 UART: [kat] --
10,933,494 UART: [cold-reset] ++
10,935,859 UART: [fht] FHT @ 0x50003400
10,947,597 UART: [idev] ++
10,948,276 UART: [idev] CDI.KEYID = 6
10,949,219 UART: [idev] SUBJECT.KEYID = 7
10,950,435 UART: [idev] UDS.KEYID = 0
10,952,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,101,718 UART: [idev] Erasing UDS.KEYID = 0
13,428,429 UART: [idev] Sha1 KeyId Algorithm
13,450,849 UART: [idev] --
13,456,925 UART: [ldev] ++
13,457,644 UART: [ldev] CDI.KEYID = 6
13,458,575 UART: [ldev] SUBJECT.KEYID = 5
13,459,685 UART: [ldev] AUTHORITY.KEYID = 7
13,460,916 UART: [ldev] FE.KEYID = 1
13,473,125 UART: [ldev] Erasing FE.KEYID = 1
15,945,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,666,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,682,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,697,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,712,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,732,392 UART: [ldev] --
17,737,118 UART: [fwproc] Wait for Commands...
17,739,379 UART: [fwproc] Recv command 0x46574c44
17,741,651 UART: [fwproc] Recv'd Img size: 118548 bytes
21,242,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,320,408 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,444,014 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,004,456 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
3,763,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,527,607 >>> mbox cmd response: failed
12,528,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,557 >>> mbox cmd response: failed
12,528,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,127 >>> mbox cmd response: failed
Initializing fuses
2,062,419 writing to cptra_bootfsm_go
11,092,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,372,244 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,051 UART: [kat] SHA2-256
881,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,097 UART: [kat] ++
886,249 UART: [kat] sha1
890,515 UART: [kat] SHA2-256
892,453 UART: [kat] SHA2-384
895,240 UART: [kat] SHA2-512-ACC
897,141 UART: [kat] ECC-384
902,538 UART: [kat] HMAC-384Kdf
907,162 UART: [kat] LMS
1,475,358 UART: [kat] --
1,476,203 UART: [cold-reset] ++
1,476,627 UART: [fht] Storing FHT @ 0x50003400
1,479,480 UART: [idev] ++
1,479,648 UART: [idev] CDI.KEYID = 6
1,480,008 UART: [idev] SUBJECT.KEYID = 7
1,480,432 UART: [idev] UDS.KEYID = 0
1,480,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,314 UART: [idev] Erasing UDS.KEYID = 0
1,504,902 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,448 UART: [idev] --
1,514,403 UART: [ldev] ++
1,514,571 UART: [ldev] CDI.KEYID = 6
1,514,934 UART: [ldev] SUBJECT.KEYID = 5
1,515,360 UART: [ldev] AUTHORITY.KEYID = 7
1,515,823 UART: [ldev] FE.KEYID = 1
1,520,941 UART: [ldev] Erasing FE.KEYID = 1
1,546,006 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,136 UART: [ldev] --
1,585,605 UART: [fwproc] Waiting for Commands...
1,586,254 UART: [fwproc] Received command 0x46574c44
1,587,045 UART: [fwproc] Received Image of size 118548 bytes
1,634,348 UART: ROM Fatal Error: 0x000B0018
1,635,505 >>> mbox cmd response: failed
1,635,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,511 >>> mbox cmd response: failed
1,635,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,011 UART: [kat] SHA2-256
881,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,057 UART: [kat] ++
886,209 UART: [kat] sha1
890,445 UART: [kat] SHA2-256
892,383 UART: [kat] SHA2-384
895,216 UART: [kat] SHA2-512-ACC
897,117 UART: [kat] ECC-384
902,516 UART: [kat] HMAC-384Kdf
907,102 UART: [kat] LMS
1,475,298 UART: [kat] --
1,475,945 UART: [cold-reset] ++
1,476,357 UART: [fht] Storing FHT @ 0x50003400
1,479,328 UART: [idev] ++
1,479,496 UART: [idev] CDI.KEYID = 6
1,479,856 UART: [idev] SUBJECT.KEYID = 7
1,480,280 UART: [idev] UDS.KEYID = 0
1,480,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,168 UART: [idev] Erasing UDS.KEYID = 0
1,504,554 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,136 UART: [idev] --
1,514,205 UART: [ldev] ++
1,514,373 UART: [ldev] CDI.KEYID = 6
1,514,736 UART: [ldev] SUBJECT.KEYID = 5
1,515,162 UART: [ldev] AUTHORITY.KEYID = 7
1,515,625 UART: [ldev] FE.KEYID = 1
1,521,045 UART: [ldev] Erasing FE.KEYID = 1
1,546,774 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,626 UART: [ldev] --
1,586,093 UART: [fwproc] Waiting for Commands...
1,586,878 UART: [fwproc] Received command 0x46574c44
1,587,669 UART: [fwproc] Received Image of size 118548 bytes
2,932,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,610 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,123 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,278 >>> mbox cmd response: failed
1,488,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,284 >>> mbox cmd response: failed
1,488,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,715 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,924 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,600 UART: [kat] SHA2-256
882,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,646 UART: [kat] ++
886,798 UART: [kat] sha1
891,146 UART: [kat] SHA2-256
893,084 UART: [kat] SHA2-384
895,807 UART: [kat] SHA2-512-ACC
897,708 UART: [kat] ECC-384
903,043 UART: [kat] HMAC-384Kdf
907,821 UART: [kat] LMS
1,476,017 UART: [kat] --
1,476,872 UART: [cold-reset] ++
1,477,364 UART: [fht] Storing FHT @ 0x50003400
1,480,235 UART: [idev] ++
1,480,403 UART: [idev] CDI.KEYID = 6
1,480,763 UART: [idev] SUBJECT.KEYID = 7
1,481,187 UART: [idev] UDS.KEYID = 0
1,481,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,595 UART: [idev] Erasing UDS.KEYID = 0
1,506,165 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,713 UART: [idev] --
1,515,694 UART: [ldev] ++
1,515,862 UART: [ldev] CDI.KEYID = 6
1,516,225 UART: [ldev] SUBJECT.KEYID = 5
1,516,651 UART: [ldev] AUTHORITY.KEYID = 7
1,517,114 UART: [ldev] FE.KEYID = 1
1,522,128 UART: [ldev] Erasing FE.KEYID = 1
1,547,473 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,237 UART: [ldev] --
1,586,554 UART: [fwproc] Waiting for Commands...
1,587,291 UART: [fwproc] Received command 0x46574c44
1,588,082 UART: [fwproc] Received Image of size 118548 bytes
1,635,119 UART: ROM Fatal Error: 0x000B0018
1,636,276 >>> mbox cmd response: failed
1,636,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,282 >>> mbox cmd response: failed
1,636,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,288 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,362 UART: [kat] SHA2-256
882,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,408 UART: [kat] ++
886,560 UART: [kat] sha1
890,876 UART: [kat] SHA2-256
892,814 UART: [kat] SHA2-384
895,711 UART: [kat] SHA2-512-ACC
897,612 UART: [kat] ECC-384
903,327 UART: [kat] HMAC-384Kdf
907,839 UART: [kat] LMS
1,476,035 UART: [kat] --
1,476,894 UART: [cold-reset] ++
1,477,302 UART: [fht] Storing FHT @ 0x50003400
1,480,137 UART: [idev] ++
1,480,305 UART: [idev] CDI.KEYID = 6
1,480,665 UART: [idev] SUBJECT.KEYID = 7
1,481,089 UART: [idev] UDS.KEYID = 0
1,481,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,045 UART: [idev] Erasing UDS.KEYID = 0
1,505,187 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,925 UART: [idev] --
1,515,158 UART: [ldev] ++
1,515,326 UART: [ldev] CDI.KEYID = 6
1,515,689 UART: [ldev] SUBJECT.KEYID = 5
1,516,115 UART: [ldev] AUTHORITY.KEYID = 7
1,516,578 UART: [ldev] FE.KEYID = 1
1,522,042 UART: [ldev] Erasing FE.KEYID = 1
1,547,091 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,961 UART: [ldev] --
1,586,366 UART: [fwproc] Waiting for Commands...
1,587,085 UART: [fwproc] Received command 0x46574c44
1,587,876 UART: [fwproc] Received Image of size 118548 bytes
2,931,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,375 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,593 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,918 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,613 >>> mbox cmd response: failed
1,488,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,619 >>> mbox cmd response: failed
1,488,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,518 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,244 UART: [kat] ++
895,396 UART: [kat] sha1
899,734 UART: [kat] SHA2-256
901,674 UART: [kat] SHA2-384
904,611 UART: [kat] SHA2-512-ACC
906,512 UART: [kat] ECC-384
916,269 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,169,858 UART: [cold-reset] ++
1,170,262 UART: [fht] FHT @ 0x50003400
1,173,110 UART: [idev] ++
1,173,278 UART: [idev] CDI.KEYID = 6
1,173,639 UART: [idev] SUBJECT.KEYID = 7
1,174,064 UART: [idev] UDS.KEYID = 0
1,174,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,699 UART: [idev] Erasing UDS.KEYID = 0
1,198,677 UART: [idev] Sha1 KeyId Algorithm
1,207,427 UART: [idev] --
1,208,346 UART: [ldev] ++
1,208,514 UART: [ldev] CDI.KEYID = 6
1,208,878 UART: [ldev] SUBJECT.KEYID = 5
1,209,305 UART: [ldev] AUTHORITY.KEYID = 7
1,209,768 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,241,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,986 UART: [ldev] --
1,280,325 UART: [fwproc] Wait for Commands...
1,281,078 UART: [fwproc] Recv command 0x46574c44
1,281,811 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,558 UART: ROM Fatal Error: 0x000B0018
1,330,715 >>> mbox cmd response: failed
1,330,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,721 >>> mbox cmd response: failed
1,330,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,727 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,390 UART: [kat] ++
895,542 UART: [kat] sha1
899,848 UART: [kat] SHA2-256
901,788 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
916,035 UART: [kat] HMAC-384Kdf
920,601 UART: [kat] LMS
1,168,913 UART: [kat] --
1,169,730 UART: [cold-reset] ++
1,170,194 UART: [fht] FHT @ 0x50003400
1,172,724 UART: [idev] ++
1,172,892 UART: [idev] CDI.KEYID = 6
1,173,253 UART: [idev] SUBJECT.KEYID = 7
1,173,678 UART: [idev] UDS.KEYID = 0
1,174,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,669 UART: [idev] Erasing UDS.KEYID = 0
1,198,339 UART: [idev] Sha1 KeyId Algorithm
1,207,281 UART: [idev] --
1,208,196 UART: [ldev] ++
1,208,364 UART: [ldev] CDI.KEYID = 6
1,208,728 UART: [ldev] SUBJECT.KEYID = 5
1,209,155 UART: [ldev] AUTHORITY.KEYID = 7
1,209,618 UART: [ldev] FE.KEYID = 1
1,214,764 UART: [ldev] Erasing FE.KEYID = 1
1,241,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,370 UART: [ldev] --
1,280,749 UART: [fwproc] Wait for Commands...
1,281,458 UART: [fwproc] Recv command 0x46574c44
1,282,191 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,688 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,863 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,226 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,826 >>> mbox cmd response: failed
1,186,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,832 >>> mbox cmd response: failed
1,186,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,838 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,405 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
891,705 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,809 UART: [kat] ++
895,961 UART: [kat] sha1
900,331 UART: [kat] SHA2-256
902,271 UART: [kat] SHA2-384
905,082 UART: [kat] SHA2-512-ACC
906,983 UART: [kat] ECC-384
916,836 UART: [kat] HMAC-384Kdf
921,534 UART: [kat] LMS
1,169,846 UART: [kat] --
1,170,703 UART: [cold-reset] ++
1,171,197 UART: [fht] FHT @ 0x50003400
1,173,797 UART: [idev] ++
1,173,965 UART: [idev] CDI.KEYID = 6
1,174,326 UART: [idev] SUBJECT.KEYID = 7
1,174,751 UART: [idev] UDS.KEYID = 0
1,175,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,738 UART: [idev] Erasing UDS.KEYID = 0
1,200,206 UART: [idev] Sha1 KeyId Algorithm
1,209,194 UART: [idev] --
1,210,199 UART: [ldev] ++
1,210,367 UART: [ldev] CDI.KEYID = 6
1,210,731 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,216,953 UART: [ldev] Erasing FE.KEYID = 1
1,243,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,613 UART: [ldev] --
1,283,028 UART: [fwproc] Wait for Commands...
1,283,617 UART: [fwproc] Recv command 0x46574c44
1,284,350 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,191 UART: ROM Fatal Error: 0x000B0018
1,331,348 >>> mbox cmd response: failed
1,331,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,354 >>> mbox cmd response: failed
1,331,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,360 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,665 UART: [kat] ++
895,817 UART: [kat] sha1
900,129 UART: [kat] SHA2-256
902,069 UART: [kat] SHA2-384
904,952 UART: [kat] SHA2-512-ACC
906,853 UART: [kat] ECC-384
916,634 UART: [kat] HMAC-384Kdf
921,398 UART: [kat] LMS
1,169,710 UART: [kat] --
1,170,581 UART: [cold-reset] ++
1,171,043 UART: [fht] FHT @ 0x50003400
1,173,751 UART: [idev] ++
1,173,919 UART: [idev] CDI.KEYID = 6
1,174,280 UART: [idev] SUBJECT.KEYID = 7
1,174,705 UART: [idev] UDS.KEYID = 0
1,175,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,790 UART: [idev] Erasing UDS.KEYID = 0
1,200,030 UART: [idev] Sha1 KeyId Algorithm
1,208,998 UART: [idev] --
1,210,267 UART: [ldev] ++
1,210,435 UART: [ldev] CDI.KEYID = 6
1,210,799 UART: [ldev] SUBJECT.KEYID = 5
1,211,226 UART: [ldev] AUTHORITY.KEYID = 7
1,211,689 UART: [ldev] FE.KEYID = 1
1,216,803 UART: [ldev] Erasing FE.KEYID = 1
1,243,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,053 UART: [ldev] --
1,282,426 UART: [fwproc] Wait for Commands...
1,283,119 UART: [fwproc] Recv command 0x46574c44
1,283,852 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,785 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,960 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,115 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,721 >>> mbox cmd response: failed
1,187,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,727 >>> mbox cmd response: failed
1,187,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,733 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,010 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,686 UART: [state] LifecycleState = Unprovisioned
85,341 UART: [state] DebugLocked = No
85,983 UART: [state] WD Timer not started. Device not locked for debugging
87,108 UART: [kat] SHA2-256
892,758 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,883 UART: [kat] ++
897,035 UART: [kat] sha1
901,389 UART: [kat] SHA2-256
903,329 UART: [kat] SHA2-384
906,286 UART: [kat] SHA2-512-ACC
908,187 UART: [kat] ECC-384
917,702 UART: [kat] HMAC-384Kdf
922,208 UART: [kat] LMS
1,170,536 UART: [kat] --
1,171,589 UART: [cold-reset] ++
1,172,149 UART: [fht] FHT @ 0x50003400
1,174,672 UART: [idev] ++
1,174,840 UART: [idev] CDI.KEYID = 6
1,175,200 UART: [idev] SUBJECT.KEYID = 7
1,175,624 UART: [idev] UDS.KEYID = 0
1,175,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,766 UART: [idev] Erasing UDS.KEYID = 0
1,200,467 UART: [idev] Sha1 KeyId Algorithm
1,208,953 UART: [idev] --
1,210,047 UART: [ldev] ++
1,210,215 UART: [ldev] CDI.KEYID = 6
1,210,578 UART: [ldev] SUBJECT.KEYID = 5
1,211,004 UART: [ldev] AUTHORITY.KEYID = 7
1,211,467 UART: [ldev] FE.KEYID = 1
1,216,903 UART: [ldev] Erasing FE.KEYID = 1
1,243,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,595 UART: [ldev] --
1,282,946 UART: [fwproc] Wait for Commands...
1,283,762 UART: [fwproc] Recv command 0x46574c44
1,284,490 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,373 UART: ROM Fatal Error: 0x000B0018
1,332,530 >>> mbox cmd response: failed
1,332,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,536 >>> mbox cmd response: failed
1,332,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,552 UART: [state] LifecycleState = Unprovisioned
86,207 UART: [state] DebugLocked = No
86,759 UART: [state] WD Timer not started. Device not locked for debugging
88,076 UART: [kat] SHA2-256
893,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,851 UART: [kat] ++
898,003 UART: [kat] sha1
902,313 UART: [kat] SHA2-256
904,253 UART: [kat] SHA2-384
906,906 UART: [kat] SHA2-512-ACC
908,807 UART: [kat] ECC-384
918,184 UART: [kat] HMAC-384Kdf
922,694 UART: [kat] LMS
1,171,022 UART: [kat] --
1,171,767 UART: [cold-reset] ++
1,172,219 UART: [fht] FHT @ 0x50003400
1,174,916 UART: [idev] ++
1,175,084 UART: [idev] CDI.KEYID = 6
1,175,444 UART: [idev] SUBJECT.KEYID = 7
1,175,868 UART: [idev] UDS.KEYID = 0
1,176,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,840 UART: [idev] Erasing UDS.KEYID = 0
1,200,775 UART: [idev] Sha1 KeyId Algorithm
1,209,223 UART: [idev] --
1,210,099 UART: [ldev] ++
1,210,267 UART: [ldev] CDI.KEYID = 6
1,210,630 UART: [ldev] SUBJECT.KEYID = 5
1,211,056 UART: [ldev] AUTHORITY.KEYID = 7
1,211,519 UART: [ldev] FE.KEYID = 1
1,216,627 UART: [ldev] Erasing FE.KEYID = 1
1,243,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,167 UART: [ldev] --
1,282,560 UART: [fwproc] Wait for Commands...
1,283,382 UART: [fwproc] Recv command 0x46574c44
1,284,110 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,967 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,137 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,504 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,353 >>> mbox cmd response: failed
1,187,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,359 >>> mbox cmd response: failed
1,187,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,365 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,919 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,017 UART: [state] LifecycleState = Unprovisioned
85,672 UART: [state] DebugLocked = No
86,316 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
893,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,420 UART: [kat] ++
897,572 UART: [kat] sha1
901,918 UART: [kat] SHA2-256
903,858 UART: [kat] SHA2-384
906,653 UART: [kat] SHA2-512-ACC
908,554 UART: [kat] ECC-384
918,279 UART: [kat] HMAC-384Kdf
922,949 UART: [kat] LMS
1,171,277 UART: [kat] --
1,172,380 UART: [cold-reset] ++
1,172,914 UART: [fht] FHT @ 0x50003400
1,175,503 UART: [idev] ++
1,175,671 UART: [idev] CDI.KEYID = 6
1,176,031 UART: [idev] SUBJECT.KEYID = 7
1,176,455 UART: [idev] UDS.KEYID = 0
1,176,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,605 UART: [idev] Erasing UDS.KEYID = 0
1,201,786 UART: [idev] Sha1 KeyId Algorithm
1,210,458 UART: [idev] --
1,211,416 UART: [ldev] ++
1,211,584 UART: [ldev] CDI.KEYID = 6
1,211,947 UART: [ldev] SUBJECT.KEYID = 5
1,212,373 UART: [ldev] AUTHORITY.KEYID = 7
1,212,836 UART: [ldev] FE.KEYID = 1
1,218,128 UART: [ldev] Erasing FE.KEYID = 1
1,244,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,406 UART: [ldev] --
1,283,857 UART: [fwproc] Wait for Commands...
1,284,535 UART: [fwproc] Recv command 0x46574c44
1,285,263 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,756 UART: ROM Fatal Error: 0x000B0018
1,333,913 >>> mbox cmd response: failed
1,333,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,919 >>> mbox cmd response: failed
1,333,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,253 UART: [kat] SHA2-256
893,903 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,028 UART: [kat] ++
898,180 UART: [kat] sha1
902,580 UART: [kat] SHA2-256
904,520 UART: [kat] SHA2-384
907,307 UART: [kat] SHA2-512-ACC
909,208 UART: [kat] ECC-384
918,949 UART: [kat] HMAC-384Kdf
923,711 UART: [kat] LMS
1,172,039 UART: [kat] --
1,172,802 UART: [cold-reset] ++
1,173,198 UART: [fht] FHT @ 0x50003400
1,175,649 UART: [idev] ++
1,175,817 UART: [idev] CDI.KEYID = 6
1,176,177 UART: [idev] SUBJECT.KEYID = 7
1,176,601 UART: [idev] UDS.KEYID = 0
1,176,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,009 UART: [idev] Erasing UDS.KEYID = 0
1,201,052 UART: [idev] Sha1 KeyId Algorithm
1,209,650 UART: [idev] --
1,210,602 UART: [ldev] ++
1,210,770 UART: [ldev] CDI.KEYID = 6
1,211,133 UART: [ldev] SUBJECT.KEYID = 5
1,211,559 UART: [ldev] AUTHORITY.KEYID = 7
1,212,022 UART: [ldev] FE.KEYID = 1
1,217,476 UART: [ldev] Erasing FE.KEYID = 1
1,243,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,026 UART: [ldev] --
1,283,301 UART: [fwproc] Wait for Commands...
1,283,891 UART: [fwproc] Recv command 0x46574c44
1,284,619 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,406 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,576 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,951 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,924 >>> mbox cmd response: failed
1,187,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,930 >>> mbox cmd response: failed
1,187,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,936 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,096 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,057 UART:
192,420 UART: Running Caliptra ROM ...
193,544 UART:
193,691 UART: [state] CFI Enabled
264,720 UART: [state] LifecycleState = Unprovisioned
266,704 UART: [state] DebugLocked = No
268,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,382 UART: [kat] SHA2-256
444,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,622 UART: [kat] ++
455,162 UART: [kat] sha1
464,857 UART: [kat] SHA2-256
467,550 UART: [kat] SHA2-384
472,716 UART: [kat] SHA2-512-ACC
475,112 UART: [kat] ECC-384
2,765,861 UART: [kat] HMAC-384Kdf
2,798,735 UART: [kat] LMS
3,989,072 UART: [kat] --
3,993,569 UART: [cold-reset] ++
3,995,187 UART: [fht] Storing FHT @ 0x50003400
4,005,272 UART: [idev] ++
4,005,845 UART: [idev] CDI.KEYID = 6
4,006,872 UART: [idev] SUBJECT.KEYID = 7
4,008,039 UART: [idev] UDS.KEYID = 0
4,011,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,329 UART: [idev] Erasing UDS.KEYID = 0
7,343,584 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,162 UART: [idev] --
7,367,729 UART: [ldev] ++
7,368,531 UART: [ldev] CDI.KEYID = 6
7,369,452 UART: [ldev] SUBJECT.KEYID = 5
7,370,559 UART: [ldev] AUTHORITY.KEYID = 7
7,371,741 UART: [ldev] FE.KEYID = 1
7,419,874 UART: [ldev] Erasing FE.KEYID = 1
10,754,790 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,484 UART: [ldev] --
13,136,690 UART: [fwproc] Waiting for Commands...
13,139,850 UART: [fwproc] Received command 0x46574c44
13,142,047 UART: [fwproc] Received Image of size 118548 bytes
15,845,792 UART: ROM Fatal Error: 0x000B0034
15,849,296 >>> mbox cmd response: failed
15,849,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,850,034 >>> mbox cmd response: failed
15,850,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,850,612 >>> mbox cmd response: failed
Initializing fuses
2,059,709 writing to cptra_bootfsm_go
2,249,039 UART:
2,249,385 UART: Running Caliptra ROM ...
2,250,520 UART:
2,250,696 UART: [state] CFI Enabled
2,311,337 UART: [state] LifecycleState = Unprovisioned
2,313,239 UART: [state] DebugLocked = No
2,315,438 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,970 UART: [kat] SHA2-256
2,489,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,218 UART: [kat] ++
2,500,694 UART: [kat] sha1
2,512,389 UART: [kat] SHA2-256
2,515,086 UART: [kat] SHA2-384
2,520,057 UART: [kat] SHA2-512-ACC
2,522,414 UART: [kat] ECC-384
4,812,533 UART: [kat] HMAC-384Kdf
4,844,537 UART: [kat] LMS
6,034,845 UART: [kat] --
6,039,893 UART: [cold-reset] ++
6,041,569 UART: [fht] Storing FHT @ 0x50003400
6,052,703 UART: [idev] ++
6,053,281 UART: [idev] CDI.KEYID = 6
6,054,199 UART: [idev] SUBJECT.KEYID = 7
6,055,476 UART: [idev] UDS.KEYID = 0
6,057,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,207,013 UART: [idev] Erasing UDS.KEYID = 0
9,391,436 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,269 UART: [idev] --
9,418,242 UART: [ldev] ++
9,418,872 UART: [ldev] CDI.KEYID = 6
9,419,781 UART: [ldev] SUBJECT.KEYID = 5
9,421,072 UART: [ldev] AUTHORITY.KEYID = 7
9,422,266 UART: [ldev] FE.KEYID = 1
9,468,929 UART: [ldev] Erasing FE.KEYID = 1
12,800,173 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,106,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,121,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,155,111 UART: [ldev] --
15,159,027 UART: [fwproc] Waiting for Commands...
15,160,813 UART: [fwproc] Received command 0x46574c44
15,163,060 UART: [fwproc] Received Image of size 118548 bytes
19,262,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,343,367 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,416,556 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,744,308 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,788,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,541,190 >>> mbox cmd response: failed
15,541,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,542,218 >>> mbox cmd response: failed
15,542,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,542,816 >>> mbox cmd response: failed
Initializing fuses
2,058,081 writing to cptra_bootfsm_go
5,861,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,994,225 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,537 writing to cptra_bootfsm_go
192,743 UART:
193,146 UART: Running Caliptra ROM ...
194,298 UART:
603,816 UART: [state] CFI Enabled
620,666 UART: [state] LifecycleState = Unprovisioned
622,605 UART: [state] DebugLocked = No
624,011 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,086 UART: [kat] SHA2-256
797,872 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,432 UART: [kat] ++
808,889 UART: [kat] sha1
819,774 UART: [kat] SHA2-256
822,468 UART: [kat] SHA2-384
828,074 UART: [kat] SHA2-512-ACC
830,430 UART: [kat] ECC-384
3,114,352 UART: [kat] HMAC-384Kdf
3,125,681 UART: [kat] LMS
4,315,797 UART: [kat] --
4,322,317 UART: [cold-reset] ++
4,323,937 UART: [fht] Storing FHT @ 0x50003400
4,335,699 UART: [idev] ++
4,336,318 UART: [idev] CDI.KEYID = 6
4,337,250 UART: [idev] SUBJECT.KEYID = 7
4,338,479 UART: [idev] UDS.KEYID = 0
4,341,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,726 UART: [idev] Erasing UDS.KEYID = 0
7,628,577 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,200 UART: [idev] --
7,655,147 UART: [ldev] ++
7,655,719 UART: [ldev] CDI.KEYID = 6
7,656,742 UART: [ldev] SUBJECT.KEYID = 5
7,657,905 UART: [ldev] AUTHORITY.KEYID = 7
7,659,144 UART: [ldev] FE.KEYID = 1
7,669,093 UART: [ldev] Erasing FE.KEYID = 1
10,956,052 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,905 UART: [ldev] --
13,315,981 UART: [fwproc] Waiting for Commands...
13,317,708 UART: [fwproc] Received command 0x46574c44
13,319,957 UART: [fwproc] Received Image of size 118548 bytes
16,021,559 UART: ROM Fatal Error: 0x000B0034
16,025,075 >>> mbox cmd response: failed
16,025,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,025,792 >>> mbox cmd response: failed
16,026,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,378 >>> mbox cmd response: failed
Initializing fuses
2,057,016 writing to cptra_bootfsm_go
2,246,345 UART:
2,246,696 UART: Running Caliptra ROM ...
2,247,800 UART:
4,434,272 UART: [state] CFI Enabled
4,448,282 UART: [state] LifecycleState = Unprovisioned
4,450,199 UART: [state] DebugLocked = No
4,452,134 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,456,508 UART: [kat] SHA2-256
4,626,264 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,636,830 UART: [kat] ++
4,637,373 UART: [kat] sha1
4,646,867 UART: [kat] SHA2-256
4,649,563 UART: [kat] SHA2-384
4,656,037 UART: [kat] SHA2-512-ACC
4,658,397 UART: [kat] ECC-384
6,942,190 UART: [kat] HMAC-384Kdf
6,953,717 UART: [kat] LMS
8,143,847 UART: [kat] --
8,147,971 UART: [cold-reset] ++
8,150,145 UART: [fht] Storing FHT @ 0x50003400
8,161,527 UART: [idev] ++
8,162,108 UART: [idev] CDI.KEYID = 6
8,163,023 UART: [idev] SUBJECT.KEYID = 7
8,164,246 UART: [idev] UDS.KEYID = 0
8,166,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,315,586 UART: [idev] Erasing UDS.KEYID = 0
11,450,954 UART: [idev] Using Sha1 for KeyId Algorithm
11,472,283 UART: [idev] --
11,476,222 UART: [ldev] ++
11,476,802 UART: [ldev] CDI.KEYID = 6
11,477,747 UART: [ldev] SUBJECT.KEYID = 5
11,479,005 UART: [ldev] AUTHORITY.KEYID = 7
11,480,116 UART: [ldev] FE.KEYID = 1
11,492,411 UART: [ldev] Erasing FE.KEYID = 1
14,783,914 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,076,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,091,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,106,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,120,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,140,151 UART: [ldev] --
17,145,311 UART: [fwproc] Waiting for Commands...
17,148,713 UART: [fwproc] Received command 0x46574c44
17,150,904 UART: [fwproc] Received Image of size 118548 bytes
21,251,579 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,326,415 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,399,589 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,727,513 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,129,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,769,104 >>> mbox cmd response: failed
15,769,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,770,104 >>> mbox cmd response: failed
15,770,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,770,675 >>> mbox cmd response: failed
Initializing fuses
2,068,136 writing to cptra_bootfsm_go
8,231,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,252,493 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
192,396 UART:
192,748 UART: Running Caliptra ROM ...
193,996 UART:
194,159 UART: [state] CFI Enabled
264,706 UART: [state] LifecycleState = Unprovisioned
266,628 UART: [state] DebugLocked = No
269,126 UART: [state] WD Timer not started. Device not locked for debugging
272,501 UART: [kat] SHA2-256
452,165 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,926 UART: [kat] ++
463,384 UART: [kat] sha1
475,568 UART: [kat] SHA2-256
478,289 UART: [kat] SHA2-384
484,496 UART: [kat] SHA2-512-ACC
486,847 UART: [kat] ECC-384
2,945,934 UART: [kat] HMAC-384Kdf
2,968,716 UART: [kat] LMS
3,445,258 UART: [kat] --
3,449,551 UART: [cold-reset] ++
3,451,332 UART: [fht] FHT @ 0x50003400
3,462,153 UART: [idev] ++
3,462,791 UART: [idev] CDI.KEYID = 6
3,463,710 UART: [idev] SUBJECT.KEYID = 7
3,464,928 UART: [idev] UDS.KEYID = 0
3,467,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,905 UART: [idev] Erasing UDS.KEYID = 0
5,984,715 UART: [idev] Sha1 KeyId Algorithm
6,007,819 UART: [idev] --
6,013,560 UART: [ldev] ++
6,014,142 UART: [ldev] CDI.KEYID = 6
6,015,034 UART: [ldev] SUBJECT.KEYID = 5
6,016,258 UART: [ldev] AUTHORITY.KEYID = 7
6,017,531 UART: [ldev] FE.KEYID = 1
6,054,511 UART: [ldev] Erasing FE.KEYID = 1
8,562,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,571 UART: [ldev] --
10,369,518 UART: [fwproc] Wait for Commands...
10,371,293 UART: [fwproc] Recv command 0x46574c44
10,373,288 UART: [fwproc] Recv'd Img size: 118548 bytes
12,434,206 UART: ROM Fatal Error: 0x000B0034
12,437,447 >>> mbox cmd response: failed
12,437,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,438,101 >>> mbox cmd response: failed
12,438,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,438,678 >>> mbox cmd response: failed
Initializing fuses
2,065,958 writing to cptra_bootfsm_go
2,255,254 UART:
2,255,599 UART: Running Caliptra ROM ...
2,256,648 UART:
2,256,807 UART: [state] CFI Enabled
2,324,348 UART: [state] LifecycleState = Unprovisioned
2,326,290 UART: [state] DebugLocked = No
2,328,739 UART: [state] WD Timer not started. Device not locked for debugging
2,332,648 UART: [kat] SHA2-256
2,512,343 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,523,099 UART: [kat] ++
2,523,564 UART: [kat] sha1
2,534,996 UART: [kat] SHA2-256
2,537,649 UART: [kat] SHA2-384
2,543,343 UART: [kat] SHA2-512-ACC
2,545,759 UART: [kat] ECC-384
5,011,546 UART: [kat] HMAC-384Kdf
5,034,856 UART: [kat] LMS
5,511,350 UART: [kat] --
5,517,395 UART: [cold-reset] ++
5,519,114 UART: [fht] FHT @ 0x50003400
5,530,855 UART: [idev] ++
5,531,442 UART: [idev] CDI.KEYID = 6
5,532,355 UART: [idev] SUBJECT.KEYID = 7
5,533,628 UART: [idev] UDS.KEYID = 0
5,535,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,685,001 UART: [idev] Erasing UDS.KEYID = 0
8,047,976 UART: [idev] Sha1 KeyId Algorithm
8,071,700 UART: [idev] --
8,076,357 UART: [ldev] ++
8,076,958 UART: [ldev] CDI.KEYID = 6
8,077,932 UART: [ldev] SUBJECT.KEYID = 5
8,079,047 UART: [ldev] AUTHORITY.KEYID = 7
8,080,294 UART: [ldev] FE.KEYID = 1
8,118,931 UART: [ldev] Erasing FE.KEYID = 1
10,626,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,361,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,377,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,393,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,408,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,431,644 UART: [ldev] --
12,436,524 UART: [fwproc] Wait for Commands...
12,439,339 UART: [fwproc] Recv command 0x46574c44
12,441,336 UART: [fwproc] Recv'd Img size: 118548 bytes
15,925,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,001,941 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,074,969 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,404,003 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,460,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,335,959 >>> mbox cmd response: failed
12,336,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,336,959 >>> mbox cmd response: failed
12,337,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,337,530 >>> mbox cmd response: failed
Initializing fuses
2,062,542 writing to cptra_bootfsm_go
5,526,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,302,113 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,495 writing to cptra_bootfsm_go
192,786 UART:
193,140 UART: Running Caliptra ROM ...
194,346 UART:
603,880 UART: [state] CFI Enabled
619,805 UART: [state] LifecycleState = Unprovisioned
621,693 UART: [state] DebugLocked = No
623,240 UART: [state] WD Timer not started. Device not locked for debugging
627,861 UART: [kat] SHA2-256
807,483 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,305 UART: [kat] ++
818,749 UART: [kat] sha1
830,158 UART: [kat] SHA2-256
832,841 UART: [kat] SHA2-384
839,627 UART: [kat] SHA2-512-ACC
842,031 UART: [kat] ECC-384
3,286,722 UART: [kat] HMAC-384Kdf
3,299,733 UART: [kat] LMS
3,776,219 UART: [kat] --
3,780,864 UART: [cold-reset] ++
3,782,907 UART: [fht] FHT @ 0x50003400
3,795,674 UART: [idev] ++
3,796,306 UART: [idev] CDI.KEYID = 6
3,797,234 UART: [idev] SUBJECT.KEYID = 7
3,798,451 UART: [idev] UDS.KEYID = 0
3,800,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,950,024 UART: [idev] Erasing UDS.KEYID = 0
6,277,423 UART: [idev] Sha1 KeyId Algorithm
6,300,390 UART: [idev] --
6,305,503 UART: [ldev] ++
6,306,081 UART: [ldev] CDI.KEYID = 6
6,307,028 UART: [ldev] SUBJECT.KEYID = 5
6,308,248 UART: [ldev] AUTHORITY.KEYID = 7
6,309,510 UART: [ldev] FE.KEYID = 1
6,322,459 UART: [ldev] Erasing FE.KEYID = 1
8,802,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,520,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,567,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,588,133 UART: [ldev] --
10,593,236 UART: [fwproc] Wait for Commands...
10,595,660 UART: [fwproc] Recv command 0x46574c44
10,597,652 UART: [fwproc] Recv'd Img size: 118548 bytes
12,669,495 UART: ROM Fatal Error: 0x000B0034
12,672,724 >>> mbox cmd response: failed
12,673,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,673,487 >>> mbox cmd response: failed
12,673,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,674,072 >>> mbox cmd response: failed
Initializing fuses
2,067,217 writing to cptra_bootfsm_go
2,256,526 UART:
2,256,873 UART: Running Caliptra ROM ...
2,258,016 UART:
7,775,455 UART: [state] CFI Enabled
7,792,132 UART: [state] LifecycleState = Unprovisioned
7,794,058 UART: [state] DebugLocked = No
7,795,620 UART: [state] WD Timer not started. Device not locked for debugging
7,800,400 UART: [kat] SHA2-256
7,980,026 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,990,821 UART: [kat] ++
7,991,317 UART: [kat] sha1
8,001,690 UART: [kat] SHA2-256
8,004,408 UART: [kat] SHA2-384
8,009,274 UART: [kat] SHA2-512-ACC
8,011,639 UART: [kat] ECC-384
10,453,293 UART: [kat] HMAC-384Kdf
10,466,062 UART: [kat] LMS
10,942,576 UART: [kat] --
10,948,315 UART: [cold-reset] ++
10,949,715 UART: [fht] FHT @ 0x50003400
10,961,186 UART: [idev] ++
10,961,813 UART: [idev] CDI.KEYID = 6
10,962,722 UART: [idev] SUBJECT.KEYID = 7
10,963,991 UART: [idev] UDS.KEYID = 0
10,966,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,115,407 UART: [idev] Erasing UDS.KEYID = 0
13,442,193 UART: [idev] Sha1 KeyId Algorithm
13,464,895 UART: [idev] --
13,468,756 UART: [ldev] ++
13,469,333 UART: [ldev] CDI.KEYID = 6
13,470,220 UART: [ldev] SUBJECT.KEYID = 5
13,471,433 UART: [ldev] AUTHORITY.KEYID = 7
13,472,725 UART: [ldev] FE.KEYID = 1
13,481,779 UART: [ldev] Erasing FE.KEYID = 1
15,964,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,682,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,697,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,713,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,729,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,750,751 UART: [ldev] --
17,756,880 UART: [fwproc] Wait for Commands...
17,759,091 UART: [fwproc] Recv command 0x46574c44
17,761,087 UART: [fwproc] Recv'd Img size: 118548 bytes
21,251,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,335,228 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,408,243 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,735,644 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,512 writing to cptra_bootfsm_go
3,781,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,534,921 >>> mbox cmd response: failed
12,535,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,535,930 >>> mbox cmd response: failed
12,536,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,536,498 >>> mbox cmd response: failed
Initializing fuses
2,061,737 writing to cptra_bootfsm_go
11,108,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,780,195 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,219 UART:
192,576 UART: Running Caliptra ROM ...
193,701 UART:
193,847 UART: [state] CFI Enabled
263,615 UART: [state] LifecycleState = Unprovisioned
266,043 UART: [state] DebugLocked = No
268,698 UART: [state] WD Timer not started. Device not locked for debugging
274,059 UART: [kat] SHA2-256
463,965 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,704 UART: [kat] ++
475,185 UART: [kat] sha1
487,751 UART: [kat] SHA2-256
490,762 UART: [kat] SHA2-384
497,023 UART: [kat] SHA2-512-ACC
499,645 UART: [kat] ECC-384
2,947,548 UART: [kat] HMAC-384Kdf
2,970,802 UART: [kat] LMS
3,502,572 UART: [kat] --
3,506,103 UART: [cold-reset] ++
3,508,373 UART: [fht] FHT @ 0x50003400
3,519,957 UART: [idev] ++
3,520,647 UART: [idev] CDI.KEYID = 6
3,521,697 UART: [idev] SUBJECT.KEYID = 7
3,522,809 UART: [idev] UDS.KEYID = 0
3,525,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,832 UART: [idev] Erasing UDS.KEYID = 0
6,028,558 UART: [idev] Sha1 KeyId Algorithm
6,050,123 UART: [idev] --
6,056,531 UART: [ldev] ++
6,057,230 UART: [ldev] CDI.KEYID = 6
6,058,152 UART: [ldev] SUBJECT.KEYID = 5
6,059,323 UART: [ldev] AUTHORITY.KEYID = 7
6,060,508 UART: [ldev] FE.KEYID = 1
6,099,406 UART: [ldev] Erasing FE.KEYID = 1
8,609,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,208 UART: [ldev] --
10,414,534 UART: [fwproc] Wait for Commands...
10,417,558 UART: [fwproc] Recv command 0x46574c44
10,419,880 UART: [fwproc] Recv'd Img size: 118548 bytes
12,500,382 UART: ROM Fatal Error: 0x000B0034
12,504,046 >>> mbox cmd response: failed
12,504,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,504,804 >>> mbox cmd response: failed
12,505,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,505,372 >>> mbox cmd response: failed
Initializing fuses
2,069,381 writing to cptra_bootfsm_go
2,258,711 UART:
2,259,088 UART: Running Caliptra ROM ...
2,260,231 UART:
2,260,399 UART: [state] CFI Enabled
2,329,770 UART: [state] LifecycleState = Unprovisioned
2,332,112 UART: [state] DebugLocked = No
2,334,473 UART: [state] WD Timer not started. Device not locked for debugging
2,338,709 UART: [kat] SHA2-256
2,528,614 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,539,362 UART: [kat] ++
2,539,831 UART: [kat] sha1
2,550,379 UART: [kat] SHA2-256
2,553,407 UART: [kat] SHA2-384
2,559,242 UART: [kat] SHA2-512-ACC
2,561,822 UART: [kat] ECC-384
5,011,585 UART: [kat] HMAC-384Kdf
5,035,826 UART: [kat] LMS
5,567,572 UART: [kat] --
5,570,998 UART: [cold-reset] ++
5,572,078 UART: [fht] FHT @ 0x50003400
5,584,045 UART: [idev] ++
5,584,737 UART: [idev] CDI.KEYID = 6
5,585,762 UART: [idev] SUBJECT.KEYID = 7
5,586,877 UART: [idev] UDS.KEYID = 0
5,589,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,738,493 UART: [idev] Erasing UDS.KEYID = 0
8,094,079 UART: [idev] Sha1 KeyId Algorithm
8,116,050 UART: [idev] --
8,121,777 UART: [ldev] ++
8,122,461 UART: [ldev] CDI.KEYID = 6
8,123,373 UART: [ldev] SUBJECT.KEYID = 5
8,124,536 UART: [ldev] AUTHORITY.KEYID = 7
8,125,776 UART: [ldev] FE.KEYID = 1
8,163,646 UART: [ldev] Erasing FE.KEYID = 1
10,675,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,406,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,421,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,436,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,451,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,472,846 UART: [ldev] --
12,478,711 UART: [fwproc] Wait for Commands...
12,480,433 UART: [fwproc] Recv command 0x46574c44
12,482,695 UART: [fwproc] Recv'd Img size: 118548 bytes
15,981,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,059,872 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,183,491 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,744,603 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,795 writing to cptra_bootfsm_go
3,441,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,306,436 >>> mbox cmd response: failed
12,306,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,307,333 >>> mbox cmd response: failed
12,307,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,307,914 >>> mbox cmd response: failed
Initializing fuses
2,067,503 writing to cptra_bootfsm_go
5,494,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,919,643 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,077 writing to cptra_bootfsm_go
193,251 UART:
193,612 UART: Running Caliptra ROM ...
194,752 UART:
604,211 UART: [state] CFI Enabled
617,082 UART: [state] LifecycleState = Unprovisioned
619,474 UART: [state] DebugLocked = No
621,134 UART: [state] WD Timer not started. Device not locked for debugging
625,520 UART: [kat] SHA2-256
815,432 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,225 UART: [kat] ++
826,824 UART: [kat] sha1
837,713 UART: [kat] SHA2-256
840,748 UART: [kat] SHA2-384
845,168 UART: [kat] SHA2-512-ACC
847,792 UART: [kat] ECC-384
3,289,517 UART: [kat] HMAC-384Kdf
3,304,190 UART: [kat] LMS
3,836,012 UART: [kat] --
3,841,487 UART: [cold-reset] ++
3,843,241 UART: [fht] FHT @ 0x50003400
3,855,204 UART: [idev] ++
3,855,886 UART: [idev] CDI.KEYID = 6
3,856,827 UART: [idev] SUBJECT.KEYID = 7
3,858,057 UART: [idev] UDS.KEYID = 0
3,860,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,897 UART: [idev] Erasing UDS.KEYID = 0
6,337,880 UART: [idev] Sha1 KeyId Algorithm
6,359,667 UART: [idev] --
6,364,657 UART: [ldev] ++
6,365,342 UART: [ldev] CDI.KEYID = 6
6,366,229 UART: [ldev] SUBJECT.KEYID = 5
6,367,449 UART: [ldev] AUTHORITY.KEYID = 7
6,368,632 UART: [ldev] FE.KEYID = 1
6,380,718 UART: [ldev] Erasing FE.KEYID = 1
8,863,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,036 UART: [ldev] --
10,652,674 UART: [fwproc] Wait for Commands...
10,655,860 UART: [fwproc] Recv command 0x46574c44
10,658,130 UART: [fwproc] Recv'd Img size: 118548 bytes
12,743,401 UART: ROM Fatal Error: 0x000B0034
12,747,028 >>> mbox cmd response: failed
12,747,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,747,739 >>> mbox cmd response: failed
12,748,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,358 >>> mbox cmd response: failed
Initializing fuses
2,062,562 writing to cptra_bootfsm_go
2,251,842 UART:
2,252,200 UART: Running Caliptra ROM ...
2,253,253 UART:
7,703,973 UART: [state] CFI Enabled
7,718,090 UART: [state] LifecycleState = Unprovisioned
7,720,457 UART: [state] DebugLocked = No
7,723,204 UART: [state] WD Timer not started. Device not locked for debugging
7,727,374 UART: [kat] SHA2-256
7,917,266 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,928,070 UART: [kat] ++
7,928,576 UART: [kat] sha1
7,940,011 UART: [kat] SHA2-256
7,943,037 UART: [kat] SHA2-384
7,949,360 UART: [kat] SHA2-512-ACC
7,951,944 UART: [kat] ECC-384
10,391,161 UART: [kat] HMAC-384Kdf
10,403,075 UART: [kat] LMS
10,934,878 UART: [kat] --
10,939,702 UART: [cold-reset] ++
10,941,799 UART: [fht] FHT @ 0x50003400
10,953,486 UART: [idev] ++
10,954,171 UART: [idev] CDI.KEYID = 6
10,955,137 UART: [idev] SUBJECT.KEYID = 7
10,956,318 UART: [idev] UDS.KEYID = 0
10,958,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,107,681 UART: [idev] Erasing UDS.KEYID = 0
13,435,501 UART: [idev] Sha1 KeyId Algorithm
13,458,751 UART: [idev] --
13,463,175 UART: [ldev] ++
13,463,857 UART: [ldev] CDI.KEYID = 6
13,464,744 UART: [ldev] SUBJECT.KEYID = 5
13,465,956 UART: [ldev] AUTHORITY.KEYID = 7
13,467,132 UART: [ldev] FE.KEYID = 1
13,479,938 UART: [ldev] Erasing FE.KEYID = 1
15,961,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,681,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,697,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,712,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,727,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,748,020 UART: [ldev] --
17,753,957 UART: [fwproc] Wait for Commands...
17,756,934 UART: [fwproc] Recv command 0x46574c44
17,759,262 UART: [fwproc] Recv'd Img size: 118548 bytes
21,257,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,331,881 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,455,514 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,015,794 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,756,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,513,778 >>> mbox cmd response: failed
12,514,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,514,746 >>> mbox cmd response: failed
12,515,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,515,327 >>> mbox cmd response: failed
Initializing fuses
2,062,222 writing to cptra_bootfsm_go
11,106,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,388,781 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,957 UART: [kat] SHA2-256
881,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,003 UART: [kat] ++
886,155 UART: [kat] sha1
890,317 UART: [kat] SHA2-256
892,255 UART: [kat] SHA2-384
894,982 UART: [kat] SHA2-512-ACC
896,883 UART: [kat] ECC-384
902,496 UART: [kat] HMAC-384Kdf
907,036 UART: [kat] LMS
1,475,232 UART: [kat] --
1,476,049 UART: [cold-reset] ++
1,476,577 UART: [fht] Storing FHT @ 0x50003400
1,479,394 UART: [idev] ++
1,479,562 UART: [idev] CDI.KEYID = 6
1,479,922 UART: [idev] SUBJECT.KEYID = 7
1,480,346 UART: [idev] UDS.KEYID = 0
1,480,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,074 UART: [idev] Erasing UDS.KEYID = 0
1,505,416 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,950 UART: [idev] --
1,515,121 UART: [ldev] ++
1,515,289 UART: [ldev] CDI.KEYID = 6
1,515,652 UART: [ldev] SUBJECT.KEYID = 5
1,516,078 UART: [ldev] AUTHORITY.KEYID = 7
1,516,541 UART: [ldev] FE.KEYID = 1
1,521,653 UART: [ldev] Erasing FE.KEYID = 1
1,547,158 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,020 UART: [ldev] --
1,586,367 UART: [fwproc] Waiting for Commands...
1,587,166 UART: [fwproc] Received command 0x46574c44
1,587,957 UART: [fwproc] Received Image of size 118548 bytes
1,635,288 UART: ROM Fatal Error: 0x000B0034
1,636,445 >>> mbox cmd response: failed
1,636,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,451 >>> mbox cmd response: failed
1,636,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,319 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,857 UART: [kat] SHA2-256
881,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,903 UART: [kat] ++
886,055 UART: [kat] sha1
890,329 UART: [kat] SHA2-256
892,267 UART: [kat] SHA2-384
894,982 UART: [kat] SHA2-512-ACC
896,883 UART: [kat] ECC-384
902,554 UART: [kat] HMAC-384Kdf
907,344 UART: [kat] LMS
1,475,540 UART: [kat] --
1,476,287 UART: [cold-reset] ++
1,476,815 UART: [fht] Storing FHT @ 0x50003400
1,479,798 UART: [idev] ++
1,479,966 UART: [idev] CDI.KEYID = 6
1,480,326 UART: [idev] SUBJECT.KEYID = 7
1,480,750 UART: [idev] UDS.KEYID = 0
1,481,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,728 UART: [idev] Erasing UDS.KEYID = 0
1,505,218 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,788 UART: [idev] --
1,514,605 UART: [ldev] ++
1,514,773 UART: [ldev] CDI.KEYID = 6
1,515,136 UART: [ldev] SUBJECT.KEYID = 5
1,515,562 UART: [ldev] AUTHORITY.KEYID = 7
1,516,025 UART: [ldev] FE.KEYID = 1
1,521,263 UART: [ldev] Erasing FE.KEYID = 1
1,546,450 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,774 UART: [ldev] --
1,586,053 UART: [fwproc] Waiting for Commands...
1,586,882 UART: [fwproc] Received command 0x46574c44
1,587,673 UART: [fwproc] Received Image of size 118548 bytes
2,932,676 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,690 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,908 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,275 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,376 >>> mbox cmd response: failed
1,489,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,382 >>> mbox cmd response: failed
1,489,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,113 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,270 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,922 UART: [kat] SHA2-256
881,853 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,968 UART: [kat] ++
886,120 UART: [kat] sha1
890,210 UART: [kat] SHA2-256
892,148 UART: [kat] SHA2-384
894,675 UART: [kat] SHA2-512-ACC
896,576 UART: [kat] ECC-384
902,131 UART: [kat] HMAC-384Kdf
906,863 UART: [kat] LMS
1,475,059 UART: [kat] --
1,476,084 UART: [cold-reset] ++
1,476,522 UART: [fht] Storing FHT @ 0x50003400
1,479,249 UART: [idev] ++
1,479,417 UART: [idev] CDI.KEYID = 6
1,479,777 UART: [idev] SUBJECT.KEYID = 7
1,480,201 UART: [idev] UDS.KEYID = 0
1,480,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,095 UART: [idev] Erasing UDS.KEYID = 0
1,504,787 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,315 UART: [idev] --
1,514,424 UART: [ldev] ++
1,514,592 UART: [ldev] CDI.KEYID = 6
1,514,955 UART: [ldev] SUBJECT.KEYID = 5
1,515,381 UART: [ldev] AUTHORITY.KEYID = 7
1,515,844 UART: [ldev] FE.KEYID = 1
1,520,800 UART: [ldev] Erasing FE.KEYID = 1
1,546,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,085 UART: [ldev] --
1,585,390 UART: [fwproc] Waiting for Commands...
1,586,155 UART: [fwproc] Received command 0x46574c44
1,586,946 UART: [fwproc] Received Image of size 118548 bytes
1,634,723 UART: ROM Fatal Error: 0x000B0034
1,635,880 >>> mbox cmd response: failed
1,635,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,886 >>> mbox cmd response: failed
1,635,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,892 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,646 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,302 UART: [kat] SHA2-256
882,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,348 UART: [kat] ++
886,500 UART: [kat] sha1
890,862 UART: [kat] SHA2-256
892,800 UART: [kat] SHA2-384
895,521 UART: [kat] SHA2-512-ACC
897,422 UART: [kat] ECC-384
903,111 UART: [kat] HMAC-384Kdf
907,835 UART: [kat] LMS
1,476,031 UART: [kat] --
1,476,942 UART: [cold-reset] ++
1,477,500 UART: [fht] Storing FHT @ 0x50003400
1,480,309 UART: [idev] ++
1,480,477 UART: [idev] CDI.KEYID = 6
1,480,837 UART: [idev] SUBJECT.KEYID = 7
1,481,261 UART: [idev] UDS.KEYID = 0
1,481,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,415 UART: [idev] Erasing UDS.KEYID = 0
1,505,933 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,631 UART: [idev] --
1,515,682 UART: [ldev] ++
1,515,850 UART: [ldev] CDI.KEYID = 6
1,516,213 UART: [ldev] SUBJECT.KEYID = 5
1,516,639 UART: [ldev] AUTHORITY.KEYID = 7
1,517,102 UART: [ldev] FE.KEYID = 1
1,522,420 UART: [ldev] Erasing FE.KEYID = 1
1,548,013 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,655 UART: [ldev] --
1,586,950 UART: [fwproc] Waiting for Commands...
1,587,763 UART: [fwproc] Received command 0x46574c44
1,588,554 UART: [fwproc] Received Image of size 118548 bytes
2,932,951 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,341 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,559 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,798 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,255 >>> mbox cmd response: failed
1,487,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,261 >>> mbox cmd response: failed
1,487,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,774 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,501 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,144 UART: [kat] SHA2-256
890,694 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,798 UART: [kat] ++
894,950 UART: [kat] sha1
899,230 UART: [kat] SHA2-256
901,170 UART: [kat] SHA2-384
903,829 UART: [kat] SHA2-512-ACC
905,730 UART: [kat] ECC-384
914,843 UART: [kat] HMAC-384Kdf
919,383 UART: [kat] LMS
1,167,695 UART: [kat] --
1,168,554 UART: [cold-reset] ++
1,169,020 UART: [fht] FHT @ 0x50003400
1,171,594 UART: [idev] ++
1,171,762 UART: [idev] CDI.KEYID = 6
1,172,123 UART: [idev] SUBJECT.KEYID = 7
1,172,548 UART: [idev] UDS.KEYID = 0
1,172,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,597 UART: [idev] Erasing UDS.KEYID = 0
1,197,925 UART: [idev] Sha1 KeyId Algorithm
1,206,781 UART: [idev] --
1,207,822 UART: [ldev] ++
1,207,990 UART: [ldev] CDI.KEYID = 6
1,208,354 UART: [ldev] SUBJECT.KEYID = 5
1,208,781 UART: [ldev] AUTHORITY.KEYID = 7
1,209,244 UART: [ldev] FE.KEYID = 1
1,214,450 UART: [ldev] Erasing FE.KEYID = 1
1,240,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,524 UART: [ldev] --
1,279,847 UART: [fwproc] Wait for Commands...
1,280,582 UART: [fwproc] Recv command 0x46574c44
1,281,315 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,918 UART: ROM Fatal Error: 0x000B0034
1,329,075 >>> mbox cmd response: failed
1,329,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,081 >>> mbox cmd response: failed
1,329,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
891,480 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,584 UART: [kat] ++
895,736 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,170,010 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,173,166 UART: [idev] ++
1,173,334 UART: [idev] CDI.KEYID = 6
1,173,695 UART: [idev] SUBJECT.KEYID = 7
1,174,120 UART: [idev] UDS.KEYID = 0
1,174,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,127 UART: [idev] Erasing UDS.KEYID = 0
1,199,109 UART: [idev] Sha1 KeyId Algorithm
1,208,089 UART: [idev] --
1,209,244 UART: [ldev] ++
1,209,412 UART: [ldev] CDI.KEYID = 6
1,209,776 UART: [ldev] SUBJECT.KEYID = 5
1,210,203 UART: [ldev] AUTHORITY.KEYID = 7
1,210,666 UART: [ldev] FE.KEYID = 1
1,215,812 UART: [ldev] Erasing FE.KEYID = 1
1,242,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,370 UART: [ldev] --
1,280,699 UART: [fwproc] Wait for Commands...
1,281,400 UART: [fwproc] Recv command 0x46574c44
1,282,133 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,044 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,219 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,608 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,136 >>> mbox cmd response: failed
1,187,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,142 >>> mbox cmd response: failed
1,187,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,231 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
891,373 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
900,101 UART: [kat] SHA2-256
902,041 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,724 UART: [kat] HMAC-384Kdf
921,418 UART: [kat] LMS
1,169,730 UART: [kat] --
1,170,541 UART: [cold-reset] ++
1,170,905 UART: [fht] FHT @ 0x50003400
1,173,537 UART: [idev] ++
1,173,705 UART: [idev] CDI.KEYID = 6
1,174,066 UART: [idev] SUBJECT.KEYID = 7
1,174,491 UART: [idev] UDS.KEYID = 0
1,174,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,790 UART: [idev] Erasing UDS.KEYID = 0
1,200,086 UART: [idev] Sha1 KeyId Algorithm
1,208,960 UART: [idev] --
1,209,913 UART: [ldev] ++
1,210,081 UART: [ldev] CDI.KEYID = 6
1,210,445 UART: [ldev] SUBJECT.KEYID = 5
1,210,872 UART: [ldev] AUTHORITY.KEYID = 7
1,211,335 UART: [ldev] FE.KEYID = 1
1,216,621 UART: [ldev] Erasing FE.KEYID = 1
1,242,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,397 UART: [ldev] --
1,281,624 UART: [fwproc] Wait for Commands...
1,282,305 UART: [fwproc] Recv command 0x46574c44
1,283,038 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,803 UART: ROM Fatal Error: 0x000B0034
1,331,960 >>> mbox cmd response: failed
1,331,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,966 >>> mbox cmd response: failed
1,331,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,972 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,463 UART: [kat] SHA2-256
891,013 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,117 UART: [kat] ++
895,269 UART: [kat] sha1
899,511 UART: [kat] SHA2-256
901,451 UART: [kat] SHA2-384
904,310 UART: [kat] SHA2-512-ACC
906,211 UART: [kat] ECC-384
915,626 UART: [kat] HMAC-384Kdf
920,290 UART: [kat] LMS
1,168,602 UART: [kat] --
1,169,507 UART: [cold-reset] ++
1,169,989 UART: [fht] FHT @ 0x50003400
1,172,561 UART: [idev] ++
1,172,729 UART: [idev] CDI.KEYID = 6
1,173,090 UART: [idev] SUBJECT.KEYID = 7
1,173,515 UART: [idev] UDS.KEYID = 0
1,173,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,130 UART: [idev] Erasing UDS.KEYID = 0
1,197,914 UART: [idev] Sha1 KeyId Algorithm
1,206,654 UART: [idev] --
1,207,821 UART: [ldev] ++
1,207,989 UART: [ldev] CDI.KEYID = 6
1,208,353 UART: [ldev] SUBJECT.KEYID = 5
1,208,780 UART: [ldev] AUTHORITY.KEYID = 7
1,209,243 UART: [ldev] FE.KEYID = 1
1,214,423 UART: [ldev] Erasing FE.KEYID = 1
1,240,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,693 UART: [ldev] --
1,279,936 UART: [fwproc] Wait for Commands...
1,280,685 UART: [fwproc] Recv command 0x46574c44
1,281,418 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,893 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,068 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,397 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,027 >>> mbox cmd response: failed
1,186,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,033 >>> mbox cmd response: failed
1,186,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,039 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,320 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
893,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,427 UART: [kat] ++
897,579 UART: [kat] sha1
901,841 UART: [kat] SHA2-256
903,781 UART: [kat] SHA2-384
906,396 UART: [kat] SHA2-512-ACC
908,297 UART: [kat] ECC-384
918,092 UART: [kat] HMAC-384Kdf
922,618 UART: [kat] LMS
1,170,946 UART: [kat] --
1,171,693 UART: [cold-reset] ++
1,172,069 UART: [fht] FHT @ 0x50003400
1,174,662 UART: [idev] ++
1,174,830 UART: [idev] CDI.KEYID = 6
1,175,190 UART: [idev] SUBJECT.KEYID = 7
1,175,614 UART: [idev] UDS.KEYID = 0
1,175,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,546 UART: [idev] Erasing UDS.KEYID = 0
1,200,789 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,455 UART: [ldev] ++
1,210,623 UART: [ldev] CDI.KEYID = 6
1,210,986 UART: [ldev] SUBJECT.KEYID = 5
1,211,412 UART: [ldev] AUTHORITY.KEYID = 7
1,211,875 UART: [ldev] FE.KEYID = 1
1,217,289 UART: [ldev] Erasing FE.KEYID = 1
1,243,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,153 UART: [ldev] --
1,282,596 UART: [fwproc] Wait for Commands...
1,283,188 UART: [fwproc] Recv command 0x46574c44
1,283,916 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,889 UART: ROM Fatal Error: 0x000B0034
1,333,046 >>> mbox cmd response: failed
1,333,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,052 >>> mbox cmd response: failed
1,333,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,058 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,219 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
893,102 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,227 UART: [kat] ++
897,379 UART: [kat] sha1
901,577 UART: [kat] SHA2-256
903,517 UART: [kat] SHA2-384
906,334 UART: [kat] SHA2-512-ACC
908,235 UART: [kat] ECC-384
917,940 UART: [kat] HMAC-384Kdf
922,516 UART: [kat] LMS
1,170,844 UART: [kat] --
1,171,607 UART: [cold-reset] ++
1,172,099 UART: [fht] FHT @ 0x50003400
1,174,754 UART: [idev] ++
1,174,922 UART: [idev] CDI.KEYID = 6
1,175,282 UART: [idev] SUBJECT.KEYID = 7
1,175,706 UART: [idev] UDS.KEYID = 0
1,176,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,544 UART: [idev] Erasing UDS.KEYID = 0
1,199,959 UART: [idev] Sha1 KeyId Algorithm
1,208,631 UART: [idev] --
1,209,661 UART: [ldev] ++
1,209,829 UART: [ldev] CDI.KEYID = 6
1,210,192 UART: [ldev] SUBJECT.KEYID = 5
1,210,618 UART: [ldev] AUTHORITY.KEYID = 7
1,211,081 UART: [ldev] FE.KEYID = 1
1,216,103 UART: [ldev] Erasing FE.KEYID = 1
1,242,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,783 UART: [ldev] --
1,282,160 UART: [fwproc] Wait for Commands...
1,282,900 UART: [fwproc] Recv command 0x46574c44
1,283,628 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,781 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,158 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,415 >>> mbox cmd response: failed
1,185,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,421 >>> mbox cmd response: failed
1,185,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,079 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
893,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,774 UART: [kat] ++
897,926 UART: [kat] sha1
902,180 UART: [kat] SHA2-256
904,120 UART: [kat] SHA2-384
906,755 UART: [kat] SHA2-512-ACC
908,656 UART: [kat] ECC-384
918,483 UART: [kat] HMAC-384Kdf
923,207 UART: [kat] LMS
1,171,535 UART: [kat] --
1,172,322 UART: [cold-reset] ++
1,172,802 UART: [fht] FHT @ 0x50003400
1,175,443 UART: [idev] ++
1,175,611 UART: [idev] CDI.KEYID = 6
1,175,971 UART: [idev] SUBJECT.KEYID = 7
1,176,395 UART: [idev] UDS.KEYID = 0
1,176,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,407 UART: [idev] Erasing UDS.KEYID = 0
1,201,516 UART: [idev] Sha1 KeyId Algorithm
1,209,990 UART: [idev] --
1,211,010 UART: [ldev] ++
1,211,178 UART: [ldev] CDI.KEYID = 6
1,211,541 UART: [ldev] SUBJECT.KEYID = 5
1,211,967 UART: [ldev] AUTHORITY.KEYID = 7
1,212,430 UART: [ldev] FE.KEYID = 1
1,217,702 UART: [ldev] Erasing FE.KEYID = 1
1,244,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,534 UART: [ldev] --
1,283,999 UART: [fwproc] Wait for Commands...
1,284,819 UART: [fwproc] Recv command 0x46574c44
1,285,547 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,878 UART: ROM Fatal Error: 0x000B0034
1,334,035 >>> mbox cmd response: failed
1,334,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,041 >>> mbox cmd response: failed
1,334,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
893,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,714 UART: [kat] ++
897,866 UART: [kat] sha1
902,146 UART: [kat] SHA2-256
904,086 UART: [kat] SHA2-384
906,819 UART: [kat] SHA2-512-ACC
908,720 UART: [kat] ECC-384
918,591 UART: [kat] HMAC-384Kdf
923,125 UART: [kat] LMS
1,171,453 UART: [kat] --
1,172,540 UART: [cold-reset] ++
1,173,052 UART: [fht] FHT @ 0x50003400
1,175,709 UART: [idev] ++
1,175,877 UART: [idev] CDI.KEYID = 6
1,176,237 UART: [idev] SUBJECT.KEYID = 7
1,176,661 UART: [idev] UDS.KEYID = 0
1,177,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,503 UART: [idev] Erasing UDS.KEYID = 0
1,202,068 UART: [idev] Sha1 KeyId Algorithm
1,210,466 UART: [idev] --
1,211,738 UART: [ldev] ++
1,211,906 UART: [ldev] CDI.KEYID = 6
1,212,269 UART: [ldev] SUBJECT.KEYID = 5
1,212,695 UART: [ldev] AUTHORITY.KEYID = 7
1,213,158 UART: [ldev] FE.KEYID = 1
1,218,710 UART: [ldev] Erasing FE.KEYID = 1
1,245,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,730 UART: [ldev] --
1,284,131 UART: [fwproc] Wait for Commands...
1,284,819 UART: [fwproc] Recv command 0x46574c44
1,285,547 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,620 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,790 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,091 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,352 >>> mbox cmd response: failed
1,188,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,358 >>> mbox cmd response: failed
1,188,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,534 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,059 UART:
192,429 UART: Running Caliptra ROM ...
193,632 UART:
193,788 UART: [state] CFI Enabled
263,382 UART: [state] LifecycleState = Unprovisioned
265,305 UART: [state] DebugLocked = No
267,333 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,942 UART: [kat] SHA2-256
441,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,192 UART: [kat] ++
452,731 UART: [kat] sha1
464,319 UART: [kat] SHA2-256
467,012 UART: [kat] SHA2-384
474,242 UART: [kat] SHA2-512-ACC
476,582 UART: [kat] ECC-384
2,766,097 UART: [kat] HMAC-384Kdf
2,799,356 UART: [kat] LMS
3,989,639 UART: [kat] --
3,993,664 UART: [cold-reset] ++
3,994,640 UART: [fht] Storing FHT @ 0x50003400
4,006,454 UART: [idev] ++
4,007,024 UART: [idev] CDI.KEYID = 6
4,008,050 UART: [idev] SUBJECT.KEYID = 7
4,009,227 UART: [idev] UDS.KEYID = 0
4,012,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,461 UART: [idev] Erasing UDS.KEYID = 0
7,344,797 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,752 UART: [idev] --
7,372,268 UART: [ldev] ++
7,372,843 UART: [ldev] CDI.KEYID = 6
7,373,820 UART: [ldev] SUBJECT.KEYID = 5
7,375,005 UART: [ldev] AUTHORITY.KEYID = 7
7,376,249 UART: [ldev] FE.KEYID = 1
7,421,043 UART: [ldev] Erasing FE.KEYID = 1
10,754,196 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,202 UART: [ldev] --
13,136,693 UART: [fwproc] Waiting for Commands...
13,139,767 UART: [fwproc] Received command 0x46574c44
13,141,959 UART: [fwproc] Received Image of size 118548 bytes
15,840,628 UART: ROM Fatal Error: 0x000B0017
15,844,138 >>> mbox cmd response: failed
15,844,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,844,846 >>> mbox cmd response: failed
15,845,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,845,444 >>> mbox cmd response: failed
Initializing fuses
2,058,249 writing to cptra_bootfsm_go
2,247,573 UART:
2,247,917 UART: Running Caliptra ROM ...
2,249,061 UART:
2,249,228 UART: [state] CFI Enabled
2,313,943 UART: [state] LifecycleState = Unprovisioned
2,315,878 UART: [state] DebugLocked = No
2,317,867 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,266 UART: [kat] SHA2-256
2,492,961 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,490 UART: [kat] ++
2,504,059 UART: [kat] sha1
2,515,060 UART: [kat] SHA2-256
2,517,749 UART: [kat] SHA2-384
2,522,887 UART: [kat] SHA2-512-ACC
2,525,245 UART: [kat] ECC-384
4,817,816 UART: [kat] HMAC-384Kdf
4,830,174 UART: [kat] LMS
6,020,484 UART: [kat] --
6,023,906 UART: [cold-reset] ++
6,026,061 UART: [fht] Storing FHT @ 0x50003400
6,037,234 UART: [idev] ++
6,037,814 UART: [idev] CDI.KEYID = 6
6,038,730 UART: [idev] SUBJECT.KEYID = 7
6,039,950 UART: [idev] UDS.KEYID = 0
6,042,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,191,593 UART: [idev] Erasing UDS.KEYID = 0
9,374,982 UART: [idev] Using Sha1 for KeyId Algorithm
9,396,540 UART: [idev] --
9,399,697 UART: [ldev] ++
9,400,284 UART: [ldev] CDI.KEYID = 6
9,401,232 UART: [ldev] SUBJECT.KEYID = 5
9,402,514 UART: [ldev] AUTHORITY.KEYID = 7
9,403,614 UART: [ldev] FE.KEYID = 1
9,451,665 UART: [ldev] Erasing FE.KEYID = 1
12,786,789 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,099,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,113,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,128,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,143,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,161,777 UART: [ldev] --
15,167,058 UART: [fwproc] Waiting for Commands...
15,170,359 UART: [fwproc] Received command 0x46574c44
15,172,626 UART: [fwproc] Received Image of size 118548 bytes
19,275,092 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,350,731 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,423,921 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,752,103 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,787,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,542,304 >>> mbox cmd response: failed
15,543,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,543,461 >>> mbox cmd response: failed
15,543,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,544,074 >>> mbox cmd response: failed
Initializing fuses
2,057,039 writing to cptra_bootfsm_go
5,842,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,993,828 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,564 UART:
192,940 UART: Running Caliptra ROM ...
194,044 UART:
603,673 UART: [state] CFI Enabled
616,953 UART: [state] LifecycleState = Unprovisioned
618,850 UART: [state] DebugLocked = No
620,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,584 UART: [kat] SHA2-256
794,362 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,883 UART: [kat] ++
805,396 UART: [kat] sha1
815,790 UART: [kat] SHA2-256
818,485 UART: [kat] SHA2-384
823,282 UART: [kat] SHA2-512-ACC
825,627 UART: [kat] ECC-384
3,108,031 UART: [kat] HMAC-384Kdf
3,120,327 UART: [kat] LMS
4,310,416 UART: [kat] --
4,316,004 UART: [cold-reset] ++
4,317,685 UART: [fht] Storing FHT @ 0x50003400
4,329,614 UART: [idev] ++
4,330,208 UART: [idev] CDI.KEYID = 6
4,331,127 UART: [idev] SUBJECT.KEYID = 7
4,332,352 UART: [idev] UDS.KEYID = 0
4,335,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,272 UART: [idev] Erasing UDS.KEYID = 0
7,616,859 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,920 UART: [idev] --
7,643,494 UART: [ldev] ++
7,644,080 UART: [ldev] CDI.KEYID = 6
7,645,002 UART: [ldev] SUBJECT.KEYID = 5
7,646,230 UART: [ldev] AUTHORITY.KEYID = 7
7,647,465 UART: [ldev] FE.KEYID = 1
7,658,553 UART: [ldev] Erasing FE.KEYID = 1
10,949,196 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,604 UART: [ldev] --
13,314,253 UART: [fwproc] Waiting for Commands...
13,317,117 UART: [fwproc] Received command 0x46574c44
13,319,323 UART: [fwproc] Received Image of size 118548 bytes
16,027,127 UART: ROM Fatal Error: 0x000B0017
16,031,107 >>> mbox cmd response: failed
16,031,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,031,935 >>> mbox cmd response: failed
16,032,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,032,512 >>> mbox cmd response: failed
Initializing fuses
2,057,290 writing to cptra_bootfsm_go
2,246,636 UART:
2,247,007 UART: Running Caliptra ROM ...
2,248,170 UART:
4,422,814 UART: [state] CFI Enabled
4,437,820 UART: [state] LifecycleState = Unprovisioned
4,439,734 UART: [state] DebugLocked = No
4,441,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,446,417 UART: [kat] SHA2-256
4,616,169 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,626,735 UART: [kat] ++
4,627,284 UART: [kat] sha1
4,638,833 UART: [kat] SHA2-256
4,641,571 UART: [kat] SHA2-384
4,647,892 UART: [kat] SHA2-512-ACC
4,650,248 UART: [kat] ECC-384
6,935,074 UART: [kat] HMAC-384Kdf
6,947,488 UART: [kat] LMS
8,137,563 UART: [kat] --
8,142,162 UART: [cold-reset] ++
8,144,748 UART: [fht] Storing FHT @ 0x50003400
8,157,095 UART: [idev] ++
8,157,674 UART: [idev] CDI.KEYID = 6
8,158,758 UART: [idev] SUBJECT.KEYID = 7
8,159,884 UART: [idev] UDS.KEYID = 0
8,162,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,311,022 UART: [idev] Erasing UDS.KEYID = 0
11,449,294 UART: [idev] Using Sha1 for KeyId Algorithm
11,471,989 UART: [idev] --
11,476,478 UART: [ldev] ++
11,477,053 UART: [ldev] CDI.KEYID = 6
11,478,079 UART: [ldev] SUBJECT.KEYID = 5
11,479,292 UART: [ldev] AUTHORITY.KEYID = 7
11,480,499 UART: [ldev] FE.KEYID = 1
11,491,969 UART: [ldev] Erasing FE.KEYID = 1
14,780,112 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,070,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,085,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,100,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,114,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,133,601 UART: [ldev] --
17,139,106 UART: [fwproc] Waiting for Commands...
17,140,730 UART: [fwproc] Received command 0x46574c44
17,142,927 UART: [fwproc] Received Image of size 118548 bytes
21,245,410 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,325,883 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,399,067 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,726,697 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,125,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,753,657 >>> mbox cmd response: failed
15,754,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,754,708 >>> mbox cmd response: failed
15,754,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,755,282 >>> mbox cmd response: failed
Initializing fuses
2,059,995 writing to cptra_bootfsm_go
8,246,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,265,947 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,094 UART:
192,464 UART: Running Caliptra ROM ...
193,701 UART:
193,864 UART: [state] CFI Enabled
264,642 UART: [state] LifecycleState = Unprovisioned
266,577 UART: [state] DebugLocked = No
268,023 UART: [state] WD Timer not started. Device not locked for debugging
271,563 UART: [kat] SHA2-256
451,268 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,036 UART: [kat] ++
462,580 UART: [kat] sha1
474,223 UART: [kat] SHA2-256
476,910 UART: [kat] SHA2-384
482,894 UART: [kat] SHA2-512-ACC
485,287 UART: [kat] ECC-384
2,951,629 UART: [kat] HMAC-384Kdf
2,971,209 UART: [kat] LMS
3,447,715 UART: [kat] --
3,451,489 UART: [cold-reset] ++
3,453,674 UART: [fht] FHT @ 0x50003400
3,466,397 UART: [idev] ++
3,466,985 UART: [idev] CDI.KEYID = 6
3,467,954 UART: [idev] SUBJECT.KEYID = 7
3,469,175 UART: [idev] UDS.KEYID = 0
3,471,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,859 UART: [idev] Erasing UDS.KEYID = 0
5,983,406 UART: [idev] Sha1 KeyId Algorithm
6,007,259 UART: [idev] --
6,013,130 UART: [ldev] ++
6,013,751 UART: [ldev] CDI.KEYID = 6
6,014,689 UART: [ldev] SUBJECT.KEYID = 5
6,015,743 UART: [ldev] AUTHORITY.KEYID = 7
6,017,099 UART: [ldev] FE.KEYID = 1
6,058,540 UART: [ldev] Erasing FE.KEYID = 1
8,562,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,901 UART: [ldev] --
10,374,879 UART: [fwproc] Wait for Commands...
10,377,681 UART: [fwproc] Recv command 0x46574c44
10,379,675 UART: [fwproc] Recv'd Img size: 118548 bytes
12,448,007 UART: ROM Fatal Error: 0x000B0017
12,451,242 >>> mbox cmd response: failed
12,451,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,452,040 >>> mbox cmd response: failed
12,452,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,452,563 >>> mbox cmd response: failed
Initializing fuses
2,060,423 writing to cptra_bootfsm_go
2,249,814 UART:
2,250,160 UART: Running Caliptra ROM ...
2,251,291 UART:
2,251,466 UART: [state] CFI Enabled
2,314,946 UART: [state] LifecycleState = Unprovisioned
2,316,876 UART: [state] DebugLocked = No
2,319,084 UART: [state] WD Timer not started. Device not locked for debugging
2,323,005 UART: [kat] SHA2-256
2,502,654 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,513,453 UART: [kat] ++
2,514,005 UART: [kat] sha1
2,524,977 UART: [kat] SHA2-256
2,527,671 UART: [kat] SHA2-384
2,534,976 UART: [kat] SHA2-512-ACC
2,537,343 UART: [kat] ECC-384
5,001,489 UART: [kat] HMAC-384Kdf
5,024,883 UART: [kat] LMS
5,501,363 UART: [kat] --
5,507,680 UART: [cold-reset] ++
5,508,809 UART: [fht] FHT @ 0x50003400
5,520,387 UART: [idev] ++
5,520,956 UART: [idev] CDI.KEYID = 6
5,521,977 UART: [idev] SUBJECT.KEYID = 7
5,523,140 UART: [idev] UDS.KEYID = 0
5,525,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,674,685 UART: [idev] Erasing UDS.KEYID = 0
8,040,714 UART: [idev] Sha1 KeyId Algorithm
8,064,287 UART: [idev] --
8,070,509 UART: [ldev] ++
8,071,090 UART: [ldev] CDI.KEYID = 6
8,072,015 UART: [ldev] SUBJECT.KEYID = 5
8,073,186 UART: [ldev] AUTHORITY.KEYID = 7
8,074,507 UART: [ldev] FE.KEYID = 1
8,108,277 UART: [ldev] Erasing FE.KEYID = 1
10,616,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,350,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,366,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,382,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,398,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,420,950 UART: [ldev] --
12,425,891 UART: [fwproc] Wait for Commands...
12,428,264 UART: [fwproc] Recv command 0x46574c44
12,430,266 UART: [fwproc] Recv'd Img size: 118548 bytes
15,918,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,003,982 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,077,013 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,405,924 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,463,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,332,276 >>> mbox cmd response: failed
12,332,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,333,228 >>> mbox cmd response: failed
12,333,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,333,804 >>> mbox cmd response: failed
Initializing fuses
2,060,729 writing to cptra_bootfsm_go
5,506,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,261,066 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,106 writing to cptra_bootfsm_go
193,386 UART:
193,743 UART: Running Caliptra ROM ...
194,965 UART:
604,733 UART: [state] CFI Enabled
619,723 UART: [state] LifecycleState = Unprovisioned
621,611 UART: [state] DebugLocked = No
624,402 UART: [state] WD Timer not started. Device not locked for debugging
628,909 UART: [kat] SHA2-256
808,557 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,336 UART: [kat] ++
819,821 UART: [kat] sha1
830,975 UART: [kat] SHA2-256
833,659 UART: [kat] SHA2-384
838,506 UART: [kat] SHA2-512-ACC
840,904 UART: [kat] ECC-384
3,282,444 UART: [kat] HMAC-384Kdf
3,294,496 UART: [kat] LMS
3,770,982 UART: [kat] --
3,775,582 UART: [cold-reset] ++
3,778,171 UART: [fht] FHT @ 0x50003400
3,789,479 UART: [idev] ++
3,790,048 UART: [idev] CDI.KEYID = 6
3,791,076 UART: [idev] SUBJECT.KEYID = 7
3,792,244 UART: [idev] UDS.KEYID = 0
3,794,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,032 UART: [idev] Erasing UDS.KEYID = 0
6,267,013 UART: [idev] Sha1 KeyId Algorithm
6,290,601 UART: [idev] --
6,294,550 UART: [ldev] ++
6,295,130 UART: [ldev] CDI.KEYID = 6
6,296,154 UART: [ldev] SUBJECT.KEYID = 5
6,297,280 UART: [ldev] AUTHORITY.KEYID = 7
6,298,519 UART: [ldev] FE.KEYID = 1
6,311,440 UART: [ldev] Erasing FE.KEYID = 1
8,789,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,936 UART: [ldev] --
10,582,275 UART: [fwproc] Wait for Commands...
10,585,405 UART: [fwproc] Recv command 0x46574c44
10,587,397 UART: [fwproc] Recv'd Img size: 118548 bytes
12,654,639 UART: ROM Fatal Error: 0x000B0017
12,657,881 >>> mbox cmd response: failed
12,658,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,658,653 >>> mbox cmd response: failed
12,658,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,659,243 >>> mbox cmd response: failed
Initializing fuses
2,064,708 writing to cptra_bootfsm_go
2,254,015 UART:
2,254,377 UART: Running Caliptra ROM ...
2,255,427 UART:
7,792,752 UART: [state] CFI Enabled
7,807,790 UART: [state] LifecycleState = Unprovisioned
7,809,712 UART: [state] DebugLocked = No
7,812,342 UART: [state] WD Timer not started. Device not locked for debugging
7,815,604 UART: [kat] SHA2-256
7,995,282 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,006,034 UART: [kat] ++
8,006,559 UART: [kat] sha1
8,017,674 UART: [kat] SHA2-256
8,020,381 UART: [kat] SHA2-384
8,026,276 UART: [kat] SHA2-512-ACC
8,028,640 UART: [kat] ECC-384
10,472,433 UART: [kat] HMAC-384Kdf
10,484,392 UART: [kat] LMS
10,960,926 UART: [kat] --
10,965,314 UART: [cold-reset] ++
10,967,416 UART: [fht] FHT @ 0x50003400
10,979,364 UART: [idev] ++
10,979,940 UART: [idev] CDI.KEYID = 6
10,980,962 UART: [idev] SUBJECT.KEYID = 7
10,982,121 UART: [idev] UDS.KEYID = 0
10,984,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,133,662 UART: [idev] Erasing UDS.KEYID = 0
13,461,456 UART: [idev] Sha1 KeyId Algorithm
13,484,207 UART: [idev] --
13,488,845 UART: [ldev] ++
13,489,420 UART: [ldev] CDI.KEYID = 6
13,490,310 UART: [ldev] SUBJECT.KEYID = 5
13,491,577 UART: [ldev] AUTHORITY.KEYID = 7
13,492,814 UART: [ldev] FE.KEYID = 1
13,502,683 UART: [ldev] Erasing FE.KEYID = 1
15,980,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,701,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,717,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,733,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,749,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,770,368 UART: [ldev] --
17,776,014 UART: [fwproc] Wait for Commands...
17,778,992 UART: [fwproc] Recv command 0x46574c44
17,781,056 UART: [fwproc] Recv'd Img size: 118548 bytes
21,267,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,347,527 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,420,548 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,749,607 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,777,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,533,322 >>> mbox cmd response: failed
12,534,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,534,385 >>> mbox cmd response: failed
12,534,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,534,956 >>> mbox cmd response: failed
Initializing fuses
2,061,218 writing to cptra_bootfsm_go
11,107,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,776,730 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,160 UART:
192,519 UART: Running Caliptra ROM ...
193,632 UART:
193,781 UART: [state] CFI Enabled
262,512 UART: [state] LifecycleState = Unprovisioned
264,939 UART: [state] DebugLocked = No
267,109 UART: [state] WD Timer not started. Device not locked for debugging
271,932 UART: [kat] SHA2-256
461,797 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,578 UART: [kat] ++
473,121 UART: [kat] sha1
484,661 UART: [kat] SHA2-256
487,675 UART: [kat] SHA2-384
493,497 UART: [kat] SHA2-512-ACC
496,098 UART: [kat] ECC-384
2,946,028 UART: [kat] HMAC-384Kdf
2,969,019 UART: [kat] LMS
3,500,767 UART: [kat] --
3,503,791 UART: [cold-reset] ++
3,505,032 UART: [fht] FHT @ 0x50003400
3,516,505 UART: [idev] ++
3,517,081 UART: [idev] CDI.KEYID = 6
3,518,056 UART: [idev] SUBJECT.KEYID = 7
3,519,226 UART: [idev] UDS.KEYID = 0
3,521,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,951 UART: [idev] Erasing UDS.KEYID = 0
6,025,487 UART: [idev] Sha1 KeyId Algorithm
6,048,294 UART: [idev] --
6,054,406 UART: [ldev] ++
6,055,092 UART: [ldev] CDI.KEYID = 6
6,056,031 UART: [ldev] SUBJECT.KEYID = 5
6,057,206 UART: [ldev] AUTHORITY.KEYID = 7
6,058,451 UART: [ldev] FE.KEYID = 1
6,097,638 UART: [ldev] Erasing FE.KEYID = 1
8,608,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,993 UART: [ldev] --
10,409,134 UART: [fwproc] Wait for Commands...
10,412,106 UART: [fwproc] Recv command 0x46574c44
10,414,421 UART: [fwproc] Recv'd Img size: 118548 bytes
12,499,836 UART: ROM Fatal Error: 0x000B0017
12,503,505 >>> mbox cmd response: failed
12,503,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,504,273 >>> mbox cmd response: failed
12,504,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,504,852 >>> mbox cmd response: failed
Initializing fuses
2,068,002 writing to cptra_bootfsm_go
2,257,339 UART:
2,257,694 UART: Running Caliptra ROM ...
2,258,742 UART:
2,258,899 UART: [state] CFI Enabled
2,323,474 UART: [state] LifecycleState = Unprovisioned
2,325,854 UART: [state] DebugLocked = No
2,328,356 UART: [state] WD Timer not started. Device not locked for debugging
2,333,316 UART: [kat] SHA2-256
2,523,211 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,533,970 UART: [kat] ++
2,534,430 UART: [kat] sha1
2,545,373 UART: [kat] SHA2-256
2,548,406 UART: [kat] SHA2-384
2,555,210 UART: [kat] SHA2-512-ACC
2,557,823 UART: [kat] ECC-384
5,008,160 UART: [kat] HMAC-384Kdf
5,031,544 UART: [kat] LMS
5,563,316 UART: [kat] --
5,566,118 UART: [cold-reset] ++
5,567,081 UART: [fht] FHT @ 0x50003400
5,579,126 UART: [idev] ++
5,579,800 UART: [idev] CDI.KEYID = 6
5,580,744 UART: [idev] SUBJECT.KEYID = 7
5,582,010 UART: [idev] UDS.KEYID = 0
5,584,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,733,355 UART: [idev] Erasing UDS.KEYID = 0
8,086,668 UART: [idev] Sha1 KeyId Algorithm
8,109,048 UART: [idev] --
8,114,077 UART: [ldev] ++
8,114,764 UART: [ldev] CDI.KEYID = 6
8,115,649 UART: [ldev] SUBJECT.KEYID = 5
8,116,864 UART: [ldev] AUTHORITY.KEYID = 7
8,118,044 UART: [ldev] FE.KEYID = 1
8,158,426 UART: [ldev] Erasing FE.KEYID = 1
10,662,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,468,014 UART: [ldev] --
12,473,286 UART: [fwproc] Wait for Commands...
12,475,664 UART: [fwproc] Recv command 0x46574c44
12,477,946 UART: [fwproc] Recv'd Img size: 118548 bytes
15,972,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,047,872 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,171,508 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,731,678 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,439,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,302,887 >>> mbox cmd response: failed
12,303,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,170 >>> mbox cmd response: failed
12,304,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,737 >>> mbox cmd response: failed
Initializing fuses
2,062,743 writing to cptra_bootfsm_go
5,490,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,879,660 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,634 UART:
192,985 UART: Running Caliptra ROM ...
194,194 UART:
603,687 UART: [state] CFI Enabled
614,069 UART: [state] LifecycleState = Unprovisioned
616,449 UART: [state] DebugLocked = No
619,356 UART: [state] WD Timer not started. Device not locked for debugging
623,806 UART: [kat] SHA2-256
813,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,486 UART: [kat] ++
825,040 UART: [kat] sha1
835,496 UART: [kat] SHA2-256
838,509 UART: [kat] SHA2-384
843,901 UART: [kat] SHA2-512-ACC
846,520 UART: [kat] ECC-384
3,289,786 UART: [kat] HMAC-384Kdf
3,302,937 UART: [kat] LMS
3,834,748 UART: [kat] --
3,839,070 UART: [cold-reset] ++
3,840,583 UART: [fht] FHT @ 0x50003400
3,850,869 UART: [idev] ++
3,851,609 UART: [idev] CDI.KEYID = 6
3,852,524 UART: [idev] SUBJECT.KEYID = 7
3,853,747 UART: [idev] UDS.KEYID = 0
3,856,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,519 UART: [idev] Erasing UDS.KEYID = 0
6,332,711 UART: [idev] Sha1 KeyId Algorithm
6,355,467 UART: [idev] --
6,361,035 UART: [ldev] ++
6,361,727 UART: [ldev] CDI.KEYID = 6
6,362,639 UART: [ldev] SUBJECT.KEYID = 5
6,363,804 UART: [ldev] AUTHORITY.KEYID = 7
6,365,045 UART: [ldev] FE.KEYID = 1
6,375,815 UART: [ldev] Erasing FE.KEYID = 1
8,852,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,900 UART: [ldev] --
10,640,906 UART: [fwproc] Wait for Commands...
10,643,468 UART: [fwproc] Recv command 0x46574c44
10,645,741 UART: [fwproc] Recv'd Img size: 118548 bytes
12,728,623 UART: ROM Fatal Error: 0x000B0017
12,732,295 >>> mbox cmd response: failed
12,732,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,733,060 >>> mbox cmd response: failed
12,733,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,733,583 >>> mbox cmd response: failed
Initializing fuses
2,068,817 writing to cptra_bootfsm_go
2,258,152 UART:
2,258,508 UART: Running Caliptra ROM ...
2,259,648 UART:
7,720,989 UART: [state] CFI Enabled
7,734,137 UART: [state] LifecycleState = Unprovisioned
7,736,539 UART: [state] DebugLocked = No
7,738,426 UART: [state] WD Timer not started. Device not locked for debugging
7,743,340 UART: [kat] SHA2-256
7,933,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,944,003 UART: [kat] ++
7,944,612 UART: [kat] sha1
7,955,398 UART: [kat] SHA2-256
7,958,366 UART: [kat] SHA2-384
7,963,353 UART: [kat] SHA2-512-ACC
7,965,935 UART: [kat] ECC-384
10,411,727 UART: [kat] HMAC-384Kdf
10,424,653 UART: [kat] LMS
10,956,468 UART: [kat] --
10,959,604 UART: [cold-reset] ++
10,960,946 UART: [fht] FHT @ 0x50003400
10,972,080 UART: [idev] ++
10,972,772 UART: [idev] CDI.KEYID = 6
10,973,797 UART: [idev] SUBJECT.KEYID = 7
10,974,957 UART: [idev] UDS.KEYID = 0
10,977,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,126,231 UART: [idev] Erasing UDS.KEYID = 0
13,446,420 UART: [idev] Sha1 KeyId Algorithm
13,468,043 UART: [idev] --
13,473,555 UART: [ldev] ++
13,474,165 UART: [ldev] CDI.KEYID = 6
13,475,085 UART: [ldev] SUBJECT.KEYID = 5
13,476,197 UART: [ldev] AUTHORITY.KEYID = 7
13,477,380 UART: [ldev] FE.KEYID = 1
13,488,114 UART: [ldev] Erasing FE.KEYID = 1
15,966,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,683,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,698,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,713,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,728,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,749,262 UART: [ldev] --
17,754,489 UART: [fwproc] Wait for Commands...
17,756,541 UART: [fwproc] Recv command 0x46574c44
17,758,866 UART: [fwproc] Recv'd Img size: 118548 bytes
21,263,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,347,335 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,470,905 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,031,360 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,756,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,528,034 >>> mbox cmd response: failed
12,528,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,999 >>> mbox cmd response: failed
12,529,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,587 >>> mbox cmd response: failed
Initializing fuses
2,061,371 writing to cptra_bootfsm_go
11,093,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,374,297 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,764 UART: [state] LifecycleState = Unprovisioned
85,419 UART: [state] DebugLocked = No
85,971 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,585 UART: [kat] SHA2-256
881,516 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,631 UART: [kat] ++
885,783 UART: [kat] sha1
890,027 UART: [kat] SHA2-256
891,965 UART: [kat] SHA2-384
894,598 UART: [kat] SHA2-512-ACC
896,499 UART: [kat] ECC-384
901,908 UART: [kat] HMAC-384Kdf
906,514 UART: [kat] LMS
1,474,710 UART: [kat] --
1,475,855 UART: [cold-reset] ++
1,476,231 UART: [fht] Storing FHT @ 0x50003400
1,478,902 UART: [idev] ++
1,479,070 UART: [idev] CDI.KEYID = 6
1,479,430 UART: [idev] SUBJECT.KEYID = 7
1,479,854 UART: [idev] UDS.KEYID = 0
1,480,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,050 UART: [idev] Erasing UDS.KEYID = 0
1,504,854 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,358 UART: [idev] --
1,514,473 UART: [ldev] ++
1,514,641 UART: [ldev] CDI.KEYID = 6
1,515,004 UART: [ldev] SUBJECT.KEYID = 5
1,515,430 UART: [ldev] AUTHORITY.KEYID = 7
1,515,893 UART: [ldev] FE.KEYID = 1
1,520,983 UART: [ldev] Erasing FE.KEYID = 1
1,545,996 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,960 UART: [ldev] --
1,585,371 UART: [fwproc] Waiting for Commands...
1,586,124 UART: [fwproc] Received command 0x46574c44
1,586,915 UART: [fwproc] Received Image of size 118548 bytes
1,633,730 UART: ROM Fatal Error: 0x000B0017
1,634,887 >>> mbox cmd response: failed
1,634,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,893 >>> mbox cmd response: failed
1,634,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,603 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,271 UART: [kat] SHA2-256
882,202 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,317 UART: [kat] ++
886,469 UART: [kat] sha1
890,743 UART: [kat] SHA2-256
892,681 UART: [kat] SHA2-384
895,450 UART: [kat] SHA2-512-ACC
897,351 UART: [kat] ECC-384
903,186 UART: [kat] HMAC-384Kdf
907,532 UART: [kat] LMS
1,475,728 UART: [kat] --
1,476,451 UART: [cold-reset] ++
1,476,833 UART: [fht] Storing FHT @ 0x50003400
1,479,678 UART: [idev] ++
1,479,846 UART: [idev] CDI.KEYID = 6
1,480,206 UART: [idev] SUBJECT.KEYID = 7
1,480,630 UART: [idev] UDS.KEYID = 0
1,480,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,890 UART: [idev] Erasing UDS.KEYID = 0
1,505,120 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,772 UART: [idev] --
1,514,633 UART: [ldev] ++
1,514,801 UART: [ldev] CDI.KEYID = 6
1,515,164 UART: [ldev] SUBJECT.KEYID = 5
1,515,590 UART: [ldev] AUTHORITY.KEYID = 7
1,516,053 UART: [ldev] FE.KEYID = 1
1,521,211 UART: [ldev] Erasing FE.KEYID = 1
1,546,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,162 UART: [ldev] --
1,585,471 UART: [fwproc] Waiting for Commands...
1,586,320 UART: [fwproc] Received command 0x46574c44
1,587,111 UART: [fwproc] Received Image of size 118548 bytes
2,931,024 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,054 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,272 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,675 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,230 >>> mbox cmd response: failed
1,488,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,236 >>> mbox cmd response: failed
1,488,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,242 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,941 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,318 UART: [kat] SHA2-256
882,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,364 UART: [kat] ++
886,516 UART: [kat] sha1
890,742 UART: [kat] SHA2-256
892,680 UART: [kat] SHA2-384
895,363 UART: [kat] SHA2-512-ACC
897,264 UART: [kat] ECC-384
902,887 UART: [kat] HMAC-384Kdf
907,659 UART: [kat] LMS
1,475,855 UART: [kat] --
1,476,832 UART: [cold-reset] ++
1,477,322 UART: [fht] Storing FHT @ 0x50003400
1,480,121 UART: [idev] ++
1,480,289 UART: [idev] CDI.KEYID = 6
1,480,649 UART: [idev] SUBJECT.KEYID = 7
1,481,073 UART: [idev] UDS.KEYID = 0
1,481,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,143 UART: [idev] Erasing UDS.KEYID = 0
1,506,207 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,653 UART: [idev] --
1,515,680 UART: [ldev] ++
1,515,848 UART: [ldev] CDI.KEYID = 6
1,516,211 UART: [ldev] SUBJECT.KEYID = 5
1,516,637 UART: [ldev] AUTHORITY.KEYID = 7
1,517,100 UART: [ldev] FE.KEYID = 1
1,522,566 UART: [ldev] Erasing FE.KEYID = 1
1,548,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,529 UART: [ldev] --
1,587,942 UART: [fwproc] Waiting for Commands...
1,588,731 UART: [fwproc] Received command 0x46574c44
1,589,522 UART: [fwproc] Received Image of size 118548 bytes
1,636,359 UART: ROM Fatal Error: 0x000B0017
1,637,516 >>> mbox cmd response: failed
1,637,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,522 >>> mbox cmd response: failed
1,637,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,855 UART: [state] LifecycleState = Unprovisioned
86,510 UART: [state] DebugLocked = No
87,044 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,726 UART: [kat] SHA2-256
882,657 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,772 UART: [kat] ++
886,924 UART: [kat] sha1
891,212 UART: [kat] SHA2-256
893,150 UART: [kat] SHA2-384
896,077 UART: [kat] SHA2-512-ACC
897,978 UART: [kat] ECC-384
903,651 UART: [kat] HMAC-384Kdf
908,251 UART: [kat] LMS
1,476,447 UART: [kat] --
1,477,322 UART: [cold-reset] ++
1,477,766 UART: [fht] Storing FHT @ 0x50003400
1,480,521 UART: [idev] ++
1,480,689 UART: [idev] CDI.KEYID = 6
1,481,049 UART: [idev] SUBJECT.KEYID = 7
1,481,473 UART: [idev] UDS.KEYID = 0
1,481,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,153 UART: [idev] Erasing UDS.KEYID = 0
1,505,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,049 UART: [idev] --
1,514,978 UART: [ldev] ++
1,515,146 UART: [ldev] CDI.KEYID = 6
1,515,509 UART: [ldev] SUBJECT.KEYID = 5
1,515,935 UART: [ldev] AUTHORITY.KEYID = 7
1,516,398 UART: [ldev] FE.KEYID = 1
1,521,866 UART: [ldev] Erasing FE.KEYID = 1
1,546,717 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,019 UART: [ldev] --
1,586,410 UART: [fwproc] Waiting for Commands...
1,587,197 UART: [fwproc] Received command 0x46574c44
1,587,988 UART: [fwproc] Received Image of size 118548 bytes
2,932,135 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,297 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,515 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,736 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,429 >>> mbox cmd response: failed
1,488,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,435 >>> mbox cmd response: failed
1,488,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,014 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,944 UART: [kat] SHA2-256
901,884 UART: [kat] SHA2-384
904,567 UART: [kat] SHA2-512-ACC
906,468 UART: [kat] ECC-384
916,383 UART: [kat] HMAC-384Kdf
921,135 UART: [kat] LMS
1,169,447 UART: [kat] --
1,170,012 UART: [cold-reset] ++
1,170,568 UART: [fht] FHT @ 0x50003400
1,173,092 UART: [idev] ++
1,173,260 UART: [idev] CDI.KEYID = 6
1,173,621 UART: [idev] SUBJECT.KEYID = 7
1,174,046 UART: [idev] UDS.KEYID = 0
1,174,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,461 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,727 UART: [idev] --
1,208,910 UART: [ldev] ++
1,209,078 UART: [ldev] CDI.KEYID = 6
1,209,442 UART: [ldev] SUBJECT.KEYID = 5
1,209,869 UART: [ldev] AUTHORITY.KEYID = 7
1,210,332 UART: [ldev] FE.KEYID = 1
1,215,514 UART: [ldev] Erasing FE.KEYID = 1
1,241,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,620 UART: [ldev] --
1,281,031 UART: [fwproc] Wait for Commands...
1,281,714 UART: [fwproc] Recv command 0x46574c44
1,282,447 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,308 UART: ROM Fatal Error: 0x000B0017
1,331,465 >>> mbox cmd response: failed
1,331,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,471 >>> mbox cmd response: failed
1,331,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,477 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,242 UART: [kat] SHA2-256
890,792 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,896 UART: [kat] ++
895,048 UART: [kat] sha1
899,092 UART: [kat] SHA2-256
901,032 UART: [kat] SHA2-384
903,755 UART: [kat] SHA2-512-ACC
905,656 UART: [kat] ECC-384
915,227 UART: [kat] HMAC-384Kdf
919,741 UART: [kat] LMS
1,168,053 UART: [kat] --
1,169,116 UART: [cold-reset] ++
1,169,448 UART: [fht] FHT @ 0x50003400
1,172,218 UART: [idev] ++
1,172,386 UART: [idev] CDI.KEYID = 6
1,172,747 UART: [idev] SUBJECT.KEYID = 7
1,173,172 UART: [idev] UDS.KEYID = 0
1,173,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,313 UART: [idev] Erasing UDS.KEYID = 0
1,198,909 UART: [idev] Sha1 KeyId Algorithm
1,207,877 UART: [idev] --
1,208,934 UART: [ldev] ++
1,209,102 UART: [ldev] CDI.KEYID = 6
1,209,466 UART: [ldev] SUBJECT.KEYID = 5
1,209,893 UART: [ldev] AUTHORITY.KEYID = 7
1,210,356 UART: [ldev] FE.KEYID = 1
1,215,612 UART: [ldev] Erasing FE.KEYID = 1
1,241,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,750 UART: [ldev] --
1,281,015 UART: [fwproc] Wait for Commands...
1,281,792 UART: [fwproc] Recv command 0x46574c44
1,282,525 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,140 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,315 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,678 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,268 >>> mbox cmd response: failed
1,186,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,274 >>> mbox cmd response: failed
1,186,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,280 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,239 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,362 UART: [kat] SHA2-512-ACC
906,263 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,617 UART: [cold-reset] ++
1,170,111 UART: [fht] FHT @ 0x50003400
1,172,871 UART: [idev] ++
1,173,039 UART: [idev] CDI.KEYID = 6
1,173,400 UART: [idev] SUBJECT.KEYID = 7
1,173,825 UART: [idev] UDS.KEYID = 0
1,174,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,958 UART: [idev] Erasing UDS.KEYID = 0
1,199,426 UART: [idev] Sha1 KeyId Algorithm
1,208,378 UART: [idev] --
1,209,571 UART: [ldev] ++
1,209,739 UART: [ldev] CDI.KEYID = 6
1,210,103 UART: [ldev] SUBJECT.KEYID = 5
1,210,530 UART: [ldev] AUTHORITY.KEYID = 7
1,210,993 UART: [ldev] FE.KEYID = 1
1,215,931 UART: [ldev] Erasing FE.KEYID = 1
1,242,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,813 UART: [ldev] --
1,281,256 UART: [fwproc] Wait for Commands...
1,281,895 UART: [fwproc] Recv command 0x46574c44
1,282,628 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,517 UART: ROM Fatal Error: 0x000B0017
1,331,674 >>> mbox cmd response: failed
1,331,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,680 >>> mbox cmd response: failed
1,331,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,686 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,522 UART: [kat] LMS
1,168,834 UART: [kat] --
1,169,537 UART: [cold-reset] ++
1,170,005 UART: [fht] FHT @ 0x50003400
1,172,605 UART: [idev] ++
1,172,773 UART: [idev] CDI.KEYID = 6
1,173,134 UART: [idev] SUBJECT.KEYID = 7
1,173,559 UART: [idev] UDS.KEYID = 0
1,173,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,188 UART: [idev] Erasing UDS.KEYID = 0
1,198,584 UART: [idev] Sha1 KeyId Algorithm
1,207,512 UART: [idev] --
1,208,571 UART: [ldev] ++
1,208,739 UART: [ldev] CDI.KEYID = 6
1,209,103 UART: [ldev] SUBJECT.KEYID = 5
1,209,530 UART: [ldev] AUTHORITY.KEYID = 7
1,209,993 UART: [ldev] FE.KEYID = 1
1,215,155 UART: [ldev] Erasing FE.KEYID = 1
1,241,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,713 UART: [ldev] --
1,280,920 UART: [fwproc] Wait for Commands...
1,281,519 UART: [fwproc] Recv command 0x46574c44
1,282,252 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,725 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,900 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,141 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,137 >>> mbox cmd response: failed
1,187,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,143 >>> mbox cmd response: failed
1,187,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,149 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,996 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
893,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,687 UART: [kat] ++
897,839 UART: [kat] sha1
902,121 UART: [kat] SHA2-256
904,061 UART: [kat] SHA2-384
906,820 UART: [kat] SHA2-512-ACC
908,721 UART: [kat] ECC-384
918,682 UART: [kat] HMAC-384Kdf
923,238 UART: [kat] LMS
1,171,566 UART: [kat] --
1,172,371 UART: [cold-reset] ++
1,172,773 UART: [fht] FHT @ 0x50003400
1,175,462 UART: [idev] ++
1,175,630 UART: [idev] CDI.KEYID = 6
1,175,990 UART: [idev] SUBJECT.KEYID = 7
1,176,414 UART: [idev] UDS.KEYID = 0
1,176,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,884 UART: [idev] Erasing UDS.KEYID = 0
1,201,885 UART: [idev] Sha1 KeyId Algorithm
1,210,391 UART: [idev] --
1,211,329 UART: [ldev] ++
1,211,497 UART: [ldev] CDI.KEYID = 6
1,211,860 UART: [ldev] SUBJECT.KEYID = 5
1,212,286 UART: [ldev] AUTHORITY.KEYID = 7
1,212,749 UART: [ldev] FE.KEYID = 1
1,217,913 UART: [ldev] Erasing FE.KEYID = 1
1,244,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,875 UART: [ldev] --
1,283,360 UART: [fwproc] Wait for Commands...
1,284,050 UART: [fwproc] Recv command 0x46574c44
1,284,778 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,107 UART: ROM Fatal Error: 0x000B0017
1,334,264 >>> mbox cmd response: failed
1,334,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,270 >>> mbox cmd response: failed
1,334,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,276 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
893,082 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,207 UART: [kat] ++
897,359 UART: [kat] sha1
901,679 UART: [kat] SHA2-256
903,619 UART: [kat] SHA2-384
906,366 UART: [kat] SHA2-512-ACC
908,267 UART: [kat] ECC-384
917,838 UART: [kat] HMAC-384Kdf
922,290 UART: [kat] LMS
1,170,618 UART: [kat] --
1,171,561 UART: [cold-reset] ++
1,171,981 UART: [fht] FHT @ 0x50003400
1,174,534 UART: [idev] ++
1,174,702 UART: [idev] CDI.KEYID = 6
1,175,062 UART: [idev] SUBJECT.KEYID = 7
1,175,486 UART: [idev] UDS.KEYID = 0
1,175,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,044 UART: [idev] Erasing UDS.KEYID = 0
1,201,337 UART: [idev] Sha1 KeyId Algorithm
1,209,913 UART: [idev] --
1,210,903 UART: [ldev] ++
1,211,071 UART: [ldev] CDI.KEYID = 6
1,211,434 UART: [ldev] SUBJECT.KEYID = 5
1,211,860 UART: [ldev] AUTHORITY.KEYID = 7
1,212,323 UART: [ldev] FE.KEYID = 1
1,217,391 UART: [ldev] Erasing FE.KEYID = 1
1,243,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,721 UART: [ldev] --
1,283,090 UART: [fwproc] Wait for Commands...
1,283,908 UART: [fwproc] Recv command 0x46574c44
1,284,636 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,377 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,547 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,782 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,921 >>> mbox cmd response: failed
1,187,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,927 >>> mbox cmd response: failed
1,187,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,933 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,309 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,601 UART: [kat] SHA2-256
893,251 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,376 UART: [kat] ++
897,528 UART: [kat] sha1
901,708 UART: [kat] SHA2-256
903,648 UART: [kat] SHA2-384
906,559 UART: [kat] SHA2-512-ACC
908,460 UART: [kat] ECC-384
917,923 UART: [kat] HMAC-384Kdf
922,763 UART: [kat] LMS
1,171,091 UART: [kat] --
1,171,810 UART: [cold-reset] ++
1,172,240 UART: [fht] FHT @ 0x50003400
1,174,931 UART: [idev] ++
1,175,099 UART: [idev] CDI.KEYID = 6
1,175,459 UART: [idev] SUBJECT.KEYID = 7
1,175,883 UART: [idev] UDS.KEYID = 0
1,176,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,595 UART: [idev] Erasing UDS.KEYID = 0
1,200,380 UART: [idev] Sha1 KeyId Algorithm
1,208,880 UART: [idev] --
1,209,986 UART: [ldev] ++
1,210,154 UART: [ldev] CDI.KEYID = 6
1,210,517 UART: [ldev] SUBJECT.KEYID = 5
1,210,943 UART: [ldev] AUTHORITY.KEYID = 7
1,211,406 UART: [ldev] FE.KEYID = 1
1,217,076 UART: [ldev] Erasing FE.KEYID = 1
1,243,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,022 UART: [ldev] --
1,282,391 UART: [fwproc] Wait for Commands...
1,283,041 UART: [fwproc] Recv command 0x46574c44
1,283,769 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,816 UART: ROM Fatal Error: 0x000B0017
1,331,973 >>> mbox cmd response: failed
1,331,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,979 >>> mbox cmd response: failed
1,331,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,985 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
893,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,456 UART: [kat] ++
897,608 UART: [kat] sha1
901,888 UART: [kat] SHA2-256
903,828 UART: [kat] SHA2-384
906,365 UART: [kat] SHA2-512-ACC
908,266 UART: [kat] ECC-384
917,989 UART: [kat] HMAC-384Kdf
922,735 UART: [kat] LMS
1,171,063 UART: [kat] --
1,172,162 UART: [cold-reset] ++
1,172,538 UART: [fht] FHT @ 0x50003400
1,175,221 UART: [idev] ++
1,175,389 UART: [idev] CDI.KEYID = 6
1,175,749 UART: [idev] SUBJECT.KEYID = 7
1,176,173 UART: [idev] UDS.KEYID = 0
1,176,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,383 UART: [idev] Erasing UDS.KEYID = 0
1,201,866 UART: [idev] Sha1 KeyId Algorithm
1,210,306 UART: [idev] --
1,211,380 UART: [ldev] ++
1,211,548 UART: [ldev] CDI.KEYID = 6
1,211,911 UART: [ldev] SUBJECT.KEYID = 5
1,212,337 UART: [ldev] AUTHORITY.KEYID = 7
1,212,800 UART: [ldev] FE.KEYID = 1
1,218,070 UART: [ldev] Erasing FE.KEYID = 1
1,244,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,550 UART: [ldev] --
1,283,053 UART: [fwproc] Wait for Commands...
1,283,733 UART: [fwproc] Recv command 0x46574c44
1,284,461 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,316 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,486 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,853 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,420 >>> mbox cmd response: failed
1,186,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,426 >>> mbox cmd response: failed
1,186,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,432 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,646 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,238 UART:
192,589 UART: Running Caliptra ROM ...
193,775 UART:
193,926 UART: [state] CFI Enabled
258,891 UART: [state] LifecycleState = Unprovisioned
260,863 UART: [state] DebugLocked = No
262,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,949 UART: [kat] SHA2-256
437,637 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,135 UART: [kat] ++
448,619 UART: [kat] sha1
460,094 UART: [kat] SHA2-256
462,518 UART: [kat] SHA2-384
467,001 UART: [kat] SHA2-512-ACC
469,408 UART: [kat] ECC-384
2,765,703 UART: [kat] HMAC-384Kdf
2,777,135 UART: [kat] LMS
3,967,432 UART: [kat] --
3,973,059 UART: [cold-reset] ++
3,975,652 UART: [fht] Storing FHT @ 0x50003400
3,986,862 UART: [idev] ++
3,987,471 UART: [idev] CDI.KEYID = 6
3,988,400 UART: [idev] SUBJECT.KEYID = 7
3,989,638 UART: [idev] UDS.KEYID = 0
3,992,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,902 UART: [idev] Erasing UDS.KEYID = 0
7,323,912 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,985 UART: [idev] --
7,347,562 UART: [ldev] ++
7,348,139 UART: [ldev] CDI.KEYID = 6
7,349,085 UART: [ldev] SUBJECT.KEYID = 5
7,350,224 UART: [ldev] AUTHORITY.KEYID = 7
7,351,568 UART: [ldev] FE.KEYID = 1
7,398,978 UART: [ldev] Erasing FE.KEYID = 1
10,730,681 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,068 UART: [ldev] --
13,111,407 UART: [fwproc] Waiting for Commands...
13,113,621 UART: [fwproc] Received command 0x46574c44
13,115,810 UART: [fwproc] Received Image of size 118548 bytes
15,817,539 UART: ROM Fatal Error: 0x000B003B
15,821,008 >>> mbox cmd response: failed
15,821,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,821,801 >>> mbox cmd response: failed
15,822,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,822,372 >>> mbox cmd response: failed
Initializing fuses
2,056,349 writing to cptra_bootfsm_go
2,245,648 UART:
2,245,984 UART: Running Caliptra ROM ...
2,247,049 UART:
2,247,211 UART: [state] CFI Enabled
2,314,642 UART: [state] LifecycleState = Unprovisioned
2,316,538 UART: [state] DebugLocked = No
2,318,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,907 UART: [kat] SHA2-256
2,493,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,122 UART: [kat] ++
2,504,581 UART: [kat] sha1
2,515,143 UART: [kat] SHA2-256
2,517,836 UART: [kat] SHA2-384
2,523,998 UART: [kat] SHA2-512-ACC
2,526,353 UART: [kat] ECC-384
4,818,170 UART: [kat] HMAC-384Kdf
4,851,273 UART: [kat] LMS
6,041,588 UART: [kat] --
6,046,433 UART: [cold-reset] ++
6,048,110 UART: [fht] Storing FHT @ 0x50003400
6,060,624 UART: [idev] ++
6,061,194 UART: [idev] CDI.KEYID = 6
6,062,122 UART: [idev] SUBJECT.KEYID = 7
6,063,341 UART: [idev] UDS.KEYID = 0
6,065,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,214,930 UART: [idev] Erasing UDS.KEYID = 0
9,399,779 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,874 UART: [idev] --
9,425,713 UART: [ldev] ++
9,426,287 UART: [ldev] CDI.KEYID = 6
9,427,262 UART: [ldev] SUBJECT.KEYID = 5
9,428,523 UART: [ldev] AUTHORITY.KEYID = 7
9,429,707 UART: [ldev] FE.KEYID = 1
9,474,012 UART: [ldev] Erasing FE.KEYID = 1
12,805,907 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,099,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,114,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,128,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,143,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,163,642 UART: [ldev] --
15,168,586 UART: [fwproc] Waiting for Commands...
15,170,309 UART: [fwproc] Received command 0x46574c44
15,172,500 UART: [fwproc] Received Image of size 118548 bytes
19,278,640 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,356,790 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,429,978 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,759,328 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
3,787,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,569,097 >>> mbox cmd response: failed
15,569,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,570,140 >>> mbox cmd response: failed
15,570,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,570,713 >>> mbox cmd response: failed
Initializing fuses
2,056,981 writing to cptra_bootfsm_go
5,835,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,977,887 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,669 UART:
193,017 UART: Running Caliptra ROM ...
194,213 UART:
603,741 UART: [state] CFI Enabled
619,065 UART: [state] LifecycleState = Unprovisioned
620,985 UART: [state] DebugLocked = No
622,916 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,443 UART: [kat] SHA2-256
798,190 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,746 UART: [kat] ++
809,289 UART: [kat] sha1
821,310 UART: [kat] SHA2-256
824,057 UART: [kat] SHA2-384
830,582 UART: [kat] SHA2-512-ACC
832,924 UART: [kat] ECC-384
3,117,590 UART: [kat] HMAC-384Kdf
3,128,713 UART: [kat] LMS
4,318,848 UART: [kat] --
4,324,274 UART: [cold-reset] ++
4,325,571 UART: [fht] Storing FHT @ 0x50003400
4,337,069 UART: [idev] ++
4,337,650 UART: [idev] CDI.KEYID = 6
4,338,568 UART: [idev] SUBJECT.KEYID = 7
4,339,841 UART: [idev] UDS.KEYID = 0
4,342,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,868 UART: [idev] Erasing UDS.KEYID = 0
7,627,444 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,231 UART: [idev] --
7,652,469 UART: [ldev] ++
7,653,050 UART: [ldev] CDI.KEYID = 6
7,653,997 UART: [ldev] SUBJECT.KEYID = 5
7,655,216 UART: [ldev] AUTHORITY.KEYID = 7
7,656,514 UART: [ldev] FE.KEYID = 1
7,668,168 UART: [ldev] Erasing FE.KEYID = 1
10,957,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,888 UART: [ldev] --
13,318,947 UART: [fwproc] Waiting for Commands...
13,321,613 UART: [fwproc] Received command 0x46574c44
13,323,811 UART: [fwproc] Received Image of size 118548 bytes
16,029,064 UART: ROM Fatal Error: 0x000B003B
16,032,528 >>> mbox cmd response: failed
16,032,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,033,201 >>> mbox cmd response: failed
16,033,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,033,815 >>> mbox cmd response: failed
Initializing fuses
2,056,734 writing to cptra_bootfsm_go
2,246,019 UART:
2,246,375 UART: Running Caliptra ROM ...
2,247,433 UART:
4,420,362 UART: [state] CFI Enabled
4,434,864 UART: [state] LifecycleState = Unprovisioned
4,436,818 UART: [state] DebugLocked = No
4,438,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,443,145 UART: [kat] SHA2-256
4,612,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,623,419 UART: [kat] ++
4,623,879 UART: [kat] sha1
4,634,989 UART: [kat] SHA2-256
4,637,688 UART: [kat] SHA2-384
4,643,518 UART: [kat] SHA2-512-ACC
4,645,881 UART: [kat] ECC-384
6,928,415 UART: [kat] HMAC-384Kdf
6,940,220 UART: [kat] LMS
8,130,342 UART: [kat] --
8,134,513 UART: [cold-reset] ++
8,135,582 UART: [fht] Storing FHT @ 0x50003400
8,147,415 UART: [idev] ++
8,147,990 UART: [idev] CDI.KEYID = 6
8,148,877 UART: [idev] SUBJECT.KEYID = 7
8,150,154 UART: [idev] UDS.KEYID = 0
8,152,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,301,453 UART: [idev] Erasing UDS.KEYID = 0
11,437,934 UART: [idev] Using Sha1 for KeyId Algorithm
11,461,159 UART: [idev] --
11,466,403 UART: [ldev] ++
11,467,013 UART: [ldev] CDI.KEYID = 6
11,467,937 UART: [ldev] SUBJECT.KEYID = 5
11,469,225 UART: [ldev] AUTHORITY.KEYID = 7
11,470,414 UART: [ldev] FE.KEYID = 1
11,480,850 UART: [ldev] Erasing FE.KEYID = 1
14,771,494 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,064,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,078,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,093,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,108,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,126,918 UART: [ldev] --
17,132,460 UART: [fwproc] Waiting for Commands...
17,134,941 UART: [fwproc] Received command 0x46574c44
17,137,132 UART: [fwproc] Received Image of size 118548 bytes
21,238,952 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,308,933 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,382,123 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,710,443 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
4,131,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,777,820 >>> mbox cmd response: failed
15,778,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,778,851 >>> mbox cmd response: failed
15,779,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,779,423 >>> mbox cmd response: failed
Initializing fuses
2,058,326 writing to cptra_bootfsm_go
8,215,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,252,283 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,063 UART:
192,458 UART: Running Caliptra ROM ...
193,696 UART:
193,854 UART: [state] CFI Enabled
262,057 UART: [state] LifecycleState = Unprovisioned
263,978 UART: [state] DebugLocked = No
265,958 UART: [state] WD Timer not started. Device not locked for debugging
268,910 UART: [kat] SHA2-256
448,577 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,385 UART: [kat] ++
459,858 UART: [kat] sha1
470,952 UART: [kat] SHA2-256
473,654 UART: [kat] SHA2-384
479,156 UART: [kat] SHA2-512-ACC
481,508 UART: [kat] ECC-384
2,925,616 UART: [kat] HMAC-384Kdf
2,949,132 UART: [kat] LMS
3,425,665 UART: [kat] --
3,429,667 UART: [cold-reset] ++
3,431,669 UART: [fht] FHT @ 0x50003400
3,441,575 UART: [idev] ++
3,442,145 UART: [idev] CDI.KEYID = 6
3,443,169 UART: [idev] SUBJECT.KEYID = 7
3,444,338 UART: [idev] UDS.KEYID = 0
3,447,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,497 UART: [idev] Erasing UDS.KEYID = 0
5,964,598 UART: [idev] Sha1 KeyId Algorithm
5,988,174 UART: [idev] --
5,992,122 UART: [ldev] ++
5,992,697 UART: [ldev] CDI.KEYID = 6
5,993,675 UART: [ldev] SUBJECT.KEYID = 5
5,994,839 UART: [ldev] AUTHORITY.KEYID = 7
5,996,131 UART: [ldev] FE.KEYID = 1
6,036,338 UART: [ldev] Erasing FE.KEYID = 1
8,542,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,800 UART: [ldev] --
10,354,519 UART: [fwproc] Wait for Commands...
10,357,545 UART: [fwproc] Recv command 0x46574c44
10,359,540 UART: [fwproc] Recv'd Img size: 118548 bytes
12,423,165 UART: ROM Fatal Error: 0x000B003B
12,426,405 >>> mbox cmd response: failed
12,426,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,427,163 >>> mbox cmd response: failed
12,427,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,427,729 >>> mbox cmd response: failed
Initializing fuses
2,061,049 writing to cptra_bootfsm_go
2,250,339 UART:
2,250,706 UART: Running Caliptra ROM ...
2,251,848 UART:
2,252,014 UART: [state] CFI Enabled
2,323,550 UART: [state] LifecycleState = Unprovisioned
2,325,492 UART: [state] DebugLocked = No
2,327,487 UART: [state] WD Timer not started. Device not locked for debugging
2,331,886 UART: [kat] SHA2-256
2,511,574 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,522,358 UART: [kat] ++
2,522,904 UART: [kat] sha1
2,533,804 UART: [kat] SHA2-256
2,536,503 UART: [kat] SHA2-384
2,542,519 UART: [kat] SHA2-512-ACC
2,544,875 UART: [kat] ECC-384
5,006,891 UART: [kat] HMAC-384Kdf
5,030,368 UART: [kat] LMS
5,506,854 UART: [kat] --
5,510,419 UART: [cold-reset] ++
5,511,333 UART: [fht] FHT @ 0x50003400
5,522,291 UART: [idev] ++
5,522,873 UART: [idev] CDI.KEYID = 6
5,523,898 UART: [idev] SUBJECT.KEYID = 7
5,525,064 UART: [idev] UDS.KEYID = 0
5,527,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,676,557 UART: [idev] Erasing UDS.KEYID = 0
8,025,156 UART: [idev] Sha1 KeyId Algorithm
8,048,875 UART: [idev] --
8,052,658 UART: [ldev] ++
8,053,312 UART: [ldev] CDI.KEYID = 6
8,054,232 UART: [ldev] SUBJECT.KEYID = 5
8,055,403 UART: [ldev] AUTHORITY.KEYID = 7
8,056,647 UART: [ldev] FE.KEYID = 1
8,096,631 UART: [ldev] Erasing FE.KEYID = 1
10,603,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,339,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,354,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,370,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,386,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,408,522 UART: [ldev] --
12,413,267 UART: [fwproc] Wait for Commands...
12,415,536 UART: [fwproc] Recv command 0x46574c44
12,417,532 UART: [fwproc] Recv'd Img size: 118548 bytes
15,903,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,982,084 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,055,116 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,383,021 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,462,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,321,577 >>> mbox cmd response: failed
12,322,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,322,538 >>> mbox cmd response: failed
12,322,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,323,102 >>> mbox cmd response: failed
Initializing fuses
2,064,924 writing to cptra_bootfsm_go
5,514,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,292,341 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,453 writing to cptra_bootfsm_go
192,578 UART:
192,936 UART: Running Caliptra ROM ...
194,154 UART:
603,720 UART: [state] CFI Enabled
615,879 UART: [state] LifecycleState = Unprovisioned
617,851 UART: [state] DebugLocked = No
620,160 UART: [state] WD Timer not started. Device not locked for debugging
624,459 UART: [kat] SHA2-256
804,156 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,899 UART: [kat] ++
815,495 UART: [kat] sha1
827,030 UART: [kat] SHA2-256
829,718 UART: [kat] SHA2-384
834,999 UART: [kat] SHA2-512-ACC
837,341 UART: [kat] ECC-384
3,278,102 UART: [kat] HMAC-384Kdf
3,291,011 UART: [kat] LMS
3,767,569 UART: [kat] --
3,772,598 UART: [cold-reset] ++
3,774,464 UART: [fht] FHT @ 0x50003400
3,786,056 UART: [idev] ++
3,786,638 UART: [idev] CDI.KEYID = 6
3,787,587 UART: [idev] SUBJECT.KEYID = 7
3,788,864 UART: [idev] UDS.KEYID = 0
3,791,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,573 UART: [idev] Erasing UDS.KEYID = 0
6,266,406 UART: [idev] Sha1 KeyId Algorithm
6,289,161 UART: [idev] --
6,294,424 UART: [ldev] ++
6,295,009 UART: [ldev] CDI.KEYID = 6
6,295,906 UART: [ldev] SUBJECT.KEYID = 5
6,297,129 UART: [ldev] AUTHORITY.KEYID = 7
6,298,421 UART: [ldev] FE.KEYID = 1
6,309,404 UART: [ldev] Erasing FE.KEYID = 1
8,781,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,818 UART: [ldev] --
10,575,982 UART: [fwproc] Wait for Commands...
10,578,516 UART: [fwproc] Recv command 0x46574c44
10,580,510 UART: [fwproc] Recv'd Img size: 118548 bytes
12,644,922 UART: ROM Fatal Error: 0x000B003B
12,648,152 >>> mbox cmd response: failed
12,648,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,648,929 >>> mbox cmd response: failed
12,649,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,649,529 >>> mbox cmd response: failed
Initializing fuses
2,060,432 writing to cptra_bootfsm_go
2,249,779 UART:
2,250,118 UART: Running Caliptra ROM ...
2,251,261 UART:
7,802,268 UART: [state] CFI Enabled
7,818,260 UART: [state] LifecycleState = Unprovisioned
7,820,177 UART: [state] DebugLocked = No
7,822,059 UART: [state] WD Timer not started. Device not locked for debugging
7,825,544 UART: [kat] SHA2-256
8,005,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,016,030 UART: [kat] ++
8,016,499 UART: [kat] sha1
8,027,286 UART: [kat] SHA2-256
8,029,994 UART: [kat] SHA2-384
8,037,342 UART: [kat] SHA2-512-ACC
8,039,870 UART: [kat] ECC-384
10,480,535 UART: [kat] HMAC-384Kdf
10,493,090 UART: [kat] LMS
10,969,631 UART: [kat] --
10,974,446 UART: [cold-reset] ++
10,975,589 UART: [fht] FHT @ 0x50003400
10,987,976 UART: [idev] ++
10,988,605 UART: [idev] CDI.KEYID = 6
10,989,514 UART: [idev] SUBJECT.KEYID = 7
10,990,783 UART: [idev] UDS.KEYID = 0
10,993,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,142,419 UART: [idev] Erasing UDS.KEYID = 0
13,467,693 UART: [idev] Sha1 KeyId Algorithm
13,492,057 UART: [idev] --
13,496,473 UART: [ldev] ++
13,497,056 UART: [ldev] CDI.KEYID = 6
13,498,122 UART: [ldev] SUBJECT.KEYID = 5
13,499,237 UART: [ldev] AUTHORITY.KEYID = 7
13,500,417 UART: [ldev] FE.KEYID = 1
13,510,964 UART: [ldev] Erasing FE.KEYID = 1
15,990,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,713,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,729,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,744,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,760,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,782,677 UART: [ldev] --
17,788,589 UART: [fwproc] Wait for Commands...
17,791,176 UART: [fwproc] Recv command 0x46574c44
17,793,218 UART: [fwproc] Recv'd Img size: 118548 bytes
21,281,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,362,851 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,435,864 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,764,599 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,782,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,551,647 >>> mbox cmd response: failed
12,552,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,552,719 >>> mbox cmd response: failed
12,552,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,553,286 >>> mbox cmd response: failed
Initializing fuses
2,065,489 writing to cptra_bootfsm_go
11,086,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,759,322 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,220 UART:
192,598 UART: Running Caliptra ROM ...
193,798 UART:
193,958 UART: [state] CFI Enabled
259,216 UART: [state] LifecycleState = Unprovisioned
261,634 UART: [state] DebugLocked = No
263,253 UART: [state] WD Timer not started. Device not locked for debugging
268,179 UART: [kat] SHA2-256
458,075 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,824 UART: [kat] ++
469,304 UART: [kat] sha1
480,273 UART: [kat] SHA2-256
483,282 UART: [kat] SHA2-384
489,761 UART: [kat] SHA2-512-ACC
492,326 UART: [kat] ECC-384
2,945,214 UART: [kat] HMAC-384Kdf
2,970,522 UART: [kat] LMS
3,502,265 UART: [kat] --
3,508,091 UART: [cold-reset] ++
3,509,018 UART: [fht] FHT @ 0x50003400
3,521,397 UART: [idev] ++
3,522,134 UART: [idev] CDI.KEYID = 6
3,523,066 UART: [idev] SUBJECT.KEYID = 7
3,524,296 UART: [idev] UDS.KEYID = 0
3,527,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,721 UART: [idev] Erasing UDS.KEYID = 0
6,026,491 UART: [idev] Sha1 KeyId Algorithm
6,048,427 UART: [idev] --
6,054,098 UART: [ldev] ++
6,054,792 UART: [ldev] CDI.KEYID = 6
6,055,708 UART: [ldev] SUBJECT.KEYID = 5
6,056,881 UART: [ldev] AUTHORITY.KEYID = 7
6,058,069 UART: [ldev] FE.KEYID = 1
6,098,030 UART: [ldev] Erasing FE.KEYID = 1
8,604,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,949 UART: [ldev] --
10,412,752 UART: [fwproc] Wait for Commands...
10,414,818 UART: [fwproc] Recv command 0x46574c44
10,417,081 UART: [fwproc] Recv'd Img size: 118548 bytes
12,501,361 UART: ROM Fatal Error: 0x000B003B
12,505,030 >>> mbox cmd response: failed
12,505,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,505,787 >>> mbox cmd response: failed
12,506,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,366 >>> mbox cmd response: failed
Initializing fuses
2,063,066 writing to cptra_bootfsm_go
2,252,486 UART:
2,252,830 UART: Running Caliptra ROM ...
2,253,965 UART:
2,254,143 UART: [state] CFI Enabled
2,325,720 UART: [state] LifecycleState = Unprovisioned
2,328,150 UART: [state] DebugLocked = No
2,330,196 UART: [state] WD Timer not started. Device not locked for debugging
2,333,928 UART: [kat] SHA2-256
2,523,579 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,534,353 UART: [kat] ++
2,534,822 UART: [kat] sha1
2,547,228 UART: [kat] SHA2-256
2,550,227 UART: [kat] SHA2-384
2,557,799 UART: [kat] SHA2-512-ACC
2,560,378 UART: [kat] ECC-384
5,011,778 UART: [kat] HMAC-384Kdf
5,033,518 UART: [kat] LMS
5,565,247 UART: [kat] --
5,571,009 UART: [cold-reset] ++
5,572,113 UART: [fht] FHT @ 0x50003400
5,583,109 UART: [idev] ++
5,583,804 UART: [idev] CDI.KEYID = 6
5,584,721 UART: [idev] SUBJECT.KEYID = 7
5,585,945 UART: [idev] UDS.KEYID = 0
5,588,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,737,430 UART: [idev] Erasing UDS.KEYID = 0
8,090,109 UART: [idev] Sha1 KeyId Algorithm
8,112,811 UART: [idev] --
8,117,429 UART: [ldev] ++
8,118,174 UART: [ldev] CDI.KEYID = 6
8,119,088 UART: [ldev] SUBJECT.KEYID = 5
8,120,256 UART: [ldev] AUTHORITY.KEYID = 7
8,121,437 UART: [ldev] FE.KEYID = 1
8,162,333 UART: [ldev] Erasing FE.KEYID = 1
10,669,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,404,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,419,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,434,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,449,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,470,272 UART: [ldev] --
12,475,765 UART: [fwproc] Wait for Commands...
12,477,599 UART: [fwproc] Recv command 0x46574c44
12,479,923 UART: [fwproc] Recv'd Img size: 118548 bytes
15,976,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,058,974 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,182,590 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,742,390 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,441,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,306,671 >>> mbox cmd response: failed
12,307,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,307,562 >>> mbox cmd response: failed
12,307,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,308,123 >>> mbox cmd response: failed
Initializing fuses
2,062,327 writing to cptra_bootfsm_go
5,493,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,893,367 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,575 UART:
192,939 UART: Running Caliptra ROM ...
194,079 UART:
603,894 UART: [state] CFI Enabled
617,245 UART: [state] LifecycleState = Unprovisioned
619,646 UART: [state] DebugLocked = No
622,443 UART: [state] WD Timer not started. Device not locked for debugging
626,456 UART: [kat] SHA2-256
816,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,152 UART: [kat] ++
827,608 UART: [kat] sha1
838,440 UART: [kat] SHA2-256
841,456 UART: [kat] SHA2-384
847,387 UART: [kat] SHA2-512-ACC
849,956 UART: [kat] ECC-384
3,293,440 UART: [kat] HMAC-384Kdf
3,306,514 UART: [kat] LMS
3,838,304 UART: [kat] --
3,841,931 UART: [cold-reset] ++
3,843,839 UART: [fht] FHT @ 0x50003400
3,856,178 UART: [idev] ++
3,856,904 UART: [idev] CDI.KEYID = 6
3,857,831 UART: [idev] SUBJECT.KEYID = 7
3,859,002 UART: [idev] UDS.KEYID = 0
3,862,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,090 UART: [idev] Erasing UDS.KEYID = 0
6,337,824 UART: [idev] Sha1 KeyId Algorithm
6,361,335 UART: [idev] --
6,365,492 UART: [ldev] ++
6,366,182 UART: [ldev] CDI.KEYID = 6
6,367,094 UART: [ldev] SUBJECT.KEYID = 5
6,368,264 UART: [ldev] AUTHORITY.KEYID = 7
6,369,503 UART: [ldev] FE.KEYID = 1
6,380,749 UART: [ldev] Erasing FE.KEYID = 1
8,864,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,355 UART: [ldev] --
10,656,770 UART: [fwproc] Wait for Commands...
10,658,664 UART: [fwproc] Recv command 0x46574c44
10,660,937 UART: [fwproc] Recv'd Img size: 118548 bytes
12,742,022 UART: ROM Fatal Error: 0x000B003B
12,745,703 >>> mbox cmd response: failed
12,746,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,746,490 >>> mbox cmd response: failed
12,746,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,747,066 >>> mbox cmd response: failed
Initializing fuses
2,067,646 writing to cptra_bootfsm_go
2,256,982 UART:
2,257,336 UART: Running Caliptra ROM ...
2,258,381 UART:
7,700,478 UART: [state] CFI Enabled
7,714,950 UART: [state] LifecycleState = Unprovisioned
7,717,311 UART: [state] DebugLocked = No
7,719,029 UART: [state] WD Timer not started. Device not locked for debugging
7,724,362 UART: [kat] SHA2-256
7,914,264 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,925,021 UART: [kat] ++
7,925,586 UART: [kat] sha1
7,936,054 UART: [kat] SHA2-256
7,939,082 UART: [kat] SHA2-384
7,945,359 UART: [kat] SHA2-512-ACC
7,947,956 UART: [kat] ECC-384
10,390,462 UART: [kat] HMAC-384Kdf
10,404,592 UART: [kat] LMS
10,936,426 UART: [kat] --
10,939,631 UART: [cold-reset] ++
10,940,539 UART: [fht] FHT @ 0x50003400
10,952,062 UART: [idev] ++
10,952,754 UART: [idev] CDI.KEYID = 6
10,953,700 UART: [idev] SUBJECT.KEYID = 7
10,954,917 UART: [idev] UDS.KEYID = 0
10,957,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,106,211 UART: [idev] Erasing UDS.KEYID = 0
13,436,308 UART: [idev] Sha1 KeyId Algorithm
13,459,164 UART: [idev] --
13,463,754 UART: [ldev] ++
13,464,438 UART: [ldev] CDI.KEYID = 6
13,465,371 UART: [ldev] SUBJECT.KEYID = 5
13,466,535 UART: [ldev] AUTHORITY.KEYID = 7
13,467,712 UART: [ldev] FE.KEYID = 1
13,478,847 UART: [ldev] Erasing FE.KEYID = 1
15,954,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,674,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,689,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,705,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,720,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,741,601 UART: [ldev] --
17,747,122 UART: [fwproc] Wait for Commands...
17,749,064 UART: [fwproc] Recv command 0x46574c44
17,751,341 UART: [fwproc] Recv'd Img size: 118548 bytes
21,244,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,323,829 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,447,422 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,006,894 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
3,757,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,520,301 >>> mbox cmd response: failed
12,520,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,521,269 >>> mbox cmd response: failed
12,521,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,521,924 >>> mbox cmd response: failed
Initializing fuses
2,061,712 writing to cptra_bootfsm_go
11,098,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,381,478 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,677 UART: [kat] SHA2-256
881,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,723 UART: [kat] ++
885,875 UART: [kat] sha1
890,287 UART: [kat] SHA2-256
892,225 UART: [kat] SHA2-384
895,012 UART: [kat] SHA2-512-ACC
896,913 UART: [kat] ECC-384
902,548 UART: [kat] HMAC-384Kdf
906,966 UART: [kat] LMS
1,475,162 UART: [kat] --
1,476,067 UART: [cold-reset] ++
1,476,397 UART: [fht] Storing FHT @ 0x50003400
1,479,166 UART: [idev] ++
1,479,334 UART: [idev] CDI.KEYID = 6
1,479,694 UART: [idev] SUBJECT.KEYID = 7
1,480,118 UART: [idev] UDS.KEYID = 0
1,480,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,124 UART: [idev] Erasing UDS.KEYID = 0
1,504,630 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,342 UART: [idev] --
1,514,305 UART: [ldev] ++
1,514,473 UART: [ldev] CDI.KEYID = 6
1,514,836 UART: [ldev] SUBJECT.KEYID = 5
1,515,262 UART: [ldev] AUTHORITY.KEYID = 7
1,515,725 UART: [ldev] FE.KEYID = 1
1,520,567 UART: [ldev] Erasing FE.KEYID = 1
1,546,052 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,214 UART: [ldev] --
1,585,499 UART: [fwproc] Waiting for Commands...
1,586,360 UART: [fwproc] Received command 0x46574c44
1,587,151 UART: [fwproc] Received Image of size 118548 bytes
1,634,492 UART: ROM Fatal Error: 0x000B003B
1,635,651 >>> mbox cmd response: failed
1,635,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,657 >>> mbox cmd response: failed
1,635,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,613 UART: [kat] SHA2-256
881,544 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,659 UART: [kat] ++
885,811 UART: [kat] sha1
890,005 UART: [kat] SHA2-256
891,943 UART: [kat] SHA2-384
894,482 UART: [kat] SHA2-512-ACC
896,383 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,906 UART: [kat] LMS
1,475,102 UART: [kat] --
1,475,947 UART: [cold-reset] ++
1,476,289 UART: [fht] Storing FHT @ 0x50003400
1,479,030 UART: [idev] ++
1,479,198 UART: [idev] CDI.KEYID = 6
1,479,558 UART: [idev] SUBJECT.KEYID = 7
1,479,982 UART: [idev] UDS.KEYID = 0
1,480,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,068 UART: [idev] Erasing UDS.KEYID = 0
1,504,688 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,412 UART: [idev] --
1,514,517 UART: [ldev] ++
1,514,685 UART: [ldev] CDI.KEYID = 6
1,515,048 UART: [ldev] SUBJECT.KEYID = 5
1,515,474 UART: [ldev] AUTHORITY.KEYID = 7
1,515,937 UART: [ldev] FE.KEYID = 1
1,521,261 UART: [ldev] Erasing FE.KEYID = 1
1,546,116 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,148 UART: [ldev] --
1,585,449 UART: [fwproc] Waiting for Commands...
1,586,306 UART: [fwproc] Received command 0x46574c44
1,587,097 UART: [fwproc] Received Image of size 118548 bytes
2,931,578 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,326 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,544 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,851 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,780 >>> mbox cmd response: failed
1,489,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,786 >>> mbox cmd response: failed
1,489,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,792 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,425 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
87,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,754 UART: [kat] SHA2-256
882,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,800 UART: [kat] ++
886,952 UART: [kat] sha1
891,174 UART: [kat] SHA2-256
893,112 UART: [kat] SHA2-384
895,743 UART: [kat] SHA2-512-ACC
897,644 UART: [kat] ECC-384
903,239 UART: [kat] HMAC-384Kdf
907,893 UART: [kat] LMS
1,476,089 UART: [kat] --
1,476,978 UART: [cold-reset] ++
1,477,398 UART: [fht] Storing FHT @ 0x50003400
1,480,273 UART: [idev] ++
1,480,441 UART: [idev] CDI.KEYID = 6
1,480,801 UART: [idev] SUBJECT.KEYID = 7
1,481,225 UART: [idev] UDS.KEYID = 0
1,481,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,235 UART: [idev] Erasing UDS.KEYID = 0
1,506,177 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,651 UART: [idev] --
1,515,618 UART: [ldev] ++
1,515,786 UART: [ldev] CDI.KEYID = 6
1,516,149 UART: [ldev] SUBJECT.KEYID = 5
1,516,575 UART: [ldev] AUTHORITY.KEYID = 7
1,517,038 UART: [ldev] FE.KEYID = 1
1,522,252 UART: [ldev] Erasing FE.KEYID = 1
1,547,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,777 UART: [ldev] --
1,587,094 UART: [fwproc] Waiting for Commands...
1,587,849 UART: [fwproc] Received command 0x46574c44
1,588,640 UART: [fwproc] Received Image of size 118548 bytes
1,635,745 UART: ROM Fatal Error: 0x000B003B
1,636,904 >>> mbox cmd response: failed
1,636,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,910 >>> mbox cmd response: failed
1,636,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,572 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,132 UART: [kat] SHA2-256
882,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,178 UART: [kat] ++
886,330 UART: [kat] sha1
890,648 UART: [kat] SHA2-256
892,586 UART: [kat] SHA2-384
895,373 UART: [kat] SHA2-512-ACC
897,274 UART: [kat] ECC-384
902,817 UART: [kat] HMAC-384Kdf
907,315 UART: [kat] LMS
1,475,511 UART: [kat] --
1,476,086 UART: [cold-reset] ++
1,476,546 UART: [fht] Storing FHT @ 0x50003400
1,479,325 UART: [idev] ++
1,479,493 UART: [idev] CDI.KEYID = 6
1,479,853 UART: [idev] SUBJECT.KEYID = 7
1,480,277 UART: [idev] UDS.KEYID = 0
1,480,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,625 UART: [idev] Erasing UDS.KEYID = 0
1,505,397 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,013 UART: [idev] --
1,515,058 UART: [ldev] ++
1,515,226 UART: [ldev] CDI.KEYID = 6
1,515,589 UART: [ldev] SUBJECT.KEYID = 5
1,516,015 UART: [ldev] AUTHORITY.KEYID = 7
1,516,478 UART: [ldev] FE.KEYID = 1
1,521,706 UART: [ldev] Erasing FE.KEYID = 1
1,547,471 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,837 UART: [ldev] --
1,587,178 UART: [fwproc] Waiting for Commands...
1,587,799 UART: [fwproc] Received command 0x46574c44
1,588,590 UART: [fwproc] Received Image of size 118548 bytes
2,933,959 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,251 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,469 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,908 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,893 >>> mbox cmd response: failed
1,488,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,899 >>> mbox cmd response: failed
1,488,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,905 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,762 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,700 UART: [state] LifecycleState = Unprovisioned
85,355 UART: [state] DebugLocked = No
85,979 UART: [state] WD Timer not started. Device not locked for debugging
87,176 UART: [kat] SHA2-256
890,726 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,830 UART: [kat] ++
894,982 UART: [kat] sha1
899,192 UART: [kat] SHA2-256
901,132 UART: [kat] SHA2-384
903,907 UART: [kat] SHA2-512-ACC
905,808 UART: [kat] ECC-384
915,921 UART: [kat] HMAC-384Kdf
920,389 UART: [kat] LMS
1,168,701 UART: [kat] --
1,169,508 UART: [cold-reset] ++
1,170,056 UART: [fht] FHT @ 0x50003400
1,172,730 UART: [idev] ++
1,172,898 UART: [idev] CDI.KEYID = 6
1,173,259 UART: [idev] SUBJECT.KEYID = 7
1,173,684 UART: [idev] UDS.KEYID = 0
1,174,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,499 UART: [idev] Erasing UDS.KEYID = 0
1,198,543 UART: [idev] Sha1 KeyId Algorithm
1,207,315 UART: [idev] --
1,208,430 UART: [ldev] ++
1,208,598 UART: [ldev] CDI.KEYID = 6
1,208,962 UART: [ldev] SUBJECT.KEYID = 5
1,209,389 UART: [ldev] AUTHORITY.KEYID = 7
1,209,852 UART: [ldev] FE.KEYID = 1
1,214,982 UART: [ldev] Erasing FE.KEYID = 1
1,241,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,348 UART: [ldev] --
1,280,681 UART: [fwproc] Wait for Commands...
1,281,262 UART: [fwproc] Recv command 0x46574c44
1,281,995 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,142 UART: ROM Fatal Error: 0x000B003B
1,330,301 >>> mbox cmd response: failed
1,330,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,307 >>> mbox cmd response: failed
1,330,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,284 UART: [kat] ++
895,436 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
916,399 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,170,318 UART: [cold-reset] ++
1,170,654 UART: [fht] FHT @ 0x50003400
1,173,452 UART: [idev] ++
1,173,620 UART: [idev] CDI.KEYID = 6
1,173,981 UART: [idev] SUBJECT.KEYID = 7
1,174,406 UART: [idev] UDS.KEYID = 0
1,174,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,999 UART: [idev] Erasing UDS.KEYID = 0
1,199,393 UART: [idev] Sha1 KeyId Algorithm
1,208,419 UART: [idev] --
1,209,448 UART: [ldev] ++
1,209,616 UART: [ldev] CDI.KEYID = 6
1,209,980 UART: [ldev] SUBJECT.KEYID = 5
1,210,407 UART: [ldev] AUTHORITY.KEYID = 7
1,210,870 UART: [ldev] FE.KEYID = 1
1,216,104 UART: [ldev] Erasing FE.KEYID = 1
1,242,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,832 UART: [ldev] --
1,281,247 UART: [fwproc] Wait for Commands...
1,281,944 UART: [fwproc] Recv command 0x46574c44
1,282,677 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,360 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,535 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,892 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,654 >>> mbox cmd response: failed
1,187,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,660 >>> mbox cmd response: failed
1,187,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,399 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,671 UART: [kat] ++
895,823 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
916,760 UART: [kat] HMAC-384Kdf
921,562 UART: [kat] LMS
1,169,874 UART: [kat] --
1,170,861 UART: [cold-reset] ++
1,171,281 UART: [fht] FHT @ 0x50003400
1,173,787 UART: [idev] ++
1,173,955 UART: [idev] CDI.KEYID = 6
1,174,316 UART: [idev] SUBJECT.KEYID = 7
1,174,741 UART: [idev] UDS.KEYID = 0
1,175,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,808 UART: [idev] Erasing UDS.KEYID = 0
1,199,520 UART: [idev] Sha1 KeyId Algorithm
1,208,382 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,907 UART: [ldev] SUBJECT.KEYID = 5
1,210,334 UART: [ldev] AUTHORITY.KEYID = 7
1,210,797 UART: [ldev] FE.KEYID = 1
1,215,763 UART: [ldev] Erasing FE.KEYID = 1
1,242,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,617 UART: [ldev] --
1,281,948 UART: [fwproc] Wait for Commands...
1,282,755 UART: [fwproc] Recv command 0x46574c44
1,283,488 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,727 UART: ROM Fatal Error: 0x000B003B
1,330,886 >>> mbox cmd response: failed
1,330,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,892 >>> mbox cmd response: failed
1,330,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,898 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
891,385 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
916,290 UART: [kat] HMAC-384Kdf
921,012 UART: [kat] LMS
1,169,324 UART: [kat] --
1,170,125 UART: [cold-reset] ++
1,170,515 UART: [fht] FHT @ 0x50003400
1,173,151 UART: [idev] ++
1,173,319 UART: [idev] CDI.KEYID = 6
1,173,680 UART: [idev] SUBJECT.KEYID = 7
1,174,105 UART: [idev] UDS.KEYID = 0
1,174,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,098 UART: [idev] Erasing UDS.KEYID = 0
1,199,534 UART: [idev] Sha1 KeyId Algorithm
1,208,244 UART: [idev] --
1,209,397 UART: [ldev] ++
1,209,565 UART: [ldev] CDI.KEYID = 6
1,209,929 UART: [ldev] SUBJECT.KEYID = 5
1,210,356 UART: [ldev] AUTHORITY.KEYID = 7
1,210,819 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,243,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,277 UART: [ldev] --
1,282,612 UART: [fwproc] Wait for Commands...
1,283,287 UART: [fwproc] Recv command 0x46574c44
1,284,020 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,267 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,442 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,747 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,563 >>> mbox cmd response: failed
1,187,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,569 >>> mbox cmd response: failed
1,187,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,930 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,972 UART: [state] LifecycleState = Unprovisioned
86,627 UART: [state] DebugLocked = No
87,263 UART: [state] WD Timer not started. Device not locked for debugging
88,384 UART: [kat] SHA2-256
894,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,159 UART: [kat] ++
898,311 UART: [kat] sha1
902,613 UART: [kat] SHA2-256
904,553 UART: [kat] SHA2-384
907,198 UART: [kat] SHA2-512-ACC
909,099 UART: [kat] ECC-384
919,070 UART: [kat] HMAC-384Kdf
923,686 UART: [kat] LMS
1,172,014 UART: [kat] --
1,172,977 UART: [cold-reset] ++
1,173,539 UART: [fht] FHT @ 0x50003400
1,176,064 UART: [idev] ++
1,176,232 UART: [idev] CDI.KEYID = 6
1,176,592 UART: [idev] SUBJECT.KEYID = 7
1,177,016 UART: [idev] UDS.KEYID = 0
1,177,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,048 UART: [idev] Erasing UDS.KEYID = 0
1,201,889 UART: [idev] Sha1 KeyId Algorithm
1,210,251 UART: [idev] --
1,211,271 UART: [ldev] ++
1,211,439 UART: [ldev] CDI.KEYID = 6
1,211,802 UART: [ldev] SUBJECT.KEYID = 5
1,212,228 UART: [ldev] AUTHORITY.KEYID = 7
1,212,691 UART: [ldev] FE.KEYID = 1
1,217,955 UART: [ldev] Erasing FE.KEYID = 1
1,244,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,575 UART: [ldev] --
1,283,034 UART: [fwproc] Wait for Commands...
1,283,802 UART: [fwproc] Recv command 0x46574c44
1,284,530 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,433 UART: ROM Fatal Error: 0x000B003B
1,333,592 >>> mbox cmd response: failed
1,333,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,598 >>> mbox cmd response: failed
1,333,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,604 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
893,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,491 UART: [kat] ++
897,643 UART: [kat] sha1
901,919 UART: [kat] SHA2-256
903,859 UART: [kat] SHA2-384
906,494 UART: [kat] SHA2-512-ACC
908,395 UART: [kat] ECC-384
917,882 UART: [kat] HMAC-384Kdf
922,500 UART: [kat] LMS
1,170,828 UART: [kat] --
1,171,935 UART: [cold-reset] ++
1,172,307 UART: [fht] FHT @ 0x50003400
1,175,044 UART: [idev] ++
1,175,212 UART: [idev] CDI.KEYID = 6
1,175,572 UART: [idev] SUBJECT.KEYID = 7
1,175,996 UART: [idev] UDS.KEYID = 0
1,176,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,978 UART: [idev] Erasing UDS.KEYID = 0
1,200,985 UART: [idev] Sha1 KeyId Algorithm
1,209,239 UART: [idev] --
1,210,239 UART: [ldev] ++
1,210,407 UART: [ldev] CDI.KEYID = 6
1,210,770 UART: [ldev] SUBJECT.KEYID = 5
1,211,196 UART: [ldev] AUTHORITY.KEYID = 7
1,211,659 UART: [ldev] FE.KEYID = 1
1,216,767 UART: [ldev] Erasing FE.KEYID = 1
1,242,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,897 UART: [ldev] --
1,282,384 UART: [fwproc] Wait for Commands...
1,282,992 UART: [fwproc] Recv command 0x46574c44
1,283,720 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,037 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,207 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,428 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,673 >>> mbox cmd response: failed
1,186,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,679 >>> mbox cmd response: failed
1,186,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,685 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,481 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,259 UART: [kat] SHA2-256
893,909 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,034 UART: [kat] ++
898,186 UART: [kat] sha1
902,604 UART: [kat] SHA2-256
904,544 UART: [kat] SHA2-384
907,397 UART: [kat] SHA2-512-ACC
909,298 UART: [kat] ECC-384
919,145 UART: [kat] HMAC-384Kdf
923,841 UART: [kat] LMS
1,172,169 UART: [kat] --
1,173,104 UART: [cold-reset] ++
1,173,580 UART: [fht] FHT @ 0x50003400
1,176,113 UART: [idev] ++
1,176,281 UART: [idev] CDI.KEYID = 6
1,176,641 UART: [idev] SUBJECT.KEYID = 7
1,177,065 UART: [idev] UDS.KEYID = 0
1,177,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,693 UART: [idev] Erasing UDS.KEYID = 0
1,202,258 UART: [idev] Sha1 KeyId Algorithm
1,210,772 UART: [idev] --
1,211,794 UART: [ldev] ++
1,211,962 UART: [ldev] CDI.KEYID = 6
1,212,325 UART: [ldev] SUBJECT.KEYID = 5
1,212,751 UART: [ldev] AUTHORITY.KEYID = 7
1,213,214 UART: [ldev] FE.KEYID = 1
1,218,470 UART: [ldev] Erasing FE.KEYID = 1
1,244,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,078 UART: [ldev] --
1,283,485 UART: [fwproc] Wait for Commands...
1,284,309 UART: [fwproc] Recv command 0x46574c44
1,285,037 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,656 UART: ROM Fatal Error: 0x000B003B
1,332,815 >>> mbox cmd response: failed
1,332,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,821 >>> mbox cmd response: failed
1,332,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,827 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
87,074 UART: [state] WD Timer not started. Device not locked for debugging
88,253 UART: [kat] SHA2-256
893,903 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,028 UART: [kat] ++
898,180 UART: [kat] sha1
902,562 UART: [kat] SHA2-256
904,502 UART: [kat] SHA2-384
907,149 UART: [kat] SHA2-512-ACC
909,050 UART: [kat] ECC-384
918,589 UART: [kat] HMAC-384Kdf
923,133 UART: [kat] LMS
1,171,461 UART: [kat] --
1,172,182 UART: [cold-reset] ++
1,172,648 UART: [fht] FHT @ 0x50003400
1,175,171 UART: [idev] ++
1,175,339 UART: [idev] CDI.KEYID = 6
1,175,699 UART: [idev] SUBJECT.KEYID = 7
1,176,123 UART: [idev] UDS.KEYID = 0
1,176,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,135 UART: [idev] Erasing UDS.KEYID = 0
1,201,106 UART: [idev] Sha1 KeyId Algorithm
1,209,686 UART: [idev] --
1,210,850 UART: [ldev] ++
1,211,018 UART: [ldev] CDI.KEYID = 6
1,211,381 UART: [ldev] SUBJECT.KEYID = 5
1,211,807 UART: [ldev] AUTHORITY.KEYID = 7
1,212,270 UART: [ldev] FE.KEYID = 1
1,217,480 UART: [ldev] Erasing FE.KEYID = 1
1,243,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,532 UART: [ldev] --
1,282,991 UART: [fwproc] Wait for Commands...
1,283,641 UART: [fwproc] Recv command 0x46574c44
1,284,369 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,906 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,076 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,367 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,964 >>> mbox cmd response: failed
1,187,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,970 >>> mbox cmd response: failed
1,187,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,976 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,352 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,270 UART:
192,617 UART: Running Caliptra ROM ...
193,705 UART:
193,849 UART: [state] CFI Enabled
261,455 UART: [state] LifecycleState = Manufacturing
263,438 UART: [state] DebugLocked = No
265,168 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,681 UART: [kat] SHA2-256
439,400 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,899 UART: [kat] ++
450,347 UART: [kat] sha1
461,680 UART: [kat] SHA2-256
464,361 UART: [kat] SHA2-384
471,051 UART: [kat] SHA2-512-ACC
473,461 UART: [kat] ECC-384
2,766,565 UART: [kat] HMAC-384Kdf
2,798,835 UART: [kat] LMS
3,989,132 UART: [kat] --
3,993,944 UART: [cold-reset] ++
3,995,569 UART: [fht] Storing FHT @ 0x50003400
4,006,133 UART: [idev] ++
4,006,705 UART: [idev] CDI.KEYID = 6
4,007,634 UART: [idev] SUBJECT.KEYID = 7
4,008,911 UART: [idev] UDS.KEYID = 0
4,012,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,498 UART: [idev] Erasing UDS.KEYID = 0
7,346,591 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,500 UART: [idev] --
7,374,313 UART: [ldev] ++
7,374,888 UART: [ldev] CDI.KEYID = 6
7,375,854 UART: [ldev] SUBJECT.KEYID = 5
7,377,067 UART: [ldev] AUTHORITY.KEYID = 7
7,378,358 UART: [ldev] FE.KEYID = 1
7,423,931 UART: [ldev] Erasing FE.KEYID = 1
10,757,434 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,315 UART: [ldev] --
13,116,612 UART: [fwproc] Waiting for Commands...
13,118,627 UART: [fwproc] Received command 0x46574c44
13,120,823 UART: [fwproc] Received Image of size 118548 bytes
16,109,872 UART: ROM Fatal Error: 0x000B0025
16,113,339 >>> mbox cmd response: failed
16,113,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,114,143 >>> mbox cmd response: failed
16,114,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,114,712 >>> mbox cmd response: failed
Initializing fuses
2,059,968 writing to cptra_bootfsm_go
2,249,296 UART:
2,249,643 UART: Running Caliptra ROM ...
2,250,717 UART:
2,250,899 UART: [state] CFI Enabled
2,329,987 UART: [state] LifecycleState = Manufacturing
2,331,923 UART: [state] DebugLocked = No
2,333,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,338,012 UART: [kat] SHA2-256
2,507,744 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,518,253 UART: [kat] ++
2,518,722 UART: [kat] sha1
2,529,073 UART: [kat] SHA2-256
2,531,724 UART: [kat] SHA2-384
2,537,879 UART: [kat] SHA2-512-ACC
2,540,240 UART: [kat] ECC-384
4,830,353 UART: [kat] HMAC-384Kdf
4,861,326 UART: [kat] LMS
6,051,630 UART: [kat] --
6,058,484 UART: [cold-reset] ++
6,060,828 UART: [fht] Storing FHT @ 0x50003400
6,070,915 UART: [idev] ++
6,071,484 UART: [idev] CDI.KEYID = 6
6,072,449 UART: [idev] SUBJECT.KEYID = 7
6,073,666 UART: [idev] UDS.KEYID = 0
6,075,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,225,110 UART: [idev] Erasing UDS.KEYID = 0
9,405,917 UART: [idev] Using Sha1 for KeyId Algorithm
9,427,965 UART: [idev] --
9,431,856 UART: [ldev] ++
9,432,428 UART: [ldev] CDI.KEYID = 6
9,433,394 UART: [ldev] SUBJECT.KEYID = 5
9,434,668 UART: [ldev] AUTHORITY.KEYID = 7
9,435,906 UART: [ldev] FE.KEYID = 1
9,463,254 UART: [ldev] Erasing FE.KEYID = 1
12,797,128 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,113,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,127,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,142,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,157,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,175,805 UART: [ldev] --
15,180,045 UART: [fwproc] Waiting for Commands...
15,181,781 UART: [fwproc] Received command 0x46574c44
15,183,979 UART: [fwproc] Received Image of size 118548 bytes
19,321,705 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,396,799 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,469,969 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,798,583 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,785,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,907,110 >>> mbox cmd response: failed
15,907,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,908,131 >>> mbox cmd response: failed
15,908,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,908,702 >>> mbox cmd response: failed
Initializing fuses
2,060,517 writing to cptra_bootfsm_go
5,858,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,054,774 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,585 UART:
192,954 UART: Running Caliptra ROM ...
194,078 UART:
603,805 UART: [state] CFI Enabled
616,439 UART: [state] LifecycleState = Manufacturing
618,391 UART: [state] DebugLocked = No
619,887 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,559 UART: [kat] SHA2-256
794,294 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,872 UART: [kat] ++
805,406 UART: [kat] sha1
816,782 UART: [kat] SHA2-256
819,514 UART: [kat] SHA2-384
826,522 UART: [kat] SHA2-512-ACC
828,924 UART: [kat] ECC-384
3,113,701 UART: [kat] HMAC-384Kdf
3,126,753 UART: [kat] LMS
4,316,878 UART: [kat] --
4,320,444 UART: [cold-reset] ++
4,322,055 UART: [fht] Storing FHT @ 0x50003400
4,333,385 UART: [idev] ++
4,333,967 UART: [idev] CDI.KEYID = 6
4,334,884 UART: [idev] SUBJECT.KEYID = 7
4,336,113 UART: [idev] UDS.KEYID = 0
4,339,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,348 UART: [idev] Erasing UDS.KEYID = 0
7,625,491 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,875 UART: [idev] --
7,652,046 UART: [ldev] ++
7,652,635 UART: [ldev] CDI.KEYID = 6
7,653,608 UART: [ldev] SUBJECT.KEYID = 5
7,654,858 UART: [ldev] AUTHORITY.KEYID = 7
7,656,055 UART: [ldev] FE.KEYID = 1
7,668,275 UART: [ldev] Erasing FE.KEYID = 1
10,956,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,826 UART: [ldev] --
13,317,043 UART: [fwproc] Waiting for Commands...
13,319,530 UART: [fwproc] Received command 0x46574c44
13,321,722 UART: [fwproc] Received Image of size 118548 bytes
16,314,630 UART: ROM Fatal Error: 0x000B0025
16,318,066 >>> mbox cmd response: failed
16,318,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,318,826 >>> mbox cmd response: failed
16,319,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,319,419 >>> mbox cmd response: failed
Initializing fuses
2,058,694 writing to cptra_bootfsm_go
2,247,995 UART:
2,248,349 UART: Running Caliptra ROM ...
2,249,497 UART:
4,155,227 UART: [state] CFI Enabled
4,168,526 UART: [state] LifecycleState = Manufacturing
4,170,436 UART: [state] DebugLocked = No
4,173,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,177,601 UART: [kat] SHA2-256
4,347,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,357,890 UART: [kat] ++
4,358,442 UART: [kat] sha1
4,368,809 UART: [kat] SHA2-256
4,371,494 UART: [kat] SHA2-384
4,378,198 UART: [kat] SHA2-512-ACC
4,380,552 UART: [kat] ECC-384
6,664,233 UART: [kat] HMAC-384Kdf
6,675,875 UART: [kat] LMS
7,865,969 UART: [kat] --
7,871,334 UART: [cold-reset] ++
7,873,391 UART: [fht] Storing FHT @ 0x50003400
7,885,096 UART: [idev] ++
7,885,711 UART: [idev] CDI.KEYID = 6
7,886,603 UART: [idev] SUBJECT.KEYID = 7
7,887,777 UART: [idev] UDS.KEYID = 0
7,890,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,039,068 UART: [idev] Erasing UDS.KEYID = 0
11,177,887 UART: [idev] Using Sha1 for KeyId Algorithm
11,200,289 UART: [idev] --
11,203,098 UART: [ldev] ++
11,203,679 UART: [ldev] CDI.KEYID = 6
11,204,654 UART: [ldev] SUBJECT.KEYID = 5
11,205,855 UART: [ldev] AUTHORITY.KEYID = 7
11,207,102 UART: [ldev] FE.KEYID = 1
11,217,273 UART: [ldev] Erasing FE.KEYID = 1
14,507,251 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,799,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,813,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,828,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,843,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,862,507 UART: [ldev] --
16,867,358 UART: [fwproc] Waiting for Commands...
16,869,219 UART: [fwproc] Received command 0x46574c44
16,871,420 UART: [fwproc] Received Image of size 118548 bytes
21,004,850 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,087,656 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,160,847 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,488,893 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,128,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,101,049 >>> mbox cmd response: failed
16,101,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,102,078 >>> mbox cmd response: failed
16,102,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,102,655 >>> mbox cmd response: failed
Initializing fuses
2,053,890 writing to cptra_bootfsm_go
7,890,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,962,129 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
192,274 UART:
192,671 UART: Running Caliptra ROM ...
193,856 UART:
194,031 UART: [state] CFI Enabled
264,771 UART: [state] LifecycleState = Manufacturing
266,791 UART: [state] DebugLocked = No
268,787 UART: [state] WD Timer not started. Device not locked for debugging
273,350 UART: [kat] SHA2-256
453,017 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,784 UART: [kat] ++
464,385 UART: [kat] sha1
476,029 UART: [kat] SHA2-256
478,718 UART: [kat] SHA2-384
483,354 UART: [kat] SHA2-512-ACC
485,696 UART: [kat] ECC-384
2,947,682 UART: [kat] HMAC-384Kdf
2,972,399 UART: [kat] LMS
3,448,924 UART: [kat] --
3,453,296 UART: [cold-reset] ++
3,454,812 UART: [fht] FHT @ 0x50003400
3,467,150 UART: [idev] ++
3,467,717 UART: [idev] CDI.KEYID = 6
3,468,657 UART: [idev] SUBJECT.KEYID = 7
3,469,873 UART: [idev] UDS.KEYID = 0
3,472,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,129 UART: [idev] Erasing UDS.KEYID = 0
5,986,905 UART: [idev] Sha1 KeyId Algorithm
6,011,653 UART: [idev] --
6,015,603 UART: [ldev] ++
6,016,185 UART: [ldev] CDI.KEYID = 6
6,017,105 UART: [ldev] SUBJECT.KEYID = 5
6,018,274 UART: [ldev] AUTHORITY.KEYID = 7
6,019,568 UART: [ldev] FE.KEYID = 1
6,059,410 UART: [ldev] Erasing FE.KEYID = 1
8,566,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,212 UART: [ldev] --
10,375,364 UART: [fwproc] Wait for Commands...
10,378,064 UART: [fwproc] Recv command 0x46574c44
10,380,069 UART: [fwproc] Recv'd Img size: 118548 bytes
12,731,718 UART: ROM Fatal Error: 0x000B0025
12,735,011 >>> mbox cmd response: failed
12,735,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,735,791 >>> mbox cmd response: failed
12,736,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,736,374 >>> mbox cmd response: failed
Initializing fuses
2,054,456 writing to cptra_bootfsm_go
2,243,762 UART:
2,244,111 UART: Running Caliptra ROM ...
2,245,253 UART:
2,245,420 UART: [state] CFI Enabled
2,308,520 UART: [state] LifecycleState = Manufacturing
2,310,461 UART: [state] DebugLocked = No
2,311,914 UART: [state] WD Timer not started. Device not locked for debugging
2,316,642 UART: [kat] SHA2-256
2,496,321 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,507,075 UART: [kat] ++
2,507,566 UART: [kat] sha1
2,517,878 UART: [kat] SHA2-256
2,520,578 UART: [kat] SHA2-384
2,525,550 UART: [kat] SHA2-512-ACC
2,527,909 UART: [kat] ECC-384
4,973,545 UART: [kat] HMAC-384Kdf
4,986,847 UART: [kat] LMS
5,463,347 UART: [kat] --
5,469,618 UART: [cold-reset] ++
5,472,150 UART: [fht] FHT @ 0x50003400
5,483,353 UART: [idev] ++
5,483,925 UART: [idev] CDI.KEYID = 6
5,484,912 UART: [idev] SUBJECT.KEYID = 7
5,486,134 UART: [idev] UDS.KEYID = 0
5,488,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,638,569 UART: [idev] Erasing UDS.KEYID = 0
8,003,924 UART: [idev] Sha1 KeyId Algorithm
8,027,891 UART: [idev] --
8,032,303 UART: [ldev] ++
8,032,895 UART: [ldev] CDI.KEYID = 6
8,033,810 UART: [ldev] SUBJECT.KEYID = 5
8,034,915 UART: [ldev] AUTHORITY.KEYID = 7
8,036,268 UART: [ldev] FE.KEYID = 1
8,074,201 UART: [ldev] Erasing FE.KEYID = 1
10,580,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,318,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,333,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,349,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,365,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,386,676 UART: [ldev] --
12,392,927 UART: [fwproc] Wait for Commands...
12,395,464 UART: [fwproc] Recv command 0x46574c44
12,397,457 UART: [fwproc] Recv'd Img size: 118548 bytes
15,913,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,989,545 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,062,570 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,391,527 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,462,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,615,513 >>> mbox cmd response: failed
12,616,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,616,438 >>> mbox cmd response: failed
12,616,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,617,014 >>> mbox cmd response: failed
Initializing fuses
2,059,630 writing to cptra_bootfsm_go
5,520,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,305,114 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
192,611 UART:
192,957 UART: Running Caliptra ROM ...
194,150 UART:
603,786 UART: [state] CFI Enabled
615,729 UART: [state] LifecycleState = Manufacturing
617,641 UART: [state] DebugLocked = No
619,588 UART: [state] WD Timer not started. Device not locked for debugging
624,030 UART: [kat] SHA2-256
803,717 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,490 UART: [kat] ++
814,945 UART: [kat] sha1
825,876 UART: [kat] SHA2-256
828,574 UART: [kat] SHA2-384
834,665 UART: [kat] SHA2-512-ACC
837,008 UART: [kat] ECC-384
3,279,421 UART: [kat] HMAC-384Kdf
3,293,283 UART: [kat] LMS
3,769,806 UART: [kat] --
3,773,493 UART: [cold-reset] ++
3,775,753 UART: [fht] FHT @ 0x50003400
3,787,919 UART: [idev] ++
3,788,485 UART: [idev] CDI.KEYID = 6
3,789,508 UART: [idev] SUBJECT.KEYID = 7
3,790,726 UART: [idev] UDS.KEYID = 0
3,793,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,878 UART: [idev] Erasing UDS.KEYID = 0
6,268,551 UART: [idev] Sha1 KeyId Algorithm
6,291,513 UART: [idev] --
6,296,133 UART: [ldev] ++
6,296,721 UART: [ldev] CDI.KEYID = 6
6,297,793 UART: [ldev] SUBJECT.KEYID = 5
6,298,909 UART: [ldev] AUTHORITY.KEYID = 7
6,300,088 UART: [ldev] FE.KEYID = 1
6,312,896 UART: [ldev] Erasing FE.KEYID = 1
8,791,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,342 UART: [ldev] --
10,584,473 UART: [fwproc] Wait for Commands...
10,586,140 UART: [fwproc] Recv command 0x46574c44
10,588,191 UART: [fwproc] Recv'd Img size: 118548 bytes
12,934,032 UART: ROM Fatal Error: 0x000B0025
12,937,269 >>> mbox cmd response: failed
12,937,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,937,909 >>> mbox cmd response: failed
12,938,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,938,636 >>> mbox cmd response: failed
Initializing fuses
2,056,655 writing to cptra_bootfsm_go
2,245,927 UART:
2,246,262 UART: Running Caliptra ROM ...
2,247,315 UART:
7,516,433 UART: [state] CFI Enabled
7,530,158 UART: [state] LifecycleState = Manufacturing
7,532,087 UART: [state] DebugLocked = No
7,534,271 UART: [state] WD Timer not started. Device not locked for debugging
7,538,834 UART: [kat] SHA2-256
7,718,494 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,729,280 UART: [kat] ++
7,729,753 UART: [kat] sha1
7,741,344 UART: [kat] SHA2-256
7,744,031 UART: [kat] SHA2-384
7,751,099 UART: [kat] SHA2-512-ACC
7,753,469 UART: [kat] ECC-384
10,196,457 UART: [kat] HMAC-384Kdf
10,208,308 UART: [kat] LMS
10,684,820 UART: [kat] --
10,689,243 UART: [cold-reset] ++
10,690,577 UART: [fht] FHT @ 0x50003400
10,701,450 UART: [idev] ++
10,702,029 UART: [idev] CDI.KEYID = 6
10,703,024 UART: [idev] SUBJECT.KEYID = 7
10,704,379 UART: [idev] UDS.KEYID = 0
10,707,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,856,188 UART: [idev] Erasing UDS.KEYID = 0
13,181,253 UART: [idev] Sha1 KeyId Algorithm
13,204,451 UART: [idev] --
13,208,498 UART: [ldev] ++
13,209,081 UART: [ldev] CDI.KEYID = 6
13,209,994 UART: [ldev] SUBJECT.KEYID = 5
13,211,135 UART: [ldev] AUTHORITY.KEYID = 7
13,212,478 UART: [ldev] FE.KEYID = 1
13,225,500 UART: [ldev] Erasing FE.KEYID = 1
15,705,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,425,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,441,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,457,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,472,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,494,966 UART: [ldev] --
17,500,352 UART: [fwproc] Wait for Commands...
17,502,885 UART: [fwproc] Recv command 0x46574c44
17,504,942 UART: [fwproc] Recv'd Img size: 118548 bytes
21,017,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,094,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,167,585 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,495,200 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
3,776,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,835,736 >>> mbox cmd response: failed
12,837,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,837,433 >>> mbox cmd response: failed
12,837,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,838,012 >>> mbox cmd response: failed
Initializing fuses
2,055,410 writing to cptra_bootfsm_go
10,806,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,504,816 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,285 UART:
192,624 UART: Running Caliptra ROM ...
193,813 UART:
193,987 UART: [state] CFI Enabled
263,247 UART: [state] LifecycleState = Manufacturing
265,674 UART: [state] DebugLocked = No
267,662 UART: [state] WD Timer not started. Device not locked for debugging
272,172 UART: [kat] SHA2-256
462,035 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,824 UART: [kat] ++
473,277 UART: [kat] sha1
484,071 UART: [kat] SHA2-256
487,076 UART: [kat] SHA2-384
491,991 UART: [kat] SHA2-512-ACC
494,603 UART: [kat] ECC-384
2,945,561 UART: [kat] HMAC-384Kdf
2,970,450 UART: [kat] LMS
3,502,226 UART: [kat] --
3,507,259 UART: [cold-reset] ++
3,508,519 UART: [fht] FHT @ 0x50003400
3,519,890 UART: [idev] ++
3,520,605 UART: [idev] CDI.KEYID = 6
3,521,542 UART: [idev] SUBJECT.KEYID = 7
3,522,707 UART: [idev] UDS.KEYID = 0
3,525,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,608 UART: [idev] Erasing UDS.KEYID = 0
6,028,330 UART: [idev] Sha1 KeyId Algorithm
6,050,874 UART: [idev] --
6,056,226 UART: [ldev] ++
6,056,911 UART: [ldev] CDI.KEYID = 6
6,057,804 UART: [ldev] SUBJECT.KEYID = 5
6,059,023 UART: [ldev] AUTHORITY.KEYID = 7
6,060,159 UART: [ldev] FE.KEYID = 1
6,098,626 UART: [ldev] Erasing FE.KEYID = 1
8,607,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,280 UART: [ldev] --
10,413,029 UART: [fwproc] Wait for Commands...
10,414,759 UART: [fwproc] Recv command 0x46574c44
10,417,079 UART: [fwproc] Recv'd Img size: 118548 bytes
12,795,179 UART: ROM Fatal Error: 0x000B0025
12,798,816 >>> mbox cmd response: failed
12,799,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,799,499 >>> mbox cmd response: failed
12,799,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,800,029 >>> mbox cmd response: failed
Initializing fuses
2,056,227 writing to cptra_bootfsm_go
2,245,535 UART:
2,245,894 UART: Running Caliptra ROM ...
2,246,939 UART:
2,247,089 UART: [state] CFI Enabled
2,310,625 UART: [state] LifecycleState = Manufacturing
2,312,974 UART: [state] DebugLocked = No
2,315,199 UART: [state] WD Timer not started. Device not locked for debugging
2,319,128 UART: [kat] SHA2-256
2,508,978 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,519,784 UART: [kat] ++
2,520,255 UART: [kat] sha1
2,531,902 UART: [kat] SHA2-256
2,534,925 UART: [kat] SHA2-384
2,539,537 UART: [kat] SHA2-512-ACC
2,542,116 UART: [kat] ECC-384
4,990,677 UART: [kat] HMAC-384Kdf
5,017,063 UART: [kat] LMS
5,548,805 UART: [kat] --
5,552,319 UART: [cold-reset] ++
5,553,768 UART: [fht] FHT @ 0x50003400
5,566,481 UART: [idev] ++
5,567,159 UART: [idev] CDI.KEYID = 6
5,568,184 UART: [idev] SUBJECT.KEYID = 7
5,569,350 UART: [idev] UDS.KEYID = 0
5,571,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,720,784 UART: [idev] Erasing UDS.KEYID = 0
8,069,411 UART: [idev] Sha1 KeyId Algorithm
8,092,214 UART: [idev] --
8,096,403 UART: [ldev] ++
8,097,115 UART: [ldev] CDI.KEYID = 6
8,098,006 UART: [ldev] SUBJECT.KEYID = 5
8,099,176 UART: [ldev] AUTHORITY.KEYID = 7
8,100,360 UART: [ldev] FE.KEYID = 1
8,145,720 UART: [ldev] Erasing FE.KEYID = 1
10,652,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,090 UART: [ldev] --
12,458,175 UART: [fwproc] Wait for Commands...
12,461,259 UART: [fwproc] Recv command 0x46574c44
12,463,527 UART: [fwproc] Recv'd Img size: 118548 bytes
15,994,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,072,526 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,196,130 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,756,991 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,811 writing to cptra_bootfsm_go
3,435,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,702,393 >>> mbox cmd response: failed
12,702,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,703,335 >>> mbox cmd response: failed
12,703,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,703,903 >>> mbox cmd response: failed
Initializing fuses
2,050,335 writing to cptra_bootfsm_go
5,488,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,918,768 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,566 UART:
192,924 UART: Running Caliptra ROM ...
194,101 UART:
603,673 UART: [state] CFI Enabled
618,197 UART: [state] LifecycleState = Manufacturing
620,586 UART: [state] DebugLocked = No
623,074 UART: [state] WD Timer not started. Device not locked for debugging
627,486 UART: [kat] SHA2-256
817,358 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,147 UART: [kat] ++
828,654 UART: [kat] sha1
840,458 UART: [kat] SHA2-256
843,469 UART: [kat] SHA2-384
850,531 UART: [kat] SHA2-512-ACC
853,148 UART: [kat] ECC-384
3,295,400 UART: [kat] HMAC-384Kdf
3,308,631 UART: [kat] LMS
3,840,409 UART: [kat] --
3,846,079 UART: [cold-reset] ++
3,848,410 UART: [fht] FHT @ 0x50003400
3,860,441 UART: [idev] ++
3,861,157 UART: [idev] CDI.KEYID = 6
3,862,060 UART: [idev] SUBJECT.KEYID = 7
3,863,303 UART: [idev] UDS.KEYID = 0
3,866,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,015,234 UART: [idev] Erasing UDS.KEYID = 0
6,336,185 UART: [idev] Sha1 KeyId Algorithm
6,359,836 UART: [idev] --
6,365,425 UART: [ldev] ++
6,366,126 UART: [ldev] CDI.KEYID = 6
6,367,016 UART: [ldev] SUBJECT.KEYID = 5
6,368,236 UART: [ldev] AUTHORITY.KEYID = 7
6,369,417 UART: [ldev] FE.KEYID = 1
6,380,988 UART: [ldev] Erasing FE.KEYID = 1
8,854,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,332 UART: [ldev] --
10,642,871 UART: [fwproc] Wait for Commands...
10,645,898 UART: [fwproc] Recv command 0x46574c44
10,648,169 UART: [fwproc] Recv'd Img size: 118548 bytes
13,025,329 UART: ROM Fatal Error: 0x000B0025
13,028,953 >>> mbox cmd response: failed
13,029,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,029,663 >>> mbox cmd response: failed
13,029,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,030,242 >>> mbox cmd response: failed
Initializing fuses
2,063,089 writing to cptra_bootfsm_go
2,252,424 UART:
2,252,790 UART: Running Caliptra ROM ...
2,253,929 UART:
7,423,496 UART: [state] CFI Enabled
7,435,661 UART: [state] LifecycleState = Manufacturing
7,438,069 UART: [state] DebugLocked = No
7,440,251 UART: [state] WD Timer not started. Device not locked for debugging
7,445,315 UART: [kat] SHA2-256
7,635,169 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,645,988 UART: [kat] ++
7,646,457 UART: [kat] sha1
7,659,083 UART: [kat] SHA2-256
7,662,061 UART: [kat] SHA2-384
7,667,683 UART: [kat] SHA2-512-ACC
7,670,258 UART: [kat] ECC-384
10,110,536 UART: [kat] HMAC-384Kdf
10,123,692 UART: [kat] LMS
10,655,478 UART: [kat] --
10,657,852 UART: [cold-reset] ++
10,660,325 UART: [fht] FHT @ 0x50003400
10,670,983 UART: [idev] ++
10,671,696 UART: [idev] CDI.KEYID = 6
10,672,640 UART: [idev] SUBJECT.KEYID = 7
10,673,857 UART: [idev] UDS.KEYID = 0
10,676,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,825,118 UART: [idev] Erasing UDS.KEYID = 0
13,151,050 UART: [idev] Sha1 KeyId Algorithm
13,173,592 UART: [idev] --
13,178,294 UART: [ldev] ++
13,179,031 UART: [ldev] CDI.KEYID = 6
13,179,927 UART: [ldev] SUBJECT.KEYID = 5
13,181,056 UART: [ldev] AUTHORITY.KEYID = 7
13,182,209 UART: [ldev] FE.KEYID = 1
13,194,019 UART: [ldev] Erasing FE.KEYID = 1
15,673,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,390,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,405,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,421,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,436,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,458,084 UART: [ldev] --
17,464,056 UART: [fwproc] Wait for Commands...
17,466,590 UART: [fwproc] Recv command 0x46574c44
17,468,859 UART: [fwproc] Recv'd Img size: 118548 bytes
20,993,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,067,356 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,190,984 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,750,801 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
3,757,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,934,016 >>> mbox cmd response: failed
12,934,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,935,220 >>> mbox cmd response: failed
12,935,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,935,804 >>> mbox cmd response: failed
Initializing fuses
2,052,929 writing to cptra_bootfsm_go
10,683,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,022,858 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Manufacturing
85,597 UART: [state] DebugLocked = No
86,155 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,783 UART: [kat] SHA2-256
881,714 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,829 UART: [kat] ++
885,981 UART: [kat] sha1
890,305 UART: [kat] SHA2-256
892,243 UART: [kat] SHA2-384
894,846 UART: [kat] SHA2-512-ACC
896,747 UART: [kat] ECC-384
902,210 UART: [kat] HMAC-384Kdf
906,820 UART: [kat] LMS
1,475,016 UART: [kat] --
1,475,945 UART: [cold-reset] ++
1,476,505 UART: [fht] Storing FHT @ 0x50003400
1,479,224 UART: [idev] ++
1,479,392 UART: [idev] CDI.KEYID = 6
1,479,752 UART: [idev] SUBJECT.KEYID = 7
1,480,176 UART: [idev] UDS.KEYID = 0
1,480,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,922 UART: [idev] Erasing UDS.KEYID = 0
1,504,434 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,086 UART: [idev] --
1,513,967 UART: [ldev] ++
1,514,135 UART: [ldev] CDI.KEYID = 6
1,514,498 UART: [ldev] SUBJECT.KEYID = 5
1,514,924 UART: [ldev] AUTHORITY.KEYID = 7
1,515,387 UART: [ldev] FE.KEYID = 1
1,520,757 UART: [ldev] Erasing FE.KEYID = 1
1,545,986 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,804 UART: [ldev] --
1,585,279 UART: [fwproc] Waiting for Commands...
1,585,918 UART: [fwproc] Received command 0x46574c44
1,586,709 UART: [fwproc] Received Image of size 118548 bytes
1,891,463 UART: ROM Fatal Error: 0x000B0025
1,892,620 >>> mbox cmd response: failed
1,892,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,892,626 >>> mbox cmd response: failed
1,892,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,892,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,141 UART: [kat] SHA2-256
882,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,187 UART: [kat] ++
886,339 UART: [kat] sha1
890,467 UART: [kat] SHA2-256
892,405 UART: [kat] SHA2-384
895,184 UART: [kat] SHA2-512-ACC
897,085 UART: [kat] ECC-384
902,768 UART: [kat] HMAC-384Kdf
907,288 UART: [kat] LMS
1,475,484 UART: [kat] --
1,476,167 UART: [cold-reset] ++
1,476,675 UART: [fht] Storing FHT @ 0x50003400
1,479,490 UART: [idev] ++
1,479,658 UART: [idev] CDI.KEYID = 6
1,480,018 UART: [idev] SUBJECT.KEYID = 7
1,480,442 UART: [idev] UDS.KEYID = 0
1,480,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,016 UART: [idev] Erasing UDS.KEYID = 0
1,505,722 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,356 UART: [idev] --
1,515,367 UART: [ldev] ++
1,515,535 UART: [ldev] CDI.KEYID = 6
1,515,898 UART: [ldev] SUBJECT.KEYID = 5
1,516,324 UART: [ldev] AUTHORITY.KEYID = 7
1,516,787 UART: [ldev] FE.KEYID = 1
1,521,705 UART: [ldev] Erasing FE.KEYID = 1
1,546,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,970 UART: [ldev] --
1,586,253 UART: [fwproc] Waiting for Commands...
1,587,036 UART: [fwproc] Received command 0x46574c44
1,587,827 UART: [fwproc] Received Image of size 118548 bytes
2,932,104 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,890 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,351 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,745,679 >>> mbox cmd response: failed
1,745,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,745,685 >>> mbox cmd response: failed
1,745,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,745,691 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,289 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Manufacturing
86,102 UART: [state] DebugLocked = No
86,696 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,262 UART: [kat] SHA2-256
882,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,308 UART: [kat] ++
886,460 UART: [kat] sha1
890,688 UART: [kat] SHA2-256
892,626 UART: [kat] SHA2-384
895,335 UART: [kat] SHA2-512-ACC
897,236 UART: [kat] ECC-384
902,823 UART: [kat] HMAC-384Kdf
907,485 UART: [kat] LMS
1,475,681 UART: [kat] --
1,476,556 UART: [cold-reset] ++
1,476,984 UART: [fht] Storing FHT @ 0x50003400
1,479,739 UART: [idev] ++
1,479,907 UART: [idev] CDI.KEYID = 6
1,480,267 UART: [idev] SUBJECT.KEYID = 7
1,480,691 UART: [idev] UDS.KEYID = 0
1,481,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,647 UART: [idev] Erasing UDS.KEYID = 0
1,505,519 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,057 UART: [idev] --
1,515,008 UART: [ldev] ++
1,515,176 UART: [ldev] CDI.KEYID = 6
1,515,539 UART: [ldev] SUBJECT.KEYID = 5
1,515,965 UART: [ldev] AUTHORITY.KEYID = 7
1,516,428 UART: [ldev] FE.KEYID = 1
1,521,946 UART: [ldev] Erasing FE.KEYID = 1
1,547,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,289 UART: [ldev] --
1,586,634 UART: [fwproc] Waiting for Commands...
1,587,449 UART: [fwproc] Received command 0x46574c44
1,588,240 UART: [fwproc] Received Image of size 118548 bytes
1,893,032 UART: ROM Fatal Error: 0x000B0025
1,894,189 >>> mbox cmd response: failed
1,894,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,894,195 >>> mbox cmd response: failed
1,894,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,894,201 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,464 UART: [kat] SHA2-256
882,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,510 UART: [kat] ++
886,662 UART: [kat] sha1
890,826 UART: [kat] SHA2-256
892,764 UART: [kat] SHA2-384
895,467 UART: [kat] SHA2-512-ACC
897,368 UART: [kat] ECC-384
902,779 UART: [kat] HMAC-384Kdf
907,613 UART: [kat] LMS
1,475,809 UART: [kat] --
1,476,470 UART: [cold-reset] ++
1,476,800 UART: [fht] Storing FHT @ 0x50003400
1,479,539 UART: [idev] ++
1,479,707 UART: [idev] CDI.KEYID = 6
1,480,067 UART: [idev] SUBJECT.KEYID = 7
1,480,491 UART: [idev] UDS.KEYID = 0
1,480,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,821 UART: [idev] Erasing UDS.KEYID = 0
1,505,749 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,469 UART: [idev] --
1,515,682 UART: [ldev] ++
1,515,850 UART: [ldev] CDI.KEYID = 6
1,516,213 UART: [ldev] SUBJECT.KEYID = 5
1,516,639 UART: [ldev] AUTHORITY.KEYID = 7
1,517,102 UART: [ldev] FE.KEYID = 1
1,522,310 UART: [ldev] Erasing FE.KEYID = 1
1,547,793 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,251 UART: [ldev] --
1,587,520 UART: [fwproc] Waiting for Commands...
1,588,375 UART: [fwproc] Received command 0x46574c44
1,589,166 UART: [fwproc] Received Image of size 118548 bytes
2,933,107 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,259 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,477 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,686 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,747,822 >>> mbox cmd response: failed
1,747,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,747,828 >>> mbox cmd response: failed
1,747,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,747,834 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,636 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Manufacturing
85,769 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,226 UART: [kat] ++
895,378 UART: [kat] sha1
899,698 UART: [kat] SHA2-256
901,638 UART: [kat] SHA2-384
904,327 UART: [kat] SHA2-512-ACC
906,228 UART: [kat] ECC-384
915,925 UART: [kat] HMAC-384Kdf
920,605 UART: [kat] LMS
1,168,917 UART: [kat] --
1,169,724 UART: [cold-reset] ++
1,170,220 UART: [fht] FHT @ 0x50003400
1,172,892 UART: [idev] ++
1,173,060 UART: [idev] CDI.KEYID = 6
1,173,421 UART: [idev] SUBJECT.KEYID = 7
1,173,846 UART: [idev] UDS.KEYID = 0
1,174,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,198,671 UART: [idev] Sha1 KeyId Algorithm
1,207,603 UART: [idev] --
1,208,556 UART: [ldev] ++
1,208,724 UART: [ldev] CDI.KEYID = 6
1,209,088 UART: [ldev] SUBJECT.KEYID = 5
1,209,515 UART: [ldev] AUTHORITY.KEYID = 7
1,209,978 UART: [ldev] FE.KEYID = 1
1,215,148 UART: [ldev] Erasing FE.KEYID = 1
1,241,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,016 UART: [ldev] --
1,280,279 UART: [fwproc] Wait for Commands...
1,280,968 UART: [fwproc] Recv command 0x46574c44
1,281,701 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,214 UART: ROM Fatal Error: 0x000B0025
1,587,371 >>> mbox cmd response: failed
1,587,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,377 >>> mbox cmd response: failed
1,587,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,383 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,618 UART: [state] LifecycleState = Unprovisioned
86,273 UART: [state] DebugLocked = No
86,977 UART: [state] WD Timer not started. Device not locked for debugging
88,140 UART: [kat] SHA2-256
891,690 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,794 UART: [kat] ++
895,946 UART: [kat] sha1
900,094 UART: [kat] SHA2-256
902,034 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
915,759 UART: [kat] HMAC-384Kdf
920,387 UART: [kat] LMS
1,168,699 UART: [kat] --
1,169,846 UART: [cold-reset] ++
1,170,342 UART: [fht] FHT @ 0x50003400
1,172,934 UART: [idev] ++
1,173,102 UART: [idev] CDI.KEYID = 6
1,173,463 UART: [idev] SUBJECT.KEYID = 7
1,173,888 UART: [idev] UDS.KEYID = 0
1,174,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,683 UART: [idev] Erasing UDS.KEYID = 0
1,199,289 UART: [idev] Sha1 KeyId Algorithm
1,208,101 UART: [idev] --
1,209,298 UART: [ldev] ++
1,209,466 UART: [ldev] CDI.KEYID = 6
1,209,830 UART: [ldev] SUBJECT.KEYID = 5
1,210,257 UART: [ldev] AUTHORITY.KEYID = 7
1,210,720 UART: [ldev] FE.KEYID = 1
1,215,896 UART: [ldev] Erasing FE.KEYID = 1
1,242,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,824 UART: [ldev] --
1,282,249 UART: [fwproc] Wait for Commands...
1,282,984 UART: [fwproc] Recv command 0x46574c44
1,283,717 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,986 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,161 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,436 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,441,164 >>> mbox cmd response: failed
1,441,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,170 >>> mbox cmd response: failed
1,441,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,176 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,407 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Manufacturing
86,060 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
891,373 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,180 UART: [kat] HMAC-384Kdf
920,582 UART: [kat] LMS
1,168,894 UART: [kat] --
1,169,701 UART: [cold-reset] ++
1,170,119 UART: [fht] FHT @ 0x50003400
1,172,847 UART: [idev] ++
1,173,015 UART: [idev] CDI.KEYID = 6
1,173,376 UART: [idev] SUBJECT.KEYID = 7
1,173,801 UART: [idev] UDS.KEYID = 0
1,174,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,090 UART: [idev] Erasing UDS.KEYID = 0
1,199,504 UART: [idev] Sha1 KeyId Algorithm
1,208,308 UART: [idev] --
1,209,369 UART: [ldev] ++
1,209,537 UART: [ldev] CDI.KEYID = 6
1,209,901 UART: [ldev] SUBJECT.KEYID = 5
1,210,328 UART: [ldev] AUTHORITY.KEYID = 7
1,210,791 UART: [ldev] FE.KEYID = 1
1,216,093 UART: [ldev] Erasing FE.KEYID = 1
1,242,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,799 UART: [ldev] --
1,282,132 UART: [fwproc] Wait for Commands...
1,282,827 UART: [fwproc] Recv command 0x46574c44
1,283,560 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,311 UART: ROM Fatal Error: 0x000B0025
1,587,468 >>> mbox cmd response: failed
1,587,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,474 >>> mbox cmd response: failed
1,587,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,480 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
900,139 UART: [kat] SHA2-256
902,079 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,812 UART: [kat] HMAC-384Kdf
921,418 UART: [kat] LMS
1,169,730 UART: [kat] --
1,170,781 UART: [cold-reset] ++
1,171,357 UART: [fht] FHT @ 0x50003400
1,173,833 UART: [idev] ++
1,174,001 UART: [idev] CDI.KEYID = 6
1,174,362 UART: [idev] SUBJECT.KEYID = 7
1,174,787 UART: [idev] UDS.KEYID = 0
1,175,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,098 UART: [idev] Erasing UDS.KEYID = 0
1,200,202 UART: [idev] Sha1 KeyId Algorithm
1,208,868 UART: [idev] --
1,209,905 UART: [ldev] ++
1,210,073 UART: [ldev] CDI.KEYID = 6
1,210,437 UART: [ldev] SUBJECT.KEYID = 5
1,210,864 UART: [ldev] AUTHORITY.KEYID = 7
1,211,327 UART: [ldev] FE.KEYID = 1
1,216,853 UART: [ldev] Erasing FE.KEYID = 1
1,243,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,803 UART: [ldev] --
1,282,130 UART: [fwproc] Wait for Commands...
1,282,949 UART: [fwproc] Recv command 0x46574c44
1,283,682 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,373 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,548 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,819 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,551 >>> mbox cmd response: failed
1,444,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,557 >>> mbox cmd response: failed
1,444,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,563 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,170 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Manufacturing
85,977 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
893,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,707 UART: [kat] ++
897,859 UART: [kat] sha1
901,939 UART: [kat] SHA2-256
903,879 UART: [kat] SHA2-384
906,598 UART: [kat] SHA2-512-ACC
908,499 UART: [kat] ECC-384
918,258 UART: [kat] HMAC-384Kdf
922,774 UART: [kat] LMS
1,171,102 UART: [kat] --
1,171,935 UART: [cold-reset] ++
1,172,345 UART: [fht] FHT @ 0x50003400
1,174,940 UART: [idev] ++
1,175,108 UART: [idev] CDI.KEYID = 6
1,175,468 UART: [idev] SUBJECT.KEYID = 7
1,175,892 UART: [idev] UDS.KEYID = 0
1,176,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,100 UART: [idev] Erasing UDS.KEYID = 0
1,201,215 UART: [idev] Sha1 KeyId Algorithm
1,209,589 UART: [idev] --
1,210,777 UART: [ldev] ++
1,210,945 UART: [ldev] CDI.KEYID = 6
1,211,308 UART: [ldev] SUBJECT.KEYID = 5
1,211,734 UART: [ldev] AUTHORITY.KEYID = 7
1,212,197 UART: [ldev] FE.KEYID = 1
1,217,095 UART: [ldev] Erasing FE.KEYID = 1
1,243,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,005 UART: [ldev] --
1,282,440 UART: [fwproc] Wait for Commands...
1,283,164 UART: [fwproc] Recv command 0x46574c44
1,283,892 UART: [fwproc] Recv'd Img size: 118548 bytes
1,589,312 UART: ROM Fatal Error: 0x000B0025
1,590,469 >>> mbox cmd response: failed
1,590,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,590,475 >>> mbox cmd response: failed
1,590,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,590,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
893,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,421 UART: [kat] ++
897,573 UART: [kat] sha1
902,061 UART: [kat] SHA2-256
904,001 UART: [kat] SHA2-384
906,698 UART: [kat] SHA2-512-ACC
908,599 UART: [kat] ECC-384
918,742 UART: [kat] HMAC-384Kdf
923,330 UART: [kat] LMS
1,171,658 UART: [kat] --
1,172,591 UART: [cold-reset] ++
1,172,939 UART: [fht] FHT @ 0x50003400
1,175,796 UART: [idev] ++
1,175,964 UART: [idev] CDI.KEYID = 6
1,176,324 UART: [idev] SUBJECT.KEYID = 7
1,176,748 UART: [idev] UDS.KEYID = 0
1,177,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,532 UART: [idev] Erasing UDS.KEYID = 0
1,201,307 UART: [idev] Sha1 KeyId Algorithm
1,209,753 UART: [idev] --
1,210,799 UART: [ldev] ++
1,210,967 UART: [ldev] CDI.KEYID = 6
1,211,330 UART: [ldev] SUBJECT.KEYID = 5
1,211,756 UART: [ldev] AUTHORITY.KEYID = 7
1,212,219 UART: [ldev] FE.KEYID = 1
1,217,133 UART: [ldev] Erasing FE.KEYID = 1
1,243,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,923 UART: [ldev] --
1,282,262 UART: [fwproc] Wait for Commands...
1,282,982 UART: [fwproc] Recv command 0x46574c44
1,283,710 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,265 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,435 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,824 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,670 >>> mbox cmd response: failed
1,443,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,676 >>> mbox cmd response: failed
1,443,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,682 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,473 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Manufacturing
85,864 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
893,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,538 UART: [kat] ++
897,690 UART: [kat] sha1
901,828 UART: [kat] SHA2-256
903,768 UART: [kat] SHA2-384
906,393 UART: [kat] SHA2-512-ACC
908,294 UART: [kat] ECC-384
918,091 UART: [kat] HMAC-384Kdf
922,777 UART: [kat] LMS
1,171,105 UART: [kat] --
1,171,966 UART: [cold-reset] ++
1,172,500 UART: [fht] FHT @ 0x50003400
1,175,091 UART: [idev] ++
1,175,259 UART: [idev] CDI.KEYID = 6
1,175,619 UART: [idev] SUBJECT.KEYID = 7
1,176,043 UART: [idev] UDS.KEYID = 0
1,176,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,001 UART: [idev] Erasing UDS.KEYID = 0
1,200,836 UART: [idev] Sha1 KeyId Algorithm
1,209,294 UART: [idev] --
1,210,268 UART: [ldev] ++
1,210,436 UART: [ldev] CDI.KEYID = 6
1,210,799 UART: [ldev] SUBJECT.KEYID = 5
1,211,225 UART: [ldev] AUTHORITY.KEYID = 7
1,211,688 UART: [ldev] FE.KEYID = 1
1,216,792 UART: [ldev] Erasing FE.KEYID = 1
1,243,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,712 UART: [ldev] --
1,283,177 UART: [fwproc] Wait for Commands...
1,283,917 UART: [fwproc] Recv command 0x46574c44
1,284,645 UART: [fwproc] Recv'd Img size: 118548 bytes
1,590,357 UART: ROM Fatal Error: 0x000B0025
1,591,514 >>> mbox cmd response: failed
1,591,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,520 >>> mbox cmd response: failed
1,591,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,330 UART: [state] WD Timer not started. Device not locked for debugging
87,481 UART: [kat] SHA2-256
893,131 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,256 UART: [kat] ++
897,408 UART: [kat] sha1
901,466 UART: [kat] SHA2-256
903,406 UART: [kat] SHA2-384
906,125 UART: [kat] SHA2-512-ACC
908,026 UART: [kat] ECC-384
918,259 UART: [kat] HMAC-384Kdf
922,957 UART: [kat] LMS
1,171,285 UART: [kat] --
1,172,186 UART: [cold-reset] ++
1,172,530 UART: [fht] FHT @ 0x50003400
1,175,251 UART: [idev] ++
1,175,419 UART: [idev] CDI.KEYID = 6
1,175,779 UART: [idev] SUBJECT.KEYID = 7
1,176,203 UART: [idev] UDS.KEYID = 0
1,176,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,121 UART: [idev] Erasing UDS.KEYID = 0
1,201,426 UART: [idev] Sha1 KeyId Algorithm
1,209,962 UART: [idev] --
1,210,922 UART: [ldev] ++
1,211,090 UART: [ldev] CDI.KEYID = 6
1,211,453 UART: [ldev] SUBJECT.KEYID = 5
1,211,879 UART: [ldev] AUTHORITY.KEYID = 7
1,212,342 UART: [ldev] FE.KEYID = 1
1,217,430 UART: [ldev] Erasing FE.KEYID = 1
1,244,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,440 UART: [ldev] --
1,283,751 UART: [fwproc] Wait for Commands...
1,284,483 UART: [fwproc] Recv command 0x46574c44
1,285,211 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,674 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,844 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,029 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,445,811 >>> mbox cmd response: failed
1,445,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,817 >>> mbox cmd response: failed
1,445,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,823 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,964 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,121 UART:
192,476 UART: Running Caliptra ROM ...
193,606 UART:
193,753 UART: [state] CFI Enabled
261,879 UART: [state] LifecycleState = Manufacturing
263,765 UART: [state] DebugLocked = No
266,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,403 UART: [kat] SHA2-256
440,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,637 UART: [kat] ++
451,113 UART: [kat] sha1
461,883 UART: [kat] SHA2-256
464,572 UART: [kat] SHA2-384
471,003 UART: [kat] SHA2-512-ACC
473,357 UART: [kat] ECC-384
2,770,105 UART: [kat] HMAC-384Kdf
2,801,082 UART: [kat] LMS
3,991,347 UART: [kat] --
3,996,141 UART: [cold-reset] ++
3,998,518 UART: [fht] Storing FHT @ 0x50003400
4,010,497 UART: [idev] ++
4,011,074 UART: [idev] CDI.KEYID = 6
4,011,988 UART: [idev] SUBJECT.KEYID = 7
4,013,266 UART: [idev] UDS.KEYID = 0
4,016,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,165,789 UART: [idev] Erasing UDS.KEYID = 0
7,362,659 UART: [idev] Using Sha1 for KeyId Algorithm
7,385,043 UART: [idev] --
7,389,003 UART: [ldev] ++
7,389,623 UART: [ldev] CDI.KEYID = 6
7,390,542 UART: [ldev] SUBJECT.KEYID = 5
7,391,764 UART: [ldev] AUTHORITY.KEYID = 7
7,393,006 UART: [ldev] FE.KEYID = 1
7,438,554 UART: [ldev] Erasing FE.KEYID = 1
10,773,198 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,774 UART: [ldev] --
13,132,345 UART: [fwproc] Waiting for Commands...
13,135,040 UART: [fwproc] Received command 0x46574c44
13,137,235 UART: [fwproc] Received Image of size 118548 bytes
16,136,871 UART: ROM Fatal Error: 0x000B0027
16,140,345 >>> mbox cmd response: failed
16,140,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,141,164 >>> mbox cmd response: failed
16,141,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,141,731 >>> mbox cmd response: failed
Initializing fuses
2,062,417 writing to cptra_bootfsm_go
2,251,780 UART:
2,252,120 UART: Running Caliptra ROM ...
2,253,254 UART:
2,253,419 UART: [state] CFI Enabled
2,311,575 UART: [state] LifecycleState = Manufacturing
2,313,546 UART: [state] DebugLocked = No
2,315,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,648 UART: [kat] SHA2-256
2,490,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,856 UART: [kat] ++
2,501,321 UART: [kat] sha1
2,511,615 UART: [kat] SHA2-256
2,514,309 UART: [kat] SHA2-384
2,521,542 UART: [kat] SHA2-512-ACC
2,523,911 UART: [kat] ECC-384
4,816,894 UART: [kat] HMAC-384Kdf
4,848,198 UART: [kat] LMS
6,038,530 UART: [kat] --
6,044,237 UART: [cold-reset] ++
6,046,689 UART: [fht] Storing FHT @ 0x50003400
6,057,757 UART: [idev] ++
6,058,331 UART: [idev] CDI.KEYID = 6
6,059,253 UART: [idev] SUBJECT.KEYID = 7
6,060,553 UART: [idev] UDS.KEYID = 0
6,062,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,212,144 UART: [idev] Erasing UDS.KEYID = 0
9,392,742 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,766 UART: [idev] --
9,416,827 UART: [ldev] ++
9,417,415 UART: [ldev] CDI.KEYID = 6
9,418,382 UART: [ldev] SUBJECT.KEYID = 5
9,419,598 UART: [ldev] AUTHORITY.KEYID = 7
9,420,837 UART: [ldev] FE.KEYID = 1
9,449,692 UART: [ldev] Erasing FE.KEYID = 1
12,785,627 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,096,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,126,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,140,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,922 UART: [ldev] --
15,163,594 UART: [fwproc] Waiting for Commands...
15,166,540 UART: [fwproc] Received command 0x46574c44
15,168,757 UART: [fwproc] Received Image of size 118548 bytes
19,300,088 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,375,708 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,448,900 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,777,630 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
3,788,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,873,956 >>> mbox cmd response: failed
15,874,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,875,313 >>> mbox cmd response: failed
15,875,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,875,883 >>> mbox cmd response: failed
Initializing fuses
2,055,489 writing to cptra_bootfsm_go
5,821,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,039,898 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,484 UART:
192,846 UART: Running Caliptra ROM ...
193,988 UART:
603,743 UART: [state] CFI Enabled
615,051 UART: [state] LifecycleState = Manufacturing
616,952 UART: [state] DebugLocked = No
619,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,877 UART: [kat] SHA2-256
793,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,145 UART: [kat] ++
804,647 UART: [kat] sha1
815,368 UART: [kat] SHA2-256
818,060 UART: [kat] SHA2-384
824,965 UART: [kat] SHA2-512-ACC
827,306 UART: [kat] ECC-384
3,109,881 UART: [kat] HMAC-384Kdf
3,121,313 UART: [kat] LMS
4,311,439 UART: [kat] --
4,318,100 UART: [cold-reset] ++
4,320,430 UART: [fht] Storing FHT @ 0x50003400
4,331,165 UART: [idev] ++
4,331,743 UART: [idev] CDI.KEYID = 6
4,332,657 UART: [idev] SUBJECT.KEYID = 7
4,333,883 UART: [idev] UDS.KEYID = 0
4,336,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,935 UART: [idev] Erasing UDS.KEYID = 0
7,618,922 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,090 UART: [idev] --
7,643,159 UART: [ldev] ++
7,643,746 UART: [ldev] CDI.KEYID = 6
7,644,720 UART: [ldev] SUBJECT.KEYID = 5
7,645,946 UART: [ldev] AUTHORITY.KEYID = 7
7,647,190 UART: [ldev] FE.KEYID = 1
7,658,823 UART: [ldev] Erasing FE.KEYID = 1
10,944,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,249,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,264,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,297,997 UART: [ldev] --
13,302,837 UART: [fwproc] Waiting for Commands...
13,305,105 UART: [fwproc] Received command 0x46574c44
13,307,325 UART: [fwproc] Received Image of size 118548 bytes
16,291,416 UART: ROM Fatal Error: 0x000B0027
16,294,878 >>> mbox cmd response: failed
16,295,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,295,658 >>> mbox cmd response: failed
16,295,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,296,231 >>> mbox cmd response: failed
Initializing fuses
2,058,661 writing to cptra_bootfsm_go
2,247,989 UART:
2,248,346 UART: Running Caliptra ROM ...
2,249,496 UART:
4,174,766 UART: [state] CFI Enabled
4,192,556 UART: [state] LifecycleState = Manufacturing
4,194,479 UART: [state] DebugLocked = No
4,196,039 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,200,087 UART: [kat] SHA2-256
4,369,860 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,380,368 UART: [kat] ++
4,380,922 UART: [kat] sha1
4,391,375 UART: [kat] SHA2-256
4,394,068 UART: [kat] SHA2-384
4,399,054 UART: [kat] SHA2-512-ACC
4,401,420 UART: [kat] ECC-384
6,684,613 UART: [kat] HMAC-384Kdf
6,695,991 UART: [kat] LMS
7,886,075 UART: [kat] --
7,890,561 UART: [cold-reset] ++
7,892,122 UART: [fht] Storing FHT @ 0x50003400
7,904,333 UART: [idev] ++
7,904,945 UART: [idev] CDI.KEYID = 6
7,905,868 UART: [idev] SUBJECT.KEYID = 7
7,907,093 UART: [idev] UDS.KEYID = 0
7,909,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,058,281 UART: [idev] Erasing UDS.KEYID = 0
11,197,041 UART: [idev] Using Sha1 for KeyId Algorithm
11,217,196 UART: [idev] --
11,221,367 UART: [ldev] ++
11,221,939 UART: [ldev] CDI.KEYID = 6
11,222,909 UART: [ldev] SUBJECT.KEYID = 5
11,224,168 UART: [ldev] AUTHORITY.KEYID = 7
11,225,415 UART: [ldev] FE.KEYID = 1
11,237,955 UART: [ldev] Erasing FE.KEYID = 1
14,534,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,827,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,842,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,857,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,871,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,889,759 UART: [ldev] --
16,894,224 UART: [fwproc] Waiting for Commands...
16,896,923 UART: [fwproc] Received command 0x46574c44
16,899,113 UART: [fwproc] Received Image of size 118548 bytes
21,027,612 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,098,740 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,171,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,500,846 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
4,127,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,099,847 >>> mbox cmd response: failed
16,100,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,100,998 >>> mbox cmd response: failed
16,101,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,101,572 >>> mbox cmd response: failed
Initializing fuses
2,054,673 writing to cptra_bootfsm_go
7,885,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,953,778 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
192,444 UART:
192,795 UART: Running Caliptra ROM ...
193,916 UART:
194,064 UART: [state] CFI Enabled
265,734 UART: [state] LifecycleState = Manufacturing
267,684 UART: [state] DebugLocked = No
269,939 UART: [state] WD Timer not started. Device not locked for debugging
274,327 UART: [kat] SHA2-256
453,979 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,744 UART: [kat] ++
465,228 UART: [kat] sha1
474,978 UART: [kat] SHA2-256
477,669 UART: [kat] SHA2-384
483,165 UART: [kat] SHA2-512-ACC
485,560 UART: [kat] ECC-384
2,947,383 UART: [kat] HMAC-384Kdf
2,969,736 UART: [kat] LMS
3,446,258 UART: [kat] --
3,449,844 UART: [cold-reset] ++
3,452,327 UART: [fht] FHT @ 0x50003400
3,464,900 UART: [idev] ++
3,465,483 UART: [idev] CDI.KEYID = 6
3,466,410 UART: [idev] SUBJECT.KEYID = 7
3,467,632 UART: [idev] UDS.KEYID = 0
3,470,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,129 UART: [idev] Erasing UDS.KEYID = 0
5,985,995 UART: [idev] Sha1 KeyId Algorithm
6,009,230 UART: [idev] --
6,013,238 UART: [ldev] ++
6,013,821 UART: [ldev] CDI.KEYID = 6
6,014,737 UART: [ldev] SUBJECT.KEYID = 5
6,015,960 UART: [ldev] AUTHORITY.KEYID = 7
6,017,203 UART: [ldev] FE.KEYID = 1
6,057,408 UART: [ldev] Erasing FE.KEYID = 1
8,561,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,338 UART: [ldev] --
10,373,836 UART: [fwproc] Wait for Commands...
10,376,897 UART: [fwproc] Recv command 0x46574c44
10,378,896 UART: [fwproc] Recv'd Img size: 118548 bytes
12,740,966 UART: ROM Fatal Error: 0x000B0027
12,744,251 >>> mbox cmd response: failed
12,744,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,745,004 >>> mbox cmd response: failed
12,745,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,745,584 >>> mbox cmd response: failed
Initializing fuses
2,060,209 writing to cptra_bootfsm_go
2,249,520 UART:
2,249,859 UART: Running Caliptra ROM ...
2,250,915 UART:
2,251,067 UART: [state] CFI Enabled
2,320,971 UART: [state] LifecycleState = Manufacturing
2,322,908 UART: [state] DebugLocked = No
2,325,570 UART: [state] WD Timer not started. Device not locked for debugging
2,329,760 UART: [kat] SHA2-256
2,509,384 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,520,176 UART: [kat] ++
2,520,729 UART: [kat] sha1
2,531,799 UART: [kat] SHA2-256
2,534,498 UART: [kat] SHA2-384
2,540,059 UART: [kat] SHA2-512-ACC
2,542,450 UART: [kat] ECC-384
5,003,574 UART: [kat] HMAC-384Kdf
5,027,929 UART: [kat] LMS
5,504,429 UART: [kat] --
5,508,749 UART: [cold-reset] ++
5,510,582 UART: [fht] FHT @ 0x50003400
5,521,672 UART: [idev] ++
5,522,251 UART: [idev] CDI.KEYID = 6
5,523,275 UART: [idev] SUBJECT.KEYID = 7
5,524,443 UART: [idev] UDS.KEYID = 0
5,527,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,676,292 UART: [idev] Erasing UDS.KEYID = 0
8,042,137 UART: [idev] Sha1 KeyId Algorithm
8,067,114 UART: [idev] --
8,071,931 UART: [ldev] ++
8,072,513 UART: [ldev] CDI.KEYID = 6
8,073,454 UART: [ldev] SUBJECT.KEYID = 5
8,074,631 UART: [ldev] AUTHORITY.KEYID = 7
8,075,877 UART: [ldev] FE.KEYID = 1
8,113,868 UART: [ldev] Erasing FE.KEYID = 1
10,622,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,356,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,372,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,388,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,403,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,425,034 UART: [ldev] --
12,430,077 UART: [fwproc] Wait for Commands...
12,432,248 UART: [fwproc] Recv command 0x46574c44
12,434,243 UART: [fwproc] Recv'd Img size: 118548 bytes
15,941,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,020,841 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,093,852 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,421,469 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,465,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,605,857 >>> mbox cmd response: failed
12,606,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,606,798 >>> mbox cmd response: failed
12,607,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,607,369 >>> mbox cmd response: failed
Initializing fuses
2,053,785 writing to cptra_bootfsm_go
5,507,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,322,745 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,397 UART:
192,765 UART: Running Caliptra ROM ...
193,886 UART:
603,583 UART: [state] CFI Enabled
622,171 UART: [state] LifecycleState = Manufacturing
624,083 UART: [state] DebugLocked = No
626,896 UART: [state] WD Timer not started. Device not locked for debugging
630,581 UART: [kat] SHA2-256
810,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
821,047 UART: [kat] ++
821,515 UART: [kat] sha1
831,775 UART: [kat] SHA2-256
834,476 UART: [kat] SHA2-384
839,055 UART: [kat] SHA2-512-ACC
841,420 UART: [kat] ECC-384
3,282,214 UART: [kat] HMAC-384Kdf
3,295,244 UART: [kat] LMS
3,771,759 UART: [kat] --
3,775,180 UART: [cold-reset] ++
3,777,661 UART: [fht] FHT @ 0x50003400
3,787,844 UART: [idev] ++
3,788,451 UART: [idev] CDI.KEYID = 6
3,789,377 UART: [idev] SUBJECT.KEYID = 7
3,790,596 UART: [idev] UDS.KEYID = 0
3,793,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,869 UART: [idev] Erasing UDS.KEYID = 0
6,269,415 UART: [idev] Sha1 KeyId Algorithm
6,293,066 UART: [idev] --
6,299,445 UART: [ldev] ++
6,300,020 UART: [ldev] CDI.KEYID = 6
6,300,986 UART: [ldev] SUBJECT.KEYID = 5
6,302,152 UART: [ldev] AUTHORITY.KEYID = 7
6,303,446 UART: [ldev] FE.KEYID = 1
6,314,367 UART: [ldev] Erasing FE.KEYID = 1
8,792,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,026 UART: [ldev] --
10,591,987 UART: [fwproc] Wait for Commands...
10,593,720 UART: [fwproc] Recv command 0x46574c44
10,595,712 UART: [fwproc] Recv'd Img size: 118548 bytes
12,952,676 UART: ROM Fatal Error: 0x000B0027
12,955,941 >>> mbox cmd response: failed
12,956,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,956,743 >>> mbox cmd response: failed
12,957,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,957,315 >>> mbox cmd response: failed
Initializing fuses
2,056,812 writing to cptra_bootfsm_go
2,246,124 UART:
2,246,478 UART: Running Caliptra ROM ...
2,247,624 UART:
7,503,535 UART: [state] CFI Enabled
7,515,081 UART: [state] LifecycleState = Manufacturing
7,516,996 UART: [state] DebugLocked = No
7,519,255 UART: [state] WD Timer not started. Device not locked for debugging
7,523,488 UART: [kat] SHA2-256
7,703,122 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,713,893 UART: [kat] ++
7,714,450 UART: [kat] sha1
7,726,323 UART: [kat] SHA2-256
7,729,018 UART: [kat] SHA2-384
7,734,526 UART: [kat] SHA2-512-ACC
7,736,879 UART: [kat] ECC-384
10,180,515 UART: [kat] HMAC-384Kdf
10,192,318 UART: [kat] LMS
10,668,816 UART: [kat] --
10,673,237 UART: [cold-reset] ++
10,675,775 UART: [fht] FHT @ 0x50003400
10,687,731 UART: [idev] ++
10,688,298 UART: [idev] CDI.KEYID = 6
10,689,269 UART: [idev] SUBJECT.KEYID = 7
10,690,488 UART: [idev] UDS.KEYID = 0
10,693,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,842,640 UART: [idev] Erasing UDS.KEYID = 0
13,171,862 UART: [idev] Sha1 KeyId Algorithm
13,195,361 UART: [idev] --
13,200,491 UART: [ldev] ++
13,201,060 UART: [ldev] CDI.KEYID = 6
13,201,956 UART: [ldev] SUBJECT.KEYID = 5
13,203,171 UART: [ldev] AUTHORITY.KEYID = 7
13,204,461 UART: [ldev] FE.KEYID = 1
13,214,435 UART: [ldev] Erasing FE.KEYID = 1
15,690,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,410,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,426,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,441,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,457,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,479,626 UART: [ldev] --
17,485,088 UART: [fwproc] Wait for Commands...
17,487,355 UART: [fwproc] Recv command 0x46574c44
17,489,344 UART: [fwproc] Recv'd Img size: 118548 bytes
21,005,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,085,332 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,158,354 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,486,023 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
3,777,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,829,265 >>> mbox cmd response: failed
12,829,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,830,741 >>> mbox cmd response: failed
12,831,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,831,393 >>> mbox cmd response: failed
Initializing fuses
2,064,064 writing to cptra_bootfsm_go
10,814,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,519,578 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,180 UART:
192,545 UART: Running Caliptra ROM ...
193,642 UART:
193,787 UART: [state] CFI Enabled
258,262 UART: [state] LifecycleState = Manufacturing
260,636 UART: [state] DebugLocked = No
263,536 UART: [state] WD Timer not started. Device not locked for debugging
268,063 UART: [kat] SHA2-256
457,942 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,708 UART: [kat] ++
469,160 UART: [kat] sha1
480,963 UART: [kat] SHA2-256
483,983 UART: [kat] SHA2-384
488,410 UART: [kat] SHA2-512-ACC
491,032 UART: [kat] ECC-384
2,946,276 UART: [kat] HMAC-384Kdf
2,970,684 UART: [kat] LMS
3,502,459 UART: [kat] --
3,506,628 UART: [cold-reset] ++
3,508,297 UART: [fht] FHT @ 0x50003400
3,519,230 UART: [idev] ++
3,519,915 UART: [idev] CDI.KEYID = 6
3,520,936 UART: [idev] SUBJECT.KEYID = 7
3,522,042 UART: [idev] UDS.KEYID = 0
3,524,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,199 UART: [idev] Erasing UDS.KEYID = 0
6,029,598 UART: [idev] Sha1 KeyId Algorithm
6,052,889 UART: [idev] --
6,058,357 UART: [ldev] ++
6,059,043 UART: [ldev] CDI.KEYID = 6
6,059,964 UART: [ldev] SUBJECT.KEYID = 5
6,061,150 UART: [ldev] AUTHORITY.KEYID = 7
6,062,398 UART: [ldev] FE.KEYID = 1
6,097,579 UART: [ldev] Erasing FE.KEYID = 1
8,602,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,759 UART: [ldev] --
10,412,624 UART: [fwproc] Wait for Commands...
10,414,295 UART: [fwproc] Recv command 0x46574c44
10,416,621 UART: [fwproc] Recv'd Img size: 118548 bytes
12,788,121 UART: ROM Fatal Error: 0x000B0027
12,791,795 >>> mbox cmd response: failed
12,792,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,792,552 >>> mbox cmd response: failed
12,792,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,793,145 >>> mbox cmd response: failed
Initializing fuses
2,058,332 writing to cptra_bootfsm_go
2,247,677 UART:
2,248,026 UART: Running Caliptra ROM ...
2,249,112 UART:
2,249,277 UART: [state] CFI Enabled
2,312,447 UART: [state] LifecycleState = Manufacturing
2,314,826 UART: [state] DebugLocked = No
2,316,820 UART: [state] WD Timer not started. Device not locked for debugging
2,321,889 UART: [kat] SHA2-256
2,511,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,522,526 UART: [kat] ++
2,522,995 UART: [kat] sha1
2,535,138 UART: [kat] SHA2-256
2,538,120 UART: [kat] SHA2-384
2,544,662 UART: [kat] SHA2-512-ACC
2,547,238 UART: [kat] ECC-384
5,003,020 UART: [kat] HMAC-384Kdf
5,023,961 UART: [kat] LMS
5,555,713 UART: [kat] --
5,561,177 UART: [cold-reset] ++
5,562,145 UART: [fht] FHT @ 0x50003400
5,572,895 UART: [idev] ++
5,573,577 UART: [idev] CDI.KEYID = 6
5,574,520 UART: [idev] SUBJECT.KEYID = 7
5,575,739 UART: [idev] UDS.KEYID = 0
5,578,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,727,291 UART: [idev] Erasing UDS.KEYID = 0
8,081,323 UART: [idev] Sha1 KeyId Algorithm
8,104,079 UART: [idev] --
8,109,223 UART: [ldev] ++
8,109,944 UART: [ldev] CDI.KEYID = 6
8,110,865 UART: [ldev] SUBJECT.KEYID = 5
8,112,035 UART: [ldev] AUTHORITY.KEYID = 7
8,113,275 UART: [ldev] FE.KEYID = 1
8,152,556 UART: [ldev] Erasing FE.KEYID = 1
10,654,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,683 UART: [ldev] --
12,467,924 UART: [fwproc] Wait for Commands...
12,470,582 UART: [fwproc] Recv command 0x46574c44
12,472,904 UART: [fwproc] Recv'd Img size: 118548 bytes
16,010,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,086,194 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,209,832 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,769,513 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,439,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,717,730 >>> mbox cmd response: failed
12,718,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,718,637 >>> mbox cmd response: failed
12,718,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,719,207 >>> mbox cmd response: failed
Initializing fuses
2,055,296 writing to cptra_bootfsm_go
5,479,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,910,362 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,472 UART:
192,836 UART: Running Caliptra ROM ...
194,033 UART:
603,637 UART: [state] CFI Enabled
619,250 UART: [state] LifecycleState = Manufacturing
621,592 UART: [state] DebugLocked = No
623,141 UART: [state] WD Timer not started. Device not locked for debugging
627,501 UART: [kat] SHA2-256
817,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,202 UART: [kat] ++
828,742 UART: [kat] sha1
839,470 UART: [kat] SHA2-256
842,493 UART: [kat] SHA2-384
847,667 UART: [kat] SHA2-512-ACC
850,287 UART: [kat] ECC-384
3,291,161 UART: [kat] HMAC-384Kdf
3,304,010 UART: [kat] LMS
3,835,799 UART: [kat] --
3,838,551 UART: [cold-reset] ++
3,840,347 UART: [fht] FHT @ 0x50003400
3,851,785 UART: [idev] ++
3,852,476 UART: [idev] CDI.KEYID = 6
3,853,446 UART: [idev] SUBJECT.KEYID = 7
3,854,629 UART: [idev] UDS.KEYID = 0
3,857,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,737 UART: [idev] Erasing UDS.KEYID = 0
6,333,690 UART: [idev] Sha1 KeyId Algorithm
6,356,448 UART: [idev] --
6,361,911 UART: [ldev] ++
6,362,597 UART: [ldev] CDI.KEYID = 6
6,363,516 UART: [ldev] SUBJECT.KEYID = 5
6,364,683 UART: [ldev] AUTHORITY.KEYID = 7
6,365,921 UART: [ldev] FE.KEYID = 1
6,376,461 UART: [ldev] Erasing FE.KEYID = 1
8,850,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,026 UART: [ldev] --
10,641,015 UART: [fwproc] Wait for Commands...
10,643,487 UART: [fwproc] Recv command 0x46574c44
10,645,765 UART: [fwproc] Recv'd Img size: 118548 bytes
13,023,239 UART: ROM Fatal Error: 0x000B0027
13,026,914 >>> mbox cmd response: failed
13,027,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,027,581 >>> mbox cmd response: failed
13,027,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,028,110 >>> mbox cmd response: failed
Initializing fuses
2,056,209 writing to cptra_bootfsm_go
2,245,543 UART:
2,245,904 UART: Running Caliptra ROM ...
2,246,953 UART:
7,441,989 UART: [state] CFI Enabled
7,453,184 UART: [state] LifecycleState = Manufacturing
7,455,632 UART: [state] DebugLocked = No
7,457,197 UART: [state] WD Timer not started. Device not locked for debugging
7,461,349 UART: [kat] SHA2-256
7,651,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,662,035 UART: [kat] ++
7,662,643 UART: [kat] sha1
7,674,247 UART: [kat] SHA2-256
7,677,220 UART: [kat] SHA2-384
7,684,513 UART: [kat] SHA2-512-ACC
7,687,095 UART: [kat] ECC-384
10,130,864 UART: [kat] HMAC-384Kdf
10,144,016 UART: [kat] LMS
10,675,860 UART: [kat] --
10,680,627 UART: [cold-reset] ++
10,681,872 UART: [fht] FHT @ 0x50003400
10,693,294 UART: [idev] ++
10,693,974 UART: [idev] CDI.KEYID = 6
10,694,945 UART: [idev] SUBJECT.KEYID = 7
10,696,106 UART: [idev] UDS.KEYID = 0
10,698,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,847,473 UART: [idev] Erasing UDS.KEYID = 0
13,173,046 UART: [idev] Sha1 KeyId Algorithm
13,194,723 UART: [idev] --
13,198,123 UART: [ldev] ++
13,198,863 UART: [ldev] CDI.KEYID = 6
13,199,752 UART: [ldev] SUBJECT.KEYID = 5
13,200,920 UART: [ldev] AUTHORITY.KEYID = 7
13,202,158 UART: [ldev] FE.KEYID = 1
13,213,695 UART: [ldev] Erasing FE.KEYID = 1
15,691,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,409,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,424,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,439,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,455,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,475,165 UART: [ldev] --
17,480,975 UART: [fwproc] Wait for Commands...
17,483,351 UART: [fwproc] Recv command 0x46574c44
17,485,661 UART: [fwproc] Recv'd Img size: 118548 bytes
21,019,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,099,416 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,223,064 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,783,982 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,759,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,938,948 >>> mbox cmd response: failed
12,939,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,940,064 >>> mbox cmd response: failed
12,940,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,940,646 >>> mbox cmd response: failed
Initializing fuses
2,058,210 writing to cptra_bootfsm_go
10,681,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,011,175 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,934 UART: [state] LifecycleState = Manufacturing
86,589 UART: [state] DebugLocked = No
87,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,757 UART: [kat] SHA2-256
882,688 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,803 UART: [kat] ++
886,955 UART: [kat] sha1
891,025 UART: [kat] SHA2-256
892,963 UART: [kat] SHA2-384
895,476 UART: [kat] SHA2-512-ACC
897,377 UART: [kat] ECC-384
902,720 UART: [kat] HMAC-384Kdf
907,264 UART: [kat] LMS
1,475,460 UART: [kat] --
1,476,115 UART: [cold-reset] ++
1,476,497 UART: [fht] Storing FHT @ 0x50003400
1,479,324 UART: [idev] ++
1,479,492 UART: [idev] CDI.KEYID = 6
1,479,852 UART: [idev] SUBJECT.KEYID = 7
1,480,276 UART: [idev] UDS.KEYID = 0
1,480,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,368 UART: [idev] Erasing UDS.KEYID = 0
1,504,458 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,090 UART: [idev] --
1,514,041 UART: [ldev] ++
1,514,209 UART: [ldev] CDI.KEYID = 6
1,514,572 UART: [ldev] SUBJECT.KEYID = 5
1,514,998 UART: [ldev] AUTHORITY.KEYID = 7
1,515,461 UART: [ldev] FE.KEYID = 1
1,520,465 UART: [ldev] Erasing FE.KEYID = 1
1,546,378 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,178 UART: [ldev] --
1,585,483 UART: [fwproc] Waiting for Commands...
1,586,178 UART: [fwproc] Received command 0x46574c44
1,586,969 UART: [fwproc] Received Image of size 118548 bytes
1,891,081 UART: ROM Fatal Error: 0x000B0027
1,892,238 >>> mbox cmd response: failed
1,892,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,892,244 >>> mbox cmd response: failed
1,892,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,892,250 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,594 UART: [state] LifecycleState = Unprovisioned
86,249 UART: [state] DebugLocked = No
86,795 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,493 UART: [kat] SHA2-256
882,424 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,539 UART: [kat] ++
886,691 UART: [kat] sha1
890,741 UART: [kat] SHA2-256
892,679 UART: [kat] SHA2-384
895,308 UART: [kat] SHA2-512-ACC
897,209 UART: [kat] ECC-384
902,460 UART: [kat] HMAC-384Kdf
907,094 UART: [kat] LMS
1,475,290 UART: [kat] --
1,476,157 UART: [cold-reset] ++
1,476,625 UART: [fht] Storing FHT @ 0x50003400
1,479,542 UART: [idev] ++
1,479,710 UART: [idev] CDI.KEYID = 6
1,480,070 UART: [idev] SUBJECT.KEYID = 7
1,480,494 UART: [idev] UDS.KEYID = 0
1,480,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,784 UART: [idev] Erasing UDS.KEYID = 0
1,504,954 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,712 UART: [idev] --
1,514,691 UART: [ldev] ++
1,514,859 UART: [ldev] CDI.KEYID = 6
1,515,222 UART: [ldev] SUBJECT.KEYID = 5
1,515,648 UART: [ldev] AUTHORITY.KEYID = 7
1,516,111 UART: [ldev] FE.KEYID = 1
1,521,469 UART: [ldev] Erasing FE.KEYID = 1
1,546,910 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,952 UART: [ldev] --
1,586,253 UART: [fwproc] Waiting for Commands...
1,587,104 UART: [fwproc] Received command 0x46574c44
1,587,895 UART: [fwproc] Received Image of size 118548 bytes
2,932,416 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,298 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,516 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,761 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,746,169 >>> mbox cmd response: failed
1,746,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,746,175 >>> mbox cmd response: failed
1,746,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,746,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,455 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Manufacturing
86,314 UART: [state] DebugLocked = No
86,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,648 UART: [kat] SHA2-256
882,579 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,694 UART: [kat] ++
886,846 UART: [kat] sha1
891,144 UART: [kat] SHA2-256
893,082 UART: [kat] SHA2-384
895,855 UART: [kat] SHA2-512-ACC
897,756 UART: [kat] ECC-384
903,373 UART: [kat] HMAC-384Kdf
908,047 UART: [kat] LMS
1,476,243 UART: [kat] --
1,477,228 UART: [cold-reset] ++
1,477,658 UART: [fht] Storing FHT @ 0x50003400
1,480,643 UART: [idev] ++
1,480,811 UART: [idev] CDI.KEYID = 6
1,481,171 UART: [idev] SUBJECT.KEYID = 7
1,481,595 UART: [idev] UDS.KEYID = 0
1,481,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,393 UART: [idev] Erasing UDS.KEYID = 0
1,505,923 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,569 UART: [idev] --
1,515,642 UART: [ldev] ++
1,515,810 UART: [ldev] CDI.KEYID = 6
1,516,173 UART: [ldev] SUBJECT.KEYID = 5
1,516,599 UART: [ldev] AUTHORITY.KEYID = 7
1,517,062 UART: [ldev] FE.KEYID = 1
1,522,292 UART: [ldev] Erasing FE.KEYID = 1
1,547,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,485 UART: [ldev] --
1,586,996 UART: [fwproc] Waiting for Commands...
1,587,683 UART: [fwproc] Received command 0x46574c44
1,588,474 UART: [fwproc] Received Image of size 118548 bytes
1,893,100 UART: ROM Fatal Error: 0x000B0027
1,894,257 >>> mbox cmd response: failed
1,894,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,894,263 >>> mbox cmd response: failed
1,894,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,894,269 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,646 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,230 UART: [kat] SHA2-256
882,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,276 UART: [kat] ++
886,428 UART: [kat] sha1
890,838 UART: [kat] SHA2-256
892,776 UART: [kat] SHA2-384
895,461 UART: [kat] SHA2-512-ACC
897,362 UART: [kat] ECC-384
903,085 UART: [kat] HMAC-384Kdf
907,611 UART: [kat] LMS
1,475,807 UART: [kat] --
1,476,658 UART: [cold-reset] ++
1,477,074 UART: [fht] Storing FHT @ 0x50003400
1,479,903 UART: [idev] ++
1,480,071 UART: [idev] CDI.KEYID = 6
1,480,431 UART: [idev] SUBJECT.KEYID = 7
1,480,855 UART: [idev] UDS.KEYID = 0
1,481,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,527 UART: [idev] Erasing UDS.KEYID = 0
1,504,799 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,387 UART: [idev] --
1,514,544 UART: [ldev] ++
1,514,712 UART: [ldev] CDI.KEYID = 6
1,515,075 UART: [ldev] SUBJECT.KEYID = 5
1,515,501 UART: [ldev] AUTHORITY.KEYID = 7
1,515,964 UART: [ldev] FE.KEYID = 1
1,521,046 UART: [ldev] Erasing FE.KEYID = 1
1,546,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,469 UART: [ldev] --
1,585,796 UART: [fwproc] Waiting for Commands...
1,586,553 UART: [fwproc] Received command 0x46574c44
1,587,344 UART: [fwproc] Received Image of size 118548 bytes
2,932,249 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,205 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,423 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,826 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,746,816 >>> mbox cmd response: failed
1,746,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,746,822 >>> mbox cmd response: failed
1,746,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,746,828 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,966 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Manufacturing
86,049 UART: [state] DebugLocked = No
86,773 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
899,894 UART: [kat] SHA2-256
901,834 UART: [kat] SHA2-384
904,751 UART: [kat] SHA2-512-ACC
906,652 UART: [kat] ECC-384
915,935 UART: [kat] HMAC-384Kdf
920,601 UART: [kat] LMS
1,168,913 UART: [kat] --
1,169,582 UART: [cold-reset] ++
1,169,942 UART: [fht] FHT @ 0x50003400
1,172,592 UART: [idev] ++
1,172,760 UART: [idev] CDI.KEYID = 6
1,173,121 UART: [idev] SUBJECT.KEYID = 7
1,173,546 UART: [idev] UDS.KEYID = 0
1,173,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,403 UART: [idev] Sha1 KeyId Algorithm
1,207,383 UART: [idev] --
1,208,592 UART: [ldev] ++
1,208,760 UART: [ldev] CDI.KEYID = 6
1,209,124 UART: [ldev] SUBJECT.KEYID = 5
1,209,551 UART: [ldev] AUTHORITY.KEYID = 7
1,210,014 UART: [ldev] FE.KEYID = 1
1,215,020 UART: [ldev] Erasing FE.KEYID = 1
1,241,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,552 UART: [ldev] --
1,280,759 UART: [fwproc] Wait for Commands...
1,281,558 UART: [fwproc] Recv command 0x46574c44
1,282,291 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,650 UART: ROM Fatal Error: 0x000B0027
1,587,807 >>> mbox cmd response: failed
1,587,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,813 >>> mbox cmd response: failed
1,587,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,129 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,884 UART: [kat] SHA2-256
901,824 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
916,285 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,306 UART: [cold-reset] ++
1,170,836 UART: [fht] FHT @ 0x50003400
1,173,478 UART: [idev] ++
1,173,646 UART: [idev] CDI.KEYID = 6
1,174,007 UART: [idev] SUBJECT.KEYID = 7
1,174,432 UART: [idev] UDS.KEYID = 0
1,174,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,497 UART: [idev] Erasing UDS.KEYID = 0
1,199,155 UART: [idev] Sha1 KeyId Algorithm
1,208,129 UART: [idev] --
1,209,234 UART: [ldev] ++
1,209,402 UART: [ldev] CDI.KEYID = 6
1,209,766 UART: [ldev] SUBJECT.KEYID = 5
1,210,193 UART: [ldev] AUTHORITY.KEYID = 7
1,210,656 UART: [ldev] FE.KEYID = 1
1,215,674 UART: [ldev] Erasing FE.KEYID = 1
1,242,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,704 UART: [ldev] --
1,281,037 UART: [fwproc] Wait for Commands...
1,281,660 UART: [fwproc] Recv command 0x46574c44
1,282,393 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,826 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,001 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,286 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,352 >>> mbox cmd response: failed
1,444,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,358 >>> mbox cmd response: failed
1,444,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,227 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Manufacturing
86,268 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,729 UART: [kat] ++
895,881 UART: [kat] sha1
900,237 UART: [kat] SHA2-256
902,177 UART: [kat] SHA2-384
904,928 UART: [kat] SHA2-512-ACC
906,829 UART: [kat] ECC-384
916,388 UART: [kat] HMAC-384Kdf
920,840 UART: [kat] LMS
1,169,152 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,669 UART: [fht] FHT @ 0x50003400
1,173,317 UART: [idev] ++
1,173,485 UART: [idev] CDI.KEYID = 6
1,173,846 UART: [idev] SUBJECT.KEYID = 7
1,174,271 UART: [idev] UDS.KEYID = 0
1,174,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,456 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha1 KeyId Algorithm
1,208,038 UART: [idev] --
1,209,209 UART: [ldev] ++
1,209,377 UART: [ldev] CDI.KEYID = 6
1,209,741 UART: [ldev] SUBJECT.KEYID = 5
1,210,168 UART: [ldev] AUTHORITY.KEYID = 7
1,210,631 UART: [ldev] FE.KEYID = 1
1,216,145 UART: [ldev] Erasing FE.KEYID = 1
1,242,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,865 UART: [ldev] --
1,282,250 UART: [fwproc] Wait for Commands...
1,282,883 UART: [fwproc] Recv command 0x46574c44
1,283,616 UART: [fwproc] Recv'd Img size: 118548 bytes
1,588,583 UART: ROM Fatal Error: 0x000B0027
1,589,740 >>> mbox cmd response: failed
1,589,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,746 >>> mbox cmd response: failed
1,589,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,752 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,983 UART: [state] LifecycleState = Unprovisioned
86,638 UART: [state] DebugLocked = No
87,338 UART: [state] WD Timer not started. Device not locked for debugging
88,671 UART: [kat] SHA2-256
892,221 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,325 UART: [kat] ++
896,477 UART: [kat] sha1
900,761 UART: [kat] SHA2-256
902,701 UART: [kat] SHA2-384
905,336 UART: [kat] SHA2-512-ACC
907,237 UART: [kat] ECC-384
917,010 UART: [kat] HMAC-384Kdf
921,600 UART: [kat] LMS
1,169,912 UART: [kat] --
1,170,585 UART: [cold-reset] ++
1,170,929 UART: [fht] FHT @ 0x50003400
1,173,699 UART: [idev] ++
1,173,867 UART: [idev] CDI.KEYID = 6
1,174,228 UART: [idev] SUBJECT.KEYID = 7
1,174,653 UART: [idev] UDS.KEYID = 0
1,174,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,010 UART: [idev] Erasing UDS.KEYID = 0
1,200,076 UART: [idev] Sha1 KeyId Algorithm
1,209,014 UART: [idev] --
1,210,011 UART: [ldev] ++
1,210,179 UART: [ldev] CDI.KEYID = 6
1,210,543 UART: [ldev] SUBJECT.KEYID = 5
1,210,970 UART: [ldev] AUTHORITY.KEYID = 7
1,211,433 UART: [ldev] FE.KEYID = 1
1,216,813 UART: [ldev] Erasing FE.KEYID = 1
1,243,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,059 UART: [ldev] --
1,283,490 UART: [fwproc] Wait for Commands...
1,284,111 UART: [fwproc] Recv command 0x46574c44
1,284,844 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,869 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,044 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,299 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,621 >>> mbox cmd response: failed
1,443,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,627 >>> mbox cmd response: failed
1,443,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,633 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,444 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Manufacturing
85,593 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
893,248 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,373 UART: [kat] ++
897,525 UART: [kat] sha1
901,885 UART: [kat] SHA2-256
903,825 UART: [kat] SHA2-384
906,730 UART: [kat] SHA2-512-ACC
908,631 UART: [kat] ECC-384
918,370 UART: [kat] HMAC-384Kdf
922,914 UART: [kat] LMS
1,171,242 UART: [kat] --
1,171,997 UART: [cold-reset] ++
1,172,365 UART: [fht] FHT @ 0x50003400
1,175,118 UART: [idev] ++
1,175,286 UART: [idev] CDI.KEYID = 6
1,175,646 UART: [idev] SUBJECT.KEYID = 7
1,176,070 UART: [idev] UDS.KEYID = 0
1,176,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,050 UART: [idev] Erasing UDS.KEYID = 0
1,201,097 UART: [idev] Sha1 KeyId Algorithm
1,209,701 UART: [idev] --
1,210,667 UART: [ldev] ++
1,210,835 UART: [ldev] CDI.KEYID = 6
1,211,198 UART: [ldev] SUBJECT.KEYID = 5
1,211,624 UART: [ldev] AUTHORITY.KEYID = 7
1,212,087 UART: [ldev] FE.KEYID = 1
1,217,027 UART: [ldev] Erasing FE.KEYID = 1
1,242,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,453 UART: [ldev] --
1,281,928 UART: [fwproc] Wait for Commands...
1,282,546 UART: [fwproc] Recv command 0x46574c44
1,283,274 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,846 UART: ROM Fatal Error: 0x000B0027
1,589,003 >>> mbox cmd response: failed
1,589,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,009 >>> mbox cmd response: failed
1,589,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,015 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
893,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,427 UART: [kat] ++
897,579 UART: [kat] sha1
901,813 UART: [kat] SHA2-256
903,753 UART: [kat] SHA2-384
906,556 UART: [kat] SHA2-512-ACC
908,457 UART: [kat] ECC-384
918,534 UART: [kat] HMAC-384Kdf
923,152 UART: [kat] LMS
1,171,480 UART: [kat] --
1,172,381 UART: [cold-reset] ++
1,172,921 UART: [fht] FHT @ 0x50003400
1,175,656 UART: [idev] ++
1,175,824 UART: [idev] CDI.KEYID = 6
1,176,184 UART: [idev] SUBJECT.KEYID = 7
1,176,608 UART: [idev] UDS.KEYID = 0
1,176,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,712 UART: [idev] Erasing UDS.KEYID = 0
1,201,797 UART: [idev] Sha1 KeyId Algorithm
1,210,253 UART: [idev] --
1,211,157 UART: [ldev] ++
1,211,325 UART: [ldev] CDI.KEYID = 6
1,211,688 UART: [ldev] SUBJECT.KEYID = 5
1,212,114 UART: [ldev] AUTHORITY.KEYID = 7
1,212,577 UART: [ldev] FE.KEYID = 1
1,217,597 UART: [ldev] Erasing FE.KEYID = 1
1,244,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,151 UART: [ldev] --
1,283,582 UART: [fwproc] Wait for Commands...
1,284,208 UART: [fwproc] Recv command 0x46574c44
1,284,936 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,565 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,735 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,112 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,094 >>> mbox cmd response: failed
1,442,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,100 >>> mbox cmd response: failed
1,442,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,106 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,295 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Manufacturing
86,018 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
893,449 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,574 UART: [kat] ++
897,726 UART: [kat] sha1
901,904 UART: [kat] SHA2-256
903,844 UART: [kat] SHA2-384
906,439 UART: [kat] SHA2-512-ACC
908,340 UART: [kat] ECC-384
917,975 UART: [kat] HMAC-384Kdf
922,551 UART: [kat] LMS
1,170,879 UART: [kat] --
1,171,726 UART: [cold-reset] ++
1,172,116 UART: [fht] FHT @ 0x50003400
1,174,693 UART: [idev] ++
1,174,861 UART: [idev] CDI.KEYID = 6
1,175,221 UART: [idev] SUBJECT.KEYID = 7
1,175,645 UART: [idev] UDS.KEYID = 0
1,175,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,493 UART: [idev] Erasing UDS.KEYID = 0
1,200,432 UART: [idev] Sha1 KeyId Algorithm
1,208,854 UART: [idev] --
1,209,762 UART: [ldev] ++
1,209,930 UART: [ldev] CDI.KEYID = 6
1,210,293 UART: [ldev] SUBJECT.KEYID = 5
1,210,719 UART: [ldev] AUTHORITY.KEYID = 7
1,211,182 UART: [ldev] FE.KEYID = 1
1,216,644 UART: [ldev] Erasing FE.KEYID = 1
1,242,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,806 UART: [ldev] --
1,282,283 UART: [fwproc] Wait for Commands...
1,282,931 UART: [fwproc] Recv command 0x46574c44
1,283,659 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,375 UART: ROM Fatal Error: 0x000B0027
1,588,532 >>> mbox cmd response: failed
1,588,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,588,538 >>> mbox cmd response: failed
1,588,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,588,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
893,441 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,566 UART: [kat] ++
897,718 UART: [kat] sha1
901,820 UART: [kat] SHA2-256
903,760 UART: [kat] SHA2-384
906,477 UART: [kat] SHA2-512-ACC
908,378 UART: [kat] ECC-384
917,907 UART: [kat] HMAC-384Kdf
922,575 UART: [kat] LMS
1,170,903 UART: [kat] --
1,171,920 UART: [cold-reset] ++
1,172,394 UART: [fht] FHT @ 0x50003400
1,175,153 UART: [idev] ++
1,175,321 UART: [idev] CDI.KEYID = 6
1,175,681 UART: [idev] SUBJECT.KEYID = 7
1,176,105 UART: [idev] UDS.KEYID = 0
1,176,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,329 UART: [idev] Erasing UDS.KEYID = 0
1,201,362 UART: [idev] Sha1 KeyId Algorithm
1,209,712 UART: [idev] --
1,210,764 UART: [ldev] ++
1,210,932 UART: [ldev] CDI.KEYID = 6
1,211,295 UART: [ldev] SUBJECT.KEYID = 5
1,211,721 UART: [ldev] AUTHORITY.KEYID = 7
1,212,184 UART: [ldev] FE.KEYID = 1
1,217,292 UART: [ldev] Erasing FE.KEYID = 1
1,243,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,666 UART: [ldev] --
1,283,091 UART: [fwproc] Wait for Commands...
1,283,839 UART: [fwproc] Recv command 0x46574c44
1,284,567 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,714 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,943 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,513 >>> mbox cmd response: failed
1,444,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,519 >>> mbox cmd response: failed
1,444,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,532 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
192,261 UART:
192,621 UART: Running Caliptra ROM ...
193,813 UART:
193,970 UART: [state] CFI Enabled
265,004 UART: [state] LifecycleState = Unprovisioned
266,942 UART: [state] DebugLocked = No
268,168 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,805 UART: [kat] SHA2-256
443,536 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,047 UART: [kat] ++
454,581 UART: [kat] sha1
465,050 UART: [kat] SHA2-256
467,733 UART: [kat] SHA2-384
474,170 UART: [kat] SHA2-512-ACC
476,581 UART: [kat] ECC-384
2,765,252 UART: [kat] HMAC-384Kdf
2,777,201 UART: [kat] LMS
3,967,500 UART: [kat] --
3,973,137 UART: [cold-reset] ++
3,975,461 UART: [fht] Storing FHT @ 0x50003400
3,985,977 UART: [idev] ++
3,986,586 UART: [idev] CDI.KEYID = 6
3,987,512 UART: [idev] SUBJECT.KEYID = 7
3,988,736 UART: [idev] UDS.KEYID = 0
3,991,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,096 UART: [idev] Erasing UDS.KEYID = 0
7,325,237 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,057 UART: [idev] --
7,350,761 UART: [ldev] ++
7,351,366 UART: [ldev] CDI.KEYID = 6
7,352,286 UART: [ldev] SUBJECT.KEYID = 5
7,353,510 UART: [ldev] AUTHORITY.KEYID = 7
7,354,746 UART: [ldev] FE.KEYID = 1
7,400,180 UART: [ldev] Erasing FE.KEYID = 1
10,729,753 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,827 UART: [ldev] --
13,092,822 UART: [fwproc] Waiting for Commands...
13,094,926 UART: [fwproc] Received command 0x46574c44
13,097,119 UART: [fwproc] Received Image of size 118548 bytes
15,805,794 UART: ROM Fatal Error: 0x000B002F
15,809,269 >>> mbox cmd response: failed
15,809,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,810,126 >>> mbox cmd response: failed
15,810,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,810,692 >>> mbox cmd response: failed
Initializing fuses
2,060,239 writing to cptra_bootfsm_go
2,249,533 UART:
2,249,865 UART: Running Caliptra ROM ...
2,251,088 UART:
2,251,259 UART: [state] CFI Enabled
2,307,728 UART: [state] LifecycleState = Unprovisioned
2,309,631 UART: [state] DebugLocked = No
2,312,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,107 UART: [kat] SHA2-256
2,486,797 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,497,330 UART: [kat] ++
2,497,880 UART: [kat] sha1
2,509,153 UART: [kat] SHA2-256
2,511,853 UART: [kat] SHA2-384
2,516,765 UART: [kat] SHA2-512-ACC
2,519,172 UART: [kat] ECC-384
4,813,580 UART: [kat] HMAC-384Kdf
4,846,303 UART: [kat] LMS
6,036,581 UART: [kat] --
6,041,740 UART: [cold-reset] ++
6,044,331 UART: [fht] Storing FHT @ 0x50003400
6,055,551 UART: [idev] ++
6,056,124 UART: [idev] CDI.KEYID = 6
6,057,039 UART: [idev] SUBJECT.KEYID = 7
6,058,317 UART: [idev] UDS.KEYID = 0
6,060,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,209,978 UART: [idev] Erasing UDS.KEYID = 0
9,391,332 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,644 UART: [idev] --
9,417,913 UART: [ldev] ++
9,418,480 UART: [ldev] CDI.KEYID = 6
9,419,443 UART: [ldev] SUBJECT.KEYID = 5
9,420,706 UART: [ldev] AUTHORITY.KEYID = 7
9,421,944 UART: [ldev] FE.KEYID = 1
9,469,057 UART: [ldev] Erasing FE.KEYID = 1
12,802,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,094,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,108,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,123,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,138,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,121 UART: [ldev] --
15,163,735 UART: [fwproc] Waiting for Commands...
15,166,597 UART: [fwproc] Received command 0x46574c44
15,168,787 UART: [fwproc] Received Image of size 118548 bytes
19,270,822 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,344,155 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,417,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,744,958 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,807,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,589,207 >>> mbox cmd response: failed
15,589,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,590,292 >>> mbox cmd response: failed
15,590,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,590,884 >>> mbox cmd response: failed
Initializing fuses
2,058,648 writing to cptra_bootfsm_go
5,855,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,985,875 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,561 UART:
192,954 UART: Running Caliptra ROM ...
194,060 UART:
603,766 UART: [state] CFI Enabled
618,129 UART: [state] LifecycleState = Unprovisioned
620,028 UART: [state] DebugLocked = No
621,873 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,197 UART: [kat] SHA2-256
795,949 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,472 UART: [kat] ++
807,005 UART: [kat] sha1
818,669 UART: [kat] SHA2-256
821,350 UART: [kat] SHA2-384
827,288 UART: [kat] SHA2-512-ACC
829,645 UART: [kat] ECC-384
3,112,774 UART: [kat] HMAC-384Kdf
3,124,916 UART: [kat] LMS
4,315,015 UART: [kat] --
4,318,561 UART: [cold-reset] ++
4,319,596 UART: [fht] Storing FHT @ 0x50003400
4,331,520 UART: [idev] ++
4,332,098 UART: [idev] CDI.KEYID = 6
4,333,027 UART: [idev] SUBJECT.KEYID = 7
4,334,250 UART: [idev] UDS.KEYID = 0
4,337,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,359 UART: [idev] Erasing UDS.KEYID = 0
7,619,381 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,833 UART: [idev] --
7,646,625 UART: [ldev] ++
7,647,259 UART: [ldev] CDI.KEYID = 6
7,648,176 UART: [ldev] SUBJECT.KEYID = 5
7,649,402 UART: [ldev] AUTHORITY.KEYID = 7
7,650,643 UART: [ldev] FE.KEYID = 1
7,661,300 UART: [ldev] Erasing FE.KEYID = 1
10,950,581 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,480 UART: [ldev] --
13,312,881 UART: [fwproc] Waiting for Commands...
13,314,723 UART: [fwproc] Received command 0x46574c44
13,316,940 UART: [fwproc] Received Image of size 118548 bytes
16,021,293 UART: ROM Fatal Error: 0x000B002F
16,024,747 >>> mbox cmd response: failed
16,025,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,025,508 >>> mbox cmd response: failed
16,025,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,088 >>> mbox cmd response: failed
Initializing fuses
2,057,771 writing to cptra_bootfsm_go
2,247,089 UART:
2,247,444 UART: Running Caliptra ROM ...
2,248,500 UART:
4,428,124 UART: [state] CFI Enabled
4,441,055 UART: [state] LifecycleState = Unprovisioned
4,442,991 UART: [state] DebugLocked = No
4,444,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,450,496 UART: [kat] SHA2-256
4,620,219 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,630,767 UART: [kat] ++
4,631,240 UART: [kat] sha1
4,642,882 UART: [kat] SHA2-256
4,645,589 UART: [kat] SHA2-384
4,652,826 UART: [kat] SHA2-512-ACC
4,655,184 UART: [kat] ECC-384
6,938,327 UART: [kat] HMAC-384Kdf
6,949,860 UART: [kat] LMS
8,139,981 UART: [kat] --
8,145,184 UART: [cold-reset] ++
8,147,563 UART: [fht] Storing FHT @ 0x50003400
8,158,029 UART: [idev] ++
8,158,662 UART: [idev] CDI.KEYID = 6
8,159,558 UART: [idev] SUBJECT.KEYID = 7
8,160,841 UART: [idev] UDS.KEYID = 0
8,163,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,312,051 UART: [idev] Erasing UDS.KEYID = 0
11,448,208 UART: [idev] Using Sha1 for KeyId Algorithm
11,469,930 UART: [idev] --
11,474,519 UART: [ldev] ++
11,475,093 UART: [ldev] CDI.KEYID = 6
11,476,075 UART: [ldev] SUBJECT.KEYID = 5
11,477,288 UART: [ldev] AUTHORITY.KEYID = 7
11,478,536 UART: [ldev] FE.KEYID = 1
11,489,402 UART: [ldev] Erasing FE.KEYID = 1
14,775,562 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,069,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,083,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,098,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,113,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,130,485 UART: [ldev] --
17,135,593 UART: [fwproc] Waiting for Commands...
17,138,030 UART: [fwproc] Received command 0x46574c44
17,140,233 UART: [fwproc] Received Image of size 118548 bytes
21,243,828 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,321,909 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,395,095 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,722,875 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
4,128,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,760,765 >>> mbox cmd response: failed
15,761,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,761,728 >>> mbox cmd response: failed
15,761,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,762,302 >>> mbox cmd response: failed
Initializing fuses
2,057,693 writing to cptra_bootfsm_go
8,223,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,252,745 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,296 UART:
192,637 UART: Running Caliptra ROM ...
193,763 UART:
193,910 UART: [state] CFI Enabled
264,073 UART: [state] LifecycleState = Unprovisioned
266,065 UART: [state] DebugLocked = No
267,321 UART: [state] WD Timer not started. Device not locked for debugging
271,671 UART: [kat] SHA2-256
451,349 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,122 UART: [kat] ++
462,620 UART: [kat] sha1
474,259 UART: [kat] SHA2-256
476,943 UART: [kat] SHA2-384
482,651 UART: [kat] SHA2-512-ACC
484,998 UART: [kat] ECC-384
2,949,404 UART: [kat] HMAC-384Kdf
2,974,025 UART: [kat] LMS
3,450,530 UART: [kat] --
3,454,981 UART: [cold-reset] ++
3,457,244 UART: [fht] FHT @ 0x50003400
3,469,904 UART: [idev] ++
3,470,477 UART: [idev] CDI.KEYID = 6
3,471,421 UART: [idev] SUBJECT.KEYID = 7
3,472,636 UART: [idev] UDS.KEYID = 0
3,475,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,624,527 UART: [idev] Erasing UDS.KEYID = 0
5,984,988 UART: [idev] Sha1 KeyId Algorithm
6,009,293 UART: [idev] --
6,013,383 UART: [ldev] ++
6,013,972 UART: [ldev] CDI.KEYID = 6
6,014,862 UART: [ldev] SUBJECT.KEYID = 5
6,016,088 UART: [ldev] AUTHORITY.KEYID = 7
6,017,336 UART: [ldev] FE.KEYID = 1
6,061,613 UART: [ldev] Erasing FE.KEYID = 1
8,569,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,305,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,321,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,337,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,352,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,374,404 UART: [ldev] --
10,379,781 UART: [fwproc] Wait for Commands...
10,382,121 UART: [fwproc] Recv command 0x46574c44
10,384,117 UART: [fwproc] Recv'd Img size: 118548 bytes
12,458,056 UART: ROM Fatal Error: 0x000B002F
12,461,287 >>> mbox cmd response: failed
12,461,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,462,041 >>> mbox cmd response: failed
12,462,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,462,732 >>> mbox cmd response: failed
Initializing fuses
2,060,842 writing to cptra_bootfsm_go
2,250,102 UART:
2,250,450 UART: Running Caliptra ROM ...
2,251,495 UART:
2,251,653 UART: [state] CFI Enabled
2,312,458 UART: [state] LifecycleState = Unprovisioned
2,314,397 UART: [state] DebugLocked = No
2,315,984 UART: [state] WD Timer not started. Device not locked for debugging
2,320,428 UART: [kat] SHA2-256
2,500,056 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,510,860 UART: [kat] ++
2,511,412 UART: [kat] sha1
2,522,797 UART: [kat] SHA2-256
2,525,490 UART: [kat] SHA2-384
2,530,998 UART: [kat] SHA2-512-ACC
2,533,363 UART: [kat] ECC-384
4,992,182 UART: [kat] HMAC-384Kdf
5,016,636 UART: [kat] LMS
5,493,109 UART: [kat] --
5,496,530 UART: [cold-reset] ++
5,498,045 UART: [fht] FHT @ 0x50003400
5,508,459 UART: [idev] ++
5,509,040 UART: [idev] CDI.KEYID = 6
5,509,986 UART: [idev] SUBJECT.KEYID = 7
5,511,205 UART: [idev] UDS.KEYID = 0
5,513,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,662,678 UART: [idev] Erasing UDS.KEYID = 0
8,034,010 UART: [idev] Sha1 KeyId Algorithm
8,057,466 UART: [idev] --
8,062,170 UART: [ldev] ++
8,062,799 UART: [ldev] CDI.KEYID = 6
8,063,687 UART: [ldev] SUBJECT.KEYID = 5
8,064,910 UART: [ldev] AUTHORITY.KEYID = 7
8,066,148 UART: [ldev] FE.KEYID = 1
8,103,997 UART: [ldev] Erasing FE.KEYID = 1
10,605,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,346,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,362,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,378,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,393,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,415,205 UART: [ldev] --
12,420,801 UART: [fwproc] Wait for Commands...
12,422,688 UART: [fwproc] Recv command 0x46574c44
12,424,734 UART: [fwproc] Recv'd Img size: 118548 bytes
15,913,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,989,437 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,062,456 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,390,137 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
3,461,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,312,201 >>> mbox cmd response: failed
12,312,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,313,250 >>> mbox cmd response: failed
12,313,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,313,826 >>> mbox cmd response: failed
Initializing fuses
2,068,502 writing to cptra_bootfsm_go
5,521,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,293,534 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
192,741 UART:
193,095 UART: Running Caliptra ROM ...
194,217 UART:
603,900 UART: [state] CFI Enabled
619,671 UART: [state] LifecycleState = Unprovisioned
621,651 UART: [state] DebugLocked = No
624,412 UART: [state] WD Timer not started. Device not locked for debugging
628,708 UART: [kat] SHA2-256
808,383 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,143 UART: [kat] ++
819,630 UART: [kat] sha1
830,292 UART: [kat] SHA2-256
832,985 UART: [kat] SHA2-384
839,995 UART: [kat] SHA2-512-ACC
842,396 UART: [kat] ECC-384
3,286,659 UART: [kat] HMAC-384Kdf
3,299,453 UART: [kat] LMS
3,775,966 UART: [kat] --
3,782,244 UART: [cold-reset] ++
3,783,800 UART: [fht] FHT @ 0x50003400
3,794,949 UART: [idev] ++
3,795,513 UART: [idev] CDI.KEYID = 6
3,796,456 UART: [idev] SUBJECT.KEYID = 7
3,797,732 UART: [idev] UDS.KEYID = 0
3,800,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,949,198 UART: [idev] Erasing UDS.KEYID = 0
6,278,390 UART: [idev] Sha1 KeyId Algorithm
6,300,605 UART: [idev] --
6,305,876 UART: [ldev] ++
6,306,464 UART: [ldev] CDI.KEYID = 6
6,307,352 UART: [ldev] SUBJECT.KEYID = 5
6,308,576 UART: [ldev] AUTHORITY.KEYID = 7
6,309,832 UART: [ldev] FE.KEYID = 1
6,322,752 UART: [ldev] Erasing FE.KEYID = 1
8,804,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,523,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,539,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,555,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,570,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,592,385 UART: [ldev] --
10,597,654 UART: [fwproc] Wait for Commands...
10,600,350 UART: [fwproc] Recv command 0x46574c44
10,602,346 UART: [fwproc] Recv'd Img size: 118548 bytes
12,668,838 UART: ROM Fatal Error: 0x000B002F
12,672,082 >>> mbox cmd response: failed
12,672,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,672,749 >>> mbox cmd response: failed
12,673,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,673,388 >>> mbox cmd response: failed
Initializing fuses
2,059,684 writing to cptra_bootfsm_go
2,248,943 UART:
2,249,302 UART: Running Caliptra ROM ...
2,250,390 UART:
7,797,775 UART: [state] CFI Enabled
7,811,267 UART: [state] LifecycleState = Unprovisioned
7,813,187 UART: [state] DebugLocked = No
7,815,690 UART: [state] WD Timer not started. Device not locked for debugging
7,820,087 UART: [kat] SHA2-256
7,999,742 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,010,568 UART: [kat] ++
8,011,041 UART: [kat] sha1
8,022,285 UART: [kat] SHA2-256
8,024,990 UART: [kat] SHA2-384
8,032,130 UART: [kat] SHA2-512-ACC
8,034,494 UART: [kat] ECC-384
10,477,378 UART: [kat] HMAC-384Kdf
10,489,494 UART: [kat] LMS
10,965,998 UART: [kat] --
10,972,803 UART: [cold-reset] ++
10,975,113 UART: [fht] FHT @ 0x50003400
10,985,813 UART: [idev] ++
10,986,414 UART: [idev] CDI.KEYID = 6
10,987,311 UART: [idev] SUBJECT.KEYID = 7
10,988,584 UART: [idev] UDS.KEYID = 0
10,991,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,139,836 UART: [idev] Erasing UDS.KEYID = 0
13,459,546 UART: [idev] Sha1 KeyId Algorithm
13,483,718 UART: [idev] --
13,487,478 UART: [ldev] ++
13,488,061 UART: [ldev] CDI.KEYID = 6
13,488,976 UART: [ldev] SUBJECT.KEYID = 5
13,490,194 UART: [ldev] AUTHORITY.KEYID = 7
13,491,428 UART: [ldev] FE.KEYID = 1
13,502,135 UART: [ldev] Erasing FE.KEYID = 1
15,979,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,698,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,714,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,729,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,745,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,766,162 UART: [ldev] --
17,771,916 UART: [fwproc] Wait for Commands...
17,773,542 UART: [fwproc] Recv command 0x46574c44
17,775,537 UART: [fwproc] Recv'd Img size: 118548 bytes
21,258,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,331,475 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,404,546 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,732,369 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,781,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,546,032 >>> mbox cmd response: failed
12,546,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,547,172 >>> mbox cmd response: failed
12,547,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,547,741 >>> mbox cmd response: failed
Initializing fuses
2,067,636 writing to cptra_bootfsm_go
11,087,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,755,037 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
192,201 UART:
192,579 UART: Running Caliptra ROM ...
193,697 UART:
193,842 UART: [state] CFI Enabled
263,157 UART: [state] LifecycleState = Unprovisioned
265,600 UART: [state] DebugLocked = No
268,361 UART: [state] WD Timer not started. Device not locked for debugging
272,259 UART: [kat] SHA2-256
462,141 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,893 UART: [kat] ++
473,352 UART: [kat] sha1
486,016 UART: [kat] SHA2-256
489,038 UART: [kat] SHA2-384
495,302 UART: [kat] SHA2-512-ACC
497,873 UART: [kat] ECC-384
2,948,819 UART: [kat] HMAC-384Kdf
2,971,495 UART: [kat] LMS
3,503,282 UART: [kat] --
3,506,851 UART: [cold-reset] ++
3,508,629 UART: [fht] FHT @ 0x50003400
3,520,587 UART: [idev] ++
3,521,279 UART: [idev] CDI.KEYID = 6
3,522,300 UART: [idev] SUBJECT.KEYID = 7
3,523,409 UART: [idev] UDS.KEYID = 0
3,526,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,379 UART: [idev] Erasing UDS.KEYID = 0
6,030,330 UART: [idev] Sha1 KeyId Algorithm
6,053,524 UART: [idev] --
6,057,723 UART: [ldev] ++
6,058,423 UART: [ldev] CDI.KEYID = 6
6,059,343 UART: [ldev] SUBJECT.KEYID = 5
6,060,510 UART: [ldev] AUTHORITY.KEYID = 7
6,061,695 UART: [ldev] FE.KEYID = 1
6,100,627 UART: [ldev] Erasing FE.KEYID = 1
8,606,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,980 UART: [ldev] --
10,415,381 UART: [fwproc] Wait for Commands...
10,417,116 UART: [fwproc] Recv command 0x46574c44
10,419,439 UART: [fwproc] Recv'd Img size: 118548 bytes
12,504,591 UART: ROM Fatal Error: 0x000B002F
12,508,254 >>> mbox cmd response: failed
12,508,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,999 >>> mbox cmd response: failed
12,509,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,509,570 >>> mbox cmd response: failed
Initializing fuses
2,061,101 writing to cptra_bootfsm_go
2,250,426 UART:
2,250,768 UART: Running Caliptra ROM ...
2,251,905 UART:
2,252,102 UART: [state] CFI Enabled
2,325,576 UART: [state] LifecycleState = Unprovisioned
2,327,922 UART: [state] DebugLocked = No
2,329,568 UART: [state] WD Timer not started. Device not locked for debugging
2,333,627 UART: [kat] SHA2-256
2,523,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,534,287 UART: [kat] ++
2,534,789 UART: [kat] sha1
2,546,012 UART: [kat] SHA2-256
2,549,047 UART: [kat] SHA2-384
2,554,670 UART: [kat] SHA2-512-ACC
2,557,299 UART: [kat] ECC-384
5,007,682 UART: [kat] HMAC-384Kdf
5,031,966 UART: [kat] LMS
5,563,769 UART: [kat] --
5,569,060 UART: [cold-reset] ++
5,571,448 UART: [fht] FHT @ 0x50003400
5,582,597 UART: [idev] ++
5,583,339 UART: [idev] CDI.KEYID = 6
5,584,251 UART: [idev] SUBJECT.KEYID = 7
5,585,472 UART: [idev] UDS.KEYID = 0
5,587,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,736,973 UART: [idev] Erasing UDS.KEYID = 0
8,090,255 UART: [idev] Sha1 KeyId Algorithm
8,113,450 UART: [idev] --
8,117,122 UART: [ldev] ++
8,117,809 UART: [ldev] CDI.KEYID = 6
8,118,720 UART: [ldev] SUBJECT.KEYID = 5
8,119,886 UART: [ldev] AUTHORITY.KEYID = 7
8,121,123 UART: [ldev] FE.KEYID = 1
8,163,271 UART: [ldev] Erasing FE.KEYID = 1
10,667,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,405,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,420,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,435,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,450,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,471,693 UART: [ldev] --
12,476,851 UART: [fwproc] Wait for Commands...
12,479,652 UART: [fwproc] Recv command 0x46574c44
12,481,927 UART: [fwproc] Recv'd Img size: 118548 bytes
15,981,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,066,662 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,190,299 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,750,130 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,439,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,328,178 >>> mbox cmd response: failed
12,328,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,329,121 >>> mbox cmd response: failed
12,329,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,329,690 >>> mbox cmd response: failed
Initializing fuses
2,075,857 writing to cptra_bootfsm_go
5,506,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,883,864 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,573 UART:
192,918 UART: Running Caliptra ROM ...
194,109 UART:
603,765 UART: [state] CFI Enabled
620,986 UART: [state] LifecycleState = Unprovisioned
623,373 UART: [state] DebugLocked = No
625,983 UART: [state] WD Timer not started. Device not locked for debugging
629,852 UART: [kat] SHA2-256
819,730 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,522 UART: [kat] ++
831,032 UART: [kat] sha1
842,353 UART: [kat] SHA2-256
845,372 UART: [kat] SHA2-384
851,651 UART: [kat] SHA2-512-ACC
854,222 UART: [kat] ECC-384
3,296,288 UART: [kat] HMAC-384Kdf
3,308,977 UART: [kat] LMS
3,840,775 UART: [kat] --
3,844,996 UART: [cold-reset] ++
3,846,390 UART: [fht] FHT @ 0x50003400
3,856,846 UART: [idev] ++
3,857,532 UART: [idev] CDI.KEYID = 6
3,858,472 UART: [idev] SUBJECT.KEYID = 7
3,859,690 UART: [idev] UDS.KEYID = 0
3,862,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,578 UART: [idev] Erasing UDS.KEYID = 0
6,333,235 UART: [idev] Sha1 KeyId Algorithm
6,355,778 UART: [idev] --
6,360,104 UART: [ldev] ++
6,360,804 UART: [ldev] CDI.KEYID = 6
6,361,696 UART: [ldev] SUBJECT.KEYID = 5
6,362,857 UART: [ldev] AUTHORITY.KEYID = 7
6,364,099 UART: [ldev] FE.KEYID = 1
6,373,647 UART: [ldev] Erasing FE.KEYID = 1
8,852,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,500 UART: [ldev] --
10,644,536 UART: [fwproc] Wait for Commands...
10,647,018 UART: [fwproc] Recv command 0x46574c44
10,649,302 UART: [fwproc] Recv'd Img size: 118548 bytes
12,735,482 UART: ROM Fatal Error: 0x000B002F
12,739,158 >>> mbox cmd response: failed
12,739,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,963 >>> mbox cmd response: failed
12,740,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,740,535 >>> mbox cmd response: failed
Initializing fuses
2,061,321 writing to cptra_bootfsm_go
2,250,644 UART:
2,250,992 UART: Running Caliptra ROM ...
2,252,046 UART:
7,729,708 UART: [state] CFI Enabled
7,741,764 UART: [state] LifecycleState = Unprovisioned
7,744,132 UART: [state] DebugLocked = No
7,746,963 UART: [state] WD Timer not started. Device not locked for debugging
7,752,025 UART: [kat] SHA2-256
7,941,950 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,952,705 UART: [kat] ++
7,953,232 UART: [kat] sha1
7,964,554 UART: [kat] SHA2-256
7,967,566 UART: [kat] SHA2-384
7,973,844 UART: [kat] SHA2-512-ACC
7,976,434 UART: [kat] ECC-384
10,419,755 UART: [kat] HMAC-384Kdf
10,431,337 UART: [kat] LMS
10,963,187 UART: [kat] --
10,967,084 UART: [cold-reset] ++
10,969,295 UART: [fht] FHT @ 0x50003400
10,981,409 UART: [idev] ++
10,982,104 UART: [idev] CDI.KEYID = 6
10,983,174 UART: [idev] SUBJECT.KEYID = 7
10,984,284 UART: [idev] UDS.KEYID = 0
10,986,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,135,691 UART: [idev] Erasing UDS.KEYID = 0
13,458,122 UART: [idev] Sha1 KeyId Algorithm
13,480,452 UART: [idev] --
13,485,478 UART: [ldev] ++
13,486,203 UART: [ldev] CDI.KEYID = 6
13,487,120 UART: [ldev] SUBJECT.KEYID = 5
13,488,163 UART: [ldev] AUTHORITY.KEYID = 7
13,489,461 UART: [ldev] FE.KEYID = 1
13,499,408 UART: [ldev] Erasing FE.KEYID = 1
15,978,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,697,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,712,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,727,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,742,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,763,021 UART: [ldev] --
17,768,312 UART: [fwproc] Wait for Commands...
17,771,292 UART: [fwproc] Recv command 0x46574c44
17,773,613 UART: [fwproc] Recv'd Img size: 118548 bytes
21,265,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,347,658 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,471,299 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,031,205 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,847 writing to cptra_bootfsm_go
3,760,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,514,627 >>> mbox cmd response: failed
12,515,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,515,550 >>> mbox cmd response: failed
12,515,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,122 >>> mbox cmd response: failed
Initializing fuses
2,062,911 writing to cptra_bootfsm_go
11,102,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,393,280 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,614 UART: [state] LifecycleState = Unprovisioned
86,269 UART: [state] DebugLocked = No
86,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,279 UART: [kat] SHA2-256
882,210 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,325 UART: [kat] ++
886,477 UART: [kat] sha1
890,805 UART: [kat] SHA2-256
892,743 UART: [kat] SHA2-384
895,582 UART: [kat] SHA2-512-ACC
897,483 UART: [kat] ECC-384
903,040 UART: [kat] HMAC-384Kdf
907,628 UART: [kat] LMS
1,475,824 UART: [kat] --
1,476,695 UART: [cold-reset] ++
1,477,117 UART: [fht] Storing FHT @ 0x50003400
1,479,798 UART: [idev] ++
1,479,966 UART: [idev] CDI.KEYID = 6
1,480,326 UART: [idev] SUBJECT.KEYID = 7
1,480,750 UART: [idev] UDS.KEYID = 0
1,481,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,286 UART: [idev] Erasing UDS.KEYID = 0
1,505,890 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,572 UART: [idev] --
1,515,527 UART: [ldev] ++
1,515,695 UART: [ldev] CDI.KEYID = 6
1,516,058 UART: [ldev] SUBJECT.KEYID = 5
1,516,484 UART: [ldev] AUTHORITY.KEYID = 7
1,516,947 UART: [ldev] FE.KEYID = 1
1,522,093 UART: [ldev] Erasing FE.KEYID = 1
1,547,154 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,242 UART: [ldev] --
1,586,553 UART: [fwproc] Waiting for Commands...
1,587,284 UART: [fwproc] Received command 0x46574c44
1,588,075 UART: [fwproc] Received Image of size 118548 bytes
1,635,169 UART: ROM Fatal Error: 0x000B002F
1,636,328 >>> mbox cmd response: failed
1,636,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,334 >>> mbox cmd response: failed
1,636,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,340 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,253 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,771 UART: [kat] SHA2-256
881,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,817 UART: [kat] ++
885,969 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
894,924 UART: [kat] SHA2-512-ACC
896,825 UART: [kat] ECC-384
902,268 UART: [kat] HMAC-384Kdf
906,872 UART: [kat] LMS
1,475,068 UART: [kat] --
1,475,927 UART: [cold-reset] ++
1,476,455 UART: [fht] Storing FHT @ 0x50003400
1,479,046 UART: [idev] ++
1,479,214 UART: [idev] CDI.KEYID = 6
1,479,574 UART: [idev] SUBJECT.KEYID = 7
1,479,998 UART: [idev] UDS.KEYID = 0
1,480,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,730 UART: [idev] Erasing UDS.KEYID = 0
1,504,546 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,182 UART: [idev] --
1,514,037 UART: [ldev] ++
1,514,205 UART: [ldev] CDI.KEYID = 6
1,514,568 UART: [ldev] SUBJECT.KEYID = 5
1,514,994 UART: [ldev] AUTHORITY.KEYID = 7
1,515,457 UART: [ldev] FE.KEYID = 1
1,520,735 UART: [ldev] Erasing FE.KEYID = 1
1,545,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,426 UART: [ldev] --
1,584,755 UART: [fwproc] Waiting for Commands...
1,585,534 UART: [fwproc] Received command 0x46574c44
1,586,325 UART: [fwproc] Received Image of size 118548 bytes
2,930,440 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,656 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,874 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,185 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,909 >>> mbox cmd response: failed
1,489,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,915 >>> mbox cmd response: failed
1,489,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,921 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,089 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,600 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,110 UART: [kat] SHA2-256
882,041 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,156 UART: [kat] ++
886,308 UART: [kat] sha1
890,370 UART: [kat] SHA2-256
892,308 UART: [kat] SHA2-384
894,957 UART: [kat] SHA2-512-ACC
896,858 UART: [kat] ECC-384
902,691 UART: [kat] HMAC-384Kdf
907,181 UART: [kat] LMS
1,475,377 UART: [kat] --
1,476,236 UART: [cold-reset] ++
1,476,580 UART: [fht] Storing FHT @ 0x50003400
1,479,423 UART: [idev] ++
1,479,591 UART: [idev] CDI.KEYID = 6
1,479,951 UART: [idev] SUBJECT.KEYID = 7
1,480,375 UART: [idev] UDS.KEYID = 0
1,480,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,245 UART: [idev] Erasing UDS.KEYID = 0
1,504,839 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,463 UART: [idev] --
1,514,558 UART: [ldev] ++
1,514,726 UART: [ldev] CDI.KEYID = 6
1,515,089 UART: [ldev] SUBJECT.KEYID = 5
1,515,515 UART: [ldev] AUTHORITY.KEYID = 7
1,515,978 UART: [ldev] FE.KEYID = 1
1,521,314 UART: [ldev] Erasing FE.KEYID = 1
1,546,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,523 UART: [ldev] --
1,586,016 UART: [fwproc] Waiting for Commands...
1,586,701 UART: [fwproc] Received command 0x46574c44
1,587,492 UART: [fwproc] Received Image of size 118548 bytes
1,635,910 UART: ROM Fatal Error: 0x000B002F
1,637,069 >>> mbox cmd response: failed
1,637,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,075 >>> mbox cmd response: failed
1,637,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,081 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,797 UART: [state] LifecycleState = Unprovisioned
86,452 UART: [state] DebugLocked = No
86,936 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,642 UART: [kat] SHA2-256
882,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,688 UART: [kat] ++
886,840 UART: [kat] sha1
891,100 UART: [kat] SHA2-256
893,038 UART: [kat] SHA2-384
895,805 UART: [kat] SHA2-512-ACC
897,706 UART: [kat] ECC-384
903,295 UART: [kat] HMAC-384Kdf
907,999 UART: [kat] LMS
1,476,195 UART: [kat] --
1,477,126 UART: [cold-reset] ++
1,477,486 UART: [fht] Storing FHT @ 0x50003400
1,480,403 UART: [idev] ++
1,480,571 UART: [idev] CDI.KEYID = 6
1,480,931 UART: [idev] SUBJECT.KEYID = 7
1,481,355 UART: [idev] UDS.KEYID = 0
1,481,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,307 UART: [idev] Erasing UDS.KEYID = 0
1,506,179 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,863 UART: [idev] --
1,515,800 UART: [ldev] ++
1,515,968 UART: [ldev] CDI.KEYID = 6
1,516,331 UART: [ldev] SUBJECT.KEYID = 5
1,516,757 UART: [ldev] AUTHORITY.KEYID = 7
1,517,220 UART: [ldev] FE.KEYID = 1
1,522,490 UART: [ldev] Erasing FE.KEYID = 1
1,547,513 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,231 UART: [ldev] --
1,586,596 UART: [fwproc] Waiting for Commands...
1,587,281 UART: [fwproc] Received command 0x46574c44
1,588,072 UART: [fwproc] Received Image of size 118548 bytes
2,932,057 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,619 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,837 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,150 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,128 >>> mbox cmd response: failed
1,488,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,134 >>> mbox cmd response: failed
1,488,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,140 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,798 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
85,963 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
890,864 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,968 UART: [kat] ++
895,120 UART: [kat] sha1
899,192 UART: [kat] SHA2-256
901,132 UART: [kat] SHA2-384
903,867 UART: [kat] SHA2-512-ACC
905,768 UART: [kat] ECC-384
915,953 UART: [kat] HMAC-384Kdf
920,617 UART: [kat] LMS
1,168,929 UART: [kat] --
1,169,928 UART: [cold-reset] ++
1,170,334 UART: [fht] FHT @ 0x50003400
1,172,962 UART: [idev] ++
1,173,130 UART: [idev] CDI.KEYID = 6
1,173,491 UART: [idev] SUBJECT.KEYID = 7
1,173,916 UART: [idev] UDS.KEYID = 0
1,174,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,757 UART: [idev] Erasing UDS.KEYID = 0
1,198,739 UART: [idev] Sha1 KeyId Algorithm
1,207,615 UART: [idev] --
1,208,420 UART: [ldev] ++
1,208,588 UART: [ldev] CDI.KEYID = 6
1,208,952 UART: [ldev] SUBJECT.KEYID = 5
1,209,379 UART: [ldev] AUTHORITY.KEYID = 7
1,209,842 UART: [ldev] FE.KEYID = 1
1,214,970 UART: [ldev] Erasing FE.KEYID = 1
1,241,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,944 UART: [ldev] --
1,280,243 UART: [fwproc] Wait for Commands...
1,280,944 UART: [fwproc] Recv command 0x46574c44
1,281,677 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,895 UART: ROM Fatal Error: 0x000B002F
1,329,054 >>> mbox cmd response: failed
1,329,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,060 >>> mbox cmd response: failed
1,329,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,652 UART: [kat] ++
895,804 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,793 UART: [kat] SHA2-512-ACC
906,694 UART: [kat] ECC-384
916,643 UART: [kat] HMAC-384Kdf
921,129 UART: [kat] LMS
1,169,441 UART: [kat] --
1,170,390 UART: [cold-reset] ++
1,170,842 UART: [fht] FHT @ 0x50003400
1,173,586 UART: [idev] ++
1,173,754 UART: [idev] CDI.KEYID = 6
1,174,115 UART: [idev] SUBJECT.KEYID = 7
1,174,540 UART: [idev] UDS.KEYID = 0
1,174,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,671 UART: [idev] Erasing UDS.KEYID = 0
1,199,787 UART: [idev] Sha1 KeyId Algorithm
1,208,585 UART: [idev] --
1,209,588 UART: [ldev] ++
1,209,756 UART: [ldev] CDI.KEYID = 6
1,210,120 UART: [ldev] SUBJECT.KEYID = 5
1,210,547 UART: [ldev] AUTHORITY.KEYID = 7
1,211,010 UART: [ldev] FE.KEYID = 1
1,216,302 UART: [ldev] Erasing FE.KEYID = 1
1,242,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,816 UART: [ldev] --
1,282,143 UART: [fwproc] Wait for Commands...
1,282,930 UART: [fwproc] Recv command 0x46574c44
1,283,663 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,424 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,599 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,994 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,119 >>> mbox cmd response: failed
1,187,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,125 >>> mbox cmd response: failed
1,187,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,733 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,529 UART: [kat] ++
895,681 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,126 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,170,157 UART: [cold-reset] ++
1,170,675 UART: [fht] FHT @ 0x50003400
1,173,437 UART: [idev] ++
1,173,605 UART: [idev] CDI.KEYID = 6
1,173,966 UART: [idev] SUBJECT.KEYID = 7
1,174,391 UART: [idev] UDS.KEYID = 0
1,174,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,206 UART: [idev] Erasing UDS.KEYID = 0
1,198,812 UART: [idev] Sha1 KeyId Algorithm
1,207,672 UART: [idev] --
1,208,749 UART: [ldev] ++
1,208,917 UART: [ldev] CDI.KEYID = 6
1,209,281 UART: [ldev] SUBJECT.KEYID = 5
1,209,708 UART: [ldev] AUTHORITY.KEYID = 7
1,210,171 UART: [ldev] FE.KEYID = 1
1,215,407 UART: [ldev] Erasing FE.KEYID = 1
1,241,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,013 UART: [ldev] --
1,281,454 UART: [fwproc] Wait for Commands...
1,282,163 UART: [fwproc] Recv command 0x46574c44
1,282,896 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,078 UART: ROM Fatal Error: 0x000B002F
1,330,237 >>> mbox cmd response: failed
1,330,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,243 >>> mbox cmd response: failed
1,330,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
891,181 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,571 UART: [kat] SHA2-256
901,511 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
916,046 UART: [kat] HMAC-384Kdf
920,558 UART: [kat] LMS
1,168,870 UART: [kat] --
1,169,565 UART: [cold-reset] ++
1,170,015 UART: [fht] FHT @ 0x50003400
1,172,887 UART: [idev] ++
1,173,055 UART: [idev] CDI.KEYID = 6
1,173,416 UART: [idev] SUBJECT.KEYID = 7
1,173,841 UART: [idev] UDS.KEYID = 0
1,174,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,530 UART: [idev] Erasing UDS.KEYID = 0
1,198,900 UART: [idev] Sha1 KeyId Algorithm
1,207,860 UART: [idev] --
1,208,723 UART: [ldev] ++
1,208,891 UART: [ldev] CDI.KEYID = 6
1,209,255 UART: [ldev] SUBJECT.KEYID = 5
1,209,682 UART: [ldev] AUTHORITY.KEYID = 7
1,210,145 UART: [ldev] FE.KEYID = 1
1,215,353 UART: [ldev] Erasing FE.KEYID = 1
1,241,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,135 UART: [ldev] --
1,281,462 UART: [fwproc] Wait for Commands...
1,282,213 UART: [fwproc] Recv command 0x46574c44
1,282,946 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,051 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,226 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,527 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,226 >>> mbox cmd response: failed
1,186,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,232 >>> mbox cmd response: failed
1,186,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,468 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
893,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,367 UART: [kat] ++
897,519 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
917,960 UART: [kat] HMAC-384Kdf
922,456 UART: [kat] LMS
1,170,784 UART: [kat] --
1,171,899 UART: [cold-reset] ++
1,172,363 UART: [fht] FHT @ 0x50003400
1,174,950 UART: [idev] ++
1,175,118 UART: [idev] CDI.KEYID = 6
1,175,478 UART: [idev] SUBJECT.KEYID = 7
1,175,902 UART: [idev] UDS.KEYID = 0
1,176,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,358 UART: [idev] Erasing UDS.KEYID = 0
1,201,621 UART: [idev] Sha1 KeyId Algorithm
1,210,111 UART: [idev] --
1,211,125 UART: [ldev] ++
1,211,293 UART: [ldev] CDI.KEYID = 6
1,211,656 UART: [ldev] SUBJECT.KEYID = 5
1,212,082 UART: [ldev] AUTHORITY.KEYID = 7
1,212,545 UART: [ldev] FE.KEYID = 1
1,217,709 UART: [ldev] Erasing FE.KEYID = 1
1,243,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,601 UART: [ldev] --
1,282,938 UART: [fwproc] Wait for Commands...
1,283,512 UART: [fwproc] Recv command 0x46574c44
1,284,240 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,870 UART: ROM Fatal Error: 0x000B002F
1,333,029 >>> mbox cmd response: failed
1,333,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,035 >>> mbox cmd response: failed
1,333,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,041 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
893,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,369 UART: [kat] ++
897,521 UART: [kat] sha1
901,833 UART: [kat] SHA2-256
903,773 UART: [kat] SHA2-384
906,574 UART: [kat] SHA2-512-ACC
908,475 UART: [kat] ECC-384
918,398 UART: [kat] HMAC-384Kdf
922,834 UART: [kat] LMS
1,171,162 UART: [kat] --
1,172,125 UART: [cold-reset] ++
1,172,567 UART: [fht] FHT @ 0x50003400
1,175,316 UART: [idev] ++
1,175,484 UART: [idev] CDI.KEYID = 6
1,175,844 UART: [idev] SUBJECT.KEYID = 7
1,176,268 UART: [idev] UDS.KEYID = 0
1,176,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,260 UART: [idev] Erasing UDS.KEYID = 0
1,201,187 UART: [idev] Sha1 KeyId Algorithm
1,209,755 UART: [idev] --
1,210,799 UART: [ldev] ++
1,210,967 UART: [ldev] CDI.KEYID = 6
1,211,330 UART: [ldev] SUBJECT.KEYID = 5
1,211,756 UART: [ldev] AUTHORITY.KEYID = 7
1,212,219 UART: [ldev] FE.KEYID = 1
1,217,275 UART: [ldev] Erasing FE.KEYID = 1
1,243,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,731 UART: [ldev] --
1,283,092 UART: [fwproc] Wait for Commands...
1,283,820 UART: [fwproc] Recv command 0x46574c44
1,284,548 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,015 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,185 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,552 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,856 >>> mbox cmd response: failed
1,186,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,862 >>> mbox cmd response: failed
1,186,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,868 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,435 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
893,475 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,600 UART: [kat] ++
897,752 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
918,087 UART: [kat] HMAC-384Kdf
922,759 UART: [kat] LMS
1,171,087 UART: [kat] --
1,171,778 UART: [cold-reset] ++
1,172,134 UART: [fht] FHT @ 0x50003400
1,174,637 UART: [idev] ++
1,174,805 UART: [idev] CDI.KEYID = 6
1,175,165 UART: [idev] SUBJECT.KEYID = 7
1,175,589 UART: [idev] UDS.KEYID = 0
1,175,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,673 UART: [idev] Erasing UDS.KEYID = 0
1,200,110 UART: [idev] Sha1 KeyId Algorithm
1,208,414 UART: [idev] --
1,209,538 UART: [ldev] ++
1,209,706 UART: [ldev] CDI.KEYID = 6
1,210,069 UART: [ldev] SUBJECT.KEYID = 5
1,210,495 UART: [ldev] AUTHORITY.KEYID = 7
1,210,958 UART: [ldev] FE.KEYID = 1
1,216,356 UART: [ldev] Erasing FE.KEYID = 1
1,242,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,524 UART: [ldev] --
1,282,021 UART: [fwproc] Wait for Commands...
1,282,785 UART: [fwproc] Recv command 0x46574c44
1,283,513 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,303 UART: ROM Fatal Error: 0x000B002F
1,332,462 >>> mbox cmd response: failed
1,332,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,468 >>> mbox cmd response: failed
1,332,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,474 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
893,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,438 UART: [kat] ++
897,590 UART: [kat] sha1
901,818 UART: [kat] SHA2-256
903,758 UART: [kat] SHA2-384
906,571 UART: [kat] SHA2-512-ACC
908,472 UART: [kat] ECC-384
918,453 UART: [kat] HMAC-384Kdf
923,169 UART: [kat] LMS
1,171,497 UART: [kat] --
1,172,700 UART: [cold-reset] ++
1,173,232 UART: [fht] FHT @ 0x50003400
1,175,791 UART: [idev] ++
1,175,959 UART: [idev] CDI.KEYID = 6
1,176,319 UART: [idev] SUBJECT.KEYID = 7
1,176,743 UART: [idev] UDS.KEYID = 0
1,177,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,025 UART: [idev] Erasing UDS.KEYID = 0
1,202,054 UART: [idev] Sha1 KeyId Algorithm
1,210,656 UART: [idev] --
1,211,752 UART: [ldev] ++
1,211,920 UART: [ldev] CDI.KEYID = 6
1,212,283 UART: [ldev] SUBJECT.KEYID = 5
1,212,709 UART: [ldev] AUTHORITY.KEYID = 7
1,213,172 UART: [ldev] FE.KEYID = 1
1,218,294 UART: [ldev] Erasing FE.KEYID = 1
1,244,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,760 UART: [ldev] --
1,284,021 UART: [fwproc] Wait for Commands...
1,284,645 UART: [fwproc] Recv command 0x46574c44
1,285,373 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,490 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,660 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,059 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,465 >>> mbox cmd response: failed
1,186,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,471 >>> mbox cmd response: failed
1,186,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,477 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,444 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,062 UART:
192,425 UART: Running Caliptra ROM ...
193,513 UART:
193,658 UART: [state] CFI Enabled
264,854 UART: [state] LifecycleState = Unprovisioned
266,769 UART: [state] DebugLocked = No
268,067 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,731 UART: [kat] SHA2-256
442,402 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,942 UART: [kat] ++
453,396 UART: [kat] sha1
464,921 UART: [kat] SHA2-256
467,663 UART: [kat] SHA2-384
473,587 UART: [kat] SHA2-512-ACC
475,955 UART: [kat] ECC-384
2,771,270 UART: [kat] HMAC-384Kdf
2,803,445 UART: [kat] LMS
3,993,771 UART: [kat] --
3,998,439 UART: [cold-reset] ++
4,000,972 UART: [fht] Storing FHT @ 0x50003400
4,012,948 UART: [idev] ++
4,013,518 UART: [idev] CDI.KEYID = 6
4,014,488 UART: [idev] SUBJECT.KEYID = 7
4,015,707 UART: [idev] UDS.KEYID = 0
4,018,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,168,102 UART: [idev] Erasing UDS.KEYID = 0
7,350,948 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,114 UART: [idev] --
7,375,519 UART: [ldev] ++
7,376,092 UART: [ldev] CDI.KEYID = 6
7,377,083 UART: [ldev] SUBJECT.KEYID = 5
7,378,306 UART: [ldev] AUTHORITY.KEYID = 7
7,379,751 UART: [ldev] FE.KEYID = 1
7,426,084 UART: [ldev] Erasing FE.KEYID = 1
10,757,698 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,520 UART: [ldev] --
13,119,301 UART: [fwproc] Waiting for Commands...
13,122,375 UART: [fwproc] Received command 0x46574c44
13,124,566 UART: [fwproc] Received Image of size 118548 bytes
13,179,764 UART: ROM Fatal Error: 0x000B0001
13,183,287 >>> mbox cmd response: failed
13,183,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,184,070 >>> mbox cmd response: failed
13,184,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,184,640 >>> mbox cmd response: failed
Initializing fuses
2,053,856 writing to cptra_bootfsm_go
2,243,184 UART:
2,243,531 UART: Running Caliptra ROM ...
2,244,668 UART:
2,244,833 UART: [state] CFI Enabled
2,314,423 UART: [state] LifecycleState = Unprovisioned
2,316,383 UART: [state] DebugLocked = No
2,318,538 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,643 UART: [kat] SHA2-256
2,492,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,844 UART: [kat] ++
2,503,354 UART: [kat] sha1
2,514,722 UART: [kat] SHA2-256
2,517,408 UART: [kat] SHA2-384
2,523,299 UART: [kat] SHA2-512-ACC
2,525,655 UART: [kat] ECC-384
4,817,762 UART: [kat] HMAC-384Kdf
4,850,462 UART: [kat] LMS
6,040,744 UART: [kat] --
6,045,297 UART: [cold-reset] ++
6,047,398 UART: [fht] Storing FHT @ 0x50003400
6,059,584 UART: [idev] ++
6,060,162 UART: [idev] CDI.KEYID = 6
6,061,076 UART: [idev] SUBJECT.KEYID = 7
6,062,354 UART: [idev] UDS.KEYID = 0
6,064,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,213,896 UART: [idev] Erasing UDS.KEYID = 0
9,395,256 UART: [idev] Using Sha1 for KeyId Algorithm
9,416,866 UART: [idev] --
9,420,486 UART: [ldev] ++
9,421,055 UART: [ldev] CDI.KEYID = 6
9,422,079 UART: [ldev] SUBJECT.KEYID = 5
9,423,281 UART: [ldev] AUTHORITY.KEYID = 7
9,424,515 UART: [ldev] FE.KEYID = 1
9,473,355 UART: [ldev] Erasing FE.KEYID = 1
12,804,555 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,118,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,133,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,147,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,162,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,182,638 UART: [ldev] --
15,186,897 UART: [fwproc] Waiting for Commands...
15,189,646 UART: [fwproc] Received command 0x46574c44
15,191,890 UART: [fwproc] Received Image of size 118548 bytes
19,293,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,367,004 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,440,195 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,769,123 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,788,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,916,114 >>> mbox cmd response: failed
12,916,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,330 >>> mbox cmd response: failed
12,917,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,848 >>> mbox cmd response: failed
Initializing fuses
2,046,972 writing to cptra_bootfsm_go
5,847,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,998,049 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,458 UART:
192,807 UART: Running Caliptra ROM ...
193,993 UART:
603,747 UART: [state] CFI Enabled
619,578 UART: [state] LifecycleState = Unprovisioned
621,531 UART: [state] DebugLocked = No
623,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,093 UART: [kat] SHA2-256
797,814 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,344 UART: [kat] ++
808,854 UART: [kat] sha1
819,518 UART: [kat] SHA2-256
822,220 UART: [kat] SHA2-384
827,500 UART: [kat] SHA2-512-ACC
829,901 UART: [kat] ECC-384
3,113,589 UART: [kat] HMAC-384Kdf
3,123,730 UART: [kat] LMS
4,313,866 UART: [kat] --
4,318,697 UART: [cold-reset] ++
4,320,532 UART: [fht] Storing FHT @ 0x50003400
4,331,969 UART: [idev] ++
4,332,547 UART: [idev] CDI.KEYID = 6
4,333,464 UART: [idev] SUBJECT.KEYID = 7
4,334,688 UART: [idev] UDS.KEYID = 0
4,337,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,865 UART: [idev] Erasing UDS.KEYID = 0
7,623,868 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,116 UART: [idev] --
7,651,271 UART: [ldev] ++
7,651,847 UART: [ldev] CDI.KEYID = 6
7,652,816 UART: [ldev] SUBJECT.KEYID = 5
7,653,982 UART: [ldev] AUTHORITY.KEYID = 7
7,655,275 UART: [ldev] FE.KEYID = 1
7,666,360 UART: [ldev] Erasing FE.KEYID = 1
10,950,754 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,574 UART: [ldev] --
13,314,096 UART: [fwproc] Waiting for Commands...
13,317,125 UART: [fwproc] Received command 0x46574c44
13,319,320 UART: [fwproc] Received Image of size 118548 bytes
13,372,667 UART: ROM Fatal Error: 0x000B0001
13,376,154 >>> mbox cmd response: failed
13,376,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,376,865 >>> mbox cmd response: failed
13,377,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,377,626 >>> mbox cmd response: failed
Initializing fuses
2,052,937 writing to cptra_bootfsm_go
2,242,322 UART:
2,242,680 UART: Running Caliptra ROM ...
2,243,744 UART:
7,090,584 UART: [state] CFI Enabled
7,105,200 UART: [state] LifecycleState = Unprovisioned
7,107,160 UART: [state] DebugLocked = No
7,108,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,113,776 UART: [kat] SHA2-256
7,283,516 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,294,081 UART: [kat] ++
7,294,633 UART: [kat] sha1
7,305,318 UART: [kat] SHA2-256
7,308,013 UART: [kat] SHA2-384
7,313,900 UART: [kat] SHA2-512-ACC
7,316,266 UART: [kat] ECC-384
9,600,342 UART: [kat] HMAC-384Kdf
9,613,231 UART: [kat] LMS
10,803,339 UART: [kat] --
10,808,682 UART: [cold-reset] ++
10,811,107 UART: [fht] Storing FHT @ 0x50003400
10,822,856 UART: [idev] ++
10,823,416 UART: [idev] CDI.KEYID = 6
10,824,376 UART: [idev] SUBJECT.KEYID = 7
10,825,655 UART: [idev] UDS.KEYID = 0
10,828,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,976,904 UART: [idev] Erasing UDS.KEYID = 0
14,114,979 UART: [idev] Using Sha1 for KeyId Algorithm
14,137,059 UART: [idev] --
14,141,574 UART: [ldev] ++
14,142,158 UART: [ldev] CDI.KEYID = 6
14,143,100 UART: [ldev] SUBJECT.KEYID = 5
14,144,355 UART: [ldev] AUTHORITY.KEYID = 7
14,145,600 UART: [ldev] FE.KEYID = 1
14,154,394 UART: [ldev] Erasing FE.KEYID = 1
17,444,827 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,737,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,752,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,767,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,781,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,799,269 UART: [ldev] --
19,804,274 UART: [fwproc] Waiting for Commands...
19,806,158 UART: [fwproc] Received command 0x46574c44
19,808,349 UART: [fwproc] Received Image of size 118548 bytes
23,918,029 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,994,365 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,067,554 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,396,306 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,161 writing to cptra_bootfsm_go
4,128,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,108,261 >>> mbox cmd response: failed
13,108,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,109,309 >>> mbox cmd response: failed
13,109,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,109,830 >>> mbox cmd response: failed
Initializing fuses
2,048,905 writing to cptra_bootfsm_go
10,879,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,907,689 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
192,312 UART:
192,676 UART: Running Caliptra ROM ...
193,863 UART:
194,020 UART: [state] CFI Enabled
260,091 UART: [state] LifecycleState = Unprovisioned
262,051 UART: [state] DebugLocked = No
264,686 UART: [state] WD Timer not started. Device not locked for debugging
267,715 UART: [kat] SHA2-256
447,401 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,163 UART: [kat] ++
458,620 UART: [kat] sha1
468,995 UART: [kat] SHA2-256
471,681 UART: [kat] SHA2-384
478,322 UART: [kat] SHA2-512-ACC
480,722 UART: [kat] ECC-384
2,944,118 UART: [kat] HMAC-384Kdf
2,967,593 UART: [kat] LMS
3,444,091 UART: [kat] --
3,449,069 UART: [cold-reset] ++
3,451,665 UART: [fht] FHT @ 0x50003400
3,463,940 UART: [idev] ++
3,464,508 UART: [idev] CDI.KEYID = 6
3,465,477 UART: [idev] SUBJECT.KEYID = 7
3,466,693 UART: [idev] UDS.KEYID = 0
3,469,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,706 UART: [idev] Erasing UDS.KEYID = 0
5,984,248 UART: [idev] Sha1 KeyId Algorithm
6,007,779 UART: [idev] --
6,014,203 UART: [ldev] ++
6,014,790 UART: [ldev] CDI.KEYID = 6
6,015,864 UART: [ldev] SUBJECT.KEYID = 5
6,016,978 UART: [ldev] AUTHORITY.KEYID = 7
6,018,183 UART: [ldev] FE.KEYID = 1
6,056,441 UART: [ldev] Erasing FE.KEYID = 1
8,562,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,833 UART: [ldev] --
10,373,049 UART: [fwproc] Wait for Commands...
10,374,776 UART: [fwproc] Recv command 0x46574c44
10,376,773 UART: [fwproc] Recv'd Img size: 118548 bytes
10,442,693 UART: ROM Fatal Error: 0x000B0001
10,445,943 >>> mbox cmd response: failed
10,446,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,446,648 >>> mbox cmd response: failed
10,446,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,447,238 >>> mbox cmd response: failed
Initializing fuses
2,054,143 writing to cptra_bootfsm_go
2,243,425 UART:
2,243,770 UART: Running Caliptra ROM ...
2,244,821 UART:
2,244,975 UART: [state] CFI Enabled
2,314,296 UART: [state] LifecycleState = Unprovisioned
2,316,231 UART: [state] DebugLocked = No
2,318,680 UART: [state] WD Timer not started. Device not locked for debugging
2,322,532 UART: [kat] SHA2-256
2,502,200 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,512,957 UART: [kat] ++
2,513,446 UART: [kat] sha1
2,523,208 UART: [kat] SHA2-256
2,525,915 UART: [kat] SHA2-384
2,530,996 UART: [kat] SHA2-512-ACC
2,533,357 UART: [kat] ECC-384
4,976,204 UART: [kat] HMAC-384Kdf
5,000,120 UART: [kat] LMS
5,476,640 UART: [kat] --
5,482,422 UART: [cold-reset] ++
5,484,370 UART: [fht] FHT @ 0x50003400
5,496,163 UART: [idev] ++
5,496,735 UART: [idev] CDI.KEYID = 6
5,497,758 UART: [idev] SUBJECT.KEYID = 7
5,498,924 UART: [idev] UDS.KEYID = 0
5,502,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,651,341 UART: [idev] Erasing UDS.KEYID = 0
8,013,684 UART: [idev] Sha1 KeyId Algorithm
8,035,971 UART: [idev] --
8,041,352 UART: [ldev] ++
8,041,938 UART: [ldev] CDI.KEYID = 6
8,042,831 UART: [ldev] SUBJECT.KEYID = 5
8,044,055 UART: [ldev] AUTHORITY.KEYID = 7
8,045,303 UART: [ldev] FE.KEYID = 1
8,086,480 UART: [ldev] Erasing FE.KEYID = 1
10,595,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,328,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,344,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,360,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,376,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,397,486 UART: [ldev] --
12,402,539 UART: [fwproc] Wait for Commands...
12,405,785 UART: [fwproc] Recv command 0x46574c44
12,407,796 UART: [fwproc] Recv'd Img size: 118548 bytes
15,895,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,974,593 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,047,614 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,375,712 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,463,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,341,897 >>> mbox cmd response: failed
10,342,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,342,783 >>> mbox cmd response: failed
10,343,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,343,361 >>> mbox cmd response: failed
Initializing fuses
2,062,015 writing to cptra_bootfsm_go
5,516,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,299,533 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,483 writing to cptra_bootfsm_go
192,667 UART:
193,024 UART: Running Caliptra ROM ...
194,130 UART:
603,827 UART: [state] CFI Enabled
619,495 UART: [state] LifecycleState = Unprovisioned
621,461 UART: [state] DebugLocked = No
623,675 UART: [state] WD Timer not started. Device not locked for debugging
627,214 UART: [kat] SHA2-256
806,858 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,639 UART: [kat] ++
818,091 UART: [kat] sha1
828,057 UART: [kat] SHA2-256
830,753 UART: [kat] SHA2-384
835,924 UART: [kat] SHA2-512-ACC
838,325 UART: [kat] ECC-384
3,280,392 UART: [kat] HMAC-384Kdf
3,293,276 UART: [kat] LMS
3,769,795 UART: [kat] --
3,774,866 UART: [cold-reset] ++
3,775,993 UART: [fht] FHT @ 0x50003400
3,786,760 UART: [idev] ++
3,787,339 UART: [idev] CDI.KEYID = 6
3,788,312 UART: [idev] SUBJECT.KEYID = 7
3,789,536 UART: [idev] UDS.KEYID = 0
3,792,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,489 UART: [idev] Erasing UDS.KEYID = 0
6,270,365 UART: [idev] Sha1 KeyId Algorithm
6,294,524 UART: [idev] --
6,300,254 UART: [ldev] ++
6,300,828 UART: [ldev] CDI.KEYID = 6
6,301,775 UART: [ldev] SUBJECT.KEYID = 5
6,303,038 UART: [ldev] AUTHORITY.KEYID = 7
6,304,243 UART: [ldev] FE.KEYID = 1
6,315,522 UART: [ldev] Erasing FE.KEYID = 1
8,792,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,319 UART: [ldev] --
10,588,324 UART: [fwproc] Wait for Commands...
10,590,122 UART: [fwproc] Recv command 0x46574c44
10,592,115 UART: [fwproc] Recv'd Img size: 118548 bytes
10,666,199 UART: ROM Fatal Error: 0x000B0001
10,669,392 >>> mbox cmd response: failed
10,669,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,670,126 >>> mbox cmd response: failed
10,670,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,670,642 >>> mbox cmd response: failed
Initializing fuses
2,055,231 writing to cptra_bootfsm_go
2,244,604 UART:
2,244,950 UART: Running Caliptra ROM ...
2,246,092 UART:
9,778,832 UART: [state] CFI Enabled
9,793,340 UART: [state] LifecycleState = Unprovisioned
9,795,292 UART: [state] DebugLocked = No
9,796,880 UART: [state] WD Timer not started. Device not locked for debugging
9,801,439 UART: [kat] SHA2-256
9,981,109 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,991,903 UART: [kat] ++
9,992,383 UART: [kat] sha1
10,003,490 UART: [kat] SHA2-256
10,006,198 UART: [kat] SHA2-384
10,012,735 UART: [kat] SHA2-512-ACC
10,015,145 UART: [kat] ECC-384
12,455,940 UART: [kat] HMAC-384Kdf
12,468,545 UART: [kat] LMS
12,945,083 UART: [kat] --
12,948,743 UART: [cold-reset] ++
12,951,340 UART: [fht] FHT @ 0x50003400
12,962,753 UART: [idev] ++
12,963,321 UART: [idev] CDI.KEYID = 6
12,964,297 UART: [idev] SUBJECT.KEYID = 7
12,965,516 UART: [idev] UDS.KEYID = 0
12,968,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,117,423 UART: [idev] Erasing UDS.KEYID = 0
15,438,108 UART: [idev] Sha1 KeyId Algorithm
15,460,598 UART: [idev] --
15,466,108 UART: [ldev] ++
15,466,685 UART: [ldev] CDI.KEYID = 6
15,467,606 UART: [ldev] SUBJECT.KEYID = 5
15,468,822 UART: [ldev] AUTHORITY.KEYID = 7
15,470,055 UART: [ldev] FE.KEYID = 1
15,480,344 UART: [ldev] Erasing FE.KEYID = 1
17,959,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,679,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,695,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,711,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,726,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,749,595 UART: [ldev] --
19,755,356 UART: [fwproc] Wait for Commands...
19,757,085 UART: [fwproc] Recv command 0x46574c44
19,759,081 UART: [fwproc] Recv'd Img size: 118548 bytes
23,247,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,326,445 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,399,463 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,727,166 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,788,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,545,427 >>> mbox cmd response: failed
10,545,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,283 >>> mbox cmd response: failed
10,546,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,851 >>> mbox cmd response: failed
Initializing fuses
2,054,830 writing to cptra_bootfsm_go
13,101,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,768,067 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,221 UART:
192,600 UART: Running Caliptra ROM ...
193,794 UART:
193,953 UART: [state] CFI Enabled
263,945 UART: [state] LifecycleState = Unprovisioned
266,370 UART: [state] DebugLocked = No
268,080 UART: [state] WD Timer not started. Device not locked for debugging
272,588 UART: [kat] SHA2-256
462,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,289 UART: [kat] ++
473,828 UART: [kat] sha1
485,526 UART: [kat] SHA2-256
488,543 UART: [kat] SHA2-384
494,529 UART: [kat] SHA2-512-ACC
497,143 UART: [kat] ECC-384
2,948,423 UART: [kat] HMAC-384Kdf
2,961,368 UART: [kat] LMS
3,493,127 UART: [kat] --
3,495,893 UART: [cold-reset] ++
3,497,674 UART: [fht] FHT @ 0x50003400
3,509,682 UART: [idev] ++
3,510,371 UART: [idev] CDI.KEYID = 6
3,511,305 UART: [idev] SUBJECT.KEYID = 7
3,512,527 UART: [idev] UDS.KEYID = 0
3,515,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,664,836 UART: [idev] Erasing UDS.KEYID = 0
6,021,209 UART: [idev] Sha1 KeyId Algorithm
6,043,596 UART: [idev] --
6,048,543 UART: [ldev] ++
6,049,247 UART: [ldev] CDI.KEYID = 6
6,050,180 UART: [ldev] SUBJECT.KEYID = 5
6,051,351 UART: [ldev] AUTHORITY.KEYID = 7
6,052,535 UART: [ldev] FE.KEYID = 1
6,092,732 UART: [ldev] Erasing FE.KEYID = 1
8,600,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,405 UART: [ldev] --
10,403,676 UART: [fwproc] Wait for Commands...
10,406,879 UART: [fwproc] Recv command 0x46574c44
10,409,206 UART: [fwproc] Recv'd Img size: 118548 bytes
10,494,696 UART: ROM Fatal Error: 0x000B0001
10,498,382 >>> mbox cmd response: failed
10,498,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,499,177 >>> mbox cmd response: failed
10,499,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,499,751 >>> mbox cmd response: failed
Initializing fuses
2,062,272 writing to cptra_bootfsm_go
2,251,611 UART:
2,251,985 UART: Running Caliptra ROM ...
2,253,066 UART:
2,253,249 UART: [state] CFI Enabled
2,317,883 UART: [state] LifecycleState = Unprovisioned
2,319,935 UART: [state] DebugLocked = No
2,321,116 UART: [state] WD Timer not started. Device not locked for debugging
2,324,495 UART: [kat] SHA2-256
2,514,390 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,134 UART: [kat] ++
2,525,626 UART: [kat] sha1
2,537,873 UART: [kat] SHA2-256
2,540,900 UART: [kat] SHA2-384
2,547,654 UART: [kat] SHA2-512-ACC
2,550,226 UART: [kat] ECC-384
5,004,616 UART: [kat] HMAC-384Kdf
5,027,988 UART: [kat] LMS
5,559,752 UART: [kat] --
5,563,916 UART: [cold-reset] ++
5,565,715 UART: [fht] FHT @ 0x50003400
5,576,712 UART: [idev] ++
5,577,398 UART: [idev] CDI.KEYID = 6
5,578,420 UART: [idev] SUBJECT.KEYID = 7
5,579,527 UART: [idev] UDS.KEYID = 0
5,581,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,731,150 UART: [idev] Erasing UDS.KEYID = 0
8,084,842 UART: [idev] Sha1 KeyId Algorithm
8,106,243 UART: [idev] --
8,110,487 UART: [ldev] ++
8,111,178 UART: [ldev] CDI.KEYID = 6
8,112,070 UART: [ldev] SUBJECT.KEYID = 5
8,113,182 UART: [ldev] AUTHORITY.KEYID = 7
8,114,480 UART: [ldev] FE.KEYID = 1
8,157,505 UART: [ldev] Erasing FE.KEYID = 1
10,671,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,405,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,420,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,435,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,450,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,471,332 UART: [ldev] --
12,477,144 UART: [fwproc] Wait for Commands...
12,479,676 UART: [fwproc] Recv command 0x46574c44
12,481,994 UART: [fwproc] Recv'd Img size: 118548 bytes
15,982,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,063,613 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,187,216 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,747,734 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,439,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,318,356 >>> mbox cmd response: failed
10,318,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,319,245 >>> mbox cmd response: failed
10,319,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,319,816 >>> mbox cmd response: failed
Initializing fuses
2,048,725 writing to cptra_bootfsm_go
5,472,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,862,950 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
192,597 UART:
192,952 UART: Running Caliptra ROM ...
194,140 UART:
603,597 UART: [state] CFI Enabled
618,268 UART: [state] LifecycleState = Unprovisioned
620,677 UART: [state] DebugLocked = No
622,829 UART: [state] WD Timer not started. Device not locked for debugging
628,045 UART: [kat] SHA2-256
817,931 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,694 UART: [kat] ++
829,291 UART: [kat] sha1
840,942 UART: [kat] SHA2-256
843,956 UART: [kat] SHA2-384
851,082 UART: [kat] SHA2-512-ACC
853,696 UART: [kat] ECC-384
3,297,959 UART: [kat] HMAC-384Kdf
3,310,202 UART: [kat] LMS
3,842,034 UART: [kat] --
3,847,973 UART: [cold-reset] ++
3,849,427 UART: [fht] FHT @ 0x50003400
3,859,789 UART: [idev] ++
3,860,473 UART: [idev] CDI.KEYID = 6
3,861,499 UART: [idev] SUBJECT.KEYID = 7
3,862,665 UART: [idev] UDS.KEYID = 0
3,865,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,544 UART: [idev] Erasing UDS.KEYID = 0
6,338,527 UART: [idev] Sha1 KeyId Algorithm
6,360,658 UART: [idev] --
6,365,843 UART: [ldev] ++
6,366,527 UART: [ldev] CDI.KEYID = 6
6,367,614 UART: [ldev] SUBJECT.KEYID = 5
6,368,745 UART: [ldev] AUTHORITY.KEYID = 7
6,369,935 UART: [ldev] FE.KEYID = 1
6,381,298 UART: [ldev] Erasing FE.KEYID = 1
8,858,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,190 UART: [ldev] --
10,649,351 UART: [fwproc] Wait for Commands...
10,651,720 UART: [fwproc] Recv command 0x46574c44
10,653,988 UART: [fwproc] Recv'd Img size: 118548 bytes
10,740,122 UART: ROM Fatal Error: 0x000B0001
10,743,818 >>> mbox cmd response: failed
10,744,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,744,634 >>> mbox cmd response: failed
10,744,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,745,204 >>> mbox cmd response: failed
Initializing fuses
2,055,945 writing to cptra_bootfsm_go
2,245,263 UART:
2,245,614 UART: Running Caliptra ROM ...
2,246,757 UART:
9,709,668 UART: [state] CFI Enabled
9,724,528 UART: [state] LifecycleState = Unprovisioned
9,726,883 UART: [state] DebugLocked = No
9,728,108 UART: [state] WD Timer not started. Device not locked for debugging
9,730,994 UART: [kat] SHA2-256
9,920,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,931,489 UART: [kat] ++
9,932,096 UART: [kat] sha1
9,942,568 UART: [kat] SHA2-256
9,945,588 UART: [kat] SHA2-384
9,951,377 UART: [kat] SHA2-512-ACC
9,953,972 UART: [kat] ECC-384
12,395,863 UART: [kat] HMAC-384Kdf
12,410,203 UART: [kat] LMS
12,942,038 UART: [kat] --
12,947,890 UART: [cold-reset] ++
12,948,972 UART: [fht] FHT @ 0x50003400
12,959,799 UART: [idev] ++
12,960,482 UART: [idev] CDI.KEYID = 6
12,961,502 UART: [idev] SUBJECT.KEYID = 7
12,962,672 UART: [idev] UDS.KEYID = 0
12,965,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,114,033 UART: [idev] Erasing UDS.KEYID = 0
15,442,427 UART: [idev] Sha1 KeyId Algorithm
15,465,227 UART: [idev] --
15,470,284 UART: [ldev] ++
15,470,976 UART: [ldev] CDI.KEYID = 6
15,471,911 UART: [ldev] SUBJECT.KEYID = 5
15,473,082 UART: [ldev] AUTHORITY.KEYID = 7
15,474,270 UART: [ldev] FE.KEYID = 1
15,485,900 UART: [ldev] Erasing FE.KEYID = 1
17,963,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,683,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,698,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,713,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,728,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,750,506 UART: [ldev] --
19,756,584 UART: [fwproc] Wait for Commands...
19,758,804 UART: [fwproc] Recv command 0x46574c44
19,761,126 UART: [fwproc] Recv'd Img size: 118548 bytes
23,261,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,338,958 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,462,553 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,022,326 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,748,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,515,729 >>> mbox cmd response: failed
10,516,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,516,625 >>> mbox cmd response: failed
10,516,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,517,208 >>> mbox cmd response: failed
Initializing fuses
2,051,193 writing to cptra_bootfsm_go
13,099,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,395,705 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,153 UART: [kat] SHA2-256
882,084 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,199 UART: [kat] ++
886,351 UART: [kat] sha1
890,517 UART: [kat] SHA2-256
892,455 UART: [kat] SHA2-384
895,176 UART: [kat] SHA2-512-ACC
897,077 UART: [kat] ECC-384
902,384 UART: [kat] HMAC-384Kdf
906,928 UART: [kat] LMS
1,475,124 UART: [kat] --
1,475,877 UART: [cold-reset] ++
1,476,239 UART: [fht] Storing FHT @ 0x50003400
1,478,862 UART: [idev] ++
1,479,030 UART: [idev] CDI.KEYID = 6
1,479,390 UART: [idev] SUBJECT.KEYID = 7
1,479,814 UART: [idev] UDS.KEYID = 0
1,480,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,310 UART: [idev] Erasing UDS.KEYID = 0
1,504,168 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,574 UART: [idev] --
1,513,459 UART: [ldev] ++
1,513,627 UART: [ldev] CDI.KEYID = 6
1,513,990 UART: [ldev] SUBJECT.KEYID = 5
1,514,416 UART: [ldev] AUTHORITY.KEYID = 7
1,514,879 UART: [ldev] FE.KEYID = 1
1,519,799 UART: [ldev] Erasing FE.KEYID = 1
1,545,754 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,944 UART: [ldev] --
1,585,391 UART: [fwproc] Waiting for Commands...
1,586,176 UART: [fwproc] Received command 0x46574c44
1,586,967 UART: [fwproc] Received Image of size 118548 bytes
1,606,147 UART: ROM Fatal Error: 0x000B0001
1,607,304 >>> mbox cmd response: failed
1,607,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,310 >>> mbox cmd response: failed
1,607,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,077 UART: [kat] SHA2-256
882,008 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,123 UART: [kat] ++
886,275 UART: [kat] sha1
890,541 UART: [kat] SHA2-256
892,479 UART: [kat] SHA2-384
895,240 UART: [kat] SHA2-512-ACC
897,141 UART: [kat] ECC-384
902,366 UART: [kat] HMAC-384Kdf
907,002 UART: [kat] LMS
1,475,198 UART: [kat] --
1,476,261 UART: [cold-reset] ++
1,476,653 UART: [fht] Storing FHT @ 0x50003400
1,479,648 UART: [idev] ++
1,479,816 UART: [idev] CDI.KEYID = 6
1,480,176 UART: [idev] SUBJECT.KEYID = 7
1,480,600 UART: [idev] UDS.KEYID = 0
1,480,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,778 UART: [idev] Erasing UDS.KEYID = 0
1,505,450 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,174 UART: [idev] --
1,515,375 UART: [ldev] ++
1,515,543 UART: [ldev] CDI.KEYID = 6
1,515,906 UART: [ldev] SUBJECT.KEYID = 5
1,516,332 UART: [ldev] AUTHORITY.KEYID = 7
1,516,795 UART: [ldev] FE.KEYID = 1
1,521,981 UART: [ldev] Erasing FE.KEYID = 1
1,547,564 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,488 UART: [ldev] --
1,586,753 UART: [fwproc] Waiting for Commands...
1,587,406 UART: [fwproc] Received command 0x46574c44
1,588,197 UART: [fwproc] Received Image of size 118548 bytes
2,932,578 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,786 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,004 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,239 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,460,229 >>> mbox cmd response: failed
1,460,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,235 >>> mbox cmd response: failed
1,460,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,231 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,316 UART: [kat] SHA2-256
882,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,362 UART: [kat] ++
886,514 UART: [kat] sha1
890,716 UART: [kat] SHA2-256
892,654 UART: [kat] SHA2-384
895,557 UART: [kat] SHA2-512-ACC
897,458 UART: [kat] ECC-384
903,129 UART: [kat] HMAC-384Kdf
907,745 UART: [kat] LMS
1,475,941 UART: [kat] --
1,476,842 UART: [cold-reset] ++
1,477,194 UART: [fht] Storing FHT @ 0x50003400
1,480,147 UART: [idev] ++
1,480,315 UART: [idev] CDI.KEYID = 6
1,480,675 UART: [idev] SUBJECT.KEYID = 7
1,481,099 UART: [idev] UDS.KEYID = 0
1,481,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,463 UART: [idev] Erasing UDS.KEYID = 0
1,506,001 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,735 UART: [idev] --
1,515,850 UART: [ldev] ++
1,516,018 UART: [ldev] CDI.KEYID = 6
1,516,381 UART: [ldev] SUBJECT.KEYID = 5
1,516,807 UART: [ldev] AUTHORITY.KEYID = 7
1,517,270 UART: [ldev] FE.KEYID = 1
1,522,676 UART: [ldev] Erasing FE.KEYID = 1
1,547,947 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,233 UART: [ldev] --
1,587,734 UART: [fwproc] Waiting for Commands...
1,588,539 UART: [fwproc] Received command 0x46574c44
1,589,330 UART: [fwproc] Received Image of size 118548 bytes
1,608,926 UART: ROM Fatal Error: 0x000B0001
1,610,083 >>> mbox cmd response: failed
1,610,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,089 >>> mbox cmd response: failed
1,610,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,095 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,849 UART: [state] LifecycleState = Unprovisioned
85,504 UART: [state] DebugLocked = No
86,102 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,748 UART: [kat] SHA2-256
881,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,794 UART: [kat] ++
885,946 UART: [kat] sha1
890,226 UART: [kat] SHA2-256
892,164 UART: [kat] SHA2-384
894,755 UART: [kat] SHA2-512-ACC
896,656 UART: [kat] ECC-384
902,075 UART: [kat] HMAC-384Kdf
906,793 UART: [kat] LMS
1,474,989 UART: [kat] --
1,475,626 UART: [cold-reset] ++
1,476,162 UART: [fht] Storing FHT @ 0x50003400
1,478,949 UART: [idev] ++
1,479,117 UART: [idev] CDI.KEYID = 6
1,479,477 UART: [idev] SUBJECT.KEYID = 7
1,479,901 UART: [idev] UDS.KEYID = 0
1,480,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,771 UART: [idev] Erasing UDS.KEYID = 0
1,504,497 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,007 UART: [idev] --
1,514,006 UART: [ldev] ++
1,514,174 UART: [ldev] CDI.KEYID = 6
1,514,537 UART: [ldev] SUBJECT.KEYID = 5
1,514,963 UART: [ldev] AUTHORITY.KEYID = 7
1,515,426 UART: [ldev] FE.KEYID = 1
1,520,832 UART: [ldev] Erasing FE.KEYID = 1
1,546,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,429 UART: [ldev] --
1,585,706 UART: [fwproc] Waiting for Commands...
1,586,421 UART: [fwproc] Received command 0x46574c44
1,587,212 UART: [fwproc] Received Image of size 118548 bytes
2,930,207 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,533 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,751 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,064 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,462,166 >>> mbox cmd response: failed
1,462,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,172 >>> mbox cmd response: failed
1,462,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,234 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
891,538 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,642 UART: [kat] ++
895,794 UART: [kat] sha1
900,116 UART: [kat] SHA2-256
902,056 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,403 UART: [kat] HMAC-384Kdf
921,051 UART: [kat] LMS
1,169,363 UART: [kat] --
1,170,394 UART: [cold-reset] ++
1,170,744 UART: [fht] FHT @ 0x50003400
1,173,532 UART: [idev] ++
1,173,700 UART: [idev] CDI.KEYID = 6
1,174,061 UART: [idev] SUBJECT.KEYID = 7
1,174,486 UART: [idev] UDS.KEYID = 0
1,174,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,207 UART: [idev] Erasing UDS.KEYID = 0
1,199,611 UART: [idev] Sha1 KeyId Algorithm
1,208,487 UART: [idev] --
1,209,482 UART: [ldev] ++
1,209,650 UART: [ldev] CDI.KEYID = 6
1,210,014 UART: [ldev] SUBJECT.KEYID = 5
1,210,441 UART: [ldev] AUTHORITY.KEYID = 7
1,210,904 UART: [ldev] FE.KEYID = 1
1,216,210 UART: [ldev] Erasing FE.KEYID = 1
1,243,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,766 UART: [ldev] --
1,282,055 UART: [fwproc] Wait for Commands...
1,282,638 UART: [fwproc] Recv command 0x46574c44
1,283,371 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,861 UART: ROM Fatal Error: 0x000B0001
1,304,018 >>> mbox cmd response: failed
1,304,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,024 >>> mbox cmd response: failed
1,304,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,030 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
891,016 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,120 UART: [kat] ++
895,272 UART: [kat] sha1
899,520 UART: [kat] SHA2-256
901,460 UART: [kat] SHA2-384
904,045 UART: [kat] SHA2-512-ACC
905,946 UART: [kat] ECC-384
915,375 UART: [kat] HMAC-384Kdf
919,955 UART: [kat] LMS
1,168,267 UART: [kat] --
1,168,924 UART: [cold-reset] ++
1,169,382 UART: [fht] FHT @ 0x50003400
1,171,962 UART: [idev] ++
1,172,130 UART: [idev] CDI.KEYID = 6
1,172,491 UART: [idev] SUBJECT.KEYID = 7
1,172,916 UART: [idev] UDS.KEYID = 0
1,173,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,843 UART: [idev] Erasing UDS.KEYID = 0
1,197,465 UART: [idev] Sha1 KeyId Algorithm
1,206,465 UART: [idev] --
1,207,526 UART: [ldev] ++
1,207,694 UART: [ldev] CDI.KEYID = 6
1,208,058 UART: [ldev] SUBJECT.KEYID = 5
1,208,485 UART: [ldev] AUTHORITY.KEYID = 7
1,208,948 UART: [ldev] FE.KEYID = 1
1,214,148 UART: [ldev] Erasing FE.KEYID = 1
1,240,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,220 UART: [ldev] --
1,279,545 UART: [fwproc] Wait for Commands...
1,280,172 UART: [fwproc] Recv command 0x46574c44
1,280,905 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,792 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,967 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,130 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,167 >>> mbox cmd response: failed
1,157,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,173 >>> mbox cmd response: failed
1,157,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,179 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,593 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,655 UART: [kat] ++
895,807 UART: [kat] sha1
899,919 UART: [kat] SHA2-256
901,859 UART: [kat] SHA2-384
904,694 UART: [kat] SHA2-512-ACC
906,595 UART: [kat] ECC-384
916,360 UART: [kat] HMAC-384Kdf
920,944 UART: [kat] LMS
1,169,256 UART: [kat] --
1,170,001 UART: [cold-reset] ++
1,170,433 UART: [fht] FHT @ 0x50003400
1,173,167 UART: [idev] ++
1,173,335 UART: [idev] CDI.KEYID = 6
1,173,696 UART: [idev] SUBJECT.KEYID = 7
1,174,121 UART: [idev] UDS.KEYID = 0
1,174,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,914 UART: [idev] Erasing UDS.KEYID = 0
1,198,578 UART: [idev] Sha1 KeyId Algorithm
1,207,362 UART: [idev] --
1,208,287 UART: [ldev] ++
1,208,455 UART: [ldev] CDI.KEYID = 6
1,208,819 UART: [ldev] SUBJECT.KEYID = 5
1,209,246 UART: [ldev] AUTHORITY.KEYID = 7
1,209,709 UART: [ldev] FE.KEYID = 1
1,214,893 UART: [ldev] Erasing FE.KEYID = 1
1,241,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,425 UART: [ldev] --
1,280,694 UART: [fwproc] Wait for Commands...
1,281,273 UART: [fwproc] Recv command 0x46574c44
1,282,006 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,382 UART: ROM Fatal Error: 0x000B0001
1,302,539 >>> mbox cmd response: failed
1,302,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,545 >>> mbox cmd response: failed
1,302,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,551 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,857 UART: [state] LifecycleState = Unprovisioned
85,512 UART: [state] DebugLocked = No
86,116 UART: [state] WD Timer not started. Device not locked for debugging
87,333 UART: [kat] SHA2-256
890,883 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,987 UART: [kat] ++
895,139 UART: [kat] sha1
899,341 UART: [kat] SHA2-256
901,281 UART: [kat] SHA2-384
904,152 UART: [kat] SHA2-512-ACC
906,053 UART: [kat] ECC-384
915,816 UART: [kat] HMAC-384Kdf
920,456 UART: [kat] LMS
1,168,768 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,105 UART: [fht] FHT @ 0x50003400
1,172,837 UART: [idev] ++
1,173,005 UART: [idev] CDI.KEYID = 6
1,173,366 UART: [idev] SUBJECT.KEYID = 7
1,173,791 UART: [idev] UDS.KEYID = 0
1,174,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,804 UART: [idev] Erasing UDS.KEYID = 0
1,199,378 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,129 UART: [ldev] ++
1,209,297 UART: [ldev] CDI.KEYID = 6
1,209,661 UART: [ldev] SUBJECT.KEYID = 5
1,210,088 UART: [ldev] AUTHORITY.KEYID = 7
1,210,551 UART: [ldev] FE.KEYID = 1
1,215,655 UART: [ldev] Erasing FE.KEYID = 1
1,241,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,553 UART: [ldev] --
1,280,976 UART: [fwproc] Wait for Commands...
1,281,581 UART: [fwproc] Recv command 0x46574c44
1,282,314 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,305 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,480 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,775 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,522 >>> mbox cmd response: failed
1,160,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,528 >>> mbox cmd response: failed
1,160,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,534 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,268 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,780 UART: [state] LifecycleState = Unprovisioned
85,435 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,270 UART: [kat] SHA2-256
892,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,045 UART: [kat] ++
897,197 UART: [kat] sha1
901,477 UART: [kat] SHA2-256
903,417 UART: [kat] SHA2-384
905,940 UART: [kat] SHA2-512-ACC
907,841 UART: [kat] ECC-384
917,664 UART: [kat] HMAC-384Kdf
922,306 UART: [kat] LMS
1,170,634 UART: [kat] --
1,171,387 UART: [cold-reset] ++
1,171,787 UART: [fht] FHT @ 0x50003400
1,174,338 UART: [idev] ++
1,174,506 UART: [idev] CDI.KEYID = 6
1,174,866 UART: [idev] SUBJECT.KEYID = 7
1,175,290 UART: [idev] UDS.KEYID = 0
1,175,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,068 UART: [idev] Erasing UDS.KEYID = 0
1,200,269 UART: [idev] Sha1 KeyId Algorithm
1,208,819 UART: [idev] --
1,209,765 UART: [ldev] ++
1,209,933 UART: [ldev] CDI.KEYID = 6
1,210,296 UART: [ldev] SUBJECT.KEYID = 5
1,210,722 UART: [ldev] AUTHORITY.KEYID = 7
1,211,185 UART: [ldev] FE.KEYID = 1
1,216,439 UART: [ldev] Erasing FE.KEYID = 1
1,242,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,417 UART: [ldev] --
1,281,776 UART: [fwproc] Wait for Commands...
1,282,520 UART: [fwproc] Recv command 0x46574c44
1,283,248 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,206 UART: ROM Fatal Error: 0x000B0001
1,303,363 >>> mbox cmd response: failed
1,303,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,369 >>> mbox cmd response: failed
1,303,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
893,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,257 UART: [kat] ++
897,409 UART: [kat] sha1
901,591 UART: [kat] SHA2-256
903,531 UART: [kat] SHA2-384
906,192 UART: [kat] SHA2-512-ACC
908,093 UART: [kat] ECC-384
917,940 UART: [kat] HMAC-384Kdf
922,582 UART: [kat] LMS
1,170,910 UART: [kat] --
1,171,825 UART: [cold-reset] ++
1,172,357 UART: [fht] FHT @ 0x50003400
1,175,082 UART: [idev] ++
1,175,250 UART: [idev] CDI.KEYID = 6
1,175,610 UART: [idev] SUBJECT.KEYID = 7
1,176,034 UART: [idev] UDS.KEYID = 0
1,176,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,852 UART: [idev] Erasing UDS.KEYID = 0
1,200,909 UART: [idev] Sha1 KeyId Algorithm
1,209,427 UART: [idev] --
1,210,387 UART: [ldev] ++
1,210,555 UART: [ldev] CDI.KEYID = 6
1,210,918 UART: [ldev] SUBJECT.KEYID = 5
1,211,344 UART: [ldev] AUTHORITY.KEYID = 7
1,211,807 UART: [ldev] FE.KEYID = 1
1,216,919 UART: [ldev] Erasing FE.KEYID = 1
1,243,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,181 UART: [ldev] --
1,283,690 UART: [fwproc] Wait for Commands...
1,284,378 UART: [fwproc] Recv command 0x46574c44
1,285,106 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,967 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,137 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,286 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,234 >>> mbox cmd response: failed
1,159,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,240 >>> mbox cmd response: failed
1,159,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,187 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
87,034 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
893,865 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,990 UART: [kat] ++
898,142 UART: [kat] sha1
902,392 UART: [kat] SHA2-256
904,332 UART: [kat] SHA2-384
906,933 UART: [kat] SHA2-512-ACC
908,834 UART: [kat] ECC-384
918,767 UART: [kat] HMAC-384Kdf
923,409 UART: [kat] LMS
1,171,737 UART: [kat] --
1,172,722 UART: [cold-reset] ++
1,173,138 UART: [fht] FHT @ 0x50003400
1,175,907 UART: [idev] ++
1,176,075 UART: [idev] CDI.KEYID = 6
1,176,435 UART: [idev] SUBJECT.KEYID = 7
1,176,859 UART: [idev] UDS.KEYID = 0
1,177,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,601 UART: [idev] Erasing UDS.KEYID = 0
1,202,168 UART: [idev] Sha1 KeyId Algorithm
1,210,832 UART: [idev] --
1,211,892 UART: [ldev] ++
1,212,060 UART: [ldev] CDI.KEYID = 6
1,212,423 UART: [ldev] SUBJECT.KEYID = 5
1,212,849 UART: [ldev] AUTHORITY.KEYID = 7
1,213,312 UART: [ldev] FE.KEYID = 1
1,218,598 UART: [ldev] Erasing FE.KEYID = 1
1,244,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,948 UART: [ldev] --
1,284,277 UART: [fwproc] Wait for Commands...
1,285,005 UART: [fwproc] Recv command 0x46574c44
1,285,733 UART: [fwproc] Recv'd Img size: 118548 bytes
1,305,445 UART: ROM Fatal Error: 0x000B0001
1,306,602 >>> mbox cmd response: failed
1,306,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,608 >>> mbox cmd response: failed
1,306,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,275 UART: [kat] SHA2-256
893,925 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,050 UART: [kat] ++
898,202 UART: [kat] sha1
902,350 UART: [kat] SHA2-256
904,290 UART: [kat] SHA2-384
907,177 UART: [kat] SHA2-512-ACC
909,078 UART: [kat] ECC-384
918,851 UART: [kat] HMAC-384Kdf
923,419 UART: [kat] LMS
1,171,747 UART: [kat] --
1,172,622 UART: [cold-reset] ++
1,172,982 UART: [fht] FHT @ 0x50003400
1,175,753 UART: [idev] ++
1,175,921 UART: [idev] CDI.KEYID = 6
1,176,281 UART: [idev] SUBJECT.KEYID = 7
1,176,705 UART: [idev] UDS.KEYID = 0
1,177,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,033 UART: [idev] Erasing UDS.KEYID = 0
1,202,782 UART: [idev] Sha1 KeyId Algorithm
1,211,318 UART: [idev] --
1,212,414 UART: [ldev] ++
1,212,582 UART: [ldev] CDI.KEYID = 6
1,212,945 UART: [ldev] SUBJECT.KEYID = 5
1,213,371 UART: [ldev] AUTHORITY.KEYID = 7
1,213,834 UART: [ldev] FE.KEYID = 1
1,219,122 UART: [ldev] Erasing FE.KEYID = 1
1,245,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,656 UART: [ldev] --
1,283,967 UART: [fwproc] Wait for Commands...
1,284,741 UART: [fwproc] Recv command 0x46574c44
1,285,469 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,446 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,616 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,837 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,181 >>> mbox cmd response: failed
1,158,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,187 >>> mbox cmd response: failed
1,158,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,090 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,370 UART:
192,731 UART: Running Caliptra ROM ...
193,918 UART:
194,071 UART: [state] CFI Enabled
264,203 UART: [state] LifecycleState = Unprovisioned
266,190 UART: [state] DebugLocked = No
267,848 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,788 UART: [kat] SHA2-256
442,487 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,971 UART: [kat] ++
453,415 UART: [kat] sha1
464,726 UART: [kat] SHA2-256
467,407 UART: [kat] SHA2-384
474,895 UART: [kat] SHA2-512-ACC
477,298 UART: [kat] ECC-384
2,766,197 UART: [kat] HMAC-384Kdf
2,779,067 UART: [kat] LMS
3,969,326 UART: [kat] --
3,972,843 UART: [cold-reset] ++
3,974,839 UART: [fht] Storing FHT @ 0x50003400
3,986,492 UART: [idev] ++
3,987,056 UART: [idev] CDI.KEYID = 6
3,987,973 UART: [idev] SUBJECT.KEYID = 7
3,989,246 UART: [idev] UDS.KEYID = 0
3,992,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,837 UART: [idev] Erasing UDS.KEYID = 0
7,326,099 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,965 UART: [idev] --
7,350,803 UART: [ldev] ++
7,351,385 UART: [ldev] CDI.KEYID = 6
7,352,358 UART: [ldev] SUBJECT.KEYID = 5
7,353,576 UART: [ldev] AUTHORITY.KEYID = 7
7,354,818 UART: [ldev] FE.KEYID = 1
7,403,176 UART: [ldev] Erasing FE.KEYID = 1
10,732,062 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,228 UART: [ldev] --
13,097,170 UART: [fwproc] Waiting for Commands...
13,099,126 UART: [fwproc] Received command 0x46574c44
13,101,326 UART: [fwproc] Received Image of size 118548 bytes
13,158,638 UART: ROM Fatal Error: 0x000B0002
13,162,170 >>> mbox cmd response: failed
13,162,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,162,953 >>> mbox cmd response: failed
13,163,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,163,526 >>> mbox cmd response: failed
Initializing fuses
2,057,425 writing to cptra_bootfsm_go
2,246,762 UART:
2,247,101 UART: Running Caliptra ROM ...
2,248,227 UART:
2,248,385 UART: [state] CFI Enabled
2,308,128 UART: [state] LifecycleState = Unprovisioned
2,310,142 UART: [state] DebugLocked = No
2,311,869 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,537 UART: [kat] SHA2-256
2,487,221 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,497,751 UART: [kat] ++
2,498,299 UART: [kat] sha1
2,509,471 UART: [kat] SHA2-256
2,512,168 UART: [kat] SHA2-384
2,517,518 UART: [kat] SHA2-512-ACC
2,519,915 UART: [kat] ECC-384
4,812,671 UART: [kat] HMAC-384Kdf
4,823,752 UART: [kat] LMS
6,014,033 UART: [kat] --
6,019,158 UART: [cold-reset] ++
6,021,594 UART: [fht] Storing FHT @ 0x50003400
6,033,620 UART: [idev] ++
6,034,191 UART: [idev] CDI.KEYID = 6
6,035,278 UART: [idev] SUBJECT.KEYID = 7
6,036,406 UART: [idev] UDS.KEYID = 0
6,038,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,187,966 UART: [idev] Erasing UDS.KEYID = 0
9,369,937 UART: [idev] Using Sha1 for KeyId Algorithm
9,392,512 UART: [idev] --
9,396,023 UART: [ldev] ++
9,396,641 UART: [ldev] CDI.KEYID = 6
9,397,532 UART: [ldev] SUBJECT.KEYID = 5
9,398,812 UART: [ldev] AUTHORITY.KEYID = 7
9,400,054 UART: [ldev] FE.KEYID = 1
9,445,688 UART: [ldev] Erasing FE.KEYID = 1
12,780,365 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,106,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,121,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,155,350 UART: [ldev] --
15,160,432 UART: [fwproc] Waiting for Commands...
15,162,435 UART: [fwproc] Received command 0x46574c44
15,164,628 UART: [fwproc] Received Image of size 118548 bytes
19,269,908 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,345,436 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,418,617 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,747,111 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,787,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,892,956 >>> mbox cmd response: failed
12,893,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,893,943 >>> mbox cmd response: failed
12,894,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,894,538 >>> mbox cmd response: failed
Initializing fuses
2,046,397 writing to cptra_bootfsm_go
5,820,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,978,968 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,546 UART:
192,900 UART: Running Caliptra ROM ...
194,039 UART:
603,820 UART: [state] CFI Enabled
616,113 UART: [state] LifecycleState = Unprovisioned
618,048 UART: [state] DebugLocked = No
621,061 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,525 UART: [kat] SHA2-256
795,251 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,832 UART: [kat] ++
806,386 UART: [kat] sha1
817,221 UART: [kat] SHA2-256
819,972 UART: [kat] SHA2-384
825,197 UART: [kat] SHA2-512-ACC
827,539 UART: [kat] ECC-384
3,112,979 UART: [kat] HMAC-384Kdf
3,124,578 UART: [kat] LMS
4,314,645 UART: [kat] --
4,319,748 UART: [cold-reset] ++
4,321,695 UART: [fht] Storing FHT @ 0x50003400
4,333,237 UART: [idev] ++
4,333,816 UART: [idev] CDI.KEYID = 6
4,334,793 UART: [idev] SUBJECT.KEYID = 7
4,336,016 UART: [idev] UDS.KEYID = 0
4,338,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,056 UART: [idev] Erasing UDS.KEYID = 0
7,624,200 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,582 UART: [idev] --
7,648,931 UART: [ldev] ++
7,649,519 UART: [ldev] CDI.KEYID = 6
7,650,496 UART: [ldev] SUBJECT.KEYID = 5
7,651,717 UART: [ldev] AUTHORITY.KEYID = 7
7,652,957 UART: [ldev] FE.KEYID = 1
7,663,316 UART: [ldev] Erasing FE.KEYID = 1
10,949,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,064 UART: [ldev] --
13,311,447 UART: [fwproc] Waiting for Commands...
13,314,635 UART: [fwproc] Received command 0x46574c44
13,316,848 UART: [fwproc] Received Image of size 118548 bytes
13,373,075 UART: ROM Fatal Error: 0x000B0002
13,376,542 >>> mbox cmd response: failed
13,376,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,377,291 >>> mbox cmd response: failed
13,377,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,377,857 >>> mbox cmd response: failed
Initializing fuses
2,056,660 writing to cptra_bootfsm_go
2,245,970 UART:
2,246,309 UART: Running Caliptra ROM ...
2,247,458 UART:
7,090,873 UART: [state] CFI Enabled
7,103,143 UART: [state] LifecycleState = Unprovisioned
7,105,079 UART: [state] DebugLocked = No
7,106,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,111,982 UART: [kat] SHA2-256
7,281,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,292,281 UART: [kat] ++
7,292,753 UART: [kat] sha1
7,303,271 UART: [kat] SHA2-256
7,306,018 UART: [kat] SHA2-384
7,310,447 UART: [kat] SHA2-512-ACC
7,312,802 UART: [kat] ECC-384
9,596,021 UART: [kat] HMAC-384Kdf
9,608,743 UART: [kat] LMS
10,798,865 UART: [kat] --
10,803,182 UART: [cold-reset] ++
10,805,655 UART: [fht] Storing FHT @ 0x50003400
10,817,592 UART: [idev] ++
10,818,226 UART: [idev] CDI.KEYID = 6
10,819,139 UART: [idev] SUBJECT.KEYID = 7
10,820,363 UART: [idev] UDS.KEYID = 0
10,823,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,972,178 UART: [idev] Erasing UDS.KEYID = 0
14,107,415 UART: [idev] Using Sha1 for KeyId Algorithm
14,128,259 UART: [idev] --
14,133,492 UART: [ldev] ++
14,134,067 UART: [ldev] CDI.KEYID = 6
14,135,039 UART: [ldev] SUBJECT.KEYID = 5
14,136,256 UART: [ldev] AUTHORITY.KEYID = 7
14,137,499 UART: [ldev] FE.KEYID = 1
14,147,722 UART: [ldev] Erasing FE.KEYID = 1
17,437,823 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,731,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,745,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,760,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,775,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,793,310 UART: [ldev] --
19,797,680 UART: [fwproc] Waiting for Commands...
19,799,467 UART: [fwproc] Received command 0x46574c44
19,801,671 UART: [fwproc] Received Image of size 118548 bytes
23,907,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,980,858 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,054,046 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,383,054 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
4,128,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,114,957 >>> mbox cmd response: failed
13,115,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,115,914 >>> mbox cmd response: failed
13,116,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,116,483 >>> mbox cmd response: failed
Initializing fuses
2,051,410 writing to cptra_bootfsm_go
10,881,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,908,236 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
192,385 UART:
192,744 UART: Running Caliptra ROM ...
193,926 UART:
194,084 UART: [state] CFI Enabled
263,236 UART: [state] LifecycleState = Unprovisioned
265,163 UART: [state] DebugLocked = No
266,877 UART: [state] WD Timer not started. Device not locked for debugging
270,447 UART: [kat] SHA2-256
450,096 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,854 UART: [kat] ++
461,337 UART: [kat] sha1
473,045 UART: [kat] SHA2-256
475,746 UART: [kat] SHA2-384
482,141 UART: [kat] SHA2-512-ACC
484,545 UART: [kat] ECC-384
2,947,678 UART: [kat] HMAC-384Kdf
2,970,464 UART: [kat] LMS
3,446,956 UART: [kat] --
3,452,529 UART: [cold-reset] ++
3,454,422 UART: [fht] FHT @ 0x50003400
3,465,998 UART: [idev] ++
3,466,569 UART: [idev] CDI.KEYID = 6
3,467,508 UART: [idev] SUBJECT.KEYID = 7
3,468,722 UART: [idev] UDS.KEYID = 0
3,471,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,155 UART: [idev] Erasing UDS.KEYID = 0
5,986,642 UART: [idev] Sha1 KeyId Algorithm
6,009,391 UART: [idev] --
6,014,581 UART: [ldev] ++
6,015,181 UART: [ldev] CDI.KEYID = 6
6,016,155 UART: [ldev] SUBJECT.KEYID = 5
6,017,266 UART: [ldev] AUTHORITY.KEYID = 7
6,018,562 UART: [ldev] FE.KEYID = 1
6,057,414 UART: [ldev] Erasing FE.KEYID = 1
8,563,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,376 UART: [ldev] --
10,374,484 UART: [fwproc] Wait for Commands...
10,376,967 UART: [fwproc] Recv command 0x46574c44
10,378,957 UART: [fwproc] Recv'd Img size: 118548 bytes
10,448,072 UART: ROM Fatal Error: 0x000B0002
10,451,324 >>> mbox cmd response: failed
10,451,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,452,089 >>> mbox cmd response: failed
10,452,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,452,665 >>> mbox cmd response: failed
Initializing fuses
2,061,214 writing to cptra_bootfsm_go
2,250,524 UART:
2,250,868 UART: Running Caliptra ROM ...
2,251,920 UART:
2,252,076 UART: [state] CFI Enabled
2,311,722 UART: [state] LifecycleState = Unprovisioned
2,313,672 UART: [state] DebugLocked = No
2,316,266 UART: [state] WD Timer not started. Device not locked for debugging
2,320,418 UART: [kat] SHA2-256
2,500,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,510,864 UART: [kat] ++
2,511,334 UART: [kat] sha1
2,520,985 UART: [kat] SHA2-256
2,523,685 UART: [kat] SHA2-384
2,528,445 UART: [kat] SHA2-512-ACC
2,530,799 UART: [kat] ECC-384
4,994,194 UART: [kat] HMAC-384Kdf
5,016,710 UART: [kat] LMS
5,493,205 UART: [kat] --
5,498,439 UART: [cold-reset] ++
5,499,467 UART: [fht] FHT @ 0x50003400
5,510,453 UART: [idev] ++
5,511,026 UART: [idev] CDI.KEYID = 6
5,512,055 UART: [idev] SUBJECT.KEYID = 7
5,513,245 UART: [idev] UDS.KEYID = 0
5,515,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,665,141 UART: [idev] Erasing UDS.KEYID = 0
8,031,882 UART: [idev] Sha1 KeyId Algorithm
8,056,151 UART: [idev] --
8,060,051 UART: [ldev] ++
8,060,693 UART: [ldev] CDI.KEYID = 6
8,061,587 UART: [ldev] SUBJECT.KEYID = 5
8,062,814 UART: [ldev] AUTHORITY.KEYID = 7
8,064,054 UART: [ldev] FE.KEYID = 1
8,103,020 UART: [ldev] Erasing FE.KEYID = 1
10,610,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,346,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,362,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,377,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,393,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,414,900 UART: [ldev] --
12,420,113 UART: [fwproc] Wait for Commands...
12,422,014 UART: [fwproc] Recv command 0x46574c44
12,424,015 UART: [fwproc] Recv'd Img size: 118548 bytes
15,904,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,983,667 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,056,729 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,384,258 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
3,464,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,298,246 >>> mbox cmd response: failed
10,298,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,299,337 >>> mbox cmd response: failed
10,299,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,299,911 >>> mbox cmd response: failed
Initializing fuses
2,054,323 writing to cptra_bootfsm_go
5,512,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,295,881 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
192,740 UART:
193,099 UART: Running Caliptra ROM ...
194,192 UART:
603,959 UART: [state] CFI Enabled
620,934 UART: [state] LifecycleState = Unprovisioned
622,845 UART: [state] DebugLocked = No
625,794 UART: [state] WD Timer not started. Device not locked for debugging
629,476 UART: [kat] SHA2-256
808,997 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,787 UART: [kat] ++
820,242 UART: [kat] sha1
831,449 UART: [kat] SHA2-256
834,141 UART: [kat] SHA2-384
839,368 UART: [kat] SHA2-512-ACC
841,769 UART: [kat] ECC-384
3,282,147 UART: [kat] HMAC-384Kdf
3,295,139 UART: [kat] LMS
3,771,655 UART: [kat] --
3,777,378 UART: [cold-reset] ++
3,779,206 UART: [fht] FHT @ 0x50003400
3,789,871 UART: [idev] ++
3,790,447 UART: [idev] CDI.KEYID = 6
3,791,473 UART: [idev] SUBJECT.KEYID = 7
3,792,662 UART: [idev] UDS.KEYID = 0
3,795,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,592 UART: [idev] Erasing UDS.KEYID = 0
6,271,012 UART: [idev] Sha1 KeyId Algorithm
6,293,711 UART: [idev] --
6,299,712 UART: [ldev] ++
6,300,289 UART: [ldev] CDI.KEYID = 6
6,301,205 UART: [ldev] SUBJECT.KEYID = 5
6,302,425 UART: [ldev] AUTHORITY.KEYID = 7
6,303,663 UART: [ldev] FE.KEYID = 1
6,313,943 UART: [ldev] Erasing FE.KEYID = 1
8,795,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,018 UART: [ldev] --
10,587,457 UART: [fwproc] Wait for Commands...
10,589,564 UART: [fwproc] Recv command 0x46574c44
10,591,609 UART: [fwproc] Recv'd Img size: 118548 bytes
10,664,724 UART: ROM Fatal Error: 0x000B0002
10,667,975 >>> mbox cmd response: failed
10,668,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,668,732 >>> mbox cmd response: failed
10,669,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,669,248 >>> mbox cmd response: failed
Initializing fuses
2,055,236 writing to cptra_bootfsm_go
2,244,548 UART:
2,244,922 UART: Running Caliptra ROM ...
2,245,973 UART:
9,792,377 UART: [state] CFI Enabled
9,806,323 UART: [state] LifecycleState = Unprovisioned
9,808,264 UART: [state] DebugLocked = No
9,810,395 UART: [state] WD Timer not started. Device not locked for debugging
9,814,091 UART: [kat] SHA2-256
9,993,777 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,004,532 UART: [kat] ++
10,005,004 UART: [kat] sha1
10,014,799 UART: [kat] SHA2-256
10,017,496 UART: [kat] SHA2-384
10,022,849 UART: [kat] SHA2-512-ACC
10,025,206 UART: [kat] ECC-384
12,466,375 UART: [kat] HMAC-384Kdf
12,479,851 UART: [kat] LMS
12,956,352 UART: [kat] --
12,962,847 UART: [cold-reset] ++
12,964,729 UART: [fht] FHT @ 0x50003400
12,976,625 UART: [idev] ++
12,977,199 UART: [idev] CDI.KEYID = 6
12,978,163 UART: [idev] SUBJECT.KEYID = 7
12,979,377 UART: [idev] UDS.KEYID = 0
12,982,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,131,205 UART: [idev] Erasing UDS.KEYID = 0
15,462,306 UART: [idev] Sha1 KeyId Algorithm
15,484,776 UART: [idev] --
15,489,393 UART: [ldev] ++
15,489,973 UART: [ldev] CDI.KEYID = 6
15,490,879 UART: [ldev] SUBJECT.KEYID = 5
15,492,101 UART: [ldev] AUTHORITY.KEYID = 7
15,493,389 UART: [ldev] FE.KEYID = 1
15,503,896 UART: [ldev] Erasing FE.KEYID = 1
17,985,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,705,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,721,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,737,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,753,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,775,159 UART: [ldev] --
19,780,058 UART: [fwproc] Wait for Commands...
19,782,325 UART: [fwproc] Recv command 0x46574c44
19,784,314 UART: [fwproc] Recv'd Img size: 118548 bytes
23,266,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,340,420 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,413,469 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,742,178 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,778,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,540,873 >>> mbox cmd response: failed
10,541,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,541,793 >>> mbox cmd response: failed
10,542,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,542,408 >>> mbox cmd response: failed
Initializing fuses
2,064,816 writing to cptra_bootfsm_go
13,105,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,760,846 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,256 UART:
192,605 UART: Running Caliptra ROM ...
193,793 UART:
193,951 UART: [state] CFI Enabled
262,452 UART: [state] LifecycleState = Unprovisioned
264,875 UART: [state] DebugLocked = No
267,239 UART: [state] WD Timer not started. Device not locked for debugging
272,404 UART: [kat] SHA2-256
462,266 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,054 UART: [kat] ++
473,545 UART: [kat] sha1
485,620 UART: [kat] SHA2-256
488,640 UART: [kat] SHA2-384
494,518 UART: [kat] SHA2-512-ACC
497,135 UART: [kat] ECC-384
2,943,969 UART: [kat] HMAC-384Kdf
2,969,944 UART: [kat] LMS
3,501,717 UART: [kat] --
3,505,202 UART: [cold-reset] ++
3,507,587 UART: [fht] FHT @ 0x50003400
3,519,134 UART: [idev] ++
3,519,817 UART: [idev] CDI.KEYID = 6
3,520,805 UART: [idev] SUBJECT.KEYID = 7
3,521,908 UART: [idev] UDS.KEYID = 0
3,524,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,270 UART: [idev] Erasing UDS.KEYID = 0
6,028,908 UART: [idev] Sha1 KeyId Algorithm
6,051,606 UART: [idev] --
6,056,701 UART: [ldev] ++
6,057,400 UART: [ldev] CDI.KEYID = 6
6,058,294 UART: [ldev] SUBJECT.KEYID = 5
6,059,517 UART: [ldev] AUTHORITY.KEYID = 7
6,060,702 UART: [ldev] FE.KEYID = 1
6,099,030 UART: [ldev] Erasing FE.KEYID = 1
8,602,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,823 UART: [ldev] --
10,412,857 UART: [fwproc] Wait for Commands...
10,415,232 UART: [fwproc] Recv command 0x46574c44
10,417,550 UART: [fwproc] Recv'd Img size: 118548 bytes
10,501,190 UART: ROM Fatal Error: 0x000B0002
10,504,873 >>> mbox cmd response: failed
10,505,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,505,624 >>> mbox cmd response: failed
10,505,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,506,193 >>> mbox cmd response: failed
Initializing fuses
2,054,874 writing to cptra_bootfsm_go
2,244,197 UART:
2,244,542 UART: Running Caliptra ROM ...
2,245,681 UART:
2,245,856 UART: [state] CFI Enabled
2,323,096 UART: [state] LifecycleState = Unprovisioned
2,325,480 UART: [state] DebugLocked = No
2,326,874 UART: [state] WD Timer not started. Device not locked for debugging
2,331,615 UART: [kat] SHA2-256
2,521,473 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,229 UART: [kat] ++
2,532,745 UART: [kat] sha1
2,543,482 UART: [kat] SHA2-256
2,546,507 UART: [kat] SHA2-384
2,553,911 UART: [kat] SHA2-512-ACC
2,556,506 UART: [kat] ECC-384
5,004,193 UART: [kat] HMAC-384Kdf
5,028,424 UART: [kat] LMS
5,560,173 UART: [kat] --
5,566,180 UART: [cold-reset] ++
5,568,074 UART: [fht] FHT @ 0x50003400
5,581,385 UART: [idev] ++
5,582,071 UART: [idev] CDI.KEYID = 6
5,582,986 UART: [idev] SUBJECT.KEYID = 7
5,584,207 UART: [idev] UDS.KEYID = 0
5,586,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,735,737 UART: [idev] Erasing UDS.KEYID = 0
8,103,964 UART: [idev] Sha1 KeyId Algorithm
8,125,541 UART: [idev] --
8,131,238 UART: [ldev] ++
8,131,948 UART: [ldev] CDI.KEYID = 6
8,132,910 UART: [ldev] SUBJECT.KEYID = 5
8,133,945 UART: [ldev] AUTHORITY.KEYID = 7
8,135,239 UART: [ldev] FE.KEYID = 1
8,180,741 UART: [ldev] Erasing FE.KEYID = 1
10,689,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,419,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,435,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,450,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,465,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,487,461 UART: [ldev] --
12,493,114 UART: [fwproc] Wait for Commands...
12,495,324 UART: [fwproc] Recv command 0x46574c44
12,497,591 UART: [fwproc] Recv'd Img size: 118548 bytes
15,993,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,071,044 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,194,667 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,755,035 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,439,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,303,247 >>> mbox cmd response: failed
10,303,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,304,138 >>> mbox cmd response: failed
10,304,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,304,736 >>> mbox cmd response: failed
Initializing fuses
2,049,661 writing to cptra_bootfsm_go
5,487,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,874,422 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,688 UART:
193,057 UART: Running Caliptra ROM ...
194,261 UART:
603,685 UART: [state] CFI Enabled
617,941 UART: [state] LifecycleState = Unprovisioned
620,337 UART: [state] DebugLocked = No
621,720 UART: [state] WD Timer not started. Device not locked for debugging
627,081 UART: [kat] SHA2-256
816,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,799 UART: [kat] ++
828,392 UART: [kat] sha1
838,849 UART: [kat] SHA2-256
841,848 UART: [kat] SHA2-384
848,489 UART: [kat] SHA2-512-ACC
851,110 UART: [kat] ECC-384
3,292,138 UART: [kat] HMAC-384Kdf
3,305,356 UART: [kat] LMS
3,837,161 UART: [kat] --
3,841,909 UART: [cold-reset] ++
3,843,476 UART: [fht] FHT @ 0x50003400
3,854,684 UART: [idev] ++
3,855,366 UART: [idev] CDI.KEYID = 6
3,856,387 UART: [idev] SUBJECT.KEYID = 7
3,857,551 UART: [idev] UDS.KEYID = 0
3,860,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,729 UART: [idev] Erasing UDS.KEYID = 0
6,336,800 UART: [idev] Sha1 KeyId Algorithm
6,359,288 UART: [idev] --
6,364,885 UART: [ldev] ++
6,365,582 UART: [ldev] CDI.KEYID = 6
6,366,497 UART: [ldev] SUBJECT.KEYID = 5
6,367,663 UART: [ldev] AUTHORITY.KEYID = 7
6,368,900 UART: [ldev] FE.KEYID = 1
6,379,495 UART: [ldev] Erasing FE.KEYID = 1
8,860,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,129 UART: [ldev] --
10,651,294 UART: [fwproc] Wait for Commands...
10,653,833 UART: [fwproc] Recv command 0x46574c44
10,656,157 UART: [fwproc] Recv'd Img size: 118548 bytes
10,740,196 UART: ROM Fatal Error: 0x000B0002
10,743,888 >>> mbox cmd response: failed
10,744,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,744,687 >>> mbox cmd response: failed
10,744,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,745,261 >>> mbox cmd response: failed
Initializing fuses
2,054,594 writing to cptra_bootfsm_go
2,243,911 UART:
2,244,257 UART: Running Caliptra ROM ...
2,245,399 UART:
9,714,094 UART: [state] CFI Enabled
9,732,049 UART: [state] LifecycleState = Unprovisioned
9,734,420 UART: [state] DebugLocked = No
9,736,059 UART: [state] WD Timer not started. Device not locked for debugging
9,740,536 UART: [kat] SHA2-256
9,930,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,941,211 UART: [kat] ++
9,941,737 UART: [kat] sha1
9,953,354 UART: [kat] SHA2-256
9,956,390 UART: [kat] SHA2-384
9,962,337 UART: [kat] SHA2-512-ACC
9,964,914 UART: [kat] ECC-384
12,405,296 UART: [kat] HMAC-384Kdf
12,419,793 UART: [kat] LMS
12,951,626 UART: [kat] --
12,958,481 UART: [cold-reset] ++
12,960,367 UART: [fht] FHT @ 0x50003400
12,973,084 UART: [idev] ++
12,973,849 UART: [idev] CDI.KEYID = 6
12,974,772 UART: [idev] SUBJECT.KEYID = 7
12,975,938 UART: [idev] UDS.KEYID = 0
12,978,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,127,170 UART: [idev] Erasing UDS.KEYID = 0
15,452,355 UART: [idev] Sha1 KeyId Algorithm
15,475,420 UART: [idev] --
15,480,502 UART: [ldev] ++
15,481,188 UART: [ldev] CDI.KEYID = 6
15,482,094 UART: [ldev] SUBJECT.KEYID = 5
15,483,258 UART: [ldev] AUTHORITY.KEYID = 7
15,484,496 UART: [ldev] FE.KEYID = 1
15,496,549 UART: [ldev] Erasing FE.KEYID = 1
17,979,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,696,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,711,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,726,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,741,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,761,663 UART: [ldev] --
19,767,417 UART: [fwproc] Wait for Commands...
19,769,889 UART: [fwproc] Recv command 0x46574c44
19,772,166 UART: [fwproc] Recv'd Img size: 118548 bytes
23,273,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,352,633 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,476,280 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,036,861 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,755,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,529,774 >>> mbox cmd response: failed
10,530,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,530,693 >>> mbox cmd response: failed
10,530,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,531,287 >>> mbox cmd response: failed
Initializing fuses
2,049,532 writing to cptra_bootfsm_go
13,088,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,377,251 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,287 UART: [kat] SHA2-256
882,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,333 UART: [kat] ++
886,485 UART: [kat] sha1
890,763 UART: [kat] SHA2-256
892,701 UART: [kat] SHA2-384
895,598 UART: [kat] SHA2-512-ACC
897,499 UART: [kat] ECC-384
903,330 UART: [kat] HMAC-384Kdf
907,958 UART: [kat] LMS
1,476,154 UART: [kat] --
1,476,947 UART: [cold-reset] ++
1,477,375 UART: [fht] Storing FHT @ 0x50003400
1,480,316 UART: [idev] ++
1,480,484 UART: [idev] CDI.KEYID = 6
1,480,844 UART: [idev] SUBJECT.KEYID = 7
1,481,268 UART: [idev] UDS.KEYID = 0
1,481,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,322 UART: [idev] Erasing UDS.KEYID = 0
1,505,886 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,440 UART: [idev] --
1,515,617 UART: [ldev] ++
1,515,785 UART: [ldev] CDI.KEYID = 6
1,516,148 UART: [ldev] SUBJECT.KEYID = 5
1,516,574 UART: [ldev] AUTHORITY.KEYID = 7
1,517,037 UART: [ldev] FE.KEYID = 1
1,522,371 UART: [ldev] Erasing FE.KEYID = 1
1,547,442 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,164 UART: [ldev] --
1,586,485 UART: [fwproc] Waiting for Commands...
1,587,250 UART: [fwproc] Received command 0x46574c44
1,588,041 UART: [fwproc] Received Image of size 118548 bytes
1,607,296 UART: ROM Fatal Error: 0x000B0002
1,608,453 >>> mbox cmd response: failed
1,608,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,459 >>> mbox cmd response: failed
1,608,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,465 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,705 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,367 UART: [kat] SHA2-256
882,298 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,413 UART: [kat] ++
886,565 UART: [kat] sha1
890,975 UART: [kat] SHA2-256
892,913 UART: [kat] SHA2-384
895,598 UART: [kat] SHA2-512-ACC
897,499 UART: [kat] ECC-384
903,316 UART: [kat] HMAC-384Kdf
908,026 UART: [kat] LMS
1,476,222 UART: [kat] --
1,476,793 UART: [cold-reset] ++
1,477,157 UART: [fht] Storing FHT @ 0x50003400
1,479,938 UART: [idev] ++
1,480,106 UART: [idev] CDI.KEYID = 6
1,480,466 UART: [idev] SUBJECT.KEYID = 7
1,480,890 UART: [idev] UDS.KEYID = 0
1,481,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,900 UART: [idev] Erasing UDS.KEYID = 0
1,505,290 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,844 UART: [idev] --
1,515,031 UART: [ldev] ++
1,515,199 UART: [ldev] CDI.KEYID = 6
1,515,562 UART: [ldev] SUBJECT.KEYID = 5
1,515,988 UART: [ldev] AUTHORITY.KEYID = 7
1,516,451 UART: [ldev] FE.KEYID = 1
1,521,435 UART: [ldev] Erasing FE.KEYID = 1
1,547,186 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,286 UART: [ldev] --
1,586,589 UART: [fwproc] Waiting for Commands...
1,587,446 UART: [fwproc] Received command 0x46574c44
1,588,237 UART: [fwproc] Received Image of size 118548 bytes
2,932,606 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,530 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,748 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,111 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,460,608 >>> mbox cmd response: failed
1,460,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,614 >>> mbox cmd response: failed
1,460,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,223 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,420 UART: [kat] SHA2-256
882,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,466 UART: [kat] ++
886,618 UART: [kat] sha1
890,858 UART: [kat] SHA2-256
892,796 UART: [kat] SHA2-384
895,511 UART: [kat] SHA2-512-ACC
897,412 UART: [kat] ECC-384
903,089 UART: [kat] HMAC-384Kdf
907,503 UART: [kat] LMS
1,475,699 UART: [kat] --
1,476,528 UART: [cold-reset] ++
1,476,990 UART: [fht] Storing FHT @ 0x50003400
1,479,913 UART: [idev] ++
1,480,081 UART: [idev] CDI.KEYID = 6
1,480,441 UART: [idev] SUBJECT.KEYID = 7
1,480,865 UART: [idev] UDS.KEYID = 0
1,481,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,979 UART: [idev] Erasing UDS.KEYID = 0
1,505,977 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,625 UART: [idev] --
1,515,726 UART: [ldev] ++
1,515,894 UART: [ldev] CDI.KEYID = 6
1,516,257 UART: [ldev] SUBJECT.KEYID = 5
1,516,683 UART: [ldev] AUTHORITY.KEYID = 7
1,517,146 UART: [ldev] FE.KEYID = 1
1,522,578 UART: [ldev] Erasing FE.KEYID = 1
1,548,031 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,189 UART: [ldev] --
1,587,578 UART: [fwproc] Waiting for Commands...
1,588,351 UART: [fwproc] Received command 0x46574c44
1,589,142 UART: [fwproc] Received Image of size 118548 bytes
1,608,199 UART: ROM Fatal Error: 0x000B0002
1,609,356 >>> mbox cmd response: failed
1,609,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,362 >>> mbox cmd response: failed
1,609,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,368 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,106 UART: [kat] SHA2-256
882,037 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,152 UART: [kat] ++
886,304 UART: [kat] sha1
890,616 UART: [kat] SHA2-256
892,554 UART: [kat] SHA2-384
895,337 UART: [kat] SHA2-512-ACC
897,238 UART: [kat] ECC-384
902,751 UART: [kat] HMAC-384Kdf
907,335 UART: [kat] LMS
1,475,531 UART: [kat] --
1,476,482 UART: [cold-reset] ++
1,476,816 UART: [fht] Storing FHT @ 0x50003400
1,479,573 UART: [idev] ++
1,479,741 UART: [idev] CDI.KEYID = 6
1,480,101 UART: [idev] SUBJECT.KEYID = 7
1,480,525 UART: [idev] UDS.KEYID = 0
1,480,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,747 UART: [idev] Erasing UDS.KEYID = 0
1,505,571 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,967 UART: [idev] --
1,514,848 UART: [ldev] ++
1,515,016 UART: [ldev] CDI.KEYID = 6
1,515,379 UART: [ldev] SUBJECT.KEYID = 5
1,515,805 UART: [ldev] AUTHORITY.KEYID = 7
1,516,268 UART: [ldev] FE.KEYID = 1
1,521,506 UART: [ldev] Erasing FE.KEYID = 1
1,547,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,799 UART: [ldev] --
1,587,122 UART: [fwproc] Waiting for Commands...
1,587,771 UART: [fwproc] Received command 0x46574c44
1,588,562 UART: [fwproc] Received Image of size 118548 bytes
2,933,145 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,897 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,115 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,484 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,460,039 >>> mbox cmd response: failed
1,460,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,045 >>> mbox cmd response: failed
1,460,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,051 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,904 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,302 UART: [kat] ++
895,454 UART: [kat] sha1
899,696 UART: [kat] SHA2-256
901,636 UART: [kat] SHA2-384
904,591 UART: [kat] SHA2-512-ACC
906,492 UART: [kat] ECC-384
915,723 UART: [kat] HMAC-384Kdf
920,309 UART: [kat] LMS
1,168,621 UART: [kat] --
1,169,614 UART: [cold-reset] ++
1,170,048 UART: [fht] FHT @ 0x50003400
1,172,738 UART: [idev] ++
1,172,906 UART: [idev] CDI.KEYID = 6
1,173,267 UART: [idev] SUBJECT.KEYID = 7
1,173,692 UART: [idev] UDS.KEYID = 0
1,174,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,198,823 UART: [idev] Sha1 KeyId Algorithm
1,207,923 UART: [idev] --
1,208,856 UART: [ldev] ++
1,209,024 UART: [ldev] CDI.KEYID = 6
1,209,388 UART: [ldev] SUBJECT.KEYID = 5
1,209,815 UART: [ldev] AUTHORITY.KEYID = 7
1,210,278 UART: [ldev] FE.KEYID = 1
1,215,296 UART: [ldev] Erasing FE.KEYID = 1
1,242,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,350 UART: [ldev] --
1,281,773 UART: [fwproc] Wait for Commands...
1,282,432 UART: [fwproc] Recv command 0x46574c44
1,283,165 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,042 UART: ROM Fatal Error: 0x000B0002
1,303,199 >>> mbox cmd response: failed
1,303,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,205 >>> mbox cmd response: failed
1,303,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,670 UART: [kat] SHA2-256
901,610 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
916,037 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,169,930 UART: [cold-reset] ++
1,170,398 UART: [fht] FHT @ 0x50003400
1,172,918 UART: [idev] ++
1,173,086 UART: [idev] CDI.KEYID = 6
1,173,447 UART: [idev] SUBJECT.KEYID = 7
1,173,872 UART: [idev] UDS.KEYID = 0
1,174,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,861 UART: [idev] Erasing UDS.KEYID = 0
1,198,757 UART: [idev] Sha1 KeyId Algorithm
1,207,433 UART: [idev] --
1,208,460 UART: [ldev] ++
1,208,628 UART: [ldev] CDI.KEYID = 6
1,208,992 UART: [ldev] SUBJECT.KEYID = 5
1,209,419 UART: [ldev] AUTHORITY.KEYID = 7
1,209,882 UART: [ldev] FE.KEYID = 1
1,215,128 UART: [ldev] Erasing FE.KEYID = 1
1,241,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,636 UART: [ldev] --
1,280,975 UART: [fwproc] Wait for Commands...
1,281,682 UART: [fwproc] Recv command 0x46574c44
1,282,415 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,406 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,581 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,752 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,014 >>> mbox cmd response: failed
1,158,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,020 >>> mbox cmd response: failed
1,158,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,026 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,835 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,861 UART: [state] LifecycleState = Unprovisioned
86,516 UART: [state] DebugLocked = No
87,216 UART: [state] WD Timer not started. Device not locked for debugging
88,511 UART: [kat] SHA2-256
892,061 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,165 UART: [kat] ++
896,317 UART: [kat] sha1
900,619 UART: [kat] SHA2-256
902,559 UART: [kat] SHA2-384
905,310 UART: [kat] SHA2-512-ACC
907,211 UART: [kat] ECC-384
916,780 UART: [kat] HMAC-384Kdf
921,460 UART: [kat] LMS
1,169,772 UART: [kat] --
1,170,885 UART: [cold-reset] ++
1,171,337 UART: [fht] FHT @ 0x50003400
1,173,925 UART: [idev] ++
1,174,093 UART: [idev] CDI.KEYID = 6
1,174,454 UART: [idev] SUBJECT.KEYID = 7
1,174,879 UART: [idev] UDS.KEYID = 0
1,175,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,608 UART: [idev] Erasing UDS.KEYID = 0
1,199,322 UART: [idev] Sha1 KeyId Algorithm
1,208,260 UART: [idev] --
1,209,337 UART: [ldev] ++
1,209,505 UART: [ldev] CDI.KEYID = 6
1,209,869 UART: [ldev] SUBJECT.KEYID = 5
1,210,296 UART: [ldev] AUTHORITY.KEYID = 7
1,210,759 UART: [ldev] FE.KEYID = 1
1,216,117 UART: [ldev] Erasing FE.KEYID = 1
1,242,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,553 UART: [ldev] --
1,281,850 UART: [fwproc] Wait for Commands...
1,282,427 UART: [fwproc] Recv command 0x46574c44
1,283,160 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,129 UART: ROM Fatal Error: 0x000B0002
1,303,286 >>> mbox cmd response: failed
1,303,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,292 >>> mbox cmd response: failed
1,303,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,298 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,967 UART: [state] LifecycleState = Unprovisioned
86,622 UART: [state] DebugLocked = No
87,140 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
891,813 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,917 UART: [kat] ++
896,069 UART: [kat] sha1
900,417 UART: [kat] SHA2-256
902,357 UART: [kat] SHA2-384
905,162 UART: [kat] SHA2-512-ACC
907,063 UART: [kat] ECC-384
916,586 UART: [kat] HMAC-384Kdf
921,140 UART: [kat] LMS
1,169,452 UART: [kat] --
1,170,497 UART: [cold-reset] ++
1,170,913 UART: [fht] FHT @ 0x50003400
1,173,547 UART: [idev] ++
1,173,715 UART: [idev] CDI.KEYID = 6
1,174,076 UART: [idev] SUBJECT.KEYID = 7
1,174,501 UART: [idev] UDS.KEYID = 0
1,174,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,842 UART: [idev] Erasing UDS.KEYID = 0
1,199,712 UART: [idev] Sha1 KeyId Algorithm
1,208,668 UART: [idev] --
1,209,693 UART: [ldev] ++
1,209,861 UART: [ldev] CDI.KEYID = 6
1,210,225 UART: [ldev] SUBJECT.KEYID = 5
1,210,652 UART: [ldev] AUTHORITY.KEYID = 7
1,211,115 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,242,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,351 UART: [ldev] --
1,281,562 UART: [fwproc] Wait for Commands...
1,282,155 UART: [fwproc] Recv command 0x46574c44
1,282,888 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,903 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,078 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,259 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,881 >>> mbox cmd response: failed
1,158,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,887 >>> mbox cmd response: failed
1,158,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,272 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
893,240 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,365 UART: [kat] ++
897,517 UART: [kat] sha1
901,851 UART: [kat] SHA2-256
903,791 UART: [kat] SHA2-384
906,518 UART: [kat] SHA2-512-ACC
908,419 UART: [kat] ECC-384
918,378 UART: [kat] HMAC-384Kdf
922,962 UART: [kat] LMS
1,171,290 UART: [kat] --
1,172,359 UART: [cold-reset] ++
1,172,691 UART: [fht] FHT @ 0x50003400
1,175,352 UART: [idev] ++
1,175,520 UART: [idev] CDI.KEYID = 6
1,175,880 UART: [idev] SUBJECT.KEYID = 7
1,176,304 UART: [idev] UDS.KEYID = 0
1,176,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,352 UART: [idev] Erasing UDS.KEYID = 0
1,201,261 UART: [idev] Sha1 KeyId Algorithm
1,209,875 UART: [idev] --
1,210,749 UART: [ldev] ++
1,210,917 UART: [ldev] CDI.KEYID = 6
1,211,280 UART: [ldev] SUBJECT.KEYID = 5
1,211,706 UART: [ldev] AUTHORITY.KEYID = 7
1,212,169 UART: [ldev] FE.KEYID = 1
1,217,445 UART: [ldev] Erasing FE.KEYID = 1
1,244,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,209 UART: [ldev] --
1,283,572 UART: [fwproc] Wait for Commands...
1,284,212 UART: [fwproc] Recv command 0x46574c44
1,284,940 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,859 UART: ROM Fatal Error: 0x000B0002
1,306,016 >>> mbox cmd response: failed
1,306,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,022 >>> mbox cmd response: failed
1,306,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
893,234 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,359 UART: [kat] ++
897,511 UART: [kat] sha1
901,653 UART: [kat] SHA2-256
903,593 UART: [kat] SHA2-384
906,380 UART: [kat] SHA2-512-ACC
908,281 UART: [kat] ECC-384
917,628 UART: [kat] HMAC-384Kdf
922,354 UART: [kat] LMS
1,170,682 UART: [kat] --
1,171,725 UART: [cold-reset] ++
1,172,179 UART: [fht] FHT @ 0x50003400
1,174,870 UART: [idev] ++
1,175,038 UART: [idev] CDI.KEYID = 6
1,175,398 UART: [idev] SUBJECT.KEYID = 7
1,175,822 UART: [idev] UDS.KEYID = 0
1,176,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,648 UART: [idev] Erasing UDS.KEYID = 0
1,200,443 UART: [idev] Sha1 KeyId Algorithm
1,208,899 UART: [idev] --
1,209,925 UART: [ldev] ++
1,210,093 UART: [ldev] CDI.KEYID = 6
1,210,456 UART: [ldev] SUBJECT.KEYID = 5
1,210,882 UART: [ldev] AUTHORITY.KEYID = 7
1,211,345 UART: [ldev] FE.KEYID = 1
1,216,625 UART: [ldev] Erasing FE.KEYID = 1
1,242,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,883 UART: [ldev] --
1,282,282 UART: [fwproc] Wait for Commands...
1,283,024 UART: [fwproc] Recv command 0x46574c44
1,283,752 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,017 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,187 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,436 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,515 >>> mbox cmd response: failed
1,159,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,521 >>> mbox cmd response: failed
1,159,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,527 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,373 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
893,597 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,722 UART: [kat] ++
897,874 UART: [kat] sha1
902,080 UART: [kat] SHA2-256
904,020 UART: [kat] SHA2-384
906,921 UART: [kat] SHA2-512-ACC
908,822 UART: [kat] ECC-384
918,691 UART: [kat] HMAC-384Kdf
923,159 UART: [kat] LMS
1,171,487 UART: [kat] --
1,172,498 UART: [cold-reset] ++
1,173,076 UART: [fht] FHT @ 0x50003400
1,175,733 UART: [idev] ++
1,175,901 UART: [idev] CDI.KEYID = 6
1,176,261 UART: [idev] SUBJECT.KEYID = 7
1,176,685 UART: [idev] UDS.KEYID = 0
1,177,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,485 UART: [idev] Erasing UDS.KEYID = 0
1,201,314 UART: [idev] Sha1 KeyId Algorithm
1,209,678 UART: [idev] --
1,210,626 UART: [ldev] ++
1,210,794 UART: [ldev] CDI.KEYID = 6
1,211,157 UART: [ldev] SUBJECT.KEYID = 5
1,211,583 UART: [ldev] AUTHORITY.KEYID = 7
1,212,046 UART: [ldev] FE.KEYID = 1
1,217,122 UART: [ldev] Erasing FE.KEYID = 1
1,243,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,290 UART: [ldev] --
1,282,793 UART: [fwproc] Wait for Commands...
1,283,469 UART: [fwproc] Recv command 0x46574c44
1,284,197 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,378 UART: ROM Fatal Error: 0x000B0002
1,304,535 >>> mbox cmd response: failed
1,304,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,541 >>> mbox cmd response: failed
1,304,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
893,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,456 UART: [kat] ++
897,608 UART: [kat] sha1
901,902 UART: [kat] SHA2-256
903,842 UART: [kat] SHA2-384
906,459 UART: [kat] SHA2-512-ACC
908,360 UART: [kat] ECC-384
918,183 UART: [kat] HMAC-384Kdf
922,859 UART: [kat] LMS
1,171,187 UART: [kat] --
1,172,098 UART: [cold-reset] ++
1,172,480 UART: [fht] FHT @ 0x50003400
1,174,905 UART: [idev] ++
1,175,073 UART: [idev] CDI.KEYID = 6
1,175,433 UART: [idev] SUBJECT.KEYID = 7
1,175,857 UART: [idev] UDS.KEYID = 0
1,176,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,947 UART: [idev] Erasing UDS.KEYID = 0
1,201,458 UART: [idev] Sha1 KeyId Algorithm
1,209,778 UART: [idev] --
1,210,848 UART: [ldev] ++
1,211,016 UART: [ldev] CDI.KEYID = 6
1,211,379 UART: [ldev] SUBJECT.KEYID = 5
1,211,805 UART: [ldev] AUTHORITY.KEYID = 7
1,212,268 UART: [ldev] FE.KEYID = 1
1,217,660 UART: [ldev] Erasing FE.KEYID = 1
1,244,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,532 UART: [ldev] --
1,283,989 UART: [fwproc] Wait for Commands...
1,284,791 UART: [fwproc] Recv command 0x46574c44
1,285,519 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,712 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,882 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,089 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,630 >>> mbox cmd response: failed
1,159,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,636 >>> mbox cmd response: failed
1,159,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,642 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,132 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,189 UART:
192,556 UART: Running Caliptra ROM ...
193,652 UART:
193,795 UART: [state] CFI Enabled
261,741 UART: [state] LifecycleState = Unprovisioned
263,670 UART: [state] DebugLocked = No
265,130 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,555 UART: [kat] SHA2-256
440,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,754 UART: [kat] ++
451,293 UART: [kat] sha1
461,803 UART: [kat] SHA2-256
464,482 UART: [kat] SHA2-384
471,163 UART: [kat] SHA2-512-ACC
473,511 UART: [kat] ECC-384
2,766,369 UART: [kat] HMAC-384Kdf
2,777,477 UART: [kat] LMS
3,967,800 UART: [kat] --
3,971,007 UART: [cold-reset] ++
3,972,843 UART: [fht] Storing FHT @ 0x50003400
3,983,248 UART: [idev] ++
3,983,870 UART: [idev] CDI.KEYID = 6
3,984,778 UART: [idev] SUBJECT.KEYID = 7
3,986,050 UART: [idev] UDS.KEYID = 0
3,989,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,289 UART: [idev] Erasing UDS.KEYID = 0
7,325,269 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,995 UART: [idev] --
7,349,972 UART: [ldev] ++
7,350,545 UART: [ldev] CDI.KEYID = 6
7,351,463 UART: [ldev] SUBJECT.KEYID = 5
7,352,678 UART: [ldev] AUTHORITY.KEYID = 7
7,353,974 UART: [ldev] FE.KEYID = 1
7,380,120 UART: [ldev] Erasing FE.KEYID = 1
10,714,945 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,008,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,023,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,037,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,052,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,071,401 UART: [ldev] --
13,075,834 UART: [fwproc] Waiting for Commands...
13,077,639 UART: [fwproc] Received command 0x46574c44
13,079,838 UART: [fwproc] Received Image of size 118548 bytes
14,473,666 UART: ROM Fatal Error: 0x000B0019
14,477,117 >>> mbox cmd response: failed
14,477,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,477,950 >>> mbox cmd response: failed
14,478,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,478,521 >>> mbox cmd response: failed
Initializing fuses
2,055,072 writing to cptra_bootfsm_go
2,244,385 UART:
2,244,719 UART: Running Caliptra ROM ...
2,245,853 UART:
2,246,041 UART: [state] CFI Enabled
2,320,824 UART: [state] LifecycleState = Unprovisioned
2,322,760 UART: [state] DebugLocked = No
2,324,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,913 UART: [kat] SHA2-256
2,498,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,509,115 UART: [kat] ++
2,509,577 UART: [kat] sha1
2,521,711 UART: [kat] SHA2-256
2,524,408 UART: [kat] SHA2-384
2,529,806 UART: [kat] SHA2-512-ACC
2,532,161 UART: [kat] ECC-384
4,823,671 UART: [kat] HMAC-384Kdf
4,856,324 UART: [kat] LMS
6,046,605 UART: [kat] --
6,050,203 UART: [cold-reset] ++
6,052,388 UART: [fht] Storing FHT @ 0x50003400
6,062,638 UART: [idev] ++
6,063,216 UART: [idev] CDI.KEYID = 6
6,064,188 UART: [idev] SUBJECT.KEYID = 7
6,065,408 UART: [idev] UDS.KEYID = 0
6,067,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,217,130 UART: [idev] Erasing UDS.KEYID = 0
9,403,003 UART: [idev] Using Sha1 for KeyId Algorithm
9,424,659 UART: [idev] --
9,427,739 UART: [ldev] ++
9,428,308 UART: [ldev] CDI.KEYID = 6
9,429,276 UART: [ldev] SUBJECT.KEYID = 5
9,430,476 UART: [ldev] AUTHORITY.KEYID = 7
9,431,710 UART: [ldev] FE.KEYID = 1
9,478,729 UART: [ldev] Erasing FE.KEYID = 1
12,812,359 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,112,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,127,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,142,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,156,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,176,047 UART: [ldev] --
15,181,365 UART: [fwproc] Waiting for Commands...
15,183,424 UART: [fwproc] Received command 0x46574c44
15,185,615 UART: [fwproc] Received Image of size 118548 bytes
19,292,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,375,211 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,448,403 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,777,631 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,786,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,260,015 >>> mbox cmd response: failed
14,260,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,260,993 >>> mbox cmd response: failed
14,261,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,261,516 >>> mbox cmd response: failed
Initializing fuses
2,049,393 writing to cptra_bootfsm_go
5,840,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,016,497 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,484 UART:
192,859 UART: Running Caliptra ROM ...
194,048 UART:
603,515 UART: [state] CFI Enabled
615,956 UART: [state] LifecycleState = Unprovisioned
617,858 UART: [state] DebugLocked = No
619,893 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,515 UART: [kat] SHA2-256
794,258 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,773 UART: [kat] ++
805,305 UART: [kat] sha1
816,456 UART: [kat] SHA2-256
819,154 UART: [kat] SHA2-384
825,413 UART: [kat] SHA2-512-ACC
827,757 UART: [kat] ECC-384
3,111,595 UART: [kat] HMAC-384Kdf
3,122,595 UART: [kat] LMS
4,312,724 UART: [kat] --
4,318,412 UART: [cold-reset] ++
4,319,299 UART: [fht] Storing FHT @ 0x50003400
4,331,275 UART: [idev] ++
4,331,880 UART: [idev] CDI.KEYID = 6
4,332,802 UART: [idev] SUBJECT.KEYID = 7
4,334,025 UART: [idev] UDS.KEYID = 0
4,336,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,980 UART: [idev] Erasing UDS.KEYID = 0
7,624,184 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,651 UART: [idev] --
7,650,539 UART: [ldev] ++
7,651,117 UART: [ldev] CDI.KEYID = 6
7,652,087 UART: [ldev] SUBJECT.KEYID = 5
7,653,255 UART: [ldev] AUTHORITY.KEYID = 7
7,654,556 UART: [ldev] FE.KEYID = 1
7,666,722 UART: [ldev] Erasing FE.KEYID = 1
10,955,841 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,034 UART: [ldev] --
13,319,046 UART: [fwproc] Waiting for Commands...
13,322,349 UART: [fwproc] Received command 0x46574c44
13,324,544 UART: [fwproc] Received Image of size 118548 bytes
14,722,062 UART: ROM Fatal Error: 0x000B0019
14,725,533 >>> mbox cmd response: failed
14,726,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,726,364 >>> mbox cmd response: failed
14,726,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,726,934 >>> mbox cmd response: failed
Initializing fuses
2,056,863 writing to cptra_bootfsm_go
2,246,171 UART:
2,246,534 UART: Running Caliptra ROM ...
2,247,591 UART:
5,739,868 UART: [state] CFI Enabled
5,754,052 UART: [state] LifecycleState = Unprovisioned
5,755,976 UART: [state] DebugLocked = No
5,757,522 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,761,758 UART: [kat] SHA2-256
5,931,538 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,942,062 UART: [kat] ++
5,942,529 UART: [kat] sha1
5,954,231 UART: [kat] SHA2-256
5,956,940 UART: [kat] SHA2-384
5,962,374 UART: [kat] SHA2-512-ACC
5,964,741 UART: [kat] ECC-384
8,249,221 UART: [kat] HMAC-384Kdf
8,261,615 UART: [kat] LMS
9,451,715 UART: [kat] --
9,455,219 UART: [cold-reset] ++
9,457,590 UART: [fht] Storing FHT @ 0x50003400
9,469,403 UART: [idev] ++
9,469,987 UART: [idev] CDI.KEYID = 6
9,470,963 UART: [idev] SUBJECT.KEYID = 7
9,472,216 UART: [idev] UDS.KEYID = 0
9,475,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,624,017 UART: [idev] Erasing UDS.KEYID = 0
12,764,386 UART: [idev] Using Sha1 for KeyId Algorithm
12,786,974 UART: [idev] --
12,791,083 UART: [ldev] ++
12,791,680 UART: [ldev] CDI.KEYID = 6
12,792,600 UART: [ldev] SUBJECT.KEYID = 5
12,793,876 UART: [ldev] AUTHORITY.KEYID = 7
12,795,062 UART: [ldev] FE.KEYID = 1
12,805,618 UART: [ldev] Erasing FE.KEYID = 1
16,093,109 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,387,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,401,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,416,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,431,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,450,309 UART: [ldev] --
18,454,819 UART: [fwproc] Waiting for Commands...
18,458,164 UART: [fwproc] Received command 0x46574c44
18,460,410 UART: [fwproc] Received Image of size 118548 bytes
22,569,144 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,644,385 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,717,577 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,046,058 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
4,123,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,989 >>> mbox cmd response: failed
14,457,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,458,051 >>> mbox cmd response: failed
14,458,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,458,688 >>> mbox cmd response: failed
Initializing fuses
2,050,266 writing to cptra_bootfsm_go
9,536,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,576,306 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,205 UART:
192,563 UART: Running Caliptra ROM ...
193,752 UART:
193,908 UART: [state] CFI Enabled
264,856 UART: [state] LifecycleState = Unprovisioned
266,809 UART: [state] DebugLocked = No
268,147 UART: [state] WD Timer not started. Device not locked for debugging
271,563 UART: [kat] SHA2-256
451,188 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,991 UART: [kat] ++
462,532 UART: [kat] sha1
473,908 UART: [kat] SHA2-256
476,600 UART: [kat] SHA2-384
481,178 UART: [kat] SHA2-512-ACC
483,578 UART: [kat] ECC-384
2,950,263 UART: [kat] HMAC-384Kdf
2,972,304 UART: [kat] LMS
3,448,807 UART: [kat] --
3,453,942 UART: [cold-reset] ++
3,455,449 UART: [fht] FHT @ 0x50003400
3,465,841 UART: [idev] ++
3,466,418 UART: [idev] CDI.KEYID = 6
3,467,400 UART: [idev] SUBJECT.KEYID = 7
3,468,626 UART: [idev] UDS.KEYID = 0
3,471,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,910 UART: [idev] Erasing UDS.KEYID = 0
5,987,469 UART: [idev] Sha1 KeyId Algorithm
6,012,195 UART: [idev] --
6,016,640 UART: [ldev] ++
6,017,220 UART: [ldev] CDI.KEYID = 6
6,018,114 UART: [ldev] SUBJECT.KEYID = 5
6,019,387 UART: [ldev] AUTHORITY.KEYID = 7
6,020,650 UART: [ldev] FE.KEYID = 1
6,057,510 UART: [ldev] Erasing FE.KEYID = 1
8,564,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,225 UART: [ldev] --
10,375,621 UART: [fwproc] Wait for Commands...
10,378,047 UART: [fwproc] Recv command 0x46574c44
10,380,045 UART: [fwproc] Recv'd Img size: 118548 bytes
11,465,203 UART: ROM Fatal Error: 0x000B0019
11,468,473 >>> mbox cmd response: failed
11,468,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,469,158 >>> mbox cmd response: failed
11,469,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,469,755 >>> mbox cmd response: failed
Initializing fuses
2,058,004 writing to cptra_bootfsm_go
2,247,342 UART:
2,247,686 UART: Running Caliptra ROM ...
2,249,030 UART:
2,249,217 UART: [state] CFI Enabled
2,319,618 UART: [state] LifecycleState = Unprovisioned
2,321,581 UART: [state] DebugLocked = No
2,324,430 UART: [state] WD Timer not started. Device not locked for debugging
2,328,933 UART: [kat] SHA2-256
2,508,596 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,519,378 UART: [kat] ++
2,519,951 UART: [kat] sha1
2,531,847 UART: [kat] SHA2-256
2,534,555 UART: [kat] SHA2-384
2,539,796 UART: [kat] SHA2-512-ACC
2,542,155 UART: [kat] ECC-384
5,001,577 UART: [kat] HMAC-384Kdf
5,025,653 UART: [kat] LMS
5,502,165 UART: [kat] --
5,506,109 UART: [cold-reset] ++
5,508,320 UART: [fht] FHT @ 0x50003400
5,519,305 UART: [idev] ++
5,519,885 UART: [idev] CDI.KEYID = 6
5,520,805 UART: [idev] SUBJECT.KEYID = 7
5,522,082 UART: [idev] UDS.KEYID = 0
5,524,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,674,008 UART: [idev] Erasing UDS.KEYID = 0
8,042,922 UART: [idev] Sha1 KeyId Algorithm
8,067,030 UART: [idev] --
8,071,640 UART: [ldev] ++
8,072,223 UART: [ldev] CDI.KEYID = 6
8,073,141 UART: [ldev] SUBJECT.KEYID = 5
8,074,367 UART: [ldev] AUTHORITY.KEYID = 7
8,075,610 UART: [ldev] FE.KEYID = 1
8,111,831 UART: [ldev] Erasing FE.KEYID = 1
10,615,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,354,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,370,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,385,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,401,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,423,381 UART: [ldev] --
12,428,777 UART: [fwproc] Wait for Commands...
12,430,724 UART: [fwproc] Recv command 0x46574c44
12,432,738 UART: [fwproc] Recv'd Img size: 118548 bytes
15,918,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,996,880 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,069,899 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,397,360 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,464,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,377,368 >>> mbox cmd response: failed
11,378,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,378,472 >>> mbox cmd response: failed
11,378,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,379,039 >>> mbox cmd response: failed
Initializing fuses
2,059,193 writing to cptra_bootfsm_go
5,523,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,283,393 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
192,717 UART:
193,076 UART: Running Caliptra ROM ...
194,287 UART:
604,075 UART: [state] CFI Enabled
618,599 UART: [state] LifecycleState = Unprovisioned
620,534 UART: [state] DebugLocked = No
621,758 UART: [state] WD Timer not started. Device not locked for debugging
625,292 UART: [kat] SHA2-256
804,987 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,747 UART: [kat] ++
816,245 UART: [kat] sha1
827,400 UART: [kat] SHA2-256
830,147 UART: [kat] SHA2-384
835,427 UART: [kat] SHA2-512-ACC
837,794 UART: [kat] ECC-384
3,280,338 UART: [kat] HMAC-384Kdf
3,293,285 UART: [kat] LMS
3,769,822 UART: [kat] --
3,775,111 UART: [cold-reset] ++
3,777,155 UART: [fht] FHT @ 0x50003400
3,787,867 UART: [idev] ++
3,788,445 UART: [idev] CDI.KEYID = 6
3,789,418 UART: [idev] SUBJECT.KEYID = 7
3,790,641 UART: [idev] UDS.KEYID = 0
3,793,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,944 UART: [idev] Erasing UDS.KEYID = 0
6,264,932 UART: [idev] Sha1 KeyId Algorithm
6,288,329 UART: [idev] --
6,293,087 UART: [ldev] ++
6,293,662 UART: [ldev] CDI.KEYID = 6
6,294,599 UART: [ldev] SUBJECT.KEYID = 5
6,295,768 UART: [ldev] AUTHORITY.KEYID = 7
6,297,114 UART: [ldev] FE.KEYID = 1
6,307,587 UART: [ldev] Erasing FE.KEYID = 1
8,786,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,869 UART: [ldev] --
10,580,729 UART: [fwproc] Wait for Commands...
10,583,269 UART: [fwproc] Recv command 0x46574c44
10,585,263 UART: [fwproc] Recv'd Img size: 118548 bytes
11,673,884 UART: ROM Fatal Error: 0x000B0019
11,677,087 >>> mbox cmd response: failed
11,677,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,677,793 >>> mbox cmd response: failed
11,678,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,678,370 >>> mbox cmd response: failed
Initializing fuses
2,059,776 writing to cptra_bootfsm_go
2,249,060 UART:
2,249,409 UART: Running Caliptra ROM ...
2,250,514 UART:
8,774,235 UART: [state] CFI Enabled
8,790,388 UART: [state] LifecycleState = Unprovisioned
8,792,330 UART: [state] DebugLocked = No
8,794,544 UART: [state] WD Timer not started. Device not locked for debugging
8,799,108 UART: [kat] SHA2-256
8,978,748 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,989,571 UART: [kat] ++
8,990,041 UART: [kat] sha1
9,002,664 UART: [kat] SHA2-256
9,005,367 UART: [kat] SHA2-384
9,012,180 UART: [kat] SHA2-512-ACC
9,014,548 UART: [kat] ECC-384
11,453,216 UART: [kat] HMAC-384Kdf
11,464,637 UART: [kat] LMS
11,941,126 UART: [kat] --
11,944,734 UART: [cold-reset] ++
11,945,703 UART: [fht] FHT @ 0x50003400
11,957,223 UART: [idev] ++
11,957,793 UART: [idev] CDI.KEYID = 6
11,958,812 UART: [idev] SUBJECT.KEYID = 7
11,959,973 UART: [idev] UDS.KEYID = 0
11,962,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,111,839 UART: [idev] Erasing UDS.KEYID = 0
14,432,782 UART: [idev] Sha1 KeyId Algorithm
14,456,284 UART: [idev] --
14,461,411 UART: [ldev] ++
14,462,026 UART: [ldev] CDI.KEYID = 6
14,463,100 UART: [ldev] SUBJECT.KEYID = 5
14,464,155 UART: [ldev] AUTHORITY.KEYID = 7
14,465,393 UART: [ldev] FE.KEYID = 1
14,475,531 UART: [ldev] Erasing FE.KEYID = 1
16,953,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,669,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,685,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,701,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,716,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,739,242 UART: [ldev] --
18,743,886 UART: [fwproc] Wait for Commands...
18,745,883 UART: [fwproc] Recv command 0x46574c44
18,747,875 UART: [fwproc] Recv'd Img size: 118548 bytes
22,233,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,312,237 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,385,265 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,713,092 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
3,784,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,554,518 >>> mbox cmd response: failed
11,555,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,555,871 >>> mbox cmd response: failed
11,556,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,556,440 >>> mbox cmd response: failed
Initializing fuses
2,059,102 writing to cptra_bootfsm_go
12,089,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,761,536 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,180 UART:
192,550 UART: Running Caliptra ROM ...
193,736 UART:
193,894 UART: [state] CFI Enabled
261,854 UART: [state] LifecycleState = Unprovisioned
264,243 UART: [state] DebugLocked = No
267,146 UART: [state] WD Timer not started. Device not locked for debugging
271,273 UART: [kat] SHA2-256
461,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,905 UART: [kat] ++
472,404 UART: [kat] sha1
483,802 UART: [kat] SHA2-256
486,825 UART: [kat] SHA2-384
493,565 UART: [kat] SHA2-512-ACC
496,194 UART: [kat] ECC-384
2,945,454 UART: [kat] HMAC-384Kdf
2,972,524 UART: [kat] LMS
3,504,252 UART: [kat] --
3,508,051 UART: [cold-reset] ++
3,510,595 UART: [fht] FHT @ 0x50003400
3,521,477 UART: [idev] ++
3,522,180 UART: [idev] CDI.KEYID = 6
3,523,066 UART: [idev] SUBJECT.KEYID = 7
3,524,290 UART: [idev] UDS.KEYID = 0
3,527,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,526 UART: [idev] Erasing UDS.KEYID = 0
6,027,941 UART: [idev] Sha1 KeyId Algorithm
6,050,651 UART: [idev] --
6,054,795 UART: [ldev] ++
6,055,493 UART: [ldev] CDI.KEYID = 6
6,056,386 UART: [ldev] SUBJECT.KEYID = 5
6,057,613 UART: [ldev] AUTHORITY.KEYID = 7
6,058,746 UART: [ldev] FE.KEYID = 1
6,101,961 UART: [ldev] Erasing FE.KEYID = 1
8,608,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,063 UART: [ldev] --
10,415,154 UART: [fwproc] Wait for Commands...
10,418,122 UART: [fwproc] Recv command 0x46574c44
10,420,438 UART: [fwproc] Recv'd Img size: 118548 bytes
11,517,763 UART: ROM Fatal Error: 0x000B0019
11,521,468 >>> mbox cmd response: failed
11,521,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,522,348 >>> mbox cmd response: failed
11,522,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,522,939 >>> mbox cmd response: failed
Initializing fuses
2,060,379 writing to cptra_bootfsm_go
2,249,713 UART:
2,250,065 UART: Running Caliptra ROM ...
2,251,205 UART:
2,251,376 UART: [state] CFI Enabled
2,310,598 UART: [state] LifecycleState = Unprovisioned
2,313,038 UART: [state] DebugLocked = No
2,314,337 UART: [state] WD Timer not started. Device not locked for debugging
2,318,104 UART: [kat] SHA2-256
2,507,774 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,517 UART: [kat] ++
2,519,017 UART: [kat] sha1
2,529,423 UART: [kat] SHA2-256
2,532,491 UART: [kat] SHA2-384
2,538,767 UART: [kat] SHA2-512-ACC
2,541,359 UART: [kat] ECC-384
4,993,915 UART: [kat] HMAC-384Kdf
5,018,426 UART: [kat] LMS
5,550,230 UART: [kat] --
5,556,493 UART: [cold-reset] ++
5,558,823 UART: [fht] FHT @ 0x50003400
5,570,408 UART: [idev] ++
5,571,131 UART: [idev] CDI.KEYID = 6
5,572,023 UART: [idev] SUBJECT.KEYID = 7
5,573,250 UART: [idev] UDS.KEYID = 0
5,575,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,724,761 UART: [idev] Erasing UDS.KEYID = 0
8,072,162 UART: [idev] Sha1 KeyId Algorithm
8,095,139 UART: [idev] --
8,100,548 UART: [ldev] ++
8,101,235 UART: [ldev] CDI.KEYID = 6
8,102,151 UART: [ldev] SUBJECT.KEYID = 5
8,103,337 UART: [ldev] AUTHORITY.KEYID = 7
8,104,577 UART: [ldev] FE.KEYID = 1
8,147,212 UART: [ldev] Erasing FE.KEYID = 1
10,656,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,403,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,755 UART: [ldev] --
12,459,340 UART: [fwproc] Wait for Commands...
12,462,313 UART: [fwproc] Recv command 0x46574c44
12,464,635 UART: [fwproc] Recv'd Img size: 118548 bytes
15,964,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,045,499 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,169,119 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,729,690 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,442,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,324,491 >>> mbox cmd response: failed
11,325,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,325,790 >>> mbox cmd response: failed
11,326,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,326,363 >>> mbox cmd response: failed
Initializing fuses
2,054,659 writing to cptra_bootfsm_go
5,488,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,864,677 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,397 UART:
192,772 UART: Running Caliptra ROM ...
193,868 UART:
603,607 UART: [state] CFI Enabled
615,548 UART: [state] LifecycleState = Unprovisioned
617,930 UART: [state] DebugLocked = No
620,415 UART: [state] WD Timer not started. Device not locked for debugging
624,275 UART: [kat] SHA2-256
814,191 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,979 UART: [kat] ++
825,434 UART: [kat] sha1
836,591 UART: [kat] SHA2-256
839,607 UART: [kat] SHA2-384
845,597 UART: [kat] SHA2-512-ACC
848,168 UART: [kat] ECC-384
3,289,839 UART: [kat] HMAC-384Kdf
3,302,402 UART: [kat] LMS
3,834,204 UART: [kat] --
3,839,059 UART: [cold-reset] ++
3,840,945 UART: [fht] FHT @ 0x50003400
3,853,824 UART: [idev] ++
3,854,545 UART: [idev] CDI.KEYID = 6
3,855,580 UART: [idev] SUBJECT.KEYID = 7
3,856,689 UART: [idev] UDS.KEYID = 0
3,859,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,436 UART: [idev] Erasing UDS.KEYID = 0
6,332,244 UART: [idev] Sha1 KeyId Algorithm
6,353,579 UART: [idev] --
6,359,737 UART: [ldev] ++
6,360,423 UART: [ldev] CDI.KEYID = 6
6,361,372 UART: [ldev] SUBJECT.KEYID = 5
6,362,555 UART: [ldev] AUTHORITY.KEYID = 7
6,363,735 UART: [ldev] FE.KEYID = 1
6,376,253 UART: [ldev] Erasing FE.KEYID = 1
8,853,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,576 UART: [ldev] --
10,646,176 UART: [fwproc] Wait for Commands...
10,648,819 UART: [fwproc] Recv command 0x46574c44
10,651,087 UART: [fwproc] Recv'd Img size: 118548 bytes
11,748,270 UART: ROM Fatal Error: 0x000B0019
11,751,940 >>> mbox cmd response: failed
11,752,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,752,725 >>> mbox cmd response: failed
11,753,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,753,323 >>> mbox cmd response: failed
Initializing fuses
2,058,506 writing to cptra_bootfsm_go
2,247,810 UART:
2,248,155 UART: Running Caliptra ROM ...
2,249,295 UART:
8,695,934 UART: [state] CFI Enabled
8,709,389 UART: [state] LifecycleState = Unprovisioned
8,711,755 UART: [state] DebugLocked = No
8,714,495 UART: [state] WD Timer not started. Device not locked for debugging
8,719,186 UART: [kat] SHA2-256
8,909,088 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,919,871 UART: [kat] ++
8,920,482 UART: [kat] sha1
8,930,740 UART: [kat] SHA2-256
8,933,720 UART: [kat] SHA2-384
8,939,880 UART: [kat] SHA2-512-ACC
8,942,510 UART: [kat] ECC-384
11,382,173 UART: [kat] HMAC-384Kdf
11,396,669 UART: [kat] LMS
11,928,455 UART: [kat] --
11,933,325 UART: [cold-reset] ++
11,935,428 UART: [fht] FHT @ 0x50003400
11,947,449 UART: [idev] ++
11,948,163 UART: [idev] CDI.KEYID = 6
11,949,088 UART: [idev] SUBJECT.KEYID = 7
11,950,256 UART: [idev] UDS.KEYID = 0
11,952,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,101,569 UART: [idev] Erasing UDS.KEYID = 0
14,426,248 UART: [idev] Sha1 KeyId Algorithm
14,449,969 UART: [idev] --
14,455,965 UART: [ldev] ++
14,456,645 UART: [ldev] CDI.KEYID = 6
14,457,554 UART: [ldev] SUBJECT.KEYID = 5
14,458,713 UART: [ldev] AUTHORITY.KEYID = 7
14,459,947 UART: [ldev] FE.KEYID = 1
14,472,598 UART: [ldev] Erasing FE.KEYID = 1
16,950,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,670,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,685,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,701,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,716,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,737,708 UART: [ldev] --
18,742,312 UART: [fwproc] Wait for Commands...
18,745,440 UART: [fwproc] Recv command 0x46574c44
18,747,726 UART: [fwproc] Recv'd Img size: 118548 bytes
22,244,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,323,760 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,447,376 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,008,543 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,758,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,541,635 >>> mbox cmd response: failed
11,542,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,542,629 >>> mbox cmd response: failed
11,542,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,543,212 >>> mbox cmd response: failed
Initializing fuses
2,055,414 writing to cptra_bootfsm_go
12,080,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,363,484 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,521 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,031 UART: [kat] SHA2-256
881,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,077 UART: [kat] ++
886,229 UART: [kat] sha1
890,515 UART: [kat] SHA2-256
892,453 UART: [kat] SHA2-384
895,206 UART: [kat] SHA2-512-ACC
897,107 UART: [kat] ECC-384
902,780 UART: [kat] HMAC-384Kdf
907,362 UART: [kat] LMS
1,475,558 UART: [kat] --
1,476,227 UART: [cold-reset] ++
1,476,613 UART: [fht] Storing FHT @ 0x50003400
1,479,472 UART: [idev] ++
1,479,640 UART: [idev] CDI.KEYID = 6
1,480,000 UART: [idev] SUBJECT.KEYID = 7
1,480,424 UART: [idev] UDS.KEYID = 0
1,480,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,016 UART: [idev] Erasing UDS.KEYID = 0
1,504,726 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,224 UART: [idev] --
1,514,089 UART: [ldev] ++
1,514,257 UART: [ldev] CDI.KEYID = 6
1,514,620 UART: [ldev] SUBJECT.KEYID = 5
1,515,046 UART: [ldev] AUTHORITY.KEYID = 7
1,515,509 UART: [ldev] FE.KEYID = 1
1,520,627 UART: [ldev] Erasing FE.KEYID = 1
1,545,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,618 UART: [ldev] --
1,585,045 UART: [fwproc] Waiting for Commands...
1,585,840 UART: [fwproc] Received command 0x46574c44
1,586,631 UART: [fwproc] Received Image of size 118548 bytes
1,626,142 UART: ROM Fatal Error: 0x000B0019
1,627,299 >>> mbox cmd response: failed
1,627,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,305 >>> mbox cmd response: failed
1,627,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,612 UART: [state] LifecycleState = Unprovisioned
86,267 UART: [state] DebugLocked = No
86,835 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,367 UART: [kat] SHA2-256
882,298 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,413 UART: [kat] ++
886,565 UART: [kat] sha1
890,795 UART: [kat] SHA2-256
892,733 UART: [kat] SHA2-384
895,690 UART: [kat] SHA2-512-ACC
897,591 UART: [kat] ECC-384
903,148 UART: [kat] HMAC-384Kdf
907,754 UART: [kat] LMS
1,475,950 UART: [kat] --
1,476,943 UART: [cold-reset] ++
1,477,511 UART: [fht] Storing FHT @ 0x50003400
1,480,252 UART: [idev] ++
1,480,420 UART: [idev] CDI.KEYID = 6
1,480,780 UART: [idev] SUBJECT.KEYID = 7
1,481,204 UART: [idev] UDS.KEYID = 0
1,481,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,328 UART: [idev] Erasing UDS.KEYID = 0
1,505,858 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,606 UART: [idev] --
1,515,463 UART: [ldev] ++
1,515,631 UART: [ldev] CDI.KEYID = 6
1,515,994 UART: [ldev] SUBJECT.KEYID = 5
1,516,420 UART: [ldev] AUTHORITY.KEYID = 7
1,516,883 UART: [ldev] FE.KEYID = 1
1,522,093 UART: [ldev] Erasing FE.KEYID = 1
1,547,204 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,956 UART: [ldev] --
1,586,469 UART: [fwproc] Waiting for Commands...
1,587,216 UART: [fwproc] Received command 0x46574c44
1,588,007 UART: [fwproc] Received Image of size 118548 bytes
2,932,786 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,534 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,752 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,017 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,479,708 >>> mbox cmd response: failed
1,479,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,714 >>> mbox cmd response: failed
1,479,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,277 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,362 UART: [kat] SHA2-256
882,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,408 UART: [kat] ++
886,560 UART: [kat] sha1
890,772 UART: [kat] SHA2-256
892,710 UART: [kat] SHA2-384
895,517 UART: [kat] SHA2-512-ACC
897,418 UART: [kat] ECC-384
903,383 UART: [kat] HMAC-384Kdf
908,029 UART: [kat] LMS
1,476,225 UART: [kat] --
1,477,318 UART: [cold-reset] ++
1,477,750 UART: [fht] Storing FHT @ 0x50003400
1,480,587 UART: [idev] ++
1,480,755 UART: [idev] CDI.KEYID = 6
1,481,115 UART: [idev] SUBJECT.KEYID = 7
1,481,539 UART: [idev] UDS.KEYID = 0
1,481,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,445 UART: [idev] Erasing UDS.KEYID = 0
1,506,009 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,611 UART: [idev] --
1,515,424 UART: [ldev] ++
1,515,592 UART: [ldev] CDI.KEYID = 6
1,515,955 UART: [ldev] SUBJECT.KEYID = 5
1,516,381 UART: [ldev] AUTHORITY.KEYID = 7
1,516,844 UART: [ldev] FE.KEYID = 1
1,521,954 UART: [ldev] Erasing FE.KEYID = 1
1,547,349 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,221 UART: [ldev] --
1,586,636 UART: [fwproc] Waiting for Commands...
1,587,285 UART: [fwproc] Received command 0x46574c44
1,588,076 UART: [fwproc] Received Image of size 118548 bytes
1,628,089 UART: ROM Fatal Error: 0x000B0019
1,629,246 >>> mbox cmd response: failed
1,629,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,252 >>> mbox cmd response: failed
1,629,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,100 UART: [kat] SHA2-256
882,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,146 UART: [kat] ++
886,298 UART: [kat] sha1
890,322 UART: [kat] SHA2-256
892,260 UART: [kat] SHA2-384
894,981 UART: [kat] SHA2-512-ACC
896,882 UART: [kat] ECC-384
902,495 UART: [kat] HMAC-384Kdf
907,205 UART: [kat] LMS
1,475,401 UART: [kat] --
1,476,542 UART: [cold-reset] ++
1,477,072 UART: [fht] Storing FHT @ 0x50003400
1,479,989 UART: [idev] ++
1,480,157 UART: [idev] CDI.KEYID = 6
1,480,517 UART: [idev] SUBJECT.KEYID = 7
1,480,941 UART: [idev] UDS.KEYID = 0
1,481,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,729 UART: [idev] Erasing UDS.KEYID = 0
1,505,477 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,253 UART: [idev] --
1,515,180 UART: [ldev] ++
1,515,348 UART: [ldev] CDI.KEYID = 6
1,515,711 UART: [ldev] SUBJECT.KEYID = 5
1,516,137 UART: [ldev] AUTHORITY.KEYID = 7
1,516,600 UART: [ldev] FE.KEYID = 1
1,521,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,183 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,453 UART: [ldev] --
1,586,884 UART: [fwproc] Waiting for Commands...
1,587,525 UART: [fwproc] Received command 0x46574c44
1,588,316 UART: [fwproc] Received Image of size 118548 bytes
2,932,543 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,691 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,909 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,136 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,481,643 >>> mbox cmd response: failed
1,481,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,649 >>> mbox cmd response: failed
1,481,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,860 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
891,206 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,310 UART: [kat] ++
895,462 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,169,986 UART: [cold-reset] ++
1,170,380 UART: [fht] FHT @ 0x50003400
1,173,138 UART: [idev] ++
1,173,306 UART: [idev] CDI.KEYID = 6
1,173,667 UART: [idev] SUBJECT.KEYID = 7
1,174,092 UART: [idev] UDS.KEYID = 0
1,174,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,965 UART: [idev] Erasing UDS.KEYID = 0
1,199,239 UART: [idev] Sha1 KeyId Algorithm
1,208,123 UART: [idev] --
1,209,006 UART: [ldev] ++
1,209,174 UART: [ldev] CDI.KEYID = 6
1,209,538 UART: [ldev] SUBJECT.KEYID = 5
1,209,965 UART: [ldev] AUTHORITY.KEYID = 7
1,210,428 UART: [ldev] FE.KEYID = 1
1,215,834 UART: [ldev] Erasing FE.KEYID = 1
1,241,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,627 UART: [fwproc] Wait for Commands...
1,281,274 UART: [fwproc] Recv command 0x46574c44
1,282,007 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,546 UART: ROM Fatal Error: 0x000B0019
1,322,703 >>> mbox cmd response: failed
1,322,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,709 >>> mbox cmd response: failed
1,322,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,715 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,166 UART: [kat] ++
895,318 UART: [kat] sha1
899,462 UART: [kat] SHA2-256
901,402 UART: [kat] SHA2-384
904,125 UART: [kat] SHA2-512-ACC
906,026 UART: [kat] ECC-384
915,761 UART: [kat] HMAC-384Kdf
920,381 UART: [kat] LMS
1,168,693 UART: [kat] --
1,169,548 UART: [cold-reset] ++
1,170,064 UART: [fht] FHT @ 0x50003400
1,172,884 UART: [idev] ++
1,173,052 UART: [idev] CDI.KEYID = 6
1,173,413 UART: [idev] SUBJECT.KEYID = 7
1,173,838 UART: [idev] UDS.KEYID = 0
1,174,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,907 UART: [idev] Erasing UDS.KEYID = 0
1,199,035 UART: [idev] Sha1 KeyId Algorithm
1,207,987 UART: [idev] --
1,209,070 UART: [ldev] ++
1,209,238 UART: [ldev] CDI.KEYID = 6
1,209,602 UART: [ldev] SUBJECT.KEYID = 5
1,210,029 UART: [ldev] AUTHORITY.KEYID = 7
1,210,492 UART: [ldev] FE.KEYID = 1
1,215,702 UART: [ldev] Erasing FE.KEYID = 1
1,242,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,292 UART: [ldev] --
1,281,545 UART: [fwproc] Wait for Commands...
1,282,202 UART: [fwproc] Recv command 0x46574c44
1,282,935 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,076 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,251 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,412 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,104 >>> mbox cmd response: failed
1,178,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,110 >>> mbox cmd response: failed
1,178,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,649 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
891,103 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,207 UART: [kat] ++
895,359 UART: [kat] sha1
899,625 UART: [kat] SHA2-256
901,565 UART: [kat] SHA2-384
904,284 UART: [kat] SHA2-512-ACC
906,185 UART: [kat] ECC-384
915,938 UART: [kat] HMAC-384Kdf
920,688 UART: [kat] LMS
1,169,000 UART: [kat] --
1,170,175 UART: [cold-reset] ++
1,170,509 UART: [fht] FHT @ 0x50003400
1,173,141 UART: [idev] ++
1,173,309 UART: [idev] CDI.KEYID = 6
1,173,670 UART: [idev] SUBJECT.KEYID = 7
1,174,095 UART: [idev] UDS.KEYID = 0
1,174,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,926 UART: [idev] Erasing UDS.KEYID = 0
1,199,512 UART: [idev] Sha1 KeyId Algorithm
1,208,486 UART: [idev] --
1,209,717 UART: [ldev] ++
1,209,885 UART: [ldev] CDI.KEYID = 6
1,210,249 UART: [ldev] SUBJECT.KEYID = 5
1,210,676 UART: [ldev] AUTHORITY.KEYID = 7
1,211,139 UART: [ldev] FE.KEYID = 1
1,216,283 UART: [ldev] Erasing FE.KEYID = 1
1,242,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,909 UART: [ldev] --
1,282,138 UART: [fwproc] Wait for Commands...
1,282,835 UART: [fwproc] Recv command 0x46574c44
1,283,568 UART: [fwproc] Recv'd Img size: 118548 bytes
1,322,385 UART: ROM Fatal Error: 0x000B0019
1,323,542 >>> mbox cmd response: failed
1,323,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,548 >>> mbox cmd response: failed
1,323,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,554 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,974 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
891,649 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,753 UART: [kat] ++
895,905 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,714 UART: [kat] SHA2-512-ACC
906,615 UART: [kat] ECC-384
915,668 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,215 UART: [fht] FHT @ 0x50003400
1,172,787 UART: [idev] ++
1,172,955 UART: [idev] CDI.KEYID = 6
1,173,316 UART: [idev] SUBJECT.KEYID = 7
1,173,741 UART: [idev] UDS.KEYID = 0
1,174,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,858 UART: [idev] Erasing UDS.KEYID = 0
1,198,694 UART: [idev] Sha1 KeyId Algorithm
1,207,686 UART: [idev] --
1,208,603 UART: [ldev] ++
1,208,771 UART: [ldev] CDI.KEYID = 6
1,209,135 UART: [ldev] SUBJECT.KEYID = 5
1,209,562 UART: [ldev] AUTHORITY.KEYID = 7
1,210,025 UART: [ldev] FE.KEYID = 1
1,215,545 UART: [ldev] Erasing FE.KEYID = 1
1,241,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,549 UART: [ldev] --
1,280,758 UART: [fwproc] Wait for Commands...
1,281,561 UART: [fwproc] Recv command 0x46574c44
1,282,294 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,915 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,090 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,399 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,531 >>> mbox cmd response: failed
1,178,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,537 >>> mbox cmd response: failed
1,178,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,278 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,582 UART: [state] LifecycleState = Unprovisioned
85,237 UART: [state] DebugLocked = No
85,921 UART: [state] WD Timer not started. Device not locked for debugging
87,128 UART: [kat] SHA2-256
892,778 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,903 UART: [kat] ++
897,055 UART: [kat] sha1
901,447 UART: [kat] SHA2-256
903,387 UART: [kat] SHA2-384
906,268 UART: [kat] SHA2-512-ACC
908,169 UART: [kat] ECC-384
917,684 UART: [kat] HMAC-384Kdf
922,228 UART: [kat] LMS
1,170,556 UART: [kat] --
1,171,263 UART: [cold-reset] ++
1,171,681 UART: [fht] FHT @ 0x50003400
1,174,400 UART: [idev] ++
1,174,568 UART: [idev] CDI.KEYID = 6
1,174,928 UART: [idev] SUBJECT.KEYID = 7
1,175,352 UART: [idev] UDS.KEYID = 0
1,175,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,724 UART: [idev] Erasing UDS.KEYID = 0
1,200,671 UART: [idev] Sha1 KeyId Algorithm
1,209,263 UART: [idev] --
1,210,301 UART: [ldev] ++
1,210,469 UART: [ldev] CDI.KEYID = 6
1,210,832 UART: [ldev] SUBJECT.KEYID = 5
1,211,258 UART: [ldev] AUTHORITY.KEYID = 7
1,211,721 UART: [ldev] FE.KEYID = 1
1,217,057 UART: [ldev] Erasing FE.KEYID = 1
1,243,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,506 UART: [fwproc] Wait for Commands...
1,283,140 UART: [fwproc] Recv command 0x46574c44
1,283,868 UART: [fwproc] Recv'd Img size: 118548 bytes
1,323,701 UART: ROM Fatal Error: 0x000B0019
1,324,858 >>> mbox cmd response: failed
1,324,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,864 >>> mbox cmd response: failed
1,324,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,870 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [kat] SHA2-256
893,590 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,715 UART: [kat] ++
897,867 UART: [kat] sha1
902,231 UART: [kat] SHA2-256
904,171 UART: [kat] SHA2-384
906,966 UART: [kat] SHA2-512-ACC
908,867 UART: [kat] ECC-384
918,140 UART: [kat] HMAC-384Kdf
922,830 UART: [kat] LMS
1,171,158 UART: [kat] --
1,172,475 UART: [cold-reset] ++
1,172,845 UART: [fht] FHT @ 0x50003400
1,175,536 UART: [idev] ++
1,175,704 UART: [idev] CDI.KEYID = 6
1,176,064 UART: [idev] SUBJECT.KEYID = 7
1,176,488 UART: [idev] UDS.KEYID = 0
1,176,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,286 UART: [idev] Erasing UDS.KEYID = 0
1,201,137 UART: [idev] Sha1 KeyId Algorithm
1,209,587 UART: [idev] --
1,210,851 UART: [ldev] ++
1,211,019 UART: [ldev] CDI.KEYID = 6
1,211,382 UART: [ldev] SUBJECT.KEYID = 5
1,211,808 UART: [ldev] AUTHORITY.KEYID = 7
1,212,271 UART: [ldev] FE.KEYID = 1
1,217,637 UART: [ldev] Erasing FE.KEYID = 1
1,243,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,457 UART: [ldev] --
1,282,824 UART: [fwproc] Wait for Commands...
1,283,480 UART: [fwproc] Recv command 0x46574c44
1,284,208 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,099 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,269 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,542 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,531 >>> mbox cmd response: failed
1,179,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,537 >>> mbox cmd response: failed
1,179,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,719 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
901,964 UART: [kat] SHA2-256
903,904 UART: [kat] SHA2-384
906,565 UART: [kat] SHA2-512-ACC
908,466 UART: [kat] ECC-384
918,375 UART: [kat] HMAC-384Kdf
923,157 UART: [kat] LMS
1,171,485 UART: [kat] --
1,172,332 UART: [cold-reset] ++
1,172,732 UART: [fht] FHT @ 0x50003400
1,175,559 UART: [idev] ++
1,175,727 UART: [idev] CDI.KEYID = 6
1,176,087 UART: [idev] SUBJECT.KEYID = 7
1,176,511 UART: [idev] UDS.KEYID = 0
1,176,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,843 UART: [idev] Erasing UDS.KEYID = 0
1,201,828 UART: [idev] Sha1 KeyId Algorithm
1,210,134 UART: [idev] --
1,211,042 UART: [ldev] ++
1,211,210 UART: [ldev] CDI.KEYID = 6
1,211,573 UART: [ldev] SUBJECT.KEYID = 5
1,211,999 UART: [ldev] AUTHORITY.KEYID = 7
1,212,462 UART: [ldev] FE.KEYID = 1
1,217,960 UART: [ldev] Erasing FE.KEYID = 1
1,244,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,370 UART: [ldev] --
1,283,743 UART: [fwproc] Wait for Commands...
1,284,465 UART: [fwproc] Recv command 0x46574c44
1,285,193 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,552 UART: ROM Fatal Error: 0x000B0019
1,325,709 >>> mbox cmd response: failed
1,325,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,715 >>> mbox cmd response: failed
1,325,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,721 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
893,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,560 UART: [kat] ++
897,712 UART: [kat] sha1
902,068 UART: [kat] SHA2-256
904,008 UART: [kat] SHA2-384
906,687 UART: [kat] SHA2-512-ACC
908,588 UART: [kat] ECC-384
918,329 UART: [kat] HMAC-384Kdf
922,865 UART: [kat] LMS
1,171,193 UART: [kat] --
1,172,144 UART: [cold-reset] ++
1,172,670 UART: [fht] FHT @ 0x50003400
1,175,407 UART: [idev] ++
1,175,575 UART: [idev] CDI.KEYID = 6
1,175,935 UART: [idev] SUBJECT.KEYID = 7
1,176,359 UART: [idev] UDS.KEYID = 0
1,176,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,351 UART: [idev] Erasing UDS.KEYID = 0
1,201,544 UART: [idev] Sha1 KeyId Algorithm
1,209,914 UART: [idev] --
1,211,156 UART: [ldev] ++
1,211,324 UART: [ldev] CDI.KEYID = 6
1,211,687 UART: [ldev] SUBJECT.KEYID = 5
1,212,113 UART: [ldev] AUTHORITY.KEYID = 7
1,212,576 UART: [ldev] FE.KEYID = 1
1,217,802 UART: [ldev] Erasing FE.KEYID = 1
1,243,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,814 UART: [ldev] --
1,283,277 UART: [fwproc] Wait for Commands...
1,283,951 UART: [fwproc] Recv command 0x46574c44
1,284,679 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,726 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,896 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,047 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,514 >>> mbox cmd response: failed
1,178,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,520 >>> mbox cmd response: failed
1,178,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,244 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
192,152 UART:
192,510 UART: Running Caliptra ROM ...
193,691 UART:
193,849 UART: [state] CFI Enabled
265,058 UART: [state] LifecycleState = Unprovisioned
267,047 UART: [state] DebugLocked = No
268,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,194 UART: [kat] SHA2-256
443,875 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,371 UART: [kat] ++
454,962 UART: [kat] sha1
465,478 UART: [kat] SHA2-256
468,156 UART: [kat] SHA2-384
475,009 UART: [kat] SHA2-512-ACC
477,368 UART: [kat] ECC-384
2,767,762 UART: [kat] HMAC-384Kdf
2,798,471 UART: [kat] LMS
3,988,729 UART: [kat] --
3,993,831 UART: [cold-reset] ++
3,996,468 UART: [fht] Storing FHT @ 0x50003400
4,008,451 UART: [idev] ++
4,009,027 UART: [idev] CDI.KEYID = 6
4,010,051 UART: [idev] SUBJECT.KEYID = 7
4,011,217 UART: [idev] UDS.KEYID = 0
4,014,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,651 UART: [idev] Erasing UDS.KEYID = 0
7,342,165 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,203 UART: [idev] --
7,369,415 UART: [ldev] ++
7,369,993 UART: [ldev] CDI.KEYID = 6
7,370,961 UART: [ldev] SUBJECT.KEYID = 5
7,372,198 UART: [ldev] AUTHORITY.KEYID = 7
7,373,434 UART: [ldev] FE.KEYID = 1
7,420,006 UART: [ldev] Erasing FE.KEYID = 1
10,754,820 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,968 UART: [ldev] --
13,135,914 UART: [fwproc] Waiting for Commands...
13,139,260 UART: [fwproc] Received command 0x46574c44
13,141,459 UART: [fwproc] Received Image of size 118548 bytes
15,830,976 UART: ROM Fatal Error: 0x000B000F
15,834,431 >>> mbox cmd response: failed
15,834,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,835,226 >>> mbox cmd response: failed
15,835,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,835,820 >>> mbox cmd response: failed
Initializing fuses
2,054,946 writing to cptra_bootfsm_go
2,244,291 UART:
2,244,634 UART: Running Caliptra ROM ...
2,245,769 UART:
2,245,937 UART: [state] CFI Enabled
2,301,031 UART: [state] LifecycleState = Unprovisioned
2,303,325 UART: [state] DebugLocked = No
2,305,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,311,146 UART: [kat] SHA2-256
2,480,851 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,491,346 UART: [kat] ++
2,491,840 UART: [kat] sha1
2,501,490 UART: [kat] SHA2-256
2,504,190 UART: [kat] SHA2-384
2,510,191 UART: [kat] SHA2-512-ACC
2,512,546 UART: [kat] ECC-384
4,807,513 UART: [kat] HMAC-384Kdf
4,838,653 UART: [kat] LMS
6,028,952 UART: [kat] --
6,034,193 UART: [cold-reset] ++
6,036,021 UART: [fht] Storing FHT @ 0x50003400
6,047,081 UART: [idev] ++
6,047,708 UART: [idev] CDI.KEYID = 6
6,048,597 UART: [idev] SUBJECT.KEYID = 7
6,049,869 UART: [idev] UDS.KEYID = 0
6,052,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,201,462 UART: [idev] Erasing UDS.KEYID = 0
9,382,876 UART: [idev] Using Sha1 for KeyId Algorithm
9,405,879 UART: [idev] --
9,410,956 UART: [ldev] ++
9,411,581 UART: [ldev] CDI.KEYID = 6
9,412,488 UART: [ldev] SUBJECT.KEYID = 5
9,413,743 UART: [ldev] AUTHORITY.KEYID = 7
9,414,989 UART: [ldev] FE.KEYID = 1
9,461,112 UART: [ldev] Erasing FE.KEYID = 1
12,794,856 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,108,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,123,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,137,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,152,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,171,149 UART: [ldev] --
15,175,067 UART: [fwproc] Waiting for Commands...
15,176,762 UART: [fwproc] Received command 0x46574c44
15,178,955 UART: [fwproc] Received Image of size 118548 bytes
19,278,810 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,356,344 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,429,498 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,757,513 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
3,785,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,540,602 >>> mbox cmd response: failed
15,541,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,541,669 >>> mbox cmd response: failed
15,541,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,542,255 >>> mbox cmd response: failed
Initializing fuses
2,055,621 writing to cptra_bootfsm_go
5,851,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,012,903 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
192,621 UART:
192,988 UART: Running Caliptra ROM ...
194,177 UART:
603,972 UART: [state] CFI Enabled
620,443 UART: [state] LifecycleState = Unprovisioned
622,433 UART: [state] DebugLocked = No
625,137 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,801 UART: [kat] SHA2-256
799,555 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,147 UART: [kat] ++
810,683 UART: [kat] sha1
821,248 UART: [kat] SHA2-256
823,935 UART: [kat] SHA2-384
830,078 UART: [kat] SHA2-512-ACC
832,445 UART: [kat] ECC-384
3,118,689 UART: [kat] HMAC-384Kdf
3,130,166 UART: [kat] LMS
4,320,284 UART: [kat] --
4,324,241 UART: [cold-reset] ++
4,325,439 UART: [fht] Storing FHT @ 0x50003400
4,336,177 UART: [idev] ++
4,336,749 UART: [idev] CDI.KEYID = 6
4,337,666 UART: [idev] SUBJECT.KEYID = 7
4,338,945 UART: [idev] UDS.KEYID = 0
4,341,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,997 UART: [idev] Erasing UDS.KEYID = 0
7,626,749 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,539 UART: [idev] --
7,652,466 UART: [ldev] ++
7,653,053 UART: [ldev] CDI.KEYID = 6
7,653,992 UART: [ldev] SUBJECT.KEYID = 5
7,655,226 UART: [ldev] AUTHORITY.KEYID = 7
7,656,474 UART: [ldev] FE.KEYID = 1
7,666,924 UART: [ldev] Erasing FE.KEYID = 1
10,958,714 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,340 UART: [ldev] --
13,317,583 UART: [fwproc] Waiting for Commands...
13,319,363 UART: [fwproc] Received command 0x46574c44
13,321,613 UART: [fwproc] Received Image of size 118548 bytes
16,015,163 UART: ROM Fatal Error: 0x000B000F
16,018,636 >>> mbox cmd response: failed
16,019,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,019,474 >>> mbox cmd response: failed
16,019,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,020,053 >>> mbox cmd response: failed
Initializing fuses
2,057,344 writing to cptra_bootfsm_go
2,246,620 UART:
2,246,971 UART: Running Caliptra ROM ...
2,248,023 UART:
4,451,955 UART: [state] CFI Enabled
4,468,664 UART: [state] LifecycleState = Unprovisioned
4,470,578 UART: [state] DebugLocked = No
4,473,325 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,477,688 UART: [kat] SHA2-256
4,647,464 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,658,029 UART: [kat] ++
4,658,586 UART: [kat] sha1
4,669,700 UART: [kat] SHA2-256
4,672,441 UART: [kat] SHA2-384
4,678,601 UART: [kat] SHA2-512-ACC
4,681,011 UART: [kat] ECC-384
6,965,942 UART: [kat] HMAC-384Kdf
6,976,618 UART: [kat] LMS
8,166,748 UART: [kat] --
8,172,152 UART: [cold-reset] ++
8,173,438 UART: [fht] Storing FHT @ 0x50003400
8,185,354 UART: [idev] ++
8,185,989 UART: [idev] CDI.KEYID = 6
8,187,266 UART: [idev] SUBJECT.KEYID = 7
8,188,389 UART: [idev] UDS.KEYID = 0
8,190,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,339,535 UART: [idev] Erasing UDS.KEYID = 0
11,475,371 UART: [idev] Using Sha1 for KeyId Algorithm
11,498,164 UART: [idev] --
11,502,333 UART: [ldev] ++
11,502,907 UART: [ldev] CDI.KEYID = 6
11,503,880 UART: [ldev] SUBJECT.KEYID = 5
11,505,146 UART: [ldev] AUTHORITY.KEYID = 7
11,506,331 UART: [ldev] FE.KEYID = 1
11,517,682 UART: [ldev] Erasing FE.KEYID = 1
14,803,856 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,095,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,109,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,124,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,139,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,158,990 UART: [ldev] --
17,164,625 UART: [fwproc] Waiting for Commands...
17,167,010 UART: [fwproc] Received command 0x46574c44
17,169,211 UART: [fwproc] Received Image of size 118548 bytes
21,276,648 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,346,618 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,419,767 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,748,995 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
4,129,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,754,841 >>> mbox cmd response: failed
15,755,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,756,066 >>> mbox cmd response: failed
15,756,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,756,650 >>> mbox cmd response: failed
Initializing fuses
2,048,852 writing to cptra_bootfsm_go
8,244,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,279,370 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,220 UART:
192,597 UART: Running Caliptra ROM ...
193,783 UART:
193,963 UART: [state] CFI Enabled
260,703 UART: [state] LifecycleState = Unprovisioned
262,649 UART: [state] DebugLocked = No
265,104 UART: [state] WD Timer not started. Device not locked for debugging
269,835 UART: [kat] SHA2-256
449,467 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,276 UART: [kat] ++
460,734 UART: [kat] sha1
470,585 UART: [kat] SHA2-256
473,269 UART: [kat] SHA2-384
479,733 UART: [kat] SHA2-512-ACC
482,130 UART: [kat] ECC-384
2,947,114 UART: [kat] HMAC-384Kdf
2,969,521 UART: [kat] LMS
3,446,015 UART: [kat] --
3,451,283 UART: [cold-reset] ++
3,453,897 UART: [fht] FHT @ 0x50003400
3,464,016 UART: [idev] ++
3,464,648 UART: [idev] CDI.KEYID = 6
3,465,727 UART: [idev] SUBJECT.KEYID = 7
3,466,882 UART: [idev] UDS.KEYID = 0
3,469,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,134 UART: [idev] Erasing UDS.KEYID = 0
5,985,961 UART: [idev] Sha1 KeyId Algorithm
6,010,297 UART: [idev] --
6,015,761 UART: [ldev] ++
6,016,340 UART: [ldev] CDI.KEYID = 6
6,017,257 UART: [ldev] SUBJECT.KEYID = 5
6,018,481 UART: [ldev] AUTHORITY.KEYID = 7
6,019,720 UART: [ldev] FE.KEYID = 1
6,057,062 UART: [ldev] Erasing FE.KEYID = 1
8,566,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,129 UART: [ldev] --
10,373,052 UART: [fwproc] Wait for Commands...
10,376,129 UART: [fwproc] Recv command 0x46574c44
10,378,117 UART: [fwproc] Recv'd Img size: 118548 bytes
12,434,269 UART: ROM Fatal Error: 0x000B000F
12,437,560 >>> mbox cmd response: failed
12,438,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,438,357 >>> mbox cmd response: failed
12,438,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,438,923 >>> mbox cmd response: failed
Initializing fuses
2,066,171 writing to cptra_bootfsm_go
2,255,726 UART:
2,256,067 UART: Running Caliptra ROM ...
2,257,200 UART:
2,257,375 UART: [state] CFI Enabled
2,329,983 UART: [state] LifecycleState = Unprovisioned
2,331,919 UART: [state] DebugLocked = No
2,334,183 UART: [state] WD Timer not started. Device not locked for debugging
2,338,584 UART: [kat] SHA2-256
2,518,271 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,529,058 UART: [kat] ++
2,529,617 UART: [kat] sha1
2,541,384 UART: [kat] SHA2-256
2,544,085 UART: [kat] SHA2-384
2,550,803 UART: [kat] SHA2-512-ACC
2,553,144 UART: [kat] ECC-384
5,015,998 UART: [kat] HMAC-384Kdf
5,038,978 UART: [kat] LMS
5,515,474 UART: [kat] --
5,520,196 UART: [cold-reset] ++
5,522,571 UART: [fht] FHT @ 0x50003400
5,534,475 UART: [idev] ++
5,535,048 UART: [idev] CDI.KEYID = 6
5,536,035 UART: [idev] SUBJECT.KEYID = 7
5,537,206 UART: [idev] UDS.KEYID = 0
5,539,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,689,239 UART: [idev] Erasing UDS.KEYID = 0
8,057,117 UART: [idev] Sha1 KeyId Algorithm
8,081,006 UART: [idev] --
8,085,255 UART: [ldev] ++
8,085,861 UART: [ldev] CDI.KEYID = 6
8,086,777 UART: [ldev] SUBJECT.KEYID = 5
8,087,947 UART: [ldev] AUTHORITY.KEYID = 7
8,089,241 UART: [ldev] FE.KEYID = 1
8,125,546 UART: [ldev] Erasing FE.KEYID = 1
10,632,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,367,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,383,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,399,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,414,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,436,616 UART: [ldev] --
12,442,375 UART: [fwproc] Wait for Commands...
12,445,234 UART: [fwproc] Recv command 0x46574c44
12,447,232 UART: [fwproc] Recv'd Img size: 118548 bytes
15,925,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,012,169 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,085,211 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,414,044 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
3,463,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,307,796 >>> mbox cmd response: failed
12,308,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,308,847 >>> mbox cmd response: failed
12,309,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,309,422 >>> mbox cmd response: failed
Initializing fuses
2,067,850 writing to cptra_bootfsm_go
5,519,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,275,452 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,561 UART:
192,930 UART: Running Caliptra ROM ...
194,114 UART:
603,554 UART: [state] CFI Enabled
616,090 UART: [state] LifecycleState = Unprovisioned
617,993 UART: [state] DebugLocked = No
620,697 UART: [state] WD Timer not started. Device not locked for debugging
623,995 UART: [kat] SHA2-256
803,664 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,453 UART: [kat] ++
814,907 UART: [kat] sha1
825,356 UART: [kat] SHA2-256
828,097 UART: [kat] SHA2-384
834,571 UART: [kat] SHA2-512-ACC
836,965 UART: [kat] ECC-384
3,279,003 UART: [kat] HMAC-384Kdf
3,290,512 UART: [kat] LMS
3,767,042 UART: [kat] --
3,771,257 UART: [cold-reset] ++
3,772,599 UART: [fht] FHT @ 0x50003400
3,783,098 UART: [idev] ++
3,783,678 UART: [idev] CDI.KEYID = 6
3,784,703 UART: [idev] SUBJECT.KEYID = 7
3,785,875 UART: [idev] UDS.KEYID = 0
3,788,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,993 UART: [idev] Erasing UDS.KEYID = 0
6,267,254 UART: [idev] Sha1 KeyId Algorithm
6,290,710 UART: [idev] --
6,295,626 UART: [ldev] ++
6,296,202 UART: [ldev] CDI.KEYID = 6
6,297,125 UART: [ldev] SUBJECT.KEYID = 5
6,298,346 UART: [ldev] AUTHORITY.KEYID = 7
6,299,603 UART: [ldev] FE.KEYID = 1
6,310,578 UART: [ldev] Erasing FE.KEYID = 1
8,788,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,435 UART: [ldev] --
10,585,985 UART: [fwproc] Wait for Commands...
10,588,462 UART: [fwproc] Recv command 0x46574c44
10,590,452 UART: [fwproc] Recv'd Img size: 118548 bytes
12,646,325 UART: ROM Fatal Error: 0x000B000F
12,649,549 >>> mbox cmd response: failed
12,649,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,650,308 >>> mbox cmd response: failed
12,650,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,650,895 >>> mbox cmd response: failed
Initializing fuses
2,059,126 writing to cptra_bootfsm_go
2,248,435 UART:
2,248,788 UART: Running Caliptra ROM ...
2,249,927 UART:
7,801,418 UART: [state] CFI Enabled
7,815,056 UART: [state] LifecycleState = Unprovisioned
7,816,975 UART: [state] DebugLocked = No
7,819,128 UART: [state] WD Timer not started. Device not locked for debugging
7,823,593 UART: [kat] SHA2-256
8,003,285 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,014,041 UART: [kat] ++
8,014,565 UART: [kat] sha1
8,026,169 UART: [kat] SHA2-256
8,028,879 UART: [kat] SHA2-384
8,034,562 UART: [kat] SHA2-512-ACC
8,036,922 UART: [kat] ECC-384
10,479,112 UART: [kat] HMAC-384Kdf
10,490,848 UART: [kat] LMS
10,967,361 UART: [kat] --
10,972,810 UART: [cold-reset] ++
10,974,637 UART: [fht] FHT @ 0x50003400
10,985,889 UART: [idev] ++
10,986,461 UART: [idev] CDI.KEYID = 6
10,987,401 UART: [idev] SUBJECT.KEYID = 7
10,988,668 UART: [idev] UDS.KEYID = 0
10,991,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,140,954 UART: [idev] Erasing UDS.KEYID = 0
13,460,732 UART: [idev] Sha1 KeyId Algorithm
13,483,965 UART: [idev] --
13,490,063 UART: [ldev] ++
13,490,636 UART: [ldev] CDI.KEYID = 6
13,491,521 UART: [ldev] SUBJECT.KEYID = 5
13,492,740 UART: [ldev] AUTHORITY.KEYID = 7
13,494,031 UART: [ldev] FE.KEYID = 1
13,504,442 UART: [ldev] Erasing FE.KEYID = 1
15,982,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,702,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,718,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,734,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,750,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,772,553 UART: [ldev] --
17,778,040 UART: [fwproc] Wait for Commands...
17,781,171 UART: [fwproc] Recv command 0x46574c44
17,783,188 UART: [fwproc] Recv'd Img size: 118548 bytes
21,265,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,344,333 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,417,404 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,745,889 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,782,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,521,370 >>> mbox cmd response: failed
12,522,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,522,469 >>> mbox cmd response: failed
12,522,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,523,033 >>> mbox cmd response: failed
Initializing fuses
2,058,405 writing to cptra_bootfsm_go
11,120,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,782,621 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,212 UART:
192,567 UART: Running Caliptra ROM ...
193,748 UART:
193,902 UART: [state] CFI Enabled
262,043 UART: [state] LifecycleState = Unprovisioned
264,419 UART: [state] DebugLocked = No
266,615 UART: [state] WD Timer not started. Device not locked for debugging
271,518 UART: [kat] SHA2-256
461,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,146 UART: [kat] ++
472,608 UART: [kat] sha1
485,062 UART: [kat] SHA2-256
488,093 UART: [kat] SHA2-384
494,736 UART: [kat] SHA2-512-ACC
497,355 UART: [kat] ECC-384
2,945,521 UART: [kat] HMAC-384Kdf
2,968,027 UART: [kat] LMS
3,499,768 UART: [kat] --
3,503,247 UART: [cold-reset] ++
3,505,134 UART: [fht] FHT @ 0x50003400
3,516,073 UART: [idev] ++
3,516,796 UART: [idev] CDI.KEYID = 6
3,517,690 UART: [idev] SUBJECT.KEYID = 7
3,518,937 UART: [idev] UDS.KEYID = 0
3,521,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,670,899 UART: [idev] Erasing UDS.KEYID = 0
6,023,393 UART: [idev] Sha1 KeyId Algorithm
6,047,125 UART: [idev] --
6,050,640 UART: [ldev] ++
6,051,334 UART: [ldev] CDI.KEYID = 6
6,052,252 UART: [ldev] SUBJECT.KEYID = 5
6,053,420 UART: [ldev] AUTHORITY.KEYID = 7
6,054,605 UART: [ldev] FE.KEYID = 1
6,095,182 UART: [ldev] Erasing FE.KEYID = 1
8,603,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,424 UART: [ldev] --
10,409,878 UART: [fwproc] Wait for Commands...
10,412,954 UART: [fwproc] Recv command 0x46574c44
10,415,271 UART: [fwproc] Recv'd Img size: 118548 bytes
12,480,418 UART: ROM Fatal Error: 0x000B000F
12,484,043 >>> mbox cmd response: failed
12,484,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,484,919 >>> mbox cmd response: failed
12,485,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,485,506 >>> mbox cmd response: failed
Initializing fuses
2,069,637 writing to cptra_bootfsm_go
2,258,916 UART:
2,259,279 UART: Running Caliptra ROM ...
2,260,330 UART:
2,260,482 UART: [state] CFI Enabled
2,322,776 UART: [state] LifecycleState = Unprovisioned
2,325,158 UART: [state] DebugLocked = No
2,326,959 UART: [state] WD Timer not started. Device not locked for debugging
2,331,916 UART: [kat] SHA2-256
2,521,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,598 UART: [kat] ++
2,533,066 UART: [kat] sha1
2,545,575 UART: [kat] SHA2-256
2,548,420 UART: [kat] SHA2-384
2,553,238 UART: [kat] SHA2-512-ACC
2,555,815 UART: [kat] ECC-384
5,008,677 UART: [kat] HMAC-384Kdf
5,032,178 UART: [kat] LMS
5,563,951 UART: [kat] --
5,568,066 UART: [cold-reset] ++
5,570,006 UART: [fht] FHT @ 0x50003400
5,581,811 UART: [idev] ++
5,582,493 UART: [idev] CDI.KEYID = 6
5,583,435 UART: [idev] SUBJECT.KEYID = 7
5,584,651 UART: [idev] UDS.KEYID = 0
5,587,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,736,211 UART: [idev] Erasing UDS.KEYID = 0
8,109,176 UART: [idev] Sha1 KeyId Algorithm
8,131,393 UART: [idev] --
8,135,122 UART: [ldev] ++
8,135,811 UART: [ldev] CDI.KEYID = 6
8,136,722 UART: [ldev] SUBJECT.KEYID = 5
8,137,886 UART: [ldev] AUTHORITY.KEYID = 7
8,139,121 UART: [ldev] FE.KEYID = 1
8,180,695 UART: [ldev] Erasing FE.KEYID = 1
10,686,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,420,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,435,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,450,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,465,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,485,324 UART: [ldev] --
12,490,060 UART: [fwproc] Wait for Commands...
12,493,145 UART: [fwproc] Recv command 0x46574c44
12,495,409 UART: [fwproc] Recv'd Img size: 118548 bytes
15,990,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,068,614 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,192,236 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,752,299 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,444,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,288,839 >>> mbox cmd response: failed
12,289,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,289,768 >>> mbox cmd response: failed
12,290,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,290,357 >>> mbox cmd response: failed
Initializing fuses
2,056,905 writing to cptra_bootfsm_go
5,487,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,848,221 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,592 UART:
192,931 UART: Running Caliptra ROM ...
194,116 UART:
603,888 UART: [state] CFI Enabled
617,288 UART: [state] LifecycleState = Unprovisioned
619,643 UART: [state] DebugLocked = No
621,191 UART: [state] WD Timer not started. Device not locked for debugging
625,814 UART: [kat] SHA2-256
815,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,464 UART: [kat] ++
826,974 UART: [kat] sha1
837,750 UART: [kat] SHA2-256
840,767 UART: [kat] SHA2-384
847,512 UART: [kat] SHA2-512-ACC
850,129 UART: [kat] ECC-384
3,291,521 UART: [kat] HMAC-384Kdf
3,304,794 UART: [kat] LMS
3,836,771 UART: [kat] --
3,842,462 UART: [cold-reset] ++
3,843,709 UART: [fht] FHT @ 0x50003400
3,854,483 UART: [idev] ++
3,855,236 UART: [idev] CDI.KEYID = 6
3,856,152 UART: [idev] SUBJECT.KEYID = 7
3,857,372 UART: [idev] UDS.KEYID = 0
3,860,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,176 UART: [idev] Erasing UDS.KEYID = 0
6,336,989 UART: [idev] Sha1 KeyId Algorithm
6,359,639 UART: [idev] --
6,363,208 UART: [ldev] ++
6,363,941 UART: [ldev] CDI.KEYID = 6
6,364,837 UART: [ldev] SUBJECT.KEYID = 5
6,366,006 UART: [ldev] AUTHORITY.KEYID = 7
6,367,198 UART: [ldev] FE.KEYID = 1
6,378,929 UART: [ldev] Erasing FE.KEYID = 1
8,857,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,009 UART: [ldev] --
10,649,295 UART: [fwproc] Wait for Commands...
10,652,105 UART: [fwproc] Recv command 0x46574c44
10,654,428 UART: [fwproc] Recv'd Img size: 118548 bytes
12,725,154 UART: ROM Fatal Error: 0x000B000F
12,728,826 >>> mbox cmd response: failed
12,729,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,729,649 >>> mbox cmd response: failed
12,729,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,730,223 >>> mbox cmd response: failed
Initializing fuses
2,072,102 writing to cptra_bootfsm_go
2,261,443 UART:
2,261,792 UART: Running Caliptra ROM ...
2,262,933 UART:
7,726,150 UART: [state] CFI Enabled
7,737,392 UART: [state] LifecycleState = Unprovisioned
7,739,809 UART: [state] DebugLocked = No
7,741,259 UART: [state] WD Timer not started. Device not locked for debugging
7,745,568 UART: [kat] SHA2-256
7,935,494 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,946,250 UART: [kat] ++
7,946,854 UART: [kat] sha1
7,958,619 UART: [kat] SHA2-256
7,961,640 UART: [kat] SHA2-384
7,968,179 UART: [kat] SHA2-512-ACC
7,970,760 UART: [kat] ECC-384
10,410,545 UART: [kat] HMAC-384Kdf
10,424,295 UART: [kat] LMS
10,956,139 UART: [kat] --
10,961,132 UART: [cold-reset] ++
10,962,315 UART: [fht] FHT @ 0x50003400
10,974,326 UART: [idev] ++
10,975,007 UART: [idev] CDI.KEYID = 6
10,975,983 UART: [idev] SUBJECT.KEYID = 7
10,977,149 UART: [idev] UDS.KEYID = 0
10,979,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,128,438 UART: [idev] Erasing UDS.KEYID = 0
13,459,866 UART: [idev] Sha1 KeyId Algorithm
13,482,828 UART: [idev] --
13,487,736 UART: [ldev] ++
13,488,417 UART: [ldev] CDI.KEYID = 6
13,489,330 UART: [ldev] SUBJECT.KEYID = 5
13,490,512 UART: [ldev] AUTHORITY.KEYID = 7
13,491,748 UART: [ldev] FE.KEYID = 1
13,504,777 UART: [ldev] Erasing FE.KEYID = 1
15,984,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,702,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,717,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,732,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,748,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,768,686 UART: [ldev] --
17,774,010 UART: [fwproc] Wait for Commands...
17,776,546 UART: [fwproc] Recv command 0x46574c44
17,778,819 UART: [fwproc] Recv'd Img size: 118548 bytes
21,277,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,357,117 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,480,739 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,041,887 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,759,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,505,085 >>> mbox cmd response: failed
12,505,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,119 >>> mbox cmd response: failed
12,506,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,715 >>> mbox cmd response: failed
Initializing fuses
2,052,998 writing to cptra_bootfsm_go
11,119,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,405,045 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,937 UART: [kat] SHA2-256
881,868 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,983 UART: [kat] ++
886,135 UART: [kat] sha1
890,407 UART: [kat] SHA2-256
892,345 UART: [kat] SHA2-384
895,168 UART: [kat] SHA2-512-ACC
897,069 UART: [kat] ECC-384
902,736 UART: [kat] HMAC-384Kdf
907,436 UART: [kat] LMS
1,475,632 UART: [kat] --
1,476,497 UART: [cold-reset] ++
1,476,899 UART: [fht] Storing FHT @ 0x50003400
1,479,528 UART: [idev] ++
1,479,696 UART: [idev] CDI.KEYID = 6
1,480,056 UART: [idev] SUBJECT.KEYID = 7
1,480,480 UART: [idev] UDS.KEYID = 0
1,480,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,412 UART: [idev] Erasing UDS.KEYID = 0
1,505,392 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,044 UART: [idev] --
1,515,075 UART: [ldev] ++
1,515,243 UART: [ldev] CDI.KEYID = 6
1,515,606 UART: [ldev] SUBJECT.KEYID = 5
1,516,032 UART: [ldev] AUTHORITY.KEYID = 7
1,516,495 UART: [ldev] FE.KEYID = 1
1,521,659 UART: [ldev] Erasing FE.KEYID = 1
1,546,468 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,476 UART: [ldev] --
1,585,915 UART: [fwproc] Waiting for Commands...
1,586,662 UART: [fwproc] Received command 0x46574c44
1,587,453 UART: [fwproc] Received Image of size 118548 bytes
1,629,537 UART: ROM Fatal Error: 0x000B000F
1,630,696 >>> mbox cmd response: failed
1,630,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,702 >>> mbox cmd response: failed
1,630,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,215 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,787 UART: [kat] SHA2-256
881,718 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,833 UART: [kat] ++
885,985 UART: [kat] sha1
890,273 UART: [kat] SHA2-256
892,211 UART: [kat] SHA2-384
894,750 UART: [kat] SHA2-512-ACC
896,651 UART: [kat] ECC-384
902,206 UART: [kat] HMAC-384Kdf
906,756 UART: [kat] LMS
1,474,952 UART: [kat] --
1,475,655 UART: [cold-reset] ++
1,476,231 UART: [fht] Storing FHT @ 0x50003400
1,479,124 UART: [idev] ++
1,479,292 UART: [idev] CDI.KEYID = 6
1,479,652 UART: [idev] SUBJECT.KEYID = 7
1,480,076 UART: [idev] UDS.KEYID = 0
1,480,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,348 UART: [idev] Erasing UDS.KEYID = 0
1,504,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,278 UART: [idev] --
1,514,519 UART: [ldev] ++
1,514,687 UART: [ldev] CDI.KEYID = 6
1,515,050 UART: [ldev] SUBJECT.KEYID = 5
1,515,476 UART: [ldev] AUTHORITY.KEYID = 7
1,515,939 UART: [ldev] FE.KEYID = 1
1,521,039 UART: [ldev] Erasing FE.KEYID = 1
1,546,134 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,270 UART: [ldev] --
1,585,757 UART: [fwproc] Waiting for Commands...
1,586,598 UART: [fwproc] Received command 0x46574c44
1,587,389 UART: [fwproc] Received Image of size 118548 bytes
2,932,122 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,374 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,592 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,005 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,482,305 >>> mbox cmd response: failed
1,482,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,311 >>> mbox cmd response: failed
1,482,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,317 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,037 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
86,978 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,662 UART: [kat] SHA2-256
882,593 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,708 UART: [kat] ++
886,860 UART: [kat] sha1
891,094 UART: [kat] SHA2-256
893,032 UART: [kat] SHA2-384
895,925 UART: [kat] SHA2-512-ACC
897,826 UART: [kat] ECC-384
903,535 UART: [kat] HMAC-384Kdf
908,313 UART: [kat] LMS
1,476,509 UART: [kat] --
1,477,364 UART: [cold-reset] ++
1,477,924 UART: [fht] Storing FHT @ 0x50003400
1,480,773 UART: [idev] ++
1,480,941 UART: [idev] CDI.KEYID = 6
1,481,301 UART: [idev] SUBJECT.KEYID = 7
1,481,725 UART: [idev] UDS.KEYID = 0
1,482,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,979 UART: [idev] Erasing UDS.KEYID = 0
1,506,773 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,279 UART: [idev] --
1,516,388 UART: [ldev] ++
1,516,556 UART: [ldev] CDI.KEYID = 6
1,516,919 UART: [ldev] SUBJECT.KEYID = 5
1,517,345 UART: [ldev] AUTHORITY.KEYID = 7
1,517,808 UART: [ldev] FE.KEYID = 1
1,523,170 UART: [ldev] Erasing FE.KEYID = 1
1,548,731 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,505 UART: [ldev] --
1,587,932 UART: [fwproc] Waiting for Commands...
1,588,603 UART: [fwproc] Received command 0x46574c44
1,589,394 UART: [fwproc] Received Image of size 118548 bytes
1,630,862 UART: ROM Fatal Error: 0x000B000F
1,632,021 >>> mbox cmd response: failed
1,632,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,027 >>> mbox cmd response: failed
1,632,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,033 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,590 UART: [kat] SHA2-256
882,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,636 UART: [kat] ++
886,788 UART: [kat] sha1
891,120 UART: [kat] SHA2-256
893,058 UART: [kat] SHA2-384
895,881 UART: [kat] SHA2-512-ACC
897,782 UART: [kat] ECC-384
903,441 UART: [kat] HMAC-384Kdf
908,243 UART: [kat] LMS
1,476,439 UART: [kat] --
1,477,338 UART: [cold-reset] ++
1,477,896 UART: [fht] Storing FHT @ 0x50003400
1,480,763 UART: [idev] ++
1,480,931 UART: [idev] CDI.KEYID = 6
1,481,291 UART: [idev] SUBJECT.KEYID = 7
1,481,715 UART: [idev] UDS.KEYID = 0
1,482,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,831 UART: [idev] Erasing UDS.KEYID = 0
1,506,361 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,055 UART: [idev] --
1,516,048 UART: [ldev] ++
1,516,216 UART: [ldev] CDI.KEYID = 6
1,516,579 UART: [ldev] SUBJECT.KEYID = 5
1,517,005 UART: [ldev] AUTHORITY.KEYID = 7
1,517,468 UART: [ldev] FE.KEYID = 1
1,522,606 UART: [ldev] Erasing FE.KEYID = 1
1,548,417 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,579 UART: [ldev] --
1,588,054 UART: [fwproc] Waiting for Commands...
1,588,917 UART: [fwproc] Received command 0x46574c44
1,589,708 UART: [fwproc] Received Image of size 118548 bytes
2,934,363 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,361 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,579 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,134,008 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,482,648 >>> mbox cmd response: failed
1,482,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,654 >>> mbox cmd response: failed
1,482,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,198 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,262 UART: [kat] ++
895,414 UART: [kat] sha1
899,572 UART: [kat] SHA2-256
901,512 UART: [kat] SHA2-384
904,445 UART: [kat] SHA2-512-ACC
906,346 UART: [kat] ECC-384
916,027 UART: [kat] HMAC-384Kdf
920,769 UART: [kat] LMS
1,169,081 UART: [kat] --
1,170,184 UART: [cold-reset] ++
1,170,712 UART: [fht] FHT @ 0x50003400
1,173,248 UART: [idev] ++
1,173,416 UART: [idev] CDI.KEYID = 6
1,173,777 UART: [idev] SUBJECT.KEYID = 7
1,174,202 UART: [idev] UDS.KEYID = 0
1,174,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,343 UART: [idev] Erasing UDS.KEYID = 0
1,199,445 UART: [idev] Sha1 KeyId Algorithm
1,208,331 UART: [idev] --
1,209,482 UART: [ldev] ++
1,209,650 UART: [ldev] CDI.KEYID = 6
1,210,014 UART: [ldev] SUBJECT.KEYID = 5
1,210,441 UART: [ldev] AUTHORITY.KEYID = 7
1,210,904 UART: [ldev] FE.KEYID = 1
1,216,248 UART: [ldev] Erasing FE.KEYID = 1
1,241,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,222 UART: [ldev] --
1,280,489 UART: [fwproc] Wait for Commands...
1,281,208 UART: [fwproc] Recv command 0x46574c44
1,281,941 UART: [fwproc] Recv'd Img size: 118548 bytes
1,322,830 UART: ROM Fatal Error: 0x000B000F
1,323,989 >>> mbox cmd response: failed
1,323,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,995 >>> mbox cmd response: failed
1,323,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,001 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,588 UART: [state] LifecycleState = Unprovisioned
85,243 UART: [state] DebugLocked = No
85,841 UART: [state] WD Timer not started. Device not locked for debugging
87,168 UART: [kat] SHA2-256
890,718 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,822 UART: [kat] ++
894,974 UART: [kat] sha1
899,216 UART: [kat] SHA2-256
901,156 UART: [kat] SHA2-384
903,893 UART: [kat] SHA2-512-ACC
905,794 UART: [kat] ECC-384
915,493 UART: [kat] HMAC-384Kdf
920,021 UART: [kat] LMS
1,168,333 UART: [kat] --
1,169,110 UART: [cold-reset] ++
1,169,502 UART: [fht] FHT @ 0x50003400
1,172,032 UART: [idev] ++
1,172,200 UART: [idev] CDI.KEYID = 6
1,172,561 UART: [idev] SUBJECT.KEYID = 7
1,172,986 UART: [idev] UDS.KEYID = 0
1,173,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,925 UART: [idev] Erasing UDS.KEYID = 0
1,197,711 UART: [idev] Sha1 KeyId Algorithm
1,206,615 UART: [idev] --
1,207,624 UART: [ldev] ++
1,207,792 UART: [ldev] CDI.KEYID = 6
1,208,156 UART: [ldev] SUBJECT.KEYID = 5
1,208,583 UART: [ldev] AUTHORITY.KEYID = 7
1,209,046 UART: [ldev] FE.KEYID = 1
1,214,314 UART: [ldev] Erasing FE.KEYID = 1
1,240,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,988 UART: [ldev] --
1,280,333 UART: [fwproc] Wait for Commands...
1,281,138 UART: [fwproc] Recv command 0x46574c44
1,281,871 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,630 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,805 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,024 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,264 >>> mbox cmd response: failed
1,180,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,270 >>> mbox cmd response: failed
1,180,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,276 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,101 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
891,699 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,803 UART: [kat] ++
895,955 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,836 UART: [kat] LMS
1,169,148 UART: [kat] --
1,169,899 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,173,089 UART: [idev] ++
1,173,257 UART: [idev] CDI.KEYID = 6
1,173,618 UART: [idev] SUBJECT.KEYID = 7
1,174,043 UART: [idev] UDS.KEYID = 0
1,174,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,054 UART: [idev] Sha1 KeyId Algorithm
1,208,082 UART: [idev] --
1,209,079 UART: [ldev] ++
1,209,247 UART: [ldev] CDI.KEYID = 6
1,209,611 UART: [ldev] SUBJECT.KEYID = 5
1,210,038 UART: [ldev] AUTHORITY.KEYID = 7
1,210,501 UART: [ldev] FE.KEYID = 1
1,215,775 UART: [ldev] Erasing FE.KEYID = 1
1,242,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,217 UART: [ldev] --
1,281,534 UART: [fwproc] Wait for Commands...
1,282,217 UART: [fwproc] Recv command 0x46574c44
1,282,950 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,641 UART: ROM Fatal Error: 0x000B000F
1,325,800 >>> mbox cmd response: failed
1,325,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,806 >>> mbox cmd response: failed
1,325,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,812 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,611 UART: [kat] ++
895,763 UART: [kat] sha1
900,027 UART: [kat] SHA2-256
901,967 UART: [kat] SHA2-384
904,708 UART: [kat] SHA2-512-ACC
906,609 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,788 UART: [kat] LMS
1,169,100 UART: [kat] --
1,170,065 UART: [cold-reset] ++
1,170,545 UART: [fht] FHT @ 0x50003400
1,173,321 UART: [idev] ++
1,173,489 UART: [idev] CDI.KEYID = 6
1,173,850 UART: [idev] SUBJECT.KEYID = 7
1,174,275 UART: [idev] UDS.KEYID = 0
1,174,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,614 UART: [idev] Erasing UDS.KEYID = 0
1,199,848 UART: [idev] Sha1 KeyId Algorithm
1,208,732 UART: [idev] --
1,209,727 UART: [ldev] ++
1,209,895 UART: [ldev] CDI.KEYID = 6
1,210,259 UART: [ldev] SUBJECT.KEYID = 5
1,210,686 UART: [ldev] AUTHORITY.KEYID = 7
1,211,149 UART: [ldev] FE.KEYID = 1
1,216,379 UART: [ldev] Erasing FE.KEYID = 1
1,242,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,503 UART: [ldev] --
1,281,760 UART: [fwproc] Wait for Commands...
1,282,385 UART: [fwproc] Recv command 0x46574c44
1,283,118 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,363 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,538 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,789 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,465 >>> mbox cmd response: failed
1,180,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,471 >>> mbox cmd response: failed
1,180,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,477 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,488 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,518 UART: [state] LifecycleState = Unprovisioned
86,173 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
893,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,629 UART: [kat] ++
897,781 UART: [kat] sha1
902,103 UART: [kat] SHA2-256
904,043 UART: [kat] SHA2-384
906,738 UART: [kat] SHA2-512-ACC
908,639 UART: [kat] ECC-384
918,380 UART: [kat] HMAC-384Kdf
922,928 UART: [kat] LMS
1,171,256 UART: [kat] --
1,172,187 UART: [cold-reset] ++
1,172,737 UART: [fht] FHT @ 0x50003400
1,175,362 UART: [idev] ++
1,175,530 UART: [idev] CDI.KEYID = 6
1,175,890 UART: [idev] SUBJECT.KEYID = 7
1,176,314 UART: [idev] UDS.KEYID = 0
1,176,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,722 UART: [idev] Erasing UDS.KEYID = 0
1,201,699 UART: [idev] Sha1 KeyId Algorithm
1,210,235 UART: [idev] --
1,211,319 UART: [ldev] ++
1,211,487 UART: [ldev] CDI.KEYID = 6
1,211,850 UART: [ldev] SUBJECT.KEYID = 5
1,212,276 UART: [ldev] AUTHORITY.KEYID = 7
1,212,739 UART: [ldev] FE.KEYID = 1
1,218,039 UART: [ldev] Erasing FE.KEYID = 1
1,244,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,421 UART: [ldev] --
1,283,702 UART: [fwproc] Wait for Commands...
1,284,312 UART: [fwproc] Recv command 0x46574c44
1,285,040 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,346 UART: ROM Fatal Error: 0x000B000F
1,328,505 >>> mbox cmd response: failed
1,328,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,511 >>> mbox cmd response: failed
1,328,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,734 UART: [state] LifecycleState = Unprovisioned
85,389 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
893,074 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,199 UART: [kat] ++
897,351 UART: [kat] sha1
901,455 UART: [kat] SHA2-256
903,395 UART: [kat] SHA2-384
906,336 UART: [kat] SHA2-512-ACC
908,237 UART: [kat] ECC-384
917,698 UART: [kat] HMAC-384Kdf
922,274 UART: [kat] LMS
1,170,602 UART: [kat] --
1,171,603 UART: [cold-reset] ++
1,171,973 UART: [fht] FHT @ 0x50003400
1,174,606 UART: [idev] ++
1,174,774 UART: [idev] CDI.KEYID = 6
1,175,134 UART: [idev] SUBJECT.KEYID = 7
1,175,558 UART: [idev] UDS.KEYID = 0
1,175,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,712 UART: [idev] Erasing UDS.KEYID = 0
1,200,441 UART: [idev] Sha1 KeyId Algorithm
1,208,891 UART: [idev] --
1,209,701 UART: [ldev] ++
1,209,869 UART: [ldev] CDI.KEYID = 6
1,210,232 UART: [ldev] SUBJECT.KEYID = 5
1,210,658 UART: [ldev] AUTHORITY.KEYID = 7
1,211,121 UART: [ldev] FE.KEYID = 1
1,216,277 UART: [ldev] Erasing FE.KEYID = 1
1,242,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,889 UART: [ldev] --
1,282,392 UART: [fwproc] Wait for Commands...
1,283,180 UART: [fwproc] Recv command 0x46574c44
1,283,908 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,729 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,899 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,212 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,626 >>> mbox cmd response: failed
1,179,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,632 >>> mbox cmd response: failed
1,179,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,393 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,867 UART: [state] LifecycleState = Unprovisioned
86,522 UART: [state] DebugLocked = No
87,056 UART: [state] WD Timer not started. Device not locked for debugging
88,351 UART: [kat] SHA2-256
894,001 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,126 UART: [kat] ++
898,278 UART: [kat] sha1
902,438 UART: [kat] SHA2-256
904,378 UART: [kat] SHA2-384
907,127 UART: [kat] SHA2-512-ACC
909,028 UART: [kat] ECC-384
918,703 UART: [kat] HMAC-384Kdf
923,401 UART: [kat] LMS
1,171,729 UART: [kat] --
1,172,382 UART: [cold-reset] ++
1,172,926 UART: [fht] FHT @ 0x50003400
1,175,587 UART: [idev] ++
1,175,755 UART: [idev] CDI.KEYID = 6
1,176,115 UART: [idev] SUBJECT.KEYID = 7
1,176,539 UART: [idev] UDS.KEYID = 0
1,176,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,421 UART: [idev] Erasing UDS.KEYID = 0
1,201,112 UART: [idev] Sha1 KeyId Algorithm
1,209,530 UART: [idev] --
1,210,694 UART: [ldev] ++
1,210,862 UART: [ldev] CDI.KEYID = 6
1,211,225 UART: [ldev] SUBJECT.KEYID = 5
1,211,651 UART: [ldev] AUTHORITY.KEYID = 7
1,212,114 UART: [ldev] FE.KEYID = 1
1,217,256 UART: [ldev] Erasing FE.KEYID = 1
1,243,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,624 UART: [ldev] --
1,283,105 UART: [fwproc] Wait for Commands...
1,283,841 UART: [fwproc] Recv command 0x46574c44
1,284,569 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,555 UART: ROM Fatal Error: 0x000B000F
1,327,714 >>> mbox cmd response: failed
1,327,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,720 >>> mbox cmd response: failed
1,327,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
893,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,742 UART: [kat] ++
897,894 UART: [kat] sha1
901,972 UART: [kat] SHA2-256
903,912 UART: [kat] SHA2-384
906,427 UART: [kat] SHA2-512-ACC
908,328 UART: [kat] ECC-384
918,209 UART: [kat] HMAC-384Kdf
922,807 UART: [kat] LMS
1,171,135 UART: [kat] --
1,171,884 UART: [cold-reset] ++
1,172,430 UART: [fht] FHT @ 0x50003400
1,174,985 UART: [idev] ++
1,175,153 UART: [idev] CDI.KEYID = 6
1,175,513 UART: [idev] SUBJECT.KEYID = 7
1,175,937 UART: [idev] UDS.KEYID = 0
1,176,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,939 UART: [idev] Erasing UDS.KEYID = 0
1,201,430 UART: [idev] Sha1 KeyId Algorithm
1,209,742 UART: [idev] --
1,210,840 UART: [ldev] ++
1,211,008 UART: [ldev] CDI.KEYID = 6
1,211,371 UART: [ldev] SUBJECT.KEYID = 5
1,211,797 UART: [ldev] AUTHORITY.KEYID = 7
1,212,260 UART: [ldev] FE.KEYID = 1
1,217,278 UART: [ldev] Erasing FE.KEYID = 1
1,243,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,864 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,283,019 UART: [fwproc] Recv command 0x46574c44
1,283,747 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,250 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,420 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,585 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,589 >>> mbox cmd response: failed
1,182,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,595 >>> mbox cmd response: failed
1,182,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,270 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,085 UART:
192,448 UART: Running Caliptra ROM ...
193,529 UART:
193,671 UART: [state] CFI Enabled
263,726 UART: [state] LifecycleState = Unprovisioned
265,676 UART: [state] DebugLocked = No
268,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,732 UART: [kat] SHA2-256
443,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,939 UART: [kat] ++
454,528 UART: [kat] sha1
464,227 UART: [kat] SHA2-256
466,916 UART: [kat] SHA2-384
473,219 UART: [kat] SHA2-512-ACC
475,563 UART: [kat] ECC-384
2,769,343 UART: [kat] HMAC-384Kdf
2,800,809 UART: [kat] LMS
3,991,093 UART: [kat] --
3,995,369 UART: [cold-reset] ++
3,997,686 UART: [fht] Storing FHT @ 0x50003400
4,009,548 UART: [idev] ++
4,010,119 UART: [idev] CDI.KEYID = 6
4,011,005 UART: [idev] SUBJECT.KEYID = 7
4,012,286 UART: [idev] UDS.KEYID = 0
4,015,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,922 UART: [idev] Erasing UDS.KEYID = 0
7,349,103 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,197 UART: [idev] --
7,375,029 UART: [ldev] ++
7,375,606 UART: [ldev] CDI.KEYID = 6
7,376,545 UART: [ldev] SUBJECT.KEYID = 5
7,377,760 UART: [ldev] AUTHORITY.KEYID = 7
7,379,053 UART: [ldev] FE.KEYID = 1
7,423,878 UART: [ldev] Erasing FE.KEYID = 1
10,759,859 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,230 UART: [ldev] --
13,136,543 UART: [fwproc] Waiting for Commands...
13,139,728 UART: [fwproc] Received command 0x46574c44
13,141,925 UART: [fwproc] Received Image of size 118548 bytes
14,545,811 UART: ROM Fatal Error: 0x000B001A
14,549,225 >>> mbox cmd response: failed
14,549,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,550,054 >>> mbox cmd response: failed
14,550,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,550,615 >>> mbox cmd response: failed
Initializing fuses
2,055,617 writing to cptra_bootfsm_go
2,244,939 UART:
2,245,292 UART: Running Caliptra ROM ...
2,246,361 UART:
2,246,519 UART: [state] CFI Enabled
2,314,862 UART: [state] LifecycleState = Unprovisioned
2,316,803 UART: [state] DebugLocked = No
2,318,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,951 UART: [kat] SHA2-256
2,493,660 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,188 UART: [kat] ++
2,504,647 UART: [kat] sha1
2,515,592 UART: [kat] SHA2-256
2,518,275 UART: [kat] SHA2-384
2,523,362 UART: [kat] SHA2-512-ACC
2,525,619 UART: [kat] ECC-384
4,814,622 UART: [kat] HMAC-384Kdf
4,828,138 UART: [kat] LMS
6,018,420 UART: [kat] --
6,021,531 UART: [cold-reset] ++
6,022,827 UART: [fht] Storing FHT @ 0x50003400
6,035,182 UART: [idev] ++
6,035,762 UART: [idev] CDI.KEYID = 6
6,036,705 UART: [idev] SUBJECT.KEYID = 7
6,037,922 UART: [idev] UDS.KEYID = 0
6,040,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,190,277 UART: [idev] Erasing UDS.KEYID = 0
9,388,680 UART: [idev] Using Sha1 for KeyId Algorithm
9,411,071 UART: [idev] --
9,415,800 UART: [ldev] ++
9,416,422 UART: [ldev] CDI.KEYID = 6
9,417,310 UART: [ldev] SUBJECT.KEYID = 5
9,418,597 UART: [ldev] AUTHORITY.KEYID = 7
9,419,839 UART: [ldev] FE.KEYID = 1
9,461,895 UART: [ldev] Erasing FE.KEYID = 1
12,792,859 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,087,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,102,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,116,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,131,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,151,499 UART: [ldev] --
15,157,087 UART: [fwproc] Waiting for Commands...
15,159,359 UART: [fwproc] Received command 0x46574c44
15,161,602 UART: [fwproc] Received Image of size 118548 bytes
19,266,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,345,000 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,418,203 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,746,369 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,731 writing to cptra_bootfsm_go
3,800,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,278,279 >>> mbox cmd response: failed
14,279,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,279,379 >>> mbox cmd response: failed
14,279,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,279,913 >>> mbox cmd response: failed
Initializing fuses
2,049,420 writing to cptra_bootfsm_go
5,839,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,014,322 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
192,788 UART:
193,172 UART: Running Caliptra ROM ...
194,365 UART:
603,820 UART: [state] CFI Enabled
616,591 UART: [state] LifecycleState = Unprovisioned
618,501 UART: [state] DebugLocked = No
620,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,834 UART: [kat] SHA2-256
794,579 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,156 UART: [kat] ++
805,704 UART: [kat] sha1
817,294 UART: [kat] SHA2-256
819,979 UART: [kat] SHA2-384
826,068 UART: [kat] SHA2-512-ACC
828,426 UART: [kat] ECC-384
3,113,580 UART: [kat] HMAC-384Kdf
3,125,781 UART: [kat] LMS
4,315,903 UART: [kat] --
4,319,473 UART: [cold-reset] ++
4,321,628 UART: [fht] Storing FHT @ 0x50003400
4,334,473 UART: [idev] ++
4,335,087 UART: [idev] CDI.KEYID = 6
4,336,014 UART: [idev] SUBJECT.KEYID = 7
4,337,191 UART: [idev] UDS.KEYID = 0
4,340,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,805 UART: [idev] Erasing UDS.KEYID = 0
7,627,310 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,583 UART: [idev] --
7,652,772 UART: [ldev] ++
7,653,352 UART: [ldev] CDI.KEYID = 6
7,654,326 UART: [ldev] SUBJECT.KEYID = 5
7,655,556 UART: [ldev] AUTHORITY.KEYID = 7
7,656,805 UART: [ldev] FE.KEYID = 1
7,667,363 UART: [ldev] Erasing FE.KEYID = 1
10,954,358 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,179 UART: [ldev] --
13,314,771 UART: [fwproc] Waiting for Commands...
13,317,532 UART: [fwproc] Received command 0x46574c44
13,319,726 UART: [fwproc] Received Image of size 118548 bytes
14,722,515 UART: ROM Fatal Error: 0x000B001A
14,725,989 >>> mbox cmd response: failed
14,726,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,726,793 >>> mbox cmd response: failed
14,727,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,727,371 >>> mbox cmd response: failed
Initializing fuses
2,056,357 writing to cptra_bootfsm_go
2,245,694 UART:
2,246,073 UART: Running Caliptra ROM ...
2,247,153 UART:
5,739,697 UART: [state] CFI Enabled
5,752,623 UART: [state] LifecycleState = Unprovisioned
5,754,544 UART: [state] DebugLocked = No
5,756,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,761,725 UART: [kat] SHA2-256
5,931,476 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,941,991 UART: [kat] ++
5,942,457 UART: [kat] sha1
5,953,514 UART: [kat] SHA2-256
5,956,269 UART: [kat] SHA2-384
5,961,245 UART: [kat] SHA2-512-ACC
5,963,601 UART: [kat] ECC-384
8,245,979 UART: [kat] HMAC-384Kdf
8,257,296 UART: [kat] LMS
9,447,451 UART: [kat] --
9,450,891 UART: [cold-reset] ++
9,452,410 UART: [fht] Storing FHT @ 0x50003400
9,463,742 UART: [idev] ++
9,464,319 UART: [idev] CDI.KEYID = 6
9,465,209 UART: [idev] SUBJECT.KEYID = 7
9,466,484 UART: [idev] UDS.KEYID = 0
9,468,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,617,826 UART: [idev] Erasing UDS.KEYID = 0
12,753,484 UART: [idev] Using Sha1 for KeyId Algorithm
12,775,351 UART: [idev] --
12,780,056 UART: [ldev] ++
12,780,637 UART: [ldev] CDI.KEYID = 6
12,781,605 UART: [ldev] SUBJECT.KEYID = 5
12,782,815 UART: [ldev] AUTHORITY.KEYID = 7
12,784,060 UART: [ldev] FE.KEYID = 1
12,793,636 UART: [ldev] Erasing FE.KEYID = 1
16,080,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,371,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,386,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,400,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,415,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,433,396 UART: [ldev] --
18,438,018 UART: [fwproc] Waiting for Commands...
18,441,316 UART: [fwproc] Received command 0x46574c44
18,443,509 UART: [fwproc] Received Image of size 118548 bytes
22,551,158 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,628,751 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,701,927 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,030,889 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,130,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,638 >>> mbox cmd response: failed
14,456,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,456,648 >>> mbox cmd response: failed
14,456,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,457,231 >>> mbox cmd response: failed
Initializing fuses
2,050,621 writing to cptra_bootfsm_go
9,534,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,553,848 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
192,342 UART:
192,695 UART: Running Caliptra ROM ...
193,875 UART:
194,049 UART: [state] CFI Enabled
265,468 UART: [state] LifecycleState = Unprovisioned
267,422 UART: [state] DebugLocked = No
269,147 UART: [state] WD Timer not started. Device not locked for debugging
273,702 UART: [kat] SHA2-256
453,375 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,149 UART: [kat] ++
464,606 UART: [kat] sha1
474,900 UART: [kat] SHA2-256
477,592 UART: [kat] SHA2-384
482,773 UART: [kat] SHA2-512-ACC
485,137 UART: [kat] ECC-384
2,949,363 UART: [kat] HMAC-384Kdf
2,970,996 UART: [kat] LMS
3,447,484 UART: [kat] --
3,450,722 UART: [cold-reset] ++
3,452,715 UART: [fht] FHT @ 0x50003400
3,464,939 UART: [idev] ++
3,465,518 UART: [idev] CDI.KEYID = 6
3,466,540 UART: [idev] SUBJECT.KEYID = 7
3,467,699 UART: [idev] UDS.KEYID = 0
3,470,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,742 UART: [idev] Erasing UDS.KEYID = 0
5,986,127 UART: [idev] Sha1 KeyId Algorithm
6,010,096 UART: [idev] --
6,016,087 UART: [ldev] ++
6,016,674 UART: [ldev] CDI.KEYID = 6
6,017,574 UART: [ldev] SUBJECT.KEYID = 5
6,018,791 UART: [ldev] AUTHORITY.KEYID = 7
6,020,088 UART: [ldev] FE.KEYID = 1
6,055,939 UART: [ldev] Erasing FE.KEYID = 1
8,563,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,545 UART: [ldev] --
10,371,489 UART: [fwproc] Wait for Commands...
10,373,480 UART: [fwproc] Recv command 0x46574c44
10,375,468 UART: [fwproc] Recv'd Img size: 118548 bytes
11,462,214 UART: ROM Fatal Error: 0x000B001A
11,465,413 >>> mbox cmd response: failed
11,465,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,466,109 >>> mbox cmd response: failed
11,466,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,466,716 >>> mbox cmd response: failed
Initializing fuses
2,059,945 writing to cptra_bootfsm_go
2,249,209 UART:
2,249,548 UART: Running Caliptra ROM ...
2,250,600 UART:
2,250,759 UART: [state] CFI Enabled
2,322,952 UART: [state] LifecycleState = Unprovisioned
2,324,892 UART: [state] DebugLocked = No
2,327,091 UART: [state] WD Timer not started. Device not locked for debugging
2,330,627 UART: [kat] SHA2-256
2,510,277 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,521,056 UART: [kat] ++
2,521,539 UART: [kat] sha1
2,531,935 UART: [kat] SHA2-256
2,534,618 UART: [kat] SHA2-384
2,540,835 UART: [kat] SHA2-512-ACC
2,543,201 UART: [kat] ECC-384
5,000,581 UART: [kat] HMAC-384Kdf
5,025,666 UART: [kat] LMS
5,502,132 UART: [kat] --
5,506,307 UART: [cold-reset] ++
5,508,788 UART: [fht] FHT @ 0x50003400
5,520,146 UART: [idev] ++
5,520,724 UART: [idev] CDI.KEYID = 6
5,521,684 UART: [idev] SUBJECT.KEYID = 7
5,522,908 UART: [idev] UDS.KEYID = 0
5,525,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,674,957 UART: [idev] Erasing UDS.KEYID = 0
8,039,566 UART: [idev] Sha1 KeyId Algorithm
8,063,052 UART: [idev] --
8,067,574 UART: [ldev] ++
8,068,159 UART: [ldev] CDI.KEYID = 6
8,069,086 UART: [ldev] SUBJECT.KEYID = 5
8,070,310 UART: [ldev] AUTHORITY.KEYID = 7
8,071,548 UART: [ldev] FE.KEYID = 1
8,112,393 UART: [ldev] Erasing FE.KEYID = 1
10,616,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,354,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,370,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,386,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,402,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,423,394 UART: [ldev] --
12,428,075 UART: [fwproc] Wait for Commands...
12,431,312 UART: [fwproc] Recv command 0x46574c44
12,433,309 UART: [fwproc] Recv'd Img size: 118548 bytes
15,911,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,990,649 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,063,664 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,391,267 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
3,461,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,344,598 >>> mbox cmd response: failed
11,345,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,345,554 >>> mbox cmd response: failed
11,345,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,346,126 >>> mbox cmd response: failed
Initializing fuses
2,073,478 writing to cptra_bootfsm_go
5,518,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,299,028 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
192,575 UART:
192,936 UART: Running Caliptra ROM ...
194,113 UART:
603,643 UART: [state] CFI Enabled
617,584 UART: [state] LifecycleState = Unprovisioned
619,501 UART: [state] DebugLocked = No
620,989 UART: [state] WD Timer not started. Device not locked for debugging
624,244 UART: [kat] SHA2-256
803,938 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,697 UART: [kat] ++
815,147 UART: [kat] sha1
826,210 UART: [kat] SHA2-256
828,896 UART: [kat] SHA2-384
835,310 UART: [kat] SHA2-512-ACC
837,656 UART: [kat] ECC-384
3,282,559 UART: [kat] HMAC-384Kdf
3,294,091 UART: [kat] LMS
3,770,601 UART: [kat] --
3,774,376 UART: [cold-reset] ++
3,776,096 UART: [fht] FHT @ 0x50003400
3,788,001 UART: [idev] ++
3,788,581 UART: [idev] CDI.KEYID = 6
3,789,527 UART: [idev] SUBJECT.KEYID = 7
3,790,700 UART: [idev] UDS.KEYID = 0
3,793,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,773 UART: [idev] Erasing UDS.KEYID = 0
6,270,367 UART: [idev] Sha1 KeyId Algorithm
6,293,624 UART: [idev] --
6,299,033 UART: [ldev] ++
6,299,617 UART: [ldev] CDI.KEYID = 6
6,300,535 UART: [ldev] SUBJECT.KEYID = 5
6,301,753 UART: [ldev] AUTHORITY.KEYID = 7
6,302,987 UART: [ldev] FE.KEYID = 1
6,314,936 UART: [ldev] Erasing FE.KEYID = 1
8,794,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,548 UART: [ldev] --
10,587,554 UART: [fwproc] Wait for Commands...
10,590,245 UART: [fwproc] Recv command 0x46574c44
10,592,233 UART: [fwproc] Recv'd Img size: 118548 bytes
11,682,060 UART: ROM Fatal Error: 0x000B001A
11,685,270 >>> mbox cmd response: failed
11,685,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,685,914 >>> mbox cmd response: failed
11,686,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,686,479 >>> mbox cmd response: failed
Initializing fuses
2,058,493 writing to cptra_bootfsm_go
2,247,788 UART:
2,248,125 UART: Running Caliptra ROM ...
2,249,267 UART:
8,772,417 UART: [state] CFI Enabled
8,785,260 UART: [state] LifecycleState = Unprovisioned
8,787,197 UART: [state] DebugLocked = No
8,789,405 UART: [state] WD Timer not started. Device not locked for debugging
8,794,112 UART: [kat] SHA2-256
8,973,737 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,984,542 UART: [kat] ++
8,985,031 UART: [kat] sha1
8,996,513 UART: [kat] SHA2-256
8,999,211 UART: [kat] SHA2-384
9,005,422 UART: [kat] SHA2-512-ACC
9,007,796 UART: [kat] ECC-384
11,447,292 UART: [kat] HMAC-384Kdf
11,460,502 UART: [kat] LMS
11,936,973 UART: [kat] --
11,940,549 UART: [cold-reset] ++
11,942,417 UART: [fht] FHT @ 0x50003400
11,954,217 UART: [idev] ++
11,954,848 UART: [idev] CDI.KEYID = 6
11,955,751 UART: [idev] SUBJECT.KEYID = 7
11,957,000 UART: [idev] UDS.KEYID = 0
11,960,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,109,734 UART: [idev] Erasing UDS.KEYID = 0
14,433,122 UART: [idev] Sha1 KeyId Algorithm
14,456,164 UART: [idev] --
14,460,980 UART: [ldev] ++
14,461,609 UART: [ldev] CDI.KEYID = 6
14,462,527 UART: [ldev] SUBJECT.KEYID = 5
14,463,689 UART: [ldev] AUTHORITY.KEYID = 7
14,464,978 UART: [ldev] FE.KEYID = 1
14,475,256 UART: [ldev] Erasing FE.KEYID = 1
16,956,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,674,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,690,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,706,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,722,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,743,915 UART: [ldev] --
18,748,695 UART: [fwproc] Wait for Commands...
18,751,333 UART: [fwproc] Recv command 0x46574c44
18,753,326 UART: [fwproc] Recv'd Img size: 118548 bytes
22,234,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,315,782 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,388,757 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,716,893 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,429 writing to cptra_bootfsm_go
3,775,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,551,519 >>> mbox cmd response: failed
11,552,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,552,510 >>> mbox cmd response: failed
11,552,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,553,083 >>> mbox cmd response: failed
Initializing fuses
2,058,268 writing to cptra_bootfsm_go
12,102,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,757,563 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,195 UART:
192,549 UART: Running Caliptra ROM ...
193,726 UART:
193,883 UART: [state] CFI Enabled
262,335 UART: [state] LifecycleState = Unprovisioned
264,756 UART: [state] DebugLocked = No
266,711 UART: [state] WD Timer not started. Device not locked for debugging
270,776 UART: [kat] SHA2-256
460,631 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,389 UART: [kat] ++
471,843 UART: [kat] sha1
484,238 UART: [kat] SHA2-256
487,256 UART: [kat] SHA2-384
492,217 UART: [kat] SHA2-512-ACC
494,791 UART: [kat] ECC-384
2,945,755 UART: [kat] HMAC-384Kdf
2,962,581 UART: [kat] LMS
3,494,312 UART: [kat] --
3,500,479 UART: [cold-reset] ++
3,501,989 UART: [fht] FHT @ 0x50003400
3,513,094 UART: [idev] ++
3,513,850 UART: [idev] CDI.KEYID = 6
3,514,742 UART: [idev] SUBJECT.KEYID = 7
3,515,860 UART: [idev] UDS.KEYID = 0
3,518,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,668,326 UART: [idev] Erasing UDS.KEYID = 0
6,018,144 UART: [idev] Sha1 KeyId Algorithm
6,040,598 UART: [idev] --
6,044,719 UART: [ldev] ++
6,045,412 UART: [ldev] CDI.KEYID = 6
6,046,344 UART: [ldev] SUBJECT.KEYID = 5
6,047,516 UART: [ldev] AUTHORITY.KEYID = 7
6,048,702 UART: [ldev] FE.KEYID = 1
6,091,446 UART: [ldev] Erasing FE.KEYID = 1
8,597,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,953 UART: [ldev] --
10,405,755 UART: [fwproc] Wait for Commands...
10,407,805 UART: [fwproc] Recv command 0x46574c44
10,410,073 UART: [fwproc] Recv'd Img size: 118548 bytes
11,511,303 UART: ROM Fatal Error: 0x000B001A
11,514,960 >>> mbox cmd response: failed
11,515,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,515,732 >>> mbox cmd response: failed
11,516,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,516,307 >>> mbox cmd response: failed
Initializing fuses
2,065,954 writing to cptra_bootfsm_go
2,255,287 UART:
2,255,639 UART: Running Caliptra ROM ...
2,256,779 UART:
2,256,972 UART: [state] CFI Enabled
2,328,722 UART: [state] LifecycleState = Unprovisioned
2,331,100 UART: [state] DebugLocked = No
2,333,480 UART: [state] WD Timer not started. Device not locked for debugging
2,338,491 UART: [kat] SHA2-256
2,528,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,539,174 UART: [kat] ++
2,539,689 UART: [kat] sha1
2,550,634 UART: [kat] SHA2-256
2,553,677 UART: [kat] SHA2-384
2,559,769 UART: [kat] SHA2-512-ACC
2,562,373 UART: [kat] ECC-384
5,015,966 UART: [kat] HMAC-384Kdf
5,036,990 UART: [kat] LMS
5,568,772 UART: [kat] --
5,574,168 UART: [cold-reset] ++
5,576,701 UART: [fht] FHT @ 0x50003400
5,587,902 UART: [idev] ++
5,588,592 UART: [idev] CDI.KEYID = 6
5,589,618 UART: [idev] SUBJECT.KEYID = 7
5,590,723 UART: [idev] UDS.KEYID = 0
5,593,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,742,240 UART: [idev] Erasing UDS.KEYID = 0
8,098,096 UART: [idev] Sha1 KeyId Algorithm
8,121,130 UART: [idev] --
8,127,131 UART: [ldev] ++
8,127,822 UART: [ldev] CDI.KEYID = 6
8,128,725 UART: [ldev] SUBJECT.KEYID = 5
8,129,897 UART: [ldev] AUTHORITY.KEYID = 7
8,131,136 UART: [ldev] FE.KEYID = 1
8,166,069 UART: [ldev] Erasing FE.KEYID = 1
10,674,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,406,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,422,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,437,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,452,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,474,654 UART: [ldev] --
12,480,180 UART: [fwproc] Wait for Commands...
12,482,880 UART: [fwproc] Recv command 0x46574c44
12,485,144 UART: [fwproc] Recv'd Img size: 118548 bytes
15,984,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,061,199 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,184,804 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,745,497 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,441,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,315,440 >>> mbox cmd response: failed
11,315,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,316,306 >>> mbox cmd response: failed
11,316,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,316,875 >>> mbox cmd response: failed
Initializing fuses
2,061,022 writing to cptra_bootfsm_go
5,472,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,833,282 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,444 UART:
192,819 UART: Running Caliptra ROM ...
194,012 UART:
603,577 UART: [state] CFI Enabled
619,960 UART: [state] LifecycleState = Unprovisioned
622,334 UART: [state] DebugLocked = No
623,618 UART: [state] WD Timer not started. Device not locked for debugging
628,227 UART: [kat] SHA2-256
818,125 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,885 UART: [kat] ++
829,476 UART: [kat] sha1
841,123 UART: [kat] SHA2-256
844,131 UART: [kat] SHA2-384
851,039 UART: [kat] SHA2-512-ACC
853,614 UART: [kat] ECC-384
3,297,102 UART: [kat] HMAC-384Kdf
3,308,911 UART: [kat] LMS
3,840,743 UART: [kat] --
3,847,024 UART: [cold-reset] ++
3,847,942 UART: [fht] FHT @ 0x50003400
3,858,964 UART: [idev] ++
3,859,640 UART: [idev] CDI.KEYID = 6
3,860,583 UART: [idev] SUBJECT.KEYID = 7
3,861,798 UART: [idev] UDS.KEYID = 0
3,864,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,636 UART: [idev] Erasing UDS.KEYID = 0
6,339,928 UART: [idev] Sha1 KeyId Algorithm
6,362,841 UART: [idev] --
6,366,995 UART: [ldev] ++
6,367,677 UART: [ldev] CDI.KEYID = 6
6,368,589 UART: [ldev] SUBJECT.KEYID = 5
6,369,751 UART: [ldev] AUTHORITY.KEYID = 7
6,370,988 UART: [ldev] FE.KEYID = 1
6,382,385 UART: [ldev] Erasing FE.KEYID = 1
8,858,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,126 UART: [ldev] --
10,650,803 UART: [fwproc] Wait for Commands...
10,653,550 UART: [fwproc] Recv command 0x46574c44
10,655,876 UART: [fwproc] Recv'd Img size: 118548 bytes
11,758,924 UART: ROM Fatal Error: 0x000B001A
11,762,562 >>> mbox cmd response: failed
11,762,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,763,257 >>> mbox cmd response: failed
11,763,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,763,828 >>> mbox cmd response: failed
Initializing fuses
2,059,840 writing to cptra_bootfsm_go
2,249,147 UART:
2,249,507 UART: Running Caliptra ROM ...
2,250,653 UART:
8,689,784 UART: [state] CFI Enabled
8,702,378 UART: [state] LifecycleState = Unprovisioned
8,704,815 UART: [state] DebugLocked = No
8,706,779 UART: [state] WD Timer not started. Device not locked for debugging
8,711,473 UART: [kat] SHA2-256
8,901,363 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,912,164 UART: [kat] ++
8,912,629 UART: [kat] sha1
8,925,218 UART: [kat] SHA2-256
8,928,249 UART: [kat] SHA2-384
8,933,430 UART: [kat] SHA2-512-ACC
8,936,038 UART: [kat] ECC-384
11,377,385 UART: [kat] HMAC-384Kdf
11,390,103 UART: [kat] LMS
11,921,936 UART: [kat] --
11,927,222 UART: [cold-reset] ++
11,928,779 UART: [fht] FHT @ 0x50003400
11,940,409 UART: [idev] ++
11,941,093 UART: [idev] CDI.KEYID = 6
11,942,120 UART: [idev] SUBJECT.KEYID = 7
11,943,225 UART: [idev] UDS.KEYID = 0
11,945,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,094,488 UART: [idev] Erasing UDS.KEYID = 0
14,424,609 UART: [idev] Sha1 KeyId Algorithm
14,446,727 UART: [idev] --
14,452,122 UART: [ldev] ++
14,452,844 UART: [ldev] CDI.KEYID = 6
14,453,932 UART: [ldev] SUBJECT.KEYID = 5
14,455,050 UART: [ldev] AUTHORITY.KEYID = 7
14,456,229 UART: [ldev] FE.KEYID = 1
14,467,530 UART: [ldev] Erasing FE.KEYID = 1
16,941,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,659,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,674,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,689,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,704,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,725,762 UART: [ldev] --
18,731,628 UART: [fwproc] Wait for Commands...
18,733,616 UART: [fwproc] Recv command 0x46574c44
18,735,884 UART: [fwproc] Recv'd Img size: 118548 bytes
22,235,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,311,042 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,434,629 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,994,266 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,757,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,537,651 >>> mbox cmd response: failed
11,538,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,538,547 >>> mbox cmd response: failed
11,538,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,539,172 >>> mbox cmd response: failed
Initializing fuses
2,059,628 writing to cptra_bootfsm_go
12,089,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,385,979 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,749 UART: [kat] SHA2-256
892,687 UART: [kat] SHA2-384
895,428 UART: [kat] SHA2-512-ACC
897,329 UART: [kat] ECC-384
902,954 UART: [kat] HMAC-384Kdf
907,462 UART: [kat] LMS
1,475,658 UART: [kat] --
1,476,609 UART: [cold-reset] ++
1,477,141 UART: [fht] Storing FHT @ 0x50003400
1,479,966 UART: [idev] ++
1,480,134 UART: [idev] CDI.KEYID = 6
1,480,494 UART: [idev] SUBJECT.KEYID = 7
1,480,918 UART: [idev] UDS.KEYID = 0
1,481,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,922 UART: [idev] Erasing UDS.KEYID = 0
1,505,418 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,894 UART: [idev] --
1,514,885 UART: [ldev] ++
1,515,053 UART: [ldev] CDI.KEYID = 6
1,515,416 UART: [ldev] SUBJECT.KEYID = 5
1,515,842 UART: [ldev] AUTHORITY.KEYID = 7
1,516,305 UART: [ldev] FE.KEYID = 1
1,521,527 UART: [ldev] Erasing FE.KEYID = 1
1,546,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,550 UART: [ldev] --
1,585,947 UART: [fwproc] Waiting for Commands...
1,586,750 UART: [fwproc] Received command 0x46574c44
1,587,541 UART: [fwproc] Received Image of size 118548 bytes
1,626,531 UART: ROM Fatal Error: 0x000B001A
1,627,690 >>> mbox cmd response: failed
1,627,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,696 >>> mbox cmd response: failed
1,627,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,702 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,999 UART: [kat] SHA2-256
881,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,045 UART: [kat] ++
886,197 UART: [kat] sha1
890,551 UART: [kat] SHA2-256
892,489 UART: [kat] SHA2-384
895,290 UART: [kat] SHA2-512-ACC
897,191 UART: [kat] ECC-384
902,760 UART: [kat] HMAC-384Kdf
907,218 UART: [kat] LMS
1,475,414 UART: [kat] --
1,476,171 UART: [cold-reset] ++
1,476,583 UART: [fht] Storing FHT @ 0x50003400
1,479,430 UART: [idev] ++
1,479,598 UART: [idev] CDI.KEYID = 6
1,479,958 UART: [idev] SUBJECT.KEYID = 7
1,480,382 UART: [idev] UDS.KEYID = 0
1,480,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,414 UART: [idev] Erasing UDS.KEYID = 0
1,504,710 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,378 UART: [idev] --
1,514,213 UART: [ldev] ++
1,514,381 UART: [ldev] CDI.KEYID = 6
1,514,744 UART: [ldev] SUBJECT.KEYID = 5
1,515,170 UART: [ldev] AUTHORITY.KEYID = 7
1,515,633 UART: [ldev] FE.KEYID = 1
1,520,871 UART: [ldev] Erasing FE.KEYID = 1
1,546,404 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,712 UART: [ldev] --
1,586,035 UART: [fwproc] Waiting for Commands...
1,586,898 UART: [fwproc] Received command 0x46574c44
1,587,689 UART: [fwproc] Received Image of size 118548 bytes
2,932,074 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,354 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,572 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,937 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,481,299 >>> mbox cmd response: failed
1,481,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,305 >>> mbox cmd response: failed
1,481,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,569 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Unprovisioned
85,710 UART: [state] DebugLocked = No
86,306 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,934 UART: [kat] SHA2-256
881,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,980 UART: [kat] ++
886,132 UART: [kat] sha1
890,276 UART: [kat] SHA2-256
892,214 UART: [kat] SHA2-384
895,035 UART: [kat] SHA2-512-ACC
896,936 UART: [kat] ECC-384
902,639 UART: [kat] HMAC-384Kdf
907,491 UART: [kat] LMS
1,475,687 UART: [kat] --
1,476,564 UART: [cold-reset] ++
1,477,000 UART: [fht] Storing FHT @ 0x50003400
1,479,763 UART: [idev] ++
1,479,931 UART: [idev] CDI.KEYID = 6
1,480,291 UART: [idev] SUBJECT.KEYID = 7
1,480,715 UART: [idev] UDS.KEYID = 0
1,481,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,417 UART: [idev] Erasing UDS.KEYID = 0
1,505,583 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,259 UART: [idev] --
1,515,154 UART: [ldev] ++
1,515,322 UART: [ldev] CDI.KEYID = 6
1,515,685 UART: [ldev] SUBJECT.KEYID = 5
1,516,111 UART: [ldev] AUTHORITY.KEYID = 7
1,516,574 UART: [ldev] FE.KEYID = 1
1,522,184 UART: [ldev] Erasing FE.KEYID = 1
1,548,137 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,933 UART: [ldev] --
1,587,256 UART: [fwproc] Waiting for Commands...
1,588,005 UART: [fwproc] Received command 0x46574c44
1,588,796 UART: [fwproc] Received Image of size 118548 bytes
1,629,358 UART: ROM Fatal Error: 0x000B001A
1,630,517 >>> mbox cmd response: failed
1,630,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,523 >>> mbox cmd response: failed
1,630,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,529 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,897 UART: [state] LifecycleState = Unprovisioned
85,552 UART: [state] DebugLocked = No
86,118 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,694 UART: [kat] SHA2-256
881,625 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,740 UART: [kat] ++
885,892 UART: [kat] sha1
890,116 UART: [kat] SHA2-256
892,054 UART: [kat] SHA2-384
894,885 UART: [kat] SHA2-512-ACC
896,786 UART: [kat] ECC-384
902,727 UART: [kat] HMAC-384Kdf
907,471 UART: [kat] LMS
1,475,667 UART: [kat] --
1,476,666 UART: [cold-reset] ++
1,477,020 UART: [fht] Storing FHT @ 0x50003400
1,479,839 UART: [idev] ++
1,480,007 UART: [idev] CDI.KEYID = 6
1,480,367 UART: [idev] SUBJECT.KEYID = 7
1,480,791 UART: [idev] UDS.KEYID = 0
1,481,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,039 UART: [idev] Erasing UDS.KEYID = 0
1,506,201 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,705 UART: [idev] --
1,515,896 UART: [ldev] ++
1,516,064 UART: [ldev] CDI.KEYID = 6
1,516,427 UART: [ldev] SUBJECT.KEYID = 5
1,516,853 UART: [ldev] AUTHORITY.KEYID = 7
1,517,316 UART: [ldev] FE.KEYID = 1
1,522,820 UART: [ldev] Erasing FE.KEYID = 1
1,548,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,067 UART: [ldev] --
1,587,432 UART: [fwproc] Waiting for Commands...
1,588,249 UART: [fwproc] Received command 0x46574c44
1,589,040 UART: [fwproc] Received Image of size 118548 bytes
2,933,403 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,303 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,521 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,726 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,480,804 >>> mbox cmd response: failed
1,480,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,810 >>> mbox cmd response: failed
1,480,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,076 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Unprovisioned
86,163 UART: [state] DebugLocked = No
86,881 UART: [state] WD Timer not started. Device not locked for debugging
88,188 UART: [kat] SHA2-256
891,738 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,296 UART: [kat] SHA2-256
902,236 UART: [kat] SHA2-384
904,995 UART: [kat] SHA2-512-ACC
906,896 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
920,927 UART: [kat] LMS
1,169,239 UART: [kat] --
1,170,424 UART: [cold-reset] ++
1,170,950 UART: [fht] FHT @ 0x50003400
1,173,574 UART: [idev] ++
1,173,742 UART: [idev] CDI.KEYID = 6
1,174,103 UART: [idev] SUBJECT.KEYID = 7
1,174,528 UART: [idev] UDS.KEYID = 0
1,174,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,783 UART: [idev] Erasing UDS.KEYID = 0
1,199,817 UART: [idev] Sha1 KeyId Algorithm
1,208,691 UART: [idev] --
1,209,752 UART: [ldev] ++
1,209,920 UART: [ldev] CDI.KEYID = 6
1,210,284 UART: [ldev] SUBJECT.KEYID = 5
1,210,711 UART: [ldev] AUTHORITY.KEYID = 7
1,211,174 UART: [ldev] FE.KEYID = 1
1,216,566 UART: [ldev] Erasing FE.KEYID = 1
1,242,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,368 UART: [ldev] --
1,281,663 UART: [fwproc] Wait for Commands...
1,282,322 UART: [fwproc] Recv command 0x46574c44
1,283,055 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,711 UART: ROM Fatal Error: 0x000B001A
1,322,870 >>> mbox cmd response: failed
1,322,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,876 >>> mbox cmd response: failed
1,322,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,882 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,774 UART: [state] LifecycleState = Unprovisioned
86,429 UART: [state] DebugLocked = No
87,041 UART: [state] WD Timer not started. Device not locked for debugging
88,250 UART: [kat] SHA2-256
891,800 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,164 UART: [kat] SHA2-256
902,104 UART: [kat] SHA2-384
904,927 UART: [kat] SHA2-512-ACC
906,828 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
920,929 UART: [kat] LMS
1,169,241 UART: [kat] --
1,170,182 UART: [cold-reset] ++
1,170,752 UART: [fht] FHT @ 0x50003400
1,173,516 UART: [idev] ++
1,173,684 UART: [idev] CDI.KEYID = 6
1,174,045 UART: [idev] SUBJECT.KEYID = 7
1,174,470 UART: [idev] UDS.KEYID = 0
1,174,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,931 UART: [idev] Erasing UDS.KEYID = 0
1,200,143 UART: [idev] Sha1 KeyId Algorithm
1,208,821 UART: [idev] --
1,209,846 UART: [ldev] ++
1,210,014 UART: [ldev] CDI.KEYID = 6
1,210,378 UART: [ldev] SUBJECT.KEYID = 5
1,210,805 UART: [ldev] AUTHORITY.KEYID = 7
1,211,268 UART: [ldev] FE.KEYID = 1
1,216,496 UART: [ldev] Erasing FE.KEYID = 1
1,243,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,962 UART: [ldev] --
1,282,295 UART: [fwproc] Wait for Commands...
1,283,090 UART: [fwproc] Recv command 0x46574c44
1,283,823 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,270 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,445 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,714 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,887 >>> mbox cmd response: failed
1,178,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,893 >>> mbox cmd response: failed
1,178,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,959 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
891,173 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,277 UART: [kat] ++
895,429 UART: [kat] sha1
899,651 UART: [kat] SHA2-256
901,591 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
915,986 UART: [kat] HMAC-384Kdf
920,736 UART: [kat] LMS
1,169,048 UART: [kat] --
1,169,901 UART: [cold-reset] ++
1,170,287 UART: [fht] FHT @ 0x50003400
1,172,875 UART: [idev] ++
1,173,043 UART: [idev] CDI.KEYID = 6
1,173,404 UART: [idev] SUBJECT.KEYID = 7
1,173,829 UART: [idev] UDS.KEYID = 0
1,174,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,552 UART: [idev] Erasing UDS.KEYID = 0
1,199,010 UART: [idev] Sha1 KeyId Algorithm
1,207,712 UART: [idev] --
1,208,659 UART: [ldev] ++
1,208,827 UART: [ldev] CDI.KEYID = 6
1,209,191 UART: [ldev] SUBJECT.KEYID = 5
1,209,618 UART: [ldev] AUTHORITY.KEYID = 7
1,210,081 UART: [ldev] FE.KEYID = 1
1,215,161 UART: [ldev] Erasing FE.KEYID = 1
1,241,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,603 UART: [ldev] --
1,281,000 UART: [fwproc] Wait for Commands...
1,281,757 UART: [fwproc] Recv command 0x46574c44
1,282,490 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,214 UART: ROM Fatal Error: 0x000B001A
1,322,373 >>> mbox cmd response: failed
1,322,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,379 >>> mbox cmd response: failed
1,322,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
87,084 UART: [state] WD Timer not started. Device not locked for debugging
88,299 UART: [kat] SHA2-256
891,849 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,953 UART: [kat] ++
896,105 UART: [kat] sha1
900,373 UART: [kat] SHA2-256
902,313 UART: [kat] SHA2-384
905,000 UART: [kat] SHA2-512-ACC
906,901 UART: [kat] ECC-384
916,562 UART: [kat] HMAC-384Kdf
921,242 UART: [kat] LMS
1,169,554 UART: [kat] --
1,170,369 UART: [cold-reset] ++
1,170,909 UART: [fht] FHT @ 0x50003400
1,173,651 UART: [idev] ++
1,173,819 UART: [idev] CDI.KEYID = 6
1,174,180 UART: [idev] SUBJECT.KEYID = 7
1,174,605 UART: [idev] UDS.KEYID = 0
1,174,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,672 UART: [idev] Erasing UDS.KEYID = 0
1,199,442 UART: [idev] Sha1 KeyId Algorithm
1,208,244 UART: [idev] --
1,209,267 UART: [ldev] ++
1,209,435 UART: [ldev] CDI.KEYID = 6
1,209,799 UART: [ldev] SUBJECT.KEYID = 5
1,210,226 UART: [ldev] AUTHORITY.KEYID = 7
1,210,689 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,242,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,983 UART: [ldev] --
1,282,428 UART: [fwproc] Wait for Commands...
1,283,207 UART: [fwproc] Recv command 0x46574c44
1,283,940 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,903 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,078 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,325 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,052 >>> mbox cmd response: failed
1,180,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,058 >>> mbox cmd response: failed
1,180,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,064 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,888 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
893,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,361 UART: [kat] ++
897,513 UART: [kat] sha1
901,875 UART: [kat] SHA2-256
903,815 UART: [kat] SHA2-384
906,634 UART: [kat] SHA2-512-ACC
908,535 UART: [kat] ECC-384
918,474 UART: [kat] HMAC-384Kdf
923,214 UART: [kat] LMS
1,171,542 UART: [kat] --
1,172,387 UART: [cold-reset] ++
1,172,947 UART: [fht] FHT @ 0x50003400
1,175,482 UART: [idev] ++
1,175,650 UART: [idev] CDI.KEYID = 6
1,176,010 UART: [idev] SUBJECT.KEYID = 7
1,176,434 UART: [idev] UDS.KEYID = 0
1,176,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,392 UART: [idev] Erasing UDS.KEYID = 0
1,201,241 UART: [idev] Sha1 KeyId Algorithm
1,209,599 UART: [idev] --
1,210,755 UART: [ldev] ++
1,210,923 UART: [ldev] CDI.KEYID = 6
1,211,286 UART: [ldev] SUBJECT.KEYID = 5
1,211,712 UART: [ldev] AUTHORITY.KEYID = 7
1,212,175 UART: [ldev] FE.KEYID = 1
1,217,249 UART: [ldev] Erasing FE.KEYID = 1
1,243,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,063 UART: [ldev] --
1,282,386 UART: [fwproc] Wait for Commands...
1,283,190 UART: [fwproc] Recv command 0x46574c44
1,283,918 UART: [fwproc] Recv'd Img size: 118548 bytes
1,323,094 UART: ROM Fatal Error: 0x000B001A
1,324,253 >>> mbox cmd response: failed
1,324,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,259 >>> mbox cmd response: failed
1,324,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
893,222 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,347 UART: [kat] ++
897,499 UART: [kat] sha1
901,613 UART: [kat] SHA2-256
903,553 UART: [kat] SHA2-384
906,114 UART: [kat] SHA2-512-ACC
908,015 UART: [kat] ECC-384
917,890 UART: [kat] HMAC-384Kdf
922,540 UART: [kat] LMS
1,170,868 UART: [kat] --
1,171,523 UART: [cold-reset] ++
1,171,853 UART: [fht] FHT @ 0x50003400
1,174,544 UART: [idev] ++
1,174,712 UART: [idev] CDI.KEYID = 6
1,175,072 UART: [idev] SUBJECT.KEYID = 7
1,175,496 UART: [idev] UDS.KEYID = 0
1,175,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,140 UART: [idev] Erasing UDS.KEYID = 0
1,199,823 UART: [idev] Sha1 KeyId Algorithm
1,208,337 UART: [idev] --
1,209,247 UART: [ldev] ++
1,209,415 UART: [ldev] CDI.KEYID = 6
1,209,778 UART: [ldev] SUBJECT.KEYID = 5
1,210,204 UART: [ldev] AUTHORITY.KEYID = 7
1,210,667 UART: [ldev] FE.KEYID = 1
1,215,969 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,581 UART: [ldev] --
1,281,886 UART: [fwproc] Wait for Commands...
1,282,574 UART: [fwproc] Recv command 0x46574c44
1,283,302 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,473 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,643 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,010 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,176,882 >>> mbox cmd response: failed
1,176,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,888 >>> mbox cmd response: failed
1,176,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,599 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
893,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,436 UART: [kat] ++
897,588 UART: [kat] sha1
901,810 UART: [kat] SHA2-256
903,750 UART: [kat] SHA2-384
906,297 UART: [kat] SHA2-512-ACC
908,198 UART: [kat] ECC-384
918,325 UART: [kat] HMAC-384Kdf
923,045 UART: [kat] LMS
1,171,373 UART: [kat] --
1,172,210 UART: [cold-reset] ++
1,172,644 UART: [fht] FHT @ 0x50003400
1,175,151 UART: [idev] ++
1,175,319 UART: [idev] CDI.KEYID = 6
1,175,679 UART: [idev] SUBJECT.KEYID = 7
1,176,103 UART: [idev] UDS.KEYID = 0
1,176,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,955 UART: [idev] Erasing UDS.KEYID = 0
1,201,230 UART: [idev] Sha1 KeyId Algorithm
1,209,642 UART: [idev] --
1,210,736 UART: [ldev] ++
1,210,904 UART: [ldev] CDI.KEYID = 6
1,211,267 UART: [ldev] SUBJECT.KEYID = 5
1,211,693 UART: [ldev] AUTHORITY.KEYID = 7
1,212,156 UART: [ldev] FE.KEYID = 1
1,217,106 UART: [ldev] Erasing FE.KEYID = 1
1,243,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,476 UART: [ldev] --
1,282,763 UART: [fwproc] Wait for Commands...
1,283,563 UART: [fwproc] Recv command 0x46574c44
1,284,291 UART: [fwproc] Recv'd Img size: 118548 bytes
1,323,831 UART: ROM Fatal Error: 0x000B001A
1,324,990 >>> mbox cmd response: failed
1,324,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,996 >>> mbox cmd response: failed
1,324,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,002 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
893,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,784 UART: [kat] ++
897,936 UART: [kat] sha1
902,284 UART: [kat] SHA2-256
904,224 UART: [kat] SHA2-384
906,981 UART: [kat] SHA2-512-ACC
908,882 UART: [kat] ECC-384
918,521 UART: [kat] HMAC-384Kdf
923,169 UART: [kat] LMS
1,171,497 UART: [kat] --
1,172,410 UART: [cold-reset] ++
1,172,918 UART: [fht] FHT @ 0x50003400
1,175,695 UART: [idev] ++
1,175,863 UART: [idev] CDI.KEYID = 6
1,176,223 UART: [idev] SUBJECT.KEYID = 7
1,176,647 UART: [idev] UDS.KEYID = 0
1,176,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,941 UART: [idev] Erasing UDS.KEYID = 0
1,201,846 UART: [idev] Sha1 KeyId Algorithm
1,210,502 UART: [idev] --
1,211,516 UART: [ldev] ++
1,211,684 UART: [ldev] CDI.KEYID = 6
1,212,047 UART: [ldev] SUBJECT.KEYID = 5
1,212,473 UART: [ldev] AUTHORITY.KEYID = 7
1,212,936 UART: [ldev] FE.KEYID = 1
1,218,356 UART: [ldev] Erasing FE.KEYID = 1
1,245,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,852 UART: [ldev] --
1,284,323 UART: [fwproc] Wait for Commands...
1,285,069 UART: [fwproc] Recv command 0x46574c44
1,285,797 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,580 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,750 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,919 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,329 >>> mbox cmd response: failed
1,179,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,335 >>> mbox cmd response: failed
1,179,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,341 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,052 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,447,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,387,177 >>> mbox cmd response: failed
11,387,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,388,317 >>> mbox cmd response: failed
11,388,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,388,887 >>> mbox cmd response: failed
Initializing fuses
2,071,421 writing to cptra_bootfsm_go
5,516,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,373,657 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,447,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,397,233 >>> mbox cmd response: failed
11,397,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,398,244 >>> mbox cmd response: failed
11,398,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,398,870 >>> mbox cmd response: failed
Initializing fuses
2,069,816 writing to cptra_bootfsm_go
5,506,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,340,152 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
3,778,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,596,356 >>> mbox cmd response: failed
11,596,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,597,297 >>> mbox cmd response: failed
11,597,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,597,863 >>> mbox cmd response: failed
Initializing fuses
2,061,284 writing to cptra_bootfsm_go
12,044,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,754,809 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
3,780,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,615,766 >>> mbox cmd response: failed
11,616,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,616,629 >>> mbox cmd response: failed
11,616,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,617,235 >>> mbox cmd response: failed
Initializing fuses
2,068,422 writing to cptra_bootfsm_go
12,032,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,733,645 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,463,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,375,155 >>> mbox cmd response: failed
11,375,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,376,217 >>> mbox cmd response: failed
11,376,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,376,781 >>> mbox cmd response: failed
Initializing fuses
2,069,583 writing to cptra_bootfsm_go
5,501,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,345,598 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,448,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,369,084 >>> mbox cmd response: failed
11,369,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,370,007 >>> mbox cmd response: failed
11,370,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,370,604 >>> mbox cmd response: failed
Initializing fuses
2,069,668 writing to cptra_bootfsm_go
5,515,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,334,917 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,544 writing to cptra_bootfsm_go
3,779,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,591,429 >>> mbox cmd response: failed
11,592,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,592,450 >>> mbox cmd response: failed
11,592,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,593,030 >>> mbox cmd response: failed
Initializing fuses
2,069,707 writing to cptra_bootfsm_go
12,053,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,764,282 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
3,784,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,600,229 >>> mbox cmd response: failed
11,600,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,601,252 >>> mbox cmd response: failed
11,601,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,601,841 >>> mbox cmd response: failed
Initializing fuses
2,068,952 writing to cptra_bootfsm_go
12,047,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,759,453 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,202,317 >>> mbox cmd response: failed
1,202,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,323 >>> mbox cmd response: failed
1,202,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,329 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,682 UART: [state] LifecycleState = Unprovisioned
85,337 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,128 UART: [kat] SHA2-256
890,678 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,782 UART: [kat] ++
894,934 UART: [kat] sha1
899,012 UART: [kat] SHA2-256
900,952 UART: [kat] SHA2-384
903,841 UART: [kat] SHA2-512-ACC
905,742 UART: [kat] ECC-384
915,395 UART: [kat] HMAC-384Kdf
919,953 UART: [kat] LMS
1,168,265 UART: [kat] --
1,168,904 UART: [cold-reset] ++
1,169,352 UART: [fht] FHT @ 0x50003400
1,171,848 UART: [idev] ++
1,172,016 UART: [idev] CDI.KEYID = 6
1,172,377 UART: [idev] SUBJECT.KEYID = 7
1,172,802 UART: [idev] UDS.KEYID = 0
1,173,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,413 UART: [idev] Erasing UDS.KEYID = 0
1,197,175 UART: [idev] Sha1 KeyId Algorithm
1,205,901 UART: [idev] --
1,206,808 UART: [ldev] ++
1,206,976 UART: [ldev] CDI.KEYID = 6
1,207,340 UART: [ldev] SUBJECT.KEYID = 5
1,207,767 UART: [ldev] AUTHORITY.KEYID = 7
1,208,230 UART: [ldev] FE.KEYID = 1
1,213,330 UART: [ldev] Erasing FE.KEYID = 1
1,239,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,528 UART: [ldev] --
1,278,763 UART: [fwproc] Wait for Commands...
1,279,410 UART: [fwproc] Recv command 0x46574c44
1,280,143 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,956 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,131 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,428 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,201,241 >>> mbox cmd response: failed
1,201,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,247 >>> mbox cmd response: failed
1,201,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,119 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,202,018 >>> mbox cmd response: failed
1,202,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,024 >>> mbox cmd response: failed
1,202,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,030 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,549 UART: [kat] ++
895,701 UART: [kat] sha1
900,033 UART: [kat] SHA2-256
901,973 UART: [kat] SHA2-384
904,780 UART: [kat] SHA2-512-ACC
906,681 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,922 UART: [kat] LMS
1,169,234 UART: [kat] --
1,169,865 UART: [cold-reset] ++
1,170,417 UART: [fht] FHT @ 0x50003400
1,173,311 UART: [idev] ++
1,173,479 UART: [idev] CDI.KEYID = 6
1,173,840 UART: [idev] SUBJECT.KEYID = 7
1,174,265 UART: [idev] UDS.KEYID = 0
1,174,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,954 UART: [idev] Erasing UDS.KEYID = 0
1,199,566 UART: [idev] Sha1 KeyId Algorithm
1,208,370 UART: [idev] --
1,209,353 UART: [ldev] ++
1,209,521 UART: [ldev] CDI.KEYID = 6
1,209,885 UART: [ldev] SUBJECT.KEYID = 5
1,210,312 UART: [ldev] AUTHORITY.KEYID = 7
1,210,775 UART: [ldev] FE.KEYID = 1
1,216,165 UART: [ldev] Erasing FE.KEYID = 1
1,242,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,297 UART: [ldev] --
1,281,696 UART: [fwproc] Wait for Commands...
1,282,493 UART: [fwproc] Recv command 0x46574c44
1,283,226 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,255 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,753 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,204,264 >>> mbox cmd response: failed
1,204,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,270 >>> mbox cmd response: failed
1,204,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,276 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,938 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,201,969 >>> mbox cmd response: failed
1,201,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,975 >>> mbox cmd response: failed
1,201,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,981 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,306 UART: [kat] SHA2-256
892,956 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,081 UART: [kat] ++
897,233 UART: [kat] sha1
901,563 UART: [kat] SHA2-256
903,503 UART: [kat] SHA2-384
906,254 UART: [kat] SHA2-512-ACC
908,155 UART: [kat] ECC-384
917,508 UART: [kat] HMAC-384Kdf
922,154 UART: [kat] LMS
1,170,482 UART: [kat] --
1,171,331 UART: [cold-reset] ++
1,171,717 UART: [fht] FHT @ 0x50003400
1,174,300 UART: [idev] ++
1,174,468 UART: [idev] CDI.KEYID = 6
1,174,828 UART: [idev] SUBJECT.KEYID = 7
1,175,252 UART: [idev] UDS.KEYID = 0
1,175,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,214 UART: [idev] Erasing UDS.KEYID = 0
1,199,587 UART: [idev] Sha1 KeyId Algorithm
1,208,111 UART: [idev] --
1,209,209 UART: [ldev] ++
1,209,377 UART: [ldev] CDI.KEYID = 6
1,209,740 UART: [ldev] SUBJECT.KEYID = 5
1,210,166 UART: [ldev] AUTHORITY.KEYID = 7
1,210,629 UART: [ldev] FE.KEYID = 1
1,215,439 UART: [ldev] Erasing FE.KEYID = 1
1,241,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,257 UART: [ldev] --
1,280,606 UART: [fwproc] Wait for Commands...
1,281,314 UART: [fwproc] Recv command 0x46574c44
1,282,042 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,369 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,539 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,738 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,203,815 >>> mbox cmd response: failed
1,203,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,821 >>> mbox cmd response: failed
1,203,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,827 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,225 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,201,496 >>> mbox cmd response: failed
1,201,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,502 >>> mbox cmd response: failed
1,201,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,508 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
893,603 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,728 UART: [kat] ++
897,880 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,817 UART: [kat] SHA2-512-ACC
908,718 UART: [kat] ECC-384
918,393 UART: [kat] HMAC-384Kdf
923,183 UART: [kat] LMS
1,171,511 UART: [kat] --
1,172,116 UART: [cold-reset] ++
1,172,682 UART: [fht] FHT @ 0x50003400
1,175,229 UART: [idev] ++
1,175,397 UART: [idev] CDI.KEYID = 6
1,175,757 UART: [idev] SUBJECT.KEYID = 7
1,176,181 UART: [idev] UDS.KEYID = 0
1,176,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,051 UART: [idev] Erasing UDS.KEYID = 0
1,201,240 UART: [idev] Sha1 KeyId Algorithm
1,209,660 UART: [idev] --
1,210,848 UART: [ldev] ++
1,211,016 UART: [ldev] CDI.KEYID = 6
1,211,379 UART: [ldev] SUBJECT.KEYID = 5
1,211,805 UART: [ldev] AUTHORITY.KEYID = 7
1,212,268 UART: [ldev] FE.KEYID = 1
1,217,346 UART: [ldev] Erasing FE.KEYID = 1
1,243,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,980 UART: [ldev] --
1,282,473 UART: [fwproc] Wait for Commands...
1,283,237 UART: [fwproc] Recv command 0x46574c44
1,283,965 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,570 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,740 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,939 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,202,366 >>> mbox cmd response: failed
1,202,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,372 >>> mbox cmd response: failed
1,202,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,378 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,118 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,139 UART:
192,505 UART: Running Caliptra ROM ...
193,696 UART:
193,851 UART: [state] CFI Enabled
265,077 UART: [state] LifecycleState = Unprovisioned
267,018 UART: [state] DebugLocked = No
269,475 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,707 UART: [kat] SHA2-256
444,415 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,879 UART: [kat] ++
455,476 UART: [kat] sha1
465,230 UART: [kat] SHA2-256
467,911 UART: [kat] SHA2-384
473,945 UART: [kat] SHA2-512-ACC
476,294 UART: [kat] ECC-384
2,766,093 UART: [kat] HMAC-384Kdf
2,777,206 UART: [kat] LMS
3,967,523 UART: [kat] --
3,972,410 UART: [cold-reset] ++
3,973,542 UART: [fht] Storing FHT @ 0x50003400
3,984,440 UART: [idev] ++
3,985,007 UART: [idev] CDI.KEYID = 6
3,986,032 UART: [idev] SUBJECT.KEYID = 7
3,987,196 UART: [idev] UDS.KEYID = 0
3,990,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,537 UART: [idev] Erasing UDS.KEYID = 0
7,324,678 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,122 UART: [idev] --
7,351,092 UART: [ldev] ++
7,351,670 UART: [ldev] CDI.KEYID = 6
7,352,640 UART: [ldev] SUBJECT.KEYID = 5
7,353,805 UART: [ldev] AUTHORITY.KEYID = 7
7,355,096 UART: [ldev] FE.KEYID = 1
7,401,071 UART: [ldev] Erasing FE.KEYID = 1
10,734,915 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,415 UART: [ldev] --
13,118,000 UART: [fwproc] Waiting for Commands...
13,120,510 UART: [fwproc] Received command 0x46574c44
13,122,702 UART: [fwproc] Received Image of size 118548 bytes
20,475,020 UART: ROM Fatal Error: 0x000B0038
20,478,435 >>> mbox cmd response: failed
20,478,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,479,204 >>> mbox cmd response: failed
20,479,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,479,778 >>> mbox cmd response: failed
Initializing fuses
2,059,584 writing to cptra_bootfsm_go
2,248,900 UART:
2,249,240 UART: Running Caliptra ROM ...
2,250,373 UART:
2,250,556 UART: [state] CFI Enabled
2,312,189 UART: [state] LifecycleState = Unprovisioned
2,314,128 UART: [state] DebugLocked = No
2,316,761 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,503 UART: [kat] SHA2-256
2,491,194 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,730 UART: [kat] ++
2,502,274 UART: [kat] sha1
2,513,228 UART: [kat] SHA2-256
2,515,963 UART: [kat] SHA2-384
2,522,889 UART: [kat] SHA2-512-ACC
2,525,246 UART: [kat] ECC-384
4,812,065 UART: [kat] HMAC-384Kdf
4,823,710 UART: [kat] LMS
6,014,038 UART: [kat] --
6,019,083 UART: [cold-reset] ++
6,020,404 UART: [fht] Storing FHT @ 0x50003400
6,033,152 UART: [idev] ++
6,033,763 UART: [idev] CDI.KEYID = 6
6,034,700 UART: [idev] SUBJECT.KEYID = 7
6,035,923 UART: [idev] UDS.KEYID = 0
6,038,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,187,559 UART: [idev] Erasing UDS.KEYID = 0
9,371,189 UART: [idev] Using Sha1 for KeyId Algorithm
9,393,179 UART: [idev] --
9,396,667 UART: [ldev] ++
9,397,248 UART: [ldev] CDI.KEYID = 6
9,398,226 UART: [ldev] SUBJECT.KEYID = 5
9,399,436 UART: [ldev] AUTHORITY.KEYID = 7
9,400,686 UART: [ldev] FE.KEYID = 1
9,446,182 UART: [ldev] Erasing FE.KEYID = 1
12,781,246 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,093,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,108,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,122,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,137,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,157,342 UART: [ldev] --
15,162,297 UART: [fwproc] Waiting for Commands...
15,164,570 UART: [fwproc] Received command 0x46574c44
15,166,759 UART: [fwproc] Received Image of size 118548 bytes
19,273,786 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,349,328 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,422,517 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,751,353 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,947 writing to cptra_bootfsm_go
3,789,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,281,618 >>> mbox cmd response: failed
20,282,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,282,832 >>> mbox cmd response: failed
20,283,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,283,402 >>> mbox cmd response: failed
Initializing fuses
2,054,609 writing to cptra_bootfsm_go
5,855,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,003,201 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,629 UART:
192,993 UART: Running Caliptra ROM ...
194,178 UART:
603,632 UART: [state] CFI Enabled
617,898 UART: [state] LifecycleState = Unprovisioned
619,779 UART: [state] DebugLocked = No
622,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,638 UART: [kat] SHA2-256
796,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,885 UART: [kat] ++
807,334 UART: [kat] sha1
818,566 UART: [kat] SHA2-256
821,255 UART: [kat] SHA2-384
828,691 UART: [kat] SHA2-512-ACC
831,034 UART: [kat] ECC-384
3,114,288 UART: [kat] HMAC-384Kdf
3,127,285 UART: [kat] LMS
4,317,407 UART: [kat] --
4,320,831 UART: [cold-reset] ++
4,322,014 UART: [fht] Storing FHT @ 0x50003400
4,334,797 UART: [idev] ++
4,335,374 UART: [idev] CDI.KEYID = 6
4,336,424 UART: [idev] SUBJECT.KEYID = 7
4,337,535 UART: [idev] UDS.KEYID = 0
4,340,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,456 UART: [idev] Erasing UDS.KEYID = 0
7,626,988 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,124 UART: [idev] --
7,650,914 UART: [ldev] ++
7,651,499 UART: [ldev] CDI.KEYID = 6
7,652,393 UART: [ldev] SUBJECT.KEYID = 5
7,653,585 UART: [ldev] AUTHORITY.KEYID = 7
7,654,927 UART: [ldev] FE.KEYID = 1
7,666,689 UART: [ldev] Erasing FE.KEYID = 1
10,952,705 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,448 UART: [ldev] --
13,313,504 UART: [fwproc] Waiting for Commands...
13,315,988 UART: [fwproc] Received command 0x46574c44
13,318,232 UART: [fwproc] Received Image of size 118548 bytes
20,988,422 UART: ROM Fatal Error: 0x000B0038
20,991,843 >>> mbox cmd response: failed
20,992,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,992,639 >>> mbox cmd response: failed
20,992,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,993,208 >>> mbox cmd response: failed
Initializing fuses
2,059,572 writing to cptra_bootfsm_go
2,248,894 UART:
2,249,237 UART: Running Caliptra ROM ...
2,250,470 UART:
2,660,098 UART: [state] CFI Enabled
2,672,491 UART: [state] LifecycleState = Unprovisioned
2,674,426 UART: [state] DebugLocked = No
2,677,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,682,997 UART: [kat] SHA2-256
2,852,735 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,863,248 UART: [kat] ++
2,863,708 UART: [kat] sha1
2,875,790 UART: [kat] SHA2-256
2,878,489 UART: [kat] SHA2-384
2,884,103 UART: [kat] SHA2-512-ACC
2,886,465 UART: [kat] ECC-384
5,172,083 UART: [kat] HMAC-384Kdf
5,183,784 UART: [kat] LMS
6,373,906 UART: [kat] --
6,376,150 UART: [cold-reset] ++
6,378,747 UART: [fht] Storing FHT @ 0x50003400
6,388,937 UART: [idev] ++
6,389,591 UART: [idev] CDI.KEYID = 6
6,390,503 UART: [idev] SUBJECT.KEYID = 7
6,391,723 UART: [idev] UDS.KEYID = 0
6,394,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,543,308 UART: [idev] Erasing UDS.KEYID = 0
9,675,672 UART: [idev] Using Sha1 for KeyId Algorithm
9,697,949 UART: [idev] --
9,701,917 UART: [ldev] ++
9,702,504 UART: [ldev] CDI.KEYID = 6
9,703,531 UART: [ldev] SUBJECT.KEYID = 5
9,704,740 UART: [ldev] AUTHORITY.KEYID = 7
9,705,931 UART: [ldev] FE.KEYID = 1
9,717,016 UART: [ldev] Erasing FE.KEYID = 1
13,003,294 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,296,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,310,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,325,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,339,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,359,126 UART: [ldev] --
15,363,965 UART: [fwproc] Waiting for Commands...
15,366,020 UART: [fwproc] Received command 0x46574c44
15,368,217 UART: [fwproc] Received Image of size 118548 bytes
19,470,952 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,549,202 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,622,397 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,950,737 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
4,128,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,939,909 >>> mbox cmd response: failed
19,940,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,941,002 >>> mbox cmd response: failed
19,941,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,941,583 >>> mbox cmd response: failed
Initializing fuses
2,055,908 writing to cptra_bootfsm_go
6,186,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,221,055 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,166 UART:
192,540 UART: Running Caliptra ROM ...
193,630 UART:
193,779 UART: [state] CFI Enabled
266,696 UART: [state] LifecycleState = Unprovisioned
269,215 UART: [state] DebugLocked = No
270,635 UART: [state] WD Timer not started. Device not locked for debugging
274,380 UART: [kat] SHA2-256
454,015 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,829 UART: [kat] ++
465,287 UART: [kat] sha1
476,814 UART: [kat] SHA2-256
479,510 UART: [kat] SHA2-384
485,711 UART: [kat] SHA2-512-ACC
488,057 UART: [kat] ECC-384
2,949,675 UART: [kat] HMAC-384Kdf
2,974,389 UART: [kat] LMS
3,450,854 UART: [kat] --
3,455,816 UART: [cold-reset] ++
3,456,724 UART: [fht] FHT @ 0x50003400
3,467,774 UART: [idev] ++
3,468,384 UART: [idev] CDI.KEYID = 6
3,469,321 UART: [idev] SUBJECT.KEYID = 7
3,470,542 UART: [idev] UDS.KEYID = 0
3,473,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,758 UART: [idev] Erasing UDS.KEYID = 0
5,989,748 UART: [idev] Sha1 KeyId Algorithm
6,013,216 UART: [idev] --
6,017,758 UART: [ldev] ++
6,018,336 UART: [ldev] CDI.KEYID = 6
6,019,227 UART: [ldev] SUBJECT.KEYID = 5
6,020,397 UART: [ldev] AUTHORITY.KEYID = 7
6,021,749 UART: [ldev] FE.KEYID = 1
6,060,645 UART: [ldev] Erasing FE.KEYID = 1
8,568,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,539 UART: [ldev] --
10,376,437 UART: [fwproc] Wait for Commands...
10,378,703 UART: [fwproc] Recv command 0x46574c44
10,380,698 UART: [fwproc] Recv'd Img size: 118548 bytes
13,491,110 UART: ROM Fatal Error: 0x000B0038
13,494,405 >>> mbox cmd response: failed
13,494,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,495,074 >>> mbox cmd response: failed
13,495,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,495,692 >>> mbox cmd response: failed
Initializing fuses
2,060,207 writing to cptra_bootfsm_go
2,249,516 UART:
2,249,862 UART: Running Caliptra ROM ...
2,251,003 UART:
2,251,181 UART: [state] CFI Enabled
2,318,002 UART: [state] LifecycleState = Unprovisioned
2,319,946 UART: [state] DebugLocked = No
2,322,586 UART: [state] WD Timer not started. Device not locked for debugging
2,326,503 UART: [kat] SHA2-256
2,506,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,516,915 UART: [kat] ++
2,517,383 UART: [kat] sha1
2,527,563 UART: [kat] SHA2-256
2,530,263 UART: [kat] SHA2-384
2,536,461 UART: [kat] SHA2-512-ACC
2,538,812 UART: [kat] ECC-384
5,004,780 UART: [kat] HMAC-384Kdf
5,016,974 UART: [kat] LMS
5,493,442 UART: [kat] --
5,498,159 UART: [cold-reset] ++
5,499,669 UART: [fht] FHT @ 0x50003400
5,511,902 UART: [idev] ++
5,512,476 UART: [idev] CDI.KEYID = 6
5,513,499 UART: [idev] SUBJECT.KEYID = 7
5,514,669 UART: [idev] UDS.KEYID = 0
5,517,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,666,782 UART: [idev] Erasing UDS.KEYID = 0
8,032,576 UART: [idev] Sha1 KeyId Algorithm
8,056,077 UART: [idev] --
8,060,973 UART: [ldev] ++
8,061,559 UART: [ldev] CDI.KEYID = 6
8,062,466 UART: [ldev] SUBJECT.KEYID = 5
8,063,700 UART: [ldev] AUTHORITY.KEYID = 7
8,064,943 UART: [ldev] FE.KEYID = 1
8,104,279 UART: [ldev] Erasing FE.KEYID = 1
10,609,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,345,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,361,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,376,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,392,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,414,300 UART: [ldev] --
12,419,628 UART: [fwproc] Wait for Commands...
12,422,331 UART: [fwproc] Recv command 0x46574c44
12,424,376 UART: [fwproc] Recv'd Img size: 118548 bytes
15,908,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,989,172 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,062,181 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,390,336 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,462,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,437,438 >>> mbox cmd response: failed
13,437,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,438,341 >>> mbox cmd response: failed
13,438,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,438,914 >>> mbox cmd response: failed
Initializing fuses
2,054,359 writing to cptra_bootfsm_go
5,510,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,246,978 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,649 UART:
193,018 UART: Running Caliptra ROM ...
194,122 UART:
603,970 UART: [state] CFI Enabled
618,041 UART: [state] LifecycleState = Unprovisioned
619,975 UART: [state] DebugLocked = No
621,439 UART: [state] WD Timer not started. Device not locked for debugging
625,998 UART: [kat] SHA2-256
805,633 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,427 UART: [kat] ++
816,919 UART: [kat] sha1
827,912 UART: [kat] SHA2-256
830,595 UART: [kat] SHA2-384
835,777 UART: [kat] SHA2-512-ACC
838,124 UART: [kat] ECC-384
3,277,822 UART: [kat] HMAC-384Kdf
3,288,978 UART: [kat] LMS
3,765,510 UART: [kat] --
3,769,733 UART: [cold-reset] ++
3,772,209 UART: [fht] FHT @ 0x50003400
3,784,399 UART: [idev] ++
3,784,970 UART: [idev] CDI.KEYID = 6
3,785,946 UART: [idev] SUBJECT.KEYID = 7
3,787,161 UART: [idev] UDS.KEYID = 0
3,790,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,399 UART: [idev] Erasing UDS.KEYID = 0
6,258,389 UART: [idev] Sha1 KeyId Algorithm
6,281,303 UART: [idev] --
6,285,061 UART: [ldev] ++
6,285,645 UART: [ldev] CDI.KEYID = 6
6,286,560 UART: [ldev] SUBJECT.KEYID = 5
6,287,777 UART: [ldev] AUTHORITY.KEYID = 7
6,289,010 UART: [ldev] FE.KEYID = 1
6,301,498 UART: [ldev] Erasing FE.KEYID = 1
8,775,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,495,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,511,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,527,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,542,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,563,556 UART: [ldev] --
10,568,505 UART: [fwproc] Wait for Commands...
10,570,766 UART: [fwproc] Recv command 0x46574c44
10,572,757 UART: [fwproc] Recv'd Img size: 118548 bytes
13,692,463 UART: ROM Fatal Error: 0x000B0038
13,695,702 >>> mbox cmd response: failed
13,696,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,696,492 >>> mbox cmd response: failed
13,696,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,697,063 >>> mbox cmd response: failed
Initializing fuses
2,054,525 writing to cptra_bootfsm_go
2,243,812 UART:
2,244,145 UART: Running Caliptra ROM ...
2,245,287 UART:
6,774,767 UART: [state] CFI Enabled
6,789,092 UART: [state] LifecycleState = Unprovisioned
6,791,015 UART: [state] DebugLocked = No
6,793,356 UART: [state] WD Timer not started. Device not locked for debugging
6,797,587 UART: [kat] SHA2-256
6,977,243 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,988,048 UART: [kat] ++
6,988,513 UART: [kat] sha1
6,999,302 UART: [kat] SHA2-256
7,001,998 UART: [kat] SHA2-384
7,007,890 UART: [kat] SHA2-512-ACC
7,010,217 UART: [kat] ECC-384
9,451,133 UART: [kat] HMAC-384Kdf
9,463,263 UART: [kat] LMS
9,939,793 UART: [kat] --
9,944,501 UART: [cold-reset] ++
9,945,900 UART: [fht] FHT @ 0x50003400
9,958,662 UART: [idev] ++
9,959,284 UART: [idev] CDI.KEYID = 6
9,960,226 UART: [idev] SUBJECT.KEYID = 7
9,961,447 UART: [idev] UDS.KEYID = 0
9,964,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,113,413 UART: [idev] Erasing UDS.KEYID = 0
12,438,003 UART: [idev] Sha1 KeyId Algorithm
12,461,836 UART: [idev] --
12,466,810 UART: [ldev] ++
12,467,389 UART: [ldev] CDI.KEYID = 6
12,468,374 UART: [ldev] SUBJECT.KEYID = 5
12,469,540 UART: [ldev] AUTHORITY.KEYID = 7
12,470,772 UART: [ldev] FE.KEYID = 1
12,480,826 UART: [ldev] Erasing FE.KEYID = 1
14,958,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,679,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,694,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,710,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,726,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,749,254 UART: [ldev] --
16,753,938 UART: [fwproc] Wait for Commands...
16,756,419 UART: [fwproc] Recv command 0x46574c44
16,758,462 UART: [fwproc] Recv'd Img size: 118548 bytes
20,239,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,318,146 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,391,169 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,719,384 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,782,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,648,314 >>> mbox cmd response: failed
13,648,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,649,246 >>> mbox cmd response: failed
13,649,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,649,814 >>> mbox cmd response: failed
Initializing fuses
2,060,651 writing to cptra_bootfsm_go
9,994,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,658,060 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,118 UART:
192,490 UART: Running Caliptra ROM ...
193,679 UART:
193,838 UART: [state] CFI Enabled
266,824 UART: [state] LifecycleState = Unprovisioned
269,249 UART: [state] DebugLocked = No
271,178 UART: [state] WD Timer not started. Device not locked for debugging
276,395 UART: [kat] SHA2-256
466,279 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,076 UART: [kat] ++
477,562 UART: [kat] sha1
488,499 UART: [kat] SHA2-256
491,520 UART: [kat] SHA2-384
497,775 UART: [kat] SHA2-512-ACC
500,336 UART: [kat] ECC-384
2,948,927 UART: [kat] HMAC-384Kdf
2,972,873 UART: [kat] LMS
3,504,655 UART: [kat] --
3,510,334 UART: [cold-reset] ++
3,512,330 UART: [fht] FHT @ 0x50003400
3,524,418 UART: [idev] ++
3,525,112 UART: [idev] CDI.KEYID = 6
3,526,002 UART: [idev] SUBJECT.KEYID = 7
3,527,225 UART: [idev] UDS.KEYID = 0
3,530,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,679,571 UART: [idev] Erasing UDS.KEYID = 0
6,029,307 UART: [idev] Sha1 KeyId Algorithm
6,051,414 UART: [idev] --
6,056,476 UART: [ldev] ++
6,057,176 UART: [ldev] CDI.KEYID = 6
6,058,100 UART: [ldev] SUBJECT.KEYID = 5
6,059,270 UART: [ldev] AUTHORITY.KEYID = 7
6,060,456 UART: [ldev] FE.KEYID = 1
6,101,461 UART: [ldev] Erasing FE.KEYID = 1
8,608,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,192 UART: [ldev] --
10,411,949 UART: [fwproc] Wait for Commands...
10,414,266 UART: [fwproc] Recv command 0x46574c44
10,416,583 UART: [fwproc] Recv'd Img size: 118548 bytes
13,659,303 UART: ROM Fatal Error: 0x000B0038
13,662,775 >>> mbox cmd response: failed
13,663,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,663,464 >>> mbox cmd response: failed
13,663,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,664,076 >>> mbox cmd response: failed
Initializing fuses
2,067,575 writing to cptra_bootfsm_go
2,256,927 UART:
2,257,268 UART: Running Caliptra ROM ...
2,258,318 UART:
2,258,476 UART: [state] CFI Enabled
2,323,273 UART: [state] LifecycleState = Unprovisioned
2,325,662 UART: [state] DebugLocked = No
2,327,713 UART: [state] WD Timer not started. Device not locked for debugging
2,332,455 UART: [kat] SHA2-256
2,522,348 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,533,143 UART: [kat] ++
2,533,607 UART: [kat] sha1
2,545,882 UART: [kat] SHA2-256
2,548,903 UART: [kat] SHA2-384
2,554,803 UART: [kat] SHA2-512-ACC
2,557,398 UART: [kat] ECC-384
5,005,107 UART: [kat] HMAC-384Kdf
5,027,956 UART: [kat] LMS
5,559,711 UART: [kat] --
5,563,969 UART: [cold-reset] ++
5,565,539 UART: [fht] FHT @ 0x50003400
5,576,702 UART: [idev] ++
5,577,390 UART: [idev] CDI.KEYID = 6
5,578,334 UART: [idev] SUBJECT.KEYID = 7
5,579,551 UART: [idev] UDS.KEYID = 0
5,582,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,732,170 UART: [idev] Erasing UDS.KEYID = 0
8,087,918 UART: [idev] Sha1 KeyId Algorithm
8,109,917 UART: [idev] --
8,115,757 UART: [ldev] ++
8,116,445 UART: [ldev] CDI.KEYID = 6
8,117,387 UART: [ldev] SUBJECT.KEYID = 5
8,118,552 UART: [ldev] AUTHORITY.KEYID = 7
8,119,794 UART: [ldev] FE.KEYID = 1
8,156,701 UART: [ldev] Erasing FE.KEYID = 1
10,663,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,850 UART: [ldev] --
12,470,650 UART: [fwproc] Wait for Commands...
12,473,033 UART: [fwproc] Recv command 0x46574c44
12,475,304 UART: [fwproc] Recv'd Img size: 118548 bytes
15,971,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,055,866 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,179,497 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,739,812 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,441,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,378,919 >>> mbox cmd response: failed
13,379,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,379,914 >>> mbox cmd response: failed
13,380,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,380,481 >>> mbox cmd response: failed
Initializing fuses
2,049,553 writing to cptra_bootfsm_go
5,480,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,871,703 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
192,552 UART:
192,912 UART: Running Caliptra ROM ...
194,033 UART:
603,725 UART: [state] CFI Enabled
616,699 UART: [state] LifecycleState = Unprovisioned
619,095 UART: [state] DebugLocked = No
621,454 UART: [state] WD Timer not started. Device not locked for debugging
625,958 UART: [kat] SHA2-256
815,829 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,649 UART: [kat] ++
827,177 UART: [kat] sha1
837,305 UART: [kat] SHA2-256
840,319 UART: [kat] SHA2-384
846,203 UART: [kat] SHA2-512-ACC
848,807 UART: [kat] ECC-384
3,288,375 UART: [kat] HMAC-384Kdf
3,300,448 UART: [kat] LMS
3,832,259 UART: [kat] --
3,837,553 UART: [cold-reset] ++
3,839,977 UART: [fht] FHT @ 0x50003400
3,852,152 UART: [idev] ++
3,852,840 UART: [idev] CDI.KEYID = 6
3,853,813 UART: [idev] SUBJECT.KEYID = 7
3,854,976 UART: [idev] UDS.KEYID = 0
3,857,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,075 UART: [idev] Erasing UDS.KEYID = 0
6,332,967 UART: [idev] Sha1 KeyId Algorithm
6,355,247 UART: [idev] --
6,361,517 UART: [ldev] ++
6,362,130 UART: [ldev] CDI.KEYID = 6
6,363,052 UART: [ldev] SUBJECT.KEYID = 5
6,364,170 UART: [ldev] AUTHORITY.KEYID = 7
6,365,372 UART: [ldev] FE.KEYID = 1
6,377,916 UART: [ldev] Erasing FE.KEYID = 1
8,855,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,715 UART: [ldev] --
10,646,633 UART: [fwproc] Wait for Commands...
10,648,149 UART: [fwproc] Recv command 0x46574c44
10,650,476 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,444 UART: ROM Fatal Error: 0x000B0038
13,915,892 >>> mbox cmd response: failed
13,916,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,916,682 >>> mbox cmd response: failed
13,916,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,917,284 >>> mbox cmd response: failed
Initializing fuses
2,062,583 writing to cptra_bootfsm_go
2,251,876 UART:
2,252,250 UART: Running Caliptra ROM ...
2,253,391 UART:
6,554,124 UART: [state] CFI Enabled
6,567,526 UART: [state] LifecycleState = Unprovisioned
6,569,948 UART: [state] DebugLocked = No
6,571,832 UART: [state] WD Timer not started. Device not locked for debugging
6,576,787 UART: [kat] SHA2-256
6,766,650 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,777,458 UART: [kat] ++
6,778,086 UART: [kat] sha1
6,789,910 UART: [kat] SHA2-256
6,792,938 UART: [kat] SHA2-384
6,799,909 UART: [kat] SHA2-512-ACC
6,802,489 UART: [kat] ECC-384
9,246,855 UART: [kat] HMAC-384Kdf
9,260,232 UART: [kat] LMS
9,792,052 UART: [kat] --
9,795,456 UART: [cold-reset] ++
9,797,931 UART: [fht] FHT @ 0x50003400
9,808,649 UART: [idev] ++
9,809,369 UART: [idev] CDI.KEYID = 6
9,810,266 UART: [idev] SUBJECT.KEYID = 7
9,811,486 UART: [idev] UDS.KEYID = 0
9,813,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,962,741 UART: [idev] Erasing UDS.KEYID = 0
12,288,442 UART: [idev] Sha1 KeyId Algorithm
12,310,386 UART: [idev] --
12,314,758 UART: [ldev] ++
12,315,440 UART: [ldev] CDI.KEYID = 6
12,316,324 UART: [ldev] SUBJECT.KEYID = 5
12,317,538 UART: [ldev] AUTHORITY.KEYID = 7
12,318,773 UART: [ldev] FE.KEYID = 1
12,331,508 UART: [ldev] Erasing FE.KEYID = 1
14,805,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,526,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,541,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,556,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,571,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,592,760 UART: [ldev] --
16,598,136 UART: [fwproc] Wait for Commands...
16,600,777 UART: [fwproc] Recv command 0x46574c44
16,603,064 UART: [fwproc] Recv'd Img size: 118548 bytes
20,101,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,181,963 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,305,606 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,865,521 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,757,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,571,011 >>> mbox cmd response: failed
13,571,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,571,974 >>> mbox cmd response: failed
13,572,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,572,558 >>> mbox cmd response: failed
Initializing fuses
2,048,818 writing to cptra_bootfsm_go
10,060,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,343,180 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,341 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,873 UART: [kat] SHA2-256
881,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,919 UART: [kat] ++
886,071 UART: [kat] sha1
890,277 UART: [kat] SHA2-256
892,215 UART: [kat] SHA2-384
894,884 UART: [kat] SHA2-512-ACC
896,785 UART: [kat] ECC-384
902,444 UART: [kat] HMAC-384Kdf
907,204 UART: [kat] LMS
1,475,400 UART: [kat] --
1,476,347 UART: [cold-reset] ++
1,476,797 UART: [fht] Storing FHT @ 0x50003400
1,479,490 UART: [idev] ++
1,479,658 UART: [idev] CDI.KEYID = 6
1,480,018 UART: [idev] SUBJECT.KEYID = 7
1,480,442 UART: [idev] UDS.KEYID = 0
1,480,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,226 UART: [idev] Erasing UDS.KEYID = 0
1,504,408 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,914 UART: [idev] --
1,514,013 UART: [ldev] ++
1,514,181 UART: [ldev] CDI.KEYID = 6
1,514,544 UART: [ldev] SUBJECT.KEYID = 5
1,514,970 UART: [ldev] AUTHORITY.KEYID = 7
1,515,433 UART: [ldev] FE.KEYID = 1
1,520,547 UART: [ldev] Erasing FE.KEYID = 1
1,545,994 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,752 UART: [ldev] --
1,585,071 UART: [fwproc] Waiting for Commands...
1,585,720 UART: [fwproc] Received command 0x46574c44
1,586,511 UART: [fwproc] Received Image of size 118548 bytes
4,015,762 UART: ROM Fatal Error: 0x000B0038
4,016,919 >>> mbox cmd response: failed
4,016,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
4,016,925 >>> mbox cmd response: failed
4,016,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
4,016,931 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,431 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,015 UART: [kat] SHA2-256
881,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,061 UART: [kat] ++
886,213 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
894,972 UART: [kat] SHA2-512-ACC
896,873 UART: [kat] ECC-384
902,210 UART: [kat] HMAC-384Kdf
906,674 UART: [kat] LMS
1,474,870 UART: [kat] --
1,475,845 UART: [cold-reset] ++
1,476,395 UART: [fht] Storing FHT @ 0x50003400
1,479,262 UART: [idev] ++
1,479,430 UART: [idev] CDI.KEYID = 6
1,479,790 UART: [idev] SUBJECT.KEYID = 7
1,480,214 UART: [idev] UDS.KEYID = 0
1,480,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,082 UART: [idev] Erasing UDS.KEYID = 0
1,505,152 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,836 UART: [idev] --
1,514,807 UART: [ldev] ++
1,514,975 UART: [ldev] CDI.KEYID = 6
1,515,338 UART: [ldev] SUBJECT.KEYID = 5
1,515,764 UART: [ldev] AUTHORITY.KEYID = 7
1,516,227 UART: [ldev] FE.KEYID = 1
1,521,225 UART: [ldev] Erasing FE.KEYID = 1
1,546,500 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,376 UART: [ldev] --
1,585,651 UART: [fwproc] Waiting for Commands...
1,586,304 UART: [fwproc] Received command 0x46574c44
1,587,095 UART: [fwproc] Received Image of size 118548 bytes
2,930,568 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,956 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,174 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,443 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,566,766 >>> mbox cmd response: failed
3,566,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,566,772 >>> mbox cmd response: failed
3,566,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,566,778 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,571 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,059 UART: [state] LifecycleState = Unprovisioned
85,714 UART: [state] DebugLocked = No
86,204 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,788 UART: [kat] SHA2-256
881,719 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,834 UART: [kat] ++
885,986 UART: [kat] sha1
890,404 UART: [kat] SHA2-256
892,342 UART: [kat] SHA2-384
895,223 UART: [kat] SHA2-512-ACC
897,124 UART: [kat] ECC-384
903,155 UART: [kat] HMAC-384Kdf
907,935 UART: [kat] LMS
1,476,131 UART: [kat] --
1,476,784 UART: [cold-reset] ++
1,477,122 UART: [fht] Storing FHT @ 0x50003400
1,480,019 UART: [idev] ++
1,480,187 UART: [idev] CDI.KEYID = 6
1,480,547 UART: [idev] SUBJECT.KEYID = 7
1,480,971 UART: [idev] UDS.KEYID = 0
1,481,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,991 UART: [idev] Erasing UDS.KEYID = 0
1,505,149 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,773 UART: [idev] --
1,514,918 UART: [ldev] ++
1,515,086 UART: [ldev] CDI.KEYID = 6
1,515,449 UART: [ldev] SUBJECT.KEYID = 5
1,515,875 UART: [ldev] AUTHORITY.KEYID = 7
1,516,338 UART: [ldev] FE.KEYID = 1
1,521,736 UART: [ldev] Erasing FE.KEYID = 1
1,547,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,085 UART: [ldev] --
1,587,500 UART: [fwproc] Waiting for Commands...
1,588,335 UART: [fwproc] Received command 0x46574c44
1,589,126 UART: [fwproc] Received Image of size 118548 bytes
3,828,168 UART: ROM Fatal Error: 0x000B0038
3,829,325 >>> mbox cmd response: failed
3,829,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,829,331 >>> mbox cmd response: failed
3,829,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,829,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,194 UART: [kat] SHA2-256
882,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,240 UART: [kat] ++
886,392 UART: [kat] sha1
890,670 UART: [kat] SHA2-256
892,608 UART: [kat] SHA2-384
895,371 UART: [kat] SHA2-512-ACC
897,272 UART: [kat] ECC-384
902,805 UART: [kat] HMAC-384Kdf
907,655 UART: [kat] LMS
1,475,851 UART: [kat] --
1,476,702 UART: [cold-reset] ++
1,477,130 UART: [fht] Storing FHT @ 0x50003400
1,479,987 UART: [idev] ++
1,480,155 UART: [idev] CDI.KEYID = 6
1,480,515 UART: [idev] SUBJECT.KEYID = 7
1,480,939 UART: [idev] UDS.KEYID = 0
1,481,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,079 UART: [idev] Erasing UDS.KEYID = 0
1,505,705 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,417 UART: [idev] --
1,515,414 UART: [ldev] ++
1,515,582 UART: [ldev] CDI.KEYID = 6
1,515,945 UART: [ldev] SUBJECT.KEYID = 5
1,516,371 UART: [ldev] AUTHORITY.KEYID = 7
1,516,834 UART: [ldev] FE.KEYID = 1
1,521,790 UART: [ldev] Erasing FE.KEYID = 1
1,547,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,311 UART: [ldev] --
1,586,592 UART: [fwproc] Waiting for Commands...
1,587,261 UART: [fwproc] Received command 0x46574c44
1,588,052 UART: [fwproc] Received Image of size 118548 bytes
2,932,659 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,245 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,463 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,910 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,832,764 >>> mbox cmd response: failed
3,832,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,832,770 >>> mbox cmd response: failed
3,832,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,832,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,850 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,300 UART: [kat] SHA2-256
890,850 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,954 UART: [kat] ++
895,106 UART: [kat] sha1
899,444 UART: [kat] SHA2-256
901,384 UART: [kat] SHA2-384
904,285 UART: [kat] SHA2-512-ACC
906,186 UART: [kat] ECC-384
916,055 UART: [kat] HMAC-384Kdf
920,715 UART: [kat] LMS
1,169,027 UART: [kat] --
1,169,866 UART: [cold-reset] ++
1,170,206 UART: [fht] FHT @ 0x50003400
1,172,824 UART: [idev] ++
1,172,992 UART: [idev] CDI.KEYID = 6
1,173,353 UART: [idev] SUBJECT.KEYID = 7
1,173,778 UART: [idev] UDS.KEYID = 0
1,174,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,025 UART: [idev] Erasing UDS.KEYID = 0
1,198,649 UART: [idev] Sha1 KeyId Algorithm
1,207,657 UART: [idev] --
1,208,764 UART: [ldev] ++
1,208,932 UART: [ldev] CDI.KEYID = 6
1,209,296 UART: [ldev] SUBJECT.KEYID = 5
1,209,723 UART: [ldev] AUTHORITY.KEYID = 7
1,210,186 UART: [ldev] FE.KEYID = 1
1,215,440 UART: [ldev] Erasing FE.KEYID = 1
1,241,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,550 UART: [ldev] --
1,280,989 UART: [fwproc] Wait for Commands...
1,281,712 UART: [fwproc] Recv command 0x46574c44
1,282,445 UART: [fwproc] Recv'd Img size: 118548 bytes
1,860,979 UART: ROM Fatal Error: 0x000B0038
1,862,136 >>> mbox cmd response: failed
1,862,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,862,142 >>> mbox cmd response: failed
1,862,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,862,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,503 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
890,864 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,968 UART: [kat] ++
895,120 UART: [kat] sha1
899,546 UART: [kat] SHA2-256
901,486 UART: [kat] SHA2-384
904,291 UART: [kat] SHA2-512-ACC
906,192 UART: [kat] ECC-384
915,301 UART: [kat] HMAC-384Kdf
919,861 UART: [kat] LMS
1,168,173 UART: [kat] --
1,169,160 UART: [cold-reset] ++
1,169,488 UART: [fht] FHT @ 0x50003400
1,172,252 UART: [idev] ++
1,172,420 UART: [idev] CDI.KEYID = 6
1,172,781 UART: [idev] SUBJECT.KEYID = 7
1,173,206 UART: [idev] UDS.KEYID = 0
1,173,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,031 UART: [idev] Erasing UDS.KEYID = 0
1,197,671 UART: [idev] Sha1 KeyId Algorithm
1,206,407 UART: [idev] --
1,207,522 UART: [ldev] ++
1,207,690 UART: [ldev] CDI.KEYID = 6
1,208,054 UART: [ldev] SUBJECT.KEYID = 5
1,208,481 UART: [ldev] AUTHORITY.KEYID = 7
1,208,944 UART: [ldev] FE.KEYID = 1
1,214,000 UART: [ldev] Erasing FE.KEYID = 1
1,240,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,532 UART: [ldev] --
1,279,901 UART: [fwproc] Wait for Commands...
1,280,594 UART: [fwproc] Recv command 0x46574c44
1,281,327 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,650,990 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,165 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,822,330 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,731,963 >>> mbox cmd response: failed
1,731,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,731,969 >>> mbox cmd response: failed
1,731,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,731,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,107 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,557 UART: [kat] SHA2-256
901,497 UART: [kat] SHA2-384
904,176 UART: [kat] SHA2-512-ACC
906,077 UART: [kat] ECC-384
916,092 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,565 UART: [cold-reset] ++
1,169,893 UART: [fht] FHT @ 0x50003400
1,172,343 UART: [idev] ++
1,172,511 UART: [idev] CDI.KEYID = 6
1,172,872 UART: [idev] SUBJECT.KEYID = 7
1,173,297 UART: [idev] UDS.KEYID = 0
1,173,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,268 UART: [idev] Erasing UDS.KEYID = 0
1,198,492 UART: [idev] Sha1 KeyId Algorithm
1,207,254 UART: [idev] --
1,208,181 UART: [ldev] ++
1,208,349 UART: [ldev] CDI.KEYID = 6
1,208,713 UART: [ldev] SUBJECT.KEYID = 5
1,209,140 UART: [ldev] AUTHORITY.KEYID = 7
1,209,603 UART: [ldev] FE.KEYID = 1
1,215,009 UART: [ldev] Erasing FE.KEYID = 1
1,241,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,363 UART: [ldev] --
1,280,696 UART: [fwproc] Wait for Commands...
1,281,509 UART: [fwproc] Recv command 0x46574c44
1,282,242 UART: [fwproc] Recv'd Img size: 118548 bytes
1,876,004 UART: ROM Fatal Error: 0x000B0038
1,877,161 >>> mbox cmd response: failed
1,877,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,877,167 >>> mbox cmd response: failed
1,877,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,877,173 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,459 UART: [kat] ++
895,611 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
916,146 UART: [kat] HMAC-384Kdf
920,718 UART: [kat] LMS
1,169,030 UART: [kat] --
1,169,799 UART: [cold-reset] ++
1,170,141 UART: [fht] FHT @ 0x50003400
1,172,727 UART: [idev] ++
1,172,895 UART: [idev] CDI.KEYID = 6
1,173,256 UART: [idev] SUBJECT.KEYID = 7
1,173,681 UART: [idev] UDS.KEYID = 0
1,174,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,658 UART: [idev] Erasing UDS.KEYID = 0
1,198,906 UART: [idev] Sha1 KeyId Algorithm
1,207,728 UART: [idev] --
1,208,785 UART: [ldev] ++
1,208,953 UART: [ldev] CDI.KEYID = 6
1,209,317 UART: [ldev] SUBJECT.KEYID = 5
1,209,744 UART: [ldev] AUTHORITY.KEYID = 7
1,210,207 UART: [ldev] FE.KEYID = 1
1,215,587 UART: [ldev] Erasing FE.KEYID = 1
1,241,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,603 UART: [ldev] --
1,281,044 UART: [fwproc] Wait for Commands...
1,281,829 UART: [fwproc] Recv command 0x46574c44
1,282,562 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,073 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,248 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,489 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,719,094 >>> mbox cmd response: failed
1,719,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,100 >>> mbox cmd response: failed
1,719,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,106 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,838 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,438 UART: [state] LifecycleState = Unprovisioned
85,093 UART: [state] DebugLocked = No
85,733 UART: [state] WD Timer not started. Device not locked for debugging
86,922 UART: [kat] SHA2-256
892,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,697 UART: [kat] ++
896,849 UART: [kat] sha1
901,233 UART: [kat] SHA2-256
903,173 UART: [kat] SHA2-384
905,946 UART: [kat] SHA2-512-ACC
907,847 UART: [kat] ECC-384
917,534 UART: [kat] HMAC-384Kdf
922,098 UART: [kat] LMS
1,170,426 UART: [kat] --
1,171,193 UART: [cold-reset] ++
1,171,569 UART: [fht] FHT @ 0x50003400
1,174,314 UART: [idev] ++
1,174,482 UART: [idev] CDI.KEYID = 6
1,174,842 UART: [idev] SUBJECT.KEYID = 7
1,175,266 UART: [idev] UDS.KEYID = 0
1,175,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,504 UART: [idev] Erasing UDS.KEYID = 0
1,200,391 UART: [idev] Sha1 KeyId Algorithm
1,209,005 UART: [idev] --
1,210,197 UART: [ldev] ++
1,210,365 UART: [ldev] CDI.KEYID = 6
1,210,728 UART: [ldev] SUBJECT.KEYID = 5
1,211,154 UART: [ldev] AUTHORITY.KEYID = 7
1,211,617 UART: [ldev] FE.KEYID = 1
1,217,057 UART: [ldev] Erasing FE.KEYID = 1
1,243,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,295 UART: [ldev] --
1,282,594 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 118548 bytes
1,857,627 UART: ROM Fatal Error: 0x000B0038
1,858,784 >>> mbox cmd response: failed
1,858,784 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,858,790 >>> mbox cmd response: failed
1,858,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,858,796 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,828 UART: [state] LifecycleState = Unprovisioned
86,483 UART: [state] DebugLocked = No
87,069 UART: [state] WD Timer not started. Device not locked for debugging
88,358 UART: [kat] SHA2-256
894,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,133 UART: [kat] ++
898,285 UART: [kat] sha1
902,531 UART: [kat] SHA2-256
904,471 UART: [kat] SHA2-384
907,306 UART: [kat] SHA2-512-ACC
909,207 UART: [kat] ECC-384
918,930 UART: [kat] HMAC-384Kdf
923,620 UART: [kat] LMS
1,171,948 UART: [kat] --
1,172,901 UART: [cold-reset] ++
1,173,285 UART: [fht] FHT @ 0x50003400
1,175,924 UART: [idev] ++
1,176,092 UART: [idev] CDI.KEYID = 6
1,176,452 UART: [idev] SUBJECT.KEYID = 7
1,176,876 UART: [idev] UDS.KEYID = 0
1,177,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,286 UART: [idev] Erasing UDS.KEYID = 0
1,202,725 UART: [idev] Sha1 KeyId Algorithm
1,211,013 UART: [idev] --
1,212,059 UART: [ldev] ++
1,212,227 UART: [ldev] CDI.KEYID = 6
1,212,590 UART: [ldev] SUBJECT.KEYID = 5
1,213,016 UART: [ldev] AUTHORITY.KEYID = 7
1,213,479 UART: [ldev] FE.KEYID = 1
1,218,599 UART: [ldev] Erasing FE.KEYID = 1
1,245,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,163 UART: [ldev] --
1,284,490 UART: [fwproc] Wait for Commands...
1,285,178 UART: [fwproc] Recv command 0x46574c44
1,285,906 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,509 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,679 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,022 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,736,678 >>> mbox cmd response: failed
1,736,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,736,684 >>> mbox cmd response: failed
1,736,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,736,690 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,925 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
893,673 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,798 UART: [kat] ++
897,950 UART: [kat] sha1
902,110 UART: [kat] SHA2-256
904,050 UART: [kat] SHA2-384
906,825 UART: [kat] SHA2-512-ACC
908,726 UART: [kat] ECC-384
918,475 UART: [kat] HMAC-384Kdf
923,019 UART: [kat] LMS
1,171,347 UART: [kat] --
1,172,048 UART: [cold-reset] ++
1,172,478 UART: [fht] FHT @ 0x50003400
1,175,007 UART: [idev] ++
1,175,175 UART: [idev] CDI.KEYID = 6
1,175,535 UART: [idev] SUBJECT.KEYID = 7
1,175,959 UART: [idev] UDS.KEYID = 0
1,176,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,813 UART: [idev] Erasing UDS.KEYID = 0
1,200,998 UART: [idev] Sha1 KeyId Algorithm
1,209,398 UART: [idev] --
1,210,380 UART: [ldev] ++
1,210,548 UART: [ldev] CDI.KEYID = 6
1,210,911 UART: [ldev] SUBJECT.KEYID = 5
1,211,337 UART: [ldev] AUTHORITY.KEYID = 7
1,211,800 UART: [ldev] FE.KEYID = 1
1,217,168 UART: [ldev] Erasing FE.KEYID = 1
1,244,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,470 UART: [ldev] --
1,283,789 UART: [fwproc] Wait for Commands...
1,284,361 UART: [fwproc] Recv command 0x46574c44
1,285,089 UART: [fwproc] Recv'd Img size: 118548 bytes
1,876,599 UART: ROM Fatal Error: 0x000B0038
1,877,756 >>> mbox cmd response: failed
1,877,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,877,762 >>> mbox cmd response: failed
1,877,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,877,768 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
893,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,632 UART: [kat] ++
897,784 UART: [kat] sha1
902,140 UART: [kat] SHA2-256
904,080 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,603 UART: [kat] HMAC-384Kdf
923,201 UART: [kat] LMS
1,171,529 UART: [kat] --
1,172,176 UART: [cold-reset] ++
1,172,634 UART: [fht] FHT @ 0x50003400
1,175,277 UART: [idev] ++
1,175,445 UART: [idev] CDI.KEYID = 6
1,175,805 UART: [idev] SUBJECT.KEYID = 7
1,176,229 UART: [idev] UDS.KEYID = 0
1,176,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,315 UART: [idev] Erasing UDS.KEYID = 0
1,201,278 UART: [idev] Sha1 KeyId Algorithm
1,209,664 UART: [idev] --
1,210,682 UART: [ldev] ++
1,210,850 UART: [ldev] CDI.KEYID = 6
1,211,213 UART: [ldev] SUBJECT.KEYID = 5
1,211,639 UART: [ldev] AUTHORITY.KEYID = 7
1,212,102 UART: [ldev] FE.KEYID = 1
1,217,666 UART: [ldev] Erasing FE.KEYID = 1
1,244,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,876 UART: [ldev] --
1,283,241 UART: [fwproc] Wait for Commands...
1,283,835 UART: [fwproc] Recv command 0x46574c44
1,284,563 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,654 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,824 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,213 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,723,724 >>> mbox cmd response: failed
1,723,724 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,723,730 >>> mbox cmd response: failed
1,723,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,723,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,956 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,448,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,904,306 >>> mbox cmd response: failed
12,904,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,905,239 >>> mbox cmd response: failed
12,905,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,905,816 >>> mbox cmd response: failed
Initializing fuses
2,061,705 writing to cptra_bootfsm_go
5,508,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,340,217 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
3,445,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,908,040 >>> mbox cmd response: failed
12,908,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,909,151 >>> mbox cmd response: failed
12,909,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,909,754 >>> mbox cmd response: failed
Initializing fuses
2,056,441 writing to cptra_bootfsm_go
5,487,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,314,198 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,484 writing to cptra_bootfsm_go
3,774,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,117,740 >>> mbox cmd response: failed
13,118,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,118,883 >>> mbox cmd response: failed
13,119,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,119,450 >>> mbox cmd response: failed
Initializing fuses
2,054,147 writing to cptra_bootfsm_go
10,517,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,228,992 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,777,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,124,215 >>> mbox cmd response: failed
13,124,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,125,180 >>> mbox cmd response: failed
13,125,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,125,784 >>> mbox cmd response: failed
Initializing fuses
2,055,514 writing to cptra_bootfsm_go
10,520,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,240,445 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,450,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,925,794 >>> mbox cmd response: failed
12,926,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,926,758 >>> mbox cmd response: failed
12,927,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,927,394 >>> mbox cmd response: failed
Initializing fuses
2,054,395 writing to cptra_bootfsm_go
5,498,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,325,670 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,451,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,925,661 >>> mbox cmd response: failed
12,926,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,926,660 >>> mbox cmd response: failed
12,926,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,927,226 >>> mbox cmd response: failed
Initializing fuses
2,055,576 writing to cptra_bootfsm_go
5,496,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,331,622 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,778,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,115,359 >>> mbox cmd response: failed
13,116,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,116,666 >>> mbox cmd response: failed
13,116,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,117,246 >>> mbox cmd response: failed
Initializing fuses
2,055,993 writing to cptra_bootfsm_go
10,528,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,245,393 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,784,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,143,104 >>> mbox cmd response: failed
13,143,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,144,279 >>> mbox cmd response: failed
13,144,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,144,905 >>> mbox cmd response: failed
Initializing fuses
2,064,883 writing to cptra_bootfsm_go
10,505,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,210,255 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,483,389 >>> mbox cmd response: failed
1,483,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,395 >>> mbox cmd response: failed
1,483,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
890,982 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,086 UART: [kat] ++
895,238 UART: [kat] sha1
899,524 UART: [kat] SHA2-256
901,464 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
915,735 UART: [kat] HMAC-384Kdf
920,347 UART: [kat] LMS
1,168,659 UART: [kat] --
1,169,570 UART: [cold-reset] ++
1,170,042 UART: [fht] FHT @ 0x50003400
1,172,596 UART: [idev] ++
1,172,764 UART: [idev] CDI.KEYID = 6
1,173,125 UART: [idev] SUBJECT.KEYID = 7
1,173,550 UART: [idev] UDS.KEYID = 0
1,173,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,539 UART: [idev] Erasing UDS.KEYID = 0
1,198,681 UART: [idev] Sha1 KeyId Algorithm
1,207,559 UART: [idev] --
1,208,530 UART: [ldev] ++
1,208,698 UART: [ldev] CDI.KEYID = 6
1,209,062 UART: [ldev] SUBJECT.KEYID = 5
1,209,489 UART: [ldev] AUTHORITY.KEYID = 7
1,209,952 UART: [ldev] FE.KEYID = 1
1,214,904 UART: [ldev] Erasing FE.KEYID = 1
1,241,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,998 UART: [ldev] --
1,280,453 UART: [fwproc] Wait for Commands...
1,281,230 UART: [fwproc] Recv command 0x46574c44
1,281,963 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,052 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,227 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,588 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,469,591 >>> mbox cmd response: failed
1,469,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,469,597 >>> mbox cmd response: failed
1,469,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,469,603 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,059 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,480,723 >>> mbox cmd response: failed
1,480,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,729 >>> mbox cmd response: failed
1,480,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
87,114 UART: [state] WD Timer not started. Device not locked for debugging
88,331 UART: [kat] SHA2-256
891,881 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,985 UART: [kat] ++
896,137 UART: [kat] sha1
900,315 UART: [kat] SHA2-256
902,255 UART: [kat] SHA2-384
904,938 UART: [kat] SHA2-512-ACC
906,839 UART: [kat] ECC-384
916,516 UART: [kat] HMAC-384Kdf
921,144 UART: [kat] LMS
1,169,456 UART: [kat] --
1,170,373 UART: [cold-reset] ++
1,170,821 UART: [fht] FHT @ 0x50003400
1,173,353 UART: [idev] ++
1,173,521 UART: [idev] CDI.KEYID = 6
1,173,882 UART: [idev] SUBJECT.KEYID = 7
1,174,307 UART: [idev] UDS.KEYID = 0
1,174,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,426 UART: [idev] Erasing UDS.KEYID = 0
1,199,012 UART: [idev] Sha1 KeyId Algorithm
1,207,888 UART: [idev] --
1,209,033 UART: [ldev] ++
1,209,201 UART: [ldev] CDI.KEYID = 6
1,209,565 UART: [ldev] SUBJECT.KEYID = 5
1,209,992 UART: [ldev] AUTHORITY.KEYID = 7
1,210,455 UART: [ldev] FE.KEYID = 1
1,215,867 UART: [ldev] Erasing FE.KEYID = 1
1,242,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,439 UART: [ldev] --
1,281,664 UART: [fwproc] Wait for Commands...
1,282,251 UART: [fwproc] Recv command 0x46574c44
1,282,984 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,037 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,212 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,563 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,480,394 >>> mbox cmd response: failed
1,480,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,400 >>> mbox cmd response: failed
1,480,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,778 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,471,294 >>> mbox cmd response: failed
1,471,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,471,300 >>> mbox cmd response: failed
1,471,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,471,306 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
893,430 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,555 UART: [kat] ++
897,707 UART: [kat] sha1
901,887 UART: [kat] SHA2-256
903,827 UART: [kat] SHA2-384
906,648 UART: [kat] SHA2-512-ACC
908,549 UART: [kat] ECC-384
918,138 UART: [kat] HMAC-384Kdf
922,584 UART: [kat] LMS
1,170,912 UART: [kat] --
1,172,117 UART: [cold-reset] ++
1,172,673 UART: [fht] FHT @ 0x50003400
1,175,346 UART: [idev] ++
1,175,514 UART: [idev] CDI.KEYID = 6
1,175,874 UART: [idev] SUBJECT.KEYID = 7
1,176,298 UART: [idev] UDS.KEYID = 0
1,176,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,226 UART: [idev] Erasing UDS.KEYID = 0
1,201,825 UART: [idev] Sha1 KeyId Algorithm
1,210,121 UART: [idev] --
1,211,043 UART: [ldev] ++
1,211,211 UART: [ldev] CDI.KEYID = 6
1,211,574 UART: [ldev] SUBJECT.KEYID = 5
1,212,000 UART: [ldev] AUTHORITY.KEYID = 7
1,212,463 UART: [ldev] FE.KEYID = 1
1,217,669 UART: [ldev] Erasing FE.KEYID = 1
1,244,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,193 UART: [ldev] --
1,283,698 UART: [fwproc] Wait for Commands...
1,284,506 UART: [fwproc] Recv command 0x46574c44
1,285,234 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,464 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,665 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,835 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,010 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,480,507 >>> mbox cmd response: failed
1,480,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,513 >>> mbox cmd response: failed
1,480,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,519 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,071 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,476,915 >>> mbox cmd response: failed
1,476,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,921 >>> mbox cmd response: failed
1,476,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,927 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
893,523 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,648 UART: [kat] ++
897,800 UART: [kat] sha1
901,918 UART: [kat] SHA2-256
903,858 UART: [kat] SHA2-384
906,465 UART: [kat] SHA2-512-ACC
908,366 UART: [kat] ECC-384
918,183 UART: [kat] HMAC-384Kdf
922,635 UART: [kat] LMS
1,170,963 UART: [kat] --
1,171,874 UART: [cold-reset] ++
1,172,406 UART: [fht] FHT @ 0x50003400
1,175,245 UART: [idev] ++
1,175,413 UART: [idev] CDI.KEYID = 6
1,175,773 UART: [idev] SUBJECT.KEYID = 7
1,176,197 UART: [idev] UDS.KEYID = 0
1,176,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,463 UART: [idev] Erasing UDS.KEYID = 0
1,202,064 UART: [idev] Sha1 KeyId Algorithm
1,210,564 UART: [idev] --
1,211,628 UART: [ldev] ++
1,211,796 UART: [ldev] CDI.KEYID = 6
1,212,159 UART: [ldev] SUBJECT.KEYID = 5
1,212,585 UART: [ldev] AUTHORITY.KEYID = 7
1,213,048 UART: [ldev] FE.KEYID = 1
1,218,298 UART: [ldev] Erasing FE.KEYID = 1
1,244,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,622 UART: [ldev] --
1,283,983 UART: [fwproc] Wait for Commands...
1,284,589 UART: [fwproc] Recv command 0x46574c44
1,285,317 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,866 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,036 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,433 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,479,318 >>> mbox cmd response: failed
1,479,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,324 >>> mbox cmd response: failed
1,479,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,366 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
3,447,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,371,226 >>> mbox cmd response: failed
10,371,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,372,135 >>> mbox cmd response: failed
10,372,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,372,711 >>> mbox cmd response: failed
Initializing fuses
2,062,554 writing to cptra_bootfsm_go
5,512,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,360,776 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,445,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,412,961 >>> mbox cmd response: failed
10,413,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,413,930 >>> mbox cmd response: failed
10,414,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,414,521 >>> mbox cmd response: failed
Initializing fuses
2,067,426 writing to cptra_bootfsm_go
5,510,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,319,141 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
3,783,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,585,079 >>> mbox cmd response: failed
10,585,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,585,952 >>> mbox cmd response: failed
10,586,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,586,512 >>> mbox cmd response: failed
Initializing fuses
2,068,010 writing to cptra_bootfsm_go
13,055,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,762,475 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
3,783,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,586,256 >>> mbox cmd response: failed
10,586,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,587,186 >>> mbox cmd response: failed
10,587,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,587,746 >>> mbox cmd response: failed
Initializing fuses
2,061,280 writing to cptra_bootfsm_go
13,061,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,765,633 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,451,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,370,508 >>> mbox cmd response: failed
10,371,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,371,678 >>> mbox cmd response: failed
10,371,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,372,254 >>> mbox cmd response: failed
Initializing fuses
2,067,227 writing to cptra_bootfsm_go
5,509,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,351,260 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
3,454,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,372,393 >>> mbox cmd response: failed
10,372,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,373,336 >>> mbox cmd response: failed
10,373,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,373,929 >>> mbox cmd response: failed
Initializing fuses
2,062,564 writing to cptra_bootfsm_go
5,492,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,322,230 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,777,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,581,897 >>> mbox cmd response: failed
10,582,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,583,157 >>> mbox cmd response: failed
10,583,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,583,818 >>> mbox cmd response: failed
Initializing fuses
2,062,429 writing to cptra_bootfsm_go
13,061,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,767,879 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,777,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,578,591 >>> mbox cmd response: failed
10,579,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,579,763 >>> mbox cmd response: failed
10,580,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,580,344 >>> mbox cmd response: failed
Initializing fuses
2,061,065 writing to cptra_bootfsm_go
13,061,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,780,581 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,912 >>> mbox cmd response: failed
1,181,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,918 >>> mbox cmd response: failed
1,181,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,924 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,566 UART: [state] LifecycleState = Unprovisioned
86,221 UART: [state] DebugLocked = No
86,873 UART: [state] WD Timer not started. Device not locked for debugging
88,134 UART: [kat] SHA2-256
891,684 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,192 UART: [kat] SHA2-256
902,132 UART: [kat] SHA2-384
905,041 UART: [kat] SHA2-512-ACC
906,942 UART: [kat] ECC-384
916,813 UART: [kat] HMAC-384Kdf
921,305 UART: [kat] LMS
1,169,617 UART: [kat] --
1,170,346 UART: [cold-reset] ++
1,170,850 UART: [fht] FHT @ 0x50003400
1,173,534 UART: [idev] ++
1,173,702 UART: [idev] CDI.KEYID = 6
1,174,063 UART: [idev] SUBJECT.KEYID = 7
1,174,488 UART: [idev] UDS.KEYID = 0
1,174,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,565 UART: [idev] Erasing UDS.KEYID = 0
1,200,075 UART: [idev] Sha1 KeyId Algorithm
1,208,897 UART: [idev] --
1,210,034 UART: [ldev] ++
1,210,202 UART: [ldev] CDI.KEYID = 6
1,210,566 UART: [ldev] SUBJECT.KEYID = 5
1,210,993 UART: [ldev] AUTHORITY.KEYID = 7
1,211,456 UART: [ldev] FE.KEYID = 1
1,216,644 UART: [ldev] Erasing FE.KEYID = 1
1,242,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,258 UART: [ldev] --
1,281,623 UART: [fwproc] Wait for Commands...
1,282,310 UART: [fwproc] Recv command 0x46574c44
1,283,043 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,948 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,123 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,322 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,322 >>> mbox cmd response: failed
1,180,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,328 >>> mbox cmd response: failed
1,180,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,539 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,083 >>> mbox cmd response: failed
1,182,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,089 >>> mbox cmd response: failed
1,182,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,095 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,223 UART: [kat] ++
895,375 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
916,534 UART: [kat] HMAC-384Kdf
921,026 UART: [kat] LMS
1,169,338 UART: [kat] --
1,170,191 UART: [cold-reset] ++
1,170,665 UART: [fht] FHT @ 0x50003400
1,173,419 UART: [idev] ++
1,173,587 UART: [idev] CDI.KEYID = 6
1,173,948 UART: [idev] SUBJECT.KEYID = 7
1,174,373 UART: [idev] UDS.KEYID = 0
1,174,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,706 UART: [idev] Erasing UDS.KEYID = 0
1,200,566 UART: [idev] Sha1 KeyId Algorithm
1,209,380 UART: [idev] --
1,210,237 UART: [ldev] ++
1,210,405 UART: [ldev] CDI.KEYID = 6
1,210,769 UART: [ldev] SUBJECT.KEYID = 5
1,211,196 UART: [ldev] AUTHORITY.KEYID = 7
1,211,659 UART: [ldev] FE.KEYID = 1
1,217,115 UART: [ldev] Erasing FE.KEYID = 1
1,242,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,715 UART: [ldev] --
1,282,154 UART: [fwproc] Wait for Commands...
1,282,789 UART: [fwproc] Recv command 0x46574c44
1,283,522 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,117 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,292 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,667 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,665 >>> mbox cmd response: failed
1,182,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,671 >>> mbox cmd response: failed
1,182,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,236 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,278 >>> mbox cmd response: failed
1,182,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,284 >>> mbox cmd response: failed
1,182,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,734 UART: [state] LifecycleState = Unprovisioned
86,389 UART: [state] DebugLocked = No
86,941 UART: [state] WD Timer not started. Device not locked for debugging
88,202 UART: [kat] SHA2-256
893,852 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,977 UART: [kat] ++
898,129 UART: [kat] sha1
902,461 UART: [kat] SHA2-256
904,401 UART: [kat] SHA2-384
907,266 UART: [kat] SHA2-512-ACC
909,167 UART: [kat] ECC-384
918,840 UART: [kat] HMAC-384Kdf
923,460 UART: [kat] LMS
1,171,788 UART: [kat] --
1,172,639 UART: [cold-reset] ++
1,173,187 UART: [fht] FHT @ 0x50003400
1,175,710 UART: [idev] ++
1,175,878 UART: [idev] CDI.KEYID = 6
1,176,238 UART: [idev] SUBJECT.KEYID = 7
1,176,662 UART: [idev] UDS.KEYID = 0
1,177,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,720 UART: [idev] Erasing UDS.KEYID = 0
1,201,383 UART: [idev] Sha1 KeyId Algorithm
1,209,875 UART: [idev] --
1,210,921 UART: [ldev] ++
1,211,089 UART: [ldev] CDI.KEYID = 6
1,211,452 UART: [ldev] SUBJECT.KEYID = 5
1,211,878 UART: [ldev] AUTHORITY.KEYID = 7
1,212,341 UART: [ldev] FE.KEYID = 1
1,217,309 UART: [ldev] Erasing FE.KEYID = 1
1,243,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,453 UART: [ldev] --
1,282,862 UART: [fwproc] Wait for Commands...
1,283,484 UART: [fwproc] Recv command 0x46574c44
1,284,212 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,801 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,971 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,130 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,148 >>> mbox cmd response: failed
1,183,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,154 >>> mbox cmd response: failed
1,183,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,875 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,313 >>> mbox cmd response: failed
1,183,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,319 >>> mbox cmd response: failed
1,183,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,358 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
893,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,482 UART: [kat] ++
897,634 UART: [kat] sha1
901,850 UART: [kat] SHA2-256
903,790 UART: [kat] SHA2-384
906,509 UART: [kat] SHA2-512-ACC
908,410 UART: [kat] ECC-384
918,371 UART: [kat] HMAC-384Kdf
922,859 UART: [kat] LMS
1,171,187 UART: [kat] --
1,172,110 UART: [cold-reset] ++
1,172,492 UART: [fht] FHT @ 0x50003400
1,174,933 UART: [idev] ++
1,175,101 UART: [idev] CDI.KEYID = 6
1,175,461 UART: [idev] SUBJECT.KEYID = 7
1,175,885 UART: [idev] UDS.KEYID = 0
1,176,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,647 UART: [idev] Erasing UDS.KEYID = 0
1,200,536 UART: [idev] Sha1 KeyId Algorithm
1,208,996 UART: [idev] --
1,210,250 UART: [ldev] ++
1,210,418 UART: [ldev] CDI.KEYID = 6
1,210,781 UART: [ldev] SUBJECT.KEYID = 5
1,211,207 UART: [ldev] AUTHORITY.KEYID = 7
1,211,670 UART: [ldev] FE.KEYID = 1
1,216,748 UART: [ldev] Erasing FE.KEYID = 1
1,243,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,058 UART: [ldev] --
1,282,397 UART: [fwproc] Wait for Commands...
1,282,985 UART: [fwproc] Recv command 0x46574c44
1,283,713 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,552 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,722 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,035 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,839 >>> mbox cmd response: failed
1,182,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,845 >>> mbox cmd response: failed
1,182,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,912 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,230 UART:
192,570 UART: Running Caliptra ROM ...
193,740 UART:
193,898 UART: [state] CFI Enabled
265,376 UART: [state] LifecycleState = Unprovisioned
267,338 UART: [state] DebugLocked = No
269,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,792 UART: [kat] SHA2-256
443,506 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,014 UART: [kat] ++
454,499 UART: [kat] sha1
466,076 UART: [kat] SHA2-256
468,767 UART: [kat] SHA2-384
475,444 UART: [kat] SHA2-512-ACC
477,853 UART: [kat] ECC-384
2,764,943 UART: [kat] HMAC-384Kdf
2,797,536 UART: [kat] LMS
3,987,864 UART: [kat] --
3,992,721 UART: [cold-reset] ++
3,994,978 UART: [fht] Storing FHT @ 0x50003400
4,005,884 UART: [idev] ++
4,006,467 UART: [idev] CDI.KEYID = 6
4,007,491 UART: [idev] SUBJECT.KEYID = 7
4,008,653 UART: [idev] UDS.KEYID = 0
4,014,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,663 UART: [idev] Erasing UDS.KEYID = 0
7,347,296 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,820 UART: [idev] --
7,373,392 UART: [ldev] ++
7,373,964 UART: [ldev] CDI.KEYID = 6
7,374,932 UART: [ldev] SUBJECT.KEYID = 5
7,376,163 UART: [ldev] AUTHORITY.KEYID = 7
7,377,399 UART: [ldev] FE.KEYID = 1
7,421,461 UART: [ldev] Erasing FE.KEYID = 1
10,751,044 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,274 UART: [ldev] --
13,112,555 UART: [fwproc] Waiting for Commands...
13,115,043 UART: [fwproc] Received command 0x46574c44
13,117,240 UART: [fwproc] Received Image of size 118548 bytes
13,186,043 UART: ROM Fatal Error: 0x000B0007
13,189,512 >>> mbox cmd response: failed
13,189,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,190,315 >>> mbox cmd response: failed
13,190,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,190,884 >>> mbox cmd response: failed
Initializing fuses
2,064,867 writing to cptra_bootfsm_go
2,254,191 UART:
2,254,544 UART: Running Caliptra ROM ...
2,255,638 UART:
2,255,796 UART: [state] CFI Enabled
2,327,946 UART: [state] LifecycleState = Unprovisioned
2,329,887 UART: [state] DebugLocked = No
2,332,204 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,337,759 UART: [kat] SHA2-256
2,507,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,517,966 UART: [kat] ++
2,518,458 UART: [kat] sha1
2,528,755 UART: [kat] SHA2-256
2,531,451 UART: [kat] SHA2-384
2,537,451 UART: [kat] SHA2-512-ACC
2,539,803 UART: [kat] ECC-384
4,829,714 UART: [kat] HMAC-384Kdf
4,863,547 UART: [kat] LMS
6,053,831 UART: [kat] --
6,058,254 UART: [cold-reset] ++
6,060,402 UART: [fht] Storing FHT @ 0x50003400
6,071,573 UART: [idev] ++
6,072,142 UART: [idev] CDI.KEYID = 6
6,073,109 UART: [idev] SUBJECT.KEYID = 7
6,074,326 UART: [idev] UDS.KEYID = 0
6,077,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,226,972 UART: [idev] Erasing UDS.KEYID = 0
9,410,635 UART: [idev] Using Sha1 for KeyId Algorithm
9,432,231 UART: [idev] --
9,435,476 UART: [ldev] ++
9,436,048 UART: [ldev] CDI.KEYID = 6
9,437,185 UART: [ldev] SUBJECT.KEYID = 5
9,438,402 UART: [ldev] AUTHORITY.KEYID = 7
9,439,593 UART: [ldev] FE.KEYID = 1
9,484,647 UART: [ldev] Erasing FE.KEYID = 1
12,817,484 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,109,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,124,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,139,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,153,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,172,684 UART: [ldev] --
15,178,165 UART: [fwproc] Waiting for Commands...
15,180,237 UART: [fwproc] Received command 0x46574c44
15,182,430 UART: [fwproc] Received Image of size 118548 bytes
19,282,977 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,364,451 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,437,629 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,765,323 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,812,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,950,099 >>> mbox cmd response: failed
12,950,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,951,121 >>> mbox cmd response: failed
12,951,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,951,660 >>> mbox cmd response: failed
Initializing fuses
2,063,398 writing to cptra_bootfsm_go
5,853,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,985,399 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
192,475 UART:
192,853 UART: Running Caliptra ROM ...
193,938 UART:
603,733 UART: [state] CFI Enabled
619,337 UART: [state] LifecycleState = Unprovisioned
621,236 UART: [state] DebugLocked = No
623,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,993 UART: [kat] SHA2-256
797,758 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,295 UART: [kat] ++
808,743 UART: [kat] sha1
820,691 UART: [kat] SHA2-256
823,404 UART: [kat] SHA2-384
828,850 UART: [kat] SHA2-512-ACC
831,195 UART: [kat] ECC-384
3,115,854 UART: [kat] HMAC-384Kdf
3,128,262 UART: [kat] LMS
4,318,371 UART: [kat] --
4,322,727 UART: [cold-reset] ++
4,324,887 UART: [fht] Storing FHT @ 0x50003400
4,337,020 UART: [idev] ++
4,337,639 UART: [idev] CDI.KEYID = 6
4,338,565 UART: [idev] SUBJECT.KEYID = 7
4,339,793 UART: [idev] UDS.KEYID = 0
4,345,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,494,560 UART: [idev] Erasing UDS.KEYID = 0
7,624,029 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,069 UART: [idev] --
7,649,205 UART: [ldev] ++
7,649,795 UART: [ldev] CDI.KEYID = 6
7,650,778 UART: [ldev] SUBJECT.KEYID = 5
7,652,004 UART: [ldev] AUTHORITY.KEYID = 7
7,653,252 UART: [ldev] FE.KEYID = 1
7,663,471 UART: [ldev] Erasing FE.KEYID = 1
10,946,043 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,725 UART: [ldev] --
13,307,982 UART: [fwproc] Waiting for Commands...
13,309,707 UART: [fwproc] Received command 0x46574c44
13,311,933 UART: [fwproc] Received Image of size 118548 bytes
13,378,475 UART: ROM Fatal Error: 0x000B0007
13,381,942 >>> mbox cmd response: failed
13,382,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,382,721 >>> mbox cmd response: failed
13,382,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,383,288 >>> mbox cmd response: failed
Initializing fuses
2,062,704 writing to cptra_bootfsm_go
2,252,038 UART:
2,252,391 UART: Running Caliptra ROM ...
2,253,535 UART:
7,088,069 UART: [state] CFI Enabled
7,102,560 UART: [state] LifecycleState = Unprovisioned
7,104,478 UART: [state] DebugLocked = No
7,106,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,111,074 UART: [kat] SHA2-256
7,280,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,291,392 UART: [kat] ++
7,291,856 UART: [kat] sha1
7,303,175 UART: [kat] SHA2-256
7,305,873 UART: [kat] SHA2-384
7,312,460 UART: [kat] SHA2-512-ACC
7,314,819 UART: [kat] ECC-384
9,599,460 UART: [kat] HMAC-384Kdf
9,610,156 UART: [kat] LMS
10,800,235 UART: [kat] --
10,804,663 UART: [cold-reset] ++
10,806,489 UART: [fht] Storing FHT @ 0x50003400
10,818,354 UART: [idev] ++
10,818,985 UART: [idev] CDI.KEYID = 6
10,819,867 UART: [idev] SUBJECT.KEYID = 7
10,821,137 UART: [idev] UDS.KEYID = 0
10,824,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,973,028 UART: [idev] Erasing UDS.KEYID = 0
14,111,339 UART: [idev] Using Sha1 for KeyId Algorithm
14,133,648 UART: [idev] --
14,136,571 UART: [ldev] ++
14,137,145 UART: [ldev] CDI.KEYID = 6
14,138,121 UART: [ldev] SUBJECT.KEYID = 5
14,139,318 UART: [ldev] AUTHORITY.KEYID = 7
14,140,586 UART: [ldev] FE.KEYID = 1
14,153,313 UART: [ldev] Erasing FE.KEYID = 1
17,441,002 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,733,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,748,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,763,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,777,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,797,325 UART: [ldev] --
19,801,843 UART: [fwproc] Waiting for Commands...
19,803,948 UART: [fwproc] Received command 0x46574c44
19,806,139 UART: [fwproc] Received Image of size 118548 bytes
23,912,070 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,991,950 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,065,142 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,394,220 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,132,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,121,922 >>> mbox cmd response: failed
13,122,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,122,968 >>> mbox cmd response: failed
13,123,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,123,566 >>> mbox cmd response: failed
Initializing fuses
2,065,565 writing to cptra_bootfsm_go
10,871,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,901,138 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
192,205 UART:
192,607 UART: Running Caliptra ROM ...
193,734 UART:
193,885 UART: [state] CFI Enabled
264,416 UART: [state] LifecycleState = Unprovisioned
266,361 UART: [state] DebugLocked = No
267,917 UART: [state] WD Timer not started. Device not locked for debugging
272,399 UART: [kat] SHA2-256
452,055 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,855 UART: [kat] ++
463,400 UART: [kat] sha1
473,368 UART: [kat] SHA2-256
476,060 UART: [kat] SHA2-384
481,071 UART: [kat] SHA2-512-ACC
483,437 UART: [kat] ECC-384
2,946,227 UART: [kat] HMAC-384Kdf
2,970,411 UART: [kat] LMS
3,446,911 UART: [kat] --
3,450,963 UART: [cold-reset] ++
3,452,690 UART: [fht] FHT @ 0x50003400
3,463,944 UART: [idev] ++
3,464,551 UART: [idev] CDI.KEYID = 6
3,465,468 UART: [idev] SUBJECT.KEYID = 7
3,466,691 UART: [idev] UDS.KEYID = 0
3,469,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,042 UART: [idev] Erasing UDS.KEYID = 0
5,987,599 UART: [idev] Sha1 KeyId Algorithm
6,010,998 UART: [idev] --
6,015,759 UART: [ldev] ++
6,016,489 UART: [ldev] CDI.KEYID = 6
6,017,507 UART: [ldev] SUBJECT.KEYID = 5
6,018,626 UART: [ldev] AUTHORITY.KEYID = 7
6,019,814 UART: [ldev] FE.KEYID = 1
6,056,500 UART: [ldev] Erasing FE.KEYID = 1
8,566,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,497 UART: [ldev] --
10,377,261 UART: [fwproc] Wait for Commands...
10,378,879 UART: [fwproc] Recv command 0x46574c44
10,380,868 UART: [fwproc] Recv'd Img size: 118548 bytes
10,464,037 UART: ROM Fatal Error: 0x000B0007
10,467,311 >>> mbox cmd response: failed
10,467,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,468,004 >>> mbox cmd response: failed
10,468,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,468,534 >>> mbox cmd response: failed
Initializing fuses
2,056,911 writing to cptra_bootfsm_go
2,246,220 UART:
2,246,568 UART: Running Caliptra ROM ...
2,247,709 UART:
2,247,889 UART: [state] CFI Enabled
2,320,340 UART: [state] LifecycleState = Unprovisioned
2,322,283 UART: [state] DebugLocked = No
2,324,393 UART: [state] WD Timer not started. Device not locked for debugging
2,328,768 UART: [kat] SHA2-256
2,508,469 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,519,248 UART: [kat] ++
2,519,717 UART: [kat] sha1
2,530,880 UART: [kat] SHA2-256
2,533,577 UART: [kat] SHA2-384
2,540,922 UART: [kat] SHA2-512-ACC
2,543,276 UART: [kat] ECC-384
4,999,703 UART: [kat] HMAC-384Kdf
5,024,172 UART: [kat] LMS
5,500,664 UART: [kat] --
5,506,284 UART: [cold-reset] ++
5,508,544 UART: [fht] FHT @ 0x50003400
5,520,387 UART: [idev] ++
5,520,966 UART: [idev] CDI.KEYID = 6
5,521,952 UART: [idev] SUBJECT.KEYID = 7
5,523,188 UART: [idev] UDS.KEYID = 0
5,526,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,675,421 UART: [idev] Erasing UDS.KEYID = 0
8,039,846 UART: [idev] Sha1 KeyId Algorithm
8,062,997 UART: [idev] --
8,068,454 UART: [ldev] ++
8,069,031 UART: [ldev] CDI.KEYID = 6
8,070,010 UART: [ldev] SUBJECT.KEYID = 5
8,071,182 UART: [ldev] AUTHORITY.KEYID = 7
8,072,417 UART: [ldev] FE.KEYID = 1
8,110,782 UART: [ldev] Erasing FE.KEYID = 1
10,619,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,353,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,368,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,384,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,400,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,422,681 UART: [ldev] --
12,428,274 UART: [fwproc] Wait for Commands...
12,430,438 UART: [fwproc] Recv command 0x46574c44
12,432,442 UART: [fwproc] Recv'd Img size: 118548 bytes
15,920,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,000,660 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,073,728 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,401,355 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,461,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,353,009 >>> mbox cmd response: failed
10,353,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,354,024 >>> mbox cmd response: failed
10,354,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,354,666 >>> mbox cmd response: failed
Initializing fuses
2,057,371 writing to cptra_bootfsm_go
5,503,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,268,752 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,589 UART:
192,960 UART: Running Caliptra ROM ...
194,072 UART:
603,840 UART: [state] CFI Enabled
619,512 UART: [state] LifecycleState = Unprovisioned
621,455 UART: [state] DebugLocked = No
623,056 UART: [state] WD Timer not started. Device not locked for debugging
626,406 UART: [kat] SHA2-256
806,101 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,885 UART: [kat] ++
817,386 UART: [kat] sha1
827,459 UART: [kat] SHA2-256
830,151 UART: [kat] SHA2-384
837,061 UART: [kat] SHA2-512-ACC
839,400 UART: [kat] ECC-384
3,282,243 UART: [kat] HMAC-384Kdf
3,294,715 UART: [kat] LMS
3,771,193 UART: [kat] --
3,774,971 UART: [cold-reset] ++
3,777,233 UART: [fht] FHT @ 0x50003400
3,789,184 UART: [idev] ++
3,789,761 UART: [idev] CDI.KEYID = 6
3,790,735 UART: [idev] SUBJECT.KEYID = 7
3,791,953 UART: [idev] UDS.KEYID = 0
3,795,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,278 UART: [idev] Erasing UDS.KEYID = 0
6,271,083 UART: [idev] Sha1 KeyId Algorithm
6,294,870 UART: [idev] --
6,299,280 UART: [ldev] ++
6,299,869 UART: [ldev] CDI.KEYID = 6
6,300,790 UART: [ldev] SUBJECT.KEYID = 5
6,302,013 UART: [ldev] AUTHORITY.KEYID = 7
6,303,254 UART: [ldev] FE.KEYID = 1
6,316,010 UART: [ldev] Erasing FE.KEYID = 1
8,795,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,741 UART: [ldev] --
10,591,171 UART: [fwproc] Wait for Commands...
10,593,646 UART: [fwproc] Recv command 0x46574c44
10,595,655 UART: [fwproc] Recv'd Img size: 118548 bytes
10,678,117 UART: ROM Fatal Error: 0x000B0007
10,681,366 >>> mbox cmd response: failed
10,681,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,682,038 >>> mbox cmd response: failed
10,682,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,682,615 >>> mbox cmd response: failed
Initializing fuses
2,056,226 writing to cptra_bootfsm_go
2,245,628 UART:
2,245,973 UART: Running Caliptra ROM ...
2,247,065 UART:
9,785,687 UART: [state] CFI Enabled
9,800,937 UART: [state] LifecycleState = Unprovisioned
9,802,856 UART: [state] DebugLocked = No
9,805,119 UART: [state] WD Timer not started. Device not locked for debugging
9,809,310 UART: [kat] SHA2-256
9,988,994 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,999,741 UART: [kat] ++
10,000,211 UART: [kat] sha1
10,011,436 UART: [kat] SHA2-256
10,014,144 UART: [kat] SHA2-384
10,020,197 UART: [kat] SHA2-512-ACC
10,022,556 UART: [kat] ECC-384
12,467,413 UART: [kat] HMAC-384Kdf
12,480,868 UART: [kat] LMS
12,957,360 UART: [kat] --
12,960,643 UART: [cold-reset] ++
12,962,922 UART: [fht] FHT @ 0x50003400
12,973,201 UART: [idev] ++
12,973,826 UART: [idev] CDI.KEYID = 6
12,974,741 UART: [idev] SUBJECT.KEYID = 7
12,976,015 UART: [idev] UDS.KEYID = 0
12,978,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,127,903 UART: [idev] Erasing UDS.KEYID = 0
15,448,828 UART: [idev] Sha1 KeyId Algorithm
15,473,525 UART: [idev] --
15,479,788 UART: [ldev] ++
15,480,369 UART: [ldev] CDI.KEYID = 6
15,481,285 UART: [ldev] SUBJECT.KEYID = 5
15,482,505 UART: [ldev] AUTHORITY.KEYID = 7
15,483,762 UART: [ldev] FE.KEYID = 1
15,495,381 UART: [ldev] Erasing FE.KEYID = 1
17,971,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,690,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,706,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,722,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,738,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,759,876 UART: [ldev] --
19,765,237 UART: [fwproc] Wait for Commands...
19,768,267 UART: [fwproc] Recv command 0x46574c44
19,770,260 UART: [fwproc] Recv'd Img size: 118548 bytes
23,257,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,337,241 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,410,251 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,739,108 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
3,780,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,554,782 >>> mbox cmd response: failed
10,555,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,555,654 >>> mbox cmd response: failed
10,555,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,556,206 >>> mbox cmd response: failed
Initializing fuses
2,071,715 writing to cptra_bootfsm_go
13,093,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,768,376 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,095 UART:
192,512 UART: Running Caliptra ROM ...
193,662 UART:
193,820 UART: [state] CFI Enabled
267,297 UART: [state] LifecycleState = Unprovisioned
269,690 UART: [state] DebugLocked = No
271,139 UART: [state] WD Timer not started. Device not locked for debugging
276,331 UART: [kat] SHA2-256
466,217 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,964 UART: [kat] ++
477,443 UART: [kat] sha1
489,573 UART: [kat] SHA2-256
492,590 UART: [kat] SHA2-384
497,818 UART: [kat] SHA2-512-ACC
500,437 UART: [kat] ECC-384
2,947,942 UART: [kat] HMAC-384Kdf
2,971,196 UART: [kat] LMS
3,502,954 UART: [kat] --
3,508,191 UART: [cold-reset] ++
3,510,554 UART: [fht] FHT @ 0x50003400
3,522,133 UART: [idev] ++
3,522,874 UART: [idev] CDI.KEYID = 6
3,523,761 UART: [idev] SUBJECT.KEYID = 7
3,524,977 UART: [idev] UDS.KEYID = 0
3,530,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,679,873 UART: [idev] Erasing UDS.KEYID = 0
6,027,069 UART: [idev] Sha1 KeyId Algorithm
6,049,678 UART: [idev] --
6,055,685 UART: [ldev] ++
6,056,387 UART: [ldev] CDI.KEYID = 6
6,057,310 UART: [ldev] SUBJECT.KEYID = 5
6,058,479 UART: [ldev] AUTHORITY.KEYID = 7
6,059,684 UART: [ldev] FE.KEYID = 1
6,098,491 UART: [ldev] Erasing FE.KEYID = 1
8,602,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,475 UART: [ldev] --
10,410,149 UART: [fwproc] Wait for Commands...
10,413,167 UART: [fwproc] Recv command 0x46574c44
10,415,488 UART: [fwproc] Recv'd Img size: 118548 bytes
10,510,807 UART: ROM Fatal Error: 0x000B0007
10,514,470 >>> mbox cmd response: failed
10,514,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,515,311 >>> mbox cmd response: failed
10,515,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,515,904 >>> mbox cmd response: failed
Initializing fuses
2,057,683 writing to cptra_bootfsm_go
2,247,005 UART:
2,247,358 UART: Running Caliptra ROM ...
2,248,500 UART:
2,248,668 UART: [state] CFI Enabled
2,310,672 UART: [state] LifecycleState = Unprovisioned
2,313,041 UART: [state] DebugLocked = No
2,314,571 UART: [state] WD Timer not started. Device not locked for debugging
2,319,582 UART: [kat] SHA2-256
2,509,476 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,520,220 UART: [kat] ++
2,520,725 UART: [kat] sha1
2,532,220 UART: [kat] SHA2-256
2,535,202 UART: [kat] SHA2-384
2,541,800 UART: [kat] SHA2-512-ACC
2,544,419 UART: [kat] ECC-384
4,992,408 UART: [kat] HMAC-384Kdf
5,017,884 UART: [kat] LMS
5,549,671 UART: [kat] --
5,555,557 UART: [cold-reset] ++
5,557,166 UART: [fht] FHT @ 0x50003400
5,569,283 UART: [idev] ++
5,569,968 UART: [idev] CDI.KEYID = 6
5,570,927 UART: [idev] SUBJECT.KEYID = 7
5,572,143 UART: [idev] UDS.KEYID = 0
5,574,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,724,085 UART: [idev] Erasing UDS.KEYID = 0
8,076,041 UART: [idev] Sha1 KeyId Algorithm
8,098,637 UART: [idev] --
8,102,481 UART: [ldev] ++
8,103,167 UART: [ldev] CDI.KEYID = 6
8,104,085 UART: [ldev] SUBJECT.KEYID = 5
8,105,251 UART: [ldev] AUTHORITY.KEYID = 7
8,106,489 UART: [ldev] FE.KEYID = 1
8,147,172 UART: [ldev] Erasing FE.KEYID = 1
10,656,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,401,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,432,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,540 UART: [ldev] --
12,457,970 UART: [fwproc] Wait for Commands...
12,460,985 UART: [fwproc] Recv command 0x46574c44
12,463,274 UART: [fwproc] Recv'd Img size: 118548 bytes
15,959,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,034,615 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,158,200 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,717,956 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,443,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,313,924 >>> mbox cmd response: failed
10,314,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,314,881 >>> mbox cmd response: failed
10,315,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,315,453 >>> mbox cmd response: failed
Initializing fuses
2,056,681 writing to cptra_bootfsm_go
5,471,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,858,860 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,397 UART:
192,762 UART: Running Caliptra ROM ...
193,852 UART:
603,652 UART: [state] CFI Enabled
617,933 UART: [state] LifecycleState = Unprovisioned
620,368 UART: [state] DebugLocked = No
622,187 UART: [state] WD Timer not started. Device not locked for debugging
626,066 UART: [kat] SHA2-256
815,925 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,714 UART: [kat] ++
827,253 UART: [kat] sha1
837,598 UART: [kat] SHA2-256
840,576 UART: [kat] SHA2-384
847,105 UART: [kat] SHA2-512-ACC
849,669 UART: [kat] ECC-384
3,292,408 UART: [kat] HMAC-384Kdf
3,304,328 UART: [kat] LMS
3,836,120 UART: [kat] --
3,841,678 UART: [cold-reset] ++
3,842,587 UART: [fht] FHT @ 0x50003400
3,855,593 UART: [idev] ++
3,856,281 UART: [idev] CDI.KEYID = 6
3,857,195 UART: [idev] SUBJECT.KEYID = 7
3,858,411 UART: [idev] UDS.KEYID = 0
3,864,002 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,133 UART: [idev] Erasing UDS.KEYID = 0
6,335,256 UART: [idev] Sha1 KeyId Algorithm
6,357,259 UART: [idev] --
6,362,212 UART: [ldev] ++
6,362,909 UART: [ldev] CDI.KEYID = 6
6,363,825 UART: [ldev] SUBJECT.KEYID = 5
6,364,990 UART: [ldev] AUTHORITY.KEYID = 7
6,366,226 UART: [ldev] FE.KEYID = 1
6,376,558 UART: [ldev] Erasing FE.KEYID = 1
8,855,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,307 UART: [ldev] --
10,647,852 UART: [fwproc] Wait for Commands...
10,649,480 UART: [fwproc] Recv command 0x46574c44
10,651,749 UART: [fwproc] Recv'd Img size: 118548 bytes
10,750,208 UART: ROM Fatal Error: 0x000B0007
10,753,848 >>> mbox cmd response: failed
10,754,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,754,618 >>> mbox cmd response: failed
10,754,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,755,139 >>> mbox cmd response: failed
Initializing fuses
2,059,130 writing to cptra_bootfsm_go
2,248,515 UART:
2,248,864 UART: Running Caliptra ROM ...
2,250,006 UART:
9,702,203 UART: [state] CFI Enabled
9,715,960 UART: [state] LifecycleState = Unprovisioned
9,717,993 UART: [state] DebugLocked = No
9,719,882 UART: [state] WD Timer not started. Device not locked for debugging
9,723,815 UART: [kat] SHA2-256
9,913,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,924,442 UART: [kat] ++
9,924,965 UART: [kat] sha1
9,936,186 UART: [kat] SHA2-256
9,939,219 UART: [kat] SHA2-384
9,944,676 UART: [kat] SHA2-512-ACC
9,947,252 UART: [kat] ECC-384
12,387,163 UART: [kat] HMAC-384Kdf
12,399,861 UART: [kat] LMS
12,931,650 UART: [kat] --
12,938,772 UART: [cold-reset] ++
12,940,173 UART: [fht] FHT @ 0x50003400
12,951,747 UART: [idev] ++
12,952,460 UART: [idev] CDI.KEYID = 6
12,953,349 UART: [idev] SUBJECT.KEYID = 7
12,954,570 UART: [idev] UDS.KEYID = 0
12,957,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,106,822 UART: [idev] Erasing UDS.KEYID = 0
15,433,788 UART: [idev] Sha1 KeyId Algorithm
15,456,338 UART: [idev] --
15,462,173 UART: [ldev] ++
15,462,857 UART: [ldev] CDI.KEYID = 6
15,463,876 UART: [ldev] SUBJECT.KEYID = 5
15,464,979 UART: [ldev] AUTHORITY.KEYID = 7
15,466,211 UART: [ldev] FE.KEYID = 1
15,477,133 UART: [ldev] Erasing FE.KEYID = 1
17,954,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,673,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,689,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,704,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,719,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,739,764 UART: [ldev] --
19,744,547 UART: [fwproc] Wait for Commands...
19,746,829 UART: [fwproc] Recv command 0x46574c44
19,749,155 UART: [fwproc] Recv'd Img size: 118548 bytes
23,246,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,323,056 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,446,694 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,006,314 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,760,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,531,161 >>> mbox cmd response: failed
10,531,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,532,204 >>> mbox cmd response: failed
10,532,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,532,806 >>> mbox cmd response: failed
Initializing fuses
2,072,610 writing to cptra_bootfsm_go
13,092,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,379,763 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,580 UART: [state] LifecycleState = Unprovisioned
85,235 UART: [state] DebugLocked = No
85,857 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,393 UART: [kat] SHA2-256
881,324 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,439 UART: [kat] ++
885,591 UART: [kat] sha1
889,755 UART: [kat] SHA2-256
891,693 UART: [kat] SHA2-384
894,402 UART: [kat] SHA2-512-ACC
896,303 UART: [kat] ECC-384
901,886 UART: [kat] HMAC-384Kdf
906,406 UART: [kat] LMS
1,474,602 UART: [kat] --
1,475,631 UART: [cold-reset] ++
1,476,117 UART: [fht] Storing FHT @ 0x50003400
1,478,756 UART: [idev] ++
1,478,924 UART: [idev] CDI.KEYID = 6
1,479,284 UART: [idev] SUBJECT.KEYID = 7
1,479,708 UART: [idev] UDS.KEYID = 0
1,480,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,690 UART: [idev] Erasing UDS.KEYID = 0
1,503,784 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,300 UART: [idev] --
1,513,215 UART: [ldev] ++
1,513,383 UART: [ldev] CDI.KEYID = 6
1,513,746 UART: [ldev] SUBJECT.KEYID = 5
1,514,172 UART: [ldev] AUTHORITY.KEYID = 7
1,514,635 UART: [ldev] FE.KEYID = 1
1,519,835 UART: [ldev] Erasing FE.KEYID = 1
1,545,128 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,962 UART: [ldev] --
1,584,379 UART: [fwproc] Waiting for Commands...
1,585,206 UART: [fwproc] Received command 0x46574c44
1,585,997 UART: [fwproc] Received Image of size 118548 bytes
1,610,480 UART: ROM Fatal Error: 0x000B0007
1,611,637 >>> mbox cmd response: failed
1,611,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,643 >>> mbox cmd response: failed
1,611,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,649 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,653 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,199 UART: [kat] SHA2-256
882,130 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,245 UART: [kat] ++
886,397 UART: [kat] sha1
890,617 UART: [kat] SHA2-256
892,555 UART: [kat] SHA2-384
895,236 UART: [kat] SHA2-512-ACC
897,137 UART: [kat] ECC-384
902,680 UART: [kat] HMAC-384Kdf
907,380 UART: [kat] LMS
1,475,576 UART: [kat] --
1,476,445 UART: [cold-reset] ++
1,476,917 UART: [fht] Storing FHT @ 0x50003400
1,479,756 UART: [idev] ++
1,479,924 UART: [idev] CDI.KEYID = 6
1,480,284 UART: [idev] SUBJECT.KEYID = 7
1,480,708 UART: [idev] UDS.KEYID = 0
1,481,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,850 UART: [idev] Erasing UDS.KEYID = 0
1,505,794 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,550 UART: [idev] --
1,515,715 UART: [ldev] ++
1,515,883 UART: [ldev] CDI.KEYID = 6
1,516,246 UART: [ldev] SUBJECT.KEYID = 5
1,516,672 UART: [ldev] AUTHORITY.KEYID = 7
1,517,135 UART: [ldev] FE.KEYID = 1
1,522,411 UART: [ldev] Erasing FE.KEYID = 1
1,547,112 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,312 UART: [ldev] --
1,586,653 UART: [fwproc] Waiting for Commands...
1,587,420 UART: [fwproc] Received command 0x46574c44
1,588,211 UART: [fwproc] Received Image of size 118548 bytes
2,932,396 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,752 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,970 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,237 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,465,644 >>> mbox cmd response: failed
1,465,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,650 >>> mbox cmd response: failed
1,465,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,656 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,893 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,452 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,004 UART: [kat] SHA2-256
881,935 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,050 UART: [kat] ++
886,202 UART: [kat] sha1
890,486 UART: [kat] SHA2-256
892,424 UART: [kat] SHA2-384
895,355 UART: [kat] SHA2-512-ACC
897,256 UART: [kat] ECC-384
903,063 UART: [kat] HMAC-384Kdf
907,687 UART: [kat] LMS
1,475,883 UART: [kat] --
1,476,540 UART: [cold-reset] ++
1,476,986 UART: [fht] Storing FHT @ 0x50003400
1,479,549 UART: [idev] ++
1,479,717 UART: [idev] CDI.KEYID = 6
1,480,077 UART: [idev] SUBJECT.KEYID = 7
1,480,501 UART: [idev] UDS.KEYID = 0
1,480,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,675 UART: [idev] Erasing UDS.KEYID = 0
1,504,987 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,629 UART: [idev] --
1,514,850 UART: [ldev] ++
1,515,018 UART: [ldev] CDI.KEYID = 6
1,515,381 UART: [ldev] SUBJECT.KEYID = 5
1,515,807 UART: [ldev] AUTHORITY.KEYID = 7
1,516,270 UART: [ldev] FE.KEYID = 1
1,521,432 UART: [ldev] Erasing FE.KEYID = 1
1,547,151 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,101 UART: [ldev] --
1,586,522 UART: [fwproc] Waiting for Commands...
1,587,383 UART: [fwproc] Received command 0x46574c44
1,588,174 UART: [fwproc] Received Image of size 118548 bytes
1,611,969 UART: ROM Fatal Error: 0x000B0007
1,613,126 >>> mbox cmd response: failed
1,613,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,132 >>> mbox cmd response: failed
1,613,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,138 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,722 UART: [state] DebugLocked = No
86,334 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,950 UART: [kat] SHA2-256
881,881 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,996 UART: [kat] ++
886,148 UART: [kat] sha1
890,258 UART: [kat] SHA2-256
892,196 UART: [kat] SHA2-384
895,013 UART: [kat] SHA2-512-ACC
896,914 UART: [kat] ECC-384
902,549 UART: [kat] HMAC-384Kdf
907,191 UART: [kat] LMS
1,475,387 UART: [kat] --
1,476,210 UART: [cold-reset] ++
1,476,608 UART: [fht] Storing FHT @ 0x50003400
1,479,373 UART: [idev] ++
1,479,541 UART: [idev] CDI.KEYID = 6
1,479,901 UART: [idev] SUBJECT.KEYID = 7
1,480,325 UART: [idev] UDS.KEYID = 0
1,480,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,153 UART: [idev] Erasing UDS.KEYID = 0
1,505,043 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,619 UART: [idev] --
1,514,798 UART: [ldev] ++
1,514,966 UART: [ldev] CDI.KEYID = 6
1,515,329 UART: [ldev] SUBJECT.KEYID = 5
1,515,755 UART: [ldev] AUTHORITY.KEYID = 7
1,516,218 UART: [ldev] FE.KEYID = 1
1,521,700 UART: [ldev] Erasing FE.KEYID = 1
1,547,229 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,967 UART: [ldev] --
1,586,298 UART: [fwproc] Waiting for Commands...
1,586,989 UART: [fwproc] Received command 0x46574c44
1,587,780 UART: [fwproc] Received Image of size 118548 bytes
2,932,301 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,331 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,549 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,890 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,466,001 >>> mbox cmd response: failed
1,466,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,007 >>> mbox cmd response: failed
1,466,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,772 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,972 UART: [kat] ++
895,124 UART: [kat] sha1
899,354 UART: [kat] SHA2-256
901,294 UART: [kat] SHA2-384
904,095 UART: [kat] SHA2-512-ACC
905,996 UART: [kat] ECC-384
915,795 UART: [kat] HMAC-384Kdf
920,187 UART: [kat] LMS
1,168,499 UART: [kat] --
1,169,264 UART: [cold-reset] ++
1,169,734 UART: [fht] FHT @ 0x50003400
1,172,430 UART: [idev] ++
1,172,598 UART: [idev] CDI.KEYID = 6
1,172,959 UART: [idev] SUBJECT.KEYID = 7
1,173,384 UART: [idev] UDS.KEYID = 0
1,173,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,741 UART: [idev] Erasing UDS.KEYID = 0
1,198,333 UART: [idev] Sha1 KeyId Algorithm
1,207,219 UART: [idev] --
1,208,434 UART: [ldev] ++
1,208,602 UART: [ldev] CDI.KEYID = 6
1,208,966 UART: [ldev] SUBJECT.KEYID = 5
1,209,393 UART: [ldev] AUTHORITY.KEYID = 7
1,209,856 UART: [ldev] FE.KEYID = 1
1,214,990 UART: [ldev] Erasing FE.KEYID = 1
1,241,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,230 UART: [ldev] --
1,280,685 UART: [fwproc] Wait for Commands...
1,281,452 UART: [fwproc] Recv command 0x46574c44
1,282,185 UART: [fwproc] Recv'd Img size: 118548 bytes
1,305,833 UART: ROM Fatal Error: 0x000B0007
1,306,990 >>> mbox cmd response: failed
1,306,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,996 >>> mbox cmd response: failed
1,306,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,002 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Unprovisioned
86,213 UART: [state] DebugLocked = No
86,941 UART: [state] WD Timer not started. Device not locked for debugging
88,130 UART: [kat] SHA2-256
891,680 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,784 UART: [kat] ++
895,936 UART: [kat] sha1
900,100 UART: [kat] SHA2-256
902,040 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,483 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,500 UART: [cold-reset] ++
1,171,072 UART: [fht] FHT @ 0x50003400
1,173,740 UART: [idev] ++
1,173,908 UART: [idev] CDI.KEYID = 6
1,174,269 UART: [idev] SUBJECT.KEYID = 7
1,174,694 UART: [idev] UDS.KEYID = 0
1,175,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,629 UART: [idev] Erasing UDS.KEYID = 0
1,199,245 UART: [idev] Sha1 KeyId Algorithm
1,208,319 UART: [idev] --
1,209,304 UART: [ldev] ++
1,209,472 UART: [ldev] CDI.KEYID = 6
1,209,836 UART: [ldev] SUBJECT.KEYID = 5
1,210,263 UART: [ldev] AUTHORITY.KEYID = 7
1,210,726 UART: [ldev] FE.KEYID = 1
1,215,748 UART: [ldev] Erasing FE.KEYID = 1
1,241,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,886 UART: [ldev] --
1,281,323 UART: [fwproc] Wait for Commands...
1,282,062 UART: [fwproc] Recv command 0x46574c44
1,282,795 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,792 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,967 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,298 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,813 >>> mbox cmd response: failed
1,159,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,819 >>> mbox cmd response: failed
1,159,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,825 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,578 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,841 UART: [state] LifecycleState = Unprovisioned
86,496 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,305 UART: [kat] SHA2-256
891,855 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,959 UART: [kat] ++
896,111 UART: [kat] sha1
900,453 UART: [kat] SHA2-256
902,393 UART: [kat] SHA2-384
905,150 UART: [kat] SHA2-512-ACC
907,051 UART: [kat] ECC-384
916,494 UART: [kat] HMAC-384Kdf
921,248 UART: [kat] LMS
1,169,560 UART: [kat] --
1,170,351 UART: [cold-reset] ++
1,170,925 UART: [fht] FHT @ 0x50003400
1,173,551 UART: [idev] ++
1,173,719 UART: [idev] CDI.KEYID = 6
1,174,080 UART: [idev] SUBJECT.KEYID = 7
1,174,505 UART: [idev] UDS.KEYID = 0
1,174,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,552 UART: [idev] Erasing UDS.KEYID = 0
1,199,848 UART: [idev] Sha1 KeyId Algorithm
1,208,772 UART: [idev] --
1,209,765 UART: [ldev] ++
1,209,933 UART: [ldev] CDI.KEYID = 6
1,210,297 UART: [ldev] SUBJECT.KEYID = 5
1,210,724 UART: [ldev] AUTHORITY.KEYID = 7
1,211,187 UART: [ldev] FE.KEYID = 1
1,216,755 UART: [ldev] Erasing FE.KEYID = 1
1,242,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,921 UART: [ldev] --
1,282,368 UART: [fwproc] Wait for Commands...
1,283,053 UART: [fwproc] Recv command 0x46574c44
1,283,786 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,460 UART: ROM Fatal Error: 0x000B0007
1,308,617 >>> mbox cmd response: failed
1,308,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,623 >>> mbox cmd response: failed
1,308,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,629 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,691 UART: [kat] ++
895,843 UART: [kat] sha1
900,177 UART: [kat] SHA2-256
902,117 UART: [kat] SHA2-384
904,824 UART: [kat] SHA2-512-ACC
906,725 UART: [kat] ECC-384
916,484 UART: [kat] HMAC-384Kdf
921,074 UART: [kat] LMS
1,169,386 UART: [kat] --
1,170,381 UART: [cold-reset] ++
1,170,901 UART: [fht] FHT @ 0x50003400
1,173,435 UART: [idev] ++
1,173,603 UART: [idev] CDI.KEYID = 6
1,173,964 UART: [idev] SUBJECT.KEYID = 7
1,174,389 UART: [idev] UDS.KEYID = 0
1,174,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,664 UART: [idev] Erasing UDS.KEYID = 0
1,199,938 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,209,805 UART: [ldev] ++
1,209,973 UART: [ldev] CDI.KEYID = 6
1,210,337 UART: [ldev] SUBJECT.KEYID = 5
1,210,764 UART: [ldev] AUTHORITY.KEYID = 7
1,211,227 UART: [ldev] FE.KEYID = 1
1,216,667 UART: [ldev] Erasing FE.KEYID = 1
1,243,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,399 UART: [ldev] --
1,282,674 UART: [fwproc] Wait for Commands...
1,283,345 UART: [fwproc] Recv command 0x46574c44
1,284,078 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,595 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,770 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,153 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,478 >>> mbox cmd response: failed
1,164,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,484 >>> mbox cmd response: failed
1,164,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,490 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,554 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,803 UART: [kat] SHA2-256
903,743 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
917,672 UART: [kat] HMAC-384Kdf
922,282 UART: [kat] LMS
1,170,610 UART: [kat] --
1,171,609 UART: [cold-reset] ++
1,171,993 UART: [fht] FHT @ 0x50003400
1,174,776 UART: [idev] ++
1,174,944 UART: [idev] CDI.KEYID = 6
1,175,304 UART: [idev] SUBJECT.KEYID = 7
1,175,728 UART: [idev] UDS.KEYID = 0
1,176,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,074 UART: [idev] Erasing UDS.KEYID = 0
1,200,615 UART: [idev] Sha1 KeyId Algorithm
1,208,945 UART: [idev] --
1,209,901 UART: [ldev] ++
1,210,069 UART: [ldev] CDI.KEYID = 6
1,210,432 UART: [ldev] SUBJECT.KEYID = 5
1,210,858 UART: [ldev] AUTHORITY.KEYID = 7
1,211,321 UART: [ldev] FE.KEYID = 1
1,216,303 UART: [ldev] Erasing FE.KEYID = 1
1,242,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,645 UART: [ldev] --
1,281,948 UART: [fwproc] Wait for Commands...
1,282,618 UART: [fwproc] Recv command 0x46574c44
1,283,346 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,641 UART: ROM Fatal Error: 0x000B0007
1,308,798 >>> mbox cmd response: failed
1,308,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,804 >>> mbox cmd response: failed
1,308,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
893,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,259 UART: [kat] ++
897,411 UART: [kat] sha1
901,655 UART: [kat] SHA2-256
903,595 UART: [kat] SHA2-384
906,428 UART: [kat] SHA2-512-ACC
908,329 UART: [kat] ECC-384
918,174 UART: [kat] HMAC-384Kdf
922,814 UART: [kat] LMS
1,171,142 UART: [kat] --
1,172,171 UART: [cold-reset] ++
1,172,525 UART: [fht] FHT @ 0x50003400
1,175,242 UART: [idev] ++
1,175,410 UART: [idev] CDI.KEYID = 6
1,175,770 UART: [idev] SUBJECT.KEYID = 7
1,176,194 UART: [idev] UDS.KEYID = 0
1,176,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,290 UART: [idev] Erasing UDS.KEYID = 0
1,201,765 UART: [idev] Sha1 KeyId Algorithm
1,210,285 UART: [idev] --
1,211,361 UART: [ldev] ++
1,211,529 UART: [ldev] CDI.KEYID = 6
1,211,892 UART: [ldev] SUBJECT.KEYID = 5
1,212,318 UART: [ldev] AUTHORITY.KEYID = 7
1,212,781 UART: [ldev] FE.KEYID = 1
1,217,815 UART: [ldev] Erasing FE.KEYID = 1
1,244,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,173 UART: [ldev] --
1,283,576 UART: [fwproc] Wait for Commands...
1,284,206 UART: [fwproc] Recv command 0x46574c44
1,284,934 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,825 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,995 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,324 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,061 >>> mbox cmd response: failed
1,162,061 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,067 >>> mbox cmd response: failed
1,162,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,073 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,025 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
893,887 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,012 UART: [kat] ++
898,164 UART: [kat] sha1
902,400 UART: [kat] SHA2-256
904,340 UART: [kat] SHA2-384
907,183 UART: [kat] SHA2-512-ACC
909,084 UART: [kat] ECC-384
918,425 UART: [kat] HMAC-384Kdf
923,023 UART: [kat] LMS
1,171,351 UART: [kat] --
1,172,232 UART: [cold-reset] ++
1,172,572 UART: [fht] FHT @ 0x50003400
1,175,333 UART: [idev] ++
1,175,501 UART: [idev] CDI.KEYID = 6
1,175,861 UART: [idev] SUBJECT.KEYID = 7
1,176,285 UART: [idev] UDS.KEYID = 0
1,176,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,149 UART: [idev] Erasing UDS.KEYID = 0
1,201,408 UART: [idev] Sha1 KeyId Algorithm
1,209,682 UART: [idev] --
1,210,952 UART: [ldev] ++
1,211,120 UART: [ldev] CDI.KEYID = 6
1,211,483 UART: [ldev] SUBJECT.KEYID = 5
1,211,909 UART: [ldev] AUTHORITY.KEYID = 7
1,212,372 UART: [ldev] FE.KEYID = 1
1,217,582 UART: [ldev] Erasing FE.KEYID = 1
1,243,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,312 UART: [ldev] --
1,282,825 UART: [fwproc] Wait for Commands...
1,283,635 UART: [fwproc] Recv command 0x46574c44
1,284,363 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,108 UART: ROM Fatal Error: 0x000B0007
1,309,265 >>> mbox cmd response: failed
1,309,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,271 >>> mbox cmd response: failed
1,309,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,277 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,923 UART: [state] LifecycleState = Unprovisioned
85,578 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
893,219 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,344 UART: [kat] ++
897,496 UART: [kat] sha1
901,784 UART: [kat] SHA2-256
903,724 UART: [kat] SHA2-384
906,493 UART: [kat] SHA2-512-ACC
908,394 UART: [kat] ECC-384
918,103 UART: [kat] HMAC-384Kdf
922,565 UART: [kat] LMS
1,170,893 UART: [kat] --
1,171,902 UART: [cold-reset] ++
1,172,330 UART: [fht] FHT @ 0x50003400
1,174,845 UART: [idev] ++
1,175,013 UART: [idev] CDI.KEYID = 6
1,175,373 UART: [idev] SUBJECT.KEYID = 7
1,175,797 UART: [idev] UDS.KEYID = 0
1,176,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,495 UART: [idev] Erasing UDS.KEYID = 0
1,199,898 UART: [idev] Sha1 KeyId Algorithm
1,208,454 UART: [idev] --
1,209,488 UART: [ldev] ++
1,209,656 UART: [ldev] CDI.KEYID = 6
1,210,019 UART: [ldev] SUBJECT.KEYID = 5
1,210,445 UART: [ldev] AUTHORITY.KEYID = 7
1,210,908 UART: [ldev] FE.KEYID = 1
1,216,114 UART: [ldev] Erasing FE.KEYID = 1
1,242,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,564 UART: [ldev] --
1,282,059 UART: [fwproc] Wait for Commands...
1,282,879 UART: [fwproc] Recv command 0x46574c44
1,283,607 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,056 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,226 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,561 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,344 >>> mbox cmd response: failed
1,164,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,350 >>> mbox cmd response: failed
1,164,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,356 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,704 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
3,446,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,662,690 >>> mbox cmd response: failed
12,663,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,663,579 >>> mbox cmd response: failed
12,663,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,664,151 >>> mbox cmd response: failed
Initializing fuses
2,061,988 writing to cptra_bootfsm_go
5,498,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,362,971 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,447,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,621,274 >>> mbox cmd response: failed
12,621,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,622,221 >>> mbox cmd response: failed
12,622,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,622,792 >>> mbox cmd response: failed
Initializing fuses
2,063,754 writing to cptra_bootfsm_go
5,500,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,329,972 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
3,775,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,843,750 >>> mbox cmd response: failed
12,844,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,844,913 >>> mbox cmd response: failed
12,845,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,845,431 >>> mbox cmd response: failed
Initializing fuses
2,059,938 writing to cptra_bootfsm_go
10,798,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,518,710 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,783,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,852,957 >>> mbox cmd response: failed
12,853,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,853,896 >>> mbox cmd response: failed
12,854,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,854,466 >>> mbox cmd response: failed
Initializing fuses
2,062,455 writing to cptra_bootfsm_go
10,793,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,507,943 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
3,447,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,648,800 >>> mbox cmd response: failed
12,649,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,650,078 >>> mbox cmd response: failed
12,650,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,650,642 >>> mbox cmd response: failed
Initializing fuses
2,068,619 writing to cptra_bootfsm_go
5,494,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,339,211 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,451,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,641,115 >>> mbox cmd response: failed
12,641,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,642,138 >>> mbox cmd response: failed
12,642,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,642,717 >>> mbox cmd response: failed
Initializing fuses
2,063,010 writing to cptra_bootfsm_go
5,496,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,324,363 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
3,783,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,853,700 >>> mbox cmd response: failed
12,854,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,854,748 >>> mbox cmd response: failed
12,855,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,855,331 >>> mbox cmd response: failed
Initializing fuses
2,069,334 writing to cptra_bootfsm_go
10,797,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,507,020 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,789,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,854,426 >>> mbox cmd response: failed
12,855,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,855,483 >>> mbox cmd response: failed
12,855,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,856,055 >>> mbox cmd response: failed
Initializing fuses
2,062,500 writing to cptra_bootfsm_go
10,792,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,502,621 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,162 >>> mbox cmd response: failed
1,443,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,168 >>> mbox cmd response: failed
1,443,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,174 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,137 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,114 UART: [kat] ++
895,266 UART: [kat] sha1
899,536 UART: [kat] SHA2-256
901,476 UART: [kat] SHA2-384
904,289 UART: [kat] SHA2-512-ACC
906,190 UART: [kat] ECC-384
915,971 UART: [kat] HMAC-384Kdf
920,659 UART: [kat] LMS
1,168,971 UART: [kat] --
1,170,100 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,456 UART: [idev] ++
1,173,624 UART: [idev] CDI.KEYID = 6
1,173,985 UART: [idev] SUBJECT.KEYID = 7
1,174,410 UART: [idev] UDS.KEYID = 0
1,174,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,989 UART: [idev] Erasing UDS.KEYID = 0
1,198,827 UART: [idev] Sha1 KeyId Algorithm
1,207,707 UART: [idev] --
1,208,546 UART: [ldev] ++
1,208,714 UART: [ldev] CDI.KEYID = 6
1,209,078 UART: [ldev] SUBJECT.KEYID = 5
1,209,505 UART: [ldev] AUTHORITY.KEYID = 7
1,209,968 UART: [ldev] FE.KEYID = 1
1,215,120 UART: [ldev] Erasing FE.KEYID = 1
1,241,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,712 UART: [ldev] --
1,281,163 UART: [fwproc] Wait for Commands...
1,281,910 UART: [fwproc] Recv command 0x46574c44
1,282,643 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,188 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,363 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,582 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,314 >>> mbox cmd response: failed
1,444,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,320 >>> mbox cmd response: failed
1,444,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,326 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,841 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,799 >>> mbox cmd response: failed
1,444,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,805 >>> mbox cmd response: failed
1,444,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,811 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
891,543 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
899,971 UART: [kat] SHA2-256
901,911 UART: [kat] SHA2-384
904,730 UART: [kat] SHA2-512-ACC
906,631 UART: [kat] ECC-384
916,836 UART: [kat] HMAC-384Kdf
921,520 UART: [kat] LMS
1,169,832 UART: [kat] --
1,170,319 UART: [cold-reset] ++
1,170,775 UART: [fht] FHT @ 0x50003400
1,173,477 UART: [idev] ++
1,173,645 UART: [idev] CDI.KEYID = 6
1,174,006 UART: [idev] SUBJECT.KEYID = 7
1,174,431 UART: [idev] UDS.KEYID = 0
1,174,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,102 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,252 UART: [idev] --
1,209,269 UART: [ldev] ++
1,209,437 UART: [ldev] CDI.KEYID = 6
1,209,801 UART: [ldev] SUBJECT.KEYID = 5
1,210,228 UART: [ldev] AUTHORITY.KEYID = 7
1,210,691 UART: [ldev] FE.KEYID = 1
1,215,887 UART: [ldev] Erasing FE.KEYID = 1
1,242,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,599 UART: [ldev] --
1,282,000 UART: [fwproc] Wait for Commands...
1,282,733 UART: [fwproc] Recv command 0x46574c44
1,283,466 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,245 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,420 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,797 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,313 >>> mbox cmd response: failed
1,442,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,319 >>> mbox cmd response: failed
1,442,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,602 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,716 >>> mbox cmd response: failed
1,444,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,722 >>> mbox cmd response: failed
1,444,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,728 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
893,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,303 UART: [kat] ++
897,455 UART: [kat] sha1
901,697 UART: [kat] SHA2-256
903,637 UART: [kat] SHA2-384
906,498 UART: [kat] SHA2-512-ACC
908,399 UART: [kat] ECC-384
918,396 UART: [kat] HMAC-384Kdf
923,060 UART: [kat] LMS
1,171,388 UART: [kat] --
1,172,593 UART: [cold-reset] ++
1,173,037 UART: [fht] FHT @ 0x50003400
1,175,788 UART: [idev] ++
1,175,956 UART: [idev] CDI.KEYID = 6
1,176,316 UART: [idev] SUBJECT.KEYID = 7
1,176,740 UART: [idev] UDS.KEYID = 0
1,177,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,872 UART: [idev] Erasing UDS.KEYID = 0
1,201,499 UART: [idev] Sha1 KeyId Algorithm
1,210,179 UART: [idev] --
1,211,229 UART: [ldev] ++
1,211,397 UART: [ldev] CDI.KEYID = 6
1,211,760 UART: [ldev] SUBJECT.KEYID = 5
1,212,186 UART: [ldev] AUTHORITY.KEYID = 7
1,212,649 UART: [ldev] FE.KEYID = 1
1,217,725 UART: [ldev] Erasing FE.KEYID = 1
1,244,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,205 UART: [ldev] --
1,283,510 UART: [fwproc] Wait for Commands...
1,284,286 UART: [fwproc] Recv command 0x46574c44
1,285,014 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,701 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,871 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,108 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,159 >>> mbox cmd response: failed
1,442,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,165 >>> mbox cmd response: failed
1,442,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,171 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,893 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,391 >>> mbox cmd response: failed
1,444,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,397 >>> mbox cmd response: failed
1,444,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,403 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,881 UART: [state] LifecycleState = Unprovisioned
85,536 UART: [state] DebugLocked = No
86,122 UART: [state] WD Timer not started. Device not locked for debugging
87,463 UART: [kat] SHA2-256
893,113 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,238 UART: [kat] ++
897,390 UART: [kat] sha1
901,762 UART: [kat] SHA2-256
903,702 UART: [kat] SHA2-384
906,427 UART: [kat] SHA2-512-ACC
908,328 UART: [kat] ECC-384
918,517 UART: [kat] HMAC-384Kdf
923,127 UART: [kat] LMS
1,171,455 UART: [kat] --
1,172,426 UART: [cold-reset] ++
1,172,904 UART: [fht] FHT @ 0x50003400
1,175,467 UART: [idev] ++
1,175,635 UART: [idev] CDI.KEYID = 6
1,175,995 UART: [idev] SUBJECT.KEYID = 7
1,176,419 UART: [idev] UDS.KEYID = 0
1,176,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,659 UART: [idev] Erasing UDS.KEYID = 0
1,201,380 UART: [idev] Sha1 KeyId Algorithm
1,209,912 UART: [idev] --
1,210,848 UART: [ldev] ++
1,211,016 UART: [ldev] CDI.KEYID = 6
1,211,379 UART: [ldev] SUBJECT.KEYID = 5
1,211,805 UART: [ldev] AUTHORITY.KEYID = 7
1,212,268 UART: [ldev] FE.KEYID = 1
1,217,670 UART: [ldev] Erasing FE.KEYID = 1
1,244,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,874 UART: [ldev] --
1,283,327 UART: [fwproc] Wait for Commands...
1,284,103 UART: [fwproc] Recv command 0x46574c44
1,284,831 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,366 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,536 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,927 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,445,723 >>> mbox cmd response: failed
1,445,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,729 >>> mbox cmd response: failed
1,445,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,860 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,135 UART:
192,561 UART: Running Caliptra ROM ...
193,724 UART:
193,878 UART: [state] CFI Enabled
261,540 UART: [state] LifecycleState = Unprovisioned
263,431 UART: [state] DebugLocked = No
265,295 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,583 UART: [kat] SHA2-256
439,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,792 UART: [kat] ++
450,384 UART: [kat] sha1
460,784 UART: [kat] SHA2-256
463,520 UART: [kat] SHA2-384
469,880 UART: [kat] SHA2-512-ACC
472,280 UART: [kat] ECC-384
2,768,065 UART: [kat] HMAC-384Kdf
2,799,966 UART: [kat] LMS
3,990,280 UART: [kat] --
3,995,769 UART: [cold-reset] ++
3,998,193 UART: [fht] Storing FHT @ 0x50003400
4,011,299 UART: [idev] ++
4,011,876 UART: [idev] CDI.KEYID = 6
4,012,898 UART: [idev] SUBJECT.KEYID = 7
4,014,062 UART: [idev] UDS.KEYID = 0
4,017,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,166,345 UART: [idev] Erasing UDS.KEYID = 0
7,348,849 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,674 UART: [idev] --
7,373,860 UART: [ldev] ++
7,374,432 UART: [ldev] CDI.KEYID = 6
7,375,453 UART: [ldev] SUBJECT.KEYID = 5
7,376,615 UART: [ldev] AUTHORITY.KEYID = 7
7,377,901 UART: [ldev] FE.KEYID = 1
7,422,114 UART: [ldev] Erasing FE.KEYID = 1
10,756,398 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,805 UART: [ldev] --
13,136,078 UART: [fwproc] Waiting for Commands...
13,137,859 UART: [fwproc] Received command 0x46574c44
13,140,050 UART: [fwproc] Received Image of size 118548 bytes
17,241,389 UART: ROM Fatal Error: 0x000B0016
17,244,847 >>> mbox cmd response: failed
17,245,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,245,678 >>> mbox cmd response: failed
17,246,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,246,367 >>> mbox cmd response: failed
Initializing fuses
2,056,749 writing to cptra_bootfsm_go
2,246,064 UART:
2,246,407 UART: Running Caliptra ROM ...
2,247,502 UART:
2,247,665 UART: [state] CFI Enabled
2,322,113 UART: [state] LifecycleState = Unprovisioned
2,324,055 UART: [state] DebugLocked = No
2,325,505 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,330,685 UART: [kat] SHA2-256
2,500,380 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,510,905 UART: [kat] ++
2,511,391 UART: [kat] sha1
2,522,684 UART: [kat] SHA2-256
2,525,401 UART: [kat] SHA2-384
2,530,915 UART: [kat] SHA2-512-ACC
2,533,273 UART: [kat] ECC-384
4,823,988 UART: [kat] HMAC-384Kdf
4,834,824 UART: [kat] LMS
6,025,086 UART: [kat] --
6,029,974 UART: [cold-reset] ++
6,031,003 UART: [fht] Storing FHT @ 0x50003400
6,042,282 UART: [idev] ++
6,042,914 UART: [idev] CDI.KEYID = 6
6,043,823 UART: [idev] SUBJECT.KEYID = 7
6,045,043 UART: [idev] UDS.KEYID = 0
6,047,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,196,627 UART: [idev] Erasing UDS.KEYID = 0
9,380,059 UART: [idev] Using Sha1 for KeyId Algorithm
9,401,726 UART: [idev] --
9,406,338 UART: [ldev] ++
9,406,912 UART: [ldev] CDI.KEYID = 6
9,407,931 UART: [ldev] SUBJECT.KEYID = 5
9,409,143 UART: [ldev] AUTHORITY.KEYID = 7
9,410,385 UART: [ldev] FE.KEYID = 1
9,457,288 UART: [ldev] Erasing FE.KEYID = 1
12,793,806 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,105,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,119,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,134,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,148,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,167,392 UART: [ldev] --
15,172,067 UART: [fwproc] Waiting for Commands...
15,174,172 UART: [fwproc] Received command 0x46574c44
15,176,368 UART: [fwproc] Received Image of size 118548 bytes
19,283,911 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,357,324 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,430,518 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,758,477 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,810,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,233,411 >>> mbox cmd response: failed
17,234,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,234,487 >>> mbox cmd response: failed
17,234,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,235,060 >>> mbox cmd response: failed
Initializing fuses
2,049,787 writing to cptra_bootfsm_go
5,832,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,982,804 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,486 UART:
192,859 UART: Running Caliptra ROM ...
193,992 UART:
603,807 UART: [state] CFI Enabled
618,557 UART: [state] LifecycleState = Unprovisioned
620,512 UART: [state] DebugLocked = No
622,979 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,481 UART: [kat] SHA2-256
798,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,737 UART: [kat] ++
809,270 UART: [kat] sha1
819,289 UART: [kat] SHA2-256
821,976 UART: [kat] SHA2-384
828,444 UART: [kat] SHA2-512-ACC
830,795 UART: [kat] ECC-384
3,113,482 UART: [kat] HMAC-384Kdf
3,126,170 UART: [kat] LMS
4,316,233 UART: [kat] --
4,321,789 UART: [cold-reset] ++
4,323,359 UART: [fht] Storing FHT @ 0x50003400
4,333,982 UART: [idev] ++
4,334,560 UART: [idev] CDI.KEYID = 6
4,335,448 UART: [idev] SUBJECT.KEYID = 7
4,336,741 UART: [idev] UDS.KEYID = 0
4,339,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,989 UART: [idev] Erasing UDS.KEYID = 0
7,623,896 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,264 UART: [idev] --
7,650,510 UART: [ldev] ++
7,651,093 UART: [ldev] CDI.KEYID = 6
7,652,039 UART: [ldev] SUBJECT.KEYID = 5
7,653,266 UART: [ldev] AUTHORITY.KEYID = 7
7,654,504 UART: [ldev] FE.KEYID = 1
7,665,566 UART: [ldev] Erasing FE.KEYID = 1
10,959,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,600 UART: [ldev] --
13,319,282 UART: [fwproc] Waiting for Commands...
13,322,454 UART: [fwproc] Received command 0x46574c44
13,324,651 UART: [fwproc] Received Image of size 118548 bytes
17,432,094 UART: ROM Fatal Error: 0x000B0016
17,435,558 >>> mbox cmd response: failed
17,435,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,436,255 >>> mbox cmd response: failed
17,436,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,436,827 >>> mbox cmd response: failed
Initializing fuses
2,056,243 writing to cptra_bootfsm_go
2,245,511 UART:
2,245,886 UART: Running Caliptra ROM ...
2,246,945 UART:
3,033,390 UART: [state] CFI Enabled
3,049,331 UART: [state] LifecycleState = Unprovisioned
3,051,255 UART: [state] DebugLocked = No
3,053,222 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,058,455 UART: [kat] SHA2-256
3,228,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,238,735 UART: [kat] ++
3,239,205 UART: [kat] sha1
3,249,899 UART: [kat] SHA2-256
3,252,595 UART: [kat] SHA2-384
3,257,633 UART: [kat] SHA2-512-ACC
3,259,993 UART: [kat] ECC-384
5,542,850 UART: [kat] HMAC-384Kdf
5,554,595 UART: [kat] LMS
6,744,739 UART: [kat] --
6,749,226 UART: [cold-reset] ++
6,751,060 UART: [fht] Storing FHT @ 0x50003400
6,762,605 UART: [idev] ++
6,763,210 UART: [idev] CDI.KEYID = 6
6,764,134 UART: [idev] SUBJECT.KEYID = 7
6,765,422 UART: [idev] UDS.KEYID = 0
6,767,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,916,703 UART: [idev] Erasing UDS.KEYID = 0
10,049,472 UART: [idev] Using Sha1 for KeyId Algorithm
10,070,420 UART: [idev] --
10,074,746 UART: [ldev] ++
10,075,324 UART: [ldev] CDI.KEYID = 6
10,076,293 UART: [ldev] SUBJECT.KEYID = 5
10,077,499 UART: [ldev] AUTHORITY.KEYID = 7
10,078,743 UART: [ldev] FE.KEYID = 1
10,089,686 UART: [ldev] Erasing FE.KEYID = 1
13,377,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,672,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,686,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,701,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,716,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,734,606 UART: [ldev] --
15,740,105 UART: [fwproc] Waiting for Commands...
15,743,510 UART: [fwproc] Received command 0x46574c44
15,745,703 UART: [fwproc] Received Image of size 118548 bytes
19,851,752 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,930,596 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,003,783 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,331,955 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
4,135,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,406,394 >>> mbox cmd response: failed
17,407,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,407,427 >>> mbox cmd response: failed
17,407,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,407,998 >>> mbox cmd response: failed
Initializing fuses
2,050,995 writing to cptra_bootfsm_go
6,585,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,607,406 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,402 UART:
192,792 UART: Running Caliptra ROM ...
193,922 UART:
194,072 UART: [state] CFI Enabled
264,231 UART: [state] LifecycleState = Unprovisioned
266,218 UART: [state] DebugLocked = No
267,558 UART: [state] WD Timer not started. Device not locked for debugging
271,564 UART: [kat] SHA2-256
451,187 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,993 UART: [kat] ++
462,444 UART: [kat] sha1
473,972 UART: [kat] SHA2-256
476,662 UART: [kat] SHA2-384
483,079 UART: [kat] SHA2-512-ACC
485,446 UART: [kat] ECC-384
2,950,915 UART: [kat] HMAC-384Kdf
2,972,540 UART: [kat] LMS
3,449,062 UART: [kat] --
3,453,009 UART: [cold-reset] ++
3,454,525 UART: [fht] FHT @ 0x50003400
3,464,535 UART: [idev] ++
3,465,105 UART: [idev] CDI.KEYID = 6
3,466,042 UART: [idev] SUBJECT.KEYID = 7
3,467,313 UART: [idev] UDS.KEYID = 0
3,470,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,505 UART: [idev] Erasing UDS.KEYID = 0
5,988,032 UART: [idev] Sha1 KeyId Algorithm
6,011,550 UART: [idev] --
6,017,806 UART: [ldev] ++
6,018,449 UART: [ldev] CDI.KEYID = 6
6,019,391 UART: [ldev] SUBJECT.KEYID = 5
6,020,561 UART: [ldev] AUTHORITY.KEYID = 7
6,021,804 UART: [ldev] FE.KEYID = 1
6,059,894 UART: [ldev] Erasing FE.KEYID = 1
8,567,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,443 UART: [ldev] --
10,376,393 UART: [fwproc] Wait for Commands...
10,379,575 UART: [fwproc] Recv command 0x46574c44
10,381,622 UART: [fwproc] Recv'd Img size: 118548 bytes
13,854,646 UART: ROM Fatal Error: 0x000B0016
13,857,885 >>> mbox cmd response: failed
13,858,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,858,702 >>> mbox cmd response: failed
13,858,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,859,281 >>> mbox cmd response: failed
Initializing fuses
2,059,520 writing to cptra_bootfsm_go
2,248,860 UART:
2,249,199 UART: Running Caliptra ROM ...
2,250,336 UART:
2,250,506 UART: [state] CFI Enabled
2,323,439 UART: [state] LifecycleState = Unprovisioned
2,325,379 UART: [state] DebugLocked = No
2,326,886 UART: [state] WD Timer not started. Device not locked for debugging
2,331,124 UART: [kat] SHA2-256
2,510,809 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,521,594 UART: [kat] ++
2,522,144 UART: [kat] sha1
2,533,365 UART: [kat] SHA2-256
2,536,069 UART: [kat] SHA2-384
2,540,822 UART: [kat] SHA2-512-ACC
2,543,179 UART: [kat] ECC-384
5,004,340 UART: [kat] HMAC-384Kdf
5,026,523 UART: [kat] LMS
5,503,004 UART: [kat] --
5,506,457 UART: [cold-reset] ++
5,508,228 UART: [fht] FHT @ 0x50003400
5,519,395 UART: [idev] ++
5,519,968 UART: [idev] CDI.KEYID = 6
5,520,988 UART: [idev] SUBJECT.KEYID = 7
5,522,155 UART: [idev] UDS.KEYID = 0
5,525,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,674,325 UART: [idev] Erasing UDS.KEYID = 0
8,044,655 UART: [idev] Sha1 KeyId Algorithm
8,067,509 UART: [idev] --
8,070,999 UART: [ldev] ++
8,071,588 UART: [ldev] CDI.KEYID = 6
8,072,572 UART: [ldev] SUBJECT.KEYID = 5
8,073,739 UART: [ldev] AUTHORITY.KEYID = 7
8,074,983 UART: [ldev] FE.KEYID = 1
8,114,751 UART: [ldev] Erasing FE.KEYID = 1
10,622,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,357,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,373,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,389,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,404,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,426,916 UART: [ldev] --
12,433,123 UART: [fwproc] Wait for Commands...
12,436,309 UART: [fwproc] Recv command 0x46574c44
12,438,359 UART: [fwproc] Recv'd Img size: 118548 bytes
15,929,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,009,549 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,082,547 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,410,885 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,464,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,743,776 >>> mbox cmd response: failed
13,744,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,744,819 >>> mbox cmd response: failed
13,745,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,745,387 >>> mbox cmd response: failed
Initializing fuses
2,066,675 writing to cptra_bootfsm_go
5,524,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,280,577 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,558 UART:
192,921 UART: Running Caliptra ROM ...
194,401 UART:
603,780 UART: [state] CFI Enabled
617,130 UART: [state] LifecycleState = Unprovisioned
619,040 UART: [state] DebugLocked = No
621,669 UART: [state] WD Timer not started. Device not locked for debugging
625,215 UART: [kat] SHA2-256
804,884 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,678 UART: [kat] ++
816,161 UART: [kat] sha1
827,256 UART: [kat] SHA2-256
829,941 UART: [kat] SHA2-384
835,880 UART: [kat] SHA2-512-ACC
838,265 UART: [kat] ECC-384
3,279,616 UART: [kat] HMAC-384Kdf
3,290,500 UART: [kat] LMS
3,766,995 UART: [kat] --
3,769,850 UART: [cold-reset] ++
3,771,893 UART: [fht] FHT @ 0x50003400
3,783,412 UART: [idev] ++
3,783,983 UART: [idev] CDI.KEYID = 6
3,785,008 UART: [idev] SUBJECT.KEYID = 7
3,786,203 UART: [idev] UDS.KEYID = 0
3,789,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,156 UART: [idev] Erasing UDS.KEYID = 0
6,258,026 UART: [idev] Sha1 KeyId Algorithm
6,282,713 UART: [idev] --
6,288,793 UART: [ldev] ++
6,289,374 UART: [ldev] CDI.KEYID = 6
6,290,289 UART: [ldev] SUBJECT.KEYID = 5
6,291,513 UART: [ldev] AUTHORITY.KEYID = 7
6,292,752 UART: [ldev] FE.KEYID = 1
6,305,378 UART: [ldev] Erasing FE.KEYID = 1
8,783,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,483 UART: [ldev] --
10,576,863 UART: [fwproc] Wait for Commands...
10,579,557 UART: [fwproc] Recv command 0x46574c44
10,581,547 UART: [fwproc] Recv'd Img size: 118548 bytes
14,056,392 UART: ROM Fatal Error: 0x000B0016
14,059,641 >>> mbox cmd response: failed
14,060,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,060,339 >>> mbox cmd response: failed
14,060,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,061,034 >>> mbox cmd response: failed
Initializing fuses
2,059,943 writing to cptra_bootfsm_go
2,249,256 UART:
2,249,622 UART: Running Caliptra ROM ...
2,250,770 UART:
6,407,588 UART: [state] CFI Enabled
6,420,769 UART: [state] LifecycleState = Unprovisioned
6,422,687 UART: [state] DebugLocked = No
6,424,896 UART: [state] WD Timer not started. Device not locked for debugging
6,428,760 UART: [kat] SHA2-256
6,608,417 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,619,240 UART: [kat] ++
6,619,711 UART: [kat] sha1
6,630,604 UART: [kat] SHA2-256
6,633,310 UART: [kat] SHA2-384
6,637,844 UART: [kat] SHA2-512-ACC
6,640,197 UART: [kat] ECC-384
9,082,182 UART: [kat] HMAC-384Kdf
9,094,674 UART: [kat] LMS
9,571,178 UART: [kat] --
9,574,816 UART: [cold-reset] ++
9,576,513 UART: [fht] FHT @ 0x50003400
9,588,534 UART: [idev] ++
9,589,110 UART: [idev] CDI.KEYID = 6
9,590,028 UART: [idev] SUBJECT.KEYID = 7
9,591,306 UART: [idev] UDS.KEYID = 0
9,594,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,743,125 UART: [idev] Erasing UDS.KEYID = 0
12,071,450 UART: [idev] Sha1 KeyId Algorithm
12,095,218 UART: [idev] --
12,098,624 UART: [ldev] ++
12,099,204 UART: [ldev] CDI.KEYID = 6
12,100,172 UART: [ldev] SUBJECT.KEYID = 5
12,101,338 UART: [ldev] AUTHORITY.KEYID = 7
12,102,632 UART: [ldev] FE.KEYID = 1
12,113,573 UART: [ldev] Erasing FE.KEYID = 1
14,588,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,308,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,324,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,339,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,355,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,376,959 UART: [ldev] --
16,383,127 UART: [fwproc] Wait for Commands...
16,384,704 UART: [fwproc] Recv command 0x46574c44
16,386,696 UART: [fwproc] Recv'd Img size: 118548 bytes
19,872,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,946,297 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,019,287 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,346,818 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
3,783,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,975,328 >>> mbox cmd response: failed
13,976,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,976,378 >>> mbox cmd response: failed
13,976,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,976,949 >>> mbox cmd response: failed
Initializing fuses
2,058,965 writing to cptra_bootfsm_go
9,676,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,345,962 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
192,319 UART:
192,678 UART: Running Caliptra ROM ...
193,879 UART:
194,037 UART: [state] CFI Enabled
265,711 UART: [state] LifecycleState = Unprovisioned
268,154 UART: [state] DebugLocked = No
270,087 UART: [state] WD Timer not started. Device not locked for debugging
274,488 UART: [kat] SHA2-256
464,376 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,116 UART: [kat] ++
475,573 UART: [kat] sha1
487,103 UART: [kat] SHA2-256
490,131 UART: [kat] SHA2-384
494,395 UART: [kat] SHA2-512-ACC
496,963 UART: [kat] ECC-384
2,949,694 UART: [kat] HMAC-384Kdf
2,973,775 UART: [kat] LMS
3,505,541 UART: [kat] --
3,509,671 UART: [cold-reset] ++
3,512,316 UART: [fht] FHT @ 0x50003400
3,525,092 UART: [idev] ++
3,525,846 UART: [idev] CDI.KEYID = 6
3,526,774 UART: [idev] SUBJECT.KEYID = 7
3,527,951 UART: [idev] UDS.KEYID = 0
3,530,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,680,316 UART: [idev] Erasing UDS.KEYID = 0
6,033,465 UART: [idev] Sha1 KeyId Algorithm
6,056,942 UART: [idev] --
6,060,620 UART: [ldev] ++
6,061,307 UART: [ldev] CDI.KEYID = 6
6,062,227 UART: [ldev] SUBJECT.KEYID = 5
6,063,392 UART: [ldev] AUTHORITY.KEYID = 7
6,064,574 UART: [ldev] FE.KEYID = 1
6,105,796 UART: [ldev] Erasing FE.KEYID = 1
8,614,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,159 UART: [ldev] --
10,418,546 UART: [fwproc] Wait for Commands...
10,420,436 UART: [fwproc] Recv command 0x46574c44
10,422,758 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,554 UART: ROM Fatal Error: 0x000B0016
13,920,246 >>> mbox cmd response: failed
13,920,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,921,078 >>> mbox cmd response: failed
13,921,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,921,649 >>> mbox cmd response: failed
Initializing fuses
2,062,794 writing to cptra_bootfsm_go
2,252,130 UART:
2,252,472 UART: Running Caliptra ROM ...
2,253,614 UART:
2,253,796 UART: [state] CFI Enabled
2,324,233 UART: [state] LifecycleState = Unprovisioned
2,326,613 UART: [state] DebugLocked = No
2,328,499 UART: [state] WD Timer not started. Device not locked for debugging
2,333,458 UART: [kat] SHA2-256
2,523,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,534,101 UART: [kat] ++
2,534,564 UART: [kat] sha1
2,546,322 UART: [kat] SHA2-256
2,549,347 UART: [kat] SHA2-384
2,554,692 UART: [kat] SHA2-512-ACC
2,557,256 UART: [kat] ECC-384
5,009,550 UART: [kat] HMAC-384Kdf
5,033,122 UART: [kat] LMS
5,564,904 UART: [kat] --
5,569,705 UART: [cold-reset] ++
5,570,886 UART: [fht] FHT @ 0x50003400
5,582,412 UART: [idev] ++
5,583,150 UART: [idev] CDI.KEYID = 6
5,584,219 UART: [idev] SUBJECT.KEYID = 7
5,585,327 UART: [idev] UDS.KEYID = 0
5,587,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,736,764 UART: [idev] Erasing UDS.KEYID = 0
8,090,056 UART: [idev] Sha1 KeyId Algorithm
8,111,538 UART: [idev] --
8,117,805 UART: [ldev] ++
8,118,493 UART: [ldev] CDI.KEYID = 6
8,119,408 UART: [ldev] SUBJECT.KEYID = 5
8,120,594 UART: [ldev] AUTHORITY.KEYID = 7
8,121,779 UART: [ldev] FE.KEYID = 1
8,162,291 UART: [ldev] Erasing FE.KEYID = 1
10,668,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,403,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,418,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,433,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,449,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,469,541 UART: [ldev] --
12,474,709 UART: [fwproc] Wait for Commands...
12,477,672 UART: [fwproc] Recv command 0x46574c44
12,479,949 UART: [fwproc] Recv'd Img size: 118548 bytes
15,978,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,056,976 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,180,594 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,740,490 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,442,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,347,184 >>> mbox cmd response: failed
14,347,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,348,126 >>> mbox cmd response: failed
14,348,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,348,699 >>> mbox cmd response: failed
Initializing fuses
2,055,669 writing to cptra_bootfsm_go
5,498,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,880,289 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,394 UART:
192,739 UART: Running Caliptra ROM ...
193,926 UART:
603,499 UART: [state] CFI Enabled
619,065 UART: [state] LifecycleState = Unprovisioned
621,470 UART: [state] DebugLocked = No
623,431 UART: [state] WD Timer not started. Device not locked for debugging
628,726 UART: [kat] SHA2-256
818,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,391 UART: [kat] ++
829,926 UART: [kat] sha1
840,758 UART: [kat] SHA2-256
843,782 UART: [kat] SHA2-384
849,606 UART: [kat] SHA2-512-ACC
852,166 UART: [kat] ECC-384
3,291,344 UART: [kat] HMAC-384Kdf
3,304,841 UART: [kat] LMS
3,836,648 UART: [kat] --
3,839,299 UART: [cold-reset] ++
3,841,076 UART: [fht] FHT @ 0x50003400
3,852,559 UART: [idev] ++
3,853,240 UART: [idev] CDI.KEYID = 6
3,854,192 UART: [idev] SUBJECT.KEYID = 7
3,855,425 UART: [idev] UDS.KEYID = 0
3,858,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,618 UART: [idev] Erasing UDS.KEYID = 0
6,334,262 UART: [idev] Sha1 KeyId Algorithm
6,356,341 UART: [idev] --
6,361,101 UART: [ldev] ++
6,361,788 UART: [ldev] CDI.KEYID = 6
6,362,675 UART: [ldev] SUBJECT.KEYID = 5
6,363,890 UART: [ldev] AUTHORITY.KEYID = 7
6,365,130 UART: [ldev] FE.KEYID = 1
6,377,158 UART: [ldev] Erasing FE.KEYID = 1
8,855,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,720 UART: [ldev] --
10,646,999 UART: [fwproc] Wait for Commands...
10,649,212 UART: [fwproc] Recv command 0x46574c44
10,651,491 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,567 UART: ROM Fatal Error: 0x000B0016
14,145,195 >>> mbox cmd response: failed
14,145,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,145,838 >>> mbox cmd response: failed
14,146,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,146,458 >>> mbox cmd response: failed
Initializing fuses
2,061,883 writing to cptra_bootfsm_go
2,251,157 UART:
2,251,530 UART: Running Caliptra ROM ...
2,252,579 UART:
6,321,883 UART: [state] CFI Enabled
6,332,521 UART: [state] LifecycleState = Unprovisioned
6,334,877 UART: [state] DebugLocked = No
6,337,647 UART: [state] WD Timer not started. Device not locked for debugging
6,341,959 UART: [kat] SHA2-256
6,531,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,542,619 UART: [kat] ++
6,543,139 UART: [kat] sha1
6,553,819 UART: [kat] SHA2-256
6,556,848 UART: [kat] SHA2-384
6,562,252 UART: [kat] SHA2-512-ACC
6,564,854 UART: [kat] ECC-384
9,005,818 UART: [kat] HMAC-384Kdf
9,018,764 UART: [kat] LMS
9,550,604 UART: [kat] --
9,555,570 UART: [cold-reset] ++
9,556,588 UART: [fht] FHT @ 0x50003400
9,567,009 UART: [idev] ++
9,567,693 UART: [idev] CDI.KEYID = 6
9,568,716 UART: [idev] SUBJECT.KEYID = 7
9,569,826 UART: [idev] UDS.KEYID = 0
9,572,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,721,127 UART: [idev] Erasing UDS.KEYID = 0
12,043,334 UART: [idev] Sha1 KeyId Algorithm
12,066,915 UART: [idev] --
12,071,508 UART: [ldev] ++
12,072,192 UART: [ldev] CDI.KEYID = 6
12,073,114 UART: [ldev] SUBJECT.KEYID = 5
12,074,331 UART: [ldev] AUTHORITY.KEYID = 7
12,075,512 UART: [ldev] FE.KEYID = 1
12,087,058 UART: [ldev] Erasing FE.KEYID = 1
14,561,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,280,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,295,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,310,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,326,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,346,946 UART: [ldev] --
16,352,446 UART: [fwproc] Wait for Commands...
16,354,875 UART: [fwproc] Recv command 0x46574c44
16,357,198 UART: [fwproc] Recv'd Img size: 118548 bytes
19,850,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,928,469 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,052,093 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,612,153 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,481 writing to cptra_bootfsm_go
3,754,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,564,202 >>> mbox cmd response: failed
14,565,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,565,408 >>> mbox cmd response: failed
14,565,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,565,993 >>> mbox cmd response: failed
Initializing fuses
2,060,463 writing to cptra_bootfsm_go
9,066,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,337,709 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,455 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,979 UART: [kat] SHA2-256
881,910 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,025 UART: [kat] ++
886,177 UART: [kat] sha1
890,511 UART: [kat] SHA2-256
892,449 UART: [kat] SHA2-384
895,300 UART: [kat] SHA2-512-ACC
897,201 UART: [kat] ECC-384
902,604 UART: [kat] HMAC-384Kdf
907,186 UART: [kat] LMS
1,475,382 UART: [kat] --
1,476,357 UART: [cold-reset] ++
1,476,911 UART: [fht] Storing FHT @ 0x50003400
1,479,578 UART: [idev] ++
1,479,746 UART: [idev] CDI.KEYID = 6
1,480,106 UART: [idev] SUBJECT.KEYID = 7
1,480,530 UART: [idev] UDS.KEYID = 0
1,480,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,628 UART: [idev] Erasing UDS.KEYID = 0
1,506,026 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,788 UART: [idev] --
1,515,769 UART: [ldev] ++
1,515,937 UART: [ldev] CDI.KEYID = 6
1,516,300 UART: [ldev] SUBJECT.KEYID = 5
1,516,726 UART: [ldev] AUTHORITY.KEYID = 7
1,517,189 UART: [ldev] FE.KEYID = 1
1,522,351 UART: [ldev] Erasing FE.KEYID = 1
1,547,424 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,434 UART: [ldev] --
1,586,717 UART: [fwproc] Waiting for Commands...
1,587,460 UART: [fwproc] Received command 0x46574c44
1,588,251 UART: [fwproc] Received Image of size 118548 bytes
2,931,451 UART: ROM Fatal Error: 0x000B0016
2,932,608 >>> mbox cmd response: failed
2,932,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,614 >>> mbox cmd response: failed
2,932,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,638 UART: [state] LifecycleState = Unprovisioned
86,293 UART: [state] DebugLocked = No
86,781 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,389 UART: [kat] SHA2-256
882,320 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,435 UART: [kat] ++
886,587 UART: [kat] sha1
890,771 UART: [kat] SHA2-256
892,709 UART: [kat] SHA2-384
895,362 UART: [kat] SHA2-512-ACC
897,263 UART: [kat] ECC-384
902,670 UART: [kat] HMAC-384Kdf
907,128 UART: [kat] LMS
1,475,324 UART: [kat] --
1,476,105 UART: [cold-reset] ++
1,476,635 UART: [fht] Storing FHT @ 0x50003400
1,479,280 UART: [idev] ++
1,479,448 UART: [idev] CDI.KEYID = 6
1,479,808 UART: [idev] SUBJECT.KEYID = 7
1,480,232 UART: [idev] UDS.KEYID = 0
1,480,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,144 UART: [idev] Erasing UDS.KEYID = 0
1,505,278 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,974 UART: [idev] --
1,515,105 UART: [ldev] ++
1,515,273 UART: [ldev] CDI.KEYID = 6
1,515,636 UART: [ldev] SUBJECT.KEYID = 5
1,516,062 UART: [ldev] AUTHORITY.KEYID = 7
1,516,525 UART: [ldev] FE.KEYID = 1
1,521,669 UART: [ldev] Erasing FE.KEYID = 1
1,547,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,566 UART: [ldev] --
1,586,853 UART: [fwproc] Waiting for Commands...
1,587,482 UART: [fwproc] Received command 0x46574c44
1,588,273 UART: [fwproc] Received Image of size 118548 bytes
2,932,356 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,982 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,200 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,465 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,784,779 >>> mbox cmd response: failed
2,784,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,785 >>> mbox cmd response: failed
2,784,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,791 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,924 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,556 UART: [kat] SHA2-256
882,487 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,602 UART: [kat] ++
886,754 UART: [kat] sha1
890,974 UART: [kat] SHA2-256
892,912 UART: [kat] SHA2-384
895,713 UART: [kat] SHA2-512-ACC
897,614 UART: [kat] ECC-384
903,441 UART: [kat] HMAC-384Kdf
908,273 UART: [kat] LMS
1,476,469 UART: [kat] --
1,477,510 UART: [cold-reset] ++
1,477,938 UART: [fht] Storing FHT @ 0x50003400
1,480,729 UART: [idev] ++
1,480,897 UART: [idev] CDI.KEYID = 6
1,481,257 UART: [idev] SUBJECT.KEYID = 7
1,481,681 UART: [idev] UDS.KEYID = 0
1,482,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,719 UART: [idev] Erasing UDS.KEYID = 0
1,506,643 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,367 UART: [idev] --
1,516,426 UART: [ldev] ++
1,516,594 UART: [ldev] CDI.KEYID = 6
1,516,957 UART: [ldev] SUBJECT.KEYID = 5
1,517,383 UART: [ldev] AUTHORITY.KEYID = 7
1,517,846 UART: [ldev] FE.KEYID = 1
1,523,394 UART: [ldev] Erasing FE.KEYID = 1
1,549,391 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,689 UART: [ldev] --
1,588,990 UART: [fwproc] Waiting for Commands...
1,589,823 UART: [fwproc] Received command 0x46574c44
1,590,614 UART: [fwproc] Received Image of size 118548 bytes
2,932,366 UART: ROM Fatal Error: 0x000B0016
2,933,523 >>> mbox cmd response: failed
2,933,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,529 >>> mbox cmd response: failed
2,933,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,535 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,618 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,346 UART: [kat] SHA2-256
882,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,392 UART: [kat] ++
886,544 UART: [kat] sha1
890,958 UART: [kat] SHA2-256
892,896 UART: [kat] SHA2-384
895,709 UART: [kat] SHA2-512-ACC
897,610 UART: [kat] ECC-384
903,291 UART: [kat] HMAC-384Kdf
907,733 UART: [kat] LMS
1,475,929 UART: [kat] --
1,476,732 UART: [cold-reset] ++
1,477,198 UART: [fht] Storing FHT @ 0x50003400
1,480,037 UART: [idev] ++
1,480,205 UART: [idev] CDI.KEYID = 6
1,480,565 UART: [idev] SUBJECT.KEYID = 7
1,480,989 UART: [idev] UDS.KEYID = 0
1,481,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,953 UART: [idev] Erasing UDS.KEYID = 0
1,505,779 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,285 UART: [idev] --
1,515,216 UART: [ldev] ++
1,515,384 UART: [ldev] CDI.KEYID = 6
1,515,747 UART: [ldev] SUBJECT.KEYID = 5
1,516,173 UART: [ldev] AUTHORITY.KEYID = 7
1,516,636 UART: [ldev] FE.KEYID = 1
1,522,058 UART: [ldev] Erasing FE.KEYID = 1
1,547,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,315 UART: [ldev] --
1,586,812 UART: [fwproc] Waiting for Commands...
1,587,437 UART: [fwproc] Received command 0x46574c44
1,588,228 UART: [fwproc] Received Image of size 118548 bytes
2,932,857 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,653 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,871 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,242 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,783,900 >>> mbox cmd response: failed
2,783,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,906 >>> mbox cmd response: failed
2,783,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,912 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,546 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,662 UART: [state] LifecycleState = Unprovisioned
85,317 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,148 UART: [kat] SHA2-256
890,698 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,802 UART: [kat] ++
894,954 UART: [kat] sha1
899,390 UART: [kat] SHA2-256
901,330 UART: [kat] SHA2-384
903,883 UART: [kat] SHA2-512-ACC
905,784 UART: [kat] ECC-384
915,621 UART: [kat] HMAC-384Kdf
920,317 UART: [kat] LMS
1,168,629 UART: [kat] --
1,169,596 UART: [cold-reset] ++
1,170,006 UART: [fht] FHT @ 0x50003400
1,172,840 UART: [idev] ++
1,173,008 UART: [idev] CDI.KEYID = 6
1,173,369 UART: [idev] SUBJECT.KEYID = 7
1,173,794 UART: [idev] UDS.KEYID = 0
1,174,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,051 UART: [idev] Erasing UDS.KEYID = 0
1,198,665 UART: [idev] Sha1 KeyId Algorithm
1,207,477 UART: [idev] --
1,208,384 UART: [ldev] ++
1,208,552 UART: [ldev] CDI.KEYID = 6
1,208,916 UART: [ldev] SUBJECT.KEYID = 5
1,209,343 UART: [ldev] AUTHORITY.KEYID = 7
1,209,806 UART: [ldev] FE.KEYID = 1
1,214,980 UART: [ldev] Erasing FE.KEYID = 1
1,241,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,494 UART: [ldev] --
1,280,863 UART: [fwproc] Wait for Commands...
1,281,550 UART: [fwproc] Recv command 0x46574c44
1,282,283 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,020 UART: ROM Fatal Error: 0x000B0016
2,626,177 >>> mbox cmd response: failed
2,626,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,183 >>> mbox cmd response: failed
2,626,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,189 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
891,346 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,450 UART: [kat] ++
895,602 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,169,908 UART: [cold-reset] ++
1,170,358 UART: [fht] FHT @ 0x50003400
1,173,270 UART: [idev] ++
1,173,438 UART: [idev] CDI.KEYID = 6
1,173,799 UART: [idev] SUBJECT.KEYID = 7
1,174,224 UART: [idev] UDS.KEYID = 0
1,174,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,221 UART: [idev] Erasing UDS.KEYID = 0
1,199,623 UART: [idev] Sha1 KeyId Algorithm
1,208,329 UART: [idev] --
1,209,376 UART: [ldev] ++
1,209,544 UART: [ldev] CDI.KEYID = 6
1,209,908 UART: [ldev] SUBJECT.KEYID = 5
1,210,335 UART: [ldev] AUTHORITY.KEYID = 7
1,210,798 UART: [ldev] FE.KEYID = 1
1,216,142 UART: [ldev] Erasing FE.KEYID = 1
1,242,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,316 UART: [ldev] --
1,281,739 UART: [fwproc] Wait for Commands...
1,282,448 UART: [fwproc] Recv command 0x46574c44
1,283,181 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,350 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,525 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,770 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,120 >>> mbox cmd response: failed
2,484,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,126 >>> mbox cmd response: failed
2,484,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,225 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,651 UART: [kat] ++
895,803 UART: [kat] sha1
900,147 UART: [kat] SHA2-256
902,087 UART: [kat] SHA2-384
904,676 UART: [kat] SHA2-512-ACC
906,577 UART: [kat] ECC-384
916,454 UART: [kat] HMAC-384Kdf
921,244 UART: [kat] LMS
1,169,556 UART: [kat] --
1,170,399 UART: [cold-reset] ++
1,170,917 UART: [fht] FHT @ 0x50003400
1,173,661 UART: [idev] ++
1,173,829 UART: [idev] CDI.KEYID = 6
1,174,190 UART: [idev] SUBJECT.KEYID = 7
1,174,615 UART: [idev] UDS.KEYID = 0
1,174,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,858 UART: [idev] Erasing UDS.KEYID = 0
1,199,876 UART: [idev] Sha1 KeyId Algorithm
1,208,740 UART: [idev] --
1,209,767 UART: [ldev] ++
1,209,935 UART: [ldev] CDI.KEYID = 6
1,210,299 UART: [ldev] SUBJECT.KEYID = 5
1,210,726 UART: [ldev] AUTHORITY.KEYID = 7
1,211,189 UART: [ldev] FE.KEYID = 1
1,216,369 UART: [ldev] Erasing FE.KEYID = 1
1,243,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,235 UART: [ldev] --
1,282,436 UART: [fwproc] Wait for Commands...
1,283,013 UART: [fwproc] Recv command 0x46574c44
1,283,746 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,229 UART: ROM Fatal Error: 0x000B0016
2,628,386 >>> mbox cmd response: failed
2,628,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,392 >>> mbox cmd response: failed
2,628,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,398 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,513 UART: [kat] ++
895,665 UART: [kat] sha1
900,037 UART: [kat] SHA2-256
901,977 UART: [kat] SHA2-384
904,632 UART: [kat] SHA2-512-ACC
906,533 UART: [kat] ECC-384
916,352 UART: [kat] HMAC-384Kdf
921,070 UART: [kat] LMS
1,169,382 UART: [kat] --
1,170,421 UART: [cold-reset] ++
1,170,827 UART: [fht] FHT @ 0x50003400
1,173,539 UART: [idev] ++
1,173,707 UART: [idev] CDI.KEYID = 6
1,174,068 UART: [idev] SUBJECT.KEYID = 7
1,174,493 UART: [idev] UDS.KEYID = 0
1,174,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,080 UART: [idev] Erasing UDS.KEYID = 0
1,200,584 UART: [idev] Sha1 KeyId Algorithm
1,209,338 UART: [idev] --
1,210,403 UART: [ldev] ++
1,210,571 UART: [ldev] CDI.KEYID = 6
1,210,935 UART: [ldev] SUBJECT.KEYID = 5
1,211,362 UART: [ldev] AUTHORITY.KEYID = 7
1,211,825 UART: [ldev] FE.KEYID = 1
1,216,979 UART: [ldev] Erasing FE.KEYID = 1
1,244,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,323 UART: [ldev] --
1,283,668 UART: [fwproc] Wait for Commands...
1,284,285 UART: [fwproc] Recv command 0x46574c44
1,285,018 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,679 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,854 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,253 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,768 >>> mbox cmd response: failed
2,483,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,774 >>> mbox cmd response: failed
2,483,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,780 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,738 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,848 UART: [kat] SHA2-256
893,498 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,623 UART: [kat] ++
897,775 UART: [kat] sha1
901,987 UART: [kat] SHA2-256
903,927 UART: [kat] SHA2-384
906,522 UART: [kat] SHA2-512-ACC
908,423 UART: [kat] ECC-384
918,496 UART: [kat] HMAC-384Kdf
923,078 UART: [kat] LMS
1,171,406 UART: [kat] --
1,172,333 UART: [cold-reset] ++
1,172,911 UART: [fht] FHT @ 0x50003400
1,175,552 UART: [idev] ++
1,175,720 UART: [idev] CDI.KEYID = 6
1,176,080 UART: [idev] SUBJECT.KEYID = 7
1,176,504 UART: [idev] UDS.KEYID = 0
1,176,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,478 UART: [idev] Erasing UDS.KEYID = 0
1,201,309 UART: [idev] Sha1 KeyId Algorithm
1,209,989 UART: [idev] --
1,211,121 UART: [ldev] ++
1,211,289 UART: [ldev] CDI.KEYID = 6
1,211,652 UART: [ldev] SUBJECT.KEYID = 5
1,212,078 UART: [ldev] AUTHORITY.KEYID = 7
1,212,541 UART: [ldev] FE.KEYID = 1
1,217,553 UART: [ldev] Erasing FE.KEYID = 1
1,243,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,715 UART: [ldev] --
1,283,156 UART: [fwproc] Wait for Commands...
1,283,858 UART: [fwproc] Recv command 0x46574c44
1,284,586 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,474 UART: ROM Fatal Error: 0x000B0016
2,628,631 >>> mbox cmd response: failed
2,628,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,637 >>> mbox cmd response: failed
2,628,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,643 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,670 UART: [state] LifecycleState = Unprovisioned
86,325 UART: [state] DebugLocked = No
86,907 UART: [state] WD Timer not started. Device not locked for debugging
88,048 UART: [kat] SHA2-256
893,698 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,823 UART: [kat] ++
897,975 UART: [kat] sha1
902,111 UART: [kat] SHA2-256
904,051 UART: [kat] SHA2-384
906,776 UART: [kat] SHA2-512-ACC
908,677 UART: [kat] ECC-384
918,428 UART: [kat] HMAC-384Kdf
922,860 UART: [kat] LMS
1,171,188 UART: [kat] --
1,172,013 UART: [cold-reset] ++
1,172,481 UART: [fht] FHT @ 0x50003400
1,175,008 UART: [idev] ++
1,175,176 UART: [idev] CDI.KEYID = 6
1,175,536 UART: [idev] SUBJECT.KEYID = 7
1,175,960 UART: [idev] UDS.KEYID = 0
1,176,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,190 UART: [idev] Erasing UDS.KEYID = 0
1,200,965 UART: [idev] Sha1 KeyId Algorithm
1,209,399 UART: [idev] --
1,210,359 UART: [ldev] ++
1,210,527 UART: [ldev] CDI.KEYID = 6
1,210,890 UART: [ldev] SUBJECT.KEYID = 5
1,211,316 UART: [ldev] AUTHORITY.KEYID = 7
1,211,779 UART: [ldev] FE.KEYID = 1
1,217,087 UART: [ldev] Erasing FE.KEYID = 1
1,243,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,333 UART: [ldev] --
1,282,802 UART: [fwproc] Wait for Commands...
1,283,528 UART: [fwproc] Recv command 0x46574c44
1,284,256 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,117 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,287 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,478 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,428 >>> mbox cmd response: failed
2,484,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,434 >>> mbox cmd response: failed
2,484,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,440 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,763 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
893,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,528 UART: [kat] ++
897,680 UART: [kat] sha1
901,762 UART: [kat] SHA2-256
903,702 UART: [kat] SHA2-384
906,441 UART: [kat] SHA2-512-ACC
908,342 UART: [kat] ECC-384
918,259 UART: [kat] HMAC-384Kdf
922,931 UART: [kat] LMS
1,171,259 UART: [kat] --
1,172,082 UART: [cold-reset] ++
1,172,644 UART: [fht] FHT @ 0x50003400
1,175,437 UART: [idev] ++
1,175,605 UART: [idev] CDI.KEYID = 6
1,175,965 UART: [idev] SUBJECT.KEYID = 7
1,176,389 UART: [idev] UDS.KEYID = 0
1,176,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,897 UART: [idev] Erasing UDS.KEYID = 0
1,202,604 UART: [idev] Sha1 KeyId Algorithm
1,210,930 UART: [idev] --
1,212,070 UART: [ldev] ++
1,212,238 UART: [ldev] CDI.KEYID = 6
1,212,601 UART: [ldev] SUBJECT.KEYID = 5
1,213,027 UART: [ldev] AUTHORITY.KEYID = 7
1,213,490 UART: [ldev] FE.KEYID = 1
1,219,050 UART: [ldev] Erasing FE.KEYID = 1
1,245,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,512 UART: [ldev] --
1,284,927 UART: [fwproc] Wait for Commands...
1,285,739 UART: [fwproc] Recv command 0x46574c44
1,286,467 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,167 UART: ROM Fatal Error: 0x000B0016
2,631,324 >>> mbox cmd response: failed
2,631,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,631,330 >>> mbox cmd response: failed
2,631,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,631,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
893,323 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,448 UART: [kat] ++
897,600 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,755 UART: [kat] SHA2-512-ACC
908,656 UART: [kat] ECC-384
918,449 UART: [kat] HMAC-384Kdf
922,995 UART: [kat] LMS
1,171,323 UART: [kat] --
1,172,410 UART: [cold-reset] ++
1,172,926 UART: [fht] FHT @ 0x50003400
1,175,523 UART: [idev] ++
1,175,691 UART: [idev] CDI.KEYID = 6
1,176,051 UART: [idev] SUBJECT.KEYID = 7
1,176,475 UART: [idev] UDS.KEYID = 0
1,176,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,363 UART: [idev] Erasing UDS.KEYID = 0
1,201,414 UART: [idev] Sha1 KeyId Algorithm
1,209,976 UART: [idev] --
1,211,130 UART: [ldev] ++
1,211,298 UART: [ldev] CDI.KEYID = 6
1,211,661 UART: [ldev] SUBJECT.KEYID = 5
1,212,087 UART: [ldev] AUTHORITY.KEYID = 7
1,212,550 UART: [ldev] FE.KEYID = 1
1,218,100 UART: [ldev] Erasing FE.KEYID = 1
1,244,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,212 UART: [ldev] --
1,284,723 UART: [fwproc] Wait for Commands...
1,285,439 UART: [fwproc] Recv command 0x46574c44
1,286,167 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,850 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,020 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,187 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,119 >>> mbox cmd response: failed
2,483,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,125 >>> mbox cmd response: failed
2,483,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,666 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,183 UART:
192,539 UART: Running Caliptra ROM ...
193,740 UART:
193,894 UART: [state] CFI Enabled
263,392 UART: [state] LifecycleState = Unprovisioned
265,379 UART: [state] DebugLocked = No
267,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,236 UART: [kat] SHA2-256
441,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,481 UART: [kat] ++
452,959 UART: [kat] sha1
464,590 UART: [kat] SHA2-256
467,275 UART: [kat] SHA2-384
473,309 UART: [kat] SHA2-512-ACC
475,669 UART: [kat] ECC-384
2,766,181 UART: [kat] HMAC-384Kdf
2,779,324 UART: [kat] LMS
3,969,642 UART: [kat] --
3,975,015 UART: [cold-reset] ++
3,976,535 UART: [fht] Storing FHT @ 0x50003400
3,987,826 UART: [idev] ++
3,988,397 UART: [idev] CDI.KEYID = 6
3,989,375 UART: [idev] SUBJECT.KEYID = 7
3,990,587 UART: [idev] UDS.KEYID = 0
3,993,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,846 UART: [idev] Erasing UDS.KEYID = 0
7,324,573 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,139 UART: [idev] --
7,350,079 UART: [ldev] ++
7,350,660 UART: [ldev] CDI.KEYID = 6
7,351,626 UART: [ldev] SUBJECT.KEYID = 5
7,352,843 UART: [ldev] AUTHORITY.KEYID = 7
7,354,079 UART: [ldev] FE.KEYID = 1
7,401,567 UART: [ldev] Erasing FE.KEYID = 1
10,735,741 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,272 UART: [ldev] --
13,116,304 UART: [fwproc] Waiting for Commands...
13,117,905 UART: [fwproc] Received command 0x46574c44
13,120,107 UART: [fwproc] Received Image of size 118548 bytes
17,227,006 UART: ROM Fatal Error: 0x000B002A
17,230,474 >>> mbox cmd response: failed
17,230,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,231,254 >>> mbox cmd response: failed
17,231,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,231,823 >>> mbox cmd response: failed
Initializing fuses
2,059,697 writing to cptra_bootfsm_go
2,249,028 UART:
2,249,370 UART: Running Caliptra ROM ...
2,250,413 UART:
2,250,564 UART: [state] CFI Enabled
2,312,332 UART: [state] LifecycleState = Unprovisioned
2,314,273 UART: [state] DebugLocked = No
2,317,045 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,337 UART: [kat] SHA2-256
2,492,084 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,561 UART: [kat] ++
2,503,019 UART: [kat] sha1
2,514,884 UART: [kat] SHA2-256
2,517,583 UART: [kat] SHA2-384
2,523,839 UART: [kat] SHA2-512-ACC
2,526,213 UART: [kat] ECC-384
4,816,421 UART: [kat] HMAC-384Kdf
4,848,806 UART: [kat] LMS
6,039,089 UART: [kat] --
6,042,984 UART: [cold-reset] ++
6,044,690 UART: [fht] Storing FHT @ 0x50003400
6,055,699 UART: [idev] ++
6,056,282 UART: [idev] CDI.KEYID = 6
6,057,248 UART: [idev] SUBJECT.KEYID = 7
6,058,467 UART: [idev] UDS.KEYID = 0
6,060,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,210,153 UART: [idev] Erasing UDS.KEYID = 0
9,394,055 UART: [idev] Using Sha1 for KeyId Algorithm
9,415,450 UART: [idev] --
9,419,534 UART: [ldev] ++
9,420,113 UART: [ldev] CDI.KEYID = 6
9,421,084 UART: [ldev] SUBJECT.KEYID = 5
9,422,395 UART: [ldev] AUTHORITY.KEYID = 7
9,423,582 UART: [ldev] FE.KEYID = 1
9,471,448 UART: [ldev] Erasing FE.KEYID = 1
12,805,238 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,119,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,133,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,148,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,163,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,180,924 UART: [ldev] --
15,186,359 UART: [fwproc] Waiting for Commands...
15,189,705 UART: [fwproc] Received command 0x46574c44
15,191,893 UART: [fwproc] Received Image of size 118548 bytes
19,299,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,374,010 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,447,200 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,775,706 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,790,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,208,326 >>> mbox cmd response: failed
17,208,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,209,286 >>> mbox cmd response: failed
17,209,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,209,851 >>> mbox cmd response: failed
Initializing fuses
2,058,973 writing to cptra_bootfsm_go
5,838,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,978,418 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,460 UART:
192,839 UART: Running Caliptra ROM ...
194,039 UART:
603,646 UART: [state] CFI Enabled
618,223 UART: [state] LifecycleState = Unprovisioned
620,205 UART: [state] DebugLocked = No
623,023 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,659 UART: [kat] SHA2-256
798,420 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,961 UART: [kat] ++
809,415 UART: [kat] sha1
820,403 UART: [kat] SHA2-256
823,140 UART: [kat] SHA2-384
827,723 UART: [kat] SHA2-512-ACC
830,065 UART: [kat] ECC-384
3,113,948 UART: [kat] HMAC-384Kdf
3,125,603 UART: [kat] LMS
4,315,684 UART: [kat] --
4,320,299 UART: [cold-reset] ++
4,322,086 UART: [fht] Storing FHT @ 0x50003400
4,334,937 UART: [idev] ++
4,335,507 UART: [idev] CDI.KEYID = 6
4,336,421 UART: [idev] SUBJECT.KEYID = 7
4,337,694 UART: [idev] UDS.KEYID = 0
4,340,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,611 UART: [idev] Erasing UDS.KEYID = 0
7,624,775 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,807 UART: [idev] --
7,650,408 UART: [ldev] ++
7,651,018 UART: [ldev] CDI.KEYID = 6
7,651,914 UART: [ldev] SUBJECT.KEYID = 5
7,653,202 UART: [ldev] AUTHORITY.KEYID = 7
7,654,443 UART: [ldev] FE.KEYID = 1
7,664,804 UART: [ldev] Erasing FE.KEYID = 1
10,954,065 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,692 UART: [ldev] --
13,311,446 UART: [fwproc] Waiting for Commands...
13,314,204 UART: [fwproc] Received command 0x46574c44
13,316,401 UART: [fwproc] Received Image of size 118548 bytes
17,415,462 UART: ROM Fatal Error: 0x000B002A
17,418,927 >>> mbox cmd response: failed
17,419,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,419,703 >>> mbox cmd response: failed
17,419,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,420,278 >>> mbox cmd response: failed
Initializing fuses
2,058,123 writing to cptra_bootfsm_go
2,247,449 UART:
2,247,783 UART: Running Caliptra ROM ...
2,248,928 UART:
3,034,648 UART: [state] CFI Enabled
3,046,772 UART: [state] LifecycleState = Unprovisioned
3,048,685 UART: [state] DebugLocked = No
3,049,979 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,054,027 UART: [kat] SHA2-256
3,223,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,234,330 UART: [kat] ++
3,234,795 UART: [kat] sha1
3,245,796 UART: [kat] SHA2-256
3,248,493 UART: [kat] SHA2-384
3,254,434 UART: [kat] SHA2-512-ACC
3,256,790 UART: [kat] ECC-384
5,540,724 UART: [kat] HMAC-384Kdf
5,551,178 UART: [kat] LMS
6,741,269 UART: [kat] --
6,746,364 UART: [cold-reset] ++
6,748,112 UART: [fht] Storing FHT @ 0x50003400
6,759,870 UART: [idev] ++
6,760,450 UART: [idev] CDI.KEYID = 6
6,761,338 UART: [idev] SUBJECT.KEYID = 7
6,762,610 UART: [idev] UDS.KEYID = 0
6,764,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,913,799 UART: [idev] Erasing UDS.KEYID = 0
10,049,716 UART: [idev] Using Sha1 for KeyId Algorithm
10,072,514 UART: [idev] --
10,075,520 UART: [ldev] ++
10,076,107 UART: [ldev] CDI.KEYID = 6
10,077,057 UART: [ldev] SUBJECT.KEYID = 5
10,078,320 UART: [ldev] AUTHORITY.KEYID = 7
10,079,509 UART: [ldev] FE.KEYID = 1
10,091,408 UART: [ldev] Erasing FE.KEYID = 1
13,377,684 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,674,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,688,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,703,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,718,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,736,780 UART: [ldev] --
15,740,752 UART: [fwproc] Waiting for Commands...
15,743,720 UART: [fwproc] Received command 0x46574c44
15,746,193 UART: [fwproc] Received Image of size 118548 bytes
19,845,593 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,916,509 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,989,714 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,317,486 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
4,129,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,404,967 >>> mbox cmd response: failed
17,405,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,405,993 >>> mbox cmd response: failed
17,406,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,406,574 >>> mbox cmd response: failed
Initializing fuses
2,059,067 writing to cptra_bootfsm_go
6,593,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,620,343 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,302 UART:
192,670 UART: Running Caliptra ROM ...
193,902 UART:
194,066 UART: [state] CFI Enabled
259,966 UART: [state] LifecycleState = Unprovisioned
261,889 UART: [state] DebugLocked = No
263,447 UART: [state] WD Timer not started. Device not locked for debugging
267,164 UART: [kat] SHA2-256
446,829 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,624 UART: [kat] ++
458,117 UART: [kat] sha1
469,167 UART: [kat] SHA2-256
471,908 UART: [kat] SHA2-384
479,095 UART: [kat] SHA2-512-ACC
481,505 UART: [kat] ECC-384
2,944,905 UART: [kat] HMAC-384Kdf
2,968,181 UART: [kat] LMS
3,444,668 UART: [kat] --
3,449,216 UART: [cold-reset] ++
3,451,265 UART: [fht] FHT @ 0x50003400
3,461,380 UART: [idev] ++
3,461,948 UART: [idev] CDI.KEYID = 6
3,462,914 UART: [idev] SUBJECT.KEYID = 7
3,464,187 UART: [idev] UDS.KEYID = 0
3,466,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,958 UART: [idev] Erasing UDS.KEYID = 0
5,978,973 UART: [idev] Sha1 KeyId Algorithm
6,001,142 UART: [idev] --
6,005,958 UART: [ldev] ++
6,006,535 UART: [ldev] CDI.KEYID = 6
6,007,506 UART: [ldev] SUBJECT.KEYID = 5
6,008,683 UART: [ldev] AUTHORITY.KEYID = 7
6,009,900 UART: [ldev] FE.KEYID = 1
6,056,089 UART: [ldev] Erasing FE.KEYID = 1
8,562,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,678 UART: [ldev] --
10,373,567 UART: [fwproc] Wait for Commands...
10,376,056 UART: [fwproc] Recv command 0x46574c44
10,378,099 UART: [fwproc] Recv'd Img size: 118548 bytes
13,854,945 UART: ROM Fatal Error: 0x000B002A
13,858,131 >>> mbox cmd response: failed
13,858,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,858,886 >>> mbox cmd response: failed
13,859,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,859,456 >>> mbox cmd response: failed
Initializing fuses
2,060,958 writing to cptra_bootfsm_go
2,250,282 UART:
2,250,634 UART: Running Caliptra ROM ...
2,251,737 UART:
2,251,897 UART: [state] CFI Enabled
2,316,883 UART: [state] LifecycleState = Unprovisioned
2,318,882 UART: [state] DebugLocked = No
2,321,488 UART: [state] WD Timer not started. Device not locked for debugging
2,324,598 UART: [kat] SHA2-256
2,504,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,515,012 UART: [kat] ++
2,515,484 UART: [kat] sha1
2,526,817 UART: [kat] SHA2-256
2,529,499 UART: [kat] SHA2-384
2,536,480 UART: [kat] SHA2-512-ACC
2,538,849 UART: [kat] ECC-384
4,999,440 UART: [kat] HMAC-384Kdf
5,022,207 UART: [kat] LMS
5,498,719 UART: [kat] --
5,503,334 UART: [cold-reset] ++
5,504,949 UART: [fht] FHT @ 0x50003400
5,516,039 UART: [idev] ++
5,516,616 UART: [idev] CDI.KEYID = 6
5,517,549 UART: [idev] SUBJECT.KEYID = 7
5,518,772 UART: [idev] UDS.KEYID = 0
5,521,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,670,332 UART: [idev] Erasing UDS.KEYID = 0
8,038,200 UART: [idev] Sha1 KeyId Algorithm
8,062,903 UART: [idev] --
8,068,366 UART: [ldev] ++
8,068,947 UART: [ldev] CDI.KEYID = 6
8,070,034 UART: [ldev] SUBJECT.KEYID = 5
8,071,150 UART: [ldev] AUTHORITY.KEYID = 7
8,072,339 UART: [ldev] FE.KEYID = 1
8,109,680 UART: [ldev] Erasing FE.KEYID = 1
10,619,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,342,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,358,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,374,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,389,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,412,079 UART: [ldev] --
12,416,982 UART: [fwproc] Wait for Commands...
12,419,950 UART: [fwproc] Recv command 0x46574c44
12,421,945 UART: [fwproc] Recv'd Img size: 118548 bytes
15,900,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,980,011 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,053,036 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,381,505 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,465,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,748,902 >>> mbox cmd response: failed
13,749,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,750,003 >>> mbox cmd response: failed
13,750,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,750,586 >>> mbox cmd response: failed
Initializing fuses
2,061,868 writing to cptra_bootfsm_go
5,519,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,274,507 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,502 writing to cptra_bootfsm_go
192,704 UART:
193,091 UART: Running Caliptra ROM ...
194,228 UART:
603,839 UART: [state] CFI Enabled
614,488 UART: [state] LifecycleState = Unprovisioned
616,369 UART: [state] DebugLocked = No
618,996 UART: [state] WD Timer not started. Device not locked for debugging
623,129 UART: [kat] SHA2-256
802,769 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,549 UART: [kat] ++
814,143 UART: [kat] sha1
824,328 UART: [kat] SHA2-256
827,009 UART: [kat] SHA2-384
832,941 UART: [kat] SHA2-512-ACC
835,344 UART: [kat] ECC-384
3,276,098 UART: [kat] HMAC-384Kdf
3,288,429 UART: [kat] LMS
3,764,926 UART: [kat] --
3,768,490 UART: [cold-reset] ++
3,770,964 UART: [fht] FHT @ 0x50003400
3,780,699 UART: [idev] ++
3,781,269 UART: [idev] CDI.KEYID = 6
3,782,288 UART: [idev] SUBJECT.KEYID = 7
3,783,504 UART: [idev] UDS.KEYID = 0
3,785,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,484 UART: [idev] Erasing UDS.KEYID = 0
6,263,269 UART: [idev] Sha1 KeyId Algorithm
6,287,645 UART: [idev] --
6,293,330 UART: [ldev] ++
6,293,907 UART: [ldev] CDI.KEYID = 6
6,294,821 UART: [ldev] SUBJECT.KEYID = 5
6,296,045 UART: [ldev] AUTHORITY.KEYID = 7
6,297,288 UART: [ldev] FE.KEYID = 1
6,307,988 UART: [ldev] Erasing FE.KEYID = 1
8,782,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,515,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,037 UART: [ldev] --
10,575,544 UART: [fwproc] Wait for Commands...
10,577,429 UART: [fwproc] Recv command 0x46574c44
10,579,421 UART: [fwproc] Recv'd Img size: 118548 bytes
14,057,395 UART: ROM Fatal Error: 0x000B002A
14,060,635 >>> mbox cmd response: failed
14,060,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,061,246 >>> mbox cmd response: failed
14,061,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,062,032 >>> mbox cmd response: failed
Initializing fuses
2,067,558 writing to cptra_bootfsm_go
2,256,870 UART:
2,257,216 UART: Running Caliptra ROM ...
2,258,353 UART:
6,392,622 UART: [state] CFI Enabled
6,407,304 UART: [state] LifecycleState = Unprovisioned
6,409,255 UART: [state] DebugLocked = No
6,411,851 UART: [state] WD Timer not started. Device not locked for debugging
6,415,825 UART: [kat] SHA2-256
6,595,477 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,606,245 UART: [kat] ++
6,606,799 UART: [kat] sha1
6,616,729 UART: [kat] SHA2-256
6,619,452 UART: [kat] SHA2-384
6,625,236 UART: [kat] SHA2-512-ACC
6,627,594 UART: [kat] ECC-384
9,069,679 UART: [kat] HMAC-384Kdf
9,082,303 UART: [kat] LMS
9,558,772 UART: [kat] --
9,562,442 UART: [cold-reset] ++
9,564,324 UART: [fht] FHT @ 0x50003400
9,576,279 UART: [idev] ++
9,576,856 UART: [idev] CDI.KEYID = 6
9,577,829 UART: [idev] SUBJECT.KEYID = 7
9,579,049 UART: [idev] UDS.KEYID = 0
9,581,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,730,416 UART: [idev] Erasing UDS.KEYID = 0
12,058,012 UART: [idev] Sha1 KeyId Algorithm
12,083,103 UART: [idev] --
12,087,936 UART: [ldev] ++
12,088,548 UART: [ldev] CDI.KEYID = 6
12,089,469 UART: [ldev] SUBJECT.KEYID = 5
12,090,640 UART: [ldev] AUTHORITY.KEYID = 7
12,091,930 UART: [ldev] FE.KEYID = 1
12,104,686 UART: [ldev] Erasing FE.KEYID = 1
14,582,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,300,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,316,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,332,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,347,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,370,947 UART: [ldev] --
16,376,000 UART: [fwproc] Wait for Commands...
16,378,806 UART: [fwproc] Recv command 0x46574c44
16,380,850 UART: [fwproc] Recv'd Img size: 118548 bytes
19,864,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,944,163 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,017,188 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,346,220 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
3,780,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,981,615 >>> mbox cmd response: failed
13,982,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,982,578 >>> mbox cmd response: failed
13,982,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,983,135 >>> mbox cmd response: failed
Initializing fuses
2,061,596 writing to cptra_bootfsm_go
9,655,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,332,531 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
192,299 UART:
192,657 UART: Running Caliptra ROM ...
193,843 UART:
194,018 UART: [state] CFI Enabled
261,489 UART: [state] LifecycleState = Unprovisioned
263,916 UART: [state] DebugLocked = No
266,760 UART: [state] WD Timer not started. Device not locked for debugging
271,001 UART: [kat] SHA2-256
460,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,672 UART: [kat] ++
472,175 UART: [kat] sha1
482,788 UART: [kat] SHA2-256
485,801 UART: [kat] SHA2-384
491,893 UART: [kat] SHA2-512-ACC
494,507 UART: [kat] ECC-384
2,947,034 UART: [kat] HMAC-384Kdf
2,969,980 UART: [kat] LMS
3,501,757 UART: [kat] --
3,508,205 UART: [cold-reset] ++
3,509,170 UART: [fht] FHT @ 0x50003400
3,519,674 UART: [idev] ++
3,520,367 UART: [idev] CDI.KEYID = 6
3,521,391 UART: [idev] SUBJECT.KEYID = 7
3,522,521 UART: [idev] UDS.KEYID = 0
3,525,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,557 UART: [idev] Erasing UDS.KEYID = 0
6,027,124 UART: [idev] Sha1 KeyId Algorithm
6,051,136 UART: [idev] --
6,054,979 UART: [ldev] ++
6,055,666 UART: [ldev] CDI.KEYID = 6
6,056,558 UART: [ldev] SUBJECT.KEYID = 5
6,057,724 UART: [ldev] AUTHORITY.KEYID = 7
6,059,126 UART: [ldev] FE.KEYID = 1
6,098,666 UART: [ldev] Erasing FE.KEYID = 1
8,604,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,866 UART: [ldev] --
10,413,683 UART: [fwproc] Wait for Commands...
10,415,527 UART: [fwproc] Recv command 0x46574c44
10,417,848 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,318 UART: ROM Fatal Error: 0x000B002A
13,918,990 >>> mbox cmd response: failed
13,919,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,919,737 >>> mbox cmd response: failed
13,920,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,920,307 >>> mbox cmd response: failed
Initializing fuses
2,062,000 writing to cptra_bootfsm_go
2,251,337 UART:
2,251,697 UART: Running Caliptra ROM ...
2,252,771 UART:
2,252,936 UART: [state] CFI Enabled
2,316,337 UART: [state] LifecycleState = Unprovisioned
2,318,717 UART: [state] DebugLocked = No
2,321,471 UART: [state] WD Timer not started. Device not locked for debugging
2,325,197 UART: [kat] SHA2-256
2,514,906 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,669 UART: [kat] ++
2,526,163 UART: [kat] sha1
2,537,494 UART: [kat] SHA2-256
2,540,507 UART: [kat] SHA2-384
2,547,062 UART: [kat] SHA2-512-ACC
2,549,651 UART: [kat] ECC-384
5,004,266 UART: [kat] HMAC-384Kdf
5,026,865 UART: [kat] LMS
5,558,601 UART: [kat] --
5,562,775 UART: [cold-reset] ++
5,563,903 UART: [fht] FHT @ 0x50003400
5,576,625 UART: [idev] ++
5,577,312 UART: [idev] CDI.KEYID = 6
5,578,385 UART: [idev] SUBJECT.KEYID = 7
5,579,516 UART: [idev] UDS.KEYID = 0
5,581,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,730,890 UART: [idev] Erasing UDS.KEYID = 0
8,081,691 UART: [idev] Sha1 KeyId Algorithm
8,103,745 UART: [idev] --
8,108,175 UART: [ldev] ++
8,108,862 UART: [ldev] CDI.KEYID = 6
8,109,749 UART: [ldev] SUBJECT.KEYID = 5
8,110,857 UART: [ldev] AUTHORITY.KEYID = 7
8,112,153 UART: [ldev] FE.KEYID = 1
8,154,322 UART: [ldev] Erasing FE.KEYID = 1
10,661,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,927 UART: [ldev] --
12,468,670 UART: [fwproc] Wait for Commands...
12,470,621 UART: [fwproc] Recv command 0x46574c44
12,472,898 UART: [fwproc] Recv'd Img size: 118548 bytes
15,968,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,048,031 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,171,678 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,732,339 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,446,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,351,712 >>> mbox cmd response: failed
14,352,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,352,777 >>> mbox cmd response: failed
14,353,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,353,345 >>> mbox cmd response: failed
Initializing fuses
2,061,931 writing to cptra_bootfsm_go
5,497,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,875,376 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,526 UART:
192,899 UART: Running Caliptra ROM ...
194,111 UART:
603,917 UART: [state] CFI Enabled
616,374 UART: [state] LifecycleState = Unprovisioned
618,707 UART: [state] DebugLocked = No
620,006 UART: [state] WD Timer not started. Device not locked for debugging
624,661 UART: [kat] SHA2-256
814,550 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,357 UART: [kat] ++
825,957 UART: [kat] sha1
838,571 UART: [kat] SHA2-256
841,583 UART: [kat] SHA2-384
847,847 UART: [kat] SHA2-512-ACC
850,419 UART: [kat] ECC-384
3,290,574 UART: [kat] HMAC-384Kdf
3,303,238 UART: [kat] LMS
3,835,078 UART: [kat] --
3,838,702 UART: [cold-reset] ++
3,839,726 UART: [fht] FHT @ 0x50003400
3,852,010 UART: [idev] ++
3,852,695 UART: [idev] CDI.KEYID = 6
3,853,824 UART: [idev] SUBJECT.KEYID = 7
3,854,935 UART: [idev] UDS.KEYID = 0
3,857,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,020 UART: [idev] Erasing UDS.KEYID = 0
6,328,387 UART: [idev] Sha1 KeyId Algorithm
6,350,916 UART: [idev] --
6,355,537 UART: [ldev] ++
6,356,239 UART: [ldev] CDI.KEYID = 6
6,357,156 UART: [ldev] SUBJECT.KEYID = 5
6,358,321 UART: [ldev] AUTHORITY.KEYID = 7
6,359,555 UART: [ldev] FE.KEYID = 1
6,369,859 UART: [ldev] Erasing FE.KEYID = 1
8,849,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,705 UART: [ldev] --
10,640,009 UART: [fwproc] Wait for Commands...
10,642,192 UART: [fwproc] Recv command 0x46574c44
10,644,465 UART: [fwproc] Recv'd Img size: 118548 bytes
14,135,167 UART: ROM Fatal Error: 0x000B002A
14,138,862 >>> mbox cmd response: failed
14,139,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,139,663 >>> mbox cmd response: failed
14,139,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,140,243 >>> mbox cmd response: failed
Initializing fuses
2,063,659 writing to cptra_bootfsm_go
2,252,950 UART:
2,253,286 UART: Running Caliptra ROM ...
2,254,425 UART:
6,306,118 UART: [state] CFI Enabled
6,320,076 UART: [state] LifecycleState = Unprovisioned
6,322,441 UART: [state] DebugLocked = No
6,323,780 UART: [state] WD Timer not started. Device not locked for debugging
6,329,169 UART: [kat] SHA2-256
6,519,057 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,529,868 UART: [kat] ++
6,530,519 UART: [kat] sha1
6,541,049 UART: [kat] SHA2-256
6,544,093 UART: [kat] SHA2-384
6,549,829 UART: [kat] SHA2-512-ACC
6,552,408 UART: [kat] ECC-384
8,996,724 UART: [kat] HMAC-384Kdf
9,010,088 UART: [kat] LMS
9,541,881 UART: [kat] --
9,547,825 UART: [cold-reset] ++
9,549,545 UART: [fht] FHT @ 0x50003400
9,560,927 UART: [idev] ++
9,561,615 UART: [idev] CDI.KEYID = 6
9,562,534 UART: [idev] SUBJECT.KEYID = 7
9,563,753 UART: [idev] UDS.KEYID = 0
9,566,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,714,986 UART: [idev] Erasing UDS.KEYID = 0
12,046,770 UART: [idev] Sha1 KeyId Algorithm
12,069,044 UART: [idev] --
12,073,723 UART: [ldev] ++
12,074,420 UART: [ldev] CDI.KEYID = 6
12,075,312 UART: [ldev] SUBJECT.KEYID = 5
12,076,531 UART: [ldev] AUTHORITY.KEYID = 7
12,077,774 UART: [ldev] FE.KEYID = 1
12,088,349 UART: [ldev] Erasing FE.KEYID = 1
14,564,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,285,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,300,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,315,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,331,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,352,020 UART: [ldev] --
16,357,951 UART: [fwproc] Wait for Commands...
16,359,457 UART: [fwproc] Recv command 0x46574c44
16,361,781 UART: [fwproc] Recv'd Img size: 118548 bytes
19,858,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,938,701 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,062,315 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,623,228 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,752,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,559,350 >>> mbox cmd response: failed
14,559,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,560,327 >>> mbox cmd response: failed
14,560,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,560,906 >>> mbox cmd response: failed
Initializing fuses
2,061,673 writing to cptra_bootfsm_go
9,056,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,338,979 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,652 UART: [state] LifecycleState = Unprovisioned
86,307 UART: [state] DebugLocked = No
87,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,687 UART: [kat] SHA2-256
882,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,733 UART: [kat] ++
886,885 UART: [kat] sha1
891,167 UART: [kat] SHA2-256
893,105 UART: [kat] SHA2-384
896,000 UART: [kat] SHA2-512-ACC
897,901 UART: [kat] ECC-384
903,714 UART: [kat] HMAC-384Kdf
908,232 UART: [kat] LMS
1,476,428 UART: [kat] --
1,477,405 UART: [cold-reset] ++
1,477,861 UART: [fht] Storing FHT @ 0x50003400
1,480,584 UART: [idev] ++
1,480,752 UART: [idev] CDI.KEYID = 6
1,481,112 UART: [idev] SUBJECT.KEYID = 7
1,481,536 UART: [idev] UDS.KEYID = 0
1,481,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,550 UART: [idev] Erasing UDS.KEYID = 0
1,505,662 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,370 UART: [idev] --
1,515,469 UART: [ldev] ++
1,515,637 UART: [ldev] CDI.KEYID = 6
1,516,000 UART: [ldev] SUBJECT.KEYID = 5
1,516,426 UART: [ldev] AUTHORITY.KEYID = 7
1,516,889 UART: [ldev] FE.KEYID = 1
1,522,291 UART: [ldev] Erasing FE.KEYID = 1
1,547,968 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,920 UART: [ldev] --
1,587,317 UART: [fwproc] Waiting for Commands...
1,588,090 UART: [fwproc] Received command 0x46574c44
1,588,881 UART: [fwproc] Received Image of size 118548 bytes
2,932,948 UART: ROM Fatal Error: 0x000B002A
2,934,107 >>> mbox cmd response: failed
2,934,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,934,113 >>> mbox cmd response: failed
2,934,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,934,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,271 UART: [kat] SHA2-256
892,209 UART: [kat] SHA2-384
894,904 UART: [kat] SHA2-512-ACC
896,805 UART: [kat] ECC-384
902,566 UART: [kat] HMAC-384Kdf
907,290 UART: [kat] LMS
1,475,486 UART: [kat] --
1,476,563 UART: [cold-reset] ++
1,476,995 UART: [fht] Storing FHT @ 0x50003400
1,479,834 UART: [idev] ++
1,480,002 UART: [idev] CDI.KEYID = 6
1,480,362 UART: [idev] SUBJECT.KEYID = 7
1,480,786 UART: [idev] UDS.KEYID = 0
1,481,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,764 UART: [idev] Erasing UDS.KEYID = 0
1,504,942 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,582 UART: [idev] --
1,514,575 UART: [ldev] ++
1,514,743 UART: [ldev] CDI.KEYID = 6
1,515,106 UART: [ldev] SUBJECT.KEYID = 5
1,515,532 UART: [ldev] AUTHORITY.KEYID = 7
1,515,995 UART: [ldev] FE.KEYID = 1
1,521,131 UART: [ldev] Erasing FE.KEYID = 1
1,546,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,114 UART: [ldev] --
1,585,513 UART: [fwproc] Waiting for Commands...
1,586,352 UART: [fwproc] Received command 0x46574c44
1,587,143 UART: [fwproc] Received Image of size 118548 bytes
2,930,604 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,526 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,744 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,033 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,784,524 >>> mbox cmd response: failed
2,784,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,530 >>> mbox cmd response: failed
2,784,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,533 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Unprovisioned
86,412 UART: [state] DebugLocked = No
86,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,514 UART: [kat] SHA2-256
882,445 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,560 UART: [kat] ++
886,712 UART: [kat] sha1
891,092 UART: [kat] SHA2-256
893,030 UART: [kat] SHA2-384
895,905 UART: [kat] SHA2-512-ACC
897,806 UART: [kat] ECC-384
903,513 UART: [kat] HMAC-384Kdf
908,183 UART: [kat] LMS
1,476,379 UART: [kat] --
1,477,390 UART: [cold-reset] ++
1,477,898 UART: [fht] Storing FHT @ 0x50003400
1,480,677 UART: [idev] ++
1,480,845 UART: [idev] CDI.KEYID = 6
1,481,205 UART: [idev] SUBJECT.KEYID = 7
1,481,629 UART: [idev] UDS.KEYID = 0
1,481,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,409 UART: [idev] Erasing UDS.KEYID = 0
1,506,215 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,047 UART: [idev] --
1,515,986 UART: [ldev] ++
1,516,154 UART: [ldev] CDI.KEYID = 6
1,516,517 UART: [ldev] SUBJECT.KEYID = 5
1,516,943 UART: [ldev] AUTHORITY.KEYID = 7
1,517,406 UART: [ldev] FE.KEYID = 1
1,522,292 UART: [ldev] Erasing FE.KEYID = 1
1,548,021 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,877 UART: [ldev] --
1,587,336 UART: [fwproc] Waiting for Commands...
1,588,019 UART: [fwproc] Received command 0x46574c44
1,588,810 UART: [fwproc] Received Image of size 118548 bytes
2,932,319 UART: ROM Fatal Error: 0x000B002A
2,933,478 >>> mbox cmd response: failed
2,933,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,484 >>> mbox cmd response: failed
2,933,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,490 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,819 UART: [state] LifecycleState = Unprovisioned
86,474 UART: [state] DebugLocked = No
87,046 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,664 UART: [kat] SHA2-256
882,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,710 UART: [kat] ++
886,862 UART: [kat] sha1
890,960 UART: [kat] SHA2-256
892,898 UART: [kat] SHA2-384
895,629 UART: [kat] SHA2-512-ACC
897,530 UART: [kat] ECC-384
903,187 UART: [kat] HMAC-384Kdf
907,695 UART: [kat] LMS
1,475,891 UART: [kat] --
1,476,886 UART: [cold-reset] ++
1,477,228 UART: [fht] Storing FHT @ 0x50003400
1,479,961 UART: [idev] ++
1,480,129 UART: [idev] CDI.KEYID = 6
1,480,489 UART: [idev] SUBJECT.KEYID = 7
1,480,913 UART: [idev] UDS.KEYID = 0
1,481,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,853 UART: [idev] Erasing UDS.KEYID = 0
1,505,605 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,169 UART: [idev] --
1,515,334 UART: [ldev] ++
1,515,502 UART: [ldev] CDI.KEYID = 6
1,515,865 UART: [ldev] SUBJECT.KEYID = 5
1,516,291 UART: [ldev] AUTHORITY.KEYID = 7
1,516,754 UART: [ldev] FE.KEYID = 1
1,521,890 UART: [ldev] Erasing FE.KEYID = 1
1,547,627 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,705 UART: [ldev] --
1,587,024 UART: [fwproc] Waiting for Commands...
1,587,781 UART: [fwproc] Received command 0x46574c44
1,588,572 UART: [fwproc] Received Image of size 118548 bytes
2,933,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,255 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,473 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,750 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,787,043 >>> mbox cmd response: failed
2,787,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,787,049 >>> mbox cmd response: failed
2,787,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,787,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,430 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,908 UART: [kat] SHA2-256
901,848 UART: [kat] SHA2-384
904,721 UART: [kat] SHA2-512-ACC
906,622 UART: [kat] ECC-384
916,005 UART: [kat] HMAC-384Kdf
920,439 UART: [kat] LMS
1,168,751 UART: [kat] --
1,169,714 UART: [cold-reset] ++
1,170,052 UART: [fht] FHT @ 0x50003400
1,172,768 UART: [idev] ++
1,172,936 UART: [idev] CDI.KEYID = 6
1,173,297 UART: [idev] SUBJECT.KEYID = 7
1,173,722 UART: [idev] UDS.KEYID = 0
1,174,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,019 UART: [idev] Erasing UDS.KEYID = 0
1,199,135 UART: [idev] Sha1 KeyId Algorithm
1,208,139 UART: [idev] --
1,209,226 UART: [ldev] ++
1,209,394 UART: [ldev] CDI.KEYID = 6
1,209,758 UART: [ldev] SUBJECT.KEYID = 5
1,210,185 UART: [ldev] AUTHORITY.KEYID = 7
1,210,648 UART: [ldev] FE.KEYID = 1
1,215,900 UART: [ldev] Erasing FE.KEYID = 1
1,242,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,572 UART: [ldev] --
1,281,955 UART: [fwproc] Wait for Commands...
1,282,736 UART: [fwproc] Recv command 0x46574c44
1,283,469 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,787 UART: ROM Fatal Error: 0x000B002A
2,627,946 >>> mbox cmd response: failed
2,627,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,952 >>> mbox cmd response: failed
2,627,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
890,910 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,014 UART: [kat] ++
895,166 UART: [kat] sha1
899,322 UART: [kat] SHA2-256
901,262 UART: [kat] SHA2-384
904,137 UART: [kat] SHA2-512-ACC
906,038 UART: [kat] ECC-384
915,683 UART: [kat] HMAC-384Kdf
920,303 UART: [kat] LMS
1,168,615 UART: [kat] --
1,169,534 UART: [cold-reset] ++
1,169,998 UART: [fht] FHT @ 0x50003400
1,172,700 UART: [idev] ++
1,172,868 UART: [idev] CDI.KEYID = 6
1,173,229 UART: [idev] SUBJECT.KEYID = 7
1,173,654 UART: [idev] UDS.KEYID = 0
1,174,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,719 UART: [idev] Erasing UDS.KEYID = 0
1,198,475 UART: [idev] Sha1 KeyId Algorithm
1,207,351 UART: [idev] --
1,208,322 UART: [ldev] ++
1,208,490 UART: [ldev] CDI.KEYID = 6
1,208,854 UART: [ldev] SUBJECT.KEYID = 5
1,209,281 UART: [ldev] AUTHORITY.KEYID = 7
1,209,744 UART: [ldev] FE.KEYID = 1
1,214,902 UART: [ldev] Erasing FE.KEYID = 1
1,240,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,896 UART: [ldev] --
1,280,287 UART: [fwproc] Wait for Commands...
1,280,892 UART: [fwproc] Recv command 0x46574c44
1,281,625 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,918 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,093 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,414 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,085 >>> mbox cmd response: failed
2,482,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,091 >>> mbox cmd response: failed
2,482,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,461 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
86,972 UART: [state] WD Timer not started. Device not locked for debugging
88,283 UART: [kat] SHA2-256
891,833 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,937 UART: [kat] ++
896,089 UART: [kat] sha1
900,457 UART: [kat] SHA2-256
902,397 UART: [kat] SHA2-384
905,094 UART: [kat] SHA2-512-ACC
906,995 UART: [kat] ECC-384
916,796 UART: [kat] HMAC-384Kdf
921,524 UART: [kat] LMS
1,169,836 UART: [kat] --
1,170,871 UART: [cold-reset] ++
1,171,365 UART: [fht] FHT @ 0x50003400
1,174,087 UART: [idev] ++
1,174,255 UART: [idev] CDI.KEYID = 6
1,174,616 UART: [idev] SUBJECT.KEYID = 7
1,175,041 UART: [idev] UDS.KEYID = 0
1,175,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,218 UART: [idev] Erasing UDS.KEYID = 0
1,200,424 UART: [idev] Sha1 KeyId Algorithm
1,209,354 UART: [idev] --
1,210,359 UART: [ldev] ++
1,210,527 UART: [ldev] CDI.KEYID = 6
1,210,891 UART: [ldev] SUBJECT.KEYID = 5
1,211,318 UART: [ldev] AUTHORITY.KEYID = 7
1,211,781 UART: [ldev] FE.KEYID = 1
1,216,747 UART: [ldev] Erasing FE.KEYID = 1
1,242,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,405 UART: [ldev] --
1,281,672 UART: [fwproc] Wait for Commands...
1,282,413 UART: [fwproc] Recv command 0x46574c44
1,283,146 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,082 UART: ROM Fatal Error: 0x000B002A
2,627,241 >>> mbox cmd response: failed
2,627,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,247 >>> mbox cmd response: failed
2,627,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
891,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,226 UART: [kat] SHA2-512-ACC
906,127 UART: [kat] ECC-384
915,940 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,875 UART: [cold-reset] ++
1,170,207 UART: [fht] FHT @ 0x50003400
1,172,659 UART: [idev] ++
1,172,827 UART: [idev] CDI.KEYID = 6
1,173,188 UART: [idev] SUBJECT.KEYID = 7
1,173,613 UART: [idev] UDS.KEYID = 0
1,173,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,754 UART: [idev] Erasing UDS.KEYID = 0
1,199,094 UART: [idev] Sha1 KeyId Algorithm
1,207,902 UART: [idev] --
1,209,059 UART: [ldev] ++
1,209,227 UART: [ldev] CDI.KEYID = 6
1,209,591 UART: [ldev] SUBJECT.KEYID = 5
1,210,018 UART: [ldev] AUTHORITY.KEYID = 7
1,210,481 UART: [ldev] FE.KEYID = 1
1,215,757 UART: [ldev] Erasing FE.KEYID = 1
1,242,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,621 UART: [ldev] --
1,280,838 UART: [fwproc] Wait for Commands...
1,281,411 UART: [fwproc] Recv command 0x46574c44
1,282,144 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,459 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,634 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,035 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,611 >>> mbox cmd response: failed
2,483,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,617 >>> mbox cmd response: failed
2,483,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,623 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,350 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
893,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,435 UART: [kat] ++
897,587 UART: [kat] sha1
901,603 UART: [kat] SHA2-256
903,543 UART: [kat] SHA2-384
906,178 UART: [kat] SHA2-512-ACC
908,079 UART: [kat] ECC-384
917,910 UART: [kat] HMAC-384Kdf
922,620 UART: [kat] LMS
1,170,948 UART: [kat] --
1,171,647 UART: [cold-reset] ++
1,172,081 UART: [fht] FHT @ 0x50003400
1,174,614 UART: [idev] ++
1,174,782 UART: [idev] CDI.KEYID = 6
1,175,142 UART: [idev] SUBJECT.KEYID = 7
1,175,566 UART: [idev] UDS.KEYID = 0
1,175,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,672 UART: [idev] Erasing UDS.KEYID = 0
1,201,085 UART: [idev] Sha1 KeyId Algorithm
1,209,549 UART: [idev] --
1,210,589 UART: [ldev] ++
1,210,757 UART: [ldev] CDI.KEYID = 6
1,211,120 UART: [ldev] SUBJECT.KEYID = 5
1,211,546 UART: [ldev] AUTHORITY.KEYID = 7
1,212,009 UART: [ldev] FE.KEYID = 1
1,216,965 UART: [ldev] Erasing FE.KEYID = 1
1,242,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,085 UART: [ldev] --
1,282,440 UART: [fwproc] Wait for Commands...
1,283,068 UART: [fwproc] Recv command 0x46574c44
1,283,796 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,901 UART: ROM Fatal Error: 0x000B002A
2,629,060 >>> mbox cmd response: failed
2,629,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,066 >>> mbox cmd response: failed
2,629,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,635 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
893,526 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,651 UART: [kat] ++
897,803 UART: [kat] sha1
902,089 UART: [kat] SHA2-256
904,029 UART: [kat] SHA2-384
906,964 UART: [kat] SHA2-512-ACC
908,865 UART: [kat] ECC-384
918,730 UART: [kat] HMAC-384Kdf
923,378 UART: [kat] LMS
1,171,706 UART: [kat] --
1,172,935 UART: [cold-reset] ++
1,173,373 UART: [fht] FHT @ 0x50003400
1,176,126 UART: [idev] ++
1,176,294 UART: [idev] CDI.KEYID = 6
1,176,654 UART: [idev] SUBJECT.KEYID = 7
1,177,078 UART: [idev] UDS.KEYID = 0
1,177,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,894 UART: [idev] Erasing UDS.KEYID = 0
1,201,969 UART: [idev] Sha1 KeyId Algorithm
1,210,283 UART: [idev] --
1,211,223 UART: [ldev] ++
1,211,391 UART: [ldev] CDI.KEYID = 6
1,211,754 UART: [ldev] SUBJECT.KEYID = 5
1,212,180 UART: [ldev] AUTHORITY.KEYID = 7
1,212,643 UART: [ldev] FE.KEYID = 1
1,218,123 UART: [ldev] Erasing FE.KEYID = 1
1,243,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,879 UART: [ldev] --
1,283,290 UART: [fwproc] Wait for Commands...
1,284,110 UART: [fwproc] Recv command 0x46574c44
1,284,838 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,829 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,999 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,222 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,959 >>> mbox cmd response: failed
2,481,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,965 >>> mbox cmd response: failed
2,481,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,621 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,360 UART: [state] WD Timer not started. Device not locked for debugging
87,499 UART: [kat] SHA2-256
893,149 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,274 UART: [kat] ++
897,426 UART: [kat] sha1
901,568 UART: [kat] SHA2-256
903,508 UART: [kat] SHA2-384
906,435 UART: [kat] SHA2-512-ACC
908,336 UART: [kat] ECC-384
917,889 UART: [kat] HMAC-384Kdf
922,461 UART: [kat] LMS
1,170,789 UART: [kat] --
1,171,584 UART: [cold-reset] ++
1,172,028 UART: [fht] FHT @ 0x50003400
1,174,605 UART: [idev] ++
1,174,773 UART: [idev] CDI.KEYID = 6
1,175,133 UART: [idev] SUBJECT.KEYID = 7
1,175,557 UART: [idev] UDS.KEYID = 0
1,175,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,411 UART: [idev] Erasing UDS.KEYID = 0
1,199,896 UART: [idev] Sha1 KeyId Algorithm
1,208,492 UART: [idev] --
1,209,604 UART: [ldev] ++
1,209,772 UART: [ldev] CDI.KEYID = 6
1,210,135 UART: [ldev] SUBJECT.KEYID = 5
1,210,561 UART: [ldev] AUTHORITY.KEYID = 7
1,211,024 UART: [ldev] FE.KEYID = 1
1,216,222 UART: [ldev] Erasing FE.KEYID = 1
1,242,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,930 UART: [ldev] --
1,281,195 UART: [fwproc] Wait for Commands...
1,281,919 UART: [fwproc] Recv command 0x46574c44
1,282,647 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,052 UART: ROM Fatal Error: 0x000B002A
2,627,211 >>> mbox cmd response: failed
2,627,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,217 >>> mbox cmd response: failed
2,627,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
893,293 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,418 UART: [kat] ++
897,570 UART: [kat] sha1
901,770 UART: [kat] SHA2-256
903,710 UART: [kat] SHA2-384
906,595 UART: [kat] SHA2-512-ACC
908,496 UART: [kat] ECC-384
918,295 UART: [kat] HMAC-384Kdf
922,969 UART: [kat] LMS
1,171,297 UART: [kat] --
1,172,136 UART: [cold-reset] ++
1,172,598 UART: [fht] FHT @ 0x50003400
1,175,133 UART: [idev] ++
1,175,301 UART: [idev] CDI.KEYID = 6
1,175,661 UART: [idev] SUBJECT.KEYID = 7
1,176,085 UART: [idev] UDS.KEYID = 0
1,176,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,823 UART: [idev] Erasing UDS.KEYID = 0
1,200,796 UART: [idev] Sha1 KeyId Algorithm
1,209,142 UART: [idev] --
1,210,086 UART: [ldev] ++
1,210,254 UART: [ldev] CDI.KEYID = 6
1,210,617 UART: [ldev] SUBJECT.KEYID = 5
1,211,043 UART: [ldev] AUTHORITY.KEYID = 7
1,211,506 UART: [ldev] FE.KEYID = 1
1,216,626 UART: [ldev] Erasing FE.KEYID = 1
1,242,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,920 UART: [ldev] --
1,282,207 UART: [fwproc] Wait for Commands...
1,282,871 UART: [fwproc] Recv command 0x46574c44
1,283,599 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,852 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,022 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,295 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,812 >>> mbox cmd response: failed
2,481,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,818 >>> mbox cmd response: failed
2,481,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,030 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,077 UART:
192,435 UART: Running Caliptra ROM ...
193,633 UART:
193,784 UART: [state] CFI Enabled
262,746 UART: [state] LifecycleState = Unprovisioned
264,712 UART: [state] DebugLocked = No
267,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,640 UART: [kat] SHA2-256
442,334 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,823 UART: [kat] ++
453,369 UART: [kat] sha1
464,139 UART: [kat] SHA2-256
466,811 UART: [kat] SHA2-384
472,476 UART: [kat] SHA2-512-ACC
474,841 UART: [kat] ECC-384
2,765,001 UART: [kat] HMAC-384Kdf
2,778,015 UART: [kat] LMS
3,968,334 UART: [kat] --
3,973,327 UART: [cold-reset] ++
3,974,512 UART: [fht] Storing FHT @ 0x50003400
3,986,106 UART: [idev] ++
3,986,725 UART: [idev] CDI.KEYID = 6
3,987,632 UART: [idev] SUBJECT.KEYID = 7
3,988,901 UART: [idev] UDS.KEYID = 0
3,991,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,059 UART: [idev] Erasing UDS.KEYID = 0
7,323,637 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,458 UART: [idev] --
7,351,022 UART: [ldev] ++
7,351,597 UART: [ldev] CDI.KEYID = 6
7,352,635 UART: [ldev] SUBJECT.KEYID = 5
7,353,802 UART: [ldev] AUTHORITY.KEYID = 7
7,355,073 UART: [ldev] FE.KEYID = 1
7,400,647 UART: [ldev] Erasing FE.KEYID = 1
10,732,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,200 UART: [ldev] --
13,095,684 UART: [fwproc] Waiting for Commands...
13,098,171 UART: [fwproc] Received command 0x46574c44
13,100,369 UART: [fwproc] Received Image of size 118548 bytes
17,206,799 UART: ROM Fatal Error: 0x000B002B
17,210,274 >>> mbox cmd response: failed
17,210,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,211,069 >>> mbox cmd response: failed
17,211,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,211,641 >>> mbox cmd response: failed
Initializing fuses
2,057,431 writing to cptra_bootfsm_go
2,246,736 UART:
2,247,078 UART: Running Caliptra ROM ...
2,248,217 UART:
2,248,386 UART: [state] CFI Enabled
2,315,643 UART: [state] LifecycleState = Unprovisioned
2,317,661 UART: [state] DebugLocked = No
2,319,625 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,044 UART: [kat] SHA2-256
2,493,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,294 UART: [kat] ++
2,504,797 UART: [kat] sha1
2,515,713 UART: [kat] SHA2-256
2,518,377 UART: [kat] SHA2-384
2,524,060 UART: [kat] SHA2-512-ACC
2,526,420 UART: [kat] ECC-384
4,818,934 UART: [kat] HMAC-384Kdf
4,831,452 UART: [kat] LMS
6,021,716 UART: [kat] --
6,028,147 UART: [cold-reset] ++
6,029,392 UART: [fht] Storing FHT @ 0x50003400
6,041,372 UART: [idev] ++
6,041,981 UART: [idev] CDI.KEYID = 6
6,042,901 UART: [idev] SUBJECT.KEYID = 7
6,044,122 UART: [idev] UDS.KEYID = 0
6,046,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,195,727 UART: [idev] Erasing UDS.KEYID = 0
9,374,954 UART: [idev] Using Sha1 for KeyId Algorithm
9,396,338 UART: [idev] --
9,400,529 UART: [ldev] ++
9,401,167 UART: [ldev] CDI.KEYID = 6
9,402,080 UART: [ldev] SUBJECT.KEYID = 5
9,403,358 UART: [ldev] AUTHORITY.KEYID = 7
9,404,545 UART: [ldev] FE.KEYID = 1
9,435,456 UART: [ldev] Erasing FE.KEYID = 1
12,767,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,059,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,074,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,088,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,103,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,122,975 UART: [ldev] --
15,127,917 UART: [fwproc] Waiting for Commands...
15,129,985 UART: [fwproc] Received command 0x46574c44
15,132,174 UART: [fwproc] Received Image of size 118548 bytes
19,238,095 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,313,967 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,387,169 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,716,197 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,797,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,173,945 >>> mbox cmd response: failed
17,174,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,174,963 >>> mbox cmd response: failed
17,175,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,175,536 >>> mbox cmd response: failed
Initializing fuses
2,057,184 writing to cptra_bootfsm_go
5,841,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,999,165 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,524 UART:
192,882 UART: Running Caliptra ROM ...
194,044 UART:
603,661 UART: [state] CFI Enabled
619,220 UART: [state] LifecycleState = Unprovisioned
621,122 UART: [state] DebugLocked = No
623,701 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,007 UART: [kat] SHA2-256
798,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,313 UART: [kat] ++
809,769 UART: [kat] sha1
821,874 UART: [kat] SHA2-256
824,621 UART: [kat] SHA2-384
830,977 UART: [kat] SHA2-512-ACC
833,323 UART: [kat] ECC-384
3,117,011 UART: [kat] HMAC-384Kdf
3,128,182 UART: [kat] LMS
4,318,270 UART: [kat] --
4,322,260 UART: [cold-reset] ++
4,323,396 UART: [fht] Storing FHT @ 0x50003400
4,334,885 UART: [idev] ++
4,335,497 UART: [idev] CDI.KEYID = 6
4,336,419 UART: [idev] SUBJECT.KEYID = 7
4,337,645 UART: [idev] UDS.KEYID = 0
4,340,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,512 UART: [idev] Erasing UDS.KEYID = 0
7,624,232 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,403 UART: [idev] --
7,650,058 UART: [ldev] ++
7,650,639 UART: [ldev] CDI.KEYID = 6
7,651,664 UART: [ldev] SUBJECT.KEYID = 5
7,652,828 UART: [ldev] AUTHORITY.KEYID = 7
7,654,064 UART: [ldev] FE.KEYID = 1
7,664,075 UART: [ldev] Erasing FE.KEYID = 1
10,950,861 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,854 UART: [ldev] --
13,312,291 UART: [fwproc] Waiting for Commands...
13,313,966 UART: [fwproc] Received command 0x46574c44
13,316,165 UART: [fwproc] Received Image of size 118548 bytes
17,418,900 UART: ROM Fatal Error: 0x000B002B
17,422,375 >>> mbox cmd response: failed
17,422,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,423,144 >>> mbox cmd response: failed
17,423,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,423,712 >>> mbox cmd response: failed
Initializing fuses
2,057,451 writing to cptra_bootfsm_go
2,246,742 UART:
2,247,092 UART: Running Caliptra ROM ...
2,248,239 UART:
3,034,418 UART: [state] CFI Enabled
3,052,647 UART: [state] LifecycleState = Unprovisioned
3,054,579 UART: [state] DebugLocked = No
3,057,328 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,062,345 UART: [kat] SHA2-256
3,232,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,242,653 UART: [kat] ++
3,243,147 UART: [kat] sha1
3,253,501 UART: [kat] SHA2-256
3,256,210 UART: [kat] SHA2-384
3,261,850 UART: [kat] SHA2-512-ACC
3,264,210 UART: [kat] ECC-384
5,548,012 UART: [kat] HMAC-384Kdf
5,560,630 UART: [kat] LMS
6,750,756 UART: [kat] --
6,755,246 UART: [cold-reset] ++
6,756,324 UART: [fht] Storing FHT @ 0x50003400
6,766,627 UART: [idev] ++
6,767,198 UART: [idev] CDI.KEYID = 6
6,768,169 UART: [idev] SUBJECT.KEYID = 7
6,769,388 UART: [idev] UDS.KEYID = 0
6,771,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,921,079 UART: [idev] Erasing UDS.KEYID = 0
10,053,126 UART: [idev] Using Sha1 for KeyId Algorithm
10,074,206 UART: [idev] --
10,079,344 UART: [ldev] ++
10,079,939 UART: [ldev] CDI.KEYID = 6
10,080,859 UART: [ldev] SUBJECT.KEYID = 5
10,082,144 UART: [ldev] AUTHORITY.KEYID = 7
10,083,330 UART: [ldev] FE.KEYID = 1
10,094,899 UART: [ldev] Erasing FE.KEYID = 1
13,383,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,676,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,691,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,706,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,720,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,739,124 UART: [ldev] --
15,743,155 UART: [fwproc] Waiting for Commands...
15,745,799 UART: [fwproc] Received command 0x46574c44
15,747,991 UART: [fwproc] Received Image of size 118548 bytes
19,851,874 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,927,305 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,000,505 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,328,961 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,128,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,398,474 >>> mbox cmd response: failed
17,399,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,399,574 >>> mbox cmd response: failed
17,399,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,400,150 >>> mbox cmd response: failed
Initializing fuses
2,058,599 writing to cptra_bootfsm_go
6,590,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,625,224 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,274 UART:
192,668 UART: Running Caliptra ROM ...
193,796 UART:
193,943 UART: [state] CFI Enabled
263,017 UART: [state] LifecycleState = Unprovisioned
264,954 UART: [state] DebugLocked = No
267,607 UART: [state] WD Timer not started. Device not locked for debugging
270,981 UART: [kat] SHA2-256
450,662 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,403 UART: [kat] ++
461,858 UART: [kat] sha1
471,926 UART: [kat] SHA2-256
474,618 UART: [kat] SHA2-384
479,735 UART: [kat] SHA2-512-ACC
482,076 UART: [kat] ECC-384
2,957,062 UART: [kat] HMAC-384Kdf
2,980,554 UART: [kat] LMS
3,457,048 UART: [kat] --
3,461,759 UART: [cold-reset] ++
3,462,890 UART: [fht] FHT @ 0x50003400
3,474,169 UART: [idev] ++
3,474,790 UART: [idev] CDI.KEYID = 6
3,475,675 UART: [idev] SUBJECT.KEYID = 7
3,476,944 UART: [idev] UDS.KEYID = 0
3,479,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,628,958 UART: [idev] Erasing UDS.KEYID = 0
5,998,358 UART: [idev] Sha1 KeyId Algorithm
6,023,058 UART: [idev] --
6,027,336 UART: [ldev] ++
6,027,912 UART: [ldev] CDI.KEYID = 6
6,028,798 UART: [ldev] SUBJECT.KEYID = 5
6,030,072 UART: [ldev] AUTHORITY.KEYID = 7
6,031,318 UART: [ldev] FE.KEYID = 1
6,067,850 UART: [ldev] Erasing FE.KEYID = 1
8,578,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,312,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,328,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,359,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,381,445 UART: [ldev] --
10,387,594 UART: [fwproc] Wait for Commands...
10,390,562 UART: [fwproc] Recv command 0x46574c44
10,392,555 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,284 UART: ROM Fatal Error: 0x000B002B
13,872,530 >>> mbox cmd response: failed
13,872,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,873,190 >>> mbox cmd response: failed
13,873,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,873,797 >>> mbox cmd response: failed
Initializing fuses
2,061,025 writing to cptra_bootfsm_go
2,250,325 UART:
2,250,674 UART: Running Caliptra ROM ...
2,251,724 UART:
2,251,877 UART: [state] CFI Enabled
2,313,600 UART: [state] LifecycleState = Unprovisioned
2,315,543 UART: [state] DebugLocked = No
2,317,450 UART: [state] WD Timer not started. Device not locked for debugging
2,321,361 UART: [kat] SHA2-256
2,501,030 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,511,807 UART: [kat] ++
2,512,270 UART: [kat] sha1
2,523,108 UART: [kat] SHA2-256
2,525,824 UART: [kat] SHA2-384
2,530,745 UART: [kat] SHA2-512-ACC
2,533,105 UART: [kat] ECC-384
4,996,811 UART: [kat] HMAC-384Kdf
5,019,641 UART: [kat] LMS
5,496,149 UART: [kat] --
5,501,168 UART: [cold-reset] ++
5,502,834 UART: [fht] FHT @ 0x50003400
5,514,095 UART: [idev] ++
5,514,669 UART: [idev] CDI.KEYID = 6
5,515,586 UART: [idev] SUBJECT.KEYID = 7
5,516,864 UART: [idev] UDS.KEYID = 0
5,518,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,668,168 UART: [idev] Erasing UDS.KEYID = 0
8,038,566 UART: [idev] Sha1 KeyId Algorithm
8,063,490 UART: [idev] --
8,068,050 UART: [ldev] ++
8,068,632 UART: [ldev] CDI.KEYID = 6
8,069,547 UART: [ldev] SUBJECT.KEYID = 5
8,070,768 UART: [ldev] AUTHORITY.KEYID = 7
8,072,010 UART: [ldev] FE.KEYID = 1
8,106,389 UART: [ldev] Erasing FE.KEYID = 1
10,612,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,349,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,364,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,380,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,396,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,417,761 UART: [ldev] --
12,423,452 UART: [fwproc] Wait for Commands...
12,426,274 UART: [fwproc] Recv command 0x46574c44
12,428,270 UART: [fwproc] Recv'd Img size: 118548 bytes
15,911,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,991,657 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,064,690 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,393,065 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,464,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,748,869 >>> mbox cmd response: failed
13,749,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,749,812 >>> mbox cmd response: failed
13,750,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,750,384 >>> mbox cmd response: failed
Initializing fuses
2,069,687 writing to cptra_bootfsm_go
5,505,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,262,027 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,610 UART:
192,988 UART: Running Caliptra ROM ...
194,215 UART:
603,662 UART: [state] CFI Enabled
621,057 UART: [state] LifecycleState = Unprovisioned
622,954 UART: [state] DebugLocked = No
625,360 UART: [state] WD Timer not started. Device not locked for debugging
629,653 UART: [kat] SHA2-256
809,287 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,061 UART: [kat] ++
820,548 UART: [kat] sha1
832,286 UART: [kat] SHA2-256
835,015 UART: [kat] SHA2-384
840,254 UART: [kat] SHA2-512-ACC
842,651 UART: [kat] ECC-384
3,285,908 UART: [kat] HMAC-384Kdf
3,299,610 UART: [kat] LMS
3,776,091 UART: [kat] --
3,781,017 UART: [cold-reset] ++
3,783,303 UART: [fht] FHT @ 0x50003400
3,794,314 UART: [idev] ++
3,794,898 UART: [idev] CDI.KEYID = 6
3,795,810 UART: [idev] SUBJECT.KEYID = 7
3,797,082 UART: [idev] UDS.KEYID = 0
3,799,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,948,690 UART: [idev] Erasing UDS.KEYID = 0
6,274,724 UART: [idev] Sha1 KeyId Algorithm
6,297,526 UART: [idev] --
6,302,978 UART: [ldev] ++
6,303,551 UART: [ldev] CDI.KEYID = 6
6,304,439 UART: [ldev] SUBJECT.KEYID = 5
6,305,653 UART: [ldev] AUTHORITY.KEYID = 7
6,306,946 UART: [ldev] FE.KEYID = 1
6,317,951 UART: [ldev] Erasing FE.KEYID = 1
8,796,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,773 UART: [ldev] --
10,591,430 UART: [fwproc] Wait for Commands...
10,594,624 UART: [fwproc] Recv command 0x46574c44
10,596,618 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,793 UART: ROM Fatal Error: 0x000B002B
14,080,043 >>> mbox cmd response: failed
14,080,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,080,826 >>> mbox cmd response: failed
14,081,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,081,437 >>> mbox cmd response: failed
Initializing fuses
2,060,179 writing to cptra_bootfsm_go
2,249,495 UART:
2,249,854 UART: Running Caliptra ROM ...
2,250,992 UART:
6,369,117 UART: [state] CFI Enabled
6,385,232 UART: [state] LifecycleState = Unprovisioned
6,387,148 UART: [state] DebugLocked = No
6,389,728 UART: [state] WD Timer not started. Device not locked for debugging
6,393,364 UART: [kat] SHA2-256
6,573,043 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,583,813 UART: [kat] ++
6,584,328 UART: [kat] sha1
6,595,922 UART: [kat] SHA2-256
6,598,624 UART: [kat] SHA2-384
6,604,890 UART: [kat] SHA2-512-ACC
6,607,244 UART: [kat] ECC-384
9,048,268 UART: [kat] HMAC-384Kdf
9,059,529 UART: [kat] LMS
9,536,007 UART: [kat] --
9,540,552 UART: [cold-reset] ++
9,542,898 UART: [fht] FHT @ 0x50003400
9,555,345 UART: [idev] ++
9,555,920 UART: [idev] CDI.KEYID = 6
9,556,943 UART: [idev] SUBJECT.KEYID = 7
9,558,113 UART: [idev] UDS.KEYID = 0
9,560,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,709,788 UART: [idev] Erasing UDS.KEYID = 0
12,034,066 UART: [idev] Sha1 KeyId Algorithm
12,058,761 UART: [idev] --
12,063,244 UART: [ldev] ++
12,063,817 UART: [ldev] CDI.KEYID = 6
12,064,842 UART: [ldev] SUBJECT.KEYID = 5
12,065,951 UART: [ldev] AUTHORITY.KEYID = 7
12,067,188 UART: [ldev] FE.KEYID = 1
12,079,403 UART: [ldev] Erasing FE.KEYID = 1
14,556,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,277,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,293,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,308,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,324,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,347,227 UART: [ldev] --
16,353,292 UART: [fwproc] Wait for Commands...
16,356,325 UART: [fwproc] Recv command 0x46574c44
16,358,374 UART: [fwproc] Recv'd Img size: 118548 bytes
19,855,848 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,935,068 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,008,084 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,335,787 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,780,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,986,522 >>> mbox cmd response: failed
13,987,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,987,487 >>> mbox cmd response: failed
13,987,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,988,049 >>> mbox cmd response: failed
Initializing fuses
2,061,402 writing to cptra_bootfsm_go
9,656,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,323,332 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,131 UART:
192,515 UART: Running Caliptra ROM ...
193,622 UART:
193,769 UART: [state] CFI Enabled
261,169 UART: [state] LifecycleState = Unprovisioned
263,546 UART: [state] DebugLocked = No
265,282 UART: [state] WD Timer not started. Device not locked for debugging
269,292 UART: [kat] SHA2-256
459,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,980 UART: [kat] ++
470,433 UART: [kat] sha1
481,283 UART: [kat] SHA2-256
484,301 UART: [kat] SHA2-384
490,042 UART: [kat] SHA2-512-ACC
492,615 UART: [kat] ECC-384
2,945,703 UART: [kat] HMAC-384Kdf
2,970,753 UART: [kat] LMS
3,502,528 UART: [kat] --
3,506,602 UART: [cold-reset] ++
3,508,168 UART: [fht] FHT @ 0x50003400
3,518,402 UART: [idev] ++
3,519,135 UART: [idev] CDI.KEYID = 6
3,520,062 UART: [idev] SUBJECT.KEYID = 7
3,521,237 UART: [idev] UDS.KEYID = 0
3,523,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,105 UART: [idev] Erasing UDS.KEYID = 0
6,028,227 UART: [idev] Sha1 KeyId Algorithm
6,050,001 UART: [idev] --
6,054,667 UART: [ldev] ++
6,055,360 UART: [ldev] CDI.KEYID = 6
6,056,279 UART: [ldev] SUBJECT.KEYID = 5
6,057,449 UART: [ldev] AUTHORITY.KEYID = 7
6,058,694 UART: [ldev] FE.KEYID = 1
6,099,465 UART: [ldev] Erasing FE.KEYID = 1
8,608,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,682 UART: [ldev] --
10,414,400 UART: [fwproc] Wait for Commands...
10,416,182 UART: [fwproc] Recv command 0x46574c44
10,418,455 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,214 UART: ROM Fatal Error: 0x000B002B
13,910,893 >>> mbox cmd response: failed
13,911,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,911,665 >>> mbox cmd response: failed
13,911,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,912,234 >>> mbox cmd response: failed
Initializing fuses
2,062,290 writing to cptra_bootfsm_go
2,251,626 UART:
2,251,976 UART: Running Caliptra ROM ...
2,253,080 UART:
2,253,245 UART: [state] CFI Enabled
2,325,479 UART: [state] LifecycleState = Unprovisioned
2,327,919 UART: [state] DebugLocked = No
2,329,318 UART: [state] WD Timer not started. Device not locked for debugging
2,333,895 UART: [kat] SHA2-256
2,523,761 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,534,560 UART: [kat] ++
2,535,053 UART: [kat] sha1
2,546,436 UART: [kat] SHA2-256
2,549,433 UART: [kat] SHA2-384
2,554,572 UART: [kat] SHA2-512-ACC
2,557,150 UART: [kat] ECC-384
5,005,711 UART: [kat] HMAC-384Kdf
5,031,292 UART: [kat] LMS
5,563,042 UART: [kat] --
5,568,823 UART: [cold-reset] ++
5,570,815 UART: [fht] FHT @ 0x50003400
5,581,213 UART: [idev] ++
5,581,896 UART: [idev] CDI.KEYID = 6
5,582,921 UART: [idev] SUBJECT.KEYID = 7
5,584,030 UART: [idev] UDS.KEYID = 0
5,586,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,735,606 UART: [idev] Erasing UDS.KEYID = 0
8,088,706 UART: [idev] Sha1 KeyId Algorithm
8,112,211 UART: [idev] --
8,116,681 UART: [ldev] ++
8,117,372 UART: [ldev] CDI.KEYID = 6
8,118,288 UART: [ldev] SUBJECT.KEYID = 5
8,119,457 UART: [ldev] AUTHORITY.KEYID = 7
8,120,700 UART: [ldev] FE.KEYID = 1
8,160,855 UART: [ldev] Erasing FE.KEYID = 1
10,668,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,404,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,419,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,434,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,449,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,471,563 UART: [ldev] --
12,476,401 UART: [fwproc] Wait for Commands...
12,479,315 UART: [fwproc] Recv command 0x46574c44
12,481,725 UART: [fwproc] Recv'd Img size: 118548 bytes
15,979,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,055,991 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,179,554 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,739,642 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,434,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,340,620 >>> mbox cmd response: failed
14,341,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,341,623 >>> mbox cmd response: failed
14,341,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,342,223 >>> mbox cmd response: failed
Initializing fuses
2,063,302 writing to cptra_bootfsm_go
5,468,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,843,330 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,519 UART:
192,874 UART: Running Caliptra ROM ...
194,082 UART:
603,826 UART: [state] CFI Enabled
613,256 UART: [state] LifecycleState = Unprovisioned
615,677 UART: [state] DebugLocked = No
618,412 UART: [state] WD Timer not started. Device not locked for debugging
622,592 UART: [kat] SHA2-256
812,487 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,286 UART: [kat] ++
823,878 UART: [kat] sha1
834,875 UART: [kat] SHA2-256
837,884 UART: [kat] SHA2-384
844,733 UART: [kat] SHA2-512-ACC
847,361 UART: [kat] ECC-384
3,290,068 UART: [kat] HMAC-384Kdf
3,303,471 UART: [kat] LMS
3,835,296 UART: [kat] --
3,838,194 UART: [cold-reset] ++
3,839,982 UART: [fht] FHT @ 0x50003400
3,851,323 UART: [idev] ++
3,852,015 UART: [idev] CDI.KEYID = 6
3,852,995 UART: [idev] SUBJECT.KEYID = 7
3,854,215 UART: [idev] UDS.KEYID = 0
3,857,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,234 UART: [idev] Erasing UDS.KEYID = 0
6,332,832 UART: [idev] Sha1 KeyId Algorithm
6,355,926 UART: [idev] --
6,360,900 UART: [ldev] ++
6,361,596 UART: [ldev] CDI.KEYID = 6
6,362,490 UART: [ldev] SUBJECT.KEYID = 5
6,363,596 UART: [ldev] AUTHORITY.KEYID = 7
6,364,888 UART: [ldev] FE.KEYID = 1
6,376,167 UART: [ldev] Erasing FE.KEYID = 1
8,850,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,883 UART: [ldev] --
10,639,581 UART: [fwproc] Wait for Commands...
10,642,099 UART: [fwproc] Recv command 0x46574c44
10,644,377 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,696 UART: ROM Fatal Error: 0x000B002B
14,150,389 >>> mbox cmd response: failed
14,150,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,151,307 >>> mbox cmd response: failed
14,151,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,151,997 >>> mbox cmd response: failed
Initializing fuses
2,060,903 writing to cptra_bootfsm_go
2,250,215 UART:
2,250,555 UART: Running Caliptra ROM ...
2,251,652 UART:
6,299,888 UART: [state] CFI Enabled
6,313,039 UART: [state] LifecycleState = Unprovisioned
6,315,452 UART: [state] DebugLocked = No
6,317,659 UART: [state] WD Timer not started. Device not locked for debugging
6,322,075 UART: [kat] SHA2-256
6,511,981 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,522,734 UART: [kat] ++
6,523,344 UART: [kat] sha1
6,535,222 UART: [kat] SHA2-256
6,538,202 UART: [kat] SHA2-384
6,545,064 UART: [kat] SHA2-512-ACC
6,547,644 UART: [kat] ECC-384
8,989,974 UART: [kat] HMAC-384Kdf
9,002,629 UART: [kat] LMS
9,534,451 UART: [kat] --
9,538,093 UART: [cold-reset] ++
9,539,115 UART: [fht] FHT @ 0x50003400
9,550,860 UART: [idev] ++
9,551,547 UART: [idev] CDI.KEYID = 6
9,552,476 UART: [idev] SUBJECT.KEYID = 7
9,553,700 UART: [idev] UDS.KEYID = 0
9,556,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,705,416 UART: [idev] Erasing UDS.KEYID = 0
12,031,934 UART: [idev] Sha1 KeyId Algorithm
12,053,198 UART: [idev] --
12,059,415 UART: [ldev] ++
12,060,097 UART: [ldev] CDI.KEYID = 6
12,061,023 UART: [ldev] SUBJECT.KEYID = 5
12,062,209 UART: [ldev] AUTHORITY.KEYID = 7
12,063,390 UART: [ldev] FE.KEYID = 1
12,075,230 UART: [ldev] Erasing FE.KEYID = 1
14,554,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,272,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,288,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,303,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,318,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,340,215 UART: [ldev] --
16,346,363 UART: [fwproc] Wait for Commands...
16,348,961 UART: [fwproc] Recv command 0x46574c44
16,351,234 UART: [fwproc] Recv'd Img size: 118548 bytes
19,850,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,928,508 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,052,090 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,612,108 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
3,756,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,563,810 >>> mbox cmd response: failed
14,564,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,564,862 >>> mbox cmd response: failed
14,565,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,565,433 >>> mbox cmd response: failed
Initializing fuses
2,061,529 writing to cptra_bootfsm_go
9,055,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,338,077 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,780 UART: [state] LifecycleState = Unprovisioned
85,435 UART: [state] DebugLocked = No
86,087 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,775 UART: [kat] SHA2-256
881,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,821 UART: [kat] ++
885,973 UART: [kat] sha1
890,207 UART: [kat] SHA2-256
892,145 UART: [kat] SHA2-384
894,746 UART: [kat] SHA2-512-ACC
896,647 UART: [kat] ECC-384
901,960 UART: [kat] HMAC-384Kdf
906,380 UART: [kat] LMS
1,474,576 UART: [kat] --
1,475,667 UART: [cold-reset] ++
1,476,191 UART: [fht] Storing FHT @ 0x50003400
1,479,054 UART: [idev] ++
1,479,222 UART: [idev] CDI.KEYID = 6
1,479,582 UART: [idev] SUBJECT.KEYID = 7
1,480,006 UART: [idev] UDS.KEYID = 0
1,480,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,118 UART: [idev] Erasing UDS.KEYID = 0
1,504,968 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,458 UART: [idev] --
1,514,527 UART: [ldev] ++
1,514,695 UART: [ldev] CDI.KEYID = 6
1,515,058 UART: [ldev] SUBJECT.KEYID = 5
1,515,484 UART: [ldev] AUTHORITY.KEYID = 7
1,515,947 UART: [ldev] FE.KEYID = 1
1,520,943 UART: [ldev] Erasing FE.KEYID = 1
1,546,856 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,080 UART: [ldev] --
1,586,555 UART: [fwproc] Waiting for Commands...
1,587,330 UART: [fwproc] Received command 0x46574c44
1,588,121 UART: [fwproc] Received Image of size 118548 bytes
2,932,290 UART: ROM Fatal Error: 0x000B002B
2,933,449 >>> mbox cmd response: failed
2,933,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,455 >>> mbox cmd response: failed
2,933,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,431 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,039 UART: [kat] SHA2-256
881,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,085 UART: [kat] ++
886,237 UART: [kat] sha1
890,451 UART: [kat] SHA2-256
892,389 UART: [kat] SHA2-384
895,122 UART: [kat] SHA2-512-ACC
897,023 UART: [kat] ECC-384
902,466 UART: [kat] HMAC-384Kdf
907,062 UART: [kat] LMS
1,475,258 UART: [kat] --
1,476,345 UART: [cold-reset] ++
1,476,857 UART: [fht] Storing FHT @ 0x50003400
1,479,746 UART: [idev] ++
1,479,914 UART: [idev] CDI.KEYID = 6
1,480,274 UART: [idev] SUBJECT.KEYID = 7
1,480,698 UART: [idev] UDS.KEYID = 0
1,481,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,740 UART: [idev] Erasing UDS.KEYID = 0
1,505,304 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,916 UART: [idev] --
1,515,073 UART: [ldev] ++
1,515,241 UART: [ldev] CDI.KEYID = 6
1,515,604 UART: [ldev] SUBJECT.KEYID = 5
1,516,030 UART: [ldev] AUTHORITY.KEYID = 7
1,516,493 UART: [ldev] FE.KEYID = 1
1,521,735 UART: [ldev] Erasing FE.KEYID = 1
1,546,874 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,522 UART: [ldev] --
1,585,913 UART: [fwproc] Waiting for Commands...
1,586,650 UART: [fwproc] Received command 0x46574c44
1,587,441 UART: [fwproc] Received Image of size 118548 bytes
2,932,562 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,382 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,600 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,921 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,784,138 >>> mbox cmd response: failed
2,784,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,144 >>> mbox cmd response: failed
2,784,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,150 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,193 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,228 UART: [kat] SHA2-256
882,159 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,274 UART: [kat] ++
886,426 UART: [kat] sha1
890,490 UART: [kat] SHA2-256
892,428 UART: [kat] SHA2-384
894,955 UART: [kat] SHA2-512-ACC
896,856 UART: [kat] ECC-384
902,339 UART: [kat] HMAC-384Kdf
906,991 UART: [kat] LMS
1,475,187 UART: [kat] --
1,475,926 UART: [cold-reset] ++
1,476,368 UART: [fht] Storing FHT @ 0x50003400
1,479,171 UART: [idev] ++
1,479,339 UART: [idev] CDI.KEYID = 6
1,479,699 UART: [idev] SUBJECT.KEYID = 7
1,480,123 UART: [idev] UDS.KEYID = 0
1,480,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,015 UART: [idev] Erasing UDS.KEYID = 0
1,504,401 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,839 UART: [idev] --
1,513,880 UART: [ldev] ++
1,514,048 UART: [ldev] CDI.KEYID = 6
1,514,411 UART: [ldev] SUBJECT.KEYID = 5
1,514,837 UART: [ldev] AUTHORITY.KEYID = 7
1,515,300 UART: [ldev] FE.KEYID = 1
1,520,506 UART: [ldev] Erasing FE.KEYID = 1
1,545,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,309 UART: [ldev] --
1,584,634 UART: [fwproc] Waiting for Commands...
1,585,373 UART: [fwproc] Received command 0x46574c44
1,586,164 UART: [fwproc] Received Image of size 118548 bytes
2,929,749 UART: ROM Fatal Error: 0x000B002B
2,930,908 >>> mbox cmd response: failed
2,930,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,930,914 >>> mbox cmd response: failed
2,930,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,930,920 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,072 UART: [kat] SHA2-256
882,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,118 UART: [kat] ++
886,270 UART: [kat] sha1
890,430 UART: [kat] SHA2-256
892,368 UART: [kat] SHA2-384
895,067 UART: [kat] SHA2-512-ACC
896,968 UART: [kat] ECC-384
902,473 UART: [kat] HMAC-384Kdf
907,087 UART: [kat] LMS
1,475,283 UART: [kat] --
1,476,372 UART: [cold-reset] ++
1,476,830 UART: [fht] Storing FHT @ 0x50003400
1,479,571 UART: [idev] ++
1,479,739 UART: [idev] CDI.KEYID = 6
1,480,099 UART: [idev] SUBJECT.KEYID = 7
1,480,523 UART: [idev] UDS.KEYID = 0
1,480,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,353 UART: [idev] Erasing UDS.KEYID = 0
1,504,535 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,333 UART: [idev] --
1,514,266 UART: [ldev] ++
1,514,434 UART: [ldev] CDI.KEYID = 6
1,514,797 UART: [ldev] SUBJECT.KEYID = 5
1,515,223 UART: [ldev] AUTHORITY.KEYID = 7
1,515,686 UART: [ldev] FE.KEYID = 1
1,521,224 UART: [ldev] Erasing FE.KEYID = 1
1,546,523 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,353 UART: [ldev] --
1,585,766 UART: [fwproc] Waiting for Commands...
1,586,561 UART: [fwproc] Received command 0x46574c44
1,587,352 UART: [fwproc] Received Image of size 118548 bytes
2,931,741 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,025 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,243 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,676 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,785,175 >>> mbox cmd response: failed
2,785,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,181 >>> mbox cmd response: failed
2,785,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,650 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,320 UART: [kat] ++
895,472 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,491 UART: [kat] SHA2-512-ACC
906,392 UART: [kat] ECC-384
916,099 UART: [kat] HMAC-384Kdf
920,653 UART: [kat] LMS
1,168,965 UART: [kat] --
1,169,752 UART: [cold-reset] ++
1,170,322 UART: [fht] FHT @ 0x50003400
1,172,982 UART: [idev] ++
1,173,150 UART: [idev] CDI.KEYID = 6
1,173,511 UART: [idev] SUBJECT.KEYID = 7
1,173,936 UART: [idev] UDS.KEYID = 0
1,174,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,981 UART: [idev] Erasing UDS.KEYID = 0
1,199,139 UART: [idev] Sha1 KeyId Algorithm
1,208,021 UART: [idev] --
1,208,914 UART: [ldev] ++
1,209,082 UART: [ldev] CDI.KEYID = 6
1,209,446 UART: [ldev] SUBJECT.KEYID = 5
1,209,873 UART: [ldev] AUTHORITY.KEYID = 7
1,210,336 UART: [ldev] FE.KEYID = 1
1,215,408 UART: [ldev] Erasing FE.KEYID = 1
1,242,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,078 UART: [ldev] --
1,281,379 UART: [fwproc] Wait for Commands...
1,281,990 UART: [fwproc] Recv command 0x46574c44
1,282,723 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,797 UART: ROM Fatal Error: 0x000B002B
2,626,956 >>> mbox cmd response: failed
2,626,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,962 >>> mbox cmd response: failed
2,626,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,568 UART: [state] LifecycleState = Unprovisioned
86,223 UART: [state] DebugLocked = No
86,835 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [kat] SHA2-256
891,554 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,170,008 UART: [cold-reset] ++
1,170,512 UART: [fht] FHT @ 0x50003400
1,173,044 UART: [idev] ++
1,173,212 UART: [idev] CDI.KEYID = 6
1,173,573 UART: [idev] SUBJECT.KEYID = 7
1,173,998 UART: [idev] UDS.KEYID = 0
1,174,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,015 UART: [idev] Erasing UDS.KEYID = 0
1,199,149 UART: [idev] Sha1 KeyId Algorithm
1,207,873 UART: [idev] --
1,208,792 UART: [ldev] ++
1,208,960 UART: [ldev] CDI.KEYID = 6
1,209,324 UART: [ldev] SUBJECT.KEYID = 5
1,209,751 UART: [ldev] AUTHORITY.KEYID = 7
1,210,214 UART: [ldev] FE.KEYID = 1
1,215,388 UART: [ldev] Erasing FE.KEYID = 1
1,241,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,242 UART: [ldev] --
1,280,535 UART: [fwproc] Wait for Commands...
1,281,180 UART: [fwproc] Recv command 0x46574c44
1,281,913 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,034 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,209 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,538 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,193 >>> mbox cmd response: failed
2,481,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,199 >>> mbox cmd response: failed
2,481,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,205 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,491 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,561 UART: [kat] SHA2-256
901,501 UART: [kat] SHA2-384
904,212 UART: [kat] SHA2-512-ACC
906,113 UART: [kat] ECC-384
915,770 UART: [kat] HMAC-384Kdf
920,502 UART: [kat] LMS
1,168,814 UART: [kat] --
1,169,705 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,677 UART: [idev] ++
1,172,845 UART: [idev] CDI.KEYID = 6
1,173,206 UART: [idev] SUBJECT.KEYID = 7
1,173,631 UART: [idev] UDS.KEYID = 0
1,173,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,204 UART: [idev] Erasing UDS.KEYID = 0
1,199,656 UART: [idev] Sha1 KeyId Algorithm
1,208,470 UART: [idev] --
1,209,359 UART: [ldev] ++
1,209,527 UART: [ldev] CDI.KEYID = 6
1,209,891 UART: [ldev] SUBJECT.KEYID = 5
1,210,318 UART: [ldev] AUTHORITY.KEYID = 7
1,210,781 UART: [ldev] FE.KEYID = 1
1,215,853 UART: [ldev] Erasing FE.KEYID = 1
1,241,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,667 UART: [ldev] --
1,281,018 UART: [fwproc] Wait for Commands...
1,281,751 UART: [fwproc] Recv command 0x46574c44
1,282,484 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,554 UART: ROM Fatal Error: 0x000B002B
2,627,713 >>> mbox cmd response: failed
2,627,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,719 >>> mbox cmd response: failed
2,627,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,606 UART: [kat] SHA2-512-ACC
906,507 UART: [kat] ECC-384
916,666 UART: [kat] HMAC-384Kdf
921,294 UART: [kat] LMS
1,169,606 UART: [kat] --
1,170,525 UART: [cold-reset] ++
1,171,025 UART: [fht] FHT @ 0x50003400
1,173,853 UART: [idev] ++
1,174,021 UART: [idev] CDI.KEYID = 6
1,174,382 UART: [idev] SUBJECT.KEYID = 7
1,174,807 UART: [idev] UDS.KEYID = 0
1,175,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,742 UART: [idev] Erasing UDS.KEYID = 0
1,199,468 UART: [idev] Sha1 KeyId Algorithm
1,208,416 UART: [idev] --
1,209,313 UART: [ldev] ++
1,209,481 UART: [ldev] CDI.KEYID = 6
1,209,845 UART: [ldev] SUBJECT.KEYID = 5
1,210,272 UART: [ldev] AUTHORITY.KEYID = 7
1,210,735 UART: [ldev] FE.KEYID = 1
1,216,063 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,647 UART: [ldev] --
1,281,914 UART: [fwproc] Wait for Commands...
1,282,691 UART: [fwproc] Recv command 0x46574c44
1,283,424 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,179 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,354 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,577 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,338 >>> mbox cmd response: failed
2,483,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,344 >>> mbox cmd response: failed
2,483,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,350 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,080 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,386 UART: [kat] SHA2-256
893,036 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,161 UART: [kat] ++
897,313 UART: [kat] sha1
901,665 UART: [kat] SHA2-256
903,605 UART: [kat] SHA2-384
906,350 UART: [kat] SHA2-512-ACC
908,251 UART: [kat] ECC-384
918,044 UART: [kat] HMAC-384Kdf
922,678 UART: [kat] LMS
1,171,006 UART: [kat] --
1,172,021 UART: [cold-reset] ++
1,172,533 UART: [fht] FHT @ 0x50003400
1,175,402 UART: [idev] ++
1,175,570 UART: [idev] CDI.KEYID = 6
1,175,930 UART: [idev] SUBJECT.KEYID = 7
1,176,354 UART: [idev] UDS.KEYID = 0
1,176,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,570 UART: [idev] Erasing UDS.KEYID = 0
1,201,599 UART: [idev] Sha1 KeyId Algorithm
1,210,061 UART: [idev] --
1,211,097 UART: [ldev] ++
1,211,265 UART: [ldev] CDI.KEYID = 6
1,211,628 UART: [ldev] SUBJECT.KEYID = 5
1,212,054 UART: [ldev] AUTHORITY.KEYID = 7
1,212,517 UART: [ldev] FE.KEYID = 1
1,217,475 UART: [ldev] Erasing FE.KEYID = 1
1,243,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,841 UART: [ldev] --
1,283,110 UART: [fwproc] Wait for Commands...
1,283,776 UART: [fwproc] Recv command 0x46574c44
1,284,504 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,841 UART: ROM Fatal Error: 0x000B002B
2,629,000 >>> mbox cmd response: failed
2,629,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,006 >>> mbox cmd response: failed
2,629,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,012 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,005 UART: [state] WD Timer not started. Device not locked for debugging
87,352 UART: [kat] SHA2-256
893,002 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,127 UART: [kat] ++
897,279 UART: [kat] sha1
901,483 UART: [kat] SHA2-256
903,423 UART: [kat] SHA2-384
906,146 UART: [kat] SHA2-512-ACC
908,047 UART: [kat] ECC-384
917,930 UART: [kat] HMAC-384Kdf
922,546 UART: [kat] LMS
1,170,874 UART: [kat] --
1,171,829 UART: [cold-reset] ++
1,172,249 UART: [fht] FHT @ 0x50003400
1,174,710 UART: [idev] ++
1,174,878 UART: [idev] CDI.KEYID = 6
1,175,238 UART: [idev] SUBJECT.KEYID = 7
1,175,662 UART: [idev] UDS.KEYID = 0
1,176,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,998 UART: [idev] Erasing UDS.KEYID = 0
1,201,395 UART: [idev] Sha1 KeyId Algorithm
1,209,765 UART: [idev] --
1,210,825 UART: [ldev] ++
1,210,993 UART: [ldev] CDI.KEYID = 6
1,211,356 UART: [ldev] SUBJECT.KEYID = 5
1,211,782 UART: [ldev] AUTHORITY.KEYID = 7
1,212,245 UART: [ldev] FE.KEYID = 1
1,217,399 UART: [ldev] Erasing FE.KEYID = 1
1,243,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,513 UART: [ldev] --
1,283,026 UART: [fwproc] Wait for Commands...
1,283,796 UART: [fwproc] Recv command 0x46574c44
1,284,524 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,257 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,427 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,738 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,474 >>> mbox cmd response: failed
2,484,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,480 >>> mbox cmd response: failed
2,484,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,486 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,683 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,458 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
893,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,454 UART: [kat] ++
897,606 UART: [kat] sha1
901,960 UART: [kat] SHA2-256
903,900 UART: [kat] SHA2-384
906,787 UART: [kat] SHA2-512-ACC
908,688 UART: [kat] ECC-384
918,287 UART: [kat] HMAC-384Kdf
922,939 UART: [kat] LMS
1,171,267 UART: [kat] --
1,172,476 UART: [cold-reset] ++
1,172,810 UART: [fht] FHT @ 0x50003400
1,175,419 UART: [idev] ++
1,175,587 UART: [idev] CDI.KEYID = 6
1,175,947 UART: [idev] SUBJECT.KEYID = 7
1,176,371 UART: [idev] UDS.KEYID = 0
1,176,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,103 UART: [idev] Erasing UDS.KEYID = 0
1,201,564 UART: [idev] Sha1 KeyId Algorithm
1,209,906 UART: [idev] --
1,210,996 UART: [ldev] ++
1,211,164 UART: [ldev] CDI.KEYID = 6
1,211,527 UART: [ldev] SUBJECT.KEYID = 5
1,211,953 UART: [ldev] AUTHORITY.KEYID = 7
1,212,416 UART: [ldev] FE.KEYID = 1
1,217,758 UART: [ldev] Erasing FE.KEYID = 1
1,244,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,614 UART: [ldev] --
1,283,999 UART: [fwproc] Wait for Commands...
1,284,691 UART: [fwproc] Recv command 0x46574c44
1,285,419 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,174 UART: ROM Fatal Error: 0x000B002B
2,630,333 >>> mbox cmd response: failed
2,630,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,339 >>> mbox cmd response: failed
2,630,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,345 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
893,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,456 UART: [kat] ++
897,608 UART: [kat] sha1
901,696 UART: [kat] SHA2-256
903,636 UART: [kat] SHA2-384
906,329 UART: [kat] SHA2-512-ACC
908,230 UART: [kat] ECC-384
918,181 UART: [kat] HMAC-384Kdf
922,741 UART: [kat] LMS
1,171,069 UART: [kat] --
1,171,606 UART: [cold-reset] ++
1,172,108 UART: [fht] FHT @ 0x50003400
1,174,887 UART: [idev] ++
1,175,055 UART: [idev] CDI.KEYID = 6
1,175,415 UART: [idev] SUBJECT.KEYID = 7
1,175,839 UART: [idev] UDS.KEYID = 0
1,176,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,859 UART: [idev] Erasing UDS.KEYID = 0
1,200,464 UART: [idev] Sha1 KeyId Algorithm
1,209,044 UART: [idev] --
1,210,048 UART: [ldev] ++
1,210,216 UART: [ldev] CDI.KEYID = 6
1,210,579 UART: [ldev] SUBJECT.KEYID = 5
1,211,005 UART: [ldev] AUTHORITY.KEYID = 7
1,211,468 UART: [ldev] FE.KEYID = 1
1,216,774 UART: [ldev] Erasing FE.KEYID = 1
1,243,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,580 UART: [ldev] --
1,283,069 UART: [fwproc] Wait for Commands...
1,283,845 UART: [fwproc] Recv command 0x46574c44
1,284,573 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,532 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,702 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,889 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,485,678 >>> mbox cmd response: failed
2,485,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,485,684 >>> mbox cmd response: failed
2,485,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,485,690 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,044 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,171 UART:
192,562 UART: Running Caliptra ROM ...
193,760 UART:
193,917 UART: [state] CFI Enabled
264,776 UART: [state] LifecycleState = Unprovisioned
266,694 UART: [state] DebugLocked = No
268,800 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,363 UART: [kat] SHA2-256
443,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,568 UART: [kat] ++
454,050 UART: [kat] sha1
465,471 UART: [kat] SHA2-256
468,165 UART: [kat] SHA2-384
473,768 UART: [kat] SHA2-512-ACC
476,111 UART: [kat] ECC-384
2,766,779 UART: [kat] HMAC-384Kdf
2,779,474 UART: [kat] LMS
3,969,769 UART: [kat] --
3,975,122 UART: [cold-reset] ++
3,976,251 UART: [fht] Storing FHT @ 0x50003400
3,987,952 UART: [idev] ++
3,988,580 UART: [idev] CDI.KEYID = 6
3,989,508 UART: [idev] SUBJECT.KEYID = 7
3,990,732 UART: [idev] UDS.KEYID = 0
3,993,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,977 UART: [idev] Erasing UDS.KEYID = 0
7,326,297 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,235 UART: [idev] --
7,351,047 UART: [ldev] ++
7,351,622 UART: [ldev] CDI.KEYID = 6
7,352,642 UART: [ldev] SUBJECT.KEYID = 5
7,353,801 UART: [ldev] AUTHORITY.KEYID = 7
7,355,039 UART: [ldev] FE.KEYID = 1
7,401,740 UART: [ldev] Erasing FE.KEYID = 1
10,736,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,364 UART: [ldev] --
13,114,468 UART: [fwproc] Waiting for Commands...
13,117,111 UART: [fwproc] Received command 0x46574c44
13,119,353 UART: [fwproc] Received Image of size 118548 bytes
17,223,482 UART: ROM Fatal Error: 0x000B0028
17,226,956 >>> mbox cmd response: failed
17,227,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,227,761 >>> mbox cmd response: failed
17,228,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,228,336 >>> mbox cmd response: failed
Initializing fuses
2,064,243 writing to cptra_bootfsm_go
2,253,580 UART:
2,253,952 UART: Running Caliptra ROM ...
2,255,090 UART:
2,255,263 UART: [state] CFI Enabled
2,314,721 UART: [state] LifecycleState = Unprovisioned
2,316,692 UART: [state] DebugLocked = No
2,318,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,276 UART: [kat] SHA2-256
2,492,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,434 UART: [kat] ++
2,503,895 UART: [kat] sha1
2,515,431 UART: [kat] SHA2-256
2,518,122 UART: [kat] SHA2-384
2,523,248 UART: [kat] SHA2-512-ACC
2,525,612 UART: [kat] ECC-384
4,820,442 UART: [kat] HMAC-384Kdf
4,853,220 UART: [kat] LMS
6,043,507 UART: [kat] --
6,048,112 UART: [cold-reset] ++
6,049,899 UART: [fht] Storing FHT @ 0x50003400
6,060,794 UART: [idev] ++
6,061,364 UART: [idev] CDI.KEYID = 6
6,062,280 UART: [idev] SUBJECT.KEYID = 7
6,063,556 UART: [idev] UDS.KEYID = 0
6,065,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,215,128 UART: [idev] Erasing UDS.KEYID = 0
9,397,946 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,733 UART: [idev] --
9,423,321 UART: [ldev] ++
9,423,889 UART: [ldev] CDI.KEYID = 6
9,424,856 UART: [ldev] SUBJECT.KEYID = 5
9,426,126 UART: [ldev] AUTHORITY.KEYID = 7
9,427,366 UART: [ldev] FE.KEYID = 1
9,476,014 UART: [ldev] Erasing FE.KEYID = 1
12,806,840 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,099,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,114,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,129,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,143,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,163,335 UART: [ldev] --
15,168,382 UART: [fwproc] Waiting for Commands...
15,170,651 UART: [fwproc] Received command 0x46574c44
15,172,840 UART: [fwproc] Received Image of size 118548 bytes
19,281,851 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,354,400 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,427,588 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,755,962 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,784,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,159,077 >>> mbox cmd response: failed
17,159,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,160,128 >>> mbox cmd response: failed
17,160,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,160,690 >>> mbox cmd response: failed
Initializing fuses
2,056,950 writing to cptra_bootfsm_go
5,862,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,040,899 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
192,649 UART:
193,026 UART: Running Caliptra ROM ...
194,168 UART:
603,689 UART: [state] CFI Enabled
616,820 UART: [state] LifecycleState = Unprovisioned
618,740 UART: [state] DebugLocked = No
620,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,327 UART: [kat] SHA2-256
795,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,576 UART: [kat] ++
806,115 UART: [kat] sha1
817,105 UART: [kat] SHA2-256
819,789 UART: [kat] SHA2-384
825,790 UART: [kat] SHA2-512-ACC
828,141 UART: [kat] ECC-384
3,112,315 UART: [kat] HMAC-384Kdf
3,124,562 UART: [kat] LMS
4,314,660 UART: [kat] --
4,318,199 UART: [cold-reset] ++
4,319,658 UART: [fht] Storing FHT @ 0x50003400
4,330,933 UART: [idev] ++
4,331,512 UART: [idev] CDI.KEYID = 6
4,332,433 UART: [idev] SUBJECT.KEYID = 7
4,333,709 UART: [idev] UDS.KEYID = 0
4,336,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,012 UART: [idev] Erasing UDS.KEYID = 0
7,620,142 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,795 UART: [idev] --
7,645,934 UART: [ldev] ++
7,646,543 UART: [ldev] CDI.KEYID = 6
7,647,466 UART: [ldev] SUBJECT.KEYID = 5
7,648,691 UART: [ldev] AUTHORITY.KEYID = 7
7,649,929 UART: [ldev] FE.KEYID = 1
7,659,394 UART: [ldev] Erasing FE.KEYID = 1
10,949,354 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,442 UART: [ldev] --
13,311,014 UART: [fwproc] Waiting for Commands...
13,313,614 UART: [fwproc] Received command 0x46574c44
13,315,806 UART: [fwproc] Received Image of size 118548 bytes
17,418,118 UART: ROM Fatal Error: 0x000B0028
17,421,594 >>> mbox cmd response: failed
17,422,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,422,386 >>> mbox cmd response: failed
17,422,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,422,958 >>> mbox cmd response: failed
Initializing fuses
2,057,926 writing to cptra_bootfsm_go
2,247,249 UART:
2,247,601 UART: Running Caliptra ROM ...
2,248,751 UART:
3,038,787 UART: [state] CFI Enabled
3,055,592 UART: [state] LifecycleState = Unprovisioned
3,057,510 UART: [state] DebugLocked = No
3,059,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,063,917 UART: [kat] SHA2-256
3,233,633 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,244,197 UART: [kat] ++
3,244,710 UART: [kat] sha1
3,256,086 UART: [kat] SHA2-256
3,258,824 UART: [kat] SHA2-384
3,263,957 UART: [kat] SHA2-512-ACC
3,266,324 UART: [kat] ECC-384
5,550,238 UART: [kat] HMAC-384Kdf
5,561,614 UART: [kat] LMS
6,751,728 UART: [kat] --
6,755,680 UART: [cold-reset] ++
6,757,779 UART: [fht] Storing FHT @ 0x50003400
6,770,676 UART: [idev] ++
6,771,250 UART: [idev] CDI.KEYID = 6
6,772,225 UART: [idev] SUBJECT.KEYID = 7
6,773,444 UART: [idev] UDS.KEYID = 0
6,776,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,924,869 UART: [idev] Erasing UDS.KEYID = 0
10,061,507 UART: [idev] Using Sha1 for KeyId Algorithm
10,082,374 UART: [idev] --
10,086,375 UART: [ldev] ++
10,086,952 UART: [ldev] CDI.KEYID = 6
10,087,924 UART: [ldev] SUBJECT.KEYID = 5
10,089,149 UART: [ldev] AUTHORITY.KEYID = 7
10,090,396 UART: [ldev] FE.KEYID = 1
10,101,431 UART: [ldev] Erasing FE.KEYID = 1
13,396,807 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,691,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,706,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,720,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,735,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,753,410 UART: [ldev] --
15,758,165 UART: [fwproc] Waiting for Commands...
15,760,220 UART: [fwproc] Received command 0x46574c44
15,762,419 UART: [fwproc] Received Image of size 118548 bytes
19,867,825 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,945,307 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,018,494 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,347,748 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
4,128,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,390,584 >>> mbox cmd response: failed
17,391,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,391,643 >>> mbox cmd response: failed
17,391,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,392,220 >>> mbox cmd response: failed
Initializing fuses
2,057,359 writing to cptra_bootfsm_go
6,606,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,640,650 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,218 UART:
192,603 UART: Running Caliptra ROM ...
193,715 UART:
193,859 UART: [state] CFI Enabled
261,183 UART: [state] LifecycleState = Unprovisioned
263,101 UART: [state] DebugLocked = No
264,807 UART: [state] WD Timer not started. Device not locked for debugging
268,848 UART: [kat] SHA2-256
448,515 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,309 UART: [kat] ++
459,776 UART: [kat] sha1
470,653 UART: [kat] SHA2-256
473,338 UART: [kat] SHA2-384
478,885 UART: [kat] SHA2-512-ACC
481,276 UART: [kat] ECC-384
2,947,751 UART: [kat] HMAC-384Kdf
2,969,086 UART: [kat] LMS
3,445,572 UART: [kat] --
3,450,001 UART: [cold-reset] ++
3,452,540 UART: [fht] FHT @ 0x50003400
3,465,271 UART: [idev] ++
3,465,842 UART: [idev] CDI.KEYID = 6
3,466,862 UART: [idev] SUBJECT.KEYID = 7
3,468,079 UART: [idev] UDS.KEYID = 0
3,470,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,749 UART: [idev] Erasing UDS.KEYID = 0
5,983,266 UART: [idev] Sha1 KeyId Algorithm
6,007,739 UART: [idev] --
6,011,632 UART: [ldev] ++
6,012,257 UART: [ldev] CDI.KEYID = 6
6,013,187 UART: [ldev] SUBJECT.KEYID = 5
6,014,365 UART: [ldev] AUTHORITY.KEYID = 7
6,015,626 UART: [ldev] FE.KEYID = 1
6,055,610 UART: [ldev] Erasing FE.KEYID = 1
8,564,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,009 UART: [ldev] --
10,377,307 UART: [fwproc] Wait for Commands...
10,379,902 UART: [fwproc] Recv command 0x46574c44
10,381,889 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,007 UART: ROM Fatal Error: 0x000B0028
13,862,263 >>> mbox cmd response: failed
13,862,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,862,910 >>> mbox cmd response: failed
13,863,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,863,538 >>> mbox cmd response: failed
Initializing fuses
2,060,568 writing to cptra_bootfsm_go
2,249,859 UART:
2,250,208 UART: Running Caliptra ROM ...
2,251,350 UART:
2,251,517 UART: [state] CFI Enabled
2,310,024 UART: [state] LifecycleState = Unprovisioned
2,311,963 UART: [state] DebugLocked = No
2,314,548 UART: [state] WD Timer not started. Device not locked for debugging
2,318,619 UART: [kat] SHA2-256
2,498,269 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,509,045 UART: [kat] ++
2,509,512 UART: [kat] sha1
2,520,319 UART: [kat] SHA2-256
2,523,016 UART: [kat] SHA2-384
2,527,611 UART: [kat] SHA2-512-ACC
2,529,967 UART: [kat] ECC-384
4,996,666 UART: [kat] HMAC-384Kdf
5,020,037 UART: [kat] LMS
5,496,519 UART: [kat] --
5,501,323 UART: [cold-reset] ++
5,503,968 UART: [fht] FHT @ 0x50003400
5,514,061 UART: [idev] ++
5,514,670 UART: [idev] CDI.KEYID = 6
5,515,611 UART: [idev] SUBJECT.KEYID = 7
5,516,840 UART: [idev] UDS.KEYID = 0
5,519,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,668,372 UART: [idev] Erasing UDS.KEYID = 0
8,033,824 UART: [idev] Sha1 KeyId Algorithm
8,057,350 UART: [idev] --
8,063,032 UART: [ldev] ++
8,063,620 UART: [ldev] CDI.KEYID = 6
8,064,696 UART: [ldev] SUBJECT.KEYID = 5
8,065,810 UART: [ldev] AUTHORITY.KEYID = 7
8,067,180 UART: [ldev] FE.KEYID = 1
8,105,980 UART: [ldev] Erasing FE.KEYID = 1
10,615,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,346,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,362,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,377,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,393,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,414,592 UART: [ldev] --
12,419,810 UART: [fwproc] Wait for Commands...
12,421,644 UART: [fwproc] Recv command 0x46574c44
12,423,701 UART: [fwproc] Recv'd Img size: 118548 bytes
15,906,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,988,930 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,061,962 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,390,587 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,463,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,770,407 >>> mbox cmd response: failed
13,770,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,771,346 >>> mbox cmd response: failed
13,771,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,771,922 >>> mbox cmd response: failed
Initializing fuses
2,072,459 writing to cptra_bootfsm_go
5,518,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,308,746 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,507 writing to cptra_bootfsm_go
192,642 UART:
192,999 UART: Running Caliptra ROM ...
194,102 UART:
603,912 UART: [state] CFI Enabled
618,172 UART: [state] LifecycleState = Unprovisioned
620,140 UART: [state] DebugLocked = No
622,529 UART: [state] WD Timer not started. Device not locked for debugging
625,910 UART: [kat] SHA2-256
805,580 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,344 UART: [kat] ++
816,828 UART: [kat] sha1
827,278 UART: [kat] SHA2-256
829,967 UART: [kat] SHA2-384
836,488 UART: [kat] SHA2-512-ACC
838,835 UART: [kat] ECC-384
3,282,426 UART: [kat] HMAC-384Kdf
3,295,168 UART: [kat] LMS
3,771,717 UART: [kat] --
3,777,449 UART: [cold-reset] ++
3,778,468 UART: [fht] FHT @ 0x50003400
3,788,618 UART: [idev] ++
3,789,179 UART: [idev] CDI.KEYID = 6
3,790,146 UART: [idev] SUBJECT.KEYID = 7
3,791,366 UART: [idev] UDS.KEYID = 0
3,793,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,931 UART: [idev] Erasing UDS.KEYID = 0
6,271,250 UART: [idev] Sha1 KeyId Algorithm
6,295,307 UART: [idev] --
6,300,167 UART: [ldev] ++
6,300,782 UART: [ldev] CDI.KEYID = 6
6,301,675 UART: [ldev] SUBJECT.KEYID = 5
6,302,891 UART: [ldev] AUTHORITY.KEYID = 7
6,304,125 UART: [ldev] FE.KEYID = 1
6,315,161 UART: [ldev] Erasing FE.KEYID = 1
8,791,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,520 UART: [ldev] --
10,585,251 UART: [fwproc] Wait for Commands...
10,587,943 UART: [fwproc] Recv command 0x46574c44
10,589,938 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,951 UART: ROM Fatal Error: 0x000B0028
14,070,190 >>> mbox cmd response: failed
14,070,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,070,980 >>> mbox cmd response: failed
14,071,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,071,674 >>> mbox cmd response: failed
Initializing fuses
2,059,490 writing to cptra_bootfsm_go
2,248,802 UART:
2,249,180 UART: Running Caliptra ROM ...
2,250,320 UART:
6,378,740 UART: [state] CFI Enabled
6,392,887 UART: [state] LifecycleState = Unprovisioned
6,394,839 UART: [state] DebugLocked = No
6,397,376 UART: [state] WD Timer not started. Device not locked for debugging
6,401,992 UART: [kat] SHA2-256
6,581,669 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,592,412 UART: [kat] ++
6,592,908 UART: [kat] sha1
6,604,993 UART: [kat] SHA2-256
6,607,694 UART: [kat] SHA2-384
6,613,311 UART: [kat] SHA2-512-ACC
6,615,665 UART: [kat] ECC-384
9,057,456 UART: [kat] HMAC-384Kdf
9,069,640 UART: [kat] LMS
9,546,142 UART: [kat] --
9,549,821 UART: [cold-reset] ++
9,552,029 UART: [fht] FHT @ 0x50003400
9,563,282 UART: [idev] ++
9,563,855 UART: [idev] CDI.KEYID = 6
9,564,820 UART: [idev] SUBJECT.KEYID = 7
9,566,042 UART: [idev] UDS.KEYID = 0
9,568,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,717,351 UART: [idev] Erasing UDS.KEYID = 0
12,042,999 UART: [idev] Sha1 KeyId Algorithm
12,066,658 UART: [idev] --
12,071,588 UART: [ldev] ++
12,072,207 UART: [ldev] CDI.KEYID = 6
12,073,130 UART: [ldev] SUBJECT.KEYID = 5
12,074,293 UART: [ldev] AUTHORITY.KEYID = 7
12,075,528 UART: [ldev] FE.KEYID = 1
12,089,656 UART: [ldev] Erasing FE.KEYID = 1
14,568,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,286,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,302,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,318,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,334,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,356,276 UART: [ldev] --
16,362,200 UART: [fwproc] Wait for Commands...
16,364,090 UART: [fwproc] Recv command 0x46574c44
16,366,082 UART: [fwproc] Recv'd Img size: 118548 bytes
19,851,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,930,060 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,003,081 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,331,249 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,784,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,972,469 >>> mbox cmd response: failed
13,973,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,973,449 >>> mbox cmd response: failed
13,973,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,974,016 >>> mbox cmd response: failed
Initializing fuses
2,061,035 writing to cptra_bootfsm_go
9,673,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,345,286 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,338 UART:
192,699 UART: Running Caliptra ROM ...
193,896 UART:
194,053 UART: [state] CFI Enabled
261,411 UART: [state] LifecycleState = Unprovisioned
263,771 UART: [state] DebugLocked = No
265,752 UART: [state] WD Timer not started. Device not locked for debugging
271,049 UART: [kat] SHA2-256
460,923 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,667 UART: [kat] ++
472,163 UART: [kat] sha1
484,831 UART: [kat] SHA2-256
487,856 UART: [kat] SHA2-384
494,009 UART: [kat] SHA2-512-ACC
496,582 UART: [kat] ECC-384
2,947,775 UART: [kat] HMAC-384Kdf
2,968,572 UART: [kat] LMS
3,500,373 UART: [kat] --
3,505,394 UART: [cold-reset] ++
3,507,393 UART: [fht] FHT @ 0x50003400
3,517,763 UART: [idev] ++
3,518,495 UART: [idev] CDI.KEYID = 6
3,519,426 UART: [idev] SUBJECT.KEYID = 7
3,520,593 UART: [idev] UDS.KEYID = 0
3,523,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,889 UART: [idev] Erasing UDS.KEYID = 0
6,025,430 UART: [idev] Sha1 KeyId Algorithm
6,047,884 UART: [idev] --
6,053,778 UART: [ldev] ++
6,054,461 UART: [ldev] CDI.KEYID = 6
6,055,350 UART: [ldev] SUBJECT.KEYID = 5
6,056,590 UART: [ldev] AUTHORITY.KEYID = 7
6,057,724 UART: [ldev] FE.KEYID = 1
6,098,034 UART: [ldev] Erasing FE.KEYID = 1
8,604,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,917 UART: [ldev] --
10,410,254 UART: [fwproc] Wait for Commands...
10,413,433 UART: [fwproc] Recv command 0x46574c44
10,415,699 UART: [fwproc] Recv'd Img size: 118548 bytes
13,908,201 UART: ROM Fatal Error: 0x000B0028
13,911,815 >>> mbox cmd response: failed
13,912,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,912,627 >>> mbox cmd response: failed
13,912,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,913,220 >>> mbox cmd response: failed
Initializing fuses
2,061,860 writing to cptra_bootfsm_go
2,251,162 UART:
2,251,513 UART: Running Caliptra ROM ...
2,252,560 UART:
2,252,719 UART: [state] CFI Enabled
2,327,868 UART: [state] LifecycleState = Unprovisioned
2,330,250 UART: [state] DebugLocked = No
2,331,730 UART: [state] WD Timer not started. Device not locked for debugging
2,336,899 UART: [kat] SHA2-256
2,526,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,537,589 UART: [kat] ++
2,538,159 UART: [kat] sha1
2,550,300 UART: [kat] SHA2-256
2,553,320 UART: [kat] SHA2-384
2,560,015 UART: [kat] SHA2-512-ACC
2,562,635 UART: [kat] ECC-384
5,010,821 UART: [kat] HMAC-384Kdf
5,035,007 UART: [kat] LMS
5,566,744 UART: [kat] --
5,569,873 UART: [cold-reset] ++
5,570,945 UART: [fht] FHT @ 0x50003400
5,582,635 UART: [idev] ++
5,583,314 UART: [idev] CDI.KEYID = 6
5,584,334 UART: [idev] SUBJECT.KEYID = 7
5,585,497 UART: [idev] UDS.KEYID = 0
5,587,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,736,902 UART: [idev] Erasing UDS.KEYID = 0
8,090,014 UART: [idev] Sha1 KeyId Algorithm
8,112,181 UART: [idev] --
8,116,073 UART: [ldev] ++
8,116,758 UART: [ldev] CDI.KEYID = 6
8,117,673 UART: [ldev] SUBJECT.KEYID = 5
8,118,890 UART: [ldev] AUTHORITY.KEYID = 7
8,120,069 UART: [ldev] FE.KEYID = 1
8,155,401 UART: [ldev] Erasing FE.KEYID = 1
10,665,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,386 UART: [ldev] --
12,470,334 UART: [fwproc] Wait for Commands...
12,472,442 UART: [fwproc] Recv command 0x46574c44
12,474,785 UART: [fwproc] Recv'd Img size: 118548 bytes
15,960,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,039,155 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,162,806 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,723,193 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,718 writing to cptra_bootfsm_go
3,418,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,328,541 >>> mbox cmd response: failed
14,329,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,329,618 >>> mbox cmd response: failed
14,329,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,330,195 >>> mbox cmd response: failed
Initializing fuses
2,062,010 writing to cptra_bootfsm_go
5,471,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,853,639 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,634 UART:
192,992 UART: Running Caliptra ROM ...
194,134 UART:
603,733 UART: [state] CFI Enabled
616,262 UART: [state] LifecycleState = Unprovisioned
618,595 UART: [state] DebugLocked = No
619,951 UART: [state] WD Timer not started. Device not locked for debugging
623,740 UART: [kat] SHA2-256
813,598 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,375 UART: [kat] ++
824,886 UART: [kat] sha1
835,570 UART: [kat] SHA2-256
838,541 UART: [kat] SHA2-384
844,324 UART: [kat] SHA2-512-ACC
846,887 UART: [kat] ECC-384
3,289,222 UART: [kat] HMAC-384Kdf
3,301,687 UART: [kat] LMS
3,833,529 UART: [kat] --
3,838,286 UART: [cold-reset] ++
3,840,493 UART: [fht] FHT @ 0x50003400
3,852,398 UART: [idev] ++
3,853,082 UART: [idev] CDI.KEYID = 6
3,853,972 UART: [idev] SUBJECT.KEYID = 7
3,855,246 UART: [idev] UDS.KEYID = 0
3,858,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,112 UART: [idev] Erasing UDS.KEYID = 0
6,332,417 UART: [idev] Sha1 KeyId Algorithm
6,355,265 UART: [idev] --
6,360,457 UART: [ldev] ++
6,361,179 UART: [ldev] CDI.KEYID = 6
6,362,081 UART: [ldev] SUBJECT.KEYID = 5
6,363,252 UART: [ldev] AUTHORITY.KEYID = 7
6,364,436 UART: [ldev] FE.KEYID = 1
6,373,550 UART: [ldev] Erasing FE.KEYID = 1
8,852,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,168 UART: [ldev] --
10,641,654 UART: [fwproc] Wait for Commands...
10,643,866 UART: [fwproc] Recv command 0x46574c44
10,646,142 UART: [fwproc] Recv'd Img size: 118548 bytes
14,134,163 UART: ROM Fatal Error: 0x000B0028
14,137,841 >>> mbox cmd response: failed
14,138,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,138,621 >>> mbox cmd response: failed
14,138,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,139,193 >>> mbox cmd response: failed
Initializing fuses
2,061,510 writing to cptra_bootfsm_go
2,250,812 UART:
2,251,158 UART: Running Caliptra ROM ...
2,252,207 UART:
6,309,743 UART: [state] CFI Enabled
6,323,736 UART: [state] LifecycleState = Unprovisioned
6,326,095 UART: [state] DebugLocked = No
6,328,681 UART: [state] WD Timer not started. Device not locked for debugging
6,334,021 UART: [kat] SHA2-256
6,523,917 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,534,727 UART: [kat] ++
6,535,194 UART: [kat] sha1
6,547,672 UART: [kat] SHA2-256
6,550,717 UART: [kat] SHA2-384
6,558,019 UART: [kat] SHA2-512-ACC
6,560,600 UART: [kat] ECC-384
9,004,253 UART: [kat] HMAC-384Kdf
9,016,714 UART: [kat] LMS
9,548,504 UART: [kat] --
9,554,288 UART: [cold-reset] ++
9,555,360 UART: [fht] FHT @ 0x50003400
9,566,074 UART: [idev] ++
9,566,757 UART: [idev] CDI.KEYID = 6
9,567,798 UART: [idev] SUBJECT.KEYID = 7
9,568,909 UART: [idev] UDS.KEYID = 0
9,571,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,720,258 UART: [idev] Erasing UDS.KEYID = 0
12,048,083 UART: [idev] Sha1 KeyId Algorithm
12,070,041 UART: [idev] --
12,074,995 UART: [ldev] ++
12,075,688 UART: [ldev] CDI.KEYID = 6
12,076,579 UART: [ldev] SUBJECT.KEYID = 5
12,077,748 UART: [ldev] AUTHORITY.KEYID = 7
12,078,988 UART: [ldev] FE.KEYID = 1
12,091,451 UART: [ldev] Erasing FE.KEYID = 1
14,572,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,290,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,305,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,321,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,336,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,356,569 UART: [ldev] --
16,361,570 UART: [fwproc] Wait for Commands...
16,363,077 UART: [fwproc] Recv command 0x46574c44
16,365,028 UART: [fwproc] Recv'd Img size: 118548 bytes
19,867,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,935,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,059,071 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,620,174 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
3,756,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,572,750 >>> mbox cmd response: failed
14,573,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,574,187 >>> mbox cmd response: failed
14,574,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,574,776 >>> mbox cmd response: failed
Initializing fuses
2,064,287 writing to cptra_bootfsm_go
9,047,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,325,948 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,045 UART: [kat] SHA2-256
881,976 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,091 UART: [kat] ++
886,243 UART: [kat] sha1
890,343 UART: [kat] SHA2-256
892,281 UART: [kat] SHA2-384
894,938 UART: [kat] SHA2-512-ACC
896,839 UART: [kat] ECC-384
902,596 UART: [kat] HMAC-384Kdf
907,156 UART: [kat] LMS
1,475,352 UART: [kat] --
1,476,149 UART: [cold-reset] ++
1,476,541 UART: [fht] Storing FHT @ 0x50003400
1,479,310 UART: [idev] ++
1,479,478 UART: [idev] CDI.KEYID = 6
1,479,838 UART: [idev] SUBJECT.KEYID = 7
1,480,262 UART: [idev] UDS.KEYID = 0
1,480,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,176 UART: [idev] Erasing UDS.KEYID = 0
1,504,996 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,468 UART: [idev] --
1,514,681 UART: [ldev] ++
1,514,849 UART: [ldev] CDI.KEYID = 6
1,515,212 UART: [ldev] SUBJECT.KEYID = 5
1,515,638 UART: [ldev] AUTHORITY.KEYID = 7
1,516,101 UART: [ldev] FE.KEYID = 1
1,521,287 UART: [ldev] Erasing FE.KEYID = 1
1,547,098 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,810 UART: [ldev] --
1,586,083 UART: [fwproc] Waiting for Commands...
1,586,850 UART: [fwproc] Received command 0x46574c44
1,587,641 UART: [fwproc] Received Image of size 118548 bytes
2,932,187 UART: ROM Fatal Error: 0x000B0028
2,933,344 >>> mbox cmd response: failed
2,933,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,350 >>> mbox cmd response: failed
2,933,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,356 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,115 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,739 UART: [kat] SHA2-256
881,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,785 UART: [kat] ++
885,937 UART: [kat] sha1
890,129 UART: [kat] SHA2-256
892,067 UART: [kat] SHA2-384
894,828 UART: [kat] SHA2-512-ACC
896,729 UART: [kat] ECC-384
902,102 UART: [kat] HMAC-384Kdf
906,682 UART: [kat] LMS
1,474,878 UART: [kat] --
1,475,817 UART: [cold-reset] ++
1,476,161 UART: [fht] Storing FHT @ 0x50003400
1,478,952 UART: [idev] ++
1,479,120 UART: [idev] CDI.KEYID = 6
1,479,480 UART: [idev] SUBJECT.KEYID = 7
1,479,904 UART: [idev] UDS.KEYID = 0
1,480,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,304 UART: [idev] Erasing UDS.KEYID = 0
1,504,938 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,572 UART: [idev] --
1,514,697 UART: [ldev] ++
1,514,865 UART: [ldev] CDI.KEYID = 6
1,515,228 UART: [ldev] SUBJECT.KEYID = 5
1,515,654 UART: [ldev] AUTHORITY.KEYID = 7
1,516,117 UART: [ldev] FE.KEYID = 1
1,521,393 UART: [ldev] Erasing FE.KEYID = 1
1,546,272 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,970 UART: [ldev] --
1,585,255 UART: [fwproc] Waiting for Commands...
1,586,120 UART: [fwproc] Received command 0x46574c44
1,586,911 UART: [fwproc] Received Image of size 118548 bytes
2,930,044 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,956,232 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,987,450 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,127,893 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,783,845 >>> mbox cmd response: failed
2,783,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,851 >>> mbox cmd response: failed
2,783,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,857 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,315 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,042 UART: [kat] SHA2-256
881,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,088 UART: [kat] ++
886,240 UART: [kat] sha1
890,452 UART: [kat] SHA2-256
892,390 UART: [kat] SHA2-384
894,977 UART: [kat] SHA2-512-ACC
896,878 UART: [kat] ECC-384
902,509 UART: [kat] HMAC-384Kdf
907,211 UART: [kat] LMS
1,475,407 UART: [kat] --
1,476,284 UART: [cold-reset] ++
1,476,632 UART: [fht] Storing FHT @ 0x50003400
1,479,533 UART: [idev] ++
1,479,701 UART: [idev] CDI.KEYID = 6
1,480,061 UART: [idev] SUBJECT.KEYID = 7
1,480,485 UART: [idev] UDS.KEYID = 0
1,480,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,499 UART: [idev] Erasing UDS.KEYID = 0
1,505,527 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,203 UART: [idev] --
1,515,256 UART: [ldev] ++
1,515,424 UART: [ldev] CDI.KEYID = 6
1,515,787 UART: [ldev] SUBJECT.KEYID = 5
1,516,213 UART: [ldev] AUTHORITY.KEYID = 7
1,516,676 UART: [ldev] FE.KEYID = 1
1,521,888 UART: [ldev] Erasing FE.KEYID = 1
1,547,567 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,353 UART: [ldev] --
1,586,718 UART: [fwproc] Waiting for Commands...
1,587,571 UART: [fwproc] Received command 0x46574c44
1,588,362 UART: [fwproc] Received Image of size 118548 bytes
2,932,112 UART: ROM Fatal Error: 0x000B0028
2,933,269 >>> mbox cmd response: failed
2,933,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,275 >>> mbox cmd response: failed
2,933,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,281 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,364 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,986 UART: [kat] SHA2-256
881,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,032 UART: [kat] ++
886,184 UART: [kat] sha1
890,536 UART: [kat] SHA2-256
892,474 UART: [kat] SHA2-384
895,239 UART: [kat] SHA2-512-ACC
897,140 UART: [kat] ECC-384
902,623 UART: [kat] HMAC-384Kdf
907,269 UART: [kat] LMS
1,475,465 UART: [kat] --
1,476,204 UART: [cold-reset] ++
1,476,606 UART: [fht] Storing FHT @ 0x50003400
1,479,397 UART: [idev] ++
1,479,565 UART: [idev] CDI.KEYID = 6
1,479,925 UART: [idev] SUBJECT.KEYID = 7
1,480,349 UART: [idev] UDS.KEYID = 0
1,480,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,281 UART: [idev] Erasing UDS.KEYID = 0
1,505,267 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,917 UART: [idev] --
1,515,112 UART: [ldev] ++
1,515,280 UART: [ldev] CDI.KEYID = 6
1,515,643 UART: [ldev] SUBJECT.KEYID = 5
1,516,069 UART: [ldev] AUTHORITY.KEYID = 7
1,516,532 UART: [ldev] FE.KEYID = 1
1,521,912 UART: [ldev] Erasing FE.KEYID = 1
1,547,283 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,211 UART: [ldev] --
1,586,562 UART: [fwproc] Waiting for Commands...
1,587,269 UART: [fwproc] Received command 0x46574c44
1,588,060 UART: [fwproc] Received Image of size 118548 bytes
2,932,705 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,459 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,677 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,092 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,782,758 >>> mbox cmd response: failed
2,782,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,782,764 >>> mbox cmd response: failed
2,782,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,782,770 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,156 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
88,054 UART: [kat] SHA2-256
891,604 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,708 UART: [kat] ++
895,860 UART: [kat] sha1
900,102 UART: [kat] SHA2-256
902,042 UART: [kat] SHA2-384
904,951 UART: [kat] SHA2-512-ACC
906,852 UART: [kat] ECC-384
916,465 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,276 UART: [cold-reset] ++
1,170,746 UART: [fht] FHT @ 0x50003400
1,173,266 UART: [idev] ++
1,173,434 UART: [idev] CDI.KEYID = 6
1,173,795 UART: [idev] SUBJECT.KEYID = 7
1,174,220 UART: [idev] UDS.KEYID = 0
1,174,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,055 UART: [idev] Erasing UDS.KEYID = 0
1,199,777 UART: [idev] Sha1 KeyId Algorithm
1,208,783 UART: [idev] --
1,210,022 UART: [ldev] ++
1,210,190 UART: [ldev] CDI.KEYID = 6
1,210,554 UART: [ldev] SUBJECT.KEYID = 5
1,210,981 UART: [ldev] AUTHORITY.KEYID = 7
1,211,444 UART: [ldev] FE.KEYID = 1
1,216,642 UART: [ldev] Erasing FE.KEYID = 1
1,242,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,202 UART: [ldev] --
1,281,443 UART: [fwproc] Wait for Commands...
1,282,156 UART: [fwproc] Recv command 0x46574c44
1,282,889 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,970 UART: ROM Fatal Error: 0x000B0028
2,628,127 >>> mbox cmd response: failed
2,628,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,133 >>> mbox cmd response: failed
2,628,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,139 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
891,040 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,144 UART: [kat] ++
895,296 UART: [kat] sha1
899,724 UART: [kat] SHA2-256
901,664 UART: [kat] SHA2-384
904,285 UART: [kat] SHA2-512-ACC
906,186 UART: [kat] ECC-384
915,919 UART: [kat] HMAC-384Kdf
920,595 UART: [kat] LMS
1,168,907 UART: [kat] --
1,169,858 UART: [cold-reset] ++
1,170,226 UART: [fht] FHT @ 0x50003400
1,172,792 UART: [idev] ++
1,172,960 UART: [idev] CDI.KEYID = 6
1,173,321 UART: [idev] SUBJECT.KEYID = 7
1,173,746 UART: [idev] UDS.KEYID = 0
1,174,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,611 UART: [idev] Erasing UDS.KEYID = 0
1,198,477 UART: [idev] Sha1 KeyId Algorithm
1,207,383 UART: [idev] --
1,208,290 UART: [ldev] ++
1,208,458 UART: [ldev] CDI.KEYID = 6
1,208,822 UART: [ldev] SUBJECT.KEYID = 5
1,209,249 UART: [ldev] AUTHORITY.KEYID = 7
1,209,712 UART: [ldev] FE.KEYID = 1
1,214,850 UART: [ldev] Erasing FE.KEYID = 1
1,241,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,824 UART: [ldev] --
1,281,199 UART: [fwproc] Wait for Commands...
1,281,876 UART: [fwproc] Recv command 0x46574c44
1,282,609 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,166 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,341 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,616 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,292 >>> mbox cmd response: failed
2,481,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,298 >>> mbox cmd response: failed
2,481,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,304 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,573 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
891,339 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,480 UART: [kat] HMAC-384Kdf
921,108 UART: [kat] LMS
1,169,420 UART: [kat] --
1,170,459 UART: [cold-reset] ++
1,170,995 UART: [fht] FHT @ 0x50003400
1,173,729 UART: [idev] ++
1,173,897 UART: [idev] CDI.KEYID = 6
1,174,258 UART: [idev] SUBJECT.KEYID = 7
1,174,683 UART: [idev] UDS.KEYID = 0
1,175,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,199,588 UART: [idev] Sha1 KeyId Algorithm
1,208,496 UART: [idev] --
1,209,607 UART: [ldev] ++
1,209,775 UART: [ldev] CDI.KEYID = 6
1,210,139 UART: [ldev] SUBJECT.KEYID = 5
1,210,566 UART: [ldev] AUTHORITY.KEYID = 7
1,211,029 UART: [ldev] FE.KEYID = 1
1,216,239 UART: [ldev] Erasing FE.KEYID = 1
1,242,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,681 UART: [ldev] --
1,282,082 UART: [fwproc] Wait for Commands...
1,282,673 UART: [fwproc] Recv command 0x46574c44
1,283,406 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,469 UART: ROM Fatal Error: 0x000B0028
2,628,626 >>> mbox cmd response: failed
2,628,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,632 >>> mbox cmd response: failed
2,628,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
891,611 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,715 UART: [kat] ++
895,867 UART: [kat] sha1
900,021 UART: [kat] SHA2-256
901,961 UART: [kat] SHA2-384
904,858 UART: [kat] SHA2-512-ACC
906,759 UART: [kat] ECC-384
916,626 UART: [kat] HMAC-384Kdf
921,174 UART: [kat] LMS
1,169,486 UART: [kat] --
1,170,383 UART: [cold-reset] ++
1,170,917 UART: [fht] FHT @ 0x50003400
1,173,623 UART: [idev] ++
1,173,791 UART: [idev] CDI.KEYID = 6
1,174,152 UART: [idev] SUBJECT.KEYID = 7
1,174,577 UART: [idev] UDS.KEYID = 0
1,174,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,199,496 UART: [idev] Sha1 KeyId Algorithm
1,208,296 UART: [idev] --
1,209,427 UART: [ldev] ++
1,209,595 UART: [ldev] CDI.KEYID = 6
1,209,959 UART: [ldev] SUBJECT.KEYID = 5
1,210,386 UART: [ldev] AUTHORITY.KEYID = 7
1,210,849 UART: [ldev] FE.KEYID = 1
1,216,143 UART: [ldev] Erasing FE.KEYID = 1
1,242,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,337 UART: [ldev] --
1,281,642 UART: [fwproc] Wait for Commands...
1,282,279 UART: [fwproc] Recv command 0x46574c44
1,283,012 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,285 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,460 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,729 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,615 >>> mbox cmd response: failed
2,482,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,621 >>> mbox cmd response: failed
2,482,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,176 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
893,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,689 UART: [kat] ++
897,841 UART: [kat] sha1
901,853 UART: [kat] SHA2-256
903,793 UART: [kat] SHA2-384
906,624 UART: [kat] SHA2-512-ACC
908,525 UART: [kat] ECC-384
918,424 UART: [kat] HMAC-384Kdf
923,036 UART: [kat] LMS
1,171,364 UART: [kat] --
1,172,291 UART: [cold-reset] ++
1,172,819 UART: [fht] FHT @ 0x50003400
1,175,438 UART: [idev] ++
1,175,606 UART: [idev] CDI.KEYID = 6
1,175,966 UART: [idev] SUBJECT.KEYID = 7
1,176,390 UART: [idev] UDS.KEYID = 0
1,176,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,380 UART: [idev] Erasing UDS.KEYID = 0
1,201,827 UART: [idev] Sha1 KeyId Algorithm
1,210,253 UART: [idev] --
1,211,363 UART: [ldev] ++
1,211,531 UART: [ldev] CDI.KEYID = 6
1,211,894 UART: [ldev] SUBJECT.KEYID = 5
1,212,320 UART: [ldev] AUTHORITY.KEYID = 7
1,212,783 UART: [ldev] FE.KEYID = 1
1,217,981 UART: [ldev] Erasing FE.KEYID = 1
1,244,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,125 UART: [ldev] --
1,283,426 UART: [fwproc] Wait for Commands...
1,284,142 UART: [fwproc] Recv command 0x46574c44
1,284,870 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,590 UART: ROM Fatal Error: 0x000B0028
2,628,747 >>> mbox cmd response: failed
2,628,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,753 >>> mbox cmd response: failed
2,628,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,759 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
893,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,315 UART: [kat] ++
897,467 UART: [kat] sha1
901,729 UART: [kat] SHA2-256
903,669 UART: [kat] SHA2-384
906,288 UART: [kat] SHA2-512-ACC
908,189 UART: [kat] ECC-384
917,940 UART: [kat] HMAC-384Kdf
922,454 UART: [kat] LMS
1,170,782 UART: [kat] --
1,171,723 UART: [cold-reset] ++
1,172,145 UART: [fht] FHT @ 0x50003400
1,174,700 UART: [idev] ++
1,174,868 UART: [idev] CDI.KEYID = 6
1,175,228 UART: [idev] SUBJECT.KEYID = 7
1,175,652 UART: [idev] UDS.KEYID = 0
1,175,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,410 UART: [idev] Erasing UDS.KEYID = 0
1,199,993 UART: [idev] Sha1 KeyId Algorithm
1,208,375 UART: [idev] --
1,209,607 UART: [ldev] ++
1,209,775 UART: [ldev] CDI.KEYID = 6
1,210,138 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,207 UART: [ldev] Erasing FE.KEYID = 1
1,243,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,179 UART: [ldev] --
1,282,460 UART: [fwproc] Wait for Commands...
1,283,238 UART: [fwproc] Recv command 0x46574c44
1,283,966 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,829 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,999 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,258 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,988 >>> mbox cmd response: failed
2,482,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,994 >>> mbox cmd response: failed
2,482,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,000 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,189 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
893,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,912 UART: [kat] ++
898,064 UART: [kat] sha1
902,192 UART: [kat] SHA2-256
904,132 UART: [kat] SHA2-384
906,751 UART: [kat] SHA2-512-ACC
908,652 UART: [kat] ECC-384
918,377 UART: [kat] HMAC-384Kdf
923,177 UART: [kat] LMS
1,171,505 UART: [kat] --
1,172,556 UART: [cold-reset] ++
1,172,952 UART: [fht] FHT @ 0x50003400
1,175,613 UART: [idev] ++
1,175,781 UART: [idev] CDI.KEYID = 6
1,176,141 UART: [idev] SUBJECT.KEYID = 7
1,176,565 UART: [idev] UDS.KEYID = 0
1,176,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,373 UART: [idev] Erasing UDS.KEYID = 0
1,201,364 UART: [idev] Sha1 KeyId Algorithm
1,209,892 UART: [idev] --
1,210,978 UART: [ldev] ++
1,211,146 UART: [ldev] CDI.KEYID = 6
1,211,509 UART: [ldev] SUBJECT.KEYID = 5
1,211,935 UART: [ldev] AUTHORITY.KEYID = 7
1,212,398 UART: [ldev] FE.KEYID = 1
1,217,362 UART: [ldev] Erasing FE.KEYID = 1
1,243,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,134 UART: [ldev] --
1,283,609 UART: [fwproc] Wait for Commands...
1,284,195 UART: [fwproc] Recv command 0x46574c44
1,284,923 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,441 UART: ROM Fatal Error: 0x000B0028
2,629,598 >>> mbox cmd response: failed
2,629,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,604 >>> mbox cmd response: failed
2,629,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
893,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,824 UART: [kat] ++
897,976 UART: [kat] sha1
902,236 UART: [kat] SHA2-256
904,176 UART: [kat] SHA2-384
906,713 UART: [kat] SHA2-512-ACC
908,614 UART: [kat] ECC-384
918,349 UART: [kat] HMAC-384Kdf
922,907 UART: [kat] LMS
1,171,235 UART: [kat] --
1,172,010 UART: [cold-reset] ++
1,172,354 UART: [fht] FHT @ 0x50003400
1,175,015 UART: [idev] ++
1,175,183 UART: [idev] CDI.KEYID = 6
1,175,543 UART: [idev] SUBJECT.KEYID = 7
1,175,967 UART: [idev] UDS.KEYID = 0
1,176,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,125 UART: [idev] Erasing UDS.KEYID = 0
1,201,252 UART: [idev] Sha1 KeyId Algorithm
1,209,726 UART: [idev] --
1,210,738 UART: [ldev] ++
1,210,906 UART: [ldev] CDI.KEYID = 6
1,211,269 UART: [ldev] SUBJECT.KEYID = 5
1,211,695 UART: [ldev] AUTHORITY.KEYID = 7
1,212,158 UART: [ldev] FE.KEYID = 1
1,217,266 UART: [ldev] Erasing FE.KEYID = 1
1,243,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,412 UART: [ldev] --
1,282,921 UART: [fwproc] Wait for Commands...
1,283,625 UART: [fwproc] Recv command 0x46574c44
1,284,353 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,618 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,795 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,497 >>> mbox cmd response: failed
2,484,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,503 >>> mbox cmd response: failed
2,484,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,509 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,884 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,097 UART:
192,473 UART: Running Caliptra ROM ...
193,607 UART:
193,753 UART: [state] CFI Enabled
262,143 UART: [state] LifecycleState = Unprovisioned
264,120 UART: [state] DebugLocked = No
266,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,554 UART: [kat] SHA2-256
440,256 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,772 UART: [kat] ++
451,271 UART: [kat] sha1
461,774 UART: [kat] SHA2-256
464,467 UART: [kat] SHA2-384
470,017 UART: [kat] SHA2-512-ACC
472,421 UART: [kat] ECC-384
2,765,968 UART: [kat] HMAC-384Kdf
2,799,338 UART: [kat] LMS
3,989,636 UART: [kat] --
3,994,910 UART: [cold-reset] ++
3,996,259 UART: [fht] Storing FHT @ 0x50003400
4,008,884 UART: [idev] ++
4,009,469 UART: [idev] CDI.KEYID = 6
4,010,448 UART: [idev] SUBJECT.KEYID = 7
4,011,670 UART: [idev] UDS.KEYID = 0
4,014,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,132 UART: [idev] Erasing UDS.KEYID = 0
7,347,358 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,523 UART: [idev] --
7,373,529 UART: [ldev] ++
7,374,102 UART: [ldev] CDI.KEYID = 6
7,374,989 UART: [ldev] SUBJECT.KEYID = 5
7,376,275 UART: [ldev] AUTHORITY.KEYID = 7
7,377,552 UART: [ldev] FE.KEYID = 1
7,422,092 UART: [ldev] Erasing FE.KEYID = 1
10,754,064 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,239 UART: [ldev] --
13,136,570 UART: [fwproc] Waiting for Commands...
13,139,794 UART: [fwproc] Received command 0x46574c44
13,142,069 UART: [fwproc] Received Image of size 118548 bytes
17,242,889 UART: ROM Fatal Error: 0x000B0029
17,246,366 >>> mbox cmd response: failed
17,246,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,247,131 >>> mbox cmd response: failed
17,247,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,247,691 >>> mbox cmd response: failed
Initializing fuses
2,062,240 writing to cptra_bootfsm_go
2,251,555 UART:
2,251,889 UART: Running Caliptra ROM ...
2,252,938 UART:
2,253,094 UART: [state] CFI Enabled
2,321,932 UART: [state] LifecycleState = Unprovisioned
2,323,890 UART: [state] DebugLocked = No
2,325,521 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,330,812 UART: [kat] SHA2-256
2,500,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,511,031 UART: [kat] ++
2,511,492 UART: [kat] sha1
2,522,272 UART: [kat] SHA2-256
2,524,964 UART: [kat] SHA2-384
2,531,600 UART: [kat] SHA2-512-ACC
2,533,986 UART: [kat] ECC-384
4,825,585 UART: [kat] HMAC-384Kdf
4,857,745 UART: [kat] LMS
6,048,096 UART: [kat] --
6,052,391 UART: [cold-reset] ++
6,053,851 UART: [fht] Storing FHT @ 0x50003400
6,066,147 UART: [idev] ++
6,066,792 UART: [idev] CDI.KEYID = 6
6,067,711 UART: [idev] SUBJECT.KEYID = 7
6,068,932 UART: [idev] UDS.KEYID = 0
6,071,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,220,617 UART: [idev] Erasing UDS.KEYID = 0
9,404,322 UART: [idev] Using Sha1 for KeyId Algorithm
9,425,916 UART: [idev] --
9,429,971 UART: [ldev] ++
9,430,563 UART: [ldev] CDI.KEYID = 6
9,431,477 UART: [ldev] SUBJECT.KEYID = 5
9,432,761 UART: [ldev] AUTHORITY.KEYID = 7
9,433,952 UART: [ldev] FE.KEYID = 1
9,479,497 UART: [ldev] Erasing FE.KEYID = 1
12,813,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,127,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,141,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,156,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,171,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,191,185 UART: [ldev] --
15,195,488 UART: [fwproc] Waiting for Commands...
15,198,838 UART: [fwproc] Received command 0x46574c44
15,201,028 UART: [fwproc] Received Image of size 118548 bytes
19,315,917 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,395,414 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,468,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,797,179 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,801,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,226,145 >>> mbox cmd response: failed
17,226,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,227,227 >>> mbox cmd response: failed
17,227,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,227,798 >>> mbox cmd response: failed
Initializing fuses
2,063,921 writing to cptra_bootfsm_go
5,859,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,003,786 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
192,678 UART:
193,038 UART: Running Caliptra ROM ...
194,242 UART:
603,978 UART: [state] CFI Enabled
620,181 UART: [state] LifecycleState = Unprovisioned
622,127 UART: [state] DebugLocked = No
624,341 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,505 UART: [kat] SHA2-256
798,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,836 UART: [kat] ++
809,292 UART: [kat] sha1
820,979 UART: [kat] SHA2-256
823,672 UART: [kat] SHA2-384
829,710 UART: [kat] SHA2-512-ACC
832,108 UART: [kat] ECC-384
3,118,676 UART: [kat] HMAC-384Kdf
3,130,712 UART: [kat] LMS
4,320,820 UART: [kat] --
4,323,758 UART: [cold-reset] ++
4,326,027 UART: [fht] Storing FHT @ 0x50003400
4,338,055 UART: [idev] ++
4,338,642 UART: [idev] CDI.KEYID = 6
4,339,618 UART: [idev] SUBJECT.KEYID = 7
4,340,840 UART: [idev] UDS.KEYID = 0
4,343,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,770 UART: [idev] Erasing UDS.KEYID = 0
7,628,620 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,389 UART: [idev] --
7,654,373 UART: [ldev] ++
7,654,957 UART: [ldev] CDI.KEYID = 6
7,655,848 UART: [ldev] SUBJECT.KEYID = 5
7,657,125 UART: [ldev] AUTHORITY.KEYID = 7
7,658,366 UART: [ldev] FE.KEYID = 1
7,669,535 UART: [ldev] Erasing FE.KEYID = 1
10,958,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,884 UART: [ldev] --
13,319,010 UART: [fwproc] Waiting for Commands...
13,320,630 UART: [fwproc] Received command 0x46574c44
13,322,824 UART: [fwproc] Received Image of size 118548 bytes
17,426,975 UART: ROM Fatal Error: 0x000B0029
17,430,438 >>> mbox cmd response: failed
17,430,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,431,195 >>> mbox cmd response: failed
17,431,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,431,767 >>> mbox cmd response: failed
Initializing fuses
2,057,864 writing to cptra_bootfsm_go
2,247,147 UART:
2,247,514 UART: Running Caliptra ROM ...
2,248,664 UART:
3,027,495 UART: [state] CFI Enabled
3,042,759 UART: [state] LifecycleState = Unprovisioned
3,044,671 UART: [state] DebugLocked = No
3,045,962 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,050,388 UART: [kat] SHA2-256
3,220,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,230,645 UART: [kat] ++
3,231,107 UART: [kat] sha1
3,241,245 UART: [kat] SHA2-256
3,243,945 UART: [kat] SHA2-384
3,249,835 UART: [kat] SHA2-512-ACC
3,252,191 UART: [kat] ECC-384
5,536,026 UART: [kat] HMAC-384Kdf
5,548,216 UART: [kat] LMS
6,738,353 UART: [kat] --
6,740,646 UART: [cold-reset] ++
6,741,746 UART: [fht] Storing FHT @ 0x50003400
6,753,809 UART: [idev] ++
6,754,429 UART: [idev] CDI.KEYID = 6
6,755,317 UART: [idev] SUBJECT.KEYID = 7
6,756,593 UART: [idev] UDS.KEYID = 0
6,758,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,907,908 UART: [idev] Erasing UDS.KEYID = 0
10,040,372 UART: [idev] Using Sha1 for KeyId Algorithm
10,061,814 UART: [idev] --
10,064,871 UART: [ldev] ++
10,065,456 UART: [ldev] CDI.KEYID = 6
10,066,399 UART: [ldev] SUBJECT.KEYID = 5
10,067,652 UART: [ldev] AUTHORITY.KEYID = 7
10,068,897 UART: [ldev] FE.KEYID = 1
10,079,582 UART: [ldev] Erasing FE.KEYID = 1
13,366,427 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,659,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,674,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,689,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,703,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,722,875 UART: [ldev] --
15,727,387 UART: [fwproc] Waiting for Commands...
15,730,629 UART: [fwproc] Received command 0x46574c44
15,732,858 UART: [fwproc] Received Image of size 118548 bytes
19,838,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,919,039 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,992,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,321,394 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
4,128,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,394,785 >>> mbox cmd response: failed
17,395,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,395,846 >>> mbox cmd response: failed
17,396,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,396,497 >>> mbox cmd response: failed
Initializing fuses
2,058,188 writing to cptra_bootfsm_go
6,604,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,629,350 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,346 UART:
192,706 UART: Running Caliptra ROM ...
193,952 UART:
194,108 UART: [state] CFI Enabled
258,775 UART: [state] LifecycleState = Unprovisioned
260,784 UART: [state] DebugLocked = No
263,147 UART: [state] WD Timer not started. Device not locked for debugging
267,667 UART: [kat] SHA2-256
447,289 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,104 UART: [kat] ++
458,553 UART: [kat] sha1
468,409 UART: [kat] SHA2-256
471,057 UART: [kat] SHA2-384
477,065 UART: [kat] SHA2-512-ACC
479,465 UART: [kat] ECC-384
2,947,543 UART: [kat] HMAC-384Kdf
2,967,654 UART: [kat] LMS
3,444,145 UART: [kat] --
3,449,973 UART: [cold-reset] ++
3,452,072 UART: [fht] FHT @ 0x50003400
3,462,193 UART: [idev] ++
3,462,816 UART: [idev] CDI.KEYID = 6
3,463,700 UART: [idev] SUBJECT.KEYID = 7
3,464,974 UART: [idev] UDS.KEYID = 0
3,467,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,995 UART: [idev] Erasing UDS.KEYID = 0
5,981,217 UART: [idev] Sha1 KeyId Algorithm
6,005,162 UART: [idev] --
6,011,863 UART: [ldev] ++
6,012,452 UART: [ldev] CDI.KEYID = 6
6,013,373 UART: [ldev] SUBJECT.KEYID = 5
6,014,543 UART: [ldev] AUTHORITY.KEYID = 7
6,015,783 UART: [ldev] FE.KEYID = 1
6,053,867 UART: [ldev] Erasing FE.KEYID = 1
8,561,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,441 UART: [ldev] --
10,371,715 UART: [fwproc] Wait for Commands...
10,375,011 UART: [fwproc] Recv command 0x46574c44
10,377,006 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,395 UART: ROM Fatal Error: 0x000B0029
13,860,657 >>> mbox cmd response: failed
13,861,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,861,400 >>> mbox cmd response: failed
13,861,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,861,919 >>> mbox cmd response: failed
Initializing fuses
2,064,050 writing to cptra_bootfsm_go
2,253,419 UART:
2,253,761 UART: Running Caliptra ROM ...
2,254,894 UART:
2,255,070 UART: [state] CFI Enabled
2,310,937 UART: [state] LifecycleState = Unprovisioned
2,312,876 UART: [state] DebugLocked = No
2,315,191 UART: [state] WD Timer not started. Device not locked for debugging
2,319,238 UART: [kat] SHA2-256
2,498,924 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,509,699 UART: [kat] ++
2,510,194 UART: [kat] sha1
2,521,299 UART: [kat] SHA2-256
2,523,996 UART: [kat] SHA2-384
2,530,096 UART: [kat] SHA2-512-ACC
2,532,466 UART: [kat] ECC-384
4,994,151 UART: [kat] HMAC-384Kdf
5,018,002 UART: [kat] LMS
5,494,501 UART: [kat] --
5,498,713 UART: [cold-reset] ++
5,500,757 UART: [fht] FHT @ 0x50003400
5,512,224 UART: [idev] ++
5,512,801 UART: [idev] CDI.KEYID = 6
5,513,738 UART: [idev] SUBJECT.KEYID = 7
5,515,028 UART: [idev] UDS.KEYID = 0
5,517,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,666,378 UART: [idev] Erasing UDS.KEYID = 0
8,030,130 UART: [idev] Sha1 KeyId Algorithm
8,054,082 UART: [idev] --
8,059,106 UART: [ldev] ++
8,059,698 UART: [ldev] CDI.KEYID = 6
8,060,618 UART: [ldev] SUBJECT.KEYID = 5
8,061,787 UART: [ldev] AUTHORITY.KEYID = 7
8,063,086 UART: [ldev] FE.KEYID = 1
8,103,991 UART: [ldev] Erasing FE.KEYID = 1
10,614,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,346,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,362,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,377,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,393,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,414,734 UART: [ldev] --
12,420,707 UART: [fwproc] Wait for Commands...
12,423,130 UART: [fwproc] Recv command 0x46574c44
12,425,123 UART: [fwproc] Recv'd Img size: 118548 bytes
15,907,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,986,710 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,059,732 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,388,443 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,459,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,749,775 >>> mbox cmd response: failed
13,750,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,750,759 >>> mbox cmd response: failed
13,751,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,751,338 >>> mbox cmd response: failed
Initializing fuses
2,061,449 writing to cptra_bootfsm_go
5,512,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,262,448 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,546 writing to cptra_bootfsm_go
192,798 UART:
193,150 UART: Running Caliptra ROM ...
194,362 UART:
603,989 UART: [state] CFI Enabled
618,010 UART: [state] LifecycleState = Unprovisioned
619,935 UART: [state] DebugLocked = No
622,516 UART: [state] WD Timer not started. Device not locked for debugging
625,677 UART: [kat] SHA2-256
805,338 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,100 UART: [kat] ++
816,566 UART: [kat] sha1
826,906 UART: [kat] SHA2-256
829,591 UART: [kat] SHA2-384
834,827 UART: [kat] SHA2-512-ACC
837,171 UART: [kat] ECC-384
3,275,103 UART: [kat] HMAC-384Kdf
3,286,735 UART: [kat] LMS
3,763,277 UART: [kat] --
3,767,973 UART: [cold-reset] ++
3,770,563 UART: [fht] FHT @ 0x50003400
3,782,513 UART: [idev] ++
3,783,081 UART: [idev] CDI.KEYID = 6
3,783,999 UART: [idev] SUBJECT.KEYID = 7
3,785,275 UART: [idev] UDS.KEYID = 0
3,787,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,346 UART: [idev] Erasing UDS.KEYID = 0
6,262,801 UART: [idev] Sha1 KeyId Algorithm
6,286,693 UART: [idev] --
6,291,731 UART: [ldev] ++
6,292,324 UART: [ldev] CDI.KEYID = 6
6,293,400 UART: [ldev] SUBJECT.KEYID = 5
6,294,511 UART: [ldev] AUTHORITY.KEYID = 7
6,295,690 UART: [ldev] FE.KEYID = 1
6,306,050 UART: [ldev] Erasing FE.KEYID = 1
8,782,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,020 UART: [ldev] --
10,579,398 UART: [fwproc] Wait for Commands...
10,582,528 UART: [fwproc] Recv command 0x46574c44
10,584,592 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,442 UART: ROM Fatal Error: 0x000B0029
14,071,684 >>> mbox cmd response: failed
14,072,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,072,475 >>> mbox cmd response: failed
14,072,748 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,073,046 >>> mbox cmd response: failed
Initializing fuses
2,065,844 writing to cptra_bootfsm_go
2,255,128 UART:
2,255,467 UART: Running Caliptra ROM ...
2,256,519 UART:
6,379,414 UART: [state] CFI Enabled
6,394,555 UART: [state] LifecycleState = Unprovisioned
6,396,500 UART: [state] DebugLocked = No
6,398,231 UART: [state] WD Timer not started. Device not locked for debugging
6,402,744 UART: [kat] SHA2-256
6,582,381 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,593,147 UART: [kat] ++
6,593,613 UART: [kat] sha1
6,604,286 UART: [kat] SHA2-256
6,606,988 UART: [kat] SHA2-384
6,613,198 UART: [kat] SHA2-512-ACC
6,615,600 UART: [kat] ECC-384
9,058,084 UART: [kat] HMAC-384Kdf
9,070,484 UART: [kat] LMS
9,546,966 UART: [kat] --
9,554,318 UART: [cold-reset] ++
9,555,722 UART: [fht] FHT @ 0x50003400
9,568,001 UART: [idev] ++
9,568,593 UART: [idev] CDI.KEYID = 6
9,569,619 UART: [idev] SUBJECT.KEYID = 7
9,570,785 UART: [idev] UDS.KEYID = 0
9,573,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,722,034 UART: [idev] Erasing UDS.KEYID = 0
12,045,900 UART: [idev] Sha1 KeyId Algorithm
12,068,865 UART: [idev] --
12,073,432 UART: [ldev] ++
12,074,015 UART: [ldev] CDI.KEYID = 6
12,074,933 UART: [ldev] SUBJECT.KEYID = 5
12,076,099 UART: [ldev] AUTHORITY.KEYID = 7
12,077,393 UART: [ldev] FE.KEYID = 1
12,087,611 UART: [ldev] Erasing FE.KEYID = 1
14,562,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,280,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,296,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,312,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,327,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,349,973 UART: [ldev] --
16,354,926 UART: [fwproc] Wait for Commands...
16,357,033 UART: [fwproc] Recv command 0x46574c44
16,359,085 UART: [fwproc] Recv'd Img size: 118548 bytes
19,844,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,921,759 UART: [fwproc] Load FMC at address 0x40000000 len 20044
19,994,770 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,322,695 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,782,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,980,213 >>> mbox cmd response: failed
13,980,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,981,191 >>> mbox cmd response: failed
13,981,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,981,772 >>> mbox cmd response: failed
Initializing fuses
2,061,895 writing to cptra_bootfsm_go
9,651,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,314,911 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,256 UART:
192,613 UART: Running Caliptra ROM ...
193,708 UART:
193,857 UART: [state] CFI Enabled
265,637 UART: [state] LifecycleState = Unprovisioned
268,061 UART: [state] DebugLocked = No
270,935 UART: [state] WD Timer not started. Device not locked for debugging
274,798 UART: [kat] SHA2-256
464,674 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,449 UART: [kat] ++
475,900 UART: [kat] sha1
486,946 UART: [kat] SHA2-256
489,965 UART: [kat] SHA2-384
495,199 UART: [kat] SHA2-512-ACC
497,768 UART: [kat] ECC-384
2,947,649 UART: [kat] HMAC-384Kdf
2,971,633 UART: [kat] LMS
3,503,404 UART: [kat] --
3,508,338 UART: [cold-reset] ++
3,510,388 UART: [fht] FHT @ 0x50003400
3,521,647 UART: [idev] ++
3,522,329 UART: [idev] CDI.KEYID = 6
3,523,270 UART: [idev] SUBJECT.KEYID = 7
3,524,510 UART: [idev] UDS.KEYID = 0
3,527,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,712 UART: [idev] Erasing UDS.KEYID = 0
6,026,269 UART: [idev] Sha1 KeyId Algorithm
6,047,628 UART: [idev] --
6,051,686 UART: [ldev] ++
6,052,376 UART: [ldev] CDI.KEYID = 6
6,053,264 UART: [ldev] SUBJECT.KEYID = 5
6,054,488 UART: [ldev] AUTHORITY.KEYID = 7
6,055,616 UART: [ldev] FE.KEYID = 1
6,099,350 UART: [ldev] Erasing FE.KEYID = 1
8,604,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,779 UART: [ldev] --
10,411,353 UART: [fwproc] Wait for Commands...
10,413,460 UART: [fwproc] Recv command 0x46574c44
10,415,722 UART: [fwproc] Recv'd Img size: 118548 bytes
13,905,247 UART: ROM Fatal Error: 0x000B0029
13,908,928 >>> mbox cmd response: failed
13,909,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,909,606 >>> mbox cmd response: failed
13,909,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,910,296 >>> mbox cmd response: failed
Initializing fuses
2,061,045 writing to cptra_bootfsm_go
2,250,390 UART:
2,250,738 UART: Running Caliptra ROM ...
2,251,896 UART:
2,252,073 UART: [state] CFI Enabled
2,306,543 UART: [state] LifecycleState = Unprovisioned
2,308,926 UART: [state] DebugLocked = No
2,311,303 UART: [state] WD Timer not started. Device not locked for debugging
2,316,047 UART: [kat] SHA2-256
2,505,949 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,668 UART: [kat] ++
2,517,139 UART: [kat] sha1
2,528,664 UART: [kat] SHA2-256
2,531,696 UART: [kat] SHA2-384
2,538,722 UART: [kat] SHA2-512-ACC
2,541,307 UART: [kat] ECC-384
4,995,450 UART: [kat] HMAC-384Kdf
5,019,187 UART: [kat] LMS
5,550,921 UART: [kat] --
5,555,067 UART: [cold-reset] ++
5,556,584 UART: [fht] FHT @ 0x50003400
5,567,196 UART: [idev] ++
5,567,880 UART: [idev] CDI.KEYID = 6
5,568,904 UART: [idev] SUBJECT.KEYID = 7
5,570,069 UART: [idev] UDS.KEYID = 0
5,572,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,721,890 UART: [idev] Erasing UDS.KEYID = 0
8,076,560 UART: [idev] Sha1 KeyId Algorithm
8,099,919 UART: [idev] --
8,104,839 UART: [ldev] ++
8,105,525 UART: [ldev] CDI.KEYID = 6
8,106,647 UART: [ldev] SUBJECT.KEYID = 5
8,107,754 UART: [ldev] AUTHORITY.KEYID = 7
8,108,931 UART: [ldev] FE.KEYID = 1
8,147,405 UART: [ldev] Erasing FE.KEYID = 1
10,650,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,403,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,504 UART: [ldev] --
12,460,756 UART: [fwproc] Wait for Commands...
12,463,673 UART: [fwproc] Recv command 0x46574c44
12,465,940 UART: [fwproc] Recv'd Img size: 118548 bytes
15,961,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,039,770 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,163,390 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,723,479 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,442,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,369,750 >>> mbox cmd response: failed
14,370,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,370,647 >>> mbox cmd response: failed
14,370,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,371,213 >>> mbox cmd response: failed
Initializing fuses
2,062,458 writing to cptra_bootfsm_go
5,494,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,872,141 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
192,550 UART:
192,931 UART: Running Caliptra ROM ...
194,075 UART:
603,776 UART: [state] CFI Enabled
617,271 UART: [state] LifecycleState = Unprovisioned
619,654 UART: [state] DebugLocked = No
621,527 UART: [state] WD Timer not started. Device not locked for debugging
625,968 UART: [kat] SHA2-256
815,864 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,645 UART: [kat] ++
827,341 UART: [kat] sha1
839,047 UART: [kat] SHA2-256
842,083 UART: [kat] SHA2-384
848,030 UART: [kat] SHA2-512-ACC
850,648 UART: [kat] ECC-384
3,291,692 UART: [kat] HMAC-384Kdf
3,305,535 UART: [kat] LMS
3,837,381 UART: [kat] --
3,841,938 UART: [cold-reset] ++
3,843,837 UART: [fht] FHT @ 0x50003400
3,855,130 UART: [idev] ++
3,855,841 UART: [idev] CDI.KEYID = 6
3,856,735 UART: [idev] SUBJECT.KEYID = 7
3,857,953 UART: [idev] UDS.KEYID = 0
3,860,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,696 UART: [idev] Erasing UDS.KEYID = 0
6,336,722 UART: [idev] Sha1 KeyId Algorithm
6,359,862 UART: [idev] --
6,364,585 UART: [ldev] ++
6,365,270 UART: [ldev] CDI.KEYID = 6
6,366,187 UART: [ldev] SUBJECT.KEYID = 5
6,367,407 UART: [ldev] AUTHORITY.KEYID = 7
6,368,591 UART: [ldev] FE.KEYID = 1
6,378,976 UART: [ldev] Erasing FE.KEYID = 1
8,854,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,765 UART: [ldev] --
10,641,505 UART: [fwproc] Wait for Commands...
10,644,202 UART: [fwproc] Recv command 0x46574c44
10,646,523 UART: [fwproc] Recv'd Img size: 118548 bytes
14,139,338 UART: ROM Fatal Error: 0x000B0029
14,142,979 >>> mbox cmd response: failed
14,143,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,143,740 >>> mbox cmd response: failed
14,144,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,144,315 >>> mbox cmd response: failed
Initializing fuses
2,061,558 writing to cptra_bootfsm_go
2,250,851 UART:
2,251,197 UART: Running Caliptra ROM ...
2,252,247 UART:
6,309,131 UART: [state] CFI Enabled
6,325,938 UART: [state] LifecycleState = Unprovisioned
6,328,298 UART: [state] DebugLocked = No
6,330,555 UART: [state] WD Timer not started. Device not locked for debugging
6,334,672 UART: [kat] SHA2-256
6,524,569 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,535,379 UART: [kat] ++
6,535,838 UART: [kat] sha1
6,548,297 UART: [kat] SHA2-256
6,551,320 UART: [kat] SHA2-384
6,557,099 UART: [kat] SHA2-512-ACC
6,559,685 UART: [kat] ECC-384
9,003,930 UART: [kat] HMAC-384Kdf
9,016,070 UART: [kat] LMS
9,547,881 UART: [kat] --
9,552,373 UART: [cold-reset] ++
9,553,608 UART: [fht] FHT @ 0x50003400
9,565,570 UART: [idev] ++
9,566,309 UART: [idev] CDI.KEYID = 6
9,567,190 UART: [idev] SUBJECT.KEYID = 7
9,568,486 UART: [idev] UDS.KEYID = 0
9,570,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,719,927 UART: [idev] Erasing UDS.KEYID = 0
12,043,570 UART: [idev] Sha1 KeyId Algorithm
12,065,622 UART: [idev] --
12,070,427 UART: [ldev] ++
12,071,111 UART: [ldev] CDI.KEYID = 6
12,071,998 UART: [ldev] SUBJECT.KEYID = 5
12,073,218 UART: [ldev] AUTHORITY.KEYID = 7
12,074,454 UART: [ldev] FE.KEYID = 1
12,084,272 UART: [ldev] Erasing FE.KEYID = 1
14,564,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,283,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,298,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,313,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,328,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,350,114 UART: [ldev] --
16,355,531 UART: [fwproc] Wait for Commands...
16,357,114 UART: [fwproc] Recv command 0x46574c44
16,359,387 UART: [fwproc] Recv'd Img size: 118548 bytes
19,854,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,928,794 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,052,377 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,613,092 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,439 writing to cptra_bootfsm_go
3,759,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,568,739 >>> mbox cmd response: failed
14,569,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,569,708 >>> mbox cmd response: failed
14,569,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,570,282 >>> mbox cmd response: failed
Initializing fuses
2,062,458 writing to cptra_bootfsm_go
9,036,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,316,864 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,009 UART: [kat] SHA2-256
881,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,055 UART: [kat] ++
886,207 UART: [kat] sha1
890,417 UART: [kat] SHA2-256
892,355 UART: [kat] SHA2-384
894,898 UART: [kat] SHA2-512-ACC
896,799 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,902 UART: [kat] LMS
1,475,098 UART: [kat] --
1,476,101 UART: [cold-reset] ++
1,476,501 UART: [fht] Storing FHT @ 0x50003400
1,479,438 UART: [idev] ++
1,479,606 UART: [idev] CDI.KEYID = 6
1,479,966 UART: [idev] SUBJECT.KEYID = 7
1,480,390 UART: [idev] UDS.KEYID = 0
1,480,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,608 UART: [idev] Erasing UDS.KEYID = 0
1,505,282 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,926 UART: [idev] --
1,514,951 UART: [ldev] ++
1,515,119 UART: [ldev] CDI.KEYID = 6
1,515,482 UART: [ldev] SUBJECT.KEYID = 5
1,515,908 UART: [ldev] AUTHORITY.KEYID = 7
1,516,371 UART: [ldev] FE.KEYID = 1
1,521,241 UART: [ldev] Erasing FE.KEYID = 1
1,546,364 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,358 UART: [ldev] --
1,585,689 UART: [fwproc] Waiting for Commands...
1,586,504 UART: [fwproc] Received command 0x46574c44
1,587,295 UART: [fwproc] Received Image of size 118548 bytes
2,931,145 UART: ROM Fatal Error: 0x000B0029
2,932,302 >>> mbox cmd response: failed
2,932,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,308 >>> mbox cmd response: failed
2,932,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,717 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,425 UART: [kat] SHA2-256
882,356 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,471 UART: [kat] ++
886,623 UART: [kat] sha1
890,791 UART: [kat] SHA2-256
892,729 UART: [kat] SHA2-384
895,360 UART: [kat] SHA2-512-ACC
897,261 UART: [kat] ECC-384
902,708 UART: [kat] HMAC-384Kdf
907,440 UART: [kat] LMS
1,475,636 UART: [kat] --
1,476,225 UART: [cold-reset] ++
1,476,753 UART: [fht] Storing FHT @ 0x50003400
1,479,568 UART: [idev] ++
1,479,736 UART: [idev] CDI.KEYID = 6
1,480,096 UART: [idev] SUBJECT.KEYID = 7
1,480,520 UART: [idev] UDS.KEYID = 0
1,480,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,474 UART: [idev] Erasing UDS.KEYID = 0
1,505,422 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,068 UART: [idev] --
1,515,001 UART: [ldev] ++
1,515,169 UART: [ldev] CDI.KEYID = 6
1,515,532 UART: [ldev] SUBJECT.KEYID = 5
1,515,958 UART: [ldev] AUTHORITY.KEYID = 7
1,516,421 UART: [ldev] FE.KEYID = 1
1,521,701 UART: [ldev] Erasing FE.KEYID = 1
1,547,256 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,526 UART: [ldev] --
1,586,931 UART: [fwproc] Waiting for Commands...
1,587,584 UART: [fwproc] Received command 0x46574c44
1,588,375 UART: [fwproc] Received Image of size 118548 bytes
2,933,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,596 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,814 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,131 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,784,139 >>> mbox cmd response: failed
2,784,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,145 >>> mbox cmd response: failed
2,784,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,151 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,743 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,827 UART: [state] LifecycleState = Unprovisioned
85,482 UART: [state] DebugLocked = No
86,078 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,732 UART: [kat] SHA2-256
881,663 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,778 UART: [kat] ++
885,930 UART: [kat] sha1
890,094 UART: [kat] SHA2-256
892,032 UART: [kat] SHA2-384
894,803 UART: [kat] SHA2-512-ACC
896,704 UART: [kat] ECC-384
902,403 UART: [kat] HMAC-384Kdf
907,117 UART: [kat] LMS
1,475,313 UART: [kat] --
1,476,160 UART: [cold-reset] ++
1,476,566 UART: [fht] Storing FHT @ 0x50003400
1,479,277 UART: [idev] ++
1,479,445 UART: [idev] CDI.KEYID = 6
1,479,805 UART: [idev] SUBJECT.KEYID = 7
1,480,229 UART: [idev] UDS.KEYID = 0
1,480,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,249 UART: [idev] Erasing UDS.KEYID = 0
1,505,123 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,599 UART: [idev] --
1,514,502 UART: [ldev] ++
1,514,670 UART: [ldev] CDI.KEYID = 6
1,515,033 UART: [ldev] SUBJECT.KEYID = 5
1,515,459 UART: [ldev] AUTHORITY.KEYID = 7
1,515,922 UART: [ldev] FE.KEYID = 1
1,520,928 UART: [ldev] Erasing FE.KEYID = 1
1,546,537 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,715 UART: [ldev] --
1,585,976 UART: [fwproc] Waiting for Commands...
1,586,695 UART: [fwproc] Received command 0x46574c44
1,587,486 UART: [fwproc] Received Image of size 118548 bytes
2,930,146 UART: ROM Fatal Error: 0x000B0029
2,931,303 >>> mbox cmd response: failed
2,931,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,309 >>> mbox cmd response: failed
2,931,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,315 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
86,984 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,674 UART: [kat] SHA2-256
882,605 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,720 UART: [kat] ++
886,872 UART: [kat] sha1
891,042 UART: [kat] SHA2-256
892,980 UART: [kat] SHA2-384
895,601 UART: [kat] SHA2-512-ACC
897,502 UART: [kat] ECC-384
902,927 UART: [kat] HMAC-384Kdf
907,543 UART: [kat] LMS
1,475,739 UART: [kat] --
1,476,564 UART: [cold-reset] ++
1,476,948 UART: [fht] Storing FHT @ 0x50003400
1,479,765 UART: [idev] ++
1,479,933 UART: [idev] CDI.KEYID = 6
1,480,293 UART: [idev] SUBJECT.KEYID = 7
1,480,717 UART: [idev] UDS.KEYID = 0
1,481,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,017 UART: [idev] Erasing UDS.KEYID = 0
1,505,877 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,489 UART: [idev] --
1,515,434 UART: [ldev] ++
1,515,602 UART: [ldev] CDI.KEYID = 6
1,515,965 UART: [ldev] SUBJECT.KEYID = 5
1,516,391 UART: [ldev] AUTHORITY.KEYID = 7
1,516,854 UART: [ldev] FE.KEYID = 1
1,521,972 UART: [ldev] Erasing FE.KEYID = 1
1,547,575 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,905 UART: [ldev] --
1,587,222 UART: [fwproc] Waiting for Commands...
1,588,041 UART: [fwproc] Received command 0x46574c44
1,588,832 UART: [fwproc] Received Image of size 118548 bytes
2,932,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,549 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,767 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,104 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,785,980 >>> mbox cmd response: failed
2,785,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,986 >>> mbox cmd response: failed
2,785,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,992 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,948 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,396 UART: [kat] ++
895,548 UART: [kat] sha1
899,768 UART: [kat] SHA2-256
901,708 UART: [kat] SHA2-384
904,459 UART: [kat] SHA2-512-ACC
906,360 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,663 UART: [kat] LMS
1,168,975 UART: [kat] --
1,169,924 UART: [cold-reset] ++
1,170,268 UART: [fht] FHT @ 0x50003400
1,172,834 UART: [idev] ++
1,173,002 UART: [idev] CDI.KEYID = 6
1,173,363 UART: [idev] SUBJECT.KEYID = 7
1,173,788 UART: [idev] UDS.KEYID = 0
1,174,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,873 UART: [idev] Erasing UDS.KEYID = 0
1,199,007 UART: [idev] Sha1 KeyId Algorithm
1,207,767 UART: [idev] --
1,208,834 UART: [ldev] ++
1,209,002 UART: [ldev] CDI.KEYID = 6
1,209,366 UART: [ldev] SUBJECT.KEYID = 5
1,209,793 UART: [ldev] AUTHORITY.KEYID = 7
1,210,256 UART: [ldev] FE.KEYID = 1
1,215,170 UART: [ldev] Erasing FE.KEYID = 1
1,241,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,572 UART: [ldev] --
1,280,913 UART: [fwproc] Wait for Commands...
1,281,510 UART: [fwproc] Recv command 0x46574c44
1,282,243 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,358 UART: ROM Fatal Error: 0x000B0029
2,626,515 >>> mbox cmd response: failed
2,626,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,521 >>> mbox cmd response: failed
2,626,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,527 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
891,132 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,236 UART: [kat] ++
895,388 UART: [kat] sha1
899,566 UART: [kat] SHA2-256
901,506 UART: [kat] SHA2-384
904,261 UART: [kat] SHA2-512-ACC
906,162 UART: [kat] ECC-384
915,671 UART: [kat] HMAC-384Kdf
920,117 UART: [kat] LMS
1,168,429 UART: [kat] --
1,169,520 UART: [cold-reset] ++
1,169,962 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,174,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,971 UART: [idev] Erasing UDS.KEYID = 0
1,198,815 UART: [idev] Sha1 KeyId Algorithm
1,207,743 UART: [idev] --
1,208,750 UART: [ldev] ++
1,208,918 UART: [ldev] CDI.KEYID = 6
1,209,282 UART: [ldev] SUBJECT.KEYID = 5
1,209,709 UART: [ldev] AUTHORITY.KEYID = 7
1,210,172 UART: [ldev] FE.KEYID = 1
1,215,352 UART: [ldev] Erasing FE.KEYID = 1
1,241,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,718 UART: [ldev] --
1,281,081 UART: [fwproc] Wait for Commands...
1,281,688 UART: [fwproc] Recv command 0x46574c44
1,282,421 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,844 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,019 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,370 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,946 >>> mbox cmd response: failed
2,481,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,952 >>> mbox cmd response: failed
2,481,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,131 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,292 UART: [state] WD Timer not started. Device not locked for debugging
87,455 UART: [kat] SHA2-256
891,005 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,109 UART: [kat] ++
895,261 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,384 UART: [kat] SHA2-512-ACC
906,285 UART: [kat] ECC-384
915,714 UART: [kat] HMAC-384Kdf
920,170 UART: [kat] LMS
1,168,482 UART: [kat] --
1,169,177 UART: [cold-reset] ++
1,169,605 UART: [fht] FHT @ 0x50003400
1,172,177 UART: [idev] ++
1,172,345 UART: [idev] CDI.KEYID = 6
1,172,706 UART: [idev] SUBJECT.KEYID = 7
1,173,131 UART: [idev] UDS.KEYID = 0
1,173,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,176 UART: [idev] Erasing UDS.KEYID = 0
1,197,692 UART: [idev] Sha1 KeyId Algorithm
1,206,520 UART: [idev] --
1,207,679 UART: [ldev] ++
1,207,847 UART: [ldev] CDI.KEYID = 6
1,208,211 UART: [ldev] SUBJECT.KEYID = 5
1,208,638 UART: [ldev] AUTHORITY.KEYID = 7
1,209,101 UART: [ldev] FE.KEYID = 1
1,214,477 UART: [ldev] Erasing FE.KEYID = 1
1,240,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,761 UART: [ldev] --
1,280,124 UART: [fwproc] Wait for Commands...
1,280,771 UART: [fwproc] Recv command 0x46574c44
1,281,504 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,849 UART: ROM Fatal Error: 0x000B0029
2,626,006 >>> mbox cmd response: failed
2,626,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,012 >>> mbox cmd response: failed
2,626,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,145 UART: [kat] SHA2-256
891,695 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,799 UART: [kat] ++
895,951 UART: [kat] sha1
900,285 UART: [kat] SHA2-256
902,225 UART: [kat] SHA2-384
904,854 UART: [kat] SHA2-512-ACC
906,755 UART: [kat] ECC-384
916,678 UART: [kat] HMAC-384Kdf
921,116 UART: [kat] LMS
1,169,428 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,687 UART: [fht] FHT @ 0x50003400
1,173,473 UART: [idev] ++
1,173,641 UART: [idev] CDI.KEYID = 6
1,174,002 UART: [idev] SUBJECT.KEYID = 7
1,174,427 UART: [idev] UDS.KEYID = 0
1,174,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,302 UART: [idev] Erasing UDS.KEYID = 0
1,199,756 UART: [idev] Sha1 KeyId Algorithm
1,208,724 UART: [idev] --
1,209,793 UART: [ldev] ++
1,209,961 UART: [ldev] CDI.KEYID = 6
1,210,325 UART: [ldev] SUBJECT.KEYID = 5
1,210,752 UART: [ldev] AUTHORITY.KEYID = 7
1,211,215 UART: [ldev] FE.KEYID = 1
1,216,353 UART: [ldev] Erasing FE.KEYID = 1
1,242,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,131 UART: [ldev] --
1,282,404 UART: [fwproc] Wait for Commands...
1,283,205 UART: [fwproc] Recv command 0x46574c44
1,283,938 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,089 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,264 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,517 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,693 >>> mbox cmd response: failed
2,483,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,699 >>> mbox cmd response: failed
2,483,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,596 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
893,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,323 UART: [kat] ++
897,475 UART: [kat] sha1
901,767 UART: [kat] SHA2-256
903,707 UART: [kat] SHA2-384
906,358 UART: [kat] SHA2-512-ACC
908,259 UART: [kat] ECC-384
917,882 UART: [kat] HMAC-384Kdf
922,370 UART: [kat] LMS
1,170,698 UART: [kat] --
1,171,557 UART: [cold-reset] ++
1,172,115 UART: [fht] FHT @ 0x50003400
1,174,770 UART: [idev] ++
1,174,938 UART: [idev] CDI.KEYID = 6
1,175,298 UART: [idev] SUBJECT.KEYID = 7
1,175,722 UART: [idev] UDS.KEYID = 0
1,176,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,902 UART: [idev] Erasing UDS.KEYID = 0
1,201,275 UART: [idev] Sha1 KeyId Algorithm
1,209,795 UART: [idev] --
1,210,871 UART: [ldev] ++
1,211,039 UART: [ldev] CDI.KEYID = 6
1,211,402 UART: [ldev] SUBJECT.KEYID = 5
1,211,828 UART: [ldev] AUTHORITY.KEYID = 7
1,212,291 UART: [ldev] FE.KEYID = 1
1,217,621 UART: [ldev] Erasing FE.KEYID = 1
1,243,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,501 UART: [ldev] --
1,282,920 UART: [fwproc] Wait for Commands...
1,283,590 UART: [fwproc] Recv command 0x46574c44
1,284,318 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,218 UART: ROM Fatal Error: 0x000B0029
2,629,375 >>> mbox cmd response: failed
2,629,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,381 >>> mbox cmd response: failed
2,629,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,387 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
893,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,303 UART: [kat] ++
897,455 UART: [kat] sha1
901,869 UART: [kat] SHA2-256
903,809 UART: [kat] SHA2-384
906,470 UART: [kat] SHA2-512-ACC
908,371 UART: [kat] ECC-384
918,424 UART: [kat] HMAC-384Kdf
922,814 UART: [kat] LMS
1,171,142 UART: [kat] --
1,171,855 UART: [cold-reset] ++
1,172,375 UART: [fht] FHT @ 0x50003400
1,175,000 UART: [idev] ++
1,175,168 UART: [idev] CDI.KEYID = 6
1,175,528 UART: [idev] SUBJECT.KEYID = 7
1,175,952 UART: [idev] UDS.KEYID = 0
1,176,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,876 UART: [idev] Erasing UDS.KEYID = 0
1,200,957 UART: [idev] Sha1 KeyId Algorithm
1,209,543 UART: [idev] --
1,210,677 UART: [ldev] ++
1,210,845 UART: [ldev] CDI.KEYID = 6
1,211,208 UART: [ldev] SUBJECT.KEYID = 5
1,211,634 UART: [ldev] AUTHORITY.KEYID = 7
1,212,097 UART: [ldev] FE.KEYID = 1
1,217,229 UART: [ldev] Erasing FE.KEYID = 1
1,243,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,747 UART: [ldev] --
1,282,120 UART: [fwproc] Wait for Commands...
1,282,868 UART: [fwproc] Recv command 0x46574c44
1,283,596 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,593 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,763 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,922 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,026 >>> mbox cmd response: failed
2,483,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,032 >>> mbox cmd response: failed
2,483,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,038 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,325 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
893,553 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,678 UART: [kat] ++
897,830 UART: [kat] sha1
902,134 UART: [kat] SHA2-256
904,074 UART: [kat] SHA2-384
906,757 UART: [kat] SHA2-512-ACC
908,658 UART: [kat] ECC-384
918,559 UART: [kat] HMAC-384Kdf
923,181 UART: [kat] LMS
1,171,509 UART: [kat] --
1,172,436 UART: [cold-reset] ++
1,172,990 UART: [fht] FHT @ 0x50003400
1,175,797 UART: [idev] ++
1,175,965 UART: [idev] CDI.KEYID = 6
1,176,325 UART: [idev] SUBJECT.KEYID = 7
1,176,749 UART: [idev] UDS.KEYID = 0
1,177,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,639 UART: [idev] Erasing UDS.KEYID = 0
1,201,732 UART: [idev] Sha1 KeyId Algorithm
1,210,098 UART: [idev] --
1,211,134 UART: [ldev] ++
1,211,302 UART: [ldev] CDI.KEYID = 6
1,211,665 UART: [ldev] SUBJECT.KEYID = 5
1,212,091 UART: [ldev] AUTHORITY.KEYID = 7
1,212,554 UART: [ldev] FE.KEYID = 1
1,218,018 UART: [ldev] Erasing FE.KEYID = 1
1,244,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,070 UART: [ldev] --
1,283,365 UART: [fwproc] Wait for Commands...
1,284,103 UART: [fwproc] Recv command 0x46574c44
1,284,831 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,455 UART: ROM Fatal Error: 0x000B0029
2,630,612 >>> mbox cmd response: failed
2,630,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,618 >>> mbox cmd response: failed
2,630,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,624 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Unprovisioned
85,716 UART: [state] DebugLocked = No
86,240 UART: [state] WD Timer not started. Device not locked for debugging
87,389 UART: [kat] SHA2-256
893,039 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,164 UART: [kat] ++
897,316 UART: [kat] sha1
901,540 UART: [kat] SHA2-256
903,480 UART: [kat] SHA2-384
906,305 UART: [kat] SHA2-512-ACC
908,206 UART: [kat] ECC-384
918,013 UART: [kat] HMAC-384Kdf
922,703 UART: [kat] LMS
1,171,031 UART: [kat] --
1,171,898 UART: [cold-reset] ++
1,172,272 UART: [fht] FHT @ 0x50003400
1,174,991 UART: [idev] ++
1,175,159 UART: [idev] CDI.KEYID = 6
1,175,519 UART: [idev] SUBJECT.KEYID = 7
1,175,943 UART: [idev] UDS.KEYID = 0
1,176,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,977 UART: [idev] Erasing UDS.KEYID = 0
1,201,080 UART: [idev] Sha1 KeyId Algorithm
1,209,576 UART: [idev] --
1,210,650 UART: [ldev] ++
1,210,818 UART: [ldev] CDI.KEYID = 6
1,211,181 UART: [ldev] SUBJECT.KEYID = 5
1,211,607 UART: [ldev] AUTHORITY.KEYID = 7
1,212,070 UART: [ldev] FE.KEYID = 1
1,217,126 UART: [ldev] Erasing FE.KEYID = 1
1,243,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,970 UART: [ldev] --
1,283,383 UART: [fwproc] Wait for Commands...
1,284,017 UART: [fwproc] Recv command 0x46574c44
1,284,745 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,386 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,556 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,957 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,965 >>> mbox cmd response: failed
2,483,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,971 >>> mbox cmd response: failed
2,483,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,977 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,482 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,088 UART:
192,439 UART: Running Caliptra ROM ...
193,538 UART:
193,685 UART: [state] CFI Enabled
262,936 UART: [state] LifecycleState = Unprovisioned
264,864 UART: [state] DebugLocked = No
266,268 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,960 UART: [kat] SHA2-256
441,657 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,183 UART: [kat] ++
452,661 UART: [kat] sha1
463,649 UART: [kat] SHA2-256
466,342 UART: [kat] SHA2-384
472,595 UART: [kat] SHA2-512-ACC
475,008 UART: [kat] ECC-384
2,766,424 UART: [kat] HMAC-384Kdf
2,798,161 UART: [kat] LMS
3,988,486 UART: [kat] --
3,992,866 UART: [cold-reset] ++
3,995,176 UART: [fht] Storing FHT @ 0x50003400
4,006,715 UART: [idev] ++
4,007,290 UART: [idev] CDI.KEYID = 6
4,008,206 UART: [idev] SUBJECT.KEYID = 7
4,009,487 UART: [idev] UDS.KEYID = 0
4,012,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,629 UART: [idev] Erasing UDS.KEYID = 0
7,343,596 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,364 UART: [idev] --
7,369,794 UART: [ldev] ++
7,370,366 UART: [ldev] CDI.KEYID = 6
7,371,331 UART: [ldev] SUBJECT.KEYID = 5
7,372,549 UART: [ldev] AUTHORITY.KEYID = 7
7,373,785 UART: [ldev] FE.KEYID = 1
7,419,877 UART: [ldev] Erasing FE.KEYID = 1
10,750,798 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,765 UART: [ldev] --
13,110,062 UART: [fwproc] Waiting for Commands...
13,112,435 UART: [fwproc] Received command 0x46574c44
13,114,697 UART: [fwproc] Received Image of size 118548 bytes
15,817,530 UART: ROM Fatal Error: 0x000B003F
15,820,993 >>> mbox cmd response: failed
15,821,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,821,767 >>> mbox cmd response: failed
15,822,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,822,336 >>> mbox cmd response: failed
Initializing fuses
2,057,660 writing to cptra_bootfsm_go
2,246,961 UART:
2,247,312 UART: Running Caliptra ROM ...
2,248,563 UART:
2,248,728 UART: [state] CFI Enabled
2,311,834 UART: [state] LifecycleState = Unprovisioned
2,313,795 UART: [state] DebugLocked = No
2,315,680 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,536 UART: [kat] SHA2-256
2,490,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,763 UART: [kat] ++
2,501,310 UART: [kat] sha1
2,511,992 UART: [kat] SHA2-256
2,514,687 UART: [kat] SHA2-384
2,521,711 UART: [kat] SHA2-512-ACC
2,524,103 UART: [kat] ECC-384
4,814,997 UART: [kat] HMAC-384Kdf
4,845,534 UART: [kat] LMS
6,035,837 UART: [kat] --
6,041,497 UART: [cold-reset] ++
6,043,417 UART: [fht] Storing FHT @ 0x50003400
6,055,510 UART: [idev] ++
6,056,101 UART: [idev] CDI.KEYID = 6
6,056,990 UART: [idev] SUBJECT.KEYID = 7
6,058,268 UART: [idev] UDS.KEYID = 0
6,060,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,209,828 UART: [idev] Erasing UDS.KEYID = 0
9,388,352 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,511 UART: [idev] --
9,413,415 UART: [ldev] ++
9,413,996 UART: [ldev] CDI.KEYID = 6
9,414,884 UART: [ldev] SUBJECT.KEYID = 5
9,416,189 UART: [ldev] AUTHORITY.KEYID = 7
9,417,433 UART: [ldev] FE.KEYID = 1
9,445,451 UART: [ldev] Erasing FE.KEYID = 1
12,781,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,107,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,122,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,154,912 UART: [ldev] --
15,159,429 UART: [fwproc] Waiting for Commands...
15,162,274 UART: [fwproc] Received command 0x46574c44
15,164,478 UART: [fwproc] Received Image of size 118548 bytes
19,275,465 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,351,759 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,424,945 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,753,663 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,790,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,555,002 >>> mbox cmd response: failed
15,555,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,556,156 >>> mbox cmd response: failed
15,556,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,556,722 >>> mbox cmd response: failed
Initializing fuses
2,059,005 writing to cptra_bootfsm_go
5,847,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,000,545 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,624 UART:
192,964 UART: Running Caliptra ROM ...
194,150 UART:
603,858 UART: [state] CFI Enabled
617,075 UART: [state] LifecycleState = Unprovisioned
619,052 UART: [state] DebugLocked = No
621,738 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,452 UART: [kat] SHA2-256
796,189 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,720 UART: [kat] ++
807,206 UART: [kat] sha1
819,220 UART: [kat] SHA2-256
821,932 UART: [kat] SHA2-384
827,538 UART: [kat] SHA2-512-ACC
829,880 UART: [kat] ECC-384
3,113,808 UART: [kat] HMAC-384Kdf
3,126,192 UART: [kat] LMS
4,316,270 UART: [kat] --
4,320,892 UART: [cold-reset] ++
4,323,167 UART: [fht] Storing FHT @ 0x50003400
4,333,467 UART: [idev] ++
4,334,040 UART: [idev] CDI.KEYID = 6
4,334,935 UART: [idev] SUBJECT.KEYID = 7
4,336,210 UART: [idev] UDS.KEYID = 0
4,339,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,287 UART: [idev] Erasing UDS.KEYID = 0
7,620,706 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,815 UART: [idev] --
7,646,102 UART: [ldev] ++
7,646,685 UART: [ldev] CDI.KEYID = 6
7,647,657 UART: [ldev] SUBJECT.KEYID = 5
7,648,876 UART: [ldev] AUTHORITY.KEYID = 7
7,650,112 UART: [ldev] FE.KEYID = 1
7,661,615 UART: [ldev] Erasing FE.KEYID = 1
10,950,499 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,948 UART: [ldev] --
13,310,434 UART: [fwproc] Waiting for Commands...
13,312,214 UART: [fwproc] Received command 0x46574c44
13,314,401 UART: [fwproc] Received Image of size 118548 bytes
16,020,432 UART: ROM Fatal Error: 0x000B003F
16,023,916 >>> mbox cmd response: failed
16,024,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,678 >>> mbox cmd response: failed
16,024,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,025,248 >>> mbox cmd response: failed
Initializing fuses
2,057,719 writing to cptra_bootfsm_go
2,247,027 UART:
2,247,390 UART: Running Caliptra ROM ...
2,248,547 UART:
4,426,991 UART: [state] CFI Enabled
4,441,858 UART: [state] LifecycleState = Unprovisioned
4,443,785 UART: [state] DebugLocked = No
4,445,344 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,450,863 UART: [kat] SHA2-256
4,620,616 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,631,175 UART: [kat] ++
4,631,726 UART: [kat] sha1
4,642,410 UART: [kat] SHA2-256
4,645,111 UART: [kat] SHA2-384
4,651,428 UART: [kat] SHA2-512-ACC
4,653,786 UART: [kat] ECC-384
6,938,421 UART: [kat] HMAC-384Kdf
6,950,074 UART: [kat] LMS
8,140,172 UART: [kat] --
8,145,912 UART: [cold-reset] ++
8,146,821 UART: [fht] Storing FHT @ 0x50003400
8,159,365 UART: [idev] ++
8,159,935 UART: [idev] CDI.KEYID = 6
8,160,826 UART: [idev] SUBJECT.KEYID = 7
8,162,120 UART: [idev] UDS.KEYID = 0
8,164,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,313,737 UART: [idev] Erasing UDS.KEYID = 0
11,447,493 UART: [idev] Using Sha1 for KeyId Algorithm
11,470,759 UART: [idev] --
11,475,325 UART: [ldev] ++
11,475,908 UART: [ldev] CDI.KEYID = 6
11,476,936 UART: [ldev] SUBJECT.KEYID = 5
11,478,183 UART: [ldev] AUTHORITY.KEYID = 7
11,479,368 UART: [ldev] FE.KEYID = 1
11,488,351 UART: [ldev] Erasing FE.KEYID = 1
14,774,368 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,065,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,080,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,095,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,109,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,128,738 UART: [ldev] --
17,132,557 UART: [fwproc] Waiting for Commands...
17,135,047 UART: [fwproc] Received command 0x46574c44
17,137,243 UART: [fwproc] Received Image of size 118548 bytes
21,242,678 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,308,818 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,382,007 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,710,105 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
4,129,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,769,439 >>> mbox cmd response: failed
15,770,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,770,412 >>> mbox cmd response: failed
15,770,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,771,070 >>> mbox cmd response: failed
Initializing fuses
2,057,637 writing to cptra_bootfsm_go
8,229,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,265,638 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
192,234 UART:
192,641 UART: Running Caliptra ROM ...
193,829 UART:
193,981 UART: [state] CFI Enabled
261,705 UART: [state] LifecycleState = Unprovisioned
263,699 UART: [state] DebugLocked = No
265,336 UART: [state] WD Timer not started. Device not locked for debugging
269,635 UART: [kat] SHA2-256
449,274 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,087 UART: [kat] ++
460,579 UART: [kat] sha1
470,871 UART: [kat] SHA2-256
473,587 UART: [kat] SHA2-384
479,089 UART: [kat] SHA2-512-ACC
481,492 UART: [kat] ECC-384
2,924,332 UART: [kat] HMAC-384Kdf
2,947,637 UART: [kat] LMS
3,424,116 UART: [kat] --
3,427,850 UART: [cold-reset] ++
3,429,744 UART: [fht] FHT @ 0x50003400
3,440,140 UART: [idev] ++
3,440,771 UART: [idev] CDI.KEYID = 6
3,441,705 UART: [idev] SUBJECT.KEYID = 7
3,442,928 UART: [idev] UDS.KEYID = 0
3,445,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,595,514 UART: [idev] Erasing UDS.KEYID = 0
5,963,107 UART: [idev] Sha1 KeyId Algorithm
5,985,971 UART: [idev] --
5,991,891 UART: [ldev] ++
5,992,480 UART: [ldev] CDI.KEYID = 6
5,993,395 UART: [ldev] SUBJECT.KEYID = 5
5,994,620 UART: [ldev] AUTHORITY.KEYID = 7
5,995,855 UART: [ldev] FE.KEYID = 1
6,032,650 UART: [ldev] Erasing FE.KEYID = 1
8,543,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,275,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,291,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,307,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,344,067 UART: [ldev] --
10,349,126 UART: [fwproc] Wait for Commands...
10,351,071 UART: [fwproc] Recv command 0x46574c44
10,353,072 UART: [fwproc] Recv'd Img size: 118548 bytes
12,429,159 UART: ROM Fatal Error: 0x000B003F
12,432,394 >>> mbox cmd response: failed
12,432,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,433,077 >>> mbox cmd response: failed
12,433,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,433,686 >>> mbox cmd response: failed
Initializing fuses
2,060,893 writing to cptra_bootfsm_go
2,250,231 UART:
2,250,603 UART: Running Caliptra ROM ...
2,251,746 UART:
2,251,914 UART: [state] CFI Enabled
2,314,530 UART: [state] LifecycleState = Unprovisioned
2,316,472 UART: [state] DebugLocked = No
2,319,442 UART: [state] WD Timer not started. Device not locked for debugging
2,323,245 UART: [kat] SHA2-256
2,502,927 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,513,709 UART: [kat] ++
2,514,267 UART: [kat] sha1
2,524,088 UART: [kat] SHA2-256
2,526,789 UART: [kat] SHA2-384
2,531,982 UART: [kat] SHA2-512-ACC
2,534,336 UART: [kat] ECC-384
4,995,321 UART: [kat] HMAC-384Kdf
5,018,136 UART: [kat] LMS
5,494,640 UART: [kat] --
5,500,201 UART: [cold-reset] ++
5,501,923 UART: [fht] FHT @ 0x50003400
5,512,422 UART: [idev] ++
5,513,002 UART: [idev] CDI.KEYID = 6
5,514,032 UART: [idev] SUBJECT.KEYID = 7
5,515,204 UART: [idev] UDS.KEYID = 0
5,517,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,666,698 UART: [idev] Erasing UDS.KEYID = 0
8,032,564 UART: [idev] Sha1 KeyId Algorithm
8,055,490 UART: [idev] --
8,059,932 UART: [ldev] ++
8,060,506 UART: [ldev] CDI.KEYID = 6
8,061,424 UART: [ldev] SUBJECT.KEYID = 5
8,062,646 UART: [ldev] AUTHORITY.KEYID = 7
8,063,885 UART: [ldev] FE.KEYID = 1
8,104,052 UART: [ldev] Erasing FE.KEYID = 1
10,613,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,345,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,361,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,377,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,392,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,414,053 UART: [ldev] --
12,418,681 UART: [fwproc] Wait for Commands...
12,421,758 UART: [fwproc] Recv command 0x46574c44
12,423,754 UART: [fwproc] Recv'd Img size: 118548 bytes
15,906,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,988,484 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,061,502 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,389,187 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
3,465,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,317,969 >>> mbox cmd response: failed
12,318,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,318,842 >>> mbox cmd response: failed
12,319,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,319,433 >>> mbox cmd response: failed
Initializing fuses
2,060,875 writing to cptra_bootfsm_go
5,521,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,302,354 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
192,588 UART:
192,963 UART: Running Caliptra ROM ...
194,086 UART:
603,630 UART: [state] CFI Enabled
617,977 UART: [state] LifecycleState = Unprovisioned
619,944 UART: [state] DebugLocked = No
621,844 UART: [state] WD Timer not started. Device not locked for debugging
625,003 UART: [kat] SHA2-256
804,665 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,436 UART: [kat] ++
815,882 UART: [kat] sha1
826,873 UART: [kat] SHA2-256
829,585 UART: [kat] SHA2-384
835,156 UART: [kat] SHA2-512-ACC
837,555 UART: [kat] ECC-384
3,279,143 UART: [kat] HMAC-384Kdf
3,291,488 UART: [kat] LMS
3,767,959 UART: [kat] --
3,773,094 UART: [cold-reset] ++
3,775,690 UART: [fht] FHT @ 0x50003400
3,787,977 UART: [idev] ++
3,788,550 UART: [idev] CDI.KEYID = 6
3,789,574 UART: [idev] SUBJECT.KEYID = 7
3,790,819 UART: [idev] UDS.KEYID = 0
3,793,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,301 UART: [idev] Erasing UDS.KEYID = 0
6,268,046 UART: [idev] Sha1 KeyId Algorithm
6,292,012 UART: [idev] --
6,297,528 UART: [ldev] ++
6,298,109 UART: [ldev] CDI.KEYID = 6
6,299,084 UART: [ldev] SUBJECT.KEYID = 5
6,300,192 UART: [ldev] AUTHORITY.KEYID = 7
6,301,534 UART: [ldev] FE.KEYID = 1
6,312,670 UART: [ldev] Erasing FE.KEYID = 1
8,789,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,455 UART: [ldev] --
10,582,564 UART: [fwproc] Wait for Commands...
10,584,397 UART: [fwproc] Recv command 0x46574c44
10,586,443 UART: [fwproc] Recv'd Img size: 118548 bytes
12,658,985 UART: ROM Fatal Error: 0x000B003F
12,662,235 >>> mbox cmd response: failed
12,662,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,662,993 >>> mbox cmd response: failed
12,663,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,663,503 >>> mbox cmd response: failed
Initializing fuses
2,062,290 writing to cptra_bootfsm_go
2,251,666 UART:
2,252,019 UART: Running Caliptra ROM ...
2,253,165 UART:
7,789,351 UART: [state] CFI Enabled
7,805,059 UART: [state] LifecycleState = Unprovisioned
7,806,983 UART: [state] DebugLocked = No
7,809,700 UART: [state] WD Timer not started. Device not locked for debugging
7,813,735 UART: [kat] SHA2-256
7,993,426 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,004,174 UART: [kat] ++
8,004,643 UART: [kat] sha1
8,016,188 UART: [kat] SHA2-256
8,018,880 UART: [kat] SHA2-384
8,025,908 UART: [kat] SHA2-512-ACC
8,028,267 UART: [kat] ECC-384
10,472,787 UART: [kat] HMAC-384Kdf
10,485,033 UART: [kat] LMS
10,961,513 UART: [kat] --
10,967,985 UART: [cold-reset] ++
10,969,783 UART: [fht] FHT @ 0x50003400
10,981,365 UART: [idev] ++
10,981,932 UART: [idev] CDI.KEYID = 6
10,982,870 UART: [idev] SUBJECT.KEYID = 7
10,984,156 UART: [idev] UDS.KEYID = 0
10,986,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,135,909 UART: [idev] Erasing UDS.KEYID = 0
13,466,347 UART: [idev] Sha1 KeyId Algorithm
13,489,537 UART: [idev] --
13,493,973 UART: [ldev] ++
13,494,553 UART: [ldev] CDI.KEYID = 6
13,495,462 UART: [ldev] SUBJECT.KEYID = 5
13,496,678 UART: [ldev] AUTHORITY.KEYID = 7
13,497,914 UART: [ldev] FE.KEYID = 1
13,510,183 UART: [ldev] Erasing FE.KEYID = 1
15,988,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,710,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,726,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,742,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,757,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,779,835 UART: [ldev] --
17,784,631 UART: [fwproc] Wait for Commands...
17,786,467 UART: [fwproc] Recv command 0x46574c44
17,788,465 UART: [fwproc] Recv'd Img size: 118548 bytes
21,271,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,349,915 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,422,928 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,751,295 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,775,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,531,832 >>> mbox cmd response: failed
12,532,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,532,771 >>> mbox cmd response: failed
12,533,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,533,360 >>> mbox cmd response: failed
Initializing fuses
2,061,107 writing to cptra_bootfsm_go
11,113,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,776,056 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,073 UART:
192,451 UART: Running Caliptra ROM ...
193,554 UART:
193,699 UART: [state] CFI Enabled
263,228 UART: [state] LifecycleState = Unprovisioned
265,610 UART: [state] DebugLocked = No
268,268 UART: [state] WD Timer not started. Device not locked for debugging
272,062 UART: [kat] SHA2-256
461,909 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,689 UART: [kat] ++
473,142 UART: [kat] sha1
484,857 UART: [kat] SHA2-256
487,880 UART: [kat] SHA2-384
494,623 UART: [kat] SHA2-512-ACC
497,189 UART: [kat] ECC-384
2,945,746 UART: [kat] HMAC-384Kdf
2,966,964 UART: [kat] LMS
3,498,752 UART: [kat] --
3,502,487 UART: [cold-reset] ++
3,504,645 UART: [fht] FHT @ 0x50003400
3,515,638 UART: [idev] ++
3,516,321 UART: [idev] CDI.KEYID = 6
3,517,347 UART: [idev] SUBJECT.KEYID = 7
3,518,456 UART: [idev] UDS.KEYID = 0
3,521,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,670,448 UART: [idev] Erasing UDS.KEYID = 0
6,026,221 UART: [idev] Sha1 KeyId Algorithm
6,048,617 UART: [idev] --
6,054,598 UART: [ldev] ++
6,055,304 UART: [ldev] CDI.KEYID = 6
6,056,226 UART: [ldev] SUBJECT.KEYID = 5
6,057,398 UART: [ldev] AUTHORITY.KEYID = 7
6,058,584 UART: [ldev] FE.KEYID = 1
6,096,190 UART: [ldev] Erasing FE.KEYID = 1
8,601,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,144 UART: [ldev] --
10,411,334 UART: [fwproc] Wait for Commands...
10,413,327 UART: [fwproc] Recv command 0x46574c44
10,415,587 UART: [fwproc] Recv'd Img size: 118548 bytes
12,496,970 UART: ROM Fatal Error: 0x000B003F
12,500,641 >>> mbox cmd response: failed
12,500,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,303 >>> mbox cmd response: failed
12,501,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,878 >>> mbox cmd response: failed
Initializing fuses
2,067,213 writing to cptra_bootfsm_go
2,256,556 UART:
2,256,906 UART: Running Caliptra ROM ...
2,257,954 UART:
2,258,109 UART: [state] CFI Enabled
2,326,346 UART: [state] LifecycleState = Unprovisioned
2,328,726 UART: [state] DebugLocked = No
2,331,302 UART: [state] WD Timer not started. Device not locked for debugging
2,335,991 UART: [kat] SHA2-256
2,525,850 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,536,650 UART: [kat] ++
2,537,119 UART: [kat] sha1
2,548,501 UART: [kat] SHA2-256
2,551,530 UART: [kat] SHA2-384
2,558,178 UART: [kat] SHA2-512-ACC
2,560,755 UART: [kat] ECC-384
5,011,574 UART: [kat] HMAC-384Kdf
5,033,651 UART: [kat] LMS
5,565,408 UART: [kat] --
5,569,944 UART: [cold-reset] ++
5,571,941 UART: [fht] FHT @ 0x50003400
5,582,981 UART: [idev] ++
5,583,746 UART: [idev] CDI.KEYID = 6
5,584,660 UART: [idev] SUBJECT.KEYID = 7
5,585,835 UART: [idev] UDS.KEYID = 0
5,588,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,737,433 UART: [idev] Erasing UDS.KEYID = 0
8,089,125 UART: [idev] Sha1 KeyId Algorithm
8,112,187 UART: [idev] --
8,115,998 UART: [ldev] ++
8,116,730 UART: [ldev] CDI.KEYID = 6
8,117,626 UART: [ldev] SUBJECT.KEYID = 5
8,118,797 UART: [ldev] AUTHORITY.KEYID = 7
8,119,984 UART: [ldev] FE.KEYID = 1
8,162,098 UART: [ldev] Erasing FE.KEYID = 1
10,667,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,404,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,420,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,435,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,450,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,472,313 UART: [ldev] --
12,478,399 UART: [fwproc] Wait for Commands...
12,481,098 UART: [fwproc] Recv command 0x46574c44
12,483,370 UART: [fwproc] Recv'd Img size: 118548 bytes
15,979,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,054,557 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,178,187 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,738,400 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,417,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,273,652 >>> mbox cmd response: failed
12,274,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,274,611 >>> mbox cmd response: failed
12,274,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,275,180 >>> mbox cmd response: failed
Initializing fuses
2,063,860 writing to cptra_bootfsm_go
5,469,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,846,865 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,348 UART:
192,697 UART: Running Caliptra ROM ...
193,893 UART:
603,420 UART: [state] CFI Enabled
618,532 UART: [state] LifecycleState = Unprovisioned
620,920 UART: [state] DebugLocked = No
623,606 UART: [state] WD Timer not started. Device not locked for debugging
628,430 UART: [kat] SHA2-256
818,343 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,145 UART: [kat] ++
829,659 UART: [kat] sha1
840,217 UART: [kat] SHA2-256
843,232 UART: [kat] SHA2-384
849,710 UART: [kat] SHA2-512-ACC
852,275 UART: [kat] ECC-384
3,295,761 UART: [kat] HMAC-384Kdf
3,308,336 UART: [kat] LMS
3,840,151 UART: [kat] --
3,845,848 UART: [cold-reset] ++
3,847,575 UART: [fht] FHT @ 0x50003400
3,859,322 UART: [idev] ++
3,860,015 UART: [idev] CDI.KEYID = 6
3,861,005 UART: [idev] SUBJECT.KEYID = 7
3,862,120 UART: [idev] UDS.KEYID = 0
3,864,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,038 UART: [idev] Erasing UDS.KEYID = 0
6,335,948 UART: [idev] Sha1 KeyId Algorithm
6,358,708 UART: [idev] --
6,364,546 UART: [ldev] ++
6,365,237 UART: [ldev] CDI.KEYID = 6
6,366,127 UART: [ldev] SUBJECT.KEYID = 5
6,367,236 UART: [ldev] AUTHORITY.KEYID = 7
6,368,528 UART: [ldev] FE.KEYID = 1
6,377,965 UART: [ldev] Erasing FE.KEYID = 1
8,854,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,373 UART: [ldev] --
10,644,401 UART: [fwproc] Wait for Commands...
10,647,208 UART: [fwproc] Recv command 0x46574c44
10,649,540 UART: [fwproc] Recv'd Img size: 118548 bytes
12,738,297 UART: ROM Fatal Error: 0x000B003F
12,741,911 >>> mbox cmd response: failed
12,742,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,742,576 >>> mbox cmd response: failed
12,742,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,743,149 >>> mbox cmd response: failed
Initializing fuses
2,060,939 writing to cptra_bootfsm_go
2,250,264 UART:
2,250,609 UART: Running Caliptra ROM ...
2,251,662 UART:
7,713,558 UART: [state] CFI Enabled
7,728,494 UART: [state] LifecycleState = Unprovisioned
7,730,891 UART: [state] DebugLocked = No
7,732,513 UART: [state] WD Timer not started. Device not locked for debugging
7,737,852 UART: [kat] SHA2-256
7,927,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,938,545 UART: [kat] ++
7,939,098 UART: [kat] sha1
7,951,353 UART: [kat] SHA2-256
7,954,385 UART: [kat] SHA2-384
7,960,975 UART: [kat] SHA2-512-ACC
7,963,533 UART: [kat] ECC-384
10,403,047 UART: [kat] HMAC-384Kdf
10,415,182 UART: [kat] LMS
10,947,012 UART: [kat] --
10,950,900 UART: [cold-reset] ++
10,952,915 UART: [fht] FHT @ 0x50003400
10,963,954 UART: [idev] ++
10,964,633 UART: [idev] CDI.KEYID = 6
10,965,576 UART: [idev] SUBJECT.KEYID = 7
10,966,790 UART: [idev] UDS.KEYID = 0
10,969,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,118,220 UART: [idev] Erasing UDS.KEYID = 0
13,443,286 UART: [idev] Sha1 KeyId Algorithm
13,466,518 UART: [idev] --
13,472,131 UART: [ldev] ++
13,472,817 UART: [ldev] CDI.KEYID = 6
13,473,707 UART: [ldev] SUBJECT.KEYID = 5
13,474,922 UART: [ldev] AUTHORITY.KEYID = 7
13,476,100 UART: [ldev] FE.KEYID = 1
13,487,697 UART: [ldev] Erasing FE.KEYID = 1
15,968,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,688,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,703,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,718,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,733,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,755,207 UART: [ldev] --
17,759,831 UART: [fwproc] Wait for Commands...
17,762,471 UART: [fwproc] Recv command 0x46574c44
17,764,743 UART: [fwproc] Recv'd Img size: 118548 bytes
21,251,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,333,242 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,456,816 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,017,097 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
3,764,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,529,383 >>> mbox cmd response: failed
12,530,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,530,369 >>> mbox cmd response: failed
12,530,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,530,938 >>> mbox cmd response: failed
Initializing fuses
2,061,013 writing to cptra_bootfsm_go
11,084,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,384,458 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,599 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,155 UART: [kat] SHA2-256
882,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,201 UART: [kat] ++
886,353 UART: [kat] sha1
890,549 UART: [kat] SHA2-256
892,487 UART: [kat] SHA2-384
895,124 UART: [kat] SHA2-512-ACC
897,025 UART: [kat] ECC-384
902,704 UART: [kat] HMAC-384Kdf
907,326 UART: [kat] LMS
1,475,522 UART: [kat] --
1,476,205 UART: [cold-reset] ++
1,476,665 UART: [fht] Storing FHT @ 0x50003400
1,479,636 UART: [idev] ++
1,479,804 UART: [idev] CDI.KEYID = 6
1,480,164 UART: [idev] SUBJECT.KEYID = 7
1,480,588 UART: [idev] UDS.KEYID = 0
1,480,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,580 UART: [idev] Erasing UDS.KEYID = 0
1,505,606 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,322 UART: [idev] --
1,515,293 UART: [ldev] ++
1,515,461 UART: [ldev] CDI.KEYID = 6
1,515,824 UART: [ldev] SUBJECT.KEYID = 5
1,516,250 UART: [ldev] AUTHORITY.KEYID = 7
1,516,713 UART: [ldev] FE.KEYID = 1
1,521,971 UART: [ldev] Erasing FE.KEYID = 1
1,547,166 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,444 UART: [ldev] --
1,586,727 UART: [fwproc] Waiting for Commands...
1,587,582 UART: [fwproc] Received command 0x46574c44
1,588,373 UART: [fwproc] Received Image of size 118548 bytes
1,636,277 UART: ROM Fatal Error: 0x000B003F
1,637,436 >>> mbox cmd response: failed
1,637,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,442 >>> mbox cmd response: failed
1,637,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,448 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,061 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,709 UART: [kat] SHA2-256
881,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,755 UART: [kat] ++
885,907 UART: [kat] sha1
890,167 UART: [kat] SHA2-256
892,105 UART: [kat] SHA2-384
894,860 UART: [kat] SHA2-512-ACC
896,761 UART: [kat] ECC-384
902,508 UART: [kat] HMAC-384Kdf
907,178 UART: [kat] LMS
1,475,374 UART: [kat] --
1,476,193 UART: [cold-reset] ++
1,476,741 UART: [fht] Storing FHT @ 0x50003400
1,479,546 UART: [idev] ++
1,479,714 UART: [idev] CDI.KEYID = 6
1,480,074 UART: [idev] SUBJECT.KEYID = 7
1,480,498 UART: [idev] UDS.KEYID = 0
1,480,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,652 UART: [idev] Erasing UDS.KEYID = 0
1,505,444 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,112 UART: [idev] --
1,515,143 UART: [ldev] ++
1,515,311 UART: [ldev] CDI.KEYID = 6
1,515,674 UART: [ldev] SUBJECT.KEYID = 5
1,516,100 UART: [ldev] AUTHORITY.KEYID = 7
1,516,563 UART: [ldev] FE.KEYID = 1
1,521,885 UART: [ldev] Erasing FE.KEYID = 1
1,547,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,808 UART: [ldev] --
1,586,201 UART: [fwproc] Waiting for Commands...
1,587,014 UART: [fwproc] Received command 0x46574c44
1,587,805 UART: [fwproc] Received Image of size 118548 bytes
2,931,922 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,720 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,938 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,281 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,275 >>> mbox cmd response: failed
1,488,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,281 >>> mbox cmd response: failed
1,488,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,287 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,143 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,744 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,314 UART: [kat] SHA2-256
882,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,360 UART: [kat] ++
886,512 UART: [kat] sha1
890,766 UART: [kat] SHA2-256
892,704 UART: [kat] SHA2-384
895,605 UART: [kat] SHA2-512-ACC
897,506 UART: [kat] ECC-384
903,345 UART: [kat] HMAC-384Kdf
907,809 UART: [kat] LMS
1,476,005 UART: [kat] --
1,476,784 UART: [cold-reset] ++
1,477,140 UART: [fht] Storing FHT @ 0x50003400
1,479,859 UART: [idev] ++
1,480,027 UART: [idev] CDI.KEYID = 6
1,480,387 UART: [idev] SUBJECT.KEYID = 7
1,480,811 UART: [idev] UDS.KEYID = 0
1,481,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,743 UART: [idev] Erasing UDS.KEYID = 0
1,505,409 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,075 UART: [idev] --
1,515,186 UART: [ldev] ++
1,515,354 UART: [ldev] CDI.KEYID = 6
1,515,717 UART: [ldev] SUBJECT.KEYID = 5
1,516,143 UART: [ldev] AUTHORITY.KEYID = 7
1,516,606 UART: [ldev] FE.KEYID = 1
1,521,462 UART: [ldev] Erasing FE.KEYID = 1
1,547,109 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,897 UART: [ldev] --
1,586,252 UART: [fwproc] Waiting for Commands...
1,586,945 UART: [fwproc] Received command 0x46574c44
1,587,736 UART: [fwproc] Received Image of size 118548 bytes
1,635,628 UART: ROM Fatal Error: 0x000B003F
1,636,787 >>> mbox cmd response: failed
1,636,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,793 >>> mbox cmd response: failed
1,636,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,799 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,734 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,356 UART: [kat] SHA2-256
882,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,402 UART: [kat] ++
886,554 UART: [kat] sha1
890,880 UART: [kat] SHA2-256
892,818 UART: [kat] SHA2-384
895,549 UART: [kat] SHA2-512-ACC
897,450 UART: [kat] ECC-384
903,179 UART: [kat] HMAC-384Kdf
907,847 UART: [kat] LMS
1,476,043 UART: [kat] --
1,477,138 UART: [cold-reset] ++
1,477,482 UART: [fht] Storing FHT @ 0x50003400
1,480,415 UART: [idev] ++
1,480,583 UART: [idev] CDI.KEYID = 6
1,480,943 UART: [idev] SUBJECT.KEYID = 7
1,481,367 UART: [idev] UDS.KEYID = 0
1,481,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,279 UART: [idev] Erasing UDS.KEYID = 0
1,505,829 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,625 UART: [idev] --
1,515,754 UART: [ldev] ++
1,515,922 UART: [ldev] CDI.KEYID = 6
1,516,285 UART: [ldev] SUBJECT.KEYID = 5
1,516,711 UART: [ldev] AUTHORITY.KEYID = 7
1,517,174 UART: [ldev] FE.KEYID = 1
1,522,570 UART: [ldev] Erasing FE.KEYID = 1
1,548,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,263 UART: [ldev] --
1,587,696 UART: [fwproc] Waiting for Commands...
1,588,437 UART: [fwproc] Received command 0x46574c44
1,589,228 UART: [fwproc] Received Image of size 118548 bytes
2,934,053 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,223 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,441 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,846 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,600 >>> mbox cmd response: failed
1,488,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,606 >>> mbox cmd response: failed
1,488,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,612 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,212 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,952 UART: [kat] SHA2-256
891,502 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
900,008 UART: [kat] SHA2-256
901,948 UART: [kat] SHA2-384
904,877 UART: [kat] SHA2-512-ACC
906,778 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,965 UART: [kat] LMS
1,169,277 UART: [kat] --
1,170,334 UART: [cold-reset] ++
1,170,824 UART: [fht] FHT @ 0x50003400
1,173,544 UART: [idev] ++
1,173,712 UART: [idev] CDI.KEYID = 6
1,174,073 UART: [idev] SUBJECT.KEYID = 7
1,174,498 UART: [idev] UDS.KEYID = 0
1,174,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,341 UART: [idev] Erasing UDS.KEYID = 0
1,199,347 UART: [idev] Sha1 KeyId Algorithm
1,208,385 UART: [idev] --
1,209,414 UART: [ldev] ++
1,209,582 UART: [ldev] CDI.KEYID = 6
1,209,946 UART: [ldev] SUBJECT.KEYID = 5
1,210,373 UART: [ldev] AUTHORITY.KEYID = 7
1,210,836 UART: [ldev] FE.KEYID = 1
1,216,026 UART: [ldev] Erasing FE.KEYID = 1
1,242,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,694 UART: [ldev] --
1,281,955 UART: [fwproc] Wait for Commands...
1,282,604 UART: [fwproc] Recv command 0x46574c44
1,283,337 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,047 UART: ROM Fatal Error: 0x000B003F
1,332,206 >>> mbox cmd response: failed
1,332,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,212 >>> mbox cmd response: failed
1,332,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,218 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,242 UART: [kat] ++
895,394 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,211 UART: [kat] SHA2-512-ACC
906,112 UART: [kat] ECC-384
915,419 UART: [kat] HMAC-384Kdf
920,097 UART: [kat] LMS
1,168,409 UART: [kat] --
1,169,274 UART: [cold-reset] ++
1,169,786 UART: [fht] FHT @ 0x50003400
1,172,388 UART: [idev] ++
1,172,556 UART: [idev] CDI.KEYID = 6
1,172,917 UART: [idev] SUBJECT.KEYID = 7
1,173,342 UART: [idev] UDS.KEYID = 0
1,173,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,439 UART: [idev] Erasing UDS.KEYID = 0
1,198,053 UART: [idev] Sha1 KeyId Algorithm
1,206,911 UART: [idev] --
1,208,192 UART: [ldev] ++
1,208,360 UART: [ldev] CDI.KEYID = 6
1,208,724 UART: [ldev] SUBJECT.KEYID = 5
1,209,151 UART: [ldev] AUTHORITY.KEYID = 7
1,209,614 UART: [ldev] FE.KEYID = 1
1,214,440 UART: [ldev] Erasing FE.KEYID = 1
1,240,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,280 UART: [ldev] --
1,279,683 UART: [fwproc] Wait for Commands...
1,280,382 UART: [fwproc] Recv command 0x46574c44
1,281,115 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,972 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,147 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,418 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,379 >>> mbox cmd response: failed
1,184,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,385 >>> mbox cmd response: failed
1,184,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,391 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,855 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,653 UART: [kat] ++
895,805 UART: [kat] sha1
900,061 UART: [kat] SHA2-256
902,001 UART: [kat] SHA2-384
904,810 UART: [kat] SHA2-512-ACC
906,711 UART: [kat] ECC-384
916,366 UART: [kat] HMAC-384Kdf
921,018 UART: [kat] LMS
1,169,330 UART: [kat] --
1,170,429 UART: [cold-reset] ++
1,171,007 UART: [fht] FHT @ 0x50003400
1,173,765 UART: [idev] ++
1,173,933 UART: [idev] CDI.KEYID = 6
1,174,294 UART: [idev] SUBJECT.KEYID = 7
1,174,719 UART: [idev] UDS.KEYID = 0
1,175,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,454 UART: [idev] Erasing UDS.KEYID = 0
1,199,720 UART: [idev] Sha1 KeyId Algorithm
1,208,680 UART: [idev] --
1,209,737 UART: [ldev] ++
1,209,905 UART: [ldev] CDI.KEYID = 6
1,210,269 UART: [ldev] SUBJECT.KEYID = 5
1,210,696 UART: [ldev] AUTHORITY.KEYID = 7
1,211,159 UART: [ldev] FE.KEYID = 1
1,216,369 UART: [ldev] Erasing FE.KEYID = 1
1,243,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,827 UART: [ldev] --
1,282,220 UART: [fwproc] Wait for Commands...
1,283,023 UART: [fwproc] Recv command 0x46574c44
1,283,756 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,112 UART: ROM Fatal Error: 0x000B003F
1,333,271 >>> mbox cmd response: failed
1,333,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,277 >>> mbox cmd response: failed
1,333,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
87,096 UART: [state] WD Timer not started. Device not locked for debugging
88,359 UART: [kat] SHA2-256
891,909 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,013 UART: [kat] ++
896,165 UART: [kat] sha1
900,553 UART: [kat] SHA2-256
902,493 UART: [kat] SHA2-384
905,188 UART: [kat] SHA2-512-ACC
907,089 UART: [kat] ECC-384
916,998 UART: [kat] HMAC-384Kdf
921,604 UART: [kat] LMS
1,169,916 UART: [kat] --
1,170,855 UART: [cold-reset] ++
1,171,377 UART: [fht] FHT @ 0x50003400
1,173,985 UART: [idev] ++
1,174,153 UART: [idev] CDI.KEYID = 6
1,174,514 UART: [idev] SUBJECT.KEYID = 7
1,174,939 UART: [idev] UDS.KEYID = 0
1,175,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,178 UART: [idev] Erasing UDS.KEYID = 0
1,200,362 UART: [idev] Sha1 KeyId Algorithm
1,209,048 UART: [idev] --
1,210,073 UART: [ldev] ++
1,210,241 UART: [ldev] CDI.KEYID = 6
1,210,605 UART: [ldev] SUBJECT.KEYID = 5
1,211,032 UART: [ldev] AUTHORITY.KEYID = 7
1,211,495 UART: [ldev] FE.KEYID = 1
1,216,731 UART: [ldev] Erasing FE.KEYID = 1
1,243,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,305 UART: [ldev] --
1,282,670 UART: [fwproc] Wait for Commands...
1,283,341 UART: [fwproc] Recv command 0x46574c44
1,284,074 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,381 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,556 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,813 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,902 >>> mbox cmd response: failed
1,186,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,908 >>> mbox cmd response: failed
1,186,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,914 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,040 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
893,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,197 UART: [kat] ++
897,349 UART: [kat] sha1
901,671 UART: [kat] SHA2-256
903,611 UART: [kat] SHA2-384
906,188 UART: [kat] SHA2-512-ACC
908,089 UART: [kat] ECC-384
917,444 UART: [kat] HMAC-384Kdf
922,080 UART: [kat] LMS
1,170,408 UART: [kat] --
1,171,411 UART: [cold-reset] ++
1,171,807 UART: [fht] FHT @ 0x50003400
1,174,466 UART: [idev] ++
1,174,634 UART: [idev] CDI.KEYID = 6
1,174,994 UART: [idev] SUBJECT.KEYID = 7
1,175,418 UART: [idev] UDS.KEYID = 0
1,175,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,464 UART: [idev] Erasing UDS.KEYID = 0
1,200,747 UART: [idev] Sha1 KeyId Algorithm
1,209,141 UART: [idev] --
1,210,293 UART: [ldev] ++
1,210,461 UART: [ldev] CDI.KEYID = 6
1,210,824 UART: [ldev] SUBJECT.KEYID = 5
1,211,250 UART: [ldev] AUTHORITY.KEYID = 7
1,211,713 UART: [ldev] FE.KEYID = 1
1,216,767 UART: [ldev] Erasing FE.KEYID = 1
1,243,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,647 UART: [ldev] --
1,281,980 UART: [fwproc] Wait for Commands...
1,282,616 UART: [fwproc] Recv command 0x46574c44
1,283,344 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,456 UART: ROM Fatal Error: 0x000B003F
1,331,615 >>> mbox cmd response: failed
1,331,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,621 >>> mbox cmd response: failed
1,331,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,771 UART: [state] WD Timer not started. Device not locked for debugging
87,964 UART: [kat] SHA2-256
893,614 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,739 UART: [kat] ++
897,891 UART: [kat] sha1
901,911 UART: [kat] SHA2-256
903,851 UART: [kat] SHA2-384
906,568 UART: [kat] SHA2-512-ACC
908,469 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,400 UART: [kat] LMS
1,170,728 UART: [kat] --
1,171,645 UART: [cold-reset] ++
1,172,193 UART: [fht] FHT @ 0x50003400
1,175,036 UART: [idev] ++
1,175,204 UART: [idev] CDI.KEYID = 6
1,175,564 UART: [idev] SUBJECT.KEYID = 7
1,175,988 UART: [idev] UDS.KEYID = 0
1,176,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,000 UART: [idev] Erasing UDS.KEYID = 0
1,200,385 UART: [idev] Sha1 KeyId Algorithm
1,208,825 UART: [idev] --
1,209,769 UART: [ldev] ++
1,209,937 UART: [ldev] CDI.KEYID = 6
1,210,300 UART: [ldev] SUBJECT.KEYID = 5
1,210,726 UART: [ldev] AUTHORITY.KEYID = 7
1,211,189 UART: [ldev] FE.KEYID = 1
1,216,595 UART: [ldev] Erasing FE.KEYID = 1
1,242,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,281,960 UART: [fwproc] Wait for Commands...
1,282,636 UART: [fwproc] Recv command 0x46574c44
1,283,364 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,205 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,375 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,550 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,454 >>> mbox cmd response: failed
1,187,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,460 >>> mbox cmd response: failed
1,187,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,466 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,183 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
893,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,576 UART: [kat] ++
897,728 UART: [kat] sha1
901,900 UART: [kat] SHA2-256
903,840 UART: [kat] SHA2-384
906,773 UART: [kat] SHA2-512-ACC
908,674 UART: [kat] ECC-384
918,589 UART: [kat] HMAC-384Kdf
923,221 UART: [kat] LMS
1,171,549 UART: [kat] --
1,172,200 UART: [cold-reset] ++
1,172,558 UART: [fht] FHT @ 0x50003400
1,175,241 UART: [idev] ++
1,175,409 UART: [idev] CDI.KEYID = 6
1,175,769 UART: [idev] SUBJECT.KEYID = 7
1,176,193 UART: [idev] UDS.KEYID = 0
1,176,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,547 UART: [idev] Erasing UDS.KEYID = 0
1,201,554 UART: [idev] Sha1 KeyId Algorithm
1,210,040 UART: [idev] --
1,211,228 UART: [ldev] ++
1,211,396 UART: [ldev] CDI.KEYID = 6
1,211,759 UART: [ldev] SUBJECT.KEYID = 5
1,212,185 UART: [ldev] AUTHORITY.KEYID = 7
1,212,648 UART: [ldev] FE.KEYID = 1
1,217,850 UART: [ldev] Erasing FE.KEYID = 1
1,244,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,586 UART: [ldev] --
1,284,049 UART: [fwproc] Wait for Commands...
1,284,773 UART: [fwproc] Recv command 0x46574c44
1,285,501 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,253 UART: ROM Fatal Error: 0x000B003F
1,334,412 >>> mbox cmd response: failed
1,334,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,418 >>> mbox cmd response: failed
1,334,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
893,427 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,552 UART: [kat] ++
897,704 UART: [kat] sha1
901,906 UART: [kat] SHA2-256
903,846 UART: [kat] SHA2-384
906,585 UART: [kat] SHA2-512-ACC
908,486 UART: [kat] ECC-384
918,311 UART: [kat] HMAC-384Kdf
923,071 UART: [kat] LMS
1,171,399 UART: [kat] --
1,172,458 UART: [cold-reset] ++
1,172,970 UART: [fht] FHT @ 0x50003400
1,175,755 UART: [idev] ++
1,175,923 UART: [idev] CDI.KEYID = 6
1,176,283 UART: [idev] SUBJECT.KEYID = 7
1,176,707 UART: [idev] UDS.KEYID = 0
1,177,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,907 UART: [idev] Erasing UDS.KEYID = 0
1,201,722 UART: [idev] Sha1 KeyId Algorithm
1,210,310 UART: [idev] --
1,211,330 UART: [ldev] ++
1,211,498 UART: [ldev] CDI.KEYID = 6
1,211,861 UART: [ldev] SUBJECT.KEYID = 5
1,212,287 UART: [ldev] AUTHORITY.KEYID = 7
1,212,750 UART: [ldev] FE.KEYID = 1
1,217,920 UART: [ldev] Erasing FE.KEYID = 1
1,244,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,320 UART: [ldev] --
1,283,601 UART: [fwproc] Wait for Commands...
1,284,211 UART: [fwproc] Recv command 0x46574c44
1,284,939 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,288 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,458 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,609 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,415 >>> mbox cmd response: failed
1,186,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,421 >>> mbox cmd response: failed
1,186,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,574 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,260 UART:
192,610 UART: Running Caliptra ROM ...
193,826 UART:
193,988 UART: [state] CFI Enabled
264,763 UART: [state] LifecycleState = Unprovisioned
266,698 UART: [state] DebugLocked = No
268,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,876 UART: [kat] SHA2-256
443,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,099 UART: [kat] ++
454,643 UART: [kat] sha1
465,798 UART: [kat] SHA2-256
468,487 UART: [kat] SHA2-384
473,504 UART: [kat] SHA2-512-ACC
475,886 UART: [kat] ECC-384
2,767,406 UART: [kat] HMAC-384Kdf
2,798,606 UART: [kat] LMS
3,988,901 UART: [kat] --
3,993,359 UART: [cold-reset] ++
3,994,411 UART: [fht] Storing FHT @ 0x50003400
4,005,423 UART: [idev] ++
4,006,003 UART: [idev] CDI.KEYID = 6
4,006,980 UART: [idev] SUBJECT.KEYID = 7
4,008,204 UART: [idev] UDS.KEYID = 0
4,011,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,283 UART: [idev] Erasing UDS.KEYID = 0
7,343,530 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,095 UART: [idev] --
7,368,910 UART: [ldev] ++
7,369,495 UART: [ldev] CDI.KEYID = 6
7,370,463 UART: [ldev] SUBJECT.KEYID = 5
7,371,624 UART: [ldev] AUTHORITY.KEYID = 7
7,372,911 UART: [ldev] FE.KEYID = 1
7,421,375 UART: [ldev] Erasing FE.KEYID = 1
10,756,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,599 UART: [ldev] --
13,135,239 UART: [fwproc] Waiting for Commands...
13,136,963 UART: [fwproc] Received command 0x46574c44
13,139,153 UART: [fwproc] Received Image of size 118548 bytes
15,846,667 UART: ROM Fatal Error: 0x000B003C
15,850,130 >>> mbox cmd response: failed
15,850,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,850,913 >>> mbox cmd response: failed
15,851,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,851,488 >>> mbox cmd response: failed
Initializing fuses
2,058,602 writing to cptra_bootfsm_go
2,247,976 UART:
2,248,322 UART: Running Caliptra ROM ...
2,249,464 UART:
2,249,644 UART: [state] CFI Enabled
2,307,016 UART: [state] LifecycleState = Unprovisioned
2,308,956 UART: [state] DebugLocked = No
2,311,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,316,181 UART: [kat] SHA2-256
2,485,911 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,496,412 UART: [kat] ++
2,496,909 UART: [kat] sha1
2,508,719 UART: [kat] SHA2-256
2,511,418 UART: [kat] SHA2-384
2,517,000 UART: [kat] SHA2-512-ACC
2,519,363 UART: [kat] ECC-384
4,812,319 UART: [kat] HMAC-384Kdf
4,844,747 UART: [kat] LMS
6,035,017 UART: [kat] --
6,038,323 UART: [cold-reset] ++
6,039,724 UART: [fht] Storing FHT @ 0x50003400
6,052,193 UART: [idev] ++
6,052,812 UART: [idev] CDI.KEYID = 6
6,053,700 UART: [idev] SUBJECT.KEYID = 7
6,054,979 UART: [idev] UDS.KEYID = 0
6,057,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,206,463 UART: [idev] Erasing UDS.KEYID = 0
9,387,655 UART: [idev] Using Sha1 for KeyId Algorithm
9,409,585 UART: [idev] --
9,413,043 UART: [ldev] ++
9,413,640 UART: [ldev] CDI.KEYID = 6
9,414,608 UART: [ldev] SUBJECT.KEYID = 5
9,415,801 UART: [ldev] AUTHORITY.KEYID = 7
9,417,042 UART: [ldev] FE.KEYID = 1
9,445,583 UART: [ldev] Erasing FE.KEYID = 1
12,777,695 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,073,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,088,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,103,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,117,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,138,089 UART: [ldev] --
15,142,012 UART: [fwproc] Waiting for Commands...
15,144,714 UART: [fwproc] Received command 0x46574c44
15,146,910 UART: [fwproc] Received Image of size 118548 bytes
19,247,832 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,327,538 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,400,749 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,729,267 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,807,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,561,695 >>> mbox cmd response: failed
15,562,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,562,680 >>> mbox cmd response: failed
15,562,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,563,203 >>> mbox cmd response: failed
Initializing fuses
2,056,715 writing to cptra_bootfsm_go
5,856,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,009,242 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,542 UART:
192,943 UART: Running Caliptra ROM ...
194,084 UART:
603,866 UART: [state] CFI Enabled
618,776 UART: [state] LifecycleState = Unprovisioned
620,695 UART: [state] DebugLocked = No
623,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,915 UART: [kat] SHA2-256
798,660 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,208 UART: [kat] ++
809,663 UART: [kat] sha1
821,846 UART: [kat] SHA2-256
824,544 UART: [kat] SHA2-384
829,089 UART: [kat] SHA2-512-ACC
831,461 UART: [kat] ECC-384
3,116,468 UART: [kat] HMAC-384Kdf
3,128,430 UART: [kat] LMS
4,318,521 UART: [kat] --
4,324,251 UART: [cold-reset] ++
4,325,651 UART: [fht] Storing FHT @ 0x50003400
4,335,699 UART: [idev] ++
4,336,328 UART: [idev] CDI.KEYID = 6
4,337,246 UART: [idev] SUBJECT.KEYID = 7
4,338,649 UART: [idev] UDS.KEYID = 0
4,341,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,508 UART: [idev] Erasing UDS.KEYID = 0
7,620,814 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,025 UART: [idev] --
7,648,489 UART: [ldev] ++
7,649,062 UART: [ldev] CDI.KEYID = 6
7,650,051 UART: [ldev] SUBJECT.KEYID = 5
7,651,224 UART: [ldev] AUTHORITY.KEYID = 7
7,652,474 UART: [ldev] FE.KEYID = 1
7,664,531 UART: [ldev] Erasing FE.KEYID = 1
10,960,413 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,007 UART: [ldev] --
13,319,816 UART: [fwproc] Waiting for Commands...
13,322,686 UART: [fwproc] Received command 0x46574c44
13,324,885 UART: [fwproc] Received Image of size 118548 bytes
16,026,065 UART: ROM Fatal Error: 0x000B003C
16,029,594 >>> mbox cmd response: failed
16,029,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,030,540 >>> mbox cmd response: failed
16,030,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,031,137 >>> mbox cmd response: failed
Initializing fuses
2,057,887 writing to cptra_bootfsm_go
2,247,193 UART:
2,247,535 UART: Running Caliptra ROM ...
2,248,676 UART:
4,429,615 UART: [state] CFI Enabled
4,444,581 UART: [state] LifecycleState = Unprovisioned
4,446,502 UART: [state] DebugLocked = No
4,449,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,454,912 UART: [kat] SHA2-256
4,624,658 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,635,217 UART: [kat] ++
4,635,772 UART: [kat] sha1
4,646,569 UART: [kat] SHA2-256
4,649,264 UART: [kat] SHA2-384
4,654,827 UART: [kat] SHA2-512-ACC
4,657,190 UART: [kat] ECC-384
6,942,829 UART: [kat] HMAC-384Kdf
6,954,290 UART: [kat] LMS
8,144,401 UART: [kat] --
8,149,601 UART: [cold-reset] ++
8,151,356 UART: [fht] Storing FHT @ 0x50003400
8,161,991 UART: [idev] ++
8,162,571 UART: [idev] CDI.KEYID = 6
8,163,512 UART: [idev] SUBJECT.KEYID = 7
8,164,787 UART: [idev] UDS.KEYID = 0
8,166,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,315,886 UART: [idev] Erasing UDS.KEYID = 0
11,449,439 UART: [idev] Using Sha1 for KeyId Algorithm
11,472,191 UART: [idev] --
11,475,000 UART: [ldev] ++
11,475,585 UART: [ldev] CDI.KEYID = 6
11,476,613 UART: [ldev] SUBJECT.KEYID = 5
11,477,818 UART: [ldev] AUTHORITY.KEYID = 7
11,479,003 UART: [ldev] FE.KEYID = 1
11,490,255 UART: [ldev] Erasing FE.KEYID = 1
14,778,964 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,073,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,087,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,102,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,117,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,135,589 UART: [ldev] --
17,140,104 UART: [fwproc] Waiting for Commands...
17,142,501 UART: [fwproc] Received command 0x46574c44
17,144,693 UART: [fwproc] Received Image of size 118548 bytes
21,256,057 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,335,667 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,408,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,737,944 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,125,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,770,046 >>> mbox cmd response: failed
15,770,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,771,035 >>> mbox cmd response: failed
15,771,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,771,611 >>> mbox cmd response: failed
Initializing fuses
2,058,280 writing to cptra_bootfsm_go
8,222,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,264,387 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,766 UART:
193,182 UART: Running Caliptra ROM ...
194,343 UART:
194,498 UART: [state] CFI Enabled
265,486 UART: [state] LifecycleState = Unprovisioned
267,371 UART: [state] DebugLocked = No
269,458 UART: [state] WD Timer not started. Device not locked for debugging
272,824 UART: [kat] SHA2-256
452,459 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,271 UART: [kat] ++
463,813 UART: [kat] sha1
474,540 UART: [kat] SHA2-256
477,226 UART: [kat] SHA2-384
483,636 UART: [kat] SHA2-512-ACC
486,032 UART: [kat] ECC-384
2,948,998 UART: [kat] HMAC-384Kdf
2,969,330 UART: [kat] LMS
3,445,845 UART: [kat] --
3,450,165 UART: [cold-reset] ++
3,451,834 UART: [fht] FHT @ 0x50003400
3,464,059 UART: [idev] ++
3,464,632 UART: [idev] CDI.KEYID = 6
3,465,654 UART: [idev] SUBJECT.KEYID = 7
3,466,871 UART: [idev] UDS.KEYID = 0
3,469,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,657 UART: [idev] Erasing UDS.KEYID = 0
5,988,514 UART: [idev] Sha1 KeyId Algorithm
6,012,892 UART: [idev] --
6,017,057 UART: [ldev] ++
6,017,638 UART: [ldev] CDI.KEYID = 6
6,018,526 UART: [ldev] SUBJECT.KEYID = 5
6,019,742 UART: [ldev] AUTHORITY.KEYID = 7
6,021,038 UART: [ldev] FE.KEYID = 1
6,055,914 UART: [ldev] Erasing FE.KEYID = 1
8,565,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,869 UART: [ldev] --
10,374,876 UART: [fwproc] Wait for Commands...
10,376,876 UART: [fwproc] Recv command 0x46574c44
10,378,874 UART: [fwproc] Recv'd Img size: 118548 bytes
12,454,775 UART: ROM Fatal Error: 0x000B003C
12,458,066 >>> mbox cmd response: failed
12,458,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,458,831 >>> mbox cmd response: failed
12,459,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,459,403 >>> mbox cmd response: failed
Initializing fuses
2,060,935 writing to cptra_bootfsm_go
2,250,246 UART:
2,250,595 UART: Running Caliptra ROM ...
2,251,680 UART:
2,251,849 UART: [state] CFI Enabled
2,310,226 UART: [state] LifecycleState = Unprovisioned
2,312,142 UART: [state] DebugLocked = No
2,314,894 UART: [state] WD Timer not started. Device not locked for debugging
2,318,968 UART: [kat] SHA2-256
2,498,623 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,509,401 UART: [kat] ++
2,509,952 UART: [kat] sha1
2,521,340 UART: [kat] SHA2-256
2,524,011 UART: [kat] SHA2-384
2,529,414 UART: [kat] SHA2-512-ACC
2,531,772 UART: [kat] ECC-384
4,994,108 UART: [kat] HMAC-384Kdf
5,017,247 UART: [kat] LMS
5,493,767 UART: [kat] --
5,498,242 UART: [cold-reset] ++
5,499,538 UART: [fht] FHT @ 0x50003400
5,511,387 UART: [idev] ++
5,511,955 UART: [idev] CDI.KEYID = 6
5,512,976 UART: [idev] SUBJECT.KEYID = 7
5,514,138 UART: [idev] UDS.KEYID = 0
5,516,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,665,649 UART: [idev] Erasing UDS.KEYID = 0
8,034,628 UART: [idev] Sha1 KeyId Algorithm
8,058,079 UART: [idev] --
8,062,290 UART: [ldev] ++
8,062,885 UART: [ldev] CDI.KEYID = 6
8,063,805 UART: [ldev] SUBJECT.KEYID = 5
8,065,029 UART: [ldev] AUTHORITY.KEYID = 7
8,066,278 UART: [ldev] FE.KEYID = 1
8,103,391 UART: [ldev] Erasing FE.KEYID = 1
10,611,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,345,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,361,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,377,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,392,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,415,811 UART: [ldev] --
12,421,302 UART: [fwproc] Wait for Commands...
12,423,414 UART: [fwproc] Recv command 0x46574c44
12,425,464 UART: [fwproc] Recv'd Img size: 118548 bytes
15,907,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,980,340 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,053,401 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,382,236 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,463,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,302,259 >>> mbox cmd response: failed
12,302,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,303,215 >>> mbox cmd response: failed
12,303,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,303,783 >>> mbox cmd response: failed
Initializing fuses
2,060,556 writing to cptra_bootfsm_go
5,516,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,294,379 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
192,783 UART:
193,153 UART: Running Caliptra ROM ...
194,295 UART:
603,903 UART: [state] CFI Enabled
618,124 UART: [state] LifecycleState = Unprovisioned
620,059 UART: [state] DebugLocked = No
621,956 UART: [state] WD Timer not started. Device not locked for debugging
626,475 UART: [kat] SHA2-256
806,156 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,932 UART: [kat] ++
817,381 UART: [kat] sha1
828,229 UART: [kat] SHA2-256
830,973 UART: [kat] SHA2-384
835,442 UART: [kat] SHA2-512-ACC
837,790 UART: [kat] ECC-384
3,280,971 UART: [kat] HMAC-384Kdf
3,293,597 UART: [kat] LMS
3,770,081 UART: [kat] --
3,775,731 UART: [cold-reset] ++
3,778,264 UART: [fht] FHT @ 0x50003400
3,789,137 UART: [idev] ++
3,789,771 UART: [idev] CDI.KEYID = 6
3,790,687 UART: [idev] SUBJECT.KEYID = 7
3,791,966 UART: [idev] UDS.KEYID = 0
3,794,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,528 UART: [idev] Erasing UDS.KEYID = 0
6,267,774 UART: [idev] Sha1 KeyId Algorithm
6,291,040 UART: [idev] --
6,296,123 UART: [ldev] ++
6,296,694 UART: [ldev] CDI.KEYID = 6
6,297,638 UART: [ldev] SUBJECT.KEYID = 5
6,298,858 UART: [ldev] AUTHORITY.KEYID = 7
6,300,095 UART: [ldev] FE.KEYID = 1
6,310,187 UART: [ldev] Erasing FE.KEYID = 1
8,789,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,230 UART: [ldev] --
10,585,823 UART: [fwproc] Wait for Commands...
10,588,579 UART: [fwproc] Recv command 0x46574c44
10,590,625 UART: [fwproc] Recv'd Img size: 118548 bytes
12,659,841 UART: ROM Fatal Error: 0x000B003C
12,663,082 >>> mbox cmd response: failed
12,663,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,663,857 >>> mbox cmd response: failed
12,664,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,664,454 >>> mbox cmd response: failed
Initializing fuses
2,058,962 writing to cptra_bootfsm_go
2,248,317 UART:
2,248,684 UART: Running Caliptra ROM ...
2,249,739 UART:
7,789,898 UART: [state] CFI Enabled
7,802,674 UART: [state] LifecycleState = Unprovisioned
7,804,593 UART: [state] DebugLocked = No
7,806,388 UART: [state] WD Timer not started. Device not locked for debugging
7,810,792 UART: [kat] SHA2-256
7,990,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,001,231 UART: [kat] ++
8,001,789 UART: [kat] sha1
8,011,886 UART: [kat] SHA2-256
8,014,587 UART: [kat] SHA2-384
8,019,017 UART: [kat] SHA2-512-ACC
8,021,379 UART: [kat] ECC-384
10,465,262 UART: [kat] HMAC-384Kdf
10,478,529 UART: [kat] LMS
10,955,032 UART: [kat] --
10,960,565 UART: [cold-reset] ++
10,962,825 UART: [fht] FHT @ 0x50003400
10,974,082 UART: [idev] ++
10,974,654 UART: [idev] CDI.KEYID = 6
10,975,651 UART: [idev] SUBJECT.KEYID = 7
10,976,818 UART: [idev] UDS.KEYID = 0
10,979,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,128,389 UART: [idev] Erasing UDS.KEYID = 0
13,452,587 UART: [idev] Sha1 KeyId Algorithm
13,475,876 UART: [idev] --
13,482,354 UART: [ldev] ++
13,482,933 UART: [ldev] CDI.KEYID = 6
13,483,844 UART: [ldev] SUBJECT.KEYID = 5
13,485,062 UART: [ldev] AUTHORITY.KEYID = 7
13,486,303 UART: [ldev] FE.KEYID = 1
13,496,523 UART: [ldev] Erasing FE.KEYID = 1
15,977,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,695,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,711,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,727,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,743,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,764,678 UART: [ldev] --
17,769,307 UART: [fwproc] Wait for Commands...
17,772,378 UART: [fwproc] Recv command 0x46574c44
17,774,378 UART: [fwproc] Recv'd Img size: 118548 bytes
21,257,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,336,782 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,409,853 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,738,046 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,783,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,543,031 >>> mbox cmd response: failed
12,543,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,544,002 >>> mbox cmd response: failed
12,544,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,544,575 >>> mbox cmd response: failed
Initializing fuses
2,059,754 writing to cptra_bootfsm_go
11,091,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,762,794 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,202 UART:
192,578 UART: Running Caliptra ROM ...
193,728 UART:
193,880 UART: [state] CFI Enabled
264,009 UART: [state] LifecycleState = Unprovisioned
266,397 UART: [state] DebugLocked = No
268,173 UART: [state] WD Timer not started. Device not locked for debugging
273,238 UART: [kat] SHA2-256
463,142 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,919 UART: [kat] ++
474,372 UART: [kat] sha1
485,200 UART: [kat] SHA2-256
488,219 UART: [kat] SHA2-384
493,848 UART: [kat] SHA2-512-ACC
496,420 UART: [kat] ECC-384
2,945,982 UART: [kat] HMAC-384Kdf
2,970,215 UART: [kat] LMS
3,501,958 UART: [kat] --
3,507,319 UART: [cold-reset] ++
3,509,532 UART: [fht] FHT @ 0x50003400
3,521,759 UART: [idev] ++
3,522,445 UART: [idev] CDI.KEYID = 6
3,523,468 UART: [idev] SUBJECT.KEYID = 7
3,524,578 UART: [idev] UDS.KEYID = 0
3,527,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,621 UART: [idev] Erasing UDS.KEYID = 0
6,024,523 UART: [idev] Sha1 KeyId Algorithm
6,047,380 UART: [idev] --
6,052,922 UART: [ldev] ++
6,053,640 UART: [ldev] CDI.KEYID = 6
6,054,538 UART: [ldev] SUBJECT.KEYID = 5
6,055,710 UART: [ldev] AUTHORITY.KEYID = 7
6,056,952 UART: [ldev] FE.KEYID = 1
6,097,495 UART: [ldev] Erasing FE.KEYID = 1
8,607,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,005 UART: [ldev] --
10,410,698 UART: [fwproc] Wait for Commands...
10,413,179 UART: [fwproc] Recv command 0x46574c44
10,415,500 UART: [fwproc] Recv'd Img size: 118548 bytes
12,503,172 UART: ROM Fatal Error: 0x000B003C
12,506,946 >>> mbox cmd response: failed
12,507,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,507,758 >>> mbox cmd response: failed
12,508,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,323 >>> mbox cmd response: failed
Initializing fuses
2,069,270 writing to cptra_bootfsm_go
2,258,607 UART:
2,258,950 UART: Running Caliptra ROM ...
2,260,002 UART:
2,260,164 UART: [state] CFI Enabled
2,322,934 UART: [state] LifecycleState = Unprovisioned
2,325,315 UART: [state] DebugLocked = No
2,327,655 UART: [state] WD Timer not started. Device not locked for debugging
2,331,590 UART: [kat] SHA2-256
2,521,474 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,220 UART: [kat] ++
2,532,683 UART: [kat] sha1
2,544,606 UART: [kat] SHA2-256
2,547,634 UART: [kat] SHA2-384
2,553,415 UART: [kat] SHA2-512-ACC
2,556,005 UART: [kat] ECC-384
5,002,807 UART: [kat] HMAC-384Kdf
5,028,234 UART: [kat] LMS
5,560,009 UART: [kat] --
5,563,417 UART: [cold-reset] ++
5,564,390 UART: [fht] FHT @ 0x50003400
5,577,003 UART: [idev] ++
5,577,689 UART: [idev] CDI.KEYID = 6
5,578,658 UART: [idev] SUBJECT.KEYID = 7
5,579,823 UART: [idev] UDS.KEYID = 0
5,582,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,731,262 UART: [idev] Erasing UDS.KEYID = 0
8,085,689 UART: [idev] Sha1 KeyId Algorithm
8,106,445 UART: [idev] --
8,110,874 UART: [ldev] ++
8,111,618 UART: [ldev] CDI.KEYID = 6
8,112,685 UART: [ldev] SUBJECT.KEYID = 5
8,113,796 UART: [ldev] AUTHORITY.KEYID = 7
8,114,976 UART: [ldev] FE.KEYID = 1
8,156,959 UART: [ldev] Erasing FE.KEYID = 1
10,663,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,414,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,466,518 UART: [ldev] --
12,472,454 UART: [fwproc] Wait for Commands...
12,475,052 UART: [fwproc] Recv command 0x46574c44
12,477,380 UART: [fwproc] Recv'd Img size: 118548 bytes
15,973,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,053,201 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,176,833 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,737,423 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,440,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,305,843 >>> mbox cmd response: failed
12,306,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,306,804 >>> mbox cmd response: failed
12,307,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,307,387 >>> mbox cmd response: failed
Initializing fuses
2,068,285 writing to cptra_bootfsm_go
5,486,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,877,390 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,569 UART:
192,937 UART: Running Caliptra ROM ...
194,075 UART:
603,760 UART: [state] CFI Enabled
614,770 UART: [state] LifecycleState = Unprovisioned
617,163 UART: [state] DebugLocked = No
619,786 UART: [state] WD Timer not started. Device not locked for debugging
625,027 UART: [kat] SHA2-256
814,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,665 UART: [kat] ++
826,198 UART: [kat] sha1
837,949 UART: [kat] SHA2-256
840,964 UART: [kat] SHA2-384
847,062 UART: [kat] SHA2-512-ACC
849,643 UART: [kat] ECC-384
3,295,050 UART: [kat] HMAC-384Kdf
3,307,261 UART: [kat] LMS
3,839,047 UART: [kat] --
3,843,761 UART: [cold-reset] ++
3,846,354 UART: [fht] FHT @ 0x50003400
3,857,947 UART: [idev] ++
3,858,667 UART: [idev] CDI.KEYID = 6
3,859,591 UART: [idev] SUBJECT.KEYID = 7
3,860,813 UART: [idev] UDS.KEYID = 0
3,863,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,492 UART: [idev] Erasing UDS.KEYID = 0
6,338,212 UART: [idev] Sha1 KeyId Algorithm
6,361,893 UART: [idev] --
6,367,083 UART: [ldev] ++
6,367,772 UART: [ldev] CDI.KEYID = 6
6,368,689 UART: [ldev] SUBJECT.KEYID = 5
6,369,854 UART: [ldev] AUTHORITY.KEYID = 7
6,371,110 UART: [ldev] FE.KEYID = 1
6,382,407 UART: [ldev] Erasing FE.KEYID = 1
8,860,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,166 UART: [ldev] --
10,650,702 UART: [fwproc] Wait for Commands...
10,653,787 UART: [fwproc] Recv command 0x46574c44
10,656,096 UART: [fwproc] Recv'd Img size: 118548 bytes
12,742,984 UART: ROM Fatal Error: 0x000B003C
12,746,600 >>> mbox cmd response: failed
12,747,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,747,369 >>> mbox cmd response: failed
12,747,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,747,963 >>> mbox cmd response: failed
Initializing fuses
2,074,329 writing to cptra_bootfsm_go
2,263,665 UART:
2,264,009 UART: Running Caliptra ROM ...
2,265,153 UART:
7,699,122 UART: [state] CFI Enabled
7,712,537 UART: [state] LifecycleState = Unprovisioned
7,714,900 UART: [state] DebugLocked = No
7,717,321 UART: [state] WD Timer not started. Device not locked for debugging
7,721,255 UART: [kat] SHA2-256
7,911,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,921,909 UART: [kat] ++
7,922,515 UART: [kat] sha1
7,935,436 UART: [kat] SHA2-256
7,938,463 UART: [kat] SHA2-384
7,943,712 UART: [kat] SHA2-512-ACC
7,946,293 UART: [kat] ECC-384
10,388,964 UART: [kat] HMAC-384Kdf
10,403,783 UART: [kat] LMS
10,935,617 UART: [kat] --
10,939,830 UART: [cold-reset] ++
10,941,065 UART: [fht] FHT @ 0x50003400
10,951,469 UART: [idev] ++
10,952,239 UART: [idev] CDI.KEYID = 6
10,953,132 UART: [idev] SUBJECT.KEYID = 7
10,954,352 UART: [idev] UDS.KEYID = 0
10,956,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,105,687 UART: [idev] Erasing UDS.KEYID = 0
13,431,305 UART: [idev] Sha1 KeyId Algorithm
13,453,979 UART: [idev] --
13,458,844 UART: [ldev] ++
13,459,525 UART: [ldev] CDI.KEYID = 6
13,460,408 UART: [ldev] SUBJECT.KEYID = 5
13,461,619 UART: [ldev] AUTHORITY.KEYID = 7
13,462,796 UART: [ldev] FE.KEYID = 1
13,472,986 UART: [ldev] Erasing FE.KEYID = 1
15,954,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,671,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,686,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,702,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,717,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,737,000 UART: [ldev] --
17,742,006 UART: [fwproc] Wait for Commands...
17,744,983 UART: [fwproc] Recv command 0x46574c44
17,747,239 UART: [fwproc] Recv'd Img size: 118548 bytes
21,241,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,320,545 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,444,172 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,005,259 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
3,762,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,531,873 >>> mbox cmd response: failed
12,532,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,532,835 >>> mbox cmd response: failed
12,533,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,533,411 >>> mbox cmd response: failed
Initializing fuses
2,070,346 writing to cptra_bootfsm_go
11,099,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,385,640 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,971 UART: [kat] SHA2-256
881,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,017 UART: [kat] ++
886,169 UART: [kat] sha1
890,567 UART: [kat] SHA2-256
892,505 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
902,720 UART: [kat] HMAC-384Kdf
907,260 UART: [kat] LMS
1,475,456 UART: [kat] --
1,476,429 UART: [cold-reset] ++
1,476,885 UART: [fht] Storing FHT @ 0x50003400
1,479,804 UART: [idev] ++
1,479,972 UART: [idev] CDI.KEYID = 6
1,480,332 UART: [idev] SUBJECT.KEYID = 7
1,480,756 UART: [idev] UDS.KEYID = 0
1,481,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,566 UART: [idev] Erasing UDS.KEYID = 0
1,505,074 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,680 UART: [idev] --
1,514,755 UART: [ldev] ++
1,514,923 UART: [ldev] CDI.KEYID = 6
1,515,286 UART: [ldev] SUBJECT.KEYID = 5
1,515,712 UART: [ldev] AUTHORITY.KEYID = 7
1,516,175 UART: [ldev] FE.KEYID = 1
1,521,181 UART: [ldev] Erasing FE.KEYID = 1
1,546,970 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,868 UART: [ldev] --
1,586,267 UART: [fwproc] Waiting for Commands...
1,587,080 UART: [fwproc] Received command 0x46574c44
1,587,871 UART: [fwproc] Received Image of size 118548 bytes
1,634,431 UART: ROM Fatal Error: 0x000B003C
1,635,590 >>> mbox cmd response: failed
1,635,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,596 >>> mbox cmd response: failed
1,635,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,235 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,831 UART: [kat] SHA2-256
881,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,877 UART: [kat] ++
886,029 UART: [kat] sha1
890,297 UART: [kat] SHA2-256
892,235 UART: [kat] SHA2-384
895,056 UART: [kat] SHA2-512-ACC
896,957 UART: [kat] ECC-384
902,578 UART: [kat] HMAC-384Kdf
907,074 UART: [kat] LMS
1,475,270 UART: [kat] --
1,476,235 UART: [cold-reset] ++
1,476,565 UART: [fht] Storing FHT @ 0x50003400
1,479,312 UART: [idev] ++
1,479,480 UART: [idev] CDI.KEYID = 6
1,479,840 UART: [idev] SUBJECT.KEYID = 7
1,480,264 UART: [idev] UDS.KEYID = 0
1,480,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,472 UART: [idev] Erasing UDS.KEYID = 0
1,505,282 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,994 UART: [idev] --
1,515,109 UART: [ldev] ++
1,515,277 UART: [ldev] CDI.KEYID = 6
1,515,640 UART: [ldev] SUBJECT.KEYID = 5
1,516,066 UART: [ldev] AUTHORITY.KEYID = 7
1,516,529 UART: [ldev] FE.KEYID = 1
1,521,827 UART: [ldev] Erasing FE.KEYID = 1
1,547,330 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,220 UART: [ldev] --
1,586,693 UART: [fwproc] Waiting for Commands...
1,587,460 UART: [fwproc] Received command 0x46574c44
1,588,251 UART: [fwproc] Received Image of size 118548 bytes
2,932,468 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,206 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,424 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,797 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,326 >>> mbox cmd response: failed
1,490,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,332 >>> mbox cmd response: failed
1,490,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,338 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,371 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,310 UART: [kat] SHA2-256
882,241 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,356 UART: [kat] ++
886,508 UART: [kat] sha1
890,740 UART: [kat] SHA2-256
892,678 UART: [kat] SHA2-384
895,307 UART: [kat] SHA2-512-ACC
897,208 UART: [kat] ECC-384
902,769 UART: [kat] HMAC-384Kdf
907,341 UART: [kat] LMS
1,475,537 UART: [kat] --
1,476,350 UART: [cold-reset] ++
1,476,812 UART: [fht] Storing FHT @ 0x50003400
1,479,529 UART: [idev] ++
1,479,697 UART: [idev] CDI.KEYID = 6
1,480,057 UART: [idev] SUBJECT.KEYID = 7
1,480,481 UART: [idev] UDS.KEYID = 0
1,480,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,197 UART: [idev] Erasing UDS.KEYID = 0
1,504,893 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,691 UART: [idev] --
1,514,732 UART: [ldev] ++
1,514,900 UART: [ldev] CDI.KEYID = 6
1,515,263 UART: [ldev] SUBJECT.KEYID = 5
1,515,689 UART: [ldev] AUTHORITY.KEYID = 7
1,516,152 UART: [ldev] FE.KEYID = 1
1,521,492 UART: [ldev] Erasing FE.KEYID = 1
1,546,945 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,663 UART: [ldev] --
1,586,060 UART: [fwproc] Waiting for Commands...
1,586,839 UART: [fwproc] Received command 0x46574c44
1,587,630 UART: [fwproc] Received Image of size 118548 bytes
1,635,440 UART: ROM Fatal Error: 0x000B003C
1,636,599 >>> mbox cmd response: failed
1,636,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,605 >>> mbox cmd response: failed
1,636,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,611 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,286 UART: [kat] SHA2-256
882,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,332 UART: [kat] ++
886,484 UART: [kat] sha1
890,742 UART: [kat] SHA2-256
892,680 UART: [kat] SHA2-384
895,499 UART: [kat] SHA2-512-ACC
897,400 UART: [kat] ECC-384
902,961 UART: [kat] HMAC-384Kdf
907,453 UART: [kat] LMS
1,475,649 UART: [kat] --
1,476,708 UART: [cold-reset] ++
1,477,282 UART: [fht] Storing FHT @ 0x50003400
1,480,095 UART: [idev] ++
1,480,263 UART: [idev] CDI.KEYID = 6
1,480,623 UART: [idev] SUBJECT.KEYID = 7
1,481,047 UART: [idev] UDS.KEYID = 0
1,481,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,005 UART: [idev] Erasing UDS.KEYID = 0
1,505,573 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,111 UART: [idev] --
1,514,958 UART: [ldev] ++
1,515,126 UART: [ldev] CDI.KEYID = 6
1,515,489 UART: [ldev] SUBJECT.KEYID = 5
1,515,915 UART: [ldev] AUTHORITY.KEYID = 7
1,516,378 UART: [ldev] FE.KEYID = 1
1,521,540 UART: [ldev] Erasing FE.KEYID = 1
1,546,777 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,435 UART: [ldev] --
1,585,702 UART: [fwproc] Waiting for Commands...
1,586,457 UART: [fwproc] Received command 0x46574c44
1,587,248 UART: [fwproc] Received Image of size 118548 bytes
2,932,433 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,315 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,533 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,850 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,416 >>> mbox cmd response: failed
1,488,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,422 >>> mbox cmd response: failed
1,488,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,428 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,674 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,188 UART: [kat] ++
895,340 UART: [kat] sha1
899,694 UART: [kat] SHA2-256
901,634 UART: [kat] SHA2-384
904,377 UART: [kat] SHA2-512-ACC
906,278 UART: [kat] ECC-384
915,523 UART: [kat] HMAC-384Kdf
920,297 UART: [kat] LMS
1,168,609 UART: [kat] --
1,169,826 UART: [cold-reset] ++
1,170,380 UART: [fht] FHT @ 0x50003400
1,172,894 UART: [idev] ++
1,173,062 UART: [idev] CDI.KEYID = 6
1,173,423 UART: [idev] SUBJECT.KEYID = 7
1,173,848 UART: [idev] UDS.KEYID = 0
1,174,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,555 UART: [idev] Erasing UDS.KEYID = 0
1,198,951 UART: [idev] Sha1 KeyId Algorithm
1,207,785 UART: [idev] --
1,208,672 UART: [ldev] ++
1,208,840 UART: [ldev] CDI.KEYID = 6
1,209,204 UART: [ldev] SUBJECT.KEYID = 5
1,209,631 UART: [ldev] AUTHORITY.KEYID = 7
1,210,094 UART: [ldev] FE.KEYID = 1
1,215,570 UART: [ldev] Erasing FE.KEYID = 1
1,241,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,926 UART: [ldev] --
1,281,353 UART: [fwproc] Wait for Commands...
1,281,946 UART: [fwproc] Recv command 0x46574c44
1,282,679 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,703 UART: ROM Fatal Error: 0x000B003C
1,330,862 >>> mbox cmd response: failed
1,330,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,868 >>> mbox cmd response: failed
1,330,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,354 UART: [kat] ++
895,506 UART: [kat] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,365 UART: [kat] SHA2-512-ACC
906,266 UART: [kat] ECC-384
915,871 UART: [kat] HMAC-384Kdf
920,651 UART: [kat] LMS
1,168,963 UART: [kat] --
1,169,820 UART: [cold-reset] ++
1,170,146 UART: [fht] FHT @ 0x50003400
1,172,890 UART: [idev] ++
1,173,058 UART: [idev] CDI.KEYID = 6
1,173,419 UART: [idev] SUBJECT.KEYID = 7
1,173,844 UART: [idev] UDS.KEYID = 0
1,174,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,765 UART: [idev] Erasing UDS.KEYID = 0
1,199,051 UART: [idev] Sha1 KeyId Algorithm
1,207,873 UART: [idev] --
1,208,844 UART: [ldev] ++
1,209,012 UART: [ldev] CDI.KEYID = 6
1,209,376 UART: [ldev] SUBJECT.KEYID = 5
1,209,803 UART: [ldev] AUTHORITY.KEYID = 7
1,210,266 UART: [ldev] FE.KEYID = 1
1,215,480 UART: [ldev] Erasing FE.KEYID = 1
1,241,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,630 UART: [ldev] --
1,280,909 UART: [fwproc] Wait for Commands...
1,281,596 UART: [fwproc] Recv command 0x46574c44
1,282,329 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,592 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,767 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,974 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,949 >>> mbox cmd response: failed
1,186,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,955 >>> mbox cmd response: failed
1,186,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,413 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,797 UART: [kat] ++
895,949 UART: [kat] sha1
900,073 UART: [kat] SHA2-256
902,013 UART: [kat] SHA2-384
904,628 UART: [kat] SHA2-512-ACC
906,529 UART: [kat] ECC-384
916,600 UART: [kat] HMAC-384Kdf
921,216 UART: [kat] LMS
1,169,528 UART: [kat] --
1,170,581 UART: [cold-reset] ++
1,170,985 UART: [fht] FHT @ 0x50003400
1,173,555 UART: [idev] ++
1,173,723 UART: [idev] CDI.KEYID = 6
1,174,084 UART: [idev] SUBJECT.KEYID = 7
1,174,509 UART: [idev] UDS.KEYID = 0
1,174,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,792 UART: [idev] Erasing UDS.KEYID = 0
1,199,908 UART: [idev] Sha1 KeyId Algorithm
1,208,812 UART: [idev] --
1,209,941 UART: [ldev] ++
1,210,109 UART: [ldev] CDI.KEYID = 6
1,210,473 UART: [ldev] SUBJECT.KEYID = 5
1,210,900 UART: [ldev] AUTHORITY.KEYID = 7
1,211,363 UART: [ldev] FE.KEYID = 1
1,216,687 UART: [ldev] Erasing FE.KEYID = 1
1,242,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,063 UART: [ldev] --
1,281,326 UART: [fwproc] Wait for Commands...
1,281,897 UART: [fwproc] Recv command 0x46574c44
1,282,630 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,866 UART: ROM Fatal Error: 0x000B003C
1,332,025 >>> mbox cmd response: failed
1,332,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,031 >>> mbox cmd response: failed
1,332,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,037 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,271 UART: [kat] SHA2-256
891,821 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,925 UART: [kat] ++
896,077 UART: [kat] sha1
900,477 UART: [kat] SHA2-256
902,417 UART: [kat] SHA2-384
905,110 UART: [kat] SHA2-512-ACC
907,011 UART: [kat] ECC-384
916,812 UART: [kat] HMAC-384Kdf
921,306 UART: [kat] LMS
1,169,618 UART: [kat] --
1,170,615 UART: [cold-reset] ++
1,170,979 UART: [fht] FHT @ 0x50003400
1,173,621 UART: [idev] ++
1,173,789 UART: [idev] CDI.KEYID = 6
1,174,150 UART: [idev] SUBJECT.KEYID = 7
1,174,575 UART: [idev] UDS.KEYID = 0
1,174,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,204 UART: [idev] Erasing UDS.KEYID = 0
1,199,602 UART: [idev] Sha1 KeyId Algorithm
1,208,526 UART: [idev] --
1,209,485 UART: [ldev] ++
1,209,653 UART: [ldev] CDI.KEYID = 6
1,210,017 UART: [ldev] SUBJECT.KEYID = 5
1,210,444 UART: [ldev] AUTHORITY.KEYID = 7
1,210,907 UART: [ldev] FE.KEYID = 1
1,215,913 UART: [ldev] Erasing FE.KEYID = 1
1,241,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,443 UART: [ldev] --
1,280,892 UART: [fwproc] Wait for Commands...
1,281,465 UART: [fwproc] Recv command 0x46574c44
1,282,198 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,295 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,470 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,861 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,830 >>> mbox cmd response: failed
1,186,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,836 >>> mbox cmd response: failed
1,186,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,556 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,799 UART: [state] WD Timer not started. Device not locked for debugging
88,066 UART: [kat] SHA2-256
893,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,841 UART: [kat] ++
897,993 UART: [kat] sha1
902,137 UART: [kat] SHA2-256
904,077 UART: [kat] SHA2-384
906,750 UART: [kat] SHA2-512-ACC
908,651 UART: [kat] ECC-384
918,414 UART: [kat] HMAC-384Kdf
923,120 UART: [kat] LMS
1,171,448 UART: [kat] --
1,172,449 UART: [cold-reset] ++
1,172,931 UART: [fht] FHT @ 0x50003400
1,175,542 UART: [idev] ++
1,175,710 UART: [idev] CDI.KEYID = 6
1,176,070 UART: [idev] SUBJECT.KEYID = 7
1,176,494 UART: [idev] UDS.KEYID = 0
1,176,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,472 UART: [idev] Erasing UDS.KEYID = 0
1,201,413 UART: [idev] Sha1 KeyId Algorithm
1,210,033 UART: [idev] --
1,211,177 UART: [ldev] ++
1,211,345 UART: [ldev] CDI.KEYID = 6
1,211,708 UART: [ldev] SUBJECT.KEYID = 5
1,212,134 UART: [ldev] AUTHORITY.KEYID = 7
1,212,597 UART: [ldev] FE.KEYID = 1
1,217,859 UART: [ldev] Erasing FE.KEYID = 1
1,244,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,257 UART: [ldev] --
1,283,624 UART: [fwproc] Wait for Commands...
1,284,442 UART: [fwproc] Recv command 0x46574c44
1,285,170 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,854 UART: ROM Fatal Error: 0x000B003C
1,333,013 >>> mbox cmd response: failed
1,333,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,019 >>> mbox cmd response: failed
1,333,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,025 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,964 UART: [kat] SHA2-256
893,614 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,739 UART: [kat] ++
897,891 UART: [kat] sha1
902,119 UART: [kat] SHA2-256
904,059 UART: [kat] SHA2-384
906,980 UART: [kat] SHA2-512-ACC
908,881 UART: [kat] ECC-384
918,426 UART: [kat] HMAC-384Kdf
923,090 UART: [kat] LMS
1,171,418 UART: [kat] --
1,172,351 UART: [cold-reset] ++
1,172,757 UART: [fht] FHT @ 0x50003400
1,175,372 UART: [idev] ++
1,175,540 UART: [idev] CDI.KEYID = 6
1,175,900 UART: [idev] SUBJECT.KEYID = 7
1,176,324 UART: [idev] UDS.KEYID = 0
1,176,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,860 UART: [idev] Erasing UDS.KEYID = 0
1,200,521 UART: [idev] Sha1 KeyId Algorithm
1,209,077 UART: [idev] --
1,210,209 UART: [ldev] ++
1,210,377 UART: [ldev] CDI.KEYID = 6
1,210,740 UART: [ldev] SUBJECT.KEYID = 5
1,211,166 UART: [ldev] AUTHORITY.KEYID = 7
1,211,629 UART: [ldev] FE.KEYID = 1
1,216,627 UART: [ldev] Erasing FE.KEYID = 1
1,243,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,611 UART: [ldev] --
1,281,900 UART: [fwproc] Wait for Commands...
1,282,596 UART: [fwproc] Recv command 0x46574c44
1,283,324 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,053 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,223 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,580 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,324 >>> mbox cmd response: failed
1,187,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,330 >>> mbox cmd response: failed
1,187,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,820 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,891 UART: [state] LifecycleState = Unprovisioned
86,546 UART: [state] DebugLocked = No
87,054 UART: [state] WD Timer not started. Device not locked for debugging
88,367 UART: [kat] SHA2-256
894,017 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,142 UART: [kat] ++
898,294 UART: [kat] sha1
902,656 UART: [kat] SHA2-256
904,596 UART: [kat] SHA2-384
907,219 UART: [kat] SHA2-512-ACC
909,120 UART: [kat] ECC-384
918,583 UART: [kat] HMAC-384Kdf
923,439 UART: [kat] LMS
1,171,767 UART: [kat] --
1,172,752 UART: [cold-reset] ++
1,173,258 UART: [fht] FHT @ 0x50003400
1,175,889 UART: [idev] ++
1,176,057 UART: [idev] CDI.KEYID = 6
1,176,417 UART: [idev] SUBJECT.KEYID = 7
1,176,841 UART: [idev] UDS.KEYID = 0
1,177,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,889 UART: [idev] Erasing UDS.KEYID = 0
1,202,188 UART: [idev] Sha1 KeyId Algorithm
1,210,696 UART: [idev] --
1,211,928 UART: [ldev] ++
1,212,096 UART: [ldev] CDI.KEYID = 6
1,212,459 UART: [ldev] SUBJECT.KEYID = 5
1,212,885 UART: [ldev] AUTHORITY.KEYID = 7
1,213,348 UART: [ldev] FE.KEYID = 1
1,218,556 UART: [ldev] Erasing FE.KEYID = 1
1,245,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,186 UART: [ldev] --
1,284,591 UART: [fwproc] Wait for Commands...
1,285,291 UART: [fwproc] Recv command 0x46574c44
1,286,019 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,033 UART: ROM Fatal Error: 0x000B003C
1,334,192 >>> mbox cmd response: failed
1,334,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,198 >>> mbox cmd response: failed
1,334,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
893,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,746 UART: [kat] ++
897,898 UART: [kat] sha1
902,094 UART: [kat] SHA2-256
904,034 UART: [kat] SHA2-384
906,799 UART: [kat] SHA2-512-ACC
908,700 UART: [kat] ECC-384
918,257 UART: [kat] HMAC-384Kdf
922,949 UART: [kat] LMS
1,171,277 UART: [kat] --
1,172,096 UART: [cold-reset] ++
1,172,478 UART: [fht] FHT @ 0x50003400
1,175,135 UART: [idev] ++
1,175,303 UART: [idev] CDI.KEYID = 6
1,175,663 UART: [idev] SUBJECT.KEYID = 7
1,176,087 UART: [idev] UDS.KEYID = 0
1,176,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,083 UART: [idev] Erasing UDS.KEYID = 0
1,201,314 UART: [idev] Sha1 KeyId Algorithm
1,209,976 UART: [idev] --
1,211,074 UART: [ldev] ++
1,211,242 UART: [ldev] CDI.KEYID = 6
1,211,605 UART: [ldev] SUBJECT.KEYID = 5
1,212,031 UART: [ldev] AUTHORITY.KEYID = 7
1,212,494 UART: [ldev] FE.KEYID = 1
1,217,940 UART: [ldev] Erasing FE.KEYID = 1
1,244,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,890 UART: [ldev] --
1,284,347 UART: [fwproc] Wait for Commands...
1,285,093 UART: [fwproc] Recv command 0x46574c44
1,285,821 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,146 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,316 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,623 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,681 >>> mbox cmd response: failed
1,187,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,687 >>> mbox cmd response: failed
1,187,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,370 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,111 UART:
192,464 UART: Running Caliptra ROM ...
193,662 UART:
193,822 UART: [state] CFI Enabled
263,634 UART: [state] LifecycleState = Manufacturing
265,620 UART: [state] DebugLocked = No
266,921 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,230 UART: [kat] SHA2-256
440,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,439 UART: [kat] ++
451,881 UART: [kat] sha1
464,378 UART: [kat] SHA2-256
467,050 UART: [kat] SHA2-384
473,750 UART: [kat] SHA2-512-ACC
476,107 UART: [kat] ECC-384
2,768,177 UART: [kat] HMAC-384Kdf
2,799,200 UART: [kat] LMS
3,989,508 UART: [kat] --
3,994,384 UART: [cold-reset] ++
3,996,663 UART: [fht] Storing FHT @ 0x50003400
4,008,743 UART: [idev] ++
4,009,313 UART: [idev] CDI.KEYID = 6
4,010,285 UART: [idev] SUBJECT.KEYID = 7
4,011,527 UART: [idev] UDS.KEYID = 0
4,014,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,729 UART: [idev] Erasing UDS.KEYID = 0
7,344,846 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,443 UART: [idev] --
7,370,064 UART: [ldev] ++
7,370,641 UART: [ldev] CDI.KEYID = 6
7,371,610 UART: [ldev] SUBJECT.KEYID = 5
7,372,828 UART: [ldev] AUTHORITY.KEYID = 7
7,374,061 UART: [ldev] FE.KEYID = 1
7,402,050 UART: [ldev] Erasing FE.KEYID = 1
10,732,263 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,682 UART: [ldev] --
13,094,636 UART: [fwproc] Waiting for Commands...
13,096,640 UART: [fwproc] Received command 0x46574c44
13,098,940 UART: [fwproc] Received Image of size 118548 bytes
17,229,923 UART: ROM Fatal Error: 0x000B002C
17,233,394 >>> mbox cmd response: failed
17,233,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,234,198 >>> mbox cmd response: failed
17,234,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,234,766 >>> mbox cmd response: failed
Initializing fuses
2,062,039 writing to cptra_bootfsm_go
2,251,328 UART:
2,251,695 UART: Running Caliptra ROM ...
2,252,741 UART:
2,252,895 UART: [state] CFI Enabled
2,310,778 UART: [state] LifecycleState = Manufacturing
2,312,716 UART: [state] DebugLocked = No
2,314,507 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,248 UART: [kat] SHA2-256
2,488,993 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,499,492 UART: [kat] ++
2,499,955 UART: [kat] sha1
2,511,006 UART: [kat] SHA2-256
2,513,706 UART: [kat] SHA2-384
2,519,154 UART: [kat] SHA2-512-ACC
2,521,519 UART: [kat] ECC-384
4,816,905 UART: [kat] HMAC-384Kdf
4,848,458 UART: [kat] LMS
6,038,765 UART: [kat] --
6,042,122 UART: [cold-reset] ++
6,043,952 UART: [fht] Storing FHT @ 0x50003400
6,055,601 UART: [idev] ++
6,056,176 UART: [idev] CDI.KEYID = 6
6,057,059 UART: [idev] SUBJECT.KEYID = 7
6,058,340 UART: [idev] UDS.KEYID = 0
6,060,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,209,832 UART: [idev] Erasing UDS.KEYID = 0
9,398,987 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,646 UART: [idev] --
9,424,321 UART: [ldev] ++
9,424,890 UART: [ldev] CDI.KEYID = 6
9,425,915 UART: [ldev] SUBJECT.KEYID = 5
9,427,113 UART: [ldev] AUTHORITY.KEYID = 7
9,428,295 UART: [ldev] FE.KEYID = 1
9,471,116 UART: [ldev] Erasing FE.KEYID = 1
12,804,156 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,119,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,134,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,149,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,163,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,183,407 UART: [ldev] --
15,188,244 UART: [fwproc] Waiting for Commands...
15,189,967 UART: [fwproc] Received command 0x46574c44
15,192,210 UART: [fwproc] Received Image of size 118548 bytes
19,329,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,405,133 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,478,281 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,807,381 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,785,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,208,711 >>> mbox cmd response: failed
17,209,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,209,828 >>> mbox cmd response: failed
17,210,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,210,618 >>> mbox cmd response: failed
Initializing fuses
2,054,895 writing to cptra_bootfsm_go
5,841,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,030,600 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,561 UART:
192,908 UART: Running Caliptra ROM ...
194,079 UART:
603,856 UART: [state] CFI Enabled
616,877 UART: [state] LifecycleState = Manufacturing
618,826 UART: [state] DebugLocked = No
620,821 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,082 UART: [kat] SHA2-256
795,819 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,355 UART: [kat] ++
806,838 UART: [kat] sha1
818,804 UART: [kat] SHA2-256
821,497 UART: [kat] SHA2-384
827,538 UART: [kat] SHA2-512-ACC
829,881 UART: [kat] ECC-384
3,112,172 UART: [kat] HMAC-384Kdf
3,123,769 UART: [kat] LMS
4,313,860 UART: [kat] --
4,317,612 UART: [cold-reset] ++
4,320,042 UART: [fht] Storing FHT @ 0x50003400
4,331,318 UART: [idev] ++
4,331,896 UART: [idev] CDI.KEYID = 6
4,332,802 UART: [idev] SUBJECT.KEYID = 7
4,334,080 UART: [idev] UDS.KEYID = 0
4,336,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,504 UART: [idev] Erasing UDS.KEYID = 0
7,623,342 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,066 UART: [idev] --
7,648,830 UART: [ldev] ++
7,649,404 UART: [ldev] CDI.KEYID = 6
7,650,359 UART: [ldev] SUBJECT.KEYID = 5
7,651,576 UART: [ldev] AUTHORITY.KEYID = 7
7,652,874 UART: [ldev] FE.KEYID = 1
7,665,013 UART: [ldev] Erasing FE.KEYID = 1
10,957,646 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,637 UART: [ldev] --
13,319,364 UART: [fwproc] Waiting for Commands...
13,322,446 UART: [fwproc] Received command 0x46574c44
13,324,640 UART: [fwproc] Received Image of size 118548 bytes
17,462,371 UART: ROM Fatal Error: 0x000B002C
17,465,843 >>> mbox cmd response: failed
17,466,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,466,579 >>> mbox cmd response: failed
17,466,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,467,196 >>> mbox cmd response: failed
Initializing fuses
2,059,557 writing to cptra_bootfsm_go
2,248,866 UART:
2,249,226 UART: Running Caliptra ROM ...
2,250,371 UART:
3,002,788 UART: [state] CFI Enabled
3,017,097 UART: [state] LifecycleState = Manufacturing
3,019,014 UART: [state] DebugLocked = No
3,020,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,024,566 UART: [kat] SHA2-256
3,194,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,204,888 UART: [kat] ++
3,205,353 UART: [kat] sha1
3,215,921 UART: [kat] SHA2-256
3,218,623 UART: [kat] SHA2-384
3,224,776 UART: [kat] SHA2-512-ACC
3,227,129 UART: [kat] ECC-384
5,510,276 UART: [kat] HMAC-384Kdf
5,521,947 UART: [kat] LMS
6,712,057 UART: [kat] --
6,717,845 UART: [cold-reset] ++
6,719,782 UART: [fht] Storing FHT @ 0x50003400
6,730,727 UART: [idev] ++
6,731,299 UART: [idev] CDI.KEYID = 6
6,732,324 UART: [idev] SUBJECT.KEYID = 7
6,733,489 UART: [idev] UDS.KEYID = 0
6,736,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,884,999 UART: [idev] Erasing UDS.KEYID = 0
10,023,283 UART: [idev] Using Sha1 for KeyId Algorithm
10,045,883 UART: [idev] --
10,050,242 UART: [ldev] ++
10,050,828 UART: [ldev] CDI.KEYID = 6
10,051,911 UART: [ldev] SUBJECT.KEYID = 5
10,053,134 UART: [ldev] AUTHORITY.KEYID = 7
10,054,343 UART: [ldev] FE.KEYID = 1
10,066,622 UART: [ldev] Erasing FE.KEYID = 1
13,355,298 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,645,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,660,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,675,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,689,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,707,475 UART: [ldev] --
15,711,769 UART: [fwproc] Waiting for Commands...
15,713,767 UART: [fwproc] Received command 0x46574c44
15,715,958 UART: [fwproc] Received Image of size 118548 bytes
19,844,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,920,549 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,993,723 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,322,953 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
4,128,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,440,201 >>> mbox cmd response: failed
17,440,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,441,215 >>> mbox cmd response: failed
17,441,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,441,854 >>> mbox cmd response: failed
Initializing fuses
2,053,912 writing to cptra_bootfsm_go
6,559,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,632,993 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,133 UART:
192,510 UART: Running Caliptra ROM ...
193,699 UART:
193,864 UART: [state] CFI Enabled
263,903 UART: [state] LifecycleState = Manufacturing
265,865 UART: [state] DebugLocked = No
267,853 UART: [state] WD Timer not started. Device not locked for debugging
271,866 UART: [kat] SHA2-256
451,499 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,308 UART: [kat] ++
462,809 UART: [kat] sha1
472,143 UART: [kat] SHA2-256
474,842 UART: [kat] SHA2-384
480,446 UART: [kat] SHA2-512-ACC
482,851 UART: [kat] ECC-384
2,949,523 UART: [kat] HMAC-384Kdf
2,971,733 UART: [kat] LMS
3,448,249 UART: [kat] --
3,452,257 UART: [cold-reset] ++
3,453,384 UART: [fht] FHT @ 0x50003400
3,464,049 UART: [idev] ++
3,464,669 UART: [idev] CDI.KEYID = 6
3,465,589 UART: [idev] SUBJECT.KEYID = 7
3,466,867 UART: [idev] UDS.KEYID = 0
3,469,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,212 UART: [idev] Erasing UDS.KEYID = 0
5,991,553 UART: [idev] Sha1 KeyId Algorithm
6,015,616 UART: [idev] --
6,021,433 UART: [ldev] ++
6,022,021 UART: [ldev] CDI.KEYID = 6
6,022,920 UART: [ldev] SUBJECT.KEYID = 5
6,024,081 UART: [ldev] AUTHORITY.KEYID = 7
6,025,375 UART: [ldev] FE.KEYID = 1
6,061,235 UART: [ldev] Erasing FE.KEYID = 1
8,571,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,320,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,336,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,352,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,374,967 UART: [ldev] --
10,380,396 UART: [fwproc] Wait for Commands...
10,382,606 UART: [fwproc] Recv command 0x46574c44
10,384,661 UART: [fwproc] Recv'd Img size: 118548 bytes
13,894,746 UART: ROM Fatal Error: 0x000B002C
13,898,036 >>> mbox cmd response: failed
13,898,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,898,754 >>> mbox cmd response: failed
13,899,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,899,331 >>> mbox cmd response: failed
Initializing fuses
2,058,459 writing to cptra_bootfsm_go
2,247,781 UART:
2,248,127 UART: Running Caliptra ROM ...
2,249,212 UART:
2,249,392 UART: [state] CFI Enabled
2,304,728 UART: [state] LifecycleState = Manufacturing
2,306,693 UART: [state] DebugLocked = No
2,308,113 UART: [state] WD Timer not started. Device not locked for debugging
2,311,109 UART: [kat] SHA2-256
2,490,766 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,501,541 UART: [kat] ++
2,502,007 UART: [kat] sha1
2,513,549 UART: [kat] SHA2-256
2,516,238 UART: [kat] SHA2-384
2,522,435 UART: [kat] SHA2-512-ACC
2,524,800 UART: [kat] ECC-384
4,990,604 UART: [kat] HMAC-384Kdf
5,011,636 UART: [kat] LMS
5,488,143 UART: [kat] --
5,493,708 UART: [cold-reset] ++
5,495,216 UART: [fht] FHT @ 0x50003400
5,506,581 UART: [idev] ++
5,507,178 UART: [idev] CDI.KEYID = 6
5,508,097 UART: [idev] SUBJECT.KEYID = 7
5,509,318 UART: [idev] UDS.KEYID = 0
5,512,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,661,334 UART: [idev] Erasing UDS.KEYID = 0
8,029,320 UART: [idev] Sha1 KeyId Algorithm
8,053,789 UART: [idev] --
8,058,249 UART: [ldev] ++
8,058,834 UART: [ldev] CDI.KEYID = 6
8,059,748 UART: [ldev] SUBJECT.KEYID = 5
8,060,925 UART: [ldev] AUTHORITY.KEYID = 7
8,062,168 UART: [ldev] FE.KEYID = 1
8,091,299 UART: [ldev] Erasing FE.KEYID = 1
10,600,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,335,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,351,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,367,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,382,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,405,427 UART: [ldev] --
12,411,346 UART: [fwproc] Wait for Commands...
12,414,420 UART: [fwproc] Recv command 0x46574c44
12,416,411 UART: [fwproc] Recv'd Img size: 118548 bytes
15,936,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,021,921 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,094,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,422,722 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,464,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,789,937 >>> mbox cmd response: failed
13,790,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,790,906 >>> mbox cmd response: failed
13,791,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,791,484 >>> mbox cmd response: failed
Initializing fuses
2,055,496 writing to cptra_bootfsm_go
5,503,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,315,146 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,531 writing to cptra_bootfsm_go
192,682 UART:
193,125 UART: Running Caliptra ROM ...
194,261 UART:
603,787 UART: [state] CFI Enabled
617,795 UART: [state] LifecycleState = Manufacturing
619,680 UART: [state] DebugLocked = No
622,091 UART: [state] WD Timer not started. Device not locked for debugging
625,189 UART: [kat] SHA2-256
804,872 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,632 UART: [kat] ++
816,122 UART: [kat] sha1
827,407 UART: [kat] SHA2-256
830,102 UART: [kat] SHA2-384
834,952 UART: [kat] SHA2-512-ACC
837,346 UART: [kat] ECC-384
3,279,228 UART: [kat] HMAC-384Kdf
3,292,175 UART: [kat] LMS
3,768,648 UART: [kat] --
3,773,288 UART: [cold-reset] ++
3,775,496 UART: [fht] FHT @ 0x50003400
3,785,667 UART: [idev] ++
3,786,300 UART: [idev] CDI.KEYID = 6
3,787,185 UART: [idev] SUBJECT.KEYID = 7
3,788,456 UART: [idev] UDS.KEYID = 0
3,791,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,444 UART: [idev] Erasing UDS.KEYID = 0
6,266,663 UART: [idev] Sha1 KeyId Algorithm
6,291,817 UART: [idev] --
6,296,521 UART: [ldev] ++
6,297,099 UART: [ldev] CDI.KEYID = 6
6,297,989 UART: [ldev] SUBJECT.KEYID = 5
6,299,247 UART: [ldev] AUTHORITY.KEYID = 7
6,300,520 UART: [ldev] FE.KEYID = 1
6,312,071 UART: [ldev] Erasing FE.KEYID = 1
8,794,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,172 UART: [ldev] --
10,588,145 UART: [fwproc] Wait for Commands...
10,591,379 UART: [fwproc] Recv command 0x46574c44
10,593,427 UART: [fwproc] Recv'd Img size: 118548 bytes
14,104,320 UART: ROM Fatal Error: 0x000B002C
14,107,553 >>> mbox cmd response: failed
14,107,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,108,296 >>> mbox cmd response: failed
14,108,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,108,862 >>> mbox cmd response: failed
Initializing fuses
2,055,432 writing to cptra_bootfsm_go
2,244,752 UART:
2,245,083 UART: Running Caliptra ROM ...
2,246,229 UART:
6,347,399 UART: [state] CFI Enabled
6,362,582 UART: [state] LifecycleState = Manufacturing
6,364,522 UART: [state] DebugLocked = No
6,367,002 UART: [state] WD Timer not started. Device not locked for debugging
6,370,802 UART: [kat] SHA2-256
6,550,484 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,561,280 UART: [kat] ++
6,561,830 UART: [kat] sha1
6,573,160 UART: [kat] SHA2-256
6,575,861 UART: [kat] SHA2-384
6,581,528 UART: [kat] SHA2-512-ACC
6,583,949 UART: [kat] ECC-384
9,026,427 UART: [kat] HMAC-384Kdf
9,038,983 UART: [kat] LMS
9,515,495 UART: [kat] --
9,518,298 UART: [cold-reset] ++
9,519,584 UART: [fht] FHT @ 0x50003400
9,530,561 UART: [idev] ++
9,531,155 UART: [idev] CDI.KEYID = 6
9,532,181 UART: [idev] SUBJECT.KEYID = 7
9,533,345 UART: [idev] UDS.KEYID = 0
9,536,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,684,979 UART: [idev] Erasing UDS.KEYID = 0
12,008,989 UART: [idev] Sha1 KeyId Algorithm
12,032,937 UART: [idev] --
12,037,535 UART: [ldev] ++
12,038,166 UART: [ldev] CDI.KEYID = 6
12,039,075 UART: [ldev] SUBJECT.KEYID = 5
12,040,240 UART: [ldev] AUTHORITY.KEYID = 7
12,041,532 UART: [ldev] FE.KEYID = 1
12,053,535 UART: [ldev] Erasing FE.KEYID = 1
14,532,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,252,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,268,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,284,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,299,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,321,685 UART: [ldev] --
16,327,820 UART: [fwproc] Wait for Commands...
16,329,875 UART: [fwproc] Recv command 0x46574c44
16,331,864 UART: [fwproc] Recv'd Img size: 118548 bytes
19,844,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,928,641 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,001,652 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,329,383 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,782,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,016,096 >>> mbox cmd response: failed
14,016,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,017,062 >>> mbox cmd response: failed
14,017,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,017,638 >>> mbox cmd response: failed
Initializing fuses
2,063,021 writing to cptra_bootfsm_go
9,631,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,333,975 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,074 UART:
192,443 UART: Running Caliptra ROM ...
193,791 UART:
193,984 UART: [state] CFI Enabled
261,604 UART: [state] LifecycleState = Manufacturing
263,936 UART: [state] DebugLocked = No
265,986 UART: [state] WD Timer not started. Device not locked for debugging
271,395 UART: [kat] SHA2-256
461,250 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,024 UART: [kat] ++
472,484 UART: [kat] sha1
483,692 UART: [kat] SHA2-256
486,714 UART: [kat] SHA2-384
491,461 UART: [kat] SHA2-512-ACC
494,078 UART: [kat] ECC-384
2,946,507 UART: [kat] HMAC-384Kdf
2,969,004 UART: [kat] LMS
3,500,797 UART: [kat] --
3,506,703 UART: [cold-reset] ++
3,508,767 UART: [fht] FHT @ 0x50003400
3,520,831 UART: [idev] ++
3,521,512 UART: [idev] CDI.KEYID = 6
3,522,453 UART: [idev] SUBJECT.KEYID = 7
3,523,668 UART: [idev] UDS.KEYID = 0
3,526,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,251 UART: [idev] Erasing UDS.KEYID = 0
6,025,116 UART: [idev] Sha1 KeyId Algorithm
6,048,156 UART: [idev] --
6,053,060 UART: [ldev] ++
6,053,756 UART: [ldev] CDI.KEYID = 6
6,054,645 UART: [ldev] SUBJECT.KEYID = 5
6,055,865 UART: [ldev] AUTHORITY.KEYID = 7
6,057,008 UART: [ldev] FE.KEYID = 1
6,098,775 UART: [ldev] Erasing FE.KEYID = 1
8,601,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,845 UART: [ldev] --
10,410,330 UART: [fwproc] Wait for Commands...
10,412,266 UART: [fwproc] Recv command 0x46574c44
10,414,525 UART: [fwproc] Recv'd Img size: 118548 bytes
13,942,563 UART: ROM Fatal Error: 0x000B002C
13,946,221 >>> mbox cmd response: failed
13,946,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,946,892 >>> mbox cmd response: failed
13,947,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,947,576 >>> mbox cmd response: failed
Initializing fuses
2,054,565 writing to cptra_bootfsm_go
2,243,951 UART:
2,244,304 UART: Running Caliptra ROM ...
2,245,453 UART:
2,245,633 UART: [state] CFI Enabled
2,313,575 UART: [state] LifecycleState = Manufacturing
2,315,939 UART: [state] DebugLocked = No
2,317,172 UART: [state] WD Timer not started. Device not locked for debugging
2,320,657 UART: [kat] SHA2-256
2,510,522 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,521,323 UART: [kat] ++
2,521,875 UART: [kat] sha1
2,532,632 UART: [kat] SHA2-256
2,535,659 UART: [kat] SHA2-384
2,540,335 UART: [kat] SHA2-512-ACC
2,542,912 UART: [kat] ECC-384
4,995,188 UART: [kat] HMAC-384Kdf
5,021,036 UART: [kat] LMS
5,552,820 UART: [kat] --
5,558,483 UART: [cold-reset] ++
5,559,509 UART: [fht] FHT @ 0x50003400
5,570,176 UART: [idev] ++
5,570,855 UART: [idev] CDI.KEYID = 6
5,571,876 UART: [idev] SUBJECT.KEYID = 7
5,572,983 UART: [idev] UDS.KEYID = 0
5,575,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,724,607 UART: [idev] Erasing UDS.KEYID = 0
8,078,616 UART: [idev] Sha1 KeyId Algorithm
8,101,531 UART: [idev] --
8,105,994 UART: [ldev] ++
8,106,714 UART: [ldev] CDI.KEYID = 6
8,107,634 UART: [ldev] SUBJECT.KEYID = 5
8,108,802 UART: [ldev] AUTHORITY.KEYID = 7
8,109,986 UART: [ldev] FE.KEYID = 1
8,149,684 UART: [ldev] Erasing FE.KEYID = 1
10,657,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,406,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,796 UART: [ldev] --
12,460,635 UART: [fwproc] Wait for Commands...
12,462,844 UART: [fwproc] Recv command 0x46574c44
12,465,108 UART: [fwproc] Recv'd Img size: 118548 bytes
15,992,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,072,609 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,196,202 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,757,027 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,442,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,388,709 >>> mbox cmd response: failed
14,389,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,389,628 >>> mbox cmd response: failed
14,389,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,390,199 >>> mbox cmd response: failed
Initializing fuses
2,048,927 writing to cptra_bootfsm_go
5,471,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,899,909 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,457 UART:
192,828 UART: Running Caliptra ROM ...
193,967 UART:
603,524 UART: [state] CFI Enabled
619,720 UART: [state] LifecycleState = Manufacturing
622,132 UART: [state] DebugLocked = No
624,872 UART: [state] WD Timer not started. Device not locked for debugging
630,026 UART: [kat] SHA2-256
819,835 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,622 UART: [kat] ++
831,170 UART: [kat] sha1
842,923 UART: [kat] SHA2-256
845,953 UART: [kat] SHA2-384
850,596 UART: [kat] SHA2-512-ACC
853,217 UART: [kat] ECC-384
3,297,292 UART: [kat] HMAC-384Kdf
3,309,803 UART: [kat] LMS
3,841,654 UART: [kat] --
3,845,971 UART: [cold-reset] ++
3,847,263 UART: [fht] FHT @ 0x50003400
3,859,572 UART: [idev] ++
3,860,258 UART: [idev] CDI.KEYID = 6
3,861,285 UART: [idev] SUBJECT.KEYID = 7
3,862,393 UART: [idev] UDS.KEYID = 0
3,865,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,245 UART: [idev] Erasing UDS.KEYID = 0
6,346,133 UART: [idev] Sha1 KeyId Algorithm
6,367,096 UART: [idev] --
6,371,319 UART: [ldev] ++
6,372,005 UART: [ldev] CDI.KEYID = 6
6,372,930 UART: [ldev] SUBJECT.KEYID = 5
6,374,096 UART: [ldev] AUTHORITY.KEYID = 7
6,375,280 UART: [ldev] FE.KEYID = 1
6,386,219 UART: [ldev] Erasing FE.KEYID = 1
8,862,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,993 UART: [ldev] --
10,652,264 UART: [fwproc] Wait for Commands...
10,654,316 UART: [fwproc] Recv command 0x46574c44
10,656,640 UART: [fwproc] Recv'd Img size: 118548 bytes
14,189,424 UART: ROM Fatal Error: 0x000B002C
14,193,106 >>> mbox cmd response: failed
14,193,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,193,976 >>> mbox cmd response: failed
14,194,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,194,507 >>> mbox cmd response: failed
Initializing fuses
2,055,637 writing to cptra_bootfsm_go
2,244,977 UART:
2,245,328 UART: Running Caliptra ROM ...
2,246,472 UART:
6,260,729 UART: [state] CFI Enabled
6,274,436 UART: [state] LifecycleState = Manufacturing
6,276,847 UART: [state] DebugLocked = No
6,278,292 UART: [state] WD Timer not started. Device not locked for debugging
6,282,063 UART: [kat] SHA2-256
6,471,964 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,482,716 UART: [kat] ++
6,483,249 UART: [kat] sha1
6,494,253 UART: [kat] SHA2-256
6,497,292 UART: [kat] SHA2-384
6,502,538 UART: [kat] SHA2-512-ACC
6,505,084 UART: [kat] ECC-384
8,946,850 UART: [kat] HMAC-384Kdf
8,959,949 UART: [kat] LMS
9,491,809 UART: [kat] --
9,494,738 UART: [cold-reset] ++
9,497,223 UART: [fht] FHT @ 0x50003400
9,507,837 UART: [idev] ++
9,508,524 UART: [idev] CDI.KEYID = 6
9,509,601 UART: [idev] SUBJECT.KEYID = 7
9,510,729 UART: [idev] UDS.KEYID = 0
9,513,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,662,107 UART: [idev] Erasing UDS.KEYID = 0
11,987,930 UART: [idev] Sha1 KeyId Algorithm
12,011,572 UART: [idev] --
12,015,687 UART: [ldev] ++
12,016,375 UART: [ldev] CDI.KEYID = 6
12,017,288 UART: [ldev] SUBJECT.KEYID = 5
12,018,515 UART: [ldev] AUTHORITY.KEYID = 7
12,019,649 UART: [ldev] FE.KEYID = 1
12,034,022 UART: [ldev] Erasing FE.KEYID = 1
14,516,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,237,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,252,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,267,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,283,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,303,441 UART: [ldev] --
16,308,180 UART: [fwproc] Wait for Commands...
16,310,491 UART: [fwproc] Recv command 0x46574c44
16,312,775 UART: [fwproc] Recv'd Img size: 118548 bytes
19,835,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,912,140 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,035,719 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,596,410 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,759,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,613,471 >>> mbox cmd response: failed
14,614,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,614,668 >>> mbox cmd response: failed
14,614,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,615,242 >>> mbox cmd response: failed
Initializing fuses
2,063,910 writing to cptra_bootfsm_go
9,016,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,346,115 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Manufacturing
85,569 UART: [state] DebugLocked = No
86,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,607 UART: [kat] SHA2-256
881,538 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,653 UART: [kat] ++
885,805 UART: [kat] sha1
890,225 UART: [kat] SHA2-256
892,163 UART: [kat] SHA2-384
894,748 UART: [kat] SHA2-512-ACC
896,649 UART: [kat] ECC-384
902,276 UART: [kat] HMAC-384Kdf
906,948 UART: [kat] LMS
1,475,144 UART: [kat] --
1,475,645 UART: [cold-reset] ++
1,476,071 UART: [fht] Storing FHT @ 0x50003400
1,478,850 UART: [idev] ++
1,479,018 UART: [idev] CDI.KEYID = 6
1,479,378 UART: [idev] SUBJECT.KEYID = 7
1,479,802 UART: [idev] UDS.KEYID = 0
1,480,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,672 UART: [idev] Erasing UDS.KEYID = 0
1,504,022 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,802 UART: [idev] --
1,513,839 UART: [ldev] ++
1,514,007 UART: [ldev] CDI.KEYID = 6
1,514,370 UART: [ldev] SUBJECT.KEYID = 5
1,514,796 UART: [ldev] AUTHORITY.KEYID = 7
1,515,259 UART: [ldev] FE.KEYID = 1
1,520,309 UART: [ldev] Erasing FE.KEYID = 1
1,544,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,563,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,569,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,440 UART: [ldev] --
1,583,701 UART: [fwproc] Waiting for Commands...
1,584,318 UART: [fwproc] Received command 0x46574c44
1,585,109 UART: [fwproc] Received Image of size 118548 bytes
2,954,141 UART: ROM Fatal Error: 0x000B002C
2,955,300 >>> mbox cmd response: failed
2,955,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,955,306 >>> mbox cmd response: failed
2,955,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,955,312 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,612 UART: [state] LifecycleState = Unprovisioned
85,267 UART: [state] DebugLocked = No
85,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,481 UART: [kat] SHA2-256
881,412 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,527 UART: [kat] ++
885,679 UART: [kat] sha1
890,007 UART: [kat] SHA2-256
891,945 UART: [kat] SHA2-384
894,606 UART: [kat] SHA2-512-ACC
896,507 UART: [kat] ECC-384
902,162 UART: [kat] HMAC-384Kdf
906,764 UART: [kat] LMS
1,474,960 UART: [kat] --
1,475,905 UART: [cold-reset] ++
1,476,475 UART: [fht] Storing FHT @ 0x50003400
1,479,208 UART: [idev] ++
1,479,376 UART: [idev] CDI.KEYID = 6
1,479,736 UART: [idev] SUBJECT.KEYID = 7
1,480,160 UART: [idev] UDS.KEYID = 0
1,480,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,078 UART: [idev] Erasing UDS.KEYID = 0
1,504,516 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,948 UART: [idev] --
1,514,003 UART: [ldev] ++
1,514,171 UART: [ldev] CDI.KEYID = 6
1,514,534 UART: [ldev] SUBJECT.KEYID = 5
1,514,960 UART: [ldev] AUTHORITY.KEYID = 7
1,515,423 UART: [ldev] FE.KEYID = 1
1,520,579 UART: [ldev] Erasing FE.KEYID = 1
1,546,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,638 UART: [ldev] --
1,584,905 UART: [fwproc] Waiting for Commands...
1,585,750 UART: [fwproc] Received command 0x46574c44
1,586,541 UART: [fwproc] Received Image of size 118548 bytes
2,931,392 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,160 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,378 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,579 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,809,591 >>> mbox cmd response: failed
2,809,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,809,597 >>> mbox cmd response: failed
2,809,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,809,603 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,801 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Manufacturing
86,118 UART: [state] DebugLocked = No
86,688 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,310 UART: [kat] SHA2-256
882,241 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,356 UART: [kat] ++
886,508 UART: [kat] sha1
890,814 UART: [kat] SHA2-256
892,752 UART: [kat] SHA2-384
895,471 UART: [kat] SHA2-512-ACC
897,372 UART: [kat] ECC-384
902,981 UART: [kat] HMAC-384Kdf
907,509 UART: [kat] LMS
1,475,705 UART: [kat] --
1,476,478 UART: [cold-reset] ++
1,476,854 UART: [fht] Storing FHT @ 0x50003400
1,479,723 UART: [idev] ++
1,479,891 UART: [idev] CDI.KEYID = 6
1,480,251 UART: [idev] SUBJECT.KEYID = 7
1,480,675 UART: [idev] UDS.KEYID = 0
1,481,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,717 UART: [idev] Erasing UDS.KEYID = 0
1,505,413 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,183 UART: [idev] --
1,515,170 UART: [ldev] ++
1,515,338 UART: [ldev] CDI.KEYID = 6
1,515,701 UART: [ldev] SUBJECT.KEYID = 5
1,516,127 UART: [ldev] AUTHORITY.KEYID = 7
1,516,590 UART: [ldev] FE.KEYID = 1
1,521,810 UART: [ldev] Erasing FE.KEYID = 1
1,547,239 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,315 UART: [ldev] --
1,586,694 UART: [fwproc] Waiting for Commands...
1,587,333 UART: [fwproc] Received command 0x46574c44
1,588,124 UART: [fwproc] Received Image of size 118548 bytes
2,957,322 UART: ROM Fatal Error: 0x000B002C
2,958,481 >>> mbox cmd response: failed
2,958,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,958,487 >>> mbox cmd response: failed
2,958,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,958,493 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,120 UART: [kat] SHA2-256
882,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,166 UART: [kat] ++
886,318 UART: [kat] sha1
890,652 UART: [kat] SHA2-256
892,590 UART: [kat] SHA2-384
895,289 UART: [kat] SHA2-512-ACC
897,190 UART: [kat] ECC-384
902,835 UART: [kat] HMAC-384Kdf
907,367 UART: [kat] LMS
1,475,563 UART: [kat] --
1,476,594 UART: [cold-reset] ++
1,477,150 UART: [fht] Storing FHT @ 0x50003400
1,479,985 UART: [idev] ++
1,480,153 UART: [idev] CDI.KEYID = 6
1,480,513 UART: [idev] SUBJECT.KEYID = 7
1,480,937 UART: [idev] UDS.KEYID = 0
1,481,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,939 UART: [idev] Erasing UDS.KEYID = 0
1,505,605 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,173 UART: [idev] --
1,515,260 UART: [ldev] ++
1,515,428 UART: [ldev] CDI.KEYID = 6
1,515,791 UART: [ldev] SUBJECT.KEYID = 5
1,516,217 UART: [ldev] AUTHORITY.KEYID = 7
1,516,680 UART: [ldev] FE.KEYID = 1
1,521,974 UART: [ldev] Erasing FE.KEYID = 1
1,547,631 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,615 UART: [ldev] --
1,587,050 UART: [fwproc] Waiting for Commands...
1,587,789 UART: [fwproc] Received command 0x46574c44
1,588,580 UART: [fwproc] Received Image of size 118548 bytes
2,932,887 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,145 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,363 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,800 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,810,834 >>> mbox cmd response: failed
2,810,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,810,840 >>> mbox cmd response: failed
2,810,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,810,846 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,716 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Manufacturing
85,741 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,293 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,170,042 UART: [cold-reset] ++
1,170,610 UART: [fht] FHT @ 0x50003400
1,173,302 UART: [idev] ++
1,173,470 UART: [idev] CDI.KEYID = 6
1,173,831 UART: [idev] SUBJECT.KEYID = 7
1,174,256 UART: [idev] UDS.KEYID = 0
1,174,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,177 UART: [idev] Erasing UDS.KEYID = 0
1,198,955 UART: [idev] Sha1 KeyId Algorithm
1,207,719 UART: [idev] --
1,208,654 UART: [ldev] ++
1,208,822 UART: [ldev] CDI.KEYID = 6
1,209,186 UART: [ldev] SUBJECT.KEYID = 5
1,209,613 UART: [ldev] AUTHORITY.KEYID = 7
1,210,076 UART: [ldev] FE.KEYID = 1
1,215,520 UART: [ldev] Erasing FE.KEYID = 1
1,242,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,660 UART: [ldev] --
1,281,945 UART: [fwproc] Wait for Commands...
1,282,738 UART: [fwproc] Recv command 0x46574c44
1,283,471 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,291 UART: ROM Fatal Error: 0x000B002C
2,653,450 >>> mbox cmd response: failed
2,653,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,456 >>> mbox cmd response: failed
2,653,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,462 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,811 UART: [state] WD Timer not started. Device not locked for debugging
88,120 UART: [kat] SHA2-256
891,670 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,774 UART: [kat] ++
895,926 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,721 UART: [kat] HMAC-384Kdf
921,283 UART: [kat] LMS
1,169,595 UART: [kat] --
1,170,406 UART: [cold-reset] ++
1,170,940 UART: [fht] FHT @ 0x50003400
1,173,506 UART: [idev] ++
1,173,674 UART: [idev] CDI.KEYID = 6
1,174,035 UART: [idev] SUBJECT.KEYID = 7
1,174,460 UART: [idev] UDS.KEYID = 0
1,174,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,405 UART: [idev] Erasing UDS.KEYID = 0
1,199,473 UART: [idev] Sha1 KeyId Algorithm
1,208,457 UART: [idev] --
1,209,476 UART: [ldev] ++
1,209,644 UART: [ldev] CDI.KEYID = 6
1,210,008 UART: [ldev] SUBJECT.KEYID = 5
1,210,435 UART: [ldev] AUTHORITY.KEYID = 7
1,210,898 UART: [ldev] FE.KEYID = 1
1,216,222 UART: [ldev] Erasing FE.KEYID = 1
1,243,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,872 UART: [ldev] --
1,282,287 UART: [fwproc] Wait for Commands...
1,283,072 UART: [fwproc] Recv command 0x46574c44
1,283,805 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,934 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,109 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,448 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,173 >>> mbox cmd response: failed
2,507,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,507,179 >>> mbox cmd response: failed
2,507,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,507,185 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,871 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,687 UART: [state] LifecycleState = Manufacturing
85,342 UART: [state] DebugLocked = No
86,012 UART: [state] WD Timer not started. Device not locked for debugging
87,215 UART: [kat] SHA2-256
890,765 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,869 UART: [kat] ++
895,021 UART: [kat] sha1
899,239 UART: [kat] SHA2-256
901,179 UART: [kat] SHA2-384
903,880 UART: [kat] SHA2-512-ACC
905,781 UART: [kat] ECC-384
915,648 UART: [kat] HMAC-384Kdf
920,234 UART: [kat] LMS
1,168,546 UART: [kat] --
1,169,139 UART: [cold-reset] ++
1,169,491 UART: [fht] FHT @ 0x50003400
1,172,235 UART: [idev] ++
1,172,403 UART: [idev] CDI.KEYID = 6
1,172,764 UART: [idev] SUBJECT.KEYID = 7
1,173,189 UART: [idev] UDS.KEYID = 0
1,173,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,072 UART: [idev] Erasing UDS.KEYID = 0
1,198,218 UART: [idev] Sha1 KeyId Algorithm
1,207,036 UART: [idev] --
1,208,217 UART: [ldev] ++
1,208,385 UART: [ldev] CDI.KEYID = 6
1,208,749 UART: [ldev] SUBJECT.KEYID = 5
1,209,176 UART: [ldev] AUTHORITY.KEYID = 7
1,209,639 UART: [ldev] FE.KEYID = 1
1,214,853 UART: [ldev] Erasing FE.KEYID = 1
1,240,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,033 UART: [ldev] --
1,280,260 UART: [fwproc] Wait for Commands...
1,280,997 UART: [fwproc] Recv command 0x46574c44
1,281,730 UART: [fwproc] Recv'd Img size: 118548 bytes
2,649,244 UART: ROM Fatal Error: 0x000B002C
2,650,403 >>> mbox cmd response: failed
2,650,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,650,409 >>> mbox cmd response: failed
2,650,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,650,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
891,385 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
899,875 UART: [kat] SHA2-256
901,815 UART: [kat] SHA2-384
904,450 UART: [kat] SHA2-512-ACC
906,351 UART: [kat] ECC-384
915,956 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,875 UART: [cold-reset] ++
1,170,219 UART: [fht] FHT @ 0x50003400
1,172,753 UART: [idev] ++
1,172,921 UART: [idev] CDI.KEYID = 6
1,173,282 UART: [idev] SUBJECT.KEYID = 7
1,173,707 UART: [idev] UDS.KEYID = 0
1,174,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,842 UART: [idev] Erasing UDS.KEYID = 0
1,199,368 UART: [idev] Sha1 KeyId Algorithm
1,208,322 UART: [idev] --
1,209,319 UART: [ldev] ++
1,209,487 UART: [ldev] CDI.KEYID = 6
1,209,851 UART: [ldev] SUBJECT.KEYID = 5
1,210,278 UART: [ldev] AUTHORITY.KEYID = 7
1,210,741 UART: [ldev] FE.KEYID = 1
1,216,111 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,577 UART: [ldev] --
1,281,848 UART: [fwproc] Wait for Commands...
1,282,669 UART: [fwproc] Recv command 0x46574c44
1,283,402 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,561 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,736 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,895 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,928 >>> mbox cmd response: failed
2,508,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,934 >>> mbox cmd response: failed
2,508,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,010 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Manufacturing
86,091 UART: [state] DebugLocked = No
86,805 UART: [state] WD Timer not started. Device not locked for debugging
87,964 UART: [kat] SHA2-256
893,614 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,739 UART: [kat] ++
897,891 UART: [kat] sha1
901,925 UART: [kat] SHA2-256
903,865 UART: [kat] SHA2-384
906,558 UART: [kat] SHA2-512-ACC
908,459 UART: [kat] ECC-384
918,024 UART: [kat] HMAC-384Kdf
922,738 UART: [kat] LMS
1,171,066 UART: [kat] --
1,171,877 UART: [cold-reset] ++
1,172,373 UART: [fht] FHT @ 0x50003400
1,174,866 UART: [idev] ++
1,175,034 UART: [idev] CDI.KEYID = 6
1,175,394 UART: [idev] SUBJECT.KEYID = 7
1,175,818 UART: [idev] UDS.KEYID = 0
1,176,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,090 UART: [idev] Erasing UDS.KEYID = 0
1,200,967 UART: [idev] Sha1 KeyId Algorithm
1,209,637 UART: [idev] --
1,210,647 UART: [ldev] ++
1,210,815 UART: [ldev] CDI.KEYID = 6
1,211,178 UART: [ldev] SUBJECT.KEYID = 5
1,211,604 UART: [ldev] AUTHORITY.KEYID = 7
1,212,067 UART: [ldev] FE.KEYID = 1
1,217,373 UART: [ldev] Erasing FE.KEYID = 1
1,243,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,605 UART: [ldev] --
1,283,112 UART: [fwproc] Wait for Commands...
1,283,688 UART: [fwproc] Recv command 0x46574c44
1,284,416 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,408 UART: ROM Fatal Error: 0x000B002C
2,655,567 >>> mbox cmd response: failed
2,655,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,573 >>> mbox cmd response: failed
2,655,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,579 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,698 UART: [state] LifecycleState = Unprovisioned
85,353 UART: [state] DebugLocked = No
86,075 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
893,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,171 UART: [kat] ++
897,323 UART: [kat] sha1
901,597 UART: [kat] SHA2-256
903,537 UART: [kat] SHA2-384
906,048 UART: [kat] SHA2-512-ACC
907,949 UART: [kat] ECC-384
918,030 UART: [kat] HMAC-384Kdf
922,778 UART: [kat] LMS
1,171,106 UART: [kat] --
1,172,191 UART: [cold-reset] ++
1,172,765 UART: [fht] FHT @ 0x50003400
1,175,414 UART: [idev] ++
1,175,582 UART: [idev] CDI.KEYID = 6
1,175,942 UART: [idev] SUBJECT.KEYID = 7
1,176,366 UART: [idev] UDS.KEYID = 0
1,176,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,634 UART: [idev] Erasing UDS.KEYID = 0
1,201,255 UART: [idev] Sha1 KeyId Algorithm
1,209,899 UART: [idev] --
1,210,969 UART: [ldev] ++
1,211,137 UART: [ldev] CDI.KEYID = 6
1,211,500 UART: [ldev] SUBJECT.KEYID = 5
1,211,926 UART: [ldev] AUTHORITY.KEYID = 7
1,212,389 UART: [ldev] FE.KEYID = 1
1,217,479 UART: [ldev] Erasing FE.KEYID = 1
1,243,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,589 UART: [ldev] --
1,283,078 UART: [fwproc] Wait for Commands...
1,283,728 UART: [fwproc] Recv command 0x46574c44
1,284,456 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,717 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,887 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,084 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,132 >>> mbox cmd response: failed
2,508,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,138 >>> mbox cmd response: failed
2,508,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,144 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,675 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Manufacturing
86,386 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
893,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,930 UART: [kat] ++
898,082 UART: [kat] sha1
902,130 UART: [kat] SHA2-256
904,070 UART: [kat] SHA2-384
906,963 UART: [kat] SHA2-512-ACC
908,864 UART: [kat] ECC-384
918,423 UART: [kat] HMAC-384Kdf
922,961 UART: [kat] LMS
1,171,289 UART: [kat] --
1,172,192 UART: [cold-reset] ++
1,172,540 UART: [fht] FHT @ 0x50003400
1,175,215 UART: [idev] ++
1,175,383 UART: [idev] CDI.KEYID = 6
1,175,743 UART: [idev] SUBJECT.KEYID = 7
1,176,167 UART: [idev] UDS.KEYID = 0
1,176,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,037 UART: [idev] Erasing UDS.KEYID = 0
1,200,744 UART: [idev] Sha1 KeyId Algorithm
1,209,346 UART: [idev] --
1,210,410 UART: [ldev] ++
1,210,578 UART: [ldev] CDI.KEYID = 6
1,210,941 UART: [ldev] SUBJECT.KEYID = 5
1,211,367 UART: [ldev] AUTHORITY.KEYID = 7
1,211,830 UART: [ldev] FE.KEYID = 1
1,216,990 UART: [ldev] Erasing FE.KEYID = 1
1,243,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,978 UART: [ldev] --
1,282,281 UART: [fwproc] Wait for Commands...
1,282,851 UART: [fwproc] Recv command 0x46574c44
1,283,579 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,515 UART: ROM Fatal Error: 0x000B002C
2,653,674 >>> mbox cmd response: failed
2,653,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,680 >>> mbox cmd response: failed
2,653,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,686 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
893,491 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,616 UART: [kat] ++
897,768 UART: [kat] sha1
901,920 UART: [kat] SHA2-256
903,860 UART: [kat] SHA2-384
906,783 UART: [kat] SHA2-512-ACC
908,684 UART: [kat] ECC-384
918,589 UART: [kat] HMAC-384Kdf
923,427 UART: [kat] LMS
1,171,755 UART: [kat] --
1,172,750 UART: [cold-reset] ++
1,173,236 UART: [fht] FHT @ 0x50003400
1,175,893 UART: [idev] ++
1,176,061 UART: [idev] CDI.KEYID = 6
1,176,421 UART: [idev] SUBJECT.KEYID = 7
1,176,845 UART: [idev] UDS.KEYID = 0
1,177,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,853 UART: [idev] Erasing UDS.KEYID = 0
1,201,838 UART: [idev] Sha1 KeyId Algorithm
1,210,332 UART: [idev] --
1,211,592 UART: [ldev] ++
1,211,760 UART: [ldev] CDI.KEYID = 6
1,212,123 UART: [ldev] SUBJECT.KEYID = 5
1,212,549 UART: [ldev] AUTHORITY.KEYID = 7
1,213,012 UART: [ldev] FE.KEYID = 1
1,218,426 UART: [ldev] Erasing FE.KEYID = 1
1,244,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,238 UART: [ldev] --
1,284,515 UART: [fwproc] Wait for Commands...
1,285,279 UART: [fwproc] Recv command 0x46574c44
1,286,007 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,784 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,954 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,319 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,497 >>> mbox cmd response: failed
2,507,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,507,503 >>> mbox cmd response: failed
2,507,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,507,509 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,810 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,048 UART:
192,413 UART: Running Caliptra ROM ...
193,617 UART:
193,780 UART: [state] CFI Enabled
265,601 UART: [state] LifecycleState = Manufacturing
267,531 UART: [state] DebugLocked = No
269,240 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,863 UART: [kat] SHA2-256
443,562 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,104 UART: [kat] ++
454,640 UART: [kat] sha1
465,308 UART: [kat] SHA2-256
468,049 UART: [kat] SHA2-384
474,189 UART: [kat] SHA2-512-ACC
476,586 UART: [kat] ECC-384
2,767,171 UART: [kat] HMAC-384Kdf
2,800,092 UART: [kat] LMS
3,990,359 UART: [kat] --
3,995,748 UART: [cold-reset] ++
3,997,754 UART: [fht] Storing FHT @ 0x50003400
4,007,675 UART: [idev] ++
4,008,252 UART: [idev] CDI.KEYID = 6
4,009,241 UART: [idev] SUBJECT.KEYID = 7
4,010,466 UART: [idev] UDS.KEYID = 0
4,013,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,965 UART: [idev] Erasing UDS.KEYID = 0
7,343,865 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,612 UART: [idev] --
7,371,155 UART: [ldev] ++
7,371,730 UART: [ldev] CDI.KEYID = 6
7,372,646 UART: [ldev] SUBJECT.KEYID = 5
7,373,863 UART: [ldev] AUTHORITY.KEYID = 7
7,375,150 UART: [ldev] FE.KEYID = 1
7,422,269 UART: [ldev] Erasing FE.KEYID = 1
10,757,118 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,725 UART: [ldev] --
13,134,402 UART: [fwproc] Waiting for Commands...
13,136,128 UART: [fwproc] Received command 0x46574c44
13,138,321 UART: [fwproc] Received Image of size 118548 bytes
17,270,288 UART: ROM Fatal Error: 0x000B002E
17,273,760 >>> mbox cmd response: failed
17,274,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,274,582 >>> mbox cmd response: failed
17,274,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,275,147 >>> mbox cmd response: failed
Initializing fuses
2,055,392 writing to cptra_bootfsm_go
2,244,782 UART:
2,245,121 UART: Running Caliptra ROM ...
2,246,263 UART:
2,246,434 UART: [state] CFI Enabled
2,308,563 UART: [state] LifecycleState = Manufacturing
2,310,501 UART: [state] DebugLocked = No
2,313,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,490 UART: [kat] SHA2-256
2,488,235 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,702 UART: [kat] ++
2,499,206 UART: [kat] sha1
2,509,916 UART: [kat] SHA2-256
2,512,603 UART: [kat] SHA2-384
2,518,449 UART: [kat] SHA2-512-ACC
2,520,806 UART: [kat] ECC-384
4,814,839 UART: [kat] HMAC-384Kdf
4,847,095 UART: [kat] LMS
6,037,397 UART: [kat] --
6,041,670 UART: [cold-reset] ++
6,043,989 UART: [fht] Storing FHT @ 0x50003400
6,054,826 UART: [idev] ++
6,055,460 UART: [idev] CDI.KEYID = 6
6,056,370 UART: [idev] SUBJECT.KEYID = 7
6,057,595 UART: [idev] UDS.KEYID = 0
6,059,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,209,118 UART: [idev] Erasing UDS.KEYID = 0
9,391,448 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,671 UART: [idev] --
9,416,823 UART: [ldev] ++
9,417,396 UART: [ldev] CDI.KEYID = 6
9,418,359 UART: [ldev] SUBJECT.KEYID = 5
9,419,577 UART: [ldev] AUTHORITY.KEYID = 7
9,420,813 UART: [ldev] FE.KEYID = 1
9,468,463 UART: [ldev] Erasing FE.KEYID = 1
12,800,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,113,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,127,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,142,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,157,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,176,291 UART: [ldev] --
15,180,585 UART: [fwproc] Waiting for Commands...
15,182,201 UART: [fwproc] Received command 0x46574c44
15,184,443 UART: [fwproc] Received Image of size 118548 bytes
19,321,683 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,400,027 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,473,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,801,457 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,786,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,211,075 >>> mbox cmd response: failed
17,211,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,212,120 >>> mbox cmd response: failed
17,212,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,212,646 >>> mbox cmd response: failed
Initializing fuses
2,050,459 writing to cptra_bootfsm_go
5,828,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,029,325 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,605 UART:
193,021 UART: Running Caliptra ROM ...
194,127 UART:
603,721 UART: [state] CFI Enabled
612,750 UART: [state] LifecycleState = Manufacturing
614,710 UART: [state] DebugLocked = No
616,111 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
620,456 UART: [kat] SHA2-256
790,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
800,681 UART: [kat] ++
801,228 UART: [kat] sha1
812,000 UART: [kat] SHA2-256
814,686 UART: [kat] SHA2-384
820,946 UART: [kat] SHA2-512-ACC
823,292 UART: [kat] ECC-384
3,107,356 UART: [kat] HMAC-384Kdf
3,119,232 UART: [kat] LMS
4,309,350 UART: [kat] --
4,312,397 UART: [cold-reset] ++
4,314,505 UART: [fht] Storing FHT @ 0x50003400
4,327,079 UART: [idev] ++
4,327,852 UART: [idev] CDI.KEYID = 6
4,328,801 UART: [idev] SUBJECT.KEYID = 7
4,329,918 UART: [idev] UDS.KEYID = 0
4,333,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,040 UART: [idev] Erasing UDS.KEYID = 0
7,621,071 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,474 UART: [idev] --
7,645,453 UART: [ldev] ++
7,646,034 UART: [ldev] CDI.KEYID = 6
7,647,008 UART: [ldev] SUBJECT.KEYID = 5
7,648,237 UART: [ldev] AUTHORITY.KEYID = 7
7,649,473 UART: [ldev] FE.KEYID = 1
7,661,476 UART: [ldev] Erasing FE.KEYID = 1
10,952,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,680 UART: [ldev] --
13,311,931 UART: [fwproc] Waiting for Commands...
13,313,602 UART: [fwproc] Received command 0x46574c44
13,315,796 UART: [fwproc] Received Image of size 118548 bytes
17,453,842 UART: ROM Fatal Error: 0x000B002E
17,457,299 >>> mbox cmd response: failed
17,457,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,458,097 >>> mbox cmd response: failed
17,458,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,458,671 >>> mbox cmd response: failed
Initializing fuses
2,056,098 writing to cptra_bootfsm_go
2,245,454 UART:
2,245,798 UART: Running Caliptra ROM ...
2,246,892 UART:
3,013,022 UART: [state] CFI Enabled
3,025,589 UART: [state] LifecycleState = Manufacturing
3,027,511 UART: [state] DebugLocked = No
3,029,302 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,034,062 UART: [kat] SHA2-256
3,203,811 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,214,335 UART: [kat] ++
3,214,885 UART: [kat] sha1
3,225,193 UART: [kat] SHA2-256
3,227,865 UART: [kat] SHA2-384
3,234,307 UART: [kat] SHA2-512-ACC
3,236,666 UART: [kat] ECC-384
5,518,571 UART: [kat] HMAC-384Kdf
5,529,910 UART: [kat] LMS
6,720,070 UART: [kat] --
6,723,551 UART: [cold-reset] ++
6,725,763 UART: [fht] Storing FHT @ 0x50003400
6,737,356 UART: [idev] ++
6,737,933 UART: [idev] CDI.KEYID = 6
6,738,826 UART: [idev] SUBJECT.KEYID = 7
6,740,098 UART: [idev] UDS.KEYID = 0
6,742,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,891,499 UART: [idev] Erasing UDS.KEYID = 0
10,027,966 UART: [idev] Using Sha1 for KeyId Algorithm
10,050,012 UART: [idev] --
10,054,831 UART: [ldev] ++
10,055,404 UART: [ldev] CDI.KEYID = 6
10,056,381 UART: [ldev] SUBJECT.KEYID = 5
10,057,580 UART: [ldev] AUTHORITY.KEYID = 7
10,058,845 UART: [ldev] FE.KEYID = 1
10,070,263 UART: [ldev] Erasing FE.KEYID = 1
13,358,559 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,651,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,666,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,681,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,695,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,714,211 UART: [ldev] --
15,718,940 UART: [fwproc] Waiting for Commands...
15,721,582 UART: [fwproc] Received command 0x46574c44
15,723,778 UART: [fwproc] Received Image of size 118548 bytes
19,860,503 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,936,352 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,009,532 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,338,662 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
4,129,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,452,151 >>> mbox cmd response: failed
17,452,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,453,193 >>> mbox cmd response: failed
17,453,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,453,767 >>> mbox cmd response: failed
Initializing fuses
2,050,537 writing to cptra_bootfsm_go
6,546,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,614,599 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,243 UART:
192,596 UART: Running Caliptra ROM ...
193,724 UART:
194,247 UART: [state] CFI Enabled
260,160 UART: [state] LifecycleState = Manufacturing
262,060 UART: [state] DebugLocked = No
264,851 UART: [state] WD Timer not started. Device not locked for debugging
269,377 UART: [kat] SHA2-256
449,031 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,809 UART: [kat] ++
460,267 UART: [kat] sha1
470,965 UART: [kat] SHA2-256
473,667 UART: [kat] SHA2-384
478,678 UART: [kat] SHA2-512-ACC
481,019 UART: [kat] ECC-384
2,942,773 UART: [kat] HMAC-384Kdf
2,966,789 UART: [kat] LMS
3,443,271 UART: [kat] --
3,447,489 UART: [cold-reset] ++
3,448,574 UART: [fht] FHT @ 0x50003400
3,461,072 UART: [idev] ++
3,461,647 UART: [idev] CDI.KEYID = 6
3,462,669 UART: [idev] SUBJECT.KEYID = 7
3,463,854 UART: [idev] UDS.KEYID = 0
3,466,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,863 UART: [idev] Erasing UDS.KEYID = 0
5,979,880 UART: [idev] Sha1 KeyId Algorithm
6,003,714 UART: [idev] --
6,007,886 UART: [ldev] ++
6,008,465 UART: [ldev] CDI.KEYID = 6
6,009,494 UART: [ldev] SUBJECT.KEYID = 5
6,010,606 UART: [ldev] AUTHORITY.KEYID = 7
6,011,847 UART: [ldev] FE.KEYID = 1
6,053,946 UART: [ldev] Erasing FE.KEYID = 1
8,560,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,961 UART: [ldev] --
10,369,981 UART: [fwproc] Wait for Commands...
10,371,654 UART: [fwproc] Recv command 0x46574c44
10,373,654 UART: [fwproc] Recv'd Img size: 118548 bytes
13,885,272 UART: ROM Fatal Error: 0x000B002E
13,888,571 >>> mbox cmd response: failed
13,888,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,889,319 >>> mbox cmd response: failed
13,889,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,889,890 >>> mbox cmd response: failed
Initializing fuses
2,059,217 writing to cptra_bootfsm_go
2,248,552 UART:
2,248,924 UART: Running Caliptra ROM ...
2,250,028 UART:
2,250,195 UART: [state] CFI Enabled
2,324,146 UART: [state] LifecycleState = Manufacturing
2,326,087 UART: [state] DebugLocked = No
2,327,710 UART: [state] WD Timer not started. Device not locked for debugging
2,331,086 UART: [kat] SHA2-256
2,510,770 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,521,553 UART: [kat] ++
2,522,015 UART: [kat] sha1
2,534,206 UART: [kat] SHA2-256
2,536,915 UART: [kat] SHA2-384
2,543,128 UART: [kat] SHA2-512-ACC
2,545,526 UART: [kat] ECC-384
5,006,397 UART: [kat] HMAC-384Kdf
5,028,083 UART: [kat] LMS
5,504,561 UART: [kat] --
5,509,027 UART: [cold-reset] ++
5,511,085 UART: [fht] FHT @ 0x50003400
5,521,917 UART: [idev] ++
5,522,492 UART: [idev] CDI.KEYID = 6
5,523,516 UART: [idev] SUBJECT.KEYID = 7
5,524,679 UART: [idev] UDS.KEYID = 0
5,527,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,676,645 UART: [idev] Erasing UDS.KEYID = 0
8,041,860 UART: [idev] Sha1 KeyId Algorithm
8,066,511 UART: [idev] --
8,071,888 UART: [ldev] ++
8,072,484 UART: [ldev] CDI.KEYID = 6
8,073,404 UART: [ldev] SUBJECT.KEYID = 5
8,074,627 UART: [ldev] AUTHORITY.KEYID = 7
8,075,865 UART: [ldev] FE.KEYID = 1
8,114,731 UART: [ldev] Erasing FE.KEYID = 1
10,619,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,354,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,370,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,386,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,401,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,423,613 UART: [ldev] --
12,429,855 UART: [fwproc] Wait for Commands...
12,433,141 UART: [fwproc] Recv command 0x46574c44
12,435,141 UART: [fwproc] Recv'd Img size: 118548 bytes
15,949,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,031,577 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,104,598 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,432,875 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
3,463,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,785,963 >>> mbox cmd response: failed
13,786,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,786,978 >>> mbox cmd response: failed
13,787,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,787,575 >>> mbox cmd response: failed
Initializing fuses
2,059,785 writing to cptra_bootfsm_go
5,520,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,305,062 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,548 UART:
192,932 UART: Running Caliptra ROM ...
194,376 UART:
603,702 UART: [state] CFI Enabled
617,216 UART: [state] LifecycleState = Manufacturing
619,117 UART: [state] DebugLocked = No
620,631 UART: [state] WD Timer not started. Device not locked for debugging
623,717 UART: [kat] SHA2-256
803,322 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,134 UART: [kat] ++
814,611 UART: [kat] sha1
825,222 UART: [kat] SHA2-256
827,907 UART: [kat] SHA2-384
833,245 UART: [kat] SHA2-512-ACC
835,629 UART: [kat] ECC-384
3,277,874 UART: [kat] HMAC-384Kdf
3,289,486 UART: [kat] LMS
3,766,003 UART: [kat] --
3,769,569 UART: [cold-reset] ++
3,771,992 UART: [fht] FHT @ 0x50003400
3,784,433 UART: [idev] ++
3,785,008 UART: [idev] CDI.KEYID = 6
3,786,003 UART: [idev] SUBJECT.KEYID = 7
3,787,229 UART: [idev] UDS.KEYID = 0
3,790,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,346 UART: [idev] Erasing UDS.KEYID = 0
6,266,213 UART: [idev] Sha1 KeyId Algorithm
6,290,001 UART: [idev] --
6,295,514 UART: [ldev] ++
6,296,102 UART: [ldev] CDI.KEYID = 6
6,297,021 UART: [ldev] SUBJECT.KEYID = 5
6,298,193 UART: [ldev] AUTHORITY.KEYID = 7
6,299,490 UART: [ldev] FE.KEYID = 1
6,311,900 UART: [ldev] Erasing FE.KEYID = 1
8,788,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,096 UART: [ldev] --
10,583,261 UART: [fwproc] Wait for Commands...
10,585,523 UART: [fwproc] Recv command 0x46574c44
10,587,525 UART: [fwproc] Recv'd Img size: 118548 bytes
14,102,317 UART: ROM Fatal Error: 0x000B002E
14,105,607 >>> mbox cmd response: failed
14,106,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,106,392 >>> mbox cmd response: failed
14,106,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,107,025 >>> mbox cmd response: failed
Initializing fuses
2,060,076 writing to cptra_bootfsm_go
2,249,470 UART:
2,249,835 UART: Running Caliptra ROM ...
2,250,975 UART:
6,346,370 UART: [state] CFI Enabled
6,361,176 UART: [state] LifecycleState = Manufacturing
6,363,091 UART: [state] DebugLocked = No
6,365,788 UART: [state] WD Timer not started. Device not locked for debugging
6,369,538 UART: [kat] SHA2-256
6,549,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,559,966 UART: [kat] ++
6,560,514 UART: [kat] sha1
6,572,116 UART: [kat] SHA2-256
6,574,802 UART: [kat] SHA2-384
6,580,161 UART: [kat] SHA2-512-ACC
6,582,523 UART: [kat] ECC-384
9,026,053 UART: [kat] HMAC-384Kdf
9,037,935 UART: [kat] LMS
9,514,467 UART: [kat] --
9,520,295 UART: [cold-reset] ++
9,522,069 UART: [fht] FHT @ 0x50003400
9,533,544 UART: [idev] ++
9,534,153 UART: [idev] CDI.KEYID = 6
9,535,239 UART: [idev] SUBJECT.KEYID = 7
9,536,353 UART: [idev] UDS.KEYID = 0
9,539,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,688,109 UART: [idev] Erasing UDS.KEYID = 0
12,016,265 UART: [idev] Sha1 KeyId Algorithm
12,040,959 UART: [idev] --
12,045,016 UART: [ldev] ++
12,045,597 UART: [ldev] CDI.KEYID = 6
12,046,515 UART: [ldev] SUBJECT.KEYID = 5
12,047,732 UART: [ldev] AUTHORITY.KEYID = 7
12,048,988 UART: [ldev] FE.KEYID = 1
12,059,531 UART: [ldev] Erasing FE.KEYID = 1
14,538,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,256,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,272,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,288,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,303,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,326,052 UART: [ldev] --
16,331,904 UART: [fwproc] Wait for Commands...
16,335,202 UART: [fwproc] Recv command 0x46574c44
16,337,199 UART: [fwproc] Recv'd Img size: 118548 bytes
19,846,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,928,277 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,001,311 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,330,378 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,531 writing to cptra_bootfsm_go
3,782,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,004,645 >>> mbox cmd response: failed
14,005,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,005,592 >>> mbox cmd response: failed
14,005,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,006,211 >>> mbox cmd response: failed
Initializing fuses
2,066,467 writing to cptra_bootfsm_go
9,642,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,327,947 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,050 UART:
192,413 UART: Running Caliptra ROM ...
193,554 UART:
193,707 UART: [state] CFI Enabled
260,492 UART: [state] LifecycleState = Manufacturing
262,931 UART: [state] DebugLocked = No
264,594 UART: [state] WD Timer not started. Device not locked for debugging
269,800 UART: [kat] SHA2-256
459,685 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,439 UART: [kat] ++
470,921 UART: [kat] sha1
482,347 UART: [kat] SHA2-256
485,373 UART: [kat] SHA2-384
491,202 UART: [kat] SHA2-512-ACC
493,714 UART: [kat] ECC-384
2,949,162 UART: [kat] HMAC-384Kdf
2,972,358 UART: [kat] LMS
3,504,150 UART: [kat] --
3,507,391 UART: [cold-reset] ++
3,508,304 UART: [fht] FHT @ 0x50003400
3,519,937 UART: [idev] ++
3,520,643 UART: [idev] CDI.KEYID = 6
3,521,616 UART: [idev] SUBJECT.KEYID = 7
3,522,784 UART: [idev] UDS.KEYID = 0
3,525,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,164 UART: [idev] Erasing UDS.KEYID = 0
6,028,091 UART: [idev] Sha1 KeyId Algorithm
6,050,795 UART: [idev] --
6,054,262 UART: [ldev] ++
6,054,951 UART: [ldev] CDI.KEYID = 6
6,055,843 UART: [ldev] SUBJECT.KEYID = 5
6,057,064 UART: [ldev] AUTHORITY.KEYID = 7
6,058,224 UART: [ldev] FE.KEYID = 1
6,100,775 UART: [ldev] Erasing FE.KEYID = 1
8,604,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,947 UART: [ldev] --
10,415,756 UART: [fwproc] Wait for Commands...
10,418,014 UART: [fwproc] Recv command 0x46574c44
10,420,301 UART: [fwproc] Recv'd Img size: 118548 bytes
13,949,163 UART: ROM Fatal Error: 0x000B002E
13,952,852 >>> mbox cmd response: failed
13,953,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,953,644 >>> mbox cmd response: failed
13,953,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,954,210 >>> mbox cmd response: failed
Initializing fuses
2,066,065 writing to cptra_bootfsm_go
2,255,420 UART:
2,255,762 UART: Running Caliptra ROM ...
2,256,843 UART:
2,257,006 UART: [state] CFI Enabled
2,326,529 UART: [state] LifecycleState = Manufacturing
2,328,912 UART: [state] DebugLocked = No
2,331,015 UART: [state] WD Timer not started. Device not locked for debugging
2,334,789 UART: [kat] SHA2-256
2,524,681 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,535,471 UART: [kat] ++
2,536,022 UART: [kat] sha1
2,546,294 UART: [kat] SHA2-256
2,549,293 UART: [kat] SHA2-384
2,556,482 UART: [kat] SHA2-512-ACC
2,559,059 UART: [kat] ECC-384
5,014,734 UART: [kat] HMAC-384Kdf
5,038,314 UART: [kat] LMS
5,570,102 UART: [kat] --
5,573,937 UART: [cold-reset] ++
5,575,336 UART: [fht] FHT @ 0x50003400
5,586,328 UART: [idev] ++
5,587,031 UART: [idev] CDI.KEYID = 6
5,587,982 UART: [idev] SUBJECT.KEYID = 7
5,589,204 UART: [idev] UDS.KEYID = 0
5,591,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,741,084 UART: [idev] Erasing UDS.KEYID = 0
8,094,866 UART: [idev] Sha1 KeyId Algorithm
8,116,482 UART: [idev] --
8,122,323 UART: [ldev] ++
8,123,008 UART: [ldev] CDI.KEYID = 6
8,123,931 UART: [ldev] SUBJECT.KEYID = 5
8,125,113 UART: [ldev] AUTHORITY.KEYID = 7
8,126,293 UART: [ldev] FE.KEYID = 1
8,166,981 UART: [ldev] Erasing FE.KEYID = 1
10,672,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,408,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,423,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,438,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,453,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,473,361 UART: [ldev] --
12,478,752 UART: [fwproc] Wait for Commands...
12,480,317 UART: [fwproc] Recv command 0x46574c44
12,482,632 UART: [fwproc] Recv'd Img size: 118548 bytes
16,018,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,094,605 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,218,227 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,777,990 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,443,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,391,773 >>> mbox cmd response: failed
14,392,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,392,759 >>> mbox cmd response: failed
14,393,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,393,342 >>> mbox cmd response: failed
Initializing fuses
2,054,241 writing to cptra_bootfsm_go
5,491,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,912,506 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,411 UART:
192,769 UART: Running Caliptra ROM ...
193,958 UART:
603,541 UART: [state] CFI Enabled
617,171 UART: [state] LifecycleState = Manufacturing
619,576 UART: [state] DebugLocked = No
621,038 UART: [state] WD Timer not started. Device not locked for debugging
626,298 UART: [kat] SHA2-256
816,211 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,979 UART: [kat] ++
827,489 UART: [kat] sha1
838,967 UART: [kat] SHA2-256
841,976 UART: [kat] SHA2-384
846,825 UART: [kat] SHA2-512-ACC
849,444 UART: [kat] ECC-384
3,290,416 UART: [kat] HMAC-384Kdf
3,302,987 UART: [kat] LMS
3,834,776 UART: [kat] --
3,837,959 UART: [cold-reset] ++
3,839,250 UART: [fht] FHT @ 0x50003400
3,850,458 UART: [idev] ++
3,851,146 UART: [idev] CDI.KEYID = 6
3,852,058 UART: [idev] SUBJECT.KEYID = 7
3,853,288 UART: [idev] UDS.KEYID = 0
3,856,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,154 UART: [idev] Erasing UDS.KEYID = 0
6,330,511 UART: [idev] Sha1 KeyId Algorithm
6,352,657 UART: [idev] --
6,356,657 UART: [ldev] ++
6,357,348 UART: [ldev] CDI.KEYID = 6
6,358,268 UART: [ldev] SUBJECT.KEYID = 5
6,359,434 UART: [ldev] AUTHORITY.KEYID = 7
6,360,668 UART: [ldev] FE.KEYID = 1
6,371,370 UART: [ldev] Erasing FE.KEYID = 1
8,850,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,423 UART: [ldev] --
10,640,638 UART: [fwproc] Wait for Commands...
10,643,391 UART: [fwproc] Recv command 0x46574c44
10,645,655 UART: [fwproc] Recv'd Img size: 118548 bytes
14,171,362 UART: ROM Fatal Error: 0x000B002E
14,174,997 >>> mbox cmd response: failed
14,175,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,175,804 >>> mbox cmd response: failed
14,176,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,176,329 >>> mbox cmd response: failed
Initializing fuses
2,066,502 writing to cptra_bootfsm_go
2,255,850 UART:
2,256,200 UART: Running Caliptra ROM ...
2,257,280 UART:
6,285,280 UART: [state] CFI Enabled
6,301,164 UART: [state] LifecycleState = Manufacturing
6,303,537 UART: [state] DebugLocked = No
6,306,176 UART: [state] WD Timer not started. Device not locked for debugging
6,310,107 UART: [kat] SHA2-256
6,499,996 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,510,800 UART: [kat] ++
6,511,402 UART: [kat] sha1
6,523,058 UART: [kat] SHA2-256
6,526,077 UART: [kat] SHA2-384
6,532,923 UART: [kat] SHA2-512-ACC
6,535,520 UART: [kat] ECC-384
8,979,227 UART: [kat] HMAC-384Kdf
8,991,274 UART: [kat] LMS
9,523,122 UART: [kat] --
9,527,750 UART: [cold-reset] ++
9,529,370 UART: [fht] FHT @ 0x50003400
9,540,422 UART: [idev] ++
9,541,113 UART: [idev] CDI.KEYID = 6
9,542,140 UART: [idev] SUBJECT.KEYID = 7
9,543,251 UART: [idev] UDS.KEYID = 0
9,545,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,694,677 UART: [idev] Erasing UDS.KEYID = 0
12,023,731 UART: [idev] Sha1 KeyId Algorithm
12,045,125 UART: [idev] --
12,049,096 UART: [ldev] ++
12,049,796 UART: [ldev] CDI.KEYID = 6
12,050,685 UART: [ldev] SUBJECT.KEYID = 5
12,051,906 UART: [ldev] AUTHORITY.KEYID = 7
12,053,087 UART: [ldev] FE.KEYID = 1
12,062,688 UART: [ldev] Erasing FE.KEYID = 1
14,539,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,256,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,271,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,286,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,301,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,324,181 UART: [ldev] --
16,329,075 UART: [fwproc] Wait for Commands...
16,330,909 UART: [fwproc] Recv command 0x46574c44
16,333,179 UART: [fwproc] Recv'd Img size: 118548 bytes
19,859,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,934,856 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,058,500 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,618,138 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,758,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,597,035 >>> mbox cmd response: failed
14,597,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,598,166 >>> mbox cmd response: failed
14,598,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,598,749 >>> mbox cmd response: failed
Initializing fuses
2,053,760 writing to cptra_bootfsm_go
9,021,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,340,857 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Manufacturing
86,015 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,031 UART: [kat] SHA2-256
881,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,077 UART: [kat] ++
886,229 UART: [kat] sha1
890,443 UART: [kat] SHA2-256
892,381 UART: [kat] SHA2-384
895,094 UART: [kat] SHA2-512-ACC
896,995 UART: [kat] ECC-384
902,766 UART: [kat] HMAC-384Kdf
907,230 UART: [kat] LMS
1,475,426 UART: [kat] --
1,476,549 UART: [cold-reset] ++
1,476,959 UART: [fht] Storing FHT @ 0x50003400
1,479,804 UART: [idev] ++
1,479,972 UART: [idev] CDI.KEYID = 6
1,480,332 UART: [idev] SUBJECT.KEYID = 7
1,480,756 UART: [idev] UDS.KEYID = 0
1,481,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,540 UART: [idev] Erasing UDS.KEYID = 0
1,505,368 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,850 UART: [idev] --
1,515,071 UART: [ldev] ++
1,515,239 UART: [ldev] CDI.KEYID = 6
1,515,602 UART: [ldev] SUBJECT.KEYID = 5
1,516,028 UART: [ldev] AUTHORITY.KEYID = 7
1,516,491 UART: [ldev] FE.KEYID = 1
1,521,771 UART: [ldev] Erasing FE.KEYID = 1
1,547,052 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,196 UART: [ldev] --
1,586,477 UART: [fwproc] Waiting for Commands...
1,587,316 UART: [fwproc] Received command 0x46574c44
1,588,107 UART: [fwproc] Received Image of size 118548 bytes
2,956,537 UART: ROM Fatal Error: 0x000B002E
2,957,696 >>> mbox cmd response: failed
2,957,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,957,702 >>> mbox cmd response: failed
2,957,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,957,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,081 UART: [kat] SHA2-256
882,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,127 UART: [kat] ++
886,279 UART: [kat] sha1
890,545 UART: [kat] SHA2-256
892,483 UART: [kat] SHA2-384
895,164 UART: [kat] SHA2-512-ACC
897,065 UART: [kat] ECC-384
902,764 UART: [kat] HMAC-384Kdf
907,164 UART: [kat] LMS
1,475,360 UART: [kat] --
1,476,193 UART: [cold-reset] ++
1,476,635 UART: [fht] Storing FHT @ 0x50003400
1,479,274 UART: [idev] ++
1,479,442 UART: [idev] CDI.KEYID = 6
1,479,802 UART: [idev] SUBJECT.KEYID = 7
1,480,226 UART: [idev] UDS.KEYID = 0
1,480,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,232 UART: [idev] Erasing UDS.KEYID = 0
1,504,484 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,190 UART: [idev] --
1,514,289 UART: [ldev] ++
1,514,457 UART: [ldev] CDI.KEYID = 6
1,514,820 UART: [ldev] SUBJECT.KEYID = 5
1,515,246 UART: [ldev] AUTHORITY.KEYID = 7
1,515,709 UART: [ldev] FE.KEYID = 1
1,520,943 UART: [ldev] Erasing FE.KEYID = 1
1,546,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,186 UART: [ldev] --
1,585,517 UART: [fwproc] Waiting for Commands...
1,586,374 UART: [fwproc] Received command 0x46574c44
1,587,165 UART: [fwproc] Received Image of size 118548 bytes
2,931,980 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,034 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,252 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,587 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,810,229 >>> mbox cmd response: failed
2,810,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,810,235 >>> mbox cmd response: failed
2,810,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,810,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,365 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Manufacturing
85,842 UART: [state] DebugLocked = No
86,366 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,938 UART: [kat] SHA2-256
881,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,984 UART: [kat] ++
886,136 UART: [kat] sha1
890,494 UART: [kat] SHA2-256
892,432 UART: [kat] SHA2-384
895,067 UART: [kat] SHA2-512-ACC
896,968 UART: [kat] ECC-384
902,651 UART: [kat] HMAC-384Kdf
907,455 UART: [kat] LMS
1,475,651 UART: [kat] --
1,476,682 UART: [cold-reset] ++
1,477,240 UART: [fht] Storing FHT @ 0x50003400
1,480,027 UART: [idev] ++
1,480,195 UART: [idev] CDI.KEYID = 6
1,480,555 UART: [idev] SUBJECT.KEYID = 7
1,480,979 UART: [idev] UDS.KEYID = 0
1,481,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,929 UART: [idev] Erasing UDS.KEYID = 0
1,505,691 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,163 UART: [idev] --
1,515,206 UART: [ldev] ++
1,515,374 UART: [ldev] CDI.KEYID = 6
1,515,737 UART: [ldev] SUBJECT.KEYID = 5
1,516,163 UART: [ldev] AUTHORITY.KEYID = 7
1,516,626 UART: [ldev] FE.KEYID = 1
1,521,982 UART: [ldev] Erasing FE.KEYID = 1
1,547,135 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,767 UART: [ldev] --
1,586,270 UART: [fwproc] Waiting for Commands...
1,587,009 UART: [fwproc] Received command 0x46574c44
1,587,800 UART: [fwproc] Received Image of size 118548 bytes
2,956,194 UART: ROM Fatal Error: 0x000B002E
2,957,353 >>> mbox cmd response: failed
2,957,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,957,359 >>> mbox cmd response: failed
2,957,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,957,365 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,488 UART: [state] DebugLocked = No
87,224 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,762 UART: [kat] SHA2-256
882,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,808 UART: [kat] ++
886,960 UART: [kat] sha1
891,246 UART: [kat] SHA2-256
893,184 UART: [kat] SHA2-384
896,025 UART: [kat] SHA2-512-ACC
897,926 UART: [kat] ECC-384
903,279 UART: [kat] HMAC-384Kdf
907,973 UART: [kat] LMS
1,476,169 UART: [kat] --
1,477,104 UART: [cold-reset] ++
1,477,438 UART: [fht] Storing FHT @ 0x50003400
1,480,111 UART: [idev] ++
1,480,279 UART: [idev] CDI.KEYID = 6
1,480,639 UART: [idev] SUBJECT.KEYID = 7
1,481,063 UART: [idev] UDS.KEYID = 0
1,481,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,983 UART: [idev] Erasing UDS.KEYID = 0
1,506,051 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,697 UART: [idev] --
1,515,862 UART: [ldev] ++
1,516,030 UART: [ldev] CDI.KEYID = 6
1,516,393 UART: [ldev] SUBJECT.KEYID = 5
1,516,819 UART: [ldev] AUTHORITY.KEYID = 7
1,517,282 UART: [ldev] FE.KEYID = 1
1,522,648 UART: [ldev] Erasing FE.KEYID = 1
1,547,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,113 UART: [ldev] --
1,586,592 UART: [fwproc] Waiting for Commands...
1,587,425 UART: [fwproc] Received command 0x46574c44
1,588,216 UART: [fwproc] Received Image of size 118548 bytes
2,931,855 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,217 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,648 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,810,112 >>> mbox cmd response: failed
2,810,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,810,118 >>> mbox cmd response: failed
2,810,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,810,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,926 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Manufacturing
86,025 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
88,048 UART: [kat] SHA2-256
891,598 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
900,222 UART: [kat] SHA2-256
902,162 UART: [kat] SHA2-384
905,017 UART: [kat] SHA2-512-ACC
906,918 UART: [kat] ECC-384
916,495 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,600 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,174,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,289 UART: [idev] Erasing UDS.KEYID = 0
1,199,477 UART: [idev] Sha1 KeyId Algorithm
1,208,339 UART: [idev] --
1,209,290 UART: [ldev] ++
1,209,458 UART: [ldev] CDI.KEYID = 6
1,209,822 UART: [ldev] SUBJECT.KEYID = 5
1,210,249 UART: [ldev] AUTHORITY.KEYID = 7
1,210,712 UART: [ldev] FE.KEYID = 1
1,215,924 UART: [ldev] Erasing FE.KEYID = 1
1,241,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,582 UART: [ldev] --
1,281,013 UART: [fwproc] Wait for Commands...
1,281,792 UART: [fwproc] Recv command 0x46574c44
1,282,525 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,705 UART: ROM Fatal Error: 0x000B002E
2,652,864 >>> mbox cmd response: failed
2,652,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,870 >>> mbox cmd response: failed
2,652,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [kat] SHA2-256
891,498 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
915,841 UART: [kat] HMAC-384Kdf
920,429 UART: [kat] LMS
1,168,741 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,176 UART: [fht] FHT @ 0x50003400
1,172,884 UART: [idev] ++
1,173,052 UART: [idev] CDI.KEYID = 6
1,173,413 UART: [idev] SUBJECT.KEYID = 7
1,173,838 UART: [idev] UDS.KEYID = 0
1,174,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,805 UART: [idev] Erasing UDS.KEYID = 0
1,198,729 UART: [idev] Sha1 KeyId Algorithm
1,207,537 UART: [idev] --
1,208,690 UART: [ldev] ++
1,208,858 UART: [ldev] CDI.KEYID = 6
1,209,222 UART: [ldev] SUBJECT.KEYID = 5
1,209,649 UART: [ldev] AUTHORITY.KEYID = 7
1,210,112 UART: [ldev] FE.KEYID = 1
1,215,674 UART: [ldev] Erasing FE.KEYID = 1
1,242,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,182 UART: [ldev] --
1,281,519 UART: [fwproc] Wait for Commands...
1,282,314 UART: [fwproc] Recv command 0x46574c44
1,283,047 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,780 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,955 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,360 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,955 >>> mbox cmd response: failed
2,507,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,507,961 >>> mbox cmd response: failed
2,507,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,507,967 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,111 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Manufacturing
86,460 UART: [state] DebugLocked = No
87,180 UART: [state] WD Timer not started. Device not locked for debugging
88,431 UART: [kat] SHA2-256
891,981 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,085 UART: [kat] ++
896,237 UART: [kat] sha1
900,569 UART: [kat] SHA2-256
902,509 UART: [kat] SHA2-384
905,198 UART: [kat] SHA2-512-ACC
907,099 UART: [kat] ECC-384
916,968 UART: [kat] HMAC-384Kdf
921,656 UART: [kat] LMS
1,169,968 UART: [kat] --
1,170,921 UART: [cold-reset] ++
1,171,401 UART: [fht] FHT @ 0x50003400
1,173,947 UART: [idev] ++
1,174,115 UART: [idev] CDI.KEYID = 6
1,174,476 UART: [idev] SUBJECT.KEYID = 7
1,174,901 UART: [idev] UDS.KEYID = 0
1,175,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,076 UART: [idev] Erasing UDS.KEYID = 0
1,200,000 UART: [idev] Sha1 KeyId Algorithm
1,208,816 UART: [idev] --
1,209,871 UART: [ldev] ++
1,210,039 UART: [ldev] CDI.KEYID = 6
1,210,403 UART: [ldev] SUBJECT.KEYID = 5
1,210,830 UART: [ldev] AUTHORITY.KEYID = 7
1,211,293 UART: [ldev] FE.KEYID = 1
1,216,857 UART: [ldev] Erasing FE.KEYID = 1
1,243,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,739 UART: [ldev] --
1,283,006 UART: [fwproc] Wait for Commands...
1,283,611 UART: [fwproc] Recv command 0x46574c44
1,284,344 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,158 UART: ROM Fatal Error: 0x000B002E
2,655,317 >>> mbox cmd response: failed
2,655,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,323 >>> mbox cmd response: failed
2,655,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,329 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,885 UART: [state] LifecycleState = Unprovisioned
86,540 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,397 UART: [kat] SHA2-256
891,947 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,051 UART: [kat] ++
896,203 UART: [kat] sha1
900,397 UART: [kat] SHA2-256
902,337 UART: [kat] SHA2-384
905,084 UART: [kat] SHA2-512-ACC
906,985 UART: [kat] ECC-384
916,822 UART: [kat] HMAC-384Kdf
921,478 UART: [kat] LMS
1,169,790 UART: [kat] --
1,170,481 UART: [cold-reset] ++
1,170,955 UART: [fht] FHT @ 0x50003400
1,173,515 UART: [idev] ++
1,173,683 UART: [idev] CDI.KEYID = 6
1,174,044 UART: [idev] SUBJECT.KEYID = 7
1,174,469 UART: [idev] UDS.KEYID = 0
1,174,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,376 UART: [idev] Erasing UDS.KEYID = 0
1,199,578 UART: [idev] Sha1 KeyId Algorithm
1,208,350 UART: [idev] --
1,209,391 UART: [ldev] ++
1,209,559 UART: [ldev] CDI.KEYID = 6
1,209,923 UART: [ldev] SUBJECT.KEYID = 5
1,210,350 UART: [ldev] AUTHORITY.KEYID = 7
1,210,813 UART: [ldev] FE.KEYID = 1
1,215,957 UART: [ldev] Erasing FE.KEYID = 1
1,242,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,207 UART: [ldev] --
1,281,634 UART: [fwproc] Wait for Commands...
1,282,381 UART: [fwproc] Recv command 0x46574c44
1,283,114 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,661 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,836 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,167 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,644 >>> mbox cmd response: failed
2,508,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,650 >>> mbox cmd response: failed
2,508,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,656 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,670 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Manufacturing
85,747 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
893,258 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,383 UART: [kat] ++
897,535 UART: [kat] sha1
901,813 UART: [kat] SHA2-256
903,753 UART: [kat] SHA2-384
906,518 UART: [kat] SHA2-512-ACC
908,419 UART: [kat] ECC-384
918,040 UART: [kat] HMAC-384Kdf
922,508 UART: [kat] LMS
1,170,836 UART: [kat] --
1,171,905 UART: [cold-reset] ++
1,172,469 UART: [fht] FHT @ 0x50003400
1,175,150 UART: [idev] ++
1,175,318 UART: [idev] CDI.KEYID = 6
1,175,678 UART: [idev] SUBJECT.KEYID = 7
1,176,102 UART: [idev] UDS.KEYID = 0
1,176,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,402 UART: [idev] Erasing UDS.KEYID = 0
1,202,207 UART: [idev] Sha1 KeyId Algorithm
1,210,659 UART: [idev] --
1,211,729 UART: [ldev] ++
1,211,897 UART: [ldev] CDI.KEYID = 6
1,212,260 UART: [ldev] SUBJECT.KEYID = 5
1,212,686 UART: [ldev] AUTHORITY.KEYID = 7
1,213,149 UART: [ldev] FE.KEYID = 1
1,218,151 UART: [ldev] Erasing FE.KEYID = 1
1,244,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,715 UART: [ldev] --
1,284,032 UART: [fwproc] Wait for Commands...
1,284,680 UART: [fwproc] Recv command 0x46574c44
1,285,408 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,222 UART: ROM Fatal Error: 0x000B002E
2,655,381 >>> mbox cmd response: failed
2,655,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,387 >>> mbox cmd response: failed
2,655,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,393 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
893,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,453 UART: [kat] ++
897,605 UART: [kat] sha1
901,887 UART: [kat] SHA2-256
903,827 UART: [kat] SHA2-384
906,630 UART: [kat] SHA2-512-ACC
908,531 UART: [kat] ECC-384
918,442 UART: [kat] HMAC-384Kdf
922,856 UART: [kat] LMS
1,171,184 UART: [kat] --
1,171,957 UART: [cold-reset] ++
1,172,527 UART: [fht] FHT @ 0x50003400
1,175,272 UART: [idev] ++
1,175,440 UART: [idev] CDI.KEYID = 6
1,175,800 UART: [idev] SUBJECT.KEYID = 7
1,176,224 UART: [idev] UDS.KEYID = 0
1,176,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,376 UART: [idev] Erasing UDS.KEYID = 0
1,200,979 UART: [idev] Sha1 KeyId Algorithm
1,209,509 UART: [idev] --
1,210,531 UART: [ldev] ++
1,210,699 UART: [ldev] CDI.KEYID = 6
1,211,062 UART: [ldev] SUBJECT.KEYID = 5
1,211,488 UART: [ldev] AUTHORITY.KEYID = 7
1,211,951 UART: [ldev] FE.KEYID = 1
1,217,283 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,185 UART: [ldev] --
1,282,664 UART: [fwproc] Wait for Commands...
1,283,414 UART: [fwproc] Recv command 0x46574c44
1,284,142 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,997 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,167 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,346 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,844 >>> mbox cmd response: failed
2,508,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,850 >>> mbox cmd response: failed
2,508,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,499 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Manufacturing
86,002 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
893,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,550 UART: [kat] ++
897,702 UART: [kat] sha1
901,886 UART: [kat] SHA2-256
903,826 UART: [kat] SHA2-384
906,573 UART: [kat] SHA2-512-ACC
908,474 UART: [kat] ECC-384
918,023 UART: [kat] HMAC-384Kdf
922,737 UART: [kat] LMS
1,171,065 UART: [kat] --
1,172,058 UART: [cold-reset] ++
1,172,504 UART: [fht] FHT @ 0x50003400
1,175,141 UART: [idev] ++
1,175,309 UART: [idev] CDI.KEYID = 6
1,175,669 UART: [idev] SUBJECT.KEYID = 7
1,176,093 UART: [idev] UDS.KEYID = 0
1,176,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,191 UART: [idev] Erasing UDS.KEYID = 0
1,201,648 UART: [idev] Sha1 KeyId Algorithm
1,210,064 UART: [idev] --
1,211,146 UART: [ldev] ++
1,211,314 UART: [ldev] CDI.KEYID = 6
1,211,677 UART: [ldev] SUBJECT.KEYID = 5
1,212,103 UART: [ldev] AUTHORITY.KEYID = 7
1,212,566 UART: [ldev] FE.KEYID = 1
1,217,604 UART: [ldev] Erasing FE.KEYID = 1
1,244,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,426 UART: [ldev] --
1,283,773 UART: [fwproc] Wait for Commands...
1,284,503 UART: [fwproc] Recv command 0x46574c44
1,285,231 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,877 UART: ROM Fatal Error: 0x000B002E
2,656,036 >>> mbox cmd response: failed
2,656,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,656,042 >>> mbox cmd response: failed
2,656,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,656,048 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,019 UART: [state] LifecycleState = Unprovisioned
85,674 UART: [state] DebugLocked = No
86,308 UART: [state] WD Timer not started. Device not locked for debugging
87,505 UART: [kat] SHA2-256
893,155 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,280 UART: [kat] ++
897,432 UART: [kat] sha1
901,712 UART: [kat] SHA2-256
903,652 UART: [kat] SHA2-384
906,519 UART: [kat] SHA2-512-ACC
908,420 UART: [kat] ECC-384
918,673 UART: [kat] HMAC-384Kdf
923,345 UART: [kat] LMS
1,171,673 UART: [kat] --
1,172,774 UART: [cold-reset] ++
1,173,126 UART: [fht] FHT @ 0x50003400
1,175,613 UART: [idev] ++
1,175,781 UART: [idev] CDI.KEYID = 6
1,176,141 UART: [idev] SUBJECT.KEYID = 7
1,176,565 UART: [idev] UDS.KEYID = 0
1,176,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,153 UART: [idev] Erasing UDS.KEYID = 0
1,201,114 UART: [idev] Sha1 KeyId Algorithm
1,209,490 UART: [idev] --
1,210,440 UART: [ldev] ++
1,210,608 UART: [ldev] CDI.KEYID = 6
1,210,971 UART: [ldev] SUBJECT.KEYID = 5
1,211,397 UART: [ldev] AUTHORITY.KEYID = 7
1,211,860 UART: [ldev] FE.KEYID = 1
1,217,170 UART: [ldev] Erasing FE.KEYID = 1
1,243,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,624 UART: [ldev] --
1,283,123 UART: [fwproc] Wait for Commands...
1,283,859 UART: [fwproc] Recv command 0x46574c44
1,284,587 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,374 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,544 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,725 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,463 >>> mbox cmd response: failed
2,508,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,469 >>> mbox cmd response: failed
2,508,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,475 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,628 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
3,443,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,361,783 >>> mbox cmd response: failed
12,362,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,362,717 >>> mbox cmd response: failed
12,362,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,363,333 >>> mbox cmd response: failed
Initializing fuses
2,061,893 writing to cptra_bootfsm_go
5,502,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,325,501 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,446,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,360,150 >>> mbox cmd response: failed
12,360,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,361,084 >>> mbox cmd response: failed
12,361,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,361,664 >>> mbox cmd response: failed
Initializing fuses
2,062,588 writing to cptra_bootfsm_go
5,502,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,364,210 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,772,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,571,249 >>> mbox cmd response: failed
12,571,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,572,308 >>> mbox cmd response: failed
12,572,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,572,944 >>> mbox cmd response: failed
Initializing fuses
2,060,473 writing to cptra_bootfsm_go
11,073,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,773,770 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,782,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,579,507 >>> mbox cmd response: failed
12,580,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,580,449 >>> mbox cmd response: failed
12,580,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,581,015 >>> mbox cmd response: failed
Initializing fuses
2,062,014 writing to cptra_bootfsm_go
11,064,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,773,572 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,452,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,375,524 >>> mbox cmd response: failed
12,376,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,376,462 >>> mbox cmd response: failed
12,376,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,377,084 >>> mbox cmd response: failed
Initializing fuses
2,062,768 writing to cptra_bootfsm_go
5,505,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,337,898 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,450,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,382,637 >>> mbox cmd response: failed
12,383,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,383,546 >>> mbox cmd response: failed
12,383,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,384,118 >>> mbox cmd response: failed
Initializing fuses
2,062,824 writing to cptra_bootfsm_go
5,501,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,332,746 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,779,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,571,133 >>> mbox cmd response: failed
12,571,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,572,068 >>> mbox cmd response: failed
12,572,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,572,713 >>> mbox cmd response: failed
Initializing fuses
2,061,395 writing to cptra_bootfsm_go
11,061,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,765,959 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,783,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,570,277 >>> mbox cmd response: failed
12,571,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,571,591 >>> mbox cmd response: failed
12,571,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,572,168 >>> mbox cmd response: failed
Initializing fuses
2,067,991 writing to cptra_bootfsm_go
11,079,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,789,532 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,205,423 >>> mbox cmd response: failed
1,205,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,429 >>> mbox cmd response: failed
1,205,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,435 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,736 UART: [kat] SHA2-256
901,676 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,409 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,332 UART: [idev] ++
1,173,500 UART: [idev] CDI.KEYID = 6
1,173,861 UART: [idev] SUBJECT.KEYID = 7
1,174,286 UART: [idev] UDS.KEYID = 0
1,174,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,147 UART: [idev] Erasing UDS.KEYID = 0
1,198,537 UART: [idev] Sha1 KeyId Algorithm
1,207,439 UART: [idev] --
1,208,288 UART: [ldev] ++
1,208,456 UART: [ldev] CDI.KEYID = 6
1,208,820 UART: [ldev] SUBJECT.KEYID = 5
1,209,247 UART: [ldev] AUTHORITY.KEYID = 7
1,209,710 UART: [ldev] FE.KEYID = 1
1,214,896 UART: [ldev] Erasing FE.KEYID = 1
1,241,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,374 UART: [ldev] --
1,280,575 UART: [fwproc] Wait for Commands...
1,281,368 UART: [fwproc] Recv command 0x46574c44
1,282,101 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,572 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,747 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,982 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,204,325 >>> mbox cmd response: failed
1,204,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,331 >>> mbox cmd response: failed
1,204,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,649 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,205,684 >>> mbox cmd response: failed
1,205,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,690 >>> mbox cmd response: failed
1,205,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,696 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
915,760 UART: [kat] HMAC-384Kdf
920,164 UART: [kat] LMS
1,168,476 UART: [kat] --
1,169,463 UART: [cold-reset] ++
1,169,995 UART: [fht] FHT @ 0x50003400
1,172,659 UART: [idev] ++
1,172,827 UART: [idev] CDI.KEYID = 6
1,173,188 UART: [idev] SUBJECT.KEYID = 7
1,173,613 UART: [idev] UDS.KEYID = 0
1,173,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,642 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,334 UART: [idev] --
1,208,343 UART: [ldev] ++
1,208,511 UART: [ldev] CDI.KEYID = 6
1,208,875 UART: [ldev] SUBJECT.KEYID = 5
1,209,302 UART: [ldev] AUTHORITY.KEYID = 7
1,209,765 UART: [ldev] FE.KEYID = 1
1,214,963 UART: [ldev] Erasing FE.KEYID = 1
1,241,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,719 UART: [ldev] --
1,281,074 UART: [fwproc] Wait for Commands...
1,281,755 UART: [fwproc] Recv command 0x46574c44
1,282,488 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,355 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,530 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,807 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,206,914 >>> mbox cmd response: failed
1,206,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,920 >>> mbox cmd response: failed
1,206,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,926 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,638 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,207,249 >>> mbox cmd response: failed
1,207,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,255 >>> mbox cmd response: failed
1,207,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,261 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
892,978 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,103 UART: [kat] ++
897,255 UART: [kat] sha1
901,521 UART: [kat] SHA2-256
903,461 UART: [kat] SHA2-384
906,392 UART: [kat] SHA2-512-ACC
908,293 UART: [kat] ECC-384
917,902 UART: [kat] HMAC-384Kdf
922,512 UART: [kat] LMS
1,170,840 UART: [kat] --
1,171,859 UART: [cold-reset] ++
1,172,249 UART: [fht] FHT @ 0x50003400
1,174,896 UART: [idev] ++
1,175,064 UART: [idev] CDI.KEYID = 6
1,175,424 UART: [idev] SUBJECT.KEYID = 7
1,175,848 UART: [idev] UDS.KEYID = 0
1,176,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,046 UART: [idev] Erasing UDS.KEYID = 0
1,200,675 UART: [idev] Sha1 KeyId Algorithm
1,209,299 UART: [idev] --
1,210,335 UART: [ldev] ++
1,210,503 UART: [ldev] CDI.KEYID = 6
1,210,866 UART: [ldev] SUBJECT.KEYID = 5
1,211,292 UART: [ldev] AUTHORITY.KEYID = 7
1,211,755 UART: [ldev] FE.KEYID = 1
1,217,017 UART: [ldev] Erasing FE.KEYID = 1
1,242,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,669 UART: [ldev] --
1,282,032 UART: [fwproc] Wait for Commands...
1,282,736 UART: [fwproc] Recv command 0x46574c44
1,283,464 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,937 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,107 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,460 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,208,061 >>> mbox cmd response: failed
1,208,061 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,067 >>> mbox cmd response: failed
1,208,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,073 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,799 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,206,060 >>> mbox cmd response: failed
1,206,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,066 >>> mbox cmd response: failed
1,206,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
893,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,638 UART: [kat] ++
897,790 UART: [kat] sha1
902,070 UART: [kat] SHA2-256
904,010 UART: [kat] SHA2-384
906,687 UART: [kat] SHA2-512-ACC
908,588 UART: [kat] ECC-384
918,301 UART: [kat] HMAC-384Kdf
922,869 UART: [kat] LMS
1,171,197 UART: [kat] --
1,171,986 UART: [cold-reset] ++
1,172,358 UART: [fht] FHT @ 0x50003400
1,174,843 UART: [idev] ++
1,175,011 UART: [idev] CDI.KEYID = 6
1,175,371 UART: [idev] SUBJECT.KEYID = 7
1,175,795 UART: [idev] UDS.KEYID = 0
1,176,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,987 UART: [idev] Erasing UDS.KEYID = 0
1,200,880 UART: [idev] Sha1 KeyId Algorithm
1,209,162 UART: [idev] --
1,210,102 UART: [ldev] ++
1,210,270 UART: [ldev] CDI.KEYID = 6
1,210,633 UART: [ldev] SUBJECT.KEYID = 5
1,211,059 UART: [ldev] AUTHORITY.KEYID = 7
1,211,522 UART: [ldev] FE.KEYID = 1
1,216,874 UART: [ldev] Erasing FE.KEYID = 1
1,242,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,532 UART: [ldev] --
1,282,025 UART: [fwproc] Wait for Commands...
1,282,633 UART: [fwproc] Recv command 0x46574c44
1,283,361 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,668 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,838 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,163 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,207,270 >>> mbox cmd response: failed
1,207,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,276 >>> mbox cmd response: failed
1,207,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,282 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,502 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
192,055 UART:
192,432 UART: Running Caliptra ROM ...
193,516 UART:
193,660 UART: [state] CFI Enabled
261,365 UART: [state] LifecycleState = Unprovisioned
263,297 UART: [state] DebugLocked = No
264,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,342 UART: [kat] SHA2-256
440,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,535 UART: [kat] ++
451,013 UART: [kat] sha1
462,108 UART: [kat] SHA2-256
464,802 UART: [kat] SHA2-384
470,267 UART: [kat] SHA2-512-ACC
472,668 UART: [kat] ECC-384
2,768,203 UART: [kat] HMAC-384Kdf
2,799,169 UART: [kat] LMS
3,989,458 UART: [kat] --
3,993,166 UART: [cold-reset] ++
3,994,622 UART: [fht] Storing FHT @ 0x50003400
4,006,493 UART: [idev] ++
4,007,075 UART: [idev] CDI.KEYID = 6
4,008,002 UART: [idev] SUBJECT.KEYID = 7
4,009,332 UART: [idev] UDS.KEYID = 0
4,012,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,591 UART: [idev] Erasing UDS.KEYID = 0
7,346,443 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,009 UART: [idev] --
7,374,226 UART: [ldev] ++
7,374,823 UART: [ldev] CDI.KEYID = 6
7,375,714 UART: [ldev] SUBJECT.KEYID = 5
7,376,988 UART: [ldev] AUTHORITY.KEYID = 7
7,378,225 UART: [ldev] FE.KEYID = 1
7,423,385 UART: [ldev] Erasing FE.KEYID = 1
10,757,919 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,093,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,126,411 UART: [ldev] --
13,131,687 UART: [fwproc] Waiting for Commands...
13,134,587 UART: [fwproc] Received command 0x46574c44
13,136,791 UART: [fwproc] Received Image of size 118548 bytes
15,845,549 UART: ROM Fatal Error: 0x000B0012
15,849,083 >>> mbox cmd response: failed
15,849,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,849,814 >>> mbox cmd response: failed
15,850,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,850,521 >>> mbox cmd response: failed
Initializing fuses
2,059,180 writing to cptra_bootfsm_go
2,248,557 UART:
2,248,990 UART: Running Caliptra ROM ...
2,250,038 UART:
2,250,202 UART: [state] CFI Enabled
2,323,072 UART: [state] LifecycleState = Unprovisioned
2,325,050 UART: [state] DebugLocked = No
2,326,721 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,332,292 UART: [kat] SHA2-256
2,501,977 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,512,518 UART: [kat] ++
2,512,978 UART: [kat] sha1
2,523,219 UART: [kat] SHA2-256
2,525,917 UART: [kat] SHA2-384
2,532,396 UART: [kat] SHA2-512-ACC
2,534,752 UART: [kat] ECC-384
4,827,304 UART: [kat] HMAC-384Kdf
4,838,839 UART: [kat] LMS
6,029,168 UART: [kat] --
6,033,459 UART: [cold-reset] ++
6,034,861 UART: [fht] Storing FHT @ 0x50003400
6,047,329 UART: [idev] ++
6,047,904 UART: [idev] CDI.KEYID = 6
6,048,791 UART: [idev] SUBJECT.KEYID = 7
6,050,065 UART: [idev] UDS.KEYID = 0
6,052,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,201,814 UART: [idev] Erasing UDS.KEYID = 0
9,386,345 UART: [idev] Using Sha1 for KeyId Algorithm
9,408,869 UART: [idev] --
9,413,837 UART: [ldev] ++
9,414,409 UART: [ldev] CDI.KEYID = 6
9,415,383 UART: [ldev] SUBJECT.KEYID = 5
9,416,554 UART: [ldev] AUTHORITY.KEYID = 7
9,417,856 UART: [ldev] FE.KEYID = 1
9,462,901 UART: [ldev] Erasing FE.KEYID = 1
12,796,185 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,109,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,124,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,139,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,153,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,172,498 UART: [ldev] --
15,177,403 UART: [fwproc] Waiting for Commands...
15,179,666 UART: [fwproc] Received command 0x46574c44
15,181,856 UART: [fwproc] Received Image of size 118548 bytes
19,291,376 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,367,414 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,440,601 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,769,323 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,214 writing to cptra_bootfsm_go
3,806,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,586,900 >>> mbox cmd response: failed
15,587,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,587,923 >>> mbox cmd response: failed
15,588,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,588,565 >>> mbox cmd response: failed
Initializing fuses
2,064,884 writing to cptra_bootfsm_go
5,855,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,035,989 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,419 UART:
192,778 UART: Running Caliptra ROM ...
193,958 UART:
603,807 UART: [state] CFI Enabled
617,662 UART: [state] LifecycleState = Unprovisioned
619,625 UART: [state] DebugLocked = No
622,308 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,505 UART: [kat] SHA2-256
797,266 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,803 UART: [kat] ++
808,287 UART: [kat] sha1
820,250 UART: [kat] SHA2-256
822,993 UART: [kat] SHA2-384
828,813 UART: [kat] SHA2-512-ACC
831,156 UART: [kat] ECC-384
3,116,309 UART: [kat] HMAC-384Kdf
3,127,584 UART: [kat] LMS
4,317,736 UART: [kat] --
4,321,583 UART: [cold-reset] ++
4,324,113 UART: [fht] Storing FHT @ 0x50003400
4,336,792 UART: [idev] ++
4,337,392 UART: [idev] CDI.KEYID = 6
4,338,311 UART: [idev] SUBJECT.KEYID = 7
4,339,535 UART: [idev] UDS.KEYID = 0
4,342,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,524 UART: [idev] Erasing UDS.KEYID = 0
7,627,794 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,098 UART: [idev] --
7,651,540 UART: [ldev] ++
7,652,118 UART: [ldev] CDI.KEYID = 6
7,653,146 UART: [ldev] SUBJECT.KEYID = 5
7,654,311 UART: [ldev] AUTHORITY.KEYID = 7
7,655,549 UART: [ldev] FE.KEYID = 1
7,668,092 UART: [ldev] Erasing FE.KEYID = 1
10,960,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,113 UART: [ldev] --
13,318,084 UART: [fwproc] Waiting for Commands...
13,319,812 UART: [fwproc] Received command 0x46574c44
13,322,008 UART: [fwproc] Received Image of size 118548 bytes
16,028,244 UART: ROM Fatal Error: 0x000B0012
16,031,713 >>> mbox cmd response: failed
16,032,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,032,444 >>> mbox cmd response: failed
16,032,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,033,124 >>> mbox cmd response: failed
Initializing fuses
2,058,252 writing to cptra_bootfsm_go
2,247,572 UART:
2,247,920 UART: Running Caliptra ROM ...
2,248,972 UART:
4,421,158 UART: [state] CFI Enabled
4,438,378 UART: [state] LifecycleState = Unprovisioned
4,440,325 UART: [state] DebugLocked = No
4,441,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,446,415 UART: [kat] SHA2-256
4,616,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,626,724 UART: [kat] ++
4,627,214 UART: [kat] sha1
4,638,539 UART: [kat] SHA2-256
4,641,250 UART: [kat] SHA2-384
4,647,250 UART: [kat] SHA2-512-ACC
4,649,606 UART: [kat] ECC-384
6,934,754 UART: [kat] HMAC-384Kdf
6,947,007 UART: [kat] LMS
8,137,143 UART: [kat] --
8,141,171 UART: [cold-reset] ++
8,143,604 UART: [fht] Storing FHT @ 0x50003400
8,154,292 UART: [idev] ++
8,154,864 UART: [idev] CDI.KEYID = 6
8,155,887 UART: [idev] SUBJECT.KEYID = 7
8,157,063 UART: [idev] UDS.KEYID = 0
8,159,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,308,536 UART: [idev] Erasing UDS.KEYID = 0
11,447,124 UART: [idev] Using Sha1 for KeyId Algorithm
11,469,307 UART: [idev] --
11,474,065 UART: [ldev] ++
11,474,647 UART: [ldev] CDI.KEYID = 6
11,475,564 UART: [ldev] SUBJECT.KEYID = 5
11,477,003 UART: [ldev] AUTHORITY.KEYID = 7
11,478,145 UART: [ldev] FE.KEYID = 1
11,488,821 UART: [ldev] Erasing FE.KEYID = 1
14,775,747 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,068,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,082,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,097,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,111,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,130,352 UART: [ldev] --
17,134,866 UART: [fwproc] Waiting for Commands...
17,137,032 UART: [fwproc] Received command 0x46574c44
17,139,231 UART: [fwproc] Received Image of size 118548 bytes
21,240,157 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,311,392 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,384,612 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,713,686 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,529 writing to cptra_bootfsm_go
4,130,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,772,609 >>> mbox cmd response: failed
15,773,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,773,609 >>> mbox cmd response: failed
15,773,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,774,147 >>> mbox cmd response: failed
Initializing fuses
2,059,023 writing to cptra_bootfsm_go
8,221,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,256,832 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,327 UART:
192,703 UART: Running Caliptra ROM ...
193,841 UART:
193,995 UART: [state] CFI Enabled
263,569 UART: [state] LifecycleState = Unprovisioned
265,509 UART: [state] DebugLocked = No
267,712 UART: [state] WD Timer not started. Device not locked for debugging
271,827 UART: [kat] SHA2-256
451,464 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,268 UART: [kat] ++
462,833 UART: [kat] sha1
472,750 UART: [kat] SHA2-256
475,443 UART: [kat] SHA2-384
480,720 UART: [kat] SHA2-512-ACC
483,063 UART: [kat] ECC-384
2,946,569 UART: [kat] HMAC-384Kdf
2,969,615 UART: [kat] LMS
3,446,122 UART: [kat] --
3,450,688 UART: [cold-reset] ++
3,451,695 UART: [fht] FHT @ 0x50003400
3,463,283 UART: [idev] ++
3,463,859 UART: [idev] CDI.KEYID = 6
3,464,773 UART: [idev] SUBJECT.KEYID = 7
3,466,049 UART: [idev] UDS.KEYID = 0
3,468,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,785 UART: [idev] Erasing UDS.KEYID = 0
5,984,518 UART: [idev] Sha1 KeyId Algorithm
6,008,296 UART: [idev] --
6,013,877 UART: [ldev] ++
6,014,491 UART: [ldev] CDI.KEYID = 6
6,015,417 UART: [ldev] SUBJECT.KEYID = 5
6,016,590 UART: [ldev] AUTHORITY.KEYID = 7
6,017,832 UART: [ldev] FE.KEYID = 1
6,057,230 UART: [ldev] Erasing FE.KEYID = 1
8,566,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,233 UART: [ldev] --
10,372,343 UART: [fwproc] Wait for Commands...
10,374,507 UART: [fwproc] Recv command 0x46574c44
10,376,521 UART: [fwproc] Recv'd Img size: 118548 bytes
12,446,188 UART: ROM Fatal Error: 0x000B0012
12,449,430 >>> mbox cmd response: failed
12,449,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,183 >>> mbox cmd response: failed
12,450,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,758 >>> mbox cmd response: failed
Initializing fuses
2,060,153 writing to cptra_bootfsm_go
2,249,467 UART:
2,249,819 UART: Running Caliptra ROM ...
2,250,961 UART:
2,251,126 UART: [state] CFI Enabled
2,319,256 UART: [state] LifecycleState = Unprovisioned
2,321,216 UART: [state] DebugLocked = No
2,322,779 UART: [state] WD Timer not started. Device not locked for debugging
2,326,904 UART: [kat] SHA2-256
2,506,588 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,517,365 UART: [kat] ++
2,517,915 UART: [kat] sha1
2,528,647 UART: [kat] SHA2-256
2,531,335 UART: [kat] SHA2-384
2,535,939 UART: [kat] SHA2-512-ACC
2,538,355 UART: [kat] ECC-384
5,005,649 UART: [kat] HMAC-384Kdf
5,024,981 UART: [kat] LMS
5,501,450 UART: [kat] --
5,506,362 UART: [cold-reset] ++
5,507,765 UART: [fht] FHT @ 0x50003400
5,519,396 UART: [idev] ++
5,520,051 UART: [idev] CDI.KEYID = 6
5,520,972 UART: [idev] SUBJECT.KEYID = 7
5,522,194 UART: [idev] UDS.KEYID = 0
5,524,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,673,678 UART: [idev] Erasing UDS.KEYID = 0
8,041,344 UART: [idev] Sha1 KeyId Algorithm
8,064,800 UART: [idev] --
8,070,587 UART: [ldev] ++
8,071,222 UART: [ldev] CDI.KEYID = 6
8,072,138 UART: [ldev] SUBJECT.KEYID = 5
8,073,310 UART: [ldev] AUTHORITY.KEYID = 7
8,074,608 UART: [ldev] FE.KEYID = 1
8,112,543 UART: [ldev] Erasing FE.KEYID = 1
10,619,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,347,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,363,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,379,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,394,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,416,492 UART: [ldev] --
12,421,060 UART: [fwproc] Wait for Commands...
12,423,388 UART: [fwproc] Recv command 0x46574c44
12,425,376 UART: [fwproc] Recv'd Img size: 118548 bytes
15,906,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,982,834 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,055,857 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,383,864 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,451,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,335,419 >>> mbox cmd response: failed
12,335,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,336,340 >>> mbox cmd response: failed
12,336,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,336,908 >>> mbox cmd response: failed
Initializing fuses
2,060,263 writing to cptra_bootfsm_go
5,519,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,326,421 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,247 writing to cptra_bootfsm_go
193,449 UART:
193,814 UART: Running Caliptra ROM ...
194,982 UART:
604,744 UART: [state] CFI Enabled
616,251 UART: [state] LifecycleState = Unprovisioned
618,200 UART: [state] DebugLocked = No
620,233 UART: [state] WD Timer not started. Device not locked for debugging
623,598 UART: [kat] SHA2-256
803,259 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,012 UART: [kat] ++
814,467 UART: [kat] sha1
825,187 UART: [kat] SHA2-256
827,879 UART: [kat] SHA2-384
833,502 UART: [kat] SHA2-512-ACC
835,900 UART: [kat] ECC-384
3,280,803 UART: [kat] HMAC-384Kdf
3,292,522 UART: [kat] LMS
3,769,023 UART: [kat] --
3,771,353 UART: [cold-reset] ++
3,772,485 UART: [fht] FHT @ 0x50003400
3,782,499 UART: [idev] ++
3,783,077 UART: [idev] CDI.KEYID = 6
3,784,100 UART: [idev] SUBJECT.KEYID = 7
3,785,262 UART: [idev] UDS.KEYID = 0
3,787,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,072 UART: [idev] Erasing UDS.KEYID = 0
6,259,934 UART: [idev] Sha1 KeyId Algorithm
6,285,013 UART: [idev] --
6,288,419 UART: [ldev] ++
6,289,012 UART: [ldev] CDI.KEYID = 6
6,289,904 UART: [ldev] SUBJECT.KEYID = 5
6,291,123 UART: [ldev] AUTHORITY.KEYID = 7
6,292,418 UART: [ldev] FE.KEYID = 1
6,304,881 UART: [ldev] Erasing FE.KEYID = 1
8,788,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,517 UART: [ldev] --
10,583,208 UART: [fwproc] Wait for Commands...
10,585,365 UART: [fwproc] Recv command 0x46574c44
10,587,355 UART: [fwproc] Recv'd Img size: 118548 bytes
12,654,798 UART: ROM Fatal Error: 0x000B0012
12,658,035 >>> mbox cmd response: failed
12,658,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,658,726 >>> mbox cmd response: failed
12,659,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,659,413 >>> mbox cmd response: failed
Initializing fuses
2,061,658 writing to cptra_bootfsm_go
2,250,956 UART:
2,251,316 UART: Running Caliptra ROM ...
2,252,463 UART:
7,809,436 UART: [state] CFI Enabled
7,826,343 UART: [state] LifecycleState = Unprovisioned
7,828,288 UART: [state] DebugLocked = No
7,830,827 UART: [state] WD Timer not started. Device not locked for debugging
7,834,259 UART: [kat] SHA2-256
8,013,908 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,024,717 UART: [kat] ++
8,025,217 UART: [kat] sha1
8,036,760 UART: [kat] SHA2-256
8,039,467 UART: [kat] SHA2-384
8,046,271 UART: [kat] SHA2-512-ACC
8,048,636 UART: [kat] ECC-384
10,488,332 UART: [kat] HMAC-384Kdf
10,500,562 UART: [kat] LMS
10,977,051 UART: [kat] --
10,982,182 UART: [cold-reset] ++
10,983,631 UART: [fht] FHT @ 0x50003400
10,994,995 UART: [idev] ++
10,995,559 UART: [idev] CDI.KEYID = 6
10,996,499 UART: [idev] SUBJECT.KEYID = 7
10,997,767 UART: [idev] UDS.KEYID = 0
11,000,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,148,986 UART: [idev] Erasing UDS.KEYID = 0
13,474,909 UART: [idev] Sha1 KeyId Algorithm
13,498,902 UART: [idev] --
13,503,355 UART: [ldev] ++
13,503,987 UART: [ldev] CDI.KEYID = 6
13,504,882 UART: [ldev] SUBJECT.KEYID = 5
13,506,049 UART: [ldev] AUTHORITY.KEYID = 7
13,507,348 UART: [ldev] FE.KEYID = 1
13,519,589 UART: [ldev] Erasing FE.KEYID = 1
15,998,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,720,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,736,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,751,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,767,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,789,115 UART: [ldev] --
17,794,404 UART: [fwproc] Wait for Commands...
17,796,885 UART: [fwproc] Recv command 0x46574c44
17,798,884 UART: [fwproc] Recv'd Img size: 118548 bytes
21,284,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,367,015 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,440,090 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,767,593 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
3,786,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,554,101 >>> mbox cmd response: failed
12,554,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,555,076 >>> mbox cmd response: failed
12,555,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,555,653 >>> mbox cmd response: failed
Initializing fuses
2,059,759 writing to cptra_bootfsm_go
11,100,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,754,547 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,099 UART:
192,485 UART: Running Caliptra ROM ...
193,680 UART:
193,839 UART: [state] CFI Enabled
266,348 UART: [state] LifecycleState = Unprovisioned
268,780 UART: [state] DebugLocked = No
271,160 UART: [state] WD Timer not started. Device not locked for debugging
275,278 UART: [kat] SHA2-256
465,191 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,918 UART: [kat] ++
476,416 UART: [kat] sha1
487,298 UART: [kat] SHA2-256
490,311 UART: [kat] SHA2-384
496,783 UART: [kat] SHA2-512-ACC
499,356 UART: [kat] ECC-384
2,951,037 UART: [kat] HMAC-384Kdf
2,973,382 UART: [kat] LMS
3,505,118 UART: [kat] --
3,511,769 UART: [cold-reset] ++
3,513,493 UART: [fht] FHT @ 0x50003400
3,526,752 UART: [idev] ++
3,527,434 UART: [idev] CDI.KEYID = 6
3,528,355 UART: [idev] SUBJECT.KEYID = 7
3,529,577 UART: [idev] UDS.KEYID = 0
3,532,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,682,349 UART: [idev] Erasing UDS.KEYID = 0
6,031,844 UART: [idev] Sha1 KeyId Algorithm
6,053,737 UART: [idev] --
6,057,948 UART: [ldev] ++
6,058,639 UART: [ldev] CDI.KEYID = 6
6,059,533 UART: [ldev] SUBJECT.KEYID = 5
6,060,754 UART: [ldev] AUTHORITY.KEYID = 7
6,061,943 UART: [ldev] FE.KEYID = 1
6,102,550 UART: [ldev] Erasing FE.KEYID = 1
8,610,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,932 UART: [ldev] --
10,416,960 UART: [fwproc] Wait for Commands...
10,418,661 UART: [fwproc] Recv command 0x46574c44
10,420,985 UART: [fwproc] Recv'd Img size: 118548 bytes
12,496,539 UART: ROM Fatal Error: 0x000B0012
12,500,209 >>> mbox cmd response: failed
12,500,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,500,906 >>> mbox cmd response: failed
12,501,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,508 >>> mbox cmd response: failed
Initializing fuses
2,069,485 writing to cptra_bootfsm_go
2,258,817 UART:
2,259,177 UART: Running Caliptra ROM ...
2,260,238 UART:
2,260,411 UART: [state] CFI Enabled
2,338,454 UART: [state] LifecycleState = Unprovisioned
2,340,836 UART: [state] DebugLocked = No
2,342,943 UART: [state] WD Timer not started. Device not locked for debugging
2,347,038 UART: [kat] SHA2-256
2,536,930 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,547,675 UART: [kat] ++
2,548,138 UART: [kat] sha1
2,560,005 UART: [kat] SHA2-256
2,563,041 UART: [kat] SHA2-384
2,570,217 UART: [kat] SHA2-512-ACC
2,572,763 UART: [kat] ECC-384
5,020,011 UART: [kat] HMAC-384Kdf
5,045,091 UART: [kat] LMS
5,576,833 UART: [kat] --
5,581,743 UART: [cold-reset] ++
5,584,061 UART: [fht] FHT @ 0x50003400
5,595,769 UART: [idev] ++
5,596,459 UART: [idev] CDI.KEYID = 6
5,597,398 UART: [idev] SUBJECT.KEYID = 7
5,598,614 UART: [idev] UDS.KEYID = 0
5,600,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,750,474 UART: [idev] Erasing UDS.KEYID = 0
8,099,737 UART: [idev] Sha1 KeyId Algorithm
8,121,868 UART: [idev] --
8,126,196 UART: [ldev] ++
8,126,886 UART: [ldev] CDI.KEYID = 6
8,127,804 UART: [ldev] SUBJECT.KEYID = 5
8,128,973 UART: [ldev] AUTHORITY.KEYID = 7
8,130,156 UART: [ldev] FE.KEYID = 1
8,173,057 UART: [ldev] Erasing FE.KEYID = 1
10,680,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,412,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,428,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,443,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,458,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,479,386 UART: [ldev] --
12,485,142 UART: [fwproc] Wait for Commands...
12,487,396 UART: [fwproc] Recv command 0x46574c44
12,489,728 UART: [fwproc] Recv'd Img size: 118548 bytes
15,992,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,071,931 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,195,555 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,756,710 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,439,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,322,321 >>> mbox cmd response: failed
12,322,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,323,188 >>> mbox cmd response: failed
12,323,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,323,811 >>> mbox cmd response: failed
Initializing fuses
2,068,475 writing to cptra_bootfsm_go
5,495,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,879,658 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,384 UART:
192,748 UART: Running Caliptra ROM ...
193,875 UART:
603,419 UART: [state] CFI Enabled
616,394 UART: [state] LifecycleState = Unprovisioned
618,804 UART: [state] DebugLocked = No
621,132 UART: [state] WD Timer not started. Device not locked for debugging
625,312 UART: [kat] SHA2-256
815,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,948 UART: [kat] ++
826,551 UART: [kat] sha1
836,907 UART: [kat] SHA2-256
839,927 UART: [kat] SHA2-384
846,340 UART: [kat] SHA2-512-ACC
848,900 UART: [kat] ECC-384
3,292,828 UART: [kat] HMAC-384Kdf
3,305,727 UART: [kat] LMS
3,837,549 UART: [kat] --
3,841,553 UART: [cold-reset] ++
3,844,025 UART: [fht] FHT @ 0x50003400
3,856,258 UART: [idev] ++
3,856,947 UART: [idev] CDI.KEYID = 6
3,857,881 UART: [idev] SUBJECT.KEYID = 7
3,859,108 UART: [idev] UDS.KEYID = 0
3,861,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,921 UART: [idev] Erasing UDS.KEYID = 0
6,341,716 UART: [idev] Sha1 KeyId Algorithm
6,364,203 UART: [idev] --
6,368,905 UART: [ldev] ++
6,369,643 UART: [ldev] CDI.KEYID = 6
6,370,560 UART: [ldev] SUBJECT.KEYID = 5
6,371,906 UART: [ldev] AUTHORITY.KEYID = 7
6,373,123 UART: [ldev] FE.KEYID = 1
6,385,778 UART: [ldev] Erasing FE.KEYID = 1
8,859,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,885 UART: [ldev] --
10,651,885 UART: [fwproc] Wait for Commands...
10,654,317 UART: [fwproc] Recv command 0x46574c44
10,656,639 UART: [fwproc] Recv'd Img size: 118548 bytes
12,745,288 UART: ROM Fatal Error: 0x000B0012
12,748,905 >>> mbox cmd response: failed
12,749,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,749,586 >>> mbox cmd response: failed
12,750,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,750,387 >>> mbox cmd response: failed
Initializing fuses
2,065,850 writing to cptra_bootfsm_go
2,255,163 UART:
2,255,527 UART: Running Caliptra ROM ...
2,256,670 UART:
7,717,922 UART: [state] CFI Enabled
7,732,350 UART: [state] LifecycleState = Unprovisioned
7,734,705 UART: [state] DebugLocked = No
7,737,635 UART: [state] WD Timer not started. Device not locked for debugging
7,742,094 UART: [kat] SHA2-256
7,931,962 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,942,734 UART: [kat] ++
7,943,257 UART: [kat] sha1
7,955,877 UART: [kat] SHA2-256
7,958,906 UART: [kat] SHA2-384
7,965,446 UART: [kat] SHA2-512-ACC
7,968,029 UART: [kat] ECC-384
10,410,298 UART: [kat] HMAC-384Kdf
10,423,229 UART: [kat] LMS
10,955,084 UART: [kat] --
10,960,181 UART: [cold-reset] ++
10,961,906 UART: [fht] FHT @ 0x50003400
10,974,245 UART: [idev] ++
10,974,933 UART: [idev] CDI.KEYID = 6
10,975,848 UART: [idev] SUBJECT.KEYID = 7
10,977,069 UART: [idev] UDS.KEYID = 0
10,979,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,128,398 UART: [idev] Erasing UDS.KEYID = 0
13,452,066 UART: [idev] Sha1 KeyId Algorithm
13,473,031 UART: [idev] --
13,477,598 UART: [ldev] ++
13,478,290 UART: [ldev] CDI.KEYID = 6
13,479,203 UART: [ldev] SUBJECT.KEYID = 5
13,480,367 UART: [ldev] AUTHORITY.KEYID = 7
13,481,600 UART: [ldev] FE.KEYID = 1
13,492,806 UART: [ldev] Erasing FE.KEYID = 1
15,971,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,693,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,708,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,723,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,738,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,758,993 UART: [ldev] --
17,764,378 UART: [fwproc] Wait for Commands...
17,767,451 UART: [fwproc] Recv command 0x46574c44
17,769,771 UART: [fwproc] Recv'd Img size: 118548 bytes
21,260,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,335,817 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,459,442 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,019,629 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,754,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,517,187 >>> mbox cmd response: failed
12,517,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,518,118 >>> mbox cmd response: failed
12,518,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,518,701 >>> mbox cmd response: failed
Initializing fuses
2,062,375 writing to cptra_bootfsm_go
11,106,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,380,400 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,834 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,559 UART: [kat] SHA2-256
881,490 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,605 UART: [kat] ++
885,757 UART: [kat] sha1
889,957 UART: [kat] SHA2-256
891,895 UART: [kat] SHA2-384
894,608 UART: [kat] SHA2-512-ACC
896,509 UART: [kat] ECC-384
901,914 UART: [kat] HMAC-384Kdf
906,538 UART: [kat] LMS
1,474,734 UART: [kat] --
1,475,649 UART: [cold-reset] ++
1,476,043 UART: [fht] Storing FHT @ 0x50003400
1,478,890 UART: [idev] ++
1,479,058 UART: [idev] CDI.KEYID = 6
1,479,418 UART: [idev] SUBJECT.KEYID = 7
1,479,842 UART: [idev] UDS.KEYID = 0
1,480,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,004 UART: [idev] Erasing UDS.KEYID = 0
1,504,194 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,948 UART: [idev] --
1,513,995 UART: [ldev] ++
1,514,163 UART: [ldev] CDI.KEYID = 6
1,514,526 UART: [ldev] SUBJECT.KEYID = 5
1,514,952 UART: [ldev] AUTHORITY.KEYID = 7
1,515,415 UART: [ldev] FE.KEYID = 1
1,520,591 UART: [ldev] Erasing FE.KEYID = 1
1,546,012 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,228 UART: [ldev] --
1,585,679 UART: [fwproc] Waiting for Commands...
1,586,478 UART: [fwproc] Received command 0x46574c44
1,587,269 UART: [fwproc] Received Image of size 118548 bytes
1,633,028 UART: ROM Fatal Error: 0x000B0012
1,634,185 >>> mbox cmd response: failed
1,634,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,191 >>> mbox cmd response: failed
1,634,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,197 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,183 UART: [kat] SHA2-256
882,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,229 UART: [kat] ++
886,381 UART: [kat] sha1
890,671 UART: [kat] SHA2-256
892,609 UART: [kat] SHA2-384
895,378 UART: [kat] SHA2-512-ACC
897,279 UART: [kat] ECC-384
902,976 UART: [kat] HMAC-384Kdf
907,386 UART: [kat] LMS
1,475,582 UART: [kat] --
1,476,367 UART: [cold-reset] ++
1,476,831 UART: [fht] Storing FHT @ 0x50003400
1,479,534 UART: [idev] ++
1,479,702 UART: [idev] CDI.KEYID = 6
1,480,062 UART: [idev] SUBJECT.KEYID = 7
1,480,486 UART: [idev] UDS.KEYID = 0
1,480,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,482 UART: [idev] Erasing UDS.KEYID = 0
1,505,092 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,816 UART: [idev] --
1,514,767 UART: [ldev] ++
1,514,935 UART: [ldev] CDI.KEYID = 6
1,515,298 UART: [ldev] SUBJECT.KEYID = 5
1,515,724 UART: [ldev] AUTHORITY.KEYID = 7
1,516,187 UART: [ldev] FE.KEYID = 1
1,521,289 UART: [ldev] Erasing FE.KEYID = 1
1,546,888 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,534 UART: [ldev] --
1,586,029 UART: [fwproc] Waiting for Commands...
1,586,760 UART: [fwproc] Received command 0x46574c44
1,587,551 UART: [fwproc] Received Image of size 118548 bytes
2,931,522 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,718 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,936 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,157 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,208 >>> mbox cmd response: failed
1,488,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,214 >>> mbox cmd response: failed
1,488,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,525 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
87,066 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,590 UART: [kat] SHA2-256
882,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,636 UART: [kat] ++
886,788 UART: [kat] sha1
891,144 UART: [kat] SHA2-256
893,082 UART: [kat] SHA2-384
896,033 UART: [kat] SHA2-512-ACC
897,934 UART: [kat] ECC-384
903,657 UART: [kat] HMAC-384Kdf
908,133 UART: [kat] LMS
1,476,329 UART: [kat] --
1,477,330 UART: [cold-reset] ++
1,477,668 UART: [fht] Storing FHT @ 0x50003400
1,480,409 UART: [idev] ++
1,480,577 UART: [idev] CDI.KEYID = 6
1,480,937 UART: [idev] SUBJECT.KEYID = 7
1,481,361 UART: [idev] UDS.KEYID = 0
1,481,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,025 UART: [idev] Erasing UDS.KEYID = 0
1,505,851 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,559 UART: [idev] --
1,515,648 UART: [ldev] ++
1,515,816 UART: [ldev] CDI.KEYID = 6
1,516,179 UART: [ldev] SUBJECT.KEYID = 5
1,516,605 UART: [ldev] AUTHORITY.KEYID = 7
1,517,068 UART: [ldev] FE.KEYID = 1
1,522,620 UART: [ldev] Erasing FE.KEYID = 1
1,547,393 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,875 UART: [ldev] --
1,587,314 UART: [fwproc] Waiting for Commands...
1,588,173 UART: [fwproc] Received command 0x46574c44
1,588,964 UART: [fwproc] Received Image of size 118548 bytes
1,635,653 UART: ROM Fatal Error: 0x000B0012
1,636,810 >>> mbox cmd response: failed
1,636,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,816 >>> mbox cmd response: failed
1,636,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
86,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,542 UART: [kat] SHA2-256
882,473 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,588 UART: [kat] ++
886,740 UART: [kat] sha1
891,004 UART: [kat] SHA2-256
892,942 UART: [kat] SHA2-384
895,671 UART: [kat] SHA2-512-ACC
897,572 UART: [kat] ECC-384
903,149 UART: [kat] HMAC-384Kdf
907,707 UART: [kat] LMS
1,475,903 UART: [kat] --
1,476,790 UART: [cold-reset] ++
1,477,334 UART: [fht] Storing FHT @ 0x50003400
1,480,199 UART: [idev] ++
1,480,367 UART: [idev] CDI.KEYID = 6
1,480,727 UART: [idev] SUBJECT.KEYID = 7
1,481,151 UART: [idev] UDS.KEYID = 0
1,481,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,733 UART: [idev] Erasing UDS.KEYID = 0
1,505,281 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,887 UART: [idev] --
1,515,080 UART: [ldev] ++
1,515,248 UART: [ldev] CDI.KEYID = 6
1,515,611 UART: [ldev] SUBJECT.KEYID = 5
1,516,037 UART: [ldev] AUTHORITY.KEYID = 7
1,516,500 UART: [ldev] FE.KEYID = 1
1,521,902 UART: [ldev] Erasing FE.KEYID = 1
1,547,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,197 UART: [ldev] --
1,586,692 UART: [fwproc] Waiting for Commands...
1,587,549 UART: [fwproc] Received command 0x46574c44
1,588,340 UART: [fwproc] Received Image of size 118548 bytes
2,933,281 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,175 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,393 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,794 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,081 >>> mbox cmd response: failed
1,488,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,087 >>> mbox cmd response: failed
1,488,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,434 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,142 UART: [kat] ++
895,294 UART: [kat] sha1
899,392 UART: [kat] SHA2-256
901,332 UART: [kat] SHA2-384
904,015 UART: [kat] SHA2-512-ACC
905,916 UART: [kat] ECC-384
915,549 UART: [kat] HMAC-384Kdf
920,121 UART: [kat] LMS
1,168,433 UART: [kat] --
1,169,586 UART: [cold-reset] ++
1,169,998 UART: [fht] FHT @ 0x50003400
1,172,910 UART: [idev] ++
1,173,078 UART: [idev] CDI.KEYID = 6
1,173,439 UART: [idev] SUBJECT.KEYID = 7
1,173,864 UART: [idev] UDS.KEYID = 0
1,174,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,731 UART: [idev] Erasing UDS.KEYID = 0
1,198,665 UART: [idev] Sha1 KeyId Algorithm
1,207,753 UART: [idev] --
1,208,814 UART: [ldev] ++
1,208,982 UART: [ldev] CDI.KEYID = 6
1,209,346 UART: [ldev] SUBJECT.KEYID = 5
1,209,773 UART: [ldev] AUTHORITY.KEYID = 7
1,210,236 UART: [ldev] FE.KEYID = 1
1,215,388 UART: [ldev] Erasing FE.KEYID = 1
1,242,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,310 UART: [ldev] --
1,281,751 UART: [fwproc] Wait for Commands...
1,282,378 UART: [fwproc] Recv command 0x46574c44
1,283,111 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,456 UART: ROM Fatal Error: 0x000B0012
1,331,613 >>> mbox cmd response: failed
1,331,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,619 >>> mbox cmd response: failed
1,331,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,625 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,332 UART: [kat] ++
895,484 UART: [kat] sha1
899,930 UART: [kat] SHA2-256
901,870 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
915,835 UART: [kat] HMAC-384Kdf
920,415 UART: [kat] LMS
1,168,727 UART: [kat] --
1,169,500 UART: [cold-reset] ++
1,170,020 UART: [fht] FHT @ 0x50003400
1,172,614 UART: [idev] ++
1,172,782 UART: [idev] CDI.KEYID = 6
1,173,143 UART: [idev] SUBJECT.KEYID = 7
1,173,568 UART: [idev] UDS.KEYID = 0
1,173,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,689 UART: [idev] Erasing UDS.KEYID = 0
1,198,837 UART: [idev] Sha1 KeyId Algorithm
1,207,875 UART: [idev] --
1,208,974 UART: [ldev] ++
1,209,142 UART: [ldev] CDI.KEYID = 6
1,209,506 UART: [ldev] SUBJECT.KEYID = 5
1,209,933 UART: [ldev] AUTHORITY.KEYID = 7
1,210,396 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,632 UART: [ldev] --
1,280,941 UART: [fwproc] Wait for Commands...
1,281,732 UART: [fwproc] Recv command 0x46574c44
1,282,465 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,182 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,357 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,552 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,203 >>> mbox cmd response: failed
1,185,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,209 >>> mbox cmd response: failed
1,185,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,215 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,601 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
916,744 UART: [kat] HMAC-384Kdf
921,554 UART: [kat] LMS
1,169,866 UART: [kat] --
1,170,765 UART: [cold-reset] ++
1,171,285 UART: [fht] FHT @ 0x50003400
1,173,889 UART: [idev] ++
1,174,057 UART: [idev] CDI.KEYID = 6
1,174,418 UART: [idev] SUBJECT.KEYID = 7
1,174,843 UART: [idev] UDS.KEYID = 0
1,175,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,388 UART: [idev] Erasing UDS.KEYID = 0
1,200,414 UART: [idev] Sha1 KeyId Algorithm
1,209,322 UART: [idev] --
1,210,275 UART: [ldev] ++
1,210,443 UART: [ldev] CDI.KEYID = 6
1,210,807 UART: [ldev] SUBJECT.KEYID = 5
1,211,234 UART: [ldev] AUTHORITY.KEYID = 7
1,211,697 UART: [ldev] FE.KEYID = 1
1,216,955 UART: [ldev] Erasing FE.KEYID = 1
1,243,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,459 UART: [ldev] --
1,282,862 UART: [fwproc] Wait for Commands...
1,283,447 UART: [fwproc] Recv command 0x46574c44
1,284,180 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,912 UART: ROM Fatal Error: 0x000B0012
1,332,069 >>> mbox cmd response: failed
1,332,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,075 >>> mbox cmd response: failed
1,332,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,081 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,141 UART: [kat] SHA2-256
891,691 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,795 UART: [kat] ++
895,947 UART: [kat] sha1
900,301 UART: [kat] SHA2-256
902,241 UART: [kat] SHA2-384
905,032 UART: [kat] SHA2-512-ACC
906,933 UART: [kat] ECC-384
917,118 UART: [kat] HMAC-384Kdf
921,714 UART: [kat] LMS
1,170,026 UART: [kat] --
1,170,841 UART: [cold-reset] ++
1,171,375 UART: [fht] FHT @ 0x50003400
1,174,097 UART: [idev] ++
1,174,265 UART: [idev] CDI.KEYID = 6
1,174,626 UART: [idev] SUBJECT.KEYID = 7
1,175,051 UART: [idev] UDS.KEYID = 0
1,175,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,960 UART: [idev] Erasing UDS.KEYID = 0
1,200,068 UART: [idev] Sha1 KeyId Algorithm
1,208,892 UART: [idev] --
1,209,951 UART: [ldev] ++
1,210,119 UART: [ldev] CDI.KEYID = 6
1,210,483 UART: [ldev] SUBJECT.KEYID = 5
1,210,910 UART: [ldev] AUTHORITY.KEYID = 7
1,211,373 UART: [ldev] FE.KEYID = 1
1,216,805 UART: [ldev] Erasing FE.KEYID = 1
1,243,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,751 UART: [ldev] --
1,283,016 UART: [fwproc] Wait for Commands...
1,283,589 UART: [fwproc] Recv command 0x46574c44
1,284,322 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,117 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,292 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,589 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,294 >>> mbox cmd response: failed
1,186,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,300 >>> mbox cmd response: failed
1,186,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,306 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,734 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
893,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,277 UART: [kat] ++
897,429 UART: [kat] sha1
901,627 UART: [kat] SHA2-256
903,567 UART: [kat] SHA2-384
906,234 UART: [kat] SHA2-512-ACC
908,135 UART: [kat] ECC-384
917,890 UART: [kat] HMAC-384Kdf
922,564 UART: [kat] LMS
1,170,892 UART: [kat] --
1,171,683 UART: [cold-reset] ++
1,172,031 UART: [fht] FHT @ 0x50003400
1,174,744 UART: [idev] ++
1,174,912 UART: [idev] CDI.KEYID = 6
1,175,272 UART: [idev] SUBJECT.KEYID = 7
1,175,696 UART: [idev] UDS.KEYID = 0
1,176,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,502 UART: [idev] Erasing UDS.KEYID = 0
1,200,483 UART: [idev] Sha1 KeyId Algorithm
1,208,817 UART: [idev] --
1,210,037 UART: [ldev] ++
1,210,205 UART: [ldev] CDI.KEYID = 6
1,210,568 UART: [ldev] SUBJECT.KEYID = 5
1,210,994 UART: [ldev] AUTHORITY.KEYID = 7
1,211,457 UART: [ldev] FE.KEYID = 1
1,216,589 UART: [ldev] Erasing FE.KEYID = 1
1,243,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,683 UART: [ldev] --
1,283,114 UART: [fwproc] Wait for Commands...
1,283,914 UART: [fwproc] Recv command 0x46574c44
1,284,642 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,285 UART: ROM Fatal Error: 0x000B0012
1,332,442 >>> mbox cmd response: failed
1,332,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,448 >>> mbox cmd response: failed
1,332,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,454 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
893,306 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,431 UART: [kat] ++
897,583 UART: [kat] sha1
902,015 UART: [kat] SHA2-256
903,955 UART: [kat] SHA2-384
906,706 UART: [kat] SHA2-512-ACC
908,607 UART: [kat] ECC-384
918,488 UART: [kat] HMAC-384Kdf
923,298 UART: [kat] LMS
1,171,626 UART: [kat] --
1,172,415 UART: [cold-reset] ++
1,172,937 UART: [fht] FHT @ 0x50003400
1,175,800 UART: [idev] ++
1,175,968 UART: [idev] CDI.KEYID = 6
1,176,328 UART: [idev] SUBJECT.KEYID = 7
1,176,752 UART: [idev] UDS.KEYID = 0
1,177,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,622 UART: [idev] Erasing UDS.KEYID = 0
1,201,449 UART: [idev] Sha1 KeyId Algorithm
1,209,815 UART: [idev] --
1,211,031 UART: [ldev] ++
1,211,199 UART: [ldev] CDI.KEYID = 6
1,211,562 UART: [ldev] SUBJECT.KEYID = 5
1,211,988 UART: [ldev] AUTHORITY.KEYID = 7
1,212,451 UART: [ldev] FE.KEYID = 1
1,217,633 UART: [ldev] Erasing FE.KEYID = 1
1,244,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,397 UART: [ldev] --
1,282,836 UART: [fwproc] Wait for Commands...
1,283,422 UART: [fwproc] Recv command 0x46574c44
1,284,150 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,795 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,965 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,224 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,393 >>> mbox cmd response: failed
1,186,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,399 >>> mbox cmd response: failed
1,186,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,245 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
893,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,556 UART: [kat] ++
897,708 UART: [kat] sha1
902,006 UART: [kat] SHA2-256
903,946 UART: [kat] SHA2-384
906,861 UART: [kat] SHA2-512-ACC
908,762 UART: [kat] ECC-384
918,531 UART: [kat] HMAC-384Kdf
923,001 UART: [kat] LMS
1,171,329 UART: [kat] --
1,172,064 UART: [cold-reset] ++
1,172,424 UART: [fht] FHT @ 0x50003400
1,175,251 UART: [idev] ++
1,175,419 UART: [idev] CDI.KEYID = 6
1,175,779 UART: [idev] SUBJECT.KEYID = 7
1,176,203 UART: [idev] UDS.KEYID = 0
1,176,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,341 UART: [idev] Erasing UDS.KEYID = 0
1,202,152 UART: [idev] Sha1 KeyId Algorithm
1,210,634 UART: [idev] --
1,211,748 UART: [ldev] ++
1,211,916 UART: [ldev] CDI.KEYID = 6
1,212,279 UART: [ldev] SUBJECT.KEYID = 5
1,212,705 UART: [ldev] AUTHORITY.KEYID = 7
1,213,168 UART: [ldev] FE.KEYID = 1
1,218,172 UART: [ldev] Erasing FE.KEYID = 1
1,244,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,658 UART: [ldev] --
1,284,099 UART: [fwproc] Wait for Commands...
1,284,717 UART: [fwproc] Recv command 0x46574c44
1,285,445 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,432 UART: ROM Fatal Error: 0x000B0012
1,333,589 >>> mbox cmd response: failed
1,333,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,595 >>> mbox cmd response: failed
1,333,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
893,279 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,404 UART: [kat] ++
897,556 UART: [kat] sha1
901,830 UART: [kat] SHA2-256
903,770 UART: [kat] SHA2-384
906,477 UART: [kat] SHA2-512-ACC
908,378 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
922,981 UART: [kat] LMS
1,171,309 UART: [kat] --
1,172,158 UART: [cold-reset] ++
1,172,514 UART: [fht] FHT @ 0x50003400
1,175,053 UART: [idev] ++
1,175,221 UART: [idev] CDI.KEYID = 6
1,175,581 UART: [idev] SUBJECT.KEYID = 7
1,176,005 UART: [idev] UDS.KEYID = 0
1,176,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,139 UART: [idev] Erasing UDS.KEYID = 0
1,201,160 UART: [idev] Sha1 KeyId Algorithm
1,209,626 UART: [idev] --
1,210,562 UART: [ldev] ++
1,210,730 UART: [ldev] CDI.KEYID = 6
1,211,093 UART: [ldev] SUBJECT.KEYID = 5
1,211,519 UART: [ldev] AUTHORITY.KEYID = 7
1,211,982 UART: [ldev] FE.KEYID = 1
1,217,106 UART: [ldev] Erasing FE.KEYID = 1
1,243,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,498 UART: [ldev] --
1,282,775 UART: [fwproc] Wait for Commands...
1,283,535 UART: [fwproc] Recv command 0x46574c44
1,284,263 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,580 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,750 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,905 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,434 >>> mbox cmd response: failed
1,186,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,440 >>> mbox cmd response: failed
1,186,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,640 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
192,229 UART:
192,594 UART: Running Caliptra ROM ...
193,786 UART:
193,942 UART: [state] CFI Enabled
266,430 UART: [state] LifecycleState = Unprovisioned
268,378 UART: [state] DebugLocked = No
270,250 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,990 UART: [kat] SHA2-256
444,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,202 UART: [kat] ++
455,680 UART: [kat] sha1
467,749 UART: [kat] SHA2-256
470,446 UART: [kat] SHA2-384
475,958 UART: [kat] SHA2-512-ACC
478,180 UART: [kat] ECC-384
2,766,530 UART: [kat] HMAC-384Kdf
2,797,687 UART: [kat] LMS
3,987,985 UART: [kat] --
3,993,139 UART: [cold-reset] ++
3,995,358 UART: [fht] Storing FHT @ 0x50003400
4,007,355 UART: [idev] ++
4,007,942 UART: [idev] CDI.KEYID = 6
4,008,833 UART: [idev] SUBJECT.KEYID = 7
4,010,133 UART: [idev] UDS.KEYID = 0
4,013,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,342 UART: [idev] Erasing UDS.KEYID = 0
7,343,340 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,712 UART: [idev] --
7,369,162 UART: [ldev] ++
7,369,750 UART: [ldev] CDI.KEYID = 6
7,370,637 UART: [ldev] SUBJECT.KEYID = 5
7,371,911 UART: [ldev] AUTHORITY.KEYID = 7
7,373,152 UART: [ldev] FE.KEYID = 1
7,420,559 UART: [ldev] Erasing FE.KEYID = 1
10,752,485 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,065,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,109,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,534 UART: [ldev] --
13,133,006 UART: [fwproc] Waiting for Commands...
13,135,006 UART: [fwproc] Received command 0x46574c44
13,137,202 UART: [fwproc] Received Image of size 118548 bytes
15,832,021 UART: ROM Fatal Error: 0x000B0010
15,835,511 >>> mbox cmd response: failed
15,836,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,836,506 >>> mbox cmd response: failed
15,836,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,837,081 >>> mbox cmd response: failed
Initializing fuses
2,057,196 writing to cptra_bootfsm_go
2,246,530 UART:
2,246,877 UART: Running Caliptra ROM ...
2,248,031 UART:
2,248,203 UART: [state] CFI Enabled
2,321,411 UART: [state] LifecycleState = Unprovisioned
2,323,349 UART: [state] DebugLocked = No
2,325,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,330,732 UART: [kat] SHA2-256
2,500,432 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,510,959 UART: [kat] ++
2,511,501 UART: [kat] sha1
2,523,050 UART: [kat] SHA2-256
2,525,750 UART: [kat] SHA2-384
2,530,553 UART: [kat] SHA2-512-ACC
2,532,960 UART: [kat] ECC-384
4,824,535 UART: [kat] HMAC-384Kdf
4,855,783 UART: [kat] LMS
6,046,074 UART: [kat] --
6,051,633 UART: [cold-reset] ++
6,054,064 UART: [fht] Storing FHT @ 0x50003400
6,065,616 UART: [idev] ++
6,066,191 UART: [idev] CDI.KEYID = 6
6,067,078 UART: [idev] SUBJECT.KEYID = 7
6,068,352 UART: [idev] UDS.KEYID = 0
6,070,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,220,043 UART: [idev] Erasing UDS.KEYID = 0
9,404,005 UART: [idev] Using Sha1 for KeyId Algorithm
9,427,126 UART: [idev] --
9,431,726 UART: [ldev] ++
9,432,355 UART: [ldev] CDI.KEYID = 6
9,433,241 UART: [ldev] SUBJECT.KEYID = 5
9,434,557 UART: [ldev] AUTHORITY.KEYID = 7
9,435,744 UART: [ldev] FE.KEYID = 1
9,477,570 UART: [ldev] Erasing FE.KEYID = 1
12,810,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,124,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,139,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,154,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,168,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,188,433 UART: [ldev] --
15,193,699 UART: [fwproc] Waiting for Commands...
15,195,800 UART: [fwproc] Received command 0x46574c44
15,197,990 UART: [fwproc] Received Image of size 118548 bytes
19,303,170 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,374,500 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,447,692 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,775,592 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,790,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,531,334 >>> mbox cmd response: failed
15,532,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,532,408 >>> mbox cmd response: failed
15,532,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,532,975 >>> mbox cmd response: failed
Initializing fuses
2,056,793 writing to cptra_bootfsm_go
5,850,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,997,052 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,522 UART:
192,911 UART: Running Caliptra ROM ...
194,060 UART:
603,692 UART: [state] CFI Enabled
615,415 UART: [state] LifecycleState = Unprovisioned
617,313 UART: [state] DebugLocked = No
618,987 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,056 UART: [kat] SHA2-256
792,786 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,350 UART: [kat] ++
803,799 UART: [kat] sha1
815,548 UART: [kat] SHA2-256
818,281 UART: [kat] SHA2-384
824,655 UART: [kat] SHA2-512-ACC
827,002 UART: [kat] ECC-384
3,111,942 UART: [kat] HMAC-384Kdf
3,122,533 UART: [kat] LMS
4,312,663 UART: [kat] --
4,317,607 UART: [cold-reset] ++
4,319,387 UART: [fht] Storing FHT @ 0x50003400
4,331,254 UART: [idev] ++
4,331,866 UART: [idev] CDI.KEYID = 6
4,332,787 UART: [idev] SUBJECT.KEYID = 7
4,333,954 UART: [idev] UDS.KEYID = 0
4,337,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,055 UART: [idev] Erasing UDS.KEYID = 0
7,619,655 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,521 UART: [idev] --
7,644,851 UART: [ldev] ++
7,645,430 UART: [ldev] CDI.KEYID = 6
7,646,380 UART: [ldev] SUBJECT.KEYID = 5
7,647,625 UART: [ldev] AUTHORITY.KEYID = 7
7,648,869 UART: [ldev] FE.KEYID = 1
7,659,983 UART: [ldev] Erasing FE.KEYID = 1
10,950,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,213 UART: [ldev] --
13,309,204 UART: [fwproc] Waiting for Commands...
13,311,479 UART: [fwproc] Received command 0x46574c44
13,313,671 UART: [fwproc] Received Image of size 118548 bytes
16,009,243 UART: ROM Fatal Error: 0x000B0010
16,012,732 >>> mbox cmd response: failed
16,013,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,013,513 >>> mbox cmd response: failed
16,013,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,014,106 >>> mbox cmd response: failed
Initializing fuses
2,057,219 writing to cptra_bootfsm_go
2,246,585 UART:
2,246,948 UART: Running Caliptra ROM ...
2,248,092 UART:
4,446,049 UART: [state] CFI Enabled
4,461,088 UART: [state] LifecycleState = Unprovisioned
4,463,009 UART: [state] DebugLocked = No
4,465,060 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,470,136 UART: [kat] SHA2-256
4,639,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,650,460 UART: [kat] ++
4,650,978 UART: [kat] sha1
4,662,956 UART: [kat] SHA2-256
4,665,664 UART: [kat] SHA2-384
4,672,471 UART: [kat] SHA2-512-ACC
4,674,829 UART: [kat] ECC-384
6,959,421 UART: [kat] HMAC-384Kdf
6,971,921 UART: [kat] LMS
8,162,031 UART: [kat] --
8,165,450 UART: [cold-reset] ++
8,166,956 UART: [fht] Storing FHT @ 0x50003400
8,179,365 UART: [idev] ++
8,179,943 UART: [idev] CDI.KEYID = 6
8,180,913 UART: [idev] SUBJECT.KEYID = 7
8,182,135 UART: [idev] UDS.KEYID = 0
8,184,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,333,411 UART: [idev] Erasing UDS.KEYID = 0
11,469,940 UART: [idev] Using Sha1 for KeyId Algorithm
11,491,487 UART: [idev] --
11,494,940 UART: [ldev] ++
11,495,511 UART: [ldev] CDI.KEYID = 6
11,496,533 UART: [ldev] SUBJECT.KEYID = 5
11,497,741 UART: [ldev] AUTHORITY.KEYID = 7
11,498,923 UART: [ldev] FE.KEYID = 1
11,510,930 UART: [ldev] Erasing FE.KEYID = 1
14,795,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,091,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,105,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,120,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,135,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,153,587 UART: [ldev] --
17,159,023 UART: [fwproc] Waiting for Commands...
17,161,997 UART: [fwproc] Received command 0x46574c44
17,164,217 UART: [fwproc] Received Image of size 118548 bytes
21,268,262 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,348,346 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,421,515 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,749,515 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
4,131,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,749,246 >>> mbox cmd response: failed
15,749,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,750,283 >>> mbox cmd response: failed
15,750,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,750,862 >>> mbox cmd response: failed
Initializing fuses
2,057,557 writing to cptra_bootfsm_go
8,238,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,271,102 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,172 UART:
192,528 UART: Running Caliptra ROM ...
193,752 UART:
193,911 UART: [state] CFI Enabled
263,271 UART: [state] LifecycleState = Unprovisioned
265,255 UART: [state] DebugLocked = No
268,102 UART: [state] WD Timer not started. Device not locked for debugging
271,711 UART: [kat] SHA2-256
451,370 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,135 UART: [kat] ++
462,733 UART: [kat] sha1
473,371 UART: [kat] SHA2-256
476,058 UART: [kat] SHA2-384
480,853 UART: [kat] SHA2-512-ACC
483,190 UART: [kat] ECC-384
2,948,892 UART: [kat] HMAC-384Kdf
2,971,169 UART: [kat] LMS
3,447,662 UART: [kat] --
3,452,811 UART: [cold-reset] ++
3,455,453 UART: [fht] FHT @ 0x50003400
3,465,956 UART: [idev] ++
3,466,529 UART: [idev] CDI.KEYID = 6
3,467,555 UART: [idev] SUBJECT.KEYID = 7
3,468,724 UART: [idev] UDS.KEYID = 0
3,471,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,720 UART: [idev] Erasing UDS.KEYID = 0
5,988,587 UART: [idev] Sha1 KeyId Algorithm
6,011,500 UART: [idev] --
6,016,535 UART: [ldev] ++
6,017,116 UART: [ldev] CDI.KEYID = 6
6,018,009 UART: [ldev] SUBJECT.KEYID = 5
6,019,245 UART: [ldev] AUTHORITY.KEYID = 7
6,020,489 UART: [ldev] FE.KEYID = 1
6,057,809 UART: [ldev] Erasing FE.KEYID = 1
8,562,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,215 UART: [ldev] --
10,377,141 UART: [fwproc] Wait for Commands...
10,379,533 UART: [fwproc] Recv command 0x46574c44
10,381,528 UART: [fwproc] Recv'd Img size: 118548 bytes
12,443,031 UART: ROM Fatal Error: 0x000B0010
12,446,265 >>> mbox cmd response: failed
12,446,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,447,024 >>> mbox cmd response: failed
12,447,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,447,601 >>> mbox cmd response: failed
Initializing fuses
2,061,162 writing to cptra_bootfsm_go
2,250,467 UART:
2,250,825 UART: Running Caliptra ROM ...
2,251,962 UART:
2,252,134 UART: [state] CFI Enabled
2,323,011 UART: [state] LifecycleState = Unprovisioned
2,324,946 UART: [state] DebugLocked = No
2,326,531 UART: [state] WD Timer not started. Device not locked for debugging
2,330,387 UART: [kat] SHA2-256
2,510,008 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,520,783 UART: [kat] ++
2,521,326 UART: [kat] sha1
2,532,767 UART: [kat] SHA2-256
2,535,459 UART: [kat] SHA2-384
2,541,666 UART: [kat] SHA2-512-ACC
2,544,030 UART: [kat] ECC-384
5,006,116 UART: [kat] HMAC-384Kdf
5,030,520 UART: [kat] LMS
5,507,067 UART: [kat] --
5,510,305 UART: [cold-reset] ++
5,511,328 UART: [fht] FHT @ 0x50003400
5,523,455 UART: [idev] ++
5,524,087 UART: [idev] CDI.KEYID = 6
5,525,040 UART: [idev] SUBJECT.KEYID = 7
5,526,215 UART: [idev] UDS.KEYID = 0
5,528,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,677,621 UART: [idev] Erasing UDS.KEYID = 0
8,049,660 UART: [idev] Sha1 KeyId Algorithm
8,073,228 UART: [idev] --
8,077,437 UART: [ldev] ++
8,078,019 UART: [ldev] CDI.KEYID = 6
8,078,939 UART: [ldev] SUBJECT.KEYID = 5
8,080,105 UART: [ldev] AUTHORITY.KEYID = 7
8,081,403 UART: [ldev] FE.KEYID = 1
8,116,571 UART: [ldev] Erasing FE.KEYID = 1
10,623,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,359,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,375,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,390,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,406,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,428,399 UART: [ldev] --
12,433,295 UART: [fwproc] Wait for Commands...
12,435,503 UART: [fwproc] Recv command 0x46574c44
12,437,497 UART: [fwproc] Recv'd Img size: 118548 bytes
15,924,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,005,717 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,078,703 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,407,396 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,463,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,308,521 >>> mbox cmd response: failed
12,309,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,309,426 >>> mbox cmd response: failed
12,309,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,310,052 >>> mbox cmd response: failed
Initializing fuses
2,068,663 writing to cptra_bootfsm_go
5,529,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,328,733 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,605 UART:
192,973 UART: Running Caliptra ROM ...
194,127 UART:
603,741 UART: [state] CFI Enabled
617,897 UART: [state] LifecycleState = Unprovisioned
619,847 UART: [state] DebugLocked = No
622,276 UART: [state] WD Timer not started. Device not locked for debugging
625,334 UART: [kat] SHA2-256
805,002 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,777 UART: [kat] ++
816,233 UART: [kat] sha1
827,439 UART: [kat] SHA2-256
830,131 UART: [kat] SHA2-384
835,789 UART: [kat] SHA2-512-ACC
838,135 UART: [kat] ECC-384
3,279,882 UART: [kat] HMAC-384Kdf
3,292,090 UART: [kat] LMS
3,768,630 UART: [kat] --
3,771,845 UART: [cold-reset] ++
3,774,276 UART: [fht] FHT @ 0x50003400
3,785,902 UART: [idev] ++
3,786,493 UART: [idev] CDI.KEYID = 6
3,787,539 UART: [idev] SUBJECT.KEYID = 7
3,788,652 UART: [idev] UDS.KEYID = 0
3,791,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,461 UART: [idev] Erasing UDS.KEYID = 0
6,266,159 UART: [idev] Sha1 KeyId Algorithm
6,290,930 UART: [idev] --
6,295,259 UART: [ldev] ++
6,295,837 UART: [ldev] CDI.KEYID = 6
6,296,891 UART: [ldev] SUBJECT.KEYID = 5
6,298,002 UART: [ldev] AUTHORITY.KEYID = 7
6,299,191 UART: [ldev] FE.KEYID = 1
6,309,964 UART: [ldev] Erasing FE.KEYID = 1
8,786,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,105 UART: [ldev] --
10,580,306 UART: [fwproc] Wait for Commands...
10,582,424 UART: [fwproc] Recv command 0x46574c44
10,584,479 UART: [fwproc] Recv'd Img size: 118548 bytes
12,643,496 UART: ROM Fatal Error: 0x000B0010
12,646,740 >>> mbox cmd response: failed
12,647,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,647,525 >>> mbox cmd response: failed
12,647,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,648,130 >>> mbox cmd response: failed
Initializing fuses
2,060,452 writing to cptra_bootfsm_go
2,249,829 UART:
2,250,197 UART: Running Caliptra ROM ...
2,251,290 UART:
7,805,709 UART: [state] CFI Enabled
7,820,760 UART: [state] LifecycleState = Unprovisioned
7,822,673 UART: [state] DebugLocked = No
7,824,126 UART: [state] WD Timer not started. Device not locked for debugging
7,827,882 UART: [kat] SHA2-256
8,007,527 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,018,280 UART: [kat] ++
8,018,779 UART: [kat] sha1
8,029,680 UART: [kat] SHA2-256
8,032,387 UART: [kat] SHA2-384
8,037,411 UART: [kat] SHA2-512-ACC
8,039,783 UART: [kat] ECC-384
10,483,926 UART: [kat] HMAC-384Kdf
10,496,674 UART: [kat] LMS
10,973,176 UART: [kat] --
10,977,499 UART: [cold-reset] ++
10,978,575 UART: [fht] FHT @ 0x50003400
10,989,882 UART: [idev] ++
10,990,449 UART: [idev] CDI.KEYID = 6
10,991,412 UART: [idev] SUBJECT.KEYID = 7
10,992,628 UART: [idev] UDS.KEYID = 0
10,995,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,144,226 UART: [idev] Erasing UDS.KEYID = 0
13,469,295 UART: [idev] Sha1 KeyId Algorithm
13,493,808 UART: [idev] --
13,498,397 UART: [ldev] ++
13,498,972 UART: [ldev] CDI.KEYID = 6
13,499,889 UART: [ldev] SUBJECT.KEYID = 5
13,501,110 UART: [ldev] AUTHORITY.KEYID = 7
13,502,345 UART: [ldev] FE.KEYID = 1
13,512,959 UART: [ldev] Erasing FE.KEYID = 1
15,990,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,709,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,725,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,740,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,756,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,777,350 UART: [ldev] --
17,782,036 UART: [fwproc] Wait for Commands...
17,785,172 UART: [fwproc] Recv command 0x46574c44
17,787,164 UART: [fwproc] Recv'd Img size: 118548 bytes
21,271,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,352,152 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,425,170 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,752,777 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
3,781,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,533,915 >>> mbox cmd response: failed
12,534,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,534,832 >>> mbox cmd response: failed
12,535,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,535,397 >>> mbox cmd response: failed
Initializing fuses
2,061,052 writing to cptra_bootfsm_go
11,106,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,768,633 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,274 UART:
192,624 UART: Running Caliptra ROM ...
193,821 UART:
193,983 UART: [state] CFI Enabled
265,181 UART: [state] LifecycleState = Unprovisioned
267,608 UART: [state] DebugLocked = No
270,342 UART: [state] WD Timer not started. Device not locked for debugging
275,645 UART: [kat] SHA2-256
465,519 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,308 UART: [kat] ++
476,769 UART: [kat] sha1
488,136 UART: [kat] SHA2-256
491,162 UART: [kat] SHA2-384
495,703 UART: [kat] SHA2-512-ACC
498,327 UART: [kat] ECC-384
2,947,284 UART: [kat] HMAC-384Kdf
2,970,332 UART: [kat] LMS
3,502,088 UART: [kat] --
3,507,127 UART: [cold-reset] ++
3,508,313 UART: [fht] FHT @ 0x50003400
3,519,998 UART: [idev] ++
3,520,733 UART: [idev] CDI.KEYID = 6
3,521,663 UART: [idev] SUBJECT.KEYID = 7
3,522,831 UART: [idev] UDS.KEYID = 0
3,525,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,980 UART: [idev] Erasing UDS.KEYID = 0
6,035,589 UART: [idev] Sha1 KeyId Algorithm
6,056,902 UART: [idev] --
6,062,366 UART: [ldev] ++
6,063,057 UART: [ldev] CDI.KEYID = 6
6,063,947 UART: [ldev] SUBJECT.KEYID = 5
6,065,168 UART: [ldev] AUTHORITY.KEYID = 7
6,066,411 UART: [ldev] FE.KEYID = 1
6,103,245 UART: [ldev] Erasing FE.KEYID = 1
8,613,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,099 UART: [ldev] --
10,417,255 UART: [fwproc] Wait for Commands...
10,420,394 UART: [fwproc] Recv command 0x46574c44
10,422,715 UART: [fwproc] Recv'd Img size: 118548 bytes
12,501,649 UART: ROM Fatal Error: 0x000B0010
12,505,319 >>> mbox cmd response: failed
12,505,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,112 >>> mbox cmd response: failed
12,506,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,681 >>> mbox cmd response: failed
Initializing fuses
2,061,575 writing to cptra_bootfsm_go
2,250,927 UART:
2,251,280 UART: Running Caliptra ROM ...
2,252,429 UART:
2,252,620 UART: [state] CFI Enabled
2,307,074 UART: [state] LifecycleState = Unprovisioned
2,309,451 UART: [state] DebugLocked = No
2,311,356 UART: [state] WD Timer not started. Device not locked for debugging
2,315,986 UART: [kat] SHA2-256
2,505,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,672 UART: [kat] ++
2,517,153 UART: [kat] sha1
2,527,339 UART: [kat] SHA2-256
2,530,407 UART: [kat] SHA2-384
2,535,282 UART: [kat] SHA2-512-ACC
2,537,866 UART: [kat] ECC-384
4,991,740 UART: [kat] HMAC-384Kdf
5,016,354 UART: [kat] LMS
5,548,107 UART: [kat] --
5,553,287 UART: [cold-reset] ++
5,555,464 UART: [fht] FHT @ 0x50003400
5,566,987 UART: [idev] ++
5,567,710 UART: [idev] CDI.KEYID = 6
5,568,636 UART: [idev] SUBJECT.KEYID = 7
5,569,862 UART: [idev] UDS.KEYID = 0
5,572,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,721,199 UART: [idev] Erasing UDS.KEYID = 0
8,095,298 UART: [idev] Sha1 KeyId Algorithm
8,118,268 UART: [idev] --
8,123,727 UART: [ldev] ++
8,124,415 UART: [ldev] CDI.KEYID = 6
8,125,496 UART: [ldev] SUBJECT.KEYID = 5
8,126,622 UART: [ldev] AUTHORITY.KEYID = 7
8,127,813 UART: [ldev] FE.KEYID = 1
8,165,635 UART: [ldev] Erasing FE.KEYID = 1
10,672,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,407,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,423,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,438,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,453,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,474,822 UART: [ldev] --
12,480,632 UART: [fwproc] Wait for Commands...
12,483,606 UART: [fwproc] Recv command 0x46574c44
12,485,932 UART: [fwproc] Recv'd Img size: 118548 bytes
15,983,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,066,314 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,189,504 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,749,457 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,419,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,267,641 >>> mbox cmd response: failed
12,268,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,268,561 >>> mbox cmd response: failed
12,268,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,269,184 >>> mbox cmd response: failed
Initializing fuses
2,061,759 writing to cptra_bootfsm_go
5,497,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,899,466 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
192,595 UART:
192,978 UART: Running Caliptra ROM ...
194,136 UART:
603,930 UART: [state] CFI Enabled
619,427 UART: [state] LifecycleState = Unprovisioned
621,816 UART: [state] DebugLocked = No
623,848 UART: [state] WD Timer not started. Device not locked for debugging
628,183 UART: [kat] SHA2-256
818,048 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,811 UART: [kat] ++
829,325 UART: [kat] sha1
841,936 UART: [kat] SHA2-256
844,954 UART: [kat] SHA2-384
851,643 UART: [kat] SHA2-512-ACC
854,272 UART: [kat] ECC-384
3,298,725 UART: [kat] HMAC-384Kdf
3,311,963 UART: [kat] LMS
3,843,808 UART: [kat] --
3,847,096 UART: [cold-reset] ++
3,849,445 UART: [fht] FHT @ 0x50003400
3,860,391 UART: [idev] ++
3,861,076 UART: [idev] CDI.KEYID = 6
3,861,995 UART: [idev] SUBJECT.KEYID = 7
3,863,213 UART: [idev] UDS.KEYID = 0
3,865,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,015,100 UART: [idev] Erasing UDS.KEYID = 0
6,334,518 UART: [idev] Sha1 KeyId Algorithm
6,355,891 UART: [idev] --
6,359,997 UART: [ldev] ++
6,360,682 UART: [ldev] CDI.KEYID = 6
6,361,572 UART: [ldev] SUBJECT.KEYID = 5
6,362,739 UART: [ldev] AUTHORITY.KEYID = 7
6,363,997 UART: [ldev] FE.KEYID = 1
6,375,494 UART: [ldev] Erasing FE.KEYID = 1
8,854,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,231 UART: [ldev] --
10,644,609 UART: [fwproc] Wait for Commands...
10,647,627 UART: [fwproc] Recv command 0x46574c44
10,649,913 UART: [fwproc] Recv'd Img size: 118548 bytes
12,721,720 UART: ROM Fatal Error: 0x000B0010
12,725,396 >>> mbox cmd response: failed
12,725,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,726,119 >>> mbox cmd response: failed
12,726,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,726,947 >>> mbox cmd response: failed
Initializing fuses
2,067,912 writing to cptra_bootfsm_go
2,257,248 UART:
2,257,602 UART: Running Caliptra ROM ...
2,258,739 UART:
7,714,676 UART: [state] CFI Enabled
7,727,355 UART: [state] LifecycleState = Unprovisioned
7,729,706 UART: [state] DebugLocked = No
7,730,913 UART: [state] WD Timer not started. Device not locked for debugging
7,734,897 UART: [kat] SHA2-256
7,924,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,935,574 UART: [kat] ++
7,936,097 UART: [kat] sha1
7,946,313 UART: [kat] SHA2-256
7,949,346 UART: [kat] SHA2-384
7,955,408 UART: [kat] SHA2-512-ACC
7,958,041 UART: [kat] ECC-384
10,402,041 UART: [kat] HMAC-384Kdf
10,415,580 UART: [kat] LMS
10,947,399 UART: [kat] --
10,952,065 UART: [cold-reset] ++
10,953,255 UART: [fht] FHT @ 0x50003400
10,965,703 UART: [idev] ++
10,966,429 UART: [idev] CDI.KEYID = 6
10,967,354 UART: [idev] SUBJECT.KEYID = 7
10,968,582 UART: [idev] UDS.KEYID = 0
10,971,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,120,174 UART: [idev] Erasing UDS.KEYID = 0
13,444,305 UART: [idev] Sha1 KeyId Algorithm
13,466,648 UART: [idev] --
13,473,181 UART: [ldev] ++
13,473,867 UART: [ldev] CDI.KEYID = 6
13,474,782 UART: [ldev] SUBJECT.KEYID = 5
13,475,945 UART: [ldev] AUTHORITY.KEYID = 7
13,477,180 UART: [ldev] FE.KEYID = 1
13,488,746 UART: [ldev] Erasing FE.KEYID = 1
15,967,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,687,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,702,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,717,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,732,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,753,781 UART: [ldev] --
17,758,995 UART: [fwproc] Wait for Commands...
17,761,523 UART: [fwproc] Recv command 0x46574c44
17,763,808 UART: [fwproc] Recv'd Img size: 118548 bytes
21,255,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,339,522 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,463,124 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,023,498 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,761,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,515,183 >>> mbox cmd response: failed
12,515,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,149 >>> mbox cmd response: failed
12,516,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,724 >>> mbox cmd response: failed
Initializing fuses
2,061,039 writing to cptra_bootfsm_go
11,106,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,387,700 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,915 UART: [kat] SHA2-256
881,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,961 UART: [kat] ++
886,113 UART: [kat] sha1
890,231 UART: [kat] SHA2-256
892,169 UART: [kat] SHA2-384
895,000 UART: [kat] SHA2-512-ACC
896,901 UART: [kat] ECC-384
902,758 UART: [kat] HMAC-384Kdf
907,282 UART: [kat] LMS
1,475,478 UART: [kat] --
1,476,405 UART: [cold-reset] ++
1,476,955 UART: [fht] Storing FHT @ 0x50003400
1,479,748 UART: [idev] ++
1,479,916 UART: [idev] CDI.KEYID = 6
1,480,276 UART: [idev] SUBJECT.KEYID = 7
1,480,700 UART: [idev] UDS.KEYID = 0
1,481,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,006 UART: [idev] Erasing UDS.KEYID = 0
1,505,216 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,730 UART: [idev] --
1,514,865 UART: [ldev] ++
1,515,033 UART: [ldev] CDI.KEYID = 6
1,515,396 UART: [ldev] SUBJECT.KEYID = 5
1,515,822 UART: [ldev] AUTHORITY.KEYID = 7
1,516,285 UART: [ldev] FE.KEYID = 1
1,521,585 UART: [ldev] Erasing FE.KEYID = 1
1,547,300 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,546 UART: [ldev] --
1,586,849 UART: [fwproc] Waiting for Commands...
1,587,708 UART: [fwproc] Received command 0x46574c44
1,588,499 UART: [fwproc] Received Image of size 118548 bytes
1,631,524 UART: ROM Fatal Error: 0x000B0010
1,632,681 >>> mbox cmd response: failed
1,632,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,687 >>> mbox cmd response: failed
1,632,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,965 UART: [kat] SHA2-256
881,896 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,011 UART: [kat] ++
886,163 UART: [kat] sha1
890,299 UART: [kat] SHA2-256
892,237 UART: [kat] SHA2-384
895,046 UART: [kat] SHA2-512-ACC
896,947 UART: [kat] ECC-384
902,512 UART: [kat] HMAC-384Kdf
907,076 UART: [kat] LMS
1,475,272 UART: [kat] --
1,475,863 UART: [cold-reset] ++
1,476,435 UART: [fht] Storing FHT @ 0x50003400
1,479,186 UART: [idev] ++
1,479,354 UART: [idev] CDI.KEYID = 6
1,479,714 UART: [idev] SUBJECT.KEYID = 7
1,480,138 UART: [idev] UDS.KEYID = 0
1,480,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,914 UART: [idev] Erasing UDS.KEYID = 0
1,504,446 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,066 UART: [idev] --
1,514,073 UART: [ldev] ++
1,514,241 UART: [ldev] CDI.KEYID = 6
1,514,604 UART: [ldev] SUBJECT.KEYID = 5
1,515,030 UART: [ldev] AUTHORITY.KEYID = 7
1,515,493 UART: [ldev] FE.KEYID = 1
1,520,635 UART: [ldev] Erasing FE.KEYID = 1
1,545,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,620 UART: [ldev] --
1,584,935 UART: [fwproc] Waiting for Commands...
1,585,642 UART: [fwproc] Received command 0x46574c44
1,586,433 UART: [fwproc] Received Image of size 118548 bytes
2,930,304 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,782 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,000 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,375 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,483,434 >>> mbox cmd response: failed
1,483,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,440 >>> mbox cmd response: failed
1,483,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,207 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,855 UART: [state] LifecycleState = Unprovisioned
85,510 UART: [state] DebugLocked = No
86,154 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,788 UART: [kat] SHA2-256
881,719 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,834 UART: [kat] ++
885,986 UART: [kat] sha1
890,272 UART: [kat] SHA2-256
892,210 UART: [kat] SHA2-384
894,803 UART: [kat] SHA2-512-ACC
896,704 UART: [kat] ECC-384
902,035 UART: [kat] HMAC-384Kdf
906,659 UART: [kat] LMS
1,474,855 UART: [kat] --
1,475,764 UART: [cold-reset] ++
1,476,146 UART: [fht] Storing FHT @ 0x50003400
1,478,871 UART: [idev] ++
1,479,039 UART: [idev] CDI.KEYID = 6
1,479,399 UART: [idev] SUBJECT.KEYID = 7
1,479,823 UART: [idev] UDS.KEYID = 0
1,480,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,187 UART: [idev] Erasing UDS.KEYID = 0
1,504,619 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,147 UART: [idev] --
1,514,164 UART: [ldev] ++
1,514,332 UART: [ldev] CDI.KEYID = 6
1,514,695 UART: [ldev] SUBJECT.KEYID = 5
1,515,121 UART: [ldev] AUTHORITY.KEYID = 7
1,515,584 UART: [ldev] FE.KEYID = 1
1,520,784 UART: [ldev] Erasing FE.KEYID = 1
1,546,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,457 UART: [ldev] --
1,585,968 UART: [fwproc] Waiting for Commands...
1,586,675 UART: [fwproc] Received command 0x46574c44
1,587,466 UART: [fwproc] Received Image of size 118548 bytes
1,630,301 UART: ROM Fatal Error: 0x000B0010
1,631,458 >>> mbox cmd response: failed
1,631,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,464 >>> mbox cmd response: failed
1,631,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,470 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,064 UART: [kat] SHA2-256
881,995 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,110 UART: [kat] ++
886,262 UART: [kat] sha1
890,724 UART: [kat] SHA2-256
892,662 UART: [kat] SHA2-384
895,321 UART: [kat] SHA2-512-ACC
897,222 UART: [kat] ECC-384
902,477 UART: [kat] HMAC-384Kdf
906,897 UART: [kat] LMS
1,475,093 UART: [kat] --
1,476,106 UART: [cold-reset] ++
1,476,502 UART: [fht] Storing FHT @ 0x50003400
1,479,365 UART: [idev] ++
1,479,533 UART: [idev] CDI.KEYID = 6
1,479,893 UART: [idev] SUBJECT.KEYID = 7
1,480,317 UART: [idev] UDS.KEYID = 0
1,480,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,213 UART: [idev] Erasing UDS.KEYID = 0
1,504,739 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,357 UART: [idev] --
1,514,592 UART: [ldev] ++
1,514,760 UART: [ldev] CDI.KEYID = 6
1,515,123 UART: [ldev] SUBJECT.KEYID = 5
1,515,549 UART: [ldev] AUTHORITY.KEYID = 7
1,516,012 UART: [ldev] FE.KEYID = 1
1,521,416 UART: [ldev] Erasing FE.KEYID = 1
1,547,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,307 UART: [ldev] --
1,586,802 UART: [fwproc] Waiting for Commands...
1,587,451 UART: [fwproc] Received command 0x46574c44
1,588,242 UART: [fwproc] Received Image of size 118548 bytes
2,934,267 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,279 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,497 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,858 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,483,741 >>> mbox cmd response: failed
1,483,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,747 >>> mbox cmd response: failed
1,483,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,312 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,395 UART: [kat] SHA2-512-ACC
906,296 UART: [kat] ECC-384
916,141 UART: [kat] HMAC-384Kdf
920,863 UART: [kat] LMS
1,169,175 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,524 UART: [fht] FHT @ 0x50003400
1,173,198 UART: [idev] ++
1,173,366 UART: [idev] CDI.KEYID = 6
1,173,727 UART: [idev] SUBJECT.KEYID = 7
1,174,152 UART: [idev] UDS.KEYID = 0
1,174,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,913 UART: [idev] Erasing UDS.KEYID = 0
1,199,075 UART: [idev] Sha1 KeyId Algorithm
1,207,933 UART: [idev] --
1,209,018 UART: [ldev] ++
1,209,186 UART: [ldev] CDI.KEYID = 6
1,209,550 UART: [ldev] SUBJECT.KEYID = 5
1,209,977 UART: [ldev] AUTHORITY.KEYID = 7
1,210,440 UART: [ldev] FE.KEYID = 1
1,215,566 UART: [ldev] Erasing FE.KEYID = 1
1,241,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,916 UART: [ldev] --
1,281,325 UART: [fwproc] Wait for Commands...
1,281,906 UART: [fwproc] Recv command 0x46574c44
1,282,639 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,557 UART: ROM Fatal Error: 0x000B0010
1,326,714 >>> mbox cmd response: failed
1,326,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,720 >>> mbox cmd response: failed
1,326,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
891,418 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,529 UART: [kat] SHA2-512-ACC
906,430 UART: [kat] ECC-384
916,341 UART: [kat] HMAC-384Kdf
920,915 UART: [kat] LMS
1,169,227 UART: [kat] --
1,169,960 UART: [cold-reset] ++
1,170,536 UART: [fht] FHT @ 0x50003400
1,173,222 UART: [idev] ++
1,173,390 UART: [idev] CDI.KEYID = 6
1,173,751 UART: [idev] SUBJECT.KEYID = 7
1,174,176 UART: [idev] UDS.KEYID = 0
1,174,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,871 UART: [idev] Erasing UDS.KEYID = 0
1,199,149 UART: [idev] Sha1 KeyId Algorithm
1,208,105 UART: [idev] --
1,209,068 UART: [ldev] ++
1,209,236 UART: [ldev] CDI.KEYID = 6
1,209,600 UART: [ldev] SUBJECT.KEYID = 5
1,210,027 UART: [ldev] AUTHORITY.KEYID = 7
1,210,490 UART: [ldev] FE.KEYID = 1
1,215,556 UART: [ldev] Erasing FE.KEYID = 1
1,241,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,174 UART: [ldev] --
1,280,619 UART: [fwproc] Wait for Commands...
1,281,274 UART: [fwproc] Recv command 0x46574c44
1,282,007 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,572 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,747 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,072 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,367 >>> mbox cmd response: failed
1,181,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,373 >>> mbox cmd response: failed
1,181,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,149 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,729 UART: [state] LifecycleState = Unprovisioned
85,384 UART: [state] DebugLocked = No
86,118 UART: [state] WD Timer not started. Device not locked for debugging
87,331 UART: [kat] SHA2-256
890,881 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,985 UART: [kat] ++
895,137 UART: [kat] sha1
899,283 UART: [kat] SHA2-256
901,223 UART: [kat] SHA2-384
903,926 UART: [kat] SHA2-512-ACC
905,827 UART: [kat] ECC-384
915,588 UART: [kat] HMAC-384Kdf
920,016 UART: [kat] LMS
1,168,328 UART: [kat] --
1,169,105 UART: [cold-reset] ++
1,169,625 UART: [fht] FHT @ 0x50003400
1,172,195 UART: [idev] ++
1,172,363 UART: [idev] CDI.KEYID = 6
1,172,724 UART: [idev] SUBJECT.KEYID = 7
1,173,149 UART: [idev] UDS.KEYID = 0
1,173,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,384 UART: [idev] Erasing UDS.KEYID = 0
1,198,388 UART: [idev] Sha1 KeyId Algorithm
1,207,346 UART: [idev] --
1,208,341 UART: [ldev] ++
1,208,509 UART: [ldev] CDI.KEYID = 6
1,208,873 UART: [ldev] SUBJECT.KEYID = 5
1,209,300 UART: [ldev] AUTHORITY.KEYID = 7
1,209,763 UART: [ldev] FE.KEYID = 1
1,214,685 UART: [ldev] Erasing FE.KEYID = 1
1,241,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,169 UART: [ldev] --
1,280,472 UART: [fwproc] Wait for Commands...
1,281,079 UART: [fwproc] Recv command 0x46574c44
1,281,812 UART: [fwproc] Recv'd Img size: 118548 bytes
1,323,582 UART: ROM Fatal Error: 0x000B0010
1,324,739 >>> mbox cmd response: failed
1,324,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,745 >>> mbox cmd response: failed
1,324,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,751 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
916,196 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,170,129 UART: [cold-reset] ++
1,170,511 UART: [fht] FHT @ 0x50003400
1,173,187 UART: [idev] ++
1,173,355 UART: [idev] CDI.KEYID = 6
1,173,716 UART: [idev] SUBJECT.KEYID = 7
1,174,141 UART: [idev] UDS.KEYID = 0
1,174,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,932 UART: [idev] Erasing UDS.KEYID = 0
1,199,182 UART: [idev] Sha1 KeyId Algorithm
1,208,112 UART: [idev] --
1,209,181 UART: [ldev] ++
1,209,349 UART: [ldev] CDI.KEYID = 6
1,209,713 UART: [ldev] SUBJECT.KEYID = 5
1,210,140 UART: [ldev] AUTHORITY.KEYID = 7
1,210,603 UART: [ldev] FE.KEYID = 1
1,215,673 UART: [ldev] Erasing FE.KEYID = 1
1,242,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,765 UART: [ldev] --
1,282,142 UART: [fwproc] Wait for Commands...
1,282,775 UART: [fwproc] Recv command 0x46574c44
1,283,508 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,921 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,096 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,421 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,882 >>> mbox cmd response: failed
1,181,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,888 >>> mbox cmd response: failed
1,181,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,796 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,888 UART: [state] LifecycleState = Unprovisioned
86,543 UART: [state] DebugLocked = No
87,259 UART: [state] WD Timer not started. Device not locked for debugging
88,380 UART: [kat] SHA2-256
894,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,155 UART: [kat] ++
898,307 UART: [kat] sha1
902,629 UART: [kat] SHA2-256
904,569 UART: [kat] SHA2-384
907,276 UART: [kat] SHA2-512-ACC
909,177 UART: [kat] ECC-384
919,098 UART: [kat] HMAC-384Kdf
923,678 UART: [kat] LMS
1,172,006 UART: [kat] --
1,172,847 UART: [cold-reset] ++
1,173,373 UART: [fht] FHT @ 0x50003400
1,176,096 UART: [idev] ++
1,176,264 UART: [idev] CDI.KEYID = 6
1,176,624 UART: [idev] SUBJECT.KEYID = 7
1,177,048 UART: [idev] UDS.KEYID = 0
1,177,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,248 UART: [idev] Erasing UDS.KEYID = 0
1,202,435 UART: [idev] Sha1 KeyId Algorithm
1,211,041 UART: [idev] --
1,212,141 UART: [ldev] ++
1,212,309 UART: [ldev] CDI.KEYID = 6
1,212,672 UART: [ldev] SUBJECT.KEYID = 5
1,213,098 UART: [ldev] AUTHORITY.KEYID = 7
1,213,561 UART: [ldev] FE.KEYID = 1
1,218,799 UART: [ldev] Erasing FE.KEYID = 1
1,244,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,637 UART: [ldev] --
1,284,104 UART: [fwproc] Wait for Commands...
1,284,842 UART: [fwproc] Recv command 0x46574c44
1,285,570 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,517 UART: ROM Fatal Error: 0x000B0010
1,329,674 >>> mbox cmd response: failed
1,329,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,680 >>> mbox cmd response: failed
1,329,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,686 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
901,945 UART: [kat] SHA2-256
903,885 UART: [kat] SHA2-384
906,752 UART: [kat] SHA2-512-ACC
908,653 UART: [kat] ECC-384
918,408 UART: [kat] HMAC-384Kdf
922,816 UART: [kat] LMS
1,171,144 UART: [kat] --
1,172,145 UART: [cold-reset] ++
1,172,665 UART: [fht] FHT @ 0x50003400
1,175,258 UART: [idev] ++
1,175,426 UART: [idev] CDI.KEYID = 6
1,175,786 UART: [idev] SUBJECT.KEYID = 7
1,176,210 UART: [idev] UDS.KEYID = 0
1,176,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,056 UART: [idev] Erasing UDS.KEYID = 0
1,200,811 UART: [idev] Sha1 KeyId Algorithm
1,209,317 UART: [idev] --
1,210,307 UART: [ldev] ++
1,210,475 UART: [ldev] CDI.KEYID = 6
1,210,838 UART: [ldev] SUBJECT.KEYID = 5
1,211,264 UART: [ldev] AUTHORITY.KEYID = 7
1,211,727 UART: [ldev] FE.KEYID = 1
1,217,039 UART: [ldev] Erasing FE.KEYID = 1
1,243,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,891 UART: [ldev] --
1,282,402 UART: [fwproc] Wait for Commands...
1,283,208 UART: [fwproc] Recv command 0x46574c44
1,283,936 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,873 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,043 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,292 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,285 >>> mbox cmd response: failed
1,182,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,291 >>> mbox cmd response: failed
1,182,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,467 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,819 UART: [state] LifecycleState = Unprovisioned
86,474 UART: [state] DebugLocked = No
87,088 UART: [state] WD Timer not started. Device not locked for debugging
88,381 UART: [kat] SHA2-256
894,031 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,156 UART: [kat] ++
898,308 UART: [kat] sha1
902,688 UART: [kat] SHA2-256
904,628 UART: [kat] SHA2-384
907,223 UART: [kat] SHA2-512-ACC
909,124 UART: [kat] ECC-384
919,065 UART: [kat] HMAC-384Kdf
923,769 UART: [kat] LMS
1,172,097 UART: [kat] --
1,172,702 UART: [cold-reset] ++
1,173,282 UART: [fht] FHT @ 0x50003400
1,175,955 UART: [idev] ++
1,176,123 UART: [idev] CDI.KEYID = 6
1,176,483 UART: [idev] SUBJECT.KEYID = 7
1,176,907 UART: [idev] UDS.KEYID = 0
1,177,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,793 UART: [idev] Erasing UDS.KEYID = 0
1,201,500 UART: [idev] Sha1 KeyId Algorithm
1,209,976 UART: [idev] --
1,211,086 UART: [ldev] ++
1,211,254 UART: [ldev] CDI.KEYID = 6
1,211,617 UART: [ldev] SUBJECT.KEYID = 5
1,212,043 UART: [ldev] AUTHORITY.KEYID = 7
1,212,506 UART: [ldev] FE.KEYID = 1
1,218,030 UART: [ldev] Erasing FE.KEYID = 1
1,244,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,886 UART: [ldev] --
1,284,157 UART: [fwproc] Wait for Commands...
1,284,971 UART: [fwproc] Recv command 0x46574c44
1,285,699 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,590 UART: ROM Fatal Error: 0x000B0010
1,330,747 >>> mbox cmd response: failed
1,330,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,753 >>> mbox cmd response: failed
1,330,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,759 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
893,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,658 UART: [kat] ++
897,810 UART: [kat] sha1
901,936 UART: [kat] SHA2-256
903,876 UART: [kat] SHA2-384
906,601 UART: [kat] SHA2-512-ACC
908,502 UART: [kat] ECC-384
918,265 UART: [kat] HMAC-384Kdf
923,085 UART: [kat] LMS
1,171,413 UART: [kat] --
1,172,240 UART: [cold-reset] ++
1,172,814 UART: [fht] FHT @ 0x50003400
1,175,423 UART: [idev] ++
1,175,591 UART: [idev] CDI.KEYID = 6
1,175,951 UART: [idev] SUBJECT.KEYID = 7
1,176,375 UART: [idev] UDS.KEYID = 0
1,176,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,527 UART: [idev] Erasing UDS.KEYID = 0
1,201,888 UART: [idev] Sha1 KeyId Algorithm
1,210,544 UART: [idev] --
1,211,702 UART: [ldev] ++
1,211,870 UART: [ldev] CDI.KEYID = 6
1,212,233 UART: [ldev] SUBJECT.KEYID = 5
1,212,659 UART: [ldev] AUTHORITY.KEYID = 7
1,213,122 UART: [ldev] FE.KEYID = 1
1,218,586 UART: [ldev] Erasing FE.KEYID = 1
1,245,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,066 UART: [ldev] --
1,284,337 UART: [fwproc] Wait for Commands...
1,285,137 UART: [fwproc] Recv command 0x46574c44
1,285,865 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,086 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,256 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,457 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,426 >>> mbox cmd response: failed
1,181,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,432 >>> mbox cmd response: failed
1,181,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,438 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,166 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,013 UART:
192,379 UART: Running Caliptra ROM ...
193,574 UART:
193,733 UART: [state] CFI Enabled
263,847 UART: [state] LifecycleState = Unprovisioned
265,828 UART: [state] DebugLocked = No
267,809 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,065 UART: [kat] SHA2-256
442,793 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,290 UART: [kat] ++
453,807 UART: [kat] sha1
464,795 UART: [kat] SHA2-256
467,488 UART: [kat] SHA2-384
473,145 UART: [kat] SHA2-512-ACC
475,489 UART: [kat] ECC-384
2,765,052 UART: [kat] HMAC-384Kdf
2,777,892 UART: [kat] LMS
3,968,230 UART: [kat] --
3,973,490 UART: [cold-reset] ++
3,975,378 UART: [fht] Storing FHT @ 0x50003400
3,988,165 UART: [idev] ++
3,988,741 UART: [idev] CDI.KEYID = 6
3,989,652 UART: [idev] SUBJECT.KEYID = 7
3,990,932 UART: [idev] UDS.KEYID = 0
3,993,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,006 UART: [idev] Erasing UDS.KEYID = 0
7,324,581 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,115 UART: [idev] --
7,352,192 UART: [ldev] ++
7,352,823 UART: [ldev] CDI.KEYID = 6
7,353,742 UART: [ldev] SUBJECT.KEYID = 5
7,354,898 UART: [ldev] AUTHORITY.KEYID = 7
7,356,242 UART: [ldev] FE.KEYID = 1
7,400,111 UART: [ldev] Erasing FE.KEYID = 1
10,730,234 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,280 UART: [ldev] --
13,092,820 UART: [fwproc] Waiting for Commands...
13,095,088 UART: [fwproc] Received command 0x46574c44
13,097,304 UART: [fwproc] Received Image of size 118548 bytes
15,808,764 UART: ROM Fatal Error: 0x000B0040
15,812,221 >>> mbox cmd response: failed
15,812,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,812,990 >>> mbox cmd response: failed
15,813,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,813,559 >>> mbox cmd response: failed
Initializing fuses
2,065,881 writing to cptra_bootfsm_go
2,255,192 UART:
2,255,528 UART: Running Caliptra ROM ...
2,256,663 UART:
2,256,825 UART: [state] CFI Enabled
2,322,730 UART: [state] LifecycleState = Unprovisioned
2,324,688 UART: [state] DebugLocked = No
2,326,139 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,330,828 UART: [kat] SHA2-256
2,500,572 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,511,040 UART: [kat] ++
2,511,547 UART: [kat] sha1
2,522,590 UART: [kat] SHA2-256
2,525,307 UART: [kat] SHA2-384
2,531,690 UART: [kat] SHA2-512-ACC
2,534,060 UART: [kat] ECC-384
4,828,823 UART: [kat] HMAC-384Kdf
4,860,331 UART: [kat] LMS
6,050,613 UART: [kat] --
6,053,209 UART: [cold-reset] ++
6,054,665 UART: [fht] Storing FHT @ 0x50003400
6,065,891 UART: [idev] ++
6,066,666 UART: [idev] CDI.KEYID = 6
6,067,563 UART: [idev] SUBJECT.KEYID = 7
6,068,674 UART: [idev] UDS.KEYID = 0
6,071,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,220,148 UART: [idev] Erasing UDS.KEYID = 0
9,405,780 UART: [idev] Using Sha1 for KeyId Algorithm
9,427,006 UART: [idev] --
9,430,520 UART: [ldev] ++
9,431,090 UART: [ldev] CDI.KEYID = 6
9,432,032 UART: [ldev] SUBJECT.KEYID = 5
9,433,318 UART: [ldev] AUTHORITY.KEYID = 7
9,434,414 UART: [ldev] FE.KEYID = 1
9,481,873 UART: [ldev] Erasing FE.KEYID = 1
12,814,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,129,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,144,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,158,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,173,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,191,849 UART: [ldev] --
15,196,470 UART: [fwproc] Waiting for Commands...
15,198,463 UART: [fwproc] Received command 0x46574c44
15,200,661 UART: [fwproc] Received Image of size 118548 bytes
19,310,876 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,388,934 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,462,109 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,790,697 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,790,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,566,958 >>> mbox cmd response: failed
15,567,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,567,962 >>> mbox cmd response: failed
15,568,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,568,530 >>> mbox cmd response: failed
Initializing fuses
2,068,169 writing to cptra_bootfsm_go
5,856,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,014,803 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,562 UART:
192,951 UART: Running Caliptra ROM ...
194,153 UART:
603,593 UART: [state] CFI Enabled
618,226 UART: [state] LifecycleState = Unprovisioned
620,122 UART: [state] DebugLocked = No
621,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,652 UART: [kat] SHA2-256
796,377 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,924 UART: [kat] ++
807,518 UART: [kat] sha1
819,646 UART: [kat] SHA2-256
822,379 UART: [kat] SHA2-384
829,173 UART: [kat] SHA2-512-ACC
831,527 UART: [kat] ECC-384
3,114,144 UART: [kat] HMAC-384Kdf
3,124,827 UART: [kat] LMS
4,314,925 UART: [kat] --
4,318,949 UART: [cold-reset] ++
4,321,485 UART: [fht] Storing FHT @ 0x50003400
4,333,245 UART: [idev] ++
4,333,828 UART: [idev] CDI.KEYID = 6
4,334,904 UART: [idev] SUBJECT.KEYID = 7
4,336,017 UART: [idev] UDS.KEYID = 0
4,338,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,950 UART: [idev] Erasing UDS.KEYID = 0
7,623,392 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,256 UART: [idev] --
7,648,875 UART: [ldev] ++
7,649,451 UART: [ldev] CDI.KEYID = 6
7,650,389 UART: [ldev] SUBJECT.KEYID = 5
7,651,621 UART: [ldev] AUTHORITY.KEYID = 7
7,652,862 UART: [ldev] FE.KEYID = 1
7,661,740 UART: [ldev] Erasing FE.KEYID = 1
10,948,166 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,120 UART: [ldev] --
13,309,339 UART: [fwproc] Waiting for Commands...
13,311,079 UART: [fwproc] Received command 0x46574c44
13,313,338 UART: [fwproc] Received Image of size 118548 bytes
16,022,336 UART: ROM Fatal Error: 0x000B0040
16,025,886 >>> mbox cmd response: failed
16,026,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,681 >>> mbox cmd response: failed
16,026,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,027,257 >>> mbox cmd response: failed
Initializing fuses
2,057,546 writing to cptra_bootfsm_go
2,246,866 UART:
2,247,238 UART: Running Caliptra ROM ...
2,248,387 UART:
4,434,412 UART: [state] CFI Enabled
4,447,474 UART: [state] LifecycleState = Unprovisioned
4,449,442 UART: [state] DebugLocked = No
4,451,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,456,089 UART: [kat] SHA2-256
4,625,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,636,392 UART: [kat] ++
4,636,879 UART: [kat] sha1
4,647,289 UART: [kat] SHA2-256
4,649,992 UART: [kat] SHA2-384
4,654,695 UART: [kat] SHA2-512-ACC
4,657,060 UART: [kat] ECC-384
6,939,506 UART: [kat] HMAC-384Kdf
6,950,553 UART: [kat] LMS
8,140,713 UART: [kat] --
8,144,391 UART: [cold-reset] ++
8,146,215 UART: [fht] Storing FHT @ 0x50003400
8,158,886 UART: [idev] ++
8,159,497 UART: [idev] CDI.KEYID = 6
8,160,389 UART: [idev] SUBJECT.KEYID = 7
8,161,673 UART: [idev] UDS.KEYID = 0
8,163,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,312,779 UART: [idev] Erasing UDS.KEYID = 0
11,447,731 UART: [idev] Using Sha1 for KeyId Algorithm
11,468,799 UART: [idev] --
11,471,448 UART: [ldev] ++
11,472,032 UART: [ldev] CDI.KEYID = 6
11,473,018 UART: [ldev] SUBJECT.KEYID = 5
11,474,222 UART: [ldev] AUTHORITY.KEYID = 7
11,475,464 UART: [ldev] FE.KEYID = 1
11,488,163 UART: [ldev] Erasing FE.KEYID = 1
14,772,874 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,066,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,080,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,095,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,109,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,129,681 UART: [ldev] --
17,134,102 UART: [fwproc] Waiting for Commands...
17,136,018 UART: [fwproc] Received command 0x46574c44
17,138,219 UART: [fwproc] Received Image of size 118548 bytes
21,250,215 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,328,193 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,401,388 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,729,340 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
4,124,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,759,737 >>> mbox cmd response: failed
15,760,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,760,754 >>> mbox cmd response: failed
15,761,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,761,320 >>> mbox cmd response: failed
Initializing fuses
2,060,331 writing to cptra_bootfsm_go
8,231,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,249,147 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
192,257 UART:
192,624 UART: Running Caliptra ROM ...
193,834 UART:
193,996 UART: [state] CFI Enabled
263,882 UART: [state] LifecycleState = Unprovisioned
265,859 UART: [state] DebugLocked = No
268,169 UART: [state] WD Timer not started. Device not locked for debugging
272,408 UART: [kat] SHA2-256
452,030 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,840 UART: [kat] ++
463,386 UART: [kat] sha1
474,812 UART: [kat] SHA2-256
477,493 UART: [kat] SHA2-384
482,727 UART: [kat] SHA2-512-ACC
485,072 UART: [kat] ECC-384
2,947,302 UART: [kat] HMAC-384Kdf
2,971,778 UART: [kat] LMS
3,448,257 UART: [kat] --
3,453,243 UART: [cold-reset] ++
3,455,723 UART: [fht] FHT @ 0x50003400
3,467,087 UART: [idev] ++
3,467,662 UART: [idev] CDI.KEYID = 6
3,468,684 UART: [idev] SUBJECT.KEYID = 7
3,469,908 UART: [idev] UDS.KEYID = 0
3,472,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,254 UART: [idev] Erasing UDS.KEYID = 0
5,987,446 UART: [idev] Sha1 KeyId Algorithm
6,011,273 UART: [idev] --
6,016,030 UART: [ldev] ++
6,016,612 UART: [ldev] CDI.KEYID = 6
6,017,584 UART: [ldev] SUBJECT.KEYID = 5
6,018,753 UART: [ldev] AUTHORITY.KEYID = 7
6,020,067 UART: [ldev] FE.KEYID = 1
6,060,549 UART: [ldev] Erasing FE.KEYID = 1
8,569,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,150 UART: [ldev] --
10,379,224 UART: [fwproc] Wait for Commands...
10,380,831 UART: [fwproc] Recv command 0x46574c44
10,382,835 UART: [fwproc] Recv'd Img size: 118548 bytes
12,448,733 UART: ROM Fatal Error: 0x000B0040
12,451,951 >>> mbox cmd response: failed
12,452,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,452,683 >>> mbox cmd response: failed
12,452,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,453,274 >>> mbox cmd response: failed
Initializing fuses
2,061,420 writing to cptra_bootfsm_go
2,250,706 UART:
2,251,045 UART: Running Caliptra ROM ...
2,252,185 UART:
2,252,355 UART: [state] CFI Enabled
2,317,509 UART: [state] LifecycleState = Unprovisioned
2,319,404 UART: [state] DebugLocked = No
2,320,732 UART: [state] WD Timer not started. Device not locked for debugging
2,324,209 UART: [kat] SHA2-256
2,503,884 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,514,665 UART: [kat] ++
2,515,217 UART: [kat] sha1
2,527,220 UART: [kat] SHA2-256
2,529,916 UART: [kat] SHA2-384
2,536,716 UART: [kat] SHA2-512-ACC
2,539,129 UART: [kat] ECC-384
4,999,874 UART: [kat] HMAC-384Kdf
5,024,538 UART: [kat] LMS
5,500,983 UART: [kat] --
5,505,631 UART: [cold-reset] ++
5,507,298 UART: [fht] FHT @ 0x50003400
5,519,690 UART: [idev] ++
5,520,269 UART: [idev] CDI.KEYID = 6
5,521,156 UART: [idev] SUBJECT.KEYID = 7
5,522,434 UART: [idev] UDS.KEYID = 0
5,524,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,673,930 UART: [idev] Erasing UDS.KEYID = 0
8,038,972 UART: [idev] Sha1 KeyId Algorithm
8,061,919 UART: [idev] --
8,067,222 UART: [ldev] ++
8,067,802 UART: [ldev] CDI.KEYID = 6
8,068,743 UART: [ldev] SUBJECT.KEYID = 5
8,069,909 UART: [ldev] AUTHORITY.KEYID = 7
8,071,151 UART: [ldev] FE.KEYID = 1
8,109,890 UART: [ldev] Erasing FE.KEYID = 1
10,618,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,352,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,368,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,384,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,399,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,419,999 UART: [ldev] --
12,426,145 UART: [fwproc] Wait for Commands...
12,428,846 UART: [fwproc] Recv command 0x46574c44
12,430,842 UART: [fwproc] Recv'd Img size: 118548 bytes
15,908,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,987,687 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,060,712 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,389,393 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,463,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,319,696 >>> mbox cmd response: failed
12,320,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,320,585 >>> mbox cmd response: failed
12,320,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,321,206 >>> mbox cmd response: failed
Initializing fuses
2,064,665 writing to cptra_bootfsm_go
5,516,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,292,487 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
192,685 UART:
193,044 UART: Running Caliptra ROM ...
194,258 UART:
603,671 UART: [state] CFI Enabled
616,219 UART: [state] LifecycleState = Unprovisioned
618,198 UART: [state] DebugLocked = No
619,988 UART: [state] WD Timer not started. Device not locked for debugging
623,471 UART: [kat] SHA2-256
803,086 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,890 UART: [kat] ++
814,430 UART: [kat] sha1
825,803 UART: [kat] SHA2-256
828,487 UART: [kat] SHA2-384
834,845 UART: [kat] SHA2-512-ACC
837,194 UART: [kat] ECC-384
3,280,464 UART: [kat] HMAC-384Kdf
3,292,809 UART: [kat] LMS
3,769,303 UART: [kat] --
3,775,459 UART: [cold-reset] ++
3,777,179 UART: [fht] FHT @ 0x50003400
3,789,671 UART: [idev] ++
3,790,242 UART: [idev] CDI.KEYID = 6
3,791,228 UART: [idev] SUBJECT.KEYID = 7
3,792,450 UART: [idev] UDS.KEYID = 0
3,794,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,020 UART: [idev] Erasing UDS.KEYID = 0
6,273,124 UART: [idev] Sha1 KeyId Algorithm
6,296,645 UART: [idev] --
6,300,779 UART: [ldev] ++
6,301,357 UART: [ldev] CDI.KEYID = 6
6,302,241 UART: [ldev] SUBJECT.KEYID = 5
6,303,518 UART: [ldev] AUTHORITY.KEYID = 7
6,304,754 UART: [ldev] FE.KEYID = 1
6,314,762 UART: [ldev] Erasing FE.KEYID = 1
8,796,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,052 UART: [ldev] --
10,589,734 UART: [fwproc] Wait for Commands...
10,591,910 UART: [fwproc] Recv command 0x46574c44
10,593,901 UART: [fwproc] Recv'd Img size: 118548 bytes
12,663,368 UART: ROM Fatal Error: 0x000B0040
12,666,595 >>> mbox cmd response: failed
12,666,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,667,262 >>> mbox cmd response: failed
12,667,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,667,865 >>> mbox cmd response: failed
Initializing fuses
2,066,127 writing to cptra_bootfsm_go
2,255,366 UART:
2,255,705 UART: Running Caliptra ROM ...
2,256,755 UART:
7,783,895 UART: [state] CFI Enabled
7,795,441 UART: [state] LifecycleState = Unprovisioned
7,797,386 UART: [state] DebugLocked = No
7,799,564 UART: [state] WD Timer not started. Device not locked for debugging
7,803,154 UART: [kat] SHA2-256
7,982,813 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,993,571 UART: [kat] ++
7,994,033 UART: [kat] sha1
8,004,388 UART: [kat] SHA2-256
8,007,091 UART: [kat] SHA2-384
8,013,255 UART: [kat] SHA2-512-ACC
8,015,612 UART: [kat] ECC-384
10,455,787 UART: [kat] HMAC-384Kdf
10,468,285 UART: [kat] LMS
10,944,816 UART: [kat] --
10,949,246 UART: [cold-reset] ++
10,950,799 UART: [fht] FHT @ 0x50003400
10,963,318 UART: [idev] ++
10,963,953 UART: [idev] CDI.KEYID = 6
10,964,864 UART: [idev] SUBJECT.KEYID = 7
10,966,139 UART: [idev] UDS.KEYID = 0
10,968,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,117,350 UART: [idev] Erasing UDS.KEYID = 0
13,441,798 UART: [idev] Sha1 KeyId Algorithm
13,464,877 UART: [idev] --
13,470,017 UART: [ldev] ++
13,470,627 UART: [ldev] CDI.KEYID = 6
13,471,550 UART: [ldev] SUBJECT.KEYID = 5
13,472,777 UART: [ldev] AUTHORITY.KEYID = 7
13,474,013 UART: [ldev] FE.KEYID = 1
13,486,662 UART: [ldev] Erasing FE.KEYID = 1
15,965,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,686,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,702,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,718,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,734,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,755,859 UART: [ldev] --
17,760,916 UART: [fwproc] Wait for Commands...
17,763,448 UART: [fwproc] Recv command 0x46574c44
17,765,441 UART: [fwproc] Recv'd Img size: 118548 bytes
21,254,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,336,517 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,409,529 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,738,244 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
3,781,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,535,356 >>> mbox cmd response: failed
12,535,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,536,293 >>> mbox cmd response: failed
12,536,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,536,859 >>> mbox cmd response: failed
Initializing fuses
2,060,013 writing to cptra_bootfsm_go
11,107,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,763,103 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,200 UART:
192,553 UART: Running Caliptra ROM ...
193,693 UART:
193,846 UART: [state] CFI Enabled
262,130 UART: [state] LifecycleState = Unprovisioned
264,526 UART: [state] DebugLocked = No
267,217 UART: [state] WD Timer not started. Device not locked for debugging
272,468 UART: [kat] SHA2-256
462,335 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,101 UART: [kat] ++
473,564 UART: [kat] sha1
485,467 UART: [kat] SHA2-256
488,481 UART: [kat] SHA2-384
494,683 UART: [kat] SHA2-512-ACC
497,248 UART: [kat] ECC-384
2,945,660 UART: [kat] HMAC-384Kdf
2,971,254 UART: [kat] LMS
3,503,050 UART: [kat] --
3,506,366 UART: [cold-reset] ++
3,508,253 UART: [fht] FHT @ 0x50003400
3,518,581 UART: [idev] ++
3,519,305 UART: [idev] CDI.KEYID = 6
3,520,284 UART: [idev] SUBJECT.KEYID = 7
3,521,588 UART: [idev] UDS.KEYID = 0
3,524,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,814,024 UART: [idev] Erasing UDS.KEYID = 0
6,300,216 UART: [idev] Sha1 KeyId Algorithm
6,322,192 UART: [idev] --
6,326,635 UART: [ldev] ++
6,327,325 UART: [ldev] CDI.KEYID = 6
6,328,246 UART: [ldev] SUBJECT.KEYID = 5
6,329,409 UART: [ldev] AUTHORITY.KEYID = 7
6,330,587 UART: [ldev] FE.KEYID = 1
6,370,024 UART: [ldev] Erasing FE.KEYID = 1
8,874,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,614,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,629,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,644,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,659,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,680,173 UART: [ldev] --
10,685,825 UART: [fwproc] Wait for Commands...
10,688,205 UART: [fwproc] Recv command 0x46574c44
10,690,483 UART: [fwproc] Recv'd Img size: 118548 bytes
12,778,355 UART: ROM Fatal Error: 0x000B0040
12,781,975 >>> mbox cmd response: failed
12,782,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,782,790 >>> mbox cmd response: failed
12,783,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,783,362 >>> mbox cmd response: failed
Initializing fuses
2,062,927 writing to cptra_bootfsm_go
2,252,302 UART:
2,252,651 UART: Running Caliptra ROM ...
2,253,785 UART:
2,253,958 UART: [state] CFI Enabled
2,321,755 UART: [state] LifecycleState = Unprovisioned
2,324,135 UART: [state] DebugLocked = No
2,325,853 UART: [state] WD Timer not started. Device not locked for debugging
2,331,188 UART: [kat] SHA2-256
2,521,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,836 UART: [kat] ++
2,532,339 UART: [kat] sha1
2,542,911 UART: [kat] SHA2-256
2,545,923 UART: [kat] SHA2-384
2,551,790 UART: [kat] SHA2-512-ACC
2,554,372 UART: [kat] ECC-384
5,006,220 UART: [kat] HMAC-384Kdf
5,030,775 UART: [kat] LMS
5,562,506 UART: [kat] --
5,566,889 UART: [cold-reset] ++
5,569,478 UART: [fht] FHT @ 0x50003400
5,581,276 UART: [idev] ++
5,581,965 UART: [idev] CDI.KEYID = 6
5,583,050 UART: [idev] SUBJECT.KEYID = 7
5,584,181 UART: [idev] UDS.KEYID = 0
5,586,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,735,597 UART: [idev] Erasing UDS.KEYID = 0
8,088,387 UART: [idev] Sha1 KeyId Algorithm
8,110,977 UART: [idev] --
8,115,893 UART: [ldev] ++
8,116,603 UART: [ldev] CDI.KEYID = 6
8,117,516 UART: [ldev] SUBJECT.KEYID = 5
8,118,683 UART: [ldev] AUTHORITY.KEYID = 7
8,119,867 UART: [ldev] FE.KEYID = 1
8,158,717 UART: [ldev] Erasing FE.KEYID = 1
10,667,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,401,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,416,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,431,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,447,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,468,655 UART: [ldev] --
12,474,289 UART: [fwproc] Wait for Commands...
12,475,973 UART: [fwproc] Recv command 0x46574c44
12,478,298 UART: [fwproc] Recv'd Img size: 118548 bytes
15,972,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,049,175 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,172,779 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,733,933 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,444,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,307,036 >>> mbox cmd response: failed
12,307,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,307,987 >>> mbox cmd response: failed
12,308,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,308,547 >>> mbox cmd response: failed
Initializing fuses
2,064,654 writing to cptra_bootfsm_go
5,494,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,867,371 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,464 UART:
192,819 UART: Running Caliptra ROM ...
194,019 UART:
603,559 UART: [state] CFI Enabled
617,436 UART: [state] LifecycleState = Unprovisioned
619,826 UART: [state] DebugLocked = No
621,267 UART: [state] WD Timer not started. Device not locked for debugging
625,640 UART: [kat] SHA2-256
815,523 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,315 UART: [kat] ++
826,911 UART: [kat] sha1
837,931 UART: [kat] SHA2-256
840,949 UART: [kat] SHA2-384
847,527 UART: [kat] SHA2-512-ACC
850,103 UART: [kat] ECC-384
3,292,162 UART: [kat] HMAC-384Kdf
3,305,649 UART: [kat] LMS
3,837,479 UART: [kat] --
3,841,403 UART: [cold-reset] ++
3,842,592 UART: [fht] FHT @ 0x50003400
3,853,076 UART: [idev] ++
3,853,773 UART: [idev] CDI.KEYID = 6
3,854,743 UART: [idev] SUBJECT.KEYID = 7
3,855,906 UART: [idev] UDS.KEYID = 0
3,858,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,720 UART: [idev] Erasing UDS.KEYID = 0
6,333,275 UART: [idev] Sha1 KeyId Algorithm
6,354,770 UART: [idev] --
6,359,694 UART: [ldev] ++
6,360,383 UART: [ldev] CDI.KEYID = 6
6,361,295 UART: [ldev] SUBJECT.KEYID = 5
6,362,461 UART: [ldev] AUTHORITY.KEYID = 7
6,363,695 UART: [ldev] FE.KEYID = 1
6,375,914 UART: [ldev] Erasing FE.KEYID = 1
8,852,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,457 UART: [ldev] --
10,641,089 UART: [fwproc] Wait for Commands...
10,642,606 UART: [fwproc] Recv command 0x46574c44
10,644,931 UART: [fwproc] Recv'd Img size: 118548 bytes
12,727,930 UART: ROM Fatal Error: 0x000B0040
12,731,550 >>> mbox cmd response: failed
12,731,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,732,312 >>> mbox cmd response: failed
12,732,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,732,837 >>> mbox cmd response: failed
Initializing fuses
2,061,249 writing to cptra_bootfsm_go
2,250,588 UART:
2,250,946 UART: Running Caliptra ROM ...
2,252,081 UART:
7,719,209 UART: [state] CFI Enabled
7,735,825 UART: [state] LifecycleState = Unprovisioned
7,738,215 UART: [state] DebugLocked = No
7,739,934 UART: [state] WD Timer not started. Device not locked for debugging
7,744,196 UART: [kat] SHA2-256
7,934,057 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,944,866 UART: [kat] ++
7,945,388 UART: [kat] sha1
7,956,873 UART: [kat] SHA2-256
7,959,904 UART: [kat] SHA2-384
7,964,554 UART: [kat] SHA2-512-ACC
7,967,128 UART: [kat] ECC-384
10,409,723 UART: [kat] HMAC-384Kdf
10,423,060 UART: [kat] LMS
10,954,846 UART: [kat] --
10,958,740 UART: [cold-reset] ++
10,960,298 UART: [fht] FHT @ 0x50003400
10,973,062 UART: [idev] ++
10,973,742 UART: [idev] CDI.KEYID = 6
10,974,754 UART: [idev] SUBJECT.KEYID = 7
10,975,857 UART: [idev] UDS.KEYID = 0
10,978,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,127,657 UART: [idev] Erasing UDS.KEYID = 0
13,452,776 UART: [idev] Sha1 KeyId Algorithm
13,475,868 UART: [idev] --
13,481,920 UART: [ldev] ++
13,482,658 UART: [ldev] CDI.KEYID = 6
13,483,571 UART: [ldev] SUBJECT.KEYID = 5
13,484,736 UART: [ldev] AUTHORITY.KEYID = 7
13,485,970 UART: [ldev] FE.KEYID = 1
13,497,165 UART: [ldev] Erasing FE.KEYID = 1
15,971,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,693,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,708,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,723,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,738,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,759,313 UART: [ldev] --
17,765,563 UART: [fwproc] Wait for Commands...
17,767,127 UART: [fwproc] Recv command 0x46574c44
17,769,462 UART: [fwproc] Recv'd Img size: 118548 bytes
21,264,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,346,575 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,470,207 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,031,095 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,755,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,525,992 >>> mbox cmd response: failed
12,526,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,527,012 >>> mbox cmd response: failed
12,527,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,527,587 >>> mbox cmd response: failed
Initializing fuses
2,060,656 writing to cptra_bootfsm_go
11,084,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,378,101 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,207 UART: [kat] SHA2-256
882,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,253 UART: [kat] ++
886,405 UART: [kat] sha1
890,641 UART: [kat] SHA2-256
892,579 UART: [kat] SHA2-384
895,272 UART: [kat] SHA2-512-ACC
897,173 UART: [kat] ECC-384
902,614 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,407 UART: [cold-reset] ++
1,476,771 UART: [fht] Storing FHT @ 0x50003400
1,479,594 UART: [idev] ++
1,479,762 UART: [idev] CDI.KEYID = 6
1,480,122 UART: [idev] SUBJECT.KEYID = 7
1,480,546 UART: [idev] UDS.KEYID = 0
1,480,891 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,828 UART: [idev] Erasing UDS.KEYID = 0
1,505,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,002 UART: [idev] --
1,515,051 UART: [ldev] ++
1,515,219 UART: [ldev] CDI.KEYID = 6
1,515,582 UART: [ldev] SUBJECT.KEYID = 5
1,516,008 UART: [ldev] AUTHORITY.KEYID = 7
1,516,471 UART: [ldev] FE.KEYID = 1
1,521,479 UART: [ldev] Erasing FE.KEYID = 1
1,546,326 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,032 UART: [ldev] --
1,585,305 UART: [fwproc] Waiting for Commands...
1,586,124 UART: [fwproc] Received command 0x46574c44
1,586,915 UART: [fwproc] Received Image of size 118548 bytes
1,635,094 UART: ROM Fatal Error: 0x000B0040
1,636,251 >>> mbox cmd response: failed
1,636,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,257 >>> mbox cmd response: failed
1,636,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,263 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,785 UART: [kat] SHA2-256
881,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,831 UART: [kat] ++
885,983 UART: [kat] sha1
890,325 UART: [kat] SHA2-256
892,263 UART: [kat] SHA2-384
895,006 UART: [kat] SHA2-512-ACC
896,907 UART: [kat] ECC-384
902,526 UART: [kat] HMAC-384Kdf
907,144 UART: [kat] LMS
1,475,340 UART: [kat] --
1,476,295 UART: [cold-reset] ++
1,476,863 UART: [fht] Storing FHT @ 0x50003400
1,479,676 UART: [idev] ++
1,479,844 UART: [idev] CDI.KEYID = 6
1,480,204 UART: [idev] SUBJECT.KEYID = 7
1,480,628 UART: [idev] UDS.KEYID = 0
1,480,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,650 UART: [idev] Erasing UDS.KEYID = 0
1,504,794 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,398 UART: [idev] --
1,514,263 UART: [ldev] ++
1,514,431 UART: [ldev] CDI.KEYID = 6
1,514,794 UART: [ldev] SUBJECT.KEYID = 5
1,515,220 UART: [ldev] AUTHORITY.KEYID = 7
1,515,683 UART: [ldev] FE.KEYID = 1
1,521,215 UART: [ldev] Erasing FE.KEYID = 1
1,545,886 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,964 UART: [ldev] --
1,585,445 UART: [fwproc] Waiting for Commands...
1,586,080 UART: [fwproc] Received command 0x46574c44
1,586,871 UART: [fwproc] Received Image of size 118548 bytes
2,931,076 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,222 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,440 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,657 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,486,258 >>> mbox cmd response: failed
1,486,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,264 >>> mbox cmd response: failed
1,486,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,027 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,036 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,762 UART: [kat] SHA2-256
882,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,808 UART: [kat] ++
886,960 UART: [kat] sha1
891,206 UART: [kat] SHA2-256
893,144 UART: [kat] SHA2-384
896,061 UART: [kat] SHA2-512-ACC
897,962 UART: [kat] ECC-384
903,485 UART: [kat] HMAC-384Kdf
908,317 UART: [kat] LMS
1,476,513 UART: [kat] --
1,477,264 UART: [cold-reset] ++
1,477,814 UART: [fht] Storing FHT @ 0x50003400
1,480,733 UART: [idev] ++
1,480,901 UART: [idev] CDI.KEYID = 6
1,481,261 UART: [idev] SUBJECT.KEYID = 7
1,481,685 UART: [idev] UDS.KEYID = 0
1,482,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,693 UART: [idev] Erasing UDS.KEYID = 0
1,506,689 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,213 UART: [idev] --
1,516,494 UART: [ldev] ++
1,516,662 UART: [ldev] CDI.KEYID = 6
1,517,025 UART: [ldev] SUBJECT.KEYID = 5
1,517,451 UART: [ldev] AUTHORITY.KEYID = 7
1,517,914 UART: [ldev] FE.KEYID = 1
1,522,920 UART: [ldev] Erasing FE.KEYID = 1
1,548,415 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,515 UART: [ldev] --
1,587,922 UART: [fwproc] Waiting for Commands...
1,588,617 UART: [fwproc] Received command 0x46574c44
1,589,408 UART: [fwproc] Received Image of size 118548 bytes
1,637,345 UART: ROM Fatal Error: 0x000B0040
1,638,502 >>> mbox cmd response: failed
1,638,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,508 >>> mbox cmd response: failed
1,638,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,514 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,422 UART: [kat] SHA2-256
882,353 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,468 UART: [kat] ++
886,620 UART: [kat] sha1
890,658 UART: [kat] SHA2-256
892,596 UART: [kat] SHA2-384
895,353 UART: [kat] SHA2-512-ACC
897,254 UART: [kat] ECC-384
902,623 UART: [kat] HMAC-384Kdf
907,277 UART: [kat] LMS
1,475,473 UART: [kat] --
1,476,442 UART: [cold-reset] ++
1,476,792 UART: [fht] Storing FHT @ 0x50003400
1,479,415 UART: [idev] ++
1,479,583 UART: [idev] CDI.KEYID = 6
1,479,943 UART: [idev] SUBJECT.KEYID = 7
1,480,367 UART: [idev] UDS.KEYID = 0
1,480,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,903 UART: [idev] Erasing UDS.KEYID = 0
1,504,479 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,971 UART: [idev] --
1,514,132 UART: [ldev] ++
1,514,300 UART: [ldev] CDI.KEYID = 6
1,514,663 UART: [ldev] SUBJECT.KEYID = 5
1,515,089 UART: [ldev] AUTHORITY.KEYID = 7
1,515,552 UART: [ldev] FE.KEYID = 1
1,521,072 UART: [ldev] Erasing FE.KEYID = 1
1,546,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,625 UART: [ldev] --
1,586,114 UART: [fwproc] Waiting for Commands...
1,586,755 UART: [fwproc] Received command 0x46574c44
1,587,546 UART: [fwproc] Received Image of size 118548 bytes
2,930,889 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,445 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,663 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,990 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,511 >>> mbox cmd response: failed
1,489,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,517 >>> mbox cmd response: failed
1,489,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,523 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,100 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
891,100 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,204 UART: [kat] ++
895,356 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,375 UART: [kat] SHA2-512-ACC
906,276 UART: [kat] ECC-384
915,783 UART: [kat] HMAC-384Kdf
920,451 UART: [kat] LMS
1,168,763 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,314 UART: [idev] ++
1,173,482 UART: [idev] CDI.KEYID = 6
1,173,843 UART: [idev] SUBJECT.KEYID = 7
1,174,268 UART: [idev] UDS.KEYID = 0
1,174,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,501 UART: [idev] Erasing UDS.KEYID = 0
1,199,815 UART: [idev] Sha1 KeyId Algorithm
1,208,693 UART: [idev] --
1,209,744 UART: [ldev] ++
1,209,912 UART: [ldev] CDI.KEYID = 6
1,210,276 UART: [ldev] SUBJECT.KEYID = 5
1,210,703 UART: [ldev] AUTHORITY.KEYID = 7
1,211,166 UART: [ldev] FE.KEYID = 1
1,216,484 UART: [ldev] Erasing FE.KEYID = 1
1,242,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,510 UART: [ldev] --
1,281,843 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,151 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,878 UART: ROM Fatal Error: 0x000B0040
1,332,035 >>> mbox cmd response: failed
1,332,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,041 >>> mbox cmd response: failed
1,332,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,775 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
891,576 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
900,236 UART: [kat] SHA2-256
902,176 UART: [kat] SHA2-384
905,007 UART: [kat] SHA2-512-ACC
906,908 UART: [kat] ECC-384
916,677 UART: [kat] HMAC-384Kdf
921,327 UART: [kat] LMS
1,169,639 UART: [kat] --
1,170,558 UART: [cold-reset] ++
1,170,998 UART: [fht] FHT @ 0x50003400
1,173,742 UART: [idev] ++
1,173,910 UART: [idev] CDI.KEYID = 6
1,174,271 UART: [idev] SUBJECT.KEYID = 7
1,174,696 UART: [idev] UDS.KEYID = 0
1,175,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,901 UART: [idev] Erasing UDS.KEYID = 0
1,199,957 UART: [idev] Sha1 KeyId Algorithm
1,208,635 UART: [idev] --
1,209,536 UART: [ldev] ++
1,209,704 UART: [ldev] CDI.KEYID = 6
1,210,068 UART: [ldev] SUBJECT.KEYID = 5
1,210,495 UART: [ldev] AUTHORITY.KEYID = 7
1,210,958 UART: [ldev] FE.KEYID = 1
1,216,278 UART: [ldev] Erasing FE.KEYID = 1
1,242,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,362 UART: [ldev] --
1,281,671 UART: [fwproc] Wait for Commands...
1,282,382 UART: [fwproc] Recv command 0x46574c44
1,283,115 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,318 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,493 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,738 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,794 >>> mbox cmd response: failed
1,185,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,800 >>> mbox cmd response: failed
1,185,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,603 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
900,021 UART: [kat] SHA2-256
901,961 UART: [kat] SHA2-384
904,706 UART: [kat] SHA2-512-ACC
906,607 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,794 UART: [kat] LMS
1,169,106 UART: [kat] --
1,170,307 UART: [cold-reset] ++
1,170,647 UART: [fht] FHT @ 0x50003400
1,173,289 UART: [idev] ++
1,173,457 UART: [idev] CDI.KEYID = 6
1,173,818 UART: [idev] SUBJECT.KEYID = 7
1,174,243 UART: [idev] UDS.KEYID = 0
1,174,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,276 UART: [idev] Erasing UDS.KEYID = 0
1,200,090 UART: [idev] Sha1 KeyId Algorithm
1,208,906 UART: [idev] --
1,209,775 UART: [ldev] ++
1,209,943 UART: [ldev] CDI.KEYID = 6
1,210,307 UART: [ldev] SUBJECT.KEYID = 5
1,210,734 UART: [ldev] AUTHORITY.KEYID = 7
1,211,197 UART: [ldev] FE.KEYID = 1
1,216,573 UART: [ldev] Erasing FE.KEYID = 1
1,242,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,545 UART: [ldev] --
1,281,956 UART: [fwproc] Wait for Commands...
1,282,675 UART: [fwproc] Recv command 0x46574c44
1,283,408 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,155 UART: ROM Fatal Error: 0x000B0040
1,332,312 >>> mbox cmd response: failed
1,332,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,318 >>> mbox cmd response: failed
1,332,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,324 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,603 UART: [kat] SHA2-256
891,153 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,257 UART: [kat] ++
895,409 UART: [kat] sha1
899,705 UART: [kat] SHA2-256
901,645 UART: [kat] SHA2-384
904,304 UART: [kat] SHA2-512-ACC
906,205 UART: [kat] ECC-384
916,102 UART: [kat] HMAC-384Kdf
920,740 UART: [kat] LMS
1,169,052 UART: [kat] --
1,169,863 UART: [cold-reset] ++
1,170,259 UART: [fht] FHT @ 0x50003400
1,172,935 UART: [idev] ++
1,173,103 UART: [idev] CDI.KEYID = 6
1,173,464 UART: [idev] SUBJECT.KEYID = 7
1,173,889 UART: [idev] UDS.KEYID = 0
1,174,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,802 UART: [idev] Erasing UDS.KEYID = 0
1,199,144 UART: [idev] Sha1 KeyId Algorithm
1,208,036 UART: [idev] --
1,208,943 UART: [ldev] ++
1,209,111 UART: [ldev] CDI.KEYID = 6
1,209,475 UART: [ldev] SUBJECT.KEYID = 5
1,209,902 UART: [ldev] AUTHORITY.KEYID = 7
1,210,365 UART: [ldev] FE.KEYID = 1
1,215,367 UART: [ldev] Erasing FE.KEYID = 1
1,241,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,091 UART: [ldev] --
1,281,402 UART: [fwproc] Wait for Commands...
1,282,197 UART: [fwproc] Recv command 0x46574c44
1,282,930 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,547 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,722 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,935 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,109 >>> mbox cmd response: failed
1,185,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,115 >>> mbox cmd response: failed
1,185,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,044 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,625 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
902,023 UART: [kat] SHA2-256
903,963 UART: [kat] SHA2-384
906,674 UART: [kat] SHA2-512-ACC
908,575 UART: [kat] ECC-384
917,882 UART: [kat] HMAC-384Kdf
922,596 UART: [kat] LMS
1,170,924 UART: [kat] --
1,171,901 UART: [cold-reset] ++
1,172,445 UART: [fht] FHT @ 0x50003400
1,175,254 UART: [idev] ++
1,175,422 UART: [idev] CDI.KEYID = 6
1,175,782 UART: [idev] SUBJECT.KEYID = 7
1,176,206 UART: [idev] UDS.KEYID = 0
1,176,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,250 UART: [idev] Erasing UDS.KEYID = 0
1,201,193 UART: [idev] Sha1 KeyId Algorithm
1,209,455 UART: [idev] --
1,210,497 UART: [ldev] ++
1,210,665 UART: [ldev] CDI.KEYID = 6
1,211,028 UART: [ldev] SUBJECT.KEYID = 5
1,211,454 UART: [ldev] AUTHORITY.KEYID = 7
1,211,917 UART: [ldev] FE.KEYID = 1
1,217,341 UART: [ldev] Erasing FE.KEYID = 1
1,243,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,013 UART: [ldev] --
1,282,286 UART: [fwproc] Wait for Commands...
1,283,010 UART: [fwproc] Recv command 0x46574c44
1,283,738 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,985 UART: ROM Fatal Error: 0x000B0040
1,332,142 >>> mbox cmd response: failed
1,332,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,148 >>> mbox cmd response: failed
1,332,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,154 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
893,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,567 UART: [kat] ++
897,719 UART: [kat] sha1
901,915 UART: [kat] SHA2-256
903,855 UART: [kat] SHA2-384
906,634 UART: [kat] SHA2-512-ACC
908,535 UART: [kat] ECC-384
918,698 UART: [kat] HMAC-384Kdf
923,240 UART: [kat] LMS
1,171,568 UART: [kat] --
1,172,525 UART: [cold-reset] ++
1,172,937 UART: [fht] FHT @ 0x50003400
1,175,612 UART: [idev] ++
1,175,780 UART: [idev] CDI.KEYID = 6
1,176,140 UART: [idev] SUBJECT.KEYID = 7
1,176,564 UART: [idev] UDS.KEYID = 0
1,176,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,210 UART: [idev] Erasing UDS.KEYID = 0
1,201,007 UART: [idev] Sha1 KeyId Algorithm
1,209,339 UART: [idev] --
1,210,403 UART: [ldev] ++
1,210,571 UART: [ldev] CDI.KEYID = 6
1,210,934 UART: [ldev] SUBJECT.KEYID = 5
1,211,360 UART: [ldev] AUTHORITY.KEYID = 7
1,211,823 UART: [ldev] FE.KEYID = 1
1,217,219 UART: [ldev] Erasing FE.KEYID = 1
1,243,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,725 UART: [ldev] --
1,283,004 UART: [fwproc] Wait for Commands...
1,283,756 UART: [fwproc] Recv command 0x46574c44
1,284,484 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,453 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,623 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,930 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,713 >>> mbox cmd response: failed
1,186,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,719 >>> mbox cmd response: failed
1,186,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,467 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
893,325 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,450 UART: [kat] ++
897,602 UART: [kat] sha1
901,900 UART: [kat] SHA2-256
903,840 UART: [kat] SHA2-384
906,663 UART: [kat] SHA2-512-ACC
908,564 UART: [kat] ECC-384
918,275 UART: [kat] HMAC-384Kdf
922,987 UART: [kat] LMS
1,171,315 UART: [kat] --
1,171,842 UART: [cold-reset] ++
1,172,370 UART: [fht] FHT @ 0x50003400
1,175,195 UART: [idev] ++
1,175,363 UART: [idev] CDI.KEYID = 6
1,175,723 UART: [idev] SUBJECT.KEYID = 7
1,176,147 UART: [idev] UDS.KEYID = 0
1,176,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,953 UART: [idev] Erasing UDS.KEYID = 0
1,201,044 UART: [idev] Sha1 KeyId Algorithm
1,209,504 UART: [idev] --
1,210,514 UART: [ldev] ++
1,210,682 UART: [ldev] CDI.KEYID = 6
1,211,045 UART: [ldev] SUBJECT.KEYID = 5
1,211,471 UART: [ldev] AUTHORITY.KEYID = 7
1,211,934 UART: [ldev] FE.KEYID = 1
1,217,256 UART: [ldev] Erasing FE.KEYID = 1
1,243,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,676 UART: [ldev] --
1,283,105 UART: [fwproc] Wait for Commands...
1,283,855 UART: [fwproc] Recv command 0x46574c44
1,284,583 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,280 UART: ROM Fatal Error: 0x000B0040
1,332,437 >>> mbox cmd response: failed
1,332,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,443 >>> mbox cmd response: failed
1,332,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,449 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
902,298 UART: [kat] SHA2-256
904,238 UART: [kat] SHA2-384
907,029 UART: [kat] SHA2-512-ACC
908,930 UART: [kat] ECC-384
918,805 UART: [kat] HMAC-384Kdf
923,323 UART: [kat] LMS
1,171,651 UART: [kat] --
1,172,670 UART: [cold-reset] ++
1,173,234 UART: [fht] FHT @ 0x50003400
1,176,113 UART: [idev] ++
1,176,281 UART: [idev] CDI.KEYID = 6
1,176,641 UART: [idev] SUBJECT.KEYID = 7
1,177,065 UART: [idev] UDS.KEYID = 0
1,177,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,069 UART: [idev] Erasing UDS.KEYID = 0
1,202,200 UART: [idev] Sha1 KeyId Algorithm
1,210,754 UART: [idev] --
1,211,760 UART: [ldev] ++
1,211,928 UART: [ldev] CDI.KEYID = 6
1,212,291 UART: [ldev] SUBJECT.KEYID = 5
1,212,717 UART: [ldev] AUTHORITY.KEYID = 7
1,213,180 UART: [ldev] FE.KEYID = 1
1,218,226 UART: [ldev] Erasing FE.KEYID = 1
1,244,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,364 UART: [ldev] --
1,283,871 UART: [fwproc] Wait for Commands...
1,284,573 UART: [fwproc] Recv command 0x46574c44
1,285,301 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,818 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,988 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,367 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,762 >>> mbox cmd response: failed
1,188,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,768 >>> mbox cmd response: failed
1,188,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,774 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,206 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,125 UART:
192,487 UART: Running Caliptra ROM ...
193,570 UART:
193,711 UART: [state] CFI Enabled
260,867 UART: [state] LifecycleState = Unprovisioned
262,842 UART: [state] DebugLocked = No
264,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,977 UART: [kat] SHA2-256
439,705 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,181 UART: [kat] ++
450,659 UART: [kat] sha1
462,507 UART: [kat] SHA2-256
465,196 UART: [kat] SHA2-384
472,796 UART: [kat] SHA2-512-ACC
475,140 UART: [kat] ECC-384
2,768,275 UART: [kat] HMAC-384Kdf
2,799,085 UART: [kat] LMS
3,989,385 UART: [kat] --
3,993,732 UART: [cold-reset] ++
3,995,024 UART: [fht] Storing FHT @ 0x50003400
4,007,705 UART: [idev] ++
4,008,284 UART: [idev] CDI.KEYID = 6
4,009,206 UART: [idev] SUBJECT.KEYID = 7
4,010,445 UART: [idev] UDS.KEYID = 0
4,013,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,518 UART: [idev] Erasing UDS.KEYID = 0
7,345,151 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,504 UART: [idev] --
7,370,094 UART: [ldev] ++
7,370,667 UART: [ldev] CDI.KEYID = 6
7,371,690 UART: [ldev] SUBJECT.KEYID = 5
7,372,798 UART: [ldev] AUTHORITY.KEYID = 7
7,374,090 UART: [ldev] FE.KEYID = 1
7,421,104 UART: [ldev] Erasing FE.KEYID = 1
10,751,175 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,935 UART: [ldev] --
13,113,406 UART: [fwproc] Waiting for Commands...
13,115,455 UART: [fwproc] Received command 0x46574c44
13,117,700 UART: [fwproc] Received Image of size 118548 bytes
17,219,922 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,528 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,720 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,698,096 >>> mbox cmd response: success
17,699,686 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
17,828,903 UART: [afmc] ++
17,829,542 UART: [afmc] CDI.KEYID = 6
17,830,466 UART: [afmc] SUBJECT.KEYID = 7
17,831,579 UART: [afmc] AUTHORITY.KEYID = 5
21,073,575 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,682 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,947 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,387,393 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,105 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,416,599 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,381 UART: [afmc] --
23,443,730 UART: [cold-reset] --
23,449,322 UART: [state] Locking Datavault
23,453,870 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,623 UART: [state] Locking ICCM
23,456,749 UART: [exit] Launching FMC @ 0x40000130
23,465,148 UART:
23,465,383 UART: Running Caliptra FMC ...
23,466,487 UART:
23,466,649 UART: [state] CFI Enabled
23,530,853 UART: [fht] FMC Alias Private Key: 7
25,892,130 UART: [art] Extend RT PCRs Done
25,893,350 UART: [art] Lock RT PCRs Done
25,894,886 UART: [art] Populate DV Done
25,900,301 UART: [fht] FMC Alias Private Key: 7
25,901,854 UART: [art] Derive CDI
25,902,671 UART: [art] Store in slot 0x4
25,961,573 UART: [art] Derive Key Pair
25,962,611 UART: [art] Store priv key in slot 0x5
29,254,799 UART: [art] Derive Key Pair - Done
29,267,864 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,619 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,129 UART: [art] PUB.X = D78706C33918B5F557D3553BB1F428BEEF31B428E479F0D0331CD1B3F12E225678544B6E41BD9F151D501980A038D603
31,565,383 UART: [art] PUB.Y = 20DB0C6CBE12D9D64D2A5CDA22095C90689DBC1DDE9950F3A8D01A79308060E2741082BE53880480CDF1D34E85AC13BD
31,572,619 UART: [art] SIG.R = 24B5EAF9C656CE16586D92BB990145FE899AB5A7373D37BFDD89C72DF34B22206FBF55009F4F3C02D22EB8E439C415CC
31,580,015 UART: [art] SIG.S = 6DE41B4E54CDB160E9FEE2DFBCAC5715FD09F82F765A759E551582D3E8B8342D883B8E66BB2ED8643C553ADF111375AF
32,885,172 UART: Caliptra RT
32,885,892 UART: [state] CFI Enabled
33,060,818 UART: [rt] RT listening for mailbox commands...
33,063,643 UART:
33,063,821 UART: Running Caliptra ROM ...
33,064,943 UART:
33,065,102 UART: [state] CFI Enabled
33,133,287 UART: [state] LifecycleState = Unprovisioned
33,135,214 UART: [state] DebugLocked = No
33,136,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,142,235 UART: [kat] SHA2-256
33,311,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,322,424 UART: [kat] ++
33,322,884 UART: [kat] sha1
33,333,826 UART: [kat] SHA2-256
33,336,568 UART: [kat] SHA2-384
33,342,821 UART: [kat] SHA2-512-ACC
33,345,227 UART: [kat] ECC-384
35,634,895 UART: [kat] HMAC-384Kdf
35,647,922 UART: [kat] LMS
36,838,246 UART: [kat] --
36,842,622 UART: [update-reset] ++
39,639,405 >>> mbox cmd response: failed
39,641,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,790,428 UART: ROM Non-Fatal Error: 0x000B001F
39,791,867 UART: [state] Locking Datavault
39,793,029 UART: [state] Locking PCR0, PCR1 and PCR31
39,794,573 UART: [state] Locking ICCM
39,795,491 UART: [exit] Launching FMC @ 0x40000130
39,797,134 UART:
39,797,309 UART: Running Caliptra FMC ...
39,798,326 UART:
39,798,470 UART: [state] CFI Enabled
39,799,307 UART: [art] Extend RT PCRs Done
39,800,445 UART: [art] Lock RT PCRs Done
39,801,536 UART: [art] Populate DV Done
39,802,570 UART: [fht] FMC Alias Private Key: 7
39,803,888 UART: [art] Derive CDI
39,804,626 UART: [art] Store in slot 0x4
39,824,536 UART: [art] Derive Key Pair
39,825,541 UART: [art] Store priv key in slot 0x5
43,118,481 UART: [art] Derive Key Pair - Done
43,131,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,419,379 UART: [art] Erasing AUTHORITY.KEYID = 7
45,421,020 UART: [art] PUB.X = D78706C33918B5F557D3553BB1F428BEEF31B428E479F0D0331CD1B3F12E225678544B6E41BD9F151D501980A038D603
45,428,117 UART: [art] PUB.Y = 20DB0C6CBE12D9D64D2A5CDA22095C90689DBC1DDE9950F3A8D01A79308060E2741082BE53880480CDF1D34E85AC13BD
45,435,405 UART: [art] SIG.R = 24B5EAF9C656CE16586D92BB990145FE899AB5A7373D37BFDD89C72DF34B22206FBF55009F4F3C02D22EB8E439C415CC
45,442,796 UART: [art] SIG.S = 6DE41B4E54CDB160E9FEE2DFBCAC5715FD09F82F765A759E551582D3E8B8342D883B8E66BB2ED8643C553ADF111375AF
46,748,306 UART: Caliptra RT
46,749,012 UART: [state] CFI Enabled
47,164,858 UART: [rt] RT listening for mailbox commands...
47,167,946 UART:
47,168,118 UART: Running Caliptra ROM ...
47,169,336 UART:
47,169,494 UART: [state] CFI Enabled
47,235,445 UART: [state] LifecycleState = Unprovisioned
47,237,362 UART: [state] DebugLocked = No
47,240,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,244,596 UART: [kat] SHA2-256
47,414,324 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,424,821 UART: [kat] ++
47,425,283 UART: [kat] sha1
47,435,035 UART: [kat] SHA2-256
47,437,728 UART: [kat] SHA2-384
47,444,424 UART: [kat] SHA2-512-ACC
47,446,772 UART: [kat] ECC-384
49,737,456 UART: [kat] HMAC-384Kdf
49,767,464 UART: [kat] LMS
50,957,775 UART: [kat] --
50,961,059 UART: [update-reset] ++
55,150,093 UART: [update-reset] Image verified using Vendor ECC Key Index 0
55,154,260 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,551,997 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,785,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,970,025 >>> mbox cmd response: success
17,972,061 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
23,675,163 UART:
23,675,631 UART: Running Caliptra FMC ...
23,676,759 UART:
23,676,922 UART: [state] CFI Enabled
23,741,359 UART: [fht] FMC Alias Private Key: 7
26,081,513 UART: [art] Extend RT PCRs Done
26,082,749 UART: [art] Lock RT PCRs Done
26,084,791 UART: [art] Populate DV Done
26,089,950 UART: [fht] FMC Alias Private Key: 7
26,091,608 UART: [art] Derive CDI
26,092,434 UART: [art] Store in slot 0x4
26,149,715 UART: [art] Derive Key Pair
26,150,771 UART: [art] Store priv key in slot 0x5
29,443,664 UART: [art] Derive Key Pair - Done
29,456,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,032 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,548 UART: [art] PUB.X = 64E9A5D5BC60283AC7525434E27F237D125264C3CFFF0FC20099AABE461183A5E9D04D31E80B1DDE92A14EF3EF221DC4
31,753,818 UART: [art] PUB.Y = 65C303D26009B3B8D479AF5414237B0E138541876391C3C55B01076B338A6270FCA449F9608079CC19A2183B6BD6A233
31,761,003 UART: [art] SIG.R = 317FC809B99C0FF46FD24F5C0D67360ED3FC870109E16070789C6070FBBC020F0AF636D705E3DC5DFD92FF0F4D27E1E5
31,768,413 UART: [art] SIG.S = F5F8794C4E442003BC7475E09351038CD2D325154BFA304780A19B511BAE0C24E5F006801FA1414415DE17A4B5EFC9A8
33,073,620 UART: Caliptra RT
33,074,331 UART: [state] CFI Enabled
33,251,424 UART: [rt] RT listening for mailbox commands...
39,657,478 >>> mbox cmd response: failed
39,659,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,808,547 UART:
39,808,863 UART: Running Caliptra FMC ...
39,809,910 UART:
39,810,061 UART: [state] CFI Enabled
39,811,167 UART: [art] Extend RT PCRs Done
39,812,332 UART: [art] Lock RT PCRs Done
39,813,414 UART: [art] Populate DV Done
39,814,452 UART: [fht] FMC Alias Private Key: 7
39,815,857 UART: [art] Derive CDI
39,816,604 UART: [art] Store in slot 0x4
39,843,698 UART: [art] Derive Key Pair
39,844,705 UART: [art] Store priv key in slot 0x5
43,137,874 UART: [art] Derive Key Pair - Done
43,150,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,438,926 UART: [art] Erasing AUTHORITY.KEYID = 7
45,440,439 UART: [art] PUB.X = 64E9A5D5BC60283AC7525434E27F237D125264C3CFFF0FC20099AABE461183A5E9D04D31E80B1DDE92A14EF3EF221DC4
45,447,716 UART: [art] PUB.Y = 65C303D26009B3B8D479AF5414237B0E138541876391C3C55B01076B338A6270FCA449F9608079CC19A2183B6BD6A233
45,454,906 UART: [art] SIG.R = 317FC809B99C0FF46FD24F5C0D67360ED3FC870109E16070789C6070FBBC020F0AF636D705E3DC5DFD92FF0F4D27E1E5
45,462,303 UART: [art] SIG.S = F5F8794C4E442003BC7475E09351038CD2D325154BFA304780A19B511BAE0C24E5F006801FA1414415DE17A4B5EFC9A8
46,767,887 UART: Caliptra RT
46,768,611 UART: [state] CFI Enabled
47,191,071 UART: [rt] RT listening for mailbox commands...
55,844,548 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,436 writing to cptra_bootfsm_go
192,695 UART:
193,044 UART: Running Caliptra ROM ...
194,253 UART:
604,021 UART: [state] CFI Enabled
618,887 UART: [state] LifecycleState = Unprovisioned
620,823 UART: [state] DebugLocked = No
623,579 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,117 UART: [kat] SHA2-256
797,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,390 UART: [kat] ++
808,840 UART: [kat] sha1
819,505 UART: [kat] SHA2-256
822,198 UART: [kat] SHA2-384
827,914 UART: [kat] SHA2-512-ACC
830,257 UART: [kat] ECC-384
3,115,813 UART: [kat] HMAC-384Kdf
3,128,329 UART: [kat] LMS
4,318,412 UART: [kat] --
4,323,401 UART: [cold-reset] ++
4,325,458 UART: [fht] Storing FHT @ 0x50003400
4,335,814 UART: [idev] ++
4,336,388 UART: [idev] CDI.KEYID = 6
4,337,418 UART: [idev] SUBJECT.KEYID = 7
4,338,588 UART: [idev] UDS.KEYID = 0
4,341,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,439 UART: [idev] Erasing UDS.KEYID = 0
7,630,636 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,532 UART: [idev] --
7,657,678 UART: [ldev] ++
7,658,271 UART: [ldev] CDI.KEYID = 6
7,659,170 UART: [ldev] SUBJECT.KEYID = 5
7,660,393 UART: [ldev] AUTHORITY.KEYID = 7
7,661,693 UART: [ldev] FE.KEYID = 1
7,672,646 UART: [ldev] Erasing FE.KEYID = 1
10,960,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,694 UART: [ldev] --
13,317,937 UART: [fwproc] Waiting for Commands...
13,321,322 UART: [fwproc] Received command 0x46574c44
13,323,536 UART: [fwproc] Received Image of size 118548 bytes
17,431,523 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,834 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,583,003 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,651 >>> mbox cmd response: success
17,912,207 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
18,041,215 UART: [afmc] ++
18,041,865 UART: [afmc] CDI.KEYID = 6
18,042,766 UART: [afmc] SUBJECT.KEYID = 7
18,043,796 UART: [afmc] AUTHORITY.KEYID = 5
21,233,868 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,990 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,531,218 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,665 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,560,363 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,807 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,597,500 UART: [afmc] --
23,600,885 UART: [cold-reset] --
23,604,323 UART: [state] Locking Datavault
23,610,767 UART: [state] Locking PCR0, PCR1 and PCR31
23,612,482 UART: [state] Locking ICCM
23,614,757 UART: [exit] Launching FMC @ 0x40000130
23,623,163 UART:
23,623,405 UART: Running Caliptra FMC ...
23,624,517 UART:
23,624,683 UART: [state] CFI Enabled
23,632,576 UART: [fht] FMC Alias Private Key: 7
25,973,238 UART: [art] Extend RT PCRs Done
25,974,471 UART: [art] Lock RT PCRs Done
25,976,219 UART: [art] Populate DV Done
25,981,490 UART: [fht] FMC Alias Private Key: 7
25,982,934 UART: [art] Derive CDI
25,983,672 UART: [art] Store in slot 0x4
26,026,240 UART: [art] Derive Key Pair
26,027,245 UART: [art] Store priv key in slot 0x5
29,269,652 UART: [art] Derive Key Pair - Done
29,282,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,563,184 UART: [art] Erasing AUTHORITY.KEYID = 7
31,564,695 UART: [art] PUB.X = 7D46BC03CD85EAB43BA7CCD9FC578412BD5B7D84C77EBAE13A58B624743B17A6C031BE319AD0C8AB96C4750232A0D954
31,571,952 UART: [art] PUB.Y = 52D5CFC2E74E7D2BD9907BCF089F9920D4AF2780DE65FC6C484B36F1AD699C8E1465951023EF4085F6521E16AC297748
31,579,250 UART: [art] SIG.R = 6235DA37ABE6431787FCD33328E626E66CCFDC494C1A691473A176F1B66D1D210403F0A8F4B8FCE1549FC0024A238037
31,586,593 UART: [art] SIG.S = 3F751CE673B81D0B4CFD7A2E86EA0C83444367D3C8E3825B39880F812A60B6C7B45114DF4E5B94F66E2060C995C44169
32,892,428 UART: Caliptra RT
32,893,151 UART: [state] CFI Enabled
33,027,193 UART: [rt] RT listening for mailbox commands...
33,030,218 UART:
33,030,500 UART: Running Caliptra ROM ...
33,031,566 UART:
33,031,837 UART: [state] CFI Enabled
33,045,467 UART: [state] LifecycleState = Unprovisioned
33,047,368 UART: [state] DebugLocked = No
33,048,893 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,053,684 UART: [kat] SHA2-256
33,223,378 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,233,938 UART: [kat] ++
33,234,429 UART: [kat] sha1
33,244,844 UART: [kat] SHA2-256
33,247,523 UART: [kat] SHA2-384
33,253,253 UART: [kat] SHA2-512-ACC
33,255,610 UART: [kat] ECC-384
35,538,858 UART: [kat] HMAC-384Kdf
35,550,493 UART: [kat] LMS
36,740,564 UART: [kat] --
36,744,150 UART: [update-reset] ++
39,542,751 >>> mbox cmd response: failed
39,544,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,693,586 UART: ROM Non-Fatal Error: 0x000B001F
39,695,023 UART: [state] Locking Datavault
39,696,195 UART: [state] Locking PCR0, PCR1 and PCR31
39,697,747 UART: [state] Locking ICCM
39,698,660 UART: [exit] Launching FMC @ 0x40000130
39,700,093 UART:
39,700,263 UART: Running Caliptra FMC ...
39,701,380 UART:
39,701,544 UART: [state] CFI Enabled
39,702,385 UART: [art] Extend RT PCRs Done
39,703,535 UART: [art] Lock RT PCRs Done
39,704,556 UART: [art] Populate DV Done
39,705,553 UART: [fht] FMC Alias Private Key: 7
39,706,884 UART: [art] Derive CDI
39,707,621 UART: [art] Store in slot 0x4
39,708,607 UART: [art] Derive Key Pair
39,709,545 UART: [art] Store priv key in slot 0x5
42,906,365 UART: [art] Derive Key Pair - Done
42,919,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,200,124 UART: [art] Erasing AUTHORITY.KEYID = 7
45,201,740 UART: [art] PUB.X = 7D46BC03CD85EAB43BA7CCD9FC578412BD5B7D84C77EBAE13A58B624743B17A6C031BE319AD0C8AB96C4750232A0D954
45,208,955 UART: [art] PUB.Y = 52D5CFC2E74E7D2BD9907BCF089F9920D4AF2780DE65FC6C484B36F1AD699C8E1465951023EF4085F6521E16AC297748
45,216,205 UART: [art] SIG.R = 6235DA37ABE6431787FCD33328E626E66CCFDC494C1A691473A176F1B66D1D210403F0A8F4B8FCE1549FC0024A238037
45,223,614 UART: [art] SIG.S = 3F751CE673B81D0B4CFD7A2E86EA0C83444367D3C8E3825B39880F812A60B6C7B45114DF4E5B94F66E2060C995C44169
46,528,945 UART: Caliptra RT
46,529,653 UART: [state] CFI Enabled
46,903,612 UART: [rt] RT listening for mailbox commands...
46,906,438 UART:
46,906,722 UART: Running Caliptra ROM ...
46,907,841 UART:
46,908,059 UART: [state] CFI Enabled
46,921,355 UART: [state] LifecycleState = Unprovisioned
46,923,281 UART: [state] DebugLocked = No
46,924,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
46,929,317 UART: [kat] SHA2-256
47,098,988 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,109,548 UART: [kat] ++
47,110,089 UART: [kat] sha1
47,119,913 UART: [kat] SHA2-256
47,122,614 UART: [kat] SHA2-384
47,128,125 UART: [kat] SHA2-512-ACC
47,130,482 UART: [kat] ECC-384
49,413,704 UART: [kat] HMAC-384Kdf
49,425,830 UART: [kat] LMS
50,615,924 UART: [kat] --
50,620,080 UART: [update-reset] ++
54,809,596 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,813,438 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,211,236 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
4,126,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,153,965 >>> mbox cmd response: success
18,155,900 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
23,797,246 UART:
23,797,683 UART: Running Caliptra FMC ...
23,798,832 UART:
23,799,007 UART: [state] CFI Enabled
23,806,589 UART: [fht] FMC Alias Private Key: 7
26,146,507 UART: [art] Extend RT PCRs Done
26,147,769 UART: [art] Lock RT PCRs Done
26,149,704 UART: [art] Populate DV Done
26,155,138 UART: [fht] FMC Alias Private Key: 7
26,156,750 UART: [art] Derive CDI
26,157,580 UART: [art] Store in slot 0x4
26,200,620 UART: [art] Derive Key Pair
26,201,623 UART: [art] Store priv key in slot 0x5
29,444,311 UART: [art] Derive Key Pair - Done
29,457,210 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,468 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,032 UART: [art] PUB.X = 083549B8EC416D212BDB1C8204ABF77B007BC1D026E04FE54BDC3277DE66BD63444F099AB260E988F2ABB8CCE4EFC349
31,746,263 UART: [art] PUB.Y = 0D774F03AAE4D7B49F41FA8C5CAC19CA04CA1C18C036A0CE5A1A3EE8F5C5A73FED053C960FD61DB0FFB9BB773DB5F1E2
31,753,553 UART: [art] SIG.R = 7F65BE075601AC5B9374E7983CC24013F892ACB5ECC1E1E0C0163355BF0512757C863B0A524EDB93D4A25BEA3E5EE663
31,760,900 UART: [art] SIG.S = 6A8EC4EB273FC51CB05B3B282D0371ECB503ADF64248DFFA4276CD61A486361A510B1D5CAB45C019308F658911658E71
33,066,353 UART: Caliptra RT
33,067,049 UART: [state] CFI Enabled
33,201,072 UART: [rt] RT listening for mailbox commands...
39,554,190 >>> mbox cmd response: failed
39,556,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,705,228 UART:
39,705,571 UART: Running Caliptra FMC ...
39,706,715 UART:
39,706,907 UART: [state] CFI Enabled
39,707,839 UART: [art] Extend RT PCRs Done
39,708,995 UART: [art] Lock RT PCRs Done
39,710,072 UART: [art] Populate DV Done
39,711,132 UART: [fht] FMC Alias Private Key: 7
39,712,537 UART: [art] Derive CDI
39,713,291 UART: [art] Store in slot 0x4
39,714,361 UART: [art] Derive Key Pair
39,715,312 UART: [art] Store priv key in slot 0x5
42,907,530 UART: [art] Derive Key Pair - Done
42,920,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,200,599 UART: [art] Erasing AUTHORITY.KEYID = 7
45,202,125 UART: [art] PUB.X = 083549B8EC416D212BDB1C8204ABF77B007BC1D026E04FE54BDC3277DE66BD63444F099AB260E988F2ABB8CCE4EFC349
45,209,373 UART: [art] PUB.Y = 0D774F03AAE4D7B49F41FA8C5CAC19CA04CA1C18C036A0CE5A1A3EE8F5C5A73FED053C960FD61DB0FFB9BB773DB5F1E2
45,216,719 UART: [art] SIG.R = 7F65BE075601AC5B9374E7983CC24013F892ACB5ECC1E1E0C0163355BF0512757C863B0A524EDB93D4A25BEA3E5EE663
45,224,053 UART: [art] SIG.S = 6A8EC4EB273FC51CB05B3B282D0371ECB503ADF64248DFFA4276CD61A486361A510B1D5CAB45C019308F658911658E71
46,529,646 UART: Caliptra RT
46,530,388 UART: [state] CFI Enabled
46,907,217 UART: [rt] RT listening for mailbox commands...
55,512,363 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,134 UART:
192,512 UART: Running Caliptra ROM ...
193,725 UART:
193,882 UART: [state] CFI Enabled
259,384 UART: [state] LifecycleState = Unprovisioned
261,304 UART: [state] DebugLocked = No
263,226 UART: [state] WD Timer not started. Device not locked for debugging
267,497 UART: [kat] SHA2-256
447,164 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,943 UART: [kat] ++
458,485 UART: [kat] sha1
468,078 UART: [kat] SHA2-256
470,766 UART: [kat] SHA2-384
475,393 UART: [kat] SHA2-512-ACC
477,764 UART: [kat] ECC-384
2,925,804 UART: [kat] HMAC-384Kdf
2,950,629 UART: [kat] LMS
3,427,132 UART: [kat] --
3,432,778 UART: [cold-reset] ++
3,434,186 UART: [fht] FHT @ 0x50003400
3,445,445 UART: [idev] ++
3,446,073 UART: [idev] CDI.KEYID = 6
3,446,993 UART: [idev] SUBJECT.KEYID = 7
3,448,267 UART: [idev] UDS.KEYID = 0
3,450,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,600,128 UART: [idev] Erasing UDS.KEYID = 0
5,963,876 UART: [idev] Sha1 KeyId Algorithm
5,988,517 UART: [idev] --
5,993,760 UART: [ldev] ++
5,994,332 UART: [ldev] CDI.KEYID = 6
5,995,268 UART: [ldev] SUBJECT.KEYID = 5
5,996,489 UART: [ldev] AUTHORITY.KEYID = 7
5,997,730 UART: [ldev] FE.KEYID = 1
6,036,036 UART: [ldev] Erasing FE.KEYID = 1
8,543,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,804 UART: [ldev] --
10,352,245 UART: [fwproc] Wait for Commands...
10,354,137 UART: [fwproc] Recv command 0x46574c44
10,356,135 UART: [fwproc] Recv'd Img size: 118548 bytes
13,840,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,922,368 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,995,358 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,322,885 >>> mbox cmd response: success
14,324,495 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
14,453,724 UART: [afmc] ++
14,454,369 UART: [afmc] CDI.KEYID = 6
14,455,286 UART: [afmc] SUBJECT.KEYID = 7
14,456,398 UART: [afmc] AUTHORITY.KEYID = 5
16,873,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,558 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,345 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,390 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,034 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,509 UART: [afmc] --
18,693,516 UART: [cold-reset] --
18,698,408 UART: [state] Locking Datavault
18,705,444 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,224 UART: [state] Locking ICCM
18,708,302 UART: [exit] Launching FMC @ 0x40000130
18,716,700 UART:
18,716,938 UART: Running Caliptra FMC ...
18,718,042 UART:
18,718,209 UART: [state] CFI Enabled
18,773,884 UART: [fht] FMC Alias Private Key: 7
20,562,142 UART: [art] Extend RT PCRs Done
20,563,343 UART: [art] Lock RT PCRs Done
20,565,339 UART: [art] Populate DV Done
20,570,697 UART: [fht] FMC Alias Private Key: 7
20,572,292 UART: [art] Derive CDI
20,573,108 UART: [art] Store in slot 0x4
20,627,279 UART: [art] Derive Key Pair
20,628,303 UART: [art] Store priv key in slot 0x5
23,090,909 UART: [art] Derive Key Pair - Done
23,104,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,816,953 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,453 UART: [art] PUB.X = 3FE01C6051196197A3D1A20CDE8CFA5452AA2688EE6578BBE2BB65BB491C8ED581E1F7FC586084BFF43A509E1BF0BD96
24,825,763 UART: [art] PUB.Y = 509DE957C3DC437764F35DD60E41CCB0A4DACCF1A51F818CC5A17D08EC5B536237E7AB525E2413FAA3D8137FB3B237AC
24,833,060 UART: [art] SIG.R = 972DB2AF6CB70F15B409328AF0803D79BF94A706FE89EF4A4B88EA4E0C4A56E4BAD4D57541E8E37CE1EB8CC24D6922AD
24,840,467 UART: [art] SIG.S = E8FF7204AD4EAF603024E7321A47F8A07C1BB5281CD7163015C5C2BB37769D2DBA42AF03D5D14FFDC6A97D9D49A2B860
25,819,483 UART: Caliptra RT
25,820,201 UART: [state] CFI Enabled
26,002,168 UART: [rt] RT listening for mailbox commands...
26,005,130 UART:
26,005,390 UART: Running Caliptra ROM ...
26,006,501 UART:
26,006,665 UART: [state] CFI Enabled
26,076,505 UART: [state] LifecycleState = Unprovisioned
26,078,436 UART: [state] DebugLocked = No
26,080,256 UART: [state] WD Timer not started. Device not locked for debugging
26,083,317 UART: [kat] SHA2-256
26,263,030 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,273,813 UART: [kat] ++
26,274,290 UART: [kat] sha1
26,284,695 UART: [kat] SHA2-256
26,287,387 UART: [kat] SHA2-384
26,292,784 UART: [kat] SHA2-512-ACC
26,295,134 UART: [kat] ECC-384
28,755,674 UART: [kat] HMAC-384Kdf
28,780,829 UART: [kat] LMS
29,257,271 UART: [kat] --
29,261,984 UART: [update-reset] ++
31,352,193 >>> mbox cmd response: failed
31,354,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,503,117 UART: ROM Non-Fatal Error: 0x000B001F
31,504,548 UART: [state] Locking Datavault
31,505,647 UART: [state] Locking PCR0, PCR1 and PCR31
31,507,193 UART: [state] Locking ICCM
31,508,081 UART: [exit] Launching FMC @ 0x40000130
31,509,452 UART:
31,509,602 UART: Running Caliptra FMC ...
31,510,708 UART:
31,510,866 UART: [state] CFI Enabled
31,511,727 UART: [art] Extend RT PCRs Done
31,512,865 UART: [art] Lock RT PCRs Done
31,513,939 UART: [art] Populate DV Done
31,514,899 UART: [fht] FMC Alias Private Key: 7
31,516,217 UART: [art] Derive CDI
31,516,952 UART: [art] Store in slot 0x4
31,529,604 UART: [art] Derive Key Pair
31,530,593 UART: [art] Store priv key in slot 0x5
33,993,686 UART: [art] Derive Key Pair - Done
34,006,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,720,023 UART: [art] Erasing AUTHORITY.KEYID = 7
35,721,532 UART: [art] PUB.X = 3FE01C6051196197A3D1A20CDE8CFA5452AA2688EE6578BBE2BB65BB491C8ED581E1F7FC586084BFF43A509E1BF0BD96
35,728,816 UART: [art] PUB.Y = 509DE957C3DC437764F35DD60E41CCB0A4DACCF1A51F818CC5A17D08EC5B536237E7AB525E2413FAA3D8137FB3B237AC
35,736,118 UART: [art] SIG.R = 972DB2AF6CB70F15B409328AF0803D79BF94A706FE89EF4A4B88EA4E0C4A56E4BAD4D57541E8E37CE1EB8CC24D6922AD
35,743,504 UART: [art] SIG.S = E8FF7204AD4EAF603024E7321A47F8A07C1BB5281CD7163015C5C2BB37769D2DBA42AF03D5D14FFDC6A97D9D49A2B860
36,722,562 UART: Caliptra RT
36,723,269 UART: [state] CFI Enabled
37,143,206 UART: [rt] RT listening for mailbox commands...
37,146,003 UART:
37,146,179 UART: Running Caliptra ROM ...
37,147,291 UART:
37,147,449 UART: [state] CFI Enabled
37,211,583 UART: [state] LifecycleState = Unprovisioned
37,213,522 UART: [state] DebugLocked = No
37,216,524 UART: [state] WD Timer not started. Device not locked for debugging
37,219,598 UART: [kat] SHA2-256
37,399,239 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,410,048 UART: [kat] ++
37,410,514 UART: [kat] sha1
37,421,131 UART: [kat] SHA2-256
37,423,824 UART: [kat] SHA2-384
37,430,787 UART: [kat] SHA2-512-ACC
37,433,137 UART: [kat] ECC-384
39,892,348 UART: [kat] HMAC-384Kdf
39,919,045 UART: [kat] LMS
40,395,476 UART: [kat] --
40,400,494 UART: [update-reset] ++
43,900,393 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,904,736 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,302,386 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,461,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,207,735 >>> mbox cmd response: success
14,209,524 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
18,488,231 UART:
18,488,630 UART: Running Caliptra FMC ...
18,489,735 UART:
18,489,901 UART: [state] CFI Enabled
18,557,040 UART: [fht] FMC Alias Private Key: 7
20,323,206 UART: [art] Extend RT PCRs Done
20,324,438 UART: [art] Lock RT PCRs Done
20,326,006 UART: [art] Populate DV Done
20,331,277 UART: [fht] FMC Alias Private Key: 7
20,332,825 UART: [art] Derive CDI
20,333,564 UART: [art] Store in slot 0x4
20,389,692 UART: [art] Derive Key Pair
20,390,746 UART: [art] Store priv key in slot 0x5
22,853,323 UART: [art] Derive Key Pair - Done
22,866,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,578,912 UART: [art] Erasing AUTHORITY.KEYID = 7
24,580,425 UART: [art] PUB.X = 7A9229EA9FCB44C52DC0C59CA0BD57164C1FAA53569D7B2F262175AA1DDA08106AF2AB332C5674C2BBAECBDB3FCD4203
24,587,772 UART: [art] PUB.Y = 5C78A6FDB9C4694CE54CC1960B9C6B29716BBB52D703A09EE764828482464624AC5793B33D877A15600C3A3928168A31
24,594,938 UART: [art] SIG.R = F75A19C6E25A732414514249FBEFFE3A5BA24CC6D00ADE8975E83DC82AFE9203FE55B1F9CCA4D9C3E140DF637E8E07C8
24,602,405 UART: [art] SIG.S = 9BA37983E7EC95260FD48CEC507B00BD6FE6FAE826FA6FD94D33E0E0A73409733DB74362C370F3EA06866A808148048B
25,581,054 UART: Caliptra RT
25,581,753 UART: [state] CFI Enabled
25,761,371 UART: [rt] RT listening for mailbox commands...
31,111,511 >>> mbox cmd response: failed
31,113,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,262,601 UART:
31,262,928 UART: Running Caliptra FMC ...
31,264,006 UART:
31,264,173 UART: [state] CFI Enabled
31,265,105 UART: [art] Extend RT PCRs Done
31,266,253 UART: [art] Lock RT PCRs Done
31,267,328 UART: [art] Populate DV Done
31,268,363 UART: [fht] FMC Alias Private Key: 7
31,269,752 UART: [art] Derive CDI
31,270,498 UART: [art] Store in slot 0x4
31,289,947 UART: [art] Derive Key Pair
31,290,982 UART: [art] Store priv key in slot 0x5
33,753,801 UART: [art] Derive Key Pair - Done
33,767,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,479,924 UART: [art] Erasing AUTHORITY.KEYID = 7
35,481,682 UART: [art] PUB.X = 7A9229EA9FCB44C52DC0C59CA0BD57164C1FAA53569D7B2F262175AA1DDA08106AF2AB332C5674C2BBAECBDB3FCD4203
35,488,747 UART: [art] PUB.Y = 5C78A6FDB9C4694CE54CC1960B9C6B29716BBB52D703A09EE764828482464624AC5793B33D877A15600C3A3928168A31
35,495,940 UART: [art] SIG.R = F75A19C6E25A732414514249FBEFFE3A5BA24CC6D00ADE8975E83DC82AFE9203FE55B1F9CCA4D9C3E140DF637E8E07C8
35,503,352 UART: [art] SIG.S = 9BA37983E7EC95260FD48CEC507B00BD6FE6FAE826FA6FD94D33E0E0A73409733DB74362C370F3EA06866A808148048B
36,482,752 UART: Caliptra RT
36,483,478 UART: [state] CFI Enabled
36,903,278 UART: [rt] RT listening for mailbox commands...
44,065,341 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
192,706 UART:
193,067 UART: Running Caliptra ROM ...
194,260 UART:
603,890 UART: [state] CFI Enabled
616,550 UART: [state] LifecycleState = Unprovisioned
618,442 UART: [state] DebugLocked = No
620,850 UART: [state] WD Timer not started. Device not locked for debugging
624,469 UART: [kat] SHA2-256
804,126 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,914 UART: [kat] ++
815,369 UART: [kat] sha1
827,870 UART: [kat] SHA2-256
830,558 UART: [kat] SHA2-384
835,516 UART: [kat] SHA2-512-ACC
837,872 UART: [kat] ECC-384
3,279,592 UART: [kat] HMAC-384Kdf
3,291,245 UART: [kat] LMS
3,767,721 UART: [kat] --
3,773,571 UART: [cold-reset] ++
3,774,712 UART: [fht] FHT @ 0x50003400
3,786,186 UART: [idev] ++
3,786,758 UART: [idev] CDI.KEYID = 6
3,787,778 UART: [idev] SUBJECT.KEYID = 7
3,788,998 UART: [idev] UDS.KEYID = 0
3,791,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,695 UART: [idev] Erasing UDS.KEYID = 0
6,272,556 UART: [idev] Sha1 KeyId Algorithm
6,296,622 UART: [idev] --
6,301,407 UART: [ldev] ++
6,302,048 UART: [ldev] CDI.KEYID = 6
6,302,990 UART: [ldev] SUBJECT.KEYID = 5
6,304,165 UART: [ldev] AUTHORITY.KEYID = 7
6,305,409 UART: [ldev] FE.KEYID = 1
6,317,731 UART: [ldev] Erasing FE.KEYID = 1
8,793,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,196 UART: [ldev] --
10,589,817 UART: [fwproc] Wait for Commands...
10,592,736 UART: [fwproc] Recv command 0x46574c44
10,594,781 UART: [fwproc] Recv'd Img size: 118548 bytes
14,081,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,879 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,236,953 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,565,944 >>> mbox cmd response: success
14,567,476 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
14,696,494 UART: [afmc] ++
14,697,135 UART: [afmc] CDI.KEYID = 6
14,698,030 UART: [afmc] SUBJECT.KEYID = 7
14,699,139 UART: [afmc] AUTHORITY.KEYID = 5
17,077,651 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,799,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,801,241 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,817,089 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,833,145 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,848,752 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,873,385 UART: [afmc] --
18,876,554 UART: [cold-reset] --
18,880,365 UART: [state] Locking Datavault
18,884,587 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,360 UART: [state] Locking ICCM
18,887,758 UART: [exit] Launching FMC @ 0x40000130
18,896,159 UART:
18,896,401 UART: Running Caliptra FMC ...
18,897,507 UART:
18,897,673 UART: [state] CFI Enabled
18,905,827 UART: [fht] FMC Alias Private Key: 7
20,672,019 UART: [art] Extend RT PCRs Done
20,673,243 UART: [art] Lock RT PCRs Done
20,674,897 UART: [art] Populate DV Done
20,680,389 UART: [fht] FMC Alias Private Key: 7
20,682,061 UART: [art] Derive CDI
20,682,807 UART: [art] Store in slot 0x4
20,725,079 UART: [art] Derive Key Pair
20,726,084 UART: [art] Store priv key in slot 0x5
23,153,354 UART: [art] Derive Key Pair - Done
23,166,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,872,798 UART: [art] Erasing AUTHORITY.KEYID = 7
24,874,307 UART: [art] PUB.X = E3D74568ED2F43880E455E3A092E7151230C6AD504DA760354BBFA52BF79BB9BFBF5C2C7C872FDB7A1C0175E9FB184EF
24,881,566 UART: [art] PUB.Y = EA76D4ABBDC74685D4033010067F1CBAF561108975EE0E01A7FC14AB4D15150B8C4D0C11DFE981A19E8A5E7A26533E90
24,888,818 UART: [art] SIG.R = 357D155C33BDCDA9252B43C73396F2C816E9F2859C52098D72D79E182D7EAF70A60BC3FE035C84BA1D0C8579F6A62201
24,896,232 UART: [art] SIG.S = 66A6B5BC895D0F3D5896C6C9F5797D25A79ECE7C6DF7218494247A0F292B1DD66C16412C8C2360D5F01EAB0138525018
25,874,730 UART: Caliptra RT
25,875,447 UART: [state] CFI Enabled
26,007,023 UART: [rt] RT listening for mailbox commands...
26,010,204 UART:
26,010,462 UART: Running Caliptra ROM ...
26,011,572 UART:
26,011,843 UART: [state] CFI Enabled
26,025,087 UART: [state] LifecycleState = Unprovisioned
26,026,982 UART: [state] DebugLocked = No
26,028,795 UART: [state] WD Timer not started. Device not locked for debugging
26,032,129 UART: [kat] SHA2-256
26,211,842 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,222,624 UART: [kat] ++
26,223,089 UART: [kat] sha1
26,234,683 UART: [kat] SHA2-256
26,237,383 UART: [kat] SHA2-384
26,242,350 UART: [kat] SHA2-512-ACC
26,244,700 UART: [kat] ECC-384
28,687,875 UART: [kat] HMAC-384Kdf
28,699,454 UART: [kat] LMS
29,175,931 UART: [kat] --
29,181,588 UART: [update-reset] ++
31,271,778 >>> mbox cmd response: failed
31,273,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,422,420 UART: ROM Non-Fatal Error: 0x000B001F
31,423,861 UART: [state] Locking Datavault
31,424,980 UART: [state] Locking PCR0, PCR1 and PCR31
31,426,550 UART: [state] Locking ICCM
31,427,458 UART: [exit] Launching FMC @ 0x40000130
31,428,884 UART:
31,429,047 UART: Running Caliptra FMC ...
31,430,156 UART:
31,430,315 UART: [state] CFI Enabled
31,431,238 UART: [art] Extend RT PCRs Done
31,432,380 UART: [art] Lock RT PCRs Done
31,433,448 UART: [art] Populate DV Done
31,434,483 UART: [fht] FMC Alias Private Key: 7
31,435,805 UART: [art] Derive CDI
31,436,542 UART: [art] Store in slot 0x4
31,437,551 UART: [art] Derive Key Pair
31,438,486 UART: [art] Store priv key in slot 0x5
33,822,372 UART: [art] Derive Key Pair - Done
33,835,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,541,668 UART: [art] Erasing AUTHORITY.KEYID = 7
35,543,175 UART: [art] PUB.X = E3D74568ED2F43880E455E3A092E7151230C6AD504DA760354BBFA52BF79BB9BFBF5C2C7C872FDB7A1C0175E9FB184EF
35,550,503 UART: [art] PUB.Y = EA76D4ABBDC74685D4033010067F1CBAF561108975EE0E01A7FC14AB4D15150B8C4D0C11DFE981A19E8A5E7A26533E90
35,557,734 UART: [art] SIG.R = 357D155C33BDCDA9252B43C73396F2C816E9F2859C52098D72D79E182D7EAF70A60BC3FE035C84BA1D0C8579F6A62201
35,565,152 UART: [art] SIG.S = 66A6B5BC895D0F3D5896C6C9F5797D25A79ECE7C6DF7218494247A0F292B1DD66C16412C8C2360D5F01EAB0138525018
36,542,897 UART: Caliptra RT
36,543,602 UART: [state] CFI Enabled
36,917,066 UART: [rt] RT listening for mailbox commands...
36,919,890 UART:
36,920,150 UART: Running Caliptra ROM ...
36,921,265 UART:
36,921,534 UART: [state] CFI Enabled
40,322,278 UART: [state] LifecycleState = Unprovisioned
40,324,246 UART: [state] DebugLocked = No
40,325,398 UART: [state] WD Timer not started. Device not locked for debugging
40,330,075 UART: [kat] SHA2-256
40,509,783 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
40,520,591 UART: [kat] ++
40,521,057 UART: [kat] sha1
40,532,327 UART: [kat] SHA2-256
40,535,019 UART: [kat] SHA2-384
40,540,051 UART: [kat] SHA2-512-ACC
40,542,409 UART: [kat] ECC-384
42,986,272 UART: [kat] HMAC-384Kdf
43,000,217 UART: [kat] LMS
43,476,658 UART: [kat] --
43,482,932 UART: [update-reset] ++
46,979,432 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,983,520 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,381,138 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
3,781,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,988 >>> mbox cmd response: success
14,448,791 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
18,699,297 UART:
18,699,725 UART: Running Caliptra FMC ...
18,700,848 UART:
18,701,019 UART: [state] CFI Enabled
18,708,667 UART: [fht] FMC Alias Private Key: 7
20,474,514 UART: [art] Extend RT PCRs Done
20,475,739 UART: [art] Lock RT PCRs Done
20,477,280 UART: [art] Populate DV Done
20,482,431 UART: [fht] FMC Alias Private Key: 7
20,484,036 UART: [art] Derive CDI
20,484,861 UART: [art] Store in slot 0x4
20,527,624 UART: [art] Derive Key Pair
20,528,631 UART: [art] Store priv key in slot 0x5
22,955,564 UART: [art] Derive Key Pair - Done
22,968,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,768 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,310 UART: [art] PUB.X = 8D4EAF7041FA114B867A1B42D8BA56B7CFFDF20EDB49A98BC1BC756E27AE5BB83811B9F8D3E38311657AC0E4D358E9FB
24,683,606 UART: [art] PUB.Y = 581F09F5160F144439411D479C748DAA58E40452118F3184E27791994673614D9DFD817670CEB7132A3C76A3B45BBCFE
24,690,815 UART: [art] SIG.R = 58DF2FFBB469A62CFE6E7144BA6DEB30A6428BF07A7D48D7AA36792FE30F66053668550EF8D4019BBC18873DA9B47C93
24,698,255 UART: [art] SIG.S = 4437AD37859E06F166E4C494650FDB399D78C6F3F955B369A98D890B7BB1EBD50A30F90AEF1D6334B6030B2B9CCDC390
25,676,830 UART: Caliptra RT
25,677,550 UART: [state] CFI Enabled
25,811,301 UART: [rt] RT listening for mailbox commands...
31,069,008 >>> mbox cmd response: failed
31,071,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,220,084 UART:
31,220,434 UART: Running Caliptra FMC ...
31,221,567 UART:
31,221,738 UART: [state] CFI Enabled
31,222,663 UART: [art] Extend RT PCRs Done
31,223,807 UART: [art] Lock RT PCRs Done
31,224,880 UART: [art] Populate DV Done
31,225,915 UART: [fht] FMC Alias Private Key: 7
31,227,322 UART: [art] Derive CDI
31,228,071 UART: [art] Store in slot 0x4
31,229,143 UART: [art] Derive Key Pair
31,230,146 UART: [art] Store priv key in slot 0x5
33,611,983 UART: [art] Derive Key Pair - Done
33,625,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,331,729 UART: [art] Erasing AUTHORITY.KEYID = 7
35,333,247 UART: [art] PUB.X = 8D4EAF7041FA114B867A1B42D8BA56B7CFFDF20EDB49A98BC1BC756E27AE5BB83811B9F8D3E38311657AC0E4D358E9FB
35,340,529 UART: [art] PUB.Y = 581F09F5160F144439411D479C748DAA58E40452118F3184E27791994673614D9DFD817670CEB7132A3C76A3B45BBCFE
35,347,795 UART: [art] SIG.R = 58DF2FFBB469A62CFE6E7144BA6DEB30A6428BF07A7D48D7AA36792FE30F66053668550EF8D4019BBC18873DA9B47C93
35,355,152 UART: [art] SIG.S = 4437AD37859E06F166E4C494650FDB399D78C6F3F955B369A98D890B7BB1EBD50A30F90AEF1D6334B6030B2B9CCDC390
36,334,579 UART: Caliptra RT
36,335,295 UART: [state] CFI Enabled
36,709,051 UART: [rt] RT listening for mailbox commands...
47,383,332 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,377 UART:
192,735 UART: Running Caliptra ROM ...
193,938 UART:
194,099 UART: [state] CFI Enabled
262,247 UART: [state] LifecycleState = Unprovisioned
264,330 UART: [state] DebugLocked = No
265,884 UART: [state] WD Timer not started. Device not locked for debugging
269,623 UART: [kat] SHA2-256
459,250 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,065 UART: [kat] ++
470,562 UART: [kat] sha1
483,444 UART: [kat] SHA2-256
486,415 UART: [kat] SHA2-384
492,619 UART: [kat] SHA2-512-ACC
495,238 UART: [kat] ECC-384
2,947,748 UART: [kat] HMAC-384Kdf
2,971,104 UART: [kat] LMS
3,502,881 UART: [kat] --
3,507,574 UART: [cold-reset] ++
3,508,860 UART: [fht] FHT @ 0x50003400
3,520,126 UART: [idev] ++
3,520,809 UART: [idev] CDI.KEYID = 6
3,521,749 UART: [idev] SUBJECT.KEYID = 7
3,523,018 UART: [idev] UDS.KEYID = 0
3,525,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,103 UART: [idev] Erasing UDS.KEYID = 0
6,029,845 UART: [idev] Sha1 KeyId Algorithm
6,053,532 UART: [idev] --
6,058,063 UART: [ldev] ++
6,058,766 UART: [ldev] CDI.KEYID = 6
6,059,854 UART: [ldev] SUBJECT.KEYID = 5
6,060,993 UART: [ldev] AUTHORITY.KEYID = 7
6,062,188 UART: [ldev] FE.KEYID = 1
6,098,929 UART: [ldev] Erasing FE.KEYID = 1
8,603,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,581 UART: [ldev] --
10,414,575 UART: [fwproc] Wait for Commands...
10,416,089 UART: [fwproc] Recv command 0x46574c44
10,418,370 UART: [fwproc] Recv'd Img size: 118548 bytes
13,920,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,974 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,557 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,377 >>> mbox cmd response: success
14,681,896 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
14,811,110 UART: [afmc] ++
14,811,747 UART: [afmc] CDI.KEYID = 6
14,812,684 UART: [afmc] SUBJECT.KEYID = 7
14,813,793 UART: [afmc] AUTHORITY.KEYID = 5
17,213,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,064 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,174 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,338 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,207 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,938 UART: [afmc] --
19,010,351 UART: [cold-reset] --
19,016,218 UART: [state] Locking Datavault
19,018,722 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,440 UART: [state] Locking ICCM
19,023,565 UART: [exit] Launching FMC @ 0x40000130
19,032,247 UART:
19,032,493 UART: Running Caliptra FMC ...
19,033,605 UART:
19,033,776 UART: [state] CFI Enabled
19,094,115 UART: [fht] FMC Alias Private Key: 7
20,860,416 UART: [art] Extend RT PCRs Done
20,861,625 UART: [art] Lock RT PCRs Done
20,863,227 UART: [art] Populate DV Done
20,868,819 UART: [fht] FMC Alias Private Key: 7
20,870,303 UART: [art] Derive CDI
20,871,071 UART: [art] Store in slot 0x4
20,926,301 UART: [art] Derive Key Pair
20,927,305 UART: [art] Store priv key in slot 0x5
23,390,480 UART: [art] Derive Key Pair - Done
23,403,434 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,964 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,464 UART: [art] PUB.X = 71256C97AE0FF67E331C02BADBC2093E14EA4DDF36847E9BFA05B39A543CD1AA8BB34BC2E5E83529A43420234FDE6C94
25,124,760 UART: [art] PUB.Y = E7573F57AA4BD1D8B904683615577D50FD82EC31B2A5E50B9A1D79869F0EB9713CF096B6E3F149EC6242AB7AF1C4B57F
25,132,038 UART: [art] SIG.R = 6FCC47E3FFE7E737BBAE87BD25548A820C9D0EEBB0AA877D084197EC0D1B461A796817DC27417685604847158F55ECE2
25,139,439 UART: [art] SIG.S = F5A0428E93EBA18DAB8ED9EB994A92AFE4E3EF4EA9E3001BC264BED4E347BBD3D96DB49B7772EC99EAD84B4B1F835694
26,118,333 UART: Caliptra RT
26,119,054 UART: [state] CFI Enabled
26,298,642 UART: [rt] RT listening for mailbox commands...
26,301,658 UART:
26,301,949 UART: Running Caliptra ROM ...
26,303,074 UART:
26,303,241 UART: [state] CFI Enabled
26,371,319 UART: [state] LifecycleState = Unprovisioned
26,373,365 UART: [state] DebugLocked = No
26,375,583 UART: [state] WD Timer not started. Device not locked for debugging
26,379,325 UART: [kat] SHA2-256
26,569,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,579,959 UART: [kat] ++
26,580,421 UART: [kat] sha1
26,592,502 UART: [kat] SHA2-256
26,595,475 UART: [kat] SHA2-384
26,602,489 UART: [kat] SHA2-512-ACC
26,605,110 UART: [kat] ECC-384
29,053,386 UART: [kat] HMAC-384Kdf
29,079,015 UART: [kat] LMS
29,610,581 UART: [kat] --
29,614,862 UART: [update-reset] ++
31,724,534 >>> mbox cmd response: failed
31,726,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,875,444 UART: ROM Non-Fatal Error: 0x000B001F
31,876,895 UART: [state] Locking Datavault
31,878,064 UART: [state] Locking PCR0, PCR1 and PCR31
31,879,610 UART: [state] Locking ICCM
31,880,524 UART: [exit] Launching FMC @ 0x40000130
31,881,953 UART:
31,882,115 UART: Running Caliptra FMC ...
31,883,220 UART:
31,883,382 UART: [state] CFI Enabled
31,884,307 UART: [art] Extend RT PCRs Done
31,885,450 UART: [art] Lock RT PCRs Done
31,886,516 UART: [art] Populate DV Done
31,887,565 UART: [fht] FMC Alias Private Key: 7
31,888,887 UART: [art] Derive CDI
31,889,625 UART: [art] Store in slot 0x4
31,909,719 UART: [art] Derive Key Pair
31,910,768 UART: [art] Store priv key in slot 0x5
34,373,337 UART: [art] Derive Key Pair - Done
34,386,341 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,097,985 UART: [art] Erasing AUTHORITY.KEYID = 7
36,099,495 UART: [art] PUB.X = 71256C97AE0FF67E331C02BADBC2093E14EA4DDF36847E9BFA05B39A543CD1AA8BB34BC2E5E83529A43420234FDE6C94
36,106,776 UART: [art] PUB.Y = E7573F57AA4BD1D8B904683615577D50FD82EC31B2A5E50B9A1D79869F0EB9713CF096B6E3F149EC6242AB7AF1C4B57F
36,114,056 UART: [art] SIG.R = 6FCC47E3FFE7E737BBAE87BD25548A820C9D0EEBB0AA877D084197EC0D1B461A796817DC27417685604847158F55ECE2
36,121,424 UART: [art] SIG.S = F5A0428E93EBA18DAB8ED9EB994A92AFE4E3EF4EA9E3001BC264BED4E347BBD3D96DB49B7772EC99EAD84B4B1F835694
37,100,646 UART: Caliptra RT
37,101,350 UART: [state] CFI Enabled
37,519,318 UART: [rt] RT listening for mailbox commands...
37,522,010 UART:
37,522,295 UART: Running Caliptra ROM ...
37,523,417 UART:
37,523,576 UART: [state] CFI Enabled
37,587,113 UART: [state] LifecycleState = Unprovisioned
37,589,204 UART: [state] DebugLocked = No
37,590,783 UART: [state] WD Timer not started. Device not locked for debugging
37,594,904 UART: [kat] SHA2-256
37,784,753 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,795,512 UART: [kat] ++
37,795,978 UART: [kat] sha1
37,807,411 UART: [kat] SHA2-256
37,810,382 UART: [kat] SHA2-384
37,815,451 UART: [kat] SHA2-512-ACC
37,818,020 UART: [kat] ECC-384
40,271,698 UART: [kat] HMAC-384Kdf
40,294,352 UART: [kat] LMS
40,825,894 UART: [kat] --
40,831,247 UART: [update-reset] ++
44,334,830 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,338,624 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,968,348 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,442,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,828,506 >>> mbox cmd response: success
14,830,222 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
19,109,863 UART:
19,110,266 UART: Running Caliptra FMC ...
19,111,365 UART:
19,111,523 UART: [state] CFI Enabled
19,176,121 UART: [fht] FMC Alias Private Key: 7
20,942,637 UART: [art] Extend RT PCRs Done
20,943,860 UART: [art] Lock RT PCRs Done
20,945,192 UART: [art] Populate DV Done
20,950,456 UART: [fht] FMC Alias Private Key: 7
20,952,112 UART: [art] Derive CDI
20,952,852 UART: [art] Store in slot 0x4
21,008,919 UART: [art] Derive Key Pair
21,009,996 UART: [art] Store priv key in slot 0x5
23,472,940 UART: [art] Derive Key Pair - Done
23,485,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,444 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,962 UART: [art] PUB.X = EBD0E28CF244C6EEA4E8E6EC88F5E4DD57B32B0E3798613D513BB11A2D022245FAE3038A82A00F2CF5EDE91693CDC931
25,208,268 UART: [art] PUB.Y = D746B3EBAC095A6228B7CF96269043A9F7779AB1981EFC73ADB2BC2DCCC7CBEC275E2F99FC24417969C7C3A151973027
25,215,495 UART: [art] SIG.R = 88E5F28ABD847C3EE6389A1C1403612A091389C36D4E6B1589BBD05BCDF48D05EB6D027FD46B383C6E85675E6514074E
25,222,903 UART: [art] SIG.S = 8B1E9AC9B0BEA9D6C67F9C7E1361EADCD5B79111394460145F73A233B8D7E3879AB774A63398A0CB0D846D404EE272CD
26,202,397 UART: Caliptra RT
26,203,105 UART: [state] CFI Enabled
26,383,198 UART: [rt] RT listening for mailbox commands...
31,735,899 >>> mbox cmd response: failed
31,737,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,887,009 UART:
31,887,327 UART: Running Caliptra FMC ...
31,888,399 UART:
31,888,558 UART: [state] CFI Enabled
31,889,423 UART: [art] Extend RT PCRs Done
31,890,574 UART: [art] Lock RT PCRs Done
31,891,645 UART: [art] Populate DV Done
31,892,683 UART: [fht] FMC Alias Private Key: 7
31,894,067 UART: [art] Derive CDI
31,894,814 UART: [art] Store in slot 0x4
31,910,305 UART: [art] Derive Key Pair
31,911,313 UART: [art] Store priv key in slot 0x5
34,374,889 UART: [art] Derive Key Pair - Done
34,388,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,100,817 UART: [art] Erasing AUTHORITY.KEYID = 7
36,102,331 UART: [art] PUB.X = EBD0E28CF244C6EEA4E8E6EC88F5E4DD57B32B0E3798613D513BB11A2D022245FAE3038A82A00F2CF5EDE91693CDC931
36,109,591 UART: [art] PUB.Y = D746B3EBAC095A6228B7CF96269043A9F7779AB1981EFC73ADB2BC2DCCC7CBEC275E2F99FC24417969C7C3A151973027
36,116,889 UART: [art] SIG.R = 88E5F28ABD847C3EE6389A1C1403612A091389C36D4E6B1589BBD05BCDF48D05EB6D027FD46B383C6E85675E6514074E
36,124,296 UART: [art] SIG.S = 8B1E9AC9B0BEA9D6C67F9C7E1361EADCD5B79111394460145F73A233B8D7E3879AB774A63398A0CB0D846D404EE272CD
37,103,328 UART: Caliptra RT
37,104,014 UART: [state] CFI Enabled
37,524,757 UART: [rt] RT listening for mailbox commands...
45,277,691 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
192,466 UART:
192,827 UART: Running Caliptra ROM ...
194,239 UART:
603,791 UART: [state] CFI Enabled
619,025 UART: [state] LifecycleState = Unprovisioned
621,401 UART: [state] DebugLocked = No
623,916 UART: [state] WD Timer not started. Device not locked for debugging
629,219 UART: [kat] SHA2-256
819,115 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,906 UART: [kat] ++
830,500 UART: [kat] sha1
841,176 UART: [kat] SHA2-256
844,150 UART: [kat] SHA2-384
849,178 UART: [kat] SHA2-512-ACC
851,748 UART: [kat] ECC-384
3,293,786 UART: [kat] HMAC-384Kdf
3,308,223 UART: [kat] LMS
3,840,085 UART: [kat] --
3,845,131 UART: [cold-reset] ++
3,845,992 UART: [fht] FHT @ 0x50003400
3,856,876 UART: [idev] ++
3,857,618 UART: [idev] CDI.KEYID = 6
3,858,535 UART: [idev] SUBJECT.KEYID = 7
3,859,753 UART: [idev] UDS.KEYID = 0
3,862,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,485 UART: [idev] Erasing UDS.KEYID = 0
6,335,537 UART: [idev] Sha1 KeyId Algorithm
6,358,676 UART: [idev] --
6,364,718 UART: [ldev] ++
6,365,412 UART: [ldev] CDI.KEYID = 6
6,366,325 UART: [ldev] SUBJECT.KEYID = 5
6,367,495 UART: [ldev] AUTHORITY.KEYID = 7
6,368,656 UART: [ldev] FE.KEYID = 1
6,379,359 UART: [ldev] Erasing FE.KEYID = 1
8,859,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,320 UART: [ldev] --
10,648,966 UART: [fwproc] Wait for Commands...
10,651,172 UART: [fwproc] Recv command 0x46574c44
10,653,435 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,448 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,236,456 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,360,050 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,920,816 >>> mbox cmd response: success
14,922,324 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
15,051,058 UART: [afmc] ++
15,051,695 UART: [afmc] CDI.KEYID = 6
15,052,593 UART: [afmc] SUBJECT.KEYID = 7
15,053,707 UART: [afmc] AUTHORITY.KEYID = 5
17,427,138 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,354 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,502 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,620 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,508 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,188 UART: [afmc] --
19,224,060 UART: [cold-reset] --
19,226,006 UART: [state] Locking Datavault
19,232,188 UART: [state] Locking PCR0, PCR1 and PCR31
19,234,374 UART: [state] Locking ICCM
19,235,736 UART: [exit] Launching FMC @ 0x40000130
19,244,366 UART:
19,244,603 UART: Running Caliptra FMC ...
19,245,708 UART:
19,245,873 UART: [state] CFI Enabled
19,253,922 UART: [fht] FMC Alias Private Key: 7
21,020,126 UART: [art] Extend RT PCRs Done
21,021,351 UART: [art] Lock RT PCRs Done
21,022,735 UART: [art] Populate DV Done
21,028,044 UART: [fht] FMC Alias Private Key: 7
21,029,752 UART: [art] Derive CDI
21,030,581 UART: [art] Store in slot 0x4
21,072,970 UART: [art] Derive Key Pair
21,074,194 UART: [art] Store priv key in slot 0x5
23,500,390 UART: [art] Derive Key Pair - Done
23,513,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,860 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,370 UART: [art] PUB.X = 95AEC1EEFB978E7E3E775A6538A15E28DA044E51134B92D23485A2C3E20215BB6127FAADA48C490C985EC1C5E9B32C08
25,228,675 UART: [art] PUB.Y = 2FCF1F836595DFCA55D69A417DC47B902CD0B9ED3ECDAE49CD62B64763E463F460029F917DC00F551AFF8EBAE784B69F
25,235,934 UART: [art] SIG.R = 63A3F754746AA93994805ADD3CD63679D90A075FDDF3E8EDEE4BFEE8BF28C042B90C386D48665AEB921DD236A4D9E463
25,243,336 UART: [art] SIG.S = 8A0CF02418C5279BA90A9E4460551215A33E086A1A0E0C833962FE9D7B4DE111681DA25327863F0C111782D9F8025243
26,222,745 UART: Caliptra RT
26,223,454 UART: [state] CFI Enabled
26,356,219 UART: [rt] RT listening for mailbox commands...
26,359,451 UART:
26,359,702 UART: Running Caliptra ROM ...
26,360,810 UART:
26,361,079 UART: [state] CFI Enabled
26,375,237 UART: [state] LifecycleState = Unprovisioned
26,377,140 UART: [state] DebugLocked = No
26,379,111 UART: [state] WD Timer not started. Device not locked for debugging
26,383,633 UART: [kat] SHA2-256
26,573,495 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,584,288 UART: [kat] ++
26,584,885 UART: [kat] sha1
26,595,716 UART: [kat] SHA2-256
26,598,720 UART: [kat] SHA2-384
26,605,586 UART: [kat] SHA2-512-ACC
26,608,159 UART: [kat] ECC-384
29,050,371 UART: [kat] HMAC-384Kdf
29,063,137 UART: [kat] LMS
29,594,753 UART: [kat] --
29,600,575 UART: [update-reset] ++
31,699,432 >>> mbox cmd response: failed
31,701,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,850,476 UART: ROM Non-Fatal Error: 0x000B001F
31,851,909 UART: [state] Locking Datavault
31,853,072 UART: [state] Locking PCR0, PCR1 and PCR31
31,854,617 UART: [state] Locking ICCM
31,855,531 UART: [exit] Launching FMC @ 0x40000130
31,856,959 UART:
31,857,126 UART: Running Caliptra FMC ...
31,858,277 UART:
31,858,440 UART: [state] CFI Enabled
31,859,284 UART: [art] Extend RT PCRs Done
31,860,421 UART: [art] Lock RT PCRs Done
31,861,437 UART: [art] Populate DV Done
31,862,410 UART: [fht] FMC Alias Private Key: 7
31,863,727 UART: [art] Derive CDI
31,864,467 UART: [art] Store in slot 0x4
31,865,532 UART: [art] Derive Key Pair
31,866,546 UART: [art] Store priv key in slot 0x5
34,246,792 UART: [art] Derive Key Pair - Done
34,259,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,966,590 UART: [art] Erasing AUTHORITY.KEYID = 7
35,968,102 UART: [art] PUB.X = 95AEC1EEFB978E7E3E775A6538A15E28DA044E51134B92D23485A2C3E20215BB6127FAADA48C490C985EC1C5E9B32C08
35,975,350 UART: [art] PUB.Y = 2FCF1F836595DFCA55D69A417DC47B902CD0B9ED3ECDAE49CD62B64763E463F460029F917DC00F551AFF8EBAE784B69F
35,982,646 UART: [art] SIG.R = 63A3F754746AA93994805ADD3CD63679D90A075FDDF3E8EDEE4BFEE8BF28C042B90C386D48665AEB921DD236A4D9E463
35,990,047 UART: [art] SIG.S = 8A0CF02418C5279BA90A9E4460551215A33E086A1A0E0C833962FE9D7B4DE111681DA25327863F0C111782D9F8025243
36,969,279 UART: Caliptra RT
36,970,007 UART: [state] CFI Enabled
37,345,948 UART: [rt] RT listening for mailbox commands...
37,348,694 UART:
37,348,953 UART: Running Caliptra ROM ...
37,350,078 UART:
37,350,297 UART: [state] CFI Enabled
40,324,359 UART: [state] LifecycleState = Unprovisioned
40,326,292 UART: [state] DebugLocked = No
40,329,092 UART: [state] WD Timer not started. Device not locked for debugging
40,333,343 UART: [kat] SHA2-256
40,523,270 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,534,012 UART: [kat] ++
40,534,557 UART: [kat] sha1
40,545,506 UART: [kat] SHA2-256
40,548,510 UART: [kat] SHA2-384
40,553,377 UART: [kat] SHA2-512-ACC
40,555,952 UART: [kat] ECC-384
42,998,068 UART: [kat] HMAC-384Kdf
43,011,329 UART: [kat] LMS
43,542,942 UART: [kat] --
43,545,477 UART: [update-reset] ++
47,058,532 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
47,061,042 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,690,752 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,750,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,930 >>> mbox cmd response: success
15,049,671 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
19,295,123 UART:
19,295,546 UART: Running Caliptra FMC ...
19,296,691 UART:
19,296,864 UART: [state] CFI Enabled
19,304,889 UART: [fht] FMC Alias Private Key: 7
21,070,469 UART: [art] Extend RT PCRs Done
21,071,680 UART: [art] Lock RT PCRs Done
21,073,307 UART: [art] Populate DV Done
21,078,506 UART: [fht] FMC Alias Private Key: 7
21,080,213 UART: [art] Derive CDI
21,081,035 UART: [art] Store in slot 0x4
21,123,647 UART: [art] Derive Key Pair
21,124,693 UART: [art] Store priv key in slot 0x5
23,551,778 UART: [art] Derive Key Pair - Done
23,564,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,764 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,264 UART: [art] PUB.X = 6EEFA8C3229DD4C91260DC785E3FB1E160762A88F4ECDF0FD51F272E3D6DB52A4B08E40C5377EE90DF94584ACC8C7777
25,279,542 UART: [art] PUB.Y = 4890F421F729062B77683FCABDA6E9685864AB84AB03CFD212950D8772DA65F2C254723FE3A3EF2AD01D4747466B6F1C
25,286,770 UART: [art] SIG.R = AA2685BB05971C9D920E4AF2FEE92D3112D32DFE5811D79D6C0E6118D4F38D6AD184F0EA6E7A40EA5BE1D78785A392CA
25,294,176 UART: [art] SIG.S = DD953EE4123F9F5A2703F632C746E87A21ABA13C814C2E75332C57048B478A57396A61FFB3FC6E1A2C0D128AFAED1CDB
26,273,567 UART: Caliptra RT
26,274,291 UART: [state] CFI Enabled
26,407,689 UART: [rt] RT listening for mailbox commands...
31,666,409 >>> mbox cmd response: failed
31,668,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,817,165 UART:
31,817,494 UART: Running Caliptra FMC ...
31,818,573 UART:
31,818,734 UART: [state] CFI Enabled
31,819,665 UART: [art] Extend RT PCRs Done
31,820,810 UART: [art] Lock RT PCRs Done
31,821,880 UART: [art] Populate DV Done
31,822,914 UART: [fht] FMC Alias Private Key: 7
31,824,324 UART: [art] Derive CDI
31,825,069 UART: [art] Store in slot 0x4
31,826,136 UART: [art] Derive Key Pair
31,827,157 UART: [art] Store priv key in slot 0x5
34,204,079 UART: [art] Derive Key Pair - Done
34,216,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,923,286 UART: [art] Erasing AUTHORITY.KEYID = 7
35,924,798 UART: [art] PUB.X = 6EEFA8C3229DD4C91260DC785E3FB1E160762A88F4ECDF0FD51F272E3D6DB52A4B08E40C5377EE90DF94584ACC8C7777
35,932,118 UART: [art] PUB.Y = 4890F421F729062B77683FCABDA6E9685864AB84AB03CFD212950D8772DA65F2C254723FE3A3EF2AD01D4747466B6F1C
35,939,378 UART: [art] SIG.R = AA2685BB05971C9D920E4AF2FEE92D3112D32DFE5811D79D6C0E6118D4F38D6AD184F0EA6E7A40EA5BE1D78785A392CA
35,946,743 UART: [art] SIG.S = DD953EE4123F9F5A2703F632C746E87A21ABA13C814C2E75332C57048B478A57396A61FFB3FC6E1A2C0D128AFAED1CDB
36,925,422 UART: Caliptra RT
36,926,143 UART: [state] CFI Enabled
37,302,385 UART: [rt] RT listening for mailbox commands...
47,985,242 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,117 UART: [kat] SHA2-256
882,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,163 UART: [kat] ++
886,315 UART: [kat] sha1
890,449 UART: [kat] SHA2-256
892,387 UART: [kat] SHA2-384
895,296 UART: [kat] SHA2-512-ACC
897,197 UART: [kat] ECC-384
903,064 UART: [kat] HMAC-384Kdf
907,640 UART: [kat] LMS
1,475,836 UART: [kat] --
1,476,581 UART: [cold-reset] ++
1,477,089 UART: [fht] Storing FHT @ 0x50003400
1,479,924 UART: [idev] ++
1,480,092 UART: [idev] CDI.KEYID = 6
1,480,452 UART: [idev] SUBJECT.KEYID = 7
1,480,876 UART: [idev] UDS.KEYID = 0
1,481,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,726 UART: [idev] Erasing UDS.KEYID = 0
1,505,070 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,866 UART: [idev] --
1,515,003 UART: [ldev] ++
1,515,171 UART: [ldev] CDI.KEYID = 6
1,515,534 UART: [ldev] SUBJECT.KEYID = 5
1,515,960 UART: [ldev] AUTHORITY.KEYID = 7
1,516,423 UART: [ldev] FE.KEYID = 1
1,521,583 UART: [ldev] Erasing FE.KEYID = 1
1,547,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,074 UART: [ldev] --
1,586,501 UART: [fwproc] Waiting for Commands...
1,587,164 UART: [fwproc] Received command 0x46574c44
1,587,955 UART: [fwproc] Received Image of size 118548 bytes
2,932,217 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,281 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,499 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,860 >>> mbox cmd response: success
3,130,860 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
3,131,892 UART: [afmc] ++
3,132,060 UART: [afmc] CDI.KEYID = 6
3,132,422 UART: [afmc] SUBJECT.KEYID = 7
3,132,847 UART: [afmc] AUTHORITY.KEYID = 5
3,167,668 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,654 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,434 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,143 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,026 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,709 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,581 UART: [afmc] --
3,210,473 UART: [cold-reset] --
3,211,529 UART: [state] Locking Datavault
3,212,776 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,380 UART: [state] Locking ICCM
3,213,982 UART: [exit] Launching FMC @ 0x40000130
3,219,312 UART:
3,219,328 UART: Running Caliptra FMC ...
3,219,736 UART:
3,219,790 UART: [state] CFI Enabled
3,230,288 UART: [fht] FMC Alias Private Key: 7
3,348,912 UART: [art] Extend RT PCRs Done
3,349,340 UART: [art] Lock RT PCRs Done
3,351,056 UART: [art] Populate DV Done
3,359,269 UART: [fht] FMC Alias Private Key: 7
3,360,265 UART: [art] Derive CDI
3,360,545 UART: [art] Store in slot 0x4
3,446,055 UART: [art] Derive Key Pair
3,446,415 UART: [art] Store priv key in slot 0x5
3,459,550 UART: [art] Derive Key Pair - Done
3,474,262 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,854 UART: [art] PUB.X = D42BA6ACEDC5198267B98602AF8D7D8F458BFA24D0EB376929A1294AE99B5EE0394A40B0074AA92DDD7E6D92BBADBA3E
3,497,640 UART: [art] PUB.Y = 080A33ED71F335843A733000B89374433C58289F6C3FFCA4BBA5896E27F06BDDC74B657C27C2075871094A9F2E6875AE
3,504,554 UART: [art] SIG.R = D6327970593695A21D2178E2F72487DE2AC9B89DBBD95E7180EDC121CDBB73245548B6F1E0A08FEF0C0E16727755E47F
3,511,322 UART: [art] SIG.S = BA1937C1EDF95BA0A96EA458571FFE2B2F8CC0E9EE008102EED9611A544DABC3F2F7045E21C2589C3E3CB2D298F993ED
3,534,268 UART: Caliptra RT
3,534,519 UART: [state] CFI Enabled
3,654,302 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,656,001 UART:
3,656,017 UART: Running Caliptra ROM ...
3,656,425 UART:
3,656,479 UART: [state] CFI Enabled
3,659,167 UART: [state] LifecycleState = Unprovisioned
3,659,822 UART: [state] DebugLocked = No
3,660,398 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,661,945 UART: [kat] SHA2-256
4,455,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,459,991 UART: [kat] ++
4,460,143 UART: [kat] sha1
4,464,359 UART: [kat] SHA2-256
4,466,297 UART: [kat] SHA2-384
4,469,208 UART: [kat] SHA2-512-ACC
4,471,108 UART: [kat] ECC-384
4,476,811 UART: [kat] HMAC-384Kdf
4,481,353 UART: [kat] LMS
5,049,549 UART: [kat] --
5,050,476 UART: [update-reset] ++
5,162,203 >>> mbox cmd response: failed
5,162,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,162,631 UART: ROM Non-Fatal Error: 0x000B001F
5,163,619 UART: [state] Locking Datavault
5,164,499 UART: [state] Locking PCR0, PCR1 and PCR31
5,165,103 UART: [state] Locking ICCM
5,165,599 UART: [exit] Launching FMC @ 0x40000130
5,170,929 UART:
5,170,945 UART: Running Caliptra FMC ...
5,171,353 UART:
5,171,407 UART: [state] CFI Enabled
5,260,232 UART: [art] Extend RT PCRs Done
5,260,660 UART: [art] Lock RT PCRs Done
5,261,983 UART: [art] Populate DV Done
5,270,300 UART: [fht] FMC Alias Private Key: 7
5,271,280 UART: [art] Derive CDI
5,271,560 UART: [art] Store in slot 0x4
5,357,232 UART: [art] Derive Key Pair
5,357,592 UART: [art] Store priv key in slot 0x5
5,370,821 UART: [art] Derive Key Pair - Done
5,385,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,401,410 UART: [art] Erasing AUTHORITY.KEYID = 7
5,402,175 UART: [art] PUB.X = D42BA6ACEDC5198267B98602AF8D7D8F458BFA24D0EB376929A1294AE99B5EE0394A40B0074AA92DDD7E6D92BBADBA3E
5,408,961 UART: [art] PUB.Y = 080A33ED71F335843A733000B89374433C58289F6C3FFCA4BBA5896E27F06BDDC74B657C27C2075871094A9F2E6875AE
5,415,875 UART: [art] SIG.R = D6327970593695A21D2178E2F72487DE2AC9B89DBBD95E7180EDC121CDBB73245548B6F1E0A08FEF0C0E16727755E47F
5,422,643 UART: [art] SIG.S = BA1937C1EDF95BA0A96EA458571FFE2B2F8CC0E9EE008102EED9611A544DABC3F2F7045E21C2589C3E3CB2D298F993ED
5,446,557 UART: Caliptra RT
5,446,808 UART: [state] CFI Enabled
5,812,240 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,814,054 UART:
5,814,070 UART: Running Caliptra ROM ...
5,814,478 UART:
5,814,532 UART: [state] CFI Enabled
5,816,966 UART: [state] LifecycleState = Unprovisioned
5,817,621 UART: [state] DebugLocked = No
5,818,225 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,819,890 UART: [kat] SHA2-256
6,613,821 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,617,936 UART: [kat] ++
6,618,088 UART: [kat] sha1
6,622,230 UART: [kat] SHA2-256
6,624,168 UART: [kat] SHA2-384
6,626,889 UART: [kat] SHA2-512-ACC
6,628,789 UART: [kat] ECC-384
6,634,238 UART: [kat] HMAC-384Kdf
6,638,832 UART: [kat] LMS
7,207,028 UART: [kat] --
7,207,953 UART: [update-reset] ++
8,590,143 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,591,397 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,746,664 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,416 >>> mbox cmd response: success
2,979,416 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
3,040,893 UART:
3,040,909 UART: Running Caliptra FMC ...
3,041,317 UART:
3,041,371 UART: [state] CFI Enabled
3,051,919 UART: [fht] FMC Alias Private Key: 7
3,171,115 UART: [art] Extend RT PCRs Done
3,171,543 UART: [art] Lock RT PCRs Done
3,172,921 UART: [art] Populate DV Done
3,181,312 UART: [fht] FMC Alias Private Key: 7
3,182,288 UART: [art] Derive CDI
3,182,568 UART: [art] Store in slot 0x4
3,268,740 UART: [art] Derive Key Pair
3,269,100 UART: [art] Store priv key in slot 0x5
3,281,987 UART: [art] Derive Key Pair - Done
3,296,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,854 UART: [art] PUB.X = 95042998D827898CDC033494591791004D53BBC31167FA5DCFDBC96812191F3BD0B0E34DC10B2C5A81DED489133E5D1F
3,319,595 UART: [art] PUB.Y = FD18F47616A31B0B659D215C98EC9C449CED674AA79FDC3A796E6E60E011EE7C21AF65E8F296A31BF3ADCF59AC1B4E37
3,326,562 UART: [art] SIG.R = 4A69925E8611DF23E5F498EF88183B669E1E4330EEEC6DF27D4252D62C24E4B2202351AE09398D2BBC1AE107122FBAAA
3,333,334 UART: [art] SIG.S = 1D48961CCAFF51BDF5075FBE8EA4233D13AB85796E871AA15229858F640B36FC2A68D5E36FBCDEEF7FBC17E6ACEBE408
3,356,771 UART: Caliptra RT
3,357,022 UART: [state] CFI Enabled
3,478,137 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,869,455 >>> mbox cmd response: failed
4,869,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,875,073 UART:
4,875,089 UART: Running Caliptra FMC ...
4,875,497 UART:
4,875,551 UART: [state] CFI Enabled
4,964,614 UART: [art] Extend RT PCRs Done
4,965,042 UART: [art] Lock RT PCRs Done
4,966,441 UART: [art] Populate DV Done
4,974,634 UART: [fht] FMC Alias Private Key: 7
4,975,802 UART: [art] Derive CDI
4,976,082 UART: [art] Store in slot 0x4
5,061,770 UART: [art] Derive Key Pair
5,062,130 UART: [art] Store priv key in slot 0x5
5,075,163 UART: [art] Derive Key Pair - Done
5,089,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,104,811 UART: [art] Erasing AUTHORITY.KEYID = 7
5,105,576 UART: [art] PUB.X = 95042998D827898CDC033494591791004D53BBC31167FA5DCFDBC96812191F3BD0B0E34DC10B2C5A81DED489133E5D1F
5,112,317 UART: [art] PUB.Y = FD18F47616A31B0B659D215C98EC9C449CED674AA79FDC3A796E6E60E011EE7C21AF65E8F296A31BF3ADCF59AC1B4E37
5,119,284 UART: [art] SIG.R = 4A69925E8611DF23E5F498EF88183B669E1E4330EEEC6DF27D4252D62C24E4B2202351AE09398D2BBC1AE107122FBAAA
5,126,056 UART: [art] SIG.S = 1D48961CCAFF51BDF5075FBE8EA4233D13AB85796E871AA15229858F640B36FC2A68D5E36FBCDEEF7FBC17E6ACEBE408
5,149,589 UART: Caliptra RT
5,149,840 UART: [state] CFI Enabled
5,512,176 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,328,304 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,178 UART: [kat] SHA2-256
882,109 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,224 UART: [kat] ++
886,376 UART: [kat] sha1
890,616 UART: [kat] SHA2-256
892,554 UART: [kat] SHA2-384
895,377 UART: [kat] SHA2-512-ACC
897,278 UART: [kat] ECC-384
903,085 UART: [kat] HMAC-384Kdf
907,709 UART: [kat] LMS
1,475,905 UART: [kat] --
1,476,568 UART: [cold-reset] ++
1,477,106 UART: [fht] Storing FHT @ 0x50003400
1,479,891 UART: [idev] ++
1,480,059 UART: [idev] CDI.KEYID = 6
1,480,419 UART: [idev] SUBJECT.KEYID = 7
1,480,843 UART: [idev] UDS.KEYID = 0
1,481,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,037 UART: [idev] Erasing UDS.KEYID = 0
1,506,055 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,647 UART: [idev] --
1,515,614 UART: [ldev] ++
1,515,782 UART: [ldev] CDI.KEYID = 6
1,516,145 UART: [ldev] SUBJECT.KEYID = 5
1,516,571 UART: [ldev] AUTHORITY.KEYID = 7
1,517,034 UART: [ldev] FE.KEYID = 1
1,522,318 UART: [ldev] Erasing FE.KEYID = 1
1,548,253 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,239 UART: [ldev] --
1,587,750 UART: [fwproc] Waiting for Commands...
1,588,391 UART: [fwproc] Received command 0x46574c44
1,589,182 UART: [fwproc] Received Image of size 118548 bytes
2,933,982 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,450 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,668 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,071 >>> mbox cmd response: success
3,133,071 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
3,134,109 UART: [afmc] ++
3,134,277 UART: [afmc] CDI.KEYID = 6
3,134,639 UART: [afmc] SUBJECT.KEYID = 7
3,135,064 UART: [afmc] AUTHORITY.KEYID = 5
3,170,639 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,205 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,985 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,694 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,577 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,260 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,938 UART: [afmc] --
3,213,984 UART: [cold-reset] --
3,214,868 UART: [state] Locking Datavault
3,216,033 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,637 UART: [state] Locking ICCM
3,217,271 UART: [exit] Launching FMC @ 0x40000130
3,222,601 UART:
3,222,617 UART: Running Caliptra FMC ...
3,223,025 UART:
3,223,168 UART: [state] CFI Enabled
3,233,806 UART: [fht] FMC Alias Private Key: 7
3,352,424 UART: [art] Extend RT PCRs Done
3,352,852 UART: [art] Lock RT PCRs Done
3,354,700 UART: [art] Populate DV Done
3,362,861 UART: [fht] FMC Alias Private Key: 7
3,363,863 UART: [art] Derive CDI
3,364,143 UART: [art] Store in slot 0x4
3,450,097 UART: [art] Derive Key Pair
3,450,457 UART: [art] Store priv key in slot 0x5
3,463,748 UART: [art] Derive Key Pair - Done
3,478,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,383 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,148 UART: [art] PUB.X = 676DFE88968D8CD94ED01B1DF3C13C76E9EDE687D3A637DF79913C0B676FC440124C5DA92547E50E00B34822F18CEF38
3,501,898 UART: [art] PUB.Y = 6C67A1A5DF5466F6AAAD384A7387EF2994F7A7D5A081FA034CC2EDAEC1BE8C3285DD83BF1F1408AB47C4C7748A865E33
3,508,860 UART: [art] SIG.R = 9606330BA0D48CCB060FC389C331950F55A70D0E72759E8350B201E42AF7EAD641520DA5AB7AA37EEC7779A675EDAD3C
3,515,613 UART: [art] SIG.S = FC120DC4832CBDD3CE70A356FC02A52C5EAFE85292C0C9949EFD4992CEF4978E26088670F264F11E3635C33D692A4253
3,539,004 UART: Caliptra RT
3,539,347 UART: [state] CFI Enabled
3,660,170 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,217 UART:
3,662,233 UART: Running Caliptra ROM ...
3,662,641 UART:
3,662,782 UART: [state] CFI Enabled
3,665,758 UART: [state] LifecycleState = Unprovisioned
3,666,413 UART: [state] DebugLocked = No
3,667,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,668,598 UART: [kat] SHA2-256
4,462,529 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,466,644 UART: [kat] ++
4,466,796 UART: [kat] sha1
4,470,990 UART: [kat] SHA2-256
4,472,928 UART: [kat] SHA2-384
4,475,701 UART: [kat] SHA2-512-ACC
4,477,601 UART: [kat] ECC-384
4,483,492 UART: [kat] HMAC-384Kdf
4,488,128 UART: [kat] LMS
5,056,324 UART: [kat] --
5,057,149 UART: [update-reset] ++
5,168,416 >>> mbox cmd response: failed
5,168,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,168,866 UART: ROM Non-Fatal Error: 0x000B001F
5,169,750 UART: [state] Locking Datavault
5,170,702 UART: [state] Locking PCR0, PCR1 and PCR31
5,171,306 UART: [state] Locking ICCM
5,171,790 UART: [exit] Launching FMC @ 0x40000130
5,177,120 UART:
5,177,136 UART: Running Caliptra FMC ...
5,177,544 UART:
5,177,687 UART: [state] CFI Enabled
5,267,090 UART: [art] Extend RT PCRs Done
5,267,518 UART: [art] Lock RT PCRs Done
5,268,807 UART: [art] Populate DV Done
5,276,770 UART: [fht] FMC Alias Private Key: 7
5,277,704 UART: [art] Derive CDI
5,277,984 UART: [art] Store in slot 0x4
5,363,822 UART: [art] Derive Key Pair
5,364,182 UART: [art] Store priv key in slot 0x5
5,377,023 UART: [art] Derive Key Pair - Done
5,391,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,407,196 UART: [art] Erasing AUTHORITY.KEYID = 7
5,407,961 UART: [art] PUB.X = 676DFE88968D8CD94ED01B1DF3C13C76E9EDE687D3A637DF79913C0B676FC440124C5DA92547E50E00B34822F18CEF38
5,414,711 UART: [art] PUB.Y = 6C67A1A5DF5466F6AAAD384A7387EF2994F7A7D5A081FA034CC2EDAEC1BE8C3285DD83BF1F1408AB47C4C7748A865E33
5,421,673 UART: [art] SIG.R = 9606330BA0D48CCB060FC389C331950F55A70D0E72759E8350B201E42AF7EAD641520DA5AB7AA37EEC7779A675EDAD3C
5,428,426 UART: [art] SIG.S = FC120DC4832CBDD3CE70A356FC02A52C5EAFE85292C0C9949EFD4992CEF4978E26088670F264F11E3635C33D692A4253
5,452,661 UART: Caliptra RT
5,453,004 UART: [state] CFI Enabled
5,818,514 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,820,346 UART:
5,820,362 UART: Running Caliptra ROM ...
5,820,770 UART:
5,820,911 UART: [state] CFI Enabled
5,823,475 UART: [state] LifecycleState = Unprovisioned
5,824,130 UART: [state] DebugLocked = No
5,824,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,826,353 UART: [kat] SHA2-256
6,620,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,624,399 UART: [kat] ++
6,624,551 UART: [kat] sha1
6,628,775 UART: [kat] SHA2-256
6,630,713 UART: [kat] SHA2-384
6,633,228 UART: [kat] SHA2-512-ACC
6,635,128 UART: [kat] ECC-384
6,640,455 UART: [kat] HMAC-384Kdf
6,644,993 UART: [kat] LMS
7,213,189 UART: [kat] --
7,214,150 UART: [update-reset] ++
8,595,276 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,596,434 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,751,701 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,487 >>> mbox cmd response: success
2,979,487 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
3,040,626 UART:
3,040,642 UART: Running Caliptra FMC ...
3,041,050 UART:
3,041,193 UART: [state] CFI Enabled
3,051,713 UART: [fht] FMC Alias Private Key: 7
3,171,423 UART: [art] Extend RT PCRs Done
3,171,851 UART: [art] Lock RT PCRs Done
3,173,539 UART: [art] Populate DV Done
3,181,702 UART: [fht] FMC Alias Private Key: 7
3,182,672 UART: [art] Derive CDI
3,182,952 UART: [art] Store in slot 0x4
3,269,066 UART: [art] Derive Key Pair
3,269,426 UART: [art] Store priv key in slot 0x5
3,282,007 UART: [art] Derive Key Pair - Done
3,296,845 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,454 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,219 UART: [art] PUB.X = 4C0103A33B2FBF58B62B3E170E53F7C0C71685E2F7C0B05AEEAC462C7A11AC4659FC29EFB4CCB2917AEDB2D84DD45AFF
3,320,006 UART: [art] PUB.Y = F0631935DFBE6128950BA76C11D66082590266E5672F9510A6BEA6C100A6CF8C6AAB4113E17E33A4B8E2569D6A45FE56
3,326,930 UART: [art] SIG.R = 4C7450A952AB092A5BF88C8D53C45451A7E81D4634141B1D41331B58F8110D7E9079C49A2B1EFEB3A98ED3F7DA141B9D
3,333,700 UART: [art] SIG.S = 3A8E7CFEC35A4247B1E737608996A0460D2AFED7F2AE4FF3A0CFD479D8E379419B5472D202BFB95ACDDF8185C80E8572
3,357,565 UART: Caliptra RT
3,357,908 UART: [state] CFI Enabled
3,478,305 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,870,000 >>> mbox cmd response: failed
4,870,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,875,820 UART:
4,875,836 UART: Running Caliptra FMC ...
4,876,244 UART:
4,876,387 UART: [state] CFI Enabled
4,966,520 UART: [art] Extend RT PCRs Done
4,966,948 UART: [art] Lock RT PCRs Done
4,968,175 UART: [art] Populate DV Done
4,976,692 UART: [fht] FMC Alias Private Key: 7
4,977,812 UART: [art] Derive CDI
4,978,092 UART: [art] Store in slot 0x4
5,064,006 UART: [art] Derive Key Pair
5,064,366 UART: [art] Store priv key in slot 0x5
5,077,885 UART: [art] Derive Key Pair - Done
5,092,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,107,938 UART: [art] Erasing AUTHORITY.KEYID = 7
5,108,703 UART: [art] PUB.X = 4C0103A33B2FBF58B62B3E170E53F7C0C71685E2F7C0B05AEEAC462C7A11AC4659FC29EFB4CCB2917AEDB2D84DD45AFF
5,115,490 UART: [art] PUB.Y = F0631935DFBE6128950BA76C11D66082590266E5672F9510A6BEA6C100A6CF8C6AAB4113E17E33A4B8E2569D6A45FE56
5,122,414 UART: [art] SIG.R = 4C7450A952AB092A5BF88C8D53C45451A7E81D4634141B1D41331B58F8110D7E9079C49A2B1EFEB3A98ED3F7DA141B9D
5,129,184 UART: [art] SIG.S = 3A8E7CFEC35A4247B1E737608996A0460D2AFED7F2AE4FF3A0CFD479D8E379419B5472D202BFB95ACDDF8185C80E8572
5,152,669 UART: Caliptra RT
5,153,012 UART: [state] CFI Enabled
5,515,052 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,330,663 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,358 UART: [kat] ++
895,510 UART: [kat] sha1
899,850 UART: [kat] SHA2-256
901,790 UART: [kat] SHA2-384
904,477 UART: [kat] SHA2-512-ACC
906,378 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,230 UART: [cold-reset] ++
1,170,676 UART: [fht] FHT @ 0x50003400
1,173,468 UART: [idev] ++
1,173,636 UART: [idev] CDI.KEYID = 6
1,173,997 UART: [idev] SUBJECT.KEYID = 7
1,174,422 UART: [idev] UDS.KEYID = 0
1,174,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,377 UART: [idev] Erasing UDS.KEYID = 0
1,199,789 UART: [idev] Sha1 KeyId Algorithm
1,208,759 UART: [idev] --
1,209,758 UART: [ldev] ++
1,209,926 UART: [ldev] CDI.KEYID = 6
1,210,290 UART: [ldev] SUBJECT.KEYID = 5
1,210,717 UART: [ldev] AUTHORITY.KEYID = 7
1,211,180 UART: [ldev] FE.KEYID = 1
1,216,390 UART: [ldev] Erasing FE.KEYID = 1
1,243,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,108 UART: [ldev] --
1,282,309 UART: [fwproc] Wait for Commands...
1,283,062 UART: [fwproc] Recv command 0x46574c44
1,283,795 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,351 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,526 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,691 >>> mbox cmd response: success
2,826,691 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,827,753 UART: [afmc] ++
2,827,921 UART: [afmc] CDI.KEYID = 6
2,828,284 UART: [afmc] SUBJECT.KEYID = 7
2,828,710 UART: [afmc] AUTHORITY.KEYID = 5
2,864,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,205 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,915 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,796 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,497 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,342 UART: [afmc] --
2,907,377 UART: [cold-reset] --
2,908,357 UART: [state] Locking Datavault
2,909,376 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,980 UART: [state] Locking ICCM
2,910,448 UART: [exit] Launching FMC @ 0x40000130
2,915,778 UART:
2,915,794 UART: Running Caliptra FMC ...
2,916,202 UART:
2,916,256 UART: [state] CFI Enabled
2,926,710 UART: [fht] FMC Alias Private Key: 7
3,045,212 UART: [art] Extend RT PCRs Done
3,045,640 UART: [art] Lock RT PCRs Done
3,047,372 UART: [art] Populate DV Done
3,055,513 UART: [fht] FMC Alias Private Key: 7
3,056,541 UART: [art] Derive CDI
3,056,821 UART: [art] Store in slot 0x4
3,142,796 UART: [art] Derive Key Pair
3,143,156 UART: [art] Store priv key in slot 0x5
3,156,058 UART: [art] Derive Key Pair - Done
3,170,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,994 UART: [art] PUB.X = 6B21A72FA64368A4FB06978D75AC2F8FDB8C95D9E40489DD5A41DC058A36EF44AA79DA7A89FE05AE68643E61BEF06CA1
3,193,770 UART: [art] PUB.Y = F79C846A5E34B13C0219CA854706BC8E7B8262F2893A5EABBD2DB5F4BA6550BFFE528A86329E1D93FCE9372A063B51D3
3,200,723 UART: [art] SIG.R = 2ED6AFFFF0E531962DAC6F78D560FD5957918C01D752829764344BA47B01E68E0767CAB599C92651A5604C72F4DEB34E
3,207,488 UART: [art] SIG.S = BA3A0EC5B88BECD3D6DAF7A8B59BB9C5776D9CE2D577EB5B5DD98246BBBFEA95C2DE9F745ABD460934A22629CB5B3ED4
3,230,898 UART: Caliptra RT
3,231,149 UART: [state] CFI Enabled
3,350,548 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,264 UART:
3,352,280 UART: Running Caliptra ROM ...
3,352,688 UART:
3,352,743 UART: [state] CFI Enabled
3,355,611 UART: [state] LifecycleState = Unprovisioned
3,356,266 UART: [state] DebugLocked = No
3,356,888 UART: [state] WD Timer not started. Device not locked for debugging
3,358,018 UART: [kat] SHA2-256
4,161,568 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,165,672 UART: [kat] ++
4,165,824 UART: [kat] sha1
4,170,024 UART: [kat] SHA2-256
4,171,964 UART: [kat] SHA2-384
4,174,831 UART: [kat] SHA2-512-ACC
4,176,731 UART: [kat] ECC-384
4,186,354 UART: [kat] HMAC-384Kdf
4,191,148 UART: [kat] LMS
4,439,460 UART: [kat] --
4,440,284 UART: [update-reset] ++
4,530,170 >>> mbox cmd response: failed
4,530,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,530,532 UART: ROM Non-Fatal Error: 0x000B001F
4,531,438 UART: [state] Locking Datavault
4,532,280 UART: [state] Locking PCR0, PCR1 and PCR31
4,532,884 UART: [state] Locking ICCM
4,533,338 UART: [exit] Launching FMC @ 0x40000130
4,538,668 UART:
4,538,684 UART: Running Caliptra FMC ...
4,539,092 UART:
4,539,146 UART: [state] CFI Enabled
4,628,283 UART: [art] Extend RT PCRs Done
4,628,711 UART: [art] Lock RT PCRs Done
4,629,978 UART: [art] Populate DV Done
4,638,245 UART: [fht] FMC Alias Private Key: 7
4,639,175 UART: [art] Derive CDI
4,639,455 UART: [art] Store in slot 0x4
4,725,246 UART: [art] Derive Key Pair
4,725,606 UART: [art] Store priv key in slot 0x5
4,739,480 UART: [art] Derive Key Pair - Done
4,754,470 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,770,135 UART: [art] Erasing AUTHORITY.KEYID = 7
4,770,900 UART: [art] PUB.X = 6B21A72FA64368A4FB06978D75AC2F8FDB8C95D9E40489DD5A41DC058A36EF44AA79DA7A89FE05AE68643E61BEF06CA1
4,777,676 UART: [art] PUB.Y = F79C846A5E34B13C0219CA854706BC8E7B8262F2893A5EABBD2DB5F4BA6550BFFE528A86329E1D93FCE9372A063B51D3
4,784,629 UART: [art] SIG.R = 2ED6AFFFF0E531962DAC6F78D560FD5957918C01D752829764344BA47B01E68E0767CAB599C92651A5604C72F4DEB34E
4,791,394 UART: [art] SIG.S = BA3A0EC5B88BECD3D6DAF7A8B59BB9C5776D9CE2D577EB5B5DD98246BBBFEA95C2DE9F745ABD460934A22629CB5B3ED4
4,815,464 UART: Caliptra RT
4,815,715 UART: [state] CFI Enabled
5,184,479 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,186,140 UART:
5,186,156 UART: Running Caliptra ROM ...
5,186,564 UART:
5,186,619 UART: [state] CFI Enabled
5,189,029 UART: [state] LifecycleState = Unprovisioned
5,189,684 UART: [state] DebugLocked = No
5,190,388 UART: [state] WD Timer not started. Device not locked for debugging
5,191,500 UART: [kat] SHA2-256
5,995,050 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,999,154 UART: [kat] ++
5,999,306 UART: [kat] sha1
6,003,388 UART: [kat] SHA2-256
6,005,328 UART: [kat] SHA2-384
6,008,049 UART: [kat] SHA2-512-ACC
6,009,949 UART: [kat] ECC-384
6,019,808 UART: [kat] HMAC-384Kdf
6,024,510 UART: [kat] LMS
6,272,822 UART: [kat] --
6,273,462 UART: [update-reset] ++
7,632,907 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,633,948 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,789,163 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,884 >>> mbox cmd response: success
2,678,884 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,740,705 UART:
2,740,721 UART: Running Caliptra FMC ...
2,741,129 UART:
2,741,183 UART: [state] CFI Enabled
2,751,879 UART: [fht] FMC Alias Private Key: 7
2,871,135 UART: [art] Extend RT PCRs Done
2,871,563 UART: [art] Lock RT PCRs Done
2,872,993 UART: [art] Populate DV Done
2,881,346 UART: [fht] FMC Alias Private Key: 7
2,882,342 UART: [art] Derive CDI
2,882,622 UART: [art] Store in slot 0x4
2,968,627 UART: [art] Derive Key Pair
2,968,987 UART: [art] Store priv key in slot 0x5
2,982,691 UART: [art] Derive Key Pair - Done
2,997,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,106 UART: [art] PUB.X = DFC17953B53A5CC3D00C16A3B54FDB9E8AAF6E8FD51AAD9A5235D92255F065CB18A9B65FA9BFF1FF8B7FCA35AF6A9FCB
3,019,907 UART: [art] PUB.Y = 2B7071163E435BB05BA40C1BA0286A7F1D08D7071E426E226F238878BA379EB90E555E2EE0E9C304A16A8BC65F056AD9
3,026,843 UART: [art] SIG.R = B46E554FF613F0DA1790AECC95B40E8AE7DE8151A31DEF85E18BBB1DF565D02011D34BA036FD08BC312B6670ED13FE50
3,033,625 UART: [art] SIG.S = A8DFB5E0111C97B1A375EC258579C49138DC5FAE1B39C16A8881A5BBA2E7AEBEBA0ABFB0FF717CDE5FBE80A12CD1CD7F
3,057,796 UART: Caliptra RT
3,058,047 UART: [state] CFI Enabled
3,177,327 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,243,736 >>> mbox cmd response: failed
4,243,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,249,298 UART:
4,249,314 UART: Running Caliptra FMC ...
4,249,722 UART:
4,249,776 UART: [state] CFI Enabled
4,339,461 UART: [art] Extend RT PCRs Done
4,339,889 UART: [art] Lock RT PCRs Done
4,341,060 UART: [art] Populate DV Done
4,349,091 UART: [fht] FMC Alias Private Key: 7
4,350,273 UART: [art] Derive CDI
4,350,553 UART: [art] Store in slot 0x4
4,436,426 UART: [art] Derive Key Pair
4,436,786 UART: [art] Store priv key in slot 0x5
4,450,426 UART: [art] Derive Key Pair - Done
4,465,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,480,872 UART: [art] Erasing AUTHORITY.KEYID = 7
4,481,637 UART: [art] PUB.X = DFC17953B53A5CC3D00C16A3B54FDB9E8AAF6E8FD51AAD9A5235D92255F065CB18A9B65FA9BFF1FF8B7FCA35AF6A9FCB
4,488,438 UART: [art] PUB.Y = 2B7071163E435BB05BA40C1BA0286A7F1D08D7071E426E226F238878BA379EB90E555E2EE0E9C304A16A8BC65F056AD9
4,495,374 UART: [art] SIG.R = B46E554FF613F0DA1790AECC95B40E8AE7DE8151A31DEF85E18BBB1DF565D02011D34BA036FD08BC312B6670ED13FE50
4,502,156 UART: [art] SIG.S = A8DFB5E0111C97B1A375EC258579C49138DC5FAE1B39C16A8881A5BBA2E7AEBEBA0ABFB0FF717CDE5FBE80A12CD1CD7F
4,525,655 UART: Caliptra RT
4,525,906 UART: [state] CFI Enabled
4,896,661 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,386,353 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,089 UART: [state] LifecycleState = Unprovisioned
85,744 UART: [state] DebugLocked = No
86,266 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,225 UART: [kat] ++
895,377 UART: [kat] sha1
899,755 UART: [kat] SHA2-256
901,695 UART: [kat] SHA2-384
904,584 UART: [kat] SHA2-512-ACC
906,485 UART: [kat] ECC-384
915,930 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,899 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
1,174,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,932 UART: [idev] Erasing UDS.KEYID = 0
1,199,474 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,093 UART: [ldev] ++
1,209,261 UART: [ldev] CDI.KEYID = 6
1,209,625 UART: [ldev] SUBJECT.KEYID = 5
1,210,052 UART: [ldev] AUTHORITY.KEYID = 7
1,210,515 UART: [ldev] FE.KEYID = 1
1,215,957 UART: [ldev] Erasing FE.KEYID = 1
1,242,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,545 UART: [ldev] --
1,281,972 UART: [fwproc] Wait for Commands...
1,282,667 UART: [fwproc] Recv command 0x46574c44
1,283,400 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,096 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,271 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,656 >>> mbox cmd response: success
2,826,656 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,827,920 UART: [afmc] ++
2,828,088 UART: [afmc] CDI.KEYID = 6
2,828,451 UART: [afmc] SUBJECT.KEYID = 7
2,828,877 UART: [afmc] AUTHORITY.KEYID = 5
2,865,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,640 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,350 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,231 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,932 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,661 UART: [afmc] --
2,908,498 UART: [cold-reset] --
2,909,396 UART: [state] Locking Datavault
2,910,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,139 UART: [state] Locking ICCM
2,911,627 UART: [exit] Launching FMC @ 0x40000130
2,916,957 UART:
2,916,973 UART: Running Caliptra FMC ...
2,917,381 UART:
2,917,524 UART: [state] CFI Enabled
2,928,300 UART: [fht] FMC Alias Private Key: 7
3,046,868 UART: [art] Extend RT PCRs Done
3,047,296 UART: [art] Lock RT PCRs Done
3,048,888 UART: [art] Populate DV Done
3,057,141 UART: [fht] FMC Alias Private Key: 7
3,058,175 UART: [art] Derive CDI
3,058,455 UART: [art] Store in slot 0x4
3,144,252 UART: [art] Derive Key Pair
3,144,612 UART: [art] Store priv key in slot 0x5
3,158,110 UART: [art] Derive Key Pair - Done
3,172,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,223 UART: [art] PUB.X = 1FA4FF14C9687E51FF3A32576CE8FBB5597F8D1F9B9E66CAED791EEC98E21343D19DCFFCD6D97C33118D9C543BA3F89E
3,196,015 UART: [art] PUB.Y = 93431F6F9F5ADB0D93ABD743BE7B3D484FC10E36BB631E25BBE07B7C1A08AAC9C0B17C2D6ECF07F1FF1BB2398AD292BE
3,202,981 UART: [art] SIG.R = E52305D80E25050EE0E9A23A93B5D8948ACA9F6B6017C9054C02A628133D35C4AAE8825C8D99BBB44FAA78B485044673
3,209,732 UART: [art] SIG.S = DD659DCECC1FE04079F02F81C68084674385BFC90CEFCA6CA51C6EC920C6F6B62744D28B39728E97503F712B6DF056F4
3,233,677 UART: Caliptra RT
3,234,020 UART: [state] CFI Enabled
3,354,240 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,356,238 UART:
3,356,254 UART: Running Caliptra ROM ...
3,356,662 UART:
3,356,804 UART: [state] CFI Enabled
3,359,908 UART: [state] LifecycleState = Unprovisioned
3,360,563 UART: [state] DebugLocked = No
3,361,131 UART: [state] WD Timer not started. Device not locked for debugging
3,362,459 UART: [kat] SHA2-256
4,166,009 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,170,113 UART: [kat] ++
4,170,265 UART: [kat] sha1
4,174,391 UART: [kat] SHA2-256
4,176,331 UART: [kat] SHA2-384
4,179,060 UART: [kat] SHA2-512-ACC
4,180,960 UART: [kat] ECC-384
4,190,841 UART: [kat] HMAC-384Kdf
4,195,405 UART: [kat] LMS
4,443,717 UART: [kat] --
4,444,461 UART: [update-reset] ++
4,534,051 >>> mbox cmd response: failed
4,534,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,534,537 UART: ROM Non-Fatal Error: 0x000B001F
4,535,293 UART: [state] Locking Datavault
4,536,133 UART: [state] Locking PCR0, PCR1 and PCR31
4,536,737 UART: [state] Locking ICCM
4,537,363 UART: [exit] Launching FMC @ 0x40000130
4,542,693 UART:
4,542,709 UART: Running Caliptra FMC ...
4,543,117 UART:
4,543,260 UART: [state] CFI Enabled
4,632,601 UART: [art] Extend RT PCRs Done
4,633,029 UART: [art] Lock RT PCRs Done
4,634,240 UART: [art] Populate DV Done
4,642,261 UART: [fht] FMC Alias Private Key: 7
4,643,221 UART: [art] Derive CDI
4,643,501 UART: [art] Store in slot 0x4
4,729,346 UART: [art] Derive Key Pair
4,729,706 UART: [art] Store priv key in slot 0x5
4,743,040 UART: [art] Derive Key Pair - Done
4,757,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,773,890 UART: [art] Erasing AUTHORITY.KEYID = 7
4,774,655 UART: [art] PUB.X = 1FA4FF14C9687E51FF3A32576CE8FBB5597F8D1F9B9E66CAED791EEC98E21343D19DCFFCD6D97C33118D9C543BA3F89E
4,781,447 UART: [art] PUB.Y = 93431F6F9F5ADB0D93ABD743BE7B3D484FC10E36BB631E25BBE07B7C1A08AAC9C0B17C2D6ECF07F1FF1BB2398AD292BE
4,788,413 UART: [art] SIG.R = E52305D80E25050EE0E9A23A93B5D8948ACA9F6B6017C9054C02A628133D35C4AAE8825C8D99BBB44FAA78B485044673
4,795,164 UART: [art] SIG.S = DD659DCECC1FE04079F02F81C68084674385BFC90CEFCA6CA51C6EC920C6F6B62744D28B39728E97503F712B6DF056F4
4,818,969 UART: Caliptra RT
4,819,312 UART: [state] CFI Enabled
5,183,773 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,185,544 UART:
5,185,560 UART: Running Caliptra ROM ...
5,185,968 UART:
5,186,110 UART: [state] CFI Enabled
5,188,822 UART: [state] LifecycleState = Unprovisioned
5,189,477 UART: [state] DebugLocked = No
5,190,125 UART: [state] WD Timer not started. Device not locked for debugging
5,191,297 UART: [kat] SHA2-256
5,994,847 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,998,951 UART: [kat] ++
5,999,103 UART: [kat] sha1
6,003,205 UART: [kat] SHA2-256
6,005,145 UART: [kat] SHA2-384
6,007,804 UART: [kat] SHA2-512-ACC
6,009,704 UART: [kat] ECC-384
6,019,581 UART: [kat] HMAC-384Kdf
6,024,155 UART: [kat] LMS
6,272,467 UART: [kat] --
6,273,469 UART: [update-reset] ++
7,632,570 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,633,569 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,788,784 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,067 >>> mbox cmd response: success
2,679,067 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,742,050 UART:
2,742,066 UART: Running Caliptra FMC ...
2,742,474 UART:
2,742,617 UART: [state] CFI Enabled
2,753,433 UART: [fht] FMC Alias Private Key: 7
2,872,027 UART: [art] Extend RT PCRs Done
2,872,455 UART: [art] Lock RT PCRs Done
2,874,247 UART: [art] Populate DV Done
2,882,554 UART: [fht] FMC Alias Private Key: 7
2,883,690 UART: [art] Derive CDI
2,883,970 UART: [art] Store in slot 0x4
2,969,985 UART: [art] Derive Key Pair
2,970,345 UART: [art] Store priv key in slot 0x5
2,983,823 UART: [art] Derive Key Pair - Done
2,998,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,090 UART: [art] PUB.X = 1E9BA9DFA2605F0B4E337AD7D76A7C86208CA9D460F9A6F3DED2E1B5FF9425CDB0249A46C6AA97F7CCB07EFD591B60A2
3,021,881 UART: [art] PUB.Y = DBAD4022453BBB5635C025F40C1D7BB1BE8BDC71790C79CBFD69E64AE1AD055C1D8694B250F267064EF1D467E4380881
3,028,826 UART: [art] SIG.R = 1DE0DB9BD472D2548EE05E8F83A20667E9931295067FCA709DCDCBBAFF0326C49AFC95AA620B3A0C91B26F676A95E1A6
3,035,597 UART: [art] SIG.S = 076396F21CC793207649FD07B434A12E8B2F2BF82A57A1E52812D7D052E0F7855AE4C8E0D20D797A515EF5E12D451805
3,059,641 UART: Caliptra RT
3,059,984 UART: [state] CFI Enabled
3,180,104 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,246,372 >>> mbox cmd response: failed
4,246,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,252,188 UART:
4,252,204 UART: Running Caliptra FMC ...
4,252,612 UART:
4,252,755 UART: [state] CFI Enabled
4,342,114 UART: [art] Extend RT PCRs Done
4,342,542 UART: [art] Lock RT PCRs Done
4,343,925 UART: [art] Populate DV Done
4,351,920 UART: [fht] FMC Alias Private Key: 7
4,352,850 UART: [art] Derive CDI
4,353,130 UART: [art] Store in slot 0x4
4,439,535 UART: [art] Derive Key Pair
4,439,895 UART: [art] Store priv key in slot 0x5
4,452,827 UART: [art] Derive Key Pair - Done
4,467,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,482,701 UART: [art] Erasing AUTHORITY.KEYID = 7
4,483,466 UART: [art] PUB.X = 1E9BA9DFA2605F0B4E337AD7D76A7C86208CA9D460F9A6F3DED2E1B5FF9425CDB0249A46C6AA97F7CCB07EFD591B60A2
4,490,257 UART: [art] PUB.Y = DBAD4022453BBB5635C025F40C1D7BB1BE8BDC71790C79CBFD69E64AE1AD055C1D8694B250F267064EF1D467E4380881
4,497,202 UART: [art] SIG.R = 1DE0DB9BD472D2548EE05E8F83A20667E9931295067FCA709DCDCBBAFF0326C49AFC95AA620B3A0C91B26F676A95E1A6
4,503,973 UART: [art] SIG.S = 076396F21CC793207649FD07B434A12E8B2F2BF82A57A1E52812D7D052E0F7855AE4C8E0D20D797A515EF5E12D451805
4,527,711 UART: Caliptra RT
4,528,054 UART: [state] CFI Enabled
4,898,473 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,387,872 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
88,028 UART: [kat] SHA2-256
893,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,803 UART: [kat] ++
897,955 UART: [kat] sha1
902,231 UART: [kat] SHA2-256
904,171 UART: [kat] SHA2-384
907,102 UART: [kat] SHA2-512-ACC
909,003 UART: [kat] ECC-384
918,808 UART: [kat] HMAC-384Kdf
923,520 UART: [kat] LMS
1,171,848 UART: [kat] --
1,172,799 UART: [cold-reset] ++
1,173,189 UART: [fht] FHT @ 0x50003400
1,175,744 UART: [idev] ++
1,175,912 UART: [idev] CDI.KEYID = 6
1,176,272 UART: [idev] SUBJECT.KEYID = 7
1,176,696 UART: [idev] UDS.KEYID = 0
1,177,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,480 UART: [idev] Erasing UDS.KEYID = 0
1,201,089 UART: [idev] Sha1 KeyId Algorithm
1,209,647 UART: [idev] --
1,210,575 UART: [ldev] ++
1,210,743 UART: [ldev] CDI.KEYID = 6
1,211,106 UART: [ldev] SUBJECT.KEYID = 5
1,211,532 UART: [ldev] AUTHORITY.KEYID = 7
1,211,995 UART: [ldev] FE.KEYID = 1
1,217,211 UART: [ldev] Erasing FE.KEYID = 1
1,243,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,915 UART: [ldev] --
1,283,336 UART: [fwproc] Wait for Commands...
1,284,104 UART: [fwproc] Recv command 0x46574c44
1,284,832 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,620 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,790 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,091 >>> mbox cmd response: success
2,827,091 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,828,259 UART: [afmc] ++
2,828,427 UART: [afmc] CDI.KEYID = 6
2,828,789 UART: [afmc] SUBJECT.KEYID = 7
2,829,214 UART: [afmc] AUTHORITY.KEYID = 5
2,864,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,754 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,463 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,346 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,047 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,667 UART: [afmc] --
2,907,735 UART: [cold-reset] --
2,908,729 UART: [state] Locking Datavault
2,910,046 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,650 UART: [state] Locking ICCM
2,911,178 UART: [exit] Launching FMC @ 0x40000130
2,916,508 UART:
2,916,524 UART: Running Caliptra FMC ...
2,916,932 UART:
2,916,986 UART: [state] CFI Enabled
2,927,490 UART: [fht] FMC Alias Private Key: 7
3,046,738 UART: [art] Extend RT PCRs Done
3,047,166 UART: [art] Lock RT PCRs Done
3,048,664 UART: [art] Populate DV Done
3,057,145 UART: [fht] FMC Alias Private Key: 7
3,058,121 UART: [art] Derive CDI
3,058,401 UART: [art] Store in slot 0x4
3,144,264 UART: [art] Derive Key Pair
3,144,624 UART: [art] Store priv key in slot 0x5
3,157,702 UART: [art] Derive Key Pair - Done
3,172,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,630 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,395 UART: [art] PUB.X = 12447266CE90B71B41E7EA6E1C148D6A964949E442EB2D3AAC55FBF33FBE24FE04D156EC887B04D36F1A8823B8E8CD11
3,195,171 UART: [art] PUB.Y = 16E44657B67E33E3CD4BE4903415622F64F745879325151185FA44E9B9B8E5D789A1585FF2C0500FE88F90B85A505899
3,202,108 UART: [art] SIG.R = E04C857000218400D3E873E6AD88A707573C43693EF8E797E8AFAA6739DB22C8ECF593EEC35AE5867054F8727B8A629B
3,208,833 UART: [art] SIG.S = 748DD3A48926A96A75AF8687FA1BFC7C81A9F421A9AF8A146BC7730E9B0CFA13522BA1A9B96FAA0465091E18C7E84EE0
3,232,507 UART: Caliptra RT
3,232,758 UART: [state] CFI Enabled
3,351,651 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,805 UART:
3,353,821 UART: Running Caliptra ROM ...
3,354,229 UART:
3,354,284 UART: [state] CFI Enabled
3,357,148 UART: [state] LifecycleState = Unprovisioned
3,357,803 UART: [state] DebugLocked = No
3,358,491 UART: [state] WD Timer not started. Device not locked for debugging
3,359,831 UART: [kat] SHA2-256
4,165,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,169,606 UART: [kat] ++
4,169,758 UART: [kat] sha1
4,173,916 UART: [kat] SHA2-256
4,175,856 UART: [kat] SHA2-384
4,178,609 UART: [kat] SHA2-512-ACC
4,180,509 UART: [kat] ECC-384
4,189,936 UART: [kat] HMAC-384Kdf
4,194,668 UART: [kat] LMS
4,442,996 UART: [kat] --
4,444,044 UART: [update-reset] ++
4,534,111 >>> mbox cmd response: failed
4,534,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,534,509 UART: ROM Non-Fatal Error: 0x000B001F
4,535,473 UART: [state] Locking Datavault
4,536,185 UART: [state] Locking PCR0, PCR1 and PCR31
4,536,789 UART: [state] Locking ICCM
4,537,453 UART: [exit] Launching FMC @ 0x40000130
4,542,783 UART:
4,542,799 UART: Running Caliptra FMC ...
4,543,207 UART:
4,543,261 UART: [state] CFI Enabled
4,632,026 UART: [art] Extend RT PCRs Done
4,632,454 UART: [art] Lock RT PCRs Done
4,633,357 UART: [art] Populate DV Done
4,641,642 UART: [fht] FMC Alias Private Key: 7
4,642,572 UART: [art] Derive CDI
4,642,852 UART: [art] Store in slot 0x4
4,728,247 UART: [art] Derive Key Pair
4,728,607 UART: [art] Store priv key in slot 0x5
4,741,125 UART: [art] Derive Key Pair - Done
4,755,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,770,817 UART: [art] Erasing AUTHORITY.KEYID = 7
4,771,582 UART: [art] PUB.X = 12447266CE90B71B41E7EA6E1C148D6A964949E442EB2D3AAC55FBF33FBE24FE04D156EC887B04D36F1A8823B8E8CD11
4,778,358 UART: [art] PUB.Y = 16E44657B67E33E3CD4BE4903415622F64F745879325151185FA44E9B9B8E5D789A1585FF2C0500FE88F90B85A505899
4,785,295 UART: [art] SIG.R = E04C857000218400D3E873E6AD88A707573C43693EF8E797E8AFAA6739DB22C8ECF593EEC35AE5867054F8727B8A629B
4,792,020 UART: [art] SIG.S = 748DD3A48926A96A75AF8687FA1BFC7C81A9F421A9AF8A146BC7730E9B0CFA13522BA1A9B96FAA0465091E18C7E84EE0
4,815,582 UART: Caliptra RT
4,815,833 UART: [state] CFI Enabled
5,179,015 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,180,720 UART:
5,180,736 UART: Running Caliptra ROM ...
5,181,144 UART:
5,181,199 UART: [state] CFI Enabled
5,183,883 UART: [state] LifecycleState = Unprovisioned
5,184,538 UART: [state] DebugLocked = No
5,185,044 UART: [state] WD Timer not started. Device not locked for debugging
5,186,288 UART: [kat] SHA2-256
5,991,938 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,996,063 UART: [kat] ++
5,996,215 UART: [kat] sha1
6,000,505 UART: [kat] SHA2-256
6,002,445 UART: [kat] SHA2-384
6,005,032 UART: [kat] SHA2-512-ACC
6,006,932 UART: [kat] ECC-384
6,016,243 UART: [kat] HMAC-384Kdf
6,020,867 UART: [kat] LMS
6,269,195 UART: [kat] --
6,270,069 UART: [update-reset] ++
7,627,679 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,628,858 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,784,073 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,358 >>> mbox cmd response: success
2,679,358 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,741,159 UART:
2,741,175 UART: Running Caliptra FMC ...
2,741,583 UART:
2,741,637 UART: [state] CFI Enabled
2,751,981 UART: [fht] FMC Alias Private Key: 7
2,871,319 UART: [art] Extend RT PCRs Done
2,871,747 UART: [art] Lock RT PCRs Done
2,873,351 UART: [art] Populate DV Done
2,881,576 UART: [fht] FMC Alias Private Key: 7
2,882,680 UART: [art] Derive CDI
2,882,960 UART: [art] Store in slot 0x4
2,968,767 UART: [art] Derive Key Pair
2,969,127 UART: [art] Store priv key in slot 0x5
2,981,733 UART: [art] Derive Key Pair - Done
2,996,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,921 UART: [art] PUB.X = D3168BE5890AEB7ED43705AD9876F58B23A70C189E588CD8143FB1781DC6C374C8E46877F51607F36C954590DE9385C5
3,019,677 UART: [art] PUB.Y = 83FE2C518E4BF268DC6DAFE7CF684CEAD8F3224A358B871DC80CFA33AB62FFF6EE122A493B75A57FAA514452DEE7DDD6
3,026,652 UART: [art] SIG.R = 2E3BD2A5933D86121651FCA278E72B3C2D1D44BF182709681D40FF0CA86CE6A72BFB20ADD1454C3444E89374902055A6
3,033,418 UART: [art] SIG.S = 0811F03657475C50EFBCA25A2375D8D7507F0EE1E45DF06416B6B5142C60F43C3C5CDAD5499002720E63330CD2B1234D
3,056,849 UART: Caliptra RT
3,057,100 UART: [state] CFI Enabled
3,176,414 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,244,184 >>> mbox cmd response: failed
4,244,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,250,516 UART:
4,250,532 UART: Running Caliptra FMC ...
4,250,940 UART:
4,250,994 UART: [state] CFI Enabled
4,340,501 UART: [art] Extend RT PCRs Done
4,340,929 UART: [art] Lock RT PCRs Done
4,342,250 UART: [art] Populate DV Done
4,350,309 UART: [fht] FMC Alias Private Key: 7
4,351,425 UART: [art] Derive CDI
4,351,705 UART: [art] Store in slot 0x4
4,437,488 UART: [art] Derive Key Pair
4,437,848 UART: [art] Store priv key in slot 0x5
4,451,256 UART: [art] Derive Key Pair - Done
4,466,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,481,435 UART: [art] Erasing AUTHORITY.KEYID = 7
4,482,200 UART: [art] PUB.X = D3168BE5890AEB7ED43705AD9876F58B23A70C189E588CD8143FB1781DC6C374C8E46877F51607F36C954590DE9385C5
4,488,956 UART: [art] PUB.Y = 83FE2C518E4BF268DC6DAFE7CF684CEAD8F3224A358B871DC80CFA33AB62FFF6EE122A493B75A57FAA514452DEE7DDD6
4,495,931 UART: [art] SIG.R = 2E3BD2A5933D86121651FCA278E72B3C2D1D44BF182709681D40FF0CA86CE6A72BFB20ADD1454C3444E89374902055A6
4,502,697 UART: [art] SIG.S = 0811F03657475C50EFBCA25A2375D8D7507F0EE1E45DF06416B6B5142C60F43C3C5CDAD5499002720E63330CD2B1234D
4,526,374 UART: Caliptra RT
4,526,625 UART: [state] CFI Enabled
4,890,652 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,381,581 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,773 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
86,972 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
893,733 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,858 UART: [kat] ++
898,010 UART: [kat] sha1
902,214 UART: [kat] SHA2-256
904,154 UART: [kat] SHA2-384
906,933 UART: [kat] SHA2-512-ACC
908,834 UART: [kat] ECC-384
918,349 UART: [kat] HMAC-384Kdf
923,033 UART: [kat] LMS
1,171,361 UART: [kat] --
1,172,462 UART: [cold-reset] ++
1,172,968 UART: [fht] FHT @ 0x50003400
1,175,759 UART: [idev] ++
1,175,927 UART: [idev] CDI.KEYID = 6
1,176,287 UART: [idev] SUBJECT.KEYID = 7
1,176,711 UART: [idev] UDS.KEYID = 0
1,177,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,557 UART: [idev] Erasing UDS.KEYID = 0
1,201,484 UART: [idev] Sha1 KeyId Algorithm
1,210,124 UART: [idev] --
1,211,152 UART: [ldev] ++
1,211,320 UART: [ldev] CDI.KEYID = 6
1,211,683 UART: [ldev] SUBJECT.KEYID = 5
1,212,109 UART: [ldev] AUTHORITY.KEYID = 7
1,212,572 UART: [ldev] FE.KEYID = 1
1,217,612 UART: [ldev] Erasing FE.KEYID = 1
1,243,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,996 UART: [ldev] --
1,283,479 UART: [fwproc] Wait for Commands...
1,284,283 UART: [fwproc] Recv command 0x46574c44
1,285,011 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,959 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,129 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,470 >>> mbox cmd response: success
2,829,470 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,830,668 UART: [afmc] ++
2,830,836 UART: [afmc] CDI.KEYID = 6
2,831,198 UART: [afmc] SUBJECT.KEYID = 7
2,831,623 UART: [afmc] AUTHORITY.KEYID = 5
2,867,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,781 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,490 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,373 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,074 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,912 UART: [afmc] --
2,910,814 UART: [cold-reset] --
2,911,756 UART: [state] Locking Datavault
2,912,747 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,351 UART: [state] Locking ICCM
2,913,959 UART: [exit] Launching FMC @ 0x40000130
2,919,289 UART:
2,919,305 UART: Running Caliptra FMC ...
2,919,713 UART:
2,919,856 UART: [state] CFI Enabled
2,930,340 UART: [fht] FMC Alias Private Key: 7
3,048,754 UART: [art] Extend RT PCRs Done
3,049,182 UART: [art] Lock RT PCRs Done
3,050,562 UART: [art] Populate DV Done
3,058,705 UART: [fht] FMC Alias Private Key: 7
3,059,765 UART: [art] Derive CDI
3,060,045 UART: [art] Store in slot 0x4
3,145,998 UART: [art] Derive Key Pair
3,146,358 UART: [art] Store priv key in slot 0x5
3,159,808 UART: [art] Derive Key Pair - Done
3,174,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,358 UART: [art] PUB.X = 3E663E1678ABE1926F51EB36F38D95B5949C5D4EF129AE5B6735C559FD417CF507E5DE479234DC20BC440EDC50C29E6D
3,198,132 UART: [art] PUB.Y = 0D4C803A17DD11C7098B1E27B2465630AC8021AB8DBE8866E3825960209649E89DC6F632B2EF5F7DA10D82CB58EC0393
3,205,072 UART: [art] SIG.R = F46013845D8E8E2D254DC6A80D4C149D4E9857F20B66AB2722DA81051C437BB516D509264CE6CC72764806C5881D41AE
3,211,825 UART: [art] SIG.S = B173D96EB5F39D390CB252E994DB1FE975F0D93D35ADCBBEEC0810A8AF5E98824D5981D45E61C6FFFA5C34577229D186
3,235,303 UART: Caliptra RT
3,235,646 UART: [state] CFI Enabled
3,355,980 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,358,108 UART:
3,358,124 UART: Running Caliptra ROM ...
3,358,532 UART:
3,358,674 UART: [state] CFI Enabled
3,361,624 UART: [state] LifecycleState = Unprovisioned
3,362,279 UART: [state] DebugLocked = No
3,362,777 UART: [state] WD Timer not started. Device not locked for debugging
3,364,089 UART: [kat] SHA2-256
4,169,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,173,864 UART: [kat] ++
4,174,016 UART: [kat] sha1
4,178,190 UART: [kat] SHA2-256
4,180,130 UART: [kat] SHA2-384
4,182,803 UART: [kat] SHA2-512-ACC
4,184,703 UART: [kat] ECC-384
4,194,320 UART: [kat] HMAC-384Kdf
4,198,952 UART: [kat] LMS
4,447,280 UART: [kat] --
4,448,366 UART: [update-reset] ++
4,537,969 >>> mbox cmd response: failed
4,537,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,538,217 UART: ROM Non-Fatal Error: 0x000B001F
4,538,999 UART: [state] Locking Datavault
4,539,745 UART: [state] Locking PCR0, PCR1 and PCR31
4,540,349 UART: [state] Locking ICCM
4,540,859 UART: [exit] Launching FMC @ 0x40000130
4,546,189 UART:
4,546,205 UART: Running Caliptra FMC ...
4,546,613 UART:
4,546,756 UART: [state] CFI Enabled
4,635,711 UART: [art] Extend RT PCRs Done
4,636,139 UART: [art] Lock RT PCRs Done
4,637,422 UART: [art] Populate DV Done
4,645,791 UART: [fht] FMC Alias Private Key: 7
4,646,959 UART: [art] Derive CDI
4,647,239 UART: [art] Store in slot 0x4
4,733,376 UART: [art] Derive Key Pair
4,733,736 UART: [art] Store priv key in slot 0x5
4,747,004 UART: [art] Derive Key Pair - Done
4,761,674 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,777,223 UART: [art] Erasing AUTHORITY.KEYID = 7
4,777,988 UART: [art] PUB.X = 3E663E1678ABE1926F51EB36F38D95B5949C5D4EF129AE5B6735C559FD417CF507E5DE479234DC20BC440EDC50C29E6D
4,784,762 UART: [art] PUB.Y = 0D4C803A17DD11C7098B1E27B2465630AC8021AB8DBE8866E3825960209649E89DC6F632B2EF5F7DA10D82CB58EC0393
4,791,702 UART: [art] SIG.R = F46013845D8E8E2D254DC6A80D4C149D4E9857F20B66AB2722DA81051C437BB516D509264CE6CC72764806C5881D41AE
4,798,455 UART: [art] SIG.S = B173D96EB5F39D390CB252E994DB1FE975F0D93D35ADCBBEEC0810A8AF5E98824D5981D45E61C6FFFA5C34577229D186
4,822,783 UART: Caliptra RT
4,823,126 UART: [state] CFI Enabled
5,190,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,192,542 UART:
5,192,558 UART: Running Caliptra ROM ...
5,192,966 UART:
5,193,108 UART: [state] CFI Enabled
5,195,476 UART: [state] LifecycleState = Unprovisioned
5,196,131 UART: [state] DebugLocked = No
5,196,741 UART: [state] WD Timer not started. Device not locked for debugging
5,198,051 UART: [kat] SHA2-256
6,003,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,007,826 UART: [kat] ++
6,007,978 UART: [kat] sha1
6,012,260 UART: [kat] SHA2-256
6,014,200 UART: [kat] SHA2-384
6,016,779 UART: [kat] SHA2-512-ACC
6,018,679 UART: [kat] ECC-384
6,028,516 UART: [kat] HMAC-384Kdf
6,033,248 UART: [kat] LMS
6,281,576 UART: [kat] --
6,282,374 UART: [update-reset] ++
7,641,798 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,642,919 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,798,134 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,819 >>> mbox cmd response: success
2,680,819 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,743,274 UART:
2,743,290 UART: Running Caliptra FMC ...
2,743,698 UART:
2,743,841 UART: [state] CFI Enabled
2,754,093 UART: [fht] FMC Alias Private Key: 7
2,872,635 UART: [art] Extend RT PCRs Done
2,873,063 UART: [art] Lock RT PCRs Done
2,874,831 UART: [art] Populate DV Done
2,883,130 UART: [fht] FMC Alias Private Key: 7
2,884,136 UART: [art] Derive CDI
2,884,416 UART: [art] Store in slot 0x4
2,970,491 UART: [art] Derive Key Pair
2,970,851 UART: [art] Store priv key in slot 0x5
2,984,857 UART: [art] Derive Key Pair - Done
2,999,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,041 UART: [art] PUB.X = B3F5B8FB64BC820035C1130488586E17A39D7628AD6D4171B96998F3F89006B846DB92EBDAEF900716FBD072AC87467B
3,022,782 UART: [art] PUB.Y = 32C4B1143ABD4CA77EDE977C4956017E54239648A15874FAABE5814B37965DF79B7BA85DD4EC2621E9FF96D170D62E8E
3,029,737 UART: [art] SIG.R = 54DE89EEBCFD5758A8E3C12A840E6905D52F874D37F778C380E33F33EF5DA08EFF93A4EFC6F8B7C87675743A508D8B00
3,036,491 UART: [art] SIG.S = E4E92C03628E7F3919D21F2D7296B0C60958003156BC671A5CEAB3ECEAE171A78CAEE6CE9242F6269C65FBFC9C48C8B5
3,060,759 UART: Caliptra RT
3,061,102 UART: [state] CFI Enabled
3,181,411 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,250,082 >>> mbox cmd response: failed
4,250,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,255,844 UART:
4,255,860 UART: Running Caliptra FMC ...
4,256,268 UART:
4,256,411 UART: [state] CFI Enabled
4,345,590 UART: [art] Extend RT PCRs Done
4,346,018 UART: [art] Lock RT PCRs Done
4,347,345 UART: [art] Populate DV Done
4,355,670 UART: [fht] FMC Alias Private Key: 7
4,356,840 UART: [art] Derive CDI
4,357,120 UART: [art] Store in slot 0x4
4,442,933 UART: [art] Derive Key Pair
4,443,293 UART: [art] Store priv key in slot 0x5
4,456,507 UART: [art] Derive Key Pair - Done
4,471,447 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,486,804 UART: [art] Erasing AUTHORITY.KEYID = 7
4,487,569 UART: [art] PUB.X = B3F5B8FB64BC820035C1130488586E17A39D7628AD6D4171B96998F3F89006B846DB92EBDAEF900716FBD072AC87467B
4,494,310 UART: [art] PUB.Y = 32C4B1143ABD4CA77EDE977C4956017E54239648A15874FAABE5814B37965DF79B7BA85DD4EC2621E9FF96D170D62E8E
4,501,265 UART: [art] SIG.R = 54DE89EEBCFD5758A8E3C12A840E6905D52F874D37F778C380E33F33EF5DA08EFF93A4EFC6F8B7C87675743A508D8B00
4,508,019 UART: [art] SIG.S = E4E92C03628E7F3919D21F2D7296B0C60958003156BC671A5CEAB3ECEAE171A78CAEE6CE9242F6269C65FBFC9C48C8B5
4,531,555 UART: Caliptra RT
4,531,898 UART: [state] CFI Enabled
4,899,234 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,389,960 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,146 UART:
192,516 UART: Running Caliptra ROM ...
193,716 UART:
193,868 UART: [state] CFI Enabled
262,240 UART: [state] LifecycleState = Unprovisioned
264,219 UART: [state] DebugLocked = No
265,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,757 UART: [kat] SHA2-256
440,452 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,967 UART: [kat] ++
451,450 UART: [kat] sha1
462,671 UART: [kat] SHA2-256
465,365 UART: [kat] SHA2-384
470,700 UART: [kat] SHA2-512-ACC
473,100 UART: [kat] ECC-384
2,763,367 UART: [kat] HMAC-384Kdf
2,795,104 UART: [kat] LMS
3,985,431 UART: [kat] --
3,990,261 UART: [cold-reset] ++
3,992,810 UART: [fht] Storing FHT @ 0x50003400
4,005,461 UART: [idev] ++
4,006,049 UART: [idev] CDI.KEYID = 6
4,007,078 UART: [idev] SUBJECT.KEYID = 7
4,008,248 UART: [idev] UDS.KEYID = 0
4,011,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,707 UART: [idev] Erasing UDS.KEYID = 0
7,343,556 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,470 UART: [idev] --
7,369,208 UART: [ldev] ++
7,369,784 UART: [ldev] CDI.KEYID = 6
7,370,805 UART: [ldev] SUBJECT.KEYID = 5
7,372,011 UART: [ldev] AUTHORITY.KEYID = 7
7,373,119 UART: [ldev] FE.KEYID = 1
7,417,805 UART: [ldev] Erasing FE.KEYID = 1
10,752,827 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,063,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,092,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,107,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,126,332 UART: [ldev] --
13,130,379 UART: [fwproc] Waiting for Commands...
13,132,385 UART: [fwproc] Received command 0x46574c44
13,134,580 UART: [fwproc] Received Image of size 118548 bytes
17,246,532 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,323,543 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,396,684 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,725,494 >>> mbox cmd response: success
17,727,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,876,788 UART: [afmc] ++
17,877,436 UART: [afmc] CDI.KEYID = 6
17,878,335 UART: [afmc] SUBJECT.KEYID = 7
17,879,391 UART: [afmc] AUTHORITY.KEYID = 5
21,103,892 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,406,847 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,409,145 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,423,579 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,438,303 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,452,725 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,474,763 UART: [afmc] --
23,477,949 UART: [cold-reset] --
23,481,336 UART: [state] Locking Datavault
23,485,995 UART: [state] Locking PCR0, PCR1 and PCR31
23,487,750 UART: [state] Locking ICCM
23,488,945 UART: [exit] Launching FMC @ 0x40000130
23,497,343 UART:
23,497,583 UART: Running Caliptra FMC ...
23,498,689 UART:
23,498,848 UART: [state] CFI Enabled
23,558,559 UART: [fht] FMC Alias Private Key: 7
25,898,743 UART: [art] Extend RT PCRs Done
25,899,958 UART: [art] Lock RT PCRs Done
25,901,916 UART: [art] Populate DV Done
25,907,120 UART: [fht] FMC Alias Private Key: 7
25,908,605 UART: [art] Derive CDI
25,909,368 UART: [art] Store in slot 0x4
25,967,863 UART: [art] Derive Key Pair
25,968,907 UART: [art] Store priv key in slot 0x5
29,261,662 UART: [art] Derive Key Pair - Done
29,274,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,562,621 UART: [art] Erasing AUTHORITY.KEYID = 7
31,564,139 UART: [art] PUB.X = 643576EB5597EB99645F59F32BB9E62ED35C932C4D468F16690D065160014D965B2BC8597FC6C703666A7C5308E6E6E9
31,571,394 UART: [art] PUB.Y = 8433EEDF7A2FB1E425ADD6C4504AC410A94EEBDB700D929BC38FCD75B00A9556FE3D0D8F7F7DC282A3C43A5470910EB4
31,578,685 UART: [art] SIG.R = 8324042C831F1F5F92F467B0E3C54FA80F53CA36FA57FE3F094D337F757F4560293E20BF24DED8092802C3B47EB8E896
31,586,083 UART: [art] SIG.S = 3C8C897ED33C980E0FB89F6D1828BE5BD61EF0887990F2EAB0D61F5C813A2C4C9B7C1FF6CBFBD268C858BDDDFEBCC813
32,891,135 UART: Caliptra RT
32,891,845 UART: [state] CFI Enabled
33,067,505 UART: [rt] RT listening for mailbox commands...
33,070,639 UART:
33,070,897 UART: Running Caliptra ROM ...
33,072,006 UART:
33,072,175 UART: [state] CFI Enabled
33,138,106 UART: [state] LifecycleState = Unprovisioned
33,140,045 UART: [state] DebugLocked = No
33,141,332 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,147,045 UART: [kat] SHA2-256
33,316,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,327,237 UART: [kat] ++
33,327,724 UART: [kat] sha1
33,338,124 UART: [kat] SHA2-256
33,340,816 UART: [kat] SHA2-384
33,348,100 UART: [kat] SHA2-512-ACC
33,350,512 UART: [kat] ECC-384
35,641,729 UART: [kat] HMAC-384Kdf
35,673,753 UART: [kat] LMS
36,864,027 UART: [kat] --
36,868,414 UART: [update-reset] ++
36,974,705 >>> mbox cmd response: failed
36,977,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,127,072 UART: ROM Non-Fatal Error: 0x000B001D
37,128,503 UART: [state] Locking Datavault
37,129,658 UART: [state] Locking PCR0, PCR1 and PCR31
37,131,200 UART: [state] Locking ICCM
37,132,166 UART: [exit] Launching FMC @ 0x40000130
37,133,591 UART:
37,133,758 UART: Running Caliptra FMC ...
37,134,861 UART:
37,135,020 UART: [state] CFI Enabled
37,135,940 UART: [art] Extend RT PCRs Done
37,137,078 UART: [art] Lock RT PCRs Done
37,138,146 UART: [art] Populate DV Done
37,139,178 UART: [fht] FMC Alias Private Key: 7
37,140,497 UART: [art] Derive CDI
37,141,265 UART: [art] Store in slot 0x4
37,163,148 UART: [art] Derive Key Pair
37,164,155 UART: [art] Store priv key in slot 0x5
40,456,608 UART: [art] Derive Key Pair - Done
40,469,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,757,546 UART: [art] Erasing AUTHORITY.KEYID = 7
42,759,136 UART: [art] PUB.X = 643576EB5597EB99645F59F32BB9E62ED35C932C4D468F16690D065160014D965B2BC8597FC6C703666A7C5308E6E6E9
42,766,286 UART: [art] PUB.Y = 8433EEDF7A2FB1E425ADD6C4504AC410A94EEBDB700D929BC38FCD75B00A9556FE3D0D8F7F7DC282A3C43A5470910EB4
42,773,578 UART: [art] SIG.R = 8324042C831F1F5F92F467B0E3C54FA80F53CA36FA57FE3F094D337F757F4560293E20BF24DED8092802C3B47EB8E896
42,780,973 UART: [art] SIG.S = 3C8C897ED33C980E0FB89F6D1828BE5BD61EF0887990F2EAB0D61F5C813A2C4C9B7C1FF6CBFBD268C858BDDDFEBCC813
44,086,265 UART: Caliptra RT
44,086,982 UART: [state] CFI Enabled
44,500,282 UART: [rt] RT listening for mailbox commands...
44,502,868 UART:
44,503,123 UART: Running Caliptra ROM ...
44,504,229 UART:
44,504,390 UART: [state] CFI Enabled
44,575,561 UART: [state] LifecycleState = Unprovisioned
44,577,489 UART: [state] DebugLocked = No
44,578,823 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,583,132 UART: [kat] SHA2-256
44,752,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,763,340 UART: [kat] ++
44,763,879 UART: [kat] sha1
44,776,015 UART: [kat] SHA2-256
44,778,702 UART: [kat] SHA2-384
44,784,201 UART: [kat] SHA2-512-ACC
44,786,549 UART: [kat] ECC-384
47,075,222 UART: [kat] HMAC-384Kdf
47,106,686 UART: [kat] LMS
48,297,023 UART: [kat] --
48,300,428 UART: [update-reset] ++
52,491,040 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,494,464 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
52,892,224 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,788,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,948,319 >>> mbox cmd response: success
17,950,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,625,951 UART:
23,626,357 UART: Running Caliptra FMC ...
23,627,466 UART:
23,627,631 UART: [state] CFI Enabled
23,680,229 UART: [fht] FMC Alias Private Key: 7
26,020,476 UART: [art] Extend RT PCRs Done
26,021,724 UART: [art] Lock RT PCRs Done
26,023,083 UART: [art] Populate DV Done
26,028,348 UART: [fht] FMC Alias Private Key: 7
26,029,954 UART: [art] Derive CDI
26,030,778 UART: [art] Store in slot 0x4
26,088,294 UART: [art] Derive Key Pair
26,089,343 UART: [art] Store priv key in slot 0x5
29,381,966 UART: [art] Derive Key Pair - Done
29,394,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,684,576 UART: [art] Erasing AUTHORITY.KEYID = 7
31,686,090 UART: [art] PUB.X = 218B1CF9509DF5B40B73ADE28B2590EEA5DD8B308DF461C7747CA91E16600C1B2B316D7FE6650554BA5F059A8DF6AC63
31,693,374 UART: [art] PUB.Y = A09840CCA4EEDB0E255A23435DB846098FC46BA2A839CFD8619DA6CE578A723022FC92C15C52FB706C1578E830D31FED
31,700,603 UART: [art] SIG.R = D8BB02BF19DA6D0ECE49C3740392B348AE0A32E861D88AA73A24B69731153301087813B1966801D19FE8BD6858EFAB5A
31,707,962 UART: [art] SIG.S = E8BAE74F683E685A93B3A22EFF1AABF111B8280A732EDD79DF43C5AA6FC868638F58343808A55A8A95221ED6738BCB54
33,012,825 UART: Caliptra RT
33,013,546 UART: [state] CFI Enabled
33,189,993 UART: [rt] RT listening for mailbox commands...
36,908,067 >>> mbox cmd response: failed
36,909,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,059,024 UART:
37,059,345 UART: Running Caliptra FMC ...
37,060,475 UART:
37,060,646 UART: [state] CFI Enabled
37,061,576 UART: [art] Extend RT PCRs Done
37,062,722 UART: [art] Lock RT PCRs Done
37,063,798 UART: [art] Populate DV Done
37,064,833 UART: [fht] FMC Alias Private Key: 7
37,066,241 UART: [art] Derive CDI
37,066,990 UART: [art] Store in slot 0x4
37,095,125 UART: [art] Derive Key Pair
37,096,708 UART: [art] Store priv key in slot 0x5
40,389,471 UART: [art] Derive Key Pair - Done
40,402,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,690,289 UART: [art] Erasing AUTHORITY.KEYID = 7
42,691,808 UART: [art] PUB.X = 218B1CF9509DF5B40B73ADE28B2590EEA5DD8B308DF461C7747CA91E16600C1B2B316D7FE6650554BA5F059A8DF6AC63
42,699,098 UART: [art] PUB.Y = A09840CCA4EEDB0E255A23435DB846098FC46BA2A839CFD8619DA6CE578A723022FC92C15C52FB706C1578E830D31FED
42,706,312 UART: [art] SIG.R = D8BB02BF19DA6D0ECE49C3740392B348AE0A32E861D88AA73A24B69731153301087813B1966801D19FE8BD6858EFAB5A
42,713,728 UART: [art] SIG.S = E8BAE74F683E685A93B3A22EFF1AABF111B8280A732EDD79DF43C5AA6FC868638F58343808A55A8A95221ED6738BCB54
44,019,444 UART: Caliptra RT
44,020,166 UART: [state] CFI Enabled
44,437,089 UART: [rt] RT listening for mailbox commands...
53,114,360 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
192,592 UART:
193,094 UART: Running Caliptra ROM ...
194,225 UART:
603,726 UART: [state] CFI Enabled
619,400 UART: [state] LifecycleState = Unprovisioned
621,332 UART: [state] DebugLocked = No
623,152 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,658 UART: [kat] SHA2-256
797,407 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,956 UART: [kat] ++
808,456 UART: [kat] sha1
819,432 UART: [kat] SHA2-256
822,095 UART: [kat] SHA2-384
827,064 UART: [kat] SHA2-512-ACC
829,412 UART: [kat] ECC-384
3,112,187 UART: [kat] HMAC-384Kdf
3,123,287 UART: [kat] LMS
4,313,393 UART: [kat] --
4,317,288 UART: [cold-reset] ++
4,319,125 UART: [fht] Storing FHT @ 0x50003400
4,330,338 UART: [idev] ++
4,330,949 UART: [idev] CDI.KEYID = 6
4,331,873 UART: [idev] SUBJECT.KEYID = 7
4,333,099 UART: [idev] UDS.KEYID = 0
4,336,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,540 UART: [idev] Erasing UDS.KEYID = 0
7,620,264 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,815 UART: [idev] --
7,645,577 UART: [ldev] ++
7,646,153 UART: [ldev] CDI.KEYID = 6
7,647,093 UART: [ldev] SUBJECT.KEYID = 5
7,648,310 UART: [ldev] AUTHORITY.KEYID = 7
7,649,607 UART: [ldev] FE.KEYID = 1
7,659,640 UART: [ldev] Erasing FE.KEYID = 1
10,946,973 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,236 UART: [ldev] --
13,306,735 UART: [fwproc] Waiting for Commands...
13,310,134 UART: [fwproc] Received command 0x46574c44
13,312,349 UART: [fwproc] Received Image of size 118548 bytes
17,416,008 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,491,926 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,565,114 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,276 >>> mbox cmd response: success
17,895,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,043,955 UART: [afmc] ++
18,044,607 UART: [afmc] CDI.KEYID = 6
18,045,503 UART: [afmc] SUBJECT.KEYID = 7
18,046,562 UART: [afmc] AUTHORITY.KEYID = 5
21,214,042 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,507,998 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,314 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,524,713 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,539,427 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,553,832 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,574,812 UART: [afmc] --
23,579,113 UART: [cold-reset] --
23,584,172 UART: [state] Locking Datavault
23,591,800 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,511 UART: [state] Locking ICCM
23,596,178 UART: [exit] Launching FMC @ 0x40000130
23,604,571 UART:
23,604,810 UART: Running Caliptra FMC ...
23,605,839 UART:
23,605,990 UART: [state] CFI Enabled
23,614,244 UART: [fht] FMC Alias Private Key: 7
25,954,149 UART: [art] Extend RT PCRs Done
25,955,421 UART: [art] Lock RT PCRs Done
25,956,915 UART: [art] Populate DV Done
25,962,185 UART: [fht] FMC Alias Private Key: 7
25,963,727 UART: [art] Derive CDI
25,964,571 UART: [art] Store in slot 0x4
26,007,173 UART: [art] Derive Key Pair
26,008,182 UART: [art] Store priv key in slot 0x5
29,250,187 UART: [art] Derive Key Pair - Done
29,263,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,397 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,915 UART: [art] PUB.X = 7FB44A9BB5683A55728D7BA3BEAFD8217DFD4590E461E0E1931E98540DA7F16A8D3DC2F2FC4DAC6D24E485DAC08DD07A
31,552,173 UART: [art] PUB.Y = 60B56BD9311E7CD3575F9A2EA591D8B734E00E6FF6215AB402B5733ABC886BFECF99DB2046958ADEC1D5F054781E90A3
31,559,481 UART: [art] SIG.R = 6850699B4505069B3699CA1177308CB84F22445ECF10ECBA8EC2053E9BFFB7899A7722EB1CFAA8FE5A4FEE6E3DB7A15A
31,566,882 UART: [art] SIG.S = 606EDF7BDCD98244C6B0FD76E27FC8C90F0DCB36C420E221E43A9FF22923F831B9590633D702398D11AD5AA639773C0B
32,871,145 UART: Caliptra RT
32,871,864 UART: [state] CFI Enabled
33,006,659 UART: [rt] RT listening for mailbox commands...
33,009,739 UART:
33,010,002 UART: Running Caliptra ROM ...
33,011,123 UART:
33,011,364 UART: [state] CFI Enabled
33,022,234 UART: [state] LifecycleState = Unprovisioned
33,024,123 UART: [state] DebugLocked = No
33,025,456 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,030,411 UART: [kat] SHA2-256
33,200,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,210,643 UART: [kat] ++
33,211,146 UART: [kat] sha1
33,221,933 UART: [kat] SHA2-256
33,224,635 UART: [kat] SHA2-384
33,230,035 UART: [kat] SHA2-512-ACC
33,232,390 UART: [kat] ECC-384
35,516,527 UART: [kat] HMAC-384Kdf
35,528,537 UART: [kat] LMS
36,718,631 UART: [kat] --
36,722,591 UART: [update-reset] ++
36,823,637 >>> mbox cmd response: failed
36,825,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,974,821 UART: ROM Non-Fatal Error: 0x000B001D
36,976,256 UART: [state] Locking Datavault
36,977,414 UART: [state] Locking PCR0, PCR1 and PCR31
36,978,959 UART: [state] Locking ICCM
36,979,877 UART: [exit] Launching FMC @ 0x40000130
36,981,309 UART:
36,981,474 UART: Running Caliptra FMC ...
36,982,577 UART:
36,982,742 UART: [state] CFI Enabled
36,983,669 UART: [art] Extend RT PCRs Done
36,984,816 UART: [art] Lock RT PCRs Done
36,985,885 UART: [art] Populate DV Done
36,986,923 UART: [fht] FMC Alias Private Key: 7
36,988,248 UART: [art] Derive CDI
36,989,012 UART: [art] Store in slot 0x4
36,990,086 UART: [art] Derive Key Pair
36,991,037 UART: [art] Store priv key in slot 0x5
40,184,975 UART: [art] Derive Key Pair - Done
40,198,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,478,669 UART: [art] Erasing AUTHORITY.KEYID = 7
42,480,251 UART: [art] PUB.X = 7FB44A9BB5683A55728D7BA3BEAFD8217DFD4590E461E0E1931E98540DA7F16A8D3DC2F2FC4DAC6D24E485DAC08DD07A
42,487,469 UART: [art] PUB.Y = 60B56BD9311E7CD3575F9A2EA591D8B734E00E6FF6215AB402B5733ABC886BFECF99DB2046958ADEC1D5F054781E90A3
42,494,752 UART: [art] SIG.R = 6850699B4505069B3699CA1177308CB84F22445ECF10ECBA8EC2053E9BFFB7899A7722EB1CFAA8FE5A4FEE6E3DB7A15A
42,502,114 UART: [art] SIG.S = 606EDF7BDCD98244C6B0FD76E27FC8C90F0DCB36C420E221E43A9FF22923F831B9590633D702398D11AD5AA639773C0B
43,807,270 UART: Caliptra RT
43,807,995 UART: [state] CFI Enabled
44,180,930 UART: [rt] RT listening for mailbox commands...
44,183,841 UART:
44,184,102 UART: Running Caliptra ROM ...
44,185,215 UART:
44,185,508 UART: [state] CFI Enabled
44,201,237 UART: [state] LifecycleState = Unprovisioned
44,203,180 UART: [state] DebugLocked = No
44,205,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,209,945 UART: [kat] SHA2-256
44,379,656 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,390,155 UART: [kat] ++
44,390,697 UART: [kat] sha1
44,401,592 UART: [kat] SHA2-256
44,404,288 UART: [kat] SHA2-384
44,411,518 UART: [kat] SHA2-512-ACC
44,413,906 UART: [kat] ECC-384
46,699,012 UART: [kat] HMAC-384Kdf
46,710,648 UART: [kat] LMS
47,900,697 UART: [kat] --
47,905,420 UART: [update-reset] ++
52,088,921 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,092,979 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
52,490,733 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,451 writing to cptra_bootfsm_go
4,128,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,552 >>> mbox cmd response: success
18,161,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,802,764 UART:
23,803,215 UART: Running Caliptra FMC ...
23,804,378 UART:
23,804,574 UART: [state] CFI Enabled
23,812,676 UART: [fht] FMC Alias Private Key: 7
26,152,867 UART: [art] Extend RT PCRs Done
26,154,182 UART: [art] Lock RT PCRs Done
26,156,009 UART: [art] Populate DV Done
26,161,560 UART: [fht] FMC Alias Private Key: 7
26,163,109 UART: [art] Derive CDI
26,163,938 UART: [art] Store in slot 0x4
26,206,490 UART: [art] Derive Key Pair
26,207,501 UART: [art] Store priv key in slot 0x5
29,449,606 UART: [art] Derive Key Pair - Done
29,462,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,531 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,053 UART: [art] PUB.X = C1958D6F43B371EE04CEC3FD0F6932374E6E5AC82B3167D2F84CD8EEE049E8DD4B24AD6E7DC9BE2C6B33C45D43E60740
31,751,319 UART: [art] PUB.Y = 2F96112836D1860A17F2024AAB3193F06CE35A1C895B88D9218487636147349E597A26ED949894816951924F4C769A83
31,758,539 UART: [art] SIG.R = A95825861512A501DCC329219341286E3B3F15FC56E3117FC970A269E8B0DB91C1614EF611B6537B06AD37956B4D9D94
31,765,901 UART: [art] SIG.S = 5DE0AF1283A590E2DD6F73E81CB379AE61F02F9AC552EA9BF6A508182FD3368FACA2F377536A87BBED307193F7D4A415
33,070,419 UART: Caliptra RT
33,071,127 UART: [state] CFI Enabled
33,204,193 UART: [rt] RT listening for mailbox commands...
36,835,135 >>> mbox cmd response: failed
36,837,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,986,049 UART:
36,986,375 UART: Running Caliptra FMC ...
36,987,428 UART:
36,987,582 UART: [state] CFI Enabled
36,988,515 UART: [art] Extend RT PCRs Done
36,989,616 UART: [art] Lock RT PCRs Done
36,990,625 UART: [art] Populate DV Done
36,991,600 UART: [fht] FMC Alias Private Key: 7
36,992,997 UART: [art] Derive CDI
36,993,739 UART: [art] Store in slot 0x4
36,994,743 UART: [art] Derive Key Pair
36,995,747 UART: [art] Store priv key in slot 0x5
40,188,853 UART: [art] Derive Key Pair - Done
40,201,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,481,849 UART: [art] Erasing AUTHORITY.KEYID = 7
42,483,378 UART: [art] PUB.X = C1958D6F43B371EE04CEC3FD0F6932374E6E5AC82B3167D2F84CD8EEE049E8DD4B24AD6E7DC9BE2C6B33C45D43E60740
42,490,632 UART: [art] PUB.Y = 2F96112836D1860A17F2024AAB3193F06CE35A1C895B88D9218487636147349E597A26ED949894816951924F4C769A83
42,497,865 UART: [art] SIG.R = A95825861512A501DCC329219341286E3B3F15FC56E3117FC970A269E8B0DB91C1614EF611B6537B06AD37956B4D9D94
42,505,196 UART: [art] SIG.S = 5DE0AF1283A590E2DD6F73E81CB379AE61F02F9AC552EA9BF6A508182FD3368FACA2F377536A87BBED307193F7D4A415
43,810,716 UART: Caliptra RT
43,811,435 UART: [state] CFI Enabled
44,184,700 UART: [rt] RT listening for mailbox commands...
52,798,288 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,821 writing to cptra_bootfsm_go
193,046 UART:
193,409 UART: Running Caliptra ROM ...
194,595 UART:
194,754 UART: [state] CFI Enabled
263,921 UART: [state] LifecycleState = Unprovisioned
265,883 UART: [state] DebugLocked = No
268,043 UART: [state] WD Timer not started. Device not locked for debugging
271,340 UART: [kat] SHA2-256
451,016 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,774 UART: [kat] ++
462,382 UART: [kat] sha1
473,058 UART: [kat] SHA2-256
475,755 UART: [kat] SHA2-384
480,924 UART: [kat] SHA2-512-ACC
483,305 UART: [kat] ECC-384
2,943,584 UART: [kat] HMAC-384Kdf
2,968,002 UART: [kat] LMS
3,444,500 UART: [kat] --
3,449,749 UART: [cold-reset] ++
3,450,663 UART: [fht] FHT @ 0x50003400
3,462,589 UART: [idev] ++
3,463,153 UART: [idev] CDI.KEYID = 6
3,464,096 UART: [idev] SUBJECT.KEYID = 7
3,465,368 UART: [idev] UDS.KEYID = 0
3,468,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,865 UART: [idev] Erasing UDS.KEYID = 0
5,985,838 UART: [idev] Sha1 KeyId Algorithm
6,008,810 UART: [idev] --
6,013,981 UART: [ldev] ++
6,014,570 UART: [ldev] CDI.KEYID = 6
6,015,460 UART: [ldev] SUBJECT.KEYID = 5
6,016,680 UART: [ldev] AUTHORITY.KEYID = 7
6,017,874 UART: [ldev] FE.KEYID = 1
6,055,115 UART: [ldev] Erasing FE.KEYID = 1
8,563,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,507 UART: [ldev] --
10,371,805 UART: [fwproc] Wait for Commands...
10,373,642 UART: [fwproc] Recv command 0x46574c44
10,375,643 UART: [fwproc] Recv'd Img size: 118548 bytes
13,853,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,929,719 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,002,736 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,330,679 >>> mbox cmd response: success
14,332,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,481,850 UART: [afmc] ++
14,482,662 UART: [afmc] CDI.KEYID = 6
14,483,673 UART: [afmc] SUBJECT.KEYID = 7
14,484,789 UART: [afmc] AUTHORITY.KEYID = 5
16,870,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,493 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,614,289 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,630,310 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,645,911 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,670,815 UART: [afmc] --
18,674,149 UART: [cold-reset] --
18,678,609 UART: [state] Locking Datavault
18,683,592 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,349 UART: [state] Locking ICCM
18,687,188 UART: [exit] Launching FMC @ 0x40000130
18,695,594 UART:
18,695,839 UART: Running Caliptra FMC ...
18,696,947 UART:
18,697,108 UART: [state] CFI Enabled
18,753,285 UART: [fht] FMC Alias Private Key: 7
20,519,726 UART: [art] Extend RT PCRs Done
20,520,924 UART: [art] Lock RT PCRs Done
20,522,284 UART: [art] Populate DV Done
20,527,878 UART: [fht] FMC Alias Private Key: 7
20,529,586 UART: [art] Derive CDI
20,530,407 UART: [art] Store in slot 0x4
20,585,804 UART: [art] Derive Key Pair
20,586,847 UART: [art] Store priv key in slot 0x5
23,049,850 UART: [art] Derive Key Pair - Done
23,062,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,321 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,817 UART: [art] PUB.X = 56CF6657ACCAD3B46C4ED329CABE30AF23688600F87C9631C5F3D0BB7C6D515D275B1BD11831F03BAA357990763719BD
24,785,075 UART: [art] PUB.Y = 37843748124BC7744F24A9E30979ABE5B73853DD6646EC5B984D0CA24B89A278D0893010895D936FCA7832F7EA90EE84
24,792,369 UART: [art] SIG.R = 376B59C759D9C93D25E4F30B66A56C24C6B90C9D77AE7E7595F6F24490536D0AAEB1A0BFF950DA9ACB8D543A46BC2913
24,799,773 UART: [art] SIG.S = 18911A0F6B7898C4843AD129B9B938820C77C9AA76EF48641F61A87A8854A9E278AD53774680596EF7BE9452A19446C3
25,778,775 UART: Caliptra RT
25,779,481 UART: [state] CFI Enabled
25,960,573 UART: [rt] RT listening for mailbox commands...
25,963,854 UART:
25,964,125 UART: Running Caliptra ROM ...
25,965,238 UART:
25,965,398 UART: [state] CFI Enabled
26,033,957 UART: [state] LifecycleState = Unprovisioned
26,035,883 UART: [state] DebugLocked = No
26,038,682 UART: [state] WD Timer not started. Device not locked for debugging
26,042,321 UART: [kat] SHA2-256
26,221,997 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,232,761 UART: [kat] ++
26,233,304 UART: [kat] sha1
26,245,815 UART: [kat] SHA2-256
26,248,548 UART: [kat] SHA2-384
26,254,494 UART: [kat] SHA2-512-ACC
26,256,853 UART: [kat] ECC-384
28,717,223 UART: [kat] HMAC-384Kdf
28,733,540 UART: [kat] LMS
29,209,975 UART: [kat] --
29,214,788 UART: [update-reset] ++
29,254,800 >>> mbox cmd response: failed
29,256,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,405,845 UART: ROM Non-Fatal Error: 0x000B001D
29,407,284 UART: [state] Locking Datavault
29,408,442 UART: [state] Locking PCR0, PCR1 and PCR31
29,409,987 UART: [state] Locking ICCM
29,410,899 UART: [exit] Launching FMC @ 0x40000130
29,412,328 UART:
29,412,487 UART: Running Caliptra FMC ...
29,413,590 UART:
29,413,751 UART: [state] CFI Enabled
29,414,671 UART: [art] Extend RT PCRs Done
29,415,813 UART: [art] Lock RT PCRs Done
29,416,882 UART: [art] Populate DV Done
29,417,933 UART: [fht] FMC Alias Private Key: 7
29,419,260 UART: [art] Derive CDI
29,419,999 UART: [art] Store in slot 0x4
29,434,028 UART: [art] Derive Key Pair
29,435,037 UART: [art] Store priv key in slot 0x5
31,897,626 UART: [art] Derive Key Pair - Done
31,910,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,623,381 UART: [art] Erasing AUTHORITY.KEYID = 7
33,624,893 UART: [art] PUB.X = 56CF6657ACCAD3B46C4ED329CABE30AF23688600F87C9631C5F3D0BB7C6D515D275B1BD11831F03BAA357990763719BD
33,632,202 UART: [art] PUB.Y = 37843748124BC7744F24A9E30979ABE5B73853DD6646EC5B984D0CA24B89A278D0893010895D936FCA7832F7EA90EE84
33,639,448 UART: [art] SIG.R = 376B59C759D9C93D25E4F30B66A56C24C6B90C9D77AE7E7595F6F24490536D0AAEB1A0BFF950DA9ACB8D543A46BC2913
33,646,852 UART: [art] SIG.S = 18911A0F6B7898C4843AD129B9B938820C77C9AA76EF48641F61A87A8854A9E278AD53774680596EF7BE9452A19446C3
34,625,432 UART: Caliptra RT
34,626,143 UART: [state] CFI Enabled
35,045,704 UART: [rt] RT listening for mailbox commands...
35,048,587 UART:
35,048,863 UART: Running Caliptra ROM ...
35,049,929 UART:
35,050,086 UART: [state] CFI Enabled
35,117,877 UART: [state] LifecycleState = Unprovisioned
35,119,825 UART: [state] DebugLocked = No
35,121,093 UART: [state] WD Timer not started. Device not locked for debugging
35,125,481 UART: [kat] SHA2-256
35,305,161 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
35,315,951 UART: [kat] ++
35,316,495 UART: [kat] sha1
35,325,831 UART: [kat] SHA2-256
35,328,477 UART: [kat] SHA2-384
35,333,609 UART: [kat] SHA2-512-ACC
35,335,962 UART: [kat] ECC-384
37,800,290 UART: [kat] HMAC-384Kdf
37,814,741 UART: [kat] LMS
38,291,175 UART: [kat] --
38,296,902 UART: [update-reset] ++
41,785,756 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
41,788,439 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
42,186,054 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,462,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,211,422 >>> mbox cmd response: success
14,213,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,490,621 UART:
18,491,035 UART: Running Caliptra FMC ...
18,492,188 UART:
18,492,353 UART: [state] CFI Enabled
18,559,076 UART: [fht] FMC Alias Private Key: 7
20,325,588 UART: [art] Extend RT PCRs Done
20,326,831 UART: [art] Lock RT PCRs Done
20,328,632 UART: [art] Populate DV Done
20,333,992 UART: [fht] FMC Alias Private Key: 7
20,335,495 UART: [art] Derive CDI
20,336,263 UART: [art] Store in slot 0x4
20,392,094 UART: [art] Derive Key Pair
20,393,144 UART: [art] Store priv key in slot 0x5
22,855,739 UART: [art] Derive Key Pair - Done
22,868,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,581,774 UART: [art] Erasing AUTHORITY.KEYID = 7
24,583,288 UART: [art] PUB.X = 8F73C78981A7229849E54F38125F09591923737C7AC79D2A28A687767E434E8E07924D7B1467529116B9943B25308D10
24,590,558 UART: [art] PUB.Y = 07DA40C8C310684589373B3B6289C2CB91D2570E0325E731646FC295E187A6B7D4D5C90748C1DFBC625F60A22456B14D
24,597,761 UART: [art] SIG.R = 61BE5F9724377CAB60A4FA3B580BB7A7EA49808EA523B4FA6F191F74195E480F291B5FC2E12FC6A41FE5686A75FC8F0F
24,605,162 UART: [art] SIG.S = AD8560130855B7375CE08EEE18CFC1720611846FEDF2F3CEA7FCD0F4F4027B06C32BE4F620F0FE5404EA2940C7E8266C
25,583,963 UART: Caliptra RT
25,584,659 UART: [state] CFI Enabled
25,766,602 UART: [rt] RT listening for mailbox commands...
29,064,596 >>> mbox cmd response: failed
29,066,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,215,357 UART:
29,215,668 UART: Running Caliptra FMC ...
29,216,796 UART:
29,216,966 UART: [state] CFI Enabled
29,217,890 UART: [art] Extend RT PCRs Done
29,219,033 UART: [art] Lock RT PCRs Done
29,220,111 UART: [art] Populate DV Done
29,221,093 UART: [fht] FMC Alias Private Key: 7
29,222,489 UART: [art] Derive CDI
29,223,238 UART: [art] Store in slot 0x4
29,246,309 UART: [art] Derive Key Pair
29,247,333 UART: [art] Store priv key in slot 0x5
31,710,256 UART: [art] Derive Key Pair - Done
31,723,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,436,445 UART: [art] Erasing AUTHORITY.KEYID = 7
33,437,960 UART: [art] PUB.X = 8F73C78981A7229849E54F38125F09591923737C7AC79D2A28A687767E434E8E07924D7B1467529116B9943B25308D10
33,445,141 UART: [art] PUB.Y = 07DA40C8C310684589373B3B6289C2CB91D2570E0325E731646FC295E187A6B7D4D5C90748C1DFBC625F60A22456B14D
33,452,408 UART: [art] SIG.R = 61BE5F9724377CAB60A4FA3B580BB7A7EA49808EA523B4FA6F191F74195E480F291B5FC2E12FC6A41FE5686A75FC8F0F
33,459,797 UART: [art] SIG.S = AD8560130855B7375CE08EEE18CFC1720611846FEDF2F3CEA7FCD0F4F4027B06C32BE4F620F0FE5404EA2940C7E8266C
34,438,809 UART: Caliptra RT
34,439,503 UART: [state] CFI Enabled
34,862,250 UART: [rt] RT listening for mailbox commands...
42,027,774 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,526 writing to cptra_bootfsm_go
192,652 UART:
193,016 UART: Running Caliptra ROM ...
194,153 UART:
604,024 UART: [state] CFI Enabled
619,417 UART: [state] LifecycleState = Unprovisioned
621,331 UART: [state] DebugLocked = No
623,387 UART: [state] WD Timer not started. Device not locked for debugging
627,432 UART: [kat] SHA2-256
807,046 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,835 UART: [kat] ++
818,290 UART: [kat] sha1
829,332 UART: [kat] SHA2-256
832,077 UART: [kat] SHA2-384
838,872 UART: [kat] SHA2-512-ACC
841,236 UART: [kat] ECC-384
3,287,126 UART: [kat] HMAC-384Kdf
3,298,190 UART: [kat] LMS
3,774,680 UART: [kat] --
3,779,062 UART: [cold-reset] ++
3,780,362 UART: [fht] FHT @ 0x50003400
3,792,612 UART: [idev] ++
3,793,179 UART: [idev] CDI.KEYID = 6
3,794,125 UART: [idev] SUBJECT.KEYID = 7
3,795,397 UART: [idev] UDS.KEYID = 0
3,798,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,831 UART: [idev] Erasing UDS.KEYID = 0
6,270,514 UART: [idev] Sha1 KeyId Algorithm
6,294,820 UART: [idev] --
6,300,309 UART: [ldev] ++
6,300,949 UART: [ldev] CDI.KEYID = 6
6,301,858 UART: [ldev] SUBJECT.KEYID = 5
6,303,023 UART: [ldev] AUTHORITY.KEYID = 7
6,304,323 UART: [ldev] FE.KEYID = 1
6,316,778 UART: [ldev] Erasing FE.KEYID = 1
8,793,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,354 UART: [ldev] --
10,585,670 UART: [fwproc] Wait for Commands...
10,587,765 UART: [fwproc] Recv command 0x46574c44
10,589,808 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,326 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,342 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,757 >>> mbox cmd response: success
14,555,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,704,359 UART: [afmc] ++
14,705,005 UART: [afmc] CDI.KEYID = 6
14,705,907 UART: [afmc] SUBJECT.KEYID = 7
14,707,018 UART: [afmc] AUTHORITY.KEYID = 5
17,064,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,798 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,583 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,682 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,239 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,419 UART: [afmc] --
18,864,217 UART: [cold-reset] --
18,866,904 UART: [state] Locking Datavault
18,870,322 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,040 UART: [state] Locking ICCM
18,873,165 UART: [exit] Launching FMC @ 0x40000130
18,881,565 UART:
18,881,813 UART: Running Caliptra FMC ...
18,882,920 UART:
18,883,087 UART: [state] CFI Enabled
18,890,926 UART: [fht] FMC Alias Private Key: 7
20,657,040 UART: [art] Extend RT PCRs Done
20,658,263 UART: [art] Lock RT PCRs Done
20,660,027 UART: [art] Populate DV Done
20,665,196 UART: [fht] FMC Alias Private Key: 7
20,666,688 UART: [art] Derive CDI
20,667,454 UART: [art] Store in slot 0x4
20,710,047 UART: [art] Derive Key Pair
20,711,093 UART: [art] Store priv key in slot 0x5
23,137,871 UART: [art] Derive Key Pair - Done
23,150,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,015 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,530 UART: [art] PUB.X = 7D6956B96CA18A61547520472AA9DD23261951FFAEC3C5701118BEA7E2F57309AC94DB8DEAEF87A11605C27E7C03E022
24,865,791 UART: [art] PUB.Y = D0F052333B56E7BEBBE39E477EBC2E50F55B8AA76E4A2E1A60B068933F6B771932640CAE05B7C28BCF9589D5BB9332A4
24,873,033 UART: [art] SIG.R = F3245AC368B011D83B60544CB393732CB569A748B9B7297EB2145375BA50F420D8817B869AB0795B664ECAAE21A5ABDA
24,880,447 UART: [art] SIG.S = FDABB06D0D18B4C09B79D022D57097B9777716E4085406F2D4989DEEFD107AA3A4EA12A2CF939230E74AF31C720D7F74
25,859,811 UART: Caliptra RT
25,860,515 UART: [state] CFI Enabled
25,993,367 UART: [rt] RT listening for mailbox commands...
25,996,113 UART:
25,996,369 UART: Running Caliptra ROM ...
25,997,479 UART:
25,997,755 UART: [state] CFI Enabled
26,010,294 UART: [state] LifecycleState = Unprovisioned
26,012,245 UART: [state] DebugLocked = No
26,013,576 UART: [state] WD Timer not started. Device not locked for debugging
26,017,442 UART: [kat] SHA2-256
26,197,167 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,207,937 UART: [kat] ++
26,208,479 UART: [kat] sha1
26,219,097 UART: [kat] SHA2-256
26,221,782 UART: [kat] SHA2-384
26,227,833 UART: [kat] SHA2-512-ACC
26,230,184 UART: [kat] ECC-384
28,671,866 UART: [kat] HMAC-384Kdf
28,684,537 UART: [kat] LMS
29,160,998 UART: [kat] --
29,167,793 UART: [update-reset] ++
29,206,494 >>> mbox cmd response: failed
29,208,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,357,665 UART: ROM Non-Fatal Error: 0x000B001D
29,359,101 UART: [state] Locking Datavault
29,360,283 UART: [state] Locking PCR0, PCR1 and PCR31
29,361,830 UART: [state] Locking ICCM
29,362,742 UART: [exit] Launching FMC @ 0x40000130
29,364,170 UART:
29,364,335 UART: Running Caliptra FMC ...
29,365,437 UART:
29,365,595 UART: [state] CFI Enabled
29,366,517 UART: [art] Extend RT PCRs Done
29,367,661 UART: [art] Lock RT PCRs Done
29,368,732 UART: [art] Populate DV Done
29,369,766 UART: [fht] FMC Alias Private Key: 7
29,371,088 UART: [art] Derive CDI
29,371,830 UART: [art] Store in slot 0x4
29,372,893 UART: [art] Derive Key Pair
29,373,891 UART: [art] Store priv key in slot 0x5
31,755,561 UART: [art] Derive Key Pair - Done
31,768,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,474,500 UART: [art] Erasing AUTHORITY.KEYID = 7
33,475,997 UART: [art] PUB.X = 7D6956B96CA18A61547520472AA9DD23261951FFAEC3C5701118BEA7E2F57309AC94DB8DEAEF87A11605C27E7C03E022
33,483,283 UART: [art] PUB.Y = D0F052333B56E7BEBBE39E477EBC2E50F55B8AA76E4A2E1A60B068933F6B771932640CAE05B7C28BCF9589D5BB9332A4
33,490,588 UART: [art] SIG.R = F3245AC368B011D83B60544CB393732CB569A748B9B7297EB2145375BA50F420D8817B869AB0795B664ECAAE21A5ABDA
33,497,975 UART: [art] SIG.S = FDABB06D0D18B4C09B79D022D57097B9777716E4085406F2D4989DEEFD107AA3A4EA12A2CF939230E74AF31C720D7F74
34,476,517 UART: Caliptra RT
34,477,229 UART: [state] CFI Enabled
34,854,105 UART: [rt] RT listening for mailbox commands...
34,856,963 UART:
34,857,216 UART: Running Caliptra ROM ...
34,858,328 UART:
34,858,548 UART: [state] CFI Enabled
40,316,459 UART: [state] LifecycleState = Unprovisioned
40,318,432 UART: [state] DebugLocked = No
40,320,263 UART: [state] WD Timer not started. Device not locked for debugging
40,324,950 UART: [kat] SHA2-256
40,504,684 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
40,515,468 UART: [kat] ++
40,515,949 UART: [kat] sha1
40,526,942 UART: [kat] SHA2-256
40,529,640 UART: [kat] SHA2-384
40,535,838 UART: [kat] SHA2-512-ACC
40,538,224 UART: [kat] ECC-384
42,978,064 UART: [kat] HMAC-384Kdf
42,989,910 UART: [kat] LMS
43,466,386 UART: [kat] --
43,471,251 UART: [update-reset] ++
46,963,220 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,965,892 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,363,515 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,782,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,024 >>> mbox cmd response: success
14,453,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,698,009 UART:
18,698,858 UART: Running Caliptra FMC ...
18,700,033 UART:
18,700,196 UART: [state] CFI Enabled
18,707,218 UART: [fht] FMC Alias Private Key: 7
20,473,198 UART: [art] Extend RT PCRs Done
20,474,431 UART: [art] Lock RT PCRs Done
20,475,885 UART: [art] Populate DV Done
20,481,084 UART: [fht] FMC Alias Private Key: 7
20,482,794 UART: [art] Derive CDI
20,483,531 UART: [art] Store in slot 0x4
20,526,011 UART: [art] Derive Key Pair
20,527,033 UART: [art] Store priv key in slot 0x5
22,954,329 UART: [art] Derive Key Pair - Done
22,967,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,975 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,474 UART: [art] PUB.X = 4C6D14B019D8958C2396774312FB24AC02D1446778CF9572A126A4FD57A257DBAA558677CE62999DF3469B960BB8CF81
24,682,740 UART: [art] PUB.Y = 31EC167A88F9A47B889335229B7B32F5831C8DF76254367509E130DD9EE51A0566F28169A0677C0081D81FFFC541D255
24,689,918 UART: [art] SIG.R = CA147E029B7D7B95135AA2692C12C342AB1C479D4B1BE6F98ACF21F2C96016F4908EB5CCEB590A970E6C05CC10333F7F
24,697,321 UART: [art] SIG.S = B33AE6555109535D765640280022C8538C788B0B129F90C4ED6949EC38EAD6694069811B061A5897E10E6853B6064187
25,676,301 UART: Caliptra RT
25,677,020 UART: [state] CFI Enabled
25,810,088 UART: [rt] RT listening for mailbox commands...
29,019,835 >>> mbox cmd response: failed
29,021,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,170,767 UART:
29,171,094 UART: Running Caliptra FMC ...
29,172,226 UART:
29,172,393 UART: [state] CFI Enabled
29,173,324 UART: [art] Extend RT PCRs Done
29,174,469 UART: [art] Lock RT PCRs Done
29,175,540 UART: [art] Populate DV Done
29,176,571 UART: [fht] FMC Alias Private Key: 7
29,177,958 UART: [art] Derive CDI
29,178,722 UART: [art] Store in slot 0x4
29,179,792 UART: [art] Derive Key Pair
29,180,791 UART: [art] Store priv key in slot 0x5
31,559,304 UART: [art] Derive Key Pair - Done
31,572,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,279,125 UART: [art] Erasing AUTHORITY.KEYID = 7
33,280,650 UART: [art] PUB.X = 4C6D14B019D8958C2396774312FB24AC02D1446778CF9572A126A4FD57A257DBAA558677CE62999DF3469B960BB8CF81
33,287,922 UART: [art] PUB.Y = 31EC167A88F9A47B889335229B7B32F5831C8DF76254367509E130DD9EE51A0566F28169A0677C0081D81FFFC541D255
33,295,117 UART: [art] SIG.R = CA147E029B7D7B95135AA2692C12C342AB1C479D4B1BE6F98ACF21F2C96016F4908EB5CCEB590A970E6C05CC10333F7F
33,302,523 UART: [art] SIG.S = B33AE6555109535D765640280022C8538C788B0B129F90C4ED6949EC38EAD6694069811B061A5897E10E6853B6064187
34,281,335 UART: Caliptra RT
34,282,050 UART: [state] CFI Enabled
34,656,514 UART: [rt] RT listening for mailbox commands...
47,388,815 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,244 UART:
192,602 UART: Running Caliptra ROM ...
193,702 UART:
193,846 UART: [state] CFI Enabled
260,702 UART: [state] LifecycleState = Unprovisioned
263,113 UART: [state] DebugLocked = No
265,120 UART: [state] WD Timer not started. Device not locked for debugging
269,824 UART: [kat] SHA2-256
459,673 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,441 UART: [kat] ++
470,949 UART: [kat] sha1
484,209 UART: [kat] SHA2-256
487,232 UART: [kat] SHA2-384
493,386 UART: [kat] SHA2-512-ACC
496,008 UART: [kat] ECC-384
2,945,145 UART: [kat] HMAC-384Kdf
2,966,480 UART: [kat] LMS
3,498,239 UART: [kat] --
3,503,744 UART: [cold-reset] ++
3,505,492 UART: [fht] FHT @ 0x50003400
3,517,187 UART: [idev] ++
3,517,876 UART: [idev] CDI.KEYID = 6
3,518,820 UART: [idev] SUBJECT.KEYID = 7
3,520,036 UART: [idev] UDS.KEYID = 0
3,523,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,216 UART: [idev] Erasing UDS.KEYID = 0
6,042,680 UART: [idev] Sha1 KeyId Algorithm
6,063,770 UART: [idev] --
6,069,442 UART: [ldev] ++
6,070,143 UART: [ldev] CDI.KEYID = 6
6,071,075 UART: [ldev] SUBJECT.KEYID = 5
6,072,135 UART: [ldev] AUTHORITY.KEYID = 7
6,073,433 UART: [ldev] FE.KEYID = 1
6,116,982 UART: [ldev] Erasing FE.KEYID = 1
8,619,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,358,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,373,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,388,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,404,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,424,821 UART: [ldev] --
10,429,786 UART: [fwproc] Wait for Commands...
10,432,534 UART: [fwproc] Recv command 0x46574c44
10,434,858 UART: [fwproc] Recv'd Img size: 118548 bytes
13,934,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,018,009 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,141,637 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,701,222 >>> mbox cmd response: success
14,703,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,852,290 UART: [afmc] ++
14,852,936 UART: [afmc] CDI.KEYID = 6
14,853,835 UART: [afmc] SUBJECT.KEYID = 7
14,854,890 UART: [afmc] AUTHORITY.KEYID = 5
17,251,514 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,975,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,977,140 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,992,211 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,007,386 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,022,527 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,045,367 UART: [afmc] --
19,048,111 UART: [cold-reset] --
19,051,657 UART: [state] Locking Datavault
19,057,193 UART: [state] Locking PCR0, PCR1 and PCR31
19,059,385 UART: [state] Locking ICCM
19,061,543 UART: [exit] Launching FMC @ 0x40000130
19,070,218 UART:
19,070,457 UART: Running Caliptra FMC ...
19,071,562 UART:
19,071,730 UART: [state] CFI Enabled
19,131,634 UART: [fht] FMC Alias Private Key: 7
20,897,975 UART: [art] Extend RT PCRs Done
20,899,213 UART: [art] Lock RT PCRs Done
20,900,956 UART: [art] Populate DV Done
20,906,506 UART: [fht] FMC Alias Private Key: 7
20,907,997 UART: [art] Derive CDI
20,908,762 UART: [art] Store in slot 0x4
20,963,731 UART: [art] Derive Key Pair
20,964,774 UART: [art] Store priv key in slot 0x5
23,428,169 UART: [art] Derive Key Pair - Done
23,441,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,153,688 UART: [art] Erasing AUTHORITY.KEYID = 7
25,155,198 UART: [art] PUB.X = BFADBA26910D81CCB479974480813E997A134D406AF4B31F1212FEBB314732CBC658FF23FD67A3F16D10F6634BC18E69
25,162,433 UART: [art] PUB.Y = 7E5D174E5662845D7242A6841729E564D817E74C3B7467EA198165639AAF50D4AD505E2C3BA32A4D5BAF4CDD1368844B
25,169,693 UART: [art] SIG.R = 75321456E4148F965C45FDE85E4396774007E3305B793B5E7262795C971705D6F200D4BE5CA378BA1735DC1A1D3A0AF7
25,177,004 UART: [art] SIG.S = FAB461DE870FA7069FC737A5ED7E18B9459ED31FD49888286A3DE55F3589D9B1EE87B28FD10432A287A3C8845CB696EA
26,156,030 UART: Caliptra RT
26,156,733 UART: [state] CFI Enabled
26,337,589 UART: [rt] RT listening for mailbox commands...
26,340,601 UART:
26,340,871 UART: Running Caliptra ROM ...
26,341,906 UART:
26,342,059 UART: [state] CFI Enabled
26,408,439 UART: [state] LifecycleState = Unprovisioned
26,410,476 UART: [state] DebugLocked = No
26,411,786 UART: [state] WD Timer not started. Device not locked for debugging
26,417,098 UART: [kat] SHA2-256
26,606,925 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,617,716 UART: [kat] ++
26,618,173 UART: [kat] sha1
26,629,330 UART: [kat] SHA2-256
26,632,336 UART: [kat] SHA2-384
26,638,339 UART: [kat] SHA2-512-ACC
26,640,909 UART: [kat] ECC-384
29,092,485 UART: [kat] HMAC-384Kdf
29,118,050 UART: [kat] LMS
29,649,637 UART: [kat] --
29,652,873 UART: [update-reset] ++
29,709,028 >>> mbox cmd response: failed
29,711,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,860,970 UART: ROM Non-Fatal Error: 0x000B001D
29,862,414 UART: [state] Locking Datavault
29,863,578 UART: [state] Locking PCR0, PCR1 and PCR31
29,865,123 UART: [state] Locking ICCM
29,866,035 UART: [exit] Launching FMC @ 0x40000130
29,867,466 UART:
29,867,631 UART: Running Caliptra FMC ...
29,868,731 UART:
29,868,892 UART: [state] CFI Enabled
29,869,811 UART: [art] Extend RT PCRs Done
29,870,952 UART: [art] Lock RT PCRs Done
29,872,023 UART: [art] Populate DV Done
29,873,084 UART: [fht] FMC Alias Private Key: 7
29,874,411 UART: [art] Derive CDI
29,875,152 UART: [art] Store in slot 0x4
29,903,501 UART: [art] Derive Key Pair
29,904,542 UART: [art] Store priv key in slot 0x5
32,367,409 UART: [art] Derive Key Pair - Done
32,380,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,092,911 UART: [art] Erasing AUTHORITY.KEYID = 7
34,094,434 UART: [art] PUB.X = BFADBA26910D81CCB479974480813E997A134D406AF4B31F1212FEBB314732CBC658FF23FD67A3F16D10F6634BC18E69
34,101,715 UART: [art] PUB.Y = 7E5D174E5662845D7242A6841729E564D817E74C3B7467EA198165639AAF50D4AD505E2C3BA32A4D5BAF4CDD1368844B
34,108,920 UART: [art] SIG.R = 75321456E4148F965C45FDE85E4396774007E3305B793B5E7262795C971705D6F200D4BE5CA378BA1735DC1A1D3A0AF7
34,116,292 UART: [art] SIG.S = FAB461DE870FA7069FC737A5ED7E18B9459ED31FD49888286A3DE55F3589D9B1EE87B28FD10432A287A3C8845CB696EA
35,095,032 UART: Caliptra RT
35,095,736 UART: [state] CFI Enabled
35,522,089 UART: [rt] RT listening for mailbox commands...
35,524,696 UART:
35,524,884 UART: Running Caliptra ROM ...
35,525,999 UART:
35,526,161 UART: [state] CFI Enabled
35,583,215 UART: [state] LifecycleState = Unprovisioned
35,585,315 UART: [state] DebugLocked = No
35,586,947 UART: [state] WD Timer not started. Device not locked for debugging
35,591,182 UART: [kat] SHA2-256
35,781,015 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,791,811 UART: [kat] ++
35,792,357 UART: [kat] sha1
35,802,982 UART: [kat] SHA2-256
35,805,991 UART: [kat] SHA2-384
35,811,927 UART: [kat] SHA2-512-ACC
35,814,507 UART: [kat] ECC-384
38,269,376 UART: [kat] HMAC-384Kdf
38,292,530 UART: [kat] LMS
38,824,101 UART: [kat] --
38,829,812 UART: [update-reset] ++
42,339,507 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,343,486 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
42,973,282 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,419,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,804,667 >>> mbox cmd response: success
14,806,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,090,685 UART:
19,091,104 UART: Running Caliptra FMC ...
19,092,236 UART:
19,092,398 UART: [state] CFI Enabled
19,156,708 UART: [fht] FMC Alias Private Key: 7
20,943,637 UART: [art] Extend RT PCRs Done
20,944,856 UART: [art] Lock RT PCRs Done
20,946,527 UART: [art] Populate DV Done
20,951,988 UART: [fht] FMC Alias Private Key: 7
20,953,638 UART: [art] Derive CDI
20,954,380 UART: [art] Store in slot 0x4
21,010,381 UART: [art] Derive Key Pair
21,011,428 UART: [art] Store priv key in slot 0x5
23,475,682 UART: [art] Derive Key Pair - Done
23,488,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,567 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,077 UART: [art] PUB.X = 393AE378F56799AEBE2420EFE43F77BF1A0B8308694DE9552B8D042ADFBD30ADFA41F0CC0C494A2B5630F4651E13D912
25,211,340 UART: [art] PUB.Y = 701CEC486798699E56F828B03EEF1C79022FE39E16E8530DC3BD6FAD61902B87B9FC0C44D8F28394C4C752C73A7360CD
25,218,605 UART: [art] SIG.R = B8545C324535AAB9A865EE2F46151F19D9E382CF9E09AC1816B7086C9404923F861B97F8D86F4244A55169E5F068C303
25,225,959 UART: [art] SIG.S = 58D169E4D8CD2BB686CD8FB951E44A00BCB6E84B3BB57E8605EEBD25B14F813C755C6627EB187799C76C151D4BAE34D4
26,205,548 UART: Caliptra RT
26,206,265 UART: [state] CFI Enabled
26,386,372 UART: [rt] RT listening for mailbox commands...
29,662,180 >>> mbox cmd response: failed
29,663,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,813,452 UART:
29,813,782 UART: Running Caliptra FMC ...
29,814,911 UART:
29,815,084 UART: [state] CFI Enabled
29,816,017 UART: [art] Extend RT PCRs Done
29,817,159 UART: [art] Lock RT PCRs Done
29,818,229 UART: [art] Populate DV Done
29,819,265 UART: [fht] FMC Alias Private Key: 7
29,820,668 UART: [art] Derive CDI
29,821,435 UART: [art] Store in slot 0x4
29,845,510 UART: [art] Derive Key Pair
29,846,515 UART: [art] Store priv key in slot 0x5
32,309,346 UART: [art] Derive Key Pair - Done
32,321,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,034,126 UART: [art] Erasing AUTHORITY.KEYID = 7
34,035,643 UART: [art] PUB.X = 393AE378F56799AEBE2420EFE43F77BF1A0B8308694DE9552B8D042ADFBD30ADFA41F0CC0C494A2B5630F4651E13D912
34,042,934 UART: [art] PUB.Y = 701CEC486798699E56F828B03EEF1C79022FE39E16E8530DC3BD6FAD61902B87B9FC0C44D8F28394C4C752C73A7360CD
34,050,159 UART: [art] SIG.R = B8545C324535AAB9A865EE2F46151F19D9E382CF9E09AC1816B7086C9404923F861B97F8D86F4244A55169E5F068C303
34,057,574 UART: [art] SIG.S = 58D169E4D8CD2BB686CD8FB951E44A00BCB6E84B3BB57E8605EEBD25B14F813C755C6627EB187799C76C151D4BAE34D4
35,036,158 UART: Caliptra RT
35,036,881 UART: [state] CFI Enabled
35,453,894 UART: [rt] RT listening for mailbox commands...
43,225,033 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,497 UART:
192,864 UART: Running Caliptra ROM ...
193,964 UART:
603,896 UART: [state] CFI Enabled
618,850 UART: [state] LifecycleState = Unprovisioned
621,242 UART: [state] DebugLocked = No
623,814 UART: [state] WD Timer not started. Device not locked for debugging
628,198 UART: [kat] SHA2-256
818,086 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,901 UART: [kat] ++
829,442 UART: [kat] sha1
841,622 UART: [kat] SHA2-256
844,648 UART: [kat] SHA2-384
849,182 UART: [kat] SHA2-512-ACC
851,750 UART: [kat] ECC-384
3,293,750 UART: [kat] HMAC-384Kdf
3,307,156 UART: [kat] LMS
3,838,985 UART: [kat] --
3,842,514 UART: [cold-reset] ++
3,843,915 UART: [fht] FHT @ 0x50003400
3,854,413 UART: [idev] ++
3,855,135 UART: [idev] CDI.KEYID = 6
3,856,055 UART: [idev] SUBJECT.KEYID = 7
3,857,232 UART: [idev] UDS.KEYID = 0
3,860,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,323 UART: [idev] Erasing UDS.KEYID = 0
6,334,105 UART: [idev] Sha1 KeyId Algorithm
6,355,364 UART: [idev] --
6,361,577 UART: [ldev] ++
6,362,262 UART: [ldev] CDI.KEYID = 6
6,363,237 UART: [ldev] SUBJECT.KEYID = 5
6,364,403 UART: [ldev] AUTHORITY.KEYID = 7
6,365,607 UART: [ldev] FE.KEYID = 1
6,375,397 UART: [ldev] Erasing FE.KEYID = 1
8,851,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,621 UART: [ldev] --
10,642,270 UART: [fwproc] Wait for Commands...
10,644,101 UART: [fwproc] Recv command 0x46574c44
10,646,427 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,213,676 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,337,270 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,898,022 >>> mbox cmd response: success
14,899,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,048,522 UART: [afmc] ++
15,049,159 UART: [afmc] CDI.KEYID = 6
15,050,054 UART: [afmc] SUBJECT.KEYID = 7
15,051,172 UART: [afmc] AUTHORITY.KEYID = 5
17,406,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,130,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,132,597 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,147,692 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,162,858 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,177,749 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,201,690 UART: [afmc] --
19,205,556 UART: [cold-reset] --
19,208,936 UART: [state] Locking Datavault
19,214,095 UART: [state] Locking PCR0, PCR1 and PCR31
19,216,278 UART: [state] Locking ICCM
19,217,687 UART: [exit] Launching FMC @ 0x40000130
19,226,390 UART:
19,226,631 UART: Running Caliptra FMC ...
19,227,736 UART:
19,227,903 UART: [state] CFI Enabled
19,235,733 UART: [fht] FMC Alias Private Key: 7
21,001,273 UART: [art] Extend RT PCRs Done
21,002,509 UART: [art] Lock RT PCRs Done
21,004,147 UART: [art] Populate DV Done
21,009,784 UART: [fht] FMC Alias Private Key: 7
21,011,384 UART: [art] Derive CDI
21,012,205 UART: [art] Store in slot 0x4
21,054,751 UART: [art] Derive Key Pair
21,055,795 UART: [art] Store priv key in slot 0x5
23,482,820 UART: [art] Derive Key Pair - Done
23,495,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,281 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,811 UART: [art] PUB.X = E7F0BCDD1F6468C12A67872679A814C14110004F3F0F3CBAD4286ADD6B058F46F7E23D64E92A2E9574F00547BCA40ABD
25,210,063 UART: [art] PUB.Y = 37347C5CBACBD2A09FF910794C738B939A92DC92F9843301261B40254422A069378E05F460EDBB2B61B204D3A7CA3745
25,217,283 UART: [art] SIG.R = A56489B4C610DD2B760319046DDFEB71CA09B3784C0756E2F39C4EED3F6310F689EF52A5D97D2919FC80DE4FEEB02C37
25,224,683 UART: [art] SIG.S = DA9CA16D92AF8761F742D1F28FF057BDACD26A1C3E0FDC5DDEEED92ED54372CFEFDCA38F4A8A8F992B53EBF21ED652E3
26,203,596 UART: Caliptra RT
26,204,325 UART: [state] CFI Enabled
26,336,806 UART: [rt] RT listening for mailbox commands...
26,340,092 UART:
26,340,267 UART: Running Caliptra ROM ...
26,341,292 UART:
26,341,669 UART: [state] CFI Enabled
26,355,780 UART: [state] LifecycleState = Unprovisioned
26,357,618 UART: [state] DebugLocked = No
26,359,598 UART: [state] WD Timer not started. Device not locked for debugging
26,364,010 UART: [kat] SHA2-256
26,553,903 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,564,665 UART: [kat] ++
26,565,210 UART: [kat] sha1
26,577,071 UART: [kat] SHA2-256
26,580,089 UART: [kat] SHA2-384
26,585,715 UART: [kat] SHA2-512-ACC
26,588,290 UART: [kat] ECC-384
29,030,867 UART: [kat] HMAC-384Kdf
29,044,453 UART: [kat] LMS
29,576,037 UART: [kat] --
29,580,621 UART: [update-reset] ++
29,637,697 >>> mbox cmd response: failed
29,639,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,789,221 UART: ROM Non-Fatal Error: 0x000B001D
29,790,665 UART: [state] Locking Datavault
29,791,832 UART: [state] Locking PCR0, PCR1 and PCR31
29,793,374 UART: [state] Locking ICCM
29,794,303 UART: [exit] Launching FMC @ 0x40000130
29,795,737 UART:
29,795,906 UART: Running Caliptra FMC ...
29,797,010 UART:
29,797,174 UART: [state] CFI Enabled
29,798,093 UART: [art] Extend RT PCRs Done
29,799,237 UART: [art] Lock RT PCRs Done
29,800,305 UART: [art] Populate DV Done
29,801,339 UART: [fht] FMC Alias Private Key: 7
29,802,657 UART: [art] Derive CDI
29,803,399 UART: [art] Store in slot 0x4
29,804,463 UART: [art] Derive Key Pair
29,805,458 UART: [art] Store priv key in slot 0x5
32,184,887 UART: [art] Derive Key Pair - Done
32,198,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,904,267 UART: [art] Erasing AUTHORITY.KEYID = 7
33,905,783 UART: [art] PUB.X = E7F0BCDD1F6468C12A67872679A814C14110004F3F0F3CBAD4286ADD6B058F46F7E23D64E92A2E9574F00547BCA40ABD
33,913,069 UART: [art] PUB.Y = 37347C5CBACBD2A09FF910794C738B939A92DC92F9843301261B40254422A069378E05F460EDBB2B61B204D3A7CA3745
33,920,315 UART: [art] SIG.R = A56489B4C610DD2B760319046DDFEB71CA09B3784C0756E2F39C4EED3F6310F689EF52A5D97D2919FC80DE4FEEB02C37
33,927,707 UART: [art] SIG.S = DA9CA16D92AF8761F742D1F28FF057BDACD26A1C3E0FDC5DDEEED92ED54372CFEFDCA38F4A8A8F992B53EBF21ED652E3
34,906,970 UART: Caliptra RT
34,907,668 UART: [state] CFI Enabled
35,281,255 UART: [rt] RT listening for mailbox commands...
35,283,891 UART:
35,284,145 UART: Running Caliptra ROM ...
35,285,256 UART:
35,285,478 UART: [state] CFI Enabled
40,324,591 UART: [state] LifecycleState = Unprovisioned
40,326,519 UART: [state] DebugLocked = No
40,328,429 UART: [state] WD Timer not started. Device not locked for debugging
40,333,220 UART: [kat] SHA2-256
40,523,111 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,533,883 UART: [kat] ++
40,534,432 UART: [kat] sha1
40,545,647 UART: [kat] SHA2-256
40,548,626 UART: [kat] SHA2-384
40,554,787 UART: [kat] SHA2-512-ACC
40,557,353 UART: [kat] ECC-384
42,998,835 UART: [kat] HMAC-384Kdf
43,012,860 UART: [kat] LMS
43,544,447 UART: [kat] --
43,547,895 UART: [update-reset] ++
47,059,836 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
47,063,802 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,693,577 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
3,755,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,860 >>> mbox cmd response: success
15,046,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,303,189 UART:
19,303,610 UART: Running Caliptra FMC ...
19,304,806 UART:
19,304,987 UART: [state] CFI Enabled
19,312,913 UART: [fht] FMC Alias Private Key: 7
21,079,261 UART: [art] Extend RT PCRs Done
21,080,501 UART: [art] Lock RT PCRs Done
21,081,997 UART: [art] Populate DV Done
21,087,427 UART: [fht] FMC Alias Private Key: 7
21,088,962 UART: [art] Derive CDI
21,089,718 UART: [art] Store in slot 0x4
21,132,649 UART: [art] Derive Key Pair
21,133,658 UART: [art] Store priv key in slot 0x5
23,561,216 UART: [art] Derive Key Pair - Done
23,574,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,214 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,737 UART: [art] PUB.X = C8298CD27E9E2968FA956DF4F9DA18B09694E301C4AC1D6BC9D161D25628275421842ECD6C506B118E05025E1D152539
25,288,987 UART: [art] PUB.Y = 058C94C97CF498197FA65E91D99DF1EA70E9FC48A3C03D0B7E52E17B01CCB92F849A9D3F2CF6FFF8DB6CF0549AC1B0BE
25,296,260 UART: [art] SIG.R = BB66954617B59B7882843FDAE3BB1F8BF5B3C22626B6CBBFA56026B95F268DB3A3B71FE7678899C2FF2313E2258F433C
25,303,651 UART: [art] SIG.S = C8277BBE26539298C1945C4E59DB0E9237D0CBA21A043794C412F4E85842810CFD20AFE430DBE8BA7BF20AC257BEC0A7
26,282,111 UART: Caliptra RT
26,282,835 UART: [state] CFI Enabled
26,415,854 UART: [rt] RT listening for mailbox commands...
29,599,422 >>> mbox cmd response: failed
29,602,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,751,036 UART:
29,751,350 UART: Running Caliptra FMC ...
29,752,474 UART:
29,752,646 UART: [state] CFI Enabled
29,753,572 UART: [art] Extend RT PCRs Done
29,754,716 UART: [art] Lock RT PCRs Done
29,755,790 UART: [art] Populate DV Done
29,756,774 UART: [fht] FMC Alias Private Key: 7
29,758,162 UART: [art] Derive CDI
29,758,904 UART: [art] Store in slot 0x4
29,759,969 UART: [art] Derive Key Pair
29,760,916 UART: [art] Store priv key in slot 0x5
32,141,173 UART: [art] Derive Key Pair - Done
32,154,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,860,251 UART: [art] Erasing AUTHORITY.KEYID = 7
33,861,765 UART: [art] PUB.X = C8298CD27E9E2968FA956DF4F9DA18B09694E301C4AC1D6BC9D161D25628275421842ECD6C506B118E05025E1D152539
33,869,074 UART: [art] PUB.Y = 058C94C97CF498197FA65E91D99DF1EA70E9FC48A3C03D0B7E52E17B01CCB92F849A9D3F2CF6FFF8DB6CF0549AC1B0BE
33,876,311 UART: [art] SIG.R = BB66954617B59B7882843FDAE3BB1F8BF5B3C22626B6CBBFA56026B95F268DB3A3B71FE7678899C2FF2313E2258F433C
33,883,703 UART: [art] SIG.S = C8277BBE26539298C1945C4E59DB0E9237D0CBA21A043794C412F4E85842810CFD20AFE430DBE8BA7BF20AC257BEC0A7
34,862,844 UART: Caliptra RT
34,863,561 UART: [state] CFI Enabled
35,235,320 UART: [rt] RT listening for mailbox commands...
47,983,149 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,987 UART: [kat] SHA2-256
881,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,033 UART: [kat] ++
886,185 UART: [kat] sha1
890,311 UART: [kat] SHA2-256
892,249 UART: [kat] SHA2-384
895,050 UART: [kat] SHA2-512-ACC
896,951 UART: [kat] ECC-384
902,730 UART: [kat] HMAC-384Kdf
907,510 UART: [kat] LMS
1,475,706 UART: [kat] --
1,476,345 UART: [cold-reset] ++
1,476,861 UART: [fht] Storing FHT @ 0x50003400
1,479,588 UART: [idev] ++
1,479,756 UART: [idev] CDI.KEYID = 6
1,480,116 UART: [idev] SUBJECT.KEYID = 7
1,480,540 UART: [idev] UDS.KEYID = 0
1,480,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,738 UART: [idev] Erasing UDS.KEYID = 0
1,504,864 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,390 UART: [idev] --
1,514,631 UART: [ldev] ++
1,514,799 UART: [ldev] CDI.KEYID = 6
1,515,162 UART: [ldev] SUBJECT.KEYID = 5
1,515,588 UART: [ldev] AUTHORITY.KEYID = 7
1,516,051 UART: [ldev] FE.KEYID = 1
1,521,183 UART: [ldev] Erasing FE.KEYID = 1
1,546,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,852 UART: [ldev] --
1,586,233 UART: [fwproc] Waiting for Commands...
1,586,992 UART: [fwproc] Received command 0x46574c44
1,587,783 UART: [fwproc] Received Image of size 118548 bytes
2,931,767 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,291 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,509 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,852 >>> mbox cmd response: success
3,130,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,131,966 UART: [afmc] ++
3,132,134 UART: [afmc] CDI.KEYID = 6
3,132,496 UART: [afmc] SUBJECT.KEYID = 7
3,132,921 UART: [afmc] AUTHORITY.KEYID = 5
3,168,520 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,080 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,860 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,569 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,452 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,135 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,135 UART: [afmc] --
3,212,087 UART: [cold-reset] --
3,212,997 UART: [state] Locking Datavault
3,214,354 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,958 UART: [state] Locking ICCM
3,215,538 UART: [exit] Launching FMC @ 0x40000130
3,220,868 UART:
3,220,884 UART: Running Caliptra FMC ...
3,221,292 UART:
3,221,346 UART: [state] CFI Enabled
3,231,372 UART: [fht] FMC Alias Private Key: 7
3,350,086 UART: [art] Extend RT PCRs Done
3,350,514 UART: [art] Lock RT PCRs Done
3,351,614 UART: [art] Populate DV Done
3,359,663 UART: [fht] FMC Alias Private Key: 7
3,360,825 UART: [art] Derive CDI
3,361,105 UART: [art] Store in slot 0x4
3,447,027 UART: [art] Derive Key Pair
3,447,387 UART: [art] Store priv key in slot 0x5
3,460,834 UART: [art] Derive Key Pair - Done
3,475,803 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,511 UART: [art] PUB.X = 41C62DF888AD898EAE71088B8C8024AE8844F36557DA6D1F478CD7A227CB8353936AFE1E1F1807E28DF9AD61A4392AD8
3,499,283 UART: [art] PUB.Y = F02C7077799AB8FD244007AE8E1E3CEDA14999AE0698D43A7B6FC960EFCFE44D96B2FAEA8067585BD4F3165DC2EC2B39
3,506,245 UART: [art] SIG.R = 3F5D9BBD37636BF0E2EDEBF7B3FE2D3DDB33599727E9754EFCB6E7E708C94D30CC0A850DE179960D62E9C5719C81886F
3,513,019 UART: [art] SIG.S = F29CAB982CF4BFFC037DF8FA6102325BD3C0143442A762012B03EF578A56A652FF06FCC5C57FBBF6CAC72F4152F0D024
3,536,720 UART: Caliptra RT
3,536,971 UART: [state] CFI Enabled
3,656,957 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,658,916 UART:
3,658,932 UART: Running Caliptra ROM ...
3,659,340 UART:
3,659,394 UART: [state] CFI Enabled
3,662,046 UART: [state] LifecycleState = Unprovisioned
3,662,701 UART: [state] DebugLocked = No
3,663,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,664,934 UART: [kat] SHA2-256
4,458,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,462,980 UART: [kat] ++
4,463,132 UART: [kat] sha1
4,467,282 UART: [kat] SHA2-256
4,469,220 UART: [kat] SHA2-384
4,471,973 UART: [kat] SHA2-512-ACC
4,473,873 UART: [kat] ECC-384
4,479,294 UART: [kat] HMAC-384Kdf
4,484,010 UART: [kat] LMS
5,052,206 UART: [kat] --
5,053,181 UART: [update-reset] ++
5,091,154 >>> mbox cmd response: failed
5,091,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,091,704 UART: ROM Non-Fatal Error: 0x000B001D
5,092,462 UART: [state] Locking Datavault
5,093,238 UART: [state] Locking PCR0, PCR1 and PCR31
5,093,842 UART: [state] Locking ICCM
5,094,280 UART: [exit] Launching FMC @ 0x40000130
5,099,610 UART:
5,099,626 UART: Running Caliptra FMC ...
5,100,034 UART:
5,100,088 UART: [state] CFI Enabled
5,189,269 UART: [art] Extend RT PCRs Done
5,189,697 UART: [art] Lock RT PCRs Done
5,190,972 UART: [art] Populate DV Done
5,199,397 UART: [fht] FMC Alias Private Key: 7
5,200,367 UART: [art] Derive CDI
5,200,647 UART: [art] Store in slot 0x4
5,286,203 UART: [art] Derive Key Pair
5,286,563 UART: [art] Store priv key in slot 0x5
5,300,094 UART: [art] Derive Key Pair - Done
5,314,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,330,054 UART: [art] Erasing AUTHORITY.KEYID = 7
5,330,819 UART: [art] PUB.X = 41C62DF888AD898EAE71088B8C8024AE8844F36557DA6D1F478CD7A227CB8353936AFE1E1F1807E28DF9AD61A4392AD8
5,337,591 UART: [art] PUB.Y = F02C7077799AB8FD244007AE8E1E3CEDA14999AE0698D43A7B6FC960EFCFE44D96B2FAEA8067585BD4F3165DC2EC2B39
5,344,553 UART: [art] SIG.R = 3F5D9BBD37636BF0E2EDEBF7B3FE2D3DDB33599727E9754EFCB6E7E708C94D30CC0A850DE179960D62E9C5719C81886F
5,351,327 UART: [art] SIG.S = F29CAB982CF4BFFC037DF8FA6102325BD3C0143442A762012B03EF578A56A652FF06FCC5C57FBBF6CAC72F4152F0D024
5,374,266 UART: Caliptra RT
5,374,517 UART: [state] CFI Enabled
5,739,060 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,740,696 UART:
5,740,712 UART: Running Caliptra ROM ...
5,741,120 UART:
5,741,174 UART: [state] CFI Enabled
5,743,734 UART: [state] LifecycleState = Unprovisioned
5,744,389 UART: [state] DebugLocked = No
5,745,017 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,746,580 UART: [kat] SHA2-256
6,540,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,544,626 UART: [kat] ++
6,544,778 UART: [kat] sha1
6,548,924 UART: [kat] SHA2-256
6,550,862 UART: [kat] SHA2-384
6,553,547 UART: [kat] SHA2-512-ACC
6,555,447 UART: [kat] ECC-384
6,560,926 UART: [kat] HMAC-384Kdf
6,565,552 UART: [kat] LMS
7,133,748 UART: [kat] --
7,134,579 UART: [update-reset] ++
8,516,157 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,517,405 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,672,672 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,080 >>> mbox cmd response: success
2,980,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,041,253 UART:
3,041,269 UART: Running Caliptra FMC ...
3,041,677 UART:
3,041,731 UART: [state] CFI Enabled
3,052,047 UART: [fht] FMC Alias Private Key: 7
3,170,973 UART: [art] Extend RT PCRs Done
3,171,401 UART: [art] Lock RT PCRs Done
3,172,771 UART: [art] Populate DV Done
3,181,092 UART: [fht] FMC Alias Private Key: 7
3,182,074 UART: [art] Derive CDI
3,182,354 UART: [art] Store in slot 0x4
3,268,322 UART: [art] Derive Key Pair
3,268,682 UART: [art] Store priv key in slot 0x5
3,282,051 UART: [art] Derive Key Pair - Done
3,296,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,955 UART: [art] PUB.X = CD13925A96B5773CCA6E06C43BAC3B58035144C15527E3B16F2BC37257327DFE5DD51C9BE7069C250A5FD3B508506EAD
3,319,718 UART: [art] PUB.Y = C238D0E1D5A97054ECC5831D298BB8F3C8E9DF275B98187781FE63B74D884D7CC6AE6E80184160A5209C8E53ED674012
3,326,670 UART: [art] SIG.R = 5771024CDD110E5345DED45C253F6B9AC80F58D6FEBF381884AAA6E7C3EF0B0E73E8BED0D1103A55FDA6D40FF7B4B7BB
3,333,446 UART: [art] SIG.S = 25C7A110F4B6F78C066B555ED432A84C5D81FD99E6CB5DB900A98B8427C549C854B6C1813358C013F24C1F847E2C7341
3,357,239 UART: Caliptra RT
3,357,490 UART: [state] CFI Enabled
3,477,343 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,795,141 >>> mbox cmd response: failed
4,795,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,800,991 UART:
4,801,007 UART: Running Caliptra FMC ...
4,801,415 UART:
4,801,469 UART: [state] CFI Enabled
4,890,584 UART: [art] Extend RT PCRs Done
4,891,012 UART: [art] Lock RT PCRs Done
4,892,409 UART: [art] Populate DV Done
4,900,574 UART: [fht] FMC Alias Private Key: 7
4,901,626 UART: [art] Derive CDI
4,901,906 UART: [art] Store in slot 0x4
4,988,190 UART: [art] Derive Key Pair
4,988,550 UART: [art] Store priv key in slot 0x5
5,001,817 UART: [art] Derive Key Pair - Done
5,016,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,032,112 UART: [art] Erasing AUTHORITY.KEYID = 7
5,032,877 UART: [art] PUB.X = CD13925A96B5773CCA6E06C43BAC3B58035144C15527E3B16F2BC37257327DFE5DD51C9BE7069C250A5FD3B508506EAD
5,039,640 UART: [art] PUB.Y = C238D0E1D5A97054ECC5831D298BB8F3C8E9DF275B98187781FE63B74D884D7CC6AE6E80184160A5209C8E53ED674012
5,046,592 UART: [art] SIG.R = 5771024CDD110E5345DED45C253F6B9AC80F58D6FEBF381884AAA6E7C3EF0B0E73E8BED0D1103A55FDA6D40FF7B4B7BB
5,053,368 UART: [art] SIG.S = 25C7A110F4B6F78C066B555ED432A84C5D81FD99E6CB5DB900A98B8427C549C854B6C1813358C013F24C1F847E2C7341
5,076,995 UART: Caliptra RT
5,077,246 UART: [state] CFI Enabled
5,440,744 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,255,204 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,618 UART: [kat] SHA2-256
882,549 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,664 UART: [kat] ++
886,816 UART: [kat] sha1
890,886 UART: [kat] SHA2-256
892,824 UART: [kat] SHA2-384
895,675 UART: [kat] SHA2-512-ACC
897,576 UART: [kat] ECC-384
903,015 UART: [kat] HMAC-384Kdf
907,663 UART: [kat] LMS
1,475,859 UART: [kat] --
1,476,710 UART: [cold-reset] ++
1,477,184 UART: [fht] Storing FHT @ 0x50003400
1,480,167 UART: [idev] ++
1,480,335 UART: [idev] CDI.KEYID = 6
1,480,695 UART: [idev] SUBJECT.KEYID = 7
1,481,119 UART: [idev] UDS.KEYID = 0
1,481,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,063 UART: [idev] Erasing UDS.KEYID = 0
1,506,149 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,749 UART: [idev] --
1,515,862 UART: [ldev] ++
1,516,030 UART: [ldev] CDI.KEYID = 6
1,516,393 UART: [ldev] SUBJECT.KEYID = 5
1,516,819 UART: [ldev] AUTHORITY.KEYID = 7
1,517,282 UART: [ldev] FE.KEYID = 1
1,522,722 UART: [ldev] Erasing FE.KEYID = 1
1,548,395 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,697 UART: [ldev] --
1,588,114 UART: [fwproc] Waiting for Commands...
1,588,825 UART: [fwproc] Received command 0x46574c44
1,589,616 UART: [fwproc] Received Image of size 118548 bytes
2,934,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,802 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,020 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,227 >>> mbox cmd response: success
3,132,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,133,385 UART: [afmc] ++
3,133,553 UART: [afmc] CDI.KEYID = 6
3,133,915 UART: [afmc] SUBJECT.KEYID = 7
3,134,340 UART: [afmc] AUTHORITY.KEYID = 5
3,169,395 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,487 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,267 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,976 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,859 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,542 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,566 UART: [afmc] --
3,212,530 UART: [cold-reset] --
3,213,478 UART: [state] Locking Datavault
3,214,743 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,347 UART: [state] Locking ICCM
3,215,783 UART: [exit] Launching FMC @ 0x40000130
3,221,113 UART:
3,221,129 UART: Running Caliptra FMC ...
3,221,537 UART:
3,221,680 UART: [state] CFI Enabled
3,232,642 UART: [fht] FMC Alias Private Key: 7
3,351,512 UART: [art] Extend RT PCRs Done
3,351,940 UART: [art] Lock RT PCRs Done
3,353,392 UART: [art] Populate DV Done
3,361,611 UART: [fht] FMC Alias Private Key: 7
3,362,615 UART: [art] Derive CDI
3,362,895 UART: [art] Store in slot 0x4
3,448,401 UART: [art] Derive Key Pair
3,448,761 UART: [art] Store priv key in slot 0x5
3,462,482 UART: [art] Derive Key Pair - Done
3,477,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,822 UART: [art] PUB.X = 9D8E910ACD6E4326107D95EE50E14B39AFA560F06B9200F3CEC68B551054A8F9DA1A2A510B3F04444948A4E8C7EBFA4B
3,500,573 UART: [art] PUB.Y = 9CC595C046CD8095DB6BF8A6838AB66DAD91D073EBD68A0541C61177BFE8B18B2463B73801C82046BB5D4C18E940B534
3,507,523 UART: [art] SIG.R = 9A31714EF04C8A511937B622DD4165D0D6D4EDE61BE201FE1584121425DAEAD873C353AA18BFD480CAE5217FE2B8F803
3,514,297 UART: [art] SIG.S = 43BCC93CA20B9DEC77CAE2CA3906F5AC62DD34F8B28A55A9389CF53402A900B8BF9408FD6FEDF196E2EBDE2E0BE73B3D
3,537,626 UART: Caliptra RT
3,537,969 UART: [state] CFI Enabled
3,657,315 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,659,322 UART:
3,659,338 UART: Running Caliptra ROM ...
3,659,746 UART:
3,659,887 UART: [state] CFI Enabled
3,662,947 UART: [state] LifecycleState = Unprovisioned
3,663,602 UART: [state] DebugLocked = No
3,664,274 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,665,859 UART: [kat] SHA2-256
4,459,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,463,905 UART: [kat] ++
4,464,057 UART: [kat] sha1
4,468,329 UART: [kat] SHA2-256
4,470,267 UART: [kat] SHA2-384
4,473,060 UART: [kat] SHA2-512-ACC
4,474,960 UART: [kat] ECC-384
4,480,577 UART: [kat] HMAC-384Kdf
4,485,155 UART: [kat] LMS
5,053,351 UART: [kat] --
5,054,236 UART: [update-reset] ++
5,092,167 >>> mbox cmd response: failed
5,092,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,092,717 UART: ROM Non-Fatal Error: 0x000B001D
5,093,493 UART: [state] Locking Datavault
5,094,337 UART: [state] Locking PCR0, PCR1 and PCR31
5,094,941 UART: [state] Locking ICCM
5,095,435 UART: [exit] Launching FMC @ 0x40000130
5,100,765 UART:
5,100,781 UART: Running Caliptra FMC ...
5,101,189 UART:
5,101,332 UART: [state] CFI Enabled
5,190,587 UART: [art] Extend RT PCRs Done
5,191,015 UART: [art] Lock RT PCRs Done
5,192,234 UART: [art] Populate DV Done
5,200,635 UART: [fht] FMC Alias Private Key: 7
5,201,757 UART: [art] Derive CDI
5,202,037 UART: [art] Store in slot 0x4
5,288,033 UART: [art] Derive Key Pair
5,288,393 UART: [art] Store priv key in slot 0x5
5,301,932 UART: [art] Derive Key Pair - Done
5,316,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,332,067 UART: [art] Erasing AUTHORITY.KEYID = 7
5,332,832 UART: [art] PUB.X = 9D8E910ACD6E4326107D95EE50E14B39AFA560F06B9200F3CEC68B551054A8F9DA1A2A510B3F04444948A4E8C7EBFA4B
5,339,583 UART: [art] PUB.Y = 9CC595C046CD8095DB6BF8A6838AB66DAD91D073EBD68A0541C61177BFE8B18B2463B73801C82046BB5D4C18E940B534
5,346,533 UART: [art] SIG.R = 9A31714EF04C8A511937B622DD4165D0D6D4EDE61BE201FE1584121425DAEAD873C353AA18BFD480CAE5217FE2B8F803
5,353,307 UART: [art] SIG.S = 43BCC93CA20B9DEC77CAE2CA3906F5AC62DD34F8B28A55A9389CF53402A900B8BF9408FD6FEDF196E2EBDE2E0BE73B3D
5,377,084 UART: Caliptra RT
5,377,427 UART: [state] CFI Enabled
5,736,920 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,738,512 UART:
5,738,528 UART: Running Caliptra ROM ...
5,738,936 UART:
5,739,077 UART: [state] CFI Enabled
5,741,741 UART: [state] LifecycleState = Unprovisioned
5,742,396 UART: [state] DebugLocked = No
5,743,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,744,561 UART: [kat] SHA2-256
6,538,492 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,542,607 UART: [kat] ++
6,542,759 UART: [kat] sha1
6,547,123 UART: [kat] SHA2-256
6,549,061 UART: [kat] SHA2-384
6,551,958 UART: [kat] SHA2-512-ACC
6,553,858 UART: [kat] ECC-384
6,559,227 UART: [kat] HMAC-384Kdf
6,563,901 UART: [kat] LMS
7,132,097 UART: [kat] --
7,133,194 UART: [update-reset] ++
8,514,042 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,515,174 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,670,441 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,343 >>> mbox cmd response: success
2,983,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,045,022 UART:
3,045,038 UART: Running Caliptra FMC ...
3,045,446 UART:
3,045,589 UART: [state] CFI Enabled
3,056,245 UART: [fht] FMC Alias Private Key: 7
3,174,857 UART: [art] Extend RT PCRs Done
3,175,285 UART: [art] Lock RT PCRs Done
3,176,821 UART: [art] Populate DV Done
3,184,982 UART: [fht] FMC Alias Private Key: 7
3,186,152 UART: [art] Derive CDI
3,186,432 UART: [art] Store in slot 0x4
3,271,726 UART: [art] Derive Key Pair
3,272,086 UART: [art] Store priv key in slot 0x5
3,285,405 UART: [art] Derive Key Pair - Done
3,300,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,620 UART: [art] PUB.X = 134AB318CB2311A068ED72D1FF5770254E101A5209C6108400B4C5558529179A17123B1DA0758AF98003EB5AC24947F7
3,323,352 UART: [art] PUB.Y = EAE46B3E346295B1C331CDC8ADA3319EE5D347C7C615021EA037470D34AD8A1B14C904452B2D4D6DBF3DFC019E6A4FCF
3,330,308 UART: [art] SIG.R = EB532747D1918BE591457E55B7A8ADBE5B639693751FF9D362417F2DC84A18E96743D250AA89DFED3F9E6C7F4C9F98B7
3,337,086 UART: [art] SIG.S = BAA9B1748E92FC5A776069861AAA83A6860B362A1DFB3795BF34A53D172527042FDB5714E3E51E3646B564EA58531AEA
3,360,820 UART: Caliptra RT
3,361,163 UART: [state] CFI Enabled
3,480,666 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,798,107 >>> mbox cmd response: failed
4,798,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,804,055 UART:
4,804,071 UART: Running Caliptra FMC ...
4,804,479 UART:
4,804,622 UART: [state] CFI Enabled
4,893,531 UART: [art] Extend RT PCRs Done
4,893,959 UART: [art] Lock RT PCRs Done
4,895,100 UART: [art] Populate DV Done
4,903,373 UART: [fht] FMC Alias Private Key: 7
4,904,439 UART: [art] Derive CDI
4,904,719 UART: [art] Store in slot 0x4
4,990,655 UART: [art] Derive Key Pair
4,991,015 UART: [art] Store priv key in slot 0x5
5,004,364 UART: [art] Derive Key Pair - Done
5,019,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,035,010 UART: [art] Erasing AUTHORITY.KEYID = 7
5,035,775 UART: [art] PUB.X = 134AB318CB2311A068ED72D1FF5770254E101A5209C6108400B4C5558529179A17123B1DA0758AF98003EB5AC24947F7
5,042,507 UART: [art] PUB.Y = EAE46B3E346295B1C331CDC8ADA3319EE5D347C7C615021EA037470D34AD8A1B14C904452B2D4D6DBF3DFC019E6A4FCF
5,049,463 UART: [art] SIG.R = EB532747D1918BE591457E55B7A8ADBE5B639693751FF9D362417F2DC84A18E96743D250AA89DFED3F9E6C7F4C9F98B7
5,056,241 UART: [art] SIG.S = BAA9B1748E92FC5A776069861AAA83A6860B362A1DFB3795BF34A53D172527042FDB5714E3E51E3646B564EA58531AEA
5,080,137 UART: Caliptra RT
5,080,480 UART: [state] CFI Enabled
5,442,862 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,257,221 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
891,066 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,170 UART: [kat] ++
895,322 UART: [kat] sha1
899,476 UART: [kat] SHA2-256
901,416 UART: [kat] SHA2-384
904,151 UART: [kat] SHA2-512-ACC
906,052 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,527 UART: [kat] LMS
1,168,839 UART: [kat] --
1,169,560 UART: [cold-reset] ++
1,170,030 UART: [fht] FHT @ 0x50003400
1,172,518 UART: [idev] ++
1,172,686 UART: [idev] CDI.KEYID = 6
1,173,047 UART: [idev] SUBJECT.KEYID = 7
1,173,472 UART: [idev] UDS.KEYID = 0
1,173,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,429 UART: [idev] Erasing UDS.KEYID = 0
1,198,857 UART: [idev] Sha1 KeyId Algorithm
1,207,719 UART: [idev] --
1,208,916 UART: [ldev] ++
1,209,084 UART: [ldev] CDI.KEYID = 6
1,209,448 UART: [ldev] SUBJECT.KEYID = 5
1,209,875 UART: [ldev] AUTHORITY.KEYID = 7
1,210,338 UART: [ldev] FE.KEYID = 1
1,215,774 UART: [ldev] Erasing FE.KEYID = 1
1,242,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,300 UART: [ldev] --
1,281,721 UART: [fwproc] Wait for Commands...
1,282,366 UART: [fwproc] Recv command 0x46574c44
1,283,099 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,501 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,676 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,927 >>> mbox cmd response: success
2,826,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,828,035 UART: [afmc] ++
2,828,203 UART: [afmc] CDI.KEYID = 6
2,828,566 UART: [afmc] SUBJECT.KEYID = 7
2,828,992 UART: [afmc] AUTHORITY.KEYID = 5
2,864,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,272 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,021 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,731 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,612 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,313 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,942 UART: [afmc] --
2,907,981 UART: [cold-reset] --
2,908,901 UART: [state] Locking Datavault
2,909,932 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,536 UART: [state] Locking ICCM
2,910,990 UART: [exit] Launching FMC @ 0x40000130
2,916,320 UART:
2,916,336 UART: Running Caliptra FMC ...
2,916,744 UART:
2,916,798 UART: [state] CFI Enabled
2,927,040 UART: [fht] FMC Alias Private Key: 7
3,046,104 UART: [art] Extend RT PCRs Done
3,046,532 UART: [art] Lock RT PCRs Done
3,047,780 UART: [art] Populate DV Done
3,056,125 UART: [fht] FMC Alias Private Key: 7
3,057,119 UART: [art] Derive CDI
3,057,399 UART: [art] Store in slot 0x4
3,142,712 UART: [art] Derive Key Pair
3,143,072 UART: [art] Store priv key in slot 0x5
3,156,790 UART: [art] Derive Key Pair - Done
3,171,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,884 UART: [art] PUB.X = EA59AFB9DCE74A73B39B32C7F76359AA9418C87BF1F09FD11A2BB3725A80987AAC04AFB6A0D40C24D3F8FF22BFE1524B
3,194,670 UART: [art] PUB.Y = 6C4DCC4C4799285F0FAFB965CD0E126B7463B8C1F7B8109EA178F5407AE59165FF30E7A03F1A61C3FBC33D07D0BEADB0
3,201,629 UART: [art] SIG.R = 6819CE556205F63332466C78F0124371859AAE5270D9712966F44D7AFE05797301D76F27B231D6ED6E1C69079D82A6CC
3,208,377 UART: [art] SIG.S = C2F6A5A5B32AF72ECC04C5A9278B9C2C3FEDA032F7A5CFA9BB1D536D1B7A37A04A2E8BEF86227970857C3A0E2704EA23
3,232,504 UART: Caliptra RT
3,232,755 UART: [state] CFI Enabled
3,351,326 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,406 UART:
3,353,422 UART: Running Caliptra ROM ...
3,353,830 UART:
3,353,885 UART: [state] CFI Enabled
3,356,611 UART: [state] LifecycleState = Unprovisioned
3,357,266 UART: [state] DebugLocked = No
3,357,896 UART: [state] WD Timer not started. Device not locked for debugging
3,359,074 UART: [kat] SHA2-256
4,162,624 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,166,728 UART: [kat] ++
4,166,880 UART: [kat] sha1
4,171,024 UART: [kat] SHA2-256
4,172,964 UART: [kat] SHA2-384
4,175,565 UART: [kat] SHA2-512-ACC
4,177,465 UART: [kat] ECC-384
4,187,188 UART: [kat] HMAC-384Kdf
4,191,898 UART: [kat] LMS
4,440,210 UART: [kat] --
4,441,020 UART: [update-reset] ++
4,456,619 >>> mbox cmd response: failed
4,456,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,457,047 UART: ROM Non-Fatal Error: 0x000B001D
4,457,827 UART: [state] Locking Datavault
4,458,667 UART: [state] Locking PCR0, PCR1 and PCR31
4,459,271 UART: [state] Locking ICCM
4,459,727 UART: [exit] Launching FMC @ 0x40000130
4,465,057 UART:
4,465,073 UART: Running Caliptra FMC ...
4,465,481 UART:
4,465,535 UART: [state] CFI Enabled
4,554,570 UART: [art] Extend RT PCRs Done
4,554,998 UART: [art] Lock RT PCRs Done
4,556,305 UART: [art] Populate DV Done
4,564,266 UART: [fht] FMC Alias Private Key: 7
4,565,426 UART: [art] Derive CDI
4,565,706 UART: [art] Store in slot 0x4
4,651,313 UART: [art] Derive Key Pair
4,651,673 UART: [art] Store priv key in slot 0x5
4,665,315 UART: [art] Derive Key Pair - Done
4,679,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,695,418 UART: [art] Erasing AUTHORITY.KEYID = 7
4,696,183 UART: [art] PUB.X = EA59AFB9DCE74A73B39B32C7F76359AA9418C87BF1F09FD11A2BB3725A80987AAC04AFB6A0D40C24D3F8FF22BFE1524B
4,702,969 UART: [art] PUB.Y = 6C4DCC4C4799285F0FAFB965CD0E126B7463B8C1F7B8109EA178F5407AE59165FF30E7A03F1A61C3FBC33D07D0BEADB0
4,709,928 UART: [art] SIG.R = 6819CE556205F63332466C78F0124371859AAE5270D9712966F44D7AFE05797301D76F27B231D6ED6E1C69079D82A6CC
4,716,676 UART: [art] SIG.S = C2F6A5A5B32AF72ECC04C5A9278B9C2C3FEDA032F7A5CFA9BB1D536D1B7A37A04A2E8BEF86227970857C3A0E2704EA23
4,740,045 UART: Caliptra RT
4,740,296 UART: [state] CFI Enabled
5,107,576 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,109,149 UART:
5,109,165 UART: Running Caliptra ROM ...
5,109,573 UART:
5,109,628 UART: [state] CFI Enabled
5,112,172 UART: [state] LifecycleState = Unprovisioned
5,112,827 UART: [state] DebugLocked = No
5,113,399 UART: [state] WD Timer not started. Device not locked for debugging
5,114,673 UART: [kat] SHA2-256
5,918,223 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,922,327 UART: [kat] ++
5,922,479 UART: [kat] sha1
5,926,663 UART: [kat] SHA2-256
5,928,603 UART: [kat] SHA2-384
5,931,454 UART: [kat] SHA2-512-ACC
5,933,354 UART: [kat] ECC-384
5,943,549 UART: [kat] HMAC-384Kdf
5,948,205 UART: [kat] LMS
6,196,517 UART: [kat] --
6,197,281 UART: [update-reset] ++
7,556,644 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,557,787 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,713,002 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,866 >>> mbox cmd response: success
2,677,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,739,513 UART:
2,739,529 UART: Running Caliptra FMC ...
2,739,937 UART:
2,739,991 UART: [state] CFI Enabled
2,750,567 UART: [fht] FMC Alias Private Key: 7
2,868,989 UART: [art] Extend RT PCRs Done
2,869,417 UART: [art] Lock RT PCRs Done
2,870,833 UART: [art] Populate DV Done
2,879,134 UART: [fht] FMC Alias Private Key: 7
2,880,272 UART: [art] Derive CDI
2,880,552 UART: [art] Store in slot 0x4
2,966,309 UART: [art] Derive Key Pair
2,966,669 UART: [art] Store priv key in slot 0x5
2,980,167 UART: [art] Derive Key Pair - Done
2,995,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,358 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,123 UART: [art] PUB.X = 47CB46D9F7C5E8975C82BC06390297245BB1063DEE1FCEC1C032C9D4CEA2E787C7DA4D3F89C9553F9CC7675B35336262
3,017,892 UART: [art] PUB.Y = 51083D31363CDA96234DC14C49144793599EF4E95EE3CAC84CA803FA1E2217431672F790A1395F39990F2D5377BC92EF
3,024,829 UART: [art] SIG.R = 76BBD831CF33FE88BE86A872671B24A565218D70163DBDEC4A0E026D26A92777CDF8A5A3D4AF56DBF85236B99EFE48C3
3,031,607 UART: [art] SIG.S = 08E83C0A62BB91CAA99480E1B8D827ABEB3E86DEF0BB8C72E658169A7C808CBB9FA92D40889B4F4078366C9422583E88
3,055,663 UART: Caliptra RT
3,055,914 UART: [state] CFI Enabled
3,175,384 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,167,338 >>> mbox cmd response: failed
4,167,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,172,672 UART:
4,172,688 UART: Running Caliptra FMC ...
4,173,096 UART:
4,173,150 UART: [state] CFI Enabled
4,262,485 UART: [art] Extend RT PCRs Done
4,262,913 UART: [art] Lock RT PCRs Done
4,264,222 UART: [art] Populate DV Done
4,272,305 UART: [fht] FMC Alias Private Key: 7
4,273,433 UART: [art] Derive CDI
4,273,713 UART: [art] Store in slot 0x4
4,359,464 UART: [art] Derive Key Pair
4,359,824 UART: [art] Store priv key in slot 0x5
4,373,236 UART: [art] Derive Key Pair - Done
4,388,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,403,499 UART: [art] Erasing AUTHORITY.KEYID = 7
4,404,264 UART: [art] PUB.X = 47CB46D9F7C5E8975C82BC06390297245BB1063DEE1FCEC1C032C9D4CEA2E787C7DA4D3F89C9553F9CC7675B35336262
4,411,033 UART: [art] PUB.Y = 51083D31363CDA96234DC14C49144793599EF4E95EE3CAC84CA803FA1E2217431672F790A1395F39990F2D5377BC92EF
4,417,970 UART: [art] SIG.R = 76BBD831CF33FE88BE86A872671B24A565218D70163DBDEC4A0E026D26A92777CDF8A5A3D4AF56DBF85236B99EFE48C3
4,424,748 UART: [art] SIG.S = 08E83C0A62BB91CAA99480E1B8D827ABEB3E86DEF0BB8C72E658169A7C808CBB9FA92D40889B4F4078366C9422583E88
4,448,976 UART: Caliptra RT
4,449,227 UART: [state] CFI Enabled
4,813,292 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,301,458 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,935 UART: [state] LifecycleState = Unprovisioned
85,590 UART: [state] DebugLocked = No
86,192 UART: [state] WD Timer not started. Device not locked for debugging
87,387 UART: [kat] SHA2-256
890,937 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,090 UART: [kat] SHA2-512-ACC
905,991 UART: [kat] ECC-384
915,400 UART: [kat] HMAC-384Kdf
920,004 UART: [kat] LMS
1,168,316 UART: [kat] --
1,169,101 UART: [cold-reset] ++
1,169,573 UART: [fht] FHT @ 0x50003400
1,172,199 UART: [idev] ++
1,172,367 UART: [idev] CDI.KEYID = 6
1,172,728 UART: [idev] SUBJECT.KEYID = 7
1,173,153 UART: [idev] UDS.KEYID = 0
1,173,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,368 UART: [idev] Erasing UDS.KEYID = 0
1,198,270 UART: [idev] Sha1 KeyId Algorithm
1,207,152 UART: [idev] --
1,208,115 UART: [ldev] ++
1,208,283 UART: [ldev] CDI.KEYID = 6
1,208,647 UART: [ldev] SUBJECT.KEYID = 5
1,209,074 UART: [ldev] AUTHORITY.KEYID = 7
1,209,537 UART: [ldev] FE.KEYID = 1
1,214,577 UART: [ldev] Erasing FE.KEYID = 1
1,240,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,527 UART: [ldev] --
1,279,744 UART: [fwproc] Wait for Commands...
1,280,327 UART: [fwproc] Recv command 0x46574c44
1,281,060 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,306 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,481 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,736 >>> mbox cmd response: success
2,823,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,824,802 UART: [afmc] ++
2,824,970 UART: [afmc] CDI.KEYID = 6
2,825,333 UART: [afmc] SUBJECT.KEYID = 7
2,825,759 UART: [afmc] AUTHORITY.KEYID = 5
2,861,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,546 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,256 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,137 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,838 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,619 UART: [afmc] --
2,904,578 UART: [cold-reset] --
2,905,622 UART: [state] Locking Datavault
2,906,897 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,501 UART: [state] Locking ICCM
2,908,095 UART: [exit] Launching FMC @ 0x40000130
2,913,425 UART:
2,913,441 UART: Running Caliptra FMC ...
2,913,849 UART:
2,913,992 UART: [state] CFI Enabled
2,924,818 UART: [fht] FMC Alias Private Key: 7
3,044,268 UART: [art] Extend RT PCRs Done
3,044,696 UART: [art] Lock RT PCRs Done
3,046,112 UART: [art] Populate DV Done
3,054,171 UART: [fht] FMC Alias Private Key: 7
3,055,121 UART: [art] Derive CDI
3,055,401 UART: [art] Store in slot 0x4
3,141,248 UART: [art] Derive Key Pair
3,141,608 UART: [art] Store priv key in slot 0x5
3,154,978 UART: [art] Derive Key Pair - Done
3,169,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,218 UART: [art] PUB.X = 04929F0C725DFD2ED670F1AAFE155029E0EDA26B342FE9E26B2C308A5E2396099534D64FB4F40726690392EDBB81645A
3,192,977 UART: [art] PUB.Y = 6B1E5AF678988C331E8E6EDD1AB18B51175967A041B298E0B938A24E40C905577A0AD40A34F67CB79607FD6EE3F1DE77
3,199,921 UART: [art] SIG.R = 084AD5DAB55019AEF5CCBA2E5D97CA98A1FAE17E25715450187E0F6BB4E3DF7B3067EE9E5440F394200487A96FF53242
3,206,692 UART: [art] SIG.S = F133D7D582CA5941627B1105CBFDEB28BCD6AED21370543440268E902411D1CC197E39ECF01B881E6E102DFCEDE5466C
3,230,651 UART: Caliptra RT
3,230,994 UART: [state] CFI Enabled
3,351,041 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,981 UART:
3,352,997 UART: Running Caliptra ROM ...
3,353,405 UART:
3,353,547 UART: [state] CFI Enabled
3,355,795 UART: [state] LifecycleState = Unprovisioned
3,356,450 UART: [state] DebugLocked = No
3,356,944 UART: [state] WD Timer not started. Device not locked for debugging
3,358,174 UART: [kat] SHA2-256
4,161,724 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,165,828 UART: [kat] ++
4,165,980 UART: [kat] sha1
4,170,242 UART: [kat] SHA2-256
4,172,182 UART: [kat] SHA2-384
4,175,005 UART: [kat] SHA2-512-ACC
4,176,905 UART: [kat] ECC-384
4,186,552 UART: [kat] HMAC-384Kdf
4,191,112 UART: [kat] LMS
4,439,424 UART: [kat] --
4,440,546 UART: [update-reset] ++
4,455,489 >>> mbox cmd response: failed
4,455,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,455,853 UART: ROM Non-Fatal Error: 0x000B001D
4,456,639 UART: [state] Locking Datavault
4,457,531 UART: [state] Locking PCR0, PCR1 and PCR31
4,458,135 UART: [state] Locking ICCM
4,458,599 UART: [exit] Launching FMC @ 0x40000130
4,463,929 UART:
4,463,945 UART: Running Caliptra FMC ...
4,464,353 UART:
4,464,496 UART: [state] CFI Enabled
4,553,527 UART: [art] Extend RT PCRs Done
4,553,955 UART: [art] Lock RT PCRs Done
4,555,260 UART: [art] Populate DV Done
4,563,717 UART: [fht] FMC Alias Private Key: 7
4,564,851 UART: [art] Derive CDI
4,565,131 UART: [art] Store in slot 0x4
4,651,012 UART: [art] Derive Key Pair
4,651,372 UART: [art] Store priv key in slot 0x5
4,664,520 UART: [art] Derive Key Pair - Done
4,679,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,695,037 UART: [art] Erasing AUTHORITY.KEYID = 7
4,695,802 UART: [art] PUB.X = 04929F0C725DFD2ED670F1AAFE155029E0EDA26B342FE9E26B2C308A5E2396099534D64FB4F40726690392EDBB81645A
4,702,561 UART: [art] PUB.Y = 6B1E5AF678988C331E8E6EDD1AB18B51175967A041B298E0B938A24E40C905577A0AD40A34F67CB79607FD6EE3F1DE77
4,709,505 UART: [art] SIG.R = 084AD5DAB55019AEF5CCBA2E5D97CA98A1FAE17E25715450187E0F6BB4E3DF7B3067EE9E5440F394200487A96FF53242
4,716,276 UART: [art] SIG.S = F133D7D582CA5941627B1105CBFDEB28BCD6AED21370543440268E902411D1CC197E39ECF01B881E6E102DFCEDE5466C
4,740,403 UART: Caliptra RT
4,740,746 UART: [state] CFI Enabled
5,102,426 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,103,899 UART:
5,103,915 UART: Running Caliptra ROM ...
5,104,323 UART:
5,104,465 UART: [state] CFI Enabled
5,107,085 UART: [state] LifecycleState = Unprovisioned
5,107,740 UART: [state] DebugLocked = No
5,108,392 UART: [state] WD Timer not started. Device not locked for debugging
5,109,648 UART: [kat] SHA2-256
5,913,198 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,917,302 UART: [kat] ++
5,917,454 UART: [kat] sha1
5,921,532 UART: [kat] SHA2-256
5,923,472 UART: [kat] SHA2-384
5,926,129 UART: [kat] SHA2-512-ACC
5,928,029 UART: [kat] ECC-384
5,937,864 UART: [kat] HMAC-384Kdf
5,942,532 UART: [kat] LMS
6,190,844 UART: [kat] --
6,191,760 UART: [update-reset] ++
7,550,061 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,551,040 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,706,255 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,061 >>> mbox cmd response: success
2,680,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,741,814 UART:
2,741,830 UART: Running Caliptra FMC ...
2,742,238 UART:
2,742,381 UART: [state] CFI Enabled
2,752,809 UART: [fht] FMC Alias Private Key: 7
2,872,081 UART: [art] Extend RT PCRs Done
2,872,509 UART: [art] Lock RT PCRs Done
2,874,215 UART: [art] Populate DV Done
2,882,584 UART: [fht] FMC Alias Private Key: 7
2,883,548 UART: [art] Derive CDI
2,883,828 UART: [art] Store in slot 0x4
2,969,645 UART: [art] Derive Key Pair
2,970,005 UART: [art] Store priv key in slot 0x5
2,983,019 UART: [art] Derive Key Pair - Done
2,997,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,969 UART: [art] PUB.X = 38BAEE92F7556C95B52D49C810D4C1F6B2267EC3B9069A113AA78A7CD73CBAF37F2B39F7DCD339618DC8EC6A3252C6D2
3,020,752 UART: [art] PUB.Y = 1E434C6C7FDC06B439ED0A7AB3EE17278B8BEE682FEC48C69CABB7C5ED506FDDF24C001272C82EE888CE38C82D78CCA7
3,027,700 UART: [art] SIG.R = 93E8451B5A41C519AACF157C890AA6E29CB6B1ADCCA048142C809E3CAAD22F67FCC511FAEF2C940D43E9F08F154B4A2F
3,034,486 UART: [art] SIG.S = 32FF6D28387F0385BBE6E560112B37853F8C32698D10F4DBDD13B8DB87699BD5987D116B507E38239B8A7810FB8D9BEE
3,058,129 UART: Caliptra RT
3,058,472 UART: [state] CFI Enabled
3,178,511 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,169,704 >>> mbox cmd response: failed
4,169,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,175,566 UART:
4,175,582 UART: Running Caliptra FMC ...
4,175,990 UART:
4,176,133 UART: [state] CFI Enabled
4,265,666 UART: [art] Extend RT PCRs Done
4,266,094 UART: [art] Lock RT PCRs Done
4,267,503 UART: [art] Populate DV Done
4,275,936 UART: [fht] FMC Alias Private Key: 7
4,277,020 UART: [art] Derive CDI
4,277,300 UART: [art] Store in slot 0x4
4,363,229 UART: [art] Derive Key Pair
4,363,589 UART: [art] Store priv key in slot 0x5
4,376,529 UART: [art] Derive Key Pair - Done
4,391,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,407,162 UART: [art] Erasing AUTHORITY.KEYID = 7
4,407,927 UART: [art] PUB.X = 38BAEE92F7556C95B52D49C810D4C1F6B2267EC3B9069A113AA78A7CD73CBAF37F2B39F7DCD339618DC8EC6A3252C6D2
4,414,710 UART: [art] PUB.Y = 1E434C6C7FDC06B439ED0A7AB3EE17278B8BEE682FEC48C69CABB7C5ED506FDDF24C001272C82EE888CE38C82D78CCA7
4,421,658 UART: [art] SIG.R = 93E8451B5A41C519AACF157C890AA6E29CB6B1ADCCA048142C809E3CAAD22F67FCC511FAEF2C940D43E9F08F154B4A2F
4,428,444 UART: [art] SIG.S = 32FF6D28387F0385BBE6E560112B37853F8C32698D10F4DBDD13B8DB87699BD5987D116B507E38239B8A7810FB8D9BEE
4,452,361 UART: Caliptra RT
4,452,704 UART: [state] CFI Enabled
4,813,176 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,302,489 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
893,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,513 UART: [kat] ++
897,665 UART: [kat] sha1
901,943 UART: [kat] SHA2-256
903,883 UART: [kat] SHA2-384
906,578 UART: [kat] SHA2-512-ACC
908,479 UART: [kat] ECC-384
918,008 UART: [kat] HMAC-384Kdf
922,812 UART: [kat] LMS
1,171,140 UART: [kat] --
1,172,297 UART: [cold-reset] ++
1,172,659 UART: [fht] FHT @ 0x50003400
1,175,230 UART: [idev] ++
1,175,398 UART: [idev] CDI.KEYID = 6
1,175,758 UART: [idev] SUBJECT.KEYID = 7
1,176,182 UART: [idev] UDS.KEYID = 0
1,176,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,142 UART: [idev] Erasing UDS.KEYID = 0
1,200,829 UART: [idev] Sha1 KeyId Algorithm
1,209,513 UART: [idev] --
1,210,589 UART: [ldev] ++
1,210,757 UART: [ldev] CDI.KEYID = 6
1,211,120 UART: [ldev] SUBJECT.KEYID = 5
1,211,546 UART: [ldev] AUTHORITY.KEYID = 7
1,212,009 UART: [ldev] FE.KEYID = 1
1,217,173 UART: [ldev] Erasing FE.KEYID = 1
1,243,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,075 UART: [ldev] --
1,282,492 UART: [fwproc] Wait for Commands...
1,283,184 UART: [fwproc] Recv command 0x46574c44
1,283,912 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,932 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,102 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,335 >>> mbox cmd response: success
2,827,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,828,417 UART: [afmc] ++
2,828,585 UART: [afmc] CDI.KEYID = 6
2,828,947 UART: [afmc] SUBJECT.KEYID = 7
2,829,372 UART: [afmc] AUTHORITY.KEYID = 5
2,864,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,286 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,034 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,743 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,626 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,327 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,117 UART: [afmc] --
2,908,009 UART: [cold-reset] --
2,908,729 UART: [state] Locking Datavault
2,909,814 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,418 UART: [state] Locking ICCM
2,911,070 UART: [exit] Launching FMC @ 0x40000130
2,916,400 UART:
2,916,416 UART: Running Caliptra FMC ...
2,916,824 UART:
2,916,878 UART: [state] CFI Enabled
2,927,122 UART: [fht] FMC Alias Private Key: 7
3,045,852 UART: [art] Extend RT PCRs Done
3,046,280 UART: [art] Lock RT PCRs Done
3,047,868 UART: [art] Populate DV Done
3,055,951 UART: [fht] FMC Alias Private Key: 7
3,057,101 UART: [art] Derive CDI
3,057,381 UART: [art] Store in slot 0x4
3,142,664 UART: [art] Derive Key Pair
3,143,024 UART: [art] Store priv key in slot 0x5
3,155,910 UART: [art] Derive Key Pair - Done
3,170,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,823 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,588 UART: [art] PUB.X = 2B05F7D836B403FC95CE56ED1B194136D6FBD70D4CB99A00D25D497B0AC2011949C5D2A1A7B75FEA95EBC36D83581645
3,193,331 UART: [art] PUB.Y = AA87F2EA5297FA913AAFB298F4C8F75D0060AC6C9E198BD60BBB14AF6B1BC30ACCEA7A4A6A840F54245C389F50783CAD
3,200,274 UART: [art] SIG.R = 77BB40BF84A7B187F816B0FEE3EEFCE0D9B9D877288A4FF9A229AE2FF32681CECA3CF0E59B439458B833BF342F4896DE
3,207,064 UART: [art] SIG.S = 08586A6FB9C7FF3D36797AADAF7BE2F6BC06469D0B7339FB7DC2334EADD271EF6A30B9758A4F1634A1C9593C5DF9A6D0
3,230,907 UART: Caliptra RT
3,231,158 UART: [state] CFI Enabled
3,350,928 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,186 UART:
3,353,202 UART: Running Caliptra ROM ...
3,353,610 UART:
3,353,665 UART: [state] CFI Enabled
3,356,061 UART: [state] LifecycleState = Unprovisioned
3,356,716 UART: [state] DebugLocked = No
3,357,284 UART: [state] WD Timer not started. Device not locked for debugging
3,358,636 UART: [kat] SHA2-256
4,164,286 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,168,411 UART: [kat] ++
4,168,563 UART: [kat] sha1
4,172,883 UART: [kat] SHA2-256
4,174,823 UART: [kat] SHA2-384
4,177,588 UART: [kat] SHA2-512-ACC
4,179,488 UART: [kat] ECC-384
4,189,195 UART: [kat] HMAC-384Kdf
4,193,559 UART: [kat] LMS
4,441,887 UART: [kat] --
4,442,819 UART: [update-reset] ++
4,458,490 >>> mbox cmd response: failed
4,458,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,458,922 UART: ROM Non-Fatal Error: 0x000B001D
4,459,846 UART: [state] Locking Datavault
4,460,536 UART: [state] Locking PCR0, PCR1 and PCR31
4,461,140 UART: [state] Locking ICCM
4,461,684 UART: [exit] Launching FMC @ 0x40000130
4,467,014 UART:
4,467,030 UART: Running Caliptra FMC ...
4,467,438 UART:
4,467,492 UART: [state] CFI Enabled
4,556,863 UART: [art] Extend RT PCRs Done
4,557,291 UART: [art] Lock RT PCRs Done
4,558,568 UART: [art] Populate DV Done
4,566,849 UART: [fht] FMC Alias Private Key: 7
4,567,979 UART: [art] Derive CDI
4,568,259 UART: [art] Store in slot 0x4
4,653,834 UART: [art] Derive Key Pair
4,654,194 UART: [art] Store priv key in slot 0x5
4,667,242 UART: [art] Derive Key Pair - Done
4,681,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,697,875 UART: [art] Erasing AUTHORITY.KEYID = 7
4,698,640 UART: [art] PUB.X = 2B05F7D836B403FC95CE56ED1B194136D6FBD70D4CB99A00D25D497B0AC2011949C5D2A1A7B75FEA95EBC36D83581645
4,705,383 UART: [art] PUB.Y = AA87F2EA5297FA913AAFB298F4C8F75D0060AC6C9E198BD60BBB14AF6B1BC30ACCEA7A4A6A840F54245C389F50783CAD
4,712,326 UART: [art] SIG.R = 77BB40BF84A7B187F816B0FEE3EEFCE0D9B9D877288A4FF9A229AE2FF32681CECA3CF0E59B439458B833BF342F4896DE
4,719,116 UART: [art] SIG.S = 08586A6FB9C7FF3D36797AADAF7BE2F6BC06469D0B7339FB7DC2334EADD271EF6A30B9758A4F1634A1C9593C5DF9A6D0
4,742,275 UART: Caliptra RT
4,742,526 UART: [state] CFI Enabled
5,105,657 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,107,412 UART:
5,107,428 UART: Running Caliptra ROM ...
5,107,836 UART:
5,107,891 UART: [state] CFI Enabled
5,110,797 UART: [state] LifecycleState = Unprovisioned
5,111,452 UART: [state] DebugLocked = No
5,112,100 UART: [state] WD Timer not started. Device not locked for debugging
5,113,252 UART: [kat] SHA2-256
5,918,902 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,923,027 UART: [kat] ++
5,923,179 UART: [kat] sha1
5,927,575 UART: [kat] SHA2-256
5,929,515 UART: [kat] SHA2-384
5,932,228 UART: [kat] SHA2-512-ACC
5,934,128 UART: [kat] ECC-384
5,943,535 UART: [kat] HMAC-384Kdf
5,948,103 UART: [kat] LMS
6,196,431 UART: [kat] --
6,197,353 UART: [update-reset] ++
7,556,447 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,557,408 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,712,623 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,702 >>> mbox cmd response: success
2,681,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,743,403 UART:
2,743,419 UART: Running Caliptra FMC ...
2,743,827 UART:
2,743,881 UART: [state] CFI Enabled
2,754,251 UART: [fht] FMC Alias Private Key: 7
2,872,859 UART: [art] Extend RT PCRs Done
2,873,287 UART: [art] Lock RT PCRs Done
2,875,171 UART: [art] Populate DV Done
2,883,488 UART: [fht] FMC Alias Private Key: 7
2,884,480 UART: [art] Derive CDI
2,884,760 UART: [art] Store in slot 0x4
2,970,785 UART: [art] Derive Key Pair
2,971,145 UART: [art] Store priv key in slot 0x5
2,983,945 UART: [art] Derive Key Pair - Done
2,998,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,098 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,863 UART: [art] PUB.X = BD2567C61A7D5C62EF98B102C26D4D5E522C60606F8F4419AF58F334ECD577807A911658B7F4E8BFDB158D285C457C64
3,021,634 UART: [art] PUB.Y = 03C3C18638853065A13CAAD915733077DE447A5A57271F8DD54A0B6FA5D738ECBD6CD0EBAE5F7460190FBEFF704F6990
3,028,585 UART: [art] SIG.R = 4ED5FA712060271E8434BCCF142D3537264A84DD3F5C003A8836BC4FF7113D0868F4D1623584DB264178E43D3667392E
3,035,324 UART: [art] SIG.S = 6D92584C60D9262C97BB4D0653B2DCA3031A3C938F3CC6E5D4A3C03EC7CA34C4007EA83D90124C8ED0D53EC3406985E1
3,058,904 UART: Caliptra RT
3,059,155 UART: [state] CFI Enabled
3,178,577 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,171,289 >>> mbox cmd response: failed
4,171,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,177,019 UART:
4,177,035 UART: Running Caliptra FMC ...
4,177,443 UART:
4,177,497 UART: [state] CFI Enabled
4,266,810 UART: [art] Extend RT PCRs Done
4,267,238 UART: [art] Lock RT PCRs Done
4,268,583 UART: [art] Populate DV Done
4,276,620 UART: [fht] FMC Alias Private Key: 7
4,277,686 UART: [art] Derive CDI
4,277,966 UART: [art] Store in slot 0x4
4,363,521 UART: [art] Derive Key Pair
4,363,881 UART: [art] Store priv key in slot 0x5
4,376,917 UART: [art] Derive Key Pair - Done
4,391,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,407,038 UART: [art] Erasing AUTHORITY.KEYID = 7
4,407,803 UART: [art] PUB.X = BD2567C61A7D5C62EF98B102C26D4D5E522C60606F8F4419AF58F334ECD577807A911658B7F4E8BFDB158D285C457C64
4,414,574 UART: [art] PUB.Y = 03C3C18638853065A13CAAD915733077DE447A5A57271F8DD54A0B6FA5D738ECBD6CD0EBAE5F7460190FBEFF704F6990
4,421,525 UART: [art] SIG.R = 4ED5FA712060271E8434BCCF142D3537264A84DD3F5C003A8836BC4FF7113D0868F4D1623584DB264178E43D3667392E
4,428,264 UART: [art] SIG.S = 6D92584C60D9262C97BB4D0653B2DCA3031A3C938F3CC6E5D4A3C03EC7CA34C4007EA83D90124C8ED0D53EC3406985E1
4,451,764 UART: Caliptra RT
4,452,015 UART: [state] CFI Enabled
4,816,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,307,351 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
87,088 UART: [state] WD Timer not started. Device not locked for debugging
88,341 UART: [kat] SHA2-256
893,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,116 UART: [kat] ++
898,268 UART: [kat] sha1
902,642 UART: [kat] SHA2-256
904,582 UART: [kat] SHA2-384
907,317 UART: [kat] SHA2-512-ACC
909,218 UART: [kat] ECC-384
918,775 UART: [kat] HMAC-384Kdf
923,371 UART: [kat] LMS
1,171,699 UART: [kat] --
1,172,666 UART: [cold-reset] ++
1,173,096 UART: [fht] FHT @ 0x50003400
1,175,599 UART: [idev] ++
1,175,767 UART: [idev] CDI.KEYID = 6
1,176,127 UART: [idev] SUBJECT.KEYID = 7
1,176,551 UART: [idev] UDS.KEYID = 0
1,176,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,869 UART: [idev] Erasing UDS.KEYID = 0
1,202,286 UART: [idev] Sha1 KeyId Algorithm
1,210,686 UART: [idev] --
1,211,892 UART: [ldev] ++
1,212,060 UART: [ldev] CDI.KEYID = 6
1,212,423 UART: [ldev] SUBJECT.KEYID = 5
1,212,849 UART: [ldev] AUTHORITY.KEYID = 7
1,213,312 UART: [ldev] FE.KEYID = 1
1,218,820 UART: [ldev] Erasing FE.KEYID = 1
1,245,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,344 UART: [ldev] --
1,284,611 UART: [fwproc] Wait for Commands...
1,285,201 UART: [fwproc] Recv command 0x46574c44
1,285,929 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,491 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,661 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,836 >>> mbox cmd response: success
2,829,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,831,020 UART: [afmc] ++
2,831,188 UART: [afmc] CDI.KEYID = 6
2,831,550 UART: [afmc] SUBJECT.KEYID = 7
2,831,975 UART: [afmc] AUTHORITY.KEYID = 5
2,867,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,281 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,990 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,873 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,574 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,408 UART: [afmc] --
2,910,470 UART: [cold-reset] --
2,911,080 UART: [state] Locking Datavault
2,912,171 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,775 UART: [state] Locking ICCM
2,913,265 UART: [exit] Launching FMC @ 0x40000130
2,918,595 UART:
2,918,611 UART: Running Caliptra FMC ...
2,919,019 UART:
2,919,162 UART: [state] CFI Enabled
2,929,854 UART: [fht] FMC Alias Private Key: 7
3,049,082 UART: [art] Extend RT PCRs Done
3,049,510 UART: [art] Lock RT PCRs Done
3,051,002 UART: [art] Populate DV Done
3,059,347 UART: [fht] FMC Alias Private Key: 7
3,060,349 UART: [art] Derive CDI
3,060,629 UART: [art] Store in slot 0x4
3,147,102 UART: [art] Derive Key Pair
3,147,462 UART: [art] Store priv key in slot 0x5
3,160,808 UART: [art] Derive Key Pair - Done
3,175,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,744 UART: [art] PUB.X = 033F48728E6109B52023515E6877DC617C28469E5CAFE5C171C00014CF4625FB5223B6A38AC6F5E9D4AA7C6C6E288314
3,198,484 UART: [art] PUB.Y = A8169438229F60668EC309AB463B625F48357277F6CCA4F18DC7B83DE4EA62DFB2D9945E124E9E8DF0B5CF5D99C1BF1E
3,205,443 UART: [art] SIG.R = 8170C4ABE8CAAEBB8114BB81CBE4B47EA090F6BE516601AEB60C8C2DD6FB1F86A95983907E89BE1A2DF24A080A5ED606
3,212,220 UART: [art] SIG.S = 77CF389F126E575CF983AB358F25EE5435D3A06FF175ED0343F1404E531E41A4E4FEBB5F35044D22B747B990C1BFEC05
3,235,763 UART: Caliptra RT
3,236,106 UART: [state] CFI Enabled
3,355,483 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,357,471 UART:
3,357,487 UART: Running Caliptra ROM ...
3,357,895 UART:
3,358,037 UART: [state] CFI Enabled
3,360,803 UART: [state] LifecycleState = Unprovisioned
3,361,458 UART: [state] DebugLocked = No
3,362,078 UART: [state] WD Timer not started. Device not locked for debugging
3,363,204 UART: [kat] SHA2-256
4,168,854 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,172,979 UART: [kat] ++
4,173,131 UART: [kat] sha1
4,177,281 UART: [kat] SHA2-256
4,179,221 UART: [kat] SHA2-384
4,182,086 UART: [kat] SHA2-512-ACC
4,183,986 UART: [kat] ECC-384
4,194,031 UART: [kat] HMAC-384Kdf
4,198,801 UART: [kat] LMS
4,447,129 UART: [kat] --
4,448,107 UART: [update-reset] ++
4,463,716 >>> mbox cmd response: failed
4,463,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,464,040 UART: ROM Non-Fatal Error: 0x000B001D
4,464,922 UART: [state] Locking Datavault
4,465,712 UART: [state] Locking PCR0, PCR1 and PCR31
4,466,316 UART: [state] Locking ICCM
4,466,856 UART: [exit] Launching FMC @ 0x40000130
4,472,186 UART:
4,472,202 UART: Running Caliptra FMC ...
4,472,610 UART:
4,472,753 UART: [state] CFI Enabled
4,561,598 UART: [art] Extend RT PCRs Done
4,562,026 UART: [art] Lock RT PCRs Done
4,563,343 UART: [art] Populate DV Done
4,571,434 UART: [fht] FMC Alias Private Key: 7
4,572,398 UART: [art] Derive CDI
4,572,678 UART: [art] Store in slot 0x4
4,658,123 UART: [art] Derive Key Pair
4,658,483 UART: [art] Store priv key in slot 0x5
4,672,543 UART: [art] Derive Key Pair - Done
4,687,091 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,702,776 UART: [art] Erasing AUTHORITY.KEYID = 7
4,703,541 UART: [art] PUB.X = 033F48728E6109B52023515E6877DC617C28469E5CAFE5C171C00014CF4625FB5223B6A38AC6F5E9D4AA7C6C6E288314
4,710,281 UART: [art] PUB.Y = A8169438229F60668EC309AB463B625F48357277F6CCA4F18DC7B83DE4EA62DFB2D9945E124E9E8DF0B5CF5D99C1BF1E
4,717,240 UART: [art] SIG.R = 8170C4ABE8CAAEBB8114BB81CBE4B47EA090F6BE516601AEB60C8C2DD6FB1F86A95983907E89BE1A2DF24A080A5ED606
4,724,017 UART: [art] SIG.S = 77CF389F126E575CF983AB358F25EE5435D3A06FF175ED0343F1404E531E41A4E4FEBB5F35044D22B747B990C1BFEC05
4,747,710 UART: Caliptra RT
4,748,053 UART: [state] CFI Enabled
5,114,151 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,115,560 UART:
5,115,576 UART: Running Caliptra ROM ...
5,115,984 UART:
5,116,126 UART: [state] CFI Enabled
5,118,988 UART: [state] LifecycleState = Unprovisioned
5,119,643 UART: [state] DebugLocked = No
5,120,231 UART: [state] WD Timer not started. Device not locked for debugging
5,121,435 UART: [kat] SHA2-256
5,927,085 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,931,210 UART: [kat] ++
5,931,362 UART: [kat] sha1
5,935,512 UART: [kat] SHA2-256
5,937,452 UART: [kat] SHA2-384
5,940,157 UART: [kat] SHA2-512-ACC
5,942,057 UART: [kat] ECC-384
5,951,644 UART: [kat] HMAC-384Kdf
5,956,080 UART: [kat] LMS
6,204,408 UART: [kat] --
6,205,228 UART: [update-reset] ++
7,565,278 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,566,363 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,721,578 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,007 >>> mbox cmd response: success
2,681,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,743,084 UART:
2,743,100 UART: Running Caliptra FMC ...
2,743,508 UART:
2,743,651 UART: [state] CFI Enabled
2,754,199 UART: [fht] FMC Alias Private Key: 7
2,873,323 UART: [art] Extend RT PCRs Done
2,873,751 UART: [art] Lock RT PCRs Done
2,875,217 UART: [art] Populate DV Done
2,883,542 UART: [fht] FMC Alias Private Key: 7
2,884,716 UART: [art] Derive CDI
2,884,996 UART: [art] Store in slot 0x4
2,971,031 UART: [art] Derive Key Pair
2,971,391 UART: [art] Store priv key in slot 0x5
2,984,115 UART: [art] Derive Key Pair - Done
2,998,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,731 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,496 UART: [art] PUB.X = B714DADA786366B87F2858EBA9364ED596D0FEAC661EBF0D42A411C77EB0A21ED3BEE1DA4A2AF5CA99EA94835990C783
3,022,283 UART: [art] PUB.Y = 1EDB9D5522D82F1048B4CC39CF6653FE857EE24D92C62D651E6E0325D480CA0EC752C54FBBAD8B16D8665A181B6C0D9C
3,029,238 UART: [art] SIG.R = C9919BF35C612319ECDB371289287635ADCE85D3706A5F707830B19900A11CDA773C45B8DC677651692B4B769BEFF18C
3,035,986 UART: [art] SIG.S = ACEA58D5389547D4891F73DDAD9B1F18966E149DAC0C034B8B8953DE409C60C089BF5FFA42D1F5098F1CE18FED3B5F6C
3,060,135 UART: Caliptra RT
3,060,478 UART: [state] CFI Enabled
3,179,234 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,173,023 >>> mbox cmd response: failed
4,173,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,179,077 UART:
4,179,093 UART: Running Caliptra FMC ...
4,179,501 UART:
4,179,644 UART: [state] CFI Enabled
4,268,909 UART: [art] Extend RT PCRs Done
4,269,337 UART: [art] Lock RT PCRs Done
4,270,660 UART: [art] Populate DV Done
4,278,965 UART: [fht] FMC Alias Private Key: 7
4,280,029 UART: [art] Derive CDI
4,280,309 UART: [art] Store in slot 0x4
4,365,810 UART: [art] Derive Key Pair
4,366,170 UART: [art] Store priv key in slot 0x5
4,379,650 UART: [art] Derive Key Pair - Done
4,394,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,409,878 UART: [art] Erasing AUTHORITY.KEYID = 7
4,410,643 UART: [art] PUB.X = B714DADA786366B87F2858EBA9364ED596D0FEAC661EBF0D42A411C77EB0A21ED3BEE1DA4A2AF5CA99EA94835990C783
4,417,430 UART: [art] PUB.Y = 1EDB9D5522D82F1048B4CC39CF6653FE857EE24D92C62D651E6E0325D480CA0EC752C54FBBAD8B16D8665A181B6C0D9C
4,424,385 UART: [art] SIG.R = C9919BF35C612319ECDB371289287635ADCE85D3706A5F707830B19900A11CDA773C45B8DC677651692B4B769BEFF18C
4,431,133 UART: [art] SIG.S = ACEA58D5389547D4891F73DDAD9B1F18966E149DAC0C034B8B8953DE409C60C089BF5FFA42D1F5098F1CE18FED3B5F6C
4,455,234 UART: Caliptra RT
4,455,577 UART: [state] CFI Enabled
4,819,670 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,311,788 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,217 UART:
192,575 UART: Running Caliptra ROM ...
193,771 UART:
193,927 UART: [state] CFI Enabled
263,138 UART: [state] LifecycleState = Unprovisioned
265,132 UART: [state] DebugLocked = No
268,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,316 UART: [kat] SHA2-256
442,054 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,571 UART: [kat] ++
453,020 UART: [kat] sha1
463,468 UART: [kat] SHA2-256
466,158 UART: [kat] SHA2-384
472,733 UART: [kat] SHA2-512-ACC
475,069 UART: [kat] ECC-384
2,765,658 UART: [kat] HMAC-384Kdf
2,796,699 UART: [kat] LMS
3,986,986 UART: [kat] --
3,992,930 UART: [cold-reset] ++
3,994,819 UART: [fht] Storing FHT @ 0x50003400
4,006,686 UART: [idev] ++
4,007,289 UART: [idev] CDI.KEYID = 6
4,008,215 UART: [idev] SUBJECT.KEYID = 7
4,009,443 UART: [idev] UDS.KEYID = 0
4,013,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,229 UART: [idev] Erasing UDS.KEYID = 0
7,342,201 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,022 UART: [idev] --
7,368,184 UART: [ldev] ++
7,368,758 UART: [ldev] CDI.KEYID = 6
7,369,698 UART: [ldev] SUBJECT.KEYID = 5
7,370,919 UART: [ldev] AUTHORITY.KEYID = 7
7,372,210 UART: [ldev] FE.KEYID = 1
7,417,613 UART: [ldev] Erasing FE.KEYID = 1
10,753,974 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,053,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,097,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,116,112 UART: [ldev] --
13,120,353 UART: [fwproc] Waiting for Commands...
13,123,052 UART: [fwproc] Received command 0x46574c44
13,125,249 UART: [fwproc] Received Image of size 118548 bytes
17,226,071 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,301,680 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,875 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,873 >>> mbox cmd response: success
17,705,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,854,869 UART: [afmc] ++
17,855,509 UART: [afmc] CDI.KEYID = 6
17,856,431 UART: [afmc] SUBJECT.KEYID = 7
17,857,544 UART: [afmc] AUTHORITY.KEYID = 5
21,077,738 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,380,008 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,382,316 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
23,396,794 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
23,411,416 UART: [afmc] SIG.R = 1B808139A82154D7829344C14F7B3DCF8F462FA097D7D853513EE4FCF41FDEC17279B80A528F0E3E44F7259FC827691F
23,425,717 UART: [afmc] SIG.S = A280234D1482F252CC9ACF9F10C4B2975C754071275AA8869D333FFCFC50C67A43378261ED7FEE9C46891DD00B478232
23,446,776 UART: [afmc] --
23,449,945 UART: [cold-reset] --
23,453,980 UART: [state] Locking Datavault
23,458,032 UART: [state] Locking PCR0, PCR1 and PCR31
23,459,799 UART: [state] Locking ICCM
23,461,416 UART: [exit] Launching FMC @ 0x40000130
23,469,816 UART:
23,470,059 UART: Running Caliptra FMC ...
23,471,166 UART:
23,471,334 UART: [state] CFI Enabled
23,538,878 UART: [fht] FMC Alias Private Key: 7
25,879,446 UART: [art] Extend RT PCRs Done
25,880,672 UART: [art] Lock RT PCRs Done
25,882,246 UART: [art] Populate DV Done
25,887,504 UART: [fht] FMC Alias Private Key: 7
25,888,993 UART: [art] Derive CDI
25,889,810 UART: [art] Store in slot 0x4
25,946,669 UART: [art] Derive Key Pair
25,947,709 UART: [art] Store priv key in slot 0x5
29,240,540 UART: [art] Derive Key Pair - Done
29,253,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,542,185 UART: [art] Erasing AUTHORITY.KEYID = 7
31,543,699 UART: [art] PUB.X = 4D7247BB031A311D67C23FE8CF62767616A1FB6EA6AC034A5CF7DF61B246B7F6A006E74E838E599E39D6DA5CD19224D5
31,551,007 UART: [art] PUB.Y = F912B9FFA5C22334581F4DDC2CC20EFA2777BE8924C0901A2C52D23345B08395D473E4082A246A8B54E4B4588E19E6FF
31,558,244 UART: [art] SIG.R = 4BC47B6DE3A23583ADE6B8B0D2B4119AA23E6656CFEA22D02E4213C16E7312D4649F87D504BBB812AEC214EB151E47D1
31,565,644 UART: [art] SIG.S = B3574C4E8CD8F106FEA8A2E1F3721005B75152A161B1989AB1FDC826D1F9F506F03FAA58CE0FEEB594928F690DA5DCD6
32,871,181 UART: Caliptra RT
32,871,924 UART: [state] CFI Enabled
33,046,587 UART: [rt] RT listening for mailbox commands...
33,049,451 UART:
33,049,624 UART: Running Caliptra ROM ...
33,050,747 UART:
33,050,908 UART: [state] CFI Enabled
33,117,957 UART: [state] LifecycleState = Unprovisioned
33,119,897 UART: [state] DebugLocked = No
33,121,259 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,126,432 UART: [kat] SHA2-256
33,296,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,306,679 UART: [kat] ++
33,307,138 UART: [kat] sha1
33,319,482 UART: [kat] SHA2-256
33,322,172 UART: [kat] SHA2-384
33,328,863 UART: [kat] SHA2-512-ACC
33,331,233 UART: [kat] ECC-384
35,623,256 UART: [kat] HMAC-384Kdf
35,654,382 UART: [kat] LMS
36,844,696 UART: [kat] --
36,849,235 UART: [update-reset] ++
36,957,036 >>> mbox cmd response: failed
36,959,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,108,671 UART: ROM Non-Fatal Error: 0x000B001E
37,110,100 UART: [state] Locking Datavault
37,111,209 UART: [state] Locking PCR0, PCR1 and PCR31
37,112,754 UART: [state] Locking ICCM
37,113,661 UART: [exit] Launching FMC @ 0x40000130
37,115,086 UART:
37,115,254 UART: Running Caliptra FMC ...
37,116,354 UART:
37,116,514 UART: [state] CFI Enabled
37,117,451 UART: [art] Extend RT PCRs Done
37,118,592 UART: [art] Lock RT PCRs Done
37,119,582 UART: [art] Populate DV Done
37,120,528 UART: [fht] FMC Alias Private Key: 7
37,121,844 UART: [art] Derive CDI
37,122,607 UART: [art] Store in slot 0x4
37,146,198 UART: [art] Derive Key Pair
37,147,241 UART: [art] Store priv key in slot 0x5
40,439,684 UART: [art] Derive Key Pair - Done
40,452,803 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,741,657 UART: [art] Erasing AUTHORITY.KEYID = 7
42,743,234 UART: [art] PUB.X = 4D7247BB031A311D67C23FE8CF62767616A1FB6EA6AC034A5CF7DF61B246B7F6A006E74E838E599E39D6DA5CD19224D5
42,750,438 UART: [art] PUB.Y = F912B9FFA5C22334581F4DDC2CC20EFA2777BE8924C0901A2C52D23345B08395D473E4082A246A8B54E4B4588E19E6FF
42,757,666 UART: [art] SIG.R = 4BC47B6DE3A23583ADE6B8B0D2B4119AA23E6656CFEA22D02E4213C16E7312D4649F87D504BBB812AEC214EB151E47D1
42,765,066 UART: [art] SIG.S = B3574C4E8CD8F106FEA8A2E1F3721005B75152A161B1989AB1FDC826D1F9F506F03FAA58CE0FEEB594928F690DA5DCD6
44,070,814 UART: Caliptra RT
44,071,559 UART: [state] CFI Enabled
44,488,823 UART: [rt] RT listening for mailbox commands...
44,491,509 UART:
44,491,701 UART: Running Caliptra ROM ...
44,492,822 UART:
44,492,991 UART: [state] CFI Enabled
44,555,163 UART: [state] LifecycleState = Unprovisioned
44,557,055 UART: [state] DebugLocked = No
44,558,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,563,832 UART: [kat] SHA2-256
44,733,545 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,744,025 UART: [kat] ++
44,744,491 UART: [kat] sha1
44,755,540 UART: [kat] SHA2-256
44,758,237 UART: [kat] SHA2-384
44,764,660 UART: [kat] SHA2-512-ACC
44,767,032 UART: [kat] ECC-384
47,057,404 UART: [kat] HMAC-384Kdf
47,090,969 UART: [kat] LMS
48,281,344 UART: [kat] --
48,286,867 UART: [update-reset] ++
52,485,223 UART: [update-reset] Image verified using Vendor ECC Key Index 3
52,488,643 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
52,886,433 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,784,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,942,699 >>> mbox cmd response: success
17,944,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,630,219 UART:
23,630,658 UART: Running Caliptra FMC ...
23,631,783 UART:
23,631,978 UART: [state] CFI Enabled
23,697,784 UART: [fht] FMC Alias Private Key: 7
26,038,056 UART: [art] Extend RT PCRs Done
26,039,295 UART: [art] Lock RT PCRs Done
26,041,175 UART: [art] Populate DV Done
26,046,618 UART: [fht] FMC Alias Private Key: 7
26,048,219 UART: [art] Derive CDI
26,049,041 UART: [art] Store in slot 0x4
26,106,129 UART: [art] Derive Key Pair
26,107,169 UART: [art] Store priv key in slot 0x5
29,399,733 UART: [art] Derive Key Pair - Done
29,413,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,700,368 UART: [art] Erasing AUTHORITY.KEYID = 7
31,701,883 UART: [art] PUB.X = A51D42ACC34C3ACE562D462464DCF9E248D0AC5B43192D5D52F0708EAEBACBE927F6FC9007BCF3DF0FDDFFAF6E33AE0B
31,709,149 UART: [art] PUB.Y = 79895A1FEA073D407B3464E4D939BC13620F03439F03F4DB286440495D64F20C6AE1F3983F42C991C103B2C6C0C4C146
31,716,395 UART: [art] SIG.R = 02652BE0311B787FBFAC7B44723F8DB65D512F641190E423FDA0F7D26FFBA8184DDC82EE29D34F81B347C941672349F1
31,723,810 UART: [art] SIG.S = 5D4D1868DA089E98FEA1BD709A152B82916DA15F07D85407D66B988E6D16D7818FE7D60B97DD6FB0D14AADDDDD28AB7C
33,029,382 UART: Caliptra RT
33,030,080 UART: [state] CFI Enabled
33,205,455 UART: [rt] RT listening for mailbox commands...
36,909,707 >>> mbox cmd response: failed
36,911,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,060,651 UART:
37,060,985 UART: Running Caliptra FMC ...
37,062,065 UART:
37,062,230 UART: [state] CFI Enabled
37,063,168 UART: [art] Extend RT PCRs Done
37,064,319 UART: [art] Lock RT PCRs Done
37,065,396 UART: [art] Populate DV Done
37,066,379 UART: [fht] FMC Alias Private Key: 7
37,067,780 UART: [art] Derive CDI
37,068,529 UART: [art] Store in slot 0x4
37,087,715 UART: [art] Derive Key Pair
37,088,723 UART: [art] Store priv key in slot 0x5
40,381,616 UART: [art] Derive Key Pair - Done
40,394,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,683,559 UART: [art] Erasing AUTHORITY.KEYID = 7
42,685,069 UART: [art] PUB.X = A51D42ACC34C3ACE562D462464DCF9E248D0AC5B43192D5D52F0708EAEBACBE927F6FC9007BCF3DF0FDDFFAF6E33AE0B
42,692,397 UART: [art] PUB.Y = 79895A1FEA073D407B3464E4D939BC13620F03439F03F4DB286440495D64F20C6AE1F3983F42C991C103B2C6C0C4C146
42,699,638 UART: [art] SIG.R = 02652BE0311B787FBFAC7B44723F8DB65D512F641190E423FDA0F7D26FFBA8184DDC82EE29D34F81B347C941672349F1
42,706,985 UART: [art] SIG.S = 5D4D1868DA089E98FEA1BD709A152B82916DA15F07D85407D66B988E6D16D7818FE7D60B97DD6FB0D14AADDDDD28AB7C
44,012,289 UART: Caliptra RT
44,013,021 UART: [state] CFI Enabled
44,455,551 UART: [rt] RT listening for mailbox commands...
53,108,001 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,449 UART:
192,832 UART: Running Caliptra ROM ...
194,030 UART:
603,517 UART: [state] CFI Enabled
620,556 UART: [state] LifecycleState = Unprovisioned
622,497 UART: [state] DebugLocked = No
624,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,647 UART: [kat] SHA2-256
799,392 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,955 UART: [kat] ++
810,441 UART: [kat] sha1
820,839 UART: [kat] SHA2-256
823,528 UART: [kat] SHA2-384
829,656 UART: [kat] SHA2-512-ACC
832,017 UART: [kat] ECC-384
3,115,243 UART: [kat] HMAC-384Kdf
3,127,046 UART: [kat] LMS
4,317,120 UART: [kat] --
4,322,644 UART: [cold-reset] ++
4,324,379 UART: [fht] Storing FHT @ 0x50003400
4,335,698 UART: [idev] ++
4,336,285 UART: [idev] CDI.KEYID = 6
4,337,174 UART: [idev] SUBJECT.KEYID = 7
4,338,446 UART: [idev] UDS.KEYID = 0
4,341,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,655 UART: [idev] Erasing UDS.KEYID = 0
7,626,049 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,342 UART: [idev] --
7,650,592 UART: [ldev] ++
7,651,174 UART: [ldev] CDI.KEYID = 6
7,652,125 UART: [ldev] SUBJECT.KEYID = 5
7,653,348 UART: [ldev] AUTHORITY.KEYID = 7
7,654,640 UART: [ldev] FE.KEYID = 1
7,664,343 UART: [ldev] Erasing FE.KEYID = 1
10,955,391 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,556 UART: [ldev] --
13,316,110 UART: [fwproc] Waiting for Commands...
13,317,948 UART: [fwproc] Received command 0x46574c44
13,320,138 UART: [fwproc] Received Image of size 118548 bytes
17,423,099 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,502,848 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,990 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,102 >>> mbox cmd response: success
17,905,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,054,802 UART: [afmc] ++
18,055,465 UART: [afmc] CDI.KEYID = 6
18,056,366 UART: [afmc] SUBJECT.KEYID = 7
18,057,430 UART: [afmc] AUTHORITY.KEYID = 5
21,225,373 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,502 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,764 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
23,535,265 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
23,549,835 UART: [afmc] SIG.R = 1B808139A82154D7829344C14F7B3DCF8F462FA097D7D853513EE4FCF41FDEC17279B80A528F0E3E44F7259FC827691F
23,564,228 UART: [afmc] SIG.S = A280234D1482F252CC9ACF9F10C4B2975C754071275AA8869D333FFCFC50C67A43378261ED7FEE9C46891DD00B478232
23,585,277 UART: [afmc] --
23,589,960 UART: [cold-reset] --
23,593,344 UART: [state] Locking Datavault
23,597,844 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,605 UART: [state] Locking ICCM
23,602,191 UART: [exit] Launching FMC @ 0x40000130
23,610,546 UART:
23,610,809 UART: Running Caliptra FMC ...
23,611,921 UART:
23,612,083 UART: [state] CFI Enabled
23,620,138 UART: [fht] FMC Alias Private Key: 7
25,959,726 UART: [art] Extend RT PCRs Done
25,960,963 UART: [art] Lock RT PCRs Done
25,962,597 UART: [art] Populate DV Done
25,967,910 UART: [fht] FMC Alias Private Key: 7
25,969,616 UART: [art] Derive CDI
25,970,437 UART: [art] Store in slot 0x4
26,012,932 UART: [art] Derive Key Pair
26,013,942 UART: [art] Store priv key in slot 0x5
29,255,870 UART: [art] Derive Key Pair - Done
29,269,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,679 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,189 UART: [art] PUB.X = ACD7387FBA0255DA6B19EDEF29FED5F98BC2D3D48E61B5933102A2C6FCFACC714F8BC50BA63527F8EE7C865DE59A1644
31,558,525 UART: [art] PUB.Y = 9CCBAFE7312B42FF0B032456CAE11612A5603A044EDE79E0B70DCF50BEF6CD85D0663870E62137C1684BC660CFAF6C24
31,565,770 UART: [art] SIG.R = 7B7ACFD75A2B17F782313F88CF25DE7B27D3EE771AA9383BAF9E63A7F69AE88E9D5111C18A6746A62D293AE7868048BD
31,573,179 UART: [art] SIG.S = 15023CC61D3EB11D8A381CDDDC4506FFB185062DD91A515CD7402C6BD2315A76C9D7520F757DCC40254A7B0F32208171
32,878,281 UART: Caliptra RT
32,879,000 UART: [state] CFI Enabled
33,011,845 UART: [rt] RT listening for mailbox commands...
33,014,809 UART:
33,015,024 UART: Running Caliptra ROM ...
33,016,054 UART:
33,016,483 UART: [state] CFI Enabled
33,027,415 UART: [state] LifecycleState = Unprovisioned
33,029,306 UART: [state] DebugLocked = No
33,031,854 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,036,969 UART: [kat] SHA2-256
33,206,649 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,217,203 UART: [kat] ++
33,217,684 UART: [kat] sha1
33,228,619 UART: [kat] SHA2-256
33,231,352 UART: [kat] SHA2-384
33,237,566 UART: [kat] SHA2-512-ACC
33,239,919 UART: [kat] ECC-384
35,523,571 UART: [kat] HMAC-384Kdf
35,534,984 UART: [kat] LMS
36,725,042 UART: [kat] --
36,731,817 UART: [update-reset] ++
36,837,941 >>> mbox cmd response: failed
36,840,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,988,959 UART: ROM Non-Fatal Error: 0x000B001E
36,990,399 UART: [state] Locking Datavault
36,991,474 UART: [state] Locking PCR0, PCR1 and PCR31
36,993,016 UART: [state] Locking ICCM
36,993,904 UART: [exit] Launching FMC @ 0x40000130
36,995,279 UART:
36,995,437 UART: Running Caliptra FMC ...
36,996,545 UART:
36,996,702 UART: [state] CFI Enabled
36,997,541 UART: [art] Extend RT PCRs Done
36,998,596 UART: [art] Lock RT PCRs Done
36,999,603 UART: [art] Populate DV Done
37,000,575 UART: [fht] FMC Alias Private Key: 7
37,001,906 UART: [art] Derive CDI
37,002,649 UART: [art] Store in slot 0x4
37,003,638 UART: [art] Derive Key Pair
37,004,577 UART: [art] Store priv key in slot 0x5
40,198,499 UART: [art] Derive Key Pair - Done
40,211,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,491,651 UART: [art] Erasing AUTHORITY.KEYID = 7
42,493,194 UART: [art] PUB.X = ACD7387FBA0255DA6B19EDEF29FED5F98BC2D3D48E61B5933102A2C6FCFACC714F8BC50BA63527F8EE7C865DE59A1644
42,500,488 UART: [art] PUB.Y = 9CCBAFE7312B42FF0B032456CAE11612A5603A044EDE79E0B70DCF50BEF6CD85D0663870E62137C1684BC660CFAF6C24
42,507,729 UART: [art] SIG.R = 7B7ACFD75A2B17F782313F88CF25DE7B27D3EE771AA9383BAF9E63A7F69AE88E9D5111C18A6746A62D293AE7868048BD
42,515,149 UART: [art] SIG.S = 15023CC61D3EB11D8A381CDDDC4506FFB185062DD91A515CD7402C6BD2315A76C9D7520F757DCC40254A7B0F32208171
43,820,037 UART: Caliptra RT
43,820,745 UART: [state] CFI Enabled
44,196,656 UART: [rt] RT listening for mailbox commands...
44,199,582 UART:
44,199,759 UART: Running Caliptra ROM ...
44,200,877 UART:
44,201,204 UART: [state] CFI Enabled
44,215,547 UART: [state] LifecycleState = Unprovisioned
44,217,441 UART: [state] DebugLocked = No
44,218,961 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,224,662 UART: [kat] SHA2-256
44,394,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,404,870 UART: [kat] ++
44,405,346 UART: [kat] sha1
44,417,155 UART: [kat] SHA2-256
44,419,845 UART: [kat] SHA2-384
44,424,483 UART: [kat] SHA2-512-ACC
44,426,872 UART: [kat] ECC-384
46,711,411 UART: [kat] HMAC-384Kdf
46,723,592 UART: [kat] LMS
47,913,675 UART: [kat] --
47,918,930 UART: [update-reset] ++
52,108,088 UART: [update-reset] Image verified using Vendor ECC Key Index 3
52,112,577 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
52,510,365 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
4,127,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,448 >>> mbox cmd response: success
18,159,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,800,180 UART:
23,800,635 UART: Running Caliptra FMC ...
23,801,740 UART:
23,801,909 UART: [state] CFI Enabled
23,809,743 UART: [fht] FMC Alias Private Key: 7
26,149,510 UART: [art] Extend RT PCRs Done
26,150,733 UART: [art] Lock RT PCRs Done
26,152,047 UART: [art] Populate DV Done
26,157,439 UART: [fht] FMC Alias Private Key: 7
26,159,101 UART: [art] Derive CDI
26,159,927 UART: [art] Store in slot 0x4
26,202,316 UART: [art] Derive Key Pair
26,203,326 UART: [art] Store priv key in slot 0x5
29,445,962 UART: [art] Derive Key Pair - Done
29,459,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,682 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,207 UART: [art] PUB.X = DB1427BAED2CB225FD622CF7A19AF0D1953C014DBEC091B14EFA4B47896E5B0B957B5328237AC6876F8C0824E8ADF106
31,748,482 UART: [art] PUB.Y = 27E5325CE126829D898FF45B82B5DD4E954522E93218B66182ECF908D59126A0E2573F4BA5083CDD3E759982957A01E1
31,755,713 UART: [art] SIG.R = 54E13E869EB5ECE10E2F7B19894B338DC8F539AD07235389E421B8DE7989AEA0A672F303A9AEC2B1F1F17DCDADA1C35A
31,763,111 UART: [art] SIG.S = 247541E1FF500E9704E86F7B3124F75F2D7171C21F2D10210AD85ED0141820B69E9D7B9FDA8F6E1B65E7BF44AC30446F
33,068,507 UART: Caliptra RT
33,069,210 UART: [state] CFI Enabled
33,202,762 UART: [rt] RT listening for mailbox commands...
36,844,669 >>> mbox cmd response: failed
36,846,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,995,487 UART:
36,995,810 UART: Running Caliptra FMC ...
36,996,942 UART:
36,997,113 UART: [state] CFI Enabled
36,998,040 UART: [art] Extend RT PCRs Done
36,999,193 UART: [art] Lock RT PCRs Done
37,000,289 UART: [art] Populate DV Done
37,001,340 UART: [fht] FMC Alias Private Key: 7
37,002,735 UART: [art] Derive CDI
37,003,487 UART: [art] Store in slot 0x4
37,004,562 UART: [art] Derive Key Pair
37,005,521 UART: [art] Store priv key in slot 0x5
40,199,932 UART: [art] Derive Key Pair - Done
40,212,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,493,513 UART: [art] Erasing AUTHORITY.KEYID = 7
42,495,036 UART: [art] PUB.X = DB1427BAED2CB225FD622CF7A19AF0D1953C014DBEC091B14EFA4B47896E5B0B957B5328237AC6876F8C0824E8ADF106
42,502,291 UART: [art] PUB.Y = 27E5325CE126829D898FF45B82B5DD4E954522E93218B66182ECF908D59126A0E2573F4BA5083CDD3E759982957A01E1
42,509,525 UART: [art] SIG.R = 54E13E869EB5ECE10E2F7B19894B338DC8F539AD07235389E421B8DE7989AEA0A672F303A9AEC2B1F1F17DCDADA1C35A
42,516,922 UART: [art] SIG.S = 247541E1FF500E9704E86F7B3124F75F2D7171C21F2D10210AD85ED0141820B69E9D7B9FDA8F6E1B65E7BF44AC30446F
43,822,464 UART: Caliptra RT
43,823,194 UART: [state] CFI Enabled
44,196,333 UART: [rt] RT listening for mailbox commands...
52,804,947 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,016 UART:
192,379 UART: Running Caliptra ROM ...
193,508 UART:
193,656 UART: [state] CFI Enabled
257,231 UART: [state] LifecycleState = Unprovisioned
259,205 UART: [state] DebugLocked = No
261,244 UART: [state] WD Timer not started. Device not locked for debugging
264,510 UART: [kat] SHA2-256
444,174 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
454,963 UART: [kat] ++
455,419 UART: [kat] sha1
466,138 UART: [kat] SHA2-256
468,822 UART: [kat] SHA2-384
474,502 UART: [kat] SHA2-512-ACC
476,901 UART: [kat] ECC-384
2,919,716 UART: [kat] HMAC-384Kdf
2,943,863 UART: [kat] LMS
3,420,366 UART: [kat] --
3,424,110 UART: [cold-reset] ++
3,425,899 UART: [fht] FHT @ 0x50003400
3,438,344 UART: [idev] ++
3,438,917 UART: [idev] CDI.KEYID = 6
3,439,939 UART: [idev] SUBJECT.KEYID = 7
3,441,103 UART: [idev] UDS.KEYID = 0
3,444,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,593,390 UART: [idev] Erasing UDS.KEYID = 0
5,957,572 UART: [idev] Sha1 KeyId Algorithm
5,980,745 UART: [idev] --
5,984,617 UART: [ldev] ++
5,985,218 UART: [ldev] CDI.KEYID = 6
5,986,132 UART: [ldev] SUBJECT.KEYID = 5
5,987,354 UART: [ldev] AUTHORITY.KEYID = 7
5,988,591 UART: [ldev] FE.KEYID = 1
6,030,625 UART: [ldev] Erasing FE.KEYID = 1
8,534,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,271,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,286,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,302,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,318,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,339,178 UART: [ldev] --
10,343,852 UART: [fwproc] Wait for Commands...
10,346,016 UART: [fwproc] Recv command 0x46574c44
10,348,018 UART: [fwproc] Recv'd Img size: 118548 bytes
13,826,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,908,562 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,981,578 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,309,741 >>> mbox cmd response: success
14,311,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,460,603 UART: [afmc] ++
14,461,248 UART: [afmc] CDI.KEYID = 6
14,462,171 UART: [afmc] SUBJECT.KEYID = 7
14,463,283 UART: [afmc] AUTHORITY.KEYID = 5
16,848,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,588,884 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,591,117 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,606,991 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,622,993 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,638,662 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,662,086 UART: [afmc] --
18,665,741 UART: [cold-reset] --
18,669,390 UART: [state] Locking Datavault
18,673,752 UART: [state] Locking PCR0, PCR1 and PCR31
18,675,515 UART: [state] Locking ICCM
18,676,860 UART: [exit] Launching FMC @ 0x40000130
18,685,263 UART:
18,685,544 UART: Running Caliptra FMC ...
18,686,662 UART:
18,686,827 UART: [state] CFI Enabled
18,745,926 UART: [fht] FMC Alias Private Key: 7
20,512,379 UART: [art] Extend RT PCRs Done
20,513,615 UART: [art] Lock RT PCRs Done
20,515,161 UART: [art] Populate DV Done
20,520,692 UART: [fht] FMC Alias Private Key: 7
20,522,277 UART: [art] Derive CDI
20,523,113 UART: [art] Store in slot 0x4
20,579,814 UART: [art] Derive Key Pair
20,580,823 UART: [art] Store priv key in slot 0x5
23,043,879 UART: [art] Derive Key Pair - Done
23,056,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,769,569 UART: [art] Erasing AUTHORITY.KEYID = 7
24,771,076 UART: [art] PUB.X = E3FFADFF0D3D9003C22ED27E70FE15E6782FA544D034F58869FCD26B10D55D1BCCDB8F1D6E4682AFB1A6570C9002302F
24,778,341 UART: [art] PUB.Y = BE64A1098783BC650A2F2C962448E3AE2BA70080F488ABF6DC3D894BABB4CDB19CE5E3B8C1F35E6D3531FB2C96B8E527
24,785,637 UART: [art] SIG.R = B8ABAC779FA47A3BB869A86032DFC17DFA602834B59F999BDAA71D27D162CCAB32F7E9ED7B28C0DAC4EBCC8951C3AE90
24,793,040 UART: [art] SIG.S = 89E655261749D6BEF63A6814220886746CE643249C6043017FD9A5897CCED5FCDB65138CAC464422E1A111DDFE149D56
25,772,265 UART: Caliptra RT
25,772,959 UART: [state] CFI Enabled
25,953,548 UART: [rt] RT listening for mailbox commands...
25,956,456 UART:
25,956,628 UART: Running Caliptra ROM ...
25,957,741 UART:
25,957,902 UART: [state] CFI Enabled
26,021,445 UART: [state] LifecycleState = Unprovisioned
26,023,376 UART: [state] DebugLocked = No
26,025,680 UART: [state] WD Timer not started. Device not locked for debugging
26,029,317 UART: [kat] SHA2-256
26,208,999 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,219,794 UART: [kat] ++
26,220,257 UART: [kat] sha1
26,231,629 UART: [kat] SHA2-256
26,234,332 UART: [kat] SHA2-384
26,239,088 UART: [kat] SHA2-512-ACC
26,241,444 UART: [kat] ECC-384
28,687,590 UART: [kat] HMAC-384Kdf
28,712,238 UART: [kat] LMS
29,188,675 UART: [kat] --
29,193,257 UART: [update-reset] ++
29,239,097 >>> mbox cmd response: failed
29,241,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,390,454 UART: ROM Non-Fatal Error: 0x000B001E
29,391,897 UART: [state] Locking Datavault
29,392,999 UART: [state] Locking PCR0, PCR1 and PCR31
29,394,545 UART: [state] Locking ICCM
29,395,452 UART: [exit] Launching FMC @ 0x40000130
29,396,881 UART:
29,397,040 UART: Running Caliptra FMC ...
29,398,147 UART:
29,398,310 UART: [state] CFI Enabled
29,399,234 UART: [art] Extend RT PCRs Done
29,400,373 UART: [art] Lock RT PCRs Done
29,401,664 UART: [art] Populate DV Done
29,402,713 UART: [fht] FMC Alias Private Key: 7
29,404,035 UART: [art] Derive CDI
29,404,779 UART: [art] Store in slot 0x4
29,433,119 UART: [art] Derive Key Pair
29,434,126 UART: [art] Store priv key in slot 0x5
31,896,714 UART: [art] Derive Key Pair - Done
31,909,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,623,238 UART: [art] Erasing AUTHORITY.KEYID = 7
33,624,754 UART: [art] PUB.X = E3FFADFF0D3D9003C22ED27E70FE15E6782FA544D034F58869FCD26B10D55D1BCCDB8F1D6E4682AFB1A6570C9002302F
33,632,071 UART: [art] PUB.Y = BE64A1098783BC650A2F2C962448E3AE2BA70080F488ABF6DC3D894BABB4CDB19CE5E3B8C1F35E6D3531FB2C96B8E527
33,639,315 UART: [art] SIG.R = B8ABAC779FA47A3BB869A86032DFC17DFA602834B59F999BDAA71D27D162CCAB32F7E9ED7B28C0DAC4EBCC8951C3AE90
33,646,760 UART: [art] SIG.S = 89E655261749D6BEF63A6814220886746CE643249C6043017FD9A5897CCED5FCDB65138CAC464422E1A111DDFE149D56
34,625,764 UART: Caliptra RT
34,626,474 UART: [state] CFI Enabled
35,046,093 UART: [rt] RT listening for mailbox commands...
35,048,890 UART:
35,049,149 UART: Running Caliptra ROM ...
35,050,190 UART:
35,050,348 UART: [state] CFI Enabled
35,113,698 UART: [state] LifecycleState = Unprovisioned
35,115,630 UART: [state] DebugLocked = No
35,117,068 UART: [state] WD Timer not started. Device not locked for debugging
35,121,319 UART: [kat] SHA2-256
35,300,989 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
35,311,815 UART: [kat] ++
35,312,368 UART: [kat] sha1
35,323,370 UART: [kat] SHA2-256
35,326,059 UART: [kat] SHA2-384
35,331,363 UART: [kat] SHA2-512-ACC
35,333,719 UART: [kat] ECC-384
37,799,083 UART: [kat] HMAC-384Kdf
37,821,143 UART: [kat] LMS
38,297,575 UART: [kat] --
38,302,315 UART: [update-reset] ++
41,795,305 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
41,798,379 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
42,195,988 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
3,465,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,196,885 >>> mbox cmd response: success
14,198,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,492,573 UART:
18,492,989 UART: Running Caliptra FMC ...
18,494,138 UART:
18,494,311 UART: [state] CFI Enabled
18,562,626 UART: [fht] FMC Alias Private Key: 7
20,350,358 UART: [art] Extend RT PCRs Done
20,351,588 UART: [art] Lock RT PCRs Done
20,353,296 UART: [art] Populate DV Done
20,358,717 UART: [fht] FMC Alias Private Key: 7
20,360,318 UART: [art] Derive CDI
20,361,138 UART: [art] Store in slot 0x4
20,416,214 UART: [art] Derive Key Pair
20,417,257 UART: [art] Store priv key in slot 0x5
22,879,961 UART: [art] Derive Key Pair - Done
22,892,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,606,141 UART: [art] Erasing AUTHORITY.KEYID = 7
24,607,640 UART: [art] PUB.X = 4D47B0BEA8B2E6D6CA44D396BF42B7AB28619D016D967CCD1D5858B7D1209CA5204A009CA228AF89E9EE9382CAF4F0BD
24,614,880 UART: [art] PUB.Y = F1DE3EDBB309CEE27DCB9145A9B320A5A0973001B48924C1CB012FEA594C597014A66E2B3604C1FDD62A64C07FCFB0E4
24,622,175 UART: [art] SIG.R = 47CE462F98CD3477C045A10E3DB64EFBEE4A5115FCB9B5EF62137BA92F3396BA03BA46738F940AA0C7D759F7D879C254
24,629,570 UART: [art] SIG.S = 86BC49A041BC2749CAA2BA9405D46EA76DD6608D9E0EF43AD7F29256EA6A670BBEF2A1881F1FE9CF587C4838643B4FA2
25,608,361 UART: Caliptra RT
25,609,073 UART: [state] CFI Enabled
25,789,861 UART: [rt] RT listening for mailbox commands...
29,094,369 >>> mbox cmd response: failed
29,096,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,245,337 UART:
29,245,660 UART: Running Caliptra FMC ...
29,246,788 UART:
29,246,954 UART: [state] CFI Enabled
29,247,882 UART: [art] Extend RT PCRs Done
29,249,023 UART: [art] Lock RT PCRs Done
29,250,096 UART: [art] Populate DV Done
29,251,142 UART: [fht] FMC Alias Private Key: 7
29,252,505 UART: [art] Derive CDI
29,253,247 UART: [art] Store in slot 0x4
29,270,196 UART: [art] Derive Key Pair
29,271,201 UART: [art] Store priv key in slot 0x5
31,733,066 UART: [art] Derive Key Pair - Done
31,746,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,459,532 UART: [art] Erasing AUTHORITY.KEYID = 7
33,461,033 UART: [art] PUB.X = 4D47B0BEA8B2E6D6CA44D396BF42B7AB28619D016D967CCD1D5858B7D1209CA5204A009CA228AF89E9EE9382CAF4F0BD
33,468,293 UART: [art] PUB.Y = F1DE3EDBB309CEE27DCB9145A9B320A5A0973001B48924C1CB012FEA594C597014A66E2B3604C1FDD62A64C07FCFB0E4
33,475,537 UART: [art] SIG.R = 47CE462F98CD3477C045A10E3DB64EFBEE4A5115FCB9B5EF62137BA92F3396BA03BA46738F940AA0C7D759F7D879C254
33,482,936 UART: [art] SIG.S = 86BC49A041BC2749CAA2BA9405D46EA76DD6608D9E0EF43AD7F29256EA6A670BBEF2A1881F1FE9CF587C4838643B4FA2
34,461,517 UART: Caliptra RT
34,462,479 UART: [state] CFI Enabled
34,886,547 UART: [rt] RT listening for mailbox commands...
42,046,432 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,582 UART:
192,971 UART: Running Caliptra ROM ...
194,104 UART:
603,733 UART: [state] CFI Enabled
618,978 UART: [state] LifecycleState = Unprovisioned
620,927 UART: [state] DebugLocked = No
622,796 UART: [state] WD Timer not started. Device not locked for debugging
626,056 UART: [kat] SHA2-256
805,739 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,507 UART: [kat] ++
816,961 UART: [kat] sha1
827,355 UART: [kat] SHA2-256
830,044 UART: [kat] SHA2-384
837,164 UART: [kat] SHA2-512-ACC
839,565 UART: [kat] ECC-384
3,279,917 UART: [kat] HMAC-384Kdf
3,293,020 UART: [kat] LMS
3,769,573 UART: [kat] --
3,774,510 UART: [cold-reset] ++
3,776,020 UART: [fht] FHT @ 0x50003400
3,787,641 UART: [idev] ++
3,788,280 UART: [idev] CDI.KEYID = 6
3,789,195 UART: [idev] SUBJECT.KEYID = 7
3,790,413 UART: [idev] UDS.KEYID = 0
3,793,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,781 UART: [idev] Erasing UDS.KEYID = 0
6,270,489 UART: [idev] Sha1 KeyId Algorithm
6,292,988 UART: [idev] --
6,298,178 UART: [ldev] ++
6,298,754 UART: [ldev] CDI.KEYID = 6
6,299,777 UART: [ldev] SUBJECT.KEYID = 5
6,300,881 UART: [ldev] AUTHORITY.KEYID = 7
6,302,174 UART: [ldev] FE.KEYID = 1
6,313,934 UART: [ldev] Erasing FE.KEYID = 1
8,795,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,514 UART: [ldev] --
10,589,556 UART: [fwproc] Wait for Commands...
10,591,231 UART: [fwproc] Recv command 0x46574c44
10,593,225 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,153,989 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,010 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,839 >>> mbox cmd response: success
14,557,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,706,513 UART: [afmc] ++
14,707,180 UART: [afmc] CDI.KEYID = 6
14,708,112 UART: [afmc] SUBJECT.KEYID = 7
14,709,158 UART: [afmc] AUTHORITY.KEYID = 5
17,064,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,587 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,803,490 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,819,520 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,835,143 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,858,091 UART: [afmc] --
18,861,262 UART: [cold-reset] --
18,865,560 UART: [state] Locking Datavault
18,870,754 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,513 UART: [state] Locking ICCM
18,874,394 UART: [exit] Launching FMC @ 0x40000130
18,882,792 UART:
18,883,051 UART: Running Caliptra FMC ...
18,884,161 UART:
18,884,324 UART: [state] CFI Enabled
18,892,209 UART: [fht] FMC Alias Private Key: 7
20,658,721 UART: [art] Extend RT PCRs Done
20,659,939 UART: [art] Lock RT PCRs Done
20,661,593 UART: [art] Populate DV Done
20,667,217 UART: [fht] FMC Alias Private Key: 7
20,668,710 UART: [art] Derive CDI
20,669,450 UART: [art] Store in slot 0x4
20,712,203 UART: [art] Derive Key Pair
20,713,203 UART: [art] Store priv key in slot 0x5
23,140,028 UART: [art] Derive Key Pair - Done
23,153,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,426 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,936 UART: [art] PUB.X = 60AA539E54946F84DD81B7D0AB458947D8FE4DD90A428387769CFC766414C617655884C193D04D92206539070AA289F6
24,868,213 UART: [art] PUB.Y = 5B34A8C428073BD897B8A70452AF16213AB5DEE94033B01A91E0C5396105455C38259F3054C59642CBF5D86D9F5DFC5E
24,875,451 UART: [art] SIG.R = F004811462BD183FECECC9A9B363545CB3F54C8CE38EBD00C30117EFE7FCF59E83385BC50CD9E2DB96D8A98629BD262B
24,882,810 UART: [art] SIG.S = 92309EE797DB3D04A8C75D7E7AD33FA2CF03540488458EBE9F2B3C4F67164CAD896CAD568BF5C3744E3EAC0F52256A56
25,861,834 UART: Caliptra RT
25,862,524 UART: [state] CFI Enabled
25,996,214 UART: [rt] RT listening for mailbox commands...
25,999,438 UART:
25,999,605 UART: Running Caliptra ROM ...
26,000,710 UART:
26,001,035 UART: [state] CFI Enabled
26,015,771 UART: [state] LifecycleState = Unprovisioned
26,017,712 UART: [state] DebugLocked = No
26,019,582 UART: [state] WD Timer not started. Device not locked for debugging
26,023,375 UART: [kat] SHA2-256
26,203,078 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,213,852 UART: [kat] ++
26,214,332 UART: [kat] sha1
26,224,897 UART: [kat] SHA2-256
26,227,596 UART: [kat] SHA2-384
26,232,934 UART: [kat] SHA2-512-ACC
26,235,278 UART: [kat] ECC-384
28,676,046 UART: [kat] HMAC-384Kdf
28,688,870 UART: [kat] LMS
29,165,349 UART: [kat] --
29,169,937 UART: [update-reset] ++
29,216,423 >>> mbox cmd response: failed
29,218,407 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,367,213 UART: ROM Non-Fatal Error: 0x000B001E
29,368,648 UART: [state] Locking Datavault
29,369,803 UART: [state] Locking PCR0, PCR1 and PCR31
29,371,340 UART: [state] Locking ICCM
29,372,250 UART: [exit] Launching FMC @ 0x40000130
29,373,693 UART:
29,373,857 UART: Running Caliptra FMC ...
29,374,958 UART:
29,375,119 UART: [state] CFI Enabled
29,376,149 UART: [art] Extend RT PCRs Done
29,377,310 UART: [art] Lock RT PCRs Done
29,378,386 UART: [art] Populate DV Done
29,379,416 UART: [fht] FMC Alias Private Key: 7
29,380,732 UART: [art] Derive CDI
29,381,473 UART: [art] Store in slot 0x4
29,382,536 UART: [art] Derive Key Pair
29,383,480 UART: [art] Store priv key in slot 0x5
31,764,870 UART: [art] Derive Key Pair - Done
31,777,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,484,120 UART: [art] Erasing AUTHORITY.KEYID = 7
33,485,636 UART: [art] PUB.X = 60AA539E54946F84DD81B7D0AB458947D8FE4DD90A428387769CFC766414C617655884C193D04D92206539070AA289F6
33,492,902 UART: [art] PUB.Y = 5B34A8C428073BD897B8A70452AF16213AB5DEE94033B01A91E0C5396105455C38259F3054C59642CBF5D86D9F5DFC5E
33,500,137 UART: [art] SIG.R = F004811462BD183FECECC9A9B363545CB3F54C8CE38EBD00C30117EFE7FCF59E83385BC50CD9E2DB96D8A98629BD262B
33,507,516 UART: [art] SIG.S = 92309EE797DB3D04A8C75D7E7AD33FA2CF03540488458EBE9F2B3C4F67164CAD896CAD568BF5C3744E3EAC0F52256A56
34,486,883 UART: Caliptra RT
34,487,575 UART: [state] CFI Enabled
34,860,543 UART: [rt] RT listening for mailbox commands...
34,863,091 UART:
34,863,296 UART: Running Caliptra ROM ...
34,864,410 UART:
34,864,745 UART: [state] CFI Enabled
40,320,012 UART: [state] LifecycleState = Unprovisioned
40,322,160 UART: [state] DebugLocked = No
40,324,892 UART: [state] WD Timer not started. Device not locked for debugging
40,327,944 UART: [kat] SHA2-256
40,507,638 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
40,518,438 UART: [kat] ++
40,518,918 UART: [kat] sha1
40,530,239 UART: [kat] SHA2-256
40,532,944 UART: [kat] SHA2-384
40,538,669 UART: [kat] SHA2-512-ACC
40,541,076 UART: [kat] ECC-384
42,984,255 UART: [kat] HMAC-384Kdf
42,994,936 UART: [kat] LMS
43,471,389 UART: [kat] --
43,474,883 UART: [update-reset] ++
46,974,273 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
46,978,646 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,376,288 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
3,787,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,162 >>> mbox cmd response: success
14,445,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,689,057 UART:
18,689,485 UART: Running Caliptra FMC ...
18,690,598 UART:
18,690,768 UART: [state] CFI Enabled
18,698,609 UART: [fht] FMC Alias Private Key: 7
20,464,636 UART: [art] Extend RT PCRs Done
20,465,877 UART: [art] Lock RT PCRs Done
20,467,318 UART: [art] Populate DV Done
20,472,474 UART: [fht] FMC Alias Private Key: 7
20,474,189 UART: [art] Derive CDI
20,474,930 UART: [art] Store in slot 0x4
20,517,854 UART: [art] Derive Key Pair
20,518,899 UART: [art] Store priv key in slot 0x5
22,946,108 UART: [art] Derive Key Pair - Done
22,958,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,644 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,153 UART: [art] PUB.X = 0B3A63E2E532C6F8A26AD1C5C420DDBA3F323F99E5C0E470A36CADB45BD8DB0199F4B8B73AA2BA33F578095AE0A11FFF
24,674,417 UART: [art] PUB.Y = B4C748A9F498B455E062FDE2F702422E17CE3DD3BE2D8865FA2A74C9AC71A3472F1B6151A9FEDE72C6694C4D9705BFF4
24,681,732 UART: [art] SIG.R = A5342E384BE6A7AD1340EB90BCBA6E2001CBBAFD2D67F3636899E2E365F9EB961A64CAC56DD12DB0DCD66D9D920E37FD
24,689,143 UART: [art] SIG.S = 3F5AAE6A6F56CE4765687758A6FCB58BB350F9AC5E07A7B92558B7FC9405FCF1F6D37A1EBDFCA59796F154C919289EA4
25,668,529 UART: Caliptra RT
25,669,269 UART: [state] CFI Enabled
25,801,847 UART: [rt] RT listening for mailbox commands...
29,020,676 >>> mbox cmd response: failed
29,022,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,171,525 UART:
29,171,854 UART: Running Caliptra FMC ...
29,172,985 UART:
29,173,154 UART: [state] CFI Enabled
29,174,080 UART: [art] Extend RT PCRs Done
29,175,228 UART: [art] Lock RT PCRs Done
29,176,298 UART: [art] Populate DV Done
29,177,331 UART: [fht] FMC Alias Private Key: 7
29,178,689 UART: [art] Derive CDI
29,179,431 UART: [art] Store in slot 0x4
29,180,495 UART: [art] Derive Key Pair
29,181,440 UART: [art] Store priv key in slot 0x5
31,560,983 UART: [art] Derive Key Pair - Done
31,574,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,280,893 UART: [art] Erasing AUTHORITY.KEYID = 7
33,282,860 UART: [art] PUB.X = 0B3A63E2E532C6F8A26AD1C5C420DDBA3F323F99E5C0E470A36CADB45BD8DB0199F4B8B73AA2BA33F578095AE0A11FFF
33,289,649 UART: [art] PUB.Y = B4C748A9F498B455E062FDE2F702422E17CE3DD3BE2D8865FA2A74C9AC71A3472F1B6151A9FEDE72C6694C4D9705BFF4
33,296,942 UART: [art] SIG.R = A5342E384BE6A7AD1340EB90BCBA6E2001CBBAFD2D67F3636899E2E365F9EB961A64CAC56DD12DB0DCD66D9D920E37FD
33,304,393 UART: [art] SIG.S = 3F5AAE6A6F56CE4765687758A6FCB58BB350F9AC5E07A7B92558B7FC9405FCF1F6D37A1EBDFCA59796F154C919289EA4
34,284,207 UART: Caliptra RT
34,284,938 UART: [state] CFI Enabled
34,661,411 UART: [rt] RT listening for mailbox commands...
47,380,942 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,873 writing to cptra_bootfsm_go
193,101 UART:
193,449 UART: Running Caliptra ROM ...
194,648 UART:
194,803 UART: [state] CFI Enabled
263,370 UART: [state] LifecycleState = Unprovisioned
265,796 UART: [state] DebugLocked = No
267,942 UART: [state] WD Timer not started. Device not locked for debugging
271,758 UART: [kat] SHA2-256
461,629 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,369 UART: [kat] ++
472,910 UART: [kat] sha1
483,979 UART: [kat] SHA2-256
486,995 UART: [kat] SHA2-384
493,855 UART: [kat] SHA2-512-ACC
496,420 UART: [kat] ECC-384
2,943,068 UART: [kat] HMAC-384Kdf
2,967,906 UART: [kat] LMS
3,499,645 UART: [kat] --
3,503,822 UART: [cold-reset] ++
3,505,225 UART: [fht] FHT @ 0x50003400
3,516,603 UART: [idev] ++
3,517,287 UART: [idev] CDI.KEYID = 6
3,518,228 UART: [idev] SUBJECT.KEYID = 7
3,519,469 UART: [idev] UDS.KEYID = 0
3,522,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,924 UART: [idev] Erasing UDS.KEYID = 0
6,025,800 UART: [idev] Sha1 KeyId Algorithm
6,047,907 UART: [idev] --
6,053,530 UART: [ldev] ++
6,054,220 UART: [ldev] CDI.KEYID = 6
6,055,150 UART: [ldev] SUBJECT.KEYID = 5
6,056,267 UART: [ldev] AUTHORITY.KEYID = 7
6,057,510 UART: [ldev] FE.KEYID = 1
6,095,822 UART: [ldev] Erasing FE.KEYID = 1
8,602,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,313 UART: [ldev] --
10,409,249 UART: [fwproc] Wait for Commands...
10,412,231 UART: [fwproc] Recv command 0x46574c44
10,414,554 UART: [fwproc] Recv'd Img size: 118548 bytes
13,908,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,984,473 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,108,088 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,668,242 >>> mbox cmd response: success
14,669,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,102 UART: [afmc] ++
14,819,745 UART: [afmc] CDI.KEYID = 6
14,820,673 UART: [afmc] SUBJECT.KEYID = 7
14,821,786 UART: [afmc] AUTHORITY.KEYID = 5
17,213,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,952,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,954,527 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,969,643 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,984,545 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,999,542 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
19,023,654 UART: [afmc] --
19,026,770 UART: [cold-reset] --
19,030,102 UART: [state] Locking Datavault
19,036,441 UART: [state] Locking PCR0, PCR1 and PCR31
19,038,580 UART: [state] Locking ICCM
19,040,470 UART: [exit] Launching FMC @ 0x40000130
19,049,141 UART:
19,049,401 UART: Running Caliptra FMC ...
19,050,512 UART:
19,050,683 UART: [state] CFI Enabled
19,112,044 UART: [fht] FMC Alias Private Key: 7
20,878,260 UART: [art] Extend RT PCRs Done
20,879,478 UART: [art] Lock RT PCRs Done
20,880,956 UART: [art] Populate DV Done
20,886,553 UART: [fht] FMC Alias Private Key: 7
20,888,209 UART: [art] Derive CDI
20,889,031 UART: [art] Store in slot 0x4
20,944,382 UART: [art] Derive Key Pair
20,945,380 UART: [art] Store priv key in slot 0x5
23,408,721 UART: [art] Derive Key Pair - Done
23,421,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,134,872 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,380 UART: [art] PUB.X = 9D807BFC19B8C26DAFCB7E4AA594485412DAAAF9AEB3977381016156E4AD207D522A9B4B965AB29720485B020389F503
25,143,659 UART: [art] PUB.Y = 301F1C9BDF27B50976DDDC14BEDF8DC052C119C5845DF142260EDBEBE33CF43178D42408767E415F0DD5C8CAEA53619D
25,150,928 UART: [art] SIG.R = 5B51B74024D1AB1394D9ABF9A2844057219C641797B1E568EAEB4CB8B50A313B276A0FAAD9BFD3F8A66C28044B16F97E
25,158,303 UART: [art] SIG.S = 857C07F23B130CD6362F0DA0B69BA5F9E01CB109640F14B01078BF9282416DE038F0C51EDBAFC49587FB80E7165D9E12
26,137,541 UART: Caliptra RT
26,138,257 UART: [state] CFI Enabled
26,318,881 UART: [rt] RT listening for mailbox commands...
26,321,911 UART:
26,322,169 UART: Running Caliptra ROM ...
26,323,284 UART:
26,323,448 UART: [state] CFI Enabled
26,390,642 UART: [state] LifecycleState = Unprovisioned
26,392,645 UART: [state] DebugLocked = No
26,393,975 UART: [state] WD Timer not started. Device not locked for debugging
26,399,018 UART: [kat] SHA2-256
26,588,899 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,599,639 UART: [kat] ++
26,600,100 UART: [kat] sha1
26,611,209 UART: [kat] SHA2-256
26,614,227 UART: [kat] SHA2-384
26,619,029 UART: [kat] SHA2-512-ACC
26,621,609 UART: [kat] ECC-384
29,077,080 UART: [kat] HMAC-384Kdf
29,098,810 UART: [kat] LMS
29,630,364 UART: [kat] --
29,635,271 UART: [update-reset] ++
29,698,015 >>> mbox cmd response: failed
29,700,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,849,432 UART: ROM Non-Fatal Error: 0x000B001E
29,850,866 UART: [state] Locking Datavault
29,852,024 UART: [state] Locking PCR0, PCR1 and PCR31
29,853,570 UART: [state] Locking ICCM
29,854,482 UART: [exit] Launching FMC @ 0x40000130
29,855,910 UART:
29,856,070 UART: Running Caliptra FMC ...
29,857,172 UART:
29,857,334 UART: [state] CFI Enabled
29,858,200 UART: [art] Extend RT PCRs Done
29,859,338 UART: [art] Lock RT PCRs Done
29,860,427 UART: [art] Populate DV Done
29,861,465 UART: [fht] FMC Alias Private Key: 7
29,862,783 UART: [art] Derive CDI
29,863,526 UART: [art] Store in slot 0x4
29,884,413 UART: [art] Derive Key Pair
29,885,407 UART: [art] Store priv key in slot 0x5
32,348,521 UART: [art] Derive Key Pair - Done
32,361,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,073,476 UART: [art] Erasing AUTHORITY.KEYID = 7
34,074,978 UART: [art] PUB.X = 9D807BFC19B8C26DAFCB7E4AA594485412DAAAF9AEB3977381016156E4AD207D522A9B4B965AB29720485B020389F503
34,082,272 UART: [art] PUB.Y = 301F1C9BDF27B50976DDDC14BEDF8DC052C119C5845DF142260EDBEBE33CF43178D42408767E415F0DD5C8CAEA53619D
34,089,558 UART: [art] SIG.R = 5B51B74024D1AB1394D9ABF9A2844057219C641797B1E568EAEB4CB8B50A313B276A0FAAD9BFD3F8A66C28044B16F97E
34,096,934 UART: [art] SIG.S = 857C07F23B130CD6362F0DA0B69BA5F9E01CB109640F14B01078BF9282416DE038F0C51EDBAFC49587FB80E7165D9E12
35,076,501 UART: Caliptra RT
35,077,217 UART: [state] CFI Enabled
35,498,450 UART: [rt] RT listening for mailbox commands...
35,501,054 UART:
35,501,229 UART: Running Caliptra ROM ...
35,502,344 UART:
35,502,504 UART: [state] CFI Enabled
35,564,666 UART: [state] LifecycleState = Unprovisioned
35,566,705 UART: [state] DebugLocked = No
35,569,633 UART: [state] WD Timer not started. Device not locked for debugging
35,573,590 UART: [kat] SHA2-256
35,763,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,774,234 UART: [kat] ++
35,774,691 UART: [kat] sha1
35,786,340 UART: [kat] SHA2-256
35,789,320 UART: [kat] SHA2-384
35,793,803 UART: [kat] SHA2-512-ACC
35,796,372 UART: [kat] ECC-384
38,248,299 UART: [kat] HMAC-384Kdf
38,271,634 UART: [kat] LMS
38,803,216 UART: [kat] --
38,807,123 UART: [update-reset] ++
42,310,769 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
42,313,499 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
42,943,279 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,440,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,112 >>> mbox cmd response: success
14,821,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,129,981 UART:
19,130,388 UART: Running Caliptra FMC ...
19,131,493 UART:
19,131,661 UART: [state] CFI Enabled
19,199,872 UART: [fht] FMC Alias Private Key: 7
20,987,666 UART: [art] Extend RT PCRs Done
20,988,894 UART: [art] Lock RT PCRs Done
20,990,303 UART: [art] Populate DV Done
20,995,785 UART: [fht] FMC Alias Private Key: 7
20,997,441 UART: [art] Derive CDI
20,998,262 UART: [art] Store in slot 0x4
21,054,260 UART: [art] Derive Key Pair
21,055,309 UART: [art] Store priv key in slot 0x5
23,517,982 UART: [art] Derive Key Pair - Done
23,530,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,244,141 UART: [art] Erasing AUTHORITY.KEYID = 7
25,245,647 UART: [art] PUB.X = E9D7415CCD009D3E9A47003794806032EC86336520445A685C5A0F08F1A8ED266CCD1B0C7200DDAEC2BF63ABE61D5A24
25,252,809 UART: [art] PUB.Y = 461FBC9FB89BF1724F33057ADE3F669E0F5C76A710BDA67CB860E82DB2F68580AEB020D52A9F2EEC3F43EEB42EB5A506
25,260,115 UART: [art] SIG.R = 65D84C6CBA9C62B9462137760B39A6C23F9D3FCC396AEEACE382C0138EA977B4F099B3EF3944821169F2C9BE87156984
25,267,468 UART: [art] SIG.S = AFBCA584AE007FBE732E7D4F28FB51BE933282CDAD342E2DE5F9E6BB519642D7E5D292E86F3E35458664611D478287E8
26,246,835 UART: Caliptra RT
26,247,528 UART: [state] CFI Enabled
26,428,463 UART: [rt] RT listening for mailbox commands...
29,712,120 >>> mbox cmd response: failed
29,713,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,863,108 UART:
29,863,424 UART: Running Caliptra FMC ...
29,864,467 UART:
29,864,619 UART: [state] CFI Enabled
29,865,550 UART: [art] Extend RT PCRs Done
29,866,699 UART: [art] Lock RT PCRs Done
29,867,691 UART: [art] Populate DV Done
29,868,725 UART: [fht] FMC Alias Private Key: 7
29,870,033 UART: [art] Derive CDI
29,870,774 UART: [art] Store in slot 0x4
29,886,494 UART: [art] Derive Key Pair
29,887,491 UART: [art] Store priv key in slot 0x5
32,350,236 UART: [art] Derive Key Pair - Done
32,363,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,075,698 UART: [art] Erasing AUTHORITY.KEYID = 7
34,077,219 UART: [art] PUB.X = E9D7415CCD009D3E9A47003794806032EC86336520445A685C5A0F08F1A8ED266CCD1B0C7200DDAEC2BF63ABE61D5A24
34,084,436 UART: [art] PUB.Y = 461FBC9FB89BF1724F33057ADE3F669E0F5C76A710BDA67CB860E82DB2F68580AEB020D52A9F2EEC3F43EEB42EB5A506
34,091,670 UART: [art] SIG.R = 65D84C6CBA9C62B9462137760B39A6C23F9D3FCC396AEEACE382C0138EA977B4F099B3EF3944821169F2C9BE87156984
34,099,093 UART: [art] SIG.S = AFBCA584AE007FBE732E7D4F28FB51BE933282CDAD342E2DE5F9E6BB519642D7E5D292E86F3E35458664611D478287E8
35,077,808 UART: Caliptra RT
35,078,502 UART: [state] CFI Enabled
35,501,499 UART: [rt] RT listening for mailbox commands...
43,259,785 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,618 UART:
192,978 UART: Running Caliptra ROM ...
194,081 UART:
603,942 UART: [state] CFI Enabled
619,922 UART: [state] LifecycleState = Unprovisioned
622,303 UART: [state] DebugLocked = No
624,657 UART: [state] WD Timer not started. Device not locked for debugging
629,875 UART: [kat] SHA2-256
819,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,546 UART: [kat] ++
831,003 UART: [kat] sha1
842,976 UART: [kat] SHA2-256
846,022 UART: [kat] SHA2-384
850,448 UART: [kat] SHA2-512-ACC
853,065 UART: [kat] ECC-384
3,296,424 UART: [kat] HMAC-384Kdf
3,309,794 UART: [kat] LMS
3,841,662 UART: [kat] --
3,845,222 UART: [cold-reset] ++
3,846,992 UART: [fht] FHT @ 0x50003400
3,859,379 UART: [idev] ++
3,860,102 UART: [idev] CDI.KEYID = 6
3,860,996 UART: [idev] SUBJECT.KEYID = 7
3,862,218 UART: [idev] UDS.KEYID = 0
3,865,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,438 UART: [idev] Erasing UDS.KEYID = 0
6,339,576 UART: [idev] Sha1 KeyId Algorithm
6,361,358 UART: [idev] --
6,366,782 UART: [ldev] ++
6,367,472 UART: [ldev] CDI.KEYID = 6
6,368,395 UART: [ldev] SUBJECT.KEYID = 5
6,369,562 UART: [ldev] AUTHORITY.KEYID = 7
6,370,799 UART: [ldev] FE.KEYID = 1
6,381,019 UART: [ldev] Erasing FE.KEYID = 1
8,858,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,002 UART: [ldev] --
10,648,007 UART: [fwproc] Wait for Commands...
10,650,988 UART: [fwproc] Recv command 0x46574c44
10,653,427 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,227,702 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,334 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,282 >>> mbox cmd response: success
14,914,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,062,978 UART: [afmc] ++
15,063,612 UART: [afmc] CDI.KEYID = 6
15,064,540 UART: [afmc] SUBJECT.KEYID = 7
15,065,651 UART: [afmc] AUTHORITY.KEYID = 5
17,422,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,412 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
19,160,482 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
19,175,433 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
19,190,427 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
19,215,188 UART: [afmc] --
19,219,469 UART: [cold-reset] --
19,224,123 UART: [state] Locking Datavault
19,228,742 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,941 UART: [state] Locking ICCM
19,233,527 UART: [exit] Launching FMC @ 0x40000130
19,242,205 UART:
19,242,441 UART: Running Caliptra FMC ...
19,243,546 UART:
19,243,712 UART: [state] CFI Enabled
19,251,871 UART: [fht] FMC Alias Private Key: 7
21,018,540 UART: [art] Extend RT PCRs Done
21,019,779 UART: [art] Lock RT PCRs Done
21,020,977 UART: [art] Populate DV Done
21,026,288 UART: [fht] FMC Alias Private Key: 7
21,027,832 UART: [art] Derive CDI
21,028,602 UART: [art] Store in slot 0x4
21,071,687 UART: [art] Derive Key Pair
21,072,754 UART: [art] Store priv key in slot 0x5
23,499,981 UART: [art] Derive Key Pair - Done
23,512,651 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,952 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,471 UART: [art] PUB.X = 494453F069945F6A59982A4FB72EE308378532EF104996CE7F2141C8372A16D2B937BBDDA38ED18DC881CF3A8E2C92B0
25,227,721 UART: [art] PUB.Y = A48BDB6BCFFBE963EE6AE723FFA80F15015D2862E544D9FB313539C47AF79CCC90FACE375C52DD0A20A227C98905C22F
25,235,012 UART: [art] SIG.R = DB1269F6B6FC73C9EE1F3F9E22DDAB8E9D12E7964461C5CFB155AE7B28E82E1D093CF3D37A282A24BF1CC235250086AB
25,242,407 UART: [art] SIG.S = E177CBCF50ADF9EAB562ECBF4B4A1F462F67744E5D0666DD2958AEE1E1F09C2CE55EA347B95BE34A8554718718EE8A59
26,220,284 UART: Caliptra RT
26,220,993 UART: [state] CFI Enabled
26,354,222 UART: [rt] RT listening for mailbox commands...
26,357,408 UART:
26,357,576 UART: Running Caliptra ROM ...
26,358,625 UART:
26,359,048 UART: [state] CFI Enabled
26,374,885 UART: [state] LifecycleState = Unprovisioned
26,376,797 UART: [state] DebugLocked = No
26,378,263 UART: [state] WD Timer not started. Device not locked for debugging
26,382,937 UART: [kat] SHA2-256
26,572,816 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,583,574 UART: [kat] ++
26,584,094 UART: [kat] sha1
26,595,692 UART: [kat] SHA2-256
26,598,721 UART: [kat] SHA2-384
26,605,141 UART: [kat] SHA2-512-ACC
26,607,709 UART: [kat] ECC-384
29,049,271 UART: [kat] HMAC-384Kdf
29,061,490 UART: [kat] LMS
29,593,096 UART: [kat] --
29,598,216 UART: [update-reset] ++
29,662,474 >>> mbox cmd response: failed
29,664,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,813,860 UART: ROM Non-Fatal Error: 0x000B001E
29,815,304 UART: [state] Locking Datavault
29,816,465 UART: [state] Locking PCR0, PCR1 and PCR31
29,818,006 UART: [state] Locking ICCM
29,818,922 UART: [exit] Launching FMC @ 0x40000130
29,820,358 UART:
29,820,527 UART: Running Caliptra FMC ...
29,821,628 UART:
29,821,786 UART: [state] CFI Enabled
29,822,709 UART: [art] Extend RT PCRs Done
29,823,846 UART: [art] Lock RT PCRs Done
29,824,915 UART: [art] Populate DV Done
29,825,946 UART: [fht] FMC Alias Private Key: 7
29,827,262 UART: [art] Derive CDI
29,828,002 UART: [art] Store in slot 0x4
29,829,072 UART: [art] Derive Key Pair
29,830,016 UART: [art] Store priv key in slot 0x5
32,211,232 UART: [art] Derive Key Pair - Done
32,224,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,930,456 UART: [art] Erasing AUTHORITY.KEYID = 7
33,931,951 UART: [art] PUB.X = 494453F069945F6A59982A4FB72EE308378532EF104996CE7F2141C8372A16D2B937BBDDA38ED18DC881CF3A8E2C92B0
33,939,285 UART: [art] PUB.Y = A48BDB6BCFFBE963EE6AE723FFA80F15015D2862E544D9FB313539C47AF79CCC90FACE375C52DD0A20A227C98905C22F
33,946,549 UART: [art] SIG.R = DB1269F6B6FC73C9EE1F3F9E22DDAB8E9D12E7964461C5CFB155AE7B28E82E1D093CF3D37A282A24BF1CC235250086AB
33,953,906 UART: [art] SIG.S = E177CBCF50ADF9EAB562ECBF4B4A1F462F67744E5D0666DD2958AEE1E1F09C2CE55EA347B95BE34A8554718718EE8A59
34,932,930 UART: Caliptra RT
34,933,622 UART: [state] CFI Enabled
35,308,398 UART: [rt] RT listening for mailbox commands...
35,311,086 UART:
35,311,343 UART: Running Caliptra ROM ...
35,312,457 UART:
35,312,692 UART: [state] CFI Enabled
40,318,204 UART: [state] LifecycleState = Unprovisioned
40,320,138 UART: [state] DebugLocked = No
40,322,295 UART: [state] WD Timer not started. Device not locked for debugging
40,326,502 UART: [kat] SHA2-256
40,516,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,527,194 UART: [kat] ++
40,527,681 UART: [kat] sha1
40,539,439 UART: [kat] SHA2-256
40,542,463 UART: [kat] SHA2-384
40,547,106 UART: [kat] SHA2-512-ACC
40,549,732 UART: [kat] ECC-384
42,987,525 UART: [kat] HMAC-384Kdf
43,000,932 UART: [kat] LMS
43,532,547 UART: [kat] --
43,537,392 UART: [update-reset] ++
47,047,289 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
47,050,791 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,680,517 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,970 writing to cptra_bootfsm_go
3,761,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,469 >>> mbox cmd response: success
15,051,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,299,211 UART:
19,299,651 UART: Running Caliptra FMC ...
19,300,795 UART:
19,300,963 UART: [state] CFI Enabled
19,308,941 UART: [fht] FMC Alias Private Key: 7
21,075,092 UART: [art] Extend RT PCRs Done
21,076,322 UART: [art] Lock RT PCRs Done
21,078,167 UART: [art] Populate DV Done
21,083,386 UART: [fht] FMC Alias Private Key: 7
21,085,154 UART: [art] Derive CDI
21,086,001 UART: [art] Store in slot 0x4
21,128,667 UART: [art] Derive Key Pair
21,129,714 UART: [art] Store priv key in slot 0x5
23,556,356 UART: [art] Derive Key Pair - Done
23,569,621 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,275,945 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,462 UART: [art] PUB.X = 9C4685E760DD7224D8343B489A3ABC08439FF404A4BA9B6538402318F753B0A0BF6C60DF8DAE51156BBC13A79E643D51
25,284,732 UART: [art] PUB.Y = E1CCC3825F0F34C36D4CECA759E5BE542371755DA3DE33800BFD4B066C84FF583631543AA8AB8A1C1CC5E3B7A4166D52
25,292,008 UART: [art] SIG.R = E7DCF5E144EA1EF14FFF2C06677D9866F31115578C6DC0127374B91F5A047FE9ED4F8ED2E2783747D070D090C7D863FC
25,299,411 UART: [art] SIG.S = F73CA3C60938AE7EF820D8A5DFCFAFD266642503D405E6AA460E60E91C2B9EBF0DD9AA7138F90D60DAA07B9A4A12F9F0
26,278,937 UART: Caliptra RT
26,279,642 UART: [state] CFI Enabled
26,412,774 UART: [rt] RT listening for mailbox commands...
29,605,540 >>> mbox cmd response: failed
29,607,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,756,055 UART:
29,756,392 UART: Running Caliptra FMC ...
29,757,435 UART:
29,757,586 UART: [state] CFI Enabled
29,758,521 UART: [art] Extend RT PCRs Done
29,759,618 UART: [art] Lock RT PCRs Done
29,760,623 UART: [art] Populate DV Done
29,761,778 UART: [fht] FMC Alias Private Key: 7
29,763,190 UART: [art] Derive CDI
29,763,939 UART: [art] Store in slot 0x4
29,765,012 UART: [art] Derive Key Pair
29,765,964 UART: [art] Store priv key in slot 0x5
32,145,472 UART: [art] Derive Key Pair - Done
32,158,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,865,114 UART: [art] Erasing AUTHORITY.KEYID = 7
33,866,620 UART: [art] PUB.X = 9C4685E760DD7224D8343B489A3ABC08439FF404A4BA9B6538402318F753B0A0BF6C60DF8DAE51156BBC13A79E643D51
33,873,874 UART: [art] PUB.Y = E1CCC3825F0F34C36D4CECA759E5BE542371755DA3DE33800BFD4B066C84FF583631543AA8AB8A1C1CC5E3B7A4166D52
33,881,126 UART: [art] SIG.R = E7DCF5E144EA1EF14FFF2C06677D9866F31115578C6DC0127374B91F5A047FE9ED4F8ED2E2783747D070D090C7D863FC
33,888,575 UART: [art] SIG.S = F73CA3C60938AE7EF820D8A5DFCFAFD266642503D405E6AA460E60E91C2B9EBF0DD9AA7138F90D60DAA07B9A4A12F9F0
34,866,524 UART: Caliptra RT
34,867,224 UART: [state] CFI Enabled
35,238,934 UART: [rt] RT listening for mailbox commands...
47,975,371 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,658 UART: [state] LifecycleState = Unprovisioned
86,313 UART: [state] DebugLocked = No
86,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,439 UART: [kat] SHA2-256
882,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,485 UART: [kat] ++
886,637 UART: [kat] sha1
890,909 UART: [kat] SHA2-256
892,847 UART: [kat] SHA2-384
895,572 UART: [kat] SHA2-512-ACC
897,473 UART: [kat] ECC-384
903,048 UART: [kat] HMAC-384Kdf
907,436 UART: [kat] LMS
1,475,632 UART: [kat] --
1,476,623 UART: [cold-reset] ++
1,477,061 UART: [fht] Storing FHT @ 0x50003400
1,479,914 UART: [idev] ++
1,480,082 UART: [idev] CDI.KEYID = 6
1,480,442 UART: [idev] SUBJECT.KEYID = 7
1,480,866 UART: [idev] UDS.KEYID = 0
1,481,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,012 UART: [idev] Erasing UDS.KEYID = 0
1,505,822 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,556 UART: [idev] --
1,515,567 UART: [ldev] ++
1,515,735 UART: [ldev] CDI.KEYID = 6
1,516,098 UART: [ldev] SUBJECT.KEYID = 5
1,516,524 UART: [ldev] AUTHORITY.KEYID = 7
1,516,987 UART: [ldev] FE.KEYID = 1
1,522,027 UART: [ldev] Erasing FE.KEYID = 1
1,547,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,784 UART: [ldev] --
1,587,247 UART: [fwproc] Waiting for Commands...
1,587,978 UART: [fwproc] Received command 0x46574c44
1,588,769 UART: [fwproc] Received Image of size 118548 bytes
2,933,093 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,960,569 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,078 >>> mbox cmd response: success
3,132,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,133,262 UART: [afmc] ++
3,133,430 UART: [afmc] CDI.KEYID = 6
3,133,792 UART: [afmc] SUBJECT.KEYID = 7
3,134,217 UART: [afmc] AUTHORITY.KEYID = 5
3,169,533 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,657 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,437 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
3,192,148 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
3,198,033 UART: [afmc] SIG.R = 1B808139A82154D7829344C14F7B3DCF8F462FA097D7D853513EE4FCF41FDEC17279B80A528F0E3E44F7259FC827691F
3,203,740 UART: [afmc] SIG.S = A280234D1482F252CC9ACF9F10C4B2975C754071275AA8869D333FFCFC50C67A43378261ED7FEE9C46891DD00B478232
3,211,460 UART: [afmc] --
3,212,358 UART: [cold-reset] --
3,213,228 UART: [state] Locking Datavault
3,214,283 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,887 UART: [state] Locking ICCM
3,215,537 UART: [exit] Launching FMC @ 0x40000130
3,220,867 UART:
3,220,883 UART: Running Caliptra FMC ...
3,221,291 UART:
3,221,345 UART: [state] CFI Enabled
3,231,534 UART: [fht] FMC Alias Private Key: 7
3,350,650 UART: [art] Extend RT PCRs Done
3,351,078 UART: [art] Lock RT PCRs Done
3,352,670 UART: [art] Populate DV Done
3,360,706 UART: [fht] FMC Alias Private Key: 7
3,361,694 UART: [art] Derive CDI
3,361,974 UART: [art] Store in slot 0x4
3,447,858 UART: [art] Derive Key Pair
3,448,218 UART: [art] Store priv key in slot 0x5
3,461,849 UART: [art] Derive Key Pair - Done
3,476,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,135 UART: [art] PUB.X = 0004A89F686D807A79C246831F3EC3217F8F3EB09B86C272C668D5C4EDF5D83E1564F79D3E8EA3A5D66B71400F7210EF
3,499,881 UART: [art] PUB.Y = A26AE8B19E9E3CD1C9120B7CB48D11EFE5147AABB8B2B010C000157B20EFEEB1F8463652AB59E430E1D27FB71C66346F
3,506,822 UART: [art] SIG.R = 54B35FDB8BF313D69E6CD81C018E9D883230C8D058D56FBFAF0D53DA298766D4794824E1A17328682E51842041DDF648
3,513,586 UART: [art] SIG.S = BEC150E06EBEE9C746BA5190D9018AD9B45BDB21EBFC7EC9500C8AE5AE4A37BB06B5C1300CE53D28832C7C10ABCE9ABF
3,537,398 UART: Caliptra RT
3,537,649 UART: [state] CFI Enabled
3,657,839 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,660,048 UART:
3,660,064 UART: Running Caliptra ROM ...
3,660,472 UART:
3,660,526 UART: [state] CFI Enabled
3,663,478 UART: [state] LifecycleState = Unprovisioned
3,664,133 UART: [state] DebugLocked = No
3,664,851 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,666,546 UART: [kat] SHA2-256
4,460,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,464,592 UART: [kat] ++
4,464,744 UART: [kat] sha1
4,468,992 UART: [kat] SHA2-256
4,470,930 UART: [kat] SHA2-384
4,473,597 UART: [kat] SHA2-512-ACC
4,475,497 UART: [kat] ECC-384
4,481,106 UART: [kat] HMAC-384Kdf
4,485,870 UART: [kat] LMS
5,054,066 UART: [kat] --
5,054,931 UART: [update-reset] ++
5,093,774 >>> mbox cmd response: failed
5,093,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,094,056 UART: ROM Non-Fatal Error: 0x000B001E
5,094,888 UART: [state] Locking Datavault
5,095,650 UART: [state] Locking PCR0, PCR1 and PCR31
5,096,254 UART: [state] Locking ICCM
5,096,754 UART: [exit] Launching FMC @ 0x40000130
5,102,084 UART:
5,102,100 UART: Running Caliptra FMC ...
5,102,508 UART:
5,102,562 UART: [state] CFI Enabled
5,191,713 UART: [art] Extend RT PCRs Done
5,192,141 UART: [art] Lock RT PCRs Done
5,193,434 UART: [art] Populate DV Done
5,201,826 UART: [fht] FMC Alias Private Key: 7
5,202,846 UART: [art] Derive CDI
5,203,126 UART: [art] Store in slot 0x4
5,288,582 UART: [art] Derive Key Pair
5,288,942 UART: [art] Store priv key in slot 0x5
5,302,663 UART: [art] Derive Key Pair - Done
5,317,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,333,016 UART: [art] Erasing AUTHORITY.KEYID = 7
5,333,781 UART: [art] PUB.X = 0004A89F686D807A79C246831F3EC3217F8F3EB09B86C272C668D5C4EDF5D83E1564F79D3E8EA3A5D66B71400F7210EF
5,340,527 UART: [art] PUB.Y = A26AE8B19E9E3CD1C9120B7CB48D11EFE5147AABB8B2B010C000157B20EFEEB1F8463652AB59E430E1D27FB71C66346F
5,347,468 UART: [art] SIG.R = 54B35FDB8BF313D69E6CD81C018E9D883230C8D058D56FBFAF0D53DA298766D4794824E1A17328682E51842041DDF648
5,354,232 UART: [art] SIG.S = BEC150E06EBEE9C746BA5190D9018AD9B45BDB21EBFC7EC9500C8AE5AE4A37BB06B5C1300CE53D28832C7C10ABCE9ABF
5,378,580 UART: Caliptra RT
5,378,831 UART: [state] CFI Enabled
5,745,252 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,746,616 UART:
5,746,632 UART: Running Caliptra ROM ...
5,747,040 UART:
5,747,094 UART: [state] CFI Enabled
5,749,376 UART: [state] LifecycleState = Unprovisioned
5,750,031 UART: [state] DebugLocked = No
5,750,683 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,752,336 UART: [kat] SHA2-256
6,546,267 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,550,382 UART: [kat] ++
6,550,534 UART: [kat] sha1
6,554,760 UART: [kat] SHA2-256
6,556,698 UART: [kat] SHA2-384
6,559,621 UART: [kat] SHA2-512-ACC
6,561,521 UART: [kat] ECC-384
6,566,946 UART: [kat] HMAC-384Kdf
6,571,432 UART: [kat] LMS
7,139,628 UART: [kat] --
7,140,485 UART: [update-reset] ++
8,521,655 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,522,773 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,678,040 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,816 >>> mbox cmd response: success
2,980,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,042,228 UART:
3,042,244 UART: Running Caliptra FMC ...
3,042,652 UART:
3,042,706 UART: [state] CFI Enabled
3,053,561 UART: [fht] FMC Alias Private Key: 7
3,172,569 UART: [art] Extend RT PCRs Done
3,172,997 UART: [art] Lock RT PCRs Done
3,174,031 UART: [art] Populate DV Done
3,182,337 UART: [fht] FMC Alias Private Key: 7
3,183,411 UART: [art] Derive CDI
3,183,691 UART: [art] Store in slot 0x4
3,269,081 UART: [art] Derive Key Pair
3,269,441 UART: [art] Store priv key in slot 0x5
3,282,562 UART: [art] Derive Key Pair - Done
3,297,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,659 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,424 UART: [art] PUB.X = 75F0FDEF531345D79261D20B19598461D43DE2DA61A8BBA7A76D36796350F46565190A9E754AC158846D1C171E72B72F
3,320,184 UART: [art] PUB.Y = 4919BC123CCE9FF91B7296743A54F3A7F51CA705456C3DE662959F37A8AB97BABCD23971263D274A109953FDB650647E
3,327,133 UART: [art] SIG.R = 40FFD69902BCCF58724DDD830BC54E842416B2DC54120C3C9030A19104C1C0B42906AF7AB91DD0BC4E45EE8E2B34AF46
3,333,900 UART: [art] SIG.S = A1A15756D23F6F59735DB6DA3DBACFE001E8FD21F6E7C1F92AECEC9657C20CD165676DF217A8FD027D4D2EC20B76D0C8
3,357,868 UART: Caliptra RT
3,358,119 UART: [state] CFI Enabled
3,477,631 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,796,379 >>> mbox cmd response: failed
4,796,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,802,371 UART:
4,802,387 UART: Running Caliptra FMC ...
4,802,795 UART:
4,802,849 UART: [state] CFI Enabled
4,891,232 UART: [art] Extend RT PCRs Done
4,891,660 UART: [art] Lock RT PCRs Done
4,892,937 UART: [art] Populate DV Done
4,901,049 UART: [fht] FMC Alias Private Key: 7
4,902,089 UART: [art] Derive CDI
4,902,369 UART: [art] Store in slot 0x4
4,987,875 UART: [art] Derive Key Pair
4,988,235 UART: [art] Store priv key in slot 0x5
5,001,314 UART: [art] Derive Key Pair - Done
5,016,250 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,031,821 UART: [art] Erasing AUTHORITY.KEYID = 7
5,032,586 UART: [art] PUB.X = 75F0FDEF531345D79261D20B19598461D43DE2DA61A8BBA7A76D36796350F46565190A9E754AC158846D1C171E72B72F
5,039,346 UART: [art] PUB.Y = 4919BC123CCE9FF91B7296743A54F3A7F51CA705456C3DE662959F37A8AB97BABCD23971263D274A109953FDB650647E
5,046,295 UART: [art] SIG.R = 40FFD69902BCCF58724DDD830BC54E842416B2DC54120C3C9030A19104C1C0B42906AF7AB91DD0BC4E45EE8E2B34AF46
5,053,062 UART: [art] SIG.S = A1A15756D23F6F59735DB6DA3DBACFE001E8FD21F6E7C1F92AECEC9657C20CD165676DF217A8FD027D4D2EC20B76D0C8
5,076,642 UART: Caliptra RT
5,076,893 UART: [state] CFI Enabled
5,435,050 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,249,472 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,556 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,110 UART: [kat] SHA2-256
882,041 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,156 UART: [kat] ++
886,308 UART: [kat] sha1
890,710 UART: [kat] SHA2-256
892,648 UART: [kat] SHA2-384
895,319 UART: [kat] SHA2-512-ACC
897,220 UART: [kat] ECC-384
902,939 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,818 UART: [cold-reset] ++
1,477,254 UART: [fht] Storing FHT @ 0x50003400
1,480,035 UART: [idev] ++
1,480,203 UART: [idev] CDI.KEYID = 6
1,480,563 UART: [idev] SUBJECT.KEYID = 7
1,480,987 UART: [idev] UDS.KEYID = 0
1,481,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,971 UART: [idev] Erasing UDS.KEYID = 0
1,505,727 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,489 UART: [idev] --
1,515,760 UART: [ldev] ++
1,515,928 UART: [ldev] CDI.KEYID = 6
1,516,291 UART: [ldev] SUBJECT.KEYID = 5
1,516,717 UART: [ldev] AUTHORITY.KEYID = 7
1,517,180 UART: [ldev] FE.KEYID = 1
1,522,454 UART: [ldev] Erasing FE.KEYID = 1
1,548,521 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,437 UART: [ldev] --
1,587,832 UART: [fwproc] Waiting for Commands...
1,588,503 UART: [fwproc] Received command 0x46574c44
1,589,294 UART: [fwproc] Received Image of size 118548 bytes
2,933,038 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,960,372 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,590 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,823 >>> mbox cmd response: success
3,131,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,133,005 UART: [afmc] ++
3,133,173 UART: [afmc] CDI.KEYID = 6
3,133,535 UART: [afmc] SUBJECT.KEYID = 7
3,133,960 UART: [afmc] AUTHORITY.KEYID = 5
3,169,676 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,984 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,764 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
3,192,475 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
3,198,360 UART: [afmc] SIG.R = 1B808139A82154D7829344C14F7B3DCF8F462FA097D7D853513EE4FCF41FDEC17279B80A528F0E3E44F7259FC827691F
3,204,067 UART: [afmc] SIG.S = A280234D1482F252CC9ACF9F10C4B2975C754071275AA8869D333FFCFC50C67A43378261ED7FEE9C46891DD00B478232
3,212,027 UART: [afmc] --
3,212,917 UART: [cold-reset] --
3,213,731 UART: [state] Locking Datavault
3,214,956 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,560 UART: [state] Locking ICCM
3,216,048 UART: [exit] Launching FMC @ 0x40000130
3,221,378 UART:
3,221,394 UART: Running Caliptra FMC ...
3,221,802 UART:
3,221,945 UART: [state] CFI Enabled
3,232,510 UART: [fht] FMC Alias Private Key: 7
3,351,822 UART: [art] Extend RT PCRs Done
3,352,250 UART: [art] Lock RT PCRs Done
3,353,586 UART: [art] Populate DV Done
3,361,788 UART: [fht] FMC Alias Private Key: 7
3,362,782 UART: [art] Derive CDI
3,363,062 UART: [art] Store in slot 0x4
3,449,014 UART: [art] Derive Key Pair
3,449,374 UART: [art] Store priv key in slot 0x5
3,462,853 UART: [art] Derive Key Pair - Done
3,477,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,790 UART: [art] PUB.X = 510037CF057F0EE7098809D8F236169F3AE9AD1158CDF18739C9B07B7651AA9608F20BF4BE5231405A3CE1DA4786A21D
3,500,522 UART: [art] PUB.Y = 3EB1C33CE119460B11C8C01C3E8B77EDA0C6040DC2EFB8C31F5BDAC68CD622441CD311B7CA8E6D943D87C91377B7FA1D
3,507,483 UART: [art] SIG.R = 1EE4A4AE7D81FDE862DA169470D325C35FB071BCDF3874FDCAC8AAD38DAB336B59EDBE31F39339F90C1B6D67D9292653
3,514,270 UART: [art] SIG.S = 2F9EDC123B9CBEF7F9EC57AFA0D5298D8E31475537182F9E627017119EE5BC3F963837E1FDA92584CA58825AB6FC44D9
3,537,910 UART: Caliptra RT
3,538,253 UART: [state] CFI Enabled
3,658,586 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,660,281 UART:
3,660,297 UART: Running Caliptra ROM ...
3,660,705 UART:
3,660,846 UART: [state] CFI Enabled
3,663,862 UART: [state] LifecycleState = Unprovisioned
3,664,517 UART: [state] DebugLocked = No
3,665,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,666,840 UART: [kat] SHA2-256
4,460,771 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,464,886 UART: [kat] ++
4,465,038 UART: [kat] sha1
4,469,248 UART: [kat] SHA2-256
4,471,186 UART: [kat] SHA2-384
4,474,079 UART: [kat] SHA2-512-ACC
4,475,979 UART: [kat] ECC-384
4,481,452 UART: [kat] HMAC-384Kdf
4,486,044 UART: [kat] LMS
5,054,240 UART: [kat] --
5,055,113 UART: [update-reset] ++
5,093,890 >>> mbox cmd response: failed
5,093,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,094,102 UART: ROM Non-Fatal Error: 0x000B001E
5,094,992 UART: [state] Locking Datavault
5,095,976 UART: [state] Locking PCR0, PCR1 and PCR31
5,096,580 UART: [state] Locking ICCM
5,097,004 UART: [exit] Launching FMC @ 0x40000130
5,102,334 UART:
5,102,350 UART: Running Caliptra FMC ...
5,102,758 UART:
5,102,901 UART: [state] CFI Enabled
5,192,488 UART: [art] Extend RT PCRs Done
5,192,916 UART: [art] Lock RT PCRs Done
5,194,403 UART: [art] Populate DV Done
5,202,593 UART: [fht] FMC Alias Private Key: 7
5,203,767 UART: [art] Derive CDI
5,204,047 UART: [art] Store in slot 0x4
5,289,583 UART: [art] Derive Key Pair
5,289,943 UART: [art] Store priv key in slot 0x5
5,303,188 UART: [art] Derive Key Pair - Done
5,318,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,333,524 UART: [art] Erasing AUTHORITY.KEYID = 7
5,334,289 UART: [art] PUB.X = 510037CF057F0EE7098809D8F236169F3AE9AD1158CDF18739C9B07B7651AA9608F20BF4BE5231405A3CE1DA4786A21D
5,341,021 UART: [art] PUB.Y = 3EB1C33CE119460B11C8C01C3E8B77EDA0C6040DC2EFB8C31F5BDAC68CD622441CD311B7CA8E6D943D87C91377B7FA1D
5,347,982 UART: [art] SIG.R = 1EE4A4AE7D81FDE862DA169470D325C35FB071BCDF3874FDCAC8AAD38DAB336B59EDBE31F39339F90C1B6D67D9292653
5,354,769 UART: [art] SIG.S = 2F9EDC123B9CBEF7F9EC57AFA0D5298D8E31475537182F9E627017119EE5BC3F963837E1FDA92584CA58825AB6FC44D9
5,378,493 UART: Caliptra RT
5,378,836 UART: [state] CFI Enabled
5,742,546 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,744,118 UART:
5,744,134 UART: Running Caliptra ROM ...
5,744,542 UART:
5,744,683 UART: [state] CFI Enabled
5,747,665 UART: [state] LifecycleState = Unprovisioned
5,748,320 UART: [state] DebugLocked = No
5,748,882 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,750,497 UART: [kat] SHA2-256
6,544,428 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,548,543 UART: [kat] ++
6,548,695 UART: [kat] sha1
6,553,011 UART: [kat] SHA2-256
6,554,949 UART: [kat] SHA2-384
6,557,856 UART: [kat] SHA2-512-ACC
6,559,756 UART: [kat] ECC-384
6,565,355 UART: [kat] HMAC-384Kdf
6,569,965 UART: [kat] LMS
7,138,161 UART: [kat] --
7,139,092 UART: [update-reset] ++
8,520,316 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,521,444 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,676,711 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,471 >>> mbox cmd response: success
2,981,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,043,451 UART:
3,043,467 UART: Running Caliptra FMC ...
3,043,875 UART:
3,044,018 UART: [state] CFI Enabled
3,054,613 UART: [fht] FMC Alias Private Key: 7
3,173,397 UART: [art] Extend RT PCRs Done
3,173,825 UART: [art] Lock RT PCRs Done
3,175,519 UART: [art] Populate DV Done
3,183,677 UART: [fht] FMC Alias Private Key: 7
3,184,737 UART: [art] Derive CDI
3,185,017 UART: [art] Store in slot 0x4
3,270,381 UART: [art] Derive Key Pair
3,270,741 UART: [art] Store priv key in slot 0x5
3,284,264 UART: [art] Derive Key Pair - Done
3,299,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,931 UART: [art] PUB.X = B1696263C5A5ACD3129203390158534A602213116F1ACDBEFD2BDAC35D90567A218FE49F0FA2ED6349C4D749BB8B7E4E
3,322,700 UART: [art] PUB.Y = EC13FAB11C9CF532D23DFB22E19C2574FF4D783149EE7E0CD40F13A75C9415CE230E12ACF30CE704D1EA16A32E17B70F
3,329,650 UART: [art] SIG.R = 57CF2438AD761778D1F32A9C0EB6C4E56545FFE0BC04F55E46CAAD23A8781989114ABCC410D3B69AE53C638432A166EF
3,336,424 UART: [art] SIG.S = DDF97170EEC4DD735801935DE54DC40590F43DB22C4899EE1D156077ECF8B8DE11381F7A68560C1329624C4827BD1E56
3,360,431 UART: Caliptra RT
3,360,774 UART: [state] CFI Enabled
3,480,586 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,799,925 >>> mbox cmd response: failed
4,799,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,805,721 UART:
4,805,737 UART: Running Caliptra FMC ...
4,806,145 UART:
4,806,288 UART: [state] CFI Enabled
4,895,011 UART: [art] Extend RT PCRs Done
4,895,439 UART: [art] Lock RT PCRs Done
4,896,664 UART: [art] Populate DV Done
4,904,960 UART: [fht] FMC Alias Private Key: 7
4,906,114 UART: [art] Derive CDI
4,906,394 UART: [art] Store in slot 0x4
4,992,442 UART: [art] Derive Key Pair
4,992,802 UART: [art] Store priv key in slot 0x5
5,006,453 UART: [art] Derive Key Pair - Done
5,021,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,036,995 UART: [art] Erasing AUTHORITY.KEYID = 7
5,037,760 UART: [art] PUB.X = B1696263C5A5ACD3129203390158534A602213116F1ACDBEFD2BDAC35D90567A218FE49F0FA2ED6349C4D749BB8B7E4E
5,044,529 UART: [art] PUB.Y = EC13FAB11C9CF532D23DFB22E19C2574FF4D783149EE7E0CD40F13A75C9415CE230E12ACF30CE704D1EA16A32E17B70F
5,051,479 UART: [art] SIG.R = 57CF2438AD761778D1F32A9C0EB6C4E56545FFE0BC04F55E46CAAD23A8781989114ABCC410D3B69AE53C638432A166EF
5,058,253 UART: [art] SIG.S = DDF97170EEC4DD735801935DE54DC40590F43DB22C4899EE1D156077ECF8B8DE11381F7A68560C1329624C4827BD1E56
5,081,822 UART: Caliptra RT
5,082,165 UART: [state] CFI Enabled
5,447,552 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,263,099 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
891,334 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,438 UART: [kat] ++
895,590 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,367 UART: [kat] SHA2-512-ACC
906,268 UART: [kat] ECC-384
916,027 UART: [kat] HMAC-384Kdf
920,585 UART: [kat] LMS
1,168,897 UART: [kat] --
1,169,568 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,630 UART: [idev] ++
1,172,798 UART: [idev] CDI.KEYID = 6
1,173,159 UART: [idev] SUBJECT.KEYID = 7
1,173,584 UART: [idev] UDS.KEYID = 0
1,173,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,281 UART: [idev] Erasing UDS.KEYID = 0
1,199,093 UART: [idev] Sha1 KeyId Algorithm
1,207,961 UART: [idev] --
1,208,938 UART: [ldev] ++
1,209,106 UART: [ldev] CDI.KEYID = 6
1,209,470 UART: [ldev] SUBJECT.KEYID = 5
1,209,897 UART: [ldev] AUTHORITY.KEYID = 7
1,210,360 UART: [ldev] FE.KEYID = 1
1,215,528 UART: [ldev] Erasing FE.KEYID = 1
1,241,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,376 UART: [ldev] --
1,280,587 UART: [fwproc] Wait for Commands...
1,281,354 UART: [fwproc] Recv command 0x46574c44
1,282,087 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,652,366 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,541 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,844 >>> mbox cmd response: success
2,823,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,824,892 UART: [afmc] ++
2,825,060 UART: [afmc] CDI.KEYID = 6
2,825,423 UART: [afmc] SUBJECT.KEYID = 7
2,825,849 UART: [afmc] AUTHORITY.KEYID = 5
2,861,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,701 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,413 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,296 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,009 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,903,759 UART: [afmc] --
2,904,632 UART: [cold-reset] --
2,905,464 UART: [state] Locking Datavault
2,906,757 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,361 UART: [state] Locking ICCM
2,907,935 UART: [exit] Launching FMC @ 0x40000130
2,913,265 UART:
2,913,281 UART: Running Caliptra FMC ...
2,913,689 UART:
2,913,743 UART: [state] CFI Enabled
2,924,044 UART: [fht] FMC Alias Private Key: 7
3,042,732 UART: [art] Extend RT PCRs Done
3,043,160 UART: [art] Lock RT PCRs Done
3,044,680 UART: [art] Populate DV Done
3,052,860 UART: [fht] FMC Alias Private Key: 7
3,053,956 UART: [art] Derive CDI
3,054,236 UART: [art] Store in slot 0x4
3,139,683 UART: [art] Derive Key Pair
3,140,043 UART: [art] Store priv key in slot 0x5
3,153,399 UART: [art] Derive Key Pair - Done
3,168,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,658 UART: [art] PUB.X = 570BBEC9B82EA712369C04EAD6CC94223C77B00D42A24EA2D84BE10A304892E9F4FB62BC5BDD6609518E48F2A21790F7
3,191,423 UART: [art] PUB.Y = 96DB825706565B213672BA5DC1E48AC42A340552D9E17D9BE9B2C6D330358E219B1B16DCA9272A6207740C8E6A0F24EC
3,198,360 UART: [art] SIG.R = 0EC6F4929203A340B75F29A0E9F0CB2AB70218C3C0E830D849C0996F17F8C242A46D517640D4BCFEEC958F2F2FB476DB
3,205,131 UART: [art] SIG.S = 15B307AEB2367C255EB59A0D8E9B643AF739C975252156F60996FC45A5CD12359A9CED4F9C85EEAF9A0DE944F6E40151
3,228,382 UART: Caliptra RT
3,228,633 UART: [state] CFI Enabled
3,348,509 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,350,481 UART:
3,350,497 UART: Running Caliptra ROM ...
3,350,905 UART:
3,350,960 UART: [state] CFI Enabled
3,353,636 UART: [state] LifecycleState = Unprovisioned
3,354,291 UART: [state] DebugLocked = No
3,354,819 UART: [state] WD Timer not started. Device not locked for debugging
3,355,967 UART: [kat] SHA2-256
4,159,517 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,163,621 UART: [kat] ++
4,163,773 UART: [kat] sha1
4,168,187 UART: [kat] SHA2-256
4,170,127 UART: [kat] SHA2-384
4,172,678 UART: [kat] SHA2-512-ACC
4,174,578 UART: [kat] ECC-384
4,184,433 UART: [kat] HMAC-384Kdf
4,188,827 UART: [kat] LMS
4,437,139 UART: [kat] --
4,438,019 UART: [update-reset] ++
4,454,501 >>> mbox cmd response: failed
4,454,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,454,913 UART: ROM Non-Fatal Error: 0x000B001E
4,455,809 UART: [state] Locking Datavault
4,456,833 UART: [state] Locking PCR0, PCR1 and PCR31
4,457,437 UART: [state] Locking ICCM
4,457,965 UART: [exit] Launching FMC @ 0x40000130
4,463,295 UART:
4,463,311 UART: Running Caliptra FMC ...
4,463,719 UART:
4,463,773 UART: [state] CFI Enabled
4,553,114 UART: [art] Extend RT PCRs Done
4,553,542 UART: [art] Lock RT PCRs Done
4,554,833 UART: [art] Populate DV Done
4,562,903 UART: [fht] FMC Alias Private Key: 7
4,563,941 UART: [art] Derive CDI
4,564,221 UART: [art] Store in slot 0x4
4,649,930 UART: [art] Derive Key Pair
4,650,290 UART: [art] Store priv key in slot 0x5
4,663,370 UART: [art] Derive Key Pair - Done
4,678,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,693,784 UART: [art] Erasing AUTHORITY.KEYID = 7
4,694,549 UART: [art] PUB.X = 570BBEC9B82EA712369C04EAD6CC94223C77B00D42A24EA2D84BE10A304892E9F4FB62BC5BDD6609518E48F2A21790F7
4,701,314 UART: [art] PUB.Y = 96DB825706565B213672BA5DC1E48AC42A340552D9E17D9BE9B2C6D330358E219B1B16DCA9272A6207740C8E6A0F24EC
4,708,251 UART: [art] SIG.R = 0EC6F4929203A340B75F29A0E9F0CB2AB70218C3C0E830D849C0996F17F8C242A46D517640D4BCFEEC958F2F2FB476DB
4,715,022 UART: [art] SIG.S = 15B307AEB2367C255EB59A0D8E9B643AF739C975252156F60996FC45A5CD12359A9CED4F9C85EEAF9A0DE944F6E40151
4,738,469 UART: Caliptra RT
4,738,720 UART: [state] CFI Enabled
5,099,539 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,101,226 UART:
5,101,242 UART: Running Caliptra ROM ...
5,101,650 UART:
5,101,705 UART: [state] CFI Enabled
5,104,061 UART: [state] LifecycleState = Unprovisioned
5,104,716 UART: [state] DebugLocked = No
5,105,308 UART: [state] WD Timer not started. Device not locked for debugging
5,106,638 UART: [kat] SHA2-256
5,910,188 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,914,292 UART: [kat] ++
5,914,444 UART: [kat] sha1
5,918,582 UART: [kat] SHA2-256
5,920,522 UART: [kat] SHA2-384
5,923,347 UART: [kat] SHA2-512-ACC
5,925,247 UART: [kat] ECC-384
5,934,754 UART: [kat] HMAC-384Kdf
5,939,160 UART: [kat] LMS
6,187,472 UART: [kat] --
6,188,122 UART: [update-reset] ++
7,547,274 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,548,313 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,703,528 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,869 >>> mbox cmd response: success
2,678,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,363 UART:
2,740,379 UART: Running Caliptra FMC ...
2,740,787 UART:
2,740,841 UART: [state] CFI Enabled
2,751,512 UART: [fht] FMC Alias Private Key: 7
2,869,590 UART: [art] Extend RT PCRs Done
2,870,018 UART: [art] Lock RT PCRs Done
2,871,354 UART: [art] Populate DV Done
2,879,516 UART: [fht] FMC Alias Private Key: 7
2,880,546 UART: [art] Derive CDI
2,880,826 UART: [art] Store in slot 0x4
2,966,999 UART: [art] Derive Key Pair
2,967,359 UART: [art] Store priv key in slot 0x5
2,980,757 UART: [art] Derive Key Pair - Done
2,995,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,743 UART: [art] PUB.X = 64E3AACA6E092881545498BBCE7D04E8D48DD3C495D28AA396A00DD5111D128DBDF0EC59D37C40D155077266E761BB41
3,018,509 UART: [art] PUB.Y = 634CD9C2C6882C2D6F2ADE9BC4200C3808BE7A3ACF1B0CFFDD327AD9C45813CDEA4BB94969A2AA8843005BC9438688B8
3,025,446 UART: [art] SIG.R = E0907998ACE5B37BE0FCCB0111ADD1D10C505EA00C7FE31316FC0359B2768EBB61A9D7CC3646DEC432B9CDB2B751FA36
3,032,224 UART: [art] SIG.S = 9413D1B805074568721B968764A472D651CDDAAE0AFFEDCCAAC642C3D95DF4A0960B3C2CA34486223A068C2E17124916
3,056,135 UART: Caliptra RT
3,056,386 UART: [state] CFI Enabled
3,176,539 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,169,900 >>> mbox cmd response: failed
4,169,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,175,704 UART:
4,175,720 UART: Running Caliptra FMC ...
4,176,128 UART:
4,176,182 UART: [state] CFI Enabled
4,264,983 UART: [art] Extend RT PCRs Done
4,265,411 UART: [art] Lock RT PCRs Done
4,266,638 UART: [art] Populate DV Done
4,274,654 UART: [fht] FMC Alias Private Key: 7
4,275,790 UART: [art] Derive CDI
4,276,070 UART: [art] Store in slot 0x4
4,362,103 UART: [art] Derive Key Pair
4,362,463 UART: [art] Store priv key in slot 0x5
4,376,085 UART: [art] Derive Key Pair - Done
4,390,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,406,100 UART: [art] Erasing AUTHORITY.KEYID = 7
4,406,865 UART: [art] PUB.X = 64E3AACA6E092881545498BBCE7D04E8D48DD3C495D28AA396A00DD5111D128DBDF0EC59D37C40D155077266E761BB41
4,413,631 UART: [art] PUB.Y = 634CD9C2C6882C2D6F2ADE9BC4200C3808BE7A3ACF1B0CFFDD327AD9C45813CDEA4BB94969A2AA8843005BC9438688B8
4,420,568 UART: [art] SIG.R = E0907998ACE5B37BE0FCCB0111ADD1D10C505EA00C7FE31316FC0359B2768EBB61A9D7CC3646DEC432B9CDB2B751FA36
4,427,346 UART: [art] SIG.S = 9413D1B805074568721B968764A472D651CDDAAE0AFFEDCCAAC642C3D95DF4A0960B3C2CA34486223A068C2E17124916
4,451,335 UART: Caliptra RT
4,451,586 UART: [state] CFI Enabled
4,820,142 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,306,967 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,991 UART: [state] LifecycleState = Unprovisioned
85,646 UART: [state] DebugLocked = No
86,222 UART: [state] WD Timer not started. Device not locked for debugging
87,373 UART: [kat] SHA2-256
890,923 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,027 UART: [kat] ++
895,179 UART: [kat] sha1
899,607 UART: [kat] SHA2-256
901,547 UART: [kat] SHA2-384
904,228 UART: [kat] SHA2-512-ACC
906,129 UART: [kat] ECC-384
915,966 UART: [kat] HMAC-384Kdf
920,660 UART: [kat] LMS
1,168,972 UART: [kat] --
1,169,641 UART: [cold-reset] ++
1,170,201 UART: [fht] FHT @ 0x50003400
1,172,781 UART: [idev] ++
1,172,949 UART: [idev] CDI.KEYID = 6
1,173,310 UART: [idev] SUBJECT.KEYID = 7
1,173,735 UART: [idev] UDS.KEYID = 0
1,174,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,520 UART: [idev] Erasing UDS.KEYID = 0
1,198,670 UART: [idev] Sha1 KeyId Algorithm
1,207,628 UART: [idev] --
1,208,651 UART: [ldev] ++
1,208,819 UART: [ldev] CDI.KEYID = 6
1,209,183 UART: [ldev] SUBJECT.KEYID = 5
1,209,610 UART: [ldev] AUTHORITY.KEYID = 7
1,210,073 UART: [ldev] FE.KEYID = 1
1,215,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,281 UART: [ldev] --
1,281,538 UART: [fwproc] Wait for Commands...
1,282,247 UART: [fwproc] Recv command 0x46574c44
1,282,980 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,321 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,496 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,763 >>> mbox cmd response: success
2,824,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,825,867 UART: [afmc] ++
2,826,035 UART: [afmc] CDI.KEYID = 6
2,826,398 UART: [afmc] SUBJECT.KEYID = 7
2,826,824 UART: [afmc] AUTHORITY.KEYID = 5
2,861,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,190 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,902 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,785 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,498 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,440 UART: [afmc] --
2,905,251 UART: [cold-reset] --
2,906,039 UART: [state] Locking Datavault
2,906,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,542 UART: [state] Locking ICCM
2,908,198 UART: [exit] Launching FMC @ 0x40000130
2,913,528 UART:
2,913,544 UART: Running Caliptra FMC ...
2,913,952 UART:
2,914,095 UART: [state] CFI Enabled
2,924,718 UART: [fht] FMC Alias Private Key: 7
3,044,346 UART: [art] Extend RT PCRs Done
3,044,774 UART: [art] Lock RT PCRs Done
3,046,236 UART: [art] Populate DV Done
3,054,504 UART: [fht] FMC Alias Private Key: 7
3,055,644 UART: [art] Derive CDI
3,055,924 UART: [art] Store in slot 0x4
3,141,439 UART: [art] Derive Key Pair
3,141,799 UART: [art] Store priv key in slot 0x5
3,154,941 UART: [art] Derive Key Pair - Done
3,169,727 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,741 UART: [art] PUB.X = 62D1752E9DD3177D1AB979AAB132BF9E71831155F5F66BE32AD78C98E3FCE438DC6BE96C558E1A0C5145B7D92DF37EB8
3,192,522 UART: [art] PUB.Y = 0A706D0D23318CD314491345F1CC6431258DF8609B5B1EDDA00894523B1AFD3F6FB8913746B1B5FA35C9FFBA667CBE26
3,199,471 UART: [art] SIG.R = BDC91FB2C52B315EB7A3AF283741EB93482488A10E53A31AE0144B1518F3510008B64370EEDBEEEBE51207C5A837CDD0
3,206,220 UART: [art] SIG.S = 30B33D33615509D1703EE2B92F167C22EB6A42FD5F31FDC167463175D14AF1779040160753B8DAA9F775098F17EA52E5
3,229,685 UART: Caliptra RT
3,230,028 UART: [state] CFI Enabled
3,349,540 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,351,790 UART:
3,351,806 UART: Running Caliptra ROM ...
3,352,214 UART:
3,352,356 UART: [state] CFI Enabled
3,355,054 UART: [state] LifecycleState = Unprovisioned
3,355,709 UART: [state] DebugLocked = No
3,356,245 UART: [state] WD Timer not started. Device not locked for debugging
3,357,519 UART: [kat] SHA2-256
4,161,069 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,165,173 UART: [kat] ++
4,165,325 UART: [kat] sha1
4,169,489 UART: [kat] SHA2-256
4,171,429 UART: [kat] SHA2-384
4,174,372 UART: [kat] SHA2-512-ACC
4,176,272 UART: [kat] ECC-384
4,186,139 UART: [kat] HMAC-384Kdf
4,190,645 UART: [kat] LMS
4,438,957 UART: [kat] --
4,439,511 UART: [update-reset] ++
4,456,579 >>> mbox cmd response: failed
4,456,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,456,933 UART: ROM Non-Fatal Error: 0x000B001E
4,457,753 UART: [state] Locking Datavault
4,458,597 UART: [state] Locking PCR0, PCR1 and PCR31
4,459,201 UART: [state] Locking ICCM
4,459,769 UART: [exit] Launching FMC @ 0x40000130
4,465,099 UART:
4,465,115 UART: Running Caliptra FMC ...
4,465,523 UART:
4,465,666 UART: [state] CFI Enabled
4,555,071 UART: [art] Extend RT PCRs Done
4,555,499 UART: [art] Lock RT PCRs Done
4,556,964 UART: [art] Populate DV Done
4,564,908 UART: [fht] FMC Alias Private Key: 7
4,566,006 UART: [art] Derive CDI
4,566,286 UART: [art] Store in slot 0x4
4,652,399 UART: [art] Derive Key Pair
4,652,759 UART: [art] Store priv key in slot 0x5
4,665,697 UART: [art] Derive Key Pair - Done
4,680,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,696,248 UART: [art] Erasing AUTHORITY.KEYID = 7
4,697,013 UART: [art] PUB.X = 62D1752E9DD3177D1AB979AAB132BF9E71831155F5F66BE32AD78C98E3FCE438DC6BE96C558E1A0C5145B7D92DF37EB8
4,703,794 UART: [art] PUB.Y = 0A706D0D23318CD314491345F1CC6431258DF8609B5B1EDDA00894523B1AFD3F6FB8913746B1B5FA35C9FFBA667CBE26
4,710,743 UART: [art] SIG.R = BDC91FB2C52B315EB7A3AF283741EB93482488A10E53A31AE0144B1518F3510008B64370EEDBEEEBE51207C5A837CDD0
4,717,492 UART: [art] SIG.S = 30B33D33615509D1703EE2B92F167C22EB6A42FD5F31FDC167463175D14AF1779040160753B8DAA9F775098F17EA52E5
4,741,335 UART: Caliptra RT
4,741,678 UART: [state] CFI Enabled
5,108,035 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,109,744 UART:
5,109,760 UART: Running Caliptra ROM ...
5,110,168 UART:
5,110,310 UART: [state] CFI Enabled
5,113,438 UART: [state] LifecycleState = Unprovisioned
5,114,093 UART: [state] DebugLocked = No
5,114,683 UART: [state] WD Timer not started. Device not locked for debugging
5,115,941 UART: [kat] SHA2-256
5,919,491 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,923,595 UART: [kat] ++
5,923,747 UART: [kat] sha1
5,927,859 UART: [kat] SHA2-256
5,929,799 UART: [kat] SHA2-384
5,932,468 UART: [kat] SHA2-512-ACC
5,934,368 UART: [kat] ECC-384
5,944,281 UART: [kat] HMAC-384Kdf
5,948,951 UART: [kat] LMS
6,197,263 UART: [kat] --
6,198,001 UART: [update-reset] ++
7,557,461 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,558,506 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,713,721 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,532 >>> mbox cmd response: success
2,678,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,936 UART:
2,740,952 UART: Running Caliptra FMC ...
2,741,360 UART:
2,741,503 UART: [state] CFI Enabled
2,751,782 UART: [fht] FMC Alias Private Key: 7
2,871,230 UART: [art] Extend RT PCRs Done
2,871,658 UART: [art] Lock RT PCRs Done
2,872,882 UART: [art] Populate DV Done
2,880,960 UART: [fht] FMC Alias Private Key: 7
2,882,028 UART: [art] Derive CDI
2,882,308 UART: [art] Store in slot 0x4
2,968,287 UART: [art] Derive Key Pair
2,968,647 UART: [art] Store priv key in slot 0x5
2,982,321 UART: [art] Derive Key Pair - Done
2,997,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,308 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,073 UART: [art] PUB.X = 7FD767C98218E0A02845E86A22D625A3BFF7FC4B7BF48376E9853622B8080E3D24E42EEB597D962F546DE8BB137A60E7
3,019,841 UART: [art] PUB.Y = CD7189BA84AC94F9E58BE751C034C00994840E744FBCD273E672F2C536E806B4E3FFAE30831BDB4FA5DC3D9A9AB993C5
3,026,798 UART: [art] SIG.R = 918E3BEEEE7ED64A96C461CCDE0DE6C69DD57F48337306A7CF67E3A76DBEC9034ABA98B3B6C0A79C079366EE30F7785E
3,033,576 UART: [art] SIG.S = 237603AE8306183B6CDA489FA4F6E671469D4438A079C5B332E884DAF014661BCA46FC80B584DAA5C1B50AB5997040BF
3,057,373 UART: Caliptra RT
3,057,716 UART: [state] CFI Enabled
3,178,748 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,172,576 >>> mbox cmd response: failed
4,172,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,177,950 UART:
4,177,966 UART: Running Caliptra FMC ...
4,178,374 UART:
4,178,517 UART: [state] CFI Enabled
4,267,860 UART: [art] Extend RT PCRs Done
4,268,288 UART: [art] Lock RT PCRs Done
4,269,569 UART: [art] Populate DV Done
4,277,701 UART: [fht] FMC Alias Private Key: 7
4,278,647 UART: [art] Derive CDI
4,278,927 UART: [art] Store in slot 0x4
4,364,486 UART: [art] Derive Key Pair
4,364,846 UART: [art] Store priv key in slot 0x5
4,378,436 UART: [art] Derive Key Pair - Done
4,393,544 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,409,187 UART: [art] Erasing AUTHORITY.KEYID = 7
4,409,952 UART: [art] PUB.X = 7FD767C98218E0A02845E86A22D625A3BFF7FC4B7BF48376E9853622B8080E3D24E42EEB597D962F546DE8BB137A60E7
4,416,720 UART: [art] PUB.Y = CD7189BA84AC94F9E58BE751C034C00994840E744FBCD273E672F2C536E806B4E3FFAE30831BDB4FA5DC3D9A9AB993C5
4,423,677 UART: [art] SIG.R = 918E3BEEEE7ED64A96C461CCDE0DE6C69DD57F48337306A7CF67E3A76DBEC9034ABA98B3B6C0A79C079366EE30F7785E
4,430,455 UART: [art] SIG.S = 237603AE8306183B6CDA489FA4F6E671469D4438A079C5B332E884DAF014661BCA46FC80B584DAA5C1B50AB5997040BF
4,454,096 UART: Caliptra RT
4,454,439 UART: [state] CFI Enabled
4,816,414 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,305,420 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,668 UART: [state] LifecycleState = Unprovisioned
85,323 UART: [state] DebugLocked = No
86,019 UART: [state] WD Timer not started. Device not locked for debugging
87,252 UART: [kat] SHA2-256
892,902 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,027 UART: [kat] ++
897,179 UART: [kat] sha1
901,555 UART: [kat] SHA2-256
903,495 UART: [kat] SHA2-384
906,274 UART: [kat] SHA2-512-ACC
908,175 UART: [kat] ECC-384
917,860 UART: [kat] HMAC-384Kdf
922,540 UART: [kat] LMS
1,170,868 UART: [kat] --
1,171,819 UART: [cold-reset] ++
1,172,319 UART: [fht] FHT @ 0x50003400
1,174,850 UART: [idev] ++
1,175,018 UART: [idev] CDI.KEYID = 6
1,175,378 UART: [idev] SUBJECT.KEYID = 7
1,175,802 UART: [idev] UDS.KEYID = 0
1,176,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,792 UART: [idev] Erasing UDS.KEYID = 0
1,200,729 UART: [idev] Sha1 KeyId Algorithm
1,209,177 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,724 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,216,891 UART: [ldev] Erasing FE.KEYID = 1
1,243,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,235 UART: [ldev] --
1,282,696 UART: [fwproc] Wait for Commands...
1,283,296 UART: [fwproc] Recv command 0x46574c44
1,284,024 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,656,150 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,320 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,547 >>> mbox cmd response: success
2,827,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,828,747 UART: [afmc] ++
2,828,915 UART: [afmc] CDI.KEYID = 6
2,829,277 UART: [afmc] SUBJECT.KEYID = 7
2,829,702 UART: [afmc] AUTHORITY.KEYID = 5
2,864,660 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,105 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,816 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,701 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,414 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,907,243 UART: [afmc] --
2,908,245 UART: [cold-reset] --
2,908,973 UART: [state] Locking Datavault
2,910,266 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,870 UART: [state] Locking ICCM
2,911,326 UART: [exit] Launching FMC @ 0x40000130
2,916,656 UART:
2,916,672 UART: Running Caliptra FMC ...
2,917,080 UART:
2,917,134 UART: [state] CFI Enabled
2,927,533 UART: [fht] FMC Alias Private Key: 7
3,045,609 UART: [art] Extend RT PCRs Done
3,046,037 UART: [art] Lock RT PCRs Done
3,047,401 UART: [art] Populate DV Done
3,055,679 UART: [fht] FMC Alias Private Key: 7
3,056,619 UART: [art] Derive CDI
3,056,899 UART: [art] Store in slot 0x4
3,142,488 UART: [art] Derive Key Pair
3,142,848 UART: [art] Store priv key in slot 0x5
3,156,156 UART: [art] Derive Key Pair - Done
3,170,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,208 UART: [art] PUB.X = 6C8D3CC98A0E3C130C2409E69E27FDDBA9F7C07A912ED0CC813F5EC69F4458E021ABE66A1D52B6E1193CEF600B7CA477
3,193,984 UART: [art] PUB.Y = 6D518FCBEE74AC06CFBD11AFC4DD9FF78D2415F14009B44EC11FADFD11F378E297B4BA1F153BA80ABA050C0AFA0F4174
3,200,941 UART: [art] SIG.R = EBB1960C0B01394AE32F2AA088FDC6DA8C096D27FE605DFA259F6D8CE17C3462DDDB5B993F79BD6D439B7CA758053ECB
3,207,718 UART: [art] SIG.S = ED8CCF055944C9AED53BC2A47EAF28CDEF42A109CF24E6EFCF7500DA89D828AC421DDBDC134552AD9DDA993BD4698828
3,231,356 UART: Caliptra RT
3,231,607 UART: [state] CFI Enabled
3,351,150 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,380 UART:
3,353,396 UART: Running Caliptra ROM ...
3,353,804 UART:
3,353,859 UART: [state] CFI Enabled
3,357,017 UART: [state] LifecycleState = Unprovisioned
3,357,672 UART: [state] DebugLocked = No
3,358,192 UART: [state] WD Timer not started. Device not locked for debugging
3,359,516 UART: [kat] SHA2-256
4,165,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,169,291 UART: [kat] ++
4,169,443 UART: [kat] sha1
4,173,657 UART: [kat] SHA2-256
4,175,597 UART: [kat] SHA2-384
4,178,310 UART: [kat] SHA2-512-ACC
4,180,210 UART: [kat] ECC-384
4,189,677 UART: [kat] HMAC-384Kdf
4,194,143 UART: [kat] LMS
4,442,471 UART: [kat] --
4,443,359 UART: [update-reset] ++
4,460,234 >>> mbox cmd response: failed
4,460,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,460,668 UART: ROM Non-Fatal Error: 0x000B001E
4,461,490 UART: [state] Locking Datavault
4,462,274 UART: [state] Locking PCR0, PCR1 and PCR31
4,462,878 UART: [state] Locking ICCM
4,463,504 UART: [exit] Launching FMC @ 0x40000130
4,468,834 UART:
4,468,850 UART: Running Caliptra FMC ...
4,469,258 UART:
4,469,312 UART: [state] CFI Enabled
4,558,453 UART: [art] Extend RT PCRs Done
4,558,881 UART: [art] Lock RT PCRs Done
4,560,114 UART: [art] Populate DV Done
4,568,418 UART: [fht] FMC Alias Private Key: 7
4,569,426 UART: [art] Derive CDI
4,569,706 UART: [art] Store in slot 0x4
4,655,659 UART: [art] Derive Key Pair
4,656,019 UART: [art] Store priv key in slot 0x5
4,668,933 UART: [art] Derive Key Pair - Done
4,683,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,698,878 UART: [art] Erasing AUTHORITY.KEYID = 7
4,699,643 UART: [art] PUB.X = 6C8D3CC98A0E3C130C2409E69E27FDDBA9F7C07A912ED0CC813F5EC69F4458E021ABE66A1D52B6E1193CEF600B7CA477
4,706,419 UART: [art] PUB.Y = 6D518FCBEE74AC06CFBD11AFC4DD9FF78D2415F14009B44EC11FADFD11F378E297B4BA1F153BA80ABA050C0AFA0F4174
4,713,376 UART: [art] SIG.R = EBB1960C0B01394AE32F2AA088FDC6DA8C096D27FE605DFA259F6D8CE17C3462DDDB5B993F79BD6D439B7CA758053ECB
4,720,153 UART: [art] SIG.S = ED8CCF055944C9AED53BC2A47EAF28CDEF42A109CF24E6EFCF7500DA89D828AC421DDBDC134552AD9DDA993BD4698828
4,744,297 UART: Caliptra RT
4,744,548 UART: [state] CFI Enabled
5,110,340 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,112,003 UART:
5,112,019 UART: Running Caliptra ROM ...
5,112,427 UART:
5,112,482 UART: [state] CFI Enabled
5,114,728 UART: [state] LifecycleState = Unprovisioned
5,115,383 UART: [state] DebugLocked = No
5,116,049 UART: [state] WD Timer not started. Device not locked for debugging
5,117,337 UART: [kat] SHA2-256
5,922,987 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,927,112 UART: [kat] ++
5,927,264 UART: [kat] sha1
5,931,490 UART: [kat] SHA2-256
5,933,430 UART: [kat] SHA2-384
5,936,279 UART: [kat] SHA2-512-ACC
5,938,179 UART: [kat] ECC-384
5,947,940 UART: [kat] HMAC-384Kdf
5,952,736 UART: [kat] LMS
6,201,064 UART: [kat] --
6,201,808 UART: [update-reset] ++
7,560,170 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,561,315 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,716,530 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,206 >>> mbox cmd response: success
2,678,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,500 UART:
2,740,516 UART: Running Caliptra FMC ...
2,740,924 UART:
2,740,978 UART: [state] CFI Enabled
2,751,705 UART: [fht] FMC Alias Private Key: 7
2,871,063 UART: [art] Extend RT PCRs Done
2,871,491 UART: [art] Lock RT PCRs Done
2,873,015 UART: [art] Populate DV Done
2,881,225 UART: [fht] FMC Alias Private Key: 7
2,882,221 UART: [art] Derive CDI
2,882,501 UART: [art] Store in slot 0x4
2,968,464 UART: [art] Derive Key Pair
2,968,824 UART: [art] Store priv key in slot 0x5
2,981,258 UART: [art] Derive Key Pair - Done
2,996,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,322 UART: [art] PUB.X = 39E2E25725164229C4E20DC6DFF24196348EAB40FD6660ECD38B2F4B21395BDBB2B57C07FF5D665E9E72BC82729B3350
3,019,092 UART: [art] PUB.Y = A256369A7A8A3435C14F7AAAB88F161586CF708195BBB68615456A9D22E1BE831E415F09D4C4F28F8C93908E46D0CFE0
3,026,043 UART: [art] SIG.R = 4425F7F5775B1DCDB89AA28C5A5509A75739C25B092A3C33C8AF90EDEC143D8F61B549290907F63089A2CB60EDBDE3CB
3,032,813 UART: [art] SIG.S = 9C4BDA60B1CA230CC6FE91A42A3866AF316CA802D381B5BD368CAC9E79F8B73C72296AA264B8113DEEAA10E8A9CA5BD0
3,057,299 UART: Caliptra RT
3,057,550 UART: [state] CFI Enabled
3,177,326 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,171,906 >>> mbox cmd response: failed
4,171,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,177,692 UART:
4,177,708 UART: Running Caliptra FMC ...
4,178,116 UART:
4,178,170 UART: [state] CFI Enabled
4,267,195 UART: [art] Extend RT PCRs Done
4,267,623 UART: [art] Lock RT PCRs Done
4,268,996 UART: [art] Populate DV Done
4,277,218 UART: [fht] FMC Alias Private Key: 7
4,278,156 UART: [art] Derive CDI
4,278,436 UART: [art] Store in slot 0x4
4,364,395 UART: [art] Derive Key Pair
4,364,755 UART: [art] Store priv key in slot 0x5
4,378,219 UART: [art] Derive Key Pair - Done
4,392,697 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,408,238 UART: [art] Erasing AUTHORITY.KEYID = 7
4,409,003 UART: [art] PUB.X = 39E2E25725164229C4E20DC6DFF24196348EAB40FD6660ECD38B2F4B21395BDBB2B57C07FF5D665E9E72BC82729B3350
4,415,773 UART: [art] PUB.Y = A256369A7A8A3435C14F7AAAB88F161586CF708195BBB68615456A9D22E1BE831E415F09D4C4F28F8C93908E46D0CFE0
4,422,724 UART: [art] SIG.R = 4425F7F5775B1DCDB89AA28C5A5509A75739C25B092A3C33C8AF90EDEC143D8F61B549290907F63089A2CB60EDBDE3CB
4,429,494 UART: [art] SIG.S = 9C4BDA60B1CA230CC6FE91A42A3866AF316CA802D381B5BD368CAC9E79F8B73C72296AA264B8113DEEAA10E8A9CA5BD0
4,453,238 UART: Caliptra RT
4,453,489 UART: [state] CFI Enabled
4,820,048 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,310,819 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,563 UART: [kat] SHA2-256
893,213 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,338 UART: [kat] ++
897,490 UART: [kat] sha1
901,782 UART: [kat] SHA2-256
903,722 UART: [kat] SHA2-384
906,369 UART: [kat] SHA2-512-ACC
908,270 UART: [kat] ECC-384
918,385 UART: [kat] HMAC-384Kdf
922,899 UART: [kat] LMS
1,171,227 UART: [kat] --
1,172,190 UART: [cold-reset] ++
1,172,606 UART: [fht] FHT @ 0x50003400
1,175,249 UART: [idev] ++
1,175,417 UART: [idev] CDI.KEYID = 6
1,175,777 UART: [idev] SUBJECT.KEYID = 7
1,176,201 UART: [idev] UDS.KEYID = 0
1,176,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,911 UART: [idev] Erasing UDS.KEYID = 0
1,201,086 UART: [idev] Sha1 KeyId Algorithm
1,209,436 UART: [idev] --
1,210,408 UART: [ldev] ++
1,210,576 UART: [ldev] CDI.KEYID = 6
1,210,939 UART: [ldev] SUBJECT.KEYID = 5
1,211,365 UART: [ldev] AUTHORITY.KEYID = 7
1,211,828 UART: [ldev] FE.KEYID = 1
1,217,028 UART: [ldev] Erasing FE.KEYID = 1
1,243,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,772 UART: [ldev] --
1,282,203 UART: [fwproc] Wait for Commands...
1,282,937 UART: [fwproc] Recv command 0x46574c44
1,283,665 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,715 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,885 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,278 >>> mbox cmd response: success
2,826,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,827,526 UART: [afmc] ++
2,827,694 UART: [afmc] CDI.KEYID = 6
2,828,056 UART: [afmc] SUBJECT.KEYID = 7
2,828,481 UART: [afmc] AUTHORITY.KEYID = 5
2,864,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,442 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,153 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,038 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,751 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,486 UART: [afmc] --
2,907,452 UART: [cold-reset] --
2,908,266 UART: [state] Locking Datavault
2,909,453 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,057 UART: [state] Locking ICCM
2,910,483 UART: [exit] Launching FMC @ 0x40000130
2,915,813 UART:
2,915,829 UART: Running Caliptra FMC ...
2,916,237 UART:
2,916,380 UART: [state] CFI Enabled
2,927,317 UART: [fht] FMC Alias Private Key: 7
3,046,077 UART: [art] Extend RT PCRs Done
3,046,505 UART: [art] Lock RT PCRs Done
3,048,435 UART: [art] Populate DV Done
3,056,617 UART: [fht] FMC Alias Private Key: 7
3,057,617 UART: [art] Derive CDI
3,057,897 UART: [art] Store in slot 0x4
3,143,852 UART: [art] Derive Key Pair
3,144,212 UART: [art] Store priv key in slot 0x5
3,157,880 UART: [art] Derive Key Pair - Done
3,172,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,151 UART: [art] PUB.X = 68712D8D20F01CDC752EC2D9A48FF87CD58A2D8FAB965E120876992D72182B8CD894B84712E4E04E54AD46DB47CAAE05
3,195,925 UART: [art] PUB.Y = 1608A5704B127377BB97BE6E67C3938A01A4AE8C21347FFB09AB817A702E658460C040154D091835E069C9A4EB313EC0
3,202,859 UART: [art] SIG.R = E22C4E53EC2BB2CACB26D61B8A48A729348AD7CD487F587952D3C322849F255011A7A9974525B9119ED43048D0F20391
3,209,624 UART: [art] SIG.S = 961DCEDC9885AFEA726DFEF61355BD149A25860FC0F9B178D21A47AC8FC666E2B3C5A25BBCF4E83598D8C97600070209
3,233,742 UART: Caliptra RT
3,234,085 UART: [state] CFI Enabled
3,353,910 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,355,900 UART:
3,355,916 UART: Running Caliptra ROM ...
3,356,324 UART:
3,356,466 UART: [state] CFI Enabled
3,359,592 UART: [state] LifecycleState = Unprovisioned
3,360,247 UART: [state] DebugLocked = No
3,360,823 UART: [state] WD Timer not started. Device not locked for debugging
3,362,161 UART: [kat] SHA2-256
4,167,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,171,936 UART: [kat] ++
4,172,088 UART: [kat] sha1
4,176,420 UART: [kat] SHA2-256
4,178,360 UART: [kat] SHA2-384
4,181,123 UART: [kat] SHA2-512-ACC
4,183,023 UART: [kat] ECC-384
4,192,744 UART: [kat] HMAC-384Kdf
4,197,170 UART: [kat] LMS
4,445,498 UART: [kat] --
4,446,320 UART: [update-reset] ++
4,463,305 >>> mbox cmd response: failed
4,463,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,463,691 UART: ROM Non-Fatal Error: 0x000B001E
4,464,617 UART: [state] Locking Datavault
4,465,339 UART: [state] Locking PCR0, PCR1 and PCR31
4,465,943 UART: [state] Locking ICCM
4,466,481 UART: [exit] Launching FMC @ 0x40000130
4,471,811 UART:
4,471,827 UART: Running Caliptra FMC ...
4,472,235 UART:
4,472,378 UART: [state] CFI Enabled
4,561,695 UART: [art] Extend RT PCRs Done
4,562,123 UART: [art] Lock RT PCRs Done
4,563,068 UART: [art] Populate DV Done
4,570,966 UART: [fht] FMC Alias Private Key: 7
4,571,984 UART: [art] Derive CDI
4,572,264 UART: [art] Store in slot 0x4
4,658,213 UART: [art] Derive Key Pair
4,658,573 UART: [art] Store priv key in slot 0x5
4,671,725 UART: [art] Derive Key Pair - Done
4,686,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,702,377 UART: [art] Erasing AUTHORITY.KEYID = 7
4,703,142 UART: [art] PUB.X = 68712D8D20F01CDC752EC2D9A48FF87CD58A2D8FAB965E120876992D72182B8CD894B84712E4E04E54AD46DB47CAAE05
4,709,916 UART: [art] PUB.Y = 1608A5704B127377BB97BE6E67C3938A01A4AE8C21347FFB09AB817A702E658460C040154D091835E069C9A4EB313EC0
4,716,850 UART: [art] SIG.R = E22C4E53EC2BB2CACB26D61B8A48A729348AD7CD487F587952D3C322849F255011A7A9974525B9119ED43048D0F20391
4,723,615 UART: [art] SIG.S = 961DCEDC9885AFEA726DFEF61355BD149A25860FC0F9B178D21A47AC8FC666E2B3C5A25BBCF4E83598D8C97600070209
4,747,711 UART: Caliptra RT
4,748,054 UART: [state] CFI Enabled
5,112,698 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,114,315 UART:
5,114,331 UART: Running Caliptra ROM ...
5,114,739 UART:
5,114,881 UART: [state] CFI Enabled
5,117,795 UART: [state] LifecycleState = Unprovisioned
5,118,450 UART: [state] DebugLocked = No
5,119,114 UART: [state] WD Timer not started. Device not locked for debugging
5,120,460 UART: [kat] SHA2-256
5,926,110 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,930,235 UART: [kat] ++
5,930,387 UART: [kat] sha1
5,934,549 UART: [kat] SHA2-256
5,936,489 UART: [kat] SHA2-384
5,939,260 UART: [kat] SHA2-512-ACC
5,941,160 UART: [kat] ECC-384
5,950,711 UART: [kat] HMAC-384Kdf
5,955,363 UART: [kat] LMS
6,203,691 UART: [kat] --
6,204,581 UART: [update-reset] ++
7,563,495 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,564,496 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,719,711 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,965 >>> mbox cmd response: success
2,680,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,743,443 UART:
2,743,459 UART: Running Caliptra FMC ...
2,743,867 UART:
2,744,010 UART: [state] CFI Enabled
2,754,789 UART: [fht] FMC Alias Private Key: 7
2,874,045 UART: [art] Extend RT PCRs Done
2,874,473 UART: [art] Lock RT PCRs Done
2,876,183 UART: [art] Populate DV Done
2,884,595 UART: [fht] FMC Alias Private Key: 7
2,885,677 UART: [art] Derive CDI
2,885,957 UART: [art] Store in slot 0x4
2,972,040 UART: [art] Derive Key Pair
2,972,400 UART: [art] Store priv key in slot 0x5
2,985,778 UART: [art] Derive Key Pair - Done
3,000,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,543 UART: [art] PUB.X = 8ED9D64D639FA41CDCC611F1DBDD4081670F1243C5D1B18539235903D59F3DC89033960931DA657D4C9CDE427527682B
3,023,304 UART: [art] PUB.Y = DAAAD57D195508333C7B059EA49FF235FA5BA320DFB382A893B5B9C5AB31876755CF6FD7537A44FADD93B73AB7D49370
3,030,262 UART: [art] SIG.R = 644BFE2546032E376D929A03210F4927C7EA2701E124851B4EB0DF98E34887D8038B72DF2DB1FA14115BE5BF519E1E59
3,037,017 UART: [art] SIG.S = 5165ABFA23AB0EAF55DE89C9FF8D4465B83AD0CACDA47CD5201F8F52396D2126DB328ACE21BD50B2F9FDFC387E0729C0
3,060,941 UART: Caliptra RT
3,061,284 UART: [state] CFI Enabled
3,180,670 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,174,687 >>> mbox cmd response: failed
4,174,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,180,563 UART:
4,180,579 UART: Running Caliptra FMC ...
4,180,987 UART:
4,181,130 UART: [state] CFI Enabled
4,270,503 UART: [art] Extend RT PCRs Done
4,270,931 UART: [art] Lock RT PCRs Done
4,272,080 UART: [art] Populate DV Done
4,280,446 UART: [fht] FMC Alias Private Key: 7
4,281,464 UART: [art] Derive CDI
4,281,744 UART: [art] Store in slot 0x4
4,367,537 UART: [art] Derive Key Pair
4,367,897 UART: [art] Store priv key in slot 0x5
4,381,631 UART: [art] Derive Key Pair - Done
4,396,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,412,547 UART: [art] Erasing AUTHORITY.KEYID = 7
4,413,312 UART: [art] PUB.X = 8ED9D64D639FA41CDCC611F1DBDD4081670F1243C5D1B18539235903D59F3DC89033960931DA657D4C9CDE427527682B
4,420,073 UART: [art] PUB.Y = DAAAD57D195508333C7B059EA49FF235FA5BA320DFB382A893B5B9C5AB31876755CF6FD7537A44FADD93B73AB7D49370
4,427,031 UART: [art] SIG.R = 644BFE2546032E376D929A03210F4927C7EA2701E124851B4EB0DF98E34887D8038B72DF2DB1FA14115BE5BF519E1E59
4,433,786 UART: [art] SIG.S = 5165ABFA23AB0EAF55DE89C9FF8D4465B83AD0CACDA47CD5201F8F52396D2126DB328ACE21BD50B2F9FDFC387E0729C0
4,457,536 UART: Caliptra RT
4,457,879 UART: [state] CFI Enabled
4,824,196 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,313,750 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,186 UART:
192,544 UART: Running Caliptra ROM ...
193,733 UART:
193,891 UART: [state] CFI Enabled
260,877 UART: [state] LifecycleState = Unprovisioned
262,855 UART: [state] DebugLocked = No
265,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,190 UART: [kat] SHA2-256
439,915 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,413 UART: [kat] ++
450,949 UART: [kat] sha1
463,071 UART: [kat] SHA2-256
465,759 UART: [kat] SHA2-384
472,991 UART: [kat] SHA2-512-ACC
475,384 UART: [kat] ECC-384
2,762,057 UART: [kat] HMAC-384Kdf
2,774,304 UART: [kat] LMS
3,964,631 UART: [kat] --
3,968,162 UART: [cold-reset] ++
3,970,218 UART: [fht] Storing FHT @ 0x50003400
3,981,832 UART: [idev] ++
3,982,399 UART: [idev] CDI.KEYID = 6
3,983,372 UART: [idev] SUBJECT.KEYID = 7
3,984,586 UART: [idev] UDS.KEYID = 0
3,987,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,136,727 UART: [idev] Erasing UDS.KEYID = 0
7,322,874 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,748 UART: [idev] --
7,348,127 UART: [ldev] ++
7,348,700 UART: [ldev] CDI.KEYID = 6
7,349,668 UART: [ldev] SUBJECT.KEYID = 5
7,350,882 UART: [ldev] AUTHORITY.KEYID = 7
7,352,115 UART: [ldev] FE.KEYID = 1
7,397,841 UART: [ldev] Erasing FE.KEYID = 1
10,732,549 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,645 UART: [ldev] --
13,112,812 UART: [fwproc] Waiting for Commands...
13,115,656 UART: [fwproc] Received command 0x46574c44
13,117,856 UART: [fwproc] Received Image of size 118548 bytes
22,131,578 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,209,086 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,282,268 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,610,772 >>> mbox cmd response: success
22,612,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,761,887 UART: [afmc] ++
22,762,527 UART: [afmc] CDI.KEYID = 6
22,763,453 UART: [afmc] SUBJECT.KEYID = 7
22,764,562 UART: [afmc] AUTHORITY.KEYID = 5
25,969,596 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,274,969 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,277,241 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,291,718 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,306,507 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,320,905 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,342,394 UART: [afmc] --
28,346,366 UART: [cold-reset] --
28,351,361 UART: [state] Locking Datavault
28,354,715 UART: [state] Locking PCR0, PCR1 and PCR31
28,356,470 UART: [state] Locking ICCM
28,358,408 UART: [exit] Launching FMC @ 0x40000130
28,366,806 UART:
28,367,046 UART: Running Caliptra FMC ...
28,368,150 UART:
28,368,311 UART: [state] CFI Enabled
28,434,259 UART: [fht] FMC Alias Private Key: 7
30,796,000 UART: [art] Extend RT PCRs Done
30,797,220 UART: [art] Lock RT PCRs Done
30,798,689 UART: [art] Populate DV Done
30,804,154 UART: [fht] FMC Alias Private Key: 7
30,805,637 UART: [art] Derive CDI
30,806,396 UART: [art] Store in slot 0x4
30,864,057 UART: [art] Derive Key Pair
30,865,057 UART: [art] Store priv key in slot 0x5
34,158,136 UART: [art] Derive Key Pair - Done
34,170,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,458,992 UART: [art] Erasing AUTHORITY.KEYID = 7
36,460,496 UART: [art] PUB.X = FFEEB94BA02AA8FB5463D6A6F2F5DF3AB4989A13CF42A8929A514CE1D4B272E8944AB9E6AE3877B0A2D8B8B20FC66C04
36,467,751 UART: [art] PUB.Y = A4D873C1AB3E8E3F9C47FE817E5AF68249F56EDD20D17AA628C6A3398C1A34C15F929C081F3619593E90CC124194CF86
36,475,015 UART: [art] SIG.R = 8C717D8CCC452A5384531B6937565729EC603D8CFA37B86765A0A92E127317AC655397DDED2C6A9EB3C4C221DC2CF853
36,482,423 UART: [art] SIG.S = 2B00AA95C09C28687B7F0348A1722B4C49B68FE04209E80C33C76903F3E9E951B3EE0043E71794F96166227D72548DC2
37,787,854 UART: Caliptra RT
37,788,547 UART: [state] CFI Enabled
37,964,546 UART: [rt] RT listening for mailbox commands...
37,967,393 UART:
37,967,565 UART: Running Caliptra ROM ...
37,968,678 UART:
37,968,833 UART: [state] CFI Enabled
38,035,100 UART: [state] LifecycleState = Unprovisioned
38,037,030 UART: [state] DebugLocked = No
38,039,691 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,044,972 UART: [kat] SHA2-256
38,214,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,225,204 UART: [kat] ++
38,225,748 UART: [kat] sha1
38,236,386 UART: [kat] SHA2-256
38,239,062 UART: [kat] SHA2-384
38,244,751 UART: [kat] SHA2-512-ACC
38,247,107 UART: [kat] ECC-384
40,539,578 UART: [kat] HMAC-384Kdf
40,570,902 UART: [kat] LMS
41,761,241 UART: [kat] --
41,766,266 UART: [update-reset] ++
41,878,850 >>> mbox cmd response: failed
41,881,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
42,030,219 UART: ROM Non-Fatal Error: 0x000B003D
42,031,641 UART: [state] Locking Datavault
42,032,796 UART: [state] Locking PCR0, PCR1 and PCR31
42,034,338 UART: [state] Locking ICCM
42,035,251 UART: [exit] Launching FMC @ 0x40000130
42,036,679 UART:
42,036,846 UART: Running Caliptra FMC ...
42,037,948 UART:
42,038,128 UART: [state] CFI Enabled
42,039,051 UART: [art] Extend RT PCRs Done
42,040,194 UART: [art] Lock RT PCRs Done
42,041,262 UART: [art] Populate DV Done
42,042,289 UART: [fht] FMC Alias Private Key: 7
42,043,609 UART: [art] Derive CDI
42,044,347 UART: [art] Store in slot 0x4
42,075,443 UART: [art] Derive Key Pair
42,076,488 UART: [art] Store priv key in slot 0x5
45,369,486 UART: [art] Derive Key Pair - Done
45,382,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,670,679 UART: [art] Erasing AUTHORITY.KEYID = 7
47,672,372 UART: [art] PUB.X = FFEEB94BA02AA8FB5463D6A6F2F5DF3AB4989A13CF42A8929A514CE1D4B272E8944AB9E6AE3877B0A2D8B8B20FC66C04
47,679,463 UART: [art] PUB.Y = A4D873C1AB3E8E3F9C47FE817E5AF68249F56EDD20D17AA628C6A3398C1A34C15F929C081F3619593E90CC124194CF86
47,686,698 UART: [art] SIG.R = 8C717D8CCC452A5384531B6937565729EC603D8CFA37B86765A0A92E127317AC655397DDED2C6A9EB3C4C221DC2CF853
47,694,092 UART: [art] SIG.S = 2B00AA95C09C28687B7F0348A1722B4C49B68FE04209E80C33C76903F3E9E951B3EE0043E71794F96166227D72548DC2
48,999,075 UART: Caliptra RT
48,999,794 UART: [state] CFI Enabled
49,418,878 UART: [rt] RT listening for mailbox commands...
49,421,778 UART:
49,422,035 UART: Running Caliptra ROM ...
49,423,154 UART:
49,423,313 UART: [state] CFI Enabled
49,484,259 UART: [state] LifecycleState = Unprovisioned
49,486,184 UART: [state] DebugLocked = No
49,488,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
49,493,040 UART: [kat] SHA2-256
49,662,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
49,673,235 UART: [kat] ++
49,673,695 UART: [kat] sha1
49,685,068 UART: [kat] SHA2-256
49,687,767 UART: [kat] SHA2-384
49,693,230 UART: [kat] SHA2-512-ACC
49,695,580 UART: [kat] ECC-384
51,989,479 UART: [kat] HMAC-384Kdf
52,019,799 UART: [kat] LMS
53,210,147 UART: [kat] --
53,215,571 UART: [update-reset] ++
62,308,788 UART: [update-reset] Image verified using Vendor ECC Key Index 0
62,313,281 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
62,711,008 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,805,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,753,235 >>> mbox cmd response: success
21,755,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,443,578 UART:
27,444,088 UART: Running Caliptra FMC ...
27,445,212 UART:
27,445,379 UART: [state] CFI Enabled
27,513,798 UART: [fht] FMC Alias Private Key: 7
29,854,226 UART: [art] Extend RT PCRs Done
29,855,581 UART: [art] Lock RT PCRs Done
29,856,891 UART: [art] Populate DV Done
29,862,196 UART: [fht] FMC Alias Private Key: 7
29,863,851 UART: [art] Derive CDI
29,864,673 UART: [art] Store in slot 0x4
29,922,013 UART: [art] Derive Key Pair
29,923,014 UART: [art] Store priv key in slot 0x5
33,215,331 UART: [art] Derive Key Pair - Done
33,228,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,516,875 UART: [art] Erasing AUTHORITY.KEYID = 7
35,518,396 UART: [art] PUB.X = 97FEEAD002EB5FF251666F7DC967B158DF1243976E2C9CA5937ED279A37DFE178768FFEA641C64FE8E82191F95A04D3B
35,525,670 UART: [art] PUB.Y = 9837942728A82DD72B943884ED1B0E38B41601BE5089827C91B6713C5E23ECF0AE71C607AB1F2FDC191B3DECF9DFDB1F
35,532,977 UART: [art] SIG.R = B58AECE6AFC2FF6F40EFD9A01BE746A57968972E30DC7F2E46BCD5A049659E8DC7195C78D867F34780E3A5985B093909
35,540,361 UART: [art] SIG.S = 1AA184E2E3EBF58A64DFE65921CCE33508D47B9F303495363B9C5B8E2033CEDD55381AD8890708F2281DB4569B1B5F78
36,845,656 UART: Caliptra RT
36,846,360 UART: [state] CFI Enabled
37,022,959 UART: [rt] RT listening for mailbox commands...
40,757,798 >>> mbox cmd response: failed
40,759,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,908,943 UART:
40,909,268 UART: Running Caliptra FMC ...
40,910,397 UART:
40,910,571 UART: [state] CFI Enabled
40,911,502 UART: [art] Extend RT PCRs Done
40,912,646 UART: [art] Lock RT PCRs Done
40,913,737 UART: [art] Populate DV Done
40,914,770 UART: [fht] FMC Alias Private Key: 7
40,916,190 UART: [art] Derive CDI
40,916,931 UART: [art] Store in slot 0x4
40,927,889 UART: [art] Derive Key Pair
40,928,894 UART: [art] Store priv key in slot 0x5
44,221,925 UART: [art] Derive Key Pair - Done
44,234,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
46,522,881 UART: [art] Erasing AUTHORITY.KEYID = 7
46,524,436 UART: [art] PUB.X = 97FEEAD002EB5FF251666F7DC967B158DF1243976E2C9CA5937ED279A37DFE178768FFEA641C64FE8E82191F95A04D3B
46,531,706 UART: [art] PUB.Y = 9837942728A82DD72B943884ED1B0E38B41601BE5089827C91B6713C5E23ECF0AE71C607AB1F2FDC191B3DECF9DFDB1F
46,538,950 UART: [art] SIG.R = B58AECE6AFC2FF6F40EFD9A01BE746A57968972E30DC7F2E46BCD5A049659E8DC7195C78D867F34780E3A5985B093909
46,546,359 UART: [art] SIG.S = 1AA184E2E3EBF58A64DFE65921CCE33508D47B9F303495363B9C5B8E2033CEDD55381AD8890708F2281DB4569B1B5F78
47,851,618 UART: Caliptra RT
47,852,335 UART: [state] CFI Enabled
48,268,301 UART: [rt] RT listening for mailbox commands...
60,716,780 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.36s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,507 UART:
192,871 UART: Running Caliptra ROM ...
194,063 UART:
603,600 UART: [state] CFI Enabled
618,481 UART: [state] LifecycleState = Unprovisioned
620,410 UART: [state] DebugLocked = No
622,880 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,002 UART: [kat] SHA2-256
797,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,332 UART: [kat] ++
808,782 UART: [kat] sha1
821,010 UART: [kat] SHA2-256
823,748 UART: [kat] SHA2-384
827,999 UART: [kat] SHA2-512-ACC
830,394 UART: [kat] ECC-384
3,115,966 UART: [kat] HMAC-384Kdf
3,128,749 UART: [kat] LMS
4,318,836 UART: [kat] --
4,322,696 UART: [cold-reset] ++
4,325,253 UART: [fht] Storing FHT @ 0x50003400
4,337,012 UART: [idev] ++
4,337,594 UART: [idev] CDI.KEYID = 6
4,338,620 UART: [idev] SUBJECT.KEYID = 7
4,339,788 UART: [idev] UDS.KEYID = 0
4,342,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,797 UART: [idev] Erasing UDS.KEYID = 0
7,621,908 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,135 UART: [idev] --
7,648,952 UART: [ldev] ++
7,649,536 UART: [ldev] CDI.KEYID = 6
7,650,513 UART: [ldev] SUBJECT.KEYID = 5
7,651,740 UART: [ldev] AUTHORITY.KEYID = 7
7,652,986 UART: [ldev] FE.KEYID = 1
7,665,267 UART: [ldev] Erasing FE.KEYID = 1
10,955,596 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,720 UART: [ldev] --
13,319,718 UART: [fwproc] Waiting for Commands...
13,322,745 UART: [fwproc] Received command 0x46574c44
13,324,939 UART: [fwproc] Received Image of size 118548 bytes
22,096,561 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,174,845 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,248,044 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,575,702 >>> mbox cmd response: success
22,577,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,726,735 UART: [afmc] ++
22,727,381 UART: [afmc] CDI.KEYID = 6
22,728,317 UART: [afmc] SUBJECT.KEYID = 7
22,729,455 UART: [afmc] AUTHORITY.KEYID = 5
25,897,620 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,194,178 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,196,493 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,210,943 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,225,730 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,240,104 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,260,803 UART: [afmc] --
28,265,532 UART: [cold-reset] --
28,268,804 UART: [state] Locking Datavault
28,275,138 UART: [state] Locking PCR0, PCR1 and PCR31
28,276,895 UART: [state] Locking ICCM
28,279,485 UART: [exit] Launching FMC @ 0x40000130
28,287,885 UART:
28,288,134 UART: Running Caliptra FMC ...
28,289,246 UART:
28,289,446 UART: [state] CFI Enabled
28,297,636 UART: [fht] FMC Alias Private Key: 7
30,637,950 UART: [art] Extend RT PCRs Done
30,639,181 UART: [art] Lock RT PCRs Done
30,640,485 UART: [art] Populate DV Done
30,645,739 UART: [fht] FMC Alias Private Key: 7
30,647,337 UART: [art] Derive CDI
30,648,159 UART: [art] Store in slot 0x4
30,690,648 UART: [art] Derive Key Pair
30,691,653 UART: [art] Store priv key in slot 0x5
33,933,841 UART: [art] Derive Key Pair - Done
33,946,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,227,063 UART: [art] Erasing AUTHORITY.KEYID = 7
36,228,578 UART: [art] PUB.X = 6F9B1EFB7C571B2080D7A0226D086B90E050C9D6A57A0C1C06DBA35C880FE7B6DE2969EBF31C4493B425FFCEE1DA2F96
36,235,844 UART: [art] PUB.Y = BF464A6BEF0A7AB6A4254F71BE836BBC92C97AEA5A74154988E376870C76F22149B6F1BCB8FF435AFA5A2264233EF45C
36,243,091 UART: [art] SIG.R = CF8022C21003FAD236AAF817F1C80B3B42F11977A63904CDC14E6A3529D8C7F94B451C2EFC5E55A7D27595292F67F63B
36,250,516 UART: [art] SIG.S = 0A8590DC9358F764C637408900F208B9D4D77F1F67FC15FD4C28783C96F45199F6D06AFB6D509DC797E5B74DDD2186AA
37,556,039 UART: Caliptra RT
37,556,771 UART: [state] CFI Enabled
37,690,051 UART: [rt] RT listening for mailbox commands...
37,693,283 UART:
37,693,457 UART: Running Caliptra ROM ...
37,694,565 UART:
37,694,946 UART: [state] CFI Enabled
37,709,430 UART: [state] LifecycleState = Unprovisioned
37,711,320 UART: [state] DebugLocked = No
37,713,002 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,718,493 UART: [kat] SHA2-256
37,888,225 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
37,898,779 UART: [kat] ++
37,899,239 UART: [kat] sha1
37,910,227 UART: [kat] SHA2-256
37,912,928 UART: [kat] SHA2-384
37,918,062 UART: [kat] SHA2-512-ACC
37,920,419 UART: [kat] ECC-384
40,203,709 UART: [kat] HMAC-384Kdf
40,215,450 UART: [kat] LMS
41,405,508 UART: [kat] --
41,411,360 UART: [update-reset] ++
41,527,574 >>> mbox cmd response: failed
41,529,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,678,680 UART: ROM Non-Fatal Error: 0x000B003D
41,680,125 UART: [state] Locking Datavault
41,681,201 UART: [state] Locking PCR0, PCR1 and PCR31
41,682,749 UART: [state] Locking ICCM
41,683,663 UART: [exit] Launching FMC @ 0x40000130
41,685,095 UART:
41,685,262 UART: Running Caliptra FMC ...
41,686,382 UART:
41,686,546 UART: [state] CFI Enabled
41,687,470 UART: [art] Extend RT PCRs Done
41,688,614 UART: [art] Lock RT PCRs Done
41,689,686 UART: [art] Populate DV Done
41,690,722 UART: [fht] FMC Alias Private Key: 7
41,692,044 UART: [art] Derive CDI
41,692,789 UART: [art] Store in slot 0x4
41,693,852 UART: [art] Derive Key Pair
41,694,853 UART: [art] Store priv key in slot 0x5
44,890,587 UART: [art] Derive Key Pair - Done
44,903,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,183,769 UART: [art] Erasing AUTHORITY.KEYID = 7
47,185,334 UART: [art] PUB.X = 6F9B1EFB7C571B2080D7A0226D086B90E050C9D6A57A0C1C06DBA35C880FE7B6DE2969EBF31C4493B425FFCEE1DA2F96
47,192,546 UART: [art] PUB.Y = BF464A6BEF0A7AB6A4254F71BE836BBC92C97AEA5A74154988E376870C76F22149B6F1BCB8FF435AFA5A2264233EF45C
47,199,854 UART: [art] SIG.R = CF8022C21003FAD236AAF817F1C80B3B42F11977A63904CDC14E6A3529D8C7F94B451C2EFC5E55A7D27595292F67F63B
47,207,230 UART: [art] SIG.S = 0A8590DC9358F764C637408900F208B9D4D77F1F67FC15FD4C28783C96F45199F6D06AFB6D509DC797E5B74DDD2186AA
48,512,357 UART: Caliptra RT
48,513,065 UART: [state] CFI Enabled
48,885,003 UART: [rt] RT listening for mailbox commands...
48,887,872 UART:
48,888,131 UART: Running Caliptra ROM ...
48,889,245 UART:
48,889,520 UART: [state] CFI Enabled
48,903,837 UART: [state] LifecycleState = Unprovisioned
48,905,786 UART: [state] DebugLocked = No
48,908,736 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
48,914,445 UART: [kat] SHA2-256
49,084,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
49,094,727 UART: [kat] ++
49,095,276 UART: [kat] sha1
49,107,202 UART: [kat] SHA2-256
49,109,898 UART: [kat] SHA2-384
49,115,030 UART: [kat] SHA2-512-ACC
49,117,386 UART: [kat] ECC-384
51,400,908 UART: [kat] HMAC-384Kdf
51,413,519 UART: [kat] LMS
52,603,604 UART: [kat] --
52,608,203 UART: [update-reset] ++
61,463,045 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,467,414 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
61,865,133 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,613 writing to cptra_bootfsm_go
4,127,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,072,681 >>> mbox cmd response: success
22,074,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,713,527 UART:
27,714,011 UART: Running Caliptra FMC ...
27,715,123 UART:
27,715,285 UART: [state] CFI Enabled
27,722,783 UART: [fht] FMC Alias Private Key: 7
30,063,176 UART: [art] Extend RT PCRs Done
30,064,426 UART: [art] Lock RT PCRs Done
30,066,218 UART: [art] Populate DV Done
30,071,651 UART: [fht] FMC Alias Private Key: 7
30,073,218 UART: [art] Derive CDI
30,073,994 UART: [art] Store in slot 0x4
30,116,652 UART: [art] Derive Key Pair
30,117,663 UART: [art] Store priv key in slot 0x5
33,359,442 UART: [art] Derive Key Pair - Done
33,372,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,652,498 UART: [art] Erasing AUTHORITY.KEYID = 7
35,654,071 UART: [art] PUB.X = C886E56ACDFC20FE4176AD87E2806BE7C6E86E611F9B933A53BA935333452B2D8D87342ACC7BCB4CEB5B5E29CA8AF46C
35,661,337 UART: [art] PUB.Y = DB80AFD6BFCFF075DB7ED09A5FEC2BF169C8E05BC089B9CCDB2862E1758C2BEB5AA749F42972486FEC4ECD78654FB8B7
35,668,599 UART: [art] SIG.R = A9F3A50C0427254E11FC56272A0F6D22D63BFB9193E53F99727DD5A8475BC421EA490D754A11A32421B8729B355C1C96
35,676,003 UART: [art] SIG.S = C07E6549D2A5CCB284BA2EC6475062EE83F1177513C0C26A420809A29C3F8EE92BB77FE84450C455BFAE029E6F5EF7C8
36,981,331 UART: Caliptra RT
36,982,058 UART: [state] CFI Enabled
37,116,208 UART: [rt] RT listening for mailbox commands...
40,760,424 >>> mbox cmd response: failed
40,762,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,911,355 UART:
40,911,675 UART: Running Caliptra FMC ...
40,912,803 UART:
40,912,994 UART: [state] CFI Enabled
40,913,926 UART: [art] Extend RT PCRs Done
40,915,069 UART: [art] Lock RT PCRs Done
40,916,148 UART: [art] Populate DV Done
40,917,182 UART: [fht] FMC Alias Private Key: 7
40,918,588 UART: [art] Derive CDI
40,919,335 UART: [art] Store in slot 0x4
40,920,404 UART: [art] Derive Key Pair
40,921,358 UART: [art] Store priv key in slot 0x5
44,117,724 UART: [art] Derive Key Pair - Done
44,130,934 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
46,410,818 UART: [art] Erasing AUTHORITY.KEYID = 7
46,412,331 UART: [art] PUB.X = C886E56ACDFC20FE4176AD87E2806BE7C6E86E611F9B933A53BA935333452B2D8D87342ACC7BCB4CEB5B5E29CA8AF46C
46,419,640 UART: [art] PUB.Y = DB80AFD6BFCFF075DB7ED09A5FEC2BF169C8E05BC089B9CCDB2862E1758C2BEB5AA749F42972486FEC4ECD78654FB8B7
46,426,926 UART: [art] SIG.R = A9F3A50C0427254E11FC56272A0F6D22D63BFB9193E53F99727DD5A8475BC421EA490D754A11A32421B8729B355C1C96
46,434,266 UART: [art] SIG.S = C07E6549D2A5CCB284BA2EC6475062EE83F1177513C0C26A420809A29C3F8EE92BB77FE84450C455BFAE029E6F5EF7C8
47,740,153 UART: Caliptra RT
47,740,846 UART: [state] CFI Enabled
48,115,877 UART: [rt] RT listening for mailbox commands...
60,612,315 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
192,291 UART:
192,666 UART: Running Caliptra ROM ...
193,862 UART:
194,014 UART: [state] CFI Enabled
261,301 UART: [state] LifecycleState = Unprovisioned
263,234 UART: [state] DebugLocked = No
265,002 UART: [state] WD Timer not started. Device not locked for debugging
269,370 UART: [kat] SHA2-256
449,046 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,835 UART: [kat] ++
460,291 UART: [kat] sha1
469,788 UART: [kat] SHA2-256
472,482 UART: [kat] SHA2-384
478,415 UART: [kat] SHA2-512-ACC
480,762 UART: [kat] ECC-384
2,944,561 UART: [kat] HMAC-384Kdf
2,966,847 UART: [kat] LMS
3,443,339 UART: [kat] --
3,448,372 UART: [cold-reset] ++
3,449,559 UART: [fht] FHT @ 0x50003400
3,461,729 UART: [idev] ++
3,462,355 UART: [idev] CDI.KEYID = 6
3,463,270 UART: [idev] SUBJECT.KEYID = 7
3,464,543 UART: [idev] UDS.KEYID = 0
3,467,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,657 UART: [idev] Erasing UDS.KEYID = 0
5,981,557 UART: [idev] Sha1 KeyId Algorithm
6,006,004 UART: [idev] --
6,012,280 UART: [ldev] ++
6,012,861 UART: [ldev] CDI.KEYID = 6
6,013,780 UART: [ldev] SUBJECT.KEYID = 5
6,015,002 UART: [ldev] AUTHORITY.KEYID = 7
6,016,249 UART: [ldev] FE.KEYID = 1
6,052,449 UART: [ldev] Erasing FE.KEYID = 1
8,562,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,543 UART: [ldev] --
10,370,034 UART: [fwproc] Wait for Commands...
10,372,684 UART: [fwproc] Recv command 0x46574c44
10,374,680 UART: [fwproc] Recv'd Img size: 118548 bytes
14,911,452 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,988,847 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,061,873 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,390,742 >>> mbox cmd response: success
15,392,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,541,869 UART: [afmc] ++
15,542,514 UART: [afmc] CDI.KEYID = 6
15,543,435 UART: [afmc] SUBJECT.KEYID = 7
15,544,546 UART: [afmc] AUTHORITY.KEYID = 5
17,934,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,677,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,679,760 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,695,609 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,711,555 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,727,225 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,752,109 UART: [afmc] --
19,756,393 UART: [cold-reset] --
19,759,776 UART: [state] Locking Datavault
19,765,410 UART: [state] Locking PCR0, PCR1 and PCR31
19,767,117 UART: [state] Locking ICCM
19,768,692 UART: [exit] Launching FMC @ 0x40000130
19,777,095 UART:
19,777,340 UART: Running Caliptra FMC ...
19,778,451 UART:
19,778,615 UART: [state] CFI Enabled
19,832,857 UART: [fht] FMC Alias Private Key: 7
21,599,382 UART: [art] Extend RT PCRs Done
21,600,606 UART: [art] Lock RT PCRs Done
21,601,969 UART: [art] Populate DV Done
21,607,552 UART: [fht] FMC Alias Private Key: 7
21,609,038 UART: [art] Derive CDI
21,609,858 UART: [art] Store in slot 0x4
21,664,904 UART: [art] Derive Key Pair
21,665,944 UART: [art] Store priv key in slot 0x5
24,128,610 UART: [art] Derive Key Pair - Done
24,141,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,853,941 UART: [art] Erasing AUTHORITY.KEYID = 7
25,855,447 UART: [art] PUB.X = F58F7A0BDF2F763AB637E6DE0DF7CFF0D936BBE960560A0811CF6F82861497FCFC3E4791519FBF5E7C0AC24C638E8BD6
25,862,704 UART: [art] PUB.Y = DD846DF8B92B21E5D479B4BA58ECCB5D5BA482D135E6708F3FE604C544E5AD392512F99C7F7AFF6F376E89028B3D264A
25,869,952 UART: [art] SIG.R = E2791CF21846E603085982E188238480C5BB2CD29BCF4FCD065C9BA16D9FD39885F418E393E488B8FFC994F014F9B514
25,877,354 UART: [art] SIG.S = AC41FA77D39E16EEFC919A5D252BFB2CF392DC25D16C46D7D6205B0F5677E4539ACEB7D22D2BCFA72D62925EB331392D
26,856,537 UART: Caliptra RT
26,857,226 UART: [state] CFI Enabled
27,036,568 UART: [rt] RT listening for mailbox commands...
27,039,528 UART:
27,039,704 UART: Running Caliptra ROM ...
27,040,819 UART:
27,040,981 UART: [state] CFI Enabled
27,109,777 UART: [state] LifecycleState = Unprovisioned
27,111,730 UART: [state] DebugLocked = No
27,112,992 UART: [state] WD Timer not started. Device not locked for debugging
27,117,168 UART: [kat] SHA2-256
27,296,804 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,307,587 UART: [kat] ++
27,308,053 UART: [kat] sha1
27,320,350 UART: [kat] SHA2-256
27,323,054 UART: [kat] SHA2-384
27,328,240 UART: [kat] SHA2-512-ACC
27,330,591 UART: [kat] ECC-384
29,794,621 UART: [kat] HMAC-384Kdf
29,816,028 UART: [kat] LMS
30,292,493 UART: [kat] --
30,295,694 UART: [update-reset] ++
30,349,707 >>> mbox cmd response: failed
30,351,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,501,163 UART: ROM Non-Fatal Error: 0x000B003D
30,502,603 UART: [state] Locking Datavault
30,503,761 UART: [state] Locking PCR0, PCR1 and PCR31
30,505,303 UART: [state] Locking ICCM
30,506,213 UART: [exit] Launching FMC @ 0x40000130
30,507,645 UART:
30,507,803 UART: Running Caliptra FMC ...
30,508,906 UART:
30,509,070 UART: [state] CFI Enabled
30,509,999 UART: [art] Extend RT PCRs Done
30,511,143 UART: [art] Lock RT PCRs Done
30,512,213 UART: [art] Populate DV Done
30,513,247 UART: [fht] FMC Alias Private Key: 7
30,514,567 UART: [art] Derive CDI
30,515,310 UART: [art] Store in slot 0x4
30,538,775 UART: [art] Derive Key Pair
30,539,819 UART: [art] Store priv key in slot 0x5
33,002,462 UART: [art] Derive Key Pair - Done
33,015,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,727,967 UART: [art] Erasing AUTHORITY.KEYID = 7
34,729,481 UART: [art] PUB.X = F58F7A0BDF2F763AB637E6DE0DF7CFF0D936BBE960560A0811CF6F82861497FCFC3E4791519FBF5E7C0AC24C638E8BD6
34,736,787 UART: [art] PUB.Y = DD846DF8B92B21E5D479B4BA58ECCB5D5BA482D135E6708F3FE604C544E5AD392512F99C7F7AFF6F376E89028B3D264A
34,744,043 UART: [art] SIG.R = E2791CF21846E603085982E188238480C5BB2CD29BCF4FCD065C9BA16D9FD39885F418E393E488B8FFC994F014F9B514
34,751,446 UART: [art] SIG.S = AC41FA77D39E16EEFC919A5D252BFB2CF392DC25D16C46D7D6205B0F5677E4539ACEB7D22D2BCFA72D62925EB331392D
35,730,118 UART: Caliptra RT
35,730,833 UART: [state] CFI Enabled
36,151,577 UART: [rt] RT listening for mailbox commands...
36,154,324 UART:
36,154,577 UART: Running Caliptra ROM ...
36,155,693 UART:
36,155,852 UART: [state] CFI Enabled
36,219,926 UART: [state] LifecycleState = Unprovisioned
36,221,863 UART: [state] DebugLocked = No
36,223,311 UART: [state] WD Timer not started. Device not locked for debugging
36,226,947 UART: [kat] SHA2-256
36,406,603 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,417,372 UART: [kat] ++
36,417,834 UART: [kat] sha1
36,429,373 UART: [kat] SHA2-256
36,432,067 UART: [kat] SHA2-384
36,438,224 UART: [kat] SHA2-512-ACC
36,440,585 UART: [kat] ECC-384
38,902,932 UART: [kat] HMAC-384Kdf
38,919,917 UART: [kat] LMS
39,396,400 UART: [kat] --
39,400,228 UART: [update-reset] ++
43,952,830 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,955,854 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,353,485 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,461,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,374,644 >>> mbox cmd response: success
15,376,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,688,511 UART:
19,688,907 UART: Running Caliptra FMC ...
19,690,027 UART:
19,690,196 UART: [state] CFI Enabled
19,753,786 UART: [fht] FMC Alias Private Key: 7
21,520,749 UART: [art] Extend RT PCRs Done
21,521,975 UART: [art] Lock RT PCRs Done
21,524,041 UART: [art] Populate DV Done
21,529,620 UART: [fht] FMC Alias Private Key: 7
21,531,121 UART: [art] Derive CDI
21,531,890 UART: [art] Store in slot 0x4
21,586,406 UART: [art] Derive Key Pair
21,587,432 UART: [art] Store priv key in slot 0x5
24,050,033 UART: [art] Derive Key Pair - Done
24,062,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,776,435 UART: [art] Erasing AUTHORITY.KEYID = 7
25,777,970 UART: [art] PUB.X = B28963708E8EAE48CCF6BEAFB66FCB0259625DE40EB4736142EF5445ED1774D42E9622D03C73B7AC5F89FBF660E1EB29
25,785,228 UART: [art] PUB.Y = A0BA93B11DE8A4A41830B7AA424F1B395B57E417A18D01B525EE4A6299263C2AE0F15B7BB7B1FEDE093CBF6ECB3DD9EB
25,792,498 UART: [art] SIG.R = 869C3DAA980D7CC2DE669D197DD351CC5610DAC491EC9166B9BBB13CE4EF597F434B00DF616F5BB984759AD127188159
25,799,937 UART: [art] SIG.S = 1340BEB012BD8C2535D978F8B2401B022A42D6D0A36757CD05957C1C3BAE5E9064E4FEFC63BEF4AF8C612EEB1621785D
26,779,279 UART: Caliptra RT
26,779,996 UART: [state] CFI Enabled
26,960,441 UART: [rt] RT listening for mailbox commands...
30,250,687 >>> mbox cmd response: failed
30,252,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,401,586 UART:
30,401,908 UART: Running Caliptra FMC ...
30,403,041 UART:
30,403,218 UART: [state] CFI Enabled
30,404,149 UART: [art] Extend RT PCRs Done
30,405,296 UART: [art] Lock RT PCRs Done
30,406,366 UART: [art] Populate DV Done
30,407,425 UART: [fht] FMC Alias Private Key: 7
30,408,837 UART: [art] Derive CDI
30,409,585 UART: [art] Store in slot 0x4
30,441,182 UART: [art] Derive Key Pair
30,442,228 UART: [art] Store priv key in slot 0x5
32,904,704 UART: [art] Derive Key Pair - Done
32,917,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,630,127 UART: [art] Erasing AUTHORITY.KEYID = 7
34,631,629 UART: [art] PUB.X = B28963708E8EAE48CCF6BEAFB66FCB0259625DE40EB4736142EF5445ED1774D42E9622D03C73B7AC5F89FBF660E1EB29
34,638,928 UART: [art] PUB.Y = A0BA93B11DE8A4A41830B7AA424F1B395B57E417A18D01B525EE4A6299263C2AE0F15B7BB7B1FEDE093CBF6ECB3DD9EB
34,646,205 UART: [art] SIG.R = 869C3DAA980D7CC2DE669D197DD351CC5610DAC491EC9166B9BBB13CE4EF597F434B00DF616F5BB984759AD127188159
34,653,616 UART: [art] SIG.S = 1340BEB012BD8C2535D978F8B2401B022A42D6D0A36757CD05957C1C3BAE5E9064E4FEFC63BEF4AF8C612EEB1621785D
35,632,409 UART: Caliptra RT
35,633,124 UART: [state] CFI Enabled
36,055,619 UART: [rt] RT listening for mailbox commands...
44,372,770 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
192,761 UART:
193,126 UART: Running Caliptra ROM ...
194,321 UART:
603,870 UART: [state] CFI Enabled
621,227 UART: [state] LifecycleState = Unprovisioned
623,170 UART: [state] DebugLocked = No
625,147 UART: [state] WD Timer not started. Device not locked for debugging
629,026 UART: [kat] SHA2-256
808,689 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,450 UART: [kat] ++
820,054 UART: [kat] sha1
831,759 UART: [kat] SHA2-256
834,496 UART: [kat] SHA2-384
840,759 UART: [kat] SHA2-512-ACC
843,148 UART: [kat] ECC-384
3,283,617 UART: [kat] HMAC-384Kdf
3,296,201 UART: [kat] LMS
3,772,761 UART: [kat] --
3,776,173 UART: [cold-reset] ++
3,777,411 UART: [fht] FHT @ 0x50003400
3,787,882 UART: [idev] ++
3,788,444 UART: [idev] CDI.KEYID = 6
3,789,387 UART: [idev] SUBJECT.KEYID = 7
3,790,658 UART: [idev] UDS.KEYID = 0
3,794,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,692 UART: [idev] Erasing UDS.KEYID = 0
6,265,757 UART: [idev] Sha1 KeyId Algorithm
6,288,984 UART: [idev] --
6,293,283 UART: [ldev] ++
6,293,870 UART: [ldev] CDI.KEYID = 6
6,294,760 UART: [ldev] SUBJECT.KEYID = 5
6,296,010 UART: [ldev] AUTHORITY.KEYID = 7
6,297,252 UART: [ldev] FE.KEYID = 1
6,307,771 UART: [ldev] Erasing FE.KEYID = 1
8,787,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,012 UART: [ldev] --
10,579,289 UART: [fwproc] Wait for Commands...
10,581,823 UART: [fwproc] Recv command 0x46574c44
10,583,815 UART: [fwproc] Recv'd Img size: 118548 bytes
15,120,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,206,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,279,276 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,606,717 >>> mbox cmd response: success
15,608,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,757,508 UART: [afmc] ++
15,758,161 UART: [afmc] CDI.KEYID = 6
15,759,099 UART: [afmc] SUBJECT.KEYID = 7
15,760,217 UART: [afmc] AUTHORITY.KEYID = 5
18,117,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,842,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,844,590 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,860,442 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,876,379 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,892,150 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,917,330 UART: [afmc] --
19,921,686 UART: [cold-reset] --
19,926,521 UART: [state] Locking Datavault
19,932,202 UART: [state] Locking PCR0, PCR1 and PCR31
19,933,958 UART: [state] Locking ICCM
19,935,108 UART: [exit] Launching FMC @ 0x40000130
19,943,509 UART:
19,943,751 UART: Running Caliptra FMC ...
19,944,854 UART:
19,945,019 UART: [state] CFI Enabled
19,953,234 UART: [fht] FMC Alias Private Key: 7
21,719,629 UART: [art] Extend RT PCRs Done
21,720,867 UART: [art] Lock RT PCRs Done
21,722,500 UART: [art] Populate DV Done
21,727,808 UART: [fht] FMC Alias Private Key: 7
21,729,465 UART: [art] Derive CDI
21,730,282 UART: [art] Store in slot 0x4
21,772,996 UART: [art] Derive Key Pair
21,774,000 UART: [art] Store priv key in slot 0x5
24,201,233 UART: [art] Derive Key Pair - Done
24,214,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,920,821 UART: [art] Erasing AUTHORITY.KEYID = 7
25,922,341 UART: [art] PUB.X = F257B35E4F05F1FB3911988E29AA93F9488A749EF2CCFF3F5836508CAFF8443A493A3EC24A80B02F0F9F117C988CFDB9
25,929,605 UART: [art] PUB.Y = 08DE65574213330EB16D6D3960F4EC8765B43180B16219E7CCF1C9773CB2C81BA6BFA3E58827A7EFFC3DD9A50E31001F
25,936,852 UART: [art] SIG.R = B82D906E7E78D0C1214249108B402C42BC015126619850F1BA93607B28368B66E6DB2D6A56ED5B8F87554C959A47731C
25,944,207 UART: [art] SIG.S = 729EC89EA8B8DA62BBE25EC744938F55B174B08D84E9263395DE5543E18A38D7105C5F0AABB3E43EE415D6FD38A0F62B
26,923,899 UART: Caliptra RT
26,924,595 UART: [state] CFI Enabled
27,057,616 UART: [rt] RT listening for mailbox commands...
27,060,735 UART:
27,060,989 UART: Running Caliptra ROM ...
27,062,099 UART:
27,062,382 UART: [state] CFI Enabled
27,076,325 UART: [state] LifecycleState = Unprovisioned
27,078,216 UART: [state] DebugLocked = No
27,079,899 UART: [state] WD Timer not started. Device not locked for debugging
27,083,613 UART: [kat] SHA2-256
27,263,328 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,274,094 UART: [kat] ++
27,274,555 UART: [kat] sha1
27,287,223 UART: [kat] SHA2-256
27,289,917 UART: [kat] SHA2-384
27,295,630 UART: [kat] SHA2-512-ACC
27,297,978 UART: [kat] ECC-384
29,736,247 UART: [kat] HMAC-384Kdf
29,749,014 UART: [kat] LMS
30,225,508 UART: [kat] --
30,230,922 UART: [update-reset] ++
30,277,680 >>> mbox cmd response: failed
30,280,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,428,876 UART: ROM Non-Fatal Error: 0x000B003D
30,430,296 UART: [state] Locking Datavault
30,431,447 UART: [state] Locking PCR0, PCR1 and PCR31
30,433,011 UART: [state] Locking ICCM
30,433,932 UART: [exit] Launching FMC @ 0x40000130
30,435,361 UART:
30,435,538 UART: Running Caliptra FMC ...
30,436,650 UART:
30,436,813 UART: [state] CFI Enabled
30,437,744 UART: [art] Extend RT PCRs Done
30,438,834 UART: [art] Lock RT PCRs Done
30,440,058 UART: [art] Populate DV Done
30,441,048 UART: [fht] FMC Alias Private Key: 7
30,442,385 UART: [art] Derive CDI
30,443,120 UART: [art] Store in slot 0x4
30,444,101 UART: [art] Derive Key Pair
30,445,095 UART: [art] Store priv key in slot 0x5
32,824,191 UART: [art] Derive Key Pair - Done
32,837,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,543,508 UART: [art] Erasing AUTHORITY.KEYID = 7
34,545,016 UART: [art] PUB.X = F257B35E4F05F1FB3911988E29AA93F9488A749EF2CCFF3F5836508CAFF8443A493A3EC24A80B02F0F9F117C988CFDB9
34,552,288 UART: [art] PUB.Y = 08DE65574213330EB16D6D3960F4EC8765B43180B16219E7CCF1C9773CB2C81BA6BFA3E58827A7EFFC3DD9A50E31001F
34,559,536 UART: [art] SIG.R = B82D906E7E78D0C1214249108B402C42BC015126619850F1BA93607B28368B66E6DB2D6A56ED5B8F87554C959A47731C
34,566,888 UART: [art] SIG.S = 729EC89EA8B8DA62BBE25EC744938F55B174B08D84E9263395DE5543E18A38D7105C5F0AABB3E43EE415D6FD38A0F62B
35,545,300 UART: Caliptra RT
35,546,020 UART: [state] CFI Enabled
35,920,588 UART: [rt] RT listening for mailbox commands...
35,923,238 UART:
35,923,489 UART: Running Caliptra ROM ...
35,924,604 UART:
35,924,878 UART: [state] CFI Enabled
40,318,623 UART: [state] LifecycleState = Unprovisioned
40,320,601 UART: [state] DebugLocked = No
40,322,652 UART: [state] WD Timer not started. Device not locked for debugging
40,325,652 UART: [kat] SHA2-256
40,505,355 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
40,516,183 UART: [kat] ++
40,516,729 UART: [kat] sha1
40,527,842 UART: [kat] SHA2-256
40,530,518 UART: [kat] SHA2-384
40,535,542 UART: [kat] SHA2-512-ACC
40,537,894 UART: [kat] ECC-384
42,983,144 UART: [kat] HMAC-384Kdf
42,994,515 UART: [kat] LMS
43,470,990 UART: [kat] --
43,477,794 UART: [update-reset] ++
48,028,206 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,031,321 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
48,428,926 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,453 writing to cptra_bootfsm_go
3,779,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,606,362 >>> mbox cmd response: success
15,608,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,861,328 UART:
19,861,744 UART: Running Caliptra FMC ...
19,862,901 UART:
19,863,065 UART: [state] CFI Enabled
19,870,858 UART: [fht] FMC Alias Private Key: 7
21,636,127 UART: [art] Extend RT PCRs Done
21,637,366 UART: [art] Lock RT PCRs Done
21,639,145 UART: [art] Populate DV Done
21,644,610 UART: [fht] FMC Alias Private Key: 7
21,646,305 UART: [art] Derive CDI
21,647,051 UART: [art] Store in slot 0x4
21,690,292 UART: [art] Derive Key Pair
21,691,301 UART: [art] Store priv key in slot 0x5
24,118,257 UART: [art] Derive Key Pair - Done
24,131,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,837,661 UART: [art] Erasing AUTHORITY.KEYID = 7
25,839,180 UART: [art] PUB.X = 38086E8D5E7085D5AE329D82C2B291F6A2EE1E4C946D357940576E9304E6FCF07C3ED1D3A138FB48EE0B4A96D3C03462
25,846,460 UART: [art] PUB.Y = EC6E686D660AFF496710FBCE0572AC6C296DFAC0BF96BF57C34B3FD2EB10A639977FA1D439640A552B5587144C9443F6
25,853,718 UART: [art] SIG.R = 9D2488FF8846DA5FA737AC6CF954F1ABA2E8DEF4A409F570F46DEADA1F516D502A6F67FB9DD375F1D9D713BBF2E85D4B
25,861,110 UART: [art] SIG.S = BCB95F9C0BE9DBA417D0850FCD22CCFC06227E0FBBEAD567BC7B5E1313181C30DF5724C2A70F14801AD1CA339F6B1D08
26,839,988 UART: Caliptra RT
26,840,684 UART: [state] CFI Enabled
26,973,686 UART: [rt] RT listening for mailbox commands...
30,198,589 >>> mbox cmd response: failed
30,200,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,349,375 UART:
30,349,697 UART: Running Caliptra FMC ...
30,350,843 UART:
30,351,010 UART: [state] CFI Enabled
30,351,942 UART: [art] Extend RT PCRs Done
30,353,084 UART: [art] Lock RT PCRs Done
30,354,156 UART: [art] Populate DV Done
30,355,191 UART: [fht] FMC Alias Private Key: 7
30,356,595 UART: [art] Derive CDI
30,357,336 UART: [art] Store in slot 0x4
30,358,400 UART: [art] Derive Key Pair
30,359,352 UART: [art] Store priv key in slot 0x5
32,737,642 UART: [art] Derive Key Pair - Done
32,750,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,456,674 UART: [art] Erasing AUTHORITY.KEYID = 7
34,458,181 UART: [art] PUB.X = 38086E8D5E7085D5AE329D82C2B291F6A2EE1E4C946D357940576E9304E6FCF07C3ED1D3A138FB48EE0B4A96D3C03462
34,465,405 UART: [art] PUB.Y = EC6E686D660AFF496710FBCE0572AC6C296DFAC0BF96BF57C34B3FD2EB10A639977FA1D439640A552B5587144C9443F6
34,472,681 UART: [art] SIG.R = 9D2488FF8846DA5FA737AC6CF954F1ABA2E8DEF4A409F570F46DEADA1F516D502A6F67FB9DD375F1D9D713BBF2E85D4B
34,480,111 UART: [art] SIG.S = BCB95F9C0BE9DBA417D0850FCD22CCFC06227E0FBBEAD567BC7B5E1313181C30DF5724C2A70F14801AD1CA339F6B1D08
35,458,859 UART: Caliptra RT
35,459,553 UART: [state] CFI Enabled
35,831,583 UART: [rt] RT listening for mailbox commands...
48,540,843 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,045 UART:
192,440 UART: Running Caliptra ROM ...
193,548 UART:
193,698 UART: [state] CFI Enabled
257,741 UART: [state] LifecycleState = Unprovisioned
260,103 UART: [state] DebugLocked = No
261,707 UART: [state] WD Timer not started. Device not locked for debugging
265,661 UART: [kat] SHA2-256
455,544 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
466,286 UART: [kat] ++
466,770 UART: [kat] sha1
477,763 UART: [kat] SHA2-256
480,781 UART: [kat] SHA2-384
488,281 UART: [kat] SHA2-512-ACC
490,855 UART: [kat] ECC-384
2,940,198 UART: [kat] HMAC-384Kdf
2,967,031 UART: [kat] LMS
3,498,750 UART: [kat] --
3,503,421 UART: [cold-reset] ++
3,505,092 UART: [fht] FHT @ 0x50003400
3,517,763 UART: [idev] ++
3,518,443 UART: [idev] CDI.KEYID = 6
3,519,385 UART: [idev] SUBJECT.KEYID = 7
3,520,601 UART: [idev] UDS.KEYID = 0
3,523,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,745 UART: [idev] Erasing UDS.KEYID = 0
6,022,773 UART: [idev] Sha1 KeyId Algorithm
6,045,374 UART: [idev] --
6,051,109 UART: [ldev] ++
6,051,803 UART: [ldev] CDI.KEYID = 6
6,052,723 UART: [ldev] SUBJECT.KEYID = 5
6,053,891 UART: [ldev] AUTHORITY.KEYID = 7
6,055,076 UART: [ldev] FE.KEYID = 1
6,094,915 UART: [ldev] Erasing FE.KEYID = 1
8,601,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,183 UART: [ldev] --
10,408,426 UART: [fwproc] Wait for Commands...
10,409,943 UART: [fwproc] Recv command 0x46574c44
10,412,214 UART: [fwproc] Recv'd Img size: 118548 bytes
15,093,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,172,207 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,295,836 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,856,639 >>> mbox cmd response: success
15,858,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,007,809 UART: [afmc] ++
16,008,483 UART: [afmc] CDI.KEYID = 6
16,009,389 UART: [afmc] SUBJECT.KEYID = 7
16,010,455 UART: [afmc] AUTHORITY.KEYID = 5
18,401,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,124,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,126,520 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,141,637 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,156,861 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,171,903 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,195,520 UART: [afmc] --
20,198,427 UART: [cold-reset] --
20,202,898 UART: [state] Locking Datavault
20,206,862 UART: [state] Locking PCR0, PCR1 and PCR31
20,209,055 UART: [state] Locking ICCM
20,211,241 UART: [exit] Launching FMC @ 0x40000130
20,219,907 UART:
20,220,172 UART: Running Caliptra FMC ...
20,221,283 UART:
20,221,448 UART: [state] CFI Enabled
20,282,384 UART: [fht] FMC Alias Private Key: 7
22,049,408 UART: [art] Extend RT PCRs Done
22,050,630 UART: [art] Lock RT PCRs Done
22,052,540 UART: [art] Populate DV Done
22,057,852 UART: [fht] FMC Alias Private Key: 7
22,059,341 UART: [art] Derive CDI
22,060,114 UART: [art] Store in slot 0x4
22,114,719 UART: [art] Derive Key Pair
22,115,761 UART: [art] Store priv key in slot 0x5
24,578,953 UART: [art] Derive Key Pair - Done
24,591,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,304,491 UART: [art] Erasing AUTHORITY.KEYID = 7
26,306,000 UART: [art] PUB.X = 9692DE4873120EBBF0289E1641767B9A204130F2D0D7E6137EC2AA1CED02BE22B99CE1B9FA1C9D6C2D041413036E4101
26,313,308 UART: [art] PUB.Y = F421C2EF39DA8125AFB814EE373F5689E404F95E73DDC5FE8BDDC7AE4E48C73F477F506E91B13F09228820F909947149
26,320,571 UART: [art] SIG.R = F246B5FA1F4A682C5F19D3B9A444A66C8DAAA6BE25463B1F8AD2C1632C4478544F071AE29315483B33D5D8A1CF073A2B
26,327,945 UART: [art] SIG.S = AE9FB4A6A78D3CD69259CB756028CFFE58C546BD67B836B70EB7ABB51765E6FDC06C4D2F22D50D0237C4726C1E08446C
27,307,425 UART: Caliptra RT
27,308,142 UART: [state] CFI Enabled
27,488,167 UART: [rt] RT listening for mailbox commands...
27,490,909 UART:
27,491,160 UART: Running Caliptra ROM ...
27,492,267 UART:
27,492,430 UART: [state] CFI Enabled
27,561,346 UART: [state] LifecycleState = Unprovisioned
27,563,441 UART: [state] DebugLocked = No
27,565,155 UART: [state] WD Timer not started. Device not locked for debugging
27,569,440 UART: [kat] SHA2-256
27,759,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,770,049 UART: [kat] ++
27,770,559 UART: [kat] sha1
27,781,810 UART: [kat] SHA2-256
27,784,807 UART: [kat] SHA2-384
27,790,538 UART: [kat] SHA2-512-ACC
27,793,116 UART: [kat] ECC-384
30,246,867 UART: [kat] HMAC-384Kdf
30,269,407 UART: [kat] LMS
30,800,972 UART: [kat] --
30,806,712 UART: [update-reset] ++
30,875,234 >>> mbox cmd response: failed
30,877,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,026,760 UART: ROM Non-Fatal Error: 0x000B003D
31,028,199 UART: [state] Locking Datavault
31,029,280 UART: [state] Locking PCR0, PCR1 and PCR31
31,030,829 UART: [state] Locking ICCM
31,031,746 UART: [exit] Launching FMC @ 0x40000130
31,033,195 UART:
31,033,361 UART: Running Caliptra FMC ...
31,034,464 UART:
31,034,626 UART: [state] CFI Enabled
31,035,548 UART: [art] Extend RT PCRs Done
31,036,691 UART: [art] Lock RT PCRs Done
31,037,762 UART: [art] Populate DV Done
31,038,797 UART: [fht] FMC Alias Private Key: 7
31,040,122 UART: [art] Derive CDI
31,040,866 UART: [art] Store in slot 0x4
31,075,862 UART: [art] Derive Key Pair
31,076,909 UART: [art] Store priv key in slot 0x5
33,539,337 UART: [art] Derive Key Pair - Done
33,552,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,264,677 UART: [art] Erasing AUTHORITY.KEYID = 7
35,266,189 UART: [art] PUB.X = 9692DE4873120EBBF0289E1641767B9A204130F2D0D7E6137EC2AA1CED02BE22B99CE1B9FA1C9D6C2D041413036E4101
35,273,475 UART: [art] PUB.Y = F421C2EF39DA8125AFB814EE373F5689E404F95E73DDC5FE8BDDC7AE4E48C73F477F506E91B13F09228820F909947149
35,280,698 UART: [art] SIG.R = F246B5FA1F4A682C5F19D3B9A444A66C8DAAA6BE25463B1F8AD2C1632C4478544F071AE29315483B33D5D8A1CF073A2B
35,288,126 UART: [art] SIG.S = AE9FB4A6A78D3CD69259CB756028CFFE58C546BD67B836B70EB7ABB51765E6FDC06C4D2F22D50D0237C4726C1E08446C
36,267,395 UART: Caliptra RT
36,268,099 UART: [state] CFI Enabled
36,686,013 UART: [rt] RT listening for mailbox commands...
36,688,845 UART:
36,689,110 UART: Running Caliptra ROM ...
36,690,219 UART:
36,690,382 UART: [state] CFI Enabled
36,754,131 UART: [state] LifecycleState = Unprovisioned
36,756,172 UART: [state] DebugLocked = No
36,757,562 UART: [state] WD Timer not started. Device not locked for debugging
36,761,582 UART: [kat] SHA2-256
36,951,437 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,962,200 UART: [kat] ++
36,962,713 UART: [kat] sha1
36,975,228 UART: [kat] SHA2-256
36,978,258 UART: [kat] SHA2-384
36,983,320 UART: [kat] SHA2-512-ACC
36,985,903 UART: [kat] ECC-384
39,441,094 UART: [kat] HMAC-384Kdf
39,463,048 UART: [kat] LMS
39,994,589 UART: [kat] --
39,997,824 UART: [update-reset] ++
44,690,172 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,693,658 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
45,323,392 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,439,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,942,445 >>> mbox cmd response: success
15,944,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,240,033 UART:
20,240,474 UART: Running Caliptra FMC ...
20,241,582 UART:
20,241,736 UART: [state] CFI Enabled
20,307,603 UART: [fht] FMC Alias Private Key: 7
22,073,575 UART: [art] Extend RT PCRs Done
22,074,807 UART: [art] Lock RT PCRs Done
22,076,576 UART: [art] Populate DV Done
22,082,261 UART: [fht] FMC Alias Private Key: 7
22,083,808 UART: [art] Derive CDI
22,084,548 UART: [art] Store in slot 0x4
22,140,277 UART: [art] Derive Key Pair
22,141,321 UART: [art] Store priv key in slot 0x5
24,604,329 UART: [art] Derive Key Pair - Done
24,617,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,329,671 UART: [art] Erasing AUTHORITY.KEYID = 7
26,331,184 UART: [art] PUB.X = 6E91C2A7CC9D8293FACAE8695715D3524B9D9B2349BA010868B1CF054723AA9A48C51D9B7EE20F228007DC0FD67E9BD5
26,338,452 UART: [art] PUB.Y = F67F87AC6B3A28F606D16BB2EDA244A68FA13F45D12121AB8760BB6118A6628890105661B72AB17E0D1928177783E348
26,345,704 UART: [art] SIG.R = F67F62C8D00C1B720683C0D37018665DA56DD8C5AB283F1CBD9A6688702A4B8298E22BFC80013A16F49BFA51B123620F
26,353,119 UART: [art] SIG.S = 2674F5EF4CC941613065F9A8F199EF3E7F8F167A6FD803250A9566A1FE0E0C909102E531BE027BC71012282D758DE289
27,331,959 UART: Caliptra RT
27,332,708 UART: [state] CFI Enabled
27,512,882 UART: [rt] RT listening for mailbox commands...
30,805,444 >>> mbox cmd response: failed
30,807,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,956,493 UART:
30,956,805 UART: Running Caliptra FMC ...
30,957,931 UART:
30,958,099 UART: [state] CFI Enabled
30,959,032 UART: [art] Extend RT PCRs Done
30,960,182 UART: [art] Lock RT PCRs Done
30,961,222 UART: [art] Populate DV Done
30,962,197 UART: [fht] FMC Alias Private Key: 7
30,963,603 UART: [art] Derive CDI
30,964,349 UART: [art] Store in slot 0x4
30,993,573 UART: [art] Derive Key Pair
30,994,619 UART: [art] Store priv key in slot 0x5
33,457,764 UART: [art] Derive Key Pair - Done
33,470,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,183,238 UART: [art] Erasing AUTHORITY.KEYID = 7
35,184,745 UART: [art] PUB.X = 6E91C2A7CC9D8293FACAE8695715D3524B9D9B2349BA010868B1CF054723AA9A48C51D9B7EE20F228007DC0FD67E9BD5
35,192,008 UART: [art] PUB.Y = F67F87AC6B3A28F606D16BB2EDA244A68FA13F45D12121AB8760BB6118A6628890105661B72AB17E0D1928177783E348
35,199,267 UART: [art] SIG.R = F67F62C8D00C1B720683C0D37018665DA56DD8C5AB283F1CBD9A6688702A4B8298E22BFC80013A16F49BFA51B123620F
35,206,616 UART: [art] SIG.S = 2674F5EF4CC941613065F9A8F199EF3E7F8F167A6FD803250A9566A1FE0E0C909102E531BE027BC71012282D758DE289
36,185,470 UART: Caliptra RT
36,186,189 UART: [state] CFI Enabled
36,605,389 UART: [rt] RT listening for mailbox commands...
45,457,620 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,597 UART:
192,952 UART: Running Caliptra ROM ...
194,129 UART:
603,663 UART: [state] CFI Enabled
617,418 UART: [state] LifecycleState = Unprovisioned
619,794 UART: [state] DebugLocked = No
621,943 UART: [state] WD Timer not started. Device not locked for debugging
627,334 UART: [kat] SHA2-256
817,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,977 UART: [kat] ++
828,488 UART: [kat] sha1
841,158 UART: [kat] SHA2-256
844,175 UART: [kat] SHA2-384
850,864 UART: [kat] SHA2-512-ACC
853,451 UART: [kat] ECC-384
3,295,462 UART: [kat] HMAC-384Kdf
3,307,599 UART: [kat] LMS
3,839,444 UART: [kat] --
3,844,963 UART: [cold-reset] ++
3,847,389 UART: [fht] FHT @ 0x50003400
3,857,841 UART: [idev] ++
3,858,521 UART: [idev] CDI.KEYID = 6
3,859,542 UART: [idev] SUBJECT.KEYID = 7
3,860,654 UART: [idev] UDS.KEYID = 0
3,863,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,544 UART: [idev] Erasing UDS.KEYID = 0
6,333,527 UART: [idev] Sha1 KeyId Algorithm
6,356,994 UART: [idev] --
6,362,016 UART: [ldev] ++
6,362,708 UART: [ldev] CDI.KEYID = 6
6,363,642 UART: [ldev] SUBJECT.KEYID = 5
6,364,815 UART: [ldev] AUTHORITY.KEYID = 7
6,366,001 UART: [ldev] FE.KEYID = 1
6,377,950 UART: [ldev] Erasing FE.KEYID = 1
8,858,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,405 UART: [ldev] --
10,648,094 UART: [fwproc] Wait for Commands...
10,650,421 UART: [fwproc] Recv command 0x46574c44
10,652,747 UART: [fwproc] Recv'd Img size: 118548 bytes
15,331,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,417,162 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,540,759 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,101,655 >>> mbox cmd response: success
16,103,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,252,554 UART: [afmc] ++
16,253,198 UART: [afmc] CDI.KEYID = 6
16,254,130 UART: [afmc] SUBJECT.KEYID = 7
16,255,244 UART: [afmc] AUTHORITY.KEYID = 5
18,614,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,333,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,335,475 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,350,555 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,365,770 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,380,825 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,404,766 UART: [afmc] --
20,408,865 UART: [cold-reset] --
20,412,425 UART: [state] Locking Datavault
20,418,404 UART: [state] Locking PCR0, PCR1 and PCR31
20,420,569 UART: [state] Locking ICCM
20,421,916 UART: [exit] Launching FMC @ 0x40000130
20,430,595 UART:
20,430,836 UART: Running Caliptra FMC ...
20,431,892 UART:
20,432,053 UART: [state] CFI Enabled
20,440,061 UART: [fht] FMC Alias Private Key: 7
22,206,002 UART: [art] Extend RT PCRs Done
22,207,224 UART: [art] Lock RT PCRs Done
22,208,689 UART: [art] Populate DV Done
22,214,160 UART: [fht] FMC Alias Private Key: 7
22,215,704 UART: [art] Derive CDI
22,216,523 UART: [art] Store in slot 0x4
22,259,123 UART: [art] Derive Key Pair
22,260,168 UART: [art] Store priv key in slot 0x5
24,686,768 UART: [art] Derive Key Pair - Done
24,699,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,406,130 UART: [art] Erasing AUTHORITY.KEYID = 7
26,407,640 UART: [art] PUB.X = B0A53BFCEB9DDD50CD669C0B3B370C30E9E465783F0F6BAE66309A4E5C0A931E8D5530BE5606918885BA10D8244AE2B2
26,414,944 UART: [art] PUB.Y = 4478CB623EC9ABF8F752D709AC87080377ABE27741BF5352100E192D2CC440BA76DB155E5902A745B84F391FB8F1D02F
26,422,175 UART: [art] SIG.R = 5C41BCB84524EFCAC0D2F4CA8DEF085E2EF716FD6E63B45C60CC7A12CA5B08114C76A2A4D6856EDF575377D229406F69
26,429,563 UART: [art] SIG.S = 186E35FCB64BD91110187CD467DA17885F2EB0D80CF04DBA762B9733743DCF7998671A7CD486B71C5F66718EF8B33C10
27,408,394 UART: Caliptra RT
27,409,172 UART: [state] CFI Enabled
27,541,311 UART: [rt] RT listening for mailbox commands...
27,544,275 UART:
27,544,529 UART: Running Caliptra ROM ...
27,545,642 UART:
27,545,864 UART: [state] CFI Enabled
27,560,887 UART: [state] LifecycleState = Unprovisioned
27,562,717 UART: [state] DebugLocked = No
27,563,987 UART: [state] WD Timer not started. Device not locked for debugging
27,568,073 UART: [kat] SHA2-256
27,757,957 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,768,706 UART: [kat] ++
27,769,218 UART: [kat] sha1
27,780,057 UART: [kat] SHA2-256
27,783,032 UART: [kat] SHA2-384
27,790,270 UART: [kat] SHA2-512-ACC
27,792,848 UART: [kat] ECC-384
30,237,266 UART: [kat] HMAC-384Kdf
30,250,697 UART: [kat] LMS
30,782,330 UART: [kat] --
30,786,322 UART: [update-reset] ++
30,854,172 >>> mbox cmd response: failed
30,856,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,005,563 UART: ROM Non-Fatal Error: 0x000B003D
31,007,008 UART: [state] Locking Datavault
31,008,200 UART: [state] Locking PCR0, PCR1 and PCR31
31,009,749 UART: [state] Locking ICCM
31,010,666 UART: [exit] Launching FMC @ 0x40000130
31,012,094 UART:
31,012,266 UART: Running Caliptra FMC ...
31,013,372 UART:
31,013,536 UART: [state] CFI Enabled
31,014,462 UART: [art] Extend RT PCRs Done
31,015,609 UART: [art] Lock RT PCRs Done
31,016,684 UART: [art] Populate DV Done
31,017,719 UART: [fht] FMC Alias Private Key: 7
31,019,039 UART: [art] Derive CDI
31,019,785 UART: [art] Store in slot 0x4
31,020,851 UART: [art] Derive Key Pair
31,021,803 UART: [art] Store priv key in slot 0x5
33,403,933 UART: [art] Derive Key Pair - Done
33,417,069 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,123,850 UART: [art] Erasing AUTHORITY.KEYID = 7
35,125,356 UART: [art] PUB.X = B0A53BFCEB9DDD50CD669C0B3B370C30E9E465783F0F6BAE66309A4E5C0A931E8D5530BE5606918885BA10D8244AE2B2
35,132,650 UART: [art] PUB.Y = 4478CB623EC9ABF8F752D709AC87080377ABE27741BF5352100E192D2CC440BA76DB155E5902A745B84F391FB8F1D02F
35,139,895 UART: [art] SIG.R = 5C41BCB84524EFCAC0D2F4CA8DEF085E2EF716FD6E63B45C60CC7A12CA5B08114C76A2A4D6856EDF575377D229406F69
35,147,289 UART: [art] SIG.S = 186E35FCB64BD91110187CD467DA17885F2EB0D80CF04DBA762B9733743DCF7998671A7CD486B71C5F66718EF8B33C10
36,126,292 UART: Caliptra RT
36,127,007 UART: [state] CFI Enabled
36,499,094 UART: [rt] RT listening for mailbox commands...
36,501,901 UART:
36,502,071 UART: Running Caliptra ROM ...
36,503,192 UART:
36,503,517 UART: [state] CFI Enabled
40,323,092 UART: [state] LifecycleState = Unprovisioned
40,325,012 UART: [state] DebugLocked = No
40,327,228 UART: [state] WD Timer not started. Device not locked for debugging
40,332,260 UART: [kat] SHA2-256
40,522,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,532,910 UART: [kat] ++
40,533,512 UART: [kat] sha1
40,544,684 UART: [kat] SHA2-256
40,547,698 UART: [kat] SHA2-384
40,553,570 UART: [kat] SHA2-512-ACC
40,556,210 UART: [kat] ECC-384
42,996,934 UART: [kat] HMAC-384Kdf
43,008,629 UART: [kat] LMS
43,540,248 UART: [kat] --
43,544,630 UART: [update-reset] ++
48,236,231 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,239,678 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
48,869,439 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
3,754,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,132,235 >>> mbox cmd response: success
16,134,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,384,306 UART:
20,384,726 UART: Running Caliptra FMC ...
20,385,880 UART:
20,386,050 UART: [state] CFI Enabled
20,393,968 UART: [fht] FMC Alias Private Key: 7
22,160,381 UART: [art] Extend RT PCRs Done
22,161,627 UART: [art] Lock RT PCRs Done
22,163,231 UART: [art] Populate DV Done
22,169,073 UART: [fht] FMC Alias Private Key: 7
22,170,733 UART: [art] Derive CDI
22,171,554 UART: [art] Store in slot 0x4
22,214,091 UART: [art] Derive Key Pair
22,215,140 UART: [art] Store priv key in slot 0x5
24,642,256 UART: [art] Derive Key Pair - Done
24,655,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,361,265 UART: [art] Erasing AUTHORITY.KEYID = 7
26,362,779 UART: [art] PUB.X = 814AB44D33CCE29F23CCCCC3A080A912CCF2EE162ECDE512B199C1AA60C060D77C2E3590ACE6966675B1725064969771
26,370,025 UART: [art] PUB.Y = 6E9E8FB89D391030FE9335EF6AA71B7FD6EB0D4607D520FFB438A502AC12FFE833C69F8CDABF012ED321F1429963437C
26,377,348 UART: [art] SIG.R = 76583BEA294A9872C9E23A5F8AE3600D22322F144931224FB6AD62F68D44E78E4BD75C9A434900011E19BDCC67866FD1
26,384,697 UART: [art] SIG.S = E3C6D074F0A475EA48502CB84B17BA1907256EB64B64A17208BB683257C6FC1162F6F7CB870088DBDFE1EE945392FD94
27,363,983 UART: Caliptra RT
27,364,698 UART: [state] CFI Enabled
27,497,789 UART: [rt] RT listening for mailbox commands...
30,694,965 >>> mbox cmd response: failed
30,696,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,845,734 UART:
30,846,058 UART: Running Caliptra FMC ...
30,847,187 UART:
30,847,363 UART: [state] CFI Enabled
30,848,290 UART: [art] Extend RT PCRs Done
30,849,434 UART: [art] Lock RT PCRs Done
30,850,507 UART: [art] Populate DV Done
30,851,543 UART: [fht] FMC Alias Private Key: 7
30,852,943 UART: [art] Derive CDI
30,853,687 UART: [art] Store in slot 0x4
30,854,753 UART: [art] Derive Key Pair
30,855,748 UART: [art] Store priv key in slot 0x5
33,236,259 UART: [art] Derive Key Pair - Done
33,249,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,955,124 UART: [art] Erasing AUTHORITY.KEYID = 7
34,956,620 UART: [art] PUB.X = 814AB44D33CCE29F23CCCCC3A080A912CCF2EE162ECDE512B199C1AA60C060D77C2E3590ACE6966675B1725064969771
34,963,914 UART: [art] PUB.Y = 6E9E8FB89D391030FE9335EF6AA71B7FD6EB0D4607D520FFB438A502AC12FFE833C69F8CDABF012ED321F1429963437C
34,971,195 UART: [art] SIG.R = 76583BEA294A9872C9E23A5F8AE3600D22322F144931224FB6AD62F68D44E78E4BD75C9A434900011E19BDCC67866FD1
34,978,618 UART: [art] SIG.S = E3C6D074F0A475EA48502CB84B17BA1907256EB64B64A17208BB683257C6FC1162F6F7CB870088DBDFE1EE945392FD94
35,957,628 UART: Caliptra RT
35,958,348 UART: [state] CFI Enabled
36,333,666 UART: [rt] RT listening for mailbox commands...
49,070,020 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,333 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,825 UART: [kat] SHA2-256
881,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,871 UART: [kat] ++
886,023 UART: [kat] sha1
890,201 UART: [kat] SHA2-256
892,139 UART: [kat] SHA2-384
895,016 UART: [kat] SHA2-512-ACC
896,917 UART: [kat] ECC-384
902,658 UART: [kat] HMAC-384Kdf
907,298 UART: [kat] LMS
1,475,494 UART: [kat] --
1,476,261 UART: [cold-reset] ++
1,476,725 UART: [fht] Storing FHT @ 0x50003400
1,479,634 UART: [idev] ++
1,479,802 UART: [idev] CDI.KEYID = 6
1,480,162 UART: [idev] SUBJECT.KEYID = 7
1,480,586 UART: [idev] UDS.KEYID = 0
1,480,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,110 UART: [idev] Erasing UDS.KEYID = 0
1,504,764 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,264 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,521,213 UART: [ldev] Erasing FE.KEYID = 1
1,545,992 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,330 UART: [ldev] --
1,585,633 UART: [fwproc] Waiting for Commands...
1,586,250 UART: [fwproc] Received command 0x46574c44
1,587,041 UART: [fwproc] Received Image of size 118548 bytes
5,242,194 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,270,862 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,302,080 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,442,389 >>> mbox cmd response: success
5,442,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,443,613 UART: [afmc] ++
5,443,781 UART: [afmc] CDI.KEYID = 6
5,444,143 UART: [afmc] SUBJECT.KEYID = 7
5,444,568 UART: [afmc] AUTHORITY.KEYID = 5
5,480,015 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,496,755 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,497,535 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,503,241 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,509,120 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,514,833 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,522,670 UART: [afmc] --
5,523,630 UART: [cold-reset] --
5,524,612 UART: [state] Locking Datavault
5,526,115 UART: [state] Locking PCR0, PCR1 and PCR31
5,526,719 UART: [state] Locking ICCM
5,527,171 UART: [exit] Launching FMC @ 0x40000130
5,532,501 UART:
5,532,517 UART: Running Caliptra FMC ...
5,532,925 UART:
5,532,979 UART: [state] CFI Enabled
5,543,565 UART: [fht] FMC Alias Private Key: 7
5,662,431 UART: [art] Extend RT PCRs Done
5,662,859 UART: [art] Lock RT PCRs Done
5,664,557 UART: [art] Populate DV Done
5,672,528 UART: [fht] FMC Alias Private Key: 7
5,673,670 UART: [art] Derive CDI
5,673,950 UART: [art] Store in slot 0x4
5,759,696 UART: [art] Derive Key Pair
5,760,056 UART: [art] Store priv key in slot 0x5
5,773,221 UART: [art] Derive Key Pair - Done
5,787,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,803,322 UART: [art] Erasing AUTHORITY.KEYID = 7
5,804,087 UART: [art] PUB.X = F1CBA267DAF6D6DFC457A95B214138460A579B0B580740993876F3ACA144FC955FB309A812F5C286B69D7E0F4C91D025
5,810,846 UART: [art] PUB.Y = 23E059875CA8745DC2EE9268AE526CAAA88787DD4CC582006D1301919710606861170D50ED1BB7CA3436C3465C641CF9
5,817,764 UART: [art] SIG.R = EC64CBCEEACB48C8F29B6B2B7A7712346FA0116F0FFD9D250355769C9B44AD5AEAA3FCA5D2F1BBCEB05E7510E61F3B62
5,824,556 UART: [art] SIG.S = FD1A42F4F462735C90F1CF24E604F022328F0F4336068AAAEC0272FF1DFB60E316AB59926780E042D4808BC7998C2886
5,847,992 UART: Caliptra RT
5,848,243 UART: [state] CFI Enabled
5,968,922 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,970,901 UART:
5,970,917 UART: Running Caliptra ROM ...
5,971,325 UART:
5,971,379 UART: [state] CFI Enabled
5,973,695 UART: [state] LifecycleState = Unprovisioned
5,974,350 UART: [state] DebugLocked = No
5,975,048 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,976,671 UART: [kat] SHA2-256
6,770,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,774,717 UART: [kat] ++
6,774,869 UART: [kat] sha1
6,778,989 UART: [kat] SHA2-256
6,780,927 UART: [kat] SHA2-384
6,783,690 UART: [kat] SHA2-512-ACC
6,785,590 UART: [kat] ECC-384
6,791,219 UART: [kat] HMAC-384Kdf
6,795,787 UART: [kat] LMS
7,363,983 UART: [kat] --
7,364,856 UART: [update-reset] ++
7,404,589 >>> mbox cmd response: failed
7,404,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,404,999 UART: ROM Non-Fatal Error: 0x000B003D
7,405,955 UART: [state] Locking Datavault
7,406,747 UART: [state] Locking PCR0, PCR1 and PCR31
7,407,351 UART: [state] Locking ICCM
7,407,915 UART: [exit] Launching FMC @ 0x40000130
7,413,245 UART:
7,413,261 UART: Running Caliptra FMC ...
7,413,669 UART:
7,413,723 UART: [state] CFI Enabled
7,503,342 UART: [art] Extend RT PCRs Done
7,503,770 UART: [art] Lock RT PCRs Done
7,505,101 UART: [art] Populate DV Done
7,513,586 UART: [fht] FMC Alias Private Key: 7
7,514,566 UART: [art] Derive CDI
7,514,846 UART: [art] Store in slot 0x4
7,600,730 UART: [art] Derive Key Pair
7,601,090 UART: [art] Store priv key in slot 0x5
7,614,243 UART: [art] Derive Key Pair - Done
7,628,711 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,644,252 UART: [art] Erasing AUTHORITY.KEYID = 7
7,645,017 UART: [art] PUB.X = F1CBA267DAF6D6DFC457A95B214138460A579B0B580740993876F3ACA144FC955FB309A812F5C286B69D7E0F4C91D025
7,651,776 UART: [art] PUB.Y = 23E059875CA8745DC2EE9268AE526CAAA88787DD4CC582006D1301919710606861170D50ED1BB7CA3436C3465C641CF9
7,658,694 UART: [art] SIG.R = EC64CBCEEACB48C8F29B6B2B7A7712346FA0116F0FFD9D250355769C9B44AD5AEAA3FCA5D2F1BBCEB05E7510E61F3B62
7,665,486 UART: [art] SIG.S = FD1A42F4F462735C90F1CF24E604F022328F0F4336068AAAEC0272FF1DFB60E316AB59926780E042D4808BC7998C2886
7,689,124 UART: Caliptra RT
7,689,375 UART: [state] CFI Enabled
8,055,705 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,057,613 UART:
8,057,629 UART: Running Caliptra ROM ...
8,058,037 UART:
8,058,091 UART: [state] CFI Enabled
8,060,867 UART: [state] LifecycleState = Unprovisioned
8,061,522 UART: [state] DebugLocked = No
8,062,186 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
8,063,739 UART: [kat] SHA2-256
8,857,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,861,785 UART: [kat] ++
8,861,937 UART: [kat] sha1
8,866,125 UART: [kat] SHA2-256
8,868,063 UART: [kat] SHA2-384
8,870,828 UART: [kat] SHA2-512-ACC
8,872,728 UART: [kat] ECC-384
8,878,473 UART: [kat] HMAC-384Kdf
8,883,105 UART: [kat] LMS
9,451,301 UART: [kat] --
9,452,030 UART: [update-reset] ++
13,144,925 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,146,105 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
13,301,372 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,103,752 >>> mbox cmd response: success
5,103,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,165,939 UART:
5,165,955 UART: Running Caliptra FMC ...
5,166,363 UART:
5,166,417 UART: [state] CFI Enabled
5,177,071 UART: [fht] FMC Alias Private Key: 7
5,296,135 UART: [art] Extend RT PCRs Done
5,296,563 UART: [art] Lock RT PCRs Done
5,297,883 UART: [art] Populate DV Done
5,306,052 UART: [fht] FMC Alias Private Key: 7
5,307,018 UART: [art] Derive CDI
5,307,298 UART: [art] Store in slot 0x4
5,392,732 UART: [art] Derive Key Pair
5,393,092 UART: [art] Store priv key in slot 0x5
5,406,609 UART: [art] Derive Key Pair - Done
5,421,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,436,549 UART: [art] Erasing AUTHORITY.KEYID = 7
5,437,314 UART: [art] PUB.X = 52ABAE29868B837BC5FF52FAFC8F2FED54EA349F3EA8C2935E3A954BD6EE05379E705F45921813E2FB675941AA1531D2
5,444,093 UART: [art] PUB.Y = 9749D6C10E2128773757919BC6810E658FFED2A41BB5B957E17058C8B2464AA915F99756DB4CC4B92D25BBF176A4EFFA
5,451,043 UART: [art] SIG.R = 7CC053B0683A84BFC7FF1CADF0F93C761D13FEDF79AA4FC25DEDA93674DCCD9BE6DE2479DA85D385BFF2C1A1C33E4645
5,457,843 UART: [art] SIG.S = 1DF395B65833E968A4F1B26ADD2E21D4388DD3BAFC052F88D302F7BDC6B43F3C087B370D077AC43E96E82909C20F44F9
5,481,254 UART: Caliptra RT
5,481,505 UART: [state] CFI Enabled
5,600,648 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,920,528 >>> mbox cmd response: failed
6,920,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,926,564 UART:
6,926,580 UART: Running Caliptra FMC ...
6,926,988 UART:
6,927,042 UART: [state] CFI Enabled
7,016,255 UART: [art] Extend RT PCRs Done
7,016,683 UART: [art] Lock RT PCRs Done
7,018,002 UART: [art] Populate DV Done
7,026,121 UART: [fht] FMC Alias Private Key: 7
7,027,151 UART: [art] Derive CDI
7,027,431 UART: [art] Store in slot 0x4
7,113,621 UART: [art] Derive Key Pair
7,113,981 UART: [art] Store priv key in slot 0x5
7,126,782 UART: [art] Derive Key Pair - Done
7,141,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,157,054 UART: [art] Erasing AUTHORITY.KEYID = 7
7,157,819 UART: [art] PUB.X = 52ABAE29868B837BC5FF52FAFC8F2FED54EA349F3EA8C2935E3A954BD6EE05379E705F45921813E2FB675941AA1531D2
7,164,598 UART: [art] PUB.Y = 9749D6C10E2128773757919BC6810E658FFED2A41BB5B957E17058C8B2464AA915F99756DB4CC4B92D25BBF176A4EFFA
7,171,548 UART: [art] SIG.R = 7CC053B0683A84BFC7FF1CADF0F93C761D13FEDF79AA4FC25DEDA93674DCCD9BE6DE2479DA85D385BFF2C1A1C33E4645
7,178,348 UART: [art] SIG.S = 1DF395B65833E968A4F1B26ADD2E21D4388DD3BAFC052F88D302F7BDC6B43F3C087B370D077AC43E96E82909C20F44F9
7,202,531 UART: Caliptra RT
7,202,782 UART: [state] CFI Enabled
7,570,888 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,508,502 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,950 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,642 UART: [kat] SHA2-256
882,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,688 UART: [kat] ++
886,840 UART: [kat] sha1
891,166 UART: [kat] SHA2-256
893,104 UART: [kat] SHA2-384
895,923 UART: [kat] SHA2-512-ACC
897,824 UART: [kat] ECC-384
903,587 UART: [kat] HMAC-384Kdf
908,151 UART: [kat] LMS
1,476,347 UART: [kat] --
1,477,188 UART: [cold-reset] ++
1,477,646 UART: [fht] Storing FHT @ 0x50003400
1,480,595 UART: [idev] ++
1,480,763 UART: [idev] CDI.KEYID = 6
1,481,123 UART: [idev] SUBJECT.KEYID = 7
1,481,547 UART: [idev] UDS.KEYID = 0
1,481,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,079 UART: [idev] Erasing UDS.KEYID = 0
1,506,943 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,605 UART: [idev] --
1,516,642 UART: [ldev] ++
1,516,810 UART: [ldev] CDI.KEYID = 6
1,517,173 UART: [ldev] SUBJECT.KEYID = 5
1,517,599 UART: [ldev] AUTHORITY.KEYID = 7
1,518,062 UART: [ldev] FE.KEYID = 1
1,523,392 UART: [ldev] Erasing FE.KEYID = 1
1,549,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,569,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,651 UART: [ldev] --
1,588,984 UART: [fwproc] Waiting for Commands...
1,589,683 UART: [fwproc] Received command 0x46574c44
1,590,474 UART: [fwproc] Received Image of size 118548 bytes
5,321,553 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,348,997 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,380,215 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,520,418 >>> mbox cmd response: success
5,520,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,521,598 UART: [afmc] ++
5,521,766 UART: [afmc] CDI.KEYID = 6
5,522,128 UART: [afmc] SUBJECT.KEYID = 7
5,522,553 UART: [afmc] AUTHORITY.KEYID = 5
5,557,950 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,574,046 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,574,826 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,580,532 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,586,411 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,592,124 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,599,919 UART: [afmc] --
5,600,827 UART: [cold-reset] --
5,601,621 UART: [state] Locking Datavault
5,603,030 UART: [state] Locking PCR0, PCR1 and PCR31
5,603,634 UART: [state] Locking ICCM
5,604,098 UART: [exit] Launching FMC @ 0x40000130
5,609,428 UART:
5,609,444 UART: Running Caliptra FMC ...
5,609,852 UART:
5,609,995 UART: [state] CFI Enabled
5,620,591 UART: [fht] FMC Alias Private Key: 7
5,739,927 UART: [art] Extend RT PCRs Done
5,740,355 UART: [art] Lock RT PCRs Done
5,741,769 UART: [art] Populate DV Done
5,749,946 UART: [fht] FMC Alias Private Key: 7
5,751,114 UART: [art] Derive CDI
5,751,394 UART: [art] Store in slot 0x4
5,837,148 UART: [art] Derive Key Pair
5,837,508 UART: [art] Store priv key in slot 0x5
5,850,811 UART: [art] Derive Key Pair - Done
5,865,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,880,954 UART: [art] Erasing AUTHORITY.KEYID = 7
5,881,719 UART: [art] PUB.X = BC27AB1C1C0F31AD7892186CC6C3018ECAA03EC2CBD9FF02655E38AFBE4D9679E929D71306BAA394EE71833326E138E1
5,888,491 UART: [art] PUB.Y = 04AA899F6540C610DD6C8589F19AA3AAFE7ED2B1E2DCA1654F7CCEC5AA800E2396F0E335DD9751E9B1E71E1549D19E78
5,895,451 UART: [art] SIG.R = AED0387D8566D53C870A4A098E0159A8224505BC4198A90667C0463FB10B308654CFF998FEB5CF8C1C13C6438BFD6CBB
5,902,209 UART: [art] SIG.S = DE5D131E844192C0AB638716B45EF58220150CBA6B764364AA113CBE7776B622399969C8CEFA2710968B77CBBF3E9EDC
5,925,262 UART: Caliptra RT
5,925,605 UART: [state] CFI Enabled
6,046,712 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,048,773 UART:
6,048,789 UART: Running Caliptra ROM ...
6,049,197 UART:
6,049,338 UART: [state] CFI Enabled
6,052,168 UART: [state] LifecycleState = Unprovisioned
6,052,823 UART: [state] DebugLocked = No
6,053,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,054,828 UART: [kat] SHA2-256
6,848,759 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,852,874 UART: [kat] ++
6,853,026 UART: [kat] sha1
6,857,300 UART: [kat] SHA2-256
6,859,238 UART: [kat] SHA2-384
6,861,949 UART: [kat] SHA2-512-ACC
6,863,849 UART: [kat] ECC-384
6,869,524 UART: [kat] HMAC-384Kdf
6,874,300 UART: [kat] LMS
7,442,496 UART: [kat] --
7,443,453 UART: [update-reset] ++
7,483,968 >>> mbox cmd response: failed
7,483,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,484,430 UART: ROM Non-Fatal Error: 0x000B003D
7,485,260 UART: [state] Locking Datavault
7,486,006 UART: [state] Locking PCR0, PCR1 and PCR31
7,486,610 UART: [state] Locking ICCM
7,487,144 UART: [exit] Launching FMC @ 0x40000130
7,492,474 UART:
7,492,490 UART: Running Caliptra FMC ...
7,492,898 UART:
7,493,041 UART: [state] CFI Enabled
7,581,878 UART: [art] Extend RT PCRs Done
7,582,306 UART: [art] Lock RT PCRs Done
7,583,587 UART: [art] Populate DV Done
7,591,480 UART: [fht] FMC Alias Private Key: 7
7,592,428 UART: [art] Derive CDI
7,592,708 UART: [art] Store in slot 0x4
7,678,046 UART: [art] Derive Key Pair
7,678,406 UART: [art] Store priv key in slot 0x5
7,691,911 UART: [art] Derive Key Pair - Done
7,706,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,722,148 UART: [art] Erasing AUTHORITY.KEYID = 7
7,722,913 UART: [art] PUB.X = BC27AB1C1C0F31AD7892186CC6C3018ECAA03EC2CBD9FF02655E38AFBE4D9679E929D71306BAA394EE71833326E138E1
7,729,685 UART: [art] PUB.Y = 04AA899F6540C610DD6C8589F19AA3AAFE7ED2B1E2DCA1654F7CCEC5AA800E2396F0E335DD9751E9B1E71E1549D19E78
7,736,645 UART: [art] SIG.R = AED0387D8566D53C870A4A098E0159A8224505BC4198A90667C0463FB10B308654CFF998FEB5CF8C1C13C6438BFD6CBB
7,743,403 UART: [art] SIG.S = DE5D131E844192C0AB638716B45EF58220150CBA6B764364AA113CBE7776B622399969C8CEFA2710968B77CBBF3E9EDC
7,766,618 UART: Caliptra RT
7,766,961 UART: [state] CFI Enabled
8,130,587 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,132,193 UART:
8,132,209 UART: Running Caliptra ROM ...
8,132,617 UART:
8,132,758 UART: [state] CFI Enabled
8,135,796 UART: [state] LifecycleState = Unprovisioned
8,136,451 UART: [state] DebugLocked = No
8,137,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
8,138,718 UART: [kat] SHA2-256
8,932,649 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,936,764 UART: [kat] ++
8,936,916 UART: [kat] sha1
8,941,336 UART: [kat] SHA2-256
8,943,274 UART: [kat] SHA2-384
8,945,807 UART: [kat] SHA2-512-ACC
8,947,707 UART: [kat] ECC-384
8,953,038 UART: [kat] HMAC-384Kdf
8,957,654 UART: [kat] LMS
9,525,850 UART: [kat] --
9,526,493 UART: [update-reset] ++
13,294,532 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,295,590 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
13,450,857 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 4.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,368,088 >>> mbox cmd response: success
5,368,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,429,751 UART:
5,429,767 UART: Running Caliptra FMC ...
5,430,175 UART:
5,430,318 UART: [state] CFI Enabled
5,440,866 UART: [fht] FMC Alias Private Key: 7
5,559,684 UART: [art] Extend RT PCRs Done
5,560,112 UART: [art] Lock RT PCRs Done
5,561,778 UART: [art] Populate DV Done
5,570,165 UART: [fht] FMC Alias Private Key: 7
5,571,189 UART: [art] Derive CDI
5,571,469 UART: [art] Store in slot 0x4
5,657,281 UART: [art] Derive Key Pair
5,657,641 UART: [art] Store priv key in slot 0x5
5,671,676 UART: [art] Derive Key Pair - Done
5,686,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,701,837 UART: [art] Erasing AUTHORITY.KEYID = 7
5,702,602 UART: [art] PUB.X = 1378AAB99DFBFE852833AC7F954CE8E1CCC7E3DE64FB9282DA4646205AEA87DAAF325AFB43016D6F4CE3903A11C9B658
5,709,389 UART: [art] PUB.Y = 5E0396BF4B96B4940DD5DA8A4C361D56B12454B1060456EBD4BF942FEA8F0F0A4C3A24CEAD0E89D04C89804C5A371C7A
5,716,332 UART: [art] SIG.R = A916EC58C21BFE9CEB5B55B52E2535CEA0DB17C9496E11EECE67B41A2DCE03E1988A55D4890DE740A92C74047F1CACBE
5,723,115 UART: [art] SIG.S = AC785B826467154DFBFC1DD4FB961789D8D91167305F33529BB107E3B5BB8AB233DB13C57BBF45D83C0D52C211EF9723
5,747,097 UART: Caliptra RT
5,747,440 UART: [state] CFI Enabled
5,867,809 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,188,572 >>> mbox cmd response: failed
7,188,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,194,486 UART:
7,194,502 UART: Running Caliptra FMC ...
7,194,910 UART:
7,195,053 UART: [state] CFI Enabled
7,284,868 UART: [art] Extend RT PCRs Done
7,285,296 UART: [art] Lock RT PCRs Done
7,286,779 UART: [art] Populate DV Done
7,294,946 UART: [fht] FMC Alias Private Key: 7
7,295,894 UART: [art] Derive CDI
7,296,174 UART: [art] Store in slot 0x4
7,381,828 UART: [art] Derive Key Pair
7,382,188 UART: [art] Store priv key in slot 0x5
7,395,663 UART: [art] Derive Key Pair - Done
7,410,183 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,425,502 UART: [art] Erasing AUTHORITY.KEYID = 7
7,426,267 UART: [art] PUB.X = 1378AAB99DFBFE852833AC7F954CE8E1CCC7E3DE64FB9282DA4646205AEA87DAAF325AFB43016D6F4CE3903A11C9B658
7,433,054 UART: [art] PUB.Y = 5E0396BF4B96B4940DD5DA8A4C361D56B12454B1060456EBD4BF942FEA8F0F0A4C3A24CEAD0E89D04C89804C5A371C7A
7,439,997 UART: [art] SIG.R = A916EC58C21BFE9CEB5B55B52E2535CEA0DB17C9496E11EECE67B41A2DCE03E1988A55D4890DE740A92C74047F1CACBE
7,446,780 UART: [art] SIG.S = AC785B826467154DFBFC1DD4FB961789D8D91167305F33529BB107E3B5BB8AB233DB13C57BBF45D83C0D52C211EF9723
7,470,496 UART: Caliptra RT
7,470,839 UART: [state] CFI Enabled
7,835,877 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,038,393 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,576 UART: [state] LifecycleState = Unprovisioned
86,231 UART: [state] DebugLocked = No
86,907 UART: [state] WD Timer not started. Device not locked for debugging
88,076 UART: [kat] SHA2-256
891,626 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,730 UART: [kat] ++
895,882 UART: [kat] sha1
900,204 UART: [kat] SHA2-256
902,144 UART: [kat] SHA2-384
904,911 UART: [kat] SHA2-512-ACC
906,812 UART: [kat] ECC-384
916,207 UART: [kat] HMAC-384Kdf
920,777 UART: [kat] LMS
1,169,089 UART: [kat] --
1,169,926 UART: [cold-reset] ++
1,170,458 UART: [fht] FHT @ 0x50003400
1,173,228 UART: [idev] ++
1,173,396 UART: [idev] CDI.KEYID = 6
1,173,757 UART: [idev] SUBJECT.KEYID = 7
1,174,182 UART: [idev] UDS.KEYID = 0
1,174,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,107 UART: [idev] Erasing UDS.KEYID = 0
1,199,307 UART: [idev] Sha1 KeyId Algorithm
1,208,055 UART: [idev] --
1,209,022 UART: [ldev] ++
1,209,190 UART: [ldev] CDI.KEYID = 6
1,209,554 UART: [ldev] SUBJECT.KEYID = 5
1,209,981 UART: [ldev] AUTHORITY.KEYID = 7
1,210,444 UART: [ldev] FE.KEYID = 1
1,215,426 UART: [ldev] Erasing FE.KEYID = 1
1,241,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,306 UART: [ldev] --
1,280,583 UART: [fwproc] Wait for Commands...
1,281,372 UART: [fwproc] Recv command 0x46574c44
1,282,105 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,640 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,815 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,082 >>> mbox cmd response: success
3,374,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,375,242 UART: [afmc] ++
3,375,410 UART: [afmc] CDI.KEYID = 6
3,375,773 UART: [afmc] SUBJECT.KEYID = 7
3,376,199 UART: [afmc] AUTHORITY.KEYID = 5
3,411,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,708 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,415 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,440,292 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,002 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,754 UART: [afmc] --
3,454,687 UART: [cold-reset] --
3,455,729 UART: [state] Locking Datavault
3,456,636 UART: [state] Locking PCR0, PCR1 and PCR31
3,457,240 UART: [state] Locking ICCM
3,457,680 UART: [exit] Launching FMC @ 0x40000130
3,463,010 UART:
3,463,026 UART: Running Caliptra FMC ...
3,463,434 UART:
3,463,488 UART: [state] CFI Enabled
3,473,578 UART: [fht] FMC Alias Private Key: 7
3,592,264 UART: [art] Extend RT PCRs Done
3,592,692 UART: [art] Lock RT PCRs Done
3,594,244 UART: [art] Populate DV Done
3,602,461 UART: [fht] FMC Alias Private Key: 7
3,603,583 UART: [art] Derive CDI
3,603,863 UART: [art] Store in slot 0x4
3,689,512 UART: [art] Derive Key Pair
3,689,872 UART: [art] Store priv key in slot 0x5
3,703,496 UART: [art] Derive Key Pair - Done
3,718,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,734,839 UART: [art] PUB.X = 77FC707CD87B75A441407AA5641399ED13922C9DE1199965733A7359A71A9521369057B558CAAEDA424062CC8A83BAE4
3,741,605 UART: [art] PUB.Y = 8A5374E75E87FB1B451BA576CF19543A185E3A11241BE16104C4888C415282C8AE068567A9EDCDC4DA670528BC6B457B
3,748,548 UART: [art] SIG.R = 56152CBADF5A814CCAA31B4E92A6E849E806534D6D3CB6745F995F196A962DC8A61F49A056325CBBA3504BB214A9C2C8
3,755,325 UART: [art] SIG.S = A8CB3703B26A6BE79716A2DED7A179D0D3593DD6F1640283DEC3F3CFD17FC84BBA0EA8EF2EE34E1EA06B183DD356FB4A
3,779,196 UART: Caliptra RT
3,779,447 UART: [state] CFI Enabled
3,899,245 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,353 UART:
3,901,369 UART: Running Caliptra ROM ...
3,901,777 UART:
3,901,832 UART: [state] CFI Enabled
3,904,240 UART: [state] LifecycleState = Unprovisioned
3,904,895 UART: [state] DebugLocked = No
3,905,579 UART: [state] WD Timer not started. Device not locked for debugging
3,906,697 UART: [kat] SHA2-256
4,710,247 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,714,351 UART: [kat] ++
4,714,503 UART: [kat] sha1
4,718,687 UART: [kat] SHA2-256
4,720,627 UART: [kat] SHA2-384
4,723,556 UART: [kat] SHA2-512-ACC
4,725,456 UART: [kat] ECC-384
4,735,073 UART: [kat] HMAC-384Kdf
4,739,807 UART: [kat] LMS
4,988,119 UART: [kat] --
4,988,847 UART: [update-reset] ++
5,006,127 >>> mbox cmd response: failed
5,006,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,006,575 UART: ROM Non-Fatal Error: 0x000B003D
5,007,445 UART: [state] Locking Datavault
5,008,007 UART: [state] Locking PCR0, PCR1 and PCR31
5,008,611 UART: [state] Locking ICCM
5,009,159 UART: [exit] Launching FMC @ 0x40000130
5,014,489 UART:
5,014,505 UART: Running Caliptra FMC ...
5,014,913 UART:
5,014,967 UART: [state] CFI Enabled
5,104,242 UART: [art] Extend RT PCRs Done
5,104,670 UART: [art] Lock RT PCRs Done
5,106,005 UART: [art] Populate DV Done
5,114,430 UART: [fht] FMC Alias Private Key: 7
5,115,392 UART: [art] Derive CDI
5,115,672 UART: [art] Store in slot 0x4
5,201,759 UART: [art] Derive Key Pair
5,202,119 UART: [art] Store priv key in slot 0x5
5,215,613 UART: [art] Derive Key Pair - Done
5,230,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,245,769 UART: [art] Erasing AUTHORITY.KEYID = 7
5,246,534 UART: [art] PUB.X = 77FC707CD87B75A441407AA5641399ED13922C9DE1199965733A7359A71A9521369057B558CAAEDA424062CC8A83BAE4
5,253,300 UART: [art] PUB.Y = 8A5374E75E87FB1B451BA576CF19543A185E3A11241BE16104C4888C415282C8AE068567A9EDCDC4DA670528BC6B457B
5,260,243 UART: [art] SIG.R = 56152CBADF5A814CCAA31B4E92A6E849E806534D6D3CB6745F995F196A962DC8A61F49A056325CBBA3504BB214A9C2C8
5,267,020 UART: [art] SIG.S = A8CB3703B26A6BE79716A2DED7A179D0D3593DD6F1640283DEC3F3CFD17FC84BBA0EA8EF2EE34E1EA06B183DD356FB4A
5,290,895 UART: Caliptra RT
5,291,146 UART: [state] CFI Enabled
5,658,541 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,660,354 UART:
5,660,370 UART: Running Caliptra ROM ...
5,660,778 UART:
5,660,833 UART: [state] CFI Enabled
5,663,541 UART: [state] LifecycleState = Unprovisioned
5,664,196 UART: [state] DebugLocked = No
5,664,874 UART: [state] WD Timer not started. Device not locked for debugging
5,666,038 UART: [kat] SHA2-256
6,469,588 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,473,692 UART: [kat] ++
6,473,844 UART: [kat] sha1
6,478,154 UART: [kat] SHA2-256
6,480,094 UART: [kat] SHA2-384
6,482,863 UART: [kat] SHA2-512-ACC
6,484,763 UART: [kat] ECC-384
6,494,534 UART: [kat] HMAC-384Kdf
6,499,020 UART: [kat] LMS
6,747,332 UART: [kat] --
6,747,994 UART: [update-reset] ++
8,656,383 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,657,482 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
8,812,697 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,211,540 >>> mbox cmd response: success
3,211,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,273,011 UART:
3,273,027 UART: Running Caliptra FMC ...
3,273,435 UART:
3,273,489 UART: [state] CFI Enabled
3,283,677 UART: [fht] FMC Alias Private Key: 7
3,403,453 UART: [art] Extend RT PCRs Done
3,403,881 UART: [art] Lock RT PCRs Done
3,405,449 UART: [art] Populate DV Done
3,413,666 UART: [fht] FMC Alias Private Key: 7
3,414,844 UART: [art] Derive CDI
3,415,124 UART: [art] Store in slot 0x4
3,500,757 UART: [art] Derive Key Pair
3,501,117 UART: [art] Store priv key in slot 0x5
3,514,303 UART: [art] Derive Key Pair - Done
3,528,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,544,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,545,069 UART: [art] PUB.X = ADC112FF9C668745DA33F745863CAD926AEC815696C4D268BB8B5B6E5FFEFF25DAC050ACE8633AAC69A0475C3B6B8C90
3,551,859 UART: [art] PUB.Y = 53C45346D42CEC26E3103A1837D5C5864E8F2460AEE8AC3239E9BC926629CCDA1E1AA4B7FAFC586C7CB58F929AF718C3
3,558,823 UART: [art] SIG.R = 27C2DC5287C3DEEEA04551563837ACC3D117D0C5A3B6B89DC6DED2F4120A47E141AFF8038EA1840E274A72F6C3351368
3,565,592 UART: [art] SIG.S = FE5F4880D415264C0ACA87694C35C14A0E202A547A825B595BA1CF2DAAC96771E19C93B93B7334E889F15E7B7AB01645
3,589,024 UART: Caliptra RT
3,589,275 UART: [state] CFI Enabled
3,709,171 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,703,766 >>> mbox cmd response: failed
4,703,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,709,642 UART:
4,709,658 UART: Running Caliptra FMC ...
4,710,066 UART:
4,710,120 UART: [state] CFI Enabled
4,799,231 UART: [art] Extend RT PCRs Done
4,799,659 UART: [art] Lock RT PCRs Done
4,800,822 UART: [art] Populate DV Done
4,808,989 UART: [fht] FMC Alias Private Key: 7
4,809,923 UART: [art] Derive CDI
4,810,203 UART: [art] Store in slot 0x4
4,896,028 UART: [art] Derive Key Pair
4,896,388 UART: [art] Store priv key in slot 0x5
4,910,076 UART: [art] Derive Key Pair - Done
4,924,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,940,489 UART: [art] Erasing AUTHORITY.KEYID = 7
4,941,254 UART: [art] PUB.X = ADC112FF9C668745DA33F745863CAD926AEC815696C4D268BB8B5B6E5FFEFF25DAC050ACE8633AAC69A0475C3B6B8C90
4,948,044 UART: [art] PUB.Y = 53C45346D42CEC26E3103A1837D5C5864E8F2460AEE8AC3239E9BC926629CCDA1E1AA4B7FAFC586C7CB58F929AF718C3
4,955,008 UART: [art] SIG.R = 27C2DC5287C3DEEEA04551563837ACC3D117D0C5A3B6B89DC6DED2F4120A47E141AFF8038EA1840E274A72F6C3351368
4,961,777 UART: [art] SIG.S = FE5F4880D415264C0ACA87694C35C14A0E202A547A825B595BA1CF2DAAC96771E19C93B93B7334E889F15E7B7AB01645
4,985,885 UART: Caliptra RT
4,986,136 UART: [state] CFI Enabled
5,349,375 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,369,544 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
891,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
920,970 UART: [kat] LMS
1,169,282 UART: [kat] --
1,170,141 UART: [cold-reset] ++
1,170,611 UART: [fht] FHT @ 0x50003400
1,173,217 UART: [idev] ++
1,173,385 UART: [idev] CDI.KEYID = 6
1,173,746 UART: [idev] SUBJECT.KEYID = 7
1,174,171 UART: [idev] UDS.KEYID = 0
1,174,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,192 UART: [idev] Erasing UDS.KEYID = 0
1,200,178 UART: [idev] Sha1 KeyId Algorithm
1,209,020 UART: [idev] --
1,209,959 UART: [ldev] ++
1,210,127 UART: [ldev] CDI.KEYID = 6
1,210,491 UART: [ldev] SUBJECT.KEYID = 5
1,210,918 UART: [ldev] AUTHORITY.KEYID = 7
1,211,381 UART: [ldev] FE.KEYID = 1
1,216,727 UART: [ldev] Erasing FE.KEYID = 1
1,243,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,025 UART: [ldev] --
1,282,456 UART: [fwproc] Wait for Commands...
1,283,039 UART: [fwproc] Recv command 0x46574c44
1,283,772 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,930 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,105 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,282 >>> mbox cmd response: success
3,374,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,375,390 UART: [afmc] ++
3,375,558 UART: [afmc] CDI.KEYID = 6
3,375,921 UART: [afmc] SUBJECT.KEYID = 7
3,376,347 UART: [afmc] AUTHORITY.KEYID = 5
3,412,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,432 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,139 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,016 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,726 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,312 UART: [afmc] --
3,455,259 UART: [cold-reset] --
3,456,043 UART: [state] Locking Datavault
3,457,154 UART: [state] Locking PCR0, PCR1 and PCR31
3,457,758 UART: [state] Locking ICCM
3,458,346 UART: [exit] Launching FMC @ 0x40000130
3,463,676 UART:
3,463,692 UART: Running Caliptra FMC ...
3,464,100 UART:
3,464,243 UART: [state] CFI Enabled
3,475,193 UART: [fht] FMC Alias Private Key: 7
3,594,509 UART: [art] Extend RT PCRs Done
3,594,937 UART: [art] Lock RT PCRs Done
3,596,561 UART: [art] Populate DV Done
3,604,932 UART: [fht] FMC Alias Private Key: 7
3,606,058 UART: [art] Derive CDI
3,606,338 UART: [art] Store in slot 0x4
3,692,453 UART: [art] Derive Key Pair
3,692,813 UART: [art] Store priv key in slot 0x5
3,705,863 UART: [art] Derive Key Pair - Done
3,720,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,736,527 UART: [art] PUB.X = E8BBEEA8E2BDC979302C778CAD68F1343BE96F019F7D84C10AC3954CA0FCD53D715FD7BB01E55B4F832E045C38CE0054
3,743,281 UART: [art] PUB.Y = 32854689CFB8BFF8E0D0EF245D4434D01159002F406C6B809076ED2F7C606D4F93A8B4D144491218BF511E8677EB4B7B
3,750,209 UART: [art] SIG.R = 9ED325156D16C5071190D40531F9AF15655806FD62A4753898D171D35103E029656B3739EFF6B8961A676663F73A5AD9
3,756,953 UART: [art] SIG.S = 6D0207F9575928FE8B10701A70875DABFED272A828BDA860654969708D94F739B1A45E4F2E617CCFE6B8625A44C7A6D2
3,780,777 UART: Caliptra RT
3,781,120 UART: [state] CFI Enabled
3,901,324 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,903,228 UART:
3,903,244 UART: Running Caliptra ROM ...
3,903,652 UART:
3,903,794 UART: [state] CFI Enabled
3,906,716 UART: [state] LifecycleState = Unprovisioned
3,907,371 UART: [state] DebugLocked = No
3,907,935 UART: [state] WD Timer not started. Device not locked for debugging
3,909,081 UART: [kat] SHA2-256
4,712,631 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,716,735 UART: [kat] ++
4,716,887 UART: [kat] sha1
4,720,941 UART: [kat] SHA2-256
4,722,881 UART: [kat] SHA2-384
4,725,732 UART: [kat] SHA2-512-ACC
4,727,632 UART: [kat] ECC-384
4,737,499 UART: [kat] HMAC-384Kdf
4,742,189 UART: [kat] LMS
4,990,501 UART: [kat] --
4,991,127 UART: [update-reset] ++
5,008,291 >>> mbox cmd response: failed
5,008,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,008,545 UART: ROM Non-Fatal Error: 0x000B003D
5,009,521 UART: [state] Locking Datavault
5,010,207 UART: [state] Locking PCR0, PCR1 and PCR31
5,010,811 UART: [state] Locking ICCM
5,011,451 UART: [exit] Launching FMC @ 0x40000130
5,016,781 UART:
5,016,797 UART: Running Caliptra FMC ...
5,017,205 UART:
5,017,348 UART: [state] CFI Enabled
5,106,921 UART: [art] Extend RT PCRs Done
5,107,349 UART: [art] Lock RT PCRs Done
5,108,640 UART: [art] Populate DV Done
5,116,789 UART: [fht] FMC Alias Private Key: 7
5,117,971 UART: [art] Derive CDI
5,118,251 UART: [art] Store in slot 0x4
5,203,664 UART: [art] Derive Key Pair
5,204,024 UART: [art] Store priv key in slot 0x5
5,217,344 UART: [art] Derive Key Pair - Done
5,232,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,247,291 UART: [art] Erasing AUTHORITY.KEYID = 7
5,248,056 UART: [art] PUB.X = E8BBEEA8E2BDC979302C778CAD68F1343BE96F019F7D84C10AC3954CA0FCD53D715FD7BB01E55B4F832E045C38CE0054
5,254,810 UART: [art] PUB.Y = 32854689CFB8BFF8E0D0EF245D4434D01159002F406C6B809076ED2F7C606D4F93A8B4D144491218BF511E8677EB4B7B
5,261,738 UART: [art] SIG.R = 9ED325156D16C5071190D40531F9AF15655806FD62A4753898D171D35103E029656B3739EFF6B8961A676663F73A5AD9
5,268,482 UART: [art] SIG.S = 6D0207F9575928FE8B10701A70875DABFED272A828BDA860654969708D94F739B1A45E4F2E617CCFE6B8625A44C7A6D2
5,292,442 UART: Caliptra RT
5,292,785 UART: [state] CFI Enabled
5,651,944 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,653,615 UART:
5,653,631 UART: Running Caliptra ROM ...
5,654,039 UART:
5,654,181 UART: [state] CFI Enabled
5,656,803 UART: [state] LifecycleState = Unprovisioned
5,657,458 UART: [state] DebugLocked = No
5,658,014 UART: [state] WD Timer not started. Device not locked for debugging
5,659,240 UART: [kat] SHA2-256
6,462,790 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,466,894 UART: [kat] ++
6,467,046 UART: [kat] sha1
6,471,270 UART: [kat] SHA2-256
6,473,210 UART: [kat] SHA2-384
6,475,921 UART: [kat] SHA2-512-ACC
6,477,821 UART: [kat] ECC-384
6,487,970 UART: [kat] HMAC-384Kdf
6,492,650 UART: [kat] LMS
6,740,962 UART: [kat] --
6,741,974 UART: [update-reset] ++
8,647,044 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,648,191 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
8,803,406 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,412 >>> mbox cmd response: success
3,226,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,289,141 UART:
3,289,157 UART: Running Caliptra FMC ...
3,289,565 UART:
3,289,708 UART: [state] CFI Enabled
3,300,590 UART: [fht] FMC Alias Private Key: 7
3,419,664 UART: [art] Extend RT PCRs Done
3,420,092 UART: [art] Lock RT PCRs Done
3,421,720 UART: [art] Populate DV Done
3,430,209 UART: [fht] FMC Alias Private Key: 7
3,431,187 UART: [art] Derive CDI
3,431,467 UART: [art] Store in slot 0x4
3,517,336 UART: [art] Derive Key Pair
3,517,696 UART: [art] Store priv key in slot 0x5
3,530,868 UART: [art] Derive Key Pair - Done
3,545,871 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,561,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,562,459 UART: [art] PUB.X = C3DC4C670EDB5297DFD5A836EE8A78451CE639B2AEEAF411334A6CFD287C732EAB1D3EA7813587EEE1247B8D458B77DB
3,569,246 UART: [art] PUB.Y = 7F473DBBCD6653D23CBF12A250A6CB7BCEF674392464A7708878D347D4F30AA4F75C84A88ABDF9EE49E14DC13B4F3081
3,576,207 UART: [art] SIG.R = CDA9442DDC49D25AA29F9DF81E1AF260F92FE107318656F7BDF6DD6563A58B05CCE64EEA55689542A860642118687807
3,582,972 UART: [art] SIG.S = 7AE457F6336D5D335515EF15AB01D660F64BCD532AF167048AE0D468C260F4F10BD15B150A3248793545603F82864413
3,606,610 UART: Caliptra RT
3,606,953 UART: [state] CFI Enabled
3,727,363 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,722,447 >>> mbox cmd response: failed
4,722,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,728,471 UART:
4,728,487 UART: Running Caliptra FMC ...
4,728,895 UART:
4,729,038 UART: [state] CFI Enabled
4,817,861 UART: [art] Extend RT PCRs Done
4,818,289 UART: [art] Lock RT PCRs Done
4,819,586 UART: [art] Populate DV Done
4,827,543 UART: [fht] FMC Alias Private Key: 7
4,828,529 UART: [art] Derive CDI
4,828,809 UART: [art] Store in slot 0x4
4,914,680 UART: [art] Derive Key Pair
4,915,040 UART: [art] Store priv key in slot 0x5
4,928,782 UART: [art] Derive Key Pair - Done
4,943,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,959,146 UART: [art] Erasing AUTHORITY.KEYID = 7
4,959,911 UART: [art] PUB.X = C3DC4C670EDB5297DFD5A836EE8A78451CE639B2AEEAF411334A6CFD287C732EAB1D3EA7813587EEE1247B8D458B77DB
4,966,698 UART: [art] PUB.Y = 7F473DBBCD6653D23CBF12A250A6CB7BCEF674392464A7708878D347D4F30AA4F75C84A88ABDF9EE49E14DC13B4F3081
4,973,659 UART: [art] SIG.R = CDA9442DDC49D25AA29F9DF81E1AF260F92FE107318656F7BDF6DD6563A58B05CCE64EEA55689542A860642118687807
4,980,424 UART: [art] SIG.S = 7AE457F6336D5D335515EF15AB01D660F64BCD532AF167048AE0D468C260F4F10BD15B150A3248793545603F82864413
5,004,552 UART: Caliptra RT
5,004,895 UART: [state] CFI Enabled
5,373,574 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,407,821 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,635 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
893,396 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,521 UART: [kat] ++
897,673 UART: [kat] sha1
901,889 UART: [kat] SHA2-256
903,829 UART: [kat] SHA2-384
906,628 UART: [kat] SHA2-512-ACC
908,529 UART: [kat] ECC-384
918,252 UART: [kat] HMAC-384Kdf
922,924 UART: [kat] LMS
1,171,252 UART: [kat] --
1,172,051 UART: [cold-reset] ++
1,172,527 UART: [fht] FHT @ 0x50003400
1,175,258 UART: [idev] ++
1,175,426 UART: [idev] CDI.KEYID = 6
1,175,786 UART: [idev] SUBJECT.KEYID = 7
1,176,210 UART: [idev] UDS.KEYID = 0
1,176,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,154 UART: [idev] Erasing UDS.KEYID = 0
1,201,293 UART: [idev] Sha1 KeyId Algorithm
1,209,801 UART: [idev] --
1,211,049 UART: [ldev] ++
1,211,217 UART: [ldev] CDI.KEYID = 6
1,211,580 UART: [ldev] SUBJECT.KEYID = 5
1,212,006 UART: [ldev] AUTHORITY.KEYID = 7
1,212,469 UART: [ldev] FE.KEYID = 1
1,217,695 UART: [ldev] Erasing FE.KEYID = 1
1,243,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,255 UART: [ldev] --
1,282,554 UART: [fwproc] Wait for Commands...
1,283,314 UART: [fwproc] Recv command 0x46574c44
1,284,042 UART: [fwproc] Recv'd Img size: 118548 bytes
3,165,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,192,605 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,223,775 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,364,100 >>> mbox cmd response: success
3,364,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,365,186 UART: [afmc] ++
3,365,354 UART: [afmc] CDI.KEYID = 6
3,365,716 UART: [afmc] SUBJECT.KEYID = 7
3,366,141 UART: [afmc] AUTHORITY.KEYID = 5
3,402,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,418,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,419,255 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,424,961 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,430,840 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,436,550 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,444,265 UART: [afmc] --
3,445,207 UART: [cold-reset] --
3,446,203 UART: [state] Locking Datavault
3,447,272 UART: [state] Locking PCR0, PCR1 and PCR31
3,447,876 UART: [state] Locking ICCM
3,448,536 UART: [exit] Launching FMC @ 0x40000130
3,453,866 UART:
3,453,882 UART: Running Caliptra FMC ...
3,454,290 UART:
3,454,344 UART: [state] CFI Enabled
3,464,712 UART: [fht] FMC Alias Private Key: 7
3,583,722 UART: [art] Extend RT PCRs Done
3,584,150 UART: [art] Lock RT PCRs Done
3,585,712 UART: [art] Populate DV Done
3,593,965 UART: [fht] FMC Alias Private Key: 7
3,594,945 UART: [art] Derive CDI
3,595,225 UART: [art] Store in slot 0x4
3,680,854 UART: [art] Derive Key Pair
3,681,214 UART: [art] Store priv key in slot 0x5
3,694,778 UART: [art] Derive Key Pair - Done
3,710,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,725,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,726,408 UART: [art] PUB.X = E9FF0676E52DB34B63B484A889F7C11F4DD7204DBA4B5FD4747BE88ED0578753CBEDD95E9AAFABF4A0DCA904C16A7C36
3,733,196 UART: [art] PUB.Y = 65D992ED7BE724E201DF0054C4D706061B90E58D9CF775C3B87C5151A85D0BB98188C1219B375B8F456F9A83052371AE
3,740,107 UART: [art] SIG.R = 6B1A41581B1A3EC107AACB232E83A5FA985ABCAEA057F1C9B3626E1E84C8710D2C34747CB428CF091BD4D69D4DB6173C
3,746,884 UART: [art] SIG.S = 0C45FF05392516B529925F9EC32511DBCFD694659119ACBA66496D765AA86F0707B66F265F4DDB07B163A48DF65ACF52
3,770,381 UART: Caliptra RT
3,770,632 UART: [state] CFI Enabled
3,891,042 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,172 UART:
3,893,188 UART: Running Caliptra ROM ...
3,893,596 UART:
3,893,651 UART: [state] CFI Enabled
3,896,265 UART: [state] LifecycleState = Unprovisioned
3,896,920 UART: [state] DebugLocked = No
3,897,532 UART: [state] WD Timer not started. Device not locked for debugging
3,898,884 UART: [kat] SHA2-256
4,704,534 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,708,659 UART: [kat] ++
4,708,811 UART: [kat] sha1
4,713,045 UART: [kat] SHA2-256
4,714,985 UART: [kat] SHA2-384
4,717,750 UART: [kat] SHA2-512-ACC
4,719,650 UART: [kat] ECC-384
4,729,779 UART: [kat] HMAC-384Kdf
4,734,535 UART: [kat] LMS
4,982,863 UART: [kat] --
4,983,649 UART: [update-reset] ++
5,001,676 >>> mbox cmd response: failed
5,001,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,002,188 UART: ROM Non-Fatal Error: 0x000B003D
5,003,088 UART: [state] Locking Datavault
5,003,960 UART: [state] Locking PCR0, PCR1 and PCR31
5,004,564 UART: [state] Locking ICCM
5,005,020 UART: [exit] Launching FMC @ 0x40000130
5,010,350 UART:
5,010,366 UART: Running Caliptra FMC ...
5,010,774 UART:
5,010,828 UART: [state] CFI Enabled
5,099,573 UART: [art] Extend RT PCRs Done
5,100,001 UART: [art] Lock RT PCRs Done
5,101,428 UART: [art] Populate DV Done
5,109,833 UART: [fht] FMC Alias Private Key: 7
5,110,921 UART: [art] Derive CDI
5,111,201 UART: [art] Store in slot 0x4
5,197,280 UART: [art] Derive Key Pair
5,197,640 UART: [art] Store priv key in slot 0x5
5,210,704 UART: [art] Derive Key Pair - Done
5,225,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,240,807 UART: [art] Erasing AUTHORITY.KEYID = 7
5,241,572 UART: [art] PUB.X = E9FF0676E52DB34B63B484A889F7C11F4DD7204DBA4B5FD4747BE88ED0578753CBEDD95E9AAFABF4A0DCA904C16A7C36
5,248,360 UART: [art] PUB.Y = 65D992ED7BE724E201DF0054C4D706061B90E58D9CF775C3B87C5151A85D0BB98188C1219B375B8F456F9A83052371AE
5,255,271 UART: [art] SIG.R = 6B1A41581B1A3EC107AACB232E83A5FA985ABCAEA057F1C9B3626E1E84C8710D2C34747CB428CF091BD4D69D4DB6173C
5,262,048 UART: [art] SIG.S = 0C45FF05392516B529925F9EC32511DBCFD694659119ACBA66496D765AA86F0707B66F265F4DDB07B163A48DF65ACF52
5,285,501 UART: Caliptra RT
5,285,752 UART: [state] CFI Enabled
5,651,795 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,653,606 UART:
5,653,622 UART: Running Caliptra ROM ...
5,654,030 UART:
5,654,085 UART: [state] CFI Enabled
5,656,973 UART: [state] LifecycleState = Unprovisioned
5,657,628 UART: [state] DebugLocked = No
5,658,358 UART: [state] WD Timer not started. Device not locked for debugging
5,659,468 UART: [kat] SHA2-256
6,465,118 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,469,243 UART: [kat] ++
6,469,395 UART: [kat] sha1
6,473,409 UART: [kat] SHA2-256
6,475,349 UART: [kat] SHA2-384
6,478,052 UART: [kat] SHA2-512-ACC
6,479,952 UART: [kat] ECC-384
6,489,427 UART: [kat] HMAC-384Kdf
6,494,129 UART: [kat] LMS
6,742,457 UART: [kat] --
6,743,431 UART: [update-reset] ++
8,639,190 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,640,345 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
8,795,560 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,794 >>> mbox cmd response: success
3,223,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,286,107 UART:
3,286,123 UART: Running Caliptra FMC ...
3,286,531 UART:
3,286,585 UART: [state] CFI Enabled
3,297,093 UART: [fht] FMC Alias Private Key: 7
3,415,583 UART: [art] Extend RT PCRs Done
3,416,011 UART: [art] Lock RT PCRs Done
3,417,751 UART: [art] Populate DV Done
3,426,170 UART: [fht] FMC Alias Private Key: 7
3,427,150 UART: [art] Derive CDI
3,427,430 UART: [art] Store in slot 0x4
3,513,329 UART: [art] Derive Key Pair
3,513,689 UART: [art] Store priv key in slot 0x5
3,527,393 UART: [art] Derive Key Pair - Done
3,542,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,557,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,558,386 UART: [art] PUB.X = 5282849EF1F6024016FAC9FEAE076FB223B20C7A2B0E656FA2B5A3E396A361139544D030B54B40334D4DD27CE74F2D29
3,565,148 UART: [art] PUB.Y = 19C3EDA40D89FECC5BBA8E4149152F5355BC97150373A36E206241A2E6D4C144ED297EAA3AAA8508881BCC9C65A3D303
3,572,096 UART: [art] SIG.R = A3A45EFF8BCDFA4F09D0D40799A9DA02A15E1BA2898C9B25D2FA058EF8E06829B735373124B6B48971A4857EB43286D8
3,578,862 UART: [art] SIG.S = 8BF48C86A4E731B48D41136DFAF681528A510AA2F578A34935EFCCD97DA3D5504C42BB40F0F8FF681345DE21A9B760CB
3,602,483 UART: Caliptra RT
3,602,734 UART: [state] CFI Enabled
3,722,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,718,017 >>> mbox cmd response: failed
4,718,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,723,869 UART:
4,723,885 UART: Running Caliptra FMC ...
4,724,293 UART:
4,724,347 UART: [state] CFI Enabled
4,813,678 UART: [art] Extend RT PCRs Done
4,814,106 UART: [art] Lock RT PCRs Done
4,815,361 UART: [art] Populate DV Done
4,823,200 UART: [fht] FMC Alias Private Key: 7
4,824,268 UART: [art] Derive CDI
4,824,548 UART: [art] Store in slot 0x4
4,910,237 UART: [art] Derive Key Pair
4,910,597 UART: [art] Store priv key in slot 0x5
4,923,553 UART: [art] Derive Key Pair - Done
4,938,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,953,381 UART: [art] Erasing AUTHORITY.KEYID = 7
4,954,146 UART: [art] PUB.X = 5282849EF1F6024016FAC9FEAE076FB223B20C7A2B0E656FA2B5A3E396A361139544D030B54B40334D4DD27CE74F2D29
4,960,908 UART: [art] PUB.Y = 19C3EDA40D89FECC5BBA8E4149152F5355BC97150373A36E206241A2E6D4C144ED297EAA3AAA8508881BCC9C65A3D303
4,967,856 UART: [art] SIG.R = A3A45EFF8BCDFA4F09D0D40799A9DA02A15E1BA2898C9B25D2FA058EF8E06829B735373124B6B48971A4857EB43286D8
4,974,622 UART: [art] SIG.S = 8BF48C86A4E731B48D41136DFAF681528A510AA2F578A34935EFCCD97DA3D5504C42BB40F0F8FF681345DE21A9B760CB
4,998,581 UART: Caliptra RT
4,998,832 UART: [state] CFI Enabled
5,366,508 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,399,865 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
87,040 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
893,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,054 UART: [kat] ++
898,206 UART: [kat] sha1
902,530 UART: [kat] SHA2-256
904,470 UART: [kat] SHA2-384
907,183 UART: [kat] SHA2-512-ACC
909,084 UART: [kat] ECC-384
918,633 UART: [kat] HMAC-384Kdf
923,439 UART: [kat] LMS
1,171,767 UART: [kat] --
1,172,948 UART: [cold-reset] ++
1,173,508 UART: [fht] FHT @ 0x50003400
1,176,307 UART: [idev] ++
1,176,475 UART: [idev] CDI.KEYID = 6
1,176,835 UART: [idev] SUBJECT.KEYID = 7
1,177,259 UART: [idev] UDS.KEYID = 0
1,177,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,447 UART: [idev] Erasing UDS.KEYID = 0
1,202,238 UART: [idev] Sha1 KeyId Algorithm
1,210,802 UART: [idev] --
1,211,634 UART: [ldev] ++
1,211,802 UART: [ldev] CDI.KEYID = 6
1,212,165 UART: [ldev] SUBJECT.KEYID = 5
1,212,591 UART: [ldev] AUTHORITY.KEYID = 7
1,213,054 UART: [ldev] FE.KEYID = 1
1,218,306 UART: [ldev] Erasing FE.KEYID = 1
1,245,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,272 UART: [ldev] --
1,284,583 UART: [fwproc] Wait for Commands...
1,285,171 UART: [fwproc] Recv command 0x46574c44
1,285,899 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,455 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,625 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,782 >>> mbox cmd response: success
3,373,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,374,968 UART: [afmc] ++
3,375,136 UART: [afmc] CDI.KEYID = 6
3,375,498 UART: [afmc] SUBJECT.KEYID = 7
3,375,923 UART: [afmc] AUTHORITY.KEYID = 5
3,412,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,019 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,725 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,440,604 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,314 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,127 UART: [afmc] --
3,455,103 UART: [cold-reset] --
3,455,931 UART: [state] Locking Datavault
3,456,896 UART: [state] Locking PCR0, PCR1 and PCR31
3,457,500 UART: [state] Locking ICCM
3,457,952 UART: [exit] Launching FMC @ 0x40000130
3,463,282 UART:
3,463,298 UART: Running Caliptra FMC ...
3,463,706 UART:
3,463,849 UART: [state] CFI Enabled
3,474,295 UART: [fht] FMC Alias Private Key: 7
3,593,723 UART: [art] Extend RT PCRs Done
3,594,151 UART: [art] Lock RT PCRs Done
3,595,915 UART: [art] Populate DV Done
3,604,102 UART: [fht] FMC Alias Private Key: 7
3,605,162 UART: [art] Derive CDI
3,605,442 UART: [art] Store in slot 0x4
3,690,845 UART: [art] Derive Key Pair
3,691,205 UART: [art] Store priv key in slot 0x5
3,703,941 UART: [art] Derive Key Pair - Done
3,718,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,734,951 UART: [art] PUB.X = 5727366F009DF4ABE7F1338AA9EF702D4255D789EB15FA9B2D6F63697F856400BE40961F0AF7299BB7DA5780F4C72950
3,741,676 UART: [art] PUB.Y = 4B8AE457CE7A5C4C7126CA5AEC9248FFCA805BC8929731743BBCDDACCC2B0CEC464B0D937D1CA0E31524423695C25C26
3,748,638 UART: [art] SIG.R = E8684A4035DC23D460DBDC64C33F1B71029A6E2B9CB9285622A8AAAFD9A00BC1D5912E28FC8225D767BF2080CFF55A48
3,755,414 UART: [art] SIG.S = F6117414BDB086A03AA19892FD6D72B37D24B0C1823429AA277FCA8EEA42122F371EBDDDC5D97965904424C1B562800E
3,779,235 UART: Caliptra RT
3,779,578 UART: [state] CFI Enabled
3,900,525 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,902,585 UART:
3,902,601 UART: Running Caliptra ROM ...
3,903,009 UART:
3,903,151 UART: [state] CFI Enabled
3,906,283 UART: [state] LifecycleState = Unprovisioned
3,906,938 UART: [state] DebugLocked = No
3,907,486 UART: [state] WD Timer not started. Device not locked for debugging
3,908,776 UART: [kat] SHA2-256
4,714,426 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,718,551 UART: [kat] ++
4,718,703 UART: [kat] sha1
4,722,735 UART: [kat] SHA2-256
4,724,675 UART: [kat] SHA2-384
4,727,416 UART: [kat] SHA2-512-ACC
4,729,316 UART: [kat] ECC-384
4,738,809 UART: [kat] HMAC-384Kdf
4,743,529 UART: [kat] LMS
4,991,857 UART: [kat] --
4,992,869 UART: [update-reset] ++
5,011,090 >>> mbox cmd response: failed
5,011,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,011,644 UART: ROM Non-Fatal Error: 0x000B003D
5,012,520 UART: [state] Locking Datavault
5,013,220 UART: [state] Locking PCR0, PCR1 and PCR31
5,013,824 UART: [state] Locking ICCM
5,014,296 UART: [exit] Launching FMC @ 0x40000130
5,019,626 UART:
5,019,642 UART: Running Caliptra FMC ...
5,020,050 UART:
5,020,193 UART: [state] CFI Enabled
5,109,450 UART: [art] Extend RT PCRs Done
5,109,878 UART: [art] Lock RT PCRs Done
5,111,025 UART: [art] Populate DV Done
5,119,486 UART: [fht] FMC Alias Private Key: 7
5,120,648 UART: [art] Derive CDI
5,120,928 UART: [art] Store in slot 0x4
5,206,805 UART: [art] Derive Key Pair
5,207,165 UART: [art] Store priv key in slot 0x5
5,220,953 UART: [art] Derive Key Pair - Done
5,235,851 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,251,152 UART: [art] Erasing AUTHORITY.KEYID = 7
5,251,917 UART: [art] PUB.X = 5727366F009DF4ABE7F1338AA9EF702D4255D789EB15FA9B2D6F63697F856400BE40961F0AF7299BB7DA5780F4C72950
5,258,642 UART: [art] PUB.Y = 4B8AE457CE7A5C4C7126CA5AEC9248FFCA805BC8929731743BBCDDACCC2B0CEC464B0D937D1CA0E31524423695C25C26
5,265,604 UART: [art] SIG.R = E8684A4035DC23D460DBDC64C33F1B71029A6E2B9CB9285622A8AAAFD9A00BC1D5912E28FC8225D767BF2080CFF55A48
5,272,380 UART: [art] SIG.S = F6117414BDB086A03AA19892FD6D72B37D24B0C1823429AA277FCA8EEA42122F371EBDDDC5D97965904424C1B562800E
5,296,181 UART: Caliptra RT
5,296,524 UART: [state] CFI Enabled
5,657,716 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,659,413 UART:
5,659,429 UART: Running Caliptra ROM ...
5,659,837 UART:
5,659,979 UART: [state] CFI Enabled
5,662,397 UART: [state] LifecycleState = Unprovisioned
5,663,052 UART: [state] DebugLocked = No
5,663,720 UART: [state] WD Timer not started. Device not locked for debugging
5,664,970 UART: [kat] SHA2-256
6,470,620 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,474,745 UART: [kat] ++
6,474,897 UART: [kat] sha1
6,479,069 UART: [kat] SHA2-256
6,481,009 UART: [kat] SHA2-384
6,483,704 UART: [kat] SHA2-512-ACC
6,485,604 UART: [kat] ECC-384
6,495,059 UART: [kat] HMAC-384Kdf
6,499,587 UART: [kat] LMS
6,747,915 UART: [kat] --
6,748,929 UART: [update-reset] ++
8,652,371 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,653,446 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
8,808,661 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,210,880 >>> mbox cmd response: success
3,210,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,273,387 UART:
3,273,403 UART: Running Caliptra FMC ...
3,273,811 UART:
3,273,954 UART: [state] CFI Enabled
3,284,674 UART: [fht] FMC Alias Private Key: 7
3,403,152 UART: [art] Extend RT PCRs Done
3,403,580 UART: [art] Lock RT PCRs Done
3,405,362 UART: [art] Populate DV Done
3,413,651 UART: [fht] FMC Alias Private Key: 7
3,414,791 UART: [art] Derive CDI
3,415,071 UART: [art] Store in slot 0x4
3,500,500 UART: [art] Derive Key Pair
3,500,860 UART: [art] Store priv key in slot 0x5
3,514,056 UART: [art] Derive Key Pair - Done
3,528,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,544,558 UART: [art] Erasing AUTHORITY.KEYID = 7
3,545,323 UART: [art] PUB.X = 51B6832BB0C30765E430F50FA57CD678866D129FDA2CBAE13F6EE9087013C5D42DCADEF082954FA17AB03EFA4B4C7AAD
3,552,104 UART: [art] PUB.Y = A3F21521097C3887FBD0DFC80EBFB06ADF5A50FF52B5CB967C48F40F7A546C6EAE5FED2D4CB2A1078DD210C27B61A707
3,559,061 UART: [art] SIG.R = A5D9B91AC8640C1F70773B5C3A8169AD64072C988E851123C46058862B4CAA5461A263B28E05582FA64C517567D6E1D7
3,565,816 UART: [art] SIG.S = B392D36FFBB247952AA77247D67282B8C9CD00B8A22A815A5E1CE8B3BEF56C25057E9B92173AAFC2904B02D57A929682
3,590,210 UART: Caliptra RT
3,590,553 UART: [state] CFI Enabled
3,710,830 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,705,175 >>> mbox cmd response: failed
4,705,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,711,267 UART:
4,711,283 UART: Running Caliptra FMC ...
4,711,691 UART:
4,711,834 UART: [state] CFI Enabled
4,801,209 UART: [art] Extend RT PCRs Done
4,801,637 UART: [art] Lock RT PCRs Done
4,803,118 UART: [art] Populate DV Done
4,811,363 UART: [fht] FMC Alias Private Key: 7
4,812,511 UART: [art] Derive CDI
4,812,791 UART: [art] Store in slot 0x4
4,898,596 UART: [art] Derive Key Pair
4,898,956 UART: [art] Store priv key in slot 0x5
4,912,320 UART: [art] Derive Key Pair - Done
4,927,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,942,646 UART: [art] Erasing AUTHORITY.KEYID = 7
4,943,411 UART: [art] PUB.X = 51B6832BB0C30765E430F50FA57CD678866D129FDA2CBAE13F6EE9087013C5D42DCADEF082954FA17AB03EFA4B4C7AAD
4,950,192 UART: [art] PUB.Y = A3F21521097C3887FBD0DFC80EBFB06ADF5A50FF52B5CB967C48F40F7A546C6EAE5FED2D4CB2A1078DD210C27B61A707
4,957,149 UART: [art] SIG.R = A5D9B91AC8640C1F70773B5C3A8169AD64072C988E851123C46058862B4CAA5461A263B28E05582FA64C517567D6E1D7
4,963,904 UART: [art] SIG.S = B392D36FFBB247952AA77247D67282B8C9CD00B8A22A815A5E1CE8B3BEF56C25057E9B92173AAFC2904B02D57A929682
4,987,786 UART: Caliptra RT
4,988,129 UART: [state] CFI Enabled
5,356,447 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,379,000 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,039 UART:
192,399 UART: Running Caliptra ROM ...
193,568 UART:
193,716 UART: [state] CFI Enabled
261,141 UART: [state] LifecycleState = Unprovisioned
263,019 UART: [state] DebugLocked = No
265,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,487 UART: [kat] SHA2-256
439,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,700 UART: [kat] ++
450,154 UART: [kat] sha1
461,578 UART: [kat] SHA2-256
464,270 UART: [kat] SHA2-384
469,553 UART: [kat] SHA2-512-ACC
471,891 UART: [kat] ECC-384
2,760,182 UART: [kat] HMAC-384Kdf
2,775,233 UART: [kat] LMS
3,965,567 UART: [kat] --
3,969,154 UART: [cold-reset] ++
3,971,524 UART: [fht] Storing FHT @ 0x50003400
3,983,173 UART: [idev] ++
3,983,742 UART: [idev] CDI.KEYID = 6
3,984,705 UART: [idev] SUBJECT.KEYID = 7
3,985,920 UART: [idev] UDS.KEYID = 0
3,988,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,373 UART: [idev] Erasing UDS.KEYID = 0
7,323,298 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,434 UART: [idev] --
7,349,364 UART: [ldev] ++
7,349,936 UART: [ldev] CDI.KEYID = 6
7,350,953 UART: [ldev] SUBJECT.KEYID = 5
7,352,120 UART: [ldev] AUTHORITY.KEYID = 7
7,353,306 UART: [ldev] FE.KEYID = 1
7,397,988 UART: [ldev] Erasing FE.KEYID = 1
10,732,282 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,815 UART: [ldev] --
13,094,549 UART: [fwproc] Waiting for Commands...
13,096,221 UART: [fwproc] Received command 0x46574c44
13,098,416 UART: [fwproc] Received Image of size 118548 bytes
14,488,410 UART: ROM Fatal Error: 0x000B000D
14,491,847 >>> mbox cmd response: failed
14,492,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,492,664 >>> mbox cmd response: failed
14,492,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,493,238 >>> mbox cmd response: failed
Initializing fuses
2,056,182 writing to cptra_bootfsm_go
2,245,491 UART:
2,245,847 UART: Running Caliptra ROM ...
2,246,987 UART:
2,247,156 UART: [state] CFI Enabled
2,321,808 UART: [state] LifecycleState = Unprovisioned
2,323,749 UART: [state] DebugLocked = No
2,325,685 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,330,679 UART: [kat] SHA2-256
2,500,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,510,897 UART: [kat] ++
2,511,395 UART: [kat] sha1
2,523,636 UART: [kat] SHA2-256
2,526,333 UART: [kat] SHA2-384
2,531,540 UART: [kat] SHA2-512-ACC
2,533,955 UART: [kat] ECC-384
4,825,277 UART: [kat] HMAC-384Kdf
4,855,827 UART: [kat] LMS
6,046,106 UART: [kat] --
6,051,339 UART: [cold-reset] ++
6,053,873 UART: [fht] Storing FHT @ 0x50003400
6,066,821 UART: [idev] ++
6,067,388 UART: [idev] CDI.KEYID = 6
6,068,353 UART: [idev] SUBJECT.KEYID = 7
6,069,573 UART: [idev] UDS.KEYID = 0
6,072,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,221,200 UART: [idev] Erasing UDS.KEYID = 0
9,405,829 UART: [idev] Using Sha1 for KeyId Algorithm
9,427,327 UART: [idev] --
9,431,866 UART: [ldev] ++
9,432,511 UART: [ldev] CDI.KEYID = 6
9,433,398 UART: [ldev] SUBJECT.KEYID = 5
9,434,678 UART: [ldev] AUTHORITY.KEYID = 7
9,435,921 UART: [ldev] FE.KEYID = 1
9,479,470 UART: [ldev] Erasing FE.KEYID = 1
12,816,618 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,128,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,143,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,158,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,172,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,192,206 UART: [ldev] --
15,197,638 UART: [fwproc] Waiting for Commands...
15,199,302 UART: [fwproc] Received command 0x46574c44
15,201,501 UART: [fwproc] Received Image of size 118548 bytes
19,311,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,389,670 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,462,886 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,791,720 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
3,781,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,231,522 >>> mbox cmd response: failed
14,232,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,232,516 >>> mbox cmd response: failed
14,232,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,233,047 >>> mbox cmd response: failed
Initializing fuses
2,065,975 writing to cptra_bootfsm_go
5,846,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,005,191 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
192,628 UART:
192,991 UART: Running Caliptra ROM ...
194,180 UART:
603,966 UART: [state] CFI Enabled
620,032 UART: [state] LifecycleState = Unprovisioned
621,992 UART: [state] DebugLocked = No
624,079 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,500 UART: [kat] SHA2-256
799,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,772 UART: [kat] ++
810,256 UART: [kat] sha1
820,919 UART: [kat] SHA2-256
823,612 UART: [kat] SHA2-384
828,675 UART: [kat] SHA2-512-ACC
831,024 UART: [kat] ECC-384
3,114,081 UART: [kat] HMAC-384Kdf
3,126,144 UART: [kat] LMS
4,316,243 UART: [kat] --
4,322,215 UART: [cold-reset] ++
4,324,378 UART: [fht] Storing FHT @ 0x50003400
4,335,271 UART: [idev] ++
4,335,898 UART: [idev] CDI.KEYID = 6
4,336,813 UART: [idev] SUBJECT.KEYID = 7
4,338,035 UART: [idev] UDS.KEYID = 0
4,341,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,301 UART: [idev] Erasing UDS.KEYID = 0
7,624,807 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,707 UART: [idev] --
7,652,762 UART: [ldev] ++
7,653,347 UART: [ldev] CDI.KEYID = 6
7,654,238 UART: [ldev] SUBJECT.KEYID = 5
7,655,515 UART: [ldev] AUTHORITY.KEYID = 7
7,656,779 UART: [ldev] FE.KEYID = 1
7,667,897 UART: [ldev] Erasing FE.KEYID = 1
10,955,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,852 UART: [ldev] --
13,316,575 UART: [fwproc] Waiting for Commands...
13,319,692 UART: [fwproc] Received command 0x46574c44
13,321,889 UART: [fwproc] Received Image of size 118548 bytes
14,710,370 UART: ROM Fatal Error: 0x000B000D
14,713,878 >>> mbox cmd response: failed
14,714,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,714,580 >>> mbox cmd response: failed
14,714,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,715,193 >>> mbox cmd response: failed
Initializing fuses
2,064,193 writing to cptra_bootfsm_go
2,253,472 UART:
2,253,810 UART: Running Caliptra ROM ...
2,254,864 UART:
5,736,835 UART: [state] CFI Enabled
5,749,287 UART: [state] LifecycleState = Unprovisioned
5,751,204 UART: [state] DebugLocked = No
5,753,420 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,758,991 UART: [kat] SHA2-256
5,928,743 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,939,254 UART: [kat] ++
5,939,715 UART: [kat] sha1
5,950,034 UART: [kat] SHA2-256
5,952,750 UART: [kat] SHA2-384
5,959,398 UART: [kat] SHA2-512-ACC
5,961,733 UART: [kat] ECC-384
8,245,794 UART: [kat] HMAC-384Kdf
8,258,570 UART: [kat] LMS
9,448,658 UART: [kat] --
9,453,003 UART: [cold-reset] ++
9,454,469 UART: [fht] Storing FHT @ 0x50003400
9,465,314 UART: [idev] ++
9,465,885 UART: [idev] CDI.KEYID = 6
9,466,799 UART: [idev] SUBJECT.KEYID = 7
9,468,076 UART: [idev] UDS.KEYID = 0
9,470,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,619,424 UART: [idev] Erasing UDS.KEYID = 0
12,754,957 UART: [idev] Using Sha1 for KeyId Algorithm
12,777,263 UART: [idev] --
12,781,558 UART: [ldev] ++
12,782,145 UART: [ldev] CDI.KEYID = 6
12,783,061 UART: [ldev] SUBJECT.KEYID = 5
12,784,322 UART: [ldev] AUTHORITY.KEYID = 7
12,785,567 UART: [ldev] FE.KEYID = 1
12,797,949 UART: [ldev] Erasing FE.KEYID = 1
16,085,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,376,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,390,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,405,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,419,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,438,851 UART: [ldev] --
18,443,155 UART: [fwproc] Waiting for Commands...
18,446,277 UART: [fwproc] Received command 0x46574c44
18,448,478 UART: [fwproc] Received Image of size 118548 bytes
22,558,572 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,628,487 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,701,671 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,030,965 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,131,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,465,606 >>> mbox cmd response: failed
14,466,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,466,624 >>> mbox cmd response: failed
14,466,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,467,195 >>> mbox cmd response: failed
Initializing fuses
2,061,208 writing to cptra_bootfsm_go
9,516,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,531,210 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,153 UART:
192,533 UART: Running Caliptra ROM ...
193,745 UART:
193,907 UART: [state] CFI Enabled
260,756 UART: [state] LifecycleState = Unprovisioned
262,764 UART: [state] DebugLocked = No
264,106 UART: [state] WD Timer not started. Device not locked for debugging
267,108 UART: [kat] SHA2-256
446,724 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,504 UART: [kat] ++
457,991 UART: [kat] sha1
469,734 UART: [kat] SHA2-256
472,439 UART: [kat] SHA2-384
478,372 UART: [kat] SHA2-512-ACC
480,717 UART: [kat] ECC-384
2,945,554 UART: [kat] HMAC-384Kdf
2,968,328 UART: [kat] LMS
3,444,824 UART: [kat] --
3,451,389 UART: [cold-reset] ++
3,453,336 UART: [fht] FHT @ 0x50003400
3,464,987 UART: [idev] ++
3,465,566 UART: [idev] CDI.KEYID = 6
3,466,462 UART: [idev] SUBJECT.KEYID = 7
3,467,740 UART: [idev] UDS.KEYID = 0
3,470,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,778 UART: [idev] Erasing UDS.KEYID = 0
5,986,524 UART: [idev] Sha1 KeyId Algorithm
6,010,249 UART: [idev] --
6,015,949 UART: [ldev] ++
6,016,565 UART: [ldev] CDI.KEYID = 6
6,017,461 UART: [ldev] SUBJECT.KEYID = 5
6,018,690 UART: [ldev] AUTHORITY.KEYID = 7
6,019,936 UART: [ldev] FE.KEYID = 1
6,054,331 UART: [ldev] Erasing FE.KEYID = 1
8,562,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,129 UART: [ldev] --
10,369,918 UART: [fwproc] Wait for Commands...
10,372,504 UART: [fwproc] Recv command 0x46574c44
10,374,551 UART: [fwproc] Recv'd Img size: 118548 bytes
11,453,998 UART: ROM Fatal Error: 0x000B000D
11,457,246 >>> mbox cmd response: failed
11,457,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,457,888 >>> mbox cmd response: failed
11,458,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,458,516 >>> mbox cmd response: failed
Initializing fuses
2,067,535 writing to cptra_bootfsm_go
2,256,880 UART:
2,257,237 UART: Running Caliptra ROM ...
2,258,371 UART:
2,258,541 UART: [state] CFI Enabled
2,324,725 UART: [state] LifecycleState = Unprovisioned
2,326,659 UART: [state] DebugLocked = No
2,329,623 UART: [state] WD Timer not started. Device not locked for debugging
2,334,055 UART: [kat] SHA2-256
2,513,694 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,524,471 UART: [kat] ++
2,525,026 UART: [kat] sha1
2,536,146 UART: [kat] SHA2-256
2,538,838 UART: [kat] SHA2-384
2,544,295 UART: [kat] SHA2-512-ACC
2,546,657 UART: [kat] ECC-384
5,010,521 UART: [kat] HMAC-384Kdf
5,033,286 UART: [kat] LMS
5,509,795 UART: [kat] --
5,513,863 UART: [cold-reset] ++
5,515,335 UART: [fht] FHT @ 0x50003400
5,526,515 UART: [idev] ++
5,527,099 UART: [idev] CDI.KEYID = 6
5,528,131 UART: [idev] SUBJECT.KEYID = 7
5,529,318 UART: [idev] UDS.KEYID = 0
5,531,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,680,794 UART: [idev] Erasing UDS.KEYID = 0
8,051,699 UART: [idev] Sha1 KeyId Algorithm
8,075,955 UART: [idev] --
8,081,065 UART: [ldev] ++
8,081,664 UART: [ldev] CDI.KEYID = 6
8,082,587 UART: [ldev] SUBJECT.KEYID = 5
8,083,812 UART: [ldev] AUTHORITY.KEYID = 7
8,085,049 UART: [ldev] FE.KEYID = 1
8,120,170 UART: [ldev] Erasing FE.KEYID = 1
10,626,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,363,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,379,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,395,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,410,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,432,370 UART: [ldev] --
12,438,675 UART: [fwproc] Wait for Commands...
12,440,894 UART: [fwproc] Recv command 0x46574c44
12,442,894 UART: [fwproc] Recv'd Img size: 118548 bytes
15,927,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,004,104 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,077,131 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,405,028 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,463,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,364,395 >>> mbox cmd response: failed
11,365,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,365,424 >>> mbox cmd response: failed
11,365,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,366,084 >>> mbox cmd response: failed
Initializing fuses
2,065,666 writing to cptra_bootfsm_go
5,511,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,268,982 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,538 writing to cptra_bootfsm_go
192,819 UART:
193,171 UART: Running Caliptra ROM ...
194,405 UART:
603,980 UART: [state] CFI Enabled
616,622 UART: [state] LifecycleState = Unprovisioned
618,518 UART: [state] DebugLocked = No
619,958 UART: [state] WD Timer not started. Device not locked for debugging
623,434 UART: [kat] SHA2-256
803,118 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,888 UART: [kat] ++
814,340 UART: [kat] sha1
824,271 UART: [kat] SHA2-256
826,972 UART: [kat] SHA2-384
832,103 UART: [kat] SHA2-512-ACC
834,470 UART: [kat] ECC-384
3,277,260 UART: [kat] HMAC-384Kdf
3,289,231 UART: [kat] LMS
3,765,732 UART: [kat] --
3,769,200 UART: [cold-reset] ++
3,771,091 UART: [fht] FHT @ 0x50003400
3,781,917 UART: [idev] ++
3,782,497 UART: [idev] CDI.KEYID = 6
3,783,519 UART: [idev] SUBJECT.KEYID = 7
3,784,684 UART: [idev] UDS.KEYID = 0
3,787,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,634 UART: [idev] Erasing UDS.KEYID = 0
6,263,087 UART: [idev] Sha1 KeyId Algorithm
6,287,026 UART: [idev] --
6,290,810 UART: [ldev] ++
6,291,389 UART: [ldev] CDI.KEYID = 6
6,292,320 UART: [ldev] SUBJECT.KEYID = 5
6,293,489 UART: [ldev] AUTHORITY.KEYID = 7
6,294,788 UART: [ldev] FE.KEYID = 1
6,305,422 UART: [ldev] Erasing FE.KEYID = 1
8,786,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,508 UART: [ldev] --
10,579,132 UART: [fwproc] Wait for Commands...
10,581,286 UART: [fwproc] Recv command 0x46574c44
10,583,280 UART: [fwproc] Recv'd Img size: 118548 bytes
11,659,905 UART: ROM Fatal Error: 0x000B000D
11,663,167 >>> mbox cmd response: failed
11,663,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,663,866 >>> mbox cmd response: failed
11,664,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,664,483 >>> mbox cmd response: failed
Initializing fuses
2,066,531 writing to cptra_bootfsm_go
2,255,892 UART:
2,256,247 UART: Running Caliptra ROM ...
2,257,387 UART:
8,787,208 UART: [state] CFI Enabled
8,802,361 UART: [state] LifecycleState = Unprovisioned
8,804,314 UART: [state] DebugLocked = No
8,806,929 UART: [state] WD Timer not started. Device not locked for debugging
8,810,030 UART: [kat] SHA2-256
8,989,664 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,000,452 UART: [kat] ++
9,000,922 UART: [kat] sha1
9,011,389 UART: [kat] SHA2-256
9,014,093 UART: [kat] SHA2-384
9,019,770 UART: [kat] SHA2-512-ACC
9,022,131 UART: [kat] ECC-384
11,465,281 UART: [kat] HMAC-384Kdf
11,476,428 UART: [kat] LMS
11,952,937 UART: [kat] --
11,958,668 UART: [cold-reset] ++
11,959,742 UART: [fht] FHT @ 0x50003400
11,969,972 UART: [idev] ++
11,970,546 UART: [idev] CDI.KEYID = 6
11,971,515 UART: [idev] SUBJECT.KEYID = 7
11,972,734 UART: [idev] UDS.KEYID = 0
11,975,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,124,324 UART: [idev] Erasing UDS.KEYID = 0
14,452,728 UART: [idev] Sha1 KeyId Algorithm
14,475,092 UART: [idev] --
14,479,623 UART: [ldev] ++
14,480,227 UART: [ldev] CDI.KEYID = 6
14,481,122 UART: [ldev] SUBJECT.KEYID = 5
14,482,343 UART: [ldev] AUTHORITY.KEYID = 7
14,483,580 UART: [ldev] FE.KEYID = 1
14,495,901 UART: [ldev] Erasing FE.KEYID = 1
16,977,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,697,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,713,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,729,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,744,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,766,673 UART: [ldev] --
18,772,704 UART: [fwproc] Wait for Commands...
18,774,933 UART: [fwproc] Recv command 0x46574c44
18,776,979 UART: [fwproc] Recv'd Img size: 118548 bytes
22,258,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,335,213 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,408,231 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,737,084 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,782,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,562,425 >>> mbox cmd response: failed
11,563,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,563,446 >>> mbox cmd response: failed
11,563,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,564,007 >>> mbox cmd response: failed
Initializing fuses
2,060,598 writing to cptra_bootfsm_go
12,062,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,730,071 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,252 UART:
192,634 UART: Running Caliptra ROM ...
193,843 UART:
193,999 UART: [state] CFI Enabled
262,795 UART: [state] LifecycleState = Unprovisioned
265,220 UART: [state] DebugLocked = No
266,687 UART: [state] WD Timer not started. Device not locked for debugging
271,398 UART: [kat] SHA2-256
461,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,030 UART: [kat] ++
472,491 UART: [kat] sha1
483,647 UART: [kat] SHA2-256
486,667 UART: [kat] SHA2-384
492,989 UART: [kat] SHA2-512-ACC
495,557 UART: [kat] ECC-384
2,944,427 UART: [kat] HMAC-384Kdf
2,966,720 UART: [kat] LMS
3,498,477 UART: [kat] --
3,505,302 UART: [cold-reset] ++
3,507,510 UART: [fht] FHT @ 0x50003400
3,518,782 UART: [idev] ++
3,519,477 UART: [idev] CDI.KEYID = 6
3,520,421 UART: [idev] SUBJECT.KEYID = 7
3,521,637 UART: [idev] UDS.KEYID = 0
3,524,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,634 UART: [idev] Erasing UDS.KEYID = 0
6,043,945 UART: [idev] Sha1 KeyId Algorithm
6,066,285 UART: [idev] --
6,071,381 UART: [ldev] ++
6,072,113 UART: [ldev] CDI.KEYID = 6
6,073,042 UART: [ldev] SUBJECT.KEYID = 5
6,074,165 UART: [ldev] AUTHORITY.KEYID = 7
6,075,354 UART: [ldev] FE.KEYID = 1
6,115,768 UART: [ldev] Erasing FE.KEYID = 1
8,619,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,358,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,373,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,388,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,403,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,424,728 UART: [ldev] --
10,430,052 UART: [fwproc] Wait for Commands...
10,432,597 UART: [fwproc] Recv command 0x46574c44
10,434,865 UART: [fwproc] Recv'd Img size: 118548 bytes
11,529,275 UART: ROM Fatal Error: 0x000B000D
11,532,940 >>> mbox cmd response: failed
11,533,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,533,700 >>> mbox cmd response: failed
11,533,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,534,271 >>> mbox cmd response: failed
Initializing fuses
2,068,715 writing to cptra_bootfsm_go
2,258,019 UART:
2,258,361 UART: Running Caliptra ROM ...
2,259,498 UART:
2,259,670 UART: [state] CFI Enabled
2,330,220 UART: [state] LifecycleState = Unprovisioned
2,332,600 UART: [state] DebugLocked = No
2,334,544 UART: [state] WD Timer not started. Device not locked for debugging
2,338,369 UART: [kat] SHA2-256
2,528,215 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,539,038 UART: [kat] ++
2,539,541 UART: [kat] sha1
2,550,988 UART: [kat] SHA2-256
2,554,012 UART: [kat] SHA2-384
2,560,237 UART: [kat] SHA2-512-ACC
2,562,815 UART: [kat] ECC-384
5,016,837 UART: [kat] HMAC-384Kdf
5,039,606 UART: [kat] LMS
5,571,379 UART: [kat] --
5,577,161 UART: [cold-reset] ++
5,579,504 UART: [fht] FHT @ 0x50003400
5,590,881 UART: [idev] ++
5,591,564 UART: [idev] CDI.KEYID = 6
5,592,591 UART: [idev] SUBJECT.KEYID = 7
5,593,758 UART: [idev] UDS.KEYID = 0
5,596,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,745,215 UART: [idev] Erasing UDS.KEYID = 0
8,121,171 UART: [idev] Sha1 KeyId Algorithm
8,143,989 UART: [idev] --
8,147,646 UART: [ldev] ++
8,148,344 UART: [ldev] CDI.KEYID = 6
8,149,258 UART: [ldev] SUBJECT.KEYID = 5
8,150,443 UART: [ldev] AUTHORITY.KEYID = 7
8,151,626 UART: [ldev] FE.KEYID = 1
8,189,391 UART: [ldev] Erasing FE.KEYID = 1
10,696,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,431,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,446,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,461,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,476,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,497,834 UART: [ldev] --
12,502,835 UART: [fwproc] Wait for Commands...
12,505,380 UART: [fwproc] Recv command 0x46574c44
12,507,708 UART: [fwproc] Recv'd Img size: 118548 bytes
16,001,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,079,962 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,203,590 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,762,991 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,415,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,272,686 >>> mbox cmd response: failed
11,273,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,273,795 >>> mbox cmd response: failed
11,274,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,274,371 >>> mbox cmd response: failed
Initializing fuses
2,061,825 writing to cptra_bootfsm_go
5,493,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,875,479 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,581 UART:
192,949 UART: Running Caliptra ROM ...
194,063 UART:
603,797 UART: [state] CFI Enabled
620,491 UART: [state] LifecycleState = Unprovisioned
622,892 UART: [state] DebugLocked = No
625,755 UART: [state] WD Timer not started. Device not locked for debugging
630,968 UART: [kat] SHA2-256
820,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,629 UART: [kat] ++
832,228 UART: [kat] sha1
845,010 UART: [kat] SHA2-256
848,027 UART: [kat] SHA2-384
853,908 UART: [kat] SHA2-512-ACC
856,525 UART: [kat] ECC-384
3,300,490 UART: [kat] HMAC-384Kdf
3,314,831 UART: [kat] LMS
3,846,669 UART: [kat] --
3,849,751 UART: [cold-reset] ++
3,851,592 UART: [fht] FHT @ 0x50003400
3,862,901 UART: [idev] ++
3,863,624 UART: [idev] CDI.KEYID = 6
3,864,564 UART: [idev] SUBJECT.KEYID = 7
3,865,734 UART: [idev] UDS.KEYID = 0
3,868,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,017,653 UART: [idev] Erasing UDS.KEYID = 0
6,341,583 UART: [idev] Sha1 KeyId Algorithm
6,364,442 UART: [idev] --
6,369,841 UART: [ldev] ++
6,370,529 UART: [ldev] CDI.KEYID = 6
6,371,439 UART: [ldev] SUBJECT.KEYID = 5
6,372,658 UART: [ldev] AUTHORITY.KEYID = 7
6,373,837 UART: [ldev] FE.KEYID = 1
6,384,596 UART: [ldev] Erasing FE.KEYID = 1
8,863,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,970 UART: [ldev] --
10,654,869 UART: [fwproc] Wait for Commands...
10,657,017 UART: [fwproc] Recv command 0x46574c44
10,659,300 UART: [fwproc] Recv'd Img size: 118548 bytes
11,756,839 UART: ROM Fatal Error: 0x000B000D
11,760,456 >>> mbox cmd response: failed
11,760,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,761,220 >>> mbox cmd response: failed
11,761,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,761,799 >>> mbox cmd response: failed
Initializing fuses
2,068,699 writing to cptra_bootfsm_go
2,258,053 UART:
2,258,438 UART: Running Caliptra ROM ...
2,259,534 UART:
8,691,237 UART: [state] CFI Enabled
8,709,081 UART: [state] LifecycleState = Unprovisioned
8,711,510 UART: [state] DebugLocked = No
8,713,719 UART: [state] WD Timer not started. Device not locked for debugging
8,718,750 UART: [kat] SHA2-256
8,908,616 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,919,422 UART: [kat] ++
8,919,949 UART: [kat] sha1
8,930,736 UART: [kat] SHA2-256
8,933,711 UART: [kat] SHA2-384
8,938,899 UART: [kat] SHA2-512-ACC
8,941,473 UART: [kat] ECC-384
11,379,475 UART: [kat] HMAC-384Kdf
11,393,066 UART: [kat] LMS
11,924,883 UART: [kat] --
11,929,107 UART: [cold-reset] ++
11,931,206 UART: [fht] FHT @ 0x50003400
11,942,718 UART: [idev] ++
11,943,407 UART: [idev] CDI.KEYID = 6
11,944,430 UART: [idev] SUBJECT.KEYID = 7
11,945,592 UART: [idev] UDS.KEYID = 0
11,947,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,096,928 UART: [idev] Erasing UDS.KEYID = 0
14,418,935 UART: [idev] Sha1 KeyId Algorithm
14,441,197 UART: [idev] --
14,446,802 UART: [ldev] ++
14,447,484 UART: [ldev] CDI.KEYID = 6
14,448,396 UART: [ldev] SUBJECT.KEYID = 5
14,449,617 UART: [ldev] AUTHORITY.KEYID = 7
14,450,798 UART: [ldev] FE.KEYID = 1
14,461,742 UART: [ldev] Erasing FE.KEYID = 1
16,942,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,664,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,679,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,694,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,709,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,729,077 UART: [ldev] --
18,735,374 UART: [fwproc] Wait for Commands...
18,738,490 UART: [fwproc] Recv command 0x46574c44
18,740,821 UART: [fwproc] Recv'd Img size: 118548 bytes
22,237,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,314,074 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,437,668 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,998,629 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,673 writing to cptra_bootfsm_go
3,762,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,538,327 >>> mbox cmd response: failed
11,538,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,539,222 >>> mbox cmd response: failed
11,539,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,539,803 >>> mbox cmd response: failed
Initializing fuses
2,060,809 writing to cptra_bootfsm_go
12,068,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,355,612 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,295 UART: [kat] SHA2-256
882,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,341 UART: [kat] ++
886,493 UART: [kat] sha1
890,667 UART: [kat] SHA2-256
892,605 UART: [kat] SHA2-384
895,386 UART: [kat] SHA2-512-ACC
897,287 UART: [kat] ECC-384
902,894 UART: [kat] HMAC-384Kdf
907,396 UART: [kat] LMS
1,475,592 UART: [kat] --
1,476,461 UART: [cold-reset] ++
1,476,973 UART: [fht] Storing FHT @ 0x50003400
1,479,760 UART: [idev] ++
1,479,928 UART: [idev] CDI.KEYID = 6
1,480,288 UART: [idev] SUBJECT.KEYID = 7
1,480,712 UART: [idev] UDS.KEYID = 0
1,481,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,256 UART: [idev] Erasing UDS.KEYID = 0
1,505,672 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,362 UART: [idev] --
1,515,299 UART: [ldev] ++
1,515,467 UART: [ldev] CDI.KEYID = 6
1,515,830 UART: [ldev] SUBJECT.KEYID = 5
1,516,256 UART: [ldev] AUTHORITY.KEYID = 7
1,516,719 UART: [ldev] FE.KEYID = 1
1,522,227 UART: [ldev] Erasing FE.KEYID = 1
1,547,580 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,746 UART: [ldev] --
1,587,137 UART: [fwproc] Waiting for Commands...
1,588,004 UART: [fwproc] Received command 0x46574c44
1,588,795 UART: [fwproc] Received Image of size 118548 bytes
1,626,652 UART: ROM Fatal Error: 0x000B000D
1,627,811 >>> mbox cmd response: failed
1,627,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,817 >>> mbox cmd response: failed
1,627,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,823 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,089 UART: [kat] SHA2-256
882,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,135 UART: [kat] ++
886,287 UART: [kat] sha1
890,683 UART: [kat] SHA2-256
892,621 UART: [kat] SHA2-384
895,412 UART: [kat] SHA2-512-ACC
897,313 UART: [kat] ECC-384
903,010 UART: [kat] HMAC-384Kdf
907,434 UART: [kat] LMS
1,475,630 UART: [kat] --
1,476,125 UART: [cold-reset] ++
1,476,527 UART: [fht] Storing FHT @ 0x50003400
1,479,436 UART: [idev] ++
1,479,604 UART: [idev] CDI.KEYID = 6
1,479,964 UART: [idev] SUBJECT.KEYID = 7
1,480,388 UART: [idev] UDS.KEYID = 0
1,480,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,732 UART: [idev] Erasing UDS.KEYID = 0
1,505,206 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,912 UART: [idev] --
1,514,993 UART: [ldev] ++
1,515,161 UART: [ldev] CDI.KEYID = 6
1,515,524 UART: [ldev] SUBJECT.KEYID = 5
1,515,950 UART: [ldev] AUTHORITY.KEYID = 7
1,516,413 UART: [ldev] FE.KEYID = 1
1,521,417 UART: [ldev] Erasing FE.KEYID = 1
1,546,544 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,454 UART: [ldev] --
1,585,839 UART: [fwproc] Waiting for Commands...
1,586,634 UART: [fwproc] Received command 0x46574c44
1,587,425 UART: [fwproc] Received Image of size 118548 bytes
2,931,208 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,192 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,410 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,699 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,478,548 >>> mbox cmd response: failed
1,478,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,554 >>> mbox cmd response: failed
1,478,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,543 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,887 UART: [state] LifecycleState = Unprovisioned
86,542 UART: [state] DebugLocked = No
87,024 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,664 UART: [kat] SHA2-256
882,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,710 UART: [kat] ++
886,862 UART: [kat] sha1
891,068 UART: [kat] SHA2-256
893,006 UART: [kat] SHA2-384
895,989 UART: [kat] SHA2-512-ACC
897,890 UART: [kat] ECC-384
903,515 UART: [kat] HMAC-384Kdf
908,143 UART: [kat] LMS
1,476,339 UART: [kat] --
1,477,244 UART: [cold-reset] ++
1,477,742 UART: [fht] Storing FHT @ 0x50003400
1,480,451 UART: [idev] ++
1,480,619 UART: [idev] CDI.KEYID = 6
1,480,979 UART: [idev] SUBJECT.KEYID = 7
1,481,403 UART: [idev] UDS.KEYID = 0
1,481,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,277 UART: [idev] Erasing UDS.KEYID = 0
1,505,821 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,531 UART: [idev] --
1,515,626 UART: [ldev] ++
1,515,794 UART: [ldev] CDI.KEYID = 6
1,516,157 UART: [ldev] SUBJECT.KEYID = 5
1,516,583 UART: [ldev] AUTHORITY.KEYID = 7
1,517,046 UART: [ldev] FE.KEYID = 1
1,522,520 UART: [ldev] Erasing FE.KEYID = 1
1,547,939 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,727 UART: [ldev] --
1,587,202 UART: [fwproc] Waiting for Commands...
1,587,873 UART: [fwproc] Received command 0x46574c44
1,588,664 UART: [fwproc] Received Image of size 118548 bytes
1,626,801 UART: ROM Fatal Error: 0x000B000D
1,627,960 >>> mbox cmd response: failed
1,627,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,966 >>> mbox cmd response: failed
1,627,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,972 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,212 UART: [kat] SHA2-256
882,143 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,258 UART: [kat] ++
886,410 UART: [kat] sha1
890,508 UART: [kat] SHA2-256
892,446 UART: [kat] SHA2-384
895,205 UART: [kat] SHA2-512-ACC
897,106 UART: [kat] ECC-384
902,507 UART: [kat] HMAC-384Kdf
907,309 UART: [kat] LMS
1,475,505 UART: [kat] --
1,476,410 UART: [cold-reset] ++
1,476,782 UART: [fht] Storing FHT @ 0x50003400
1,479,521 UART: [idev] ++
1,479,689 UART: [idev] CDI.KEYID = 6
1,480,049 UART: [idev] SUBJECT.KEYID = 7
1,480,473 UART: [idev] UDS.KEYID = 0
1,480,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,439 UART: [idev] Erasing UDS.KEYID = 0
1,504,977 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,535 UART: [idev] --
1,514,440 UART: [ldev] ++
1,514,608 UART: [ldev] CDI.KEYID = 6
1,514,971 UART: [ldev] SUBJECT.KEYID = 5
1,515,397 UART: [ldev] AUTHORITY.KEYID = 7
1,515,860 UART: [ldev] FE.KEYID = 1
1,520,958 UART: [ldev] Erasing FE.KEYID = 1
1,546,263 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,021 UART: [ldev] --
1,585,498 UART: [fwproc] Waiting for Commands...
1,586,257 UART: [fwproc] Received command 0x46574c44
1,587,048 UART: [fwproc] Received Image of size 118548 bytes
2,932,389 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,497 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,715 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,998 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,478,763 >>> mbox cmd response: failed
1,478,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,769 >>> mbox cmd response: failed
1,478,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,364,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,368 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,704 UART: [state] LifecycleState = Unprovisioned
85,359 UART: [state] DebugLocked = No
86,057 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
890,774 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,878 UART: [kat] ++
895,030 UART: [kat] sha1
899,476 UART: [kat] SHA2-256
901,416 UART: [kat] SHA2-384
904,285 UART: [kat] SHA2-512-ACC
906,186 UART: [kat] ECC-384
916,401 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,170,108 UART: [cold-reset] ++
1,170,604 UART: [fht] FHT @ 0x50003400
1,173,270 UART: [idev] ++
1,173,438 UART: [idev] CDI.KEYID = 6
1,173,799 UART: [idev] SUBJECT.KEYID = 7
1,174,224 UART: [idev] UDS.KEYID = 0
1,174,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,041 UART: [idev] Erasing UDS.KEYID = 0
1,199,391 UART: [idev] Sha1 KeyId Algorithm
1,208,163 UART: [idev] --
1,209,154 UART: [ldev] ++
1,209,322 UART: [ldev] CDI.KEYID = 6
1,209,686 UART: [ldev] SUBJECT.KEYID = 5
1,210,113 UART: [ldev] AUTHORITY.KEYID = 7
1,210,576 UART: [ldev] FE.KEYID = 1
1,215,702 UART: [ldev] Erasing FE.KEYID = 1
1,241,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,514 UART: [ldev] --
1,280,889 UART: [fwproc] Wait for Commands...
1,281,648 UART: [fwproc] Recv command 0x46574c44
1,282,381 UART: [fwproc] Recv'd Img size: 118548 bytes
1,319,479 UART: ROM Fatal Error: 0x000B000D
1,320,638 >>> mbox cmd response: failed
1,320,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,644 >>> mbox cmd response: failed
1,320,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,444 UART: [kat] SHA2-256
901,384 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
915,467 UART: [kat] HMAC-384Kdf
920,051 UART: [kat] LMS
1,168,363 UART: [kat] --
1,169,328 UART: [cold-reset] ++
1,169,784 UART: [fht] FHT @ 0x50003400
1,172,574 UART: [idev] ++
1,172,742 UART: [idev] CDI.KEYID = 6
1,173,103 UART: [idev] SUBJECT.KEYID = 7
1,173,528 UART: [idev] UDS.KEYID = 0
1,173,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,509 UART: [idev] Erasing UDS.KEYID = 0
1,198,551 UART: [idev] Sha1 KeyId Algorithm
1,207,261 UART: [idev] --
1,208,360 UART: [ldev] ++
1,208,528 UART: [ldev] CDI.KEYID = 6
1,208,892 UART: [ldev] SUBJECT.KEYID = 5
1,209,319 UART: [ldev] AUTHORITY.KEYID = 7
1,209,782 UART: [ldev] FE.KEYID = 1
1,215,076 UART: [ldev] Erasing FE.KEYID = 1
1,241,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,226 UART: [ldev] --
1,280,507 UART: [fwproc] Wait for Commands...
1,281,252 UART: [fwproc] Recv command 0x46574c44
1,281,985 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,748 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,923 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,220 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,438 >>> mbox cmd response: failed
1,177,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,444 >>> mbox cmd response: failed
1,177,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,450 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,127 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
891,377 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
900,047 UART: [kat] SHA2-256
901,987 UART: [kat] SHA2-384
904,904 UART: [kat] SHA2-512-ACC
906,805 UART: [kat] ECC-384
916,384 UART: [kat] HMAC-384Kdf
921,050 UART: [kat] LMS
1,169,362 UART: [kat] --
1,170,009 UART: [cold-reset] ++
1,170,573 UART: [fht] FHT @ 0x50003400
1,173,427 UART: [idev] ++
1,173,595 UART: [idev] CDI.KEYID = 6
1,173,956 UART: [idev] SUBJECT.KEYID = 7
1,174,381 UART: [idev] UDS.KEYID = 0
1,174,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,540 UART: [idev] Erasing UDS.KEYID = 0
1,199,892 UART: [idev] Sha1 KeyId Algorithm
1,208,846 UART: [idev] --
1,209,747 UART: [ldev] ++
1,209,915 UART: [ldev] CDI.KEYID = 6
1,210,279 UART: [ldev] SUBJECT.KEYID = 5
1,210,706 UART: [ldev] AUTHORITY.KEYID = 7
1,211,169 UART: [ldev] FE.KEYID = 1
1,216,719 UART: [ldev] Erasing FE.KEYID = 1
1,243,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,195 UART: [ldev] --
1,282,650 UART: [fwproc] Wait for Commands...
1,283,341 UART: [fwproc] Recv command 0x46574c44
1,284,074 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,776 UART: ROM Fatal Error: 0x000B000D
1,322,935 >>> mbox cmd response: failed
1,322,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,941 >>> mbox cmd response: failed
1,322,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,947 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,722 UART: [state] DebugLocked = No
86,332 UART: [state] WD Timer not started. Device not locked for debugging
87,465 UART: [kat] SHA2-256
891,015 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,483 UART: [kat] SHA2-256
901,423 UART: [kat] SHA2-384
904,066 UART: [kat] SHA2-512-ACC
905,967 UART: [kat] ECC-384
915,574 UART: [kat] HMAC-384Kdf
920,110 UART: [kat] LMS
1,168,422 UART: [kat] --
1,169,041 UART: [cold-reset] ++
1,169,439 UART: [fht] FHT @ 0x50003400
1,172,157 UART: [idev] ++
1,172,325 UART: [idev] CDI.KEYID = 6
1,172,686 UART: [idev] SUBJECT.KEYID = 7
1,173,111 UART: [idev] UDS.KEYID = 0
1,173,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,062 UART: [idev] Erasing UDS.KEYID = 0
1,198,026 UART: [idev] Sha1 KeyId Algorithm
1,206,750 UART: [idev] --
1,207,831 UART: [ldev] ++
1,207,999 UART: [ldev] CDI.KEYID = 6
1,208,363 UART: [ldev] SUBJECT.KEYID = 5
1,208,790 UART: [ldev] AUTHORITY.KEYID = 7
1,209,253 UART: [ldev] FE.KEYID = 1
1,214,163 UART: [ldev] Erasing FE.KEYID = 1
1,240,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,045 UART: [ldev] --
1,280,260 UART: [fwproc] Wait for Commands...
1,280,961 UART: [fwproc] Recv command 0x46574c44
1,281,694 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,035 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,210 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,373 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,638 >>> mbox cmd response: failed
1,178,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,644 >>> mbox cmd response: failed
1,178,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,666 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
893,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,407 UART: [kat] ++
897,559 UART: [kat] sha1
901,621 UART: [kat] SHA2-256
903,561 UART: [kat] SHA2-384
906,354 UART: [kat] SHA2-512-ACC
908,255 UART: [kat] ECC-384
918,130 UART: [kat] HMAC-384Kdf
922,688 UART: [kat] LMS
1,171,016 UART: [kat] --
1,172,011 UART: [cold-reset] ++
1,172,567 UART: [fht] FHT @ 0x50003400
1,175,358 UART: [idev] ++
1,175,526 UART: [idev] CDI.KEYID = 6
1,175,886 UART: [idev] SUBJECT.KEYID = 7
1,176,310 UART: [idev] UDS.KEYID = 0
1,176,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,232 UART: [idev] Erasing UDS.KEYID = 0
1,200,943 UART: [idev] Sha1 KeyId Algorithm
1,209,407 UART: [idev] --
1,210,389 UART: [ldev] ++
1,210,557 UART: [ldev] CDI.KEYID = 6
1,210,920 UART: [ldev] SUBJECT.KEYID = 5
1,211,346 UART: [ldev] AUTHORITY.KEYID = 7
1,211,809 UART: [ldev] FE.KEYID = 1
1,216,837 UART: [ldev] Erasing FE.KEYID = 1
1,243,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,309 UART: [ldev] --
1,282,596 UART: [fwproc] Wait for Commands...
1,283,346 UART: [fwproc] Recv command 0x46574c44
1,284,074 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,647 UART: ROM Fatal Error: 0x000B000D
1,322,806 >>> mbox cmd response: failed
1,322,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,812 >>> mbox cmd response: failed
1,322,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,818 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
893,386 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,511 UART: [kat] ++
897,663 UART: [kat] sha1
902,085 UART: [kat] SHA2-256
904,025 UART: [kat] SHA2-384
906,922 UART: [kat] SHA2-512-ACC
908,823 UART: [kat] ECC-384
918,758 UART: [kat] HMAC-384Kdf
923,422 UART: [kat] LMS
1,171,750 UART: [kat] --
1,172,781 UART: [cold-reset] ++
1,173,291 UART: [fht] FHT @ 0x50003400
1,175,954 UART: [idev] ++
1,176,122 UART: [idev] CDI.KEYID = 6
1,176,482 UART: [idev] SUBJECT.KEYID = 7
1,176,906 UART: [idev] UDS.KEYID = 0
1,177,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,470 UART: [idev] Erasing UDS.KEYID = 0
1,201,367 UART: [idev] Sha1 KeyId Algorithm
1,209,839 UART: [idev] --
1,210,943 UART: [ldev] ++
1,211,111 UART: [ldev] CDI.KEYID = 6
1,211,474 UART: [ldev] SUBJECT.KEYID = 5
1,211,900 UART: [ldev] AUTHORITY.KEYID = 7
1,212,363 UART: [ldev] FE.KEYID = 1
1,217,607 UART: [ldev] Erasing FE.KEYID = 1
1,243,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,763 UART: [ldev] --
1,283,078 UART: [fwproc] Wait for Commands...
1,283,760 UART: [fwproc] Recv command 0x46574c44
1,284,488 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,803 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,973 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,208 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,176,963 >>> mbox cmd response: failed
1,176,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,969 >>> mbox cmd response: failed
1,176,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,407 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,979 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
893,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,800 UART: [kat] ++
897,952 UART: [kat] sha1
902,214 UART: [kat] SHA2-256
904,154 UART: [kat] SHA2-384
906,909 UART: [kat] SHA2-512-ACC
908,810 UART: [kat] ECC-384
919,111 UART: [kat] HMAC-384Kdf
923,641 UART: [kat] LMS
1,171,969 UART: [kat] --
1,172,880 UART: [cold-reset] ++
1,173,428 UART: [fht] FHT @ 0x50003400
1,176,245 UART: [idev] ++
1,176,413 UART: [idev] CDI.KEYID = 6
1,176,773 UART: [idev] SUBJECT.KEYID = 7
1,177,197 UART: [idev] UDS.KEYID = 0
1,177,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,495 UART: [idev] Erasing UDS.KEYID = 0
1,202,810 UART: [idev] Sha1 KeyId Algorithm
1,211,312 UART: [idev] --
1,212,398 UART: [ldev] ++
1,212,566 UART: [ldev] CDI.KEYID = 6
1,212,929 UART: [ldev] SUBJECT.KEYID = 5
1,213,355 UART: [ldev] AUTHORITY.KEYID = 7
1,213,818 UART: [ldev] FE.KEYID = 1
1,218,916 UART: [ldev] Erasing FE.KEYID = 1
1,245,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,164 UART: [ldev] --
1,284,511 UART: [fwproc] Wait for Commands...
1,285,295 UART: [fwproc] Recv command 0x46574c44
1,286,023 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,752 UART: ROM Fatal Error: 0x000B000D
1,325,911 >>> mbox cmd response: failed
1,325,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,917 >>> mbox cmd response: failed
1,325,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,923 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
893,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,978 UART: [kat] ++
898,130 UART: [kat] sha1
902,416 UART: [kat] SHA2-256
904,356 UART: [kat] SHA2-384
907,067 UART: [kat] SHA2-512-ACC
908,968 UART: [kat] ECC-384
918,849 UART: [kat] HMAC-384Kdf
923,551 UART: [kat] LMS
1,171,879 UART: [kat] --
1,172,540 UART: [cold-reset] ++
1,173,088 UART: [fht] FHT @ 0x50003400
1,175,643 UART: [idev] ++
1,175,811 UART: [idev] CDI.KEYID = 6
1,176,171 UART: [idev] SUBJECT.KEYID = 7
1,176,595 UART: [idev] UDS.KEYID = 0
1,176,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,925 UART: [idev] Erasing UDS.KEYID = 0
1,201,446 UART: [idev] Sha1 KeyId Algorithm
1,209,784 UART: [idev] --
1,210,804 UART: [ldev] ++
1,210,972 UART: [ldev] CDI.KEYID = 6
1,211,335 UART: [ldev] SUBJECT.KEYID = 5
1,211,761 UART: [ldev] AUTHORITY.KEYID = 7
1,212,224 UART: [ldev] FE.KEYID = 1
1,217,742 UART: [ldev] Erasing FE.KEYID = 1
1,243,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,918 UART: [ldev] --
1,283,409 UART: [fwproc] Wait for Commands...
1,284,147 UART: [fwproc] Recv command 0x46574c44
1,284,875 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,384 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,554 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,819 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,176,316 >>> mbox cmd response: failed
1,176,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,322 >>> mbox cmd response: failed
1,176,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,992 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,125 UART:
192,494 UART: Running Caliptra ROM ...
193,618 UART:
193,762 UART: [state] CFI Enabled
265,566 UART: [state] LifecycleState = Unprovisioned
267,543 UART: [state] DebugLocked = No
269,414 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,202 UART: [kat] SHA2-256
443,897 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,376 UART: [kat] ++
454,852 UART: [kat] sha1
464,273 UART: [kat] SHA2-256
466,961 UART: [kat] SHA2-384
471,756 UART: [kat] SHA2-512-ACC
474,101 UART: [kat] ECC-384
2,768,402 UART: [kat] HMAC-384Kdf
2,800,709 UART: [kat] LMS
3,991,045 UART: [kat] --
3,995,274 UART: [cold-reset] ++
3,996,510 UART: [fht] Storing FHT @ 0x50003400
4,008,160 UART: [idev] ++
4,008,732 UART: [idev] CDI.KEYID = 6
4,009,681 UART: [idev] SUBJECT.KEYID = 7
4,010,960 UART: [idev] UDS.KEYID = 0
4,013,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,206 UART: [idev] Erasing UDS.KEYID = 0
7,349,089 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,320 UART: [idev] --
7,375,677 UART: [ldev] ++
7,376,258 UART: [ldev] CDI.KEYID = 6
7,377,231 UART: [ldev] SUBJECT.KEYID = 5
7,378,445 UART: [ldev] AUTHORITY.KEYID = 7
7,379,677 UART: [ldev] FE.KEYID = 1
7,422,474 UART: [ldev] Erasing FE.KEYID = 1
10,755,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,192 UART: [ldev] --
13,116,191 UART: [fwproc] Waiting for Commands...
13,117,991 UART: [fwproc] Received command 0x46574c44
13,120,189 UART: [fwproc] Received Image of size 118548 bytes
13,188,883 UART: ROM Fatal Error: 0x000B0008
13,192,404 >>> mbox cmd response: failed
13,192,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,193,163 >>> mbox cmd response: failed
13,193,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,193,728 >>> mbox cmd response: failed
Initializing fuses
2,055,288 writing to cptra_bootfsm_go
2,244,585 UART:
2,244,917 UART: Running Caliptra ROM ...
2,245,968 UART:
2,246,150 UART: [state] CFI Enabled
2,324,868 UART: [state] LifecycleState = Unprovisioned
2,326,827 UART: [state] DebugLocked = No
2,328,064 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,332,599 UART: [kat] SHA2-256
2,502,292 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,512,769 UART: [kat] ++
2,513,226 UART: [kat] sha1
2,524,488 UART: [kat] SHA2-256
2,527,220 UART: [kat] SHA2-384
2,533,759 UART: [kat] SHA2-512-ACC
2,536,092 UART: [kat] ECC-384
4,825,796 UART: [kat] HMAC-384Kdf
4,858,778 UART: [kat] LMS
6,049,057 UART: [kat] --
6,055,448 UART: [cold-reset] ++
6,057,737 UART: [fht] Storing FHT @ 0x50003400
6,069,175 UART: [idev] ++
6,069,747 UART: [idev] CDI.KEYID = 6
6,070,637 UART: [idev] SUBJECT.KEYID = 7
6,071,917 UART: [idev] UDS.KEYID = 0
6,074,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,223,714 UART: [idev] Erasing UDS.KEYID = 0
9,406,097 UART: [idev] Using Sha1 for KeyId Algorithm
9,426,157 UART: [idev] --
9,430,424 UART: [ldev] ++
9,430,996 UART: [ldev] CDI.KEYID = 6
9,431,967 UART: [ldev] SUBJECT.KEYID = 5
9,433,232 UART: [ldev] AUTHORITY.KEYID = 7
9,434,422 UART: [ldev] FE.KEYID = 1
9,472,782 UART: [ldev] Erasing FE.KEYID = 1
12,804,498 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,118,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,133,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,148,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,162,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,182,412 UART: [ldev] --
15,186,395 UART: [fwproc] Waiting for Commands...
15,188,610 UART: [fwproc] Received command 0x46574c44
15,190,803 UART: [fwproc] Received Image of size 118548 bytes
19,302,442 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,371,939 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,445,134 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,773,914 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,783,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,890,496 >>> mbox cmd response: failed
12,891,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,891,659 >>> mbox cmd response: failed
12,891,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,892,245 >>> mbox cmd response: failed
Initializing fuses
2,046,804 writing to cptra_bootfsm_go
5,844,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,005,122 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,527 UART:
192,882 UART: Running Caliptra ROM ...
194,070 UART:
603,844 UART: [state] CFI Enabled
617,519 UART: [state] LifecycleState = Unprovisioned
619,468 UART: [state] DebugLocked = No
622,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,102 UART: [kat] SHA2-256
796,851 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,393 UART: [kat] ++
807,878 UART: [kat] sha1
818,491 UART: [kat] SHA2-256
821,181 UART: [kat] SHA2-384
827,004 UART: [kat] SHA2-512-ACC
829,356 UART: [kat] ECC-384
3,114,403 UART: [kat] HMAC-384Kdf
3,124,915 UART: [kat] LMS
4,314,984 UART: [kat] --
4,319,358 UART: [cold-reset] ++
4,321,729 UART: [fht] Storing FHT @ 0x50003400
4,332,780 UART: [idev] ++
4,333,353 UART: [idev] CDI.KEYID = 6
4,334,296 UART: [idev] SUBJECT.KEYID = 7
4,335,587 UART: [idev] UDS.KEYID = 0
4,338,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,425 UART: [idev] Erasing UDS.KEYID = 0
7,622,741 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,583 UART: [idev] --
7,648,404 UART: [ldev] ++
7,648,990 UART: [ldev] CDI.KEYID = 6
7,650,023 UART: [ldev] SUBJECT.KEYID = 5
7,651,147 UART: [ldev] AUTHORITY.KEYID = 7
7,652,391 UART: [ldev] FE.KEYID = 1
7,663,921 UART: [ldev] Erasing FE.KEYID = 1
10,955,830 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,257 UART: [ldev] --
13,315,754 UART: [fwproc] Waiting for Commands...
13,318,196 UART: [fwproc] Received command 0x46574c44
13,320,392 UART: [fwproc] Received Image of size 118548 bytes
13,390,608 UART: ROM Fatal Error: 0x000B0008
13,394,139 >>> mbox cmd response: failed
13,394,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,394,803 >>> mbox cmd response: failed
13,395,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,395,375 >>> mbox cmd response: failed
Initializing fuses
2,053,232 writing to cptra_bootfsm_go
2,242,543 UART:
2,242,919 UART: Running Caliptra ROM ...
2,243,972 UART:
7,071,747 UART: [state] CFI Enabled
7,085,663 UART: [state] LifecycleState = Unprovisioned
7,087,585 UART: [state] DebugLocked = No
7,090,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,094,399 UART: [kat] SHA2-256
7,264,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,274,705 UART: [kat] ++
7,275,175 UART: [kat] sha1
7,285,906 UART: [kat] SHA2-256
7,288,609 UART: [kat] SHA2-384
7,294,608 UART: [kat] SHA2-512-ACC
7,296,967 UART: [kat] ECC-384
9,581,327 UART: [kat] HMAC-384Kdf
9,593,511 UART: [kat] LMS
10,783,594 UART: [kat] --
10,787,552 UART: [cold-reset] ++
10,788,796 UART: [fht] Storing FHT @ 0x50003400
10,800,064 UART: [idev] ++
10,800,681 UART: [idev] CDI.KEYID = 6
10,801,602 UART: [idev] SUBJECT.KEYID = 7
10,802,863 UART: [idev] UDS.KEYID = 0
10,805,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,954,191 UART: [idev] Erasing UDS.KEYID = 0
14,089,710 UART: [idev] Using Sha1 for KeyId Algorithm
14,112,719 UART: [idev] --
14,116,769 UART: [ldev] ++
14,117,344 UART: [ldev] CDI.KEYID = 6
14,118,283 UART: [ldev] SUBJECT.KEYID = 5
14,119,541 UART: [ldev] AUTHORITY.KEYID = 7
14,120,703 UART: [ldev] FE.KEYID = 1
14,130,318 UART: [ldev] Erasing FE.KEYID = 1
17,415,454 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,707,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,722,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,737,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,751,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,770,995 UART: [ldev] --
19,775,413 UART: [fwproc] Waiting for Commands...
19,778,705 UART: [fwproc] Received command 0x46574c44
19,780,952 UART: [fwproc] Received Image of size 118548 bytes
23,889,152 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,965,027 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,038,227 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,367,185 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
4,131,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,126,616 >>> mbox cmd response: failed
13,127,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,127,665 >>> mbox cmd response: failed
13,127,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,128,269 >>> mbox cmd response: failed
Initializing fuses
2,046,905 writing to cptra_bootfsm_go
10,862,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,900,052 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,313 UART:
192,684 UART: Running Caliptra ROM ...
193,839 UART:
193,990 UART: [state] CFI Enabled
264,601 UART: [state] LifecycleState = Unprovisioned
266,539 UART: [state] DebugLocked = No
268,412 UART: [state] WD Timer not started. Device not locked for debugging
272,740 UART: [kat] SHA2-256
452,415 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,169 UART: [kat] ++
463,711 UART: [kat] sha1
473,950 UART: [kat] SHA2-256
476,656 UART: [kat] SHA2-384
481,827 UART: [kat] SHA2-512-ACC
484,171 UART: [kat] ECC-384
2,945,165 UART: [kat] HMAC-384Kdf
2,970,965 UART: [kat] LMS
3,447,459 UART: [kat] --
3,450,846 UART: [cold-reset] ++
3,451,973 UART: [fht] FHT @ 0x50003400
3,462,200 UART: [idev] ++
3,462,980 UART: [idev] CDI.KEYID = 6
3,463,904 UART: [idev] SUBJECT.KEYID = 7
3,465,015 UART: [idev] UDS.KEYID = 0
3,467,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,044 UART: [idev] Erasing UDS.KEYID = 0
5,986,481 UART: [idev] Sha1 KeyId Algorithm
6,009,049 UART: [idev] --
6,015,278 UART: [ldev] ++
6,015,857 UART: [ldev] CDI.KEYID = 6
6,016,747 UART: [ldev] SUBJECT.KEYID = 5
6,017,912 UART: [ldev] AUTHORITY.KEYID = 7
6,019,234 UART: [ldev] FE.KEYID = 1
6,056,559 UART: [ldev] Erasing FE.KEYID = 1
8,565,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,049 UART: [ldev] --
10,372,327 UART: [fwproc] Wait for Commands...
10,374,269 UART: [fwproc] Recv command 0x46574c44
10,376,316 UART: [fwproc] Recv'd Img size: 118548 bytes
10,460,397 UART: ROM Fatal Error: 0x000B0008
10,463,650 >>> mbox cmd response: failed
10,464,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,464,434 >>> mbox cmd response: failed
10,464,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,465,000 >>> mbox cmd response: failed
Initializing fuses
2,056,294 writing to cptra_bootfsm_go
2,245,615 UART:
2,245,963 UART: Running Caliptra ROM ...
2,247,103 UART:
2,247,273 UART: [state] CFI Enabled
2,315,072 UART: [state] LifecycleState = Unprovisioned
2,317,064 UART: [state] DebugLocked = No
2,319,167 UART: [state] WD Timer not started. Device not locked for debugging
2,322,322 UART: [kat] SHA2-256
2,501,953 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,512,738 UART: [kat] ++
2,513,236 UART: [kat] sha1
2,525,370 UART: [kat] SHA2-256
2,528,037 UART: [kat] SHA2-384
2,532,913 UART: [kat] SHA2-512-ACC
2,535,274 UART: [kat] ECC-384
4,983,279 UART: [kat] HMAC-384Kdf
5,005,057 UART: [kat] LMS
5,481,501 UART: [kat] --
5,484,436 UART: [cold-reset] ++
5,485,897 UART: [fht] FHT @ 0x50003400
5,498,283 UART: [idev] ++
5,498,854 UART: [idev] CDI.KEYID = 6
5,499,880 UART: [idev] SUBJECT.KEYID = 7
5,501,050 UART: [idev] UDS.KEYID = 0
5,503,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,653,149 UART: [idev] Erasing UDS.KEYID = 0
8,022,126 UART: [idev] Sha1 KeyId Algorithm
8,044,462 UART: [idev] --
8,048,785 UART: [ldev] ++
8,049,384 UART: [ldev] CDI.KEYID = 6
8,050,304 UART: [ldev] SUBJECT.KEYID = 5
8,051,472 UART: [ldev] AUTHORITY.KEYID = 7
8,052,718 UART: [ldev] FE.KEYID = 1
8,081,151 UART: [ldev] Erasing FE.KEYID = 1
10,588,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,326,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,342,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,358,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,374,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,395,461 UART: [ldev] --
12,400,676 UART: [fwproc] Wait for Commands...
12,403,804 UART: [fwproc] Recv command 0x46574c44
12,405,798 UART: [fwproc] Recv'd Img size: 118548 bytes
15,887,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,965,163 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,038,189 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,366,649 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,462,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,351,557 >>> mbox cmd response: failed
10,352,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,352,600 >>> mbox cmd response: failed
10,352,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,353,178 >>> mbox cmd response: failed
Initializing fuses
2,055,210 writing to cptra_bootfsm_go
5,499,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,236,914 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
192,668 UART:
193,024 UART: Running Caliptra ROM ...
194,218 UART:
603,880 UART: [state] CFI Enabled
621,276 UART: [state] LifecycleState = Unprovisioned
623,185 UART: [state] DebugLocked = No
625,812 UART: [state] WD Timer not started. Device not locked for debugging
630,315 UART: [kat] SHA2-256
809,932 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,755 UART: [kat] ++
821,235 UART: [kat] sha1
832,173 UART: [kat] SHA2-256
834,860 UART: [kat] SHA2-384
841,703 UART: [kat] SHA2-512-ACC
844,073 UART: [kat] ECC-384
3,286,934 UART: [kat] HMAC-384Kdf
3,300,044 UART: [kat] LMS
3,776,529 UART: [kat] --
3,781,873 UART: [cold-reset] ++
3,784,242 UART: [fht] FHT @ 0x50003400
3,795,440 UART: [idev] ++
3,796,008 UART: [idev] CDI.KEYID = 6
3,796,924 UART: [idev] SUBJECT.KEYID = 7
3,798,194 UART: [idev] UDS.KEYID = 0
3,801,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,950,069 UART: [idev] Erasing UDS.KEYID = 0
6,274,419 UART: [idev] Sha1 KeyId Algorithm
6,298,575 UART: [idev] --
6,303,711 UART: [ldev] ++
6,304,283 UART: [ldev] CDI.KEYID = 6
6,305,219 UART: [ldev] SUBJECT.KEYID = 5
6,306,388 UART: [ldev] AUTHORITY.KEYID = 7
6,307,684 UART: [ldev] FE.KEYID = 1
6,317,976 UART: [ldev] Erasing FE.KEYID = 1
8,797,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,975 UART: [ldev] --
10,592,814 UART: [fwproc] Wait for Commands...
10,594,811 UART: [fwproc] Recv command 0x46574c44
10,596,805 UART: [fwproc] Recv'd Img size: 118548 bytes
10,685,421 UART: ROM Fatal Error: 0x000B0008
10,688,666 >>> mbox cmd response: failed
10,689,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,689,422 >>> mbox cmd response: failed
10,689,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,689,986 >>> mbox cmd response: failed
Initializing fuses
2,056,042 writing to cptra_bootfsm_go
2,245,335 UART:
2,245,672 UART: Running Caliptra ROM ...
2,246,815 UART:
9,761,963 UART: [state] CFI Enabled
9,776,086 UART: [state] LifecycleState = Unprovisioned
9,778,006 UART: [state] DebugLocked = No
9,779,352 UART: [state] WD Timer not started. Device not locked for debugging
9,782,627 UART: [kat] SHA2-256
9,962,279 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,973,053 UART: [kat] ++
9,973,523 UART: [kat] sha1
9,983,819 UART: [kat] SHA2-256
9,986,514 UART: [kat] SHA2-384
9,992,616 UART: [kat] SHA2-512-ACC
9,994,976 UART: [kat] ECC-384
12,437,631 UART: [kat] HMAC-384Kdf
12,449,653 UART: [kat] LMS
12,926,177 UART: [kat] --
12,929,090 UART: [cold-reset] ++
12,931,080 UART: [fht] FHT @ 0x50003400
12,941,954 UART: [idev] ++
12,942,522 UART: [idev] CDI.KEYID = 6
12,943,492 UART: [idev] SUBJECT.KEYID = 7
12,944,709 UART: [idev] UDS.KEYID = 0
12,947,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,096,544 UART: [idev] Erasing UDS.KEYID = 0
15,426,164 UART: [idev] Sha1 KeyId Algorithm
15,451,554 UART: [idev] --
15,455,763 UART: [ldev] ++
15,456,337 UART: [ldev] CDI.KEYID = 6
15,457,404 UART: [ldev] SUBJECT.KEYID = 5
15,458,509 UART: [ldev] AUTHORITY.KEYID = 7
15,459,746 UART: [ldev] FE.KEYID = 1
15,470,450 UART: [ldev] Erasing FE.KEYID = 1
17,950,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,670,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,686,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,702,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,718,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,738,836 UART: [ldev] --
19,743,965 UART: [fwproc] Wait for Commands...
19,746,995 UART: [fwproc] Recv command 0x46574c44
19,749,043 UART: [fwproc] Recv'd Img size: 118548 bytes
23,229,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,307,091 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,380,121 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,708,848 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,777,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,556,701 >>> mbox cmd response: failed
10,557,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,557,625 >>> mbox cmd response: failed
10,557,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,558,198 >>> mbox cmd response: failed
Initializing fuses
2,054,683 writing to cptra_bootfsm_go
13,088,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,751,596 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,236 UART:
192,600 UART: Running Caliptra ROM ...
193,783 UART:
193,947 UART: [state] CFI Enabled
263,940 UART: [state] LifecycleState = Unprovisioned
266,355 UART: [state] DebugLocked = No
269,201 UART: [state] WD Timer not started. Device not locked for debugging
273,766 UART: [kat] SHA2-256
463,631 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,356 UART: [kat] ++
474,852 UART: [kat] sha1
485,419 UART: [kat] SHA2-256
488,395 UART: [kat] SHA2-384
494,114 UART: [kat] SHA2-512-ACC
496,741 UART: [kat] ECC-384
2,948,121 UART: [kat] HMAC-384Kdf
2,969,538 UART: [kat] LMS
3,501,342 UART: [kat] --
3,504,970 UART: [cold-reset] ++
3,506,266 UART: [fht] FHT @ 0x50003400
3,518,825 UART: [idev] ++
3,519,511 UART: [idev] CDI.KEYID = 6
3,520,425 UART: [idev] SUBJECT.KEYID = 7
3,521,647 UART: [idev] UDS.KEYID = 0
3,524,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,744 UART: [idev] Erasing UDS.KEYID = 0
6,026,936 UART: [idev] Sha1 KeyId Algorithm
6,049,421 UART: [idev] --
6,054,237 UART: [ldev] ++
6,054,966 UART: [ldev] CDI.KEYID = 6
6,055,901 UART: [ldev] SUBJECT.KEYID = 5
6,057,017 UART: [ldev] AUTHORITY.KEYID = 7
6,058,283 UART: [ldev] FE.KEYID = 1
6,098,002 UART: [ldev] Erasing FE.KEYID = 1
8,605,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,273 UART: [ldev] --
10,412,087 UART: [fwproc] Wait for Commands...
10,414,245 UART: [fwproc] Recv command 0x46574c44
10,416,570 UART: [fwproc] Recv'd Img size: 118548 bytes
10,519,384 UART: ROM Fatal Error: 0x000B0008
10,523,068 >>> mbox cmd response: failed
10,523,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,523,873 >>> mbox cmd response: failed
10,524,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,524,458 >>> mbox cmd response: failed
Initializing fuses
2,057,838 writing to cptra_bootfsm_go
2,247,181 UART:
2,247,555 UART: Running Caliptra ROM ...
2,248,691 UART:
2,248,857 UART: [state] CFI Enabled
2,317,876 UART: [state] LifecycleState = Unprovisioned
2,320,234 UART: [state] DebugLocked = No
2,322,116 UART: [state] WD Timer not started. Device not locked for debugging
2,326,698 UART: [kat] SHA2-256
2,516,606 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,360 UART: [kat] ++
2,527,878 UART: [kat] sha1
2,539,634 UART: [kat] SHA2-256
2,542,624 UART: [kat] SHA2-384
2,548,245 UART: [kat] SHA2-512-ACC
2,550,826 UART: [kat] ECC-384
5,005,890 UART: [kat] HMAC-384Kdf
5,029,806 UART: [kat] LMS
5,561,553 UART: [kat] --
5,566,094 UART: [cold-reset] ++
5,568,199 UART: [fht] FHT @ 0x50003400
5,579,951 UART: [idev] ++
5,580,639 UART: [idev] CDI.KEYID = 6
5,581,585 UART: [idev] SUBJECT.KEYID = 7
5,582,806 UART: [idev] UDS.KEYID = 0
5,585,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,734,228 UART: [idev] Erasing UDS.KEYID = 0
8,086,699 UART: [idev] Sha1 KeyId Algorithm
8,108,637 UART: [idev] --
8,114,183 UART: [ldev] ++
8,114,881 UART: [ldev] CDI.KEYID = 6
8,115,798 UART: [ldev] SUBJECT.KEYID = 5
8,117,018 UART: [ldev] AUTHORITY.KEYID = 7
8,118,207 UART: [ldev] FE.KEYID = 1
8,158,510 UART: [ldev] Erasing FE.KEYID = 1
10,663,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,402,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,417,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,432,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,447,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,468,686 UART: [ldev] --
12,474,061 UART: [fwproc] Wait for Commands...
12,477,243 UART: [fwproc] Recv command 0x46574c44
12,479,537 UART: [fwproc] Recv'd Img size: 118548 bytes
15,974,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,052,916 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,176,538 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,737,110 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,441,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,312,860 >>> mbox cmd response: failed
10,313,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,313,981 >>> mbox cmd response: failed
10,314,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,314,628 >>> mbox cmd response: failed
Initializing fuses
2,049,498 writing to cptra_bootfsm_go
5,451,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,837,568 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,399 UART:
192,766 UART: Running Caliptra ROM ...
193,899 UART:
603,735 UART: [state] CFI Enabled
617,210 UART: [state] LifecycleState = Unprovisioned
619,588 UART: [state] DebugLocked = No
621,790 UART: [state] WD Timer not started. Device not locked for debugging
626,676 UART: [kat] SHA2-256
816,551 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,376 UART: [kat] ++
827,972 UART: [kat] sha1
838,966 UART: [kat] SHA2-256
841,984 UART: [kat] SHA2-384
848,884 UART: [kat] SHA2-512-ACC
851,450 UART: [kat] ECC-384
3,292,039 UART: [kat] HMAC-384Kdf
3,304,810 UART: [kat] LMS
3,836,621 UART: [kat] --
3,842,786 UART: [cold-reset] ++
3,844,145 UART: [fht] FHT @ 0x50003400
3,855,357 UART: [idev] ++
3,856,144 UART: [idev] CDI.KEYID = 6
3,857,074 UART: [idev] SUBJECT.KEYID = 7
3,858,191 UART: [idev] UDS.KEYID = 0
3,861,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,144 UART: [idev] Erasing UDS.KEYID = 0
6,332,407 UART: [idev] Sha1 KeyId Algorithm
6,354,351 UART: [idev] --
6,358,376 UART: [ldev] ++
6,359,065 UART: [ldev] CDI.KEYID = 6
6,359,982 UART: [ldev] SUBJECT.KEYID = 5
6,361,145 UART: [ldev] AUTHORITY.KEYID = 7
6,362,325 UART: [ldev] FE.KEYID = 1
6,374,490 UART: [ldev] Erasing FE.KEYID = 1
8,849,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,420 UART: [ldev] --
10,638,994 UART: [fwproc] Wait for Commands...
10,642,176 UART: [fwproc] Recv command 0x46574c44
10,644,501 UART: [fwproc] Recv'd Img size: 118548 bytes
10,745,672 UART: ROM Fatal Error: 0x000B0008
10,749,369 >>> mbox cmd response: failed
10,749,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,750,137 >>> mbox cmd response: failed
10,750,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,750,719 >>> mbox cmd response: failed
Initializing fuses
2,054,472 writing to cptra_bootfsm_go
2,243,811 UART:
2,244,179 UART: Running Caliptra ROM ...
2,245,318 UART:
9,705,905 UART: [state] CFI Enabled
9,719,961 UART: [state] LifecycleState = Unprovisioned
9,722,330 UART: [state] DebugLocked = No
9,724,727 UART: [state] WD Timer not started. Device not locked for debugging
9,728,602 UART: [kat] SHA2-256
9,918,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,929,249 UART: [kat] ++
9,929,769 UART: [kat] sha1
9,940,341 UART: [kat] SHA2-256
9,943,365 UART: [kat] SHA2-384
9,948,820 UART: [kat] SHA2-512-ACC
9,951,398 UART: [kat] ECC-384
12,391,802 UART: [kat] HMAC-384Kdf
12,404,952 UART: [kat] LMS
12,936,781 UART: [kat] --
12,942,607 UART: [cold-reset] ++
12,944,326 UART: [fht] FHT @ 0x50003400
12,956,647 UART: [idev] ++
12,957,339 UART: [idev] CDI.KEYID = 6
12,958,266 UART: [idev] SUBJECT.KEYID = 7
12,959,484 UART: [idev] UDS.KEYID = 0
12,961,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,110,907 UART: [idev] Erasing UDS.KEYID = 0
15,435,945 UART: [idev] Sha1 KeyId Algorithm
15,457,991 UART: [idev] --
15,463,936 UART: [ldev] ++
15,464,626 UART: [ldev] CDI.KEYID = 6
15,465,516 UART: [ldev] SUBJECT.KEYID = 5
15,466,752 UART: [ldev] AUTHORITY.KEYID = 7
15,467,938 UART: [ldev] FE.KEYID = 1
15,479,725 UART: [ldev] Erasing FE.KEYID = 1
17,959,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,678,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,693,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,708,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,723,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,745,243 UART: [ldev] --
19,750,664 UART: [fwproc] Wait for Commands...
19,752,284 UART: [fwproc] Recv command 0x46574c44
19,754,609 UART: [fwproc] Recv'd Img size: 118548 bytes
23,246,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,324,012 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,447,649 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,008,092 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,758,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,538,711 >>> mbox cmd response: failed
10,539,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,539,940 >>> mbox cmd response: failed
10,540,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,540,508 >>> mbox cmd response: failed
Initializing fuses
2,049,847 writing to cptra_bootfsm_go
13,086,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,358,294 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,131 UART: [kat] SHA2-256
882,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,177 UART: [kat] ++
886,329 UART: [kat] sha1
890,593 UART: [kat] SHA2-256
892,531 UART: [kat] SHA2-384
895,266 UART: [kat] SHA2-512-ACC
897,167 UART: [kat] ECC-384
902,718 UART: [kat] HMAC-384Kdf
907,526 UART: [kat] LMS
1,475,722 UART: [kat] --
1,476,545 UART: [cold-reset] ++
1,477,103 UART: [fht] Storing FHT @ 0x50003400
1,479,734 UART: [idev] ++
1,479,902 UART: [idev] CDI.KEYID = 6
1,480,262 UART: [idev] SUBJECT.KEYID = 7
1,480,686 UART: [idev] UDS.KEYID = 0
1,481,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,030 UART: [idev] Erasing UDS.KEYID = 0
1,505,460 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,082 UART: [idev] --
1,515,033 UART: [ldev] ++
1,515,201 UART: [ldev] CDI.KEYID = 6
1,515,564 UART: [ldev] SUBJECT.KEYID = 5
1,515,990 UART: [ldev] AUTHORITY.KEYID = 7
1,516,453 UART: [ldev] FE.KEYID = 1
1,521,567 UART: [ldev] Erasing FE.KEYID = 1
1,547,272 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,306 UART: [ldev] --
1,586,763 UART: [fwproc] Waiting for Commands...
1,587,506 UART: [fwproc] Received command 0x46574c44
1,588,297 UART: [fwproc] Received Image of size 118548 bytes
1,612,910 UART: ROM Fatal Error: 0x000B0008
1,614,067 >>> mbox cmd response: failed
1,614,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,073 >>> mbox cmd response: failed
1,614,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,725 UART: [kat] SHA2-256
881,656 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,771 UART: [kat] ++
885,923 UART: [kat] sha1
890,137 UART: [kat] SHA2-256
892,075 UART: [kat] SHA2-384
894,900 UART: [kat] SHA2-512-ACC
896,801 UART: [kat] ECC-384
902,372 UART: [kat] HMAC-384Kdf
906,980 UART: [kat] LMS
1,475,176 UART: [kat] --
1,476,099 UART: [cold-reset] ++
1,476,425 UART: [fht] Storing FHT @ 0x50003400
1,479,360 UART: [idev] ++
1,479,528 UART: [idev] CDI.KEYID = 6
1,479,888 UART: [idev] SUBJECT.KEYID = 7
1,480,312 UART: [idev] UDS.KEYID = 0
1,480,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,000 UART: [idev] Erasing UDS.KEYID = 0
1,504,494 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,316 UART: [idev] --
1,514,347 UART: [ldev] ++
1,514,515 UART: [ldev] CDI.KEYID = 6
1,514,878 UART: [ldev] SUBJECT.KEYID = 5
1,515,304 UART: [ldev] AUTHORITY.KEYID = 7
1,515,767 UART: [ldev] FE.KEYID = 1
1,520,921 UART: [ldev] Erasing FE.KEYID = 1
1,546,922 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,958 UART: [ldev] --
1,586,415 UART: [fwproc] Waiting for Commands...
1,587,272 UART: [fwproc] Received command 0x46574c44
1,588,063 UART: [fwproc] Received Image of size 118548 bytes
2,933,110 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,996 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,214 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,469 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,466,022 >>> mbox cmd response: failed
1,466,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,028 >>> mbox cmd response: failed
1,466,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,034 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,007 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,924 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,412 UART: [kat] SHA2-256
882,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,458 UART: [kat] ++
886,610 UART: [kat] sha1
890,774 UART: [kat] SHA2-256
892,712 UART: [kat] SHA2-384
895,313 UART: [kat] SHA2-512-ACC
897,214 UART: [kat] ECC-384
902,823 UART: [kat] HMAC-384Kdf
907,531 UART: [kat] LMS
1,475,727 UART: [kat] --
1,476,500 UART: [cold-reset] ++
1,477,080 UART: [fht] Storing FHT @ 0x50003400
1,480,091 UART: [idev] ++
1,480,259 UART: [idev] CDI.KEYID = 6
1,480,619 UART: [idev] SUBJECT.KEYID = 7
1,481,043 UART: [idev] UDS.KEYID = 0
1,481,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,791 UART: [idev] Erasing UDS.KEYID = 0
1,505,267 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,835 UART: [idev] --
1,514,920 UART: [ldev] ++
1,515,088 UART: [ldev] CDI.KEYID = 6
1,515,451 UART: [ldev] SUBJECT.KEYID = 5
1,515,877 UART: [ldev] AUTHORITY.KEYID = 7
1,516,340 UART: [ldev] FE.KEYID = 1
1,521,830 UART: [ldev] Erasing FE.KEYID = 1
1,547,055 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,951 UART: [ldev] --
1,586,384 UART: [fwproc] Waiting for Commands...
1,587,243 UART: [fwproc] Received command 0x46574c44
1,588,034 UART: [fwproc] Received Image of size 118548 bytes
1,612,901 UART: ROM Fatal Error: 0x000B0008
1,614,058 >>> mbox cmd response: failed
1,614,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,064 >>> mbox cmd response: failed
1,614,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,070 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,807 UART: [state] LifecycleState = Unprovisioned
85,462 UART: [state] DebugLocked = No
86,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,624 UART: [kat] SHA2-256
881,555 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,670 UART: [kat] ++
885,822 UART: [kat] sha1
890,116 UART: [kat] SHA2-256
892,054 UART: [kat] SHA2-384
894,907 UART: [kat] SHA2-512-ACC
896,808 UART: [kat] ECC-384
902,455 UART: [kat] HMAC-384Kdf
907,143 UART: [kat] LMS
1,475,339 UART: [kat] --
1,476,044 UART: [cold-reset] ++
1,476,612 UART: [fht] Storing FHT @ 0x50003400
1,479,303 UART: [idev] ++
1,479,471 UART: [idev] CDI.KEYID = 6
1,479,831 UART: [idev] SUBJECT.KEYID = 7
1,480,255 UART: [idev] UDS.KEYID = 0
1,480,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,591 UART: [idev] Erasing UDS.KEYID = 0
1,505,465 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,319 UART: [idev] --
1,515,312 UART: [ldev] ++
1,515,480 UART: [ldev] CDI.KEYID = 6
1,515,843 UART: [ldev] SUBJECT.KEYID = 5
1,516,269 UART: [ldev] AUTHORITY.KEYID = 7
1,516,732 UART: [ldev] FE.KEYID = 1
1,521,948 UART: [ldev] Erasing FE.KEYID = 1
1,547,367 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,795 UART: [ldev] --
1,586,124 UART: [fwproc] Waiting for Commands...
1,586,981 UART: [fwproc] Received command 0x46574c44
1,587,772 UART: [fwproc] Received Image of size 118548 bytes
2,932,343 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,715 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,933 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,180 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,466,527 >>> mbox cmd response: failed
1,466,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,533 >>> mbox cmd response: failed
1,466,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,754 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,262 UART: [kat] ++
895,414 UART: [kat] sha1
899,476 UART: [kat] SHA2-256
901,416 UART: [kat] SHA2-384
904,093 UART: [kat] SHA2-512-ACC
905,994 UART: [kat] ECC-384
915,821 UART: [kat] HMAC-384Kdf
920,555 UART: [kat] LMS
1,168,867 UART: [kat] --
1,169,416 UART: [cold-reset] ++
1,169,890 UART: [fht] FHT @ 0x50003400
1,172,574 UART: [idev] ++
1,172,742 UART: [idev] CDI.KEYID = 6
1,173,103 UART: [idev] SUBJECT.KEYID = 7
1,173,528 UART: [idev] UDS.KEYID = 0
1,173,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,675 UART: [idev] Erasing UDS.KEYID = 0
1,198,583 UART: [idev] Sha1 KeyId Algorithm
1,207,439 UART: [idev] --
1,208,254 UART: [ldev] ++
1,208,422 UART: [ldev] CDI.KEYID = 6
1,208,786 UART: [ldev] SUBJECT.KEYID = 5
1,209,213 UART: [ldev] AUTHORITY.KEYID = 7
1,209,676 UART: [ldev] FE.KEYID = 1
1,214,996 UART: [ldev] Erasing FE.KEYID = 1
1,241,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,000 UART: [ldev] --
1,280,255 UART: [fwproc] Wait for Commands...
1,280,846 UART: [fwproc] Recv command 0x46574c44
1,281,579 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,238 UART: ROM Fatal Error: 0x000B0008
1,307,395 >>> mbox cmd response: failed
1,307,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,401 >>> mbox cmd response: failed
1,307,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,407 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,325 UART: [kat] SHA2-512-ACC
906,226 UART: [kat] ECC-384
915,929 UART: [kat] HMAC-384Kdf
920,661 UART: [kat] LMS
1,168,973 UART: [kat] --
1,169,898 UART: [cold-reset] ++
1,170,426 UART: [fht] FHT @ 0x50003400
1,173,190 UART: [idev] ++
1,173,358 UART: [idev] CDI.KEYID = 6
1,173,719 UART: [idev] SUBJECT.KEYID = 7
1,174,144 UART: [idev] UDS.KEYID = 0
1,174,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,903 UART: [idev] Erasing UDS.KEYID = 0
1,198,881 UART: [idev] Sha1 KeyId Algorithm
1,207,847 UART: [idev] --
1,208,828 UART: [ldev] ++
1,208,996 UART: [ldev] CDI.KEYID = 6
1,209,360 UART: [ldev] SUBJECT.KEYID = 5
1,209,787 UART: [ldev] AUTHORITY.KEYID = 7
1,210,250 UART: [ldev] FE.KEYID = 1
1,215,216 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,614 UART: [ldev] --
1,280,993 UART: [fwproc] Wait for Commands...
1,281,630 UART: [fwproc] Recv command 0x46574c44
1,282,363 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,184 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,359 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,710 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,996 >>> mbox cmd response: failed
1,163,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,002 >>> mbox cmd response: failed
1,164,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,035 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,993 UART: [state] LifecycleState = Unprovisioned
85,648 UART: [state] DebugLocked = No
86,238 UART: [state] WD Timer not started. Device not locked for debugging
87,555 UART: [kat] SHA2-256
891,105 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
916,092 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,583 UART: [cold-reset] ++
1,170,155 UART: [fht] FHT @ 0x50003400
1,172,907 UART: [idev] ++
1,173,075 UART: [idev] CDI.KEYID = 6
1,173,436 UART: [idev] SUBJECT.KEYID = 7
1,173,861 UART: [idev] UDS.KEYID = 0
1,174,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,480 UART: [idev] Erasing UDS.KEYID = 0
1,199,350 UART: [idev] Sha1 KeyId Algorithm
1,208,322 UART: [idev] --
1,209,395 UART: [ldev] ++
1,209,563 UART: [ldev] CDI.KEYID = 6
1,209,927 UART: [ldev] SUBJECT.KEYID = 5
1,210,354 UART: [ldev] AUTHORITY.KEYID = 7
1,210,817 UART: [ldev] FE.KEYID = 1
1,215,911 UART: [ldev] Erasing FE.KEYID = 1
1,242,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,931 UART: [ldev] --
1,281,360 UART: [fwproc] Wait for Commands...
1,282,175 UART: [fwproc] Recv command 0x46574c44
1,282,908 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,975 UART: ROM Fatal Error: 0x000B0008
1,309,132 >>> mbox cmd response: failed
1,309,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,138 >>> mbox cmd response: failed
1,309,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,144 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
891,811 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,915 UART: [kat] ++
896,067 UART: [kat] sha1
900,237 UART: [kat] SHA2-256
902,177 UART: [kat] SHA2-384
904,870 UART: [kat] SHA2-512-ACC
906,771 UART: [kat] ECC-384
916,544 UART: [kat] HMAC-384Kdf
921,140 UART: [kat] LMS
1,169,452 UART: [kat] --
1,170,381 UART: [cold-reset] ++
1,170,799 UART: [fht] FHT @ 0x50003400
1,173,491 UART: [idev] ++
1,173,659 UART: [idev] CDI.KEYID = 6
1,174,020 UART: [idev] SUBJECT.KEYID = 7
1,174,445 UART: [idev] UDS.KEYID = 0
1,174,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,086 UART: [idev] Erasing UDS.KEYID = 0
1,199,492 UART: [idev] Sha1 KeyId Algorithm
1,208,294 UART: [idev] --
1,209,487 UART: [ldev] ++
1,209,655 UART: [ldev] CDI.KEYID = 6
1,210,019 UART: [ldev] SUBJECT.KEYID = 5
1,210,446 UART: [ldev] AUTHORITY.KEYID = 7
1,210,909 UART: [ldev] FE.KEYID = 1
1,216,101 UART: [ldev] Erasing FE.KEYID = 1
1,242,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,869 UART: [ldev] --
1,282,146 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,570 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,489 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,664 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,009 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,441 >>> mbox cmd response: failed
1,163,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,447 >>> mbox cmd response: failed
1,163,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,153 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,786 UART: [state] LifecycleState = Unprovisioned
85,441 UART: [state] DebugLocked = No
86,001 UART: [state] WD Timer not started. Device not locked for debugging
87,216 UART: [kat] SHA2-256
892,866 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,991 UART: [kat] ++
897,143 UART: [kat] sha1
901,579 UART: [kat] SHA2-256
903,519 UART: [kat] SHA2-384
906,332 UART: [kat] SHA2-512-ACC
908,233 UART: [kat] ECC-384
918,218 UART: [kat] HMAC-384Kdf
922,870 UART: [kat] LMS
1,171,198 UART: [kat] --
1,171,805 UART: [cold-reset] ++
1,172,271 UART: [fht] FHT @ 0x50003400
1,175,056 UART: [idev] ++
1,175,224 UART: [idev] CDI.KEYID = 6
1,175,584 UART: [idev] SUBJECT.KEYID = 7
1,176,008 UART: [idev] UDS.KEYID = 0
1,176,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,144 UART: [idev] Erasing UDS.KEYID = 0
1,201,401 UART: [idev] Sha1 KeyId Algorithm
1,209,729 UART: [idev] --
1,210,903 UART: [ldev] ++
1,211,071 UART: [ldev] CDI.KEYID = 6
1,211,434 UART: [ldev] SUBJECT.KEYID = 5
1,211,860 UART: [ldev] AUTHORITY.KEYID = 7
1,212,323 UART: [ldev] FE.KEYID = 1
1,217,355 UART: [ldev] Erasing FE.KEYID = 1
1,243,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,915 UART: [ldev] --
1,283,326 UART: [fwproc] Wait for Commands...
1,284,054 UART: [fwproc] Recv command 0x46574c44
1,284,782 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,901 UART: ROM Fatal Error: 0x000B0008
1,311,058 >>> mbox cmd response: failed
1,311,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,064 >>> mbox cmd response: failed
1,311,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,070 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,627 UART: [kat] SHA2-256
903,567 UART: [kat] SHA2-384
906,214 UART: [kat] SHA2-512-ACC
908,115 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,624 UART: [kat] LMS
1,170,952 UART: [kat] --
1,171,931 UART: [cold-reset] ++
1,172,265 UART: [fht] FHT @ 0x50003400
1,174,830 UART: [idev] ++
1,174,998 UART: [idev] CDI.KEYID = 6
1,175,358 UART: [idev] SUBJECT.KEYID = 7
1,175,782 UART: [idev] UDS.KEYID = 0
1,176,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,732 UART: [idev] Erasing UDS.KEYID = 0
1,200,295 UART: [idev] Sha1 KeyId Algorithm
1,208,667 UART: [idev] --
1,209,689 UART: [ldev] ++
1,209,857 UART: [ldev] CDI.KEYID = 6
1,210,220 UART: [ldev] SUBJECT.KEYID = 5
1,210,646 UART: [ldev] AUTHORITY.KEYID = 7
1,211,109 UART: [ldev] FE.KEYID = 1
1,215,851 UART: [ldev] Erasing FE.KEYID = 1
1,241,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,869 UART: [ldev] --
1,281,300 UART: [fwproc] Wait for Commands...
1,282,120 UART: [fwproc] Recv command 0x46574c44
1,282,848 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,031 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,201 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,464 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,085 >>> mbox cmd response: failed
1,164,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,091 >>> mbox cmd response: failed
1,164,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,631 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
893,389 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,514 UART: [kat] ++
897,666 UART: [kat] sha1
902,042 UART: [kat] SHA2-256
903,982 UART: [kat] SHA2-384
906,693 UART: [kat] SHA2-512-ACC
908,594 UART: [kat] ECC-384
918,681 UART: [kat] HMAC-384Kdf
923,387 UART: [kat] LMS
1,171,715 UART: [kat] --
1,172,790 UART: [cold-reset] ++
1,173,210 UART: [fht] FHT @ 0x50003400
1,175,883 UART: [idev] ++
1,176,051 UART: [idev] CDI.KEYID = 6
1,176,411 UART: [idev] SUBJECT.KEYID = 7
1,176,835 UART: [idev] UDS.KEYID = 0
1,177,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,679 UART: [idev] Erasing UDS.KEYID = 0
1,201,944 UART: [idev] Sha1 KeyId Algorithm
1,210,376 UART: [idev] --
1,211,410 UART: [ldev] ++
1,211,578 UART: [ldev] CDI.KEYID = 6
1,211,941 UART: [ldev] SUBJECT.KEYID = 5
1,212,367 UART: [ldev] AUTHORITY.KEYID = 7
1,212,830 UART: [ldev] FE.KEYID = 1
1,218,108 UART: [ldev] Erasing FE.KEYID = 1
1,243,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,408 UART: [ldev] --
1,282,679 UART: [fwproc] Wait for Commands...
1,283,457 UART: [fwproc] Recv command 0x46574c44
1,284,185 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,240 UART: ROM Fatal Error: 0x000B0008
1,310,397 >>> mbox cmd response: failed
1,310,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,403 >>> mbox cmd response: failed
1,310,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
893,687 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,812 UART: [kat] ++
897,964 UART: [kat] sha1
902,162 UART: [kat] SHA2-256
904,102 UART: [kat] SHA2-384
906,779 UART: [kat] SHA2-512-ACC
908,680 UART: [kat] ECC-384
918,667 UART: [kat] HMAC-384Kdf
923,361 UART: [kat] LMS
1,171,689 UART: [kat] --
1,172,542 UART: [cold-reset] ++
1,173,082 UART: [fht] FHT @ 0x50003400
1,175,839 UART: [idev] ++
1,176,007 UART: [idev] CDI.KEYID = 6
1,176,367 UART: [idev] SUBJECT.KEYID = 7
1,176,791 UART: [idev] UDS.KEYID = 0
1,177,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,849 UART: [idev] Erasing UDS.KEYID = 0
1,201,438 UART: [idev] Sha1 KeyId Algorithm
1,209,900 UART: [idev] --
1,210,834 UART: [ldev] ++
1,211,002 UART: [ldev] CDI.KEYID = 6
1,211,365 UART: [ldev] SUBJECT.KEYID = 5
1,211,791 UART: [ldev] AUTHORITY.KEYID = 7
1,212,254 UART: [ldev] FE.KEYID = 1
1,217,366 UART: [ldev] Erasing FE.KEYID = 1
1,243,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,918 UART: [ldev] --
1,283,281 UART: [fwproc] Wait for Commands...
1,284,005 UART: [fwproc] Recv command 0x46574c44
1,284,733 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,805 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,344 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,514 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,793 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,338 >>> mbox cmd response: failed
1,164,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,344 >>> mbox cmd response: failed
1,164,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,350 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,116 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
192,311 UART:
192,660 UART: Running Caliptra ROM ...
193,751 UART:
193,892 UART: [state] CFI Enabled
261,289 UART: [state] LifecycleState = Unprovisioned
263,203 UART: [state] DebugLocked = No
265,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,477 UART: [kat] SHA2-256
440,177 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,651 UART: [kat] ++
451,213 UART: [kat] sha1
460,475 UART: [kat] SHA2-256
463,167 UART: [kat] SHA2-384
468,343 UART: [kat] SHA2-512-ACC
470,688 UART: [kat] ECC-384
2,765,909 UART: [kat] HMAC-384Kdf
2,797,988 UART: [kat] LMS
3,988,301 UART: [kat] --
3,992,258 UART: [cold-reset] ++
3,994,474 UART: [fht] Storing FHT @ 0x50003400
4,006,107 UART: [idev] ++
4,006,711 UART: [idev] CDI.KEYID = 6
4,007,642 UART: [idev] SUBJECT.KEYID = 7
4,008,874 UART: [idev] UDS.KEYID = 0
4,012,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,889 UART: [idev] Erasing UDS.KEYID = 0
7,342,529 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,165 UART: [idev] --
7,369,029 UART: [ldev] ++
7,369,617 UART: [ldev] CDI.KEYID = 6
7,370,643 UART: [ldev] SUBJECT.KEYID = 5
7,371,808 UART: [ldev] AUTHORITY.KEYID = 7
7,373,041 UART: [ldev] FE.KEYID = 1
7,421,294 UART: [ldev] Erasing FE.KEYID = 1
10,754,001 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,352 UART: [ldev] --
13,114,701 UART: [fwproc] Waiting for Commands...
13,117,447 UART: [fwproc] Received command 0x46574c44
13,119,672 UART: [fwproc] Received Image of size 118548 bytes
13,189,132 UART: ROM Fatal Error: 0x000B0009
13,192,618 >>> mbox cmd response: failed
13,192,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,193,300 >>> mbox cmd response: failed
13,193,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,193,902 >>> mbox cmd response: failed
Initializing fuses
2,059,380 writing to cptra_bootfsm_go
2,248,700 UART:
2,249,047 UART: Running Caliptra ROM ...
2,250,095 UART:
2,250,252 UART: [state] CFI Enabled
2,322,138 UART: [state] LifecycleState = Unprovisioned
2,324,088 UART: [state] DebugLocked = No
2,326,158 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,331,720 UART: [kat] SHA2-256
2,501,419 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,511,945 UART: [kat] ++
2,512,405 UART: [kat] sha1
2,524,695 UART: [kat] SHA2-256
2,527,388 UART: [kat] SHA2-384
2,534,355 UART: [kat] SHA2-512-ACC
2,536,717 UART: [kat] ECC-384
4,825,844 UART: [kat] HMAC-384Kdf
4,857,365 UART: [kat] LMS
6,047,689 UART: [kat] --
6,050,412 UART: [cold-reset] ++
6,053,057 UART: [fht] Storing FHT @ 0x50003400
6,064,733 UART: [idev] ++
6,065,307 UART: [idev] CDI.KEYID = 6
6,066,246 UART: [idev] SUBJECT.KEYID = 7
6,067,464 UART: [idev] UDS.KEYID = 0
6,069,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,218,953 UART: [idev] Erasing UDS.KEYID = 0
9,402,682 UART: [idev] Using Sha1 for KeyId Algorithm
9,424,418 UART: [idev] --
9,427,934 UART: [ldev] ++
9,428,508 UART: [ldev] CDI.KEYID = 6
9,429,490 UART: [ldev] SUBJECT.KEYID = 5
9,430,705 UART: [ldev] AUTHORITY.KEYID = 7
9,431,947 UART: [ldev] FE.KEYID = 1
9,478,254 UART: [ldev] Erasing FE.KEYID = 1
12,810,987 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,104,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,118,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,133,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,148,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,168,757 UART: [ldev] --
15,172,836 UART: [fwproc] Waiting for Commands...
15,175,962 UART: [fwproc] Received command 0x46574c44
15,178,158 UART: [fwproc] Received Image of size 118548 bytes
19,292,922 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,361,086 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,434,176 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,762,870 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,787,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,922,275 >>> mbox cmd response: failed
12,923,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,923,572 >>> mbox cmd response: failed
12,923,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,924,144 >>> mbox cmd response: failed
Initializing fuses
2,056,018 writing to cptra_bootfsm_go
5,828,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,006,772 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,588 UART:
192,947 UART: Running Caliptra ROM ...
194,121 UART:
603,768 UART: [state] CFI Enabled
620,303 UART: [state] LifecycleState = Unprovisioned
622,197 UART: [state] DebugLocked = No
624,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,526 UART: [kat] SHA2-256
800,283 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,857 UART: [kat] ++
811,312 UART: [kat] sha1
822,462 UART: [kat] SHA2-256
825,198 UART: [kat] SHA2-384
830,907 UART: [kat] SHA2-512-ACC
833,253 UART: [kat] ECC-384
3,118,283 UART: [kat] HMAC-384Kdf
3,130,517 UART: [kat] LMS
4,320,675 UART: [kat] --
4,325,727 UART: [cold-reset] ++
4,327,134 UART: [fht] Storing FHT @ 0x50003400
4,338,471 UART: [idev] ++
4,339,040 UART: [idev] CDI.KEYID = 6
4,339,985 UART: [idev] SUBJECT.KEYID = 7
4,341,264 UART: [idev] UDS.KEYID = 0
4,344,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,493,165 UART: [idev] Erasing UDS.KEYID = 0
7,626,685 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,663 UART: [idev] --
7,652,449 UART: [ldev] ++
7,653,024 UART: [ldev] CDI.KEYID = 6
7,653,948 UART: [ldev] SUBJECT.KEYID = 5
7,655,189 UART: [ldev] AUTHORITY.KEYID = 7
7,656,429 UART: [ldev] FE.KEYID = 1
7,667,621 UART: [ldev] Erasing FE.KEYID = 1
10,954,352 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,938 UART: [ldev] --
13,314,486 UART: [fwproc] Waiting for Commands...
13,316,268 UART: [fwproc] Received command 0x46574c44
13,318,467 UART: [fwproc] Received Image of size 118548 bytes
13,392,318 UART: ROM Fatal Error: 0x000B0009
13,395,840 >>> mbox cmd response: failed
13,396,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,396,497 >>> mbox cmd response: failed
13,396,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,397,089 >>> mbox cmd response: failed
Initializing fuses
2,059,429 writing to cptra_bootfsm_go
2,248,750 UART:
2,249,095 UART: Running Caliptra ROM ...
2,250,203 UART:
7,072,786 UART: [state] CFI Enabled
7,086,847 UART: [state] LifecycleState = Unprovisioned
7,088,798 UART: [state] DebugLocked = No
7,090,312 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,095,169 UART: [kat] SHA2-256
7,264,920 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,275,457 UART: [kat] ++
7,276,009 UART: [kat] sha1
7,286,705 UART: [kat] SHA2-256
7,289,406 UART: [kat] SHA2-384
7,295,726 UART: [kat] SHA2-512-ACC
7,298,078 UART: [kat] ECC-384
9,583,783 UART: [kat] HMAC-384Kdf
9,595,636 UART: [kat] LMS
10,785,738 UART: [kat] --
10,790,216 UART: [cold-reset] ++
10,792,749 UART: [fht] Storing FHT @ 0x50003400
10,802,679 UART: [idev] ++
10,803,246 UART: [idev] CDI.KEYID = 6
10,804,266 UART: [idev] SUBJECT.KEYID = 7
10,805,432 UART: [idev] UDS.KEYID = 0
10,807,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,956,909 UART: [idev] Erasing UDS.KEYID = 0
14,093,753 UART: [idev] Using Sha1 for KeyId Algorithm
14,116,650 UART: [idev] --
14,121,058 UART: [ldev] ++
14,121,640 UART: [ldev] CDI.KEYID = 6
14,122,585 UART: [ldev] SUBJECT.KEYID = 5
14,123,837 UART: [ldev] AUTHORITY.KEYID = 7
14,125,000 UART: [ldev] FE.KEYID = 1
14,135,468 UART: [ldev] Erasing FE.KEYID = 1
17,416,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,712,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,727,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,742,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,756,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,776,337 UART: [ldev] --
19,780,311 UART: [fwproc] Waiting for Commands...
19,782,919 UART: [fwproc] Received command 0x46574c44
19,785,112 UART: [fwproc] Received Image of size 118548 bytes
23,891,520 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,965,828 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,038,999 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,368,239 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
4,127,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,127,787 >>> mbox cmd response: failed
13,128,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,129,142 >>> mbox cmd response: failed
13,129,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,129,719 >>> mbox cmd response: failed
Initializing fuses
2,061,033 writing to cptra_bootfsm_go
10,870,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,894,865 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,099 UART:
192,474 UART: Running Caliptra ROM ...
193,658 UART:
193,814 UART: [state] CFI Enabled
265,436 UART: [state] LifecycleState = Unprovisioned
267,372 UART: [state] DebugLocked = No
268,706 UART: [state] WD Timer not started. Device not locked for debugging
273,426 UART: [kat] SHA2-256
453,093 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,865 UART: [kat] ++
464,322 UART: [kat] sha1
475,313 UART: [kat] SHA2-256
478,055 UART: [kat] SHA2-384
483,824 UART: [kat] SHA2-512-ACC
486,162 UART: [kat] ECC-384
2,949,670 UART: [kat] HMAC-384Kdf
2,971,834 UART: [kat] LMS
3,448,269 UART: [kat] --
3,453,465 UART: [cold-reset] ++
3,454,917 UART: [fht] FHT @ 0x50003400
3,467,308 UART: [idev] ++
3,467,925 UART: [idev] CDI.KEYID = 6
3,468,848 UART: [idev] SUBJECT.KEYID = 7
3,470,069 UART: [idev] UDS.KEYID = 0
3,473,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,449 UART: [idev] Erasing UDS.KEYID = 0
5,989,909 UART: [idev] Sha1 KeyId Algorithm
6,013,686 UART: [idev] --
6,019,203 UART: [ldev] ++
6,019,817 UART: [ldev] CDI.KEYID = 6
6,020,740 UART: [ldev] SUBJECT.KEYID = 5
6,021,910 UART: [ldev] AUTHORITY.KEYID = 7
6,023,174 UART: [ldev] FE.KEYID = 1
6,058,887 UART: [ldev] Erasing FE.KEYID = 1
8,565,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,081 UART: [ldev] --
10,374,709 UART: [fwproc] Wait for Commands...
10,377,191 UART: [fwproc] Recv command 0x46574c44
10,379,235 UART: [fwproc] Recv'd Img size: 118548 bytes
10,463,469 UART: ROM Fatal Error: 0x000B0009
10,466,717 >>> mbox cmd response: failed
10,467,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,467,421 >>> mbox cmd response: failed
10,467,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,468,020 >>> mbox cmd response: failed
Initializing fuses
2,055,266 writing to cptra_bootfsm_go
2,244,685 UART:
2,245,032 UART: Running Caliptra ROM ...
2,246,175 UART:
2,246,351 UART: [state] CFI Enabled
2,318,791 UART: [state] LifecycleState = Unprovisioned
2,320,723 UART: [state] DebugLocked = No
2,323,089 UART: [state] WD Timer not started. Device not locked for debugging
2,326,247 UART: [kat] SHA2-256
2,505,880 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,516,699 UART: [kat] ++
2,517,195 UART: [kat] sha1
2,527,926 UART: [kat] SHA2-256
2,530,627 UART: [kat] SHA2-384
2,537,106 UART: [kat] SHA2-512-ACC
2,539,470 UART: [kat] ECC-384
5,001,112 UART: [kat] HMAC-384Kdf
5,025,297 UART: [kat] LMS
5,501,794 UART: [kat] --
5,506,493 UART: [cold-reset] ++
5,507,676 UART: [fht] FHT @ 0x50003400
5,518,171 UART: [idev] ++
5,518,749 UART: [idev] CDI.KEYID = 6
5,519,716 UART: [idev] SUBJECT.KEYID = 7
5,520,935 UART: [idev] UDS.KEYID = 0
5,523,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,672,924 UART: [idev] Erasing UDS.KEYID = 0
8,041,369 UART: [idev] Sha1 KeyId Algorithm
8,065,211 UART: [idev] --
8,070,077 UART: [ldev] ++
8,070,650 UART: [ldev] CDI.KEYID = 6
8,071,595 UART: [ldev] SUBJECT.KEYID = 5
8,072,815 UART: [ldev] AUTHORITY.KEYID = 7
8,074,061 UART: [ldev] FE.KEYID = 1
8,112,032 UART: [ldev] Erasing FE.KEYID = 1
10,623,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,355,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,371,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,387,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,402,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,423,525 UART: [ldev] --
12,429,374 UART: [fwproc] Wait for Commands...
12,431,473 UART: [fwproc] Recv command 0x46574c44
12,433,499 UART: [fwproc] Recv'd Img size: 118548 bytes
15,910,673 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,988,647 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,061,672 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,389,662 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,462,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,337,457 >>> mbox cmd response: failed
10,338,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,338,409 >>> mbox cmd response: failed
10,338,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,338,985 >>> mbox cmd response: failed
Initializing fuses
2,061,950 writing to cptra_bootfsm_go
5,517,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,296,888 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,966 writing to cptra_bootfsm_go
193,368 UART:
193,723 UART: Running Caliptra ROM ...
194,815 UART:
604,486 UART: [state] CFI Enabled
619,579 UART: [state] LifecycleState = Unprovisioned
621,503 UART: [state] DebugLocked = No
622,891 UART: [state] WD Timer not started. Device not locked for debugging
626,800 UART: [kat] SHA2-256
806,443 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,216 UART: [kat] ++
817,696 UART: [kat] sha1
828,306 UART: [kat] SHA2-256
830,995 UART: [kat] SHA2-384
837,409 UART: [kat] SHA2-512-ACC
839,809 UART: [kat] ECC-384
3,280,768 UART: [kat] HMAC-384Kdf
3,293,292 UART: [kat] LMS
3,769,782 UART: [kat] --
3,773,209 UART: [cold-reset] ++
3,774,667 UART: [fht] FHT @ 0x50003400
3,785,869 UART: [idev] ++
3,786,444 UART: [idev] CDI.KEYID = 6
3,787,386 UART: [idev] SUBJECT.KEYID = 7
3,788,655 UART: [idev] UDS.KEYID = 0
3,791,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,610 UART: [idev] Erasing UDS.KEYID = 0
6,268,805 UART: [idev] Sha1 KeyId Algorithm
6,293,283 UART: [idev] --
6,298,088 UART: [ldev] ++
6,298,719 UART: [ldev] CDI.KEYID = 6
6,299,608 UART: [ldev] SUBJECT.KEYID = 5
6,300,831 UART: [ldev] AUTHORITY.KEYID = 7
6,302,096 UART: [ldev] FE.KEYID = 1
6,315,187 UART: [ldev] Erasing FE.KEYID = 1
8,796,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,966 UART: [ldev] --
10,591,698 UART: [fwproc] Wait for Commands...
10,594,720 UART: [fwproc] Recv command 0x46574c44
10,596,712 UART: [fwproc] Recv'd Img size: 118548 bytes
10,686,636 UART: ROM Fatal Error: 0x000B0009
10,689,908 >>> mbox cmd response: failed
10,690,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,690,578 >>> mbox cmd response: failed
10,690,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,691,161 >>> mbox cmd response: failed
Initializing fuses
2,056,124 writing to cptra_bootfsm_go
2,245,408 UART:
2,245,747 UART: Running Caliptra ROM ...
2,246,996 UART:
9,769,800 UART: [state] CFI Enabled
9,783,108 UART: [state] LifecycleState = Unprovisioned
9,785,031 UART: [state] DebugLocked = No
9,786,915 UART: [state] WD Timer not started. Device not locked for debugging
9,790,071 UART: [kat] SHA2-256
9,969,729 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,980,534 UART: [kat] ++
9,981,045 UART: [kat] sha1
9,992,425 UART: [kat] SHA2-256
9,995,129 UART: [kat] SHA2-384
10,000,690 UART: [kat] SHA2-512-ACC
10,003,049 UART: [kat] ECC-384
12,448,352 UART: [kat] HMAC-384Kdf
12,461,819 UART: [kat] LMS
12,938,349 UART: [kat] --
12,943,764 UART: [cold-reset] ++
12,945,432 UART: [fht] FHT @ 0x50003400
12,958,091 UART: [idev] ++
12,958,658 UART: [idev] CDI.KEYID = 6
12,959,622 UART: [idev] SUBJECT.KEYID = 7
12,960,838 UART: [idev] UDS.KEYID = 0
12,963,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,112,691 UART: [idev] Erasing UDS.KEYID = 0
15,438,318 UART: [idev] Sha1 KeyId Algorithm
15,461,664 UART: [idev] --
15,466,147 UART: [ldev] ++
15,466,729 UART: [ldev] CDI.KEYID = 6
15,467,639 UART: [ldev] SUBJECT.KEYID = 5
15,468,859 UART: [ldev] AUTHORITY.KEYID = 7
15,470,096 UART: [ldev] FE.KEYID = 1
15,481,456 UART: [ldev] Erasing FE.KEYID = 1
17,961,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,682,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,698,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,714,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,729,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,751,665 UART: [ldev] --
19,756,447 UART: [fwproc] Wait for Commands...
19,759,518 UART: [fwproc] Recv command 0x46574c44
19,761,527 UART: [fwproc] Recv'd Img size: 118548 bytes
23,244,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,325,545 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,398,618 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,727,093 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
3,783,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,568,577 >>> mbox cmd response: failed
10,569,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,569,607 >>> mbox cmd response: failed
10,569,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,570,176 >>> mbox cmd response: failed
Initializing fuses
2,061,633 writing to cptra_bootfsm_go
13,077,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,727,455 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,085 UART:
192,457 UART: Running Caliptra ROM ...
193,607 UART:
193,761 UART: [state] CFI Enabled
262,356 UART: [state] LifecycleState = Unprovisioned
264,720 UART: [state] DebugLocked = No
266,164 UART: [state] WD Timer not started. Device not locked for debugging
270,564 UART: [kat] SHA2-256
460,489 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,258 UART: [kat] ++
471,739 UART: [kat] sha1
484,075 UART: [kat] SHA2-256
487,101 UART: [kat] SHA2-384
493,922 UART: [kat] SHA2-512-ACC
496,490 UART: [kat] ECC-384
2,945,104 UART: [kat] HMAC-384Kdf
2,969,944 UART: [kat] LMS
3,501,712 UART: [kat] --
3,504,918 UART: [cold-reset] ++
3,505,944 UART: [fht] FHT @ 0x50003400
3,517,691 UART: [idev] ++
3,518,372 UART: [idev] CDI.KEYID = 6
3,519,396 UART: [idev] SUBJECT.KEYID = 7
3,520,507 UART: [idev] UDS.KEYID = 0
3,523,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,800 UART: [idev] Erasing UDS.KEYID = 0
6,024,697 UART: [idev] Sha1 KeyId Algorithm
6,046,806 UART: [idev] --
6,051,378 UART: [ldev] ++
6,052,101 UART: [ldev] CDI.KEYID = 6
6,053,036 UART: [ldev] SUBJECT.KEYID = 5
6,054,152 UART: [ldev] AUTHORITY.KEYID = 7
6,055,335 UART: [ldev] FE.KEYID = 1
6,097,636 UART: [ldev] Erasing FE.KEYID = 1
8,603,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,468 UART: [ldev] --
10,411,960 UART: [fwproc] Wait for Commands...
10,413,522 UART: [fwproc] Recv command 0x46574c44
10,415,784 UART: [fwproc] Recv'd Img size: 118548 bytes
10,516,067 UART: ROM Fatal Error: 0x000B0009
10,519,761 >>> mbox cmd response: failed
10,520,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,520,553 >>> mbox cmd response: failed
10,520,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,069 >>> mbox cmd response: failed
Initializing fuses
2,054,280 writing to cptra_bootfsm_go
2,243,579 UART:
2,243,947 UART: Running Caliptra ROM ...
2,245,030 UART:
2,245,198 UART: [state] CFI Enabled
2,307,202 UART: [state] LifecycleState = Unprovisioned
2,309,601 UART: [state] DebugLocked = No
2,312,077 UART: [state] WD Timer not started. Device not locked for debugging
2,317,544 UART: [kat] SHA2-256
2,507,398 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,208 UART: [kat] ++
2,518,668 UART: [kat] sha1
2,531,078 UART: [kat] SHA2-256
2,534,105 UART: [kat] SHA2-384
2,540,319 UART: [kat] SHA2-512-ACC
2,542,895 UART: [kat] ECC-384
4,991,621 UART: [kat] HMAC-384Kdf
5,013,097 UART: [kat] LMS
5,544,873 UART: [kat] --
5,550,400 UART: [cold-reset] ++
5,551,638 UART: [fht] FHT @ 0x50003400
5,563,498 UART: [idev] ++
5,564,184 UART: [idev] CDI.KEYID = 6
5,565,127 UART: [idev] SUBJECT.KEYID = 7
5,566,363 UART: [idev] UDS.KEYID = 0
5,568,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,717,792 UART: [idev] Erasing UDS.KEYID = 0
8,070,562 UART: [idev] Sha1 KeyId Algorithm
8,093,306 UART: [idev] --
8,098,684 UART: [ldev] ++
8,099,381 UART: [ldev] CDI.KEYID = 6
8,100,273 UART: [ldev] SUBJECT.KEYID = 5
8,101,437 UART: [ldev] AUTHORITY.KEYID = 7
8,102,678 UART: [ldev] FE.KEYID = 1
8,141,767 UART: [ldev] Erasing FE.KEYID = 1
10,649,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,382,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,397,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,413,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,428,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,448,392 UART: [ldev] --
12,453,621 UART: [fwproc] Wait for Commands...
12,456,806 UART: [fwproc] Recv command 0x46574c44
12,459,071 UART: [fwproc] Recv'd Img size: 118548 bytes
15,957,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,031,675 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,155,305 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,715,417 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
3,441,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,299,026 >>> mbox cmd response: failed
10,299,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,299,979 >>> mbox cmd response: failed
10,300,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,300,543 >>> mbox cmd response: failed
Initializing fuses
2,049,548 writing to cptra_bootfsm_go
5,471,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,858,288 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,100 writing to cptra_bootfsm_go
193,263 UART:
193,639 UART: Running Caliptra ROM ...
194,827 UART:
604,390 UART: [state] CFI Enabled
619,631 UART: [state] LifecycleState = Unprovisioned
621,969 UART: [state] DebugLocked = No
623,681 UART: [state] WD Timer not started. Device not locked for debugging
627,816 UART: [kat] SHA2-256
817,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,459 UART: [kat] ++
828,969 UART: [kat] sha1
840,508 UART: [kat] SHA2-256
843,524 UART: [kat] SHA2-384
848,863 UART: [kat] SHA2-512-ACC
851,429 UART: [kat] ECC-384
3,293,191 UART: [kat] HMAC-384Kdf
3,306,797 UART: [kat] LMS
3,838,619 UART: [kat] --
3,843,386 UART: [cold-reset] ++
3,844,604 UART: [fht] FHT @ 0x50003400
3,857,122 UART: [idev] ++
3,857,865 UART: [idev] CDI.KEYID = 6
3,858,757 UART: [idev] SUBJECT.KEYID = 7
3,859,919 UART: [idev] UDS.KEYID = 0
3,862,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,042 UART: [idev] Erasing UDS.KEYID = 0
6,335,286 UART: [idev] Sha1 KeyId Algorithm
6,358,423 UART: [idev] --
6,363,558 UART: [ldev] ++
6,364,244 UART: [ldev] CDI.KEYID = 6
6,365,159 UART: [ldev] SUBJECT.KEYID = 5
6,366,331 UART: [ldev] AUTHORITY.KEYID = 7
6,367,516 UART: [ldev] FE.KEYID = 1
6,376,787 UART: [ldev] Erasing FE.KEYID = 1
8,854,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,882 UART: [ldev] --
10,646,676 UART: [fwproc] Wait for Commands...
10,649,604 UART: [fwproc] Recv command 0x46574c44
10,651,935 UART: [fwproc] Recv'd Img size: 118548 bytes
10,750,276 UART: ROM Fatal Error: 0x000B0009
10,753,966 >>> mbox cmd response: failed
10,754,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,754,738 >>> mbox cmd response: failed
10,755,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,755,365 >>> mbox cmd response: failed
Initializing fuses
2,055,069 writing to cptra_bootfsm_go
2,244,373 UART:
2,244,728 UART: Running Caliptra ROM ...
2,245,808 UART:
9,692,671 UART: [state] CFI Enabled
9,708,760 UART: [state] LifecycleState = Unprovisioned
9,711,180 UART: [state] DebugLocked = No
9,713,522 UART: [state] WD Timer not started. Device not locked for debugging
9,717,726 UART: [kat] SHA2-256
9,907,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,918,424 UART: [kat] ++
9,918,894 UART: [kat] sha1
9,929,809 UART: [kat] SHA2-256
9,932,835 UART: [kat] SHA2-384
9,938,951 UART: [kat] SHA2-512-ACC
9,941,577 UART: [kat] ECC-384
12,382,122 UART: [kat] HMAC-384Kdf
12,396,247 UART: [kat] LMS
12,928,053 UART: [kat] --
12,932,303 UART: [cold-reset] ++
12,934,404 UART: [fht] FHT @ 0x50003400
12,946,369 UART: [idev] ++
12,947,043 UART: [idev] CDI.KEYID = 6
12,947,984 UART: [idev] SUBJECT.KEYID = 7
12,949,257 UART: [idev] UDS.KEYID = 0
12,951,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,100,519 UART: [idev] Erasing UDS.KEYID = 0
15,432,026 UART: [idev] Sha1 KeyId Algorithm
15,454,057 UART: [idev] --
15,457,742 UART: [ldev] ++
15,458,430 UART: [ldev] CDI.KEYID = 6
15,459,320 UART: [ldev] SUBJECT.KEYID = 5
15,460,490 UART: [ldev] AUTHORITY.KEYID = 7
15,461,727 UART: [ldev] FE.KEYID = 1
15,471,652 UART: [ldev] Erasing FE.KEYID = 1
17,948,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,665,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,680,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,695,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,710,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,730,184 UART: [ldev] --
19,734,875 UART: [fwproc] Wait for Commands...
19,737,308 UART: [fwproc] Recv command 0x46574c44
19,739,579 UART: [fwproc] Recv'd Img size: 118548 bytes
23,235,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,314,726 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,438,314 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,999,086 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,755,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,552,362 >>> mbox cmd response: failed
10,552,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,553,257 >>> mbox cmd response: failed
10,553,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,553,844 >>> mbox cmd response: failed
Initializing fuses
2,053,067 writing to cptra_bootfsm_go
13,068,357 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,355,410 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,610 UART: [state] LifecycleState = Unprovisioned
86,265 UART: [state] DebugLocked = No
86,845 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,487 UART: [kat] SHA2-256
882,418 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,533 UART: [kat] ++
886,685 UART: [kat] sha1
890,805 UART: [kat] SHA2-256
892,743 UART: [kat] SHA2-384
895,522 UART: [kat] SHA2-512-ACC
897,423 UART: [kat] ECC-384
903,258 UART: [kat] HMAC-384Kdf
907,626 UART: [kat] LMS
1,475,822 UART: [kat] --
1,476,671 UART: [cold-reset] ++
1,477,145 UART: [fht] Storing FHT @ 0x50003400
1,479,926 UART: [idev] ++
1,480,094 UART: [idev] CDI.KEYID = 6
1,480,454 UART: [idev] SUBJECT.KEYID = 7
1,480,878 UART: [idev] UDS.KEYID = 0
1,481,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,908 UART: [idev] Erasing UDS.KEYID = 0
1,505,342 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,792 UART: [idev] --
1,514,885 UART: [ldev] ++
1,515,053 UART: [ldev] CDI.KEYID = 6
1,515,416 UART: [ldev] SUBJECT.KEYID = 5
1,515,842 UART: [ldev] AUTHORITY.KEYID = 7
1,516,305 UART: [ldev] FE.KEYID = 1
1,521,435 UART: [ldev] Erasing FE.KEYID = 1
1,546,518 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,526 UART: [ldev] --
1,585,905 UART: [fwproc] Waiting for Commands...
1,586,582 UART: [fwproc] Received command 0x46574c44
1,587,373 UART: [fwproc] Received Image of size 118548 bytes
1,613,261 UART: ROM Fatal Error: 0x000B0009
1,614,418 >>> mbox cmd response: failed
1,614,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,424 >>> mbox cmd response: failed
1,614,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,430 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,245 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,849 UART: [kat] SHA2-256
881,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,895 UART: [kat] ++
886,047 UART: [kat] sha1
890,285 UART: [kat] SHA2-256
892,223 UART: [kat] SHA2-384
894,938 UART: [kat] SHA2-512-ACC
896,839 UART: [kat] ECC-384
902,376 UART: [kat] HMAC-384Kdf
906,926 UART: [kat] LMS
1,475,122 UART: [kat] --
1,475,987 UART: [cold-reset] ++
1,476,381 UART: [fht] Storing FHT @ 0x50003400
1,479,126 UART: [idev] ++
1,479,294 UART: [idev] CDI.KEYID = 6
1,479,654 UART: [idev] SUBJECT.KEYID = 7
1,480,078 UART: [idev] UDS.KEYID = 0
1,480,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,204 UART: [idev] Erasing UDS.KEYID = 0
1,504,520 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,276 UART: [idev] --
1,514,377 UART: [ldev] ++
1,514,545 UART: [ldev] CDI.KEYID = 6
1,514,908 UART: [ldev] SUBJECT.KEYID = 5
1,515,334 UART: [ldev] AUTHORITY.KEYID = 7
1,515,797 UART: [ldev] FE.KEYID = 1
1,520,709 UART: [ldev] Erasing FE.KEYID = 1
1,546,020 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,524 UART: [ldev] --
1,585,007 UART: [fwproc] Waiting for Commands...
1,585,832 UART: [fwproc] Received command 0x46574c44
1,586,623 UART: [fwproc] Received Image of size 118548 bytes
2,932,224 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,540 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,758 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,109 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,466,171 >>> mbox cmd response: failed
1,466,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,177 >>> mbox cmd response: failed
1,466,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,183 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,539 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
87,010 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,538 UART: [kat] SHA2-256
882,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,584 UART: [kat] ++
886,736 UART: [kat] sha1
890,860 UART: [kat] SHA2-256
892,798 UART: [kat] SHA2-384
895,397 UART: [kat] SHA2-512-ACC
897,298 UART: [kat] ECC-384
902,571 UART: [kat] HMAC-384Kdf
907,151 UART: [kat] LMS
1,475,347 UART: [kat] --
1,476,354 UART: [cold-reset] ++
1,476,802 UART: [fht] Storing FHT @ 0x50003400
1,479,781 UART: [idev] ++
1,479,949 UART: [idev] CDI.KEYID = 6
1,480,309 UART: [idev] SUBJECT.KEYID = 7
1,480,733 UART: [idev] UDS.KEYID = 0
1,481,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,587 UART: [idev] Erasing UDS.KEYID = 0
1,505,263 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,977 UART: [idev] --
1,515,090 UART: [ldev] ++
1,515,258 UART: [ldev] CDI.KEYID = 6
1,515,621 UART: [ldev] SUBJECT.KEYID = 5
1,516,047 UART: [ldev] AUTHORITY.KEYID = 7
1,516,510 UART: [ldev] FE.KEYID = 1
1,522,122 UART: [ldev] Erasing FE.KEYID = 1
1,547,297 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,005 UART: [ldev] --
1,586,412 UART: [fwproc] Waiting for Commands...
1,587,269 UART: [fwproc] Received command 0x46574c44
1,588,060 UART: [fwproc] Received Image of size 118548 bytes
1,613,208 UART: ROM Fatal Error: 0x000B0009
1,614,365 >>> mbox cmd response: failed
1,614,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,371 >>> mbox cmd response: failed
1,614,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,377 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,043 UART: [state] LifecycleState = Unprovisioned
85,698 UART: [state] DebugLocked = No
86,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,072 UART: [kat] SHA2-256
882,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,118 UART: [kat] ++
886,270 UART: [kat] sha1
890,624 UART: [kat] SHA2-256
892,562 UART: [kat] SHA2-384
895,349 UART: [kat] SHA2-512-ACC
897,250 UART: [kat] ECC-384
902,927 UART: [kat] HMAC-384Kdf
907,547 UART: [kat] LMS
1,475,743 UART: [kat] --
1,476,796 UART: [cold-reset] ++
1,477,358 UART: [fht] Storing FHT @ 0x50003400
1,480,173 UART: [idev] ++
1,480,341 UART: [idev] CDI.KEYID = 6
1,480,701 UART: [idev] SUBJECT.KEYID = 7
1,481,125 UART: [idev] UDS.KEYID = 0
1,481,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,943 UART: [idev] Erasing UDS.KEYID = 0
1,505,587 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,111 UART: [idev] --
1,515,024 UART: [ldev] ++
1,515,192 UART: [ldev] CDI.KEYID = 6
1,515,555 UART: [ldev] SUBJECT.KEYID = 5
1,515,981 UART: [ldev] AUTHORITY.KEYID = 7
1,516,444 UART: [ldev] FE.KEYID = 1
1,521,526 UART: [ldev] Erasing FE.KEYID = 1
1,546,819 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,909 UART: [ldev] --
1,586,372 UART: [fwproc] Waiting for Commands...
1,587,157 UART: [fwproc] Received command 0x46574c44
1,587,948 UART: [fwproc] Received Image of size 118548 bytes
2,931,115 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,215 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,433 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,798 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,464,942 >>> mbox cmd response: failed
1,464,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,948 >>> mbox cmd response: failed
1,464,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,954 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,314 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,666 UART: [state] LifecycleState = Unprovisioned
86,321 UART: [state] DebugLocked = No
86,993 UART: [state] WD Timer not started. Device not locked for debugging
88,242 UART: [kat] SHA2-256
891,792 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,896 UART: [kat] ++
896,048 UART: [kat] sha1
900,332 UART: [kat] SHA2-256
902,272 UART: [kat] SHA2-384
904,945 UART: [kat] SHA2-512-ACC
906,846 UART: [kat] ECC-384
916,447 UART: [kat] HMAC-384Kdf
920,959 UART: [kat] LMS
1,169,271 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,602 UART: [fht] FHT @ 0x50003400
1,173,322 UART: [idev] ++
1,173,490 UART: [idev] CDI.KEYID = 6
1,173,851 UART: [idev] SUBJECT.KEYID = 7
1,174,276 UART: [idev] UDS.KEYID = 0
1,174,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,165 UART: [idev] Erasing UDS.KEYID = 0
1,199,583 UART: [idev] Sha1 KeyId Algorithm
1,208,439 UART: [idev] --
1,209,488 UART: [ldev] ++
1,209,656 UART: [ldev] CDI.KEYID = 6
1,210,020 UART: [ldev] SUBJECT.KEYID = 5
1,210,447 UART: [ldev] AUTHORITY.KEYID = 7
1,210,910 UART: [ldev] FE.KEYID = 1
1,216,060 UART: [ldev] Erasing FE.KEYID = 1
1,242,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,620 UART: [ldev] --
1,281,993 UART: [fwproc] Wait for Commands...
1,282,794 UART: [fwproc] Recv command 0x46574c44
1,283,527 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,746 UART: ROM Fatal Error: 0x000B0009
1,309,903 >>> mbox cmd response: failed
1,309,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,909 >>> mbox cmd response: failed
1,309,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,915 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,648 UART: [kat] SHA2-256
901,588 UART: [kat] SHA2-384
904,227 UART: [kat] SHA2-512-ACC
906,128 UART: [kat] ECC-384
915,293 UART: [kat] HMAC-384Kdf
919,927 UART: [kat] LMS
1,168,239 UART: [kat] --
1,169,294 UART: [cold-reset] ++
1,169,834 UART: [fht] FHT @ 0x50003400
1,172,588 UART: [idev] ++
1,172,756 UART: [idev] CDI.KEYID = 6
1,173,117 UART: [idev] SUBJECT.KEYID = 7
1,173,542 UART: [idev] UDS.KEYID = 0
1,173,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,779 UART: [idev] Erasing UDS.KEYID = 0
1,198,985 UART: [idev] Sha1 KeyId Algorithm
1,207,949 UART: [idev] --
1,209,062 UART: [ldev] ++
1,209,230 UART: [ldev] CDI.KEYID = 6
1,209,594 UART: [ldev] SUBJECT.KEYID = 5
1,210,021 UART: [ldev] AUTHORITY.KEYID = 7
1,210,484 UART: [ldev] FE.KEYID = 1
1,215,670 UART: [ldev] Erasing FE.KEYID = 1
1,242,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,260 UART: [ldev] --
1,281,543 UART: [fwproc] Wait for Commands...
1,282,134 UART: [fwproc] Recv command 0x46574c44
1,282,867 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,860 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,035 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,306 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,354 >>> mbox cmd response: failed
1,164,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,360 >>> mbox cmd response: failed
1,164,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,467 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,763 UART: [kat] ++
895,915 UART: [kat] sha1
899,993 UART: [kat] SHA2-256
901,933 UART: [kat] SHA2-384
904,638 UART: [kat] SHA2-512-ACC
906,539 UART: [kat] ECC-384
916,516 UART: [kat] HMAC-384Kdf
921,084 UART: [kat] LMS
1,169,396 UART: [kat] --
1,170,003 UART: [cold-reset] ++
1,170,481 UART: [fht] FHT @ 0x50003400
1,173,165 UART: [idev] ++
1,173,333 UART: [idev] CDI.KEYID = 6
1,173,694 UART: [idev] SUBJECT.KEYID = 7
1,174,119 UART: [idev] UDS.KEYID = 0
1,174,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,054 UART: [idev] Erasing UDS.KEYID = 0
1,199,350 UART: [idev] Sha1 KeyId Algorithm
1,208,200 UART: [idev] --
1,209,157 UART: [ldev] ++
1,209,325 UART: [ldev] CDI.KEYID = 6
1,209,689 UART: [ldev] SUBJECT.KEYID = 5
1,210,116 UART: [ldev] AUTHORITY.KEYID = 7
1,210,579 UART: [ldev] FE.KEYID = 1
1,215,641 UART: [ldev] Erasing FE.KEYID = 1
1,242,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,011 UART: [ldev] --
1,281,294 UART: [fwproc] Wait for Commands...
1,281,999 UART: [fwproc] Recv command 0x46574c44
1,282,732 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,071 UART: ROM Fatal Error: 0x000B0009
1,309,228 >>> mbox cmd response: failed
1,309,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,234 >>> mbox cmd response: failed
1,309,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,777 UART: [kat] ++
895,929 UART: [kat] sha1
900,191 UART: [kat] SHA2-256
902,131 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,340 UART: [kat] HMAC-384Kdf
921,098 UART: [kat] LMS
1,169,410 UART: [kat] --
1,170,153 UART: [cold-reset] ++
1,170,539 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,020 UART: [idev] Erasing UDS.KEYID = 0
1,199,254 UART: [idev] Sha1 KeyId Algorithm
1,208,082 UART: [idev] --
1,209,211 UART: [ldev] ++
1,209,379 UART: [ldev] CDI.KEYID = 6
1,209,743 UART: [ldev] SUBJECT.KEYID = 5
1,210,170 UART: [ldev] AUTHORITY.KEYID = 7
1,210,633 UART: [ldev] FE.KEYID = 1
1,215,541 UART: [ldev] Erasing FE.KEYID = 1
1,241,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,691 UART: [ldev] --
1,280,936 UART: [fwproc] Wait for Commands...
1,281,693 UART: [fwproc] Recv command 0x46574c44
1,282,426 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,981 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,156 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,519 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,653 >>> mbox cmd response: failed
1,164,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,659 >>> mbox cmd response: failed
1,164,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,665 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,736 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
893,392 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,517 UART: [kat] ++
897,669 UART: [kat] sha1
902,069 UART: [kat] SHA2-256
904,009 UART: [kat] SHA2-384
906,846 UART: [kat] SHA2-512-ACC
908,747 UART: [kat] ECC-384
918,208 UART: [kat] HMAC-384Kdf
922,760 UART: [kat] LMS
1,171,088 UART: [kat] --
1,171,815 UART: [cold-reset] ++
1,172,387 UART: [fht] FHT @ 0x50003400
1,175,030 UART: [idev] ++
1,175,198 UART: [idev] CDI.KEYID = 6
1,175,558 UART: [idev] SUBJECT.KEYID = 7
1,175,982 UART: [idev] UDS.KEYID = 0
1,176,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,926 UART: [idev] Erasing UDS.KEYID = 0
1,200,601 UART: [idev] Sha1 KeyId Algorithm
1,209,061 UART: [idev] --
1,210,249 UART: [ldev] ++
1,210,417 UART: [ldev] CDI.KEYID = 6
1,210,780 UART: [ldev] SUBJECT.KEYID = 5
1,211,206 UART: [ldev] AUTHORITY.KEYID = 7
1,211,669 UART: [ldev] FE.KEYID = 1
1,216,885 UART: [ldev] Erasing FE.KEYID = 1
1,243,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,095 UART: [ldev] --
1,282,434 UART: [fwproc] Wait for Commands...
1,283,174 UART: [fwproc] Recv command 0x46574c44
1,283,902 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,322 UART: ROM Fatal Error: 0x000B0009
1,310,479 >>> mbox cmd response: failed
1,310,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,485 >>> mbox cmd response: failed
1,310,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
893,116 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,241 UART: [kat] ++
897,393 UART: [kat] sha1
901,637 UART: [kat] SHA2-256
903,577 UART: [kat] SHA2-384
906,318 UART: [kat] SHA2-512-ACC
908,219 UART: [kat] ECC-384
918,132 UART: [kat] HMAC-384Kdf
922,600 UART: [kat] LMS
1,170,928 UART: [kat] --
1,171,839 UART: [cold-reset] ++
1,172,245 UART: [fht] FHT @ 0x50003400
1,175,010 UART: [idev] ++
1,175,178 UART: [idev] CDI.KEYID = 6
1,175,538 UART: [idev] SUBJECT.KEYID = 7
1,175,962 UART: [idev] UDS.KEYID = 0
1,176,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,988 UART: [idev] Erasing UDS.KEYID = 0
1,201,411 UART: [idev] Sha1 KeyId Algorithm
1,209,823 UART: [idev] --
1,211,023 UART: [ldev] ++
1,211,191 UART: [ldev] CDI.KEYID = 6
1,211,554 UART: [ldev] SUBJECT.KEYID = 5
1,211,980 UART: [ldev] AUTHORITY.KEYID = 7
1,212,443 UART: [ldev] FE.KEYID = 1
1,217,427 UART: [ldev] Erasing FE.KEYID = 1
1,243,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,399 UART: [ldev] --
1,282,874 UART: [fwproc] Wait for Commands...
1,283,486 UART: [fwproc] Recv command 0x46574c44
1,284,214 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,953 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,123 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,402 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,178 >>> mbox cmd response: failed
1,165,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,184 >>> mbox cmd response: failed
1,165,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,190 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,995 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
893,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,726 UART: [kat] ++
897,878 UART: [kat] sha1
902,216 UART: [kat] SHA2-256
904,156 UART: [kat] SHA2-384
906,837 UART: [kat] SHA2-512-ACC
908,738 UART: [kat] ECC-384
918,563 UART: [kat] HMAC-384Kdf
922,993 UART: [kat] LMS
1,171,321 UART: [kat] --
1,172,252 UART: [cold-reset] ++
1,172,798 UART: [fht] FHT @ 0x50003400
1,175,489 UART: [idev] ++
1,175,657 UART: [idev] CDI.KEYID = 6
1,176,017 UART: [idev] SUBJECT.KEYID = 7
1,176,441 UART: [idev] UDS.KEYID = 0
1,176,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,557 UART: [idev] Erasing UDS.KEYID = 0
1,202,360 UART: [idev] Sha1 KeyId Algorithm
1,210,970 UART: [idev] --
1,211,910 UART: [ldev] ++
1,212,078 UART: [ldev] CDI.KEYID = 6
1,212,441 UART: [ldev] SUBJECT.KEYID = 5
1,212,867 UART: [ldev] AUTHORITY.KEYID = 7
1,213,330 UART: [ldev] FE.KEYID = 1
1,218,198 UART: [ldev] Erasing FE.KEYID = 1
1,244,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,970 UART: [ldev] --
1,283,471 UART: [fwproc] Wait for Commands...
1,284,277 UART: [fwproc] Recv command 0x46574c44
1,285,005 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,731 UART: ROM Fatal Error: 0x000B0009
1,311,888 >>> mbox cmd response: failed
1,311,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,894 >>> mbox cmd response: failed
1,311,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
893,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,840 UART: [kat] ++
897,992 UART: [kat] sha1
902,094 UART: [kat] SHA2-256
904,034 UART: [kat] SHA2-384
907,003 UART: [kat] SHA2-512-ACC
908,904 UART: [kat] ECC-384
918,777 UART: [kat] HMAC-384Kdf
923,453 UART: [kat] LMS
1,171,781 UART: [kat] --
1,172,648 UART: [cold-reset] ++
1,173,064 UART: [fht] FHT @ 0x50003400
1,175,781 UART: [idev] ++
1,175,949 UART: [idev] CDI.KEYID = 6
1,176,309 UART: [idev] SUBJECT.KEYID = 7
1,176,733 UART: [idev] UDS.KEYID = 0
1,177,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,285 UART: [idev] Erasing UDS.KEYID = 0
1,202,322 UART: [idev] Sha1 KeyId Algorithm
1,211,000 UART: [idev] --
1,212,012 UART: [ldev] ++
1,212,180 UART: [ldev] CDI.KEYID = 6
1,212,543 UART: [ldev] SUBJECT.KEYID = 5
1,212,969 UART: [ldev] AUTHORITY.KEYID = 7
1,213,432 UART: [ldev] FE.KEYID = 1
1,218,446 UART: [ldev] Erasing FE.KEYID = 1
1,245,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,236 UART: [ldev] --
1,284,689 UART: [fwproc] Wait for Commands...
1,285,321 UART: [fwproc] Recv command 0x46574c44
1,286,049 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,824 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,994 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,277 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,679 >>> mbox cmd response: failed
1,165,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,685 >>> mbox cmd response: failed
1,165,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,691 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,586 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,257 UART:
192,623 UART: Running Caliptra ROM ...
193,804 UART:
193,979 UART: [state] CFI Enabled
264,268 UART: [state] LifecycleState = Unprovisioned
266,246 UART: [state] DebugLocked = No
268,063 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,764 UART: [kat] SHA2-256
443,432 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,941 UART: [kat] ++
454,422 UART: [kat] sha1
464,112 UART: [kat] SHA2-256
466,799 UART: [kat] SHA2-384
472,189 UART: [kat] SHA2-512-ACC
474,533 UART: [kat] ECC-384
2,766,450 UART: [kat] HMAC-384Kdf
2,777,881 UART: [kat] LMS
3,968,198 UART: [kat] --
3,974,129 UART: [cold-reset] ++
3,975,715 UART: [fht] Storing FHT @ 0x50003400
3,986,395 UART: [idev] ++
3,986,966 UART: [idev] CDI.KEYID = 6
3,987,879 UART: [idev] SUBJECT.KEYID = 7
3,989,149 UART: [idev] UDS.KEYID = 0
3,992,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,660 UART: [idev] Erasing UDS.KEYID = 0
7,323,141 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,934 UART: [idev] --
7,347,712 UART: [ldev] ++
7,348,310 UART: [ldev] CDI.KEYID = 6
7,349,200 UART: [ldev] SUBJECT.KEYID = 5
7,350,424 UART: [ldev] AUTHORITY.KEYID = 7
7,351,715 UART: [ldev] FE.KEYID = 1
7,380,622 UART: [ldev] Erasing FE.KEYID = 1
10,713,816 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,452 UART: [ldev] --
13,093,219 UART: [fwproc] Waiting for Commands...
13,096,249 UART: [fwproc] Received command 0x46574c44
13,098,460 UART: [fwproc] Received Image of size 118548 bytes
14,491,819 UART: ROM Fatal Error: 0x000B000C
14,495,330 >>> mbox cmd response: failed
14,495,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,496,055 >>> mbox cmd response: failed
14,496,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,496,632 >>> mbox cmd response: failed
Initializing fuses
2,059,638 writing to cptra_bootfsm_go
2,248,950 UART:
2,249,290 UART: Running Caliptra ROM ...
2,250,433 UART:
2,250,601 UART: [state] CFI Enabled
2,318,353 UART: [state] LifecycleState = Unprovisioned
2,320,295 UART: [state] DebugLocked = No
2,322,771 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,327,569 UART: [kat] SHA2-256
2,497,289 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,507,759 UART: [kat] ++
2,508,259 UART: [kat] sha1
2,520,497 UART: [kat] SHA2-256
2,523,181 UART: [kat] SHA2-384
2,528,552 UART: [kat] SHA2-512-ACC
2,530,910 UART: [kat] ECC-384
4,821,177 UART: [kat] HMAC-384Kdf
4,853,777 UART: [kat] LMS
6,044,104 UART: [kat] --
6,050,070 UART: [cold-reset] ++
6,051,321 UART: [fht] Storing FHT @ 0x50003400
6,063,946 UART: [idev] ++
6,064,571 UART: [idev] CDI.KEYID = 6
6,065,463 UART: [idev] SUBJECT.KEYID = 7
6,066,735 UART: [idev] UDS.KEYID = 0
6,069,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,218,264 UART: [idev] Erasing UDS.KEYID = 0
9,399,362 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,972 UART: [idev] --
9,425,454 UART: [ldev] ++
9,426,109 UART: [ldev] CDI.KEYID = 6
9,427,027 UART: [ldev] SUBJECT.KEYID = 5
9,428,243 UART: [ldev] AUTHORITY.KEYID = 7
9,429,483 UART: [ldev] FE.KEYID = 1
9,475,474 UART: [ldev] Erasing FE.KEYID = 1
12,808,118 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,102,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,117,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,132,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,146,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,165,842 UART: [ldev] --
15,171,226 UART: [fwproc] Waiting for Commands...
15,172,955 UART: [fwproc] Received command 0x46574c44
15,175,205 UART: [fwproc] Received Image of size 118548 bytes
19,284,641 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,361,162 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,434,374 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,763,049 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,805,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,228,951 >>> mbox cmd response: failed
14,229,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,229,898 >>> mbox cmd response: failed
14,230,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,230,470 >>> mbox cmd response: failed
Initializing fuses
2,051,183 writing to cptra_bootfsm_go
5,853,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,026,188 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,532 UART:
192,897 UART: Running Caliptra ROM ...
194,021 UART:
603,912 UART: [state] CFI Enabled
619,510 UART: [state] LifecycleState = Unprovisioned
621,523 UART: [state] DebugLocked = No
623,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,577 UART: [kat] SHA2-256
798,339 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,863 UART: [kat] ++
809,341 UART: [kat] sha1
820,706 UART: [kat] SHA2-256
823,409 UART: [kat] SHA2-384
829,775 UART: [kat] SHA2-512-ACC
832,126 UART: [kat] ECC-384
3,117,793 UART: [kat] HMAC-384Kdf
3,129,991 UART: [kat] LMS
4,320,106 UART: [kat] --
4,324,356 UART: [cold-reset] ++
4,326,571 UART: [fht] Storing FHT @ 0x50003400
4,337,319 UART: [idev] ++
4,337,949 UART: [idev] CDI.KEYID = 6
4,338,871 UART: [idev] SUBJECT.KEYID = 7
4,340,094 UART: [idev] UDS.KEYID = 0
4,343,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,381 UART: [idev] Erasing UDS.KEYID = 0
7,630,962 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,907 UART: [idev] --
7,656,875 UART: [ldev] ++
7,657,461 UART: [ldev] CDI.KEYID = 6
7,658,379 UART: [ldev] SUBJECT.KEYID = 5
7,659,603 UART: [ldev] AUTHORITY.KEYID = 7
7,660,846 UART: [ldev] FE.KEYID = 1
7,670,155 UART: [ldev] Erasing FE.KEYID = 1
10,957,830 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,627 UART: [ldev] --
13,318,954 UART: [fwproc] Waiting for Commands...
13,322,248 UART: [fwproc] Received command 0x46574c44
13,324,447 UART: [fwproc] Received Image of size 118548 bytes
14,719,866 UART: ROM Fatal Error: 0x000B000C
14,723,314 >>> mbox cmd response: failed
14,723,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,724,096 >>> mbox cmd response: failed
14,724,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,724,670 >>> mbox cmd response: failed
Initializing fuses
2,058,518 writing to cptra_bootfsm_go
2,247,827 UART:
2,248,158 UART: Running Caliptra ROM ...
2,249,299 UART:
5,744,532 UART: [state] CFI Enabled
5,760,403 UART: [state] LifecycleState = Unprovisioned
5,762,323 UART: [state] DebugLocked = No
5,765,032 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,770,483 UART: [kat] SHA2-256
5,940,223 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,950,735 UART: [kat] ++
5,951,284 UART: [kat] sha1
5,962,831 UART: [kat] SHA2-256
5,965,571 UART: [kat] SHA2-384
5,971,570 UART: [kat] SHA2-512-ACC
5,973,926 UART: [kat] ECC-384
8,257,662 UART: [kat] HMAC-384Kdf
8,270,068 UART: [kat] LMS
9,460,138 UART: [kat] --
9,464,257 UART: [cold-reset] ++
9,465,719 UART: [fht] Storing FHT @ 0x50003400
9,477,860 UART: [idev] ++
9,478,430 UART: [idev] CDI.KEYID = 6
9,479,387 UART: [idev] SUBJECT.KEYID = 7
9,480,814 UART: [idev] UDS.KEYID = 0
9,483,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,632,018 UART: [idev] Erasing UDS.KEYID = 0
12,768,919 UART: [idev] Using Sha1 for KeyId Algorithm
12,789,840 UART: [idev] --
12,794,644 UART: [ldev] ++
12,795,219 UART: [ldev] CDI.KEYID = 6
12,796,190 UART: [ldev] SUBJECT.KEYID = 5
12,797,412 UART: [ldev] AUTHORITY.KEYID = 7
12,798,661 UART: [ldev] FE.KEYID = 1
12,809,561 UART: [ldev] Erasing FE.KEYID = 1
16,097,299 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,387,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,402,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,417,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,431,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,450,779 UART: [ldev] --
18,456,168 UART: [fwproc] Waiting for Commands...
18,459,083 UART: [fwproc] Received command 0x46574c44
18,461,284 UART: [fwproc] Received Image of size 118548 bytes
22,563,222 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,642,599 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,715,789 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,044,711 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
4,132,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,439 >>> mbox cmd response: failed
14,449,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,449,345 >>> mbox cmd response: failed
14,449,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,449,920 >>> mbox cmd response: failed
Initializing fuses
2,049,377 writing to cptra_bootfsm_go
9,549,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,575,056 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
192,363 UART:
192,718 UART: Running Caliptra ROM ...
193,898 UART:
194,056 UART: [state] CFI Enabled
259,965 UART: [state] LifecycleState = Unprovisioned
261,929 UART: [state] DebugLocked = No
263,212 UART: [state] WD Timer not started. Device not locked for debugging
267,496 UART: [kat] SHA2-256
447,190 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,969 UART: [kat] ++
458,478 UART: [kat] sha1
469,802 UART: [kat] SHA2-256
472,488 UART: [kat] SHA2-384
477,299 UART: [kat] SHA2-512-ACC
479,647 UART: [kat] ECC-384
2,924,838 UART: [kat] HMAC-384Kdf
2,949,151 UART: [kat] LMS
3,425,656 UART: [kat] --
3,430,400 UART: [cold-reset] ++
3,432,550 UART: [fht] FHT @ 0x50003400
3,443,420 UART: [idev] ++
3,444,006 UART: [idev] CDI.KEYID = 6
3,444,926 UART: [idev] SUBJECT.KEYID = 7
3,446,201 UART: [idev] UDS.KEYID = 0
3,449,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,511 UART: [idev] Erasing UDS.KEYID = 0
5,966,458 UART: [idev] Sha1 KeyId Algorithm
5,989,706 UART: [idev] --
5,994,392 UART: [ldev] ++
5,994,981 UART: [ldev] CDI.KEYID = 6
5,995,898 UART: [ldev] SUBJECT.KEYID = 5
5,997,118 UART: [ldev] AUTHORITY.KEYID = 7
5,998,355 UART: [ldev] FE.KEYID = 1
6,036,765 UART: [ldev] Erasing FE.KEYID = 1
8,542,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,180 UART: [ldev] --
10,352,149 UART: [fwproc] Wait for Commands...
10,354,745 UART: [fwproc] Recv command 0x46574c44
10,356,739 UART: [fwproc] Recv'd Img size: 118548 bytes
11,435,263 UART: ROM Fatal Error: 0x000B000C
11,438,486 >>> mbox cmd response: failed
11,438,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,439,246 >>> mbox cmd response: failed
11,439,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,439,820 >>> mbox cmd response: failed
Initializing fuses
2,055,019 writing to cptra_bootfsm_go
2,244,373 UART:
2,244,733 UART: Running Caliptra ROM ...
2,245,870 UART:
2,246,042 UART: [state] CFI Enabled
2,306,085 UART: [state] LifecycleState = Unprovisioned
2,308,041 UART: [state] DebugLocked = No
2,310,380 UART: [state] WD Timer not started. Device not locked for debugging
2,313,864 UART: [kat] SHA2-256
2,493,559 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,504,331 UART: [kat] ++
2,504,798 UART: [kat] sha1
2,515,848 UART: [kat] SHA2-256
2,518,556 UART: [kat] SHA2-384
2,525,257 UART: [kat] SHA2-512-ACC
2,527,617 UART: [kat] ECC-384
4,992,502 UART: [kat] HMAC-384Kdf
5,014,747 UART: [kat] LMS
5,491,241 UART: [kat] --
5,495,013 UART: [cold-reset] ++
5,496,687 UART: [fht] FHT @ 0x50003400
5,508,135 UART: [idev] ++
5,508,767 UART: [idev] CDI.KEYID = 6
5,509,700 UART: [idev] SUBJECT.KEYID = 7
5,510,926 UART: [idev] UDS.KEYID = 0
5,513,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,663,071 UART: [idev] Erasing UDS.KEYID = 0
8,032,131 UART: [idev] Sha1 KeyId Algorithm
8,055,581 UART: [idev] --
8,061,203 UART: [ldev] ++
8,061,778 UART: [ldev] CDI.KEYID = 6
8,062,877 UART: [ldev] SUBJECT.KEYID = 5
8,064,033 UART: [ldev] AUTHORITY.KEYID = 7
8,065,226 UART: [ldev] FE.KEYID = 1
8,100,725 UART: [ldev] Erasing FE.KEYID = 1
10,605,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,341,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,357,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,373,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,389,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,410,143 UART: [ldev] --
12,415,525 UART: [fwproc] Wait for Commands...
12,418,502 UART: [fwproc] Recv command 0x46574c44
12,420,501 UART: [fwproc] Recv'd Img size: 118548 bytes
15,910,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,647 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,067,664 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,395,680 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,462,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,327,739 >>> mbox cmd response: failed
11,328,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,328,655 >>> mbox cmd response: failed
11,328,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,329,230 >>> mbox cmd response: failed
Initializing fuses
2,057,783 writing to cptra_bootfsm_go
5,506,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,260,758 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
192,542 UART:
193,008 UART: Running Caliptra ROM ...
194,141 UART:
603,871 UART: [state] CFI Enabled
617,121 UART: [state] LifecycleState = Unprovisioned
619,047 UART: [state] DebugLocked = No
621,862 UART: [state] WD Timer not started. Device not locked for debugging
626,040 UART: [kat] SHA2-256
805,688 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,483 UART: [kat] ++
816,940 UART: [kat] sha1
828,196 UART: [kat] SHA2-256
830,887 UART: [kat] SHA2-384
836,382 UART: [kat] SHA2-512-ACC
838,734 UART: [kat] ECC-384
3,278,118 UART: [kat] HMAC-384Kdf
3,290,642 UART: [kat] LMS
3,767,152 UART: [kat] --
3,771,207 UART: [cold-reset] ++
3,772,872 UART: [fht] FHT @ 0x50003400
3,783,258 UART: [idev] ++
3,783,826 UART: [idev] CDI.KEYID = 6
3,784,823 UART: [idev] SUBJECT.KEYID = 7
3,786,043 UART: [idev] UDS.KEYID = 0
3,789,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,101 UART: [idev] Erasing UDS.KEYID = 0
6,261,933 UART: [idev] Sha1 KeyId Algorithm
6,285,822 UART: [idev] --
6,290,738 UART: [ldev] ++
6,291,310 UART: [ldev] CDI.KEYID = 6
6,292,225 UART: [ldev] SUBJECT.KEYID = 5
6,293,446 UART: [ldev] AUTHORITY.KEYID = 7
6,294,682 UART: [ldev] FE.KEYID = 1
6,305,386 UART: [ldev] Erasing FE.KEYID = 1
8,781,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,079 UART: [ldev] --
10,575,088 UART: [fwproc] Wait for Commands...
10,577,196 UART: [fwproc] Recv command 0x46574c44
10,579,193 UART: [fwproc] Recv'd Img size: 118548 bytes
11,657,485 UART: ROM Fatal Error: 0x000B000C
11,660,761 >>> mbox cmd response: failed
11,661,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,661,534 >>> mbox cmd response: failed
11,661,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,662,095 >>> mbox cmd response: failed
Initializing fuses
2,064,635 writing to cptra_bootfsm_go
2,253,941 UART:
2,254,298 UART: Running Caliptra ROM ...
2,255,350 UART:
8,784,255 UART: [state] CFI Enabled
8,798,901 UART: [state] LifecycleState = Unprovisioned
8,800,823 UART: [state] DebugLocked = No
8,803,406 UART: [state] WD Timer not started. Device not locked for debugging
8,807,321 UART: [kat] SHA2-256
8,987,007 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,997,759 UART: [kat] ++
8,998,251 UART: [kat] sha1
9,010,874 UART: [kat] SHA2-256
9,013,586 UART: [kat] SHA2-384
9,020,067 UART: [kat] SHA2-512-ACC
9,022,433 UART: [kat] ECC-384
11,468,236 UART: [kat] HMAC-384Kdf
11,481,563 UART: [kat] LMS
11,958,074 UART: [kat] --
11,961,975 UART: [cold-reset] ++
11,964,130 UART: [fht] FHT @ 0x50003400
11,974,516 UART: [idev] ++
11,975,080 UART: [idev] CDI.KEYID = 6
11,976,101 UART: [idev] SUBJECT.KEYID = 7
11,977,264 UART: [idev] UDS.KEYID = 0
11,980,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,129,759 UART: [idev] Erasing UDS.KEYID = 0
14,454,003 UART: [idev] Sha1 KeyId Algorithm
14,476,753 UART: [idev] --
14,483,176 UART: [ldev] ++
14,483,799 UART: [ldev] CDI.KEYID = 6
14,484,682 UART: [ldev] SUBJECT.KEYID = 5
14,485,898 UART: [ldev] AUTHORITY.KEYID = 7
14,487,206 UART: [ldev] FE.KEYID = 1
14,498,273 UART: [ldev] Erasing FE.KEYID = 1
16,975,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,695,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,711,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,727,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,742,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,765,963 UART: [ldev] --
18,772,052 UART: [fwproc] Wait for Commands...
18,774,104 UART: [fwproc] Recv command 0x46574c44
18,776,095 UART: [fwproc] Recv'd Img size: 118548 bytes
22,261,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,342,860 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,415,879 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,743,679 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,780,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,558,018 >>> mbox cmd response: failed
11,558,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,558,953 >>> mbox cmd response: failed
11,559,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,559,522 >>> mbox cmd response: failed
Initializing fuses
2,056,279 writing to cptra_bootfsm_go
12,091,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,754,774 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
192,044 UART:
192,412 UART: Running Caliptra ROM ...
193,527 UART:
193,672 UART: [state] CFI Enabled
264,945 UART: [state] LifecycleState = Unprovisioned
267,357 UART: [state] DebugLocked = No
269,358 UART: [state] WD Timer not started. Device not locked for debugging
273,433 UART: [kat] SHA2-256
463,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,059 UART: [kat] ++
474,555 UART: [kat] sha1
486,085 UART: [kat] SHA2-256
489,106 UART: [kat] SHA2-384
494,496 UART: [kat] SHA2-512-ACC
497,114 UART: [kat] ECC-384
2,946,037 UART: [kat] HMAC-384Kdf
2,974,499 UART: [kat] LMS
3,506,267 UART: [kat] --
3,511,961 UART: [cold-reset] ++
3,513,249 UART: [fht] FHT @ 0x50003400
3,524,148 UART: [idev] ++
3,524,829 UART: [idev] CDI.KEYID = 6
3,525,796 UART: [idev] SUBJECT.KEYID = 7
3,526,966 UART: [idev] UDS.KEYID = 0
3,529,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,679,294 UART: [idev] Erasing UDS.KEYID = 0
6,032,710 UART: [idev] Sha1 KeyId Algorithm
6,055,728 UART: [idev] --
6,060,083 UART: [ldev] ++
6,060,783 UART: [ldev] CDI.KEYID = 6
6,061,673 UART: [ldev] SUBJECT.KEYID = 5
6,062,896 UART: [ldev] AUTHORITY.KEYID = 7
6,064,031 UART: [ldev] FE.KEYID = 1
6,102,602 UART: [ldev] Erasing FE.KEYID = 1
8,604,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,406 UART: [ldev] --
10,417,656 UART: [fwproc] Wait for Commands...
10,419,222 UART: [fwproc] Recv command 0x46574c44
10,421,485 UART: [fwproc] Recv'd Img size: 118548 bytes
11,513,488 UART: ROM Fatal Error: 0x000B000C
11,517,103 >>> mbox cmd response: failed
11,517,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,517,894 >>> mbox cmd response: failed
11,518,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,518,457 >>> mbox cmd response: failed
Initializing fuses
2,055,677 writing to cptra_bootfsm_go
2,245,024 UART:
2,245,375 UART: Running Caliptra ROM ...
2,246,479 UART:
2,246,642 UART: [state] CFI Enabled
2,311,914 UART: [state] LifecycleState = Unprovisioned
2,314,295 UART: [state] DebugLocked = No
2,317,206 UART: [state] WD Timer not started. Device not locked for debugging
2,321,033 UART: [kat] SHA2-256
2,510,934 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,521,733 UART: [kat] ++
2,522,280 UART: [kat] sha1
2,533,991 UART: [kat] SHA2-256
2,537,024 UART: [kat] SHA2-384
2,543,415 UART: [kat] SHA2-512-ACC
2,546,049 UART: [kat] ECC-384
4,997,402 UART: [kat] HMAC-384Kdf
5,020,977 UART: [kat] LMS
5,552,723 UART: [kat] --
5,556,180 UART: [cold-reset] ++
5,557,099 UART: [fht] FHT @ 0x50003400
5,568,361 UART: [idev] ++
5,569,087 UART: [idev] CDI.KEYID = 6
5,570,012 UART: [idev] SUBJECT.KEYID = 7
5,571,188 UART: [idev] UDS.KEYID = 0
5,573,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,722,461 UART: [idev] Erasing UDS.KEYID = 0
8,079,883 UART: [idev] Sha1 KeyId Algorithm
8,102,050 UART: [idev] --
8,106,674 UART: [ldev] ++
8,107,358 UART: [ldev] CDI.KEYID = 6
8,108,247 UART: [ldev] SUBJECT.KEYID = 5
8,109,464 UART: [ldev] AUTHORITY.KEYID = 7
8,110,647 UART: [ldev] FE.KEYID = 1
8,150,030 UART: [ldev] Erasing FE.KEYID = 1
10,654,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,407,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,422,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,437,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,584 UART: [ldev] --
12,464,789 UART: [fwproc] Wait for Commands...
12,467,543 UART: [fwproc] Recv command 0x46574c44
12,469,862 UART: [fwproc] Recv'd Img size: 118548 bytes
15,973,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,044,864 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,168,454 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,728,454 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,421,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,294,279 >>> mbox cmd response: failed
11,294,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,295,211 >>> mbox cmd response: failed
11,295,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,295,778 >>> mbox cmd response: failed
Initializing fuses
2,063,440 writing to cptra_bootfsm_go
5,498,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,875,013 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,458 UART:
192,822 UART: Running Caliptra ROM ...
193,936 UART:
603,718 UART: [state] CFI Enabled
618,136 UART: [state] LifecycleState = Unprovisioned
620,525 UART: [state] DebugLocked = No
623,337 UART: [state] WD Timer not started. Device not locked for debugging
627,842 UART: [kat] SHA2-256
817,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,478 UART: [kat] ++
828,992 UART: [kat] sha1
841,116 UART: [kat] SHA2-256
844,134 UART: [kat] SHA2-384
848,723 UART: [kat] SHA2-512-ACC
851,288 UART: [kat] ECC-384
3,294,044 UART: [kat] HMAC-384Kdf
3,305,938 UART: [kat] LMS
3,837,764 UART: [kat] --
3,841,928 UART: [cold-reset] ++
3,842,879 UART: [fht] FHT @ 0x50003400
3,855,283 UART: [idev] ++
3,855,974 UART: [idev] CDI.KEYID = 6
3,856,953 UART: [idev] SUBJECT.KEYID = 7
3,858,119 UART: [idev] UDS.KEYID = 0
3,861,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,319 UART: [idev] Erasing UDS.KEYID = 0
6,335,722 UART: [idev] Sha1 KeyId Algorithm
6,357,618 UART: [idev] --
6,361,348 UART: [ldev] ++
6,362,032 UART: [ldev] CDI.KEYID = 6
6,363,002 UART: [ldev] SUBJECT.KEYID = 5
6,364,168 UART: [ldev] AUTHORITY.KEYID = 7
6,365,346 UART: [ldev] FE.KEYID = 1
6,374,919 UART: [ldev] Erasing FE.KEYID = 1
8,851,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,446 UART: [ldev] --
10,639,583 UART: [fwproc] Wait for Commands...
10,641,560 UART: [fwproc] Recv command 0x46574c44
10,643,840 UART: [fwproc] Recv'd Img size: 118548 bytes
11,740,944 UART: ROM Fatal Error: 0x000B000C
11,744,588 >>> mbox cmd response: failed
11,745,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,745,358 >>> mbox cmd response: failed
11,745,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,745,934 >>> mbox cmd response: failed
Initializing fuses
2,054,300 writing to cptra_bootfsm_go
2,243,594 UART:
2,243,947 UART: Running Caliptra ROM ...
2,245,082 UART:
8,709,117 UART: [state] CFI Enabled
8,723,073 UART: [state] LifecycleState = Unprovisioned
8,725,436 UART: [state] DebugLocked = No
8,726,699 UART: [state] WD Timer not started. Device not locked for debugging
8,731,383 UART: [kat] SHA2-256
8,921,280 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,932,032 UART: [kat] ++
8,932,560 UART: [kat] sha1
8,943,349 UART: [kat] SHA2-256
8,946,340 UART: [kat] SHA2-384
8,952,180 UART: [kat] SHA2-512-ACC
8,954,756 UART: [kat] ECC-384
11,397,642 UART: [kat] HMAC-384Kdf
11,409,339 UART: [kat] LMS
11,941,190 UART: [kat] --
11,944,483 UART: [cold-reset] ++
11,946,524 UART: [fht] FHT @ 0x50003400
11,958,163 UART: [idev] ++
11,958,843 UART: [idev] CDI.KEYID = 6
11,959,861 UART: [idev] SUBJECT.KEYID = 7
11,961,023 UART: [idev] UDS.KEYID = 0
11,963,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,112,516 UART: [idev] Erasing UDS.KEYID = 0
14,444,051 UART: [idev] Sha1 KeyId Algorithm
14,466,493 UART: [idev] --
14,469,971 UART: [ldev] ++
14,470,656 UART: [ldev] CDI.KEYID = 6
14,471,566 UART: [ldev] SUBJECT.KEYID = 5
14,472,727 UART: [ldev] AUTHORITY.KEYID = 7
14,473,960 UART: [ldev] FE.KEYID = 1
14,484,117 UART: [ldev] Erasing FE.KEYID = 1
16,963,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,682,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,697,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,712,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,727,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,749,815 UART: [ldev] --
18,755,261 UART: [fwproc] Wait for Commands...
18,756,826 UART: [fwproc] Recv command 0x46574c44
18,759,148 UART: [fwproc] Recv'd Img size: 118548 bytes
22,251,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,330,036 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,453,652 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,013,870 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,764,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,532,591 >>> mbox cmd response: failed
11,533,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,533,749 >>> mbox cmd response: failed
11,534,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,534,319 >>> mbox cmd response: failed
Initializing fuses
2,050,838 writing to cptra_bootfsm_go
12,087,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,378,302 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,601 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,169 UART: [kat] SHA2-256
882,100 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,215 UART: [kat] ++
886,367 UART: [kat] sha1
890,371 UART: [kat] SHA2-256
892,309 UART: [kat] SHA2-384
894,922 UART: [kat] SHA2-512-ACC
896,823 UART: [kat] ECC-384
902,252 UART: [kat] HMAC-384Kdf
906,894 UART: [kat] LMS
1,475,090 UART: [kat] --
1,475,985 UART: [cold-reset] ++
1,476,331 UART: [fht] Storing FHT @ 0x50003400
1,479,028 UART: [idev] ++
1,479,196 UART: [idev] CDI.KEYID = 6
1,479,556 UART: [idev] SUBJECT.KEYID = 7
1,479,980 UART: [idev] UDS.KEYID = 0
1,480,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,922 UART: [idev] Erasing UDS.KEYID = 0
1,504,346 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,846 UART: [idev] --
1,513,991 UART: [ldev] ++
1,514,159 UART: [ldev] CDI.KEYID = 6
1,514,522 UART: [ldev] SUBJECT.KEYID = 5
1,514,948 UART: [ldev] AUTHORITY.KEYID = 7
1,515,411 UART: [ldev] FE.KEYID = 1
1,520,471 UART: [ldev] Erasing FE.KEYID = 1
1,546,404 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,636 UART: [ldev] --
1,586,125 UART: [fwproc] Waiting for Commands...
1,586,886 UART: [fwproc] Received command 0x46574c44
1,587,677 UART: [fwproc] Received Image of size 118548 bytes
1,624,943 UART: ROM Fatal Error: 0x000B000C
1,626,102 >>> mbox cmd response: failed
1,626,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,108 >>> mbox cmd response: failed
1,626,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,257 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,939 UART: [kat] SHA2-256
881,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,985 UART: [kat] ++
886,137 UART: [kat] sha1
890,245 UART: [kat] SHA2-256
892,183 UART: [kat] SHA2-384
894,934 UART: [kat] SHA2-512-ACC
896,835 UART: [kat] ECC-384
902,582 UART: [kat] HMAC-384Kdf
906,930 UART: [kat] LMS
1,475,126 UART: [kat] --
1,476,007 UART: [cold-reset] ++
1,476,411 UART: [fht] Storing FHT @ 0x50003400
1,478,970 UART: [idev] ++
1,479,138 UART: [idev] CDI.KEYID = 6
1,479,498 UART: [idev] SUBJECT.KEYID = 7
1,479,922 UART: [idev] UDS.KEYID = 0
1,480,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,772 UART: [idev] Erasing UDS.KEYID = 0
1,504,334 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,958 UART: [idev] --
1,513,817 UART: [ldev] ++
1,513,985 UART: [ldev] CDI.KEYID = 6
1,514,348 UART: [ldev] SUBJECT.KEYID = 5
1,514,774 UART: [ldev] AUTHORITY.KEYID = 7
1,515,237 UART: [ldev] FE.KEYID = 1
1,520,611 UART: [ldev] Erasing FE.KEYID = 1
1,546,194 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,276 UART: [ldev] --
1,585,743 UART: [fwproc] Waiting for Commands...
1,586,446 UART: [fwproc] Received command 0x46574c44
1,587,237 UART: [fwproc] Received Image of size 118548 bytes
2,930,278 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,878 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,096 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,439 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,478,543 >>> mbox cmd response: failed
1,478,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,549 >>> mbox cmd response: failed
1,478,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,555 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,401 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,646 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,364 UART: [kat] SHA2-256
882,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,410 UART: [kat] ++
886,562 UART: [kat] sha1
890,892 UART: [kat] SHA2-256
892,830 UART: [kat] SHA2-384
895,457 UART: [kat] SHA2-512-ACC
897,358 UART: [kat] ECC-384
903,209 UART: [kat] HMAC-384Kdf
907,723 UART: [kat] LMS
1,475,919 UART: [kat] --
1,476,906 UART: [cold-reset] ++
1,477,292 UART: [fht] Storing FHT @ 0x50003400
1,480,177 UART: [idev] ++
1,480,345 UART: [idev] CDI.KEYID = 6
1,480,705 UART: [idev] SUBJECT.KEYID = 7
1,481,129 UART: [idev] UDS.KEYID = 0
1,481,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,899 UART: [idev] Erasing UDS.KEYID = 0
1,505,869 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,339 UART: [idev] --
1,515,314 UART: [ldev] ++
1,515,482 UART: [ldev] CDI.KEYID = 6
1,515,845 UART: [ldev] SUBJECT.KEYID = 5
1,516,271 UART: [ldev] AUTHORITY.KEYID = 7
1,516,734 UART: [ldev] FE.KEYID = 1
1,521,838 UART: [ldev] Erasing FE.KEYID = 1
1,547,429 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,333 UART: [ldev] --
1,586,770 UART: [fwproc] Waiting for Commands...
1,587,625 UART: [fwproc] Received command 0x46574c44
1,588,416 UART: [fwproc] Received Image of size 118548 bytes
1,626,744 UART: ROM Fatal Error: 0x000B000C
1,627,903 >>> mbox cmd response: failed
1,627,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,909 >>> mbox cmd response: failed
1,627,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,915 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,912 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,386 UART: [kat] SHA2-256
882,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,432 UART: [kat] ++
886,584 UART: [kat] sha1
890,786 UART: [kat] SHA2-256
892,724 UART: [kat] SHA2-384
895,665 UART: [kat] SHA2-512-ACC
897,566 UART: [kat] ECC-384
903,025 UART: [kat] HMAC-384Kdf
907,861 UART: [kat] LMS
1,476,057 UART: [kat] --
1,476,820 UART: [cold-reset] ++
1,477,196 UART: [fht] Storing FHT @ 0x50003400
1,479,979 UART: [idev] ++
1,480,147 UART: [idev] CDI.KEYID = 6
1,480,507 UART: [idev] SUBJECT.KEYID = 7
1,480,931 UART: [idev] UDS.KEYID = 0
1,481,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,653 UART: [idev] Erasing UDS.KEYID = 0
1,505,819 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,537 UART: [idev] --
1,515,436 UART: [ldev] ++
1,515,604 UART: [ldev] CDI.KEYID = 6
1,515,967 UART: [ldev] SUBJECT.KEYID = 5
1,516,393 UART: [ldev] AUTHORITY.KEYID = 7
1,516,856 UART: [ldev] FE.KEYID = 1
1,521,972 UART: [ldev] Erasing FE.KEYID = 1
1,547,719 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,375 UART: [ldev] --
1,586,696 UART: [fwproc] Waiting for Commands...
1,587,465 UART: [fwproc] Received command 0x46574c44
1,588,256 UART: [fwproc] Received Image of size 118548 bytes
2,931,835 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,423 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,641 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,882 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,478,576 >>> mbox cmd response: failed
1,478,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,582 >>> mbox cmd response: failed
1,478,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,436 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,256 UART: [kat] ++
895,408 UART: [kat] sha1
899,660 UART: [kat] SHA2-256
901,600 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
915,811 UART: [kat] HMAC-384Kdf
920,443 UART: [kat] LMS
1,168,755 UART: [kat] --
1,169,740 UART: [cold-reset] ++
1,170,094 UART: [fht] FHT @ 0x50003400
1,172,846 UART: [idev] ++
1,173,014 UART: [idev] CDI.KEYID = 6
1,173,375 UART: [idev] SUBJECT.KEYID = 7
1,173,800 UART: [idev] UDS.KEYID = 0
1,174,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,657 UART: [idev] Erasing UDS.KEYID = 0
1,198,593 UART: [idev] Sha1 KeyId Algorithm
1,207,297 UART: [idev] --
1,208,342 UART: [ldev] ++
1,208,510 UART: [ldev] CDI.KEYID = 6
1,208,874 UART: [ldev] SUBJECT.KEYID = 5
1,209,301 UART: [ldev] AUTHORITY.KEYID = 7
1,209,764 UART: [ldev] FE.KEYID = 1
1,215,064 UART: [ldev] Erasing FE.KEYID = 1
1,240,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,742 UART: [ldev] --
1,280,095 UART: [fwproc] Wait for Commands...
1,280,686 UART: [fwproc] Recv command 0x46574c44
1,281,419 UART: [fwproc] Recv'd Img size: 118548 bytes
1,319,792 UART: ROM Fatal Error: 0x000B000C
1,320,951 >>> mbox cmd response: failed
1,320,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,957 >>> mbox cmd response: failed
1,320,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,192 UART: [kat] ++
895,344 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,243 UART: [kat] SHA2-512-ACC
906,144 UART: [kat] ECC-384
916,073 UART: [kat] HMAC-384Kdf
920,637 UART: [kat] LMS
1,168,949 UART: [kat] --
1,169,670 UART: [cold-reset] ++
1,170,086 UART: [fht] FHT @ 0x50003400
1,172,734 UART: [idev] ++
1,172,902 UART: [idev] CDI.KEYID = 6
1,173,263 UART: [idev] SUBJECT.KEYID = 7
1,173,688 UART: [idev] UDS.KEYID = 0
1,174,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,749 UART: [idev] Erasing UDS.KEYID = 0
1,199,237 UART: [idev] Sha1 KeyId Algorithm
1,208,191 UART: [idev] --
1,209,150 UART: [ldev] ++
1,209,318 UART: [ldev] CDI.KEYID = 6
1,209,682 UART: [ldev] SUBJECT.KEYID = 5
1,210,109 UART: [ldev] AUTHORITY.KEYID = 7
1,210,572 UART: [ldev] FE.KEYID = 1
1,215,706 UART: [ldev] Erasing FE.KEYID = 1
1,242,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,102 UART: [ldev] --
1,281,349 UART: [fwproc] Wait for Commands...
1,282,170 UART: [fwproc] Recv command 0x46574c44
1,282,903 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,648 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,823 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,178 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,175,950 >>> mbox cmd response: failed
1,175,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,956 >>> mbox cmd response: failed
1,175,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,962 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,363 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,005 UART: [state] LifecycleState = Unprovisioned
85,660 UART: [state] DebugLocked = No
86,198 UART: [state] WD Timer not started. Device not locked for debugging
87,445 UART: [kat] SHA2-256
890,995 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,099 UART: [kat] ++
895,251 UART: [kat] sha1
899,529 UART: [kat] SHA2-256
901,469 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
915,772 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,651 UART: [cold-reset] ++
1,170,179 UART: [fht] FHT @ 0x50003400
1,172,655 UART: [idev] ++
1,172,823 UART: [idev] CDI.KEYID = 6
1,173,184 UART: [idev] SUBJECT.KEYID = 7
1,173,609 UART: [idev] UDS.KEYID = 0
1,173,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,760 UART: [idev] Erasing UDS.KEYID = 0
1,199,256 UART: [idev] Sha1 KeyId Algorithm
1,208,238 UART: [idev] --
1,209,331 UART: [ldev] ++
1,209,499 UART: [ldev] CDI.KEYID = 6
1,209,863 UART: [ldev] SUBJECT.KEYID = 5
1,210,290 UART: [ldev] AUTHORITY.KEYID = 7
1,210,753 UART: [ldev] FE.KEYID = 1
1,215,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,579 UART: [ldev] --
1,280,868 UART: [fwproc] Wait for Commands...
1,281,475 UART: [fwproc] Recv command 0x46574c44
1,282,208 UART: [fwproc] Recv'd Img size: 118548 bytes
1,319,689 UART: ROM Fatal Error: 0x000B000C
1,320,848 >>> mbox cmd response: failed
1,320,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,854 >>> mbox cmd response: failed
1,320,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,505 UART: [kat] ++
895,657 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,824 UART: [kat] SHA2-512-ACC
906,725 UART: [kat] ECC-384
916,736 UART: [kat] HMAC-384Kdf
921,256 UART: [kat] LMS
1,169,568 UART: [kat] --
1,170,221 UART: [cold-reset] ++
1,170,773 UART: [fht] FHT @ 0x50003400
1,173,511 UART: [idev] ++
1,173,679 UART: [idev] CDI.KEYID = 6
1,174,040 UART: [idev] SUBJECT.KEYID = 7
1,174,465 UART: [idev] UDS.KEYID = 0
1,174,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,344 UART: [idev] Erasing UDS.KEYID = 0
1,199,806 UART: [idev] Sha1 KeyId Algorithm
1,208,746 UART: [idev] --
1,209,949 UART: [ldev] ++
1,210,117 UART: [ldev] CDI.KEYID = 6
1,210,481 UART: [ldev] SUBJECT.KEYID = 5
1,210,908 UART: [ldev] AUTHORITY.KEYID = 7
1,211,371 UART: [ldev] FE.KEYID = 1
1,216,471 UART: [ldev] Erasing FE.KEYID = 1
1,243,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,319 UART: [ldev] --
1,282,646 UART: [fwproc] Wait for Commands...
1,283,233 UART: [fwproc] Recv command 0x46574c44
1,283,966 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,875 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,050 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,415 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,809 >>> mbox cmd response: failed
1,177,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,815 >>> mbox cmd response: failed
1,177,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,821 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,668 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
893,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,277 UART: [kat] ++
897,429 UART: [kat] sha1
901,697 UART: [kat] SHA2-256
903,637 UART: [kat] SHA2-384
906,562 UART: [kat] SHA2-512-ACC
908,463 UART: [kat] ECC-384
917,944 UART: [kat] HMAC-384Kdf
922,396 UART: [kat] LMS
1,170,724 UART: [kat] --
1,171,771 UART: [cold-reset] ++
1,172,171 UART: [fht] FHT @ 0x50003400
1,174,608 UART: [idev] ++
1,174,776 UART: [idev] CDI.KEYID = 6
1,175,136 UART: [idev] SUBJECT.KEYID = 7
1,175,560 UART: [idev] UDS.KEYID = 0
1,175,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,360 UART: [idev] Erasing UDS.KEYID = 0
1,200,013 UART: [idev] Sha1 KeyId Algorithm
1,208,537 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,074 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,215,721 UART: [ldev] Erasing FE.KEYID = 1
1,242,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,511 UART: [ldev] --
1,280,960 UART: [fwproc] Wait for Commands...
1,281,580 UART: [fwproc] Recv command 0x46574c44
1,282,308 UART: [fwproc] Recv'd Img size: 118548 bytes
1,319,982 UART: ROM Fatal Error: 0x000B000C
1,321,141 >>> mbox cmd response: failed
1,321,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,147 >>> mbox cmd response: failed
1,321,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
893,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,369 UART: [kat] ++
897,521 UART: [kat] sha1
901,869 UART: [kat] SHA2-256
903,809 UART: [kat] SHA2-384
906,498 UART: [kat] SHA2-512-ACC
908,399 UART: [kat] ECC-384
918,700 UART: [kat] HMAC-384Kdf
923,146 UART: [kat] LMS
1,171,474 UART: [kat] --
1,172,301 UART: [cold-reset] ++
1,172,683 UART: [fht] FHT @ 0x50003400
1,175,366 UART: [idev] ++
1,175,534 UART: [idev] CDI.KEYID = 6
1,175,894 UART: [idev] SUBJECT.KEYID = 7
1,176,318 UART: [idev] UDS.KEYID = 0
1,176,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,254 UART: [idev] Erasing UDS.KEYID = 0
1,201,141 UART: [idev] Sha1 KeyId Algorithm
1,209,621 UART: [idev] --
1,210,489 UART: [ldev] ++
1,210,657 UART: [ldev] CDI.KEYID = 6
1,211,020 UART: [ldev] SUBJECT.KEYID = 5
1,211,446 UART: [ldev] AUTHORITY.KEYID = 7
1,211,909 UART: [ldev] FE.KEYID = 1
1,217,079 UART: [ldev] Erasing FE.KEYID = 1
1,243,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,527 UART: [ldev] --
1,283,036 UART: [fwproc] Wait for Commands...
1,283,628 UART: [fwproc] Recv command 0x46574c44
1,284,356 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,887 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,057 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,306 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,542 >>> mbox cmd response: failed
1,177,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,548 >>> mbox cmd response: failed
1,177,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,554 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,335 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,783 UART: [state] LifecycleState = Unprovisioned
85,438 UART: [state] DebugLocked = No
86,112 UART: [state] WD Timer not started. Device not locked for debugging
87,261 UART: [kat] SHA2-256
892,911 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,036 UART: [kat] ++
897,188 UART: [kat] sha1
901,470 UART: [kat] SHA2-256
903,410 UART: [kat] SHA2-384
906,085 UART: [kat] SHA2-512-ACC
907,986 UART: [kat] ECC-384
917,681 UART: [kat] HMAC-384Kdf
922,315 UART: [kat] LMS
1,170,643 UART: [kat] --
1,171,398 UART: [cold-reset] ++
1,171,840 UART: [fht] FHT @ 0x50003400
1,174,625 UART: [idev] ++
1,174,793 UART: [idev] CDI.KEYID = 6
1,175,153 UART: [idev] SUBJECT.KEYID = 7
1,175,577 UART: [idev] UDS.KEYID = 0
1,175,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,943 UART: [idev] Erasing UDS.KEYID = 0
1,200,838 UART: [idev] Sha1 KeyId Algorithm
1,209,218 UART: [idev] --
1,210,404 UART: [ldev] ++
1,210,572 UART: [ldev] CDI.KEYID = 6
1,210,935 UART: [ldev] SUBJECT.KEYID = 5
1,211,361 UART: [ldev] AUTHORITY.KEYID = 7
1,211,824 UART: [ldev] FE.KEYID = 1
1,217,102 UART: [ldev] Erasing FE.KEYID = 1
1,243,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,618 UART: [ldev] --
1,282,987 UART: [fwproc] Wait for Commands...
1,283,655 UART: [fwproc] Recv command 0x46574c44
1,284,383 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,119 UART: ROM Fatal Error: 0x000B000C
1,322,278 >>> mbox cmd response: failed
1,322,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,284 >>> mbox cmd response: failed
1,322,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,877 UART: [state] LifecycleState = Unprovisioned
86,532 UART: [state] DebugLocked = No
87,184 UART: [state] WD Timer not started. Device not locked for debugging
88,417 UART: [kat] SHA2-256
894,067 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,192 UART: [kat] ++
898,344 UART: [kat] sha1
902,612 UART: [kat] SHA2-256
904,552 UART: [kat] SHA2-384
907,413 UART: [kat] SHA2-512-ACC
909,314 UART: [kat] ECC-384
919,235 UART: [kat] HMAC-384Kdf
924,071 UART: [kat] LMS
1,172,399 UART: [kat] --
1,173,126 UART: [cold-reset] ++
1,173,576 UART: [fht] FHT @ 0x50003400
1,176,155 UART: [idev] ++
1,176,323 UART: [idev] CDI.KEYID = 6
1,176,683 UART: [idev] SUBJECT.KEYID = 7
1,177,107 UART: [idev] UDS.KEYID = 0
1,177,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,473 UART: [idev] Erasing UDS.KEYID = 0
1,202,884 UART: [idev] Sha1 KeyId Algorithm
1,211,266 UART: [idev] --
1,212,216 UART: [ldev] ++
1,212,384 UART: [ldev] CDI.KEYID = 6
1,212,747 UART: [ldev] SUBJECT.KEYID = 5
1,213,173 UART: [ldev] AUTHORITY.KEYID = 7
1,213,636 UART: [ldev] FE.KEYID = 1
1,218,908 UART: [ldev] Erasing FE.KEYID = 1
1,245,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,968 UART: [ldev] --
1,285,459 UART: [fwproc] Wait for Commands...
1,286,031 UART: [fwproc] Recv command 0x46574c44
1,286,759 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,418 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,588 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,967 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,797 >>> mbox cmd response: failed
1,177,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,803 >>> mbox cmd response: failed
1,177,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,798 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,184 UART:
192,534 UART: Running Caliptra ROM ...
193,729 UART:
193,881 UART: [state] CFI Enabled
262,827 UART: [state] LifecycleState = Unprovisioned
264,749 UART: [state] DebugLocked = No
266,136 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,916 UART: [kat] SHA2-256
440,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,129 UART: [kat] ++
451,576 UART: [kat] sha1
463,213 UART: [kat] SHA2-256
465,893 UART: [kat] SHA2-384
470,061 UART: [kat] SHA2-512-ACC
472,411 UART: [kat] ECC-384
2,763,793 UART: [kat] HMAC-384Kdf
2,775,499 UART: [kat] LMS
3,965,791 UART: [kat] --
3,969,008 UART: [cold-reset] ++
3,970,852 UART: [fht] Storing FHT @ 0x50003400
3,983,050 UART: [idev] ++
3,983,621 UART: [idev] CDI.KEYID = 6
3,984,553 UART: [idev] SUBJECT.KEYID = 7
3,985,773 UART: [idev] UDS.KEYID = 0
3,988,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,110 UART: [idev] Erasing UDS.KEYID = 0
7,321,737 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,172 UART: [idev] --
7,348,143 UART: [ldev] ++
7,348,733 UART: [ldev] CDI.KEYID = 6
7,349,623 UART: [ldev] SUBJECT.KEYID = 5
7,350,894 UART: [ldev] AUTHORITY.KEYID = 7
7,352,125 UART: [ldev] FE.KEYID = 1
7,398,458 UART: [ldev] Erasing FE.KEYID = 1
10,730,756 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,260 UART: [ldev] --
13,092,447 UART: [fwproc] Waiting for Commands...
13,095,422 UART: [fwproc] Received command 0x46574c44
13,097,614 UART: [fwproc] Received Image of size 118548 bytes
13,197,082 UART: ROM Fatal Error: 0x000B001C
13,200,539 >>> mbox cmd response: failed
13,201,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,201,356 >>> mbox cmd response: failed
13,201,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,201,919 >>> mbox cmd response: failed
Initializing fuses
2,059,171 writing to cptra_bootfsm_go
2,248,511 UART:
2,248,875 UART: Running Caliptra ROM ...
2,250,014 UART:
2,250,186 UART: [state] CFI Enabled
2,314,281 UART: [state] LifecycleState = Unprovisioned
2,316,248 UART: [state] DebugLocked = No
2,318,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,611 UART: [kat] SHA2-256
2,493,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,868 UART: [kat] ++
2,504,333 UART: [kat] sha1
2,514,897 UART: [kat] SHA2-256
2,517,596 UART: [kat] SHA2-384
2,522,615 UART: [kat] SHA2-512-ACC
2,524,968 UART: [kat] ECC-384
4,816,453 UART: [kat] HMAC-384Kdf
4,848,407 UART: [kat] LMS
6,038,666 UART: [kat] --
6,043,271 UART: [cold-reset] ++
6,044,994 UART: [fht] Storing FHT @ 0x50003400
6,056,322 UART: [idev] ++
6,056,897 UART: [idev] CDI.KEYID = 6
6,057,810 UART: [idev] SUBJECT.KEYID = 7
6,059,102 UART: [idev] UDS.KEYID = 0
6,061,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,210,941 UART: [idev] Erasing UDS.KEYID = 0
9,392,822 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,018 UART: [idev] --
9,417,507 UART: [ldev] ++
9,418,082 UART: [ldev] CDI.KEYID = 6
9,419,050 UART: [ldev] SUBJECT.KEYID = 5
9,420,245 UART: [ldev] AUTHORITY.KEYID = 7
9,421,540 UART: [ldev] FE.KEYID = 1
9,449,085 UART: [ldev] Erasing FE.KEYID = 1
12,782,840 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,096,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,126,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,140,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,159,539 UART: [ldev] --
15,163,832 UART: [fwproc] Waiting for Commands...
15,165,714 UART: [fwproc] Received command 0x46574c44
15,167,900 UART: [fwproc] Received Image of size 118548 bytes
19,267,751 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,347,340 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,420,524 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,749,803 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,784,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,933,308 >>> mbox cmd response: failed
12,934,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,934,343 >>> mbox cmd response: failed
12,934,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,934,924 >>> mbox cmd response: failed
Initializing fuses
2,050,326 writing to cptra_bootfsm_go
5,821,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,976,671 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
192,582 UART:
192,957 UART: Running Caliptra ROM ...
194,090 UART:
603,696 UART: [state] CFI Enabled
616,502 UART: [state] LifecycleState = Unprovisioned
618,406 UART: [state] DebugLocked = No
620,010 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,417 UART: [kat] SHA2-256
794,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,750 UART: [kat] ++
805,386 UART: [kat] sha1
815,407 UART: [kat] SHA2-256
818,131 UART: [kat] SHA2-384
822,931 UART: [kat] SHA2-512-ACC
825,333 UART: [kat] ECC-384
3,109,159 UART: [kat] HMAC-384Kdf
3,120,963 UART: [kat] LMS
4,311,054 UART: [kat] --
4,313,893 UART: [cold-reset] ++
4,316,268 UART: [fht] Storing FHT @ 0x50003400
4,328,998 UART: [idev] ++
4,329,574 UART: [idev] CDI.KEYID = 6
4,330,543 UART: [idev] SUBJECT.KEYID = 7
4,331,759 UART: [idev] UDS.KEYID = 0
4,335,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,000 UART: [idev] Erasing UDS.KEYID = 0
7,624,637 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,140 UART: [idev] --
7,650,147 UART: [ldev] ++
7,650,728 UART: [ldev] CDI.KEYID = 6
7,651,756 UART: [ldev] SUBJECT.KEYID = 5
7,652,888 UART: [ldev] AUTHORITY.KEYID = 7
7,654,128 UART: [ldev] FE.KEYID = 1
7,663,486 UART: [ldev] Erasing FE.KEYID = 1
10,952,960 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,042 UART: [ldev] --
13,314,378 UART: [fwproc] Waiting for Commands...
13,317,616 UART: [fwproc] Received command 0x46574c44
13,319,819 UART: [fwproc] Received Image of size 118548 bytes
13,421,017 UART: ROM Fatal Error: 0x000B001C
13,424,490 >>> mbox cmd response: failed
13,424,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,425,177 >>> mbox cmd response: failed
13,425,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,425,774 >>> mbox cmd response: failed
Initializing fuses
2,055,327 writing to cptra_bootfsm_go
2,244,597 UART:
2,244,947 UART: Running Caliptra ROM ...
2,246,002 UART:
7,045,614 UART: [state] CFI Enabled
7,059,738 UART: [state] LifecycleState = Unprovisioned
7,061,663 UART: [state] DebugLocked = No
7,063,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,068,383 UART: [kat] SHA2-256
7,238,118 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,248,665 UART: [kat] ++
7,249,134 UART: [kat] sha1
7,259,759 UART: [kat] SHA2-256
7,262,463 UART: [kat] SHA2-384
7,267,489 UART: [kat] SHA2-512-ACC
7,269,846 UART: [kat] ECC-384
9,554,198 UART: [kat] HMAC-384Kdf
9,566,379 UART: [kat] LMS
10,756,489 UART: [kat] --
10,759,787 UART: [cold-reset] ++
10,760,906 UART: [fht] Storing FHT @ 0x50003400
10,772,748 UART: [idev] ++
10,773,311 UART: [idev] CDI.KEYID = 6
10,774,254 UART: [idev] SUBJECT.KEYID = 7
10,775,530 UART: [idev] UDS.KEYID = 0
10,777,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,926,751 UART: [idev] Erasing UDS.KEYID = 0
14,064,917 UART: [idev] Using Sha1 for KeyId Algorithm
14,086,475 UART: [idev] --
14,090,214 UART: [ldev] ++
14,090,802 UART: [ldev] CDI.KEYID = 6
14,091,838 UART: [ldev] SUBJECT.KEYID = 5
14,093,040 UART: [ldev] AUTHORITY.KEYID = 7
14,094,233 UART: [ldev] FE.KEYID = 1
14,105,325 UART: [ldev] Erasing FE.KEYID = 1
17,391,364 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,682,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,696,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,711,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,726,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,745,389 UART: [ldev] --
19,750,336 UART: [fwproc] Waiting for Commands...
19,752,516 UART: [fwproc] Received command 0x46574c44
19,754,713 UART: [fwproc] Received Image of size 118548 bytes
23,872,042 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,947,847 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,020,993 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,349,669 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,068 writing to cptra_bootfsm_go
4,133,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,167,252 >>> mbox cmd response: failed
13,168,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,168,407 >>> mbox cmd response: failed
13,168,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,169,039 >>> mbox cmd response: failed
Initializing fuses
2,048,328 writing to cptra_bootfsm_go
10,842,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,874,529 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,565 UART:
192,911 UART: Running Caliptra ROM ...
194,100 UART:
194,269 UART: [state] CFI Enabled
262,770 UART: [state] LifecycleState = Unprovisioned
264,725 UART: [state] DebugLocked = No
266,442 UART: [state] WD Timer not started. Device not locked for debugging
270,291 UART: [kat] SHA2-256
449,968 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,724 UART: [kat] ++
461,176 UART: [kat] sha1
472,182 UART: [kat] SHA2-256
474,895 UART: [kat] SHA2-384
481,060 UART: [kat] SHA2-512-ACC
483,465 UART: [kat] ECC-384
2,946,894 UART: [kat] HMAC-384Kdf
2,971,127 UART: [kat] LMS
3,447,633 UART: [kat] --
3,452,502 UART: [cold-reset] ++
3,454,066 UART: [fht] FHT @ 0x50003400
3,464,840 UART: [idev] ++
3,465,464 UART: [idev] CDI.KEYID = 6
3,466,376 UART: [idev] SUBJECT.KEYID = 7
3,467,653 UART: [idev] UDS.KEYID = 0
3,470,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,842 UART: [idev] Erasing UDS.KEYID = 0
5,986,786 UART: [idev] Sha1 KeyId Algorithm
6,010,091 UART: [idev] --
6,014,722 UART: [ldev] ++
6,015,311 UART: [ldev] CDI.KEYID = 6
6,016,203 UART: [ldev] SUBJECT.KEYID = 5
6,017,429 UART: [ldev] AUTHORITY.KEYID = 7
6,018,727 UART: [ldev] FE.KEYID = 1
6,057,019 UART: [ldev] Erasing FE.KEYID = 1
8,564,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,133 UART: [ldev] --
10,371,810 UART: [fwproc] Wait for Commands...
10,374,078 UART: [fwproc] Recv command 0x46574c44
10,376,077 UART: [fwproc] Recv'd Img size: 118548 bytes
10,487,500 UART: ROM Fatal Error: 0x000B001C
10,490,732 >>> mbox cmd response: failed
10,491,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,491,418 >>> mbox cmd response: failed
10,491,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,491,984 >>> mbox cmd response: failed
Initializing fuses
2,059,642 writing to cptra_bootfsm_go
2,248,947 UART:
2,249,328 UART: Running Caliptra ROM ...
2,250,411 UART:
2,250,571 UART: [state] CFI Enabled
2,312,984 UART: [state] LifecycleState = Unprovisioned
2,314,945 UART: [state] DebugLocked = No
2,316,938 UART: [state] WD Timer not started. Device not locked for debugging
2,321,661 UART: [kat] SHA2-256
2,501,335 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,512,127 UART: [kat] ++
2,512,592 UART: [kat] sha1
2,523,265 UART: [kat] SHA2-256
2,525,972 UART: [kat] SHA2-384
2,532,614 UART: [kat] SHA2-512-ACC
2,534,968 UART: [kat] ECC-384
4,999,875 UART: [kat] HMAC-384Kdf
5,022,645 UART: [kat] LMS
5,499,131 UART: [kat] --
5,503,241 UART: [cold-reset] ++
5,505,206 UART: [fht] FHT @ 0x50003400
5,516,465 UART: [idev] ++
5,517,056 UART: [idev] CDI.KEYID = 6
5,517,947 UART: [idev] SUBJECT.KEYID = 7
5,519,218 UART: [idev] UDS.KEYID = 0
5,521,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,671,095 UART: [idev] Erasing UDS.KEYID = 0
8,040,796 UART: [idev] Sha1 KeyId Algorithm
8,065,488 UART: [idev] --
8,070,703 UART: [ldev] ++
8,071,289 UART: [ldev] CDI.KEYID = 6
8,072,178 UART: [ldev] SUBJECT.KEYID = 5
8,073,400 UART: [ldev] AUTHORITY.KEYID = 7
8,074,644 UART: [ldev] FE.KEYID = 1
8,107,240 UART: [ldev] Erasing FE.KEYID = 1
10,615,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,350,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,366,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,382,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,397,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,418,811 UART: [ldev] --
12,424,411 UART: [fwproc] Wait for Commands...
12,426,299 UART: [fwproc] Recv command 0x46574c44
12,428,294 UART: [fwproc] Recv'd Img size: 118548 bytes
15,908,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,992,807 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,065,824 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,393,893 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,465,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,406,465 >>> mbox cmd response: failed
10,407,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,407,353 >>> mbox cmd response: failed
10,407,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,407,924 >>> mbox cmd response: failed
Initializing fuses
2,062,426 writing to cptra_bootfsm_go
5,515,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,291,718 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
192,724 UART:
193,076 UART: Running Caliptra ROM ...
194,177 UART:
604,032 UART: [state] CFI Enabled
619,284 UART: [state] LifecycleState = Unprovisioned
621,218 UART: [state] DebugLocked = No
622,950 UART: [state] WD Timer not started. Device not locked for debugging
626,527 UART: [kat] SHA2-256
806,220 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,976 UART: [kat] ++
817,519 UART: [kat] sha1
828,190 UART: [kat] SHA2-256
830,878 UART: [kat] SHA2-384
837,564 UART: [kat] SHA2-512-ACC
839,917 UART: [kat] ECC-384
3,283,616 UART: [kat] HMAC-384Kdf
3,295,560 UART: [kat] LMS
3,772,074 UART: [kat] --
3,776,686 UART: [cold-reset] ++
3,777,622 UART: [fht] FHT @ 0x50003400
3,789,529 UART: [idev] ++
3,790,101 UART: [idev] CDI.KEYID = 6
3,791,072 UART: [idev] SUBJECT.KEYID = 7
3,792,298 UART: [idev] UDS.KEYID = 0
3,795,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,759 UART: [idev] Erasing UDS.KEYID = 0
6,275,295 UART: [idev] Sha1 KeyId Algorithm
6,300,527 UART: [idev] --
6,306,281 UART: [ldev] ++
6,306,860 UART: [ldev] CDI.KEYID = 6
6,307,773 UART: [ldev] SUBJECT.KEYID = 5
6,308,953 UART: [ldev] AUTHORITY.KEYID = 7
6,310,245 UART: [ldev] FE.KEYID = 1
6,322,626 UART: [ldev] Erasing FE.KEYID = 1
8,798,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,791 UART: [ldev] --
10,589,600 UART: [fwproc] Wait for Commands...
10,592,353 UART: [fwproc] Recv command 0x46574c44
10,594,344 UART: [fwproc] Recv'd Img size: 118548 bytes
10,703,447 UART: ROM Fatal Error: 0x000B001C
10,706,651 >>> mbox cmd response: failed
10,707,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,707,354 >>> mbox cmd response: failed
10,707,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,707,916 >>> mbox cmd response: failed
Initializing fuses
2,058,916 writing to cptra_bootfsm_go
2,248,226 UART:
2,248,572 UART: Running Caliptra ROM ...
2,249,710 UART:
9,750,240 UART: [state] CFI Enabled
9,767,153 UART: [state] LifecycleState = Unprovisioned
9,769,078 UART: [state] DebugLocked = No
9,771,668 UART: [state] WD Timer not started. Device not locked for debugging
9,775,267 UART: [kat] SHA2-256
9,954,924 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,965,723 UART: [kat] ++
9,966,219 UART: [kat] sha1
9,978,139 UART: [kat] SHA2-256
9,980,836 UART: [kat] SHA2-384
9,987,325 UART: [kat] SHA2-512-ACC
9,989,729 UART: [kat] ECC-384
12,431,123 UART: [kat] HMAC-384Kdf
12,443,243 UART: [kat] LMS
12,919,723 UART: [kat] --
12,923,006 UART: [cold-reset] ++
12,924,836 UART: [fht] FHT @ 0x50003400
12,936,246 UART: [idev] ++
12,936,813 UART: [idev] CDI.KEYID = 6
12,937,751 UART: [idev] SUBJECT.KEYID = 7
12,939,020 UART: [idev] UDS.KEYID = 0
12,941,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,091,436 UART: [idev] Erasing UDS.KEYID = 0
15,415,329 UART: [idev] Sha1 KeyId Algorithm
15,438,172 UART: [idev] --
15,444,244 UART: [ldev] ++
15,444,850 UART: [ldev] CDI.KEYID = 6
15,445,761 UART: [ldev] SUBJECT.KEYID = 5
15,446,929 UART: [ldev] AUTHORITY.KEYID = 7
15,448,224 UART: [ldev] FE.KEYID = 1
15,459,143 UART: [ldev] Erasing FE.KEYID = 1
17,936,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,656,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,672,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,688,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,704,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,726,483 UART: [ldev] --
19,732,505 UART: [fwproc] Wait for Commands...
19,734,874 UART: [fwproc] Recv command 0x46574c44
19,736,864 UART: [fwproc] Recv'd Img size: 118548 bytes
23,223,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,307,052 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,380,098 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,707,487 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,779,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,588,856 >>> mbox cmd response: failed
10,589,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,589,808 >>> mbox cmd response: failed
10,590,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,590,376 >>> mbox cmd response: failed
Initializing fuses
2,058,533 writing to cptra_bootfsm_go
13,058,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,721,609 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,213 UART:
192,583 UART: Running Caliptra ROM ...
193,776 UART:
193,932 UART: [state] CFI Enabled
263,194 UART: [state] LifecycleState = Unprovisioned
265,621 UART: [state] DebugLocked = No
268,418 UART: [state] WD Timer not started. Device not locked for debugging
273,407 UART: [kat] SHA2-256
463,280 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,049 UART: [kat] ++
474,552 UART: [kat] sha1
486,627 UART: [kat] SHA2-256
489,647 UART: [kat] SHA2-384
495,583 UART: [kat] SHA2-512-ACC
498,157 UART: [kat] ECC-384
2,944,147 UART: [kat] HMAC-384Kdf
2,969,766 UART: [kat] LMS
3,501,549 UART: [kat] --
3,507,108 UART: [cold-reset] ++
3,509,240 UART: [fht] FHT @ 0x50003400
3,522,021 UART: [idev] ++
3,522,716 UART: [idev] CDI.KEYID = 6
3,523,740 UART: [idev] SUBJECT.KEYID = 7
3,524,913 UART: [idev] UDS.KEYID = 0
3,527,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,091 UART: [idev] Erasing UDS.KEYID = 0
6,025,223 UART: [idev] Sha1 KeyId Algorithm
6,047,261 UART: [idev] --
6,052,456 UART: [ldev] ++
6,053,153 UART: [ldev] CDI.KEYID = 6
6,054,047 UART: [ldev] SUBJECT.KEYID = 5
6,055,159 UART: [ldev] AUTHORITY.KEYID = 7
6,056,458 UART: [ldev] FE.KEYID = 1
6,099,371 UART: [ldev] Erasing FE.KEYID = 1
8,607,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,653 UART: [ldev] --
10,412,333 UART: [fwproc] Wait for Commands...
10,414,666 UART: [fwproc] Recv command 0x46574c44
10,416,985 UART: [fwproc] Recv'd Img size: 118548 bytes
10,541,396 UART: ROM Fatal Error: 0x000B001C
10,545,036 >>> mbox cmd response: failed
10,545,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,545,931 >>> mbox cmd response: failed
10,546,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,450 >>> mbox cmd response: failed
Initializing fuses
2,063,265 writing to cptra_bootfsm_go
2,252,585 UART:
2,252,941 UART: Running Caliptra ROM ...
2,254,080 UART:
2,254,276 UART: [state] CFI Enabled
2,324,949 UART: [state] LifecycleState = Unprovisioned
2,327,334 UART: [state] DebugLocked = No
2,329,753 UART: [state] WD Timer not started. Device not locked for debugging
2,334,600 UART: [kat] SHA2-256
2,524,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,535,264 UART: [kat] ++
2,535,757 UART: [kat] sha1
2,547,841 UART: [kat] SHA2-256
2,550,867 UART: [kat] SHA2-384
2,556,009 UART: [kat] SHA2-512-ACC
2,558,622 UART: [kat] ECC-384
5,009,851 UART: [kat] HMAC-384Kdf
5,034,079 UART: [kat] LMS
5,565,845 UART: [kat] --
5,568,419 UART: [cold-reset] ++
5,570,546 UART: [fht] FHT @ 0x50003400
5,582,623 UART: [idev] ++
5,583,304 UART: [idev] CDI.KEYID = 6
5,584,245 UART: [idev] SUBJECT.KEYID = 7
5,585,463 UART: [idev] UDS.KEYID = 0
5,587,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,736,943 UART: [idev] Erasing UDS.KEYID = 0
8,093,099 UART: [idev] Sha1 KeyId Algorithm
8,115,542 UART: [idev] --
8,122,030 UART: [ldev] ++
8,122,717 UART: [ldev] CDI.KEYID = 6
8,123,780 UART: [ldev] SUBJECT.KEYID = 5
8,124,883 UART: [ldev] AUTHORITY.KEYID = 7
8,126,059 UART: [ldev] FE.KEYID = 1
8,162,214 UART: [ldev] Erasing FE.KEYID = 1
10,671,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,404,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,419,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,434,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,449,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,470,040 UART: [ldev] --
12,475,470 UART: [fwproc] Wait for Commands...
12,478,661 UART: [fwproc] Recv command 0x46574c44
12,480,967 UART: [fwproc] Recv'd Img size: 118548 bytes
15,971,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,050,755 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,174,389 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,734,808 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,957 writing to cptra_bootfsm_go
3,439,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,341,735 >>> mbox cmd response: failed
10,342,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,342,608 >>> mbox cmd response: failed
10,342,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,343,179 >>> mbox cmd response: failed
Initializing fuses
2,054,588 writing to cptra_bootfsm_go
5,490,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,871,425 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,424 UART:
192,775 UART: Running Caliptra ROM ...
193,897 UART:
603,557 UART: [state] CFI Enabled
618,745 UART: [state] LifecycleState = Unprovisioned
621,086 UART: [state] DebugLocked = No
622,963 UART: [state] WD Timer not started. Device not locked for debugging
626,809 UART: [kat] SHA2-256
816,694 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,464 UART: [kat] ++
827,976 UART: [kat] sha1
839,401 UART: [kat] SHA2-256
842,416 UART: [kat] SHA2-384
848,941 UART: [kat] SHA2-512-ACC
851,516 UART: [kat] ECC-384
3,295,004 UART: [kat] HMAC-384Kdf
3,308,550 UART: [kat] LMS
3,840,390 UART: [kat] --
3,844,353 UART: [cold-reset] ++
3,846,136 UART: [fht] FHT @ 0x50003400
3,857,833 UART: [idev] ++
3,858,521 UART: [idev] CDI.KEYID = 6
3,859,539 UART: [idev] SUBJECT.KEYID = 7
3,860,704 UART: [idev] UDS.KEYID = 0
3,863,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,835 UART: [idev] Erasing UDS.KEYID = 0
6,337,117 UART: [idev] Sha1 KeyId Algorithm
6,359,823 UART: [idev] --
6,364,363 UART: [ldev] ++
6,365,053 UART: [ldev] CDI.KEYID = 6
6,365,952 UART: [ldev] SUBJECT.KEYID = 5
6,367,172 UART: [ldev] AUTHORITY.KEYID = 7
6,368,374 UART: [ldev] FE.KEYID = 1
6,379,471 UART: [ldev] Erasing FE.KEYID = 1
8,857,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,109 UART: [ldev] --
10,646,930 UART: [fwproc] Wait for Commands...
10,649,142 UART: [fwproc] Recv command 0x46574c44
10,651,465 UART: [fwproc] Recv'd Img size: 118548 bytes
10,776,544 UART: ROM Fatal Error: 0x000B001C
10,780,187 >>> mbox cmd response: failed
10,780,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,780,801 >>> mbox cmd response: failed
10,781,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,781,407 >>> mbox cmd response: failed
Initializing fuses
2,059,216 writing to cptra_bootfsm_go
2,248,532 UART:
2,248,887 UART: Running Caliptra ROM ...
2,249,940 UART:
9,673,446 UART: [state] CFI Enabled
9,687,692 UART: [state] LifecycleState = Unprovisioned
9,690,094 UART: [state] DebugLocked = No
9,691,795 UART: [state] WD Timer not started. Device not locked for debugging
9,696,006 UART: [kat] SHA2-256
9,885,869 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,896,671 UART: [kat] ++
9,897,297 UART: [kat] sha1
9,909,493 UART: [kat] SHA2-256
9,912,520 UART: [kat] SHA2-384
9,917,872 UART: [kat] SHA2-512-ACC
9,920,444 UART: [kat] ECC-384
12,360,451 UART: [kat] HMAC-384Kdf
12,373,614 UART: [kat] LMS
12,905,440 UART: [kat] --
12,910,188 UART: [cold-reset] ++
12,912,604 UART: [fht] FHT @ 0x50003400
12,924,237 UART: [idev] ++
12,924,914 UART: [idev] CDI.KEYID = 6
12,925,934 UART: [idev] SUBJECT.KEYID = 7
12,927,092 UART: [idev] UDS.KEYID = 0
12,929,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,078,534 UART: [idev] Erasing UDS.KEYID = 0
15,403,861 UART: [idev] Sha1 KeyId Algorithm
15,427,159 UART: [idev] --
15,430,510 UART: [ldev] ++
15,431,193 UART: [ldev] CDI.KEYID = 6
15,432,103 UART: [ldev] SUBJECT.KEYID = 5
15,433,262 UART: [ldev] AUTHORITY.KEYID = 7
15,434,496 UART: [ldev] FE.KEYID = 1
15,444,717 UART: [ldev] Erasing FE.KEYID = 1
17,916,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,635,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,650,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,665,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,680,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,701,418 UART: [ldev] --
19,707,513 UART: [fwproc] Wait for Commands...
19,710,321 UART: [fwproc] Recv command 0x46574c44
19,712,661 UART: [fwproc] Recv'd Img size: 118548 bytes
23,209,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,291,224 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,414,846 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,975,798 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,759,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,564,219 >>> mbox cmd response: failed
10,564,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,565,147 >>> mbox cmd response: failed
10,565,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,565,725 >>> mbox cmd response: failed
Initializing fuses
2,053,577 writing to cptra_bootfsm_go
13,058,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,333,334 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,935 UART: [kat] SHA2-256
881,866 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,981 UART: [kat] ++
886,133 UART: [kat] sha1
890,423 UART: [kat] SHA2-256
892,361 UART: [kat] SHA2-384
895,266 UART: [kat] SHA2-512-ACC
897,167 UART: [kat] ECC-384
902,942 UART: [kat] HMAC-384Kdf
907,364 UART: [kat] LMS
1,475,560 UART: [kat] --
1,476,573 UART: [cold-reset] ++
1,477,047 UART: [fht] Storing FHT @ 0x50003400
1,479,844 UART: [idev] ++
1,480,012 UART: [idev] CDI.KEYID = 6
1,480,372 UART: [idev] SUBJECT.KEYID = 7
1,480,796 UART: [idev] UDS.KEYID = 0
1,481,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,910 UART: [idev] Erasing UDS.KEYID = 0
1,506,084 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,656 UART: [idev] --
1,515,687 UART: [ldev] ++
1,515,855 UART: [ldev] CDI.KEYID = 6
1,516,218 UART: [ldev] SUBJECT.KEYID = 5
1,516,644 UART: [ldev] AUTHORITY.KEYID = 7
1,517,107 UART: [ldev] FE.KEYID = 1
1,521,909 UART: [ldev] Erasing FE.KEYID = 1
1,547,500 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,034 UART: [ldev] --
1,586,443 UART: [fwproc] Waiting for Commands...
1,587,110 UART: [fwproc] Received command 0x46574c44
1,587,901 UART: [fwproc] Received Image of size 118548 bytes
1,623,595 UART: ROM Fatal Error: 0x000B001C
1,624,754 >>> mbox cmd response: failed
1,624,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,760 >>> mbox cmd response: failed
1,624,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,766 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,059 UART: [kat] SHA2-256
881,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,105 UART: [kat] ++
886,257 UART: [kat] sha1
890,495 UART: [kat] SHA2-256
892,433 UART: [kat] SHA2-384
895,118 UART: [kat] SHA2-512-ACC
897,019 UART: [kat] ECC-384
902,884 UART: [kat] HMAC-384Kdf
907,388 UART: [kat] LMS
1,475,584 UART: [kat] --
1,476,573 UART: [cold-reset] ++
1,477,025 UART: [fht] Storing FHT @ 0x50003400
1,479,786 UART: [idev] ++
1,479,954 UART: [idev] CDI.KEYID = 6
1,480,314 UART: [idev] SUBJECT.KEYID = 7
1,480,738 UART: [idev] UDS.KEYID = 0
1,481,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,102 UART: [idev] Erasing UDS.KEYID = 0
1,505,768 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,420 UART: [idev] --
1,515,503 UART: [ldev] ++
1,515,671 UART: [ldev] CDI.KEYID = 6
1,516,034 UART: [ldev] SUBJECT.KEYID = 5
1,516,460 UART: [ldev] AUTHORITY.KEYID = 7
1,516,923 UART: [ldev] FE.KEYID = 1
1,522,065 UART: [ldev] Erasing FE.KEYID = 1
1,547,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,480 UART: [ldev] --
1,586,803 UART: [fwproc] Waiting for Commands...
1,587,672 UART: [fwproc] Received command 0x46574c44
1,588,463 UART: [fwproc] Received Image of size 118548 bytes
2,931,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,166 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,384 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,757 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,476,049 >>> mbox cmd response: failed
1,476,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,055 >>> mbox cmd response: failed
1,476,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,061 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,289 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,928 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,424 UART: [kat] SHA2-256
882,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,470 UART: [kat] ++
886,622 UART: [kat] sha1
890,884 UART: [kat] SHA2-256
892,822 UART: [kat] SHA2-384
895,767 UART: [kat] SHA2-512-ACC
897,668 UART: [kat] ECC-384
903,107 UART: [kat] HMAC-384Kdf
907,595 UART: [kat] LMS
1,475,791 UART: [kat] --
1,476,456 UART: [cold-reset] ++
1,476,880 UART: [fht] Storing FHT @ 0x50003400
1,479,695 UART: [idev] ++
1,479,863 UART: [idev] CDI.KEYID = 6
1,480,223 UART: [idev] SUBJECT.KEYID = 7
1,480,647 UART: [idev] UDS.KEYID = 0
1,480,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,079 UART: [idev] Erasing UDS.KEYID = 0
1,504,401 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,247 UART: [idev] --
1,514,344 UART: [ldev] ++
1,514,512 UART: [ldev] CDI.KEYID = 6
1,514,875 UART: [ldev] SUBJECT.KEYID = 5
1,515,301 UART: [ldev] AUTHORITY.KEYID = 7
1,515,764 UART: [ldev] FE.KEYID = 1
1,520,986 UART: [ldev] Erasing FE.KEYID = 1
1,546,987 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,645 UART: [ldev] --
1,586,126 UART: [fwproc] Waiting for Commands...
1,586,815 UART: [fwproc] Received command 0x46574c44
1,587,606 UART: [fwproc] Received Image of size 118548 bytes
1,622,812 UART: ROM Fatal Error: 0x000B001C
1,623,971 >>> mbox cmd response: failed
1,623,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,977 >>> mbox cmd response: failed
1,623,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,983 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,232 UART: [kat] SHA2-256
882,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,278 UART: [kat] ++
886,430 UART: [kat] sha1
890,556 UART: [kat] SHA2-256
892,494 UART: [kat] SHA2-384
895,263 UART: [kat] SHA2-512-ACC
897,164 UART: [kat] ECC-384
902,857 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,852 UART: [cold-reset] ++
1,477,402 UART: [fht] Storing FHT @ 0x50003400
1,480,153 UART: [idev] ++
1,480,321 UART: [idev] CDI.KEYID = 6
1,480,681 UART: [idev] SUBJECT.KEYID = 7
1,481,105 UART: [idev] UDS.KEYID = 0
1,481,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,051 UART: [idev] Erasing UDS.KEYID = 0
1,505,995 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,781 UART: [idev] --
1,515,934 UART: [ldev] ++
1,516,102 UART: [ldev] CDI.KEYID = 6
1,516,465 UART: [ldev] SUBJECT.KEYID = 5
1,516,891 UART: [ldev] AUTHORITY.KEYID = 7
1,517,354 UART: [ldev] FE.KEYID = 1
1,522,672 UART: [ldev] Erasing FE.KEYID = 1
1,547,775 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,533 UART: [ldev] --
1,586,954 UART: [fwproc] Waiting for Commands...
1,587,751 UART: [fwproc] Received command 0x46574c44
1,588,542 UART: [fwproc] Received Image of size 118548 bytes
2,933,117 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,697 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,915 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,230 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,010 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,476,996 >>> mbox cmd response: failed
1,476,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,002 >>> mbox cmd response: failed
1,477,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,574 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
915,571 UART: [kat] HMAC-384Kdf
919,975 UART: [kat] LMS
1,168,287 UART: [kat] --
1,169,490 UART: [cold-reset] ++
1,169,834 UART: [fht] FHT @ 0x50003400
1,172,524 UART: [idev] ++
1,172,692 UART: [idev] CDI.KEYID = 6
1,173,053 UART: [idev] SUBJECT.KEYID = 7
1,173,478 UART: [idev] UDS.KEYID = 0
1,173,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,641 UART: [idev] Erasing UDS.KEYID = 0
1,198,799 UART: [idev] Sha1 KeyId Algorithm
1,207,745 UART: [idev] --
1,208,802 UART: [ldev] ++
1,208,970 UART: [ldev] CDI.KEYID = 6
1,209,334 UART: [ldev] SUBJECT.KEYID = 5
1,209,761 UART: [ldev] AUTHORITY.KEYID = 7
1,210,224 UART: [ldev] FE.KEYID = 1
1,215,318 UART: [ldev] Erasing FE.KEYID = 1
1,241,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,058 UART: [ldev] --
1,280,431 UART: [fwproc] Wait for Commands...
1,281,134 UART: [fwproc] Recv command 0x46574c44
1,281,867 UART: [fwproc] Recv'd Img size: 118548 bytes
1,316,962 UART: ROM Fatal Error: 0x000B001C
1,318,121 >>> mbox cmd response: failed
1,318,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,127 >>> mbox cmd response: failed
1,318,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,133 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,602 UART: [kat] SHA2-256
901,542 UART: [kat] SHA2-384
904,289 UART: [kat] SHA2-512-ACC
906,190 UART: [kat] ECC-384
916,087 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,169,748 UART: [cold-reset] ++
1,170,228 UART: [fht] FHT @ 0x50003400
1,173,026 UART: [idev] ++
1,173,194 UART: [idev] CDI.KEYID = 6
1,173,555 UART: [idev] SUBJECT.KEYID = 7
1,173,980 UART: [idev] UDS.KEYID = 0
1,174,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,023 UART: [idev] Erasing UDS.KEYID = 0
1,199,473 UART: [idev] Sha1 KeyId Algorithm
1,208,441 UART: [idev] --
1,209,446 UART: [ldev] ++
1,209,614 UART: [ldev] CDI.KEYID = 6
1,209,978 UART: [ldev] SUBJECT.KEYID = 5
1,210,405 UART: [ldev] AUTHORITY.KEYID = 7
1,210,868 UART: [ldev] FE.KEYID = 1
1,215,934 UART: [ldev] Erasing FE.KEYID = 1
1,241,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,794 UART: [ldev] --
1,281,087 UART: [fwproc] Wait for Commands...
1,281,696 UART: [fwproc] Recv command 0x46574c44
1,282,429 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,681 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,302 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,477 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,876 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,173,874 >>> mbox cmd response: failed
1,173,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,880 >>> mbox cmd response: failed
1,173,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,886 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,435 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,791 UART: [state] LifecycleState = Unprovisioned
86,446 UART: [state] DebugLocked = No
86,968 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
900,283 UART: [kat] SHA2-256
902,223 UART: [kat] SHA2-384
904,974 UART: [kat] SHA2-512-ACC
906,875 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
920,958 UART: [kat] LMS
1,169,270 UART: [kat] --
1,169,939 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,173,161 UART: [idev] ++
1,173,329 UART: [idev] CDI.KEYID = 6
1,173,690 UART: [idev] SUBJECT.KEYID = 7
1,174,115 UART: [idev] UDS.KEYID = 0
1,174,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,162 UART: [idev] Erasing UDS.KEYID = 0
1,198,640 UART: [idev] Sha1 KeyId Algorithm
1,207,352 UART: [idev] --
1,208,429 UART: [ldev] ++
1,208,597 UART: [ldev] CDI.KEYID = 6
1,208,961 UART: [ldev] SUBJECT.KEYID = 5
1,209,388 UART: [ldev] AUTHORITY.KEYID = 7
1,209,851 UART: [ldev] FE.KEYID = 1
1,215,385 UART: [ldev] Erasing FE.KEYID = 1
1,242,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,003 UART: [ldev] --
1,281,254 UART: [fwproc] Wait for Commands...
1,282,025 UART: [fwproc] Recv command 0x46574c44
1,282,758 UART: [fwproc] Recv'd Img size: 118548 bytes
1,318,311 UART: ROM Fatal Error: 0x000B001C
1,319,470 >>> mbox cmd response: failed
1,319,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,476 >>> mbox cmd response: failed
1,319,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,482 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
891,667 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,771 UART: [kat] ++
895,923 UART: [kat] sha1
900,053 UART: [kat] SHA2-256
901,993 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,150 UART: [kat] HMAC-384Kdf
920,958 UART: [kat] LMS
1,169,270 UART: [kat] --
1,170,085 UART: [cold-reset] ++
1,170,599 UART: [fht] FHT @ 0x50003400
1,173,181 UART: [idev] ++
1,173,349 UART: [idev] CDI.KEYID = 6
1,173,710 UART: [idev] SUBJECT.KEYID = 7
1,174,135 UART: [idev] UDS.KEYID = 0
1,174,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,028 UART: [idev] Erasing UDS.KEYID = 0
1,199,460 UART: [idev] Sha1 KeyId Algorithm
1,208,266 UART: [idev] --
1,209,149 UART: [ldev] ++
1,209,317 UART: [ldev] CDI.KEYID = 6
1,209,681 UART: [ldev] SUBJECT.KEYID = 5
1,210,108 UART: [ldev] AUTHORITY.KEYID = 7
1,210,571 UART: [ldev] FE.KEYID = 1
1,215,947 UART: [ldev] Erasing FE.KEYID = 1
1,242,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,575 UART: [ldev] --
1,281,966 UART: [fwproc] Wait for Commands...
1,282,583 UART: [fwproc] Recv command 0x46574c44
1,283,316 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,349 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,524 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,707 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,176,107 >>> mbox cmd response: failed
1,176,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,113 >>> mbox cmd response: failed
1,176,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,258 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
893,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,697 UART: [kat] ++
897,849 UART: [kat] sha1
902,021 UART: [kat] SHA2-256
903,961 UART: [kat] SHA2-384
906,764 UART: [kat] SHA2-512-ACC
908,665 UART: [kat] ECC-384
918,768 UART: [kat] HMAC-384Kdf
923,494 UART: [kat] LMS
1,171,822 UART: [kat] --
1,172,627 UART: [cold-reset] ++
1,173,151 UART: [fht] FHT @ 0x50003400
1,175,926 UART: [idev] ++
1,176,094 UART: [idev] CDI.KEYID = 6
1,176,454 UART: [idev] SUBJECT.KEYID = 7
1,176,878 UART: [idev] UDS.KEYID = 0
1,177,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,968 UART: [idev] Erasing UDS.KEYID = 0
1,202,345 UART: [idev] Sha1 KeyId Algorithm
1,210,759 UART: [idev] --
1,211,775 UART: [ldev] ++
1,211,943 UART: [ldev] CDI.KEYID = 6
1,212,306 UART: [ldev] SUBJECT.KEYID = 5
1,212,732 UART: [ldev] AUTHORITY.KEYID = 7
1,213,195 UART: [ldev] FE.KEYID = 1
1,218,371 UART: [ldev] Erasing FE.KEYID = 1
1,244,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,881 UART: [ldev] --
1,284,300 UART: [fwproc] Wait for Commands...
1,284,880 UART: [fwproc] Recv command 0x46574c44
1,285,608 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,448 UART: ROM Fatal Error: 0x000B001C
1,322,607 >>> mbox cmd response: failed
1,322,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,613 >>> mbox cmd response: failed
1,322,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,619 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
893,408 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,533 UART: [kat] ++
897,685 UART: [kat] sha1
901,833 UART: [kat] SHA2-256
903,773 UART: [kat] SHA2-384
906,646 UART: [kat] SHA2-512-ACC
908,547 UART: [kat] ECC-384
918,362 UART: [kat] HMAC-384Kdf
923,006 UART: [kat] LMS
1,171,334 UART: [kat] --
1,172,101 UART: [cold-reset] ++
1,172,435 UART: [fht] FHT @ 0x50003400
1,175,088 UART: [idev] ++
1,175,256 UART: [idev] CDI.KEYID = 6
1,175,616 UART: [idev] SUBJECT.KEYID = 7
1,176,040 UART: [idev] UDS.KEYID = 0
1,176,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,094 UART: [idev] Erasing UDS.KEYID = 0
1,200,911 UART: [idev] Sha1 KeyId Algorithm
1,209,355 UART: [idev] --
1,210,179 UART: [ldev] ++
1,210,347 UART: [ldev] CDI.KEYID = 6
1,210,710 UART: [ldev] SUBJECT.KEYID = 5
1,211,136 UART: [ldev] AUTHORITY.KEYID = 7
1,211,599 UART: [ldev] FE.KEYID = 1
1,216,645 UART: [ldev] Erasing FE.KEYID = 1
1,243,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,329 UART: [ldev] --
1,282,602 UART: [fwproc] Wait for Commands...
1,283,218 UART: [fwproc] Recv command 0x46574c44
1,283,946 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,251 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,421 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,796 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,174,844 >>> mbox cmd response: failed
1,174,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,850 >>> mbox cmd response: failed
1,174,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,813 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
893,687 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,812 UART: [kat] ++
897,964 UART: [kat] sha1
902,306 UART: [kat] SHA2-256
904,246 UART: [kat] SHA2-384
907,019 UART: [kat] SHA2-512-ACC
908,920 UART: [kat] ECC-384
918,363 UART: [kat] HMAC-384Kdf
922,973 UART: [kat] LMS
1,171,301 UART: [kat] --
1,172,602 UART: [cold-reset] ++
1,173,014 UART: [fht] FHT @ 0x50003400
1,175,637 UART: [idev] ++
1,175,805 UART: [idev] CDI.KEYID = 6
1,176,165 UART: [idev] SUBJECT.KEYID = 7
1,176,589 UART: [idev] UDS.KEYID = 0
1,176,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,437 UART: [idev] Erasing UDS.KEYID = 0
1,201,520 UART: [idev] Sha1 KeyId Algorithm
1,209,964 UART: [idev] --
1,210,994 UART: [ldev] ++
1,211,162 UART: [ldev] CDI.KEYID = 6
1,211,525 UART: [ldev] SUBJECT.KEYID = 5
1,211,951 UART: [ldev] AUTHORITY.KEYID = 7
1,212,414 UART: [ldev] FE.KEYID = 1
1,217,744 UART: [ldev] Erasing FE.KEYID = 1
1,244,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,294 UART: [ldev] --
1,283,743 UART: [fwproc] Wait for Commands...
1,284,519 UART: [fwproc] Recv command 0x46574c44
1,285,247 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,473 UART: ROM Fatal Error: 0x000B001C
1,321,632 >>> mbox cmd response: failed
1,321,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,638 >>> mbox cmd response: failed
1,321,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,644 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
901,760 UART: [kat] SHA2-256
903,700 UART: [kat] SHA2-384
906,415 UART: [kat] SHA2-512-ACC
908,316 UART: [kat] ECC-384
918,071 UART: [kat] HMAC-384Kdf
922,659 UART: [kat] LMS
1,170,987 UART: [kat] --
1,171,992 UART: [cold-reset] ++
1,172,566 UART: [fht] FHT @ 0x50003400
1,175,027 UART: [idev] ++
1,175,195 UART: [idev] CDI.KEYID = 6
1,175,555 UART: [idev] SUBJECT.KEYID = 7
1,175,979 UART: [idev] UDS.KEYID = 0
1,176,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,749 UART: [idev] Erasing UDS.KEYID = 0
1,200,870 UART: [idev] Sha1 KeyId Algorithm
1,209,280 UART: [idev] --
1,210,340 UART: [ldev] ++
1,210,508 UART: [ldev] CDI.KEYID = 6
1,210,871 UART: [ldev] SUBJECT.KEYID = 5
1,211,297 UART: [ldev] AUTHORITY.KEYID = 7
1,211,760 UART: [ldev] FE.KEYID = 1
1,216,788 UART: [ldev] Erasing FE.KEYID = 1
1,243,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,458 UART: [ldev] --
1,282,951 UART: [fwproc] Wait for Commands...
1,283,681 UART: [fwproc] Recv command 0x46574c44
1,284,409 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,794 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,964 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,169 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,176,363 >>> mbox cmd response: failed
1,176,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,369 >>> mbox cmd response: failed
1,176,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,088 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,446,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,407,143 >>> mbox cmd response: failed
10,407,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,408,010 >>> mbox cmd response: failed
10,408,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,408,586 >>> mbox cmd response: failed
Initializing fuses
2,061,130 writing to cptra_bootfsm_go
5,493,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,352,022 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,445,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,410,532 >>> mbox cmd response: failed
10,411,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,411,453 >>> mbox cmd response: failed
10,411,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,412,035 >>> mbox cmd response: failed
Initializing fuses
2,063,123 writing to cptra_bootfsm_go
5,507,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,340,309 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,779,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,632,060 >>> mbox cmd response: failed
10,632,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,633,144 >>> mbox cmd response: failed
10,633,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,633,716 >>> mbox cmd response: failed
Initializing fuses
2,060,143 writing to cptra_bootfsm_go
13,011,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,736,325 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,776,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,622,957 >>> mbox cmd response: failed
10,623,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,623,846 >>> mbox cmd response: failed
10,624,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,624,466 >>> mbox cmd response: failed
Initializing fuses
2,068,625 writing to cptra_bootfsm_go
13,025,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,734,600 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,469,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,434,675 >>> mbox cmd response: failed
10,435,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,435,610 >>> mbox cmd response: failed
10,435,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,436,232 >>> mbox cmd response: failed
Initializing fuses
2,063,961 writing to cptra_bootfsm_go
5,508,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,339,210 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,451,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,409,649 >>> mbox cmd response: failed
10,410,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,410,546 >>> mbox cmd response: failed
10,410,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,411,118 >>> mbox cmd response: failed
Initializing fuses
2,063,186 writing to cptra_bootfsm_go
5,509,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,344,229 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
3,782,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,627,463 >>> mbox cmd response: failed
10,628,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,628,526 >>> mbox cmd response: failed
10,628,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,629,103 >>> mbox cmd response: failed
Initializing fuses
2,062,244 writing to cptra_bootfsm_go
13,021,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,733,070 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,779,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,630,239 >>> mbox cmd response: failed
10,630,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,631,132 >>> mbox cmd response: failed
10,631,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,631,709 >>> mbox cmd response: failed
Initializing fuses
2,062,122 writing to cptra_bootfsm_go
13,007,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,712,223 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,196,149 >>> mbox cmd response: failed
1,196,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,155 >>> mbox cmd response: failed
1,196,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,161 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,462 UART: [state] LifecycleState = Unprovisioned
85,117 UART: [state] DebugLocked = No
85,719 UART: [state] WD Timer not started. Device not locked for debugging
86,830 UART: [kat] SHA2-256
890,380 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,484 UART: [kat] ++
894,636 UART: [kat] sha1
899,016 UART: [kat] SHA2-256
900,956 UART: [kat] SHA2-384
903,653 UART: [kat] SHA2-512-ACC
905,554 UART: [kat] ECC-384
915,483 UART: [kat] HMAC-384Kdf
920,089 UART: [kat] LMS
1,168,401 UART: [kat] --
1,169,222 UART: [cold-reset] ++
1,169,692 UART: [fht] FHT @ 0x50003400
1,172,262 UART: [idev] ++
1,172,430 UART: [idev] CDI.KEYID = 6
1,172,791 UART: [idev] SUBJECT.KEYID = 7
1,173,216 UART: [idev] UDS.KEYID = 0
1,173,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,225 UART: [idev] Erasing UDS.KEYID = 0
1,198,287 UART: [idev] Sha1 KeyId Algorithm
1,207,181 UART: [idev] --
1,208,092 UART: [ldev] ++
1,208,260 UART: [ldev] CDI.KEYID = 6
1,208,624 UART: [ldev] SUBJECT.KEYID = 5
1,209,051 UART: [ldev] AUTHORITY.KEYID = 7
1,209,514 UART: [ldev] FE.KEYID = 1
1,214,586 UART: [ldev] Erasing FE.KEYID = 1
1,241,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,836 UART: [ldev] --
1,280,275 UART: [fwproc] Wait for Commands...
1,280,942 UART: [fwproc] Recv command 0x46574c44
1,281,675 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,470 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,645 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,914 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,198,961 >>> mbox cmd response: failed
1,198,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,967 >>> mbox cmd response: failed
1,198,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,973 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,591 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,760 >>> mbox cmd response: failed
1,199,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,766 >>> mbox cmd response: failed
1,199,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,772 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,359 UART: [kat] ++
895,511 UART: [kat] sha1
899,639 UART: [kat] SHA2-256
901,579 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
915,930 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,169,819 UART: [cold-reset] ++
1,170,291 UART: [fht] FHT @ 0x50003400
1,172,907 UART: [idev] ++
1,173,075 UART: [idev] CDI.KEYID = 6
1,173,436 UART: [idev] SUBJECT.KEYID = 7
1,173,861 UART: [idev] UDS.KEYID = 0
1,174,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,976 UART: [idev] Erasing UDS.KEYID = 0
1,198,798 UART: [idev] Sha1 KeyId Algorithm
1,207,630 UART: [idev] --
1,208,661 UART: [ldev] ++
1,208,829 UART: [ldev] CDI.KEYID = 6
1,209,193 UART: [ldev] SUBJECT.KEYID = 5
1,209,620 UART: [ldev] AUTHORITY.KEYID = 7
1,210,083 UART: [ldev] FE.KEYID = 1
1,215,211 UART: [ldev] Erasing FE.KEYID = 1
1,241,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,853 UART: [ldev] --
1,281,106 UART: [fwproc] Wait for Commands...
1,281,829 UART: [fwproc] Recv command 0x46574c44
1,282,562 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,697 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,872 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,219 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,198,496 >>> mbox cmd response: failed
1,198,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,502 >>> mbox cmd response: failed
1,198,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,508 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,116 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,197,245 >>> mbox cmd response: failed
1,197,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,251 >>> mbox cmd response: failed
1,197,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
893,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,311 UART: [kat] ++
897,463 UART: [kat] sha1
901,805 UART: [kat] SHA2-256
903,745 UART: [kat] SHA2-384
906,302 UART: [kat] SHA2-512-ACC
908,203 UART: [kat] ECC-384
917,862 UART: [kat] HMAC-384Kdf
922,434 UART: [kat] LMS
1,170,762 UART: [kat] --
1,171,687 UART: [cold-reset] ++
1,172,221 UART: [fht] FHT @ 0x50003400
1,174,930 UART: [idev] ++
1,175,098 UART: [idev] CDI.KEYID = 6
1,175,458 UART: [idev] SUBJECT.KEYID = 7
1,175,882 UART: [idev] UDS.KEYID = 0
1,176,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,964 UART: [idev] Erasing UDS.KEYID = 0
1,200,883 UART: [idev] Sha1 KeyId Algorithm
1,209,315 UART: [idev] --
1,210,297 UART: [ldev] ++
1,210,465 UART: [ldev] CDI.KEYID = 6
1,210,828 UART: [ldev] SUBJECT.KEYID = 5
1,211,254 UART: [ldev] AUTHORITY.KEYID = 7
1,211,717 UART: [ldev] FE.KEYID = 1
1,216,963 UART: [ldev] Erasing FE.KEYID = 1
1,243,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,333 UART: [ldev] --
1,282,596 UART: [fwproc] Wait for Commands...
1,283,314 UART: [fwproc] Recv command 0x46574c44
1,284,042 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,829 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,999 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,240 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,167 >>> mbox cmd response: failed
1,199,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,173 >>> mbox cmd response: failed
1,199,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,179 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,611 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,288 >>> mbox cmd response: failed
1,199,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,294 >>> mbox cmd response: failed
1,199,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [kat] SHA2-256
893,235 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,360 UART: [kat] ++
897,512 UART: [kat] sha1
901,946 UART: [kat] SHA2-256
903,886 UART: [kat] SHA2-384
906,585 UART: [kat] SHA2-512-ACC
908,486 UART: [kat] ECC-384
918,115 UART: [kat] HMAC-384Kdf
922,793 UART: [kat] LMS
1,171,121 UART: [kat] --
1,171,776 UART: [cold-reset] ++
1,172,112 UART: [fht] FHT @ 0x50003400
1,174,647 UART: [idev] ++
1,174,815 UART: [idev] CDI.KEYID = 6
1,175,175 UART: [idev] SUBJECT.KEYID = 7
1,175,599 UART: [idev] UDS.KEYID = 0
1,175,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,673 UART: [idev] Erasing UDS.KEYID = 0
1,200,966 UART: [idev] Sha1 KeyId Algorithm
1,209,378 UART: [idev] --
1,210,388 UART: [ldev] ++
1,210,556 UART: [ldev] CDI.KEYID = 6
1,210,919 UART: [ldev] SUBJECT.KEYID = 5
1,211,345 UART: [ldev] AUTHORITY.KEYID = 7
1,211,808 UART: [ldev] FE.KEYID = 1
1,217,290 UART: [ldev] Erasing FE.KEYID = 1
1,244,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,972 UART: [ldev] --
1,283,305 UART: [fwproc] Wait for Commands...
1,283,933 UART: [fwproc] Recv command 0x46574c44
1,284,661 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,642 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,812 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,183 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,530 >>> mbox cmd response: failed
1,199,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,536 >>> mbox cmd response: failed
1,199,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,604 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,207 UART:
192,556 UART: Running Caliptra ROM ...
193,703 UART:
193,855 UART: [state] CFI Enabled
262,053 UART: [state] LifecycleState = Unprovisioned
264,018 UART: [state] DebugLocked = No
266,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,578 UART: [kat] SHA2-256
441,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,749 UART: [kat] ++
452,359 UART: [kat] sha1
463,518 UART: [kat] SHA2-256
466,204 UART: [kat] SHA2-384
472,128 UART: [kat] SHA2-512-ACC
474,527 UART: [kat] ECC-384
2,765,932 UART: [kat] HMAC-384Kdf
2,778,714 UART: [kat] LMS
3,968,990 UART: [kat] --
3,974,844 UART: [cold-reset] ++
3,976,135 UART: [fht] Storing FHT @ 0x50003400
3,988,272 UART: [idev] ++
3,988,838 UART: [idev] CDI.KEYID = 6
3,989,779 UART: [idev] SUBJECT.KEYID = 7
3,991,046 UART: [idev] UDS.KEYID = 0
3,993,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,063 UART: [idev] Erasing UDS.KEYID = 0
7,324,260 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,713 UART: [idev] --
7,348,847 UART: [ldev] ++
7,349,414 UART: [ldev] CDI.KEYID = 6
7,350,353 UART: [ldev] SUBJECT.KEYID = 5
7,351,621 UART: [ldev] AUTHORITY.KEYID = 7
7,352,772 UART: [ldev] FE.KEYID = 1
7,400,122 UART: [ldev] Erasing FE.KEYID = 1
10,734,507 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,584 UART: [ldev] --
13,118,581 UART: [fwproc] Waiting for Commands...
13,121,652 UART: [fwproc] Received command 0x46574c44
13,123,919 UART: [fwproc] Received Image of size 118548 bytes
16,572,701 UART: ROM Fatal Error: 0x000B0030
16,576,109 >>> mbox cmd response: failed
16,576,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,576,807 >>> mbox cmd response: failed
16,577,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,577,498 >>> mbox cmd response: failed
Initializing fuses
2,064,044 writing to cptra_bootfsm_go
2,253,360 UART:
2,253,712 UART: Running Caliptra ROM ...
2,254,794 UART:
2,254,954 UART: [state] CFI Enabled
2,327,469 UART: [state] LifecycleState = Unprovisioned
2,329,439 UART: [state] DebugLocked = No
2,331,001 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,335,920 UART: [kat] SHA2-256
2,505,614 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,516,153 UART: [kat] ++
2,516,701 UART: [kat] sha1
2,528,305 UART: [kat] SHA2-256
2,530,999 UART: [kat] SHA2-384
2,537,256 UART: [kat] SHA2-512-ACC
2,539,665 UART: [kat] ECC-384
4,831,602 UART: [kat] HMAC-384Kdf
4,864,032 UART: [kat] LMS
6,054,378 UART: [kat] --
6,059,205 UART: [cold-reset] ++
6,060,549 UART: [fht] Storing FHT @ 0x50003400
6,070,683 UART: [idev] ++
6,071,319 UART: [idev] CDI.KEYID = 6
6,072,241 UART: [idev] SUBJECT.KEYID = 7
6,073,466 UART: [idev] UDS.KEYID = 0
6,075,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,224,838 UART: [idev] Erasing UDS.KEYID = 0
9,410,207 UART: [idev] Using Sha1 for KeyId Algorithm
9,432,628 UART: [idev] --
9,436,334 UART: [ldev] ++
9,436,972 UART: [ldev] CDI.KEYID = 6
9,437,891 UART: [ldev] SUBJECT.KEYID = 5
9,439,198 UART: [ldev] AUTHORITY.KEYID = 7
9,440,382 UART: [ldev] FE.KEYID = 1
9,488,688 UART: [ldev] Erasing FE.KEYID = 1
12,822,267 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,116,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,130,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,145,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,160,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,179,993 UART: [ldev] --
15,185,406 UART: [fwproc] Waiting for Commands...
15,188,595 UART: [fwproc] Received command 0x46574c44
15,190,891 UART: [fwproc] Received Image of size 118548 bytes
19,294,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,374,743 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,447,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,776,759 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,805,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,218,771 >>> mbox cmd response: failed
16,219,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,219,798 >>> mbox cmd response: failed
16,220,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,220,366 >>> mbox cmd response: failed
Initializing fuses
2,062,356 writing to cptra_bootfsm_go
5,861,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,019,082 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,515 UART:
192,879 UART: Running Caliptra ROM ...
194,006 UART:
603,833 UART: [state] CFI Enabled
618,582 UART: [state] LifecycleState = Unprovisioned
620,547 UART: [state] DebugLocked = No
621,827 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,617 UART: [kat] SHA2-256
797,360 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,899 UART: [kat] ++
808,436 UART: [kat] sha1
819,276 UART: [kat] SHA2-256
821,948 UART: [kat] SHA2-384
828,260 UART: [kat] SHA2-512-ACC
830,666 UART: [kat] ECC-384
3,115,358 UART: [kat] HMAC-384Kdf
3,128,087 UART: [kat] LMS
4,318,169 UART: [kat] --
4,322,745 UART: [cold-reset] ++
4,323,882 UART: [fht] Storing FHT @ 0x50003400
4,334,723 UART: [idev] ++
4,335,365 UART: [idev] CDI.KEYID = 6
4,336,283 UART: [idev] SUBJECT.KEYID = 7
4,337,446 UART: [idev] UDS.KEYID = 0
4,340,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,456 UART: [idev] Erasing UDS.KEYID = 0
7,625,976 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,249 UART: [idev] --
7,653,655 UART: [ldev] ++
7,654,229 UART: [ldev] CDI.KEYID = 6
7,655,247 UART: [ldev] SUBJECT.KEYID = 5
7,656,414 UART: [ldev] AUTHORITY.KEYID = 7
7,657,655 UART: [ldev] FE.KEYID = 1
7,668,147 UART: [ldev] Erasing FE.KEYID = 1
10,953,368 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,445 UART: [ldev] --
13,313,999 UART: [fwproc] Waiting for Commands...
13,315,776 UART: [fwproc] Received command 0x46574c44
13,317,971 UART: [fwproc] Received Image of size 118548 bytes
16,926,490 UART: ROM Fatal Error: 0x000B0030
16,929,907 >>> mbox cmd response: failed
16,930,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,930,683 >>> mbox cmd response: failed
16,930,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,931,255 >>> mbox cmd response: failed
Initializing fuses
2,064,107 writing to cptra_bootfsm_go
2,253,508 UART:
2,253,855 UART: Running Caliptra ROM ...
2,254,990 UART:
3,525,445 UART: [state] CFI Enabled
3,540,078 UART: [state] LifecycleState = Unprovisioned
3,541,996 UART: [state] DebugLocked = No
3,544,953 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,549,531 UART: [kat] SHA2-256
3,719,307 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,729,847 UART: [kat] ++
3,730,397 UART: [kat] sha1
3,741,734 UART: [kat] SHA2-256
3,744,480 UART: [kat] SHA2-384
3,751,495 UART: [kat] SHA2-512-ACC
3,753,854 UART: [kat] ECC-384
6,036,163 UART: [kat] HMAC-384Kdf
6,047,577 UART: [kat] LMS
7,237,662 UART: [kat] --
7,243,528 UART: [cold-reset] ++
7,245,318 UART: [fht] Storing FHT @ 0x50003400
7,256,424 UART: [idev] ++
7,257,014 UART: [idev] CDI.KEYID = 6
7,257,938 UART: [idev] SUBJECT.KEYID = 7
7,259,159 UART: [idev] UDS.KEYID = 0
7,261,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,410,625 UART: [idev] Erasing UDS.KEYID = 0
10,541,970 UART: [idev] Using Sha1 for KeyId Algorithm
10,563,680 UART: [idev] --
10,568,057 UART: [ldev] ++
10,568,639 UART: [ldev] CDI.KEYID = 6
10,569,605 UART: [ldev] SUBJECT.KEYID = 5
10,570,832 UART: [ldev] AUTHORITY.KEYID = 7
10,572,096 UART: [ldev] FE.KEYID = 1
10,581,893 UART: [ldev] Erasing FE.KEYID = 1
13,872,664 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,165,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,179,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,194,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,209,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,227,355 UART: [ldev] --
16,232,191 UART: [fwproc] Waiting for Commands...
16,234,792 UART: [fwproc] Received command 0x46574c44
16,236,986 UART: [fwproc] Received Image of size 118548 bytes
20,340,666 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,424,473 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,497,662 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,826,578 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
4,126,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,439,450 >>> mbox cmd response: failed
16,440,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,440,414 >>> mbox cmd response: failed
16,440,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,441,053 >>> mbox cmd response: failed
Initializing fuses
2,066,128 writing to cptra_bootfsm_go
7,560,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,602,754 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
192,230 UART:
192,585 UART: Running Caliptra ROM ...
193,820 UART:
193,973 UART: [state] CFI Enabled
261,839 UART: [state] LifecycleState = Unprovisioned
263,758 UART: [state] DebugLocked = No
265,473 UART: [state] WD Timer not started. Device not locked for debugging
269,768 UART: [kat] SHA2-256
449,396 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,202 UART: [kat] ++
460,699 UART: [kat] sha1
470,816 UART: [kat] SHA2-256
473,494 UART: [kat] SHA2-384
479,000 UART: [kat] SHA2-512-ACC
481,355 UART: [kat] ECC-384
2,926,107 UART: [kat] HMAC-384Kdf
2,948,915 UART: [kat] LMS
3,425,457 UART: [kat] --
3,431,897 UART: [cold-reset] ++
3,432,976 UART: [fht] FHT @ 0x50003400
3,444,503 UART: [idev] ++
3,445,138 UART: [idev] CDI.KEYID = 6
3,446,054 UART: [idev] SUBJECT.KEYID = 7
3,447,274 UART: [idev] UDS.KEYID = 0
3,449,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,144 UART: [idev] Erasing UDS.KEYID = 0
5,959,057 UART: [idev] Sha1 KeyId Algorithm
5,982,837 UART: [idev] --
5,988,213 UART: [ldev] ++
5,988,800 UART: [ldev] CDI.KEYID = 6
5,989,693 UART: [ldev] SUBJECT.KEYID = 5
5,990,912 UART: [ldev] AUTHORITY.KEYID = 7
5,992,151 UART: [ldev] FE.KEYID = 1
6,035,053 UART: [ldev] Erasing FE.KEYID = 1
8,542,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,728 UART: [ldev] --
10,351,505 UART: [fwproc] Wait for Commands...
10,353,179 UART: [fwproc] Recv command 0x46574c44
10,355,168 UART: [fwproc] Recv'd Img size: 118548 bytes
11,973,688 UART: ROM Fatal Error: 0x000B0030
11,976,968 >>> mbox cmd response: failed
11,977,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,977,701 >>> mbox cmd response: failed
11,977,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,978,223 >>> mbox cmd response: failed
Initializing fuses
2,060,120 writing to cptra_bootfsm_go
2,249,508 UART:
2,249,863 UART: Running Caliptra ROM ...
2,251,000 UART:
2,251,207 UART: [state] CFI Enabled
2,319,174 UART: [state] LifecycleState = Unprovisioned
2,321,069 UART: [state] DebugLocked = No
2,324,019 UART: [state] WD Timer not started. Device not locked for debugging
2,328,133 UART: [kat] SHA2-256
2,507,738 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,518,532 UART: [kat] ++
2,519,085 UART: [kat] sha1
2,528,751 UART: [kat] SHA2-256
2,531,448 UART: [kat] SHA2-384
2,538,479 UART: [kat] SHA2-512-ACC
2,540,840 UART: [kat] ECC-384
5,002,574 UART: [kat] HMAC-384Kdf
5,026,764 UART: [kat] LMS
5,503,247 UART: [kat] --
5,508,582 UART: [cold-reset] ++
5,510,421 UART: [fht] FHT @ 0x50003400
5,521,293 UART: [idev] ++
5,521,862 UART: [idev] CDI.KEYID = 6
5,522,834 UART: [idev] SUBJECT.KEYID = 7
5,524,297 UART: [idev] UDS.KEYID = 0
5,526,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,675,654 UART: [idev] Erasing UDS.KEYID = 0
8,041,793 UART: [idev] Sha1 KeyId Algorithm
8,065,959 UART: [idev] --
8,071,906 UART: [ldev] ++
8,072,485 UART: [ldev] CDI.KEYID = 6
8,073,374 UART: [ldev] SUBJECT.KEYID = 5
8,074,594 UART: [ldev] AUTHORITY.KEYID = 7
8,075,894 UART: [ldev] FE.KEYID = 1
8,113,095 UART: [ldev] Erasing FE.KEYID = 1
10,619,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,355,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,371,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,387,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,402,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,424,440 UART: [ldev] --
12,429,985 UART: [fwproc] Wait for Commands...
12,431,663 UART: [fwproc] Recv command 0x46574c44
12,433,662 UART: [fwproc] Recv'd Img size: 118548 bytes
15,920,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,005,019 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,078,055 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,407,215 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,462,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,900,838 >>> mbox cmd response: failed
11,901,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,901,777 >>> mbox cmd response: failed
11,902,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,902,354 >>> mbox cmd response: failed
Initializing fuses
2,068,833 writing to cptra_bootfsm_go
5,520,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,257,783 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
192,669 UART:
193,048 UART: Running Caliptra ROM ...
194,193 UART:
603,949 UART: [state] CFI Enabled
615,642 UART: [state] LifecycleState = Unprovisioned
617,592 UART: [state] DebugLocked = No
619,786 UART: [state] WD Timer not started. Device not locked for debugging
623,809 UART: [kat] SHA2-256
803,475 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,241 UART: [kat] ++
814,700 UART: [kat] sha1
825,739 UART: [kat] SHA2-256
828,433 UART: [kat] SHA2-384
834,469 UART: [kat] SHA2-512-ACC
836,812 UART: [kat] ECC-384
3,281,072 UART: [kat] HMAC-384Kdf
3,293,113 UART: [kat] LMS
3,769,618 UART: [kat] --
3,772,794 UART: [cold-reset] ++
3,774,001 UART: [fht] FHT @ 0x50003400
3,785,016 UART: [idev] ++
3,785,648 UART: [idev] CDI.KEYID = 6
3,786,569 UART: [idev] SUBJECT.KEYID = 7
3,787,788 UART: [idev] UDS.KEYID = 0
3,790,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,683 UART: [idev] Erasing UDS.KEYID = 0
6,267,797 UART: [idev] Sha1 KeyId Algorithm
6,291,310 UART: [idev] --
6,295,359 UART: [ldev] ++
6,295,933 UART: [ldev] CDI.KEYID = 6
6,296,849 UART: [ldev] SUBJECT.KEYID = 5
6,298,070 UART: [ldev] AUTHORITY.KEYID = 7
6,299,312 UART: [ldev] FE.KEYID = 1
6,310,666 UART: [ldev] Erasing FE.KEYID = 1
8,783,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,889 UART: [ldev] --
10,580,625 UART: [fwproc] Wait for Commands...
10,583,444 UART: [fwproc] Recv command 0x46574c44
10,585,445 UART: [fwproc] Recv'd Img size: 118548 bytes
12,208,414 UART: ROM Fatal Error: 0x000B0030
12,211,636 >>> mbox cmd response: failed
12,211,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,212,302 >>> mbox cmd response: failed
12,212,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,212,812 >>> mbox cmd response: failed
Initializing fuses
2,056,184 writing to cptra_bootfsm_go
2,245,480 UART:
2,245,817 UART: Running Caliptra ROM ...
2,246,863 UART:
8,251,185 UART: [state] CFI Enabled
8,264,802 UART: [state] LifecycleState = Unprovisioned
8,266,726 UART: [state] DebugLocked = No
8,269,577 UART: [state] WD Timer not started. Device not locked for debugging
8,273,653 UART: [kat] SHA2-256
8,453,269 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,464,069 UART: [kat] ++
8,464,620 UART: [kat] sha1
8,476,059 UART: [kat] SHA2-256
8,478,732 UART: [kat] SHA2-384
8,485,537 UART: [kat] SHA2-512-ACC
8,487,894 UART: [kat] ECC-384
10,928,854 UART: [kat] HMAC-384Kdf
10,941,082 UART: [kat] LMS
11,417,624 UART: [kat] --
11,421,136 UART: [cold-reset] ++
11,422,692 UART: [fht] FHT @ 0x50003400
11,434,054 UART: [idev] ++
11,434,625 UART: [idev] CDI.KEYID = 6
11,435,595 UART: [idev] SUBJECT.KEYID = 7
11,436,816 UART: [idev] UDS.KEYID = 0
11,439,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,588,126 UART: [idev] Erasing UDS.KEYID = 0
13,914,247 UART: [idev] Sha1 KeyId Algorithm
13,938,131 UART: [idev] --
13,944,393 UART: [ldev] ++
13,944,965 UART: [ldev] CDI.KEYID = 6
13,945,942 UART: [ldev] SUBJECT.KEYID = 5
13,947,132 UART: [ldev] AUTHORITY.KEYID = 7
13,948,374 UART: [ldev] FE.KEYID = 1
13,959,508 UART: [ldev] Erasing FE.KEYID = 1
16,435,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,154,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,169,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,185,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,201,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,222,879 UART: [ldev] --
18,228,584 UART: [fwproc] Wait for Commands...
18,230,795 UART: [fwproc] Recv command 0x46574c44
18,232,843 UART: [fwproc] Recv'd Img size: 118548 bytes
21,725,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,801,269 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,874,294 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,202,781 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
3,777,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,121,854 >>> mbox cmd response: failed
12,122,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,122,803 >>> mbox cmd response: failed
12,123,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,123,364 >>> mbox cmd response: failed
Initializing fuses
2,066,439 writing to cptra_bootfsm_go
11,526,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,190,114 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,119 UART:
192,479 UART: Running Caliptra ROM ...
193,577 UART:
193,720 UART: [state] CFI Enabled
264,019 UART: [state] LifecycleState = Unprovisioned
266,340 UART: [state] DebugLocked = No
268,018 UART: [state] WD Timer not started. Device not locked for debugging
271,694 UART: [kat] SHA2-256
461,560 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,348 UART: [kat] ++
472,803 UART: [kat] sha1
485,902 UART: [kat] SHA2-256
488,947 UART: [kat] SHA2-384
494,775 UART: [kat] SHA2-512-ACC
497,339 UART: [kat] ECC-384
2,947,772 UART: [kat] HMAC-384Kdf
2,970,194 UART: [kat] LMS
3,501,986 UART: [kat] --
3,504,093 UART: [cold-reset] ++
3,506,260 UART: [fht] FHT @ 0x50003400
3,517,847 UART: [idev] ++
3,518,533 UART: [idev] CDI.KEYID = 6
3,519,525 UART: [idev] SUBJECT.KEYID = 7
3,520,694 UART: [idev] UDS.KEYID = 0
3,523,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,756 UART: [idev] Erasing UDS.KEYID = 0
6,026,863 UART: [idev] Sha1 KeyId Algorithm
6,049,252 UART: [idev] --
6,053,366 UART: [ldev] ++
6,054,072 UART: [ldev] CDI.KEYID = 6
6,054,962 UART: [ldev] SUBJECT.KEYID = 5
6,056,069 UART: [ldev] AUTHORITY.KEYID = 7
6,057,364 UART: [ldev] FE.KEYID = 1
6,099,864 UART: [ldev] Erasing FE.KEYID = 1
8,607,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,917 UART: [ldev] --
10,412,783 UART: [fwproc] Wait for Commands...
10,414,836 UART: [fwproc] Recv command 0x46574c44
10,417,108 UART: [fwproc] Recv'd Img size: 118548 bytes
12,111,019 UART: ROM Fatal Error: 0x000B0030
12,114,430 >>> mbox cmd response: failed
12,114,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,115,186 >>> mbox cmd response: failed
12,115,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,115,756 >>> mbox cmd response: failed
Initializing fuses
2,057,566 writing to cptra_bootfsm_go
2,246,964 UART:
2,247,467 UART: Running Caliptra ROM ...
2,248,577 UART:
2,248,748 UART: [state] CFI Enabled
2,313,329 UART: [state] LifecycleState = Unprovisioned
2,315,395 UART: [state] DebugLocked = No
2,318,312 UART: [state] WD Timer not started. Device not locked for debugging
2,323,183 UART: [kat] SHA2-256
2,513,023 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,523,827 UART: [kat] ++
2,524,375 UART: [kat] sha1
2,535,384 UART: [kat] SHA2-256
2,538,417 UART: [kat] SHA2-384
2,544,522 UART: [kat] SHA2-512-ACC
2,547,148 UART: [kat] ECC-384
4,994,067 UART: [kat] HMAC-384Kdf
5,018,669 UART: [kat] LMS
5,550,437 UART: [kat] --
5,554,597 UART: [cold-reset] ++
5,555,565 UART: [fht] FHT @ 0x50003400
5,567,035 UART: [idev] ++
5,567,719 UART: [idev] CDI.KEYID = 6
5,568,742 UART: [idev] SUBJECT.KEYID = 7
5,569,924 UART: [idev] UDS.KEYID = 0
5,572,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,721,500 UART: [idev] Erasing UDS.KEYID = 0
8,076,832 UART: [idev] Sha1 KeyId Algorithm
8,099,477 UART: [idev] --
8,104,834 UART: [ldev] ++
8,105,523 UART: [ldev] CDI.KEYID = 6
8,106,447 UART: [ldev] SUBJECT.KEYID = 5
8,107,614 UART: [ldev] AUTHORITY.KEYID = 7
8,108,794 UART: [ldev] FE.KEYID = 1
8,148,444 UART: [ldev] Erasing FE.KEYID = 1
10,654,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,403,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,673 UART: [ldev] --
12,458,630 UART: [fwproc] Wait for Commands...
12,460,255 UART: [fwproc] Recv command 0x46574c44
12,462,581 UART: [fwproc] Recv'd Img size: 118548 bytes
15,959,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,040,691 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,164,277 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,725,309 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,440,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,895,900 >>> mbox cmd response: failed
11,896,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,897,143 >>> mbox cmd response: failed
11,897,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,897,709 >>> mbox cmd response: failed
Initializing fuses
2,057,259 writing to cptra_bootfsm_go
5,487,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,868,202 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,824 writing to cptra_bootfsm_go
194,056 UART:
194,436 UART: Running Caliptra ROM ...
195,554 UART:
605,020 UART: [state] CFI Enabled
616,097 UART: [state] LifecycleState = Unprovisioned
618,490 UART: [state] DebugLocked = No
620,605 UART: [state] WD Timer not started. Device not locked for debugging
626,022 UART: [kat] SHA2-256
815,918 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,712 UART: [kat] ++
827,223 UART: [kat] sha1
837,835 UART: [kat] SHA2-256
840,851 UART: [kat] SHA2-384
847,111 UART: [kat] SHA2-512-ACC
849,677 UART: [kat] ECC-384
3,293,631 UART: [kat] HMAC-384Kdf
3,305,523 UART: [kat] LMS
3,837,388 UART: [kat] --
3,840,720 UART: [cold-reset] ++
3,841,950 UART: [fht] FHT @ 0x50003400
3,854,694 UART: [idev] ++
3,855,384 UART: [idev] CDI.KEYID = 6
3,856,414 UART: [idev] SUBJECT.KEYID = 7
3,857,530 UART: [idev] UDS.KEYID = 0
3,860,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,721 UART: [idev] Erasing UDS.KEYID = 0
6,337,424 UART: [idev] Sha1 KeyId Algorithm
6,360,681 UART: [idev] --
6,365,924 UART: [ldev] ++
6,366,605 UART: [ldev] CDI.KEYID = 6
6,367,495 UART: [ldev] SUBJECT.KEYID = 5
6,368,710 UART: [ldev] AUTHORITY.KEYID = 7
6,369,911 UART: [ldev] FE.KEYID = 1
6,382,215 UART: [ldev] Erasing FE.KEYID = 1
8,859,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,385 UART: [ldev] --
10,650,502 UART: [fwproc] Wait for Commands...
10,652,183 UART: [fwproc] Recv command 0x46574c44
10,654,460 UART: [fwproc] Recv'd Img size: 118548 bytes
12,309,286 UART: ROM Fatal Error: 0x000B0030
12,312,719 >>> mbox cmd response: failed
12,313,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,313,437 >>> mbox cmd response: failed
12,313,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,314,033 >>> mbox cmd response: failed
Initializing fuses
2,057,855 writing to cptra_bootfsm_go
2,247,812 UART:
2,248,179 UART: Running Caliptra ROM ...
2,249,232 UART:
8,159,052 UART: [state] CFI Enabled
8,174,025 UART: [state] LifecycleState = Unprovisioned
8,176,426 UART: [state] DebugLocked = No
8,177,583 UART: [state] WD Timer not started. Device not locked for debugging
8,182,434 UART: [kat] SHA2-256
8,372,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,383,130 UART: [kat] ++
8,383,592 UART: [kat] sha1
8,395,697 UART: [kat] SHA2-256
8,398,726 UART: [kat] SHA2-384
8,405,749 UART: [kat] SHA2-512-ACC
8,408,340 UART: [kat] ECC-384
10,849,844 UART: [kat] HMAC-384Kdf
10,862,618 UART: [kat] LMS
11,394,456 UART: [kat] --
11,399,591 UART: [cold-reset] ++
11,402,231 UART: [fht] FHT @ 0x50003400
11,414,835 UART: [idev] ++
11,415,521 UART: [idev] CDI.KEYID = 6
11,416,545 UART: [idev] SUBJECT.KEYID = 7
11,417,649 UART: [idev] UDS.KEYID = 0
11,420,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,569,401 UART: [idev] Erasing UDS.KEYID = 0
13,897,402 UART: [idev] Sha1 KeyId Algorithm
13,919,685 UART: [idev] --
13,924,107 UART: [ldev] ++
13,924,796 UART: [ldev] CDI.KEYID = 6
13,925,714 UART: [ldev] SUBJECT.KEYID = 5
13,926,874 UART: [ldev] AUTHORITY.KEYID = 7
13,928,257 UART: [ldev] FE.KEYID = 1
13,937,250 UART: [ldev] Erasing FE.KEYID = 1
16,418,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,138,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,153,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,168,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,183,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,204,101 UART: [ldev] --
18,209,372 UART: [fwproc] Wait for Commands...
18,211,634 UART: [fwproc] Recv command 0x46574c44
18,213,954 UART: [fwproc] Recv'd Img size: 118548 bytes
21,718,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,796,574 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,920,150 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,480,699 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,754,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,092,001 >>> mbox cmd response: failed
12,092,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,092,999 >>> mbox cmd response: failed
12,093,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,093,578 >>> mbox cmd response: failed
Initializing fuses
2,057,205 writing to cptra_bootfsm_go
11,529,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,817,101 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,455 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,147 UART: [kat] SHA2-256
882,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,193 UART: [kat] ++
886,345 UART: [kat] sha1
890,691 UART: [kat] SHA2-256
892,629 UART: [kat] SHA2-384
895,584 UART: [kat] SHA2-512-ACC
897,485 UART: [kat] ECC-384
902,654 UART: [kat] HMAC-384Kdf
907,228 UART: [kat] LMS
1,475,424 UART: [kat] --
1,476,377 UART: [cold-reset] ++
1,476,903 UART: [fht] Storing FHT @ 0x50003400
1,479,822 UART: [idev] ++
1,479,990 UART: [idev] CDI.KEYID = 6
1,480,350 UART: [idev] SUBJECT.KEYID = 7
1,480,774 UART: [idev] UDS.KEYID = 0
1,481,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,010 UART: [idev] Erasing UDS.KEYID = 0
1,505,750 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,432 UART: [idev] --
1,515,473 UART: [ldev] ++
1,515,641 UART: [ldev] CDI.KEYID = 6
1,516,004 UART: [ldev] SUBJECT.KEYID = 5
1,516,430 UART: [ldev] AUTHORITY.KEYID = 7
1,516,893 UART: [ldev] FE.KEYID = 1
1,521,703 UART: [ldev] Erasing FE.KEYID = 1
1,546,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,080 UART: [ldev] --
1,585,495 UART: [fwproc] Waiting for Commands...
1,586,284 UART: [fwproc] Received command 0x46574c44
1,587,075 UART: [fwproc] Received Image of size 118548 bytes
2,686,219 UART: ROM Fatal Error: 0x000B0030
2,687,376 >>> mbox cmd response: failed
2,687,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,687,382 >>> mbox cmd response: failed
2,687,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,687,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,551 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,277 UART: [kat] SHA2-256
882,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,323 UART: [kat] ++
886,475 UART: [kat] sha1
890,657 UART: [kat] SHA2-256
892,595 UART: [kat] SHA2-384
895,326 UART: [kat] SHA2-512-ACC
897,227 UART: [kat] ECC-384
903,122 UART: [kat] HMAC-384Kdf
907,810 UART: [kat] LMS
1,476,006 UART: [kat] --
1,477,127 UART: [cold-reset] ++
1,477,559 UART: [fht] Storing FHT @ 0x50003400
1,480,470 UART: [idev] ++
1,480,638 UART: [idev] CDI.KEYID = 6
1,480,998 UART: [idev] SUBJECT.KEYID = 7
1,481,422 UART: [idev] UDS.KEYID = 0
1,481,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,600 UART: [idev] Erasing UDS.KEYID = 0
1,506,104 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,546 UART: [idev] --
1,515,723 UART: [ldev] ++
1,515,891 UART: [ldev] CDI.KEYID = 6
1,516,254 UART: [ldev] SUBJECT.KEYID = 5
1,516,680 UART: [ldev] AUTHORITY.KEYID = 7
1,517,143 UART: [ldev] FE.KEYID = 1
1,522,323 UART: [ldev] Erasing FE.KEYID = 1
1,547,436 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,554 UART: [ldev] --
1,586,905 UART: [fwproc] Waiting for Commands...
1,587,670 UART: [fwproc] Received command 0x46574c44
1,588,461 UART: [fwproc] Received Image of size 118548 bytes
2,931,878 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,312 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,530 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,757 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,578,772 >>> mbox cmd response: failed
2,578,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,778 >>> mbox cmd response: failed
2,578,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,784 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,927 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,066 UART: [kat] SHA2-256
881,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,112 UART: [kat] ++
886,264 UART: [kat] sha1
890,564 UART: [kat] SHA2-256
892,502 UART: [kat] SHA2-384
895,297 UART: [kat] SHA2-512-ACC
897,198 UART: [kat] ECC-384
902,783 UART: [kat] HMAC-384Kdf
907,459 UART: [kat] LMS
1,475,655 UART: [kat] --
1,476,404 UART: [cold-reset] ++
1,476,758 UART: [fht] Storing FHT @ 0x50003400
1,479,521 UART: [idev] ++
1,479,689 UART: [idev] CDI.KEYID = 6
1,480,049 UART: [idev] SUBJECT.KEYID = 7
1,480,473 UART: [idev] UDS.KEYID = 0
1,480,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,691 UART: [idev] Erasing UDS.KEYID = 0
1,505,907 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,557 UART: [idev] --
1,515,720 UART: [ldev] ++
1,515,888 UART: [ldev] CDI.KEYID = 6
1,516,251 UART: [ldev] SUBJECT.KEYID = 5
1,516,677 UART: [ldev] AUTHORITY.KEYID = 7
1,517,140 UART: [ldev] FE.KEYID = 1
1,522,340 UART: [ldev] Erasing FE.KEYID = 1
1,547,837 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,913 UART: [ldev] --
1,587,268 UART: [fwproc] Waiting for Commands...
1,587,915 UART: [fwproc] Received command 0x46574c44
1,588,706 UART: [fwproc] Received Image of size 118548 bytes
2,764,592 UART: ROM Fatal Error: 0x000B0030
2,765,749 >>> mbox cmd response: failed
2,765,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,765,755 >>> mbox cmd response: failed
2,765,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,765,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
87,042 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,660 UART: [kat] SHA2-256
882,591 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,706 UART: [kat] ++
886,858 UART: [kat] sha1
891,004 UART: [kat] SHA2-256
892,942 UART: [kat] SHA2-384
895,509 UART: [kat] SHA2-512-ACC
897,410 UART: [kat] ECC-384
903,035 UART: [kat] HMAC-384Kdf
907,597 UART: [kat] LMS
1,475,793 UART: [kat] --
1,476,846 UART: [cold-reset] ++
1,477,328 UART: [fht] Storing FHT @ 0x50003400
1,479,995 UART: [idev] ++
1,480,163 UART: [idev] CDI.KEYID = 6
1,480,523 UART: [idev] SUBJECT.KEYID = 7
1,480,947 UART: [idev] UDS.KEYID = 0
1,481,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,101 UART: [idev] Erasing UDS.KEYID = 0
1,506,263 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,897 UART: [idev] --
1,515,798 UART: [ldev] ++
1,515,966 UART: [ldev] CDI.KEYID = 6
1,516,329 UART: [ldev] SUBJECT.KEYID = 5
1,516,755 UART: [ldev] AUTHORITY.KEYID = 7
1,517,218 UART: [ldev] FE.KEYID = 1
1,522,390 UART: [ldev] Erasing FE.KEYID = 1
1,548,287 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,873 UART: [ldev] --
1,587,296 UART: [fwproc] Waiting for Commands...
1,588,151 UART: [fwproc] Received command 0x46574c44
1,588,942 UART: [fwproc] Received Image of size 118548 bytes
2,932,994 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,610 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,215 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,654,079 >>> mbox cmd response: failed
2,654,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,654,085 >>> mbox cmd response: failed
2,654,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,654,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,440 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,396 UART: [kat] ++
895,548 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
915,619 UART: [kat] HMAC-384Kdf
919,971 UART: [kat] LMS
1,168,283 UART: [kat] --
1,169,304 UART: [cold-reset] ++
1,169,860 UART: [fht] FHT @ 0x50003400
1,172,420 UART: [idev] ++
1,172,588 UART: [idev] CDI.KEYID = 6
1,172,949 UART: [idev] SUBJECT.KEYID = 7
1,173,374 UART: [idev] UDS.KEYID = 0
1,173,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,661 UART: [idev] Erasing UDS.KEYID = 0
1,198,707 UART: [idev] Sha1 KeyId Algorithm
1,207,587 UART: [idev] --
1,208,764 UART: [ldev] ++
1,208,932 UART: [ldev] CDI.KEYID = 6
1,209,296 UART: [ldev] SUBJECT.KEYID = 5
1,209,723 UART: [ldev] AUTHORITY.KEYID = 7
1,210,186 UART: [ldev] FE.KEYID = 1
1,215,556 UART: [ldev] Erasing FE.KEYID = 1
1,241,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,282 UART: [ldev] --
1,280,523 UART: [fwproc] Wait for Commands...
1,281,332 UART: [fwproc] Recv command 0x46574c44
1,282,065 UART: [fwproc] Recv'd Img size: 118548 bytes
1,590,902 UART: ROM Fatal Error: 0x000B0030
1,592,059 >>> mbox cmd response: failed
1,592,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,065 >>> mbox cmd response: failed
1,592,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,071 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,606 UART: [state] LifecycleState = Unprovisioned
86,261 UART: [state] DebugLocked = No
86,975 UART: [state] WD Timer not started. Device not locked for debugging
88,106 UART: [kat] SHA2-256
891,656 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,760 UART: [kat] ++
895,912 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
915,987 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,169,920 UART: [cold-reset] ++
1,170,266 UART: [fht] FHT @ 0x50003400
1,172,980 UART: [idev] ++
1,173,148 UART: [idev] CDI.KEYID = 6
1,173,509 UART: [idev] SUBJECT.KEYID = 7
1,173,934 UART: [idev] UDS.KEYID = 0
1,174,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,198,537 UART: [idev] Sha1 KeyId Algorithm
1,207,217 UART: [idev] --
1,208,194 UART: [ldev] ++
1,208,362 UART: [ldev] CDI.KEYID = 6
1,208,726 UART: [ldev] SUBJECT.KEYID = 5
1,209,153 UART: [ldev] AUTHORITY.KEYID = 7
1,209,616 UART: [ldev] FE.KEYID = 1
1,214,964 UART: [ldev] Erasing FE.KEYID = 1
1,240,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,582 UART: [ldev] --
1,280,009 UART: [fwproc] Wait for Commands...
1,280,746 UART: [fwproc] Recv command 0x46574c44
1,281,479 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,638 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,813 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,144 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,449,487 >>> mbox cmd response: failed
1,449,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,493 >>> mbox cmd response: failed
1,449,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,499 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,821 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,511 UART: [kat] ++
895,663 UART: [kat] sha1
899,957 UART: [kat] SHA2-256
901,897 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,306 UART: [kat] HMAC-384Kdf
921,034 UART: [kat] LMS
1,169,346 UART: [kat] --
1,170,031 UART: [cold-reset] ++
1,170,365 UART: [fht] FHT @ 0x50003400
1,173,079 UART: [idev] ++
1,173,247 UART: [idev] CDI.KEYID = 6
1,173,608 UART: [idev] SUBJECT.KEYID = 7
1,174,033 UART: [idev] UDS.KEYID = 0
1,174,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,340 UART: [idev] Erasing UDS.KEYID = 0
1,199,224 UART: [idev] Sha1 KeyId Algorithm
1,208,184 UART: [idev] --
1,209,273 UART: [ldev] ++
1,209,441 UART: [ldev] CDI.KEYID = 6
1,209,805 UART: [ldev] SUBJECT.KEYID = 5
1,210,232 UART: [ldev] AUTHORITY.KEYID = 7
1,210,695 UART: [ldev] FE.KEYID = 1
1,215,925 UART: [ldev] Erasing FE.KEYID = 1
1,242,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,059 UART: [ldev] --
1,282,372 UART: [fwproc] Wait for Commands...
1,283,047 UART: [fwproc] Recv command 0x46574c44
1,283,780 UART: [fwproc] Recv'd Img size: 118548 bytes
1,597,035 UART: ROM Fatal Error: 0x000B0030
1,598,192 >>> mbox cmd response: failed
1,598,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,198 >>> mbox cmd response: failed
1,598,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
87,016 UART: [state] WD Timer not started. Device not locked for debugging
88,375 UART: [kat] SHA2-256
891,925 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,029 UART: [kat] ++
896,181 UART: [kat] sha1
900,409 UART: [kat] SHA2-256
902,349 UART: [kat] SHA2-384
905,090 UART: [kat] SHA2-512-ACC
906,991 UART: [kat] ECC-384
916,690 UART: [kat] HMAC-384Kdf
921,256 UART: [kat] LMS
1,169,568 UART: [kat] --
1,170,297 UART: [cold-reset] ++
1,170,813 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,174,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,256 UART: [idev] Erasing UDS.KEYID = 0
1,199,726 UART: [idev] Sha1 KeyId Algorithm
1,208,616 UART: [idev] --
1,209,831 UART: [ldev] ++
1,209,999 UART: [ldev] CDI.KEYID = 6
1,210,363 UART: [ldev] SUBJECT.KEYID = 5
1,210,790 UART: [ldev] AUTHORITY.KEYID = 7
1,211,253 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,241,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,731 UART: [ldev] --
1,280,996 UART: [fwproc] Wait for Commands...
1,281,675 UART: [fwproc] Recv command 0x46574c44
1,282,408 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,005 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,180 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,563 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,441,721 >>> mbox cmd response: failed
1,441,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,727 >>> mbox cmd response: failed
1,441,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,733 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,980 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
893,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,249 UART: [kat] ++
897,401 UART: [kat] sha1
901,475 UART: [kat] SHA2-256
903,415 UART: [kat] SHA2-384
906,022 UART: [kat] SHA2-512-ACC
907,923 UART: [kat] ECC-384
917,432 UART: [kat] HMAC-384Kdf
922,170 UART: [kat] LMS
1,170,498 UART: [kat] --
1,171,359 UART: [cold-reset] ++
1,171,687 UART: [fht] FHT @ 0x50003400
1,174,364 UART: [idev] ++
1,174,532 UART: [idev] CDI.KEYID = 6
1,174,892 UART: [idev] SUBJECT.KEYID = 7
1,175,316 UART: [idev] UDS.KEYID = 0
1,175,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,308 UART: [idev] Erasing UDS.KEYID = 0
1,199,877 UART: [idev] Sha1 KeyId Algorithm
1,208,547 UART: [idev] --
1,209,751 UART: [ldev] ++
1,209,919 UART: [ldev] CDI.KEYID = 6
1,210,282 UART: [ldev] SUBJECT.KEYID = 5
1,210,708 UART: [ldev] AUTHORITY.KEYID = 7
1,211,171 UART: [ldev] FE.KEYID = 1
1,216,215 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,775 UART: [ldev] --
1,282,244 UART: [fwproc] Wait for Commands...
1,282,890 UART: [fwproc] Recv command 0x46574c44
1,283,618 UART: [fwproc] Recv'd Img size: 118548 bytes
1,596,600 UART: ROM Fatal Error: 0x000B0030
1,597,757 >>> mbox cmd response: failed
1,597,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,597,763 >>> mbox cmd response: failed
1,597,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,597,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,280 UART: [kat] SHA2-256
892,930 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,055 UART: [kat] ++
897,207 UART: [kat] sha1
901,633 UART: [kat] SHA2-256
903,573 UART: [kat] SHA2-384
906,276 UART: [kat] SHA2-512-ACC
908,177 UART: [kat] ECC-384
918,362 UART: [kat] HMAC-384Kdf
923,020 UART: [kat] LMS
1,171,348 UART: [kat] --
1,172,269 UART: [cold-reset] ++
1,172,651 UART: [fht] FHT @ 0x50003400
1,175,210 UART: [idev] ++
1,175,378 UART: [idev] CDI.KEYID = 6
1,175,738 UART: [idev] SUBJECT.KEYID = 7
1,176,162 UART: [idev] UDS.KEYID = 0
1,176,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,976 UART: [idev] Erasing UDS.KEYID = 0
1,201,249 UART: [idev] Sha1 KeyId Algorithm
1,209,807 UART: [idev] --
1,210,983 UART: [ldev] ++
1,211,151 UART: [ldev] CDI.KEYID = 6
1,211,514 UART: [ldev] SUBJECT.KEYID = 5
1,211,940 UART: [ldev] AUTHORITY.KEYID = 7
1,212,403 UART: [ldev] FE.KEYID = 1
1,217,787 UART: [ldev] Erasing FE.KEYID = 1
1,243,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,071 UART: [ldev] --
1,282,420 UART: [fwproc] Wait for Commands...
1,283,088 UART: [fwproc] Recv command 0x46574c44
1,283,816 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,381 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,551 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,772 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,448,064 >>> mbox cmd response: failed
1,448,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,070 >>> mbox cmd response: failed
1,448,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,076 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,331 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
893,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,478 UART: [kat] ++
897,630 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,553 UART: [kat] SHA2-512-ACC
908,454 UART: [kat] ECC-384
918,023 UART: [kat] HMAC-384Kdf
922,529 UART: [kat] LMS
1,170,857 UART: [kat] --
1,171,818 UART: [cold-reset] ++
1,172,206 UART: [fht] FHT @ 0x50003400
1,175,041 UART: [idev] ++
1,175,209 UART: [idev] CDI.KEYID = 6
1,175,569 UART: [idev] SUBJECT.KEYID = 7
1,175,993 UART: [idev] UDS.KEYID = 0
1,176,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,977 UART: [idev] Erasing UDS.KEYID = 0
1,201,236 UART: [idev] Sha1 KeyId Algorithm
1,209,754 UART: [idev] --
1,210,844 UART: [ldev] ++
1,211,012 UART: [ldev] CDI.KEYID = 6
1,211,375 UART: [ldev] SUBJECT.KEYID = 5
1,211,801 UART: [ldev] AUTHORITY.KEYID = 7
1,212,264 UART: [ldev] FE.KEYID = 1
1,217,582 UART: [ldev] Erasing FE.KEYID = 1
1,244,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,246 UART: [ldev] --
1,283,595 UART: [fwproc] Wait for Commands...
1,284,341 UART: [fwproc] Recv command 0x46574c44
1,285,069 UART: [fwproc] Recv'd Img size: 118548 bytes
1,588,381 UART: ROM Fatal Error: 0x000B0030
1,589,538 >>> mbox cmd response: failed
1,589,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,544 >>> mbox cmd response: failed
1,589,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,969 UART: [state] LifecycleState = Unprovisioned
86,624 UART: [state] DebugLocked = No
87,312 UART: [state] WD Timer not started. Device not locked for debugging
88,661 UART: [kat] SHA2-256
894,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,436 UART: [kat] ++
898,588 UART: [kat] sha1
902,830 UART: [kat] SHA2-256
904,770 UART: [kat] SHA2-384
907,531 UART: [kat] SHA2-512-ACC
909,432 UART: [kat] ECC-384
919,381 UART: [kat] HMAC-384Kdf
924,079 UART: [kat] LMS
1,172,407 UART: [kat] --
1,173,338 UART: [cold-reset] ++
1,173,916 UART: [fht] FHT @ 0x50003400
1,176,485 UART: [idev] ++
1,176,653 UART: [idev] CDI.KEYID = 6
1,177,013 UART: [idev] SUBJECT.KEYID = 7
1,177,437 UART: [idev] UDS.KEYID = 0
1,177,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,423 UART: [idev] Erasing UDS.KEYID = 0
1,202,590 UART: [idev] Sha1 KeyId Algorithm
1,211,168 UART: [idev] --
1,212,256 UART: [ldev] ++
1,212,424 UART: [ldev] CDI.KEYID = 6
1,212,787 UART: [ldev] SUBJECT.KEYID = 5
1,213,213 UART: [ldev] AUTHORITY.KEYID = 7
1,213,676 UART: [ldev] FE.KEYID = 1
1,219,272 UART: [ldev] Erasing FE.KEYID = 1
1,245,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,812 UART: [ldev] --
1,284,243 UART: [fwproc] Wait for Commands...
1,284,881 UART: [fwproc] Recv command 0x46574c44
1,285,609 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,902 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,072 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,299 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,455,774 >>> mbox cmd response: failed
1,455,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,455,780 >>> mbox cmd response: failed
1,455,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,455,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,238 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,254 UART:
192,609 UART: Running Caliptra ROM ...
193,917 UART:
194,077 UART: [state] CFI Enabled
265,857 UART: [state] LifecycleState = Unprovisioned
267,797 UART: [state] DebugLocked = No
269,829 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,562 UART: [kat] SHA2-256
444,291 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,779 UART: [kat] ++
455,271 UART: [kat] sha1
467,229 UART: [kat] SHA2-256
469,926 UART: [kat] SHA2-384
476,554 UART: [kat] SHA2-512-ACC
478,950 UART: [kat] ECC-384
2,768,959 UART: [kat] HMAC-384Kdf
2,782,219 UART: [kat] LMS
3,972,553 UART: [kat] --
3,975,702 UART: [cold-reset] ++
3,978,073 UART: [fht] Storing FHT @ 0x50003400
3,988,750 UART: [idev] ++
3,989,322 UART: [idev] CDI.KEYID = 6
3,990,237 UART: [idev] SUBJECT.KEYID = 7
3,991,531 UART: [idev] UDS.KEYID = 0
3,994,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,144,021 UART: [idev] Erasing UDS.KEYID = 0
7,333,117 UART: [idev] Using Sha1 for KeyId Algorithm
7,355,144 UART: [idev] --
7,359,901 UART: [ldev] ++
7,360,473 UART: [ldev] CDI.KEYID = 6
7,361,416 UART: [ldev] SUBJECT.KEYID = 5
7,362,683 UART: [ldev] AUTHORITY.KEYID = 7
7,363,915 UART: [ldev] FE.KEYID = 1
7,406,242 UART: [ldev] Erasing FE.KEYID = 1
10,739,055 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,032,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,061,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,076,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,341 UART: [ldev] --
13,099,265 UART: [fwproc] Waiting for Commands...
13,101,535 UART: [fwproc] Received command 0x46574c44
13,103,727 UART: [fwproc] Received Image of size 118548 bytes
13,175,761 UART: ROM Fatal Error: 0x000B0032
13,179,281 >>> mbox cmd response: failed
13,179,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,180,114 >>> mbox cmd response: failed
13,180,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,180,708 >>> mbox cmd response: failed
Initializing fuses
2,060,186 writing to cptra_bootfsm_go
2,249,598 UART:
2,249,957 UART: Running Caliptra ROM ...
2,251,094 UART:
2,251,271 UART: [state] CFI Enabled
2,324,215 UART: [state] LifecycleState = Unprovisioned
2,326,164 UART: [state] DebugLocked = No
2,327,825 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,333,437 UART: [kat] SHA2-256
2,503,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,513,652 UART: [kat] ++
2,514,195 UART: [kat] sha1
2,524,714 UART: [kat] SHA2-256
2,527,399 UART: [kat] SHA2-384
2,533,176 UART: [kat] SHA2-512-ACC
2,535,569 UART: [kat] ECC-384
4,823,107 UART: [kat] HMAC-384Kdf
4,853,989 UART: [kat] LMS
6,044,316 UART: [kat] --
6,050,912 UART: [cold-reset] ++
6,052,487 UART: [fht] Storing FHT @ 0x50003400
6,064,206 UART: [idev] ++
6,064,777 UART: [idev] CDI.KEYID = 6
6,065,692 UART: [idev] SUBJECT.KEYID = 7
6,066,971 UART: [idev] UDS.KEYID = 0
6,069,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,218,497 UART: [idev] Erasing UDS.KEYID = 0
9,400,742 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,741 UART: [idev] --
9,425,760 UART: [ldev] ++
9,426,341 UART: [ldev] CDI.KEYID = 6
9,427,358 UART: [ldev] SUBJECT.KEYID = 5
9,428,543 UART: [ldev] AUTHORITY.KEYID = 7
9,429,779 UART: [ldev] FE.KEYID = 1
9,455,899 UART: [ldev] Erasing FE.KEYID = 1
12,787,183 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,080,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,095,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,109,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,124,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,143,865 UART: [ldev] --
15,149,457 UART: [fwproc] Waiting for Commands...
15,152,801 UART: [fwproc] Received command 0x46574c44
15,155,000 UART: [fwproc] Received Image of size 118548 bytes
19,255,147 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,326,433 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,399,665 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,727,729 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,784,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,933,933 >>> mbox cmd response: failed
12,934,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,934,859 >>> mbox cmd response: failed
12,935,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,935,421 >>> mbox cmd response: failed
Initializing fuses
2,053,952 writing to cptra_bootfsm_go
5,828,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,007,686 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,609 UART:
192,955 UART: Running Caliptra ROM ...
194,142 UART:
603,907 UART: [state] CFI Enabled
617,753 UART: [state] LifecycleState = Unprovisioned
619,653 UART: [state] DebugLocked = No
621,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,613 UART: [kat] SHA2-256
796,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,904 UART: [kat] ++
807,420 UART: [kat] sha1
817,165 UART: [kat] SHA2-256
819,908 UART: [kat] SHA2-384
826,752 UART: [kat] SHA2-512-ACC
829,153 UART: [kat] ECC-384
3,114,122 UART: [kat] HMAC-384Kdf
3,125,535 UART: [kat] LMS
4,315,674 UART: [kat] --
4,319,858 UART: [cold-reset] ++
4,321,692 UART: [fht] Storing FHT @ 0x50003400
4,333,289 UART: [idev] ++
4,333,869 UART: [idev] CDI.KEYID = 6
4,334,865 UART: [idev] SUBJECT.KEYID = 7
4,336,091 UART: [idev] UDS.KEYID = 0
4,339,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,221 UART: [idev] Erasing UDS.KEYID = 0
7,625,422 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,957 UART: [idev] --
7,651,341 UART: [ldev] ++
7,651,921 UART: [ldev] CDI.KEYID = 6
7,652,871 UART: [ldev] SUBJECT.KEYID = 5
7,654,089 UART: [ldev] AUTHORITY.KEYID = 7
7,655,334 UART: [ldev] FE.KEYID = 1
7,665,315 UART: [ldev] Erasing FE.KEYID = 1
10,952,394 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,749 UART: [ldev] --
13,312,170 UART: [fwproc] Waiting for Commands...
13,314,655 UART: [fwproc] Received command 0x46574c44
13,316,848 UART: [fwproc] Received Image of size 118548 bytes
13,392,409 UART: ROM Fatal Error: 0x000B0032
13,395,935 >>> mbox cmd response: failed
13,396,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,396,640 >>> mbox cmd response: failed
13,396,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,397,207 >>> mbox cmd response: failed
Initializing fuses
2,059,672 writing to cptra_bootfsm_go
2,248,975 UART:
2,249,323 UART: Running Caliptra ROM ...
2,250,380 UART:
7,061,613 UART: [state] CFI Enabled
7,076,372 UART: [state] LifecycleState = Unprovisioned
7,078,288 UART: [state] DebugLocked = No
7,080,875 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,085,962 UART: [kat] SHA2-256
7,255,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,266,275 UART: [kat] ++
7,266,742 UART: [kat] sha1
7,277,525 UART: [kat] SHA2-256
7,280,230 UART: [kat] SHA2-384
7,286,442 UART: [kat] SHA2-512-ACC
7,288,854 UART: [kat] ECC-384
9,574,086 UART: [kat] HMAC-384Kdf
9,586,085 UART: [kat] LMS
10,776,161 UART: [kat] --
10,781,368 UART: [cold-reset] ++
10,782,659 UART: [fht] Storing FHT @ 0x50003400
10,794,045 UART: [idev] ++
10,794,623 UART: [idev] CDI.KEYID = 6
10,795,507 UART: [idev] SUBJECT.KEYID = 7
10,796,778 UART: [idev] UDS.KEYID = 0
10,799,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,948,106 UART: [idev] Erasing UDS.KEYID = 0
14,086,424 UART: [idev] Using Sha1 for KeyId Algorithm
14,108,246 UART: [idev] --
14,113,541 UART: [ldev] ++
14,114,112 UART: [ldev] CDI.KEYID = 6
14,115,055 UART: [ldev] SUBJECT.KEYID = 5
14,116,314 UART: [ldev] AUTHORITY.KEYID = 7
14,117,579 UART: [ldev] FE.KEYID = 1
14,127,210 UART: [ldev] Erasing FE.KEYID = 1
17,415,558 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,710,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,725,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,739,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,754,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,773,290 UART: [ldev] --
19,777,914 UART: [fwproc] Waiting for Commands...
19,779,857 UART: [fwproc] Received command 0x46574c44
19,782,047 UART: [fwproc] Received Image of size 118548 bytes
23,886,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,962,714 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,035,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,363,830 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
4,130,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,128,519 >>> mbox cmd response: failed
13,129,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,129,655 >>> mbox cmd response: failed
13,129,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,130,255 >>> mbox cmd response: failed
Initializing fuses
2,053,848 writing to cptra_bootfsm_go
10,870,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,899,774 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,288 UART:
192,669 UART: Running Caliptra ROM ...
193,863 UART:
194,023 UART: [state] CFI Enabled
265,237 UART: [state] LifecycleState = Unprovisioned
267,178 UART: [state] DebugLocked = No
269,374 UART: [state] WD Timer not started. Device not locked for debugging
273,494 UART: [kat] SHA2-256
453,121 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,927 UART: [kat] ++
464,377 UART: [kat] sha1
475,146 UART: [kat] SHA2-256
477,889 UART: [kat] SHA2-384
483,276 UART: [kat] SHA2-512-ACC
485,621 UART: [kat] ECC-384
2,947,920 UART: [kat] HMAC-384Kdf
2,969,660 UART: [kat] LMS
3,446,159 UART: [kat] --
3,452,005 UART: [cold-reset] ++
3,454,522 UART: [fht] FHT @ 0x50003400
3,465,790 UART: [idev] ++
3,466,373 UART: [idev] CDI.KEYID = 6
3,467,347 UART: [idev] SUBJECT.KEYID = 7
3,468,571 UART: [idev] UDS.KEYID = 0
3,471,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,965 UART: [idev] Erasing UDS.KEYID = 0
5,983,040 UART: [idev] Sha1 KeyId Algorithm
6,007,536 UART: [idev] --
6,013,213 UART: [ldev] ++
6,013,829 UART: [ldev] CDI.KEYID = 6
6,014,757 UART: [ldev] SUBJECT.KEYID = 5
6,015,927 UART: [ldev] AUTHORITY.KEYID = 7
6,017,166 UART: [ldev] FE.KEYID = 1
6,055,960 UART: [ldev] Erasing FE.KEYID = 1
8,561,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,003 UART: [ldev] --
10,372,762 UART: [fwproc] Wait for Commands...
10,374,752 UART: [fwproc] Recv command 0x46574c44
10,376,740 UART: [fwproc] Recv'd Img size: 118548 bytes
10,468,723 UART: ROM Fatal Error: 0x000B0032
10,471,983 >>> mbox cmd response: failed
10,472,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,472,630 >>> mbox cmd response: failed
10,472,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,473,144 >>> mbox cmd response: failed
Initializing fuses
2,053,576 writing to cptra_bootfsm_go
2,242,874 UART:
2,243,210 UART: Running Caliptra ROM ...
2,244,261 UART:
2,244,416 UART: [state] CFI Enabled
2,307,917 UART: [state] LifecycleState = Unprovisioned
2,309,860 UART: [state] DebugLocked = No
2,311,098 UART: [state] WD Timer not started. Device not locked for debugging
2,314,365 UART: [kat] SHA2-256
2,494,013 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,504,796 UART: [kat] ++
2,505,348 UART: [kat] sha1
2,516,953 UART: [kat] SHA2-256
2,519,670 UART: [kat] SHA2-384
2,525,718 UART: [kat] SHA2-512-ACC
2,528,128 UART: [kat] ECC-384
4,994,604 UART: [kat] HMAC-384Kdf
5,016,079 UART: [kat] LMS
5,492,554 UART: [kat] --
5,499,277 UART: [cold-reset] ++
5,501,223 UART: [fht] FHT @ 0x50003400
5,512,154 UART: [idev] ++
5,512,731 UART: [idev] CDI.KEYID = 6
5,513,752 UART: [idev] SUBJECT.KEYID = 7
5,514,917 UART: [idev] UDS.KEYID = 0
5,517,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,667,085 UART: [idev] Erasing UDS.KEYID = 0
8,033,981 UART: [idev] Sha1 KeyId Algorithm
8,058,457 UART: [idev] --
8,064,910 UART: [ldev] ++
8,065,545 UART: [ldev] CDI.KEYID = 6
8,066,485 UART: [ldev] SUBJECT.KEYID = 5
8,067,651 UART: [ldev] AUTHORITY.KEYID = 7
8,068,891 UART: [ldev] FE.KEYID = 1
8,102,292 UART: [ldev] Erasing FE.KEYID = 1
10,607,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,343,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,359,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,375,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,391,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,412,452 UART: [ldev] --
12,417,778 UART: [fwproc] Wait for Commands...
12,420,253 UART: [fwproc] Recv command 0x46574c44
12,422,271 UART: [fwproc] Recv'd Img size: 118548 bytes
15,906,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,983,110 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,056,123 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,384,974 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,465,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,322,970 >>> mbox cmd response: failed
10,323,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,323,944 >>> mbox cmd response: failed
10,324,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,324,515 >>> mbox cmd response: failed
Initializing fuses
2,055,015 writing to cptra_bootfsm_go
5,515,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,303,814 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,595 UART:
192,951 UART: Running Caliptra ROM ...
194,025 UART:
603,631 UART: [state] CFI Enabled
620,124 UART: [state] LifecycleState = Unprovisioned
622,057 UART: [state] DebugLocked = No
625,011 UART: [state] WD Timer not started. Device not locked for debugging
628,920 UART: [kat] SHA2-256
808,577 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,409 UART: [kat] ++
819,862 UART: [kat] sha1
830,739 UART: [kat] SHA2-256
833,475 UART: [kat] SHA2-384
838,265 UART: [kat] SHA2-512-ACC
840,659 UART: [kat] ECC-384
3,283,149 UART: [kat] HMAC-384Kdf
3,296,084 UART: [kat] LMS
3,772,614 UART: [kat] --
3,779,024 UART: [cold-reset] ++
3,780,264 UART: [fht] FHT @ 0x50003400
3,792,168 UART: [idev] ++
3,792,757 UART: [idev] CDI.KEYID = 6
3,793,705 UART: [idev] SUBJECT.KEYID = 7
3,794,924 UART: [idev] UDS.KEYID = 0
3,798,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,193 UART: [idev] Erasing UDS.KEYID = 0
6,276,632 UART: [idev] Sha1 KeyId Algorithm
6,300,630 UART: [idev] --
6,305,384 UART: [ldev] ++
6,305,955 UART: [ldev] CDI.KEYID = 6
6,306,846 UART: [ldev] SUBJECT.KEYID = 5
6,308,118 UART: [ldev] AUTHORITY.KEYID = 7
6,309,354 UART: [ldev] FE.KEYID = 1
6,319,449 UART: [ldev] Erasing FE.KEYID = 1
8,798,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,371 UART: [ldev] --
10,591,180 UART: [fwproc] Wait for Commands...
10,594,367 UART: [fwproc] Recv command 0x46574c44
10,596,360 UART: [fwproc] Recv'd Img size: 118548 bytes
10,684,460 UART: ROM Fatal Error: 0x000B0032
10,687,697 >>> mbox cmd response: failed
10,688,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,688,390 >>> mbox cmd response: failed
10,688,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,688,963 >>> mbox cmd response: failed
Initializing fuses
2,055,887 writing to cptra_bootfsm_go
2,245,183 UART:
2,245,527 UART: Running Caliptra ROM ...
2,246,662 UART:
9,764,372 UART: [state] CFI Enabled
9,779,526 UART: [state] LifecycleState = Unprovisioned
9,781,450 UART: [state] DebugLocked = No
9,783,712 UART: [state] WD Timer not started. Device not locked for debugging
9,787,245 UART: [kat] SHA2-256
9,966,883 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,977,685 UART: [kat] ++
9,978,181 UART: [kat] sha1
9,989,076 UART: [kat] SHA2-256
9,991,785 UART: [kat] SHA2-384
9,999,294 UART: [kat] SHA2-512-ACC
10,001,649 UART: [kat] ECC-384
12,444,290 UART: [kat] HMAC-384Kdf
12,457,985 UART: [kat] LMS
12,934,452 UART: [kat] --
12,939,538 UART: [cold-reset] ++
12,940,879 UART: [fht] FHT @ 0x50003400
12,951,805 UART: [idev] ++
12,952,432 UART: [idev] CDI.KEYID = 6
12,953,315 UART: [idev] SUBJECT.KEYID = 7
12,954,587 UART: [idev] UDS.KEYID = 0
12,957,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,106,504 UART: [idev] Erasing UDS.KEYID = 0
15,431,297 UART: [idev] Sha1 KeyId Algorithm
15,454,258 UART: [idev] --
15,458,854 UART: [ldev] ++
15,459,484 UART: [ldev] CDI.KEYID = 6
15,460,396 UART: [ldev] SUBJECT.KEYID = 5
15,461,634 UART: [ldev] AUTHORITY.KEYID = 7
15,462,869 UART: [ldev] FE.KEYID = 1
15,475,145 UART: [ldev] Erasing FE.KEYID = 1
17,955,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,675,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,690,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,706,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,722,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,742,976 UART: [ldev] --
19,747,986 UART: [fwproc] Wait for Commands...
19,750,519 UART: [fwproc] Recv command 0x46574c44
19,752,508 UART: [fwproc] Recv'd Img size: 118548 bytes
23,224,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,301,743 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,374,731 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,703,690 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
3,781,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,572,008 >>> mbox cmd response: failed
10,572,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,572,908 >>> mbox cmd response: failed
10,573,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,573,467 >>> mbox cmd response: failed
Initializing fuses
2,053,848 writing to cptra_bootfsm_go
13,073,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,730,037 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,209 UART:
192,578 UART: Running Caliptra ROM ...
193,686 UART:
193,831 UART: [state] CFI Enabled
262,247 UART: [state] LifecycleState = Unprovisioned
264,607 UART: [state] DebugLocked = No
266,175 UART: [state] WD Timer not started. Device not locked for debugging
270,945 UART: [kat] SHA2-256
460,814 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,589 UART: [kat] ++
472,040 UART: [kat] sha1
483,095 UART: [kat] SHA2-256
486,117 UART: [kat] SHA2-384
492,483 UART: [kat] SHA2-512-ACC
495,100 UART: [kat] ECC-384
2,946,302 UART: [kat] HMAC-384Kdf
2,969,629 UART: [kat] LMS
3,501,385 UART: [kat] --
3,505,233 UART: [cold-reset] ++
3,507,447 UART: [fht] FHT @ 0x50003400
3,518,818 UART: [idev] ++
3,519,500 UART: [idev] CDI.KEYID = 6
3,520,526 UART: [idev] SUBJECT.KEYID = 7
3,521,693 UART: [idev] UDS.KEYID = 0
3,524,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,046 UART: [idev] Erasing UDS.KEYID = 0
6,029,550 UART: [idev] Sha1 KeyId Algorithm
6,051,923 UART: [idev] --
6,056,279 UART: [ldev] ++
6,056,974 UART: [ldev] CDI.KEYID = 6
6,057,861 UART: [ldev] SUBJECT.KEYID = 5
6,059,030 UART: [ldev] AUTHORITY.KEYID = 7
6,060,304 UART: [ldev] FE.KEYID = 1
6,097,457 UART: [ldev] Erasing FE.KEYID = 1
8,603,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,798 UART: [ldev] --
10,412,422 UART: [fwproc] Wait for Commands...
10,413,930 UART: [fwproc] Recv command 0x46574c44
10,415,825 UART: [fwproc] Recv'd Img size: 118548 bytes
10,522,705 UART: ROM Fatal Error: 0x000B0032
10,526,363 >>> mbox cmd response: failed
10,526,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,527,023 >>> mbox cmd response: failed
10,527,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,527,612 >>> mbox cmd response: failed
Initializing fuses
2,061,206 writing to cptra_bootfsm_go
2,250,544 UART:
2,250,892 UART: Running Caliptra ROM ...
2,251,941 UART:
2,252,095 UART: [state] CFI Enabled
2,320,395 UART: [state] LifecycleState = Unprovisioned
2,322,771 UART: [state] DebugLocked = No
2,325,467 UART: [state] WD Timer not started. Device not locked for debugging
2,330,921 UART: [kat] SHA2-256
2,520,759 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,582 UART: [kat] ++
2,532,078 UART: [kat] sha1
2,544,005 UART: [kat] SHA2-256
2,547,042 UART: [kat] SHA2-384
2,554,504 UART: [kat] SHA2-512-ACC
2,557,126 UART: [kat] ECC-384
5,002,674 UART: [kat] HMAC-384Kdf
5,024,418 UART: [kat] LMS
5,556,189 UART: [kat] --
5,559,376 UART: [cold-reset] ++
5,560,231 UART: [fht] FHT @ 0x50003400
5,571,380 UART: [idev] ++
5,572,064 UART: [idev] CDI.KEYID = 6
5,573,090 UART: [idev] SUBJECT.KEYID = 7
5,574,200 UART: [idev] UDS.KEYID = 0
5,576,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,725,728 UART: [idev] Erasing UDS.KEYID = 0
8,080,142 UART: [idev] Sha1 KeyId Algorithm
8,101,985 UART: [idev] --
8,105,881 UART: [ldev] ++
8,106,567 UART: [ldev] CDI.KEYID = 6
8,107,455 UART: [ldev] SUBJECT.KEYID = 5
8,108,641 UART: [ldev] AUTHORITY.KEYID = 7
8,109,803 UART: [ldev] FE.KEYID = 1
8,153,426 UART: [ldev] Erasing FE.KEYID = 1
10,660,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,426,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,455 UART: [ldev] --
12,466,352 UART: [fwproc] Wait for Commands...
12,469,268 UART: [fwproc] Recv command 0x46574c44
12,471,612 UART: [fwproc] Recv'd Img size: 118548 bytes
15,970,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,049,929 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,173,560 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,734,689 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,446,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,320,434 >>> mbox cmd response: failed
10,320,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,321,349 >>> mbox cmd response: failed
10,321,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,321,928 >>> mbox cmd response: failed
Initializing fuses
2,048,970 writing to cptra_bootfsm_go
5,470,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,851,240 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,609 UART:
192,980 UART: Running Caliptra ROM ...
194,167 UART:
603,735 UART: [state] CFI Enabled
616,729 UART: [state] LifecycleState = Unprovisioned
619,112 UART: [state] DebugLocked = No
620,906 UART: [state] WD Timer not started. Device not locked for debugging
624,932 UART: [kat] SHA2-256
814,822 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,587 UART: [kat] ++
826,130 UART: [kat] sha1
838,475 UART: [kat] SHA2-256
841,494 UART: [kat] SHA2-384
848,343 UART: [kat] SHA2-512-ACC
850,966 UART: [kat] ECC-384
3,293,019 UART: [kat] HMAC-384Kdf
3,306,884 UART: [kat] LMS
3,838,715 UART: [kat] --
3,842,114 UART: [cold-reset] ++
3,844,640 UART: [fht] FHT @ 0x50003400
3,856,275 UART: [idev] ++
3,856,954 UART: [idev] CDI.KEYID = 6
3,857,946 UART: [idev] SUBJECT.KEYID = 7
3,859,110 UART: [idev] UDS.KEYID = 0
3,861,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,973 UART: [idev] Erasing UDS.KEYID = 0
6,340,281 UART: [idev] Sha1 KeyId Algorithm
6,363,078 UART: [idev] --
6,368,275 UART: [ldev] ++
6,368,966 UART: [ldev] CDI.KEYID = 6
6,369,883 UART: [ldev] SUBJECT.KEYID = 5
6,371,050 UART: [ldev] AUTHORITY.KEYID = 7
6,372,499 UART: [ldev] FE.KEYID = 1
6,384,404 UART: [ldev] Erasing FE.KEYID = 1
8,861,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,963 UART: [ldev] --
10,652,695 UART: [fwproc] Wait for Commands...
10,655,182 UART: [fwproc] Recv command 0x46574c44
10,657,451 UART: [fwproc] Recv'd Img size: 118548 bytes
10,762,160 UART: ROM Fatal Error: 0x000B0032
10,765,794 >>> mbox cmd response: failed
10,766,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,766,564 >>> mbox cmd response: failed
10,766,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,767,138 >>> mbox cmd response: failed
Initializing fuses
2,054,903 writing to cptra_bootfsm_go
2,244,213 UART:
2,244,572 UART: Running Caliptra ROM ...
2,245,784 UART:
9,691,448 UART: [state] CFI Enabled
9,705,440 UART: [state] LifecycleState = Unprovisioned
9,707,799 UART: [state] DebugLocked = No
9,710,003 UART: [state] WD Timer not started. Device not locked for debugging
9,715,182 UART: [kat] SHA2-256
9,905,068 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,915,816 UART: [kat] ++
9,916,416 UART: [kat] sha1
9,927,423 UART: [kat] SHA2-256
9,930,433 UART: [kat] SHA2-384
9,937,794 UART: [kat] SHA2-512-ACC
9,940,373 UART: [kat] ECC-384
12,381,151 UART: [kat] HMAC-384Kdf
12,395,509 UART: [kat] LMS
12,927,338 UART: [kat] --
12,931,482 UART: [cold-reset] ++
12,933,096 UART: [fht] FHT @ 0x50003400
12,944,196 UART: [idev] ++
12,944,873 UART: [idev] CDI.KEYID = 6
12,945,890 UART: [idev] SUBJECT.KEYID = 7
12,947,056 UART: [idev] UDS.KEYID = 0
12,949,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,098,491 UART: [idev] Erasing UDS.KEYID = 0
15,425,678 UART: [idev] Sha1 KeyId Algorithm
15,449,097 UART: [idev] --
15,453,309 UART: [ldev] ++
15,453,893 UART: [ldev] CDI.KEYID = 6
15,454,787 UART: [ldev] SUBJECT.KEYID = 5
15,456,126 UART: [ldev] AUTHORITY.KEYID = 7
15,457,322 UART: [ldev] FE.KEYID = 1
15,468,850 UART: [ldev] Erasing FE.KEYID = 1
17,945,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,667,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,682,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,698,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,713,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,734,006 UART: [ldev] --
19,738,854 UART: [fwproc] Wait for Commands...
19,741,446 UART: [fwproc] Recv command 0x46574c44
19,743,714 UART: [fwproc] Recv'd Img size: 118548 bytes
23,238,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,313,966 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,437,544 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,996,964 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
3,761,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,556,185 >>> mbox cmd response: failed
10,556,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,557,192 >>> mbox cmd response: failed
10,557,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,557,797 >>> mbox cmd response: failed
Initializing fuses
2,050,727 writing to cptra_bootfsm_go
13,051,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,328,688 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,129 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,709 UART: [kat] SHA2-256
881,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,755 UART: [kat] ++
885,907 UART: [kat] sha1
890,041 UART: [kat] SHA2-256
891,979 UART: [kat] SHA2-384
894,694 UART: [kat] SHA2-512-ACC
896,595 UART: [kat] ECC-384
902,034 UART: [kat] HMAC-384Kdf
906,742 UART: [kat] LMS
1,474,938 UART: [kat] --
1,475,923 UART: [cold-reset] ++
1,476,457 UART: [fht] Storing FHT @ 0x50003400
1,479,200 UART: [idev] ++
1,479,368 UART: [idev] CDI.KEYID = 6
1,479,728 UART: [idev] SUBJECT.KEYID = 7
1,480,152 UART: [idev] UDS.KEYID = 0
1,480,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,860 UART: [idev] Erasing UDS.KEYID = 0
1,504,366 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,932 UART: [idev] --
1,513,995 UART: [ldev] ++
1,514,163 UART: [ldev] CDI.KEYID = 6
1,514,526 UART: [ldev] SUBJECT.KEYID = 5
1,514,952 UART: [ldev] AUTHORITY.KEYID = 7
1,515,415 UART: [ldev] FE.KEYID = 1
1,520,555 UART: [ldev] Erasing FE.KEYID = 1
1,545,282 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,244 UART: [ldev] --
1,584,603 UART: [fwproc] Waiting for Commands...
1,585,334 UART: [fwproc] Received command 0x46574c44
1,586,125 UART: [fwproc] Received Image of size 118548 bytes
1,612,361 UART: ROM Fatal Error: 0x000B0032
1,613,518 >>> mbox cmd response: failed
1,613,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,524 >>> mbox cmd response: failed
1,613,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,530 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,899 UART: [kat] SHA2-256
881,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,945 UART: [kat] ++
886,097 UART: [kat] sha1
890,395 UART: [kat] SHA2-256
892,333 UART: [kat] SHA2-384
895,036 UART: [kat] SHA2-512-ACC
896,937 UART: [kat] ECC-384
902,278 UART: [kat] HMAC-384Kdf
906,810 UART: [kat] LMS
1,475,006 UART: [kat] --
1,475,837 UART: [cold-reset] ++
1,476,261 UART: [fht] Storing FHT @ 0x50003400
1,478,976 UART: [idev] ++
1,479,144 UART: [idev] CDI.KEYID = 6
1,479,504 UART: [idev] SUBJECT.KEYID = 7
1,479,928 UART: [idev] UDS.KEYID = 0
1,480,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,250 UART: [idev] Erasing UDS.KEYID = 0
1,504,930 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,612 UART: [idev] --
1,514,493 UART: [ldev] ++
1,514,661 UART: [ldev] CDI.KEYID = 6
1,515,024 UART: [ldev] SUBJECT.KEYID = 5
1,515,450 UART: [ldev] AUTHORITY.KEYID = 7
1,515,913 UART: [ldev] FE.KEYID = 1
1,521,251 UART: [ldev] Erasing FE.KEYID = 1
1,546,660 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,806 UART: [ldev] --
1,586,263 UART: [fwproc] Waiting for Commands...
1,586,966 UART: [fwproc] Received command 0x46574c44
1,587,757 UART: [fwproc] Received Image of size 118548 bytes
2,931,448 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,422 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,640 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,855 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,466,599 >>> mbox cmd response: failed
1,466,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,605 >>> mbox cmd response: failed
1,466,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,611 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,529 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
87,014 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,688 UART: [kat] SHA2-256
882,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,734 UART: [kat] ++
886,886 UART: [kat] sha1
891,302 UART: [kat] SHA2-256
893,240 UART: [kat] SHA2-384
895,837 UART: [kat] SHA2-512-ACC
897,738 UART: [kat] ECC-384
903,179 UART: [kat] HMAC-384Kdf
907,723 UART: [kat] LMS
1,475,919 UART: [kat] --
1,476,934 UART: [cold-reset] ++
1,477,428 UART: [fht] Storing FHT @ 0x50003400
1,480,363 UART: [idev] ++
1,480,531 UART: [idev] CDI.KEYID = 6
1,480,891 UART: [idev] SUBJECT.KEYID = 7
1,481,315 UART: [idev] UDS.KEYID = 0
1,481,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,251 UART: [idev] Erasing UDS.KEYID = 0
1,505,663 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,429 UART: [idev] --
1,515,310 UART: [ldev] ++
1,515,478 UART: [ldev] CDI.KEYID = 6
1,515,841 UART: [ldev] SUBJECT.KEYID = 5
1,516,267 UART: [ldev] AUTHORITY.KEYID = 7
1,516,730 UART: [ldev] FE.KEYID = 1
1,521,816 UART: [ldev] Erasing FE.KEYID = 1
1,547,455 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,651 UART: [ldev] --
1,586,972 UART: [fwproc] Waiting for Commands...
1,587,617 UART: [fwproc] Received command 0x46574c44
1,588,408 UART: [fwproc] Received Image of size 118548 bytes
1,614,502 UART: ROM Fatal Error: 0x000B0032
1,615,659 >>> mbox cmd response: failed
1,615,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,665 >>> mbox cmd response: failed
1,615,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,671 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,736 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,338 UART: [kat] SHA2-256
882,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,384 UART: [kat] ++
886,536 UART: [kat] sha1
890,682 UART: [kat] SHA2-256
892,620 UART: [kat] SHA2-384
895,329 UART: [kat] SHA2-512-ACC
897,230 UART: [kat] ECC-384
903,115 UART: [kat] HMAC-384Kdf
907,827 UART: [kat] LMS
1,476,023 UART: [kat] --
1,476,926 UART: [cold-reset] ++
1,477,262 UART: [fht] Storing FHT @ 0x50003400
1,479,967 UART: [idev] ++
1,480,135 UART: [idev] CDI.KEYID = 6
1,480,495 UART: [idev] SUBJECT.KEYID = 7
1,480,919 UART: [idev] UDS.KEYID = 0
1,481,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,153 UART: [idev] Erasing UDS.KEYID = 0
1,505,741 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,311 UART: [idev] --
1,515,284 UART: [ldev] ++
1,515,452 UART: [ldev] CDI.KEYID = 6
1,515,815 UART: [ldev] SUBJECT.KEYID = 5
1,516,241 UART: [ldev] AUTHORITY.KEYID = 7
1,516,704 UART: [ldev] FE.KEYID = 1
1,522,014 UART: [ldev] Erasing FE.KEYID = 1
1,547,389 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,717 UART: [ldev] --
1,587,130 UART: [fwproc] Waiting for Commands...
1,587,927 UART: [fwproc] Received command 0x46574c44
1,588,718 UART: [fwproc] Received Image of size 118548 bytes
2,932,461 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,111 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,329 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,558 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,469,342 >>> mbox cmd response: failed
1,469,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,469,348 >>> mbox cmd response: failed
1,469,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,469,354 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,040 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,256 UART: [kat] ++
895,408 UART: [kat] sha1
899,628 UART: [kat] SHA2-256
901,568 UART: [kat] SHA2-384
904,289 UART: [kat] SHA2-512-ACC
906,190 UART: [kat] ECC-384
916,059 UART: [kat] HMAC-384Kdf
920,761 UART: [kat] LMS
1,169,073 UART: [kat] --
1,169,752 UART: [cold-reset] ++
1,170,254 UART: [fht] FHT @ 0x50003400
1,173,010 UART: [idev] ++
1,173,178 UART: [idev] CDI.KEYID = 6
1,173,539 UART: [idev] SUBJECT.KEYID = 7
1,173,964 UART: [idev] UDS.KEYID = 0
1,174,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,963 UART: [idev] Erasing UDS.KEYID = 0
1,198,857 UART: [idev] Sha1 KeyId Algorithm
1,207,777 UART: [idev] --
1,208,980 UART: [ldev] ++
1,209,148 UART: [ldev] CDI.KEYID = 6
1,209,512 UART: [ldev] SUBJECT.KEYID = 5
1,209,939 UART: [ldev] AUTHORITY.KEYID = 7
1,210,402 UART: [ldev] FE.KEYID = 1
1,215,626 UART: [ldev] Erasing FE.KEYID = 1
1,241,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,074 UART: [ldev] --
1,281,517 UART: [fwproc] Wait for Commands...
1,282,158 UART: [fwproc] Recv command 0x46574c44
1,282,891 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,802 UART: ROM Fatal Error: 0x000B0032
1,309,959 >>> mbox cmd response: failed
1,309,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,965 >>> mbox cmd response: failed
1,309,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,697 UART: [kat] SHA2-512-ACC
906,598 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
920,725 UART: [kat] LMS
1,169,037 UART: [kat] --
1,170,116 UART: [cold-reset] ++
1,170,476 UART: [fht] FHT @ 0x50003400
1,173,124 UART: [idev] ++
1,173,292 UART: [idev] CDI.KEYID = 6
1,173,653 UART: [idev] SUBJECT.KEYID = 7
1,174,078 UART: [idev] UDS.KEYID = 0
1,174,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,247 UART: [idev] Erasing UDS.KEYID = 0
1,199,549 UART: [idev] Sha1 KeyId Algorithm
1,208,575 UART: [idev] --
1,209,540 UART: [ldev] ++
1,209,708 UART: [ldev] CDI.KEYID = 6
1,210,072 UART: [ldev] SUBJECT.KEYID = 5
1,210,499 UART: [ldev] AUTHORITY.KEYID = 7
1,210,962 UART: [ldev] FE.KEYID = 1
1,216,038 UART: [ldev] Erasing FE.KEYID = 1
1,242,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,868 UART: [ldev] --
1,282,111 UART: [fwproc] Wait for Commands...
1,282,744 UART: [fwproc] Recv command 0x46574c44
1,283,477 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,064 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,239 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,470 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,056 >>> mbox cmd response: failed
1,164,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,062 >>> mbox cmd response: failed
1,164,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,068 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,735 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,867 UART: [kat] SHA2-256
901,807 UART: [kat] SHA2-384
904,764 UART: [kat] SHA2-512-ACC
906,665 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,720 UART: [kat] LMS
1,169,032 UART: [kat] --
1,169,925 UART: [cold-reset] ++
1,170,263 UART: [fht] FHT @ 0x50003400
1,172,959 UART: [idev] ++
1,173,127 UART: [idev] CDI.KEYID = 6
1,173,488 UART: [idev] SUBJECT.KEYID = 7
1,173,913 UART: [idev] UDS.KEYID = 0
1,174,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,018 UART: [idev] Erasing UDS.KEYID = 0
1,198,978 UART: [idev] Sha1 KeyId Algorithm
1,207,918 UART: [idev] --
1,208,851 UART: [ldev] ++
1,209,019 UART: [ldev] CDI.KEYID = 6
1,209,383 UART: [ldev] SUBJECT.KEYID = 5
1,209,810 UART: [ldev] AUTHORITY.KEYID = 7
1,210,273 UART: [ldev] FE.KEYID = 1
1,215,691 UART: [ldev] Erasing FE.KEYID = 1
1,242,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,939 UART: [ldev] --
1,281,248 UART: [fwproc] Wait for Commands...
1,281,943 UART: [fwproc] Recv command 0x46574c44
1,282,676 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,635 UART: ROM Fatal Error: 0x000B0032
1,309,792 >>> mbox cmd response: failed
1,309,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,798 >>> mbox cmd response: failed
1,309,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,804 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,339 UART: [kat] ++
895,491 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,464 UART: [kat] SHA2-512-ACC
906,365 UART: [kat] ECC-384
915,848 UART: [kat] HMAC-384Kdf
920,456 UART: [kat] LMS
1,168,768 UART: [kat] --
1,169,709 UART: [cold-reset] ++
1,170,237 UART: [fht] FHT @ 0x50003400
1,172,955 UART: [idev] ++
1,173,123 UART: [idev] CDI.KEYID = 6
1,173,484 UART: [idev] SUBJECT.KEYID = 7
1,173,909 UART: [idev] UDS.KEYID = 0
1,174,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,632 UART: [idev] Erasing UDS.KEYID = 0
1,198,798 UART: [idev] Sha1 KeyId Algorithm
1,207,622 UART: [idev] --
1,208,733 UART: [ldev] ++
1,208,901 UART: [ldev] CDI.KEYID = 6
1,209,265 UART: [ldev] SUBJECT.KEYID = 5
1,209,692 UART: [ldev] AUTHORITY.KEYID = 7
1,210,155 UART: [ldev] FE.KEYID = 1
1,215,211 UART: [ldev] Erasing FE.KEYID = 1
1,241,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,019 UART: [ldev] --
1,281,394 UART: [fwproc] Wait for Commands...
1,282,173 UART: [fwproc] Recv command 0x46574c44
1,282,906 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,989 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,164 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,397 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,609 >>> mbox cmd response: failed
1,164,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,615 >>> mbox cmd response: failed
1,164,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,621 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,267 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
893,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,573 UART: [kat] ++
897,725 UART: [kat] sha1
901,969 UART: [kat] SHA2-256
903,909 UART: [kat] SHA2-384
906,662 UART: [kat] SHA2-512-ACC
908,563 UART: [kat] ECC-384
918,716 UART: [kat] HMAC-384Kdf
923,358 UART: [kat] LMS
1,171,686 UART: [kat] --
1,172,369 UART: [cold-reset] ++
1,172,747 UART: [fht] FHT @ 0x50003400
1,175,518 UART: [idev] ++
1,175,686 UART: [idev] CDI.KEYID = 6
1,176,046 UART: [idev] SUBJECT.KEYID = 7
1,176,470 UART: [idev] UDS.KEYID = 0
1,176,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,746 UART: [idev] Erasing UDS.KEYID = 0
1,201,707 UART: [idev] Sha1 KeyId Algorithm
1,210,183 UART: [idev] --
1,211,219 UART: [ldev] ++
1,211,387 UART: [ldev] CDI.KEYID = 6
1,211,750 UART: [ldev] SUBJECT.KEYID = 5
1,212,176 UART: [ldev] AUTHORITY.KEYID = 7
1,212,639 UART: [ldev] FE.KEYID = 1
1,217,903 UART: [ldev] Erasing FE.KEYID = 1
1,244,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,913 UART: [ldev] --
1,283,312 UART: [fwproc] Wait for Commands...
1,283,916 UART: [fwproc] Recv command 0x46574c44
1,284,644 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,398 UART: ROM Fatal Error: 0x000B0032
1,311,555 >>> mbox cmd response: failed
1,311,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,561 >>> mbox cmd response: failed
1,311,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,219 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
893,226 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,351 UART: [kat] ++
897,503 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,472 UART: [kat] SHA2-512-ACC
908,373 UART: [kat] ECC-384
917,782 UART: [kat] HMAC-384Kdf
922,336 UART: [kat] LMS
1,170,664 UART: [kat] --
1,171,507 UART: [cold-reset] ++
1,171,875 UART: [fht] FHT @ 0x50003400
1,174,726 UART: [idev] ++
1,174,894 UART: [idev] CDI.KEYID = 6
1,175,254 UART: [idev] SUBJECT.KEYID = 7
1,175,678 UART: [idev] UDS.KEYID = 0
1,176,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,656 UART: [idev] Erasing UDS.KEYID = 0
1,200,527 UART: [idev] Sha1 KeyId Algorithm
1,209,081 UART: [idev] --
1,210,207 UART: [ldev] ++
1,210,375 UART: [ldev] CDI.KEYID = 6
1,210,738 UART: [ldev] SUBJECT.KEYID = 5
1,211,164 UART: [ldev] AUTHORITY.KEYID = 7
1,211,627 UART: [ldev] FE.KEYID = 1
1,216,881 UART: [ldev] Erasing FE.KEYID = 1
1,243,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,605 UART: [ldev] --
1,283,016 UART: [fwproc] Wait for Commands...
1,283,682 UART: [fwproc] Recv command 0x46574c44
1,284,410 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,681 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,851 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,196 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,678 >>> mbox cmd response: failed
1,165,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,684 >>> mbox cmd response: failed
1,165,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,690 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,567 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
87,072 UART: [state] WD Timer not started. Device not locked for debugging
88,309 UART: [kat] SHA2-256
893,959 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,084 UART: [kat] ++
898,236 UART: [kat] sha1
902,472 UART: [kat] SHA2-256
904,412 UART: [kat] SHA2-384
907,173 UART: [kat] SHA2-512-ACC
909,074 UART: [kat] ECC-384
918,873 UART: [kat] HMAC-384Kdf
923,553 UART: [kat] LMS
1,171,881 UART: [kat] --
1,172,666 UART: [cold-reset] ++
1,173,036 UART: [fht] FHT @ 0x50003400
1,175,653 UART: [idev] ++
1,175,821 UART: [idev] CDI.KEYID = 6
1,176,181 UART: [idev] SUBJECT.KEYID = 7
1,176,605 UART: [idev] UDS.KEYID = 0
1,176,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,781 UART: [idev] Erasing UDS.KEYID = 0
1,202,584 UART: [idev] Sha1 KeyId Algorithm
1,211,120 UART: [idev] --
1,212,138 UART: [ldev] ++
1,212,306 UART: [ldev] CDI.KEYID = 6
1,212,669 UART: [ldev] SUBJECT.KEYID = 5
1,213,095 UART: [ldev] AUTHORITY.KEYID = 7
1,213,558 UART: [ldev] FE.KEYID = 1
1,219,142 UART: [ldev] Erasing FE.KEYID = 1
1,246,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,936 UART: [ldev] --
1,285,203 UART: [fwproc] Wait for Commands...
1,285,895 UART: [fwproc] Recv command 0x46574c44
1,286,623 UART: [fwproc] Recv'd Img size: 118548 bytes
1,312,567 UART: ROM Fatal Error: 0x000B0032
1,313,724 >>> mbox cmd response: failed
1,313,724 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,730 >>> mbox cmd response: failed
1,313,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
893,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,564 UART: [kat] ++
897,716 UART: [kat] sha1
901,828 UART: [kat] SHA2-256
903,768 UART: [kat] SHA2-384
906,687 UART: [kat] SHA2-512-ACC
908,588 UART: [kat] ECC-384
918,351 UART: [kat] HMAC-384Kdf
922,867 UART: [kat] LMS
1,171,195 UART: [kat] --
1,171,958 UART: [cold-reset] ++
1,172,458 UART: [fht] FHT @ 0x50003400
1,175,127 UART: [idev] ++
1,175,295 UART: [idev] CDI.KEYID = 6
1,175,655 UART: [idev] SUBJECT.KEYID = 7
1,176,079 UART: [idev] UDS.KEYID = 0
1,176,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,023 UART: [idev] Erasing UDS.KEYID = 0
1,201,288 UART: [idev] Sha1 KeyId Algorithm
1,209,786 UART: [idev] --
1,210,616 UART: [ldev] ++
1,210,784 UART: [ldev] CDI.KEYID = 6
1,211,147 UART: [ldev] SUBJECT.KEYID = 5
1,211,573 UART: [ldev] AUTHORITY.KEYID = 7
1,212,036 UART: [ldev] FE.KEYID = 1
1,217,422 UART: [ldev] Erasing FE.KEYID = 1
1,244,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,618 UART: [ldev] --
1,283,979 UART: [fwproc] Wait for Commands...
1,284,789 UART: [fwproc] Recv command 0x46574c44
1,285,517 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,896 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,066 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,345 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,721 >>> mbox cmd response: failed
1,166,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,727 >>> mbox cmd response: failed
1,166,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,733 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,252 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
192,314 UART:
192,681 UART: Running Caliptra ROM ...
193,824 UART:
193,971 UART: [state] CFI Enabled
261,391 UART: [state] LifecycleState = Unprovisioned
263,330 UART: [state] DebugLocked = No
264,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,078 UART: [kat] SHA2-256
438,760 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,258 UART: [kat] ++
449,810 UART: [kat] sha1
461,482 UART: [kat] SHA2-256
464,167 UART: [kat] SHA2-384
470,270 UART: [kat] SHA2-512-ACC
472,623 UART: [kat] ECC-384
2,767,708 UART: [kat] HMAC-384Kdf
2,779,512 UART: [kat] LMS
3,969,788 UART: [kat] --
3,974,142 UART: [cold-reset] ++
3,976,690 UART: [fht] Storing FHT @ 0x50003400
3,988,740 UART: [idev] ++
3,989,370 UART: [idev] CDI.KEYID = 6
3,990,281 UART: [idev] SUBJECT.KEYID = 7
3,991,549 UART: [idev] UDS.KEYID = 0
3,994,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,144,043 UART: [idev] Erasing UDS.KEYID = 0
7,325,865 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,630 UART: [idev] --
7,349,746 UART: [ldev] ++
7,350,385 UART: [ldev] CDI.KEYID = 6
7,351,298 UART: [ldev] SUBJECT.KEYID = 5
7,352,521 UART: [ldev] AUTHORITY.KEYID = 7
7,353,755 UART: [ldev] FE.KEYID = 1
7,401,777 UART: [ldev] Erasing FE.KEYID = 1
10,734,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,272 UART: [ldev] --
13,094,782 UART: [fwproc] Waiting for Commands...
13,097,952 UART: [fwproc] Received command 0x46574c44
13,100,177 UART: [fwproc] Received Image of size 118548 bytes
13,180,049 UART: ROM Fatal Error: 0x00B0003A
13,183,517 >>> mbox cmd response: failed
13,183,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,184,332 >>> mbox cmd response: failed
13,184,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,184,905 >>> mbox cmd response: failed
Initializing fuses
2,053,128 writing to cptra_bootfsm_go
2,242,429 UART:
2,242,771 UART: Running Caliptra ROM ...
2,243,821 UART:
2,243,975 UART: [state] CFI Enabled
2,308,669 UART: [state] LifecycleState = Unprovisioned
2,310,665 UART: [state] DebugLocked = No
2,313,117 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,461 UART: [kat] SHA2-256
2,488,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,695 UART: [kat] ++
2,499,185 UART: [kat] sha1
2,510,938 UART: [kat] SHA2-256
2,513,595 UART: [kat] SHA2-384
2,518,942 UART: [kat] SHA2-512-ACC
2,521,298 UART: [kat] ECC-384
4,811,121 UART: [kat] HMAC-384Kdf
4,823,312 UART: [kat] LMS
6,013,665 UART: [kat] --
6,018,076 UART: [cold-reset] ++
6,019,862 UART: [fht] Storing FHT @ 0x50003400
6,031,754 UART: [idev] ++
6,032,337 UART: [idev] CDI.KEYID = 6
6,033,249 UART: [idev] SUBJECT.KEYID = 7
6,034,523 UART: [idev] UDS.KEYID = 0
6,036,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,186,108 UART: [idev] Erasing UDS.KEYID = 0
9,370,665 UART: [idev] Using Sha1 for KeyId Algorithm
9,391,036 UART: [idev] --
9,395,745 UART: [ldev] ++
9,396,319 UART: [ldev] CDI.KEYID = 6
9,397,266 UART: [ldev] SUBJECT.KEYID = 5
9,398,576 UART: [ldev] AUTHORITY.KEYID = 7
9,399,764 UART: [ldev] FE.KEYID = 1
9,445,540 UART: [ldev] Erasing FE.KEYID = 1
12,775,002 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,070,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,085,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,100,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,114,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,133,217 UART: [ldev] --
15,138,386 UART: [fwproc] Waiting for Commands...
15,140,219 UART: [fwproc] Received command 0x46574c44
15,142,465 UART: [fwproc] Received Image of size 118548 bytes
19,245,840 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,323,367 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,396,581 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,724,607 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
3,785,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,920,527 >>> mbox cmd response: failed
12,921,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,619 >>> mbox cmd response: failed
12,921,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,192 >>> mbox cmd response: failed
Initializing fuses
2,057,040 writing to cptra_bootfsm_go
5,855,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,015,966 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,484 writing to cptra_bootfsm_go
192,764 UART:
193,114 UART: Running Caliptra ROM ...
194,300 UART:
604,058 UART: [state] CFI Enabled
618,272 UART: [state] LifecycleState = Unprovisioned
620,267 UART: [state] DebugLocked = No
623,167 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,265 UART: [kat] SHA2-256
796,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,510 UART: [kat] ++
807,959 UART: [kat] sha1
819,109 UART: [kat] SHA2-256
821,802 UART: [kat] SHA2-384
826,487 UART: [kat] SHA2-512-ACC
828,885 UART: [kat] ECC-384
3,111,413 UART: [kat] HMAC-384Kdf
3,122,932 UART: [kat] LMS
4,313,082 UART: [kat] --
4,317,630 UART: [cold-reset] ++
4,319,783 UART: [fht] Storing FHT @ 0x50003400
4,331,106 UART: [idev] ++
4,331,676 UART: [idev] CDI.KEYID = 6
4,332,593 UART: [idev] SUBJECT.KEYID = 7
4,333,891 UART: [idev] UDS.KEYID = 0
4,337,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,735 UART: [idev] Erasing UDS.KEYID = 0
7,623,250 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,331 UART: [idev] --
7,650,892 UART: [ldev] ++
7,651,468 UART: [ldev] CDI.KEYID = 6
7,652,436 UART: [ldev] SUBJECT.KEYID = 5
7,653,653 UART: [ldev] AUTHORITY.KEYID = 7
7,655,044 UART: [ldev] FE.KEYID = 1
7,666,573 UART: [ldev] Erasing FE.KEYID = 1
10,954,891 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,049 UART: [ldev] --
13,313,928 UART: [fwproc] Waiting for Commands...
13,317,064 UART: [fwproc] Received command 0x46574c44
13,319,260 UART: [fwproc] Received Image of size 118548 bytes
13,396,117 UART: ROM Fatal Error: 0x00B0003A
13,399,590 >>> mbox cmd response: failed
13,400,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,400,361 >>> mbox cmd response: failed
13,400,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,400,930 >>> mbox cmd response: failed
Initializing fuses
2,055,947 writing to cptra_bootfsm_go
2,245,264 UART:
2,245,645 UART: Running Caliptra ROM ...
2,246,746 UART:
7,070,801 UART: [state] CFI Enabled
7,085,688 UART: [state] LifecycleState = Unprovisioned
7,087,618 UART: [state] DebugLocked = No
7,089,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,093,824 UART: [kat] SHA2-256
7,263,571 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,274,087 UART: [kat] ++
7,274,580 UART: [kat] sha1
7,284,716 UART: [kat] SHA2-256
7,287,417 UART: [kat] SHA2-384
7,294,169 UART: [kat] SHA2-512-ACC
7,296,514 UART: [kat] ECC-384
9,580,935 UART: [kat] HMAC-384Kdf
9,592,685 UART: [kat] LMS
10,782,792 UART: [kat] --
10,790,471 UART: [cold-reset] ++
10,792,949 UART: [fht] Storing FHT @ 0x50003400
10,802,919 UART: [idev] ++
10,803,491 UART: [idev] CDI.KEYID = 6
10,804,459 UART: [idev] SUBJECT.KEYID = 7
10,805,673 UART: [idev] UDS.KEYID = 0
10,808,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,957,073 UART: [idev] Erasing UDS.KEYID = 0
14,092,052 UART: [idev] Using Sha1 for KeyId Algorithm
14,114,226 UART: [idev] --
14,118,443 UART: [ldev] ++
14,119,024 UART: [ldev] CDI.KEYID = 6
14,120,054 UART: [ldev] SUBJECT.KEYID = 5
14,121,257 UART: [ldev] AUTHORITY.KEYID = 7
14,122,443 UART: [ldev] FE.KEYID = 1
14,133,336 UART: [ldev] Erasing FE.KEYID = 1
17,420,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,713,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,727,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,742,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,757,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,776,888 UART: [ldev] --
19,782,141 UART: [fwproc] Waiting for Commands...
19,784,739 UART: [fwproc] Received command 0x46574c44
19,786,932 UART: [fwproc] Received Image of size 118548 bytes
23,887,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,960,299 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,033,490 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,362,380 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
4,126,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,124,708 >>> mbox cmd response: failed
13,125,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,125,995 >>> mbox cmd response: failed
13,126,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,126,573 >>> mbox cmd response: failed
Initializing fuses
2,049,441 writing to cptra_bootfsm_go
10,869,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,906,136 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,162 UART:
192,585 UART: Running Caliptra ROM ...
193,718 UART:
193,867 UART: [state] CFI Enabled
261,297 UART: [state] LifecycleState = Unprovisioned
263,248 UART: [state] DebugLocked = No
265,071 UART: [state] WD Timer not started. Device not locked for debugging
269,673 UART: [kat] SHA2-256
449,321 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,131 UART: [kat] ++
460,675 UART: [kat] sha1
471,185 UART: [kat] SHA2-256
473,876 UART: [kat] SHA2-384
480,954 UART: [kat] SHA2-512-ACC
483,349 UART: [kat] ECC-384
2,946,846 UART: [kat] HMAC-384Kdf
2,971,300 UART: [kat] LMS
3,447,806 UART: [kat] --
3,451,004 UART: [cold-reset] ++
3,453,382 UART: [fht] FHT @ 0x50003400
3,465,983 UART: [idev] ++
3,466,552 UART: [idev] CDI.KEYID = 6
3,467,576 UART: [idev] SUBJECT.KEYID = 7
3,468,739 UART: [idev] UDS.KEYID = 0
3,471,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,084 UART: [idev] Erasing UDS.KEYID = 0
5,988,652 UART: [idev] Sha1 KeyId Algorithm
6,012,119 UART: [idev] --
6,017,425 UART: [ldev] ++
6,018,023 UART: [ldev] CDI.KEYID = 6
6,018,959 UART: [ldev] SUBJECT.KEYID = 5
6,020,127 UART: [ldev] AUTHORITY.KEYID = 7
6,021,372 UART: [ldev] FE.KEYID = 1
6,056,879 UART: [ldev] Erasing FE.KEYID = 1
8,566,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,952 UART: [ldev] --
10,373,758 UART: [fwproc] Wait for Commands...
10,376,406 UART: [fwproc] Recv command 0x46574c44
10,378,398 UART: [fwproc] Recv'd Img size: 118548 bytes
10,475,156 UART: ROM Fatal Error: 0x00B0003A
10,478,364 >>> mbox cmd response: failed
10,478,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,479,036 >>> mbox cmd response: failed
10,479,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,479,608 >>> mbox cmd response: failed
Initializing fuses
2,059,751 writing to cptra_bootfsm_go
2,249,044 UART:
2,249,410 UART: Running Caliptra ROM ...
2,250,561 UART:
2,250,731 UART: [state] CFI Enabled
2,318,531 UART: [state] LifecycleState = Unprovisioned
2,320,474 UART: [state] DebugLocked = No
2,321,769 UART: [state] WD Timer not started. Device not locked for debugging
2,326,245 UART: [kat] SHA2-256
2,505,886 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,516,673 UART: [kat] ++
2,517,223 UART: [kat] sha1
2,529,494 UART: [kat] SHA2-256
2,532,181 UART: [kat] SHA2-384
2,539,537 UART: [kat] SHA2-512-ACC
2,541,894 UART: [kat] ECC-384
5,004,300 UART: [kat] HMAC-384Kdf
5,020,051 UART: [kat] LMS
5,496,542 UART: [kat] --
5,502,103 UART: [cold-reset] ++
5,504,584 UART: [fht] FHT @ 0x50003400
5,516,594 UART: [idev] ++
5,517,172 UART: [idev] CDI.KEYID = 6
5,518,091 UART: [idev] SUBJECT.KEYID = 7
5,519,390 UART: [idev] UDS.KEYID = 0
5,522,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,671,518 UART: [idev] Erasing UDS.KEYID = 0
8,028,864 UART: [idev] Sha1 KeyId Algorithm
8,053,231 UART: [idev] --
8,057,592 UART: [ldev] ++
8,058,182 UART: [ldev] CDI.KEYID = 6
8,059,100 UART: [ldev] SUBJECT.KEYID = 5
8,060,321 UART: [ldev] AUTHORITY.KEYID = 7
8,061,564 UART: [ldev] FE.KEYID = 1
8,100,627 UART: [ldev] Erasing FE.KEYID = 1
10,611,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,342,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,358,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,374,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,390,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,410,453 UART: [ldev] --
12,416,001 UART: [fwproc] Wait for Commands...
12,418,816 UART: [fwproc] Recv command 0x46574c44
12,420,807 UART: [fwproc] Recv'd Img size: 118548 bytes
15,903,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,277 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,057,306 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,384,783 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,873 writing to cptra_bootfsm_go
3,463,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,348,886 >>> mbox cmd response: failed
10,349,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,349,967 >>> mbox cmd response: failed
10,350,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,350,560 >>> mbox cmd response: failed
Initializing fuses
2,060,877 writing to cptra_bootfsm_go
5,504,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,258,691 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
192,577 UART:
192,947 UART: Running Caliptra ROM ...
194,066 UART:
603,786 UART: [state] CFI Enabled
617,242 UART: [state] LifecycleState = Unprovisioned
619,149 UART: [state] DebugLocked = No
621,722 UART: [state] WD Timer not started. Device not locked for debugging
625,349 UART: [kat] SHA2-256
804,980 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,773 UART: [kat] ++
816,285 UART: [kat] sha1
826,846 UART: [kat] SHA2-256
829,537 UART: [kat] SHA2-384
834,653 UART: [kat] SHA2-512-ACC
837,048 UART: [kat] ECC-384
3,279,050 UART: [kat] HMAC-384Kdf
3,291,893 UART: [kat] LMS
3,768,434 UART: [kat] --
3,773,353 UART: [cold-reset] ++
3,775,291 UART: [fht] FHT @ 0x50003400
3,786,311 UART: [idev] ++
3,786,897 UART: [idev] CDI.KEYID = 6
3,787,812 UART: [idev] SUBJECT.KEYID = 7
3,789,089 UART: [idev] UDS.KEYID = 0
3,791,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,048 UART: [idev] Erasing UDS.KEYID = 0
6,267,850 UART: [idev] Sha1 KeyId Algorithm
6,291,698 UART: [idev] --
6,295,967 UART: [ldev] ++
6,296,539 UART: [ldev] CDI.KEYID = 6
6,297,562 UART: [ldev] SUBJECT.KEYID = 5
6,298,672 UART: [ldev] AUTHORITY.KEYID = 7
6,299,907 UART: [ldev] FE.KEYID = 1
6,310,471 UART: [ldev] Erasing FE.KEYID = 1
8,789,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,744 UART: [ldev] --
10,582,325 UART: [fwproc] Wait for Commands...
10,584,595 UART: [fwproc] Recv command 0x46574c44
10,586,664 UART: [fwproc] Recv'd Img size: 118548 bytes
10,677,603 UART: ROM Fatal Error: 0x00B0003A
10,680,804 >>> mbox cmd response: failed
10,681,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,681,557 >>> mbox cmd response: failed
10,681,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,682,136 >>> mbox cmd response: failed
Initializing fuses
2,059,376 writing to cptra_bootfsm_go
2,248,708 UART:
2,249,066 UART: Running Caliptra ROM ...
2,250,210 UART:
9,775,302 UART: [state] CFI Enabled
9,789,645 UART: [state] LifecycleState = Unprovisioned
9,791,560 UART: [state] DebugLocked = No
9,793,390 UART: [state] WD Timer not started. Device not locked for debugging
9,796,452 UART: [kat] SHA2-256
9,976,093 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,986,891 UART: [kat] ++
9,987,352 UART: [kat] sha1
9,997,745 UART: [kat] SHA2-256
10,000,439 UART: [kat] SHA2-384
10,005,414 UART: [kat] SHA2-512-ACC
10,007,782 UART: [kat] ECC-384
12,451,471 UART: [kat] HMAC-384Kdf
12,464,621 UART: [kat] LMS
12,941,169 UART: [kat] --
12,945,104 UART: [cold-reset] ++
12,946,064 UART: [fht] FHT @ 0x50003400
12,956,990 UART: [idev] ++
12,957,554 UART: [idev] CDI.KEYID = 6
12,958,496 UART: [idev] SUBJECT.KEYID = 7
12,959,764 UART: [idev] UDS.KEYID = 0
12,962,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,111,467 UART: [idev] Erasing UDS.KEYID = 0
15,436,308 UART: [idev] Sha1 KeyId Algorithm
15,460,786 UART: [idev] --
15,465,325 UART: [ldev] ++
15,465,897 UART: [ldev] CDI.KEYID = 6
15,466,813 UART: [ldev] SUBJECT.KEYID = 5
15,468,032 UART: [ldev] AUTHORITY.KEYID = 7
15,469,270 UART: [ldev] FE.KEYID = 1
15,481,219 UART: [ldev] Erasing FE.KEYID = 1
17,956,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,676,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,692,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,708,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,723,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,745,049 UART: [ldev] --
19,749,843 UART: [fwproc] Wait for Commands...
19,751,943 UART: [fwproc] Recv command 0x46574c44
19,753,987 UART: [fwproc] Recv'd Img size: 118548 bytes
23,229,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,311,285 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,384,306 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,713,197 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,782,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,561,217 >>> mbox cmd response: failed
10,561,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,562,188 >>> mbox cmd response: failed
10,562,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,562,767 >>> mbox cmd response: failed
Initializing fuses
2,057,691 writing to cptra_bootfsm_go
13,078,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,753,832 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,178 UART:
192,540 UART: Running Caliptra ROM ...
193,745 UART:
193,905 UART: [state] CFI Enabled
260,912 UART: [state] LifecycleState = Unprovisioned
263,350 UART: [state] DebugLocked = No
266,092 UART: [state] WD Timer not started. Device not locked for debugging
271,316 UART: [kat] SHA2-256
461,197 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,021 UART: [kat] ++
472,571 UART: [kat] sha1
484,646 UART: [kat] SHA2-256
487,671 UART: [kat] SHA2-384
493,115 UART: [kat] SHA2-512-ACC
495,732 UART: [kat] ECC-384
2,943,927 UART: [kat] HMAC-384Kdf
2,971,137 UART: [kat] LMS
3,502,943 UART: [kat] --
3,508,691 UART: [cold-reset] ++
3,509,720 UART: [fht] FHT @ 0x50003400
3,521,902 UART: [idev] ++
3,522,590 UART: [idev] CDI.KEYID = 6
3,523,564 UART: [idev] SUBJECT.KEYID = 7
3,524,784 UART: [idev] UDS.KEYID = 0
3,527,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,968 UART: [idev] Erasing UDS.KEYID = 0
6,027,401 UART: [idev] Sha1 KeyId Algorithm
6,049,134 UART: [idev] --
6,054,002 UART: [ldev] ++
6,054,696 UART: [ldev] CDI.KEYID = 6
6,055,613 UART: [ldev] SUBJECT.KEYID = 5
6,056,803 UART: [ldev] AUTHORITY.KEYID = 7
6,057,988 UART: [ldev] FE.KEYID = 1
6,099,261 UART: [ldev] Erasing FE.KEYID = 1
8,604,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,021 UART: [ldev] --
10,413,348 UART: [fwproc] Wait for Commands...
10,415,989 UART: [fwproc] Recv command 0x46574c44
10,418,262 UART: [fwproc] Recv'd Img size: 118548 bytes
10,525,905 UART: ROM Fatal Error: 0x00B0003A
10,529,539 >>> mbox cmd response: failed
10,529,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,530,301 >>> mbox cmd response: failed
10,530,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,530,888 >>> mbox cmd response: failed
Initializing fuses
2,060,223 writing to cptra_bootfsm_go
2,249,540 UART:
2,249,889 UART: Running Caliptra ROM ...
2,250,939 UART:
2,251,098 UART: [state] CFI Enabled
2,320,468 UART: [state] LifecycleState = Unprovisioned
2,322,858 UART: [state] DebugLocked = No
2,324,203 UART: [state] WD Timer not started. Device not locked for debugging
2,327,919 UART: [kat] SHA2-256
2,517,650 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,416 UART: [kat] ++
2,528,964 UART: [kat] sha1
2,539,215 UART: [kat] SHA2-256
2,542,222 UART: [kat] SHA2-384
2,547,370 UART: [kat] SHA2-512-ACC
2,549,949 UART: [kat] ECC-384
5,002,830 UART: [kat] HMAC-384Kdf
5,017,453 UART: [kat] LMS
5,549,205 UART: [kat] --
5,552,951 UART: [cold-reset] ++
5,554,517 UART: [fht] FHT @ 0x50003400
5,565,614 UART: [idev] ++
5,566,301 UART: [idev] CDI.KEYID = 6
5,567,328 UART: [idev] SUBJECT.KEYID = 7
5,568,496 UART: [idev] UDS.KEYID = 0
5,571,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,720,152 UART: [idev] Erasing UDS.KEYID = 0
8,073,515 UART: [idev] Sha1 KeyId Algorithm
8,096,004 UART: [idev] --
8,099,526 UART: [ldev] ++
8,100,169 UART: [ldev] CDI.KEYID = 6
8,101,087 UART: [ldev] SUBJECT.KEYID = 5
8,102,307 UART: [ldev] AUTHORITY.KEYID = 7
8,103,496 UART: [ldev] FE.KEYID = 1
8,145,997 UART: [ldev] Erasing FE.KEYID = 1
10,653,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,403,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,450 UART: [ldev] --
12,460,378 UART: [fwproc] Wait for Commands...
12,462,400 UART: [fwproc] Recv command 0x46574c44
12,464,672 UART: [fwproc] Recv'd Img size: 118548 bytes
15,964,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,041,740 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,165,375 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,725,827 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,440,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,325,928 >>> mbox cmd response: failed
10,326,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,326,807 >>> mbox cmd response: failed
10,327,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,327,368 >>> mbox cmd response: failed
Initializing fuses
2,054,611 writing to cptra_bootfsm_go
5,485,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,890,785 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,565 UART:
192,932 UART: Running Caliptra ROM ...
194,128 UART:
603,605 UART: [state] CFI Enabled
617,305 UART: [state] LifecycleState = Unprovisioned
619,680 UART: [state] DebugLocked = No
620,853 UART: [state] WD Timer not started. Device not locked for debugging
625,398 UART: [kat] SHA2-256
815,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,057 UART: [kat] ++
826,607 UART: [kat] sha1
838,357 UART: [kat] SHA2-256
841,377 UART: [kat] SHA2-384
847,961 UART: [kat] SHA2-512-ACC
850,563 UART: [kat] ECC-384
3,291,765 UART: [kat] HMAC-384Kdf
3,304,543 UART: [kat] LMS
3,836,382 UART: [kat] --
3,838,650 UART: [cold-reset] ++
3,839,565 UART: [fht] FHT @ 0x50003400
3,852,365 UART: [idev] ++
3,853,041 UART: [idev] CDI.KEYID = 6
3,853,984 UART: [idev] SUBJECT.KEYID = 7
3,855,198 UART: [idev] UDS.KEYID = 0
3,857,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,364 UART: [idev] Erasing UDS.KEYID = 0
6,326,644 UART: [idev] Sha1 KeyId Algorithm
6,350,261 UART: [idev] --
6,354,584 UART: [ldev] ++
6,355,274 UART: [ldev] CDI.KEYID = 6
6,356,194 UART: [ldev] SUBJECT.KEYID = 5
6,357,364 UART: [ldev] AUTHORITY.KEYID = 7
6,358,603 UART: [ldev] FE.KEYID = 1
6,371,014 UART: [ldev] Erasing FE.KEYID = 1
8,851,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,457 UART: [ldev] --
10,639,255 UART: [fwproc] Wait for Commands...
10,641,091 UART: [fwproc] Recv command 0x46574c44
10,643,360 UART: [fwproc] Recv'd Img size: 118548 bytes
10,752,445 UART: ROM Fatal Error: 0x00B0003A
10,756,076 >>> mbox cmd response: failed
10,756,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,756,852 >>> mbox cmd response: failed
10,757,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,757,423 >>> mbox cmd response: failed
Initializing fuses
2,059,227 writing to cptra_bootfsm_go
2,248,634 UART:
2,248,998 UART: Running Caliptra ROM ...
2,250,251 UART:
9,691,854 UART: [state] CFI Enabled
9,706,136 UART: [state] LifecycleState = Unprovisioned
9,708,501 UART: [state] DebugLocked = No
9,710,600 UART: [state] WD Timer not started. Device not locked for debugging
9,715,623 UART: [kat] SHA2-256
9,905,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,916,292 UART: [kat] ++
9,916,900 UART: [kat] sha1
9,928,753 UART: [kat] SHA2-256
9,931,774 UART: [kat] SHA2-384
9,937,513 UART: [kat] SHA2-512-ACC
9,940,089 UART: [kat] ECC-384
12,383,324 UART: [kat] HMAC-384Kdf
12,396,318 UART: [kat] LMS
12,928,166 UART: [kat] --
12,933,613 UART: [cold-reset] ++
12,934,522 UART: [fht] FHT @ 0x50003400
12,945,234 UART: [idev] ++
12,945,919 UART: [idev] CDI.KEYID = 6
12,946,891 UART: [idev] SUBJECT.KEYID = 7
12,948,108 UART: [idev] UDS.KEYID = 0
12,950,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,099,940 UART: [idev] Erasing UDS.KEYID = 0
15,425,729 UART: [idev] Sha1 KeyId Algorithm
15,448,932 UART: [idev] --
15,454,689 UART: [ldev] ++
15,455,382 UART: [ldev] CDI.KEYID = 6
15,456,298 UART: [ldev] SUBJECT.KEYID = 5
15,457,456 UART: [ldev] AUTHORITY.KEYID = 7
15,458,689 UART: [ldev] FE.KEYID = 1
15,469,228 UART: [ldev] Erasing FE.KEYID = 1
17,952,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,669,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,684,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,700,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,715,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,737,395 UART: [ldev] --
19,743,044 UART: [fwproc] Wait for Commands...
19,745,041 UART: [fwproc] Recv command 0x46574c44
19,747,314 UART: [fwproc] Recv'd Img size: 118548 bytes
23,237,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,317,023 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,440,596 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,001,760 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,758,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,552,897 >>> mbox cmd response: failed
10,553,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,553,867 >>> mbox cmd response: failed
10,554,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,554,439 >>> mbox cmd response: failed
Initializing fuses
2,054,276 writing to cptra_bootfsm_go
13,071,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,373,542 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,665 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,161 UART: [kat] SHA2-256
882,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,207 UART: [kat] ++
886,359 UART: [kat] sha1
890,593 UART: [kat] SHA2-256
892,531 UART: [kat] SHA2-384
895,260 UART: [kat] SHA2-512-ACC
897,161 UART: [kat] ECC-384
902,690 UART: [kat] HMAC-384Kdf
907,308 UART: [kat] LMS
1,475,504 UART: [kat] --
1,476,391 UART: [cold-reset] ++
1,476,963 UART: [fht] Storing FHT @ 0x50003400
1,479,848 UART: [idev] ++
1,480,016 UART: [idev] CDI.KEYID = 6
1,480,376 UART: [idev] SUBJECT.KEYID = 7
1,480,800 UART: [idev] UDS.KEYID = 0
1,481,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,724 UART: [idev] Erasing UDS.KEYID = 0
1,505,304 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,818 UART: [idev] --
1,514,863 UART: [ldev] ++
1,515,031 UART: [ldev] CDI.KEYID = 6
1,515,394 UART: [ldev] SUBJECT.KEYID = 5
1,515,820 UART: [ldev] AUTHORITY.KEYID = 7
1,516,283 UART: [ldev] FE.KEYID = 1
1,521,553 UART: [ldev] Erasing FE.KEYID = 1
1,546,702 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,702 UART: [ldev] --
1,586,067 UART: [fwproc] Waiting for Commands...
1,586,866 UART: [fwproc] Received command 0x46574c44
1,587,657 UART: [fwproc] Received Image of size 118548 bytes
1,614,088 UART: ROM Fatal Error: 0x00B0003A
1,615,249 >>> mbox cmd response: failed
1,615,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,255 >>> mbox cmd response: failed
1,615,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,261 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,207 UART: [kat] SHA2-256
882,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,253 UART: [kat] ++
886,405 UART: [kat] sha1
890,729 UART: [kat] SHA2-256
892,667 UART: [kat] SHA2-384
895,598 UART: [kat] SHA2-512-ACC
897,499 UART: [kat] ECC-384
902,752 UART: [kat] HMAC-384Kdf
907,174 UART: [kat] LMS
1,475,370 UART: [kat] --
1,476,223 UART: [cold-reset] ++
1,476,581 UART: [fht] Storing FHT @ 0x50003400
1,479,282 UART: [idev] ++
1,479,450 UART: [idev] CDI.KEYID = 6
1,479,810 UART: [idev] SUBJECT.KEYID = 7
1,480,234 UART: [idev] UDS.KEYID = 0
1,480,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,364 UART: [idev] Erasing UDS.KEYID = 0
1,505,284 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,098 UART: [idev] --
1,514,979 UART: [ldev] ++
1,515,147 UART: [ldev] CDI.KEYID = 6
1,515,510 UART: [ldev] SUBJECT.KEYID = 5
1,515,936 UART: [ldev] AUTHORITY.KEYID = 7
1,516,399 UART: [ldev] FE.KEYID = 1
1,521,687 UART: [ldev] Erasing FE.KEYID = 1
1,547,400 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,244 UART: [ldev] --
1,586,619 UART: [fwproc] Waiting for Commands...
1,587,340 UART: [fwproc] Received command 0x46574c44
1,588,131 UART: [fwproc] Received Image of size 118548 bytes
2,932,696 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,326 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,544 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,805 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,467,608 >>> mbox cmd response: failed
1,467,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,614 >>> mbox cmd response: failed
1,467,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,155 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,424 UART: [kat] SHA2-256
882,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,470 UART: [kat] ++
886,622 UART: [kat] sha1
891,016 UART: [kat] SHA2-256
892,954 UART: [kat] SHA2-384
895,667 UART: [kat] SHA2-512-ACC
897,568 UART: [kat] ECC-384
902,957 UART: [kat] HMAC-384Kdf
907,535 UART: [kat] LMS
1,475,731 UART: [kat] --
1,476,806 UART: [cold-reset] ++
1,477,372 UART: [fht] Storing FHT @ 0x50003400
1,480,217 UART: [idev] ++
1,480,385 UART: [idev] CDI.KEYID = 6
1,480,745 UART: [idev] SUBJECT.KEYID = 7
1,481,169 UART: [idev] UDS.KEYID = 0
1,481,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,087 UART: [idev] Erasing UDS.KEYID = 0
1,505,823 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,443 UART: [idev] --
1,515,406 UART: [ldev] ++
1,515,574 UART: [ldev] CDI.KEYID = 6
1,515,937 UART: [ldev] SUBJECT.KEYID = 5
1,516,363 UART: [ldev] AUTHORITY.KEYID = 7
1,516,826 UART: [ldev] FE.KEYID = 1
1,522,032 UART: [ldev] Erasing FE.KEYID = 1
1,546,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,575 UART: [ldev] --
1,586,066 UART: [fwproc] Waiting for Commands...
1,586,841 UART: [fwproc] Received command 0x46574c44
1,587,632 UART: [fwproc] Received Image of size 118548 bytes
1,614,209 UART: ROM Fatal Error: 0x00B0003A
1,615,370 >>> mbox cmd response: failed
1,615,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,376 >>> mbox cmd response: failed
1,615,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,438 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,970 UART: [kat] SHA2-256
881,901 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,016 UART: [kat] ++
886,168 UART: [kat] sha1
890,358 UART: [kat] SHA2-256
892,296 UART: [kat] SHA2-384
894,885 UART: [kat] SHA2-512-ACC
896,786 UART: [kat] ECC-384
902,507 UART: [kat] HMAC-384Kdf
907,355 UART: [kat] LMS
1,475,551 UART: [kat] --
1,476,422 UART: [cold-reset] ++
1,476,930 UART: [fht] Storing FHT @ 0x50003400
1,479,719 UART: [idev] ++
1,479,887 UART: [idev] CDI.KEYID = 6
1,480,247 UART: [idev] SUBJECT.KEYID = 7
1,480,671 UART: [idev] UDS.KEYID = 0
1,481,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,223 UART: [idev] Erasing UDS.KEYID = 0
1,504,779 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,557 UART: [idev] --
1,514,730 UART: [ldev] ++
1,514,898 UART: [ldev] CDI.KEYID = 6
1,515,261 UART: [ldev] SUBJECT.KEYID = 5
1,515,687 UART: [ldev] AUTHORITY.KEYID = 7
1,516,150 UART: [ldev] FE.KEYID = 1
1,521,200 UART: [ldev] Erasing FE.KEYID = 1
1,546,923 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,881 UART: [ldev] --
1,586,316 UART: [fwproc] Waiting for Commands...
1,586,973 UART: [fwproc] Received command 0x46574c44
1,587,764 UART: [fwproc] Received Image of size 118548 bytes
2,932,977 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,525 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,743 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,156 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,467,963 >>> mbox cmd response: failed
1,467,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,969 >>> mbox cmd response: failed
1,467,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,846 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [kat] SHA2-256
891,046 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,150 UART: [kat] ++
895,302 UART: [kat] sha1
899,666 UART: [kat] SHA2-256
901,606 UART: [kat] SHA2-384
904,295 UART: [kat] SHA2-512-ACC
906,196 UART: [kat] ECC-384
915,979 UART: [kat] HMAC-384Kdf
920,557 UART: [kat] LMS
1,168,869 UART: [kat] --
1,169,724 UART: [cold-reset] ++
1,170,288 UART: [fht] FHT @ 0x50003400
1,173,078 UART: [idev] ++
1,173,246 UART: [idev] CDI.KEYID = 6
1,173,607 UART: [idev] SUBJECT.KEYID = 7
1,174,032 UART: [idev] UDS.KEYID = 0
1,174,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,193 UART: [idev] Erasing UDS.KEYID = 0
1,198,645 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,834 UART: [ldev] ++
1,209,002 UART: [ldev] CDI.KEYID = 6
1,209,366 UART: [ldev] SUBJECT.KEYID = 5
1,209,793 UART: [ldev] AUTHORITY.KEYID = 7
1,210,256 UART: [ldev] FE.KEYID = 1
1,215,364 UART: [ldev] Erasing FE.KEYID = 1
1,241,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,210 UART: [ldev] --
1,280,447 UART: [fwproc] Wait for Commands...
1,281,190 UART: [fwproc] Recv command 0x46574c44
1,281,923 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,617 UART: ROM Fatal Error: 0x00B0003A
1,308,778 >>> mbox cmd response: failed
1,308,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,784 >>> mbox cmd response: failed
1,308,784 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,790 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
891,048 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,152 UART: [kat] ++
895,304 UART: [kat] sha1
899,566 UART: [kat] SHA2-256
901,506 UART: [kat] SHA2-384
904,307 UART: [kat] SHA2-512-ACC
906,208 UART: [kat] ECC-384
915,731 UART: [kat] HMAC-384Kdf
920,305 UART: [kat] LMS
1,168,617 UART: [kat] --
1,169,600 UART: [cold-reset] ++
1,170,016 UART: [fht] FHT @ 0x50003400
1,172,700 UART: [idev] ++
1,172,868 UART: [idev] CDI.KEYID = 6
1,173,229 UART: [idev] SUBJECT.KEYID = 7
1,173,654 UART: [idev] UDS.KEYID = 0
1,174,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,739 UART: [idev] Erasing UDS.KEYID = 0
1,198,421 UART: [idev] Sha1 KeyId Algorithm
1,207,467 UART: [idev] --
1,208,584 UART: [ldev] ++
1,208,752 UART: [ldev] CDI.KEYID = 6
1,209,116 UART: [ldev] SUBJECT.KEYID = 5
1,209,543 UART: [ldev] AUTHORITY.KEYID = 7
1,210,006 UART: [ldev] FE.KEYID = 1
1,215,060 UART: [ldev] Erasing FE.KEYID = 1
1,241,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,596 UART: [ldev] --
1,280,981 UART: [fwproc] Wait for Commands...
1,281,704 UART: [fwproc] Recv command 0x46574c44
1,282,437 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,942 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,117 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,516 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,961 >>> mbox cmd response: failed
1,165,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,967 >>> mbox cmd response: failed
1,165,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,973 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,915 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,292 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
891,165 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,304 UART: [kat] SHA2-512-ACC
906,205 UART: [kat] ECC-384
916,210 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,170,303 UART: [cold-reset] ++
1,170,705 UART: [fht] FHT @ 0x50003400
1,173,341 UART: [idev] ++
1,173,509 UART: [idev] CDI.KEYID = 6
1,173,870 UART: [idev] SUBJECT.KEYID = 7
1,174,295 UART: [idev] UDS.KEYID = 0
1,174,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,566 UART: [idev] Erasing UDS.KEYID = 0
1,200,144 UART: [idev] Sha1 KeyId Algorithm
1,209,012 UART: [idev] --
1,210,129 UART: [ldev] ++
1,210,297 UART: [ldev] CDI.KEYID = 6
1,210,661 UART: [ldev] SUBJECT.KEYID = 5
1,211,088 UART: [ldev] AUTHORITY.KEYID = 7
1,211,551 UART: [ldev] FE.KEYID = 1
1,217,041 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,939 UART: [ldev] --
1,282,294 UART: [fwproc] Wait for Commands...
1,282,923 UART: [fwproc] Recv command 0x46574c44
1,283,656 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,706 UART: ROM Fatal Error: 0x00B0003A
1,309,867 >>> mbox cmd response: failed
1,309,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,873 >>> mbox cmd response: failed
1,309,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,879 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
891,727 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,831 UART: [kat] ++
895,983 UART: [kat] sha1
900,295 UART: [kat] SHA2-256
902,235 UART: [kat] SHA2-384
905,080 UART: [kat] SHA2-512-ACC
906,981 UART: [kat] ECC-384
917,084 UART: [kat] HMAC-384Kdf
921,524 UART: [kat] LMS
1,169,836 UART: [kat] --
1,170,843 UART: [cold-reset] ++
1,171,323 UART: [fht] FHT @ 0x50003400
1,173,937 UART: [idev] ++
1,174,105 UART: [idev] CDI.KEYID = 6
1,174,466 UART: [idev] SUBJECT.KEYID = 7
1,174,891 UART: [idev] UDS.KEYID = 0
1,175,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,470 UART: [idev] Erasing UDS.KEYID = 0
1,200,176 UART: [idev] Sha1 KeyId Algorithm
1,208,974 UART: [idev] --
1,210,021 UART: [ldev] ++
1,210,189 UART: [ldev] CDI.KEYID = 6
1,210,553 UART: [ldev] SUBJECT.KEYID = 5
1,210,980 UART: [ldev] AUTHORITY.KEYID = 7
1,211,443 UART: [ldev] FE.KEYID = 1
1,216,583 UART: [ldev] Erasing FE.KEYID = 1
1,242,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,699 UART: [ldev] --
1,282,118 UART: [fwproc] Wait for Commands...
1,282,825 UART: [fwproc] Recv command 0x46574c44
1,283,558 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,037 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,212 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,509 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,167,434 >>> mbox cmd response: failed
1,167,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,440 >>> mbox cmd response: failed
1,167,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,340 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
893,202 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,327 UART: [kat] ++
897,479 UART: [kat] sha1
901,733 UART: [kat] SHA2-256
903,673 UART: [kat] SHA2-384
906,516 UART: [kat] SHA2-512-ACC
908,417 UART: [kat] ECC-384
918,084 UART: [kat] HMAC-384Kdf
922,672 UART: [kat] LMS
1,171,000 UART: [kat] --
1,172,095 UART: [cold-reset] ++
1,172,623 UART: [fht] FHT @ 0x50003400
1,175,102 UART: [idev] ++
1,175,270 UART: [idev] CDI.KEYID = 6
1,175,630 UART: [idev] SUBJECT.KEYID = 7
1,176,054 UART: [idev] UDS.KEYID = 0
1,176,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,230 UART: [idev] Erasing UDS.KEYID = 0
1,201,669 UART: [idev] Sha1 KeyId Algorithm
1,210,119 UART: [idev] --
1,211,269 UART: [ldev] ++
1,211,437 UART: [ldev] CDI.KEYID = 6
1,211,800 UART: [ldev] SUBJECT.KEYID = 5
1,212,226 UART: [ldev] AUTHORITY.KEYID = 7
1,212,689 UART: [ldev] FE.KEYID = 1
1,217,659 UART: [ldev] Erasing FE.KEYID = 1
1,243,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,793 UART: [ldev] --
1,283,152 UART: [fwproc] Wait for Commands...
1,283,902 UART: [fwproc] Recv command 0x46574c44
1,284,630 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,879 UART: ROM Fatal Error: 0x00B0003A
1,312,040 >>> mbox cmd response: failed
1,312,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,046 >>> mbox cmd response: failed
1,312,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,052 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
893,608 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,733 UART: [kat] ++
897,885 UART: [kat] sha1
902,091 UART: [kat] SHA2-256
904,031 UART: [kat] SHA2-384
906,860 UART: [kat] SHA2-512-ACC
908,761 UART: [kat] ECC-384
918,368 UART: [kat] HMAC-384Kdf
922,740 UART: [kat] LMS
1,171,068 UART: [kat] --
1,171,963 UART: [cold-reset] ++
1,172,299 UART: [fht] FHT @ 0x50003400
1,175,122 UART: [idev] ++
1,175,290 UART: [idev] CDI.KEYID = 6
1,175,650 UART: [idev] SUBJECT.KEYID = 7
1,176,074 UART: [idev] UDS.KEYID = 0
1,176,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,214 UART: [idev] Erasing UDS.KEYID = 0
1,201,075 UART: [idev] Sha1 KeyId Algorithm
1,209,377 UART: [idev] --
1,210,277 UART: [ldev] ++
1,210,445 UART: [ldev] CDI.KEYID = 6
1,210,808 UART: [ldev] SUBJECT.KEYID = 5
1,211,234 UART: [ldev] AUTHORITY.KEYID = 7
1,211,697 UART: [ldev] FE.KEYID = 1
1,216,865 UART: [ldev] Erasing FE.KEYID = 1
1,242,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,841 UART: [ldev] --
1,282,162 UART: [fwproc] Wait for Commands...
1,282,978 UART: [fwproc] Recv command 0x46574c44
1,283,706 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,341 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,511 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,864 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,693 >>> mbox cmd response: failed
1,165,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,699 >>> mbox cmd response: failed
1,165,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,591 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
893,515 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,640 UART: [kat] ++
897,792 UART: [kat] sha1
902,138 UART: [kat] SHA2-256
904,078 UART: [kat] SHA2-384
906,845 UART: [kat] SHA2-512-ACC
908,746 UART: [kat] ECC-384
918,531 UART: [kat] HMAC-384Kdf
923,313 UART: [kat] LMS
1,171,641 UART: [kat] --
1,172,900 UART: [cold-reset] ++
1,173,374 UART: [fht] FHT @ 0x50003400
1,175,929 UART: [idev] ++
1,176,097 UART: [idev] CDI.KEYID = 6
1,176,457 UART: [idev] SUBJECT.KEYID = 7
1,176,881 UART: [idev] UDS.KEYID = 0
1,177,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,007 UART: [idev] Erasing UDS.KEYID = 0
1,202,218 UART: [idev] Sha1 KeyId Algorithm
1,210,892 UART: [idev] --
1,211,900 UART: [ldev] ++
1,212,068 UART: [ldev] CDI.KEYID = 6
1,212,431 UART: [ldev] SUBJECT.KEYID = 5
1,212,857 UART: [ldev] AUTHORITY.KEYID = 7
1,213,320 UART: [ldev] FE.KEYID = 1
1,218,304 UART: [ldev] Erasing FE.KEYID = 1
1,244,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,446 UART: [ldev] --
1,282,823 UART: [fwproc] Wait for Commands...
1,283,397 UART: [fwproc] Recv command 0x46574c44
1,284,125 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,526 UART: ROM Fatal Error: 0x00B0003A
1,311,687 >>> mbox cmd response: failed
1,311,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,693 >>> mbox cmd response: failed
1,311,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,699 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
893,309 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,434 UART: [kat] ++
897,586 UART: [kat] sha1
902,034 UART: [kat] SHA2-256
903,974 UART: [kat] SHA2-384
906,749 UART: [kat] SHA2-512-ACC
908,650 UART: [kat] ECC-384
918,345 UART: [kat] HMAC-384Kdf
923,007 UART: [kat] LMS
1,171,335 UART: [kat] --
1,172,340 UART: [cold-reset] ++
1,172,870 UART: [fht] FHT @ 0x50003400
1,175,463 UART: [idev] ++
1,175,631 UART: [idev] CDI.KEYID = 6
1,175,991 UART: [idev] SUBJECT.KEYID = 7
1,176,415 UART: [idev] UDS.KEYID = 0
1,176,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,515 UART: [idev] Erasing UDS.KEYID = 0
1,201,582 UART: [idev] Sha1 KeyId Algorithm
1,210,092 UART: [idev] --
1,211,366 UART: [ldev] ++
1,211,534 UART: [ldev] CDI.KEYID = 6
1,211,897 UART: [ldev] SUBJECT.KEYID = 5
1,212,323 UART: [ldev] AUTHORITY.KEYID = 7
1,212,786 UART: [ldev] FE.KEYID = 1
1,217,976 UART: [ldev] Erasing FE.KEYID = 1
1,244,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,310 UART: [ldev] --
1,283,767 UART: [fwproc] Wait for Commands...
1,284,485 UART: [fwproc] Recv command 0x46574c44
1,285,213 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,975 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,424 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,594 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,741 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,784 >>> mbox cmd response: failed
1,166,784 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,790 >>> mbox cmd response: failed
1,166,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,796 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,384 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,546 UART:
192,895 UART: Running Caliptra ROM ...
194,088 UART:
194,248 UART: [state] CFI Enabled
265,248 UART: [state] LifecycleState = Unprovisioned
267,197 UART: [state] DebugLocked = No
268,962 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,607 UART: [kat] SHA2-256
444,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,823 UART: [kat] ++
455,318 UART: [kat] sha1
465,445 UART: [kat] SHA2-256
468,133 UART: [kat] SHA2-384
472,780 UART: [kat] SHA2-512-ACC
475,181 UART: [kat] ECC-384
2,766,488 UART: [kat] HMAC-384Kdf
2,797,506 UART: [kat] LMS
3,987,795 UART: [kat] --
3,992,621 UART: [cold-reset] ++
3,994,857 UART: [fht] Storing FHT @ 0x50003400
4,007,106 UART: [idev] ++
4,007,698 UART: [idev] CDI.KEYID = 6
4,008,588 UART: [idev] SUBJECT.KEYID = 7
4,009,863 UART: [idev] UDS.KEYID = 0
4,012,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,036 UART: [idev] Erasing UDS.KEYID = 0
7,343,277 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,037 UART: [idev] --
7,368,911 UART: [ldev] ++
7,369,494 UART: [ldev] CDI.KEYID = 6
7,370,514 UART: [ldev] SUBJECT.KEYID = 5
7,371,675 UART: [ldev] AUTHORITY.KEYID = 7
7,372,964 UART: [ldev] FE.KEYID = 1
7,421,319 UART: [ldev] Erasing FE.KEYID = 1
10,751,773 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,737 UART: [ldev] --
13,110,595 UART: [fwproc] Waiting for Commands...
13,113,441 UART: [fwproc] Received command 0x46574c44
13,115,645 UART: [fwproc] Received Image of size 118548 bytes
16,722,452 UART: ROM Fatal Error: 0x000B0033
16,725,857 >>> mbox cmd response: failed
16,726,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,726,636 >>> mbox cmd response: failed
16,726,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,727,209 >>> mbox cmd response: failed
Initializing fuses
2,060,212 writing to cptra_bootfsm_go
2,249,614 UART:
2,249,963 UART: Running Caliptra ROM ...
2,251,012 UART:
2,251,185 UART: [state] CFI Enabled
2,326,515 UART: [state] LifecycleState = Unprovisioned
2,328,454 UART: [state] DebugLocked = No
2,330,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,334,273 UART: [kat] SHA2-256
2,503,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,514,444 UART: [kat] ++
2,514,904 UART: [kat] sha1
2,526,442 UART: [kat] SHA2-256
2,529,137 UART: [kat] SHA2-384
2,535,940 UART: [kat] SHA2-512-ACC
2,538,292 UART: [kat] ECC-384
4,830,190 UART: [kat] HMAC-384Kdf
4,846,837 UART: [kat] LMS
6,037,180 UART: [kat] --
6,042,207 UART: [cold-reset] ++
6,043,127 UART: [fht] Storing FHT @ 0x50003400
6,054,536 UART: [idev] ++
6,055,108 UART: [idev] CDI.KEYID = 6
6,056,051 UART: [idev] SUBJECT.KEYID = 7
6,057,275 UART: [idev] UDS.KEYID = 0
6,060,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,209,657 UART: [idev] Erasing UDS.KEYID = 0
9,398,660 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,365 UART: [idev] --
9,424,964 UART: [ldev] ++
9,425,574 UART: [ldev] CDI.KEYID = 6
9,426,498 UART: [ldev] SUBJECT.KEYID = 5
9,427,802 UART: [ldev] AUTHORITY.KEYID = 7
9,428,993 UART: [ldev] FE.KEYID = 1
9,471,026 UART: [ldev] Erasing FE.KEYID = 1
12,802,178 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,097,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,112,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,127,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,141,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,160,079 UART: [ldev] --
15,165,565 UART: [fwproc] Waiting for Commands...
15,167,561 UART: [fwproc] Received command 0x46574c44
15,169,756 UART: [fwproc] Received Image of size 118548 bytes
19,276,329 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,356,356 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,429,548 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,757,320 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,808,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,242,631 >>> mbox cmd response: failed
16,243,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,243,768 >>> mbox cmd response: failed
16,244,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,244,339 >>> mbox cmd response: failed
Initializing fuses
2,055,882 writing to cptra_bootfsm_go
5,823,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,956,340 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,509 UART:
192,883 UART: Running Caliptra ROM ...
194,022 UART:
603,810 UART: [state] CFI Enabled
618,299 UART: [state] LifecycleState = Unprovisioned
620,193 UART: [state] DebugLocked = No
622,286 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,469 UART: [kat] SHA2-256
796,215 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,902 UART: [kat] ++
807,381 UART: [kat] sha1
818,337 UART: [kat] SHA2-256
821,042 UART: [kat] SHA2-384
827,037 UART: [kat] SHA2-512-ACC
829,386 UART: [kat] ECC-384
3,113,843 UART: [kat] HMAC-384Kdf
3,126,679 UART: [kat] LMS
4,316,755 UART: [kat] --
4,320,698 UART: [cold-reset] ++
4,322,042 UART: [fht] Storing FHT @ 0x50003400
4,333,592 UART: [idev] ++
4,334,210 UART: [idev] CDI.KEYID = 6
4,335,132 UART: [idev] SUBJECT.KEYID = 7
4,336,363 UART: [idev] UDS.KEYID = 0
4,339,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,363 UART: [idev] Erasing UDS.KEYID = 0
7,619,570 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,456 UART: [idev] --
7,645,522 UART: [ldev] ++
7,646,105 UART: [ldev] CDI.KEYID = 6
7,647,076 UART: [ldev] SUBJECT.KEYID = 5
7,648,302 UART: [ldev] AUTHORITY.KEYID = 7
7,649,546 UART: [ldev] FE.KEYID = 1
7,662,141 UART: [ldev] Erasing FE.KEYID = 1
10,948,108 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,602 UART: [ldev] --
13,312,212 UART: [fwproc] Waiting for Commands...
13,314,155 UART: [fwproc] Received command 0x46574c44
13,316,344 UART: [fwproc] Received Image of size 118548 bytes
17,406,612 UART: ROM Fatal Error: 0x000B0033
17,410,041 >>> mbox cmd response: failed
17,410,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,410,848 >>> mbox cmd response: failed
17,411,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,411,421 >>> mbox cmd response: failed
Initializing fuses
2,060,617 writing to cptra_bootfsm_go
2,249,957 UART:
2,250,335 UART: Running Caliptra ROM ...
2,251,433 UART:
3,057,281 UART: [state] CFI Enabled
3,072,068 UART: [state] LifecycleState = Unprovisioned
3,074,011 UART: [state] DebugLocked = No
3,075,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,081,244 UART: [kat] SHA2-256
3,250,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,261,555 UART: [kat] ++
3,262,020 UART: [kat] sha1
3,273,565 UART: [kat] SHA2-256
3,276,260 UART: [kat] SHA2-384
3,282,145 UART: [kat] SHA2-512-ACC
3,284,499 UART: [kat] ECC-384
5,567,456 UART: [kat] HMAC-384Kdf
5,578,985 UART: [kat] LMS
6,769,117 UART: [kat] --
6,772,644 UART: [cold-reset] ++
6,775,183 UART: [fht] Storing FHT @ 0x50003400
6,787,586 UART: [idev] ++
6,788,180 UART: [idev] CDI.KEYID = 6
6,789,070 UART: [idev] SUBJECT.KEYID = 7
6,790,348 UART: [idev] UDS.KEYID = 0
6,792,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,941,528 UART: [idev] Erasing UDS.KEYID = 0
10,075,648 UART: [idev] Using Sha1 for KeyId Algorithm
10,098,443 UART: [idev] --
10,102,498 UART: [ldev] ++
10,103,070 UART: [ldev] CDI.KEYID = 6
10,104,016 UART: [ldev] SUBJECT.KEYID = 5
10,105,275 UART: [ldev] AUTHORITY.KEYID = 7
10,106,438 UART: [ldev] FE.KEYID = 1
10,117,719 UART: [ldev] Erasing FE.KEYID = 1
13,410,919 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,706,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,721,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,736,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,750,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,769,716 UART: [ldev] --
15,773,741 UART: [fwproc] Waiting for Commands...
15,776,600 UART: [fwproc] Received command 0x46574c44
15,778,794 UART: [fwproc] Received Image of size 118548 bytes
19,886,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,965,495 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,038,676 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,366,798 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,132,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,228,097 >>> mbox cmd response: failed
16,228,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,229,181 >>> mbox cmd response: failed
16,229,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,229,754 >>> mbox cmd response: failed
Initializing fuses
2,054,879 writing to cptra_bootfsm_go
7,770,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,801,869 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
192,306 UART:
192,677 UART: Running Caliptra ROM ...
193,797 UART:
193,943 UART: [state] CFI Enabled
263,044 UART: [state] LifecycleState = Unprovisioned
265,006 UART: [state] DebugLocked = No
267,883 UART: [state] WD Timer not started. Device not locked for debugging
271,510 UART: [kat] SHA2-256
451,108 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,900 UART: [kat] ++
462,358 UART: [kat] sha1
472,047 UART: [kat] SHA2-256
474,744 UART: [kat] SHA2-384
480,491 UART: [kat] SHA2-512-ACC
482,834 UART: [kat] ECC-384
2,949,006 UART: [kat] HMAC-384Kdf
2,970,545 UART: [kat] LMS
3,447,039 UART: [kat] --
3,452,399 UART: [cold-reset] ++
3,454,718 UART: [fht] FHT @ 0x50003400
3,465,919 UART: [idev] ++
3,466,485 UART: [idev] CDI.KEYID = 6
3,467,507 UART: [idev] SUBJECT.KEYID = 7
3,468,728 UART: [idev] UDS.KEYID = 0
3,471,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,001 UART: [idev] Erasing UDS.KEYID = 0
5,987,330 UART: [idev] Sha1 KeyId Algorithm
6,011,622 UART: [idev] --
6,017,162 UART: [ldev] ++
6,017,745 UART: [ldev] CDI.KEYID = 6
6,018,663 UART: [ldev] SUBJECT.KEYID = 5
6,019,828 UART: [ldev] AUTHORITY.KEYID = 7
6,021,124 UART: [ldev] FE.KEYID = 1
6,055,073 UART: [ldev] Erasing FE.KEYID = 1
8,561,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,247 UART: [ldev] --
10,372,621 UART: [fwproc] Wait for Commands...
10,375,695 UART: [fwproc] Recv command 0x46574c44
10,377,685 UART: [fwproc] Recv'd Img size: 118548 bytes
11,988,827 UART: ROM Fatal Error: 0x000B0033
11,992,063 >>> mbox cmd response: failed
11,992,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,992,825 >>> mbox cmd response: failed
11,993,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,993,404 >>> mbox cmd response: failed
Initializing fuses
2,055,506 writing to cptra_bootfsm_go
2,244,844 UART:
2,245,199 UART: Running Caliptra ROM ...
2,246,253 UART:
2,246,421 UART: [state] CFI Enabled
2,302,781 UART: [state] LifecycleState = Unprovisioned
2,304,685 UART: [state] DebugLocked = No
2,307,693 UART: [state] WD Timer not started. Device not locked for debugging
2,310,686 UART: [kat] SHA2-256
2,490,291 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,501,073 UART: [kat] ++
2,501,544 UART: [kat] sha1
2,512,453 UART: [kat] SHA2-256
2,515,158 UART: [kat] SHA2-384
2,521,528 UART: [kat] SHA2-512-ACC
2,523,937 UART: [kat] ECC-384
4,966,474 UART: [kat] HMAC-384Kdf
4,991,142 UART: [kat] LMS
5,467,636 UART: [kat] --
5,473,902 UART: [cold-reset] ++
5,475,674 UART: [fht] FHT @ 0x50003400
5,487,251 UART: [idev] ++
5,487,831 UART: [idev] CDI.KEYID = 6
5,488,716 UART: [idev] SUBJECT.KEYID = 7
5,489,994 UART: [idev] UDS.KEYID = 0
5,492,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,641,920 UART: [idev] Erasing UDS.KEYID = 0
8,006,836 UART: [idev] Sha1 KeyId Algorithm
8,030,477 UART: [idev] --
8,035,132 UART: [ldev] ++
8,035,709 UART: [ldev] CDI.KEYID = 6
8,036,629 UART: [ldev] SUBJECT.KEYID = 5
8,037,849 UART: [ldev] AUTHORITY.KEYID = 7
8,039,087 UART: [ldev] FE.KEYID = 1
8,077,074 UART: [ldev] Erasing FE.KEYID = 1
10,584,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,319,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,335,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,351,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,367,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,388,520 UART: [ldev] --
12,393,843 UART: [fwproc] Wait for Commands...
12,395,565 UART: [fwproc] Recv command 0x46574c44
12,397,611 UART: [fwproc] Recv'd Img size: 118548 bytes
15,873,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,957,828 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,030,846 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,358,803 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,462,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,936,106 >>> mbox cmd response: failed
11,936,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,937,012 >>> mbox cmd response: failed
11,937,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,937,604 >>> mbox cmd response: failed
Initializing fuses
2,055,828 writing to cptra_bootfsm_go
5,515,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,255,800 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
192,690 UART:
193,048 UART: Running Caliptra ROM ...
194,181 UART:
603,873 UART: [state] CFI Enabled
620,145 UART: [state] LifecycleState = Unprovisioned
622,060 UART: [state] DebugLocked = No
623,904 UART: [state] WD Timer not started. Device not locked for debugging
628,013 UART: [kat] SHA2-256
807,689 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,464 UART: [kat] ++
818,916 UART: [kat] sha1
829,417 UART: [kat] SHA2-256
832,119 UART: [kat] SHA2-384
838,219 UART: [kat] SHA2-512-ACC
840,605 UART: [kat] ECC-384
3,282,925 UART: [kat] HMAC-384Kdf
3,296,141 UART: [kat] LMS
3,772,669 UART: [kat] --
3,776,286 UART: [cold-reset] ++
3,777,686 UART: [fht] FHT @ 0x50003400
3,789,429 UART: [idev] ++
3,790,001 UART: [idev] CDI.KEYID = 6
3,791,029 UART: [idev] SUBJECT.KEYID = 7
3,792,201 UART: [idev] UDS.KEYID = 0
3,795,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,182 UART: [idev] Erasing UDS.KEYID = 0
6,270,711 UART: [idev] Sha1 KeyId Algorithm
6,293,471 UART: [idev] --
6,298,870 UART: [ldev] ++
6,299,457 UART: [ldev] CDI.KEYID = 6
6,300,372 UART: [ldev] SUBJECT.KEYID = 5
6,301,537 UART: [ldev] AUTHORITY.KEYID = 7
6,302,826 UART: [ldev] FE.KEYID = 1
6,310,838 UART: [ldev] Erasing FE.KEYID = 1
8,789,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,008 UART: [ldev] --
10,582,226 UART: [fwproc] Wait for Commands...
10,584,435 UART: [fwproc] Recv command 0x46574c44
10,586,430 UART: [fwproc] Recv'd Img size: 118548 bytes
12,214,063 UART: ROM Fatal Error: 0x000B0033
12,217,331 >>> mbox cmd response: failed
12,217,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,218,078 >>> mbox cmd response: failed
12,218,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,218,648 >>> mbox cmd response: failed
Initializing fuses
2,062,279 writing to cptra_bootfsm_go
2,251,602 UART:
2,251,947 UART: Running Caliptra ROM ...
2,253,094 UART:
8,234,511 UART: [state] CFI Enabled
8,249,707 UART: [state] LifecycleState = Unprovisioned
8,251,629 UART: [state] DebugLocked = No
8,253,430 UART: [state] WD Timer not started. Device not locked for debugging
8,256,913 UART: [kat] SHA2-256
8,436,537 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,447,345 UART: [kat] ++
8,447,810 UART: [kat] sha1
8,459,397 UART: [kat] SHA2-256
8,462,085 UART: [kat] SHA2-384
8,468,254 UART: [kat] SHA2-512-ACC
8,470,619 UART: [kat] ECC-384
10,912,421 UART: [kat] HMAC-384Kdf
10,924,542 UART: [kat] LMS
11,401,032 UART: [kat] --
11,407,128 UART: [cold-reset] ++
11,409,220 UART: [fht] FHT @ 0x50003400
11,419,830 UART: [idev] ++
11,420,439 UART: [idev] CDI.KEYID = 6
11,421,379 UART: [idev] SUBJECT.KEYID = 7
11,422,603 UART: [idev] UDS.KEYID = 0
11,425,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,574,650 UART: [idev] Erasing UDS.KEYID = 0
13,894,129 UART: [idev] Sha1 KeyId Algorithm
13,917,725 UART: [idev] --
13,923,163 UART: [ldev] ++
13,923,768 UART: [ldev] CDI.KEYID = 6
13,924,662 UART: [ldev] SUBJECT.KEYID = 5
13,925,877 UART: [ldev] AUTHORITY.KEYID = 7
13,927,119 UART: [ldev] FE.KEYID = 1
13,939,302 UART: [ldev] Erasing FE.KEYID = 1
16,415,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,134,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,150,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,166,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,182,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,203,347 UART: [ldev] --
18,209,479 UART: [fwproc] Wait for Commands...
18,212,289 UART: [fwproc] Recv command 0x46574c44
18,214,334 UART: [fwproc] Recv'd Img size: 118548 bytes
21,697,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,775,950 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,848,962 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,178,038 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,443 writing to cptra_bootfsm_go
3,786,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,136,513 >>> mbox cmd response: failed
12,137,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,137,444 >>> mbox cmd response: failed
12,137,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,138,008 >>> mbox cmd response: failed
Initializing fuses
2,054,477 writing to cptra_bootfsm_go
11,501,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,177,942 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
192,139 UART:
192,502 UART: Running Caliptra ROM ...
193,583 UART:
193,727 UART: [state] CFI Enabled
263,645 UART: [state] LifecycleState = Unprovisioned
266,073 UART: [state] DebugLocked = No
267,215 UART: [state] WD Timer not started. Device not locked for debugging
270,079 UART: [kat] SHA2-256
459,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,713 UART: [kat] ++
471,165 UART: [kat] sha1
483,617 UART: [kat] SHA2-256
486,639 UART: [kat] SHA2-384
492,573 UART: [kat] SHA2-512-ACC
495,151 UART: [kat] ECC-384
2,947,005 UART: [kat] HMAC-384Kdf
2,971,131 UART: [kat] LMS
3,502,906 UART: [kat] --
3,506,737 UART: [cold-reset] ++
3,508,995 UART: [fht] FHT @ 0x50003400
3,521,600 UART: [idev] ++
3,522,335 UART: [idev] CDI.KEYID = 6
3,523,222 UART: [idev] SUBJECT.KEYID = 7
3,524,496 UART: [idev] UDS.KEYID = 0
3,527,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,955 UART: [idev] Erasing UDS.KEYID = 0
6,029,459 UART: [idev] Sha1 KeyId Algorithm
6,051,467 UART: [idev] --
6,055,097 UART: [ldev] ++
6,055,788 UART: [ldev] CDI.KEYID = 6
6,056,708 UART: [ldev] SUBJECT.KEYID = 5
6,057,876 UART: [ldev] AUTHORITY.KEYID = 7
6,059,137 UART: [ldev] FE.KEYID = 1
6,100,747 UART: [ldev] Erasing FE.KEYID = 1
8,606,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,949 UART: [ldev] --
10,413,755 UART: [fwproc] Wait for Commands...
10,416,676 UART: [fwproc] Recv command 0x46574c44
10,418,944 UART: [fwproc] Recv'd Img size: 118548 bytes
12,108,079 UART: ROM Fatal Error: 0x000B0033
12,111,534 >>> mbox cmd response: failed
12,111,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,112,330 >>> mbox cmd response: failed
12,112,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,112,919 >>> mbox cmd response: failed
Initializing fuses
2,056,715 writing to cptra_bootfsm_go
2,246,035 UART:
2,246,389 UART: Running Caliptra ROM ...
2,247,531 UART:
2,247,705 UART: [state] CFI Enabled
2,317,027 UART: [state] LifecycleState = Unprovisioned
2,319,404 UART: [state] DebugLocked = No
2,321,567 UART: [state] WD Timer not started. Device not locked for debugging
2,325,940 UART: [kat] SHA2-256
2,515,855 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,526,600 UART: [kat] ++
2,527,117 UART: [kat] sha1
2,537,794 UART: [kat] SHA2-256
2,540,801 UART: [kat] SHA2-384
2,547,945 UART: [kat] SHA2-512-ACC
2,550,534 UART: [kat] ECC-384
5,013,666 UART: [kat] HMAC-384Kdf
5,036,603 UART: [kat] LMS
5,568,406 UART: [kat] --
5,573,223 UART: [cold-reset] ++
5,575,358 UART: [fht] FHT @ 0x50003400
5,588,622 UART: [idev] ++
5,589,315 UART: [idev] CDI.KEYID = 6
5,590,283 UART: [idev] SUBJECT.KEYID = 7
5,591,446 UART: [idev] UDS.KEYID = 0
5,593,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,743,042 UART: [idev] Erasing UDS.KEYID = 0
8,095,188 UART: [idev] Sha1 KeyId Algorithm
8,117,397 UART: [idev] --
8,121,506 UART: [ldev] ++
8,122,186 UART: [ldev] CDI.KEYID = 6
8,123,093 UART: [ldev] SUBJECT.KEYID = 5
8,124,197 UART: [ldev] AUTHORITY.KEYID = 7
8,125,485 UART: [ldev] FE.KEYID = 1
8,166,551 UART: [ldev] Erasing FE.KEYID = 1
10,670,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,408,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,423,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,439,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,454,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,475,001 UART: [ldev] --
12,480,389 UART: [fwproc] Wait for Commands...
12,482,814 UART: [fwproc] Recv command 0x46574c44
12,485,101 UART: [fwproc] Recv'd Img size: 118548 bytes
15,984,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,060,828 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,184,457 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,744,956 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,441,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,875,769 >>> mbox cmd response: failed
11,876,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,876,669 >>> mbox cmd response: failed
11,877,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,877,305 >>> mbox cmd response: failed
Initializing fuses
2,048,838 writing to cptra_bootfsm_go
5,470,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,864,886 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,549 UART:
192,910 UART: Running Caliptra ROM ...
194,108 UART:
603,734 UART: [state] CFI Enabled
618,787 UART: [state] LifecycleState = Unprovisioned
621,222 UART: [state] DebugLocked = No
624,145 UART: [state] WD Timer not started. Device not locked for debugging
628,435 UART: [kat] SHA2-256
818,362 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,111 UART: [kat] ++
829,624 UART: [kat] sha1
841,915 UART: [kat] SHA2-256
844,935 UART: [kat] SHA2-384
850,745 UART: [kat] SHA2-512-ACC
853,363 UART: [kat] ECC-384
3,296,116 UART: [kat] HMAC-384Kdf
3,309,275 UART: [kat] LMS
3,841,061 UART: [kat] --
3,846,788 UART: [cold-reset] ++
3,849,423 UART: [fht] FHT @ 0x50003400
3,860,907 UART: [idev] ++
3,861,594 UART: [idev] CDI.KEYID = 6
3,862,565 UART: [idev] SUBJECT.KEYID = 7
3,863,780 UART: [idev] UDS.KEYID = 0
3,867,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,016,677 UART: [idev] Erasing UDS.KEYID = 0
6,341,110 UART: [idev] Sha1 KeyId Algorithm
6,365,080 UART: [idev] --
6,370,000 UART: [ldev] ++
6,370,850 UART: [ldev] CDI.KEYID = 6
6,371,778 UART: [ldev] SUBJECT.KEYID = 5
6,372,895 UART: [ldev] AUTHORITY.KEYID = 7
6,374,087 UART: [ldev] FE.KEYID = 1
6,386,498 UART: [ldev] Erasing FE.KEYID = 1
8,866,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,587,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,691 UART: [ldev] --
10,658,909 UART: [fwproc] Wait for Commands...
10,661,392 UART: [fwproc] Recv command 0x46574c44
10,663,659 UART: [fwproc] Recv'd Img size: 118548 bytes
12,358,176 UART: ROM Fatal Error: 0x000B0033
12,361,562 >>> mbox cmd response: failed
12,362,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,362,452 >>> mbox cmd response: failed
12,362,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,363,068 >>> mbox cmd response: failed
Initializing fuses
2,063,135 writing to cptra_bootfsm_go
2,252,530 UART:
2,252,873 UART: Running Caliptra ROM ...
2,254,011 UART:
8,093,873 UART: [state] CFI Enabled
8,107,401 UART: [state] LifecycleState = Unprovisioned
8,109,756 UART: [state] DebugLocked = No
8,111,238 UART: [state] WD Timer not started. Device not locked for debugging
8,115,829 UART: [kat] SHA2-256
8,305,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,316,495 UART: [kat] ++
8,317,015 UART: [kat] sha1
8,328,519 UART: [kat] SHA2-256
8,331,535 UART: [kat] SHA2-384
8,336,409 UART: [kat] SHA2-512-ACC
8,338,987 UART: [kat] ECC-384
10,779,809 UART: [kat] HMAC-384Kdf
10,792,033 UART: [kat] LMS
11,323,868 UART: [kat] --
11,327,687 UART: [cold-reset] ++
11,328,699 UART: [fht] FHT @ 0x50003400
11,340,384 UART: [idev] ++
11,341,059 UART: [idev] CDI.KEYID = 6
11,342,028 UART: [idev] SUBJECT.KEYID = 7
11,343,265 UART: [idev] UDS.KEYID = 0
11,345,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,494,708 UART: [idev] Erasing UDS.KEYID = 0
13,818,943 UART: [idev] Sha1 KeyId Algorithm
13,841,704 UART: [idev] --
13,847,751 UART: [ldev] ++
13,848,470 UART: [ldev] CDI.KEYID = 6
13,849,369 UART: [ldev] SUBJECT.KEYID = 5
13,850,474 UART: [ldev] AUTHORITY.KEYID = 7
13,851,771 UART: [ldev] FE.KEYID = 1
13,861,427 UART: [ldev] Erasing FE.KEYID = 1
16,338,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,057,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,072,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,087,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,102,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,123,857 UART: [ldev] --
18,129,891 UART: [fwproc] Wait for Commands...
18,131,671 UART: [fwproc] Recv command 0x46574c44
18,133,941 UART: [fwproc] Recv'd Img size: 118548 bytes
21,623,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,697,374 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,821,002 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,381,185 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,756,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,078,645 >>> mbox cmd response: failed
12,079,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,079,629 >>> mbox cmd response: failed
12,079,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,080,207 >>> mbox cmd response: failed
Initializing fuses
2,056,096 writing to cptra_bootfsm_go
11,543,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,830,075 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,139 UART: [kat] SHA2-256
882,070 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,185 UART: [kat] ++
886,337 UART: [kat] sha1
890,349 UART: [kat] SHA2-256
892,287 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,628 UART: [kat] HMAC-384Kdf
907,278 UART: [kat] LMS
1,475,474 UART: [kat] --
1,476,691 UART: [cold-reset] ++
1,477,221 UART: [fht] Storing FHT @ 0x50003400
1,479,892 UART: [idev] ++
1,480,060 UART: [idev] CDI.KEYID = 6
1,480,420 UART: [idev] SUBJECT.KEYID = 7
1,480,844 UART: [idev] UDS.KEYID = 0
1,481,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,146 UART: [idev] Erasing UDS.KEYID = 0
1,505,568 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,220 UART: [idev] --
1,515,267 UART: [ldev] ++
1,515,435 UART: [ldev] CDI.KEYID = 6
1,515,798 UART: [ldev] SUBJECT.KEYID = 5
1,516,224 UART: [ldev] AUTHORITY.KEYID = 7
1,516,687 UART: [ldev] FE.KEYID = 1
1,521,891 UART: [ldev] Erasing FE.KEYID = 1
1,547,482 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,764 UART: [ldev] --
1,587,275 UART: [fwproc] Waiting for Commands...
1,588,140 UART: [fwproc] Received command 0x46574c44
1,588,931 UART: [fwproc] Received Image of size 118548 bytes
2,801,463 UART: ROM Fatal Error: 0x000B0033
2,802,620 >>> mbox cmd response: failed
2,802,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,802,626 >>> mbox cmd response: failed
2,802,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,802,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,233 UART: [kat] SHA2-256
882,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,279 UART: [kat] ++
886,431 UART: [kat] sha1
890,569 UART: [kat] SHA2-256
892,507 UART: [kat] SHA2-384
895,240 UART: [kat] SHA2-512-ACC
897,141 UART: [kat] ECC-384
902,776 UART: [kat] HMAC-384Kdf
907,424 UART: [kat] LMS
1,475,620 UART: [kat] --
1,476,595 UART: [cold-reset] ++
1,477,017 UART: [fht] Storing FHT @ 0x50003400
1,479,858 UART: [idev] ++
1,480,026 UART: [idev] CDI.KEYID = 6
1,480,386 UART: [idev] SUBJECT.KEYID = 7
1,480,810 UART: [idev] UDS.KEYID = 0
1,481,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,036 UART: [idev] Erasing UDS.KEYID = 0
1,505,734 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,604 UART: [idev] --
1,515,593 UART: [ldev] ++
1,515,761 UART: [ldev] CDI.KEYID = 6
1,516,124 UART: [ldev] SUBJECT.KEYID = 5
1,516,550 UART: [ldev] AUTHORITY.KEYID = 7
1,517,013 UART: [ldev] FE.KEYID = 1
1,522,487 UART: [ldev] Erasing FE.KEYID = 1
1,547,690 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,322 UART: [ldev] --
1,586,679 UART: [fwproc] Waiting for Commands...
1,587,532 UART: [fwproc] Received command 0x46574c44
1,588,323 UART: [fwproc] Received Image of size 118548 bytes
2,931,778 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,882 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,507 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,616,750 >>> mbox cmd response: failed
2,616,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,616,756 >>> mbox cmd response: failed
2,616,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,616,762 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,779 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,176 UART: [kat] SHA2-256
882,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,222 UART: [kat] ++
886,374 UART: [kat] sha1
890,478 UART: [kat] SHA2-256
892,416 UART: [kat] SHA2-384
895,277 UART: [kat] SHA2-512-ACC
897,178 UART: [kat] ECC-384
902,627 UART: [kat] HMAC-384Kdf
907,049 UART: [kat] LMS
1,475,245 UART: [kat] --
1,475,934 UART: [cold-reset] ++
1,476,498 UART: [fht] Storing FHT @ 0x50003400
1,479,093 UART: [idev] ++
1,479,261 UART: [idev] CDI.KEYID = 6
1,479,621 UART: [idev] SUBJECT.KEYID = 7
1,480,045 UART: [idev] UDS.KEYID = 0
1,480,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,867 UART: [idev] Erasing UDS.KEYID = 0
1,504,717 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,271 UART: [idev] --
1,514,180 UART: [ldev] ++
1,514,348 UART: [ldev] CDI.KEYID = 6
1,514,711 UART: [ldev] SUBJECT.KEYID = 5
1,515,137 UART: [ldev] AUTHORITY.KEYID = 7
1,515,600 UART: [ldev] FE.KEYID = 1
1,520,892 UART: [ldev] Erasing FE.KEYID = 1
1,546,417 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,535 UART: [ldev] --
1,585,934 UART: [fwproc] Waiting for Commands...
1,586,779 UART: [fwproc] Received command 0x46574c44
1,587,570 UART: [fwproc] Received Image of size 118548 bytes
2,761,709 UART: ROM Fatal Error: 0x000B0033
2,762,866 >>> mbox cmd response: failed
2,762,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,762,872 >>> mbox cmd response: failed
2,762,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,762,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,192 UART: [kat] SHA2-256
882,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,238 UART: [kat] ++
886,390 UART: [kat] sha1
890,844 UART: [kat] SHA2-256
892,782 UART: [kat] SHA2-384
895,499 UART: [kat] SHA2-512-ACC
897,400 UART: [kat] ECC-384
903,033 UART: [kat] HMAC-384Kdf
907,687 UART: [kat] LMS
1,475,883 UART: [kat] --
1,477,040 UART: [cold-reset] ++
1,477,488 UART: [fht] Storing FHT @ 0x50003400
1,480,233 UART: [idev] ++
1,480,401 UART: [idev] CDI.KEYID = 6
1,480,761 UART: [idev] SUBJECT.KEYID = 7
1,481,185 UART: [idev] UDS.KEYID = 0
1,481,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,765 UART: [idev] Erasing UDS.KEYID = 0
1,504,579 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,205 UART: [idev] --
1,514,418 UART: [ldev] ++
1,514,586 UART: [ldev] CDI.KEYID = 6
1,514,949 UART: [ldev] SUBJECT.KEYID = 5
1,515,375 UART: [ldev] AUTHORITY.KEYID = 7
1,515,838 UART: [ldev] FE.KEYID = 1
1,521,192 UART: [ldev] Erasing FE.KEYID = 1
1,546,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,113 UART: [ldev] --
1,585,406 UART: [fwproc] Waiting for Commands...
1,586,241 UART: [fwproc] Received command 0x46574c44
1,587,032 UART: [fwproc] Received Image of size 118548 bytes
2,932,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,019 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,237 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,670 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,655,836 >>> mbox cmd response: failed
2,655,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,842 >>> mbox cmd response: failed
2,655,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,368 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,300 UART: [kat] ++
895,452 UART: [kat] sha1
899,674 UART: [kat] SHA2-256
901,614 UART: [kat] SHA2-384
904,525 UART: [kat] SHA2-512-ACC
906,426 UART: [kat] ECC-384
916,103 UART: [kat] HMAC-384Kdf
920,613 UART: [kat] LMS
1,168,925 UART: [kat] --
1,169,670 UART: [cold-reset] ++
1,170,080 UART: [fht] FHT @ 0x50003400
1,172,724 UART: [idev] ++
1,172,892 UART: [idev] CDI.KEYID = 6
1,173,253 UART: [idev] SUBJECT.KEYID = 7
1,173,678 UART: [idev] UDS.KEYID = 0
1,174,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,659 UART: [idev] Erasing UDS.KEYID = 0
1,198,497 UART: [idev] Sha1 KeyId Algorithm
1,207,391 UART: [idev] --
1,208,418 UART: [ldev] ++
1,208,586 UART: [ldev] CDI.KEYID = 6
1,208,950 UART: [ldev] SUBJECT.KEYID = 5
1,209,377 UART: [ldev] AUTHORITY.KEYID = 7
1,209,840 UART: [ldev] FE.KEYID = 1
1,214,930 UART: [ldev] Erasing FE.KEYID = 1
1,240,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,746 UART: [ldev] --
1,280,103 UART: [fwproc] Wait for Commands...
1,280,680 UART: [fwproc] Recv command 0x46574c44
1,281,413 UART: [fwproc] Recv'd Img size: 118548 bytes
1,579,593 UART: ROM Fatal Error: 0x000B0033
1,580,750 >>> mbox cmd response: failed
1,580,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,580,756 >>> mbox cmd response: failed
1,580,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,580,762 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,686 UART: [state] LifecycleState = Unprovisioned
86,341 UART: [state] DebugLocked = No
86,895 UART: [state] WD Timer not started. Device not locked for debugging
88,056 UART: [kat] SHA2-256
891,606 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
900,082 UART: [kat] SHA2-256
902,022 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,215 UART: [kat] HMAC-384Kdf
920,919 UART: [kat] LMS
1,169,231 UART: [kat] --
1,170,114 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,292 UART: [idev] ++
1,173,460 UART: [idev] CDI.KEYID = 6
1,173,821 UART: [idev] SUBJECT.KEYID = 7
1,174,246 UART: [idev] UDS.KEYID = 0
1,174,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,551 UART: [idev] Erasing UDS.KEYID = 0
1,199,499 UART: [idev] Sha1 KeyId Algorithm
1,208,205 UART: [idev] --
1,209,236 UART: [ldev] ++
1,209,404 UART: [ldev] CDI.KEYID = 6
1,209,768 UART: [ldev] SUBJECT.KEYID = 5
1,210,195 UART: [ldev] AUTHORITY.KEYID = 7
1,210,658 UART: [ldev] FE.KEYID = 1
1,216,336 UART: [ldev] Erasing FE.KEYID = 1
1,242,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,928 UART: [ldev] --
1,282,347 UART: [fwproc] Wait for Commands...
1,283,016 UART: [fwproc] Recv command 0x46574c44
1,283,749 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,546 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,721 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,090 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,446,889 >>> mbox cmd response: failed
1,446,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,446,895 >>> mbox cmd response: failed
1,446,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,446,901 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,701 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
891,411 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
900,033 UART: [kat] SHA2-256
901,973 UART: [kat] SHA2-384
904,746 UART: [kat] SHA2-512-ACC
906,647 UART: [kat] ECC-384
916,452 UART: [kat] HMAC-384Kdf
920,958 UART: [kat] LMS
1,169,270 UART: [kat] --
1,170,031 UART: [cold-reset] ++
1,170,497 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,174,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,066 UART: [idev] Erasing UDS.KEYID = 0
1,198,890 UART: [idev] Sha1 KeyId Algorithm
1,207,838 UART: [idev] --
1,208,777 UART: [ldev] ++
1,208,945 UART: [ldev] CDI.KEYID = 6
1,209,309 UART: [ldev] SUBJECT.KEYID = 5
1,209,736 UART: [ldev] AUTHORITY.KEYID = 7
1,210,199 UART: [ldev] FE.KEYID = 1
1,215,297 UART: [ldev] Erasing FE.KEYID = 1
1,241,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,083 UART: [ldev] --
1,281,496 UART: [fwproc] Wait for Commands...
1,282,247 UART: [fwproc] Recv command 0x46574c44
1,282,980 UART: [fwproc] Recv'd Img size: 118548 bytes
1,585,750 UART: ROM Fatal Error: 0x000B0033
1,586,907 >>> mbox cmd response: failed
1,586,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,586,913 >>> mbox cmd response: failed
1,586,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,586,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,275 UART: [kat] SHA2-256
891,825 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,929 UART: [kat] ++
896,081 UART: [kat] sha1
900,277 UART: [kat] SHA2-256
902,217 UART: [kat] SHA2-384
904,992 UART: [kat] SHA2-512-ACC
906,893 UART: [kat] ECC-384
916,174 UART: [kat] HMAC-384Kdf
920,946 UART: [kat] LMS
1,169,258 UART: [kat] --
1,170,341 UART: [cold-reset] ++
1,170,861 UART: [fht] FHT @ 0x50003400
1,173,401 UART: [idev] ++
1,173,569 UART: [idev] CDI.KEYID = 6
1,173,930 UART: [idev] SUBJECT.KEYID = 7
1,174,355 UART: [idev] UDS.KEYID = 0
1,174,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,574 UART: [idev] Erasing UDS.KEYID = 0
1,199,666 UART: [idev] Sha1 KeyId Algorithm
1,208,622 UART: [idev] --
1,209,713 UART: [ldev] ++
1,209,881 UART: [ldev] CDI.KEYID = 6
1,210,245 UART: [ldev] SUBJECT.KEYID = 5
1,210,672 UART: [ldev] AUTHORITY.KEYID = 7
1,211,135 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,242,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,443 UART: [ldev] --
1,281,884 UART: [fwproc] Wait for Commands...
1,282,499 UART: [fwproc] Recv command 0x46574c44
1,283,232 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,495 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,670 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,919 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,452,430 >>> mbox cmd response: failed
1,452,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,436 >>> mbox cmd response: failed
1,452,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,442 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,906 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,722 UART: [state] LifecycleState = Unprovisioned
85,377 UART: [state] DebugLocked = No
85,947 UART: [state] WD Timer not started. Device not locked for debugging
87,194 UART: [kat] SHA2-256
892,844 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,969 UART: [kat] ++
897,121 UART: [kat] sha1
901,223 UART: [kat] SHA2-256
903,163 UART: [kat] SHA2-384
905,860 UART: [kat] SHA2-512-ACC
907,761 UART: [kat] ECC-384
917,658 UART: [kat] HMAC-384Kdf
922,242 UART: [kat] LMS
1,170,570 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,229 UART: [fht] FHT @ 0x50003400
1,175,004 UART: [idev] ++
1,175,172 UART: [idev] CDI.KEYID = 6
1,175,532 UART: [idev] SUBJECT.KEYID = 7
1,175,956 UART: [idev] UDS.KEYID = 0
1,176,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,692 UART: [idev] Erasing UDS.KEYID = 0
1,200,431 UART: [idev] Sha1 KeyId Algorithm
1,209,021 UART: [idev] --
1,210,273 UART: [ldev] ++
1,210,441 UART: [ldev] CDI.KEYID = 6
1,210,804 UART: [ldev] SUBJECT.KEYID = 5
1,211,230 UART: [ldev] AUTHORITY.KEYID = 7
1,211,693 UART: [ldev] FE.KEYID = 1
1,216,989 UART: [ldev] Erasing FE.KEYID = 1
1,243,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,238 UART: [fwproc] Wait for Commands...
1,282,926 UART: [fwproc] Recv command 0x46574c44
1,283,654 UART: [fwproc] Recv'd Img size: 118548 bytes
1,596,626 UART: ROM Fatal Error: 0x000B0033
1,597,783 >>> mbox cmd response: failed
1,597,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,597,789 >>> mbox cmd response: failed
1,597,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,597,795 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
893,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,283 UART: [kat] ++
897,435 UART: [kat] sha1
901,581 UART: [kat] SHA2-256
903,521 UART: [kat] SHA2-384
906,240 UART: [kat] SHA2-512-ACC
908,141 UART: [kat] ECC-384
917,720 UART: [kat] HMAC-384Kdf
922,156 UART: [kat] LMS
1,170,484 UART: [kat] --
1,171,375 UART: [cold-reset] ++
1,171,885 UART: [fht] FHT @ 0x50003400
1,174,682 UART: [idev] ++
1,174,850 UART: [idev] CDI.KEYID = 6
1,175,210 UART: [idev] SUBJECT.KEYID = 7
1,175,634 UART: [idev] UDS.KEYID = 0
1,175,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,386 UART: [idev] Erasing UDS.KEYID = 0
1,201,101 UART: [idev] Sha1 KeyId Algorithm
1,209,581 UART: [idev] --
1,210,513 UART: [ldev] ++
1,210,681 UART: [ldev] CDI.KEYID = 6
1,211,044 UART: [ldev] SUBJECT.KEYID = 5
1,211,470 UART: [ldev] AUTHORITY.KEYID = 7
1,211,933 UART: [ldev] FE.KEYID = 1
1,217,091 UART: [ldev] Erasing FE.KEYID = 1
1,243,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,411 UART: [ldev] --
1,282,876 UART: [fwproc] Wait for Commands...
1,283,498 UART: [fwproc] Recv command 0x46574c44
1,284,226 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,027 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,197 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,584 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,453,633 >>> mbox cmd response: failed
1,453,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,453,639 >>> mbox cmd response: failed
1,453,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,453,645 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,169 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
893,237 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,362 UART: [kat] ++
897,514 UART: [kat] sha1
901,794 UART: [kat] SHA2-256
903,734 UART: [kat] SHA2-384
906,325 UART: [kat] SHA2-512-ACC
908,226 UART: [kat] ECC-384
917,827 UART: [kat] HMAC-384Kdf
922,507 UART: [kat] LMS
1,170,835 UART: [kat] --
1,171,578 UART: [cold-reset] ++
1,172,054 UART: [fht] FHT @ 0x50003400
1,174,665 UART: [idev] ++
1,174,833 UART: [idev] CDI.KEYID = 6
1,175,193 UART: [idev] SUBJECT.KEYID = 7
1,175,617 UART: [idev] UDS.KEYID = 0
1,175,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,567 UART: [idev] Erasing UDS.KEYID = 0
1,200,566 UART: [idev] Sha1 KeyId Algorithm
1,209,094 UART: [idev] --
1,210,166 UART: [ldev] ++
1,210,334 UART: [ldev] CDI.KEYID = 6
1,210,697 UART: [ldev] SUBJECT.KEYID = 5
1,211,123 UART: [ldev] AUTHORITY.KEYID = 7
1,211,586 UART: [ldev] FE.KEYID = 1
1,217,210 UART: [ldev] Erasing FE.KEYID = 1
1,244,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,068 UART: [ldev] --
1,283,517 UART: [fwproc] Wait for Commands...
1,284,095 UART: [fwproc] Recv command 0x46574c44
1,284,823 UART: [fwproc] Recv'd Img size: 118548 bytes
1,590,177 UART: ROM Fatal Error: 0x000B0033
1,591,334 >>> mbox cmd response: failed
1,591,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,340 >>> mbox cmd response: failed
1,591,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
893,783 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,908 UART: [kat] ++
898,060 UART: [kat] sha1
902,214 UART: [kat] SHA2-256
904,154 UART: [kat] SHA2-384
906,973 UART: [kat] SHA2-512-ACC
908,874 UART: [kat] ECC-384
918,553 UART: [kat] HMAC-384Kdf
923,171 UART: [kat] LMS
1,171,499 UART: [kat] --
1,172,424 UART: [cold-reset] ++
1,172,864 UART: [fht] FHT @ 0x50003400
1,175,381 UART: [idev] ++
1,175,549 UART: [idev] CDI.KEYID = 6
1,175,909 UART: [idev] SUBJECT.KEYID = 7
1,176,333 UART: [idev] UDS.KEYID = 0
1,176,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,597 UART: [idev] Erasing UDS.KEYID = 0
1,201,942 UART: [idev] Sha1 KeyId Algorithm
1,210,536 UART: [idev] --
1,211,478 UART: [ldev] ++
1,211,646 UART: [ldev] CDI.KEYID = 6
1,212,009 UART: [ldev] SUBJECT.KEYID = 5
1,212,435 UART: [ldev] AUTHORITY.KEYID = 7
1,212,898 UART: [ldev] FE.KEYID = 1
1,218,152 UART: [ldev] Erasing FE.KEYID = 1
1,245,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,844 UART: [ldev] --
1,284,183 UART: [fwproc] Wait for Commands...
1,284,887 UART: [fwproc] Recv command 0x46574c44
1,285,615 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,432 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,602 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,907 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,454,078 >>> mbox cmd response: failed
1,454,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,454,084 >>> mbox cmd response: failed
1,454,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,454,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,786 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,448,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,383,809 >>> mbox cmd response: failed
11,384,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,384,719 >>> mbox cmd response: failed
11,384,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,385,292 >>> mbox cmd response: failed
Initializing fuses
2,053,306 writing to cptra_bootfsm_go
5,501,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,336,175 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,448,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,379,094 >>> mbox cmd response: failed
11,379,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,380,054 >>> mbox cmd response: failed
11,380,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,380,659 >>> mbox cmd response: failed
Initializing fuses
2,054,099 writing to cptra_bootfsm_go
5,484,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,312,057 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
3,776,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,584,974 >>> mbox cmd response: failed
11,585,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,585,860 >>> mbox cmd response: failed
11,586,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,586,430 >>> mbox cmd response: failed
Initializing fuses
2,054,268 writing to cptra_bootfsm_go
12,059,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,773,387 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,774,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,590,285 >>> mbox cmd response: failed
11,590,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,591,134 >>> mbox cmd response: failed
11,591,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,591,712 >>> mbox cmd response: failed
Initializing fuses
2,054,148 writing to cptra_bootfsm_go
12,051,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,760,248 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,452,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,379,735 >>> mbox cmd response: failed
11,380,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,380,867 >>> mbox cmd response: failed
11,381,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,381,428 >>> mbox cmd response: failed
Initializing fuses
2,057,225 writing to cptra_bootfsm_go
5,500,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,371,338 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,447,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,372,520 >>> mbox cmd response: failed
11,373,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,373,587 >>> mbox cmd response: failed
11,373,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,374,159 >>> mbox cmd response: failed
Initializing fuses
2,056,379 writing to cptra_bootfsm_go
5,487,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,327,314 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,779,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,589,850 >>> mbox cmd response: failed
11,590,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,590,810 >>> mbox cmd response: failed
11,591,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,591,398 >>> mbox cmd response: failed
Initializing fuses
2,056,073 writing to cptra_bootfsm_go
12,058,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,772,480 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,783,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,590,254 >>> mbox cmd response: failed
11,591,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,591,412 >>> mbox cmd response: failed
11,591,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,592,054 >>> mbox cmd response: failed
Initializing fuses
2,056,031 writing to cptra_bootfsm_go
12,056,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,778,844 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,200,941 >>> mbox cmd response: failed
1,200,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,947 >>> mbox cmd response: failed
1,200,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,953 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,465 UART: [kat] SHA2-512-ACC
906,366 UART: [kat] ECC-384
915,801 UART: [kat] HMAC-384Kdf
920,267 UART: [kat] LMS
1,168,579 UART: [kat] --
1,169,254 UART: [cold-reset] ++
1,169,666 UART: [fht] FHT @ 0x50003400
1,172,348 UART: [idev] ++
1,172,516 UART: [idev] CDI.KEYID = 6
1,172,877 UART: [idev] SUBJECT.KEYID = 7
1,173,302 UART: [idev] UDS.KEYID = 0
1,173,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,157 UART: [idev] Erasing UDS.KEYID = 0
1,197,625 UART: [idev] Sha1 KeyId Algorithm
1,206,583 UART: [idev] --
1,207,554 UART: [ldev] ++
1,207,722 UART: [ldev] CDI.KEYID = 6
1,208,086 UART: [ldev] SUBJECT.KEYID = 5
1,208,513 UART: [ldev] AUTHORITY.KEYID = 7
1,208,976 UART: [ldev] FE.KEYID = 1
1,214,438 UART: [ldev] Erasing FE.KEYID = 1
1,240,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,576 UART: [ldev] --
1,279,801 UART: [fwproc] Wait for Commands...
1,280,478 UART: [fwproc] Recv command 0x46574c44
1,281,211 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,002 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,177 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,516 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,019 >>> mbox cmd response: failed
1,199,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,025 >>> mbox cmd response: failed
1,199,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,463 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,201,278 >>> mbox cmd response: failed
1,201,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,284 >>> mbox cmd response: failed
1,201,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
900,023 UART: [kat] SHA2-256
901,963 UART: [kat] SHA2-384
904,852 UART: [kat] SHA2-512-ACC
906,753 UART: [kat] ECC-384
916,932 UART: [kat] HMAC-384Kdf
921,476 UART: [kat] LMS
1,169,788 UART: [kat] --
1,170,903 UART: [cold-reset] ++
1,171,279 UART: [fht] FHT @ 0x50003400
1,174,035 UART: [idev] ++
1,174,203 UART: [idev] CDI.KEYID = 6
1,174,564 UART: [idev] SUBJECT.KEYID = 7
1,174,989 UART: [idev] UDS.KEYID = 0
1,175,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,800 UART: [idev] Erasing UDS.KEYID = 0
1,199,730 UART: [idev] Sha1 KeyId Algorithm
1,208,690 UART: [idev] --
1,209,737 UART: [ldev] ++
1,209,905 UART: [ldev] CDI.KEYID = 6
1,210,269 UART: [ldev] SUBJECT.KEYID = 5
1,210,696 UART: [ldev] AUTHORITY.KEYID = 7
1,211,159 UART: [ldev] FE.KEYID = 1
1,216,495 UART: [ldev] Erasing FE.KEYID = 1
1,242,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,353 UART: [ldev] --
1,281,642 UART: [fwproc] Wait for Commands...
1,282,333 UART: [fwproc] Recv command 0x46574c44
1,283,066 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,303 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,478 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,695 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,201,488 >>> mbox cmd response: failed
1,201,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,494 >>> mbox cmd response: failed
1,201,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,500 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,466 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,923 >>> mbox cmd response: failed
1,199,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,929 >>> mbox cmd response: failed
1,199,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
87,942 UART: [kat] SHA2-256
893,592 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,717 UART: [kat] ++
897,869 UART: [kat] sha1
902,253 UART: [kat] SHA2-256
904,193 UART: [kat] SHA2-384
906,952 UART: [kat] SHA2-512-ACC
908,853 UART: [kat] ECC-384
918,660 UART: [kat] HMAC-384Kdf
923,260 UART: [kat] LMS
1,171,588 UART: [kat] --
1,172,447 UART: [cold-reset] ++
1,173,021 UART: [fht] FHT @ 0x50003400
1,175,746 UART: [idev] ++
1,175,914 UART: [idev] CDI.KEYID = 6
1,176,274 UART: [idev] SUBJECT.KEYID = 7
1,176,698 UART: [idev] UDS.KEYID = 0
1,177,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,404 UART: [idev] Erasing UDS.KEYID = 0
1,201,413 UART: [idev] Sha1 KeyId Algorithm
1,209,717 UART: [idev] --
1,210,769 UART: [ldev] ++
1,210,937 UART: [ldev] CDI.KEYID = 6
1,211,300 UART: [ldev] SUBJECT.KEYID = 5
1,211,726 UART: [ldev] AUTHORITY.KEYID = 7
1,212,189 UART: [ldev] FE.KEYID = 1
1,217,339 UART: [ldev] Erasing FE.KEYID = 1
1,243,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,051 UART: [ldev] --
1,282,338 UART: [fwproc] Wait for Commands...
1,282,930 UART: [fwproc] Recv command 0x46574c44
1,283,658 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,863 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,033 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,400 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,589 >>> mbox cmd response: failed
1,199,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,595 >>> mbox cmd response: failed
1,199,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,491 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,201,548 >>> mbox cmd response: failed
1,201,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,554 >>> mbox cmd response: failed
1,201,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
893,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,958 UART: [kat] ++
898,110 UART: [kat] sha1
902,250 UART: [kat] SHA2-256
904,190 UART: [kat] SHA2-384
906,955 UART: [kat] SHA2-512-ACC
908,856 UART: [kat] ECC-384
918,321 UART: [kat] HMAC-384Kdf
923,019 UART: [kat] LMS
1,171,347 UART: [kat] --
1,172,596 UART: [cold-reset] ++
1,173,140 UART: [fht] FHT @ 0x50003400
1,175,723 UART: [idev] ++
1,175,891 UART: [idev] CDI.KEYID = 6
1,176,251 UART: [idev] SUBJECT.KEYID = 7
1,176,675 UART: [idev] UDS.KEYID = 0
1,177,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,763 UART: [idev] Erasing UDS.KEYID = 0
1,201,984 UART: [idev] Sha1 KeyId Algorithm
1,210,402 UART: [idev] --
1,211,548 UART: [ldev] ++
1,211,716 UART: [ldev] CDI.KEYID = 6
1,212,079 UART: [ldev] SUBJECT.KEYID = 5
1,212,505 UART: [ldev] AUTHORITY.KEYID = 7
1,212,968 UART: [ldev] FE.KEYID = 1
1,218,222 UART: [ldev] Erasing FE.KEYID = 1
1,244,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,376 UART: [ldev] --
1,283,715 UART: [fwproc] Wait for Commands...
1,284,497 UART: [fwproc] Recv command 0x46574c44
1,285,225 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,128 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,298 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,529 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,200,892 >>> mbox cmd response: failed
1,200,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,898 >>> mbox cmd response: failed
1,200,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,904 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,924 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,450,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,372,644 >>> mbox cmd response: failed
10,373,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,373,515 >>> mbox cmd response: failed
10,373,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,374,088 >>> mbox cmd response: failed
Initializing fuses
2,057,640 writing to cptra_bootfsm_go
5,486,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,376,170 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,449,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,377,329 >>> mbox cmd response: failed
10,378,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,378,373 >>> mbox cmd response: failed
10,378,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,378,944 >>> mbox cmd response: failed
Initializing fuses
2,062,408 writing to cptra_bootfsm_go
5,528,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,412,482 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,781,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,589,422 >>> mbox cmd response: failed
10,589,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,590,312 >>> mbox cmd response: failed
10,590,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,590,871 >>> mbox cmd response: failed
Initializing fuses
2,056,530 writing to cptra_bootfsm_go
13,055,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,814,353 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
3,781,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,593,623 >>> mbox cmd response: failed
10,594,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,594,522 >>> mbox cmd response: failed
10,594,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,595,104 >>> mbox cmd response: failed
Initializing fuses
2,057,927 writing to cptra_bootfsm_go
13,048,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,785,310 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,449,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,372,916 >>> mbox cmd response: failed
10,373,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,374,047 >>> mbox cmd response: failed
10,374,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,374,621 >>> mbox cmd response: failed
Initializing fuses
2,065,190 writing to cptra_bootfsm_go
5,505,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,368,138 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,451,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,373,580 >>> mbox cmd response: failed
10,374,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,374,689 >>> mbox cmd response: failed
10,374,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,375,266 >>> mbox cmd response: failed
Initializing fuses
2,065,511 writing to cptra_bootfsm_go
5,508,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,359,609 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
3,783,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,577,961 >>> mbox cmd response: failed
10,578,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,578,989 >>> mbox cmd response: failed
10,579,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,579,563 >>> mbox cmd response: failed
Initializing fuses
2,058,060 writing to cptra_bootfsm_go
13,068,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,813,258 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,778,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,579,683 >>> mbox cmd response: failed
10,580,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,580,831 >>> mbox cmd response: failed
10,581,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,581,363 >>> mbox cmd response: failed
Initializing fuses
2,061,315 writing to cptra_bootfsm_go
13,061,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,806,456 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,513 >>> mbox cmd response: failed
1,183,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,519 >>> mbox cmd response: failed
1,183,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,676 UART: [kat] SHA2-256
901,616 UART: [kat] SHA2-384
904,239 UART: [kat] SHA2-512-ACC
906,140 UART: [kat] ECC-384
915,543 UART: [kat] HMAC-384Kdf
920,191 UART: [kat] LMS
1,168,503 UART: [kat] --
1,169,366 UART: [cold-reset] ++
1,169,866 UART: [fht] FHT @ 0x50003400
1,172,748 UART: [idev] ++
1,172,916 UART: [idev] CDI.KEYID = 6
1,173,277 UART: [idev] SUBJECT.KEYID = 7
1,173,702 UART: [idev] UDS.KEYID = 0
1,174,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,951 UART: [idev] Erasing UDS.KEYID = 0
1,198,847 UART: [idev] Sha1 KeyId Algorithm
1,207,779 UART: [idev] --
1,208,626 UART: [ldev] ++
1,208,794 UART: [ldev] CDI.KEYID = 6
1,209,158 UART: [ldev] SUBJECT.KEYID = 5
1,209,585 UART: [ldev] AUTHORITY.KEYID = 7
1,210,048 UART: [ldev] FE.KEYID = 1
1,215,482 UART: [ldev] Erasing FE.KEYID = 1
1,241,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,898 UART: [ldev] --
1,281,309 UART: [fwproc] Wait for Commands...
1,281,900 UART: [fwproc] Recv command 0x46574c44
1,282,633 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,394 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,569 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,722 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,559 >>> mbox cmd response: failed
1,183,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,565 >>> mbox cmd response: failed
1,183,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,557 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,160 >>> mbox cmd response: failed
1,185,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,166 >>> mbox cmd response: failed
1,185,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,172 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
891,249 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,707 UART: [kat] SHA2-256
901,647 UART: [kat] SHA2-384
904,260 UART: [kat] SHA2-512-ACC
906,161 UART: [kat] ECC-384
915,808 UART: [kat] HMAC-384Kdf
920,376 UART: [kat] LMS
1,168,688 UART: [kat] --
1,169,809 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,173,061 UART: [idev] ++
1,173,229 UART: [idev] CDI.KEYID = 6
1,173,590 UART: [idev] SUBJECT.KEYID = 7
1,174,015 UART: [idev] UDS.KEYID = 0
1,174,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,052 UART: [idev] Erasing UDS.KEYID = 0
1,199,240 UART: [idev] Sha1 KeyId Algorithm
1,208,334 UART: [idev] --
1,209,421 UART: [ldev] ++
1,209,589 UART: [ldev] CDI.KEYID = 6
1,209,953 UART: [ldev] SUBJECT.KEYID = 5
1,210,380 UART: [ldev] AUTHORITY.KEYID = 7
1,210,843 UART: [ldev] FE.KEYID = 1
1,216,087 UART: [ldev] Erasing FE.KEYID = 1
1,242,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,243 UART: [ldev] --
1,281,612 UART: [fwproc] Wait for Commands...
1,282,227 UART: [fwproc] Recv command 0x46574c44
1,282,960 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,492 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,957 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,132 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,399 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,010 >>> mbox cmd response: failed
1,184,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,016 >>> mbox cmd response: failed
1,184,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,666 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,743 >>> mbox cmd response: failed
1,183,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,749 >>> mbox cmd response: failed
1,183,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,755 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,696 UART: [state] LifecycleState = Unprovisioned
86,351 UART: [state] DebugLocked = No
86,839 UART: [state] WD Timer not started. Device not locked for debugging
88,056 UART: [kat] SHA2-256
893,706 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,831 UART: [kat] ++
897,983 UART: [kat] sha1
902,289 UART: [kat] SHA2-256
904,229 UART: [kat] SHA2-384
907,012 UART: [kat] SHA2-512-ACC
908,913 UART: [kat] ECC-384
918,594 UART: [kat] HMAC-384Kdf
923,114 UART: [kat] LMS
1,171,442 UART: [kat] --
1,172,415 UART: [cold-reset] ++
1,172,845 UART: [fht] FHT @ 0x50003400
1,175,492 UART: [idev] ++
1,175,660 UART: [idev] CDI.KEYID = 6
1,176,020 UART: [idev] SUBJECT.KEYID = 7
1,176,444 UART: [idev] UDS.KEYID = 0
1,176,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,508 UART: [idev] Erasing UDS.KEYID = 0
1,201,011 UART: [idev] Sha1 KeyId Algorithm
1,209,417 UART: [idev] --
1,210,371 UART: [ldev] ++
1,210,539 UART: [ldev] CDI.KEYID = 6
1,210,902 UART: [ldev] SUBJECT.KEYID = 5
1,211,328 UART: [ldev] AUTHORITY.KEYID = 7
1,211,791 UART: [ldev] FE.KEYID = 1
1,217,029 UART: [ldev] Erasing FE.KEYID = 1
1,242,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,047 UART: [ldev] --
1,282,386 UART: [fwproc] Wait for Commands...
1,283,092 UART: [fwproc] Recv command 0x46574c44
1,283,820 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,639 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,809 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,072 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,651 >>> mbox cmd response: failed
1,182,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,657 >>> mbox cmd response: failed
1,182,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,453 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,486 >>> mbox cmd response: failed
1,184,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,492 >>> mbox cmd response: failed
1,184,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,011 UART: [state] LifecycleState = Unprovisioned
85,666 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
893,237 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,362 UART: [kat] ++
897,514 UART: [kat] sha1
901,824 UART: [kat] SHA2-256
903,764 UART: [kat] SHA2-384
906,509 UART: [kat] SHA2-512-ACC
908,410 UART: [kat] ECC-384
918,301 UART: [kat] HMAC-384Kdf
922,923 UART: [kat] LMS
1,171,251 UART: [kat] --
1,172,348 UART: [cold-reset] ++
1,172,786 UART: [fht] FHT @ 0x50003400
1,175,509 UART: [idev] ++
1,175,677 UART: [idev] CDI.KEYID = 6
1,176,037 UART: [idev] SUBJECT.KEYID = 7
1,176,461 UART: [idev] UDS.KEYID = 0
1,176,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,519 UART: [idev] Erasing UDS.KEYID = 0
1,200,970 UART: [idev] Sha1 KeyId Algorithm
1,209,562 UART: [idev] --
1,210,530 UART: [ldev] ++
1,210,698 UART: [ldev] CDI.KEYID = 6
1,211,061 UART: [ldev] SUBJECT.KEYID = 5
1,211,487 UART: [ldev] AUTHORITY.KEYID = 7
1,211,950 UART: [ldev] FE.KEYID = 1
1,217,250 UART: [ldev] Erasing FE.KEYID = 1
1,243,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,810 UART: [ldev] --
1,283,083 UART: [fwproc] Wait for Commands...
1,283,849 UART: [fwproc] Recv command 0x46574c44
1,284,577 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,282 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,452 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,775 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,628 >>> mbox cmd response: failed
1,182,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,634 >>> mbox cmd response: failed
1,182,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,916 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,231 UART:
192,594 UART: Running Caliptra ROM ...
193,693 UART:
193,843 UART: [state] CFI Enabled
265,071 UART: [state] LifecycleState = Manufacturing
267,021 UART: [state] DebugLocked = No
269,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,923 UART: [kat] SHA2-256
443,631 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,142 UART: [kat] ++
454,677 UART: [kat] sha1
466,226 UART: [kat] SHA2-256
468,909 UART: [kat] SHA2-384
474,669 UART: [kat] SHA2-512-ACC
477,012 UART: [kat] ECC-384
2,768,166 UART: [kat] HMAC-384Kdf
2,801,309 UART: [kat] LMS
3,991,641 UART: [kat] --
3,996,248 UART: [cold-reset] ++
3,998,945 UART: [fht] Storing FHT @ 0x50003400
4,010,269 UART: [idev] ++
4,010,849 UART: [idev] CDI.KEYID = 6
4,011,782 UART: [idev] SUBJECT.KEYID = 7
4,013,002 UART: [idev] UDS.KEYID = 0
4,018,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,168,064 UART: [idev] Erasing UDS.KEYID = 0
7,347,133 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,911 UART: [idev] --
7,371,671 UART: [ldev] ++
7,372,243 UART: [ldev] CDI.KEYID = 6
7,373,160 UART: [ldev] SUBJECT.KEYID = 5
7,374,376 UART: [ldev] AUTHORITY.KEYID = 7
7,375,666 UART: [ldev] FE.KEYID = 1
7,424,403 UART: [ldev] Erasing FE.KEYID = 1
10,755,661 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,162 UART: [ldev] --
13,117,732 UART: [fwproc] Waiting for Commands...
13,120,266 UART: [fwproc] Received command 0x46574c44
13,122,475 UART: [fwproc] Received Image of size 118548 bytes
13,181,087 UART: ROM Fatal Error: 0x000B0003
13,184,581 >>> mbox cmd response: failed
13,185,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,185,359 >>> mbox cmd response: failed
13,185,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,185,935 >>> mbox cmd response: failed
Initializing fuses
2,058,488 writing to cptra_bootfsm_go
2,247,891 UART:
2,248,225 UART: Running Caliptra ROM ...
2,249,359 UART:
2,249,538 UART: [state] CFI Enabled
2,310,583 UART: [state] LifecycleState = Manufacturing
2,312,513 UART: [state] DebugLocked = No
2,313,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,182 UART: [kat] SHA2-256
2,487,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,356 UART: [kat] ++
2,498,841 UART: [kat] sha1
2,510,004 UART: [kat] SHA2-256
2,512,710 UART: [kat] SHA2-384
2,519,600 UART: [kat] SHA2-512-ACC
2,521,964 UART: [kat] ECC-384
4,813,591 UART: [kat] HMAC-384Kdf
4,846,577 UART: [kat] LMS
6,036,879 UART: [kat] --
6,041,919 UART: [cold-reset] ++
6,043,590 UART: [fht] Storing FHT @ 0x50003400
6,055,784 UART: [idev] ++
6,056,409 UART: [idev] CDI.KEYID = 6
6,057,322 UART: [idev] SUBJECT.KEYID = 7
6,058,600 UART: [idev] UDS.KEYID = 0
6,061,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,210,531 UART: [idev] Erasing UDS.KEYID = 0
9,399,357 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,731 UART: [idev] --
9,425,406 UART: [ldev] ++
9,425,983 UART: [ldev] CDI.KEYID = 6
9,426,944 UART: [ldev] SUBJECT.KEYID = 5
9,428,203 UART: [ldev] AUTHORITY.KEYID = 7
9,429,470 UART: [ldev] FE.KEYID = 1
9,471,340 UART: [ldev] Erasing FE.KEYID = 1
12,805,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,117,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,132,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,147,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,161,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,181,464 UART: [ldev] --
15,186,028 UART: [fwproc] Waiting for Commands...
15,188,617 UART: [fwproc] Received command 0x46574c44
15,190,808 UART: [fwproc] Received Image of size 118548 bytes
19,333,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,414,331 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,487,516 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,815,819 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
3,809,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,918,699 >>> mbox cmd response: failed
12,919,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,919,881 >>> mbox cmd response: failed
12,920,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,920,514 >>> mbox cmd response: failed
Initializing fuses
2,063,102 writing to cptra_bootfsm_go
5,858,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,067,786 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,440 UART:
192,829 UART: Running Caliptra ROM ...
193,954 UART:
603,643 UART: [state] CFI Enabled
617,376 UART: [state] LifecycleState = Manufacturing
619,328 UART: [state] DebugLocked = No
622,027 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,429 UART: [kat] SHA2-256
797,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,705 UART: [kat] ++
808,185 UART: [kat] sha1
819,990 UART: [kat] SHA2-256
822,717 UART: [kat] SHA2-384
827,626 UART: [kat] SHA2-512-ACC
829,974 UART: [kat] ECC-384
3,114,225 UART: [kat] HMAC-384Kdf
3,127,060 UART: [kat] LMS
4,317,172 UART: [kat] --
4,320,789 UART: [cold-reset] ++
4,322,723 UART: [fht] Storing FHT @ 0x50003400
4,334,374 UART: [idev] ++
4,335,500 UART: [idev] CDI.KEYID = 6
4,336,422 UART: [idev] SUBJECT.KEYID = 7
4,337,479 UART: [idev] UDS.KEYID = 0
4,343,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,992 UART: [idev] Erasing UDS.KEYID = 0
7,627,258 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,299 UART: [idev] --
7,652,088 UART: [ldev] ++
7,652,664 UART: [ldev] CDI.KEYID = 6
7,653,608 UART: [ldev] SUBJECT.KEYID = 5
7,654,828 UART: [ldev] AUTHORITY.KEYID = 7
7,656,068 UART: [ldev] FE.KEYID = 1
7,668,914 UART: [ldev] Erasing FE.KEYID = 1
10,953,192 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,555 UART: [ldev] --
13,314,837 UART: [fwproc] Waiting for Commands...
13,317,213 UART: [fwproc] Received command 0x46574c44
13,319,399 UART: [fwproc] Received Image of size 118548 bytes
13,383,281 UART: ROM Fatal Error: 0x000B0003
13,386,754 >>> mbox cmd response: failed
13,387,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,387,410 >>> mbox cmd response: failed
13,387,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,387,973 >>> mbox cmd response: failed
Initializing fuses
2,058,135 writing to cptra_bootfsm_go
2,247,432 UART:
2,247,782 UART: Running Caliptra ROM ...
2,248,836 UART:
7,083,759 UART: [state] CFI Enabled
7,098,826 UART: [state] LifecycleState = Manufacturing
7,100,758 UART: [state] DebugLocked = No
7,103,073 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,107,106 UART: [kat] SHA2-256
7,276,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,287,444 UART: [kat] ++
7,287,996 UART: [kat] sha1
7,300,374 UART: [kat] SHA2-256
7,303,075 UART: [kat] SHA2-384
7,309,504 UART: [kat] SHA2-512-ACC
7,311,857 UART: [kat] ECC-384
9,596,499 UART: [kat] HMAC-384Kdf
9,606,950 UART: [kat] LMS
10,797,055 UART: [kat] --
10,801,657 UART: [cold-reset] ++
10,803,108 UART: [fht] Storing FHT @ 0x50003400
10,815,302 UART: [idev] ++
10,815,869 UART: [idev] CDI.KEYID = 6
10,816,810 UART: [idev] SUBJECT.KEYID = 7
10,818,079 UART: [idev] UDS.KEYID = 0
10,821,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,970,270 UART: [idev] Erasing UDS.KEYID = 0
14,100,996 UART: [idev] Using Sha1 for KeyId Algorithm
14,124,048 UART: [idev] --
14,128,214 UART: [ldev] ++
14,128,783 UART: [ldev] CDI.KEYID = 6
14,129,722 UART: [ldev] SUBJECT.KEYID = 5
14,130,975 UART: [ldev] AUTHORITY.KEYID = 7
14,132,136 UART: [ldev] FE.KEYID = 1
14,143,835 UART: [ldev] Erasing FE.KEYID = 1
17,431,137 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,727,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,742,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,756,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,771,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,789,963 UART: [ldev] --
19,794,691 UART: [fwproc] Waiting for Commands...
19,798,090 UART: [fwproc] Received command 0x46574c44
19,800,290 UART: [fwproc] Received Image of size 118548 bytes
23,942,042 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,023,849 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,097,057 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,426,204 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
4,134,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,119,424 >>> mbox cmd response: failed
13,120,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,120,466 >>> mbox cmd response: failed
13,120,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,121,044 >>> mbox cmd response: failed
Initializing fuses
2,060,072 writing to cptra_bootfsm_go
10,873,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,945,454 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
192,325 UART:
192,693 UART: Running Caliptra ROM ...
193,870 UART:
194,028 UART: [state] CFI Enabled
266,559 UART: [state] LifecycleState = Manufacturing
268,509 UART: [state] DebugLocked = No
271,409 UART: [state] WD Timer not started. Device not locked for debugging
274,743 UART: [kat] SHA2-256
454,413 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,216 UART: [kat] ++
465,760 UART: [kat] sha1
477,117 UART: [kat] SHA2-256
479,848 UART: [kat] SHA2-384
486,001 UART: [kat] SHA2-512-ACC
488,354 UART: [kat] ECC-384
2,949,834 UART: [kat] HMAC-384Kdf
2,973,283 UART: [kat] LMS
3,449,767 UART: [kat] --
3,452,269 UART: [cold-reset] ++
3,453,948 UART: [fht] FHT @ 0x50003400
3,465,316 UART: [idev] ++
3,465,886 UART: [idev] CDI.KEYID = 6
3,466,825 UART: [idev] SUBJECT.KEYID = 7
3,468,092 UART: [idev] UDS.KEYID = 0
3,470,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,301 UART: [idev] Erasing UDS.KEYID = 0
5,985,749 UART: [idev] Sha1 KeyId Algorithm
6,010,165 UART: [idev] --
6,015,545 UART: [ldev] ++
6,016,134 UART: [ldev] CDI.KEYID = 6
6,017,024 UART: [ldev] SUBJECT.KEYID = 5
6,018,247 UART: [ldev] AUTHORITY.KEYID = 7
6,019,439 UART: [ldev] FE.KEYID = 1
6,059,261 UART: [ldev] Erasing FE.KEYID = 1
8,568,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,695 UART: [ldev] --
10,373,266 UART: [fwproc] Wait for Commands...
10,375,068 UART: [fwproc] Recv command 0x46574c44
10,377,067 UART: [fwproc] Recv'd Img size: 118548 bytes
10,450,515 UART: ROM Fatal Error: 0x000B0003
10,453,766 >>> mbox cmd response: failed
10,454,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,454,480 >>> mbox cmd response: failed
10,454,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,455,050 >>> mbox cmd response: failed
Initializing fuses
2,053,346 writing to cptra_bootfsm_go
2,242,663 UART:
2,243,015 UART: Running Caliptra ROM ...
2,244,129 UART:
2,244,295 UART: [state] CFI Enabled
2,308,272 UART: [state] LifecycleState = Manufacturing
2,310,213 UART: [state] DebugLocked = No
2,312,854 UART: [state] WD Timer not started. Device not locked for debugging
2,316,335 UART: [kat] SHA2-256
2,495,988 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,506,763 UART: [kat] ++
2,507,229 UART: [kat] sha1
2,517,690 UART: [kat] SHA2-256
2,520,392 UART: [kat] SHA2-384
2,525,680 UART: [kat] SHA2-512-ACC
2,528,093 UART: [kat] ECC-384
4,990,291 UART: [kat] HMAC-384Kdf
5,015,388 UART: [kat] LMS
5,491,888 UART: [kat] --
5,496,086 UART: [cold-reset] ++
5,498,414 UART: [fht] FHT @ 0x50003400
5,510,806 UART: [idev] ++
5,511,377 UART: [idev] CDI.KEYID = 6
5,512,317 UART: [idev] SUBJECT.KEYID = 7
5,513,584 UART: [idev] UDS.KEYID = 0
5,516,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,665,537 UART: [idev] Erasing UDS.KEYID = 0
8,030,349 UART: [idev] Sha1 KeyId Algorithm
8,055,261 UART: [idev] --
8,059,533 UART: [ldev] ++
8,060,110 UART: [ldev] CDI.KEYID = 6
8,061,031 UART: [ldev] SUBJECT.KEYID = 5
8,062,255 UART: [ldev] AUTHORITY.KEYID = 7
8,063,498 UART: [ldev] FE.KEYID = 1
8,107,754 UART: [ldev] Erasing FE.KEYID = 1
10,615,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,349,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,365,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,381,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,397,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,417,233 UART: [ldev] --
12,423,530 UART: [fwproc] Wait for Commands...
12,425,726 UART: [fwproc] Recv command 0x46574c44
12,427,783 UART: [fwproc] Recv'd Img size: 118548 bytes
15,931,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,012,805 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,085,786 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,414,449 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,465,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,324,000 >>> mbox cmd response: failed
10,324,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,324,915 >>> mbox cmd response: failed
10,325,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,325,494 >>> mbox cmd response: failed
Initializing fuses
2,059,611 writing to cptra_bootfsm_go
5,506,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,293,408 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
192,528 UART:
192,891 UART: Running Caliptra ROM ...
194,065 UART:
603,893 UART: [state] CFI Enabled
620,546 UART: [state] LifecycleState = Manufacturing
622,458 UART: [state] DebugLocked = No
624,009 UART: [state] WD Timer not started. Device not locked for debugging
627,902 UART: [kat] SHA2-256
807,537 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,321 UART: [kat] ++
818,916 UART: [kat] sha1
828,348 UART: [kat] SHA2-256
831,052 UART: [kat] SHA2-384
837,474 UART: [kat] SHA2-512-ACC
839,871 UART: [kat] ECC-384
3,281,687 UART: [kat] HMAC-384Kdf
3,293,596 UART: [kat] LMS
3,770,093 UART: [kat] --
3,773,231 UART: [cold-reset] ++
3,775,543 UART: [fht] FHT @ 0x50003400
3,787,557 UART: [idev] ++
3,788,190 UART: [idev] CDI.KEYID = 6
3,789,112 UART: [idev] SUBJECT.KEYID = 7
3,790,331 UART: [idev] UDS.KEYID = 0
3,793,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,522 UART: [idev] Erasing UDS.KEYID = 0
6,266,273 UART: [idev] Sha1 KeyId Algorithm
6,289,174 UART: [idev] --
6,294,169 UART: [ldev] ++
6,294,744 UART: [ldev] CDI.KEYID = 6
6,295,672 UART: [ldev] SUBJECT.KEYID = 5
6,296,891 UART: [ldev] AUTHORITY.KEYID = 7
6,298,128 UART: [ldev] FE.KEYID = 1
6,308,399 UART: [ldev] Erasing FE.KEYID = 1
8,786,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,386 UART: [ldev] --
10,582,342 UART: [fwproc] Wait for Commands...
10,585,156 UART: [fwproc] Recv command 0x46574c44
10,587,147 UART: [fwproc] Recv'd Img size: 118548 bytes
10,662,491 UART: ROM Fatal Error: 0x000B0003
10,665,739 >>> mbox cmd response: failed
10,666,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,666,538 >>> mbox cmd response: failed
10,666,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,667,103 >>> mbox cmd response: failed
Initializing fuses
2,055,096 writing to cptra_bootfsm_go
2,244,410 UART:
2,244,762 UART: Running Caliptra ROM ...
2,245,904 UART:
9,806,090 UART: [state] CFI Enabled
9,819,518 UART: [state] LifecycleState = Manufacturing
9,821,498 UART: [state] DebugLocked = No
9,822,851 UART: [state] WD Timer not started. Device not locked for debugging
9,826,338 UART: [kat] SHA2-256
10,006,033 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,016,786 UART: [kat] ++
10,017,254 UART: [kat] sha1
10,028,633 UART: [kat] SHA2-256
10,031,332 UART: [kat] SHA2-384
10,038,030 UART: [kat] SHA2-512-ACC
10,040,388 UART: [kat] ECC-384
12,481,231 UART: [kat] HMAC-384Kdf
12,493,410 UART: [kat] LMS
12,969,872 UART: [kat] --
12,974,079 UART: [cold-reset] ++
12,975,530 UART: [fht] FHT @ 0x50003400
12,986,565 UART: [idev] ++
12,987,217 UART: [idev] CDI.KEYID = 6
12,988,132 UART: [idev] SUBJECT.KEYID = 7
12,989,351 UART: [idev] UDS.KEYID = 0
12,992,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,141,432 UART: [idev] Erasing UDS.KEYID = 0
15,468,699 UART: [idev] Sha1 KeyId Algorithm
15,491,336 UART: [idev] --
15,496,390 UART: [ldev] ++
15,496,972 UART: [ldev] CDI.KEYID = 6
15,497,892 UART: [ldev] SUBJECT.KEYID = 5
15,499,107 UART: [ldev] AUTHORITY.KEYID = 7
15,500,339 UART: [ldev] FE.KEYID = 1
15,512,069 UART: [ldev] Erasing FE.KEYID = 1
17,987,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,707,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,722,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,738,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,754,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,775,748 UART: [ldev] --
19,780,860 UART: [fwproc] Wait for Commands...
19,783,989 UART: [fwproc] Recv command 0x46574c44
19,786,033 UART: [fwproc] Recv'd Img size: 118548 bytes
23,296,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,378,479 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,451,490 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,779,585 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,640 writing to cptra_bootfsm_go
3,785,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,551,421 >>> mbox cmd response: failed
10,552,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,552,392 >>> mbox cmd response: failed
10,552,724 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,553,017 >>> mbox cmd response: failed
Initializing fuses
2,055,406 writing to cptra_bootfsm_go
13,099,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,797,242 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,303 UART:
192,661 UART: Running Caliptra ROM ...
193,774 UART:
193,921 UART: [state] CFI Enabled
265,956 UART: [state] LifecycleState = Manufacturing
268,388 UART: [state] DebugLocked = No
270,499 UART: [state] WD Timer not started. Device not locked for debugging
275,085 UART: [kat] SHA2-256
464,961 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,701 UART: [kat] ++
476,151 UART: [kat] sha1
487,841 UART: [kat] SHA2-256
490,860 UART: [kat] SHA2-384
497,278 UART: [kat] SHA2-512-ACC
499,893 UART: [kat] ECC-384
2,946,259 UART: [kat] HMAC-384Kdf
2,971,083 UART: [kat] LMS
3,502,877 UART: [kat] --
3,508,938 UART: [cold-reset] ++
3,510,563 UART: [fht] FHT @ 0x50003400
3,521,552 UART: [idev] ++
3,522,237 UART: [idev] CDI.KEYID = 6
3,523,209 UART: [idev] SUBJECT.KEYID = 7
3,524,371 UART: [idev] UDS.KEYID = 0
3,530,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,680,268 UART: [idev] Erasing UDS.KEYID = 0
6,027,867 UART: [idev] Sha1 KeyId Algorithm
6,050,817 UART: [idev] --
6,056,642 UART: [ldev] ++
6,057,339 UART: [ldev] CDI.KEYID = 6
6,058,265 UART: [ldev] SUBJECT.KEYID = 5
6,059,434 UART: [ldev] AUTHORITY.KEYID = 7
6,060,673 UART: [ldev] FE.KEYID = 1
6,101,355 UART: [ldev] Erasing FE.KEYID = 1
8,607,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,491 UART: [ldev] --
10,415,624 UART: [fwproc] Wait for Commands...
10,417,134 UART: [fwproc] Recv command 0x46574c44
10,419,452 UART: [fwproc] Recv'd Img size: 118548 bytes
10,511,450 UART: ROM Fatal Error: 0x000B0003
10,515,128 >>> mbox cmd response: failed
10,515,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,515,913 >>> mbox cmd response: failed
10,516,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,516,479 >>> mbox cmd response: failed
Initializing fuses
2,062,417 writing to cptra_bootfsm_go
2,251,728 UART:
2,252,079 UART: Running Caliptra ROM ...
2,253,220 UART:
2,253,401 UART: [state] CFI Enabled
2,314,933 UART: [state] LifecycleState = Manufacturing
2,317,321 UART: [state] DebugLocked = No
2,319,630 UART: [state] WD Timer not started. Device not locked for debugging
2,324,927 UART: [kat] SHA2-256
2,514,795 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,592 UART: [kat] ++
2,526,100 UART: [kat] sha1
2,536,782 UART: [kat] SHA2-256
2,539,807 UART: [kat] SHA2-384
2,545,375 UART: [kat] SHA2-512-ACC
2,547,946 UART: [kat] ECC-384
4,996,051 UART: [kat] HMAC-384Kdf
5,019,145 UART: [kat] LMS
5,550,880 UART: [kat] --
5,554,331 UART: [cold-reset] ++
5,556,212 UART: [fht] FHT @ 0x50003400
5,567,632 UART: [idev] ++
5,568,312 UART: [idev] CDI.KEYID = 6
5,569,334 UART: [idev] SUBJECT.KEYID = 7
5,570,515 UART: [idev] UDS.KEYID = 0
5,573,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,722,370 UART: [idev] Erasing UDS.KEYID = 0
8,077,832 UART: [idev] Sha1 KeyId Algorithm
8,099,984 UART: [idev] --
8,104,073 UART: [ldev] ++
8,104,768 UART: [ldev] CDI.KEYID = 6
8,105,655 UART: [ldev] SUBJECT.KEYID = 5
8,106,872 UART: [ldev] AUTHORITY.KEYID = 7
8,107,981 UART: [ldev] FE.KEYID = 1
8,147,747 UART: [ldev] Erasing FE.KEYID = 1
10,652,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,457,977 UART: [ldev] --
12,463,196 UART: [fwproc] Wait for Commands...
12,464,761 UART: [fwproc] Recv command 0x46574c44
12,467,033 UART: [fwproc] Recv'd Img size: 118548 bytes
15,986,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,062,771 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,186,416 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,746,786 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,456,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,317,492 >>> mbox cmd response: failed
10,318,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,318,643 >>> mbox cmd response: failed
10,318,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,319,217 >>> mbox cmd response: failed
Initializing fuses
2,056,517 writing to cptra_bootfsm_go
5,483,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,906,706 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,498 UART:
192,867 UART: Running Caliptra ROM ...
193,999 UART:
603,563 UART: [state] CFI Enabled
615,240 UART: [state] LifecycleState = Manufacturing
617,580 UART: [state] DebugLocked = No
620,210 UART: [state] WD Timer not started. Device not locked for debugging
625,226 UART: [kat] SHA2-256
815,075 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,888 UART: [kat] ++
827,172 UART: [kat] sha1
838,076 UART: [kat] SHA2-256
841,101 UART: [kat] SHA2-384
846,822 UART: [kat] SHA2-512-ACC
849,450 UART: [kat] ECC-384
3,287,745 UART: [kat] HMAC-384Kdf
3,301,986 UART: [kat] LMS
3,833,826 UART: [kat] --
3,836,864 UART: [cold-reset] ++
3,837,884 UART: [fht] FHT @ 0x50003400
3,850,870 UART: [idev] ++
3,851,561 UART: [idev] CDI.KEYID = 6
3,852,537 UART: [idev] SUBJECT.KEYID = 7
3,853,758 UART: [idev] UDS.KEYID = 0
3,859,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,910 UART: [idev] Erasing UDS.KEYID = 0
6,329,502 UART: [idev] Sha1 KeyId Algorithm
6,351,300 UART: [idev] --
6,357,177 UART: [ldev] ++
6,357,878 UART: [ldev] CDI.KEYID = 6
6,358,801 UART: [ldev] SUBJECT.KEYID = 5
6,359,965 UART: [ldev] AUTHORITY.KEYID = 7
6,361,155 UART: [ldev] FE.KEYID = 1
6,371,268 UART: [ldev] Erasing FE.KEYID = 1
8,845,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,535 UART: [ldev] --
10,637,337 UART: [fwproc] Wait for Commands...
10,639,822 UART: [fwproc] Recv command 0x46574c44
10,642,143 UART: [fwproc] Recv'd Img size: 118548 bytes
10,733,137 UART: ROM Fatal Error: 0x000B0003
10,736,767 >>> mbox cmd response: failed
10,737,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,737,532 >>> mbox cmd response: failed
10,737,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,738,107 >>> mbox cmd response: failed
Initializing fuses
2,063,109 writing to cptra_bootfsm_go
2,252,434 UART:
2,252,791 UART: Running Caliptra ROM ...
2,253,897 UART:
9,735,056 UART: [state] CFI Enabled
9,745,013 UART: [state] LifecycleState = Manufacturing
9,747,426 UART: [state] DebugLocked = No
9,749,197 UART: [state] WD Timer not started. Device not locked for debugging
9,754,642 UART: [kat] SHA2-256
9,944,492 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,955,235 UART: [kat] ++
9,955,843 UART: [kat] sha1
9,966,908 UART: [kat] SHA2-256
9,969,947 UART: [kat] SHA2-384
9,977,077 UART: [kat] SHA2-512-ACC
9,979,624 UART: [kat] ECC-384
12,419,961 UART: [kat] HMAC-384Kdf
12,433,870 UART: [kat] LMS
12,965,652 UART: [kat] --
12,970,832 UART: [cold-reset] ++
12,972,651 UART: [fht] FHT @ 0x50003400
12,985,431 UART: [idev] ++
12,986,112 UART: [idev] CDI.KEYID = 6
12,987,082 UART: [idev] SUBJECT.KEYID = 7
12,988,300 UART: [idev] UDS.KEYID = 0
12,991,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,140,277 UART: [idev] Erasing UDS.KEYID = 0
15,467,385 UART: [idev] Sha1 KeyId Algorithm
15,488,732 UART: [idev] --
15,494,461 UART: [ldev] ++
15,495,147 UART: [ldev] CDI.KEYID = 6
15,496,097 UART: [ldev] SUBJECT.KEYID = 5
15,497,214 UART: [ldev] AUTHORITY.KEYID = 7
15,498,451 UART: [ldev] FE.KEYID = 1
15,510,245 UART: [ldev] Erasing FE.KEYID = 1
17,989,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,707,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,722,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,737,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,752,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,774,415 UART: [ldev] --
19,779,608 UART: [fwproc] Wait for Commands...
19,781,552 UART: [fwproc] Recv command 0x46574c44
19,783,839 UART: [fwproc] Recv'd Img size: 118548 bytes
23,314,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,393,933 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,517,557 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,078,269 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,604 writing to cptra_bootfsm_go
3,759,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,530,316 >>> mbox cmd response: failed
10,530,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,531,319 >>> mbox cmd response: failed
10,531,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,531,918 >>> mbox cmd response: failed
Initializing fuses
2,056,693 writing to cptra_bootfsm_go
13,096,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,440,522 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Manufacturing
85,445 UART: [state] DebugLocked = No
86,115 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,799 UART: [kat] SHA2-256
881,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,845 UART: [kat] ++
885,997 UART: [kat] sha1
890,399 UART: [kat] SHA2-256
892,337 UART: [kat] SHA2-384
895,212 UART: [kat] SHA2-512-ACC
897,113 UART: [kat] ECC-384
902,602 UART: [kat] HMAC-384Kdf
907,100 UART: [kat] LMS
1,475,296 UART: [kat] --
1,476,285 UART: [cold-reset] ++
1,476,697 UART: [fht] Storing FHT @ 0x50003400
1,479,514 UART: [idev] ++
1,479,682 UART: [idev] CDI.KEYID = 6
1,480,042 UART: [idev] SUBJECT.KEYID = 7
1,480,466 UART: [idev] UDS.KEYID = 0
1,480,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,348 UART: [idev] Erasing UDS.KEYID = 0
1,505,102 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,598 UART: [idev] --
1,514,741 UART: [ldev] ++
1,514,909 UART: [ldev] CDI.KEYID = 6
1,515,272 UART: [ldev] SUBJECT.KEYID = 5
1,515,698 UART: [ldev] AUTHORITY.KEYID = 7
1,516,161 UART: [ldev] FE.KEYID = 1
1,521,059 UART: [ldev] Erasing FE.KEYID = 1
1,546,722 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,008 UART: [ldev] --
1,586,517 UART: [fwproc] Waiting for Commands...
1,587,340 UART: [fwproc] Received command 0x46574c44
1,588,131 UART: [fwproc] Received Image of size 118548 bytes
1,608,481 UART: ROM Fatal Error: 0x000B0003
1,609,638 >>> mbox cmd response: failed
1,609,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,644 >>> mbox cmd response: failed
1,609,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,736 UART: [state] LifecycleState = Unprovisioned
85,391 UART: [state] DebugLocked = No
85,961 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,527 UART: [kat] SHA2-256
881,458 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,573 UART: [kat] ++
885,725 UART: [kat] sha1
889,891 UART: [kat] SHA2-256
891,829 UART: [kat] SHA2-384
894,440 UART: [kat] SHA2-512-ACC
896,341 UART: [kat] ECC-384
902,116 UART: [kat] HMAC-384Kdf
906,688 UART: [kat] LMS
1,474,884 UART: [kat] --
1,475,749 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,479,306 UART: [idev] ++
1,479,474 UART: [idev] CDI.KEYID = 6
1,479,834 UART: [idev] SUBJECT.KEYID = 7
1,480,258 UART: [idev] UDS.KEYID = 0
1,480,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,098 UART: [idev] Erasing UDS.KEYID = 0
1,504,830 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,326 UART: [idev] --
1,514,321 UART: [ldev] ++
1,514,489 UART: [ldev] CDI.KEYID = 6
1,514,852 UART: [ldev] SUBJECT.KEYID = 5
1,515,278 UART: [ldev] AUTHORITY.KEYID = 7
1,515,741 UART: [ldev] FE.KEYID = 1
1,520,801 UART: [ldev] Erasing FE.KEYID = 1
1,546,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,378 UART: [ldev] --
1,585,755 UART: [fwproc] Waiting for Commands...
1,586,506 UART: [fwproc] Received command 0x46574c44
1,587,297 UART: [fwproc] Received Image of size 118548 bytes
2,932,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,070 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,288 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,659 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,461,503 >>> mbox cmd response: failed
1,461,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,509 >>> mbox cmd response: failed
1,461,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,515 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,729 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Manufacturing
86,222 UART: [state] DebugLocked = No
86,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,392 UART: [kat] SHA2-256
882,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,438 UART: [kat] ++
886,590 UART: [kat] sha1
890,842 UART: [kat] SHA2-256
892,780 UART: [kat] SHA2-384
895,693 UART: [kat] SHA2-512-ACC
897,594 UART: [kat] ECC-384
903,743 UART: [kat] HMAC-384Kdf
908,527 UART: [kat] LMS
1,476,723 UART: [kat] --
1,477,610 UART: [cold-reset] ++
1,478,144 UART: [fht] Storing FHT @ 0x50003400
1,481,151 UART: [idev] ++
1,481,319 UART: [idev] CDI.KEYID = 6
1,481,679 UART: [idev] SUBJECT.KEYID = 7
1,482,103 UART: [idev] UDS.KEYID = 0
1,482,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,143 UART: [idev] Erasing UDS.KEYID = 0
1,506,743 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,325 UART: [idev] --
1,516,238 UART: [ldev] ++
1,516,406 UART: [ldev] CDI.KEYID = 6
1,516,769 UART: [ldev] SUBJECT.KEYID = 5
1,517,195 UART: [ldev] AUTHORITY.KEYID = 7
1,517,658 UART: [ldev] FE.KEYID = 1
1,522,884 UART: [ldev] Erasing FE.KEYID = 1
1,548,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,153 UART: [ldev] --
1,587,510 UART: [fwproc] Waiting for Commands...
1,588,197 UART: [fwproc] Received command 0x46574c44
1,588,988 UART: [fwproc] Received Image of size 118548 bytes
1,609,510 UART: ROM Fatal Error: 0x000B0003
1,610,667 >>> mbox cmd response: failed
1,610,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,673 >>> mbox cmd response: failed
1,610,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,679 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
87,002 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,606 UART: [kat] SHA2-256
882,537 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,652 UART: [kat] ++
886,804 UART: [kat] sha1
891,008 UART: [kat] SHA2-256
892,946 UART: [kat] SHA2-384
895,791 UART: [kat] SHA2-512-ACC
897,692 UART: [kat] ECC-384
903,373 UART: [kat] HMAC-384Kdf
907,955 UART: [kat] LMS
1,476,151 UART: [kat] --
1,477,034 UART: [cold-reset] ++
1,477,544 UART: [fht] Storing FHT @ 0x50003400
1,480,473 UART: [idev] ++
1,480,641 UART: [idev] CDI.KEYID = 6
1,481,001 UART: [idev] SUBJECT.KEYID = 7
1,481,425 UART: [idev] UDS.KEYID = 0
1,481,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,595 UART: [idev] Erasing UDS.KEYID = 0
1,506,371 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,827 UART: [idev] --
1,515,908 UART: [ldev] ++
1,516,076 UART: [ldev] CDI.KEYID = 6
1,516,439 UART: [ldev] SUBJECT.KEYID = 5
1,516,865 UART: [ldev] AUTHORITY.KEYID = 7
1,517,328 UART: [ldev] FE.KEYID = 1
1,522,382 UART: [ldev] Erasing FE.KEYID = 1
1,547,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,891 UART: [ldev] --
1,587,240 UART: [fwproc] Waiting for Commands...
1,587,945 UART: [fwproc] Received command 0x46574c44
1,588,736 UART: [fwproc] Received Image of size 118548 bytes
2,933,611 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,875 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,093 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,422 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,462,002 >>> mbox cmd response: failed
1,462,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,008 >>> mbox cmd response: failed
1,462,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,014 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,848 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Manufacturing
85,979 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
891,460 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
900,036 UART: [kat] SHA2-256
901,976 UART: [kat] SHA2-384
904,921 UART: [kat] SHA2-512-ACC
906,822 UART: [kat] ECC-384
916,279 UART: [kat] HMAC-384Kdf
920,955 UART: [kat] LMS
1,169,267 UART: [kat] --
1,170,106 UART: [cold-reset] ++
1,170,524 UART: [fht] FHT @ 0x50003400
1,173,190 UART: [idev] ++
1,173,358 UART: [idev] CDI.KEYID = 6
1,173,719 UART: [idev] SUBJECT.KEYID = 7
1,174,144 UART: [idev] UDS.KEYID = 0
1,174,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,961 UART: [idev] Erasing UDS.KEYID = 0
1,199,017 UART: [idev] Sha1 KeyId Algorithm
1,207,947 UART: [idev] --
1,209,046 UART: [ldev] ++
1,209,214 UART: [ldev] CDI.KEYID = 6
1,209,578 UART: [ldev] SUBJECT.KEYID = 5
1,210,005 UART: [ldev] AUTHORITY.KEYID = 7
1,210,468 UART: [ldev] FE.KEYID = 1
1,215,786 UART: [ldev] Erasing FE.KEYID = 1
1,242,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,710 UART: [ldev] --
1,282,011 UART: [fwproc] Wait for Commands...
1,282,734 UART: [fwproc] Recv command 0x46574c44
1,283,467 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,309 UART: ROM Fatal Error: 0x000B0003
1,304,466 >>> mbox cmd response: failed
1,304,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,472 >>> mbox cmd response: failed
1,304,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,106 UART: [kat] ++
895,258 UART: [kat] sha1
899,444 UART: [kat] SHA2-256
901,384 UART: [kat] SHA2-384
904,219 UART: [kat] SHA2-512-ACC
906,120 UART: [kat] ECC-384
915,709 UART: [kat] HMAC-384Kdf
920,161 UART: [kat] LMS
1,168,473 UART: [kat] --
1,169,254 UART: [cold-reset] ++
1,169,810 UART: [fht] FHT @ 0x50003400
1,172,442 UART: [idev] ++
1,172,610 UART: [idev] CDI.KEYID = 6
1,172,971 UART: [idev] SUBJECT.KEYID = 7
1,173,396 UART: [idev] UDS.KEYID = 0
1,173,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,003 UART: [idev] Erasing UDS.KEYID = 0
1,197,989 UART: [idev] Sha1 KeyId Algorithm
1,206,795 UART: [idev] --
1,207,822 UART: [ldev] ++
1,207,990 UART: [ldev] CDI.KEYID = 6
1,208,354 UART: [ldev] SUBJECT.KEYID = 5
1,208,781 UART: [ldev] AUTHORITY.KEYID = 7
1,209,244 UART: [ldev] FE.KEYID = 1
1,214,358 UART: [ldev] Erasing FE.KEYID = 1
1,240,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,018 UART: [ldev] --
1,280,293 UART: [fwproc] Wait for Commands...
1,281,072 UART: [fwproc] Recv command 0x46574c44
1,281,805 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,070 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,245 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,468 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,713 >>> mbox cmd response: failed
1,158,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,719 >>> mbox cmd response: failed
1,158,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,775 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Manufacturing
86,014 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
891,453 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,670 UART: [kat] SHA2-512-ACC
906,571 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,173,259 UART: [idev] ++
1,173,427 UART: [idev] CDI.KEYID = 6
1,173,788 UART: [idev] SUBJECT.KEYID = 7
1,174,213 UART: [idev] UDS.KEYID = 0
1,174,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,224 UART: [idev] Erasing UDS.KEYID = 0
1,199,562 UART: [idev] Sha1 KeyId Algorithm
1,208,468 UART: [idev] --
1,209,283 UART: [ldev] ++
1,209,451 UART: [ldev] CDI.KEYID = 6
1,209,815 UART: [ldev] SUBJECT.KEYID = 5
1,210,242 UART: [ldev] AUTHORITY.KEYID = 7
1,210,705 UART: [ldev] FE.KEYID = 1
1,216,157 UART: [ldev] Erasing FE.KEYID = 1
1,242,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,375 UART: [ldev] --
1,281,772 UART: [fwproc] Wait for Commands...
1,282,427 UART: [fwproc] Recv command 0x46574c44
1,283,160 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,408 UART: ROM Fatal Error: 0x000B0003
1,304,565 >>> mbox cmd response: failed
1,304,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,571 >>> mbox cmd response: failed
1,304,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,577 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,700 UART: [kat] LMS
1,169,012 UART: [kat] --
1,169,853 UART: [cold-reset] ++
1,170,251 UART: [fht] FHT @ 0x50003400
1,172,903 UART: [idev] ++
1,173,071 UART: [idev] CDI.KEYID = 6
1,173,432 UART: [idev] SUBJECT.KEYID = 7
1,173,857 UART: [idev] UDS.KEYID = 0
1,174,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,199,382 UART: [idev] Sha1 KeyId Algorithm
1,208,090 UART: [idev] --
1,208,933 UART: [ldev] ++
1,209,101 UART: [ldev] CDI.KEYID = 6
1,209,465 UART: [ldev] SUBJECT.KEYID = 5
1,209,892 UART: [ldev] AUTHORITY.KEYID = 7
1,210,355 UART: [ldev] FE.KEYID = 1
1,215,621 UART: [ldev] Erasing FE.KEYID = 1
1,241,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,811 UART: [ldev] --
1,281,164 UART: [fwproc] Wait for Commands...
1,281,969 UART: [fwproc] Recv command 0x46574c44
1,282,702 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,571 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,746 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,939 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,500 >>> mbox cmd response: failed
1,159,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,506 >>> mbox cmd response: failed
1,159,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,196 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Manufacturing
85,827 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
893,314 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,439 UART: [kat] ++
897,591 UART: [kat] sha1
901,643 UART: [kat] SHA2-256
903,583 UART: [kat] SHA2-384
906,458 UART: [kat] SHA2-512-ACC
908,359 UART: [kat] ECC-384
917,898 UART: [kat] HMAC-384Kdf
922,422 UART: [kat] LMS
1,170,750 UART: [kat] --
1,171,877 UART: [cold-reset] ++
1,172,233 UART: [fht] FHT @ 0x50003400
1,174,868 UART: [idev] ++
1,175,036 UART: [idev] CDI.KEYID = 6
1,175,396 UART: [idev] SUBJECT.KEYID = 7
1,175,820 UART: [idev] UDS.KEYID = 0
1,176,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,050 UART: [idev] Erasing UDS.KEYID = 0
1,201,345 UART: [idev] Sha1 KeyId Algorithm
1,210,027 UART: [idev] --
1,211,031 UART: [ldev] ++
1,211,199 UART: [ldev] CDI.KEYID = 6
1,211,562 UART: [ldev] SUBJECT.KEYID = 5
1,211,988 UART: [ldev] AUTHORITY.KEYID = 7
1,212,451 UART: [ldev] FE.KEYID = 1
1,217,807 UART: [ldev] Erasing FE.KEYID = 1
1,243,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,733 UART: [ldev] --
1,283,046 UART: [fwproc] Wait for Commands...
1,283,658 UART: [fwproc] Recv command 0x46574c44
1,284,386 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,900 UART: ROM Fatal Error: 0x000B0003
1,306,057 >>> mbox cmd response: failed
1,306,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,063 >>> mbox cmd response: failed
1,306,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
87,260 UART: [kat] SHA2-256
892,910 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,035 UART: [kat] ++
897,187 UART: [kat] sha1
901,385 UART: [kat] SHA2-256
903,325 UART: [kat] SHA2-384
906,056 UART: [kat] SHA2-512-ACC
907,957 UART: [kat] ECC-384
917,718 UART: [kat] HMAC-384Kdf
922,430 UART: [kat] LMS
1,170,758 UART: [kat] --
1,171,839 UART: [cold-reset] ++
1,172,377 UART: [fht] FHT @ 0x50003400
1,175,168 UART: [idev] ++
1,175,336 UART: [idev] CDI.KEYID = 6
1,175,696 UART: [idev] SUBJECT.KEYID = 7
1,176,120 UART: [idev] UDS.KEYID = 0
1,176,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,186 UART: [idev] Erasing UDS.KEYID = 0
1,200,749 UART: [idev] Sha1 KeyId Algorithm
1,209,253 UART: [idev] --
1,210,333 UART: [ldev] ++
1,210,501 UART: [ldev] CDI.KEYID = 6
1,210,864 UART: [ldev] SUBJECT.KEYID = 5
1,211,290 UART: [ldev] AUTHORITY.KEYID = 7
1,211,753 UART: [ldev] FE.KEYID = 1
1,216,709 UART: [ldev] Erasing FE.KEYID = 1
1,242,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,887 UART: [ldev] --
1,282,236 UART: [fwproc] Wait for Commands...
1,282,940 UART: [fwproc] Recv command 0x46574c44
1,283,668 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,245 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,415 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,626 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,066 >>> mbox cmd response: failed
1,158,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,072 >>> mbox cmd response: failed
1,158,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,171 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Manufacturing
85,826 UART: [state] DebugLocked = No
86,334 UART: [state] WD Timer not started. Device not locked for debugging
87,453 UART: [kat] SHA2-256
893,103 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,228 UART: [kat] ++
897,380 UART: [kat] sha1
901,518 UART: [kat] SHA2-256
903,458 UART: [kat] SHA2-384
906,271 UART: [kat] SHA2-512-ACC
908,172 UART: [kat] ECC-384
917,793 UART: [kat] HMAC-384Kdf
922,497 UART: [kat] LMS
1,170,825 UART: [kat] --
1,171,350 UART: [cold-reset] ++
1,171,788 UART: [fht] FHT @ 0x50003400
1,174,497 UART: [idev] ++
1,174,665 UART: [idev] CDI.KEYID = 6
1,175,025 UART: [idev] SUBJECT.KEYID = 7
1,175,449 UART: [idev] UDS.KEYID = 0
1,175,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,535 UART: [idev] Erasing UDS.KEYID = 0
1,200,470 UART: [idev] Sha1 KeyId Algorithm
1,209,000 UART: [idev] --
1,209,870 UART: [ldev] ++
1,210,038 UART: [ldev] CDI.KEYID = 6
1,210,401 UART: [ldev] SUBJECT.KEYID = 5
1,210,827 UART: [ldev] AUTHORITY.KEYID = 7
1,211,290 UART: [ldev] FE.KEYID = 1
1,216,718 UART: [ldev] Erasing FE.KEYID = 1
1,243,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,150 UART: [ldev] --
1,282,475 UART: [fwproc] Wait for Commands...
1,283,223 UART: [fwproc] Recv command 0x46574c44
1,283,951 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,431 UART: ROM Fatal Error: 0x000B0003
1,305,588 >>> mbox cmd response: failed
1,305,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,594 >>> mbox cmd response: failed
1,305,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,600 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
87,084 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
893,901 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,026 UART: [kat] ++
898,178 UART: [kat] sha1
902,480 UART: [kat] SHA2-256
904,420 UART: [kat] SHA2-384
907,177 UART: [kat] SHA2-512-ACC
909,078 UART: [kat] ECC-384
918,911 UART: [kat] HMAC-384Kdf
923,327 UART: [kat] LMS
1,171,655 UART: [kat] --
1,172,252 UART: [cold-reset] ++
1,172,696 UART: [fht] FHT @ 0x50003400
1,175,355 UART: [idev] ++
1,175,523 UART: [idev] CDI.KEYID = 6
1,175,883 UART: [idev] SUBJECT.KEYID = 7
1,176,307 UART: [idev] UDS.KEYID = 0
1,176,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,315 UART: [idev] Erasing UDS.KEYID = 0
1,201,240 UART: [idev] Sha1 KeyId Algorithm
1,209,806 UART: [idev] --
1,210,844 UART: [ldev] ++
1,211,012 UART: [ldev] CDI.KEYID = 6
1,211,375 UART: [ldev] SUBJECT.KEYID = 5
1,211,801 UART: [ldev] AUTHORITY.KEYID = 7
1,212,264 UART: [ldev] FE.KEYID = 1
1,217,592 UART: [ldev] Erasing FE.KEYID = 1
1,243,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,348 UART: [ldev] --
1,282,649 UART: [fwproc] Wait for Commands...
1,283,335 UART: [fwproc] Recv command 0x46574c44
1,284,063 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,552 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,722 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,869 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,919 >>> mbox cmd response: failed
1,160,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,925 >>> mbox cmd response: failed
1,160,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,931 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,862 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,031 UART:
192,391 UART: Running Caliptra ROM ...
193,523 UART:
193,670 UART: [state] CFI Enabled
265,112 UART: [state] LifecycleState = Unprovisioned
267,056 UART: [state] DebugLocked = No
269,644 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,537 UART: [kat] SHA2-256
444,262 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,773 UART: [kat] ++
455,273 UART: [kat] sha1
465,720 UART: [kat] SHA2-256
468,403 UART: [kat] SHA2-384
473,785 UART: [kat] SHA2-512-ACC
476,184 UART: [kat] ECC-384
2,767,974 UART: [kat] HMAC-384Kdf
2,799,548 UART: [kat] LMS
3,989,844 UART: [kat] --
3,994,006 UART: [cold-reset] ++
3,995,189 UART: [fht] Storing FHT @ 0x50003400
4,006,463 UART: [idev] ++
4,007,059 UART: [idev] CDI.KEYID = 6
4,007,952 UART: [idev] SUBJECT.KEYID = 7
4,009,230 UART: [idev] UDS.KEYID = 0
4,012,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,262 UART: [idev] Erasing UDS.KEYID = 0
7,350,038 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,452 UART: [idev] --
7,376,397 UART: [ldev] ++
7,376,977 UART: [ldev] CDI.KEYID = 6
7,378,049 UART: [ldev] SUBJECT.KEYID = 5
7,379,159 UART: [ldev] AUTHORITY.KEYID = 7
7,380,394 UART: [ldev] FE.KEYID = 1
7,421,974 UART: [ldev] Erasing FE.KEYID = 1
10,754,999 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,744 UART: [ldev] --
13,136,146 UART: [fwproc] Waiting for Commands...
13,139,272 UART: [fwproc] Received command 0x46574c44
13,141,462 UART: [fwproc] Received Image of size 118548 bytes
13,233,035 UART: ROM Fatal Error: 0x000B001B
13,236,519 >>> mbox cmd response: failed
13,236,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,237,297 >>> mbox cmd response: failed
13,237,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,237,864 >>> mbox cmd response: failed
Initializing fuses
2,060,565 writing to cptra_bootfsm_go
2,249,872 UART:
2,250,224 UART: Running Caliptra ROM ...
2,251,361 UART:
2,251,530 UART: [state] CFI Enabled
2,318,420 UART: [state] LifecycleState = Unprovisioned
2,320,416 UART: [state] DebugLocked = No
2,322,569 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,326,558 UART: [kat] SHA2-256
2,496,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,765 UART: [kat] ++
2,507,254 UART: [kat] sha1
2,517,277 UART: [kat] SHA2-256
2,519,972 UART: [kat] SHA2-384
2,526,714 UART: [kat] SHA2-512-ACC
2,529,073 UART: [kat] ECC-384
4,820,261 UART: [kat] HMAC-384Kdf
4,831,531 UART: [kat] LMS
6,021,871 UART: [kat] --
6,028,055 UART: [cold-reset] ++
6,030,703 UART: [fht] Storing FHT @ 0x50003400
6,042,244 UART: [idev] ++
6,042,817 UART: [idev] CDI.KEYID = 6
6,043,783 UART: [idev] SUBJECT.KEYID = 7
6,045,001 UART: [idev] UDS.KEYID = 0
6,047,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,196,808 UART: [idev] Erasing UDS.KEYID = 0
9,379,935 UART: [idev] Using Sha1 for KeyId Algorithm
9,401,956 UART: [idev] --
9,406,713 UART: [ldev] ++
9,407,292 UART: [ldev] CDI.KEYID = 6
9,408,258 UART: [ldev] SUBJECT.KEYID = 5
9,409,560 UART: [ldev] AUTHORITY.KEYID = 7
9,410,750 UART: [ldev] FE.KEYID = 1
9,456,473 UART: [ldev] Erasing FE.KEYID = 1
12,789,368 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,080,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,095,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,110,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,124,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,142,635 UART: [ldev] --
15,146,769 UART: [fwproc] Waiting for Commands...
15,149,357 UART: [fwproc] Received command 0x46574c44
15,151,544 UART: [fwproc] Received Image of size 118548 bytes
19,261,298 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,330,049 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,403,247 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,731,283 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,646 writing to cptra_bootfsm_go
3,786,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,940,766 >>> mbox cmd response: failed
12,941,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,941,637 >>> mbox cmd response: failed
12,941,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,942,204 >>> mbox cmd response: failed
Initializing fuses
2,049,046 writing to cptra_bootfsm_go
5,843,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,004,427 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,548 UART:
192,922 UART: Running Caliptra ROM ...
194,116 UART:
603,845 UART: [state] CFI Enabled
616,655 UART: [state] LifecycleState = Unprovisioned
618,545 UART: [state] DebugLocked = No
621,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,712 UART: [kat] SHA2-256
796,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,983 UART: [kat] ++
807,438 UART: [kat] sha1
817,621 UART: [kat] SHA2-256
820,299 UART: [kat] SHA2-384
825,211 UART: [kat] SHA2-512-ACC
827,572 UART: [kat] ECC-384
3,112,996 UART: [kat] HMAC-384Kdf
3,124,207 UART: [kat] LMS
4,314,331 UART: [kat] --
4,321,211 UART: [cold-reset] ++
4,322,948 UART: [fht] Storing FHT @ 0x50003400
4,333,359 UART: [idev] ++
4,333,932 UART: [idev] CDI.KEYID = 6
4,334,908 UART: [idev] SUBJECT.KEYID = 7
4,336,130 UART: [idev] UDS.KEYID = 0
4,339,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,128 UART: [idev] Erasing UDS.KEYID = 0
7,623,922 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,270 UART: [idev] --
7,650,567 UART: [ldev] ++
7,651,144 UART: [ldev] CDI.KEYID = 6
7,652,192 UART: [ldev] SUBJECT.KEYID = 5
7,653,361 UART: [ldev] AUTHORITY.KEYID = 7
7,654,606 UART: [ldev] FE.KEYID = 1
7,666,233 UART: [ldev] Erasing FE.KEYID = 1
10,955,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,040 UART: [ldev] --
13,315,838 UART: [fwproc] Waiting for Commands...
13,317,848 UART: [fwproc] Received command 0x46574c44
13,320,047 UART: [fwproc] Received Image of size 118548 bytes
13,419,741 UART: ROM Fatal Error: 0x000B001B
13,423,264 >>> mbox cmd response: failed
13,423,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,424,030 >>> mbox cmd response: failed
13,424,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,424,607 >>> mbox cmd response: failed
Initializing fuses
2,056,967 writing to cptra_bootfsm_go
2,246,269 UART:
2,246,613 UART: Running Caliptra ROM ...
2,247,668 UART:
7,046,098 UART: [state] CFI Enabled
7,063,881 UART: [state] LifecycleState = Unprovisioned
7,065,817 UART: [state] DebugLocked = No
7,067,223 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,072,630 UART: [kat] SHA2-256
7,242,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,252,911 UART: [kat] ++
7,253,404 UART: [kat] sha1
7,264,139 UART: [kat] SHA2-256
7,266,834 UART: [kat] SHA2-384
7,271,695 UART: [kat] SHA2-512-ACC
7,274,050 UART: [kat] ECC-384
9,557,568 UART: [kat] HMAC-384Kdf
9,568,892 UART: [kat] LMS
10,758,961 UART: [kat] --
10,763,314 UART: [cold-reset] ++
10,765,908 UART: [fht] Storing FHT @ 0x50003400
10,778,258 UART: [idev] ++
10,778,834 UART: [idev] CDI.KEYID = 6
10,779,775 UART: [idev] SUBJECT.KEYID = 7
10,781,044 UART: [idev] UDS.KEYID = 0
10,783,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,932,441 UART: [idev] Erasing UDS.KEYID = 0
14,070,615 UART: [idev] Using Sha1 for KeyId Algorithm
14,092,443 UART: [idev] --
14,096,987 UART: [ldev] ++
14,097,563 UART: [ldev] CDI.KEYID = 6
14,098,507 UART: [ldev] SUBJECT.KEYID = 5
14,099,770 UART: [ldev] AUTHORITY.KEYID = 7
14,101,016 UART: [ldev] FE.KEYID = 1
14,114,515 UART: [ldev] Erasing FE.KEYID = 1
17,399,565 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,692,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,707,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,722,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,736,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,755,999 UART: [ldev] --
19,760,529 UART: [fwproc] Waiting for Commands...
19,763,284 UART: [fwproc] Received command 0x46574c44
19,765,476 UART: [fwproc] Received Image of size 118548 bytes
23,872,840 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,950,995 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,024,180 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,352,517 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,575 writing to cptra_bootfsm_go
4,123,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,150,909 >>> mbox cmd response: failed
13,151,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,152,060 >>> mbox cmd response: failed
13,152,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,152,632 >>> mbox cmd response: failed
Initializing fuses
2,052,360 writing to cptra_bootfsm_go
10,836,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,866,392 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
192,204 UART:
192,586 UART: Running Caliptra ROM ...
193,774 UART:
193,929 UART: [state] CFI Enabled
262,021 UART: [state] LifecycleState = Unprovisioned
263,985 UART: [state] DebugLocked = No
266,455 UART: [state] WD Timer not started. Device not locked for debugging
270,412 UART: [kat] SHA2-256
450,105 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,853 UART: [kat] ++
461,391 UART: [kat] sha1
472,928 UART: [kat] SHA2-256
475,667 UART: [kat] SHA2-384
480,886 UART: [kat] SHA2-512-ACC
483,283 UART: [kat] ECC-384
2,946,048 UART: [kat] HMAC-384Kdf
2,970,609 UART: [kat] LMS
3,447,145 UART: [kat] --
3,450,605 UART: [cold-reset] ++
3,451,841 UART: [fht] FHT @ 0x50003400
3,463,356 UART: [idev] ++
3,463,993 UART: [idev] CDI.KEYID = 6
3,464,887 UART: [idev] SUBJECT.KEYID = 7
3,466,113 UART: [idev] UDS.KEYID = 0
3,469,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,232 UART: [idev] Erasing UDS.KEYID = 0
5,989,137 UART: [idev] Sha1 KeyId Algorithm
6,013,238 UART: [idev] --
6,018,438 UART: [ldev] ++
6,019,021 UART: [ldev] CDI.KEYID = 6
6,019,941 UART: [ldev] SUBJECT.KEYID = 5
6,021,199 UART: [ldev] AUTHORITY.KEYID = 7
6,022,402 UART: [ldev] FE.KEYID = 1
6,060,281 UART: [ldev] Erasing FE.KEYID = 1
8,566,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,712 UART: [ldev] --
10,376,338 UART: [fwproc] Wait for Commands...
10,379,141 UART: [fwproc] Recv command 0x46574c44
10,381,132 UART: [fwproc] Recv'd Img size: 118548 bytes
10,494,803 UART: ROM Fatal Error: 0x000B001B
10,498,061 >>> mbox cmd response: failed
10,498,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,498,721 >>> mbox cmd response: failed
10,498,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,499,287 >>> mbox cmd response: failed
Initializing fuses
2,060,777 writing to cptra_bootfsm_go
2,250,094 UART:
2,250,454 UART: Running Caliptra ROM ...
2,251,598 UART:
2,251,767 UART: [state] CFI Enabled
2,308,174 UART: [state] LifecycleState = Unprovisioned
2,310,065 UART: [state] DebugLocked = No
2,312,969 UART: [state] WD Timer not started. Device not locked for debugging
2,316,077 UART: [kat] SHA2-256
2,495,741 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,506,542 UART: [kat] ++
2,507,009 UART: [kat] sha1
2,517,686 UART: [kat] SHA2-256
2,520,394 UART: [kat] SHA2-384
2,526,609 UART: [kat] SHA2-512-ACC
2,528,972 UART: [kat] ECC-384
4,972,381 UART: [kat] HMAC-384Kdf
4,996,595 UART: [kat] LMS
5,473,040 UART: [kat] --
5,478,873 UART: [cold-reset] ++
5,481,353 UART: [fht] FHT @ 0x50003400
5,493,369 UART: [idev] ++
5,493,945 UART: [idev] CDI.KEYID = 6
5,494,873 UART: [idev] SUBJECT.KEYID = 7
5,496,090 UART: [idev] UDS.KEYID = 0
5,498,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,648,164 UART: [idev] Erasing UDS.KEYID = 0
8,016,501 UART: [idev] Sha1 KeyId Algorithm
8,040,133 UART: [idev] --
8,046,136 UART: [ldev] ++
8,046,715 UART: [ldev] CDI.KEYID = 6
8,047,632 UART: [ldev] SUBJECT.KEYID = 5
8,048,876 UART: [ldev] AUTHORITY.KEYID = 7
8,050,126 UART: [ldev] FE.KEYID = 1
8,084,181 UART: [ldev] Erasing FE.KEYID = 1
10,591,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,326,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,342,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,357,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,373,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,396,221 UART: [ldev] --
12,401,740 UART: [fwproc] Wait for Commands...
12,404,653 UART: [fwproc] Recv command 0x46574c44
12,406,659 UART: [fwproc] Recv'd Img size: 118548 bytes
15,889,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,973,108 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,046,118 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,374,667 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,462,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,361,920 >>> mbox cmd response: failed
10,362,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,362,825 >>> mbox cmd response: failed
10,363,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,363,401 >>> mbox cmd response: failed
Initializing fuses
2,059,814 writing to cptra_bootfsm_go
5,516,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,279,430 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,560 UART:
192,925 UART: Running Caliptra ROM ...
194,067 UART:
603,688 UART: [state] CFI Enabled
618,663 UART: [state] LifecycleState = Unprovisioned
620,585 UART: [state] DebugLocked = No
622,298 UART: [state] WD Timer not started. Device not locked for debugging
626,099 UART: [kat] SHA2-256
805,730 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,536 UART: [kat] ++
817,025 UART: [kat] sha1
829,639 UART: [kat] SHA2-256
832,329 UART: [kat] SHA2-384
837,662 UART: [kat] SHA2-512-ACC
840,010 UART: [kat] ECC-384
3,284,205 UART: [kat] HMAC-384Kdf
3,296,760 UART: [kat] LMS
3,773,265 UART: [kat] --
3,778,278 UART: [cold-reset] ++
3,780,428 UART: [fht] FHT @ 0x50003400
3,791,683 UART: [idev] ++
3,792,253 UART: [idev] CDI.KEYID = 6
3,793,194 UART: [idev] SUBJECT.KEYID = 7
3,794,459 UART: [idev] UDS.KEYID = 0
3,797,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,734 UART: [idev] Erasing UDS.KEYID = 0
6,271,536 UART: [idev] Sha1 KeyId Algorithm
6,295,496 UART: [idev] --
6,299,933 UART: [ldev] ++
6,300,564 UART: [ldev] CDI.KEYID = 6
6,301,491 UART: [ldev] SUBJECT.KEYID = 5
6,302,661 UART: [ldev] AUTHORITY.KEYID = 7
6,303,950 UART: [ldev] FE.KEYID = 1
6,312,601 UART: [ldev] Erasing FE.KEYID = 1
8,788,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,749 UART: [ldev] --
10,580,521 UART: [fwproc] Wait for Commands...
10,582,919 UART: [fwproc] Recv command 0x46574c44
10,584,914 UART: [fwproc] Recv'd Img size: 118548 bytes
10,694,805 UART: ROM Fatal Error: 0x000B001B
10,698,055 >>> mbox cmd response: failed
10,698,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,698,845 >>> mbox cmd response: failed
10,699,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,699,410 >>> mbox cmd response: failed
Initializing fuses
2,058,657 writing to cptra_bootfsm_go
2,247,963 UART:
2,248,313 UART: Running Caliptra ROM ...
2,249,456 UART:
9,755,579 UART: [state] CFI Enabled
9,768,776 UART: [state] LifecycleState = Unprovisioned
9,770,690 UART: [state] DebugLocked = No
9,772,443 UART: [state] WD Timer not started. Device not locked for debugging
9,776,197 UART: [kat] SHA2-256
9,955,844 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,966,674 UART: [kat] ++
9,967,145 UART: [kat] sha1
9,978,255 UART: [kat] SHA2-256
9,980,959 UART: [kat] SHA2-384
9,988,197 UART: [kat] SHA2-512-ACC
9,990,555 UART: [kat] ECC-384
12,434,658 UART: [kat] HMAC-384Kdf
12,446,266 UART: [kat] LMS
12,922,767 UART: [kat] --
12,929,250 UART: [cold-reset] ++
12,931,151 UART: [fht] FHT @ 0x50003400
12,941,219 UART: [idev] ++
12,941,792 UART: [idev] CDI.KEYID = 6
12,942,813 UART: [idev] SUBJECT.KEYID = 7
12,943,978 UART: [idev] UDS.KEYID = 0
12,947,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,096,234 UART: [idev] Erasing UDS.KEYID = 0
15,418,736 UART: [idev] Sha1 KeyId Algorithm
15,442,244 UART: [idev] --
15,447,001 UART: [ldev] ++
15,447,582 UART: [ldev] CDI.KEYID = 6
15,448,605 UART: [ldev] SUBJECT.KEYID = 5
15,449,712 UART: [ldev] AUTHORITY.KEYID = 7
15,451,001 UART: [ldev] FE.KEYID = 1
15,464,797 UART: [ldev] Erasing FE.KEYID = 1
17,938,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,656,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,672,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,688,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,703,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,725,935 UART: [ldev] --
19,730,891 UART: [fwproc] Wait for Commands...
19,732,785 UART: [fwproc] Recv command 0x46574c44
19,734,778 UART: [fwproc] Recv'd Img size: 118548 bytes
23,215,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,295,540 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,368,567 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,696,060 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,297 writing to cptra_bootfsm_go
3,776,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,587,425 >>> mbox cmd response: failed
10,588,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,588,430 >>> mbox cmd response: failed
10,588,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,588,999 >>> mbox cmd response: failed
Initializing fuses
2,068,632 writing to cptra_bootfsm_go
13,059,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,720,431 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,089 UART:
192,492 UART: Running Caliptra ROM ...
193,689 UART:
193,852 UART: [state] CFI Enabled
261,155 UART: [state] LifecycleState = Unprovisioned
263,277 UART: [state] DebugLocked = No
264,370 UART: [state] WD Timer not started. Device not locked for debugging
268,117 UART: [kat] SHA2-256
457,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,756 UART: [kat] ++
469,208 UART: [kat] sha1
480,951 UART: [kat] SHA2-256
483,968 UART: [kat] SHA2-384
490,658 UART: [kat] SHA2-512-ACC
493,279 UART: [kat] ECC-384
2,946,564 UART: [kat] HMAC-384Kdf
2,970,857 UART: [kat] LMS
3,502,631 UART: [kat] --
3,506,579 UART: [cold-reset] ++
3,508,468 UART: [fht] FHT @ 0x50003400
3,520,452 UART: [idev] ++
3,521,144 UART: [idev] CDI.KEYID = 6
3,522,169 UART: [idev] SUBJECT.KEYID = 7
3,523,332 UART: [idev] UDS.KEYID = 0
3,526,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,454 UART: [idev] Erasing UDS.KEYID = 0
6,041,556 UART: [idev] Sha1 KeyId Algorithm
6,064,405 UART: [idev] --
6,069,168 UART: [ldev] ++
6,069,856 UART: [ldev] CDI.KEYID = 6
6,070,772 UART: [ldev] SUBJECT.KEYID = 5
6,071,995 UART: [ldev] AUTHORITY.KEYID = 7
6,073,179 UART: [ldev] FE.KEYID = 1
6,113,859 UART: [ldev] Erasing FE.KEYID = 1
8,616,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,384,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,399,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,420,572 UART: [ldev] --
10,425,263 UART: [fwproc] Wait for Commands...
10,428,180 UART: [fwproc] Recv command 0x46574c44
10,430,497 UART: [fwproc] Recv'd Img size: 118548 bytes
10,559,651 UART: ROM Fatal Error: 0x000B001B
10,563,346 >>> mbox cmd response: failed
10,563,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,564,169 >>> mbox cmd response: failed
10,564,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,564,736 >>> mbox cmd response: failed
Initializing fuses
2,067,755 writing to cptra_bootfsm_go
2,257,135 UART:
2,257,485 UART: Running Caliptra ROM ...
2,258,621 UART:
2,258,803 UART: [state] CFI Enabled
2,319,633 UART: [state] LifecycleState = Unprovisioned
2,321,965 UART: [state] DebugLocked = No
2,323,787 UART: [state] WD Timer not started. Device not locked for debugging
2,328,859 UART: [kat] SHA2-256
2,518,754 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,529,512 UART: [kat] ++
2,530,008 UART: [kat] sha1
2,541,665 UART: [kat] SHA2-256
2,544,702 UART: [kat] SHA2-384
2,550,538 UART: [kat] SHA2-512-ACC
2,553,137 UART: [kat] ECC-384
5,005,721 UART: [kat] HMAC-384Kdf
5,028,883 UART: [kat] LMS
5,560,616 UART: [kat] --
5,563,478 UART: [cold-reset] ++
5,564,548 UART: [fht] FHT @ 0x50003400
5,574,775 UART: [idev] ++
5,575,458 UART: [idev] CDI.KEYID = 6
5,576,427 UART: [idev] SUBJECT.KEYID = 7
5,577,644 UART: [idev] UDS.KEYID = 0
5,579,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,729,151 UART: [idev] Erasing UDS.KEYID = 0
8,084,392 UART: [idev] Sha1 KeyId Algorithm
8,107,195 UART: [idev] --
8,111,337 UART: [ldev] ++
8,112,032 UART: [ldev] CDI.KEYID = 6
8,112,969 UART: [ldev] SUBJECT.KEYID = 5
8,114,138 UART: [ldev] AUTHORITY.KEYID = 7
8,115,376 UART: [ldev] FE.KEYID = 1
8,157,505 UART: [ldev] Erasing FE.KEYID = 1
10,661,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,441 UART: [ldev] --
12,469,517 UART: [fwproc] Wait for Commands...
12,471,885 UART: [fwproc] Recv command 0x46574c44
12,474,196 UART: [fwproc] Recv'd Img size: 118548 bytes
15,970,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,055,147 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,178,781 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,739,013 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,420,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,324,813 >>> mbox cmd response: failed
10,325,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,325,960 >>> mbox cmd response: failed
10,326,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,326,552 >>> mbox cmd response: failed
Initializing fuses
2,054,024 writing to cptra_bootfsm_go
5,466,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,874,599 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
192,624 UART:
192,973 UART: Running Caliptra ROM ...
194,165 UART:
603,703 UART: [state] CFI Enabled
615,434 UART: [state] LifecycleState = Unprovisioned
617,856 UART: [state] DebugLocked = No
619,350 UART: [state] WD Timer not started. Device not locked for debugging
623,968 UART: [kat] SHA2-256
813,854 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,613 UART: [kat] ++
825,206 UART: [kat] sha1
838,091 UART: [kat] SHA2-256
841,111 UART: [kat] SHA2-384
847,797 UART: [kat] SHA2-512-ACC
850,415 UART: [kat] ECC-384
3,289,030 UART: [kat] HMAC-384Kdf
3,300,957 UART: [kat] LMS
3,832,804 UART: [kat] --
3,835,090 UART: [cold-reset] ++
3,836,984 UART: [fht] FHT @ 0x50003400
3,849,119 UART: [idev] ++
3,849,802 UART: [idev] CDI.KEYID = 6
3,850,823 UART: [idev] SUBJECT.KEYID = 7
3,851,993 UART: [idev] UDS.KEYID = 0
3,854,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,931 UART: [idev] Erasing UDS.KEYID = 0
6,333,113 UART: [idev] Sha1 KeyId Algorithm
6,355,781 UART: [idev] --
6,361,293 UART: [ldev] ++
6,361,980 UART: [ldev] CDI.KEYID = 6
6,362,912 UART: [ldev] SUBJECT.KEYID = 5
6,364,102 UART: [ldev] AUTHORITY.KEYID = 7
6,365,286 UART: [ldev] FE.KEYID = 1
6,376,486 UART: [ldev] Erasing FE.KEYID = 1
8,856,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,412 UART: [ldev] --
10,650,285 UART: [fwproc] Wait for Commands...
10,652,922 UART: [fwproc] Recv command 0x46574c44
10,655,203 UART: [fwproc] Recv'd Img size: 118548 bytes
10,783,419 UART: ROM Fatal Error: 0x000B001B
10,787,115 >>> mbox cmd response: failed
10,787,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,787,901 >>> mbox cmd response: failed
10,788,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,788,499 >>> mbox cmd response: failed
Initializing fuses
2,072,119 writing to cptra_bootfsm_go
2,261,452 UART:
2,261,796 UART: Running Caliptra ROM ...
2,262,885 UART:
9,666,890 UART: [state] CFI Enabled
9,678,303 UART: [state] LifecycleState = Unprovisioned
9,680,343 UART: [state] DebugLocked = No
9,681,689 UART: [state] WD Timer not started. Device not locked for debugging
9,685,568 UART: [kat] SHA2-256
9,875,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,886,195 UART: [kat] ++
9,886,660 UART: [kat] sha1
9,898,148 UART: [kat] SHA2-256
9,901,127 UART: [kat] SHA2-384
9,907,212 UART: [kat] SHA2-512-ACC
9,909,801 UART: [kat] ECC-384
12,351,323 UART: [kat] HMAC-384Kdf
12,364,055 UART: [kat] LMS
12,895,841 UART: [kat] --
12,898,863 UART: [cold-reset] ++
12,901,398 UART: [fht] FHT @ 0x50003400
12,912,493 UART: [idev] ++
12,913,184 UART: [idev] CDI.KEYID = 6
12,914,207 UART: [idev] SUBJECT.KEYID = 7
12,915,317 UART: [idev] UDS.KEYID = 0
12,917,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,066,693 UART: [idev] Erasing UDS.KEYID = 0
15,393,239 UART: [idev] Sha1 KeyId Algorithm
15,415,189 UART: [idev] --
15,419,898 UART: [ldev] ++
15,420,580 UART: [ldev] CDI.KEYID = 6
15,421,490 UART: [ldev] SUBJECT.KEYID = 5
15,422,808 UART: [ldev] AUTHORITY.KEYID = 7
15,424,009 UART: [ldev] FE.KEYID = 1
15,435,181 UART: [ldev] Erasing FE.KEYID = 1
17,910,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,629,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,645,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,660,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,675,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,695,391 UART: [ldev] --
19,700,501 UART: [fwproc] Wait for Commands...
19,703,435 UART: [fwproc] Recv command 0x46574c44
19,705,772 UART: [fwproc] Recv'd Img size: 118548 bytes
23,205,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,284,380 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,408,012 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,968,520 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
3,755,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,564,267 >>> mbox cmd response: failed
10,564,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,565,254 >>> mbox cmd response: failed
10,565,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,565,838 >>> mbox cmd response: failed
Initializing fuses
2,052,721 writing to cptra_bootfsm_go
13,053,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,335,737 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,606 UART: [state] LifecycleState = Unprovisioned
85,261 UART: [state] DebugLocked = No
85,909 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,533 UART: [kat] SHA2-256
881,464 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,579 UART: [kat] ++
885,731 UART: [kat] sha1
889,935 UART: [kat] SHA2-256
891,873 UART: [kat] SHA2-384
894,628 UART: [kat] SHA2-512-ACC
896,529 UART: [kat] ECC-384
901,714 UART: [kat] HMAC-384Kdf
906,384 UART: [kat] LMS
1,474,580 UART: [kat] --
1,475,565 UART: [cold-reset] ++
1,476,077 UART: [fht] Storing FHT @ 0x50003400
1,478,826 UART: [idev] ++
1,478,994 UART: [idev] CDI.KEYID = 6
1,479,354 UART: [idev] SUBJECT.KEYID = 7
1,479,778 UART: [idev] UDS.KEYID = 0
1,480,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,760 UART: [idev] Erasing UDS.KEYID = 0
1,504,706 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,262 UART: [idev] --
1,514,353 UART: [ldev] ++
1,514,521 UART: [ldev] CDI.KEYID = 6
1,514,884 UART: [ldev] SUBJECT.KEYID = 5
1,515,310 UART: [ldev] AUTHORITY.KEYID = 7
1,515,773 UART: [ldev] FE.KEYID = 1
1,521,139 UART: [ldev] Erasing FE.KEYID = 1
1,546,978 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,878 UART: [ldev] --
1,586,215 UART: [fwproc] Waiting for Commands...
1,586,866 UART: [fwproc] Received command 0x46574c44
1,587,657 UART: [fwproc] Received Image of size 118548 bytes
1,622,992 UART: ROM Fatal Error: 0x000B001B
1,624,151 >>> mbox cmd response: failed
1,624,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,157 >>> mbox cmd response: failed
1,624,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,163 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,115 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,637 UART: [kat] SHA2-256
881,568 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,683 UART: [kat] ++
885,835 UART: [kat] sha1
890,095 UART: [kat] SHA2-256
892,033 UART: [kat] SHA2-384
894,782 UART: [kat] SHA2-512-ACC
896,683 UART: [kat] ECC-384
902,100 UART: [kat] HMAC-384Kdf
906,754 UART: [kat] LMS
1,474,950 UART: [kat] --
1,476,107 UART: [cold-reset] ++
1,476,621 UART: [fht] Storing FHT @ 0x50003400
1,479,484 UART: [idev] ++
1,479,652 UART: [idev] CDI.KEYID = 6
1,480,012 UART: [idev] SUBJECT.KEYID = 7
1,480,436 UART: [idev] UDS.KEYID = 0
1,480,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,150 UART: [idev] Erasing UDS.KEYID = 0
1,505,018 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,660 UART: [idev] --
1,514,569 UART: [ldev] ++
1,514,737 UART: [ldev] CDI.KEYID = 6
1,515,100 UART: [ldev] SUBJECT.KEYID = 5
1,515,526 UART: [ldev] AUTHORITY.KEYID = 7
1,515,989 UART: [ldev] FE.KEYID = 1
1,520,915 UART: [ldev] Erasing FE.KEYID = 1
1,546,624 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,278 UART: [ldev] --
1,585,779 UART: [fwproc] Waiting for Commands...
1,586,440 UART: [fwproc] Received command 0x46574c44
1,587,231 UART: [fwproc] Received Image of size 118548 bytes
2,931,194 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,478 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,696 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,141 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,474,924 >>> mbox cmd response: failed
1,474,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,930 >>> mbox cmd response: failed
1,474,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,936 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,761 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,146 UART: [kat] SHA2-256
882,077 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,192 UART: [kat] ++
886,344 UART: [kat] sha1
890,678 UART: [kat] SHA2-256
892,616 UART: [kat] SHA2-384
895,383 UART: [kat] SHA2-512-ACC
897,284 UART: [kat] ECC-384
902,995 UART: [kat] HMAC-384Kdf
907,533 UART: [kat] LMS
1,475,729 UART: [kat] --
1,476,922 UART: [cold-reset] ++
1,477,304 UART: [fht] Storing FHT @ 0x50003400
1,479,965 UART: [idev] ++
1,480,133 UART: [idev] CDI.KEYID = 6
1,480,493 UART: [idev] SUBJECT.KEYID = 7
1,480,917 UART: [idev] UDS.KEYID = 0
1,481,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,929 UART: [idev] Erasing UDS.KEYID = 0
1,504,879 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,651 UART: [idev] --
1,514,668 UART: [ldev] ++
1,514,836 UART: [ldev] CDI.KEYID = 6
1,515,199 UART: [ldev] SUBJECT.KEYID = 5
1,515,625 UART: [ldev] AUTHORITY.KEYID = 7
1,516,088 UART: [ldev] FE.KEYID = 1
1,521,692 UART: [ldev] Erasing FE.KEYID = 1
1,547,307 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,373 UART: [ldev] --
1,586,866 UART: [fwproc] Waiting for Commands...
1,587,705 UART: [fwproc] Received command 0x46574c44
1,588,496 UART: [fwproc] Received Image of size 118548 bytes
1,624,031 UART: ROM Fatal Error: 0x000B001B
1,625,190 >>> mbox cmd response: failed
1,625,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,196 >>> mbox cmd response: failed
1,625,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,202 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,684 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,378 UART: [kat] SHA2-256
882,309 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,424 UART: [kat] ++
886,576 UART: [kat] sha1
890,680 UART: [kat] SHA2-256
892,618 UART: [kat] SHA2-384
895,389 UART: [kat] SHA2-512-ACC
897,290 UART: [kat] ECC-384
903,291 UART: [kat] HMAC-384Kdf
907,905 UART: [kat] LMS
1,476,101 UART: [kat] --
1,476,890 UART: [cold-reset] ++
1,477,270 UART: [fht] Storing FHT @ 0x50003400
1,480,011 UART: [idev] ++
1,480,179 UART: [idev] CDI.KEYID = 6
1,480,539 UART: [idev] SUBJECT.KEYID = 7
1,480,963 UART: [idev] UDS.KEYID = 0
1,481,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,063 UART: [idev] Erasing UDS.KEYID = 0
1,505,917 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,505 UART: [idev] --
1,515,536 UART: [ldev] ++
1,515,704 UART: [ldev] CDI.KEYID = 6
1,516,067 UART: [ldev] SUBJECT.KEYID = 5
1,516,493 UART: [ldev] AUTHORITY.KEYID = 7
1,516,956 UART: [ldev] FE.KEYID = 1
1,522,262 UART: [ldev] Erasing FE.KEYID = 1
1,547,803 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,065 UART: [ldev] --
1,587,576 UART: [fwproc] Waiting for Commands...
1,588,365 UART: [fwproc] Received command 0x46574c44
1,589,156 UART: [fwproc] Received Image of size 118548 bytes
2,933,455 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,743 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,961 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,264 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,475,841 >>> mbox cmd response: failed
1,475,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,847 >>> mbox cmd response: failed
1,475,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,853 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,488 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,042 UART: [kat] ++
895,194 UART: [kat] sha1
899,504 UART: [kat] SHA2-256
901,444 UART: [kat] SHA2-384
904,265 UART: [kat] SHA2-512-ACC
906,166 UART: [kat] ECC-384
915,435 UART: [kat] HMAC-384Kdf
920,209 UART: [kat] LMS
1,168,521 UART: [kat] --
1,169,420 UART: [cold-reset] ++
1,169,930 UART: [fht] FHT @ 0x50003400
1,172,552 UART: [idev] ++
1,172,720 UART: [idev] CDI.KEYID = 6
1,173,081 UART: [idev] SUBJECT.KEYID = 7
1,173,506 UART: [idev] UDS.KEYID = 0
1,173,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,315 UART: [idev] Erasing UDS.KEYID = 0
1,198,527 UART: [idev] Sha1 KeyId Algorithm
1,207,319 UART: [idev] --
1,208,492 UART: [ldev] ++
1,208,660 UART: [ldev] CDI.KEYID = 6
1,209,024 UART: [ldev] SUBJECT.KEYID = 5
1,209,451 UART: [ldev] AUTHORITY.KEYID = 7
1,209,914 UART: [ldev] FE.KEYID = 1
1,215,114 UART: [ldev] Erasing FE.KEYID = 1
1,241,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,304 UART: [ldev] --
1,280,591 UART: [fwproc] Wait for Commands...
1,281,220 UART: [fwproc] Recv command 0x46574c44
1,281,953 UART: [fwproc] Recv'd Img size: 118548 bytes
1,316,341 UART: ROM Fatal Error: 0x000B001B
1,317,500 >>> mbox cmd response: failed
1,317,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,506 >>> mbox cmd response: failed
1,317,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,648 UART: [state] LifecycleState = Unprovisioned
86,303 UART: [state] DebugLocked = No
86,957 UART: [state] WD Timer not started. Device not locked for debugging
88,220 UART: [kat] SHA2-256
891,770 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,874 UART: [kat] ++
896,026 UART: [kat] sha1
900,370 UART: [kat] SHA2-256
902,310 UART: [kat] SHA2-384
905,073 UART: [kat] SHA2-512-ACC
906,974 UART: [kat] ECC-384
916,781 UART: [kat] HMAC-384Kdf
921,223 UART: [kat] LMS
1,169,535 UART: [kat] --
1,170,312 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,384 UART: [idev] ++
1,173,552 UART: [idev] CDI.KEYID = 6
1,173,913 UART: [idev] SUBJECT.KEYID = 7
1,174,338 UART: [idev] UDS.KEYID = 0
1,174,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,171 UART: [idev] Erasing UDS.KEYID = 0
1,199,589 UART: [idev] Sha1 KeyId Algorithm
1,208,327 UART: [idev] --
1,209,300 UART: [ldev] ++
1,209,468 UART: [ldev] CDI.KEYID = 6
1,209,832 UART: [ldev] SUBJECT.KEYID = 5
1,210,259 UART: [ldev] AUTHORITY.KEYID = 7
1,210,722 UART: [ldev] FE.KEYID = 1
1,215,552 UART: [ldev] Erasing FE.KEYID = 1
1,241,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,480 UART: [ldev] --
1,280,745 UART: [fwproc] Wait for Commands...
1,281,394 UART: [fwproc] Recv command 0x46574c44
1,282,127 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,178 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,353 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,708 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,174,175 >>> mbox cmd response: failed
1,174,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,181 >>> mbox cmd response: failed
1,174,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,580 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,399 UART: [kat] ++
895,551 UART: [kat] sha1
899,961 UART: [kat] SHA2-256
901,901 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
915,836 UART: [kat] HMAC-384Kdf
920,286 UART: [kat] LMS
1,168,598 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,211 UART: [fht] FHT @ 0x50003400
1,172,669 UART: [idev] ++
1,172,837 UART: [idev] CDI.KEYID = 6
1,173,198 UART: [idev] SUBJECT.KEYID = 7
1,173,623 UART: [idev] UDS.KEYID = 0
1,173,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,604 UART: [idev] Erasing UDS.KEYID = 0
1,199,112 UART: [idev] Sha1 KeyId Algorithm
1,207,964 UART: [idev] --
1,209,009 UART: [ldev] ++
1,209,177 UART: [ldev] CDI.KEYID = 6
1,209,541 UART: [ldev] SUBJECT.KEYID = 5
1,209,968 UART: [ldev] AUTHORITY.KEYID = 7
1,210,431 UART: [ldev] FE.KEYID = 1
1,215,695 UART: [ldev] Erasing FE.KEYID = 1
1,241,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,483 UART: [ldev] --
1,280,842 UART: [fwproc] Wait for Commands...
1,281,471 UART: [fwproc] Recv command 0x46574c44
1,282,204 UART: [fwproc] Recv'd Img size: 118548 bytes
1,317,114 UART: ROM Fatal Error: 0x000B001B
1,318,273 >>> mbox cmd response: failed
1,318,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,279 >>> mbox cmd response: failed
1,318,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,285 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,476 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,471 UART: [kat] ++
895,623 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,574 UART: [kat] SHA2-512-ACC
906,475 UART: [kat] ECC-384
916,106 UART: [kat] HMAC-384Kdf
920,802 UART: [kat] LMS
1,169,114 UART: [kat] --
1,169,815 UART: [cold-reset] ++
1,170,255 UART: [fht] FHT @ 0x50003400
1,172,797 UART: [idev] ++
1,172,965 UART: [idev] CDI.KEYID = 6
1,173,326 UART: [idev] SUBJECT.KEYID = 7
1,173,751 UART: [idev] UDS.KEYID = 0
1,174,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,728 UART: [idev] Erasing UDS.KEYID = 0
1,198,814 UART: [idev] Sha1 KeyId Algorithm
1,207,712 UART: [idev] --
1,208,755 UART: [ldev] ++
1,208,923 UART: [ldev] CDI.KEYID = 6
1,209,287 UART: [ldev] SUBJECT.KEYID = 5
1,209,714 UART: [ldev] AUTHORITY.KEYID = 7
1,210,177 UART: [ldev] FE.KEYID = 1
1,215,405 UART: [ldev] Erasing FE.KEYID = 1
1,241,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,083 UART: [ldev] --
1,280,512 UART: [fwproc] Wait for Commands...
1,281,211 UART: [fwproc] Recv command 0x46574c44
1,281,944 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,799 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,974 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,153 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,173,688 >>> mbox cmd response: failed
1,173,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,694 >>> mbox cmd response: failed
1,173,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,770 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
893,404 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,529 UART: [kat] ++
897,681 UART: [kat] sha1
901,853 UART: [kat] SHA2-256
903,793 UART: [kat] SHA2-384
906,584 UART: [kat] SHA2-512-ACC
908,485 UART: [kat] ECC-384
918,156 UART: [kat] HMAC-384Kdf
922,836 UART: [kat] LMS
1,171,164 UART: [kat] --
1,172,327 UART: [cold-reset] ++
1,172,867 UART: [fht] FHT @ 0x50003400
1,175,630 UART: [idev] ++
1,175,798 UART: [idev] CDI.KEYID = 6
1,176,158 UART: [idev] SUBJECT.KEYID = 7
1,176,582 UART: [idev] UDS.KEYID = 0
1,176,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,464 UART: [idev] Erasing UDS.KEYID = 0
1,201,151 UART: [idev] Sha1 KeyId Algorithm
1,209,819 UART: [idev] --
1,211,025 UART: [ldev] ++
1,211,193 UART: [ldev] CDI.KEYID = 6
1,211,556 UART: [ldev] SUBJECT.KEYID = 5
1,211,982 UART: [ldev] AUTHORITY.KEYID = 7
1,212,445 UART: [ldev] FE.KEYID = 1
1,217,665 UART: [ldev] Erasing FE.KEYID = 1
1,243,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,287 UART: [ldev] --
1,282,636 UART: [fwproc] Wait for Commands...
1,283,384 UART: [fwproc] Recv command 0x46574c44
1,284,112 UART: [fwproc] Recv'd Img size: 118548 bytes
1,319,015 UART: ROM Fatal Error: 0x000B001B
1,320,174 >>> mbox cmd response: failed
1,320,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,180 >>> mbox cmd response: failed
1,320,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,813 UART: [kat] SHA2-256
903,753 UART: [kat] SHA2-384
906,668 UART: [kat] SHA2-512-ACC
908,569 UART: [kat] ECC-384
917,958 UART: [kat] HMAC-384Kdf
922,416 UART: [kat] LMS
1,170,744 UART: [kat] --
1,171,751 UART: [cold-reset] ++
1,172,281 UART: [fht] FHT @ 0x50003400
1,174,884 UART: [idev] ++
1,175,052 UART: [idev] CDI.KEYID = 6
1,175,412 UART: [idev] SUBJECT.KEYID = 7
1,175,836 UART: [idev] UDS.KEYID = 0
1,176,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,704 UART: [idev] Erasing UDS.KEYID = 0
1,200,345 UART: [idev] Sha1 KeyId Algorithm
1,208,931 UART: [idev] --
1,210,103 UART: [ldev] ++
1,210,271 UART: [ldev] CDI.KEYID = 6
1,210,634 UART: [ldev] SUBJECT.KEYID = 5
1,211,060 UART: [ldev] AUTHORITY.KEYID = 7
1,211,523 UART: [ldev] FE.KEYID = 1
1,216,921 UART: [ldev] Erasing FE.KEYID = 1
1,243,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,069 UART: [ldev] --
1,282,450 UART: [fwproc] Wait for Commands...
1,283,176 UART: [fwproc] Recv command 0x46574c44
1,283,904 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,658 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,813 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,983 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,198 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,174,445 >>> mbox cmd response: failed
1,174,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,451 >>> mbox cmd response: failed
1,174,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,951 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
893,835 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,960 UART: [kat] ++
898,112 UART: [kat] sha1
902,470 UART: [kat] SHA2-256
904,410 UART: [kat] SHA2-384
907,241 UART: [kat] SHA2-512-ACC
909,142 UART: [kat] ECC-384
918,831 UART: [kat] HMAC-384Kdf
923,449 UART: [kat] LMS
1,171,777 UART: [kat] --
1,172,280 UART: [cold-reset] ++
1,172,698 UART: [fht] FHT @ 0x50003400
1,175,391 UART: [idev] ++
1,175,559 UART: [idev] CDI.KEYID = 6
1,175,919 UART: [idev] SUBJECT.KEYID = 7
1,176,343 UART: [idev] UDS.KEYID = 0
1,176,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,229 UART: [idev] Erasing UDS.KEYID = 0
1,201,530 UART: [idev] Sha1 KeyId Algorithm
1,210,102 UART: [idev] --
1,211,164 UART: [ldev] ++
1,211,332 UART: [ldev] CDI.KEYID = 6
1,211,695 UART: [ldev] SUBJECT.KEYID = 5
1,212,121 UART: [ldev] AUTHORITY.KEYID = 7
1,212,584 UART: [ldev] FE.KEYID = 1
1,217,856 UART: [ldev] Erasing FE.KEYID = 1
1,244,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,936 UART: [ldev] --
1,284,361 UART: [fwproc] Wait for Commands...
1,285,181 UART: [fwproc] Recv command 0x46574c44
1,285,909 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,598 UART: ROM Fatal Error: 0x000B001B
1,322,757 >>> mbox cmd response: failed
1,322,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,763 >>> mbox cmd response: failed
1,322,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
893,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,740 UART: [kat] ++
897,892 UART: [kat] sha1
902,196 UART: [kat] SHA2-256
904,136 UART: [kat] SHA2-384
906,939 UART: [kat] SHA2-512-ACC
908,840 UART: [kat] ECC-384
918,973 UART: [kat] HMAC-384Kdf
923,527 UART: [kat] LMS
1,171,855 UART: [kat] --
1,172,916 UART: [cold-reset] ++
1,173,390 UART: [fht] FHT @ 0x50003400
1,176,143 UART: [idev] ++
1,176,311 UART: [idev] CDI.KEYID = 6
1,176,671 UART: [idev] SUBJECT.KEYID = 7
1,177,095 UART: [idev] UDS.KEYID = 0
1,177,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,787 UART: [idev] Erasing UDS.KEYID = 0
1,202,264 UART: [idev] Sha1 KeyId Algorithm
1,210,638 UART: [idev] --
1,211,664 UART: [ldev] ++
1,211,832 UART: [ldev] CDI.KEYID = 6
1,212,195 UART: [ldev] SUBJECT.KEYID = 5
1,212,621 UART: [ldev] AUTHORITY.KEYID = 7
1,213,084 UART: [ldev] FE.KEYID = 1
1,218,460 UART: [ldev] Erasing FE.KEYID = 1
1,245,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,436 UART: [ldev] --
1,284,871 UART: [fwproc] Wait for Commands...
1,285,539 UART: [fwproc] Recv command 0x46574c44
1,286,267 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,480 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,650 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,967 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,176,202 >>> mbox cmd response: failed
1,176,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,208 >>> mbox cmd response: failed
1,176,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,214 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,036 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,112 UART:
192,473 UART: Running Caliptra ROM ...
193,663 UART:
193,816 UART: [state] CFI Enabled
266,361 UART: [state] LifecycleState = Manufacturing
268,347 UART: [state] DebugLocked = No
269,753 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,839 UART: [kat] SHA2-256
444,502 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,064 UART: [kat] ++
455,549 UART: [kat] sha1
465,998 UART: [kat] SHA2-256
468,688 UART: [kat] SHA2-384
474,990 UART: [kat] SHA2-512-ACC
477,384 UART: [kat] ECC-384
2,768,062 UART: [kat] HMAC-384Kdf
2,800,070 UART: [kat] LMS
3,990,374 UART: [kat] --
3,994,768 UART: [cold-reset] ++
3,996,871 UART: [fht] Storing FHT @ 0x50003400
4,008,683 UART: [idev] ++
4,009,266 UART: [idev] CDI.KEYID = 6
4,010,257 UART: [idev] SUBJECT.KEYID = 7
4,011,428 UART: [idev] UDS.KEYID = 0
4,017,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,166,531 UART: [idev] Erasing UDS.KEYID = 0
7,347,358 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,651 UART: [idev] --
7,373,491 UART: [ldev] ++
7,374,062 UART: [ldev] CDI.KEYID = 6
7,375,085 UART: [ldev] SUBJECT.KEYID = 5
7,376,265 UART: [ldev] AUTHORITY.KEYID = 7
7,377,502 UART: [ldev] FE.KEYID = 1
7,407,338 UART: [ldev] Erasing FE.KEYID = 1
10,739,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,035,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,050,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,065,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,079,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,098,193 UART: [ldev] --
13,103,665 UART: [fwproc] Waiting for Commands...
13,105,568 UART: [fwproc] Received command 0x46574c44
13,107,759 UART: [fwproc] Received Image of size 118548 bytes
13,198,936 UART: ROM Fatal Error: 0x000B0005
13,202,452 >>> mbox cmd response: failed
13,202,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,203,243 >>> mbox cmd response: failed
13,203,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,203,810 >>> mbox cmd response: failed
Initializing fuses
2,063,285 writing to cptra_bootfsm_go
2,252,625 UART:
2,252,966 UART: Running Caliptra ROM ...
2,254,103 UART:
2,254,272 UART: [state] CFI Enabled
2,324,258 UART: [state] LifecycleState = Manufacturing
2,326,187 UART: [state] DebugLocked = No
2,328,878 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,334,113 UART: [kat] SHA2-256
2,503,806 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,514,328 UART: [kat] ++
2,514,871 UART: [kat] sha1
2,524,439 UART: [kat] SHA2-256
2,527,135 UART: [kat] SHA2-384
2,531,830 UART: [kat] SHA2-512-ACC
2,534,227 UART: [kat] ECC-384
4,824,305 UART: [kat] HMAC-384Kdf
4,855,612 UART: [kat] LMS
6,045,902 UART: [kat] --
6,050,648 UART: [cold-reset] ++
6,052,192 UART: [fht] Storing FHT @ 0x50003400
6,062,503 UART: [idev] ++
6,063,083 UART: [idev] CDI.KEYID = 6
6,063,977 UART: [idev] SUBJECT.KEYID = 7
6,065,250 UART: [idev] UDS.KEYID = 0
6,068,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,217,348 UART: [idev] Erasing UDS.KEYID = 0
9,400,605 UART: [idev] Using Sha1 for KeyId Algorithm
9,422,848 UART: [idev] --
9,426,120 UART: [ldev] ++
9,426,699 UART: [ldev] CDI.KEYID = 6
9,427,693 UART: [ldev] SUBJECT.KEYID = 5
9,428,894 UART: [ldev] AUTHORITY.KEYID = 7
9,430,133 UART: [ldev] FE.KEYID = 1
9,476,425 UART: [ldev] Erasing FE.KEYID = 1
12,807,739 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,102,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,117,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,132,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,146,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,164,668 UART: [ldev] --
15,169,448 UART: [fwproc] Waiting for Commands...
15,171,201 UART: [fwproc] Received command 0x46574c44
15,173,407 UART: [fwproc] Received Image of size 118548 bytes
19,314,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,391,586 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,464,774 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,793,384 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,810,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,954,608 >>> mbox cmd response: failed
12,955,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,955,677 >>> mbox cmd response: failed
12,955,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,956,245 >>> mbox cmd response: failed
Initializing fuses
2,063,759 writing to cptra_bootfsm_go
5,845,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,035,159 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,512 writing to cptra_bootfsm_go
192,692 UART:
193,079 UART: Running Caliptra ROM ...
194,208 UART:
603,899 UART: [state] CFI Enabled
620,503 UART: [state] LifecycleState = Manufacturing
622,403 UART: [state] DebugLocked = No
624,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,763 UART: [kat] SHA2-256
798,449 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,991 UART: [kat] ++
809,495 UART: [kat] sha1
819,673 UART: [kat] SHA2-256
822,415 UART: [kat] SHA2-384
829,050 UART: [kat] SHA2-512-ACC
831,435 UART: [kat] ECC-384
3,116,961 UART: [kat] HMAC-384Kdf
3,129,971 UART: [kat] LMS
4,320,070 UART: [kat] --
4,323,317 UART: [cold-reset] ++
4,325,473 UART: [fht] Storing FHT @ 0x50003400
4,336,694 UART: [idev] ++
4,337,264 UART: [idev] CDI.KEYID = 6
4,338,149 UART: [idev] SUBJECT.KEYID = 7
4,339,418 UART: [idev] UDS.KEYID = 0
4,345,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,494,854 UART: [idev] Erasing UDS.KEYID = 0
7,624,449 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,003 UART: [idev] --
7,648,906 UART: [ldev] ++
7,649,540 UART: [ldev] CDI.KEYID = 6
7,650,437 UART: [ldev] SUBJECT.KEYID = 5
7,651,678 UART: [ldev] AUTHORITY.KEYID = 7
7,652,921 UART: [ldev] FE.KEYID = 1
7,662,941 UART: [ldev] Erasing FE.KEYID = 1
10,951,242 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,699 UART: [ldev] --
13,308,307 UART: [fwproc] Waiting for Commands...
13,310,559 UART: [fwproc] Received command 0x46574c44
13,312,759 UART: [fwproc] Received Image of size 118548 bytes
13,407,718 UART: ROM Fatal Error: 0x000B0005
13,411,223 >>> mbox cmd response: failed
13,411,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,412,005 >>> mbox cmd response: failed
13,412,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,412,608 >>> mbox cmd response: failed
Initializing fuses
2,064,699 writing to cptra_bootfsm_go
2,254,010 UART:
2,254,348 UART: Running Caliptra ROM ...
2,255,491 UART:
7,057,768 UART: [state] CFI Enabled
7,068,538 UART: [state] LifecycleState = Manufacturing
7,070,479 UART: [state] DebugLocked = No
7,073,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,078,327 UART: [kat] SHA2-256
7,248,018 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,258,560 UART: [kat] ++
7,259,030 UART: [kat] sha1
7,270,037 UART: [kat] SHA2-256
7,272,795 UART: [kat] SHA2-384
7,278,034 UART: [kat] SHA2-512-ACC
7,280,391 UART: [kat] ECC-384
9,562,887 UART: [kat] HMAC-384Kdf
9,574,349 UART: [kat] LMS
10,764,434 UART: [kat] --
10,768,881 UART: [cold-reset] ++
10,770,122 UART: [fht] Storing FHT @ 0x50003400
10,781,204 UART: [idev] ++
10,781,802 UART: [idev] CDI.KEYID = 6
10,782,720 UART: [idev] SUBJECT.KEYID = 7
10,783,997 UART: [idev] UDS.KEYID = 0
10,786,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,935,895 UART: [idev] Erasing UDS.KEYID = 0
14,070,031 UART: [idev] Using Sha1 for KeyId Algorithm
14,091,267 UART: [idev] --
14,095,481 UART: [ldev] ++
14,096,056 UART: [ldev] CDI.KEYID = 6
14,096,946 UART: [ldev] SUBJECT.KEYID = 5
14,098,256 UART: [ldev] AUTHORITY.KEYID = 7
14,099,364 UART: [ldev] FE.KEYID = 1
14,111,609 UART: [ldev] Erasing FE.KEYID = 1
17,401,801 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,695,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,709,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,724,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,739,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,758,401 UART: [ldev] --
19,763,237 UART: [fwproc] Waiting for Commands...
19,765,618 UART: [fwproc] Received command 0x46574c44
19,767,811 UART: [fwproc] Received Image of size 118548 bytes
23,907,879 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,983,494 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,056,702 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,385,050 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
4,132,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,157,416 >>> mbox cmd response: failed
13,158,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,158,489 >>> mbox cmd response: failed
13,158,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,159,143 >>> mbox cmd response: failed
Initializing fuses
2,068,051 writing to cptra_bootfsm_go
10,837,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,907,755 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,078 UART:
192,452 UART: Running Caliptra ROM ...
193,634 UART:
193,795 UART: [state] CFI Enabled
266,334 UART: [state] LifecycleState = Manufacturing
268,268 UART: [state] DebugLocked = No
270,144 UART: [state] WD Timer not started. Device not locked for debugging
274,787 UART: [kat] SHA2-256
454,468 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,244 UART: [kat] ++
465,786 UART: [kat] sha1
476,193 UART: [kat] SHA2-256
478,885 UART: [kat] SHA2-384
484,492 UART: [kat] SHA2-512-ACC
486,908 UART: [kat] ECC-384
2,950,191 UART: [kat] HMAC-384Kdf
2,971,303 UART: [kat] LMS
3,447,790 UART: [kat] --
3,451,621 UART: [cold-reset] ++
3,452,913 UART: [fht] FHT @ 0x50003400
3,463,251 UART: [idev] ++
3,463,819 UART: [idev] CDI.KEYID = 6
3,464,842 UART: [idev] SUBJECT.KEYID = 7
3,466,105 UART: [idev] UDS.KEYID = 0
3,468,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,023 UART: [idev] Erasing UDS.KEYID = 0
5,987,908 UART: [idev] Sha1 KeyId Algorithm
6,010,722 UART: [idev] --
6,014,724 UART: [ldev] ++
6,015,298 UART: [ldev] CDI.KEYID = 6
6,016,294 UART: [ldev] SUBJECT.KEYID = 5
6,017,464 UART: [ldev] AUTHORITY.KEYID = 7
6,018,706 UART: [ldev] FE.KEYID = 1
6,056,260 UART: [ldev] Erasing FE.KEYID = 1
8,565,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,471 UART: [ldev] --
10,375,365 UART: [fwproc] Wait for Commands...
10,377,579 UART: [fwproc] Recv command 0x46574c44
10,379,575 UART: [fwproc] Recv'd Img size: 118548 bytes
10,483,290 UART: ROM Fatal Error: 0x000B0005
10,486,548 >>> mbox cmd response: failed
10,486,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,487,344 >>> mbox cmd response: failed
10,487,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,487,918 >>> mbox cmd response: failed
Initializing fuses
2,063,511 writing to cptra_bootfsm_go
2,252,833 UART:
2,253,186 UART: Running Caliptra ROM ...
2,254,286 UART:
2,254,445 UART: [state] CFI Enabled
2,318,077 UART: [state] LifecycleState = Manufacturing
2,320,072 UART: [state] DebugLocked = No
2,321,369 UART: [state] WD Timer not started. Device not locked for debugging
2,325,195 UART: [kat] SHA2-256
2,504,817 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,515,620 UART: [kat] ++
2,516,174 UART: [kat] sha1
2,527,070 UART: [kat] SHA2-256
2,529,777 UART: [kat] SHA2-384
2,536,047 UART: [kat] SHA2-512-ACC
2,538,402 UART: [kat] ECC-384
5,002,371 UART: [kat] HMAC-384Kdf
5,024,656 UART: [kat] LMS
5,501,183 UART: [kat] --
5,506,845 UART: [cold-reset] ++
5,509,435 UART: [fht] FHT @ 0x50003400
5,519,222 UART: [idev] ++
5,519,789 UART: [idev] CDI.KEYID = 6
5,520,810 UART: [idev] SUBJECT.KEYID = 7
5,522,044 UART: [idev] UDS.KEYID = 0
5,524,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,673,958 UART: [idev] Erasing UDS.KEYID = 0
8,038,234 UART: [idev] Sha1 KeyId Algorithm
8,060,878 UART: [idev] --
8,065,306 UART: [ldev] ++
8,065,888 UART: [ldev] CDI.KEYID = 6
8,066,807 UART: [ldev] SUBJECT.KEYID = 5
8,068,027 UART: [ldev] AUTHORITY.KEYID = 7
8,069,265 UART: [ldev] FE.KEYID = 1
8,111,899 UART: [ldev] Erasing FE.KEYID = 1
10,620,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,354,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,369,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,385,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,401,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,423,466 UART: [ldev] --
12,429,036 UART: [fwproc] Wait for Commands...
12,430,938 UART: [fwproc] Recv command 0x46574c44
12,432,984 UART: [fwproc] Recv'd Img size: 118548 bytes
15,947,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,027,107 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,100,122 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,428,987 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,463,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,354,427 >>> mbox cmd response: failed
10,354,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,355,330 >>> mbox cmd response: failed
10,355,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,355,903 >>> mbox cmd response: failed
Initializing fuses
2,063,932 writing to cptra_bootfsm_go
5,522,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,313,608 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,651 UART:
193,033 UART: Running Caliptra ROM ...
194,211 UART:
603,880 UART: [state] CFI Enabled
616,844 UART: [state] LifecycleState = Manufacturing
618,806 UART: [state] DebugLocked = No
620,751 UART: [state] WD Timer not started. Device not locked for debugging
624,791 UART: [kat] SHA2-256
804,454 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,223 UART: [kat] ++
815,676 UART: [kat] sha1
826,618 UART: [kat] SHA2-256
829,320 UART: [kat] SHA2-384
836,116 UART: [kat] SHA2-512-ACC
838,515 UART: [kat] ECC-384
3,281,988 UART: [kat] HMAC-384Kdf
3,294,998 UART: [kat] LMS
3,771,524 UART: [kat] --
3,777,795 UART: [cold-reset] ++
3,779,956 UART: [fht] FHT @ 0x50003400
3,790,614 UART: [idev] ++
3,791,184 UART: [idev] CDI.KEYID = 6
3,792,125 UART: [idev] SUBJECT.KEYID = 7
3,793,398 UART: [idev] UDS.KEYID = 0
3,796,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,347 UART: [idev] Erasing UDS.KEYID = 0
6,269,657 UART: [idev] Sha1 KeyId Algorithm
6,293,211 UART: [idev] --
6,297,477 UART: [ldev] ++
6,298,051 UART: [ldev] CDI.KEYID = 6
6,299,040 UART: [ldev] SUBJECT.KEYID = 5
6,300,231 UART: [ldev] AUTHORITY.KEYID = 7
6,301,470 UART: [ldev] FE.KEYID = 1
6,311,470 UART: [ldev] Erasing FE.KEYID = 1
8,787,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,225 UART: [ldev] --
10,581,544 UART: [fwproc] Wait for Commands...
10,584,028 UART: [fwproc] Recv command 0x46574c44
10,586,029 UART: [fwproc] Recv'd Img size: 118548 bytes
10,694,231 UART: ROM Fatal Error: 0x000B0005
10,697,481 >>> mbox cmd response: failed
10,697,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,698,217 >>> mbox cmd response: failed
10,698,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,698,807 >>> mbox cmd response: failed
Initializing fuses
2,056,790 writing to cptra_bootfsm_go
2,246,079 UART:
2,246,433 UART: Running Caliptra ROM ...
2,247,487 UART:
9,768,272 UART: [state] CFI Enabled
9,782,827 UART: [state] LifecycleState = Manufacturing
9,784,780 UART: [state] DebugLocked = No
9,786,075 UART: [state] WD Timer not started. Device not locked for debugging
9,790,367 UART: [kat] SHA2-256
9,970,065 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,980,818 UART: [kat] ++
9,981,309 UART: [kat] sha1
9,992,527 UART: [kat] SHA2-256
9,995,233 UART: [kat] SHA2-384
9,999,824 UART: [kat] SHA2-512-ACC
10,002,180 UART: [kat] ECC-384
12,444,714 UART: [kat] HMAC-384Kdf
12,456,683 UART: [kat] LMS
12,933,174 UART: [kat] --
12,937,165 UART: [cold-reset] ++
12,938,127 UART: [fht] FHT @ 0x50003400
12,949,973 UART: [idev] ++
12,950,540 UART: [idev] CDI.KEYID = 6
12,951,558 UART: [idev] SUBJECT.KEYID = 7
12,952,772 UART: [idev] UDS.KEYID = 0
12,955,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,104,543 UART: [idev] Erasing UDS.KEYID = 0
15,432,846 UART: [idev] Sha1 KeyId Algorithm
15,456,950 UART: [idev] --
15,462,743 UART: [ldev] ++
15,463,337 UART: [ldev] CDI.KEYID = 6
15,464,225 UART: [ldev] SUBJECT.KEYID = 5
15,465,446 UART: [ldev] AUTHORITY.KEYID = 7
15,466,684 UART: [ldev] FE.KEYID = 1
15,478,761 UART: [ldev] Erasing FE.KEYID = 1
17,959,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,682,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,698,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,714,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,729,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,751,668 UART: [ldev] --
19,757,976 UART: [fwproc] Wait for Commands...
19,760,402 UART: [fwproc] Recv command 0x46574c44
19,762,396 UART: [fwproc] Recv'd Img size: 118548 bytes
23,274,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,352,684 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,425,707 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,753,654 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
3,782,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,583,807 >>> mbox cmd response: failed
10,584,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,584,717 >>> mbox cmd response: failed
10,584,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,585,281 >>> mbox cmd response: failed
Initializing fuses
2,063,969 writing to cptra_bootfsm_go
13,063,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,759,011 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
192,036 UART:
192,403 UART: Running Caliptra ROM ...
193,500 UART:
193,648 UART: [state] CFI Enabled
264,659 UART: [state] LifecycleState = Manufacturing
267,328 UART: [state] DebugLocked = No
268,584 UART: [state] WD Timer not started. Device not locked for debugging
272,440 UART: [kat] SHA2-256
462,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,063 UART: [kat] ++
473,515 UART: [kat] sha1
485,317 UART: [kat] SHA2-256
488,330 UART: [kat] SHA2-384
495,884 UART: [kat] SHA2-512-ACC
498,458 UART: [kat] ECC-384
2,947,298 UART: [kat] HMAC-384Kdf
2,970,455 UART: [kat] LMS
3,502,251 UART: [kat] --
3,507,651 UART: [cold-reset] ++
3,508,994 UART: [fht] FHT @ 0x50003400
3,519,823 UART: [idev] ++
3,520,514 UART: [idev] CDI.KEYID = 6
3,521,538 UART: [idev] SUBJECT.KEYID = 7
3,522,667 UART: [idev] UDS.KEYID = 0
3,528,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,990 UART: [idev] Erasing UDS.KEYID = 0
6,027,100 UART: [idev] Sha1 KeyId Algorithm
6,049,597 UART: [idev] --
6,055,609 UART: [ldev] ++
6,056,306 UART: [ldev] CDI.KEYID = 6
6,057,225 UART: [ldev] SUBJECT.KEYID = 5
6,058,394 UART: [ldev] AUTHORITY.KEYID = 7
6,059,635 UART: [ldev] FE.KEYID = 1
6,099,132 UART: [ldev] Erasing FE.KEYID = 1
8,604,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,867 UART: [ldev] --
10,413,707 UART: [fwproc] Wait for Commands...
10,416,793 UART: [fwproc] Recv command 0x46574c44
10,419,058 UART: [fwproc] Recv'd Img size: 118548 bytes
10,539,151 UART: ROM Fatal Error: 0x000B0005
10,542,792 >>> mbox cmd response: failed
10,543,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,543,579 >>> mbox cmd response: failed
10,543,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,544,149 >>> mbox cmd response: failed
Initializing fuses
2,059,183 writing to cptra_bootfsm_go
2,248,536 UART:
2,248,883 UART: Running Caliptra ROM ...
2,250,024 UART:
2,250,195 UART: [state] CFI Enabled
2,327,715 UART: [state] LifecycleState = Manufacturing
2,330,098 UART: [state] DebugLocked = No
2,332,639 UART: [state] WD Timer not started. Device not locked for debugging
2,338,080 UART: [kat] SHA2-256
2,527,972 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,538,778 UART: [kat] ++
2,539,331 UART: [kat] sha1
2,549,797 UART: [kat] SHA2-256
2,552,839 UART: [kat] SHA2-384
2,559,216 UART: [kat] SHA2-512-ACC
2,561,791 UART: [kat] ECC-384
5,010,338 UART: [kat] HMAC-384Kdf
5,032,999 UART: [kat] LMS
5,564,745 UART: [kat] --
5,568,703 UART: [cold-reset] ++
5,571,294 UART: [fht] FHT @ 0x50003400
5,583,308 UART: [idev] ++
5,583,989 UART: [idev] CDI.KEYID = 6
5,584,929 UART: [idev] SUBJECT.KEYID = 7
5,586,198 UART: [idev] UDS.KEYID = 0
5,588,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,738,165 UART: [idev] Erasing UDS.KEYID = 0
8,088,543 UART: [idev] Sha1 KeyId Algorithm
8,111,306 UART: [idev] --
8,114,845 UART: [ldev] ++
8,115,538 UART: [ldev] CDI.KEYID = 6
8,116,426 UART: [ldev] SUBJECT.KEYID = 5
8,117,591 UART: [ldev] AUTHORITY.KEYID = 7
8,118,830 UART: [ldev] FE.KEYID = 1
8,160,085 UART: [ldev] Erasing FE.KEYID = 1
10,668,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,400,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,431,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,446,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,466,412 UART: [ldev] --
12,472,664 UART: [fwproc] Wait for Commands...
12,474,663 UART: [fwproc] Recv command 0x46574c44
12,476,932 UART: [fwproc] Recv'd Img size: 118548 bytes
16,005,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,084,535 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,208,126 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,767,707 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,442,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,345,022 >>> mbox cmd response: failed
10,345,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,346,171 >>> mbox cmd response: failed
10,346,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,346,736 >>> mbox cmd response: failed
Initializing fuses
2,057,660 writing to cptra_bootfsm_go
5,486,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,913,813 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
192,611 UART:
192,973 UART: Running Caliptra ROM ...
194,103 UART:
603,746 UART: [state] CFI Enabled
618,657 UART: [state] LifecycleState = Manufacturing
620,986 UART: [state] DebugLocked = No
623,570 UART: [state] WD Timer not started. Device not locked for debugging
628,928 UART: [kat] SHA2-256
818,836 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,623 UART: [kat] ++
830,216 UART: [kat] sha1
842,345 UART: [kat] SHA2-256
845,344 UART: [kat] SHA2-384
852,846 UART: [kat] SHA2-512-ACC
855,416 UART: [kat] ECC-384
3,295,704 UART: [kat] HMAC-384Kdf
3,309,346 UART: [kat] LMS
3,841,146 UART: [kat] --
3,846,072 UART: [cold-reset] ++
3,847,369 UART: [fht] FHT @ 0x50003400
3,858,090 UART: [idev] ++
3,858,780 UART: [idev] CDI.KEYID = 6
3,859,751 UART: [idev] SUBJECT.KEYID = 7
3,861,029 UART: [idev] UDS.KEYID = 0
3,866,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,015,675 UART: [idev] Erasing UDS.KEYID = 0
6,343,382 UART: [idev] Sha1 KeyId Algorithm
6,365,706 UART: [idev] --
6,369,578 UART: [ldev] ++
6,370,270 UART: [ldev] CDI.KEYID = 6
6,371,185 UART: [ldev] SUBJECT.KEYID = 5
6,372,349 UART: [ldev] AUTHORITY.KEYID = 7
6,373,585 UART: [ldev] FE.KEYID = 1
6,383,268 UART: [ldev] Erasing FE.KEYID = 1
8,861,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,738 UART: [ldev] --
10,652,926 UART: [fwproc] Wait for Commands...
10,655,739 UART: [fwproc] Recv command 0x46574c44
10,658,009 UART: [fwproc] Recv'd Img size: 118548 bytes
10,776,004 UART: ROM Fatal Error: 0x000B0005
10,779,704 >>> mbox cmd response: failed
10,780,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,780,421 >>> mbox cmd response: failed
10,780,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,780,950 >>> mbox cmd response: failed
Initializing fuses
2,066,258 writing to cptra_bootfsm_go
2,255,557 UART:
2,255,901 UART: Running Caliptra ROM ...
2,256,957 UART:
9,687,280 UART: [state] CFI Enabled
9,699,933 UART: [state] LifecycleState = Manufacturing
9,702,346 UART: [state] DebugLocked = No
9,704,041 UART: [state] WD Timer not started. Device not locked for debugging
9,707,817 UART: [kat] SHA2-256
9,897,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,908,481 UART: [kat] ++
9,908,944 UART: [kat] sha1
9,919,677 UART: [kat] SHA2-256
9,922,715 UART: [kat] SHA2-384
9,928,956 UART: [kat] SHA2-512-ACC
9,931,533 UART: [kat] ECC-384
12,373,976 UART: [kat] HMAC-384Kdf
12,387,878 UART: [kat] LMS
12,919,718 UART: [kat] --
12,924,952 UART: [cold-reset] ++
12,927,378 UART: [fht] FHT @ 0x50003400
12,939,064 UART: [idev] ++
12,939,786 UART: [idev] CDI.KEYID = 6
12,940,710 UART: [idev] SUBJECT.KEYID = 7
12,941,874 UART: [idev] UDS.KEYID = 0
12,944,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,093,668 UART: [idev] Erasing UDS.KEYID = 0
15,422,850 UART: [idev] Sha1 KeyId Algorithm
15,444,355 UART: [idev] --
15,448,239 UART: [ldev] ++
15,448,943 UART: [ldev] CDI.KEYID = 6
15,449,857 UART: [ldev] SUBJECT.KEYID = 5
15,451,020 UART: [ldev] AUTHORITY.KEYID = 7
15,452,221 UART: [ldev] FE.KEYID = 1
15,462,761 UART: [ldev] Erasing FE.KEYID = 1
17,937,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,657,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,672,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,687,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,702,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,724,582 UART: [ldev] --
19,729,359 UART: [fwproc] Wait for Commands...
19,731,362 UART: [fwproc] Recv command 0x46574c44
19,733,692 UART: [fwproc] Recv'd Img size: 118548 bytes
23,262,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,337,286 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,460,880 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,021,206 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
3,761,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,576,001 >>> mbox cmd response: failed
10,576,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,576,992 >>> mbox cmd response: failed
10,577,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,577,567 >>> mbox cmd response: failed
Initializing fuses
2,058,920 writing to cptra_bootfsm_go
13,043,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,368,121 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Manufacturing
85,901 UART: [state] DebugLocked = No
86,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,979 UART: [kat] SHA2-256
881,910 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,025 UART: [kat] ++
886,177 UART: [kat] sha1
890,527 UART: [kat] SHA2-256
892,465 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
902,634 UART: [kat] HMAC-384Kdf
907,046 UART: [kat] LMS
1,475,242 UART: [kat] --
1,476,337 UART: [cold-reset] ++
1,476,687 UART: [fht] Storing FHT @ 0x50003400
1,479,330 UART: [idev] ++
1,479,498 UART: [idev] CDI.KEYID = 6
1,479,858 UART: [idev] SUBJECT.KEYID = 7
1,480,282 UART: [idev] UDS.KEYID = 0
1,480,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,192 UART: [idev] Erasing UDS.KEYID = 0
1,504,866 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,648 UART: [idev] --
1,514,625 UART: [ldev] ++
1,514,793 UART: [ldev] CDI.KEYID = 6
1,515,156 UART: [ldev] SUBJECT.KEYID = 5
1,515,582 UART: [ldev] AUTHORITY.KEYID = 7
1,516,045 UART: [ldev] FE.KEYID = 1
1,521,133 UART: [ldev] Erasing FE.KEYID = 1
1,546,506 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,366 UART: [ldev] --
1,585,859 UART: [fwproc] Waiting for Commands...
1,586,692 UART: [fwproc] Received command 0x46574c44
1,587,483 UART: [fwproc] Received Image of size 118548 bytes
1,632,870 UART: ROM Fatal Error: 0x000B0005
1,634,027 >>> mbox cmd response: failed
1,634,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,033 >>> mbox cmd response: failed
1,634,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,039 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,714 UART: [state] LifecycleState = Unprovisioned
85,369 UART: [state] DebugLocked = No
86,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,607 UART: [kat] SHA2-256
881,538 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,653 UART: [kat] ++
885,805 UART: [kat] sha1
889,905 UART: [kat] SHA2-256
891,843 UART: [kat] SHA2-384
894,706 UART: [kat] SHA2-512-ACC
896,607 UART: [kat] ECC-384
902,328 UART: [kat] HMAC-384Kdf
906,982 UART: [kat] LMS
1,475,178 UART: [kat] --
1,476,007 UART: [cold-reset] ++
1,476,405 UART: [fht] Storing FHT @ 0x50003400
1,479,202 UART: [idev] ++
1,479,370 UART: [idev] CDI.KEYID = 6
1,479,730 UART: [idev] SUBJECT.KEYID = 7
1,480,154 UART: [idev] UDS.KEYID = 0
1,480,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,480 UART: [idev] Erasing UDS.KEYID = 0
1,505,148 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,780 UART: [idev] --
1,514,853 UART: [ldev] ++
1,515,021 UART: [ldev] CDI.KEYID = 6
1,515,384 UART: [ldev] SUBJECT.KEYID = 5
1,515,810 UART: [ldev] AUTHORITY.KEYID = 7
1,516,273 UART: [ldev] FE.KEYID = 1
1,521,425 UART: [ldev] Erasing FE.KEYID = 1
1,546,330 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,454 UART: [ldev] --
1,585,841 UART: [fwproc] Waiting for Commands...
1,586,518 UART: [fwproc] Received command 0x46574c44
1,587,309 UART: [fwproc] Received Image of size 118548 bytes
2,930,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,238 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,456 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,697 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,485,668 >>> mbox cmd response: failed
1,485,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,674 >>> mbox cmd response: failed
1,485,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,680 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,419 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Manufacturing
86,346 UART: [state] DebugLocked = No
87,040 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,652 UART: [kat] SHA2-256
882,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,698 UART: [kat] ++
886,850 UART: [kat] sha1
890,908 UART: [kat] SHA2-256
892,846 UART: [kat] SHA2-384
895,541 UART: [kat] SHA2-512-ACC
897,442 UART: [kat] ECC-384
902,873 UART: [kat] HMAC-384Kdf
907,719 UART: [kat] LMS
1,475,915 UART: [kat] --
1,477,046 UART: [cold-reset] ++
1,477,594 UART: [fht] Storing FHT @ 0x50003400
1,480,377 UART: [idev] ++
1,480,545 UART: [idev] CDI.KEYID = 6
1,480,905 UART: [idev] SUBJECT.KEYID = 7
1,481,329 UART: [idev] UDS.KEYID = 0
1,481,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,365 UART: [idev] Erasing UDS.KEYID = 0
1,505,771 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,589 UART: [idev] --
1,515,766 UART: [ldev] ++
1,515,934 UART: [ldev] CDI.KEYID = 6
1,516,297 UART: [ldev] SUBJECT.KEYID = 5
1,516,723 UART: [ldev] AUTHORITY.KEYID = 7
1,517,186 UART: [ldev] FE.KEYID = 1
1,522,682 UART: [ldev] Erasing FE.KEYID = 1
1,547,573 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,701 UART: [ldev] --
1,587,206 UART: [fwproc] Waiting for Commands...
1,587,943 UART: [fwproc] Received command 0x46574c44
1,588,734 UART: [fwproc] Received Image of size 118548 bytes
1,634,127 UART: ROM Fatal Error: 0x000B0005
1,635,284 >>> mbox cmd response: failed
1,635,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,290 >>> mbox cmd response: failed
1,635,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,961 UART: [state] LifecycleState = Unprovisioned
85,616 UART: [state] DebugLocked = No
86,292 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,010 UART: [kat] SHA2-256
881,941 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,056 UART: [kat] ++
886,208 UART: [kat] sha1
890,364 UART: [kat] SHA2-256
892,302 UART: [kat] SHA2-384
894,949 UART: [kat] SHA2-512-ACC
896,850 UART: [kat] ECC-384
902,335 UART: [kat] HMAC-384Kdf
907,109 UART: [kat] LMS
1,475,305 UART: [kat] --
1,476,300 UART: [cold-reset] ++
1,476,702 UART: [fht] Storing FHT @ 0x50003400
1,479,581 UART: [idev] ++
1,479,749 UART: [idev] CDI.KEYID = 6
1,480,109 UART: [idev] SUBJECT.KEYID = 7
1,480,533 UART: [idev] UDS.KEYID = 0
1,480,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,499 UART: [idev] Erasing UDS.KEYID = 0
1,505,479 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,165 UART: [idev] --
1,515,236 UART: [ldev] ++
1,515,404 UART: [ldev] CDI.KEYID = 6
1,515,767 UART: [ldev] SUBJECT.KEYID = 5
1,516,193 UART: [ldev] AUTHORITY.KEYID = 7
1,516,656 UART: [ldev] FE.KEYID = 1
1,521,724 UART: [ldev] Erasing FE.KEYID = 1
1,547,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,013 UART: [ldev] --
1,586,478 UART: [fwproc] Waiting for Commands...
1,587,339 UART: [fwproc] Received command 0x46574c44
1,588,130 UART: [fwproc] Received Image of size 118548 bytes
2,932,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,483 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,701 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,054 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,486,019 >>> mbox cmd response: failed
1,486,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,025 >>> mbox cmd response: failed
1,486,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,522 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Manufacturing
85,501 UART: [state] DebugLocked = No
86,039 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
890,844 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,948 UART: [kat] ++
895,100 UART: [kat] sha1
899,410 UART: [kat] SHA2-256
901,350 UART: [kat] SHA2-384
904,231 UART: [kat] SHA2-512-ACC
906,132 UART: [kat] ECC-384
915,581 UART: [kat] HMAC-384Kdf
920,335 UART: [kat] LMS
1,168,647 UART: [kat] --
1,169,714 UART: [cold-reset] ++
1,170,160 UART: [fht] FHT @ 0x50003400
1,172,754 UART: [idev] ++
1,172,922 UART: [idev] CDI.KEYID = 6
1,173,283 UART: [idev] SUBJECT.KEYID = 7
1,173,708 UART: [idev] UDS.KEYID = 0
1,174,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,611 UART: [idev] Erasing UDS.KEYID = 0
1,198,335 UART: [idev] Sha1 KeyId Algorithm
1,207,071 UART: [idev] --
1,208,150 UART: [ldev] ++
1,208,318 UART: [ldev] CDI.KEYID = 6
1,208,682 UART: [ldev] SUBJECT.KEYID = 5
1,209,109 UART: [ldev] AUTHORITY.KEYID = 7
1,209,572 UART: [ldev] FE.KEYID = 1
1,214,908 UART: [ldev] Erasing FE.KEYID = 1
1,241,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,468 UART: [ldev] --
1,280,809 UART: [fwproc] Wait for Commands...
1,281,612 UART: [fwproc] Recv command 0x46574c44
1,282,345 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,739 UART: ROM Fatal Error: 0x000B0005
1,327,896 >>> mbox cmd response: failed
1,327,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,902 >>> mbox cmd response: failed
1,327,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,396 UART: [kat] ++
895,548 UART: [kat] sha1
899,798 UART: [kat] SHA2-256
901,738 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,383 UART: [kat] HMAC-384Kdf
921,203 UART: [kat] LMS
1,169,515 UART: [kat] --
1,170,468 UART: [cold-reset] ++
1,170,956 UART: [fht] FHT @ 0x50003400
1,173,616 UART: [idev] ++
1,173,784 UART: [idev] CDI.KEYID = 6
1,174,145 UART: [idev] SUBJECT.KEYID = 7
1,174,570 UART: [idev] UDS.KEYID = 0
1,174,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,069 UART: [idev] Erasing UDS.KEYID = 0
1,199,659 UART: [idev] Sha1 KeyId Algorithm
1,208,493 UART: [idev] --
1,209,658 UART: [ldev] ++
1,209,826 UART: [ldev] CDI.KEYID = 6
1,210,190 UART: [ldev] SUBJECT.KEYID = 5
1,210,617 UART: [ldev] AUTHORITY.KEYID = 7
1,211,080 UART: [ldev] FE.KEYID = 1
1,215,974 UART: [ldev] Erasing FE.KEYID = 1
1,242,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,124 UART: [ldev] --
1,281,431 UART: [fwproc] Wait for Commands...
1,282,088 UART: [fwproc] Recv command 0x46574c44
1,282,821 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,756 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,931 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,130 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,075 >>> mbox cmd response: failed
1,183,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,081 >>> mbox cmd response: failed
1,183,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,367 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Manufacturing
86,370 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,804 UART: [kat] SHA2-512-ACC
906,705 UART: [kat] ECC-384
916,884 UART: [kat] HMAC-384Kdf
921,426 UART: [kat] LMS
1,169,738 UART: [kat] --
1,170,695 UART: [cold-reset] ++
1,171,233 UART: [fht] FHT @ 0x50003400
1,174,033 UART: [idev] ++
1,174,201 UART: [idev] CDI.KEYID = 6
1,174,562 UART: [idev] SUBJECT.KEYID = 7
1,174,987 UART: [idev] UDS.KEYID = 0
1,175,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,842 UART: [idev] Erasing UDS.KEYID = 0
1,199,938 UART: [idev] Sha1 KeyId Algorithm
1,208,996 UART: [idev] --
1,210,093 UART: [ldev] ++
1,210,261 UART: [ldev] CDI.KEYID = 6
1,210,625 UART: [ldev] SUBJECT.KEYID = 5
1,211,052 UART: [ldev] AUTHORITY.KEYID = 7
1,211,515 UART: [ldev] FE.KEYID = 1
1,217,035 UART: [ldev] Erasing FE.KEYID = 1
1,243,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,159 UART: [ldev] --
1,282,386 UART: [fwproc] Wait for Commands...
1,283,131 UART: [fwproc] Recv command 0x46574c44
1,283,864 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,210 UART: ROM Fatal Error: 0x000B0005
1,329,367 >>> mbox cmd response: failed
1,329,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,373 >>> mbox cmd response: failed
1,329,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,957 UART: [state] LifecycleState = Unprovisioned
85,612 UART: [state] DebugLocked = No
86,184 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
891,017 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,121 UART: [kat] ++
895,273 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
915,512 UART: [kat] HMAC-384Kdf
920,020 UART: [kat] LMS
1,168,332 UART: [kat] --
1,169,275 UART: [cold-reset] ++
1,169,799 UART: [fht] FHT @ 0x50003400
1,172,599 UART: [idev] ++
1,172,767 UART: [idev] CDI.KEYID = 6
1,173,128 UART: [idev] SUBJECT.KEYID = 7
1,173,553 UART: [idev] UDS.KEYID = 0
1,173,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,464 UART: [idev] Erasing UDS.KEYID = 0
1,198,210 UART: [idev] Sha1 KeyId Algorithm
1,207,000 UART: [idev] --
1,208,099 UART: [ldev] ++
1,208,267 UART: [ldev] CDI.KEYID = 6
1,208,631 UART: [ldev] SUBJECT.KEYID = 5
1,209,058 UART: [ldev] AUTHORITY.KEYID = 7
1,209,521 UART: [ldev] FE.KEYID = 1
1,214,679 UART: [ldev] Erasing FE.KEYID = 1
1,240,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,859 UART: [ldev] --
1,280,200 UART: [fwproc] Wait for Commands...
1,280,877 UART: [fwproc] Recv command 0x46574c44
1,281,610 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,223 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,398 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,593 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,858 >>> mbox cmd response: failed
1,184,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,864 >>> mbox cmd response: failed
1,184,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,870 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,050 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Manufacturing
86,071 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
893,398 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,523 UART: [kat] ++
897,675 UART: [kat] sha1
901,953 UART: [kat] SHA2-256
903,893 UART: [kat] SHA2-384
906,750 UART: [kat] SHA2-512-ACC
908,651 UART: [kat] ECC-384
918,210 UART: [kat] HMAC-384Kdf
922,946 UART: [kat] LMS
1,171,274 UART: [kat] --
1,172,087 UART: [cold-reset] ++
1,172,465 UART: [fht] FHT @ 0x50003400
1,175,106 UART: [idev] ++
1,175,274 UART: [idev] CDI.KEYID = 6
1,175,634 UART: [idev] SUBJECT.KEYID = 7
1,176,058 UART: [idev] UDS.KEYID = 0
1,176,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,200 UART: [idev] Erasing UDS.KEYID = 0
1,200,657 UART: [idev] Sha1 KeyId Algorithm
1,208,925 UART: [idev] --
1,209,913 UART: [ldev] ++
1,210,081 UART: [ldev] CDI.KEYID = 6
1,210,444 UART: [ldev] SUBJECT.KEYID = 5
1,210,870 UART: [ldev] AUTHORITY.KEYID = 7
1,211,333 UART: [ldev] FE.KEYID = 1
1,216,281 UART: [ldev] Erasing FE.KEYID = 1
1,242,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,805 UART: [ldev] --
1,282,250 UART: [fwproc] Wait for Commands...
1,282,824 UART: [fwproc] Recv command 0x46574c44
1,283,552 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,491 UART: ROM Fatal Error: 0x000B0005
1,329,648 >>> mbox cmd response: failed
1,329,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,654 >>> mbox cmd response: failed
1,329,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
893,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,419 UART: [kat] ++
897,571 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,432 UART: [kat] SHA2-512-ACC
908,333 UART: [kat] ECC-384
917,706 UART: [kat] HMAC-384Kdf
922,194 UART: [kat] LMS
1,170,522 UART: [kat] --
1,171,333 UART: [cold-reset] ++
1,171,831 UART: [fht] FHT @ 0x50003400
1,174,558 UART: [idev] ++
1,174,726 UART: [idev] CDI.KEYID = 6
1,175,086 UART: [idev] SUBJECT.KEYID = 7
1,175,510 UART: [idev] UDS.KEYID = 0
1,175,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,464 UART: [idev] Erasing UDS.KEYID = 0
1,200,693 UART: [idev] Sha1 KeyId Algorithm
1,209,153 UART: [idev] --
1,210,257 UART: [ldev] ++
1,210,425 UART: [ldev] CDI.KEYID = 6
1,210,788 UART: [ldev] SUBJECT.KEYID = 5
1,211,214 UART: [ldev] AUTHORITY.KEYID = 7
1,211,677 UART: [ldev] FE.KEYID = 1
1,216,895 UART: [ldev] Erasing FE.KEYID = 1
1,243,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,667 UART: [ldev] --
1,281,960 UART: [fwproc] Wait for Commands...
1,282,732 UART: [fwproc] Recv command 0x46574c44
1,283,460 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,823 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,993 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,368 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,525 >>> mbox cmd response: failed
1,183,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,531 >>> mbox cmd response: failed
1,183,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,537 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,333 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Manufacturing
86,176 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
893,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,850 UART: [kat] ++
898,002 UART: [kat] sha1
902,280 UART: [kat] SHA2-256
904,220 UART: [kat] SHA2-384
907,037 UART: [kat] SHA2-512-ACC
908,938 UART: [kat] ECC-384
918,729 UART: [kat] HMAC-384Kdf
923,419 UART: [kat] LMS
1,171,747 UART: [kat] --
1,172,652 UART: [cold-reset] ++
1,173,126 UART: [fht] FHT @ 0x50003400
1,175,683 UART: [idev] ++
1,175,851 UART: [idev] CDI.KEYID = 6
1,176,211 UART: [idev] SUBJECT.KEYID = 7
1,176,635 UART: [idev] UDS.KEYID = 0
1,176,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,599 UART: [idev] Erasing UDS.KEYID = 0
1,202,342 UART: [idev] Sha1 KeyId Algorithm
1,210,834 UART: [idev] --
1,211,948 UART: [ldev] ++
1,212,116 UART: [ldev] CDI.KEYID = 6
1,212,479 UART: [ldev] SUBJECT.KEYID = 5
1,212,905 UART: [ldev] AUTHORITY.KEYID = 7
1,213,368 UART: [ldev] FE.KEYID = 1
1,218,820 UART: [ldev] Erasing FE.KEYID = 1
1,245,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,084 UART: [ldev] --
1,284,491 UART: [fwproc] Wait for Commands...
1,285,083 UART: [fwproc] Recv command 0x46574c44
1,285,811 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,272 UART: ROM Fatal Error: 0x000B0005
1,331,429 >>> mbox cmd response: failed
1,331,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,435 >>> mbox cmd response: failed
1,331,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
87,088 UART: [state] WD Timer not started. Device not locked for debugging
88,245 UART: [kat] SHA2-256
893,895 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,020 UART: [kat] ++
898,172 UART: [kat] sha1
902,474 UART: [kat] SHA2-256
904,414 UART: [kat] SHA2-384
907,253 UART: [kat] SHA2-512-ACC
909,154 UART: [kat] ECC-384
918,565 UART: [kat] HMAC-384Kdf
923,195 UART: [kat] LMS
1,171,523 UART: [kat] --
1,172,222 UART: [cold-reset] ++
1,172,710 UART: [fht] FHT @ 0x50003400
1,175,387 UART: [idev] ++
1,175,555 UART: [idev] CDI.KEYID = 6
1,175,915 UART: [idev] SUBJECT.KEYID = 7
1,176,339 UART: [idev] UDS.KEYID = 0
1,176,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,453 UART: [idev] Erasing UDS.KEYID = 0
1,201,766 UART: [idev] Sha1 KeyId Algorithm
1,210,314 UART: [idev] --
1,211,208 UART: [ldev] ++
1,211,376 UART: [ldev] CDI.KEYID = 6
1,211,739 UART: [ldev] SUBJECT.KEYID = 5
1,212,165 UART: [ldev] AUTHORITY.KEYID = 7
1,212,628 UART: [ldev] FE.KEYID = 1
1,218,194 UART: [ldev] Erasing FE.KEYID = 1
1,244,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,550 UART: [ldev] --
1,283,953 UART: [fwproc] Wait for Commands...
1,284,635 UART: [fwproc] Recv command 0x46574c44
1,285,363 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,816 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,986 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,363 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,432 >>> mbox cmd response: failed
1,184,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,438 >>> mbox cmd response: failed
1,184,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,786 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
191,535 UART:
191,895 UART: Running Caliptra ROM ...
193,058 UART:
193,236 UART: [state] CFI Enabled
263,856 UART: [state] LifecycleState = Unprovisioned
265,801 UART: [state] DebugLocked = Yes
267,170 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,104 UART: [kat] SHA2-256
442,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,328 UART: [kat] ++
453,840 UART: [kat] sha1
463,812 UART: [kat] SHA2-256
466,497 UART: [kat] SHA2-384
471,829 UART: [kat] SHA2-512-ACC
474,225 UART: [kat] ECC-384
2,767,285 UART: [kat] HMAC-384Kdf
2,796,962 UART: [kat] LMS
3,987,250 UART: [kat] --
3,993,035 UART: [cold-reset] ++
3,995,536 UART: [fht] Storing FHT @ 0x50003400
4,007,128 UART: [idev] ++
4,007,700 UART: [idev] CDI.KEYID = 6
4,008,679 UART: [idev] SUBJECT.KEYID = 7
4,009,901 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,446 writing to cptra_bootfsm_go
192,616 UART:
193,343 UART: Running Caliptra ROM ...
194,528 UART:
194,674 UART: [state] CFI Enabled
253,101 UART: [state] LifecycleState = Manufacturing
255,058 UART: [state] DebugLocked = Yes
257,747 UART: [state] Starting the Watchdog Timer 40000000 cycles
263,790 UART: [kat] SHA2-256
433,513 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
444,005 UART: [kat] ++
444,510 UART: [kat] sha1
456,818 UART: [kat] SHA2-256
459,509 UART: [kat] SHA2-384
466,257 UART: [kat] SHA2-512-ACC
468,587 UART: [kat] ECC-384
2,756,150 UART: [kat] HMAC-384Kdf
2,787,531 UART: [kat] LMS
3,977,841 UART: [kat] --
3,983,313 UART: [cold-reset] ++
3,984,499 UART: [fht] Storing FHT @ 0x50003400
3,996,994 UART: [idev] ++
3,997,576 UART: [idev] CDI.KEYID = 6
3,998,489 UART: [idev] SUBJECT.KEYID = 7
3,999,770 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
191,570 UART:
191,916 UART: Running Caliptra ROM ...
193,020 UART:
193,171 UART: [state] CFI Enabled
262,270 UART: [state] LifecycleState = Unknown
263,985 UART: [state] DebugLocked = Yes
265,861 UART: [state] Starting the Watchdog Timer 40000000 cycles
270,774 UART: [kat] SHA2-256
440,500 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,969 UART: [kat] ++
451,429 UART: [kat] sha1
462,472 UART: [kat] SHA2-256
465,210 UART: [kat] SHA2-384
471,134 UART: [kat] SHA2-512-ACC
473,476 UART: [kat] ECC-384
2,766,466 UART: [kat] HMAC-384Kdf
2,797,965 UART: [kat] LMS
3,988,270 UART: [kat] --
3,992,227 UART: [cold-reset] ++
3,993,249 UART: [fht] Storing FHT @ 0x50003400
4,004,623 UART: [idev] ++
4,005,197 UART: [idev] CDI.KEYID = 6
4,006,145 UART: [idev] SUBJECT.KEYID = 7
4,007,417 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
191,749 UART:
192,449 UART: Running Caliptra ROM ...
193,616 UART:
193,764 UART: [state] CFI Enabled
267,168 UART: [state] LifecycleState = Production
268,998 UART: [state] DebugLocked = Yes
270,270 UART: [state] Starting the Watchdog Timer 40000000 cycles
275,891 UART: [kat] SHA2-256
445,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,096 UART: [kat] ++
456,635 UART: [kat] sha1
466,888 UART: [kat] SHA2-256
469,575 UART: [kat] SHA2-384
475,735 UART: [kat] SHA2-512-ACC
478,137 UART: [kat] ECC-384
2,769,365 UART: [kat] HMAC-384Kdf
2,801,867 UART: [kat] LMS
3,992,183 UART: [kat] --
3,997,881 UART: [cold-reset] ++
3,999,068 UART: [fht] Storing FHT @ 0x50003400
4,011,852 UART: [idev] ++
4,012,455 UART: [idev] CDI.KEYID = 6
4,013,344 UART: [idev] SUBJECT.KEYID = 7
4,014,620 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
192,305 UART:
193,177 UART: Running Caliptra ROM ...
194,356 UART:
194,527 UART: [state] CFI Enabled
255,827 UART: [state] LifecycleState = Unprovisioned
257,750 UART: [state] DebugLocked = No
260,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
264,990 UART: [kat] SHA2-256
434,696 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
445,187 UART: [kat] ++
445,718 UART: [kat] sha1
457,898 UART: [kat] SHA2-256
460,602 UART: [kat] SHA2-384
467,498 UART: [kat] SHA2-512-ACC
469,851 UART: [kat] ECC-384
2,758,133 UART: [kat] HMAC-384Kdf
2,789,000 UART: [kat] LMS
3,979,290 UART: [kat] --
3,983,740 UART: [cold-reset] ++
3,986,240 UART: [fht] Storing FHT @ 0x50003400
3,996,705 UART: [idev] ++
3,997,271 UART: [idev] CDI.KEYID = 6
3,998,212 UART: [idev] SUBJECT.KEYID = 7
3,999,480 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,118 UART:
192,475 UART: Running Caliptra ROM ...
193,671 UART:
193,828 UART: [state] CFI Enabled
261,188 UART: [state] LifecycleState = Manufacturing
263,166 UART: [state] DebugLocked = No
265,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,492 UART: [kat] SHA2-256
440,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,730 UART: [kat] ++
451,185 UART: [kat] sha1
462,005 UART: [kat] SHA2-256
464,690 UART: [kat] SHA2-384
470,831 UART: [kat] SHA2-512-ACC
473,198 UART: [kat] ECC-384
2,764,958 UART: [kat] HMAC-384Kdf
2,776,676 UART: [kat] LMS
3,966,960 UART: [kat] --
3,972,697 UART: [cold-reset] ++
3,975,184 UART: [fht] Storing FHT @ 0x50003400
3,985,911 UART: [idev] ++
3,986,478 UART: [idev] CDI.KEYID = 6
3,987,496 UART: [idev] SUBJECT.KEYID = 7
3,988,653 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,228 UART:
192,588 UART: Running Caliptra ROM ...
193,783 UART:
193,935 UART: [state] CFI Enabled
263,545 UART: [state] LifecycleState = Unknown
265,196 UART: [state] DebugLocked = No
266,481 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,750 UART: [kat] SHA2-256
440,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,934 UART: [kat] ++
451,467 UART: [kat] sha1
462,615 UART: [kat] SHA2-256
465,302 UART: [kat] SHA2-384
470,849 UART: [kat] SHA2-512-ACC
473,190 UART: [kat] ECC-384
2,766,536 UART: [kat] HMAC-384Kdf
2,797,752 UART: [kat] LMS
3,988,034 UART: [kat] --
3,992,381 UART: [cold-reset] ++
3,993,461 UART: [fht] Storing FHT @ 0x50003400
4,004,520 UART: [idev] ++
4,005,101 UART: [idev] CDI.KEYID = 6
4,006,043 UART: [idev] SUBJECT.KEYID = 7
4,007,272 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
192,149 UART:
192,500 UART: Running Caliptra ROM ...
193,638 UART:
193,782 UART: [state] CFI Enabled
261,362 UART: [state] LifecycleState = Production
263,200 UART: [state] DebugLocked = No
266,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,252 UART: [kat] SHA2-256
440,909 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,459 UART: [kat] ++
451,920 UART: [kat] sha1
462,227 UART: [kat] SHA2-256
464,904 UART: [kat] SHA2-384
470,516 UART: [kat] SHA2-512-ACC
472,864 UART: [kat] ECC-384
2,767,012 UART: [kat] HMAC-384Kdf
2,787,803 UART: [kat] LMS
3,978,131 UART: [kat] --
3,981,190 UART: [cold-reset] ++
3,982,537 UART: [fht] Storing FHT @ 0x50003400
3,994,085 UART: [idev] ++
3,994,658 UART: [idev] CDI.KEYID = 6
3,995,568 UART: [idev] SUBJECT.KEYID = 7
3,996,842 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
191,821 UART:
192,209 UART: Running Caliptra ROM ...
193,371 UART:
603,183 UART: [state] CFI Enabled
618,094 UART: [state] LifecycleState = Unprovisioned
620,024 UART: [state] DebugLocked = Yes
622,526 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,379 UART: [kat] SHA2-256
797,155 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,717 UART: [kat] ++
808,272 UART: [kat] sha1
818,840 UART: [kat] SHA2-256
821,530 UART: [kat] SHA2-384
828,049 UART: [kat] SHA2-512-ACC
830,393 UART: [kat] ECC-384
3,112,284 UART: [kat] HMAC-384Kdf
3,123,161 UART: [kat] LMS
4,313,260 UART: [kat] --
4,319,190 UART: [cold-reset] ++
4,321,527 UART: [fht] Storing FHT @ 0x50003400
4,333,834 UART: [idev] ++
4,334,399 UART: [idev] CDI.KEYID = 6
4,335,344 UART: [idev] SUBJECT.KEYID = 7
4,336,615 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,558 UART:
193,432 UART: Running Caliptra ROM ...
194,575 UART:
603,911 UART: [state] CFI Enabled
616,209 UART: [state] LifecycleState = Manufacturing
618,151 UART: [state] DebugLocked = Yes
620,553 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,322 UART: [kat] SHA2-256
796,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,644 UART: [kat] ++
807,148 UART: [kat] sha1
817,651 UART: [kat] SHA2-256
820,392 UART: [kat] SHA2-384
827,398 UART: [kat] SHA2-512-ACC
829,740 UART: [kat] ECC-384
3,111,810 UART: [kat] HMAC-384Kdf
3,124,307 UART: [kat] LMS
4,314,444 UART: [kat] --
4,319,020 UART: [cold-reset] ++
4,321,562 UART: [fht] Storing FHT @ 0x50003400
4,331,863 UART: [idev] ++
4,332,462 UART: [idev] CDI.KEYID = 6
4,333,384 UART: [idev] SUBJECT.KEYID = 7
4,334,668 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
192,022 UART:
192,376 UART: Running Caliptra ROM ...
193,463 UART:
603,208 UART: [state] CFI Enabled
618,791 UART: [state] LifecycleState = Unknown
620,444 UART: [state] DebugLocked = Yes
622,685 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,836 UART: [kat] SHA2-256
798,629 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,173 UART: [kat] ++
809,647 UART: [kat] sha1
820,202 UART: [kat] SHA2-256
822,894 UART: [kat] SHA2-384
828,015 UART: [kat] SHA2-512-ACC
830,363 UART: [kat] ECC-384
3,114,544 UART: [kat] HMAC-384Kdf
3,126,311 UART: [kat] LMS
4,316,410 UART: [kat] --
4,319,218 UART: [cold-reset] ++
4,320,233 UART: [fht] Storing FHT @ 0x50003400
4,331,882 UART: [idev] ++
4,332,505 UART: [idev] CDI.KEYID = 6
4,333,396 UART: [idev] SUBJECT.KEYID = 7
4,334,666 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
191,790 UART:
192,664 UART: Running Caliptra ROM ...
193,911 UART:
603,017 UART: [state] CFI Enabled
616,353 UART: [state] LifecycleState = Production
618,123 UART: [state] DebugLocked = Yes
619,457 UART: [state] Starting the Watchdog Timer 40000000 cycles
624,161 UART: [kat] SHA2-256
793,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,485 UART: [kat] ++
805,003 UART: [kat] sha1
816,058 UART: [kat] SHA2-256
818,753 UART: [kat] SHA2-384
824,305 UART: [kat] SHA2-512-ACC
826,655 UART: [kat] ECC-384
3,111,134 UART: [kat] HMAC-384Kdf
3,122,519 UART: [kat] LMS
4,312,622 UART: [kat] --
4,315,951 UART: [cold-reset] ++
4,317,518 UART: [fht] Storing FHT @ 0x50003400
4,329,385 UART: [idev] ++
4,329,962 UART: [idev] CDI.KEYID = 6
4,331,049 UART: [idev] SUBJECT.KEYID = 7
4,332,167 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
50,044 writing to cptra_bootfsm_go
239,290 UART:
239,955 UART: Running Caliptra ROM ...
241,128 UART:
650,700 UART: [state] CFI Enabled
664,816 UART: [state] LifecycleState = Unprovisioned
666,806 UART: [state] DebugLocked = No
668,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
674,261 UART: [kat] SHA2-256
844,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
854,543 UART: [kat] ++
855,029 UART: [kat] sha1
867,316 UART: [kat] SHA2-256
870,065 UART: [kat] SHA2-384
875,102 UART: [kat] SHA2-512-ACC
877,451 UART: [kat] ECC-384
3,162,087 UART: [kat] HMAC-384Kdf
3,173,358 UART: [kat] LMS
4,363,486 UART: [kat] --
4,367,871 UART: [cold-reset] ++
4,370,295 UART: [fht] Storing FHT @ 0x50003400
4,380,539 UART: [idev] ++
4,381,113 UART: [idev] CDI.KEYID = 6
4,382,137 UART: [idev] SUBJECT.KEYID = 7
4,383,302 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
192,629 UART:
192,997 UART: Running Caliptra ROM ...
194,100 UART:
603,806 UART: [state] CFI Enabled
618,285 UART: [state] LifecycleState = Manufacturing
620,259 UART: [state] DebugLocked = No
621,866 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,459 UART: [kat] SHA2-256
796,176 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,730 UART: [kat] ++
807,239 UART: [kat] sha1
816,990 UART: [kat] SHA2-256
819,677 UART: [kat] SHA2-384
826,416 UART: [kat] SHA2-512-ACC
828,762 UART: [kat] ECC-384
3,114,319 UART: [kat] HMAC-384Kdf
3,126,144 UART: [kat] LMS
4,316,270 UART: [kat] --
4,322,688 UART: [cold-reset] ++
4,325,106 UART: [fht] Storing FHT @ 0x50003400
4,337,026 UART: [idev] ++
4,337,598 UART: [idev] CDI.KEYID = 6
4,338,568 UART: [idev] SUBJECT.KEYID = 7
4,339,787 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
192,654 UART:
193,009 UART: Running Caliptra ROM ...
194,208 UART:
603,853 UART: [state] CFI Enabled
617,749 UART: [state] LifecycleState = Unknown
619,460 UART: [state] DebugLocked = No
621,054 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,028 UART: [kat] SHA2-256
795,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,313 UART: [kat] ++
806,832 UART: [kat] sha1
817,495 UART: [kat] SHA2-256
820,188 UART: [kat] SHA2-384
825,147 UART: [kat] SHA2-512-ACC
827,491 UART: [kat] ECC-384
3,112,228 UART: [kat] HMAC-384Kdf
3,123,461 UART: [kat] LMS
4,313,693 UART: [kat] --
4,320,031 UART: [cold-reset] ++
4,321,214 UART: [fht] Storing FHT @ 0x50003400
4,333,189 UART: [idev] ++
4,333,758 UART: [idev] CDI.KEYID = 6
4,334,727 UART: [idev] SUBJECT.KEYID = 7
4,335,947 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,444 UART:
192,832 UART: Running Caliptra ROM ...
193,979 UART:
603,695 UART: [state] CFI Enabled
621,011 UART: [state] LifecycleState = Production
622,829 UART: [state] DebugLocked = No
624,809 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,731 UART: [kat] SHA2-256
799,475 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,995 UART: [kat] ++
810,474 UART: [kat] sha1
822,924 UART: [kat] SHA2-256
825,606 UART: [kat] SHA2-384
830,232 UART: [kat] SHA2-512-ACC
832,624 UART: [kat] ECC-384
3,114,892 UART: [kat] HMAC-384Kdf
3,126,073 UART: [kat] LMS
4,316,157 UART: [kat] --
4,321,666 UART: [cold-reset] ++
4,323,168 UART: [fht] Storing FHT @ 0x50003400
4,334,386 UART: [idev] ++
4,334,961 UART: [idev] CDI.KEYID = 6
4,335,902 UART: [idev] SUBJECT.KEYID = 7
4,337,197 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
32,001 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,467 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,035 UART:
192,433 UART: Running Caliptra ROM ...
193,642 UART:
193,797 UART: [state] CFI Enabled
257,471 UART: [state] LifecycleState = Unprovisioned
259,425 UART: [state] DebugLocked = Yes
261,331 UART: [state] Starting the WD Timer 40000000 cycles
266,081 UART: [kat] SHA2-256
445,792 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
456,527 UART: [kat] ++
457,037 UART: [kat] sha1
468,091 UART: [kat] SHA2-256
470,783 UART: [kat] SHA2-384
477,301 UART: [kat] SHA2-512-ACC
479,663 UART: [kat] ECC-384
2,945,815 UART: [kat] HMAC-384Kdf
2,968,262 UART: [kat] LMS
3,444,770 UART: [kat] --
3,449,577 UART: [cold-reset] ++
3,450,868 UART: [fht] FHT @ 0x50003400
3,462,680 UART: [idev] ++
3,463,261 UART: [idev] CDI.KEYID = 6
3,464,284 UART: [idev] SUBJECT.KEYID = 7
3,465,451 UART: [idev] UDS.KEYID = 0
0 new_unbooted
3,745 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
7,504 writing to cptra_bootfsm_go
196,619 UART:
197,288 UART: Running Caliptra ROM ...
198,470 UART:
198,623 UART: [state] CFI Enabled
263,576 UART: [state] LifecycleState = Manufacturing
265,502 UART: [state] DebugLocked = Yes
268,011 UART: [state] Starting the WD Timer 40000000 cycles
272,939 UART: [kat] SHA2-256
452,589 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,383 UART: [kat] ++
463,962 UART: [kat] sha1
474,148 UART: [kat] SHA2-256
476,839 UART: [kat] SHA2-384
481,868 UART: [kat] SHA2-512-ACC
484,252 UART: [kat] ECC-384
2,946,454 UART: [kat] HMAC-384Kdf
2,966,801 UART: [kat] LMS
3,443,305 UART: [kat] --
3,446,981 UART: [cold-reset] ++
3,449,030 UART: [fht] FHT @ 0x50003400
3,459,856 UART: [idev] ++
3,460,480 UART: [idev] CDI.KEYID = 6
3,461,416 UART: [idev] SUBJECT.KEYID = 7
3,462,633 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
7,292 writing to cptra_bootfsm_go
195,888 UART:
196,645 UART: Running Caliptra ROM ...
197,824 UART:
197,979 UART: [state] CFI Enabled
267,372 UART: [state] LifecycleState = Unknown
269,065 UART: [state] DebugLocked = Yes
272,033 UART: [state] Starting the WD Timer 40000000 cycles
276,526 UART: [kat] SHA2-256
456,156 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,946 UART: [kat] ++
467,450 UART: [kat] sha1
477,283 UART: [kat] SHA2-256
479,981 UART: [kat] SHA2-384
485,102 UART: [kat] SHA2-512-ACC
487,451 UART: [kat] ECC-384
2,949,164 UART: [kat] HMAC-384Kdf
2,971,142 UART: [kat] LMS
3,447,644 UART: [kat] --
3,451,502 UART: [cold-reset] ++
3,454,047 UART: [fht] FHT @ 0x50003400
3,465,950 UART: [idev] ++
3,466,521 UART: [idev] CDI.KEYID = 6
3,467,457 UART: [idev] SUBJECT.KEYID = 7
3,468,620 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
16,175 writing to cptra_bootfsm_go
204,778 UART:
205,414 UART: Running Caliptra ROM ...
206,529 UART:
206,678 UART: [state] CFI Enabled
283,144 UART: [state] LifecycleState = Production
284,993 UART: [state] DebugLocked = Yes
287,894 UART: [state] Starting the WD Timer 40000000 cycles
293,037 UART: [kat] SHA2-256
472,690 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
483,491 UART: [kat] ++
483,977 UART: [kat] sha1
495,429 UART: [kat] SHA2-256
498,130 UART: [kat] SHA2-384
504,226 UART: [kat] SHA2-512-ACC
506,595 UART: [kat] ECC-384
2,964,028 UART: [kat] HMAC-384Kdf
2,988,762 UART: [kat] LMS
3,465,298 UART: [kat] --
3,469,189 UART: [cold-reset] ++
3,470,917 UART: [fht] FHT @ 0x50003400
3,482,173 UART: [idev] ++
3,482,741 UART: [idev] CDI.KEYID = 6
3,483,765 UART: [idev] SUBJECT.KEYID = 7
3,484,929 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,921 writing to cptra_bootfsm_go
193,032 UART:
193,715 UART: Running Caliptra ROM ...
194,867 UART:
195,016 UART: [state] CFI Enabled
256,399 UART: [state] LifecycleState = Unprovisioned
258,369 UART: [state] DebugLocked = No
260,196 UART: [state] WD Timer not started. Device not locked for debugging
264,559 UART: [kat] SHA2-256
444,209 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
454,999 UART: [kat] ++
455,459 UART: [kat] sha1
466,706 UART: [kat] SHA2-256
469,416 UART: [kat] SHA2-384
474,450 UART: [kat] SHA2-512-ACC
476,854 UART: [kat] ECC-384
2,937,335 UART: [kat] HMAC-384Kdf
2,960,072 UART: [kat] LMS
3,436,535 UART: [kat] --
3,440,853 UART: [cold-reset] ++
3,443,125 UART: [fht] FHT @ 0x50003400
3,454,924 UART: [idev] ++
3,455,498 UART: [idev] CDI.KEYID = 6
3,456,471 UART: [idev] SUBJECT.KEYID = 7
3,457,700 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,273 UART:
192,651 UART: Running Caliptra ROM ...
193,856 UART:
194,015 UART: [state] CFI Enabled
258,504 UART: [state] LifecycleState = Manufacturing
260,499 UART: [state] DebugLocked = No
261,670 UART: [state] WD Timer not started. Device not locked for debugging
265,763 UART: [kat] SHA2-256
445,372 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
456,184 UART: [kat] ++
456,665 UART: [kat] sha1
466,582 UART: [kat] SHA2-256
469,271 UART: [kat] SHA2-384
475,571 UART: [kat] SHA2-512-ACC
477,974 UART: [kat] ECC-384
2,924,625 UART: [kat] HMAC-384Kdf
2,947,518 UART: [kat] LMS
3,424,025 UART: [kat] --
3,429,757 UART: [cold-reset] ++
3,431,642 UART: [fht] FHT @ 0x50003400
3,443,818 UART: [idev] ++
3,444,463 UART: [idev] CDI.KEYID = 6
3,445,435 UART: [idev] SUBJECT.KEYID = 7
3,446,601 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,189 UART:
192,566 UART: Running Caliptra ROM ...
193,747 UART:
193,905 UART: [state] CFI Enabled
261,780 UART: [state] LifecycleState = Unknown
263,453 UART: [state] DebugLocked = No
266,043 UART: [state] WD Timer not started. Device not locked for debugging
269,134 UART: [kat] SHA2-256
448,823 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,601 UART: [kat] ++
460,087 UART: [kat] sha1
470,976 UART: [kat] SHA2-256
473,725 UART: [kat] SHA2-384
479,818 UART: [kat] SHA2-512-ACC
482,163 UART: [kat] ECC-384
2,942,506 UART: [kat] HMAC-384Kdf
2,965,345 UART: [kat] LMS
3,441,798 UART: [kat] --
3,445,007 UART: [cold-reset] ++
3,446,753 UART: [fht] FHT @ 0x50003400
3,457,149 UART: [idev] ++
3,457,718 UART: [idev] CDI.KEYID = 6
3,458,744 UART: [idev] SUBJECT.KEYID = 7
3,459,908 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,058 UART:
192,431 UART: Running Caliptra ROM ...
193,528 UART:
193,675 UART: [state] CFI Enabled
260,590 UART: [state] LifecycleState = Production
262,413 UART: [state] DebugLocked = No
265,120 UART: [state] WD Timer not started. Device not locked for debugging
269,658 UART: [kat] SHA2-256
449,322 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,085 UART: [kat] ++
460,555 UART: [kat] sha1
471,814 UART: [kat] SHA2-256
474,510 UART: [kat] SHA2-384
480,445 UART: [kat] SHA2-512-ACC
482,786 UART: [kat] ECC-384
2,944,766 UART: [kat] HMAC-384Kdf
2,967,703 UART: [kat] LMS
3,444,245 UART: [kat] --
3,448,174 UART: [cold-reset] ++
3,450,274 UART: [fht] FHT @ 0x50003400
3,461,107 UART: [idev] ++
3,461,715 UART: [idev] CDI.KEYID = 6
3,462,609 UART: [idev] SUBJECT.KEYID = 7
3,463,891 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
29,539 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
15,896 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,603 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
20,412 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
191,881 UART:
192,262 UART: Running Caliptra ROM ...
193,402 UART:
603,220 UART: [state] CFI Enabled
616,725 UART: [state] LifecycleState = Unprovisioned
618,656 UART: [state] DebugLocked = Yes
621,105 UART: [state] Starting the WD Timer 40000000 cycles
626,402 UART: [kat] SHA2-256
806,110 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,846 UART: [kat] ++
817,348 UART: [kat] sha1
828,609 UART: [kat] SHA2-256
831,304 UART: [kat] SHA2-384
837,127 UART: [kat] SHA2-512-ACC
839,472 UART: [kat] ECC-384
3,282,629 UART: [kat] HMAC-384Kdf
3,295,631 UART: [kat] LMS
3,772,198 UART: [kat] --
3,777,787 UART: [cold-reset] ++
3,779,733 UART: [fht] FHT @ 0x50003400
3,791,272 UART: [idev] ++
3,791,847 UART: [idev] CDI.KEYID = 6
3,792,825 UART: [idev] SUBJECT.KEYID = 7
3,794,046 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,925 writing to cptra_bootfsm_go
193,078 UART:
193,920 UART: Running Caliptra ROM ...
195,111 UART:
604,094 UART: [state] CFI Enabled
614,762 UART: [state] LifecycleState = Manufacturing
616,647 UART: [state] DebugLocked = Yes
618,610 UART: [state] Starting the WD Timer 40000000 cycles
624,239 UART: [kat] SHA2-256
803,924 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,671 UART: [kat] ++
815,180 UART: [kat] sha1
826,519 UART: [kat] SHA2-256
829,174 UART: [kat] SHA2-384
834,846 UART: [kat] SHA2-512-ACC
837,199 UART: [kat] ECC-384
3,282,047 UART: [kat] HMAC-384Kdf
3,295,761 UART: [kat] LMS
3,772,265 UART: [kat] --
3,775,783 UART: [cold-reset] ++
3,777,193 UART: [fht] FHT @ 0x50003400
3,788,020 UART: [idev] ++
3,788,634 UART: [idev] CDI.KEYID = 6
3,789,558 UART: [idev] SUBJECT.KEYID = 7
3,790,841 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
22,168 writing to cptra_bootfsm_go
210,776 UART:
211,640 UART: Running Caliptra ROM ...
212,829 UART:
622,073 UART: [state] CFI Enabled
635,984 UART: [state] LifecycleState = Unknown
637,635 UART: [state] DebugLocked = Yes
639,537 UART: [state] Starting the WD Timer 40000000 cycles
644,028 UART: [kat] SHA2-256
823,737 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
834,480 UART: [kat] ++
834,963 UART: [kat] sha1
847,331 UART: [kat] SHA2-256
850,001 UART: [kat] SHA2-384
857,076 UART: [kat] SHA2-512-ACC
859,426 UART: [kat] ECC-384
3,299,795 UART: [kat] HMAC-384Kdf
3,312,714 UART: [kat] LMS
3,789,249 UART: [kat] --
3,792,916 UART: [cold-reset] ++
3,794,043 UART: [fht] FHT @ 0x50003400
3,806,569 UART: [idev] ++
3,807,176 UART: [idev] CDI.KEYID = 6
3,808,125 UART: [idev] SUBJECT.KEYID = 7
3,809,283 UART: [idev] UDS.KEYID = 0
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
7,916 writing to cptra_bootfsm_go
196,536 UART:
197,200 UART: Running Caliptra ROM ...
198,303 UART:
607,807 UART: [state] CFI Enabled
621,997 UART: [state] LifecycleState = Production
623,831 UART: [state] DebugLocked = Yes
625,309 UART: [state] Starting the WD Timer 40000000 cycles
629,847 UART: [kat] SHA2-256
809,555 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,288 UART: [kat] ++
820,786 UART: [kat] sha1
831,804 UART: [kat] SHA2-256
834,500 UART: [kat] SHA2-384
841,351 UART: [kat] SHA2-512-ACC
843,719 UART: [kat] ECC-384
3,286,598 UART: [kat] HMAC-384Kdf
3,298,517 UART: [kat] LMS
3,775,037 UART: [kat] --
3,779,156 UART: [cold-reset] ++
3,780,075 UART: [fht] FHT @ 0x50003400
3,790,534 UART: [idev] ++
3,791,110 UART: [idev] CDI.KEYID = 6
3,792,132 UART: [idev] SUBJECT.KEYID = 7
3,793,295 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,796 writing to cptra_bootfsm_go
193,052 UART:
193,756 UART: Running Caliptra ROM ...
194,883 UART:
604,201 UART: [state] CFI Enabled
618,528 UART: [state] LifecycleState = Unprovisioned
620,456 UART: [state] DebugLocked = No
622,725 UART: [state] WD Timer not started. Device not locked for debugging
627,244 UART: [kat] SHA2-256
806,898 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,701 UART: [kat] ++
818,178 UART: [kat] sha1
829,655 UART: [kat] SHA2-256
832,351 UART: [kat] SHA2-384
838,119 UART: [kat] SHA2-512-ACC
840,505 UART: [kat] ECC-384
3,280,868 UART: [kat] HMAC-384Kdf
3,293,181 UART: [kat] LMS
3,769,730 UART: [kat] --
3,774,047 UART: [cold-reset] ++
3,776,424 UART: [fht] FHT @ 0x50003400
3,787,463 UART: [idev] ++
3,788,040 UART: [idev] CDI.KEYID = 6
3,788,977 UART: [idev] SUBJECT.KEYID = 7
3,790,200 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,161 writing to cptra_bootfsm_go
193,510 UART:
193,879 UART: Running Caliptra ROM ...
195,015 UART:
604,679 UART: [state] CFI Enabled
620,552 UART: [state] LifecycleState = Manufacturing
622,504 UART: [state] DebugLocked = No
624,810 UART: [state] WD Timer not started. Device not locked for debugging
629,436 UART: [kat] SHA2-256
809,095 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,921 UART: [kat] ++
820,461 UART: [kat] sha1
832,050 UART: [kat] SHA2-256
834,793 UART: [kat] SHA2-384
839,475 UART: [kat] SHA2-512-ACC
841,817 UART: [kat] ECC-384
3,284,291 UART: [kat] HMAC-384Kdf
3,296,320 UART: [kat] LMS
3,772,798 UART: [kat] --
3,778,491 UART: [cold-reset] ++
3,780,705 UART: [fht] FHT @ 0x50003400
3,791,468 UART: [idev] ++
3,792,093 UART: [idev] CDI.KEYID = 6
3,792,984 UART: [idev] SUBJECT.KEYID = 7
3,794,259 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,642 writing to cptra_bootfsm_go
192,841 UART:
193,188 UART: Running Caliptra ROM ...
194,370 UART:
604,232 UART: [state] CFI Enabled
614,733 UART: [state] LifecycleState = Unknown
616,371 UART: [state] DebugLocked = No
618,404 UART: [state] WD Timer not started. Device not locked for debugging
621,742 UART: [kat] SHA2-256
801,427 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,187 UART: [kat] ++
812,642 UART: [kat] sha1
822,224 UART: [kat] SHA2-256
824,972 UART: [kat] SHA2-384
830,249 UART: [kat] SHA2-512-ACC
832,598 UART: [kat] ECC-384
3,273,108 UART: [kat] HMAC-384Kdf
3,285,846 UART: [kat] LMS
3,762,349 UART: [kat] --
3,767,595 UART: [cold-reset] ++
3,769,049 UART: [fht] FHT @ 0x50003400
3,780,163 UART: [idev] ++
3,780,738 UART: [idev] CDI.KEYID = 6
3,781,760 UART: [idev] SUBJECT.KEYID = 7
3,782,924 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
192,639 UART:
193,021 UART: Running Caliptra ROM ...
194,216 UART:
603,809 UART: [state] CFI Enabled
618,799 UART: [state] LifecycleState = Production
620,576 UART: [state] DebugLocked = No
623,476 UART: [state] WD Timer not started. Device not locked for debugging
626,962 UART: [kat] SHA2-256
806,599 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,368 UART: [kat] ++
817,966 UART: [kat] sha1
829,404 UART: [kat] SHA2-256
832,087 UART: [kat] SHA2-384
838,072 UART: [kat] SHA2-512-ACC
840,431 UART: [kat] ECC-384
3,282,273 UART: [kat] HMAC-384Kdf
3,293,827 UART: [kat] LMS
3,770,301 UART: [kat] --
3,776,965 UART: [cold-reset] ++
3,777,884 UART: [fht] FHT @ 0x50003400
3,790,002 UART: [idev] ++
3,790,577 UART: [idev] CDI.KEYID = 6
3,791,603 UART: [idev] SUBJECT.KEYID = 7
3,792,841 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
22,619 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,954 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
10,963 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
8,049 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
191,601 UART:
191,984 UART: Running Caliptra ROM ...
193,143 UART:
193,296 UART: [state] CFI Enabled
261,538 UART: [state] LifecycleState = Unprovisioned
263,977 UART: [state] DebugLocked = Yes
266,801 UART: [state] Starting the WD Timer 40000000 cycles
271,774 UART: [kat] SHA2-256
461,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,425 UART: [kat] ++
473,033 UART: [kat] sha1
484,521 UART: [kat] SHA2-256
487,589 UART: [kat] SHA2-384
493,357 UART: [kat] SHA2-512-ACC
495,984 UART: [kat] ECC-384
2,947,826 UART: [kat] HMAC-384Kdf
2,970,630 UART: [kat] LMS
3,502,403 UART: [kat] --
3,507,857 UART: [cold-reset] ++
3,509,523 UART: [fht] FHT @ 0x50003400
3,521,705 UART: [idev] ++
3,522,386 UART: [idev] CDI.KEYID = 6
3,523,330 UART: [idev] SUBJECT.KEYID = 7
3,524,547 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,654 UART:
193,508 UART: Running Caliptra ROM ...
194,681 UART:
194,898 UART: [state] CFI Enabled
254,540 UART: [state] LifecycleState = Manufacturing
256,549 UART: [state] DebugLocked = Yes
259,435 UART: [state] Starting the WD Timer 40000000 cycles
265,544 UART: [kat] SHA2-256
455,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
466,161 UART: [kat] ++
466,773 UART: [kat] sha1
477,341 UART: [kat] SHA2-256
480,403 UART: [kat] SHA2-384
486,091 UART: [kat] SHA2-512-ACC
488,651 UART: [kat] ECC-384
2,937,550 UART: [kat] HMAC-384Kdf
2,961,803 UART: [kat] LMS
3,493,574 UART: [kat] --
3,497,586 UART: [cold-reset] ++
3,499,857 UART: [fht] FHT @ 0x50003400
3,511,336 UART: [idev] ++
3,512,021 UART: [idev] CDI.KEYID = 6
3,513,000 UART: [idev] SUBJECT.KEYID = 7
3,514,230 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
191,682 UART:
192,529 UART: Running Caliptra ROM ...
193,648 UART:
193,798 UART: [state] CFI Enabled
254,168 UART: [state] LifecycleState = Unknown
256,200 UART: [state] DebugLocked = Yes
259,243 UART: [state] Starting the WD Timer 40000000 cycles
264,503 UART: [kat] SHA2-256
453,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,154 UART: [kat] ++
464,712 UART: [kat] sha1
477,728 UART: [kat] SHA2-256
480,743 UART: [kat] SHA2-384
487,755 UART: [kat] SHA2-512-ACC
490,327 UART: [kat] ECC-384
2,936,218 UART: [kat] HMAC-384Kdf
2,959,900 UART: [kat] LMS
3,491,675 UART: [kat] --
3,496,451 UART: [cold-reset] ++
3,497,911 UART: [fht] FHT @ 0x50003400
3,509,605 UART: [idev] ++
3,510,293 UART: [idev] CDI.KEYID = 6
3,511,319 UART: [idev] SUBJECT.KEYID = 7
3,512,375 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
191,759 UART:
192,591 UART: Running Caliptra ROM ...
193,801 UART:
193,960 UART: [state] CFI Enabled
267,358 UART: [state] LifecycleState = Production
269,607 UART: [state] DebugLocked = Yes
272,011 UART: [state] Starting the WD Timer 40000000 cycles
277,702 UART: [kat] SHA2-256
467,569 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,327 UART: [kat] ++
478,929 UART: [kat] sha1
490,869 UART: [kat] SHA2-256
493,888 UART: [kat] SHA2-384
499,602 UART: [kat] SHA2-512-ACC
502,175 UART: [kat] ECC-384
2,951,971 UART: [kat] HMAC-384Kdf
2,975,284 UART: [kat] LMS
3,507,056 UART: [kat] --
3,511,580 UART: [cold-reset] ++
3,513,092 UART: [fht] FHT @ 0x50003400
3,524,737 UART: [idev] ++
3,525,421 UART: [idev] CDI.KEYID = 6
3,526,363 UART: [idev] SUBJECT.KEYID = 7
3,527,583 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
37,334 writing to cptra_bootfsm_go
227,983 UART:
229,111 UART: Running Caliptra ROM ...
230,301 UART:
230,512 UART: [state] CFI Enabled
296,921 UART: [state] LifecycleState = Unprovisioned
299,659 UART: [state] DebugLocked = No
301,088 UART: [state] WD Timer not started. Device not locked for debugging
305,726 UART: [kat] SHA2-256
495,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
506,358 UART: [kat] ++
506,841 UART: [kat] sha1
517,403 UART: [kat] SHA2-256
520,376 UART: [kat] SHA2-384
525,880 UART: [kat] SHA2-512-ACC
528,500 UART: [kat] ECC-384
2,983,162 UART: [kat] HMAC-384Kdf
3,001,124 UART: [kat] LMS
3,532,850 UART: [kat] --
3,538,169 UART: [cold-reset] ++
3,540,411 UART: [fht] FHT @ 0x50003400
3,551,617 UART: [idev] ++
3,552,308 UART: [idev] CDI.KEYID = 6
3,553,242 UART: [idev] SUBJECT.KEYID = 7
3,554,466 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,505 UART:
192,854 UART: Running Caliptra ROM ...
194,055 UART:
194,221 UART: [state] CFI Enabled
259,947 UART: [state] LifecycleState = Manufacturing
262,349 UART: [state] DebugLocked = No
264,274 UART: [state] WD Timer not started. Device not locked for debugging
269,507 UART: [kat] SHA2-256
459,365 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,199 UART: [kat] ++
470,691 UART: [kat] sha1
481,739 UART: [kat] SHA2-256
484,764 UART: [kat] SHA2-384
490,005 UART: [kat] SHA2-512-ACC
492,592 UART: [kat] ECC-384
2,951,761 UART: [kat] HMAC-384Kdf
2,977,448 UART: [kat] LMS
3,509,246 UART: [kat] --
3,516,947 UART: [cold-reset] ++
3,519,267 UART: [fht] FHT @ 0x50003400
3,531,391 UART: [idev] ++
3,532,130 UART: [idev] CDI.KEYID = 6
3,533,020 UART: [idev] SUBJECT.KEYID = 7
3,534,242 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,179 UART:
192,551 UART: Running Caliptra ROM ...
193,727 UART:
193,881 UART: [state] CFI Enabled
258,880 UART: [state] LifecycleState = Unknown
260,946 UART: [state] DebugLocked = No
262,331 UART: [state] WD Timer not started. Device not locked for debugging
267,411 UART: [kat] SHA2-256
457,280 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,051 UART: [kat] ++
468,537 UART: [kat] sha1
480,178 UART: [kat] SHA2-256
483,201 UART: [kat] SHA2-384
490,381 UART: [kat] SHA2-512-ACC
492,956 UART: [kat] ECC-384
2,940,383 UART: [kat] HMAC-384Kdf
2,966,605 UART: [kat] LMS
3,498,351 UART: [kat] --
3,502,417 UART: [cold-reset] ++
3,503,603 UART: [fht] FHT @ 0x50003400
3,515,400 UART: [idev] ++
3,516,090 UART: [idev] CDI.KEYID = 6
3,517,118 UART: [idev] SUBJECT.KEYID = 7
3,518,284 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,110 UART:
192,474 UART: Running Caliptra ROM ...
193,603 UART:
193,752 UART: [state] CFI Enabled
259,994 UART: [state] LifecycleState = Production
262,231 UART: [state] DebugLocked = No
264,340 UART: [state] WD Timer not started. Device not locked for debugging
269,537 UART: [kat] SHA2-256
459,455 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,173 UART: [kat] ++
470,631 UART: [kat] sha1
482,431 UART: [kat] SHA2-256
485,452 UART: [kat] SHA2-384
492,253 UART: [kat] SHA2-512-ACC
494,863 UART: [kat] ECC-384
2,943,782 UART: [kat] HMAC-384Kdf
2,967,760 UART: [kat] LMS
3,499,553 UART: [kat] --
3,504,161 UART: [cold-reset] ++
3,505,645 UART: [fht] FHT @ 0x50003400
3,517,182 UART: [idev] ++
3,517,863 UART: [idev] CDI.KEYID = 6
3,518,807 UART: [idev] SUBJECT.KEYID = 7
3,520,023 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
191,885 UART:
192,261 UART: Running Caliptra ROM ...
193,427 UART:
603,055 UART: [state] CFI Enabled
617,482 UART: [state] LifecycleState = Unprovisioned
619,875 UART: [state] DebugLocked = Yes
621,680 UART: [state] Starting the WD Timer 40000000 cycles
626,596 UART: [kat] SHA2-256
816,476 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,334 UART: [kat] ++
827,830 UART: [kat] sha1
839,149 UART: [kat] SHA2-256
842,162 UART: [kat] SHA2-384
848,900 UART: [kat] SHA2-512-ACC
851,471 UART: [kat] ECC-384
3,293,967 UART: [kat] HMAC-384Kdf
3,305,566 UART: [kat] LMS
3,837,374 UART: [kat] --
3,843,014 UART: [cold-reset] ++
3,843,965 UART: [fht] FHT @ 0x50003400
3,855,498 UART: [idev] ++
3,856,182 UART: [idev] CDI.KEYID = 6
3,857,162 UART: [idev] SUBJECT.KEYID = 7
3,858,265 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
192,533 UART:
193,329 UART: Running Caliptra ROM ...
194,484 UART:
603,868 UART: [state] CFI Enabled
615,940 UART: [state] LifecycleState = Manufacturing
618,296 UART: [state] DebugLocked = Yes
621,008 UART: [state] Starting the WD Timer 40000000 cycles
625,894 UART: [kat] SHA2-256
815,788 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,649 UART: [kat] ++
827,207 UART: [kat] sha1
837,019 UART: [kat] SHA2-256
840,045 UART: [kat] SHA2-384
846,144 UART: [kat] SHA2-512-ACC
848,708 UART: [kat] ECC-384
3,289,017 UART: [kat] HMAC-384Kdf
3,300,725 UART: [kat] LMS
3,832,562 UART: [kat] --
3,836,207 UART: [cold-reset] ++
3,837,233 UART: [fht] FHT @ 0x50003400
3,847,628 UART: [idev] ++
3,848,311 UART: [idev] CDI.KEYID = 6
3,849,281 UART: [idev] SUBJECT.KEYID = 7
3,850,502 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
37,278 writing to cptra_bootfsm_go
225,862 UART:
226,535 UART: Running Caliptra ROM ...
227,653 UART:
637,191 UART: [state] CFI Enabled
648,748 UART: [state] LifecycleState = Unknown
650,838 UART: [state] DebugLocked = Yes
653,228 UART: [state] Starting the WD Timer 40000000 cycles
658,912 UART: [kat] SHA2-256
848,814 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
859,633 UART: [kat] ++
860,173 UART: [kat] sha1
870,751 UART: [kat] SHA2-256
873,773 UART: [kat] SHA2-384
879,488 UART: [kat] SHA2-512-ACC
882,107 UART: [kat] ECC-384
3,324,515 UART: [kat] HMAC-384Kdf
3,337,748 UART: [kat] LMS
3,869,571 UART: [kat] --
3,874,562 UART: [cold-reset] ++
3,875,476 UART: [fht] FHT @ 0x50003400
3,887,441 UART: [idev] ++
3,888,125 UART: [idev] CDI.KEYID = 6
3,889,094 UART: [idev] SUBJECT.KEYID = 7
3,890,270 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
191,944 UART:
192,844 UART: Running Caliptra ROM ...
194,019 UART:
603,243 UART: [state] CFI Enabled
617,884 UART: [state] LifecycleState = Production
620,129 UART: [state] DebugLocked = Yes
622,849 UART: [state] Starting the WD Timer 40000000 cycles
629,026 UART: [kat] SHA2-256
818,912 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,767 UART: [kat] ++
830,360 UART: [kat] sha1
841,382 UART: [kat] SHA2-256
844,405 UART: [kat] SHA2-384
850,670 UART: [kat] SHA2-512-ACC
853,288 UART: [kat] ECC-384
3,291,672 UART: [kat] HMAC-384Kdf
3,304,087 UART: [kat] LMS
3,835,921 UART: [kat] --
3,840,420 UART: [cold-reset] ++
3,841,928 UART: [fht] FHT @ 0x50003400
3,853,456 UART: [idev] ++
3,854,159 UART: [idev] CDI.KEYID = 6
3,855,104 UART: [idev] SUBJECT.KEYID = 7
3,856,324 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,611 UART:
193,467 UART: Running Caliptra ROM ...
194,638 UART:
603,931 UART: [state] CFI Enabled
617,788 UART: [state] LifecycleState = Unprovisioned
620,180 UART: [state] DebugLocked = No
622,216 UART: [state] WD Timer not started. Device not locked for debugging
627,194 UART: [kat] SHA2-256
817,109 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,875 UART: [kat] ++
828,479 UART: [kat] sha1
841,116 UART: [kat] SHA2-256
844,130 UART: [kat] SHA2-384
851,013 UART: [kat] SHA2-512-ACC
853,594 UART: [kat] ECC-384
3,295,167 UART: [kat] HMAC-384Kdf
3,307,037 UART: [kat] LMS
3,838,883 UART: [kat] --
3,843,959 UART: [cold-reset] ++
3,846,218 UART: [fht] FHT @ 0x50003400
3,858,122 UART: [idev] ++
3,858,810 UART: [idev] CDI.KEYID = 6
3,859,700 UART: [idev] SUBJECT.KEYID = 7
3,860,968 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,557 UART:
192,908 UART: Running Caliptra ROM ...
194,109 UART:
603,924 UART: [state] CFI Enabled
620,707 UART: [state] LifecycleState = Manufacturing
623,084 UART: [state] DebugLocked = No
625,284 UART: [state] WD Timer not started. Device not locked for debugging
630,467 UART: [kat] SHA2-256
820,337 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,115 UART: [kat] ++
832,030 UART: [kat] sha1
841,908 UART: [kat] SHA2-256
844,924 UART: [kat] SHA2-384
850,590 UART: [kat] SHA2-512-ACC
853,154 UART: [kat] ECC-384
3,296,271 UART: [kat] HMAC-384Kdf
3,310,485 UART: [kat] LMS
3,842,280 UART: [kat] --
3,847,219 UART: [cold-reset] ++
3,849,720 UART: [fht] FHT @ 0x50003400
3,860,822 UART: [idev] ++
3,861,497 UART: [idev] CDI.KEYID = 6
3,862,468 UART: [idev] SUBJECT.KEYID = 7
3,863,694 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,516 UART:
192,870 UART: Running Caliptra ROM ...
194,079 UART:
603,578 UART: [state] CFI Enabled
617,972 UART: [state] LifecycleState = Unknown
620,044 UART: [state] DebugLocked = No
621,327 UART: [state] WD Timer not started. Device not locked for debugging
625,701 UART: [kat] SHA2-256
815,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,384 UART: [kat] ++
826,971 UART: [kat] sha1
838,343 UART: [kat] SHA2-256
841,411 UART: [kat] SHA2-384
847,394 UART: [kat] SHA2-512-ACC
850,014 UART: [kat] ECC-384
3,292,700 UART: [kat] HMAC-384Kdf
3,304,884 UART: [kat] LMS
3,836,745 UART: [kat] --
3,841,442 UART: [cold-reset] ++
3,843,080 UART: [fht] FHT @ 0x50003400
3,854,788 UART: [idev] ++
3,855,470 UART: [idev] CDI.KEYID = 6
3,856,495 UART: [idev] SUBJECT.KEYID = 7
3,857,666 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
13,507 writing to cptra_bootfsm_go
202,972 UART:
203,330 UART: Running Caliptra ROM ...
204,542 UART:
614,271 UART: [state] CFI Enabled
628,253 UART: [state] LifecycleState = Production
630,479 UART: [state] DebugLocked = No
632,133 UART: [state] WD Timer not started. Device not locked for debugging
636,075 UART: [kat] SHA2-256
825,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
836,738 UART: [kat] ++
837,291 UART: [kat] sha1
850,503 UART: [kat] SHA2-256
853,518 UART: [kat] SHA2-384
859,198 UART: [kat] SHA2-512-ACC
861,763 UART: [kat] ECC-384
3,303,026 UART: [kat] HMAC-384Kdf
3,315,706 UART: [kat] LMS
3,847,534 UART: [kat] --
3,852,469 UART: [cold-reset] ++
3,854,091 UART: [fht] FHT @ 0x50003400
3,864,762 UART: [idev] ++
3,865,443 UART: [idev] CDI.KEYID = 6
3,866,465 UART: [idev] SUBJECT.KEYID = 7
3,867,624 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
31,903 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
32,811 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,441,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,319,526 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,444,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,312,449 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,498 writing to cptra_bootfsm_go
3,774,567 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,546,472 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
3,778,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,549,783 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
3,440,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,319,040 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,465,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,346,120 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
3,774,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,553,512 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,780,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,550,162 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,729,400 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,728,071 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,730,242 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,730,897 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,727,784 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,728,121 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,727,504 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,729,695 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
191,492 UART:
191,901 UART: Running Caliptra ROM ...
193,118 UART:
193,278 UART: [state] CFI Enabled
265,884 UART: [state] LifecycleState = Production
267,662 UART: [state] DebugLocked = Yes
269,138 UART: [state] Starting the Watchdog Timer 40000000 cycles
275,017 UART: [kat] SHA2-256
444,777 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,268 UART: [kat] ++
455,770 UART: [kat] sha1
467,619 UART: [kat] SHA2-256
470,313 UART: [kat] SHA2-384
476,241 UART: [kat] SHA2-512-ACC
478,639 UART: [kat] ECC-384
2,768,216 UART: [kat] HMAC-384Kdf
2,800,553 UART: [kat] LMS
3,990,826 UART: [kat] --
3,994,142 UART: [cold-reset] ++
3,996,836 UART: [fht] Storing FHT @ 0x50003400
4,009,402 UART: [idev] ++
4,009,983 UART: [idev] CDI.KEYID = 6
4,010,871 UART: [idev] SUBJECT.KEYID = 7
4,012,145 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
191,913 UART:
192,311 UART: Running Caliptra ROM ...
193,393 UART:
603,073 UART: [state] CFI Enabled
614,511 UART: [state] LifecycleState = Production
616,323 UART: [state] DebugLocked = Yes
618,686 UART: [state] Starting the Watchdog Timer 40000000 cycles
624,621 UART: [kat] SHA2-256
794,452 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,955 UART: [kat] ++
805,444 UART: [kat] sha1
816,215 UART: [kat] SHA2-256
818,916 UART: [kat] SHA2-384
824,631 UART: [kat] SHA2-512-ACC
827,032 UART: [kat] ECC-384
3,111,664 UART: [kat] HMAC-384Kdf
3,123,649 UART: [kat] LMS
4,313,774 UART: [kat] --
4,316,586 UART: [cold-reset] ++
4,318,581 UART: [fht] Storing FHT @ 0x50003400
4,330,882 UART: [idev] ++
4,331,449 UART: [idev] CDI.KEYID = 6
4,332,420 UART: [idev] SUBJECT.KEYID = 7
4,333,643 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
191,756 UART:
192,221 UART: Running Caliptra ROM ...
193,369 UART:
193,516 UART: [state] CFI Enabled
263,278 UART: [state] LifecycleState = Production
265,121 UART: [state] DebugLocked = Yes
267,948 UART: [state] Starting the WD Timer 40000000 cycles
273,622 UART: [kat] SHA2-256
453,265 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,057 UART: [kat] ++
464,555 UART: [kat] sha1
475,248 UART: [kat] SHA2-256
477,966 UART: [kat] SHA2-384
483,840 UART: [kat] SHA2-512-ACC
486,245 UART: [kat] ECC-384
2,946,157 UART: [kat] HMAC-384Kdf
2,968,797 UART: [kat] LMS
3,445,337 UART: [kat] --
3,448,894 UART: [cold-reset] ++
3,449,911 UART: [fht] FHT @ 0x50003400
3,461,999 UART: [idev] ++
3,462,562 UART: [idev] CDI.KEYID = 6
3,463,501 UART: [idev] SUBJECT.KEYID = 7
3,464,774 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
5,300 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
191,971 UART:
192,368 UART: Running Caliptra ROM ...
193,509 UART:
603,162 UART: [state] CFI Enabled
618,019 UART: [state] LifecycleState = Production
619,798 UART: [state] DebugLocked = Yes
621,973 UART: [state] Starting the WD Timer 40000000 cycles
627,109 UART: [kat] SHA2-256
806,736 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,528 UART: [kat] ++
818,006 UART: [kat] sha1
829,841 UART: [kat] SHA2-256
832,537 UART: [kat] SHA2-384
838,638 UART: [kat] SHA2-512-ACC
841,045 UART: [kat] ECC-384
3,284,417 UART: [kat] HMAC-384Kdf
3,298,179 UART: [kat] LMS
3,774,715 UART: [kat] --
3,778,789 UART: [cold-reset] ++
3,780,253 UART: [fht] FHT @ 0x50003400
3,791,176 UART: [idev] ++
3,791,753 UART: [idev] CDI.KEYID = 6
3,792,776 UART: [idev] SUBJECT.KEYID = 7
3,793,945 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
7,395 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
191,530 UART:
191,914 UART: Running Caliptra ROM ...
193,032 UART:
193,188 UART: [state] CFI Enabled
267,962 UART: [state] LifecycleState = Production
270,197 UART: [state] DebugLocked = Yes
272,273 UART: [state] Starting the WD Timer 40000000 cycles
277,039 UART: [kat] SHA2-256
466,950 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,705 UART: [kat] ++
478,240 UART: [kat] sha1
489,646 UART: [kat] SHA2-256
492,667 UART: [kat] SHA2-384
499,230 UART: [kat] SHA2-512-ACC
501,846 UART: [kat] ECC-384
2,948,174 UART: [kat] HMAC-384Kdf
2,971,436 UART: [kat] LMS
3,503,204 UART: [kat] --
3,510,038 UART: [cold-reset] ++
3,510,958 UART: [fht] FHT @ 0x50003400
3,522,214 UART: [idev] ++
3,522,954 UART: [idev] CDI.KEYID = 6
3,523,840 UART: [idev] SUBJECT.KEYID = 7
3,525,111 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
191,755 UART:
192,120 UART: Running Caliptra ROM ...
193,241 UART:
603,045 UART: [state] CFI Enabled
619,958 UART: [state] LifecycleState = Production
622,180 UART: [state] DebugLocked = Yes
624,799 UART: [state] Starting the WD Timer 40000000 cycles
630,693 UART: [kat] SHA2-256
820,593 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,390 UART: [kat] ++
831,912 UART: [kat] sha1
844,003 UART: [kat] SHA2-256
847,064 UART: [kat] SHA2-384
853,231 UART: [kat] SHA2-512-ACC
855,854 UART: [kat] ECC-384
3,294,905 UART: [kat] HMAC-384Kdf
3,308,573 UART: [kat] LMS
3,840,395 UART: [kat] --
3,846,907 UART: [cold-reset] ++
3,848,580 UART: [fht] FHT @ 0x50003400
3,859,682 UART: [idev] ++
3,860,377 UART: [idev] CDI.KEYID = 6
3,861,344 UART: [idev] SUBJECT.KEYID = 7
3,862,509 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,681 UART: [state] LifecycleState = Production
85,289 UART: [state] DebugLocked = Yes
85,975 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,691 UART: [kat] SHA2-256
881,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,737 UART: [kat] ++
885,889 UART: [kat] sha1
890,073 UART: [kat] SHA2-256
892,011 UART: [kat] SHA2-384
894,796 UART: [kat] SHA2-512-ACC
896,697 UART: [kat] ECC-384
902,308 UART: [kat] HMAC-384Kdf
906,966 UART: [kat] LMS
1,475,162 UART: [kat] --
1,476,355 UART: [cold-reset] ++
1,476,854 UART: [fht] Storing FHT @ 0x50003400
1,479,603 UART: [idev] ++
1,479,771 UART: [idev] CDI.KEYID = 6
1,480,131 UART: [idev] SUBJECT.KEYID = 7
1,480,555 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Production
85,644 UART: [state] DebugLocked = Yes
86,212 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,902 UART: [kat] SHA2-256
881,833 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,948 UART: [kat] ++
886,100 UART: [kat] sha1
890,294 UART: [kat] SHA2-256
892,232 UART: [kat] SHA2-384
894,945 UART: [kat] SHA2-512-ACC
896,846 UART: [kat] ECC-384
902,351 UART: [kat] HMAC-384Kdf
906,947 UART: [kat] LMS
1,475,143 UART: [kat] --
1,476,172 UART: [cold-reset] ++
1,476,663 UART: [fht] Storing FHT @ 0x50003400
1,479,392 UART: [idev] ++
1,479,560 UART: [idev] CDI.KEYID = 6
1,479,920 UART: [idev] SUBJECT.KEYID = 7
1,480,344 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Production
85,703 UART: [state] DebugLocked = Yes
86,379 UART: [state] Starting the WD Timer 40000000 cycles
88,082 UART: [kat] SHA2-256
891,632 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,736 UART: [kat] ++
895,888 UART: [kat] sha1
900,290 UART: [kat] SHA2-256
902,230 UART: [kat] SHA2-384
905,063 UART: [kat] SHA2-512-ACC
906,964 UART: [kat] ECC-384
916,513 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,751 UART: [fht] FHT @ 0x50003400
1,173,283 UART: [idev] ++
1,173,451 UART: [idev] CDI.KEYID = 6
1,173,812 UART: [idev] SUBJECT.KEYID = 7
1,174,237 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Production
85,722 UART: [state] DebugLocked = Yes
86,254 UART: [state] Starting the WD Timer 40000000 cycles
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,601 UART: [kat] ++
895,753 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,828 UART: [kat] SHA2-512-ACC
906,729 UART: [kat] ECC-384
916,696 UART: [kat] HMAC-384Kdf
921,272 UART: [kat] LMS
1,169,584 UART: [kat] --
1,170,127 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,030 UART: [idev] ++
1,173,198 UART: [idev] CDI.KEYID = 6
1,173,559 UART: [idev] SUBJECT.KEYID = 7
1,173,984 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Production
85,937 UART: [state] DebugLocked = Yes
86,475 UART: [state] Starting the WD Timer 40000000 cycles
87,984 UART: [kat] SHA2-256
893,634 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,759 UART: [kat] ++
897,911 UART: [kat] sha1
902,237 UART: [kat] SHA2-256
904,177 UART: [kat] SHA2-384
906,848 UART: [kat] SHA2-512-ACC
908,749 UART: [kat] ECC-384
918,480 UART: [kat] HMAC-384Kdf
923,094 UART: [kat] LMS
1,171,422 UART: [kat] --
1,172,561 UART: [cold-reset] ++
1,173,020 UART: [fht] FHT @ 0x50003400
1,175,655 UART: [idev] ++
1,175,823 UART: [idev] CDI.KEYID = 6
1,176,183 UART: [idev] SUBJECT.KEYID = 7
1,176,607 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,024 UART: [state] LifecycleState = Production
86,632 UART: [state] DebugLocked = Yes
87,180 UART: [state] Starting the WD Timer 40000000 cycles
88,877 UART: [kat] SHA2-256
894,527 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,652 UART: [kat] ++
898,804 UART: [kat] sha1
902,956 UART: [kat] SHA2-256
904,896 UART: [kat] SHA2-384
907,631 UART: [kat] SHA2-512-ACC
909,532 UART: [kat] ECC-384
919,087 UART: [kat] HMAC-384Kdf
923,723 UART: [kat] LMS
1,172,051 UART: [kat] --
1,173,118 UART: [cold-reset] ++
1,173,543 UART: [fht] FHT @ 0x50003400
1,176,242 UART: [idev] ++
1,176,410 UART: [idev] CDI.KEYID = 6
1,176,770 UART: [idev] SUBJECT.KEYID = 7
1,177,194 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
191,563 UART:
191,921 UART: Running Caliptra ROM ...
193,109 UART:
193,263 UART: [state] CFI Enabled
264,894 UART: [state] LifecycleState = Production
266,702 UART: [state] DebugLocked = Yes
269,558 UART: [state] Starting the Watchdog Timer 40000000 cycles
274,926 UART: [kat] SHA2-256
444,616 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,131 UART: [kat] ++
455,739 UART: [kat] sha1
466,136 UART: [kat] SHA2-256
468,793 UART: [kat] SHA2-384
474,073 UART: [kat] SHA2-512-ACC
476,378 UART: [kat] ECC-384
2,767,226 UART: [kat] HMAC-384Kdf
2,781,060 UART: [kat] LMS
3,971,399 UART: [kat] --
3,975,568 UART: [cold-reset] ++
3,976,939 UART: [fht] Storing FHT @ 0x50003400
3,988,711 UART: [idev] ++
3,989,278 UART: [idev] CDI.KEYID = 6
3,990,313 UART: [idev] SUBJECT.KEYID = 7
3,991,493 UART: [idev] UDS.KEYID = 0
3,992,420 ready_for_fw is high
3,992,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,773 UART: [idev] Erasing UDS.KEYID = 0
7,327,338 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,104 UART: [idev] --
7,352,185 UART: [ldev] ++
7,352,757 UART: [ldev] CDI.KEYID = 6
7,353,692 UART: [ldev] SUBJECT.KEYID = 5
7,354,847 UART: [ldev] AUTHORITY.KEYID = 7
7,356,196 UART: [ldev] FE.KEYID = 1
7,404,244 UART: [ldev] Erasing FE.KEYID = 1
10,738,279 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,439 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,058,932 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,073,625 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,088,002 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,108,101 UART: [ldev] --
13,113,152 UART: [fwproc] Waiting for Commands...
13,116,025 UART: [fwproc] Received command 0x46574c44
13,118,226 UART: [fwproc] Received Image of size 118548 bytes
17,265,714 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,343,680 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,416,908 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,745,496 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,785,183 ready_for_fw is high
3,785,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,985,377 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
191,801 UART:
192,184 UART: Running Caliptra ROM ...
193,283 UART:
602,878 UART: [state] CFI Enabled
616,479 UART: [state] LifecycleState = Production
618,255 UART: [state] DebugLocked = Yes
620,750 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,200 UART: [kat] SHA2-256
795,936 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,500 UART: [kat] ++
807,001 UART: [kat] sha1
818,410 UART: [kat] SHA2-256
821,121 UART: [kat] SHA2-384
827,497 UART: [kat] SHA2-512-ACC
829,877 UART: [kat] ECC-384
3,114,923 UART: [kat] HMAC-384Kdf
3,127,768 UART: [kat] LMS
4,317,895 UART: [kat] --
4,323,015 UART: [cold-reset] ++
4,325,320 UART: [fht] Storing FHT @ 0x50003400
4,337,625 UART: [idev] ++
4,338,240 UART: [idev] CDI.KEYID = 6
4,339,166 UART: [idev] SUBJECT.KEYID = 7
4,340,354 UART: [idev] UDS.KEYID = 0
4,341,417 ready_for_fw is high
4,341,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,457 UART: [idev] Erasing UDS.KEYID = 0
7,627,117 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,943 UART: [idev] --
7,652,752 UART: [ldev] ++
7,653,390 UART: [ldev] CDI.KEYID = 6
7,654,304 UART: [ldev] SUBJECT.KEYID = 5
7,655,528 UART: [ldev] AUTHORITY.KEYID = 7
7,656,773 UART: [ldev] FE.KEYID = 1
7,668,292 UART: [ldev] Erasing FE.KEYID = 1
10,956,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,588 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,265,121 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,279,792 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,294,175 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,313,303 UART: [ldev] --
13,317,948 UART: [fwproc] Waiting for Commands...
13,320,377 UART: [fwproc] Received command 0x46574c44
13,322,574 UART: [fwproc] Received Image of size 118548 bytes
17,459,618 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,538,454 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,611,656 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,939,585 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
4,123,884 ready_for_fw is high
4,124,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,187,781 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
191,726 UART:
192,113 UART: Running Caliptra ROM ...
193,329 UART:
193,484 UART: [state] CFI Enabled
268,095 UART: [state] LifecycleState = Production
269,927 UART: [state] DebugLocked = Yes
272,010 UART: [state] Starting the WD Timer 40000000 cycles
277,039 UART: [kat] SHA2-256
456,733 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
467,513 UART: [kat] ++
467,973 UART: [kat] sha1
479,369 UART: [kat] SHA2-256
482,106 UART: [kat] SHA2-384
487,396 UART: [kat] SHA2-512-ACC
489,770 UART: [kat] ECC-384
2,952,143 UART: [kat] HMAC-384Kdf
2,976,044 UART: [kat] LMS
3,452,532 UART: [kat] --
3,457,315 UART: [cold-reset] ++
3,459,608 UART: [fht] FHT @ 0x50003400
3,471,678 UART: [idev] ++
3,472,254 UART: [idev] CDI.KEYID = 6
3,473,213 UART: [idev] SUBJECT.KEYID = 7
3,474,462 UART: [idev] UDS.KEYID = 0
3,475,367 ready_for_fw is high
3,475,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,624,703 UART: [idev] Erasing UDS.KEYID = 0
5,992,560 UART: [idev] Sha1 KeyId Algorithm
6,016,039 UART: [idev] --
6,021,452 UART: [ldev] ++
6,022,035 UART: [ldev] CDI.KEYID = 6
6,022,924 UART: [ldev] SUBJECT.KEYID = 5
6,024,147 UART: [ldev] AUTHORITY.KEYID = 7
6,025,443 UART: [ldev] FE.KEYID = 1
6,063,620 UART: [ldev] Erasing FE.KEYID = 1
8,570,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,307,007 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,322,820 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,338,680 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,354,477 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,376,406 UART: [ldev] --
10,380,981 UART: [fwproc] Wait for Commands...
10,383,298 UART: [fwproc] Recv command 0x46574c44
10,385,287 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,391 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,058,418 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,387,041 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,458,584 ready_for_fw is high
3,458,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,253,726 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
192,023 UART:
192,416 UART: Running Caliptra ROM ...
193,533 UART:
603,219 UART: [state] CFI Enabled
618,661 UART: [state] LifecycleState = Production
620,453 UART: [state] DebugLocked = Yes
623,232 UART: [state] Starting the WD Timer 40000000 cycles
627,472 UART: [kat] SHA2-256
807,153 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,957 UART: [kat] ++
818,498 UART: [kat] sha1
828,438 UART: [kat] SHA2-256
831,099 UART: [kat] SHA2-384
837,601 UART: [kat] SHA2-512-ACC
839,974 UART: [kat] ECC-384
3,280,934 UART: [kat] HMAC-384Kdf
3,293,617 UART: [kat] LMS
3,770,136 UART: [kat] --
3,772,794 UART: [cold-reset] ++
3,774,281 UART: [fht] FHT @ 0x50003400
3,785,916 UART: [idev] ++
3,786,486 UART: [idev] CDI.KEYID = 6
3,787,526 UART: [idev] SUBJECT.KEYID = 7
3,788,703 UART: [idev] UDS.KEYID = 0
3,789,640 ready_for_fw is high
3,789,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,771 UART: [idev] Erasing UDS.KEYID = 0
6,266,131 UART: [idev] Sha1 KeyId Algorithm
6,289,802 UART: [idev] --
6,296,119 UART: [ldev] ++
6,296,756 UART: [ldev] CDI.KEYID = 6
6,297,826 UART: [ldev] SUBJECT.KEYID = 5
6,298,937 UART: [ldev] AUTHORITY.KEYID = 7
6,300,118 UART: [ldev] FE.KEYID = 1
6,310,769 UART: [ldev] Erasing FE.KEYID = 1
8,789,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,902 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,524,699 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,540,553 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,556,285 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,577,585 UART: [ldev] --
10,582,494 UART: [fwproc] Wait for Commands...
10,585,528 UART: [fwproc] Recv command 0x46574c44
10,587,524 UART: [fwproc] Recv'd Img size: 118548 bytes
14,099,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,999 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,252,026 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,580,994 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,511 writing to cptra_bootfsm_go
3,784,890 ready_for_fw is high
3,785,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,479,383 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
191,624 UART:
192,053 UART: Running Caliptra ROM ...
193,194 UART:
193,345 UART: [state] CFI Enabled
254,712 UART: [state] LifecycleState = Production
256,961 UART: [state] DebugLocked = Yes
258,550 UART: [state] Starting the WD Timer 40000000 cycles
263,575 UART: [kat] SHA2-256
453,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,232 UART: [kat] ++
464,741 UART: [kat] sha1
475,173 UART: [kat] SHA2-256
478,220 UART: [kat] SHA2-384
485,010 UART: [kat] SHA2-512-ACC
487,609 UART: [kat] ECC-384
2,939,487 UART: [kat] HMAC-384Kdf
2,960,639 UART: [kat] LMS
3,492,393 UART: [kat] --
3,495,754 UART: [cold-reset] ++
3,498,261 UART: [fht] FHT @ 0x50003400
3,509,635 UART: [idev] ++
3,510,416 UART: [idev] CDI.KEYID = 6
3,511,340 UART: [idev] SUBJECT.KEYID = 7
3,512,532 UART: [idev] UDS.KEYID = 0
3,513,463 ready_for_fw is high
3,513,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,662,698 UART: [idev] Erasing UDS.KEYID = 0
6,020,487 UART: [idev] Sha1 KeyId Algorithm
6,044,119 UART: [idev] --
6,049,202 UART: [ldev] ++
6,049,891 UART: [ldev] CDI.KEYID = 6
6,050,778 UART: [ldev] SUBJECT.KEYID = 5
6,051,996 UART: [ldev] AUTHORITY.KEYID = 7
6,053,183 UART: [ldev] FE.KEYID = 1
6,090,331 UART: [ldev] Erasing FE.KEYID = 1
8,596,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,861 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,349,127 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,364,189 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,379,139 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,399,905 UART: [ldev] --
10,405,735 UART: [fwproc] Wait for Commands...
10,408,705 UART: [fwproc] Recv command 0x46574c44
10,410,700 UART: [fwproc] Recv'd Img size: 118548 bytes
13,944,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,028,959 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,152,559 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,713,155 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,439,276 ready_for_fw is high
3,439,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,867,481 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
191,883 UART:
192,249 UART: Running Caliptra ROM ...
193,560 UART:
602,890 UART: [state] CFI Enabled
616,361 UART: [state] LifecycleState = Production
618,519 UART: [state] DebugLocked = Yes
621,219 UART: [state] Starting the WD Timer 40000000 cycles
625,601 UART: [kat] SHA2-256
815,514 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,383 UART: [kat] ++
826,910 UART: [kat] sha1
837,783 UART: [kat] SHA2-256
840,829 UART: [kat] SHA2-384
845,700 UART: [kat] SHA2-512-ACC
848,253 UART: [kat] ECC-384
3,292,016 UART: [kat] HMAC-384Kdf
3,305,471 UART: [kat] LMS
3,837,254 UART: [kat] --
3,841,538 UART: [cold-reset] ++
3,843,475 UART: [fht] FHT @ 0x50003400
3,855,023 UART: [idev] ++
3,855,747 UART: [idev] CDI.KEYID = 6
3,856,672 UART: [idev] SUBJECT.KEYID = 7
3,857,929 UART: [idev] UDS.KEYID = 0
3,859,130 ready_for_fw is high
3,859,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,364 UART: [idev] Erasing UDS.KEYID = 0
6,335,802 UART: [idev] Sha1 KeyId Algorithm
6,358,258 UART: [idev] --
6,362,209 UART: [ldev] ++
6,362,898 UART: [ldev] CDI.KEYID = 6
6,363,813 UART: [ldev] SUBJECT.KEYID = 5
6,365,031 UART: [ldev] AUTHORITY.KEYID = 7
6,366,220 UART: [ldev] FE.KEYID = 1
6,378,089 UART: [ldev] Erasing FE.KEYID = 1
8,854,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,890 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,591,083 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,606,167 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,621,147 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,641,029 UART: [ldev] --
10,646,947 UART: [fwproc] Wait for Commands...
10,648,895 UART: [fwproc] Recv command 0x46574c44
10,650,891 UART: [fwproc] Recv'd Img size: 118548 bytes
14,182,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,259,488 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,383,056 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,944,081 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
3,756,394 ready_for_fw is high
3,756,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,092,690 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,715 UART: [state] LifecycleState = Production
85,323 UART: [state] DebugLocked = Yes
86,035 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,789 UART: [kat] SHA2-256
881,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,835 UART: [kat] ++
885,987 UART: [kat] sha1
890,165 UART: [kat] SHA2-256
892,103 UART: [kat] SHA2-384
894,832 UART: [kat] SHA2-512-ACC
896,733 UART: [kat] ECC-384
902,376 UART: [kat] HMAC-384Kdf
906,860 UART: [kat] LMS
1,475,056 UART: [kat] --
1,475,923 UART: [cold-reset] ++
1,476,324 UART: [fht] Storing FHT @ 0x50003400
1,479,021 UART: [idev] ++
1,479,189 UART: [idev] CDI.KEYID = 6
1,479,549 UART: [idev] SUBJECT.KEYID = 7
1,479,973 UART: [idev] UDS.KEYID = 0
1,480,318 ready_for_fw is high
1,480,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,068 UART: [idev] Erasing UDS.KEYID = 0
1,504,935 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,410 UART: [idev] --
1,514,691 UART: [ldev] ++
1,514,859 UART: [ldev] CDI.KEYID = 6
1,515,222 UART: [ldev] SUBJECT.KEYID = 5
1,515,648 UART: [ldev] AUTHORITY.KEYID = 7
1,516,111 UART: [ldev] FE.KEYID = 1
1,521,435 UART: [ldev] Erasing FE.KEYID = 1
1,546,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,337 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,031 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,903 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,609 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,651 UART: [ldev] --
1,586,124 UART: [fwproc] Waiting for Commands...
1,586,801 UART: [fwproc] Received command 0x46574c44
1,587,592 UART: [fwproc] Received Image of size 118548 bytes
2,958,575 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,984,876 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,016,094 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,156,352 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,860 ready_for_fw is high
1,362,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,006,988 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Production
86,100 UART: [state] DebugLocked = Yes
86,832 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,578 UART: [kat] SHA2-256
882,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,624 UART: [kat] ++
886,776 UART: [kat] sha1
891,024 UART: [kat] SHA2-256
892,962 UART: [kat] SHA2-384
895,767 UART: [kat] SHA2-512-ACC
897,668 UART: [kat] ECC-384
903,299 UART: [kat] HMAC-384Kdf
907,881 UART: [kat] LMS
1,476,077 UART: [kat] --
1,476,988 UART: [cold-reset] ++
1,477,555 UART: [fht] Storing FHT @ 0x50003400
1,480,378 UART: [idev] ++
1,480,546 UART: [idev] CDI.KEYID = 6
1,480,906 UART: [idev] SUBJECT.KEYID = 7
1,481,330 UART: [idev] UDS.KEYID = 0
1,481,675 ready_for_fw is high
1,481,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,939 UART: [idev] Erasing UDS.KEYID = 0
1,505,580 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,121 UART: [idev] --
1,515,142 UART: [ldev] ++
1,515,310 UART: [ldev] CDI.KEYID = 6
1,515,673 UART: [ldev] SUBJECT.KEYID = 5
1,516,099 UART: [ldev] AUTHORITY.KEYID = 7
1,516,562 UART: [ldev] FE.KEYID = 1
1,521,770 UART: [ldev] Erasing FE.KEYID = 1
1,547,481 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,144 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,838 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,710 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,416 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,484 UART: [ldev] --
1,586,791 UART: [fwproc] Waiting for Commands...
1,587,452 UART: [fwproc] Received command 0x46574c44
1,588,243 UART: [fwproc] Received Image of size 118548 bytes
2,957,016 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,984,131 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,015,349 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,155,599 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,369 ready_for_fw is high
1,363,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,005,571 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Production
85,673 UART: [state] DebugLocked = Yes
86,405 UART: [state] Starting the WD Timer 40000000 cycles
88,104 UART: [kat] SHA2-256
891,654 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,070 UART: [kat] SHA2-256
902,010 UART: [kat] SHA2-384
904,885 UART: [kat] SHA2-512-ACC
906,786 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,673 UART: [kat] LMS
1,168,985 UART: [kat] --
1,169,974 UART: [cold-reset] ++
1,170,337 UART: [fht] FHT @ 0x50003400
1,172,893 UART: [idev] ++
1,173,061 UART: [idev] CDI.KEYID = 6
1,173,422 UART: [idev] SUBJECT.KEYID = 7
1,173,847 UART: [idev] UDS.KEYID = 0
1,174,193 ready_for_fw is high
1,174,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,803 UART: [idev] Erasing UDS.KEYID = 0
1,198,708 UART: [idev] Sha1 KeyId Algorithm
1,207,589 UART: [idev] --
1,208,502 UART: [ldev] ++
1,208,670 UART: [ldev] CDI.KEYID = 6
1,209,034 UART: [ldev] SUBJECT.KEYID = 5
1,209,461 UART: [ldev] AUTHORITY.KEYID = 7
1,209,924 UART: [ldev] FE.KEYID = 1
1,215,038 UART: [ldev] Erasing FE.KEYID = 1
1,241,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,759 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,453 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,323 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,029 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,969 UART: [ldev] --
1,280,282 UART: [fwproc] Wait for Commands...
1,281,069 UART: [fwproc] Recv command 0x46574c44
1,281,802 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,430 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,605 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,849,831 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,271 ready_for_fw is high
1,059,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,660 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Production
85,578 UART: [state] DebugLocked = Yes
86,292 UART: [state] Starting the WD Timer 40000000 cycles
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,414 UART: [kat] SHA2-512-ACC
906,315 UART: [kat] ECC-384
916,146 UART: [kat] HMAC-384Kdf
920,738 UART: [kat] LMS
1,169,050 UART: [kat] --
1,169,791 UART: [cold-reset] ++
1,170,248 UART: [fht] FHT @ 0x50003400
1,172,880 UART: [idev] ++
1,173,048 UART: [idev] CDI.KEYID = 6
1,173,409 UART: [idev] SUBJECT.KEYID = 7
1,173,834 UART: [idev] UDS.KEYID = 0
1,174,180 ready_for_fw is high
1,174,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,198,711 UART: [idev] Sha1 KeyId Algorithm
1,207,636 UART: [idev] --
1,208,663 UART: [ldev] ++
1,208,831 UART: [ldev] CDI.KEYID = 6
1,209,195 UART: [ldev] SUBJECT.KEYID = 5
1,209,622 UART: [ldev] AUTHORITY.KEYID = 7
1,210,085 UART: [ldev] FE.KEYID = 1
1,215,637 UART: [ldev] Erasing FE.KEYID = 1
1,241,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,056 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,750 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,620 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,326 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,332 UART: [ldev] --
1,280,635 UART: [fwproc] Wait for Commands...
1,281,390 UART: [fwproc] Recv command 0x46574c44
1,282,123 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,643 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,818 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,046 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,182 ready_for_fw is high
1,060,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,747 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Production
86,045 UART: [state] DebugLocked = Yes
86,651 UART: [state] Starting the WD Timer 40000000 cycles
88,116 UART: [kat] SHA2-256
893,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,891 UART: [kat] ++
898,043 UART: [kat] sha1
902,163 UART: [kat] SHA2-256
904,103 UART: [kat] SHA2-384
906,824 UART: [kat] SHA2-512-ACC
908,725 UART: [kat] ECC-384
918,630 UART: [kat] HMAC-384Kdf
923,114 UART: [kat] LMS
1,171,442 UART: [kat] --
1,172,311 UART: [cold-reset] ++
1,172,734 UART: [fht] FHT @ 0x50003400
1,175,373 UART: [idev] ++
1,175,541 UART: [idev] CDI.KEYID = 6
1,175,901 UART: [idev] SUBJECT.KEYID = 7
1,176,325 UART: [idev] UDS.KEYID = 0
1,176,670 ready_for_fw is high
1,176,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,190 UART: [idev] Erasing UDS.KEYID = 0
1,200,632 UART: [idev] Sha1 KeyId Algorithm
1,208,985 UART: [idev] --
1,210,017 UART: [ldev] ++
1,210,185 UART: [ldev] CDI.KEYID = 6
1,210,548 UART: [ldev] SUBJECT.KEYID = 5
1,210,974 UART: [ldev] AUTHORITY.KEYID = 7
1,211,437 UART: [ldev] FE.KEYID = 1
1,216,595 UART: [ldev] Erasing FE.KEYID = 1
1,243,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,081 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,775 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,647 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,353 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,502 UART: [ldev] --
1,282,937 UART: [fwproc] Wait for Commands...
1,283,529 UART: [fwproc] Recv command 0x46574c44
1,284,257 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,627 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,797 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,127 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,884 ready_for_fw is high
1,060,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,707,570 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Production
86,042 UART: [state] DebugLocked = Yes
86,580 UART: [state] Starting the WD Timer 40000000 cycles
88,143 UART: [kat] SHA2-256
893,793 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,918 UART: [kat] ++
898,070 UART: [kat] sha1
902,322 UART: [kat] SHA2-256
904,262 UART: [kat] SHA2-384
906,941 UART: [kat] SHA2-512-ACC
908,842 UART: [kat] ECC-384
918,503 UART: [kat] HMAC-384Kdf
923,081 UART: [kat] LMS
1,171,409 UART: [kat] --
1,172,192 UART: [cold-reset] ++
1,172,591 UART: [fht] FHT @ 0x50003400
1,175,202 UART: [idev] ++
1,175,370 UART: [idev] CDI.KEYID = 6
1,175,730 UART: [idev] SUBJECT.KEYID = 7
1,176,154 UART: [idev] UDS.KEYID = 0
1,176,499 ready_for_fw is high
1,176,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,831 UART: [idev] Erasing UDS.KEYID = 0
1,200,689 UART: [idev] Sha1 KeyId Algorithm
1,209,066 UART: [idev] --
1,210,124 UART: [ldev] ++
1,210,292 UART: [ldev] CDI.KEYID = 6
1,210,655 UART: [ldev] SUBJECT.KEYID = 5
1,211,081 UART: [ldev] AUTHORITY.KEYID = 7
1,211,544 UART: [ldev] FE.KEYID = 1
1,216,966 UART: [ldev] Erasing FE.KEYID = 1
1,243,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,724 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,418 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,290 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,996 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,989 UART: [ldev] --
1,282,492 UART: [fwproc] Wait for Commands...
1,283,188 UART: [fwproc] Recv command 0x46574c44
1,283,916 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,682,096 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,713,266 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,853,488 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,693 ready_for_fw is high
1,061,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,706,361 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,140 UART:
192,498 UART: Running Caliptra ROM ...
193,627 UART:
193,778 UART: [state] CFI Enabled
265,456 UART: [state] LifecycleState = Unprovisioned
267,388 UART: [state] DebugLocked = No
270,212 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,570 UART: [kat] SHA2-256
444,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,801 UART: [kat] ++
455,254 UART: [kat] sha1
464,925 UART: [kat] SHA2-256
467,599 UART: [kat] SHA2-384
474,261 UART: [kat] SHA2-512-ACC
476,640 UART: [kat] ECC-384
2,768,836 UART: [kat] HMAC-384Kdf
2,781,159 UART: [kat] LMS
3,971,473 UART: [kat] --
3,976,108 UART: [cold-reset] ++
3,977,753 UART: [fht] Storing FHT @ 0x50003400
3,989,803 UART: [idev] ++
3,990,371 UART: [idev] CDI.KEYID = 6
3,991,442 UART: [idev] SUBJECT.KEYID = 7
3,992,550 UART: [idev] UDS.KEYID = 0
3,993,608 ready_for_fw is high
3,993,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,373 UART: [idev] Erasing UDS.KEYID = 0
7,328,589 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,989 UART: [idev] --
7,353,577 UART: [ldev] ++
7,354,157 UART: [ldev] CDI.KEYID = 6
7,355,125 UART: [ldev] SUBJECT.KEYID = 5
7,356,344 UART: [ldev] AUTHORITY.KEYID = 7
7,357,581 UART: [ldev] FE.KEYID = 1
7,403,829 UART: [ldev] Erasing FE.KEYID = 1
10,737,367 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,421 UART: [ldev] --
13,117,427 UART: [fwproc] Waiting for Commands...
13,120,177 UART: [fwproc] Received command 0x46574c44
13,122,368 UART: [fwproc] Received Image of size 118548 bytes
17,229,563 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,306,364 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,379,535 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,707,310 >>> mbox cmd response: success
17,707,751 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,711,243 UART: [afmc] ++
17,711,872 UART: [afmc] CDI.KEYID = 6
17,712,782 UART: [afmc] SUBJECT.KEYID = 7
17,713,997 UART: [afmc] AUTHORITY.KEYID = 5
21,066,511 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,538 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,806 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,238 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,969 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,379 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,438,691 UART: [afmc] --
23,442,228 UART: [cold-reset] --
23,446,162 UART: [state] Locking Datavault
23,451,960 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,756 UART: [state] Locking ICCM
23,456,270 UART: [exit] Launching FMC @ 0x40000130
23,464,672 UART:
23,464,908 UART: Running Caliptra FMC ...
23,465,935 UART:
23,466,079 UART: [state] CFI Enabled
23,532,319 UART: [fht] FMC Alias Private Key: 7
25,872,949 UART: [art] Extend RT PCRs Done
25,874,169 UART: [art] Lock RT PCRs Done
25,875,561 UART: [art] Populate DV Done
25,880,763 UART: [fht] FMC Alias Private Key: 7
25,882,465 UART: [art] Derive CDI
25,883,205 UART: [art] Store in slot 0x4
25,940,970 UART: [art] Derive Key Pair
25,942,027 UART: [art] Store priv key in slot 0x5
29,235,531 UART: [art] Derive Key Pair - Done
29,248,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,813 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,329 UART: [art] PUB.X = 84ED5B0BE6E3970849FCD54E5582CE5A512116AD8F9F61A0E1762E9E338C9C19B3688D2D57B82DEE418EBEBBDB05BD39
31,545,588 UART: [art] PUB.Y = 483717B45AF627AE1CC9B15242F52D77693DECC9107D20AF421DE56EF9E5A9A2CDCC8D05797A064E5687F0CC6437ED32
31,552,872 UART: [art] SIG.R = 1F6D8F7EA75936B53B76566FC73A8ACA2C670656A8E5E0B7202D2C17DEA94FD577B1109598C25FE9265A2810ABB7A91A
31,560,264 UART: [art] SIG.S = 47B2D2CAA5A9DC8159DDE02FDBFF17720B06F1136F69FBFCF7721B4E317FE9C67741FA3EE8E67A9F5FB1C81E0D0B512D
32,865,543 UART: Caliptra RT
32,866,280 UART: [state] CFI Enabled
33,062,815 UART: [rt] RT listening for mailbox commands...
33,094,127 UART: [rt]cmd =0x46505344, len=4
33,204,306 >>> mbox cmd response data (8 bytes)
33,204,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,205,174 UART: Fatal Error: 0x000E0008
33,206,313 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,807,117 ready_for_fw is high
3,807,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,967,526 >>> mbox cmd response: success
17,968,363 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,656,560 UART:
23,657,049 UART: Running Caliptra FMC ...
23,658,195 UART:
23,658,357 UART: [state] CFI Enabled
23,723,733 UART: [fht] FMC Alias Private Key: 7
26,064,348 UART: [art] Extend RT PCRs Done
26,065,587 UART: [art] Lock RT PCRs Done
26,067,169 UART: [art] Populate DV Done
26,072,510 UART: [fht] FMC Alias Private Key: 7
26,074,059 UART: [art] Derive CDI
26,074,885 UART: [art] Store in slot 0x4
26,132,398 UART: [art] Derive Key Pair
26,133,441 UART: [art] Store priv key in slot 0x5
29,426,255 UART: [art] Derive Key Pair - Done
29,439,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,803 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,325 UART: [art] PUB.X = 54D0C4A7E08225F8E1C6DBC83D8106E14026DC16AF45F0E22B141D360D986E1C145A5C3CCCBB076CBAF0C7E4AA141212
31,736,537 UART: [art] PUB.Y = 4237D9844C744C1EA8F402E3BA61834A9FF588F8F139A699037320A01B71AD376A7CECBD1A0044CE199529D3B1791E82
31,743,825 UART: [art] SIG.R = 7A58BF79BDFD656F63918B86F8AFB58E683172155862F1C63460FDC321068D570EFCF349BC83396C49D3D577445481A3
31,751,171 UART: [art] SIG.S = 8DDD6AFDED44AF62F9E235981CE8A97317B8562E9A00B02A49EDD2143F2823710B2CFCF3FEAE0CBEBE61494D19595F4E
33,056,344 UART: Caliptra RT
33,057,073 UART: [state] CFI Enabled
33,233,637 UART: [rt] RT listening for mailbox commands...
33,264,895 UART: [rt]cmd =0x46505344, len=4
33,375,056 >>> mbox cmd response data (8 bytes)
33,375,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,375,923 UART: Fatal Error: 0x000E0008
33,377,050 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,560 UART:
192,937 UART: Running Caliptra ROM ...
194,144 UART:
603,868 UART: [state] CFI Enabled
618,858 UART: [state] LifecycleState = Unprovisioned
620,754 UART: [state] DebugLocked = No
622,923 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,297 UART: [kat] SHA2-256
798,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,642 UART: [kat] ++
809,114 UART: [kat] sha1
820,993 UART: [kat] SHA2-256
823,728 UART: [kat] SHA2-384
829,724 UART: [kat] SHA2-512-ACC
832,127 UART: [kat] ECC-384
3,117,803 UART: [kat] HMAC-384Kdf
3,128,689 UART: [kat] LMS
4,318,791 UART: [kat] --
4,323,294 UART: [cold-reset] ++
4,325,742 UART: [fht] Storing FHT @ 0x50003400
4,337,017 UART: [idev] ++
4,337,594 UART: [idev] CDI.KEYID = 6
4,338,485 UART: [idev] SUBJECT.KEYID = 7
4,339,808 UART: [idev] UDS.KEYID = 0
4,340,877 ready_for_fw is high
4,341,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,489 UART: [idev] Erasing UDS.KEYID = 0
7,634,003 UART: [idev] Using Sha1 for KeyId Algorithm
7,656,608 UART: [idev] --
7,660,770 UART: [ldev] ++
7,661,345 UART: [ldev] CDI.KEYID = 6
7,662,375 UART: [ldev] SUBJECT.KEYID = 5
7,663,538 UART: [ldev] AUTHORITY.KEYID = 7
7,664,776 UART: [ldev] FE.KEYID = 1
7,675,916 UART: [ldev] Erasing FE.KEYID = 1
10,964,272 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,256,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,271,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,286,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,300,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,339 UART: [ldev] --
13,323,952 UART: [fwproc] Waiting for Commands...
13,327,055 UART: [fwproc] Received command 0x46574c44
13,329,255 UART: [fwproc] Received Image of size 118548 bytes
17,438,901 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,517,780 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,590,937 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,919,823 >>> mbox cmd response: success
17,920,237 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,923,181 UART: [afmc] ++
17,923,815 UART: [afmc] CDI.KEYID = 6
17,924,702 UART: [afmc] SUBJECT.KEYID = 7
17,925,981 UART: [afmc] AUTHORITY.KEYID = 5
21,242,280 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,535,886 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,538,147 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,552,616 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,567,285 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,581,735 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,603,114 UART: [afmc] --
23,606,445 UART: [cold-reset] --
23,609,120 UART: [state] Locking Datavault
23,613,290 UART: [state] Locking PCR0, PCR1 and PCR31
23,615,048 UART: [state] Locking ICCM
23,616,673 UART: [exit] Launching FMC @ 0x40000130
23,625,071 UART:
23,625,316 UART: Running Caliptra FMC ...
23,626,426 UART:
23,626,590 UART: [state] CFI Enabled
23,634,792 UART: [fht] FMC Alias Private Key: 7
25,974,308 UART: [art] Extend RT PCRs Done
25,975,531 UART: [art] Lock RT PCRs Done
25,977,157 UART: [art] Populate DV Done
25,982,681 UART: [fht] FMC Alias Private Key: 7
25,984,299 UART: [art] Derive CDI
25,985,125 UART: [art] Store in slot 0x4
26,027,299 UART: [art] Derive Key Pair
26,028,306 UART: [art] Store priv key in slot 0x5
29,270,002 UART: [art] Derive Key Pair - Done
29,283,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,563,411 UART: [art] Erasing AUTHORITY.KEYID = 7
31,564,936 UART: [art] PUB.X = E0AF8C976E1AA0F2900AC9477AA80035F3F8E8320A1F129BC9E514E8478672CBC5495B9DEFCABC76DDD5EE8C5B14911E
31,572,201 UART: [art] PUB.Y = 01D3E8A714144EADB97FF982D60CFCB3F6AE0B23B309236E6F0DC016AF895491573FCABDB58F039394C3635AEAED5CCC
31,579,450 UART: [art] SIG.R = CC9A1E321DF440D9AC87911AE094A133481BE1A4037F51DD24D7AB8495FD84D549A3D186347B65F71B30F7794DE8C041
31,586,857 UART: [art] SIG.S = BD465E68F1E4295724BB7F122A5EC62020BE06FDE6D4A97073A8D2B23913EF20769B309A5938934CF83769DB6A7E6F28
32,891,126 UART: Caliptra RT
32,892,229 UART: [state] CFI Enabled
33,026,194 UART: [rt] RT listening for mailbox commands...
33,057,581 UART: [rt]cmd =0x46505344, len=4
33,167,583 >>> mbox cmd response data (8 bytes)
33,168,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,168,602 UART: Fatal Error: 0x000E0008
33,169,742 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,170 writing to cptra_bootfsm_go
4,129,205 ready_for_fw is high
4,129,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,544 >>> mbox cmd response: success
18,164,160 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,807,897 UART:
23,808,395 UART: Running Caliptra FMC ...
23,809,541 UART:
23,809,701 UART: [state] CFI Enabled
23,817,592 UART: [fht] FMC Alias Private Key: 7
26,157,460 UART: [art] Extend RT PCRs Done
26,158,703 UART: [art] Lock RT PCRs Done
26,160,473 UART: [art] Populate DV Done
26,165,824 UART: [fht] FMC Alias Private Key: 7
26,167,432 UART: [art] Derive CDI
26,168,258 UART: [art] Store in slot 0x4
26,210,755 UART: [art] Derive Key Pair
26,211,783 UART: [art] Store priv key in slot 0x5
29,454,049 UART: [art] Derive Key Pair - Done
29,467,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,348 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,870 UART: [art] PUB.X = 804D0ACA0AD074A0EF8F9A07246E5F7F20F35237487FA3D39556E718D868279018534E93738E3046F71A1FE3EBC0E689
31,756,135 UART: [art] PUB.Y = FA46CD579939DFBF666DA2DCDA4512A4E31BDEABFCD1ABFA969634E4496FCF9FD13AD0C036BB8AB4F123DC5E4747E615
31,763,427 UART: [art] SIG.R = BC6DD72DED42956B01E347610247B460F8BB3C56BF7675D8238A2BB23A20925E4959B8E2CE928C6CFD3155AAAA0D8638
31,770,833 UART: [art] SIG.S = ACB509118FD4496D2582D694EC79955F45C1B1CB408109804804C4079743E9A38BF95588382866E9F12F6C560F5EF0CE
33,075,691 UART: Caliptra RT
33,076,399 UART: [state] CFI Enabled
33,209,419 UART: [rt] RT listening for mailbox commands...
33,240,573 UART: [rt]cmd =0x46505344, len=4
33,350,630 >>> mbox cmd response data (8 bytes)
33,351,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,351,503 UART: Fatal Error: 0x000E0008
33,352,638 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,145 UART:
192,532 UART: Running Caliptra ROM ...
193,693 UART:
193,846 UART: [state] CFI Enabled
264,247 UART: [state] LifecycleState = Unprovisioned
266,250 UART: [state] DebugLocked = No
268,445 UART: [state] WD Timer not started. Device not locked for debugging
272,292 UART: [kat] SHA2-256
451,955 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,766 UART: [kat] ++
463,221 UART: [kat] sha1
474,026 UART: [kat] SHA2-256
476,688 UART: [kat] SHA2-384
482,047 UART: [kat] SHA2-512-ACC
484,434 UART: [kat] ECC-384
2,946,684 UART: [kat] HMAC-384Kdf
2,975,607 UART: [kat] LMS
3,452,123 UART: [kat] --
3,456,240 UART: [cold-reset] ++
3,458,183 UART: [fht] FHT @ 0x50003400
3,469,804 UART: [idev] ++
3,470,375 UART: [idev] CDI.KEYID = 6
3,471,263 UART: [idev] SUBJECT.KEYID = 7
3,472,593 UART: [idev] UDS.KEYID = 0
3,473,501 ready_for_fw is high
3,473,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,983 UART: [idev] Erasing UDS.KEYID = 0
5,995,097 UART: [idev] Sha1 KeyId Algorithm
6,019,593 UART: [idev] --
6,023,121 UART: [ldev] ++
6,023,698 UART: [ldev] CDI.KEYID = 6
6,024,594 UART: [ldev] SUBJECT.KEYID = 5
6,025,815 UART: [ldev] AUTHORITY.KEYID = 7
6,027,126 UART: [ldev] FE.KEYID = 1
6,063,165 UART: [ldev] Erasing FE.KEYID = 1
8,568,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,871 UART: [ldev] --
10,378,912 UART: [fwproc] Wait for Commands...
10,380,970 UART: [fwproc] Recv command 0x46574c44
10,382,962 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,687 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,705 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,707 >>> mbox cmd response: success
14,348,176 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,351,226 UART: [afmc] ++
14,351,813 UART: [afmc] CDI.KEYID = 6
14,352,793 UART: [afmc] SUBJECT.KEYID = 7
14,354,011 UART: [afmc] AUTHORITY.KEYID = 5
16,900,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,214 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,398 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,184 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,240 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,835 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,599 UART: [afmc] --
18,716,663 UART: [cold-reset] --
18,721,181 UART: [state] Locking Datavault
18,728,000 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,770 UART: [state] Locking ICCM
18,732,086 UART: [exit] Launching FMC @ 0x40000130
18,740,508 UART:
18,740,749 UART: Running Caliptra FMC ...
18,741,858 UART:
18,742,020 UART: [state] CFI Enabled
18,797,446 UART: [fht] FMC Alias Private Key: 7
20,564,187 UART: [art] Extend RT PCRs Done
20,565,415 UART: [art] Lock RT PCRs Done
20,567,204 UART: [art] Populate DV Done
20,572,563 UART: [fht] FMC Alias Private Key: 7
20,574,099 UART: [art] Derive CDI
20,574,842 UART: [art] Store in slot 0x4
20,629,632 UART: [art] Derive Key Pair
20,630,677 UART: [art] Store priv key in slot 0x5
23,108,984 UART: [art] Derive Key Pair - Done
23,121,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,836,322 UART: [art] Erasing AUTHORITY.KEYID = 7
24,838,083 UART: [art] PUB.X = 0A2C3DDD30B95AFCE79A4BA4906027C8C4699725FF3A813575AF1E356AFD81124ED75BA1357138F1250D04FB3F167F8C
24,845,082 UART: [art] PUB.Y = 1778E55090A1C9D51FA0341D35A2C51D08F7A1BDA3E3CF659D14CB2953003FEC6221432A3D48F9B76EEC96CFEE0F0040
24,852,337 UART: [art] SIG.R = D0CD299881B5C8FD3B0EBBCBB4238892F7F428EAA2CC93AA2ABE2D861D7175E6C8355DA7C1B6537DBBA9BF4EA3A97CF8
24,859,734 UART: [art] SIG.S = 2290D82F5C47AC501F8EEB98B0873EC6C7D16E0DC863EE1FE89F417036C034447D9BDC782A449680FE98192840093A40
25,838,754 UART: Caliptra RT
25,839,449 UART: [state] CFI Enabled
26,018,738 UART: [rt] RT listening for mailbox commands...
26,049,989 UART: [rt]cmd =0x46505344, len=4
26,160,187 >>> mbox cmd response data (8 bytes)
26,160,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,161,114 UART: Fatal Error: 0x000E0008
26,162,150 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,458,311 ready_for_fw is high
3,458,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,861 >>> mbox cmd response: success
14,242,437 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,535,927 UART:
18,536,313 UART: Running Caliptra FMC ...
18,537,513 UART:
18,537,677 UART: [state] CFI Enabled
18,594,394 UART: [fht] FMC Alias Private Key: 7
20,360,143 UART: [art] Extend RT PCRs Done
20,361,366 UART: [art] Lock RT PCRs Done
20,363,267 UART: [art] Populate DV Done
20,369,011 UART: [fht] FMC Alias Private Key: 7
20,370,727 UART: [art] Derive CDI
20,371,552 UART: [art] Store in slot 0x4
20,426,638 UART: [art] Derive Key Pair
20,427,702 UART: [art] Store priv key in slot 0x5
22,890,030 UART: [art] Derive Key Pair - Done
22,903,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,615,736 UART: [art] Erasing AUTHORITY.KEYID = 7
24,617,241 UART: [art] PUB.X = F01E61C2B834F55B40065E8FCF81A8ECA7A928EE838A6653B671FA5EB120ADB36F5A8E42CD2A18DED8F4166DE4772661
24,624,523 UART: [art] PUB.Y = F190FBBE961E41FB903214AC33844572A5E8FE3A6AC2ED83E9F3F959BB237842DD305138B290E14A7CA7E9C0541F0492
24,631,801 UART: [art] SIG.R = 09421ED28791992F508F667A9861053DF34CAB9051668E00C2DBA35020004B6FF77FB02A79DF4A480FCB08B82BDDAC3C
24,639,157 UART: [art] SIG.S = AFA462B0A19B19DA0BAF289227067028BB1751F959224072E7FC32880D687B09292FECAE4CD925DDFE0CF0632E999F81
25,618,622 UART: Caliptra RT
25,619,366 UART: [state] CFI Enabled
25,799,711 UART: [rt] RT listening for mailbox commands...
25,831,128 UART: [rt]cmd =0x46505344, len=4
25,941,335 >>> mbox cmd response data (8 bytes)
25,941,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
25,942,143 UART: Fatal Error: 0x000E0008
25,943,345 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
192,792 UART:
193,163 UART: Running Caliptra ROM ...
194,378 UART:
604,000 UART: [state] CFI Enabled
617,925 UART: [state] LifecycleState = Unprovisioned
619,844 UART: [state] DebugLocked = No
621,462 UART: [state] WD Timer not started. Device not locked for debugging
624,872 UART: [kat] SHA2-256
804,475 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,270 UART: [kat] ++
815,755 UART: [kat] sha1
827,700 UART: [kat] SHA2-256
830,428 UART: [kat] SHA2-384
836,562 UART: [kat] SHA2-512-ACC
838,948 UART: [kat] ECC-384
3,281,504 UART: [kat] HMAC-384Kdf
3,294,389 UART: [kat] LMS
3,770,925 UART: [kat] --
3,775,069 UART: [cold-reset] ++
3,776,539 UART: [fht] FHT @ 0x50003400
3,787,593 UART: [idev] ++
3,788,164 UART: [idev] CDI.KEYID = 6
3,789,149 UART: [idev] SUBJECT.KEYID = 7
3,790,401 UART: [idev] UDS.KEYID = 0
3,791,333 ready_for_fw is high
3,791,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,410 UART: [idev] Erasing UDS.KEYID = 0
6,266,425 UART: [idev] Sha1 KeyId Algorithm
6,290,831 UART: [idev] --
6,296,532 UART: [ldev] ++
6,297,112 UART: [ldev] CDI.KEYID = 6
6,298,086 UART: [ldev] SUBJECT.KEYID = 5
6,299,251 UART: [ldev] AUTHORITY.KEYID = 7
6,300,487 UART: [ldev] FE.KEYID = 1
6,310,815 UART: [ldev] Erasing FE.KEYID = 1
8,786,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,887 UART: [ldev] --
10,582,913 UART: [fwproc] Wait for Commands...
10,585,016 UART: [fwproc] Recv command 0x46574c44
10,587,012 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,186 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,198 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,351 >>> mbox cmd response: success
14,552,766 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,556,759 UART: [afmc] ++
14,557,340 UART: [afmc] CDI.KEYID = 6
14,558,329 UART: [afmc] SUBJECT.KEYID = 7
14,559,492 UART: [afmc] AUTHORITY.KEYID = 5
17,062,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,400 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,199 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,257 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,833,822 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,652 UART: [afmc] --
18,862,004 UART: [cold-reset] --
18,865,347 UART: [state] Locking Datavault
18,870,440 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,196 UART: [state] Locking ICCM
18,873,841 UART: [exit] Launching FMC @ 0x40000130
18,882,234 UART:
18,882,471 UART: Running Caliptra FMC ...
18,883,521 UART:
18,883,672 UART: [state] CFI Enabled
18,892,261 UART: [fht] FMC Alias Private Key: 7
20,658,107 UART: [art] Extend RT PCRs Done
20,659,334 UART: [art] Lock RT PCRs Done
20,660,910 UART: [art] Populate DV Done
20,666,272 UART: [fht] FMC Alias Private Key: 7
20,667,919 UART: [art] Derive CDI
20,668,738 UART: [art] Store in slot 0x4
20,710,955 UART: [art] Derive Key Pair
20,711,993 UART: [art] Store priv key in slot 0x5
23,139,066 UART: [art] Derive Key Pair - Done
23,152,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,624 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,126 UART: [art] PUB.X = 46A422981CE16573E9819ABE829F6250C9B63CF85478CE402AF592D9FA4C62DA3848F226202FE95E127D1CF5ADADEFA9
24,867,411 UART: [art] PUB.Y = 27B3953FF83402B5F634562B4E541CD73C1E76198F62546E0DF35F2BD9BDF757440FDC67EE779F2A5258A4F6BFF9ADFA
24,874,681 UART: [art] SIG.R = 405E702F2E4D0D21A17A3906AFFC470F30E6E871B683815D83F77CFC3B23AA14A98F81D1D965F157E7C12E851622B29C
24,882,113 UART: [art] SIG.S = D5AD017909012560FC028BD2C14C8598B3239D34E5294ED5F0D80C36ED74062D00A2F04D4A0589F314D6289A42B7F69C
25,861,051 UART: Caliptra RT
25,861,759 UART: [state] CFI Enabled
25,994,479 UART: [rt] RT listening for mailbox commands...
26,025,927 UART: [rt]cmd =0x46505344, len=4
26,135,753 >>> mbox cmd response data (8 bytes)
26,136,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,136,672 UART: Fatal Error: 0x000E0008
26,137,758 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
3,779,368 ready_for_fw is high
3,779,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,884 >>> mbox cmd response: success
14,444,382 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,691,601 UART:
18,691,994 UART: Running Caliptra FMC ...
18,693,200 UART:
18,693,362 UART: [state] CFI Enabled
18,701,159 UART: [fht] FMC Alias Private Key: 7
20,467,765 UART: [art] Extend RT PCRs Done
20,469,009 UART: [art] Lock RT PCRs Done
20,470,522 UART: [art] Populate DV Done
20,475,946 UART: [fht] FMC Alias Private Key: 7
20,477,544 UART: [art] Derive CDI
20,478,282 UART: [art] Store in slot 0x4
20,521,058 UART: [art] Derive Key Pair
20,522,068 UART: [art] Store priv key in slot 0x5
22,948,721 UART: [art] Derive Key Pair - Done
22,962,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,616 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,178 UART: [art] PUB.X = 80A915FC845A6E85B556C41F0BEC7281C4F2F909A425E504BE2D70B96F57760CA452609DB65C384EC529BF3BE58B19A6
24,677,393 UART: [art] PUB.Y = EBC99201509AFA84E9B6F69E4733D8CFD2A44DBB83BD16A1641636FD0E3FAA50BF5669262FC834CE7009A3644120AB2B
24,684,633 UART: [art] SIG.R = 95DD7AF19DB99941B266FB5B5ACDFE53447246E138203966FAAC75CAFA232615E641191B641545C3D89CF85AFA7285A1
24,692,039 UART: [art] SIG.S = EA0E81053C694A0DD1049B6D70A3745AFC3B382C731C76EC903080707DF9091E393AA4851BA6AB665F29D656BE65DCFE
25,671,260 UART: Caliptra RT
25,671,967 UART: [state] CFI Enabled
25,805,605 UART: [rt] RT listening for mailbox commands...
25,836,839 UART: [rt]cmd =0x46505344, len=4
25,947,197 >>> mbox cmd response data (8 bytes)
25,947,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
25,948,101 UART: Fatal Error: 0x000E0008
25,949,213 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,039 UART:
192,427 UART: Running Caliptra ROM ...
193,605 UART:
193,761 UART: [state] CFI Enabled
265,096 UART: [state] LifecycleState = Unprovisioned
267,030 UART: [state] DebugLocked = No
269,150 UART: [state] WD Timer not started. Device not locked for debugging
273,777 UART: [kat] SHA2-256
463,697 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,490 UART: [kat] ++
474,936 UART: [kat] sha1
486,737 UART: [kat] SHA2-256
489,758 UART: [kat] SHA2-384
495,829 UART: [kat] SHA2-512-ACC
498,417 UART: [kat] ECC-384
2,948,744 UART: [kat] HMAC-384Kdf
2,971,553 UART: [kat] LMS
3,503,378 UART: [kat] --
3,506,972 UART: [cold-reset] ++
3,508,344 UART: [fht] FHT @ 0x50003400
3,519,894 UART: [idev] ++
3,520,538 UART: [idev] CDI.KEYID = 6
3,521,579 UART: [idev] SUBJECT.KEYID = 7
3,522,687 UART: [idev] UDS.KEYID = 0
3,523,636 ready_for_fw is high
3,523,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,009 UART: [idev] Erasing UDS.KEYID = 0
6,027,768 UART: [idev] Sha1 KeyId Algorithm
6,049,201 UART: [idev] --
6,054,234 UART: [ldev] ++
6,054,926 UART: [ldev] CDI.KEYID = 6
6,055,816 UART: [ldev] SUBJECT.KEYID = 5
6,057,035 UART: [ldev] AUTHORITY.KEYID = 7
6,058,228 UART: [ldev] FE.KEYID = 1
6,099,176 UART: [ldev] Erasing FE.KEYID = 1
8,602,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,631 UART: [ldev] --
10,410,956 UART: [fwproc] Wait for Commands...
10,413,918 UART: [fwproc] Recv command 0x46574c44
10,416,233 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,682 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,109,321 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,669,630 >>> mbox cmd response: success
14,670,092 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,672,981 UART: [afmc] ++
14,673,696 UART: [afmc] CDI.KEYID = 6
14,674,806 UART: [afmc] SUBJECT.KEYID = 7
14,676,350 UART: [afmc] AUTHORITY.KEYID = 5
17,202,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,925,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,927,701 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,942,816 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,957,975 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,972,858 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,996,302 UART: [afmc] --
19,000,452 UART: [cold-reset] --
19,006,279 UART: [state] Locking Datavault
19,012,778 UART: [state] Locking PCR0, PCR1 and PCR31
19,014,925 UART: [state] Locking ICCM
19,017,626 UART: [exit] Launching FMC @ 0x40000130
19,026,299 UART:
19,026,567 UART: Running Caliptra FMC ...
19,027,681 UART:
19,027,844 UART: [state] CFI Enabled
19,085,716 UART: [fht] FMC Alias Private Key: 7
20,852,472 UART: [art] Extend RT PCRs Done
20,853,694 UART: [art] Lock RT PCRs Done
20,855,269 UART: [art] Populate DV Done
20,860,686 UART: [fht] FMC Alias Private Key: 7
20,862,280 UART: [art] Derive CDI
20,863,100 UART: [art] Store in slot 0x4
20,918,340 UART: [art] Derive Key Pair
20,919,389 UART: [art] Store priv key in slot 0x5
23,382,147 UART: [art] Derive Key Pair - Done
23,395,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,110,064 UART: [art] Erasing AUTHORITY.KEYID = 7
25,111,591 UART: [art] PUB.X = 067F5020F12E405B86472CED13B6F194BC350E3002CCF2D0D0A75C5D45D837384A5A8EDE8FD84E6004F219C8D0BD7132
25,118,833 UART: [art] PUB.Y = 9AF43F03351D5380FDA5DBA44214121067871C929F8F155A277E6F9E30DE3CF0C71C430EC6DBB782927087B5A582AFF4
25,126,096 UART: [art] SIG.R = 3741FACE1B81B4B131D96E5C544B3281E2B2C171A876BBA462E51E1A92D2D736C4553150F660128F9DE8710F0B85EAC3
25,133,466 UART: [art] SIG.S = A8C134A94475296CCECF7EC9E7BA2C3BFC85CE662E8CE4ABD2B0B2F11E9D005C5F66E5EE95CF54B42B998C032EDA7D73
26,112,572 UART: Caliptra RT
26,113,268 UART: [state] CFI Enabled
26,293,415 UART: [rt] RT listening for mailbox commands...
26,324,947 UART: [rt]cmd =0x46505344, len=4
26,434,978 >>> mbox cmd response data (8 bytes)
26,435,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,435,855 UART: Fatal Error: 0x000E0008
26,436,919 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,425,448 ready_for_fw is high
3,426,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,816,785 >>> mbox cmd response: success
14,817,705 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,102,286 UART:
19,102,698 UART: Running Caliptra FMC ...
19,103,849 UART:
19,104,011 UART: [state] CFI Enabled
19,171,587 UART: [fht] FMC Alias Private Key: 7
20,938,559 UART: [art] Extend RT PCRs Done
20,939,786 UART: [art] Lock RT PCRs Done
20,941,581 UART: [art] Populate DV Done
20,947,137 UART: [fht] FMC Alias Private Key: 7
20,948,806 UART: [art] Derive CDI
20,949,631 UART: [art] Store in slot 0x4
21,004,821 UART: [art] Derive Key Pair
21,005,879 UART: [art] Store priv key in slot 0x5
23,478,237 UART: [art] Derive Key Pair - Done
23,491,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,026 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,549 UART: [art] PUB.X = 62757C283AC955C43AED6358A5AA1AEE82BBF19C4BD14B8BC79F8678B4B55D819DC39842322213AED5EC30F73BBFC1A2
25,212,823 UART: [art] PUB.Y = B7925E5E84499AAC17375EFA1FC344B5A60556B3266C5C9455D5CB2D43FB10D851FF1B143AD9541E6BF247BF04DBDADE
25,220,102 UART: [art] SIG.R = 70C1503B439402BBA60C625503CB6EC86B1CCFDC3364F069B5335C4C57322089DADC75FA2FCB4F7C06C2D50EF69AD6C8
25,227,521 UART: [art] SIG.S = 2BE918515B12CBB282787B324A4497FCDF695F507B2F73275482A4338BADCE57B303C06805A41C6725BFB865A5F4AE28
26,206,428 UART: Caliptra RT
26,207,120 UART: [state] CFI Enabled
26,386,995 UART: [rt] RT listening for mailbox commands...
26,418,406 UART: [rt]cmd =0x46505344, len=4
26,528,609 >>> mbox cmd response data (8 bytes)
26,529,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,529,503 UART: Fatal Error: 0x000E0008
26,530,634 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,479 UART:
192,846 UART: Running Caliptra ROM ...
194,047 UART:
603,574 UART: [state] CFI Enabled
619,367 UART: [state] LifecycleState = Unprovisioned
621,778 UART: [state] DebugLocked = No
623,105 UART: [state] WD Timer not started. Device not locked for debugging
628,356 UART: [kat] SHA2-256
818,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,050 UART: [kat] ++
829,537 UART: [kat] sha1
842,191 UART: [kat] SHA2-256
845,206 UART: [kat] SHA2-384
850,635 UART: [kat] SHA2-512-ACC
853,230 UART: [kat] ECC-384
3,293,613 UART: [kat] HMAC-384Kdf
3,307,998 UART: [kat] LMS
3,839,796 UART: [kat] --
3,843,579 UART: [cold-reset] ++
3,844,951 UART: [fht] FHT @ 0x50003400
3,856,384 UART: [idev] ++
3,857,160 UART: [idev] CDI.KEYID = 6
3,858,079 UART: [idev] SUBJECT.KEYID = 7
3,859,270 UART: [idev] UDS.KEYID = 0
3,860,208 ready_for_fw is high
3,860,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,142 UART: [idev] Erasing UDS.KEYID = 0
6,336,198 UART: [idev] Sha1 KeyId Algorithm
6,358,344 UART: [idev] --
6,362,999 UART: [ldev] ++
6,363,691 UART: [ldev] CDI.KEYID = 6
6,364,616 UART: [ldev] SUBJECT.KEYID = 5
6,365,784 UART: [ldev] AUTHORITY.KEYID = 7
6,367,019 UART: [ldev] FE.KEYID = 1
6,377,397 UART: [ldev] Erasing FE.KEYID = 1
8,849,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,747 UART: [ldev] --
10,642,097 UART: [fwproc] Wait for Commands...
10,644,099 UART: [fwproc] Recv command 0x46574c44
10,646,368 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,789 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,435 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,443 >>> mbox cmd response: success
14,916,882 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,920,562 UART: [afmc] ++
14,921,315 UART: [afmc] CDI.KEYID = 6
14,922,428 UART: [afmc] SUBJECT.KEYID = 7
14,923,977 UART: [afmc] AUTHORITY.KEYID = 5
17,427,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,999 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,130 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,252 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,147 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,655 UART: [afmc] --
19,223,641 UART: [cold-reset] --
19,227,841 UART: [state] Locking Datavault
19,233,423 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,564 UART: [state] Locking ICCM
19,238,529 UART: [exit] Launching FMC @ 0x40000130
19,247,205 UART:
19,247,451 UART: Running Caliptra FMC ...
19,248,485 UART:
19,248,641 UART: [state] CFI Enabled
19,256,650 UART: [fht] FMC Alias Private Key: 7
21,023,137 UART: [art] Extend RT PCRs Done
21,024,371 UART: [art] Lock RT PCRs Done
21,025,924 UART: [art] Populate DV Done
21,031,131 UART: [fht] FMC Alias Private Key: 7
21,032,731 UART: [art] Derive CDI
21,033,551 UART: [art] Store in slot 0x4
21,075,935 UART: [art] Derive Key Pair
21,076,976 UART: [art] Store priv key in slot 0x5
23,503,364 UART: [art] Derive Key Pair - Done
23,516,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,566 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,072 UART: [art] PUB.X = C7ACF01B3A80301FA1E5A46A49C46DD1211CFD3E3FFD586CDC942C2AF73934AD76324B68A690F4D57EBBFBC320EE7C15
25,231,318 UART: [art] PUB.Y = 8E2CC84875CB571DF6C42B7F080A74C3BDEB8AC4836B2A2DCD6007119FD8867BC4EB2BC65E8AD334D41E91F16C26055F
25,238,600 UART: [art] SIG.R = 390FC3BC7B98E4F0D21554E9119063F339002485E5D4922284606CFD4925448EA4CD7553D6D8B664D57F2DEC5604BEB5
25,245,989 UART: [art] SIG.S = 44C64150BB99856BAB184AD0DF24E0754101AFCD351716B969B8FA77CA0D9C31C0677F7FF2833CBBB3DCBBA98149C1C9
26,224,891 UART: Caliptra RT
26,225,605 UART: [state] CFI Enabled
26,357,588 UART: [rt] RT listening for mailbox commands...
26,389,059 UART: [rt]cmd =0x46505344, len=4
26,499,187 >>> mbox cmd response data (8 bytes)
26,499,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,500,046 UART: Fatal Error: 0x000E0008
26,501,177 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,754,914 ready_for_fw is high
3,755,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,052,935 >>> mbox cmd response: success
15,053,537 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,304,028 UART:
19,304,441 UART: Running Caliptra FMC ...
19,305,617 UART:
19,305,776 UART: [state] CFI Enabled
19,313,809 UART: [fht] FMC Alias Private Key: 7
21,080,160 UART: [art] Extend RT PCRs Done
21,081,401 UART: [art] Lock RT PCRs Done
21,083,064 UART: [art] Populate DV Done
21,088,389 UART: [fht] FMC Alias Private Key: 7
21,090,044 UART: [art] Derive CDI
21,090,872 UART: [art] Store in slot 0x4
21,133,800 UART: [art] Derive Key Pair
21,134,805 UART: [art] Store priv key in slot 0x5
23,561,847 UART: [art] Derive Key Pair - Done
23,574,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,196 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,711 UART: [art] PUB.X = 280876997E748F151E056FB0E5508956B638D52818A5D2ABA45C2B229D314B2B72C0F0BD7F2B708A4FDB54686A770B77
25,289,951 UART: [art] PUB.Y = DAAC999F3F321F06028A513144D6F28AC484F0E52497C472FEB9567740BA2A8D1621CF78512882CAC14DEFCFF5C37C72
25,297,213 UART: [art] SIG.R = ED7905F81577B89805BF1FB59551C9175E88DC95CE234DB6AA18F82EA28174B00D039B7DF4329003C7A0000A649B6BC3
25,304,608 UART: [art] SIG.S = 5FB1924311C82469DA702C5B8F711F8A800EA7FAC4EDF373B99C445FD151F67FFE29455684AA1E396409CA928AEA9CB2
26,283,184 UART: Caliptra RT
26,283,878 UART: [state] CFI Enabled
26,416,818 UART: [rt] RT listening for mailbox commands...
26,447,969 UART: [rt]cmd =0x46505344, len=4
26,557,685 >>> mbox cmd response data (8 bytes)
26,558,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,558,499 UART: Fatal Error: 0x000E0008
26,559,643 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,699 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,251 UART: [kat] SHA2-256
882,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,297 UART: [kat] ++
886,449 UART: [kat] sha1
890,749 UART: [kat] SHA2-256
892,687 UART: [kat] SHA2-384
895,528 UART: [kat] SHA2-512-ACC
897,429 UART: [kat] ECC-384
902,802 UART: [kat] HMAC-384Kdf
907,266 UART: [kat] LMS
1,475,462 UART: [kat] --
1,476,403 UART: [cold-reset] ++
1,476,795 UART: [fht] Storing FHT @ 0x50003400
1,479,638 UART: [idev] ++
1,479,806 UART: [idev] CDI.KEYID = 6
1,480,166 UART: [idev] SUBJECT.KEYID = 7
1,480,590 UART: [idev] UDS.KEYID = 0
1,480,935 ready_for_fw is high
1,480,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,500 UART: [idev] Erasing UDS.KEYID = 0
1,504,786 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,454 UART: [idev] --
1,514,617 UART: [ldev] ++
1,514,785 UART: [ldev] CDI.KEYID = 6
1,515,148 UART: [ldev] SUBJECT.KEYID = 5
1,515,574 UART: [ldev] AUTHORITY.KEYID = 7
1,516,037 UART: [ldev] FE.KEYID = 1
1,521,625 UART: [ldev] Erasing FE.KEYID = 1
1,546,962 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,316 UART: [ldev] --
1,586,695 UART: [fwproc] Waiting for Commands...
1,587,470 UART: [fwproc] Received command 0x46574c44
1,588,261 UART: [fwproc] Received Image of size 118548 bytes
2,932,759 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,103 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,321 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,756 >>> mbox cmd response: success
3,131,756 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,132,956 UART: [afmc] ++
3,133,124 UART: [afmc] CDI.KEYID = 6
3,133,486 UART: [afmc] SUBJECT.KEYID = 7
3,133,911 UART: [afmc] AUTHORITY.KEYID = 5
3,169,424 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,328 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,108 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,817 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,700 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,383 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,157 UART: [afmc] --
3,212,047 UART: [cold-reset] --
3,212,823 UART: [state] Locking Datavault
3,213,968 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,572 UART: [state] Locking ICCM
3,215,004 UART: [exit] Launching FMC @ 0x40000130
3,220,334 UART:
3,220,350 UART: Running Caliptra FMC ...
3,220,758 UART:
3,220,812 UART: [state] CFI Enabled
3,231,270 UART: [fht] FMC Alias Private Key: 7
3,350,280 UART: [art] Extend RT PCRs Done
3,350,708 UART: [art] Lock RT PCRs Done
3,352,376 UART: [art] Populate DV Done
3,360,621 UART: [fht] FMC Alias Private Key: 7
3,361,673 UART: [art] Derive CDI
3,361,953 UART: [art] Store in slot 0x4
3,447,441 UART: [art] Derive Key Pair
3,447,801 UART: [art] Store priv key in slot 0x5
3,461,390 UART: [art] Derive Key Pair - Done
3,475,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,246 UART: [art] PUB.X = 8292AA052D05410BD0C3C1D3586B0CA997E4A349F34275B5534971D8BF4FEEF58B787CB743CB4428D8109AE194CB9EB3
3,499,010 UART: [art] PUB.Y = 14E11AA4048B46E9C77A6B3E83D88087586BC0C36CFE8C1CE5D668BDFDBED38C6E2104538CCE9DE7DE0C64954FFB8729
3,505,969 UART: [art] SIG.R = 6EA20A970FFF2B73E98C4FC0EAF5F800394EB656668F5B628E71BEA95288750E83BB07C65B342662684197CACEBB71CD
3,512,715 UART: [art] SIG.S = 67AE7D61F37502EA2CF0609784E20D6D4D548013060F6B5309A4C3396D5111AA401971F979F225AA8E3329D06A8AC057
3,535,966 UART: Caliptra RT
3,536,217 UART: [state] CFI Enabled
3,656,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,724 UART: [rt]cmd =0x46505344, len=4
3,795,137 >>> mbox cmd response data (8 bytes)
3,795,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,795,174 UART: Fatal Error: 0x000E0008
3,796,297 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,809 ready_for_fw is high
1,361,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,196 >>> mbox cmd response: success
2,980,196 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,042,043 UART:
3,042,059 UART: Running Caliptra FMC ...
3,042,467 UART:
3,042,521 UART: [state] CFI Enabled
3,052,797 UART: [fht] FMC Alias Private Key: 7
3,171,421 UART: [art] Extend RT PCRs Done
3,171,849 UART: [art] Lock RT PCRs Done
3,173,213 UART: [art] Populate DV Done
3,181,342 UART: [fht] FMC Alias Private Key: 7
3,182,476 UART: [art] Derive CDI
3,182,756 UART: [art] Store in slot 0x4
3,268,662 UART: [art] Derive Key Pair
3,269,022 UART: [art] Store priv key in slot 0x5
3,282,315 UART: [art] Derive Key Pair - Done
3,297,109 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,900 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,665 UART: [art] PUB.X = 8E31F94BBFB581C03A2DF38CAA3C809706E79E8DE526114C143E578C6A4C5C69D9DAA82699CD9E97A5ACD7DEA01D81D9
3,320,450 UART: [art] PUB.Y = B29DE144629D84E080CEE7CDEB0C5091E4F870101F3B8187C7F1C748FA4C44C602A8E36C932559A4EFB5FA898D80C763
3,327,402 UART: [art] SIG.R = E4F09F5CC22FDA3945D154BCAA57CDCFDDEE80AE2D4C823DD0021C1B0703D171725648F371834DBCB5310D59BC8D94B9
3,334,178 UART: [art] SIG.S = AF552442AA99F6542CC25302E5AECD23ADBF921CEBD0AD30165919D37304C9CBEE4DEA7E196A142990E4D2184418097B
3,358,015 UART: Caliptra RT
3,358,266 UART: [state] CFI Enabled
3,478,999 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,301 UART: [rt]cmd =0x46505344, len=4
3,618,056 >>> mbox cmd response data (8 bytes)
3,618,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,618,093 UART: Fatal Error: 0x000E0008
3,619,216 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,582 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,224 UART: [kat] SHA2-256
882,155 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,270 UART: [kat] ++
886,422 UART: [kat] sha1
890,734 UART: [kat] SHA2-256
892,672 UART: [kat] SHA2-384
895,251 UART: [kat] SHA2-512-ACC
897,152 UART: [kat] ECC-384
902,411 UART: [kat] HMAC-384Kdf
907,005 UART: [kat] LMS
1,475,201 UART: [kat] --
1,476,352 UART: [cold-reset] ++
1,476,802 UART: [fht] Storing FHT @ 0x50003400
1,479,389 UART: [idev] ++
1,479,557 UART: [idev] CDI.KEYID = 6
1,479,917 UART: [idev] SUBJECT.KEYID = 7
1,480,341 UART: [idev] UDS.KEYID = 0
1,480,686 ready_for_fw is high
1,480,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,251 UART: [idev] Erasing UDS.KEYID = 0
1,504,881 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,457 UART: [idev] --
1,514,490 UART: [ldev] ++
1,514,658 UART: [ldev] CDI.KEYID = 6
1,515,021 UART: [ldev] SUBJECT.KEYID = 5
1,515,447 UART: [ldev] AUTHORITY.KEYID = 7
1,515,910 UART: [ldev] FE.KEYID = 1
1,521,388 UART: [ldev] Erasing FE.KEYID = 1
1,547,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,673 UART: [ldev] --
1,586,182 UART: [fwproc] Waiting for Commands...
1,586,969 UART: [fwproc] Received command 0x46574c44
1,587,760 UART: [fwproc] Received Image of size 118548 bytes
2,932,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,548 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,766 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,027 >>> mbox cmd response: success
3,131,027 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,132,165 UART: [afmc] ++
3,132,333 UART: [afmc] CDI.KEYID = 6
3,132,695 UART: [afmc] SUBJECT.KEYID = 7
3,133,120 UART: [afmc] AUTHORITY.KEYID = 5
3,168,315 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,631 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,411 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,120 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,003 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,686 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,526 UART: [afmc] --
3,211,634 UART: [cold-reset] --
3,212,640 UART: [state] Locking Datavault
3,213,897 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,501 UART: [state] Locking ICCM
3,215,085 UART: [exit] Launching FMC @ 0x40000130
3,220,415 UART:
3,220,431 UART: Running Caliptra FMC ...
3,220,839 UART:
3,220,982 UART: [state] CFI Enabled
3,232,014 UART: [fht] FMC Alias Private Key: 7
3,351,134 UART: [art] Extend RT PCRs Done
3,351,562 UART: [art] Lock RT PCRs Done
3,352,894 UART: [art] Populate DV Done
3,361,237 UART: [fht] FMC Alias Private Key: 7
3,362,171 UART: [art] Derive CDI
3,362,451 UART: [art] Store in slot 0x4
3,448,127 UART: [art] Derive Key Pair
3,448,487 UART: [art] Store priv key in slot 0x5
3,461,900 UART: [art] Derive Key Pair - Done
3,476,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,671 UART: [art] PUB.X = DC062631096E740B210A27F931E1C12EB04664003404524C3F18AB903EF4CBF07DA216AC225C30F00871C9A960800C1C
3,499,394 UART: [art] PUB.Y = D057908BD90AE2FF4F7FA498B55F21F585A402D51F9D4FF7E1685C195C13F679C7541D120D0DF519F69CBB33BDA44C13
3,506,342 UART: [art] SIG.R = 8C096EFDDCDCB2CC7EBF63F714F8598D814A10D158C5F3712108C2049A31777B0EF1C3D624A7533568BF5FE0BAF1F95E
3,513,114 UART: [art] SIG.S = C8F9C06240C731418A5DD078009E40EDB9AC991A5EF7A4D5197C5DA5C4915279C7F40DDEA6DBF1419C272E57E1ADF743
3,537,359 UART: Caliptra RT
3,537,702 UART: [state] CFI Enabled
3,657,745 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,155 UART: [rt]cmd =0x46505344, len=4
3,796,900 >>> mbox cmd response data (8 bytes)
3,796,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,796,937 UART: Fatal Error: 0x000E0008
3,798,060 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,790 ready_for_fw is high
1,362,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,973 >>> mbox cmd response: success
2,980,973 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,041,970 UART:
3,041,986 UART: Running Caliptra FMC ...
3,042,394 UART:
3,042,537 UART: [state] CFI Enabled
3,052,649 UART: [fht] FMC Alias Private Key: 7
3,171,993 UART: [art] Extend RT PCRs Done
3,172,421 UART: [art] Lock RT PCRs Done
3,173,551 UART: [art] Populate DV Done
3,181,786 UART: [fht] FMC Alias Private Key: 7
3,182,894 UART: [art] Derive CDI
3,183,174 UART: [art] Store in slot 0x4
3,268,960 UART: [art] Derive Key Pair
3,269,320 UART: [art] Store priv key in slot 0x5
3,282,795 UART: [art] Derive Key Pair - Done
3,297,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,613 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,378 UART: [art] PUB.X = 1DE4D5A415E37052FE79FCA8522F363113A05F7438074A88E1B43814EBBB36838F915EA84589DAE99EBC6F55F85DB103
3,320,146 UART: [art] PUB.Y = 07A562CBCBD59F01328803FBF684E69BE33668FDAFE61B44848A2FDCDCADD3CE330BC2B9D9ADA8200F1F26BDD09AB1F5
3,327,109 UART: [art] SIG.R = 64C2DCF0BE2104FE09D1AD8C4EBFEA386FDDDFC1E58CCFD7304D3C73991D2573986C0CCAB0EC3CE44CD4D07B35F7DD1D
3,333,904 UART: [art] SIG.S = 96644C4FD125DF32786533FE13CFDB417CDDEAFAB518A19BD6E2A949387D2949DCF2DF0A91286E8450D4E7BC9276DE0A
3,357,776 UART: Caliptra RT
3,358,119 UART: [state] CFI Enabled
3,478,499 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,793 UART: [rt]cmd =0x46505344, len=4
3,617,472 >>> mbox cmd response data (8 bytes)
3,617,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,617,509 UART: Fatal Error: 0x000E0008
3,618,632 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,660 UART: [state] LifecycleState = Unprovisioned
85,315 UART: [state] DebugLocked = No
86,033 UART: [state] WD Timer not started. Device not locked for debugging
87,236 UART: [kat] SHA2-256
890,786 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,890 UART: [kat] ++
895,042 UART: [kat] sha1
899,268 UART: [kat] SHA2-256
901,208 UART: [kat] SHA2-384
904,033 UART: [kat] SHA2-512-ACC
905,934 UART: [kat] ECC-384
915,659 UART: [kat] HMAC-384Kdf
920,333 UART: [kat] LMS
1,168,645 UART: [kat] --
1,169,184 UART: [cold-reset] ++
1,169,590 UART: [fht] FHT @ 0x50003400
1,172,130 UART: [idev] ++
1,172,298 UART: [idev] CDI.KEYID = 6
1,172,659 UART: [idev] SUBJECT.KEYID = 7
1,173,084 UART: [idev] UDS.KEYID = 0
1,173,430 ready_for_fw is high
1,173,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,213 UART: [idev] Erasing UDS.KEYID = 0
1,197,925 UART: [idev] Sha1 KeyId Algorithm
1,206,769 UART: [idev] --
1,207,830 UART: [ldev] ++
1,207,998 UART: [ldev] CDI.KEYID = 6
1,208,362 UART: [ldev] SUBJECT.KEYID = 5
1,208,789 UART: [ldev] AUTHORITY.KEYID = 7
1,209,252 UART: [ldev] FE.KEYID = 1
1,214,372 UART: [ldev] Erasing FE.KEYID = 1
1,241,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,080 UART: [ldev] --
1,280,385 UART: [fwproc] Wait for Commands...
1,281,106 UART: [fwproc] Recv command 0x46574c44
1,281,839 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,907 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,082 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,259 >>> mbox cmd response: success
2,824,259 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,825,337 UART: [afmc] ++
2,825,505 UART: [afmc] CDI.KEYID = 6
2,825,868 UART: [afmc] SUBJECT.KEYID = 7
2,826,294 UART: [afmc] AUTHORITY.KEYID = 5
2,861,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,373 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,083 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,964 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,665 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,386 UART: [afmc] --
2,904,257 UART: [cold-reset] --
2,905,333 UART: [state] Locking Datavault
2,906,422 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,026 UART: [state] Locking ICCM
2,907,564 UART: [exit] Launching FMC @ 0x40000130
2,912,894 UART:
2,912,910 UART: Running Caliptra FMC ...
2,913,318 UART:
2,913,372 UART: [state] CFI Enabled
2,923,836 UART: [fht] FMC Alias Private Key: 7
3,043,084 UART: [art] Extend RT PCRs Done
3,043,512 UART: [art] Lock RT PCRs Done
3,045,380 UART: [art] Populate DV Done
3,053,827 UART: [fht] FMC Alias Private Key: 7
3,054,795 UART: [art] Derive CDI
3,055,075 UART: [art] Store in slot 0x4
3,140,930 UART: [art] Derive Key Pair
3,141,290 UART: [art] Store priv key in slot 0x5
3,154,570 UART: [art] Derive Key Pair - Done
3,169,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,572 UART: [art] PUB.X = E57A269D9960C1381DFDD64B7145E37206792D71993B4A64287B9AD9DF92954901C5083C8DE12C702AD85BE0BA9F84E8
3,192,333 UART: [art] PUB.Y = D77E41C7EBF68F328C2E57CD9987AC3F237473E8DF11B4E87BA7705534DDD75427E2853B779231B7471F22930C7778EF
3,199,280 UART: [art] SIG.R = F7A65A6465ACEECD23DBEF59771EF587604ED308B581B33757A0C65AF2BBAED4C1DF3524FD9BA8A18A0FFFC345BB4D3E
3,206,072 UART: [art] SIG.S = 889AB9BA6C6DA4181A1D5E2C27686E69F1A61439779F8D5B60D64D12236FC285A17CCCE76A0DA73DEB9FBC7C750D51E8
3,229,460 UART: Caliptra RT
3,229,711 UART: [state] CFI Enabled
3,348,597 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,063 UART: [rt]cmd =0x46505344, len=4
3,487,746 >>> mbox cmd response data (8 bytes)
3,487,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,487,783 UART: Fatal Error: 0x000E0008
3,488,906 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,770 ready_for_fw is high
1,058,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,620 >>> mbox cmd response: success
2,676,620 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,739,087 UART:
2,739,103 UART: Running Caliptra FMC ...
2,739,511 UART:
2,739,565 UART: [state] CFI Enabled
2,749,787 UART: [fht] FMC Alias Private Key: 7
2,868,853 UART: [art] Extend RT PCRs Done
2,869,281 UART: [art] Lock RT PCRs Done
2,870,587 UART: [art] Populate DV Done
2,878,858 UART: [fht] FMC Alias Private Key: 7
2,880,024 UART: [art] Derive CDI
2,880,304 UART: [art] Store in slot 0x4
2,966,289 UART: [art] Derive Key Pair
2,966,649 UART: [art] Store priv key in slot 0x5
2,980,371 UART: [art] Derive Key Pair - Done
2,995,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,875 UART: [art] PUB.X = 66AA61E5B1FAE5EA2C102FBB1C008842EF16CDC01A13D67D66B5B61CE5BC29F51DF0B269B1A3D676E5F4873EB6812DF5
3,017,643 UART: [art] PUB.Y = 0CC374BECD35B73BD2BD3647F8AF9E055A0CD56218ED69070743F66566073F7C7C8D93CA405F1506048CEA30D9BA1C69
3,024,577 UART: [art] SIG.R = 77C658B92A16BD978E1C2DB90497322A3C5443B9ABB0D8401822D4E7C2D3C57FF135B9357A70F33C5204DFA2298DD775
3,031,343 UART: [art] SIG.S = 2D7AAF1567152BB1A963B89A67F70AE1E7490C18E1FA57F4374CF22B142EBACC1036C159DDD3704771CF0A0141BE5191
3,055,301 UART: Caliptra RT
3,055,552 UART: [state] CFI Enabled
3,175,480 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,050 UART: [rt]cmd =0x46505344, len=4
3,314,529 >>> mbox cmd response data (8 bytes)
3,314,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,314,566 UART: Fatal Error: 0x000E0008
3,315,689 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,663 UART: [kat] ++
895,815 UART: [kat] sha1
900,131 UART: [kat] SHA2-256
902,071 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
916,678 UART: [kat] HMAC-384Kdf
921,456 UART: [kat] LMS
1,169,768 UART: [kat] --
1,170,909 UART: [cold-reset] ++
1,171,381 UART: [fht] FHT @ 0x50003400
1,174,031 UART: [idev] ++
1,174,199 UART: [idev] CDI.KEYID = 6
1,174,560 UART: [idev] SUBJECT.KEYID = 7
1,174,985 UART: [idev] UDS.KEYID = 0
1,175,331 ready_for_fw is high
1,175,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,794 UART: [idev] Erasing UDS.KEYID = 0
1,199,852 UART: [idev] Sha1 KeyId Algorithm
1,208,628 UART: [idev] --
1,209,733 UART: [ldev] ++
1,209,901 UART: [ldev] CDI.KEYID = 6
1,210,265 UART: [ldev] SUBJECT.KEYID = 5
1,210,692 UART: [ldev] AUTHORITY.KEYID = 7
1,211,155 UART: [ldev] FE.KEYID = 1
1,216,547 UART: [ldev] Erasing FE.KEYID = 1
1,242,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,943 UART: [ldev] --
1,282,356 UART: [fwproc] Wait for Commands...
1,283,165 UART: [fwproc] Recv command 0x46574c44
1,283,898 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,376 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,551 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,774 >>> mbox cmd response: success
2,826,774 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,827,858 UART: [afmc] ++
2,828,026 UART: [afmc] CDI.KEYID = 6
2,828,389 UART: [afmc] SUBJECT.KEYID = 7
2,828,815 UART: [afmc] AUTHORITY.KEYID = 5
2,863,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,096 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,806 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,687 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,388 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,189 UART: [afmc] --
2,907,052 UART: [cold-reset] --
2,907,926 UART: [state] Locking Datavault
2,908,997 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,601 UART: [state] Locking ICCM
2,910,035 UART: [exit] Launching FMC @ 0x40000130
2,915,365 UART:
2,915,381 UART: Running Caliptra FMC ...
2,915,789 UART:
2,915,932 UART: [state] CFI Enabled
2,926,618 UART: [fht] FMC Alias Private Key: 7
3,045,522 UART: [art] Extend RT PCRs Done
3,045,950 UART: [art] Lock RT PCRs Done
3,047,668 UART: [art] Populate DV Done
3,055,991 UART: [fht] FMC Alias Private Key: 7
3,057,165 UART: [art] Derive CDI
3,057,445 UART: [art] Store in slot 0x4
3,143,454 UART: [art] Derive Key Pair
3,143,814 UART: [art] Store priv key in slot 0x5
3,157,180 UART: [art] Derive Key Pair - Done
3,171,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,503 UART: [art] PUB.X = 3D4AE2BF35DE1387693BB516E1524EB72DD9B80FBD56A5B6400840A5ACE2FE9DB82F8DDC9334CF62AF8320BC13F9CB56
3,195,287 UART: [art] PUB.Y = 7EFB2DD18A6A9EE7C34D4C1D28801E7041AFA3EBB57BA4D7D08ED4D92917E0DBD478FE136D1DBAA21A7B142F0E95B24C
3,202,260 UART: [art] SIG.R = EBF2F9B771D9E383AF028E768E2501CB10BF5B9E9B91299D806AB196AA1475FB3E8C3EB610B587D540157EF0FC24128E
3,209,034 UART: [art] SIG.S = CD2220ECE13F71BFB0FEAB5E802CF75E9129B825415B842F24F82FC0D0C20FC81757FEA0A1E13ED1A4CFB56A7CD609E2
3,233,366 UART: Caliptra RT
3,233,709 UART: [state] CFI Enabled
3,352,671 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,305 UART: [rt]cmd =0x46505344, len=4
3,491,806 >>> mbox cmd response data (8 bytes)
3,491,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,491,843 UART: Fatal Error: 0x000E0008
3,492,966 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,097 ready_for_fw is high
1,059,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,273 >>> mbox cmd response: success
2,677,273 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,739,638 UART:
2,739,654 UART: Running Caliptra FMC ...
2,740,062 UART:
2,740,205 UART: [state] CFI Enabled
2,750,861 UART: [fht] FMC Alias Private Key: 7
2,869,693 UART: [art] Extend RT PCRs Done
2,870,121 UART: [art] Lock RT PCRs Done
2,871,741 UART: [art] Populate DV Done
2,879,970 UART: [fht] FMC Alias Private Key: 7
2,881,076 UART: [art] Derive CDI
2,881,356 UART: [art] Store in slot 0x4
2,966,845 UART: [art] Derive Key Pair
2,967,205 UART: [art] Store priv key in slot 0x5
2,980,249 UART: [art] Derive Key Pair - Done
2,994,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,540 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,305 UART: [art] PUB.X = 3ABCE2E8639B0368A861C13133319ED1C08538DDA535C93C03CF660A3A90AEA4959607ADE8CCB4BAD655005DF81E156A
3,018,051 UART: [art] PUB.Y = 5318BAA5B6D36EDBB0D0346284CAF031681D50D822156D81E2B84607FFC6078C7BD139E80651A2D2982AE8DDB06029CB
3,024,998 UART: [art] SIG.R = 9857CBC51C1523642E37EB9090411D17B2E61C6C300DC2D33291E569A57E409F3222C9AE679449B56EAF4BA76A2DBA0F
3,031,766 UART: [art] SIG.S = C70804B110A5B6FE727A23980EB3B4049ECD2B0D3707555EE82CFB3BAC005DCCA113575A6C97F10E1DEAB81EFBB263E1
3,055,677 UART: Caliptra RT
3,056,020 UART: [state] CFI Enabled
3,174,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,092 UART: [rt]cmd =0x46505344, len=4
3,313,417 >>> mbox cmd response data (8 bytes)
3,313,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,313,454 UART: Fatal Error: 0x000E0008
3,314,577 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
893,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,541 UART: [kat] ++
897,693 UART: [kat] sha1
902,033 UART: [kat] SHA2-256
903,973 UART: [kat] SHA2-384
906,896 UART: [kat] SHA2-512-ACC
908,797 UART: [kat] ECC-384
918,438 UART: [kat] HMAC-384Kdf
922,904 UART: [kat] LMS
1,171,232 UART: [kat] --
1,172,055 UART: [cold-reset] ++
1,172,595 UART: [fht] FHT @ 0x50003400
1,175,216 UART: [idev] ++
1,175,384 UART: [idev] CDI.KEYID = 6
1,175,744 UART: [idev] SUBJECT.KEYID = 7
1,176,168 UART: [idev] UDS.KEYID = 0
1,176,513 ready_for_fw is high
1,176,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,878 UART: [idev] Erasing UDS.KEYID = 0
1,201,069 UART: [idev] Sha1 KeyId Algorithm
1,209,483 UART: [idev] --
1,210,615 UART: [ldev] ++
1,210,783 UART: [ldev] CDI.KEYID = 6
1,211,146 UART: [ldev] SUBJECT.KEYID = 5
1,211,572 UART: [ldev] AUTHORITY.KEYID = 7
1,212,035 UART: [ldev] FE.KEYID = 1
1,217,113 UART: [ldev] Erasing FE.KEYID = 1
1,243,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,113 UART: [ldev] --
1,282,614 UART: [fwproc] Wait for Commands...
1,283,426 UART: [fwproc] Recv command 0x46574c44
1,284,154 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,682 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,852 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,073 >>> mbox cmd response: success
2,828,073 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,829,233 UART: [afmc] ++
2,829,401 UART: [afmc] CDI.KEYID = 6
2,829,763 UART: [afmc] SUBJECT.KEYID = 7
2,830,188 UART: [afmc] AUTHORITY.KEYID = 5
2,865,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,992 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,701 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,584 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,285 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,147 UART: [afmc] --
2,909,221 UART: [cold-reset] --
2,910,081 UART: [state] Locking Datavault
2,911,518 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,122 UART: [state] Locking ICCM
2,912,788 UART: [exit] Launching FMC @ 0x40000130
2,918,118 UART:
2,918,134 UART: Running Caliptra FMC ...
2,918,542 UART:
2,918,596 UART: [state] CFI Enabled
2,929,030 UART: [fht] FMC Alias Private Key: 7
3,048,536 UART: [art] Extend RT PCRs Done
3,048,964 UART: [art] Lock RT PCRs Done
3,050,364 UART: [art] Populate DV Done
3,058,515 UART: [fht] FMC Alias Private Key: 7
3,059,609 UART: [art] Derive CDI
3,059,889 UART: [art] Store in slot 0x4
3,146,006 UART: [art] Derive Key Pair
3,146,366 UART: [art] Store priv key in slot 0x5
3,159,174 UART: [art] Derive Key Pair - Done
3,174,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,663 UART: [art] PUB.X = 17D66C18B09C68699550A88E7C03F6E5E5E4BE48E3C9463423EEA9A50BB345DF44B75DB9181B6B9048E8E0107165D183
3,197,427 UART: [art] PUB.Y = B31697E74E2A084FBA332ED59BB8D70BC2D289A73E9FA7386D3BA1C4D9C2025A09FD0BDC125D4A861522C5A5B4F98656
3,204,374 UART: [art] SIG.R = 30FB0ED9700334D18BE778488FB8FCC4A0828098777BC04545EBCB6E05F03A3DB3965EDB335807AB57AEB2CDE235A75D
3,211,144 UART: [art] SIG.S = B7EBC3999F144ACFEFD221F2BEA0A9C4723923F1F9E343B479089DF9CD5A0C37FAB773B1CB307E7F2132890B4D73C9CD
3,234,697 UART: Caliptra RT
3,234,948 UART: [state] CFI Enabled
3,354,145 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,509 UART: [rt]cmd =0x46505344, len=4
3,493,100 >>> mbox cmd response data (8 bytes)
3,493,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,493,137 UART: Fatal Error: 0x000E0008
3,494,260 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,171 ready_for_fw is high
1,060,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,718 >>> mbox cmd response: success
2,678,718 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,740,643 UART:
2,740,659 UART: Running Caliptra FMC ...
2,741,067 UART:
2,741,121 UART: [state] CFI Enabled
2,751,565 UART: [fht] FMC Alias Private Key: 7
2,870,235 UART: [art] Extend RT PCRs Done
2,870,663 UART: [art] Lock RT PCRs Done
2,872,165 UART: [art] Populate DV Done
2,880,366 UART: [fht] FMC Alias Private Key: 7
2,881,536 UART: [art] Derive CDI
2,881,816 UART: [art] Store in slot 0x4
2,967,841 UART: [art] Derive Key Pair
2,968,201 UART: [art] Store priv key in slot 0x5
2,981,671 UART: [art] Derive Key Pair - Done
2,996,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,542 UART: [art] PUB.X = C284E493E595AD1566D7A44913C1FAD6DC5D4505ABB4728E0AEFFCE484E0FF2969EBE9C1BB275B6106F7A803196F18B1
3,019,314 UART: [art] PUB.Y = B8C524CAEC738C06AF0647BAA128A3A1180AE070C310A47D420FD4A5CCDF94C2C97F1BA89795BF81C6C93FF8DC4899DE
3,026,272 UART: [art] SIG.R = 5828BDD186046EB45260F230087CB7F11A2AF2E51F00E9CBB5FC6BFE5E99C2CC038C7F861565EBC8402F51DF9846AA49
3,033,023 UART: [art] SIG.S = F896824EB9CFF17048912E3F6839A777CAACA5AFABE99DB57695842692541850EC88D3B278F2F3A61F1863F6B1045DC2
3,056,946 UART: Caliptra RT
3,057,197 UART: [state] CFI Enabled
3,176,424 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,750 UART: [rt]cmd =0x46505344, len=4
3,315,387 >>> mbox cmd response data (8 bytes)
3,315,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,315,424 UART: Fatal Error: 0x000E0008
3,316,547 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
901,756 UART: [kat] SHA2-256
903,696 UART: [kat] SHA2-384
906,469 UART: [kat] SHA2-512-ACC
908,370 UART: [kat] ECC-384
917,833 UART: [kat] HMAC-384Kdf
922,479 UART: [kat] LMS
1,170,807 UART: [kat] --
1,171,622 UART: [cold-reset] ++
1,172,128 UART: [fht] FHT @ 0x50003400
1,174,809 UART: [idev] ++
1,174,977 UART: [idev] CDI.KEYID = 6
1,175,337 UART: [idev] SUBJECT.KEYID = 7
1,175,761 UART: [idev] UDS.KEYID = 0
1,176,106 ready_for_fw is high
1,176,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,711 UART: [idev] Erasing UDS.KEYID = 0
1,200,448 UART: [idev] Sha1 KeyId Algorithm
1,208,788 UART: [idev] --
1,209,698 UART: [ldev] ++
1,209,866 UART: [ldev] CDI.KEYID = 6
1,210,229 UART: [ldev] SUBJECT.KEYID = 5
1,210,655 UART: [ldev] AUTHORITY.KEYID = 7
1,211,118 UART: [ldev] FE.KEYID = 1
1,216,320 UART: [ldev] Erasing FE.KEYID = 1
1,242,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,538 UART: [ldev] --
1,281,895 UART: [fwproc] Wait for Commands...
1,282,623 UART: [fwproc] Recv command 0x46574c44
1,283,351 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,581 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,751 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,924 >>> mbox cmd response: success
2,826,924 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,828,028 UART: [afmc] ++
2,828,196 UART: [afmc] CDI.KEYID = 6
2,828,558 UART: [afmc] SUBJECT.KEYID = 7
2,828,983 UART: [afmc] AUTHORITY.KEYID = 5
2,864,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,153 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,862 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,745 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,446 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,368 UART: [afmc] --
2,907,490 UART: [cold-reset] --
2,908,436 UART: [state] Locking Datavault
2,909,741 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,345 UART: [state] Locking ICCM
2,910,991 UART: [exit] Launching FMC @ 0x40000130
2,916,321 UART:
2,916,337 UART: Running Caliptra FMC ...
2,916,745 UART:
2,916,888 UART: [state] CFI Enabled
2,927,680 UART: [fht] FMC Alias Private Key: 7
3,047,566 UART: [art] Extend RT PCRs Done
3,047,994 UART: [art] Lock RT PCRs Done
3,049,364 UART: [art] Populate DV Done
3,057,665 UART: [fht] FMC Alias Private Key: 7
3,058,609 UART: [art] Derive CDI
3,058,889 UART: [art] Store in slot 0x4
3,144,496 UART: [art] Derive Key Pair
3,144,856 UART: [art] Store priv key in slot 0x5
3,158,486 UART: [art] Derive Key Pair - Done
3,173,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,524 UART: [art] PUB.X = 7D571157E7D00C2364B7B918667137E4E666E325DBFAA9F06660EE411E344CF0D2F493D2E53A1B6DF7731FEB9E176370
3,196,293 UART: [art] PUB.Y = D606E4EA6A34C81CE4C62C0BA514ED50284CB4368EDA457B1873D4F6E4824C747FDC781A41D62D9E1A77E64BD3640823
3,203,242 UART: [art] SIG.R = 5F4B1B66DC15BF390BE197E5D1B9FC0A5BEDB6CA5AD4802EDFD58266DB4FFF7F1214B603F4E28D351FF79EF9B2A287F7
3,210,029 UART: [art] SIG.S = 4D4499E064359F44DFEC1FB4DF9F820508DD86BDB30E12485D05F69A977BC0297CD7A5BF48C11183A1DB8EAB334D95D3
3,233,347 UART: Caliptra RT
3,233,690 UART: [state] CFI Enabled
3,352,984 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,286 UART: [rt]cmd =0x46505344, len=4
3,491,753 >>> mbox cmd response data (8 bytes)
3,491,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,491,790 UART: Fatal Error: 0x000E0008
3,492,913 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,058 ready_for_fw is high
1,061,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,797 >>> mbox cmd response: success
2,681,797 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,744,538 UART:
2,744,554 UART: Running Caliptra FMC ...
2,744,962 UART:
2,745,105 UART: [state] CFI Enabled
2,756,121 UART: [fht] FMC Alias Private Key: 7
2,875,331 UART: [art] Extend RT PCRs Done
2,875,759 UART: [art] Lock RT PCRs Done
2,877,139 UART: [art] Populate DV Done
2,885,534 UART: [fht] FMC Alias Private Key: 7
2,886,692 UART: [art] Derive CDI
2,886,972 UART: [art] Store in slot 0x4
2,972,609 UART: [art] Derive Key Pair
2,972,969 UART: [art] Store priv key in slot 0x5
2,985,505 UART: [art] Derive Key Pair - Done
3,000,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,511 UART: [art] PUB.X = 7EA8E377418443BE9BA83DD9725D5ADD0F81B509AE40852404EC587E653AB07B7F76E5D9963EA69A892B1782051BB966
3,023,271 UART: [art] PUB.Y = 0DF35FEAD240468EAF43BFA97FC7A8BE2B7A1F0DAD7634BD45A24A2DABF53A366972F771F89651DCDBE71F9ABFD43E83
3,030,243 UART: [art] SIG.R = 8AA957E4262E65C820610536C4B23A1170042658592ED77B5A99543EED5E5C3FA890ED52A04DE47A0AAF2413088BF6BD
3,037,003 UART: [art] SIG.S = 98A592B9D87B3D5E025B8C1B3DDB50084BB03C2A62ACFB67A1A8585E8F2911A768FDE64B15A9275018DF57252E998552
3,060,959 UART: Caliptra RT
3,061,302 UART: [state] CFI Enabled
3,181,792 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,306 UART: [rt]cmd =0x46505344, len=4
3,320,467 >>> mbox cmd response data (8 bytes)
3,320,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,320,504 UART: Fatal Error: 0x000E0008
3,321,627 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
5,659,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,447 writing to cptra_bootfsm_go
5,658,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
5,987,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,671 writing to cptra_bootfsm_go
5,987,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
5,664,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
5,663,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
5,990,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
5,999,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
192,327 UART:
192,678 UART: Running Caliptra ROM ...
193,834 UART:
193,990 UART: [state] CFI Enabled
260,852 UART: [state] LifecycleState = Unprovisioned
262,794 UART: [state] DebugLocked = No
264,496 UART: [state] WD Timer not started. Device not locked for debugging
268,150 UART: [kat] SHA2-256
447,815 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,478 UART: ROM integrity test failed
459,559 UART: ROM Fatal Error: 0x90080001
2,721,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,870,970 >>> mbox cmd response: failed
2,871,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,020,258 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,295 UART:
192,659 UART: Running Caliptra ROM ...
193,833 UART:
194,009 UART: [state] CFI Enabled
265,032 UART: [state] LifecycleState = Unprovisioned
266,985 UART: [state] DebugLocked = No
268,258 UART: [state] WD Timer not started. Device not locked for debugging
272,386 UART: [kat] SHA2-256
452,057 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,487 UART: ROM integrity test failed
463,737 UART: ROM Fatal Error: 0x90080001
2,732,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,881,884 >>> mbox cmd response: failed
2,882,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,031,362 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
192,475 UART:
192,854 UART: Running Caliptra ROM ...
193,960 UART:
603,619 UART: [state] CFI Enabled
617,018 UART: [state] LifecycleState = Unprovisioned
618,933 UART: [state] DebugLocked = No
620,476 UART: [state] WD Timer not started. Device not locked for debugging
624,891 UART: [kat] SHA2-256
804,555 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,977 UART: ROM integrity test failed
816,291 UART: ROM Fatal Error: 0x90080001
3,077,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,715 >>> mbox cmd response: failed
3,227,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,376,144 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,459 writing to cptra_bootfsm_go
192,635 UART:
193,011 UART: Running Caliptra ROM ...
194,180 UART:
603,711 UART: [state] CFI Enabled
616,408 UART: [state] LifecycleState = Unprovisioned
618,323 UART: [state] DebugLocked = No
620,679 UART: [state] WD Timer not started. Device not locked for debugging
624,347 UART: [kat] SHA2-256
803,991 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,430 UART: ROM integrity test failed
815,698 UART: ROM Fatal Error: 0x90080001
3,076,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,457 >>> mbox cmd response: failed
3,227,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,375,893 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,222 UART:
192,587 UART: Running Caliptra ROM ...
193,678 UART:
193,827 UART: [state] CFI Enabled
264,327 UART: [state] LifecycleState = Unprovisioned
266,296 UART: [state] DebugLocked = No
268,979 UART: [state] WD Timer not started. Device not locked for debugging
272,904 UART: [kat] SHA2-256
452,568 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,993 UART: ROM integrity test failed
464,252 UART: ROM Fatal Error: 0x90080001
2,719,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,870,293 >>> mbox cmd response: failed
2,870,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,020,280 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,148 UART:
192,532 UART: Running Caliptra ROM ...
193,695 UART:
193,852 UART: [state] CFI Enabled
268,836 UART: [state] LifecycleState = Unprovisioned
270,613 UART: [state] DebugLocked = No
273,243 UART: [state] WD Timer not started. Device not locked for debugging
276,240 UART: [kat] SHA2-256
455,884 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,624 UART: ROM integrity test failed
467,739 UART: ROM Fatal Error: 0x90080001
2,727,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,877,142 >>> mbox cmd response: failed
2,877,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,026,579 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,650 UART:
193,032 UART: Running Caliptra ROM ...
194,168 UART:
603,731 UART: [state] CFI Enabled
619,255 UART: [state] LifecycleState = Unprovisioned
621,189 UART: [state] DebugLocked = No
624,189 UART: [state] WD Timer not started. Device not locked for debugging
627,305 UART: [kat] SHA2-256
806,954 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,407 UART: ROM integrity test failed
818,649 UART: ROM Fatal Error: 0x90080001
3,070,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,986 >>> mbox cmd response: failed
3,220,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,369,274 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,534 UART:
192,939 UART: Running Caliptra ROM ...
194,039 UART:
603,599 UART: [state] CFI Enabled
619,530 UART: [state] LifecycleState = Unprovisioned
621,462 UART: [state] DebugLocked = No
623,286 UART: [state] WD Timer not started. Device not locked for debugging
626,985 UART: [kat] SHA2-256
806,657 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,115 UART: ROM integrity test failed
818,375 UART: ROM Fatal Error: 0x90080001
3,067,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,345 >>> mbox cmd response: failed
3,217,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,366,773 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,074 UART:
192,435 UART: Running Caliptra ROM ...
193,698 UART:
193,858 UART: [state] CFI Enabled
265,291 UART: [state] LifecycleState = Unprovisioned
267,232 UART: [state] DebugLocked = No
268,886 UART: [state] WD Timer not started. Device not locked for debugging
272,904 UART: [kat] SHA2-256
452,555 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,992 UART: ROM integrity test failed
464,253 UART: ROM Fatal Error: 0x90080001
2,723,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,873,968 >>> mbox cmd response: failed
2,874,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,023,425 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,188 UART:
192,573 UART: Running Caliptra ROM ...
193,743 UART:
193,924 UART: [state] CFI Enabled
263,862 UART: [state] LifecycleState = Unprovisioned
265,810 UART: [state] DebugLocked = No
267,956 UART: [state] WD Timer not started. Device not locked for debugging
271,117 UART: [kat] SHA2-256
450,779 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,201 UART: ROM integrity test failed
462,466 UART: ROM Fatal Error: 0x90080001
2,720,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,870,421 >>> mbox cmd response: failed
2,871,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,019,890 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,541 UART:
192,907 UART: Running Caliptra ROM ...
194,074 UART:
603,904 UART: [state] CFI Enabled
618,006 UART: [state] LifecycleState = Unprovisioned
619,930 UART: [state] DebugLocked = No
621,252 UART: [state] WD Timer not started. Device not locked for debugging
625,873 UART: [kat] SHA2-256
805,556 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,007 UART: ROM integrity test failed
817,283 UART: ROM Fatal Error: 0x90080001
3,080,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,886 >>> mbox cmd response: failed
3,230,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,379,314 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,597 UART:
192,970 UART: Running Caliptra ROM ...
194,078 UART:
603,614 UART: [state] CFI Enabled
617,113 UART: [state] LifecycleState = Unprovisioned
619,028 UART: [state] DebugLocked = No
621,820 UART: [state] WD Timer not started. Device not locked for debugging
625,583 UART: [kat] SHA2-256
805,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,659 UART: ROM integrity test failed
816,921 UART: ROM Fatal Error: 0x90080001
3,082,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,231,998 >>> mbox cmd response: failed
3,232,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,381,996 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,076 UART: ROM integrity test failed
895,523 UART: ROM Fatal Error: 0x90080001
897,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,144 >>> mbox cmd response: failed
897,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,150 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,047 UART: [state] WD Timer not started. Device not locked for debugging
87,282 UART: [kat] SHA2-256
890,832 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,778 UART: ROM integrity test failed
895,225 UART: ROM Fatal Error: 0x90080001
896,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,846 >>> mbox cmd response: failed
896,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,852 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,461 UART: ROM integrity test failed
895,908 UART: ROM Fatal Error: 0x90080001
897,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,529 >>> mbox cmd response: failed
897,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,535 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,279 UART: ROM integrity test failed
895,726 UART: ROM Fatal Error: 0x90080001
897,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,347 >>> mbox cmd response: failed
897,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,353 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,190 UART: ROM integrity test failed
895,637 UART: ROM Fatal Error: 0x90080001
897,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,258 >>> mbox cmd response: failed
897,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,264 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,386 UART: [kat] SHA2-256
890,936 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,882 UART: ROM integrity test failed
895,329 UART: ROM Fatal Error: 0x90080001
896,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,950 >>> mbox cmd response: failed
896,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,956 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
891,749 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,695 UART: ROM integrity test failed
896,142 UART: ROM Fatal Error: 0x90080001
897,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,763 >>> mbox cmd response: failed
897,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,769 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
891,155 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,101 UART: ROM integrity test failed
895,548 UART: ROM Fatal Error: 0x90080001
897,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,169 >>> mbox cmd response: failed
897,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,175 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,128 UART: [kat] SHA2-256
890,678 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,624 UART: ROM integrity test failed
895,071 UART: ROM Fatal Error: 0x90080001
896,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,692 >>> mbox cmd response: failed
896,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,698 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,596 UART: [state] LifecycleState = Unprovisioned
85,251 UART: [state] DebugLocked = No
85,743 UART: [state] WD Timer not started. Device not locked for debugging
87,026 UART: [kat] SHA2-256
890,576 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,522 UART: ROM integrity test failed
894,969 UART: ROM Fatal Error: 0x90080001
896,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,590 >>> mbox cmd response: failed
896,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,596 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,669 UART: ROM integrity test failed
896,116 UART: ROM Fatal Error: 0x90080001
897,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,737 >>> mbox cmd response: failed
897,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,743 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,625 UART: ROM integrity test failed
896,072 UART: ROM Fatal Error: 0x90080001
897,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,693 >>> mbox cmd response: failed
897,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,699 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
2,710,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,860,405 >>> mbox cmd response: failed
2,860,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,009,830 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,440,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,267,909 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
2,705,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,855,383 >>> mbox cmd response: failed
2,855,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,004,801 >>> mbox cmd response: failed
Initializing fuses
982 writing to cptra_bootfsm_go
3,471,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,301,861 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
3,063,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,213,669 >>> mbox cmd response: failed
3,214,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,363,139 >>> mbox cmd response: failed
Initializing fuses
984 writing to cptra_bootfsm_go
20,171,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,900,106 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,468 writing to cptra_bootfsm_go
3,066,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,216,025 >>> mbox cmd response: failed
3,216,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,365,456 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
20,169,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,883,727 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,708,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,858,183 >>> mbox cmd response: failed
2,858,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,007,634 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
3,466,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,303,275 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
2,700,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,850,693 >>> mbox cmd response: failed
2,851,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,000,023 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
3,428,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,280,523 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,406 writing to cptra_bootfsm_go
3,059,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,209,600 >>> mbox cmd response: failed
3,210,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,359,308 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,174,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,888,048 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
3,058,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,208,752 >>> mbox cmd response: failed
3,209,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,358,161 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
20,168,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,890,105 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
818,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,226 >>> mbox cmd response: failed
818,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,232 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,368 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,882 >>> mbox cmd response: failed
817,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,888 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,638 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,697 >>> mbox cmd response: failed
817,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,039 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,643 >>> mbox cmd response: failed
817,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,649 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,595 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
818,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,542 >>> mbox cmd response: failed
818,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,352 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,548 >>> mbox cmd response: failed
817,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,554 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,138 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
818,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,217 >>> mbox cmd response: failed
818,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,307 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
818,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,419 >>> mbox cmd response: failed
818,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,425 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,161 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,399 UART:
192,757 UART: Running Caliptra ROM ...
193,881 UART:
194,029 UART: [state] CFI Enabled
263,946 UART: [state] LifecycleState = Unprovisioned
265,934 UART: [state] DebugLocked = No
268,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,773 UART: [kat] SHA2-256
442,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,991 UART: [kat] ++
453,473 UART: [kat] sha1
464,069 UART: [kat] SHA2-256
466,809 UART: [kat] SHA2-384
472,946 UART: [kat] SHA2-512-ACC
475,338 UART: [kat] ECC-384
2,767,677 UART: [kat] HMAC-384Kdf
2,798,983 UART: [kat] LMS
3,989,240 UART: [kat] --
3,993,324 UART: [cold-reset] ++
3,995,829 UART: [fht] Storing FHT @ 0x50003400
4,007,100 UART: [idev] ++
4,007,681 UART: [idev] CDI.KEYID = 6
4,008,668 UART: [idev] SUBJECT.KEYID = 7
4,009,791 UART: [idev] UDS.KEYID = 0
4,010,918 ready_for_fw is high
4,011,141 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,355 UART: [idev] Erasing UDS.KEYID = 0
7,346,189 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,903 UART: [idev] --
7,371,470 UART: [ldev] ++
7,372,062 UART: [ldev] CDI.KEYID = 6
7,372,977 UART: [ldev] SUBJECT.KEYID = 5
7,374,193 UART: [ldev] AUTHORITY.KEYID = 7
7,375,491 UART: [ldev] FE.KEYID = 1
7,423,408 UART: [ldev] Erasing FE.KEYID = 1
10,754,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,966 UART: [ldev] --
13,114,317 UART: [fwproc] Waiting for Commands...
13,116,851 UART: [fwproc] Received command 0x46574c44
13,119,043 UART: [fwproc] Received Image of size 119428 bytes
17,238,131 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,316,497 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,389,654 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,721,004 >>> mbox cmd response: success
17,725,865 UART: [afmc] ++
17,726,482 UART: [afmc] CDI.KEYID = 6
17,727,373 UART: [afmc] SUBJECT.KEYID = 7
17,728,651 UART: [afmc] AUTHORITY.KEYID = 5
21,094,132 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,041 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,309 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,765 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,455 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,862 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,461,632 UART: [afmc] --
23,466,092 UART: [cold-reset] --
23,470,767 UART: [state] Locking Datavault
23,475,424 UART: [state] Locking PCR0, PCR1 and PCR31
23,477,199 UART: [state] Locking ICCM
23,479,920 UART: [exit] Launching FMC @ 0x40000130
23,488,326 UART:
23,488,601 UART: Running Caliptra FMC ...
23,489,635 UART:
23,489,785 UART: [state] CFI Enabled
23,552,639 UART: [fht] FMC Alias Private Key: 7
25,913,849 UART: [art] Extend RT PCRs Done
25,915,080 UART: [art] Lock RT PCRs Done
25,916,682 UART: [art] Populate DV Done
25,922,044 UART: [fht] FMC Alias Private Key: 7
25,923,697 UART: [art] Derive CDI
25,924,432 UART: [art] Store in slot 0x4
25,981,846 UART: [art] Derive Key Pair
25,982,890 UART: [art] Store priv key in slot 0x5
29,275,523 UART: [art] Derive Key Pair - Done
29,288,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,576,583 UART: [art] Erasing AUTHORITY.KEYID = 7
31,578,090 UART: [art] PUB.X = A26746DB93D633946C414E526651993145903E0CA750FDAC9E540B754AC25FDD3CE832D7728661318A180D2F8BAC194B
31,585,346 UART: [art] PUB.Y = 11FE1526FC7E2A29DF4ECE8AE9C68F16C77EB512657A11E7D0A88363040A11F686848574568D8C0616305075F07A0921
31,592,580 UART: [art] SIG.R = 58F9747E7B5179FEA51A6DFDDAE38DDA1D89F299D85A0E922768E3211E4B81635777B71A6A3588C23D63E073A97AD608
31,599,979 UART: [art] SIG.S = B4FE784DEEF9E0957CFA88B8AD54F49F51AF923CEE308FCD68C7A0CC1918CC6A8057DFF34200FA03653EBD861CC38F35
32,905,378 UART: Caliptra RT
32,906,089 UART: [state] CFI Enabled
33,082,983 UART: [rt] RT listening for mailbox commands...
33,084,974 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,114,821 UART: [rt]cmd =0x46504c54, len=4
33,116,402 >>> mbox cmd response data (8 bytes)
33,117,482 UART: [rt] FIPS self test
33,118,433 UART: [kat] ++
33,118,879 UART: [kat] sha1
33,123,334 UART: [kat] SHA2-256
33,125,228 UART: [kat] SHA2-384
33,128,350 UART: [kat] SHA2-512-ACC
33,130,590 UART: [kat] ECC-384
33,132,269 UART: Fatal Error: 0x90040004
33,167,656 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,317,498 >>> mbox cmd response: failed
33,318,141 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,468,066 >>> mbox cmd response: failed
Initializing fuses
993 writing to cptra_bootfsm_go
190,147 UART:
190,442 UART: Running Caliptra ROM ...
191,556 UART:
191,704 UART: [state] CFI Enabled
258,886 UART: [state] LifecycleState = Unprovisioned
260,802 UART: [state] DebugLocked = No
262,285 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
266,528 UART: [kat] SHA2-256
436,223 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
446,732 UART: [kat] ++
447,178 UART: [kat] sha1
458,000 UART: [kat] SHA2-256
460,695 UART: [kat] SHA2-384
465,428 UART: [kat] SHA2-512-ACC
467,822 UART: [kat] ECC-384
2,767,030 UART: [kat] HMAC-384Kdf
2,797,096 UART: [kat] LMS
3,987,393 UART: [kat] --
3,991,613 UART: [cold-reset] ++
3,993,169 UART: [fht] Storing FHT @ 0x50003400
4,005,357 UART: [idev] ++
4,005,934 UART: [idev] CDI.KEYID = 6
4,006,869 UART: [idev] SUBJECT.KEYID = 7
4,008,099 UART: [idev] UDS.KEYID = 0
4,009,730 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,159,852 UART: [idev] Erasing UDS.KEYID = 0
7,344,686 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,129 UART: [idev] --
7,370,392 UART: [ldev] ++
7,371,014 UART: [ldev] CDI.KEYID = 6
7,371,904 UART: [ldev] SUBJECT.KEYID = 5
7,373,176 UART: [ldev] AUTHORITY.KEYID = 7
7,374,409 UART: [ldev] FE.KEYID = 1
7,419,993 UART: [ldev] Erasing FE.KEYID = 1
10,754,573 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,578 UART: [ldev] --
13,135,578 UART: [fwproc] Waiting for Commands...
13,138,810 UART: [fwproc] Received command 0x46574c44
13,141,011 UART: [fwproc] Received Image of size 119428 bytes
17,257,162 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,336,533 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,409,716 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,741,078 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,805,662 ready_for_fw is high
3,806,223 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,973,012 >>> mbox cmd response: success
23,661,847 UART:
23,662,279 UART: Running Caliptra FMC ...
23,663,400 UART:
23,663,566 UART: [state] CFI Enabled
23,730,074 UART: [fht] FMC Alias Private Key: 7
26,070,584 UART: [art] Extend RT PCRs Done
26,071,847 UART: [art] Lock RT PCRs Done
26,073,775 UART: [art] Populate DV Done
26,079,049 UART: [fht] FMC Alias Private Key: 7
26,080,550 UART: [art] Derive CDI
26,081,289 UART: [art] Store in slot 0x4
26,138,881 UART: [art] Derive Key Pair
26,139,923 UART: [art] Store priv key in slot 0x5
29,432,092 UART: [art] Derive Key Pair - Done
29,445,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,584 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,090 UART: [art] PUB.X = 4A8D4D81B94F8BFC758340EC826F85EF2DEEA2AB15B757D6EFB40DA9C83F794EC0B65C295AD8647DDADB8D8ADFA4AEC9
31,743,419 UART: [art] PUB.Y = FDADEA3DC3BFD23F19BF3554A6465816A01407CE56C8057A73D860AC0D7AFBBA7F5AA3DDD2D0C49F8108758ACB15352F
31,750,682 UART: [art] SIG.R = 0A355CD8BCA198DA782CE65820E639354BD3CDE77336A1381E7233B21004EDC0326862C652C759CF78430CD9A1963567
31,758,034 UART: [art] SIG.S = 520975514B2682599AD2D765B94DDC42E19EDC254FD12F94786962C2B8EE5BFF0D4609952E4A1BB72A5AA4317A7DCC7C
33,063,374 UART: Caliptra RT
33,064,080 UART: [state] CFI Enabled
33,240,940 UART: [rt] RT listening for mailbox commands...
33,242,808 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,272,521 UART: [rt]cmd =0x46504c54, len=4
33,274,155 >>> mbox cmd response data (8 bytes)
33,275,327 UART: [rt] FIPS self test
33,276,270 UART: [kat] ++
33,276,721 UART: [kat] sha1
33,281,098 UART: [kat] SHA2-256
33,282,981 UART: [kat] SHA2-384
33,285,889 UART: [kat] SHA2-512-ACC
33,288,179 UART: [kat] ECC-384
33,289,973 UART: Fatal Error: 0x90040004
33,325,388 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,475,965 >>> mbox cmd response: failed
33,476,682 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,626,616 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,783,910 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,953,261 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,517 UART:
192,896 UART: Running Caliptra ROM ...
193,980 UART:
603,803 UART: [state] CFI Enabled
619,593 UART: [state] LifecycleState = Unprovisioned
621,562 UART: [state] DebugLocked = No
624,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,337 UART: [kat] SHA2-256
798,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,632 UART: [kat] ++
809,092 UART: [kat] sha1
818,672 UART: [kat] SHA2-256
821,411 UART: [kat] SHA2-384
827,052 UART: [kat] SHA2-512-ACC
829,441 UART: [kat] ECC-384
3,113,825 UART: [kat] HMAC-384Kdf
3,125,655 UART: [kat] LMS
4,315,720 UART: [kat] --
4,319,248 UART: [cold-reset] ++
4,321,475 UART: [fht] Storing FHT @ 0x50003400
4,332,392 UART: [idev] ++
4,332,995 UART: [idev] CDI.KEYID = 6
4,333,917 UART: [idev] SUBJECT.KEYID = 7
4,335,178 UART: [idev] UDS.KEYID = 0
4,336,240 ready_for_fw is high
4,336,481 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,486,515 UART: [idev] Erasing UDS.KEYID = 0
7,622,766 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,636 UART: [idev] --
7,650,502 UART: [ldev] ++
7,651,084 UART: [ldev] CDI.KEYID = 6
7,652,003 UART: [ldev] SUBJECT.KEYID = 5
7,653,234 UART: [ldev] AUTHORITY.KEYID = 7
7,654,477 UART: [ldev] FE.KEYID = 1
7,665,021 UART: [ldev] Erasing FE.KEYID = 1
10,953,385 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,426 UART: [ldev] --
13,313,642 UART: [fwproc] Waiting for Commands...
13,316,127 UART: [fwproc] Received command 0x46574c44
13,318,321 UART: [fwproc] Received Image of size 119428 bytes
17,436,567 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,514,628 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,587,815 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,918,941 >>> mbox cmd response: success
17,923,332 UART: [afmc] ++
17,923,920 UART: [afmc] CDI.KEYID = 6
17,924,834 UART: [afmc] SUBJECT.KEYID = 7
17,926,105 UART: [afmc] AUTHORITY.KEYID = 5
21,237,898 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,531,084 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,533,358 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,547,759 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,562,506 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,576,914 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,597,321 UART: [afmc] --
23,601,351 UART: [cold-reset] --
23,605,762 UART: [state] Locking Datavault
23,612,688 UART: [state] Locking PCR0, PCR1 and PCR31
23,614,446 UART: [state] Locking ICCM
23,616,573 UART: [exit] Launching FMC @ 0x40000130
23,624,972 UART:
23,625,221 UART: Running Caliptra FMC ...
23,626,254 UART:
23,626,407 UART: [state] CFI Enabled
23,634,893 UART: [fht] FMC Alias Private Key: 7
25,975,291 UART: [art] Extend RT PCRs Done
25,976,514 UART: [art] Lock RT PCRs Done
25,978,333 UART: [art] Populate DV Done
25,983,751 UART: [fht] FMC Alias Private Key: 7
25,985,347 UART: [art] Derive CDI
25,986,090 UART: [art] Store in slot 0x4
26,028,852 UART: [art] Derive Key Pair
26,029,864 UART: [art] Store priv key in slot 0x5
29,271,688 UART: [art] Derive Key Pair - Done
29,285,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,565,387 UART: [art] Erasing AUTHORITY.KEYID = 7
31,566,916 UART: [art] PUB.X = CF58FE1FA28FC4F1FA7C356AE2A4DBAFC151B556BDDC2C7C0E8E7EE963F6A86298190E44AF7E5F05A16D34F07866729F
31,574,184 UART: [art] PUB.Y = EF7A490D9EF23DFBAD5B4994C191FEDCDEBB7818EAE40FD7930867605005BD3FE6E3EA8AA945E07BF6F474D010D5CA52
31,581,485 UART: [art] SIG.R = 7CAF806A320BF5E2A41AFA38D0D25F302FBA7CDAC6B0D532D29E79AB94C72A2574C48D437708EB4EC6178720614EE653
31,588,888 UART: [art] SIG.S = 235B4A1039E60F0AC84A5358CB882EB2C030A4D2EA06F45D6A58554B30AA62CEC96AE546CC7000CAD0EDEF4944619C13
32,894,342 UART: Caliptra RT
32,895,078 UART: [state] CFI Enabled
33,028,866 UART: [rt] RT listening for mailbox commands...
33,030,729 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,060,418 UART: [rt]cmd =0x46504c54, len=4
33,061,900 >>> mbox cmd response data (8 bytes)
33,062,941 UART: [rt] FIPS self test
33,063,892 UART: [kat] ++
33,064,347 UART: [kat] sha1
33,068,703 UART: [kat] SHA2-256
33,070,636 UART: [kat] SHA2-384
33,073,723 UART: [kat] SHA2-512-ACC
33,075,969 UART: [kat] ECC-384
33,077,851 UART: Fatal Error: 0x90040004
33,113,240 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,263,274 >>> mbox cmd response: failed
33,263,870 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,413,777 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,117 UART:
190,407 UART: Running Caliptra ROM ...
191,466 UART:
7,120,284 UART: [state] CFI Enabled
7,132,959 UART: [state] LifecycleState = Unprovisioned
7,134,881 UART: [state] DebugLocked = No
7,137,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,142,261 UART: [kat] SHA2-256
7,312,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,322,526 UART: [kat] ++
7,323,022 UART: [kat] sha1
7,335,052 UART: [kat] SHA2-256
7,337,750 UART: [kat] SHA2-384
7,345,114 UART: [kat] SHA2-512-ACC
7,347,479 UART: [kat] ECC-384
9,631,096 UART: [kat] HMAC-384Kdf
9,642,137 UART: [kat] LMS
10,832,271 UART: [kat] --
10,837,141 UART: [cold-reset] ++
10,838,919 UART: [fht] Storing FHT @ 0x50003400
10,851,266 UART: [idev] ++
10,851,837 UART: [idev] CDI.KEYID = 6
10,852,777 UART: [idev] SUBJECT.KEYID = 7
10,853,999 UART: [idev] UDS.KEYID = 0
10,855,552 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,005,529 UART: [idev] Erasing UDS.KEYID = 0
14,143,270 UART: [idev] Using Sha1 for KeyId Algorithm
14,165,238 UART: [idev] --
14,170,023 UART: [ldev] ++
14,170,623 UART: [ldev] CDI.KEYID = 6
14,171,510 UART: [ldev] SUBJECT.KEYID = 5
14,172,783 UART: [ldev] AUTHORITY.KEYID = 7
14,174,018 UART: [ldev] FE.KEYID = 1
14,184,970 UART: [ldev] Erasing FE.KEYID = 1
17,473,940 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,766,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,780,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,795,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,810,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,829,816 UART: [ldev] --
19,835,173 UART: [fwproc] Waiting for Commands...
19,838,314 UART: [fwproc] Received command 0x46574c44
19,840,514 UART: [fwproc] Received Image of size 119428 bytes
23,958,227 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,032,944 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,106,089 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,438,413 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
4,127,580 ready_for_fw is high
4,128,369 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,172,692 >>> mbox cmd response: success
23,810,459 UART:
23,810,924 UART: Running Caliptra FMC ...
23,812,053 UART:
23,812,224 UART: [state] CFI Enabled
23,820,126 UART: [fht] FMC Alias Private Key: 7
26,160,562 UART: [art] Extend RT PCRs Done
26,161,804 UART: [art] Lock RT PCRs Done
26,163,409 UART: [art] Populate DV Done
26,168,754 UART: [fht] FMC Alias Private Key: 7
26,170,458 UART: [art] Derive CDI
26,171,295 UART: [art] Store in slot 0x4
26,214,229 UART: [art] Derive Key Pair
26,215,230 UART: [art] Store priv key in slot 0x5
29,457,263 UART: [art] Derive Key Pair - Done
29,469,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,890 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,410 UART: [art] PUB.X = C34C22BAC368AACB0C1F17E06C60D5267734CD447251332BE11FDB84B54EBA9A9590F9AE4E329DC4E9DEF529691063CA
31,758,682 UART: [art] PUB.Y = C6EAB47A48A1B85CDBF14CCF45F4E7ED5E0076E90E8864B5C14499A7F5DC85C03D56018B455E6B8BD8C8784F48F922C2
31,765,968 UART: [art] SIG.R = 53A9BE46077BC701DB9F66E111A446C79DA39C4F9A43A8D108140F289EA240AD34510E81A0C3CC749CBDF912FDFD70BD
31,773,384 UART: [art] SIG.S = 4190095428B93893774C9293CAE9FE3A4325301A70AE4D7ECCFACDD18A6ED2F1D253C6A005A75F97DDC49ACC9197ABA8
33,078,375 UART: Caliptra RT
33,079,079 UART: [state] CFI Enabled
33,212,805 UART: [rt] RT listening for mailbox commands...
33,214,690 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,244,067 UART: [rt]cmd =0x46504c54, len=4
33,245,873 >>> mbox cmd response data (8 bytes)
33,247,008 UART: [rt] FIPS self test
33,247,962 UART: [kat] ++
33,248,411 UART: [kat] sha1
33,252,813 UART: [kat] SHA2-256
33,254,701 UART: [kat] SHA2-384
33,257,642 UART: [kat] SHA2-512-ACC
33,259,876 UART: [kat] ECC-384
33,261,840 UART: Fatal Error: 0x90040004
33,297,227 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,447,218 >>> mbox cmd response: failed
33,447,887 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,597,623 >>> mbox cmd response: failed
Initializing fuses
984 writing to cptra_bootfsm_go
10,466,317 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,505,373 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,291 UART:
192,657 UART: Running Caliptra ROM ...
193,902 UART:
194,067 UART: [state] CFI Enabled
261,558 UART: [state] LifecycleState = Unprovisioned
263,547 UART: [state] DebugLocked = No
264,946 UART: [state] WD Timer not started. Device not locked for debugging
268,664 UART: [kat] SHA2-256
448,282 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,092 UART: [kat] ++
459,590 UART: [kat] sha1
471,633 UART: [kat] SHA2-256
474,347 UART: [kat] SHA2-384
479,573 UART: [kat] SHA2-512-ACC
481,949 UART: [kat] ECC-384
2,926,937 UART: [kat] HMAC-384Kdf
2,951,133 UART: [kat] LMS
3,427,644 UART: [kat] --
3,431,974 UART: [cold-reset] ++
3,434,207 UART: [fht] FHT @ 0x50003400
3,445,696 UART: [idev] ++
3,446,279 UART: [idev] CDI.KEYID = 6
3,447,194 UART: [idev] SUBJECT.KEYID = 7
3,448,450 UART: [idev] UDS.KEYID = 0
3,449,385 ready_for_fw is high
3,449,591 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,599,779 UART: [idev] Erasing UDS.KEYID = 0
5,963,137 UART: [idev] Sha1 KeyId Algorithm
5,987,783 UART: [idev] --
5,992,726 UART: [ldev] ++
5,993,310 UART: [ldev] CDI.KEYID = 6
5,994,282 UART: [ldev] SUBJECT.KEYID = 5
5,995,451 UART: [ldev] AUTHORITY.KEYID = 7
5,996,695 UART: [ldev] FE.KEYID = 1
6,027,738 UART: [ldev] Erasing FE.KEYID = 1
8,535,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,272,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,288,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,304,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,319,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,341,350 UART: [ldev] --
10,347,271 UART: [fwproc] Wait for Commands...
10,348,893 UART: [fwproc] Recv command 0x46574c44
10,350,943 UART: [fwproc] Recv'd Img size: 119428 bytes
13,843,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,922,748 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,995,785 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,326,254 >>> mbox cmd response: success
14,330,204 UART: [afmc] ++
14,330,798 UART: [afmc] CDI.KEYID = 6
14,331,765 UART: [afmc] SUBJECT.KEYID = 7
14,332,990 UART: [afmc] AUTHORITY.KEYID = 5
16,862,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,601,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,603,974 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,619,750 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,635,814 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,651,419 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,676,501 UART: [afmc] --
18,679,666 UART: [cold-reset] --
18,683,098 UART: [state] Locking Datavault
18,687,219 UART: [state] Locking PCR0, PCR1 and PCR31
18,688,985 UART: [state] Locking ICCM
18,690,549 UART: [exit] Launching FMC @ 0x40000130
18,698,948 UART:
18,699,188 UART: Running Caliptra FMC ...
18,700,310 UART:
18,700,475 UART: [state] CFI Enabled
18,761,058 UART: [fht] FMC Alias Private Key: 7
20,527,264 UART: [art] Extend RT PCRs Done
20,528,486 UART: [art] Lock RT PCRs Done
20,530,177 UART: [art] Populate DV Done
20,535,597 UART: [fht] FMC Alias Private Key: 7
20,537,088 UART: [art] Derive CDI
20,537,832 UART: [art] Store in slot 0x4
20,593,606 UART: [art] Derive Key Pair
20,594,650 UART: [art] Store priv key in slot 0x5
23,070,554 UART: [art] Derive Key Pair - Done
23,083,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,956 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,472 UART: [art] PUB.X = B64EFA233D30386758D83634B917A762E050B78F3A50B138CF65FD8CC05FAB139A5DF2826A9351494C17D60464F27E54
24,804,698 UART: [art] PUB.Y = 17AD239544F3E8F5F3054597F4350EDB131AB1CB44B61421B1EDDC4C801E19B5CD366F2288329BBEAFC4290AE1EB7F9D
24,811,985 UART: [art] SIG.R = 3B3F909FBC48A9C4ABE02BF168D18B1A67CC4E5231463BA85B784CE0310B11712996AB1D886B25DBEC0F41DA5E54AA7F
24,819,373 UART: [art] SIG.S = 4648E86204D54CCCBFC314EB90A9B47BA4E371C645243AD8DA3F92B19E0F10F473BDB0F74008975B7B98CED82709512A
25,797,656 UART: Caliptra RT
25,798,346 UART: [state] CFI Enabled
25,978,917 UART: [rt] RT listening for mailbox commands...
25,980,769 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,010,324 UART: [rt]cmd =0x46504c54, len=4
26,011,890 >>> mbox cmd response data (8 bytes)
26,013,156 UART: [rt] FIPS self test
26,014,116 UART: [kat] ++
26,014,571 UART: [kat] sha1
26,018,814 UART: [kat] SHA2-256
26,020,696 UART: [kat] SHA2-384
26,023,636 UART: [kat] SHA2-512-ACC
26,025,872 UART: [kat] ECC-384
26,027,780 UART: Fatal Error: 0x90040004
26,063,013 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,213,039 >>> mbox cmd response: failed
26,213,709 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,364,020 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,020 UART:
190,320 UART: Running Caliptra ROM ...
191,351 UART:
191,495 UART: [state] CFI Enabled
265,167 UART: [state] LifecycleState = Unprovisioned
267,080 UART: [state] DebugLocked = No
268,598 UART: [state] WD Timer not started. Device not locked for debugging
271,854 UART: [kat] SHA2-256
451,473 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,290 UART: [kat] ++
462,776 UART: [kat] sha1
473,067 UART: [kat] SHA2-256
475,756 UART: [kat] SHA2-384
481,793 UART: [kat] SHA2-512-ACC
484,193 UART: [kat] ECC-384
2,947,740 UART: [kat] HMAC-384Kdf
2,969,313 UART: [kat] LMS
3,445,774 UART: [kat] --
3,451,128 UART: [cold-reset] ++
3,453,708 UART: [fht] FHT @ 0x50003400
3,465,391 UART: [idev] ++
3,465,994 UART: [idev] CDI.KEYID = 6
3,466,943 UART: [idev] SUBJECT.KEYID = 7
3,468,162 UART: [idev] UDS.KEYID = 0
3,469,739 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,619,777 UART: [idev] Erasing UDS.KEYID = 0
5,986,598 UART: [idev] Sha1 KeyId Algorithm
6,009,994 UART: [idev] --
6,015,994 UART: [ldev] ++
6,016,576 UART: [ldev] CDI.KEYID = 6
6,017,463 UART: [ldev] SUBJECT.KEYID = 5
6,018,686 UART: [ldev] AUTHORITY.KEYID = 7
6,019,982 UART: [ldev] FE.KEYID = 1
6,055,030 UART: [ldev] Erasing FE.KEYID = 1
8,562,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,110 UART: [ldev] --
10,374,665 UART: [fwproc] Wait for Commands...
10,377,903 UART: [fwproc] Recv command 0x46574c44
10,379,924 UART: [fwproc] Recv'd Img size: 119428 bytes
13,870,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,685 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,739 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,353,734 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,462,324 ready_for_fw is high
3,462,805 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,252,680 >>> mbox cmd response: success
18,539,060 UART:
18,539,471 UART: Running Caliptra FMC ...
18,540,591 UART:
18,540,753 UART: [state] CFI Enabled
18,609,073 UART: [fht] FMC Alias Private Key: 7
20,375,718 UART: [art] Extend RT PCRs Done
20,376,953 UART: [art] Lock RT PCRs Done
20,378,613 UART: [art] Populate DV Done
20,384,111 UART: [fht] FMC Alias Private Key: 7
20,385,669 UART: [art] Derive CDI
20,386,492 UART: [art] Store in slot 0x4
20,442,144 UART: [art] Derive Key Pair
20,443,190 UART: [art] Store priv key in slot 0x5
22,905,904 UART: [art] Derive Key Pair - Done
22,918,954 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,632,268 UART: [art] Erasing AUTHORITY.KEYID = 7
24,633,786 UART: [art] PUB.X = B71C6629F7E214F87DCF443D4E749053165BF80704DFD9A23FA35C970F4F3BA46CADE21B7125E00D742974ABCEDAAD69
24,641,060 UART: [art] PUB.Y = 329ED66F73D81AB78DD6658C40603C2D0169BD2F0A03657CF60FE1280AA2C497B6D44929C769147C128EDC5C6E1BEFA2
24,648,360 UART: [art] SIG.R = 86C1387BA310A9154D1813D8C636F42CD1DFB05B1838BB42F7D754C3CECB6926807F281CC8B784CF3156437E4DC7BACC
24,655,767 UART: [art] SIG.S = 4FD4648388E0AD308AE288A3260666F1DB6AABBF050B96251E850E3B3E99F7467E794B0E1EEBC38048670491AAB9363D
25,634,147 UART: Caliptra RT
25,634,889 UART: [state] CFI Enabled
25,815,787 UART: [rt] RT listening for mailbox commands...
25,817,636 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,847,056 UART: [rt]cmd =0x46504c54, len=4
25,848,479 >>> mbox cmd response data (8 bytes)
25,849,475 UART: [rt] FIPS self test
25,850,418 UART: [kat] ++
25,850,875 UART: [kat] sha1
25,855,283 UART: [kat] SHA2-256
25,857,168 UART: [kat] SHA2-384
25,860,054 UART: [kat] SHA2-512-ACC
25,862,292 UART: [kat] ECC-384
25,864,284 UART: Fatal Error: 0x90040004
25,899,671 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,049,664 >>> mbox cmd response: failed
26,050,310 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,200,285 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,462,903 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,263,080 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,550 UART:
192,945 UART: Running Caliptra ROM ...
194,124 UART:
603,554 UART: [state] CFI Enabled
621,987 UART: [state] LifecycleState = Unprovisioned
623,879 UART: [state] DebugLocked = No
625,913 UART: [state] WD Timer not started. Device not locked for debugging
629,042 UART: [kat] SHA2-256
808,672 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,476 UART: [kat] ++
820,013 UART: [kat] sha1
831,616 UART: [kat] SHA2-256
834,347 UART: [kat] SHA2-384
840,485 UART: [kat] SHA2-512-ACC
842,859 UART: [kat] ECC-384
3,285,254 UART: [kat] HMAC-384Kdf
3,297,197 UART: [kat] LMS
3,773,751 UART: [kat] --
3,776,578 UART: [cold-reset] ++
3,778,118 UART: [fht] FHT @ 0x50003400
3,789,396 UART: [idev] ++
3,789,971 UART: [idev] CDI.KEYID = 6
3,791,011 UART: [idev] SUBJECT.KEYID = 7
3,792,194 UART: [idev] UDS.KEYID = 0
3,793,123 ready_for_fw is high
3,793,329 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,943,303 UART: [idev] Erasing UDS.KEYID = 0
6,267,012 UART: [idev] Sha1 KeyId Algorithm
6,290,643 UART: [idev] --
6,294,964 UART: [ldev] ++
6,295,535 UART: [ldev] CDI.KEYID = 6
6,296,475 UART: [ldev] SUBJECT.KEYID = 5
6,297,714 UART: [ldev] AUTHORITY.KEYID = 7
6,298,952 UART: [ldev] FE.KEYID = 1
6,309,467 UART: [ldev] Erasing FE.KEYID = 1
8,784,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,028 UART: [ldev] --
10,577,353 UART: [fwproc] Wait for Commands...
10,579,983 UART: [fwproc] Recv command 0x46574c44
10,581,984 UART: [fwproc] Recv'd Img size: 119428 bytes
14,077,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,765 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,785 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,563,550 >>> mbox cmd response: success
14,567,650 UART: [afmc] ++
14,568,249 UART: [afmc] CDI.KEYID = 6
14,569,215 UART: [afmc] SUBJECT.KEYID = 7
14,570,431 UART: [afmc] AUTHORITY.KEYID = 5
17,075,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,797,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,799,723 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,815,547 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,831,613 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,847,182 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,102 UART: [afmc] --
18,874,270 UART: [cold-reset] --
18,877,057 UART: [state] Locking Datavault
18,884,097 UART: [state] Locking PCR0, PCR1 and PCR31
18,885,874 UART: [state] Locking ICCM
18,887,269 UART: [exit] Launching FMC @ 0x40000130
18,895,689 UART:
18,895,972 UART: Running Caliptra FMC ...
18,897,091 UART:
18,897,262 UART: [state] CFI Enabled
18,905,159 UART: [fht] FMC Alias Private Key: 7
20,671,954 UART: [art] Extend RT PCRs Done
20,673,185 UART: [art] Lock RT PCRs Done
20,675,203 UART: [art] Populate DV Done
20,680,673 UART: [fht] FMC Alias Private Key: 7
20,682,214 UART: [art] Derive CDI
20,683,036 UART: [art] Store in slot 0x4
20,725,854 UART: [art] Derive Key Pair
20,726,859 UART: [art] Store priv key in slot 0x5
23,154,042 UART: [art] Derive Key Pair - Done
23,167,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,873,492 UART: [art] Erasing AUTHORITY.KEYID = 7
24,875,024 UART: [art] PUB.X = 7DEA651708A360A3066295811ADA8F5C3C04AE176148805A145F274167EBAB6EB7AD4A67BD676D4AB0745CEA28CA1D80
24,882,252 UART: [art] PUB.Y = 5124E872479EFC3BE01FC979A022E4B6F60C16002704244C6BA69AB1302267DDF0ACB2A564CBD77CDC1721E653F3F79C
24,889,502 UART: [art] SIG.R = 9656C508B475B1FDE79499AD446C0FC56AB5E30F9BA4B48B620CDA40FA5EA6D6DFA93F141A3295996EFDE5DCD9E1739C
24,896,947 UART: [art] SIG.S = 366F25A639F51A99A0AE510362B5559FC2CE2858D32BFDB64EFA49D8130421CD6E2E353DDD9C9C8EF7E1E77CF3DB5A3F
25,876,219 UART: Caliptra RT
25,876,917 UART: [state] CFI Enabled
26,009,832 UART: [rt] RT listening for mailbox commands...
26,011,681 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,041,358 UART: [rt]cmd =0x46504c54, len=4
26,042,766 >>> mbox cmd response data (8 bytes)
26,043,955 UART: [rt] FIPS self test
26,044,912 UART: [kat] ++
26,045,368 UART: [kat] sha1
26,049,719 UART: [kat] SHA2-256
26,051,653 UART: [kat] SHA2-384
26,054,507 UART: [kat] SHA2-512-ACC
26,056,821 UART: [kat] ECC-384
26,058,781 UART: Fatal Error: 0x90040004
26,093,991 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,244,315 >>> mbox cmd response: failed
26,244,933 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,394,901 >>> mbox cmd response: failed
Initializing fuses
931 writing to cptra_bootfsm_go
190,064 UART:
190,361 UART: Running Caliptra ROM ...
191,477 UART:
14,141,743 UART: [state] CFI Enabled
14,155,509 UART: [state] LifecycleState = Unprovisioned
14,157,429 UART: [state] DebugLocked = No
14,160,308 UART: [state] WD Timer not started. Device not locked for debugging
14,163,512 UART: [kat] SHA2-256
14,343,183 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,353,959 UART: [kat] ++
14,354,428 UART: [kat] sha1
14,364,942 UART: [kat] SHA2-256
14,367,652 UART: [kat] SHA2-384
14,372,354 UART: [kat] SHA2-512-ACC
14,374,710 UART: [kat] ECC-384
16,814,830 UART: [kat] HMAC-384Kdf
16,826,670 UART: [kat] LMS
17,303,206 UART: [kat] --
17,307,411 UART: [cold-reset] ++
17,309,292 UART: [fht] FHT @ 0x50003400
17,319,787 UART: [idev] ++
17,320,357 UART: [idev] CDI.KEYID = 6
17,321,320 UART: [idev] SUBJECT.KEYID = 7
17,322,587 UART: [idev] UDS.KEYID = 0
17,324,159 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,474,065 UART: [idev] Erasing UDS.KEYID = 0
19,803,874 UART: [idev] Sha1 KeyId Algorithm
19,829,276 UART: [idev] --
19,833,328 UART: [ldev] ++
19,833,955 UART: [ldev] CDI.KEYID = 6
19,834,849 UART: [ldev] SUBJECT.KEYID = 5
19,836,067 UART: [ldev] AUTHORITY.KEYID = 7
19,837,307 UART: [ldev] FE.KEYID = 1
19,850,008 UART: [ldev] Erasing FE.KEYID = 1
22,329,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,048,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,064,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,080,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,096,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,118,264 UART: [ldev] --
24,123,194 UART: [fwproc] Wait for Commands...
24,124,922 UART: [fwproc] Recv command 0x46574c44
24,126,918 UART: [fwproc] Recv'd Img size: 119428 bytes
27,625,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,702,285 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,775,312 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,106,755 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,486 writing to cptra_bootfsm_go
3,778,261 ready_for_fw is high
3,778,680 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,457,177 >>> mbox cmd response: success
18,706,824 UART:
18,707,205 UART: Running Caliptra FMC ...
18,708,325 UART:
18,708,478 UART: [state] CFI Enabled
18,716,781 UART: [fht] FMC Alias Private Key: 7
20,482,943 UART: [art] Extend RT PCRs Done
20,484,184 UART: [art] Lock RT PCRs Done
20,485,682 UART: [art] Populate DV Done
20,491,062 UART: [fht] FMC Alias Private Key: 7
20,492,563 UART: [art] Derive CDI
20,493,304 UART: [art] Store in slot 0x4
20,536,115 UART: [art] Derive Key Pair
20,537,115 UART: [art] Store priv key in slot 0x5
22,963,836 UART: [art] Derive Key Pair - Done
22,976,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,173 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,706 UART: [art] PUB.X = 447B71BF1AC5EA266D85E21F815A00CF31C716DB7920C545E40717185AF654BC69CC91B740AD490C53D8A422E2F3CD9F
24,691,967 UART: [art] PUB.Y = 5CA4954BEF31A6F5AB422B10DC1149ED224FB61632B6A458307B8B61875D7E68956EA75D14F4E708ED8171CB116F0336
24,699,176 UART: [art] SIG.R = D5FBFB7A5ED407CAC1985BA11F49F22F27CC668F2651B4C13FE3CA45A2037CD274FDC0DB5612875DC26FA4F3A9D4B1FA
24,706,588 UART: [art] SIG.S = 656315D3490FE2DF456E87A984799DF679DF4FE95C6B74A8DE95590D76B66DCE1D0FF47FAE9228C4CC6DA81473F8F429
25,685,291 UART: Caliptra RT
25,686,016 UART: [state] CFI Enabled
25,818,849 UART: [rt] RT listening for mailbox commands...
25,820,692 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,850,388 UART: [rt]cmd =0x46504c54, len=4
25,852,112 >>> mbox cmd response data (8 bytes)
25,853,008 UART: [rt] FIPS self test
25,853,967 UART: [kat] ++
25,854,416 UART: [kat] sha1
25,858,761 UART: [kat] SHA2-256
25,860,689 UART: [kat] SHA2-384
25,863,763 UART: [kat] SHA2-512-ACC
25,866,001 UART: [kat] ECC-384
25,867,828 UART: Fatal Error: 0x90040004
25,903,038 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,053,023 >>> mbox cmd response: failed
26,053,639 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,203,542 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
17,495,417 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,176,137 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,177 UART:
192,544 UART: Running Caliptra ROM ...
193,654 UART:
193,799 UART: [state] CFI Enabled
262,690 UART: [state] LifecycleState = Unprovisioned
265,111 UART: [state] DebugLocked = No
267,152 UART: [state] WD Timer not started. Device not locked for debugging
271,063 UART: [kat] SHA2-256
460,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,661 UART: [kat] ++
472,122 UART: [kat] sha1
483,570 UART: [kat] SHA2-256
486,593 UART: [kat] SHA2-384
491,914 UART: [kat] SHA2-512-ACC
494,511 UART: [kat] ECC-384
2,947,695 UART: [kat] HMAC-384Kdf
2,971,113 UART: [kat] LMS
3,502,911 UART: [kat] --
3,506,632 UART: [cold-reset] ++
3,508,525 UART: [fht] FHT @ 0x50003400
3,520,754 UART: [idev] ++
3,521,406 UART: [idev] CDI.KEYID = 6
3,522,447 UART: [idev] SUBJECT.KEYID = 7
3,523,559 UART: [idev] UDS.KEYID = 0
3,524,496 ready_for_fw is high
3,524,726 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,674,953 UART: [idev] Erasing UDS.KEYID = 0
6,029,796 UART: [idev] Sha1 KeyId Algorithm
6,052,284 UART: [idev] --
6,057,761 UART: [ldev] ++
6,058,455 UART: [ldev] CDI.KEYID = 6
6,059,371 UART: [ldev] SUBJECT.KEYID = 5
6,060,539 UART: [ldev] AUTHORITY.KEYID = 7
6,061,776 UART: [ldev] FE.KEYID = 1
6,100,037 UART: [ldev] Erasing FE.KEYID = 1
8,604,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,530 UART: [ldev] --
10,417,401 UART: [fwproc] Wait for Commands...
10,420,533 UART: [fwproc] Recv command 0x46574c44
10,422,795 UART: [fwproc] Recv'd Img size: 119428 bytes
13,935,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,011,937 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,135,557 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,700,790 >>> mbox cmd response: success
14,704,640 UART: [afmc] ++
14,705,346 UART: [afmc] CDI.KEYID = 6
14,706,457 UART: [afmc] SUBJECT.KEYID = 7
14,708,103 UART: [afmc] AUTHORITY.KEYID = 5
17,235,793 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,980,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,982,462 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,997,551 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,012,740 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,027,607 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,051,500 UART: [afmc] --
19,054,955 UART: [cold-reset] --
19,060,068 UART: [state] Locking Datavault
19,063,836 UART: [state] Locking PCR0, PCR1 and PCR31
19,065,981 UART: [state] Locking ICCM
19,068,516 UART: [exit] Launching FMC @ 0x40000130
19,077,193 UART:
19,077,436 UART: Running Caliptra FMC ...
19,078,547 UART:
19,078,712 UART: [state] CFI Enabled
19,136,331 UART: [fht] FMC Alias Private Key: 7
20,902,180 UART: [art] Extend RT PCRs Done
20,903,412 UART: [art] Lock RT PCRs Done
20,905,231 UART: [art] Populate DV Done
20,910,544 UART: [fht] FMC Alias Private Key: 7
20,912,248 UART: [art] Derive CDI
20,912,987 UART: [art] Store in slot 0x4
20,970,078 UART: [art] Derive Key Pair
20,971,122 UART: [art] Store priv key in slot 0x5
23,433,552 UART: [art] Derive Key Pair - Done
23,446,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,517 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,014 UART: [art] PUB.X = 37B301E78193C50477A4D7FDB41DBF8BF8F280BECF9B8FD685548534AE82CF605DD5F00392B1677593024AB839E57317
25,168,278 UART: [art] PUB.Y = 8DCB698CC1D4D020B9F7C2E4BC7787471CFB08265B7F7D752B65237C3ABAC81B03D53DA281940855125CD310774BDE2F
25,175,531 UART: [art] SIG.R = 7715ACDEF9E56A167C6DD4083353A60521C61DC7649089F7B83B26364FB9052BB4CA0D8A7FEA0D4309FDC2C155545FBF
25,182,937 UART: [art] SIG.S = DA932665C24DB7768D2ABBA26615183F5867EC78964D1B766F2EBF29EC5D8A586EC7F99F777A128FF40CAB343D6282D9
26,162,208 UART: Caliptra RT
26,162,926 UART: [state] CFI Enabled
26,343,434 UART: [rt] RT listening for mailbox commands...
26,345,292 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,375,054 UART: [rt]cmd =0x46504c54, len=4
26,376,588 >>> mbox cmd response data (8 bytes)
26,377,735 UART: [rt] FIPS self test
26,378,687 UART: [kat] ++
26,379,141 UART: [kat] sha1
26,383,631 UART: [kat] SHA2-256
26,385,522 UART: [kat] SHA2-384
26,388,551 UART: [kat] SHA2-512-ACC
26,390,834 UART: [kat] ECC-384
26,392,740 UART: Fatal Error: 0x90040004
26,427,957 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,577,902 >>> mbox cmd response: failed
26,578,524 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,728,386 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
189,997 UART:
190,289 UART: Running Caliptra ROM ...
191,319 UART:
191,464 UART: [state] CFI Enabled
264,049 UART: [state] LifecycleState = Unprovisioned
266,438 UART: [state] DebugLocked = No
268,713 UART: [state] WD Timer not started. Device not locked for debugging
273,062 UART: [kat] SHA2-256
462,969 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,699 UART: [kat] ++
474,152 UART: [kat] sha1
485,412 UART: [kat] SHA2-256
488,432 UART: [kat] SHA2-384
492,904 UART: [kat] SHA2-512-ACC
495,471 UART: [kat] ECC-384
2,946,039 UART: [kat] HMAC-384Kdf
2,972,151 UART: [kat] LMS
3,503,901 UART: [kat] --
3,509,413 UART: [cold-reset] ++
3,510,374 UART: [fht] FHT @ 0x50003400
3,521,771 UART: [idev] ++
3,522,473 UART: [idev] CDI.KEYID = 6
3,523,362 UART: [idev] SUBJECT.KEYID = 7
3,524,579 UART: [idev] UDS.KEYID = 0
3,526,099 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,287 UART: [idev] Erasing UDS.KEYID = 0
6,029,225 UART: [idev] Sha1 KeyId Algorithm
6,051,929 UART: [idev] --
6,056,853 UART: [ldev] ++
6,057,546 UART: [ldev] CDI.KEYID = 6
6,058,460 UART: [ldev] SUBJECT.KEYID = 5
6,059,877 UART: [ldev] AUTHORITY.KEYID = 7
6,061,075 UART: [ldev] FE.KEYID = 1
6,099,710 UART: [ldev] Erasing FE.KEYID = 1
8,606,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,408 UART: [ldev] --
10,414,273 UART: [fwproc] Wait for Commands...
10,416,916 UART: [fwproc] Recv command 0x46574c44
10,419,188 UART: [fwproc] Recv'd Img size: 119428 bytes
13,931,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,009,244 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,132,827 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,698,748 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,440,275 ready_for_fw is high
3,440,770 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,824,168 >>> mbox cmd response: success
19,122,826 UART:
19,123,231 UART: Running Caliptra FMC ...
19,124,395 UART:
19,124,557 UART: [state] CFI Enabled
19,190,852 UART: [fht] FMC Alias Private Key: 7
20,957,272 UART: [art] Extend RT PCRs Done
20,958,496 UART: [art] Lock RT PCRs Done
20,960,389 UART: [art] Populate DV Done
20,965,645 UART: [fht] FMC Alias Private Key: 7
20,967,340 UART: [art] Derive CDI
20,968,119 UART: [art] Store in slot 0x4
21,023,296 UART: [art] Derive Key Pair
21,024,306 UART: [art] Store priv key in slot 0x5
23,487,456 UART: [art] Derive Key Pair - Done
23,500,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,780 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,304 UART: [art] PUB.X = 5B6D5CACC4D9F63049DAFB505FCDDBBADAB0A200501FC62EE9F2127930431BE296B4F56608EB39B801B210AC87B4221C
25,221,517 UART: [art] PUB.Y = F26BE09138435AEAFE16CA6322A71B85DAE0A0CDA5E371C1A8AA133CE05328E89EE08AB33EB9307E49B2209F8FE40186
25,228,767 UART: [art] SIG.R = BAFCA6041ED86E78BE167F2773C5835ECF9CCF407080A75801AF1EA09C477B31B97DF2DCE89902BC29F6BDEF987A3407
25,236,175 UART: [art] SIG.S = 0A010F20481E1A7B7D6FBE654F9ABB135C37EC9234AA3C48D9A04479DE13C569E742E3F3CA29209A4C2C05C11335E4FA
26,214,874 UART: Caliptra RT
26,215,595 UART: [state] CFI Enabled
26,396,053 UART: [rt] RT listening for mailbox commands...
26,397,916 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,427,377 UART: [rt]cmd =0x46504c54, len=4
26,429,156 >>> mbox cmd response data (8 bytes)
26,430,177 UART: [rt] FIPS self test
26,431,146 UART: [kat] ++
26,431,604 UART: [kat] sha1
26,435,956 UART: [kat] SHA2-256
26,437,892 UART: [kat] SHA2-384
26,440,913 UART: [kat] SHA2-512-ACC
26,443,153 UART: [kat] ECC-384
26,444,839 UART: Fatal Error: 0x90040004
26,480,066 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,630,031 >>> mbox cmd response: failed
26,630,689 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,780,639 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
3,439,367 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,846,660 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,602 writing to cptra_bootfsm_go
193,858 UART:
194,220 UART: Running Caliptra ROM ...
195,415 UART:
605,082 UART: [state] CFI Enabled
617,400 UART: [state] LifecycleState = Unprovisioned
619,770 UART: [state] DebugLocked = No
622,583 UART: [state] WD Timer not started. Device not locked for debugging
627,558 UART: [kat] SHA2-256
817,437 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,238 UART: [kat] ++
828,801 UART: [kat] sha1
839,681 UART: [kat] SHA2-256
842,700 UART: [kat] SHA2-384
848,199 UART: [kat] SHA2-512-ACC
850,787 UART: [kat] ECC-384
3,295,023 UART: [kat] HMAC-384Kdf
3,308,264 UART: [kat] LMS
3,840,050 UART: [kat] --
3,845,169 UART: [cold-reset] ++
3,846,576 UART: [fht] FHT @ 0x50003400
3,856,996 UART: [idev] ++
3,857,716 UART: [idev] CDI.KEYID = 6
3,858,631 UART: [idev] SUBJECT.KEYID = 7
3,859,812 UART: [idev] UDS.KEYID = 0
3,860,743 ready_for_fw is high
3,860,983 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,010,964 UART: [idev] Erasing UDS.KEYID = 0
6,333,465 UART: [idev] Sha1 KeyId Algorithm
6,355,659 UART: [idev] --
6,361,332 UART: [ldev] ++
6,362,019 UART: [ldev] CDI.KEYID = 6
6,362,939 UART: [ldev] SUBJECT.KEYID = 5
6,364,161 UART: [ldev] AUTHORITY.KEYID = 7
6,365,304 UART: [ldev] FE.KEYID = 1
6,377,907 UART: [ldev] Erasing FE.KEYID = 1
8,852,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,688 UART: [ldev] --
10,642,638 UART: [fwproc] Wait for Commands...
10,645,587 UART: [fwproc] Recv command 0x46574c44
10,647,927 UART: [fwproc] Recv'd Img size: 119428 bytes
14,147,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,870 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,444 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,920,553 >>> mbox cmd response: success
14,924,279 UART: [afmc] ++
14,925,009 UART: [afmc] CDI.KEYID = 6
14,926,131 UART: [afmc] SUBJECT.KEYID = 7
14,927,676 UART: [afmc] AUTHORITY.KEYID = 5
17,429,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,834 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,908 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,184,067 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,199,006 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,222,511 UART: [afmc] --
19,226,444 UART: [cold-reset] --
19,230,151 UART: [state] Locking Datavault
19,234,976 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,170 UART: [state] Locking ICCM
19,239,491 UART: [exit] Launching FMC @ 0x40000130
19,248,111 UART:
19,248,376 UART: Running Caliptra FMC ...
19,249,483 UART:
19,249,643 UART: [state] CFI Enabled
19,257,740 UART: [fht] FMC Alias Private Key: 7
21,023,733 UART: [art] Extend RT PCRs Done
21,024,954 UART: [art] Lock RT PCRs Done
21,026,453 UART: [art] Populate DV Done
21,031,599 UART: [fht] FMC Alias Private Key: 7
21,033,036 UART: [art] Derive CDI
21,033,807 UART: [art] Store in slot 0x4
21,076,615 UART: [art] Derive Key Pair
21,077,663 UART: [art] Store priv key in slot 0x5
23,504,024 UART: [art] Derive Key Pair - Done
23,516,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,342 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,853 UART: [art] PUB.X = 6E2558715E604EEF15824AC906AAD9000C6445156A84C6724700FF2149995D134EE76CA0EF2FC4C7234A6D4E2095E232
25,232,111 UART: [art] PUB.Y = DB805AA4057ABD6E5B331F28EFA95B3D7BC76826130E5ECA7608899393768EF468E2824DEAD174A4DBAC3A5EDAE4A8BB
25,239,341 UART: [art] SIG.R = 09DFC58DB38146C9DDF84E2FDD9B79DB30976F198011342A81D1242D2AB613A786E62E3F728F91662594E57E2079F663
25,246,733 UART: [art] SIG.S = 66FE3A610786E9B52B7E87CFA979D0FC2307925AAF154B53838C94AF3D5E616282A8D081025526E85BDE6F01F292D78C
26,225,497 UART: Caliptra RT
26,226,189 UART: [state] CFI Enabled
26,358,929 UART: [rt] RT listening for mailbox commands...
26,360,783 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,390,499 UART: [rt]cmd =0x46504c54, len=4
26,392,026 >>> mbox cmd response data (8 bytes)
26,392,870 UART: [rt] FIPS self test
26,393,752 UART: [kat] ++
26,394,195 UART: [kat] sha1
26,398,512 UART: [kat] SHA2-256
26,400,455 UART: [kat] SHA2-384
26,403,430 UART: [kat] SHA2-512-ACC
26,405,716 UART: [kat] ECC-384
26,407,646 UART: Fatal Error: 0x90040004
26,442,868 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,592,877 >>> mbox cmd response: failed
26,593,544 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,743,844 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
190,123 UART:
190,411 UART: Running Caliptra ROM ...
191,521 UART:
13,792,699 UART: [state] CFI Enabled
13,806,562 UART: [state] LifecycleState = Unprovisioned
13,808,938 UART: [state] DebugLocked = No
13,811,281 UART: [state] WD Timer not started. Device not locked for debugging
13,816,015 UART: [kat] SHA2-256
14,005,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,016,693 UART: [kat] ++
14,017,172 UART: [kat] sha1
14,027,722 UART: [kat] SHA2-256
14,030,704 UART: [kat] SHA2-384
14,036,864 UART: [kat] SHA2-512-ACC
14,039,442 UART: [kat] ECC-384
16,482,926 UART: [kat] HMAC-384Kdf
16,495,061 UART: [kat] LMS
17,026,885 UART: [kat] --
17,032,524 UART: [cold-reset] ++
17,033,817 UART: [fht] FHT @ 0x50003400
17,045,568 UART: [idev] ++
17,046,253 UART: [idev] CDI.KEYID = 6
17,047,275 UART: [idev] SUBJECT.KEYID = 7
17,048,382 UART: [idev] UDS.KEYID = 0
17,049,931 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,199,959 UART: [idev] Erasing UDS.KEYID = 0
19,528,628 UART: [idev] Sha1 KeyId Algorithm
19,550,461 UART: [idev] --
19,555,480 UART: [ldev] ++
19,556,168 UART: [ldev] CDI.KEYID = 6
19,557,081 UART: [ldev] SUBJECT.KEYID = 5
19,558,247 UART: [ldev] AUTHORITY.KEYID = 7
19,559,479 UART: [ldev] FE.KEYID = 1
19,571,319 UART: [ldev] Erasing FE.KEYID = 1
22,048,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,767,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,783,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,798,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,813,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,834,192 UART: [ldev] --
23,839,209 UART: [fwproc] Wait for Commands...
23,840,792 UART: [fwproc] Recv command 0x46574c44
23,843,066 UART: [fwproc] Recv'd Img size: 119428 bytes
27,352,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,437,853 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,561,491 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,126,224 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,758,966 ready_for_fw is high
3,759,667 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,057,059 >>> mbox cmd response: success
19,310,148 UART:
19,310,549 UART: Running Caliptra FMC ...
19,311,695 UART:
19,311,859 UART: [state] CFI Enabled
19,320,009 UART: [fht] FMC Alias Private Key: 7
21,086,226 UART: [art] Extend RT PCRs Done
21,087,465 UART: [art] Lock RT PCRs Done
21,088,971 UART: [art] Populate DV Done
21,094,620 UART: [fht] FMC Alias Private Key: 7
21,096,072 UART: [art] Derive CDI
21,096,823 UART: [art] Store in slot 0x4
21,139,747 UART: [art] Derive Key Pair
21,140,966 UART: [art] Store priv key in slot 0x5
23,567,438 UART: [art] Derive Key Pair - Done
23,580,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,286,198 UART: [art] Erasing AUTHORITY.KEYID = 7
25,287,728 UART: [art] PUB.X = CE0C2472F2773095A983A9855FD922BBCA31593F1A5993652FAD633CDE27FDE499A4F6B250032523A56F9E51BE1F83AF
25,294,969 UART: [art] PUB.Y = 01461B27E040CE0B51E7B5C4321EB978E4C69C4CEB428174EA391ACCB5639D890A1219A3459CCE723A55D00D4CC335E9
25,302,236 UART: [art] SIG.R = F28754E99B3CA182B3C1B39E0A1AF2E4EC38DE0308853F7513D165B91E886B9F99628415F112889090A778A2095AD45A
25,309,622 UART: [art] SIG.S = 63F83D640FD8866C94A2F22435AC0AC7977EBA4B08CCC843343E6DC6A357F006C559F110FD5D2A5195CB26FF8FB45CC7
26,288,550 UART: Caliptra RT
26,289,267 UART: [state] CFI Enabled
26,422,713 UART: [rt] RT listening for mailbox commands...
26,424,573 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,454,375 UART: [rt]cmd =0x46504c54, len=4
26,456,172 >>> mbox cmd response data (8 bytes)
26,457,178 UART: [rt] FIPS self test
26,458,131 UART: [kat] ++
26,458,584 UART: [kat] sha1
26,463,095 UART: [kat] SHA2-256
26,465,028 UART: [kat] SHA2-384
26,467,945 UART: [kat] SHA2-512-ACC
26,470,213 UART: [kat] ECC-384
26,472,176 UART: Fatal Error: 0x90040004
26,507,568 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,657,408 >>> mbox cmd response: failed
26,658,037 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,807,978 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
16,872,727 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,177,580 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,809 UART: [kat] SHA2-256
881,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,855 UART: [kat] ++
886,007 UART: [kat] sha1
890,201 UART: [kat] SHA2-256
892,139 UART: [kat] SHA2-384
894,742 UART: [kat] SHA2-512-ACC
896,643 UART: [kat] ECC-384
902,654 UART: [kat] HMAC-384Kdf
907,434 UART: [kat] LMS
1,475,630 UART: [kat] --
1,476,727 UART: [cold-reset] ++
1,477,239 UART: [fht] Storing FHT @ 0x50003400
1,480,104 UART: [idev] ++
1,480,272 UART: [idev] CDI.KEYID = 6
1,480,632 UART: [idev] SUBJECT.KEYID = 7
1,481,056 UART: [idev] UDS.KEYID = 0
1,481,401 ready_for_fw is high
1,481,401 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,034 UART: [idev] Erasing UDS.KEYID = 0
1,505,352 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,938 UART: [idev] --
1,514,785 UART: [ldev] ++
1,514,953 UART: [ldev] CDI.KEYID = 6
1,515,316 UART: [ldev] SUBJECT.KEYID = 5
1,515,742 UART: [ldev] AUTHORITY.KEYID = 7
1,516,205 UART: [ldev] FE.KEYID = 1
1,521,243 UART: [ldev] Erasing FE.KEYID = 1
1,546,816 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,780 UART: [ldev] --
1,586,191 UART: [fwproc] Waiting for Commands...
1,587,030 UART: [fwproc] Received command 0x46574c44
1,587,821 UART: [fwproc] Received Image of size 119428 bytes
2,942,660 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,992 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,210 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,811 >>> mbox cmd response: success
3,144,003 UART: [afmc] ++
3,144,171 UART: [afmc] CDI.KEYID = 6
3,144,533 UART: [afmc] SUBJECT.KEYID = 7
3,144,958 UART: [afmc] AUTHORITY.KEYID = 5
3,179,545 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,729 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,509 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,218 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,101 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,784 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,792 UART: [afmc] --
3,222,680 UART: [cold-reset] --
3,223,606 UART: [state] Locking Datavault
3,224,991 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,595 UART: [state] Locking ICCM
3,226,241 UART: [exit] Launching FMC @ 0x40000130
3,231,571 UART:
3,231,587 UART: Running Caliptra FMC ...
3,231,995 UART:
3,232,049 UART: [state] CFI Enabled
3,242,473 UART: [fht] FMC Alias Private Key: 7
3,361,215 UART: [art] Extend RT PCRs Done
3,361,643 UART: [art] Lock RT PCRs Done
3,363,111 UART: [art] Populate DV Done
3,371,534 UART: [fht] FMC Alias Private Key: 7
3,372,528 UART: [art] Derive CDI
3,372,808 UART: [art] Store in slot 0x4
3,457,990 UART: [art] Derive Key Pair
3,458,350 UART: [art] Store priv key in slot 0x5
3,471,141 UART: [art] Derive Key Pair - Done
3,486,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,501,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,443 UART: [art] PUB.X = 7D1EA8154D2CA5AAA90230FCB17A729CAE91B2AF98FD95E70D9FAF2196D5A0C3C2E681121143AC543142ABF4911CB065
3,509,221 UART: [art] PUB.Y = 2CDBBAB90BA4901D1A37A14B6AF8744E54E22CF207002A6E3D4951B05F60086A2313EB1D0EE0CCE40B60EAF3CFE7E399
3,516,152 UART: [art] SIG.R = 939D54414D4F35221ADBB8BA45A108C5EA383848BF24B039AE68165ED9683CC5B6DF21F1985EB79DBF80C241DFE2755C
3,522,929 UART: [art] SIG.S = 5CE35F328FA1AC5E25EF365905169F9EADC51AF131F23605767195743CF4C3F5AB3823CAB96767ECF1307CE933C19205
3,546,256 UART: Caliptra RT
3,546,507 UART: [state] CFI Enabled
3,667,259 UART: [rt] RT listening for mailbox commands...
3,667,922 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,527 UART: [rt]cmd =0x46504c54, len=4
3,698,521 >>> mbox cmd response data (8 bytes)
3,698,758 UART: [rt] FIPS self test
3,699,086 UART: [kat] ++
3,699,238 UART: [kat] sha1
3,703,462 UART: [kat] SHA2-256
3,705,484 UART: [kat] SHA2-384
3,708,145 UART: [kat] SHA2-512-ACC
3,710,072 UART: [kat] ECC-384
3,711,813 UART: Fatal Error: 0x90040004
3,713,352 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,357 >>> mbox cmd response: failed
3,713,357 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,362 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,077 UART: [kat] SHA2-256
882,008 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,123 UART: [kat] ++
886,275 UART: [kat] sha1
890,419 UART: [kat] SHA2-256
892,357 UART: [kat] SHA2-384
895,008 UART: [kat] SHA2-512-ACC
896,909 UART: [kat] ECC-384
902,498 UART: [kat] HMAC-384Kdf
907,300 UART: [kat] LMS
1,475,496 UART: [kat] --
1,476,427 UART: [cold-reset] ++
1,476,881 UART: [fht] Storing FHT @ 0x50003400
1,479,720 UART: [idev] ++
1,479,888 UART: [idev] CDI.KEYID = 6
1,480,248 UART: [idev] SUBJECT.KEYID = 7
1,480,672 UART: [idev] UDS.KEYID = 0
1,481,017 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,670 UART: [idev] Erasing UDS.KEYID = 0
1,505,070 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,880 UART: [idev] --
1,515,139 UART: [ldev] ++
1,515,307 UART: [ldev] CDI.KEYID = 6
1,515,670 UART: [ldev] SUBJECT.KEYID = 5
1,516,096 UART: [ldev] AUTHORITY.KEYID = 7
1,516,559 UART: [ldev] FE.KEYID = 1
1,521,931 UART: [ldev] Erasing FE.KEYID = 1
1,547,036 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,770 UART: [ldev] --
1,586,053 UART: [fwproc] Waiting for Commands...
1,586,846 UART: [fwproc] Received command 0x46574c44
1,587,637 UART: [fwproc] Received Image of size 119428 bytes
2,943,028 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,668 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,886 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,489 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,641 ready_for_fw is high
1,362,641 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,748 >>> mbox cmd response: success
3,053,947 UART:
3,053,963 UART: Running Caliptra FMC ...
3,054,371 UART:
3,054,425 UART: [state] CFI Enabled
3,065,087 UART: [fht] FMC Alias Private Key: 7
3,183,635 UART: [art] Extend RT PCRs Done
3,184,063 UART: [art] Lock RT PCRs Done
3,185,683 UART: [art] Populate DV Done
3,194,044 UART: [fht] FMC Alias Private Key: 7
3,195,182 UART: [art] Derive CDI
3,195,462 UART: [art] Store in slot 0x4
3,281,102 UART: [art] Derive Key Pair
3,281,462 UART: [art] Store priv key in slot 0x5
3,294,579 UART: [art] Derive Key Pair - Done
3,309,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,068 UART: [art] PUB.X = 55AD0981359D818657E1CE9B34FE449D519045FEC4724995D8A2102E7AFC40E0F934560E1EE0CC19C06CF201A018DF7A
3,331,833 UART: [art] PUB.Y = C3D5202616BA20F7D8C7383FCE201E6DAECD1EC5BAAC288F84525D772A546802EB63B3052ADDAD7D230EA32B5E9DF030
3,338,792 UART: [art] SIG.R = BD33674C779B0B01E86B6F7FF67AFE145403662F14C58EE031A98831397CCA90ED80D42625ACAF6E89AE0D1485795F04
3,345,551 UART: [art] SIG.S = 20F00A67DF1143C0256DBA113A863CDE4827A0647D463BCD41641A4C00D2E4F146EC8F9ACA8D67D78760971604805A2D
3,369,857 UART: Caliptra RT
3,370,108 UART: [state] CFI Enabled
3,489,550 UART: [rt] RT listening for mailbox commands...
3,490,213 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,214 UART: [rt]cmd =0x46504c54, len=4
3,521,460 >>> mbox cmd response data (8 bytes)
3,521,747 UART: [rt] FIPS self test
3,522,075 UART: [kat] ++
3,522,227 UART: [kat] sha1
3,526,337 UART: [kat] SHA2-256
3,528,359 UART: [kat] SHA2-384
3,531,264 UART: [kat] SHA2-512-ACC
3,533,191 UART: [kat] ECC-384
3,534,678 UART: Fatal Error: 0x90040004
3,536,217 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,222 >>> mbox cmd response: failed
3,536,222 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,227 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,903 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,968 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,338 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,822 UART: [kat] SHA2-256
881,753 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,868 UART: [kat] ++
886,020 UART: [kat] sha1
890,106 UART: [kat] SHA2-256
892,044 UART: [kat] SHA2-384
894,763 UART: [kat] SHA2-512-ACC
896,664 UART: [kat] ECC-384
902,215 UART: [kat] HMAC-384Kdf
906,809 UART: [kat] LMS
1,475,005 UART: [kat] --
1,475,678 UART: [cold-reset] ++
1,476,010 UART: [fht] Storing FHT @ 0x50003400
1,478,811 UART: [idev] ++
1,478,979 UART: [idev] CDI.KEYID = 6
1,479,339 UART: [idev] SUBJECT.KEYID = 7
1,479,763 UART: [idev] UDS.KEYID = 0
1,480,108 ready_for_fw is high
1,480,108 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,761 UART: [idev] Erasing UDS.KEYID = 0
1,504,611 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,323 UART: [idev] --
1,514,194 UART: [ldev] ++
1,514,362 UART: [ldev] CDI.KEYID = 6
1,514,725 UART: [ldev] SUBJECT.KEYID = 5
1,515,151 UART: [ldev] AUTHORITY.KEYID = 7
1,515,614 UART: [ldev] FE.KEYID = 1
1,521,064 UART: [ldev] Erasing FE.KEYID = 1
1,546,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,375 UART: [ldev] --
1,585,704 UART: [fwproc] Waiting for Commands...
1,586,381 UART: [fwproc] Received command 0x46574c44
1,587,172 UART: [fwproc] Received Image of size 119428 bytes
2,943,154 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,278 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,496 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,129 >>> mbox cmd response: success
3,144,267 UART: [afmc] ++
3,144,435 UART: [afmc] CDI.KEYID = 6
3,144,797 UART: [afmc] SUBJECT.KEYID = 7
3,145,222 UART: [afmc] AUTHORITY.KEYID = 5
3,180,821 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,275 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,055 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,764 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,647 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,330 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,072 UART: [afmc] --
3,224,052 UART: [cold-reset] --
3,225,010 UART: [state] Locking Datavault
3,226,105 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,709 UART: [state] Locking ICCM
3,227,185 UART: [exit] Launching FMC @ 0x40000130
3,232,515 UART:
3,232,531 UART: Running Caliptra FMC ...
3,232,939 UART:
3,233,082 UART: [state] CFI Enabled
3,243,676 UART: [fht] FMC Alias Private Key: 7
3,362,332 UART: [art] Extend RT PCRs Done
3,362,760 UART: [art] Lock RT PCRs Done
3,364,434 UART: [art] Populate DV Done
3,372,845 UART: [fht] FMC Alias Private Key: 7
3,373,967 UART: [art] Derive CDI
3,374,247 UART: [art] Store in slot 0x4
3,459,695 UART: [art] Derive Key Pair
3,460,055 UART: [art] Store priv key in slot 0x5
3,473,412 UART: [art] Derive Key Pair - Done
3,488,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,673 UART: [art] PUB.X = 0A5A64681EB8B9AFB4BDA4848BF87D445F6A3DB4183EA16674E4789D7A2980F82079CA640E1463BA7EF19FCEC1C4FD85
3,511,451 UART: [art] PUB.Y = 37B9ED6B64F53193BD8AF88239EDFC919BBE8CCD5F947D6BB350BEA57DD3E3459B1FA34AF8D8A32421F5C46F4D5E92CF
3,518,425 UART: [art] SIG.R = 9496BBF790BD4C63E540FF4675A8073515EE2195C541275C514EB1649362A3C612D9B6B5A5A24E10436B975E9A8FC32A
3,525,190 UART: [art] SIG.S = BE2207E0C32D8A76D81856589C311BDD00168106458CD46D97F442CF5B54B5594B1F21B6CDA2E97FB4F7ACEFC26E94A1
3,549,026 UART: Caliptra RT
3,549,369 UART: [state] CFI Enabled
3,669,726 UART: [rt] RT listening for mailbox commands...
3,670,389 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,018 UART: [rt]cmd =0x46504c54, len=4
3,701,200 >>> mbox cmd response data (8 bytes)
3,701,371 UART: [rt] FIPS self test
3,701,699 UART: [kat] ++
3,701,851 UART: [kat] sha1
3,705,963 UART: [kat] SHA2-256
3,707,985 UART: [kat] SHA2-384
3,710,966 UART: [kat] SHA2-512-ACC
3,712,893 UART: [kat] ECC-384
3,714,488 UART: Fatal Error: 0x90040004
3,716,027 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,032 >>> mbox cmd response: failed
3,716,032 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,037 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,388 UART: [kat] SHA2-256
882,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,434 UART: [kat] ++
886,586 UART: [kat] sha1
890,712 UART: [kat] SHA2-256
892,650 UART: [kat] SHA2-384
895,261 UART: [kat] SHA2-512-ACC
897,162 UART: [kat] ECC-384
902,977 UART: [kat] HMAC-384Kdf
907,631 UART: [kat] LMS
1,475,827 UART: [kat] --
1,476,424 UART: [cold-reset] ++
1,476,800 UART: [fht] Storing FHT @ 0x50003400
1,479,357 UART: [idev] ++
1,479,525 UART: [idev] CDI.KEYID = 6
1,479,885 UART: [idev] SUBJECT.KEYID = 7
1,480,309 UART: [idev] UDS.KEYID = 0
1,480,654 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,145 UART: [idev] Erasing UDS.KEYID = 0
1,504,415 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,975 UART: [idev] --
1,513,942 UART: [ldev] ++
1,514,110 UART: [ldev] CDI.KEYID = 6
1,514,473 UART: [ldev] SUBJECT.KEYID = 5
1,514,899 UART: [ldev] AUTHORITY.KEYID = 7
1,515,362 UART: [ldev] FE.KEYID = 1
1,520,572 UART: [ldev] Erasing FE.KEYID = 1
1,545,701 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,777 UART: [ldev] --
1,585,198 UART: [fwproc] Waiting for Commands...
1,585,965 UART: [fwproc] Received command 0x46574c44
1,586,756 UART: [fwproc] Received Image of size 119428 bytes
2,942,756 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,524 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,742 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,393 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,780 ready_for_fw is high
1,363,780 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,995,473 >>> mbox cmd response: success
3,056,618 UART:
3,056,634 UART: Running Caliptra FMC ...
3,057,042 UART:
3,057,185 UART: [state] CFI Enabled
3,067,721 UART: [fht] FMC Alias Private Key: 7
3,186,359 UART: [art] Extend RT PCRs Done
3,186,787 UART: [art] Lock RT PCRs Done
3,188,493 UART: [art] Populate DV Done
3,196,592 UART: [fht] FMC Alias Private Key: 7
3,197,730 UART: [art] Derive CDI
3,198,010 UART: [art] Store in slot 0x4
3,283,880 UART: [art] Derive Key Pair
3,284,240 UART: [art] Store priv key in slot 0x5
3,297,691 UART: [art] Derive Key Pair - Done
3,312,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,328,752 UART: [art] PUB.X = DD157AD24358DD2D8C816391DD8A37CB0810A3840A61D8786225DD7A63A46B4CECE649D9499C277F86A8F5F52A172596
3,335,518 UART: [art] PUB.Y = BB310A875B71A0120A83E32BBF563192AE1B5989FAAC31DFADB13311A4A62E6ADE138A483A28A6189F29C85FBD23CA16
3,342,476 UART: [art] SIG.R = 72124EC6419537E01C2B11A6C4698D42CC802EEDC5EA2106D74E356D525264EEC4588916F39172926C575C22009D6C8C
3,349,215 UART: [art] SIG.S = 86DBF05698F91965FFD3AA449213E1E061BCBC3C99EA5C023930F23C569C66A0BEF0494DB26F55BF1001246821956620
3,372,903 UART: Caliptra RT
3,373,246 UART: [state] CFI Enabled
3,493,432 UART: [rt] RT listening for mailbox commands...
3,494,095 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,958 UART: [rt]cmd =0x46504c54, len=4
3,524,988 >>> mbox cmd response data (8 bytes)
3,525,207 UART: [rt] FIPS self test
3,525,535 UART: [kat] ++
3,525,687 UART: [kat] sha1
3,529,787 UART: [kat] SHA2-256
3,531,809 UART: [kat] SHA2-384
3,534,668 UART: [kat] SHA2-512-ACC
3,536,595 UART: [kat] ECC-384
3,538,180 UART: Fatal Error: 0x90040004
3,539,719 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,539,724 >>> mbox cmd response: failed
3,539,724 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,539,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,162 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,781 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,238 UART: [kat] ++
895,390 UART: [kat] sha1
899,500 UART: [kat] SHA2-256
901,440 UART: [kat] SHA2-384
904,175 UART: [kat] SHA2-512-ACC
906,076 UART: [kat] ECC-384
915,915 UART: [kat] HMAC-384Kdf
920,375 UART: [kat] LMS
1,168,687 UART: [kat] --
1,169,580 UART: [cold-reset] ++
1,169,908 UART: [fht] FHT @ 0x50003400
1,172,624 UART: [idev] ++
1,172,792 UART: [idev] CDI.KEYID = 6
1,173,153 UART: [idev] SUBJECT.KEYID = 7
1,173,578 UART: [idev] UDS.KEYID = 0
1,173,924 ready_for_fw is high
1,173,924 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,449 UART: [idev] Erasing UDS.KEYID = 0
1,198,615 UART: [idev] Sha1 KeyId Algorithm
1,207,463 UART: [idev] --
1,208,694 UART: [ldev] ++
1,208,862 UART: [ldev] CDI.KEYID = 6
1,209,226 UART: [ldev] SUBJECT.KEYID = 5
1,209,653 UART: [ldev] AUTHORITY.KEYID = 7
1,210,116 UART: [ldev] FE.KEYID = 1
1,215,554 UART: [ldev] Erasing FE.KEYID = 1
1,241,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,772 UART: [ldev] --
1,281,059 UART: [fwproc] Wait for Commands...
1,281,848 UART: [fwproc] Recv command 0x46574c44
1,282,581 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,919 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,094 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,675 >>> mbox cmd response: success
2,837,871 UART: [afmc] ++
2,838,039 UART: [afmc] CDI.KEYID = 6
2,838,402 UART: [afmc] SUBJECT.KEYID = 7
2,838,828 UART: [afmc] AUTHORITY.KEYID = 5
2,873,841 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,496 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,245 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,955 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,836 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,537 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,098 UART: [afmc] --
2,917,055 UART: [cold-reset] --
2,917,919 UART: [state] Locking Datavault
2,919,382 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,986 UART: [state] Locking ICCM
2,920,656 UART: [exit] Launching FMC @ 0x40000130
2,925,986 UART:
2,926,002 UART: Running Caliptra FMC ...
2,926,410 UART:
2,926,464 UART: [state] CFI Enabled
2,937,052 UART: [fht] FMC Alias Private Key: 7
3,055,716 UART: [art] Extend RT PCRs Done
3,056,144 UART: [art] Lock RT PCRs Done
3,057,758 UART: [art] Populate DV Done
3,066,091 UART: [fht] FMC Alias Private Key: 7
3,067,059 UART: [art] Derive CDI
3,067,339 UART: [art] Store in slot 0x4
3,153,122 UART: [art] Derive Key Pair
3,153,482 UART: [art] Store priv key in slot 0x5
3,166,952 UART: [art] Derive Key Pair - Done
3,181,584 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,230 UART: [art] PUB.X = 3D4CF7936CAD82680C6F5FF4C7D486A576E8BF84C484D1862567B1BDA2D864843584D659763175A69C283C4EFA971E17
3,204,997 UART: [art] PUB.Y = 5BDAD8A226044E781952B4609DD6EB589EE90B1D6E33C141D11CB7F85E7AF8D9D4D8D1E232C20A6844F70569897149E7
3,211,939 UART: [art] SIG.R = 0FAEA6BA194DD7C3C09424C851A80ADD31587D56B04C2AB630F034B27B3AC08CB7C1D151FED878724FFF5CDDA0960F17
3,218,718 UART: [art] SIG.S = 1E2D7EDC7A79E72D5BFFE5FD818945DAF10982D73C84E39D93787D5DB0925382D590191CE14FCDB02FC9EDF81DF42257
3,242,581 UART: Caliptra RT
3,242,832 UART: [state] CFI Enabled
3,362,202 UART: [rt] RT listening for mailbox commands...
3,362,865 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,652 UART: [rt]cmd =0x46504c54, len=4
3,393,740 >>> mbox cmd response data (8 bytes)
3,393,987 UART: [rt] FIPS self test
3,394,315 UART: [kat] ++
3,394,467 UART: [kat] sha1
3,398,473 UART: [kat] SHA2-256
3,400,495 UART: [kat] SHA2-384
3,403,394 UART: [kat] SHA2-512-ACC
3,405,321 UART: [kat] ECC-384
3,406,930 UART: Fatal Error: 0x90040004
3,408,469 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,474 >>> mbox cmd response: failed
3,408,474 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,479 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,602 UART: [state] LifecycleState = Unprovisioned
86,257 UART: [state] DebugLocked = No
86,965 UART: [state] WD Timer not started. Device not locked for debugging
88,242 UART: [kat] SHA2-256
891,792 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,896 UART: [kat] ++
896,048 UART: [kat] sha1
900,320 UART: [kat] SHA2-256
902,260 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,397 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,169,910 UART: [cold-reset] ++
1,170,292 UART: [fht] FHT @ 0x50003400
1,172,870 UART: [idev] ++
1,173,038 UART: [idev] CDI.KEYID = 6
1,173,399 UART: [idev] SUBJECT.KEYID = 7
1,173,824 UART: [idev] UDS.KEYID = 0
1,174,170 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,955 UART: [idev] Erasing UDS.KEYID = 0
1,199,029 UART: [idev] Sha1 KeyId Algorithm
1,207,885 UART: [idev] --
1,208,802 UART: [ldev] ++
1,208,970 UART: [ldev] CDI.KEYID = 6
1,209,334 UART: [ldev] SUBJECT.KEYID = 5
1,209,761 UART: [ldev] AUTHORITY.KEYID = 7
1,210,224 UART: [ldev] FE.KEYID = 1
1,215,502 UART: [ldev] Erasing FE.KEYID = 1
1,242,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,084 UART: [ldev] --
1,281,285 UART: [fwproc] Wait for Commands...
1,282,008 UART: [fwproc] Recv command 0x46574c44
1,282,741 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,539 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,714 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,281 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,240 ready_for_fw is high
1,058,240 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,334 >>> mbox cmd response: success
2,751,059 UART:
2,751,075 UART: Running Caliptra FMC ...
2,751,483 UART:
2,751,537 UART: [state] CFI Enabled
2,762,189 UART: [fht] FMC Alias Private Key: 7
2,880,373 UART: [art] Extend RT PCRs Done
2,880,801 UART: [art] Lock RT PCRs Done
2,882,325 UART: [art] Populate DV Done
2,890,554 UART: [fht] FMC Alias Private Key: 7
2,891,586 UART: [art] Derive CDI
2,891,866 UART: [art] Store in slot 0x4
2,977,411 UART: [art] Derive Key Pair
2,977,771 UART: [art] Store priv key in slot 0x5
2,991,103 UART: [art] Derive Key Pair - Done
3,005,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,314 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,079 UART: [art] PUB.X = 98A838A686A605D7F54EA6C7C3F408F276EF12BAE535F0DF1EDC5317F024FF1AF6442783BA0E7169A1615FA1A26024A8
3,028,848 UART: [art] PUB.Y = E20E80B76C9FFC2269152FE627BDF5326B7E172552D4295CF0C0A4E4E4AF89C79FB912FF278B14D1E94DFA9CBD420ECB
3,035,810 UART: [art] SIG.R = FAFB9DB1C5B35571F2796B19C6BDDD09BEA3DE344B299FB2E3D577A3773AC175A67520D2A29ADA806AA8858508470006
3,042,559 UART: [art] SIG.S = 1A823B9EC2F342BD5F23BFFA0D8CE72F34E865AE49E10320187D6982E3B35A7717A1E1D995C4D39CE30161A9407270ED
3,066,390 UART: Caliptra RT
3,066,641 UART: [state] CFI Enabled
3,186,436 UART: [rt] RT listening for mailbox commands...
3,187,099 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,216,850 UART: [rt]cmd =0x46504c54, len=4
3,218,034 >>> mbox cmd response data (8 bytes)
3,218,179 UART: [rt] FIPS self test
3,218,507 UART: [kat] ++
3,218,659 UART: [kat] sha1
3,223,033 UART: [kat] SHA2-256
3,225,055 UART: [kat] SHA2-384
3,228,012 UART: [kat] SHA2-512-ACC
3,229,939 UART: [kat] ECC-384
3,231,548 UART: Fatal Error: 0x90040004
3,233,087 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,092 >>> mbox cmd response: failed
3,233,092 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,482 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,124 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
899,989 UART: [kat] SHA2-256
901,929 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,874 UART: [kat] LMS
1,169,186 UART: [kat] --
1,170,177 UART: [cold-reset] ++
1,170,579 UART: [fht] FHT @ 0x50003400
1,173,363 UART: [idev] ++
1,173,531 UART: [idev] CDI.KEYID = 6
1,173,892 UART: [idev] SUBJECT.KEYID = 7
1,174,317 UART: [idev] UDS.KEYID = 0
1,174,663 ready_for_fw is high
1,174,663 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,570 UART: [idev] Erasing UDS.KEYID = 0
1,200,010 UART: [idev] Sha1 KeyId Algorithm
1,209,062 UART: [idev] --
1,210,071 UART: [ldev] ++
1,210,239 UART: [ldev] CDI.KEYID = 6
1,210,603 UART: [ldev] SUBJECT.KEYID = 5
1,211,030 UART: [ldev] AUTHORITY.KEYID = 7
1,211,493 UART: [ldev] FE.KEYID = 1
1,216,947 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,677 UART: [ldev] --
1,282,018 UART: [fwproc] Wait for Commands...
1,282,671 UART: [fwproc] Recv command 0x46574c44
1,283,404 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,252 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,427 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,028 >>> mbox cmd response: success
2,838,204 UART: [afmc] ++
2,838,372 UART: [afmc] CDI.KEYID = 6
2,838,735 UART: [afmc] SUBJECT.KEYID = 7
2,839,161 UART: [afmc] AUTHORITY.KEYID = 5
2,874,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,836 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,546 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,427 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,128 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,869 UART: [afmc] --
2,917,876 UART: [cold-reset] --
2,918,622 UART: [state] Locking Datavault
2,919,645 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,249 UART: [state] Locking ICCM
2,920,759 UART: [exit] Launching FMC @ 0x40000130
2,926,089 UART:
2,926,105 UART: Running Caliptra FMC ...
2,926,513 UART:
2,926,656 UART: [state] CFI Enabled
2,937,334 UART: [fht] FMC Alias Private Key: 7
3,055,894 UART: [art] Extend RT PCRs Done
3,056,322 UART: [art] Lock RT PCRs Done
3,057,906 UART: [art] Populate DV Done
3,066,319 UART: [fht] FMC Alias Private Key: 7
3,067,345 UART: [art] Derive CDI
3,067,625 UART: [art] Store in slot 0x4
3,153,732 UART: [art] Derive Key Pair
3,154,092 UART: [art] Store priv key in slot 0x5
3,167,314 UART: [art] Derive Key Pair - Done
3,181,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,167 UART: [art] PUB.X = CBFC6BD29BB6047A34D340CC1BE14825531E3460AE418CA3CB7ACBA4C9AB961459EC9862936DB3905F36E8D17F94C32D
3,204,948 UART: [art] PUB.Y = E5A1449B1CC339D2AC9A915E88E809BDBA10E9E0F9B64CE1F1B138A18268CE1E588C798B87DF04677A020B6B13217FAC
3,211,898 UART: [art] SIG.R = 206E92E32F31BC2BFF56F107D21F0CBA5966F775C3592130DA150DD6D0F5B72344C46E3D381AA39A2DFAE800DAA6E1C6
3,218,651 UART: [art] SIG.S = CD168D486357244B8B6ABB36D8342E9BE9E0E4FC0DF6F18219C773AAD62B8B80F8F66768687C1EEE5A3BA77FFDD41AD5
3,242,312 UART: Caliptra RT
3,242,655 UART: [state] CFI Enabled
3,363,638 UART: [rt] RT listening for mailbox commands...
3,364,301 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,128 UART: [rt]cmd =0x46504c54, len=4
3,395,146 >>> mbox cmd response data (8 bytes)
3,395,459 UART: [rt] FIPS self test
3,395,787 UART: [kat] ++
3,395,939 UART: [kat] sha1
3,400,245 UART: [kat] SHA2-256
3,402,267 UART: [kat] SHA2-384
3,405,072 UART: [kat] SHA2-512-ACC
3,406,999 UART: [kat] ECC-384
3,408,736 UART: Fatal Error: 0x90040004
3,410,275 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,280 >>> mbox cmd response: failed
3,410,280 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,285 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
87,142 UART: [state] WD Timer not started. Device not locked for debugging
88,423 UART: [kat] SHA2-256
891,973 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,077 UART: [kat] ++
896,229 UART: [kat] sha1
900,689 UART: [kat] SHA2-256
902,629 UART: [kat] SHA2-384
905,472 UART: [kat] SHA2-512-ACC
907,373 UART: [kat] ECC-384
917,110 UART: [kat] HMAC-384Kdf
921,776 UART: [kat] LMS
1,170,088 UART: [kat] --
1,171,005 UART: [cold-reset] ++
1,171,549 UART: [fht] FHT @ 0x50003400
1,174,157 UART: [idev] ++
1,174,325 UART: [idev] CDI.KEYID = 6
1,174,686 UART: [idev] SUBJECT.KEYID = 7
1,175,111 UART: [idev] UDS.KEYID = 0
1,175,457 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,912 UART: [idev] Erasing UDS.KEYID = 0
1,199,834 UART: [idev] Sha1 KeyId Algorithm
1,208,644 UART: [idev] --
1,209,837 UART: [ldev] ++
1,210,005 UART: [ldev] CDI.KEYID = 6
1,210,369 UART: [ldev] SUBJECT.KEYID = 5
1,210,796 UART: [ldev] AUTHORITY.KEYID = 7
1,211,259 UART: [ldev] FE.KEYID = 1
1,216,343 UART: [ldev] Erasing FE.KEYID = 1
1,242,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,605 UART: [ldev] --
1,282,024 UART: [fwproc] Wait for Commands...
1,282,841 UART: [fwproc] Recv command 0x46574c44
1,283,574 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,066 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,241 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,848 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,227 ready_for_fw is high
1,059,227 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,733 >>> mbox cmd response: success
2,751,624 UART:
2,751,640 UART: Running Caliptra FMC ...
2,752,048 UART:
2,752,191 UART: [state] CFI Enabled
2,762,831 UART: [fht] FMC Alias Private Key: 7
2,882,283 UART: [art] Extend RT PCRs Done
2,882,711 UART: [art] Lock RT PCRs Done
2,884,155 UART: [art] Populate DV Done
2,892,446 UART: [fht] FMC Alias Private Key: 7
2,893,426 UART: [art] Derive CDI
2,893,706 UART: [art] Store in slot 0x4
2,979,863 UART: [art] Derive Key Pair
2,980,223 UART: [art] Store priv key in slot 0x5
2,993,637 UART: [art] Derive Key Pair - Done
3,008,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,808 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,573 UART: [art] PUB.X = 7822EBA493228B38DB3239EAB18A96817BB2DB1E1383A204A104DABBC4DF153EA5E50F13470BAF83D499AB86C2AFA4DC
3,031,349 UART: [art] PUB.Y = A98099BDA0124409BE4FC2F8528A751988EEC75F3477C14AB3DE8E70BD9B72597BCCAA1CC6A27B4E111A3CBB93FEF288
3,038,314 UART: [art] SIG.R = D5912684C23AE42BCC05284EE59B3680B881EC7E7F9A46EFB60BA83F943E31135233CDA8CA66F16D5B2ED629EC79E049
3,045,088 UART: [art] SIG.S = 84F013428AF69947BB9AD88D1EE66ED63A336E09FA45400AE7819E7228B783A73DFC359A20D812243A76AB759BA49DB3
3,068,450 UART: Caliptra RT
3,068,793 UART: [state] CFI Enabled
3,189,427 UART: [rt] RT listening for mailbox commands...
3,190,090 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,849 UART: [rt]cmd =0x46504c54, len=4
3,221,071 >>> mbox cmd response data (8 bytes)
3,221,196 UART: [rt] FIPS self test
3,221,524 UART: [kat] ++
3,221,676 UART: [kat] sha1
3,225,998 UART: [kat] SHA2-256
3,228,020 UART: [kat] SHA2-384
3,230,939 UART: [kat] SHA2-512-ACC
3,232,866 UART: [kat] ECC-384
3,234,511 UART: Fatal Error: 0x90040004
3,236,050 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,236,055 >>> mbox cmd response: failed
3,236,055 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,236,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,973 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,767 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
893,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,309 UART: [kat] ++
897,461 UART: [kat] sha1
901,711 UART: [kat] SHA2-256
903,651 UART: [kat] SHA2-384
906,480 UART: [kat] SHA2-512-ACC
908,381 UART: [kat] ECC-384
918,156 UART: [kat] HMAC-384Kdf
922,584 UART: [kat] LMS
1,170,912 UART: [kat] --
1,171,689 UART: [cold-reset] ++
1,172,255 UART: [fht] FHT @ 0x50003400
1,175,022 UART: [idev] ++
1,175,190 UART: [idev] CDI.KEYID = 6
1,175,550 UART: [idev] SUBJECT.KEYID = 7
1,175,974 UART: [idev] UDS.KEYID = 0
1,176,319 ready_for_fw is high
1,176,319 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,138 UART: [idev] Erasing UDS.KEYID = 0
1,200,969 UART: [idev] Sha1 KeyId Algorithm
1,209,493 UART: [idev] --
1,210,695 UART: [ldev] ++
1,210,863 UART: [ldev] CDI.KEYID = 6
1,211,226 UART: [ldev] SUBJECT.KEYID = 5
1,211,652 UART: [ldev] AUTHORITY.KEYID = 7
1,212,115 UART: [ldev] FE.KEYID = 1
1,217,065 UART: [ldev] Erasing FE.KEYID = 1
1,243,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,767 UART: [ldev] --
1,282,280 UART: [fwproc] Wait for Commands...
1,282,952 UART: [fwproc] Recv command 0x46574c44
1,283,680 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,116 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,286 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,787 >>> mbox cmd response: success
2,838,815 UART: [afmc] ++
2,838,983 UART: [afmc] CDI.KEYID = 6
2,839,345 UART: [afmc] SUBJECT.KEYID = 7
2,839,770 UART: [afmc] AUTHORITY.KEYID = 5
2,875,529 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,456 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,165 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,048 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,749 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,761 UART: [afmc] --
2,918,677 UART: [cold-reset] --
2,919,719 UART: [state] Locking Datavault
2,921,044 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,648 UART: [state] Locking ICCM
2,922,184 UART: [exit] Launching FMC @ 0x40000130
2,927,514 UART:
2,927,530 UART: Running Caliptra FMC ...
2,927,938 UART:
2,927,992 UART: [state] CFI Enabled
2,938,546 UART: [fht] FMC Alias Private Key: 7
3,058,258 UART: [art] Extend RT PCRs Done
3,058,686 UART: [art] Lock RT PCRs Done
3,060,148 UART: [art] Populate DV Done
3,068,377 UART: [fht] FMC Alias Private Key: 7
3,069,405 UART: [art] Derive CDI
3,069,685 UART: [art] Store in slot 0x4
3,155,370 UART: [art] Derive Key Pair
3,155,730 UART: [art] Store priv key in slot 0x5
3,168,924 UART: [art] Derive Key Pair - Done
3,183,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,240 UART: [art] PUB.X = 937416716B6B744EE9F132CBFE52F7565AB68EB0BCAE6449A28F78F801E3DC39AC7132FDE82856BB49EAE4B13D1BBAD2
3,207,025 UART: [art] PUB.Y = 5A77E2CE767A7BC2AC0B2604131C0410D609F2856D0D7FEB69F13C8EA793BD995DA40CC4481C42D106E305C15F824100
3,213,933 UART: [art] SIG.R = 2A243CDC7E323507FD4DFDECC7E69346B1EE702146BE0DD0EACC124BA74A8A3FF80D5D8A727000C05016869ACA698A36
3,220,688 UART: [art] SIG.S = 091229005884FF992577934E7E0B22A5744089A0DD3D50CE791786C430C851B0ACC99E61BE61B267476F9172BA9E1711
3,244,794 UART: Caliptra RT
3,245,045 UART: [state] CFI Enabled
3,364,837 UART: [rt] RT listening for mailbox commands...
3,365,500 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,443 UART: [rt]cmd =0x46504c54, len=4
3,396,701 >>> mbox cmd response data (8 bytes)
3,396,864 UART: [rt] FIPS self test
3,397,192 UART: [kat] ++
3,397,344 UART: [kat] sha1
3,401,376 UART: [kat] SHA2-256
3,403,398 UART: [kat] SHA2-384
3,406,395 UART: [kat] SHA2-512-ACC
3,408,322 UART: [kat] ECC-384
3,409,863 UART: Fatal Error: 0x90040004
3,411,402 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,411,407 >>> mbox cmd response: failed
3,411,407 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,411,412 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,615 UART: [kat] SHA2-256
903,555 UART: [kat] SHA2-384
906,344 UART: [kat] SHA2-512-ACC
908,245 UART: [kat] ECC-384
918,060 UART: [kat] HMAC-384Kdf
922,840 UART: [kat] LMS
1,171,168 UART: [kat] --
1,172,021 UART: [cold-reset] ++
1,172,577 UART: [fht] FHT @ 0x50003400
1,175,092 UART: [idev] ++
1,175,260 UART: [idev] CDI.KEYID = 6
1,175,620 UART: [idev] SUBJECT.KEYID = 7
1,176,044 UART: [idev] UDS.KEYID = 0
1,176,389 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,112 UART: [idev] Erasing UDS.KEYID = 0
1,200,789 UART: [idev] Sha1 KeyId Algorithm
1,209,341 UART: [idev] --
1,210,263 UART: [ldev] ++
1,210,431 UART: [ldev] CDI.KEYID = 6
1,210,794 UART: [ldev] SUBJECT.KEYID = 5
1,211,220 UART: [ldev] AUTHORITY.KEYID = 7
1,211,683 UART: [ldev] FE.KEYID = 1
1,216,669 UART: [ldev] Erasing FE.KEYID = 1
1,243,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,127 UART: [ldev] --
1,282,496 UART: [fwproc] Wait for Commands...
1,283,118 UART: [fwproc] Recv command 0x46574c44
1,283,846 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,540 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,710 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,399 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,775 ready_for_fw is high
1,059,775 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,330 >>> mbox cmd response: success
2,750,819 UART:
2,750,835 UART: Running Caliptra FMC ...
2,751,243 UART:
2,751,297 UART: [state] CFI Enabled
2,761,627 UART: [fht] FMC Alias Private Key: 7
2,880,461 UART: [art] Extend RT PCRs Done
2,880,889 UART: [art] Lock RT PCRs Done
2,882,555 UART: [art] Populate DV Done
2,890,992 UART: [fht] FMC Alias Private Key: 7
2,892,130 UART: [art] Derive CDI
2,892,410 UART: [art] Store in slot 0x4
2,978,129 UART: [art] Derive Key Pair
2,978,489 UART: [art] Store priv key in slot 0x5
2,991,643 UART: [art] Derive Key Pair - Done
3,006,359 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,109 UART: [art] PUB.X = 13F5FE306D5707BE69E3A35702B39484981E5FF1D7ABBE56090A42E93955C0196430B6A1AD7216803F30A3BEA311C1B0
3,028,867 UART: [art] PUB.Y = 24F05BD6C4211D3CE382467D4C6FA43275F8AD4E3AFE5F8B7F4F0DE741552EF0054A96F0830A64441AB6FB9FCA489B79
3,035,820 UART: [art] SIG.R = 898631AD48965E87A3A84F73BE3C20746CCAD1911AE7458F71E1825731AE1835FEAE45913FEC5DDFFB736DAE1069627A
3,042,598 UART: [art] SIG.S = E84D9C194E22C497D97E206FF0CFE8E308A13C0462D5F72EBB36ADF049935D05EBCDFFA77F01A53A9AD4D71DB2EBA721
3,066,340 UART: Caliptra RT
3,066,591 UART: [state] CFI Enabled
3,186,053 UART: [rt] RT listening for mailbox commands...
3,186,716 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,216,353 UART: [rt]cmd =0x46504c54, len=4
3,217,473 >>> mbox cmd response data (8 bytes)
3,217,826 UART: [rt] FIPS self test
3,218,154 UART: [kat] ++
3,218,306 UART: [kat] sha1
3,222,488 UART: [kat] SHA2-256
3,224,510 UART: [kat] SHA2-384
3,227,305 UART: [kat] SHA2-512-ACC
3,229,232 UART: [kat] ECC-384
3,230,735 UART: Fatal Error: 0x90040004
3,232,274 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,279 >>> mbox cmd response: failed
3,232,279 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,367 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,282 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,160 UART: [state] WD Timer not started. Device not locked for debugging
88,479 UART: [kat] SHA2-256
894,129 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,254 UART: [kat] ++
898,406 UART: [kat] sha1
902,676 UART: [kat] SHA2-256
904,616 UART: [kat] SHA2-384
907,261 UART: [kat] SHA2-512-ACC
909,162 UART: [kat] ECC-384
918,611 UART: [kat] HMAC-384Kdf
923,255 UART: [kat] LMS
1,171,583 UART: [kat] --
1,172,348 UART: [cold-reset] ++
1,172,744 UART: [fht] FHT @ 0x50003400
1,175,439 UART: [idev] ++
1,175,607 UART: [idev] CDI.KEYID = 6
1,175,967 UART: [idev] SUBJECT.KEYID = 7
1,176,391 UART: [idev] UDS.KEYID = 0
1,176,736 ready_for_fw is high
1,176,736 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,177 UART: [idev] Erasing UDS.KEYID = 0
1,201,386 UART: [idev] Sha1 KeyId Algorithm
1,209,758 UART: [idev] --
1,210,792 UART: [ldev] ++
1,210,960 UART: [ldev] CDI.KEYID = 6
1,211,323 UART: [ldev] SUBJECT.KEYID = 5
1,211,749 UART: [ldev] AUTHORITY.KEYID = 7
1,212,212 UART: [ldev] FE.KEYID = 1
1,217,626 UART: [ldev] Erasing FE.KEYID = 1
1,243,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,020 UART: [ldev] --
1,283,405 UART: [fwproc] Wait for Commands...
1,284,165 UART: [fwproc] Recv command 0x46574c44
1,284,893 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,191 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,361 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,060 >>> mbox cmd response: success
2,841,264 UART: [afmc] ++
2,841,432 UART: [afmc] CDI.KEYID = 6
2,841,794 UART: [afmc] SUBJECT.KEYID = 7
2,842,219 UART: [afmc] AUTHORITY.KEYID = 5
2,877,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,799 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,508 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,391 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,092 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,764 UART: [afmc] --
2,920,642 UART: [cold-reset] --
2,921,338 UART: [state] Locking Datavault
2,922,789 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,393 UART: [state] Locking ICCM
2,923,935 UART: [exit] Launching FMC @ 0x40000130
2,929,265 UART:
2,929,281 UART: Running Caliptra FMC ...
2,929,689 UART:
2,929,832 UART: [state] CFI Enabled
2,940,688 UART: [fht] FMC Alias Private Key: 7
3,060,010 UART: [art] Extend RT PCRs Done
3,060,438 UART: [art] Lock RT PCRs Done
3,061,684 UART: [art] Populate DV Done
3,069,893 UART: [fht] FMC Alias Private Key: 7
3,071,039 UART: [art] Derive CDI
3,071,319 UART: [art] Store in slot 0x4
3,156,982 UART: [art] Derive Key Pair
3,157,342 UART: [art] Store priv key in slot 0x5
3,170,726 UART: [art] Derive Key Pair - Done
3,185,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,508 UART: [art] PUB.X = AC46A00D0A6F397772CDAC4CA46776718E8CE9F38BB04CDBC86FA1AC561A6C2F2D8AB1C47B5F27AE2E68DA99096EC315
3,208,291 UART: [art] PUB.Y = 31D6896F0633D8F43EDD33B12D30AAA9BEDB8A005DE4C0B805FB1ACC788EC4E06006A5924E5C957B98441C7DE0032553
3,215,217 UART: [art] SIG.R = 4A0C6F34EBDBDCFCD07429F68A103EA2C431399995C16FA0831A086DE420C34F2DE571AACC82DD2B336536679243880F
3,221,986 UART: [art] SIG.S = 68B0E0D6F13C0EA076CAF9B8635891D1BFB210270CEAEE5B545CA1DC644448F4655461A0DC6DA159ECE002760342E809
3,246,219 UART: Caliptra RT
3,246,562 UART: [state] CFI Enabled
3,366,618 UART: [rt] RT listening for mailbox commands...
3,367,281 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,018 UART: [rt]cmd =0x46504c54, len=4
3,398,282 >>> mbox cmd response data (8 bytes)
3,398,503 UART: [rt] FIPS self test
3,398,831 UART: [kat] ++
3,398,983 UART: [kat] sha1
3,403,345 UART: [kat] SHA2-256
3,405,367 UART: [kat] SHA2-384
3,408,224 UART: [kat] SHA2-512-ACC
3,410,151 UART: [kat] ECC-384
3,411,540 UART: Fatal Error: 0x90040004
3,413,079 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,413,084 >>> mbox cmd response: failed
3,413,084 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,413,089 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
893,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,650 UART: [kat] ++
897,802 UART: [kat] sha1
902,022 UART: [kat] SHA2-256
903,962 UART: [kat] SHA2-384
906,777 UART: [kat] SHA2-512-ACC
908,678 UART: [kat] ECC-384
918,281 UART: [kat] HMAC-384Kdf
922,973 UART: [kat] LMS
1,171,301 UART: [kat] --
1,172,100 UART: [cold-reset] ++
1,172,502 UART: [fht] FHT @ 0x50003400
1,175,049 UART: [idev] ++
1,175,217 UART: [idev] CDI.KEYID = 6
1,175,577 UART: [idev] SUBJECT.KEYID = 7
1,176,001 UART: [idev] UDS.KEYID = 0
1,176,346 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,181 UART: [idev] Erasing UDS.KEYID = 0
1,201,278 UART: [idev] Sha1 KeyId Algorithm
1,209,764 UART: [idev] --
1,210,596 UART: [ldev] ++
1,210,764 UART: [ldev] CDI.KEYID = 6
1,211,127 UART: [ldev] SUBJECT.KEYID = 5
1,211,553 UART: [ldev] AUTHORITY.KEYID = 7
1,212,016 UART: [ldev] FE.KEYID = 1
1,217,404 UART: [ldev] Erasing FE.KEYID = 1
1,244,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,408 UART: [ldev] --
1,283,791 UART: [fwproc] Wait for Commands...
1,284,537 UART: [fwproc] Recv command 0x46574c44
1,285,265 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,479 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,649 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,370 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,508 ready_for_fw is high
1,061,508 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,915 >>> mbox cmd response: success
2,755,454 UART:
2,755,470 UART: Running Caliptra FMC ...
2,755,878 UART:
2,756,021 UART: [state] CFI Enabled
2,766,621 UART: [fht] FMC Alias Private Key: 7
2,885,655 UART: [art] Extend RT PCRs Done
2,886,083 UART: [art] Lock RT PCRs Done
2,887,639 UART: [art] Populate DV Done
2,895,624 UART: [fht] FMC Alias Private Key: 7
2,896,750 UART: [art] Derive CDI
2,897,030 UART: [art] Store in slot 0x4
2,982,827 UART: [art] Derive Key Pair
2,983,187 UART: [art] Store priv key in slot 0x5
2,996,537 UART: [art] Derive Key Pair - Done
3,011,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,292 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,057 UART: [art] PUB.X = 51AE0D9D6CDCC12EEA52911249D554178EC08C1D462C444990E8C97AD3DBF3E65ACD6F7785BEE3D19BFACBCA829BAA60
3,034,848 UART: [art] PUB.Y = 1FEE566F7E3204DC03BFBF37CE233552E1BBF9FB85BC536BFD2152D578750765E07F587B5CF4AEDD9B404F47B114E137
3,041,803 UART: [art] SIG.R = 4F6B150FA4B84948B828EC361FDD9FBE5664B635D1AE37FF6639657A98D0436B716AA7CA6E4FB1ADFC06A45AD9CE5688
3,048,583 UART: [art] SIG.S = 9D689A9305BCCE4EFB9CA1ED053EF3FB515FC0871618DF2996FB69AC6C22D8777BBB1647779EA2E39697D9A3EE417839
3,072,645 UART: Caliptra RT
3,072,988 UART: [state] CFI Enabled
3,193,239 UART: [rt] RT listening for mailbox commands...
3,193,902 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,809 UART: [rt]cmd =0x46504c54, len=4
3,224,933 >>> mbox cmd response data (8 bytes)
3,225,048 UART: [rt] FIPS self test
3,225,376 UART: [kat] ++
3,225,528 UART: [kat] sha1
3,229,564 UART: [kat] SHA2-256
3,231,586 UART: [kat] SHA2-384
3,234,293 UART: [kat] SHA2-512-ACC
3,236,220 UART: [kat] ECC-384
3,237,589 UART: Fatal Error: 0x90040004
3,239,128 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,239,133 >>> mbox cmd response: failed
3,239,133 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,239,138 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,614 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,407 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
5,177,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,327,614 >>> mbox cmd response: failed
5,328,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,477,869 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,425,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,247,596 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
5,145,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,295,752 >>> mbox cmd response: failed
5,296,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,445,191 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,438,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,290,764 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
5,486,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,636,419 >>> mbox cmd response: failed
5,636,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,785,834 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
17,861,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,577,782 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
5,486,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,635,822 >>> mbox cmd response: failed
5,636,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,785,248 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
17,860,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,582,935 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
5,150,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,300,444 >>> mbox cmd response: failed
5,301,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,449,918 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,436,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,271,367 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
5,153,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,303,330 >>> mbox cmd response: failed
5,303,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,452,777 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,435,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,261,517 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
15,365 writing to cptra_bootfsm_go
5,508,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,658,673 >>> mbox cmd response: failed
5,659,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,808,094 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
17,835,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,555,478 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,516 writing to cptra_bootfsm_go
5,503,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,654,081 >>> mbox cmd response: failed
5,654,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,803,399 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
17,840,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,556,412 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,088 >>> mbox cmd response: failed
825,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,094 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,298 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,938 >>> mbox cmd response: failed
825,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,944 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,744 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,895 >>> mbox cmd response: failed
825,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,901 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,875 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,379 >>> mbox cmd response: failed
825,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,267 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
824,974 >>> mbox cmd response: failed
824,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
824,980 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,864 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
824,952 >>> mbox cmd response: failed
824,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
824,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,384 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,837 >>> mbox cmd response: failed
825,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,843 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,369 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,539 >>> mbox cmd response: failed
825,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,211 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,179 UART:
192,537 UART: Running Caliptra ROM ...
193,731 UART:
193,887 UART: [state] CFI Enabled
259,165 UART: [state] LifecycleState = Unprovisioned
261,075 UART: [state] DebugLocked = No
263,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,011 UART: [kat] SHA2-256
437,701 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,227 UART: [kat] ++
448,767 UART: [kat] sha1
459,722 UART: [kat] SHA2-256
462,371 UART: [kat] SHA2-384
468,143 UART: [kat] SHA2-512-ACC
470,558 UART: [kat] ECC-384
2,765,144 UART: [kat] HMAC-384Kdf
2,798,989 UART: [kat] LMS
3,989,301 UART: [kat] --
3,994,225 UART: [cold-reset] ++
3,995,315 UART: [fht] Storing FHT @ 0x50003400
4,005,806 UART: [idev] ++
4,006,379 UART: [idev] CDI.KEYID = 6
4,007,442 UART: [idev] SUBJECT.KEYID = 7
4,008,631 UART: [idev] UDS.KEYID = 0
4,009,673 ready_for_fw is high
4,009,894 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,160,063 UART: [idev] Erasing UDS.KEYID = 0
7,343,644 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,925 UART: [idev] --
7,368,170 UART: [ldev] ++
7,368,748 UART: [ldev] CDI.KEYID = 6
7,369,771 UART: [ldev] SUBJECT.KEYID = 5
7,370,935 UART: [ldev] AUTHORITY.KEYID = 7
7,372,162 UART: [ldev] FE.KEYID = 1
7,400,101 UART: [ldev] Erasing FE.KEYID = 1
10,734,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,630 UART: [ldev] --
13,113,720 UART: [fwproc] Waiting for Commands...
13,115,935 UART: [fwproc] Received command 0x46574c44
13,118,133 UART: [fwproc] Received Image of size 119428 bytes
17,233,385 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,309,693 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,382,893 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,714,335 >>> mbox cmd response: success
17,718,880 UART: [afmc] ++
17,719,472 UART: [afmc] CDI.KEYID = 6
17,720,415 UART: [afmc] SUBJECT.KEYID = 7
17,721,766 UART: [afmc] AUTHORITY.KEYID = 5
21,091,262 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,038 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,468 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,191 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,609 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,207 UART: [afmc] --
23,464,027 UART: [cold-reset] --
23,466,597 UART: [state] Locking Datavault
23,473,145 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,846 UART: [state] Locking ICCM
23,476,619 UART: [exit] Launching FMC @ 0x40000130
23,485,019 UART:
23,485,261 UART: Running Caliptra FMC ...
23,486,366 UART:
23,486,531 UART: [state] CFI Enabled
23,552,634 UART: [fht] FMC Alias Private Key: 7
25,893,583 UART: [art] Extend RT PCRs Done
25,894,860 UART: [art] Lock RT PCRs Done
25,896,387 UART: [art] Populate DV Done
25,901,924 UART: [fht] FMC Alias Private Key: 7
25,903,627 UART: [art] Derive CDI
25,904,409 UART: [art] Store in slot 0x4
25,961,566 UART: [art] Derive Key Pair
25,962,573 UART: [art] Store priv key in slot 0x5
29,255,803 UART: [art] Derive Key Pair - Done
29,268,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,008 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,545 UART: [art] PUB.X = 4F3D5607412E3E6A491E48C11151789D52FEFFACE1C66FF2667C912AC709BBBF49D4089B99DB1F05D8821481375BBF14
31,566,803 UART: [art] PUB.Y = AA664842E5E519E544089E19A6F870B737880BE6C3BB2F397289C20D64DB0563A719F16CE34C1614AAC551A28479AECE
31,574,046 UART: [art] SIG.R = D151126A28411527AF5817A6CFC4D023FCFAD3B98663BB08FA2982594A755D4B32D4E88DEE886D781B3A65F076CF0B9C
31,581,443 UART: [art] SIG.S = B8CF6239FEB32D041FA21161275C28F2203C2EB7481D936CCB68EB37F53CEACACBF60C61778CED0A4567A1804EA146C2
32,886,865 UART: Caliptra RT
32,887,586 UART: [state] CFI Enabled
33,064,758 UART: [rt] RT listening for mailbox commands...
33,066,629 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,096,390 UART: [rt]cmd =0x46504c54, len=4
33,097,920 >>> mbox cmd response data (8 bytes)
33,098,962 UART: [rt] FIPS self test
33,099,909 UART: [kat] ++
33,100,364 UART: [kat] sha1
33,104,780 UART: [kat] SHA2-256
33,106,699 UART: [kat] SHA2-384
33,109,697 UART: [kat] SHA2-512-ACC
33,111,930 UART: [kat] ECC-384
36,381,085 UART: Fatal Error: 0x90040005
36,416,561 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,566,598 >>> mbox cmd response: failed
36,567,257 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,717,162 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
190,118 UART:
190,410 UART: Running Caliptra ROM ...
191,524 UART:
191,677 UART: [state] CFI Enabled
259,126 UART: [state] LifecycleState = Unprovisioned
261,049 UART: [state] DebugLocked = No
263,028 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,230 UART: [kat] SHA2-256
436,953 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,465 UART: [kat] ++
447,997 UART: [kat] sha1
459,151 UART: [kat] SHA2-256
461,840 UART: [kat] SHA2-384
468,303 UART: [kat] SHA2-512-ACC
470,701 UART: [kat] ECC-384
2,761,116 UART: [kat] HMAC-384Kdf
2,794,356 UART: [kat] LMS
3,984,698 UART: [kat] --
3,989,518 UART: [cold-reset] ++
3,990,599 UART: [fht] Storing FHT @ 0x50003400
4,002,304 UART: [idev] ++
4,002,887 UART: [idev] CDI.KEYID = 6
4,003,801 UART: [idev] SUBJECT.KEYID = 7
4,005,028 UART: [idev] UDS.KEYID = 0
4,006,667 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,156,801 UART: [idev] Erasing UDS.KEYID = 0
7,341,249 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,337 UART: [idev] --
7,365,828 UART: [ldev] ++
7,366,408 UART: [ldev] CDI.KEYID = 6
7,367,452 UART: [ldev] SUBJECT.KEYID = 5
7,368,560 UART: [ldev] AUTHORITY.KEYID = 7
7,369,851 UART: [ldev] FE.KEYID = 1
7,415,991 UART: [ldev] Erasing FE.KEYID = 1
10,749,919 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,053,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,068,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,097,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,116,417 UART: [ldev] --
13,120,724 UART: [fwproc] Waiting for Commands...
13,123,428 UART: [fwproc] Received command 0x46574c44
13,125,715 UART: [fwproc] Received Image of size 119428 bytes
17,242,386 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,312,973 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,386,093 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,717,209 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,780,770 ready_for_fw is high
3,781,370 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,959,586 >>> mbox cmd response: success
23,654,512 UART:
23,654,912 UART: Running Caliptra FMC ...
23,656,035 UART:
23,656,195 UART: [state] CFI Enabled
23,724,570 UART: [fht] FMC Alias Private Key: 7
26,064,627 UART: [art] Extend RT PCRs Done
26,065,887 UART: [art] Lock RT PCRs Done
26,067,467 UART: [art] Populate DV Done
26,073,012 UART: [fht] FMC Alias Private Key: 7
26,074,466 UART: [art] Derive CDI
26,075,215 UART: [art] Store in slot 0x4
26,133,444 UART: [art] Derive Key Pair
26,134,445 UART: [art] Store priv key in slot 0x5
29,427,144 UART: [art] Derive Key Pair - Done
29,440,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,429 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,938 UART: [art] PUB.X = A9D6BDA7F789BA376D0294D8066FDA51244A8A85F71EE89853E3171DA96EA8DCA576C38366617B00B7074AF68FF64668
31,750,212 UART: [art] PUB.Y = 883F345AAE8DDD9654C907664D7CB8AD2CB3925DB76234052E466FBC30C6C40B78F9B5DA18537FC22D86698475A686C1
31,757,472 UART: [art] SIG.R = AFC37E4F6B7D5F1ECAD30C19A30EEF11D737E29FAA7B12E9BBBC094BD0A8678B5E3A4558632392076311BC4D649CD252
31,764,878 UART: [art] SIG.S = B03CCC01E8FB9B20F715272E2300AF15008B2E43364060E65748D673C4941B5F3DE7682B4DA844F5BEF1E71A12C6B148
33,069,680 UART: Caliptra RT
33,070,427 UART: [state] CFI Enabled
33,246,487 UART: [rt] RT listening for mailbox commands...
33,248,361 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,278,184 UART: [rt]cmd =0x46504c54, len=4
33,279,796 >>> mbox cmd response data (8 bytes)
33,281,210 UART: [rt] FIPS self test
33,282,161 UART: [kat] ++
33,282,662 UART: [kat] sha1
33,287,121 UART: [kat] SHA2-256
33,289,056 UART: [kat] SHA2-384
33,292,027 UART: [kat] SHA2-512-ACC
33,294,270 UART: [kat] ECC-384
36,563,960 UART: Fatal Error: 0x90040005
36,599,287 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,749,261 >>> mbox cmd response: failed
36,749,928 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,899,798 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
3,788,341 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,985,272 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,552 UART:
192,925 UART: Running Caliptra ROM ...
194,138 UART:
603,589 UART: [state] CFI Enabled
615,868 UART: [state] LifecycleState = Unprovisioned
617,768 UART: [state] DebugLocked = No
619,869 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,888 UART: [kat] SHA2-256
794,615 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,199 UART: [kat] ++
805,687 UART: [kat] sha1
817,849 UART: [kat] SHA2-256
820,520 UART: [kat] SHA2-384
825,952 UART: [kat] SHA2-512-ACC
828,258 UART: [kat] ECC-384
3,111,877 UART: [kat] HMAC-384Kdf
3,123,419 UART: [kat] LMS
4,313,542 UART: [kat] --
4,317,502 UART: [cold-reset] ++
4,318,457 UART: [fht] Storing FHT @ 0x50003400
4,330,871 UART: [idev] ++
4,331,441 UART: [idev] CDI.KEYID = 6
4,332,486 UART: [idev] SUBJECT.KEYID = 7
4,333,666 UART: [idev] UDS.KEYID = 0
4,334,642 ready_for_fw is high
4,334,884 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,484,933 UART: [idev] Erasing UDS.KEYID = 0
7,620,165 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,061 UART: [idev] --
7,646,392 UART: [ldev] ++
7,647,020 UART: [ldev] CDI.KEYID = 6
7,647,941 UART: [ldev] SUBJECT.KEYID = 5
7,649,162 UART: [ldev] AUTHORITY.KEYID = 7
7,650,398 UART: [ldev] FE.KEYID = 1
7,661,289 UART: [ldev] Erasing FE.KEYID = 1
10,949,624 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,910 UART: [ldev] --
13,308,027 UART: [fwproc] Waiting for Commands...
13,310,622 UART: [fwproc] Received command 0x46574c44
13,312,824 UART: [fwproc] Received Image of size 119428 bytes
17,428,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,505,900 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,057 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,910,827 >>> mbox cmd response: success
17,915,781 UART: [afmc] ++
17,916,373 UART: [afmc] CDI.KEYID = 6
17,917,314 UART: [afmc] SUBJECT.KEYID = 7
17,918,543 UART: [afmc] AUTHORITY.KEYID = 5
21,234,531 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,531,556 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,533,816 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,548,266 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,562,965 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,577,392 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,599,076 UART: [afmc] --
23,603,442 UART: [cold-reset] --
23,607,905 UART: [state] Locking Datavault
23,614,072 UART: [state] Locking PCR0, PCR1 and PCR31
23,615,832 UART: [state] Locking ICCM
23,618,419 UART: [exit] Launching FMC @ 0x40000130
23,626,820 UART:
23,627,062 UART: Running Caliptra FMC ...
23,628,193 UART:
23,628,360 UART: [state] CFI Enabled
23,636,359 UART: [fht] FMC Alias Private Key: 7
25,975,969 UART: [art] Extend RT PCRs Done
25,977,195 UART: [art] Lock RT PCRs Done
25,979,204 UART: [art] Populate DV Done
25,984,678 UART: [fht] FMC Alias Private Key: 7
25,986,224 UART: [art] Derive CDI
25,987,040 UART: [art] Store in slot 0x4
26,029,430 UART: [art] Derive Key Pair
26,030,481 UART: [art] Store priv key in slot 0x5
29,272,559 UART: [art] Derive Key Pair - Done
29,285,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,565,707 UART: [art] Erasing AUTHORITY.KEYID = 7
31,567,222 UART: [art] PUB.X = F10B4F39C06232E5845891D0A593839B35014C9FA5A997D30A21C42B3A778A2E0A2800F1169A507854AE236E214F08BF
31,574,479 UART: [art] PUB.Y = 4B217AEF2A1C47A5AB4DC0508F2076D069E7F7F1BA1F5B2EEAC15F9A0B808F1D1B5F26E2AA7455DDCAFE60BDCDC87211
31,581,745 UART: [art] SIG.R = ED8A881C38FA903BD96B61067D9A381D676D49BC8AAB87E3283B93829DB01EA21B429A7A2DAC4111CE1558F542C64309
31,589,148 UART: [art] SIG.S = 31B5D000A676F60063292BD1DC51800579FA0FD3AA8066E1378AB44009CFF95674753DD582149B9A818CF1CE893E79EF
32,894,453 UART: Caliptra RT
32,895,160 UART: [state] CFI Enabled
33,028,099 UART: [rt] RT listening for mailbox commands...
33,029,967 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,059,875 UART: [rt]cmd =0x46504c54, len=4
33,061,602 >>> mbox cmd response data (8 bytes)
33,062,696 UART: [rt] FIPS self test
33,063,651 UART: [kat] ++
33,064,107 UART: [kat] sha1
33,068,544 UART: [kat] SHA2-256
33,070,441 UART: [kat] SHA2-384
33,073,248 UART: [kat] SHA2-512-ACC
33,075,549 UART: [kat] ECC-384
36,315,216 UART: Fatal Error: 0x90040005
36,350,478 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,500,548 >>> mbox cmd response: failed
36,501,206 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,651,139 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
190,123 UART:
190,409 UART: Running Caliptra ROM ...
191,523 UART:
3,873,453 UART: [state] CFI Enabled
3,887,319 UART: [state] LifecycleState = Unprovisioned
3,889,285 UART: [state] DebugLocked = No
3,891,999 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,897,217 UART: [kat] SHA2-256
4,066,967 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,077,484 UART: [kat] ++
4,077,973 UART: [kat] sha1
4,089,142 UART: [kat] SHA2-256
4,091,838 UART: [kat] SHA2-384
4,097,731 UART: [kat] SHA2-512-ACC
4,100,088 UART: [kat] ECC-384
6,382,900 UART: [kat] HMAC-384Kdf
6,394,487 UART: [kat] LMS
7,584,568 UART: [kat] --
7,589,341 UART: [cold-reset] ++
7,591,010 UART: [fht] Storing FHT @ 0x50003400
7,602,233 UART: [idev] ++
7,602,802 UART: [idev] CDI.KEYID = 6
7,603,717 UART: [idev] SUBJECT.KEYID = 7
7,604,991 UART: [idev] UDS.KEYID = 0
7,606,514 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
7,756,415 UART: [idev] Erasing UDS.KEYID = 0
10,888,362 UART: [idev] Using Sha1 for KeyId Algorithm
10,910,955 UART: [idev] --
10,915,383 UART: [ldev] ++
10,915,955 UART: [ldev] CDI.KEYID = 6
10,916,921 UART: [ldev] SUBJECT.KEYID = 5
10,918,139 UART: [ldev] AUTHORITY.KEYID = 7
10,919,375 UART: [ldev] FE.KEYID = 1
10,930,948 UART: [ldev] Erasing FE.KEYID = 1
14,219,768 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,513,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,528,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,543,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,557,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,575,250 UART: [ldev] --
16,579,333 UART: [fwproc] Waiting for Commands...
16,581,594 UART: [fwproc] Received command 0x46574c44
16,583,806 UART: [fwproc] Received Image of size 119428 bytes
20,705,609 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,783,803 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,856,942 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
21,187,784 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
4,123,910 ready_for_fw is high
4,124,613 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,173,495 >>> mbox cmd response: success
23,809,065 UART:
23,809,554 UART: Running Caliptra FMC ...
23,810,675 UART:
23,810,842 UART: [state] CFI Enabled
23,818,828 UART: [fht] FMC Alias Private Key: 7
26,158,740 UART: [art] Extend RT PCRs Done
26,159,988 UART: [art] Lock RT PCRs Done
26,161,977 UART: [art] Populate DV Done
26,167,568 UART: [fht] FMC Alias Private Key: 7
26,169,179 UART: [art] Derive CDI
26,170,008 UART: [art] Store in slot 0x4
26,212,109 UART: [art] Derive Key Pair
26,213,172 UART: [art] Store priv key in slot 0x5
29,455,109 UART: [art] Derive Key Pair - Done
29,468,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,065 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,572 UART: [art] PUB.X = E8E069963A66E6ED8A3CF6D5218C0B8DB45BF243EA7B935189D04E7A92762F36BE822356DD8C3EA04C5DB697FE854913
31,756,840 UART: [art] PUB.Y = 4576B2D98FCF007E7766C9C093FAF02E6F69BA4A2E0697544F6A4C24180B21D029B160D6A07CBAB2611A0EE90CC5CF2F
31,764,085 UART: [art] SIG.R = 5608C08806B075B57E31F9227FAD0152BF54C88A64174D8E16BEEFF39CC2ACFD2A9331ED333DFC71A98DC70B4B1A99B0
31,771,500 UART: [art] SIG.S = 4F7411DB389281DA1A09F37BE947C13C875CDD50E6FA0B47A753579BFA1C7156B20E6C07AB39A5A6C21B3425648B2355
33,076,188 UART: Caliptra RT
33,076,897 UART: [state] CFI Enabled
33,210,191 UART: [rt] RT listening for mailbox commands...
33,212,043 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,241,697 UART: [rt]cmd =0x46504c54, len=4
33,243,365 >>> mbox cmd response data (8 bytes)
33,244,495 UART: [rt] FIPS self test
33,245,463 UART: [kat] ++
33,245,916 UART: [kat] sha1
33,250,212 UART: [kat] SHA2-256
33,252,146 UART: [kat] SHA2-384
33,255,118 UART: [kat] SHA2-512-ACC
33,257,367 UART: [kat] ECC-384
36,496,373 UART: Fatal Error: 0x90040005
36,531,754 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,681,721 >>> mbox cmd response: failed
36,682,416 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,832,357 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
7,234,221 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
21,291,351 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,256 UART:
192,636 UART: Running Caliptra ROM ...
193,764 UART:
193,909 UART: [state] CFI Enabled
261,478 UART: [state] LifecycleState = Unprovisioned
263,402 UART: [state] DebugLocked = No
265,930 UART: [state] WD Timer not started. Device not locked for debugging
269,424 UART: [kat] SHA2-256
449,100 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,826 UART: [kat] ++
460,437 UART: [kat] sha1
472,038 UART: [kat] SHA2-256
474,775 UART: [kat] SHA2-384
480,770 UART: [kat] SHA2-512-ACC
483,166 UART: [kat] ECC-384
2,950,469 UART: [kat] HMAC-384Kdf
2,969,743 UART: [kat] LMS
3,446,233 UART: [kat] --
3,450,468 UART: [cold-reset] ++
3,452,823 UART: [fht] FHT @ 0x50003400
3,464,956 UART: [idev] ++
3,465,529 UART: [idev] CDI.KEYID = 6
3,466,417 UART: [idev] SUBJECT.KEYID = 7
3,467,738 UART: [idev] UDS.KEYID = 0
3,468,672 ready_for_fw is high
3,468,897 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,619,196 UART: [idev] Erasing UDS.KEYID = 0
5,986,078 UART: [idev] Sha1 KeyId Algorithm
6,011,093 UART: [idev] --
6,014,588 UART: [ldev] ++
6,015,197 UART: [ldev] CDI.KEYID = 6
6,016,089 UART: [ldev] SUBJECT.KEYID = 5
6,017,313 UART: [ldev] AUTHORITY.KEYID = 7
6,018,554 UART: [ldev] FE.KEYID = 1
6,056,244 UART: [ldev] Erasing FE.KEYID = 1
8,565,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,876 UART: [ldev] --
10,373,526 UART: [fwproc] Wait for Commands...
10,376,489 UART: [fwproc] Recv command 0x46574c44
10,378,529 UART: [fwproc] Recv'd Img size: 119428 bytes
13,868,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,888 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,934 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,353,853 >>> mbox cmd response: success
14,358,044 UART: [afmc] ++
14,358,643 UART: [afmc] CDI.KEYID = 6
14,359,584 UART: [afmc] SUBJECT.KEYID = 7
14,360,804 UART: [afmc] AUTHORITY.KEYID = 5
16,895,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,770 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,600 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,663 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,202 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,694,869 UART: [afmc] --
18,697,876 UART: [cold-reset] --
18,701,415 UART: [state] Locking Datavault
18,705,532 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,310 UART: [state] Locking ICCM
18,709,656 UART: [exit] Launching FMC @ 0x40000130
18,718,058 UART:
18,718,312 UART: Running Caliptra FMC ...
18,719,421 UART:
18,719,580 UART: [state] CFI Enabled
18,775,137 UART: [fht] FMC Alias Private Key: 7
20,541,162 UART: [art] Extend RT PCRs Done
20,542,383 UART: [art] Lock RT PCRs Done
20,544,040 UART: [art] Populate DV Done
20,549,725 UART: [fht] FMC Alias Private Key: 7
20,551,428 UART: [art] Derive CDI
20,552,171 UART: [art] Store in slot 0x4
20,607,753 UART: [art] Derive Key Pair
20,608,799 UART: [art] Store priv key in slot 0x5
23,071,578 UART: [art] Derive Key Pair - Done
23,084,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,164 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,668 UART: [art] PUB.X = 70886EE7463112839077769B9AB0D4AA778C5D9F029955E89490CAB108DC05C5ECEC1496DE84AAFD43AF29962D08E05F
24,806,893 UART: [art] PUB.Y = 70C7DA7B81CBB9596BC40CFDA27B8D7A9B03728F08E53C1722A138225EF983B3B00806025461F0E014BA23D24213F3F8
24,814,172 UART: [art] SIG.R = C10B4AFBFFE7EFB9C22FE721C0D9D5161AF7F3AB23C34AB4A6F31DDC94E0FCD26BBD60CEF31FDD80FEEEC213CD56BE47
24,821,612 UART: [art] SIG.S = 4E1EC066E9472F23AE9CE793D50B51BB6AE8EFB2812AB3F0A7D6A8C0F09DE3337C0A211201736A53BF9B9B62E9655942
25,800,299 UART: Caliptra RT
25,801,004 UART: [state] CFI Enabled
25,981,958 UART: [rt] RT listening for mailbox commands...
25,983,808 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,013,434 UART: [rt]cmd =0x46504c54, len=4
26,015,021 >>> mbox cmd response data (8 bytes)
26,016,263 UART: [rt] FIPS self test
26,017,218 UART: [kat] ++
26,017,681 UART: [kat] sha1
26,022,251 UART: [kat] SHA2-256
26,024,165 UART: [kat] SHA2-384
26,027,021 UART: [kat] SHA2-512-ACC
26,029,269 UART: [kat] ECC-384
28,469,762 UART: Fatal Error: 0x90040005
28,505,463 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,655,542 >>> mbox cmd response: failed
28,656,225 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,806,042 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
189,994 UART:
190,285 UART: Running Caliptra ROM ...
191,317 UART:
191,462 UART: [state] CFI Enabled
255,851 UART: [state] LifecycleState = Unprovisioned
257,773 UART: [state] DebugLocked = No
259,883 UART: [state] WD Timer not started. Device not locked for debugging
264,595 UART: [kat] SHA2-256
444,273 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
455,037 UART: [kat] ++
455,574 UART: [kat] sha1
467,657 UART: [kat] SHA2-256
470,349 UART: [kat] SHA2-384
477,194 UART: [kat] SHA2-512-ACC
479,544 UART: [kat] ECC-384
2,939,775 UART: [kat] HMAC-384Kdf
2,963,514 UART: [kat] LMS
3,440,010 UART: [kat] --
3,444,748 UART: [cold-reset] ++
3,446,874 UART: [fht] FHT @ 0x50003400
3,457,384 UART: [idev] ++
3,457,964 UART: [idev] CDI.KEYID = 6
3,458,872 UART: [idev] SUBJECT.KEYID = 7
3,460,147 UART: [idev] UDS.KEYID = 0
3,461,645 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,611,866 UART: [idev] Erasing UDS.KEYID = 0
5,978,240 UART: [idev] Sha1 KeyId Algorithm
6,002,559 UART: [idev] --
6,008,826 UART: [ldev] ++
6,009,443 UART: [ldev] CDI.KEYID = 6
6,010,374 UART: [ldev] SUBJECT.KEYID = 5
6,011,541 UART: [ldev] AUTHORITY.KEYID = 7
6,012,780 UART: [ldev] FE.KEYID = 1
6,049,907 UART: [ldev] Erasing FE.KEYID = 1
8,559,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,292,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,308,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,324,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,340,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,360,337 UART: [ldev] --
10,365,992 UART: [fwproc] Wait for Commands...
10,369,070 UART: [fwproc] Recv command 0x46574c44
10,371,123 UART: [fwproc] Recv'd Img size: 119428 bytes
13,873,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,957,333 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,030,363 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,360,912 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
3,462,514 ready_for_fw is high
3,462,971 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,214,305 >>> mbox cmd response: success
18,495,308 UART:
18,495,705 UART: Running Caliptra FMC ...
18,496,865 UART:
18,497,038 UART: [state] CFI Enabled
18,562,031 UART: [fht] FMC Alias Private Key: 7
20,329,110 UART: [art] Extend RT PCRs Done
20,330,346 UART: [art] Lock RT PCRs Done
20,331,657 UART: [art] Populate DV Done
20,336,977 UART: [fht] FMC Alias Private Key: 7
20,338,631 UART: [art] Derive CDI
20,339,452 UART: [art] Store in slot 0x4
20,395,212 UART: [art] Derive Key Pair
20,396,274 UART: [art] Store priv key in slot 0x5
22,859,343 UART: [art] Derive Key Pair - Done
22,872,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,584,851 UART: [art] Erasing AUTHORITY.KEYID = 7
24,586,337 UART: [art] PUB.X = 615933B7C9321263F22066E3822E5FFEC91D5F38C922EBF4588E7D9E3CEE87764B2541AA3C3E0B7ABF3181539856A319
24,593,598 UART: [art] PUB.Y = 066E542A02F3DEF9BB3EEF555D30730D06027E43F61CC29063ED4DD25743E4BA1CD62C7F64A159B5FEA8D9562B08D6DC
24,600,897 UART: [art] SIG.R = 104E7D14C6546FAA2B8A3C2B452FBA1C3875C5BE595E7660EB19BB579A4732E17D6E6720A01EFEE742F17162FFD742B6
24,608,312 UART: [art] SIG.S = 007011086D98D82B7C78DA51A4F83E752BC8FFB65CC2E1A7475E5FAD9BBDBEECC0A2D0410544BB9326A7973D838CED68
25,587,363 UART: Caliptra RT
25,588,080 UART: [state] CFI Enabled
25,767,815 UART: [rt] RT listening for mailbox commands...
25,769,668 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,799,264 UART: [rt]cmd =0x46504c54, len=4
25,800,776 >>> mbox cmd response data (8 bytes)
25,801,963 UART: [rt] FIPS self test
25,802,910 UART: [kat] ++
25,803,385 UART: [kat] sha1
25,807,873 UART: [kat] SHA2-256
25,809,815 UART: [kat] SHA2-384
25,812,776 UART: [kat] SHA2-512-ACC
25,815,070 UART: [kat] ECC-384
28,256,663 UART: Fatal Error: 0x90040005
28,292,111 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,442,078 >>> mbox cmd response: failed
28,442,738 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,592,633 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
3,454,151 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,234,414 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,587 UART:
192,955 UART: Running Caliptra ROM ...
194,071 UART:
603,955 UART: [state] CFI Enabled
619,800 UART: [state] LifecycleState = Unprovisioned
621,721 UART: [state] DebugLocked = No
622,968 UART: [state] WD Timer not started. Device not locked for debugging
627,158 UART: [kat] SHA2-256
806,775 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,563 UART: [kat] ++
818,084 UART: [kat] sha1
828,608 UART: [kat] SHA2-256
831,335 UART: [kat] SHA2-384
836,547 UART: [kat] SHA2-512-ACC
838,924 UART: [kat] ECC-384
3,280,837 UART: [kat] HMAC-384Kdf
3,291,722 UART: [kat] LMS
3,768,188 UART: [kat] --
3,770,486 UART: [cold-reset] ++
3,771,926 UART: [fht] FHT @ 0x50003400
3,782,417 UART: [idev] ++
3,782,996 UART: [idev] CDI.KEYID = 6
3,783,990 UART: [idev] SUBJECT.KEYID = 7
3,785,244 UART: [idev] UDS.KEYID = 0
3,786,175 ready_for_fw is high
3,786,382 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,936,350 UART: [idev] Erasing UDS.KEYID = 0
6,261,346 UART: [idev] Sha1 KeyId Algorithm
6,283,508 UART: [idev] --
6,286,697 UART: [ldev] ++
6,287,482 UART: [ldev] CDI.KEYID = 6
6,288,425 UART: [ldev] SUBJECT.KEYID = 5
6,289,539 UART: [ldev] AUTHORITY.KEYID = 7
6,290,720 UART: [ldev] FE.KEYID = 1
6,300,265 UART: [ldev] Erasing FE.KEYID = 1
8,777,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,499,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,515,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,271 UART: [ldev] --
10,574,321 UART: [fwproc] Wait for Commands...
10,575,877 UART: [fwproc] Recv command 0x46574c44
10,577,872 UART: [fwproc] Recv'd Img size: 119428 bytes
14,073,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,261 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,282 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,556,920 >>> mbox cmd response: success
14,561,689 UART: [afmc] ++
14,562,289 UART: [afmc] CDI.KEYID = 6
14,563,184 UART: [afmc] SUBJECT.KEYID = 7
14,564,458 UART: [afmc] AUTHORITY.KEYID = 5
17,066,216 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,587 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,769 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,612 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,673 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,230 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,863 UART: [afmc] --
18,865,423 UART: [cold-reset] --
18,869,834 UART: [state] Locking Datavault
18,876,163 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,928 UART: [state] Locking ICCM
18,880,642 UART: [exit] Launching FMC @ 0x40000130
18,889,046 UART:
18,889,289 UART: Running Caliptra FMC ...
18,890,395 UART:
18,890,559 UART: [state] CFI Enabled
18,898,452 UART: [fht] FMC Alias Private Key: 7
20,664,222 UART: [art] Extend RT PCRs Done
20,665,431 UART: [art] Lock RT PCRs Done
20,667,381 UART: [art] Populate DV Done
20,672,738 UART: [fht] FMC Alias Private Key: 7
20,674,223 UART: [art] Derive CDI
20,674,988 UART: [art] Store in slot 0x4
20,717,960 UART: [art] Derive Key Pair
20,718,996 UART: [art] Store priv key in slot 0x5
23,145,323 UART: [art] Derive Key Pair - Done
23,158,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,334 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,827 UART: [art] PUB.X = 13A276AB37E3A7F1A14EEA72C56954410A34E17482C6361393247113F17058F2C9E29687E65978931D3992D4059977CF
24,873,037 UART: [art] PUB.Y = B5C07231290E44C3638AB336351D476094F7FD071DDF09A2D0B00B5E0CEB79E1B2B2E81DF891FB5D926DD2AB0A20174F
24,880,292 UART: [art] SIG.R = 33C603664E95669C02767BB7CD2C6DCD047F2CB46DC20FC21FAB0BA6B8CC908CFAF3465E872188F2BDA921E86E66A87B
24,887,695 UART: [art] SIG.S = C50605B4ABAD092741666C12B2DCD936819CD4DC0C29F479E395AFCB9C3D0F1F00F3673EF28F64A5A31CA197BE9EC5C4
25,866,459 UART: Caliptra RT
25,867,170 UART: [state] CFI Enabled
26,000,350 UART: [rt] RT listening for mailbox commands...
26,002,214 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,031,910 UART: [rt]cmd =0x46504c54, len=4
26,033,608 >>> mbox cmd response data (8 bytes)
26,034,522 UART: [rt] FIPS self test
26,035,474 UART: [kat] ++
26,035,937 UART: [kat] sha1
26,040,291 UART: [kat] SHA2-256
26,042,176 UART: [kat] SHA2-384
26,045,052 UART: [kat] SHA2-512-ACC
26,047,316 UART: [kat] ECC-384
28,471,580 UART: Fatal Error: 0x90040005
28,506,817 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,656,790 >>> mbox cmd response: failed
28,657,462 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,807,350 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,104 UART:
190,388 UART: Running Caliptra ROM ...
191,444 UART:
11,724,881 UART: [state] CFI Enabled
11,740,251 UART: [state] LifecycleState = Unprovisioned
11,742,169 UART: [state] DebugLocked = No
11,744,610 UART: [state] WD Timer not started. Device not locked for debugging
11,748,051 UART: [kat] SHA2-256
11,927,738 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,938,484 UART: [kat] ++
11,938,974 UART: [kat] sha1
11,950,027 UART: [kat] SHA2-256
11,952,732 UART: [kat] SHA2-384
11,958,287 UART: [kat] SHA2-512-ACC
11,960,678 UART: [kat] ECC-384
14,402,744 UART: [kat] HMAC-384Kdf
14,415,185 UART: [kat] LMS
14,891,714 UART: [kat] --
14,897,614 UART: [cold-reset] ++
14,900,037 UART: [fht] FHT @ 0x50003400
14,911,997 UART: [idev] ++
14,912,562 UART: [idev] CDI.KEYID = 6
14,913,582 UART: [idev] SUBJECT.KEYID = 7
14,914,764 UART: [idev] UDS.KEYID = 0
14,916,302 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,066,217 UART: [idev] Erasing UDS.KEYID = 0
17,389,488 UART: [idev] Sha1 KeyId Algorithm
17,414,273 UART: [idev] --
17,419,215 UART: [ldev] ++
17,419,797 UART: [ldev] CDI.KEYID = 6
17,420,820 UART: [ldev] SUBJECT.KEYID = 5
17,421,928 UART: [ldev] AUTHORITY.KEYID = 7
17,423,216 UART: [ldev] FE.KEYID = 1
17,433,917 UART: [ldev] Erasing FE.KEYID = 1
19,911,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,633,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,649,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,665,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,680,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,702,687 UART: [ldev] --
21,708,120 UART: [fwproc] Wait for Commands...
21,710,057 UART: [fwproc] Recv command 0x46574c44
21,712,105 UART: [fwproc] Recv'd Img size: 119428 bytes
25,204,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,280,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,353,313 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,684,710 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,786,683 ready_for_fw is high
3,787,090 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,473,571 >>> mbox cmd response: success
18,726,971 UART:
18,727,371 UART: Running Caliptra FMC ...
18,728,482 UART:
18,728,635 UART: [state] CFI Enabled
18,736,791 UART: [fht] FMC Alias Private Key: 7
20,502,723 UART: [art] Extend RT PCRs Done
20,503,956 UART: [art] Lock RT PCRs Done
20,505,347 UART: [art] Populate DV Done
20,511,157 UART: [fht] FMC Alias Private Key: 7
20,512,646 UART: [art] Derive CDI
20,513,385 UART: [art] Store in slot 0x4
20,555,988 UART: [art] Derive Key Pair
20,557,032 UART: [art] Store priv key in slot 0x5
22,984,122 UART: [art] Derive Key Pair - Done
22,997,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,703,692 UART: [art] Erasing AUTHORITY.KEYID = 7
24,705,332 UART: [art] PUB.X = 06B71B543C40B30CE99CD882BBB0E07FB773100277CD277399A07A89B8DE1BF90236C7B8ED2E86E04C9547291A67E9AB
24,712,490 UART: [art] PUB.Y = 4C4535FC249AEA6A2A128965086A1595FE04E7CB6CBE3602C6369F1D6255952889866584DBA0532CB7AD677F98DE9B01
24,719,686 UART: [art] SIG.R = 5A66CE39D96F2AC6166BC124E651DC50EB12FE584C5D7F373D0950EFD6348A148ABEDD5C2E991E8BCB1EB31355E03A74
24,727,080 UART: [art] SIG.S = CA0009F8E32AA3799EAF22765D2B2EE72C108DB12D3E28FAC22496306780E9C672C60C033E4F6F091B2BA3BEC7B0ECDD
25,705,971 UART: Caliptra RT
25,706,674 UART: [state] CFI Enabled
25,838,703 UART: [rt] RT listening for mailbox commands...
25,840,549 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,870,117 UART: [rt]cmd =0x46504c54, len=4
25,871,698 >>> mbox cmd response data (8 bytes)
25,872,739 UART: [rt] FIPS self test
25,873,683 UART: [kat] ++
25,874,133 UART: [kat] sha1
25,878,426 UART: [kat] SHA2-256
25,880,355 UART: [kat] SHA2-384
25,883,212 UART: [kat] SHA2-512-ACC
25,885,449 UART: [kat] ECC-384
28,309,151 UART: Fatal Error: 0x90040005
28,344,399 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,494,373 >>> mbox cmd response: failed
28,495,016 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,644,890 >>> mbox cmd response: failed
Initializing fuses
923 writing to cptra_bootfsm_go
15,059,831 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,745,865 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,214 UART:
192,568 UART: Running Caliptra ROM ...
193,744 UART:
193,906 UART: [state] CFI Enabled
261,104 UART: [state] LifecycleState = Unprovisioned
263,504 UART: [state] DebugLocked = No
266,391 UART: [state] WD Timer not started. Device not locked for debugging
270,934 UART: [kat] SHA2-256
460,815 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,555 UART: [kat] ++
472,011 UART: [kat] sha1
483,181 UART: [kat] SHA2-256
486,151 UART: [kat] SHA2-384
492,074 UART: [kat] SHA2-512-ACC
494,667 UART: [kat] ECC-384
2,947,724 UART: [kat] HMAC-384Kdf
2,970,125 UART: [kat] LMS
3,501,909 UART: [kat] --
3,507,570 UART: [cold-reset] ++
3,509,382 UART: [fht] FHT @ 0x50003400
3,521,216 UART: [idev] ++
3,521,855 UART: [idev] CDI.KEYID = 6
3,522,893 UART: [idev] SUBJECT.KEYID = 7
3,524,075 UART: [idev] UDS.KEYID = 0
3,525,016 ready_for_fw is high
3,525,226 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,675,441 UART: [idev] Erasing UDS.KEYID = 0
6,027,614 UART: [idev] Sha1 KeyId Algorithm
6,050,117 UART: [idev] --
6,055,796 UART: [ldev] ++
6,056,472 UART: [ldev] CDI.KEYID = 6
6,057,367 UART: [ldev] SUBJECT.KEYID = 5
6,058,532 UART: [ldev] AUTHORITY.KEYID = 7
6,059,715 UART: [ldev] FE.KEYID = 1
6,099,101 UART: [ldev] Erasing FE.KEYID = 1
8,606,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,017 UART: [ldev] --
10,411,668 UART: [fwproc] Wait for Commands...
10,413,772 UART: [fwproc] Recv command 0x46574c44
10,416,089 UART: [fwproc] Recv'd Img size: 119428 bytes
13,921,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,298 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,926 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,688,417 >>> mbox cmd response: success
14,691,831 UART: [afmc] ++
14,692,538 UART: [afmc] CDI.KEYID = 6
14,693,724 UART: [afmc] SUBJECT.KEYID = 7
14,695,209 UART: [afmc] AUTHORITY.KEYID = 5
17,234,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,956,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,958,903 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,996 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,134 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,051 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,732 UART: [afmc] --
19,030,135 UART: [cold-reset] --
19,032,946 UART: [state] Locking Datavault
19,037,939 UART: [state] Locking PCR0, PCR1 and PCR31
19,040,079 UART: [state] Locking ICCM
19,042,180 UART: [exit] Launching FMC @ 0x40000130
19,050,855 UART:
19,051,104 UART: Running Caliptra FMC ...
19,052,215 UART:
19,052,378 UART: [state] CFI Enabled
19,113,883 UART: [fht] FMC Alias Private Key: 7
20,880,743 UART: [art] Extend RT PCRs Done
20,881,969 UART: [art] Lock RT PCRs Done
20,883,496 UART: [art] Populate DV Done
20,888,822 UART: [fht] FMC Alias Private Key: 7
20,890,366 UART: [art] Derive CDI
20,891,186 UART: [art] Store in slot 0x4
20,946,980 UART: [art] Derive Key Pair
20,948,049 UART: [art] Store priv key in slot 0x5
23,410,997 UART: [art] Derive Key Pair - Done
23,423,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,674 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,185 UART: [art] PUB.X = D730053868CB4A4C326FC41A03C07EB78538D41AE1BB506622FA2C249DEEACEFDE2E06238E2C21E2783B4FC8164A7310
25,145,443 UART: [art] PUB.Y = 4EE2C7718123403213971B90D0DE711DB3F7E9CE0ED6C44E189A3C740AD310F59F04FB8A444B85A895A937AFCAF7DB79
25,152,691 UART: [art] SIG.R = C05BA87F3434D77AFD09B1E8D0C973A73D9BB929AD3142AEFF47582B3039FA63EA28CC8CAA7FB0429AFB9BFF88FB046C
25,160,150 UART: [art] SIG.S = 2553E0DCC989F893934D57DB3D4D85257EDF65EE1E3A2B65A86587B8A8ED78E5022B33061FAF32781111255DA2310C58
26,139,054 UART: Caliptra RT
26,139,773 UART: [state] CFI Enabled
26,320,549 UART: [rt] RT listening for mailbox commands...
26,322,405 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,351,936 UART: [rt]cmd =0x46504c54, len=4
26,353,357 >>> mbox cmd response data (8 bytes)
26,354,489 UART: [rt] FIPS self test
26,355,434 UART: [kat] ++
26,355,906 UART: [kat] sha1
26,360,478 UART: [kat] SHA2-256
26,362,359 UART: [kat] SHA2-384
26,365,355 UART: [kat] SHA2-512-ACC
26,367,644 UART: [kat] ECC-384
28,808,563 UART: Fatal Error: 0x90040005
28,843,864 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,993,841 >>> mbox cmd response: failed
28,994,449 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,144,392 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
190,078 UART:
190,375 UART: Running Caliptra ROM ...
191,587 UART:
191,769 UART: [state] CFI Enabled
262,136 UART: [state] LifecycleState = Unprovisioned
264,522 UART: [state] DebugLocked = No
267,491 UART: [state] WD Timer not started. Device not locked for debugging
272,721 UART: [kat] SHA2-256
462,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,391 UART: [kat] ++
473,839 UART: [kat] sha1
483,964 UART: [kat] SHA2-256
486,978 UART: [kat] SHA2-384
492,535 UART: [kat] SHA2-512-ACC
495,109 UART: [kat] ECC-384
2,942,851 UART: [kat] HMAC-384Kdf
2,965,720 UART: [kat] LMS
3,497,446 UART: [kat] --
3,503,894 UART: [cold-reset] ++
3,504,977 UART: [fht] FHT @ 0x50003400
3,516,630 UART: [idev] ++
3,517,320 UART: [idev] CDI.KEYID = 6
3,518,291 UART: [idev] SUBJECT.KEYID = 7
3,519,457 UART: [idev] UDS.KEYID = 0
3,520,999 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,671,091 UART: [idev] Erasing UDS.KEYID = 0
6,021,878 UART: [idev] Sha1 KeyId Algorithm
6,044,321 UART: [idev] --
6,047,811 UART: [ldev] ++
6,048,507 UART: [ldev] CDI.KEYID = 6
6,049,422 UART: [ldev] SUBJECT.KEYID = 5
6,050,511 UART: [ldev] AUTHORITY.KEYID = 7
6,051,807 UART: [ldev] FE.KEYID = 1
6,095,817 UART: [ldev] Erasing FE.KEYID = 1
8,602,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,114 UART: [ldev] --
10,410,032 UART: [fwproc] Wait for Commands...
10,412,407 UART: [fwproc] Recv command 0x46574c44
10,414,678 UART: [fwproc] Recv'd Img size: 119428 bytes
13,921,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,613 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,198 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,690,900 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,441,753 ready_for_fw is high
3,442,231 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,846,160 >>> mbox cmd response: success
19,137,845 UART:
19,138,239 UART: Running Caliptra FMC ...
19,139,353 UART:
19,139,511 UART: [state] CFI Enabled
19,206,446 UART: [fht] FMC Alias Private Key: 7
20,972,359 UART: [art] Extend RT PCRs Done
20,973,617 UART: [art] Lock RT PCRs Done
20,975,519 UART: [art] Populate DV Done
20,981,159 UART: [fht] FMC Alias Private Key: 7
20,982,604 UART: [art] Derive CDI
20,983,379 UART: [art] Store in slot 0x4
21,039,288 UART: [art] Derive Key Pair
21,040,330 UART: [art] Store priv key in slot 0x5
23,502,915 UART: [art] Derive Key Pair - Done
23,515,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,229,057 UART: [art] Erasing AUTHORITY.KEYID = 7
25,230,572 UART: [art] PUB.X = F70348EDF7073272937C00D92003AFC6E9DC1F7AEA12DD6A9AAD4A554489BD78EABA4F4F55A18B73810D4671F26590DD
25,237,832 UART: [art] PUB.Y = 4C0C93325882CB5BAF530E7EFD7BC3AE060F444BB51C61D58405156167C58D9FEE29CBCF284BDFBE9FBB8D14F1D48C77
25,245,085 UART: [art] SIG.R = FD5D4CCB314C707F9F3DF64951453F66CDD0C1C19425E74AB268FA955E2FA8AC27C2BC9FA33FB8704CF5CDD89A15DE0B
25,252,551 UART: [art] SIG.S = D19E2B3B1D9541177660BBCCE5B1A8730F4674D34CE08908B9F0BDD3D60A980728F6DDB29510E2D28F36F666B3B14512
26,231,233 UART: Caliptra RT
26,231,948 UART: [state] CFI Enabled
26,413,524 UART: [rt] RT listening for mailbox commands...
26,415,382 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,444,956 UART: [rt]cmd =0x46504c54, len=4
26,446,544 >>> mbox cmd response data (8 bytes)
26,447,721 UART: [rt] FIPS self test
26,448,620 UART: [kat] ++
26,449,077 UART: [kat] sha1
26,453,565 UART: [kat] SHA2-256
26,455,459 UART: [kat] SHA2-384
26,458,265 UART: [kat] SHA2-512-ACC
26,460,558 UART: [kat] ECC-384
28,900,727 UART: Fatal Error: 0x90040005
28,936,107 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,085,967 >>> mbox cmd response: failed
29,086,603 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,236,548 >>> mbox cmd response: failed
Initializing fuses
931 writing to cptra_bootfsm_go
3,412,712 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,811,054 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
192,665 UART:
193,029 UART: Running Caliptra ROM ...
194,227 UART:
604,001 UART: [state] CFI Enabled
616,605 UART: [state] LifecycleState = Unprovisioned
618,994 UART: [state] DebugLocked = No
621,670 UART: [state] WD Timer not started. Device not locked for debugging
625,358 UART: [kat] SHA2-256
815,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,845 UART: [kat] ++
826,473 UART: [kat] sha1
837,223 UART: [kat] SHA2-256
840,239 UART: [kat] SHA2-384
846,304 UART: [kat] SHA2-512-ACC
848,890 UART: [kat] ECC-384
3,292,741 UART: [kat] HMAC-384Kdf
3,306,546 UART: [kat] LMS
3,838,404 UART: [kat] --
3,842,638 UART: [cold-reset] ++
3,844,083 UART: [fht] FHT @ 0x50003400
3,855,073 UART: [idev] ++
3,855,789 UART: [idev] CDI.KEYID = 6
3,856,704 UART: [idev] SUBJECT.KEYID = 7
3,857,953 UART: [idev] UDS.KEYID = 0
3,858,881 ready_for_fw is high
3,859,090 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,009,081 UART: [idev] Erasing UDS.KEYID = 0
6,340,044 UART: [idev] Sha1 KeyId Algorithm
6,362,269 UART: [idev] --
6,366,537 UART: [ldev] ++
6,367,221 UART: [ldev] CDI.KEYID = 6
6,368,243 UART: [ldev] SUBJECT.KEYID = 5
6,369,346 UART: [ldev] AUTHORITY.KEYID = 7
6,370,578 UART: [ldev] FE.KEYID = 1
6,379,831 UART: [ldev] Erasing FE.KEYID = 1
8,856,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,599 UART: [ldev] --
10,650,742 UART: [fwproc] Wait for Commands...
10,653,514 UART: [fwproc] Recv command 0x46574c44
10,655,783 UART: [fwproc] Recv'd Img size: 119428 bytes
14,159,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,239,721 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,363,350 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,929,294 >>> mbox cmd response: success
14,932,476 UART: [afmc] ++
14,933,186 UART: [afmc] CDI.KEYID = 6
14,934,378 UART: [afmc] SUBJECT.KEYID = 7
14,935,870 UART: [afmc] AUTHORITY.KEYID = 5
17,435,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,155,555 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,157,521 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,172,592 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,187,751 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,202,663 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,226,155 UART: [afmc] --
19,230,620 UART: [cold-reset] --
19,234,329 UART: [state] Locking Datavault
19,240,777 UART: [state] Locking PCR0, PCR1 and PCR31
19,242,973 UART: [state] Locking ICCM
19,245,020 UART: [exit] Launching FMC @ 0x40000130
19,253,695 UART:
19,253,937 UART: Running Caliptra FMC ...
19,255,043 UART:
19,255,210 UART: [state] CFI Enabled
19,263,205 UART: [fht] FMC Alias Private Key: 7
21,030,146 UART: [art] Extend RT PCRs Done
21,031,373 UART: [art] Lock RT PCRs Done
21,032,973 UART: [art] Populate DV Done
21,038,662 UART: [fht] FMC Alias Private Key: 7
21,040,296 UART: [art] Derive CDI
21,041,148 UART: [art] Store in slot 0x4
21,084,072 UART: [art] Derive Key Pair
21,085,083 UART: [art] Store priv key in slot 0x5
23,512,184 UART: [art] Derive Key Pair - Done
23,525,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,231,665 UART: [art] Erasing AUTHORITY.KEYID = 7
25,233,171 UART: [art] PUB.X = EB8973E52470F95777B1F009081C0E2D0659004CD6C8576C06EDE4727ACB01535DA750EA0CA251F76826B35BF5F0A8B8
25,240,354 UART: [art] PUB.Y = C5E5C9C063D69672C9C0630C2F2DFD39D95E560D485AA9FC215F1C902F0E62E653B92221990D6396C74977AB4F1B38E7
25,247,632 UART: [art] SIG.R = 52C20A072E1A2B817F4FE3DE24B31DFD616B8C8D850C0F2295A43B78AE2143713FDF91F230C3A7497E5DF8C36B491166
25,255,024 UART: [art] SIG.S = 4DDB580D8238841346B4F24A720212865050EB27D220C3B84C93E614FD30850EEDAAF7EB890CFFB48A3E0D500AD0A9BC
26,234,240 UART: Caliptra RT
26,234,931 UART: [state] CFI Enabled
26,368,144 UART: [rt] RT listening for mailbox commands...
26,370,022 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,399,751 UART: [rt]cmd =0x46504c54, len=4
26,401,532 >>> mbox cmd response data (8 bytes)
26,403,115 UART: [rt] FIPS self test
26,404,074 UART: [kat] ++
26,404,583 UART: [kat] sha1
26,408,935 UART: [kat] SHA2-256
26,410,869 UART: [kat] SHA2-384
26,413,664 UART: [kat] SHA2-512-ACC
26,415,904 UART: [kat] ECC-384
28,839,826 UART: Fatal Error: 0x90040005
28,875,066 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,025,092 >>> mbox cmd response: failed
29,025,768 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,175,660 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,094 UART:
190,411 UART: Running Caliptra ROM ...
191,493 UART:
11,350,965 UART: [state] CFI Enabled
11,361,611 UART: [state] LifecycleState = Unprovisioned
11,363,971 UART: [state] DebugLocked = No
11,365,578 UART: [state] WD Timer not started. Device not locked for debugging
11,370,042 UART: [kat] SHA2-256
11,559,892 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,570,698 UART: [kat] ++
11,571,301 UART: [kat] sha1
11,583,226 UART: [kat] SHA2-256
11,586,243 UART: [kat] SHA2-384
11,591,806 UART: [kat] SHA2-512-ACC
11,594,388 UART: [kat] ECC-384
14,036,276 UART: [kat] HMAC-384Kdf
14,048,081 UART: [kat] LMS
14,579,927 UART: [kat] --
14,585,448 UART: [cold-reset] ++
14,587,219 UART: [fht] FHT @ 0x50003400
14,597,497 UART: [idev] ++
14,598,179 UART: [idev] CDI.KEYID = 6
14,599,201 UART: [idev] SUBJECT.KEYID = 7
14,600,307 UART: [idev] UDS.KEYID = 0
14,601,825 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,751,741 UART: [idev] Erasing UDS.KEYID = 0
17,078,623 UART: [idev] Sha1 KeyId Algorithm
17,102,458 UART: [idev] --
17,106,833 UART: [ldev] ++
17,107,517 UART: [ldev] CDI.KEYID = 6
17,108,404 UART: [ldev] SUBJECT.KEYID = 5
17,109,619 UART: [ldev] AUTHORITY.KEYID = 7
17,110,793 UART: [ldev] FE.KEYID = 1
17,120,174 UART: [ldev] Erasing FE.KEYID = 1
19,597,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,320,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,335,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,350,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,366,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,385,641 UART: [ldev] --
21,391,845 UART: [fwproc] Wait for Commands...
21,393,839 UART: [fwproc] Recv command 0x46574c44
21,396,114 UART: [fwproc] Recv'd Img size: 119428 bytes
24,900,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,975,423 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,099,057 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,664,751 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,756,914 ready_for_fw is high
3,757,565 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,064,780 >>> mbox cmd response: success
19,316,500 UART:
19,316,921 UART: Running Caliptra FMC ...
19,318,089 UART:
19,318,255 UART: [state] CFI Enabled
19,326,181 UART: [fht] FMC Alias Private Key: 7
21,092,001 UART: [art] Extend RT PCRs Done
21,093,249 UART: [art] Lock RT PCRs Done
21,094,887 UART: [art] Populate DV Done
21,100,386 UART: [fht] FMC Alias Private Key: 7
21,101,999 UART: [art] Derive CDI
21,102,824 UART: [art] Store in slot 0x4
21,145,694 UART: [art] Derive Key Pair
21,146,699 UART: [art] Store priv key in slot 0x5
23,573,362 UART: [art] Derive Key Pair - Done
23,586,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,292,619 UART: [art] Erasing AUTHORITY.KEYID = 7
25,294,136 UART: [art] PUB.X = E0ED093C59D2F1E817CAF34098021D50FD04280FEEA3EE098145E1C00C6B8DF72B38C5B9DC137C9824E112DD516D2655
25,301,381 UART: [art] PUB.Y = 696201C2057ECEE0E9DA097A6ED606A0CF3509F53239354A28361E116272194D11E14F69EBA4552E3BCAF3F4C97FE05D
25,308,607 UART: [art] SIG.R = E377933B5AC3A94DEA066EA21107A451824CB5307C8303DA64167624CD437A679CC59C4DC2EC99425153F2FED403469F
25,316,007 UART: [art] SIG.S = 3737006281F14EFC48D2F7EDCC198AF92CFE1F05540F6E830DFAD0146CFF35DD5EF7CAEE0C5ECB154E5EEE241EF485CF
26,294,467 UART: Caliptra RT
26,295,160 UART: [state] CFI Enabled
26,426,995 UART: [rt] RT listening for mailbox commands...
26,428,837 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,458,421 UART: [rt]cmd =0x46504c54, len=4
26,459,931 >>> mbox cmd response data (8 bytes)
26,460,715 UART: [rt] FIPS self test
26,461,662 UART: [kat] ++
26,462,116 UART: [kat] sha1
26,466,358 UART: [kat] SHA2-256
26,468,241 UART: [kat] SHA2-384
26,471,420 UART: [kat] SHA2-512-ACC
26,473,659 UART: [kat] ECC-384
28,897,648 UART: Fatal Error: 0x90040005
28,933,418 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,083,500 >>> mbox cmd response: failed
29,084,177 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,233,960 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
14,455,760 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,755,706 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,750 UART: [state] LifecycleState = Unprovisioned
85,405 UART: [state] DebugLocked = No
86,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,695 UART: [kat] SHA2-256
881,626 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,741 UART: [kat] ++
885,893 UART: [kat] sha1
890,119 UART: [kat] SHA2-256
892,057 UART: [kat] SHA2-384
894,718 UART: [kat] SHA2-512-ACC
896,619 UART: [kat] ECC-384
902,242 UART: [kat] HMAC-384Kdf
907,010 UART: [kat] LMS
1,475,206 UART: [kat] --
1,476,051 UART: [cold-reset] ++
1,476,477 UART: [fht] Storing FHT @ 0x50003400
1,479,420 UART: [idev] ++
1,479,588 UART: [idev] CDI.KEYID = 6
1,479,948 UART: [idev] SUBJECT.KEYID = 7
1,480,372 UART: [idev] UDS.KEYID = 0
1,480,717 ready_for_fw is high
1,480,717 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,332 UART: [idev] Erasing UDS.KEYID = 0
1,504,654 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,210 UART: [idev] --
1,514,135 UART: [ldev] ++
1,514,303 UART: [ldev] CDI.KEYID = 6
1,514,666 UART: [ldev] SUBJECT.KEYID = 5
1,515,092 UART: [ldev] AUTHORITY.KEYID = 7
1,515,555 UART: [ldev] FE.KEYID = 1
1,520,581 UART: [ldev] Erasing FE.KEYID = 1
1,545,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,416 UART: [ldev] --
1,584,925 UART: [fwproc] Waiting for Commands...
1,585,664 UART: [fwproc] Received command 0x46574c44
1,586,455 UART: [fwproc] Received Image of size 119428 bytes
2,941,547 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,841 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,059 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,756 >>> mbox cmd response: success
3,142,764 UART: [afmc] ++
3,142,932 UART: [afmc] CDI.KEYID = 6
3,143,294 UART: [afmc] SUBJECT.KEYID = 7
3,143,719 UART: [afmc] AUTHORITY.KEYID = 5
3,178,222 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,194,200 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,194,980 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,200,689 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,206,572 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,212,255 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,220,299 UART: [afmc] --
3,221,285 UART: [cold-reset] --
3,222,013 UART: [state] Locking Datavault
3,223,180 UART: [state] Locking PCR0, PCR1 and PCR31
3,223,784 UART: [state] Locking ICCM
3,224,242 UART: [exit] Launching FMC @ 0x40000130
3,229,572 UART:
3,229,588 UART: Running Caliptra FMC ...
3,229,996 UART:
3,230,050 UART: [state] CFI Enabled
3,240,364 UART: [fht] FMC Alias Private Key: 7
3,359,506 UART: [art] Extend RT PCRs Done
3,359,934 UART: [art] Lock RT PCRs Done
3,361,666 UART: [art] Populate DV Done
3,369,871 UART: [fht] FMC Alias Private Key: 7
3,370,817 UART: [art] Derive CDI
3,371,097 UART: [art] Store in slot 0x4
3,456,639 UART: [art] Derive Key Pair
3,456,999 UART: [art] Store priv key in slot 0x5
3,469,984 UART: [art] Derive Key Pair - Done
3,484,770 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,500,291 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,056 UART: [art] PUB.X = EB950841B8451F09FEA2F67521473A54B86EBC910B530C0C7988B5918CEED8D369C3295EE52CE6F21BA0AA831139A0E1
3,507,817 UART: [art] PUB.Y = B06049E0F4AC8CB6A1FE64E0A540D34C4E92FC118E3A302A72397B2DF77FF87956BA074923D7C54FD2402CF4DC094AD2
3,514,773 UART: [art] SIG.R = 9DD14B0EB249CB78D73863FD80DE13A90A6EAB78901E4E1E0731EF274C1307766BF187635BC6648543B354C20C4F9B89
3,521,530 UART: [art] SIG.S = 21AFEFF4FD4FEDF66849ECF564CBE85D9E38620FF4B1E81513144D06C55CF017EEE079FFFC44B484FCBA9B4D202ECCE5
3,545,366 UART: Caliptra RT
3,545,617 UART: [state] CFI Enabled
3,665,587 UART: [rt] RT listening for mailbox commands...
3,666,250 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,191 UART: [rt]cmd =0x46504c54, len=4
3,697,211 >>> mbox cmd response data (8 bytes)
3,697,574 UART: [rt] FIPS self test
3,697,902 UART: [kat] ++
3,698,054 UART: [kat] sha1
3,702,184 UART: [kat] SHA2-256
3,704,206 UART: [kat] SHA2-384
3,707,195 UART: [kat] SHA2-512-ACC
3,709,122 UART: [kat] ECC-384
3,717,939 UART: Fatal Error: 0x90040005
3,719,478 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,719,483 >>> mbox cmd response: failed
3,719,483 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,719,488 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Unprovisioned
85,511 UART: [state] DebugLocked = No
86,143 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,843 UART: [kat] SHA2-256
881,774 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,889 UART: [kat] ++
886,041 UART: [kat] sha1
890,351 UART: [kat] SHA2-256
892,289 UART: [kat] SHA2-384
895,062 UART: [kat] SHA2-512-ACC
896,963 UART: [kat] ECC-384
902,352 UART: [kat] HMAC-384Kdf
907,114 UART: [kat] LMS
1,475,310 UART: [kat] --
1,476,461 UART: [cold-reset] ++
1,476,835 UART: [fht] Storing FHT @ 0x50003400
1,479,692 UART: [idev] ++
1,479,860 UART: [idev] CDI.KEYID = 6
1,480,220 UART: [idev] SUBJECT.KEYID = 7
1,480,644 UART: [idev] UDS.KEYID = 0
1,480,989 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,460 UART: [idev] Erasing UDS.KEYID = 0
1,504,874 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,558 UART: [idev] --
1,514,479 UART: [ldev] ++
1,514,647 UART: [ldev] CDI.KEYID = 6
1,515,010 UART: [ldev] SUBJECT.KEYID = 5
1,515,436 UART: [ldev] AUTHORITY.KEYID = 7
1,515,899 UART: [ldev] FE.KEYID = 1
1,521,145 UART: [ldev] Erasing FE.KEYID = 1
1,546,380 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,388 UART: [ldev] --
1,585,879 UART: [fwproc] Waiting for Commands...
1,586,650 UART: [fwproc] Received command 0x46574c44
1,587,441 UART: [fwproc] Received Image of size 119428 bytes
2,943,297 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,849 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,067 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,606 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,005 ready_for_fw is high
1,362,005 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,232 >>> mbox cmd response: success
3,056,631 UART:
3,056,647 UART: Running Caliptra FMC ...
3,057,055 UART:
3,057,109 UART: [state] CFI Enabled
3,067,323 UART: [fht] FMC Alias Private Key: 7
3,186,015 UART: [art] Extend RT PCRs Done
3,186,443 UART: [art] Lock RT PCRs Done
3,188,389 UART: [art] Populate DV Done
3,196,676 UART: [fht] FMC Alias Private Key: 7
3,197,612 UART: [art] Derive CDI
3,197,892 UART: [art] Store in slot 0x4
3,283,670 UART: [art] Derive Key Pair
3,284,030 UART: [art] Store priv key in slot 0x5
3,296,905 UART: [art] Derive Key Pair - Done
3,311,744 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,682 UART: [art] PUB.X = 1B2FBA3DB2371F91B57AD5ECCC61493F465B6496078FF6B1D9F92356FEAF892BE6E1F2FA2E20EBC9C2F7AB084A73FE1E
3,334,470 UART: [art] PUB.Y = 31E3EA29A46B6BC59E6B17FF9E04FD96A096658C47E534F4492FEDC085C27DEF0D33E207AB98F1B18B5AFA95F1AE4972
3,341,427 UART: [art] SIG.R = 48B39F9429CB916B54F143D7DCB26CF59312FCF71651DD4CF9D63D688EA1E05D4EBEE1F1A22453629DF56A963DD1F19A
3,348,211 UART: [art] SIG.S = 99E98C9D71430934288878C7200C1300516030CADBE7A5B7E1CC068C5CC7DA3E801DCB72E33BB3547F36D669E6302823
3,372,062 UART: Caliptra RT
3,372,313 UART: [state] CFI Enabled
3,490,921 UART: [rt] RT listening for mailbox commands...
3,491,584 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,527 UART: [rt]cmd =0x46504c54, len=4
3,522,663 >>> mbox cmd response data (8 bytes)
3,522,804 UART: [rt] FIPS self test
3,523,132 UART: [kat] ++
3,523,284 UART: [kat] sha1
3,527,592 UART: [kat] SHA2-256
3,529,614 UART: [kat] SHA2-384
3,532,397 UART: [kat] SHA2-512-ACC
3,534,324 UART: [kat] ECC-384
3,543,307 UART: Fatal Error: 0x90040005
3,544,846 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,544,851 >>> mbox cmd response: failed
3,544,851 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,544,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,341 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,634 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,792 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,480 UART: [kat] SHA2-256
882,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,526 UART: [kat] ++
886,678 UART: [kat] sha1
890,960 UART: [kat] SHA2-256
892,898 UART: [kat] SHA2-384
895,633 UART: [kat] SHA2-512-ACC
897,534 UART: [kat] ECC-384
903,149 UART: [kat] HMAC-384Kdf
907,713 UART: [kat] LMS
1,475,909 UART: [kat] --
1,476,682 UART: [cold-reset] ++
1,477,012 UART: [fht] Storing FHT @ 0x50003400
1,479,847 UART: [idev] ++
1,480,015 UART: [idev] CDI.KEYID = 6
1,480,375 UART: [idev] SUBJECT.KEYID = 7
1,480,799 UART: [idev] UDS.KEYID = 0
1,481,144 ready_for_fw is high
1,481,144 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,041 UART: [idev] Erasing UDS.KEYID = 0
1,505,871 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,453 UART: [idev] --
1,515,308 UART: [ldev] ++
1,515,476 UART: [ldev] CDI.KEYID = 6
1,515,839 UART: [ldev] SUBJECT.KEYID = 5
1,516,265 UART: [ldev] AUTHORITY.KEYID = 7
1,516,728 UART: [ldev] FE.KEYID = 1
1,521,974 UART: [ldev] Erasing FE.KEYID = 1
1,547,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,009 UART: [ldev] --
1,586,296 UART: [fwproc] Waiting for Commands...
1,587,043 UART: [fwproc] Received command 0x46574c44
1,587,834 UART: [fwproc] Received Image of size 119428 bytes
2,941,994 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,238 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,456 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,187 >>> mbox cmd response: success
3,143,405 UART: [afmc] ++
3,143,573 UART: [afmc] CDI.KEYID = 6
3,143,935 UART: [afmc] SUBJECT.KEYID = 7
3,144,360 UART: [afmc] AUTHORITY.KEYID = 5
3,179,835 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,057 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,837 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,546 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,429 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,112 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,044 UART: [afmc] --
3,223,084 UART: [cold-reset] --
3,223,850 UART: [state] Locking Datavault
3,225,027 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,631 UART: [state] Locking ICCM
3,226,201 UART: [exit] Launching FMC @ 0x40000130
3,231,531 UART:
3,231,547 UART: Running Caliptra FMC ...
3,231,955 UART:
3,232,098 UART: [state] CFI Enabled
3,243,058 UART: [fht] FMC Alias Private Key: 7
3,362,360 UART: [art] Extend RT PCRs Done
3,362,788 UART: [art] Lock RT PCRs Done
3,364,058 UART: [art] Populate DV Done
3,372,421 UART: [fht] FMC Alias Private Key: 7
3,373,453 UART: [art] Derive CDI
3,373,733 UART: [art] Store in slot 0x4
3,459,449 UART: [art] Derive Key Pair
3,459,809 UART: [art] Store priv key in slot 0x5
3,472,986 UART: [art] Derive Key Pair - Done
3,487,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,189 UART: [art] PUB.X = 0E48A710E9789E4316B79066FC0DCCE3C0F521459924A54B8C0B07EAADD03C34406323D0346717A772F13B4EAAA4DE2A
3,510,953 UART: [art] PUB.Y = 66C5F1C0DDEC6228F211BFC04D6B24E9D1A6D1F12C8F9BB3426CC789C33995492B14BA686F5C5C8C4C3CFD29D6267572
3,517,915 UART: [art] SIG.R = E34200ADE767A48A7AABBAD7A330E3662A31CEBC63D5D7A98A40E756948ED2D694F4F4AA82A0DFE852BA4B4B17EB44F9
3,524,685 UART: [art] SIG.S = 1D1D0B785A30702BE031B73548D2013C097D1FB897BECEF279473EFD0EB174A4C69A1B756BF5A134D03C7F942D893ADE
3,548,647 UART: Caliptra RT
3,548,990 UART: [state] CFI Enabled
3,669,484 UART: [rt] RT listening for mailbox commands...
3,670,147 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,890 UART: [rt]cmd =0x46504c54, len=4
3,700,800 >>> mbox cmd response data (8 bytes)
3,700,971 UART: [rt] FIPS self test
3,701,299 UART: [kat] ++
3,701,451 UART: [kat] sha1
3,705,505 UART: [kat] SHA2-256
3,707,527 UART: [kat] SHA2-384
3,710,516 UART: [kat] SHA2-512-ACC
3,712,443 UART: [kat] ECC-384
3,721,520 UART: Fatal Error: 0x90040005
3,723,059 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,723,064 >>> mbox cmd response: failed
3,723,064 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,723,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,164 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,724 UART: [kat] SHA2-256
882,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,770 UART: [kat] ++
886,922 UART: [kat] sha1
891,282 UART: [kat] SHA2-256
893,220 UART: [kat] SHA2-384
895,941 UART: [kat] SHA2-512-ACC
897,842 UART: [kat] ECC-384
903,655 UART: [kat] HMAC-384Kdf
908,249 UART: [kat] LMS
1,476,445 UART: [kat] --
1,477,336 UART: [cold-reset] ++
1,477,842 UART: [fht] Storing FHT @ 0x50003400
1,480,641 UART: [idev] ++
1,480,809 UART: [idev] CDI.KEYID = 6
1,481,169 UART: [idev] SUBJECT.KEYID = 7
1,481,593 UART: [idev] UDS.KEYID = 0
1,481,938 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,349 UART: [idev] Erasing UDS.KEYID = 0
1,505,873 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,517 UART: [idev] --
1,515,722 UART: [ldev] ++
1,515,890 UART: [ldev] CDI.KEYID = 6
1,516,253 UART: [ldev] SUBJECT.KEYID = 5
1,516,679 UART: [ldev] AUTHORITY.KEYID = 7
1,517,142 UART: [ldev] FE.KEYID = 1
1,522,228 UART: [ldev] Erasing FE.KEYID = 1
1,546,713 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,607 UART: [ldev] --
1,586,016 UART: [fwproc] Waiting for Commands...
1,586,721 UART: [fwproc] Received command 0x46574c44
1,587,512 UART: [fwproc] Received Image of size 119428 bytes
2,943,180 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,452 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,670 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,229 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,722 ready_for_fw is high
1,362,722 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,911 >>> mbox cmd response: success
3,055,444 UART:
3,055,460 UART: Running Caliptra FMC ...
3,055,868 UART:
3,056,011 UART: [state] CFI Enabled
3,066,197 UART: [fht] FMC Alias Private Key: 7
3,185,499 UART: [art] Extend RT PCRs Done
3,185,927 UART: [art] Lock RT PCRs Done
3,187,557 UART: [art] Populate DV Done
3,195,640 UART: [fht] FMC Alias Private Key: 7
3,196,644 UART: [art] Derive CDI
3,196,924 UART: [art] Store in slot 0x4
3,282,654 UART: [art] Derive Key Pair
3,283,014 UART: [art] Store priv key in slot 0x5
3,296,459 UART: [art] Derive Key Pair - Done
3,311,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,143 UART: [art] PUB.X = BE7DF63A28C212023EF278EC09A915C17CE9C996EA6FD453F6E5A165EB221E206A54CC9F508613529786AB74EFC369C8
3,333,915 UART: [art] PUB.Y = 7252FF215DB38C0BC2F006BF8F6C100887DB4EC349A41F67506951A2964A4331C30297D3EFBD7510B68F3C44A16962AD
3,340,855 UART: [art] SIG.R = DFE474236F26B8798F304570E3C725AF1EF8989C327FF745578390DDFABE6181EF6AC97EAC307E43D934921630781CF3
3,347,627 UART: [art] SIG.S = 11DF852628D9C156E1AAFF418A9E82E086822573F1638B0A6A38D3E9E92FD3F06246F2E379A778956A5CF588A473F828
3,371,434 UART: Caliptra RT
3,371,777 UART: [state] CFI Enabled
3,491,915 UART: [rt] RT listening for mailbox commands...
3,492,578 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,473 UART: [rt]cmd =0x46504c54, len=4
3,523,713 >>> mbox cmd response data (8 bytes)
3,523,902 UART: [rt] FIPS self test
3,524,230 UART: [kat] ++
3,524,382 UART: [kat] sha1
3,528,628 UART: [kat] SHA2-256
3,530,650 UART: [kat] SHA2-384
3,533,663 UART: [kat] SHA2-512-ACC
3,535,590 UART: [kat] ECC-384
3,544,737 UART: Fatal Error: 0x90040005
3,546,276 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,546,281 >>> mbox cmd response: failed
3,546,281 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,546,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,630 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,401 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,107 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
890,952 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,056 UART: [kat] ++
895,208 UART: [kat] sha1
899,430 UART: [kat] SHA2-256
901,370 UART: [kat] SHA2-384
903,969 UART: [kat] SHA2-512-ACC
905,870 UART: [kat] ECC-384
915,529 UART: [kat] HMAC-384Kdf
920,125 UART: [kat] LMS
1,168,437 UART: [kat] --
1,169,286 UART: [cold-reset] ++
1,169,632 UART: [fht] FHT @ 0x50003400
1,172,318 UART: [idev] ++
1,172,486 UART: [idev] CDI.KEYID = 6
1,172,847 UART: [idev] SUBJECT.KEYID = 7
1,173,272 UART: [idev] UDS.KEYID = 0
1,173,618 ready_for_fw is high
1,173,618 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,959 UART: [idev] Erasing UDS.KEYID = 0
1,198,797 UART: [idev] Sha1 KeyId Algorithm
1,207,657 UART: [idev] --
1,208,600 UART: [ldev] ++
1,208,768 UART: [ldev] CDI.KEYID = 6
1,209,132 UART: [ldev] SUBJECT.KEYID = 5
1,209,559 UART: [ldev] AUTHORITY.KEYID = 7
1,210,022 UART: [ldev] FE.KEYID = 1
1,215,136 UART: [ldev] Erasing FE.KEYID = 1
1,241,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,146 UART: [ldev] --
1,280,443 UART: [fwproc] Wait for Commands...
1,281,094 UART: [fwproc] Recv command 0x46574c44
1,281,827 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,437 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,612 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,191 >>> mbox cmd response: success
2,837,299 UART: [afmc] ++
2,837,467 UART: [afmc] CDI.KEYID = 6
2,837,830 UART: [afmc] SUBJECT.KEYID = 7
2,838,256 UART: [afmc] AUTHORITY.KEYID = 5
2,873,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,620 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,369 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,079 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,960 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,661 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,456 UART: [afmc] --
2,917,289 UART: [cold-reset] --
2,918,073 UART: [state] Locking Datavault
2,919,218 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,822 UART: [state] Locking ICCM
2,920,338 UART: [exit] Launching FMC @ 0x40000130
2,925,668 UART:
2,925,684 UART: Running Caliptra FMC ...
2,926,092 UART:
2,926,146 UART: [state] CFI Enabled
2,936,766 UART: [fht] FMC Alias Private Key: 7
3,055,946 UART: [art] Extend RT PCRs Done
3,056,374 UART: [art] Lock RT PCRs Done
3,057,622 UART: [art] Populate DV Done
3,065,869 UART: [fht] FMC Alias Private Key: 7
3,066,963 UART: [art] Derive CDI
3,067,243 UART: [art] Store in slot 0x4
3,152,996 UART: [art] Derive Key Pair
3,153,356 UART: [art] Store priv key in slot 0x5
3,166,374 UART: [art] Derive Key Pair - Done
3,181,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,196,892 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,657 UART: [art] PUB.X = E37F04CD2296F2A15D96612FCCB4BF470F455372F5C27C1291A1C034FA5FA79B03DDB63959239F69050A1D007B533A7D
3,204,394 UART: [art] PUB.Y = D9C20C3559FBC6522EFDCAB58BF14B9EA9993D05CB639F6C3125406D1F8A7D4020557F61568346818BC40B048C92BA66
3,211,336 UART: [art] SIG.R = 3E2FA442F56B71D3600702D73240EB2300EDE5805E2875D1CE8940EFA82783923EAFA9203C1C91B67AE6337E17C770F6
3,218,078 UART: [art] SIG.S = 0D8107BE74664F1B525F4B0F4BEFC2DAB0D5B0F2A3D5C72D54C79A1DFF4E3B852DB1D615E0083346E25AF96C4BD1B9D4
3,241,842 UART: Caliptra RT
3,242,093 UART: [state] CFI Enabled
3,361,709 UART: [rt] RT listening for mailbox commands...
3,362,372 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,219 UART: [rt]cmd =0x46504c54, len=4
3,393,527 >>> mbox cmd response data (8 bytes)
3,393,710 UART: [rt] FIPS self test
3,394,038 UART: [kat] ++
3,394,190 UART: [kat] sha1
3,398,296 UART: [kat] SHA2-256
3,400,318 UART: [kat] SHA2-384
3,403,321 UART: [kat] SHA2-512-ACC
3,405,248 UART: [kat] ECC-384
3,414,453 UART: Fatal Error: 0x90040005
3,415,992 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,415,997 >>> mbox cmd response: failed
3,415,997 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,416,002 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,811 UART: [state] WD Timer not started. Device not locked for debugging
88,156 UART: [kat] SHA2-256
891,706 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,810 UART: [kat] ++
895,962 UART: [kat] sha1
900,304 UART: [kat] SHA2-256
902,244 UART: [kat] SHA2-384
904,865 UART: [kat] SHA2-512-ACC
906,766 UART: [kat] ECC-384
916,075 UART: [kat] HMAC-384Kdf
920,833 UART: [kat] LMS
1,169,145 UART: [kat] --
1,169,982 UART: [cold-reset] ++
1,170,528 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,174,506 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,321 UART: [idev] Erasing UDS.KEYID = 0
1,199,347 UART: [idev] Sha1 KeyId Algorithm
1,208,217 UART: [idev] --
1,209,138 UART: [ldev] ++
1,209,306 UART: [ldev] CDI.KEYID = 6
1,209,670 UART: [ldev] SUBJECT.KEYID = 5
1,210,097 UART: [ldev] AUTHORITY.KEYID = 7
1,210,560 UART: [ldev] FE.KEYID = 1
1,215,844 UART: [ldev] Erasing FE.KEYID = 1
1,242,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,316 UART: [ldev] --
1,281,759 UART: [fwproc] Wait for Commands...
1,282,372 UART: [fwproc] Recv command 0x46574c44
1,283,105 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,793 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,968 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,557 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,868 ready_for_fw is high
1,058,868 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,272 >>> mbox cmd response: success
2,751,007 UART:
2,751,023 UART: Running Caliptra FMC ...
2,751,431 UART:
2,751,485 UART: [state] CFI Enabled
2,761,865 UART: [fht] FMC Alias Private Key: 7
2,880,747 UART: [art] Extend RT PCRs Done
2,881,175 UART: [art] Lock RT PCRs Done
2,882,807 UART: [art] Populate DV Done
2,890,688 UART: [fht] FMC Alias Private Key: 7
2,891,672 UART: [art] Derive CDI
2,891,952 UART: [art] Store in slot 0x4
2,977,675 UART: [art] Derive Key Pair
2,978,035 UART: [art] Store priv key in slot 0x5
2,990,869 UART: [art] Derive Key Pair - Done
3,006,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,021,827 UART: [art] PUB.X = 273A95DB74168350FBBD436B361785AF6AC32554F00C8DC47C0B85B8564F105CAF4475BFC693D25DED63F34A878933C3
3,028,595 UART: [art] PUB.Y = 6802E01C6EE9DD986B4A19D8CA5C8066FB8273CA5E4D8188ABAA006BB503E0FA570D0EFBD3BA19C224B1FB0A6FEE86BA
3,035,534 UART: [art] SIG.R = 7ACB2ED020203F347B1BB43E7DA9E855E1D461AC994902210BC88FE8D0097BBFDCB63EECC4917947E477A04DAEB68087
3,042,309 UART: [art] SIG.S = E122849AD936841F8C5331E50029DE4B625F4D9E653D8781154BCAC6E0389962EE335A699DC9C63E06DF25989222B3B1
3,065,730 UART: Caliptra RT
3,065,981 UART: [state] CFI Enabled
3,185,732 UART: [rt] RT listening for mailbox commands...
3,186,395 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,216,256 UART: [rt]cmd =0x46504c54, len=4
3,217,432 >>> mbox cmd response data (8 bytes)
3,217,671 UART: [rt] FIPS self test
3,217,999 UART: [kat] ++
3,218,151 UART: [kat] sha1
3,222,411 UART: [kat] SHA2-256
3,224,433 UART: [kat] SHA2-384
3,227,394 UART: [kat] SHA2-512-ACC
3,229,321 UART: [kat] ECC-384
3,238,170 UART: Fatal Error: 0x90040005
3,239,709 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,239,714 >>> mbox cmd response: failed
3,239,714 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,239,719 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,784 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,876 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,997 UART: [state] LifecycleState = Unprovisioned
85,652 UART: [state] DebugLocked = No
86,340 UART: [state] WD Timer not started. Device not locked for debugging
87,561 UART: [kat] SHA2-256
891,111 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,589 UART: [kat] SHA2-256
901,529 UART: [kat] SHA2-384
904,084 UART: [kat] SHA2-512-ACC
905,985 UART: [kat] ECC-384
915,388 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,491 UART: [cold-reset] ++
1,169,937 UART: [fht] FHT @ 0x50003400
1,172,513 UART: [idev] ++
1,172,681 UART: [idev] CDI.KEYID = 6
1,173,042 UART: [idev] SUBJECT.KEYID = 7
1,173,467 UART: [idev] UDS.KEYID = 0
1,173,813 ready_for_fw is high
1,173,813 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,400 UART: [idev] Erasing UDS.KEYID = 0
1,198,718 UART: [idev] Sha1 KeyId Algorithm
1,207,548 UART: [idev] --
1,208,543 UART: [ldev] ++
1,208,711 UART: [ldev] CDI.KEYID = 6
1,209,075 UART: [ldev] SUBJECT.KEYID = 5
1,209,502 UART: [ldev] AUTHORITY.KEYID = 7
1,209,965 UART: [ldev] FE.KEYID = 1
1,215,167 UART: [ldev] Erasing FE.KEYID = 1
1,241,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,489 UART: [ldev] --
1,280,778 UART: [fwproc] Wait for Commands...
1,281,563 UART: [fwproc] Recv command 0x46574c44
1,282,296 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,697 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,400 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,575 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,068 >>> mbox cmd response: success
2,837,206 UART: [afmc] ++
2,837,374 UART: [afmc] CDI.KEYID = 6
2,837,737 UART: [afmc] SUBJECT.KEYID = 7
2,838,163 UART: [afmc] AUTHORITY.KEYID = 5
2,874,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,894 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,604 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,485 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,186 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,989 UART: [afmc] --
2,917,890 UART: [cold-reset] --
2,918,770 UART: [state] Locking Datavault
2,919,923 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,527 UART: [state] Locking ICCM
2,921,051 UART: [exit] Launching FMC @ 0x40000130
2,926,381 UART:
2,926,397 UART: Running Caliptra FMC ...
2,926,805 UART:
2,926,948 UART: [state] CFI Enabled
2,937,384 UART: [fht] FMC Alias Private Key: 7
3,055,910 UART: [art] Extend RT PCRs Done
3,056,338 UART: [art] Lock RT PCRs Done
3,057,882 UART: [art] Populate DV Done
3,066,177 UART: [fht] FMC Alias Private Key: 7
3,067,355 UART: [art] Derive CDI
3,067,635 UART: [art] Store in slot 0x4
3,153,506 UART: [art] Derive Key Pair
3,153,866 UART: [art] Store priv key in slot 0x5
3,167,470 UART: [art] Derive Key Pair - Done
3,182,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,612 UART: [art] PUB.X = B5DF858C6B70944C93BCDAEDABC381505C6275E7DE590D27D6803990B155476EB687C55253848771753CD0AE2355BC14
3,205,379 UART: [art] PUB.Y = 8E6E477192C278AA5D19C6F85C686C26BCB6DBEA788D5A97942869E88C6254DC74B7120D074A967F2BA3F98A628E08DB
3,212,326 UART: [art] SIG.R = E9FEE9DAE2DFCD69D47C759444324651A7882A91EC362EB6FD7BA6F962DDD77B3405A9B099CDA8B5EEDAD9F7FB9E26B5
3,219,119 UART: [art] SIG.S = 3F3E61B42113E3ADD60F4C034DE9783DEE9AF087A9913EAB2798767B37D21C98F656A1F1BB9AA426FD687D8117D467DF
3,243,087 UART: Caliptra RT
3,243,430 UART: [state] CFI Enabled
3,362,853 UART: [rt] RT listening for mailbox commands...
3,363,516 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,001 UART: [rt]cmd =0x46504c54, len=4
3,394,037 >>> mbox cmd response data (8 bytes)
3,394,184 UART: [rt] FIPS self test
3,394,512 UART: [kat] ++
3,394,664 UART: [kat] sha1
3,398,822 UART: [kat] SHA2-256
3,400,844 UART: [kat] SHA2-384
3,403,599 UART: [kat] SHA2-512-ACC
3,405,526 UART: [kat] ECC-384
3,414,457 UART: Fatal Error: 0x90040005
3,415,996 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,416,001 >>> mbox cmd response: failed
3,416,001 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,416,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
891,585 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,689 UART: [kat] ++
895,841 UART: [kat] sha1
899,945 UART: [kat] SHA2-256
901,885 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
916,390 UART: [kat] HMAC-384Kdf
921,048 UART: [kat] LMS
1,169,360 UART: [kat] --
1,170,401 UART: [cold-reset] ++
1,170,839 UART: [fht] FHT @ 0x50003400
1,173,409 UART: [idev] ++
1,173,577 UART: [idev] CDI.KEYID = 6
1,173,938 UART: [idev] SUBJECT.KEYID = 7
1,174,363 UART: [idev] UDS.KEYID = 0
1,174,709 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,378 UART: [idev] Erasing UDS.KEYID = 0
1,199,732 UART: [idev] Sha1 KeyId Algorithm
1,208,606 UART: [idev] --
1,209,729 UART: [ldev] ++
1,209,897 UART: [ldev] CDI.KEYID = 6
1,210,261 UART: [ldev] SUBJECT.KEYID = 5
1,210,688 UART: [ldev] AUTHORITY.KEYID = 7
1,211,151 UART: [ldev] FE.KEYID = 1
1,216,397 UART: [ldev] Erasing FE.KEYID = 1
1,242,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,025 UART: [ldev] --
1,281,236 UART: [fwproc] Wait for Commands...
1,281,865 UART: [fwproc] Recv command 0x46574c44
1,282,598 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,842 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,017 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,526 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,299 ready_for_fw is high
1,060,299 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,571 >>> mbox cmd response: success
2,752,072 UART:
2,752,088 UART: Running Caliptra FMC ...
2,752,496 UART:
2,752,639 UART: [state] CFI Enabled
2,763,151 UART: [fht] FMC Alias Private Key: 7
2,881,797 UART: [art] Extend RT PCRs Done
2,882,225 UART: [art] Lock RT PCRs Done
2,883,819 UART: [art] Populate DV Done
2,892,340 UART: [fht] FMC Alias Private Key: 7
2,893,282 UART: [art] Derive CDI
2,893,562 UART: [art] Store in slot 0x4
2,979,749 UART: [art] Derive Key Pair
2,980,109 UART: [art] Store priv key in slot 0x5
2,993,473 UART: [art] Derive Key Pair - Done
3,008,164 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,646 UART: [art] PUB.X = 9718354DE4C225E765524EC443B2CD9E5ADDC2A7FE218AB1ABB9A2587F3C35185FBD6E3B0E014313A1E7913E77AF21BA
3,031,424 UART: [art] PUB.Y = 8F83AEFE97E86893B2337D0AFDA5B6D77C9B422D189AC2AF1B0093C266334F174030D96D16CC7685E568DD737D5BF810
3,038,355 UART: [art] SIG.R = CF91351166DB44FFDF376F3B7718CC7661EDE13C51552F1C1FFE620275EBA2F8DB2668A6425AB0FFACB3C1CF7C8FA347
3,045,142 UART: [art] SIG.S = 70FEB9BD671E16B7966C324190BA218CEE896DDE8D687B86AB3DDA5CDBA4EFB34150CB25AFAC65AEAC8BA0F8516DF28E
3,069,648 UART: Caliptra RT
3,069,991 UART: [state] CFI Enabled
3,189,566 UART: [rt] RT listening for mailbox commands...
3,190,229 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,274 UART: [rt]cmd =0x46504c54, len=4
3,221,482 >>> mbox cmd response data (8 bytes)
3,221,651 UART: [rt] FIPS self test
3,221,979 UART: [kat] ++
3,222,131 UART: [kat] sha1
3,226,231 UART: [kat] SHA2-256
3,228,253 UART: [kat] SHA2-384
3,231,280 UART: [kat] SHA2-512-ACC
3,233,207 UART: [kat] ECC-384
3,241,762 UART: Fatal Error: 0x90040005
3,243,301 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,306 >>> mbox cmd response: failed
3,243,306 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,097 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,879 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
893,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,607 UART: [kat] ++
897,759 UART: [kat] sha1
902,171 UART: [kat] SHA2-256
904,111 UART: [kat] SHA2-384
906,692 UART: [kat] SHA2-512-ACC
908,593 UART: [kat] ECC-384
918,560 UART: [kat] HMAC-384Kdf
923,184 UART: [kat] LMS
1,171,512 UART: [kat] --
1,172,287 UART: [cold-reset] ++
1,172,809 UART: [fht] FHT @ 0x50003400
1,175,334 UART: [idev] ++
1,175,502 UART: [idev] CDI.KEYID = 6
1,175,862 UART: [idev] SUBJECT.KEYID = 7
1,176,286 UART: [idev] UDS.KEYID = 0
1,176,631 ready_for_fw is high
1,176,631 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,170 UART: [idev] Erasing UDS.KEYID = 0
1,200,707 UART: [idev] Sha1 KeyId Algorithm
1,209,263 UART: [idev] --
1,210,167 UART: [ldev] ++
1,210,335 UART: [ldev] CDI.KEYID = 6
1,210,698 UART: [ldev] SUBJECT.KEYID = 5
1,211,124 UART: [ldev] AUTHORITY.KEYID = 7
1,211,587 UART: [ldev] FE.KEYID = 1
1,216,629 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,917 UART: [ldev] --
1,282,264 UART: [fwproc] Wait for Commands...
1,282,966 UART: [fwproc] Recv command 0x46574c44
1,283,694 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,220 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,390 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,929 >>> mbox cmd response: success
2,839,035 UART: [afmc] ++
2,839,203 UART: [afmc] CDI.KEYID = 6
2,839,565 UART: [afmc] SUBJECT.KEYID = 7
2,839,990 UART: [afmc] AUTHORITY.KEYID = 5
2,875,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,722 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,470 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,179 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,062 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,763 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,573 UART: [afmc] --
2,918,501 UART: [cold-reset] --
2,919,351 UART: [state] Locking Datavault
2,920,554 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,158 UART: [state] Locking ICCM
2,921,706 UART: [exit] Launching FMC @ 0x40000130
2,927,036 UART:
2,927,052 UART: Running Caliptra FMC ...
2,927,460 UART:
2,927,514 UART: [state] CFI Enabled
2,937,978 UART: [fht] FMC Alias Private Key: 7
3,056,424 UART: [art] Extend RT PCRs Done
3,056,852 UART: [art] Lock RT PCRs Done
3,058,612 UART: [art] Populate DV Done
3,066,935 UART: [fht] FMC Alias Private Key: 7
3,068,109 UART: [art] Derive CDI
3,068,389 UART: [art] Store in slot 0x4
3,153,924 UART: [art] Derive Key Pair
3,154,284 UART: [art] Store priv key in slot 0x5
3,167,838 UART: [art] Derive Key Pair - Done
3,182,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,619 UART: [art] PUB.X = 4ABFBDFDB315BA81181060EC02347DD451AE5B0EB9D4BC9C482832197756CFBF745E4A186EC398883F01414471482C57
3,205,384 UART: [art] PUB.Y = 1F069E5983B71D5F9C7FC3A75B9AF6D7B1581A0FD975E20E1FDEC3E73EBCBD3C1D4B7CDA2B861540186A97AEE3269A79
3,212,345 UART: [art] SIG.R = 1B5B6806E377A76E8E323A65E2FB1F2AAEA7661B1FE07329BE2E8D62486188A011E66CCDE867F6D93DACD422FB7C3EE9
3,219,128 UART: [art] SIG.S = BA9C157783B6DEF0A53D233C05C83F29A25F1F437CB40F3A1D1432F0257A565FE25135C145B63BD23AEF76B720B53992
3,242,720 UART: Caliptra RT
3,242,971 UART: [state] CFI Enabled
3,361,674 UART: [rt] RT listening for mailbox commands...
3,362,337 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,928 UART: [rt]cmd =0x46504c54, len=4
3,393,176 >>> mbox cmd response data (8 bytes)
3,393,535 UART: [rt] FIPS self test
3,393,863 UART: [kat] ++
3,394,015 UART: [kat] sha1
3,398,305 UART: [kat] SHA2-256
3,400,327 UART: [kat] SHA2-384
3,403,316 UART: [kat] SHA2-512-ACC
3,405,243 UART: [kat] ECC-384
3,414,104 UART: Fatal Error: 0x90040005
3,415,643 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,415,648 >>> mbox cmd response: failed
3,415,648 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,415,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,538 UART: [state] LifecycleState = Unprovisioned
86,193 UART: [state] DebugLocked = No
86,825 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
893,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,707 UART: [kat] ++
897,859 UART: [kat] sha1
902,097 UART: [kat] SHA2-256
904,037 UART: [kat] SHA2-384
906,562 UART: [kat] SHA2-512-ACC
908,463 UART: [kat] ECC-384
918,230 UART: [kat] HMAC-384Kdf
922,788 UART: [kat] LMS
1,171,116 UART: [kat] --
1,172,017 UART: [cold-reset] ++
1,172,405 UART: [fht] FHT @ 0x50003400
1,175,226 UART: [idev] ++
1,175,394 UART: [idev] CDI.KEYID = 6
1,175,754 UART: [idev] SUBJECT.KEYID = 7
1,176,178 UART: [idev] UDS.KEYID = 0
1,176,523 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,266 UART: [idev] Erasing UDS.KEYID = 0
1,200,799 UART: [idev] Sha1 KeyId Algorithm
1,209,403 UART: [idev] --
1,210,371 UART: [ldev] ++
1,210,539 UART: [ldev] CDI.KEYID = 6
1,210,902 UART: [ldev] SUBJECT.KEYID = 5
1,211,328 UART: [ldev] AUTHORITY.KEYID = 7
1,211,791 UART: [ldev] FE.KEYID = 1
1,216,961 UART: [ldev] Erasing FE.KEYID = 1
1,242,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,612 UART: [fwproc] Recv command 0x46574c44
1,283,340 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,196 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,366 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,061 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,685 ready_for_fw is high
1,060,685 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,558 >>> mbox cmd response: success
2,753,095 UART:
2,753,111 UART: Running Caliptra FMC ...
2,753,519 UART:
2,753,573 UART: [state] CFI Enabled
2,764,135 UART: [fht] FMC Alias Private Key: 7
2,882,819 UART: [art] Extend RT PCRs Done
2,883,247 UART: [art] Lock RT PCRs Done
2,884,553 UART: [art] Populate DV Done
2,892,702 UART: [fht] FMC Alias Private Key: 7
2,893,670 UART: [art] Derive CDI
2,893,950 UART: [art] Store in slot 0x4
2,979,477 UART: [art] Derive Key Pair
2,979,837 UART: [art] Store priv key in slot 0x5
2,993,169 UART: [art] Derive Key Pair - Done
3,007,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,361 UART: [art] PUB.X = C38E5BBD9E44E36814FCB387BF153A8AEE2631BC1FA33640739D8704CA298A71ED8D5DC22F7F6CCAFD6C002A4BB34D27
3,031,126 UART: [art] PUB.Y = 8410AC0A32364C493C27E61F41DA5E05E1FDB18FD8FA4EF6334D312594B05281AE965C0824AA56E30B03B46B02F29B12
3,038,062 UART: [art] SIG.R = 776EA88EE63928D8E92C2651DC7388858B665503B90400F477EFF65EEC5257DFF7E1920DF0023EFEF83776858E314836
3,044,794 UART: [art] SIG.S = D69C788B3C74AD100ACB6549AF6C21CC82AA41150354F0232E4FEF6F4B4801DBFA3596736CC22D2FD66E07C32BEAC4B0
3,068,432 UART: Caliptra RT
3,068,683 UART: [state] CFI Enabled
3,188,636 UART: [rt] RT listening for mailbox commands...
3,189,299 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,756 UART: [rt]cmd =0x46504c54, len=4
3,219,900 >>> mbox cmd response data (8 bytes)
3,220,033 UART: [rt] FIPS self test
3,220,361 UART: [kat] ++
3,220,513 UART: [kat] sha1
3,224,651 UART: [kat] SHA2-256
3,226,673 UART: [kat] SHA2-384
3,229,418 UART: [kat] SHA2-512-ACC
3,231,345 UART: [kat] ECC-384
3,240,348 UART: Fatal Error: 0x90040005
3,241,887 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,241,892 >>> mbox cmd response: failed
3,241,892 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,241,897 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,235 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,526 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,011 UART: [state] LifecycleState = Unprovisioned
85,666 UART: [state] DebugLocked = No
86,172 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
893,117 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,242 UART: [kat] ++
897,394 UART: [kat] sha1
901,760 UART: [kat] SHA2-256
903,700 UART: [kat] SHA2-384
906,243 UART: [kat] SHA2-512-ACC
908,144 UART: [kat] ECC-384
917,931 UART: [kat] HMAC-384Kdf
922,621 UART: [kat] LMS
1,170,949 UART: [kat] --
1,171,784 UART: [cold-reset] ++
1,172,338 UART: [fht] FHT @ 0x50003400
1,175,087 UART: [idev] ++
1,175,255 UART: [idev] CDI.KEYID = 6
1,175,615 UART: [idev] SUBJECT.KEYID = 7
1,176,039 UART: [idev] UDS.KEYID = 0
1,176,384 ready_for_fw is high
1,176,384 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,135 UART: [idev] Erasing UDS.KEYID = 0
1,201,020 UART: [idev] Sha1 KeyId Algorithm
1,209,560 UART: [idev] --
1,210,728 UART: [ldev] ++
1,210,896 UART: [ldev] CDI.KEYID = 6
1,211,259 UART: [ldev] SUBJECT.KEYID = 5
1,211,685 UART: [ldev] AUTHORITY.KEYID = 7
1,212,148 UART: [ldev] FE.KEYID = 1
1,217,428 UART: [ldev] Erasing FE.KEYID = 1
1,243,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,368 UART: [ldev] --
1,282,865 UART: [fwproc] Wait for Commands...
1,283,615 UART: [fwproc] Recv command 0x46574c44
1,284,343 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,889 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,059 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,720 >>> mbox cmd response: success
2,839,728 UART: [afmc] ++
2,839,896 UART: [afmc] CDI.KEYID = 6
2,840,258 UART: [afmc] SUBJECT.KEYID = 7
2,840,683 UART: [afmc] AUTHORITY.KEYID = 5
2,875,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,997 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,706 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,589 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,290 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,228 UART: [afmc] --
2,919,288 UART: [cold-reset] --
2,920,298 UART: [state] Locking Datavault
2,921,203 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,807 UART: [state] Locking ICCM
2,922,283 UART: [exit] Launching FMC @ 0x40000130
2,927,613 UART:
2,927,629 UART: Running Caliptra FMC ...
2,928,037 UART:
2,928,180 UART: [state] CFI Enabled
2,938,952 UART: [fht] FMC Alias Private Key: 7
3,057,904 UART: [art] Extend RT PCRs Done
3,058,332 UART: [art] Lock RT PCRs Done
3,059,782 UART: [art] Populate DV Done
3,068,023 UART: [fht] FMC Alias Private Key: 7
3,068,999 UART: [art] Derive CDI
3,069,279 UART: [art] Store in slot 0x4
3,154,782 UART: [art] Derive Key Pair
3,155,142 UART: [art] Store priv key in slot 0x5
3,168,526 UART: [art] Derive Key Pair - Done
3,183,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,617 UART: [art] PUB.X = 341AE7A39EBE23A44B3D4BE38DB821E7A179A0A13CB0709D5A9C8335B53AF65A40204CE9628A40CB87653AE8F289692A
3,206,395 UART: [art] PUB.Y = E896BDBA0B14A6725BEFEF69DA493A1A4AF2E676A7E3DA39CA737122D356CD77A55B7420BDDF69452784644A08567F2E
3,213,351 UART: [art] SIG.R = 3BA8EDF2B82363EC1041A32568A91B620A53D3BAB6904618A11CC3E5ED49413B47AB2DDD6971EC7F7E1F91A0EA8411BD
3,220,132 UART: [art] SIG.S = 90001CAC757E56FFEC19B0A0F607AAF608FD6CAEA57E4E81F2C5C0FB01370A1223F74BAB4CB376535365195E66C73F2D
3,243,958 UART: Caliptra RT
3,244,301 UART: [state] CFI Enabled
3,364,440 UART: [rt] RT listening for mailbox commands...
3,365,103 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,132 UART: [rt]cmd =0x46504c54, len=4
3,396,306 >>> mbox cmd response data (8 bytes)
3,396,633 UART: [rt] FIPS self test
3,396,961 UART: [kat] ++
3,397,113 UART: [kat] sha1
3,401,271 UART: [kat] SHA2-256
3,403,293 UART: [kat] SHA2-384
3,406,226 UART: [kat] SHA2-512-ACC
3,408,153 UART: [kat] ECC-384
3,417,174 UART: Fatal Error: 0x90040005
3,418,713 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,418,718 >>> mbox cmd response: failed
3,418,718 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,418,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,593 UART: [kat] SHA2-256
893,243 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,368 UART: [kat] ++
897,520 UART: [kat] sha1
901,868 UART: [kat] SHA2-256
903,808 UART: [kat] SHA2-384
906,531 UART: [kat] SHA2-512-ACC
908,432 UART: [kat] ECC-384
918,217 UART: [kat] HMAC-384Kdf
922,829 UART: [kat] LMS
1,171,157 UART: [kat] --
1,172,064 UART: [cold-reset] ++
1,172,598 UART: [fht] FHT @ 0x50003400
1,175,375 UART: [idev] ++
1,175,543 UART: [idev] CDI.KEYID = 6
1,175,903 UART: [idev] SUBJECT.KEYID = 7
1,176,327 UART: [idev] UDS.KEYID = 0
1,176,672 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,281 UART: [idev] Erasing UDS.KEYID = 0
1,201,540 UART: [idev] Sha1 KeyId Algorithm
1,209,814 UART: [idev] --
1,210,850 UART: [ldev] ++
1,211,018 UART: [ldev] CDI.KEYID = 6
1,211,381 UART: [ldev] SUBJECT.KEYID = 5
1,211,807 UART: [ldev] AUTHORITY.KEYID = 7
1,212,270 UART: [ldev] FE.KEYID = 1
1,217,736 UART: [ldev] Erasing FE.KEYID = 1
1,243,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,114 UART: [ldev] --
1,283,535 UART: [fwproc] Wait for Commands...
1,284,229 UART: [fwproc] Recv command 0x46574c44
1,284,957 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,307 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,477 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,008 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,104 ready_for_fw is high
1,061,104 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,791 >>> mbox cmd response: success
2,754,830 UART:
2,754,846 UART: Running Caliptra FMC ...
2,755,254 UART:
2,755,397 UART: [state] CFI Enabled
2,766,015 UART: [fht] FMC Alias Private Key: 7
2,885,309 UART: [art] Extend RT PCRs Done
2,885,737 UART: [art] Lock RT PCRs Done
2,887,087 UART: [art] Populate DV Done
2,895,348 UART: [fht] FMC Alias Private Key: 7
2,896,524 UART: [art] Derive CDI
2,896,804 UART: [art] Store in slot 0x4
2,982,749 UART: [art] Derive Key Pair
2,983,109 UART: [art] Store priv key in slot 0x5
2,996,321 UART: [art] Derive Key Pair - Done
3,010,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,338 UART: [art] PUB.X = DA7274088D72169AFF7E597F53335A2A5A63A0CCA9026CDFE5844473F6155C148541AE15F272B4B9F34CD2D3D377992C
3,034,104 UART: [art] PUB.Y = 18196202881186B605D437E9F20786AB372319E2811696EC95B082CC686C02B0F0A87FB332CA63BF4F4628A2F08B243E
3,041,034 UART: [art] SIG.R = 6E930B424509A94B6D0D7ED83F4E0596B39882A5A6E21C06B59795D385C9073EAE3670EF02FE5227B3993F7A4C5F63D0
3,047,783 UART: [art] SIG.S = C6A7962E34256194BC2FDE3E81FC1B5D19B3B1808B12268ED1C99858FDCA354EF2F7EFC067CF67FA62A6F5F60B190D09
3,071,392 UART: Caliptra RT
3,071,735 UART: [state] CFI Enabled
3,191,602 UART: [rt] RT listening for mailbox commands...
3,192,265 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,130 UART: [rt]cmd =0x46504c54, len=4
3,223,118 >>> mbox cmd response data (8 bytes)
3,223,473 UART: [rt] FIPS self test
3,223,801 UART: [kat] ++
3,223,953 UART: [kat] sha1
3,228,243 UART: [kat] SHA2-256
3,230,265 UART: [kat] SHA2-384
3,233,138 UART: [kat] SHA2-512-ACC
3,235,065 UART: [kat] ECC-384
3,243,782 UART: Fatal Error: 0x90040005
3,245,321 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,245,326 >>> mbox cmd response: failed
3,245,326 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,245,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,604 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,163 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,443,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,593,067 >>> mbox cmd response: failed
3,593,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,742,363 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,429,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,288,983 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
3,437,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,589,483 >>> mbox cmd response: failed
3,590,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,738,966 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,462,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,293,253 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,677 writing to cptra_bootfsm_go
3,793,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,799 >>> mbox cmd response: failed
3,944,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,093,248 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
19,543,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,254,132 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,794,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,969 >>> mbox cmd response: failed
3,944,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,093,263 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
19,552,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,263,508 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,436,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,586,041 >>> mbox cmd response: failed
3,586,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,735,691 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,442,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,271,666 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,440,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,589,954 >>> mbox cmd response: failed
3,590,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,739,392 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,434,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,246,776 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,779,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,929,494 >>> mbox cmd response: failed
3,930,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,078,918 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
19,566,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,275,479 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,980 writing to cptra_bootfsm_go
3,790,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,517 >>> mbox cmd response: failed
3,941,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,089,954 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
19,555,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,268,583 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
819,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,657 >>> mbox cmd response: failed
819,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,036 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
819,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,985 >>> mbox cmd response: failed
819,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,991 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,812 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
820,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,472 >>> mbox cmd response: failed
820,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,911 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
821,074 >>> mbox cmd response: failed
821,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
821,080 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,377 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
820,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,625 >>> mbox cmd response: failed
820,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,631 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,792 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
819,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,731 >>> mbox cmd response: failed
819,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,737 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,866 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
819,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,952 >>> mbox cmd response: failed
819,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,031 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
820,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,510 >>> mbox cmd response: failed
820,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,516 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,505 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,176 UART:
192,537 UART: Running Caliptra ROM ...
193,741 UART:
193,895 UART: [state] CFI Enabled
259,505 UART: [state] LifecycleState = Unprovisioned
261,473 UART: [state] DebugLocked = No
263,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,381 UART: [kat] SHA2-256
437,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,566 UART: [kat] ++
448,107 UART: [kat] sha1
457,996 UART: [kat] SHA2-256
460,673 UART: [kat] SHA2-384
467,837 UART: [kat] SHA2-512-ACC
470,177 UART: [kat] ECC-384
2,765,798 UART: [kat] HMAC-384Kdf
2,797,314 UART: [kat] LMS
3,987,620 UART: [kat] --
3,991,917 UART: [cold-reset] ++
3,993,292 UART: [fht] Storing FHT @ 0x50003400
4,004,350 UART: [idev] ++
4,004,931 UART: [idev] CDI.KEYID = 6
4,005,823 UART: [idev] SUBJECT.KEYID = 7
4,007,084 UART: [idev] UDS.KEYID = 0
4,008,084 ready_for_fw is high
4,008,305 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,158,494 UART: [idev] Erasing UDS.KEYID = 0
7,344,054 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,117 UART: [idev] --
7,368,251 UART: [ldev] ++
7,368,820 UART: [ldev] CDI.KEYID = 6
7,369,789 UART: [ldev] SUBJECT.KEYID = 5
7,371,006 UART: [ldev] AUTHORITY.KEYID = 7
7,372,242 UART: [ldev] FE.KEYID = 1
7,399,809 UART: [ldev] Erasing FE.KEYID = 1
10,730,879 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,231 UART: [ldev] --
13,113,649 UART: [fwproc] Waiting for Commands...
13,116,732 UART: [fwproc] Received command 0x46574c44
13,118,923 UART: [fwproc] Received Image of size 119428 bytes
17,233,231 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,306,081 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,379,255 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,710,431 >>> mbox cmd response: success
17,713,970 UART: [afmc] ++
17,714,570 UART: [afmc] CDI.KEYID = 6
17,715,482 UART: [afmc] SUBJECT.KEYID = 7
17,716,702 UART: [afmc] AUTHORITY.KEYID = 5
21,089,872 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,388,270 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,390,538 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,404,964 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,419,701 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,434,145 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,456,898 UART: [afmc] --
23,461,207 UART: [cold-reset] --
23,463,854 UART: [state] Locking Datavault
23,468,458 UART: [state] Locking PCR0, PCR1 and PCR31
23,470,160 UART: [state] Locking ICCM
23,471,664 UART: [exit] Launching FMC @ 0x40000130
23,480,064 UART:
23,480,305 UART: Running Caliptra FMC ...
23,481,408 UART:
23,481,570 UART: [state] CFI Enabled
23,548,265 UART: [fht] FMC Alias Private Key: 7
25,889,024 UART: [art] Extend RT PCRs Done
25,890,249 UART: [art] Lock RT PCRs Done
25,892,039 UART: [art] Populate DV Done
25,897,519 UART: [fht] FMC Alias Private Key: 7
25,899,278 UART: [art] Derive CDI
25,900,017 UART: [art] Store in slot 0x4
25,957,224 UART: [art] Derive Key Pair
25,958,285 UART: [art] Store priv key in slot 0x5
29,250,696 UART: [art] Derive Key Pair - Done
29,264,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,267 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,783 UART: [art] PUB.X = 3A628EA7D4B49BC81DE746AC428088DF44959CE9BC8B60E103201A2218B7D1B4BB4945B46B4CBE820D99E5AE48CA48F2
31,562,035 UART: [art] PUB.Y = E886CC669D23B75CE285854E9D2FB9D7C82256F39ED7E26822FD1E8A803960C91B8161329608BF024F21F0746A1E9CFD
31,569,274 UART: [art] SIG.R = 508DFC3FB967AAA25445F89AFE6C1A56AEE099970E5DE2DC6C7591B723A4DB50F185BF64A0FB2061312D040E3ADDEB1C
31,576,728 UART: [art] SIG.S = 74E691E4A712F74D655C59BD3F373AC2F4B17BCCF9A2463B6BDD0012B52A1759D886996F7540CE869E2A344EC7C691CC
32,881,850 UART: Caliptra RT
32,882,551 UART: [state] CFI Enabled
33,060,247 UART: [rt] RT listening for mailbox commands...
33,062,102 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,091,789 UART: [rt]cmd =0x46504c54, len=4
33,093,478 >>> mbox cmd response data (8 bytes)
33,094,734 UART: [rt] FIPS self test
33,095,683 UART: [kat] ++
33,096,158 UART: [kat] sha1
33,100,568 UART: [kat] SHA2-256
33,102,504 UART: [kat] SHA2-384
33,105,422 UART: [kat] SHA2-512-ACC
33,107,674 UART: [kat] ECC-384
34,082,352 UART: Fatal Error: 0x90040004
34,117,635 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,267,649 >>> mbox cmd response: failed
34,268,262 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,418,154 >>> mbox cmd response: failed
Initializing fuses
936 writing to cptra_bootfsm_go
190,023 UART:
190,313 UART: Running Caliptra ROM ...
191,339 UART:
191,479 UART: [state] CFI Enabled
247,892 UART: [state] LifecycleState = Unprovisioned
249,816 UART: [state] DebugLocked = No
251,117 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
256,762 UART: [kat] SHA2-256
426,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
436,957 UART: [kat] ++
437,403 UART: [kat] sha1
447,203 UART: [kat] SHA2-256
449,876 UART: [kat] SHA2-384
454,725 UART: [kat] SHA2-512-ACC
457,081 UART: [kat] ECC-384
2,753,722 UART: [kat] HMAC-384Kdf
2,784,352 UART: [kat] LMS
3,974,675 UART: [kat] --
3,978,202 UART: [cold-reset] ++
3,980,789 UART: [fht] Storing FHT @ 0x50003400
3,992,346 UART: [idev] ++
3,992,913 UART: [idev] CDI.KEYID = 6
3,993,883 UART: [idev] SUBJECT.KEYID = 7
3,995,098 UART: [idev] UDS.KEYID = 0
3,996,724 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,146,793 UART: [idev] Erasing UDS.KEYID = 0
7,332,462 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,411 UART: [idev] --
7,356,929 UART: [ldev] ++
7,357,496 UART: [ldev] CDI.KEYID = 6
7,358,461 UART: [ldev] SUBJECT.KEYID = 5
7,359,676 UART: [ldev] AUTHORITY.KEYID = 7
7,360,910 UART: [ldev] FE.KEYID = 1
7,406,776 UART: [ldev] Erasing FE.KEYID = 1
10,740,458 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,983 UART: [ldev] --
13,121,250 UART: [fwproc] Waiting for Commands...
13,123,350 UART: [fwproc] Received command 0x46574c44
13,125,593 UART: [fwproc] Received Image of size 119428 bytes
17,244,460 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,980 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,392,159 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,724,049 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,803,003 ready_for_fw is high
3,803,932 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,968,524 >>> mbox cmd response: success
23,675,107 UART:
23,675,551 UART: Running Caliptra FMC ...
23,676,673 UART:
23,676,828 UART: [state] CFI Enabled
23,743,306 UART: [fht] FMC Alias Private Key: 7
26,105,119 UART: [art] Extend RT PCRs Done
26,106,356 UART: [art] Lock RT PCRs Done
26,108,073 UART: [art] Populate DV Done
26,113,557 UART: [fht] FMC Alias Private Key: 7
26,115,231 UART: [art] Derive CDI
26,115,974 UART: [art] Store in slot 0x4
26,173,293 UART: [art] Derive Key Pair
26,174,337 UART: [art] Store priv key in slot 0x5
29,467,646 UART: [art] Derive Key Pair - Done
29,480,655 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,768,143 UART: [art] Erasing AUTHORITY.KEYID = 7
31,769,662 UART: [art] PUB.X = 714F0DE4D29888265ACCFCA428F1476B81ED758E5E9BE390B60B844A3452B1BB0A937C22DDEE766A70D5B178F4491BFD
31,776,982 UART: [art] PUB.Y = B3CA5678B1FAD356411AEF26AA79AF2FE57B28C6550CE13994661BDFD5995BBA89CA09D465B102737576355FC8B4FFF4
31,784,233 UART: [art] SIG.R = 33614956C67D631009A93CC40EE389DA3A5B5885C92CB4DEF3527965D0CAF2150A47B5C9C02DF403F159CBD2C4F18B47
31,791,591 UART: [art] SIG.S = E39E58B683A1DF01D489858DD39F8084F13C7E3F60B0850B4D3616A0D68903B083F71595DB32430A44E08313660428F1
33,096,960 UART: Caliptra RT
33,097,679 UART: [state] CFI Enabled
33,273,770 UART: [rt] RT listening for mailbox commands...
33,275,628 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,305,479 UART: [rt]cmd =0x46504c54, len=4
33,307,127 >>> mbox cmd response data (8 bytes)
33,308,470 UART: [rt] FIPS self test
33,309,413 UART: [kat] ++
33,309,861 UART: [kat] sha1
33,314,427 UART: [kat] SHA2-256
33,316,305 UART: [kat] SHA2-384
33,319,192 UART: [kat] SHA2-512-ACC
33,321,482 UART: [kat] ECC-384
34,296,836 UART: Fatal Error: 0x90040004
34,332,279 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,482,324 >>> mbox cmd response: failed
34,482,994 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,632,885 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,770,482 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,965,222 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,596 UART:
192,973 UART: Running Caliptra ROM ...
194,107 UART:
603,776 UART: [state] CFI Enabled
617,727 UART: [state] LifecycleState = Unprovisioned
619,608 UART: [state] DebugLocked = No
622,144 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,242 UART: [kat] SHA2-256
796,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,492 UART: [kat] ++
807,990 UART: [kat] sha1
819,798 UART: [kat] SHA2-256
822,461 UART: [kat] SHA2-384
829,262 UART: [kat] SHA2-512-ACC
831,660 UART: [kat] ECC-384
3,117,415 UART: [kat] HMAC-384Kdf
3,128,492 UART: [kat] LMS
4,318,634 UART: [kat] --
4,321,949 UART: [cold-reset] ++
4,323,751 UART: [fht] Storing FHT @ 0x50003400
4,335,382 UART: [idev] ++
4,335,955 UART: [idev] CDI.KEYID = 6
4,336,868 UART: [idev] SUBJECT.KEYID = 7
4,338,128 UART: [idev] UDS.KEYID = 0
4,339,179 ready_for_fw is high
4,339,411 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,489,390 UART: [idev] Erasing UDS.KEYID = 0
7,626,780 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,887 UART: [idev] --
7,649,606 UART: [ldev] ++
7,650,204 UART: [ldev] CDI.KEYID = 6
7,651,130 UART: [ldev] SUBJECT.KEYID = 5
7,652,355 UART: [ldev] AUTHORITY.KEYID = 7
7,653,598 UART: [ldev] FE.KEYID = 1
7,665,383 UART: [ldev] Erasing FE.KEYID = 1
10,952,145 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,508 UART: [ldev] --
13,312,949 UART: [fwproc] Waiting for Commands...
13,315,751 UART: [fwproc] Received command 0x46574c44
13,317,951 UART: [fwproc] Received Image of size 119428 bytes
17,437,627 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,519,721 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,592,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,923,777 >>> mbox cmd response: success
17,928,171 UART: [afmc] ++
17,928,774 UART: [afmc] CDI.KEYID = 6
17,929,687 UART: [afmc] SUBJECT.KEYID = 7
17,930,910 UART: [afmc] AUTHORITY.KEYID = 5
21,246,265 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,542,247 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,544,508 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,558,923 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,573,640 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,588,074 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,609,183 UART: [afmc] --
23,612,247 UART: [cold-reset] --
23,615,736 UART: [state] Locking Datavault
23,621,004 UART: [state] Locking PCR0, PCR1 and PCR31
23,622,714 UART: [state] Locking ICCM
23,624,492 UART: [exit] Launching FMC @ 0x40000130
23,632,904 UART:
23,633,190 UART: Running Caliptra FMC ...
23,634,306 UART:
23,634,477 UART: [state] CFI Enabled
23,642,264 UART: [fht] FMC Alias Private Key: 7
25,982,694 UART: [art] Extend RT PCRs Done
25,983,929 UART: [art] Lock RT PCRs Done
25,985,023 UART: [art] Populate DV Done
25,990,273 UART: [fht] FMC Alias Private Key: 7
25,991,916 UART: [art] Derive CDI
25,992,691 UART: [art] Store in slot 0x4
26,035,237 UART: [art] Derive Key Pair
26,036,288 UART: [art] Store priv key in slot 0x5
29,278,244 UART: [art] Derive Key Pair - Done
29,290,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,571,058 UART: [art] Erasing AUTHORITY.KEYID = 7
31,572,567 UART: [art] PUB.X = 153995DDA8025D6917FD8F2AA9F3ED97A588B73D8E56D4393D389A2725849085FB72D77A6977B6DD9F7E6DD811E9B4AA
31,579,831 UART: [art] PUB.Y = EFF74D834B84A8E7170144A61D4B2F3BFB0BC63F4B4D9996F0DDE9D1604B9304D96F8EC4CEDF04A5D10F14A8DB89563C
31,587,130 UART: [art] SIG.R = 03496529C310D8BA0B48057F5DB376210DE0666D613767E175A79CA4522A264D8B04FD94106AF1BF671E3D795A779B35
31,594,475 UART: [art] SIG.S = 49C70C8F8E424886DA80715871C8ADB62E51073328E70D1CDCCA2D3665C465D993DC8B2C657639947DB27ED04501A063
32,899,659 UART: Caliptra RT
32,900,379 UART: [state] CFI Enabled
33,033,281 UART: [rt] RT listening for mailbox commands...
33,035,147 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,064,779 UART: [rt]cmd =0x46504c54, len=4
33,066,526 >>> mbox cmd response data (8 bytes)
33,067,831 UART: [rt] FIPS self test
33,068,782 UART: [kat] ++
33,069,241 UART: [kat] sha1
33,073,494 UART: [kat] SHA2-256
33,075,370 UART: [kat] SHA2-384
33,078,353 UART: [kat] SHA2-512-ACC
33,080,655 UART: [kat] ECC-384
34,044,521 UART: Fatal Error: 0x90040004
34,079,725 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,229,742 >>> mbox cmd response: failed
34,230,365 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,380,240 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,126 UART:
190,418 UART: Running Caliptra ROM ...
191,532 UART:
6,146,208 UART: [state] CFI Enabled
6,157,151 UART: [state] LifecycleState = Unprovisioned
6,159,087 UART: [state] DebugLocked = No
6,161,461 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,166,579 UART: [kat] SHA2-256
6,336,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,346,857 UART: [kat] ++
6,347,404 UART: [kat] sha1
6,359,281 UART: [kat] SHA2-256
6,361,977 UART: [kat] SHA2-384
6,368,576 UART: [kat] SHA2-512-ACC
6,370,936 UART: [kat] ECC-384
8,655,471 UART: [kat] HMAC-384Kdf
8,668,240 UART: [kat] LMS
9,858,351 UART: [kat] --
9,862,293 UART: [cold-reset] ++
9,864,342 UART: [fht] Storing FHT @ 0x50003400
9,875,674 UART: [idev] ++
9,876,268 UART: [idev] CDI.KEYID = 6
9,877,184 UART: [idev] SUBJECT.KEYID = 7
9,878,407 UART: [idev] UDS.KEYID = 0
9,879,996 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
10,029,918 UART: [idev] Erasing UDS.KEYID = 0
13,165,032 UART: [idev] Using Sha1 for KeyId Algorithm
13,187,770 UART: [idev] --
13,191,474 UART: [ldev] ++
13,192,113 UART: [ldev] CDI.KEYID = 6
13,193,000 UART: [ldev] SUBJECT.KEYID = 5
13,194,285 UART: [ldev] AUTHORITY.KEYID = 7
13,195,527 UART: [ldev] FE.KEYID = 1
13,205,941 UART: [ldev] Erasing FE.KEYID = 1
16,492,776 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,785,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,800,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,815,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,829,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,849,859 UART: [ldev] --
18,854,246 UART: [fwproc] Waiting for Commands...
18,857,383 UART: [fwproc] Received command 0x46574c44
18,859,575 UART: [fwproc] Received Image of size 119428 bytes
22,972,613 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,047,771 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
23,120,963 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
23,453,325 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,161 writing to cptra_bootfsm_go
4,130,807 ready_for_fw is high
4,131,446 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,182,562 >>> mbox cmd response: success
23,827,224 UART:
23,827,675 UART: Running Caliptra FMC ...
23,828,798 UART:
23,828,968 UART: [state] CFI Enabled
23,836,888 UART: [fht] FMC Alias Private Key: 7
26,176,799 UART: [art] Extend RT PCRs Done
26,178,044 UART: [art] Lock RT PCRs Done
26,179,469 UART: [art] Populate DV Done
26,184,841 UART: [fht] FMC Alias Private Key: 7
26,186,446 UART: [art] Derive CDI
26,187,273 UART: [art] Store in slot 0x4
26,229,390 UART: [art] Derive Key Pair
26,230,415 UART: [art] Store priv key in slot 0x5
29,472,201 UART: [art] Derive Key Pair - Done
29,484,883 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,764,970 UART: [art] Erasing AUTHORITY.KEYID = 7
31,766,520 UART: [art] PUB.X = 548B4BE194491E273F0CF1C43D2F1CC6625992B44AB5758B5259FE4227154C6BACECB1FFCEFC9BCA6FF567F3637ED3A4
31,773,744 UART: [art] PUB.Y = 3C4ED7B525807D781191052D327E8C39D88EF229DC078A32E40E989CDFC6FBF0DAF49B708B939BF998C2544D7392B522
31,781,002 UART: [art] SIG.R = 4DA224A4ABC074231485B3E7B40D5E01FDFC4330AABF9D20CD8E121C16155975144A5319C3CE67B54A205DE60AB8EB62
31,788,370 UART: [art] SIG.S = 089AF0119A4EB54F1CDBC9DDBB5BE551D61582D1D7F352C08EFE32E6E5D413A49BD4CAB7BFCFC0C12B5B746874CE88FD
33,093,017 UART: Caliptra RT
33,093,734 UART: [state] CFI Enabled
33,227,344 UART: [rt] RT listening for mailbox commands...
33,229,217 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,258,862 UART: [rt]cmd =0x46504c54, len=4
33,260,446 >>> mbox cmd response data (8 bytes)
33,261,665 UART: [rt] FIPS self test
33,262,613 UART: [kat] ++
33,263,082 UART: [kat] sha1
33,267,441 UART: [kat] SHA2-256
33,269,370 UART: [kat] SHA2-384
33,272,235 UART: [kat] SHA2-512-ACC
33,274,527 UART: [kat] ECC-384
34,238,208 UART: Fatal Error: 0x90040004
34,273,657 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,423,706 >>> mbox cmd response: failed
34,424,358 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,574,232 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
9,488,510 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
23,534,213 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,146 UART:
192,534 UART: Running Caliptra ROM ...
193,667 UART:
193,810 UART: [state] CFI Enabled
264,397 UART: [state] LifecycleState = Unprovisioned
266,347 UART: [state] DebugLocked = No
268,866 UART: [state] WD Timer not started. Device not locked for debugging
272,059 UART: [kat] SHA2-256
451,766 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,507 UART: [kat] ++
462,957 UART: [kat] sha1
474,900 UART: [kat] SHA2-256
477,565 UART: [kat] SHA2-384
482,856 UART: [kat] SHA2-512-ACC
485,228 UART: [kat] ECC-384
2,947,323 UART: [kat] HMAC-384Kdf
2,970,899 UART: [kat] LMS
3,447,342 UART: [kat] --
3,451,841 UART: [cold-reset] ++
3,454,358 UART: [fht] FHT @ 0x50003400
3,466,130 UART: [idev] ++
3,466,701 UART: [idev] CDI.KEYID = 6
3,467,689 UART: [idev] SUBJECT.KEYID = 7
3,468,944 UART: [idev] UDS.KEYID = 0
3,469,873 ready_for_fw is high
3,470,094 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,620,336 UART: [idev] Erasing UDS.KEYID = 0
5,987,538 UART: [idev] Sha1 KeyId Algorithm
6,012,282 UART: [idev] --
6,017,250 UART: [ldev] ++
6,017,829 UART: [ldev] CDI.KEYID = 6
6,018,801 UART: [ldev] SUBJECT.KEYID = 5
6,019,971 UART: [ldev] AUTHORITY.KEYID = 7
6,021,231 UART: [ldev] FE.KEYID = 1
6,058,570 UART: [ldev] Erasing FE.KEYID = 1
8,565,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,007 UART: [ldev] --
10,371,966 UART: [fwproc] Wait for Commands...
10,374,133 UART: [fwproc] Recv command 0x46574c44
10,376,124 UART: [fwproc] Recv'd Img size: 119428 bytes
13,866,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,585 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,606 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,346,105 >>> mbox cmd response: success
14,350,514 UART: [afmc] ++
14,351,129 UART: [afmc] CDI.KEYID = 6
14,352,045 UART: [afmc] SUBJECT.KEYID = 7
14,353,266 UART: [afmc] AUTHORITY.KEYID = 5
16,892,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,614,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,616,222 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,632,042 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,648,074 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,663,666 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,688,329 UART: [afmc] --
18,691,666 UART: [cold-reset] --
18,695,369 UART: [state] Locking Datavault
18,702,296 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,060 UART: [state] Locking ICCM
18,706,163 UART: [exit] Launching FMC @ 0x40000130
18,714,562 UART:
18,714,822 UART: Running Caliptra FMC ...
18,715,928 UART:
18,716,091 UART: [state] CFI Enabled
18,773,427 UART: [fht] FMC Alias Private Key: 7
20,540,030 UART: [art] Extend RT PCRs Done
20,541,248 UART: [art] Lock RT PCRs Done
20,543,041 UART: [art] Populate DV Done
20,548,471 UART: [fht] FMC Alias Private Key: 7
20,550,017 UART: [art] Derive CDI
20,550,785 UART: [art] Store in slot 0x4
20,605,656 UART: [art] Derive Key Pair
20,606,694 UART: [art] Store priv key in slot 0x5
23,069,486 UART: [art] Derive Key Pair - Done
23,082,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,224 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,733 UART: [art] PUB.X = D6108E90798E837CE2DC5848FC69AF4B224F859A4E4778246868F30798082E67D35F537DBCB3EC248EAD2AFC4E654CC6
24,804,980 UART: [art] PUB.Y = B0267E885AA0DD037ABF1B915D1B209ED467739A957290BFD3B6CFBE40DEEE2A20F02E34420B72B18ABF883FEC519232
24,812,254 UART: [art] SIG.R = C08145F5BDF28A9D9B2D18894DA25CF6B477BF7AB5119F3506E4D9EE85286C44A5B122682A7FF4F9D46D8619D72056CB
24,819,669 UART: [art] SIG.S = D2CFA0BE771C1D20407C9EC50006C1B81EC73E5B0D71F08D191615F27B05E2BB4AD74511097E116C2904E87A8E5CA174
25,798,677 UART: Caliptra RT
25,799,378 UART: [state] CFI Enabled
25,980,051 UART: [rt] RT listening for mailbox commands...
25,981,900 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,011,632 UART: [rt]cmd =0x46504c54, len=4
26,013,107 >>> mbox cmd response data (8 bytes)
26,014,081 UART: [rt] FIPS self test
26,015,039 UART: [kat] ++
26,015,503 UART: [kat] sha1
26,019,914 UART: [kat] SHA2-256
26,021,846 UART: [kat] SHA2-384
26,024,761 UART: [kat] SHA2-512-ACC
26,027,010 UART: [kat] ECC-384
26,762,478 UART: Fatal Error: 0x90040004
26,797,765 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,947,793 >>> mbox cmd response: failed
26,948,395 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,098,267 >>> mbox cmd response: failed
Initializing fuses
929 writing to cptra_bootfsm_go
190,108 UART:
190,394 UART: Running Caliptra ROM ...
191,505 UART:
191,654 UART: [state] CFI Enabled
257,974 UART: [state] LifecycleState = Unprovisioned
259,883 UART: [state] DebugLocked = No
262,084 UART: [state] WD Timer not started. Device not locked for debugging
265,822 UART: [kat] SHA2-256
445,492 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
456,276 UART: [kat] ++
456,752 UART: [kat] sha1
466,315 UART: [kat] SHA2-256
469,012 UART: [kat] SHA2-384
475,215 UART: [kat] SHA2-512-ACC
477,613 UART: [kat] ECC-384
2,939,886 UART: [kat] HMAC-384Kdf
2,963,044 UART: [kat] LMS
3,439,535 UART: [kat] --
3,444,498 UART: [cold-reset] ++
3,445,672 UART: [fht] FHT @ 0x50003400
3,457,086 UART: [idev] ++
3,457,665 UART: [idev] CDI.KEYID = 6
3,458,610 UART: [idev] SUBJECT.KEYID = 7
3,459,880 UART: [idev] UDS.KEYID = 0
3,461,401 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,611,523 UART: [idev] Erasing UDS.KEYID = 0
5,980,005 UART: [idev] Sha1 KeyId Algorithm
6,003,196 UART: [idev] --
6,008,232 UART: [ldev] ++
6,008,813 UART: [ldev] CDI.KEYID = 6
6,009,762 UART: [ldev] SUBJECT.KEYID = 5
6,010,985 UART: [ldev] AUTHORITY.KEYID = 7
6,012,228 UART: [ldev] FE.KEYID = 1
6,047,598 UART: [ldev] Erasing FE.KEYID = 1
8,555,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,297,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,313,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,598 UART: [ldev] --
10,356,467 UART: [fwproc] Wait for Commands...
10,359,405 UART: [fwproc] Recv command 0x46574c44
10,361,396 UART: [fwproc] Recv'd Img size: 119428 bytes
13,850,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,928,377 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,001,378 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,332,459 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,464,190 ready_for_fw is high
3,464,841 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,225,321 >>> mbox cmd response: success
18,514,337 UART:
18,514,759 UART: Running Caliptra FMC ...
18,515,886 UART:
18,516,041 UART: [state] CFI Enabled
18,585,157 UART: [fht] FMC Alias Private Key: 7
20,351,564 UART: [art] Extend RT PCRs Done
20,352,808 UART: [art] Lock RT PCRs Done
20,354,685 UART: [art] Populate DV Done
20,360,200 UART: [fht] FMC Alias Private Key: 7
20,361,753 UART: [art] Derive CDI
20,362,498 UART: [art] Store in slot 0x4
20,418,254 UART: [art] Derive Key Pair
20,419,322 UART: [art] Store priv key in slot 0x5
22,881,888 UART: [art] Derive Key Pair - Done
22,894,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,060 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,569 UART: [art] PUB.X = 0A93C45D5013BC226E9EADAABD46CFDB39599828990DE36754A04B14F41A5D19547F9953DD625024166EBF6231120C1B
24,615,785 UART: [art] PUB.Y = 9701FB1A01202078C353EADC0D3CA92FF0CB81728C4491B8C1C72CDA8A6D3978B9AF7BB4DEED9D09F6C554C64FEBCEF7
24,623,094 UART: [art] SIG.R = DEDA9FD0D1FE28C16E0DEBB9F2044FA82C083D3800DB07E9CA4415D240996D1BC9B5A68F7E5DAC8D494A17F2B45BCCA3
24,630,505 UART: [art] SIG.S = 59A57C839E3DDF72F97D4C957319C999195232126C7AE4C17DAB9A3B1908CF3C427666884B32F976B697CC4CE1F7F07F
25,609,305 UART: Caliptra RT
25,610,016 UART: [state] CFI Enabled
25,790,964 UART: [rt] RT listening for mailbox commands...
25,792,820 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,822,730 UART: [rt]cmd =0x46504c54, len=4
25,824,527 >>> mbox cmd response data (8 bytes)
25,825,420 UART: [rt] FIPS self test
25,826,369 UART: [kat] ++
25,826,839 UART: [kat] sha1
25,831,139 UART: [kat] SHA2-256
25,833,072 UART: [kat] SHA2-384
25,836,097 UART: [kat] SHA2-512-ACC
25,838,392 UART: [kat] ECC-384
26,571,965 UART: Fatal Error: 0x90040004
26,607,234 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,757,266 >>> mbox cmd response: failed
26,757,897 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,907,792 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
3,453,320 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,222,594 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
192,671 UART:
193,046 UART: Running Caliptra ROM ...
194,195 UART:
603,718 UART: [state] CFI Enabled
618,818 UART: [state] LifecycleState = Unprovisioned
620,772 UART: [state] DebugLocked = No
622,187 UART: [state] WD Timer not started. Device not locked for debugging
626,321 UART: [kat] SHA2-256
805,934 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,728 UART: [kat] ++
817,209 UART: [kat] sha1
828,588 UART: [kat] SHA2-256
831,315 UART: [kat] SHA2-384
837,878 UART: [kat] SHA2-512-ACC
840,304 UART: [kat] ECC-384
3,284,980 UART: [kat] HMAC-384Kdf
3,297,072 UART: [kat] LMS
3,773,585 UART: [kat] --
3,778,459 UART: [cold-reset] ++
3,779,902 UART: [fht] FHT @ 0x50003400
3,791,885 UART: [idev] ++
3,792,455 UART: [idev] CDI.KEYID = 6
3,793,435 UART: [idev] SUBJECT.KEYID = 7
3,794,617 UART: [idev] UDS.KEYID = 0
3,795,676 ready_for_fw is high
3,795,899 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,945,871 UART: [idev] Erasing UDS.KEYID = 0
6,272,309 UART: [idev] Sha1 KeyId Algorithm
6,294,965 UART: [idev] --
6,300,989 UART: [ldev] ++
6,301,570 UART: [ldev] CDI.KEYID = 6
6,302,511 UART: [ldev] SUBJECT.KEYID = 5
6,303,722 UART: [ldev] AUTHORITY.KEYID = 7
6,304,958 UART: [ldev] FE.KEYID = 1
6,316,507 UART: [ldev] Erasing FE.KEYID = 1
8,795,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,043 UART: [ldev] --
10,588,185 UART: [fwproc] Wait for Commands...
10,590,176 UART: [fwproc] Recv command 0x46574c44
10,592,169 UART: [fwproc] Recv'd Img size: 119428 bytes
14,088,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,018 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,245,016 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,576,322 >>> mbox cmd response: success
14,579,811 UART: [afmc] ++
14,580,404 UART: [afmc] CDI.KEYID = 6
14,581,329 UART: [afmc] SUBJECT.KEYID = 7
14,582,553 UART: [afmc] AUTHORITY.KEYID = 5
17,088,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,810,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,812,843 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,828,646 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,844,706 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,860,265 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,884,675 UART: [afmc] --
18,887,676 UART: [cold-reset] --
18,891,281 UART: [state] Locking Datavault
18,897,017 UART: [state] Locking PCR0, PCR1 and PCR31
18,898,774 UART: [state] Locking ICCM
18,900,065 UART: [exit] Launching FMC @ 0x40000130
18,908,467 UART:
18,908,712 UART: Running Caliptra FMC ...
18,909,815 UART:
18,909,978 UART: [state] CFI Enabled
18,917,756 UART: [fht] FMC Alias Private Key: 7
20,683,319 UART: [art] Extend RT PCRs Done
20,684,554 UART: [art] Lock RT PCRs Done
20,686,075 UART: [art] Populate DV Done
20,691,439 UART: [fht] FMC Alias Private Key: 7
20,692,987 UART: [art] Derive CDI
20,693,812 UART: [art] Store in slot 0x4
20,736,409 UART: [art] Derive Key Pair
20,737,417 UART: [art] Store priv key in slot 0x5
23,164,474 UART: [art] Derive Key Pair - Done
23,177,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,883,863 UART: [art] Erasing AUTHORITY.KEYID = 7
24,885,367 UART: [art] PUB.X = BE742B3836EE4284DFB2D5FDBA922E676B6AD2B3357F6CC42ABAC34AA3FD251E01E60E8FC2BA854E8E947D1A78657518
24,892,681 UART: [art] PUB.Y = A986EA8166E45412E162BBA64946CAC7C2E1D5B9D65987A7736BA7DA4B09D09A770702CD27A555211EEC87916E5A6B10
24,899,926 UART: [art] SIG.R = FB1710EB7629F486339FC426ADD63FF46889C297D67D91249F5ED2F534DBA03F079E7331455A615C0DA6B61529D8863E
24,907,289 UART: [art] SIG.S = 8DBD02B7039CF440BB7D8164498608931262014BAE64D0287E442BC2AA294FFD671F4111FD97246C78891A8EDB8FACCE
25,885,842 UART: Caliptra RT
25,886,539 UART: [state] CFI Enabled
26,019,664 UART: [rt] RT listening for mailbox commands...
26,021,515 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,051,202 UART: [rt]cmd =0x46504c54, len=4
26,052,599 >>> mbox cmd response data (8 bytes)
26,053,734 UART: [rt] FIPS self test
26,054,683 UART: [kat] ++
26,055,140 UART: [kat] sha1
26,059,654 UART: [kat] SHA2-256
26,061,541 UART: [kat] SHA2-384
26,064,668 UART: [kat] SHA2-512-ACC
26,066,964 UART: [kat] ECC-384
26,789,275 UART: Fatal Error: 0x90040004
26,824,559 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,974,518 >>> mbox cmd response: failed
26,975,154 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,125,035 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
190,118 UART:
190,411 UART: Running Caliptra ROM ...
191,523 UART:
13,401,329 UART: [state] CFI Enabled
13,415,807 UART: [state] LifecycleState = Unprovisioned
13,417,716 UART: [state] DebugLocked = No
13,419,051 UART: [state] WD Timer not started. Device not locked for debugging
13,423,448 UART: [kat] SHA2-256
13,603,122 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
13,613,914 UART: [kat] ++
13,614,461 UART: [kat] sha1
13,626,012 UART: [kat] SHA2-256
13,628,703 UART: [kat] SHA2-384
13,634,855 UART: [kat] SHA2-512-ACC
13,637,221 UART: [kat] ECC-384
16,076,743 UART: [kat] HMAC-384Kdf
16,087,950 UART: [kat] LMS
16,564,426 UART: [kat] --
16,569,405 UART: [cold-reset] ++
16,570,434 UART: [fht] FHT @ 0x50003400
16,581,741 UART: [idev] ++
16,582,307 UART: [idev] CDI.KEYID = 6
16,583,271 UART: [idev] SUBJECT.KEYID = 7
16,584,486 UART: [idev] UDS.KEYID = 0
16,586,152 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
16,736,068 UART: [idev] Erasing UDS.KEYID = 0
19,059,315 UART: [idev] Sha1 KeyId Algorithm
19,081,345 UART: [idev] --
19,086,558 UART: [ldev] ++
19,087,151 UART: [ldev] CDI.KEYID = 6
19,088,085 UART: [ldev] SUBJECT.KEYID = 5
19,089,259 UART: [ldev] AUTHORITY.KEYID = 7
19,090,551 UART: [ldev] FE.KEYID = 1
19,101,684 UART: [ldev] Erasing FE.KEYID = 1
21,583,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,304,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,320,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,335,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,351,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,374,516 UART: [ldev] --
23,380,702 UART: [fwproc] Wait for Commands...
23,383,831 UART: [fwproc] Recv command 0x46574c44
23,385,829 UART: [fwproc] Recv'd Img size: 119428 bytes
26,879,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
26,958,666 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,031,680 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
27,362,990 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
3,780,609 ready_for_fw is high
3,781,322 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,464,085 >>> mbox cmd response: success
18,714,417 UART:
18,714,840 UART: Running Caliptra FMC ...
18,715,957 UART:
18,716,123 UART: [state] CFI Enabled
18,723,857 UART: [fht] FMC Alias Private Key: 7
20,489,411 UART: [art] Extend RT PCRs Done
20,490,651 UART: [art] Lock RT PCRs Done
20,492,082 UART: [art] Populate DV Done
20,497,688 UART: [fht] FMC Alias Private Key: 7
20,499,337 UART: [art] Derive CDI
20,500,081 UART: [art] Store in slot 0x4
20,543,227 UART: [art] Derive Key Pair
20,544,272 UART: [art] Store priv key in slot 0x5
22,970,956 UART: [art] Derive Key Pair - Done
22,984,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,690,296 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,821 UART: [art] PUB.X = 008B1DC7B772AC65F30ED9C3CC3CC0E459BF9882B49AED50781AB6091BE276320B0E8A6B268DF920458BEF04BC924414
24,699,082 UART: [art] PUB.Y = 01D269C6D626887EB3FDF7D7F529009160A9582668B28DD8668DA81BF299FFE39EBD7487425062201B10E2A3EFFFB853
24,706,307 UART: [art] SIG.R = E555D0803A53597C4DAA957E01E629A535EE98C7E17B0D0BE704E844E41A5405202B55845A27C55DCD8A130CB0AF8427
24,713,718 UART: [art] SIG.S = 2C5E6D4105D933AD6222232320F4BC3F79A29E57E00233CFEC14C896BFA7F3B70B4873D284C22744AFE5257C723F37F8
25,692,488 UART: Caliptra RT
25,693,207 UART: [state] CFI Enabled
25,826,198 UART: [rt] RT listening for mailbox commands...
25,828,042 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,857,848 UART: [rt]cmd =0x46504c54, len=4
25,859,481 >>> mbox cmd response data (8 bytes)
25,860,496 UART: [rt] FIPS self test
25,861,446 UART: [kat] ++
25,861,896 UART: [kat] sha1
25,866,351 UART: [kat] SHA2-256
25,868,274 UART: [kat] SHA2-384
25,871,300 UART: [kat] SHA2-512-ACC
25,873,540 UART: [kat] ECC-384
26,595,894 UART: Fatal Error: 0x90040004
26,631,257 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,781,278 >>> mbox cmd response: failed
26,781,946 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,931,724 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
16,776,629 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,458,151 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
192,279 UART:
192,634 UART: Running Caliptra ROM ...
193,832 UART:
193,985 UART: [state] CFI Enabled
262,880 UART: [state] LifecycleState = Unprovisioned
265,302 UART: [state] DebugLocked = No
267,341 UART: [state] WD Timer not started. Device not locked for debugging
272,032 UART: [kat] SHA2-256
461,924 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,686 UART: [kat] ++
473,171 UART: [kat] sha1
484,552 UART: [kat] SHA2-256
487,593 UART: [kat] SHA2-384
494,728 UART: [kat] SHA2-512-ACC
497,316 UART: [kat] ECC-384
2,947,502 UART: [kat] HMAC-384Kdf
2,974,644 UART: [kat] LMS
3,506,422 UART: [kat] --
3,509,652 UART: [cold-reset] ++
3,511,815 UART: [fht] FHT @ 0x50003400
3,522,942 UART: [idev] ++
3,523,592 UART: [idev] CDI.KEYID = 6
3,524,631 UART: [idev] SUBJECT.KEYID = 7
3,525,742 UART: [idev] UDS.KEYID = 0
3,526,686 ready_for_fw is high
3,526,909 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,677,146 UART: [idev] Erasing UDS.KEYID = 0
6,032,687 UART: [idev] Sha1 KeyId Algorithm
6,056,092 UART: [idev] --
6,061,028 UART: [ldev] ++
6,061,724 UART: [ldev] CDI.KEYID = 6
6,062,651 UART: [ldev] SUBJECT.KEYID = 5
6,063,820 UART: [ldev] AUTHORITY.KEYID = 7
6,065,060 UART: [ldev] FE.KEYID = 1
6,101,963 UART: [ldev] Erasing FE.KEYID = 1
8,612,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,137 UART: [ldev] --
10,415,247 UART: [fwproc] Wait for Commands...
10,416,756 UART: [fwproc] Recv command 0x46574c44
10,419,072 UART: [fwproc] Recv'd Img size: 119428 bytes
13,938,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,016,382 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,140,013 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,706,345 >>> mbox cmd response: success
14,710,317 UART: [afmc] ++
14,711,025 UART: [afmc] CDI.KEYID = 6
14,712,215 UART: [afmc] SUBJECT.KEYID = 7
14,713,650 UART: [afmc] AUTHORITY.KEYID = 5
17,239,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,235 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,308 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,485 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,391 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,104 UART: [afmc] --
19,035,963 UART: [cold-reset] --
19,041,429 UART: [state] Locking Datavault
19,047,666 UART: [state] Locking PCR0, PCR1 and PCR31
19,049,860 UART: [state] Locking ICCM
19,052,649 UART: [exit] Launching FMC @ 0x40000130
19,061,269 UART:
19,061,509 UART: Running Caliptra FMC ...
19,062,537 UART:
19,062,686 UART: [state] CFI Enabled
19,118,940 UART: [fht] FMC Alias Private Key: 7
20,906,631 UART: [art] Extend RT PCRs Done
20,907,864 UART: [art] Lock RT PCRs Done
20,909,494 UART: [art] Populate DV Done
20,914,909 UART: [fht] FMC Alias Private Key: 7
20,916,452 UART: [art] Derive CDI
20,917,274 UART: [art] Store in slot 0x4
20,973,016 UART: [art] Derive Key Pair
20,974,089 UART: [art] Store priv key in slot 0x5
23,436,654 UART: [art] Derive Key Pair - Done
23,449,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,162,665 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,180 UART: [art] PUB.X = 891DA2CAB97D5B1567E5541B21D040A8224DE12F24DF582959BF9F32065B6C013B248215A28749E1460803B50522C5AD
25,171,438 UART: [art] PUB.Y = 03F982BF482E650E941D0DFC35A842CB00EA713679C531D4352B78273B5FB112DEBC036D826A6B5B438A47DFAD4A13CE
25,178,683 UART: [art] SIG.R = 3A8E9C2E6D1B03185776818E8990F698A284EAB70921360E1C23B2DF16959D996388371D9A61C2A48D7EC0C40182D559
25,186,123 UART: [art] SIG.S = 461018C21C518FA68AC70AF82A6FB426DED1EFB113863385811EC972F305ED8A5ED1D3B259E291841CA0BD5147CE4172
26,165,001 UART: Caliptra RT
26,165,699 UART: [state] CFI Enabled
26,346,462 UART: [rt] RT listening for mailbox commands...
26,348,312 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,377,897 UART: [rt]cmd =0x46504c54, len=4
26,379,479 >>> mbox cmd response data (8 bytes)
26,380,617 UART: [rt] FIPS self test
26,381,562 UART: [kat] ++
26,382,039 UART: [kat] sha1
26,386,245 UART: [kat] SHA2-256
26,388,176 UART: [kat] SHA2-384
26,391,145 UART: [kat] SHA2-512-ACC
26,393,443 UART: [kat] ECC-384
27,128,217 UART: Fatal Error: 0x90040004
27,163,505 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,313,533 >>> mbox cmd response: failed
27,314,159 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,464,203 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,112 UART:
190,405 UART: Running Caliptra ROM ...
191,519 UART:
191,669 UART: [state] CFI Enabled
255,840 UART: [state] LifecycleState = Unprovisioned
258,260 UART: [state] DebugLocked = No
260,943 UART: [state] WD Timer not started. Device not locked for debugging
264,966 UART: [kat] SHA2-256
454,820 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
465,601 UART: [kat] ++
466,077 UART: [kat] sha1
477,720 UART: [kat] SHA2-256
480,740 UART: [kat] SHA2-384
486,510 UART: [kat] SHA2-512-ACC
489,074 UART: [kat] ECC-384
2,941,742 UART: [kat] HMAC-384Kdf
2,963,477 UART: [kat] LMS
3,495,201 UART: [kat] --
3,498,839 UART: [cold-reset] ++
3,500,130 UART: [fht] FHT @ 0x50003400
3,511,520 UART: [idev] ++
3,512,263 UART: [idev] CDI.KEYID = 6
3,513,147 UART: [idev] SUBJECT.KEYID = 7
3,514,364 UART: [idev] UDS.KEYID = 0
3,515,881 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,666,330 UART: [idev] Erasing UDS.KEYID = 0
6,021,653 UART: [idev] Sha1 KeyId Algorithm
6,043,113 UART: [idev] --
6,048,544 UART: [ldev] ++
6,049,282 UART: [ldev] CDI.KEYID = 6
6,050,182 UART: [ldev] SUBJECT.KEYID = 5
6,051,296 UART: [ldev] AUTHORITY.KEYID = 7
6,052,534 UART: [ldev] FE.KEYID = 1
6,091,984 UART: [ldev] Erasing FE.KEYID = 1
8,595,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,196 UART: [ldev] --
10,405,797 UART: [fwproc] Wait for Commands...
10,408,977 UART: [fwproc] Recv command 0x46574c44
10,411,300 UART: [fwproc] Recv'd Img size: 119428 bytes
13,919,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,003,187 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,838 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,692,086 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,438,398 ready_for_fw is high
3,438,833 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,849,825 >>> mbox cmd response: success
19,131,246 UART:
19,131,988 UART: Running Caliptra FMC ...
19,133,123 UART:
19,133,278 UART: [state] CFI Enabled
19,201,107 UART: [fht] FMC Alias Private Key: 7
20,967,392 UART: [art] Extend RT PCRs Done
20,968,733 UART: [art] Lock RT PCRs Done
20,970,119 UART: [art] Populate DV Done
20,975,704 UART: [fht] FMC Alias Private Key: 7
20,977,362 UART: [art] Derive CDI
20,978,122 UART: [art] Store in slot 0x4
21,033,858 UART: [art] Derive Key Pair
21,034,933 UART: [art] Store priv key in slot 0x5
23,497,249 UART: [art] Derive Key Pair - Done
23,509,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,740 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,249 UART: [art] PUB.X = 7D2A4FB644FAF43866310471CF25D1DEC410DC37EAA1B7CA0DBDF65C62A644DBB3E805AA7BBEDD5D5C9281DB29258413
25,232,552 UART: [art] PUB.Y = 8681EE1E612C8EC08112D47DFF2BCC33AFE3A1AE66A059EC3DAB904C9D285BEC2A639F572D34099F95274934A5ECDEDA
25,239,807 UART: [art] SIG.R = 663E8AB6428DDC5AFB5AB008B01A230C6762E95CEC0DC4E7D197FA3CBCED2E49BED38F2E89B32535A89CC3F631D7AEC5
25,247,228 UART: [art] SIG.S = ADE04F41683285208282E627C5585554056A2FF9705DCB59DA4AB0A86A7FCC98D085081274FF2D5D189D5A868AA97399
26,226,339 UART: Caliptra RT
26,227,033 UART: [state] CFI Enabled
26,406,726 UART: [rt] RT listening for mailbox commands...
26,408,588 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,438,149 UART: [rt]cmd =0x46504c54, len=4
26,439,869 >>> mbox cmd response data (8 bytes)
26,441,063 UART: [rt] FIPS self test
26,442,022 UART: [kat] ++
26,442,485 UART: [kat] sha1
26,446,728 UART: [kat] SHA2-256
26,448,658 UART: [kat] SHA2-384
26,451,573 UART: [kat] SHA2-512-ACC
26,453,871 UART: [kat] ECC-384
27,188,458 UART: Fatal Error: 0x90040004
27,223,699 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,374,103 >>> mbox cmd response: failed
27,374,802 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,524,848 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,410,173 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,796,089 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,462 UART:
192,831 UART: Running Caliptra ROM ...
194,035 UART:
603,628 UART: [state] CFI Enabled
617,585 UART: [state] LifecycleState = Unprovisioned
619,957 UART: [state] DebugLocked = No
621,845 UART: [state] WD Timer not started. Device not locked for debugging
625,598 UART: [kat] SHA2-256
815,432 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,240 UART: [kat] ++
826,863 UART: [kat] sha1
837,539 UART: [kat] SHA2-256
840,556 UART: [kat] SHA2-384
845,628 UART: [kat] SHA2-512-ACC
848,213 UART: [kat] ECC-384
3,292,245 UART: [kat] HMAC-384Kdf
3,305,003 UART: [kat] LMS
3,836,805 UART: [kat] --
3,839,600 UART: [cold-reset] ++
3,841,751 UART: [fht] FHT @ 0x50003400
3,852,808 UART: [idev] ++
3,853,495 UART: [idev] CDI.KEYID = 6
3,854,389 UART: [idev] SUBJECT.KEYID = 7
3,855,584 UART: [idev] UDS.KEYID = 0
3,856,861 ready_for_fw is high
3,857,113 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,007,178 UART: [idev] Erasing UDS.KEYID = 0
6,329,300 UART: [idev] Sha1 KeyId Algorithm
6,350,969 UART: [idev] --
6,356,234 UART: [ldev] ++
6,356,921 UART: [ldev] CDI.KEYID = 6
6,357,809 UART: [ldev] SUBJECT.KEYID = 5
6,359,022 UART: [ldev] AUTHORITY.KEYID = 7
6,360,264 UART: [ldev] FE.KEYID = 1
6,370,622 UART: [ldev] Erasing FE.KEYID = 1
8,849,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,075 UART: [ldev] --
10,641,315 UART: [fwproc] Wait for Commands...
10,644,502 UART: [fwproc] Recv command 0x46574c44
10,646,777 UART: [fwproc] Recv'd Img size: 119428 bytes
14,156,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,237,517 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,105 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,926,713 >>> mbox cmd response: success
14,929,993 UART: [afmc] ++
14,930,699 UART: [afmc] CDI.KEYID = 6
14,931,946 UART: [afmc] SUBJECT.KEYID = 7
14,933,383 UART: [afmc] AUTHORITY.KEYID = 5
17,433,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,156,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,158,055 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,173,143 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,188,277 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,203,214 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,226,621 UART: [afmc] --
19,229,463 UART: [cold-reset] --
19,234,416 UART: [state] Locking Datavault
19,240,380 UART: [state] Locking PCR0, PCR1 and PCR31
19,242,524 UART: [state] Locking ICCM
19,245,059 UART: [exit] Launching FMC @ 0x40000130
19,253,699 UART:
19,253,938 UART: Running Caliptra FMC ...
19,255,046 UART:
19,255,215 UART: [state] CFI Enabled
19,263,161 UART: [fht] FMC Alias Private Key: 7
21,029,440 UART: [art] Extend RT PCRs Done
21,031,068 UART: [art] Lock RT PCRs Done
21,032,463 UART: [art] Populate DV Done
21,037,900 UART: [fht] FMC Alias Private Key: 7
21,039,515 UART: [art] Derive CDI
21,040,345 UART: [art] Store in slot 0x4
21,083,001 UART: [art] Derive Key Pair
21,084,052 UART: [art] Store priv key in slot 0x5
23,510,200 UART: [art] Derive Key Pair - Done
23,523,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,229,684 UART: [art] Erasing AUTHORITY.KEYID = 7
25,231,190 UART: [art] PUB.X = 941E31E46F066593F9A838B39DCB651070F3B813A8B0C1272B8A5A0987017320B6A1A8DA4F960B0F6446E0B0C4E7742D
25,238,434 UART: [art] PUB.Y = A0407C710FC7BBBDC79779FFA7BD9EB11CFF215B9C3BAC64203CCFBCA1F1BDABF98F5CA69DF7302302F0722CAE3A976B
25,245,778 UART: [art] SIG.R = 0B96EC67BC8E3A79D1939354872283139D1E05C38142277FFB542E43A22714C0C3A1DC4EE9B120A131BE0E54E01B30B8
25,253,105 UART: [art] SIG.S = 1178EB6AAB699E6E0ECA74CFE000B41AC19DABF3860B4DBD590D8091B71454995B9075D112EC4C13DC580AACA72A8737
26,231,757 UART: Caliptra RT
26,232,471 UART: [state] CFI Enabled
26,364,723 UART: [rt] RT listening for mailbox commands...
26,366,580 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,396,320 UART: [rt]cmd =0x46504c54, len=4
26,397,979 >>> mbox cmd response data (8 bytes)
26,399,042 UART: [rt] FIPS self test
26,399,996 UART: [kat] ++
26,400,455 UART: [kat] sha1
26,404,695 UART: [kat] SHA2-256
26,406,576 UART: [kat] SHA2-384
26,409,732 UART: [kat] SHA2-512-ACC
26,412,023 UART: [kat] ECC-384
27,133,961 UART: Fatal Error: 0x90040004
27,169,356 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,319,393 >>> mbox cmd response: failed
27,320,028 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,470,011 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,107 UART:
190,416 UART: Running Caliptra ROM ...
191,449 UART:
13,068,698 UART: [state] CFI Enabled
13,080,577 UART: [state] LifecycleState = Unprovisioned
13,082,965 UART: [state] DebugLocked = No
13,085,765 UART: [state] WD Timer not started. Device not locked for debugging
13,089,913 UART: [kat] SHA2-256
13,279,776 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,290,519 UART: [kat] ++
13,291,120 UART: [kat] sha1
13,303,100 UART: [kat] SHA2-256
13,306,116 UART: [kat] SHA2-384
13,312,002 UART: [kat] SHA2-512-ACC
13,314,593 UART: [kat] ECC-384
15,756,496 UART: [kat] HMAC-384Kdf
15,768,541 UART: [kat] LMS
16,300,386 UART: [kat] --
16,304,921 UART: [cold-reset] ++
16,306,150 UART: [fht] FHT @ 0x50003400
16,318,781 UART: [idev] ++
16,319,475 UART: [idev] CDI.KEYID = 6
16,320,448 UART: [idev] SUBJECT.KEYID = 7
16,321,610 UART: [idev] UDS.KEYID = 0
16,323,158 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
16,473,098 UART: [idev] Erasing UDS.KEYID = 0
18,798,426 UART: [idev] Sha1 KeyId Algorithm
18,820,692 UART: [idev] --
18,825,335 UART: [ldev] ++
18,826,017 UART: [ldev] CDI.KEYID = 6
18,826,931 UART: [ldev] SUBJECT.KEYID = 5
18,828,093 UART: [ldev] AUTHORITY.KEYID = 7
18,829,331 UART: [ldev] FE.KEYID = 1
18,841,837 UART: [ldev] Erasing FE.KEYID = 1
21,320,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,041,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,057,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,072,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,087,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,106,818 UART: [ldev] --
23,112,940 UART: [fwproc] Wait for Commands...
23,115,216 UART: [fwproc] Recv command 0x46574c44
23,117,540 UART: [fwproc] Recv'd Img size: 119428 bytes
26,627,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
26,708,853 UART: [fwproc] Load FMC at address 0x40000000 len 20044
26,832,427 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
27,397,610 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,803 writing to cptra_bootfsm_go
3,756,042 ready_for_fw is high
3,756,491 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,054,534 >>> mbox cmd response: success
19,313,602 UART:
19,314,037 UART: Running Caliptra FMC ...
19,315,189 UART:
19,315,355 UART: [state] CFI Enabled
19,323,420 UART: [fht] FMC Alias Private Key: 7
21,089,944 UART: [art] Extend RT PCRs Done
21,091,185 UART: [art] Lock RT PCRs Done
21,093,123 UART: [art] Populate DV Done
21,098,563 UART: [fht] FMC Alias Private Key: 7
21,100,124 UART: [art] Derive CDI
21,100,953 UART: [art] Store in slot 0x4
21,143,564 UART: [art] Derive Key Pair
21,144,616 UART: [art] Store priv key in slot 0x5
23,571,723 UART: [art] Derive Key Pair - Done
23,584,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,290,700 UART: [art] Erasing AUTHORITY.KEYID = 7
25,292,225 UART: [art] PUB.X = 0426993A577035294CD62A88E97CF12BDC3983FB76FBA9C2F13D7C35F87B4349A3F289BF9467B09B514181239DADF00E
25,299,453 UART: [art] PUB.Y = F5D9BCA4EF0BC988FAD6AEAE4E3DAF8FF22F4FF21C8EA054BF4F6EA6B8828F2DD9E6CF14EA0D01686A2266DD6AC4E04F
25,306,781 UART: [art] SIG.R = AD36E9C0A5218A404D0B0EB7084D70E021292C964EB1906216F15A951FB1594FCC0779AE520BF5E890CA2FA959DF22A9
25,314,159 UART: [art] SIG.S = DE5662251E8E5821CFAF4BEA0C940D8391DA2930FB9EA1642D00F94D18A754D91B94A9AE46A27510D4B1BE782EB4CD69
26,292,790 UART: Caliptra RT
26,293,512 UART: [state] CFI Enabled
26,427,174 UART: [rt] RT listening for mailbox commands...
26,429,059 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,458,855 UART: [rt]cmd =0x46504c54, len=4
26,460,447 >>> mbox cmd response data (8 bytes)
26,461,231 UART: [rt] FIPS self test
26,462,180 UART: [kat] ++
26,462,640 UART: [kat] sha1
26,467,129 UART: [kat] SHA2-256
26,469,073 UART: [kat] SHA2-384
26,471,986 UART: [kat] SHA2-512-ACC
26,474,281 UART: [kat] ECC-384
27,196,843 UART: Fatal Error: 0x90040004
27,232,277 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,382,246 >>> mbox cmd response: failed
27,382,847 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,532,881 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
16,150,466 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,451,230 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,037 UART: [kat] SHA2-256
881,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,083 UART: [kat] ++
886,235 UART: [kat] sha1
890,327 UART: [kat] SHA2-256
892,265 UART: [kat] SHA2-384
894,896 UART: [kat] SHA2-512-ACC
896,797 UART: [kat] ECC-384
902,534 UART: [kat] HMAC-384Kdf
907,202 UART: [kat] LMS
1,475,398 UART: [kat] --
1,476,397 UART: [cold-reset] ++
1,476,803 UART: [fht] Storing FHT @ 0x50003400
1,479,700 UART: [idev] ++
1,479,868 UART: [idev] CDI.KEYID = 6
1,480,228 UART: [idev] SUBJECT.KEYID = 7
1,480,652 UART: [idev] UDS.KEYID = 0
1,480,997 ready_for_fw is high
1,480,997 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,892 UART: [idev] Erasing UDS.KEYID = 0
1,505,360 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,062 UART: [idev] --
1,515,217 UART: [ldev] ++
1,515,385 UART: [ldev] CDI.KEYID = 6
1,515,748 UART: [ldev] SUBJECT.KEYID = 5
1,516,174 UART: [ldev] AUTHORITY.KEYID = 7
1,516,637 UART: [ldev] FE.KEYID = 1
1,521,963 UART: [ldev] Erasing FE.KEYID = 1
1,547,730 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,412 UART: [ldev] --
1,586,927 UART: [fwproc] Waiting for Commands...
1,587,572 UART: [fwproc] Received command 0x46574c44
1,588,363 UART: [fwproc] Received Image of size 119428 bytes
2,942,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,761 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,979 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,592 >>> mbox cmd response: success
3,143,698 UART: [afmc] ++
3,143,866 UART: [afmc] CDI.KEYID = 6
3,144,228 UART: [afmc] SUBJECT.KEYID = 7
3,144,653 UART: [afmc] AUTHORITY.KEYID = 5
3,179,710 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,004 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,784 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,493 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,376 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,059 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,783 UART: [afmc] --
3,222,715 UART: [cold-reset] --
3,223,645 UART: [state] Locking Datavault
3,225,158 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,762 UART: [state] Locking ICCM
3,226,398 UART: [exit] Launching FMC @ 0x40000130
3,231,728 UART:
3,231,744 UART: Running Caliptra FMC ...
3,232,152 UART:
3,232,206 UART: [state] CFI Enabled
3,242,542 UART: [fht] FMC Alias Private Key: 7
3,361,016 UART: [art] Extend RT PCRs Done
3,361,444 UART: [art] Lock RT PCRs Done
3,363,056 UART: [art] Populate DV Done
3,370,911 UART: [fht] FMC Alias Private Key: 7
3,372,015 UART: [art] Derive CDI
3,372,295 UART: [art] Store in slot 0x4
3,458,069 UART: [art] Derive Key Pair
3,458,429 UART: [art] Store priv key in slot 0x5
3,471,522 UART: [art] Derive Key Pair - Done
3,486,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,176 UART: [art] PUB.X = 388A0DF603EFEDA353C2ED6E9E30A0A9833958B390890905BA2FBEF30FD31AD6243A75980E2D8AE02EBF8F55DF5FFEB7
3,509,948 UART: [art] PUB.Y = B8A5A61A3F2A2F6FC3C24A3AACADCDB49A6219F1546E4E41F7E53C3B61B79D55A600734E8DA11235BF2FC842DADC2682
3,516,896 UART: [art] SIG.R = E3F53E7ED3457DD7B55D7D2E00F41C55583932F06576D4E5636CD85E29B2C67C67A4F03FC56B8B3D230F33EE4EDBBE5D
3,523,655 UART: [art] SIG.S = 916C1F90D0A031856572972D9D50569F0AB60E5DFB270BFDB011EF55FDC211794FA2A7B159AE7E8BF80705C68A27A9C1
3,547,458 UART: Caliptra RT
3,547,709 UART: [state] CFI Enabled
3,668,032 UART: [rt] RT listening for mailbox commands...
3,668,695 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,400 UART: [rt]cmd =0x46504c54, len=4
3,699,514 >>> mbox cmd response data (8 bytes)
3,699,809 UART: [rt] FIPS self test
3,700,137 UART: [kat] ++
3,700,289 UART: [kat] sha1
3,704,445 UART: [kat] SHA2-256
3,706,467 UART: [kat] SHA2-384
3,709,228 UART: [kat] SHA2-512-ACC
3,711,155 UART: [kat] ECC-384
3,715,195 UART: Fatal Error: 0x90040004
3,716,734 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,739 >>> mbox cmd response: failed
3,716,739 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,744 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,796 UART: [state] LifecycleState = Unprovisioned
86,451 UART: [state] DebugLocked = No
87,057 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,745 UART: [kat] SHA2-256
882,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,791 UART: [kat] ++
886,943 UART: [kat] sha1
891,249 UART: [kat] SHA2-256
893,187 UART: [kat] SHA2-384
895,800 UART: [kat] SHA2-512-ACC
897,701 UART: [kat] ECC-384
903,066 UART: [kat] HMAC-384Kdf
907,622 UART: [kat] LMS
1,475,818 UART: [kat] --
1,476,807 UART: [cold-reset] ++
1,477,217 UART: [fht] Storing FHT @ 0x50003400
1,479,990 UART: [idev] ++
1,480,158 UART: [idev] CDI.KEYID = 6
1,480,518 UART: [idev] SUBJECT.KEYID = 7
1,480,942 UART: [idev] UDS.KEYID = 0
1,481,287 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,158 UART: [idev] Erasing UDS.KEYID = 0
1,506,010 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,576 UART: [idev] --
1,515,419 UART: [ldev] ++
1,515,587 UART: [ldev] CDI.KEYID = 6
1,515,950 UART: [ldev] SUBJECT.KEYID = 5
1,516,376 UART: [ldev] AUTHORITY.KEYID = 7
1,516,839 UART: [ldev] FE.KEYID = 1
1,522,009 UART: [ldev] Erasing FE.KEYID = 1
1,547,946 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,346 UART: [ldev] --
1,587,691 UART: [fwproc] Waiting for Commands...
1,588,334 UART: [fwproc] Received command 0x46574c44
1,589,125 UART: [fwproc] Received Image of size 119428 bytes
2,944,583 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,833 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,003,051 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,584 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,201 ready_for_fw is high
1,362,201 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,828 >>> mbox cmd response: success
3,052,107 UART:
3,052,123 UART: Running Caliptra FMC ...
3,052,531 UART:
3,052,585 UART: [state] CFI Enabled
3,063,131 UART: [fht] FMC Alias Private Key: 7
3,182,537 UART: [art] Extend RT PCRs Done
3,182,965 UART: [art] Lock RT PCRs Done
3,184,369 UART: [art] Populate DV Done
3,192,400 UART: [fht] FMC Alias Private Key: 7
3,193,458 UART: [art] Derive CDI
3,193,738 UART: [art] Store in slot 0x4
3,279,104 UART: [art] Derive Key Pair
3,279,464 UART: [art] Store priv key in slot 0x5
3,292,793 UART: [art] Derive Key Pair - Done
3,307,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,323,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,323,921 UART: [art] PUB.X = AC887C68B2D8BE561617E696F4A9321EBBFD093D33BEB01A9941FC86271B84759E1BAE8DA366C459EB3A7095D81F8FE1
3,330,700 UART: [art] PUB.Y = DF461E9068B8A9B0EAAB1CBF6E9DCCD0892E79E3EBF5409A3C254796DBCC03D75A0D1FA89674044A7A4C6C522886E345
3,337,657 UART: [art] SIG.R = 147371DEDBB25AF6276639BECAF26400BBF6D6848C27E63B3C2CC17435EC132E99AC2F65E0A56602D04F05105777DC84
3,344,405 UART: [art] SIG.S = C7069C4010D21AF5ED1B53224E91D657281683E9C22154409B18B072096B8B8FC4AEEA9FA76DE56533214469CE5E00BB
3,367,511 UART: Caliptra RT
3,367,762 UART: [state] CFI Enabled
3,487,176 UART: [rt] RT listening for mailbox commands...
3,487,839 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,517,788 UART: [rt]cmd =0x46504c54, len=4
3,518,930 >>> mbox cmd response data (8 bytes)
3,519,069 UART: [rt] FIPS self test
3,519,397 UART: [kat] ++
3,519,549 UART: [kat] sha1
3,523,661 UART: [kat] SHA2-256
3,525,683 UART: [kat] SHA2-384
3,528,636 UART: [kat] SHA2-512-ACC
3,530,563 UART: [kat] ECC-384
3,534,125 UART: Fatal Error: 0x90040004
3,535,664 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,535,669 >>> mbox cmd response: failed
3,535,669 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,535,674 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,347 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,622 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,983 UART: [state] LifecycleState = Unprovisioned
85,638 UART: [state] DebugLocked = No
86,130 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,652 UART: [kat] SHA2-256
881,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,698 UART: [kat] ++
885,850 UART: [kat] sha1
890,010 UART: [kat] SHA2-256
891,948 UART: [kat] SHA2-384
894,845 UART: [kat] SHA2-512-ACC
896,746 UART: [kat] ECC-384
902,361 UART: [kat] HMAC-384Kdf
907,001 UART: [kat] LMS
1,475,197 UART: [kat] --
1,475,904 UART: [cold-reset] ++
1,476,340 UART: [fht] Storing FHT @ 0x50003400
1,479,273 UART: [idev] ++
1,479,441 UART: [idev] CDI.KEYID = 6
1,479,801 UART: [idev] SUBJECT.KEYID = 7
1,480,225 UART: [idev] UDS.KEYID = 0
1,480,570 ready_for_fw is high
1,480,570 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,919 UART: [idev] Erasing UDS.KEYID = 0
1,505,157 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,727 UART: [idev] --
1,514,854 UART: [ldev] ++
1,515,022 UART: [ldev] CDI.KEYID = 6
1,515,385 UART: [ldev] SUBJECT.KEYID = 5
1,515,811 UART: [ldev] AUTHORITY.KEYID = 7
1,516,274 UART: [ldev] FE.KEYID = 1
1,521,570 UART: [ldev] Erasing FE.KEYID = 1
1,547,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,545 UART: [ldev] --
1,587,042 UART: [fwproc] Waiting for Commands...
1,587,677 UART: [fwproc] Received command 0x46574c44
1,588,468 UART: [fwproc] Received Image of size 119428 bytes
2,944,394 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,078 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,913 >>> mbox cmd response: success
3,145,075 UART: [afmc] ++
3,145,243 UART: [afmc] CDI.KEYID = 6
3,145,605 UART: [afmc] SUBJECT.KEYID = 7
3,146,030 UART: [afmc] AUTHORITY.KEYID = 5
3,181,297 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,421 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,201 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,910 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,793 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,476 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,168 UART: [afmc] --
3,224,120 UART: [cold-reset] --
3,224,900 UART: [state] Locking Datavault
3,226,165 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,769 UART: [state] Locking ICCM
3,227,309 UART: [exit] Launching FMC @ 0x40000130
3,232,639 UART:
3,232,655 UART: Running Caliptra FMC ...
3,233,063 UART:
3,233,206 UART: [state] CFI Enabled
3,243,740 UART: [fht] FMC Alias Private Key: 7
3,363,056 UART: [art] Extend RT PCRs Done
3,363,484 UART: [art] Lock RT PCRs Done
3,364,900 UART: [art] Populate DV Done
3,373,135 UART: [fht] FMC Alias Private Key: 7
3,374,163 UART: [art] Derive CDI
3,374,443 UART: [art] Store in slot 0x4
3,460,263 UART: [art] Derive Key Pair
3,460,623 UART: [art] Store priv key in slot 0x5
3,474,064 UART: [art] Derive Key Pair - Done
3,488,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,020 UART: [art] PUB.X = BCE7F068C436C050B1A931C321AE81AD3EC8CC903D8C2C11CC96FC2D8AC221A5FCFA2090972B73AE298326DE833DBF94
3,511,808 UART: [art] PUB.Y = 631E507F423728635760F448B1B24BFA027836DA1283CB69E7D6A54F742B63995D185BC458DE7E6067A3A8001861F3F5
3,518,725 UART: [art] SIG.R = 7B4557184A1649E0999E6EB1994DB11F1C64C76A8DDFF7B275C989F958E889354629FD6C7ED0EF9344E259FE061D076C
3,525,491 UART: [art] SIG.S = 9C9BB0C092FDE3DBA75D58D37C905B8123F75B61348BF3F5F3271A499708C806F690695A2D2AEEE68A7E736592C1B285
3,548,917 UART: Caliptra RT
3,549,260 UART: [state] CFI Enabled
3,668,406 UART: [rt] RT listening for mailbox commands...
3,669,069 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,868 UART: [rt]cmd =0x46504c54, len=4
3,700,034 >>> mbox cmd response data (8 bytes)
3,700,279 UART: [rt] FIPS self test
3,700,607 UART: [kat] ++
3,700,759 UART: [kat] sha1
3,705,063 UART: [kat] SHA2-256
3,707,085 UART: [kat] SHA2-384
3,710,182 UART: [kat] SHA2-512-ACC
3,712,109 UART: [kat] ECC-384
3,715,693 UART: Fatal Error: 0x90040004
3,717,232 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,717,237 >>> mbox cmd response: failed
3,717,237 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,717,242 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,030 UART: [kat] SHA2-256
881,961 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,076 UART: [kat] ++
886,228 UART: [kat] sha1
890,406 UART: [kat] SHA2-256
892,344 UART: [kat] SHA2-384
894,973 UART: [kat] SHA2-512-ACC
896,874 UART: [kat] ECC-384
902,571 UART: [kat] HMAC-384Kdf
907,383 UART: [kat] LMS
1,475,579 UART: [kat] --
1,476,236 UART: [cold-reset] ++
1,476,736 UART: [fht] Storing FHT @ 0x50003400
1,479,331 UART: [idev] ++
1,479,499 UART: [idev] CDI.KEYID = 6
1,479,859 UART: [idev] SUBJECT.KEYID = 7
1,480,283 UART: [idev] UDS.KEYID = 0
1,480,628 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,349 UART: [idev] Erasing UDS.KEYID = 0
1,505,109 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,657 UART: [idev] --
1,514,732 UART: [ldev] ++
1,514,900 UART: [ldev] CDI.KEYID = 6
1,515,263 UART: [ldev] SUBJECT.KEYID = 5
1,515,689 UART: [ldev] AUTHORITY.KEYID = 7
1,516,152 UART: [ldev] FE.KEYID = 1
1,521,542 UART: [ldev] Erasing FE.KEYID = 1
1,546,895 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,051 UART: [ldev] --
1,586,526 UART: [fwproc] Waiting for Commands...
1,587,245 UART: [fwproc] Received command 0x46574c44
1,588,036 UART: [fwproc] Received Image of size 119428 bytes
2,942,926 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,214 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,432 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,169 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,994 ready_for_fw is high
1,362,994 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,237 >>> mbox cmd response: success
3,055,056 UART:
3,055,072 UART: Running Caliptra FMC ...
3,055,480 UART:
3,055,623 UART: [state] CFI Enabled
3,065,987 UART: [fht] FMC Alias Private Key: 7
3,185,435 UART: [art] Extend RT PCRs Done
3,185,863 UART: [art] Lock RT PCRs Done
3,187,675 UART: [art] Populate DV Done
3,196,066 UART: [fht] FMC Alias Private Key: 7
3,197,132 UART: [art] Derive CDI
3,197,412 UART: [art] Store in slot 0x4
3,283,468 UART: [art] Derive Key Pair
3,283,828 UART: [art] Store priv key in slot 0x5
3,297,437 UART: [art] Derive Key Pair - Done
3,311,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,328,456 UART: [art] PUB.X = 7932C396176C04607685408EDF50DB0C1A1CA0D2F617B5392F87C5B8431172D0073AAAB65401C62DE72CD031B54849C4
3,335,210 UART: [art] PUB.Y = 3903F81328F72C0F4FE938DAEA385A9A0EFD3917EE74193E44693C2FA411E1299ACE07DC14E99DA5F7D1F1207B5C1F36
3,342,158 UART: [art] SIG.R = 1460E1F86062061456505E80C45706809AC9A63FF7B05C786635B7E3AED2AD17D8211D8F822B07985BC1E8CD4C5281B4
3,348,915 UART: [art] SIG.S = B13915750C9000860E630492C73DE1A2565F15F0B3E9A969B6AE0F71F4B73C309E5B332AE2D9B911532E45407C3455F8
3,373,051 UART: Caliptra RT
3,373,394 UART: [state] CFI Enabled
3,492,766 UART: [rt] RT listening for mailbox commands...
3,493,429 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,280 UART: [rt]cmd =0x46504c54, len=4
3,524,404 >>> mbox cmd response data (8 bytes)
3,524,571 UART: [rt] FIPS self test
3,524,899 UART: [kat] ++
3,525,051 UART: [kat] sha1
3,529,155 UART: [kat] SHA2-256
3,531,177 UART: [kat] SHA2-384
3,533,902 UART: [kat] SHA2-512-ACC
3,535,829 UART: [kat] ECC-384
3,539,185 UART: Fatal Error: 0x90040004
3,540,724 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,540,729 >>> mbox cmd response: failed
3,540,729 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,540,734 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,564 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,807 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,552 UART: [kat] SHA2-256
901,492 UART: [kat] SHA2-384
904,121 UART: [kat] SHA2-512-ACC
906,022 UART: [kat] ECC-384
915,499 UART: [kat] HMAC-384Kdf
920,305 UART: [kat] LMS
1,168,617 UART: [kat] --
1,169,690 UART: [cold-reset] ++
1,170,144 UART: [fht] FHT @ 0x50003400
1,172,720 UART: [idev] ++
1,172,888 UART: [idev] CDI.KEYID = 6
1,173,249 UART: [idev] SUBJECT.KEYID = 7
1,173,674 UART: [idev] UDS.KEYID = 0
1,174,020 ready_for_fw is high
1,174,020 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,399 UART: [idev] Erasing UDS.KEYID = 0
1,198,731 UART: [idev] Sha1 KeyId Algorithm
1,207,629 UART: [idev] --
1,208,756 UART: [ldev] ++
1,208,924 UART: [ldev] CDI.KEYID = 6
1,209,288 UART: [ldev] SUBJECT.KEYID = 5
1,209,715 UART: [ldev] AUTHORITY.KEYID = 7
1,210,178 UART: [ldev] FE.KEYID = 1
1,215,228 UART: [ldev] Erasing FE.KEYID = 1
1,241,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,032 UART: [ldev] --
1,280,265 UART: [fwproc] Wait for Commands...
1,280,880 UART: [fwproc] Recv command 0x46574c44
1,281,613 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,401 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,576 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,055 >>> mbox cmd response: success
2,837,195 UART: [afmc] ++
2,837,363 UART: [afmc] CDI.KEYID = 6
2,837,726 UART: [afmc] SUBJECT.KEYID = 7
2,838,152 UART: [afmc] AUTHORITY.KEYID = 5
2,873,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,889,240 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,889,989 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,895,699 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,901,580 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,907,281 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,915,136 UART: [afmc] --
2,916,025 UART: [cold-reset] --
2,916,941 UART: [state] Locking Datavault
2,918,058 UART: [state] Locking PCR0, PCR1 and PCR31
2,918,662 UART: [state] Locking ICCM
2,919,176 UART: [exit] Launching FMC @ 0x40000130
2,924,506 UART:
2,924,522 UART: Running Caliptra FMC ...
2,924,930 UART:
2,924,984 UART: [state] CFI Enabled
2,935,778 UART: [fht] FMC Alias Private Key: 7
3,055,048 UART: [art] Extend RT PCRs Done
3,055,476 UART: [art] Lock RT PCRs Done
3,056,942 UART: [art] Populate DV Done
3,065,305 UART: [fht] FMC Alias Private Key: 7
3,066,403 UART: [art] Derive CDI
3,066,683 UART: [art] Store in slot 0x4
3,152,650 UART: [art] Derive Key Pair
3,153,010 UART: [art] Store priv key in slot 0x5
3,166,454 UART: [art] Derive Key Pair - Done
3,180,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,060 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,825 UART: [art] PUB.X = 5E2909E94BACDC68A74287A09CF76E8545FD373F5D065FC0C4231578A8F95C331997E7E1D84DD3A3AF9D0C206E6A93F0
3,204,594 UART: [art] PUB.Y = 2A2D2E1C59824EC899AD2B33368812821A42A549F601F2E00009A031434AE1470952427350C4B0C11EA7C8788E42019E
3,211,498 UART: [art] SIG.R = 69FC886BC09ACA6B2766CFFFC614CD33EAEACF3080B586720EDA01CAB01655CCD523A0F6610D62D8529C874E61EE028F
3,218,274 UART: [art] SIG.S = 9FA244069AEE3C33F2201583BFD0D430FC195878A6F4928C09AFD7C77B58E4C79CDFA8C89E68EC88F8EB21C856265D7B
3,241,844 UART: Caliptra RT
3,242,095 UART: [state] CFI Enabled
3,361,262 UART: [rt] RT listening for mailbox commands...
3,361,925 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,082 UART: [rt]cmd =0x46504c54, len=4
3,393,246 >>> mbox cmd response data (8 bytes)
3,393,583 UART: [rt] FIPS self test
3,393,911 UART: [kat] ++
3,394,063 UART: [kat] sha1
3,398,291 UART: [kat] SHA2-256
3,400,313 UART: [kat] SHA2-384
3,403,064 UART: [kat] SHA2-512-ACC
3,404,991 UART: [kat] ECC-384
3,408,599 UART: Fatal Error: 0x90040004
3,410,138 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,143 >>> mbox cmd response: failed
3,410,143 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
891,350 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,454 UART: [kat] ++
895,606 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,445 UART: [kat] SHA2-512-ACC
906,346 UART: [kat] ECC-384
916,037 UART: [kat] HMAC-384Kdf
920,709 UART: [kat] LMS
1,169,021 UART: [kat] --
1,170,018 UART: [cold-reset] ++
1,170,502 UART: [fht] FHT @ 0x50003400
1,172,990 UART: [idev] ++
1,173,158 UART: [idev] CDI.KEYID = 6
1,173,519 UART: [idev] SUBJECT.KEYID = 7
1,173,944 UART: [idev] UDS.KEYID = 0
1,174,290 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,781 UART: [idev] Erasing UDS.KEYID = 0
1,198,435 UART: [idev] Sha1 KeyId Algorithm
1,207,307 UART: [idev] --
1,208,364 UART: [ldev] ++
1,208,532 UART: [ldev] CDI.KEYID = 6
1,208,896 UART: [ldev] SUBJECT.KEYID = 5
1,209,323 UART: [ldev] AUTHORITY.KEYID = 7
1,209,786 UART: [ldev] FE.KEYID = 1
1,215,020 UART: [ldev] Erasing FE.KEYID = 1
1,241,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,264 UART: [ldev] --
1,280,649 UART: [fwproc] Wait for Commands...
1,281,460 UART: [fwproc] Recv command 0x46574c44
1,282,193 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,662,697 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,693,872 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,469 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,148 ready_for_fw is high
1,059,148 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,610 >>> mbox cmd response: success
2,753,491 UART:
2,753,507 UART: Running Caliptra FMC ...
2,753,915 UART:
2,753,969 UART: [state] CFI Enabled
2,764,519 UART: [fht] FMC Alias Private Key: 7
2,883,211 UART: [art] Extend RT PCRs Done
2,883,639 UART: [art] Lock RT PCRs Done
2,885,441 UART: [art] Populate DV Done
2,893,880 UART: [fht] FMC Alias Private Key: 7
2,894,946 UART: [art] Derive CDI
2,895,226 UART: [art] Store in slot 0x4
2,981,571 UART: [art] Derive Key Pair
2,981,931 UART: [art] Store priv key in slot 0x5
2,995,105 UART: [art] Derive Key Pair - Done
3,009,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,701 UART: [art] PUB.X = B67627FDECF94A6A7D904270E855B4A4B9AE9954E17CD378FA727EB00629672C86055051B4B4CB1C302C783FC0CF5119
3,032,469 UART: [art] PUB.Y = 59D96E222161EF908B719AFE50D69CCA0EFFC65D4AB3C485D61B59F91DB74E74ABBB92D1A2155C82C2FC2234B3EA5A55
3,039,434 UART: [art] SIG.R = 62F7A52EC1F34AE02C7C7BF12A97166E3B38A0C4A76A99CA33EF7A49392AEC6C4E60A0BC680C374EFA1E107934DDDCAB
3,046,223 UART: [art] SIG.S = 49B9AB9A89EBB45D77269D9F83553BF4EEB1F72DF21B47F2C152356A9BDBC483C29B969B7B58A4B923D3C57E9F0F3D14
3,069,448 UART: Caliptra RT
3,069,699 UART: [state] CFI Enabled
3,189,711 UART: [rt] RT listening for mailbox commands...
3,190,374 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,279 UART: [rt]cmd =0x46504c54, len=4
3,221,425 >>> mbox cmd response data (8 bytes)
3,221,610 UART: [rt] FIPS self test
3,221,938 UART: [kat] ++
3,222,090 UART: [kat] sha1
3,226,210 UART: [kat] SHA2-256
3,228,232 UART: [kat] SHA2-384
3,231,023 UART: [kat] SHA2-512-ACC
3,232,950 UART: [kat] ECC-384
3,236,678 UART: Fatal Error: 0x90040004
3,238,217 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,238,222 >>> mbox cmd response: failed
3,238,222 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,238,227 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,394 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,184 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
891,709 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,813 UART: [kat] ++
895,965 UART: [kat] sha1
900,157 UART: [kat] SHA2-256
902,097 UART: [kat] SHA2-384
904,808 UART: [kat] SHA2-512-ACC
906,709 UART: [kat] ECC-384
916,302 UART: [kat] HMAC-384Kdf
920,890 UART: [kat] LMS
1,169,202 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,711 UART: [fht] FHT @ 0x50003400
1,173,251 UART: [idev] ++
1,173,419 UART: [idev] CDI.KEYID = 6
1,173,780 UART: [idev] SUBJECT.KEYID = 7
1,174,205 UART: [idev] UDS.KEYID = 0
1,174,551 ready_for_fw is high
1,174,551 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,112 UART: [idev] Erasing UDS.KEYID = 0
1,199,236 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,187 UART: [ldev] ++
1,209,355 UART: [ldev] CDI.KEYID = 6
1,209,719 UART: [ldev] SUBJECT.KEYID = 5
1,210,146 UART: [ldev] AUTHORITY.KEYID = 7
1,210,609 UART: [ldev] FE.KEYID = 1
1,215,657 UART: [ldev] Erasing FE.KEYID = 1
1,241,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,131 UART: [ldev] --
1,280,508 UART: [fwproc] Wait for Commands...
1,281,223 UART: [fwproc] Recv command 0x46574c44
1,281,956 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,664 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,839 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,524 >>> mbox cmd response: success
2,838,750 UART: [afmc] ++
2,838,918 UART: [afmc] CDI.KEYID = 6
2,839,281 UART: [afmc] SUBJECT.KEYID = 7
2,839,707 UART: [afmc] AUTHORITY.KEYID = 5
2,875,402 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,660 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,370 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,251 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,952 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,735 UART: [afmc] --
2,918,546 UART: [cold-reset] --
2,919,718 UART: [state] Locking Datavault
2,920,841 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,445 UART: [state] Locking ICCM
2,922,077 UART: [exit] Launching FMC @ 0x40000130
2,927,407 UART:
2,927,423 UART: Running Caliptra FMC ...
2,927,831 UART:
2,927,974 UART: [state] CFI Enabled
2,938,696 UART: [fht] FMC Alias Private Key: 7
3,057,468 UART: [art] Extend RT PCRs Done
3,057,896 UART: [art] Lock RT PCRs Done
3,059,770 UART: [art] Populate DV Done
3,068,211 UART: [fht] FMC Alias Private Key: 7
3,069,323 UART: [art] Derive CDI
3,069,603 UART: [art] Store in slot 0x4
3,155,228 UART: [art] Derive Key Pair
3,155,588 UART: [art] Store priv key in slot 0x5
3,169,102 UART: [art] Derive Key Pair - Done
3,183,742 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,862 UART: [art] PUB.X = C9BD21ED98E9917F007A197F5DEC7A78CE7CC3EED806BAD1872007917AA275C137C23623498881A16F6017835DB0398F
3,206,606 UART: [art] PUB.Y = B81E926CA1A90430BA2ED1B9704AD67D0EA9607B2DB845294AC4B0172DDBE177CE20116FD59AA2E8C26A65648A31DA91
3,213,562 UART: [art] SIG.R = 69938EBD5CEB1311F5EB238434FAF6EB8192F8CB1D592A7D99015B9C3647322C48E33A453E38D355228FACAF5608254C
3,220,330 UART: [art] SIG.S = F427021F4087A0875902A08D4C5D116BAC77F071523938FE9D561CFD2DFA026C49F414CDC710B28BF7A9898469C73131
3,244,277 UART: Caliptra RT
3,244,620 UART: [state] CFI Enabled
3,363,467 UART: [rt] RT listening for mailbox commands...
3,364,130 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,055 UART: [rt]cmd =0x46504c54, len=4
3,394,969 >>> mbox cmd response data (8 bytes)
3,395,276 UART: [rt] FIPS self test
3,395,604 UART: [kat] ++
3,395,756 UART: [kat] sha1
3,400,206 UART: [kat] SHA2-256
3,402,228 UART: [kat] SHA2-384
3,405,023 UART: [kat] SHA2-512-ACC
3,406,950 UART: [kat] ECC-384
3,410,518 UART: Fatal Error: 0x90040004
3,412,057 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,062 >>> mbox cmd response: failed
3,412,062 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,067 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [kat] SHA2-256
891,661 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,765 UART: [kat] ++
895,917 UART: [kat] sha1
900,329 UART: [kat] SHA2-256
902,269 UART: [kat] SHA2-384
905,070 UART: [kat] SHA2-512-ACC
906,971 UART: [kat] ECC-384
916,600 UART: [kat] HMAC-384Kdf
921,278 UART: [kat] LMS
1,169,590 UART: [kat] --
1,170,507 UART: [cold-reset] ++
1,171,053 UART: [fht] FHT @ 0x50003400
1,173,749 UART: [idev] ++
1,173,917 UART: [idev] CDI.KEYID = 6
1,174,278 UART: [idev] SUBJECT.KEYID = 7
1,174,703 UART: [idev] UDS.KEYID = 0
1,175,049 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,962 UART: [idev] Erasing UDS.KEYID = 0
1,199,916 UART: [idev] Sha1 KeyId Algorithm
1,208,590 UART: [idev] --
1,209,655 UART: [ldev] ++
1,209,823 UART: [ldev] CDI.KEYID = 6
1,210,187 UART: [ldev] SUBJECT.KEYID = 5
1,210,614 UART: [ldev] AUTHORITY.KEYID = 7
1,211,077 UART: [ldev] FE.KEYID = 1
1,216,201 UART: [ldev] Erasing FE.KEYID = 1
1,243,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,981 UART: [ldev] --
1,283,334 UART: [fwproc] Wait for Commands...
1,284,061 UART: [fwproc] Recv command 0x46574c44
1,284,794 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,060 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,235 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,850 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,101 ready_for_fw is high
1,059,101 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,931 >>> mbox cmd response: success
2,750,434 UART:
2,750,450 UART: Running Caliptra FMC ...
2,750,858 UART:
2,751,001 UART: [state] CFI Enabled
2,761,639 UART: [fht] FMC Alias Private Key: 7
2,880,919 UART: [art] Extend RT PCRs Done
2,881,347 UART: [art] Lock RT PCRs Done
2,882,373 UART: [art] Populate DV Done
2,890,602 UART: [fht] FMC Alias Private Key: 7
2,891,740 UART: [art] Derive CDI
2,892,020 UART: [art] Store in slot 0x4
2,977,613 UART: [art] Derive Key Pair
2,977,973 UART: [art] Store priv key in slot 0x5
2,991,505 UART: [art] Derive Key Pair - Done
3,006,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,330 UART: [art] PUB.X = DE7858D4B176303B1231E8F7068EF3012059D002DF96197B73CF5E73722C404D14D73CFBE8C7B70D855D835C3F9001B7
3,029,083 UART: [art] PUB.Y = 99315EFBC342BFFD4090919BCD2A89A9933B7231D32062E101362011195FCF90298203007C5A8909D37AE83736CC64AF
3,035,996 UART: [art] SIG.R = 169B2321DA2D75AE7D47FA0DAA80B5666B5D16CE0B3F0EF11AA97E37D6091B2F7803B2DE068EA749AC304DB297311194
3,042,758 UART: [art] SIG.S = 810F3A97A8969225B745BEAB42D72E4B4230E2B8D2AE8F870C5E160E0E01EE418628A18CB7CA2F588A42065D8C2D218F
3,067,050 UART: Caliptra RT
3,067,393 UART: [state] CFI Enabled
3,186,936 UART: [rt] RT listening for mailbox commands...
3,187,599 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,468 UART: [rt]cmd =0x46504c54, len=4
3,218,724 >>> mbox cmd response data (8 bytes)
3,218,887 UART: [rt] FIPS self test
3,219,215 UART: [kat] ++
3,219,367 UART: [kat] sha1
3,223,627 UART: [kat] SHA2-256
3,225,649 UART: [kat] SHA2-384
3,228,456 UART: [kat] SHA2-512-ACC
3,230,383 UART: [kat] ECC-384
3,234,115 UART: Fatal Error: 0x90040004
3,235,654 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,659 >>> mbox cmd response: failed
3,235,659 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,664 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,349 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,835 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
893,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,269 UART: [kat] ++
897,421 UART: [kat] sha1
901,631 UART: [kat] SHA2-256
903,571 UART: [kat] SHA2-384
906,468 UART: [kat] SHA2-512-ACC
908,369 UART: [kat] ECC-384
918,014 UART: [kat] HMAC-384Kdf
922,606 UART: [kat] LMS
1,170,934 UART: [kat] --
1,171,831 UART: [cold-reset] ++
1,172,395 UART: [fht] FHT @ 0x50003400
1,175,070 UART: [idev] ++
1,175,238 UART: [idev] CDI.KEYID = 6
1,175,598 UART: [idev] SUBJECT.KEYID = 7
1,176,022 UART: [idev] UDS.KEYID = 0
1,176,367 ready_for_fw is high
1,176,367 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,330 UART: [idev] Erasing UDS.KEYID = 0
1,201,429 UART: [idev] Sha1 KeyId Algorithm
1,209,763 UART: [idev] --
1,210,993 UART: [ldev] ++
1,211,161 UART: [ldev] CDI.KEYID = 6
1,211,524 UART: [ldev] SUBJECT.KEYID = 5
1,211,950 UART: [ldev] AUTHORITY.KEYID = 7
1,212,413 UART: [ldev] FE.KEYID = 1
1,217,589 UART: [ldev] Erasing FE.KEYID = 1
1,243,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,229 UART: [ldev] --
1,282,622 UART: [fwproc] Wait for Commands...
1,283,288 UART: [fwproc] Recv command 0x46574c44
1,284,016 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,026 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,196 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,705 >>> mbox cmd response: success
2,838,821 UART: [afmc] ++
2,838,989 UART: [afmc] CDI.KEYID = 6
2,839,351 UART: [afmc] SUBJECT.KEYID = 7
2,839,776 UART: [afmc] AUTHORITY.KEYID = 5
2,875,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,886 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,595 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,478 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,179 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,931 UART: [afmc] --
2,918,867 UART: [cold-reset] --
2,919,707 UART: [state] Locking Datavault
2,920,896 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,500 UART: [state] Locking ICCM
2,922,020 UART: [exit] Launching FMC @ 0x40000130
2,927,350 UART:
2,927,366 UART: Running Caliptra FMC ...
2,927,774 UART:
2,927,828 UART: [state] CFI Enabled
2,938,250 UART: [fht] FMC Alias Private Key: 7
3,056,940 UART: [art] Extend RT PCRs Done
3,057,368 UART: [art] Lock RT PCRs Done
3,058,942 UART: [art] Populate DV Done
3,067,063 UART: [fht] FMC Alias Private Key: 7
3,068,101 UART: [art] Derive CDI
3,068,381 UART: [art] Store in slot 0x4
3,154,032 UART: [art] Derive Key Pair
3,154,392 UART: [art] Store priv key in slot 0x5
3,167,866 UART: [art] Derive Key Pair - Done
3,182,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,846 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,611 UART: [art] PUB.X = BB3A19A1C4F5E562F17BBB72E6DC41294ED0E1B2F7E201A9AF2B55A873028F208F545107865B9A9EF5FEF1B5599A8F4B
3,205,386 UART: [art] PUB.Y = A7979E9C4E52ADAC528A62E94D7EEFB94D03E388F84CB37D5B3D27030625E775CDAAB9703C95F3FCBAC70AD2315553AF
3,212,342 UART: [art] SIG.R = 259A1E8E6896A9C13121376B472C8DE4A72C5BF21CB734DE2DEDE08DADEC1E8CFAF998A3A71E913EA8FBA262DA77EEBA
3,219,140 UART: [art] SIG.S = E03FA4BC0D24A3E83CD10C9B8D0834709311D89E00DA752528CC76F0CB3AA88CA7CCF30515E6A1CAC8C7F3C69DB1FD6B
3,242,844 UART: Caliptra RT
3,243,095 UART: [state] CFI Enabled
3,363,642 UART: [rt] RT listening for mailbox commands...
3,364,305 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,078 UART: [rt]cmd =0x46504c54, len=4
3,395,212 >>> mbox cmd response data (8 bytes)
3,395,563 UART: [rt] FIPS self test
3,395,891 UART: [kat] ++
3,396,043 UART: [kat] sha1
3,400,153 UART: [kat] SHA2-256
3,402,175 UART: [kat] SHA2-384
3,404,866 UART: [kat] SHA2-512-ACC
3,406,793 UART: [kat] ECC-384
3,410,395 UART: Fatal Error: 0x90040004
3,411,934 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,411,939 >>> mbox cmd response: failed
3,411,939 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,411,944 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,700 UART: [state] LifecycleState = Unprovisioned
85,355 UART: [state] DebugLocked = No
85,845 UART: [state] WD Timer not started. Device not locked for debugging
87,116 UART: [kat] SHA2-256
892,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,891 UART: [kat] ++
897,043 UART: [kat] sha1
901,235 UART: [kat] SHA2-256
903,175 UART: [kat] SHA2-384
905,890 UART: [kat] SHA2-512-ACC
907,791 UART: [kat] ECC-384
916,822 UART: [kat] HMAC-384Kdf
921,572 UART: [kat] LMS
1,169,900 UART: [kat] --
1,170,735 UART: [cold-reset] ++
1,171,251 UART: [fht] FHT @ 0x50003400
1,173,826 UART: [idev] ++
1,173,994 UART: [idev] CDI.KEYID = 6
1,174,354 UART: [idev] SUBJECT.KEYID = 7
1,174,778 UART: [idev] UDS.KEYID = 0
1,175,123 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,974 UART: [idev] Erasing UDS.KEYID = 0
1,200,023 UART: [idev] Sha1 KeyId Algorithm
1,208,515 UART: [idev] --
1,209,455 UART: [ldev] ++
1,209,623 UART: [ldev] CDI.KEYID = 6
1,209,986 UART: [ldev] SUBJECT.KEYID = 5
1,210,412 UART: [ldev] AUTHORITY.KEYID = 7
1,210,875 UART: [ldev] FE.KEYID = 1
1,216,061 UART: [ldev] Erasing FE.KEYID = 1
1,242,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,911 UART: [ldev] --
1,281,406 UART: [fwproc] Wait for Commands...
1,282,030 UART: [fwproc] Recv command 0x46574c44
1,282,758 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,410 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,580 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,119 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,031 ready_for_fw is high
1,061,031 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,830 >>> mbox cmd response: success
2,755,087 UART:
2,755,103 UART: Running Caliptra FMC ...
2,755,511 UART:
2,755,565 UART: [state] CFI Enabled
2,766,051 UART: [fht] FMC Alias Private Key: 7
2,884,859 UART: [art] Extend RT PCRs Done
2,885,287 UART: [art] Lock RT PCRs Done
2,886,741 UART: [art] Populate DV Done
2,894,998 UART: [fht] FMC Alias Private Key: 7
2,896,010 UART: [art] Derive CDI
2,896,290 UART: [art] Store in slot 0x4
2,982,415 UART: [art] Derive Key Pair
2,982,775 UART: [art] Store priv key in slot 0x5
2,995,765 UART: [art] Derive Key Pair - Done
3,010,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,505 UART: [art] PUB.X = 1DAD8CA420F6D54BE08298DDC8046BE3760BFF5657A785DB7ADE591BEBDCEE42FD892FA73E13E097613579A222733B3E
3,033,285 UART: [art] PUB.Y = D76DF6A420B1D2E22D48D8BF6B1BCFB69913061FF4039655664370B4E707FFEF97F21158861E80B37138C67B2560E3D9
3,040,226 UART: [art] SIG.R = AEEFA92094660997D6FD1FD7C48B886161761337215D7407E7B4E96A54415D6821E63D0FEA98D8D26A1C778FD57F519D
3,046,987 UART: [art] SIG.S = 057557B7DD36BBC48613BE8D70E4E5C866D7BE3C6BFA3C28E97E76544F96B56AF45A7CA9CACDF073B8BBF4C16A3692CE
3,070,584 UART: Caliptra RT
3,070,835 UART: [state] CFI Enabled
3,190,010 UART: [rt] RT listening for mailbox commands...
3,190,673 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,348 UART: [rt]cmd =0x46504c54, len=4
3,221,440 >>> mbox cmd response data (8 bytes)
3,221,801 UART: [rt] FIPS self test
3,222,129 UART: [kat] ++
3,222,281 UART: [kat] sha1
3,226,437 UART: [kat] SHA2-256
3,228,459 UART: [kat] SHA2-384
3,231,322 UART: [kat] SHA2-512-ACC
3,233,249 UART: [kat] ECC-384
3,237,173 UART: Fatal Error: 0x90040004
3,238,712 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,238,717 >>> mbox cmd response: failed
3,238,717 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,238,722 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,659 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,814 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
893,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,794 UART: [kat] ++
897,946 UART: [kat] sha1
902,202 UART: [kat] SHA2-256
904,142 UART: [kat] SHA2-384
906,941 UART: [kat] SHA2-512-ACC
908,842 UART: [kat] ECC-384
919,093 UART: [kat] HMAC-384Kdf
923,719 UART: [kat] LMS
1,172,047 UART: [kat] --
1,173,166 UART: [cold-reset] ++
1,173,708 UART: [fht] FHT @ 0x50003400
1,176,477 UART: [idev] ++
1,176,645 UART: [idev] CDI.KEYID = 6
1,177,005 UART: [idev] SUBJECT.KEYID = 7
1,177,429 UART: [idev] UDS.KEYID = 0
1,177,774 ready_for_fw is high
1,177,774 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,185,261 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,796 UART: [idev] --
1,211,878 UART: [ldev] ++
1,212,046 UART: [ldev] CDI.KEYID = 6
1,212,409 UART: [ldev] SUBJECT.KEYID = 5
1,212,835 UART: [ldev] AUTHORITY.KEYID = 7
1,213,298 UART: [ldev] FE.KEYID = 1
1,218,712 UART: [ldev] Erasing FE.KEYID = 1
1,244,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,586 UART: [ldev] --
1,284,039 UART: [fwproc] Wait for Commands...
1,284,627 UART: [fwproc] Recv command 0x46574c44
1,285,355 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,371 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,541 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,841,164 >>> mbox cmd response: success
2,842,310 UART: [afmc] ++
2,842,478 UART: [afmc] CDI.KEYID = 6
2,842,840 UART: [afmc] SUBJECT.KEYID = 7
2,843,265 UART: [afmc] AUTHORITY.KEYID = 5
2,879,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,895,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,896,211 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,901,920 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,907,803 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,913,504 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,921,422 UART: [afmc] --
2,922,408 UART: [cold-reset] --
2,923,264 UART: [state] Locking Datavault
2,924,561 UART: [state] Locking PCR0, PCR1 and PCR31
2,925,165 UART: [state] Locking ICCM
2,925,799 UART: [exit] Launching FMC @ 0x40000130
2,931,129 UART:
2,931,145 UART: Running Caliptra FMC ...
2,931,553 UART:
2,931,696 UART: [state] CFI Enabled
2,942,516 UART: [fht] FMC Alias Private Key: 7
3,061,946 UART: [art] Extend RT PCRs Done
3,062,374 UART: [art] Lock RT PCRs Done
3,063,986 UART: [art] Populate DV Done
3,072,259 UART: [fht] FMC Alias Private Key: 7
3,073,347 UART: [art] Derive CDI
3,073,627 UART: [art] Store in slot 0x4
3,159,234 UART: [art] Derive Key Pair
3,159,594 UART: [art] Store priv key in slot 0x5
3,172,684 UART: [art] Derive Key Pair - Done
3,187,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,203,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,204,133 UART: [art] PUB.X = 178997E456986D078A79CC857D05FB74E22A4FDB18D1A1F65FA54D3C1FAFB20FEF45F978DD6DA9075FC2BCAC6A4D674F
3,210,911 UART: [art] PUB.Y = 0FB385ECAAADAB456063ED4117B11257FB7C2F26CEC6046DA5B85AD096C5EEF09B86352439F4361195A140DCA38FEC72
3,217,869 UART: [art] SIG.R = 3867C2D61796CEDC5BADCCFF5434C9908AE6219BAADC828DF2DF82316799BF64B102AF405655AC780A5AD3EDB511CFD8
3,224,653 UART: [art] SIG.S = 5E259FC4B0C9712A6074C1AEADA4795ED95F1D2599733EF2CF7EFC5F8F86BD7BF03C088C3B0CB76BFAD3CFF2E67BA7DC
3,248,205 UART: Caliptra RT
3,248,548 UART: [state] CFI Enabled
3,368,852 UART: [rt] RT listening for mailbox commands...
3,369,515 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,399,374 UART: [rt]cmd =0x46504c54, len=4
3,400,564 >>> mbox cmd response data (8 bytes)
3,400,927 UART: [rt] FIPS self test
3,401,255 UART: [kat] ++
3,401,407 UART: [kat] sha1
3,405,625 UART: [kat] SHA2-256
3,407,647 UART: [kat] SHA2-384
3,410,454 UART: [kat] SHA2-512-ACC
3,412,381 UART: [kat] ECC-384
3,416,079 UART: Fatal Error: 0x90040004
3,417,618 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,417,623 >>> mbox cmd response: failed
3,417,623 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,417,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,184 UART: [kat] SHA2-256
904,124 UART: [kat] SHA2-384
907,109 UART: [kat] SHA2-512-ACC
909,010 UART: [kat] ECC-384
918,859 UART: [kat] HMAC-384Kdf
923,361 UART: [kat] LMS
1,171,689 UART: [kat] --
1,172,582 UART: [cold-reset] ++
1,173,066 UART: [fht] FHT @ 0x50003400
1,175,811 UART: [idev] ++
1,175,979 UART: [idev] CDI.KEYID = 6
1,176,339 UART: [idev] SUBJECT.KEYID = 7
1,176,763 UART: [idev] UDS.KEYID = 0
1,177,108 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,963 UART: [idev] Erasing UDS.KEYID = 0
1,201,682 UART: [idev] Sha1 KeyId Algorithm
1,210,174 UART: [idev] --
1,211,144 UART: [ldev] ++
1,211,312 UART: [ldev] CDI.KEYID = 6
1,211,675 UART: [ldev] SUBJECT.KEYID = 5
1,212,101 UART: [ldev] AUTHORITY.KEYID = 7
1,212,564 UART: [ldev] FE.KEYID = 1
1,218,078 UART: [ldev] Erasing FE.KEYID = 1
1,244,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,400 UART: [ldev] --
1,284,733 UART: [fwproc] Wait for Commands...
1,285,379 UART: [fwproc] Recv command 0x46574c44
1,286,107 UART: [fwproc] Recv'd Img size: 119428 bytes
2,641,260 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,863 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,033 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,564 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,970 ready_for_fw is high
1,060,970 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,897 >>> mbox cmd response: success
2,754,232 UART:
2,754,248 UART: Running Caliptra FMC ...
2,754,656 UART:
2,754,799 UART: [state] CFI Enabled
2,765,307 UART: [fht] FMC Alias Private Key: 7
2,884,481 UART: [art] Extend RT PCRs Done
2,884,909 UART: [art] Lock RT PCRs Done
2,886,461 UART: [art] Populate DV Done
2,894,664 UART: [fht] FMC Alias Private Key: 7
2,895,752 UART: [art] Derive CDI
2,896,032 UART: [art] Store in slot 0x4
2,981,939 UART: [art] Derive Key Pair
2,982,299 UART: [art] Store priv key in slot 0x5
2,995,297 UART: [art] Derive Key Pair - Done
3,009,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,750 UART: [art] PUB.X = F368E8E7B0D6361574EB3125CE991896AC13FF45F56CDE685D905DE29F568E5F1B5E222F5519330FCC3C4FAEDA77C589
3,032,527 UART: [art] PUB.Y = 05CF39BE4AD0BB536DE169B412E2BE54E5ABEF2ADE75D83BC84EB3E6BA3BB65611B29BF0BF9AF004B09510F48231817A
3,039,493 UART: [art] SIG.R = 57044B6C0DF00C93AD671E8C2EB60C186E6A4BAC3A0EEF2F377947887F11F1F9CCA8E279EA42C96F88E667D9827268E6
3,046,258 UART: [art] SIG.S = 4E52E799A232CB82AC6C6A119DAEBA7558DA4F7B05423A4875C4148299BDFF0E62B3D08598870B797A07B3FDEFB7A39E
3,070,306 UART: Caliptra RT
3,070,649 UART: [state] CFI Enabled
3,191,043 UART: [rt] RT listening for mailbox commands...
3,191,706 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,651 UART: [rt]cmd =0x46504c54, len=4
3,222,791 >>> mbox cmd response data (8 bytes)
3,223,116 UART: [rt] FIPS self test
3,223,444 UART: [kat] ++
3,223,596 UART: [kat] sha1
3,227,816 UART: [kat] SHA2-256
3,229,838 UART: [kat] SHA2-384
3,232,845 UART: [kat] SHA2-512-ACC
3,234,772 UART: [kat] ECC-384
3,238,562 UART: Fatal Error: 0x90040004
3,240,101 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,240,106 >>> mbox cmd response: failed
3,240,106 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,240,111 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,168 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,863 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
5,172,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,322,754 >>> mbox cmd response: failed
5,323,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,472,222 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,428,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,249,767 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
5,150,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,300,106 >>> mbox cmd response: failed
5,300,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,449,681 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,437,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,278,341 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,498 writing to cptra_bootfsm_go
5,497,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,646,915 >>> mbox cmd response: failed
5,647,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,796,374 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
17,845,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,563,978 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
5,493,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,643,229 >>> mbox cmd response: failed
5,643,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,793,230 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
17,852,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,564,791 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
5,150,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,300,669 >>> mbox cmd response: failed
5,301,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,450,118 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,434,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,288,888 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
5,154,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,304,589 >>> mbox cmd response: failed
5,305,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,454,030 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,432,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,251,900 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
5,494,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,644,591 >>> mbox cmd response: failed
5,645,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,794,599 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
17,842,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,564,965 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,606 writing to cptra_bootfsm_go
5,499,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,649,226 >>> mbox cmd response: failed
5,649,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,798,649 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
17,843,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,548,822 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,885 >>> mbox cmd response: failed
825,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,891 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,152 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,143 >>> mbox cmd response: failed
826,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,149 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,826 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,752 >>> mbox cmd response: failed
825,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,758 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,577 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,908 >>> mbox cmd response: failed
825,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,914 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,373 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,955 >>> mbox cmd response: failed
825,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,580 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,215 >>> mbox cmd response: failed
826,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,221 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,824 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,304 >>> mbox cmd response: failed
826,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,310 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,823 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,902 >>> mbox cmd response: failed
825,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,943 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,325 UART:
192,693 UART: Running Caliptra ROM ...
193,886 UART:
194,042 UART: [state] CFI Enabled
264,811 UART: [state] LifecycleState = Unprovisioned
266,790 UART: [state] DebugLocked = No
268,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,713 UART: [kat] SHA2-256
442,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,920 UART: [kat] ++
453,464 UART: [kat] sha1
464,131 UART: [kat] SHA2-256
466,792 UART: [kat] SHA2-384
471,862 UART: [kat] SHA2-512-ACC
474,229 UART: [kat] ECC-384
2,766,284 UART: [kat] HMAC-384Kdf
2,777,339 UART: [kat] LMS
3,967,646 UART: [kat] --
3,974,666 UART: [cold-reset] ++
3,976,146 UART: [fht] Storing FHT @ 0x50003400
3,987,506 UART: [idev] ++
3,988,080 UART: [idev] CDI.KEYID = 6
3,989,039 UART: [idev] SUBJECT.KEYID = 7
3,990,300 UART: [idev] UDS.KEYID = 0
3,991,315 ready_for_fw is high
3,991,565 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,141,840 UART: [idev] Erasing UDS.KEYID = 0
7,332,117 UART: [idev] Using Sha1 for KeyId Algorithm
7,354,481 UART: [idev] --
7,357,719 UART: [ldev] ++
7,358,301 UART: [ldev] CDI.KEYID = 6
7,359,375 UART: [ldev] SUBJECT.KEYID = 5
7,360,482 UART: [ldev] AUTHORITY.KEYID = 7
7,361,767 UART: [ldev] FE.KEYID = 1
7,407,182 UART: [ldev] Erasing FE.KEYID = 1
10,738,175 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,120 UART: [ldev] --
13,099,182 UART: [fwproc] Waiting for Commands...
13,102,058 UART: [fwproc] Received command 0x46574c44
13,104,265 UART: [fwproc] Received Image of size 119428 bytes
17,222,836 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,298,312 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,371,497 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,703,942 >>> mbox cmd response: success
17,707,679 UART: [afmc] ++
17,708,272 UART: [afmc] CDI.KEYID = 6
17,709,188 UART: [afmc] SUBJECT.KEYID = 7
17,710,411 UART: [afmc] AUTHORITY.KEYID = 5
21,076,856 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,375,513 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,377,772 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,392,203 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,406,943 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,421,397 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,443,094 UART: [afmc] --
23,447,241 UART: [cold-reset] --
23,450,241 UART: [state] Locking Datavault
23,456,841 UART: [state] Locking PCR0, PCR1 and PCR31
23,458,595 UART: [state] Locking ICCM
23,460,310 UART: [exit] Launching FMC @ 0x40000130
23,468,708 UART:
23,468,950 UART: Running Caliptra FMC ...
23,470,056 UART:
23,470,217 UART: [state] CFI Enabled
23,535,072 UART: [fht] FMC Alias Private Key: 7
25,875,532 UART: [art] Extend RT PCRs Done
25,876,760 UART: [art] Lock RT PCRs Done
25,878,635 UART: [art] Populate DV Done
25,884,287 UART: [fht] FMC Alias Private Key: 7
25,886,003 UART: [art] Derive CDI
25,886,834 UART: [art] Store in slot 0x4
25,943,178 UART: [art] Derive Key Pair
25,944,219 UART: [art] Store priv key in slot 0x5
29,236,711 UART: [art] Derive Key Pair - Done
29,249,848 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,783 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,289 UART: [art] PUB.X = 1C18B381B126D404F53360081DA14586D4D2584C285829A52A07239B3E1E515EA12B1787D74ABA867DFDCA314CEF03D0
31,547,568 UART: [art] PUB.Y = B635B96C267400A0B06B477916D640BDCBC060B2AC224A36162340054B55538E613ABC0AC69FBD42DB339EDD6086FD81
31,554,814 UART: [art] SIG.R = FE0877CFC8C756CB34B087DC0792D588FA3F24AFF48EE139774CD9D21F2657C88158FA1CDF13CA90683DC791536B7C29
31,562,219 UART: [art] SIG.S = 5177D07C66EE08E2412A31AB0F7C3DCE4B265A3E4B929B8F43ED084858B9CCFBFFBA6A83AAC6BD0E6CED12361FC85F91
32,867,641 UART: Caliptra RT
32,868,350 UART: [state] CFI Enabled
33,044,843 UART: [rt] RT listening for mailbox commands...
33,046,722 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,076,515 UART: [rt]cmd =0x46504c54, len=4
33,078,167 >>> mbox cmd response data (8 bytes)
33,078,979 UART: [rt] FIPS self test
33,079,860 UART: [kat] ++
33,080,308 UART: [kat] sha1
33,084,601 UART: [kat] SHA2-256
33,086,539 UART: [kat] SHA2-384
33,089,737 UART: [kat] SHA2-512-ACC
33,091,815 UART: [kat] ECC-384
36,363,390 UART: Fatal Error: 0x90040003
36,398,778 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,548,779 >>> mbox cmd response: failed
36,549,430 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,699,383 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,014 UART:
190,328 UART: Running Caliptra ROM ...
191,450 UART:
191,597 UART: [state] CFI Enabled
258,718 UART: [state] LifecycleState = Unprovisioned
260,643 UART: [state] DebugLocked = No
263,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,229 UART: [kat] SHA2-256
438,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,400 UART: [kat] ++
449,988 UART: [kat] sha1
462,383 UART: [kat] SHA2-256
465,061 UART: [kat] SHA2-384
471,805 UART: [kat] SHA2-512-ACC
474,156 UART: [kat] ECC-384
2,761,746 UART: [kat] HMAC-384Kdf
2,794,178 UART: [kat] LMS
3,984,511 UART: [kat] --
3,988,194 UART: [cold-reset] ++
3,989,649 UART: [fht] Storing FHT @ 0x50003400
4,000,532 UART: [idev] ++
4,001,108 UART: [idev] CDI.KEYID = 6
4,001,996 UART: [idev] SUBJECT.KEYID = 7
4,003,270 UART: [idev] UDS.KEYID = 0
4,004,819 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,155,530 UART: [idev] Erasing UDS.KEYID = 0
7,340,659 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,347 UART: [idev] --
7,365,491 UART: [ldev] ++
7,366,071 UART: [ldev] CDI.KEYID = 6
7,367,015 UART: [ldev] SUBJECT.KEYID = 5
7,368,238 UART: [ldev] AUTHORITY.KEYID = 7
7,369,529 UART: [ldev] FE.KEYID = 1
7,416,519 UART: [ldev] Erasing FE.KEYID = 1
10,748,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,042,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,056,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,086,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,160 UART: [ldev] --
13,110,769 UART: [fwproc] Waiting for Commands...
13,113,230 UART: [fwproc] Received command 0x46574c44
13,115,426 UART: [fwproc] Received Image of size 119428 bytes
17,238,492 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,310,741 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,383,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,716,054 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
3,804,901 ready_for_fw is high
3,805,305 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,976,915 >>> mbox cmd response: success
23,677,247 UART:
23,677,674 UART: Running Caliptra FMC ...
23,678,791 UART:
23,678,957 UART: [state] CFI Enabled
23,744,914 UART: [fht] FMC Alias Private Key: 7
26,085,413 UART: [art] Extend RT PCRs Done
26,086,645 UART: [art] Lock RT PCRs Done
26,088,089 UART: [art] Populate DV Done
26,093,744 UART: [fht] FMC Alias Private Key: 7
26,095,197 UART: [art] Derive CDI
26,095,940 UART: [art] Store in slot 0x4
26,153,691 UART: [art] Derive Key Pair
26,154,740 UART: [art] Store priv key in slot 0x5
29,447,437 UART: [art] Derive Key Pair - Done
29,460,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,844 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,380 UART: [art] PUB.X = BE3514D3304D4889B1D6F3641714B4C9DADB6572860CDA10A269651EB3667143C13ECEB384394319EFE034DC3F321FA8
31,758,665 UART: [art] PUB.Y = DBE7AB589C18CCE39EE0FFA30FFC30172EEEF29D1AFBE780A18CF8D6A83A91B86BA03CDD728C988E351E7C3AF8B6DB46
31,765,950 UART: [art] SIG.R = A60BCF58304D86CC2F342F16F0CACBBD440CE6A458307893D52CF2B7E3D25E22A81CBCDD6FE982149124F9FB6B88BD58
31,773,360 UART: [art] SIG.S = 31D83C6623F088F8DF3B2FFF2E6269EB5B491000AACA9F779D14B30EB28FF79EAEBFD81FDD52956BA4F78D67B71CDB57
33,078,430 UART: Caliptra RT
33,079,160 UART: [state] CFI Enabled
33,256,442 UART: [rt] RT listening for mailbox commands...
33,258,305 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,287,835 UART: [rt]cmd =0x46504c54, len=4
33,289,290 >>> mbox cmd response data (8 bytes)
33,290,420 UART: [rt] FIPS self test
33,291,369 UART: [kat] ++
33,291,820 UART: [kat] sha1
33,296,412 UART: [kat] SHA2-256
33,298,292 UART: [kat] SHA2-384
33,301,253 UART: [kat] SHA2-512-ACC
33,303,513 UART: [kat] ECC-384
36,575,963 UART: Fatal Error: 0x90040003
36,611,264 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,761,241 >>> mbox cmd response: failed
36,761,909 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,911,811 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,800,146 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,995,650 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,594 UART:
192,953 UART: Running Caliptra ROM ...
194,067 UART:
603,687 UART: [state] CFI Enabled
617,493 UART: [state] LifecycleState = Unprovisioned
619,436 UART: [state] DebugLocked = No
621,315 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,254 UART: [kat] SHA2-256
796,026 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,539 UART: [kat] ++
806,988 UART: [kat] sha1
817,461 UART: [kat] SHA2-256
820,128 UART: [kat] SHA2-384
824,564 UART: [kat] SHA2-512-ACC
826,938 UART: [kat] ECC-384
3,112,698 UART: [kat] HMAC-384Kdf
3,124,385 UART: [kat] LMS
4,314,534 UART: [kat] --
4,319,767 UART: [cold-reset] ++
4,321,217 UART: [fht] Storing FHT @ 0x50003400
4,332,641 UART: [idev] ++
4,333,221 UART: [idev] CDI.KEYID = 6
4,334,262 UART: [idev] SUBJECT.KEYID = 7
4,335,452 UART: [idev] UDS.KEYID = 0
4,336,453 ready_for_fw is high
4,336,674 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,486,661 UART: [idev] Erasing UDS.KEYID = 0
7,621,913 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,532 UART: [idev] --
7,648,478 UART: [ldev] ++
7,649,110 UART: [ldev] CDI.KEYID = 6
7,650,029 UART: [ldev] SUBJECT.KEYID = 5
7,651,258 UART: [ldev] AUTHORITY.KEYID = 7
7,652,499 UART: [ldev] FE.KEYID = 1
7,664,338 UART: [ldev] Erasing FE.KEYID = 1
10,954,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,874 UART: [ldev] --
13,312,666 UART: [fwproc] Waiting for Commands...
13,314,985 UART: [fwproc] Received command 0x46574c44
13,317,194 UART: [fwproc] Received Image of size 119428 bytes
17,436,345 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,512,810 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,585,949 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,918,048 >>> mbox cmd response: success
17,922,320 UART: [afmc] ++
17,922,924 UART: [afmc] CDI.KEYID = 6
17,923,840 UART: [afmc] SUBJECT.KEYID = 7
17,925,121 UART: [afmc] AUTHORITY.KEYID = 5
21,243,280 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,536,688 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,538,957 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,553,338 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,568,089 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,582,510 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,605,602 UART: [afmc] --
23,608,641 UART: [cold-reset] --
23,611,974 UART: [state] Locking Datavault
23,618,414 UART: [state] Locking PCR0, PCR1 and PCR31
23,620,207 UART: [state] Locking ICCM
23,622,882 UART: [exit] Launching FMC @ 0x40000130
23,631,279 UART:
23,631,525 UART: Running Caliptra FMC ...
23,632,638 UART:
23,632,812 UART: [state] CFI Enabled
23,640,816 UART: [fht] FMC Alias Private Key: 7
25,981,108 UART: [art] Extend RT PCRs Done
25,982,332 UART: [art] Lock RT PCRs Done
25,983,859 UART: [art] Populate DV Done
25,989,060 UART: [fht] FMC Alias Private Key: 7
25,990,539 UART: [art] Derive CDI
25,991,312 UART: [art] Store in slot 0x4
26,033,654 UART: [art] Derive Key Pair
26,034,666 UART: [art] Store priv key in slot 0x5
29,276,655 UART: [art] Derive Key Pair - Done
29,290,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,570,533 UART: [art] Erasing AUTHORITY.KEYID = 7
31,572,056 UART: [art] PUB.X = 5EF81A13EA45FD35C7CF88209A3179074CD1E578AE1F84543BF3BEC94416791A2787CBF8FC199F0C17CA69E19D0FC941
31,579,333 UART: [art] PUB.Y = 80470E1405BFFAC7E0A90CB6E6BB6995B21AFC12ACDD15E6E69CA59E5CC808D905F1EF6B8DBDA20B34D6A6C66F659B4B
31,586,729 UART: [art] SIG.R = 40902DA8F8B675B25014DCDB7C9F2D0864B57531405E1D872701752C5435ABBD4490F441CDAF08697A01F7DF7024A7E2
31,593,993 UART: [art] SIG.S = 3B9044D368CCA990BFAF2D2B8CB4CF979C6377C1ACBC1229A6315CEDD4833F9F8C487FD39DE652FA959370A3D3CBDB02
32,898,725 UART: Caliptra RT
32,899,445 UART: [state] CFI Enabled
33,032,326 UART: [rt] RT listening for mailbox commands...
33,034,182 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,063,775 UART: [rt]cmd =0x46504c54, len=4
33,065,579 >>> mbox cmd response data (8 bytes)
33,066,387 UART: [rt] FIPS self test
33,067,366 UART: [kat] ++
33,067,828 UART: [kat] sha1
33,072,345 UART: [kat] SHA2-256
33,074,285 UART: [kat] SHA2-384
33,077,201 UART: [kat] SHA2-512-ACC
33,079,498 UART: [kat] ECC-384
36,320,286 UART: Fatal Error: 0x90040003
36,355,577 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,505,879 >>> mbox cmd response: failed
36,506,559 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,656,460 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
189,992 UART:
190,285 UART: Running Caliptra ROM ...
191,314 UART:
3,878,653 UART: [state] CFI Enabled
3,891,846 UART: [state] LifecycleState = Unprovisioned
3,893,793 UART: [state] DebugLocked = No
3,896,490 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,900,579 UART: [kat] SHA2-256
4,070,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,080,878 UART: [kat] ++
4,081,435 UART: [kat] sha1
4,091,479 UART: [kat] SHA2-256
4,094,180 UART: [kat] SHA2-384
4,100,230 UART: [kat] SHA2-512-ACC
4,102,588 UART: [kat] ECC-384
6,387,908 UART: [kat] HMAC-384Kdf
6,399,972 UART: [kat] LMS
7,590,125 UART: [kat] --
7,594,276 UART: [cold-reset] ++
7,595,952 UART: [fht] Storing FHT @ 0x50003400
7,607,978 UART: [idev] ++
7,608,556 UART: [idev] CDI.KEYID = 6
7,609,444 UART: [idev] SUBJECT.KEYID = 7
7,610,719 UART: [idev] UDS.KEYID = 0
7,612,275 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
7,762,274 UART: [idev] Erasing UDS.KEYID = 0
10,896,522 UART: [idev] Using Sha1 for KeyId Algorithm
10,919,059 UART: [idev] --
10,923,499 UART: [ldev] ++
10,924,132 UART: [ldev] CDI.KEYID = 6
10,925,050 UART: [ldev] SUBJECT.KEYID = 5
10,926,268 UART: [ldev] AUTHORITY.KEYID = 7
10,927,507 UART: [ldev] FE.KEYID = 1
10,939,031 UART: [ldev] Erasing FE.KEYID = 1
14,227,398 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,519,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,534,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,549,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,563,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,583,106 UART: [ldev] --
16,587,465 UART: [fwproc] Waiting for Commands...
16,590,810 UART: [fwproc] Received command 0x46574c44
16,593,003 UART: [fwproc] Received Image of size 119428 bytes
20,712,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,783,208 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,856,390 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
21,188,126 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
13,481 writing to cptra_bootfsm_go
4,138,719 ready_for_fw is high
4,139,330 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,179,925 >>> mbox cmd response: success
23,818,876 UART:
23,819,499 UART: Running Caliptra FMC ...
23,820,637 UART:
23,820,805 UART: [state] CFI Enabled
23,828,420 UART: [fht] FMC Alias Private Key: 7
26,168,882 UART: [art] Extend RT PCRs Done
26,170,129 UART: [art] Lock RT PCRs Done
26,172,168 UART: [art] Populate DV Done
26,177,599 UART: [fht] FMC Alias Private Key: 7
26,179,095 UART: [art] Derive CDI
26,179,869 UART: [art] Store in slot 0x4
26,222,473 UART: [art] Derive Key Pair
26,223,481 UART: [art] Store priv key in slot 0x5
29,465,810 UART: [art] Derive Key Pair - Done
29,478,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,758,606 UART: [art] Erasing AUTHORITY.KEYID = 7
31,760,139 UART: [art] PUB.X = 8908D442809270BD8EB387743F2DD914605DB918250E926F4CEB4EE43434FF63758B86E3A2299F94BA3BD6EB8B2C9B01
31,767,420 UART: [art] PUB.Y = 4478025661B70F20562D8F7784A8A921CDEB420CD33563069BF6447B71BF47A143C0517F38BC437C0DAA51632C73E682
31,774,640 UART: [art] SIG.R = 76DC78FABCFAFBCEEE620FFA3A498C79A12CFEFA2D71D6DACAA46EACFEB7055D3C1BDB877251488DA855F0203E9DA097
31,782,063 UART: [art] SIG.S = E0C920741C8EB666C53F66FF2DDE70034221495BEE6A16037AC1BAE23C6FAD8438E737235C36E40F607DC24DDDAC843A
33,086,958 UART: Caliptra RT
33,087,682 UART: [state] CFI Enabled
33,220,978 UART: [rt] RT listening for mailbox commands...
33,222,842 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,252,611 UART: [rt]cmd =0x46504c54, len=4
33,254,361 >>> mbox cmd response data (8 bytes)
33,255,653 UART: [rt] FIPS self test
33,256,600 UART: [kat] ++
33,257,057 UART: [kat] sha1
33,261,492 UART: [kat] SHA2-256
33,263,375 UART: [kat] SHA2-384
33,266,510 UART: [kat] SHA2-512-ACC
33,268,753 UART: [kat] ECC-384
36,509,766 UART: Fatal Error: 0x90040003
36,545,075 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,695,399 >>> mbox cmd response: failed
36,696,087 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,845,987 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
7,221,138 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
21,262,802 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,360 UART:
192,763 UART: Running Caliptra ROM ...
193,889 UART:
194,060 UART: [state] CFI Enabled
264,189 UART: [state] LifecycleState = Unprovisioned
266,107 UART: [state] DebugLocked = No
268,637 UART: [state] WD Timer not started. Device not locked for debugging
272,549 UART: [kat] SHA2-256
452,205 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,007 UART: [kat] ++
463,467 UART: [kat] sha1
473,989 UART: [kat] SHA2-256
476,731 UART: [kat] SHA2-384
482,020 UART: [kat] SHA2-512-ACC
484,401 UART: [kat] ECC-384
2,947,625 UART: [kat] HMAC-384Kdf
2,972,013 UART: [kat] LMS
3,448,500 UART: [kat] --
3,452,077 UART: [cold-reset] ++
3,453,938 UART: [fht] FHT @ 0x50003400
3,466,849 UART: [idev] ++
3,467,430 UART: [idev] CDI.KEYID = 6
3,468,421 UART: [idev] SUBJECT.KEYID = 7
3,469,605 UART: [idev] UDS.KEYID = 0
3,470,664 ready_for_fw is high
3,470,891 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,086 UART: [idev] Erasing UDS.KEYID = 0
5,986,624 UART: [idev] Sha1 KeyId Algorithm
6,010,667 UART: [idev] --
6,015,039 UART: [ldev] ++
6,015,659 UART: [ldev] CDI.KEYID = 6
6,016,586 UART: [ldev] SUBJECT.KEYID = 5
6,017,757 UART: [ldev] AUTHORITY.KEYID = 7
6,019,003 UART: [ldev] FE.KEYID = 1
6,058,343 UART: [ldev] Erasing FE.KEYID = 1
8,568,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,131 UART: [ldev] --
10,378,046 UART: [fwproc] Wait for Commands...
10,379,559 UART: [fwproc] Recv command 0x46574c44
10,381,606 UART: [fwproc] Recv'd Img size: 119428 bytes
13,878,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,957,837 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,030,853 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,362,319 >>> mbox cmd response: success
14,366,157 UART: [afmc] ++
14,366,753 UART: [afmc] CDI.KEYID = 6
14,367,640 UART: [afmc] SUBJECT.KEYID = 7
14,368,935 UART: [afmc] AUTHORITY.KEYID = 5
16,893,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,621,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,623,530 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,639,295 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,655,389 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,670,936 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,695,739 UART: [afmc] --
18,699,130 UART: [cold-reset] --
18,701,269 UART: [state] Locking Datavault
18,706,846 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,549 UART: [state] Locking ICCM
18,710,970 UART: [exit] Launching FMC @ 0x40000130
18,719,368 UART:
18,719,610 UART: Running Caliptra FMC ...
18,720,722 UART:
18,720,905 UART: [state] CFI Enabled
18,777,760 UART: [fht] FMC Alias Private Key: 7
20,544,264 UART: [art] Extend RT PCRs Done
20,545,491 UART: [art] Lock RT PCRs Done
20,547,120 UART: [art] Populate DV Done
20,552,484 UART: [fht] FMC Alias Private Key: 7
20,554,133 UART: [art] Derive CDI
20,554,952 UART: [art] Store in slot 0x4
20,610,738 UART: [art] Derive Key Pair
20,611,774 UART: [art] Store priv key in slot 0x5
23,074,588 UART: [art] Derive Key Pair - Done
23,087,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,800,208 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,697 UART: [art] PUB.X = 5627B081A5E7BBB16A4B663530D1E04B9F5C477357248D4354C838C14AC48283126BFA13CFCB4B889977CD6EC9922BD7
24,808,973 UART: [art] PUB.Y = 0877A76F0B7DE84257E73F8D513C2109040FB1E514EF60252E6641B9C647D4C49F2F2C142BE9C26EF399ACE9804C722C
24,816,265 UART: [art] SIG.R = ABA22BE7898E5769EC954C8D7E3D834D26401C020EA053A6C11D3BAD5150875BFEF6262D67A9ADF3ACD353ADE27A29F2
24,823,664 UART: [art] SIG.S = F97B405E12E5522E546005B9540CA53AE74FF07E5099D51A47300091131E1C7DA5F0638E24C9BEC2400E87AF8D7A7B11
25,802,218 UART: Caliptra RT
25,802,937 UART: [state] CFI Enabled
25,986,145 UART: [rt] RT listening for mailbox commands...
25,987,999 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,017,737 UART: [rt]cmd =0x46504c54, len=4
26,019,355 >>> mbox cmd response data (8 bytes)
26,020,149 UART: [rt] FIPS self test
26,021,106 UART: [kat] ++
26,021,567 UART: [kat] sha1
26,026,060 UART: [kat] SHA2-256
26,027,945 UART: [kat] SHA2-384
26,031,051 UART: [kat] SHA2-512-ACC
26,033,349 UART: [kat] ECC-384
28,475,178 UART: Fatal Error: 0x90040003
28,510,575 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,660,588 >>> mbox cmd response: failed
28,661,247 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,810,990 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,290 UART:
190,593 UART: Running Caliptra ROM ...
191,650 UART:
191,797 UART: [state] CFI Enabled
252,125 UART: [state] LifecycleState = Unprovisioned
254,040 UART: [state] DebugLocked = No
256,857 UART: [state] WD Timer not started. Device not locked for debugging
260,694 UART: [kat] SHA2-256
440,328 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
451,092 UART: [kat] ++
451,552 UART: [kat] sha1
463,640 UART: [kat] SHA2-256
466,320 UART: [kat] SHA2-384
472,245 UART: [kat] SHA2-512-ACC
474,594 UART: [kat] ECC-384
2,937,079 UART: [kat] HMAC-384Kdf
2,960,448 UART: [kat] LMS
3,436,988 UART: [kat] --
3,441,090 UART: [cold-reset] ++
3,442,887 UART: [fht] FHT @ 0x50003400
3,454,600 UART: [idev] ++
3,455,182 UART: [idev] CDI.KEYID = 6
3,456,127 UART: [idev] SUBJECT.KEYID = 7
3,457,344 UART: [idev] UDS.KEYID = 0
3,458,889 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,608,990 UART: [idev] Erasing UDS.KEYID = 0
5,977,009 UART: [idev] Sha1 KeyId Algorithm
6,000,436 UART: [idev] --
6,003,960 UART: [ldev] ++
6,004,574 UART: [ldev] CDI.KEYID = 6
6,005,499 UART: [ldev] SUBJECT.KEYID = 5
6,006,674 UART: [ldev] AUTHORITY.KEYID = 7
6,007,917 UART: [ldev] FE.KEYID = 1
6,047,090 UART: [ldev] Erasing FE.KEYID = 1
8,555,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,288,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,304,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,320,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,335,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,356,683 UART: [ldev] --
10,362,871 UART: [fwproc] Wait for Commands...
10,366,111 UART: [fwproc] Recv command 0x46574c44
10,368,104 UART: [fwproc] Recv'd Img size: 119428 bytes
13,869,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,998 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,017 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,353,912 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
3,452,487 ready_for_fw is high
3,452,963 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,249,577 >>> mbox cmd response: success
18,527,576 UART:
18,527,991 UART: Running Caliptra FMC ...
18,529,301 UART:
18,529,481 UART: [state] CFI Enabled
18,599,120 UART: [fht] FMC Alias Private Key: 7
20,365,786 UART: [art] Extend RT PCRs Done
20,367,013 UART: [art] Lock RT PCRs Done
20,368,427 UART: [art] Populate DV Done
20,374,138 UART: [fht] FMC Alias Private Key: 7
20,375,666 UART: [art] Derive CDI
20,376,497 UART: [art] Store in slot 0x4
20,431,929 UART: [art] Derive Key Pair
20,432,930 UART: [art] Store priv key in slot 0x5
22,895,664 UART: [art] Derive Key Pair - Done
22,908,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,621,498 UART: [art] Erasing AUTHORITY.KEYID = 7
24,623,011 UART: [art] PUB.X = B1A8F7186ADE04F0B36D04A74423E0736A9CAB4BD8016AB74D42E95FB512D0ACD5EB0CC1CE24C2DBF857D50AF5B90D1A
24,630,280 UART: [art] PUB.Y = 2E7E483619A128439C9459B753D8897D678AE01E21EE08F6B89EAA95D0BB26A19A664C0AC409A91C105947AAD6612EED
24,637,541 UART: [art] SIG.R = 7D99C25B2A0D6BFB868CB8C6B025C4335ABED1AB16772AAA5FE2727D3329D3B6ED7384E019508B70F1CA26875C7D3730
24,644,950 UART: [art] SIG.S = 507DE97B29E8284C89B0444A279E82B3C62602E681E672CE777611F54B3BED20E76422C0AB77269802D34F5EEDFCB757
25,623,992 UART: Caliptra RT
25,624,717 UART: [state] CFI Enabled
25,805,011 UART: [rt] RT listening for mailbox commands...
25,806,879 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,836,783 UART: [rt]cmd =0x46504c54, len=4
25,838,477 >>> mbox cmd response data (8 bytes)
25,839,394 UART: [rt] FIPS self test
25,840,351 UART: [kat] ++
25,840,809 UART: [kat] sha1
25,845,000 UART: [kat] SHA2-256
25,846,889 UART: [kat] SHA2-384
25,849,856 UART: [kat] SHA2-512-ACC
25,852,100 UART: [kat] ECC-384
28,295,694 UART: Fatal Error: 0x90040003
28,330,985 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,480,980 >>> mbox cmd response: failed
28,481,627 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,631,577 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,444,981 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,240,495 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,572 UART:
192,956 UART: Running Caliptra ROM ...
194,076 UART:
603,960 UART: [state] CFI Enabled
617,980 UART: [state] LifecycleState = Unprovisioned
619,945 UART: [state] DebugLocked = No
621,342 UART: [state] WD Timer not started. Device not locked for debugging
625,114 UART: [kat] SHA2-256
804,711 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,498 UART: [kat] ++
815,985 UART: [kat] sha1
827,079 UART: [kat] SHA2-256
829,750 UART: [kat] SHA2-384
834,966 UART: [kat] SHA2-512-ACC
837,359 UART: [kat] ECC-384
3,277,945 UART: [kat] HMAC-384Kdf
3,291,098 UART: [kat] LMS
3,767,587 UART: [kat] --
3,772,948 UART: [cold-reset] ++
3,775,472 UART: [fht] FHT @ 0x50003400
3,787,205 UART: [idev] ++
3,787,795 UART: [idev] CDI.KEYID = 6
3,788,723 UART: [idev] SUBJECT.KEYID = 7
3,789,972 UART: [idev] UDS.KEYID = 0
3,790,904 ready_for_fw is high
3,791,140 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,941,678 UART: [idev] Erasing UDS.KEYID = 0
6,267,508 UART: [idev] Sha1 KeyId Algorithm
6,291,253 UART: [idev] --
6,297,575 UART: [ldev] ++
6,298,175 UART: [ldev] CDI.KEYID = 6
6,299,093 UART: [ldev] SUBJECT.KEYID = 5
6,300,260 UART: [ldev] AUTHORITY.KEYID = 7
6,301,494 UART: [ldev] FE.KEYID = 1
6,312,467 UART: [ldev] Erasing FE.KEYID = 1
8,785,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,149 UART: [ldev] --
10,581,246 UART: [fwproc] Wait for Commands...
10,582,815 UART: [fwproc] Recv command 0x46574c44
10,584,861 UART: [fwproc] Recv'd Img size: 119428 bytes
14,087,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,025 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,236,062 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,566,597 >>> mbox cmd response: success
14,570,634 UART: [afmc] ++
14,571,230 UART: [afmc] CDI.KEYID = 6
14,572,255 UART: [afmc] SUBJECT.KEYID = 7
14,573,368 UART: [afmc] AUTHORITY.KEYID = 5
17,076,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,798,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,801,070 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,816,908 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,832,964 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,848,538 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,874,461 UART: [afmc] --
18,878,542 UART: [cold-reset] --
18,881,860 UART: [state] Locking Datavault
18,887,817 UART: [state] Locking PCR0, PCR1 and PCR31
18,889,593 UART: [state] Locking ICCM
18,891,042 UART: [exit] Launching FMC @ 0x40000130
18,899,451 UART:
18,899,735 UART: Running Caliptra FMC ...
18,900,849 UART:
18,901,017 UART: [state] CFI Enabled
18,909,239 UART: [fht] FMC Alias Private Key: 7
20,675,874 UART: [art] Extend RT PCRs Done
20,677,100 UART: [art] Lock RT PCRs Done
20,678,778 UART: [art] Populate DV Done
20,684,353 UART: [fht] FMC Alias Private Key: 7
20,685,902 UART: [art] Derive CDI
20,686,728 UART: [art] Store in slot 0x4
20,729,381 UART: [art] Derive Key Pair
20,730,387 UART: [art] Store priv key in slot 0x5
23,157,543 UART: [art] Derive Key Pair - Done
23,170,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,876,942 UART: [art] Erasing AUTHORITY.KEYID = 7
24,878,446 UART: [art] PUB.X = 6E5C5DD21316ECA99B265CD8479E4EDE0EA10B75562C6E440545238964287B98E4DB28733B25C9C7C1C4493921EBBF6D
24,885,707 UART: [art] PUB.Y = 9290EA3373B54C2F5DA1BCBC10C7C78964F8CD30A3B79D5912A7005C70B2D0A9CA87CFED516BB0CD5A23DAF958929A83
24,893,003 UART: [art] SIG.R = F269852038DE507A611D81A29468A89E8F1AE4C6178A31B405C8765CD45E92DE7236A3541F1E61B2DBFAB28244B7C4B2
24,900,392 UART: [art] SIG.S = 15D1A118B96FF521FD472FE451CD3E3A0637D4A09600A5F2EF4FB81569E818DA222BD534553FDD2DE74CCE4D9D590B4F
25,879,219 UART: Caliptra RT
25,879,912 UART: [state] CFI Enabled
26,011,607 UART: [rt] RT listening for mailbox commands...
26,013,459 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,043,251 UART: [rt]cmd =0x46504c54, len=4
26,044,761 >>> mbox cmd response data (8 bytes)
26,045,890 UART: [rt] FIPS self test
26,046,843 UART: [kat] ++
26,047,304 UART: [kat] sha1
26,051,532 UART: [kat] SHA2-256
26,053,436 UART: [kat] SHA2-384
26,056,410 UART: [kat] SHA2-512-ACC
26,058,709 UART: [kat] ECC-384
28,484,827 UART: Fatal Error: 0x90040003
28,520,213 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,670,189 >>> mbox cmd response: failed
28,670,777 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,820,705 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,009 UART:
190,324 UART: Running Caliptra ROM ...
191,442 UART:
11,707,534 UART: [state] CFI Enabled
11,721,706 UART: [state] LifecycleState = Unprovisioned
11,723,669 UART: [state] DebugLocked = No
11,725,030 UART: [state] WD Timer not started. Device not locked for debugging
11,728,621 UART: [kat] SHA2-256
11,908,254 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,919,082 UART: [kat] ++
11,919,547 UART: [kat] sha1
11,930,275 UART: [kat] SHA2-256
11,932,971 UART: [kat] SHA2-384
11,938,744 UART: [kat] SHA2-512-ACC
11,941,095 UART: [kat] ECC-384
14,382,891 UART: [kat] HMAC-384Kdf
14,394,289 UART: [kat] LMS
14,870,771 UART: [kat] --
14,875,690 UART: [cold-reset] ++
14,878,308 UART: [fht] FHT @ 0x50003400
14,888,162 UART: [idev] ++
14,888,786 UART: [idev] CDI.KEYID = 6
14,889,720 UART: [idev] SUBJECT.KEYID = 7
14,890,948 UART: [idev] UDS.KEYID = 0
14,892,589 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,042,459 UART: [idev] Erasing UDS.KEYID = 0
17,370,440 UART: [idev] Sha1 KeyId Algorithm
17,395,072 UART: [idev] --
17,400,906 UART: [ldev] ++
17,401,533 UART: [ldev] CDI.KEYID = 6
17,402,444 UART: [ldev] SUBJECT.KEYID = 5
17,403,662 UART: [ldev] AUTHORITY.KEYID = 7
17,404,897 UART: [ldev] FE.KEYID = 1
17,417,002 UART: [ldev] Erasing FE.KEYID = 1
19,896,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,617,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,633,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,649,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,665,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,687,877 UART: [ldev] --
21,694,026 UART: [fwproc] Wait for Commands...
21,697,212 UART: [fwproc] Recv command 0x46574c44
21,699,203 UART: [fwproc] Recv'd Img size: 119428 bytes
25,194,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,269,450 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,342,510 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,674,554 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
3,780,654 ready_for_fw is high
3,781,062 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,464,232 >>> mbox cmd response: success
18,712,771 UART:
18,713,180 UART: Running Caliptra FMC ...
18,714,336 UART:
18,714,503 UART: [state] CFI Enabled
18,722,485 UART: [fht] FMC Alias Private Key: 7
20,488,337 UART: [art] Extend RT PCRs Done
20,489,570 UART: [art] Lock RT PCRs Done
20,491,145 UART: [art] Populate DV Done
20,496,540 UART: [fht] FMC Alias Private Key: 7
20,498,200 UART: [art] Derive CDI
20,499,021 UART: [art] Store in slot 0x4
20,541,676 UART: [art] Derive Key Pair
20,542,685 UART: [art] Store priv key in slot 0x5
22,969,334 UART: [art] Derive Key Pair - Done
22,982,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,688,978 UART: [art] Erasing AUTHORITY.KEYID = 7
24,690,490 UART: [art] PUB.X = 26AC4C3F8B3602EF971904A39AE54A1BA336F1B49A59541E218F596C066B216BB96078DC91E4F2AFB59D560E1C5A9D24
24,697,761 UART: [art] PUB.Y = 5E8E04C8FAF0686D909D73A7BD30632FD23AA2C389498CE572E158CC83DD01603145CC37DB4CEB5025928E788610835E
24,704,961 UART: [art] SIG.R = 682623198C7705BA4C86893BF007590EC3D9E7667C3895588134122723EB51AAF2A82FA0333A860B9DA53FFB259AD205
24,712,414 UART: [art] SIG.S = 28CC72502D2CA2DAE575CB361247DAD0D45F07D244C393CA15B832D61E7C3048ED2DC0842A51263964C3CCF2BD7628C6
25,691,079 UART: Caliptra RT
25,691,804 UART: [state] CFI Enabled
25,824,373 UART: [rt] RT listening for mailbox commands...
25,826,235 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,855,963 UART: [rt]cmd =0x46504c54, len=4
25,857,471 >>> mbox cmd response data (8 bytes)
25,858,534 UART: [rt] FIPS self test
25,859,490 UART: [kat] ++
25,859,990 UART: [kat] sha1
25,864,451 UART: [kat] SHA2-256
25,866,336 UART: [kat] SHA2-384
25,869,142 UART: [kat] SHA2-512-ACC
25,871,386 UART: [kat] ECC-384
28,297,355 UART: Fatal Error: 0x90040003
28,332,806 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,482,896 >>> mbox cmd response: failed
28,483,770 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,634,188 >>> mbox cmd response: failed
Initializing fuses
1,003 writing to cptra_bootfsm_go
15,071,262 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,743,901 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,046 UART:
192,427 UART: Running Caliptra ROM ...
193,535 UART:
193,684 UART: [state] CFI Enabled
268,555 UART: [state] LifecycleState = Unprovisioned
270,994 UART: [state] DebugLocked = No
272,381 UART: [state] WD Timer not started. Device not locked for debugging
277,280 UART: [kat] SHA2-256
467,135 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,927 UART: [kat] ++
478,384 UART: [kat] sha1
489,709 UART: [kat] SHA2-256
492,731 UART: [kat] SHA2-384
499,511 UART: [kat] SHA2-512-ACC
502,099 UART: [kat] ECC-384
2,949,548 UART: [kat] HMAC-384Kdf
2,973,019 UART: [kat] LMS
3,504,799 UART: [kat] --
3,509,371 UART: [cold-reset] ++
3,511,099 UART: [fht] FHT @ 0x50003400
3,522,092 UART: [idev] ++
3,522,737 UART: [idev] CDI.KEYID = 6
3,523,776 UART: [idev] SUBJECT.KEYID = 7
3,524,959 UART: [idev] UDS.KEYID = 0
3,525,905 ready_for_fw is high
3,526,127 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,416 UART: [idev] Erasing UDS.KEYID = 0
6,030,665 UART: [idev] Sha1 KeyId Algorithm
6,053,916 UART: [idev] --
6,058,401 UART: [ldev] ++
6,059,094 UART: [ldev] CDI.KEYID = 6
6,060,019 UART: [ldev] SUBJECT.KEYID = 5
6,061,191 UART: [ldev] AUTHORITY.KEYID = 7
6,062,375 UART: [ldev] FE.KEYID = 1
6,101,012 UART: [ldev] Erasing FE.KEYID = 1
8,605,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,104 UART: [ldev] --
10,414,951 UART: [fwproc] Wait for Commands...
10,417,807 UART: [fwproc] Recv command 0x46574c44
10,420,097 UART: [fwproc] Recv'd Img size: 119428 bytes
13,929,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,008,413 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,131,993 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,698,104 >>> mbox cmd response: success
14,702,998 UART: [afmc] ++
14,703,705 UART: [afmc] CDI.KEYID = 6
14,704,945 UART: [afmc] SUBJECT.KEYID = 7
14,706,381 UART: [afmc] AUTHORITY.KEYID = 5
17,236,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,434 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,527 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,674 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,607 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,693 UART: [afmc] --
19,031,455 UART: [cold-reset] --
19,035,547 UART: [state] Locking Datavault
19,039,181 UART: [state] Locking PCR0, PCR1 and PCR31
19,041,377 UART: [state] Locking ICCM
19,043,052 UART: [exit] Launching FMC @ 0x40000130
19,051,733 UART:
19,051,979 UART: Running Caliptra FMC ...
19,053,088 UART:
19,053,257 UART: [state] CFI Enabled
19,116,019 UART: [fht] FMC Alias Private Key: 7
20,903,967 UART: [art] Extend RT PCRs Done
20,905,166 UART: [art] Lock RT PCRs Done
20,906,940 UART: [art] Populate DV Done
20,912,131 UART: [fht] FMC Alias Private Key: 7
20,913,737 UART: [art] Derive CDI
20,914,555 UART: [art] Store in slot 0x4
20,969,560 UART: [art] Derive Key Pair
20,970,566 UART: [art] Store priv key in slot 0x5
23,433,055 UART: [art] Derive Key Pair - Done
23,445,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,158,952 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,442 UART: [art] PUB.X = D44DB0590ECC028D2D9B8FFDCEC9B1E6BD92F8714EA00F2D6B6D722FA678C019FF28DC1F19B58D6AAA29E85387A1AFF3
25,167,755 UART: [art] PUB.Y = 1DE2BD76D6D7886BE70642460D13CC816DD58C65A4AD9317E4FFAF36585F85750CDE1F613755625FBAB2FF8474C333DB
25,175,011 UART: [art] SIG.R = 5D5AC825152820A0F8AF71FE9D1C6AC241E2D161E5D566D5320DD66250393E75256A1778F593D9B04D0C5233E3119A9A
25,182,360 UART: [art] SIG.S = 0ED67D6A8F94C3BCDD9CA0C782EC2D1602C739CB34AE126FE62247BDD4761ABF83966F5AF8F8C32D478365950DA5BBFB
26,161,603 UART: Caliptra RT
26,162,331 UART: [state] CFI Enabled
26,341,526 UART: [rt] RT listening for mailbox commands...
26,343,380 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,373,012 UART: [rt]cmd =0x46504c54, len=4
26,374,739 >>> mbox cmd response data (8 bytes)
26,375,869 UART: [rt] FIPS self test
26,376,842 UART: [kat] ++
26,377,302 UART: [kat] sha1
26,381,690 UART: [kat] SHA2-256
26,383,628 UART: [kat] SHA2-384
26,386,537 UART: [kat] SHA2-512-ACC
26,388,776 UART: [kat] ECC-384
28,831,199 UART: Fatal Error: 0x90040003
28,866,497 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,016,490 >>> mbox cmd response: failed
29,017,101 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,167,008 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,036 UART:
190,330 UART: Running Caliptra ROM ...
191,357 UART:
191,520 UART: [state] CFI Enabled
253,262 UART: [state] LifecycleState = Unprovisioned
255,651 UART: [state] DebugLocked = No
258,255 UART: [state] WD Timer not started. Device not locked for debugging
262,010 UART: [kat] SHA2-256
451,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
462,694 UART: [kat] ++
463,147 UART: [kat] sha1
474,460 UART: [kat] SHA2-256
477,484 UART: [kat] SHA2-384
483,581 UART: [kat] SHA2-512-ACC
486,148 UART: [kat] ECC-384
2,939,631 UART: [kat] HMAC-384Kdf
2,961,519 UART: [kat] LMS
3,493,302 UART: [kat] --
3,499,542 UART: [cold-reset] ++
3,500,725 UART: [fht] FHT @ 0x50003400
3,511,782 UART: [idev] ++
3,512,464 UART: [idev] CDI.KEYID = 6
3,513,432 UART: [idev] SUBJECT.KEYID = 7
3,514,645 UART: [idev] UDS.KEYID = 0
3,516,157 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,666,222 UART: [idev] Erasing UDS.KEYID = 0
6,021,038 UART: [idev] Sha1 KeyId Algorithm
6,042,661 UART: [idev] --
6,047,962 UART: [ldev] ++
6,048,658 UART: [ldev] CDI.KEYID = 6
6,049,573 UART: [ldev] SUBJECT.KEYID = 5
6,050,741 UART: [ldev] AUTHORITY.KEYID = 7
6,051,980 UART: [ldev] FE.KEYID = 1
6,092,018 UART: [ldev] Erasing FE.KEYID = 1
8,595,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,011 UART: [ldev] --
10,403,242 UART: [fwproc] Wait for Commands...
10,405,566 UART: [fwproc] Recv command 0x46574c44
10,407,830 UART: [fwproc] Recv'd Img size: 119428 bytes
13,915,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,790 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,402 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,682,666 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,437,268 ready_for_fw is high
3,437,736 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,848,544 >>> mbox cmd response: success
19,129,691 UART:
19,130,079 UART: Running Caliptra FMC ...
19,131,207 UART:
19,131,373 UART: [state] CFI Enabled
19,202,229 UART: [fht] FMC Alias Private Key: 7
20,968,239 UART: [art] Extend RT PCRs Done
20,969,456 UART: [art] Lock RT PCRs Done
20,971,161 UART: [art] Populate DV Done
20,976,530 UART: [fht] FMC Alias Private Key: 7
20,978,140 UART: [art] Derive CDI
20,978,969 UART: [art] Store in slot 0x4
21,034,935 UART: [art] Derive Key Pair
21,035,964 UART: [art] Store priv key in slot 0x5
23,498,676 UART: [art] Derive Key Pair - Done
23,511,735 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,259 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,780 UART: [art] PUB.X = 030B03CCF950BC4911516DF9634FFF18BFA90C02102F2B03D9E1A60D3895230E4B8D942F3DA54E44F8A60FD018F35404
25,234,050 UART: [art] PUB.Y = 928793BA9E638BF42B6C378E932DC6FB1E4E2AEC13D5A2919F0A114AB05DA3C02DC26ABEBE9E4B151225880F02765E12
25,241,300 UART: [art] SIG.R = 63A3ECEB9AF220ED827BBFCA1647AFA3BDA93D219AB6FA890816AC607B1383DD321E0DF001D0D9E5BA6B676190C9B0F4
25,248,706 UART: [art] SIG.S = 45B5A74FD82ABB876F6F7B8844F326A3415E9DAFA3E25A03B1F21CD4477FFA375929CEB52A88C60A61223701B1FE456E
26,227,504 UART: Caliptra RT
26,228,224 UART: [state] CFI Enabled
26,407,927 UART: [rt] RT listening for mailbox commands...
26,409,788 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,439,579 UART: [rt]cmd =0x46504c54, len=4
26,441,112 >>> mbox cmd response data (8 bytes)
26,442,218 UART: [rt] FIPS self test
26,443,173 UART: [kat] ++
26,443,648 UART: [kat] sha1
26,448,093 UART: [kat] SHA2-256
26,449,983 UART: [kat] SHA2-384
26,452,800 UART: [kat] SHA2-512-ACC
26,455,094 UART: [kat] ECC-384
28,897,129 UART: Fatal Error: 0x90040003
28,932,372 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,082,359 >>> mbox cmd response: failed
29,082,961 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,232,833 >>> mbox cmd response: failed
Initializing fuses
929 writing to cptra_bootfsm_go
3,429,079 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,821,213 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,500 UART:
192,881 UART: Running Caliptra ROM ...
194,048 UART:
603,794 UART: [state] CFI Enabled
616,755 UART: [state] LifecycleState = Unprovisioned
619,137 UART: [state] DebugLocked = No
620,890 UART: [state] WD Timer not started. Device not locked for debugging
626,012 UART: [kat] SHA2-256
815,899 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,691 UART: [kat] ++
827,174 UART: [kat] sha1
839,548 UART: [kat] SHA2-256
842,564 UART: [kat] SHA2-384
847,636 UART: [kat] SHA2-512-ACC
850,222 UART: [kat] ECC-384
3,293,664 UART: [kat] HMAC-384Kdf
3,306,467 UART: [kat] LMS
3,838,299 UART: [kat] --
3,843,664 UART: [cold-reset] ++
3,845,248 UART: [fht] FHT @ 0x50003400
3,856,407 UART: [idev] ++
3,857,072 UART: [idev] CDI.KEYID = 6
3,858,069 UART: [idev] SUBJECT.KEYID = 7
3,859,252 UART: [idev] UDS.KEYID = 0
3,860,181 ready_for_fw is high
3,860,397 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,010,413 UART: [idev] Erasing UDS.KEYID = 0
6,336,141 UART: [idev] Sha1 KeyId Algorithm
6,359,498 UART: [idev] --
6,364,197 UART: [ldev] ++
6,364,884 UART: [ldev] CDI.KEYID = 6
6,365,799 UART: [ldev] SUBJECT.KEYID = 5
6,367,018 UART: [ldev] AUTHORITY.KEYID = 7
6,368,205 UART: [ldev] FE.KEYID = 1
6,378,015 UART: [ldev] Erasing FE.KEYID = 1
8,855,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,073 UART: [ldev] --
10,647,082 UART: [fwproc] Wait for Commands...
10,649,504 UART: [fwproc] Recv command 0x46574c44
10,651,840 UART: [fwproc] Recv'd Img size: 119428 bytes
14,168,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,246,121 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,369,738 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,936,191 >>> mbox cmd response: success
14,939,646 UART: [afmc] ++
14,940,347 UART: [afmc] CDI.KEYID = 6
14,941,618 UART: [afmc] SUBJECT.KEYID = 7
14,943,065 UART: [afmc] AUTHORITY.KEYID = 5
17,443,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,164,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,166,713 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,181,826 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,196,980 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,211,902 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,235,470 UART: [afmc] --
19,238,422 UART: [cold-reset] --
19,242,344 UART: [state] Locking Datavault
19,247,759 UART: [state] Locking PCR0, PCR1 and PCR31
19,249,962 UART: [state] Locking ICCM
19,252,259 UART: [exit] Launching FMC @ 0x40000130
19,260,930 UART:
19,261,167 UART: Running Caliptra FMC ...
19,262,220 UART:
19,262,372 UART: [state] CFI Enabled
19,269,933 UART: [fht] FMC Alias Private Key: 7
21,035,682 UART: [art] Extend RT PCRs Done
21,036,908 UART: [art] Lock RT PCRs Done
21,038,349 UART: [art] Populate DV Done
21,043,710 UART: [fht] FMC Alias Private Key: 7
21,045,302 UART: [art] Derive CDI
21,046,250 UART: [art] Store in slot 0x4
21,089,198 UART: [art] Derive Key Pair
21,090,217 UART: [art] Store priv key in slot 0x5
23,517,509 UART: [art] Derive Key Pair - Done
23,530,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,236,994 UART: [art] Erasing AUTHORITY.KEYID = 7
25,238,508 UART: [art] PUB.X = DD5D17CCBD911BF3F4C621A245ACA5D06052004750F1E0ADFD1944B785AA027E8D5E73F7241402C70D171BC7609B8B5A
25,245,757 UART: [art] PUB.Y = DE8EED1219E0953C8FED3C99071E34B6F79329F16F33B1E3341CA1C6FCE8BA1F9086FACCB4060BB7BC14538D0399BD39
25,253,054 UART: [art] SIG.R = 573FD8B124A4B7BD7C56E0C70CF5AECBC40DE0ADD12CC5F859A288E633311D60685CB9A36615E873E81375E3C9835044
25,260,394 UART: [art] SIG.S = 6DC1EF66D6BC9338B1E74BA47B417A9B6E563C3BDBC3B6D7416B436AEEA0AA0D40118E46AF30F49212F1323BA8BBA13B
26,239,738 UART: Caliptra RT
26,240,433 UART: [state] CFI Enabled
26,373,766 UART: [rt] RT listening for mailbox commands...
26,375,622 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,405,274 UART: [rt]cmd =0x46504c54, len=4
26,407,100 >>> mbox cmd response data (8 bytes)
26,408,173 UART: [rt] FIPS self test
26,409,128 UART: [kat] ++
26,409,584 UART: [kat] sha1
26,413,829 UART: [kat] SHA2-256
26,415,704 UART: [kat] SHA2-384
26,418,776 UART: [kat] SHA2-512-ACC
26,421,080 UART: [kat] ECC-384
28,846,904 UART: Fatal Error: 0x90040003
28,882,218 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,032,684 >>> mbox cmd response: failed
29,033,350 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,183,638 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
189,997 UART:
190,290 UART: Running Caliptra ROM ...
191,324 UART:
11,348,008 UART: [state] CFI Enabled
11,363,162 UART: [state] LifecycleState = Unprovisioned
11,365,567 UART: [state] DebugLocked = No
11,367,873 UART: [state] WD Timer not started. Device not locked for debugging
11,373,372 UART: [kat] SHA2-256
11,563,249 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,574,004 UART: [kat] ++
11,574,576 UART: [kat] sha1
11,586,502 UART: [kat] SHA2-256
11,589,479 UART: [kat] SHA2-384
11,594,394 UART: [kat] SHA2-512-ACC
11,596,974 UART: [kat] ECC-384
14,039,472 UART: [kat] HMAC-384Kdf
14,053,915 UART: [kat] LMS
14,585,734 UART: [kat] --
14,589,740 UART: [cold-reset] ++
14,591,789 UART: [fht] FHT @ 0x50003400
14,603,264 UART: [idev] ++
14,603,955 UART: [idev] CDI.KEYID = 6
14,604,925 UART: [idev] SUBJECT.KEYID = 7
14,606,089 UART: [idev] UDS.KEYID = 0
14,607,622 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,757,519 UART: [idev] Erasing UDS.KEYID = 0
17,079,779 UART: [idev] Sha1 KeyId Algorithm
17,101,780 UART: [idev] --
17,105,239 UART: [ldev] ++
17,105,973 UART: [ldev] CDI.KEYID = 6
17,107,029 UART: [ldev] SUBJECT.KEYID = 5
17,108,143 UART: [ldev] AUTHORITY.KEYID = 7
17,109,319 UART: [ldev] FE.KEYID = 1
17,121,156 UART: [ldev] Erasing FE.KEYID = 1
19,597,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,316,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,332,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,347,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,362,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,383,382 UART: [ldev] --
21,388,480 UART: [fwproc] Wait for Commands...
21,390,379 UART: [fwproc] Recv command 0x46574c44
21,392,673 UART: [fwproc] Recv'd Img size: 119428 bytes
24,895,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,974,869 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,098,502 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,664,622 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,758,564 ready_for_fw is high
3,759,007 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,061,471 >>> mbox cmd response: success
19,313,900 UART:
19,314,325 UART: Running Caliptra FMC ...
19,315,443 UART:
19,315,616 UART: [state] CFI Enabled
19,323,700 UART: [fht] FMC Alias Private Key: 7
21,089,961 UART: [art] Extend RT PCRs Done
21,091,201 UART: [art] Lock RT PCRs Done
21,092,730 UART: [art] Populate DV Done
21,098,270 UART: [fht] FMC Alias Private Key: 7
21,099,928 UART: [art] Derive CDI
21,100,755 UART: [art] Store in slot 0x4
21,143,303 UART: [art] Derive Key Pair
21,144,309 UART: [art] Store priv key in slot 0x5
23,571,148 UART: [art] Derive Key Pair - Done
23,584,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,291,029 UART: [art] Erasing AUTHORITY.KEYID = 7
25,292,546 UART: [art] PUB.X = 40F2EDA220042FC6E28EFDE9DED036F34C79F94B4605BE189FF76F6B5AA7B4E1E1DA7DC634B19193A46615FBF3BA5DBF
25,299,842 UART: [art] PUB.Y = 98DDCD701CA0CBCE5E3A45C4FB55F3D38A0A696B720810DA6235C48672D0C4428CA58BEEC2DF35809A4F4FB7B361DD6B
25,307,115 UART: [art] SIG.R = 52619789E4ED5F2A01A826299F77EC64A39D884332D03DBD112BA53252C4F10B80D1916F18E80B51C8028B8A731CD1EC
25,314,501 UART: [art] SIG.S = A8794EB8D11BAC5314DC8C8255CA5CB4A1ACFFFE7AD07ADCA77678EDD5533A86F1F7D59119853A92AA8518DBAED8907C
26,293,361 UART: Caliptra RT
26,294,056 UART: [state] CFI Enabled
26,426,249 UART: [rt] RT listening for mailbox commands...
26,428,105 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,458,024 UART: [rt]cmd =0x46504c54, len=4
26,459,535 >>> mbox cmd response data (8 bytes)
26,460,699 UART: [rt] FIPS self test
26,461,656 UART: [kat] ++
26,462,109 UART: [kat] sha1
26,466,507 UART: [kat] SHA2-256
26,468,441 UART: [kat] SHA2-384
26,471,264 UART: [kat] SHA2-512-ACC
26,473,562 UART: [kat] ECC-384
28,899,768 UART: Fatal Error: 0x90040003
28,935,178 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,085,083 >>> mbox cmd response: failed
29,085,755 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,235,641 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
14,452,417 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,760,794 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,065 UART: [kat] SHA2-256
881,996 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,111 UART: [kat] ++
886,263 UART: [kat] sha1
890,369 UART: [kat] SHA2-256
892,307 UART: [kat] SHA2-384
894,962 UART: [kat] SHA2-512-ACC
896,863 UART: [kat] ECC-384
902,798 UART: [kat] HMAC-384Kdf
907,434 UART: [kat] LMS
1,475,630 UART: [kat] --
1,476,253 UART: [cold-reset] ++
1,476,697 UART: [fht] Storing FHT @ 0x50003400
1,479,380 UART: [idev] ++
1,479,548 UART: [idev] CDI.KEYID = 6
1,479,908 UART: [idev] SUBJECT.KEYID = 7
1,480,332 UART: [idev] UDS.KEYID = 0
1,480,677 ready_for_fw is high
1,480,677 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,278 UART: [idev] Erasing UDS.KEYID = 0
1,504,618 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,164 UART: [idev] --
1,514,341 UART: [ldev] ++
1,514,509 UART: [ldev] CDI.KEYID = 6
1,514,872 UART: [ldev] SUBJECT.KEYID = 5
1,515,298 UART: [ldev] AUTHORITY.KEYID = 7
1,515,761 UART: [ldev] FE.KEYID = 1
1,520,805 UART: [ldev] Erasing FE.KEYID = 1
1,546,320 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,930 UART: [ldev] --
1,585,309 UART: [fwproc] Waiting for Commands...
1,586,008 UART: [fwproc] Received command 0x46574c44
1,586,799 UART: [fwproc] Received Image of size 119428 bytes
2,941,187 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,677 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,895 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,576 >>> mbox cmd response: success
3,143,766 UART: [afmc] ++
3,143,934 UART: [afmc] CDI.KEYID = 6
3,144,296 UART: [afmc] SUBJECT.KEYID = 7
3,144,721 UART: [afmc] AUTHORITY.KEYID = 5
3,179,900 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,194 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,974 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,683 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,566 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,249 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,303 UART: [afmc] --
3,223,185 UART: [cold-reset] --
3,224,131 UART: [state] Locking Datavault
3,225,270 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,874 UART: [state] Locking ICCM
3,226,458 UART: [exit] Launching FMC @ 0x40000130
3,231,788 UART:
3,231,804 UART: Running Caliptra FMC ...
3,232,212 UART:
3,232,266 UART: [state] CFI Enabled
3,242,624 UART: [fht] FMC Alias Private Key: 7
3,361,522 UART: [art] Extend RT PCRs Done
3,361,950 UART: [art] Lock RT PCRs Done
3,363,186 UART: [art] Populate DV Done
3,371,245 UART: [fht] FMC Alias Private Key: 7
3,372,215 UART: [art] Derive CDI
3,372,495 UART: [art] Store in slot 0x4
3,458,021 UART: [art] Derive Key Pair
3,458,381 UART: [art] Store priv key in slot 0x5
3,471,592 UART: [art] Derive Key Pair - Done
3,486,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,501,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,062 UART: [art] PUB.X = F59CBDC19657343FD632EEBB388AD364D40BF3D6A1EC56F0F29E781C91275313781D2711F2FC01E069D55538EDAE1838
3,508,832 UART: [art] PUB.Y = 048C645D476BECBB442BCCF8C0CB1B2AC1A3A8BADA4EECEC176E8A5CDB36CEB47F59D39A0C2E4ADDCFD455221E897857
3,515,810 UART: [art] SIG.R = 1D5CA0784975F614C3476380F68D98A86765F974E1ED2127175D6CA3541748C65BE6985D60768C5A8666D9A0C343B292
3,522,568 UART: [art] SIG.S = 7110B1CA2C036FDD3FED053B6B3039334C96D9DCB71B410F538878F285AF80419A3252D41C9F5AFA405FB04EED17D0F4
3,545,961 UART: Caliptra RT
3,546,212 UART: [state] CFI Enabled
3,666,365 UART: [rt] RT listening for mailbox commands...
3,667,028 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,835 UART: [rt]cmd =0x46504c54, len=4
3,697,907 >>> mbox cmd response data (8 bytes)
3,698,058 UART: [rt] FIPS self test
3,698,386 UART: [kat] ++
3,698,538 UART: [kat] sha1
3,702,644 UART: [kat] SHA2-256
3,704,666 UART: [kat] SHA2-384
3,707,543 UART: [kat] SHA2-512-ACC
3,709,470 UART: [kat] ECC-384
3,718,798 UART: Fatal Error: 0x90040003
3,720,337 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,720,342 >>> mbox cmd response: failed
3,720,342 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,720,347 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,219 UART: [kat] SHA2-256
882,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,265 UART: [kat] ++
886,417 UART: [kat] sha1
890,767 UART: [kat] SHA2-256
892,705 UART: [kat] SHA2-384
895,538 UART: [kat] SHA2-512-ACC
897,439 UART: [kat] ECC-384
903,200 UART: [kat] HMAC-384Kdf
907,662 UART: [kat] LMS
1,475,858 UART: [kat] --
1,476,851 UART: [cold-reset] ++
1,477,421 UART: [fht] Storing FHT @ 0x50003400
1,480,200 UART: [idev] ++
1,480,368 UART: [idev] CDI.KEYID = 6
1,480,728 UART: [idev] SUBJECT.KEYID = 7
1,481,152 UART: [idev] UDS.KEYID = 0
1,481,497 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,482 UART: [idev] Erasing UDS.KEYID = 0
1,505,712 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,234 UART: [idev] --
1,515,375 UART: [ldev] ++
1,515,543 UART: [ldev] CDI.KEYID = 6
1,515,906 UART: [ldev] SUBJECT.KEYID = 5
1,516,332 UART: [ldev] AUTHORITY.KEYID = 7
1,516,795 UART: [ldev] FE.KEYID = 1
1,521,691 UART: [ldev] Erasing FE.KEYID = 1
1,546,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,812 UART: [ldev] --
1,586,207 UART: [fwproc] Waiting for Commands...
1,587,002 UART: [fwproc] Received command 0x46574c44
1,587,793 UART: [fwproc] Received Image of size 119428 bytes
2,943,681 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,639 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,857 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,598 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,195 ready_for_fw is high
1,363,195 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,976 >>> mbox cmd response: success
3,053,905 UART:
3,053,921 UART: Running Caliptra FMC ...
3,054,329 UART:
3,054,383 UART: [state] CFI Enabled
3,064,827 UART: [fht] FMC Alias Private Key: 7
3,184,201 UART: [art] Extend RT PCRs Done
3,184,629 UART: [art] Lock RT PCRs Done
3,186,125 UART: [art] Populate DV Done
3,194,352 UART: [fht] FMC Alias Private Key: 7
3,195,510 UART: [art] Derive CDI
3,195,790 UART: [art] Store in slot 0x4
3,281,720 UART: [art] Derive Key Pair
3,282,080 UART: [art] Store priv key in slot 0x5
3,295,049 UART: [art] Derive Key Pair - Done
3,309,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,205 UART: [art] PUB.X = CADB5FDD6FCA1DA6CD044877316935E3FE11A58038FD8981F3296E36BB8539F877A577C92631982D34989ABD48D2AAE8
3,332,980 UART: [art] PUB.Y = B409B0A13929A65A92933E6B9BFC92188DB8C638C5D866C16AE464D1EE088710F034FBBCA49D1F48151767DBE5447F72
3,339,928 UART: [art] SIG.R = 7E03A1660E159EAA1118A3CCA3D2F96C90CE2ED39D78DEF0C58442824872F88C63F13F34F85554756F966FC7B8D3446A
3,346,696 UART: [art] SIG.S = E77B9F9D84ED823CAAEE96F454F72CB2D8E1FEBF57A3BC24A6F2E18FABFE14DEE397845896074D8D6A15B14DF09F55D7
3,370,519 UART: Caliptra RT
3,370,770 UART: [state] CFI Enabled
3,490,598 UART: [rt] RT listening for mailbox commands...
3,491,261 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,746 UART: [rt]cmd =0x46504c54, len=4
3,521,964 >>> mbox cmd response data (8 bytes)
3,522,281 UART: [rt] FIPS self test
3,522,609 UART: [kat] ++
3,522,761 UART: [kat] sha1
3,527,153 UART: [kat] SHA2-256
3,529,175 UART: [kat] SHA2-384
3,532,106 UART: [kat] SHA2-512-ACC
3,534,033 UART: [kat] ECC-384
3,543,691 UART: Fatal Error: 0x90040003
3,545,230 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,545,235 >>> mbox cmd response: failed
3,545,235 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,545,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,845 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,170 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,986 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,616 UART: [kat] SHA2-256
882,547 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,662 UART: [kat] ++
886,814 UART: [kat] sha1
890,968 UART: [kat] SHA2-256
892,906 UART: [kat] SHA2-384
895,707 UART: [kat] SHA2-512-ACC
897,608 UART: [kat] ECC-384
902,999 UART: [kat] HMAC-384Kdf
907,769 UART: [kat] LMS
1,475,965 UART: [kat] --
1,476,952 UART: [cold-reset] ++
1,477,282 UART: [fht] Storing FHT @ 0x50003400
1,480,099 UART: [idev] ++
1,480,267 UART: [idev] CDI.KEYID = 6
1,480,627 UART: [idev] SUBJECT.KEYID = 7
1,481,051 UART: [idev] UDS.KEYID = 0
1,481,396 ready_for_fw is high
1,481,396 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,189 UART: [idev] Erasing UDS.KEYID = 0
1,506,065 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,681 UART: [idev] --
1,515,804 UART: [ldev] ++
1,515,972 UART: [ldev] CDI.KEYID = 6
1,516,335 UART: [ldev] SUBJECT.KEYID = 5
1,516,761 UART: [ldev] AUTHORITY.KEYID = 7
1,517,224 UART: [ldev] FE.KEYID = 1
1,522,358 UART: [ldev] Erasing FE.KEYID = 1
1,547,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,973 UART: [ldev] --
1,586,286 UART: [fwproc] Waiting for Commands...
1,587,055 UART: [fwproc] Received command 0x46574c44
1,587,846 UART: [fwproc] Received Image of size 119428 bytes
2,942,574 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,870 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,088 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,825 >>> mbox cmd response: success
3,144,077 UART: [afmc] ++
3,144,245 UART: [afmc] CDI.KEYID = 6
3,144,607 UART: [afmc] SUBJECT.KEYID = 7
3,145,032 UART: [afmc] AUTHORITY.KEYID = 5
3,179,877 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,083 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,863 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,572 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,455 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,138 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,994 UART: [afmc] --
3,222,884 UART: [cold-reset] --
3,223,538 UART: [state] Locking Datavault
3,224,599 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,203 UART: [state] Locking ICCM
3,225,841 UART: [exit] Launching FMC @ 0x40000130
3,231,171 UART:
3,231,187 UART: Running Caliptra FMC ...
3,231,595 UART:
3,231,738 UART: [state] CFI Enabled
3,242,702 UART: [fht] FMC Alias Private Key: 7
3,361,708 UART: [art] Extend RT PCRs Done
3,362,136 UART: [art] Lock RT PCRs Done
3,363,914 UART: [art] Populate DV Done
3,372,169 UART: [fht] FMC Alias Private Key: 7
3,373,287 UART: [art] Derive CDI
3,373,567 UART: [art] Store in slot 0x4
3,459,531 UART: [art] Derive Key Pair
3,459,891 UART: [art] Store priv key in slot 0x5
3,473,842 UART: [art] Derive Key Pair - Done
3,488,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,945 UART: [art] PUB.X = 11354D00A669A4FDE4753A8278CEF91E72774E89D35021CF6638C155821E8376930F1EBC5795D80798FD7DFA316231AE
3,511,683 UART: [art] PUB.Y = F4B79906A3B02A4FA1D715B178DC525BC30853E999F01CB00BA1BE4B1BA5D752B62FF94FF6AEB4070AB077E32F1B1DA0
3,518,636 UART: [art] SIG.R = AF3CAD2857E824A751EA080F552AD16A1A0867511B90C3CF5BD1CB152FA19662433A8D49FEE1ADAB6BEED23A43341581
3,525,411 UART: [art] SIG.S = 2F55A103E5C091870E16A3F87C7C7EB917B99D8783F2E0D7AE166ECB4965764D0415906F8BC54D2CF550BE99F8610841
3,549,101 UART: Caliptra RT
3,549,444 UART: [state] CFI Enabled
3,670,430 UART: [rt] RT listening for mailbox commands...
3,671,093 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,746 UART: [rt]cmd =0x46504c54, len=4
3,701,732 >>> mbox cmd response data (8 bytes)
3,701,879 UART: [rt] FIPS self test
3,702,207 UART: [kat] ++
3,702,359 UART: [kat] sha1
3,706,733 UART: [kat] SHA2-256
3,708,755 UART: [kat] SHA2-384
3,711,768 UART: [kat] SHA2-512-ACC
3,713,695 UART: [kat] ECC-384
3,723,105 UART: Fatal Error: 0x90040003
3,724,644 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,724,649 >>> mbox cmd response: failed
3,724,649 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,724,654 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,394 UART: [kat] SHA2-256
882,325 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,440 UART: [kat] ++
886,592 UART: [kat] sha1
890,872 UART: [kat] SHA2-256
892,810 UART: [kat] SHA2-384
895,353 UART: [kat] SHA2-512-ACC
897,254 UART: [kat] ECC-384
902,751 UART: [kat] HMAC-384Kdf
907,385 UART: [kat] LMS
1,475,581 UART: [kat] --
1,476,444 UART: [cold-reset] ++
1,476,848 UART: [fht] Storing FHT @ 0x50003400
1,479,603 UART: [idev] ++
1,479,771 UART: [idev] CDI.KEYID = 6
1,480,131 UART: [idev] SUBJECT.KEYID = 7
1,480,555 UART: [idev] UDS.KEYID = 0
1,480,900 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,789 UART: [idev] Erasing UDS.KEYID = 0
1,505,463 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,071 UART: [idev] --
1,515,174 UART: [ldev] ++
1,515,342 UART: [ldev] CDI.KEYID = 6
1,515,705 UART: [ldev] SUBJECT.KEYID = 5
1,516,131 UART: [ldev] AUTHORITY.KEYID = 7
1,516,594 UART: [ldev] FE.KEYID = 1
1,522,310 UART: [ldev] Erasing FE.KEYID = 1
1,548,379 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,121 UART: [ldev] --
1,587,398 UART: [fwproc] Waiting for Commands...
1,588,031 UART: [fwproc] Received command 0x46574c44
1,588,822 UART: [fwproc] Received Image of size 119428 bytes
2,943,258 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,444 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,662 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,269 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,774 ready_for_fw is high
1,362,774 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,501 >>> mbox cmd response: success
3,054,490 UART:
3,054,506 UART: Running Caliptra FMC ...
3,054,914 UART:
3,055,057 UART: [state] CFI Enabled
3,065,889 UART: [fht] FMC Alias Private Key: 7
3,184,943 UART: [art] Extend RT PCRs Done
3,185,371 UART: [art] Lock RT PCRs Done
3,186,939 UART: [art] Populate DV Done
3,195,240 UART: [fht] FMC Alias Private Key: 7
3,196,200 UART: [art] Derive CDI
3,196,480 UART: [art] Store in slot 0x4
3,282,524 UART: [art] Derive Key Pair
3,282,884 UART: [art] Store priv key in slot 0x5
3,295,963 UART: [art] Derive Key Pair - Done
3,310,848 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,332 UART: [art] PUB.X = 58C9B9442FE9C1BFB1F262D4CDB3E3E94827170C42964C2110287B3996D3E6FAA205215881BCB5FE0B85F5885C976DC9
3,334,097 UART: [art] PUB.Y = F4E3F9A5508336B967DED625CB6F4811CED063E31993473CF39B5624703140CF4F86B9F8ECEEF180FDD53301631AC3E9
3,341,050 UART: [art] SIG.R = C50CE23AE7120146DA0310249AFB31F0C9F71DB4872CA33B60C2CB97E58A571124C4E643BD10F3A91AFC5D583842D244
3,347,817 UART: [art] SIG.S = 92F17C1FA129485F86E8DB9F99A09333F74EB1F01B991DF2749A0CDD996B21895A206295BC184F69A5197FBD626247C6
3,371,646 UART: Caliptra RT
3,371,989 UART: [state] CFI Enabled
3,491,298 UART: [rt] RT listening for mailbox commands...
3,491,961 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,778 UART: [rt]cmd =0x46504c54, len=4
3,522,816 >>> mbox cmd response data (8 bytes)
3,523,087 UART: [rt] FIPS self test
3,523,415 UART: [kat] ++
3,523,567 UART: [kat] sha1
3,527,877 UART: [kat] SHA2-256
3,529,899 UART: [kat] SHA2-384
3,532,688 UART: [kat] SHA2-512-ACC
3,534,615 UART: [kat] ECC-384
3,544,167 UART: Fatal Error: 0x90040003
3,545,706 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,545,711 >>> mbox cmd response: failed
3,545,711 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,545,716 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,330 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,589 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,430 UART: [kat] ++
895,582 UART: [kat] sha1
899,744 UART: [kat] SHA2-256
901,684 UART: [kat] SHA2-384
904,367 UART: [kat] SHA2-512-ACC
906,268 UART: [kat] ECC-384
915,925 UART: [kat] HMAC-384Kdf
920,517 UART: [kat] LMS
1,168,829 UART: [kat] --
1,169,566 UART: [cold-reset] ++
1,170,146 UART: [fht] FHT @ 0x50003400
1,172,712 UART: [idev] ++
1,172,880 UART: [idev] CDI.KEYID = 6
1,173,241 UART: [idev] SUBJECT.KEYID = 7
1,173,666 UART: [idev] UDS.KEYID = 0
1,174,012 ready_for_fw is high
1,174,012 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,681 UART: [idev] Sha1 KeyId Algorithm
1,207,407 UART: [idev] --
1,208,510 UART: [ldev] ++
1,208,678 UART: [ldev] CDI.KEYID = 6
1,209,042 UART: [ldev] SUBJECT.KEYID = 5
1,209,469 UART: [ldev] AUTHORITY.KEYID = 7
1,209,932 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,241,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,382 UART: [ldev] --
1,280,643 UART: [fwproc] Wait for Commands...
1,281,348 UART: [fwproc] Recv command 0x46574c44
1,282,081 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,383 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,558 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,255 >>> mbox cmd response: success
2,838,311 UART: [afmc] ++
2,838,479 UART: [afmc] CDI.KEYID = 6
2,838,842 UART: [afmc] SUBJECT.KEYID = 7
2,839,268 UART: [afmc] AUTHORITY.KEYID = 5
2,874,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,687 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,397 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,278 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,979 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,846 UART: [afmc] --
2,917,855 UART: [cold-reset] --
2,918,827 UART: [state] Locking Datavault
2,919,790 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,394 UART: [state] Locking ICCM
2,920,976 UART: [exit] Launching FMC @ 0x40000130
2,926,306 UART:
2,926,322 UART: Running Caliptra FMC ...
2,926,730 UART:
2,926,784 UART: [state] CFI Enabled
2,937,592 UART: [fht] FMC Alias Private Key: 7
3,056,758 UART: [art] Extend RT PCRs Done
3,057,186 UART: [art] Lock RT PCRs Done
3,058,660 UART: [art] Populate DV Done
3,066,847 UART: [fht] FMC Alias Private Key: 7
3,067,845 UART: [art] Derive CDI
3,068,125 UART: [art] Store in slot 0x4
3,153,448 UART: [art] Derive Key Pair
3,153,808 UART: [art] Store priv key in slot 0x5
3,167,058 UART: [art] Derive Key Pair - Done
3,182,131 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,527 UART: [art] PUB.X = DF0C6E018A00D7B0C7149AA7EB94003948B6097E83AC89509AD6E819ADA63EA3636562063AB89B580B98ACE05C374813
3,205,240 UART: [art] PUB.Y = 061FBC578E78380B53AAF826B8A49C6F31B32A3C7644BAF2DF6ED71E43FA8811F2DB0ACAABC75F116A55029A34382729
3,212,190 UART: [art] SIG.R = B06B57A63ADD193C7892FD3FEF18AF8B752FDD259D374333EB16E73055A7357ED6E65A9B575A0C562B19FDF1775156F6
3,218,965 UART: [art] SIG.S = 6593CC4DC00CF7128E4BCAD6542B1F7EF3CECEF62AE6604596EAE7D12209430BEDB3EB5CE0922FC9B7AA1EDBF4B78C2B
3,242,738 UART: Caliptra RT
3,242,989 UART: [state] CFI Enabled
3,362,378 UART: [rt] RT listening for mailbox commands...
3,363,041 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,884 UART: [rt]cmd =0x46504c54, len=4
3,394,058 >>> mbox cmd response data (8 bytes)
3,394,197 UART: [rt] FIPS self test
3,394,525 UART: [kat] ++
3,394,677 UART: [kat] sha1
3,399,055 UART: [kat] SHA2-256
3,401,077 UART: [kat] SHA2-384
3,403,832 UART: [kat] SHA2-512-ACC
3,405,759 UART: [kat] ECC-384
3,415,323 UART: Fatal Error: 0x90040003
3,416,862 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,416,867 >>> mbox cmd response: failed
3,416,867 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,416,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
891,372 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,852 UART: [kat] SHA2-256
901,792 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
915,967 UART: [kat] HMAC-384Kdf
920,383 UART: [kat] LMS
1,168,695 UART: [kat] --
1,169,504 UART: [cold-reset] ++
1,169,984 UART: [fht] FHT @ 0x50003400
1,172,774 UART: [idev] ++
1,172,942 UART: [idev] CDI.KEYID = 6
1,173,303 UART: [idev] SUBJECT.KEYID = 7
1,173,728 UART: [idev] UDS.KEYID = 0
1,174,074 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,249 UART: [idev] Erasing UDS.KEYID = 0
1,198,977 UART: [idev] Sha1 KeyId Algorithm
1,207,927 UART: [idev] --
1,209,012 UART: [ldev] ++
1,209,180 UART: [ldev] CDI.KEYID = 6
1,209,544 UART: [ldev] SUBJECT.KEYID = 5
1,209,971 UART: [ldev] AUTHORITY.KEYID = 7
1,210,434 UART: [ldev] FE.KEYID = 1
1,215,456 UART: [ldev] Erasing FE.KEYID = 1
1,241,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,760 UART: [ldev] --
1,281,023 UART: [fwproc] Wait for Commands...
1,281,610 UART: [fwproc] Recv command 0x46574c44
1,282,343 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,223 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,398 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,051 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,002 ready_for_fw is high
1,059,002 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,192 >>> mbox cmd response: success
2,752,593 UART:
2,752,609 UART: Running Caliptra FMC ...
2,753,017 UART:
2,753,071 UART: [state] CFI Enabled
2,763,843 UART: [fht] FMC Alias Private Key: 7
2,883,413 UART: [art] Extend RT PCRs Done
2,883,841 UART: [art] Lock RT PCRs Done
2,885,221 UART: [art] Populate DV Done
2,893,484 UART: [fht] FMC Alias Private Key: 7
2,894,452 UART: [art] Derive CDI
2,894,732 UART: [art] Store in slot 0x4
2,980,515 UART: [art] Derive Key Pair
2,980,875 UART: [art] Store priv key in slot 0x5
2,993,207 UART: [art] Derive Key Pair - Done
3,007,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,456 UART: [art] PUB.X = 34A97F6E0C1786B6B357A0BE99E51D4DC102086294FD14C6EA7798E9FFF4A5020E70906D29070BA2AE81EB2FE7A157E2
3,031,213 UART: [art] PUB.Y = 8BF07C5025ACA396A1F61F3A8200C61B7EA6DD4CD3B3D7E2E4F4B600EE12B4182F13C65EDE416E55A7D04E5F61DAD376
3,038,137 UART: [art] SIG.R = A16E5AF223340B8407E8932D8B64A40A4DDBF074EA451535BF5E58FC4BD02BF8D31308AA66355706191A2A2557EF97B6
3,044,896 UART: [art] SIG.S = B76158D8408D826DD6E94AA975B742BF0BE97F9485B93151B2B81FBA28DA47E5191E48C03AF89EA8A2E7BF268785AA1F
3,068,623 UART: Caliptra RT
3,068,874 UART: [state] CFI Enabled
3,188,906 UART: [rt] RT listening for mailbox commands...
3,189,569 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,132 UART: [rt]cmd =0x46504c54, len=4
3,220,418 >>> mbox cmd response data (8 bytes)
3,220,663 UART: [rt] FIPS self test
3,220,991 UART: [kat] ++
3,221,143 UART: [kat] sha1
3,225,153 UART: [kat] SHA2-256
3,227,175 UART: [kat] SHA2-384
3,230,018 UART: [kat] SHA2-512-ACC
3,231,945 UART: [kat] ECC-384
3,241,583 UART: Fatal Error: 0x90040003
3,243,122 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,127 >>> mbox cmd response: failed
3,243,127 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,304 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,098 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
899,975 UART: [kat] SHA2-256
901,915 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,522 UART: [kat] HMAC-384Kdf
921,130 UART: [kat] LMS
1,169,442 UART: [kat] --
1,170,479 UART: [cold-reset] ++
1,170,847 UART: [fht] FHT @ 0x50003400
1,173,525 UART: [idev] ++
1,173,693 UART: [idev] CDI.KEYID = 6
1,174,054 UART: [idev] SUBJECT.KEYID = 7
1,174,479 UART: [idev] UDS.KEYID = 0
1,174,825 ready_for_fw is high
1,174,825 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,616 UART: [idev] Erasing UDS.KEYID = 0
1,200,000 UART: [idev] Sha1 KeyId Algorithm
1,208,710 UART: [idev] --
1,209,867 UART: [ldev] ++
1,210,035 UART: [ldev] CDI.KEYID = 6
1,210,399 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,297 UART: [ldev] Erasing FE.KEYID = 1
1,241,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,165 UART: [ldev] --
1,281,386 UART: [fwproc] Wait for Commands...
1,282,123 UART: [fwproc] Recv command 0x46574c44
1,282,856 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,484 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,659 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,348 >>> mbox cmd response: success
2,837,500 UART: [afmc] ++
2,837,668 UART: [afmc] CDI.KEYID = 6
2,838,031 UART: [afmc] SUBJECT.KEYID = 7
2,838,457 UART: [afmc] AUTHORITY.KEYID = 5
2,873,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,889,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,890,532 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,242 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,123 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,907,824 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,915,543 UART: [afmc] --
2,916,534 UART: [cold-reset] --
2,917,510 UART: [state] Locking Datavault
2,918,709 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,313 UART: [state] Locking ICCM
2,919,819 UART: [exit] Launching FMC @ 0x40000130
2,925,149 UART:
2,925,165 UART: Running Caliptra FMC ...
2,925,573 UART:
2,925,716 UART: [state] CFI Enabled
2,936,522 UART: [fht] FMC Alias Private Key: 7
3,055,668 UART: [art] Extend RT PCRs Done
3,056,096 UART: [art] Lock RT PCRs Done
3,057,718 UART: [art] Populate DV Done
3,065,985 UART: [fht] FMC Alias Private Key: 7
3,067,065 UART: [art] Derive CDI
3,067,345 UART: [art] Store in slot 0x4
3,153,180 UART: [art] Derive Key Pair
3,153,540 UART: [art] Store priv key in slot 0x5
3,167,660 UART: [art] Derive Key Pair - Done
3,182,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,554 UART: [art] PUB.X = DCF1EA61238770613A700888AD1927F48E97058B77044B1BF12C3BD6ADBAC9CFD3E364C43392ACF3420D468282F58D91
3,205,316 UART: [art] PUB.Y = 1DB5FE7A4C45D2BF159492DBBBFBFCD90E7F84DD08F506F61B1B3A4D4D7E6CD4ADEF44642C63C9ACC4A1D56971C33301
3,212,280 UART: [art] SIG.R = 41B4F6CB90D919E352613A436D1DB6E315B7D07FD8E721CE8913F53AB9B74BD7C8C1AEBA7183989C674193B3D3F5558B
3,219,058 UART: [art] SIG.S = 94FBAC31201AF8152493051E6FD0A2C13D9B146BED7B78E39952F3C2FDBE3BED47E0ABA817E8B2DEE1E399D046A3F4D4
3,243,239 UART: Caliptra RT
3,243,582 UART: [state] CFI Enabled
3,364,601 UART: [rt] RT listening for mailbox commands...
3,365,264 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,957 UART: [rt]cmd =0x46504c54, len=4
3,396,151 >>> mbox cmd response data (8 bytes)
3,396,264 UART: [rt] FIPS self test
3,396,592 UART: [kat] ++
3,396,744 UART: [kat] sha1
3,400,950 UART: [kat] SHA2-256
3,402,972 UART: [kat] SHA2-384
3,405,927 UART: [kat] SHA2-512-ACC
3,407,854 UART: [kat] ECC-384
3,417,800 UART: Fatal Error: 0x90040003
3,419,339 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,344 >>> mbox cmd response: failed
3,419,344 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [kat] SHA2-256
891,135 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,239 UART: [kat] ++
895,391 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,158 UART: [kat] SHA2-512-ACC
906,059 UART: [kat] ECC-384
915,936 UART: [kat] HMAC-384Kdf
920,684 UART: [kat] LMS
1,168,996 UART: [kat] --
1,169,627 UART: [cold-reset] ++
1,170,087 UART: [fht] FHT @ 0x50003400
1,172,665 UART: [idev] ++
1,172,833 UART: [idev] CDI.KEYID = 6
1,173,194 UART: [idev] SUBJECT.KEYID = 7
1,173,619 UART: [idev] UDS.KEYID = 0
1,173,965 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,752 UART: [idev] Erasing UDS.KEYID = 0
1,198,530 UART: [idev] Sha1 KeyId Algorithm
1,207,338 UART: [idev] --
1,208,527 UART: [ldev] ++
1,208,695 UART: [ldev] CDI.KEYID = 6
1,209,059 UART: [ldev] SUBJECT.KEYID = 5
1,209,486 UART: [ldev] AUTHORITY.KEYID = 7
1,209,949 UART: [ldev] FE.KEYID = 1
1,215,305 UART: [ldev] Erasing FE.KEYID = 1
1,241,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,851 UART: [ldev] --
1,281,086 UART: [fwproc] Wait for Commands...
1,281,727 UART: [fwproc] Recv command 0x46574c44
1,282,460 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,598 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,773 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,252 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,783 ready_for_fw is high
1,058,783 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,063 >>> mbox cmd response: success
2,752,642 UART:
2,752,658 UART: Running Caliptra FMC ...
2,753,066 UART:
2,753,209 UART: [state] CFI Enabled
2,763,379 UART: [fht] FMC Alias Private Key: 7
2,881,895 UART: [art] Extend RT PCRs Done
2,882,323 UART: [art] Lock RT PCRs Done
2,884,051 UART: [art] Populate DV Done
2,892,410 UART: [fht] FMC Alias Private Key: 7
2,893,550 UART: [art] Derive CDI
2,893,830 UART: [art] Store in slot 0x4
2,979,381 UART: [art] Derive Key Pair
2,979,741 UART: [art] Store priv key in slot 0x5
2,993,891 UART: [art] Derive Key Pair - Done
3,008,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,793 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,558 UART: [art] PUB.X = 89D146458BB3B0DA31477B30A77794E77CAB61C03A4560C4AA83411C261E51964DD280B78B4B4745321C55FD4835F714
3,032,322 UART: [art] PUB.Y = 02E5678999B41E89895BC5AEAC71DCED1391C007F9A40E77F1BBB61C9BD99E1BC44550AE778D1756AC14D7019AF37C19
3,039,270 UART: [art] SIG.R = 9F66F8153F72C5BD04804FD11E5FA4F6665209AE9E6ED23B9A73A3D1195B0FFA8A1E9D7294999897769FF1A897A6CD15
3,046,037 UART: [art] SIG.S = D80D49138B573DA04BF99467E85A6C4919FCFF24FE01EE50C353997C8EA7F91D511C1F321E26DB1C257DDE62E961B313
3,069,953 UART: Caliptra RT
3,070,296 UART: [state] CFI Enabled
3,189,732 UART: [rt] RT listening for mailbox commands...
3,190,395 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,318 UART: [rt]cmd =0x46504c54, len=4
3,221,544 >>> mbox cmd response data (8 bytes)
3,221,755 UART: [rt] FIPS self test
3,222,083 UART: [kat] ++
3,222,235 UART: [kat] sha1
3,226,575 UART: [kat] SHA2-256
3,228,597 UART: [kat] SHA2-384
3,231,320 UART: [kat] SHA2-512-ACC
3,233,247 UART: [kat] ECC-384
3,243,127 UART: Fatal Error: 0x90040003
3,244,666 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,671 >>> mbox cmd response: failed
3,244,671 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,575 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,485 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
893,136 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,261 UART: [kat] ++
897,413 UART: [kat] sha1
901,627 UART: [kat] SHA2-256
903,567 UART: [kat] SHA2-384
906,310 UART: [kat] SHA2-512-ACC
908,211 UART: [kat] ECC-384
918,296 UART: [kat] HMAC-384Kdf
922,982 UART: [kat] LMS
1,171,310 UART: [kat] --
1,172,123 UART: [cold-reset] ++
1,172,563 UART: [fht] FHT @ 0x50003400
1,175,202 UART: [idev] ++
1,175,370 UART: [idev] CDI.KEYID = 6
1,175,730 UART: [idev] SUBJECT.KEYID = 7
1,176,154 UART: [idev] UDS.KEYID = 0
1,176,499 ready_for_fw is high
1,176,499 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,284 UART: [idev] Erasing UDS.KEYID = 0
1,201,551 UART: [idev] Sha1 KeyId Algorithm
1,209,919 UART: [idev] --
1,210,923 UART: [ldev] ++
1,211,091 UART: [ldev] CDI.KEYID = 6
1,211,454 UART: [ldev] SUBJECT.KEYID = 5
1,211,880 UART: [ldev] AUTHORITY.KEYID = 7
1,212,343 UART: [ldev] FE.KEYID = 1
1,217,517 UART: [ldev] Erasing FE.KEYID = 1
1,243,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,623 UART: [ldev] --
1,282,988 UART: [fwproc] Wait for Commands...
1,283,572 UART: [fwproc] Recv command 0x46574c44
1,284,300 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,673 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,788 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,958 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,535 >>> mbox cmd response: success
2,839,577 UART: [afmc] ++
2,839,745 UART: [afmc] CDI.KEYID = 6
2,840,107 UART: [afmc] SUBJECT.KEYID = 7
2,840,532 UART: [afmc] AUTHORITY.KEYID = 5
2,875,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,214 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,923 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,806 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,507 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,361 UART: [afmc] --
2,919,263 UART: [cold-reset] --
2,920,165 UART: [state] Locking Datavault
2,921,402 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,006 UART: [state] Locking ICCM
2,922,556 UART: [exit] Launching FMC @ 0x40000130
2,927,886 UART:
2,927,902 UART: Running Caliptra FMC ...
2,928,310 UART:
2,928,364 UART: [state] CFI Enabled
2,939,514 UART: [fht] FMC Alias Private Key: 7
3,058,936 UART: [art] Extend RT PCRs Done
3,059,364 UART: [art] Lock RT PCRs Done
3,061,126 UART: [art] Populate DV Done
3,069,501 UART: [fht] FMC Alias Private Key: 7
3,070,663 UART: [art] Derive CDI
3,070,943 UART: [art] Store in slot 0x4
3,156,718 UART: [art] Derive Key Pair
3,157,078 UART: [art] Store priv key in slot 0x5
3,170,198 UART: [art] Derive Key Pair - Done
3,184,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,950 UART: [art] PUB.X = 4984EA7CE0B5B8977D6B844ABEF172036B71BBCB6A5922059E7891B227619D5C3F2B85BCB006C7D9C951F55F496D7C3B
3,207,719 UART: [art] PUB.Y = 457472193EC23D680376B445D770D650164A0C37600FCF571419CCFB8FF235FE940704F776380B00B034A063A3CCED75
3,214,623 UART: [art] SIG.R = 58BF5596DA50666541CACC0F1CB00DCE71D2A87E605C2211064CB36F627718E35A2C557CC39D170DF812B1A3FD7481EE
3,221,389 UART: [art] SIG.S = 5DA405548B611C7189E3C0684B4EBEA7B8D7910761576200BFB83CEF8765AD2AB0592545E59E0968DAC006A9EAE44FDD
3,244,929 UART: Caliptra RT
3,245,180 UART: [state] CFI Enabled
3,363,414 UART: [rt] RT listening for mailbox commands...
3,364,077 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,910 UART: [rt]cmd =0x46504c54, len=4
3,395,072 >>> mbox cmd response data (8 bytes)
3,395,357 UART: [rt] FIPS self test
3,395,685 UART: [kat] ++
3,395,837 UART: [kat] sha1
3,400,051 UART: [kat] SHA2-256
3,402,073 UART: [kat] SHA2-384
3,405,012 UART: [kat] SHA2-512-ACC
3,406,939 UART: [kat] ECC-384
3,416,363 UART: Fatal Error: 0x90040003
3,417,902 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,417,907 >>> mbox cmd response: failed
3,417,907 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,417,912 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
893,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,725 UART: [kat] ++
897,877 UART: [kat] sha1
901,973 UART: [kat] SHA2-256
903,913 UART: [kat] SHA2-384
906,496 UART: [kat] SHA2-512-ACC
908,397 UART: [kat] ECC-384
917,844 UART: [kat] HMAC-384Kdf
922,528 UART: [kat] LMS
1,170,856 UART: [kat] --
1,171,717 UART: [cold-reset] ++
1,172,183 UART: [fht] FHT @ 0x50003400
1,174,746 UART: [idev] ++
1,174,914 UART: [idev] CDI.KEYID = 6
1,175,274 UART: [idev] SUBJECT.KEYID = 7
1,175,698 UART: [idev] UDS.KEYID = 0
1,176,043 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,446 UART: [idev] Erasing UDS.KEYID = 0
1,200,089 UART: [idev] Sha1 KeyId Algorithm
1,208,635 UART: [idev] --
1,209,749 UART: [ldev] ++
1,209,917 UART: [ldev] CDI.KEYID = 6
1,210,280 UART: [ldev] SUBJECT.KEYID = 5
1,210,706 UART: [ldev] AUTHORITY.KEYID = 7
1,211,169 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,242,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,607 UART: [ldev] --
1,281,876 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,783 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,502 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,672 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,259 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,433 ready_for_fw is high
1,060,433 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,082 >>> mbox cmd response: success
2,753,847 UART:
2,753,863 UART: Running Caliptra FMC ...
2,754,271 UART:
2,754,325 UART: [state] CFI Enabled
2,764,847 UART: [fht] FMC Alias Private Key: 7
2,884,357 UART: [art] Extend RT PCRs Done
2,884,785 UART: [art] Lock RT PCRs Done
2,886,757 UART: [art] Populate DV Done
2,895,060 UART: [fht] FMC Alias Private Key: 7
2,896,176 UART: [art] Derive CDI
2,896,456 UART: [art] Store in slot 0x4
2,982,127 UART: [art] Derive Key Pair
2,982,487 UART: [art] Store priv key in slot 0x5
2,995,381 UART: [art] Derive Key Pair - Done
3,009,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,230 UART: [art] PUB.X = 38CF3BBE86669BC89BB9B8849E1001FA52D5D1176A01673ABE1B5A67C7BF8562BC86812F5BBE31968CD5E3F1EF1EA064
3,033,008 UART: [art] PUB.Y = 47EFEB3AFB56699C307048A9D1BE4759701430918A6C35A261735709E7D78C9F8EA02D671DE60C65A4A6572057F0BEA7
3,039,952 UART: [art] SIG.R = CFC395FFC3A20D43CC9B506C6D0B01EB312A010C185CBB47D242980FA32042F90DB2B952402B4ADEE4E1633670EC4465
3,046,711 UART: [art] SIG.S = 842B1D8CCA75FBA15E0CF3B46C9E46A55AA85790239BB336635D81E31FB9279F639DE35E4832700786ACB12819E38EDA
3,070,703 UART: Caliptra RT
3,070,954 UART: [state] CFI Enabled
3,190,100 UART: [rt] RT listening for mailbox commands...
3,190,763 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,822 UART: [rt]cmd =0x46504c54, len=4
3,222,064 >>> mbox cmd response data (8 bytes)
3,222,275 UART: [rt] FIPS self test
3,222,603 UART: [kat] ++
3,222,755 UART: [kat] sha1
3,227,119 UART: [kat] SHA2-256
3,229,141 UART: [kat] SHA2-384
3,232,038 UART: [kat] SHA2-512-ACC
3,233,965 UART: [kat] ECC-384
3,243,475 UART: Fatal Error: 0x90040003
3,245,014 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,245,019 >>> mbox cmd response: failed
3,245,019 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,245,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,314 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,286 UART: [state] WD Timer not started. Device not locked for debugging
87,423 UART: [kat] SHA2-256
893,073 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,198 UART: [kat] ++
897,350 UART: [kat] sha1
901,778 UART: [kat] SHA2-256
903,718 UART: [kat] SHA2-384
906,329 UART: [kat] SHA2-512-ACC
908,230 UART: [kat] ECC-384
918,169 UART: [kat] HMAC-384Kdf
922,683 UART: [kat] LMS
1,171,011 UART: [kat] --
1,171,916 UART: [cold-reset] ++
1,172,368 UART: [fht] FHT @ 0x50003400
1,175,151 UART: [idev] ++
1,175,319 UART: [idev] CDI.KEYID = 6
1,175,679 UART: [idev] SUBJECT.KEYID = 7
1,176,103 UART: [idev] UDS.KEYID = 0
1,176,448 ready_for_fw is high
1,176,448 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,317 UART: [idev] Erasing UDS.KEYID = 0
1,200,884 UART: [idev] Sha1 KeyId Algorithm
1,209,184 UART: [idev] --
1,210,176 UART: [ldev] ++
1,210,344 UART: [ldev] CDI.KEYID = 6
1,210,707 UART: [ldev] SUBJECT.KEYID = 5
1,211,133 UART: [ldev] AUTHORITY.KEYID = 7
1,211,596 UART: [ldev] FE.KEYID = 1
1,216,896 UART: [ldev] Erasing FE.KEYID = 1
1,243,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,086 UART: [ldev] --
1,283,377 UART: [fwproc] Wait for Commands...
1,284,179 UART: [fwproc] Recv command 0x46574c44
1,284,907 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,319 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,489 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,086 >>> mbox cmd response: success
2,841,140 UART: [afmc] ++
2,841,308 UART: [afmc] CDI.KEYID = 6
2,841,670 UART: [afmc] SUBJECT.KEYID = 7
2,842,095 UART: [afmc] AUTHORITY.KEYID = 5
2,877,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,967 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,676 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,559 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,260 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,014 UART: [afmc] --
2,921,136 UART: [cold-reset] --
2,922,006 UART: [state] Locking Datavault
2,923,387 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,991 UART: [state] Locking ICCM
2,924,567 UART: [exit] Launching FMC @ 0x40000130
2,929,897 UART:
2,929,913 UART: Running Caliptra FMC ...
2,930,321 UART:
2,930,464 UART: [state] CFI Enabled
2,941,196 UART: [fht] FMC Alias Private Key: 7
3,060,294 UART: [art] Extend RT PCRs Done
3,060,722 UART: [art] Lock RT PCRs Done
3,062,410 UART: [art] Populate DV Done
3,070,823 UART: [fht] FMC Alias Private Key: 7
3,071,961 UART: [art] Derive CDI
3,072,241 UART: [art] Store in slot 0x4
3,157,978 UART: [art] Derive Key Pair
3,158,338 UART: [art] Store priv key in slot 0x5
3,171,780 UART: [art] Derive Key Pair - Done
3,186,450 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,781 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,546 UART: [art] PUB.X = 984B712C55FBD70E253085182DF82901B206EC45333224EF4B5379FF19FB7EAA7B508871885AA77933937C27BCB9D162
3,209,303 UART: [art] PUB.Y = 27F75B9A5577B27305A0F5787177EB1C54F21640B696730F19F33CFEF491CF92BD44527311333E51BB302E9895708047
3,216,235 UART: [art] SIG.R = 752AE904B7C84B4CB81AB45DB7F59CC2CB929E43B1E4A51928A4B99E4DDF78A53B3A367411236030FAB6D77B3EADAE1C
3,223,020 UART: [art] SIG.S = 71D2C616EDD7503C3D08D484A4E155B6DFB6F7FCF14DC71D1FE17BAB74DFA808D2DC026BAF899D9469B21B0012037028
3,246,446 UART: Caliptra RT
3,246,789 UART: [state] CFI Enabled
3,367,449 UART: [rt] RT listening for mailbox commands...
3,368,112 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,059 UART: [rt]cmd =0x46504c54, len=4
3,399,197 >>> mbox cmd response data (8 bytes)
3,399,414 UART: [rt] FIPS self test
3,399,742 UART: [kat] ++
3,399,894 UART: [kat] sha1
3,404,000 UART: [kat] SHA2-256
3,406,022 UART: [kat] SHA2-384
3,408,989 UART: [kat] SHA2-512-ACC
3,410,916 UART: [kat] ECC-384
3,420,280 UART: Fatal Error: 0x90040003
3,421,819 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,421,824 >>> mbox cmd response: failed
3,421,824 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,421,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
87,040 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [kat] SHA2-256
893,971 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,096 UART: [kat] ++
898,248 UART: [kat] sha1
902,484 UART: [kat] SHA2-256
904,424 UART: [kat] SHA2-384
906,945 UART: [kat] SHA2-512-ACC
908,846 UART: [kat] ECC-384
918,611 UART: [kat] HMAC-384Kdf
923,279 UART: [kat] LMS
1,171,607 UART: [kat] --
1,172,670 UART: [cold-reset] ++
1,173,116 UART: [fht] FHT @ 0x50003400
1,175,789 UART: [idev] ++
1,175,957 UART: [idev] CDI.KEYID = 6
1,176,317 UART: [idev] SUBJECT.KEYID = 7
1,176,741 UART: [idev] UDS.KEYID = 0
1,177,086 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,555 UART: [idev] Erasing UDS.KEYID = 0
1,201,808 UART: [idev] Sha1 KeyId Algorithm
1,210,136 UART: [idev] --
1,211,366 UART: [ldev] ++
1,211,534 UART: [ldev] CDI.KEYID = 6
1,211,897 UART: [ldev] SUBJECT.KEYID = 5
1,212,323 UART: [ldev] AUTHORITY.KEYID = 7
1,212,786 UART: [ldev] FE.KEYID = 1
1,218,116 UART: [ldev] Erasing FE.KEYID = 1
1,244,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,654 UART: [ldev] --
1,284,003 UART: [fwproc] Wait for Commands...
1,284,813 UART: [fwproc] Recv command 0x46574c44
1,285,541 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,165 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,335 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,841,020 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,814 ready_for_fw is high
1,060,814 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,363 >>> mbox cmd response: success
2,753,300 UART:
2,753,316 UART: Running Caliptra FMC ...
2,753,724 UART:
2,753,867 UART: [state] CFI Enabled
2,764,437 UART: [fht] FMC Alias Private Key: 7
2,883,727 UART: [art] Extend RT PCRs Done
2,884,155 UART: [art] Lock RT PCRs Done
2,885,701 UART: [art] Populate DV Done
2,894,096 UART: [fht] FMC Alias Private Key: 7
2,895,256 UART: [art] Derive CDI
2,895,536 UART: [art] Store in slot 0x4
2,981,429 UART: [art] Derive Key Pair
2,981,789 UART: [art] Store priv key in slot 0x5
2,995,811 UART: [art] Derive Key Pair - Done
3,010,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,735 UART: [art] PUB.X = 033A44728828CC1FA509DC88F79942E703A7200BE25D685FF1CA0BE6599E5195F445AD5FBCC840A127F910A116E6F069
3,033,492 UART: [art] PUB.Y = 12C29A863AB44542419B9DA28201C501E6AB793CF027B1CC4C64DD53BF051077111819663036C4FF5C7BF31977841C02
3,040,424 UART: [art] SIG.R = D4F573BC03B3B6A783E71AA2E7BC12AA82646127545095B6C3DE09F63410A66041A6AD80FAA3C38EB466F9EF60B37137
3,047,194 UART: [art] SIG.S = 18B073796548481186D85BF4391BE2C98A828AA6F7E7EBA5A2852084049AD28193A2F41498EF1AF3B82A71495A313B23
3,070,487 UART: Caliptra RT
3,070,830 UART: [state] CFI Enabled
3,190,009 UART: [rt] RT listening for mailbox commands...
3,190,672 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,633 UART: [rt]cmd =0x46504c54, len=4
3,221,877 >>> mbox cmd response data (8 bytes)
3,222,198 UART: [rt] FIPS self test
3,222,526 UART: [kat] ++
3,222,678 UART: [kat] sha1
3,226,954 UART: [kat] SHA2-256
3,228,976 UART: [kat] SHA2-384
3,231,751 UART: [kat] SHA2-512-ACC
3,233,678 UART: [kat] ECC-384
3,243,338 UART: Fatal Error: 0x90040003
3,244,877 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,882 >>> mbox cmd response: failed
3,244,882 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,412 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,207 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
276,493 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
277,035 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
653,340 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
653,059 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
276,568 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
276,638 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
653,452 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,905 writing to cptra_bootfsm_go
654,159 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 10.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 10.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 9.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 10.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 9.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 9.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 9.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 9.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
5,156,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,306,241 >>> mbox cmd response: failed
5,306,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,455,687 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,445,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,279,559 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
5,174,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,323,838 >>> mbox cmd response: failed
5,324,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,473,329 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
3,432,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,236,687 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,512 writing to cptra_bootfsm_go
5,510,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,660,888 >>> mbox cmd response: failed
5,661,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,810,383 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
17,830,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,545,338 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
5,497,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,647,514 >>> mbox cmd response: failed
5,648,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,796,971 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
17,855,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,562,492 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
5,158,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,308,466 >>> mbox cmd response: failed
5,309,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,458,486 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,445,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,259,357 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
5,167,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,317,163 >>> mbox cmd response: failed
5,317,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,466,589 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,437,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,270,044 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
5,499,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,649,305 >>> mbox cmd response: failed
5,649,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,798,723 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
17,849,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,564,730 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,525 writing to cptra_bootfsm_go
5,498,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,648,728 >>> mbox cmd response: failed
5,649,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,798,831 >>> mbox cmd response: failed
Initializing fuses
1,410 writing to cptra_bootfsm_go
17,848,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,564,523 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,743 >>> mbox cmd response: failed
827,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,318 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,087 >>> mbox cmd response: failed
827,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,048 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,284 >>> mbox cmd response: failed
827,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,607 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,758 >>> mbox cmd response: failed
827,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,307 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,563 >>> mbox cmd response: failed
826,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,569 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,172 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,991 >>> mbox cmd response: failed
826,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,997 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,900 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,768 >>> mbox cmd response: failed
827,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,774 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,963 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,278 >>> mbox cmd response: failed
827,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,735 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,368 UART:
192,720 UART: Running Caliptra ROM ...
193,911 UART:
194,066 UART: [state] CFI Enabled
260,715 UART: [state] LifecycleState = Unprovisioned
262,682 UART: [state] DebugLocked = No
264,579 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,458 UART: [kat] SHA2-256
439,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,716 UART: [kat] ++
450,207 UART: [kat] sha1
461,654 UART: [kat] SHA2-256
464,340 UART: [kat] SHA2-384
470,064 UART: [kat] SHA2-512-ACC
472,446 UART: [kat] ECC-384
2,767,692 UART: [kat] HMAC-384Kdf
2,799,730 UART: [kat] LMS
3,990,047 UART: [kat] --
3,994,914 UART: [cold-reset] ++
3,996,495 UART: [fht] Storing FHT @ 0x50003400
4,007,279 UART: [idev] ++
4,007,853 UART: [idev] CDI.KEYID = 6
4,008,771 UART: [idev] SUBJECT.KEYID = 7
4,010,028 UART: [idev] UDS.KEYID = 0
4,011,082 ready_for_fw is high
4,011,309 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,517 UART: [idev] Erasing UDS.KEYID = 0
7,344,295 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,311 UART: [idev] --
7,370,722 UART: [ldev] ++
7,371,297 UART: [ldev] CDI.KEYID = 6
7,372,318 UART: [ldev] SUBJECT.KEYID = 5
7,373,449 UART: [ldev] AUTHORITY.KEYID = 7
7,374,744 UART: [ldev] FE.KEYID = 1
7,414,161 UART: [ldev] Erasing FE.KEYID = 1
10,748,307 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,134 UART: [ldev] --
13,128,919 UART: [fwproc] Waiting for Commands...
13,130,750 UART: [fwproc] Received command 0x46574c44
13,132,940 UART: [fwproc] Received Image of size 119428 bytes
17,251,428 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,325,492 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,398,697 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,729,527 >>> mbox cmd response: success
17,733,337 UART: [afmc] ++
17,733,940 UART: [afmc] CDI.KEYID = 6
17,734,885 UART: [afmc] SUBJECT.KEYID = 7
17,736,102 UART: [afmc] AUTHORITY.KEYID = 5
21,108,290 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,407,532 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,409,759 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,424,241 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,438,940 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,453,348 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,474,678 UART: [afmc] --
23,478,328 UART: [cold-reset] --
23,481,865 UART: [state] Locking Datavault
23,487,384 UART: [state] Locking PCR0, PCR1 and PCR31
23,489,088 UART: [state] Locking ICCM
23,491,354 UART: [exit] Launching FMC @ 0x40000130
23,499,719 UART:
23,499,964 UART: Running Caliptra FMC ...
23,501,069 UART:
23,501,241 UART: [state] CFI Enabled
23,568,522 UART: [fht] FMC Alias Private Key: 7
25,909,277 UART: [art] Extend RT PCRs Done
25,910,507 UART: [art] Lock RT PCRs Done
25,912,350 UART: [art] Populate DV Done
25,917,602 UART: [fht] FMC Alias Private Key: 7
25,919,091 UART: [art] Derive CDI
25,919,858 UART: [art] Store in slot 0x4
25,977,537 UART: [art] Derive Key Pair
25,978,535 UART: [art] Store priv key in slot 0x5
29,271,235 UART: [art] Derive Key Pair - Done
29,283,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,573,441 UART: [art] Erasing AUTHORITY.KEYID = 7
31,574,973 UART: [art] PUB.X = 38EB39CB82FC6A97510EBDDC62F906713BFAD7CEBACEA970866712A1E37DCC5F27A3025FED5C3F84CC383BF94FF5DDE7
31,582,310 UART: [art] PUB.Y = 208545CBBC555CE92F1D34D8CB4725F3984565F82D1EBC2610DDF4B407EA64E566E8B6C4F2C4A3019060C2BEA85E11E7
31,589,508 UART: [art] SIG.R = 8B71871886490B794B3A1757899CE54C9B420181C0442B891E286CC7ACBF06701E4AB791FBA7A00564FBA3B53DA5D39A
31,596,912 UART: [art] SIG.S = DC25430760E8DC0EA5E1516416695CA85544E6C26EC70DEE7FC81AD9CB4B30575BD2AC25E5451458FC1A0AEF420714D6
32,902,040 UART: Caliptra RT
32,902,786 UART: [state] CFI Enabled
33,079,260 UART: [rt] RT listening for mailbox commands...
33,081,123 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,110,770 UART: [rt]cmd =0x46504c54, len=4
33,112,279 >>> mbox cmd response data (8 bytes)
33,113,484 UART: [rt] FIPS self test
33,114,433 UART: [kat] ++
33,114,886 UART: [kat] sha1
33,119,346 UART: [kat] SHA2-256
33,121,223 UART: [kat] SHA2-384
33,124,185 UART: [kat] SHA2-512-ACC
33,126,444 UART: [kat] ECC-384
36,399,924 UART: [kat] HMAC-384Kdf
36,401,099 UART: Fatal Error: 0x90030001
36,436,290 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,586,264 >>> mbox cmd response: failed
36,586,924 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,736,864 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,160 UART:
190,461 UART: Running Caliptra ROM ...
191,489 UART:
191,630 UART: [state] CFI Enabled
255,209 UART: [state] LifecycleState = Unprovisioned
257,133 UART: [state] DebugLocked = No
259,186 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,177 UART: [kat] SHA2-256
432,896 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,430 UART: [kat] ++
444,059 UART: [kat] sha1
454,570 UART: [kat] SHA2-256
457,262 UART: [kat] SHA2-384
462,711 UART: [kat] SHA2-512-ACC
465,052 UART: [kat] ECC-384
2,758,947 UART: [kat] HMAC-384Kdf
2,789,558 UART: [kat] LMS
3,979,857 UART: [kat] --
3,985,708 UART: [cold-reset] ++
3,987,056 UART: [fht] Storing FHT @ 0x50003400
3,998,446 UART: [idev] ++
3,999,065 UART: [idev] CDI.KEYID = 6
3,999,955 UART: [idev] SUBJECT.KEYID = 7
4,001,242 UART: [idev] UDS.KEYID = 0
4,002,751 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,152,900 UART: [idev] Erasing UDS.KEYID = 0
7,334,129 UART: [idev] Using Sha1 for KeyId Algorithm
7,355,415 UART: [idev] --
7,358,923 UART: [ldev] ++
7,359,500 UART: [ldev] CDI.KEYID = 6
7,360,522 UART: [ldev] SUBJECT.KEYID = 5
7,361,685 UART: [ldev] AUTHORITY.KEYID = 7
7,362,920 UART: [ldev] FE.KEYID = 1
7,411,819 UART: [ldev] Erasing FE.KEYID = 1
10,744,040 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,036,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,050,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,065,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,080,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,497 UART: [ldev] --
13,104,916 UART: [fwproc] Waiting for Commands...
13,107,294 UART: [fwproc] Received command 0x46574c44
13,109,486 UART: [fwproc] Received Image of size 119428 bytes
17,225,026 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,294,597 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,367,782 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,698,938 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,797,956 ready_for_fw is high
3,798,572 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,979,960 >>> mbox cmd response: success
23,677,423 UART:
23,677,841 UART: Running Caliptra FMC ...
23,678,968 UART:
23,679,126 UART: [state] CFI Enabled
23,747,781 UART: [fht] FMC Alias Private Key: 7
26,088,265 UART: [art] Extend RT PCRs Done
26,089,494 UART: [art] Lock RT PCRs Done
26,091,153 UART: [art] Populate DV Done
26,096,753 UART: [fht] FMC Alias Private Key: 7
26,098,191 UART: [art] Derive CDI
26,098,948 UART: [art] Store in slot 0x4
26,156,045 UART: [art] Derive Key Pair
26,157,094 UART: [art] Store priv key in slot 0x5
29,449,425 UART: [art] Derive Key Pair - Done
29,462,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,572 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,082 UART: [art] PUB.X = 0B77964CBF877E017A1A6D66C75CBDEA361995E62A60F9CCAC29601D654BF5396ADBB7A13C44CB8D123A80BC9B315AA9
31,759,460 UART: [art] PUB.Y = 3DAF8BBBBF09F52BF6DFDEACE988C899299CE0BC51B9433C5683141F1D7D0C2432D336698730B421CBE830100FE2986C
31,766,674 UART: [art] SIG.R = DF93403402DAC00AD2AF8B87B333BE8FB9631A88706D235885136AC2D43CA0A4EE68DFB114E8DCB7111A92D127E43D90
31,774,029 UART: [art] SIG.S = C42ABDCAB44987745ECDC7E44F08373803732AEDC6A8E3C4880E212F102BAB09A211C19A84326F4B4309FFC87F48B037
33,079,034 UART: Caliptra RT
33,079,757 UART: [state] CFI Enabled
33,256,323 UART: [rt] RT listening for mailbox commands...
33,258,178 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,287,937 UART: [rt]cmd =0x46504c54, len=4
33,289,545 >>> mbox cmd response data (8 bytes)
33,290,742 UART: [rt] FIPS self test
33,291,694 UART: [kat] ++
33,292,148 UART: [kat] sha1
33,296,386 UART: [kat] SHA2-256
33,298,267 UART: [kat] SHA2-384
33,301,280 UART: [kat] SHA2-512-ACC
33,303,523 UART: [kat] ECC-384
36,577,501 UART: [kat] HMAC-384Kdf
36,578,795 UART: Fatal Error: 0x90030001
36,614,040 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,764,117 >>> mbox cmd response: failed
36,764,756 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,915,027 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
3,795,561 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,999,214 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,522 UART:
192,891 UART: Running Caliptra ROM ...
194,026 UART:
603,712 UART: [state] CFI Enabled
617,871 UART: [state] LifecycleState = Unprovisioned
619,744 UART: [state] DebugLocked = No
621,055 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,357 UART: [kat] SHA2-256
796,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,692 UART: [kat] ++
807,230 UART: [kat] sha1
818,060 UART: [kat] SHA2-256
820,770 UART: [kat] SHA2-384
826,705 UART: [kat] SHA2-512-ACC
829,084 UART: [kat] ECC-384
3,112,870 UART: [kat] HMAC-384Kdf
3,125,341 UART: [kat] LMS
4,315,490 UART: [kat] --
4,321,637 UART: [cold-reset] ++
4,323,021 UART: [fht] Storing FHT @ 0x50003400
4,335,030 UART: [idev] ++
4,335,646 UART: [idev] CDI.KEYID = 6
4,336,569 UART: [idev] SUBJECT.KEYID = 7
4,337,825 UART: [idev] UDS.KEYID = 0
4,338,806 ready_for_fw is high
4,339,028 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,488,871 UART: [idev] Erasing UDS.KEYID = 0
7,628,134 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,988 UART: [idev] --
7,654,340 UART: [ldev] ++
7,654,924 UART: [ldev] CDI.KEYID = 6
7,655,872 UART: [ldev] SUBJECT.KEYID = 5
7,657,111 UART: [ldev] AUTHORITY.KEYID = 7
7,658,270 UART: [ldev] FE.KEYID = 1
7,668,918 UART: [ldev] Erasing FE.KEYID = 1
10,956,644 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,383 UART: [ldev] --
13,318,340 UART: [fwproc] Waiting for Commands...
13,320,347 UART: [fwproc] Received command 0x46574c44
13,322,538 UART: [fwproc] Received Image of size 119428 bytes
17,436,393 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,513,230 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,586,393 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,918,749 >>> mbox cmd response: success
17,923,240 UART: [afmc] ++
17,923,844 UART: [afmc] CDI.KEYID = 6
17,924,766 UART: [afmc] SUBJECT.KEYID = 7
17,926,041 UART: [afmc] AUTHORITY.KEYID = 5
21,240,606 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,532,709 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,535,010 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,549,434 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,564,147 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,578,572 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,599,951 UART: [afmc] --
23,602,954 UART: [cold-reset] --
23,605,091 UART: [state] Locking Datavault
23,611,647 UART: [state] Locking PCR0, PCR1 and PCR31
23,613,408 UART: [state] Locking ICCM
23,614,701 UART: [exit] Launching FMC @ 0x40000130
23,623,075 UART:
23,623,332 UART: Running Caliptra FMC ...
23,624,441 UART:
23,624,609 UART: [state] CFI Enabled
23,632,553 UART: [fht] FMC Alias Private Key: 7
25,972,760 UART: [art] Extend RT PCRs Done
25,974,032 UART: [art] Lock RT PCRs Done
25,975,267 UART: [art] Populate DV Done
25,980,472 UART: [fht] FMC Alias Private Key: 7
25,982,127 UART: [art] Derive CDI
25,982,894 UART: [art] Store in slot 0x4
26,025,847 UART: [art] Derive Key Pair
26,026,894 UART: [art] Store priv key in slot 0x5
29,268,619 UART: [art] Derive Key Pair - Done
29,281,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,562,053 UART: [art] Erasing AUTHORITY.KEYID = 7
31,563,606 UART: [art] PUB.X = 2880EA390B18C87D7EBD26D45CD73CE6AB050609313DD51AA1FC80BE30ACC947574F696655E5C57EC426EEC28E298245
31,570,811 UART: [art] PUB.Y = 773A16B61FD75D3949A43CC026CCF973767BFEF5D74589884C7DD8B623FDB313CEF6323B5F2C839EC60F9EAF956D3AA2
31,578,103 UART: [art] SIG.R = A92E90643AE648CE8643282135EF03A084633AA1C5A23A2A855E3FCA6A95174F8014E211ECF936D1C7E6CFB39534FEE5
31,585,508 UART: [art] SIG.S = A2A2D45D936BB50D5C00BFC3C585DAF7D8C599B84C9CFB2143F740609DA08B7ED0D4D283F246CDFB8F49AF9088C73A68
32,891,013 UART: Caliptra RT
32,891,734 UART: [state] CFI Enabled
33,024,317 UART: [rt] RT listening for mailbox commands...
33,026,193 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,056,027 UART: [rt]cmd =0x46504c54, len=4
33,057,653 >>> mbox cmd response data (8 bytes)
33,058,889 UART: [rt] FIPS self test
33,059,844 UART: [kat] ++
33,060,305 UART: [kat] sha1
33,064,662 UART: [kat] SHA2-256
33,066,541 UART: [kat] SHA2-384
33,069,561 UART: [kat] SHA2-512-ACC
33,071,826 UART: [kat] ECC-384
36,314,670 UART: [kat] HMAC-384Kdf
36,315,932 UART: Fatal Error: 0x90030001
36,351,324 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,501,303 >>> mbox cmd response: failed
36,501,914 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,651,983 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,009 UART:
190,317 UART: Running Caliptra ROM ...
191,346 UART:
3,881,557 UART: [state] CFI Enabled
3,891,843 UART: [state] LifecycleState = Unprovisioned
3,893,765 UART: [state] DebugLocked = No
3,896,236 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,900,775 UART: [kat] SHA2-256
4,070,516 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,081,052 UART: [kat] ++
4,081,527 UART: [kat] sha1
4,092,100 UART: [kat] SHA2-256
4,094,809 UART: [kat] SHA2-384
4,100,828 UART: [kat] SHA2-512-ACC
4,103,192 UART: [kat] ECC-384
6,385,548 UART: [kat] HMAC-384Kdf
6,398,367 UART: [kat] LMS
7,588,463 UART: [kat] --
7,594,133 UART: [cold-reset] ++
7,595,098 UART: [fht] Storing FHT @ 0x50003400
7,605,595 UART: [idev] ++
7,606,199 UART: [idev] CDI.KEYID = 6
7,607,090 UART: [idev] SUBJECT.KEYID = 7
7,608,391 UART: [idev] UDS.KEYID = 0
7,609,903 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
7,759,660 UART: [idev] Erasing UDS.KEYID = 0
10,893,960 UART: [idev] Using Sha1 for KeyId Algorithm
10,915,468 UART: [idev] --
10,919,901 UART: [ldev] ++
10,920,530 UART: [ldev] CDI.KEYID = 6
10,921,442 UART: [ldev] SUBJECT.KEYID = 5
10,922,659 UART: [ldev] AUTHORITY.KEYID = 7
10,923,951 UART: [ldev] FE.KEYID = 1
10,935,140 UART: [ldev] Erasing FE.KEYID = 1
14,226,323 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,516,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,531,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,546,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,560,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,579,389 UART: [ldev] --
16,584,571 UART: [fwproc] Waiting for Commands...
16,586,134 UART: [fwproc] Received command 0x46574c44
16,588,382 UART: [fwproc] Received Image of size 119428 bytes
20,705,791 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,780,454 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,853,623 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
21,185,087 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
4,127,370 ready_for_fw is high
4,128,060 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,180,868 >>> mbox cmd response: success
23,824,707 UART:
23,825,150 UART: Running Caliptra FMC ...
23,826,269 UART:
23,826,439 UART: [state] CFI Enabled
23,834,137 UART: [fht] FMC Alias Private Key: 7
26,173,491 UART: [art] Extend RT PCRs Done
26,174,741 UART: [art] Lock RT PCRs Done
26,176,349 UART: [art] Populate DV Done
26,181,722 UART: [fht] FMC Alias Private Key: 7
26,183,327 UART: [art] Derive CDI
26,184,149 UART: [art] Store in slot 0x4
26,226,595 UART: [art] Derive Key Pair
26,227,604 UART: [art] Store priv key in slot 0x5
29,470,098 UART: [art] Derive Key Pair - Done
29,483,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,763,361 UART: [art] Erasing AUTHORITY.KEYID = 7
31,764,879 UART: [art] PUB.X = F07CFBE7F7B2B15B00A271C2783F45CE1C9414305BC04A8B7B9AB5F9971944B0DDFC0B3148134F8A0DB15B391E236226
31,772,176 UART: [art] PUB.Y = 62A45ADF5504A3E73C4880D396B80B244508790A597010E4A5A6BEA5CF698FC09777BF65E2556E803C94EAFA219A584A
31,779,391 UART: [art] SIG.R = 49199D3037609C21DBFD5FD0412B0107E0F931F0E7345CA7B3FEB915976219BF9598ADB066BE6BB3745A2ADE0B80F14C
31,786,803 UART: [art] SIG.S = A4ABB2508D6B795DE5C195484B8CFEF8016547445A0A58907FBE03E351D5B556F476F782E9C19F5E9C722F4344C83794
33,092,335 UART: Caliptra RT
33,093,062 UART: [state] CFI Enabled
33,226,186 UART: [rt] RT listening for mailbox commands...
33,228,051 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,257,816 UART: [rt]cmd =0x46504c54, len=4
33,259,451 >>> mbox cmd response data (8 bytes)
33,260,726 UART: [rt] FIPS self test
33,261,666 UART: [kat] ++
33,262,115 UART: [kat] sha1
33,266,686 UART: [kat] SHA2-256
33,268,596 UART: [kat] SHA2-384
33,271,646 UART: [kat] SHA2-512-ACC
33,273,882 UART: [kat] ECC-384
36,516,777 UART: [kat] HMAC-384Kdf
36,518,209 UART: Fatal Error: 0x90030001
36,553,447 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,703,440 >>> mbox cmd response: failed
36,704,108 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,854,455 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
7,205,984 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
21,252,891 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,359 UART:
192,710 UART: Running Caliptra ROM ...
193,935 UART:
194,096 UART: [state] CFI Enabled
263,253 UART: [state] LifecycleState = Unprovisioned
265,253 UART: [state] DebugLocked = No
267,151 UART: [state] WD Timer not started. Device not locked for debugging
270,585 UART: [kat] SHA2-256
450,249 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,002 UART: [kat] ++
461,491 UART: [kat] sha1
474,076 UART: [kat] SHA2-256
476,793 UART: [kat] SHA2-384
483,258 UART: [kat] SHA2-512-ACC
485,645 UART: [kat] ECC-384
2,949,661 UART: [kat] HMAC-384Kdf
2,971,575 UART: [kat] LMS
3,448,065 UART: [kat] --
3,453,060 UART: [cold-reset] ++
3,455,358 UART: [fht] FHT @ 0x50003400
3,467,908 UART: [idev] ++
3,468,486 UART: [idev] CDI.KEYID = 6
3,469,402 UART: [idev] SUBJECT.KEYID = 7
3,470,678 UART: [idev] UDS.KEYID = 0
3,471,618 ready_for_fw is high
3,471,821 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,622,015 UART: [idev] Erasing UDS.KEYID = 0
5,984,704 UART: [idev] Sha1 KeyId Algorithm
6,009,683 UART: [idev] --
6,015,717 UART: [ldev] ++
6,016,306 UART: [ldev] CDI.KEYID = 6
6,017,377 UART: [ldev] SUBJECT.KEYID = 5
6,018,490 UART: [ldev] AUTHORITY.KEYID = 7
6,019,673 UART: [ldev] FE.KEYID = 1
6,058,798 UART: [ldev] Erasing FE.KEYID = 1
8,565,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,259 UART: [ldev] --
10,376,908 UART: [fwproc] Wait for Commands...
10,379,018 UART: [fwproc] Recv command 0x46574c44
10,381,019 UART: [fwproc] Recv'd Img size: 119428 bytes
13,874,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,316 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,028,336 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,360,404 >>> mbox cmd response: success
14,363,982 UART: [afmc] ++
14,364,580 UART: [afmc] CDI.KEYID = 6
14,365,550 UART: [afmc] SUBJECT.KEYID = 7
14,366,713 UART: [afmc] AUTHORITY.KEYID = 5
16,897,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,673 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,456 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,527 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,064 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,931 UART: [afmc] --
18,716,593 UART: [cold-reset] --
18,720,770 UART: [state] Locking Datavault
18,725,502 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,259 UART: [state] Locking ICCM
18,728,361 UART: [exit] Launching FMC @ 0x40000130
18,736,761 UART:
18,737,003 UART: Running Caliptra FMC ...
18,738,119 UART:
18,738,287 UART: [state] CFI Enabled
18,797,512 UART: [fht] FMC Alias Private Key: 7
20,563,711 UART: [art] Extend RT PCRs Done
20,564,929 UART: [art] Lock RT PCRs Done
20,566,961 UART: [art] Populate DV Done
20,572,436 UART: [fht] FMC Alias Private Key: 7
20,574,141 UART: [art] Derive CDI
20,574,968 UART: [art] Store in slot 0x4
20,630,556 UART: [art] Derive Key Pair
20,631,566 UART: [art] Store priv key in slot 0x5
23,094,170 UART: [art] Derive Key Pair - Done
23,106,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,739 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,251 UART: [art] PUB.X = BEFB4A95BDBD39D953193268F4DBB7CC5D144F1E9A469CF99A641A2CC4EBE3BE9BD5389E480DABD5CCAA30BCB3CDB355
24,829,526 UART: [art] PUB.Y = 6CE59742671A5BB6C0DEC587422D9A090DE3B619F843205473CF2D6B021AD87D6533546EECFC671669AEBC9962782A1E
24,836,792 UART: [art] SIG.R = F44F3C5F51ADFE065BD521E6CB114643630858E55ECD3B1A05FFEC53BE1281C291CC0859FEB440C797B120CBE4226930
24,844,167 UART: [art] SIG.S = 4691774C8C0C364E03D4BD910EA86A8CAAEEC3344B63CE72111C4B9F18969883B5DD2077C2F111C45A0DC1ECEFB5454A
25,824,121 UART: Caliptra RT
25,824,834 UART: [state] CFI Enabled
26,004,005 UART: [rt] RT listening for mailbox commands...
26,005,889 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,035,635 UART: [rt]cmd =0x46504c54, len=4
26,037,441 >>> mbox cmd response data (8 bytes)
26,038,400 UART: [rt] FIPS self test
26,039,353 UART: [kat] ++
26,039,810 UART: [kat] sha1
26,044,328 UART: [kat] SHA2-256
26,046,261 UART: [kat] SHA2-384
26,049,117 UART: [kat] SHA2-512-ACC
26,051,358 UART: [kat] ECC-384
28,495,133 UART: [kat] HMAC-384Kdf
28,496,387 UART: Fatal Error: 0x90030001
28,531,617 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,681,627 >>> mbox cmd response: failed
28,682,306 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,832,244 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
189,996 UART:
190,283 UART: Running Caliptra ROM ...
191,316 UART:
191,459 UART: [state] CFI Enabled
251,228 UART: [state] LifecycleState = Unprovisioned
253,145 UART: [state] DebugLocked = No
254,983 UART: [state] WD Timer not started. Device not locked for debugging
258,924 UART: [kat] SHA2-256
438,590 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
449,374 UART: [kat] ++
449,823 UART: [kat] sha1
460,699 UART: [kat] SHA2-256
463,384 UART: [kat] SHA2-384
469,638 UART: [kat] SHA2-512-ACC
471,999 UART: [kat] ECC-384
2,934,192 UART: [kat] HMAC-384Kdf
2,956,696 UART: [kat] LMS
3,433,190 UART: [kat] --
3,438,800 UART: [cold-reset] ++
3,440,247 UART: [fht] FHT @ 0x50003400
3,452,304 UART: [idev] ++
3,452,872 UART: [idev] CDI.KEYID = 6
3,453,895 UART: [idev] SUBJECT.KEYID = 7
3,455,059 UART: [idev] UDS.KEYID = 0
3,456,693 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,606,927 UART: [idev] Erasing UDS.KEYID = 0
5,975,292 UART: [idev] Sha1 KeyId Algorithm
5,998,264 UART: [idev] --
6,001,993 UART: [ldev] ++
6,002,573 UART: [ldev] CDI.KEYID = 6
6,003,487 UART: [ldev] SUBJECT.KEYID = 5
6,004,716 UART: [ldev] AUTHORITY.KEYID = 7
6,005,961 UART: [ldev] FE.KEYID = 1
6,043,470 UART: [ldev] Erasing FE.KEYID = 1
8,549,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,285,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,301,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,317,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,332,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,354,434 UART: [ldev] --
10,359,976 UART: [fwproc] Wait for Commands...
10,362,343 UART: [fwproc] Recv command 0x46574c44
10,364,370 UART: [fwproc] Recv'd Img size: 119428 bytes
13,859,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,123 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,007,149 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,338,806 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,462,702 ready_for_fw is high
3,463,191 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,261,113 >>> mbox cmd response: success
18,556,348 UART:
18,556,761 UART: Running Caliptra FMC ...
18,557,922 UART:
18,558,088 UART: [state] CFI Enabled
18,625,989 UART: [fht] FMC Alias Private Key: 7
20,412,819 UART: [art] Extend RT PCRs Done
20,414,052 UART: [art] Lock RT PCRs Done
20,415,634 UART: [art] Populate DV Done
20,421,024 UART: [fht] FMC Alias Private Key: 7
20,422,635 UART: [art] Derive CDI
20,423,459 UART: [art] Store in slot 0x4
20,479,312 UART: [art] Derive Key Pair
20,480,315 UART: [art] Store priv key in slot 0x5
22,943,376 UART: [art] Derive Key Pair - Done
22,956,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,523 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,033 UART: [art] PUB.X = 22C96BBF886EF5487939AA7C2937B9C10301028704150AFCE3415DF4102FE7AD44604D8A77A575B5FC299FD68A422C38
24,678,266 UART: [art] PUB.Y = ABB49B87862E5356C67BCD2D2DABC0DE5F5EF6C7F19C7F7D9E9178050C25A2FA0900299B9AFE24CDDEF5F8DF45647776
24,685,520 UART: [art] SIG.R = 6646B959CBCA9E5ABBE1A4D46CACCB3332C240D21253823E3FA7A7E042F7226A9FF5E5DD95D036F809B4924D8CF13E98
24,692,934 UART: [art] SIG.S = 287CF9C58C82B466DCE6D180A5B639DC9DA76211798C53092E426625ECED0453AFA1F05F7DA49F17249A3C758AE8ED4C
25,671,953 UART: Caliptra RT
25,672,657 UART: [state] CFI Enabled
25,852,136 UART: [rt] RT listening for mailbox commands...
25,854,474 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,884,501 UART: [rt]cmd =0x46504c54, len=4
25,886,087 >>> mbox cmd response data (8 bytes)
25,887,422 UART: [rt] FIPS self test
25,888,372 UART: [kat] ++
25,888,831 UART: [kat] sha1
25,893,240 UART: [kat] SHA2-256
25,895,120 UART: [kat] SHA2-384
25,898,090 UART: [kat] SHA2-512-ACC
25,900,393 UART: [kat] ECC-384
28,344,093 UART: [kat] HMAC-384Kdf
28,345,606 UART: Fatal Error: 0x90030001
28,380,886 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,530,872 >>> mbox cmd response: failed
28,531,517 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,681,492 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,449,019 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,271,121 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,633 UART:
193,027 UART: Running Caliptra ROM ...
194,245 UART:
603,870 UART: [state] CFI Enabled
619,817 UART: [state] LifecycleState = Unprovisioned
621,715 UART: [state] DebugLocked = No
624,106 UART: [state] WD Timer not started. Device not locked for debugging
628,593 UART: [kat] SHA2-256
808,288 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,080 UART: [kat] ++
819,571 UART: [kat] sha1
830,399 UART: [kat] SHA2-256
833,062 UART: [kat] SHA2-384
839,276 UART: [kat] SHA2-512-ACC
841,590 UART: [kat] ECC-384
3,282,392 UART: [kat] HMAC-384Kdf
3,294,350 UART: [kat] LMS
3,770,895 UART: [kat] --
3,774,117 UART: [cold-reset] ++
3,776,060 UART: [fht] FHT @ 0x50003400
3,786,912 UART: [idev] ++
3,787,483 UART: [idev] CDI.KEYID = 6
3,788,521 UART: [idev] SUBJECT.KEYID = 7
3,789,706 UART: [idev] UDS.KEYID = 0
3,790,641 ready_for_fw is high
3,790,856 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,940,807 UART: [idev] Erasing UDS.KEYID = 0
6,267,899 UART: [idev] Sha1 KeyId Algorithm
6,291,373 UART: [idev] --
6,297,188 UART: [ldev] ++
6,297,770 UART: [ldev] CDI.KEYID = 6
6,298,688 UART: [ldev] SUBJECT.KEYID = 5
6,299,908 UART: [ldev] AUTHORITY.KEYID = 7
6,301,153 UART: [ldev] FE.KEYID = 1
6,313,479 UART: [ldev] Erasing FE.KEYID = 1
8,791,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,512 UART: [ldev] --
10,586,186 UART: [fwproc] Wait for Commands...
10,589,375 UART: [fwproc] Recv command 0x46574c44
10,591,385 UART: [fwproc] Recv'd Img size: 119428 bytes
14,092,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,227 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,247,245 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,578,370 >>> mbox cmd response: success
14,583,155 UART: [afmc] ++
14,583,741 UART: [afmc] CDI.KEYID = 6
14,584,767 UART: [afmc] SUBJECT.KEYID = 7
14,585,876 UART: [afmc] AUTHORITY.KEYID = 5
17,090,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,812,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,814,416 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,830,218 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,846,305 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,861,885 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,887,257 UART: [afmc] --
18,890,872 UART: [cold-reset] --
18,894,960 UART: [state] Locking Datavault
18,900,426 UART: [state] Locking PCR0, PCR1 and PCR31
18,902,129 UART: [state] Locking ICCM
18,904,584 UART: [exit] Launching FMC @ 0x40000130
18,913,032 UART:
18,913,279 UART: Running Caliptra FMC ...
18,914,311 UART:
18,914,461 UART: [state] CFI Enabled
18,922,566 UART: [fht] FMC Alias Private Key: 7
20,689,588 UART: [art] Extend RT PCRs Done
20,690,835 UART: [art] Lock RT PCRs Done
20,692,332 UART: [art] Populate DV Done
20,698,021 UART: [fht] FMC Alias Private Key: 7
20,699,572 UART: [art] Derive CDI
20,700,395 UART: [art] Store in slot 0x4
20,742,907 UART: [art] Derive Key Pair
20,743,907 UART: [art] Store priv key in slot 0x5
23,171,107 UART: [art] Derive Key Pair - Done
23,184,108 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,891,104 UART: [art] Erasing AUTHORITY.KEYID = 7
24,892,620 UART: [art] PUB.X = B7AFE29E02BB76E82F76F16EAFAFA972A463A0FD716C422E450570405FE6957B4075DBFAD12712C21EC0EFDCC6C31FC5
24,899,879 UART: [art] PUB.Y = 8A07549F34C8EEA7797898201448C4D13F5C265E3965B355A54190E8F7A7CA2FAA5740D2FC633BD49B8274664DBE80CC
24,907,180 UART: [art] SIG.R = 49E42B2E5B65008D95D4D9C67E58E9E02F6B90FA6A9239A380D8F47C450E59974256F0F1613F9E32D6525D53678A26ED
24,914,538 UART: [art] SIG.S = 61BE45046370EAE2A2BCDF590A3EDC50F762796B3F3BF09B9DF296D43A5038C0303A9072582D08FD24C816E010518076
25,892,675 UART: Caliptra RT
25,893,376 UART: [state] CFI Enabled
26,026,007 UART: [rt] RT listening for mailbox commands...
26,027,866 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,057,664 UART: [rt]cmd =0x46504c54, len=4
26,059,441 >>> mbox cmd response data (8 bytes)
26,060,468 UART: [rt] FIPS self test
26,061,441 UART: [kat] ++
26,061,897 UART: [kat] sha1
26,066,087 UART: [kat] SHA2-256
26,067,966 UART: [kat] SHA2-384
26,071,071 UART: [kat] SHA2-512-ACC
26,073,363 UART: [kat] ECC-384
28,501,067 UART: [kat] HMAC-384Kdf
28,502,383 UART: Fatal Error: 0x90030001
28,537,687 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,687,667 >>> mbox cmd response: failed
28,688,320 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,838,048 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,130 UART:
190,425 UART: Running Caliptra ROM ...
191,499 UART:
11,682,063 UART: [state] CFI Enabled
11,695,567 UART: [state] LifecycleState = Unprovisioned
11,697,515 UART: [state] DebugLocked = No
11,699,484 UART: [state] WD Timer not started. Device not locked for debugging
11,702,738 UART: [kat] SHA2-256
11,882,341 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,893,132 UART: [kat] ++
11,893,593 UART: [kat] sha1
11,904,156 UART: [kat] SHA2-256
11,906,858 UART: [kat] SHA2-384
11,913,282 UART: [kat] SHA2-512-ACC
11,915,633 UART: [kat] ECC-384
14,356,790 UART: [kat] HMAC-384Kdf
14,368,155 UART: [kat] LMS
14,844,661 UART: [kat] --
14,848,457 UART: [cold-reset] ++
14,850,669 UART: [fht] FHT @ 0x50003400
14,860,678 UART: [idev] ++
14,861,246 UART: [idev] CDI.KEYID = 6
14,862,211 UART: [idev] SUBJECT.KEYID = 7
14,863,426 UART: [idev] UDS.KEYID = 0
14,865,077 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,015,000 UART: [idev] Erasing UDS.KEYID = 0
17,340,044 UART: [idev] Sha1 KeyId Algorithm
17,363,237 UART: [idev] --
17,367,772 UART: [ldev] ++
17,368,383 UART: [ldev] CDI.KEYID = 6
17,369,304 UART: [ldev] SUBJECT.KEYID = 5
17,370,469 UART: [ldev] AUTHORITY.KEYID = 7
17,371,756 UART: [ldev] FE.KEYID = 1
17,382,402 UART: [ldev] Erasing FE.KEYID = 1
19,861,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,580,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,596,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,612,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,627,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,649,216 UART: [ldev] --
21,654,855 UART: [fwproc] Wait for Commands...
21,656,577 UART: [fwproc] Recv command 0x46574c44
21,658,569 UART: [fwproc] Recv'd Img size: 119428 bytes
25,152,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,235,699 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,308,714 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,640,209 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,436 writing to cptra_bootfsm_go
3,776,920 ready_for_fw is high
3,777,310 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,476,098 >>> mbox cmd response: success
18,721,465 UART:
18,721,857 UART: Running Caliptra FMC ...
18,722,985 UART:
18,723,146 UART: [state] CFI Enabled
18,730,884 UART: [fht] FMC Alias Private Key: 7
20,496,471 UART: [art] Extend RT PCRs Done
20,497,702 UART: [art] Lock RT PCRs Done
20,499,356 UART: [art] Populate DV Done
20,504,628 UART: [fht] FMC Alias Private Key: 7
20,506,284 UART: [art] Derive CDI
20,507,031 UART: [art] Store in slot 0x4
20,550,039 UART: [art] Derive Key Pair
20,551,094 UART: [art] Store priv key in slot 0x5
22,977,764 UART: [art] Derive Key Pair - Done
22,990,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,696,596 UART: [art] Erasing AUTHORITY.KEYID = 7
24,698,103 UART: [art] PUB.X = 309245CDD6B3763F74F4A6A7FE9D9A204CB3772822D15F06C07DF1A08CD3F71498454347C77976AD320059FD72707322
24,705,327 UART: [art] PUB.Y = F0704E7DD3CCB0458D55FE920E41EA5EBE604C057D761831C288438156FB85DC4E935C735C2AF166A66D8939F696F3AE
24,712,587 UART: [art] SIG.R = 21AABD3356EC8DE52659782CF128DA8F77C56C14F8D5974F345F7B0A4936509ACD49A6453B059F17ABCE39BC8DA51C28
24,719,994 UART: [art] SIG.S = 32744E856E53A74ED66C4A39E0F8A2DFAAE9F5D63D458DA4351B9EF1418BE5FA6C59269D4E43AD259F53677058D143F4
25,698,473 UART: Caliptra RT
25,699,188 UART: [state] CFI Enabled
25,832,489 UART: [rt] RT listening for mailbox commands...
25,834,346 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,864,075 UART: [rt]cmd =0x46504c54, len=4
25,865,493 >>> mbox cmd response data (8 bytes)
25,867,026 UART: [rt] FIPS self test
25,867,997 UART: [kat] ++
25,868,449 UART: [kat] sha1
25,872,694 UART: [kat] SHA2-256
25,874,627 UART: [kat] SHA2-384
25,877,540 UART: [kat] SHA2-512-ACC
25,879,831 UART: [kat] ECC-384
28,307,271 UART: [kat] HMAC-384Kdf
28,308,972 UART: Fatal Error: 0x90030001
28,344,060 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,494,015 >>> mbox cmd response: failed
28,494,645 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,644,526 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
15,063,089 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,747,427 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,281 UART:
192,644 UART: Running Caliptra ROM ...
193,835 UART:
193,994 UART: [state] CFI Enabled
265,663 UART: [state] LifecycleState = Unprovisioned
268,081 UART: [state] DebugLocked = No
270,128 UART: [state] WD Timer not started. Device not locked for debugging
274,818 UART: [kat] SHA2-256
464,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,438 UART: [kat] ++
475,977 UART: [kat] sha1
487,220 UART: [kat] SHA2-256
490,308 UART: [kat] SHA2-384
496,608 UART: [kat] SHA2-512-ACC
499,201 UART: [kat] ECC-384
2,946,112 UART: [kat] HMAC-384Kdf
2,970,495 UART: [kat] LMS
3,502,295 UART: [kat] --
3,506,493 UART: [cold-reset] ++
3,508,433 UART: [fht] FHT @ 0x50003400
3,520,698 UART: [idev] ++
3,521,415 UART: [idev] CDI.KEYID = 6
3,522,376 UART: [idev] SUBJECT.KEYID = 7
3,523,555 UART: [idev] UDS.KEYID = 0
3,524,465 ready_for_fw is high
3,524,673 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,675,062 UART: [idev] Erasing UDS.KEYID = 0
6,026,261 UART: [idev] Sha1 KeyId Algorithm
6,049,341 UART: [idev] --
6,053,036 UART: [ldev] ++
6,053,728 UART: [ldev] CDI.KEYID = 6
6,054,618 UART: [ldev] SUBJECT.KEYID = 5
6,055,858 UART: [ldev] AUTHORITY.KEYID = 7
6,057,037 UART: [ldev] FE.KEYID = 1
6,099,670 UART: [ldev] Erasing FE.KEYID = 1
8,606,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,576 UART: [ldev] --
10,413,821 UART: [fwproc] Wait for Commands...
10,415,655 UART: [fwproc] Recv command 0x46574c44
10,417,973 UART: [fwproc] Recv'd Img size: 119428 bytes
13,924,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,221 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,857 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,690,357 >>> mbox cmd response: success
14,693,955 UART: [afmc] ++
14,694,662 UART: [afmc] CDI.KEYID = 6
14,695,854 UART: [afmc] SUBJECT.KEYID = 7
14,697,346 UART: [afmc] AUTHORITY.KEYID = 5
17,236,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,119 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,200 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,325 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,231 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,046 UART: [afmc] --
19,035,176 UART: [cold-reset] --
19,038,247 UART: [state] Locking Datavault
19,042,825 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,971 UART: [state] Locking ICCM
19,047,650 UART: [exit] Launching FMC @ 0x40000130
19,056,319 UART:
19,056,562 UART: Running Caliptra FMC ...
19,057,592 UART:
19,057,743 UART: [state] CFI Enabled
19,116,059 UART: [fht] FMC Alias Private Key: 7
20,882,343 UART: [art] Extend RT PCRs Done
20,883,561 UART: [art] Lock RT PCRs Done
20,885,311 UART: [art] Populate DV Done
20,890,997 UART: [fht] FMC Alias Private Key: 7
20,892,697 UART: [art] Derive CDI
20,893,443 UART: [art] Store in slot 0x4
20,949,620 UART: [art] Derive Key Pair
20,950,669 UART: [art] Store priv key in slot 0x5
23,413,570 UART: [art] Derive Key Pair - Done
23,426,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,651 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,164 UART: [art] PUB.X = 06593151F6DD74FAEC6D4DE17514D0AF1F6A506F8FD8AFB56AB67719B903584FF42114E4A6AA827A6486650AFCCCE67E
25,147,431 UART: [art] PUB.Y = 4EA6E6C4B01017BC2F46673BD58B06A7547753C21D3DC7FD7B6B075B0F9A265E3D22C8AC0E807270080BCC295BEDCC90
25,154,737 UART: [art] SIG.R = 786F668EEF2FA0EC4FF7D0A6F66740DC0BE312E13DE7C64683A3A79EB9EE390246A67D18C77AD3A4D9B713BF6B5BA4C2
25,162,142 UART: [art] SIG.S = B6A939CE25B5C7B5EA6749EBB236D55384B5DED88FE312263BA12E91DA4DECA33ACD17C791112108BCE39CEF0636B9B8
26,141,225 UART: Caliptra RT
26,141,915 UART: [state] CFI Enabled
26,323,012 UART: [rt] RT listening for mailbox commands...
26,324,872 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,354,804 UART: [rt]cmd =0x46504c54, len=4
26,356,281 >>> mbox cmd response data (8 bytes)
26,357,351 UART: [rt] FIPS self test
26,358,296 UART: [kat] ++
26,358,749 UART: [kat] sha1
26,363,124 UART: [kat] SHA2-256
26,365,058 UART: [kat] SHA2-384
26,367,914 UART: [kat] SHA2-512-ACC
26,370,156 UART: [kat] ECC-384
28,814,488 UART: [kat] HMAC-384Kdf
28,815,859 UART: Fatal Error: 0x90030001
28,851,004 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,000,984 >>> mbox cmd response: failed
29,001,597 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,151,853 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
190,128 UART:
190,418 UART: Running Caliptra ROM ...
191,623 UART:
191,777 UART: [state] CFI Enabled
251,656 UART: [state] LifecycleState = Unprovisioned
254,043 UART: [state] DebugLocked = No
255,372 UART: [state] WD Timer not started. Device not locked for debugging
260,098 UART: [kat] SHA2-256
449,982 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
460,767 UART: [kat] ++
461,251 UART: [kat] sha1
472,675 UART: [kat] SHA2-256
475,687 UART: [kat] SHA2-384
481,245 UART: [kat] SHA2-512-ACC
483,807 UART: [kat] ECC-384
2,937,765 UART: [kat] HMAC-384Kdf
2,959,404 UART: [kat] LMS
3,491,200 UART: [kat] --
3,494,990 UART: [cold-reset] ++
3,497,200 UART: [fht] FHT @ 0x50003400
3,508,152 UART: [idev] ++
3,508,837 UART: [idev] CDI.KEYID = 6
3,509,855 UART: [idev] SUBJECT.KEYID = 7
3,511,021 UART: [idev] UDS.KEYID = 0
3,512,539 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,662,639 UART: [idev] Erasing UDS.KEYID = 0
6,017,054 UART: [idev] Sha1 KeyId Algorithm
6,038,774 UART: [idev] --
6,043,183 UART: [ldev] ++
6,043,883 UART: [ldev] CDI.KEYID = 6
6,044,772 UART: [ldev] SUBJECT.KEYID = 5
6,045,934 UART: [ldev] AUTHORITY.KEYID = 7
6,047,174 UART: [ldev] FE.KEYID = 1
6,088,314 UART: [ldev] Erasing FE.KEYID = 1
8,594,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,374,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,913 UART: [ldev] --
10,401,613 UART: [fwproc] Wait for Commands...
10,403,607 UART: [fwproc] Recv command 0x46574c44
10,405,922 UART: [fwproc] Recv'd Img size: 119428 bytes
13,913,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,054 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,633 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,683,641 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
3,437,089 ready_for_fw is high
3,437,527 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,809,686 >>> mbox cmd response: success
19,089,647 UART:
19,090,033 UART: Running Caliptra FMC ...
19,091,189 UART:
19,091,355 UART: [state] CFI Enabled
19,155,464 UART: [fht] FMC Alias Private Key: 7
20,922,042 UART: [art] Extend RT PCRs Done
20,923,263 UART: [art] Lock RT PCRs Done
20,924,893 UART: [art] Populate DV Done
20,930,368 UART: [fht] FMC Alias Private Key: 7
20,931,866 UART: [art] Derive CDI
20,932,630 UART: [art] Store in slot 0x4
20,988,693 UART: [art] Derive Key Pair
20,989,736 UART: [art] Store priv key in slot 0x5
23,452,525 UART: [art] Derive Key Pair - Done
23,465,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,178,846 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,346 UART: [art] PUB.X = 94835540AF975F504E5411C6D56DD4F046DAC63E25AA31F2D13F4B0F29DD11542A70A81148AAC3A48587FCC13D702A93
25,187,615 UART: [art] PUB.Y = 1343D29467F8015CF3B17CBA0AF995BEF3AB40B473A7D391A8DF76094FF90CD1103364FCA521A3167D51C8A0A8463767
25,194,858 UART: [art] SIG.R = 4CAD70D181D86DFD825D4B4F2FB296A5C8819C36EEC4F032CAAC00255DC5C7A1FA37C25349E5F96E088ABCD0303B0D59
25,202,273 UART: [art] SIG.S = 5611A41A7F1FDA7365379B2574A1286E70CA9598AB1350E2F005C51998B060DA4BE669C540095D7F6E97F30495278F74
26,181,049 UART: Caliptra RT
26,181,767 UART: [state] CFI Enabled
26,362,721 UART: [rt] RT listening for mailbox commands...
26,364,579 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,394,596 UART: [rt]cmd =0x46504c54, len=4
26,396,020 >>> mbox cmd response data (8 bytes)
26,397,229 UART: [rt] FIPS self test
26,398,207 UART: [kat] ++
26,398,670 UART: [kat] sha1
26,402,856 UART: [kat] SHA2-256
26,404,793 UART: [kat] SHA2-384
26,407,787 UART: [kat] SHA2-512-ACC
26,410,031 UART: [kat] ECC-384
28,854,205 UART: [kat] HMAC-384Kdf
28,855,634 UART: Fatal Error: 0x90030001
28,891,030 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,041,022 >>> mbox cmd response: failed
29,041,597 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,191,343 >>> mbox cmd response: failed
Initializing fuses
922 writing to cptra_bootfsm_go
3,428,163 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,821,084 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,510 UART:
192,883 UART: Running Caliptra ROM ...
194,077 UART:
603,866 UART: [state] CFI Enabled
616,815 UART: [state] LifecycleState = Unprovisioned
619,201 UART: [state] DebugLocked = No
620,532 UART: [state] WD Timer not started. Device not locked for debugging
624,581 UART: [kat] SHA2-256
814,409 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,212 UART: [kat] ++
825,745 UART: [kat] sha1
836,268 UART: [kat] SHA2-256
839,283 UART: [kat] SHA2-384
845,207 UART: [kat] SHA2-512-ACC
847,802 UART: [kat] ECC-384
3,291,103 UART: [kat] HMAC-384Kdf
3,304,654 UART: [kat] LMS
3,836,517 UART: [kat] --
3,841,655 UART: [cold-reset] ++
3,843,530 UART: [fht] FHT @ 0x50003400
3,853,951 UART: [idev] ++
3,854,592 UART: [idev] CDI.KEYID = 6
3,855,790 UART: [idev] SUBJECT.KEYID = 7
3,856,950 UART: [idev] UDS.KEYID = 0
3,857,869 ready_for_fw is high
3,858,117 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,008,027 UART: [idev] Erasing UDS.KEYID = 0
6,335,011 UART: [idev] Sha1 KeyId Algorithm
6,357,986 UART: [idev] --
6,363,666 UART: [ldev] ++
6,364,350 UART: [ldev] CDI.KEYID = 6
6,365,238 UART: [ldev] SUBJECT.KEYID = 5
6,366,456 UART: [ldev] AUTHORITY.KEYID = 7
6,367,642 UART: [ldev] FE.KEYID = 1
6,379,940 UART: [ldev] Erasing FE.KEYID = 1
8,856,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,207 UART: [ldev] --
10,648,115 UART: [fwproc] Wait for Commands...
10,650,163 UART: [fwproc] Recv command 0x46574c44
10,652,437 UART: [fwproc] Recv'd Img size: 119428 bytes
14,153,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,234,006 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,592 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,922,528 >>> mbox cmd response: success
14,926,529 UART: [afmc] ++
14,927,232 UART: [afmc] CDI.KEYID = 6
14,928,405 UART: [afmc] SUBJECT.KEYID = 7
14,929,894 UART: [afmc] AUTHORITY.KEYID = 5
17,436,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,159,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,161,274 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,176,344 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,191,501 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,206,465 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,231,797 UART: [afmc] --
19,235,999 UART: [cold-reset] --
19,240,305 UART: [state] Locking Datavault
19,246,695 UART: [state] Locking PCR0, PCR1 and PCR31
19,248,891 UART: [state] Locking ICCM
19,250,451 UART: [exit] Launching FMC @ 0x40000130
19,259,128 UART:
19,259,369 UART: Running Caliptra FMC ...
19,260,473 UART:
19,260,634 UART: [state] CFI Enabled
19,268,627 UART: [fht] FMC Alias Private Key: 7
21,034,815 UART: [art] Extend RT PCRs Done
21,036,038 UART: [art] Lock RT PCRs Done
21,037,786 UART: [art] Populate DV Done
21,043,053 UART: [fht] FMC Alias Private Key: 7
21,044,726 UART: [art] Derive CDI
21,045,473 UART: [art] Store in slot 0x4
21,088,180 UART: [art] Derive Key Pair
21,089,228 UART: [art] Store priv key in slot 0x5
23,516,295 UART: [art] Derive Key Pair - Done
23,529,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,235,598 UART: [art] Erasing AUTHORITY.KEYID = 7
25,237,107 UART: [art] PUB.X = 699CE83894064EFA121CB05A3C5D8886CEA4A82F278B66955CD5C76846E8E3E1545CC8C4056A47852444F03DE512E390
25,244,405 UART: [art] PUB.Y = 045C12DF8187111190F2D0B8EACDD2842B80FF825C5ABF8324BE86EAABD99FE587ACD83E3B356C5618A57072369F5D30
25,251,632 UART: [art] SIG.R = 1E363DCE69595ECD593AF2E1160E10855EC21ABF1581F5F1F5B7D1E8195B9D68D34CD59EB9C655B880503B622CFA693D
25,259,026 UART: [art] SIG.S = BE58A437147B13BBDF1FE779975360873BBE7478043E013FFADC198C55572947B957926CF5EE5CF949D311AD9C383C40
26,237,931 UART: Caliptra RT
26,238,621 UART: [state] CFI Enabled
26,372,786 UART: [rt] RT listening for mailbox commands...
26,374,640 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,404,454 UART: [rt]cmd =0x46504c54, len=4
26,406,107 >>> mbox cmd response data (8 bytes)
26,407,605 UART: [rt] FIPS self test
26,408,550 UART: [kat] ++
26,409,002 UART: [kat] sha1
26,413,251 UART: [kat] SHA2-256
26,415,179 UART: [kat] SHA2-384
26,418,209 UART: [kat] SHA2-512-ACC
26,420,476 UART: [kat] ECC-384
28,847,954 UART: [kat] HMAC-384Kdf
28,849,548 UART: Fatal Error: 0x90030001
28,884,783 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,034,862 >>> mbox cmd response: failed
29,035,462 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,185,728 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
190,131 UART:
190,418 UART: Running Caliptra ROM ...
191,475 UART:
11,345,598 UART: [state] CFI Enabled
11,356,709 UART: [state] LifecycleState = Unprovisioned
11,359,063 UART: [state] DebugLocked = No
11,361,650 UART: [state] WD Timer not started. Device not locked for debugging
11,365,845 UART: [kat] SHA2-256
11,555,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,566,551 UART: [kat] ++
11,567,094 UART: [kat] sha1
11,578,918 UART: [kat] SHA2-256
11,581,936 UART: [kat] SHA2-384
11,589,276 UART: [kat] SHA2-512-ACC
11,591,859 UART: [kat] ECC-384
14,033,207 UART: [kat] HMAC-384Kdf
14,047,613 UART: [kat] LMS
14,579,427 UART: [kat] --
14,584,619 UART: [cold-reset] ++
14,586,019 UART: [fht] FHT @ 0x50003400
14,598,533 UART: [idev] ++
14,599,251 UART: [idev] CDI.KEYID = 6
14,600,170 UART: [idev] SUBJECT.KEYID = 7
14,601,387 UART: [idev] UDS.KEYID = 0
14,602,909 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,752,837 UART: [idev] Erasing UDS.KEYID = 0
17,072,359 UART: [idev] Sha1 KeyId Algorithm
17,096,030 UART: [idev] --
17,100,793 UART: [ldev] ++
17,101,475 UART: [ldev] CDI.KEYID = 6
17,102,400 UART: [ldev] SUBJECT.KEYID = 5
17,103,560 UART: [ldev] AUTHORITY.KEYID = 7
17,104,816 UART: [ldev] FE.KEYID = 1
17,114,927 UART: [ldev] Erasing FE.KEYID = 1
19,595,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,314,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,330,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,345,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,360,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,382,443 UART: [ldev] --
21,387,068 UART: [fwproc] Wait for Commands...
21,389,602 UART: [fwproc] Recv command 0x46574c44
21,391,955 UART: [fwproc] Recv'd Img size: 119428 bytes
24,895,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,978,002 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,101,573 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,667,349 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,755,293 ready_for_fw is high
3,755,762 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,049,366 >>> mbox cmd response: success
19,301,594 UART:
19,302,010 UART: Running Caliptra FMC ...
19,303,120 UART:
19,303,282 UART: [state] CFI Enabled
19,311,295 UART: [fht] FMC Alias Private Key: 7
21,078,080 UART: [art] Extend RT PCRs Done
21,079,301 UART: [art] Lock RT PCRs Done
21,080,686 UART: [art] Populate DV Done
21,086,050 UART: [fht] FMC Alias Private Key: 7
21,087,652 UART: [art] Derive CDI
21,088,397 UART: [art] Store in slot 0x4
21,131,275 UART: [art] Derive Key Pair
21,132,277 UART: [art] Store priv key in slot 0x5
23,558,992 UART: [art] Derive Key Pair - Done
23,572,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,674 UART: [art] Erasing AUTHORITY.KEYID = 7
25,280,183 UART: [art] PUB.X = 2DB314EEA61FE71E2274BDEE8762A5ED79E8968E3372BC39EAFAD5973B782389E42B55D06F46649314CD932A48C704BB
25,287,412 UART: [art] PUB.Y = 441E15EE9D09C3BF57F9B2CF176B7B6FC2CB877FD0A956132914073C317C85C81A73F83B5A97DBE36225718BE9AEB671
25,294,677 UART: [art] SIG.R = 6622B73B318E70F66422040F2AA2AB1632A9FFABA739B9741D2FA7D38C19237AFDE518A5B599982175B44E14A047B366
25,302,049 UART: [art] SIG.S = CD15E477E8944C27184BD7C5029DA21CE030B7EB8B045949D9243EC993E9021CE89D6F910C94FD0769D3464386BF1317
26,280,693 UART: Caliptra RT
26,281,419 UART: [state] CFI Enabled
26,414,630 UART: [rt] RT listening for mailbox commands...
26,416,483 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,446,220 UART: [rt]cmd =0x46504c54, len=4
26,447,995 >>> mbox cmd response data (8 bytes)
26,449,041 UART: [rt] FIPS self test
26,449,993 UART: [kat] ++
26,450,446 UART: [kat] sha1
26,454,795 UART: [kat] SHA2-256
26,456,691 UART: [kat] SHA2-384
26,459,521 UART: [kat] SHA2-512-ACC
26,461,811 UART: [kat] ECC-384
28,889,357 UART: [kat] HMAC-384Kdf
28,890,681 UART: Fatal Error: 0x90030001
28,925,983 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,075,873 >>> mbox cmd response: failed
29,076,488 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,226,428 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
14,448,779 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,756,590 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,313 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,887 UART: [kat] SHA2-256
881,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,933 UART: [kat] ++
886,085 UART: [kat] sha1
890,453 UART: [kat] SHA2-256
892,391 UART: [kat] SHA2-384
895,260 UART: [kat] SHA2-512-ACC
897,161 UART: [kat] ECC-384
902,510 UART: [kat] HMAC-384Kdf
907,078 UART: [kat] LMS
1,475,274 UART: [kat] --
1,475,987 UART: [cold-reset] ++
1,476,549 UART: [fht] Storing FHT @ 0x50003400
1,479,382 UART: [idev] ++
1,479,550 UART: [idev] CDI.KEYID = 6
1,479,910 UART: [idev] SUBJECT.KEYID = 7
1,480,334 UART: [idev] UDS.KEYID = 0
1,480,679 ready_for_fw is high
1,480,679 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,560 UART: [idev] Erasing UDS.KEYID = 0
1,505,288 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,988 UART: [idev] --
1,515,249 UART: [ldev] ++
1,515,417 UART: [ldev] CDI.KEYID = 6
1,515,780 UART: [ldev] SUBJECT.KEYID = 5
1,516,206 UART: [ldev] AUTHORITY.KEYID = 7
1,516,669 UART: [ldev] FE.KEYID = 1
1,521,857 UART: [ldev] Erasing FE.KEYID = 1
1,547,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,674 UART: [ldev] --
1,586,051 UART: [fwproc] Waiting for Commands...
1,586,910 UART: [fwproc] Received command 0x46574c44
1,587,701 UART: [fwproc] Received Image of size 119428 bytes
2,942,251 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,123 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,341 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,856 >>> mbox cmd response: success
3,143,878 UART: [afmc] ++
3,144,046 UART: [afmc] CDI.KEYID = 6
3,144,408 UART: [afmc] SUBJECT.KEYID = 7
3,144,833 UART: [afmc] AUTHORITY.KEYID = 5
3,179,494 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,762 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,542 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,251 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,134 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,817 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,715 UART: [afmc] --
3,222,663 UART: [cold-reset] --
3,223,637 UART: [state] Locking Datavault
3,224,902 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,506 UART: [state] Locking ICCM
3,226,006 UART: [exit] Launching FMC @ 0x40000130
3,231,336 UART:
3,231,352 UART: Running Caliptra FMC ...
3,231,760 UART:
3,231,814 UART: [state] CFI Enabled
3,242,266 UART: [fht] FMC Alias Private Key: 7
3,361,786 UART: [art] Extend RT PCRs Done
3,362,214 UART: [art] Lock RT PCRs Done
3,363,860 UART: [art] Populate DV Done
3,372,017 UART: [fht] FMC Alias Private Key: 7
3,372,977 UART: [art] Derive CDI
3,373,257 UART: [art] Store in slot 0x4
3,458,325 UART: [art] Derive Key Pair
3,458,685 UART: [art] Store priv key in slot 0x5
3,472,074 UART: [art] Derive Key Pair - Done
3,486,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,227 UART: [art] PUB.X = EFDEBF2D0D49BFC596B42C5282D5433CB9D46F324CFF20E01B03D22B3B9D09CC169B65B6B6229D051FA5BADB363A9176
3,510,003 UART: [art] PUB.Y = 800714737960342DCD4C5780CD711FAFD6B170CEC605E4A2CA1E7E513948484B307047D4F17906BE1FB5270EC325D6F3
3,516,941 UART: [art] SIG.R = FCCE4A1FDD0111DFC26E4C5AB06ACC4BDBEF1179694BE9371E5D4591E0F92DD7E5F470F740F0751F6339F2A928E45F81
3,523,726 UART: [art] SIG.S = 581A1A0FAE171715D1E129A9B46D0540A1557F0E4700DFBDD157053C7ECCF44EC003844100A8FB3B4BEEF5F73E1F11D2
3,547,257 UART: Caliptra RT
3,547,508 UART: [state] CFI Enabled
3,667,646 UART: [rt] RT listening for mailbox commands...
3,668,309 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,396 UART: [rt]cmd =0x46504c54, len=4
3,699,472 >>> mbox cmd response data (8 bytes)
3,699,649 UART: [rt] FIPS self test
3,699,977 UART: [kat] ++
3,700,129 UART: [kat] sha1
3,704,359 UART: [kat] SHA2-256
3,706,381 UART: [kat] SHA2-384
3,709,218 UART: [kat] SHA2-512-ACC
3,711,145 UART: [kat] ECC-384
3,721,557 UART: [kat] HMAC-384Kdf
3,722,567 UART: Fatal Error: 0x90030001
3,724,106 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,724,111 >>> mbox cmd response: failed
3,724,111 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,724,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,799 UART: [kat] SHA2-256
881,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,845 UART: [kat] ++
885,997 UART: [kat] sha1
890,343 UART: [kat] SHA2-256
892,281 UART: [kat] SHA2-384
894,920 UART: [kat] SHA2-512-ACC
896,821 UART: [kat] ECC-384
902,224 UART: [kat] HMAC-384Kdf
906,782 UART: [kat] LMS
1,474,978 UART: [kat] --
1,476,115 UART: [cold-reset] ++
1,476,663 UART: [fht] Storing FHT @ 0x50003400
1,479,570 UART: [idev] ++
1,479,738 UART: [idev] CDI.KEYID = 6
1,480,098 UART: [idev] SUBJECT.KEYID = 7
1,480,522 UART: [idev] UDS.KEYID = 0
1,480,867 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,474 UART: [idev] Erasing UDS.KEYID = 0
1,505,008 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,576 UART: [idev] --
1,514,633 UART: [ldev] ++
1,514,801 UART: [ldev] CDI.KEYID = 6
1,515,164 UART: [ldev] SUBJECT.KEYID = 5
1,515,590 UART: [ldev] AUTHORITY.KEYID = 7
1,516,053 UART: [ldev] FE.KEYID = 1
1,521,193 UART: [ldev] Erasing FE.KEYID = 1
1,546,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,458 UART: [ldev] --
1,585,871 UART: [fwproc] Waiting for Commands...
1,586,730 UART: [fwproc] Received command 0x46574c44
1,587,521 UART: [fwproc] Received Image of size 119428 bytes
2,942,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,855 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,073 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,796 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,773 ready_for_fw is high
1,362,773 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,728 >>> mbox cmd response: success
3,051,765 UART:
3,051,781 UART: Running Caliptra FMC ...
3,052,189 UART:
3,052,243 UART: [state] CFI Enabled
3,062,897 UART: [fht] FMC Alias Private Key: 7
3,182,429 UART: [art] Extend RT PCRs Done
3,182,857 UART: [art] Lock RT PCRs Done
3,184,329 UART: [art] Populate DV Done
3,192,714 UART: [fht] FMC Alias Private Key: 7
3,193,812 UART: [art] Derive CDI
3,194,092 UART: [art] Store in slot 0x4
3,279,766 UART: [art] Derive Key Pair
3,280,126 UART: [art] Store priv key in slot 0x5
3,293,323 UART: [art] Derive Key Pair - Done
3,308,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,872 UART: [art] PUB.X = 6901F5A326AF77A72F37C3D7DA1FA57B10F264349C536A8649EDC742898AD641B94B932D2FC5C2D7EC16B592DA691883
3,331,643 UART: [art] PUB.Y = CCBD5A38073F28BA8D938DE2CE98F96DB6E2A3E23640E644183274729D195A960CEFF719701800EE2397A4F71867EF50
3,338,567 UART: [art] SIG.R = CFB88975181A55F175757E99398050A51B3247A14CB88C4E28745379818B55A9E881436C1D19D7A8BA5DA71D34FCC917
3,345,331 UART: [art] SIG.S = 343CE1C7D4748AD14585F47100216077AD345DC858E3768D10EF5596A9E066CA04F392FB01453858FDEE9FD896AAD1A0
3,368,959 UART: Caliptra RT
3,369,210 UART: [state] CFI Enabled
3,488,516 UART: [rt] RT listening for mailbox commands...
3,489,179 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,916 UART: [rt]cmd =0x46504c54, len=4
3,520,108 >>> mbox cmd response data (8 bytes)
3,520,367 UART: [rt] FIPS self test
3,520,695 UART: [kat] ++
3,520,847 UART: [kat] sha1
3,525,057 UART: [kat] SHA2-256
3,527,079 UART: [kat] SHA2-384
3,529,946 UART: [kat] SHA2-512-ACC
3,531,873 UART: [kat] ECC-384
3,541,301 UART: [kat] HMAC-384Kdf
3,542,273 UART: Fatal Error: 0x90030001
3,543,812 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,543,817 >>> mbox cmd response: failed
3,543,817 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,543,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,503 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,770 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,961 UART: [state] LifecycleState = Unprovisioned
85,616 UART: [state] DebugLocked = No
86,178 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,800 UART: [kat] SHA2-256
881,731 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,846 UART: [kat] ++
885,998 UART: [kat] sha1
890,124 UART: [kat] SHA2-256
892,062 UART: [kat] SHA2-384
894,919 UART: [kat] SHA2-512-ACC
896,820 UART: [kat] ECC-384
902,553 UART: [kat] HMAC-384Kdf
907,213 UART: [kat] LMS
1,475,409 UART: [kat] --
1,476,192 UART: [cold-reset] ++
1,476,652 UART: [fht] Storing FHT @ 0x50003400
1,479,519 UART: [idev] ++
1,479,687 UART: [idev] CDI.KEYID = 6
1,480,047 UART: [idev] SUBJECT.KEYID = 7
1,480,471 UART: [idev] UDS.KEYID = 0
1,480,816 ready_for_fw is high
1,480,816 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,265 UART: [idev] Erasing UDS.KEYID = 0
1,505,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,957 UART: [idev] --
1,514,876 UART: [ldev] ++
1,515,044 UART: [ldev] CDI.KEYID = 6
1,515,407 UART: [ldev] SUBJECT.KEYID = 5
1,515,833 UART: [ldev] AUTHORITY.KEYID = 7
1,516,296 UART: [ldev] FE.KEYID = 1
1,521,796 UART: [ldev] Erasing FE.KEYID = 1
1,547,021 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,215 UART: [ldev] --
1,586,636 UART: [fwproc] Waiting for Commands...
1,587,429 UART: [fwproc] Received command 0x46574c44
1,588,220 UART: [fwproc] Received Image of size 119428 bytes
2,942,578 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,318 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,069 >>> mbox cmd response: success
3,144,183 UART: [afmc] ++
3,144,351 UART: [afmc] CDI.KEYID = 6
3,144,713 UART: [afmc] SUBJECT.KEYID = 7
3,145,138 UART: [afmc] AUTHORITY.KEYID = 5
3,180,043 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,249 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,029 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,738 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,621 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,304 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,286 UART: [afmc] --
3,223,416 UART: [cold-reset] --
3,224,030 UART: [state] Locking Datavault
3,225,151 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,755 UART: [state] Locking ICCM
3,226,347 UART: [exit] Launching FMC @ 0x40000130
3,231,677 UART:
3,231,693 UART: Running Caliptra FMC ...
3,232,101 UART:
3,232,244 UART: [state] CFI Enabled
3,243,162 UART: [fht] FMC Alias Private Key: 7
3,361,752 UART: [art] Extend RT PCRs Done
3,362,180 UART: [art] Lock RT PCRs Done
3,363,540 UART: [art] Populate DV Done
3,371,703 UART: [fht] FMC Alias Private Key: 7
3,372,787 UART: [art] Derive CDI
3,373,067 UART: [art] Store in slot 0x4
3,458,911 UART: [art] Derive Key Pair
3,459,271 UART: [art] Store priv key in slot 0x5
3,472,420 UART: [art] Derive Key Pair - Done
3,487,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,599 UART: [art] PUB.X = 36B3669E348752997CE5B69C687B388840242E31869B07A3C7FE3B599CC430223071D7C747BE51F97AC3C31AD94ACF80
3,510,362 UART: [art] PUB.Y = 3DA126C6C8D3B19233E0BCB7E27937E64347547D4E6D6B974E68B4F35D7AF8A9AF52DE0159D4F9A229A208621EFB277A
3,517,314 UART: [art] SIG.R = 806973B96050A5B04F6E58291A502F4FEF8708901DDDD954F5ABA4A562C3429DFE8DF75EC8E1CB47B92D34ED31C58FE5
3,524,093 UART: [art] SIG.S = 056B86AC40AE8F0CACB21B672DCFD74ED564B13154F558A52FD4EEE07CE3EE9F947BAB99966CDB9300DBCADF80BE2525
3,547,683 UART: Caliptra RT
3,548,026 UART: [state] CFI Enabled
3,669,214 UART: [rt] RT listening for mailbox commands...
3,669,877 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,696 UART: [rt]cmd =0x46504c54, len=4
3,700,826 >>> mbox cmd response data (8 bytes)
3,700,999 UART: [rt] FIPS self test
3,701,327 UART: [kat] ++
3,701,479 UART: [kat] sha1
3,705,607 UART: [kat] SHA2-256
3,707,629 UART: [kat] SHA2-384
3,710,460 UART: [kat] SHA2-512-ACC
3,712,387 UART: [kat] ECC-384
3,722,487 UART: [kat] HMAC-384Kdf
3,723,645 UART: Fatal Error: 0x90030001
3,725,184 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,725,189 >>> mbox cmd response: failed
3,725,189 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,725,194 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,188 UART: [kat] SHA2-256
882,119 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,234 UART: [kat] ++
886,386 UART: [kat] sha1
890,602 UART: [kat] SHA2-256
892,540 UART: [kat] SHA2-384
895,247 UART: [kat] SHA2-512-ACC
897,148 UART: [kat] ECC-384
902,845 UART: [kat] HMAC-384Kdf
907,601 UART: [kat] LMS
1,475,797 UART: [kat] --
1,476,694 UART: [cold-reset] ++
1,477,114 UART: [fht] Storing FHT @ 0x50003400
1,479,875 UART: [idev] ++
1,480,043 UART: [idev] CDI.KEYID = 6
1,480,403 UART: [idev] SUBJECT.KEYID = 7
1,480,827 UART: [idev] UDS.KEYID = 0
1,481,172 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,481 UART: [idev] Erasing UDS.KEYID = 0
1,504,531 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,167 UART: [idev] --
1,514,228 UART: [ldev] ++
1,514,396 UART: [ldev] CDI.KEYID = 6
1,514,759 UART: [ldev] SUBJECT.KEYID = 5
1,515,185 UART: [ldev] AUTHORITY.KEYID = 7
1,515,648 UART: [ldev] FE.KEYID = 1
1,520,928 UART: [ldev] Erasing FE.KEYID = 1
1,546,369 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,425 UART: [ldev] --
1,585,822 UART: [fwproc] Waiting for Commands...
1,586,473 UART: [fwproc] Received command 0x46574c44
1,587,264 UART: [fwproc] Received Image of size 119428 bytes
2,941,740 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,494 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,712 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,303 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,114 ready_for_fw is high
1,362,114 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,891 >>> mbox cmd response: success
3,055,622 UART:
3,055,638 UART: Running Caliptra FMC ...
3,056,046 UART:
3,056,189 UART: [state] CFI Enabled
3,066,763 UART: [fht] FMC Alias Private Key: 7
3,185,719 UART: [art] Extend RT PCRs Done
3,186,147 UART: [art] Lock RT PCRs Done
3,187,767 UART: [art] Populate DV Done
3,195,784 UART: [fht] FMC Alias Private Key: 7
3,196,838 UART: [art] Derive CDI
3,197,118 UART: [art] Store in slot 0x4
3,282,802 UART: [art] Derive Key Pair
3,283,162 UART: [art] Store priv key in slot 0x5
3,296,079 UART: [art] Derive Key Pair - Done
3,311,123 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,069 UART: [art] PUB.X = D51FB03D77F92A27E397551B0D103CF1A4A7AEA684B70C240D5C0F3C8FF732FA36B0882464EC7E0D4B1C307AFD24C70F
3,333,835 UART: [art] PUB.Y = AB3F266BE62D742753D0A6D5222D42543BEC4AD66A17F5364329B693D9C569A18D03921953CE4D61A5C9E451BECADF5B
3,340,790 UART: [art] SIG.R = 43421CD58EB7EA3CDACB555EFB5B290D95F3D2B5031B7FC5740D6DD84F4EA3F0B50D3F23F7756263EC8ADA11759256BD
3,347,566 UART: [art] SIG.S = 2B9F5D9BDF5E126A550DF1EC262526D1CF69C1AB1A8F8B05EF276CEEEC53CE271834D264EF7F3880152796B83F2CAFC3
3,372,210 UART: Caliptra RT
3,372,553 UART: [state] CFI Enabled
3,493,182 UART: [rt] RT listening for mailbox commands...
3,493,845 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,786 UART: [rt]cmd =0x46504c54, len=4
3,524,958 >>> mbox cmd response data (8 bytes)
3,525,285 UART: [rt] FIPS self test
3,525,613 UART: [kat] ++
3,525,765 UART: [kat] sha1
3,529,989 UART: [kat] SHA2-256
3,532,011 UART: [kat] SHA2-384
3,534,778 UART: [kat] SHA2-512-ACC
3,536,705 UART: [kat] ECC-384
3,546,749 UART: [kat] HMAC-384Kdf
3,547,863 UART: Fatal Error: 0x90030001
3,549,402 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,549,407 >>> mbox cmd response: failed
3,549,407 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,549,412 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,190 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,221 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,266 UART: [kat] ++
895,418 UART: [kat] sha1
899,536 UART: [kat] SHA2-256
901,476 UART: [kat] SHA2-384
904,339 UART: [kat] SHA2-512-ACC
906,240 UART: [kat] ECC-384
915,571 UART: [kat] HMAC-384Kdf
920,091 UART: [kat] LMS
1,168,403 UART: [kat] --
1,169,432 UART: [cold-reset] ++
1,169,772 UART: [fht] FHT @ 0x50003400
1,172,456 UART: [idev] ++
1,172,624 UART: [idev] CDI.KEYID = 6
1,172,985 UART: [idev] SUBJECT.KEYID = 7
1,173,410 UART: [idev] UDS.KEYID = 0
1,173,756 ready_for_fw is high
1,173,756 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,349 UART: [idev] Erasing UDS.KEYID = 0
1,198,339 UART: [idev] Sha1 KeyId Algorithm
1,207,337 UART: [idev] --
1,208,436 UART: [ldev] ++
1,208,604 UART: [ldev] CDI.KEYID = 6
1,208,968 UART: [ldev] SUBJECT.KEYID = 5
1,209,395 UART: [ldev] AUTHORITY.KEYID = 7
1,209,858 UART: [ldev] FE.KEYID = 1
1,214,838 UART: [ldev] Erasing FE.KEYID = 1
1,240,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,656 UART: [ldev] --
1,279,919 UART: [fwproc] Wait for Commands...
1,280,588 UART: [fwproc] Recv command 0x46574c44
1,281,321 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,443 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,618 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,109 >>> mbox cmd response: success
2,837,255 UART: [afmc] ++
2,837,423 UART: [afmc] CDI.KEYID = 6
2,837,786 UART: [afmc] SUBJECT.KEYID = 7
2,838,212 UART: [afmc] AUTHORITY.KEYID = 5
2,873,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,019 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,729 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,610 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,311 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,100 UART: [afmc] --
2,916,923 UART: [cold-reset] --
2,917,781 UART: [state] Locking Datavault
2,918,900 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,504 UART: [state] Locking ICCM
2,920,118 UART: [exit] Launching FMC @ 0x40000130
2,925,448 UART:
2,925,464 UART: Running Caliptra FMC ...
2,925,872 UART:
2,925,926 UART: [state] CFI Enabled
2,936,174 UART: [fht] FMC Alias Private Key: 7
3,055,164 UART: [art] Extend RT PCRs Done
3,055,592 UART: [art] Lock RT PCRs Done
3,057,352 UART: [art] Populate DV Done
3,065,543 UART: [fht] FMC Alias Private Key: 7
3,066,725 UART: [art] Derive CDI
3,067,005 UART: [art] Store in slot 0x4
3,152,806 UART: [art] Derive Key Pair
3,153,166 UART: [art] Store priv key in slot 0x5
3,166,990 UART: [art] Derive Key Pair - Done
3,181,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,865 UART: [art] PUB.X = 2916A5B5ACBDEB1D90A1138EE947425B715E61E8B582352F91772E138E892E33CA033CBF1A065AC707DAF3BDD5F25AA4
3,204,638 UART: [art] PUB.Y = 3FF124578E00EE88581F656B05F0DE46498616AB056AD863A0FDD07E8EA2FDCBD86C00B58AE85C8D921556187E81BFC3
3,211,548 UART: [art] SIG.R = 1F73FF227CB0E6FB1DB5F7D2D6DD38D1FBB575437306CC25802B042C8C782A18CE0EB8D3947E1D7F8BE15CED0614EFCB
3,218,328 UART: [art] SIG.S = 44B0ACB36646C74DA02673FB0C159BB7941C7B75D8E530DB3AA9A909AC077A0EFF70B3FF8FB021D94F5EFE554BC67713
3,241,368 UART: Caliptra RT
3,241,619 UART: [state] CFI Enabled
3,362,105 UART: [rt] RT listening for mailbox commands...
3,362,768 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,441 UART: [rt]cmd =0x46504c54, len=4
3,393,499 >>> mbox cmd response data (8 bytes)
3,393,722 UART: [rt] FIPS self test
3,394,050 UART: [kat] ++
3,394,202 UART: [kat] sha1
3,398,500 UART: [kat] SHA2-256
3,400,522 UART: [kat] SHA2-384
3,403,271 UART: [kat] SHA2-512-ACC
3,405,198 UART: [kat] ECC-384
3,415,080 UART: [kat] HMAC-384Kdf
3,416,078 UART: Fatal Error: 0x90030001
3,417,617 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,417,622 >>> mbox cmd response: failed
3,417,622 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,417,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,310 UART: [kat] SHA2-256
890,860 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,964 UART: [kat] ++
895,116 UART: [kat] sha1
899,472 UART: [kat] SHA2-256
901,412 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
915,949 UART: [kat] HMAC-384Kdf
920,663 UART: [kat] LMS
1,168,975 UART: [kat] --
1,169,922 UART: [cold-reset] ++
1,170,382 UART: [fht] FHT @ 0x50003400
1,173,002 UART: [idev] ++
1,173,170 UART: [idev] CDI.KEYID = 6
1,173,531 UART: [idev] SUBJECT.KEYID = 7
1,173,956 UART: [idev] UDS.KEYID = 0
1,174,302 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,837 UART: [idev] Erasing UDS.KEYID = 0
1,198,769 UART: [idev] Sha1 KeyId Algorithm
1,207,735 UART: [idev] --
1,208,796 UART: [ldev] ++
1,208,964 UART: [ldev] CDI.KEYID = 6
1,209,328 UART: [ldev] SUBJECT.KEYID = 5
1,209,755 UART: [ldev] AUTHORITY.KEYID = 7
1,210,218 UART: [ldev] FE.KEYID = 1
1,215,194 UART: [ldev] Erasing FE.KEYID = 1
1,241,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,706 UART: [ldev] --
1,281,013 UART: [fwproc] Wait for Commands...
1,281,600 UART: [fwproc] Recv command 0x46574c44
1,282,333 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,551 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,726 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,339 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,126 ready_for_fw is high
1,059,126 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,686 >>> mbox cmd response: success
2,752,583 UART:
2,752,599 UART: Running Caliptra FMC ...
2,753,007 UART:
2,753,061 UART: [state] CFI Enabled
2,763,275 UART: [fht] FMC Alias Private Key: 7
2,882,511 UART: [art] Extend RT PCRs Done
2,882,939 UART: [art] Lock RT PCRs Done
2,884,429 UART: [art] Populate DV Done
2,892,760 UART: [fht] FMC Alias Private Key: 7
2,893,736 UART: [art] Derive CDI
2,894,016 UART: [art] Store in slot 0x4
2,979,677 UART: [art] Derive Key Pair
2,980,037 UART: [art] Store priv key in slot 0x5
2,993,117 UART: [art] Derive Key Pair - Done
3,007,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,922 UART: [art] PUB.X = 85151D26E68290B661546FBBE75B968EC4519CBCBE236F0380A4FC9F6972E26E03E2A9D171A9B729929819E9592F74DC
3,030,686 UART: [art] PUB.Y = 6BB7EB4DB4B068C2B7D378CAFC6E5E02AAAD2C92016867EF2D7640F4B56BB22961490192E64F045EB2E67199E70735C6
3,037,629 UART: [art] SIG.R = 9876A2DFEDDE6BD79687C26564A85901188486D73E72D7426980C629AD782125E2D60AF960695110E0DDA67E91EFAB4D
3,044,393 UART: [art] SIG.S = 88801BC14922E6DF606F33F04E8FA16BBF1807E70F2BF19CBDFCF7EC21716BCE9AD461AB091F04F6BC80CFE420F95B93
3,068,045 UART: Caliptra RT
3,068,296 UART: [state] CFI Enabled
3,189,228 UART: [rt] RT listening for mailbox commands...
3,189,891 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,620 UART: [rt]cmd =0x46504c54, len=4
3,220,718 >>> mbox cmd response data (8 bytes)
3,220,993 UART: [rt] FIPS self test
3,221,321 UART: [kat] ++
3,221,473 UART: [kat] sha1
3,225,523 UART: [kat] SHA2-256
3,227,545 UART: [kat] SHA2-384
3,230,312 UART: [kat] SHA2-512-ACC
3,232,239 UART: [kat] ECC-384
3,242,331 UART: [kat] HMAC-384Kdf
3,243,257 UART: Fatal Error: 0x90030001
3,244,796 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,801 >>> mbox cmd response: failed
3,244,801 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,882 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,346 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,603 UART: [kat] SHA2-256
891,153 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,257 UART: [kat] ++
895,409 UART: [kat] sha1
899,793 UART: [kat] SHA2-256
901,733 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
916,146 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,170,143 UART: [cold-reset] ++
1,170,689 UART: [fht] FHT @ 0x50003400
1,173,333 UART: [idev] ++
1,173,501 UART: [idev] CDI.KEYID = 6
1,173,862 UART: [idev] SUBJECT.KEYID = 7
1,174,287 UART: [idev] UDS.KEYID = 0
1,174,633 ready_for_fw is high
1,174,633 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,199,392 UART: [idev] Sha1 KeyId Algorithm
1,208,116 UART: [idev] --
1,209,081 UART: [ldev] ++
1,209,249 UART: [ldev] CDI.KEYID = 6
1,209,613 UART: [ldev] SUBJECT.KEYID = 5
1,210,040 UART: [ldev] AUTHORITY.KEYID = 7
1,210,503 UART: [ldev] FE.KEYID = 1
1,216,039 UART: [ldev] Erasing FE.KEYID = 1
1,242,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,711 UART: [ldev] --
1,282,010 UART: [fwproc] Wait for Commands...
1,282,673 UART: [fwproc] Recv command 0x46574c44
1,283,406 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,422 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,597 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,070 >>> mbox cmd response: success
2,838,210 UART: [afmc] ++
2,838,378 UART: [afmc] CDI.KEYID = 6
2,838,741 UART: [afmc] SUBJECT.KEYID = 7
2,839,167 UART: [afmc] AUTHORITY.KEYID = 5
2,874,028 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,534 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,244 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,125 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,826 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,711 UART: [afmc] --
2,917,702 UART: [cold-reset] --
2,918,476 UART: [state] Locking Datavault
2,919,359 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,963 UART: [state] Locking ICCM
2,920,553 UART: [exit] Launching FMC @ 0x40000130
2,925,883 UART:
2,925,899 UART: Running Caliptra FMC ...
2,926,307 UART:
2,926,450 UART: [state] CFI Enabled
2,936,818 UART: [fht] FMC Alias Private Key: 7
3,055,608 UART: [art] Extend RT PCRs Done
3,056,036 UART: [art] Lock RT PCRs Done
3,057,728 UART: [art] Populate DV Done
3,066,109 UART: [fht] FMC Alias Private Key: 7
3,067,237 UART: [art] Derive CDI
3,067,517 UART: [art] Store in slot 0x4
3,153,112 UART: [art] Derive Key Pair
3,153,472 UART: [art] Store priv key in slot 0x5
3,166,960 UART: [art] Derive Key Pair - Done
3,181,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,192 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,957 UART: [art] PUB.X = 09B3C9768870F0194A2C36817D9C989BE0B2591DA9349B8F0D0ED04AA113CF2F1BEE0A96F87FE9CB94E063FCB55A40D3
3,204,727 UART: [art] PUB.Y = 1E60DE2A01746637676B2C4D216C0190D17D8D645C0135EE7FFBA06EA5581266A7AD0766ADF4780635E0A70B3AE778B1
3,211,661 UART: [art] SIG.R = C56704D9FA8BA02D358BFB5A9DE0F0A22BD144F56D06EE3B55DA1AFBFCC8E4E8A0B28071E039CE1D1AE33155FB11BF67
3,218,451 UART: [art] SIG.S = 7695343A035F7794920C89D5301190F6CDB9ADB5596B094E68D42F6660C79F6FFB8AF56CCBBEA9123246AF642154478A
3,242,138 UART: Caliptra RT
3,242,481 UART: [state] CFI Enabled
3,362,842 UART: [rt] RT listening for mailbox commands...
3,363,505 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,450 UART: [rt]cmd =0x46504c54, len=4
3,394,438 >>> mbox cmd response data (8 bytes)
3,394,555 UART: [rt] FIPS self test
3,394,883 UART: [kat] ++
3,395,035 UART: [kat] sha1
3,399,231 UART: [kat] SHA2-256
3,401,253 UART: [kat] SHA2-384
3,404,202 UART: [kat] SHA2-512-ACC
3,406,129 UART: [kat] ECC-384
3,416,607 UART: [kat] HMAC-384Kdf
3,417,405 UART: Fatal Error: 0x90030001
3,418,944 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,418,949 >>> mbox cmd response: failed
3,418,949 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,418,954 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,005 UART: [state] LifecycleState = Unprovisioned
85,660 UART: [state] DebugLocked = No
86,158 UART: [state] WD Timer not started. Device not locked for debugging
87,309 UART: [kat] SHA2-256
890,859 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,963 UART: [kat] ++
895,115 UART: [kat] sha1
899,539 UART: [kat] SHA2-256
901,479 UART: [kat] SHA2-384
904,368 UART: [kat] SHA2-512-ACC
906,269 UART: [kat] ECC-384
916,104 UART: [kat] HMAC-384Kdf
920,914 UART: [kat] LMS
1,169,226 UART: [kat] --
1,170,223 UART: [cold-reset] ++
1,170,563 UART: [fht] FHT @ 0x50003400
1,173,189 UART: [idev] ++
1,173,357 UART: [idev] CDI.KEYID = 6
1,173,718 UART: [idev] SUBJECT.KEYID = 7
1,174,143 UART: [idev] UDS.KEYID = 0
1,174,489 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,188 UART: [idev] Erasing UDS.KEYID = 0
1,199,326 UART: [idev] Sha1 KeyId Algorithm
1,208,084 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,215,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,459 UART: [ldev] --
1,281,848 UART: [fwproc] Wait for Commands...
1,282,585 UART: [fwproc] Recv command 0x46574c44
1,283,318 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,846 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,021 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,626 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,373 ready_for_fw is high
1,059,373 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,861 >>> mbox cmd response: success
2,753,414 UART:
2,753,430 UART: Running Caliptra FMC ...
2,753,838 UART:
2,753,981 UART: [state] CFI Enabled
2,764,467 UART: [fht] FMC Alias Private Key: 7
2,883,909 UART: [art] Extend RT PCRs Done
2,884,337 UART: [art] Lock RT PCRs Done
2,885,631 UART: [art] Populate DV Done
2,893,888 UART: [fht] FMC Alias Private Key: 7
2,894,978 UART: [art] Derive CDI
2,895,258 UART: [art] Store in slot 0x4
2,980,941 UART: [art] Derive Key Pair
2,981,301 UART: [art] Store priv key in slot 0x5
2,994,967 UART: [art] Derive Key Pair - Done
3,009,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,511 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,276 UART: [art] PUB.X = DA5E466C9D76FC1D938C605571D776D8E287224234051BBDAE368244E6A1BBF5CBD99C9FF7EC4E5AB6528D0FD7E8428C
3,033,054 UART: [art] PUB.Y = 2E691F6513F3F41CF39BF7AF31C4A39B356745351FB556B1108EFB40A29B4C369CC75C3AC1561475DD309C8586843A7E
3,040,006 UART: [art] SIG.R = C5182BFBAB6E0313229D745FB701623EA69555B5E11F014E4BFB30532DF9AC582AA0CB5CA1DDEF840EA392EEA8C36266
3,046,780 UART: [art] SIG.S = 7C9107D3A4BEDB78B8FD79E7CC992043BCE6E7A94170B1CD5A6F82EB18CB0B1BF44FFA91834A259ACEFC7BA11AC2ECB6
3,071,106 UART: Caliptra RT
3,071,449 UART: [state] CFI Enabled
3,191,076 UART: [rt] RT listening for mailbox commands...
3,191,739 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,508 UART: [rt]cmd =0x46504c54, len=4
3,222,528 >>> mbox cmd response data (8 bytes)
3,222,661 UART: [rt] FIPS self test
3,222,989 UART: [kat] ++
3,223,141 UART: [kat] sha1
3,227,425 UART: [kat] SHA2-256
3,229,447 UART: [kat] SHA2-384
3,232,336 UART: [kat] SHA2-512-ACC
3,234,263 UART: [kat] ECC-384
3,244,323 UART: [kat] HMAC-384Kdf
3,245,171 UART: Fatal Error: 0x90030001
3,246,710 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,246,715 >>> mbox cmd response: failed
3,246,715 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,246,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,131 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,091 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,818 UART: [state] LifecycleState = Unprovisioned
85,473 UART: [state] DebugLocked = No
85,963 UART: [state] WD Timer not started. Device not locked for debugging
87,102 UART: [kat] SHA2-256
892,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,877 UART: [kat] ++
897,029 UART: [kat] sha1
901,385 UART: [kat] SHA2-256
903,325 UART: [kat] SHA2-384
906,090 UART: [kat] SHA2-512-ACC
907,991 UART: [kat] ECC-384
917,696 UART: [kat] HMAC-384Kdf
922,406 UART: [kat] LMS
1,170,734 UART: [kat] --
1,171,859 UART: [cold-reset] ++
1,172,351 UART: [fht] FHT @ 0x50003400
1,175,046 UART: [idev] ++
1,175,214 UART: [idev] CDI.KEYID = 6
1,175,574 UART: [idev] SUBJECT.KEYID = 7
1,175,998 UART: [idev] UDS.KEYID = 0
1,176,343 ready_for_fw is high
1,176,343 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,914 UART: [idev] Erasing UDS.KEYID = 0
1,201,199 UART: [idev] Sha1 KeyId Algorithm
1,209,451 UART: [idev] --
1,210,611 UART: [ldev] ++
1,210,779 UART: [ldev] CDI.KEYID = 6
1,211,142 UART: [ldev] SUBJECT.KEYID = 5
1,211,568 UART: [ldev] AUTHORITY.KEYID = 7
1,212,031 UART: [ldev] FE.KEYID = 1
1,217,373 UART: [ldev] Erasing FE.KEYID = 1
1,243,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,367 UART: [ldev] --
1,282,726 UART: [fwproc] Wait for Commands...
1,283,500 UART: [fwproc] Recv command 0x46574c44
1,284,228 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,730 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,900 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,549 >>> mbox cmd response: success
2,840,789 UART: [afmc] ++
2,840,957 UART: [afmc] CDI.KEYID = 6
2,841,319 UART: [afmc] SUBJECT.KEYID = 7
2,841,744 UART: [afmc] AUTHORITY.KEYID = 5
2,876,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,402 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,111 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,994 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,695 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,583 UART: [afmc] --
2,920,663 UART: [cold-reset] --
2,921,597 UART: [state] Locking Datavault
2,922,912 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,516 UART: [state] Locking ICCM
2,924,024 UART: [exit] Launching FMC @ 0x40000130
2,929,354 UART:
2,929,370 UART: Running Caliptra FMC ...
2,929,778 UART:
2,929,832 UART: [state] CFI Enabled
2,940,448 UART: [fht] FMC Alias Private Key: 7
3,059,318 UART: [art] Extend RT PCRs Done
3,059,746 UART: [art] Lock RT PCRs Done
3,061,264 UART: [art] Populate DV Done
3,069,795 UART: [fht] FMC Alias Private Key: 7
3,070,835 UART: [art] Derive CDI
3,071,115 UART: [art] Store in slot 0x4
3,156,746 UART: [art] Derive Key Pair
3,157,106 UART: [art] Store priv key in slot 0x5
3,170,204 UART: [art] Derive Key Pair - Done
3,185,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,693 UART: [art] PUB.X = 0FE1B7A71D0DFAB275629BA36F9AEBB752F886EA407CD55E14CF2163E9F0F9E1651B076395CF851DF26F62C23454F42F
3,208,466 UART: [art] PUB.Y = B7A5D9D8C61F355B973FF6075AD4AA449C360DC162EFE6425A9042E93F8E8EC86D3D9FB691C9A0DD5AB6176E9FF1F47D
3,215,428 UART: [art] SIG.R = 42AE15BF3AD5993388E85344B4062AC8486E9E39EE083AA24AAF4D566F3021626CDC74EC788D655953F52CAF212E6A3D
3,222,198 UART: [art] SIG.S = 55C3973C407094BE34BCACD34EEC67AE42C5BA71EB2F251F94ED84C48DC4559098FAAD6CF30F56B8837AFAB0E61B250A
3,245,798 UART: Caliptra RT
3,246,049 UART: [state] CFI Enabled
3,365,387 UART: [rt] RT listening for mailbox commands...
3,366,050 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,829 UART: [rt]cmd =0x46504c54, len=4
3,397,155 >>> mbox cmd response data (8 bytes)
3,397,500 UART: [rt] FIPS self test
3,397,828 UART: [kat] ++
3,397,980 UART: [kat] sha1
3,402,222 UART: [kat] SHA2-256
3,404,244 UART: [kat] SHA2-384
3,407,151 UART: [kat] SHA2-512-ACC
3,409,078 UART: [kat] ECC-384
3,419,118 UART: [kat] HMAC-384Kdf
3,420,146 UART: Fatal Error: 0x90030001
3,421,685 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,421,690 >>> mbox cmd response: failed
3,421,690 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,421,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
893,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,475 UART: [kat] ++
897,627 UART: [kat] sha1
901,939 UART: [kat] SHA2-256
903,879 UART: [kat] SHA2-384
906,650 UART: [kat] SHA2-512-ACC
908,551 UART: [kat] ECC-384
918,506 UART: [kat] HMAC-384Kdf
922,884 UART: [kat] LMS
1,171,212 UART: [kat] --
1,172,091 UART: [cold-reset] ++
1,172,503 UART: [fht] FHT @ 0x50003400
1,175,258 UART: [idev] ++
1,175,426 UART: [idev] CDI.KEYID = 6
1,175,786 UART: [idev] SUBJECT.KEYID = 7
1,176,210 UART: [idev] UDS.KEYID = 0
1,176,555 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,140 UART: [idev] Erasing UDS.KEYID = 0
1,200,819 UART: [idev] Sha1 KeyId Algorithm
1,209,313 UART: [idev] --
1,210,359 UART: [ldev] ++
1,210,527 UART: [ldev] CDI.KEYID = 6
1,210,890 UART: [ldev] SUBJECT.KEYID = 5
1,211,316 UART: [ldev] AUTHORITY.KEYID = 7
1,211,779 UART: [ldev] FE.KEYID = 1
1,216,855 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,947 UART: [ldev] --
1,282,418 UART: [fwproc] Wait for Commands...
1,283,006 UART: [fwproc] Recv command 0x46574c44
1,283,734 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,616 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,786 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,495 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,493 ready_for_fw is high
1,059,493 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,798 >>> mbox cmd response: success
2,751,975 UART:
2,751,991 UART: Running Caliptra FMC ...
2,752,399 UART:
2,752,453 UART: [state] CFI Enabled
2,762,817 UART: [fht] FMC Alias Private Key: 7
2,882,097 UART: [art] Extend RT PCRs Done
2,882,525 UART: [art] Lock RT PCRs Done
2,884,135 UART: [art] Populate DV Done
2,892,504 UART: [fht] FMC Alias Private Key: 7
2,893,560 UART: [art] Derive CDI
2,893,840 UART: [art] Store in slot 0x4
2,979,933 UART: [art] Derive Key Pair
2,980,293 UART: [art] Store priv key in slot 0x5
2,993,863 UART: [art] Derive Key Pair - Done
3,008,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,132 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,897 UART: [art] PUB.X = EB91797DCF1B3DA6E969CA94AFE0A873D1603D9BC870151192E32D40960C4355CE38BCBD6EB713245EF57AA294E39810
3,031,672 UART: [art] PUB.Y = 3C1245C0E95C370A416DEBF09CE9F9DB836ABD5B887FBBAD849EE46C76CEE68031E15A7FB9FA2C774428A0C024176D80
3,038,635 UART: [art] SIG.R = 0D91C17E1395992E36406012D8F05F3970F1C2D488FB2CAACFA2E26AD823D4232CB60E0F868219B0310E2F18E3BE3DEF
3,045,401 UART: [art] SIG.S = 8215D96F49C67540542B5CBDEC02901190C2C2135F2FBA4A8277C9076CCCD068EAA50705BB8BF13F1F51AC3C9771DD90
3,069,245 UART: Caliptra RT
3,069,496 UART: [state] CFI Enabled
3,189,103 UART: [rt] RT listening for mailbox commands...
3,189,766 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,519 UART: [rt]cmd =0x46504c54, len=4
3,220,823 >>> mbox cmd response data (8 bytes)
3,220,972 UART: [rt] FIPS self test
3,221,300 UART: [kat] ++
3,221,452 UART: [kat] sha1
3,225,568 UART: [kat] SHA2-256
3,227,590 UART: [kat] SHA2-384
3,230,577 UART: [kat] SHA2-512-ACC
3,232,504 UART: [kat] ECC-384
3,242,520 UART: [kat] HMAC-384Kdf
3,243,320 UART: Fatal Error: 0x90030001
3,244,859 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,864 >>> mbox cmd response: failed
3,244,864 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,869 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,091 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,142 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
893,503 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,628 UART: [kat] ++
897,780 UART: [kat] sha1
902,030 UART: [kat] SHA2-256
903,970 UART: [kat] SHA2-384
906,663 UART: [kat] SHA2-512-ACC
908,564 UART: [kat] ECC-384
918,653 UART: [kat] HMAC-384Kdf
923,367 UART: [kat] LMS
1,171,695 UART: [kat] --
1,172,474 UART: [cold-reset] ++
1,172,858 UART: [fht] FHT @ 0x50003400
1,175,579 UART: [idev] ++
1,175,747 UART: [idev] CDI.KEYID = 6
1,176,107 UART: [idev] SUBJECT.KEYID = 7
1,176,531 UART: [idev] UDS.KEYID = 0
1,176,876 ready_for_fw is high
1,176,876 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,463 UART: [idev] Erasing UDS.KEYID = 0
1,201,804 UART: [idev] Sha1 KeyId Algorithm
1,210,200 UART: [idev] --
1,211,202 UART: [ldev] ++
1,211,370 UART: [ldev] CDI.KEYID = 6
1,211,733 UART: [ldev] SUBJECT.KEYID = 5
1,212,159 UART: [ldev] AUTHORITY.KEYID = 7
1,212,622 UART: [ldev] FE.KEYID = 1
1,217,700 UART: [ldev] Erasing FE.KEYID = 1
1,244,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,264 UART: [ldev] --
1,283,759 UART: [fwproc] Wait for Commands...
1,284,383 UART: [fwproc] Recv command 0x46574c44
1,285,111 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,457 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,627 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,274 >>> mbox cmd response: success
2,840,428 UART: [afmc] ++
2,840,596 UART: [afmc] CDI.KEYID = 6
2,840,958 UART: [afmc] SUBJECT.KEYID = 7
2,841,383 UART: [afmc] AUTHORITY.KEYID = 5
2,877,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,143 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,852 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,735 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,436 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,120 UART: [afmc] --
2,920,074 UART: [cold-reset] --
2,920,684 UART: [state] Locking Datavault
2,922,107 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,711 UART: [state] Locking ICCM
2,923,345 UART: [exit] Launching FMC @ 0x40000130
2,928,675 UART:
2,928,691 UART: Running Caliptra FMC ...
2,929,099 UART:
2,929,242 UART: [state] CFI Enabled
2,939,658 UART: [fht] FMC Alias Private Key: 7
3,059,158 UART: [art] Extend RT PCRs Done
3,059,586 UART: [art] Lock RT PCRs Done
3,061,316 UART: [art] Populate DV Done
3,069,671 UART: [fht] FMC Alias Private Key: 7
3,070,815 UART: [art] Derive CDI
3,071,095 UART: [art] Store in slot 0x4
3,157,100 UART: [art] Derive Key Pair
3,157,460 UART: [art] Store priv key in slot 0x5
3,171,148 UART: [art] Derive Key Pair - Done
3,185,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,579 UART: [art] PUB.X = A0F9F815CE3C9B83E8DD079C68F6DC7B7965CC682FCFCB483023DA26C7C027D5AAF10B2756CD26BA600E8DFD60CAC5F0
3,209,364 UART: [art] PUB.Y = 3202D87AC3C9DC9570E9C6F8D20EA4AACEA23CB0B1D1939948E1D2EA6C64CFAFFAA1FD1CBAC770664A6B62BD64F38BA9
3,216,338 UART: [art] SIG.R = 4AA15019B0778C6F74AE3284763984231EA65BA722C0E59667BBE3021BD187A339A0F1ACCF72A87BEA61B90951EB8689
3,223,104 UART: [art] SIG.S = 4D1D85C3475729626F61A5496021C9181633820150483050674CD3A1CC6492C514C38C367E8EE9FECA8E2A5A876DBB3F
3,247,455 UART: Caliptra RT
3,247,798 UART: [state] CFI Enabled
3,367,946 UART: [rt] RT listening for mailbox commands...
3,368,609 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,474 UART: [rt]cmd =0x46504c54, len=4
3,399,384 >>> mbox cmd response data (8 bytes)
3,399,537 UART: [rt] FIPS self test
3,399,865 UART: [kat] ++
3,400,017 UART: [kat] sha1
3,404,333 UART: [kat] SHA2-256
3,406,355 UART: [kat] SHA2-384
3,409,438 UART: [kat] SHA2-512-ACC
3,411,365 UART: [kat] ECC-384
3,421,483 UART: [kat] HMAC-384Kdf
3,422,511 UART: Fatal Error: 0x90030001
3,424,050 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,424,055 >>> mbox cmd response: failed
3,424,055 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,424,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,181 UART: [kat] SHA2-256
893,831 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,956 UART: [kat] ++
898,108 UART: [kat] sha1
902,338 UART: [kat] SHA2-256
904,278 UART: [kat] SHA2-384
906,847 UART: [kat] SHA2-512-ACC
908,748 UART: [kat] ECC-384
918,215 UART: [kat] HMAC-384Kdf
922,687 UART: [kat] LMS
1,171,015 UART: [kat] --
1,171,932 UART: [cold-reset] ++
1,172,434 UART: [fht] FHT @ 0x50003400
1,175,141 UART: [idev] ++
1,175,309 UART: [idev] CDI.KEYID = 6
1,175,669 UART: [idev] SUBJECT.KEYID = 7
1,176,093 UART: [idev] UDS.KEYID = 0
1,176,438 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,035 UART: [idev] Erasing UDS.KEYID = 0
1,200,782 UART: [idev] Sha1 KeyId Algorithm
1,209,338 UART: [idev] --
1,210,324 UART: [ldev] ++
1,210,492 UART: [ldev] CDI.KEYID = 6
1,210,855 UART: [ldev] SUBJECT.KEYID = 5
1,211,281 UART: [ldev] AUTHORITY.KEYID = 7
1,211,744 UART: [ldev] FE.KEYID = 1
1,216,634 UART: [ldev] Erasing FE.KEYID = 1
1,242,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,046 UART: [ldev] --
1,281,343 UART: [fwproc] Wait for Commands...
1,282,061 UART: [fwproc] Recv command 0x46574c44
1,282,789 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,229 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,399 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,952 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,948 ready_for_fw is high
1,060,948 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,007 >>> mbox cmd response: success
2,755,266 UART:
2,755,282 UART: Running Caliptra FMC ...
2,755,690 UART:
2,755,833 UART: [state] CFI Enabled
2,766,343 UART: [fht] FMC Alias Private Key: 7
2,885,453 UART: [art] Extend RT PCRs Done
2,885,881 UART: [art] Lock RT PCRs Done
2,887,643 UART: [art] Populate DV Done
2,895,792 UART: [fht] FMC Alias Private Key: 7
2,896,952 UART: [art] Derive CDI
2,897,232 UART: [art] Store in slot 0x4
2,983,045 UART: [art] Derive Key Pair
2,983,405 UART: [art] Store priv key in slot 0x5
2,996,511 UART: [art] Derive Key Pair - Done
3,011,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,140 UART: [art] PUB.X = 334F62092DB1924E48915D49EA4FA80FF07184E5350C73E6BD06CD775BAB1776EC52BEE040D40BF3C74F3FD30937F65E
3,033,900 UART: [art] PUB.Y = B7AEEB40240C37D1B1C3BD5A300F1BB5A81EFFFDA7441CFBD756079B93A2C42E85830CA44FDF1B5EDCE7127D409A85EF
3,040,864 UART: [art] SIG.R = 49B376A4BE8A3B0FA433F38822217D20B825B5497ED1C388601E329720F83F0D69E22F2D9730DBE9CFEA1BF88C37FF41
3,047,634 UART: [art] SIG.S = F53679B6F5E29C0D6CEEF2A10EF6E785CFD2B1F9AA54E4677F71EC38EE9071C0DD992653C80F7F71BC94126F9BD4E8E9
3,071,135 UART: Caliptra RT
3,071,478 UART: [state] CFI Enabled
3,191,567 UART: [rt] RT listening for mailbox commands...
3,192,230 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,365 UART: [rt]cmd =0x46504c54, len=4
3,223,531 >>> mbox cmd response data (8 bytes)
3,223,822 UART: [rt] FIPS self test
3,224,150 UART: [kat] ++
3,224,302 UART: [kat] sha1
3,228,544 UART: [kat] SHA2-256
3,230,566 UART: [kat] SHA2-384
3,233,401 UART: [kat] SHA2-512-ACC
3,235,328 UART: [kat] ECC-384
3,245,146 UART: [kat] HMAC-384Kdf
3,245,892 UART: Fatal Error: 0x90030001
3,247,431 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,247,436 >>> mbox cmd response: failed
3,247,436 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,247,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,428 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,519 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
5,181,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,331,041 >>> mbox cmd response: failed
5,331,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,480,480 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,442,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,256,471 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
5,180,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,330,020 >>> mbox cmd response: failed
5,330,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,479,455 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,425,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,251,808 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,472 writing to cptra_bootfsm_go
5,514,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,663,949 >>> mbox cmd response: failed
5,664,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,813,971 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
17,825,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,546,486 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,611 writing to cptra_bootfsm_go
5,512,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,661,812 >>> mbox cmd response: failed
5,662,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,811,220 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
17,825,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,546,492 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
5,187,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,336,954 >>> mbox cmd response: failed
5,337,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,486,963 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,439,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,263,877 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
5,180,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,330,550 >>> mbox cmd response: failed
5,331,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,479,896 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,447,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,269,321 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
5,508,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,658,388 >>> mbox cmd response: failed
5,658,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,807,811 >>> mbox cmd response: failed
Initializing fuses
985 writing to cptra_bootfsm_go
17,836,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,539,549 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
5,508,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,658,121 >>> mbox cmd response: failed
5,658,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,807,531 >>> mbox cmd response: failed
Initializing fuses
982 writing to cptra_bootfsm_go
17,835,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,554,738 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,818 >>> mbox cmd response: failed
830,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,406 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,906 >>> mbox cmd response: failed
830,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,912 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,528 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,775 >>> mbox cmd response: failed
830,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,251 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,229 >>> mbox cmd response: failed
830,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,235 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,695 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
831,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
831,008 >>> mbox cmd response: failed
831,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
831,014 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,814 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,250 >>> mbox cmd response: failed
830,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,954 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
831,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
831,243 >>> mbox cmd response: failed
831,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
831,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,943 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
831,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
831,301 >>> mbox cmd response: failed
831,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
831,307 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,877 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
192,354 UART:
192,712 UART: Running Caliptra ROM ...
193,903 UART:
194,069 UART: [state] CFI Enabled
262,414 UART: [state] LifecycleState = Unprovisioned
264,419 UART: [state] DebugLocked = No
267,320 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,647 UART: [kat] SHA2-256
442,349 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,851 UART: [kat] ++
453,300 UART: [kat] sha1
464,836 UART: [kat] SHA2-256
467,535 UART: [kat] SHA2-384
473,308 UART: [kat] SHA2-512-ACC
475,617 UART: [kat] ECC-384
2,765,080 UART: [kat] HMAC-384Kdf
2,797,947 UART: [kat] LMS
3,988,245 UART: [kat] --
3,993,736 UART: [cold-reset] ++
3,995,527 UART: [fht] Storing FHT @ 0x50003400
4,007,007 UART: [idev] ++
4,007,591 UART: [idev] CDI.KEYID = 6
4,008,503 UART: [idev] SUBJECT.KEYID = 7
4,009,767 UART: [idev] UDS.KEYID = 0
4,010,814 ready_for_fw is high
4,011,052 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,253 UART: [idev] Erasing UDS.KEYID = 0
7,343,148 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,540 UART: [idev] --
7,369,546 UART: [ldev] ++
7,370,128 UART: [ldev] CDI.KEYID = 6
7,371,096 UART: [ldev] SUBJECT.KEYID = 5
7,372,316 UART: [ldev] AUTHORITY.KEYID = 7
7,373,552 UART: [ldev] FE.KEYID = 1
7,418,117 UART: [ldev] Erasing FE.KEYID = 1
10,753,758 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,303 UART: [ldev] --
13,133,465 UART: [fwproc] Waiting for Commands...
13,136,643 UART: [fwproc] Received command 0x46574c44
13,138,851 UART: [fwproc] Received Image of size 119428 bytes
17,249,612 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,326,266 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,399,394 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,731,590 >>> mbox cmd response: success
17,736,333 UART: [afmc] ++
17,736,920 UART: [afmc] CDI.KEYID = 6
17,737,814 UART: [afmc] SUBJECT.KEYID = 7
17,739,082 UART: [afmc] AUTHORITY.KEYID = 5
21,110,856 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,412,866 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,415,132 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,429,593 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,444,278 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,458,677 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,479,569 UART: [afmc] --
23,484,099 UART: [cold-reset] --
23,487,427 UART: [state] Locking Datavault
23,492,789 UART: [state] Locking PCR0, PCR1 and PCR31
23,494,544 UART: [state] Locking ICCM
23,496,917 UART: [exit] Launching FMC @ 0x40000130
23,505,315 UART:
23,505,551 UART: Running Caliptra FMC ...
23,506,869 UART:
23,507,042 UART: [state] CFI Enabled
23,571,411 UART: [fht] FMC Alias Private Key: 7
25,911,378 UART: [art] Extend RT PCRs Done
25,912,597 UART: [art] Lock RT PCRs Done
25,914,251 UART: [art] Populate DV Done
25,919,823 UART: [fht] FMC Alias Private Key: 7
25,921,317 UART: [art] Derive CDI
25,922,056 UART: [art] Store in slot 0x4
25,980,899 UART: [art] Derive Key Pair
25,981,898 UART: [art] Store priv key in slot 0x5
29,274,361 UART: [art] Derive Key Pair - Done
29,287,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,576,728 UART: [art] Erasing AUTHORITY.KEYID = 7
31,578,239 UART: [art] PUB.X = FD7EC484348A82E05476AFE63E81A1D2D64039682D1DD144A8D3D62E47AF1E1C0BD367B3AFDE26D77F658CB9980C26B4
31,585,547 UART: [art] PUB.Y = A1B625B0FD70B89F08B3CD768EA2A16BEC6E470ECC41ECBA0E086F08F42898B4247C06A768AB9F055564B2CEACF34890
31,592,810 UART: [art] SIG.R = CFEC1F045B083135A06555686FEC7D6C66CD505838F4C2C14FE9173103421C2E25A23945D107ACBC1FDE084F527C6B28
31,600,216 UART: [art] SIG.S = 0978CD5EFCFE02D9213F5659BFE64CFEC2221C99A97ABD0DAFBCFD8AC7144FA13D23A0130A8987010BDA39EE35FA16B5
32,905,431 UART: Caliptra RT
32,906,130 UART: [state] CFI Enabled
33,083,113 UART: [rt] RT listening for mailbox commands...
33,084,971 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,114,646 UART: [rt]cmd =0x46504c54, len=4
33,116,199 >>> mbox cmd response data (8 bytes)
33,117,024 UART: [rt] FIPS self test
33,117,994 UART: [kat] ++
33,118,448 UART: [kat] sha1
33,122,849 UART: [kat] SHA2-256
33,124,732 UART: [kat] SHA2-384
33,127,748 UART: [kat] SHA2-512-ACC
33,130,043 UART: [kat] ECC-384
36,403,885 UART: [kat] HMAC-384Kdf
36,411,542 UART: Fatal Error: 0x90030002
36,446,731 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,596,693 >>> mbox cmd response: failed
36,597,320 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,747,204 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,100 UART:
190,395 UART: Running Caliptra ROM ...
191,524 UART:
191,677 UART: [state] CFI Enabled
245,523 UART: [state] LifecycleState = Unprovisioned
247,448 UART: [state] DebugLocked = No
249,965 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
255,718 UART: [kat] SHA2-256
425,443 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
435,953 UART: [kat] ++
436,484 UART: [kat] sha1
446,550 UART: [kat] SHA2-256
449,226 UART: [kat] SHA2-384
455,376 UART: [kat] SHA2-512-ACC
457,726 UART: [kat] ECC-384
2,752,595 UART: [kat] HMAC-384Kdf
2,782,915 UART: [kat] LMS
3,973,204 UART: [kat] --
3,976,376 UART: [cold-reset] ++
3,977,397 UART: [fht] Storing FHT @ 0x50003400
3,990,128 UART: [idev] ++
3,990,748 UART: [idev] CDI.KEYID = 6
3,991,636 UART: [idev] SUBJECT.KEYID = 7
3,992,907 UART: [idev] UDS.KEYID = 0
3,994,466 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,144,633 UART: [idev] Erasing UDS.KEYID = 0
7,328,431 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,345 UART: [idev] --
7,354,928 UART: [ldev] ++
7,355,497 UART: [ldev] CDI.KEYID = 6
7,356,460 UART: [ldev] SUBJECT.KEYID = 5
7,357,676 UART: [ldev] AUTHORITY.KEYID = 7
7,358,965 UART: [ldev] FE.KEYID = 1
7,405,292 UART: [ldev] Erasing FE.KEYID = 1
10,740,826 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,054,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,069,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,083,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,098,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,117,725 UART: [ldev] --
13,122,662 UART: [fwproc] Waiting for Commands...
13,125,578 UART: [fwproc] Received command 0x46574c44
13,127,767 UART: [fwproc] Received Image of size 119428 bytes
17,241,457 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,321,804 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,394,996 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,726,242 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,783,058 ready_for_fw is high
3,783,493 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,949,677 >>> mbox cmd response: success
23,654,447 UART:
23,654,866 UART: Running Caliptra FMC ...
23,655,988 UART:
23,656,151 UART: [state] CFI Enabled
23,722,288 UART: [fht] FMC Alias Private Key: 7
26,062,871 UART: [art] Extend RT PCRs Done
26,064,115 UART: [art] Lock RT PCRs Done
26,065,640 UART: [art] Populate DV Done
26,071,013 UART: [fht] FMC Alias Private Key: 7
26,072,579 UART: [art] Derive CDI
26,073,335 UART: [art] Store in slot 0x4
26,130,820 UART: [art] Derive Key Pair
26,131,817 UART: [art] Store priv key in slot 0x5
29,424,856 UART: [art] Derive Key Pair - Done
29,437,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,726,677 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,193 UART: [art] PUB.X = 3CF5E8F2CD2A63F7B4FB6F22DC6758CCDF3B283491D33D406B2B6412327BDE34F767DB7321B7F6C147381662A06F6930
31,735,461 UART: [art] PUB.Y = 7FCFADDB3EF985629D1F35CA3892818C07B275E674B3204814F9348D4DC0723FCD665E97712BE2B2D671B2DA1A25C50E
31,742,715 UART: [art] SIG.R = 7A98FB4BC4B9AA4B8D00386FA0D905DE384AFF46E3C41AA7F956142BDFA8091D9450A0B3D1DBF44B8EED1383F0F05D6A
31,750,117 UART: [art] SIG.S = D918CFBEC3832D197A9D0BEE7B3C1DD5E24732FAD1EDBB30B4F06C0EFCF2CC5BF12E34ECE7F360492A514B8D87F162D2
33,055,321 UART: Caliptra RT
33,056,054 UART: [state] CFI Enabled
33,232,329 UART: [rt] RT listening for mailbox commands...
33,234,198 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,263,800 UART: [rt]cmd =0x46504c54, len=4
33,265,293 >>> mbox cmd response data (8 bytes)
33,266,466 UART: [rt] FIPS self test
33,267,411 UART: [kat] ++
33,267,910 UART: [kat] sha1
33,272,293 UART: [kat] SHA2-256
33,274,170 UART: [kat] SHA2-384
33,277,085 UART: [kat] SHA2-512-ACC
33,279,386 UART: [kat] ECC-384
36,553,275 UART: [kat] HMAC-384Kdf
36,560,221 UART: Fatal Error: 0x90030002
36,595,456 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,745,480 >>> mbox cmd response: failed
36,746,169 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,896,048 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,771,528 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,951,759 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,543 writing to cptra_bootfsm_go
192,756 UART:
193,122 UART: Running Caliptra ROM ...
194,317 UART:
604,134 UART: [state] CFI Enabled
615,738 UART: [state] LifecycleState = Unprovisioned
617,730 UART: [state] DebugLocked = No
620,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,057 UART: [kat] SHA2-256
795,826 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,335 UART: [kat] ++
806,819 UART: [kat] sha1
817,561 UART: [kat] SHA2-256
820,290 UART: [kat] SHA2-384
826,010 UART: [kat] SHA2-512-ACC
828,394 UART: [kat] ECC-384
3,115,305 UART: [kat] HMAC-384Kdf
3,126,426 UART: [kat] LMS
4,316,522 UART: [kat] --
4,322,537 UART: [cold-reset] ++
4,323,493 UART: [fht] Storing FHT @ 0x50003400
4,335,045 UART: [idev] ++
4,335,614 UART: [idev] CDI.KEYID = 6
4,336,502 UART: [idev] SUBJECT.KEYID = 7
4,337,829 UART: [idev] UDS.KEYID = 0
4,338,816 ready_for_fw is high
4,339,029 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,489,002 UART: [idev] Erasing UDS.KEYID = 0
7,626,801 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,919 UART: [idev] --
7,652,280 UART: [ldev] ++
7,652,858 UART: [ldev] CDI.KEYID = 6
7,653,755 UART: [ldev] SUBJECT.KEYID = 5
7,655,034 UART: [ldev] AUTHORITY.KEYID = 7
7,656,282 UART: [ldev] FE.KEYID = 1
7,666,529 UART: [ldev] Erasing FE.KEYID = 1
10,955,769 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,470 UART: [ldev] --
13,316,045 UART: [fwproc] Waiting for Commands...
13,318,316 UART: [fwproc] Received command 0x46574c44
13,320,514 UART: [fwproc] Received Image of size 119428 bytes
17,443,608 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,520,111 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,593,324 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,924,656 >>> mbox cmd response: success
17,928,282 UART: [afmc] ++
17,928,878 UART: [afmc] CDI.KEYID = 6
17,929,795 UART: [afmc] SUBJECT.KEYID = 7
17,931,015 UART: [afmc] AUTHORITY.KEYID = 5
21,244,333 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,539,447 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,541,723 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,556,171 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,570,879 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,585,295 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,606,357 UART: [afmc] --
23,609,308 UART: [cold-reset] --
23,613,932 UART: [state] Locking Datavault
23,620,644 UART: [state] Locking PCR0, PCR1 and PCR31
23,622,347 UART: [state] Locking ICCM
23,625,045 UART: [exit] Launching FMC @ 0x40000130
23,633,444 UART:
23,633,682 UART: Running Caliptra FMC ...
23,634,786 UART:
23,634,951 UART: [state] CFI Enabled
23,643,329 UART: [fht] FMC Alias Private Key: 7
25,983,705 UART: [art] Extend RT PCRs Done
25,984,940 UART: [art] Lock RT PCRs Done
25,986,683 UART: [art] Populate DV Done
25,992,284 UART: [fht] FMC Alias Private Key: 7
25,993,784 UART: [art] Derive CDI
25,994,531 UART: [art] Store in slot 0x4
26,037,018 UART: [art] Derive Key Pair
26,038,034 UART: [art] Store priv key in slot 0x5
29,280,500 UART: [art] Derive Key Pair - Done
29,293,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,574,140 UART: [art] Erasing AUTHORITY.KEYID = 7
31,575,652 UART: [art] PUB.X = C84C368B4367D6ECF88B8D9DCE611B84743065AD8E20B43716E5B346A8B7F8C897620184DA99056463081782712583CA
31,582,883 UART: [art] PUB.Y = 46A9AFA745F5D544862BCAC0E2AE090FF1D0D8FD948F22E4F285FE94A63E1134E5104D737E4CD85CAE1A6BA37511CD38
31,590,140 UART: [art] SIG.R = 7823FFCC9F02E1B34C13E83E8822A317FAABD61516270D643BD277864690AB82D63B5A2EB5EC55A1C3904264474B2160
31,597,536 UART: [art] SIG.S = DB95DE1BB583E2D776CE6B52373452D749A476F7275F97DC4709645CE78CE57F9563EDB490B845F067CB436573FDC8EE
32,903,105 UART: Caliptra RT
32,903,826 UART: [state] CFI Enabled
33,037,034 UART: [rt] RT listening for mailbox commands...
33,038,896 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,068,501 UART: [rt]cmd =0x46504c54, len=4
33,070,040 >>> mbox cmd response data (8 bytes)
33,071,080 UART: [rt] FIPS self test
33,072,032 UART: [kat] ++
33,072,493 UART: [kat] sha1
33,076,719 UART: [kat] SHA2-256
33,078,608 UART: [kat] SHA2-384
33,081,574 UART: [kat] SHA2-512-ACC
33,083,818 UART: [kat] ECC-384
36,326,886 UART: [kat] HMAC-384Kdf
36,332,094 UART: Fatal Error: 0x90030002
36,367,328 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,517,591 >>> mbox cmd response: failed
36,518,224 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,668,129 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
190,122 UART:
190,421 UART: Running Caliptra ROM ...
191,452 UART:
3,866,705 UART: [state] CFI Enabled
3,881,720 UART: [state] LifecycleState = Unprovisioned
3,883,670 UART: [state] DebugLocked = No
3,885,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,890,190 UART: [kat] SHA2-256
4,059,953 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,070,478 UART: [kat] ++
4,070,945 UART: [kat] sha1
4,081,786 UART: [kat] SHA2-256
4,084,489 UART: [kat] SHA2-384
4,090,648 UART: [kat] SHA2-512-ACC
4,093,006 UART: [kat] ECC-384
6,376,045 UART: [kat] HMAC-384Kdf
6,386,820 UART: [kat] LMS
7,576,885 UART: [kat] --
7,580,934 UART: [cold-reset] ++
7,583,353 UART: [fht] Storing FHT @ 0x50003400
7,595,005 UART: [idev] ++
7,595,585 UART: [idev] CDI.KEYID = 6
7,596,611 UART: [idev] SUBJECT.KEYID = 7
7,597,776 UART: [idev] UDS.KEYID = 0
7,599,409 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
7,749,345 UART: [idev] Erasing UDS.KEYID = 0
10,883,411 UART: [idev] Using Sha1 for KeyId Algorithm
10,904,971 UART: [idev] --
10,909,124 UART: [ldev] ++
10,909,730 UART: [ldev] CDI.KEYID = 6
10,910,618 UART: [ldev] SUBJECT.KEYID = 5
10,911,857 UART: [ldev] AUTHORITY.KEYID = 7
10,913,093 UART: [ldev] FE.KEYID = 1
10,924,804 UART: [ldev] Erasing FE.KEYID = 1
14,211,958 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,505,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,519,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,534,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,549,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,568,980 UART: [ldev] --
16,573,707 UART: [fwproc] Waiting for Commands...
16,576,729 UART: [fwproc] Received command 0x46574c44
16,578,922 UART: [fwproc] Received Image of size 119428 bytes
20,692,829 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,775,444 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,848,635 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
21,180,397 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
4,125,028 ready_for_fw is high
4,125,587 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,173,546 >>> mbox cmd response: success
23,814,453 UART:
23,814,891 UART: Running Caliptra FMC ...
23,816,022 UART:
23,816,194 UART: [state] CFI Enabled
23,824,000 UART: [fht] FMC Alias Private Key: 7
26,163,156 UART: [art] Extend RT PCRs Done
26,164,401 UART: [art] Lock RT PCRs Done
26,165,810 UART: [art] Populate DV Done
26,170,979 UART: [fht] FMC Alias Private Key: 7
26,172,637 UART: [art] Derive CDI
26,173,383 UART: [art] Store in slot 0x4
26,215,772 UART: [art] Derive Key Pair
26,216,822 UART: [art] Store priv key in slot 0x5
29,458,649 UART: [art] Derive Key Pair - Done
29,471,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,752,530 UART: [art] Erasing AUTHORITY.KEYID = 7
31,754,046 UART: [art] PUB.X = 0091BCBD703E48CD91DBDBA2B04A791F2721A38E1DD4EE2579FEBC6961E04C3BF98764D6E1C42A4758210A71EDB20AA5
31,761,327 UART: [art] PUB.Y = 981FDDAFD2D8F66E96E68EE621D4D37723C87EA593C76128F1DF7038C8FE08C93023404C2B2FFFD1D6579C8599FD45E8
31,768,628 UART: [art] SIG.R = 59D154DD7C265D1B6CC7FEEC6B757BF90659C8A733787EBD7D95EEB936A749AE549D8AE5508484FA186E691C211F0419
31,775,979 UART: [art] SIG.S = 41C28D93B83E31387734BF180550170D8EC7C0E7DD58135237425DDF364EAF3CB5EFB66D915447B5856583D36D74B8BF
33,080,659 UART: Caliptra RT
33,081,384 UART: [state] CFI Enabled
33,214,985 UART: [rt] RT listening for mailbox commands...
33,216,862 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,246,569 UART: [rt]cmd =0x46504c54, len=4
33,248,343 >>> mbox cmd response data (8 bytes)
33,249,297 UART: [rt] FIPS self test
33,250,247 UART: [kat] ++
33,250,702 UART: [kat] sha1
33,255,116 UART: [kat] SHA2-256
33,257,005 UART: [kat] SHA2-384
33,259,977 UART: [kat] SHA2-512-ACC
33,262,222 UART: [kat] ECC-384
36,505,246 UART: [kat] HMAC-384Kdf
36,510,627 UART: Fatal Error: 0x90030002
36,545,872 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,695,893 >>> mbox cmd response: failed
36,696,532 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,846,805 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
7,218,910 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
21,259,132 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
192,438 UART:
192,805 UART: Running Caliptra ROM ...
193,926 UART:
194,073 UART: [state] CFI Enabled
261,974 UART: [state] LifecycleState = Unprovisioned
263,903 UART: [state] DebugLocked = No
265,075 UART: [state] WD Timer not started. Device not locked for debugging
268,300 UART: [kat] SHA2-256
447,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,741 UART: [kat] ++
459,190 UART: [kat] sha1
471,312 UART: [kat] SHA2-256
474,031 UART: [kat] SHA2-384
479,618 UART: [kat] SHA2-512-ACC
482,007 UART: [kat] ECC-384
2,927,162 UART: [kat] HMAC-384Kdf
2,945,083 UART: [kat] LMS
3,421,601 UART: [kat] --
3,426,949 UART: [cold-reset] ++
3,428,464 UART: [fht] FHT @ 0x50003400
3,439,812 UART: [idev] ++
3,440,391 UART: [idev] CDI.KEYID = 6
3,441,279 UART: [idev] SUBJECT.KEYID = 7
3,442,531 UART: [idev] UDS.KEYID = 0
3,443,510 ready_for_fw is high
3,443,728 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,593,946 UART: [idev] Erasing UDS.KEYID = 0
5,959,045 UART: [idev] Sha1 KeyId Algorithm
5,983,729 UART: [idev] --
5,989,758 UART: [ldev] ++
5,990,344 UART: [ldev] CDI.KEYID = 6
5,991,231 UART: [ldev] SUBJECT.KEYID = 5
5,992,469 UART: [ldev] AUTHORITY.KEYID = 7
5,993,711 UART: [ldev] FE.KEYID = 1
6,032,640 UART: [ldev] Erasing FE.KEYID = 1
8,534,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,254,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,269,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,285,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,301,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,322,485 UART: [ldev] --
10,328,512 UART: [fwproc] Wait for Commands...
10,331,694 UART: [fwproc] Recv command 0x46574c44
10,333,683 UART: [fwproc] Recv'd Img size: 119428 bytes
13,830,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,909,332 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,982,351 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,314,086 >>> mbox cmd response: success
14,317,483 UART: [afmc] ++
14,318,077 UART: [afmc] CDI.KEYID = 6
14,318,969 UART: [afmc] SUBJECT.KEYID = 7
14,320,244 UART: [afmc] AUTHORITY.KEYID = 5
16,848,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,431 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,591,256 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,607,288 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,622,875 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,648,082 UART: [afmc] --
18,651,144 UART: [cold-reset] --
18,654,199 UART: [state] Locking Datavault
18,659,130 UART: [state] Locking PCR0, PCR1 and PCR31
18,660,842 UART: [state] Locking ICCM
18,662,377 UART: [exit] Launching FMC @ 0x40000130
18,670,798 UART:
18,671,042 UART: Running Caliptra FMC ...
18,672,151 UART:
18,672,313 UART: [state] CFI Enabled
18,729,983 UART: [fht] FMC Alias Private Key: 7
20,496,533 UART: [art] Extend RT PCRs Done
20,497,759 UART: [art] Lock RT PCRs Done
20,499,308 UART: [art] Populate DV Done
20,504,886 UART: [fht] FMC Alias Private Key: 7
20,506,436 UART: [art] Derive CDI
20,507,176 UART: [art] Store in slot 0x4
20,562,383 UART: [art] Derive Key Pair
20,563,426 UART: [art] Store priv key in slot 0x5
23,026,764 UART: [art] Derive Key Pair - Done
23,039,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,752,080 UART: [art] Erasing AUTHORITY.KEYID = 7
24,753,611 UART: [art] PUB.X = 0B0A64F781041C9FA3082D1610E3DEB09EC94851F7919886BB570A6E6120D05DD87416ADF56A7DA0275C952938075337
24,760,832 UART: [art] PUB.Y = 1387CCF07DB40803751C7804DFD28514C6F9432DC710727E35B06437C725599A32B4BCDB7DF40F2DF1CC9B2026544948
24,768,094 UART: [art] SIG.R = F159B7A5675B059CEDC27ED7B5DB8298DB60AEC067FB2DBE558757ED8F1A4D059182FF6F8E8EBED26D9185A1C87F9B15
24,775,469 UART: [art] SIG.S = A65477CF0B1D7303C9E9E50CD0A29AEC084D2C1A3A936B760A1E9E1235EB1C4F39B98F368AFB158C7D6F5E4D5CF37AF6
25,754,325 UART: Caliptra RT
25,755,044 UART: [state] CFI Enabled
25,934,835 UART: [rt] RT listening for mailbox commands...
25,936,693 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,966,439 UART: [rt]cmd =0x46504c54, len=4
25,967,966 >>> mbox cmd response data (8 bytes)
25,968,993 UART: [rt] FIPS self test
25,969,950 UART: [kat] ++
25,970,404 UART: [kat] sha1
25,974,701 UART: [kat] SHA2-256
25,976,636 UART: [kat] SHA2-384
25,979,555 UART: [kat] SHA2-512-ACC
25,981,844 UART: [kat] ECC-384
28,426,868 UART: [kat] HMAC-384Kdf
28,452,850 UART: Fatal Error: 0x90030002
28,488,196 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,638,161 >>> mbox cmd response: failed
28,638,820 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,788,718 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,065 UART:
190,361 UART: Running Caliptra ROM ...
191,475 UART:
191,632 UART: [state] CFI Enabled
247,369 UART: [state] LifecycleState = Unprovisioned
249,338 UART: [state] DebugLocked = No
251,047 UART: [state] WD Timer not started. Device not locked for debugging
254,379 UART: [kat] SHA2-256
434,000 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
444,826 UART: [kat] ++
445,275 UART: [kat] sha1
457,721 UART: [kat] SHA2-256
460,404 UART: [kat] SHA2-384
466,657 UART: [kat] SHA2-512-ACC
469,056 UART: [kat] ECC-384
2,930,312 UART: [kat] HMAC-384Kdf
2,961,341 UART: [kat] LMS
3,437,821 UART: [kat] --
3,441,872 UART: [cold-reset] ++
3,443,212 UART: [fht] FHT @ 0x50003400
3,453,613 UART: [idev] ++
3,454,179 UART: [idev] CDI.KEYID = 6
3,455,121 UART: [idev] SUBJECT.KEYID = 7
3,456,410 UART: [idev] UDS.KEYID = 0
3,457,905 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,608,001 UART: [idev] Erasing UDS.KEYID = 0
5,977,111 UART: [idev] Sha1 KeyId Algorithm
6,000,708 UART: [idev] --
6,005,283 UART: [ldev] ++
6,005,869 UART: [ldev] CDI.KEYID = 6
6,006,762 UART: [ldev] SUBJECT.KEYID = 5
6,007,984 UART: [ldev] AUTHORITY.KEYID = 7
6,009,230 UART: [ldev] FE.KEYID = 1
6,047,816 UART: [ldev] Erasing FE.KEYID = 1
8,552,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,289,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,305,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,321,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,336,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,357,679 UART: [ldev] --
10,362,305 UART: [fwproc] Wait for Commands...
10,364,682 UART: [fwproc] Recv command 0x46574c44
10,366,730 UART: [fwproc] Recv'd Img size: 119428 bytes
13,863,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,275 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,295 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,345,012 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,460,749 ready_for_fw is high
3,461,317 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,225,251 >>> mbox cmd response: success
18,516,418 UART:
18,516,841 UART: Running Caliptra FMC ...
18,517,972 UART:
18,518,129 UART: [state] CFI Enabled
18,584,753 UART: [fht] FMC Alias Private Key: 7
20,351,499 UART: [art] Extend RT PCRs Done
20,352,718 UART: [art] Lock RT PCRs Done
20,354,069 UART: [art] Populate DV Done
20,359,612 UART: [fht] FMC Alias Private Key: 7
20,361,157 UART: [art] Derive CDI
20,361,897 UART: [art] Store in slot 0x4
20,417,589 UART: [art] Derive Key Pair
20,418,636 UART: [art] Store priv key in slot 0x5
22,881,401 UART: [art] Derive Key Pair - Done
22,894,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,606,294 UART: [art] Erasing AUTHORITY.KEYID = 7
24,607,778 UART: [art] PUB.X = 0C7C16F493D5745E3F42B891ABE4366E65BF832702549440A0FD0EEE194B1E56EEC2E6891D8D17810057BB55A447475A
24,614,994 UART: [art] PUB.Y = C4E2CC0B2D93D8CED9CA312A1C3E4205B0C88A8028816FECCFA2CC865CB073228AE5136E0A4EE4CB50B33C8E4C0B23DC
24,622,310 UART: [art] SIG.R = 92AA8E0D0C18684D87CF7ED839026CD1D6FB9E25221597479F8A03696B5E180D96393BBF8A1D4F57D0F8FB9CCFCB0802
24,629,665 UART: [art] SIG.S = 31FC9180009BCD80176EFB840AEECA88EAF676AD8A38B4684A509410B54CE6635F0FCFF755C7764B51728C50D2778CC4
25,608,662 UART: Caliptra RT
25,609,381 UART: [state] CFI Enabled
25,788,809 UART: [rt] RT listening for mailbox commands...
25,790,680 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,820,270 UART: [rt]cmd =0x46504c54, len=4
25,821,634 >>> mbox cmd response data (8 bytes)
25,822,791 UART: [rt] FIPS self test
25,823,734 UART: [kat] ++
25,824,188 UART: [kat] sha1
25,828,592 UART: [kat] SHA2-256
25,830,478 UART: [kat] SHA2-384
25,833,527 UART: [kat] SHA2-512-ACC
25,835,775 UART: [kat] ECC-384
28,280,225 UART: [kat] HMAC-384Kdf
28,306,200 UART: Fatal Error: 0x90030002
28,341,591 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,491,572 >>> mbox cmd response: failed
28,492,188 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,642,132 >>> mbox cmd response: failed
Initializing fuses
936 writing to cptra_bootfsm_go
3,446,118 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,216,250 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,538 UART:
192,906 UART: Running Caliptra ROM ...
194,120 UART:
603,683 UART: [state] CFI Enabled
616,220 UART: [state] LifecycleState = Unprovisioned
618,174 UART: [state] DebugLocked = No
619,711 UART: [state] WD Timer not started. Device not locked for debugging
623,264 UART: [kat] SHA2-256
802,956 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,681 UART: [kat] ++
814,211 UART: [kat] sha1
824,947 UART: [kat] SHA2-256
827,639 UART: [kat] SHA2-384
833,143 UART: [kat] SHA2-512-ACC
835,612 UART: [kat] ECC-384
3,278,101 UART: [kat] HMAC-384Kdf
3,289,648 UART: [kat] LMS
3,766,103 UART: [kat] --
3,770,317 UART: [cold-reset] ++
3,772,046 UART: [fht] FHT @ 0x50003400
3,783,900 UART: [idev] ++
3,784,475 UART: [idev] CDI.KEYID = 6
3,785,394 UART: [idev] SUBJECT.KEYID = 7
3,786,650 UART: [idev] UDS.KEYID = 0
3,787,581 ready_for_fw is high
3,787,805 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,937,810 UART: [idev] Erasing UDS.KEYID = 0
6,263,778 UART: [idev] Sha1 KeyId Algorithm
6,287,472 UART: [idev] --
6,290,806 UART: [ldev] ++
6,291,391 UART: [ldev] CDI.KEYID = 6
6,292,309 UART: [ldev] SUBJECT.KEYID = 5
6,293,474 UART: [ldev] AUTHORITY.KEYID = 7
6,294,769 UART: [ldev] FE.KEYID = 1
6,307,147 UART: [ldev] Erasing FE.KEYID = 1
8,787,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,002 UART: [ldev] --
10,581,579 UART: [fwproc] Wait for Commands...
10,583,960 UART: [fwproc] Recv command 0x46574c44
10,585,952 UART: [fwproc] Recv'd Img size: 119428 bytes
14,079,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,159,974 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,009 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,563,829 >>> mbox cmd response: success
14,567,159 UART: [afmc] ++
14,567,756 UART: [afmc] CDI.KEYID = 6
14,568,726 UART: [afmc] SUBJECT.KEYID = 7
14,569,946 UART: [afmc] AUTHORITY.KEYID = 5
17,069,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,421 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,224 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,328 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,930 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,015 UART: [afmc] --
18,868,380 UART: [cold-reset] --
18,872,377 UART: [state] Locking Datavault
18,878,226 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,990 UART: [state] Locking ICCM
18,881,550 UART: [exit] Launching FMC @ 0x40000130
18,890,004 UART:
18,890,252 UART: Running Caliptra FMC ...
18,891,356 UART:
18,891,522 UART: [state] CFI Enabled
18,900,004 UART: [fht] FMC Alias Private Key: 7
20,666,640 UART: [art] Extend RT PCRs Done
20,667,877 UART: [art] Lock RT PCRs Done
20,669,640 UART: [art] Populate DV Done
20,675,118 UART: [fht] FMC Alias Private Key: 7
20,676,700 UART: [art] Derive CDI
20,677,461 UART: [art] Store in slot 0x4
20,720,441 UART: [art] Derive Key Pair
20,721,463 UART: [art] Store priv key in slot 0x5
23,148,999 UART: [art] Derive Key Pair - Done
23,161,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,868,275 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,792 UART: [art] PUB.X = FABE36483EDFC0F9737603BCD7532154B79D5036E64A4456824643C3653240E20E5BB38A5910630F515BE848AD65A4FC
24,876,997 UART: [art] PUB.Y = 20209EC7A8A8E97D4A228F092C0465FF4D9467AC26FEDFB094818218F6DD71B53BBF73911C1D4D77A8E37DA75A846383
24,884,300 UART: [art] SIG.R = 1848AEE35BB9E90B567908215D21A7C1D4B2BCEB76CC9E93CF220C50B7F84FA46DB641792EC26DFD9E116A5FB36D4DB2
24,891,704 UART: [art] SIG.S = CCC03A8C3ACA529E3F31581C633A0E2D9492DE5E45C346363A25679AE5C912F92CD14914F1428AF19DD5F3B55411FD22
25,869,812 UART: Caliptra RT
25,870,531 UART: [state] CFI Enabled
26,003,490 UART: [rt] RT listening for mailbox commands...
26,005,354 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,035,238 UART: [rt]cmd =0x46504c54, len=4
26,036,800 >>> mbox cmd response data (8 bytes)
26,037,726 UART: [rt] FIPS self test
26,038,680 UART: [kat] ++
26,039,164 UART: [kat] sha1
26,043,495 UART: [kat] SHA2-256
26,045,435 UART: [kat] SHA2-384
26,048,507 UART: [kat] SHA2-512-ACC
26,050,753 UART: [kat] ECC-384
28,478,161 UART: [kat] HMAC-384Kdf
28,483,533 UART: Fatal Error: 0x90030002
28,518,903 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,668,785 >>> mbox cmd response: failed
28,669,458 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,819,385 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,132 UART:
190,427 UART: Running Caliptra ROM ...
191,456 UART:
11,715,771 UART: [state] CFI Enabled
11,726,500 UART: [state] LifecycleState = Unprovisioned
11,728,415 UART: [state] DebugLocked = No
11,729,836 UART: [state] WD Timer not started. Device not locked for debugging
11,732,877 UART: [kat] SHA2-256
11,912,482 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,923,283 UART: [kat] ++
11,923,739 UART: [kat] sha1
11,934,787 UART: [kat] SHA2-256
11,937,516 UART: [kat] SHA2-384
11,942,996 UART: [kat] SHA2-512-ACC
11,945,359 UART: [kat] ECC-384
14,388,945 UART: [kat] HMAC-384Kdf
14,401,232 UART: [kat] LMS
14,877,750 UART: [kat] --
14,882,273 UART: [cold-reset] ++
14,884,707 UART: [fht] FHT @ 0x50003400
14,895,786 UART: [idev] ++
14,896,391 UART: [idev] CDI.KEYID = 6
14,897,306 UART: [idev] SUBJECT.KEYID = 7
14,898,526 UART: [idev] UDS.KEYID = 0
14,900,110 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,049,884 UART: [idev] Erasing UDS.KEYID = 0
17,374,683 UART: [idev] Sha1 KeyId Algorithm
17,398,804 UART: [idev] --
17,404,632 UART: [ldev] ++
17,405,202 UART: [ldev] CDI.KEYID = 6
17,406,110 UART: [ldev] SUBJECT.KEYID = 5
17,407,333 UART: [ldev] AUTHORITY.KEYID = 7
17,408,511 UART: [ldev] FE.KEYID = 1
17,419,811 UART: [ldev] Erasing FE.KEYID = 1
19,901,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,618,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,634,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,650,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,665,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,687,934 UART: [ldev] --
21,692,617 UART: [fwproc] Wait for Commands...
21,694,182 UART: [fwproc] Recv command 0x46574c44
21,696,721 UART: [fwproc] Recv'd Img size: 119428 bytes
25,192,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,274,997 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,348,019 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,679,074 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
3,782,716 ready_for_fw is high
3,783,127 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,471,616 >>> mbox cmd response: success
18,722,288 UART:
18,722,716 UART: Running Caliptra FMC ...
18,723,867 UART:
18,724,036 UART: [state] CFI Enabled
18,732,007 UART: [fht] FMC Alias Private Key: 7
20,497,825 UART: [art] Extend RT PCRs Done
20,499,055 UART: [art] Lock RT PCRs Done
20,500,582 UART: [art] Populate DV Done
20,505,794 UART: [fht] FMC Alias Private Key: 7
20,507,399 UART: [art] Derive CDI
20,508,217 UART: [art] Store in slot 0x4
20,550,820 UART: [art] Derive Key Pair
20,551,866 UART: [art] Store priv key in slot 0x5
22,979,114 UART: [art] Derive Key Pair - Done
22,992,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,698,248 UART: [art] Erasing AUTHORITY.KEYID = 7
24,699,765 UART: [art] PUB.X = 3D85F4F7CDF618C4B7480445D909B9198CF3D3D49C68BE356C732F925B48C8AC64C3D1B0B55C7909BB37FFD321EFF575
24,707,043 UART: [art] PUB.Y = 8514E66319A6DFB6A78114B4B602D8708CC0213FF90CC4BFE89228F74BE8C258778A3F3B136DAA439FD42BEB15A12A25
24,714,286 UART: [art] SIG.R = 876844EBCAF5984862F92B02637A7B99438AFEF806FD766DB79A3AC03A1101D4BDA9697D53C65196E203949379B65DE8
24,721,699 UART: [art] SIG.S = A64A5C8768919DD943EB77302F5A3344FF2FB1235ABB0857B924F9B00AF98AE6C5E08801BE4E402E64187C5582973EAE
25,700,285 UART: Caliptra RT
25,700,990 UART: [state] CFI Enabled
25,833,939 UART: [rt] RT listening for mailbox commands...
25,835,801 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,865,384 UART: [rt]cmd =0x46504c54, len=4
25,866,803 >>> mbox cmd response data (8 bytes)
25,868,244 UART: [rt] FIPS self test
25,869,193 UART: [kat] ++
25,869,644 UART: [kat] sha1
25,874,098 UART: [kat] SHA2-256
25,875,977 UART: [kat] SHA2-384
25,879,076 UART: [kat] SHA2-512-ACC
25,881,311 UART: [kat] ECC-384
28,308,828 UART: [kat] HMAC-384Kdf
28,314,216 UART: Fatal Error: 0x90030002
28,349,437 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,499,777 >>> mbox cmd response: failed
28,500,404 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,650,347 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
15,052,276 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,728,081 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,918 writing to cptra_bootfsm_go
193,181 UART:
193,557 UART: Running Caliptra ROM ...
194,745 UART:
194,900 UART: [state] CFI Enabled
264,727 UART: [state] LifecycleState = Unprovisioned
267,143 UART: [state] DebugLocked = No
269,820 UART: [state] WD Timer not started. Device not locked for debugging
273,873 UART: [kat] SHA2-256
463,721 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,525 UART: [kat] ++
474,978 UART: [kat] sha1
486,590 UART: [kat] SHA2-256
489,646 UART: [kat] SHA2-384
495,086 UART: [kat] SHA2-512-ACC
497,681 UART: [kat] ECC-384
2,945,538 UART: [kat] HMAC-384Kdf
2,974,293 UART: [kat] LMS
3,506,107 UART: [kat] --
3,509,181 UART: [cold-reset] ++
3,510,341 UART: [fht] FHT @ 0x50003400
3,522,905 UART: [idev] ++
3,523,587 UART: [idev] CDI.KEYID = 6
3,524,521 UART: [idev] SUBJECT.KEYID = 7
3,525,706 UART: [idev] UDS.KEYID = 0
3,526,636 ready_for_fw is high
3,526,875 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,968 UART: [idev] Erasing UDS.KEYID = 0
6,032,225 UART: [idev] Sha1 KeyId Algorithm
6,055,791 UART: [idev] --
6,061,858 UART: [ldev] ++
6,062,554 UART: [ldev] CDI.KEYID = 6
6,063,446 UART: [ldev] SUBJECT.KEYID = 5
6,064,555 UART: [ldev] AUTHORITY.KEYID = 7
6,065,872 UART: [ldev] FE.KEYID = 1
6,102,595 UART: [ldev] Erasing FE.KEYID = 1
8,608,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,348,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,363,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,163 UART: [ldev] --
10,419,452 UART: [fwproc] Wait for Commands...
10,421,127 UART: [fwproc] Recv command 0x46574c44
10,423,454 UART: [fwproc] Recv'd Img size: 119428 bytes
13,934,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,014,491 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,138,117 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,703,459 >>> mbox cmd response: success
14,706,760 UART: [afmc] ++
14,707,490 UART: [afmc] CDI.KEYID = 6
14,708,679 UART: [afmc] SUBJECT.KEYID = 7
14,710,177 UART: [afmc] AUTHORITY.KEYID = 5
17,255,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,000,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,001,926 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,017,044 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,032,200 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,047,118 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,071,362 UART: [afmc] --
19,074,382 UART: [cold-reset] --
19,080,683 UART: [state] Locking Datavault
19,085,728 UART: [state] Locking PCR0, PCR1 and PCR31
19,087,934 UART: [state] Locking ICCM
19,089,884 UART: [exit] Launching FMC @ 0x40000130
19,098,560 UART:
19,098,823 UART: Running Caliptra FMC ...
19,099,936 UART:
19,100,113 UART: [state] CFI Enabled
19,156,208 UART: [fht] FMC Alias Private Key: 7
20,923,083 UART: [art] Extend RT PCRs Done
20,924,305 UART: [art] Lock RT PCRs Done
20,925,883 UART: [art] Populate DV Done
20,931,085 UART: [fht] FMC Alias Private Key: 7
20,932,639 UART: [art] Derive CDI
20,933,462 UART: [art] Store in slot 0x4
20,989,105 UART: [art] Derive Key Pair
20,990,143 UART: [art] Store priv key in slot 0x5
23,453,652 UART: [art] Derive Key Pair - Done
23,466,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,178,958 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,473 UART: [art] PUB.X = 3944262A8599F53D6CC350E774D8473D151476C3C5E0529874EFD36FB940065C01CC2AF93A75D62E4887CD7D83C7A803
25,187,750 UART: [art] PUB.Y = 6ADD75BA8A7CFCCF80063F2BCABBE6E13BCFFD574D1E2FDC893CF311C45164834C4902BF554A194C266E50060C694D08
25,194,998 UART: [art] SIG.R = B64D452DCD19B54AA32D8F34BF96E54E6FF7F3DE250057E2A4479374B5D2FAD9D94793EA68201F780294B62830147B26
25,202,383 UART: [art] SIG.S = 04D6713F24715EA3239765104F01AC1F57F47381DDAF4DBD7A44965567356C25E4497D70918E1D22EABE082398F6E2D9
26,181,422 UART: Caliptra RT
26,182,119 UART: [state] CFI Enabled
26,362,689 UART: [rt] RT listening for mailbox commands...
26,364,552 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,394,609 UART: [rt]cmd =0x46504c54, len=4
26,396,080 >>> mbox cmd response data (8 bytes)
26,396,793 UART: [rt] FIPS self test
26,397,738 UART: [kat] ++
26,398,195 UART: [kat] sha1
26,402,474 UART: [kat] SHA2-256
26,404,401 UART: [kat] SHA2-384
26,407,163 UART: [kat] SHA2-512-ACC
26,409,424 UART: [kat] ECC-384
28,854,190 UART: [kat] HMAC-384Kdf
28,880,826 UART: Fatal Error: 0x90030002
28,916,194 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,066,508 >>> mbox cmd response: failed
29,067,180 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,217,082 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,102 UART:
190,398 UART: Running Caliptra ROM ...
191,426 UART:
191,570 UART: [state] CFI Enabled
248,877 UART: [state] LifecycleState = Unprovisioned
251,295 UART: [state] DebugLocked = No
254,162 UART: [state] WD Timer not started. Device not locked for debugging
258,287 UART: [kat] SHA2-256
448,203 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
458,981 UART: [kat] ++
459,433 UART: [kat] sha1
470,845 UART: [kat] SHA2-256
473,837 UART: [kat] SHA2-384
481,396 UART: [kat] SHA2-512-ACC
483,968 UART: [kat] ECC-384
2,931,839 UART: [kat] HMAC-384Kdf
2,955,131 UART: [kat] LMS
3,486,895 UART: [kat] --
3,490,648 UART: [cold-reset] ++
3,493,296 UART: [fht] FHT @ 0x50003400
3,505,636 UART: [idev] ++
3,506,364 UART: [idev] CDI.KEYID = 6
3,507,287 UART: [idev] SUBJECT.KEYID = 7
3,508,458 UART: [idev] UDS.KEYID = 0
3,510,008 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,659,972 UART: [idev] Erasing UDS.KEYID = 0
6,013,768 UART: [idev] Sha1 KeyId Algorithm
6,035,481 UART: [idev] --
6,039,642 UART: [ldev] ++
6,040,333 UART: [ldev] CDI.KEYID = 6
6,041,250 UART: [ldev] SUBJECT.KEYID = 5
6,042,420 UART: [ldev] AUTHORITY.KEYID = 7
6,043,580 UART: [ldev] FE.KEYID = 1
6,084,935 UART: [ldev] Erasing FE.KEYID = 1
8,593,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,308 UART: [ldev] --
10,398,906 UART: [fwproc] Wait for Commands...
10,401,994 UART: [fwproc] Recv command 0x46574c44
10,404,317 UART: [fwproc] Recv'd Img size: 119428 bytes
13,913,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,893 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,516 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,682,718 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,441,130 ready_for_fw is high
3,441,785 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,838,886 >>> mbox cmd response: success
19,136,404 UART:
19,136,807 UART: Running Caliptra FMC ...
19,137,974 UART:
19,138,141 UART: [state] CFI Enabled
19,203,552 UART: [fht] FMC Alias Private Key: 7
20,970,723 UART: [art] Extend RT PCRs Done
20,971,943 UART: [art] Lock RT PCRs Done
20,973,575 UART: [art] Populate DV Done
20,978,999 UART: [fht] FMC Alias Private Key: 7
20,980,616 UART: [art] Derive CDI
20,981,442 UART: [art] Store in slot 0x4
21,036,325 UART: [art] Derive Key Pair
21,037,328 UART: [art] Store priv key in slot 0x5
23,500,716 UART: [art] Derive Key Pair - Done
23,513,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,313 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,827 UART: [art] PUB.X = F309D9A47EB8EE8ED324AEAA1C57BC1FBF57400A026A48CC99AF9D5195ABE5710C8CB279A34BED1DE16612BE8FCD80E9
25,235,099 UART: [art] PUB.Y = 54FDE38D4BBDA7D1FAF802912FBB75417E3E0FF9581B07FA1D028012E795B7ACEBA183C2C5CD46B6AB86D5D7420D6ECF
25,242,407 UART: [art] SIG.R = A793F9479B003BF0150054302044BFC28B6216B021779E8458FD322CA0365F5BBA79CB181C2DF26BA9303D70D1EC44BC
25,249,766 UART: [art] SIG.S = CEEF48A1DC291019D4B782E5B528E86203FB7D9C06C689D07C1E7912553D7B63782B4A5F28F7815D961C2901FE403827
26,228,968 UART: Caliptra RT
26,229,663 UART: [state] CFI Enabled
26,408,859 UART: [rt] RT listening for mailbox commands...
26,410,835 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,440,635 UART: [rt]cmd =0x46504c54, len=4
26,442,379 >>> mbox cmd response data (8 bytes)
26,443,487 UART: [rt] FIPS self test
26,444,434 UART: [kat] ++
26,444,888 UART: [kat] sha1
26,449,289 UART: [kat] SHA2-256
26,451,174 UART: [kat] SHA2-384
26,454,249 UART: [kat] SHA2-512-ACC
26,456,496 UART: [kat] ECC-384
28,901,386 UART: [kat] HMAC-384Kdf
28,927,521 UART: Fatal Error: 0x90030002
28,962,761 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,112,733 >>> mbox cmd response: failed
29,113,353 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,263,309 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,404,132 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,803,169 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
192,611 UART:
192,973 UART: Running Caliptra ROM ...
194,102 UART:
603,844 UART: [state] CFI Enabled
617,460 UART: [state] LifecycleState = Unprovisioned
619,916 UART: [state] DebugLocked = No
622,441 UART: [state] WD Timer not started. Device not locked for debugging
626,782 UART: [kat] SHA2-256
816,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,448 UART: [kat] ++
828,062 UART: [kat] sha1
839,069 UART: [kat] SHA2-256
842,087 UART: [kat] SHA2-384
846,966 UART: [kat] SHA2-512-ACC
849,560 UART: [kat] ECC-384
3,289,459 UART: [kat] HMAC-384Kdf
3,301,695 UART: [kat] LMS
3,833,513 UART: [kat] --
3,836,445 UART: [cold-reset] ++
3,838,455 UART: [fht] FHT @ 0x50003400
3,850,220 UART: [idev] ++
3,850,868 UART: [idev] CDI.KEYID = 6
3,851,908 UART: [idev] SUBJECT.KEYID = 7
3,853,086 UART: [idev] UDS.KEYID = 0
3,854,024 ready_for_fw is high
3,854,280 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,004,341 UART: [idev] Erasing UDS.KEYID = 0
6,330,050 UART: [idev] Sha1 KeyId Algorithm
6,353,128 UART: [idev] --
6,359,429 UART: [ldev] ++
6,360,123 UART: [ldev] CDI.KEYID = 6
6,361,037 UART: [ldev] SUBJECT.KEYID = 5
6,362,260 UART: [ldev] AUTHORITY.KEYID = 7
6,363,441 UART: [ldev] FE.KEYID = 1
6,374,448 UART: [ldev] Erasing FE.KEYID = 1
8,854,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,874 UART: [ldev] --
10,646,031 UART: [fwproc] Wait for Commands...
10,647,980 UART: [fwproc] Recv command 0x46574c44
10,650,256 UART: [fwproc] Recv'd Img size: 119428 bytes
14,152,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,023 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,620 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,922,001 >>> mbox cmd response: success
14,925,860 UART: [afmc] ++
14,926,570 UART: [afmc] CDI.KEYID = 6
14,927,710 UART: [afmc] SUBJECT.KEYID = 7
14,929,206 UART: [afmc] AUTHORITY.KEYID = 5
17,440,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,164,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,166,031 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,181,157 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,196,323 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,211,226 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,234,963 UART: [afmc] --
19,238,706 UART: [cold-reset] --
19,242,641 UART: [state] Locking Datavault
19,245,741 UART: [state] Locking PCR0, PCR1 and PCR31
19,247,941 UART: [state] Locking ICCM
19,249,753 UART: [exit] Launching FMC @ 0x40000130
19,258,430 UART:
19,258,672 UART: Running Caliptra FMC ...
19,259,776 UART:
19,259,940 UART: [state] CFI Enabled
19,267,931 UART: [fht] FMC Alias Private Key: 7
21,034,312 UART: [art] Extend RT PCRs Done
21,035,532 UART: [art] Lock RT PCRs Done
21,037,168 UART: [art] Populate DV Done
21,042,640 UART: [fht] FMC Alias Private Key: 7
21,044,146 UART: [art] Derive CDI
21,044,919 UART: [art] Store in slot 0x4
21,087,786 UART: [art] Derive Key Pair
21,088,837 UART: [art] Store priv key in slot 0x5
23,515,497 UART: [art] Derive Key Pair - Done
23,528,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,234,871 UART: [art] Erasing AUTHORITY.KEYID = 7
25,236,377 UART: [art] PUB.X = 4C9E70868E472929B27F4BE602382CF4DD9C0352459E106DE3122E6D13C654B7BB0F9DC90D02A06D879A52478A5C3AE5
25,243,634 UART: [art] PUB.Y = 3ACB12AAFF5EBB3F2E4FA3AF5C6CCD80C84AE0BF86DB700E3F7C0EEC72841B258EFD32BFD2E84D4159F804BAF49B3A8F
25,250,915 UART: [art] SIG.R = 7582ADC9B2282D8D18E1D8C98AB79BBE71FAE0A85C7853731AF8EE8F6F483E33E23A038D301268DC59BDE9169B7C0403
25,258,358 UART: [art] SIG.S = A342F9FB3D3EE1015644F398FB32099C4959482043DA2B164BBAAC2D83C3EF02E510A1879D087682FF94DC1BA42A1A16
26,236,973 UART: Caliptra RT
26,237,678 UART: [state] CFI Enabled
26,370,663 UART: [rt] RT listening for mailbox commands...
26,372,518 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,402,501 UART: [rt]cmd =0x46504c54, len=4
26,404,102 >>> mbox cmd response data (8 bytes)
26,405,135 UART: [rt] FIPS self test
26,406,080 UART: [kat] ++
26,406,539 UART: [kat] sha1
26,410,835 UART: [kat] SHA2-256
26,412,714 UART: [kat] SHA2-384
26,415,731 UART: [kat] SHA2-512-ACC
26,417,971 UART: [kat] ECC-384
28,845,551 UART: [kat] HMAC-384Kdf
28,850,968 UART: Fatal Error: 0x90030002
28,886,171 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,036,137 >>> mbox cmd response: failed
29,036,760 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,186,656 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,108 UART:
190,401 UART: Running Caliptra ROM ...
191,513 UART:
11,348,616 UART: [state] CFI Enabled
11,363,322 UART: [state] LifecycleState = Unprovisioned
11,365,682 UART: [state] DebugLocked = No
11,368,101 UART: [state] WD Timer not started. Device not locked for debugging
11,372,462 UART: [kat] SHA2-256
11,562,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,573,120 UART: [kat] ++
11,573,675 UART: [kat] sha1
11,585,163 UART: [kat] SHA2-256
11,588,186 UART: [kat] SHA2-384
11,594,829 UART: [kat] SHA2-512-ACC
11,597,410 UART: [kat] ECC-384
14,041,449 UART: [kat] HMAC-384Kdf
14,054,403 UART: [kat] LMS
14,586,217 UART: [kat] --
14,591,346 UART: [cold-reset] ++
14,592,742 UART: [fht] FHT @ 0x50003400
14,604,163 UART: [idev] ++
14,604,878 UART: [idev] CDI.KEYID = 6
14,605,827 UART: [idev] SUBJECT.KEYID = 7
14,607,045 UART: [idev] UDS.KEYID = 0
14,608,550 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,758,394 UART: [idev] Erasing UDS.KEYID = 0
17,082,978 UART: [idev] Sha1 KeyId Algorithm
17,105,637 UART: [idev] --
17,110,821 UART: [ldev] ++
17,111,503 UART: [ldev] CDI.KEYID = 6
17,112,389 UART: [ldev] SUBJECT.KEYID = 5
17,113,605 UART: [ldev] AUTHORITY.KEYID = 7
17,114,870 UART: [ldev] FE.KEYID = 1
17,124,518 UART: [ldev] Erasing FE.KEYID = 1
19,600,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,321,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,336,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,351,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,366,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,387,412 UART: [ldev] --
21,392,958 UART: [fwproc] Wait for Commands...
21,394,844 UART: [fwproc] Recv command 0x46574c44
21,397,165 UART: [fwproc] Recv'd Img size: 119428 bytes
24,901,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,978,224 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,101,871 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,667,939 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,751,511 ready_for_fw is high
3,751,951 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,050,426 >>> mbox cmd response: success
19,306,993 UART:
19,307,409 UART: Running Caliptra FMC ...
19,308,523 UART:
19,308,681 UART: [state] CFI Enabled
19,316,373 UART: [fht] FMC Alias Private Key: 7
21,083,286 UART: [art] Extend RT PCRs Done
21,084,518 UART: [art] Lock RT PCRs Done
21,086,450 UART: [art] Populate DV Done
21,091,718 UART: [fht] FMC Alias Private Key: 7
21,093,319 UART: [art] Derive CDI
21,094,065 UART: [art] Store in slot 0x4
21,136,942 UART: [art] Derive Key Pair
21,137,991 UART: [art] Store priv key in slot 0x5
23,565,177 UART: [art] Derive Key Pair - Done
23,578,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,284,605 UART: [art] Erasing AUTHORITY.KEYID = 7
25,286,125 UART: [art] PUB.X = DB4F4C49A4A6B8A1DF81DAD4E53E8001FBA969939E0889049F35F589C0BA60024E86DD25B78C2C3DBC75604E14C68E90
25,293,359 UART: [art] PUB.Y = 7A23FC52604F886D27C18275BA374C07313E7E0BADF882FF5C8F38B2E7E8CD8FB2E389FBE6FAB47E4C831FDEF1383889
25,300,584 UART: [art] SIG.R = BD287D0B61712E98AFC5CC2FE85803553E9E15F3CDA4D7705AD8BDE1642F4F83FBABA310FCD1548312A734CCF357086B
25,308,025 UART: [art] SIG.S = DEBD3CAA26B50894C72F7041A609711A00F538E5DBEE51DFF994F231A8CE62176AFF35243E69E12EB266EA3DB9384704
26,286,987 UART: Caliptra RT
26,287,684 UART: [state] CFI Enabled
26,421,020 UART: [rt] RT listening for mailbox commands...
26,422,876 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,452,468 UART: [rt]cmd =0x46504c54, len=4
26,454,001 >>> mbox cmd response data (8 bytes)
26,455,500 UART: [rt] FIPS self test
26,456,454 UART: [kat] ++
26,456,912 UART: [kat] sha1
26,461,249 UART: [kat] SHA2-256
26,463,168 UART: [kat] SHA2-384
26,466,198 UART: [kat] SHA2-512-ACC
26,468,452 UART: [kat] ECC-384
28,895,992 UART: [kat] HMAC-384Kdf
28,901,633 UART: Fatal Error: 0x90030002
28,936,883 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,086,833 >>> mbox cmd response: failed
29,087,492 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,237,377 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
14,448,624 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,743,129 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,051 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,677 UART: [kat] SHA2-256
881,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,723 UART: [kat] ++
885,875 UART: [kat] sha1
890,347 UART: [kat] SHA2-256
892,285 UART: [kat] SHA2-384
895,048 UART: [kat] SHA2-512-ACC
896,949 UART: [kat] ECC-384
902,764 UART: [kat] HMAC-384Kdf
907,394 UART: [kat] LMS
1,475,590 UART: [kat] --
1,476,481 UART: [cold-reset] ++
1,477,051 UART: [fht] Storing FHT @ 0x50003400
1,480,040 UART: [idev] ++
1,480,208 UART: [idev] CDI.KEYID = 6
1,480,568 UART: [idev] SUBJECT.KEYID = 7
1,480,992 UART: [idev] UDS.KEYID = 0
1,481,337 ready_for_fw is high
1,481,337 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,006 UART: [idev] Erasing UDS.KEYID = 0
1,505,430 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,236 UART: [idev] --
1,515,083 UART: [ldev] ++
1,515,251 UART: [ldev] CDI.KEYID = 6
1,515,614 UART: [ldev] SUBJECT.KEYID = 5
1,516,040 UART: [ldev] AUTHORITY.KEYID = 7
1,516,503 UART: [ldev] FE.KEYID = 1
1,521,603 UART: [ldev] Erasing FE.KEYID = 1
1,546,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,788 UART: [ldev] --
1,586,067 UART: [fwproc] Waiting for Commands...
1,586,858 UART: [fwproc] Received command 0x46574c44
1,587,649 UART: [fwproc] Received Image of size 119428 bytes
2,941,963 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,589 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,807 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,558 >>> mbox cmd response: success
3,143,810 UART: [afmc] ++
3,143,978 UART: [afmc] CDI.KEYID = 6
3,144,340 UART: [afmc] SUBJECT.KEYID = 7
3,144,765 UART: [afmc] AUTHORITY.KEYID = 5
3,180,212 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,330 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,110 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,819 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,702 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,385 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,189 UART: [afmc] --
3,223,273 UART: [cold-reset] --
3,224,125 UART: [state] Locking Datavault
3,225,200 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,804 UART: [state] Locking ICCM
3,226,414 UART: [exit] Launching FMC @ 0x40000130
3,231,744 UART:
3,231,760 UART: Running Caliptra FMC ...
3,232,168 UART:
3,232,222 UART: [state] CFI Enabled
3,242,536 UART: [fht] FMC Alias Private Key: 7
3,361,432 UART: [art] Extend RT PCRs Done
3,361,860 UART: [art] Lock RT PCRs Done
3,363,548 UART: [art] Populate DV Done
3,371,725 UART: [fht] FMC Alias Private Key: 7
3,372,725 UART: [art] Derive CDI
3,373,005 UART: [art] Store in slot 0x4
3,458,763 UART: [art] Derive Key Pair
3,459,123 UART: [art] Store priv key in slot 0x5
3,472,782 UART: [art] Derive Key Pair - Done
3,487,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,291 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,056 UART: [art] PUB.X = 643C3B9C0F6098E9A9E20650E9ED7671617A99F00C41DD6ED47F969455B547785440481A3B371682E3F2F7EA2030E357
3,509,809 UART: [art] PUB.Y = 1F8199FCF46C299CB9C57FAB35BE75E842BF259099FF644E558EB9D8033246A0F1A925B19527AFE276B656C68025C8D9
3,516,760 UART: [art] SIG.R = E811D5CBAD63C53394C5DB62D496CB600F15DD56D739BB3A13612C41476B9AB4FC8A0854AAB5C6B1FE4FBBDCDB78019F
3,523,543 UART: [art] SIG.S = 4041AEDD84CE640F490F864F2D34D2E2183997626E6885C2F916DB79D1DCF4B28F4B7B34980B57DF5554DFEBE025D661
3,546,984 UART: Caliptra RT
3,547,235 UART: [state] CFI Enabled
3,668,367 UART: [rt] RT listening for mailbox commands...
3,669,030 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,789 UART: [rt]cmd =0x46504c54, len=4
3,699,865 >>> mbox cmd response data (8 bytes)
3,699,994 UART: [rt] FIPS self test
3,700,322 UART: [kat] ++
3,700,474 UART: [kat] sha1
3,704,742 UART: [kat] SHA2-256
3,706,764 UART: [kat] SHA2-384
3,709,619 UART: [kat] SHA2-512-ACC
3,711,546 UART: [kat] ECC-384
3,721,364 UART: [kat] HMAC-384Kdf
3,726,095 UART: Fatal Error: 0x90030002
3,727,634 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,727,639 >>> mbox cmd response: failed
3,727,639 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,727,644 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,669 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,321 UART: [kat] SHA2-256
882,252 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,367 UART: [kat] ++
886,519 UART: [kat] sha1
890,757 UART: [kat] SHA2-256
892,695 UART: [kat] SHA2-384
895,550 UART: [kat] SHA2-512-ACC
897,451 UART: [kat] ECC-384
903,160 UART: [kat] HMAC-384Kdf
907,754 UART: [kat] LMS
1,475,950 UART: [kat] --
1,477,101 UART: [cold-reset] ++
1,477,653 UART: [fht] Storing FHT @ 0x50003400
1,480,366 UART: [idev] ++
1,480,534 UART: [idev] CDI.KEYID = 6
1,480,894 UART: [idev] SUBJECT.KEYID = 7
1,481,318 UART: [idev] UDS.KEYID = 0
1,481,663 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,770 UART: [idev] Erasing UDS.KEYID = 0
1,506,642 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,354 UART: [idev] --
1,516,341 UART: [ldev] ++
1,516,509 UART: [ldev] CDI.KEYID = 6
1,516,872 UART: [ldev] SUBJECT.KEYID = 5
1,517,298 UART: [ldev] AUTHORITY.KEYID = 7
1,517,761 UART: [ldev] FE.KEYID = 1
1,522,957 UART: [ldev] Erasing FE.KEYID = 1
1,548,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,650 UART: [ldev] --
1,587,163 UART: [fwproc] Waiting for Commands...
1,587,896 UART: [fwproc] Received command 0x46574c44
1,588,687 UART: [fwproc] Received Image of size 119428 bytes
2,943,509 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,243 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,461 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,150 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,957 ready_for_fw is high
1,362,957 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,660 >>> mbox cmd response: success
3,051,675 UART:
3,051,691 UART: Running Caliptra FMC ...
3,052,099 UART:
3,052,153 UART: [state] CFI Enabled
3,062,721 UART: [fht] FMC Alias Private Key: 7
3,182,233 UART: [art] Extend RT PCRs Done
3,182,661 UART: [art] Lock RT PCRs Done
3,184,511 UART: [art] Populate DV Done
3,192,764 UART: [fht] FMC Alias Private Key: 7
3,193,750 UART: [art] Derive CDI
3,194,030 UART: [art] Store in slot 0x4
3,279,852 UART: [art] Derive Key Pair
3,280,212 UART: [art] Store priv key in slot 0x5
3,293,189 UART: [art] Derive Key Pair - Done
3,307,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,322,795 UART: [art] Erasing AUTHORITY.KEYID = 7
3,323,560 UART: [art] PUB.X = E247A57BB48FF0CBEE1DD110FBB59DE23478E5BF226A9C351394BC51F87FE5B3CE8EA0C33E2ED066D4ED1A7E50E87801
3,330,349 UART: [art] PUB.Y = A781C93E253BADBB450BD3D05B8AD78E7DF58D102E8FE216762A9E86A6A0D8198DB43E618AE29DB25BA3E84AA2800088
3,337,288 UART: [art] SIG.R = 009D206DF856DC010DCF1558AA8F16E2BF5EA24490258B23FAE1F165CF7E3A4C0E0EEC27EB7B48533BDFD894340D24B5
3,344,037 UART: [art] SIG.S = 88CB93A5C45E79C761E9F7EC14E14A3C11E353B5CE1FE3131E31B1BA1E59BB86B5169AA216BE9CC76B3EFE899E922696
3,368,445 UART: Caliptra RT
3,368,696 UART: [state] CFI Enabled
3,489,333 UART: [rt] RT listening for mailbox commands...
3,489,996 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,745 UART: [rt]cmd =0x46504c54, len=4
3,520,961 >>> mbox cmd response data (8 bytes)
3,521,086 UART: [rt] FIPS self test
3,521,414 UART: [kat] ++
3,521,566 UART: [kat] sha1
3,525,884 UART: [kat] SHA2-256
3,527,906 UART: [kat] SHA2-384
3,530,755 UART: [kat] SHA2-512-ACC
3,532,682 UART: [kat] ECC-384
3,542,680 UART: [kat] HMAC-384Kdf
3,547,107 UART: Fatal Error: 0x90030002
3,548,646 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,548,651 >>> mbox cmd response: failed
3,548,651 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,548,656 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,937 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,630 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,568 UART: [kat] SHA2-256
882,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,614 UART: [kat] ++
886,766 UART: [kat] sha1
890,892 UART: [kat] SHA2-256
892,830 UART: [kat] SHA2-384
895,607 UART: [kat] SHA2-512-ACC
897,508 UART: [kat] ECC-384
902,867 UART: [kat] HMAC-384Kdf
907,453 UART: [kat] LMS
1,475,649 UART: [kat] --
1,476,484 UART: [cold-reset] ++
1,476,998 UART: [fht] Storing FHT @ 0x50003400
1,479,569 UART: [idev] ++
1,479,737 UART: [idev] CDI.KEYID = 6
1,480,097 UART: [idev] SUBJECT.KEYID = 7
1,480,521 UART: [idev] UDS.KEYID = 0
1,480,866 ready_for_fw is high
1,480,866 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,589 UART: [idev] Erasing UDS.KEYID = 0
1,504,965 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,673 UART: [idev] --
1,514,824 UART: [ldev] ++
1,514,992 UART: [ldev] CDI.KEYID = 6
1,515,355 UART: [ldev] SUBJECT.KEYID = 5
1,515,781 UART: [ldev] AUTHORITY.KEYID = 7
1,516,244 UART: [ldev] FE.KEYID = 1
1,521,644 UART: [ldev] Erasing FE.KEYID = 1
1,547,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,047 UART: [ldev] --
1,586,552 UART: [fwproc] Waiting for Commands...
1,587,267 UART: [fwproc] Received command 0x46574c44
1,588,058 UART: [fwproc] Received Image of size 119428 bytes
2,942,078 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,566 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,784 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,445 >>> mbox cmd response: success
3,143,467 UART: [afmc] ++
3,143,635 UART: [afmc] CDI.KEYID = 6
3,143,997 UART: [afmc] SUBJECT.KEYID = 7
3,144,422 UART: [afmc] AUTHORITY.KEYID = 5
3,180,525 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,657 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,437 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,146 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,029 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,712 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,476 UART: [afmc] --
3,223,412 UART: [cold-reset] --
3,224,384 UART: [state] Locking Datavault
3,225,497 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,101 UART: [state] Locking ICCM
3,226,607 UART: [exit] Launching FMC @ 0x40000130
3,231,937 UART:
3,231,953 UART: Running Caliptra FMC ...
3,232,361 UART:
3,232,504 UART: [state] CFI Enabled
3,243,174 UART: [fht] FMC Alias Private Key: 7
3,361,978 UART: [art] Extend RT PCRs Done
3,362,406 UART: [art] Lock RT PCRs Done
3,364,210 UART: [art] Populate DV Done
3,372,493 UART: [fht] FMC Alias Private Key: 7
3,373,475 UART: [art] Derive CDI
3,373,755 UART: [art] Store in slot 0x4
3,459,275 UART: [art] Derive Key Pair
3,459,635 UART: [art] Store priv key in slot 0x5
3,472,818 UART: [art] Derive Key Pair - Done
3,487,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,406 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,171 UART: [art] PUB.X = 14BFE8F24D32770BF2943710D78622C6EAB91F38C66C059F8EC5C9ECAA24A3CAC297E5D785E611F8C0855A10DFC70BA9
3,510,946 UART: [art] PUB.Y = 0BFD0B436D23EB90C7E8F7665D6A9C28480949F109EEB2C1BB17B3D93BEA8039DBDA54DD1502AD63884FE30D12C76330
3,517,890 UART: [art] SIG.R = 24EACEA7749413B7B4ED390BDEAA2FA9DD164B053AB45FCCBFEB6CCE53C63CBE3B5CD9D9A7CB54AB6961C0CE91AEF814
3,524,692 UART: [art] SIG.S = 5D45797D2D03832AC41F9720DED7052AD72BD8D9DE732939A0E058858A18C38851E868877BD5C1C5800A21C62BDCC30D
3,547,636 UART: Caliptra RT
3,547,979 UART: [state] CFI Enabled
3,668,364 UART: [rt] RT listening for mailbox commands...
3,669,027 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,760 UART: [rt]cmd =0x46504c54, len=4
3,699,794 >>> mbox cmd response data (8 bytes)
3,700,063 UART: [rt] FIPS self test
3,700,391 UART: [kat] ++
3,700,543 UART: [kat] sha1
3,704,727 UART: [kat] SHA2-256
3,706,749 UART: [kat] SHA2-384
3,709,388 UART: [kat] SHA2-512-ACC
3,711,315 UART: [kat] ECC-384
3,721,097 UART: [kat] HMAC-384Kdf
3,725,824 UART: Fatal Error: 0x90030002
3,727,363 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,727,368 >>> mbox cmd response: failed
3,727,368 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,727,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,488 UART: [kat] SHA2-256
882,419 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,534 UART: [kat] ++
886,686 UART: [kat] sha1
890,738 UART: [kat] SHA2-256
892,676 UART: [kat] SHA2-384
895,415 UART: [kat] SHA2-512-ACC
897,316 UART: [kat] ECC-384
902,913 UART: [kat] HMAC-384Kdf
907,717 UART: [kat] LMS
1,475,913 UART: [kat] --
1,476,682 UART: [cold-reset] ++
1,477,216 UART: [fht] Storing FHT @ 0x50003400
1,479,989 UART: [idev] ++
1,480,157 UART: [idev] CDI.KEYID = 6
1,480,517 UART: [idev] SUBJECT.KEYID = 7
1,480,941 UART: [idev] UDS.KEYID = 0
1,481,286 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,967 UART: [idev] Erasing UDS.KEYID = 0
1,505,487 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,941 UART: [idev] --
1,515,090 UART: [ldev] ++
1,515,258 UART: [ldev] CDI.KEYID = 6
1,515,621 UART: [ldev] SUBJECT.KEYID = 5
1,516,047 UART: [ldev] AUTHORITY.KEYID = 7
1,516,510 UART: [ldev] FE.KEYID = 1
1,522,002 UART: [ldev] Erasing FE.KEYID = 1
1,548,049 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,631 UART: [ldev] --
1,586,934 UART: [fwproc] Waiting for Commands...
1,587,803 UART: [fwproc] Received command 0x46574c44
1,588,594 UART: [fwproc] Received Image of size 119428 bytes
2,943,052 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,256 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,474 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,049 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,758 ready_for_fw is high
1,362,758 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,007 >>> mbox cmd response: success
3,055,554 UART:
3,055,570 UART: Running Caliptra FMC ...
3,055,978 UART:
3,056,121 UART: [state] CFI Enabled
3,066,567 UART: [fht] FMC Alias Private Key: 7
3,185,769 UART: [art] Extend RT PCRs Done
3,186,197 UART: [art] Lock RT PCRs Done
3,187,659 UART: [art] Populate DV Done
3,195,816 UART: [fht] FMC Alias Private Key: 7
3,196,748 UART: [art] Derive CDI
3,197,028 UART: [art] Store in slot 0x4
3,282,562 UART: [art] Derive Key Pair
3,282,922 UART: [art] Store priv key in slot 0x5
3,295,731 UART: [art] Derive Key Pair - Done
3,310,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,890 UART: [art] PUB.X = DBAAA39A49096296712F4BEDBD83BA88A46C2833123CDBE300D2C236F34FE3765EC73ADF012744E6B802D7BEFB4690E6
3,333,643 UART: [art] PUB.Y = 5B1780B393C9E74449988B536A43538846F4DD961093FD7880FAD5E7F56CC1E699BDB6E20F629FAC23D18C24D78358B6
3,340,590 UART: [art] SIG.R = EDE99F8743AAD4FC8B47554E356BC5FD156345FA50E34CF565625E9ABCD160C07D62C2B4165757E1A5C3817D60AC2E1A
3,347,372 UART: [art] SIG.S = FB823ED269A32D7F3DFCBF9B163388F62815649B855E1EB18123C4361E73440796B865B6899316CC7DEE4E7FB39A8CBB
3,371,143 UART: Caliptra RT
3,371,486 UART: [state] CFI Enabled
3,492,001 UART: [rt] RT listening for mailbox commands...
3,492,664 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,555 UART: [rt]cmd =0x46504c54, len=4
3,523,797 >>> mbox cmd response data (8 bytes)
3,524,144 UART: [rt] FIPS self test
3,524,472 UART: [kat] ++
3,524,624 UART: [kat] sha1
3,528,858 UART: [kat] SHA2-256
3,530,880 UART: [kat] SHA2-384
3,533,781 UART: [kat] SHA2-512-ACC
3,535,708 UART: [kat] ECC-384
3,546,134 UART: [kat] HMAC-384Kdf
3,550,827 UART: Fatal Error: 0x90030002
3,552,366 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,552,371 >>> mbox cmd response: failed
3,552,371 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,552,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,302 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,435 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,618 UART: [kat] SHA2-256
901,558 UART: [kat] SHA2-384
904,287 UART: [kat] SHA2-512-ACC
906,188 UART: [kat] ECC-384
915,859 UART: [kat] HMAC-384Kdf
920,415 UART: [kat] LMS
1,168,727 UART: [kat] --
1,169,660 UART: [cold-reset] ++
1,170,214 UART: [fht] FHT @ 0x50003400
1,172,842 UART: [idev] ++
1,173,010 UART: [idev] CDI.KEYID = 6
1,173,371 UART: [idev] SUBJECT.KEYID = 7
1,173,796 UART: [idev] UDS.KEYID = 0
1,174,142 ready_for_fw is high
1,174,142 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,198,701 UART: [idev] Sha1 KeyId Algorithm
1,207,541 UART: [idev] --
1,208,624 UART: [ldev] ++
1,208,792 UART: [ldev] CDI.KEYID = 6
1,209,156 UART: [ldev] SUBJECT.KEYID = 5
1,209,583 UART: [ldev] AUTHORITY.KEYID = 7
1,210,046 UART: [ldev] FE.KEYID = 1
1,214,850 UART: [ldev] Erasing FE.KEYID = 1
1,241,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,132 UART: [ldev] --
1,280,427 UART: [fwproc] Wait for Commands...
1,281,030 UART: [fwproc] Recv command 0x46574c44
1,281,763 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,662,897 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,072 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,763 >>> mbox cmd response: success
2,836,967 UART: [afmc] ++
2,837,135 UART: [afmc] CDI.KEYID = 6
2,837,498 UART: [afmc] SUBJECT.KEYID = 7
2,837,924 UART: [afmc] AUTHORITY.KEYID = 5
2,874,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,393 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,103 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,984 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,685 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,544 UART: [afmc] --
2,917,537 UART: [cold-reset] --
2,918,285 UART: [state] Locking Datavault
2,919,228 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,832 UART: [state] Locking ICCM
2,920,412 UART: [exit] Launching FMC @ 0x40000130
2,925,742 UART:
2,925,758 UART: Running Caliptra FMC ...
2,926,166 UART:
2,926,220 UART: [state] CFI Enabled
2,936,646 UART: [fht] FMC Alias Private Key: 7
3,055,208 UART: [art] Extend RT PCRs Done
3,055,636 UART: [art] Lock RT PCRs Done
3,057,252 UART: [art] Populate DV Done
3,065,433 UART: [fht] FMC Alias Private Key: 7
3,066,599 UART: [art] Derive CDI
3,066,879 UART: [art] Store in slot 0x4
3,152,484 UART: [art] Derive Key Pair
3,152,844 UART: [art] Store priv key in slot 0x5
3,165,640 UART: [art] Derive Key Pair - Done
3,180,373 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,195,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,196,447 UART: [art] PUB.X = 76A744AEDD89442D52AE81EB30E020CF311E1C6FD7D240F2C23F1BDE72907D814BE640BBFCD72CEF3272A073531EC07A
3,203,233 UART: [art] PUB.Y = F8AA05C16C0E7EAF6B64CF6F60B2CBCD8C695CA84FB1059CF49FE2B8CD1706854C918C9E21F105C7AF464020FF05191E
3,210,183 UART: [art] SIG.R = 65CA4D1AF3108837551AD77397E2BA3DB44491221EB7A45076AE8A0EFE964190F2DFA97F39C09822C79CF8CF96D785EF
3,216,958 UART: [art] SIG.S = C26DB5F9AE2EEFE376DAA7FF2DF2F1DBB79A52390E1C7D21710EDB0C9F46C131E65C2ECE17444E20E32ED09E7926292A
3,240,879 UART: Caliptra RT
3,241,130 UART: [state] CFI Enabled
3,360,013 UART: [rt] RT listening for mailbox commands...
3,360,676 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,390,539 UART: [rt]cmd =0x46504c54, len=4
3,391,673 >>> mbox cmd response data (8 bytes)
3,392,028 UART: [rt] FIPS self test
3,392,356 UART: [kat] ++
3,392,508 UART: [kat] sha1
3,396,652 UART: [kat] SHA2-256
3,398,674 UART: [kat] SHA2-384
3,401,485 UART: [kat] SHA2-512-ACC
3,403,412 UART: [kat] ECC-384
3,412,896 UART: [kat] HMAC-384Kdf
3,417,538 UART: Fatal Error: 0x90030002
3,419,077 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,082 >>> mbox cmd response: failed
3,419,082 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,584 UART: [state] LifecycleState = Unprovisioned
85,239 UART: [state] DebugLocked = No
85,937 UART: [state] WD Timer not started. Device not locked for debugging
87,230 UART: [kat] SHA2-256
890,780 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,884 UART: [kat] ++
895,036 UART: [kat] sha1
899,352 UART: [kat] SHA2-256
901,292 UART: [kat] SHA2-384
903,971 UART: [kat] SHA2-512-ACC
905,872 UART: [kat] ECC-384
915,289 UART: [kat] HMAC-384Kdf
919,937 UART: [kat] LMS
1,168,249 UART: [kat] --
1,169,156 UART: [cold-reset] ++
1,169,556 UART: [fht] FHT @ 0x50003400
1,172,106 UART: [idev] ++
1,172,274 UART: [idev] CDI.KEYID = 6
1,172,635 UART: [idev] SUBJECT.KEYID = 7
1,173,060 UART: [idev] UDS.KEYID = 0
1,173,406 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,085 UART: [idev] Erasing UDS.KEYID = 0
1,198,315 UART: [idev] Sha1 KeyId Algorithm
1,207,331 UART: [idev] --
1,208,306 UART: [ldev] ++
1,208,474 UART: [ldev] CDI.KEYID = 6
1,208,838 UART: [ldev] SUBJECT.KEYID = 5
1,209,265 UART: [ldev] AUTHORITY.KEYID = 7
1,209,728 UART: [ldev] FE.KEYID = 1
1,215,034 UART: [ldev] Erasing FE.KEYID = 1
1,241,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,180 UART: [ldev] --
1,280,589 UART: [fwproc] Wait for Commands...
1,281,402 UART: [fwproc] Recv command 0x46574c44
1,282,135 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,445 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,620 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,313 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,658 ready_for_fw is high
1,059,658 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,362 >>> mbox cmd response: success
2,754,273 UART:
2,754,289 UART: Running Caliptra FMC ...
2,754,697 UART:
2,754,751 UART: [state] CFI Enabled
2,765,685 UART: [fht] FMC Alias Private Key: 7
2,884,669 UART: [art] Extend RT PCRs Done
2,885,097 UART: [art] Lock RT PCRs Done
2,886,689 UART: [art] Populate DV Done
2,894,694 UART: [fht] FMC Alias Private Key: 7
2,895,698 UART: [art] Derive CDI
2,895,978 UART: [art] Store in slot 0x4
2,981,759 UART: [art] Derive Key Pair
2,982,119 UART: [art] Store priv key in slot 0x5
2,995,351 UART: [art] Derive Key Pair - Done
3,010,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,345 UART: [art] PUB.X = 8B07D2479B1744FFFC24F3C88C9F26A16E7D03F030279A5E154C77C95785326578B42423AE46962540C92EDEE3BE1FD9
3,033,109 UART: [art] PUB.Y = 50607AC2E33281FF16F257421B3D68661EDE81F28594FC04FFB3F810DCAC00DA504FF67EDCE0AB3928AC7597BD620A63
3,040,043 UART: [art] SIG.R = 8C01308789A3B0BC6A902E9979E4765174B0578D4AF8A000C52DEF0C5BDF6A5044C77056DC9962715A8E5A7F47200EB3
3,046,782 UART: [art] SIG.S = 21BC2245C8CC725192773457BFA3231228556658E00F655A29BA331D73819DD8681296D37BC586EBADAFBE5AB59D1FA0
3,070,367 UART: Caliptra RT
3,070,618 UART: [state] CFI Enabled
3,189,115 UART: [rt] RT listening for mailbox commands...
3,189,778 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,635 UART: [rt]cmd =0x46504c54, len=4
3,220,727 >>> mbox cmd response data (8 bytes)
3,220,946 UART: [rt] FIPS self test
3,221,274 UART: [kat] ++
3,221,426 UART: [kat] sha1
3,225,552 UART: [kat] SHA2-256
3,227,574 UART: [kat] SHA2-384
3,230,505 UART: [kat] SHA2-512-ACC
3,232,432 UART: [kat] ECC-384
3,241,998 UART: [kat] HMAC-384Kdf
3,246,760 UART: Fatal Error: 0x90030002
3,248,299 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,248,304 >>> mbox cmd response: failed
3,248,304 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,248,309 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,688 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,314 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,839 UART: [kat] ++
895,991 UART: [kat] sha1
900,191 UART: [kat] SHA2-256
902,131 UART: [kat] SHA2-384
904,794 UART: [kat] SHA2-512-ACC
906,695 UART: [kat] ECC-384
916,350 UART: [kat] HMAC-384Kdf
920,994 UART: [kat] LMS
1,169,306 UART: [kat] --
1,170,225 UART: [cold-reset] ++
1,170,761 UART: [fht] FHT @ 0x50003400
1,173,447 UART: [idev] ++
1,173,615 UART: [idev] CDI.KEYID = 6
1,173,976 UART: [idev] SUBJECT.KEYID = 7
1,174,401 UART: [idev] UDS.KEYID = 0
1,174,747 ready_for_fw is high
1,174,747 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,058 UART: [idev] Erasing UDS.KEYID = 0
1,199,500 UART: [idev] Sha1 KeyId Algorithm
1,208,186 UART: [idev] --
1,209,219 UART: [ldev] ++
1,209,387 UART: [ldev] CDI.KEYID = 6
1,209,751 UART: [ldev] SUBJECT.KEYID = 5
1,210,178 UART: [ldev] AUTHORITY.KEYID = 7
1,210,641 UART: [ldev] FE.KEYID = 1
1,215,913 UART: [ldev] Erasing FE.KEYID = 1
1,241,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,169 UART: [ldev] --
1,281,432 UART: [fwproc] Wait for Commands...
1,282,189 UART: [fwproc] Recv command 0x46574c44
1,282,922 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,848 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,023 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,522 >>> mbox cmd response: success
2,839,690 UART: [afmc] ++
2,839,858 UART: [afmc] CDI.KEYID = 6
2,840,221 UART: [afmc] SUBJECT.KEYID = 7
2,840,647 UART: [afmc] AUTHORITY.KEYID = 5
2,876,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,818 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,528 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,409 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,110 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,847 UART: [afmc] --
2,919,718 UART: [cold-reset] --
2,920,530 UART: [state] Locking Datavault
2,921,717 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,321 UART: [state] Locking ICCM
2,922,801 UART: [exit] Launching FMC @ 0x40000130
2,928,131 UART:
2,928,147 UART: Running Caliptra FMC ...
2,928,555 UART:
2,928,698 UART: [state] CFI Enabled
2,939,436 UART: [fht] FMC Alias Private Key: 7
3,058,938 UART: [art] Extend RT PCRs Done
3,059,366 UART: [art] Lock RT PCRs Done
3,060,916 UART: [art] Populate DV Done
3,069,149 UART: [fht] FMC Alias Private Key: 7
3,070,221 UART: [art] Derive CDI
3,070,501 UART: [art] Store in slot 0x4
3,155,944 UART: [art] Derive Key Pair
3,156,304 UART: [art] Store priv key in slot 0x5
3,170,324 UART: [art] Derive Key Pair - Done
3,184,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,377 UART: [art] PUB.X = 0EC1798FFAC6DC51C73EDECD70981D080135669E6591F66575A7074BE5691302BED80FBE7347B365406DFF4DB7F81510
3,208,133 UART: [art] PUB.Y = F5CFE0A4F538C73963E76E41DBCFAF2B534068A86A3A6B1428F182E8553A6305E00C1B41C9A3BE4460F2191E57D62140
3,215,081 UART: [art] SIG.R = E5E44FDD40B5169B5506B96196E31EC0E7880E48D7A6BA568F09FD61DC6E5C2872A070AAC6151C8604BD943E5675915C
3,221,843 UART: [art] SIG.S = 198D38C3D4FAE6092AA665D27610CA13DD4AE687C5F4DF7928ABD40FA7DCD9328D0793F7C752496EDEB1BB6BBE45C87F
3,245,464 UART: Caliptra RT
3,245,807 UART: [state] CFI Enabled
3,363,878 UART: [rt] RT listening for mailbox commands...
3,364,541 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,718 UART: [rt]cmd =0x46504c54, len=4
3,395,914 >>> mbox cmd response data (8 bytes)
3,396,181 UART: [rt] FIPS self test
3,396,509 UART: [kat] ++
3,396,661 UART: [kat] sha1
3,400,805 UART: [kat] SHA2-256
3,402,827 UART: [kat] SHA2-384
3,405,626 UART: [kat] SHA2-512-ACC
3,407,553 UART: [kat] ECC-384
3,417,595 UART: [kat] HMAC-384Kdf
3,422,127 UART: Fatal Error: 0x90030002
3,423,666 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,423,671 >>> mbox cmd response: failed
3,423,671 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,423,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,287 UART: [kat] SHA2-256
891,837 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,941 UART: [kat] ++
896,093 UART: [kat] sha1
900,141 UART: [kat] SHA2-256
902,081 UART: [kat] SHA2-384
904,762 UART: [kat] SHA2-512-ACC
906,663 UART: [kat] ECC-384
916,322 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,225 UART: [cold-reset] ++
1,170,651 UART: [fht] FHT @ 0x50003400
1,173,383 UART: [idev] ++
1,173,551 UART: [idev] CDI.KEYID = 6
1,173,912 UART: [idev] SUBJECT.KEYID = 7
1,174,337 UART: [idev] UDS.KEYID = 0
1,174,683 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,480 UART: [idev] Erasing UDS.KEYID = 0
1,199,374 UART: [idev] Sha1 KeyId Algorithm
1,208,202 UART: [idev] --
1,209,273 UART: [ldev] ++
1,209,441 UART: [ldev] CDI.KEYID = 6
1,209,805 UART: [ldev] SUBJECT.KEYID = 5
1,210,232 UART: [ldev] AUTHORITY.KEYID = 7
1,210,695 UART: [ldev] FE.KEYID = 1
1,215,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,291 UART: [ldev] --
1,281,522 UART: [fwproc] Wait for Commands...
1,282,335 UART: [fwproc] Recv command 0x46574c44
1,283,068 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,934 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,109 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,830 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,729 ready_for_fw is high
1,059,729 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,809 >>> mbox cmd response: success
2,754,500 UART:
2,754,516 UART: Running Caliptra FMC ...
2,754,924 UART:
2,755,067 UART: [state] CFI Enabled
2,765,837 UART: [fht] FMC Alias Private Key: 7
2,884,045 UART: [art] Extend RT PCRs Done
2,884,473 UART: [art] Lock RT PCRs Done
2,885,951 UART: [art] Populate DV Done
2,894,052 UART: [fht] FMC Alias Private Key: 7
2,895,088 UART: [art] Derive CDI
2,895,368 UART: [art] Store in slot 0x4
2,981,487 UART: [art] Derive Key Pair
2,981,847 UART: [art] Store priv key in slot 0x5
2,995,801 UART: [art] Derive Key Pair - Done
3,010,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,420 UART: [art] PUB.X = 199C2BFC6FE564C7FDC7ED3B72D4121A0FEEA3EB7C99740841E5D0EAF5D63B7B9B0B576EECB1BC4B3C73E1E72AD09BA9
3,033,211 UART: [art] PUB.Y = 07E00848490B59A8C029253976B3FAFB5B3135891BE4EFCC576F6ABFDF8AC610E0690D684138C2E2706432B484D13AFD
3,040,153 UART: [art] SIG.R = B7C173A5402888940493B536953D9FB31F36EDE52FB3E920589C6CF595DD2AED19E60BD3AF9759D504666842462E81E2
3,046,912 UART: [art] SIG.S = F8B82C4D613A686B31491324BF9994BD8D4383FB82ACC9070FA3F7FDA5FC2088351C85E407449B9D4F8D7E836B13E539
3,070,887 UART: Caliptra RT
3,071,230 UART: [state] CFI Enabled
3,191,968 UART: [rt] RT listening for mailbox commands...
3,192,631 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,470 UART: [rt]cmd =0x46504c54, len=4
3,223,678 >>> mbox cmd response data (8 bytes)
3,223,927 UART: [rt] FIPS self test
3,224,255 UART: [kat] ++
3,224,407 UART: [kat] sha1
3,228,769 UART: [kat] SHA2-256
3,230,791 UART: [kat] SHA2-384
3,233,590 UART: [kat] SHA2-512-ACC
3,235,517 UART: [kat] ECC-384
3,245,899 UART: [kat] HMAC-384Kdf
3,250,487 UART: Fatal Error: 0x90030002
3,252,026 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,252,031 >>> mbox cmd response: failed
3,252,031 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,252,036 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,799 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,381 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
893,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,449 UART: [kat] ++
897,601 UART: [kat] sha1
901,933 UART: [kat] SHA2-256
903,873 UART: [kat] SHA2-384
906,518 UART: [kat] SHA2-512-ACC
908,419 UART: [kat] ECC-384
918,190 UART: [kat] HMAC-384Kdf
922,822 UART: [kat] LMS
1,171,150 UART: [kat] --
1,171,999 UART: [cold-reset] ++
1,172,427 UART: [fht] FHT @ 0x50003400
1,175,024 UART: [idev] ++
1,175,192 UART: [idev] CDI.KEYID = 6
1,175,552 UART: [idev] SUBJECT.KEYID = 7
1,175,976 UART: [idev] UDS.KEYID = 0
1,176,321 ready_for_fw is high
1,176,321 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,856 UART: [idev] Erasing UDS.KEYID = 0
1,201,351 UART: [idev] Sha1 KeyId Algorithm
1,209,839 UART: [idev] --
1,210,901 UART: [ldev] ++
1,211,069 UART: [ldev] CDI.KEYID = 6
1,211,432 UART: [ldev] SUBJECT.KEYID = 5
1,211,858 UART: [ldev] AUTHORITY.KEYID = 7
1,212,321 UART: [ldev] FE.KEYID = 1
1,217,597 UART: [ldev] Erasing FE.KEYID = 1
1,244,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,943 UART: [ldev] --
1,283,256 UART: [fwproc] Wait for Commands...
1,283,844 UART: [fwproc] Recv command 0x46574c44
1,284,572 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,598 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,768 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,313 >>> mbox cmd response: success
2,841,545 UART: [afmc] ++
2,841,713 UART: [afmc] CDI.KEYID = 6
2,842,075 UART: [afmc] SUBJECT.KEYID = 7
2,842,500 UART: [afmc] AUTHORITY.KEYID = 5
2,877,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,932 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,641 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,524 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,225 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,209 UART: [afmc] --
2,921,153 UART: [cold-reset] --
2,921,815 UART: [state] Locking Datavault
2,923,048 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,652 UART: [state] Locking ICCM
2,924,322 UART: [exit] Launching FMC @ 0x40000130
2,929,652 UART:
2,929,668 UART: Running Caliptra FMC ...
2,930,076 UART:
2,930,130 UART: [state] CFI Enabled
2,940,726 UART: [fht] FMC Alias Private Key: 7
3,060,684 UART: [art] Extend RT PCRs Done
3,061,112 UART: [art] Lock RT PCRs Done
3,062,616 UART: [art] Populate DV Done
3,070,713 UART: [fht] FMC Alias Private Key: 7
3,071,817 UART: [art] Derive CDI
3,072,097 UART: [art] Store in slot 0x4
3,157,678 UART: [art] Derive Key Pair
3,158,038 UART: [art] Store priv key in slot 0x5
3,171,070 UART: [art] Derive Key Pair - Done
3,185,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,363 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,128 UART: [art] PUB.X = 6D6CC1A9103EFF7C7E70FCE9384212B32F9A4B66BE4E3C35830A156FD0A5B10E5FCB67CF91EB1828FA972DFC22F17E44
3,208,910 UART: [art] PUB.Y = CFFE77DCAFC80B67FD102BC6C6542767EDEF79B64F6006A4CFF5484EFBDE1A6E6F4EC4090BD9399C6FFFA5BEC7349A20
3,215,878 UART: [art] SIG.R = D1537659FE7F3312C147D984AB07A6C21BE511D8DDFB2233B31BBC0479D16A434B1825B519D9B868C5817CBDC6E3970B
3,222,645 UART: [art] SIG.S = C2BAE940BFD43E69345796060432EEF9568496FB15C684854F14CDA12EA0CD5DAA739C8770E6EB802A9A83ABD4860090
3,245,995 UART: Caliptra RT
3,246,246 UART: [state] CFI Enabled
3,365,738 UART: [rt] RT listening for mailbox commands...
3,366,401 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,410 UART: [rt]cmd =0x46504c54, len=4
3,397,602 >>> mbox cmd response data (8 bytes)
3,397,929 UART: [rt] FIPS self test
3,398,257 UART: [kat] ++
3,398,409 UART: [kat] sha1
3,402,813 UART: [kat] SHA2-256
3,404,835 UART: [kat] SHA2-384
3,407,818 UART: [kat] SHA2-512-ACC
3,409,745 UART: [kat] ECC-384
3,419,453 UART: [kat] HMAC-384Kdf
3,424,293 UART: Fatal Error: 0x90030002
3,425,832 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,425,837 >>> mbox cmd response: failed
3,425,837 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,425,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
893,338 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,463 UART: [kat] ++
897,615 UART: [kat] sha1
901,899 UART: [kat] SHA2-256
903,839 UART: [kat] SHA2-384
906,580 UART: [kat] SHA2-512-ACC
908,481 UART: [kat] ECC-384
918,180 UART: [kat] HMAC-384Kdf
922,796 UART: [kat] LMS
1,171,124 UART: [kat] --
1,172,007 UART: [cold-reset] ++
1,172,413 UART: [fht] FHT @ 0x50003400
1,175,054 UART: [idev] ++
1,175,222 UART: [idev] CDI.KEYID = 6
1,175,582 UART: [idev] SUBJECT.KEYID = 7
1,176,006 UART: [idev] UDS.KEYID = 0
1,176,351 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,854 UART: [idev] Erasing UDS.KEYID = 0
1,200,643 UART: [idev] Sha1 KeyId Algorithm
1,209,029 UART: [idev] --
1,209,941 UART: [ldev] ++
1,210,109 UART: [ldev] CDI.KEYID = 6
1,210,472 UART: [ldev] SUBJECT.KEYID = 5
1,210,898 UART: [ldev] AUTHORITY.KEYID = 7
1,211,361 UART: [ldev] FE.KEYID = 1
1,216,477 UART: [ldev] Erasing FE.KEYID = 1
1,242,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,919 UART: [ldev] --
1,282,346 UART: [fwproc] Wait for Commands...
1,283,078 UART: [fwproc] Recv command 0x46574c44
1,283,806 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,136 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,306 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,853 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,145 ready_for_fw is high
1,060,145 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,030 >>> mbox cmd response: success
2,754,017 UART:
2,754,033 UART: Running Caliptra FMC ...
2,754,441 UART:
2,754,495 UART: [state] CFI Enabled
2,765,141 UART: [fht] FMC Alias Private Key: 7
2,883,753 UART: [art] Extend RT PCRs Done
2,884,181 UART: [art] Lock RT PCRs Done
2,885,977 UART: [art] Populate DV Done
2,894,364 UART: [fht] FMC Alias Private Key: 7
2,895,392 UART: [art] Derive CDI
2,895,672 UART: [art] Store in slot 0x4
2,981,077 UART: [art] Derive Key Pair
2,981,437 UART: [art] Store priv key in slot 0x5
2,994,669 UART: [art] Derive Key Pair - Done
3,009,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,363 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,128 UART: [art] PUB.X = 6DD18686292F6602427E81910178D05A46E0998D688B790275D0F67FF020A867D3B25A451B086F33643B7D58DE7A9487
3,032,872 UART: [art] PUB.Y = D61139E9F483AA2F585891CCE6B4903F725471706E9B31EDF783165FA8A88D4B009C705BE7F39BE9D7EBF75DD55DF98F
3,039,810 UART: [art] SIG.R = B27514034898CA4551164CBD4DD33E2C8AA66E688C68CD762174AD3F64F29AAACCEFECF18A8F17F8EE6DB9BCC22937B7
3,046,597 UART: [art] SIG.S = 95B7FE81C335A0C514D7619433A35D2122E1BA44D473B727B8F253E3C8B8CA840FB4962E3418A2BB9B8D91A5ED38778F
3,070,448 UART: Caliptra RT
3,070,699 UART: [state] CFI Enabled
3,190,713 UART: [rt] RT listening for mailbox commands...
3,191,376 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,323 UART: [rt]cmd =0x46504c54, len=4
3,222,449 >>> mbox cmd response data (8 bytes)
3,222,624 UART: [rt] FIPS self test
3,222,952 UART: [kat] ++
3,223,104 UART: [kat] sha1
3,227,376 UART: [kat] SHA2-256
3,229,398 UART: [kat] SHA2-384
3,232,217 UART: [kat] SHA2-512-ACC
3,234,144 UART: [kat] ECC-384
3,244,040 UART: [kat] HMAC-384Kdf
3,248,670 UART: Fatal Error: 0x90030002
3,250,209 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,250,214 >>> mbox cmd response: failed
3,250,214 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,250,219 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,173 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,758 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
87,084 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
893,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,006 UART: [kat] ++
898,158 UART: [kat] sha1
902,240 UART: [kat] SHA2-256
904,180 UART: [kat] SHA2-384
906,959 UART: [kat] SHA2-512-ACC
908,860 UART: [kat] ECC-384
918,401 UART: [kat] HMAC-384Kdf
923,189 UART: [kat] LMS
1,171,517 UART: [kat] --
1,172,464 UART: [cold-reset] ++
1,172,996 UART: [fht] FHT @ 0x50003400
1,175,637 UART: [idev] ++
1,175,805 UART: [idev] CDI.KEYID = 6
1,176,165 UART: [idev] SUBJECT.KEYID = 7
1,176,589 UART: [idev] UDS.KEYID = 0
1,176,934 ready_for_fw is high
1,176,934 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,925 UART: [idev] Erasing UDS.KEYID = 0
1,202,264 UART: [idev] Sha1 KeyId Algorithm
1,210,800 UART: [idev] --
1,211,848 UART: [ldev] ++
1,212,016 UART: [ldev] CDI.KEYID = 6
1,212,379 UART: [ldev] SUBJECT.KEYID = 5
1,212,805 UART: [ldev] AUTHORITY.KEYID = 7
1,213,268 UART: [ldev] FE.KEYID = 1
1,218,620 UART: [ldev] Erasing FE.KEYID = 1
1,245,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,380 UART: [ldev] --
1,284,709 UART: [fwproc] Wait for Commands...
1,285,475 UART: [fwproc] Recv command 0x46574c44
1,286,203 UART: [fwproc] Recv'd Img size: 119428 bytes
2,641,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,625 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,795 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,841,440 >>> mbox cmd response: success
2,842,456 UART: [afmc] ++
2,842,624 UART: [afmc] CDI.KEYID = 6
2,842,986 UART: [afmc] SUBJECT.KEYID = 7
2,843,411 UART: [afmc] AUTHORITY.KEYID = 5
2,878,444 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,315 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,901,024 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,907 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,608 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,414 UART: [afmc] --
2,921,306 UART: [cold-reset] --
2,922,238 UART: [state] Locking Datavault
2,923,327 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,931 UART: [state] Locking ICCM
2,924,599 UART: [exit] Launching FMC @ 0x40000130
2,929,929 UART:
2,929,945 UART: Running Caliptra FMC ...
2,930,353 UART:
2,930,496 UART: [state] CFI Enabled
2,940,972 UART: [fht] FMC Alias Private Key: 7
3,060,098 UART: [art] Extend RT PCRs Done
3,060,526 UART: [art] Lock RT PCRs Done
3,062,134 UART: [art] Populate DV Done
3,070,169 UART: [fht] FMC Alias Private Key: 7
3,071,317 UART: [art] Derive CDI
3,071,597 UART: [art] Store in slot 0x4
3,157,628 UART: [art] Derive Key Pair
3,157,988 UART: [art] Store priv key in slot 0x5
3,171,670 UART: [art] Derive Key Pair - Done
3,185,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,245 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,010 UART: [art] PUB.X = 1C26393573D39F4983DDD87EA776E4EABA0F9566637F6B78E33B7DF5BE89D223933C4983D69F65536CB07894E3FAF368
3,208,779 UART: [art] PUB.Y = F9768EC057CD1928222753F4F59D30CDBAE363E8CCD65CBFBC16007EF631E7DD220CE5263B7C7A3492E6A4AEE642ABD3
3,215,722 UART: [art] SIG.R = E637D28ACB6662D5D8968F41F61EB6F271C3899F2EC716B01679D0044164CEE94CD3F2F16440693EA9D8CAB913F3FEF4
3,222,497 UART: [art] SIG.S = 327C1913908A3849F1217A3A6AC4B65D167DA8794AE0E64B1B758ED6CB5AA580670B38FB17B84C46A9864C76944C52FC
3,246,238 UART: Caliptra RT
3,246,581 UART: [state] CFI Enabled
3,366,888 UART: [rt] RT listening for mailbox commands...
3,367,551 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,208 UART: [rt]cmd =0x46504c54, len=4
3,398,280 >>> mbox cmd response data (8 bytes)
3,398,397 UART: [rt] FIPS self test
3,398,725 UART: [kat] ++
3,398,877 UART: [kat] sha1
3,403,119 UART: [kat] SHA2-256
3,405,141 UART: [kat] SHA2-384
3,407,972 UART: [kat] SHA2-512-ACC
3,409,899 UART: [kat] ECC-384
3,420,439 UART: [kat] HMAC-384Kdf
3,425,155 UART: Fatal Error: 0x90030002
3,426,694 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,426,699 >>> mbox cmd response: failed
3,426,699 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,426,704 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
893,351 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,476 UART: [kat] ++
897,628 UART: [kat] sha1
901,936 UART: [kat] SHA2-256
903,876 UART: [kat] SHA2-384
906,569 UART: [kat] SHA2-512-ACC
908,470 UART: [kat] ECC-384
918,231 UART: [kat] HMAC-384Kdf
922,795 UART: [kat] LMS
1,171,123 UART: [kat] --
1,172,000 UART: [cold-reset] ++
1,172,344 UART: [fht] FHT @ 0x50003400
1,174,933 UART: [idev] ++
1,175,101 UART: [idev] CDI.KEYID = 6
1,175,461 UART: [idev] SUBJECT.KEYID = 7
1,175,885 UART: [idev] UDS.KEYID = 0
1,176,230 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,197 UART: [idev] Erasing UDS.KEYID = 0
1,201,610 UART: [idev] Sha1 KeyId Algorithm
1,209,980 UART: [idev] --
1,210,904 UART: [ldev] ++
1,211,072 UART: [ldev] CDI.KEYID = 6
1,211,435 UART: [ldev] SUBJECT.KEYID = 5
1,211,861 UART: [ldev] AUTHORITY.KEYID = 7
1,212,324 UART: [ldev] FE.KEYID = 1
1,217,542 UART: [ldev] Erasing FE.KEYID = 1
1,243,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,076 UART: [ldev] --
1,283,535 UART: [fwproc] Wait for Commands...
1,284,193 UART: [fwproc] Recv command 0x46574c44
1,284,921 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,531 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,701 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,344 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,474 ready_for_fw is high
1,060,474 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,221 >>> mbox cmd response: success
2,752,622 UART:
2,752,638 UART: Running Caliptra FMC ...
2,753,046 UART:
2,753,189 UART: [state] CFI Enabled
2,763,713 UART: [fht] FMC Alias Private Key: 7
2,882,557 UART: [art] Extend RT PCRs Done
2,882,985 UART: [art] Lock RT PCRs Done
2,884,209 UART: [art] Populate DV Done
2,892,280 UART: [fht] FMC Alias Private Key: 7
2,893,392 UART: [art] Derive CDI
2,893,672 UART: [art] Store in slot 0x4
2,979,935 UART: [art] Derive Key Pair
2,980,295 UART: [art] Store priv key in slot 0x5
2,994,261 UART: [art] Derive Key Pair - Done
3,008,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,317 UART: [art] PUB.X = EA18945961497999C222D5AAD7DC5B3BCB5ACE2466D676E7DBDA19358DF7309DC064292C306FC20BDF3E503C5D3A52FD
3,032,098 UART: [art] PUB.Y = DAFFD09B6D9D762C60E27029134ECF973FC36A02C951B5AAAA5373A52C5BEE45F3C1E9C118A944501500D09781866F2E
3,039,031 UART: [art] SIG.R = AC2FD82DAA65B594319980A4E38502D71925EA94C079A308DD1B55D0E4DBA85FA8CF8FF11D93031C787905A3990706A9
3,045,787 UART: [art] SIG.S = 75E54C641C4861FED064661DEDD55BED44AA051F4BBA5174D829288C861C5A30A0303A92A7795B15ADF2E9D1C1F791FB
3,069,338 UART: Caliptra RT
3,069,681 UART: [state] CFI Enabled
3,189,064 UART: [rt] RT listening for mailbox commands...
3,189,727 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,584 UART: [rt]cmd =0x46504c54, len=4
3,220,724 >>> mbox cmd response data (8 bytes)
3,220,907 UART: [rt] FIPS self test
3,221,235 UART: [kat] ++
3,221,387 UART: [kat] sha1
3,225,481 UART: [kat] SHA2-256
3,227,503 UART: [kat] SHA2-384
3,230,404 UART: [kat] SHA2-512-ACC
3,232,331 UART: [kat] ECC-384
3,242,779 UART: [kat] HMAC-384Kdf
3,247,347 UART: Fatal Error: 0x90030002
3,248,886 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,248,891 >>> mbox cmd response: failed
3,248,891 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,248,896 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,946 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,439 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
5,727,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,876,990 >>> mbox cmd response: failed
5,877,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,026,417 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,451,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,315,419 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
5,726,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,876,216 >>> mbox cmd response: failed
5,876,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,025,643 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,430,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,234,036 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
6,067,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,217,549 >>> mbox cmd response: failed
6,218,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,366,989 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
17,271,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,978,254 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
6,068,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,218,694 >>> mbox cmd response: failed
6,219,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,368,109 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
17,278,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,991,766 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
5,731,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,880,940 >>> mbox cmd response: failed
5,881,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,030,385 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,454,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,275,200 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
5,730,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,880,111 >>> mbox cmd response: failed
5,880,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,029,543 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,431,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,274,010 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
6,060,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,210,718 >>> mbox cmd response: failed
6,211,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,360,110 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
17,283,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,981,889 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
6,057,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,207,311 >>> mbox cmd response: failed
6,207,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,356,755 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
17,288,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,005,753 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,492 >>> mbox cmd response: failed
1,096,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,706,312 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,095,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,540 >>> mbox cmd response: failed
1,095,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,820 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,547 >>> mbox cmd response: failed
1,096,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,553 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,811 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,097,151 >>> mbox cmd response: failed
1,097,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,097,157 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,533 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,282 >>> mbox cmd response: failed
1,096,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,288 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,280 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,210 >>> mbox cmd response: failed
1,096,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,216 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,960 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,907 >>> mbox cmd response: failed
1,096,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,295 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,045 >>> mbox cmd response: failed
1,096,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,051 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,753 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,095 UART:
192,451 UART: Running Caliptra ROM ...
193,587 UART:
193,737 UART: [state] CFI Enabled
265,029 UART: [state] LifecycleState = Unprovisioned
266,948 UART: [state] DebugLocked = No
269,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,059 UART: [kat] SHA2-256
443,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,249 UART: [kat] ++
454,698 UART: [kat] sha1
465,219 UART: [kat] SHA2-256
467,954 UART: [kat] SHA2-384
474,166 UART: [kat] SHA2-512-ACC
476,541 UART: [kat] ECC-384
2,768,256 UART: [kat] HMAC-384Kdf
2,799,294 UART: [kat] LMS
3,989,569 UART: [kat] --
3,994,029 UART: [cold-reset] ++
3,994,908 UART: [fht] Storing FHT @ 0x50003400
4,006,611 UART: [idev] ++
4,007,193 UART: [idev] CDI.KEYID = 6
4,008,118 UART: [idev] SUBJECT.KEYID = 7
4,009,380 UART: [idev] UDS.KEYID = 0
4,010,480 ready_for_fw is high
4,010,733 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,000 UART: [idev] Erasing UDS.KEYID = 0
7,349,741 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,631 UART: [idev] --
7,376,387 UART: [ldev] ++
7,376,957 UART: [ldev] CDI.KEYID = 6
7,377,926 UART: [ldev] SUBJECT.KEYID = 5
7,379,167 UART: [ldev] AUTHORITY.KEYID = 7
7,380,404 UART: [ldev] FE.KEYID = 1
7,424,121 UART: [ldev] Erasing FE.KEYID = 1
10,757,760 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,292 UART: [ldev] --
13,140,778 UART: [fwproc] Waiting for Commands...
13,143,524 UART: [fwproc] Received command 0x46574c44
13,145,719 UART: [fwproc] Received Image of size 119428 bytes
17,259,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,334,909 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,408,094 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,740,056 >>> mbox cmd response: success
17,743,486 UART: [afmc] ++
17,744,087 UART: [afmc] CDI.KEYID = 6
17,745,001 UART: [afmc] SUBJECT.KEYID = 7
17,746,282 UART: [afmc] AUTHORITY.KEYID = 5
21,116,044 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,417,424 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,419,729 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,434,161 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,448,853 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,463,271 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,484,415 UART: [afmc] --
23,488,779 UART: [cold-reset] --
23,492,157 UART: [state] Locking Datavault
23,497,191 UART: [state] Locking PCR0, PCR1 and PCR31
23,498,947 UART: [state] Locking ICCM
23,500,131 UART: [exit] Launching FMC @ 0x40000130
23,508,502 UART:
23,508,753 UART: Running Caliptra FMC ...
23,509,857 UART:
23,510,017 UART: [state] CFI Enabled
23,579,906 UART: [fht] FMC Alias Private Key: 7
25,920,898 UART: [art] Extend RT PCRs Done
25,922,151 UART: [art] Lock RT PCRs Done
25,923,861 UART: [art] Populate DV Done
25,929,061 UART: [fht] FMC Alias Private Key: 7
25,930,771 UART: [art] Derive CDI
25,931,590 UART: [art] Store in slot 0x4
25,989,012 UART: [art] Derive Key Pair
25,990,055 UART: [art] Store priv key in slot 0x5
29,282,812 UART: [art] Derive Key Pair - Done
29,295,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,584,982 UART: [art] Erasing AUTHORITY.KEYID = 7
31,586,518 UART: [art] PUB.X = 490A0A307D03C5055B7068C16DB289B9B5549F78D95E75A6371540F387F77AFD276A209AE4B3170EBE750B948BEB77B6
31,593,776 UART: [art] PUB.Y = 9FE3718242AC45A8BF07EC62BA537DF66DD53C585C5A1A0A2223A45404575258F1FFD4BDE8EE768131CBDE2A3A7FA657
31,601,024 UART: [art] SIG.R = 4B908B987405C929BE57159BD9EEB0E7FBC462568EDE249DE04AF0A61CCA93EE8E399D8D8A1D153446C5FADBA35C2C00
31,608,426 UART: [art] SIG.S = D9B6F380ADF0199BD69DBB01B4A8E03AA55DFD6FDAC1B787D78A1FA7799BBC9534CDC4304EE22FB7974508DB92B8578D
32,913,609 UART: Caliptra RT
32,914,329 UART: [state] CFI Enabled
33,092,351 UART: [rt] RT listening for mailbox commands...
33,094,225 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,123,624 UART: [rt]cmd =0x46504c54, len=4
33,125,424 >>> mbox cmd response data (8 bytes)
33,126,534 UART: [rt] FIPS self test
33,127,477 UART: [kat] ++
33,127,924 UART: [kat] sha1
33,132,484 UART: [kat] SHA2-256
33,134,420 UART: [kat] SHA2-384
33,137,169 UART: [kat] SHA2-512-ACC
33,139,427 UART: [kat] ECC-384
36,413,974 UART: [kat] HMAC-384Kdf
36,420,496 UART: [kat] LMS
37,198,019 UART: Fatal Error: 0x90070002
37,233,320 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,383,342 >>> mbox cmd response: failed
37,384,030 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,534,083 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
190,128 UART:
190,415 UART: Running Caliptra ROM ...
191,436 UART:
191,577 UART: [state] CFI Enabled
256,762 UART: [state] LifecycleState = Unprovisioned
258,696 UART: [state] DebugLocked = No
260,707 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
264,714 UART: [kat] SHA2-256
434,419 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
444,929 UART: [kat] ++
445,376 UART: [kat] sha1
455,337 UART: [kat] SHA2-256
458,077 UART: [kat] SHA2-384
463,087 UART: [kat] SHA2-512-ACC
465,444 UART: [kat] ECC-384
2,762,572 UART: [kat] HMAC-384Kdf
2,794,796 UART: [kat] LMS
3,985,083 UART: [kat] --
3,988,634 UART: [cold-reset] ++
3,990,960 UART: [fht] Storing FHT @ 0x50003400
4,002,336 UART: [idev] ++
4,002,907 UART: [idev] CDI.KEYID = 6
4,003,814 UART: [idev] SUBJECT.KEYID = 7
4,005,093 UART: [idev] UDS.KEYID = 0
4,006,591 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,156,672 UART: [idev] Erasing UDS.KEYID = 0
7,341,322 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,643 UART: [idev] --
7,366,081 UART: [ldev] ++
7,366,653 UART: [ldev] CDI.KEYID = 6
7,367,625 UART: [ldev] SUBJECT.KEYID = 5
7,368,842 UART: [ldev] AUTHORITY.KEYID = 7
7,370,129 UART: [ldev] FE.KEYID = 1
7,417,565 UART: [ldev] Erasing FE.KEYID = 1
10,748,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,723 UART: [ldev] --
13,110,910 UART: [fwproc] Waiting for Commands...
13,112,579 UART: [fwproc] Received command 0x46574c44
13,114,772 UART: [fwproc] Received Image of size 119428 bytes
17,231,789 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,901 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,045 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,709,321 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,783,323 ready_for_fw is high
3,783,807 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,962,163 >>> mbox cmd response: success
23,648,992 UART:
23,649,410 UART: Running Caliptra FMC ...
23,650,536 UART:
23,650,690 UART: [state] CFI Enabled
23,717,383 UART: [fht] FMC Alias Private Key: 7
26,056,985 UART: [art] Extend RT PCRs Done
26,058,234 UART: [art] Lock RT PCRs Done
26,059,624 UART: [art] Populate DV Done
26,065,062 UART: [fht] FMC Alias Private Key: 7
26,066,560 UART: [art] Derive CDI
26,067,327 UART: [art] Store in slot 0x4
26,125,455 UART: [art] Derive Key Pair
26,126,482 UART: [art] Store priv key in slot 0x5
29,418,961 UART: [art] Derive Key Pair - Done
29,432,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,719,693 UART: [art] Erasing AUTHORITY.KEYID = 7
31,721,203 UART: [art] PUB.X = 1F0E5E9487B05E838B0658774CCC397CBADE519088A5DBB4EDF45C2E61639F740CE1F3E39621C5BB4C7DE57BB3BB138D
31,728,468 UART: [art] PUB.Y = 8B1D48BF280F4F95228403A159AC540D6D8D0288121D6BECC9C37524E2586DBC32A061C9BB23005329A5F1AE01C6CB09
31,735,661 UART: [art] SIG.R = 39C48392BF2AAD91ACFA26BA73EDFD607FD5E24B0A0DC8A8C0DBA7CD918834DCE18E8C72D82A04AE97609B99B47C4521
31,743,108 UART: [art] SIG.S = 0AC66964B1CFDB8F99BB69083A65977661EA1C5BADCC9DD16E58F263FF2EE478664C19DB8288A04DCC465F526D00D6D8
33,048,551 UART: Caliptra RT
33,049,270 UART: [state] CFI Enabled
33,246,010 UART: [rt] RT listening for mailbox commands...
33,247,872 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,277,562 UART: [rt]cmd =0x46504c54, len=4
33,279,389 >>> mbox cmd response data (8 bytes)
33,280,239 UART: [rt] FIPS self test
33,281,193 UART: [kat] ++
33,281,660 UART: [kat] sha1
33,286,119 UART: [kat] SHA2-256
33,288,049 UART: [kat] SHA2-384
33,290,854 UART: [kat] SHA2-512-ACC
33,293,094 UART: [kat] ECC-384
36,565,883 UART: [kat] HMAC-384Kdf
36,572,617 UART: [kat] LMS
37,350,166 UART: Fatal Error: 0x90070002
37,385,454 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,535,444 >>> mbox cmd response: failed
37,536,099 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,685,992 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,803,128 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,970,776 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,531 UART:
192,908 UART: Running Caliptra ROM ...
194,011 UART:
603,901 UART: [state] CFI Enabled
617,060 UART: [state] LifecycleState = Unprovisioned
619,015 UART: [state] DebugLocked = No
620,983 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,784 UART: [kat] SHA2-256
796,522 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,103 UART: [kat] ++
807,643 UART: [kat] sha1
818,687 UART: [kat] SHA2-256
821,390 UART: [kat] SHA2-384
826,755 UART: [kat] SHA2-512-ACC
829,150 UART: [kat] ECC-384
3,114,984 UART: [kat] HMAC-384Kdf
3,125,942 UART: [kat] LMS
4,316,017 UART: [kat] --
4,319,549 UART: [cold-reset] ++
4,322,205 UART: [fht] Storing FHT @ 0x50003400
4,333,831 UART: [idev] ++
4,334,562 UART: [idev] CDI.KEYID = 6
4,335,485 UART: [idev] SUBJECT.KEYID = 7
4,336,611 UART: [idev] UDS.KEYID = 0
4,337,601 ready_for_fw is high
4,337,847 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,487,697 UART: [idev] Erasing UDS.KEYID = 0
7,623,154 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,927 UART: [idev] --
7,649,032 UART: [ldev] ++
7,649,627 UART: [ldev] CDI.KEYID = 6
7,650,599 UART: [ldev] SUBJECT.KEYID = 5
7,651,826 UART: [ldev] AUTHORITY.KEYID = 7
7,653,067 UART: [ldev] FE.KEYID = 1
7,666,101 UART: [ldev] Erasing FE.KEYID = 1
10,953,911 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,187 UART: [ldev] --
13,314,474 UART: [fwproc] Waiting for Commands...
13,317,453 UART: [fwproc] Received command 0x46574c44
13,319,650 UART: [fwproc] Received Image of size 119428 bytes
17,448,243 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,520,592 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,593,779 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,924,939 >>> mbox cmd response: success
17,928,781 UART: [afmc] ++
17,929,376 UART: [afmc] CDI.KEYID = 6
17,930,295 UART: [afmc] SUBJECT.KEYID = 7
17,931,516 UART: [afmc] AUTHORITY.KEYID = 5
21,251,903 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,547,167 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,549,424 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,563,874 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,578,572 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,592,996 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,615,780 UART: [afmc] --
23,618,878 UART: [cold-reset] --
23,621,676 UART: [state] Locking Datavault
23,627,416 UART: [state] Locking PCR0, PCR1 and PCR31
23,629,193 UART: [state] Locking ICCM
23,631,243 UART: [exit] Launching FMC @ 0x40000130
23,639,643 UART:
23,639,887 UART: Running Caliptra FMC ...
23,640,994 UART:
23,641,158 UART: [state] CFI Enabled
23,649,209 UART: [fht] FMC Alias Private Key: 7
25,989,267 UART: [art] Extend RT PCRs Done
25,990,504 UART: [art] Lock RT PCRs Done
25,992,188 UART: [art] Populate DV Done
25,997,500 UART: [fht] FMC Alias Private Key: 7
25,999,259 UART: [art] Derive CDI
26,000,079 UART: [art] Store in slot 0x4
26,042,631 UART: [art] Derive Key Pair
26,043,669 UART: [art] Store priv key in slot 0x5
29,285,269 UART: [art] Derive Key Pair - Done
29,298,283 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,579,087 UART: [art] Erasing AUTHORITY.KEYID = 7
31,580,598 UART: [art] PUB.X = F33023E1934B9634017B03BF86565C00D216C570EB29F2204A3CBB441BE2432C8C2D8CD183BD876A7FBC306B763D0F1B
31,587,807 UART: [art] PUB.Y = 8ADC82E6038B1AE5BD10E056E2807A23DA2FC3A737FE08E644DE0B1DDCC7100886361AE9225A58CBD4F13C4BC0A348E8
31,595,101 UART: [art] SIG.R = D8112C85CF3BA243F2B2E146447269FA49736E3F218E78476EF0C588FAE5F203B2A73F8FAB2037D7D24B300110EE7EB7
31,602,496 UART: [art] SIG.S = B0F79BF22C82AF2CAF793BE4D1B06615442DD7131C96717C936742B4213B12420A2598A24A3C69677128A1358931E9A4
32,907,566 UART: Caliptra RT
32,908,269 UART: [state] CFI Enabled
33,041,641 UART: [rt] RT listening for mailbox commands...
33,043,532 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,073,290 UART: [rt]cmd =0x46504c54, len=4
33,074,810 >>> mbox cmd response data (8 bytes)
33,076,250 UART: [rt] FIPS self test
33,077,203 UART: [kat] ++
33,077,659 UART: [kat] sha1
33,082,174 UART: [kat] SHA2-256
33,084,071 UART: [kat] SHA2-384
33,087,180 UART: [kat] SHA2-512-ACC
33,089,477 UART: [kat] ECC-384
36,332,581 UART: [kat] HMAC-384Kdf
36,338,483 UART: [kat] LMS
37,116,095 UART: Fatal Error: 0x90070002
37,151,775 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,301,838 >>> mbox cmd response: failed
37,302,422 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,452,284 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,007 UART:
190,328 UART: Running Caliptra ROM ...
191,363 UART:
3,087,510 UART: [state] CFI Enabled
3,103,885 UART: [state] LifecycleState = Unprovisioned
3,105,808 UART: [state] DebugLocked = No
3,108,145 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,112,990 UART: [kat] SHA2-256
3,282,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,293,274 UART: [kat] ++
3,293,739 UART: [kat] sha1
3,305,117 UART: [kat] SHA2-256
3,307,868 UART: [kat] SHA2-384
3,313,155 UART: [kat] SHA2-512-ACC
3,315,562 UART: [kat] ECC-384
5,601,856 UART: [kat] HMAC-384Kdf
5,613,000 UART: [kat] LMS
6,803,124 UART: [kat] --
6,807,084 UART: [cold-reset] ++
6,808,706 UART: [fht] Storing FHT @ 0x50003400
6,819,667 UART: [idev] ++
6,820,305 UART: [idev] CDI.KEYID = 6
6,821,217 UART: [idev] SUBJECT.KEYID = 7
6,822,436 UART: [idev] UDS.KEYID = 0
6,824,077 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
6,974,008 UART: [idev] Erasing UDS.KEYID = 0
10,113,140 UART: [idev] Using Sha1 for KeyId Algorithm
10,134,259 UART: [idev] --
10,138,259 UART: [ldev] ++
10,138,829 UART: [ldev] CDI.KEYID = 6
10,139,767 UART: [ldev] SUBJECT.KEYID = 5
10,141,039 UART: [ldev] AUTHORITY.KEYID = 7
10,142,200 UART: [ldev] FE.KEYID = 1
10,153,896 UART: [ldev] Erasing FE.KEYID = 1
13,442,807 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,736,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,751,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,766,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,780,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,799,116 UART: [ldev] --
15,804,169 UART: [fwproc] Waiting for Commands...
15,806,594 UART: [fwproc] Received command 0x46574c44
15,808,785 UART: [fwproc] Received Image of size 119428 bytes
19,921,029 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,998,680 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,071,891 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
20,402,874 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
4,128,612 ready_for_fw is high
4,129,205 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,185,802 >>> mbox cmd response: success
23,825,467 UART:
23,825,921 UART: Running Caliptra FMC ...
23,827,048 UART:
23,827,212 UART: [state] CFI Enabled
23,834,996 UART: [fht] FMC Alias Private Key: 7
26,174,732 UART: [art] Extend RT PCRs Done
26,175,985 UART: [art] Lock RT PCRs Done
26,177,765 UART: [art] Populate DV Done
26,183,196 UART: [fht] FMC Alias Private Key: 7
26,184,829 UART: [art] Derive CDI
26,185,574 UART: [art] Store in slot 0x4
26,227,923 UART: [art] Derive Key Pair
26,228,970 UART: [art] Store priv key in slot 0x5
29,470,888 UART: [art] Derive Key Pair - Done
29,483,899 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,763,978 UART: [art] Erasing AUTHORITY.KEYID = 7
31,765,494 UART: [art] PUB.X = 86251109F8DEE8AA230BBD9F44CF2D9BE78F3AFA09969C915D4BD921D4CB0417AAE66881FD71665DEB084041CA573221
31,772,764 UART: [art] PUB.Y = 6D1B1254E5D6FAF395A5FDDFDCADF9D7B88C055B2AE96E9FC312F14559FA606CB8EB356188F3170A6B99DD502AD00A80
31,780,017 UART: [art] SIG.R = C99A094643B65619FB4CB05832D8821978D796CE634A1E022AF918F74BE492D8CB7EED10B78690E6AAE6AB7CE2FC4815
31,787,481 UART: [art] SIG.S = 036A28453CA8D90803114073432AAFD6E73F3B58E1F667E37629C8B9E956C0A79A099FB688662F91796E21CA746ACE2A
33,091,980 UART: Caliptra RT
33,092,717 UART: [state] CFI Enabled
33,226,792 UART: [rt] RT listening for mailbox commands...
33,228,841 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,258,567 UART: [rt]cmd =0x46504c54, len=4
33,259,992 >>> mbox cmd response data (8 bytes)
33,261,223 UART: [rt] FIPS self test
33,262,180 UART: [kat] ++
33,262,634 UART: [kat] sha1
33,267,041 UART: [kat] SHA2-256
33,268,921 UART: [kat] SHA2-384
33,271,968 UART: [kat] SHA2-512-ACC
33,274,204 UART: [kat] ECC-384
36,517,099 UART: [kat] HMAC-384Kdf
36,523,132 UART: [kat] LMS
37,300,619 UART: Fatal Error: 0x90070002
37,336,068 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,486,179 >>> mbox cmd response: failed
37,486,850 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,637,144 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
6,425,079 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
20,468,508 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
192,240 UART:
192,617 UART: Running Caliptra ROM ...
193,838 UART:
193,995 UART: [state] CFI Enabled
266,836 UART: [state] LifecycleState = Unprovisioned
268,822 UART: [state] DebugLocked = No
270,794 UART: [state] WD Timer not started. Device not locked for debugging
274,919 UART: [kat] SHA2-256
454,557 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,358 UART: [kat] ++
465,842 UART: [kat] sha1
476,368 UART: [kat] SHA2-256
479,110 UART: [kat] SHA2-384
486,670 UART: [kat] SHA2-512-ACC
489,046 UART: [kat] ECC-384
2,952,589 UART: [kat] HMAC-384Kdf
2,974,500 UART: [kat] LMS
3,450,990 UART: [kat] --
3,455,417 UART: [cold-reset] ++
3,457,001 UART: [fht] FHT @ 0x50003400
3,468,152 UART: [idev] ++
3,468,785 UART: [idev] CDI.KEYID = 6
3,469,716 UART: [idev] SUBJECT.KEYID = 7
3,470,904 UART: [idev] UDS.KEYID = 0
3,471,912 ready_for_fw is high
3,472,137 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,622,259 UART: [idev] Erasing UDS.KEYID = 0
5,992,540 UART: [idev] Sha1 KeyId Algorithm
6,016,675 UART: [idev] --
6,021,661 UART: [ldev] ++
6,022,247 UART: [ldev] CDI.KEYID = 6
6,023,169 UART: [ldev] SUBJECT.KEYID = 5
6,024,338 UART: [ldev] AUTHORITY.KEYID = 7
6,025,635 UART: [ldev] FE.KEYID = 1
6,060,014 UART: [ldev] Erasing FE.KEYID = 1
8,568,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,305,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,320,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,336,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,352,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,374,198 UART: [ldev] --
10,380,172 UART: [fwproc] Wait for Commands...
10,381,841 UART: [fwproc] Recv command 0x46574c44
10,383,841 UART: [fwproc] Recv'd Img size: 119428 bytes
13,883,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,960,306 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,033,313 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,364,830 >>> mbox cmd response: success
14,369,119 UART: [afmc] ++
14,369,709 UART: [afmc] CDI.KEYID = 6
14,370,596 UART: [afmc] SUBJECT.KEYID = 7
14,371,870 UART: [afmc] AUTHORITY.KEYID = 5
16,920,705 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,663,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,665,993 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,681,816 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,697,863 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,713,396 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,738,796 UART: [afmc] --
18,743,152 UART: [cold-reset] --
18,748,698 UART: [state] Locking Datavault
18,753,611 UART: [state] Locking PCR0, PCR1 and PCR31
18,755,378 UART: [state] Locking ICCM
18,758,154 UART: [exit] Launching FMC @ 0x40000130
18,766,553 UART:
18,766,792 UART: Running Caliptra FMC ...
18,767,899 UART:
18,768,060 UART: [state] CFI Enabled
18,819,234 UART: [fht] FMC Alias Private Key: 7
20,586,799 UART: [art] Extend RT PCRs Done
20,588,133 UART: [art] Lock RT PCRs Done
20,589,736 UART: [art] Populate DV Done
20,595,261 UART: [fht] FMC Alias Private Key: 7
20,596,910 UART: [art] Derive CDI
20,597,650 UART: [art] Store in slot 0x4
20,652,145 UART: [art] Derive Key Pair
20,653,151 UART: [art] Store priv key in slot 0x5
23,115,490 UART: [art] Derive Key Pair - Done
23,128,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,842,314 UART: [art] Erasing AUTHORITY.KEYID = 7
24,843,831 UART: [art] PUB.X = 8042F3BD74DD7AFAD5DF5E9AECD9CFA828F9599E0B26A7D85FB42BE53D2F8038AAEB1F36E6D99C3E6B5C09034586902D
24,851,106 UART: [art] PUB.Y = 37B009EDA37A92C1461509C92000D7F0D065842B8B18C573ADAA9BB98DDE42F4702036EEAD70843C3F2971AD38587DB8
24,858,370 UART: [art] SIG.R = 752E507CC6435FC2F6CB5A45D2C7C3BE430E08830E21AF100E10CFFCF673156F5435FC404F048A99532996FDE53AF6EB
24,865,754 UART: [art] SIG.S = 5616647EF4915F205F5CA4D28CA4A2AFB6EB31635821C877FE7759A05AFFAAB1015F36AC016073D63A875888A93502B9
25,844,745 UART: Caliptra RT
25,845,484 UART: [state] CFI Enabled
26,025,870 UART: [rt] RT listening for mailbox commands...
26,027,896 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,057,605 UART: [rt]cmd =0x46504c54, len=4
26,059,365 >>> mbox cmd response data (8 bytes)
26,060,260 UART: [rt] FIPS self test
26,061,210 UART: [kat] ++
26,061,668 UART: [kat] sha1
26,066,027 UART: [kat] SHA2-256
26,067,967 UART: [kat] SHA2-384
26,070,877 UART: [kat] SHA2-512-ACC
26,073,120 UART: [kat] ECC-384
28,516,511 UART: [kat] HMAC-384Kdf
28,542,649 UART: [kat] LMS
28,774,438 UART: Fatal Error: 0x90070002
28,809,647 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,959,644 >>> mbox cmd response: failed
28,960,240 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,110,537 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
190,107 UART:
190,396 UART: Running Caliptra ROM ...
191,513 UART:
191,673 UART: [state] CFI Enabled
250,863 UART: [state] LifecycleState = Unprovisioned
252,786 UART: [state] DebugLocked = No
254,554 UART: [state] WD Timer not started. Device not locked for debugging
258,133 UART: [kat] SHA2-256
437,784 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
448,537 UART: [kat] ++
449,129 UART: [kat] sha1
461,171 UART: [kat] SHA2-256
463,907 UART: [kat] SHA2-384
469,560 UART: [kat] SHA2-512-ACC
471,910 UART: [kat] ECC-384
2,933,272 UART: [kat] HMAC-384Kdf
2,956,524 UART: [kat] LMS
3,433,000 UART: [kat] --
3,437,868 UART: [cold-reset] ++
3,439,696 UART: [fht] FHT @ 0x50003400
3,451,002 UART: [idev] ++
3,451,584 UART: [idev] CDI.KEYID = 6
3,452,552 UART: [idev] SUBJECT.KEYID = 7
3,453,770 UART: [idev] UDS.KEYID = 0
3,455,286 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,605,403 UART: [idev] Erasing UDS.KEYID = 0
5,971,636 UART: [idev] Sha1 KeyId Algorithm
5,995,052 UART: [idev] --
5,998,999 UART: [ldev] ++
5,999,627 UART: [ldev] CDI.KEYID = 6
6,000,534 UART: [ldev] SUBJECT.KEYID = 5
6,001,755 UART: [ldev] AUTHORITY.KEYID = 7
6,002,994 UART: [ldev] FE.KEYID = 1
6,041,482 UART: [ldev] Erasing FE.KEYID = 1
8,546,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,285,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,301,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,317,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,332,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,354,125 UART: [ldev] --
10,359,063 UART: [fwproc] Wait for Commands...
10,360,903 UART: [fwproc] Recv command 0x46574c44
10,362,907 UART: [fwproc] Recv'd Img size: 119428 bytes
13,853,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,142 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,216 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,340,077 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,462,570 ready_for_fw is high
3,463,017 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,235,260 >>> mbox cmd response: success
18,514,636 UART:
18,515,025 UART: Running Caliptra FMC ...
18,516,181 UART:
18,516,350 UART: [state] CFI Enabled
18,582,270 UART: [fht] FMC Alias Private Key: 7
20,347,770 UART: [art] Extend RT PCRs Done
20,349,002 UART: [art] Lock RT PCRs Done
20,350,663 UART: [art] Populate DV Done
20,356,156 UART: [fht] FMC Alias Private Key: 7
20,357,647 UART: [art] Derive CDI
20,358,389 UART: [art] Store in slot 0x4
20,414,725 UART: [art] Derive Key Pair
20,415,772 UART: [art] Store priv key in slot 0x5
22,879,025 UART: [art] Derive Key Pair - Done
22,892,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,490 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,998 UART: [art] PUB.X = 8ECA1F1DA441DD6417300A9392CDA0CBD7D65ADA0A9D0904BBFC652CBC4A16C4AC69E0ED8728F5DBDA0E3456D196CECB
24,613,260 UART: [art] PUB.Y = 0DA8104F9D074B07C81D3B875A60A2C5AD730361A1D991D50181EA5C848A092E2D14299A5D7FED79C1FC2008D3D72611
24,620,523 UART: [art] SIG.R = FCE10B9ABD7B45C5F18CB80F8CD6938371396DBEE59956AC051D29B0CB2A57F9210626345D2B21A8B6A96A119FDA1BC3
24,627,939 UART: [art] SIG.S = CA5F1EF94036DF02654B405870E8FE77BA1FD6D241B477B8077419BC0030A6E35A7160380E11BC76D78609EC5BAA009D
25,606,792 UART: Caliptra RT
25,607,514 UART: [state] CFI Enabled
25,787,065 UART: [rt] RT listening for mailbox commands...
25,788,925 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,818,571 UART: [rt]cmd =0x46504c54, len=4
25,820,102 >>> mbox cmd response data (8 bytes)
25,821,429 UART: [rt] FIPS self test
25,822,375 UART: [kat] ++
25,822,831 UART: [kat] sha1
25,827,322 UART: [kat] SHA2-256
25,829,208 UART: [kat] SHA2-384
25,832,192 UART: [kat] SHA2-512-ACC
25,834,444 UART: [kat] ECC-384
28,278,246 UART: [kat] HMAC-384Kdf
28,304,557 UART: [kat] LMS
28,536,337 UART: Fatal Error: 0x90070002
28,571,566 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,721,581 >>> mbox cmd response: failed
28,722,211 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,872,151 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,446,730 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,229,922 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
192,594 UART:
192,977 UART: Running Caliptra ROM ...
194,190 UART:
603,625 UART: [state] CFI Enabled
619,141 UART: [state] LifecycleState = Unprovisioned
621,093 UART: [state] DebugLocked = No
622,776 UART: [state] WD Timer not started. Device not locked for debugging
626,281 UART: [kat] SHA2-256
805,898 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,702 UART: [kat] ++
817,152 UART: [kat] sha1
828,097 UART: [kat] SHA2-256
830,763 UART: [kat] SHA2-384
836,973 UART: [kat] SHA2-512-ACC
839,357 UART: [kat] ECC-384
3,284,567 UART: [kat] HMAC-384Kdf
3,295,257 UART: [kat] LMS
3,771,748 UART: [kat] --
3,775,318 UART: [cold-reset] ++
3,777,467 UART: [fht] FHT @ 0x50003400
3,788,523 UART: [idev] ++
3,789,097 UART: [idev] CDI.KEYID = 6
3,790,028 UART: [idev] SUBJECT.KEYID = 7
3,791,283 UART: [idev] UDS.KEYID = 0
3,792,238 ready_for_fw is high
3,792,477 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,942,495 UART: [idev] Erasing UDS.KEYID = 0
6,268,443 UART: [idev] Sha1 KeyId Algorithm
6,291,464 UART: [idev] --
6,296,861 UART: [ldev] ++
6,297,435 UART: [ldev] CDI.KEYID = 6
6,298,375 UART: [ldev] SUBJECT.KEYID = 5
6,299,593 UART: [ldev] AUTHORITY.KEYID = 7
6,300,831 UART: [ldev] FE.KEYID = 1
6,311,353 UART: [ldev] Erasing FE.KEYID = 1
8,792,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,717 UART: [ldev] --
10,588,032 UART: [fwproc] Wait for Commands...
10,590,686 UART: [fwproc] Recv command 0x46574c44
10,592,735 UART: [fwproc] Recv'd Img size: 119428 bytes
14,088,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,605 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,243,629 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,575,438 >>> mbox cmd response: success
14,580,216 UART: [afmc] ++
14,580,813 UART: [afmc] CDI.KEYID = 6
14,581,708 UART: [afmc] SUBJECT.KEYID = 7
14,582,925 UART: [afmc] AUTHORITY.KEYID = 5
17,085,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,805,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,808,020 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,823,802 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,839,884 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,855,503 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,879,581 UART: [afmc] --
18,883,610 UART: [cold-reset] --
18,887,911 UART: [state] Locking Datavault
18,893,124 UART: [state] Locking PCR0, PCR1 and PCR31
18,894,853 UART: [state] Locking ICCM
18,896,041 UART: [exit] Launching FMC @ 0x40000130
18,904,449 UART:
18,904,689 UART: Running Caliptra FMC ...
18,905,793 UART:
18,905,962 UART: [state] CFI Enabled
18,913,851 UART: [fht] FMC Alias Private Key: 7
20,679,412 UART: [art] Extend RT PCRs Done
20,680,641 UART: [art] Lock RT PCRs Done
20,682,568 UART: [art] Populate DV Done
20,688,001 UART: [fht] FMC Alias Private Key: 7
20,689,603 UART: [art] Derive CDI
20,690,422 UART: [art] Store in slot 0x4
20,733,726 UART: [art] Derive Key Pair
20,734,766 UART: [art] Store priv key in slot 0x5
23,161,303 UART: [art] Derive Key Pair - Done
23,174,745 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,880,362 UART: [art] Erasing AUTHORITY.KEYID = 7
24,881,860 UART: [art] PUB.X = 6B0D62CF8D4C53EE9F9763D07229F6354E8E17DD152B28863B259B5C7ABEAFC4AB8CF5BF739B32F0F84B3BCC57B9E965
24,889,153 UART: [art] PUB.Y = 407672046D224B111A5383128454A7F99D4D05C78E3BFE5E245F666578FA883FC98BC3D1E32CA6B7990DB9C66FFE7CFA
24,896,411 UART: [art] SIG.R = 9FC1D2D933986D447F01F76E6D2B7F743D481C3200E9EA31EECC2B153F89E92C155E2EEA460493D29B50F9C8AFF31727
24,903,761 UART: [art] SIG.S = 762875CBB1BAB2A85401D742FCFC4DAA5B6ACB3E4D08388C45468108BC47FFC947FA44A43E3C32C0685938B840B5A0A5
25,882,240 UART: Caliptra RT
25,882,956 UART: [state] CFI Enabled
26,015,208 UART: [rt] RT listening for mailbox commands...
26,017,066 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,046,877 UART: [rt]cmd =0x46504c54, len=4
26,048,361 >>> mbox cmd response data (8 bytes)
26,049,207 UART: [rt] FIPS self test
26,050,162 UART: [kat] ++
26,050,627 UART: [kat] sha1
26,054,928 UART: [kat] SHA2-256
26,056,865 UART: [kat] SHA2-384
26,059,887 UART: [kat] SHA2-512-ACC
26,062,131 UART: [kat] ECC-384
28,489,697 UART: [kat] HMAC-384Kdf
28,495,770 UART: [kat] LMS
28,727,453 UART: Fatal Error: 0x90070002
28,762,715 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,912,696 >>> mbox cmd response: failed
28,913,327 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,063,260 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,081 UART:
190,377 UART: Running Caliptra ROM ...
191,493 UART:
11,467,035 UART: [state] CFI Enabled
11,481,331 UART: [state] LifecycleState = Unprovisioned
11,483,247 UART: [state] DebugLocked = No
11,484,748 UART: [state] WD Timer not started. Device not locked for debugging
11,488,280 UART: [kat] SHA2-256
11,667,965 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,678,710 UART: [kat] ++
11,679,200 UART: [kat] sha1
11,690,201 UART: [kat] SHA2-256
11,692,897 UART: [kat] SHA2-384
11,699,159 UART: [kat] SHA2-512-ACC
11,701,539 UART: [kat] ECC-384
14,144,013 UART: [kat] HMAC-384Kdf
14,155,112 UART: [kat] LMS
14,631,570 UART: [kat] --
14,637,426 UART: [cold-reset] ++
14,638,724 UART: [fht] FHT @ 0x50003400
14,650,193 UART: [idev] ++
14,650,815 UART: [idev] CDI.KEYID = 6
14,651,721 UART: [idev] SUBJECT.KEYID = 7
14,652,994 UART: [idev] UDS.KEYID = 0
14,654,530 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,804,790 UART: [idev] Erasing UDS.KEYID = 0
17,125,751 UART: [idev] Sha1 KeyId Algorithm
17,149,355 UART: [idev] --
17,154,857 UART: [ldev] ++
17,155,429 UART: [ldev] CDI.KEYID = 6
17,156,338 UART: [ldev] SUBJECT.KEYID = 5
17,157,503 UART: [ldev] AUTHORITY.KEYID = 7
17,158,797 UART: [ldev] FE.KEYID = 1
17,172,011 UART: [ldev] Erasing FE.KEYID = 1
19,652,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,369,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,385,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,401,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,417,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,439,566 UART: [ldev] --
21,444,144 UART: [fwproc] Wait for Commands...
21,446,411 UART: [fwproc] Recv command 0x46574c44
21,448,402 UART: [fwproc] Recv'd Img size: 119428 bytes
24,944,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,025,920 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,098,949 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,430,344 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,535 writing to cptra_bootfsm_go
3,777,852 ready_for_fw is high
3,778,334 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,458,432 >>> mbox cmd response: success
18,707,133 UART:
18,707,523 UART: Running Caliptra FMC ...
18,708,671 UART:
18,708,851 UART: [state] CFI Enabled
18,716,662 UART: [fht] FMC Alias Private Key: 7
20,482,610 UART: [art] Extend RT PCRs Done
20,483,842 UART: [art] Lock RT PCRs Done
20,485,745 UART: [art] Populate DV Done
20,491,123 UART: [fht] FMC Alias Private Key: 7
20,492,614 UART: [art] Derive CDI
20,493,380 UART: [art] Store in slot 0x4
20,536,460 UART: [art] Derive Key Pair
20,537,510 UART: [art] Store priv key in slot 0x5
22,964,702 UART: [art] Derive Key Pair - Done
22,977,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,596 UART: [art] Erasing AUTHORITY.KEYID = 7
24,685,085 UART: [art] PUB.X = 93BCA3E034C5E5C73B2D020DEE4A499CF7D1A7E66C4B76227CFA7391CB6A9ACA5B41C499F2B09303F4EE5A3076BD2970
24,692,398 UART: [art] PUB.Y = B344AB91FED74680B71F31D5FCA3792473A2D2562A352E5E6699C0A303C9AE3416EF07A69DC1D021727650ACEA0EE9C2
24,699,669 UART: [art] SIG.R = 85CAAD07777A8911DF044AE815F555E0C5CDECEC0ED42A410DD082CA4E91C511696A34A0E00EE144CFD6C699342261B1
24,707,044 UART: [art] SIG.S = 5BF9C14C64956070D97B0D876CBB9D480AF95215D0F75B420C242FAC1D930DCFBF998BE693D66B2CFF6901CB676926EC
25,685,658 UART: Caliptra RT
25,686,378 UART: [state] CFI Enabled
25,818,402 UART: [rt] RT listening for mailbox commands...
25,820,251 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,850,046 UART: [rt]cmd =0x46504c54, len=4
25,851,500 >>> mbox cmd response data (8 bytes)
25,852,548 UART: [rt] FIPS self test
25,853,430 UART: [kat] ++
25,853,876 UART: [kat] sha1
25,858,227 UART: [kat] SHA2-256
25,860,166 UART: [kat] SHA2-384
25,863,188 UART: [kat] SHA2-512-ACC
25,865,478 UART: [kat] ECC-384
28,293,065 UART: [kat] HMAC-384Kdf
28,298,976 UART: [kat] LMS
28,530,772 UART: Fatal Error: 0x90070002
28,566,187 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,716,067 >>> mbox cmd response: failed
28,716,646 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,866,521 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
14,839,728 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,509,227 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,173 UART:
192,527 UART: Running Caliptra ROM ...
193,662 UART:
193,814 UART: [state] CFI Enabled
267,484 UART: [state] LifecycleState = Unprovisioned
269,931 UART: [state] DebugLocked = No
272,329 UART: [state] WD Timer not started. Device not locked for debugging
277,856 UART: [kat] SHA2-256
467,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,449 UART: [kat] ++
478,901 UART: [kat] sha1
489,711 UART: [kat] SHA2-256
492,724 UART: [kat] SHA2-384
499,287 UART: [kat] SHA2-512-ACC
501,878 UART: [kat] ECC-384
2,948,475 UART: [kat] HMAC-384Kdf
2,973,888 UART: [kat] LMS
3,505,707 UART: [kat] --
3,510,489 UART: [cold-reset] ++
3,511,837 UART: [fht] FHT @ 0x50003400
3,523,980 UART: [idev] ++
3,524,686 UART: [idev] CDI.KEYID = 6
3,525,661 UART: [idev] SUBJECT.KEYID = 7
3,526,847 UART: [idev] UDS.KEYID = 0
3,527,835 ready_for_fw is high
3,528,077 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,678,368 UART: [idev] Erasing UDS.KEYID = 0
6,033,291 UART: [idev] Sha1 KeyId Algorithm
6,055,684 UART: [idev] --
6,060,581 UART: [ldev] ++
6,061,278 UART: [ldev] CDI.KEYID = 6
6,062,166 UART: [ldev] SUBJECT.KEYID = 5
6,063,388 UART: [ldev] AUTHORITY.KEYID = 7
6,064,518 UART: [ldev] FE.KEYID = 1
6,101,147 UART: [ldev] Erasing FE.KEYID = 1
8,606,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,735 UART: [ldev] --
10,415,603 UART: [fwproc] Wait for Commands...
10,417,661 UART: [fwproc] Recv command 0x46574c44
10,419,929 UART: [fwproc] Recv'd Img size: 119428 bytes
13,936,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,014,261 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,137,844 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,704,106 >>> mbox cmd response: success
14,707,867 UART: [afmc] ++
14,708,574 UART: [afmc] CDI.KEYID = 6
14,709,761 UART: [afmc] SUBJECT.KEYID = 7
14,711,257 UART: [afmc] AUTHORITY.KEYID = 5
17,256,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,000,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,002,122 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,017,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,032,353 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,047,265 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,070,705 UART: [afmc] --
19,074,412 UART: [cold-reset] --
19,079,425 UART: [state] Locking Datavault
19,086,286 UART: [state] Locking PCR0, PCR1 and PCR31
19,088,493 UART: [state] Locking ICCM
19,090,003 UART: [exit] Launching FMC @ 0x40000130
19,098,681 UART:
19,098,931 UART: Running Caliptra FMC ...
19,100,036 UART:
19,100,215 UART: [state] CFI Enabled
19,156,315 UART: [fht] FMC Alias Private Key: 7
20,923,658 UART: [art] Extend RT PCRs Done
20,924,884 UART: [art] Lock RT PCRs Done
20,926,137 UART: [art] Populate DV Done
20,931,390 UART: [fht] FMC Alias Private Key: 7
20,932,989 UART: [art] Derive CDI
20,933,809 UART: [art] Store in slot 0x4
20,989,389 UART: [art] Derive Key Pair
20,990,396 UART: [art] Store priv key in slot 0x5
23,453,091 UART: [art] Derive Key Pair - Done
23,466,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,177,884 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,403 UART: [art] PUB.X = 99A75792874E140BDE37CF3CD53C0F01C4145846568AD131C73C8DCBBB2DB1DF2182F70378CB376E671C1FC32E6CF327
25,186,664 UART: [art] PUB.Y = 63D7398C1B821201A8E110C029D3D4DBDB26C9E5AD64609BA2EB940379E0625118D5E8ED0F7737C17FD1FE4072440D55
25,193,905 UART: [art] SIG.R = 88530AEF71C5D4401BD9CE63A165518F04C8BBDD9B0F5B13308293364E2094F10385317233C2262C5F47DC578C8D2069
25,201,310 UART: [art] SIG.S = E189C660918FD7FD3109C6841665D58BC911B11A8B77861232EC947915FA85C36589BDD9E7DE1886919FD23D4D4749D7
26,180,514 UART: Caliptra RT
26,181,255 UART: [state] CFI Enabled
26,360,445 UART: [rt] RT listening for mailbox commands...
26,362,309 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,391,997 UART: [rt]cmd =0x46504c54, len=4
26,393,689 >>> mbox cmd response data (8 bytes)
26,394,814 UART: [rt] FIPS self test
26,395,764 UART: [kat] ++
26,396,219 UART: [kat] sha1
26,400,681 UART: [kat] SHA2-256
26,402,560 UART: [kat] SHA2-384
26,405,684 UART: [kat] SHA2-512-ACC
26,407,981 UART: [kat] ECC-384
28,852,475 UART: [kat] HMAC-384Kdf
28,879,151 UART: [kat] LMS
29,110,987 UART: Fatal Error: 0x90070002
29,146,253 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,296,233 >>> mbox cmd response: failed
29,296,829 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,446,718 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,150 UART:
190,446 UART: Running Caliptra ROM ...
191,475 UART:
191,619 UART: [state] CFI Enabled
249,359 UART: [state] LifecycleState = Unprovisioned
251,689 UART: [state] DebugLocked = No
253,146 UART: [state] WD Timer not started. Device not locked for debugging
257,270 UART: [kat] SHA2-256
447,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
457,952 UART: [kat] ++
458,405 UART: [kat] sha1
469,957 UART: [kat] SHA2-256
472,982 UART: [kat] SHA2-384
477,512 UART: [kat] SHA2-512-ACC
480,073 UART: [kat] ECC-384
2,934,784 UART: [kat] HMAC-384Kdf
2,956,936 UART: [kat] LMS
3,488,667 UART: [kat] --
3,493,417 UART: [cold-reset] ++
3,495,195 UART: [fht] FHT @ 0x50003400
3,506,616 UART: [idev] ++
3,507,301 UART: [idev] CDI.KEYID = 6
3,508,324 UART: [idev] SUBJECT.KEYID = 7
3,509,494 UART: [idev] UDS.KEYID = 0
3,511,033 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,661,190 UART: [idev] Erasing UDS.KEYID = 0
6,016,999 UART: [idev] Sha1 KeyId Algorithm
6,038,201 UART: [idev] --
6,043,464 UART: [ldev] ++
6,044,159 UART: [ldev] CDI.KEYID = 6
6,045,047 UART: [ldev] SUBJECT.KEYID = 5
6,046,165 UART: [ldev] AUTHORITY.KEYID = 7
6,047,461 UART: [ldev] FE.KEYID = 1
6,087,576 UART: [ldev] Erasing FE.KEYID = 1
8,595,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,852 UART: [ldev] --
10,402,035 UART: [fwproc] Wait for Commands...
10,405,006 UART: [fwproc] Recv command 0x46574c44
10,407,270 UART: [fwproc] Recv'd Img size: 119428 bytes
13,921,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,075 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,701 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,682,294 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,437,144 ready_for_fw is high
3,437,529 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,841,698 >>> mbox cmd response: success
19,131,695 UART:
19,132,127 UART: Running Caliptra FMC ...
19,133,284 UART:
19,133,449 UART: [state] CFI Enabled
19,200,219 UART: [fht] FMC Alias Private Key: 7
20,966,819 UART: [art] Extend RT PCRs Done
20,968,042 UART: [art] Lock RT PCRs Done
20,969,792 UART: [art] Populate DV Done
20,975,539 UART: [fht] FMC Alias Private Key: 7
20,977,143 UART: [art] Derive CDI
20,977,965 UART: [art] Store in slot 0x4
21,033,118 UART: [art] Derive Key Pair
21,034,172 UART: [art] Store priv key in slot 0x5
23,496,722 UART: [art] Derive Key Pair - Done
23,509,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,389 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,910 UART: [art] PUB.X = A08500586A594BE1923461AE7D86817F891A514F27476CCD9687DB387D7BFC65A1C6D76580CB5FD3F7D5D3492177CF34
25,231,147 UART: [art] PUB.Y = A55D7B9EE5A4E58C061DEB6163B1DC913DB47F985D0F73872E8500F419753B911DD11D1B6A12E89B95ACD838DD9643D6
25,238,406 UART: [art] SIG.R = 5B114798A8C406919176F05F1CF34CE49764CB2F65738C325E01EFE064F9F2DFC21F8D5DFC8FD1FC459DA68DDC7E35CF
25,245,774 UART: [art] SIG.S = 31FF47876FE6806F62EEEA42286009415045BC6B5666A88672ABD64E07930F677C6AB53D00ED20987C94530B346CCE89
26,223,922 UART: Caliptra RT
26,224,619 UART: [state] CFI Enabled
26,407,955 UART: [rt] RT listening for mailbox commands...
26,409,822 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,439,521 UART: [rt]cmd =0x46504c54, len=4
26,441,159 >>> mbox cmd response data (8 bytes)
26,442,431 UART: [rt] FIPS self test
26,443,381 UART: [kat] ++
26,443,838 UART: [kat] sha1
26,448,301 UART: [kat] SHA2-256
26,450,183 UART: [kat] SHA2-384
26,453,093 UART: [kat] SHA2-512-ACC
26,455,390 UART: [kat] ECC-384
28,898,942 UART: [kat] HMAC-384Kdf
28,925,942 UART: [kat] LMS
29,157,674 UART: Fatal Error: 0x90070002
29,193,063 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,343,060 >>> mbox cmd response: failed
29,343,717 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,493,516 >>> mbox cmd response: failed
Initializing fuses
987 writing to cptra_bootfsm_go
3,427,842 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,829,849 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,440 writing to cptra_bootfsm_go
192,646 UART:
193,007 UART: Running Caliptra ROM ...
194,111 UART:
603,845 UART: [state] CFI Enabled
618,290 UART: [state] LifecycleState = Unprovisioned
620,677 UART: [state] DebugLocked = No
623,195 UART: [state] WD Timer not started. Device not locked for debugging
627,595 UART: [kat] SHA2-256
817,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,292 UART: [kat] ++
828,822 UART: [kat] sha1
839,297 UART: [kat] SHA2-256
842,326 UART: [kat] SHA2-384
848,257 UART: [kat] SHA2-512-ACC
850,848 UART: [kat] ECC-384
3,294,965 UART: [kat] HMAC-384Kdf
3,307,069 UART: [kat] LMS
3,838,873 UART: [kat] --
3,841,694 UART: [cold-reset] ++
3,843,422 UART: [fht] FHT @ 0x50003400
3,855,262 UART: [idev] ++
3,855,985 UART: [idev] CDI.KEYID = 6
3,857,027 UART: [idev] SUBJECT.KEYID = 7
3,858,137 UART: [idev] UDS.KEYID = 0
3,859,071 ready_for_fw is high
3,859,297 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,009,300 UART: [idev] Erasing UDS.KEYID = 0
6,336,690 UART: [idev] Sha1 KeyId Algorithm
6,358,796 UART: [idev] --
6,363,821 UART: [ldev] ++
6,364,505 UART: [ldev] CDI.KEYID = 6
6,365,392 UART: [ldev] SUBJECT.KEYID = 5
6,366,610 UART: [ldev] AUTHORITY.KEYID = 7
6,367,791 UART: [ldev] FE.KEYID = 1
6,380,010 UART: [ldev] Erasing FE.KEYID = 1
8,859,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,892 UART: [ldev] --
10,650,568 UART: [fwproc] Wait for Commands...
10,653,211 UART: [fwproc] Recv command 0x46574c44
10,655,501 UART: [fwproc] Recv'd Img size: 119428 bytes
14,162,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,237,410 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,043 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,925,975 >>> mbox cmd response: success
14,929,829 UART: [afmc] ++
14,930,533 UART: [afmc] CDI.KEYID = 6
14,931,769 UART: [afmc] SUBJECT.KEYID = 7
14,933,139 UART: [afmc] AUTHORITY.KEYID = 5
17,434,441 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,154,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,156,915 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,171,986 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,187,124 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,202,072 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,225,210 UART: [afmc] --
19,228,789 UART: [cold-reset] --
19,232,387 UART: [state] Locking Datavault
19,239,822 UART: [state] Locking PCR0, PCR1 and PCR31
19,242,023 UART: [state] Locking ICCM
19,243,679 UART: [exit] Launching FMC @ 0x40000130
19,252,359 UART:
19,252,602 UART: Running Caliptra FMC ...
19,253,707 UART:
19,253,867 UART: [state] CFI Enabled
19,262,027 UART: [fht] FMC Alias Private Key: 7
21,028,634 UART: [art] Extend RT PCRs Done
21,029,869 UART: [art] Lock RT PCRs Done
21,031,719 UART: [art] Populate DV Done
21,037,407 UART: [fht] FMC Alias Private Key: 7
21,039,115 UART: [art] Derive CDI
21,039,863 UART: [art] Store in slot 0x4
21,083,023 UART: [art] Derive Key Pair
21,084,044 UART: [art] Store priv key in slot 0x5
23,510,578 UART: [art] Derive Key Pair - Done
23,523,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,229,251 UART: [art] Erasing AUTHORITY.KEYID = 7
25,230,763 UART: [art] PUB.X = AA90E4DE620867D7D7147A273EA3D45A339BB1D125C9ACF3974FE9C373B0BC05B1104E47A34B48EB7CF51CEF94D6D0B5
25,238,062 UART: [art] PUB.Y = 8BB6416044CAA37EFF70ECAA13C69DD92FC108E688494058C37651DE3B64FAADF0C3E00D214901FBD99B8834277FDAC7
25,245,354 UART: [art] SIG.R = D080CDE3E98DA6889EBB13EF69FA9FF6A0BE09AEC53A7DDE6DD4590AEE4247D39E2C75697B9578F50365EF0539CD3E50
25,252,741 UART: [art] SIG.S = B47144D1916AA60BAD186EEC825173BC4BBC96E3105A45D8E697B2FCB72FE95F6A1BC640A6B522DF2243DA84CEEC8DC4
26,231,630 UART: Caliptra RT
26,232,346 UART: [state] CFI Enabled
26,364,706 UART: [rt] RT listening for mailbox commands...
26,366,556 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,396,148 UART: [rt]cmd =0x46504c54, len=4
26,397,661 >>> mbox cmd response data (8 bytes)
26,399,113 UART: [rt] FIPS self test
26,400,082 UART: [kat] ++
26,400,544 UART: [kat] sha1
26,405,057 UART: [kat] SHA2-256
26,406,939 UART: [kat] SHA2-384
26,409,798 UART: [kat] SHA2-512-ACC
26,412,039 UART: [kat] ECC-384
28,839,559 UART: [kat] HMAC-384Kdf
28,845,297 UART: [kat] LMS
29,076,966 UART: Fatal Error: 0x90070002
29,112,373 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,262,270 >>> mbox cmd response: failed
29,262,879 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,412,789 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
190,069 UART:
190,373 UART: Running Caliptra ROM ...
191,489 UART:
11,110,905 UART: [state] CFI Enabled
11,123,710 UART: [state] LifecycleState = Unprovisioned
11,126,072 UART: [state] DebugLocked = No
11,127,683 UART: [state] WD Timer not started. Device not locked for debugging
11,132,240 UART: [kat] SHA2-256
11,322,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,332,841 UART: [kat] ++
11,333,368 UART: [kat] sha1
11,345,610 UART: [kat] SHA2-256
11,348,633 UART: [kat] SHA2-384
11,354,690 UART: [kat] SHA2-512-ACC
11,357,320 UART: [kat] ECC-384
13,800,120 UART: [kat] HMAC-384Kdf
13,813,650 UART: [kat] LMS
14,345,441 UART: [kat] --
14,349,596 UART: [cold-reset] ++
14,351,646 UART: [fht] FHT @ 0x50003400
14,363,122 UART: [idev] ++
14,363,804 UART: [idev] CDI.KEYID = 6
14,364,769 UART: [idev] SUBJECT.KEYID = 7
14,365,987 UART: [idev] UDS.KEYID = 0
14,367,519 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,517,393 UART: [idev] Erasing UDS.KEYID = 0
16,841,786 UART: [idev] Sha1 KeyId Algorithm
16,864,053 UART: [idev] --
16,869,448 UART: [ldev] ++
16,870,131 UART: [ldev] CDI.KEYID = 6
16,871,016 UART: [ldev] SUBJECT.KEYID = 5
16,872,237 UART: [ldev] AUTHORITY.KEYID = 7
16,873,366 UART: [ldev] FE.KEYID = 1
16,884,845 UART: [ldev] Erasing FE.KEYID = 1
19,362,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,084,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,100,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,115,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,130,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,150,309 UART: [ldev] --
21,156,159 UART: [fwproc] Wait for Commands...
21,158,700 UART: [fwproc] Recv command 0x46574c44
21,161,021 UART: [fwproc] Recv'd Img size: 119428 bytes
24,667,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,751,025 UART: [fwproc] Load FMC at address 0x40000000 len 20044
24,874,601 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,441,027 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,755,670 ready_for_fw is high
3,756,168 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,068,364 >>> mbox cmd response: success
19,319,232 UART:
19,319,633 UART: Running Caliptra FMC ...
19,320,763 UART:
19,320,919 UART: [state] CFI Enabled
19,328,625 UART: [fht] FMC Alias Private Key: 7
21,094,153 UART: [art] Extend RT PCRs Done
21,095,392 UART: [art] Lock RT PCRs Done
21,097,245 UART: [art] Populate DV Done
21,102,825 UART: [fht] FMC Alias Private Key: 7
21,104,534 UART: [art] Derive CDI
21,105,351 UART: [art] Store in slot 0x4
21,148,010 UART: [art] Derive Key Pair
21,149,050 UART: [art] Store priv key in slot 0x5
23,576,069 UART: [art] Derive Key Pair - Done
23,588,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,294,951 UART: [art] Erasing AUTHORITY.KEYID = 7
25,296,465 UART: [art] PUB.X = A3431B23B604E71C91ED512D071A9AE43280E795E963F510EE5B40AA8994E8A85119D6F7A3498AD6EC2756588748B12A
25,303,708 UART: [art] PUB.Y = 20F8D88335D590488311CB936D1B8EC3C885FBDE094CB4A74836487398F8CA7F63A46FBA42F1B581CA1F1E4B6F16C1BA
25,311,004 UART: [art] SIG.R = 9307C7859E0D90B4A4CB572453866B0366718C97EBABAC55708BF73D1F095722D5E9F9C093D36CAE1F7C83F7FAC5191A
25,318,389 UART: [art] SIG.S = C12164DF8298A021381F2C0AF2485824FFB7C8E8152041DDF65CE53DA195C4D1CA9DF9F438DEDDF39738EF82AADA04AE
26,297,140 UART: Caliptra RT
26,297,851 UART: [state] CFI Enabled
26,430,161 UART: [rt] RT listening for mailbox commands...
26,432,019 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,461,729 UART: [rt]cmd =0x46504c54, len=4
26,463,257 >>> mbox cmd response data (8 bytes)
26,463,875 UART: [rt] FIPS self test
26,464,820 UART: [kat] ++
26,465,277 UART: [kat] sha1
26,469,634 UART: [kat] SHA2-256
26,471,516 UART: [kat] SHA2-384
26,474,426 UART: [kat] SHA2-512-ACC
26,476,669 UART: [kat] ECC-384
28,904,346 UART: [kat] HMAC-384Kdf
28,910,298 UART: [kat] LMS
29,141,986 UART: Fatal Error: 0x90070002
29,177,423 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,327,400 >>> mbox cmd response: failed
29,328,040 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,477,978 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
14,189,084 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,499,292 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,674 UART: [state] LifecycleState = Unprovisioned
85,329 UART: [state] DebugLocked = No
85,923 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,529 UART: [kat] SHA2-256
881,460 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,575 UART: [kat] ++
885,727 UART: [kat] sha1
890,007 UART: [kat] SHA2-256
891,945 UART: [kat] SHA2-384
894,618 UART: [kat] SHA2-512-ACC
896,519 UART: [kat] ECC-384
901,890 UART: [kat] HMAC-384Kdf
906,432 UART: [kat] LMS
1,474,628 UART: [kat] --
1,475,413 UART: [cold-reset] ++
1,475,837 UART: [fht] Storing FHT @ 0x50003400
1,478,424 UART: [idev] ++
1,478,592 UART: [idev] CDI.KEYID = 6
1,478,952 UART: [idev] SUBJECT.KEYID = 7
1,479,376 UART: [idev] UDS.KEYID = 0
1,479,721 ready_for_fw is high
1,479,721 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,330 UART: [idev] Erasing UDS.KEYID = 0
1,503,660 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,134 UART: [idev] --
1,513,213 UART: [ldev] ++
1,513,381 UART: [ldev] CDI.KEYID = 6
1,513,744 UART: [ldev] SUBJECT.KEYID = 5
1,514,170 UART: [ldev] AUTHORITY.KEYID = 7
1,514,633 UART: [ldev] FE.KEYID = 1
1,519,851 UART: [ldev] Erasing FE.KEYID = 1
1,544,798 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,563,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,569,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,384 UART: [ldev] --
1,583,807 UART: [fwproc] Waiting for Commands...
1,584,448 UART: [fwproc] Received command 0x46574c44
1,585,239 UART: [fwproc] Received Image of size 119428 bytes
2,939,875 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,967,149 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,998,367 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,139,984 >>> mbox cmd response: success
3,141,110 UART: [afmc] ++
3,141,278 UART: [afmc] CDI.KEYID = 6
3,141,640 UART: [afmc] SUBJECT.KEYID = 7
3,142,065 UART: [afmc] AUTHORITY.KEYID = 5
3,177,542 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,193,888 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,194,668 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,200,377 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,206,260 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,211,943 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,219,843 UART: [afmc] --
3,220,903 UART: [cold-reset] --
3,221,813 UART: [state] Locking Datavault
3,223,004 UART: [state] Locking PCR0, PCR1 and PCR31
3,223,608 UART: [state] Locking ICCM
3,224,144 UART: [exit] Launching FMC @ 0x40000130
3,229,474 UART:
3,229,490 UART: Running Caliptra FMC ...
3,229,898 UART:
3,229,952 UART: [state] CFI Enabled
3,240,970 UART: [fht] FMC Alias Private Key: 7
3,360,654 UART: [art] Extend RT PCRs Done
3,361,082 UART: [art] Lock RT PCRs Done
3,362,584 UART: [art] Populate DV Done
3,370,863 UART: [fht] FMC Alias Private Key: 7
3,371,971 UART: [art] Derive CDI
3,372,251 UART: [art] Store in slot 0x4
3,457,867 UART: [art] Derive Key Pair
3,458,227 UART: [art] Store priv key in slot 0x5
3,471,464 UART: [art] Derive Key Pair - Done
3,486,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,501,245 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,010 UART: [art] PUB.X = 5894E448784F279590FBE445B402B3D8BB3A6E000214E64A80ED7D3E3CC2AAE1ED78D6FAB4B10ABE64E15B749D2F65C1
3,508,763 UART: [art] PUB.Y = 4F5FCBF1E77A0ACE26F56E0B29A91B42844315E80E4965F764D58A17DBEB8C15E1963D3B4004E4FF372189BFF6F48D12
3,515,711 UART: [art] SIG.R = BD72AB1200554260DD0C0208E18BD1C88B265AEE3A42A865E58BE14092B277ED814792B69173EB3BB9FE45B85E6F3587
3,522,454 UART: [art] SIG.S = 6ED49F4C2776728F35B927A140E331CEDDE5C8F998B27316836E0691DA7FB9F1A669CF7BD79F9DBA08364218F51B36CA
3,545,736 UART: Caliptra RT
3,545,987 UART: [state] CFI Enabled
3,667,179 UART: [rt] RT listening for mailbox commands...
3,667,842 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,807 UART: [rt]cmd =0x46504c54, len=4
3,699,133 >>> mbox cmd response data (8 bytes)
3,699,436 UART: [rt] FIPS self test
3,699,764 UART: [kat] ++
3,699,916 UART: [kat] sha1
3,704,094 UART: [kat] SHA2-256
3,706,116 UART: [kat] SHA2-384
3,708,987 UART: [kat] SHA2-512-ACC
3,710,914 UART: [kat] ECC-384
3,720,774 UART: [kat] HMAC-384Kdf
3,725,465 UART: [kat] LMS
4,831,197 UART: Fatal Error: 0x90070002
4,832,736 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,832,741 >>> mbox cmd response: failed
4,832,741 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,832,746 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,299 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,001 UART: [kat] SHA2-256
881,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,047 UART: [kat] ++
886,199 UART: [kat] sha1
890,343 UART: [kat] SHA2-256
892,281 UART: [kat] SHA2-384
894,952 UART: [kat] SHA2-512-ACC
896,853 UART: [kat] ECC-384
902,454 UART: [kat] HMAC-384Kdf
906,992 UART: [kat] LMS
1,475,188 UART: [kat] --
1,476,181 UART: [cold-reset] ++
1,476,601 UART: [fht] Storing FHT @ 0x50003400
1,479,234 UART: [idev] ++
1,479,402 UART: [idev] CDI.KEYID = 6
1,479,762 UART: [idev] SUBJECT.KEYID = 7
1,480,186 UART: [idev] UDS.KEYID = 0
1,480,531 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,790 UART: [idev] Erasing UDS.KEYID = 0
1,504,736 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,380 UART: [idev] --
1,514,417 UART: [ldev] ++
1,514,585 UART: [ldev] CDI.KEYID = 6
1,514,948 UART: [ldev] SUBJECT.KEYID = 5
1,515,374 UART: [ldev] AUTHORITY.KEYID = 7
1,515,837 UART: [ldev] FE.KEYID = 1
1,521,059 UART: [ldev] Erasing FE.KEYID = 1
1,545,664 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,380 UART: [ldev] --
1,584,879 UART: [fwproc] Waiting for Commands...
1,585,500 UART: [fwproc] Received command 0x46574c44
1,586,291 UART: [fwproc] Received Image of size 119428 bytes
2,941,939 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,713 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,999,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,446 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,439 ready_for_fw is high
1,362,439 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,532 >>> mbox cmd response: success
3,052,915 UART:
3,052,931 UART: Running Caliptra FMC ...
3,053,339 UART:
3,053,393 UART: [state] CFI Enabled
3,063,559 UART: [fht] FMC Alias Private Key: 7
3,182,325 UART: [art] Extend RT PCRs Done
3,182,753 UART: [art] Lock RT PCRs Done
3,184,275 UART: [art] Populate DV Done
3,192,528 UART: [fht] FMC Alias Private Key: 7
3,193,612 UART: [art] Derive CDI
3,193,892 UART: [art] Store in slot 0x4
3,279,546 UART: [art] Derive Key Pair
3,279,906 UART: [art] Store priv key in slot 0x5
3,293,067 UART: [art] Derive Key Pair - Done
3,307,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,323,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,323,988 UART: [art] PUB.X = 2ED93A609859C200FBF0186D92683ED3B8A9C597A1EA96529F8D781BDDB21C63CD63F8B8F1EA8DF97AD22F9D7E65C3E9
3,330,752 UART: [art] PUB.Y = 8393F6C919DD4F364662A19CEA13DADCBB90CD6DC64E50D9B06C9D2FF7697033BD0D2A686E8C590940FB882C1D5DE822
3,337,710 UART: [art] SIG.R = BD7C6BA968ADC3F232459C36BCB4BC923F2A60718AB8019A239E5D11D3071AAC8D8862A5F5170F8DB8B4C2B6D895DE91
3,344,485 UART: [art] SIG.S = EE16DA9B99D2C2784268B8641DD337E691DD7F5BCFC469387613758C203660F99978248447569E2EBAF1BCB4FF7EF80E
3,368,536 UART: Caliptra RT
3,368,787 UART: [state] CFI Enabled
3,488,702 UART: [rt] RT listening for mailbox commands...
3,489,365 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,042 UART: [rt]cmd =0x46504c54, len=4
3,520,328 >>> mbox cmd response data (8 bytes)
3,520,551 UART: [rt] FIPS self test
3,520,879 UART: [kat] ++
3,521,031 UART: [kat] sha1
3,525,303 UART: [kat] SHA2-256
3,527,325 UART: [kat] SHA2-384
3,530,154 UART: [kat] SHA2-512-ACC
3,532,081 UART: [kat] ECC-384
3,541,995 UART: [kat] HMAC-384Kdf
3,546,674 UART: [kat] LMS
4,652,314 UART: Fatal Error: 0x90070002
4,653,853 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,653,858 >>> mbox cmd response: failed
4,653,858 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,653,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,495 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,796 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,156 UART: [kat] SHA2-256
882,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,202 UART: [kat] ++
886,354 UART: [kat] sha1
890,578 UART: [kat] SHA2-256
892,516 UART: [kat] SHA2-384
895,195 UART: [kat] SHA2-512-ACC
897,096 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,373 UART: [kat] LMS
1,475,569 UART: [kat] --
1,476,218 UART: [cold-reset] ++
1,476,786 UART: [fht] Storing FHT @ 0x50003400
1,479,547 UART: [idev] ++
1,479,715 UART: [idev] CDI.KEYID = 6
1,480,075 UART: [idev] SUBJECT.KEYID = 7
1,480,499 UART: [idev] UDS.KEYID = 0
1,480,844 ready_for_fw is high
1,480,844 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,769 UART: [idev] Erasing UDS.KEYID = 0
1,505,375 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,919 UART: [idev] --
1,514,802 UART: [ldev] ++
1,514,970 UART: [ldev] CDI.KEYID = 6
1,515,333 UART: [ldev] SUBJECT.KEYID = 5
1,515,759 UART: [ldev] AUTHORITY.KEYID = 7
1,516,222 UART: [ldev] FE.KEYID = 1
1,521,194 UART: [ldev] Erasing FE.KEYID = 1
1,546,845 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,997 UART: [ldev] --
1,586,296 UART: [fwproc] Waiting for Commands...
1,587,153 UART: [fwproc] Received command 0x46574c44
1,587,944 UART: [fwproc] Received Image of size 119428 bytes
2,943,840 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,682 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,900 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,449 >>> mbox cmd response: success
3,144,483 UART: [afmc] ++
3,144,651 UART: [afmc] CDI.KEYID = 6
3,145,013 UART: [afmc] SUBJECT.KEYID = 7
3,145,438 UART: [afmc] AUTHORITY.KEYID = 5
3,180,875 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,189 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,969 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,678 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,561 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,244 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,906 UART: [afmc] --
3,224,018 UART: [cold-reset] --
3,224,844 UART: [state] Locking Datavault
3,226,141 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,745 UART: [state] Locking ICCM
3,227,237 UART: [exit] Launching FMC @ 0x40000130
3,232,567 UART:
3,232,583 UART: Running Caliptra FMC ...
3,232,991 UART:
3,233,134 UART: [state] CFI Enabled
3,244,136 UART: [fht] FMC Alias Private Key: 7
3,362,826 UART: [art] Extend RT PCRs Done
3,363,254 UART: [art] Lock RT PCRs Done
3,364,802 UART: [art] Populate DV Done
3,372,871 UART: [fht] FMC Alias Private Key: 7
3,373,891 UART: [art] Derive CDI
3,374,171 UART: [art] Store in slot 0x4
3,459,971 UART: [art] Derive Key Pair
3,460,331 UART: [art] Store priv key in slot 0x5
3,473,762 UART: [art] Derive Key Pair - Done
3,488,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,871 UART: [art] PUB.X = 18656503BE17BC6861146E3C8CD4EEECEDAA188A18ED0878EFB3342ED9280AAA7DAB932564AD1FFAABD7784540C182C0
3,511,650 UART: [art] PUB.Y = 98A9EF6F23E76B36EF9E777CFE350B9A15D506AB767B625D224E7F8F53B5465D8F80E7B77C484B30CE46867EFB781BA5
3,518,604 UART: [art] SIG.R = 430A4578F1EDD2BEE19D3AE1510533BE531CDE311102CC8F033BA101D6BE39703F81DB31A3FCA6414E39112CFE48CD23
3,525,371 UART: [art] SIG.S = CE3F840189B98625A59188FEBE3A87B6EC31F74CEDFA6926F5636DFA567DB992C8934F62ECD82D5D8C97838D2D8EA57B
3,549,114 UART: Caliptra RT
3,549,457 UART: [state] CFI Enabled
3,669,379 UART: [rt] RT listening for mailbox commands...
3,670,042 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,067 UART: [rt]cmd =0x46504c54, len=4
3,701,089 >>> mbox cmd response data (8 bytes)
3,701,208 UART: [rt] FIPS self test
3,701,536 UART: [kat] ++
3,701,688 UART: [kat] sha1
3,706,006 UART: [kat] SHA2-256
3,708,028 UART: [kat] SHA2-384
3,710,965 UART: [kat] SHA2-512-ACC
3,712,892 UART: [kat] ECC-384
3,723,060 UART: [kat] HMAC-384Kdf
3,727,765 UART: [kat] LMS
4,833,621 UART: Fatal Error: 0x90070002
4,835,160 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,835,165 >>> mbox cmd response: failed
4,835,165 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,835,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,522 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,134 UART: [kat] SHA2-256
882,065 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,180 UART: [kat] ++
886,332 UART: [kat] sha1
890,414 UART: [kat] SHA2-256
892,352 UART: [kat] SHA2-384
895,341 UART: [kat] SHA2-512-ACC
897,242 UART: [kat] ECC-384
903,061 UART: [kat] HMAC-384Kdf
907,851 UART: [kat] LMS
1,476,047 UART: [kat] --
1,476,970 UART: [cold-reset] ++
1,477,396 UART: [fht] Storing FHT @ 0x50003400
1,480,303 UART: [idev] ++
1,480,471 UART: [idev] CDI.KEYID = 6
1,480,831 UART: [idev] SUBJECT.KEYID = 7
1,481,255 UART: [idev] UDS.KEYID = 0
1,481,600 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,163 UART: [idev] Erasing UDS.KEYID = 0
1,505,843 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,433 UART: [idev] --
1,515,252 UART: [ldev] ++
1,515,420 UART: [ldev] CDI.KEYID = 6
1,515,783 UART: [ldev] SUBJECT.KEYID = 5
1,516,209 UART: [ldev] AUTHORITY.KEYID = 7
1,516,672 UART: [ldev] FE.KEYID = 1
1,521,846 UART: [ldev] Erasing FE.KEYID = 1
1,547,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,937 UART: [ldev] --
1,586,308 UART: [fwproc] Waiting for Commands...
1,587,013 UART: [fwproc] Received command 0x46574c44
1,587,804 UART: [fwproc] Received Image of size 119428 bytes
2,942,474 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,496 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,714 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,287 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,420 ready_for_fw is high
1,363,420 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,163 >>> mbox cmd response: success
3,056,572 UART:
3,056,588 UART: Running Caliptra FMC ...
3,056,996 UART:
3,057,139 UART: [state] CFI Enabled
3,067,739 UART: [fht] FMC Alias Private Key: 7
3,186,643 UART: [art] Extend RT PCRs Done
3,187,071 UART: [art] Lock RT PCRs Done
3,188,769 UART: [art] Populate DV Done
3,197,076 UART: [fht] FMC Alias Private Key: 7
3,198,160 UART: [art] Derive CDI
3,198,440 UART: [art] Store in slot 0x4
3,284,696 UART: [art] Derive Key Pair
3,285,056 UART: [art] Store priv key in slot 0x5
3,298,137 UART: [art] Derive Key Pair - Done
3,313,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,328,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,329,289 UART: [art] PUB.X = 516CB69B85A16367C50D072FD11088B79C628DF1ADB03E967EA0111908954662DDB31E905E0687EBF090481C950119C9
3,336,038 UART: [art] PUB.Y = C8FCEBB3108F04310D289CEBA9A38CA57C90FEA40F4F01374447646E9B7CAC0B8B9F95C32E231B83C138C8A933637086
3,342,981 UART: [art] SIG.R = CC645DDFA688A0E61530490860F59064DF66E987EF0101138CDD10EDE381F26746728F4B6028F2A1A8475CA61FAE1021
3,349,742 UART: [art] SIG.S = 6D232D7A13A5AF264DDD72F92D5FDFEAB8E62BE69845F39A6EE6B526157A2FC52B9071D6F636D463F9AB1C9BB857B1CF
3,373,724 UART: Caliptra RT
3,374,067 UART: [state] CFI Enabled
3,495,047 UART: [rt] RT listening for mailbox commands...
3,495,710 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,645 UART: [rt]cmd =0x46504c54, len=4
3,526,853 >>> mbox cmd response data (8 bytes)
3,527,064 UART: [rt] FIPS self test
3,527,392 UART: [kat] ++
3,527,544 UART: [kat] sha1
3,531,808 UART: [kat] SHA2-256
3,533,830 UART: [kat] SHA2-384
3,536,561 UART: [kat] SHA2-512-ACC
3,538,488 UART: [kat] ECC-384
3,548,666 UART: [kat] HMAC-384Kdf
3,553,267 UART: [kat] LMS
4,658,933 UART: Fatal Error: 0x90070002
4,660,472 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,660,477 >>> mbox cmd response: failed
4,660,477 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,660,482 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,436 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,207 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,018 UART: [kat] ++
895,170 UART: [kat] sha1
899,418 UART: [kat] SHA2-256
901,358 UART: [kat] SHA2-384
904,123 UART: [kat] SHA2-512-ACC
906,024 UART: [kat] ECC-384
915,711 UART: [kat] HMAC-384Kdf
920,355 UART: [kat] LMS
1,168,667 UART: [kat] --
1,169,540 UART: [cold-reset] ++
1,169,922 UART: [fht] FHT @ 0x50003400
1,172,722 UART: [idev] ++
1,172,890 UART: [idev] CDI.KEYID = 6
1,173,251 UART: [idev] SUBJECT.KEYID = 7
1,173,676 UART: [idev] UDS.KEYID = 0
1,174,022 ready_for_fw is high
1,174,022 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,479 UART: [idev] Erasing UDS.KEYID = 0
1,198,215 UART: [idev] Sha1 KeyId Algorithm
1,207,285 UART: [idev] --
1,208,148 UART: [ldev] ++
1,208,316 UART: [ldev] CDI.KEYID = 6
1,208,680 UART: [ldev] SUBJECT.KEYID = 5
1,209,107 UART: [ldev] AUTHORITY.KEYID = 7
1,209,570 UART: [ldev] FE.KEYID = 1
1,214,798 UART: [ldev] Erasing FE.KEYID = 1
1,241,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,696 UART: [ldev] --
1,279,909 UART: [fwproc] Wait for Commands...
1,280,696 UART: [fwproc] Recv command 0x46574c44
1,281,429 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,581 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,756 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,443 >>> mbox cmd response: success
2,837,607 UART: [afmc] ++
2,837,775 UART: [afmc] CDI.KEYID = 6
2,838,138 UART: [afmc] SUBJECT.KEYID = 7
2,838,564 UART: [afmc] AUTHORITY.KEYID = 5
2,874,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,548 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,297 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,007 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,888 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,589 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,304 UART: [afmc] --
2,917,223 UART: [cold-reset] --
2,918,087 UART: [state] Locking Datavault
2,919,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,018 UART: [state] Locking ICCM
2,920,550 UART: [exit] Launching FMC @ 0x40000130
2,925,880 UART:
2,925,896 UART: Running Caliptra FMC ...
2,926,304 UART:
2,926,358 UART: [state] CFI Enabled
2,937,136 UART: [fht] FMC Alias Private Key: 7
3,056,298 UART: [art] Extend RT PCRs Done
3,056,726 UART: [art] Lock RT PCRs Done
3,058,194 UART: [art] Populate DV Done
3,066,563 UART: [fht] FMC Alias Private Key: 7
3,067,571 UART: [art] Derive CDI
3,067,851 UART: [art] Store in slot 0x4
3,153,556 UART: [art] Derive Key Pair
3,153,916 UART: [art] Store priv key in slot 0x5
3,167,002 UART: [art] Derive Key Pair - Done
3,181,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,785 UART: [art] PUB.X = C5A1FA0E5B04CC3C7F1D283D48225D309E0C0AFB6B3B36CD9486D518EE41FB6B6FD87B971A6BD70FAC85BCFC6D857B87
3,204,564 UART: [art] PUB.Y = DF6F27AE257F71A87C5409A8DD28F409EC841DC74FF8F85E578C4FFC7B2FE30B9ADE1F3CC476F73694DA1D1D98EA5973
3,211,525 UART: [art] SIG.R = 9A7B8D0D4B7B5F9A755B2285648177754FAFCEB09BD6AF12453F886CCC61C602C02B953A82874F4A2089E0639CB44D08
3,218,290 UART: [art] SIG.S = 12AE718A3498FD9E3E6E5950E3D731FC49FEE5291B984B8A2C2D30FA450B8B7B6A87C17E2C2056D5E820C01F72685678
3,241,941 UART: Caliptra RT
3,242,192 UART: [state] CFI Enabled
3,363,047 UART: [rt] RT listening for mailbox commands...
3,363,710 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,383 UART: [rt]cmd =0x46504c54, len=4
3,394,381 >>> mbox cmd response data (8 bytes)
3,394,540 UART: [rt] FIPS self test
3,394,868 UART: [kat] ++
3,395,020 UART: [kat] sha1
3,399,322 UART: [kat] SHA2-256
3,401,344 UART: [kat] SHA2-384
3,404,405 UART: [kat] SHA2-512-ACC
3,406,332 UART: [kat] ECC-384
3,416,144 UART: [kat] HMAC-384Kdf
3,420,814 UART: [kat] LMS
3,693,620 UART: Fatal Error: 0x90070002
3,695,159 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,695,164 >>> mbox cmd response: failed
3,695,164 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,695,169 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
891,538 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,642 UART: [kat] ++
895,794 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,889 UART: [kat] SHA2-512-ACC
906,790 UART: [kat] ECC-384
916,687 UART: [kat] HMAC-384Kdf
921,219 UART: [kat] LMS
1,169,531 UART: [kat] --
1,170,494 UART: [cold-reset] ++
1,171,028 UART: [fht] FHT @ 0x50003400
1,173,916 UART: [idev] ++
1,174,084 UART: [idev] CDI.KEYID = 6
1,174,445 UART: [idev] SUBJECT.KEYID = 7
1,174,870 UART: [idev] UDS.KEYID = 0
1,175,216 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,869 UART: [idev] Erasing UDS.KEYID = 0
1,200,117 UART: [idev] Sha1 KeyId Algorithm
1,209,113 UART: [idev] --
1,210,324 UART: [ldev] ++
1,210,492 UART: [ldev] CDI.KEYID = 6
1,210,856 UART: [ldev] SUBJECT.KEYID = 5
1,211,283 UART: [ldev] AUTHORITY.KEYID = 7
1,211,746 UART: [ldev] FE.KEYID = 1
1,217,002 UART: [ldev] Erasing FE.KEYID = 1
1,243,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,486 UART: [ldev] --
1,282,847 UART: [fwproc] Wait for Commands...
1,283,456 UART: [fwproc] Recv command 0x46574c44
1,284,189 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,307 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,482 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,183 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,638 ready_for_fw is high
1,059,638 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,592 >>> mbox cmd response: success
2,751,541 UART:
2,751,557 UART: Running Caliptra FMC ...
2,751,965 UART:
2,752,019 UART: [state] CFI Enabled
2,762,453 UART: [fht] FMC Alias Private Key: 7
2,880,955 UART: [art] Extend RT PCRs Done
2,881,383 UART: [art] Lock RT PCRs Done
2,882,731 UART: [art] Populate DV Done
2,891,282 UART: [fht] FMC Alias Private Key: 7
2,892,228 UART: [art] Derive CDI
2,892,508 UART: [art] Store in slot 0x4
2,978,417 UART: [art] Derive Key Pair
2,978,777 UART: [art] Store priv key in slot 0x5
2,991,909 UART: [art] Derive Key Pair - Done
3,006,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,313 UART: [art] PUB.X = 5A35693BF945F02E4695F3D21382D480897805E2125CD07F4044AB5F611709440DA15C6318D8F47B14CAD61780991AC7
3,029,064 UART: [art] PUB.Y = D1F4853D25C50265BAE59D1B116D57364278DABBB8EBABE21033E1AF3A4DE8FD147255A52A2D1F54C7648248DCA1451A
3,036,023 UART: [art] SIG.R = 817DBBE746474DD99E072D63F496530D6C94F4E419D53AAA206C4322E89FB4C154FF0E80F8131A1221F913614FF59A06
3,042,781 UART: [art] SIG.S = 2338906F00396A8CE42B5E86A23A759347DFAE00AF198C115E8196095ECDF7AF369982D2911608347D6510ABE9A9F82F
3,066,195 UART: Caliptra RT
3,066,446 UART: [state] CFI Enabled
3,186,949 UART: [rt] RT listening for mailbox commands...
3,187,612 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,549 UART: [rt]cmd =0x46504c54, len=4
3,218,643 >>> mbox cmd response data (8 bytes)
3,218,890 UART: [rt] FIPS self test
3,219,218 UART: [kat] ++
3,219,370 UART: [kat] sha1
3,223,786 UART: [kat] SHA2-256
3,225,808 UART: [kat] SHA2-384
3,228,639 UART: [kat] SHA2-512-ACC
3,230,566 UART: [kat] ECC-384
3,240,386 UART: [kat] HMAC-384Kdf
3,244,842 UART: [kat] LMS
3,517,664 UART: Fatal Error: 0x90070002
3,519,203 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,519,208 >>> mbox cmd response: failed
3,519,208 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,519,213 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,018 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,686,688 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,953 UART: [state] LifecycleState = Unprovisioned
85,608 UART: [state] DebugLocked = No
86,236 UART: [state] WD Timer not started. Device not locked for debugging
87,505 UART: [kat] SHA2-256
891,055 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,475 UART: [kat] SHA2-256
901,415 UART: [kat] SHA2-384
904,262 UART: [kat] SHA2-512-ACC
906,163 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,896 UART: [kat] LMS
1,169,208 UART: [kat] --
1,170,309 UART: [cold-reset] ++
1,170,859 UART: [fht] FHT @ 0x50003400
1,173,583 UART: [idev] ++
1,173,751 UART: [idev] CDI.KEYID = 6
1,174,112 UART: [idev] SUBJECT.KEYID = 7
1,174,537 UART: [idev] UDS.KEYID = 0
1,174,883 ready_for_fw is high
1,174,883 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,330 UART: [idev] Erasing UDS.KEYID = 0
1,198,878 UART: [idev] Sha1 KeyId Algorithm
1,207,824 UART: [idev] --
1,208,845 UART: [ldev] ++
1,209,013 UART: [ldev] CDI.KEYID = 6
1,209,377 UART: [ldev] SUBJECT.KEYID = 5
1,209,804 UART: [ldev] AUTHORITY.KEYID = 7
1,210,267 UART: [ldev] FE.KEYID = 1
1,215,281 UART: [ldev] Erasing FE.KEYID = 1
1,241,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,517 UART: [ldev] --
1,280,932 UART: [fwproc] Wait for Commands...
1,281,675 UART: [fwproc] Recv command 0x46574c44
1,282,408 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,766 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,941 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,642 >>> mbox cmd response: success
2,838,790 UART: [afmc] ++
2,838,958 UART: [afmc] CDI.KEYID = 6
2,839,321 UART: [afmc] SUBJECT.KEYID = 7
2,839,747 UART: [afmc] AUTHORITY.KEYID = 5
2,874,926 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,492 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,202 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,083 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,784 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,497 UART: [afmc] --
2,918,394 UART: [cold-reset] --
2,919,218 UART: [state] Locking Datavault
2,920,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,025 UART: [state] Locking ICCM
2,921,467 UART: [exit] Launching FMC @ 0x40000130
2,926,797 UART:
2,926,813 UART: Running Caliptra FMC ...
2,927,221 UART:
2,927,364 UART: [state] CFI Enabled
2,937,766 UART: [fht] FMC Alias Private Key: 7
3,056,696 UART: [art] Extend RT PCRs Done
3,057,124 UART: [art] Lock RT PCRs Done
3,058,560 UART: [art] Populate DV Done
3,066,859 UART: [fht] FMC Alias Private Key: 7
3,067,805 UART: [art] Derive CDI
3,068,085 UART: [art] Store in slot 0x4
3,153,724 UART: [art] Derive Key Pair
3,154,084 UART: [art] Store priv key in slot 0x5
3,166,964 UART: [art] Derive Key Pair - Done
3,181,975 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,766 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,531 UART: [art] PUB.X = A7D6D173C02AA1F0DE499020D37917477A4B3B64FCDF72C1A9007B1C4287C224613DF9C8765FFC332A98448D0751E93B
3,205,278 UART: [art] PUB.Y = 92768DB68986962DB44711EEB094302FD33C61EF2D62A972D1916A28229A435E91D304C427D06CEBB8A458A19AEC7F7E
3,212,227 UART: [art] SIG.R = F480E1566275DE222817B03F63E6B6924AC165FB5C82BD58D51742EA7A8F2615E8F16049E19C902FB1654FC8E797EA26
3,218,997 UART: [art] SIG.S = D4B946369C10407EAC297A601F7D951254A2B099E6CD8937D10C95EC6D010004612206AC21188A5BB648ED3C2BE5D697
3,242,703 UART: Caliptra RT
3,243,046 UART: [state] CFI Enabled
3,363,018 UART: [rt] RT listening for mailbox commands...
3,363,681 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,600 UART: [rt]cmd =0x46504c54, len=4
3,394,810 >>> mbox cmd response data (8 bytes)
3,395,111 UART: [rt] FIPS self test
3,395,439 UART: [kat] ++
3,395,591 UART: [kat] sha1
3,399,805 UART: [kat] SHA2-256
3,401,827 UART: [kat] SHA2-384
3,404,598 UART: [kat] SHA2-512-ACC
3,406,525 UART: [kat] ECC-384
3,416,879 UART: [kat] HMAC-384Kdf
3,421,531 UART: [kat] LMS
3,694,311 UART: Fatal Error: 0x90070002
3,695,850 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,695,855 >>> mbox cmd response: failed
3,695,855 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,695,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,731 UART: [kat] ++
895,883 UART: [kat] sha1
900,257 UART: [kat] SHA2-256
902,197 UART: [kat] SHA2-384
905,044 UART: [kat] SHA2-512-ACC
906,945 UART: [kat] ECC-384
917,058 UART: [kat] HMAC-384Kdf
921,898 UART: [kat] LMS
1,170,210 UART: [kat] --
1,171,205 UART: [cold-reset] ++
1,171,669 UART: [fht] FHT @ 0x50003400
1,174,367 UART: [idev] ++
1,174,535 UART: [idev] CDI.KEYID = 6
1,174,896 UART: [idev] SUBJECT.KEYID = 7
1,175,321 UART: [idev] UDS.KEYID = 0
1,175,667 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,402 UART: [idev] Erasing UDS.KEYID = 0
1,200,790 UART: [idev] Sha1 KeyId Algorithm
1,209,772 UART: [idev] --
1,210,921 UART: [ldev] ++
1,211,089 UART: [ldev] CDI.KEYID = 6
1,211,453 UART: [ldev] SUBJECT.KEYID = 5
1,211,880 UART: [ldev] AUTHORITY.KEYID = 7
1,212,343 UART: [ldev] FE.KEYID = 1
1,217,525 UART: [ldev] Erasing FE.KEYID = 1
1,243,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,705 UART: [ldev] --
1,282,974 UART: [fwproc] Wait for Commands...
1,283,599 UART: [fwproc] Recv command 0x46574c44
1,284,332 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,020 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,195 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,694 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,291 ready_for_fw is high
1,060,291 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,777 >>> mbox cmd response: success
2,753,580 UART:
2,753,596 UART: Running Caliptra FMC ...
2,754,004 UART:
2,754,147 UART: [state] CFI Enabled
2,764,743 UART: [fht] FMC Alias Private Key: 7
2,884,235 UART: [art] Extend RT PCRs Done
2,884,663 UART: [art] Lock RT PCRs Done
2,886,209 UART: [art] Populate DV Done
2,894,420 UART: [fht] FMC Alias Private Key: 7
2,895,464 UART: [art] Derive CDI
2,895,744 UART: [art] Store in slot 0x4
2,981,515 UART: [art] Derive Key Pair
2,981,875 UART: [art] Store priv key in slot 0x5
2,995,983 UART: [art] Derive Key Pair - Done
3,010,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,264 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,029 UART: [art] PUB.X = C71F86D4AB85676261AF80AD566496B398563CF6C94C0A9349A9602DB9508790901BD4BA244081C42F52177A368087E2
3,033,786 UART: [art] PUB.Y = 19E7EA0159EFB00CEB313A66B464A0AAC72FC6BC5BCA48B045AE2EF93C9EB1E2B0F706B4674F5143D7C4759A35FEB3C5
3,040,749 UART: [art] SIG.R = A62C590B521FB18250B53DFF1E774CF061C4D60671EAEC484ABA69D6EE4CD6B46FB63D8869BDFFA5E16A56F73A450F1E
3,047,530 UART: [art] SIG.S = FD9ECDC7F76962FABC480308B879285C2755E98C56AF94F387CA16ACFE49ABCD7FDC8CBEA64AB465DB2D05574376678D
3,071,515 UART: Caliptra RT
3,071,858 UART: [state] CFI Enabled
3,191,800 UART: [rt] RT listening for mailbox commands...
3,192,463 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,272 UART: [rt]cmd =0x46504c54, len=4
3,223,414 >>> mbox cmd response data (8 bytes)
3,223,531 UART: [rt] FIPS self test
3,223,859 UART: [kat] ++
3,224,011 UART: [kat] sha1
3,228,189 UART: [kat] SHA2-256
3,230,211 UART: [kat] SHA2-384
3,233,068 UART: [kat] SHA2-512-ACC
3,234,995 UART: [kat] ECC-384
3,244,915 UART: [kat] HMAC-384Kdf
3,249,739 UART: [kat] LMS
3,522,497 UART: Fatal Error: 0x90070002
3,524,036 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,524,041 >>> mbox cmd response: failed
3,524,041 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,524,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,501 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,067 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
893,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,589 UART: [kat] ++
897,741 UART: [kat] sha1
901,857 UART: [kat] SHA2-256
903,797 UART: [kat] SHA2-384
906,412 UART: [kat] SHA2-512-ACC
908,313 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,788 UART: [kat] LMS
1,171,116 UART: [kat] --
1,172,059 UART: [cold-reset] ++
1,172,587 UART: [fht] FHT @ 0x50003400
1,175,120 UART: [idev] ++
1,175,288 UART: [idev] CDI.KEYID = 6
1,175,648 UART: [idev] SUBJECT.KEYID = 7
1,176,072 UART: [idev] UDS.KEYID = 0
1,176,417 ready_for_fw is high
1,176,417 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,430 UART: [idev] Erasing UDS.KEYID = 0
1,201,633 UART: [idev] Sha1 KeyId Algorithm
1,210,175 UART: [idev] --
1,211,175 UART: [ldev] ++
1,211,343 UART: [ldev] CDI.KEYID = 6
1,211,706 UART: [ldev] SUBJECT.KEYID = 5
1,212,132 UART: [ldev] AUTHORITY.KEYID = 7
1,212,595 UART: [ldev] FE.KEYID = 1
1,217,757 UART: [ldev] Erasing FE.KEYID = 1
1,243,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,809 UART: [ldev] --
1,283,158 UART: [fwproc] Wait for Commands...
1,283,790 UART: [fwproc] Recv command 0x46574c44
1,284,518 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,650 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,820 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,303 >>> mbox cmd response: success
2,841,441 UART: [afmc] ++
2,841,609 UART: [afmc] CDI.KEYID = 6
2,841,971 UART: [afmc] SUBJECT.KEYID = 7
2,842,396 UART: [afmc] AUTHORITY.KEYID = 5
2,877,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,118 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,827 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,710 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,411 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,323 UART: [afmc] --
2,921,401 UART: [cold-reset] --
2,922,121 UART: [state] Locking Datavault
2,923,384 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,988 UART: [state] Locking ICCM
2,924,446 UART: [exit] Launching FMC @ 0x40000130
2,929,776 UART:
2,929,792 UART: Running Caliptra FMC ...
2,930,200 UART:
2,930,254 UART: [state] CFI Enabled
2,940,692 UART: [fht] FMC Alias Private Key: 7
3,060,174 UART: [art] Extend RT PCRs Done
3,060,602 UART: [art] Lock RT PCRs Done
3,062,356 UART: [art] Populate DV Done
3,070,411 UART: [fht] FMC Alias Private Key: 7
3,071,507 UART: [art] Derive CDI
3,071,787 UART: [art] Store in slot 0x4
3,157,922 UART: [art] Derive Key Pair
3,158,282 UART: [art] Store priv key in slot 0x5
3,171,750 UART: [art] Derive Key Pair - Done
3,186,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,820 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,585 UART: [art] PUB.X = B5E47A014F17CD527456DC0577CAA23DF717D4A7905308F4126E08BE7C3628C57D19D61101FB5B3725CF986056B00D86
3,209,335 UART: [art] PUB.Y = 6EA72E2D22DCD8B445DDC34ADE4FC2324BA233738DC3B307EE101460AD001240C451C0F2B163D417B28403ECF3A65815
3,216,265 UART: [art] SIG.R = 232747146F4CC06D2838CF92CCCE957D684211AAF64692499905E8C21DA6EC4CF1E28B7DB7C6BB4B9D3594AB0F4273EC
3,223,039 UART: [art] SIG.S = 2B072C2025CD0A605C3458EC4ED6CBC05CE9B1D3470402CC52E9835ED5DC06EA099A4B8B49B12FEA3664A3A0AD745FC5
3,246,539 UART: Caliptra RT
3,246,790 UART: [state] CFI Enabled
3,366,454 UART: [rt] RT listening for mailbox commands...
3,367,117 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,792 UART: [rt]cmd =0x46504c54, len=4
3,398,060 >>> mbox cmd response data (8 bytes)
3,398,389 UART: [rt] FIPS self test
3,398,717 UART: [kat] ++
3,398,869 UART: [kat] sha1
3,403,135 UART: [kat] SHA2-256
3,405,157 UART: [kat] SHA2-384
3,408,164 UART: [kat] SHA2-512-ACC
3,410,091 UART: [kat] ECC-384
3,419,963 UART: [kat] HMAC-384Kdf
3,424,667 UART: [kat] LMS
3,697,435 UART: Fatal Error: 0x90070002
3,698,974 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,698,979 >>> mbox cmd response: failed
3,698,979 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,698,984 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
893,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,171 UART: [kat] ++
897,323 UART: [kat] sha1
901,501 UART: [kat] SHA2-256
903,441 UART: [kat] SHA2-384
906,082 UART: [kat] SHA2-512-ACC
907,983 UART: [kat] ECC-384
917,632 UART: [kat] HMAC-384Kdf
922,228 UART: [kat] LMS
1,170,556 UART: [kat] --
1,171,231 UART: [cold-reset] ++
1,171,805 UART: [fht] FHT @ 0x50003400
1,174,512 UART: [idev] ++
1,174,680 UART: [idev] CDI.KEYID = 6
1,175,040 UART: [idev] SUBJECT.KEYID = 7
1,175,464 UART: [idev] UDS.KEYID = 0
1,175,809 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,450 UART: [idev] Erasing UDS.KEYID = 0
1,200,847 UART: [idev] Sha1 KeyId Algorithm
1,209,435 UART: [idev] --
1,210,465 UART: [ldev] ++
1,210,633 UART: [ldev] CDI.KEYID = 6
1,210,996 UART: [ldev] SUBJECT.KEYID = 5
1,211,422 UART: [ldev] AUTHORITY.KEYID = 7
1,211,885 UART: [ldev] FE.KEYID = 1
1,217,191 UART: [ldev] Erasing FE.KEYID = 1
1,243,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,351 UART: [ldev] --
1,282,696 UART: [fwproc] Wait for Commands...
1,283,430 UART: [fwproc] Recv command 0x46574c44
1,284,158 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,968 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,138 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,845 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,697 ready_for_fw is high
1,059,697 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,252 >>> mbox cmd response: success
2,751,857 UART:
2,751,873 UART: Running Caliptra FMC ...
2,752,281 UART:
2,752,335 UART: [state] CFI Enabled
2,762,473 UART: [fht] FMC Alias Private Key: 7
2,881,485 UART: [art] Extend RT PCRs Done
2,881,913 UART: [art] Lock RT PCRs Done
2,883,297 UART: [art] Populate DV Done
2,891,648 UART: [fht] FMC Alias Private Key: 7
2,892,734 UART: [art] Derive CDI
2,893,014 UART: [art] Store in slot 0x4
2,978,801 UART: [art] Derive Key Pair
2,979,161 UART: [art] Store priv key in slot 0x5
2,992,237 UART: [art] Derive Key Pair - Done
3,006,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,125 UART: [art] PUB.X = 8D0565BDCCF73533BB8A6933E125783DAEBE356126E791C6C8E8BB05F13ACBEAFDDA511658ACBA6DACBBFB4A3079C2B9
3,029,917 UART: [art] PUB.Y = 8DB9448D6FE072B894A722871CDF24F7506014C6FB959101B6986A6A11B443A46AED383AB8F23468799436BEB4C8264E
3,036,862 UART: [art] SIG.R = 28ADA4B5AF72202FC7B59A719A75DFC37D41533282BAC77D586A52BDD8C419A21423A126C55376508D8878549A1A6903
3,043,627 UART: [art] SIG.S = DBFC17CD5A6562E3FA8A8D8DAF9A980124FFB577205921538CED4EE0390AC899319C6A7D966FD0C34A74BC7580E1AA87
3,067,575 UART: Caliptra RT
3,067,826 UART: [state] CFI Enabled
3,188,081 UART: [rt] RT listening for mailbox commands...
3,188,744 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,511 UART: [rt]cmd =0x46504c54, len=4
3,219,815 >>> mbox cmd response data (8 bytes)
3,220,086 UART: [rt] FIPS self test
3,220,414 UART: [kat] ++
3,220,566 UART: [kat] sha1
3,224,696 UART: [kat] SHA2-256
3,226,718 UART: [kat] SHA2-384
3,229,381 UART: [kat] SHA2-512-ACC
3,231,308 UART: [kat] ECC-384
3,241,636 UART: [kat] HMAC-384Kdf
3,246,408 UART: [kat] LMS
3,519,098 UART: Fatal Error: 0x90070002
3,520,637 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,520,642 >>> mbox cmd response: failed
3,520,642 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,520,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,987 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,764 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
902,042 UART: [kat] SHA2-256
903,982 UART: [kat] SHA2-384
906,513 UART: [kat] SHA2-512-ACC
908,414 UART: [kat] ECC-384
918,349 UART: [kat] HMAC-384Kdf
922,925 UART: [kat] LMS
1,171,253 UART: [kat] --
1,171,892 UART: [cold-reset] ++
1,172,270 UART: [fht] FHT @ 0x50003400
1,174,991 UART: [idev] ++
1,175,159 UART: [idev] CDI.KEYID = 6
1,175,519 UART: [idev] SUBJECT.KEYID = 7
1,175,943 UART: [idev] UDS.KEYID = 0
1,176,288 ready_for_fw is high
1,176,288 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,747 UART: [idev] Erasing UDS.KEYID = 0
1,200,920 UART: [idev] Sha1 KeyId Algorithm
1,209,250 UART: [idev] --
1,210,368 UART: [ldev] ++
1,210,536 UART: [ldev] CDI.KEYID = 6
1,210,899 UART: [ldev] SUBJECT.KEYID = 5
1,211,325 UART: [ldev] AUTHORITY.KEYID = 7
1,211,788 UART: [ldev] FE.KEYID = 1
1,217,048 UART: [ldev] Erasing FE.KEYID = 1
1,243,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,094 UART: [ldev] --
1,283,429 UART: [fwproc] Wait for Commands...
1,284,211 UART: [fwproc] Recv command 0x46574c44
1,284,939 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,729 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,899 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,430 >>> mbox cmd response: success
2,839,658 UART: [afmc] ++
2,839,826 UART: [afmc] CDI.KEYID = 6
2,840,188 UART: [afmc] SUBJECT.KEYID = 7
2,840,613 UART: [afmc] AUTHORITY.KEYID = 5
2,876,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,875 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,584 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,467 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,168 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,208 UART: [afmc] --
2,920,110 UART: [cold-reset] --
2,920,990 UART: [state] Locking Datavault
2,921,967 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,571 UART: [state] Locking ICCM
2,923,059 UART: [exit] Launching FMC @ 0x40000130
2,928,389 UART:
2,928,405 UART: Running Caliptra FMC ...
2,928,813 UART:
2,928,956 UART: [state] CFI Enabled
2,939,600 UART: [fht] FMC Alias Private Key: 7
3,058,790 UART: [art] Extend RT PCRs Done
3,059,218 UART: [art] Lock RT PCRs Done
3,060,866 UART: [art] Populate DV Done
3,069,167 UART: [fht] FMC Alias Private Key: 7
3,070,149 UART: [art] Derive CDI
3,070,429 UART: [art] Store in slot 0x4
3,156,038 UART: [art] Derive Key Pair
3,156,398 UART: [art] Store priv key in slot 0x5
3,170,056 UART: [art] Derive Key Pair - Done
3,184,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,822 UART: [art] PUB.X = 01979532B36F5182CF5CF30F94136F463FB4FC28702F378669B5706F3A38A51F8F522705E7314F13080FFB41F29C637D
3,207,569 UART: [art] PUB.Y = 15EF05F29375977CCE640548B69E2E874F662922DAC2C27F13A1EC6DE91B8FC824AE11DCA6470105238BBE785EDA0DC3
3,214,514 UART: [art] SIG.R = 59085C43EE78D9C07C1B48538447C395FF6CC31E04AA0288F39AC5C05A620E23190AD53511498580B6960FDEDB36F84F
3,221,266 UART: [art] SIG.S = 9FB2C2A0D3D098930861D0DA3AB9D7072C885EA4A7238269D7EF458B89E3D8A31EC8C8ADD823D80D6652A262792A69CB
3,245,631 UART: Caliptra RT
3,245,974 UART: [state] CFI Enabled
3,364,637 UART: [rt] RT listening for mailbox commands...
3,365,300 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,943 UART: [rt]cmd =0x46504c54, len=4
3,396,111 >>> mbox cmd response data (8 bytes)
3,396,402 UART: [rt] FIPS self test
3,396,730 UART: [kat] ++
3,396,882 UART: [kat] sha1
3,401,070 UART: [kat] SHA2-256
3,403,092 UART: [kat] SHA2-384
3,405,945 UART: [kat] SHA2-512-ACC
3,407,872 UART: [kat] ECC-384
3,417,628 UART: [kat] HMAC-384Kdf
3,422,444 UART: [kat] LMS
3,695,312 UART: Fatal Error: 0x90070002
3,696,851 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,696,856 >>> mbox cmd response: failed
3,696,856 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,696,861 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,813 UART: [state] LifecycleState = Unprovisioned
86,468 UART: [state] DebugLocked = No
86,972 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
893,893 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,018 UART: [kat] ++
898,170 UART: [kat] sha1
902,384 UART: [kat] SHA2-256
904,324 UART: [kat] SHA2-384
907,027 UART: [kat] SHA2-512-ACC
908,928 UART: [kat] ECC-384
919,039 UART: [kat] HMAC-384Kdf
923,581 UART: [kat] LMS
1,171,909 UART: [kat] --
1,172,658 UART: [cold-reset] ++
1,173,038 UART: [fht] FHT @ 0x50003400
1,175,681 UART: [idev] ++
1,175,849 UART: [idev] CDI.KEYID = 6
1,176,209 UART: [idev] SUBJECT.KEYID = 7
1,176,633 UART: [idev] UDS.KEYID = 0
1,176,978 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,587 UART: [idev] Erasing UDS.KEYID = 0
1,201,560 UART: [idev] Sha1 KeyId Algorithm
1,209,862 UART: [idev] --
1,210,988 UART: [ldev] ++
1,211,156 UART: [ldev] CDI.KEYID = 6
1,211,519 UART: [ldev] SUBJECT.KEYID = 5
1,211,945 UART: [ldev] AUTHORITY.KEYID = 7
1,212,408 UART: [ldev] FE.KEYID = 1
1,217,762 UART: [ldev] Erasing FE.KEYID = 1
1,243,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,626 UART: [ldev] --
1,283,105 UART: [fwproc] Wait for Commands...
1,283,693 UART: [fwproc] Recv command 0x46574c44
1,284,421 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,265 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,435 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,032 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,750 ready_for_fw is high
1,060,750 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,669 >>> mbox cmd response: success
2,753,682 UART:
2,753,698 UART: Running Caliptra FMC ...
2,754,106 UART:
2,754,249 UART: [state] CFI Enabled
2,765,077 UART: [fht] FMC Alias Private Key: 7
2,884,451 UART: [art] Extend RT PCRs Done
2,884,879 UART: [art] Lock RT PCRs Done
2,886,295 UART: [art] Populate DV Done
2,894,612 UART: [fht] FMC Alias Private Key: 7
2,895,558 UART: [art] Derive CDI
2,895,838 UART: [art] Store in slot 0x4
2,981,723 UART: [art] Derive Key Pair
2,982,083 UART: [art] Store priv key in slot 0x5
2,995,699 UART: [art] Derive Key Pair - Done
3,010,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,892 UART: [art] PUB.X = 4919D784FE9780DB93001FBEC85C2CEB52251CD9828A284DDBE0B3CE84499EC1E4BD86E181821AD00EA9FABF0847AA4C
3,033,652 UART: [art] PUB.Y = 38DEA65731A0F962120C2A1D5E69743755079A2850D3561EB1B6242DEEC755FEB6841764B166BCA69CEEE51747A2D0E1
3,040,598 UART: [art] SIG.R = 2D5204D34E4E9D40395D5FF48AF3F4E9528558DB6B87633370CE08C8A50261E0C4ED979212FD35AAF0C9CB46E24DAA97
3,047,367 UART: [art] SIG.S = C9ED102D144C3A72EB6EADA3D88E81487BB497AB8498A0D7DDE9FEAB27BFDAF56C1F06DD52881E9C8D155486C32A9269
3,070,774 UART: Caliptra RT
3,071,117 UART: [state] CFI Enabled
3,190,748 UART: [rt] RT listening for mailbox commands...
3,191,411 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,306 UART: [rt]cmd =0x46504c54, len=4
3,222,514 >>> mbox cmd response data (8 bytes)
3,222,695 UART: [rt] FIPS self test
3,223,023 UART: [kat] ++
3,223,175 UART: [kat] sha1
3,227,517 UART: [kat] SHA2-256
3,229,539 UART: [kat] SHA2-384
3,232,560 UART: [kat] SHA2-512-ACC
3,234,487 UART: [kat] ECC-384
3,244,595 UART: [kat] HMAC-384Kdf
3,249,401 UART: [kat] LMS
3,522,259 UART: Fatal Error: 0x90070002
3,523,798 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,523,803 >>> mbox cmd response: failed
3,523,803 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,523,808 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,262 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,311 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,690,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,840,486 >>> mbox cmd response: failed
2,841,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,990,003 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,439,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,284,011 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,694,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,843,842 >>> mbox cmd response: failed
2,844,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,993,747 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,436,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,238,600 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
3,038,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,188,371 >>> mbox cmd response: failed
3,188,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,337,857 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
20,173,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,888,679 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,501 writing to cptra_bootfsm_go
3,037,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,187,407 >>> mbox cmd response: failed
3,187,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,336,678 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
20,176,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,883,719 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,684,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,834,580 >>> mbox cmd response: failed
2,835,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,984,005 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,451,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,287,634 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
2,682,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,831,960 >>> mbox cmd response: failed
2,832,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,259 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,429,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,266,403 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
3,034,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,184,405 >>> mbox cmd response: failed
3,184,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,333,811 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,174,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,878,167 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,035,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,185,207 >>> mbox cmd response: failed
3,185,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,334,657 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
20,171,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,875,787 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,106 >>> mbox cmd response: failed
807,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,112 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,976 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,000 >>> mbox cmd response: failed
807,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,264 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,857 >>> mbox cmd response: failed
806,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,543 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,941 >>> mbox cmd response: failed
806,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,947 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,163 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,722 >>> mbox cmd response: failed
806,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,728 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,386 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,130 >>> mbox cmd response: failed
807,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,294 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,885 >>> mbox cmd response: failed
806,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,891 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,039 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,207 >>> mbox cmd response: failed
807,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,213 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,767 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,053 UART:
192,456 UART: Running Caliptra ROM ...
193,579 UART:
193,726 UART: [state] CFI Enabled
265,011 UART: [state] LifecycleState = Unprovisioned
266,958 UART: [state] DebugLocked = No
268,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,662 UART: [kat] SHA2-256
443,373 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,881 UART: [kat] ++
454,329 UART: [kat] sha1
464,776 UART: [kat] SHA2-256
467,432 UART: [kat] SHA2-384
473,713 UART: [kat] SHA2-512-ACC
476,092 UART: [kat] ECC-384
2,765,908 UART: [kat] HMAC-384Kdf
2,796,138 UART: [kat] LMS
3,986,435 UART: [kat] --
3,989,892 UART: [cold-reset] ++
3,992,260 UART: [fht] Storing FHT @ 0x50003400
4,003,891 UART: [idev] ++
4,004,466 UART: [idev] CDI.KEYID = 6
4,005,508 UART: [idev] SUBJECT.KEYID = 7
4,006,694 UART: [idev] UDS.KEYID = 0
4,007,740 ready_for_fw is high
4,007,971 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,158,192 UART: [idev] Erasing UDS.KEYID = 0
7,343,938 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,779 UART: [idev] --
7,370,888 UART: [ldev] ++
7,371,460 UART: [ldev] CDI.KEYID = 6
7,372,403 UART: [ldev] SUBJECT.KEYID = 5
7,373,627 UART: [ldev] AUTHORITY.KEYID = 7
7,374,936 UART: [ldev] FE.KEYID = 1
7,419,009 UART: [ldev] Erasing FE.KEYID = 1
10,751,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,931 UART: [ldev] --
13,112,281 UART: [fwproc] Waiting for Commands...
13,115,460 UART: [fwproc] Received command 0x46574c44
13,117,650 UART: [fwproc] Received Image of size 119428 bytes
17,228,644 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,305,399 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,591 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,710,979 >>> mbox cmd response: success
17,715,795 UART: [afmc] ++
17,716,456 UART: [afmc] CDI.KEYID = 6
17,717,349 UART: [afmc] SUBJECT.KEYID = 7
17,718,568 UART: [afmc] AUTHORITY.KEYID = 5
21,090,073 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,857 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,114 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,407,531 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,257 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,665 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,457,990 UART: [afmc] --
23,462,124 UART: [cold-reset] --
23,467,883 UART: [state] Locking Datavault
23,474,633 UART: [state] Locking PCR0, PCR1 and PCR31
23,476,404 UART: [state] Locking ICCM
23,478,481 UART: [exit] Launching FMC @ 0x40000130
23,486,882 UART:
23,487,142 UART: Running Caliptra FMC ...
23,488,173 UART:
23,488,322 UART: [state] CFI Enabled
23,550,528 UART: [fht] FMC Alias Private Key: 7
25,912,293 UART: [art] Extend RT PCRs Done
25,913,531 UART: [art] Lock RT PCRs Done
25,914,860 UART: [art] Populate DV Done
25,920,553 UART: [fht] FMC Alias Private Key: 7
25,922,195 UART: [art] Derive CDI
25,922,928 UART: [art] Store in slot 0x4
25,978,934 UART: [art] Derive Key Pair
25,979,976 UART: [art] Store priv key in slot 0x5
29,273,054 UART: [art] Derive Key Pair - Done
29,286,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,575,843 UART: [art] Erasing AUTHORITY.KEYID = 7
31,577,352 UART: [art] PUB.X = EB2DD31D2BBA592AC14C72F6107FBDF06B4E410E8432C88424C6B959C3E1172882C898A47AC0AF07FA525DE573577FF3
31,584,683 UART: [art] PUB.Y = F997AE236B91F167AD4222C5A53D20A5C9D759063630DCE71D6F84AEFB16964A94ECB60353C92187C23824DA162B285B
31,591,829 UART: [art] SIG.R = 3A838F42836C39F0F04231F3E8C4C8B971E392DB48DAE18C51B4F8E98F42C66BEC911002DA9CEC91D5C62BE92C6EA5BE
31,599,286 UART: [art] SIG.S = E66A22A6FAB2FE03B3036025CF336D668637E0EBFBF7F7531642E8C54D4FB30951C8312136E50626C3BB70FA4041D24D
32,904,700 UART: Caliptra RT
32,905,410 UART: [state] CFI Enabled
33,091,442 UART: [rt] RT listening for mailbox commands...
33,093,324 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,123,174 UART: [rt]cmd =0x46504c54, len=4
33,124,649 >>> mbox cmd response data (8 bytes)
33,125,895 UART: [rt] FIPS self test
33,126,835 UART: [kat] ++
33,127,286 UART: [kat] sha1
33,127,909 UART: Fatal Error: 0x90060001
33,163,289 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,313,287 >>> mbox cmd response: failed
33,313,947 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,463,704 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,116 UART:
190,408 UART: Running Caliptra ROM ...
191,520 UART:
191,672 UART: [state] CFI Enabled
255,764 UART: [state] LifecycleState = Unprovisioned
257,743 UART: [state] DebugLocked = No
260,697 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
265,646 UART: [kat] SHA2-256
435,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
445,862 UART: [kat] ++
446,307 UART: [kat] sha1
457,401 UART: [kat] SHA2-256
460,084 UART: [kat] SHA2-384
466,138 UART: [kat] SHA2-512-ACC
468,537 UART: [kat] ECC-384
2,756,748 UART: [kat] HMAC-384Kdf
2,789,513 UART: [kat] LMS
3,979,840 UART: [kat] --
3,983,964 UART: [cold-reset] ++
3,985,745 UART: [fht] Storing FHT @ 0x50003400
3,997,173 UART: [idev] ++
3,997,739 UART: [idev] CDI.KEYID = 6
3,998,661 UART: [idev] SUBJECT.KEYID = 7
3,999,932 UART: [idev] UDS.KEYID = 0
4,001,459 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,151,571 UART: [idev] Erasing UDS.KEYID = 0
7,324,802 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,671 UART: [idev] --
7,350,018 UART: [ldev] ++
7,350,609 UART: [ldev] CDI.KEYID = 6
7,351,518 UART: [ldev] SUBJECT.KEYID = 5
7,352,736 UART: [ldev] AUTHORITY.KEYID = 7
7,354,032 UART: [ldev] FE.KEYID = 1
7,381,166 UART: [ldev] Erasing FE.KEYID = 1
10,719,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,163 UART: [ldev] --
13,096,000 UART: [fwproc] Waiting for Commands...
13,097,898 UART: [fwproc] Received command 0x46574c44
13,100,092 UART: [fwproc] Received Image of size 119428 bytes
17,223,031 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,299,305 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,372,498 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,703,697 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,808,649 ready_for_fw is high
3,809,183 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,984,983 >>> mbox cmd response: success
23,672,037 UART:
23,672,465 UART: Running Caliptra FMC ...
23,673,585 UART:
23,673,739 UART: [state] CFI Enabled
23,739,269 UART: [fht] FMC Alias Private Key: 7
26,080,157 UART: [art] Extend RT PCRs Done
26,081,401 UART: [art] Lock RT PCRs Done
26,083,117 UART: [art] Populate DV Done
26,088,727 UART: [fht] FMC Alias Private Key: 7
26,090,275 UART: [art] Derive CDI
26,091,044 UART: [art] Store in slot 0x4
26,148,743 UART: [art] Derive Key Pair
26,149,789 UART: [art] Store priv key in slot 0x5
29,442,339 UART: [art] Derive Key Pair - Done
29,455,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,511 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,018 UART: [art] PUB.X = 10AF3D4F03379AF9ADA2F6A01E5E35CB4CB80A59CD2B680FAA5B07AB42A582AACE8C94546449ACE66E208BC773366885
31,752,288 UART: [art] PUB.Y = BCFF3A01F87BB5755D41BECECCC3B7A8A93F0F9F9D09820800FD842FFF941D0747BBA7F133E7A91229EB4ECA798D0C3D
31,759,533 UART: [art] SIG.R = AB6918630BFF791DEE4C489E6D12E36A20A235A9AC8D68AF841727B92D7F69449D978C83BFF98161511DB1C5B1E322BA
31,766,936 UART: [art] SIG.S = 226D163587AF9B48580DFD2F0969870014C48B3346B013C40F948126DDE3D97B66BB33BED177986C644C3ED631D28930
33,072,311 UART: Caliptra RT
33,073,034 UART: [state] CFI Enabled
33,249,060 UART: [rt] RT listening for mailbox commands...
33,250,918 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,280,831 UART: [rt]cmd =0x46504c54, len=4
33,282,462 >>> mbox cmd response data (8 bytes)
33,283,412 UART: [rt] FIPS self test
33,284,359 UART: [kat] ++
33,284,808 UART: [kat] sha1
33,285,534 UART: Fatal Error: 0x90060001
33,320,818 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,470,802 >>> mbox cmd response: failed
33,471,426 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,621,165 >>> mbox cmd response: failed
Initializing fuses
935 writing to cptra_bootfsm_go
3,777,202 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,947,945 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
192,327 UART:
192,730 UART: Running Caliptra ROM ...
193,826 UART:
603,491 UART: [state] CFI Enabled
619,431 UART: [state] LifecycleState = Unprovisioned
621,307 UART: [state] DebugLocked = No
623,189 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,193 UART: [kat] SHA2-256
797,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,493 UART: [kat] ++
808,944 UART: [kat] sha1
820,413 UART: [kat] SHA2-256
823,180 UART: [kat] SHA2-384
828,758 UART: [kat] SHA2-512-ACC
831,136 UART: [kat] ECC-384
3,113,763 UART: [kat] HMAC-384Kdf
3,126,856 UART: [kat] LMS
4,316,969 UART: [kat] --
4,321,561 UART: [cold-reset] ++
4,323,005 UART: [fht] Storing FHT @ 0x50003400
4,335,780 UART: [idev] ++
4,336,361 UART: [idev] CDI.KEYID = 6
4,337,283 UART: [idev] SUBJECT.KEYID = 7
4,338,536 UART: [idev] UDS.KEYID = 0
4,339,578 ready_for_fw is high
4,339,794 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,489,805 UART: [idev] Erasing UDS.KEYID = 0
7,625,991 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,666 UART: [idev] --
7,651,133 UART: [ldev] ++
7,651,711 UART: [ldev] CDI.KEYID = 6
7,652,737 UART: [ldev] SUBJECT.KEYID = 5
7,653,901 UART: [ldev] AUTHORITY.KEYID = 7
7,655,159 UART: [ldev] FE.KEYID = 1
7,665,003 UART: [ldev] Erasing FE.KEYID = 1
10,952,629 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,071 UART: [ldev] --
13,310,817 UART: [fwproc] Waiting for Commands...
13,313,195 UART: [fwproc] Received command 0x46574c44
13,315,390 UART: [fwproc] Received Image of size 119428 bytes
17,434,621 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,511,513 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,584,683 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,917,133 >>> mbox cmd response: success
17,921,367 UART: [afmc] ++
17,921,977 UART: [afmc] CDI.KEYID = 6
17,922,865 UART: [afmc] SUBJECT.KEYID = 7
17,924,138 UART: [afmc] AUTHORITY.KEYID = 5
21,238,463 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,532,574 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,534,840 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,549,257 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,563,976 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,578,404 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,600,420 UART: [afmc] --
23,604,996 UART: [cold-reset] --
23,607,455 UART: [state] Locking Datavault
23,613,247 UART: [state] Locking PCR0, PCR1 and PCR31
23,615,004 UART: [state] Locking ICCM
23,617,274 UART: [exit] Launching FMC @ 0x40000130
23,625,683 UART:
23,625,985 UART: Running Caliptra FMC ...
23,627,108 UART:
23,627,273 UART: [state] CFI Enabled
23,635,271 UART: [fht] FMC Alias Private Key: 7
25,975,192 UART: [art] Extend RT PCRs Done
25,976,439 UART: [art] Lock RT PCRs Done
25,978,219 UART: [art] Populate DV Done
25,983,745 UART: [fht] FMC Alias Private Key: 7
25,985,234 UART: [art] Derive CDI
25,985,977 UART: [art] Store in slot 0x4
26,029,002 UART: [art] Derive Key Pair
26,030,055 UART: [art] Store priv key in slot 0x5
29,271,999 UART: [art] Derive Key Pair - Done
29,285,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,565,484 UART: [art] Erasing AUTHORITY.KEYID = 7
31,566,999 UART: [art] PUB.X = 9E1578AD44EF2E0E5E7B2033F61E5981D68A1ACC7667A6D4D0F485FB751018031C8F6D5FAA08042DBBB30B494806947C
31,574,285 UART: [art] PUB.Y = 11E19ADDD5EDED06D433CF6AE9BE8209C68096A1C95175C8A92191428D59E20E5E2EE439C2FDC08E46666749CF460A59
31,581,534 UART: [art] SIG.R = 88C9B3C401AAF8B1E26711B040E25473D86B35B2C3729B7A3CCC28B8A0345FBB4B2AB03D37A4E6ECD38A893491074D06
31,588,936 UART: [art] SIG.S = C207A325AA9E369F7BA868783AFE351DE1B3E9A9A9C180887F3BFEAAB54D163036CBFBC50DB537F22A3C55C7AAF3CC09
32,894,469 UART: Caliptra RT
32,895,186 UART: [state] CFI Enabled
33,029,341 UART: [rt] RT listening for mailbox commands...
33,031,205 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,060,778 UART: [rt]cmd =0x46504c54, len=4
33,062,233 >>> mbox cmd response data (8 bytes)
33,063,428 UART: [rt] FIPS self test
33,064,384 UART: [kat] ++
33,064,837 UART: [kat] sha1
33,065,405 UART: Fatal Error: 0x90060001
33,100,478 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,250,439 >>> mbox cmd response: failed
33,251,015 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,400,961 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,040 UART:
190,337 UART: Running Caliptra ROM ...
191,367 UART:
7,128,010 UART: [state] CFI Enabled
7,142,612 UART: [state] LifecycleState = Unprovisioned
7,144,544 UART: [state] DebugLocked = No
7,146,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,151,426 UART: [kat] SHA2-256
7,321,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,331,725 UART: [kat] ++
7,332,218 UART: [kat] sha1
7,342,997 UART: [kat] SHA2-256
7,345,679 UART: [kat] SHA2-384
7,351,589 UART: [kat] SHA2-512-ACC
7,353,949 UART: [kat] ECC-384
9,638,294 UART: [kat] HMAC-384Kdf
9,651,443 UART: [kat] LMS
10,841,551 UART: [kat] --
10,845,451 UART: [cold-reset] ++
10,848,038 UART: [fht] Storing FHT @ 0x50003400
10,860,496 UART: [idev] ++
10,861,108 UART: [idev] CDI.KEYID = 6
10,862,038 UART: [idev] SUBJECT.KEYID = 7
10,863,265 UART: [idev] UDS.KEYID = 0
10,864,845 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,014,619 UART: [idev] Erasing UDS.KEYID = 0
14,150,960 UART: [idev] Using Sha1 for KeyId Algorithm
14,172,787 UART: [idev] --
14,176,628 UART: [ldev] ++
14,177,219 UART: [ldev] CDI.KEYID = 6
14,178,247 UART: [ldev] SUBJECT.KEYID = 5
14,179,413 UART: [ldev] AUTHORITY.KEYID = 7
14,180,649 UART: [ldev] FE.KEYID = 1
14,189,672 UART: [ldev] Erasing FE.KEYID = 1
17,478,187 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,771,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,786,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,800,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,815,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,834,602 UART: [ldev] --
19,839,399 UART: [fwproc] Waiting for Commands...
19,842,314 UART: [fwproc] Received command 0x46574c44
19,844,504 UART: [fwproc] Received Image of size 119428 bytes
23,963,391 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,045,428 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,118,589 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,450,749 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
4,127,835 ready_for_fw is high
4,128,346 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,184,989 >>> mbox cmd response: success
23,826,503 UART:
23,826,965 UART: Running Caliptra FMC ...
23,828,090 UART:
23,828,261 UART: [state] CFI Enabled
23,835,952 UART: [fht] FMC Alias Private Key: 7
26,175,394 UART: [art] Extend RT PCRs Done
26,176,630 UART: [art] Lock RT PCRs Done
26,178,053 UART: [art] Populate DV Done
26,183,378 UART: [fht] FMC Alias Private Key: 7
26,184,927 UART: [art] Derive CDI
26,185,693 UART: [art] Store in slot 0x4
26,228,733 UART: [art] Derive Key Pair
26,229,781 UART: [art] Store priv key in slot 0x5
29,471,092 UART: [art] Derive Key Pair - Done
29,484,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,764,500 UART: [art] Erasing AUTHORITY.KEYID = 7
31,766,052 UART: [art] PUB.X = 20DC27A9A42DD1A6C90CA2DC6FECB32B5713F7D9EADD41D96AB4B40F6A2A4E8550FC8CA2F34DA33F8C8B544A85BC3CAC
31,773,330 UART: [art] PUB.Y = E66B7BC974F506B9919BD8242024184BCEF0FE09D31A9131A26681EE09980E1744C9D41D7F9CEC667E7037291EEDBF8E
31,780,576 UART: [art] SIG.R = 3ACF631E69C4A83215DCD84391CB7B48F4B0F6FE7B9D2142E99A7A3F12EC84E4116ECB36AEB52E7C2D0C18DECBAE17A8
31,787,989 UART: [art] SIG.S = 33295D8B23A492BD9179D6B1EDE0B5D921B815E7F140055222F9299557784BC2501081E1EEFE0532EF3060BEE16C0B62
33,092,867 UART: Caliptra RT
33,093,611 UART: [state] CFI Enabled
33,225,923 UART: [rt] RT listening for mailbox commands...
33,227,791 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,257,548 UART: [rt]cmd =0x46504c54, len=4
33,259,059 >>> mbox cmd response data (8 bytes)
33,260,074 UART: [rt] FIPS self test
33,261,035 UART: [kat] ++
33,261,519 UART: [kat] sha1
33,262,098 UART: Fatal Error: 0x90060001
33,297,316 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,447,334 >>> mbox cmd response: failed
33,447,982 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,597,916 >>> mbox cmd response: failed
Initializing fuses
935 writing to cptra_bootfsm_go
10,462,403 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,514,366 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,147 UART:
192,534 UART: Running Caliptra ROM ...
193,670 UART:
193,816 UART: [state] CFI Enabled
265,231 UART: [state] LifecycleState = Unprovisioned
267,228 UART: [state] DebugLocked = No
269,198 UART: [state] WD Timer not started. Device not locked for debugging
273,544 UART: [kat] SHA2-256
453,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,040 UART: [kat] ++
464,580 UART: [kat] sha1
476,486 UART: [kat] SHA2-256
479,218 UART: [kat] SHA2-384
485,568 UART: [kat] SHA2-512-ACC
487,899 UART: [kat] ECC-384
2,947,793 UART: [kat] HMAC-384Kdf
2,971,207 UART: [kat] LMS
3,447,753 UART: [kat] --
3,450,686 UART: [cold-reset] ++
3,452,268 UART: [fht] FHT @ 0x50003400
3,463,827 UART: [idev] ++
3,464,400 UART: [idev] CDI.KEYID = 6
3,465,290 UART: [idev] SUBJECT.KEYID = 7
3,466,612 UART: [idev] UDS.KEYID = 0
3,467,517 ready_for_fw is high
3,467,725 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,617,909 UART: [idev] Erasing UDS.KEYID = 0
5,988,186 UART: [idev] Sha1 KeyId Algorithm
6,011,901 UART: [idev] --
6,016,965 UART: [ldev] ++
6,017,552 UART: [ldev] CDI.KEYID = 6
6,018,447 UART: [ldev] SUBJECT.KEYID = 5
6,019,669 UART: [ldev] AUTHORITY.KEYID = 7
6,020,913 UART: [ldev] FE.KEYID = 1
6,057,167 UART: [ldev] Erasing FE.KEYID = 1
8,566,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,548 UART: [ldev] --
10,373,612 UART: [fwproc] Wait for Commands...
10,375,660 UART: [fwproc] Recv command 0x46574c44
10,377,674 UART: [fwproc] Recv'd Img size: 119428 bytes
13,876,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,179 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,029,242 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,360,221 >>> mbox cmd response: success
14,365,171 UART: [afmc] ++
14,365,766 UART: [afmc] CDI.KEYID = 6
14,366,714 UART: [afmc] SUBJECT.KEYID = 7
14,367,927 UART: [afmc] AUTHORITY.KEYID = 5
16,896,416 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,696 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,527 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,589 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,670,135 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,694,673 UART: [afmc] --
18,698,294 UART: [cold-reset] --
18,702,974 UART: [state] Locking Datavault
18,707,957 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,717 UART: [state] Locking ICCM
18,710,896 UART: [exit] Launching FMC @ 0x40000130
18,719,353 UART:
18,719,593 UART: Running Caliptra FMC ...
18,720,701 UART:
18,720,865 UART: [state] CFI Enabled
18,776,364 UART: [fht] FMC Alias Private Key: 7
20,542,689 UART: [art] Extend RT PCRs Done
20,543,918 UART: [art] Lock RT PCRs Done
20,545,655 UART: [art] Populate DV Done
20,551,073 UART: [fht] FMC Alias Private Key: 7
20,552,782 UART: [art] Derive CDI
20,553,605 UART: [art] Store in slot 0x4
20,608,993 UART: [art] Derive Key Pair
20,610,046 UART: [art] Store priv key in slot 0x5
23,072,622 UART: [art] Derive Key Pair - Done
23,085,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,927 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,438 UART: [art] PUB.X = EBCC096FB56DD417075B76AEE4557D8658288E2C01D90E4D88DF65CC505D3F25BE351AAAEFDF2ED19CBE554CE23F6B38
24,806,714 UART: [art] PUB.Y = 5D3F07D0778B66BE6833BFA5D787304732A7ACB7D10607BFF3B55D6FCCDA07BA3423FA17D2F9D280D9A6E2F8C2B7FCF5
24,813,958 UART: [art] SIG.R = 79C9AA679BE5405E8DF327A1EFB0DC641E19A3F7E0327D0890020657174369C7600384B05CD223171C5117A07491E195
24,821,335 UART: [art] SIG.S = 88995CF76197E09C5812A407767935F607A3EF202A21880890BD450ED17819A90A4F205720F038BCFC7B49039DA143E2
25,799,985 UART: Caliptra RT
25,800,686 UART: [state] CFI Enabled
25,980,281 UART: [rt] RT listening for mailbox commands...
25,982,135 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,011,868 UART: [rt]cmd =0x46504c54, len=4
26,013,383 >>> mbox cmd response data (8 bytes)
26,014,351 UART: [rt] FIPS self test
26,015,320 UART: [kat] ++
26,015,781 UART: [kat] sha1
26,016,409 UART: Fatal Error: 0x90060001
26,051,620 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,201,571 >>> mbox cmd response: failed
26,202,186 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,352,082 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,099 UART:
190,394 UART: Running Caliptra ROM ...
191,507 UART:
191,665 UART: [state] CFI Enabled
258,448 UART: [state] LifecycleState = Unprovisioned
260,452 UART: [state] DebugLocked = No
263,406 UART: [state] WD Timer not started. Device not locked for debugging
267,181 UART: [kat] SHA2-256
446,843 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,604 UART: [kat] ++
458,083 UART: [kat] sha1
468,265 UART: [kat] SHA2-256
471,006 UART: [kat] SHA2-384
478,284 UART: [kat] SHA2-512-ACC
480,684 UART: [kat] ECC-384
2,938,753 UART: [kat] HMAC-384Kdf
2,962,266 UART: [kat] LMS
3,438,749 UART: [kat] --
3,443,224 UART: [cold-reset] ++
3,445,595 UART: [fht] FHT @ 0x50003400
3,457,062 UART: [idev] ++
3,457,644 UART: [idev] CDI.KEYID = 6
3,458,558 UART: [idev] SUBJECT.KEYID = 7
3,459,854 UART: [idev] UDS.KEYID = 0
3,461,438 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,611,832 UART: [idev] Erasing UDS.KEYID = 0
5,980,270 UART: [idev] Sha1 KeyId Algorithm
6,004,585 UART: [idev] --
6,010,210 UART: [ldev] ++
6,010,799 UART: [ldev] CDI.KEYID = 6
6,011,692 UART: [ldev] SUBJECT.KEYID = 5
6,012,910 UART: [ldev] AUTHORITY.KEYID = 7
6,014,150 UART: [ldev] FE.KEYID = 1
6,049,137 UART: [ldev] Erasing FE.KEYID = 1
8,555,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,290,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,305,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,321,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,337,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,358,344 UART: [ldev] --
10,363,396 UART: [fwproc] Wait for Commands...
10,366,202 UART: [fwproc] Recv command 0x46574c44
10,368,194 UART: [fwproc] Recv'd Img size: 119428 bytes
13,866,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,643 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,018,666 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,350,437 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,463,718 ready_for_fw is high
3,464,348 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,269,640 >>> mbox cmd response: success
18,558,336 UART:
18,558,729 UART: Running Caliptra FMC ...
18,559,884 UART:
18,560,052 UART: [state] CFI Enabled
18,629,004 UART: [fht] FMC Alias Private Key: 7
20,396,634 UART: [art] Extend RT PCRs Done
20,397,862 UART: [art] Lock RT PCRs Done
20,399,218 UART: [art] Populate DV Done
20,404,608 UART: [fht] FMC Alias Private Key: 7
20,406,343 UART: [art] Derive CDI
20,407,172 UART: [art] Store in slot 0x4
20,462,441 UART: [art] Derive Key Pair
20,463,480 UART: [art] Store priv key in slot 0x5
22,926,565 UART: [art] Derive Key Pair - Done
22,939,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,652,736 UART: [art] Erasing AUTHORITY.KEYID = 7
24,654,379 UART: [art] PUB.X = 376AB9FA66C76299EE20782BCE4A1DEF009A2588D04253172A9F35AC9F033093A826B3E5988E2126F3558DF94BD4D0C1
24,661,495 UART: [art] PUB.Y = 00E76A9D653C4CFB319A85A9E9AE99E9CAF0E49D806E97B18D41BF8C96DBEC553729B545F9F2AE9FB14A472E859A2769
24,668,747 UART: [art] SIG.R = 56E48554ACD8BEC3137689B0BBFDC2841B57FBDF5BD4D04F877F1CEB6212D0B432133B9E16E758DF1196191F6639E45A
24,676,151 UART: [art] SIG.S = F18012281E8381EF61D403AB6A8B9AF9C682397408E3FC162CE00168C1B1E1ACB39EB1FA96F1ED43F4B455D56E4357C7
25,654,696 UART: Caliptra RT
25,655,413 UART: [state] CFI Enabled
25,836,260 UART: [rt] RT listening for mailbox commands...
25,838,118 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,867,982 UART: [rt]cmd =0x46504c54, len=4
25,869,620 >>> mbox cmd response data (8 bytes)
25,870,512 UART: [rt] FIPS self test
25,871,461 UART: [kat] ++
25,871,919 UART: [kat] sha1
25,872,543 UART: Fatal Error: 0x90060001
25,907,749 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,057,714 >>> mbox cmd response: failed
26,058,320 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,208,189 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
3,453,589 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,244,281 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,405 UART:
192,784 UART: Running Caliptra ROM ...
193,944 UART:
603,595 UART: [state] CFI Enabled
618,034 UART: [state] LifecycleState = Unprovisioned
619,938 UART: [state] DebugLocked = No
621,757 UART: [state] WD Timer not started. Device not locked for debugging
625,746 UART: [kat] SHA2-256
805,436 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,176 UART: [kat] ++
816,668 UART: [kat] sha1
826,788 UART: [kat] SHA2-256
829,488 UART: [kat] SHA2-384
833,936 UART: [kat] SHA2-512-ACC
836,313 UART: [kat] ECC-384
3,278,127 UART: [kat] HMAC-384Kdf
3,291,084 UART: [kat] LMS
3,767,600 UART: [kat] --
3,772,233 UART: [cold-reset] ++
3,773,173 UART: [fht] FHT @ 0x50003400
3,784,001 UART: [idev] ++
3,784,610 UART: [idev] CDI.KEYID = 6
3,785,530 UART: [idev] SUBJECT.KEYID = 7
3,786,787 UART: [idev] UDS.KEYID = 0
3,787,718 ready_for_fw is high
3,787,956 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,937,871 UART: [idev] Erasing UDS.KEYID = 0
6,261,925 UART: [idev] Sha1 KeyId Algorithm
6,285,545 UART: [idev] --
6,290,138 UART: [ldev] ++
6,290,712 UART: [ldev] CDI.KEYID = 6
6,291,625 UART: [ldev] SUBJECT.KEYID = 5
6,292,845 UART: [ldev] AUTHORITY.KEYID = 7
6,294,079 UART: [ldev] FE.KEYID = 1
6,305,113 UART: [ldev] Erasing FE.KEYID = 1
8,783,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,275 UART: [ldev] --
10,576,729 UART: [fwproc] Wait for Commands...
10,579,855 UART: [fwproc] Recv command 0x46574c44
10,581,872 UART: [fwproc] Recv'd Img size: 119428 bytes
14,077,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,076 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,096 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,564,181 >>> mbox cmd response: success
14,567,512 UART: [afmc] ++
14,568,107 UART: [afmc] CDI.KEYID = 6
14,569,135 UART: [afmc] SUBJECT.KEYID = 7
14,570,302 UART: [afmc] AUTHORITY.KEYID = 5
17,072,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,794,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,796,673 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,812,459 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,828,538 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,844,134 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,867,995 UART: [afmc] --
18,871,966 UART: [cold-reset] --
18,875,830 UART: [state] Locking Datavault
18,881,623 UART: [state] Locking PCR0, PCR1 and PCR31
18,883,324 UART: [state] Locking ICCM
18,885,938 UART: [exit] Launching FMC @ 0x40000130
18,894,335 UART:
18,894,569 UART: Running Caliptra FMC ...
18,895,677 UART:
18,895,838 UART: [state] CFI Enabled
18,903,947 UART: [fht] FMC Alias Private Key: 7
20,669,789 UART: [art] Extend RT PCRs Done
20,671,009 UART: [art] Lock RT PCRs Done
20,672,506 UART: [art] Populate DV Done
20,677,867 UART: [fht] FMC Alias Private Key: 7
20,679,480 UART: [art] Derive CDI
20,680,220 UART: [art] Store in slot 0x4
20,722,871 UART: [art] Derive Key Pair
20,723,869 UART: [art] Store priv key in slot 0x5
23,151,013 UART: [art] Derive Key Pair - Done
23,163,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,870,344 UART: [art] Erasing AUTHORITY.KEYID = 7
24,871,860 UART: [art] PUB.X = AACEF981EBC2E1822A342D6DD30787711B68B9C5E167C1F1119034FC6876CF0CF8C2B510DC6608D78324FBB5A525A5D8
24,879,128 UART: [art] PUB.Y = 934B7B73B503A953404BF7F70CC24C2EA4C814D15823603E10BBAF1BA52633BAD3D1980F2678286BC90AA0149C575ACF
24,886,428 UART: [art] SIG.R = 196B031D067435634A5F157E6E1AF23279B1F927763D141A733B5F4C0F81A836E8A9E1AF92CC885F61A9D01D9261E6E7
24,893,775 UART: [art] SIG.S = 64F12A1B02F7C96FFF16A1ECCC3BD8ECE6B6CBD85A6444B74CC4E253A997DEFB511AB6B303A2441909F126D2CE8E66C0
25,872,695 UART: Caliptra RT
25,873,406 UART: [state] CFI Enabled
26,006,197 UART: [rt] RT listening for mailbox commands...
26,008,051 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,037,522 UART: [rt]cmd =0x46504c54, len=4
26,039,111 >>> mbox cmd response data (8 bytes)
26,040,038 UART: [rt] FIPS self test
26,040,994 UART: [kat] ++
26,041,462 UART: [kat] sha1
26,041,983 UART: Fatal Error: 0x90060001
26,077,137 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,227,094 >>> mbox cmd response: failed
26,227,712 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,377,640 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,022 UART:
190,312 UART: Running Caliptra ROM ...
191,341 UART:
14,149,841 UART: [state] CFI Enabled
14,164,458 UART: [state] LifecycleState = Unprovisioned
14,166,391 UART: [state] DebugLocked = No
14,168,678 UART: [state] WD Timer not started. Device not locked for debugging
14,172,638 UART: [kat] SHA2-256
14,352,273 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,363,048 UART: [kat] ++
14,363,512 UART: [kat] sha1
14,374,562 UART: [kat] SHA2-256
14,377,261 UART: [kat] SHA2-384
14,383,953 UART: [kat] SHA2-512-ACC
14,386,300 UART: [kat] ECC-384
16,826,763 UART: [kat] HMAC-384Kdf
16,838,879 UART: [kat] LMS
17,315,364 UART: [kat] --
17,320,372 UART: [cold-reset] ++
17,322,550 UART: [fht] FHT @ 0x50003400
17,333,638 UART: [idev] ++
17,334,233 UART: [idev] CDI.KEYID = 6
17,335,142 UART: [idev] SUBJECT.KEYID = 7
17,336,410 UART: [idev] UDS.KEYID = 0
17,338,004 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,487,920 UART: [idev] Erasing UDS.KEYID = 0
19,813,718 UART: [idev] Sha1 KeyId Algorithm
19,836,292 UART: [idev] --
19,841,420 UART: [ldev] ++
19,842,042 UART: [ldev] CDI.KEYID = 6
19,842,927 UART: [ldev] SUBJECT.KEYID = 5
19,844,139 UART: [ldev] AUTHORITY.KEYID = 7
19,845,428 UART: [ldev] FE.KEYID = 1
19,857,782 UART: [ldev] Erasing FE.KEYID = 1
22,336,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,055,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,071,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,087,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,103,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,124,892 UART: [ldev] --
24,130,530 UART: [fwproc] Wait for Commands...
24,133,560 UART: [fwproc] Recv command 0x46574c44
24,135,563 UART: [fwproc] Recv'd Img size: 119428 bytes
27,633,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,705,233 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,778,251 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,109,384 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
3,777,820 ready_for_fw is high
3,778,335 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,469,166 >>> mbox cmd response: success
18,722,978 UART:
18,723,367 UART: Running Caliptra FMC ...
18,724,718 UART:
18,724,895 UART: [state] CFI Enabled
18,732,446 UART: [fht] FMC Alias Private Key: 7
20,499,429 UART: [art] Extend RT PCRs Done
20,500,643 UART: [art] Lock RT PCRs Done
20,502,268 UART: [art] Populate DV Done
20,507,650 UART: [fht] FMC Alias Private Key: 7
20,509,305 UART: [art] Derive CDI
20,510,130 UART: [art] Store in slot 0x4
20,552,654 UART: [art] Derive Key Pair
20,553,665 UART: [art] Store priv key in slot 0x5
22,980,621 UART: [art] Derive Key Pair - Done
22,993,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,699,878 UART: [art] Erasing AUTHORITY.KEYID = 7
24,701,361 UART: [art] PUB.X = 1AAEFFC26997F57279B8D5C42FC7F3A6822FABC40757E9EA6A7F8A33FCFC05A287AFA0C1076872EFE0FE2020BC28183F
24,708,676 UART: [art] PUB.Y = 703CBA30E8C91AAEA389E2FD6F1C697B96C2DF1BEBB018B1E69F5653B967756434AF5CB7C50587681530EBB22CA1E167
24,715,977 UART: [art] SIG.R = 689C35B03A91AE0D399784B5D146CCA3D59D90F3E587EC757C1FEE6B5A99CFB65F908DD49CB9D250B7391ADA6B08B821
24,723,377 UART: [art] SIG.S = D755B532A0FCD3DD6F468B4F414C9ED71F11AD0DC3CA2FF83E6B8C6EF756E2A306863183C9838D3A663C093AD248B2AC
25,701,983 UART: Caliptra RT
25,702,697 UART: [state] CFI Enabled
25,836,415 UART: [rt] RT listening for mailbox commands...
25,838,257 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,868,055 UART: [rt]cmd =0x46504c54, len=4
25,869,666 >>> mbox cmd response data (8 bytes)
25,870,717 UART: [rt] FIPS self test
25,871,661 UART: [kat] ++
25,872,135 UART: [kat] sha1
25,872,657 UART: Fatal Error: 0x90060001
25,907,864 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,057,865 >>> mbox cmd response: failed
26,058,489 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,208,381 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
17,498,026 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,177,713 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,270 UART:
192,650 UART: Running Caliptra ROM ...
193,767 UART:
193,913 UART: [state] CFI Enabled
263,176 UART: [state] LifecycleState = Unprovisioned
265,294 UART: [state] DebugLocked = No
267,990 UART: [state] WD Timer not started. Device not locked for debugging
272,121 UART: [kat] SHA2-256
462,002 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,746 UART: [kat] ++
473,243 UART: [kat] sha1
484,832 UART: [kat] SHA2-256
487,849 UART: [kat] SHA2-384
493,849 UART: [kat] SHA2-512-ACC
496,436 UART: [kat] ECC-384
2,949,153 UART: [kat] HMAC-384Kdf
2,970,995 UART: [kat] LMS
3,502,746 UART: [kat] --
3,507,483 UART: [cold-reset] ++
3,509,778 UART: [fht] FHT @ 0x50003400
3,521,546 UART: [idev] ++
3,522,268 UART: [idev] CDI.KEYID = 6
3,523,204 UART: [idev] SUBJECT.KEYID = 7
3,524,462 UART: [idev] UDS.KEYID = 0
3,525,670 ready_for_fw is high
3,525,910 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,103 UART: [idev] Erasing UDS.KEYID = 0
6,032,194 UART: [idev] Sha1 KeyId Algorithm
6,055,220 UART: [idev] --
6,059,009 UART: [ldev] ++
6,059,706 UART: [ldev] CDI.KEYID = 6
6,060,622 UART: [ldev] SUBJECT.KEYID = 5
6,061,844 UART: [ldev] AUTHORITY.KEYID = 7
6,063,029 UART: [ldev] FE.KEYID = 1
6,099,775 UART: [ldev] Erasing FE.KEYID = 1
8,607,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,863 UART: [ldev] --
10,415,208 UART: [fwproc] Wait for Commands...
10,416,656 UART: [fwproc] Recv command 0x46574c44
10,418,915 UART: [fwproc] Recv'd Img size: 119428 bytes
13,929,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,007,747 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,131,399 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,696,799 >>> mbox cmd response: success
14,700,328 UART: [afmc] ++
14,701,042 UART: [afmc] CDI.KEYID = 6
14,702,238 UART: [afmc] SUBJECT.KEYID = 7
14,703,677 UART: [afmc] AUTHORITY.KEYID = 5
17,239,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,979,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,981,391 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,996,478 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,011,623 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,026,539 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,049,771 UART: [afmc] --
19,052,832 UART: [cold-reset] --
19,058,002 UART: [state] Locking Datavault
19,065,698 UART: [state] Locking PCR0, PCR1 and PCR31
19,067,934 UART: [state] Locking ICCM
19,069,831 UART: [exit] Launching FMC @ 0x40000130
19,078,451 UART:
19,078,690 UART: Running Caliptra FMC ...
19,079,796 UART:
19,079,962 UART: [state] CFI Enabled
19,137,406 UART: [fht] FMC Alias Private Key: 7
20,904,040 UART: [art] Extend RT PCRs Done
20,905,283 UART: [art] Lock RT PCRs Done
20,906,965 UART: [art] Populate DV Done
20,912,273 UART: [fht] FMC Alias Private Key: 7
20,913,868 UART: [art] Derive CDI
20,914,686 UART: [art] Store in slot 0x4
20,970,048 UART: [art] Derive Key Pair
20,971,058 UART: [art] Store priv key in slot 0x5
23,433,980 UART: [art] Derive Key Pair - Done
23,446,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,811 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,314 UART: [art] PUB.X = B82F4F678B2F34537B9F4B843E2374C62D8F353C1EF92735A09F03E159310A36E171B65AA8423A942317D94512EE2F0E
25,168,529 UART: [art] PUB.Y = 5560E80E4F3B1AAB8DF93F444EB16DDE68A7E3DFC3FD83964B1432B572E51652DC80A170F1CC0E2B8BBDCB5D524C22D2
25,175,830 UART: [art] SIG.R = 29D5C6B73041D7D477F6C269211E993B63FD2B285F23A1D04026668AAEC6FF7D3BD231EEAA851D90F5F48F7510DC0658
25,183,229 UART: [art] SIG.S = 265C6568BEA2F32AB6DAA4BD0381878AED9F3B26D37566A0B26D246F3EB65ED19BE351EE8C331931E8288A94A494DF6B
26,162,445 UART: Caliptra RT
26,163,136 UART: [state] CFI Enabled
26,344,691 UART: [rt] RT listening for mailbox commands...
26,346,563 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,376,355 UART: [rt]cmd =0x46504c54, len=4
26,377,780 >>> mbox cmd response data (8 bytes)
26,379,014 UART: [rt] FIPS self test
26,379,968 UART: [kat] ++
26,380,424 UART: [kat] sha1
26,380,966 UART: Fatal Error: 0x90060001
26,416,177 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,566,202 >>> mbox cmd response: failed
26,566,780 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,716,725 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
190,072 UART:
190,363 UART: Running Caliptra ROM ...
191,441 UART:
191,588 UART: [state] CFI Enabled
257,310 UART: [state] LifecycleState = Unprovisioned
259,638 UART: [state] DebugLocked = No
261,502 UART: [state] WD Timer not started. Device not locked for debugging
266,431 UART: [kat] SHA2-256
456,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,035 UART: [kat] ++
467,486 UART: [kat] sha1
479,398 UART: [kat] SHA2-256
482,467 UART: [kat] SHA2-384
489,315 UART: [kat] SHA2-512-ACC
491,876 UART: [kat] ECC-384
2,937,477 UART: [kat] HMAC-384Kdf
2,962,625 UART: [kat] LMS
3,494,416 UART: [kat] --
3,499,735 UART: [cold-reset] ++
3,501,952 UART: [fht] FHT @ 0x50003400
3,512,665 UART: [idev] ++
3,513,346 UART: [idev] CDI.KEYID = 6
3,514,365 UART: [idev] SUBJECT.KEYID = 7
3,515,470 UART: [idev] UDS.KEYID = 0
3,516,981 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,667,078 UART: [idev] Erasing UDS.KEYID = 0
6,019,834 UART: [idev] Sha1 KeyId Algorithm
6,042,044 UART: [idev] --
6,046,404 UART: [ldev] ++
6,047,101 UART: [ldev] CDI.KEYID = 6
6,048,019 UART: [ldev] SUBJECT.KEYID = 5
6,049,187 UART: [ldev] AUTHORITY.KEYID = 7
6,050,373 UART: [ldev] FE.KEYID = 1
6,089,597 UART: [ldev] Erasing FE.KEYID = 1
8,594,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,119 UART: [ldev] --
10,403,925 UART: [fwproc] Wait for Commands...
10,406,624 UART: [fwproc] Recv command 0x46574c44
10,408,945 UART: [fwproc] Recv'd Img size: 119428 bytes
13,912,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,984,968 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,108,603 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,674,372 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,427,869 ready_for_fw is high
3,428,357 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,825,505 >>> mbox cmd response: success
19,122,149 UART:
19,122,533 UART: Running Caliptra FMC ...
19,123,744 UART:
19,123,945 UART: [state] CFI Enabled
19,188,489 UART: [fht] FMC Alias Private Key: 7
20,955,826 UART: [art] Extend RT PCRs Done
20,957,066 UART: [art] Lock RT PCRs Done
20,958,373 UART: [art] Populate DV Done
20,963,543 UART: [fht] FMC Alias Private Key: 7
20,965,145 UART: [art] Derive CDI
20,965,972 UART: [art] Store in slot 0x4
21,021,833 UART: [art] Derive Key Pair
21,022,889 UART: [art] Store priv key in slot 0x5
23,485,429 UART: [art] Derive Key Pair - Done
23,498,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,205 UART: [art] Erasing AUTHORITY.KEYID = 7
25,213,715 UART: [art] PUB.X = 6327DB975B4DF3A2871B7928DE1BBC362C516413B1C1E0DF6778054D243EC404AB4F92ACA1FBF51278D9441E12F8B7CE
25,221,006 UART: [art] PUB.Y = 65DD395437AC2301F118F9BA378AF54D5D74257CB9773439FF564989CEAED6F078E561DC1CA2DCCAC101B4B5FE1409C6
25,228,269 UART: [art] SIG.R = DECC4DB3B56681AD5B28E9BBF7BD1BB2E55F572037E522781DA64D4040D17C577CFAE86333CF2EFEB93162138D9933AB
25,235,696 UART: [art] SIG.S = EAA53BDB11D766095036CE2735EDAE29A4700CB6308A9C8C1769E5201BB417173973D7CD902D3242A58B0EE9705B7F15
26,215,209 UART: Caliptra RT
26,215,908 UART: [state] CFI Enabled
26,395,247 UART: [rt] RT listening for mailbox commands...
26,397,105 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,426,951 UART: [rt]cmd =0x46504c54, len=4
26,428,350 >>> mbox cmd response data (8 bytes)
26,429,411 UART: [rt] FIPS self test
26,430,365 UART: [kat] ++
26,430,829 UART: [kat] sha1
26,431,454 UART: Fatal Error: 0x90060001
26,466,613 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,616,565 >>> mbox cmd response: failed
26,617,131 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,767,078 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,436,074 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,837,401 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,506 UART:
192,871 UART: Running Caliptra ROM ...
193,972 UART:
603,801 UART: [state] CFI Enabled
617,475 UART: [state] LifecycleState = Unprovisioned
619,836 UART: [state] DebugLocked = No
622,097 UART: [state] WD Timer not started. Device not locked for debugging
625,818 UART: [kat] SHA2-256
815,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,306 UART: [kat] ++
826,915 UART: [kat] sha1
839,087 UART: [kat] SHA2-256
842,106 UART: [kat] SHA2-384
848,667 UART: [kat] SHA2-512-ACC
851,252 UART: [kat] ECC-384
3,294,948 UART: [kat] HMAC-384Kdf
3,307,523 UART: [kat] LMS
3,839,358 UART: [kat] --
3,843,431 UART: [cold-reset] ++
3,845,151 UART: [fht] FHT @ 0x50003400
3,855,711 UART: [idev] ++
3,856,433 UART: [idev] CDI.KEYID = 6
3,857,344 UART: [idev] SUBJECT.KEYID = 7
3,858,615 UART: [idev] UDS.KEYID = 0
3,859,548 ready_for_fw is high
3,859,769 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,009,980 UART: [idev] Erasing UDS.KEYID = 0
6,342,241 UART: [idev] Sha1 KeyId Algorithm
6,364,311 UART: [idev] --
6,369,710 UART: [ldev] ++
6,370,404 UART: [ldev] CDI.KEYID = 6
6,371,323 UART: [ldev] SUBJECT.KEYID = 5
6,372,487 UART: [ldev] AUTHORITY.KEYID = 7
6,373,723 UART: [ldev] FE.KEYID = 1
6,385,257 UART: [ldev] Erasing FE.KEYID = 1
8,864,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,588,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,603,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,619,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,634,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,656,091 UART: [ldev] --
10,662,344 UART: [fwproc] Wait for Commands...
10,664,613 UART: [fwproc] Recv command 0x46574c44
10,666,936 UART: [fwproc] Recv'd Img size: 119428 bytes
14,174,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,250,055 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,373,685 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,939,225 >>> mbox cmd response: success
14,942,598 UART: [afmc] ++
14,943,308 UART: [afmc] CDI.KEYID = 6
14,944,552 UART: [afmc] SUBJECT.KEYID = 7
14,945,991 UART: [afmc] AUTHORITY.KEYID = 5
17,449,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,172,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,174,259 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,189,424 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,204,545 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,219,427 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,243,963 UART: [afmc] --
19,248,100 UART: [cold-reset] --
19,251,699 UART: [state] Locking Datavault
19,257,874 UART: [state] Locking PCR0, PCR1 and PCR31
19,260,055 UART: [state] Locking ICCM
19,261,418 UART: [exit] Launching FMC @ 0x40000130
19,270,043 UART:
19,270,295 UART: Running Caliptra FMC ...
19,271,402 UART:
19,271,569 UART: [state] CFI Enabled
19,279,519 UART: [fht] FMC Alias Private Key: 7
21,045,621 UART: [art] Extend RT PCRs Done
21,046,856 UART: [art] Lock RT PCRs Done
21,048,375 UART: [art] Populate DV Done
21,053,795 UART: [fht] FMC Alias Private Key: 7
21,055,290 UART: [art] Derive CDI
21,056,062 UART: [art] Store in slot 0x4
21,099,272 UART: [art] Derive Key Pair
21,100,320 UART: [art] Store priv key in slot 0x5
23,526,893 UART: [art] Derive Key Pair - Done
23,539,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,246,293 UART: [art] Erasing AUTHORITY.KEYID = 7
25,247,804 UART: [art] PUB.X = 1EB75FCF54E7D814A3B3AFE7A904BBDEFDB1F22BF835C3C1DAF70439D538FAEC84B82F7CCA93BF0BDA4F66C7343A4CD4
25,255,091 UART: [art] PUB.Y = BA72A6516C8F8985C2FA23FD1DA2F0DA1592CD5C5A11401E342773E706FA036FBAAA7DE46BA2C8F6485D5FB9D45D66ED
25,262,364 UART: [art] SIG.R = 17321DD859017F05A0A0D64979224F400ED74601966B215D1115C029864668735D7EC088E4005B533258B6BFB6AE2B34
25,269,715 UART: [art] SIG.S = 07C52DA7E5CDD2EE473E4DC45A37F82D237EC8797D0379F4B5D74AC11F60DDFB6E9B790C8C50364412C6C182DA758C6F
26,248,470 UART: Caliptra RT
26,249,164 UART: [state] CFI Enabled
26,382,375 UART: [rt] RT listening for mailbox commands...
26,384,281 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,414,097 UART: [rt]cmd =0x46504c54, len=4
26,415,793 >>> mbox cmd response data (8 bytes)
26,416,873 UART: [rt] FIPS self test
26,417,828 UART: [kat] ++
26,418,284 UART: [kat] sha1
26,418,915 UART: Fatal Error: 0x90060001
26,454,124 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,604,088 >>> mbox cmd response: failed
26,604,709 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,754,584 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,095 UART:
190,389 UART: Running Caliptra ROM ...
191,501 UART:
13,765,049 UART: [state] CFI Enabled
13,779,990 UART: [state] LifecycleState = Unprovisioned
13,782,356 UART: [state] DebugLocked = No
13,784,641 UART: [state] WD Timer not started. Device not locked for debugging
13,788,587 UART: [kat] SHA2-256
13,978,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,989,229 UART: [kat] ++
13,989,750 UART: [kat] sha1
14,000,803 UART: [kat] SHA2-256
14,003,780 UART: [kat] SHA2-384
14,009,838 UART: [kat] SHA2-512-ACC
14,012,426 UART: [kat] ECC-384
16,453,318 UART: [kat] HMAC-384Kdf
16,466,623 UART: [kat] LMS
16,998,443 UART: [kat] --
17,002,109 UART: [cold-reset] ++
17,004,553 UART: [fht] FHT @ 0x50003400
17,016,954 UART: [idev] ++
17,017,635 UART: [idev] CDI.KEYID = 6
17,018,661 UART: [idev] SUBJECT.KEYID = 7
17,019,828 UART: [idev] UDS.KEYID = 0
17,021,363 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,171,701 UART: [idev] Erasing UDS.KEYID = 0
19,501,450 UART: [idev] Sha1 KeyId Algorithm
19,522,529 UART: [idev] --
19,527,179 UART: [ldev] ++
19,527,866 UART: [ldev] CDI.KEYID = 6
19,528,776 UART: [ldev] SUBJECT.KEYID = 5
19,529,987 UART: [ldev] AUTHORITY.KEYID = 7
19,531,221 UART: [ldev] FE.KEYID = 1
19,542,354 UART: [ldev] Erasing FE.KEYID = 1
22,021,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,741,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,756,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,771,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,786,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,807,207 UART: [ldev] --
23,812,216 UART: [fwproc] Wait for Commands...
23,813,995 UART: [fwproc] Recv command 0x46574c44
23,816,270 UART: [fwproc] Recv'd Img size: 119428 bytes
27,318,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,397,563 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,521,200 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,087,426 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,471 writing to cptra_bootfsm_go
3,757,900 ready_for_fw is high
3,758,585 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,068,919 >>> mbox cmd response: success
19,320,642 UART:
19,321,037 UART: Running Caliptra FMC ...
19,322,387 UART:
19,322,562 UART: [state] CFI Enabled
19,330,045 UART: [fht] FMC Alias Private Key: 7
21,096,107 UART: [art] Extend RT PCRs Done
21,097,341 UART: [art] Lock RT PCRs Done
21,098,764 UART: [art] Populate DV Done
21,104,107 UART: [fht] FMC Alias Private Key: 7
21,105,827 UART: [art] Derive CDI
21,106,650 UART: [art] Store in slot 0x4
21,149,636 UART: [art] Derive Key Pair
21,150,647 UART: [art] Store priv key in slot 0x5
23,577,461 UART: [art] Derive Key Pair - Done
23,590,494 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,297,096 UART: [art] Erasing AUTHORITY.KEYID = 7
25,298,618 UART: [art] PUB.X = 2EA8345AF7ED855CE56FF2E7723758021A86DDE2676F38D20C8A728854FF97D635ABAE6FED8FF62079C4A7BEEFDC1DAB
25,305,850 UART: [art] PUB.Y = 8211DCF5B4AB7F8F918F1ADDE375F738601CEB3D14BBA53CCD8B49B94D7205BD2A85830618E4C6069A396BC00E44C6E0
25,313,146 UART: [art] SIG.R = CA7728A1FA3936014D983F4EEF52F4EFC29B7E50BD94FC774DBBED7532AA28A355724916445B8561993127A58946F3C8
25,320,532 UART: [art] SIG.S = 65179716E737AC2111908F993FCCD42A4BC3047F0465BE354C87671A5A299520A2F38864EE41E960469C9B682A772CE0
26,299,290 UART: Caliptra RT
26,300,007 UART: [state] CFI Enabled
26,432,230 UART: [rt] RT listening for mailbox commands...
26,434,088 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,463,876 UART: [rt]cmd =0x46504c54, len=4
26,465,599 >>> mbox cmd response data (8 bytes)
26,466,823 UART: [rt] FIPS self test
26,467,777 UART: [kat] ++
26,468,235 UART: [kat] sha1
26,468,915 UART: Fatal Error: 0x90060001
26,504,123 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,654,133 >>> mbox cmd response: failed
26,654,774 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,804,634 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
16,883,016 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,193,308 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,073 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,559 UART: [kat] SHA2-256
881,490 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,605 UART: [kat] ++
885,757 UART: [kat] sha1
890,065 UART: [kat] SHA2-256
892,003 UART: [kat] SHA2-384
894,822 UART: [kat] SHA2-512-ACC
896,723 UART: [kat] ECC-384
902,458 UART: [kat] HMAC-384Kdf
907,090 UART: [kat] LMS
1,475,286 UART: [kat] --
1,476,553 UART: [cold-reset] ++
1,476,959 UART: [fht] Storing FHT @ 0x50003400
1,479,790 UART: [idev] ++
1,479,958 UART: [idev] CDI.KEYID = 6
1,480,318 UART: [idev] SUBJECT.KEYID = 7
1,480,742 UART: [idev] UDS.KEYID = 0
1,481,087 ready_for_fw is high
1,481,087 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,082 UART: [idev] Erasing UDS.KEYID = 0
1,505,458 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,086 UART: [idev] --
1,515,131 UART: [ldev] ++
1,515,299 UART: [ldev] CDI.KEYID = 6
1,515,662 UART: [ldev] SUBJECT.KEYID = 5
1,516,088 UART: [ldev] AUTHORITY.KEYID = 7
1,516,551 UART: [ldev] FE.KEYID = 1
1,521,609 UART: [ldev] Erasing FE.KEYID = 1
1,546,938 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,780 UART: [ldev] --
1,586,249 UART: [fwproc] Waiting for Commands...
1,587,008 UART: [fwproc] Received command 0x46574c44
1,587,799 UART: [fwproc] Received Image of size 119428 bytes
2,943,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,665 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,883 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,434 >>> mbox cmd response: success
3,143,658 UART: [afmc] ++
3,143,826 UART: [afmc] CDI.KEYID = 6
3,144,188 UART: [afmc] SUBJECT.KEYID = 7
3,144,613 UART: [afmc] AUTHORITY.KEYID = 5
3,179,858 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,258 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,038 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,747 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,630 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,313 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,247 UART: [afmc] --
3,223,273 UART: [cold-reset] --
3,224,125 UART: [state] Locking Datavault
3,225,370 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,974 UART: [state] Locking ICCM
3,226,582 UART: [exit] Launching FMC @ 0x40000130
3,231,912 UART:
3,231,928 UART: Running Caliptra FMC ...
3,232,336 UART:
3,232,390 UART: [state] CFI Enabled
3,242,852 UART: [fht] FMC Alias Private Key: 7
3,361,504 UART: [art] Extend RT PCRs Done
3,361,932 UART: [art] Lock RT PCRs Done
3,363,542 UART: [art] Populate DV Done
3,371,737 UART: [fht] FMC Alias Private Key: 7
3,372,715 UART: [art] Derive CDI
3,372,995 UART: [art] Store in slot 0x4
3,458,367 UART: [art] Derive Key Pair
3,458,727 UART: [art] Store priv key in slot 0x5
3,471,494 UART: [art] Derive Key Pair - Done
3,486,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,137 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,902 UART: [art] PUB.X = D3C72AC5DE7211D617E26CD47DB3312180B02C0B8C3D11638BCB232514A493D9D81689C8E12559636273DB376F10CA63
3,509,667 UART: [art] PUB.Y = 983D89505983BBA053C4709329041D2473EEB0EE8260AEC45C07ECE5C2B91C6BA0518195D2E1C7CD7B1453DF91C4AE02
3,516,614 UART: [art] SIG.R = F7F4A43FBB1A0FBEEC62F3DB07F751974FE5C34F35BFA18A5CD611B271F03B0E7DC2B15FD8466A640B39D0446536C702
3,523,385 UART: [art] SIG.S = 39EDC99535361E6FD476FE24F9A90F4EBC4F75710E0B1C8916E5B309D6EFB25E16902B026E9A58FD569C665475DF601F
3,546,940 UART: Caliptra RT
3,547,191 UART: [state] CFI Enabled
3,668,139 UART: [rt] RT listening for mailbox commands...
3,668,802 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,837 UART: [rt]cmd =0x46504c54, len=4
3,700,001 >>> mbox cmd response data (8 bytes)
3,700,116 UART: [rt] FIPS self test
3,700,444 UART: [kat] ++
3,700,596 UART: [kat] sha1
3,701,354 UART: Fatal Error: 0x90060001
3,702,893 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,702,898 >>> mbox cmd response: failed
3,702,898 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,702,903 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,785 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,377 UART: [kat] SHA2-256
882,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,423 UART: [kat] ++
886,575 UART: [kat] sha1
890,795 UART: [kat] SHA2-256
892,733 UART: [kat] SHA2-384
895,444 UART: [kat] SHA2-512-ACC
897,345 UART: [kat] ECC-384
903,198 UART: [kat] HMAC-384Kdf
907,870 UART: [kat] LMS
1,476,066 UART: [kat] --
1,476,807 UART: [cold-reset] ++
1,477,159 UART: [fht] Storing FHT @ 0x50003400
1,480,020 UART: [idev] ++
1,480,188 UART: [idev] CDI.KEYID = 6
1,480,548 UART: [idev] SUBJECT.KEYID = 7
1,480,972 UART: [idev] UDS.KEYID = 0
1,481,317 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,908 UART: [idev] Erasing UDS.KEYID = 0
1,505,554 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,142 UART: [idev] --
1,515,367 UART: [ldev] ++
1,515,535 UART: [ldev] CDI.KEYID = 6
1,515,898 UART: [ldev] SUBJECT.KEYID = 5
1,516,324 UART: [ldev] AUTHORITY.KEYID = 7
1,516,787 UART: [ldev] FE.KEYID = 1
1,522,115 UART: [ldev] Erasing FE.KEYID = 1
1,547,460 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,184 UART: [ldev] --
1,586,565 UART: [fwproc] Waiting for Commands...
1,587,306 UART: [fwproc] Received command 0x46574c44
1,588,097 UART: [fwproc] Received Image of size 119428 bytes
2,942,853 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,717 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,935 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,488 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,787 ready_for_fw is high
1,362,787 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,246 >>> mbox cmd response: success
3,054,127 UART:
3,054,143 UART: Running Caliptra FMC ...
3,054,551 UART:
3,054,605 UART: [state] CFI Enabled
3,065,159 UART: [fht] FMC Alias Private Key: 7
3,184,133 UART: [art] Extend RT PCRs Done
3,184,561 UART: [art] Lock RT PCRs Done
3,185,917 UART: [art] Populate DV Done
3,194,116 UART: [fht] FMC Alias Private Key: 7
3,195,214 UART: [art] Derive CDI
3,195,494 UART: [art] Store in slot 0x4
3,281,438 UART: [art] Derive Key Pair
3,281,798 UART: [art] Store priv key in slot 0x5
3,295,199 UART: [art] Derive Key Pair - Done
3,310,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,303 UART: [art] PUB.X = 975EF3D693A116AD6FFA2058130684E46A4E01110EF59FBB6B155B4ED9A7794A4B1AF011B08FCCFB76D60DD46603616C
3,333,068 UART: [art] PUB.Y = 7A9CD64FF459B1F663D49950BC78229582B65C4EB4559A0BB8284F57BA02E5F9512E18C3B02C36E43D683515E7801522
3,340,008 UART: [art] SIG.R = C937C0FA96EDA3B9CB52EDE503ABDB10B58ED1CE1E6B4FFB83EF3D57DA88CF50DD1B4FAC3012000D490F4D8A4F44466E
3,346,777 UART: [art] SIG.S = D7BC064841CBDAE112C09D98871336F9AD57A64CFCC0ABD1B9DF8105DB419897EDEADF5F5A427454AB2A12ED28FF7C65
3,370,977 UART: Caliptra RT
3,371,228 UART: [state] CFI Enabled
3,491,397 UART: [rt] RT listening for mailbox commands...
3,492,060 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,747 UART: [rt]cmd =0x46504c54, len=4
3,522,945 >>> mbox cmd response data (8 bytes)
3,523,116 UART: [rt] FIPS self test
3,523,444 UART: [kat] ++
3,523,596 UART: [kat] sha1
3,524,476 UART: Fatal Error: 0x90060001
3,526,015 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,526,020 >>> mbox cmd response: failed
3,526,020 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,526,025 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,203 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,632 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,986 UART: [kat] SHA2-256
881,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,032 UART: [kat] ++
886,184 UART: [kat] sha1
890,538 UART: [kat] SHA2-256
892,476 UART: [kat] SHA2-384
895,317 UART: [kat] SHA2-512-ACC
897,218 UART: [kat] ECC-384
902,789 UART: [kat] HMAC-384Kdf
907,411 UART: [kat] LMS
1,475,607 UART: [kat] --
1,476,460 UART: [cold-reset] ++
1,477,014 UART: [fht] Storing FHT @ 0x50003400
1,479,991 UART: [idev] ++
1,480,159 UART: [idev] CDI.KEYID = 6
1,480,519 UART: [idev] SUBJECT.KEYID = 7
1,480,943 UART: [idev] UDS.KEYID = 0
1,481,288 ready_for_fw is high
1,481,288 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,261 UART: [idev] Erasing UDS.KEYID = 0
1,505,381 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,983 UART: [idev] --
1,514,998 UART: [ldev] ++
1,515,166 UART: [ldev] CDI.KEYID = 6
1,515,529 UART: [ldev] SUBJECT.KEYID = 5
1,515,955 UART: [ldev] AUTHORITY.KEYID = 7
1,516,418 UART: [ldev] FE.KEYID = 1
1,521,420 UART: [ldev] Erasing FE.KEYID = 1
1,547,347 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,467 UART: [ldev] --
1,586,760 UART: [fwproc] Waiting for Commands...
1,587,519 UART: [fwproc] Received command 0x46574c44
1,588,310 UART: [fwproc] Received Image of size 119428 bytes
2,943,418 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,368 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,351 >>> mbox cmd response: success
3,145,533 UART: [afmc] ++
3,145,701 UART: [afmc] CDI.KEYID = 6
3,146,063 UART: [afmc] SUBJECT.KEYID = 7
3,146,488 UART: [afmc] AUTHORITY.KEYID = 5
3,181,381 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,851 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,631 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,340 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,223 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,906 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,768 UART: [afmc] --
3,224,868 UART: [cold-reset] --
3,225,568 UART: [state] Locking Datavault
3,226,997 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,601 UART: [state] Locking ICCM
3,228,225 UART: [exit] Launching FMC @ 0x40000130
3,233,555 UART:
3,233,571 UART: Running Caliptra FMC ...
3,233,979 UART:
3,234,122 UART: [state] CFI Enabled
3,244,736 UART: [fht] FMC Alias Private Key: 7
3,363,852 UART: [art] Extend RT PCRs Done
3,364,280 UART: [art] Lock RT PCRs Done
3,365,982 UART: [art] Populate DV Done
3,374,023 UART: [fht] FMC Alias Private Key: 7
3,374,983 UART: [art] Derive CDI
3,375,263 UART: [art] Store in slot 0x4
3,460,959 UART: [art] Derive Key Pair
3,461,319 UART: [art] Store priv key in slot 0x5
3,474,590 UART: [art] Derive Key Pair - Done
3,489,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,505,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,783 UART: [art] PUB.X = 1CE591372DB759972CA5CC8892B0DBBB6A5C62087816EE733B83886A2DD1C6A7DE8A5C3E58BCC0AA8C38C65C485B01FB
3,512,563 UART: [art] PUB.Y = 052391578D3261E989463F169CE00CA9A137C34C681CC9B362E906BC69E0D2E38B13D722B92312C390E10D787BDF61B1
3,519,497 UART: [art] SIG.R = 66130858BB1CDDBE43673EA083F28B43B6C857BAC8ABEEBC1D2E0A9E6A88ECDC59880852718E6C8C01A3537D2F23CFBE
3,526,275 UART: [art] SIG.S = 312344137ECFC8CA47C21A0CD12286C4ED1B81821C016F4AEF0284AB63DF0CFFBBDDF27CEAD5CCDAB7A5A45A6A6AEF96
3,550,491 UART: Caliptra RT
3,550,834 UART: [state] CFI Enabled
3,671,321 UART: [rt] RT listening for mailbox commands...
3,671,984 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,569 UART: [rt]cmd =0x46504c54, len=4
3,702,687 >>> mbox cmd response data (8 bytes)
3,703,008 UART: [rt] FIPS self test
3,703,336 UART: [kat] ++
3,703,488 UART: [kat] sha1
3,704,310 UART: Fatal Error: 0x90060001
3,705,849 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,705,854 >>> mbox cmd response: failed
3,705,854 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,705,859 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,864 UART: [kat] SHA2-256
881,795 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,910 UART: [kat] ++
886,062 UART: [kat] sha1
890,252 UART: [kat] SHA2-256
892,190 UART: [kat] SHA2-384
894,877 UART: [kat] SHA2-512-ACC
896,778 UART: [kat] ECC-384
902,509 UART: [kat] HMAC-384Kdf
907,157 UART: [kat] LMS
1,475,353 UART: [kat] --
1,475,984 UART: [cold-reset] ++
1,476,558 UART: [fht] Storing FHT @ 0x50003400
1,479,269 UART: [idev] ++
1,479,437 UART: [idev] CDI.KEYID = 6
1,479,797 UART: [idev] SUBJECT.KEYID = 7
1,480,221 UART: [idev] UDS.KEYID = 0
1,480,566 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,917 UART: [idev] Erasing UDS.KEYID = 0
1,504,773 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,347 UART: [idev] --
1,514,412 UART: [ldev] ++
1,514,580 UART: [ldev] CDI.KEYID = 6
1,514,943 UART: [ldev] SUBJECT.KEYID = 5
1,515,369 UART: [ldev] AUTHORITY.KEYID = 7
1,515,832 UART: [ldev] FE.KEYID = 1
1,521,062 UART: [ldev] Erasing FE.KEYID = 1
1,546,961 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,805 UART: [ldev] --
1,586,242 UART: [fwproc] Waiting for Commands...
1,587,021 UART: [fwproc] Received command 0x46574c44
1,587,812 UART: [fwproc] Received Image of size 119428 bytes
2,942,254 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,810 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,028 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,601 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,168 ready_for_fw is high
1,362,168 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,545 >>> mbox cmd response: success
3,055,164 UART:
3,055,180 UART: Running Caliptra FMC ...
3,055,588 UART:
3,055,731 UART: [state] CFI Enabled
3,066,439 UART: [fht] FMC Alias Private Key: 7
3,186,505 UART: [art] Extend RT PCRs Done
3,186,933 UART: [art] Lock RT PCRs Done
3,188,601 UART: [art] Populate DV Done
3,196,666 UART: [fht] FMC Alias Private Key: 7
3,197,802 UART: [art] Derive CDI
3,198,082 UART: [art] Store in slot 0x4
3,284,122 UART: [art] Derive Key Pair
3,284,482 UART: [art] Store priv key in slot 0x5
3,297,557 UART: [art] Derive Key Pair - Done
3,312,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,328,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,328,822 UART: [art] PUB.X = 79087A44FAD132998BD65A2BC6A40010D3C93156A1F36A5AF506DF48177636B0662CCC5A1A23FA8C03076F68FBB79440
3,335,560 UART: [art] PUB.Y = 1BBD243CA06AF71507C707D4E16B38F6FFB3FD2B18B65204B254D3774C097F36222889DCA5AF0D269181B6201737DC00
3,342,475 UART: [art] SIG.R = 8140E96A9AB2E4FFD3765091A6F61136676CE3F1C01106958BA2FAF18CB75E7C667A426E2BFCB902786AD886CA1F85A1
3,349,247 UART: [art] SIG.S = E9DCD4F350E55CF861876788E6C4F9E01DA5BF17A5D6ED01BFADE99F19C1F0820A8D800115D938C300CF691AE292046C
3,373,305 UART: Caliptra RT
3,373,648 UART: [state] CFI Enabled
3,493,339 UART: [rt] RT listening for mailbox commands...
3,494,002 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,723 UART: [rt]cmd =0x46504c54, len=4
3,524,961 >>> mbox cmd response data (8 bytes)
3,525,080 UART: [rt] FIPS self test
3,525,408 UART: [kat] ++
3,525,560 UART: [kat] sha1
3,526,156 UART: Fatal Error: 0x90060001
3,527,695 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,527,700 >>> mbox cmd response: failed
3,527,700 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,527,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,392 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,065 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
891,542 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,646 UART: [kat] ++
895,798 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
915,907 UART: [kat] HMAC-384Kdf
920,363 UART: [kat] LMS
1,168,675 UART: [kat] --
1,169,576 UART: [cold-reset] ++
1,170,116 UART: [fht] FHT @ 0x50003400
1,172,816 UART: [idev] ++
1,172,984 UART: [idev] CDI.KEYID = 6
1,173,345 UART: [idev] SUBJECT.KEYID = 7
1,173,770 UART: [idev] UDS.KEYID = 0
1,174,116 ready_for_fw is high
1,174,116 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,873 UART: [idev] Erasing UDS.KEYID = 0
1,199,143 UART: [idev] Sha1 KeyId Algorithm
1,208,013 UART: [idev] --
1,209,146 UART: [ldev] ++
1,209,314 UART: [ldev] CDI.KEYID = 6
1,209,678 UART: [ldev] SUBJECT.KEYID = 5
1,210,105 UART: [ldev] AUTHORITY.KEYID = 7
1,210,568 UART: [ldev] FE.KEYID = 1
1,215,862 UART: [ldev] Erasing FE.KEYID = 1
1,242,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,854 UART: [ldev] --
1,282,113 UART: [fwproc] Wait for Commands...
1,282,698 UART: [fwproc] Recv command 0x46574c44
1,283,431 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,800 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,135 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,310 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,021 >>> mbox cmd response: success
2,839,087 UART: [afmc] ++
2,839,255 UART: [afmc] CDI.KEYID = 6
2,839,618 UART: [afmc] SUBJECT.KEYID = 7
2,840,044 UART: [afmc] AUTHORITY.KEYID = 5
2,875,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,324 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,073 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,783 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,664 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,365 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,354 UART: [afmc] --
2,918,173 UART: [cold-reset] --
2,919,137 UART: [state] Locking Datavault
2,920,408 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,012 UART: [state] Locking ICCM
2,921,674 UART: [exit] Launching FMC @ 0x40000130
2,927,004 UART:
2,927,020 UART: Running Caliptra FMC ...
2,927,428 UART:
2,927,482 UART: [state] CFI Enabled
2,938,278 UART: [fht] FMC Alias Private Key: 7
3,057,576 UART: [art] Extend RT PCRs Done
3,058,004 UART: [art] Lock RT PCRs Done
3,059,304 UART: [art] Populate DV Done
3,067,577 UART: [fht] FMC Alias Private Key: 7
3,068,551 UART: [art] Derive CDI
3,068,831 UART: [art] Store in slot 0x4
3,154,584 UART: [art] Derive Key Pair
3,154,944 UART: [art] Store priv key in slot 0x5
3,168,328 UART: [art] Derive Key Pair - Done
3,183,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,608 UART: [art] PUB.X = D8D634362A4F624939ACE489DEE6B3883B43FD64EEAD508A4AA6A56A9FB54C1A3E3FC6E692ECB9D7152619A08D5BEDBA
3,206,400 UART: [art] PUB.Y = 577FAEE89CAA250C44063BABCB1C67BEF1298D11D2D1ABBB1B7035587AB1C35FACE2A5AFAE68F522D7AEBD86CD5409A8
3,213,371 UART: [art] SIG.R = 2ADBE682B98E30050091FD87E4223E0FA12849912B117CEF83BA78CCED5968D6214EE9FF50EE8315D62F555180AA859C
3,220,119 UART: [art] SIG.S = 4229D4A61F1043A7C3E0FFE8F3F9CBE8A4AB8A6D3B1AD04A6AED1790E70AFB2F4D70DEBDAD64A7AB908F110E5EB9349A
3,243,897 UART: Caliptra RT
3,244,148 UART: [state] CFI Enabled
3,363,748 UART: [rt] RT listening for mailbox commands...
3,364,411 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,634 UART: [rt]cmd =0x46504c54, len=4
3,395,900 >>> mbox cmd response data (8 bytes)
3,396,093 UART: [rt] FIPS self test
3,396,421 UART: [kat] ++
3,396,573 UART: [kat] sha1
3,397,107 UART: Fatal Error: 0x90060001
3,398,646 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,398,651 >>> mbox cmd response: failed
3,398,651 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,398,656 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,093 UART: [kat] HMAC-384Kdf
920,505 UART: [kat] LMS
1,168,817 UART: [kat] --
1,169,656 UART: [cold-reset] ++
1,170,162 UART: [fht] FHT @ 0x50003400
1,172,792 UART: [idev] ++
1,172,960 UART: [idev] CDI.KEYID = 6
1,173,321 UART: [idev] SUBJECT.KEYID = 7
1,173,746 UART: [idev] UDS.KEYID = 0
1,174,092 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,198,851 UART: [idev] Sha1 KeyId Algorithm
1,207,909 UART: [idev] --
1,208,822 UART: [ldev] ++
1,208,990 UART: [ldev] CDI.KEYID = 6
1,209,354 UART: [ldev] SUBJECT.KEYID = 5
1,209,781 UART: [ldev] AUTHORITY.KEYID = 7
1,210,244 UART: [ldev] FE.KEYID = 1
1,215,566 UART: [ldev] Erasing FE.KEYID = 1
1,241,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,302 UART: [ldev] --
1,280,673 UART: [fwproc] Wait for Commands...
1,281,418 UART: [fwproc] Recv command 0x46574c44
1,282,151 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,061 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,236 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,805 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,908 ready_for_fw is high
1,058,908 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,480 >>> mbox cmd response: success
2,751,469 UART:
2,751,485 UART: Running Caliptra FMC ...
2,751,893 UART:
2,751,947 UART: [state] CFI Enabled
2,762,537 UART: [fht] FMC Alias Private Key: 7
2,882,163 UART: [art] Extend RT PCRs Done
2,882,591 UART: [art] Lock RT PCRs Done
2,884,195 UART: [art] Populate DV Done
2,892,484 UART: [fht] FMC Alias Private Key: 7
2,893,626 UART: [art] Derive CDI
2,893,906 UART: [art] Store in slot 0x4
2,979,513 UART: [art] Derive Key Pair
2,979,873 UART: [art] Store priv key in slot 0x5
2,993,681 UART: [art] Derive Key Pair - Done
3,008,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,719 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,484 UART: [art] PUB.X = 38ED77EDD4158649D3DA5F259314704C6F97031E2010E14624C1C7E48AAB985BCCD4CC0909318ECDD8C3E93AC3EA50A9
3,031,255 UART: [art] PUB.Y = 312FD1CBF24356FD65D4A6577D2212E89FBAAE21283D187DFA322D4084C26D1F4217DDA3606554DE4D36EB1B5862908F
3,038,211 UART: [art] SIG.R = BBB95B6A762E21456FEFBA4D074E824D00BE39A5B811E0BF9B89860BAF005ED2DAD010CEBB47A85265156CE8055E5CFD
3,044,948 UART: [art] SIG.S = 04BE0CC1136AF9F00884641125D1C7E5B607F8ABA0FBA99E22BB07F346EDAB5CC985139BDA583D441368E72B7A28EA16
3,068,629 UART: Caliptra RT
3,068,880 UART: [state] CFI Enabled
3,188,079 UART: [rt] RT listening for mailbox commands...
3,188,742 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,407 UART: [rt]cmd =0x46504c54, len=4
3,219,723 >>> mbox cmd response data (8 bytes)
3,219,922 UART: [rt] FIPS self test
3,220,250 UART: [kat] ++
3,220,402 UART: [kat] sha1
3,221,286 UART: Fatal Error: 0x90060001
3,222,825 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,222,830 >>> mbox cmd response: failed
3,222,830 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,222,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,346 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,356 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,466 UART: [kat] SHA2-512-ACC
906,367 UART: [kat] ECC-384
916,072 UART: [kat] HMAC-384Kdf
920,840 UART: [kat] LMS
1,169,152 UART: [kat] --
1,170,101 UART: [cold-reset] ++
1,170,611 UART: [fht] FHT @ 0x50003400
1,173,313 UART: [idev] ++
1,173,481 UART: [idev] CDI.KEYID = 6
1,173,842 UART: [idev] SUBJECT.KEYID = 7
1,174,267 UART: [idev] UDS.KEYID = 0
1,174,613 ready_for_fw is high
1,174,613 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,198,910 UART: [idev] Sha1 KeyId Algorithm
1,207,814 UART: [idev] --
1,208,701 UART: [ldev] ++
1,208,869 UART: [ldev] CDI.KEYID = 6
1,209,233 UART: [ldev] SUBJECT.KEYID = 5
1,209,660 UART: [ldev] AUTHORITY.KEYID = 7
1,210,123 UART: [ldev] FE.KEYID = 1
1,215,167 UART: [ldev] Erasing FE.KEYID = 1
1,241,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,813 UART: [ldev] --
1,281,178 UART: [fwproc] Wait for Commands...
1,281,787 UART: [fwproc] Recv command 0x46574c44
1,282,520 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,158 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,333 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,004 >>> mbox cmd response: success
2,838,220 UART: [afmc] ++
2,838,388 UART: [afmc] CDI.KEYID = 6
2,838,751 UART: [afmc] SUBJECT.KEYID = 7
2,839,177 UART: [afmc] AUTHORITY.KEYID = 5
2,875,048 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,246 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,956 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,837 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,538 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,259 UART: [afmc] --
2,918,300 UART: [cold-reset] --
2,919,022 UART: [state] Locking Datavault
2,920,029 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,633 UART: [state] Locking ICCM
2,921,227 UART: [exit] Launching FMC @ 0x40000130
2,926,557 UART:
2,926,573 UART: Running Caliptra FMC ...
2,926,981 UART:
2,927,124 UART: [state] CFI Enabled
2,937,646 UART: [fht] FMC Alias Private Key: 7
3,056,092 UART: [art] Extend RT PCRs Done
3,056,520 UART: [art] Lock RT PCRs Done
3,057,746 UART: [art] Populate DV Done
3,066,047 UART: [fht] FMC Alias Private Key: 7
3,067,069 UART: [art] Derive CDI
3,067,349 UART: [art] Store in slot 0x4
3,153,144 UART: [art] Derive Key Pair
3,153,504 UART: [art] Store priv key in slot 0x5
3,166,854 UART: [art] Derive Key Pair - Done
3,181,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,945 UART: [art] PUB.X = B1DF02694CE7E4936397C9E9670D831BF15C8FFE02CF22E29B62BC4DE0C292596C9E8357B91784BB67583B065E982297
3,204,703 UART: [art] PUB.Y = 9F576BBCADB19BE7202DEB4471F01E69EE594B6367F68EDFCA0EA9E742040625B1A9C1CFD1C3A4FE03F8C06823077A13
3,211,654 UART: [art] SIG.R = 5AB0371604D4450264E087F4BE45FE7C6F47C8956ABE6DD7AC57F1EC25B8A94FAEFFB5E9EE7BCDFA5647266654D2A484
3,218,436 UART: [art] SIG.S = 03424D680B62DD2BE9032503694EA81C8D99F19B65CA0013042BB7CDAFEA01A768D3DD7F4B3F293B627B25F46980716E
3,242,252 UART: Caliptra RT
3,242,595 UART: [state] CFI Enabled
3,362,893 UART: [rt] RT listening for mailbox commands...
3,363,556 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,423 UART: [rt]cmd =0x46504c54, len=4
3,394,571 >>> mbox cmd response data (8 bytes)
3,394,762 UART: [rt] FIPS self test
3,395,090 UART: [kat] ++
3,395,242 UART: [kat] sha1
3,396,054 UART: Fatal Error: 0x90060001
3,397,593 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,397,598 >>> mbox cmd response: failed
3,397,598 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,397,603 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,989 UART: [state] LifecycleState = Unprovisioned
85,644 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
891,093 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,553 UART: [kat] SHA2-256
901,493 UART: [kat] SHA2-384
904,414 UART: [kat] SHA2-512-ACC
906,315 UART: [kat] ECC-384
916,346 UART: [kat] HMAC-384Kdf
920,924 UART: [kat] LMS
1,169,236 UART: [kat] --
1,169,823 UART: [cold-reset] ++
1,170,159 UART: [fht] FHT @ 0x50003400
1,172,659 UART: [idev] ++
1,172,827 UART: [idev] CDI.KEYID = 6
1,173,188 UART: [idev] SUBJECT.KEYID = 7
1,173,613 UART: [idev] UDS.KEYID = 0
1,173,959 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,942 UART: [idev] Erasing UDS.KEYID = 0
1,198,980 UART: [idev] Sha1 KeyId Algorithm
1,207,840 UART: [idev] --
1,208,877 UART: [ldev] ++
1,209,045 UART: [ldev] CDI.KEYID = 6
1,209,409 UART: [ldev] SUBJECT.KEYID = 5
1,209,836 UART: [ldev] AUTHORITY.KEYID = 7
1,210,299 UART: [ldev] FE.KEYID = 1
1,215,541 UART: [ldev] Erasing FE.KEYID = 1
1,242,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,227 UART: [ldev] --
1,281,572 UART: [fwproc] Wait for Commands...
1,282,249 UART: [fwproc] Recv command 0x46574c44
1,282,982 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,434 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,609 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,184 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,185 ready_for_fw is high
1,060,185 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,093 >>> mbox cmd response: success
2,753,882 UART:
2,753,898 UART: Running Caliptra FMC ...
2,754,306 UART:
2,754,449 UART: [state] CFI Enabled
2,764,675 UART: [fht] FMC Alias Private Key: 7
2,883,873 UART: [art] Extend RT PCRs Done
2,884,301 UART: [art] Lock RT PCRs Done
2,885,573 UART: [art] Populate DV Done
2,893,706 UART: [fht] FMC Alias Private Key: 7
2,894,690 UART: [art] Derive CDI
2,894,970 UART: [art] Store in slot 0x4
2,980,785 UART: [art] Derive Key Pair
2,981,145 UART: [art] Store priv key in slot 0x5
2,994,879 UART: [art] Derive Key Pair - Done
3,009,742 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,830 UART: [art] PUB.X = 3B45AEBCA8EACB1A4F274D5247F6C77619FF99197C977E6B496FA4C76EC2B7848071FE51386CA290A4ECED9AB217D52A
3,032,616 UART: [art] PUB.Y = ABD5357B36CD11564255CD6F9225781061941D5732767250CB93336F56D9074A045583B340038756BF16DF170A037C8D
3,039,535 UART: [art] SIG.R = F46BF6DC8444F92B99F027BE7AB399FFD32AAD2E62AB2028CDA9E2FBDF5EA10E800875449D1E1A56E94B1570CD554018
3,046,315 UART: [art] SIG.S = B34F679BE0CCE75ABF825AC3D56909FB4A99715DA6365A8B7BB398235F393299BEA5D6BF2632570BFE91C1A62A37A9C7
3,070,361 UART: Caliptra RT
3,070,704 UART: [state] CFI Enabled
3,190,770 UART: [rt] RT listening for mailbox commands...
3,191,433 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,186 UART: [rt]cmd =0x46504c54, len=4
3,222,356 >>> mbox cmd response data (8 bytes)
3,222,471 UART: [rt] FIPS self test
3,222,799 UART: [kat] ++
3,222,951 UART: [kat] sha1
3,223,913 UART: Fatal Error: 0x90060001
3,225,452 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,225,457 >>> mbox cmd response: failed
3,225,457 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,225,462 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,747 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,731 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
87,956 UART: [kat] SHA2-256
893,606 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,731 UART: [kat] ++
897,883 UART: [kat] sha1
902,221 UART: [kat] SHA2-256
904,161 UART: [kat] SHA2-384
906,934 UART: [kat] SHA2-512-ACC
908,835 UART: [kat] ECC-384
918,204 UART: [kat] HMAC-384Kdf
922,916 UART: [kat] LMS
1,171,244 UART: [kat] --
1,172,107 UART: [cold-reset] ++
1,172,575 UART: [fht] FHT @ 0x50003400
1,175,312 UART: [idev] ++
1,175,480 UART: [idev] CDI.KEYID = 6
1,175,840 UART: [idev] SUBJECT.KEYID = 7
1,176,264 UART: [idev] UDS.KEYID = 0
1,176,609 ready_for_fw is high
1,176,609 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,142 UART: [idev] Erasing UDS.KEYID = 0
1,201,963 UART: [idev] Sha1 KeyId Algorithm
1,210,565 UART: [idev] --
1,211,567 UART: [ldev] ++
1,211,735 UART: [ldev] CDI.KEYID = 6
1,212,098 UART: [ldev] SUBJECT.KEYID = 5
1,212,524 UART: [ldev] AUTHORITY.KEYID = 7
1,212,987 UART: [ldev] FE.KEYID = 1
1,218,273 UART: [ldev] Erasing FE.KEYID = 1
1,244,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,383 UART: [ldev] --
1,283,806 UART: [fwproc] Wait for Commands...
1,284,580 UART: [fwproc] Recv command 0x46574c44
1,285,308 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,908 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,078 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,663 >>> mbox cmd response: success
2,840,909 UART: [afmc] ++
2,841,077 UART: [afmc] CDI.KEYID = 6
2,841,439 UART: [afmc] SUBJECT.KEYID = 7
2,841,864 UART: [afmc] AUTHORITY.KEYID = 5
2,877,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,580 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,289 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,172 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,873 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,511 UART: [afmc] --
2,920,423 UART: [cold-reset] --
2,921,307 UART: [state] Locking Datavault
2,922,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,244 UART: [state] Locking ICCM
2,923,734 UART: [exit] Launching FMC @ 0x40000130
2,929,064 UART:
2,929,080 UART: Running Caliptra FMC ...
2,929,488 UART:
2,929,542 UART: [state] CFI Enabled
2,940,128 UART: [fht] FMC Alias Private Key: 7
3,060,154 UART: [art] Extend RT PCRs Done
3,060,582 UART: [art] Lock RT PCRs Done
3,062,432 UART: [art] Populate DV Done
3,070,619 UART: [fht] FMC Alias Private Key: 7
3,071,727 UART: [art] Derive CDI
3,072,007 UART: [art] Store in slot 0x4
3,157,348 UART: [art] Derive Key Pair
3,157,708 UART: [art] Store priv key in slot 0x5
3,170,482 UART: [art] Derive Key Pair - Done
3,185,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,694 UART: [art] PUB.X = 66FC74D12B1011C6DA915B858496A93B39DD440DD76943E4DCAF2C8070FF943E86E043A1E83FE7E321CEF7BEDE011D97
3,208,470 UART: [art] PUB.Y = D80E46B18E052FD4C86F5B211214ADE0C1735A1B657791E13B0D6F180217755E535591D08AA67EADC3FCCCA6E749B172
3,215,414 UART: [art] SIG.R = FB60C7310792C76F1094BD06A8BDC017FDEFF62CD5496C70E5B51A6FC1C74F7BF481D6FCA8A8B79900810AFA6C458D63
3,222,169 UART: [art] SIG.S = AFFDF5F741EE7EAB6502749A0CD4B52601A4390E518E63CF788EC4855375C33F0BF5E946DCE63E76530B3A841CFA6E1C
3,245,973 UART: Caliptra RT
3,246,224 UART: [state] CFI Enabled
3,366,534 UART: [rt] RT listening for mailbox commands...
3,367,197 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,202 UART: [rt]cmd =0x46504c54, len=4
3,398,412 >>> mbox cmd response data (8 bytes)
3,398,613 UART: [rt] FIPS self test
3,398,941 UART: [kat] ++
3,399,093 UART: [kat] sha1
3,399,691 UART: Fatal Error: 0x90060001
3,401,230 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,235 >>> mbox cmd response: failed
3,401,235 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
893,292 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,417 UART: [kat] ++
897,569 UART: [kat] sha1
901,829 UART: [kat] SHA2-256
903,769 UART: [kat] SHA2-384
906,474 UART: [kat] SHA2-512-ACC
908,375 UART: [kat] ECC-384
918,344 UART: [kat] HMAC-384Kdf
922,782 UART: [kat] LMS
1,171,110 UART: [kat] --
1,171,833 UART: [cold-reset] ++
1,172,235 UART: [fht] FHT @ 0x50003400
1,174,798 UART: [idev] ++
1,174,966 UART: [idev] CDI.KEYID = 6
1,175,326 UART: [idev] SUBJECT.KEYID = 7
1,175,750 UART: [idev] UDS.KEYID = 0
1,176,095 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,642 UART: [idev] Erasing UDS.KEYID = 0
1,200,885 UART: [idev] Sha1 KeyId Algorithm
1,209,525 UART: [idev] --
1,210,631 UART: [ldev] ++
1,210,799 UART: [ldev] CDI.KEYID = 6
1,211,162 UART: [ldev] SUBJECT.KEYID = 5
1,211,588 UART: [ldev] AUTHORITY.KEYID = 7
1,212,051 UART: [ldev] FE.KEYID = 1
1,217,143 UART: [ldev] Erasing FE.KEYID = 1
1,243,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,263 UART: [ldev] --
1,282,756 UART: [fwproc] Wait for Commands...
1,283,578 UART: [fwproc] Recv command 0x46574c44
1,284,306 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,494 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,664 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,229 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,221 ready_for_fw is high
1,060,221 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,080 >>> mbox cmd response: success
2,752,599 UART:
2,752,615 UART: Running Caliptra FMC ...
2,753,023 UART:
2,753,077 UART: [state] CFI Enabled
2,763,289 UART: [fht] FMC Alias Private Key: 7
2,882,715 UART: [art] Extend RT PCRs Done
2,883,143 UART: [art] Lock RT PCRs Done
2,884,555 UART: [art] Populate DV Done
2,892,678 UART: [fht] FMC Alias Private Key: 7
2,893,802 UART: [art] Derive CDI
2,894,082 UART: [art] Store in slot 0x4
2,980,219 UART: [art] Derive Key Pair
2,980,579 UART: [art] Store priv key in slot 0x5
2,994,199 UART: [art] Derive Key Pair - Done
3,008,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,504 UART: [art] PUB.X = 91F05420E74A230B7E282A43EE045107FACBCA3FA402A24B8A392BE8383970ACAE584D412B76CB8A85F59A27C961C7D4
3,032,270 UART: [art] PUB.Y = 7C81546537DBA5FB349DD69167D30770BC50EDD731D2828D8A1448A54318D655A23CBAD230C8D0D974B36F0B2FC9EE14
3,039,220 UART: [art] SIG.R = EEBC9963001A85C44FB9202207CED6CFB6601AC1BF24A056A9B23FD9C05A408F12C4CB492A39BDBF6303AC2801B4E5D9
3,045,975 UART: [art] SIG.S = BBA0B4DC81C288F89E5DB5D2895AECE2A8404E4B0C6EC9D6A53FB95C87DC0F27A239EDAC206488D5941C0C07BCA9D1F4
3,069,627 UART: Caliptra RT
3,069,878 UART: [state] CFI Enabled
3,189,816 UART: [rt] RT listening for mailbox commands...
3,190,479 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,214 UART: [rt]cmd =0x46504c54, len=4
3,221,256 >>> mbox cmd response data (8 bytes)
3,221,507 UART: [rt] FIPS self test
3,221,835 UART: [kat] ++
3,221,987 UART: [kat] sha1
3,222,887 UART: Fatal Error: 0x90060001
3,224,426 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,224,431 >>> mbox cmd response: failed
3,224,431 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,224,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,951 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,654 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
893,263 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,388 UART: [kat] ++
897,540 UART: [kat] sha1
901,822 UART: [kat] SHA2-256
903,762 UART: [kat] SHA2-384
906,515 UART: [kat] SHA2-512-ACC
908,416 UART: [kat] ECC-384
918,397 UART: [kat] HMAC-384Kdf
923,095 UART: [kat] LMS
1,171,423 UART: [kat] --
1,172,302 UART: [cold-reset] ++
1,172,854 UART: [fht] FHT @ 0x50003400
1,175,349 UART: [idev] ++
1,175,517 UART: [idev] CDI.KEYID = 6
1,175,877 UART: [idev] SUBJECT.KEYID = 7
1,176,301 UART: [idev] UDS.KEYID = 0
1,176,646 ready_for_fw is high
1,176,646 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,173 UART: [idev] Erasing UDS.KEYID = 0
1,201,286 UART: [idev] Sha1 KeyId Algorithm
1,209,660 UART: [idev] --
1,210,728 UART: [ldev] ++
1,210,896 UART: [ldev] CDI.KEYID = 6
1,211,259 UART: [ldev] SUBJECT.KEYID = 5
1,211,685 UART: [ldev] AUTHORITY.KEYID = 7
1,212,148 UART: [ldev] FE.KEYID = 1
1,217,070 UART: [ldev] Erasing FE.KEYID = 1
1,243,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,440 UART: [ldev] --
1,282,835 UART: [fwproc] Wait for Commands...
1,283,547 UART: [fwproc] Recv command 0x46574c44
1,284,275 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,981 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,151 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,764 >>> mbox cmd response: success
2,840,010 UART: [afmc] ++
2,840,178 UART: [afmc] CDI.KEYID = 6
2,840,540 UART: [afmc] SUBJECT.KEYID = 7
2,840,965 UART: [afmc] AUTHORITY.KEYID = 5
2,876,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,251 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,960 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,843 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,544 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,388 UART: [afmc] --
2,920,418 UART: [cold-reset] --
2,921,178 UART: [state] Locking Datavault
2,922,187 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,791 UART: [state] Locking ICCM
2,923,385 UART: [exit] Launching FMC @ 0x40000130
2,928,715 UART:
2,928,731 UART: Running Caliptra FMC ...
2,929,139 UART:
2,929,282 UART: [state] CFI Enabled
2,939,742 UART: [fht] FMC Alias Private Key: 7
3,059,456 UART: [art] Extend RT PCRs Done
3,059,884 UART: [art] Lock RT PCRs Done
3,061,464 UART: [art] Populate DV Done
3,069,973 UART: [fht] FMC Alias Private Key: 7
3,071,071 UART: [art] Derive CDI
3,071,351 UART: [art] Store in slot 0x4
3,157,538 UART: [art] Derive Key Pair
3,157,898 UART: [art] Store priv key in slot 0x5
3,171,592 UART: [art] Derive Key Pair - Done
3,186,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,583 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,348 UART: [art] PUB.X = 8EC85FB305353C848C764A2A8DC3E480DABF4246159DE96B434605BAFF4B60D80DCD8545F26754D41F735442F4EF327B
3,209,115 UART: [art] PUB.Y = FD49646B32BA7ECAB46AC577AE0868F26B52E759845DEBCA83B5043DFFA8ECF66841E4AC80BA05D3B321EB3DF7E85E59
3,216,078 UART: [art] SIG.R = 0F5974D7439B6E6A16AC72F0D03FA471C5FF94D2F86E8BB588607A0ECE4C4626083033F2246D5F608B2F35A83F42F527
3,222,841 UART: [art] SIG.S = 7AF9B6791355AA22CB470CBF069A1F8A3B8303452B757ABDAFC9C6287F4D8266D0E4B0F795B93B35B7F9B1CA9594F93F
3,246,736 UART: Caliptra RT
3,247,079 UART: [state] CFI Enabled
3,366,825 UART: [rt] RT listening for mailbox commands...
3,367,488 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,365 UART: [rt]cmd =0x46504c54, len=4
3,398,423 >>> mbox cmd response data (8 bytes)
3,398,742 UART: [rt] FIPS self test
3,399,070 UART: [kat] ++
3,399,222 UART: [kat] sha1
3,399,904 UART: Fatal Error: 0x90060001
3,401,443 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,448 >>> mbox cmd response: failed
3,401,448 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
893,345 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,470 UART: [kat] ++
897,622 UART: [kat] sha1
902,002 UART: [kat] SHA2-256
903,942 UART: [kat] SHA2-384
906,505 UART: [kat] SHA2-512-ACC
908,406 UART: [kat] ECC-384
918,447 UART: [kat] HMAC-384Kdf
923,195 UART: [kat] LMS
1,171,523 UART: [kat] --
1,172,246 UART: [cold-reset] ++
1,172,772 UART: [fht] FHT @ 0x50003400
1,175,237 UART: [idev] ++
1,175,405 UART: [idev] CDI.KEYID = 6
1,175,765 UART: [idev] SUBJECT.KEYID = 7
1,176,189 UART: [idev] UDS.KEYID = 0
1,176,534 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,995 UART: [idev] Erasing UDS.KEYID = 0
1,201,146 UART: [idev] Sha1 KeyId Algorithm
1,209,452 UART: [idev] --
1,210,582 UART: [ldev] ++
1,210,750 UART: [ldev] CDI.KEYID = 6
1,211,113 UART: [ldev] SUBJECT.KEYID = 5
1,211,539 UART: [ldev] AUTHORITY.KEYID = 7
1,212,002 UART: [ldev] FE.KEYID = 1
1,217,364 UART: [ldev] Erasing FE.KEYID = 1
1,244,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,488 UART: [ldev] --
1,283,925 UART: [fwproc] Wait for Commands...
1,284,629 UART: [fwproc] Recv command 0x46574c44
1,285,357 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,215 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,385 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,100 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,292 ready_for_fw is high
1,060,292 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,953 >>> mbox cmd response: success
2,750,552 UART:
2,750,568 UART: Running Caliptra FMC ...
2,750,976 UART:
2,751,119 UART: [state] CFI Enabled
2,761,731 UART: [fht] FMC Alias Private Key: 7
2,880,929 UART: [art] Extend RT PCRs Done
2,881,357 UART: [art] Lock RT PCRs Done
2,883,023 UART: [art] Populate DV Done
2,891,300 UART: [fht] FMC Alias Private Key: 7
2,892,268 UART: [art] Derive CDI
2,892,548 UART: [art] Store in slot 0x4
2,978,125 UART: [art] Derive Key Pair
2,978,485 UART: [art] Store priv key in slot 0x5
2,992,431 UART: [art] Derive Key Pair - Done
3,007,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,839 UART: [art] PUB.X = 5F292F63493E108258E33F67E382E9867C747E273B90282A09D8A6AEB5F6D9111E905E4C11BC110337DB7D2C9E368DF8
3,030,601 UART: [art] PUB.Y = 5AAF5B428E97FCB4582170DC930D4DF16ECDB08127F3E7B425675475F83C8452B602F2248D0CD86CC57CADBE15DA4EAC
3,037,558 UART: [art] SIG.R = 7BBDF059398FB9D4E706D2FF3FD6DF7BC5D43EE7B7CEF6CB9A93142040E6B72BA2CF92F9707E0EBEE8AF9EC0AEE295A7
3,044,354 UART: [art] SIG.S = EC590A70FFE48A89B8704A499424FEC50E05A66770E9E16CC69855F6ABE50AEE4A81C6048DC0527C7BEE7B2BC61A6A06
3,068,390 UART: Caliptra RT
3,068,733 UART: [state] CFI Enabled
3,188,840 UART: [rt] RT listening for mailbox commands...
3,189,503 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,396 UART: [rt]cmd =0x46504c54, len=4
3,220,644 >>> mbox cmd response data (8 bytes)
3,220,769 UART: [rt] FIPS self test
3,221,097 UART: [kat] ++
3,221,249 UART: [kat] sha1
3,221,943 UART: Fatal Error: 0x90060001
3,223,482 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,223,487 >>> mbox cmd response: failed
3,223,487 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,223,492 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,418 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,203 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
2,687,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,837,825 >>> mbox cmd response: failed
2,838,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,987,303 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,461,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,293,071 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
2,687,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,836,890 >>> mbox cmd response: failed
2,837,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,986,319 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,444,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,278,406 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,052,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,202,090 >>> mbox cmd response: failed
3,202,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,351,482 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
20,176,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,885,742 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,653 writing to cptra_bootfsm_go
3,038,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,188,275 >>> mbox cmd response: failed
3,188,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,337,682 >>> mbox cmd response: failed
Initializing fuses
980 writing to cptra_bootfsm_go
20,173,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,889,562 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
2,691,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,841,473 >>> mbox cmd response: failed
2,842,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,990,764 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
3,442,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,269,697 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
2,692,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,842,932 >>> mbox cmd response: failed
2,843,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,992,417 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,438,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,272,819 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,045,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,195,350 >>> mbox cmd response: failed
3,195,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,344,782 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,170,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,892,635 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
3,038,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,187,829 >>> mbox cmd response: failed
3,188,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,337,115 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
20,172,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,881,719 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,125 >>> mbox cmd response: failed
810,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,332 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,205 >>> mbox cmd response: failed
810,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,272 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,246 >>> mbox cmd response: failed
810,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,252 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,415 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
811,200 >>> mbox cmd response: failed
811,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
811,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,603 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,271 >>> mbox cmd response: failed
810,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,277 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,478 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,793 >>> mbox cmd response: failed
810,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,799 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,564 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
811,056 >>> mbox cmd response: failed
811,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
811,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,151 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,250 >>> mbox cmd response: failed
810,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,805 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,932 writing to cptra_bootfsm_go
193,210 UART:
193,566 UART: Running Caliptra ROM ...
194,672 UART:
194,819 UART: [state] CFI Enabled
265,091 UART: [state] LifecycleState = Unprovisioned
267,016 UART: [state] DebugLocked = No
268,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,726 UART: [kat] SHA2-256
442,419 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,950 UART: [kat] ++
453,433 UART: [kat] sha1
464,807 UART: [kat] SHA2-256
467,542 UART: [kat] SHA2-384
474,028 UART: [kat] SHA2-512-ACC
476,332 UART: [kat] ECC-384
2,767,315 UART: [kat] HMAC-384Kdf
2,783,725 UART: [kat] LMS
3,974,020 UART: [kat] --
3,978,021 UART: [cold-reset] ++
3,979,891 UART: [fht] Storing FHT @ 0x50003400
3,991,370 UART: [idev] ++
3,991,933 UART: [idev] CDI.KEYID = 6
3,992,973 UART: [idev] SUBJECT.KEYID = 7
3,994,150 UART: [idev] UDS.KEYID = 0
3,995,238 ready_for_fw is high
3,995,501 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,145,742 UART: [idev] Erasing UDS.KEYID = 0
7,331,699 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,235 UART: [idev] --
7,356,280 UART: [ldev] ++
7,356,856 UART: [ldev] CDI.KEYID = 6
7,357,793 UART: [ldev] SUBJECT.KEYID = 5
7,359,007 UART: [ldev] AUTHORITY.KEYID = 7
7,360,249 UART: [ldev] FE.KEYID = 1
7,403,965 UART: [ldev] Erasing FE.KEYID = 1
10,729,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,057,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,830 UART: [ldev] --
13,110,202 UART: [fwproc] Waiting for Commands...
13,113,493 UART: [fwproc] Received command 0x46574c44
13,115,680 UART: [fwproc] Received Image of size 119428 bytes
17,232,924 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,310,260 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,383,458 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,714,236 >>> mbox cmd response: success
17,718,274 UART: [afmc] ++
17,718,861 UART: [afmc] CDI.KEYID = 6
17,719,743 UART: [afmc] SUBJECT.KEYID = 7
17,721,014 UART: [afmc] AUTHORITY.KEYID = 5
21,076,209 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,382,141 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,384,416 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,398,845 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,413,580 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,428,003 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,447,976 UART: [afmc] --
23,452,663 UART: [cold-reset] --
23,455,984 UART: [state] Locking Datavault
23,460,633 UART: [state] Locking PCR0, PCR1 and PCR31
23,462,394 UART: [state] Locking ICCM
23,464,740 UART: [exit] Launching FMC @ 0x40000130
23,473,136 UART:
23,473,372 UART: Running Caliptra FMC ...
23,474,475 UART:
23,474,634 UART: [state] CFI Enabled
23,541,003 UART: [fht] FMC Alias Private Key: 7
25,881,221 UART: [art] Extend RT PCRs Done
25,882,443 UART: [art] Lock RT PCRs Done
25,884,286 UART: [art] Populate DV Done
25,889,535 UART: [fht] FMC Alias Private Key: 7
25,891,095 UART: [art] Derive CDI
25,891,919 UART: [art] Store in slot 0x4
25,950,636 UART: [art] Derive Key Pair
25,951,678 UART: [art] Store priv key in slot 0x5
29,244,644 UART: [art] Derive Key Pair - Done
29,257,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,470 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,987 UART: [art] PUB.X = 3BCFA9AF2EB01E70F406363C930418EA05D3426C0FA96D5388E4DBB7C50581D028BE25D3FD34FD44125F6EA92D561D0F
31,555,237 UART: [art] PUB.Y = 9D1FDFBD7660F413829DEB68080A3C8932FF9A2B13415E7642982EA76374C5F99D2E68D5B5E4C6BC7DE1736AFF79FEFD
31,562,478 UART: [art] SIG.R = 3CB33422E46820CC405E64BB4B3145E08E4AC263436910A6923A928B9AA761B9A98EFE450D426FFEBDB6DF17723680DE
31,569,871 UART: [art] SIG.S = C6BEE751ABF3CE60345A5A92F77F20883FA6C1CC6E1F5EC0BEC80E7BC259935495FB2AFCA99E64AC4365D67391017649
32,875,630 UART: Caliptra RT
32,876,362 UART: [state] CFI Enabled
33,054,122 UART: [rt] RT listening for mailbox commands...
33,055,984 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,085,570 UART: [rt]cmd =0x46504c54, len=4
33,087,175 >>> mbox cmd response data (8 bytes)
33,088,207 UART: [rt] FIPS self test
33,089,152 UART: [kat] ++
33,089,607 UART: [kat] sha1
33,093,900 UART: Fatal Error: 0x90060002
33,129,231 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,279,133 >>> mbox cmd response: failed
33,279,730 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,429,677 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
190,090 UART:
190,378 UART: Running Caliptra ROM ...
191,483 UART:
191,631 UART: [state] CFI Enabled
249,167 UART: [state] LifecycleState = Unprovisioned
251,204 UART: [state] DebugLocked = No
252,448 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
256,963 UART: [kat] SHA2-256
426,623 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
437,156 UART: [kat] ++
437,603 UART: [kat] sha1
448,211 UART: [kat] SHA2-256
450,901 UART: [kat] SHA2-384
456,559 UART: [kat] SHA2-512-ACC
458,905 UART: [kat] ECC-384
2,753,053 UART: [kat] HMAC-384Kdf
2,786,079 UART: [kat] LMS
3,976,398 UART: [kat] --
3,980,079 UART: [cold-reset] ++
3,982,016 UART: [fht] Storing FHT @ 0x50003400
3,993,178 UART: [idev] ++
3,993,764 UART: [idev] CDI.KEYID = 6
3,994,730 UART: [idev] SUBJECT.KEYID = 7
3,995,952 UART: [idev] UDS.KEYID = 0
3,997,465 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,147,578 UART: [idev] Erasing UDS.KEYID = 0
7,330,069 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,870 UART: [idev] --
7,354,703 UART: [ldev] ++
7,355,280 UART: [ldev] CDI.KEYID = 6
7,356,246 UART: [ldev] SUBJECT.KEYID = 5
7,357,463 UART: [ldev] AUTHORITY.KEYID = 7
7,358,753 UART: [ldev] FE.KEYID = 1
7,406,889 UART: [ldev] Erasing FE.KEYID = 1
10,740,558 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,458 UART: [ldev] --
13,098,645 UART: [fwproc] Waiting for Commands...
13,100,421 UART: [fwproc] Received command 0x46574c44
13,102,620 UART: [fwproc] Received Image of size 119428 bytes
17,221,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,287 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,467 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,706,487 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,783,893 ready_for_fw is high
3,784,416 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,966,917 >>> mbox cmd response: success
23,653,464 UART:
23,653,883 UART: Running Caliptra FMC ...
23,655,013 UART:
23,655,183 UART: [state] CFI Enabled
23,716,638 UART: [fht] FMC Alias Private Key: 7
26,057,028 UART: [art] Extend RT PCRs Done
26,058,264 UART: [art] Lock RT PCRs Done
26,059,625 UART: [art] Populate DV Done
26,065,006 UART: [fht] FMC Alias Private Key: 7
26,066,504 UART: [art] Derive CDI
26,067,287 UART: [art] Store in slot 0x4
26,124,984 UART: [art] Derive Key Pair
26,126,020 UART: [art] Store priv key in slot 0x5
29,418,962 UART: [art] Derive Key Pair - Done
29,431,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,720,428 UART: [art] Erasing AUTHORITY.KEYID = 7
31,721,962 UART: [art] PUB.X = 88D95BB1BB97FB8F0FEB00DB7BA398BD5677F808CE8D253C026A7DC74500972BBFF835EC192A616070BC3B92E2B4072D
31,729,229 UART: [art] PUB.Y = F1D8A3296465F360EA35F2509411E34D00B25A0276D81294407CAD53B9351D35272CB5D293F67C0D641273B01E532A72
31,736,387 UART: [art] SIG.R = 60120D5D3768BDD65415E007B8667A841B5A3B5F09A2A9B154353C721F0E48F06D4E6A4249AD7DC65AFC5C3509D2E077
31,743,801 UART: [art] SIG.S = E8965777D2F74B96D2213C47912AABC2F30C14028C502E27DCBD179BDBB0DB12DD80730C51BE8DF080CFF72AB289A792
33,048,684 UART: Caliptra RT
33,049,412 UART: [state] CFI Enabled
33,226,851 UART: [rt] RT listening for mailbox commands...
33,228,715 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,258,418 UART: [rt]cmd =0x46504c54, len=4
33,260,163 >>> mbox cmd response data (8 bytes)
33,261,204 UART: [rt] FIPS self test
33,262,152 UART: [kat] ++
33,262,602 UART: [kat] sha1
33,266,820 UART: Fatal Error: 0x90060002
33,302,205 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,452,171 >>> mbox cmd response: failed
33,452,823 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,602,629 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,790,231 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,942,445 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
192,481 UART:
192,843 UART: Running Caliptra ROM ...
194,148 UART:
603,546 UART: [state] CFI Enabled
616,711 UART: [state] LifecycleState = Unprovisioned
618,684 UART: [state] DebugLocked = No
620,580 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,952 UART: [kat] SHA2-256
795,686 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,269 UART: [kat] ++
806,806 UART: [kat] sha1
818,260 UART: [kat] SHA2-256
820,993 UART: [kat] SHA2-384
826,490 UART: [kat] SHA2-512-ACC
828,866 UART: [kat] ECC-384
3,113,236 UART: [kat] HMAC-384Kdf
3,123,435 UART: [kat] LMS
4,313,542 UART: [kat] --
4,319,060 UART: [cold-reset] ++
4,320,864 UART: [fht] Storing FHT @ 0x50003400
4,331,079 UART: [idev] ++
4,331,675 UART: [idev] CDI.KEYID = 6
4,332,646 UART: [idev] SUBJECT.KEYID = 7
4,333,831 UART: [idev] UDS.KEYID = 0
4,334,872 ready_for_fw is high
4,335,090 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,485,660 UART: [idev] Erasing UDS.KEYID = 0
7,620,760 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,822 UART: [idev] --
7,645,555 UART: [ldev] ++
7,646,143 UART: [ldev] CDI.KEYID = 6
7,647,132 UART: [ldev] SUBJECT.KEYID = 5
7,648,300 UART: [ldev] AUTHORITY.KEYID = 7
7,649,602 UART: [ldev] FE.KEYID = 1
7,659,288 UART: [ldev] Erasing FE.KEYID = 1
10,944,427 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,991 UART: [ldev] --
13,305,127 UART: [fwproc] Waiting for Commands...
13,307,999 UART: [fwproc] Received command 0x46574c44
13,310,193 UART: [fwproc] Received Image of size 119428 bytes
17,431,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,511,053 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,584,230 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,916,086 >>> mbox cmd response: success
17,921,053 UART: [afmc] ++
17,921,650 UART: [afmc] CDI.KEYID = 6
17,922,675 UART: [afmc] SUBJECT.KEYID = 7
17,923,841 UART: [afmc] AUTHORITY.KEYID = 5
21,231,937 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,527,819 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,530,085 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,544,538 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,559,229 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,573,672 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,595,906 UART: [afmc] --
23,599,836 UART: [cold-reset] --
23,604,353 UART: [state] Locking Datavault
23,609,070 UART: [state] Locking PCR0, PCR1 and PCR31
23,610,779 UART: [state] Locking ICCM
23,613,098 UART: [exit] Launching FMC @ 0x40000130
23,621,503 UART:
23,621,749 UART: Running Caliptra FMC ...
23,622,857 UART:
23,623,026 UART: [state] CFI Enabled
23,631,081 UART: [fht] FMC Alias Private Key: 7
25,970,236 UART: [art] Extend RT PCRs Done
25,971,483 UART: [art] Lock RT PCRs Done
25,973,194 UART: [art] Populate DV Done
25,978,341 UART: [fht] FMC Alias Private Key: 7
25,979,890 UART: [art] Derive CDI
25,980,628 UART: [art] Store in slot 0x4
26,023,381 UART: [art] Derive Key Pair
26,024,389 UART: [art] Store priv key in slot 0x5
29,266,741 UART: [art] Derive Key Pair - Done
29,279,813 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,471 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,985 UART: [art] PUB.X = 5B2591228F9DA204B611E0AEE0F8E500EDE379651AB21DB164C785666388604E275AB5B82DCF16A23046FB6A07FC3553
31,569,247 UART: [art] PUB.Y = 871E761FFB873E21602E52F0230F87151AA1D0534DD309A72140F64FF62BF0448047243278A4E3C4B00A4B6895CD8DFF
31,576,495 UART: [art] SIG.R = 640F72CA0A5AA6E53618983E9EF129982B35553237E222DA2F7872C8690F8408BD1464D0A11B5AEF5955C05BCCA93DB1
31,583,846 UART: [art] SIG.S = F406F8CAD88EAABD02C2CCE59F4806E735A40104B012405E24583677DC772EEEB5751CBC1BFC9CEF992DED5F601B1C13
32,889,106 UART: Caliptra RT
32,889,845 UART: [state] CFI Enabled
33,023,980 UART: [rt] RT listening for mailbox commands...
33,025,850 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,055,376 UART: [rt]cmd =0x46504c54, len=4
33,056,796 >>> mbox cmd response data (8 bytes)
33,058,045 UART: [rt] FIPS self test
33,059,005 UART: [kat] ++
33,059,464 UART: [kat] sha1
33,063,819 UART: Fatal Error: 0x90060002
33,099,212 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,249,252 >>> mbox cmd response: failed
33,249,932 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,399,814 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
189,986 UART:
190,298 UART: Running Caliptra ROM ...
191,331 UART:
7,136,780 UART: [state] CFI Enabled
7,150,433 UART: [state] LifecycleState = Unprovisioned
7,152,359 UART: [state] DebugLocked = No
7,154,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,159,800 UART: [kat] SHA2-256
7,329,558 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,340,103 UART: [kat] ++
7,340,660 UART: [kat] sha1
7,351,401 UART: [kat] SHA2-256
7,354,280 UART: [kat] SHA2-384
7,359,825 UART: [kat] SHA2-512-ACC
7,362,191 UART: [kat] ECC-384
9,646,311 UART: [kat] HMAC-384Kdf
9,658,987 UART: [kat] LMS
10,849,088 UART: [kat] --
10,851,917 UART: [cold-reset] ++
10,854,242 UART: [fht] Storing FHT @ 0x50003400
10,865,514 UART: [idev] ++
10,866,083 UART: [idev] CDI.KEYID = 6
10,867,108 UART: [idev] SUBJECT.KEYID = 7
10,868,275 UART: [idev] UDS.KEYID = 0
10,869,933 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,020,031 UART: [idev] Erasing UDS.KEYID = 0
14,159,325 UART: [idev] Using Sha1 for KeyId Algorithm
14,181,044 UART: [idev] --
14,185,044 UART: [ldev] ++
14,185,635 UART: [ldev] CDI.KEYID = 6
14,186,608 UART: [ldev] SUBJECT.KEYID = 5
14,187,836 UART: [ldev] AUTHORITY.KEYID = 7
14,189,080 UART: [ldev] FE.KEYID = 1
14,200,081 UART: [ldev] Erasing FE.KEYID = 1
17,487,611 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,779,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,793,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,808,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,823,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,843,193 UART: [ldev] --
19,847,074 UART: [fwproc] Waiting for Commands...
19,849,677 UART: [fwproc] Received command 0x46574c44
19,851,873 UART: [fwproc] Received Image of size 119428 bytes
23,965,732 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,038,422 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,111,612 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,443,986 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,136,570 ready_for_fw is high
4,137,083 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,190,303 >>> mbox cmd response: success
23,832,098 UART:
23,832,553 UART: Running Caliptra FMC ...
23,833,693 UART:
23,833,863 UART: [state] CFI Enabled
23,841,448 UART: [fht] FMC Alias Private Key: 7
26,181,283 UART: [art] Extend RT PCRs Done
26,182,516 UART: [art] Lock RT PCRs Done
26,184,041 UART: [art] Populate DV Done
26,189,158 UART: [fht] FMC Alias Private Key: 7
26,190,868 UART: [art] Derive CDI
26,191,698 UART: [art] Store in slot 0x4
26,234,802 UART: [art] Derive Key Pair
26,235,856 UART: [art] Store priv key in slot 0x5
29,477,731 UART: [art] Derive Key Pair - Done
29,490,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,771,155 UART: [art] Erasing AUTHORITY.KEYID = 7
31,772,691 UART: [art] PUB.X = 41B5D99D69A96570B75A5CE965F3646F9E05E9DBEA52A04C3CDE902A2CA29EEDFF09ABB7933A23CBC78D46EDD6D39A37
31,780,024 UART: [art] PUB.Y = AFF80F10CA6DF7C8D073D2C19305737ADADDC1E2AC43F9485B4387A275388F520D4F3EF79220283843115DC3B7D07770
31,787,279 UART: [art] SIG.R = 16C63711147573BF1D921141052873EDC7D708FCE12D9C587E60CC88F41FAF36513746A89B709998C5246AD1C04B6B45
31,794,643 UART: [art] SIG.S = 0CEDA73A074CE7A0A0B5C5DD83C9D002D0E6AAEF7B4A9D866E77623D25205E8D7FC1E7EAD85F4CBCC3E2DC5AACC43C86
33,099,758 UART: Caliptra RT
33,100,499 UART: [state] CFI Enabled
33,233,406 UART: [rt] RT listening for mailbox commands...
33,235,272 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,265,144 UART: [rt]cmd =0x46504c54, len=4
33,266,869 >>> mbox cmd response data (8 bytes)
33,267,997 UART: [rt] FIPS self test
33,268,950 UART: [kat] ++
33,269,411 UART: [kat] sha1
33,273,949 UART: Fatal Error: 0x90060002
33,309,107 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,459,659 >>> mbox cmd response: failed
33,460,327 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,610,201 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
10,445,089 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,497,463 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,199 UART:
192,581 UART: Running Caliptra ROM ...
193,685 UART:
193,833 UART: [state] CFI Enabled
261,981 UART: [state] LifecycleState = Unprovisioned
263,925 UART: [state] DebugLocked = No
265,313 UART: [state] WD Timer not started. Device not locked for debugging
269,792 UART: [kat] SHA2-256
449,496 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,259 UART: [kat] ++
460,711 UART: [kat] sha1
472,442 UART: [kat] SHA2-256
475,177 UART: [kat] SHA2-384
481,318 UART: [kat] SHA2-512-ACC
483,694 UART: [kat] ECC-384
2,949,719 UART: [kat] HMAC-384Kdf
2,973,116 UART: [kat] LMS
3,449,616 UART: [kat] --
3,454,115 UART: [cold-reset] ++
3,456,120 UART: [fht] FHT @ 0x50003400
3,467,888 UART: [idev] ++
3,468,488 UART: [idev] CDI.KEYID = 6
3,469,417 UART: [idev] SUBJECT.KEYID = 7
3,470,675 UART: [idev] UDS.KEYID = 0
3,471,609 ready_for_fw is high
3,471,810 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,981 UART: [idev] Erasing UDS.KEYID = 0
5,989,835 UART: [idev] Sha1 KeyId Algorithm
6,014,699 UART: [idev] --
6,019,673 UART: [ldev] ++
6,020,250 UART: [ldev] CDI.KEYID = 6
6,021,275 UART: [ldev] SUBJECT.KEYID = 5
6,022,383 UART: [ldev] AUTHORITY.KEYID = 7
6,023,675 UART: [ldev] FE.KEYID = 1
6,060,316 UART: [ldev] Erasing FE.KEYID = 1
8,565,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,016 UART: [ldev] --
10,379,337 UART: [fwproc] Wait for Commands...
10,381,178 UART: [fwproc] Recv command 0x46574c44
10,383,176 UART: [fwproc] Recv'd Img size: 119428 bytes
13,882,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,964,303 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,037,334 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,368,567 >>> mbox cmd response: success
14,373,204 UART: [afmc] ++
14,373,803 UART: [afmc] CDI.KEYID = 6
14,374,829 UART: [afmc] SUBJECT.KEYID = 7
14,376,002 UART: [afmc] AUTHORITY.KEYID = 5
16,921,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,664,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,666,886 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,682,738 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,698,776 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,714,316 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,739,121 UART: [afmc] --
18,743,593 UART: [cold-reset] --
18,747,244 UART: [state] Locking Datavault
18,752,769 UART: [state] Locking PCR0, PCR1 and PCR31
18,754,478 UART: [state] Locking ICCM
18,756,610 UART: [exit] Launching FMC @ 0x40000130
18,765,020 UART:
18,765,306 UART: Running Caliptra FMC ...
18,766,424 UART:
18,766,589 UART: [state] CFI Enabled
18,821,214 UART: [fht] FMC Alias Private Key: 7
20,588,028 UART: [art] Extend RT PCRs Done
20,589,258 UART: [art] Lock RT PCRs Done
20,590,882 UART: [art] Populate DV Done
20,596,517 UART: [fht] FMC Alias Private Key: 7
20,598,115 UART: [art] Derive CDI
20,598,862 UART: [art] Store in slot 0x4
20,654,396 UART: [art] Derive Key Pair
20,655,444 UART: [art] Store priv key in slot 0x5
23,118,887 UART: [art] Derive Key Pair - Done
23,132,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,843,832 UART: [art] Erasing AUTHORITY.KEYID = 7
24,845,350 UART: [art] PUB.X = E237A2CD08B866ED76592430740641CB9307B453A234A9E8F0D95811AD94FBFDC32E77751FA76AB87A0BBD0BF98DE679
24,852,636 UART: [art] PUB.Y = 919FDCA4FFA5D512D639DC1056B330F809717BE6B972358FD0B0EE96F858B09486A5BC72C5FD8A06DBC5CB1377570B9A
24,859,866 UART: [art] SIG.R = 17EBF575712F3E777322D1CF67AB59A14F8C2B5C8C5B380AB93173BCDD488805A26A7D820E97F4FABFF4AC5884D1BC5F
24,867,291 UART: [art] SIG.S = A92EBE73DF44AA06287A71486366954B951F11EBB8C39E43D478F2A3ED9FC7EC1DC6717331A0AE45B0C91C2C1F2D7678
25,846,329 UART: Caliptra RT
25,847,067 UART: [state] CFI Enabled
26,025,054 UART: [rt] RT listening for mailbox commands...
26,026,922 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,056,565 UART: [rt]cmd =0x46504c54, len=4
26,058,243 >>> mbox cmd response data (8 bytes)
26,059,592 UART: [rt] FIPS self test
26,060,552 UART: [kat] ++
26,061,015 UART: [kat] sha1
26,065,102 UART: Fatal Error: 0x90060002
26,100,261 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,250,235 >>> mbox cmd response: failed
26,250,898 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,400,793 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
190,056 UART:
190,367 UART: Running Caliptra ROM ...
191,426 UART:
191,572 UART: [state] CFI Enabled
255,618 UART: [state] LifecycleState = Unprovisioned
257,534 UART: [state] DebugLocked = No
260,324 UART: [state] WD Timer not started. Device not locked for debugging
263,744 UART: [kat] SHA2-256
443,403 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
454,196 UART: [kat] ++
454,739 UART: [kat] sha1
466,818 UART: [kat] SHA2-256
469,499 UART: [kat] SHA2-384
474,668 UART: [kat] SHA2-512-ACC
477,006 UART: [kat] ECC-384
2,939,104 UART: [kat] HMAC-384Kdf
2,962,453 UART: [kat] LMS
3,438,946 UART: [kat] --
3,444,693 UART: [cold-reset] ++
3,447,117 UART: [fht] FHT @ 0x50003400
3,458,534 UART: [idev] ++
3,459,103 UART: [idev] CDI.KEYID = 6
3,460,070 UART: [idev] SUBJECT.KEYID = 7
3,461,294 UART: [idev] UDS.KEYID = 0
3,462,817 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,613,001 UART: [idev] Erasing UDS.KEYID = 0
5,982,710 UART: [idev] Sha1 KeyId Algorithm
6,007,352 UART: [idev] --
6,012,327 UART: [ldev] ++
6,012,908 UART: [ldev] CDI.KEYID = 6
6,013,881 UART: [ldev] SUBJECT.KEYID = 5
6,015,048 UART: [ldev] AUTHORITY.KEYID = 7
6,016,290 UART: [ldev] FE.KEYID = 1
6,050,631 UART: [ldev] Erasing FE.KEYID = 1
8,559,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,293,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,309,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,325,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,341,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,362,311 UART: [ldev] --
10,368,590 UART: [fwproc] Wait for Commands...
10,371,411 UART: [fwproc] Recv command 0x46574c44
10,373,460 UART: [fwproc] Recv'd Img size: 119428 bytes
13,865,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,266 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,291 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,352,532 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,460,417 ready_for_fw is high
3,461,061 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,240,931 >>> mbox cmd response: success
18,537,564 UART:
18,537,946 UART: Running Caliptra FMC ...
18,539,073 UART:
18,539,249 UART: [state] CFI Enabled
18,604,471 UART: [fht] FMC Alias Private Key: 7
20,371,160 UART: [art] Extend RT PCRs Done
20,372,388 UART: [art] Lock RT PCRs Done
20,373,881 UART: [art] Populate DV Done
20,379,203 UART: [fht] FMC Alias Private Key: 7
20,380,861 UART: [art] Derive CDI
20,381,602 UART: [art] Store in slot 0x4
20,436,644 UART: [art] Derive Key Pair
20,437,687 UART: [art] Store priv key in slot 0x5
22,900,551 UART: [art] Derive Key Pair - Done
22,913,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,339 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,827 UART: [art] PUB.X = B7AE35B495DBA0CD1F8A4C873F4C9FC6410EF56C4C0F795CCD0855FF07134186A16F60F34E150DFCD14D4F676C2BCF35
24,635,090 UART: [art] PUB.Y = B6831C2D5835611DC44792C115CF5EF621F884FE7CB9EF2B17FCA95314CFC0F33DB4382B9E2C2924E60D33076341A23C
24,642,348 UART: [art] SIG.R = 38E0E629CCC4AE594B5A4F4A1046B00A1A44BB0F3A91E469E9F03C53AF7FEA9068BFA1B7505D2A5F57367F8319F0789B
24,649,773 UART: [art] SIG.S = B82CB8EF30929DE55BDFEE67267421002858677DE5A290BDC3165A6E54CDF4036CE7FF14C5442907AA9E5616A8117BE1
25,629,038 UART: Caliptra RT
25,629,760 UART: [state] CFI Enabled
25,808,266 UART: [rt] RT listening for mailbox commands...
25,810,119 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,839,804 UART: [rt]cmd =0x46504c54, len=4
25,841,328 >>> mbox cmd response data (8 bytes)
25,842,436 UART: [rt] FIPS self test
25,843,385 UART: [kat] ++
25,843,847 UART: [kat] sha1
25,848,039 UART: Fatal Error: 0x90060002
25,883,421 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,033,416 >>> mbox cmd response: failed
26,034,026 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,183,973 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,441,106 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,252,833 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
192,612 UART:
192,980 UART: Running Caliptra ROM ...
194,137 UART:
603,715 UART: [state] CFI Enabled
619,759 UART: [state] LifecycleState = Unprovisioned
621,706 UART: [state] DebugLocked = No
623,250 UART: [state] WD Timer not started. Device not locked for debugging
626,268 UART: [kat] SHA2-256
805,933 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,724 UART: [kat] ++
817,219 UART: [kat] sha1
828,247 UART: [kat] SHA2-256
830,978 UART: [kat] SHA2-384
835,641 UART: [kat] SHA2-512-ACC
838,017 UART: [kat] ECC-384
3,282,674 UART: [kat] HMAC-384Kdf
3,295,920 UART: [kat] LMS
3,772,359 UART: [kat] --
3,778,799 UART: [cold-reset] ++
3,781,174 UART: [fht] FHT @ 0x50003400
3,791,875 UART: [idev] ++
3,792,449 UART: [idev] CDI.KEYID = 6
3,793,437 UART: [idev] SUBJECT.KEYID = 7
3,794,618 UART: [idev] UDS.KEYID = 0
3,795,682 ready_for_fw is high
3,795,892 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,945,857 UART: [idev] Erasing UDS.KEYID = 0
6,273,096 UART: [idev] Sha1 KeyId Algorithm
6,296,984 UART: [idev] --
6,301,821 UART: [ldev] ++
6,302,407 UART: [ldev] CDI.KEYID = 6
6,303,320 UART: [ldev] SUBJECT.KEYID = 5
6,304,542 UART: [ldev] AUTHORITY.KEYID = 7
6,305,783 UART: [ldev] FE.KEYID = 1
6,318,433 UART: [ldev] Erasing FE.KEYID = 1
8,794,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,668 UART: [ldev] --
10,590,424 UART: [fwproc] Wait for Commands...
10,593,289 UART: [fwproc] Recv command 0x46574c44
10,595,287 UART: [fwproc] Recv'd Img size: 119428 bytes
14,094,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,143 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,244,164 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,575,963 >>> mbox cmd response: success
14,580,613 UART: [afmc] ++
14,581,214 UART: [afmc] CDI.KEYID = 6
14,582,181 UART: [afmc] SUBJECT.KEYID = 7
14,583,398 UART: [afmc] AUTHORITY.KEYID = 5
17,087,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,811,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,813,970 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,829,825 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,845,873 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,861,469 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,886,096 UART: [afmc] --
18,890,720 UART: [cold-reset] --
18,896,906 UART: [state] Locking Datavault
18,902,156 UART: [state] Locking PCR0, PCR1 and PCR31
18,903,860 UART: [state] Locking ICCM
18,905,977 UART: [exit] Launching FMC @ 0x40000130
18,914,378 UART:
18,914,615 UART: Running Caliptra FMC ...
18,915,715 UART:
18,915,877 UART: [state] CFI Enabled
18,923,979 UART: [fht] FMC Alias Private Key: 7
20,690,537 UART: [art] Extend RT PCRs Done
20,691,765 UART: [art] Lock RT PCRs Done
20,693,391 UART: [art] Populate DV Done
20,698,698 UART: [fht] FMC Alias Private Key: 7
20,700,184 UART: [art] Derive CDI
20,701,000 UART: [art] Store in slot 0x4
20,743,874 UART: [art] Derive Key Pair
20,744,879 UART: [art] Store priv key in slot 0x5
23,171,238 UART: [art] Derive Key Pair - Done
23,184,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,890,362 UART: [art] Erasing AUTHORITY.KEYID = 7
24,891,879 UART: [art] PUB.X = B640781C74052F8D4EC22305237CD3EED626BB1D36A3288D438BAC0B35FF517992B4764FF919802C2A9846AB807FF869
24,899,155 UART: [art] PUB.Y = 3735B83F87308DAFE5015FF7F05B4DFF7EBF8B17D4334D3CBFDAB6656280C174C92CF261DAD1F906641B073C37864E68
24,906,401 UART: [art] SIG.R = 215DF96BD37CF0405A59EA3CBADFFB83CDB2279F33138BDD69CE01B1383DB37DF2B02F1C3045558DA289E19F9FC16616
24,913,801 UART: [art] SIG.S = EBD73EE08855756FEAE39CF042DCBE8D89C563EABBA8FBA4FA4B61180D246EC5C5FB138829F619829CAB434FBC32F074
25,892,285 UART: Caliptra RT
25,892,992 UART: [state] CFI Enabled
26,025,391 UART: [rt] RT listening for mailbox commands...
26,027,239 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,056,643 UART: [rt]cmd =0x46504c54, len=4
26,058,315 >>> mbox cmd response data (8 bytes)
26,059,010 UART: [rt] FIPS self test
26,059,878 UART: [kat] ++
26,060,322 UART: [kat] sha1
26,064,779 UART: Fatal Error: 0x90060002
26,099,998 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,250,033 >>> mbox cmd response: failed
26,250,630 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,400,953 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,105 UART:
190,397 UART: Running Caliptra ROM ...
191,427 UART:
14,132,218 UART: [state] CFI Enabled
14,142,371 UART: [state] LifecycleState = Unprovisioned
14,144,305 UART: [state] DebugLocked = No
14,146,677 UART: [state] WD Timer not started. Device not locked for debugging
14,150,960 UART: [kat] SHA2-256
14,330,589 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,341,386 UART: [kat] ++
14,341,875 UART: [kat] sha1
14,354,083 UART: [kat] SHA2-256
14,356,793 UART: [kat] SHA2-384
14,363,058 UART: [kat] SHA2-512-ACC
14,365,532 UART: [kat] ECC-384
16,809,365 UART: [kat] HMAC-384Kdf
16,821,485 UART: [kat] LMS
17,297,991 UART: [kat] --
17,302,035 UART: [cold-reset] ++
17,303,643 UART: [fht] FHT @ 0x50003400
17,315,538 UART: [idev] ++
17,316,169 UART: [idev] CDI.KEYID = 6
17,317,080 UART: [idev] SUBJECT.KEYID = 7
17,318,351 UART: [idev] UDS.KEYID = 0
17,319,897 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,469,778 UART: [idev] Erasing UDS.KEYID = 0
19,794,830 UART: [idev] Sha1 KeyId Algorithm
19,819,916 UART: [idev] --
19,824,916 UART: [ldev] ++
19,825,502 UART: [ldev] CDI.KEYID = 6
19,826,418 UART: [ldev] SUBJECT.KEYID = 5
19,827,638 UART: [ldev] AUTHORITY.KEYID = 7
19,828,867 UART: [ldev] FE.KEYID = 1
19,840,052 UART: [ldev] Erasing FE.KEYID = 1
22,319,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,038,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,054,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,070,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,085,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,108,283 UART: [ldev] --
24,114,572 UART: [fwproc] Wait for Commands...
24,117,749 UART: [fwproc] Recv command 0x46574c44
24,119,741 UART: [fwproc] Recv'd Img size: 119428 bytes
27,619,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,697,552 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,770,569 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,102,224 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
3,781,569 ready_for_fw is high
3,782,039 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,463,864 >>> mbox cmd response: success
18,715,660 UART:
18,716,043 UART: Running Caliptra FMC ...
18,717,258 UART:
18,717,428 UART: [state] CFI Enabled
18,724,854 UART: [fht] FMC Alias Private Key: 7
20,491,043 UART: [art] Extend RT PCRs Done
20,492,288 UART: [art] Lock RT PCRs Done
20,493,921 UART: [art] Populate DV Done
20,499,301 UART: [fht] FMC Alias Private Key: 7
20,500,796 UART: [art] Derive CDI
20,501,560 UART: [art] Store in slot 0x4
20,543,940 UART: [art] Derive Key Pair
20,544,951 UART: [art] Store priv key in slot 0x5
22,971,674 UART: [art] Derive Key Pair - Done
22,984,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,691,400 UART: [art] Erasing AUTHORITY.KEYID = 7
24,692,891 UART: [art] PUB.X = 792B7991C29526C28161BDD07FC1B247D3CD7D7D1F4A5D32D188956E854E06CA8857EC6F7D038160B4BEC4ACB030B593
24,700,147 UART: [art] PUB.Y = 137010CCA64ACC3710EA132C248A4E94A03EA779157826043FBA0BDD53D56219EA1669CEC1A6241D0621A39A12567034
24,707,427 UART: [art] SIG.R = AA76184A7415B239E5B79AF6360CEF2E8DD2697706612371B1498DCEFEE5393FAE2D9B521B81AB2CAA7DD1F6ED66193C
24,714,785 UART: [art] SIG.S = 6E1E453445AF5F7E44803C8EA67DAD3FD7E0463DBDF1FFC574FFE75FE5E0545EFD4F136518CC74EE846860E55C0BF4F1
25,693,992 UART: Caliptra RT
25,694,734 UART: [state] CFI Enabled
25,826,977 UART: [rt] RT listening for mailbox commands...
25,828,833 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,858,510 UART: [rt]cmd =0x46504c54, len=4
25,860,128 >>> mbox cmd response data (8 bytes)
25,861,031 UART: [rt] FIPS self test
25,861,992 UART: [kat] ++
25,862,453 UART: [kat] sha1
25,866,859 UART: Fatal Error: 0x90060002
25,902,013 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,052,027 >>> mbox cmd response: failed
26,052,624 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,202,577 >>> mbox cmd response: failed
Initializing fuses
928 writing to cptra_bootfsm_go
17,508,973 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,170,732 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,226 UART:
192,606 UART: Running Caliptra ROM ...
193,805 UART:
193,965 UART: [state] CFI Enabled
264,185 UART: [state] LifecycleState = Unprovisioned
266,599 UART: [state] DebugLocked = No
268,435 UART: [state] WD Timer not started. Device not locked for debugging
272,126 UART: [kat] SHA2-256
461,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,633 UART: [kat] ++
473,083 UART: [kat] sha1
485,244 UART: [kat] SHA2-256
488,256 UART: [kat] SHA2-384
495,704 UART: [kat] SHA2-512-ACC
498,332 UART: [kat] ECC-384
2,950,361 UART: [kat] HMAC-384Kdf
2,972,063 UART: [kat] LMS
3,503,845 UART: [kat] --
3,508,842 UART: [cold-reset] ++
3,510,571 UART: [fht] FHT @ 0x50003400
3,520,990 UART: [idev] ++
3,521,700 UART: [idev] CDI.KEYID = 6
3,522,658 UART: [idev] SUBJECT.KEYID = 7
3,523,832 UART: [idev] UDS.KEYID = 0
3,524,735 ready_for_fw is high
3,524,964 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,675,091 UART: [idev] Erasing UDS.KEYID = 0
6,028,711 UART: [idev] Sha1 KeyId Algorithm
6,052,283 UART: [idev] --
6,056,720 UART: [ldev] ++
6,057,406 UART: [ldev] CDI.KEYID = 6
6,058,333 UART: [ldev] SUBJECT.KEYID = 5
6,059,501 UART: [ldev] AUTHORITY.KEYID = 7
6,060,740 UART: [ldev] FE.KEYID = 1
6,100,292 UART: [ldev] Erasing FE.KEYID = 1
8,604,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,571 UART: [ldev] --
10,413,627 UART: [fwproc] Wait for Commands...
10,416,794 UART: [fwproc] Recv command 0x46574c44
10,419,127 UART: [fwproc] Recv'd Img size: 119428 bytes
13,926,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,005,531 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,129,126 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,694,607 >>> mbox cmd response: success
14,699,102 UART: [afmc] ++
14,699,825 UART: [afmc] CDI.KEYID = 6
14,701,026 UART: [afmc] SUBJECT.KEYID = 7
14,702,392 UART: [afmc] AUTHORITY.KEYID = 5
17,237,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,285 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,408 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,558 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,446 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,213 UART: [afmc] --
19,036,415 UART: [cold-reset] --
19,039,365 UART: [state] Locking Datavault
19,044,403 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,541 UART: [state] Locking ICCM
19,048,916 UART: [exit] Launching FMC @ 0x40000130
19,057,579 UART:
19,057,837 UART: Running Caliptra FMC ...
19,058,947 UART:
19,059,111 UART: [state] CFI Enabled
19,116,987 UART: [fht] FMC Alias Private Key: 7
20,883,240 UART: [art] Extend RT PCRs Done
20,884,443 UART: [art] Lock RT PCRs Done
20,886,073 UART: [art] Populate DV Done
20,891,527 UART: [fht] FMC Alias Private Key: 7
20,893,053 UART: [art] Derive CDI
20,893,839 UART: [art] Store in slot 0x4
20,950,617 UART: [art] Derive Key Pair
20,951,621 UART: [art] Store priv key in slot 0x5
23,414,740 UART: [art] Derive Key Pair - Done
23,427,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,376 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,886 UART: [art] PUB.X = 841C7A3A068C9393C60846C75FB952EA5617934CEA8968F74D8242365FBD3C9C213D751DD8B632E2D5890E1DAC1C70D6
25,148,146 UART: [art] PUB.Y = 735FFED167236040C6CAB9E91768D83EC44D6C2528E5AE86EE7F3153CDF415E8B930804F63917CAC3CD0F78D3C52ACC8
25,155,400 UART: [art] SIG.R = 335DC12381DCAE058192AF89B663BB16CA9EFADE61D4E006739A2AE9A458462469CD30CA26315682FE32A6908915E957
25,162,798 UART: [art] SIG.S = 99347FE575C23E63E5171B9BDBC97244BC260CD40FDAB56CBAFB2F5F2760D5FB17F15D51661DC86A9D8D01CF18DAAA75
26,141,893 UART: Caliptra RT
26,142,587 UART: [state] CFI Enabled
26,322,873 UART: [rt] RT listening for mailbox commands...
26,324,726 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,354,537 UART: [rt]cmd =0x46504c54, len=4
26,356,009 >>> mbox cmd response data (8 bytes)
26,356,881 UART: [rt] FIPS self test
26,357,828 UART: [kat] ++
26,358,285 UART: [kat] sha1
26,362,690 UART: Fatal Error: 0x90060002
26,397,896 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,547,857 >>> mbox cmd response: failed
26,548,517 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,698,463 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,099 UART:
190,398 UART: Running Caliptra ROM ...
191,707 UART:
191,873 UART: [state] CFI Enabled
248,799 UART: [state] LifecycleState = Unprovisioned
250,813 UART: [state] DebugLocked = No
253,330 UART: [state] WD Timer not started. Device not locked for debugging
257,732 UART: [kat] SHA2-256
447,604 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
458,357 UART: [kat] ++
458,843 UART: [kat] sha1
469,840 UART: [kat] SHA2-256
472,860 UART: [kat] SHA2-384
478,899 UART: [kat] SHA2-512-ACC
481,464 UART: [kat] ECC-384
2,936,254 UART: [kat] HMAC-384Kdf
2,959,828 UART: [kat] LMS
3,491,589 UART: [kat] --
3,495,211 UART: [cold-reset] ++
3,497,469 UART: [fht] FHT @ 0x50003400
3,508,292 UART: [idev] ++
3,508,997 UART: [idev] CDI.KEYID = 6
3,509,914 UART: [idev] SUBJECT.KEYID = 7
3,511,132 UART: [idev] UDS.KEYID = 0
3,512,653 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,662,734 UART: [idev] Erasing UDS.KEYID = 0
6,018,836 UART: [idev] Sha1 KeyId Algorithm
6,042,386 UART: [idev] --
6,047,334 UART: [ldev] ++
6,048,032 UART: [ldev] CDI.KEYID = 6
6,048,953 UART: [ldev] SUBJECT.KEYID = 5
6,050,119 UART: [ldev] AUTHORITY.KEYID = 7
6,051,360 UART: [ldev] FE.KEYID = 1
6,088,526 UART: [ldev] Erasing FE.KEYID = 1
8,595,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,494 UART: [ldev] --
10,403,299 UART: [fwproc] Wait for Commands...
10,405,838 UART: [fwproc] Recv command 0x46574c44
10,408,157 UART: [fwproc] Recv'd Img size: 119428 bytes
13,917,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,607 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,192 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,678,944 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,440,971 ready_for_fw is high
3,441,405 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,854,125 >>> mbox cmd response: success
19,154,325 UART:
19,154,745 UART: Running Caliptra FMC ...
19,155,888 UART:
19,156,057 UART: [state] CFI Enabled
19,221,106 UART: [fht] FMC Alias Private Key: 7
20,987,759 UART: [art] Extend RT PCRs Done
20,988,983 UART: [art] Lock RT PCRs Done
20,991,104 UART: [art] Populate DV Done
20,996,426 UART: [fht] FMC Alias Private Key: 7
20,997,975 UART: [art] Derive CDI
20,998,796 UART: [art] Store in slot 0x4
21,054,330 UART: [art] Derive Key Pair
21,055,378 UART: [art] Store priv key in slot 0x5
23,518,469 UART: [art] Derive Key Pair - Done
23,531,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,244,458 UART: [art] Erasing AUTHORITY.KEYID = 7
25,245,970 UART: [art] PUB.X = A37F70BC1074CDE747444E6992CC4D6AF8F61745D1974EBEE2C1D368271BE7BB03D50C6BC6D7D6E04AEF11DA23846302
25,253,254 UART: [art] PUB.Y = BAE2569869A46936C00FC2EB5933CB12FB84818C4783B6DE21EBB1C6FA20412757EA9A9AE8387104D932027B7D41C1E8
25,260,462 UART: [art] SIG.R = 9EFADE926FB4043075E6E802C80627CBB952E181808009DA1465D699463C9CD58648CD45E7EE22441F4EAA64AC32D818
25,267,872 UART: [art] SIG.S = C22D786C1447B72B86B305D554E5B7761B8205D7156EA855C9398D96587038BFCD45142C2433ADC674BC17474675B28A
26,246,945 UART: Caliptra RT
26,247,644 UART: [state] CFI Enabled
26,426,583 UART: [rt] RT listening for mailbox commands...
26,428,437 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,458,137 UART: [rt]cmd =0x46504c54, len=4
26,459,753 >>> mbox cmd response data (8 bytes)
26,460,924 UART: [rt] FIPS self test
26,461,879 UART: [kat] ++
26,462,337 UART: [kat] sha1
26,466,798 UART: Fatal Error: 0x90060002
26,502,015 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,652,039 >>> mbox cmd response: failed
26,652,698 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,802,638 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
3,424,533 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,830,496 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,544 UART:
192,907 UART: Running Caliptra ROM ...
194,045 UART:
603,928 UART: [state] CFI Enabled
617,948 UART: [state] LifecycleState = Unprovisioned
620,324 UART: [state] DebugLocked = No
622,631 UART: [state] WD Timer not started. Device not locked for debugging
626,454 UART: [kat] SHA2-256
816,286 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,085 UART: [kat] ++
827,611 UART: [kat] sha1
838,984 UART: [kat] SHA2-256
842,016 UART: [kat] SHA2-384
847,972 UART: [kat] SHA2-512-ACC
850,529 UART: [kat] ECC-384
3,294,288 UART: [kat] HMAC-384Kdf
3,307,378 UART: [kat] LMS
3,839,189 UART: [kat] --
3,843,830 UART: [cold-reset] ++
3,846,345 UART: [fht] FHT @ 0x50003400
3,858,467 UART: [idev] ++
3,859,185 UART: [idev] CDI.KEYID = 6
3,860,225 UART: [idev] SUBJECT.KEYID = 7
3,861,332 UART: [idev] UDS.KEYID = 0
3,862,269 ready_for_fw is high
3,862,481 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,012,871 UART: [idev] Erasing UDS.KEYID = 0
6,338,948 UART: [idev] Sha1 KeyId Algorithm
6,361,987 UART: [idev] --
6,367,457 UART: [ldev] ++
6,368,180 UART: [ldev] CDI.KEYID = 6
6,369,103 UART: [ldev] SUBJECT.KEYID = 5
6,370,152 UART: [ldev] AUTHORITY.KEYID = 7
6,371,446 UART: [ldev] FE.KEYID = 1
6,382,472 UART: [ldev] Erasing FE.KEYID = 1
8,855,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,097 UART: [ldev] --
10,649,293 UART: [fwproc] Wait for Commands...
10,652,155 UART: [fwproc] Recv command 0x46574c44
10,654,425 UART: [fwproc] Recv'd Img size: 119428 bytes
14,163,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,238,896 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,362,479 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,927,980 >>> mbox cmd response: success
14,932,636 UART: [afmc] ++
14,933,345 UART: [afmc] CDI.KEYID = 6
14,934,537 UART: [afmc] SUBJECT.KEYID = 7
14,936,026 UART: [afmc] AUTHORITY.KEYID = 5
17,442,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,163,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,165,958 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,181,023 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,196,192 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,211,071 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,234,527 UART: [afmc] --
19,238,558 UART: [cold-reset] --
19,242,389 UART: [state] Locking Datavault
19,247,744 UART: [state] Locking PCR0, PCR1 and PCR31
19,249,952 UART: [state] Locking ICCM
19,252,255 UART: [exit] Launching FMC @ 0x40000130
19,260,925 UART:
19,261,167 UART: Running Caliptra FMC ...
19,262,196 UART:
19,262,351 UART: [state] CFI Enabled
19,270,293 UART: [fht] FMC Alias Private Key: 7
21,036,387 UART: [art] Extend RT PCRs Done
21,037,618 UART: [art] Lock RT PCRs Done
21,039,279 UART: [art] Populate DV Done
21,044,592 UART: [fht] FMC Alias Private Key: 7
21,046,303 UART: [art] Derive CDI
21,047,126 UART: [art] Store in slot 0x4
21,089,545 UART: [art] Derive Key Pair
21,090,607 UART: [art] Store priv key in slot 0x5
23,517,093 UART: [art] Derive Key Pair - Done
23,530,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,236,172 UART: [art] Erasing AUTHORITY.KEYID = 7
25,237,685 UART: [art] PUB.X = 57B1662BD5C19E356B8E1225F05EF10F0BA51FD2C06E75051BBEC83E36F93439E8083948AF520618A79EBB78ED07CE13
25,244,922 UART: [art] PUB.Y = 9CE93ACC008B5845B96A4F0FC0BD3DD8DBF9DF5544CD3361CE6BDA8C4FB98E63DF9CA415413A68F0BA50B5609D942343
25,252,208 UART: [art] SIG.R = 40D2A824264363516FAAABC564AC334247052C5FBFD0859C01789ADB3DB569C34283AD9AE0D4DE9511E2BB3118B1E493
25,259,614 UART: [art] SIG.S = AA2242DD10F9FCAD6A1362D904B6C4F65E35687243BC09C02B5AF3A65F4FB2CC9DBA5AFD6DEF9D2F36DE461CE0AEED94
26,237,975 UART: Caliptra RT
26,238,662 UART: [state] CFI Enabled
26,372,731 UART: [rt] RT listening for mailbox commands...
26,374,587 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,404,295 UART: [rt]cmd =0x46504c54, len=4
26,405,654 >>> mbox cmd response data (8 bytes)
26,406,833 UART: [rt] FIPS self test
26,407,787 UART: [kat] ++
26,408,262 UART: [kat] sha1
26,412,161 UART: Fatal Error: 0x90060002
26,447,547 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,597,380 >>> mbox cmd response: failed
26,597,983 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,747,919 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
190,133 UART:
190,445 UART: Running Caliptra ROM ...
191,476 UART:
13,795,461 UART: [state] CFI Enabled
13,810,577 UART: [state] LifecycleState = Unprovisioned
13,812,925 UART: [state] DebugLocked = No
13,815,153 UART: [state] WD Timer not started. Device not locked for debugging
13,819,137 UART: [kat] SHA2-256
14,009,023 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,019,801 UART: [kat] ++
14,020,324 UART: [kat] sha1
14,032,192 UART: [kat] SHA2-256
14,035,224 UART: [kat] SHA2-384
14,039,768 UART: [kat] SHA2-512-ACC
14,042,351 UART: [kat] ECC-384
16,483,826 UART: [kat] HMAC-384Kdf
16,496,974 UART: [kat] LMS
17,028,784 UART: [kat] --
17,033,505 UART: [cold-reset] ++
17,035,990 UART: [fht] FHT @ 0x50003400
17,048,542 UART: [idev] ++
17,049,232 UART: [idev] CDI.KEYID = 6
17,050,147 UART: [idev] SUBJECT.KEYID = 7
17,051,365 UART: [idev] UDS.KEYID = 0
17,052,928 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,202,871 UART: [idev] Erasing UDS.KEYID = 0
19,528,806 UART: [idev] Sha1 KeyId Algorithm
19,551,603 UART: [idev] --
19,556,385 UART: [ldev] ++
19,557,073 UART: [ldev] CDI.KEYID = 6
19,557,985 UART: [ldev] SUBJECT.KEYID = 5
19,559,149 UART: [ldev] AUTHORITY.KEYID = 7
19,560,380 UART: [ldev] FE.KEYID = 1
19,570,682 UART: [ldev] Erasing FE.KEYID = 1
22,047,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,766,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,781,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,797,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,812,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,831,930 UART: [ldev] --
23,837,327 UART: [fwproc] Wait for Commands...
23,840,184 UART: [fwproc] Recv command 0x46574c44
23,842,515 UART: [fwproc] Recv'd Img size: 119428 bytes
27,352,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,427,516 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,551,150 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,116,387 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,757,822 ready_for_fw is high
3,758,237 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,068,846 >>> mbox cmd response: success
19,329,718 UART:
19,330,143 UART: Running Caliptra FMC ...
19,331,260 UART:
19,331,418 UART: [state] CFI Enabled
19,338,941 UART: [fht] FMC Alias Private Key: 7
21,105,607 UART: [art] Extend RT PCRs Done
21,106,843 UART: [art] Lock RT PCRs Done
21,108,450 UART: [art] Populate DV Done
21,113,997 UART: [fht] FMC Alias Private Key: 7
21,115,597 UART: [art] Derive CDI
21,116,419 UART: [art] Store in slot 0x4
21,159,186 UART: [art] Derive Key Pair
21,160,233 UART: [art] Store priv key in slot 0x5
23,587,178 UART: [art] Derive Key Pair - Done
23,600,070 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,306,735 UART: [art] Erasing AUTHORITY.KEYID = 7
25,308,248 UART: [art] PUB.X = 9B9A4A6EB66D3E1B910CCABFF694FCB98764F1206918519754A1B469ED8BD518B4A7EA738ABC5C923DD68EC4E0AB8135
25,315,482 UART: [art] PUB.Y = 5EFB0E05F5141213364ACB6A36C4BE82A6C927574D241B9B3F1B80860AEDB4F3734E232956313CA3239A132D6C7DF894
25,322,747 UART: [art] SIG.R = 8B759F9AC7266ED059B1B5CCE18C8AEAB6923A59312A11969F5F0CD12630496693CEEBFEE59D4AA82347FAB9538C3CB6
25,330,190 UART: [art] SIG.S = 02F14D600461B687E2A9106E773F9FBD2EDBFCE828F957D708464E85EA59905ED652F4B5979ED39A56C2F4FC112C0475
26,308,928 UART: Caliptra RT
26,309,652 UART: [state] CFI Enabled
26,441,804 UART: [rt] RT listening for mailbox commands...
26,443,667 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,473,467 UART: [rt]cmd =0x46504c54, len=4
26,475,052 >>> mbox cmd response data (8 bytes)
26,476,043 UART: [rt] FIPS self test
26,477,003 UART: [kat] ++
26,477,461 UART: [kat] sha1
26,481,456 UART: Fatal Error: 0x90060002
26,516,614 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,666,644 >>> mbox cmd response: failed
26,667,271 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,817,180 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
16,866,769 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,185,567 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,181 UART: [kat] SHA2-256
882,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,227 UART: [kat] ++
886,379 UART: [kat] sha1
890,549 UART: [kat] SHA2-256
892,487 UART: [kat] SHA2-384
895,046 UART: [kat] SHA2-512-ACC
896,947 UART: [kat] ECC-384
902,408 UART: [kat] HMAC-384Kdf
907,202 UART: [kat] LMS
1,475,398 UART: [kat] --
1,476,045 UART: [cold-reset] ++
1,476,593 UART: [fht] Storing FHT @ 0x50003400
1,479,382 UART: [idev] ++
1,479,550 UART: [idev] CDI.KEYID = 6
1,479,910 UART: [idev] SUBJECT.KEYID = 7
1,480,334 UART: [idev] UDS.KEYID = 0
1,480,679 ready_for_fw is high
1,480,679 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,312 UART: [idev] Erasing UDS.KEYID = 0
1,505,400 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,022 UART: [idev] --
1,515,039 UART: [ldev] ++
1,515,207 UART: [ldev] CDI.KEYID = 6
1,515,570 UART: [ldev] SUBJECT.KEYID = 5
1,515,996 UART: [ldev] AUTHORITY.KEYID = 7
1,516,459 UART: [ldev] FE.KEYID = 1
1,521,643 UART: [ldev] Erasing FE.KEYID = 1
1,546,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,356 UART: [ldev] --
1,585,757 UART: [fwproc] Waiting for Commands...
1,586,376 UART: [fwproc] Received command 0x46574c44
1,587,167 UART: [fwproc] Received Image of size 119428 bytes
2,942,295 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,491 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,709 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,440 >>> mbox cmd response: success
3,144,684 UART: [afmc] ++
3,144,852 UART: [afmc] CDI.KEYID = 6
3,145,214 UART: [afmc] SUBJECT.KEYID = 7
3,145,639 UART: [afmc] AUTHORITY.KEYID = 5
3,180,834 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,330 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,110 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,819 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,702 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,385 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,183 UART: [afmc] --
3,224,189 UART: [cold-reset] --
3,225,217 UART: [state] Locking Datavault
3,226,166 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,770 UART: [state] Locking ICCM
3,227,302 UART: [exit] Launching FMC @ 0x40000130
3,232,632 UART:
3,232,648 UART: Running Caliptra FMC ...
3,233,056 UART:
3,233,110 UART: [state] CFI Enabled
3,243,318 UART: [fht] FMC Alias Private Key: 7
3,362,558 UART: [art] Extend RT PCRs Done
3,362,986 UART: [art] Lock RT PCRs Done
3,364,610 UART: [art] Populate DV Done
3,373,085 UART: [fht] FMC Alias Private Key: 7
3,374,223 UART: [art] Derive CDI
3,374,503 UART: [art] Store in slot 0x4
3,460,445 UART: [art] Derive Key Pair
3,460,805 UART: [art] Store priv key in slot 0x5
3,474,172 UART: [art] Derive Key Pair - Done
3,488,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,332 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,097 UART: [art] PUB.X = A6AA8926D6EFE20F508D45BAC982D9D0D8A3C6E0CC74DEF4EA39E00C00002BE46512C1951102F6CF0662C9D2EC2E80DA
3,511,829 UART: [art] PUB.Y = 7B5D33C389A600198ECE981B769743353F40F0A311ACA60E651CD9E8C139C40F7704C385D5663C3B425877F0A953A195
3,518,742 UART: [art] SIG.R = D978F4FB60D136614DBD1FB52E505BC81EC603A5D2EB77B74C76F0EB1920393F5AF2A4C740E796A0F5398A294CFEC710
3,525,521 UART: [art] SIG.S = 12621C311C2775FD6B5A3A55C79A4DEDF05E2BA476547C2356DDE9DFF5D9FD59DEC083C3F314DA72F841DE18D49103E0
3,549,578 UART: Caliptra RT
3,549,829 UART: [state] CFI Enabled
3,669,881 UART: [rt] RT listening for mailbox commands...
3,670,544 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,347 UART: [rt]cmd =0x46504c54, len=4
3,701,437 >>> mbox cmd response data (8 bytes)
3,701,710 UART: [rt] FIPS self test
3,702,038 UART: [kat] ++
3,702,190 UART: [kat] sha1
3,706,435 UART: Fatal Error: 0x90060002
3,707,974 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,707,979 >>> mbox cmd response: failed
3,707,979 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,707,984 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,690 UART: [state] LifecycleState = Unprovisioned
85,345 UART: [state] DebugLocked = No
86,009 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,649 UART: [kat] SHA2-256
881,580 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,695 UART: [kat] ++
885,847 UART: [kat] sha1
890,163 UART: [kat] SHA2-256
892,101 UART: [kat] SHA2-384
894,850 UART: [kat] SHA2-512-ACC
896,751 UART: [kat] ECC-384
902,012 UART: [kat] HMAC-384Kdf
906,678 UART: [kat] LMS
1,474,874 UART: [kat] --
1,475,691 UART: [cold-reset] ++
1,476,249 UART: [fht] Storing FHT @ 0x50003400
1,478,978 UART: [idev] ++
1,479,146 UART: [idev] CDI.KEYID = 6
1,479,506 UART: [idev] SUBJECT.KEYID = 7
1,479,930 UART: [idev] UDS.KEYID = 0
1,480,275 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,942 UART: [idev] Erasing UDS.KEYID = 0
1,504,822 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,328 UART: [idev] --
1,514,471 UART: [ldev] ++
1,514,639 UART: [ldev] CDI.KEYID = 6
1,515,002 UART: [ldev] SUBJECT.KEYID = 5
1,515,428 UART: [ldev] AUTHORITY.KEYID = 7
1,515,891 UART: [ldev] FE.KEYID = 1
1,521,157 UART: [ldev] Erasing FE.KEYID = 1
1,546,836 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,972 UART: [ldev] --
1,586,301 UART: [fwproc] Waiting for Commands...
1,587,110 UART: [fwproc] Received command 0x46574c44
1,587,901 UART: [fwproc] Received Image of size 119428 bytes
2,943,549 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,861 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,079 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,786 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,761 ready_for_fw is high
1,361,761 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,918 >>> mbox cmd response: success
3,052,955 UART:
3,052,971 UART: Running Caliptra FMC ...
3,053,379 UART:
3,053,433 UART: [state] CFI Enabled
3,064,279 UART: [fht] FMC Alias Private Key: 7
3,183,659 UART: [art] Extend RT PCRs Done
3,184,087 UART: [art] Lock RT PCRs Done
3,185,713 UART: [art] Populate DV Done
3,193,904 UART: [fht] FMC Alias Private Key: 7
3,195,040 UART: [art] Derive CDI
3,195,320 UART: [art] Store in slot 0x4
3,280,836 UART: [art] Derive Key Pair
3,281,196 UART: [art] Store priv key in slot 0x5
3,294,469 UART: [art] Derive Key Pair - Done
3,309,025 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,808 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,573 UART: [art] PUB.X = B7B6E5442A224F6BB08B69FAEA6F1461249EBA0FCD1F190A30326C2194604A72C900975C9C27DB0F1DB9D95CB3E843AE
3,332,324 UART: [art] PUB.Y = 2945F38C38017ED677740249716591755E162EC91BFDDA8DEBCA3C8ABB1CAD6CB73CF8AD9B1ED81B981F8653C9E1D9F1
3,339,284 UART: [art] SIG.R = BDF5BD126A354976C6B86C0A1E2AC9AD99AB83085417DBFA81E89367E5E815DE64A8EB52B9BA6D2A0D158E9D475E815F
3,346,061 UART: [art] SIG.S = 59D212CBFD8068BD282AA13599D400A48EC855448559DA49A4E7BB67D859E4393E12904D4FA519924B33EA24DF280083
3,368,999 UART: Caliptra RT
3,369,250 UART: [state] CFI Enabled
3,489,292 UART: [rt] RT listening for mailbox commands...
3,489,955 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,704 UART: [rt]cmd =0x46504c54, len=4
3,520,680 >>> mbox cmd response data (8 bytes)
3,520,961 UART: [rt] FIPS self test
3,521,289 UART: [kat] ++
3,521,441 UART: [kat] sha1
3,525,846 UART: Fatal Error: 0x90060002
3,527,385 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,527,390 >>> mbox cmd response: failed
3,527,390 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,527,395 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,119 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,034 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,492 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,016 UART: [kat] SHA2-256
881,947 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,062 UART: [kat] ++
886,214 UART: [kat] sha1
890,438 UART: [kat] SHA2-256
892,376 UART: [kat] SHA2-384
895,013 UART: [kat] SHA2-512-ACC
896,914 UART: [kat] ECC-384
902,475 UART: [kat] HMAC-384Kdf
907,047 UART: [kat] LMS
1,475,243 UART: [kat] --
1,476,026 UART: [cold-reset] ++
1,476,374 UART: [fht] Storing FHT @ 0x50003400
1,479,135 UART: [idev] ++
1,479,303 UART: [idev] CDI.KEYID = 6
1,479,663 UART: [idev] SUBJECT.KEYID = 7
1,480,087 UART: [idev] UDS.KEYID = 0
1,480,432 ready_for_fw is high
1,480,432 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,171 UART: [idev] Erasing UDS.KEYID = 0
1,504,605 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,425 UART: [idev] --
1,514,264 UART: [ldev] ++
1,514,432 UART: [ldev] CDI.KEYID = 6
1,514,795 UART: [ldev] SUBJECT.KEYID = 5
1,515,221 UART: [ldev] AUTHORITY.KEYID = 7
1,515,684 UART: [ldev] FE.KEYID = 1
1,521,220 UART: [ldev] Erasing FE.KEYID = 1
1,546,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,733 UART: [ldev] --
1,586,224 UART: [fwproc] Waiting for Commands...
1,586,875 UART: [fwproc] Received command 0x46574c44
1,587,666 UART: [fwproc] Received Image of size 119428 bytes
2,942,298 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,526 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,744 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,461 >>> mbox cmd response: success
3,143,565 UART: [afmc] ++
3,143,733 UART: [afmc] CDI.KEYID = 6
3,144,095 UART: [afmc] SUBJECT.KEYID = 7
3,144,520 UART: [afmc] AUTHORITY.KEYID = 5
3,179,217 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,867 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,647 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,356 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,239 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,922 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,716 UART: [afmc] --
3,222,696 UART: [cold-reset] --
3,223,568 UART: [state] Locking Datavault
3,224,589 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,193 UART: [state] Locking ICCM
3,225,729 UART: [exit] Launching FMC @ 0x40000130
3,231,059 UART:
3,231,075 UART: Running Caliptra FMC ...
3,231,483 UART:
3,231,626 UART: [state] CFI Enabled
3,242,660 UART: [fht] FMC Alias Private Key: 7
3,361,126 UART: [art] Extend RT PCRs Done
3,361,554 UART: [art] Lock RT PCRs Done
3,363,270 UART: [art] Populate DV Done
3,371,513 UART: [fht] FMC Alias Private Key: 7
3,372,519 UART: [art] Derive CDI
3,372,799 UART: [art] Store in slot 0x4
3,458,665 UART: [art] Derive Key Pair
3,459,025 UART: [art] Store priv key in slot 0x5
3,472,642 UART: [art] Derive Key Pair - Done
3,487,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,061 UART: [art] PUB.X = 34520FFC331F263173C3867F6E66F136FAC1FB43B39410E99E37F076FC569C22EF0B820AE44335822281FD66BBFF7DFB
3,510,828 UART: [art] PUB.Y = 5B1C82184ABA6DFD8A13648F926B8454EE56AB38B0AA3F55C23534871E16879CD4D303E4693A15EC8CB23D92AEEA0270
3,517,780 UART: [art] SIG.R = 65662912A2040D11219A4467B998799CCFDC8E52A8A94ECA38185F0BB000BE555A779AB01B233835C19F342A31082D2D
3,524,512 UART: [art] SIG.S = 2766107279E06A3DCDB00A3E64886B42BA825FEF212E10BF10C8F8AE079280068E10245C33545F59F0787044A7E84B21
3,548,149 UART: Caliptra RT
3,548,492 UART: [state] CFI Enabled
3,668,597 UART: [rt] RT listening for mailbox commands...
3,669,260 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,915 UART: [rt]cmd =0x46504c54, len=4
3,700,075 >>> mbox cmd response data (8 bytes)
3,700,226 UART: [rt] FIPS self test
3,700,554 UART: [kat] ++
3,700,706 UART: [kat] sha1
3,705,047 UART: Fatal Error: 0x90060002
3,706,586 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,706,591 >>> mbox cmd response: failed
3,706,591 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,706,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,582 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,282 UART: [kat] SHA2-256
882,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,328 UART: [kat] ++
886,480 UART: [kat] sha1
890,554 UART: [kat] SHA2-256
892,492 UART: [kat] SHA2-384
895,267 UART: [kat] SHA2-512-ACC
897,168 UART: [kat] ECC-384
903,161 UART: [kat] HMAC-384Kdf
907,753 UART: [kat] LMS
1,475,949 UART: [kat] --
1,476,908 UART: [cold-reset] ++
1,477,342 UART: [fht] Storing FHT @ 0x50003400
1,480,051 UART: [idev] ++
1,480,219 UART: [idev] CDI.KEYID = 6
1,480,579 UART: [idev] SUBJECT.KEYID = 7
1,481,003 UART: [idev] UDS.KEYID = 0
1,481,348 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,113 UART: [idev] Erasing UDS.KEYID = 0
1,505,743 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,527 UART: [idev] --
1,515,400 UART: [ldev] ++
1,515,568 UART: [ldev] CDI.KEYID = 6
1,515,931 UART: [ldev] SUBJECT.KEYID = 5
1,516,357 UART: [ldev] AUTHORITY.KEYID = 7
1,516,820 UART: [ldev] FE.KEYID = 1
1,521,868 UART: [ldev] Erasing FE.KEYID = 1
1,547,927 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,487 UART: [ldev] --
1,586,856 UART: [fwproc] Waiting for Commands...
1,587,621 UART: [fwproc] Received command 0x46574c44
1,588,412 UART: [fwproc] Received Image of size 119428 bytes
2,942,758 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,738 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,956 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,605 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,784 ready_for_fw is high
1,362,784 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,487 >>> mbox cmd response: success
3,053,512 UART:
3,053,528 UART: Running Caliptra FMC ...
3,053,936 UART:
3,054,079 UART: [state] CFI Enabled
3,064,693 UART: [fht] FMC Alias Private Key: 7
3,183,725 UART: [art] Extend RT PCRs Done
3,184,153 UART: [art] Lock RT PCRs Done
3,185,791 UART: [art] Populate DV Done
3,193,988 UART: [fht] FMC Alias Private Key: 7
3,194,936 UART: [art] Derive CDI
3,195,216 UART: [art] Store in slot 0x4
3,280,628 UART: [art] Derive Key Pair
3,280,988 UART: [art] Store priv key in slot 0x5
3,293,589 UART: [art] Derive Key Pair - Done
3,308,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,888 UART: [art] PUB.X = 9B32C54F13D26FBCCB9B220C799C4050624C6B2AF705C428E0C483A5DA04236C045044A0D52B1122CA5DDDFAFECE02F4
3,331,657 UART: [art] PUB.Y = 6E45EF9C2E1FF0CF9D8A78A9DBCBB6687BAF5DCC4E321F0A9723A467B68642204C6EB836B02896E366F5907ADA789E69
3,338,618 UART: [art] SIG.R = F9657DA9478C30F6E56EE1EA584383C9671FCB0BFB62078A6B80B33230AA90AA069386FD4701A8A969BA1374315F45A9
3,345,378 UART: [art] SIG.S = 17507CC29C110740A84213DC876AD06CD722A66DC3AC08B9E5576A30227459756C5B0E4D0229F5EBEA4736868C7F80F6
3,369,042 UART: Caliptra RT
3,369,385 UART: [state] CFI Enabled
3,489,683 UART: [rt] RT listening for mailbox commands...
3,490,346 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,731 UART: [rt]cmd =0x46504c54, len=4
3,520,817 >>> mbox cmd response data (8 bytes)
3,521,144 UART: [rt] FIPS self test
3,521,472 UART: [kat] ++
3,521,624 UART: [kat] sha1
3,526,049 UART: Fatal Error: 0x90060002
3,527,588 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,527,593 >>> mbox cmd response: failed
3,527,593 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,527,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,218 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,239 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,127 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,142 UART: [kat] ++
895,294 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
916,047 UART: [kat] HMAC-384Kdf
920,783 UART: [kat] LMS
1,169,095 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,402 UART: [idev] ++
1,173,570 UART: [idev] CDI.KEYID = 6
1,173,931 UART: [idev] SUBJECT.KEYID = 7
1,174,356 UART: [idev] UDS.KEYID = 0
1,174,702 ready_for_fw is high
1,174,702 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,825 UART: [idev] Erasing UDS.KEYID = 0
1,199,389 UART: [idev] Sha1 KeyId Algorithm
1,208,341 UART: [idev] --
1,209,316 UART: [ldev] ++
1,209,484 UART: [ldev] CDI.KEYID = 6
1,209,848 UART: [ldev] SUBJECT.KEYID = 5
1,210,275 UART: [ldev] AUTHORITY.KEYID = 7
1,210,738 UART: [ldev] FE.KEYID = 1
1,215,702 UART: [ldev] Erasing FE.KEYID = 1
1,241,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,152 UART: [ldev] --
1,280,473 UART: [fwproc] Wait for Commands...
1,281,198 UART: [fwproc] Recv command 0x46574c44
1,281,931 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,383 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,558 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,119 >>> mbox cmd response: success
2,838,345 UART: [afmc] ++
2,838,513 UART: [afmc] CDI.KEYID = 6
2,838,876 UART: [afmc] SUBJECT.KEYID = 7
2,839,302 UART: [afmc] AUTHORITY.KEYID = 5
2,874,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,312 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,061 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,771 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,652 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,353 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,048 UART: [afmc] --
2,917,961 UART: [cold-reset] --
2,918,797 UART: [state] Locking Datavault
2,919,840 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,444 UART: [state] Locking ICCM
2,921,052 UART: [exit] Launching FMC @ 0x40000130
2,926,382 UART:
2,926,398 UART: Running Caliptra FMC ...
2,926,806 UART:
2,926,860 UART: [state] CFI Enabled
2,937,546 UART: [fht] FMC Alias Private Key: 7
3,056,584 UART: [art] Extend RT PCRs Done
3,057,012 UART: [art] Lock RT PCRs Done
3,058,626 UART: [art] Populate DV Done
3,067,101 UART: [fht] FMC Alias Private Key: 7
3,068,155 UART: [art] Derive CDI
3,068,435 UART: [art] Store in slot 0x4
3,154,290 UART: [art] Derive Key Pair
3,154,650 UART: [art] Store priv key in slot 0x5
3,167,722 UART: [art] Derive Key Pair - Done
3,182,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,291 UART: [art] PUB.X = 20F5506D43C329A8688342B6220CDF0D68F4E8500D19D9C72A7CC62FB9F8B653728BAE78567A7D1719A0A30D923294E8
3,205,047 UART: [art] PUB.Y = DC114F15247AADE64CC0B7BB9FF8A2AD7268936D44E7040B32BCD6091CC8B4FEEA8EA6A8900807F49EAE3524D47E60E8
3,212,000 UART: [art] SIG.R = 9605016E7322AFF6C587F46D4A9544E92BAFBAA161E0E8E40AB73D6C365C80EC6947D492301B6783A915303A1584A104
3,218,756 UART: [art] SIG.S = 12CCD8C5D661685990B8EA24BEC1DAE236718DD1558280818D0384D675EA800AD2B2289DE51541B8FF52F50EEA0E0BD4
3,243,121 UART: Caliptra RT
3,243,372 UART: [state] CFI Enabled
3,362,581 UART: [rt] RT listening for mailbox commands...
3,363,244 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,211 UART: [rt]cmd =0x46504c54, len=4
3,394,297 >>> mbox cmd response data (8 bytes)
3,394,476 UART: [rt] FIPS self test
3,394,804 UART: [kat] ++
3,394,956 UART: [kat] sha1
3,399,299 UART: Fatal Error: 0x90060002
3,400,838 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,400,843 >>> mbox cmd response: failed
3,400,843 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,400,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,184 UART: [kat] ++
895,336 UART: [kat] sha1
899,428 UART: [kat] SHA2-256
901,368 UART: [kat] SHA2-384
904,125 UART: [kat] SHA2-512-ACC
906,026 UART: [kat] ECC-384
915,875 UART: [kat] HMAC-384Kdf
920,429 UART: [kat] LMS
1,168,741 UART: [kat] --
1,169,758 UART: [cold-reset] ++
1,170,142 UART: [fht] FHT @ 0x50003400
1,172,746 UART: [idev] ++
1,172,914 UART: [idev] CDI.KEYID = 6
1,173,275 UART: [idev] SUBJECT.KEYID = 7
1,173,700 UART: [idev] UDS.KEYID = 0
1,174,046 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,679 UART: [idev] Erasing UDS.KEYID = 0
1,198,885 UART: [idev] Sha1 KeyId Algorithm
1,207,635 UART: [idev] --
1,208,770 UART: [ldev] ++
1,208,938 UART: [ldev] CDI.KEYID = 6
1,209,302 UART: [ldev] SUBJECT.KEYID = 5
1,209,729 UART: [ldev] AUTHORITY.KEYID = 7
1,210,192 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,241,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,438 UART: [ldev] --
1,280,753 UART: [fwproc] Wait for Commands...
1,281,374 UART: [fwproc] Recv command 0x46574c44
1,282,107 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,085 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,260 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,917 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,380 ready_for_fw is high
1,059,380 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,744 >>> mbox cmd response: success
2,751,247 UART:
2,751,263 UART: Running Caliptra FMC ...
2,751,671 UART:
2,751,725 UART: [state] CFI Enabled
2,761,855 UART: [fht] FMC Alias Private Key: 7
2,880,159 UART: [art] Extend RT PCRs Done
2,880,587 UART: [art] Lock RT PCRs Done
2,881,827 UART: [art] Populate DV Done
2,890,154 UART: [fht] FMC Alias Private Key: 7
2,891,082 UART: [art] Derive CDI
2,891,362 UART: [art] Store in slot 0x4
2,976,811 UART: [art] Derive Key Pair
2,977,171 UART: [art] Store priv key in slot 0x5
2,989,735 UART: [art] Derive Key Pair - Done
3,004,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,020,330 UART: [art] Erasing AUTHORITY.KEYID = 7
3,021,095 UART: [art] PUB.X = E5ACEC4BFD3399B76034C35009ED0F48D6BB53915163513AD83F51FFE6DD52C664AEB2D6CB877CBDA3F9E3691C26F3BD
3,027,879 UART: [art] PUB.Y = 29487BF202F914B6CCC9D99F99A8DEF0140291C6F1EF2EAA33FE0DCB645E60EE9E8B4C5E1835FC0255E7552A7D3EB432
3,034,833 UART: [art] SIG.R = 938E5D04B3F8679E9BE94345A933029E074E49C408A0CC928C377007A9684E4E2AE27F5D35D82813F8480005E03444EC
3,041,555 UART: [art] SIG.S = 2B84A9C70FA6E35264FD892F2F7BEE0F9C1D09399B31F04B12ABD55E73127AE1CE3857C1BFC63049F213F1316756233B
3,065,072 UART: Caliptra RT
3,065,323 UART: [state] CFI Enabled
3,185,230 UART: [rt] RT listening for mailbox commands...
3,185,893 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,215,710 UART: [rt]cmd =0x46504c54, len=4
3,216,888 >>> mbox cmd response data (8 bytes)
3,217,183 UART: [rt] FIPS self test
3,217,511 UART: [kat] ++
3,217,663 UART: [kat] sha1
3,222,116 UART: Fatal Error: 0x90060002
3,223,655 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,223,660 >>> mbox cmd response: failed
3,223,660 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,223,665 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,150 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,500 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
899,969 UART: [kat] SHA2-256
901,909 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,704 UART: [kat] LMS
1,169,016 UART: [kat] --
1,170,105 UART: [cold-reset] ++
1,170,551 UART: [fht] FHT @ 0x50003400
1,173,263 UART: [idev] ++
1,173,431 UART: [idev] CDI.KEYID = 6
1,173,792 UART: [idev] SUBJECT.KEYID = 7
1,174,217 UART: [idev] UDS.KEYID = 0
1,174,563 ready_for_fw is high
1,174,563 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,199,514 UART: [idev] Sha1 KeyId Algorithm
1,208,414 UART: [idev] --
1,209,349 UART: [ldev] ++
1,209,517 UART: [ldev] CDI.KEYID = 6
1,209,881 UART: [ldev] SUBJECT.KEYID = 5
1,210,308 UART: [ldev] AUTHORITY.KEYID = 7
1,210,771 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,243,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,141 UART: [ldev] --
1,282,510 UART: [fwproc] Wait for Commands...
1,283,211 UART: [fwproc] Recv command 0x46574c44
1,283,944 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,074 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,249 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,928 >>> mbox cmd response: success
2,840,974 UART: [afmc] ++
2,841,142 UART: [afmc] CDI.KEYID = 6
2,841,505 UART: [afmc] SUBJECT.KEYID = 7
2,841,931 UART: [afmc] AUTHORITY.KEYID = 5
2,877,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,832 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,542 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,423 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,124 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,025 UART: [afmc] --
2,921,064 UART: [cold-reset] --
2,921,944 UART: [state] Locking Datavault
2,923,193 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,797 UART: [state] Locking ICCM
2,924,253 UART: [exit] Launching FMC @ 0x40000130
2,929,583 UART:
2,929,599 UART: Running Caliptra FMC ...
2,930,007 UART:
2,930,150 UART: [state] CFI Enabled
2,940,766 UART: [fht] FMC Alias Private Key: 7
3,059,668 UART: [art] Extend RT PCRs Done
3,060,096 UART: [art] Lock RT PCRs Done
3,061,776 UART: [art] Populate DV Done
3,069,765 UART: [fht] FMC Alias Private Key: 7
3,070,755 UART: [art] Derive CDI
3,071,035 UART: [art] Store in slot 0x4
3,156,726 UART: [art] Derive Key Pair
3,157,086 UART: [art] Store priv key in slot 0x5
3,170,546 UART: [art] Derive Key Pair - Done
3,185,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,493 UART: [art] PUB.X = E355575404D180EBCCAD63C02FACC7817BE39FE7E5CD84B90F950A30EBF0D7DA24E5D869230DDBF7017D5BCEA84045CD
3,208,270 UART: [art] PUB.Y = 7770D6B11B5440FFC5488097CC28BC7B59AF04C144775C5C604B4650FC9F62894A4EE033EBDC4C6649CA5426B880A66F
3,215,221 UART: [art] SIG.R = 62DB65884BF3EF2F2FAC22DAE17782EA95DB33D5382EDD4C2F1CBB6A9567DE238AA4A4C56CCC9C23E9EC2B06FA594D42
3,222,014 UART: [art] SIG.S = 0D5D141638678C30ADE8ED7574500E1C1CC1DD016040756D3E710B23632A9582AE6473914C4DB0202C18E46871B1F977
3,246,016 UART: Caliptra RT
3,246,359 UART: [state] CFI Enabled
3,365,931 UART: [rt] RT listening for mailbox commands...
3,366,594 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,467 UART: [rt]cmd =0x46504c54, len=4
3,397,737 >>> mbox cmd response data (8 bytes)
3,398,056 UART: [rt] FIPS self test
3,398,384 UART: [kat] ++
3,398,536 UART: [kat] sha1
3,402,821 UART: Fatal Error: 0x90060002
3,404,360 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,365 >>> mbox cmd response: failed
3,404,365 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,370 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,054 UART: [state] WD Timer not started. Device not locked for debugging
88,287 UART: [kat] SHA2-256
891,837 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,941 UART: [kat] ++
896,093 UART: [kat] sha1
900,449 UART: [kat] SHA2-256
902,389 UART: [kat] SHA2-384
905,010 UART: [kat] SHA2-512-ACC
906,911 UART: [kat] ECC-384
916,758 UART: [kat] HMAC-384Kdf
921,256 UART: [kat] LMS
1,169,568 UART: [kat] --
1,170,635 UART: [cold-reset] ++
1,171,199 UART: [fht] FHT @ 0x50003400
1,173,713 UART: [idev] ++
1,173,881 UART: [idev] CDI.KEYID = 6
1,174,242 UART: [idev] SUBJECT.KEYID = 7
1,174,667 UART: [idev] UDS.KEYID = 0
1,175,013 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,706 UART: [idev] Erasing UDS.KEYID = 0
1,199,436 UART: [idev] Sha1 KeyId Algorithm
1,208,498 UART: [idev] --
1,209,555 UART: [ldev] ++
1,209,723 UART: [ldev] CDI.KEYID = 6
1,210,087 UART: [ldev] SUBJECT.KEYID = 5
1,210,514 UART: [ldev] AUTHORITY.KEYID = 7
1,210,977 UART: [ldev] FE.KEYID = 1
1,216,351 UART: [ldev] Erasing FE.KEYID = 1
1,242,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,913 UART: [ldev] --
1,282,344 UART: [fwproc] Wait for Commands...
1,282,925 UART: [fwproc] Recv command 0x46574c44
1,283,658 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,442 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,617 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,110 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,821 ready_for_fw is high
1,059,821 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,891 >>> mbox cmd response: success
2,754,940 UART:
2,754,956 UART: Running Caliptra FMC ...
2,755,364 UART:
2,755,507 UART: [state] CFI Enabled
2,766,261 UART: [fht] FMC Alias Private Key: 7
2,884,787 UART: [art] Extend RT PCRs Done
2,885,215 UART: [art] Lock RT PCRs Done
2,886,853 UART: [art] Populate DV Done
2,895,120 UART: [fht] FMC Alias Private Key: 7
2,896,272 UART: [art] Derive CDI
2,896,552 UART: [art] Store in slot 0x4
2,981,771 UART: [art] Derive Key Pair
2,982,131 UART: [art] Store priv key in slot 0x5
2,995,479 UART: [art] Derive Key Pair - Done
3,009,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,354 UART: [art] PUB.X = 69751176E5F9C2181378C690A847C0D58FA85B069F86C9B4A0312050BB22882B4A25249E0B5436F14533E735984794B3
3,033,102 UART: [art] PUB.Y = 4CCB22C3EE10CD928C5F55720C0C9DF8E9826BDBA86296A256F7DDAE8C545244B32C220389EBB17E945EAB3CE87EEBCA
3,040,065 UART: [art] SIG.R = FC071A3E78DE617C217F97CBC383DD10206A4A859B52EAA179148002085D8AA7E17C3F3210E47E9CC92CAC4FC0BE00AA
3,046,818 UART: [art] SIG.S = BCE178E232EB340EA4E39D8EED6623AA3A43F5B36DB3CF0A36EA3712D4465B3F2D75359935F59F0DD662DB1ECF5E99D0
3,070,669 UART: Caliptra RT
3,071,012 UART: [state] CFI Enabled
3,191,018 UART: [rt] RT listening for mailbox commands...
3,191,681 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,868 UART: [rt]cmd =0x46504c54, len=4
3,222,998 >>> mbox cmd response data (8 bytes)
3,223,145 UART: [rt] FIPS self test
3,223,473 UART: [kat] ++
3,223,625 UART: [kat] sha1
3,227,782 UART: Fatal Error: 0x90060002
3,229,321 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,326 >>> mbox cmd response: failed
3,229,326 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,149 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,001 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Unprovisioned
86,189 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
893,648 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,773 UART: [kat] ++
897,925 UART: [kat] sha1
902,051 UART: [kat] SHA2-256
903,991 UART: [kat] SHA2-384
906,728 UART: [kat] SHA2-512-ACC
908,629 UART: [kat] ECC-384
918,112 UART: [kat] HMAC-384Kdf
922,720 UART: [kat] LMS
1,171,048 UART: [kat] --
1,171,845 UART: [cold-reset] ++
1,172,229 UART: [fht] FHT @ 0x50003400
1,174,838 UART: [idev] ++
1,175,006 UART: [idev] CDI.KEYID = 6
1,175,366 UART: [idev] SUBJECT.KEYID = 7
1,175,790 UART: [idev] UDS.KEYID = 0
1,176,135 ready_for_fw is high
1,176,135 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,568 UART: [idev] Erasing UDS.KEYID = 0
1,200,205 UART: [idev] Sha1 KeyId Algorithm
1,208,589 UART: [idev] --
1,209,525 UART: [ldev] ++
1,209,693 UART: [ldev] CDI.KEYID = 6
1,210,056 UART: [ldev] SUBJECT.KEYID = 5
1,210,482 UART: [ldev] AUTHORITY.KEYID = 7
1,210,945 UART: [ldev] FE.KEYID = 1
1,216,393 UART: [ldev] Erasing FE.KEYID = 1
1,242,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,619 UART: [ldev] --
1,282,020 UART: [fwproc] Wait for Commands...
1,282,780 UART: [fwproc] Recv command 0x46574c44
1,283,508 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,182 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,352 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,861 >>> mbox cmd response: success
2,840,041 UART: [afmc] ++
2,840,209 UART: [afmc] CDI.KEYID = 6
2,840,571 UART: [afmc] SUBJECT.KEYID = 7
2,840,996 UART: [afmc] AUTHORITY.KEYID = 5
2,876,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,468 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,177 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,060 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,761 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,601 UART: [afmc] --
2,919,565 UART: [cold-reset] --
2,920,457 UART: [state] Locking Datavault
2,921,700 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,304 UART: [state] Locking ICCM
2,922,796 UART: [exit] Launching FMC @ 0x40000130
2,928,126 UART:
2,928,142 UART: Running Caliptra FMC ...
2,928,550 UART:
2,928,604 UART: [state] CFI Enabled
2,938,980 UART: [fht] FMC Alias Private Key: 7
3,058,822 UART: [art] Extend RT PCRs Done
3,059,250 UART: [art] Lock RT PCRs Done
3,060,830 UART: [art] Populate DV Done
3,069,033 UART: [fht] FMC Alias Private Key: 7
3,070,159 UART: [art] Derive CDI
3,070,439 UART: [art] Store in slot 0x4
3,156,306 UART: [art] Derive Key Pair
3,156,666 UART: [art] Store priv key in slot 0x5
3,169,898 UART: [art] Derive Key Pair - Done
3,185,097 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,195 UART: [art] PUB.X = 3371D0782079BBB4B99A1242B39A0BF38255B11BDEBB25E9A9A4678C363BC1B3A0C8B7BBB79C63E053EEDCD6CA30630F
3,207,975 UART: [art] PUB.Y = 07B8C0D7BAB9FA2729824C12D4694584236C72B10D9DC055EDE9F396ADD39AE81F4FA3665D0F6A378EFC8580BF2753B8
3,214,926 UART: [art] SIG.R = 5CA998C73E9416884153F649E873A8259740120709DD6CB77186DB0A86A5A1CAA8C4E01686165358CDAE3E1F847503DE
3,221,680 UART: [art] SIG.S = CD71D14D025AD521C786E2FB38C3179EBAFA0D0D44E6634768B6672F11F824A141521061092D86AF6D294AD9F1B5D279
3,245,438 UART: Caliptra RT
3,245,689 UART: [state] CFI Enabled
3,366,336 UART: [rt] RT listening for mailbox commands...
3,366,999 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,634 UART: [rt]cmd =0x46504c54, len=4
3,397,930 >>> mbox cmd response data (8 bytes)
3,398,065 UART: [rt] FIPS self test
3,398,393 UART: [kat] ++
3,398,545 UART: [kat] sha1
3,402,860 UART: Fatal Error: 0x90060002
3,404,399 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,404 >>> mbox cmd response: failed
3,404,404 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,729 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
893,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,681 UART: [kat] ++
897,833 UART: [kat] sha1
902,239 UART: [kat] SHA2-256
904,179 UART: [kat] SHA2-384
906,792 UART: [kat] SHA2-512-ACC
908,693 UART: [kat] ECC-384
918,172 UART: [kat] HMAC-384Kdf
922,548 UART: [kat] LMS
1,170,876 UART: [kat] --
1,171,857 UART: [cold-reset] ++
1,172,239 UART: [fht] FHT @ 0x50003400
1,174,872 UART: [idev] ++
1,175,040 UART: [idev] CDI.KEYID = 6
1,175,400 UART: [idev] SUBJECT.KEYID = 7
1,175,824 UART: [idev] UDS.KEYID = 0
1,176,169 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,140 UART: [idev] Erasing UDS.KEYID = 0
1,201,559 UART: [idev] Sha1 KeyId Algorithm
1,210,077 UART: [idev] --
1,211,055 UART: [ldev] ++
1,211,223 UART: [ldev] CDI.KEYID = 6
1,211,586 UART: [ldev] SUBJECT.KEYID = 5
1,212,012 UART: [ldev] AUTHORITY.KEYID = 7
1,212,475 UART: [ldev] FE.KEYID = 1
1,217,733 UART: [ldev] Erasing FE.KEYID = 1
1,244,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,937 UART: [ldev] --
1,283,334 UART: [fwproc] Wait for Commands...
1,283,906 UART: [fwproc] Recv command 0x46574c44
1,284,634 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,234 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,404 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,037 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,827 ready_for_fw is high
1,059,827 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,474 >>> mbox cmd response: success
2,753,631 UART:
2,753,647 UART: Running Caliptra FMC ...
2,754,055 UART:
2,754,109 UART: [state] CFI Enabled
2,764,775 UART: [fht] FMC Alias Private Key: 7
2,883,969 UART: [art] Extend RT PCRs Done
2,884,397 UART: [art] Lock RT PCRs Done
2,885,989 UART: [art] Populate DV Done
2,894,292 UART: [fht] FMC Alias Private Key: 7
2,895,300 UART: [art] Derive CDI
2,895,580 UART: [art] Store in slot 0x4
2,981,187 UART: [art] Derive Key Pair
2,981,547 UART: [art] Store priv key in slot 0x5
2,994,953 UART: [art] Derive Key Pair - Done
3,009,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,213 UART: [art] PUB.X = 3F9914C4827A7341699FD2E79059F6995F483AE898FA2ECD9CC88E88C1415081998907738E98661A2B64B1CF41DCF6D4
3,031,976 UART: [art] PUB.Y = D08E2AF006420DF65F7D91525EB828A9DAE9BC2FA3B61830DF854186BFDA11E72911361F75F19D73F7D5A28CF084B698
3,038,928 UART: [art] SIG.R = 86B6957EA950F9EEAE7A4AB0DC4F119097498AC5EDA47CC69D5BB76267B32B6AAAB3884565C0EA4927A82C9B59B331FB
3,045,714 UART: [art] SIG.S = F6AA74EC7D9BF891F63091A9279CE611866093C8BFE949833E5769E2BECDE24D7329B4CD204C98606948529EB236EE0D
3,069,911 UART: Caliptra RT
3,070,162 UART: [state] CFI Enabled
3,190,006 UART: [rt] RT listening for mailbox commands...
3,190,669 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,372 UART: [rt]cmd =0x46504c54, len=4
3,221,514 >>> mbox cmd response data (8 bytes)
3,221,703 UART: [rt] FIPS self test
3,222,031 UART: [kat] ++
3,222,183 UART: [kat] sha1
3,226,632 UART: Fatal Error: 0x90060002
3,228,171 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,228,176 >>> mbox cmd response: failed
3,228,176 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,228,181 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,567 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,784 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,098 UART: [kat] SHA2-256
904,038 UART: [kat] SHA2-384
906,763 UART: [kat] SHA2-512-ACC
908,664 UART: [kat] ECC-384
918,617 UART: [kat] HMAC-384Kdf
923,101 UART: [kat] LMS
1,171,429 UART: [kat] --
1,172,274 UART: [cold-reset] ++
1,172,840 UART: [fht] FHT @ 0x50003400
1,175,403 UART: [idev] ++
1,175,571 UART: [idev] CDI.KEYID = 6
1,175,931 UART: [idev] SUBJECT.KEYID = 7
1,176,355 UART: [idev] UDS.KEYID = 0
1,176,700 ready_for_fw is high
1,176,700 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,391 UART: [idev] Erasing UDS.KEYID = 0
1,201,298 UART: [idev] Sha1 KeyId Algorithm
1,209,802 UART: [idev] --
1,210,760 UART: [ldev] ++
1,210,928 UART: [ldev] CDI.KEYID = 6
1,211,291 UART: [ldev] SUBJECT.KEYID = 5
1,211,717 UART: [ldev] AUTHORITY.KEYID = 7
1,212,180 UART: [ldev] FE.KEYID = 1
1,217,284 UART: [ldev] Erasing FE.KEYID = 1
1,243,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,148 UART: [ldev] --
1,283,467 UART: [fwproc] Wait for Commands...
1,284,045 UART: [fwproc] Recv command 0x46574c44
1,284,773 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,577 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,747 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,254 >>> mbox cmd response: success
2,841,404 UART: [afmc] ++
2,841,572 UART: [afmc] CDI.KEYID = 6
2,841,934 UART: [afmc] SUBJECT.KEYID = 7
2,842,359 UART: [afmc] AUTHORITY.KEYID = 5
2,877,598 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,983 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,692 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,575 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,276 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,968 UART: [afmc] --
2,920,946 UART: [cold-reset] --
2,921,774 UART: [state] Locking Datavault
2,922,975 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,579 UART: [state] Locking ICCM
2,924,167 UART: [exit] Launching FMC @ 0x40000130
2,929,497 UART:
2,929,513 UART: Running Caliptra FMC ...
2,929,921 UART:
2,930,064 UART: [state] CFI Enabled
2,940,232 UART: [fht] FMC Alias Private Key: 7
3,060,062 UART: [art] Extend RT PCRs Done
3,060,490 UART: [art] Lock RT PCRs Done
3,061,920 UART: [art] Populate DV Done
3,070,009 UART: [fht] FMC Alias Private Key: 7
3,071,005 UART: [art] Derive CDI
3,071,285 UART: [art] Store in slot 0x4
3,156,936 UART: [art] Derive Key Pair
3,157,296 UART: [art] Store priv key in slot 0x5
3,169,972 UART: [art] Derive Key Pair - Done
3,184,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,624 UART: [art] PUB.X = B7A9AF14C9FF9FB0E9AA5DF1632B43A0330A1E1F19AE4EE664718034E72EBBBF465EFA821CFCCADF19DA6517B7C1EEDC
3,208,423 UART: [art] PUB.Y = 7176E506510BB4CDC573D0DF2B7DE9EDDA6F5796023FEE6590E0D780DE5062DABD38A893B64F3772CC28735BC45DCDF7
3,215,380 UART: [art] SIG.R = 3CAA4CB98949F606F228C6379CCF45CD5A8AAC952C9CA5DB27C435C9B25CE9850C170180F76A1732D97E36D57C20C361
3,222,149 UART: [art] SIG.S = D760E7BAC1524CFCE609622DF6DD9295D6A27A9E6F39861227A6054547C04E9250416A3E2CA4B5391E77C58B34EA9D02
3,245,538 UART: Caliptra RT
3,245,881 UART: [state] CFI Enabled
3,365,696 UART: [rt] RT listening for mailbox commands...
3,366,359 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,128 UART: [rt]cmd =0x46504c54, len=4
3,397,114 >>> mbox cmd response data (8 bytes)
3,397,377 UART: [rt] FIPS self test
3,397,705 UART: [kat] ++
3,397,857 UART: [kat] sha1
3,402,144 UART: Fatal Error: 0x90060002
3,403,683 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,688 >>> mbox cmd response: failed
3,403,688 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
893,529 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,654 UART: [kat] ++
897,806 UART: [kat] sha1
901,952 UART: [kat] SHA2-256
903,892 UART: [kat] SHA2-384
906,453 UART: [kat] SHA2-512-ACC
908,354 UART: [kat] ECC-384
918,319 UART: [kat] HMAC-384Kdf
923,037 UART: [kat] LMS
1,171,365 UART: [kat] --
1,172,188 UART: [cold-reset] ++
1,172,528 UART: [fht] FHT @ 0x50003400
1,175,303 UART: [idev] ++
1,175,471 UART: [idev] CDI.KEYID = 6
1,175,831 UART: [idev] SUBJECT.KEYID = 7
1,176,255 UART: [idev] UDS.KEYID = 0
1,176,600 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,131 UART: [idev] Erasing UDS.KEYID = 0
1,201,690 UART: [idev] Sha1 KeyId Algorithm
1,210,104 UART: [idev] --
1,211,014 UART: [ldev] ++
1,211,182 UART: [ldev] CDI.KEYID = 6
1,211,545 UART: [ldev] SUBJECT.KEYID = 5
1,211,971 UART: [ldev] AUTHORITY.KEYID = 7
1,212,434 UART: [ldev] FE.KEYID = 1
1,217,564 UART: [ldev] Erasing FE.KEYID = 1
1,243,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,026 UART: [ldev] --
1,283,367 UART: [fwproc] Wait for Commands...
1,284,097 UART: [fwproc] Recv command 0x46574c44
1,284,825 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,431 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,601 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,298 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,886 ready_for_fw is high
1,060,886 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,613 >>> mbox cmd response: success
2,753,972 UART:
2,753,988 UART: Running Caliptra FMC ...
2,754,396 UART:
2,754,539 UART: [state] CFI Enabled
2,765,555 UART: [fht] FMC Alias Private Key: 7
2,884,535 UART: [art] Extend RT PCRs Done
2,884,963 UART: [art] Lock RT PCRs Done
2,886,393 UART: [art] Populate DV Done
2,894,800 UART: [fht] FMC Alias Private Key: 7
2,895,906 UART: [art] Derive CDI
2,896,186 UART: [art] Store in slot 0x4
2,982,033 UART: [art] Derive Key Pair
2,982,393 UART: [art] Store priv key in slot 0x5
2,995,979 UART: [art] Derive Key Pair - Done
3,010,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,820 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,585 UART: [art] PUB.X = 7AB3CE86A369514D7134E83CC59C35EF9BA44156B7500B749CF8F8A29C70CD5FB517946D5C8CF6DE7AAA272B289FCC63
3,034,366 UART: [art] PUB.Y = C232978B26A2A3A647866964018BF0193040E6AED466E6C4D322B411270AEC97C0AE6C6A065D9A7851D97C65A7394FD6
3,041,305 UART: [art] SIG.R = EEA26FBEEB3E52BCAA0F9E82BB713F1BF5A9A4D9B51908F2A1C86D5839A3262FBC9B3FB1DC13337258091D284EC1D314
3,048,086 UART: [art] SIG.S = 0E7EF96656698C48AAD27E7EEA404B4D9AE175D1BB2FDAA48C44250E98F96B63D12E57469C17786CFE9824E2436F4F2B
3,071,628 UART: Caliptra RT
3,071,971 UART: [state] CFI Enabled
3,192,120 UART: [rt] RT listening for mailbox commands...
3,192,783 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,650 UART: [rt]cmd =0x46504c54, len=4
3,223,926 >>> mbox cmd response data (8 bytes)
3,224,111 UART: [rt] FIPS self test
3,224,439 UART: [kat] ++
3,224,591 UART: [kat] sha1
3,228,774 UART: Fatal Error: 0x90060002
3,230,313 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,318 >>> mbox cmd response: failed
3,230,318 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,720 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,535 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
2,523,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,673,613 >>> mbox cmd response: failed
2,674,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,823,090 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,438,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,273,481 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
2,508,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,657,937 >>> mbox cmd response: failed
2,658,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,807,223 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,433,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,289,402 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
2,864,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,014,518 >>> mbox cmd response: failed
3,015,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,163,938 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
20,176,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,890,847 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
2,867,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,017,736 >>> mbox cmd response: failed
3,018,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,167,161 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,177,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,895,010 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,515,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,665,531 >>> mbox cmd response: failed
2,666,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,814,951 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
3,442,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,282,107 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,525,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,088 >>> mbox cmd response: failed
2,675,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,824,512 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,433,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,271,110 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,473 writing to cptra_bootfsm_go
2,866,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,016,443 >>> mbox cmd response: failed
3,017,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,165,967 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
20,171,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,876,176 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
2,872,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,022,891 >>> mbox cmd response: failed
3,023,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,172,348 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
20,176,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,891,543 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,298 >>> mbox cmd response: failed
86,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,304 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,522 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,850 >>> mbox cmd response: failed
85,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,850 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,283 >>> mbox cmd response: failed
86,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,289 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,035 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,307 >>> mbox cmd response: failed
86,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,423 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,998 >>> mbox cmd response: failed
85,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,004 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,858 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,656 >>> mbox cmd response: failed
85,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,236 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,775 >>> mbox cmd response: failed
85,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,703 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,839 >>> mbox cmd response: failed
85,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,845 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,351 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,093 UART:
192,461 UART: Running Caliptra ROM ...
193,570 UART:
193,713 UART: [state] CFI Enabled
264,144 UART: [state] LifecycleState = Unprovisioned
266,080 UART: [state] DebugLocked = No
267,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,802 UART: [kat] SHA2-256
442,561 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,020 UART: [kat] ++
453,629 UART: [kat] sha1
466,214 UART: [kat] SHA2-256
468,942 UART: [kat] SHA2-384
474,578 UART: [kat] SHA2-512-ACC
476,950 UART: [kat] ECC-384
2,763,816 UART: [kat] HMAC-384Kdf
2,790,830 UART: [kat] LMS
3,981,177 UART: [kat] --
3,985,201 UART: [cold-reset] ++
3,986,429 UART: [fht] Storing FHT @ 0x50003400
3,996,924 UART: [idev] ++
3,997,491 UART: [idev] CDI.KEYID = 6
3,998,421 UART: [idev] SUBJECT.KEYID = 7
3,999,671 UART: [idev] UDS.KEYID = 0
4,000,711 ready_for_fw is high
4,000,965 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,151,160 UART: [idev] Erasing UDS.KEYID = 0
7,338,869 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,032 UART: [idev] --
7,365,022 UART: [ldev] ++
7,365,609 UART: [ldev] CDI.KEYID = 6
7,366,771 UART: [ldev] SUBJECT.KEYID = 5
7,367,917 UART: [ldev] AUTHORITY.KEYID = 7
7,369,175 UART: [ldev] FE.KEYID = 1
7,442,492 UART: [ldev] Erasing FE.KEYID = 1
10,775,724 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,088,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,102,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,117,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,132,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,150,945 UART: [ldev] --
13,156,167 UART: [fwproc] Waiting for Commands...
13,159,197 UART: [fwproc] Received command 0x46574c44
13,161,387 UART: [fwproc] Received Image of size 119428 bytes
17,284,588 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,356,997 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,430,174 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,762,265 >>> mbox cmd response: success
17,766,982 UART: [afmc] ++
17,767,580 UART: [afmc] CDI.KEYID = 6
17,768,498 UART: [afmc] SUBJECT.KEYID = 7
17,769,716 UART: [afmc] AUTHORITY.KEYID = 5
21,138,126 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,365 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,437,632 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,452,061 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,466,800 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,481,269 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,502,293 UART: [afmc] --
23,507,021 UART: [cold-reset] --
23,510,458 UART: [state] Locking Datavault
23,515,979 UART: [state] Locking PCR0, PCR1 and PCR31
23,517,681 UART: [state] Locking ICCM
23,520,479 UART: [exit] Launching FMC @ 0x40000130
23,528,875 UART:
23,529,115 UART: Running Caliptra FMC ...
23,530,218 UART:
23,530,380 UART: [state] CFI Enabled
23,595,729 UART: [fht] FMC Alias Private Key: 7
25,936,022 UART: [art] Extend RT PCRs Done
25,937,254 UART: [art] Lock RT PCRs Done
25,938,823 UART: [art] Populate DV Done
25,944,019 UART: [fht] FMC Alias Private Key: 7
25,945,582 UART: [art] Derive CDI
25,946,401 UART: [art] Store in slot 0x4
26,004,105 UART: [art] Derive Key Pair
26,005,150 UART: [art] Store priv key in slot 0x5
29,299,103 UART: [art] Derive Key Pair - Done
29,312,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,601,730 UART: [art] Erasing AUTHORITY.KEYID = 7
31,603,236 UART: [art] PUB.X = 1E618A445A0DADEEEAF2B8625194C6EA63299B149A00CA56C636677AC2619E0958D5BFFC2B1080842E5BF9ED6C7B5538
31,610,486 UART: [art] PUB.Y = FABDA34D59755577EB6B634CEEA6C54803554F9F9A4D9CABCF1256C94B67E4D9D9A7DFA21F2344CB457A3F1F0CDA50F5
31,617,773 UART: [art] SIG.R = 53C41DB6D53102009A709A1373EE42C085310A0574EF91468D5C18C6429CEA43369AD9B96A48C23B1270E429C041F1A2
31,625,112 UART: [art] SIG.S = 34442D52BBFBF77E316005130932E71536C66C1400DC6CEEF6F69EF78ECA9C9A77451C05C4AC0A6BE470BB2984F0702E
32,930,464 UART: Caliptra RT
32,931,181 UART: [state] CFI Enabled
33,120,881 UART: [rt] RT listening for mailbox commands...
33,122,737 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,152,049 UART: [rt]cmd =0x46504c54, len=4
33,153,629 >>> mbox cmd response data (8 bytes)
33,154,410 UART: [rt] FIPS self test
33,155,362 UART: [kat] ++
33,155,813 UART: [kat] sha1
33,160,144 UART: [kat] SHA2-256
33,160,893 UART: Fatal Error: 0x90010001
33,196,050 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,346,016 >>> mbox cmd response: failed
33,346,684 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,496,544 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,022 UART:
190,312 UART: Running Caliptra ROM ...
191,340 UART:
191,479 UART: [state] CFI Enabled
250,828 UART: [state] LifecycleState = Unprovisioned
252,752 UART: [state] DebugLocked = No
254,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
259,828 UART: [kat] SHA2-256
429,537 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
440,052 UART: [kat] ++
440,583 UART: [kat] sha1
452,654 UART: [kat] SHA2-256
455,346 UART: [kat] SHA2-384
461,119 UART: [kat] SHA2-512-ACC
463,513 UART: [kat] ECC-384
2,754,875 UART: [kat] HMAC-384Kdf
2,786,282 UART: [kat] LMS
3,976,594 UART: [kat] --
3,980,976 UART: [cold-reset] ++
3,983,396 UART: [fht] Storing FHT @ 0x50003400
3,994,629 UART: [idev] ++
3,995,208 UART: [idev] CDI.KEYID = 6
3,996,173 UART: [idev] SUBJECT.KEYID = 7
3,997,389 UART: [idev] UDS.KEYID = 0
3,999,024 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,149,144 UART: [idev] Erasing UDS.KEYID = 0
7,332,403 UART: [idev] Using Sha1 for KeyId Algorithm
7,354,686 UART: [idev] --
7,359,339 UART: [ldev] ++
7,359,973 UART: [ldev] CDI.KEYID = 6
7,360,865 UART: [ldev] SUBJECT.KEYID = 5
7,362,025 UART: [ldev] AUTHORITY.KEYID = 7
7,363,412 UART: [ldev] FE.KEYID = 1
7,397,887 UART: [ldev] Erasing FE.KEYID = 1
10,730,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,023,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,067,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,085,968 UART: [ldev] --
13,089,934 UART: [fwproc] Waiting for Commands...
13,092,034 UART: [fwproc] Received command 0x46574c44
13,094,266 UART: [fwproc] Received Image of size 119428 bytes
17,215,778 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,291,854 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,365,010 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,696,380 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
3,802,834 ready_for_fw is high
3,803,374 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,004,853 >>> mbox cmd response: success
23,694,546 UART:
23,694,969 UART: Running Caliptra FMC ...
23,696,103 UART:
23,696,284 UART: [state] CFI Enabled
23,759,218 UART: [fht] FMC Alias Private Key: 7
26,099,212 UART: [art] Extend RT PCRs Done
26,100,449 UART: [art] Lock RT PCRs Done
26,102,215 UART: [art] Populate DV Done
26,107,580 UART: [fht] FMC Alias Private Key: 7
26,109,140 UART: [art] Derive CDI
26,109,911 UART: [art] Store in slot 0x4
26,168,020 UART: [art] Derive Key Pair
26,169,067 UART: [art] Store priv key in slot 0x5
29,462,151 UART: [art] Derive Key Pair - Done
29,475,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,763,961 UART: [art] Erasing AUTHORITY.KEYID = 7
31,765,476 UART: [art] PUB.X = 12B4A7F7078C63C46434AE9FFCC5BCFF57179AC5E81CCC534607482689338BA8AB10405C48B658C7E1EA3F69AA8B1F18
31,772,800 UART: [art] PUB.Y = 304D7819789198B5CBF9974AFE3A70B58A6368C1FF5C433D563CED380C270AD32908C2083CE873FE0B6C7B3114185FFB
31,780,029 UART: [art] SIG.R = 6766177D367E7166B72887AAA4307AF6CAB41B21B3D161AC249CBDE857B8342805BFD36C418FB0E3CD778304478C8D8B
31,787,451 UART: [art] SIG.S = D0F607AF98FE94296ABAF311A693E7DD5FF4A06242273F009923AF8EC281B9B93D70E6186CA538A85CF05FA3404468FA
33,092,565 UART: Caliptra RT
33,093,270 UART: [state] CFI Enabled
33,271,999 UART: [rt] RT listening for mailbox commands...
33,273,884 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,303,847 UART: [rt]cmd =0x46504c54, len=4
33,305,535 >>> mbox cmd response data (8 bytes)
33,306,543 UART: [rt] FIPS self test
33,307,496 UART: [kat] ++
33,307,943 UART: [kat] sha1
33,312,183 UART: [kat] SHA2-256
33,312,921 UART: Fatal Error: 0x90010001
33,348,049 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,498,082 >>> mbox cmd response: failed
33,498,723 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,648,672 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,770,076 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,951,089 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,626 UART:
192,988 UART: Running Caliptra ROM ...
194,169 UART:
603,967 UART: [state] CFI Enabled
620,686 UART: [state] LifecycleState = Unprovisioned
622,572 UART: [state] DebugLocked = No
625,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,401 UART: [kat] SHA2-256
800,184 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,733 UART: [kat] ++
811,226 UART: [kat] sha1
821,187 UART: [kat] SHA2-256
823,917 UART: [kat] SHA2-384
831,263 UART: [kat] SHA2-512-ACC
833,639 UART: [kat] ECC-384
3,119,768 UART: [kat] HMAC-384Kdf
3,131,577 UART: [kat] LMS
4,321,738 UART: [kat] --
4,325,775 UART: [cold-reset] ++
4,327,717 UART: [fht] Storing FHT @ 0x50003400
4,338,702 UART: [idev] ++
4,339,273 UART: [idev] CDI.KEYID = 6
4,340,234 UART: [idev] SUBJECT.KEYID = 7
4,341,492 UART: [idev] UDS.KEYID = 0
4,342,552 ready_for_fw is high
4,342,788 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,492,767 UART: [idev] Erasing UDS.KEYID = 0
7,627,735 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,903 UART: [idev] --
7,653,716 UART: [ldev] ++
7,654,287 UART: [ldev] CDI.KEYID = 6
7,655,234 UART: [ldev] SUBJECT.KEYID = 5
7,656,451 UART: [ldev] AUTHORITY.KEYID = 7
7,657,700 UART: [ldev] FE.KEYID = 1
7,670,216 UART: [ldev] Erasing FE.KEYID = 1
10,958,630 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,440 UART: [ldev] --
13,321,360 UART: [fwproc] Waiting for Commands...
13,324,441 UART: [fwproc] Received command 0x46574c44
13,326,635 UART: [fwproc] Received Image of size 119428 bytes
17,436,250 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,514,306 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,587,516 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,919,498 >>> mbox cmd response: success
17,924,318 UART: [afmc] ++
17,924,908 UART: [afmc] CDI.KEYID = 6
17,925,884 UART: [afmc] SUBJECT.KEYID = 7
17,927,103 UART: [afmc] AUTHORITY.KEYID = 5
21,241,984 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,535,127 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,537,444 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,551,838 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,566,586 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,580,983 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,601,604 UART: [afmc] --
23,605,859 UART: [cold-reset] --
23,608,483 UART: [state] Locking Datavault
23,611,899 UART: [state] Locking PCR0, PCR1 and PCR31
23,613,657 UART: [state] Locking ICCM
23,615,866 UART: [exit] Launching FMC @ 0x40000130
23,624,264 UART:
23,624,507 UART: Running Caliptra FMC ...
23,625,616 UART:
23,625,787 UART: [state] CFI Enabled
23,633,653 UART: [fht] FMC Alias Private Key: 7
25,973,396 UART: [art] Extend RT PCRs Done
25,974,626 UART: [art] Lock RT PCRs Done
25,976,147 UART: [art] Populate DV Done
25,981,299 UART: [fht] FMC Alias Private Key: 7
25,982,967 UART: [art] Derive CDI
25,983,795 UART: [art] Store in slot 0x4
26,026,503 UART: [art] Derive Key Pair
26,027,553 UART: [art] Store priv key in slot 0x5
29,269,442 UART: [art] Derive Key Pair - Done
29,282,439 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,563,022 UART: [art] Erasing AUTHORITY.KEYID = 7
31,564,539 UART: [art] PUB.X = B17E4C79DE340085017449FBA06DAF37220631E802D937AD2957E15C20E077B803EAB3B3C9F940059C07DA3AD49F4E32
31,571,749 UART: [art] PUB.Y = 5685F0041EA9CF20304726F0EAEFBDAF2145142902D25B170175DD286C4EC05360F7C4785A7A999F1134A66EAD580EE4
31,578,997 UART: [art] SIG.R = 4A7F39CBA8A68192538BE5833C8538E76489DBD767018FF5CF77E0690CBF247D8E506AB2E2BAE7F63CD82AF990310A88
31,586,404 UART: [art] SIG.S = C3F4141A09DE4E105B33DE9CD32B12176FEFA2BC03AC1AD7F0A22929AE4E08EB72A7168E75DC5D38FBC3F3FCFDDA2D93
32,892,109 UART: Caliptra RT
32,892,810 UART: [state] CFI Enabled
33,026,375 UART: [rt] RT listening for mailbox commands...
33,028,250 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,058,120 UART: [rt]cmd =0x46504c54, len=4
33,059,709 >>> mbox cmd response data (8 bytes)
33,060,851 UART: [rt] FIPS self test
33,061,808 UART: [kat] ++
33,062,269 UART: [kat] sha1
33,066,434 UART: [kat] SHA2-256
33,067,244 UART: Fatal Error: 0x90010001
33,102,350 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,252,312 >>> mbox cmd response: failed
33,252,984 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,402,924 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
190,153 UART:
190,441 UART: Running Caliptra ROM ...
191,555 UART:
7,130,490 UART: [state] CFI Enabled
7,144,139 UART: [state] LifecycleState = Unprovisioned
7,146,059 UART: [state] DebugLocked = No
7,148,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,154,121 UART: [kat] SHA2-256
7,323,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,334,369 UART: [kat] ++
7,334,919 UART: [kat] sha1
7,347,332 UART: [kat] SHA2-256
7,350,084 UART: [kat] SHA2-384
7,354,671 UART: [kat] SHA2-512-ACC
7,357,023 UART: [kat] ECC-384
9,640,721 UART: [kat] HMAC-384Kdf
9,652,357 UART: [kat] LMS
10,842,467 UART: [kat] --
10,846,372 UART: [cold-reset] ++
10,848,704 UART: [fht] Storing FHT @ 0x50003400
10,859,295 UART: [idev] ++
10,859,869 UART: [idev] CDI.KEYID = 6
10,860,888 UART: [idev] SUBJECT.KEYID = 7
10,861,998 UART: [idev] UDS.KEYID = 0
10,863,681 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,013,572 UART: [idev] Erasing UDS.KEYID = 0
14,147,788 UART: [idev] Using Sha1 for KeyId Algorithm
14,170,282 UART: [idev] --
14,175,035 UART: [ldev] ++
14,175,615 UART: [ldev] CDI.KEYID = 6
14,176,637 UART: [ldev] SUBJECT.KEYID = 5
14,177,804 UART: [ldev] AUTHORITY.KEYID = 7
14,179,048 UART: [ldev] FE.KEYID = 1
14,188,787 UART: [ldev] Erasing FE.KEYID = 1
17,478,273 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,766,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,781,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,796,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,810,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,830,132 UART: [ldev] --
19,834,212 UART: [fwproc] Waiting for Commands...
19,836,315 UART: [fwproc] Received command 0x46574c44
19,838,561 UART: [fwproc] Received Image of size 119428 bytes
23,958,126 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,034,589 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,107,786 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,439,038 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
4,129,958 ready_for_fw is high
4,130,433 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,183,641 >>> mbox cmd response: success
23,826,387 UART:
23,826,876 UART: Running Caliptra FMC ...
23,828,010 UART:
23,828,187 UART: [state] CFI Enabled
23,835,856 UART: [fht] FMC Alias Private Key: 7
26,175,823 UART: [art] Extend RT PCRs Done
26,177,072 UART: [art] Lock RT PCRs Done
26,178,902 UART: [art] Populate DV Done
26,184,384 UART: [fht] FMC Alias Private Key: 7
26,185,884 UART: [art] Derive CDI
26,186,625 UART: [art] Store in slot 0x4
26,229,454 UART: [art] Derive Key Pair
26,230,507 UART: [art] Store priv key in slot 0x5
29,472,448 UART: [art] Derive Key Pair - Done
29,485,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,766,000 UART: [art] Erasing AUTHORITY.KEYID = 7
31,767,520 UART: [art] PUB.X = 3C457B64A83741A28DE8B4E5684078CAE3C8D87B95DAE9D6FB1BB2897824D5C0DD9EF22C0778630DDBD1F371F6AA4DC6
31,774,795 UART: [art] PUB.Y = 6114199715BC2A41FA2B02E80D5C747897E035B9ACD98D8A018A4B44E060978FE54B41924B1D24EFA9514CB8A18492A8
31,782,095 UART: [art] SIG.R = 8F2351B112DC7DC0F7351B7F497870D50F1CB3956CE10DD22D60983B6B517517E435E3787182FC1793B8D4F31AAF4B5A
31,789,447 UART: [art] SIG.S = 2410446CC7CA2F9A46E71AC8084AB5CF58435721068CA5EAEB9769F32F977EAFCAA8694890F9411F544BB01EE1E91DED
33,094,576 UART: Caliptra RT
33,095,316 UART: [state] CFI Enabled
33,228,978 UART: [rt] RT listening for mailbox commands...
33,230,845 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,260,510 UART: [rt]cmd =0x46504c54, len=4
33,262,209 >>> mbox cmd response data (8 bytes)
33,263,061 UART: [rt] FIPS self test
33,264,016 UART: [kat] ++
33,264,475 UART: [kat] sha1
33,268,868 UART: [kat] SHA2-256
33,269,659 UART: Fatal Error: 0x90010001
33,304,845 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,454,806 >>> mbox cmd response: failed
33,455,491 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,605,436 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
10,457,337 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,502,172 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
192,188 UART:
192,556 UART: Running Caliptra ROM ...
193,792 UART:
193,948 UART: [state] CFI Enabled
259,930 UART: [state] LifecycleState = Unprovisioned
261,846 UART: [state] DebugLocked = No
264,384 UART: [state] WD Timer not started. Device not locked for debugging
268,581 UART: [kat] SHA2-256
448,238 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,009 UART: [kat] ++
459,466 UART: [kat] sha1
470,842 UART: [kat] SHA2-256
473,576 UART: [kat] SHA2-384
478,934 UART: [kat] SHA2-512-ACC
481,308 UART: [kat] ECC-384
2,925,964 UART: [kat] HMAC-384Kdf
2,949,899 UART: [kat] LMS
3,426,418 UART: [kat] --
3,429,850 UART: [cold-reset] ++
3,431,184 UART: [fht] FHT @ 0x50003400
3,443,168 UART: [idev] ++
3,443,747 UART: [idev] CDI.KEYID = 6
3,444,787 UART: [idev] SUBJECT.KEYID = 7
3,445,967 UART: [idev] UDS.KEYID = 0
3,446,912 ready_for_fw is high
3,447,126 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,597,672 UART: [idev] Erasing UDS.KEYID = 0
5,966,436 UART: [idev] Sha1 KeyId Algorithm
5,991,208 UART: [idev] --
5,997,399 UART: [ldev] ++
5,997,980 UART: [ldev] CDI.KEYID = 6
5,998,915 UART: [ldev] SUBJECT.KEYID = 5
6,000,154 UART: [ldev] AUTHORITY.KEYID = 7
6,001,399 UART: [ldev] FE.KEYID = 1
6,036,417 UART: [ldev] Erasing FE.KEYID = 1
8,544,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,297,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,313,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,231 UART: [ldev] --
10,356,147 UART: [fwproc] Wait for Commands...
10,359,003 UART: [fwproc] Recv command 0x46574c44
10,361,005 UART: [fwproc] Recv'd Img size: 119428 bytes
13,854,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,319 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,006,329 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,336,906 >>> mbox cmd response: success
14,341,735 UART: [afmc] ++
14,342,327 UART: [afmc] CDI.KEYID = 6
14,343,352 UART: [afmc] SUBJECT.KEYID = 7
14,344,518 UART: [afmc] AUTHORITY.KEYID = 5
16,874,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,723 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,614,520 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,630,558 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,646,150 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,670,900 UART: [afmc] --
18,674,338 UART: [cold-reset] --
18,677,658 UART: [state] Locking Datavault
18,683,665 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,416 UART: [state] Locking ICCM
18,687,417 UART: [exit] Launching FMC @ 0x40000130
18,695,848 UART:
18,696,152 UART: Running Caliptra FMC ...
18,697,277 UART:
18,697,441 UART: [state] CFI Enabled
18,753,540 UART: [fht] FMC Alias Private Key: 7
20,520,391 UART: [art] Extend RT PCRs Done
20,521,612 UART: [art] Lock RT PCRs Done
20,523,132 UART: [art] Populate DV Done
20,528,548 UART: [fht] FMC Alias Private Key: 7
20,530,310 UART: [art] Derive CDI
20,531,134 UART: [art] Store in slot 0x4
20,585,516 UART: [art] Derive Key Pair
20,586,537 UART: [art] Store priv key in slot 0x5
23,049,532 UART: [art] Derive Key Pair - Done
23,062,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,775,635 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,160 UART: [art] PUB.X = 575311ACFC1C378469F543A31B79A362C9678E67A00D6FB35583732D6F92012BC0AE61864145E2980D7BDEBC47F2872E
24,784,386 UART: [art] PUB.Y = B8FD8E7D09FB221CA88E8BF468B1BDA054A9B8C1BC1EF930BE88E4639D94B093D8C5F3B5F5EAC2552C22B145CA88EF4A
24,791,711 UART: [art] SIG.R = CFD721748378877A25CD1D46C48B0789CEBB91499168388F62DDD13DA2EBB023C00071B96AACBFB81B529E4D3376F045
24,799,080 UART: [art] SIG.S = EC9A661C22FC9B3B67BBA11857D0925E5CAD92E83747A50004CAB97839CA2A9DD2098BCA1FFA1C4A9F403D29C4FEE70A
25,777,781 UART: Caliptra RT
25,778,478 UART: [state] CFI Enabled
25,958,392 UART: [rt] RT listening for mailbox commands...
25,960,245 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,990,158 UART: [rt]cmd =0x46504c54, len=4
25,991,667 >>> mbox cmd response data (8 bytes)
25,992,692 UART: [rt] FIPS self test
25,993,644 UART: [kat] ++
25,994,100 UART: [kat] sha1
25,998,564 UART: [kat] SHA2-256
25,999,306 UART: Fatal Error: 0x90010001
26,034,436 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,184,475 >>> mbox cmd response: failed
26,185,129 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,335,074 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
189,990 UART:
190,294 UART: Running Caliptra ROM ...
191,334 UART:
191,477 UART: [state] CFI Enabled
251,925 UART: [state] LifecycleState = Unprovisioned
253,905 UART: [state] DebugLocked = No
256,290 UART: [state] WD Timer not started. Device not locked for debugging
260,836 UART: [kat] SHA2-256
440,456 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
451,275 UART: [kat] ++
451,728 UART: [kat] sha1
462,354 UART: [kat] SHA2-256
465,047 UART: [kat] SHA2-384
471,953 UART: [kat] SHA2-512-ACC
474,361 UART: [kat] ECC-384
2,932,547 UART: [kat] HMAC-384Kdf
2,958,177 UART: [kat] LMS
3,434,660 UART: [kat] --
3,440,550 UART: [cold-reset] ++
3,441,730 UART: [fht] FHT @ 0x50003400
3,452,169 UART: [idev] ++
3,452,741 UART: [idev] CDI.KEYID = 6
3,453,764 UART: [idev] SUBJECT.KEYID = 7
3,454,930 UART: [idev] UDS.KEYID = 0
3,456,447 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,606,543 UART: [idev] Erasing UDS.KEYID = 0
5,973,676 UART: [idev] Sha1 KeyId Algorithm
5,997,523 UART: [idev] --
6,003,897 UART: [ldev] ++
6,004,482 UART: [ldev] CDI.KEYID = 6
6,005,374 UART: [ldev] SUBJECT.KEYID = 5
6,006,590 UART: [ldev] AUTHORITY.KEYID = 7
6,007,831 UART: [ldev] FE.KEYID = 1
6,044,147 UART: [ldev] Erasing FE.KEYID = 1
8,551,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,285,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,301,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,317,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,333,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,355,350 UART: [ldev] --
10,361,681 UART: [fwproc] Wait for Commands...
10,364,013 UART: [fwproc] Recv command 0x46574c44
10,366,072 UART: [fwproc] Recv'd Img size: 119428 bytes
13,861,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,406 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,428 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,347,201 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,458,620 ready_for_fw is high
3,459,088 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,251,175 >>> mbox cmd response: success
18,545,454 UART:
18,545,850 UART: Running Caliptra FMC ...
18,546,967 UART:
18,547,127 UART: [state] CFI Enabled
18,614,172 UART: [fht] FMC Alias Private Key: 7
20,401,421 UART: [art] Extend RT PCRs Done
20,402,660 UART: [art] Lock RT PCRs Done
20,404,430 UART: [art] Populate DV Done
20,409,752 UART: [fht] FMC Alias Private Key: 7
20,411,419 UART: [art] Derive CDI
20,412,244 UART: [art] Store in slot 0x4
20,467,518 UART: [art] Derive Key Pair
20,468,572 UART: [art] Store priv key in slot 0x5
22,931,747 UART: [art] Derive Key Pair - Done
22,944,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,656,766 UART: [art] Erasing AUTHORITY.KEYID = 7
24,658,281 UART: [art] PUB.X = A5697035813977B26908644E9BFA8CB75472B2F8F5C0B0329C3121214A7D69976A184302FD41D2791512A2C6187BD271
24,665,497 UART: [art] PUB.Y = 3ADBE1AA72B3DB674C8D568DF8314BD6D0A3FDC993B25E54F032A8812CB4B6533A97CA56A1FBF8A3987CB241860AD911
24,672,799 UART: [art] SIG.R = A6F49140FCFAD69C7767EABD78BC1999B34ED034E294699660F47565FC51053DBDF03AF77F5D1871B423CFAF2A46B1FB
24,680,259 UART: [art] SIG.S = 3BDA6A83CCCD7130F0B24CCB42C8B5D8273BE463C36EB92CC0D02E89B56365CAD9C8B3139E8D7771719BCC0742C6A313
25,659,768 UART: Caliptra RT
25,660,469 UART: [state] CFI Enabled
25,840,442 UART: [rt] RT listening for mailbox commands...
25,842,292 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,872,094 UART: [rt]cmd =0x46504c54, len=4
25,873,787 >>> mbox cmd response data (8 bytes)
25,874,947 UART: [rt] FIPS self test
25,875,894 UART: [kat] ++
25,876,348 UART: [kat] sha1
25,880,937 UART: [kat] SHA2-256
25,881,744 UART: Fatal Error: 0x90010001
25,916,899 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,067,273 >>> mbox cmd response: failed
26,067,892 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,217,842 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
3,448,243 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,240,450 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,647 writing to cptra_bootfsm_go
192,785 UART:
193,154 UART: Running Caliptra ROM ...
194,373 UART:
603,970 UART: [state] CFI Enabled
617,648 UART: [state] LifecycleState = Unprovisioned
619,633 UART: [state] DebugLocked = No
621,259 UART: [state] WD Timer not started. Device not locked for debugging
625,136 UART: [kat] SHA2-256
804,760 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,555 UART: [kat] ++
816,053 UART: [kat] sha1
828,077 UART: [kat] SHA2-256
830,816 UART: [kat] SHA2-384
836,101 UART: [kat] SHA2-512-ACC
838,477 UART: [kat] ECC-384
3,281,681 UART: [kat] HMAC-384Kdf
3,294,564 UART: [kat] LMS
3,771,119 UART: [kat] --
3,774,625 UART: [cold-reset] ++
3,775,998 UART: [fht] FHT @ 0x50003400
3,786,202 UART: [idev] ++
3,786,874 UART: [idev] CDI.KEYID = 6
3,787,784 UART: [idev] SUBJECT.KEYID = 7
3,789,046 UART: [idev] UDS.KEYID = 0
3,790,035 ready_for_fw is high
3,790,243 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,940,223 UART: [idev] Erasing UDS.KEYID = 0
6,263,826 UART: [idev] Sha1 KeyId Algorithm
6,287,769 UART: [idev] --
6,291,547 UART: [ldev] ++
6,292,119 UART: [ldev] CDI.KEYID = 6
6,293,032 UART: [ldev] SUBJECT.KEYID = 5
6,294,253 UART: [ldev] AUTHORITY.KEYID = 7
6,295,498 UART: [ldev] FE.KEYID = 1
6,308,748 UART: [ldev] Erasing FE.KEYID = 1
8,783,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,750 UART: [ldev] --
10,579,512 UART: [fwproc] Wait for Commands...
10,581,507 UART: [fwproc] Recv command 0x46574c44
10,583,499 UART: [fwproc] Recv'd Img size: 119428 bytes
14,077,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,863 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,883 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,562,494 >>> mbox cmd response: success
14,566,038 UART: [afmc] ++
14,566,632 UART: [afmc] CDI.KEYID = 6
14,567,615 UART: [afmc] SUBJECT.KEYID = 7
14,568,836 UART: [afmc] AUTHORITY.KEYID = 5
17,077,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,800,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,803,095 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,818,894 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,834,999 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,850,555 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,875,741 UART: [afmc] --
18,879,728 UART: [cold-reset] --
18,883,107 UART: [state] Locking Datavault
18,888,301 UART: [state] Locking PCR0, PCR1 and PCR31
18,890,055 UART: [state] Locking ICCM
18,891,918 UART: [exit] Launching FMC @ 0x40000130
18,900,310 UART:
18,900,556 UART: Running Caliptra FMC ...
18,901,584 UART:
18,901,736 UART: [state] CFI Enabled
18,909,891 UART: [fht] FMC Alias Private Key: 7
20,676,279 UART: [art] Extend RT PCRs Done
20,677,511 UART: [art] Lock RT PCRs Done
20,679,254 UART: [art] Populate DV Done
20,684,615 UART: [fht] FMC Alias Private Key: 7
20,686,225 UART: [art] Derive CDI
20,686,975 UART: [art] Store in slot 0x4
20,729,825 UART: [art] Derive Key Pair
20,730,871 UART: [art] Store priv key in slot 0x5
23,157,190 UART: [art] Derive Key Pair - Done
23,170,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,876,565 UART: [art] Erasing AUTHORITY.KEYID = 7
24,878,077 UART: [art] PUB.X = CEA7CEB224D4B20AEF7768B8AF4F0C468D0ACA1D161AFB73F597B8FE2C91A2182412F41E2ADCC3219169CAFFBD9017BE
24,885,397 UART: [art] PUB.Y = E84E5226ADDC3E4EAE54278CC1252DAC8C04E65F4B2EF34B08E5307DC4EEADC4FD063C69867966513B4073C72952FFF0
24,892,697 UART: [art] SIG.R = 4B68F07DF3CCF960D5417862D07F2E267D805DB447C704F3DDE8823D77D5B23B6BC3F66FA92ED0996367F7E75825E110
24,900,058 UART: [art] SIG.S = 25A879CA39F7C33E2BA52FE2183773ED15F6BD2728E4E538A0B31B68BFEFC8D3DD51C3D1F6B6BAB3D7B70982728086C2
25,879,304 UART: Caliptra RT
25,880,030 UART: [state] CFI Enabled
26,012,867 UART: [rt] RT listening for mailbox commands...
26,014,723 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,044,579 UART: [rt]cmd =0x46504c54, len=4
26,045,950 >>> mbox cmd response data (8 bytes)
26,046,796 UART: [rt] FIPS self test
26,047,660 UART: [kat] ++
26,048,113 UART: [kat] sha1
26,052,360 UART: [kat] SHA2-256
26,053,117 UART: Fatal Error: 0x90010001
26,088,421 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,238,848 >>> mbox cmd response: failed
26,239,531 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,389,474 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
190,092 UART:
190,392 UART: Running Caliptra ROM ...
191,452 UART:
14,134,416 UART: [state] CFI Enabled
14,147,868 UART: [state] LifecycleState = Unprovisioned
14,149,786 UART: [state] DebugLocked = No
14,151,779 UART: [state] WD Timer not started. Device not locked for debugging
14,155,171 UART: [kat] SHA2-256
14,334,850 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,345,607 UART: [kat] ++
14,346,075 UART: [kat] sha1
14,357,129 UART: [kat] SHA2-256
14,359,829 UART: [kat] SHA2-384
14,365,495 UART: [kat] SHA2-512-ACC
14,367,908 UART: [kat] ECC-384
16,812,551 UART: [kat] HMAC-384Kdf
16,825,450 UART: [kat] LMS
17,302,007 UART: [kat] --
17,307,078 UART: [cold-reset] ++
17,308,361 UART: [fht] FHT @ 0x50003400
17,321,283 UART: [idev] ++
17,321,855 UART: [idev] CDI.KEYID = 6
17,322,795 UART: [idev] SUBJECT.KEYID = 7
17,324,070 UART: [idev] UDS.KEYID = 0
17,325,581 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,475,464 UART: [idev] Erasing UDS.KEYID = 0
19,801,980 UART: [idev] Sha1 KeyId Algorithm
19,824,448 UART: [idev] --
19,828,716 UART: [ldev] ++
19,829,341 UART: [ldev] CDI.KEYID = 6
19,830,251 UART: [ldev] SUBJECT.KEYID = 5
19,831,567 UART: [ldev] AUTHORITY.KEYID = 7
19,832,701 UART: [ldev] FE.KEYID = 1
19,841,759 UART: [ldev] Erasing FE.KEYID = 1
22,318,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,036,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,051,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,067,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,083,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,105,958 UART: [ldev] --
24,110,523 UART: [fwproc] Wait for Commands...
24,113,165 UART: [fwproc] Recv command 0x46574c44
24,115,165 UART: [fwproc] Recv'd Img size: 119428 bytes
27,610,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,686,229 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,759,283 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,091,288 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,784,850 ready_for_fw is high
3,785,253 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,468,705 >>> mbox cmd response: success
18,714,842 UART:
18,715,264 UART: Running Caliptra FMC ...
18,716,564 UART:
18,716,781 UART: [state] CFI Enabled
18,724,198 UART: [fht] FMC Alias Private Key: 7
20,489,671 UART: [art] Extend RT PCRs Done
20,490,904 UART: [art] Lock RT PCRs Done
20,492,269 UART: [art] Populate DV Done
20,497,601 UART: [fht] FMC Alias Private Key: 7
20,499,151 UART: [art] Derive CDI
20,499,919 UART: [art] Store in slot 0x4
20,542,942 UART: [art] Derive Key Pair
20,543,951 UART: [art] Store priv key in slot 0x5
22,970,851 UART: [art] Derive Key Pair - Done
22,983,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,689,887 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,402 UART: [art] PUB.X = D253B965996FC49788B5695735A98A9904BA2E98E6DB3FE014E2F861A855FDA1434EF30EC04590AF0D1A62937CF31411
24,698,625 UART: [art] PUB.Y = A97292F6B46FB3E45C6508D13414425D52BAB58012FAFF982244FCF8601327D2AA6C2100B551BD719AB37DD595473D29
24,705,866 UART: [art] SIG.R = ED2BBEA69D7AF1187D4C481BC6CEE90FA9CA766058FAEA5B7E6158B55A1CB6C31EC6386AA7F7A8A764519C7D22C3F13E
24,713,268 UART: [art] SIG.S = C567B01944FB4DCABD504E2B36DE1DB1423AC22AE79C94572D301F40B5A4B9F2651069F36532BD0D052179D4BDEEA1EA
25,692,557 UART: Caliptra RT
25,693,281 UART: [state] CFI Enabled
25,825,198 UART: [rt] RT listening for mailbox commands...
25,827,049 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,856,621 UART: [rt]cmd =0x46504c54, len=4
25,858,183 >>> mbox cmd response data (8 bytes)
25,859,285 UART: [rt] FIPS self test
25,860,238 UART: [kat] ++
25,860,697 UART: [kat] sha1
25,865,212 UART: [kat] SHA2-256
25,866,065 UART: Fatal Error: 0x90010001
25,901,273 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,051,280 >>> mbox cmd response: failed
26,051,901 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,201,808 >>> mbox cmd response: failed
Initializing fuses
927 writing to cptra_bootfsm_go
17,509,618 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,182,777 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,080 UART:
192,452 UART: Running Caliptra ROM ...
193,553 UART:
193,701 UART: [state] CFI Enabled
264,220 UART: [state] LifecycleState = Unprovisioned
266,638 UART: [state] DebugLocked = No
268,443 UART: [state] WD Timer not started. Device not locked for debugging
272,997 UART: [kat] SHA2-256
462,865 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,659 UART: [kat] ++
474,132 UART: [kat] sha1
486,439 UART: [kat] SHA2-256
489,459 UART: [kat] SHA2-384
495,319 UART: [kat] SHA2-512-ACC
497,910 UART: [kat] ECC-384
2,949,329 UART: [kat] HMAC-384Kdf
2,973,230 UART: [kat] LMS
3,505,008 UART: [kat] --
3,509,529 UART: [cold-reset] ++
3,510,620 UART: [fht] FHT @ 0x50003400
3,521,323 UART: [idev] ++
3,521,972 UART: [idev] CDI.KEYID = 6
3,523,014 UART: [idev] SUBJECT.KEYID = 7
3,524,130 UART: [idev] UDS.KEYID = 0
3,525,088 ready_for_fw is high
3,525,318 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,675,534 UART: [idev] Erasing UDS.KEYID = 0
6,031,056 UART: [idev] Sha1 KeyId Algorithm
6,053,033 UART: [idev] --
6,057,939 UART: [ldev] ++
6,058,641 UART: [ldev] CDI.KEYID = 6
6,059,562 UART: [ldev] SUBJECT.KEYID = 5
6,060,731 UART: [ldev] AUTHORITY.KEYID = 7
6,061,973 UART: [ldev] FE.KEYID = 1
6,102,377 UART: [ldev] Erasing FE.KEYID = 1
8,607,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,683 UART: [ldev] --
10,417,167 UART: [fwproc] Wait for Commands...
10,419,506 UART: [fwproc] Recv command 0x46574c44
10,421,781 UART: [fwproc] Recv'd Img size: 119428 bytes
13,923,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,003,290 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,882 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,692,705 >>> mbox cmd response: success
14,697,631 UART: [afmc] ++
14,698,345 UART: [afmc] CDI.KEYID = 6
14,699,590 UART: [afmc] SUBJECT.KEYID = 7
14,701,027 UART: [afmc] AUTHORITY.KEYID = 5
17,235,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,328 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,416 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,552 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,503 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,535 UART: [afmc] --
19,033,791 UART: [cold-reset] --
19,037,498 UART: [state] Locking Datavault
19,043,130 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,323 UART: [state] Locking ICCM
19,046,991 UART: [exit] Launching FMC @ 0x40000130
19,055,667 UART:
19,055,909 UART: Running Caliptra FMC ...
19,057,015 UART:
19,057,180 UART: [state] CFI Enabled
19,115,930 UART: [fht] FMC Alias Private Key: 7
20,882,228 UART: [art] Extend RT PCRs Done
20,883,456 UART: [art] Lock RT PCRs Done
20,884,930 UART: [art] Populate DV Done
20,890,130 UART: [fht] FMC Alias Private Key: 7
20,891,616 UART: [art] Derive CDI
20,892,399 UART: [art] Store in slot 0x4
20,948,585 UART: [art] Derive Key Pair
20,949,635 UART: [art] Store priv key in slot 0x5
23,412,100 UART: [art] Derive Key Pair - Done
23,424,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,374 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,888 UART: [art] PUB.X = CBD79A7DEA7415CFEC93E9D81D94197D3945FBEF4EF55DB3DEE7CDEDFC247A1845FC4E5F5201028F798FFDADF9393AF8
25,146,154 UART: [art] PUB.Y = FDD2CED803B6E321394277B61BD1AB1AABFFD4E1E149C5BABBAF08B115780750B5D44755D468E6094A0E7C33C8084757
25,153,403 UART: [art] SIG.R = EFDC49EC63D7024B76113D74DF5BF16FB5CE88D1D25150B12BE5A53001A7705EB7BE489077E0BDF402CF4B26C20A708A
25,160,837 UART: [art] SIG.S = A154EA3B234030A803953899EAC3EA5EFEEC177AA74B9CA5E8F182B4E4DFA300470FB1AD68D489BCF6ABC577A42486BC
26,139,845 UART: Caliptra RT
26,140,563 UART: [state] CFI Enabled
26,321,032 UART: [rt] RT listening for mailbox commands...
26,322,897 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,352,667 UART: [rt]cmd =0x46504c54, len=4
26,354,139 >>> mbox cmd response data (8 bytes)
26,355,214 UART: [rt] FIPS self test
26,356,199 UART: [kat] ++
26,356,666 UART: [kat] sha1
26,361,024 UART: [kat] SHA2-256
26,361,779 UART: Fatal Error: 0x90010001
26,396,935 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,546,941 >>> mbox cmd response: failed
26,547,512 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,697,401 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,087 UART:
190,381 UART: Running Caliptra ROM ...
191,494 UART:
191,650 UART: [state] CFI Enabled
250,141 UART: [state] LifecycleState = Unprovisioned
252,572 UART: [state] DebugLocked = No
254,169 UART: [state] WD Timer not started. Device not locked for debugging
258,518 UART: [kat] SHA2-256
448,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
459,165 UART: [kat] ++
459,650 UART: [kat] sha1
472,262 UART: [kat] SHA2-256
475,277 UART: [kat] SHA2-384
482,122 UART: [kat] SHA2-512-ACC
484,695 UART: [kat] ECC-384
2,938,111 UART: [kat] HMAC-384Kdf
2,960,875 UART: [kat] LMS
3,492,682 UART: [kat] --
3,496,156 UART: [cold-reset] ++
3,498,755 UART: [fht] FHT @ 0x50003400
3,510,646 UART: [idev] ++
3,511,356 UART: [idev] CDI.KEYID = 6
3,512,248 UART: [idev] SUBJECT.KEYID = 7
3,513,467 UART: [idev] UDS.KEYID = 0
3,514,968 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,665,061 UART: [idev] Erasing UDS.KEYID = 0
6,017,241 UART: [idev] Sha1 KeyId Algorithm
6,040,154 UART: [idev] --
6,044,316 UART: [ldev] ++
6,045,006 UART: [ldev] CDI.KEYID = 6
6,045,927 UART: [ldev] SUBJECT.KEYID = 5
6,047,091 UART: [ldev] AUTHORITY.KEYID = 7
6,048,332 UART: [ldev] FE.KEYID = 1
6,087,829 UART: [ldev] Erasing FE.KEYID = 1
8,600,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,396,466 UART: [ldev] --
10,401,641 UART: [fwproc] Wait for Commands...
10,403,962 UART: [fwproc] Recv command 0x46574c44
10,406,232 UART: [fwproc] Recv'd Img size: 119428 bytes
13,910,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,986,317 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,109,950 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,675,035 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,435,467 ready_for_fw is high
3,435,880 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,322,978 >>> mbox cmd response: success
19,614,526 UART:
19,614,921 UART: Running Caliptra FMC ...
19,616,045 UART:
19,616,205 UART: [state] CFI Enabled
19,680,874 UART: [fht] FMC Alias Private Key: 7
21,468,785 UART: [art] Extend RT PCRs Done
21,470,011 UART: [art] Lock RT PCRs Done
21,471,615 UART: [art] Populate DV Done
21,477,091 UART: [fht] FMC Alias Private Key: 7
21,478,588 UART: [art] Derive CDI
21,479,327 UART: [art] Store in slot 0x4
21,534,566 UART: [art] Derive Key Pair
21,535,618 UART: [art] Store priv key in slot 0x5
23,998,589 UART: [art] Derive Key Pair - Done
24,011,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,724,619 UART: [art] Erasing AUTHORITY.KEYID = 7
25,726,133 UART: [art] PUB.X = 15CD5045C6065256C668262D59961950D89DF162D03EF0CD6708AE31166A96E5C5AC03178D9121BFA9B3B5540C296A36
25,733,347 UART: [art] PUB.Y = 2BC33FFDF8CFEA58A2C3217E1F41159DDE76EB5221FCE9EE583CACDDEB135F1B36F95EA72DA955FEAF8A7B2D34A98CB0
25,740,682 UART: [art] SIG.R = 8178D9B6A18533B191FD6051A9C230007E844F2F0183815F08464D885ACE9DC01A547D87ED1CD60F65CB404EAEE0E403
25,748,051 UART: [art] SIG.S = 2191563883582AB00F02B9C39439F982379156DDA72A4F47E845D53EF236487B843C03E737CEE82CC17A1CA9E7935653
26,726,591 UART: Caliptra RT
26,727,305 UART: [state] CFI Enabled
26,907,173 UART: [rt] RT listening for mailbox commands...
26,909,075 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,938,833 UART: [rt]cmd =0x46504c54, len=4
26,940,177 >>> mbox cmd response data (8 bytes)
26,941,175 UART: [rt] FIPS self test
26,942,077 UART: [kat] ++
26,942,530 UART: [kat] sha1
26,946,798 UART: [kat] SHA2-256
26,947,661 UART: Fatal Error: 0x90010001
26,982,877 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,132,904 >>> mbox cmd response: failed
27,133,539 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,283,434 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,423,202 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,833,297 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,520 UART:
192,888 UART: Running Caliptra ROM ...
193,983 UART:
603,639 UART: [state] CFI Enabled
614,950 UART: [state] LifecycleState = Unprovisioned
617,331 UART: [state] DebugLocked = No
619,639 UART: [state] WD Timer not started. Device not locked for debugging
624,961 UART: [kat] SHA2-256
814,888 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,624 UART: [kat] ++
826,176 UART: [kat] sha1
837,843 UART: [kat] SHA2-256
840,864 UART: [kat] SHA2-384
846,366 UART: [kat] SHA2-512-ACC
848,960 UART: [kat] ECC-384
3,290,764 UART: [kat] HMAC-384Kdf
3,303,649 UART: [kat] LMS
3,835,530 UART: [kat] --
3,839,564 UART: [cold-reset] ++
3,841,793 UART: [fht] FHT @ 0x50003400
3,853,208 UART: [idev] ++
3,853,850 UART: [idev] CDI.KEYID = 6
3,854,889 UART: [idev] SUBJECT.KEYID = 7
3,855,998 UART: [idev] UDS.KEYID = 0
3,856,968 ready_for_fw is high
3,857,217 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,007,296 UART: [idev] Erasing UDS.KEYID = 0
6,333,523 UART: [idev] Sha1 KeyId Algorithm
6,356,068 UART: [idev] --
6,361,719 UART: [ldev] ++
6,362,420 UART: [ldev] CDI.KEYID = 6
6,363,336 UART: [ldev] SUBJECT.KEYID = 5
6,364,500 UART: [ldev] AUTHORITY.KEYID = 7
6,365,681 UART: [ldev] FE.KEYID = 1
6,375,419 UART: [ldev] Erasing FE.KEYID = 1
8,850,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,299 UART: [ldev] --
10,640,330 UART: [fwproc] Wait for Commands...
10,642,869 UART: [fwproc] Recv command 0x46574c44
10,645,140 UART: [fwproc] Recv'd Img size: 119428 bytes
14,153,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,424 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,013 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,916,206 >>> mbox cmd response: success
14,920,245 UART: [afmc] ++
14,920,952 UART: [afmc] CDI.KEYID = 6
14,922,067 UART: [afmc] SUBJECT.KEYID = 7
14,923,618 UART: [afmc] AUTHORITY.KEYID = 5
17,425,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,571 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,537 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,608 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,797 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,688 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,658 UART: [afmc] --
19,223,532 UART: [cold-reset] --
19,228,319 UART: [state] Locking Datavault
19,234,264 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,472 UART: [state] Locking ICCM
19,239,446 UART: [exit] Launching FMC @ 0x40000130
19,248,125 UART:
19,248,366 UART: Running Caliptra FMC ...
19,249,475 UART:
19,249,637 UART: [state] CFI Enabled
19,257,691 UART: [fht] FMC Alias Private Key: 7
21,023,540 UART: [art] Extend RT PCRs Done
21,024,768 UART: [art] Lock RT PCRs Done
21,026,341 UART: [art] Populate DV Done
21,031,833 UART: [fht] FMC Alias Private Key: 7
21,033,539 UART: [art] Derive CDI
21,034,284 UART: [art] Store in slot 0x4
21,077,307 UART: [art] Derive Key Pair
21,078,350 UART: [art] Store priv key in slot 0x5
23,505,068 UART: [art] Derive Key Pair - Done
23,517,848 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,459 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,146 UART: [art] PUB.X = 3A4AAC98DDBADA0B8E93334B87D7D8D19D28DC5443F899B05E02DAEAFC4197455AC2422596051FF55E3D5629B87D698A
25,233,236 UART: [art] PUB.Y = DF1C1ACBC9CB860807FDDD8BF50AE16FB024A36A8C1F58080F5E2B2EA6B3DB09514005850CC64761725ABC359C190190
25,240,534 UART: [art] SIG.R = 132B4C4ED615126772666FC098377D5EFBCA87DA72766218AA447729F49EC1980182176A4EC2C1BA3204191A4A9C4CF6
25,247,874 UART: [art] SIG.S = 9D90A79915D41D768CA8292DB53E46CA17AAEB0A89B3F264AE201C60014821638349B72BE8DFE1F82E24142B492480C1
26,226,693 UART: Caliptra RT
26,227,414 UART: [state] CFI Enabled
26,359,936 UART: [rt] RT listening for mailbox commands...
26,361,790 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,391,539 UART: [rt]cmd =0x46504c54, len=4
26,392,960 >>> mbox cmd response data (8 bytes)
26,393,939 UART: [rt] FIPS self test
26,394,883 UART: [kat] ++
26,395,339 UART: [kat] sha1
26,399,688 UART: [kat] SHA2-256
26,400,436 UART: Fatal Error: 0x90010001
26,435,718 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,585,583 >>> mbox cmd response: failed
26,586,373 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,736,139 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
190,055 UART:
190,351 UART: Running Caliptra ROM ...
191,467 UART:
13,801,347 UART: [state] CFI Enabled
13,813,318 UART: [state] LifecycleState = Unprovisioned
13,815,678 UART: [state] DebugLocked = No
13,817,014 UART: [state] WD Timer not started. Device not locked for debugging
13,822,353 UART: [kat] SHA2-256
14,012,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,023,016 UART: [kat] ++
14,023,629 UART: [kat] sha1
14,035,287 UART: [kat] SHA2-256
14,038,317 UART: [kat] SHA2-384
14,044,700 UART: [kat] SHA2-512-ACC
14,047,277 UART: [kat] ECC-384
16,488,463 UART: [kat] HMAC-384Kdf
16,501,115 UART: [kat] LMS
17,032,912 UART: [kat] --
17,038,177 UART: [cold-reset] ++
17,039,445 UART: [fht] FHT @ 0x50003400
17,050,768 UART: [idev] ++
17,051,497 UART: [idev] CDI.KEYID = 6
17,052,400 UART: [idev] SUBJECT.KEYID = 7
17,053,624 UART: [idev] UDS.KEYID = 0
17,055,394 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,205,161 UART: [idev] Erasing UDS.KEYID = 0
19,536,841 UART: [idev] Sha1 KeyId Algorithm
19,559,536 UART: [idev] --
19,565,203 UART: [ldev] ++
19,565,886 UART: [ldev] CDI.KEYID = 6
19,566,771 UART: [ldev] SUBJECT.KEYID = 5
19,567,984 UART: [ldev] AUTHORITY.KEYID = 7
19,569,110 UART: [ldev] FE.KEYID = 1
19,580,466 UART: [ldev] Erasing FE.KEYID = 1
22,057,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,773,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,788,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,803,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,818,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,840,469 UART: [ldev] --
23,846,065 UART: [fwproc] Wait for Commands...
23,848,602 UART: [fwproc] Recv command 0x46574c44
23,850,917 UART: [fwproc] Recv'd Img size: 119428 bytes
27,358,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,435,916 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,559,560 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,124,544 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,755,832 ready_for_fw is high
3,756,289 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,057,537 >>> mbox cmd response: success
19,316,551 UART:
19,316,991 UART: Running Caliptra FMC ...
19,318,111 UART:
19,318,282 UART: [state] CFI Enabled
19,326,360 UART: [fht] FMC Alias Private Key: 7
21,092,628 UART: [art] Extend RT PCRs Done
21,093,879 UART: [art] Lock RT PCRs Done
21,095,789 UART: [art] Populate DV Done
21,101,008 UART: [fht] FMC Alias Private Key: 7
21,102,673 UART: [art] Derive CDI
21,103,499 UART: [art] Store in slot 0x4
21,146,109 UART: [art] Derive Key Pair
21,147,140 UART: [art] Store priv key in slot 0x5
23,573,840 UART: [art] Derive Key Pair - Done
23,586,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,293,055 UART: [art] Erasing AUTHORITY.KEYID = 7
25,294,587 UART: [art] PUB.X = A9E679AC77610B75D880B19F1BEDA6F6EE8673E429C85A5E1468082611D92AA63C717C729D769BBE564E3F918F7D5520
25,301,837 UART: [art] PUB.Y = 3E21553DD0B0948E1C730474B1E1F85E9426A6F8BA4911B24C14AAB89CBF3C3E3E223F01C439DD12D1DE0B8A80AB02A2
25,309,217 UART: [art] SIG.R = D3E4AADB02D20E6784650AE67026E514657A762A7A7AA92A2E606C02212127D76CB3B946C8F680680406A7C78DAE50FB
25,316,499 UART: [art] SIG.S = D7BD853EC437515FA224DAA9D66713B3EC8FACC06A31A819F1EA5F44A4E689D794151CA276587C5B17DA5D12FD840106
26,295,073 UART: Caliptra RT
26,295,770 UART: [state] CFI Enabled
26,429,043 UART: [rt] RT listening for mailbox commands...
26,430,900 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,460,714 UART: [rt]cmd =0x46504c54, len=4
26,462,298 >>> mbox cmd response data (8 bytes)
26,463,522 UART: [rt] FIPS self test
26,464,469 UART: [kat] ++
26,464,943 UART: [kat] sha1
26,469,245 UART: [kat] SHA2-256
26,469,987 UART: Fatal Error: 0x90010001
26,505,068 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,655,389 >>> mbox cmd response: failed
26,656,065 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,805,994 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
16,878,314 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,185,872 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,047 UART: [kat] SHA2-256
881,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,093 UART: [kat] ++
886,245 UART: [kat] sha1
890,345 UART: [kat] SHA2-256
892,283 UART: [kat] SHA2-384
895,088 UART: [kat] SHA2-512-ACC
896,989 UART: [kat] ECC-384
902,576 UART: [kat] HMAC-384Kdf
907,120 UART: [kat] LMS
1,475,316 UART: [kat] --
1,476,255 UART: [cold-reset] ++
1,476,713 UART: [fht] Storing FHT @ 0x50003400
1,479,462 UART: [idev] ++
1,479,630 UART: [idev] CDI.KEYID = 6
1,479,990 UART: [idev] SUBJECT.KEYID = 7
1,480,414 UART: [idev] UDS.KEYID = 0
1,480,759 ready_for_fw is high
1,480,759 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,426 UART: [idev] Erasing UDS.KEYID = 0
1,504,948 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,666 UART: [idev] --
1,514,795 UART: [ldev] ++
1,514,963 UART: [ldev] CDI.KEYID = 6
1,515,326 UART: [ldev] SUBJECT.KEYID = 5
1,515,752 UART: [ldev] AUTHORITY.KEYID = 7
1,516,215 UART: [ldev] FE.KEYID = 1
1,521,223 UART: [ldev] Erasing FE.KEYID = 1
1,547,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,088 UART: [ldev] --
1,586,415 UART: [fwproc] Waiting for Commands...
1,587,216 UART: [fwproc] Received command 0x46574c44
1,588,007 UART: [fwproc] Received Image of size 119428 bytes
2,943,661 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,195 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,413 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,068 >>> mbox cmd response: success
3,144,198 UART: [afmc] ++
3,144,366 UART: [afmc] CDI.KEYID = 6
3,144,728 UART: [afmc] SUBJECT.KEYID = 7
3,145,153 UART: [afmc] AUTHORITY.KEYID = 5
3,179,810 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,142 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,922 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,631 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,514 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,197 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,075 UART: [afmc] --
3,223,043 UART: [cold-reset] --
3,224,063 UART: [state] Locking Datavault
3,225,272 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,876 UART: [state] Locking ICCM
3,226,502 UART: [exit] Launching FMC @ 0x40000130
3,231,832 UART:
3,231,848 UART: Running Caliptra FMC ...
3,232,256 UART:
3,232,310 UART: [state] CFI Enabled
3,242,518 UART: [fht] FMC Alias Private Key: 7
3,361,606 UART: [art] Extend RT PCRs Done
3,362,034 UART: [art] Lock RT PCRs Done
3,363,522 UART: [art] Populate DV Done
3,371,727 UART: [fht] FMC Alias Private Key: 7
3,372,701 UART: [art] Derive CDI
3,372,981 UART: [art] Store in slot 0x4
3,458,329 UART: [art] Derive Key Pair
3,458,689 UART: [art] Store priv key in slot 0x5
3,471,760 UART: [art] Derive Key Pair - Done
3,486,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,501,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,491 UART: [art] PUB.X = 97BC2A363BBAD1182BCBFBDD12304C1E646D68E75FCA8A9E719D3DAD5312B7205978AEC3690C4660438E91B34741E581
3,509,266 UART: [art] PUB.Y = 02969C0589CB82403CA86C61765EEFA8DEF316AEC42DE9B9E8FE56F01A633ECD8BE37225CACD098B1CAEADB92028906E
3,516,227 UART: [art] SIG.R = 88F6497113C03C7B5CED3959147C925DCAAF7401453F4072079FAD2476E4EAE996576019F58B55D5C404C87281FC24A4
3,522,984 UART: [art] SIG.S = 2D1324E301310086CB2A5A25D638BAC8DA8898F716010A8B7C2A7842A9B611AEE39CEB1CE5BFCBCC37048363F02616F3
3,547,056 UART: Caliptra RT
3,547,307 UART: [state] CFI Enabled
3,667,249 UART: [rt] RT listening for mailbox commands...
3,667,912 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,767 UART: [rt]cmd =0x46504c54, len=4
3,698,995 >>> mbox cmd response data (8 bytes)
3,699,286 UART: [rt] FIPS self test
3,699,614 UART: [kat] ++
3,699,766 UART: [kat] sha1
3,704,020 UART: [kat] SHA2-256
3,704,520 UART: Fatal Error: 0x90010001
3,706,059 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,706,064 >>> mbox cmd response: failed
3,706,064 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,706,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,448 UART: [state] LifecycleState = Unprovisioned
86,103 UART: [state] DebugLocked = No
86,667 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,181 UART: [kat] SHA2-256
882,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,227 UART: [kat] ++
886,379 UART: [kat] sha1
890,755 UART: [kat] SHA2-256
892,693 UART: [kat] SHA2-384
895,502 UART: [kat] SHA2-512-ACC
897,403 UART: [kat] ECC-384
903,298 UART: [kat] HMAC-384Kdf
907,860 UART: [kat] LMS
1,476,056 UART: [kat] --
1,476,983 UART: [cold-reset] ++
1,477,357 UART: [fht] Storing FHT @ 0x50003400
1,480,052 UART: [idev] ++
1,480,220 UART: [idev] CDI.KEYID = 6
1,480,580 UART: [idev] SUBJECT.KEYID = 7
1,481,004 UART: [idev] UDS.KEYID = 0
1,481,349 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,100 UART: [idev] Erasing UDS.KEYID = 0
1,505,992 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,750 UART: [idev] --
1,515,781 UART: [ldev] ++
1,515,949 UART: [ldev] CDI.KEYID = 6
1,516,312 UART: [ldev] SUBJECT.KEYID = 5
1,516,738 UART: [ldev] AUTHORITY.KEYID = 7
1,517,201 UART: [ldev] FE.KEYID = 1
1,522,107 UART: [ldev] Erasing FE.KEYID = 1
1,548,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,234 UART: [ldev] --
1,587,747 UART: [fwproc] Waiting for Commands...
1,588,376 UART: [fwproc] Received command 0x46574c44
1,589,167 UART: [fwproc] Received Image of size 119428 bytes
2,944,051 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,795 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,013 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,630 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,035 ready_for_fw is high
1,362,035 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,002 >>> mbox cmd response: success
3,052,791 UART:
3,052,807 UART: Running Caliptra FMC ...
3,053,215 UART:
3,053,269 UART: [state] CFI Enabled
3,063,895 UART: [fht] FMC Alias Private Key: 7
3,182,563 UART: [art] Extend RT PCRs Done
3,182,991 UART: [art] Lock RT PCRs Done
3,184,713 UART: [art] Populate DV Done
3,192,928 UART: [fht] FMC Alias Private Key: 7
3,193,996 UART: [art] Derive CDI
3,194,276 UART: [art] Store in slot 0x4
3,280,156 UART: [art] Derive Key Pair
3,280,516 UART: [art] Store priv key in slot 0x5
3,294,217 UART: [art] Derive Key Pair - Done
3,308,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,323,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,710 UART: [art] PUB.X = 80CEE314E7A00E05D83DFFBB366AC614DADEA582C4423936278AE9A6814E72B74E626979B5D874E5FD4229F5D4BECB59
3,331,486 UART: [art] PUB.Y = 58AD063969FB0C9F3E32C8D06EB37DE261A124E88EF1345A4635E79A1EAB0689A5D60E3F5559A6DAA979427B6F9D9E61
3,338,432 UART: [art] SIG.R = 7A27B114C8F74675CB061085861729C50F22C4339761B53F351D87847BA72B027AD9F7B30BEA242AF5A47D18C3B96BC0
3,345,188 UART: [art] SIG.S = 2F7B7D8E6EEF8A9A0933A73D52F256BB5BE66649D58E0281E59ABE00E78FB1CE8A50BD9C9418073F3164D6AF6089A41D
3,369,043 UART: Caliptra RT
3,369,294 UART: [state] CFI Enabled
3,490,009 UART: [rt] RT listening for mailbox commands...
3,490,672 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,473 UART: [rt]cmd =0x46504c54, len=4
3,521,619 >>> mbox cmd response data (8 bytes)
3,521,970 UART: [rt] FIPS self test
3,522,298 UART: [kat] ++
3,522,450 UART: [kat] sha1
3,526,692 UART: [kat] SHA2-256
3,527,214 UART: Fatal Error: 0x90010001
3,528,753 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,528,758 >>> mbox cmd response: failed
3,528,758 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,528,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,111 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,106 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,038 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,532 UART: [kat] SHA2-256
882,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,578 UART: [kat] ++
886,730 UART: [kat] sha1
891,052 UART: [kat] SHA2-256
892,990 UART: [kat] SHA2-384
895,799 UART: [kat] SHA2-512-ACC
897,700 UART: [kat] ECC-384
903,529 UART: [kat] HMAC-384Kdf
908,187 UART: [kat] LMS
1,476,383 UART: [kat] --
1,477,144 UART: [cold-reset] ++
1,477,724 UART: [fht] Storing FHT @ 0x50003400
1,480,585 UART: [idev] ++
1,480,753 UART: [idev] CDI.KEYID = 6
1,481,113 UART: [idev] SUBJECT.KEYID = 7
1,481,537 UART: [idev] UDS.KEYID = 0
1,481,882 ready_for_fw is high
1,481,882 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,985 UART: [idev] Erasing UDS.KEYID = 0
1,506,581 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,169 UART: [idev] --
1,516,340 UART: [ldev] ++
1,516,508 UART: [ldev] CDI.KEYID = 6
1,516,871 UART: [ldev] SUBJECT.KEYID = 5
1,517,297 UART: [ldev] AUTHORITY.KEYID = 7
1,517,760 UART: [ldev] FE.KEYID = 1
1,522,962 UART: [ldev] Erasing FE.KEYID = 1
1,548,579 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,821 UART: [ldev] --
1,588,304 UART: [fwproc] Waiting for Commands...
1,589,145 UART: [fwproc] Received command 0x46574c44
1,589,936 UART: [fwproc] Received Image of size 119428 bytes
2,944,522 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,742 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,960 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,513 >>> mbox cmd response: success
3,145,669 UART: [afmc] ++
3,145,837 UART: [afmc] CDI.KEYID = 6
3,146,199 UART: [afmc] SUBJECT.KEYID = 7
3,146,624 UART: [afmc] AUTHORITY.KEYID = 5
3,181,737 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,069 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,849 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,558 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,441 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,124 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,016 UART: [afmc] --
3,225,060 UART: [cold-reset] --
3,225,650 UART: [state] Locking Datavault
3,226,691 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,295 UART: [state] Locking ICCM
3,227,897 UART: [exit] Launching FMC @ 0x40000130
3,233,227 UART:
3,233,243 UART: Running Caliptra FMC ...
3,233,651 UART:
3,233,794 UART: [state] CFI Enabled
3,244,234 UART: [fht] FMC Alias Private Key: 7
3,363,574 UART: [art] Extend RT PCRs Done
3,364,002 UART: [art] Lock RT PCRs Done
3,365,934 UART: [art] Populate DV Done
3,374,411 UART: [fht] FMC Alias Private Key: 7
3,375,433 UART: [art] Derive CDI
3,375,713 UART: [art] Store in slot 0x4
3,461,601 UART: [art] Derive Key Pair
3,461,961 UART: [art] Store priv key in slot 0x5
3,474,658 UART: [art] Derive Key Pair - Done
3,489,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,330 UART: [art] PUB.X = EED3A10AAC7AA28EE6AC1A3F886F4C174013136F75B48E5BC9834B546C786431F749DF84B2C4275BA96D728A682B8602
3,512,100 UART: [art] PUB.Y = B5E2E8F1E64563E2283CC452DE787461AC87DC67002A3683C1481FC381A88B80D82B88D7AB8C6DFCB14B06E9ACDA3437
3,519,035 UART: [art] SIG.R = BC1BA913BC0DB69DCA3032C3913250D6C2F94DCE96EEE69504C2663881C8F8756C74D5648C81E63EDD4A887DCDDF570C
3,525,810 UART: [art] SIG.S = A813F22CE11A0EEDB9871B752240B0288DFD146E97B4FADBBCD1101D7235B42963F7119C79934E2264DBCC41B43874A0
3,549,487 UART: Caliptra RT
3,549,830 UART: [state] CFI Enabled
3,669,869 UART: [rt] RT listening for mailbox commands...
3,670,532 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,249 UART: [rt]cmd =0x46504c54, len=4
3,701,289 >>> mbox cmd response data (8 bytes)
3,701,568 UART: [rt] FIPS self test
3,701,896 UART: [kat] ++
3,702,048 UART: [kat] sha1
3,706,138 UART: [kat] SHA2-256
3,706,660 UART: Fatal Error: 0x90010001
3,708,199 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,708,204 >>> mbox cmd response: failed
3,708,204 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,708,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,626 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,302 UART: [kat] SHA2-256
882,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,348 UART: [kat] ++
886,500 UART: [kat] sha1
890,756 UART: [kat] SHA2-256
892,694 UART: [kat] SHA2-384
895,547 UART: [kat] SHA2-512-ACC
897,448 UART: [kat] ECC-384
903,065 UART: [kat] HMAC-384Kdf
907,823 UART: [kat] LMS
1,476,019 UART: [kat] --
1,476,894 UART: [cold-reset] ++
1,477,350 UART: [fht] Storing FHT @ 0x50003400
1,480,021 UART: [idev] ++
1,480,189 UART: [idev] CDI.KEYID = 6
1,480,549 UART: [idev] SUBJECT.KEYID = 7
1,480,973 UART: [idev] UDS.KEYID = 0
1,481,318 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,637 UART: [idev] Erasing UDS.KEYID = 0
1,505,359 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,995 UART: [idev] --
1,515,120 UART: [ldev] ++
1,515,288 UART: [ldev] CDI.KEYID = 6
1,515,651 UART: [ldev] SUBJECT.KEYID = 5
1,516,077 UART: [ldev] AUTHORITY.KEYID = 7
1,516,540 UART: [ldev] FE.KEYID = 1
1,521,906 UART: [ldev] Erasing FE.KEYID = 1
1,547,209 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,127 UART: [ldev] --
1,586,584 UART: [fwproc] Waiting for Commands...
1,587,267 UART: [fwproc] Received command 0x46574c44
1,588,058 UART: [fwproc] Received Image of size 119428 bytes
2,942,454 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,708 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,926 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,453 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,760 ready_for_fw is high
1,363,760 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,965 >>> mbox cmd response: success
3,055,396 UART:
3,055,412 UART: Running Caliptra FMC ...
3,055,820 UART:
3,055,963 UART: [state] CFI Enabled
3,066,897 UART: [fht] FMC Alias Private Key: 7
3,186,453 UART: [art] Extend RT PCRs Done
3,186,881 UART: [art] Lock RT PCRs Done
3,188,207 UART: [art] Populate DV Done
3,196,474 UART: [fht] FMC Alias Private Key: 7
3,197,512 UART: [art] Derive CDI
3,197,792 UART: [art] Store in slot 0x4
3,283,506 UART: [art] Derive Key Pair
3,283,866 UART: [art] Store priv key in slot 0x5
3,297,339 UART: [art] Derive Key Pair - Done
3,312,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,328,388 UART: [art] PUB.X = 6E52D327DB0C139E73FFFB9C6CCFEA6B2E765DE0D8F01C0887C27F18938A70512968711DBEA4F9F034C9419E40E02802
3,335,157 UART: [art] PUB.Y = EF3F8B02CE2DE3D139BDA52643C186BBDAAD701BE902BBBB04144995BDA5571EFF2D5C5A2A27ED423EED79DDFA9CE9F5
3,342,130 UART: [art] SIG.R = B03F17B37D95659FBF8575608654E552FF27A18E4ABA52251582C8FA93641D872F3507AF6B9ACBF9063B733584A13C4C
3,348,894 UART: [art] SIG.S = B96C563A85AF74D914787195069091CE5B7502FB4F9435EFCDF321FA5B07BCAEE50FFDE43747265B660442040EF81D32
3,372,771 UART: Caliptra RT
3,373,114 UART: [state] CFI Enabled
3,493,253 UART: [rt] RT listening for mailbox commands...
3,493,916 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,659 UART: [rt]cmd =0x46504c54, len=4
3,524,673 >>> mbox cmd response data (8 bytes)
3,524,786 UART: [rt] FIPS self test
3,525,114 UART: [kat] ++
3,525,266 UART: [kat] sha1
3,529,516 UART: [kat] SHA2-256
3,529,916 UART: Fatal Error: 0x90010001
3,531,455 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,531,460 >>> mbox cmd response: failed
3,531,460 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,531,465 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,328 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,201 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,136 UART: [kat] ++
895,288 UART: [kat] sha1
899,650 UART: [kat] SHA2-256
901,590 UART: [kat] SHA2-384
904,555 UART: [kat] SHA2-512-ACC
906,456 UART: [kat] ECC-384
916,087 UART: [kat] HMAC-384Kdf
920,605 UART: [kat] LMS
1,168,917 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,206 UART: [fht] FHT @ 0x50003400
1,172,778 UART: [idev] ++
1,172,946 UART: [idev] CDI.KEYID = 6
1,173,307 UART: [idev] SUBJECT.KEYID = 7
1,173,732 UART: [idev] UDS.KEYID = 0
1,174,078 ready_for_fw is high
1,174,078 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,563 UART: [idev] Erasing UDS.KEYID = 0
1,198,379 UART: [idev] Sha1 KeyId Algorithm
1,207,241 UART: [idev] --
1,208,358 UART: [ldev] ++
1,208,526 UART: [ldev] CDI.KEYID = 6
1,208,890 UART: [ldev] SUBJECT.KEYID = 5
1,209,317 UART: [ldev] AUTHORITY.KEYID = 7
1,209,780 UART: [ldev] FE.KEYID = 1
1,215,066 UART: [ldev] Erasing FE.KEYID = 1
1,241,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,258 UART: [ldev] --
1,280,497 UART: [fwproc] Wait for Commands...
1,281,158 UART: [fwproc] Recv command 0x46574c44
1,281,891 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,658 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,853 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,028 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,679 >>> mbox cmd response: success
2,839,835 UART: [afmc] ++
2,840,003 UART: [afmc] CDI.KEYID = 6
2,840,366 UART: [afmc] SUBJECT.KEYID = 7
2,840,792 UART: [afmc] AUTHORITY.KEYID = 5
2,876,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,043 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,753 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,634 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,335 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,236 UART: [afmc] --
2,920,071 UART: [cold-reset] --
2,921,133 UART: [state] Locking Datavault
2,922,388 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,992 UART: [state] Locking ICCM
2,923,448 UART: [exit] Launching FMC @ 0x40000130
2,928,778 UART:
2,928,794 UART: Running Caliptra FMC ...
2,929,202 UART:
2,929,256 UART: [state] CFI Enabled
2,939,658 UART: [fht] FMC Alias Private Key: 7
3,059,286 UART: [art] Extend RT PCRs Done
3,059,714 UART: [art] Lock RT PCRs Done
3,061,094 UART: [art] Populate DV Done
3,069,349 UART: [fht] FMC Alias Private Key: 7
3,070,321 UART: [art] Derive CDI
3,070,601 UART: [art] Store in slot 0x4
3,155,974 UART: [art] Derive Key Pair
3,156,334 UART: [art] Store priv key in slot 0x5
3,169,702 UART: [art] Derive Key Pair - Done
3,184,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,036 UART: [art] PUB.X = 9BC3376D35CE330A069EA6DD351B69C74D1B824281D19B9DCFC37FFDDF72CA242F3CD70F1BEA7EE61DF8D7C6B833DC95
3,207,821 UART: [art] PUB.Y = 3E0FBE68B43FF3D058195012B7C7354E5AAC78C02B21F166444E6136FEA297617111DBA1E1ABBB5D1003B7DE924372B2
3,214,771 UART: [art] SIG.R = AAFEEF94E6F160C837E62B148A7A57B11346D9A8CE6D07724639B13D18BE69CFCF8FD158EFD96B2A0069F7F84F984E09
3,221,527 UART: [art] SIG.S = 435F0160AE0B84C534EF298BDE80568F23609B5CC1BF4C2062EE8B446DD6C4F39636371719F57734247B8E7D01732D07
3,246,059 UART: Caliptra RT
3,246,310 UART: [state] CFI Enabled
3,366,221 UART: [rt] RT listening for mailbox commands...
3,366,884 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,637 UART: [rt]cmd =0x46504c54, len=4
3,397,741 >>> mbox cmd response data (8 bytes)
3,397,948 UART: [rt] FIPS self test
3,398,276 UART: [kat] ++
3,398,428 UART: [kat] sha1
3,402,644 UART: [kat] SHA2-256
3,403,110 UART: Fatal Error: 0x90010001
3,404,649 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,654 >>> mbox cmd response: failed
3,404,654 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,676 UART: [state] LifecycleState = Unprovisioned
85,331 UART: [state] DebugLocked = No
85,993 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,940 UART: [kat] ++
895,092 UART: [kat] sha1
899,348 UART: [kat] SHA2-256
901,288 UART: [kat] SHA2-384
904,237 UART: [kat] SHA2-512-ACC
906,138 UART: [kat] ECC-384
915,677 UART: [kat] HMAC-384Kdf
920,325 UART: [kat] LMS
1,168,637 UART: [kat] --
1,169,588 UART: [cold-reset] ++
1,170,058 UART: [fht] FHT @ 0x50003400
1,172,636 UART: [idev] ++
1,172,804 UART: [idev] CDI.KEYID = 6
1,173,165 UART: [idev] SUBJECT.KEYID = 7
1,173,590 UART: [idev] UDS.KEYID = 0
1,173,936 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,627 UART: [idev] Erasing UDS.KEYID = 0
1,198,343 UART: [idev] Sha1 KeyId Algorithm
1,207,343 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,214,968 UART: [ldev] Erasing FE.KEYID = 1
1,241,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,600 UART: [ldev] --
1,281,027 UART: [fwproc] Wait for Commands...
1,281,842 UART: [fwproc] Recv command 0x46574c44
1,282,575 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,589 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,764 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,243 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,542 ready_for_fw is high
1,059,542 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,852 >>> mbox cmd response: success
2,752,453 UART:
2,752,469 UART: Running Caliptra FMC ...
2,752,877 UART:
2,752,931 UART: [state] CFI Enabled
2,763,465 UART: [fht] FMC Alias Private Key: 7
2,882,977 UART: [art] Extend RT PCRs Done
2,883,405 UART: [art] Lock RT PCRs Done
2,885,119 UART: [art] Populate DV Done
2,893,340 UART: [fht] FMC Alias Private Key: 7
2,894,400 UART: [art] Derive CDI
2,894,680 UART: [art] Store in slot 0x4
2,980,925 UART: [art] Derive Key Pair
2,981,285 UART: [art] Store priv key in slot 0x5
2,994,419 UART: [art] Derive Key Pair - Done
3,009,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,498 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,263 UART: [art] PUB.X = 61B7E5F43108351C45D87168FEF66AB1031165E356757F7D9FE5107A2B86E9882E65C571058804C5AEC39196EDA2DAB0
3,032,019 UART: [art] PUB.Y = 9396DDB21F3D2510D5A4055F341C5CA66C4EA468664961C8BD5CA72F29787EB43108A341B3DF658496028D4E32EBE0EB
3,038,964 UART: [art] SIG.R = 808E95F73FD6F3E918BE87A4092286F03C72D121216684D5B0F4FE41EA0BA96A20C020882A5D0AE8C170E1EFD16B6876
3,045,729 UART: [art] SIG.S = 54C480B8134114D0C47D6D662450B91CF75D3601A5C42562F6880E959781F18DB5EBCABA076CC93C885A356A6AFC336F
3,068,886 UART: Caliptra RT
3,069,137 UART: [state] CFI Enabled
3,188,780 UART: [rt] RT listening for mailbox commands...
3,189,443 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,416 UART: [rt]cmd =0x46504c54, len=4
3,220,526 >>> mbox cmd response data (8 bytes)
3,220,883 UART: [rt] FIPS self test
3,221,211 UART: [kat] ++
3,221,363 UART: [kat] sha1
3,225,643 UART: [kat] SHA2-256
3,226,259 UART: Fatal Error: 0x90010001
3,227,798 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,227,803 >>> mbox cmd response: failed
3,227,803 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,227,808 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,980 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,346 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,045 UART: [state] LifecycleState = Unprovisioned
85,700 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,445 UART: [kat] SHA2-256
890,995 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,099 UART: [kat] ++
895,251 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
916,270 UART: [kat] HMAC-384Kdf
920,958 UART: [kat] LMS
1,169,270 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,381 UART: [fht] FHT @ 0x50003400
1,172,887 UART: [idev] ++
1,173,055 UART: [idev] CDI.KEYID = 6
1,173,416 UART: [idev] SUBJECT.KEYID = 7
1,173,841 UART: [idev] UDS.KEYID = 0
1,174,187 ready_for_fw is high
1,174,187 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,842 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,208,254 UART: [idev] --
1,209,259 UART: [ldev] ++
1,209,427 UART: [ldev] CDI.KEYID = 6
1,209,791 UART: [ldev] SUBJECT.KEYID = 5
1,210,218 UART: [ldev] AUTHORITY.KEYID = 7
1,210,681 UART: [ldev] FE.KEYID = 1
1,215,995 UART: [ldev] Erasing FE.KEYID = 1
1,241,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,111 UART: [ldev] --
1,281,402 UART: [fwproc] Wait for Commands...
1,282,139 UART: [fwproc] Recv command 0x46574c44
1,282,872 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,888 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,063 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,704 >>> mbox cmd response: success
2,839,800 UART: [afmc] ++
2,839,968 UART: [afmc] CDI.KEYID = 6
2,840,331 UART: [afmc] SUBJECT.KEYID = 7
2,840,757 UART: [afmc] AUTHORITY.KEYID = 5
2,876,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,724 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,434 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,315 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,016 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,891 UART: [afmc] --
2,919,756 UART: [cold-reset] --
2,920,656 UART: [state] Locking Datavault
2,922,131 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,735 UART: [state] Locking ICCM
2,923,343 UART: [exit] Launching FMC @ 0x40000130
2,928,673 UART:
2,928,689 UART: Running Caliptra FMC ...
2,929,097 UART:
2,929,240 UART: [state] CFI Enabled
2,939,716 UART: [fht] FMC Alias Private Key: 7
3,059,862 UART: [art] Extend RT PCRs Done
3,060,290 UART: [art] Lock RT PCRs Done
3,061,422 UART: [art] Populate DV Done
3,069,653 UART: [fht] FMC Alias Private Key: 7
3,070,801 UART: [art] Derive CDI
3,071,081 UART: [art] Store in slot 0x4
3,156,824 UART: [art] Derive Key Pair
3,157,184 UART: [art] Store priv key in slot 0x5
3,170,518 UART: [art] Derive Key Pair - Done
3,185,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,851 UART: [art] PUB.X = 76BD45E6548432E013A3588C3352E6AE3E3BAF58AD1C6F53CBA630E8B6B101853BDC1B4A2CE408691711941AFAD7243A
3,208,623 UART: [art] PUB.Y = DE5B8961C7D55D3B47479888527B127F4D4C16033A0F159314AB05139CF5F780B62995588B266BE0F7E592A4A47FD7A6
3,215,560 UART: [art] SIG.R = 925047F53413F8AF1966A174140C9BE47CD795320C0EAF51AFBEB508E214C022D75FE8B69F2FEA6A22D0A713F1F2F3F1
3,222,328 UART: [art] SIG.S = F6968F9665B578CF00B82DEDAC982AAAC3E48E98FDB16C78AD38CA55E3B2418D8603866860E26737989CAF3D136B4E9D
3,246,823 UART: Caliptra RT
3,247,166 UART: [state] CFI Enabled
3,366,188 UART: [rt] RT listening for mailbox commands...
3,366,851 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,720 UART: [rt]cmd =0x46504c54, len=4
3,397,882 >>> mbox cmd response data (8 bytes)
3,398,147 UART: [rt] FIPS self test
3,398,475 UART: [kat] ++
3,398,627 UART: [kat] sha1
3,402,957 UART: [kat] SHA2-256
3,403,569 UART: Fatal Error: 0x90010001
3,405,108 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,113 >>> mbox cmd response: failed
3,405,113 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,118 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,393 UART: [kat] ++
895,545 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,458 UART: [kat] SHA2-512-ACC
906,359 UART: [kat] ECC-384
916,082 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,170,095 UART: [cold-reset] ++
1,170,511 UART: [fht] FHT @ 0x50003400
1,172,977 UART: [idev] ++
1,173,145 UART: [idev] CDI.KEYID = 6
1,173,506 UART: [idev] SUBJECT.KEYID = 7
1,173,931 UART: [idev] UDS.KEYID = 0
1,174,277 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,052 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,582 UART: [idev] --
1,209,611 UART: [ldev] ++
1,209,779 UART: [ldev] CDI.KEYID = 6
1,210,143 UART: [ldev] SUBJECT.KEYID = 5
1,210,570 UART: [ldev] AUTHORITY.KEYID = 7
1,211,033 UART: [ldev] FE.KEYID = 1
1,215,789 UART: [ldev] Erasing FE.KEYID = 1
1,242,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,111 UART: [ldev] --
1,281,364 UART: [fwproc] Wait for Commands...
1,281,933 UART: [fwproc] Recv command 0x46574c44
1,282,666 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,636 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,811 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,438 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,651 ready_for_fw is high
1,059,651 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,567 >>> mbox cmd response: success
2,754,598 UART:
2,754,614 UART: Running Caliptra FMC ...
2,755,022 UART:
2,755,165 UART: [state] CFI Enabled
2,765,711 UART: [fht] FMC Alias Private Key: 7
2,884,485 UART: [art] Extend RT PCRs Done
2,884,913 UART: [art] Lock RT PCRs Done
2,886,281 UART: [art] Populate DV Done
2,894,636 UART: [fht] FMC Alias Private Key: 7
2,895,610 UART: [art] Derive CDI
2,895,890 UART: [art] Store in slot 0x4
2,981,731 UART: [art] Derive Key Pair
2,982,091 UART: [art] Store priv key in slot 0x5
2,995,537 UART: [art] Derive Key Pair - Done
3,010,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,730 UART: [art] PUB.X = 643612F83A4A95498DC7958671689EBEEBF8F5A5165A2676D64AC0977F0AC938861E8FBB640BAE0AF68BEEB8B6F145E5
3,033,501 UART: [art] PUB.Y = FF4467FB0F7C16E8DB68650A953B3B97F728F0B46D8CB4765154FB8DD730DDAB11E4AD9B6ADBF27D9A22EA13B600131A
3,040,441 UART: [art] SIG.R = E51247762E2604B2B27773C2A7A8757C590BC66A8DAAD7F6A5B326941C866755C3471B3CD30E0CBB0AE1324AFB6AEE45
3,047,204 UART: [art] SIG.S = 4AF6F3C4CF51F62C448D321480B7DDF75D01ED1673FCFDD1022BBCDA78B3EB57BF813970DF87F7711A4EF171CF956FF6
3,070,796 UART: Caliptra RT
3,071,139 UART: [state] CFI Enabled
3,191,226 UART: [rt] RT listening for mailbox commands...
3,191,889 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,780 UART: [rt]cmd =0x46504c54, len=4
3,223,076 >>> mbox cmd response data (8 bytes)
3,223,433 UART: [rt] FIPS self test
3,223,761 UART: [kat] ++
3,223,913 UART: [kat] sha1
3,228,069 UART: [kat] SHA2-256
3,228,613 UART: Fatal Error: 0x90010001
3,230,152 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,157 >>> mbox cmd response: failed
3,230,157 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,963 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,481 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
893,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,315 UART: [kat] ++
897,467 UART: [kat] sha1
901,569 UART: [kat] SHA2-256
903,509 UART: [kat] SHA2-384
906,084 UART: [kat] SHA2-512-ACC
907,985 UART: [kat] ECC-384
917,908 UART: [kat] HMAC-384Kdf
922,464 UART: [kat] LMS
1,170,792 UART: [kat] --
1,171,653 UART: [cold-reset] ++
1,172,155 UART: [fht] FHT @ 0x50003400
1,174,792 UART: [idev] ++
1,174,960 UART: [idev] CDI.KEYID = 6
1,175,320 UART: [idev] SUBJECT.KEYID = 7
1,175,744 UART: [idev] UDS.KEYID = 0
1,176,089 ready_for_fw is high
1,176,089 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,922 UART: [idev] Erasing UDS.KEYID = 0
1,200,887 UART: [idev] Sha1 KeyId Algorithm
1,209,419 UART: [idev] --
1,210,415 UART: [ldev] ++
1,210,583 UART: [ldev] CDI.KEYID = 6
1,210,946 UART: [ldev] SUBJECT.KEYID = 5
1,211,372 UART: [ldev] AUTHORITY.KEYID = 7
1,211,835 UART: [ldev] FE.KEYID = 1
1,217,147 UART: [ldev] Erasing FE.KEYID = 1
1,243,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,503 UART: [ldev] --
1,282,958 UART: [fwproc] Wait for Commands...
1,283,666 UART: [fwproc] Recv command 0x46574c44
1,284,394 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,150 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,320 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,973 >>> mbox cmd response: success
2,841,119 UART: [afmc] ++
2,841,287 UART: [afmc] CDI.KEYID = 6
2,841,649 UART: [afmc] SUBJECT.KEYID = 7
2,842,074 UART: [afmc] AUTHORITY.KEYID = 5
2,877,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,840 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,549 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,432 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,133 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,941 UART: [afmc] --
2,920,861 UART: [cold-reset] --
2,921,885 UART: [state] Locking Datavault
2,923,028 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,632 UART: [state] Locking ICCM
2,924,220 UART: [exit] Launching FMC @ 0x40000130
2,929,550 UART:
2,929,566 UART: Running Caliptra FMC ...
2,929,974 UART:
2,930,028 UART: [state] CFI Enabled
2,940,882 UART: [fht] FMC Alias Private Key: 7
3,059,918 UART: [art] Extend RT PCRs Done
3,060,346 UART: [art] Lock RT PCRs Done
3,061,850 UART: [art] Populate DV Done
3,070,333 UART: [fht] FMC Alias Private Key: 7
3,071,451 UART: [art] Derive CDI
3,071,731 UART: [art] Store in slot 0x4
3,157,254 UART: [art] Derive Key Pair
3,157,614 UART: [art] Store priv key in slot 0x5
3,170,922 UART: [art] Derive Key Pair - Done
3,185,711 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,930 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,695 UART: [art] PUB.X = 580444635849EE56DCB9710EADA0ECB8D6B0EF9CF98FD05EB866BC0F5FED4B457084B812182E4CFCC1E9098A45A5E729
3,208,469 UART: [art] PUB.Y = FBAC7E5C65FC37A91446F7BD39AF584500008E31701A282081A04CF5880DFDB59565B8AC8C9702D727F32CED216162A2
3,215,373 UART: [art] SIG.R = 86DDFC662D42C68DAD29C74EDC6F4BFBAF38809C60E23B8A1BA75812A29082A13A57C8493042EBA2E8482341D573E2D6
3,222,153 UART: [art] SIG.S = 45411B93F7199CADD86C68287C37697C558A0D29FD7A9867CBAD36942E837A6829E1010CDA8F71DB885832A2954AB116
3,245,780 UART: Caliptra RT
3,246,031 UART: [state] CFI Enabled
3,365,054 UART: [rt] RT listening for mailbox commands...
3,365,717 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,582 UART: [rt]cmd =0x46504c54, len=4
3,396,878 >>> mbox cmd response data (8 bytes)
3,397,063 UART: [rt] FIPS self test
3,397,391 UART: [kat] ++
3,397,543 UART: [kat] sha1
3,401,839 UART: [kat] SHA2-256
3,402,391 UART: Fatal Error: 0x90010001
3,403,930 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,935 >>> mbox cmd response: failed
3,403,935 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,512 UART: [state] LifecycleState = Unprovisioned
86,167 UART: [state] DebugLocked = No
86,777 UART: [state] WD Timer not started. Device not locked for debugging
88,092 UART: [kat] SHA2-256
893,742 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,867 UART: [kat] ++
898,019 UART: [kat] sha1
902,281 UART: [kat] SHA2-256
904,221 UART: [kat] SHA2-384
906,970 UART: [kat] SHA2-512-ACC
908,871 UART: [kat] ECC-384
918,878 UART: [kat] HMAC-384Kdf
923,502 UART: [kat] LMS
1,171,830 UART: [kat] --
1,172,603 UART: [cold-reset] ++
1,172,961 UART: [fht] FHT @ 0x50003400
1,175,472 UART: [idev] ++
1,175,640 UART: [idev] CDI.KEYID = 6
1,176,000 UART: [idev] SUBJECT.KEYID = 7
1,176,424 UART: [idev] UDS.KEYID = 0
1,176,769 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,412 UART: [idev] Erasing UDS.KEYID = 0
1,201,379 UART: [idev] Sha1 KeyId Algorithm
1,209,845 UART: [idev] --
1,210,727 UART: [ldev] ++
1,210,895 UART: [ldev] CDI.KEYID = 6
1,211,258 UART: [ldev] SUBJECT.KEYID = 5
1,211,684 UART: [ldev] AUTHORITY.KEYID = 7
1,212,147 UART: [ldev] FE.KEYID = 1
1,217,293 UART: [ldev] Erasing FE.KEYID = 1
1,243,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,313 UART: [ldev] --
1,282,756 UART: [fwproc] Wait for Commands...
1,283,520 UART: [fwproc] Recv command 0x46574c44
1,284,248 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,880 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,050 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,761 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,259 ready_for_fw is high
1,060,259 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,472 >>> mbox cmd response: success
2,751,287 UART:
2,751,303 UART: Running Caliptra FMC ...
2,751,711 UART:
2,751,765 UART: [state] CFI Enabled
2,762,197 UART: [fht] FMC Alias Private Key: 7
2,880,911 UART: [art] Extend RT PCRs Done
2,881,339 UART: [art] Lock RT PCRs Done
2,882,679 UART: [art] Populate DV Done
2,891,038 UART: [fht] FMC Alias Private Key: 7
2,892,020 UART: [art] Derive CDI
2,892,300 UART: [art] Store in slot 0x4
2,978,093 UART: [art] Derive Key Pair
2,978,453 UART: [art] Store priv key in slot 0x5
2,991,665 UART: [art] Derive Key Pair - Done
3,006,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,336 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,101 UART: [art] PUB.X = C12DA7C4218E8ED73EEBF48F34501009ECF3D87B07A0F16EAE528D51E4A24C28E3C791946B3CF8654BA1FD71E47C1BE4
3,028,881 UART: [art] PUB.Y = DF29C928E15F0B3FB4A76233FA0D993AF043EB25E333EB3D4A0629FF2E9A24673D3DC1B6AE385BFF4EB35E48E5C5FC26
3,035,842 UART: [art] SIG.R = 4E4EC111CB128E602FC4AF80B5B0385C80E8E33E80458EA380F28533654DD896A4BA7B23D2803F0EAB94A063F11EC13C
3,042,617 UART: [art] SIG.S = C0610370A813176E1D9390E68AE85D80A883C566ABEED34C768B09C8972DD8834398620627F5F70D4A33A8E0237A19EA
3,066,401 UART: Caliptra RT
3,066,652 UART: [state] CFI Enabled
3,185,527 UART: [rt] RT listening for mailbox commands...
3,186,190 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,216,169 UART: [rt]cmd =0x46504c54, len=4
3,217,545 >>> mbox cmd response data (8 bytes)
3,217,730 UART: [rt] FIPS self test
3,218,058 UART: [kat] ++
3,218,210 UART: [kat] sha1
3,222,444 UART: [kat] SHA2-256
3,222,988 UART: Fatal Error: 0x90010001
3,224,527 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,224,532 >>> mbox cmd response: failed
3,224,532 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,224,537 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,811 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,420 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
893,551 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,676 UART: [kat] ++
897,828 UART: [kat] sha1
902,024 UART: [kat] SHA2-256
903,964 UART: [kat] SHA2-384
906,803 UART: [kat] SHA2-512-ACC
908,704 UART: [kat] ECC-384
918,343 UART: [kat] HMAC-384Kdf
922,945 UART: [kat] LMS
1,171,273 UART: [kat] --
1,172,344 UART: [cold-reset] ++
1,172,852 UART: [fht] FHT @ 0x50003400
1,175,449 UART: [idev] ++
1,175,617 UART: [idev] CDI.KEYID = 6
1,175,977 UART: [idev] SUBJECT.KEYID = 7
1,176,401 UART: [idev] UDS.KEYID = 0
1,176,746 ready_for_fw is high
1,176,746 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,475 UART: [idev] Erasing UDS.KEYID = 0
1,201,672 UART: [idev] Sha1 KeyId Algorithm
1,210,182 UART: [idev] --
1,211,248 UART: [ldev] ++
1,211,416 UART: [ldev] CDI.KEYID = 6
1,211,779 UART: [ldev] SUBJECT.KEYID = 5
1,212,205 UART: [ldev] AUTHORITY.KEYID = 7
1,212,668 UART: [ldev] FE.KEYID = 1
1,217,900 UART: [ldev] Erasing FE.KEYID = 1
1,244,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,112 UART: [ldev] --
1,283,533 UART: [fwproc] Wait for Commands...
1,284,173 UART: [fwproc] Recv command 0x46574c44
1,284,901 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,902 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,109 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,279 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,960 >>> mbox cmd response: success
2,841,198 UART: [afmc] ++
2,841,366 UART: [afmc] CDI.KEYID = 6
2,841,728 UART: [afmc] SUBJECT.KEYID = 7
2,842,153 UART: [afmc] AUTHORITY.KEYID = 5
2,877,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,453 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,901,162 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,907,045 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,746 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,558 UART: [afmc] --
2,921,650 UART: [cold-reset] --
2,922,376 UART: [state] Locking Datavault
2,923,537 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,141 UART: [state] Locking ICCM
2,924,645 UART: [exit] Launching FMC @ 0x40000130
2,929,975 UART:
2,929,991 UART: Running Caliptra FMC ...
2,930,399 UART:
2,930,542 UART: [state] CFI Enabled
2,941,200 UART: [fht] FMC Alias Private Key: 7
3,060,042 UART: [art] Extend RT PCRs Done
3,060,470 UART: [art] Lock RT PCRs Done
3,061,832 UART: [art] Populate DV Done
3,070,045 UART: [fht] FMC Alias Private Key: 7
3,071,143 UART: [art] Derive CDI
3,071,423 UART: [art] Store in slot 0x4
3,157,326 UART: [art] Derive Key Pair
3,157,686 UART: [art] Store priv key in slot 0x5
3,171,044 UART: [art] Derive Key Pair - Done
3,185,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,152 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,917 UART: [art] PUB.X = A8738BE624A2C141E2672BC8D0445759DA5B99E0566CD9EFF2A223779763C77648BEF96EACC3DCA36312ACFDC99D48CD
3,208,701 UART: [art] PUB.Y = 80B1313AD458C20AA024BF62070657150DA4F6F6CF71AE8F59E7D00971FD2C72A6941E44290CB15E146CBE0FDD482DCA
3,215,640 UART: [art] SIG.R = B7639E550AA1718C130DC3DF5FC4785080E943C4FBD628E221F3A1B50ABF4E413AA1B921482092DF363E90A2EFA6849E
3,222,409 UART: [art] SIG.S = 626705A59CD8B5631ECB7937F691C9409D659E095B994A6F8AACEAE2F0F95A5DBE5DF75B4CA802DA79645EB7B362D4DB
3,246,286 UART: Caliptra RT
3,246,629 UART: [state] CFI Enabled
3,365,532 UART: [rt] RT listening for mailbox commands...
3,366,195 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,956 UART: [rt]cmd =0x46504c54, len=4
3,397,024 >>> mbox cmd response data (8 bytes)
3,397,237 UART: [rt] FIPS self test
3,397,565 UART: [kat] ++
3,397,717 UART: [kat] sha1
3,401,859 UART: [kat] SHA2-256
3,402,417 UART: Fatal Error: 0x90010001
3,403,956 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,961 >>> mbox cmd response: failed
3,403,961 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,966 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,412 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [kat] SHA2-256
893,421 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,546 UART: [kat] ++
897,698 UART: [kat] sha1
901,840 UART: [kat] SHA2-256
903,780 UART: [kat] SHA2-384
906,469 UART: [kat] SHA2-512-ACC
908,370 UART: [kat] ECC-384
917,977 UART: [kat] HMAC-384Kdf
922,443 UART: [kat] LMS
1,170,771 UART: [kat] --
1,171,796 UART: [cold-reset] ++
1,172,188 UART: [fht] FHT @ 0x50003400
1,175,001 UART: [idev] ++
1,175,169 UART: [idev] CDI.KEYID = 6
1,175,529 UART: [idev] SUBJECT.KEYID = 7
1,175,953 UART: [idev] UDS.KEYID = 0
1,176,298 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,147 UART: [idev] Erasing UDS.KEYID = 0
1,201,140 UART: [idev] Sha1 KeyId Algorithm
1,209,426 UART: [idev] --
1,210,588 UART: [ldev] ++
1,210,756 UART: [ldev] CDI.KEYID = 6
1,211,119 UART: [ldev] SUBJECT.KEYID = 5
1,211,545 UART: [ldev] AUTHORITY.KEYID = 7
1,212,008 UART: [ldev] FE.KEYID = 1
1,217,294 UART: [ldev] Erasing FE.KEYID = 1
1,243,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,284 UART: [ldev] --
1,282,765 UART: [fwproc] Wait for Commands...
1,283,365 UART: [fwproc] Recv command 0x46574c44
1,284,093 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,623 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,793 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,400 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,088 ready_for_fw is high
1,061,088 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,967 >>> mbox cmd response: success
2,755,656 UART:
2,755,672 UART: Running Caliptra FMC ...
2,756,080 UART:
2,756,223 UART: [state] CFI Enabled
2,766,851 UART: [fht] FMC Alias Private Key: 7
2,886,547 UART: [art] Extend RT PCRs Done
2,886,975 UART: [art] Lock RT PCRs Done
2,888,711 UART: [art] Populate DV Done
2,897,024 UART: [fht] FMC Alias Private Key: 7
2,898,108 UART: [art] Derive CDI
2,898,388 UART: [art] Store in slot 0x4
2,984,421 UART: [art] Derive Key Pair
2,984,781 UART: [art] Store priv key in slot 0x5
2,998,355 UART: [art] Derive Key Pair - Done
3,013,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,792 UART: [art] PUB.X = 65F54210E3382E1617BE68609B5D7361D8256181542D867AEAC5B94D146AEE947EC04B1E6C895DD21F500E0E8FACABB1
3,036,562 UART: [art] PUB.Y = A3C0B5CBFEC1D16DD6220C1425DC09732313E1DAF7CE2C46907159240EA3B1887EC2B3FA849A0354357A5BD22C4DCE5F
3,043,514 UART: [art] SIG.R = BF65C9671B90816028F9961684608EF8D4632C811699AF9344B12BDC1010CCEF43374F7E1F43876961B60AF76B54BD6E
3,050,277 UART: [art] SIG.S = BBD77A17EC9AB986889D8033313FE1D856F1C04686DCA91F3DA8AC01C26EA21596AE923E864057F90F093108B1604147
3,073,717 UART: Caliptra RT
3,074,060 UART: [state] CFI Enabled
3,193,930 UART: [rt] RT listening for mailbox commands...
3,194,593 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,532 UART: [rt]cmd =0x46504c54, len=4
3,225,706 >>> mbox cmd response data (8 bytes)
3,225,883 UART: [rt] FIPS self test
3,226,211 UART: [kat] ++
3,226,363 UART: [kat] sha1
3,230,553 UART: [kat] SHA2-256
3,230,991 UART: Fatal Error: 0x90010001
3,232,530 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,535 >>> mbox cmd response: failed
3,232,535 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,540 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,700 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,493 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,518,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,668,453 >>> mbox cmd response: failed
2,669,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,817,907 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,440,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,265,786 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,516,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,666,617 >>> mbox cmd response: failed
2,667,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,816,320 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,463,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,299,106 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,445 writing to cptra_bootfsm_go
2,876,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,026,627 >>> mbox cmd response: failed
3,027,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,176,095 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
20,174,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,882,958 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,872,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,022,061 >>> mbox cmd response: failed
3,022,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,171,503 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
20,168,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,868,770 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,516,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,666,548 >>> mbox cmd response: failed
2,667,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,815,991 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,468,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,300,459 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
2,519,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,669,675 >>> mbox cmd response: failed
2,670,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,819,155 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,442,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,267,068 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
2,867,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,017,569 >>> mbox cmd response: failed
3,018,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,167,076 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,167,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,889,505 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,584 writing to cptra_bootfsm_go
2,872,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,022,598 >>> mbox cmd response: failed
3,023,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,172,046 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,180,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,904,536 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,030 >>> mbox cmd response: failed
87,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,036 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,786 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,080 >>> mbox cmd response: failed
87,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,086 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,700 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,731 >>> mbox cmd response: failed
87,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,737 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,041 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
88,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,075 >>> mbox cmd response: failed
88,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,081 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,581 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,252 >>> mbox cmd response: failed
87,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,632 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,480 >>> mbox cmd response: failed
87,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,486 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,390 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,981 >>> mbox cmd response: failed
86,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,987 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,609 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,511 >>> mbox cmd response: failed
87,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,243 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,897 writing to cptra_bootfsm_go
193,148 UART:
193,500 UART: Running Caliptra ROM ...
194,696 UART:
194,850 UART: [state] CFI Enabled
264,942 UART: [state] LifecycleState = Unprovisioned
266,926 UART: [state] DebugLocked = No
268,773 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,868 UART: [kat] SHA2-256
443,559 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,072 UART: [kat] ++
454,554 UART: [kat] sha1
466,495 UART: [kat] SHA2-256
469,222 UART: [kat] SHA2-384
476,705 UART: [kat] SHA2-512-ACC
479,075 UART: [kat] ECC-384
2,768,771 UART: [kat] HMAC-384Kdf
2,800,504 UART: [kat] LMS
3,990,824 UART: [kat] --
3,996,385 UART: [cold-reset] ++
3,997,967 UART: [fht] Storing FHT @ 0x50003400
4,009,401 UART: [idev] ++
4,010,018 UART: [idev] CDI.KEYID = 6
4,010,939 UART: [idev] SUBJECT.KEYID = 7
4,012,129 UART: [idev] UDS.KEYID = 0
4,013,215 ready_for_fw is high
4,013,457 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,163,714 UART: [idev] Erasing UDS.KEYID = 0
7,347,746 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,102 UART: [idev] --
7,373,709 UART: [ldev] ++
7,374,298 UART: [ldev] CDI.KEYID = 6
7,375,271 UART: [ldev] SUBJECT.KEYID = 5
7,376,506 UART: [ldev] AUTHORITY.KEYID = 7
7,377,744 UART: [ldev] FE.KEYID = 1
7,423,015 UART: [ldev] Erasing FE.KEYID = 1
10,752,558 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,515 UART: [ldev] --
13,116,403 UART: [fwproc] Waiting for Commands...
13,119,146 UART: [fwproc] Received command 0x46574c44
13,121,557 UART: [fwproc] Received Image of size 119428 bytes
17,232,146 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,306,015 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,379,164 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,711,610 >>> mbox cmd response: success
17,715,389 UART: [afmc] ++
17,715,994 UART: [afmc] CDI.KEYID = 6
17,716,962 UART: [afmc] SUBJECT.KEYID = 7
17,718,182 UART: [afmc] AUTHORITY.KEYID = 5
21,089,184 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,388,782 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,391,049 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,405,478 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,420,212 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,434,624 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,457,197 UART: [afmc] --
23,461,565 UART: [cold-reset] --
23,464,892 UART: [state] Locking Datavault
23,469,612 UART: [state] Locking PCR0, PCR1 and PCR31
23,471,321 UART: [state] Locking ICCM
23,473,904 UART: [exit] Launching FMC @ 0x40000130
23,482,266 UART:
23,482,506 UART: Running Caliptra FMC ...
23,483,612 UART:
23,483,789 UART: [state] CFI Enabled
23,549,307 UART: [fht] FMC Alias Private Key: 7
25,889,760 UART: [art] Extend RT PCRs Done
25,891,019 UART: [art] Lock RT PCRs Done
25,892,620 UART: [art] Populate DV Done
25,897,927 UART: [fht] FMC Alias Private Key: 7
25,899,529 UART: [art] Derive CDI
25,900,355 UART: [art] Store in slot 0x4
25,958,729 UART: [art] Derive Key Pair
25,959,778 UART: [art] Store priv key in slot 0x5
29,252,376 UART: [art] Derive Key Pair - Done
29,265,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,645 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,181 UART: [art] PUB.X = 0C9176AA8677E94C3B397FF2E96C03C1927AB9058355B1D37B71C29DE11168ACB1127E26F821A46D2A19C922D8EE2EE8
31,563,439 UART: [art] PUB.Y = 0E5CFBC1EDBDF19E8731E8FCA091AE753E525092ED95787A00A14DABA31496C1A7B3B1D753834DE96076F4873107D5B7
31,570,679 UART: [art] SIG.R = 0495BB69264A4188C1A13A6B56896D1A7901DA338F34C4B3818E9D3DCE8C6115A196E62FEFF3585E8D3C66703BAA9384
31,578,020 UART: [art] SIG.S = C165C75FF1AD5392E2571CDC038B80D9B8A01652491ED95704668856CB6CF722A7D9E140B1A5C782F37BBA0E3CF6262C
32,883,634 UART: Caliptra RT
32,884,351 UART: [state] CFI Enabled
33,061,235 UART: [rt] RT listening for mailbox commands...
33,063,096 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,092,849 UART: [rt]cmd =0x46504c54, len=4
33,094,485 >>> mbox cmd response data (8 bytes)
33,095,850 UART: [rt] FIPS self test
33,096,797 UART: [kat] ++
33,097,250 UART: [kat] sha1
33,101,537 UART: [kat] SHA2-256
33,102,930 UART: Fatal Error: 0x90010002
33,138,247 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,288,259 >>> mbox cmd response: failed
33,288,921 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,438,658 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,271 UART:
190,563 UART: Running Caliptra ROM ...
191,589 UART:
191,729 UART: [state] CFI Enabled
250,757 UART: [state] LifecycleState = Unprovisioned
252,727 UART: [state] DebugLocked = No
255,316 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
260,908 UART: [kat] SHA2-256
430,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
441,098 UART: [kat] ++
441,552 UART: [kat] sha1
451,908 UART: [kat] SHA2-256
454,600 UART: [kat] SHA2-384
459,554 UART: [kat] SHA2-512-ACC
461,946 UART: [kat] ECC-384
2,751,991 UART: [kat] HMAC-384Kdf
2,762,986 UART: [kat] LMS
3,953,287 UART: [kat] --
3,958,349 UART: [cold-reset] ++
3,960,928 UART: [fht] Storing FHT @ 0x50003400
3,972,197 UART: [idev] ++
3,972,769 UART: [idev] CDI.KEYID = 6
3,973,711 UART: [idev] SUBJECT.KEYID = 7
3,974,983 UART: [idev] UDS.KEYID = 0
3,976,484 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,126,587 UART: [idev] Erasing UDS.KEYID = 0
7,321,891 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,506 UART: [idev] --
7,345,655 UART: [ldev] ++
7,346,227 UART: [ldev] CDI.KEYID = 6
7,347,245 UART: [ldev] SUBJECT.KEYID = 5
7,348,408 UART: [ldev] AUTHORITY.KEYID = 7
7,349,698 UART: [ldev] FE.KEYID = 1
7,398,185 UART: [ldev] Erasing FE.KEYID = 1
10,731,182 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,773 UART: [ldev] --
13,092,612 UART: [fwproc] Waiting for Commands...
13,095,689 UART: [fwproc] Received command 0x46574c44
13,097,938 UART: [fwproc] Received Image of size 119428 bytes
17,207,642 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,280,711 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,353,891 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,685,237 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,804,409 ready_for_fw is high
3,804,846 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,998,221 >>> mbox cmd response: success
23,693,000 UART:
23,693,497 UART: Running Caliptra FMC ...
23,694,640 UART:
23,694,804 UART: [state] CFI Enabled
23,764,017 UART: [fht] FMC Alias Private Key: 7
26,104,748 UART: [art] Extend RT PCRs Done
26,105,994 UART: [art] Lock RT PCRs Done
26,107,438 UART: [art] Populate DV Done
26,113,037 UART: [fht] FMC Alias Private Key: 7
26,114,697 UART: [art] Derive CDI
26,115,518 UART: [art] Store in slot 0x4
26,173,319 UART: [art] Derive Key Pair
26,174,322 UART: [art] Store priv key in slot 0x5
29,467,153 UART: [art] Derive Key Pair - Done
29,480,438 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,768,650 UART: [art] Erasing AUTHORITY.KEYID = 7
31,770,161 UART: [art] PUB.X = 5DA94DD8451AD5756DF4BFE62E017595AFC2AD61808F0F8CB93E906BD83E0B464719C4813873F6F7963AA2E3D4DD5100
31,777,376 UART: [art] PUB.Y = 66E20AFD232AC928A09E8D8A80E1C822A530983648D3AC6D11A0EDD0A4066C50DE27EB48CCBB12BF5E67FEBFCD90074B
31,784,697 UART: [art] SIG.R = 53189F8ACBCB9EB30EC9AF2A6E363265A87BC99C6F223377A77C3719C8342C8A6D49B631F125E097C7DDEF7EDC2DE3C2
31,792,117 UART: [art] SIG.S = 3C36FBEA1A1B32F41E3D888D9AB31B23B4EAB92655A9D4217111FD25C0E2DE1E6575137D870F13E330C00C7F9D1517D9
33,097,438 UART: Caliptra RT
33,098,158 UART: [state] CFI Enabled
33,275,694 UART: [rt] RT listening for mailbox commands...
33,277,558 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,307,203 UART: [rt]cmd =0x46504c54, len=4
33,308,983 >>> mbox cmd response data (8 bytes)
33,310,104 UART: [rt] FIPS self test
33,311,050 UART: [kat] ++
33,311,506 UART: [kat] sha1
33,315,744 UART: [kat] SHA2-256
33,317,352 UART: Fatal Error: 0x90010002
33,352,563 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,502,573 >>> mbox cmd response: failed
33,503,245 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,653,208 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,794,753 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,988,533 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,393 UART:
192,757 UART: Running Caliptra ROM ...
193,849 UART:
603,631 UART: [state] CFI Enabled
615,108 UART: [state] LifecycleState = Unprovisioned
617,057 UART: [state] DebugLocked = No
619,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,068 UART: [kat] SHA2-256
792,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,350 UART: [kat] ++
803,991 UART: [kat] sha1
814,818 UART: [kat] SHA2-256
817,555 UART: [kat] SHA2-384
823,711 UART: [kat] SHA2-512-ACC
825,914 UART: [kat] ECC-384
3,112,685 UART: [kat] HMAC-384Kdf
3,125,349 UART: [kat] LMS
4,315,525 UART: [kat] --
4,320,593 UART: [cold-reset] ++
4,323,025 UART: [fht] Storing FHT @ 0x50003400
4,335,153 UART: [idev] ++
4,335,807 UART: [idev] CDI.KEYID = 6
4,336,733 UART: [idev] SUBJECT.KEYID = 7
4,337,932 UART: [idev] UDS.KEYID = 0
4,338,975 ready_for_fw is high
4,339,201 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,489,656 UART: [idev] Erasing UDS.KEYID = 0
7,629,342 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,307 UART: [idev] --
7,654,480 UART: [ldev] ++
7,655,057 UART: [ldev] CDI.KEYID = 6
7,656,085 UART: [ldev] SUBJECT.KEYID = 5
7,657,198 UART: [ldev] AUTHORITY.KEYID = 7
7,658,496 UART: [ldev] FE.KEYID = 1
7,669,206 UART: [ldev] Erasing FE.KEYID = 1
10,959,965 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,963 UART: [ldev] --
13,321,869 UART: [fwproc] Waiting for Commands...
13,324,679 UART: [fwproc] Received command 0x46574c44
13,326,869 UART: [fwproc] Received Image of size 119428 bytes
17,433,371 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,511,375 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,584,519 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,916,997 >>> mbox cmd response: success
17,921,890 UART: [afmc] ++
17,922,488 UART: [afmc] CDI.KEYID = 6
17,923,376 UART: [afmc] SUBJECT.KEYID = 7
17,924,653 UART: [afmc] AUTHORITY.KEYID = 5
21,235,148 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,357 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,530,624 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,118 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,559,829 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,205 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,595,690 UART: [afmc] --
23,599,771 UART: [cold-reset] --
23,604,605 UART: [state] Locking Datavault
23,609,643 UART: [state] Locking PCR0, PCR1 and PCR31
23,611,347 UART: [state] Locking ICCM
23,613,313 UART: [exit] Launching FMC @ 0x40000130
23,621,709 UART:
23,621,950 UART: Running Caliptra FMC ...
23,622,982 UART:
23,623,136 UART: [state] CFI Enabled
23,631,321 UART: [fht] FMC Alias Private Key: 7
25,971,773 UART: [art] Extend RT PCRs Done
25,972,997 UART: [art] Lock RT PCRs Done
25,974,781 UART: [art] Populate DV Done
25,980,149 UART: [fht] FMC Alias Private Key: 7
25,981,694 UART: [art] Derive CDI
25,982,433 UART: [art] Store in slot 0x4
26,024,695 UART: [art] Derive Key Pair
26,025,741 UART: [art] Store priv key in slot 0x5
29,267,826 UART: [art] Derive Key Pair - Done
29,280,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,159 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,673 UART: [art] PUB.X = EBE2CCBCDE699C9E0DBD50CEDBAB989D0277FD372F835F438DF29A746FC14B0CE1C7CC72EB3B6ACEE545F1BD4430B164
31,569,983 UART: [art] PUB.Y = DECD8F8A84D18C2D7531A6B83E6F18A1CA54EBA7EBFAC8E4CE60FBAF3AB5969510BAF4E0D8ECCF5C9F2594D0E627B60F
31,577,281 UART: [art] SIG.R = 892E066276A2A27E8EEAE2A1394E7A3A8D5B975A61E3AE7A40722D887BB4CCED024D21C572D41769F485B2CD9EFF7ABE
31,584,739 UART: [art] SIG.S = 2E6B48606BD67B51246F9DBEEC6B5382EF4D9BFF96B7C6136C2A3005243B40DB9BA2FBE69F00C7D2CA5A38F037EA6919
32,890,323 UART: Caliptra RT
32,891,044 UART: [state] CFI Enabled
33,024,384 UART: [rt] RT listening for mailbox commands...
33,026,267 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,056,067 UART: [rt]cmd =0x46504c54, len=4
33,057,601 >>> mbox cmd response data (8 bytes)
33,058,857 UART: [rt] FIPS self test
33,059,809 UART: [kat] ++
33,060,259 UART: [kat] sha1
33,064,617 UART: [kat] SHA2-256
33,066,275 UART: Fatal Error: 0x90010002
33,101,449 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,251,388 >>> mbox cmd response: failed
33,252,026 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,401,907 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,083 UART:
190,376 UART: Running Caliptra ROM ...
191,505 UART:
7,128,816 UART: [state] CFI Enabled
7,144,571 UART: [state] LifecycleState = Unprovisioned
7,146,484 UART: [state] DebugLocked = No
7,148,224 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,152,525 UART: [kat] SHA2-256
7,322,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,332,806 UART: [kat] ++
7,333,272 UART: [kat] sha1
7,343,320 UART: [kat] SHA2-256
7,346,033 UART: [kat] SHA2-384
7,352,590 UART: [kat] SHA2-512-ACC
7,354,951 UART: [kat] ECC-384
9,639,199 UART: [kat] HMAC-384Kdf
9,651,320 UART: [kat] LMS
10,841,382 UART: [kat] --
10,846,056 UART: [cold-reset] ++
10,847,620 UART: [fht] Storing FHT @ 0x50003400
10,858,516 UART: [idev] ++
10,859,091 UART: [idev] CDI.KEYID = 6
10,860,117 UART: [idev] SUBJECT.KEYID = 7
10,861,477 UART: [idev] UDS.KEYID = 0
10,863,076 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,012,947 UART: [idev] Erasing UDS.KEYID = 0
14,143,725 UART: [idev] Using Sha1 for KeyId Algorithm
14,166,403 UART: [idev] --
14,170,829 UART: [ldev] ++
14,171,397 UART: [ldev] CDI.KEYID = 6
14,172,366 UART: [ldev] SUBJECT.KEYID = 5
14,173,589 UART: [ldev] AUTHORITY.KEYID = 7
14,174,828 UART: [ldev] FE.KEYID = 1
14,184,237 UART: [ldev] Erasing FE.KEYID = 1
17,474,567 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,769,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,783,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,798,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,813,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,830,645 UART: [ldev] --
19,835,330 UART: [fwproc] Waiting for Commands...
19,838,631 UART: [fwproc] Received command 0x46574c44
19,840,875 UART: [fwproc] Received Image of size 119428 bytes
23,960,817 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,039,128 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,112,263 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,444,751 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,128,387 ready_for_fw is high
4,128,886 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,178,786 >>> mbox cmd response: success
23,820,216 UART:
23,820,682 UART: Running Caliptra FMC ...
23,821,802 UART:
23,821,963 UART: [state] CFI Enabled
23,829,596 UART: [fht] FMC Alias Private Key: 7
26,169,029 UART: [art] Extend RT PCRs Done
26,170,261 UART: [art] Lock RT PCRs Done
26,172,026 UART: [art] Populate DV Done
26,177,461 UART: [fht] FMC Alias Private Key: 7
26,178,957 UART: [art] Derive CDI
26,179,701 UART: [art] Store in slot 0x4
26,222,708 UART: [art] Derive Key Pair
26,223,713 UART: [art] Store priv key in slot 0x5
29,465,881 UART: [art] Derive Key Pair - Done
29,479,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,758,961 UART: [art] Erasing AUTHORITY.KEYID = 7
31,760,479 UART: [art] PUB.X = 9E71E857BD7DC2B7FADA0E0DDD8BA9E9C45A81B526123A595EAE85358DD155800DDF7D8BCD853719AC0D86D971A6E540
31,767,747 UART: [art] PUB.Y = 518041DD2D02269FC14D3C20B4BAA9C7DAFC718CFDC7E3CE6D40AE1A4ECE508C8C322252A8DA5A434751B1BFFE08F719
31,775,048 UART: [art] SIG.R = C7B5565A03F888BFC52563868466DCA508FD266D79AF8022880FBFCE491538590CF41648FE46371A3AE332EE84C4579E
31,782,416 UART: [art] SIG.S = 9DE0CA1382068DA348C0334F2CD8FF175893E990A7BA204CD5A47BA4DDD3E2FAB004FA59488CB87AC0265A83921FE8F1
33,087,797 UART: Caliptra RT
33,088,522 UART: [state] CFI Enabled
33,221,105 UART: [rt] RT listening for mailbox commands...
33,222,966 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,252,560 UART: [rt]cmd =0x46504c54, len=4
33,253,974 >>> mbox cmd response data (8 bytes)
33,255,257 UART: [rt] FIPS self test
33,256,211 UART: [kat] ++
33,256,663 UART: [kat] sha1
33,261,086 UART: [kat] SHA2-256
33,262,650 UART: Fatal Error: 0x90010002
33,297,896 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,448,450 >>> mbox cmd response: failed
33,449,165 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,599,048 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
10,465,431 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,518,577 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,170 UART:
192,550 UART: Running Caliptra ROM ...
193,763 UART:
193,921 UART: [state] CFI Enabled
263,756 UART: [state] LifecycleState = Unprovisioned
265,693 UART: [state] DebugLocked = No
268,230 UART: [state] WD Timer not started. Device not locked for debugging
271,286 UART: [kat] SHA2-256
450,958 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,765 UART: [kat] ++
462,221 UART: [kat] sha1
474,804 UART: [kat] SHA2-256
477,539 UART: [kat] SHA2-384
483,466 UART: [kat] SHA2-512-ACC
485,840 UART: [kat] ECC-384
2,947,798 UART: [kat] HMAC-384Kdf
2,971,623 UART: [kat] LMS
3,448,126 UART: [kat] --
3,451,086 UART: [cold-reset] ++
3,453,102 UART: [fht] FHT @ 0x50003400
3,465,365 UART: [idev] ++
3,465,956 UART: [idev] CDI.KEYID = 6
3,466,925 UART: [idev] SUBJECT.KEYID = 7
3,468,107 UART: [idev] UDS.KEYID = 0
3,469,114 ready_for_fw is high
3,469,321 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,619,529 UART: [idev] Erasing UDS.KEYID = 0
5,990,958 UART: [idev] Sha1 KeyId Algorithm
6,013,336 UART: [idev] --
6,017,666 UART: [ldev] ++
6,018,247 UART: [ldev] CDI.KEYID = 6
6,019,227 UART: [ldev] SUBJECT.KEYID = 5
6,020,401 UART: [ldev] AUTHORITY.KEYID = 7
6,021,643 UART: [ldev] FE.KEYID = 1
6,057,645 UART: [ldev] Erasing FE.KEYID = 1
8,563,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,765 UART: [ldev] --
10,373,400 UART: [fwproc] Wait for Commands...
10,375,889 UART: [fwproc] Recv command 0x46574c44
10,377,939 UART: [fwproc] Recv'd Img size: 119428 bytes
13,868,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,808 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,818 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,355,758 >>> mbox cmd response: success
14,359,255 UART: [afmc] ++
14,359,849 UART: [afmc] CDI.KEYID = 6
14,360,820 UART: [afmc] SUBJECT.KEYID = 7
14,362,040 UART: [afmc] AUTHORITY.KEYID = 5
16,898,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,875 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,646 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,718 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,670,310 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,758 UART: [afmc] --
18,697,800 UART: [cold-reset] --
18,702,099 UART: [state] Locking Datavault
18,708,068 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,777 UART: [state] Locking ICCM
18,711,367 UART: [exit] Launching FMC @ 0x40000130
18,719,768 UART:
18,720,006 UART: Running Caliptra FMC ...
18,721,044 UART:
18,721,196 UART: [state] CFI Enabled
18,778,147 UART: [fht] FMC Alias Private Key: 7
20,565,453 UART: [art] Extend RT PCRs Done
20,566,679 UART: [art] Lock RT PCRs Done
20,568,434 UART: [art] Populate DV Done
20,573,902 UART: [fht] FMC Alias Private Key: 7
20,575,494 UART: [art] Derive CDI
20,576,310 UART: [art] Store in slot 0x4
20,631,561 UART: [art] Derive Key Pair
20,632,605 UART: [art] Store priv key in slot 0x5
23,095,273 UART: [art] Derive Key Pair - Done
23,108,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,829 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,332 UART: [art] PUB.X = FF25491B2E51001D9FA8E9EB66B95B94A361516FBC84F2A711C9212F294CDECCF7F77468827A64EED83C7E1C127FABE3
24,829,618 UART: [art] PUB.Y = 747A9DDD7CE404E3065D0051F24E0F6B2A80229313DCE1C9078ED01D880319B963AA81BCB75BA58A50DE554C53B41F91
24,836,838 UART: [art] SIG.R = 757F8DF85CB6F8374A444A83E373338120AE991D1493872A1E217CF7DBCB670D638B1AD29CCBB09C7FDAC778A4CF5B09
24,844,204 UART: [art] SIG.S = A53FB47C9A831ED9230476D933CB442D7D24028D184B8B030ABCD1E780FDA30F4598F016EE9A61AC6F81A6C9A5721589
25,823,688 UART: Caliptra RT
25,824,402 UART: [state] CFI Enabled
26,002,807 UART: [rt] RT listening for mailbox commands...
26,004,664 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,034,478 UART: [rt]cmd =0x46504c54, len=4
26,035,958 >>> mbox cmd response data (8 bytes)
26,037,199 UART: [rt] FIPS self test
26,038,142 UART: [kat] ++
26,038,594 UART: [kat] sha1
26,043,030 UART: [kat] SHA2-256
26,044,543 UART: Fatal Error: 0x90010002
26,079,912 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,229,956 >>> mbox cmd response: failed
26,230,610 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,380,967 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,131 UART:
190,421 UART: Running Caliptra ROM ...
191,481 UART:
191,623 UART: [state] CFI Enabled
246,497 UART: [state] LifecycleState = Unprovisioned
248,417 UART: [state] DebugLocked = No
249,637 UART: [state] WD Timer not started. Device not locked for debugging
254,339 UART: [kat] SHA2-256
433,979 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
444,735 UART: [kat] ++
445,241 UART: [kat] sha1
456,500 UART: [kat] SHA2-256
459,237 UART: [kat] SHA2-384
464,951 UART: [kat] SHA2-512-ACC
467,339 UART: [kat] ECC-384
2,911,731 UART: [kat] HMAC-384Kdf
2,933,065 UART: [kat] LMS
3,409,562 UART: [kat] --
3,412,588 UART: [cold-reset] ++
3,413,664 UART: [fht] FHT @ 0x50003400
3,424,566 UART: [idev] ++
3,425,190 UART: [idev] CDI.KEYID = 6
3,426,111 UART: [idev] SUBJECT.KEYID = 7
3,427,331 UART: [idev] UDS.KEYID = 0
3,428,907 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,578,886 UART: [idev] Erasing UDS.KEYID = 0
5,948,390 UART: [idev] Sha1 KeyId Algorithm
5,972,211 UART: [idev] --
5,977,018 UART: [ldev] ++
5,977,595 UART: [ldev] CDI.KEYID = 6
5,978,508 UART: [ldev] SUBJECT.KEYID = 5
5,979,727 UART: [ldev] AUTHORITY.KEYID = 7
5,980,986 UART: [ldev] FE.KEYID = 1
6,017,834 UART: [ldev] Erasing FE.KEYID = 1
8,523,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,261,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,277,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,293,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,308,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,331,126 UART: [ldev] --
10,336,937 UART: [fwproc] Wait for Commands...
10,339,262 UART: [fwproc] Recv command 0x46574c44
10,341,255 UART: [fwproc] Recv'd Img size: 119428 bytes
13,842,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,924,427 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,997,449 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,328,258 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,461,478 ready_for_fw is high
3,461,951 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,267,142 >>> mbox cmd response: success
18,549,372 UART:
18,549,771 UART: Running Caliptra FMC ...
18,550,922 UART:
18,551,082 UART: [state] CFI Enabled
18,615,488 UART: [fht] FMC Alias Private Key: 7
20,381,854 UART: [art] Extend RT PCRs Done
20,383,083 UART: [art] Lock RT PCRs Done
20,384,771 UART: [art] Populate DV Done
20,390,044 UART: [fht] FMC Alias Private Key: 7
20,391,654 UART: [art] Derive CDI
20,392,480 UART: [art] Store in slot 0x4
20,448,568 UART: [art] Derive Key Pair
20,449,620 UART: [art] Store priv key in slot 0x5
22,912,678 UART: [art] Derive Key Pair - Done
22,925,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,637,416 UART: [art] Erasing AUTHORITY.KEYID = 7
24,639,210 UART: [art] PUB.X = 7969381D00D2874BA40C0DBB40E95B4A9BF8A79439BFFFD46B0BEE580BA35CA0A14C1D373EAD8B81B789B156B69C1875
24,646,212 UART: [art] PUB.Y = 9B63B4D46883E31DADD7CB4772E2B7FAACFAEED264581F65D7BF29342510AE2BC40DEEB07101D6CFFD7D4A738C309CB4
24,653,477 UART: [art] SIG.R = 88D16BA209D64B26B88B895AC270D5FCAD3F2E881BBA76932F9273FA8B6C402DB9508F6F750382869777613B1E82C0E3
24,660,893 UART: [art] SIG.S = 24EC9D374FCEAD312B04BB5BF4AE1B4BECBFB181605FB4D2361817CE410A75D538736CC245356610E8CF1C9E19714C5C
25,639,924 UART: Caliptra RT
25,640,628 UART: [state] CFI Enabled
25,821,717 UART: [rt] RT listening for mailbox commands...
25,823,612 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,853,452 UART: [rt]cmd =0x46504c54, len=4
25,855,144 >>> mbox cmd response data (8 bytes)
25,856,390 UART: [rt] FIPS self test
25,857,338 UART: [kat] ++
25,857,794 UART: [kat] sha1
25,862,175 UART: [kat] SHA2-256
25,863,690 UART: Fatal Error: 0x90010002
25,898,777 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,048,797 >>> mbox cmd response: failed
26,049,462 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,199,378 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,452,820 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,252,918 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,521 UART:
192,923 UART: Running Caliptra ROM ...
194,049 UART:
603,750 UART: [state] CFI Enabled
618,486 UART: [state] LifecycleState = Unprovisioned
620,370 UART: [state] DebugLocked = No
622,269 UART: [state] WD Timer not started. Device not locked for debugging
625,841 UART: [kat] SHA2-256
805,452 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,240 UART: [kat] ++
816,768 UART: [kat] sha1
827,447 UART: [kat] SHA2-256
830,151 UART: [kat] SHA2-384
836,512 UART: [kat] SHA2-512-ACC
838,892 UART: [kat] ECC-384
3,279,218 UART: [kat] HMAC-384Kdf
3,291,106 UART: [kat] LMS
3,767,585 UART: [kat] --
3,772,442 UART: [cold-reset] ++
3,775,020 UART: [fht] FHT @ 0x50003400
3,785,881 UART: [idev] ++
3,786,493 UART: [idev] CDI.KEYID = 6
3,787,387 UART: [idev] SUBJECT.KEYID = 7
3,788,641 UART: [idev] UDS.KEYID = 0
3,789,572 ready_for_fw is high
3,789,780 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,939,602 UART: [idev] Erasing UDS.KEYID = 0
6,262,752 UART: [idev] Sha1 KeyId Algorithm
6,286,769 UART: [idev] --
6,293,260 UART: [ldev] ++
6,293,891 UART: [ldev] CDI.KEYID = 6
6,294,808 UART: [ldev] SUBJECT.KEYID = 5
6,295,913 UART: [ldev] AUTHORITY.KEYID = 7
6,297,276 UART: [ldev] FE.KEYID = 1
6,308,090 UART: [ldev] Erasing FE.KEYID = 1
8,787,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,446 UART: [ldev] --
10,582,695 UART: [fwproc] Wait for Commands...
10,585,542 UART: [fwproc] Recv command 0x46574c44
10,587,601 UART: [fwproc] Recv'd Img size: 119428 bytes
14,083,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,167,001 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,240,026 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,571,714 >>> mbox cmd response: success
14,576,344 UART: [afmc] ++
14,576,953 UART: [afmc] CDI.KEYID = 6
14,577,870 UART: [afmc] SUBJECT.KEYID = 7
14,579,093 UART: [afmc] AUTHORITY.KEYID = 5
17,082,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,806,324 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,808,565 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,824,392 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,840,456 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,856,011 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,879,977 UART: [afmc] --
18,884,059 UART: [cold-reset] --
18,888,525 UART: [state] Locking Datavault
18,893,883 UART: [state] Locking PCR0, PCR1 and PCR31
18,895,587 UART: [state] Locking ICCM
18,898,335 UART: [exit] Launching FMC @ 0x40000130
18,906,726 UART:
18,907,005 UART: Running Caliptra FMC ...
18,908,124 UART:
18,908,290 UART: [state] CFI Enabled
18,916,342 UART: [fht] FMC Alias Private Key: 7
20,682,547 UART: [art] Extend RT PCRs Done
20,683,773 UART: [art] Lock RT PCRs Done
20,685,640 UART: [art] Populate DV Done
20,691,122 UART: [fht] FMC Alias Private Key: 7
20,692,827 UART: [art] Derive CDI
20,693,651 UART: [art] Store in slot 0x4
20,736,464 UART: [art] Derive Key Pair
20,737,470 UART: [art] Store priv key in slot 0x5
23,164,541 UART: [art] Derive Key Pair - Done
23,177,469 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,883,786 UART: [art] Erasing AUTHORITY.KEYID = 7
24,885,285 UART: [art] PUB.X = D65110840F3FEFDAE1AA7DC4840811557452F14175C73A31A519A4CAC1A276A723E7F71752D67B005E77C3668BFF2FBE
24,892,563 UART: [art] PUB.Y = 47F620142C9E2C6AD6F50BD06D30A726CD76DBDC2FC5A16B947735368AFB9CA1CA169B19A77E1FB474F2703743CB33DC
24,899,866 UART: [art] SIG.R = CF64DB5694B8B543E21AA8749ACDBD97EB55F7C83A127642A917E5FFC3407B3059C7048F1C71665DCEE9E6C71025BB11
24,907,311 UART: [art] SIG.S = 8DA89B1EC7BF10A5862DED1CBC48AA8FB8F36BE1E4D4A506B726C94066385171F23AE2D60C34FD3851102D36A4638052
25,886,236 UART: Caliptra RT
25,886,927 UART: [state] CFI Enabled
26,019,804 UART: [rt] RT listening for mailbox commands...
26,022,139 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,051,731 UART: [rt]cmd =0x46504c54, len=4
26,053,323 >>> mbox cmd response data (8 bytes)
26,054,545 UART: [rt] FIPS self test
26,055,501 UART: [kat] ++
26,055,962 UART: [kat] sha1
26,060,155 UART: [kat] SHA2-256
26,061,605 UART: Fatal Error: 0x90010002
26,096,822 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,246,781 >>> mbox cmd response: failed
26,247,478 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,397,410 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,093 UART:
190,392 UART: Running Caliptra ROM ...
191,425 UART:
14,125,001 UART: [state] CFI Enabled
14,139,676 UART: [state] LifecycleState = Unprovisioned
14,141,603 UART: [state] DebugLocked = No
14,143,105 UART: [state] WD Timer not started. Device not locked for debugging
14,147,668 UART: [kat] SHA2-256
14,327,335 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,338,154 UART: [kat] ++
14,338,704 UART: [kat] sha1
14,349,721 UART: [kat] SHA2-256
14,352,421 UART: [kat] SHA2-384
14,357,938 UART: [kat] SHA2-512-ACC
14,360,299 UART: [kat] ECC-384
16,803,747 UART: [kat] HMAC-384Kdf
16,816,354 UART: [kat] LMS
17,292,822 UART: [kat] --
17,297,457 UART: [cold-reset] ++
17,298,907 UART: [fht] FHT @ 0x50003400
17,310,243 UART: [idev] ++
17,310,846 UART: [idev] CDI.KEYID = 6
17,311,819 UART: [idev] SUBJECT.KEYID = 7
17,313,045 UART: [idev] UDS.KEYID = 0
17,314,550 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,464,440 UART: [idev] Erasing UDS.KEYID = 0
19,796,174 UART: [idev] Sha1 KeyId Algorithm
19,820,104 UART: [idev] --
19,825,252 UART: [ldev] ++
19,825,880 UART: [ldev] CDI.KEYID = 6
19,826,789 UART: [ldev] SUBJECT.KEYID = 5
19,828,000 UART: [ldev] AUTHORITY.KEYID = 7
19,829,237 UART: [ldev] FE.KEYID = 1
19,839,592 UART: [ldev] Erasing FE.KEYID = 1
22,318,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,039,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,055,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,071,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,086,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,108,889 UART: [ldev] --
24,113,790 UART: [fwproc] Wait for Commands...
24,115,730 UART: [fwproc] Recv command 0x46574c44
24,117,721 UART: [fwproc] Recv'd Img size: 119428 bytes
27,612,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,689,527 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,762,547 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,094,056 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,777,078 ready_for_fw is high
3,777,548 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,463,039 >>> mbox cmd response: success
18,712,779 UART:
18,713,191 UART: Running Caliptra FMC ...
18,714,349 UART:
18,714,517 UART: [state] CFI Enabled
18,722,322 UART: [fht] FMC Alias Private Key: 7
20,488,847 UART: [art] Extend RT PCRs Done
20,490,062 UART: [art] Lock RT PCRs Done
20,492,097 UART: [art] Populate DV Done
20,497,739 UART: [fht] FMC Alias Private Key: 7
20,499,287 UART: [art] Derive CDI
20,500,114 UART: [art] Store in slot 0x4
20,542,662 UART: [art] Derive Key Pair
20,543,668 UART: [art] Store priv key in slot 0x5
22,970,682 UART: [art] Derive Key Pair - Done
22,983,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,689,756 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,260 UART: [art] PUB.X = EB01EE678CA166FC66E588039CEFB79987F71428BEADC8337E0449D08FAECFFD500AC3CCAE4A200A5BF6CA11BCA09B1D
24,698,576 UART: [art] PUB.Y = 70FB36B1C73DE7D472455880206348AA4212C5D8555E06E61A4997ACF647005CB8A1F5FF52426EDB52445F68B546D17A
24,705,780 UART: [art] SIG.R = 1F26A575D0092A2AA8645C31118302218951492B18F3633B0E0EF2EB3F0E28FFD09EF24AAD1A192BCF6F26E54C929B5F
24,713,181 UART: [art] SIG.S = 19E96AD2C5E51FB6450A0045CDA57EE0EAB08430ACF338D7511A3E54EDE495A5CA4C12C3FCE7DCD0232C5142287EEDE4
25,692,697 UART: Caliptra RT
25,693,408 UART: [state] CFI Enabled
25,827,321 UART: [rt] RT listening for mailbox commands...
25,829,176 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,858,918 UART: [rt]cmd =0x46504c54, len=4
25,860,369 >>> mbox cmd response data (8 bytes)
25,861,327 UART: [rt] FIPS self test
25,862,274 UART: [kat] ++
25,862,734 UART: [kat] sha1
25,866,871 UART: [kat] SHA2-256
25,868,317 UART: Fatal Error: 0x90010002
25,903,529 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,053,538 >>> mbox cmd response: failed
26,054,154 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,204,027 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
17,494,813 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,167,300 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
192,251 UART:
192,609 UART: Running Caliptra ROM ...
193,804 UART:
193,965 UART: [state] CFI Enabled
264,893 UART: [state] LifecycleState = Unprovisioned
267,336 UART: [state] DebugLocked = No
269,821 UART: [state] WD Timer not started. Device not locked for debugging
275,295 UART: [kat] SHA2-256
465,126 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,896 UART: [kat] ++
476,382 UART: [kat] sha1
486,906 UART: [kat] SHA2-256
489,924 UART: [kat] SHA2-384
497,200 UART: [kat] SHA2-512-ACC
499,792 UART: [kat] ECC-384
2,946,608 UART: [kat] HMAC-384Kdf
2,973,132 UART: [kat] LMS
3,504,953 UART: [kat] --
3,509,233 UART: [cold-reset] ++
3,510,615 UART: [fht] FHT @ 0x50003400
3,523,592 UART: [idev] ++
3,524,305 UART: [idev] CDI.KEYID = 6
3,525,345 UART: [idev] SUBJECT.KEYID = 7
3,526,457 UART: [idev] UDS.KEYID = 0
3,527,392 ready_for_fw is high
3,527,631 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,677,811 UART: [idev] Erasing UDS.KEYID = 0
6,031,581 UART: [idev] Sha1 KeyId Algorithm
6,054,809 UART: [idev] --
6,059,278 UART: [ldev] ++
6,059,970 UART: [ldev] CDI.KEYID = 6
6,060,903 UART: [ldev] SUBJECT.KEYID = 5
6,062,020 UART: [ldev] AUTHORITY.KEYID = 7
6,063,265 UART: [ldev] FE.KEYID = 1
6,101,245 UART: [ldev] Erasing FE.KEYID = 1
8,610,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,163 UART: [ldev] --
10,415,459 UART: [fwproc] Wait for Commands...
10,417,075 UART: [fwproc] Recv command 0x46574c44
10,419,349 UART: [fwproc] Recv'd Img size: 119428 bytes
13,928,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,616 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,219 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,688,459 >>> mbox cmd response: success
14,693,340 UART: [afmc] ++
14,694,052 UART: [afmc] CDI.KEYID = 6
14,695,167 UART: [afmc] SUBJECT.KEYID = 7
14,696,754 UART: [afmc] AUTHORITY.KEYID = 5
17,241,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,984,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,986,406 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,001,494 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,016,674 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,031,630 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,055,780 UART: [afmc] --
19,060,092 UART: [cold-reset] --
19,064,673 UART: [state] Locking Datavault
19,068,418 UART: [state] Locking PCR0, PCR1 and PCR31
19,070,565 UART: [state] Locking ICCM
19,073,105 UART: [exit] Launching FMC @ 0x40000130
19,081,779 UART:
19,082,021 UART: Running Caliptra FMC ...
19,083,133 UART:
19,083,301 UART: [state] CFI Enabled
19,140,855 UART: [fht] FMC Alias Private Key: 7
20,907,624 UART: [art] Extend RT PCRs Done
20,908,842 UART: [art] Lock RT PCRs Done
20,910,634 UART: [art] Populate DV Done
20,916,001 UART: [fht] FMC Alias Private Key: 7
20,917,529 UART: [art] Derive CDI
20,918,372 UART: [art] Store in slot 0x4
20,973,903 UART: [art] Derive Key Pair
20,974,947 UART: [art] Store priv key in slot 0x5
23,450,957 UART: [art] Derive Key Pair - Done
23,464,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,176,762 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,274 UART: [art] PUB.X = 94EB7803F3BD4375F53760E3DC7BF8F8166FCA83B1E3B7FDF4CD77F046070F242ABE419D213938A2F1F733C4B4A200BA
25,185,538 UART: [art] PUB.Y = E569F2392A3998CD92D548A0C5A49D70BBECD05443C4943C4F2DBD33D9E86FC12994F22629E43319EC5C1B24B21688AC
25,192,789 UART: [art] SIG.R = 4175F577FF07E997D21B390DC455DBBCB5BEB32195A7F6C49D133A795C7876726DB6739AA0F228F88510D5BD886A76DD
25,200,194 UART: [art] SIG.S = 6C929948347A11AAC90952116884D96C40544E460DD1E87127135983859651479F4E534965F60FECAFF3EEECA6E8E931
26,179,191 UART: Caliptra RT
26,179,888 UART: [state] CFI Enabled
26,360,188 UART: [rt] RT listening for mailbox commands...
26,362,048 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,392,030 UART: [rt]cmd =0x46504c54, len=4
26,393,562 >>> mbox cmd response data (8 bytes)
26,394,583 UART: [rt] FIPS self test
26,395,537 UART: [kat] ++
26,395,998 UART: [kat] sha1
26,400,459 UART: [kat] SHA2-256
26,401,907 UART: Fatal Error: 0x90010002
26,437,126 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,587,154 >>> mbox cmd response: failed
26,587,786 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,737,735 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
190,121 UART:
190,429 UART: Running Caliptra ROM ...
191,487 UART:
191,633 UART: [state] CFI Enabled
249,949 UART: [state] LifecycleState = Unprovisioned
252,365 UART: [state] DebugLocked = No
254,558 UART: [state] WD Timer not started. Device not locked for debugging
258,794 UART: [kat] SHA2-256
448,686 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
459,478 UART: [kat] ++
459,957 UART: [kat] sha1
470,786 UART: [kat] SHA2-256
473,810 UART: [kat] SHA2-384
480,712 UART: [kat] SHA2-512-ACC
483,333 UART: [kat] ECC-384
2,935,094 UART: [kat] HMAC-384Kdf
2,957,697 UART: [kat] LMS
3,489,484 UART: [kat] --
3,493,762 UART: [cold-reset] ++
3,494,999 UART: [fht] FHT @ 0x50003400
3,506,331 UART: [idev] ++
3,507,017 UART: [idev] CDI.KEYID = 6
3,508,046 UART: [idev] SUBJECT.KEYID = 7
3,509,161 UART: [idev] UDS.KEYID = 0
3,510,662 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,660,849 UART: [idev] Erasing UDS.KEYID = 0
6,015,837 UART: [idev] Sha1 KeyId Algorithm
6,038,483 UART: [idev] --
6,043,919 UART: [ldev] ++
6,044,619 UART: [ldev] CDI.KEYID = 6
6,045,513 UART: [ldev] SUBJECT.KEYID = 5
6,046,623 UART: [ldev] AUTHORITY.KEYID = 7
6,047,921 UART: [ldev] FE.KEYID = 1
6,085,336 UART: [ldev] Erasing FE.KEYID = 1
8,593,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,326,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,708 UART: [ldev] --
10,399,359 UART: [fwproc] Wait for Commands...
10,401,627 UART: [fwproc] Recv command 0x46574c44
10,403,946 UART: [fwproc] Recv'd Img size: 119428 bytes
13,909,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,385 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,962 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,679,182 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
3,438,970 ready_for_fw is high
3,439,366 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,841,134 >>> mbox cmd response: success
19,149,454 UART:
19,149,852 UART: Running Caliptra FMC ...
19,151,008 UART:
19,151,180 UART: [state] CFI Enabled
19,218,775 UART: [fht] FMC Alias Private Key: 7
20,984,498 UART: [art] Extend RT PCRs Done
20,985,711 UART: [art] Lock RT PCRs Done
20,987,460 UART: [art] Populate DV Done
20,992,781 UART: [fht] FMC Alias Private Key: 7
20,994,324 UART: [art] Derive CDI
20,995,092 UART: [art] Store in slot 0x4
21,050,950 UART: [art] Derive Key Pair
21,051,997 UART: [art] Store priv key in slot 0x5
23,515,163 UART: [art] Derive Key Pair - Done
23,527,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,240,583 UART: [art] Erasing AUTHORITY.KEYID = 7
25,242,100 UART: [art] PUB.X = D6C275EF4F3604BC010A4BC2FC4D8FCC904E709C71B8E8FF933167792246CCE0D9B10DAE209FBE6094C164BA07E5EF40
25,249,369 UART: [art] PUB.Y = 89A46796331A80F89427BDC3535F5F025626B430C0FE6A2D2787A86F02973A6D94B484AD368113E9EF670DBF25381559
25,256,618 UART: [art] SIG.R = 22E4F1096D85875907D31487C9E664A3101BC2B9D33F8256749AC0B606A39AB40FD566A8F8A5E66160ECCFB3F46F6DFF
25,263,981 UART: [art] SIG.S = 45B101BE763FB91B1A72E2D647D672F1F4BE2993C47D65A99124E808AC4BB20A8C90F000B0BA98FCB98CF92AD59C00E2
26,243,006 UART: Caliptra RT
26,243,726 UART: [state] CFI Enabled
26,423,805 UART: [rt] RT listening for mailbox commands...
26,425,670 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,455,264 UART: [rt]cmd =0x46504c54, len=4
26,456,741 >>> mbox cmd response data (8 bytes)
26,457,796 UART: [rt] FIPS self test
26,458,742 UART: [kat] ++
26,459,197 UART: [kat] sha1
26,463,601 UART: [kat] SHA2-256
26,465,157 UART: Fatal Error: 0x90010002
26,500,545 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,650,567 >>> mbox cmd response: failed
26,651,206 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,801,147 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
3,427,679 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,833,296 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,494 UART:
192,922 UART: Running Caliptra ROM ...
194,082 UART:
603,753 UART: [state] CFI Enabled
615,505 UART: [state] LifecycleState = Unprovisioned
617,831 UART: [state] DebugLocked = No
619,927 UART: [state] WD Timer not started. Device not locked for debugging
624,760 UART: [kat] SHA2-256
814,647 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,445 UART: [kat] ++
825,968 UART: [kat] sha1
838,831 UART: [kat] SHA2-256
841,849 UART: [kat] SHA2-384
847,281 UART: [kat] SHA2-512-ACC
849,865 UART: [kat] ECC-384
3,291,886 UART: [kat] HMAC-384Kdf
3,305,168 UART: [kat] LMS
3,836,974 UART: [kat] --
3,842,280 UART: [cold-reset] ++
3,844,437 UART: [fht] FHT @ 0x50003400
3,856,843 UART: [idev] ++
3,857,565 UART: [idev] CDI.KEYID = 6
3,858,474 UART: [idev] SUBJECT.KEYID = 7
3,859,731 UART: [idev] UDS.KEYID = 0
3,860,660 ready_for_fw is high
3,860,874 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,010,927 UART: [idev] Erasing UDS.KEYID = 0
6,335,487 UART: [idev] Sha1 KeyId Algorithm
6,357,654 UART: [idev] --
6,361,921 UART: [ldev] ++
6,362,663 UART: [ldev] CDI.KEYID = 6
6,363,552 UART: [ldev] SUBJECT.KEYID = 5
6,364,731 UART: [ldev] AUTHORITY.KEYID = 7
6,365,971 UART: [ldev] FE.KEYID = 1
6,377,056 UART: [ldev] Erasing FE.KEYID = 1
8,856,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,717 UART: [ldev] --
10,646,263 UART: [fwproc] Wait for Commands...
10,649,183 UART: [fwproc] Recv command 0x46574c44
10,651,506 UART: [fwproc] Recv'd Img size: 119428 bytes
14,160,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,239,903 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,363,537 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,928,624 >>> mbox cmd response: success
14,932,941 UART: [afmc] ++
14,933,651 UART: [afmc] CDI.KEYID = 6
14,934,839 UART: [afmc] SUBJECT.KEYID = 7
14,936,335 UART: [afmc] AUTHORITY.KEYID = 5
17,444,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,164,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,166,031 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,181,103 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,196,300 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,211,198 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,234,183 UART: [afmc] --
19,237,408 UART: [cold-reset] --
19,241,765 UART: [state] Locking Datavault
19,246,805 UART: [state] Locking PCR0, PCR1 and PCR31
19,249,011 UART: [state] Locking ICCM
19,251,550 UART: [exit] Launching FMC @ 0x40000130
19,260,196 UART:
19,260,437 UART: Running Caliptra FMC ...
19,261,544 UART:
19,261,720 UART: [state] CFI Enabled
19,269,559 UART: [fht] FMC Alias Private Key: 7
21,035,975 UART: [art] Extend RT PCRs Done
21,037,216 UART: [art] Lock RT PCRs Done
21,038,961 UART: [art] Populate DV Done
21,044,274 UART: [fht] FMC Alias Private Key: 7
21,045,925 UART: [art] Derive CDI
21,046,747 UART: [art] Store in slot 0x4
21,089,724 UART: [art] Derive Key Pair
21,090,732 UART: [art] Store priv key in slot 0x5
23,517,291 UART: [art] Derive Key Pair - Done
23,530,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,236,909 UART: [art] Erasing AUTHORITY.KEYID = 7
25,238,440 UART: [art] PUB.X = B554B868010BA095EDFE7C78EEB88D1F572DC78FB3F6D9E8309F68E55F96AAFB3AA31F1F4AF198205C782761F80AEBC3
25,245,683 UART: [art] PUB.Y = 5CD079BDB31A54D528F197EB7378A9FA85CEEF1A69002FC539B5DAFA5B05A46CDF66C4288E2CC46FA274659F130D8E89
25,252,959 UART: [art] SIG.R = 4733E817F927D764E21A6E6B20A76FD6F53422482BDF806BECFCE93A71ED5BA6222AEBD30D5FFC8BBFC1BFF667E7F627
25,260,348 UART: [art] SIG.S = 0A3127433B74B757E1D22C97B347598BAB55901CF0BAC1E58316D0A5F85A8B0414B617046110C491DBBDEEA0D799AB12
26,238,722 UART: Caliptra RT
26,239,412 UART: [state] CFI Enabled
26,372,569 UART: [rt] RT listening for mailbox commands...
26,374,418 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,404,343 UART: [rt]cmd =0x46504c54, len=4
26,405,802 >>> mbox cmd response data (8 bytes)
26,407,104 UART: [rt] FIPS self test
26,408,054 UART: [kat] ++
26,408,516 UART: [kat] sha1
26,412,977 UART: [kat] SHA2-256
26,414,423 UART: Fatal Error: 0x90010002
26,449,639 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,599,663 >>> mbox cmd response: failed
26,600,297 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,750,554 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,098 UART:
190,396 UART: Running Caliptra ROM ...
191,458 UART:
13,775,827 UART: [state] CFI Enabled
13,786,753 UART: [state] LifecycleState = Unprovisioned
13,789,117 UART: [state] DebugLocked = No
13,791,620 UART: [state] WD Timer not started. Device not locked for debugging
13,795,806 UART: [kat] SHA2-256
13,985,666 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,996,465 UART: [kat] ++
13,996,987 UART: [kat] sha1
14,007,795 UART: [kat] SHA2-256
14,010,827 UART: [kat] SHA2-384
14,016,557 UART: [kat] SHA2-512-ACC
14,019,132 UART: [kat] ECC-384
16,461,172 UART: [kat] HMAC-384Kdf
16,475,572 UART: [kat] LMS
17,007,384 UART: [kat] --
17,012,641 UART: [cold-reset] ++
17,015,178 UART: [fht] FHT @ 0x50003400
17,027,142 UART: [idev] ++
17,027,823 UART: [idev] CDI.KEYID = 6
17,028,843 UART: [idev] SUBJECT.KEYID = 7
17,030,023 UART: [idev] UDS.KEYID = 0
17,031,574 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,181,520 UART: [idev] Erasing UDS.KEYID = 0
19,509,875 UART: [idev] Sha1 KeyId Algorithm
19,533,509 UART: [idev] --
19,539,284 UART: [ldev] ++
19,539,965 UART: [ldev] CDI.KEYID = 6
19,540,876 UART: [ldev] SUBJECT.KEYID = 5
19,542,034 UART: [ldev] AUTHORITY.KEYID = 7
19,543,269 UART: [ldev] FE.KEYID = 1
19,552,948 UART: [ldev] Erasing FE.KEYID = 1
22,032,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,752,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,767,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,783,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,798,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,820,340 UART: [ldev] --
23,826,208 UART: [fwproc] Wait for Commands...
23,828,103 UART: [fwproc] Recv command 0x46574c44
23,830,372 UART: [fwproc] Recv'd Img size: 119428 bytes
27,341,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,425,642 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,549,262 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,114,209 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,752,263 ready_for_fw is high
3,752,729 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,060,922 >>> mbox cmd response: success
19,308,884 UART:
19,309,327 UART: Running Caliptra FMC ...
19,310,476 UART:
19,310,647 UART: [state] CFI Enabled
19,318,228 UART: [fht] FMC Alias Private Key: 7
21,084,740 UART: [art] Extend RT PCRs Done
21,085,993 UART: [art] Lock RT PCRs Done
21,087,798 UART: [art] Populate DV Done
21,093,447 UART: [fht] FMC Alias Private Key: 7
21,094,964 UART: [art] Derive CDI
21,095,736 UART: [art] Store in slot 0x4
21,138,228 UART: [art] Derive Key Pair
21,139,230 UART: [art] Store priv key in slot 0x5
23,565,971 UART: [art] Derive Key Pair - Done
23,578,766 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,285,199 UART: [art] Erasing AUTHORITY.KEYID = 7
25,286,722 UART: [art] PUB.X = 84F2A46050D595695C266E43788A3B045EF065E5BB2F6BB74C4624C9A8132CA9C32353399C5CDA3571CEBCDE886D7D7F
25,293,951 UART: [art] PUB.Y = 1B9B6F216F2311116C4B485DE3CCCF60C505071B0BC5887F20D133457EFD35B992419B039ED2042F6C9DC8DA11EF6C13
25,301,230 UART: [art] SIG.R = 95A8050979E4789EA106E47FEC8AC40043A2F18CD293C0A9547382F7B02AA0F44B36084B469B92B2B33C3B617E92CD92
25,308,578 UART: [art] SIG.S = 03FE38CB53B6B75E1B4B73F8E6E86B03D920381455685061D7D038CF204BAE89FF9868E77C66BFB8427189C86E9F7DA0
26,287,461 UART: Caliptra RT
26,288,178 UART: [state] CFI Enabled
26,421,088 UART: [rt] RT listening for mailbox commands...
26,422,949 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,452,969 UART: [rt]cmd =0x46504c54, len=4
26,454,627 >>> mbox cmd response data (8 bytes)
26,455,632 UART: [rt] FIPS self test
26,456,581 UART: [kat] ++
26,457,035 UART: [kat] sha1
26,461,366 UART: [kat] SHA2-256
26,462,866 UART: Fatal Error: 0x90010002
26,498,087 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,648,105 >>> mbox cmd response: failed
26,648,765 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,798,604 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
16,878,664 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,186,883 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,211 UART: [kat] SHA2-256
882,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,257 UART: [kat] ++
886,409 UART: [kat] sha1
890,791 UART: [kat] SHA2-256
892,729 UART: [kat] SHA2-384
895,682 UART: [kat] SHA2-512-ACC
897,583 UART: [kat] ECC-384
903,066 UART: [kat] HMAC-384Kdf
907,650 UART: [kat] LMS
1,475,846 UART: [kat] --
1,476,887 UART: [cold-reset] ++
1,477,379 UART: [fht] Storing FHT @ 0x50003400
1,480,290 UART: [idev] ++
1,480,458 UART: [idev] CDI.KEYID = 6
1,480,818 UART: [idev] SUBJECT.KEYID = 7
1,481,242 UART: [idev] UDS.KEYID = 0
1,481,587 ready_for_fw is high
1,481,587 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,150 UART: [idev] Erasing UDS.KEYID = 0
1,505,480 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,932 UART: [idev] --
1,515,143 UART: [ldev] ++
1,515,311 UART: [ldev] CDI.KEYID = 6
1,515,674 UART: [ldev] SUBJECT.KEYID = 5
1,516,100 UART: [ldev] AUTHORITY.KEYID = 7
1,516,563 UART: [ldev] FE.KEYID = 1
1,521,889 UART: [ldev] Erasing FE.KEYID = 1
1,547,490 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,572 UART: [ldev] --
1,586,861 UART: [fwproc] Waiting for Commands...
1,587,684 UART: [fwproc] Received command 0x46574c44
1,588,475 UART: [fwproc] Received Image of size 119428 bytes
2,943,699 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,247 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,465 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,136 >>> mbox cmd response: success
3,145,176 UART: [afmc] ++
3,145,344 UART: [afmc] CDI.KEYID = 6
3,145,706 UART: [afmc] SUBJECT.KEYID = 7
3,146,131 UART: [afmc] AUTHORITY.KEYID = 5
3,181,262 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,624 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,404 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,113 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,996 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,679 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,567 UART: [afmc] --
3,224,543 UART: [cold-reset] --
3,225,283 UART: [state] Locking Datavault
3,226,490 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,094 UART: [state] Locking ICCM
3,227,586 UART: [exit] Launching FMC @ 0x40000130
3,232,916 UART:
3,232,932 UART: Running Caliptra FMC ...
3,233,340 UART:
3,233,394 UART: [state] CFI Enabled
3,244,158 UART: [fht] FMC Alias Private Key: 7
3,362,666 UART: [art] Extend RT PCRs Done
3,363,094 UART: [art] Lock RT PCRs Done
3,364,714 UART: [art] Populate DV Done
3,372,719 UART: [fht] FMC Alias Private Key: 7
3,373,875 UART: [art] Derive CDI
3,374,155 UART: [art] Store in slot 0x4
3,459,609 UART: [art] Derive Key Pair
3,459,969 UART: [art] Store priv key in slot 0x5
3,473,026 UART: [art] Derive Key Pair - Done
3,487,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,250 UART: [art] PUB.X = E1F447E54AEEB536F03876F27A74E3D4E8453555CC6B5C22C27AA7037D91E28B6BAEC1E47ACF17CABA2C23A649463792
3,511,029 UART: [art] PUB.Y = 89C7E30204C4367E979CD8AE4D0FA422FBE420559F3DB68F24AAD8C5D39BC6DE2F85F73C36710540A4DD0CF4C87284D2
3,517,976 UART: [art] SIG.R = D4AC371FB01EC1FD12E7F3CB390CE1850027523E55973E60C42DA64D33E67AE9D13582DAD7B3320B3B1DF1F039F1CEF1
3,524,732 UART: [art] SIG.S = E2DA96B81BDA806BF922B0F8242607E54BDC6B28CB39B701AE0E15CB9DDB29F7C63BB0ECA3E2EEB454A1BE0F8623DEC2
3,548,480 UART: Caliptra RT
3,548,731 UART: [state] CFI Enabled
3,668,468 UART: [rt] RT listening for mailbox commands...
3,669,131 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,854 UART: [rt]cmd =0x46504c54, len=4
3,700,022 >>> mbox cmd response data (8 bytes)
3,700,167 UART: [rt] FIPS self test
3,700,495 UART: [kat] ++
3,700,647 UART: [kat] sha1
3,704,851 UART: [kat] SHA2-256
3,706,895 UART: Fatal Error: 0x90010002
3,708,434 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,708,439 >>> mbox cmd response: failed
3,708,439 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,708,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,778 UART: [state] LifecycleState = Unprovisioned
85,433 UART: [state] DebugLocked = No
86,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,625 UART: [kat] SHA2-256
881,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,671 UART: [kat] ++
885,823 UART: [kat] sha1
890,237 UART: [kat] SHA2-256
892,175 UART: [kat] SHA2-384
895,130 UART: [kat] SHA2-512-ACC
897,031 UART: [kat] ECC-384
902,724 UART: [kat] HMAC-384Kdf
907,224 UART: [kat] LMS
1,475,420 UART: [kat] --
1,476,311 UART: [cold-reset] ++
1,476,641 UART: [fht] Storing FHT @ 0x50003400
1,479,298 UART: [idev] ++
1,479,466 UART: [idev] CDI.KEYID = 6
1,479,826 UART: [idev] SUBJECT.KEYID = 7
1,480,250 UART: [idev] UDS.KEYID = 0
1,480,595 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,148 UART: [idev] Erasing UDS.KEYID = 0
1,504,920 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,706 UART: [idev] --
1,514,931 UART: [ldev] ++
1,515,099 UART: [ldev] CDI.KEYID = 6
1,515,462 UART: [ldev] SUBJECT.KEYID = 5
1,515,888 UART: [ldev] AUTHORITY.KEYID = 7
1,516,351 UART: [ldev] FE.KEYID = 1
1,521,545 UART: [ldev] Erasing FE.KEYID = 1
1,547,350 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,340 UART: [ldev] --
1,586,691 UART: [fwproc] Waiting for Commands...
1,587,422 UART: [fwproc] Received command 0x46574c44
1,588,213 UART: [fwproc] Received Image of size 119428 bytes
2,943,751 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,725 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,943 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,536 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,361 ready_for_fw is high
1,362,361 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,058 >>> mbox cmd response: success
3,054,965 UART:
3,054,981 UART: Running Caliptra FMC ...
3,055,389 UART:
3,055,443 UART: [state] CFI Enabled
3,065,705 UART: [fht] FMC Alias Private Key: 7
3,184,437 UART: [art] Extend RT PCRs Done
3,184,865 UART: [art] Lock RT PCRs Done
3,186,291 UART: [art] Populate DV Done
3,194,566 UART: [fht] FMC Alias Private Key: 7
3,195,614 UART: [art] Derive CDI
3,195,894 UART: [art] Store in slot 0x4
3,281,788 UART: [art] Derive Key Pair
3,282,148 UART: [art] Store priv key in slot 0x5
3,295,003 UART: [art] Derive Key Pair - Done
3,309,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,798 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,563 UART: [art] PUB.X = F8ED5E097216765CAB68698302F568F7ADD9E82C857240F74A914551F609161AA02387C2E1A0DF195BF9F8451A040AB9
3,332,316 UART: [art] PUB.Y = E0020ACEA260AEB17D1A5D45744D8ED9BBF7C23CC316B9582994F536F261A56080C5DB1687E40C797AA8A45DAEBFF1E0
3,339,273 UART: [art] SIG.R = 165CEEA9E3B36CA47C95676A183E2E22BEA8EF141A1F74F866AB55E08E0F0D30E67C513FA0B8388486C09058BABA5218
3,346,047 UART: [art] SIG.S = C52BED5DD56E8D2484A90FEBBB886AB732D033CF5F4DA611D11A19050BF6B531AF98D03A1CC96E9236D43C59BAC2CDA4
3,370,512 UART: Caliptra RT
3,370,763 UART: [state] CFI Enabled
3,491,075 UART: [rt] RT listening for mailbox commands...
3,491,738 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,519 UART: [rt]cmd =0x46504c54, len=4
3,522,613 >>> mbox cmd response data (8 bytes)
3,522,802 UART: [rt] FIPS self test
3,523,130 UART: [kat] ++
3,523,282 UART: [kat] sha1
3,527,612 UART: [kat] SHA2-256
3,529,572 UART: Fatal Error: 0x90010002
3,531,111 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,531,116 >>> mbox cmd response: failed
3,531,116 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,531,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,355 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,594 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,346 UART: [kat] SHA2-256
882,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,392 UART: [kat] ++
886,544 UART: [kat] sha1
890,708 UART: [kat] SHA2-256
892,646 UART: [kat] SHA2-384
895,451 UART: [kat] SHA2-512-ACC
897,352 UART: [kat] ECC-384
903,129 UART: [kat] HMAC-384Kdf
907,863 UART: [kat] LMS
1,476,059 UART: [kat] --
1,476,974 UART: [cold-reset] ++
1,477,452 UART: [fht] Storing FHT @ 0x50003400
1,480,291 UART: [idev] ++
1,480,459 UART: [idev] CDI.KEYID = 6
1,480,819 UART: [idev] SUBJECT.KEYID = 7
1,481,243 UART: [idev] UDS.KEYID = 0
1,481,588 ready_for_fw is high
1,481,588 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,553 UART: [idev] Erasing UDS.KEYID = 0
1,506,277 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,959 UART: [idev] --
1,516,188 UART: [ldev] ++
1,516,356 UART: [ldev] CDI.KEYID = 6
1,516,719 UART: [ldev] SUBJECT.KEYID = 5
1,517,145 UART: [ldev] AUTHORITY.KEYID = 7
1,517,608 UART: [ldev] FE.KEYID = 1
1,523,080 UART: [ldev] Erasing FE.KEYID = 1
1,548,543 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,865 UART: [ldev] --
1,588,222 UART: [fwproc] Waiting for Commands...
1,588,945 UART: [fwproc] Received command 0x46574c44
1,589,736 UART: [fwproc] Received Image of size 119428 bytes
2,944,346 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,422 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,640 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,283 >>> mbox cmd response: success
3,145,339 UART: [afmc] ++
3,145,507 UART: [afmc] CDI.KEYID = 6
3,145,869 UART: [afmc] SUBJECT.KEYID = 7
3,146,294 UART: [afmc] AUTHORITY.KEYID = 5
3,181,305 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,605 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,385 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,094 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,977 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,660 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,526 UART: [afmc] --
3,224,452 UART: [cold-reset] --
3,225,320 UART: [state] Locking Datavault
3,226,677 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,281 UART: [state] Locking ICCM
3,227,877 UART: [exit] Launching FMC @ 0x40000130
3,233,207 UART:
3,233,223 UART: Running Caliptra FMC ...
3,233,631 UART:
3,233,774 UART: [state] CFI Enabled
3,244,412 UART: [fht] FMC Alias Private Key: 7
3,363,212 UART: [art] Extend RT PCRs Done
3,363,640 UART: [art] Lock RT PCRs Done
3,365,114 UART: [art] Populate DV Done
3,373,351 UART: [fht] FMC Alias Private Key: 7
3,374,395 UART: [art] Derive CDI
3,374,675 UART: [art] Store in slot 0x4
3,459,969 UART: [art] Derive Key Pair
3,460,329 UART: [art] Store priv key in slot 0x5
3,473,350 UART: [art] Derive Key Pair - Done
3,488,155 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,205 UART: [art] PUB.X = CF67034E3A579D8EF548B7170BD83428E6F177D5F8B02479E10E5F59597E0A3E2E1841ED517F25E6E43B50EB0FAF37B8
3,510,966 UART: [art] PUB.Y = 98B58CAF28F4E086506962F77D2E0692189EFC9E8B66B0A6DC255E09465BABF9ABBA82369FC58AB7B0DC6473A52F55B1
3,517,922 UART: [art] SIG.R = 944A2E584231A2C02A1A5A646A94A5EEF1F9F548A32AB203842D83BC1E92FC5446AC92F5B3AB3637DEBBA4F22B5D6570
3,524,701 UART: [art] SIG.S = 7E4F1D7860A6B0B2A2DF4ADD009FED3376D225020021F0E3C8143D838452AFE905ACE0856F45A2C4B3E07DF9D8E9E4A7
3,548,371 UART: Caliptra RT
3,548,714 UART: [state] CFI Enabled
3,669,810 UART: [rt] RT listening for mailbox commands...
3,670,473 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,530 UART: [rt]cmd =0x46504c54, len=4
3,701,638 >>> mbox cmd response data (8 bytes)
3,701,759 UART: [rt] FIPS self test
3,702,087 UART: [kat] ++
3,702,239 UART: [kat] sha1
3,706,263 UART: [kat] SHA2-256
3,708,303 UART: Fatal Error: 0x90010002
3,709,842 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,709,847 >>> mbox cmd response: failed
3,709,847 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,709,852 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
87,070 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,666 UART: [kat] SHA2-256
882,597 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,712 UART: [kat] ++
886,864 UART: [kat] sha1
891,112 UART: [kat] SHA2-256
893,050 UART: [kat] SHA2-384
895,857 UART: [kat] SHA2-512-ACC
897,758 UART: [kat] ECC-384
903,221 UART: [kat] HMAC-384Kdf
907,715 UART: [kat] LMS
1,475,911 UART: [kat] --
1,476,918 UART: [cold-reset] ++
1,477,352 UART: [fht] Storing FHT @ 0x50003400
1,479,987 UART: [idev] ++
1,480,155 UART: [idev] CDI.KEYID = 6
1,480,515 UART: [idev] SUBJECT.KEYID = 7
1,480,939 UART: [idev] UDS.KEYID = 0
1,481,284 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,385 UART: [idev] Erasing UDS.KEYID = 0
1,506,641 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,293 UART: [idev] --
1,516,324 UART: [ldev] ++
1,516,492 UART: [ldev] CDI.KEYID = 6
1,516,855 UART: [ldev] SUBJECT.KEYID = 5
1,517,281 UART: [ldev] AUTHORITY.KEYID = 7
1,517,744 UART: [ldev] FE.KEYID = 1
1,522,992 UART: [ldev] Erasing FE.KEYID = 1
1,548,393 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,205 UART: [ldev] --
1,587,616 UART: [fwproc] Waiting for Commands...
1,588,387 UART: [fwproc] Received command 0x46574c44
1,589,178 UART: [fwproc] Received Image of size 119428 bytes
2,945,358 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,973,102 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,004,320 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,146,069 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,824 ready_for_fw is high
1,362,824 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,329 >>> mbox cmd response: success
3,055,532 UART:
3,055,548 UART: Running Caliptra FMC ...
3,055,956 UART:
3,056,099 UART: [state] CFI Enabled
3,066,483 UART: [fht] FMC Alias Private Key: 7
3,186,195 UART: [art] Extend RT PCRs Done
3,186,623 UART: [art] Lock RT PCRs Done
3,187,795 UART: [art] Populate DV Done
3,196,032 UART: [fht] FMC Alias Private Key: 7
3,197,154 UART: [art] Derive CDI
3,197,434 UART: [art] Store in slot 0x4
3,283,324 UART: [art] Derive Key Pair
3,283,684 UART: [art] Store priv key in slot 0x5
3,297,357 UART: [art] Derive Key Pair - Done
3,312,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,328,336 UART: [art] PUB.X = 04DA267BCE4746D3EC840B7E9FCCCBD7B4063A22F6E9756645602758BAD4C0BC5DF91F539215C89C67E9F3F89B89A907
3,335,104 UART: [art] PUB.Y = 5560E783BC590796F73BC257A0399885ECA98311E4DC370409543E6EA1827D9B64BBCE7CF1F276E97BA7671EF30A12AB
3,342,046 UART: [art] SIG.R = 2A009C9C68E17314D19EF37CD5A2A08AEA40363A14332FEF1B607565A4287BF5DF8818ED85168AFDB474A7C952AC73D0
3,348,802 UART: [art] SIG.S = 220E9B2CECE1E41A52FD45B82F2F30B9AD634A9CD6F68C66499A3255B839DB2DC9F4B56CB2749683286A8BEC3B9CBAB8
3,373,269 UART: Caliptra RT
3,373,612 UART: [state] CFI Enabled
3,494,039 UART: [rt] RT listening for mailbox commands...
3,494,702 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,365 UART: [rt]cmd =0x46504c54, len=4
3,525,523 >>> mbox cmd response data (8 bytes)
3,525,780 UART: [rt] FIPS self test
3,526,108 UART: [kat] ++
3,526,260 UART: [kat] sha1
3,530,422 UART: [kat] SHA2-256
3,532,434 UART: Fatal Error: 0x90010002
3,533,973 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,533,978 >>> mbox cmd response: failed
3,533,978 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,533,983 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,336 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,283 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,027 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,956 UART: [kat] ++
895,108 UART: [kat] sha1
899,318 UART: [kat] SHA2-256
901,258 UART: [kat] SHA2-384
903,923 UART: [kat] SHA2-512-ACC
905,824 UART: [kat] ECC-384
915,595 UART: [kat] HMAC-384Kdf
920,119 UART: [kat] LMS
1,168,431 UART: [kat] --
1,169,330 UART: [cold-reset] ++
1,169,706 UART: [fht] FHT @ 0x50003400
1,172,284 UART: [idev] ++
1,172,452 UART: [idev] CDI.KEYID = 6
1,172,813 UART: [idev] SUBJECT.KEYID = 7
1,173,238 UART: [idev] UDS.KEYID = 0
1,173,584 ready_for_fw is high
1,173,584 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,155 UART: [idev] Erasing UDS.KEYID = 0
1,198,051 UART: [idev] Sha1 KeyId Algorithm
1,207,055 UART: [idev] --
1,208,186 UART: [ldev] ++
1,208,354 UART: [ldev] CDI.KEYID = 6
1,208,718 UART: [ldev] SUBJECT.KEYID = 5
1,209,145 UART: [ldev] AUTHORITY.KEYID = 7
1,209,608 UART: [ldev] FE.KEYID = 1
1,214,816 UART: [ldev] Erasing FE.KEYID = 1
1,241,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,864 UART: [ldev] --
1,280,243 UART: [fwproc] Wait for Commands...
1,281,024 UART: [fwproc] Recv command 0x46574c44
1,281,757 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,929 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,104 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,651 >>> mbox cmd response: success
2,837,881 UART: [afmc] ++
2,838,049 UART: [afmc] CDI.KEYID = 6
2,838,412 UART: [afmc] SUBJECT.KEYID = 7
2,838,838 UART: [afmc] AUTHORITY.KEYID = 5
2,874,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,485 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,195 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,076 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,777 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,456 UART: [afmc] --
2,917,477 UART: [cold-reset] --
2,918,371 UART: [state] Locking Datavault
2,919,464 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,068 UART: [state] Locking ICCM
2,920,722 UART: [exit] Launching FMC @ 0x40000130
2,926,052 UART:
2,926,068 UART: Running Caliptra FMC ...
2,926,476 UART:
2,926,530 UART: [state] CFI Enabled
2,937,174 UART: [fht] FMC Alias Private Key: 7
3,055,880 UART: [art] Extend RT PCRs Done
3,056,308 UART: [art] Lock RT PCRs Done
3,058,016 UART: [art] Populate DV Done
3,066,059 UART: [fht] FMC Alias Private Key: 7
3,067,057 UART: [art] Derive CDI
3,067,337 UART: [art] Store in slot 0x4
3,152,882 UART: [art] Derive Key Pair
3,153,242 UART: [art] Store priv key in slot 0x5
3,166,526 UART: [art] Derive Key Pair - Done
3,181,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,196,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,514 UART: [art] PUB.X = B65EB173A9FB04F9936E652D9B6F74224A982244A2C91156A7D64D7BBA072E9C628D87D408F0193614056999517BE378
3,204,264 UART: [art] PUB.Y = 1485F5C2DA4B484EE1D398ACB717512F4B39BD013C1740FB6C368EAE7F0AA64FB06A9146743097800CC8001C0947D1D7
3,211,184 UART: [art] SIG.R = B5082B5A3504C11312719E0539BF8F9A3E919F542AD3964C6E1F235357EF1113CD933CB0D395B01B7D51D0F9B36B281F
3,217,945 UART: [art] SIG.S = 03C2E222EE5167BF9CD42DFDDE76F116A79016DE93B86675FCA2178D711FE3C6395212431131667C491017CE8A5F7217
3,241,672 UART: Caliptra RT
3,241,923 UART: [state] CFI Enabled
3,361,468 UART: [rt] RT listening for mailbox commands...
3,362,131 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,976 UART: [rt]cmd =0x46504c54, len=4
3,392,984 >>> mbox cmd response data (8 bytes)
3,393,195 UART: [rt] FIPS self test
3,393,523 UART: [kat] ++
3,393,675 UART: [kat] sha1
3,397,699 UART: [kat] SHA2-256
3,399,769 UART: Fatal Error: 0x90010002
3,401,308 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,313 >>> mbox cmd response: failed
3,401,313 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,318 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,582 UART: [kat] ++
895,734 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,017 UART: [kat] HMAC-384Kdf
920,683 UART: [kat] LMS
1,168,995 UART: [kat] --
1,169,824 UART: [cold-reset] ++
1,170,170 UART: [fht] FHT @ 0x50003400
1,172,880 UART: [idev] ++
1,173,048 UART: [idev] CDI.KEYID = 6
1,173,409 UART: [idev] SUBJECT.KEYID = 7
1,173,834 UART: [idev] UDS.KEYID = 0
1,174,180 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,199,179 UART: [idev] Sha1 KeyId Algorithm
1,208,061 UART: [idev] --
1,209,230 UART: [ldev] ++
1,209,398 UART: [ldev] CDI.KEYID = 6
1,209,762 UART: [ldev] SUBJECT.KEYID = 5
1,210,189 UART: [ldev] AUTHORITY.KEYID = 7
1,210,652 UART: [ldev] FE.KEYID = 1
1,216,006 UART: [ldev] Erasing FE.KEYID = 1
1,242,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,398 UART: [ldev] --
1,281,811 UART: [fwproc] Wait for Commands...
1,282,474 UART: [fwproc] Recv command 0x46574c44
1,283,207 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,019 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,194 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,837 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,912 ready_for_fw is high
1,058,912 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,687,770 >>> mbox cmd response: success
2,749,609 UART:
2,749,625 UART: Running Caliptra FMC ...
2,750,033 UART:
2,750,087 UART: [state] CFI Enabled
2,760,809 UART: [fht] FMC Alias Private Key: 7
2,879,797 UART: [art] Extend RT PCRs Done
2,880,225 UART: [art] Lock RT PCRs Done
2,881,745 UART: [art] Populate DV Done
2,889,944 UART: [fht] FMC Alias Private Key: 7
2,891,116 UART: [art] Derive CDI
2,891,396 UART: [art] Store in slot 0x4
2,977,135 UART: [art] Derive Key Pair
2,977,495 UART: [art] Store priv key in slot 0x5
2,991,391 UART: [art] Derive Key Pair - Done
3,005,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,020,877 UART: [art] Erasing AUTHORITY.KEYID = 7
3,021,642 UART: [art] PUB.X = 9246E836FAF401C35D01C2BEA83D2A9663D88EB26AF8AA32F968BFF6B8874683075E6EC6D38239CAB3695328A89C3161
3,028,407 UART: [art] PUB.Y = A97CEEEFB5E1D9561F6668CD0FD49FE08DDB24A90892673CA42FD8EE4E1F679A57C9CE73FBC7C6D4530BF73BDCB80E22
3,035,371 UART: [art] SIG.R = 24E9601D3869A0FCDBC2E813D3EB43FF6CEC784A81F47CF908626A26DE9E3D356B2673D961C6A80410274A5B38A24B5B
3,042,143 UART: [art] SIG.S = D3A86B06BF65F3D3F1CDB3BBB215F497C1F4D6A88688C20AB132C2508B35A70B53910B3DBBD767BACDCD503222D803F8
3,065,458 UART: Caliptra RT
3,065,709 UART: [state] CFI Enabled
3,186,270 UART: [rt] RT listening for mailbox commands...
3,186,933 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,008 UART: [rt]cmd =0x46504c54, len=4
3,218,330 >>> mbox cmd response data (8 bytes)
3,218,611 UART: [rt] FIPS self test
3,218,939 UART: [kat] ++
3,219,091 UART: [kat] sha1
3,223,183 UART: [kat] SHA2-256
3,225,191 UART: Fatal Error: 0x90010002
3,226,730 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,226,735 >>> mbox cmd response: failed
3,226,735 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,226,740 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,410 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,562 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
891,701 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,805 UART: [kat] ++
895,957 UART: [kat] sha1
900,231 UART: [kat] SHA2-256
902,171 UART: [kat] SHA2-384
904,938 UART: [kat] SHA2-512-ACC
906,839 UART: [kat] ECC-384
916,944 UART: [kat] HMAC-384Kdf
921,508 UART: [kat] LMS
1,169,820 UART: [kat] --
1,170,851 UART: [cold-reset] ++
1,171,201 UART: [fht] FHT @ 0x50003400
1,173,945 UART: [idev] ++
1,174,113 UART: [idev] CDI.KEYID = 6
1,174,474 UART: [idev] SUBJECT.KEYID = 7
1,174,899 UART: [idev] UDS.KEYID = 0
1,175,245 ready_for_fw is high
1,175,245 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,012 UART: [idev] Erasing UDS.KEYID = 0
1,200,448 UART: [idev] Sha1 KeyId Algorithm
1,209,450 UART: [idev] --
1,210,505 UART: [ldev] ++
1,210,673 UART: [ldev] CDI.KEYID = 6
1,211,037 UART: [ldev] SUBJECT.KEYID = 5
1,211,464 UART: [ldev] AUTHORITY.KEYID = 7
1,211,927 UART: [ldev] FE.KEYID = 1
1,217,177 UART: [ldev] Erasing FE.KEYID = 1
1,243,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,475 UART: [ldev] --
1,282,766 UART: [fwproc] Wait for Commands...
1,283,405 UART: [fwproc] Recv command 0x46574c44
1,284,138 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,483 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,658 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,149 >>> mbox cmd response: success
2,840,349 UART: [afmc] ++
2,840,517 UART: [afmc] CDI.KEYID = 6
2,840,880 UART: [afmc] SUBJECT.KEYID = 7
2,841,306 UART: [afmc] AUTHORITY.KEYID = 5
2,876,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,769 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,479 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,360 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,061 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,020 UART: [afmc] --
2,920,023 UART: [cold-reset] --
2,920,731 UART: [state] Locking Datavault
2,921,988 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,592 UART: [state] Locking ICCM
2,923,098 UART: [exit] Launching FMC @ 0x40000130
2,928,428 UART:
2,928,444 UART: Running Caliptra FMC ...
2,928,852 UART:
2,928,995 UART: [state] CFI Enabled
2,939,653 UART: [fht] FMC Alias Private Key: 7
3,058,387 UART: [art] Extend RT PCRs Done
3,058,815 UART: [art] Lock RT PCRs Done
3,060,357 UART: [art] Populate DV Done
3,068,616 UART: [fht] FMC Alias Private Key: 7
3,069,724 UART: [art] Derive CDI
3,070,004 UART: [art] Store in slot 0x4
3,155,791 UART: [art] Derive Key Pair
3,156,151 UART: [art] Store priv key in slot 0x5
3,170,173 UART: [art] Derive Key Pair - Done
3,184,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,708 UART: [art] PUB.X = 3AF96B2F87A66CDA40215EA1120F254C3E8A4454EFFFA74F42F4DDE4645F9E6CF95A7A33560ECE199E6D3D4752088C68
3,207,481 UART: [art] PUB.Y = B18D98665BA8EC4543ABCAD120F602F55620367B393091493A02D679AEB24903A6D5926433E9387C760D457F576E4C75
3,214,411 UART: [art] SIG.R = E57A4B461A69F1D342EF8D546912F58BE4E4536AE91EF1379666A6B7423F4C3E8C8836C2D56FF9269A5D23A913E58F5B
3,221,185 UART: [art] SIG.S = 438B98DB48A9647F69CB4B665A7752D9FCEA673DE054B81CB41D0FCF6976436C69B00DAD6D42B2D18BA835CDA4A1D30D
3,244,448 UART: Caliptra RT
3,244,791 UART: [state] CFI Enabled
3,365,392 UART: [rt] RT listening for mailbox commands...
3,366,055 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,082 UART: [rt]cmd =0x46504c54, len=4
3,397,230 >>> mbox cmd response data (8 bytes)
3,397,367 UART: [rt] FIPS self test
3,397,695 UART: [kat] ++
3,397,847 UART: [kat] sha1
3,402,111 UART: [kat] SHA2-256
3,404,047 UART: Fatal Error: 0x90010002
3,405,586 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,591 >>> mbox cmd response: failed
3,405,591 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,991 UART: [kat] SHA2-256
901,931 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
916,562 UART: [kat] HMAC-384Kdf
921,366 UART: [kat] LMS
1,169,678 UART: [kat] --
1,170,677 UART: [cold-reset] ++
1,171,053 UART: [fht] FHT @ 0x50003400
1,173,583 UART: [idev] ++
1,173,751 UART: [idev] CDI.KEYID = 6
1,174,112 UART: [idev] SUBJECT.KEYID = 7
1,174,537 UART: [idev] UDS.KEYID = 0
1,174,883 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,664 UART: [idev] Erasing UDS.KEYID = 0
1,200,116 UART: [idev] Sha1 KeyId Algorithm
1,208,914 UART: [idev] --
1,209,881 UART: [ldev] ++
1,210,049 UART: [ldev] CDI.KEYID = 6
1,210,413 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,501 UART: [ldev] Erasing FE.KEYID = 1
1,242,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,461 UART: [ldev] --
1,281,686 UART: [fwproc] Wait for Commands...
1,282,463 UART: [fwproc] Recv command 0x46574c44
1,283,196 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,051 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,226 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,887 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,291 ready_for_fw is high
1,060,291 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,617 >>> mbox cmd response: success
2,754,798 UART:
2,754,814 UART: Running Caliptra FMC ...
2,755,222 UART:
2,755,365 UART: [state] CFI Enabled
2,765,945 UART: [fht] FMC Alias Private Key: 7
2,884,817 UART: [art] Extend RT PCRs Done
2,885,245 UART: [art] Lock RT PCRs Done
2,886,583 UART: [art] Populate DV Done
2,894,904 UART: [fht] FMC Alias Private Key: 7
2,896,066 UART: [art] Derive CDI
2,896,346 UART: [art] Store in slot 0x4
2,982,551 UART: [art] Derive Key Pair
2,982,911 UART: [art] Store priv key in slot 0x5
2,996,859 UART: [art] Derive Key Pair - Done
3,011,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,515 UART: [art] PUB.X = 2FD29BB04136A89507259F088416A564C31B52AB41B23BD21C4D12243216BB90F9915110DFAF1A2A0FBB8DEAD0B42C0C
3,034,281 UART: [art] PUB.Y = 26474AA7493AD0309E70A13CB33E7AE6A906A9F54B5D033B705C096A193A9A45CDE8B45CD1982631478973BE96055D5F
3,041,219 UART: [art] SIG.R = 54ED15BBD882372987777EB0C42B66D1027D3301077003628E44C54B1906B541D880EF0FAD3BFA0EBDD2F8A12E639A59
3,047,970 UART: [art] SIG.S = 70E2AFEE5045D2EC4368B8C8ED335229AC2ED82273B544100B499C7430D8733DC4682B6C48C4CA43F55F5B695E76BFB7
3,072,357 UART: Caliptra RT
3,072,700 UART: [state] CFI Enabled
3,192,764 UART: [rt] RT listening for mailbox commands...
3,193,427 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,554 UART: [rt]cmd =0x46504c54, len=4
3,224,734 >>> mbox cmd response data (8 bytes)
3,225,009 UART: [rt] FIPS self test
3,225,337 UART: [kat] ++
3,225,489 UART: [kat] sha1
3,229,599 UART: [kat] SHA2-256
3,231,715 UART: Fatal Error: 0x90010002
3,233,254 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,259 >>> mbox cmd response: failed
3,233,259 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,264 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,377 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,131 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,550 UART: [state] LifecycleState = Unprovisioned
86,205 UART: [state] DebugLocked = No
86,843 UART: [state] WD Timer not started. Device not locked for debugging
88,188 UART: [kat] SHA2-256
893,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,963 UART: [kat] ++
898,115 UART: [kat] sha1
902,393 UART: [kat] SHA2-256
904,333 UART: [kat] SHA2-384
906,966 UART: [kat] SHA2-512-ACC
908,867 UART: [kat] ECC-384
918,594 UART: [kat] HMAC-384Kdf
923,398 UART: [kat] LMS
1,171,726 UART: [kat] --
1,172,341 UART: [cold-reset] ++
1,172,719 UART: [fht] FHT @ 0x50003400
1,175,182 UART: [idev] ++
1,175,350 UART: [idev] CDI.KEYID = 6
1,175,710 UART: [idev] SUBJECT.KEYID = 7
1,176,134 UART: [idev] UDS.KEYID = 0
1,176,479 ready_for_fw is high
1,176,479 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,104 UART: [idev] Erasing UDS.KEYID = 0
1,201,141 UART: [idev] Sha1 KeyId Algorithm
1,209,715 UART: [idev] --
1,210,679 UART: [ldev] ++
1,210,847 UART: [ldev] CDI.KEYID = 6
1,211,210 UART: [ldev] SUBJECT.KEYID = 5
1,211,636 UART: [ldev] AUTHORITY.KEYID = 7
1,212,099 UART: [ldev] FE.KEYID = 1
1,217,175 UART: [ldev] Erasing FE.KEYID = 1
1,243,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,535 UART: [ldev] --
1,283,008 UART: [fwproc] Wait for Commands...
1,283,752 UART: [fwproc] Recv command 0x46574c44
1,284,480 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,720 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,890 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,497 >>> mbox cmd response: success
2,840,667 UART: [afmc] ++
2,840,835 UART: [afmc] CDI.KEYID = 6
2,841,197 UART: [afmc] SUBJECT.KEYID = 7
2,841,622 UART: [afmc] AUTHORITY.KEYID = 5
2,876,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,876 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,624 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,333 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,216 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,917 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,719 UART: [afmc] --
2,919,751 UART: [cold-reset] --
2,920,285 UART: [state] Locking Datavault
2,921,228 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,832 UART: [state] Locking ICCM
2,922,500 UART: [exit] Launching FMC @ 0x40000130
2,927,830 UART:
2,927,846 UART: Running Caliptra FMC ...
2,928,254 UART:
2,928,308 UART: [state] CFI Enabled
2,939,004 UART: [fht] FMC Alias Private Key: 7
3,057,674 UART: [art] Extend RT PCRs Done
3,058,102 UART: [art] Lock RT PCRs Done
3,059,898 UART: [art] Populate DV Done
3,068,011 UART: [fht] FMC Alias Private Key: 7
3,068,989 UART: [art] Derive CDI
3,069,269 UART: [art] Store in slot 0x4
3,154,846 UART: [art] Derive Key Pair
3,155,206 UART: [art] Store priv key in slot 0x5
3,168,166 UART: [art] Derive Key Pair - Done
3,183,042 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,882 UART: [art] PUB.X = 53326402DCA02C88EAC4D9A51F70BF7D5D63F02EAB6192C75C99D402D0B30BF5C0DC72DEFDA556577020421F7ADA5AB5
3,205,659 UART: [art] PUB.Y = 968F7220839A9EC36009866B1979CE9B9838AE76A23DCEA21F6EB052560F059A5CEB75FAFCB63D49FA0394CE8F211458
3,212,603 UART: [art] SIG.R = 2D29AB2E5C9DC2B29187997E06C32EE96713AB8665303730284F0AB24CE9C214953F1543A4E604BD87329E3730D7CE3A
3,219,362 UART: [art] SIG.S = 41F1BBFCC7E30155EC5BF6A25BF45CDE02B7FFC483496F07F28A425E4BD94667CAF0634249C15B60FB3C71E341C14F24
3,242,477 UART: Caliptra RT
3,242,728 UART: [state] CFI Enabled
3,362,236 UART: [rt] RT listening for mailbox commands...
3,362,899 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,630 UART: [rt]cmd =0x46504c54, len=4
3,393,796 >>> mbox cmd response data (8 bytes)
3,394,017 UART: [rt] FIPS self test
3,394,345 UART: [kat] ++
3,394,497 UART: [kat] sha1
3,398,791 UART: [kat] SHA2-256
3,400,817 UART: Fatal Error: 0x90010002
3,402,356 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,361 >>> mbox cmd response: failed
3,402,361 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
893,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,465 UART: [kat] ++
897,617 UART: [kat] sha1
901,857 UART: [kat] SHA2-256
903,797 UART: [kat] SHA2-384
906,468 UART: [kat] SHA2-512-ACC
908,369 UART: [kat] ECC-384
918,512 UART: [kat] HMAC-384Kdf
923,166 UART: [kat] LMS
1,171,494 UART: [kat] --
1,172,307 UART: [cold-reset] ++
1,172,771 UART: [fht] FHT @ 0x50003400
1,175,298 UART: [idev] ++
1,175,466 UART: [idev] CDI.KEYID = 6
1,175,826 UART: [idev] SUBJECT.KEYID = 7
1,176,250 UART: [idev] UDS.KEYID = 0
1,176,595 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,192 UART: [idev] Erasing UDS.KEYID = 0
1,200,935 UART: [idev] Sha1 KeyId Algorithm
1,209,521 UART: [idev] --
1,210,597 UART: [ldev] ++
1,210,765 UART: [ldev] CDI.KEYID = 6
1,211,128 UART: [ldev] SUBJECT.KEYID = 5
1,211,554 UART: [ldev] AUTHORITY.KEYID = 7
1,212,017 UART: [ldev] FE.KEYID = 1
1,217,079 UART: [ldev] Erasing FE.KEYID = 1
1,243,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,325 UART: [ldev] --
1,282,720 UART: [fwproc] Wait for Commands...
1,283,464 UART: [fwproc] Recv command 0x46574c44
1,284,192 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,742 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,912 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,537 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,651 ready_for_fw is high
1,060,651 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,946 >>> mbox cmd response: success
2,752,629 UART:
2,752,645 UART: Running Caliptra FMC ...
2,753,053 UART:
2,753,107 UART: [state] CFI Enabled
2,763,589 UART: [fht] FMC Alias Private Key: 7
2,882,337 UART: [art] Extend RT PCRs Done
2,882,765 UART: [art] Lock RT PCRs Done
2,884,285 UART: [art] Populate DV Done
2,892,856 UART: [fht] FMC Alias Private Key: 7
2,893,862 UART: [art] Derive CDI
2,894,142 UART: [art] Store in slot 0x4
2,979,997 UART: [art] Derive Key Pair
2,980,357 UART: [art] Store priv key in slot 0x5
2,993,753 UART: [art] Derive Key Pair - Done
3,008,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,813 UART: [art] PUB.X = 54179FC7C434B256E9E8FCDF233CB14A854B5EA2F946165B6A76795BE0DFDA5B229F8FCF454618A68B937007D4B78A08
3,031,585 UART: [art] PUB.Y = 20919578C0A5512B926F33B1E4AF5A3A8A66843513F9F09EDA5090A09899ADFD1C2C6A0316FB7231DD56E414E29450DC
3,038,534 UART: [art] SIG.R = 226B94919C2EC521AD3D13C8FA7D2A2F24C56DFB2F97DD24AAE46971F476D77D29560269A6E4CA61116AC27590EE4F85
3,045,309 UART: [art] SIG.S = 4235FF7FAE102D49028DD2A722C415A73A3875551F216AEC33D176D35932E6E3ECBF169144326A68E47484F8C309CF43
3,069,173 UART: Caliptra RT
3,069,424 UART: [state] CFI Enabled
3,188,716 UART: [rt] RT listening for mailbox commands...
3,189,379 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,226 UART: [rt]cmd =0x46504c54, len=4
3,220,444 >>> mbox cmd response data (8 bytes)
3,220,779 UART: [rt] FIPS self test
3,221,107 UART: [kat] ++
3,221,259 UART: [kat] sha1
3,225,515 UART: [kat] SHA2-256
3,227,639 UART: Fatal Error: 0x90010002
3,229,178 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,183 >>> mbox cmd response: failed
3,229,183 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,188 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,317 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,784 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
893,305 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,430 UART: [kat] ++
897,582 UART: [kat] sha1
901,960 UART: [kat] SHA2-256
903,900 UART: [kat] SHA2-384
906,573 UART: [kat] SHA2-512-ACC
908,474 UART: [kat] ECC-384
918,337 UART: [kat] HMAC-384Kdf
922,967 UART: [kat] LMS
1,171,295 UART: [kat] --
1,172,104 UART: [cold-reset] ++
1,172,562 UART: [fht] FHT @ 0x50003400
1,175,353 UART: [idev] ++
1,175,521 UART: [idev] CDI.KEYID = 6
1,175,881 UART: [idev] SUBJECT.KEYID = 7
1,176,305 UART: [idev] UDS.KEYID = 0
1,176,650 ready_for_fw is high
1,176,650 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,281 UART: [idev] Erasing UDS.KEYID = 0
1,201,474 UART: [idev] Sha1 KeyId Algorithm
1,209,910 UART: [idev] --
1,210,906 UART: [ldev] ++
1,211,074 UART: [ldev] CDI.KEYID = 6
1,211,437 UART: [ldev] SUBJECT.KEYID = 5
1,211,863 UART: [ldev] AUTHORITY.KEYID = 7
1,212,326 UART: [ldev] FE.KEYID = 1
1,217,690 UART: [ldev] Erasing FE.KEYID = 1
1,244,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,516 UART: [ldev] --
1,283,881 UART: [fwproc] Wait for Commands...
1,284,575 UART: [fwproc] Recv command 0x46574c44
1,285,303 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,775 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,945 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,498 >>> mbox cmd response: success
2,840,532 UART: [afmc] ++
2,840,700 UART: [afmc] CDI.KEYID = 6
2,841,062 UART: [afmc] SUBJECT.KEYID = 7
2,841,487 UART: [afmc] AUTHORITY.KEYID = 5
2,877,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,621 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,330 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,213 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,914 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,814 UART: [afmc] --
2,920,908 UART: [cold-reset] --
2,921,788 UART: [state] Locking Datavault
2,922,903 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,507 UART: [state] Locking ICCM
2,923,999 UART: [exit] Launching FMC @ 0x40000130
2,929,329 UART:
2,929,345 UART: Running Caliptra FMC ...
2,929,753 UART:
2,929,896 UART: [state] CFI Enabled
2,940,194 UART: [fht] FMC Alias Private Key: 7
3,059,116 UART: [art] Extend RT PCRs Done
3,059,544 UART: [art] Lock RT PCRs Done
3,060,734 UART: [art] Populate DV Done
3,068,889 UART: [fht] FMC Alias Private Key: 7
3,069,935 UART: [art] Derive CDI
3,070,215 UART: [art] Store in slot 0x4
3,156,488 UART: [art] Derive Key Pair
3,156,848 UART: [art] Store priv key in slot 0x5
3,170,526 UART: [art] Derive Key Pair - Done
3,185,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,466 UART: [art] PUB.X = AEA6CD3B0237D029BF9A955A2B3FCAC592E8A6B02F63C820587E0B3898651AA5CCF0975C2D5D5374328CB0877E781DFE
3,208,242 UART: [art] PUB.Y = 9C66F8732FEDD7CED29B21827CD4DFB34FB6BFE68F7115F79C3ED8C15F3837EA46F9F5B9EDAD816CB05B3C7A9230DB4B
3,215,218 UART: [art] SIG.R = 560A83E6CEF3FA978122C116146834F1495706223DB7E164EB0AE0750E10910ACBABDDDF5F41EC24767A76FCD53D3FB7
3,221,983 UART: [art] SIG.S = 85A748DAA10259D65500A9089443B925F28D43403501A2C83FA674003182C0727989A7570FBA3A8E02DF8442F2045FE3
3,246,027 UART: Caliptra RT
3,246,370 UART: [state] CFI Enabled
3,366,027 UART: [rt] RT listening for mailbox commands...
3,366,690 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,581 UART: [rt]cmd =0x46504c54, len=4
3,397,821 >>> mbox cmd response data (8 bytes)
3,397,938 UART: [rt] FIPS self test
3,398,266 UART: [kat] ++
3,398,418 UART: [kat] sha1
3,402,840 UART: [kat] SHA2-256
3,404,802 UART: Fatal Error: 0x90010002
3,406,341 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,346 >>> mbox cmd response: failed
3,406,346 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,539 UART: [kat] SHA2-256
893,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,314 UART: [kat] ++
897,466 UART: [kat] sha1
901,746 UART: [kat] SHA2-256
903,686 UART: [kat] SHA2-384
906,453 UART: [kat] SHA2-512-ACC
908,354 UART: [kat] ECC-384
918,093 UART: [kat] HMAC-384Kdf
922,797 UART: [kat] LMS
1,171,125 UART: [kat] --
1,171,720 UART: [cold-reset] ++
1,172,048 UART: [fht] FHT @ 0x50003400
1,174,701 UART: [idev] ++
1,174,869 UART: [idev] CDI.KEYID = 6
1,175,229 UART: [idev] SUBJECT.KEYID = 7
1,175,653 UART: [idev] UDS.KEYID = 0
1,175,998 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,813 UART: [idev] Erasing UDS.KEYID = 0
1,201,358 UART: [idev] Sha1 KeyId Algorithm
1,209,698 UART: [idev] --
1,210,706 UART: [ldev] ++
1,210,874 UART: [ldev] CDI.KEYID = 6
1,211,237 UART: [ldev] SUBJECT.KEYID = 5
1,211,663 UART: [ldev] AUTHORITY.KEYID = 7
1,212,126 UART: [ldev] FE.KEYID = 1
1,217,334 UART: [ldev] Erasing FE.KEYID = 1
1,244,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,960 UART: [ldev] --
1,283,279 UART: [fwproc] Wait for Commands...
1,284,051 UART: [fwproc] Recv command 0x46574c44
1,284,779 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,605 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,775 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,394 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,372 ready_for_fw is high
1,060,372 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,099 >>> mbox cmd response: success
2,754,368 UART:
2,754,384 UART: Running Caliptra FMC ...
2,754,792 UART:
2,754,935 UART: [state] CFI Enabled
2,765,447 UART: [fht] FMC Alias Private Key: 7
2,884,559 UART: [art] Extend RT PCRs Done
2,884,987 UART: [art] Lock RT PCRs Done
2,886,739 UART: [art] Populate DV Done
2,894,794 UART: [fht] FMC Alias Private Key: 7
2,895,908 UART: [art] Derive CDI
2,896,188 UART: [art] Store in slot 0x4
2,982,365 UART: [art] Derive Key Pair
2,982,725 UART: [art] Store priv key in slot 0x5
2,996,203 UART: [art] Derive Key Pair - Done
3,011,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,680 UART: [art] PUB.X = A29A4DD5195F8A3E0848B3EF6DE658076F8419847F44BBA815439B2665CD8AEA5CE7316B4AFF4BA731FC3376C8DBA884
3,034,456 UART: [art] PUB.Y = 2AD4D69A8A4F2D297B08720914C0BB4B59DFB7A411B6A0FB199A661DF33EF1693B126EA1E2303F6EB704766A89442A84
3,041,403 UART: [art] SIG.R = 3FBB798C6CF5A337B6DF7BF83315B38CC8584CBB6DBAA922FA382E50D5390486CE021FA4F7C6F94723D7F9B9C3717932
3,048,179 UART: [art] SIG.S = DF9CB733C06974DC62EC8DF1485C634E2CE451BA1C65872C193E82860920E40E1891329301982E392CCB0809A338F639
3,071,778 UART: Caliptra RT
3,072,121 UART: [state] CFI Enabled
3,192,826 UART: [rt] RT listening for mailbox commands...
3,193,489 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,176 UART: [rt]cmd =0x46504c54, len=4
3,224,364 >>> mbox cmd response data (8 bytes)
3,224,659 UART: [rt] FIPS self test
3,224,987 UART: [kat] ++
3,225,139 UART: [kat] sha1
3,229,409 UART: [kat] SHA2-256
3,231,507 UART: Fatal Error: 0x90010002
3,233,046 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,051 >>> mbox cmd response: failed
3,233,051 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,056 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,074 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,539 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,374 writing to cptra_bootfsm_go
2,694,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,844,772 >>> mbox cmd response: failed
2,845,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,994,221 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,436,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,277,422 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
2,700,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,850,370 >>> mbox cmd response: failed
2,850,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,999,809 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,436,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,280,836 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,563 writing to cptra_bootfsm_go
3,056,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,205,963 >>> mbox cmd response: failed
3,206,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,355,363 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
20,172,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,888,548 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
3,059,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,210,069 >>> mbox cmd response: failed
3,210,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,359,549 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,174,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,884,972 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
2,700,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,850,443 >>> mbox cmd response: failed
2,851,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,999,906 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,429,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,279,030 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
2,705,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,855,374 >>> mbox cmd response: failed
2,855,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,004,815 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,429,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,281,984 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,406 writing to cptra_bootfsm_go
3,062,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,212,566 >>> mbox cmd response: failed
3,213,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,361,986 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,178,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,883,885 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,060,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,209,859 >>> mbox cmd response: failed
3,210,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,359,273 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,175,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,894,431 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,514 >>> mbox cmd response: failed
815,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,218 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,300 >>> mbox cmd response: failed
815,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,306 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,146 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,323 >>> mbox cmd response: failed
815,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,329 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,123 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,185 >>> mbox cmd response: failed
815,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,541 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,046 >>> mbox cmd response: failed
815,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,052 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,550 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,094 >>> mbox cmd response: failed
815,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,100 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,876 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,651 >>> mbox cmd response: failed
815,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,657 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,799 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,777 >>> mbox cmd response: failed
814,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,665 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,057 UART:
192,437 UART: Running Caliptra ROM ...
193,541 UART:
193,684 UART: [state] CFI Enabled
263,334 UART: [state] LifecycleState = Unprovisioned
265,279 UART: [state] DebugLocked = No
266,594 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,073 UART: [kat] SHA2-256
441,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,319 UART: [kat] ++
452,850 UART: [kat] sha1
463,801 UART: [kat] SHA2-256
466,532 UART: [kat] SHA2-384
471,881 UART: [kat] SHA2-512-ACC
474,250 UART: [kat] ECC-384
2,765,246 UART: [kat] HMAC-384Kdf
2,798,590 UART: [kat] LMS
3,988,876 UART: [kat] --
3,994,111 UART: [cold-reset] ++
3,995,274 UART: [fht] Storing FHT @ 0x50003400
4,007,048 UART: [idev] ++
4,007,636 UART: [idev] CDI.KEYID = 6
4,008,571 UART: [idev] SUBJECT.KEYID = 7
4,009,833 UART: [idev] UDS.KEYID = 0
4,010,904 ready_for_fw is high
4,011,141 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,365 UART: [idev] Erasing UDS.KEYID = 0
7,358,706 UART: [idev] Using Sha1 for KeyId Algorithm
7,380,570 UART: [idev] --
7,384,297 UART: [ldev] ++
7,384,867 UART: [ldev] CDI.KEYID = 6
7,385,805 UART: [ldev] SUBJECT.KEYID = 5
7,387,073 UART: [ldev] AUTHORITY.KEYID = 7
7,388,231 UART: [ldev] FE.KEYID = 1
7,435,206 UART: [ldev] Erasing FE.KEYID = 1
10,766,139 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,059,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,073,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,088,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,103,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,121,183 UART: [ldev] --
13,125,429 UART: [fwproc] Waiting for Commands...
13,128,674 UART: [fwproc] Received command 0x46574c44
13,130,916 UART: [fwproc] Received Image of size 119428 bytes
17,246,057 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,321,020 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,394,220 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,725,850 >>> mbox cmd response: success
17,729,465 UART: [afmc] ++
17,730,059 UART: [afmc] CDI.KEYID = 6
17,731,003 UART: [afmc] SUBJECT.KEYID = 7
17,732,226 UART: [afmc] AUTHORITY.KEYID = 5
21,106,430 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,404,760 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,407,029 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,421,468 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,436,169 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,450,575 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,472,442 UART: [afmc] --
23,476,400 UART: [cold-reset] --
23,481,783 UART: [state] Locking Datavault
23,486,603 UART: [state] Locking PCR0, PCR1 and PCR31
23,488,369 UART: [state] Locking ICCM
23,490,914 UART: [exit] Launching FMC @ 0x40000130
23,499,308 UART:
23,499,546 UART: Running Caliptra FMC ...
23,500,650 UART:
23,500,813 UART: [state] CFI Enabled
23,565,016 UART: [fht] FMC Alias Private Key: 7
25,905,199 UART: [art] Extend RT PCRs Done
25,906,423 UART: [art] Lock RT PCRs Done
25,908,073 UART: [art] Populate DV Done
25,913,789 UART: [fht] FMC Alias Private Key: 7
25,915,387 UART: [art] Derive CDI
25,916,207 UART: [art] Store in slot 0x4
25,974,170 UART: [art] Derive Key Pair
25,975,207 UART: [art] Store priv key in slot 0x5
29,268,752 UART: [art] Derive Key Pair - Done
29,281,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,570,345 UART: [art] Erasing AUTHORITY.KEYID = 7
31,571,903 UART: [art] PUB.X = 0807E8F6374629587F58CB5F468853BEC923AD394FE5B8C16108AF9C4CE2F5F38ED226DD6190A26B0287727B27730AB1
31,579,113 UART: [art] PUB.Y = 4C807BC8073207022920C00C1182B6DFC5D97F388CB5523A8140085255B8B8CB38A742A2BE35E972DD498E18992F1F0D
31,586,303 UART: [art] SIG.R = 3406870F5E67FF53434C751CDAE84ED9F5204D18FE3F06A8A5001845F26793CC901B4402118B997EB450B2DF8E4B822D
31,593,699 UART: [art] SIG.S = 0909B7A4E64A6276C6EEB802C6A8B55F8D2420D97F71032DC4D7E4E360C540D03C00EEE81A158F3D3307964041B62FF3
32,898,425 UART: Caliptra RT
32,899,144 UART: [state] CFI Enabled
33,075,765 UART: [rt] RT listening for mailbox commands...
33,077,639 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,107,302 UART: [rt]cmd =0x46504c54, len=4
33,109,044 >>> mbox cmd response data (8 bytes)
33,110,240 UART: [rt] FIPS self test
33,111,183 UART: [kat] ++
33,111,633 UART: [kat] sha1
33,115,980 UART: [kat] SHA2-256
33,117,853 UART: [kat] SHA2-384
33,120,845 UART: [kat] SHA2-512-ACC
33,121,725 UART: Droping operation
33,122,493 UART: Fatal Error: 0x90050002
33,157,743 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,307,587 >>> mbox cmd response: failed
33,308,216 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,458,121 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,039 UART:
190,335 UART: Running Caliptra ROM ...
191,359 UART:
191,498 UART: [state] CFI Enabled
266,129 UART: [state] LifecycleState = Unprovisioned
268,051 UART: [state] DebugLocked = No
270,542 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,896 UART: [kat] SHA2-256
444,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,135 UART: [kat] ++
455,584 UART: [kat] sha1
466,245 UART: [kat] SHA2-256
468,925 UART: [kat] SHA2-384
474,472 UART: [kat] SHA2-512-ACC
476,823 UART: [kat] ECC-384
2,770,662 UART: [kat] HMAC-384Kdf
2,800,739 UART: [kat] LMS
3,991,047 UART: [kat] --
3,997,771 UART: [cold-reset] ++
3,999,018 UART: [fht] Storing FHT @ 0x50003400
4,010,782 UART: [idev] ++
4,011,394 UART: [idev] CDI.KEYID = 6
4,012,290 UART: [idev] SUBJECT.KEYID = 7
4,013,339 UART: [idev] UDS.KEYID = 0
4,014,957 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,164,908 UART: [idev] Erasing UDS.KEYID = 0
7,348,213 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,060 UART: [idev] --
7,373,532 UART: [ldev] ++
7,374,133 UART: [ldev] CDI.KEYID = 6
7,375,022 UART: [ldev] SUBJECT.KEYID = 5
7,376,301 UART: [ldev] AUTHORITY.KEYID = 7
7,377,558 UART: [ldev] FE.KEYID = 1
7,423,236 UART: [ldev] Erasing FE.KEYID = 1
10,754,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,973 UART: [ldev] --
13,114,051 UART: [fwproc] Waiting for Commands...
13,117,076 UART: [fwproc] Received command 0x46574c44
13,119,269 UART: [fwproc] Received Image of size 119428 bytes
17,239,519 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,310,473 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,383,613 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,714,751 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,807,604 ready_for_fw is high
3,808,266 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,012,744 >>> mbox cmd response: success
23,707,865 UART:
23,708,253 UART: Running Caliptra FMC ...
23,709,400 UART:
23,709,574 UART: [state] CFI Enabled
23,775,243 UART: [fht] FMC Alias Private Key: 7
26,116,063 UART: [art] Extend RT PCRs Done
26,117,298 UART: [art] Lock RT PCRs Done
26,119,140 UART: [art] Populate DV Done
26,124,194 UART: [fht] FMC Alias Private Key: 7
26,125,643 UART: [art] Derive CDI
26,126,566 UART: [art] Store in slot 0x4
26,184,154 UART: [art] Derive Key Pair
26,185,213 UART: [art] Store priv key in slot 0x5
29,478,340 UART: [art] Derive Key Pair - Done
29,491,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,780,069 UART: [art] Erasing AUTHORITY.KEYID = 7
31,781,584 UART: [art] PUB.X = A12FE3E679C1255AF2324131AE0225502644A428048CFAF3884300A808CE80D8F7058C81163B48EB3750085D396C4E35
31,788,798 UART: [art] PUB.Y = E81EE714E23D96E474E1B5B65FE6D4B0485133A1F8DB54A1220A7485AD5961E6B46670E213A4681DAECD910954382878
31,796,007 UART: [art] SIG.R = 16C4ACB0F2F7216D89BEC0927E6FA0E0881D5C6CD6636B9D97C3B4BE5A7B4D54F64AE296EC07A9FB867894F74A0677F3
31,803,416 UART: [art] SIG.S = 6DB25E4BD586D0D7CF0F1FF31034FC2789425F992F1BC80E7020514793363307C8F0863E897158CAFF19AAF64740A4B9
33,107,942 UART: Caliptra RT
33,108,660 UART: [state] CFI Enabled
33,286,697 UART: [rt] RT listening for mailbox commands...
33,288,586 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,318,119 UART: [rt]cmd =0x46504c54, len=4
33,319,680 >>> mbox cmd response data (8 bytes)
33,320,666 UART: [rt] FIPS self test
33,321,619 UART: [kat] ++
33,322,093 UART: [kat] sha1
33,326,390 UART: [kat] SHA2-256
33,328,263 UART: [kat] SHA2-384
33,331,307 UART: [kat] SHA2-512-ACC
33,332,192 UART: Droping operation
33,333,039 UART: Fatal Error: 0x90050002
33,368,116 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,518,086 >>> mbox cmd response: failed
33,518,716 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,669,177 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,786,091 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,983,236 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
192,534 UART:
192,905 UART: Running Caliptra ROM ...
194,058 UART:
603,664 UART: [state] CFI Enabled
620,640 UART: [state] LifecycleState = Unprovisioned
622,635 UART: [state] DebugLocked = No
625,105 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,341 UART: [kat] SHA2-256
799,093 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,675 UART: [kat] ++
810,215 UART: [kat] sha1
820,532 UART: [kat] SHA2-256
823,182 UART: [kat] SHA2-384
829,460 UART: [kat] SHA2-512-ACC
831,784 UART: [kat] ECC-384
3,113,510 UART: [kat] HMAC-384Kdf
3,125,465 UART: [kat] LMS
4,315,567 UART: [kat] --
4,319,311 UART: [cold-reset] ++
4,321,750 UART: [fht] Storing FHT @ 0x50003400
4,332,811 UART: [idev] ++
4,333,384 UART: [idev] CDI.KEYID = 6
4,334,307 UART: [idev] SUBJECT.KEYID = 7
4,335,565 UART: [idev] UDS.KEYID = 0
4,336,550 ready_for_fw is high
4,336,776 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,486,777 UART: [idev] Erasing UDS.KEYID = 0
7,625,866 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,978 UART: [idev] --
7,653,178 UART: [ldev] ++
7,653,773 UART: [ldev] CDI.KEYID = 6
7,654,800 UART: [ldev] SUBJECT.KEYID = 5
7,655,914 UART: [ldev] AUTHORITY.KEYID = 7
7,657,399 UART: [ldev] FE.KEYID = 1
7,669,722 UART: [ldev] Erasing FE.KEYID = 1
10,955,524 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,797 UART: [ldev] --
13,316,155 UART: [fwproc] Waiting for Commands...
13,318,264 UART: [fwproc] Received command 0x46574c44
13,320,460 UART: [fwproc] Received Image of size 119428 bytes
17,438,276 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,513,186 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,586,336 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,918,212 >>> mbox cmd response: success
17,922,274 UART: [afmc] ++
17,922,875 UART: [afmc] CDI.KEYID = 6
17,923,822 UART: [afmc] SUBJECT.KEYID = 7
17,925,041 UART: [afmc] AUTHORITY.KEYID = 5
21,243,490 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,535,305 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,537,584 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,551,980 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,566,730 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,581,145 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,602,437 UART: [afmc] --
23,605,883 UART: [cold-reset] --
23,609,374 UART: [state] Locking Datavault
23,614,353 UART: [state] Locking PCR0, PCR1 and PCR31
23,616,132 UART: [state] Locking ICCM
23,618,406 UART: [exit] Launching FMC @ 0x40000130
23,626,811 UART:
23,627,054 UART: Running Caliptra FMC ...
23,628,174 UART:
23,628,337 UART: [state] CFI Enabled
23,636,281 UART: [fht] FMC Alias Private Key: 7
25,977,079 UART: [art] Extend RT PCRs Done
25,978,311 UART: [art] Lock RT PCRs Done
25,979,750 UART: [art] Populate DV Done
25,985,168 UART: [fht] FMC Alias Private Key: 7
25,986,769 UART: [art] Derive CDI
25,987,591 UART: [art] Store in slot 0x4
26,030,081 UART: [art] Derive Key Pair
26,031,094 UART: [art] Store priv key in slot 0x5
29,273,035 UART: [art] Derive Key Pair - Done
29,286,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,566,468 UART: [art] Erasing AUTHORITY.KEYID = 7
31,567,981 UART: [art] PUB.X = F69017AD69F5D891395A594CA6D9B4E194DA946C4B6F70D2C9E8CE53643AE52F8FF06A963752D1B8C0D63607B16955FF
31,575,240 UART: [art] PUB.Y = F02A32FD93DED8D1F53134F7856AE8FB40751B808946D6CE7BB1829798466CCBF57DD66C3EAEE39291AFA31DE8DF64E3
31,582,559 UART: [art] SIG.R = 78E086CA296FCCAA5FE0F87B5130FAD25A9D5DF67D4AE9F95802D8363ACD06A0BA5497D8BAE294EDA5895976D765B487
31,589,986 UART: [art] SIG.S = 1FBFA9EB3836B0612928979596D39CACED5D8691EFEB76E166055346691CDFA2F87C9C35A237372868F61DFB56D7FF16
32,895,040 UART: Caliptra RT
32,895,753 UART: [state] CFI Enabled
33,028,107 UART: [rt] RT listening for mailbox commands...
33,029,963 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,059,870 UART: [rt]cmd =0x46504c54, len=4
33,061,667 >>> mbox cmd response data (8 bytes)
33,062,479 UART: [rt] FIPS self test
33,063,435 UART: [kat] ++
33,063,892 UART: [kat] sha1
33,068,446 UART: [kat] SHA2-256
33,070,352 UART: [kat] SHA2-384
33,073,163 UART: [kat] SHA2-512-ACC
33,074,056 UART: Droping operation
33,074,838 UART: Fatal Error: 0x90050002
33,110,164 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,260,155 >>> mbox cmd response: failed
33,260,838 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,410,577 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
190,125 UART:
190,418 UART: Running Caliptra ROM ...
191,473 UART:
7,118,135 UART: [state] CFI Enabled
7,135,920 UART: [state] LifecycleState = Unprovisioned
7,137,871 UART: [state] DebugLocked = No
7,139,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,144,580 UART: [kat] SHA2-256
7,314,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,324,885 UART: [kat] ++
7,325,434 UART: [kat] sha1
7,336,765 UART: [kat] SHA2-256
7,339,454 UART: [kat] SHA2-384
7,344,689 UART: [kat] SHA2-512-ACC
7,347,040 UART: [kat] ECC-384
9,631,642 UART: [kat] HMAC-384Kdf
9,644,260 UART: [kat] LMS
10,834,363 UART: [kat] --
10,838,804 UART: [cold-reset] ++
10,841,225 UART: [fht] Storing FHT @ 0x50003400
10,853,634 UART: [idev] ++
10,854,202 UART: [idev] CDI.KEYID = 6
10,855,165 UART: [idev] SUBJECT.KEYID = 7
10,856,387 UART: [idev] UDS.KEYID = 0
10,857,968 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,007,868 UART: [idev] Erasing UDS.KEYID = 0
14,143,137 UART: [idev] Using Sha1 for KeyId Algorithm
14,164,210 UART: [idev] --
14,169,725 UART: [ldev] ++
14,170,332 UART: [ldev] CDI.KEYID = 6
14,171,247 UART: [ldev] SUBJECT.KEYID = 5
14,172,468 UART: [ldev] AUTHORITY.KEYID = 7
14,173,761 UART: [ldev] FE.KEYID = 1
14,184,198 UART: [ldev] Erasing FE.KEYID = 1
17,471,784 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,765,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,779,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,794,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,809,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,827,205 UART: [ldev] --
19,832,421 UART: [fwproc] Waiting for Commands...
19,835,606 UART: [fwproc] Received command 0x46574c44
19,837,800 UART: [fwproc] Received Image of size 119428 bytes
23,951,307 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,028,805 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,101,939 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,432,997 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
4,127,093 ready_for_fw is high
4,127,947 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,167,490 >>> mbox cmd response: success
23,808,659 UART:
23,809,162 UART: Running Caliptra FMC ...
23,810,280 UART:
23,810,451 UART: [state] CFI Enabled
23,818,036 UART: [fht] FMC Alias Private Key: 7
26,158,073 UART: [art] Extend RT PCRs Done
26,159,360 UART: [art] Lock RT PCRs Done
26,161,073 UART: [art] Populate DV Done
26,166,629 UART: [fht] FMC Alias Private Key: 7
26,168,235 UART: [art] Derive CDI
26,169,062 UART: [art] Store in slot 0x4
26,211,776 UART: [art] Derive Key Pair
26,212,787 UART: [art] Store priv key in slot 0x5
29,454,892 UART: [art] Derive Key Pair - Done
29,467,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,992 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,510 UART: [art] PUB.X = 12F3063AF4FB546AB3E8AE3014D10FD898FFC789CBA4286D84BD42B6A584079D56B5F98CB301E15D533E82C749B70C5B
31,756,821 UART: [art] PUB.Y = 000E41C2AE57E5FA0844FC0D9904D11CAF56F8A255BFD64C9DD75BDA0B6CEB35CBBFAB4B206593AE415B8952ED66A387
31,764,032 UART: [art] SIG.R = F15BEFA43AD6E0BDECF81874749FADE8FF67C23F6D8C6614A3EE6C5C0A0B1DDA73F1648C6D3EE22040994424DBC5D4C7
31,771,461 UART: [art] SIG.S = 16E148286FB195F74289F01429EE829E18A93B7E7A784BB2DB2C7C356FE58A2B3B047F1CD8C700257569729299E36A41
33,076,587 UART: Caliptra RT
33,077,295 UART: [state] CFI Enabled
33,210,479 UART: [rt] RT listening for mailbox commands...
33,212,342 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,242,054 UART: [rt]cmd =0x46504c54, len=4
33,243,585 >>> mbox cmd response data (8 bytes)
33,245,142 UART: [rt] FIPS self test
33,246,090 UART: [kat] ++
33,246,553 UART: [kat] sha1
33,250,853 UART: [kat] SHA2-256
33,252,789 UART: [kat] SHA2-384
33,255,705 UART: [kat] SHA2-512-ACC
33,256,594 UART: Droping operation
33,257,468 UART: Fatal Error: 0x90050002
33,292,804 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,443,459 >>> mbox cmd response: failed
33,444,145 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,594,040 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
10,456,874 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,518,083 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,227 UART:
192,604 UART: Running Caliptra ROM ...
193,828 UART:
193,982 UART: [state] CFI Enabled
265,081 UART: [state] LifecycleState = Unprovisioned
267,003 UART: [state] DebugLocked = No
268,982 UART: [state] WD Timer not started. Device not locked for debugging
272,265 UART: [kat] SHA2-256
451,889 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,706 UART: [kat] ++
463,195 UART: [kat] sha1
474,215 UART: [kat] SHA2-256
476,954 UART: [kat] SHA2-384
482,742 UART: [kat] SHA2-512-ACC
485,118 UART: [kat] ECC-384
2,949,036 UART: [kat] HMAC-384Kdf
2,971,758 UART: [kat] LMS
3,448,284 UART: [kat] --
3,451,884 UART: [cold-reset] ++
3,453,189 UART: [fht] FHT @ 0x50003400
3,464,358 UART: [idev] ++
3,464,976 UART: [idev] CDI.KEYID = 6
3,465,874 UART: [idev] SUBJECT.KEYID = 7
3,467,128 UART: [idev] UDS.KEYID = 0
3,468,112 ready_for_fw is high
3,468,344 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,618,580 UART: [idev] Erasing UDS.KEYID = 0
5,987,330 UART: [idev] Sha1 KeyId Algorithm
6,012,306 UART: [idev] --
6,017,440 UART: [ldev] ++
6,018,059 UART: [ldev] CDI.KEYID = 6
6,018,981 UART: [ldev] SUBJECT.KEYID = 5
6,020,066 UART: [ldev] AUTHORITY.KEYID = 7
6,021,370 UART: [ldev] FE.KEYID = 1
6,059,164 UART: [ldev] Erasing FE.KEYID = 1
8,562,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,220 UART: [ldev] --
10,371,410 UART: [fwproc] Wait for Commands...
10,373,726 UART: [fwproc] Recv command 0x46574c44
10,375,769 UART: [fwproc] Recv'd Img size: 119428 bytes
13,874,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,278 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,028,295 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,360,368 >>> mbox cmd response: success
14,364,508 UART: [afmc] ++
14,365,101 UART: [afmc] CDI.KEYID = 6
14,366,048 UART: [afmc] SUBJECT.KEYID = 7
14,367,268 UART: [afmc] AUTHORITY.KEYID = 5
16,902,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,644,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,647,020 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,662,880 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,678,865 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,694,461 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,717,864 UART: [afmc] --
18,722,379 UART: [cold-reset] --
18,725,544 UART: [state] Locking Datavault
18,732,580 UART: [state] Locking PCR0, PCR1 and PCR31
18,734,283 UART: [state] Locking ICCM
18,735,546 UART: [exit] Launching FMC @ 0x40000130
18,743,937 UART:
18,744,192 UART: Running Caliptra FMC ...
18,745,305 UART:
18,745,475 UART: [state] CFI Enabled
18,800,759 UART: [fht] FMC Alias Private Key: 7
20,567,835 UART: [art] Extend RT PCRs Done
20,569,060 UART: [art] Lock RT PCRs Done
20,570,864 UART: [art] Populate DV Done
20,576,280 UART: [fht] FMC Alias Private Key: 7
20,577,808 UART: [art] Derive CDI
20,578,559 UART: [art] Store in slot 0x4
20,634,469 UART: [art] Derive Key Pair
20,635,478 UART: [art] Store priv key in slot 0x5
23,098,333 UART: [art] Derive Key Pair - Done
23,111,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,823,885 UART: [art] Erasing AUTHORITY.KEYID = 7
24,825,395 UART: [art] PUB.X = 4CFB7D82D9EA968076C29DF6B07479F69010378556D5E0F49602FDA0C525B84F2D1545E0B30B918D9CCA497433C32BBE
24,832,672 UART: [art] PUB.Y = 7F67B1EAE5A13E0208E6973BEDAE569D8E9859B0D22F4A2E62EFD82AA2ED6D009B8BE6C4C734016253F30186ED2049EE
24,839,938 UART: [art] SIG.R = E7B056DC7843A91AA784FE845D4413EC71E8576CDC13B1714A0820B1820550B0AC7014F0B871A1480376310DF114E0A1
24,847,254 UART: [art] SIG.S = BCE3B7EDB61AB00F9B96797D0EAF899870E2E17A6179A5A47531EAFCDD50EA03CCF86361F4A3698386C6601C8807A09F
25,825,976 UART: Caliptra RT
25,826,672 UART: [state] CFI Enabled
26,007,730 UART: [rt] RT listening for mailbox commands...
26,009,596 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,039,490 UART: [rt]cmd =0x46504c54, len=4
26,041,296 >>> mbox cmd response data (8 bytes)
26,042,655 UART: [rt] FIPS self test
26,043,609 UART: [kat] ++
26,044,063 UART: [kat] sha1
26,048,419 UART: [kat] SHA2-256
26,050,303 UART: [kat] SHA2-384
26,053,319 UART: [kat] SHA2-512-ACC
26,054,207 UART: Droping operation
26,054,987 UART: Fatal Error: 0x90050002
26,090,059 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,240,034 >>> mbox cmd response: failed
26,240,685 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,390,590 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
189,991 UART:
190,281 UART: Running Caliptra ROM ...
191,313 UART:
191,454 UART: [state] CFI Enabled
266,522 UART: [state] LifecycleState = Unprovisioned
268,440 UART: [state] DebugLocked = No
270,552 UART: [state] WD Timer not started. Device not locked for debugging
274,677 UART: [kat] SHA2-256
454,334 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,085 UART: [kat] ++
465,542 UART: [kat] sha1
475,282 UART: [kat] SHA2-256
477,973 UART: [kat] SHA2-384
484,006 UART: [kat] SHA2-512-ACC
486,409 UART: [kat] ECC-384
2,930,367 UART: [kat] HMAC-384Kdf
2,952,607 UART: [kat] LMS
3,429,098 UART: [kat] --
3,431,915 UART: [cold-reset] ++
3,433,641 UART: [fht] FHT @ 0x50003400
3,445,327 UART: [idev] ++
3,445,901 UART: [idev] CDI.KEYID = 6
3,446,926 UART: [idev] SUBJECT.KEYID = 7
3,448,112 UART: [idev] UDS.KEYID = 0
3,449,625 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,599,700 UART: [idev] Erasing UDS.KEYID = 0
5,969,364 UART: [idev] Sha1 KeyId Algorithm
5,993,251 UART: [idev] --
5,999,088 UART: [ldev] ++
5,999,665 UART: [ldev] CDI.KEYID = 6
6,000,580 UART: [ldev] SUBJECT.KEYID = 5
6,001,750 UART: [ldev] AUTHORITY.KEYID = 7
6,003,047 UART: [ldev] FE.KEYID = 1
6,040,346 UART: [ldev] Erasing FE.KEYID = 1
8,546,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,283,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,299,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,315,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,330,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,351,593 UART: [ldev] --
10,356,939 UART: [fwproc] Wait for Commands...
10,359,426 UART: [fwproc] Recv command 0x46574c44
10,361,419 UART: [fwproc] Recv'd Img size: 119428 bytes
13,859,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,218 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,247 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,343,408 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,459,082 ready_for_fw is high
3,459,593 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,258,626 >>> mbox cmd response: success
18,533,727 UART:
18,534,171 UART: Running Caliptra FMC ...
18,535,292 UART:
18,535,471 UART: [state] CFI Enabled
18,605,426 UART: [fht] FMC Alias Private Key: 7
20,371,221 UART: [art] Extend RT PCRs Done
20,372,456 UART: [art] Lock RT PCRs Done
20,374,222 UART: [art] Populate DV Done
20,379,496 UART: [fht] FMC Alias Private Key: 7
20,381,099 UART: [art] Derive CDI
20,381,850 UART: [art] Store in slot 0x4
20,437,115 UART: [art] Derive Key Pair
20,438,166 UART: [art] Store priv key in slot 0x5
22,901,149 UART: [art] Derive Key Pair - Done
22,914,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,395 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,902 UART: [art] PUB.X = BAF9BC68E67C1882DEFD231B58AF399E681106104E79EB578166F6735C31505906AEF801D562FB581CD90570574BA8BF
24,635,167 UART: [art] PUB.Y = 02F14CF006E652ECE661998E6073BA5C458BB9343E6FC83AB5912F2CD424BE4CE2B4D28E19DCF1128CA137348E0D8D58
24,642,425 UART: [art] SIG.R = 92BF92F7034430FAFA3A9A2D608E1D8D631A3EE886C398DB58D4C604B0E0E369750CA17FA2FB11E126805381E93F04F9
24,649,893 UART: [art] SIG.S = 1682246E953F0F00E4A9EB31A00C521617919574DD65122282D476AAAFFB18A13D6D4F77505CEE51C1277DB485035F32
25,628,441 UART: Caliptra RT
25,629,145 UART: [state] CFI Enabled
25,808,890 UART: [rt] RT listening for mailbox commands...
25,810,745 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,840,543 UART: [rt]cmd =0x46504c54, len=4
25,842,232 >>> mbox cmd response data (8 bytes)
25,843,606 UART: [rt] FIPS self test
25,844,557 UART: [kat] ++
25,845,013 UART: [kat] sha1
25,849,451 UART: [kat] SHA2-256
25,851,359 UART: [kat] SHA2-384
25,854,377 UART: [kat] SHA2-512-ACC
25,855,275 UART: Droping operation
25,856,087 UART: Fatal Error: 0x90050002
25,891,245 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,041,655 >>> mbox cmd response: failed
26,042,340 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,192,245 >>> mbox cmd response: failed
Initializing fuses
937 writing to cptra_bootfsm_go
3,462,018 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,257,163 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
192,624 UART:
193,015 UART: Running Caliptra ROM ...
194,175 UART:
603,746 UART: [state] CFI Enabled
620,187 UART: [state] LifecycleState = Unprovisioned
622,144 UART: [state] DebugLocked = No
624,948 UART: [state] WD Timer not started. Device not locked for debugging
629,145 UART: [kat] SHA2-256
808,830 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,628 UART: [kat] ++
820,279 UART: [kat] sha1
831,632 UART: [kat] SHA2-256
834,339 UART: [kat] SHA2-384
839,776 UART: [kat] SHA2-512-ACC
842,153 UART: [kat] ECC-384
3,285,795 UART: [kat] HMAC-384Kdf
3,298,478 UART: [kat] LMS
3,775,015 UART: [kat] --
3,780,195 UART: [cold-reset] ++
3,781,437 UART: [fht] FHT @ 0x50003400
3,791,735 UART: [idev] ++
3,792,350 UART: [idev] CDI.KEYID = 6
3,793,271 UART: [idev] SUBJECT.KEYID = 7
3,794,528 UART: [idev] UDS.KEYID = 0
3,795,462 ready_for_fw is high
3,795,692 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,946,192 UART: [idev] Erasing UDS.KEYID = 0
6,273,116 UART: [idev] Sha1 KeyId Algorithm
6,296,414 UART: [idev] --
6,300,846 UART: [ldev] ++
6,301,477 UART: [ldev] CDI.KEYID = 6
6,302,390 UART: [ldev] SUBJECT.KEYID = 5
6,303,608 UART: [ldev] AUTHORITY.KEYID = 7
6,304,848 UART: [ldev] FE.KEYID = 1
6,316,040 UART: [ldev] Erasing FE.KEYID = 1
8,794,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,856 UART: [ldev] --
10,587,752 UART: [fwproc] Wait for Commands...
10,590,928 UART: [fwproc] Recv command 0x46574c44
10,592,947 UART: [fwproc] Recv'd Img size: 119428 bytes
14,088,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,968 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,241,987 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,573,884 >>> mbox cmd response: success
14,578,460 UART: [afmc] ++
14,579,049 UART: [afmc] CDI.KEYID = 6
14,580,077 UART: [afmc] SUBJECT.KEYID = 7
14,581,190 UART: [afmc] AUTHORITY.KEYID = 5
17,087,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,812,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,814,763 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,830,617 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,846,686 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,862,250 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,886,924 UART: [afmc] --
18,889,955 UART: [cold-reset] --
18,893,664 UART: [state] Locking Datavault
18,897,409 UART: [state] Locking PCR0, PCR1 and PCR31
18,899,166 UART: [state] Locking ICCM
18,901,541 UART: [exit] Launching FMC @ 0x40000130
18,909,951 UART:
18,910,237 UART: Running Caliptra FMC ...
18,911,359 UART:
18,911,533 UART: [state] CFI Enabled
18,919,211 UART: [fht] FMC Alias Private Key: 7
20,685,512 UART: [art] Extend RT PCRs Done
20,686,737 UART: [art] Lock RT PCRs Done
20,688,448 UART: [art] Populate DV Done
20,694,075 UART: [fht] FMC Alias Private Key: 7
20,695,621 UART: [art] Derive CDI
20,696,437 UART: [art] Store in slot 0x4
20,738,945 UART: [art] Derive Key Pair
20,739,949 UART: [art] Store priv key in slot 0x5
23,166,689 UART: [art] Derive Key Pair - Done
23,179,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,886,278 UART: [art] Erasing AUTHORITY.KEYID = 7
24,887,787 UART: [art] PUB.X = 539F5DA1E33B7827F0A1C1259816EC1026D61CDD99232BFB80749B35CD6365BF1E03E50C0E7AA187730EF301D4E125C8
24,895,044 UART: [art] PUB.Y = 304651E3153729749EAFC5EC9709D7C66EA4F9714498C45747FCD2AA35B1F8F2F551B6FC556A2DC4B6411658D11C2CE5
24,902,296 UART: [art] SIG.R = 15A243ACC69BC3D70CFEFDFAC87525817DC7558B67E525B920DFA3D6BB2B3E0839A9D2383F9056369249D4557B959776
24,909,748 UART: [art] SIG.S = 70AA1487D2C304D36DF02E3EF8EBE9A4CD581C298AC2D39A462A8C2B6947D60648BDF8C37EE26FF711EE63422A6EDAE4
25,888,939 UART: Caliptra RT
25,889,632 UART: [state] CFI Enabled
26,022,513 UART: [rt] RT listening for mailbox commands...
26,024,497 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,054,453 UART: [rt]cmd =0x46504c54, len=4
26,056,148 >>> mbox cmd response data (8 bytes)
26,057,326 UART: [rt] FIPS self test
26,058,292 UART: [kat] ++
26,058,746 UART: [kat] sha1
26,062,990 UART: [kat] SHA2-256
26,064,927 UART: [kat] SHA2-384
26,067,947 UART: [kat] SHA2-512-ACC
26,068,832 UART: Droping operation
26,069,609 UART: Fatal Error: 0x90050002
26,104,908 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,254,797 >>> mbox cmd response: failed
26,255,433 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,405,370 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,037 UART:
190,334 UART: Running Caliptra ROM ...
191,401 UART:
14,122,678 UART: [state] CFI Enabled
14,135,210 UART: [state] LifecycleState = Unprovisioned
14,137,120 UART: [state] DebugLocked = No
14,139,407 UART: [state] WD Timer not started. Device not locked for debugging
14,143,096 UART: [kat] SHA2-256
14,322,750 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,333,546 UART: [kat] ++
14,334,008 UART: [kat] sha1
14,344,740 UART: [kat] SHA2-256
14,347,418 UART: [kat] SHA2-384
14,353,643 UART: [kat] SHA2-512-ACC
14,356,004 UART: [kat] ECC-384
16,794,784 UART: [kat] HMAC-384Kdf
16,807,460 UART: [kat] LMS
17,283,988 UART: [kat] --
17,287,952 UART: [cold-reset] ++
17,289,809 UART: [fht] FHT @ 0x50003400
17,302,607 UART: [idev] ++
17,303,212 UART: [idev] CDI.KEYID = 6
17,304,131 UART: [idev] SUBJECT.KEYID = 7
17,305,354 UART: [idev] UDS.KEYID = 0
17,306,886 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,456,651 UART: [idev] Erasing UDS.KEYID = 0
19,784,333 UART: [idev] Sha1 KeyId Algorithm
19,808,326 UART: [idev] --
19,813,185 UART: [ldev] ++
19,813,755 UART: [ldev] CDI.KEYID = 6
19,814,662 UART: [ldev] SUBJECT.KEYID = 5
19,815,876 UART: [ldev] AUTHORITY.KEYID = 7
19,817,159 UART: [ldev] FE.KEYID = 1
19,827,803 UART: [ldev] Erasing FE.KEYID = 1
22,305,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,027,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,042,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,058,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,074,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,095,659 UART: [ldev] --
24,101,337 UART: [fwproc] Wait for Commands...
24,104,018 UART: [fwproc] Recv command 0x46574c44
24,106,025 UART: [fwproc] Recv'd Img size: 119428 bytes
27,593,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,671,017 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,744,033 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,074,862 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,610 writing to cptra_bootfsm_go
3,783,711 ready_for_fw is high
3,784,109 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,452,691 >>> mbox cmd response: success
18,700,802 UART:
18,701,500 UART: Running Caliptra FMC ...
18,702,635 UART:
18,702,799 UART: [state] CFI Enabled
18,710,291 UART: [fht] FMC Alias Private Key: 7
20,476,153 UART: [art] Extend RT PCRs Done
20,477,375 UART: [art] Lock RT PCRs Done
20,478,894 UART: [art] Populate DV Done
20,484,278 UART: [fht] FMC Alias Private Key: 7
20,485,723 UART: [art] Derive CDI
20,486,490 UART: [art] Store in slot 0x4
20,529,143 UART: [art] Derive Key Pair
20,530,152 UART: [art] Store priv key in slot 0x5
22,957,612 UART: [art] Derive Key Pair - Done
22,970,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,079 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,596 UART: [art] PUB.X = 81F6A7F6EA637CE85137FEDB7033CC3D01623880D7EF123EFAA5CE1D7C6AB5574D6647B6BE279F1BE2FC1E1C914699B3
24,685,930 UART: [art] PUB.Y = 92CC7F9DC962CAC79F34C6CB0A856602B1472BC07B7907FF65D5FE22A9AFD874E8258067AAC9B2BF72F112ED6CD764F9
24,693,196 UART: [art] SIG.R = 758457CF255D8731EF157AC8721331EF399EA5A2C996854BCAFC687CCCFF741BFC4D34B7B042DCCC2FE58D968C1F45CE
24,700,596 UART: [art] SIG.S = 48F098D60F86B6379573994633F4E992BAEC6F798D7635CAE573341CCC92C992AE3FFBA01C55110EC35FA797A2ABF527
25,679,753 UART: Caliptra RT
25,680,476 UART: [state] CFI Enabled
25,813,472 UART: [rt] RT listening for mailbox commands...
25,815,328 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,844,894 UART: [rt]cmd =0x46504c54, len=4
25,846,568 >>> mbox cmd response data (8 bytes)
25,847,423 UART: [rt] FIPS self test
25,848,372 UART: [kat] ++
25,848,826 UART: [kat] sha1
25,853,065 UART: [kat] SHA2-256
25,854,944 UART: [kat] SHA2-384
25,857,799 UART: [kat] SHA2-512-ACC
25,858,690 UART: Droping operation
25,859,523 UART: Fatal Error: 0x90050002
25,894,671 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,044,629 >>> mbox cmd response: failed
26,045,302 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,195,234 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
17,512,484 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,186,132 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,050 UART:
192,438 UART: Running Caliptra ROM ...
193,578 UART:
193,726 UART: [state] CFI Enabled
260,926 UART: [state] LifecycleState = Unprovisioned
263,349 UART: [state] DebugLocked = No
266,054 UART: [state] WD Timer not started. Device not locked for debugging
270,609 UART: [kat] SHA2-256
460,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,254 UART: [kat] ++
471,734 UART: [kat] sha1
482,329 UART: [kat] SHA2-256
485,350 UART: [kat] SHA2-384
491,847 UART: [kat] SHA2-512-ACC
494,444 UART: [kat] ECC-384
2,949,198 UART: [kat] HMAC-384Kdf
2,971,343 UART: [kat] LMS
3,503,064 UART: [kat] --
3,508,978 UART: [cold-reset] ++
3,509,988 UART: [fht] FHT @ 0x50003400
3,521,829 UART: [idev] ++
3,522,468 UART: [idev] CDI.KEYID = 6
3,523,634 UART: [idev] SUBJECT.KEYID = 7
3,524,752 UART: [idev] UDS.KEYID = 0
3,525,689 ready_for_fw is high
3,525,926 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,194 UART: [idev] Erasing UDS.KEYID = 0
6,029,940 UART: [idev] Sha1 KeyId Algorithm
6,052,102 UART: [idev] --
6,057,514 UART: [ldev] ++
6,058,203 UART: [ldev] CDI.KEYID = 6
6,059,121 UART: [ldev] SUBJECT.KEYID = 5
6,060,289 UART: [ldev] AUTHORITY.KEYID = 7
6,061,527 UART: [ldev] FE.KEYID = 1
6,100,107 UART: [ldev] Erasing FE.KEYID = 1
8,604,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,783 UART: [ldev] --
10,415,659 UART: [fwproc] Wait for Commands...
10,418,828 UART: [fwproc] Recv command 0x46574c44
10,421,162 UART: [fwproc] Recv'd Img size: 119428 bytes
13,934,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,013,564 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,137,184 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,702,676 >>> mbox cmd response: success
14,706,603 UART: [afmc] ++
14,707,306 UART: [afmc] CDI.KEYID = 6
14,708,413 UART: [afmc] SUBJECT.KEYID = 7
14,709,953 UART: [afmc] AUTHORITY.KEYID = 5
17,236,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,981,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,983,379 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,998,475 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,013,619 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,028,540 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,052,514 UART: [afmc] --
19,056,162 UART: [cold-reset] --
19,059,877 UART: [state] Locking Datavault
19,065,076 UART: [state] Locking PCR0, PCR1 and PCR31
19,067,227 UART: [state] Locking ICCM
19,069,091 UART: [exit] Launching FMC @ 0x40000130
19,077,766 UART:
19,078,010 UART: Running Caliptra FMC ...
19,079,124 UART:
19,079,286 UART: [state] CFI Enabled
19,136,520 UART: [fht] FMC Alias Private Key: 7
20,902,749 UART: [art] Extend RT PCRs Done
20,904,355 UART: [art] Lock RT PCRs Done
20,905,755 UART: [art] Populate DV Done
20,911,406 UART: [fht] FMC Alias Private Key: 7
20,913,062 UART: [art] Derive CDI
20,913,892 UART: [art] Store in slot 0x4
20,969,862 UART: [art] Derive Key Pair
20,970,861 UART: [art] Store priv key in slot 0x5
23,433,656 UART: [art] Derive Key Pair - Done
23,446,554 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,134 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,632 UART: [art] PUB.X = 27287FDAC01588003328BB03182D6743A50B8073E4DF46CDC24E9C0E33FEAEC432C1AE6F7788969E7C99E757BF4F44C5
25,167,903 UART: [art] PUB.Y = B3A3E15E5521147B10815A62B291A86EF415E09BE81B5C49299B89AA0F62E8E4D0CE1BC29AFD024DD3039E2E66A2EB5C
25,175,151 UART: [art] SIG.R = B1C7B4CE921A2DA90F980597A9F9F21168CFB6FCF4E6538CB325C93D49104E11B5F5DEAEF5D9E780A34C7420543DE8F2
25,182,551 UART: [art] SIG.S = C92E2A3C4230B46ADD2CDBE7E32ABF09A70ACF5CCC169886738E98C648BAB1F2B89571ABEFD0FD77D95D4CAEC1560EC7
26,161,985 UART: Caliptra RT
26,162,697 UART: [state] CFI Enabled
26,341,920 UART: [rt] RT listening for mailbox commands...
26,343,794 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,373,568 UART: [rt]cmd =0x46504c54, len=4
26,375,203 >>> mbox cmd response data (8 bytes)
26,376,049 UART: [rt] FIPS self test
26,377,001 UART: [kat] ++
26,377,465 UART: [kat] sha1
26,381,710 UART: [kat] SHA2-256
26,383,588 UART: [kat] SHA2-384
26,386,514 UART: [kat] SHA2-512-ACC
26,387,411 UART: Droping operation
26,388,243 UART: Fatal Error: 0x90050002
26,423,623 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,573,745 >>> mbox cmd response: failed
26,574,411 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,724,215 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,108 UART:
190,404 UART: Running Caliptra ROM ...
191,432 UART:
191,574 UART: [state] CFI Enabled
269,607 UART: [state] LifecycleState = Unprovisioned
272,028 UART: [state] DebugLocked = No
273,276 UART: [state] WD Timer not started. Device not locked for debugging
278,322 UART: [kat] SHA2-256
468,200 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,985 UART: [kat] ++
479,518 UART: [kat] sha1
492,625 UART: [kat] SHA2-256
495,676 UART: [kat] SHA2-384
501,288 UART: [kat] SHA2-512-ACC
503,881 UART: [kat] ECC-384
2,951,398 UART: [kat] HMAC-384Kdf
2,972,707 UART: [kat] LMS
3,504,472 UART: [kat] --
3,509,447 UART: [cold-reset] ++
3,511,495 UART: [fht] FHT @ 0x50003400
3,522,699 UART: [idev] ++
3,523,388 UART: [idev] CDI.KEYID = 6
3,524,411 UART: [idev] SUBJECT.KEYID = 7
3,525,574 UART: [idev] UDS.KEYID = 0
3,527,110 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,677,224 UART: [idev] Erasing UDS.KEYID = 0
6,031,553 UART: [idev] Sha1 KeyId Algorithm
6,053,986 UART: [idev] --
6,058,575 UART: [ldev] ++
6,059,263 UART: [ldev] CDI.KEYID = 6
6,060,171 UART: [ldev] SUBJECT.KEYID = 5
6,061,336 UART: [ldev] AUTHORITY.KEYID = 7
6,062,578 UART: [ldev] FE.KEYID = 1
6,101,018 UART: [ldev] Erasing FE.KEYID = 1
8,610,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,351 UART: [ldev] --
10,416,116 UART: [fwproc] Wait for Commands...
10,419,036 UART: [fwproc] Recv command 0x46574c44
10,421,311 UART: [fwproc] Recv'd Img size: 119428 bytes
13,932,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,010,059 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,133,694 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,699,106 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,440,660 ready_for_fw is high
3,441,290 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,851,171 >>> mbox cmd response: success
19,130,715 UART:
19,131,109 UART: Running Caliptra FMC ...
19,132,272 UART:
19,132,431 UART: [state] CFI Enabled
19,202,337 UART: [fht] FMC Alias Private Key: 7
20,989,156 UART: [art] Extend RT PCRs Done
20,990,390 UART: [art] Lock RT PCRs Done
20,991,917 UART: [art] Populate DV Done
20,997,548 UART: [fht] FMC Alias Private Key: 7
20,999,266 UART: [art] Derive CDI
21,000,091 UART: [art] Store in slot 0x4
21,056,308 UART: [art] Derive Key Pair
21,057,363 UART: [art] Store priv key in slot 0x5
23,520,384 UART: [art] Derive Key Pair - Done
23,533,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,246,559 UART: [art] Erasing AUTHORITY.KEYID = 7
25,248,079 UART: [art] PUB.X = DA9DA93BEE33210EFD21F6BD4CBD5EFEE557323AE475BF0410BD431D602A97F0D4979053472D492582282F67787868DA
25,255,373 UART: [art] PUB.Y = A8A4FADB44A6230039F0B42BD114E584CFA970D5DADA68C03015686167F8D1BAC6A511EFAAFDBEC9E9BED77EEE8DA107
25,262,576 UART: [art] SIG.R = 551A4E607C94D02C73AD70C2DBC5C18BFAC0007A284994C8D4AABB6A05252206F4CADAB185AC73267DD6C459A1EE98A0
25,269,985 UART: [art] SIG.S = D65A78F551787957CF8D7A126D0C32E25CED9B8E9FA7D4B64291D752F5F1F48E6CDF25DA99AFE512F4B50A23317259EE
26,249,050 UART: Caliptra RT
26,249,769 UART: [state] CFI Enabled
26,429,573 UART: [rt] RT listening for mailbox commands...
26,431,429 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,461,003 UART: [rt]cmd =0x46504c54, len=4
26,462,569 >>> mbox cmd response data (8 bytes)
26,463,749 UART: [rt] FIPS self test
26,464,717 UART: [kat] ++
26,465,171 UART: [kat] sha1
26,469,464 UART: [kat] SHA2-256
26,471,346 UART: [kat] SHA2-384
26,474,365 UART: [kat] SHA2-512-ACC
26,475,254 UART: Droping operation
26,476,111 UART: Fatal Error: 0x90050002
26,511,210 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,661,161 >>> mbox cmd response: failed
26,661,765 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,811,718 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,421,374 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,805,594 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,526 UART:
192,901 UART: Running Caliptra ROM ...
194,038 UART:
603,710 UART: [state] CFI Enabled
615,095 UART: [state] LifecycleState = Unprovisioned
619,169 UART: [state] DebugLocked = No
620,205 UART: [state] WD Timer not started. Device not locked for debugging
623,276 UART: [kat] SHA2-256
813,130 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,919 UART: [kat] ++
824,448 UART: [kat] sha1
835,753 UART: [kat] SHA2-256
838,772 UART: [kat] SHA2-384
845,125 UART: [kat] SHA2-512-ACC
847,715 UART: [kat] ECC-384
3,285,936 UART: [kat] HMAC-384Kdf
3,299,169 UART: [kat] LMS
3,830,991 UART: [kat] --
3,836,373 UART: [cold-reset] ++
3,837,679 UART: [fht] FHT @ 0x50003400
3,850,087 UART: [idev] ++
3,850,818 UART: [idev] CDI.KEYID = 6
3,851,732 UART: [idev] SUBJECT.KEYID = 7
3,852,931 UART: [idev] UDS.KEYID = 0
3,853,922 ready_for_fw is high
3,854,147 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,004,166 UART: [idev] Erasing UDS.KEYID = 0
6,335,978 UART: [idev] Sha1 KeyId Algorithm
6,359,971 UART: [idev] --
6,366,152 UART: [ldev] ++
6,366,843 UART: [ldev] CDI.KEYID = 6
6,367,729 UART: [ldev] SUBJECT.KEYID = 5
6,368,836 UART: [ldev] AUTHORITY.KEYID = 7
6,370,132 UART: [ldev] FE.KEYID = 1
6,381,565 UART: [ldev] Erasing FE.KEYID = 1
8,861,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,877 UART: [ldev] --
10,651,709 UART: [fwproc] Wait for Commands...
10,654,028 UART: [fwproc] Recv command 0x46574c44
10,656,351 UART: [fwproc] Recv'd Img size: 119428 bytes
14,161,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,245,842 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,369,491 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,935,175 >>> mbox cmd response: success
14,939,895 UART: [afmc] ++
14,940,608 UART: [afmc] CDI.KEYID = 6
14,941,724 UART: [afmc] SUBJECT.KEYID = 7
14,943,273 UART: [afmc] AUTHORITY.KEYID = 5
17,448,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,169,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,171,418 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,186,503 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,201,670 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,216,548 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,239,982 UART: [afmc] --
19,242,843 UART: [cold-reset] --
19,246,715 UART: [state] Locking Datavault
19,253,051 UART: [state] Locking PCR0, PCR1 and PCR31
19,255,202 UART: [state] Locking ICCM
19,258,122 UART: [exit] Launching FMC @ 0x40000130
19,266,756 UART:
19,266,998 UART: Running Caliptra FMC ...
19,268,108 UART:
19,268,271 UART: [state] CFI Enabled
19,276,437 UART: [fht] FMC Alias Private Key: 7
21,042,431 UART: [art] Extend RT PCRs Done
21,043,695 UART: [art] Lock RT PCRs Done
21,045,214 UART: [art] Populate DV Done
21,050,641 UART: [fht] FMC Alias Private Key: 7
21,052,185 UART: [art] Derive CDI
21,052,925 UART: [art] Store in slot 0x4
21,095,802 UART: [art] Derive Key Pair
21,096,852 UART: [art] Store priv key in slot 0x5
23,523,687 UART: [art] Derive Key Pair - Done
23,536,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,243,034 UART: [art] Erasing AUTHORITY.KEYID = 7
25,244,557 UART: [art] PUB.X = C6F527FC1A653028F71431AD078BF92B6413D7CBD46D62BF2AF631297F5FE29EA53FDB3F0F135D6A3CBADF6987D0FB65
25,251,797 UART: [art] PUB.Y = 2A25DA3F027FD68E2CEC1A4445B58D764ADB0EA2E0AA56D4C3D895D92716514E411454B2842FA2AF4769A591F148305F
25,259,090 UART: [art] SIG.R = 12CE0F963CD28428E5489B273521B67ACD1E82118C4CCDDB2BBDDAB8C9252B49A44D106993FE0D178C216962C03F5917
25,266,427 UART: [art] SIG.S = 6AD15767EEA05E3FDB0B887901365FD19171A8187E77DBAD3521CA1B8DB027A271C2E105B39314A9F49205C1315B79CC
26,245,184 UART: Caliptra RT
26,245,937 UART: [state] CFI Enabled
26,379,502 UART: [rt] RT listening for mailbox commands...
26,381,387 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,411,388 UART: [rt]cmd =0x46504c54, len=4
26,412,861 >>> mbox cmd response data (8 bytes)
26,413,819 UART: [rt] FIPS self test
26,414,768 UART: [kat] ++
26,415,223 UART: [kat] sha1
26,419,734 UART: [kat] SHA2-256
26,421,677 UART: [kat] SHA2-384
26,424,576 UART: [kat] SHA2-512-ACC
26,425,476 UART: Droping operation
26,426,309 UART: Fatal Error: 0x90050002
26,461,458 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,611,433 >>> mbox cmd response: failed
26,612,100 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,762,031 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,139 UART:
190,425 UART: Running Caliptra ROM ...
191,540 UART:
13,776,782 UART: [state] CFI Enabled
13,789,192 UART: [state] LifecycleState = Unprovisioned
13,791,556 UART: [state] DebugLocked = No
13,793,896 UART: [state] WD Timer not started. Device not locked for debugging
13,798,087 UART: [kat] SHA2-256
13,988,006 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,998,785 UART: [kat] ++
13,999,252 UART: [kat] sha1
14,010,039 UART: [kat] SHA2-256
14,013,066 UART: [kat] SHA2-384
14,020,370 UART: [kat] SHA2-512-ACC
14,022,950 UART: [kat] ECC-384
16,460,015 UART: [kat] HMAC-384Kdf
16,471,979 UART: [kat] LMS
17,003,807 UART: [kat] --
17,010,103 UART: [cold-reset] ++
17,011,885 UART: [fht] FHT @ 0x50003400
17,021,963 UART: [idev] ++
17,022,684 UART: [idev] CDI.KEYID = 6
17,023,576 UART: [idev] SUBJECT.KEYID = 7
17,024,855 UART: [idev] UDS.KEYID = 0
17,026,607 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,176,378 UART: [idev] Erasing UDS.KEYID = 0
19,504,247 UART: [idev] Sha1 KeyId Algorithm
19,526,943 UART: [idev] --
19,531,426 UART: [ldev] ++
19,532,107 UART: [ldev] CDI.KEYID = 6
19,533,047 UART: [ldev] SUBJECT.KEYID = 5
19,534,230 UART: [ldev] AUTHORITY.KEYID = 7
19,535,469 UART: [ldev] FE.KEYID = 1
19,547,176 UART: [ldev] Erasing FE.KEYID = 1
22,026,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,747,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,762,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,777,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,793,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,814,060 UART: [ldev] --
23,819,765 UART: [fwproc] Wait for Commands...
23,822,716 UART: [fwproc] Recv command 0x46574c44
23,824,990 UART: [fwproc] Recv'd Img size: 119428 bytes
27,333,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,412,856 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,536,441 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,101,852 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,759,628 ready_for_fw is high
3,760,232 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,060,483 >>> mbox cmd response: success
19,310,539 UART:
19,310,956 UART: Running Caliptra FMC ...
19,312,081 UART:
19,312,244 UART: [state] CFI Enabled
19,319,934 UART: [fht] FMC Alias Private Key: 7
21,086,066 UART: [art] Extend RT PCRs Done
21,087,307 UART: [art] Lock RT PCRs Done
21,089,058 UART: [art] Populate DV Done
21,094,545 UART: [fht] FMC Alias Private Key: 7
21,096,209 UART: [art] Derive CDI
21,097,030 UART: [art] Store in slot 0x4
21,139,858 UART: [art] Derive Key Pair
21,140,905 UART: [art] Store priv key in slot 0x5
23,568,227 UART: [art] Derive Key Pair - Done
23,581,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,287,603 UART: [art] Erasing AUTHORITY.KEYID = 7
25,289,117 UART: [art] PUB.X = 47F6BD443A08B54200B1FB6E2B2257DCB1FE800E4A18DA1D883488046AC9A5854DDC5B8E61AFF770CE66FBC68143365B
25,296,395 UART: [art] PUB.Y = 24DD64DC3A5D957DCF3102767FA75421A6E3AD88D7596F2BB6063B087F0E21E3B532D17C351AC85C302F51293F649E17
25,303,629 UART: [art] SIG.R = E252B3855A82DFFDC93D048E573814F0C0636E2969E66441DECA8C81BA77E6027FDA0A01C0014F1A3C9A080319517786
25,311,014 UART: [art] SIG.S = 4065E96596D8571E2ED2B9D4C0B19A0EC3ABEB08E47426D5DC908EF7A599514B14F837672F68974B67E89DB4291F7AD9
26,290,086 UART: Caliptra RT
26,290,794 UART: [state] CFI Enabled
26,423,908 UART: [rt] RT listening for mailbox commands...
26,425,758 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,455,609 UART: [rt]cmd =0x46504c54, len=4
26,457,193 >>> mbox cmd response data (8 bytes)
26,458,307 UART: [rt] FIPS self test
26,459,257 UART: [kat] ++
26,459,709 UART: [kat] sha1
26,464,057 UART: [kat] SHA2-256
26,465,965 UART: [kat] SHA2-384
26,468,797 UART: [kat] SHA2-512-ACC
26,469,683 UART: Droping operation
26,470,513 UART: Fatal Error: 0x90050002
26,505,761 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,655,805 >>> mbox cmd response: failed
26,656,442 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,806,368 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
16,876,553 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,187,758 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,690 UART: [state] LifecycleState = Unprovisioned
86,345 UART: [state] DebugLocked = No
86,855 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,437 UART: [kat] SHA2-256
882,368 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,483 UART: [kat] ++
886,635 UART: [kat] sha1
890,841 UART: [kat] SHA2-256
892,779 UART: [kat] SHA2-384
895,518 UART: [kat] SHA2-512-ACC
897,419 UART: [kat] ECC-384
903,114 UART: [kat] HMAC-384Kdf
907,658 UART: [kat] LMS
1,475,854 UART: [kat] --
1,476,833 UART: [cold-reset] ++
1,477,229 UART: [fht] Storing FHT @ 0x50003400
1,480,042 UART: [idev] ++
1,480,210 UART: [idev] CDI.KEYID = 6
1,480,570 UART: [idev] SUBJECT.KEYID = 7
1,480,994 UART: [idev] UDS.KEYID = 0
1,481,339 ready_for_fw is high
1,481,339 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,086 UART: [idev] Erasing UDS.KEYID = 0
1,506,036 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,604 UART: [idev] --
1,515,611 UART: [ldev] ++
1,515,779 UART: [ldev] CDI.KEYID = 6
1,516,142 UART: [ldev] SUBJECT.KEYID = 5
1,516,568 UART: [ldev] AUTHORITY.KEYID = 7
1,517,031 UART: [ldev] FE.KEYID = 1
1,522,549 UART: [ldev] Erasing FE.KEYID = 1
1,547,774 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,562 UART: [ldev] --
1,586,851 UART: [fwproc] Waiting for Commands...
1,587,532 UART: [fwproc] Received command 0x46574c44
1,588,323 UART: [fwproc] Received Image of size 119428 bytes
2,943,141 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,995 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,213 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,856 >>> mbox cmd response: success
3,143,926 UART: [afmc] ++
3,144,094 UART: [afmc] CDI.KEYID = 6
3,144,456 UART: [afmc] SUBJECT.KEYID = 7
3,144,881 UART: [afmc] AUTHORITY.KEYID = 5
3,179,138 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,266 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,046 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,201,755 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,207,638 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,321 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,403 UART: [afmc] --
3,222,409 UART: [cold-reset] --
3,223,179 UART: [state] Locking Datavault
3,224,572 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,176 UART: [state] Locking ICCM
3,225,686 UART: [exit] Launching FMC @ 0x40000130
3,231,016 UART:
3,231,032 UART: Running Caliptra FMC ...
3,231,440 UART:
3,231,494 UART: [state] CFI Enabled
3,241,592 UART: [fht] FMC Alias Private Key: 7
3,360,544 UART: [art] Extend RT PCRs Done
3,360,972 UART: [art] Lock RT PCRs Done
3,362,804 UART: [art] Populate DV Done
3,371,055 UART: [fht] FMC Alias Private Key: 7
3,372,125 UART: [art] Derive CDI
3,372,405 UART: [art] Store in slot 0x4
3,457,687 UART: [art] Derive Key Pair
3,458,047 UART: [art] Store priv key in slot 0x5
3,471,852 UART: [art] Derive Key Pair - Done
3,486,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,501,911 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,676 UART: [art] PUB.X = D6D104E91E70D8D5C593645BC42BFB63F232F18400D1AEAB366ECB6B8192887ADC2169E1C86D99653797E1E3116EDFEA
3,509,431 UART: [art] PUB.Y = 9EFE7B8A46B7A9FCE146EA95F2E3E56CEF0339749F0DB7AB10802F9EB698D5372CF803B217E6B7D93D512024DAC316B6
3,516,386 UART: [art] SIG.R = B4909C184FF028D39F317B35CF5D48BDFA6B28256B87CD8173521517D83AE7E24715053E3632C0559FDC9E3CEAD16241
3,523,155 UART: [art] SIG.S = 7B1C7108852677DBB133C0332D8B4F0A6E3E339954C9A0AB1AB59F3137868E0131D08B49EDA967C4859B09C56CA6EA28
3,546,559 UART: Caliptra RT
3,546,810 UART: [state] CFI Enabled
3,666,540 UART: [rt] RT listening for mailbox commands...
3,667,203 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,196 UART: [rt]cmd =0x46504c54, len=4
3,698,216 >>> mbox cmd response data (8 bytes)
3,698,335 UART: [rt] FIPS self test
3,698,663 UART: [kat] ++
3,698,815 UART: [kat] sha1
3,703,003 UART: [kat] SHA2-256
3,705,025 UART: [kat] SHA2-384
3,708,034 UART: [kat] SHA2-512-ACC
3,708,439 UART: Droping operation
3,708,836 UART: Fatal Error: 0x90050002
3,710,375 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,710,380 >>> mbox cmd response: failed
3,710,380 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,710,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,283 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,011 UART: [kat] SHA2-256
881,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,057 UART: [kat] ++
886,209 UART: [kat] sha1
890,473 UART: [kat] SHA2-256
892,411 UART: [kat] SHA2-384
895,292 UART: [kat] SHA2-512-ACC
897,193 UART: [kat] ECC-384
902,388 UART: [kat] HMAC-384Kdf
906,970 UART: [kat] LMS
1,475,166 UART: [kat] --
1,475,893 UART: [cold-reset] ++
1,476,329 UART: [fht] Storing FHT @ 0x50003400
1,479,254 UART: [idev] ++
1,479,422 UART: [idev] CDI.KEYID = 6
1,479,782 UART: [idev] SUBJECT.KEYID = 7
1,480,206 UART: [idev] UDS.KEYID = 0
1,480,551 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,320 UART: [idev] Erasing UDS.KEYID = 0
1,504,712 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,378 UART: [idev] --
1,514,235 UART: [ldev] ++
1,514,403 UART: [ldev] CDI.KEYID = 6
1,514,766 UART: [ldev] SUBJECT.KEYID = 5
1,515,192 UART: [ldev] AUTHORITY.KEYID = 7
1,515,655 UART: [ldev] FE.KEYID = 1
1,520,667 UART: [ldev] Erasing FE.KEYID = 1
1,545,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,990 UART: [ldev] --
1,585,325 UART: [fwproc] Waiting for Commands...
1,586,138 UART: [fwproc] Received command 0x46574c44
1,586,929 UART: [fwproc] Received Image of size 119428 bytes
2,941,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,845 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,063 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,816 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,973 ready_for_fw is high
1,361,973 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,830 >>> mbox cmd response: success
3,052,515 UART:
3,052,531 UART: Running Caliptra FMC ...
3,052,939 UART:
3,052,993 UART: [state] CFI Enabled
3,063,661 UART: [fht] FMC Alias Private Key: 7
3,182,975 UART: [art] Extend RT PCRs Done
3,183,403 UART: [art] Lock RT PCRs Done
3,184,831 UART: [art] Populate DV Done
3,192,908 UART: [fht] FMC Alias Private Key: 7
3,193,970 UART: [art] Derive CDI
3,194,250 UART: [art] Store in slot 0x4
3,280,548 UART: [art] Derive Key Pair
3,280,908 UART: [art] Store priv key in slot 0x5
3,293,429 UART: [art] Derive Key Pair - Done
3,308,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,323,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,439 UART: [art] PUB.X = 22F32AE61093F73A97DAB81F14218F064C975E116DA52B0B057288DA35E3833AF1376C9DAEEE610C4323250B4831D9F0
3,331,194 UART: [art] PUB.Y = BE3AF7B59273DF7723F0977BA0C9684F1EB7EF1D35CE8DB94774BC16067356473C43E447DF33DB26BC23F5DCCC8787F5
3,338,153 UART: [art] SIG.R = 8083809523593D0EDD995A686CA6F8EDEE65268CCCA482EBC67F84AE857BA3BA229C41D3D103457767F9870F67D60852
3,344,913 UART: [art] SIG.S = 548BDFEF4E91EB57AB6658A6ACCC1752ED178532932F26AE8669206B375C8BF9A07DA3196C829469FE30CA6D89FF0477
3,368,904 UART: Caliptra RT
3,369,155 UART: [state] CFI Enabled
3,489,575 UART: [rt] RT listening for mailbox commands...
3,490,238 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,083 UART: [rt]cmd =0x46504c54, len=4
3,521,359 >>> mbox cmd response data (8 bytes)
3,521,502 UART: [rt] FIPS self test
3,521,830 UART: [kat] ++
3,521,982 UART: [kat] sha1
3,526,156 UART: [kat] SHA2-256
3,528,178 UART: [kat] SHA2-384
3,531,171 UART: [kat] SHA2-512-ACC
3,531,576 UART: Droping operation
3,532,039 UART: Fatal Error: 0x90050002
3,533,578 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,533,583 >>> mbox cmd response: failed
3,533,583 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,533,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,079 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,782 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,154 UART: [kat] SHA2-256
882,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,200 UART: [kat] ++
886,352 UART: [kat] sha1
890,630 UART: [kat] SHA2-256
892,568 UART: [kat] SHA2-384
895,361 UART: [kat] SHA2-512-ACC
897,262 UART: [kat] ECC-384
902,657 UART: [kat] HMAC-384Kdf
907,223 UART: [kat] LMS
1,475,419 UART: [kat] --
1,476,318 UART: [cold-reset] ++
1,476,688 UART: [fht] Storing FHT @ 0x50003400
1,479,505 UART: [idev] ++
1,479,673 UART: [idev] CDI.KEYID = 6
1,480,033 UART: [idev] SUBJECT.KEYID = 7
1,480,457 UART: [idev] UDS.KEYID = 0
1,480,802 ready_for_fw is high
1,480,802 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,405 UART: [idev] Erasing UDS.KEYID = 0
1,505,289 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,963 UART: [idev] --
1,514,948 UART: [ldev] ++
1,515,116 UART: [ldev] CDI.KEYID = 6
1,515,479 UART: [ldev] SUBJECT.KEYID = 5
1,515,905 UART: [ldev] AUTHORITY.KEYID = 7
1,516,368 UART: [ldev] FE.KEYID = 1
1,521,410 UART: [ldev] Erasing FE.KEYID = 1
1,546,525 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,337 UART: [ldev] --
1,585,844 UART: [fwproc] Waiting for Commands...
1,586,653 UART: [fwproc] Received command 0x46574c44
1,587,444 UART: [fwproc] Received Image of size 119428 bytes
2,942,712 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,098 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,909 >>> mbox cmd response: success
3,144,021 UART: [afmc] ++
3,144,189 UART: [afmc] CDI.KEYID = 6
3,144,551 UART: [afmc] SUBJECT.KEYID = 7
3,144,976 UART: [afmc] AUTHORITY.KEYID = 5
3,179,799 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,357 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,137 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,846 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,729 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,412 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,300 UART: [afmc] --
3,223,236 UART: [cold-reset] --
3,223,890 UART: [state] Locking Datavault
3,224,959 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,563 UART: [state] Locking ICCM
3,226,001 UART: [exit] Launching FMC @ 0x40000130
3,231,331 UART:
3,231,347 UART: Running Caliptra FMC ...
3,231,755 UART:
3,231,898 UART: [state] CFI Enabled
3,242,364 UART: [fht] FMC Alias Private Key: 7
3,360,902 UART: [art] Extend RT PCRs Done
3,361,330 UART: [art] Lock RT PCRs Done
3,362,950 UART: [art] Populate DV Done
3,371,149 UART: [fht] FMC Alias Private Key: 7
3,372,305 UART: [art] Derive CDI
3,372,585 UART: [art] Store in slot 0x4
3,458,349 UART: [art] Derive Key Pair
3,458,709 UART: [art] Store priv key in slot 0x5
3,471,770 UART: [art] Derive Key Pair - Done
3,486,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,501,521 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,286 UART: [art] PUB.X = 7626EA564658F054CBF1D1780D3789765083079CE157D3999A03C0ED93F2F84D267925F47DA6CC899F3BDB834EB54EF6
3,509,047 UART: [art] PUB.Y = 0319C6B61CBC0AC61E63DF99965FA983407E0E186268B1497D6B646DD2FE557A96B5065FCF3C5E77E570A24FAAE82ECB
3,515,997 UART: [art] SIG.R = 4D4F4545B97A4F61235A5146C9DF6B97512DE60884E6EB221146EABC8EF175773F5B4D71DB00F11C4A449779332B2BED
3,522,746 UART: [art] SIG.S = CDE0AF45026A8224B4A0478000A0410BF760EA1638D3D58335F36859380CDF0263BD74D0FF1F57E707D91737337316DD
3,546,577 UART: Caliptra RT
3,546,920 UART: [state] CFI Enabled
3,667,832 UART: [rt] RT listening for mailbox commands...
3,668,495 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,352 UART: [rt]cmd =0x46504c54, len=4
3,699,638 >>> mbox cmd response data (8 bytes)
3,699,821 UART: [rt] FIPS self test
3,700,149 UART: [kat] ++
3,700,301 UART: [kat] sha1
3,704,581 UART: [kat] SHA2-256
3,706,603 UART: [kat] SHA2-384
3,709,350 UART: [kat] SHA2-512-ACC
3,709,755 UART: Droping operation
3,710,336 UART: Fatal Error: 0x90050002
3,711,875 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,711,880 >>> mbox cmd response: failed
3,711,880 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,711,885 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,118 UART: [kat] SHA2-256
882,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,164 UART: [kat] ++
886,316 UART: [kat] sha1
890,556 UART: [kat] SHA2-256
892,494 UART: [kat] SHA2-384
895,283 UART: [kat] SHA2-512-ACC
897,184 UART: [kat] ECC-384
902,979 UART: [kat] HMAC-384Kdf
907,663 UART: [kat] LMS
1,475,859 UART: [kat] --
1,476,866 UART: [cold-reset] ++
1,477,438 UART: [fht] Storing FHT @ 0x50003400
1,480,169 UART: [idev] ++
1,480,337 UART: [idev] CDI.KEYID = 6
1,480,697 UART: [idev] SUBJECT.KEYID = 7
1,481,121 UART: [idev] UDS.KEYID = 0
1,481,466 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,953 UART: [idev] Erasing UDS.KEYID = 0
1,505,729 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,221 UART: [idev] --
1,515,276 UART: [ldev] ++
1,515,444 UART: [ldev] CDI.KEYID = 6
1,515,807 UART: [ldev] SUBJECT.KEYID = 5
1,516,233 UART: [ldev] AUTHORITY.KEYID = 7
1,516,696 UART: [ldev] FE.KEYID = 1
1,521,916 UART: [ldev] Erasing FE.KEYID = 1
1,547,563 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,459 UART: [ldev] --
1,586,744 UART: [fwproc] Waiting for Commands...
1,587,549 UART: [fwproc] Received command 0x46574c44
1,588,340 UART: [fwproc] Received Image of size 119428 bytes
2,941,676 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,280 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,498 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,069 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,306 ready_for_fw is high
1,362,306 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,983 >>> mbox cmd response: success
3,053,030 UART:
3,053,046 UART: Running Caliptra FMC ...
3,053,454 UART:
3,053,597 UART: [state] CFI Enabled
3,063,901 UART: [fht] FMC Alias Private Key: 7
3,182,745 UART: [art] Extend RT PCRs Done
3,183,173 UART: [art] Lock RT PCRs Done
3,184,649 UART: [art] Populate DV Done
3,192,858 UART: [fht] FMC Alias Private Key: 7
3,193,806 UART: [art] Derive CDI
3,194,086 UART: [art] Store in slot 0x4
3,279,512 UART: [art] Derive Key Pair
3,279,872 UART: [art] Store priv key in slot 0x5
3,293,619 UART: [art] Derive Key Pair - Done
3,308,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,287 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,052 UART: [art] PUB.X = 40211324CD777F160B4FD5A14A7E0B9BE4D3BD2A3D4B14DBFE1210DD4502CDACDD2CD1EE4D6A116841BA9394053BF0F0
3,331,830 UART: [art] PUB.Y = E678E20CF534728EB54D25AF48FCEBF1CC3B4C74728F26692825CF592E8088767BFDF9E90114D242779905A0D1CA2C08
3,338,772 UART: [art] SIG.R = 410FFDC0F3B1F64713F2782E3BAD3669E8875FD0EF2B3D8B6EE7C2A35DF62ACD66607BE8FDEFF9B6EB230C3A2F5C6A80
3,345,562 UART: [art] SIG.S = 1F51958C164CFAFE4B0D893DAC35C3B8970E185C0AF5B87D439395D3CF4232C3C5337CC8060A9F0C60DAC39337CD6A2C
3,369,510 UART: Caliptra RT
3,369,853 UART: [state] CFI Enabled
3,490,436 UART: [rt] RT listening for mailbox commands...
3,491,099 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,112 UART: [rt]cmd =0x46504c54, len=4
3,522,472 >>> mbox cmd response data (8 bytes)
3,522,815 UART: [rt] FIPS self test
3,523,143 UART: [kat] ++
3,523,295 UART: [kat] sha1
3,527,743 UART: [kat] SHA2-256
3,529,765 UART: [kat] SHA2-384
3,532,792 UART: [kat] SHA2-512-ACC
3,533,197 UART: Droping operation
3,533,628 UART: Fatal Error: 0x90050002
3,535,167 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,535,172 >>> mbox cmd response: failed
3,535,172 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,535,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,042 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,237 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,244 UART: [kat] ++
895,396 UART: [kat] sha1
899,648 UART: [kat] SHA2-256
901,588 UART: [kat] SHA2-384
904,431 UART: [kat] SHA2-512-ACC
906,332 UART: [kat] ECC-384
915,881 UART: [kat] HMAC-384Kdf
920,461 UART: [kat] LMS
1,168,773 UART: [kat] --
1,169,742 UART: [cold-reset] ++
1,170,238 UART: [fht] FHT @ 0x50003400
1,172,972 UART: [idev] ++
1,173,140 UART: [idev] CDI.KEYID = 6
1,173,501 UART: [idev] SUBJECT.KEYID = 7
1,173,926 UART: [idev] UDS.KEYID = 0
1,174,272 ready_for_fw is high
1,174,272 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,821 UART: [idev] Erasing UDS.KEYID = 0
1,198,519 UART: [idev] Sha1 KeyId Algorithm
1,207,269 UART: [idev] --
1,208,352 UART: [ldev] ++
1,208,520 UART: [ldev] CDI.KEYID = 6
1,208,884 UART: [ldev] SUBJECT.KEYID = 5
1,209,311 UART: [ldev] AUTHORITY.KEYID = 7
1,209,774 UART: [ldev] FE.KEYID = 1
1,214,994 UART: [ldev] Erasing FE.KEYID = 1
1,241,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,146 UART: [ldev] --
1,280,501 UART: [fwproc] Wait for Commands...
1,281,084 UART: [fwproc] Recv command 0x46574c44
1,281,817 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,643 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,818 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,433 >>> mbox cmd response: success
2,837,689 UART: [afmc] ++
2,837,857 UART: [afmc] CDI.KEYID = 6
2,838,220 UART: [afmc] SUBJECT.KEYID = 7
2,838,646 UART: [afmc] AUTHORITY.KEYID = 5
2,873,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,890,861 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,571 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,452 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,153 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,915,982 UART: [afmc] --
2,917,045 UART: [cold-reset] --
2,918,057 UART: [state] Locking Datavault
2,919,536 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,140 UART: [state] Locking ICCM
2,920,776 UART: [exit] Launching FMC @ 0x40000130
2,926,106 UART:
2,926,122 UART: Running Caliptra FMC ...
2,926,530 UART:
2,926,584 UART: [state] CFI Enabled
2,936,946 UART: [fht] FMC Alias Private Key: 7
3,055,598 UART: [art] Extend RT PCRs Done
3,056,026 UART: [art] Lock RT PCRs Done
3,057,580 UART: [art] Populate DV Done
3,065,709 UART: [fht] FMC Alias Private Key: 7
3,066,695 UART: [art] Derive CDI
3,066,975 UART: [art] Store in slot 0x4
3,152,626 UART: [art] Derive Key Pair
3,152,986 UART: [art] Store priv key in slot 0x5
3,166,026 UART: [art] Derive Key Pair - Done
3,180,871 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,196,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,196,869 UART: [art] PUB.X = 3DC84F9EA4C2F59C336D0CE7941579CC7FB9CF5CFF8048636FFFF6A1FD368C166F4203D3B51061B26F351188A6852A6F
3,203,643 UART: [art] PUB.Y = 6F00BB8816851E87EFFB1F2E966BD2BC5DC261610CED61EADB1BFB7379E0601F40B8F5BAF5F76574E5405A1F4D1B3F07
3,210,583 UART: [art] SIG.R = 29ACF21B409A4064D029812934F54D27A7CDC058FF254929B0B4DCE2A1D141F805AC138177940D07BBBF2D2BFA7A292E
3,217,352 UART: [art] SIG.S = E022C503C3F53FDC9D7337735328BC02B47A94B5C25E46E4C5E4957F60BC49B25ED5659390BBCA1BC1783517C71919E4
3,241,132 UART: Caliptra RT
3,241,383 UART: [state] CFI Enabled
3,360,518 UART: [rt] RT listening for mailbox commands...
3,361,181 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,390,754 UART: [rt]cmd =0x46504c54, len=4
3,391,746 >>> mbox cmd response data (8 bytes)
3,392,077 UART: [rt] FIPS self test
3,392,405 UART: [kat] ++
3,392,557 UART: [kat] sha1
3,396,813 UART: [kat] SHA2-256
3,398,835 UART: [kat] SHA2-384
3,401,704 UART: [kat] SHA2-512-ACC
3,402,109 UART: Droping operation
3,402,538 UART: Fatal Error: 0x90050002
3,404,077 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,082 >>> mbox cmd response: failed
3,404,082 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,128 UART: [kat] ++
895,280 UART: [kat] sha1
899,534 UART: [kat] SHA2-256
901,474 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
915,361 UART: [kat] HMAC-384Kdf
919,939 UART: [kat] LMS
1,168,251 UART: [kat] --
1,168,928 UART: [cold-reset] ++
1,169,484 UART: [fht] FHT @ 0x50003400
1,172,014 UART: [idev] ++
1,172,182 UART: [idev] CDI.KEYID = 6
1,172,543 UART: [idev] SUBJECT.KEYID = 7
1,172,968 UART: [idev] UDS.KEYID = 0
1,173,314 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,180,889 UART: [idev] Erasing UDS.KEYID = 0
1,198,229 UART: [idev] Sha1 KeyId Algorithm
1,207,147 UART: [idev] --
1,208,350 UART: [ldev] ++
1,208,518 UART: [ldev] CDI.KEYID = 6
1,208,882 UART: [ldev] SUBJECT.KEYID = 5
1,209,309 UART: [ldev] AUTHORITY.KEYID = 7
1,209,772 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,241,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,278 UART: [ldev] --
1,280,665 UART: [fwproc] Wait for Commands...
1,281,422 UART: [fwproc] Recv command 0x46574c44
1,282,155 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,219 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,394 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,937 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,252 ready_for_fw is high
1,059,252 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,780 >>> mbox cmd response: success
2,751,239 UART:
2,751,255 UART: Running Caliptra FMC ...
2,751,663 UART:
2,751,717 UART: [state] CFI Enabled
2,762,309 UART: [fht] FMC Alias Private Key: 7
2,881,491 UART: [art] Extend RT PCRs Done
2,881,919 UART: [art] Lock RT PCRs Done
2,883,415 UART: [art] Populate DV Done
2,891,522 UART: [fht] FMC Alias Private Key: 7
2,892,700 UART: [art] Derive CDI
2,892,980 UART: [art] Store in slot 0x4
2,978,821 UART: [art] Derive Key Pair
2,979,181 UART: [art] Store priv key in slot 0x5
2,992,581 UART: [art] Derive Key Pair - Done
3,007,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,612 UART: [art] PUB.X = C0CC23A08CF40E932F4D4241F8B065CC7799D07681A35029ECC4101A13A586AE39E8453F5BAD44879E26DB88C87E6AA6
3,030,385 UART: [art] PUB.Y = 3204B7E773875B98722DA94F1232FB54C7F37498D186C8C4CE7E093EB58F482C7F21D6F942360E95578AA97547C61490
3,037,318 UART: [art] SIG.R = 02411CE4739B21B397D1B8ADC4189DC5A40FDF87A135AC55F7F47C68D309FD53AB023B727C063E7A1F90DA9734EEFE5E
3,044,087 UART: [art] SIG.S = DD41C5B283624510490D217D2370ECC7019570B99FEAB4D5DDDCB75FE9E1D0668C1A463E1DC666866D41086A173783A9
3,067,164 UART: Caliptra RT
3,067,415 UART: [state] CFI Enabled
3,187,346 UART: [rt] RT listening for mailbox commands...
3,188,009 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,858 UART: [rt]cmd =0x46504c54, len=4
3,219,056 >>> mbox cmd response data (8 bytes)
3,219,361 UART: [rt] FIPS self test
3,219,689 UART: [kat] ++
3,219,841 UART: [kat] sha1
3,223,981 UART: [kat] SHA2-256
3,226,003 UART: [kat] SHA2-384
3,228,822 UART: [kat] SHA2-512-ACC
3,229,227 UART: Droping operation
3,229,780 UART: Fatal Error: 0x90050002
3,231,319 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,324 >>> mbox cmd response: failed
3,231,324 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,329 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,256 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,890 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
891,541 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,645 UART: [kat] ++
895,797 UART: [kat] sha1
900,143 UART: [kat] SHA2-256
902,083 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
916,504 UART: [kat] HMAC-384Kdf
921,198 UART: [kat] LMS
1,169,510 UART: [kat] --
1,170,415 UART: [cold-reset] ++
1,170,845 UART: [fht] FHT @ 0x50003400
1,173,345 UART: [idev] ++
1,173,513 UART: [idev] CDI.KEYID = 6
1,173,874 UART: [idev] SUBJECT.KEYID = 7
1,174,299 UART: [idev] UDS.KEYID = 0
1,174,645 ready_for_fw is high
1,174,645 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,198,746 UART: [idev] Sha1 KeyId Algorithm
1,207,574 UART: [idev] --
1,208,617 UART: [ldev] ++
1,208,785 UART: [ldev] CDI.KEYID = 6
1,209,149 UART: [ldev] SUBJECT.KEYID = 5
1,209,576 UART: [ldev] AUTHORITY.KEYID = 7
1,210,039 UART: [ldev] FE.KEYID = 1
1,215,075 UART: [ldev] Erasing FE.KEYID = 1
1,241,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,175 UART: [ldev] --
1,280,512 UART: [fwproc] Wait for Commands...
1,281,311 UART: [fwproc] Recv command 0x46574c44
1,282,044 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,288 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,463 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,140 >>> mbox cmd response: success
2,837,192 UART: [afmc] ++
2,837,360 UART: [afmc] CDI.KEYID = 6
2,837,723 UART: [afmc] SUBJECT.KEYID = 7
2,838,149 UART: [afmc] AUTHORITY.KEYID = 5
2,873,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,890,764 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,474 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,355 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,056 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,915,893 UART: [afmc] --
2,916,912 UART: [cold-reset] --
2,917,928 UART: [state] Locking Datavault
2,918,913 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,517 UART: [state] Locking ICCM
2,920,051 UART: [exit] Launching FMC @ 0x40000130
2,925,381 UART:
2,925,397 UART: Running Caliptra FMC ...
2,925,805 UART:
2,925,948 UART: [state] CFI Enabled
2,936,810 UART: [fht] FMC Alias Private Key: 7
3,055,192 UART: [art] Extend RT PCRs Done
3,055,620 UART: [art] Lock RT PCRs Done
3,057,056 UART: [art] Populate DV Done
3,065,143 UART: [fht] FMC Alias Private Key: 7
3,066,141 UART: [art] Derive CDI
3,066,421 UART: [art] Store in slot 0x4
3,152,358 UART: [art] Derive Key Pair
3,152,718 UART: [art] Store priv key in slot 0x5
3,165,936 UART: [art] Derive Key Pair - Done
3,180,366 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,195,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,196,702 UART: [art] PUB.X = A9FD13629333CD0F6067A0E7F22695307994317B1A598E828D0338B9BFB32648B6726AF5F3E36E42ACE69B2401B7C0CE
3,203,463 UART: [art] PUB.Y = EC57F0D1431EE780FC0D4FC95CB29DF33DB6B54214E8DE51D27E5C47621A1414335D6174C4344E40C5A6E4F776F1D1F3
3,210,418 UART: [art] SIG.R = 124BF879A6C7A9D716D5DEBCD1E5AABA47933CFFDD3DB5A3751767229D2FB168EA83B30E9CB429DF4B336CA7075B7048
3,217,200 UART: [art] SIG.S = 51F200F12C89E6A7142C632438B919CEFD50C0D6C154134EC86C1C9B09EE00D62C297E5D077FB91FC1CD0FB6E1D2E862
3,240,667 UART: Caliptra RT
3,241,010 UART: [state] CFI Enabled
3,361,256 UART: [rt] RT listening for mailbox commands...
3,361,919 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,278 UART: [rt]cmd =0x46504c54, len=4
3,392,580 >>> mbox cmd response data (8 bytes)
3,392,917 UART: [rt] FIPS self test
3,393,245 UART: [kat] ++
3,393,397 UART: [kat] sha1
3,397,641 UART: [kat] SHA2-256
3,399,663 UART: [kat] SHA2-384
3,402,542 UART: [kat] SHA2-512-ACC
3,402,947 UART: Droping operation
3,403,394 UART: Fatal Error: 0x90050002
3,404,933 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,938 >>> mbox cmd response: failed
3,404,938 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,943 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,399 UART: [kat] ++
895,551 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,568 UART: [kat] HMAC-384Kdf
921,196 UART: [kat] LMS
1,169,508 UART: [kat] --
1,170,503 UART: [cold-reset] ++
1,170,917 UART: [fht] FHT @ 0x50003400
1,173,489 UART: [idev] ++
1,173,657 UART: [idev] CDI.KEYID = 6
1,174,018 UART: [idev] SUBJECT.KEYID = 7
1,174,443 UART: [idev] UDS.KEYID = 0
1,174,789 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,632 UART: [idev] Erasing UDS.KEYID = 0
1,199,408 UART: [idev] Sha1 KeyId Algorithm
1,208,180 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,937 UART: [ldev] SUBJECT.KEYID = 5
1,210,364 UART: [ldev] AUTHORITY.KEYID = 7
1,210,827 UART: [ldev] FE.KEYID = 1
1,216,149 UART: [ldev] Erasing FE.KEYID = 1
1,243,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,485 UART: [ldev] --
1,282,932 UART: [fwproc] Wait for Commands...
1,283,747 UART: [fwproc] Recv command 0x46574c44
1,284,480 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,810 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,985 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,616 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,135 ready_for_fw is high
1,060,135 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,841 >>> mbox cmd response: success
2,754,592 UART:
2,754,608 UART: Running Caliptra FMC ...
2,755,016 UART:
2,755,159 UART: [state] CFI Enabled
2,765,859 UART: [fht] FMC Alias Private Key: 7
2,885,009 UART: [art] Extend RT PCRs Done
2,885,437 UART: [art] Lock RT PCRs Done
2,887,163 UART: [art] Populate DV Done
2,895,472 UART: [fht] FMC Alias Private Key: 7
2,896,646 UART: [art] Derive CDI
2,896,926 UART: [art] Store in slot 0x4
2,982,611 UART: [art] Derive Key Pair
2,982,971 UART: [art] Store priv key in slot 0x5
2,996,687 UART: [art] Derive Key Pair - Done
3,011,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,878 UART: [art] PUB.X = F5F8246D901DD48F05C659F62F678DC603302BDD28D16CCA1A8FBD847BB7AD0279D32152FFC60FD778F55EE1B9E20570
3,033,645 UART: [art] PUB.Y = 445F871430A747953B74A07C8D9A7A725E1778A94B66E709AFCA8DC32A3776635D9AC0AC712479E2B46C0B6DC29FB0AB
3,040,595 UART: [art] SIG.R = 8AE2BEE7EEE8B2B86EEA2B7C024CD4603C1AFBFD41866E5F8245B9A5D4BA0A917C87F3712E95CB6C40F3080B3A582FD1
3,047,375 UART: [art] SIG.S = EA05A65BD6FE21C899724840ED474DAD28F48A73E48820C29DC22ECA3642372B69B176669DE0DC13E05A68806D44EBDC
3,071,148 UART: Caliptra RT
3,071,491 UART: [state] CFI Enabled
3,190,625 UART: [rt] RT listening for mailbox commands...
3,191,288 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,275 UART: [rt]cmd =0x46504c54, len=4
3,222,421 >>> mbox cmd response data (8 bytes)
3,222,730 UART: [rt] FIPS self test
3,223,058 UART: [kat] ++
3,223,210 UART: [kat] sha1
3,227,444 UART: [kat] SHA2-256
3,229,466 UART: [kat] SHA2-384
3,232,319 UART: [kat] SHA2-512-ACC
3,232,724 UART: Droping operation
3,233,153 UART: Fatal Error: 0x90050002
3,234,692 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,234,697 >>> mbox cmd response: failed
3,234,697 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,234,702 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,739 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,855 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,478 UART: [kat] SHA2-512-ACC
908,379 UART: [kat] ECC-384
917,854 UART: [kat] HMAC-384Kdf
922,520 UART: [kat] LMS
1,170,848 UART: [kat] --
1,171,397 UART: [cold-reset] ++
1,171,729 UART: [fht] FHT @ 0x50003400
1,174,316 UART: [idev] ++
1,174,484 UART: [idev] CDI.KEYID = 6
1,174,844 UART: [idev] SUBJECT.KEYID = 7
1,175,268 UART: [idev] UDS.KEYID = 0
1,175,613 ready_for_fw is high
1,175,613 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,502 UART: [idev] Erasing UDS.KEYID = 0
1,200,701 UART: [idev] Sha1 KeyId Algorithm
1,209,165 UART: [idev] --
1,210,163 UART: [ldev] ++
1,210,331 UART: [ldev] CDI.KEYID = 6
1,210,694 UART: [ldev] SUBJECT.KEYID = 5
1,211,120 UART: [ldev] AUTHORITY.KEYID = 7
1,211,583 UART: [ldev] FE.KEYID = 1
1,216,623 UART: [ldev] Erasing FE.KEYID = 1
1,243,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,438 UART: [fwproc] Wait for Commands...
1,283,078 UART: [fwproc] Recv command 0x46574c44
1,283,806 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,322 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,492 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,101 >>> mbox cmd response: success
2,839,109 UART: [afmc] ++
2,839,277 UART: [afmc] CDI.KEYID = 6
2,839,639 UART: [afmc] SUBJECT.KEYID = 7
2,840,064 UART: [afmc] AUTHORITY.KEYID = 5
2,875,077 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,052 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,761 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,644 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,345 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,173 UART: [afmc] --
2,918,187 UART: [cold-reset] --
2,918,799 UART: [state] Locking Datavault
2,920,060 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,664 UART: [state] Locking ICCM
2,921,144 UART: [exit] Launching FMC @ 0x40000130
2,926,474 UART:
2,926,490 UART: Running Caliptra FMC ...
2,926,898 UART:
2,926,952 UART: [state] CFI Enabled
2,937,588 UART: [fht] FMC Alias Private Key: 7
3,056,648 UART: [art] Extend RT PCRs Done
3,057,076 UART: [art] Lock RT PCRs Done
3,058,624 UART: [art] Populate DV Done
3,066,907 UART: [fht] FMC Alias Private Key: 7
3,068,009 UART: [art] Derive CDI
3,068,289 UART: [art] Store in slot 0x4
3,154,250 UART: [art] Derive Key Pair
3,154,610 UART: [art] Store priv key in slot 0x5
3,167,842 UART: [art] Derive Key Pair - Done
3,182,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,451 UART: [art] PUB.X = F9AF6AE15F5192BF8D17FC4E84E235D1EC2B577D42C174B3549CC5C0A67F8CB0292669FCDE099A7EEDD59EAFBE24FED3
3,206,244 UART: [art] PUB.Y = DB540884E123D241E4AE84D0F2EFA98865B4C0A5EA14B81FBA46DE8448C81928EF0FC8E0C423EAE19334A431CB276732
3,213,198 UART: [art] SIG.R = F3543A37F187763F17BC83247CADB99F1409C7DCC4EDE6A5CF21D699F04786D02C97841C75DAC1135649796C61B44616
3,219,965 UART: [art] SIG.S = 34164615F46346535FF591C492220B553200CA3529BC3B24DE72E90A3BA56F773AC3FAF50B5D2AF6215A8E24A08DF910
3,243,834 UART: Caliptra RT
3,244,085 UART: [state] CFI Enabled
3,363,024 UART: [rt] RT listening for mailbox commands...
3,363,687 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,334 UART: [rt]cmd =0x46504c54, len=4
3,394,450 >>> mbox cmd response data (8 bytes)
3,394,717 UART: [rt] FIPS self test
3,395,045 UART: [kat] ++
3,395,197 UART: [kat] sha1
3,399,399 UART: [kat] SHA2-256
3,401,421 UART: [kat] SHA2-384
3,404,062 UART: [kat] SHA2-512-ACC
3,404,467 UART: Droping operation
3,404,968 UART: Fatal Error: 0x90050002
3,406,507 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,512 >>> mbox cmd response: failed
3,406,512 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,226 UART: [kat] SHA2-256
892,876 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,001 UART: [kat] ++
897,153 UART: [kat] sha1
901,507 UART: [kat] SHA2-256
903,447 UART: [kat] SHA2-384
906,222 UART: [kat] SHA2-512-ACC
908,123 UART: [kat] ECC-384
917,792 UART: [kat] HMAC-384Kdf
922,592 UART: [kat] LMS
1,170,920 UART: [kat] --
1,171,647 UART: [cold-reset] ++
1,172,211 UART: [fht] FHT @ 0x50003400
1,174,970 UART: [idev] ++
1,175,138 UART: [idev] CDI.KEYID = 6
1,175,498 UART: [idev] SUBJECT.KEYID = 7
1,175,922 UART: [idev] UDS.KEYID = 0
1,176,267 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,050 UART: [idev] Erasing UDS.KEYID = 0
1,200,995 UART: [idev] Sha1 KeyId Algorithm
1,209,549 UART: [idev] --
1,210,701 UART: [ldev] ++
1,210,869 UART: [ldev] CDI.KEYID = 6
1,211,232 UART: [ldev] SUBJECT.KEYID = 5
1,211,658 UART: [ldev] AUTHORITY.KEYID = 7
1,212,121 UART: [ldev] FE.KEYID = 1
1,217,369 UART: [ldev] Erasing FE.KEYID = 1
1,243,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,671 UART: [ldev] --
1,283,074 UART: [fwproc] Wait for Commands...
1,283,658 UART: [fwproc] Recv command 0x46574c44
1,284,386 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,426 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,991 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,937 ready_for_fw is high
1,059,937 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,230 >>> mbox cmd response: success
2,749,951 UART:
2,749,967 UART: Running Caliptra FMC ...
2,750,375 UART:
2,750,429 UART: [state] CFI Enabled
2,760,363 UART: [fht] FMC Alias Private Key: 7
2,879,681 UART: [art] Extend RT PCRs Done
2,880,109 UART: [art] Lock RT PCRs Done
2,881,917 UART: [art] Populate DV Done
2,889,990 UART: [fht] FMC Alias Private Key: 7
2,891,166 UART: [art] Derive CDI
2,891,446 UART: [art] Store in slot 0x4
2,977,409 UART: [art] Derive Key Pair
2,977,769 UART: [art] Store priv key in slot 0x5
2,990,653 UART: [art] Derive Key Pair - Done
3,005,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,021,901 UART: [art] PUB.X = 03F60DC48F9B6C22A9265488D3F7783B6DD2F0E9BE19097EBB798D108DD93F852C3BCE441541227664ABE54C95D74CDB
3,028,670 UART: [art] PUB.Y = 83F8957A69BAB8B1726B271340D6898296C8C91EE5FE98CA61889C73279FAA18FFDEBA41DE6BA3AFC9BB8FC0B9F56695
3,035,636 UART: [art] SIG.R = 7F79EC38676058D00C8FDB322A47B187CCF70EA92669452A442907D64DCD160DA922BF40012C01E2AD3DE30E0E4F3EC5
3,042,390 UART: [art] SIG.S = C09739C419571AB9BB3A6AA35ABC227FE6CDA1EE17692A70EE10E495BA6B9700503FCF69E7E8BD2FDD496715FD85D99E
3,066,374 UART: Caliptra RT
3,066,625 UART: [state] CFI Enabled
3,186,678 UART: [rt] RT listening for mailbox commands...
3,187,341 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,330 UART: [rt]cmd =0x46504c54, len=4
3,218,412 >>> mbox cmd response data (8 bytes)
3,218,573 UART: [rt] FIPS self test
3,218,901 UART: [kat] ++
3,219,053 UART: [kat] sha1
3,223,293 UART: [kat] SHA2-256
3,225,315 UART: [kat] SHA2-384
3,228,112 UART: [kat] SHA2-512-ACC
3,228,517 UART: Droping operation
3,229,100 UART: Fatal Error: 0x90050002
3,230,639 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,644 >>> mbox cmd response: failed
3,230,644 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,649 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,803 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,666 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,937 UART: [state] LifecycleState = Unprovisioned
86,592 UART: [state] DebugLocked = No
87,300 UART: [state] WD Timer not started. Device not locked for debugging
88,661 UART: [kat] SHA2-256
894,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,436 UART: [kat] ++
898,588 UART: [kat] sha1
902,934 UART: [kat] SHA2-256
904,874 UART: [kat] SHA2-384
907,679 UART: [kat] SHA2-512-ACC
909,580 UART: [kat] ECC-384
919,491 UART: [kat] HMAC-384Kdf
924,197 UART: [kat] LMS
1,172,525 UART: [kat] --
1,173,422 UART: [cold-reset] ++
1,173,962 UART: [fht] FHT @ 0x50003400
1,176,483 UART: [idev] ++
1,176,651 UART: [idev] CDI.KEYID = 6
1,177,011 UART: [idev] SUBJECT.KEYID = 7
1,177,435 UART: [idev] UDS.KEYID = 0
1,177,780 ready_for_fw is high
1,177,780 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,185,155 UART: [idev] Erasing UDS.KEYID = 0
1,202,668 UART: [idev] Sha1 KeyId Algorithm
1,211,262 UART: [idev] --
1,212,284 UART: [ldev] ++
1,212,452 UART: [ldev] CDI.KEYID = 6
1,212,815 UART: [ldev] SUBJECT.KEYID = 5
1,213,241 UART: [ldev] AUTHORITY.KEYID = 7
1,213,704 UART: [ldev] FE.KEYID = 1
1,219,218 UART: [ldev] Erasing FE.KEYID = 1
1,246,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,156 UART: [ldev] --
1,285,499 UART: [fwproc] Wait for Commands...
1,286,105 UART: [fwproc] Recv command 0x46574c44
1,286,833 UART: [fwproc] Recv'd Img size: 119428 bytes
2,642,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,669,781 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,700,951 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,842,656 >>> mbox cmd response: success
2,843,724 UART: [afmc] ++
2,843,892 UART: [afmc] CDI.KEYID = 6
2,844,254 UART: [afmc] SUBJECT.KEYID = 7
2,844,679 UART: [afmc] AUTHORITY.KEYID = 5
2,880,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,896,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,897,211 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,902,920 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,908,803 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,914,504 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,922,488 UART: [afmc] --
2,923,426 UART: [cold-reset] --
2,924,240 UART: [state] Locking Datavault
2,925,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,925,981 UART: [state] Locking ICCM
2,926,559 UART: [exit] Launching FMC @ 0x40000130
2,931,889 UART:
2,931,905 UART: Running Caliptra FMC ...
2,932,313 UART:
2,932,456 UART: [state] CFI Enabled
2,943,042 UART: [fht] FMC Alias Private Key: 7
3,062,454 UART: [art] Extend RT PCRs Done
3,062,882 UART: [art] Lock RT PCRs Done
3,064,624 UART: [art] Populate DV Done
3,072,723 UART: [fht] FMC Alias Private Key: 7
3,073,693 UART: [art] Derive CDI
3,073,973 UART: [art] Store in slot 0x4
3,159,402 UART: [art] Derive Key Pair
3,159,762 UART: [art] Store priv key in slot 0x5
3,172,650 UART: [art] Derive Key Pair - Done
3,187,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,203,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,203,969 UART: [art] PUB.X = E3CA28F0E72919C7134254A400D363B925EB1028F52F0B4D69C3A3F9EF5427D8509A35388AFBD6E9DFFA75DD40EE877F
3,210,724 UART: [art] PUB.Y = 5949CBD9D24106E228CE09149D9F3A1390F04C9AC38714385BC38BAF137AB4A0B6ECE506F39866230F919C7E65CEA06F
3,217,668 UART: [art] SIG.R = FA16E474F107BD09A5F0692FF0DA0368584EC6BE4CF488420648F365EC8912CDDE833FF8FFB10AA43B18768A7D9E79BD
3,224,437 UART: [art] SIG.S = CEE27AAAD47CB17E498D01BA5E1F051F23CF20B36DF0375F151FEB3EBE92D2208D4EC4C77C4CD4272EA99824D18892E7
3,248,733 UART: Caliptra RT
3,249,076 UART: [state] CFI Enabled
3,368,540 UART: [rt] RT listening for mailbox commands...
3,369,203 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,894 UART: [rt]cmd =0x46504c54, len=4
3,400,036 >>> mbox cmd response data (8 bytes)
3,400,375 UART: [rt] FIPS self test
3,400,703 UART: [kat] ++
3,400,855 UART: [kat] sha1
3,404,987 UART: [kat] SHA2-256
3,407,009 UART: [kat] SHA2-384
3,409,852 UART: [kat] SHA2-512-ACC
3,410,257 UART: Droping operation
3,410,794 UART: Fatal Error: 0x90050002
3,412,333 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,338 >>> mbox cmd response: failed
3,412,338 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,343 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,931 UART: [state] LifecycleState = Unprovisioned
85,586 UART: [state] DebugLocked = No
86,296 UART: [state] WD Timer not started. Device not locked for debugging
87,403 UART: [kat] SHA2-256
893,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,178 UART: [kat] ++
897,330 UART: [kat] sha1
901,652 UART: [kat] SHA2-256
903,592 UART: [kat] SHA2-384
906,341 UART: [kat] SHA2-512-ACC
908,242 UART: [kat] ECC-384
917,853 UART: [kat] HMAC-384Kdf
922,549 UART: [kat] LMS
1,170,877 UART: [kat] --
1,171,628 UART: [cold-reset] ++
1,172,054 UART: [fht] FHT @ 0x50003400
1,174,733 UART: [idev] ++
1,174,901 UART: [idev] CDI.KEYID = 6
1,175,261 UART: [idev] SUBJECT.KEYID = 7
1,175,685 UART: [idev] UDS.KEYID = 0
1,176,030 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,757 UART: [idev] Erasing UDS.KEYID = 0
1,201,162 UART: [idev] Sha1 KeyId Algorithm
1,209,726 UART: [idev] --
1,210,918 UART: [ldev] ++
1,211,086 UART: [ldev] CDI.KEYID = 6
1,211,449 UART: [ldev] SUBJECT.KEYID = 5
1,211,875 UART: [ldev] AUTHORITY.KEYID = 7
1,212,338 UART: [ldev] FE.KEYID = 1
1,217,534 UART: [ldev] Erasing FE.KEYID = 1
1,243,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,614 UART: [ldev] --
1,282,957 UART: [fwproc] Wait for Commands...
1,283,677 UART: [fwproc] Recv command 0x46574c44
1,284,405 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,349 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,519 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,132 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,868 ready_for_fw is high
1,060,868 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,121 >>> mbox cmd response: success
2,754,378 UART:
2,754,394 UART: Running Caliptra FMC ...
2,754,802 UART:
2,754,945 UART: [state] CFI Enabled
2,765,295 UART: [fht] FMC Alias Private Key: 7
2,884,317 UART: [art] Extend RT PCRs Done
2,884,745 UART: [art] Lock RT PCRs Done
2,886,129 UART: [art] Populate DV Done
2,894,256 UART: [fht] FMC Alias Private Key: 7
2,895,258 UART: [art] Derive CDI
2,895,538 UART: [art] Store in slot 0x4
2,981,389 UART: [art] Derive Key Pair
2,981,749 UART: [art] Store priv key in slot 0x5
2,995,141 UART: [art] Derive Key Pair - Done
3,009,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,977 UART: [art] PUB.X = 5EF5C8DC803CB7BFA57721DCB08A967D0A1CF96A9C7E4C8B32CD946C938062EBBC32B130C188BB1A438C05CB9BF737D4
3,032,761 UART: [art] PUB.Y = 57A73B392AF15C64B2A0C3133B60D891FA6F518A04063676841FE8A429492A1C2661D93B0894FFBBC953462F2BD3DADA
3,039,706 UART: [art] SIG.R = 49A3A36E8395686DAC23867DD4A872BF50DA3D3358B535124D85C20E00DD7780C4A8A9EE193F99A25B1CBDFBCDDB93F5
3,046,465 UART: [art] SIG.S = B8E5861A65ED6E3EAE9604C8F046FCAF90AAD9770FB7B7B1FB5C7399D20ABE80E43F3EE35362136769A9110583F4CEAE
3,070,307 UART: Caliptra RT
3,070,650 UART: [state] CFI Enabled
3,190,477 UART: [rt] RT listening for mailbox commands...
3,191,140 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,895 UART: [rt]cmd =0x46504c54, len=4
3,221,885 >>> mbox cmd response data (8 bytes)
3,222,230 UART: [rt] FIPS self test
3,222,558 UART: [kat] ++
3,222,710 UART: [kat] sha1
3,226,866 UART: [kat] SHA2-256
3,228,888 UART: [kat] SHA2-384
3,231,947 UART: [kat] SHA2-512-ACC
3,232,352 UART: Droping operation
3,232,899 UART: Fatal Error: 0x90050002
3,234,438 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,234,443 >>> mbox cmd response: failed
3,234,443 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,234,448 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,746 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,269 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
2,700,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,850,531 >>> mbox cmd response: failed
2,851,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,000,021 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,431,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,256,134 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
2,700,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,850,699 >>> mbox cmd response: failed
2,851,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,000,654 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,432,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,627 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
3,065,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,214,929 >>> mbox cmd response: failed
3,215,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,364,348 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
20,180,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,891,076 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,054,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,204,310 >>> mbox cmd response: failed
3,204,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,353,685 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,178,002 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,894,192 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
2,703,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,852,980 >>> mbox cmd response: failed
2,853,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,002,406 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,428,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,263,637 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
2,697,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,847,630 >>> mbox cmd response: failed
2,848,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,997,065 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,435,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,296,972 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,487 writing to cptra_bootfsm_go
3,051,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,201,556 >>> mbox cmd response: failed
3,202,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,350,964 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
20,176,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,894,462 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,065,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,214,617 >>> mbox cmd response: failed
3,215,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,364,543 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
20,170,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,879,361 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,138 >>> mbox cmd response: failed
816,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,144 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,436 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,080 >>> mbox cmd response: failed
816,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,086 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,940 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,697 >>> mbox cmd response: failed
816,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,643 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,969 >>> mbox cmd response: failed
816,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,975 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,533 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,198 >>> mbox cmd response: failed
816,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,334 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,218 >>> mbox cmd response: failed
816,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,512 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,115 >>> mbox cmd response: failed
817,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,149 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,689 >>> mbox cmd response: failed
816,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,457 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,035 UART:
192,396 UART: Running Caliptra ROM ...
193,490 UART:
193,635 UART: [state] CFI Enabled
263,841 UART: [state] LifecycleState = Unprovisioned
265,754 UART: [state] DebugLocked = No
267,708 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,800 UART: [kat] SHA2-256
442,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,016 UART: [kat] ++
453,465 UART: [kat] sha1
463,439 UART: [kat] SHA2-256
466,169 UART: [kat] SHA2-384
471,381 UART: [kat] SHA2-512-ACC
473,755 UART: [kat] ECC-384
2,765,302 UART: [kat] HMAC-384Kdf
2,776,268 UART: [kat] LMS
3,966,594 UART: [kat] --
3,973,458 UART: [cold-reset] ++
3,975,404 UART: [fht] Storing FHT @ 0x50003400
3,987,034 UART: [idev] ++
3,987,617 UART: [idev] CDI.KEYID = 6
3,988,532 UART: [idev] SUBJECT.KEYID = 7
3,989,785 UART: [idev] UDS.KEYID = 0
3,990,826 ready_for_fw is high
3,991,039 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,141,197 UART: [idev] Erasing UDS.KEYID = 0
7,323,830 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,477 UART: [idev] --
7,349,539 UART: [ldev] ++
7,350,112 UART: [ldev] CDI.KEYID = 6
7,351,095 UART: [ldev] SUBJECT.KEYID = 5
7,352,262 UART: [ldev] AUTHORITY.KEYID = 7
7,353,553 UART: [ldev] FE.KEYID = 1
7,399,936 UART: [ldev] Erasing FE.KEYID = 1
10,733,655 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,974 UART: [ldev] --
13,116,187 UART: [fwproc] Waiting for Commands...
13,118,831 UART: [fwproc] Received command 0x46574c44
13,121,038 UART: [fwproc] Received Image of size 119428 bytes
17,237,869 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,312,056 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,385,201 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,717,141 >>> mbox cmd response: success
17,720,870 UART: [afmc] ++
17,721,458 UART: [afmc] CDI.KEYID = 6
17,722,344 UART: [afmc] SUBJECT.KEYID = 7
17,723,560 UART: [afmc] AUTHORITY.KEYID = 5
21,096,886 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,553 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,788 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,410,278 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,961 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,369 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,459,997 UART: [afmc] --
23,463,167 UART: [cold-reset] --
23,469,322 UART: [state] Locking Datavault
23,474,524 UART: [state] Locking PCR0, PCR1 and PCR31
23,476,228 UART: [state] Locking ICCM
23,478,757 UART: [exit] Launching FMC @ 0x40000130
23,487,106 UART:
23,487,351 UART: Running Caliptra FMC ...
23,488,458 UART:
23,488,622 UART: [state] CFI Enabled
23,553,367 UART: [fht] FMC Alias Private Key: 7
25,893,920 UART: [art] Extend RT PCRs Done
25,895,146 UART: [art] Lock RT PCRs Done
25,897,153 UART: [art] Populate DV Done
25,902,676 UART: [fht] FMC Alias Private Key: 7
25,904,382 UART: [art] Derive CDI
25,905,197 UART: [art] Store in slot 0x4
25,961,767 UART: [art] Derive Key Pair
25,962,812 UART: [art] Store priv key in slot 0x5
29,256,098 UART: [art] Derive Key Pair - Done
29,268,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,452 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,976 UART: [art] PUB.X = EE4705C906C4E5DBF9E12351C67CEEA6A754288284FC5038169173E2ED9671B208B99F6FC8A7AEDA606ADBEEF674F662
31,566,230 UART: [art] PUB.Y = ABCB51B1D7AFEA65852827481F8D88A01256EE2F700C071B21087A86EF1060221C413909E610A3CFAC6F3A17E557D6D6
31,573,467 UART: [art] SIG.R = 3E333114E881903AA311F67E10EE7FA4B20B375E5586B497BF40D05D880A7A465405BC6D714D3A623EF26090A48415E5
31,580,815 UART: [art] SIG.S = C80A088CC12B5759BF0BCC40EEAF04424877F9FDA610A3CEA22F6A13BA90C61A54FFB81BE6A59DE95EAE3AA9C9C77A93
32,885,794 UART: Caliptra RT
32,886,536 UART: [state] CFI Enabled
33,062,483 UART: [rt] RT listening for mailbox commands...
33,064,356 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,093,951 UART: [rt]cmd =0x46504c54, len=4
33,095,436 >>> mbox cmd response data (8 bytes)
33,096,500 UART: [rt] FIPS self test
33,097,468 UART: [kat] ++
33,097,927 UART: [kat] sha1
33,102,418 UART: [kat] SHA2-256
33,104,357 UART: [kat] SHA2-384
33,107,157 UART: [kat] SHA2-512-ACC
33,108,155 UART: Droping operation
33,108,953 UART: Fatal Error: 0x90050003
33,144,315 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,294,170 >>> mbox cmd response: failed
33,294,977 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,444,792 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,133 UART:
190,429 UART: Running Caliptra ROM ...
191,454 UART:
191,613 UART: [state] CFI Enabled
264,298 UART: [state] LifecycleState = Unprovisioned
266,280 UART: [state] DebugLocked = No
269,087 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,172 UART: [kat] SHA2-256
442,875 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,390 UART: [kat] ++
453,835 UART: [kat] sha1
465,577 UART: [kat] SHA2-256
468,314 UART: [kat] SHA2-384
474,995 UART: [kat] SHA2-512-ACC
477,395 UART: [kat] ECC-384
2,768,556 UART: [kat] HMAC-384Kdf
2,799,803 UART: [kat] LMS
3,990,133 UART: [kat] --
3,993,560 UART: [cold-reset] ++
3,995,516 UART: [fht] Storing FHT @ 0x50003400
4,007,216 UART: [idev] ++
4,007,794 UART: [idev] CDI.KEYID = 6
4,008,741 UART: [idev] SUBJECT.KEYID = 7
4,010,007 UART: [idev] UDS.KEYID = 0
4,011,509 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,550 UART: [idev] Erasing UDS.KEYID = 0
7,344,725 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,200 UART: [idev] --
7,369,262 UART: [ldev] ++
7,369,874 UART: [ldev] CDI.KEYID = 6
7,370,770 UART: [ldev] SUBJECT.KEYID = 5
7,371,988 UART: [ldev] AUTHORITY.KEYID = 7
7,373,279 UART: [ldev] FE.KEYID = 1
7,399,519 UART: [ldev] Erasing FE.KEYID = 1
10,731,269 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,596 UART: [ldev] --
13,093,163 UART: [fwproc] Waiting for Commands...
13,096,130 UART: [fwproc] Received command 0x46574c44
13,098,378 UART: [fwproc] Received Image of size 119428 bytes
17,221,831 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,527 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,373,723 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,704,619 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,803,684 ready_for_fw is high
3,804,157 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,979,293 >>> mbox cmd response: success
23,672,610 UART:
23,673,070 UART: Running Caliptra FMC ...
23,674,198 UART:
23,674,360 UART: [state] CFI Enabled
23,743,813 UART: [fht] FMC Alias Private Key: 7
26,083,940 UART: [art] Extend RT PCRs Done
26,085,183 UART: [art] Lock RT PCRs Done
26,086,598 UART: [art] Populate DV Done
26,092,038 UART: [fht] FMC Alias Private Key: 7
26,093,588 UART: [art] Derive CDI
26,094,360 UART: [art] Store in slot 0x4
26,152,319 UART: [art] Derive Key Pair
26,153,365 UART: [art] Store priv key in slot 0x5
29,446,692 UART: [art] Derive Key Pair - Done
29,459,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,415 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,943 UART: [art] PUB.X = D00D2C8965BB10A2B76D7AD588D326A8F0F28CB1D2FC4A3FF17A5F9A18FC1BCFDC7D2D66C26C1A9A93C717CA4BABD130
31,757,247 UART: [art] PUB.Y = 75FCFE1284235621430CF0BA5C82420CCAA84AEBAFB177BE7D20F8F51FE8A6F320D07341E7882885F8B2603E1CB5F717
31,764,464 UART: [art] SIG.R = BE7644535E98BDFF06B00EB3CFEEBCB77F9BBAA4DFEA6EEFB2693FB6E6C3030DCF08E096048686BC6547C7461ED1C425
31,771,868 UART: [art] SIG.S = AEF6B570C62CC9CF2CA6DF0DDA9D98A1D668F0CE0A5344B6E665DE1EB4832575E80D12DD397F4D90AC844A9AA4C4796E
33,077,312 UART: Caliptra RT
33,078,038 UART: [state] CFI Enabled
33,254,174 UART: [rt] RT listening for mailbox commands...
33,256,039 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,286,023 UART: [rt]cmd =0x46504c54, len=4
33,287,755 >>> mbox cmd response data (8 bytes)
33,288,670 UART: [rt] FIPS self test
33,289,625 UART: [kat] ++
33,290,081 UART: [kat] sha1
33,294,322 UART: [kat] SHA2-256
33,296,199 UART: [kat] SHA2-384
33,299,115 UART: [kat] SHA2-512-ACC
33,300,114 UART: Droping operation
33,301,041 UART: Fatal Error: 0x90050003
33,336,209 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,486,232 >>> mbox cmd response: failed
33,486,913 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,636,811 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,784,021 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,974,614 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,406 UART:
192,777 UART: Running Caliptra ROM ...
193,882 UART:
603,759 UART: [state] CFI Enabled
617,140 UART: [state] LifecycleState = Unprovisioned
619,089 UART: [state] DebugLocked = No
620,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,293 UART: [kat] SHA2-256
796,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,647 UART: [kat] ++
807,337 UART: [kat] sha1
819,172 UART: [kat] SHA2-256
821,917 UART: [kat] SHA2-384
827,206 UART: [kat] SHA2-512-ACC
829,534 UART: [kat] ECC-384
3,115,663 UART: [kat] HMAC-384Kdf
3,126,700 UART: [kat] LMS
4,316,838 UART: [kat] --
4,321,150 UART: [cold-reset] ++
4,323,093 UART: [fht] Storing FHT @ 0x50003400
4,336,169 UART: [idev] ++
4,336,786 UART: [idev] CDI.KEYID = 6
4,337,681 UART: [idev] SUBJECT.KEYID = 7
4,338,946 UART: [idev] UDS.KEYID = 0
4,339,911 ready_for_fw is high
4,340,125 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,490,140 UART: [idev] Erasing UDS.KEYID = 0
7,624,686 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,398 UART: [idev] --
7,649,912 UART: [ldev] ++
7,650,499 UART: [ldev] CDI.KEYID = 6
7,651,456 UART: [ldev] SUBJECT.KEYID = 5
7,652,673 UART: [ldev] AUTHORITY.KEYID = 7
7,653,915 UART: [ldev] FE.KEYID = 1
7,665,728 UART: [ldev] Erasing FE.KEYID = 1
10,950,659 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,683 UART: [ldev] --
13,307,566 UART: [fwproc] Waiting for Commands...
13,310,916 UART: [fwproc] Received command 0x46574c44
13,313,113 UART: [fwproc] Received Image of size 119428 bytes
17,423,391 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,590 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,727 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,902,851 >>> mbox cmd response: success
17,906,298 UART: [afmc] ++
17,906,891 UART: [afmc] CDI.KEYID = 6
17,907,807 UART: [afmc] SUBJECT.KEYID = 7
17,909,028 UART: [afmc] AUTHORITY.KEYID = 5
21,222,275 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,603 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,883 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,299 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,006 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,447 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,988 UART: [afmc] --
23,588,505 UART: [cold-reset] --
23,594,216 UART: [state] Locking Datavault
23,599,789 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,513 UART: [state] Locking ICCM
23,603,074 UART: [exit] Launching FMC @ 0x40000130
23,611,438 UART:
23,611,723 UART: Running Caliptra FMC ...
23,612,846 UART:
23,613,011 UART: [state] CFI Enabled
23,620,969 UART: [fht] FMC Alias Private Key: 7
25,961,082 UART: [art] Extend RT PCRs Done
25,962,329 UART: [art] Lock RT PCRs Done
25,963,859 UART: [art] Populate DV Done
25,969,171 UART: [fht] FMC Alias Private Key: 7
25,970,770 UART: [art] Derive CDI
25,971,593 UART: [art] Store in slot 0x4
26,013,870 UART: [art] Derive Key Pair
26,014,923 UART: [art] Store priv key in slot 0x5
29,257,008 UART: [art] Derive Key Pair - Done
29,269,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,838 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,354 UART: [art] PUB.X = 6E94448B42101614550F9C60E41C5DD87A57EE8B07EE71AC8B3DF8A98E1BFA99132CB8E11D50284A1B50E7BBD1FB1B84
31,558,674 UART: [art] PUB.Y = A798E9E17F3AA48B7878EB28FA40282984CD1288476D0A83FBE81063246CAB37178C920D6392D077435BB8F2F2A636DB
31,565,922 UART: [art] SIG.R = 4E8F71CF2A167B0920D307A4D6CDCF628785693827095AF9DB9A544DC58A19F7E42D7DD88C1E9830A2B03789546C312E
31,573,275 UART: [art] SIG.S = 0D4BF3D954726DD7AA6E3771429F9BC484AB92726517D8571E9B9540B7D6F1876AB4374937129869E8989B7A4EAAD0D7
32,879,073 UART: Caliptra RT
32,879,797 UART: [state] CFI Enabled
33,012,218 UART: [rt] RT listening for mailbox commands...
33,014,080 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,043,669 UART: [rt]cmd =0x46504c54, len=4
33,045,304 >>> mbox cmd response data (8 bytes)
33,046,233 UART: [rt] FIPS self test
33,047,178 UART: [kat] ++
33,047,839 UART: [kat] sha1
33,051,926 UART: [kat] SHA2-256
33,053,838 UART: [kat] SHA2-384
33,056,808 UART: [kat] SHA2-512-ACC
33,057,817 UART: Droping operation
33,058,622 UART: Fatal Error: 0x90050003
33,093,783 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,243,743 >>> mbox cmd response: failed
33,244,394 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,394,282 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,073 UART:
190,368 UART: Running Caliptra ROM ...
191,429 UART:
7,137,350 UART: [state] CFI Enabled
7,149,381 UART: [state] LifecycleState = Unprovisioned
7,151,304 UART: [state] DebugLocked = No
7,152,663 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,157,191 UART: [kat] SHA2-256
7,326,921 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,337,463 UART: [kat] ++
7,337,934 UART: [kat] sha1
7,349,694 UART: [kat] SHA2-256
7,352,400 UART: [kat] SHA2-384
7,358,775 UART: [kat] SHA2-512-ACC
7,361,131 UART: [kat] ECC-384
9,646,458 UART: [kat] HMAC-384Kdf
9,657,895 UART: [kat] LMS
10,847,980 UART: [kat] --
10,852,039 UART: [cold-reset] ++
10,853,403 UART: [fht] Storing FHT @ 0x50003400
10,865,438 UART: [idev] ++
10,866,010 UART: [idev] CDI.KEYID = 6
10,866,916 UART: [idev] SUBJECT.KEYID = 7
10,868,136 UART: [idev] UDS.KEYID = 0
10,869,705 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,019,608 UART: [idev] Erasing UDS.KEYID = 0
14,155,326 UART: [idev] Using Sha1 for KeyId Algorithm
14,176,179 UART: [idev] --
14,181,743 UART: [ldev] ++
14,182,373 UART: [ldev] CDI.KEYID = 6
14,183,288 UART: [ldev] SUBJECT.KEYID = 5
14,184,511 UART: [ldev] AUTHORITY.KEYID = 7
14,185,751 UART: [ldev] FE.KEYID = 1
14,198,886 UART: [ldev] Erasing FE.KEYID = 1
17,484,098 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,777,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,791,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,806,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,821,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,840,269 UART: [ldev] --
19,845,010 UART: [fwproc] Waiting for Commands...
19,846,692 UART: [fwproc] Received command 0x46574c44
19,848,887 UART: [fwproc] Received Image of size 119428 bytes
23,961,811 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,034,286 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,107,421 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,439,733 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
4,132,315 ready_for_fw is high
4,132,765 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,172,310 >>> mbox cmd response: success
23,814,234 UART:
23,814,743 UART: Running Caliptra FMC ...
23,815,866 UART:
23,816,031 UART: [state] CFI Enabled
23,823,496 UART: [fht] FMC Alias Private Key: 7
26,162,821 UART: [art] Extend RT PCRs Done
26,164,060 UART: [art] Lock RT PCRs Done
26,165,852 UART: [art] Populate DV Done
26,171,400 UART: [fht] FMC Alias Private Key: 7
26,172,901 UART: [art] Derive CDI
26,173,643 UART: [art] Store in slot 0x4
26,216,540 UART: [art] Derive Key Pair
26,217,541 UART: [art] Store priv key in slot 0x5
29,459,697 UART: [art] Derive Key Pair - Done
29,472,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,753,056 UART: [art] Erasing AUTHORITY.KEYID = 7
31,754,573 UART: [art] PUB.X = 824A2E8A1B0A2862214D8C88AAC8CBF390A895AFC43671D02F8EC524A9B37BDBA456CD6DE31B287A2F535F8C7933B7CD
31,761,910 UART: [art] PUB.Y = 14420E20505451414A79719EC392773B3BFE189CA5AE773350FA1F20AF3F30D5CA592FDF06792A8F3DE61D24A5872547
31,769,100 UART: [art] SIG.R = 941EAA9696EC3563AB0868A359C26B1CD656EE6D39386FEEEF93CD2587E4F1F881D878F0F279A40FAC01939AB5B888A8
31,776,506 UART: [art] SIG.S = F50748D3D140B34A8DDAA9718315C373F027B934AE59DFBC439FCD861BC4898674AD690B95A937F7F96A9F90D14357F3
33,081,279 UART: Caliptra RT
33,082,015 UART: [state] CFI Enabled
33,214,887 UART: [rt] RT listening for mailbox commands...
33,216,767 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,246,634 UART: [rt]cmd =0x46504c54, len=4
33,248,108 >>> mbox cmd response data (8 bytes)
33,249,341 UART: [rt] FIPS self test
33,250,284 UART: [kat] ++
33,250,745 UART: [kat] sha1
33,255,098 UART: [kat] SHA2-256
33,256,985 UART: [kat] SHA2-384
33,259,914 UART: [kat] SHA2-512-ACC
33,260,915 UART: Droping operation
33,261,835 UART: Fatal Error: 0x90050003
33,297,172 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,447,139 >>> mbox cmd response: failed
33,447,807 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,597,746 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
10,455,478 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,508,848 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,155 UART:
192,541 UART: Running Caliptra ROM ...
193,753 UART:
193,911 UART: [state] CFI Enabled
265,731 UART: [state] LifecycleState = Unprovisioned
267,727 UART: [state] DebugLocked = No
269,007 UART: [state] WD Timer not started. Device not locked for debugging
273,293 UART: [kat] SHA2-256
452,893 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,706 UART: [kat] ++
464,161 UART: [kat] sha1
475,821 UART: [kat] SHA2-256
478,556 UART: [kat] SHA2-384
484,775 UART: [kat] SHA2-512-ACC
487,151 UART: [kat] ECC-384
2,950,418 UART: [kat] HMAC-384Kdf
2,974,217 UART: [kat] LMS
3,450,704 UART: [kat] --
3,456,700 UART: [cold-reset] ++
3,459,140 UART: [fht] FHT @ 0x50003400
3,469,059 UART: [idev] ++
3,469,641 UART: [idev] CDI.KEYID = 6
3,470,701 UART: [idev] SUBJECT.KEYID = 7
3,471,814 UART: [idev] UDS.KEYID = 0
3,472,744 ready_for_fw is high
3,472,975 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,623,273 UART: [idev] Erasing UDS.KEYID = 0
5,989,533 UART: [idev] Sha1 KeyId Algorithm
6,012,070 UART: [idev] --
6,017,535 UART: [ldev] ++
6,018,120 UART: [ldev] CDI.KEYID = 6
6,019,048 UART: [ldev] SUBJECT.KEYID = 5
6,020,215 UART: [ldev] AUTHORITY.KEYID = 7
6,021,451 UART: [ldev] FE.KEYID = 1
6,061,759 UART: [ldev] Erasing FE.KEYID = 1
8,564,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,305,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,321,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,337,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,353,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,375,453 UART: [ldev] --
10,380,686 UART: [fwproc] Wait for Commands...
10,382,735 UART: [fwproc] Recv command 0x46574c44
10,384,787 UART: [fwproc] Recv'd Img size: 119428 bytes
13,881,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,964,923 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,037,945 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,368,418 >>> mbox cmd response: success
14,372,279 UART: [afmc] ++
14,372,875 UART: [afmc] CDI.KEYID = 6
14,373,795 UART: [afmc] SUBJECT.KEYID = 7
14,375,011 UART: [afmc] AUTHORITY.KEYID = 5
16,921,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,664,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,666,736 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,682,545 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,698,588 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,714,170 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,739,138 UART: [afmc] --
18,742,909 UART: [cold-reset] --
18,747,369 UART: [state] Locking Datavault
18,753,053 UART: [state] Locking PCR0, PCR1 and PCR31
18,754,814 UART: [state] Locking ICCM
18,755,893 UART: [exit] Launching FMC @ 0x40000130
18,764,298 UART:
18,764,584 UART: Running Caliptra FMC ...
18,765,703 UART:
18,765,864 UART: [state] CFI Enabled
18,822,124 UART: [fht] FMC Alias Private Key: 7
20,588,713 UART: [art] Extend RT PCRs Done
20,589,964 UART: [art] Lock RT PCRs Done
20,591,441 UART: [art] Populate DV Done
20,596,812 UART: [fht] FMC Alias Private Key: 7
20,598,469 UART: [art] Derive CDI
20,599,443 UART: [art] Store in slot 0x4
20,654,671 UART: [art] Derive Key Pair
20,655,677 UART: [art] Store priv key in slot 0x5
23,118,953 UART: [art] Derive Key Pair - Done
23,131,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,844,635 UART: [art] Erasing AUTHORITY.KEYID = 7
24,846,144 UART: [art] PUB.X = 221E6185AB1592F8CA3D727F10D58916A692077AB2DB066A4894DDF760F84E89192F7FE43FB9E932D77FC4674F96DAA9
24,853,413 UART: [art] PUB.Y = 4DC17740FA70E8C2928B14F4695BC27D13508060B42680E95BD9668508F8D5A12492746EB25BDC63E197C73A640B171A
24,860,628 UART: [art] SIG.R = 9AF7A5364A6A18A227EDCBD16C8BDA7DD6A138E26A929E34104E980065E01871F59971C39AFEDB6011E336ABEB19613C
24,868,053 UART: [art] SIG.S = 61DEAF215A632D06454E5A8B5780760951A27ACF0A423F435520CA0DFE042D00FD48A2B8D796017C154A9943D5634B7E
25,846,524 UART: Caliptra RT
25,847,230 UART: [state] CFI Enabled
26,028,141 UART: [rt] RT listening for mailbox commands...
26,029,998 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,059,781 UART: [rt]cmd =0x46504c54, len=4
26,061,376 >>> mbox cmd response data (8 bytes)
26,062,352 UART: [rt] FIPS self test
26,063,306 UART: [kat] ++
26,063,766 UART: [kat] sha1
26,068,012 UART: [kat] SHA2-256
26,069,900 UART: [kat] SHA2-384
26,072,827 UART: [kat] SHA2-512-ACC
26,073,831 UART: Droping operation
26,074,631 UART: Fatal Error: 0x90050003
26,109,793 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,259,756 >>> mbox cmd response: failed
26,260,368 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,410,281 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,130 UART:
190,450 UART: Running Caliptra ROM ...
191,484 UART:
191,628 UART: [state] CFI Enabled
264,860 UART: [state] LifecycleState = Unprovisioned
266,801 UART: [state] DebugLocked = No
268,149 UART: [state] WD Timer not started. Device not locked for debugging
271,808 UART: [kat] SHA2-256
451,500 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,266 UART: [kat] ++
462,721 UART: [kat] sha1
473,169 UART: [kat] SHA2-256
475,846 UART: [kat] SHA2-384
481,995 UART: [kat] SHA2-512-ACC
484,367 UART: [kat] ECC-384
2,950,413 UART: [kat] HMAC-384Kdf
2,973,177 UART: [kat] LMS
3,449,666 UART: [kat] --
3,453,875 UART: [cold-reset] ++
3,455,543 UART: [fht] FHT @ 0x50003400
3,466,035 UART: [idev] ++
3,466,619 UART: [idev] CDI.KEYID = 6
3,467,643 UART: [idev] SUBJECT.KEYID = 7
3,469,063 UART: [idev] UDS.KEYID = 0
3,470,594 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,620,545 UART: [idev] Erasing UDS.KEYID = 0
5,986,625 UART: [idev] Sha1 KeyId Algorithm
6,009,968 UART: [idev] --
6,013,918 UART: [ldev] ++
6,014,495 UART: [ldev] CDI.KEYID = 6
6,015,431 UART: [ldev] SUBJECT.KEYID = 5
6,016,654 UART: [ldev] AUTHORITY.KEYID = 7
6,017,891 UART: [ldev] FE.KEYID = 1
6,060,251 UART: [ldev] Erasing FE.KEYID = 1
8,568,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,993 UART: [ldev] --
10,380,236 UART: [fwproc] Wait for Commands...
10,382,180 UART: [fwproc] Recv command 0x46574c44
10,384,173 UART: [fwproc] Recv'd Img size: 119428 bytes
13,877,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,960,079 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,033,102 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,365,287 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,457,456 ready_for_fw is high
3,457,922 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,235,725 >>> mbox cmd response: success
18,515,879 UART:
18,516,374 UART: Running Caliptra FMC ...
18,517,507 UART:
18,517,669 UART: [state] CFI Enabled
18,582,019 UART: [fht] FMC Alias Private Key: 7
20,348,009 UART: [art] Extend RT PCRs Done
20,349,261 UART: [art] Lock RT PCRs Done
20,351,006 UART: [art] Populate DV Done
20,356,278 UART: [fht] FMC Alias Private Key: 7
20,357,987 UART: [art] Derive CDI
20,358,733 UART: [art] Store in slot 0x4
20,414,134 UART: [art] Derive Key Pair
20,415,208 UART: [art] Store priv key in slot 0x5
22,878,316 UART: [art] Derive Key Pair - Done
22,891,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,407 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,911 UART: [art] PUB.X = 372DFD29F4982858ED9A51F8F107646BFA3E0EDFF84DA8B04C5E70045EDFEADBD52032B5A14FA4BDC11ACABF3268E3C7
24,612,220 UART: [art] PUB.Y = BA99F1D8AA4AFA9E50013C343318C1427128A5F80A8D388287692789A8DD260DF0EEC682F3FD3B2F5AF4D0FFA0116D79
24,619,479 UART: [art] SIG.R = BCEE8800E60014A4308F200FECF71F2D0F20E66FC3A5D7AF1F22A7905D1BC968076E29BC033F4FDBF83E0C2B3F7BA62D
24,626,827 UART: [art] SIG.S = 3D5990BB168A5EFC2461539534D83C546A11B73C10921A2A8B74259485B88D85238346F5BFA2321FACFEB91ED4DD342B
25,605,856 UART: Caliptra RT
25,606,562 UART: [state] CFI Enabled
25,788,441 UART: [rt] RT listening for mailbox commands...
25,790,294 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,820,055 UART: [rt]cmd =0x46504c54, len=4
25,821,690 >>> mbox cmd response data (8 bytes)
25,823,076 UART: [rt] FIPS self test
25,824,021 UART: [kat] ++
25,824,481 UART: [kat] sha1
25,828,811 UART: [kat] SHA2-256
25,830,696 UART: [kat] SHA2-384
25,833,825 UART: [kat] SHA2-512-ACC
25,834,824 UART: Droping operation
25,835,710 UART: Fatal Error: 0x90050003
25,871,045 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,021,024 >>> mbox cmd response: failed
26,021,684 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,171,434 >>> mbox cmd response: failed
Initializing fuses
1,113 writing to cptra_bootfsm_go
3,461,367 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,216,543 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,591 writing to cptra_bootfsm_go
192,865 UART:
193,246 UART: Running Caliptra ROM ...
194,388 UART:
604,022 UART: [state] CFI Enabled
617,201 UART: [state] LifecycleState = Unprovisioned
619,114 UART: [state] DebugLocked = No
621,860 UART: [state] WD Timer not started. Device not locked for debugging
625,997 UART: [kat] SHA2-256
805,674 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,463 UART: [kat] ++
816,917 UART: [kat] sha1
826,946 UART: [kat] SHA2-256
829,698 UART: [kat] SHA2-384
836,016 UART: [kat] SHA2-512-ACC
838,333 UART: [kat] ECC-384
3,281,535 UART: [kat] HMAC-384Kdf
3,292,569 UART: [kat] LMS
3,769,054 UART: [kat] --
3,774,208 UART: [cold-reset] ++
3,775,728 UART: [fht] FHT @ 0x50003400
3,786,143 UART: [idev] ++
3,786,740 UART: [idev] CDI.KEYID = 6
3,787,667 UART: [idev] SUBJECT.KEYID = 7
3,788,930 UART: [idev] UDS.KEYID = 0
3,789,930 ready_for_fw is high
3,790,174 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,940,037 UART: [idev] Erasing UDS.KEYID = 0
6,270,805 UART: [idev] Sha1 KeyId Algorithm
6,293,554 UART: [idev] --
6,298,743 UART: [ldev] ++
6,299,323 UART: [ldev] CDI.KEYID = 6
6,300,242 UART: [ldev] SUBJECT.KEYID = 5
6,301,464 UART: [ldev] AUTHORITY.KEYID = 7
6,302,700 UART: [ldev] FE.KEYID = 1
6,312,542 UART: [ldev] Erasing FE.KEYID = 1
8,793,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,341 UART: [ldev] --
10,590,371 UART: [fwproc] Wait for Commands...
10,592,081 UART: [fwproc] Recv command 0x46574c44
10,594,088 UART: [fwproc] Recv'd Img size: 119428 bytes
14,097,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,596 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,251,611 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,583,476 >>> mbox cmd response: success
14,587,330 UART: [afmc] ++
14,587,927 UART: [afmc] CDI.KEYID = 6
14,589,007 UART: [afmc] SUBJECT.KEYID = 7
14,590,071 UART: [afmc] AUTHORITY.KEYID = 5
17,091,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,810,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,812,891 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,828,731 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,844,801 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,860,370 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,884,176 UART: [afmc] --
18,887,132 UART: [cold-reset] --
18,892,243 UART: [state] Locking Datavault
18,896,471 UART: [state] Locking PCR0, PCR1 and PCR31
18,898,172 UART: [state] Locking ICCM
18,899,788 UART: [exit] Launching FMC @ 0x40000130
18,908,297 UART:
18,908,580 UART: Running Caliptra FMC ...
18,909,697 UART:
18,909,864 UART: [state] CFI Enabled
18,917,538 UART: [fht] FMC Alias Private Key: 7
20,683,349 UART: [art] Extend RT PCRs Done
20,684,580 UART: [art] Lock RT PCRs Done
20,686,212 UART: [art] Populate DV Done
20,691,682 UART: [fht] FMC Alias Private Key: 7
20,693,337 UART: [art] Derive CDI
20,694,165 UART: [art] Store in slot 0x4
20,737,094 UART: [art] Derive Key Pair
20,738,103 UART: [art] Store priv key in slot 0x5
23,164,733 UART: [art] Derive Key Pair - Done
23,177,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,883,768 UART: [art] Erasing AUTHORITY.KEYID = 7
24,885,272 UART: [art] PUB.X = 75C895728653D6CF6F7932B0BF810D9280030F9AE2E701AD40AD2046A1B374DFCDF7F93B2C67589B3750E52BD2AB6E4E
24,892,585 UART: [art] PUB.Y = 180E9DA6BF5ED9717C459B5545313B342B0A1737EE9EC119EECEAC58B4B0EC1205953AF06A68B090B335972170FBD826
24,899,847 UART: [art] SIG.R = 63CB61267E667AB5725C3601BE6FC80C22838CED4C108C70166A242EDA78084EE6D4B50300A029CAAFD5341144479C95
24,907,202 UART: [art] SIG.S = C0F9B030E06BE5AF3F3A8FCF346BC007862881D8DA5F04E93D590778B4FF0E94AB4E99473366A247C7AD77E3F9C968A3
25,885,806 UART: Caliptra RT
25,886,543 UART: [state] CFI Enabled
26,019,759 UART: [rt] RT listening for mailbox commands...
26,021,615 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,051,182 UART: [rt]cmd =0x46504c54, len=4
26,052,911 >>> mbox cmd response data (8 bytes)
26,053,828 UART: [rt] FIPS self test
26,054,781 UART: [kat] ++
26,055,244 UART: [kat] sha1
26,059,546 UART: [kat] SHA2-256
26,061,486 UART: [kat] SHA2-384
26,064,396 UART: [kat] SHA2-512-ACC
26,065,397 UART: Droping operation
26,066,203 UART: Fatal Error: 0x90050003
26,101,360 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,251,307 >>> mbox cmd response: failed
26,251,892 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,401,767 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
190,069 UART:
190,381 UART: Running Caliptra ROM ...
191,427 UART:
14,131,696 UART: [state] CFI Enabled
14,147,146 UART: [state] LifecycleState = Unprovisioned
14,149,120 UART: [state] DebugLocked = No
14,150,565 UART: [state] WD Timer not started. Device not locked for debugging
14,155,075 UART: [kat] SHA2-256
14,334,705 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,345,509 UART: [kat] ++
14,346,183 UART: [kat] sha1
14,358,331 UART: [kat] SHA2-256
14,361,043 UART: [kat] SHA2-384
14,366,467 UART: [kat] SHA2-512-ACC
14,368,825 UART: [kat] ECC-384
16,811,996 UART: [kat] HMAC-384Kdf
16,823,466 UART: [kat] LMS
17,299,981 UART: [kat] --
17,303,867 UART: [cold-reset] ++
17,306,026 UART: [fht] FHT @ 0x50003400
17,316,189 UART: [idev] ++
17,316,763 UART: [idev] CDI.KEYID = 6
17,317,705 UART: [idev] SUBJECT.KEYID = 7
17,318,921 UART: [idev] UDS.KEYID = 0
17,320,510 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,470,406 UART: [idev] Erasing UDS.KEYID = 0
19,794,878 UART: [idev] Sha1 KeyId Algorithm
19,819,725 UART: [idev] --
19,825,447 UART: [ldev] ++
19,826,045 UART: [ldev] CDI.KEYID = 6
19,826,940 UART: [ldev] SUBJECT.KEYID = 5
19,828,153 UART: [ldev] AUTHORITY.KEYID = 7
19,829,447 UART: [ldev] FE.KEYID = 1
19,842,010 UART: [ldev] Erasing FE.KEYID = 1
22,320,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,042,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,058,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,074,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,089,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,112,506 UART: [ldev] --
24,117,707 UART: [fwproc] Wait for Commands...
24,120,088 UART: [fwproc] Recv command 0x46574c44
24,122,096 UART: [fwproc] Recv'd Img size: 119428 bytes
27,621,814 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,704,330 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,777,359 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,108,750 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
3,778,892 ready_for_fw is high
3,779,703 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,477,811 >>> mbox cmd response: success
18,726,364 UART:
18,726,768 UART: Running Caliptra FMC ...
18,727,935 UART:
18,728,108 UART: [state] CFI Enabled
18,736,455 UART: [fht] FMC Alias Private Key: 7
20,502,735 UART: [art] Extend RT PCRs Done
20,503,963 UART: [art] Lock RT PCRs Done
20,505,702 UART: [art] Populate DV Done
20,511,150 UART: [fht] FMC Alias Private Key: 7
20,512,734 UART: [art] Derive CDI
20,513,568 UART: [art] Store in slot 0x4
20,556,654 UART: [art] Derive Key Pair
20,557,661 UART: [art] Store priv key in slot 0x5
22,984,136 UART: [art] Derive Key Pair - Done
22,997,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,703,102 UART: [art] Erasing AUTHORITY.KEYID = 7
24,704,606 UART: [art] PUB.X = 82752863A046AAB6EF90C6AE3D43BF3EF5ED92886519C46A26A7232598770734E6DB3F12FB7D4F0CDA23E2226EE2AF9B
24,711,913 UART: [art] PUB.Y = 6329BB3C35DCBFADBA3B9916F8CB33AA82B3D59A3C51B5217B0D1F1C0DFD34175572DEEE7E8ACD21D962FB42E00498B2
24,719,185 UART: [art] SIG.R = 025F3A0DC5EE9D0A30C18A7AE7E1A593389E79A04C192D886036582F7434E08B618E1ADE5612E8222D31C0D6E13749BA
24,726,532 UART: [art] SIG.S = E158172C168257C57368F0B30ED830AFD2916AB232158B28586754569F59F7C4501662B483EC489CAE98D9D898D6FD75
25,705,514 UART: Caliptra RT
25,706,222 UART: [state] CFI Enabled
25,838,525 UART: [rt] RT listening for mailbox commands...
25,840,383 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,870,123 UART: [rt]cmd =0x46504c54, len=4
25,871,677 >>> mbox cmd response data (8 bytes)
25,873,015 UART: [rt] FIPS self test
25,873,972 UART: [kat] ++
25,874,425 UART: [kat] sha1
25,878,694 UART: [kat] SHA2-256
25,880,573 UART: [kat] SHA2-384
25,883,697 UART: [kat] SHA2-512-ACC
25,884,698 UART: Droping operation
25,885,636 UART: Fatal Error: 0x90050003
25,920,807 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,070,800 >>> mbox cmd response: failed
26,071,429 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,221,310 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
17,479,486 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,167,078 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,199 UART:
192,567 UART: Running Caliptra ROM ...
193,768 UART:
193,925 UART: [state] CFI Enabled
262,960 UART: [state] LifecycleState = Unprovisioned
265,367 UART: [state] DebugLocked = No
268,326 UART: [state] WD Timer not started. Device not locked for debugging
273,222 UART: [kat] SHA2-256
463,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,860 UART: [kat] ++
474,400 UART: [kat] sha1
486,280 UART: [kat] SHA2-256
489,362 UART: [kat] SHA2-384
494,795 UART: [kat] SHA2-512-ACC
497,383 UART: [kat] ECC-384
2,948,031 UART: [kat] HMAC-384Kdf
2,971,427 UART: [kat] LMS
3,503,188 UART: [kat] --
3,507,821 UART: [cold-reset] ++
3,509,971 UART: [fht] FHT @ 0x50003400
3,521,308 UART: [idev] ++
3,522,020 UART: [idev] CDI.KEYID = 6
3,522,937 UART: [idev] SUBJECT.KEYID = 7
3,524,185 UART: [idev] UDS.KEYID = 0
3,525,407 ready_for_fw is high
3,525,648 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,675,883 UART: [idev] Erasing UDS.KEYID = 0
6,028,523 UART: [idev] Sha1 KeyId Algorithm
6,051,441 UART: [idev] --
6,056,310 UART: [ldev] ++
6,056,999 UART: [ldev] CDI.KEYID = 6
6,057,921 UART: [ldev] SUBJECT.KEYID = 5
6,059,283 UART: [ldev] AUTHORITY.KEYID = 7
6,060,485 UART: [ldev] FE.KEYID = 1
6,099,990 UART: [ldev] Erasing FE.KEYID = 1
8,607,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,543 UART: [ldev] --
10,415,822 UART: [fwproc] Wait for Commands...
10,418,250 UART: [fwproc] Recv command 0x46574c44
10,420,572 UART: [fwproc] Recv'd Img size: 119428 bytes
13,929,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,007,864 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,131,435 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,696,830 >>> mbox cmd response: success
14,700,830 UART: [afmc] ++
14,701,565 UART: [afmc] CDI.KEYID = 6
14,702,767 UART: [afmc] SUBJECT.KEYID = 7
14,704,205 UART: [afmc] AUTHORITY.KEYID = 5
17,235,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,065 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,979 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,069 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,227 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,092 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,411 UART: [afmc] --
19,035,111 UART: [cold-reset] --
19,039,360 UART: [state] Locking Datavault
19,045,806 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,948 UART: [state] Locking ICCM
19,050,166 UART: [exit] Launching FMC @ 0x40000130
19,058,792 UART:
19,059,034 UART: Running Caliptra FMC ...
19,060,146 UART:
19,060,328 UART: [state] CFI Enabled
19,116,916 UART: [fht] FMC Alias Private Key: 7
20,904,412 UART: [art] Extend RT PCRs Done
20,905,637 UART: [art] Lock RT PCRs Done
20,907,376 UART: [art] Populate DV Done
20,912,973 UART: [fht] FMC Alias Private Key: 7
20,914,460 UART: [art] Derive CDI
20,915,226 UART: [art] Store in slot 0x4
20,970,153 UART: [art] Derive Key Pair
20,971,197 UART: [art] Store priv key in slot 0x5
23,433,530 UART: [art] Derive Key Pair - Done
23,446,364 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,376 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,892 UART: [art] PUB.X = CA3707FAAE1C3873654F58B803EF35E9749C34C508D6738B949F81AF00437FD62579E48FCFA59632F9495F6C2E6BCAB7
25,168,160 UART: [art] PUB.Y = D08E97A023602EA3E443977DCA3D93590A77B8DF1B63604BF2F2A6363A66D83F9A141B6AF052FB18CCB88E19DF2226AA
25,175,410 UART: [art] SIG.R = 4806B1DD9983B37E82B702A0DDCF68D4BC258440C6A0CF080887C9216B4EEF3F64ED9098342A3CFDE5E7E8B37A758D8B
25,182,851 UART: [art] SIG.S = 1384EACB785F34545C68247610E2D4B0E81D716B3C02CC4B85FF7FC38DB3F969A10CD2F90416041C477E71C0BB8B7804
26,160,991 UART: Caliptra RT
26,161,688 UART: [state] CFI Enabled
26,341,120 UART: [rt] RT listening for mailbox commands...
26,342,971 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,372,943 UART: [rt]cmd =0x46504c54, len=4
26,374,256 >>> mbox cmd response data (8 bytes)
26,375,492 UART: [rt] FIPS self test
26,376,432 UART: [kat] ++
26,376,891 UART: [kat] sha1
26,381,085 UART: [kat] SHA2-256
26,383,013 UART: [kat] SHA2-384
26,386,046 UART: [kat] SHA2-512-ACC
26,387,050 UART: Droping operation
26,387,915 UART: Fatal Error: 0x90050003
26,423,067 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,573,048 >>> mbox cmd response: failed
26,573,639 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,723,944 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
190,122 UART:
190,426 UART: Running Caliptra ROM ...
191,489 UART:
191,634 UART: [state] CFI Enabled
265,732 UART: [state] LifecycleState = Unprovisioned
268,101 UART: [state] DebugLocked = No
271,003 UART: [state] WD Timer not started. Device not locked for debugging
274,986 UART: [kat] SHA2-256
464,870 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,602 UART: [kat] ++
476,057 UART: [kat] sha1
487,632 UART: [kat] SHA2-256
490,603 UART: [kat] SHA2-384
496,754 UART: [kat] SHA2-512-ACC
499,322 UART: [kat] ECC-384
2,950,567 UART: [kat] HMAC-384Kdf
2,973,204 UART: [kat] LMS
3,504,945 UART: [kat] --
3,510,185 UART: [cold-reset] ++
3,511,370 UART: [fht] FHT @ 0x50003400
3,521,600 UART: [idev] ++
3,522,283 UART: [idev] CDI.KEYID = 6
3,523,222 UART: [idev] SUBJECT.KEYID = 7
3,524,441 UART: [idev] UDS.KEYID = 0
3,525,936 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,039 UART: [idev] Erasing UDS.KEYID = 0
6,030,512 UART: [idev] Sha1 KeyId Algorithm
6,052,628 UART: [idev] --
6,057,552 UART: [ldev] ++
6,058,281 UART: [ldev] CDI.KEYID = 6
6,059,209 UART: [ldev] SUBJECT.KEYID = 5
6,060,327 UART: [ldev] AUTHORITY.KEYID = 7
6,061,534 UART: [ldev] FE.KEYID = 1
6,101,844 UART: [ldev] Erasing FE.KEYID = 1
8,607,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,349 UART: [ldev] --
10,414,140 UART: [fwproc] Wait for Commands...
10,416,457 UART: [fwproc] Recv command 0x46574c44
10,418,777 UART: [fwproc] Recv'd Img size: 119428 bytes
13,928,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,008,289 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,131,894 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,696,729 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,437,332 ready_for_fw is high
3,437,801 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,846,352 >>> mbox cmd response: success
19,128,393 UART:
19,128,786 UART: Running Caliptra FMC ...
19,129,904 UART:
19,130,063 UART: [state] CFI Enabled
19,197,778 UART: [fht] FMC Alias Private Key: 7
20,985,064 UART: [art] Extend RT PCRs Done
20,986,811 UART: [art] Lock RT PCRs Done
20,988,268 UART: [art] Populate DV Done
20,993,440 UART: [fht] FMC Alias Private Key: 7
20,994,993 UART: [art] Derive CDI
20,995,731 UART: [art] Store in slot 0x4
21,054,368 UART: [art] Derive Key Pair
21,055,422 UART: [art] Store priv key in slot 0x5
23,518,466 UART: [art] Derive Key Pair - Done
23,531,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,244,893 UART: [art] Erasing AUTHORITY.KEYID = 7
25,246,388 UART: [art] PUB.X = AC97C4EFE25F074BF43D61AFF24DBC80CAE3751654FD39FD17A5EA8C32865AD9E9EE81375369286F04D5B65A44A0FE67
25,253,711 UART: [art] PUB.Y = E7406071E01542960179316DCFDB748DEACE0C493221E8DD715BADF3BBE39081FE18A1E4C9FF1DAC99A843EF0DE708CF
25,260,960 UART: [art] SIG.R = AACAF4EC893096A75533D65F0D1B5B18CB4D73A072E6842F62822F54BB44A9CCDFE2BC2E72177A0807603DEA4BB1211B
25,268,362 UART: [art] SIG.S = 6BF5C65ACC363BFBA79801B79F3EF40F79CBA98B66CD083CAE339C07F1F4F82698F9DE2351443F91777DDDFB3E14280F
26,246,917 UART: Caliptra RT
26,247,633 UART: [state] CFI Enabled
26,428,590 UART: [rt] RT listening for mailbox commands...
26,430,452 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,460,114 UART: [rt]cmd =0x46504c54, len=4
26,461,511 >>> mbox cmd response data (8 bytes)
26,462,590 UART: [rt] FIPS self test
26,463,475 UART: [kat] ++
26,463,927 UART: [kat] sha1
26,468,518 UART: [kat] SHA2-256
26,470,416 UART: [kat] SHA2-384
26,473,331 UART: [kat] SHA2-512-ACC
26,474,334 UART: Droping operation
26,475,261 UART: Fatal Error: 0x90050003
26,510,425 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,660,454 >>> mbox cmd response: failed
26,661,156 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,811,066 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
3,442,472 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,850,269 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,374 UART:
192,738 UART: Running Caliptra ROM ...
193,884 UART:
603,432 UART: [state] CFI Enabled
617,477 UART: [state] LifecycleState = Unprovisioned
619,829 UART: [state] DebugLocked = No
621,588 UART: [state] WD Timer not started. Device not locked for debugging
626,630 UART: [kat] SHA2-256
816,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,297 UART: [kat] ++
827,818 UART: [kat] sha1
839,474 UART: [kat] SHA2-256
842,554 UART: [kat] SHA2-384
848,763 UART: [kat] SHA2-512-ACC
851,338 UART: [kat] ECC-384
3,294,356 UART: [kat] HMAC-384Kdf
3,306,232 UART: [kat] LMS
3,838,051 UART: [kat] --
3,841,433 UART: [cold-reset] ++
3,843,663 UART: [fht] FHT @ 0x50003400
3,856,784 UART: [idev] ++
3,857,496 UART: [idev] CDI.KEYID = 6
3,858,456 UART: [idev] SUBJECT.KEYID = 7
3,859,637 UART: [idev] UDS.KEYID = 0
3,860,548 ready_for_fw is high
3,860,765 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,010,744 UART: [idev] Erasing UDS.KEYID = 0
6,335,822 UART: [idev] Sha1 KeyId Algorithm
6,359,193 UART: [idev] --
6,364,272 UART: [ldev] ++
6,364,959 UART: [ldev] CDI.KEYID = 6
6,365,879 UART: [ldev] SUBJECT.KEYID = 5
6,367,043 UART: [ldev] AUTHORITY.KEYID = 7
6,368,283 UART: [ldev] FE.KEYID = 1
6,378,993 UART: [ldev] Erasing FE.KEYID = 1
8,856,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,035 UART: [ldev] --
10,645,480 UART: [fwproc] Wait for Commands...
10,647,533 UART: [fwproc] Recv command 0x46574c44
10,649,859 UART: [fwproc] Recv'd Img size: 119428 bytes
14,156,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,722 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,359,351 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,925,314 >>> mbox cmd response: success
14,929,672 UART: [afmc] ++
14,930,396 UART: [afmc] CDI.KEYID = 6
14,931,620 UART: [afmc] SUBJECT.KEYID = 7
14,933,063 UART: [afmc] AUTHORITY.KEYID = 5
17,438,189 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,160,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,162,871 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,178,035 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,193,166 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,208,051 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,233,093 UART: [afmc] --
19,236,155 UART: [cold-reset] --
19,240,296 UART: [state] Locking Datavault
19,246,741 UART: [state] Locking PCR0, PCR1 and PCR31
19,248,885 UART: [state] Locking ICCM
19,251,427 UART: [exit] Launching FMC @ 0x40000130
19,260,069 UART:
19,260,323 UART: Running Caliptra FMC ...
19,261,450 UART:
19,261,622 UART: [state] CFI Enabled
19,269,414 UART: [fht] FMC Alias Private Key: 7
21,036,022 UART: [art] Extend RT PCRs Done
21,037,236 UART: [art] Lock RT PCRs Done
21,039,084 UART: [art] Populate DV Done
21,044,562 UART: [fht] FMC Alias Private Key: 7
21,046,002 UART: [art] Derive CDI
21,046,773 UART: [art] Store in slot 0x4
21,089,587 UART: [art] Derive Key Pair
21,090,634 UART: [art] Store priv key in slot 0x5
23,517,451 UART: [art] Derive Key Pair - Done
23,530,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,236,799 UART: [art] Erasing AUTHORITY.KEYID = 7
25,238,292 UART: [art] PUB.X = 87617B01731AE315AA05AD9558C239BD37E2A00D4E09FF2AEFEA841C27240B21C45F771E52CE0C3A0AF4AA1A6DE07B79
25,245,582 UART: [art] PUB.Y = E2A462DA7064A36912E9C2826133AE6A86F44AA9BFB167314B571707226B833DA86F00C1F685E1E8DCF6243DC6AE141F
25,252,801 UART: [art] SIG.R = EF3AA5DC0D291843EF5A3246A57912A67075614619DA5A44BB22C063AE761B45935E55666C875F79F0E96937058B4110
25,260,149 UART: [art] SIG.S = 6A79276B3FE01CA5897B993CEC70AB16C97DB1C78B209ADA434BD2042707F46B94A3D2067367A5DA0AC21E8F6D6DB983
26,239,337 UART: Caliptra RT
26,240,050 UART: [state] CFI Enabled
26,373,383 UART: [rt] RT listening for mailbox commands...
26,375,237 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,404,793 UART: [rt]cmd =0x46504c54, len=4
26,406,593 >>> mbox cmd response data (8 bytes)
26,407,773 UART: [rt] FIPS self test
26,408,718 UART: [kat] ++
26,409,174 UART: [kat] sha1
26,413,580 UART: [kat] SHA2-256
26,415,456 UART: [kat] SHA2-384
26,418,254 UART: [kat] SHA2-512-ACC
26,419,253 UART: Droping operation
26,420,217 UART: Fatal Error: 0x90050003
26,455,618 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,605,455 >>> mbox cmd response: failed
26,606,041 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,755,931 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
190,123 UART:
190,408 UART: Running Caliptra ROM ...
191,466 UART:
13,778,585 UART: [state] CFI Enabled
13,790,184 UART: [state] LifecycleState = Unprovisioned
13,792,542 UART: [state] DebugLocked = No
13,795,502 UART: [state] WD Timer not started. Device not locked for debugging
13,800,562 UART: [kat] SHA2-256
13,990,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,001,247 UART: [kat] ++
14,001,824 UART: [kat] sha1
14,013,268 UART: [kat] SHA2-256
14,016,277 UART: [kat] SHA2-384
14,021,531 UART: [kat] SHA2-512-ACC
14,024,113 UART: [kat] ECC-384
16,464,223 UART: [kat] HMAC-384Kdf
16,476,935 UART: [kat] LMS
17,008,707 UART: [kat] --
17,014,911 UART: [cold-reset] ++
17,017,395 UART: [fht] FHT @ 0x50003400
17,028,661 UART: [idev] ++
17,029,360 UART: [idev] CDI.KEYID = 6
17,030,326 UART: [idev] SUBJECT.KEYID = 7
17,031,492 UART: [idev] UDS.KEYID = 0
17,033,018 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,183,022 UART: [idev] Erasing UDS.KEYID = 0
19,505,522 UART: [idev] Sha1 KeyId Algorithm
19,527,843 UART: [idev] --
19,531,513 UART: [ldev] ++
19,532,201 UART: [ldev] CDI.KEYID = 6
19,533,310 UART: [ldev] SUBJECT.KEYID = 5
19,534,435 UART: [ldev] AUTHORITY.KEYID = 7
19,535,617 UART: [ldev] FE.KEYID = 1
19,547,484 UART: [ldev] Erasing FE.KEYID = 1
22,030,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,749,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,764,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,779,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,794,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,814,316 UART: [ldev] --
23,820,017 UART: [fwproc] Wait for Commands...
23,822,444 UART: [fwproc] Recv command 0x46574c44
23,824,730 UART: [fwproc] Recv'd Img size: 119428 bytes
27,336,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,408,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,532,534 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,097,409 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,749,828 ready_for_fw is high
3,750,534 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,047,568 >>> mbox cmd response: success
19,300,038 UART:
19,300,468 UART: Running Caliptra FMC ...
19,301,622 UART:
19,301,806 UART: [state] CFI Enabled
19,309,877 UART: [fht] FMC Alias Private Key: 7
21,076,009 UART: [art] Extend RT PCRs Done
21,077,261 UART: [art] Lock RT PCRs Done
21,078,654 UART: [art] Populate DV Done
21,084,320 UART: [fht] FMC Alias Private Key: 7
21,085,989 UART: [art] Derive CDI
21,086,819 UART: [art] Store in slot 0x4
21,129,635 UART: [art] Derive Key Pair
21,130,681 UART: [art] Store priv key in slot 0x5
23,557,638 UART: [art] Derive Key Pair - Done
23,570,685 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,084 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,598 UART: [art] PUB.X = C1789D33764A25C434FBAD7C28CAE6E3E82230F03DEFA93F931483B5388CD1EE9152CB1CB5592D3A99CFB0E4711A7274
25,285,884 UART: [art] PUB.Y = DE3A971375C6F1BA21D7EF7BC3339E4F1EF0462DE4663400095B2E5D207FEF1A09F6E1B9379166C6AB9C45B17D1B8D42
25,293,140 UART: [art] SIG.R = 937EEDB0DE15037C91F57BEB9698E2DB788BB900F9DB12879C6A072DA741DBCDF5693B4753011968786FFF5941994A82
25,300,544 UART: [art] SIG.S = E5E4BB2711F26028B0B251C4F11532BFB769FE229680726957A9F530FE67EB8372F6D9EC0E90FC2DD755B4CE466432A0
26,278,652 UART: Caliptra RT
26,279,382 UART: [state] CFI Enabled
26,412,308 UART: [rt] RT listening for mailbox commands...
26,414,212 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,443,731 UART: [rt]cmd =0x46504c54, len=4
26,445,411 >>> mbox cmd response data (8 bytes)
26,446,697 UART: [rt] FIPS self test
26,447,649 UART: [kat] ++
26,448,462 UART: [kat] sha1
26,452,498 UART: [kat] SHA2-256
26,454,390 UART: [kat] SHA2-384
26,457,277 UART: [kat] SHA2-512-ACC
26,458,272 UART: Droping operation
26,459,112 UART: Fatal Error: 0x90050003
26,494,215 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,644,234 >>> mbox cmd response: failed
26,644,885 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,795,342 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
16,879,796 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,203,369 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,309 UART: [kat] SHA2-256
882,240 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,355 UART: [kat] ++
886,507 UART: [kat] sha1
890,661 UART: [kat] SHA2-256
892,599 UART: [kat] SHA2-384
895,328 UART: [kat] SHA2-512-ACC
897,229 UART: [kat] ECC-384
902,822 UART: [kat] HMAC-384Kdf
907,474 UART: [kat] LMS
1,475,670 UART: [kat] --
1,476,657 UART: [cold-reset] ++
1,477,053 UART: [fht] Storing FHT @ 0x50003400
1,479,908 UART: [idev] ++
1,480,076 UART: [idev] CDI.KEYID = 6
1,480,436 UART: [idev] SUBJECT.KEYID = 7
1,480,860 UART: [idev] UDS.KEYID = 0
1,481,205 ready_for_fw is high
1,481,205 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,028 UART: [idev] Erasing UDS.KEYID = 0
1,506,076 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,644 UART: [idev] --
1,515,881 UART: [ldev] ++
1,516,049 UART: [ldev] CDI.KEYID = 6
1,516,412 UART: [ldev] SUBJECT.KEYID = 5
1,516,838 UART: [ldev] AUTHORITY.KEYID = 7
1,517,301 UART: [ldev] FE.KEYID = 1
1,522,585 UART: [ldev] Erasing FE.KEYID = 1
1,547,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,748 UART: [ldev] --
1,587,017 UART: [fwproc] Waiting for Commands...
1,587,662 UART: [fwproc] Received command 0x46574c44
1,588,453 UART: [fwproc] Received Image of size 119428 bytes
2,943,669 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,785 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,003 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,758 >>> mbox cmd response: success
3,144,940 UART: [afmc] ++
3,145,108 UART: [afmc] CDI.KEYID = 6
3,145,470 UART: [afmc] SUBJECT.KEYID = 7
3,145,895 UART: [afmc] AUTHORITY.KEYID = 5
3,181,124 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,484 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,264 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,973 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,856 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,539 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,447 UART: [afmc] --
3,224,449 UART: [cold-reset] --
3,225,379 UART: [state] Locking Datavault
3,226,454 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,058 UART: [state] Locking ICCM
3,227,646 UART: [exit] Launching FMC @ 0x40000130
3,232,976 UART:
3,232,992 UART: Running Caliptra FMC ...
3,233,400 UART:
3,233,454 UART: [state] CFI Enabled
3,243,598 UART: [fht] FMC Alias Private Key: 7
3,362,512 UART: [art] Extend RT PCRs Done
3,362,940 UART: [art] Lock RT PCRs Done
3,364,268 UART: [art] Populate DV Done
3,372,505 UART: [fht] FMC Alias Private Key: 7
3,373,473 UART: [art] Derive CDI
3,373,753 UART: [art] Store in slot 0x4
3,459,453 UART: [art] Derive Key Pair
3,459,813 UART: [art] Store priv key in slot 0x5
3,473,262 UART: [art] Derive Key Pair - Done
3,488,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,770 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,535 UART: [art] PUB.X = FC25A070BEAA79CB6DBF01422941632958CBEE349FE9B1749B7A23C21BB6DC53393A62018FE92E1CFB17C3C6DE614F06
3,511,310 UART: [art] PUB.Y = 5BAA8A5D51015512425CA3C7BF44C709CDA6314B62118885FD0DB2ED768712722E21B6F96980C981B1ABFFAD0599A75A
3,518,254 UART: [art] SIG.R = 6FA1BD438381D5F76B1FDFD9DC05568547859FCF475FAE9D0825D27B85FF584A60817877D46F4A26B22DE61CA5070E83
3,525,018 UART: [art] SIG.S = 406A464B8F391A1134EF5C3D55CFEA38BA3966DA0CAD797CB6B8D445CFFEBA62BFB4A78B1879C6636DD9960DB80FAC2B
3,548,965 UART: Caliptra RT
3,549,216 UART: [state] CFI Enabled
3,669,433 UART: [rt] RT listening for mailbox commands...
3,670,096 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,023 UART: [rt]cmd =0x46504c54, len=4
3,701,105 >>> mbox cmd response data (8 bytes)
3,701,464 UART: [rt] FIPS self test
3,701,792 UART: [kat] ++
3,701,944 UART: [kat] sha1
3,706,138 UART: [kat] SHA2-256
3,708,160 UART: [kat] SHA2-384
3,711,121 UART: [kat] SHA2-512-ACC
3,712,604 UART: Droping operation
3,713,043 UART: Fatal Error: 0x90050003
3,714,582 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,714,587 >>> mbox cmd response: failed
3,714,587 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,714,592 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,537 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,049 UART: [kat] SHA2-256
881,980 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,095 UART: [kat] ++
886,247 UART: [kat] sha1
890,277 UART: [kat] SHA2-256
892,215 UART: [kat] SHA2-384
894,952 UART: [kat] SHA2-512-ACC
896,853 UART: [kat] ECC-384
902,464 UART: [kat] HMAC-384Kdf
907,164 UART: [kat] LMS
1,475,360 UART: [kat] --
1,476,363 UART: [cold-reset] ++
1,476,851 UART: [fht] Storing FHT @ 0x50003400
1,479,602 UART: [idev] ++
1,479,770 UART: [idev] CDI.KEYID = 6
1,480,130 UART: [idev] SUBJECT.KEYID = 7
1,480,554 UART: [idev] UDS.KEYID = 0
1,480,899 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,288 UART: [idev] Erasing UDS.KEYID = 0
1,505,046 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,700 UART: [idev] --
1,514,949 UART: [ldev] ++
1,515,117 UART: [ldev] CDI.KEYID = 6
1,515,480 UART: [ldev] SUBJECT.KEYID = 5
1,515,906 UART: [ldev] AUTHORITY.KEYID = 7
1,516,369 UART: [ldev] FE.KEYID = 1
1,521,853 UART: [ldev] Erasing FE.KEYID = 1
1,546,552 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,548 UART: [ldev] --
1,586,003 UART: [fwproc] Waiting for Commands...
1,586,630 UART: [fwproc] Received command 0x46574c44
1,587,421 UART: [fwproc] Received Image of size 119428 bytes
2,942,241 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,893 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,111 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,662 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,985 ready_for_fw is high
1,361,985 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,322 >>> mbox cmd response: success
3,053,989 UART:
3,054,005 UART: Running Caliptra FMC ...
3,054,413 UART:
3,054,467 UART: [state] CFI Enabled
3,065,007 UART: [fht] FMC Alias Private Key: 7
3,183,999 UART: [art] Extend RT PCRs Done
3,184,427 UART: [art] Lock RT PCRs Done
3,185,993 UART: [art] Populate DV Done
3,194,108 UART: [fht] FMC Alias Private Key: 7
3,195,166 UART: [art] Derive CDI
3,195,446 UART: [art] Store in slot 0x4
3,281,116 UART: [art] Derive Key Pair
3,281,476 UART: [art] Store priv key in slot 0x5
3,294,647 UART: [art] Derive Key Pair - Done
3,309,621 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,517 UART: [art] PUB.X = CB850F86EB70ABBED09F2A3E70069AC5B911A80D4EC9E7487E1D4F740ED4E840B5B314EE211F14B96D700652AFC852C4
3,332,286 UART: [art] PUB.Y = B0F64D4453FBD43A0B29BCE0FC97C8F25867D0BE7601859889268F54DAC78DB67EDC223100A4ED3E8062B0613093635A
3,339,212 UART: [art] SIG.R = C99C8C4E064FE63AE308AEE57D008E5ECC0E255E0D75F177A7355C2862B7DECB96E7A3F0E206B464A39AC29945E20926
3,345,952 UART: [art] SIG.S = 3AE1C8A72BCCFAEECF320889FA110719771AF231BB2776C28A4341AF49D3313CC47F24A5A4CF2D97AAEF03E3DAF9D910
3,369,461 UART: Caliptra RT
3,369,712 UART: [state] CFI Enabled
3,490,352 UART: [rt] RT listening for mailbox commands...
3,491,015 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,602 UART: [rt]cmd =0x46504c54, len=4
3,521,868 >>> mbox cmd response data (8 bytes)
3,522,087 UART: [rt] FIPS self test
3,522,415 UART: [kat] ++
3,522,567 UART: [kat] sha1
3,526,567 UART: [kat] SHA2-256
3,528,589 UART: [kat] SHA2-384
3,531,370 UART: [kat] SHA2-512-ACC
3,532,853 UART: Droping operation
3,533,300 UART: Fatal Error: 0x90050003
3,534,839 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,534,844 >>> mbox cmd response: failed
3,534,844 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,534,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,897 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,756 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,418 UART: [kat] SHA2-256
882,349 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,464 UART: [kat] ++
886,616 UART: [kat] sha1
890,736 UART: [kat] SHA2-256
892,674 UART: [kat] SHA2-384
895,283 UART: [kat] SHA2-512-ACC
897,184 UART: [kat] ECC-384
903,169 UART: [kat] HMAC-384Kdf
907,903 UART: [kat] LMS
1,476,099 UART: [kat] --
1,476,978 UART: [cold-reset] ++
1,477,424 UART: [fht] Storing FHT @ 0x50003400
1,480,173 UART: [idev] ++
1,480,341 UART: [idev] CDI.KEYID = 6
1,480,701 UART: [idev] SUBJECT.KEYID = 7
1,481,125 UART: [idev] UDS.KEYID = 0
1,481,470 ready_for_fw is high
1,481,470 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,819 UART: [idev] Erasing UDS.KEYID = 0
1,505,467 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,015 UART: [idev] --
1,515,078 UART: [ldev] ++
1,515,246 UART: [ldev] CDI.KEYID = 6
1,515,609 UART: [ldev] SUBJECT.KEYID = 5
1,516,035 UART: [ldev] AUTHORITY.KEYID = 7
1,516,498 UART: [ldev] FE.KEYID = 1
1,521,688 UART: [ldev] Erasing FE.KEYID = 1
1,547,189 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,197 UART: [ldev] --
1,586,654 UART: [fwproc] Waiting for Commands...
1,587,317 UART: [fwproc] Received command 0x46574c44
1,588,108 UART: [fwproc] Received Image of size 119428 bytes
2,943,790 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,286 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,504 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,187 >>> mbox cmd response: success
3,144,431 UART: [afmc] ++
3,144,599 UART: [afmc] CDI.KEYID = 6
3,144,961 UART: [afmc] SUBJECT.KEYID = 7
3,145,386 UART: [afmc] AUTHORITY.KEYID = 5
3,180,519 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,637 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,417 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,126 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,009 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,692 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,486 UART: [afmc] --
3,223,568 UART: [cold-reset] --
3,224,350 UART: [state] Locking Datavault
3,225,503 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,107 UART: [state] Locking ICCM
3,226,541 UART: [exit] Launching FMC @ 0x40000130
3,231,871 UART:
3,231,887 UART: Running Caliptra FMC ...
3,232,295 UART:
3,232,438 UART: [state] CFI Enabled
3,242,844 UART: [fht] FMC Alias Private Key: 7
3,361,300 UART: [art] Extend RT PCRs Done
3,361,728 UART: [art] Lock RT PCRs Done
3,363,368 UART: [art] Populate DV Done
3,371,693 UART: [fht] FMC Alias Private Key: 7
3,372,697 UART: [art] Derive CDI
3,372,977 UART: [art] Store in slot 0x4
3,458,735 UART: [art] Derive Key Pair
3,459,095 UART: [art] Store priv key in slot 0x5
3,473,016 UART: [art] Derive Key Pair - Done
3,487,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,903 UART: [art] PUB.X = F89A413A6BA646F4DD894EE0E58A2BA42C172106DB508ED24BC9A3DB17FC93F9DAF6C9C3E4C7C0D6E1401A723481C89E
3,510,688 UART: [art] PUB.Y = 582ACFDE7EAD7150F8C073954DC174A38FFFBB8D4884568FD02921A6522F88A0F71C6FE827D36F3537A661BCA3C7123C
3,517,648 UART: [art] SIG.R = BCE57BF851D7E824652D2703C02B0A7EAD034A300C1074F9E0DE667D8840955C90845A4A7FACFBC1636BB7345361566F
3,524,410 UART: [art] SIG.S = 02639B31DBB422ECC1F8FD99C4F5966B05BCEA15539EEB5777107B4E69C83930413FBA1F04A41CD8B7444CB571989E50
3,548,643 UART: Caliptra RT
3,548,986 UART: [state] CFI Enabled
3,669,110 UART: [rt] RT listening for mailbox commands...
3,669,773 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,628 UART: [rt]cmd =0x46504c54, len=4
3,700,800 >>> mbox cmd response data (8 bytes)
3,701,129 UART: [rt] FIPS self test
3,701,457 UART: [kat] ++
3,701,609 UART: [kat] sha1
3,705,881 UART: [kat] SHA2-256
3,707,903 UART: [kat] SHA2-384
3,710,950 UART: [kat] SHA2-512-ACC
3,712,433 UART: Droping operation
3,713,046 UART: Fatal Error: 0x90050003
3,714,585 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,714,590 >>> mbox cmd response: failed
3,714,590 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,714,595 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,232 UART: [kat] SHA2-256
882,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,278 UART: [kat] ++
886,430 UART: [kat] sha1
890,806 UART: [kat] SHA2-256
892,744 UART: [kat] SHA2-384
895,431 UART: [kat] SHA2-512-ACC
897,332 UART: [kat] ECC-384
903,205 UART: [kat] HMAC-384Kdf
907,767 UART: [kat] LMS
1,475,963 UART: [kat] --
1,476,732 UART: [cold-reset] ++
1,477,206 UART: [fht] Storing FHT @ 0x50003400
1,480,125 UART: [idev] ++
1,480,293 UART: [idev] CDI.KEYID = 6
1,480,653 UART: [idev] SUBJECT.KEYID = 7
1,481,077 UART: [idev] UDS.KEYID = 0
1,481,422 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,883 UART: [idev] Erasing UDS.KEYID = 0
1,505,417 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,109 UART: [idev] --
1,515,138 UART: [ldev] ++
1,515,306 UART: [ldev] CDI.KEYID = 6
1,515,669 UART: [ldev] SUBJECT.KEYID = 5
1,516,095 UART: [ldev] AUTHORITY.KEYID = 7
1,516,558 UART: [ldev] FE.KEYID = 1
1,521,974 UART: [ldev] Erasing FE.KEYID = 1
1,547,265 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,367 UART: [ldev] --
1,586,870 UART: [fwproc] Waiting for Commands...
1,587,697 UART: [fwproc] Received command 0x46574c44
1,588,488 UART: [fwproc] Received Image of size 119428 bytes
2,943,148 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,912 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,130 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,663 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,406 ready_for_fw is high
1,363,406 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,403 >>> mbox cmd response: success
3,054,860 UART:
3,054,876 UART: Running Caliptra FMC ...
3,055,284 UART:
3,055,427 UART: [state] CFI Enabled
3,066,123 UART: [fht] FMC Alias Private Key: 7
3,184,649 UART: [art] Extend RT PCRs Done
3,185,077 UART: [art] Lock RT PCRs Done
3,186,759 UART: [art] Populate DV Done
3,195,048 UART: [fht] FMC Alias Private Key: 7
3,196,176 UART: [art] Derive CDI
3,196,456 UART: [art] Store in slot 0x4
3,282,476 UART: [art] Derive Key Pair
3,282,836 UART: [art] Store priv key in slot 0x5
3,296,219 UART: [art] Derive Key Pair - Done
3,311,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,420 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,185 UART: [art] PUB.X = 2A8BF4DFD3CB0E294E5B02D6C1836B1A1ADAAD4248C12E59E048AF9BB494013921AC8E3BDCE746E9D9185062B600AC29
3,333,940 UART: [art] PUB.Y = 3812E71BF9445E44C0A6023D4BC54F83D0003AAB56B05217FE86134078522BD167A1CA8D4B40EC2AC2641B93BABDE6A3
3,340,873 UART: [art] SIG.R = CB99678F42DD1FEEAB99BB2807610F8BCDDE56BE530FA036ADF5BA0D64BE17C9C1871D08C855EE19A2A448444164CE04
3,347,643 UART: [art] SIG.S = A17DB127BD16F418F3A4ED77CB2137D216BDFBC9F4F570377100098EF0CDC53AF973E58B6412073AAD1976AD9AB710F4
3,370,999 UART: Caliptra RT
3,371,342 UART: [state] CFI Enabled
3,491,291 UART: [rt] RT listening for mailbox commands...
3,491,954 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,643 UART: [rt]cmd =0x46504c54, len=4
3,522,797 >>> mbox cmd response data (8 bytes)
3,522,986 UART: [rt] FIPS self test
3,523,314 UART: [kat] ++
3,523,466 UART: [kat] sha1
3,527,710 UART: [kat] SHA2-256
3,529,732 UART: [kat] SHA2-384
3,532,771 UART: [kat] SHA2-512-ACC
3,534,254 UART: Droping operation
3,534,725 UART: Fatal Error: 0x90050003
3,536,264 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,269 >>> mbox cmd response: failed
3,536,269 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,670 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,165 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
891,438 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
915,925 UART: [kat] HMAC-384Kdf
920,633 UART: [kat] LMS
1,168,945 UART: [kat] --
1,170,058 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,352 UART: [idev] ++
1,173,520 UART: [idev] CDI.KEYID = 6
1,173,881 UART: [idev] SUBJECT.KEYID = 7
1,174,306 UART: [idev] UDS.KEYID = 0
1,174,652 ready_for_fw is high
1,174,652 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,245 UART: [idev] Erasing UDS.KEYID = 0
1,198,977 UART: [idev] Sha1 KeyId Algorithm
1,207,797 UART: [idev] --
1,208,712 UART: [ldev] ++
1,208,880 UART: [ldev] CDI.KEYID = 6
1,209,244 UART: [ldev] SUBJECT.KEYID = 5
1,209,671 UART: [ldev] AUTHORITY.KEYID = 7
1,210,134 UART: [ldev] FE.KEYID = 1
1,215,498 UART: [ldev] Erasing FE.KEYID = 1
1,241,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,708 UART: [ldev] --
1,281,023 UART: [fwproc] Wait for Commands...
1,281,798 UART: [fwproc] Recv command 0x46574c44
1,282,531 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,079 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,254 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,767 >>> mbox cmd response: success
2,837,859 UART: [afmc] ++
2,838,027 UART: [afmc] CDI.KEYID = 6
2,838,390 UART: [afmc] SUBJECT.KEYID = 7
2,838,816 UART: [afmc] AUTHORITY.KEYID = 5
2,874,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,567 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,277 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,158 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,859 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,558 UART: [afmc] --
2,917,369 UART: [cold-reset] --
2,918,331 UART: [state] Locking Datavault
2,919,562 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,166 UART: [state] Locking ICCM
2,920,704 UART: [exit] Launching FMC @ 0x40000130
2,926,034 UART:
2,926,050 UART: Running Caliptra FMC ...
2,926,458 UART:
2,926,512 UART: [state] CFI Enabled
2,937,288 UART: [fht] FMC Alias Private Key: 7
3,056,988 UART: [art] Extend RT PCRs Done
3,057,416 UART: [art] Lock RT PCRs Done
3,058,910 UART: [art] Populate DV Done
3,067,251 UART: [fht] FMC Alias Private Key: 7
3,068,385 UART: [art] Derive CDI
3,068,665 UART: [art] Store in slot 0x4
3,153,972 UART: [art] Derive Key Pair
3,154,332 UART: [art] Store priv key in slot 0x5
3,167,334 UART: [art] Derive Key Pair - Done
3,182,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,152 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,917 UART: [art] PUB.X = 8BEF38329754E58AF3E267C761AC13A58E709AE305751C41555069F8915ADBFD0BA582F9EF618FB0E0BA2FE08EA20A1D
3,205,690 UART: [art] PUB.Y = 51FE9D0C80305A197EA96CCBBA2A81DB48E0AD8A28EBAB9BA8A3455A9501A03C9D062D931451EDEF492F393BF71A99E6
3,212,649 UART: [art] SIG.R = 2FFB9DC49F2AD82492841585FE3961F67912150C75584846FB0CE58440B6BFBC7DCCC6F4C86DBEB9D4DC31AEA14D1E47
3,219,429 UART: [art] SIG.S = 805850E3611B989FAA9C56AD6037EB469E3067CA73FBC2C413963CE473E93B7BC90B97A584C139143D8853ABA6B2E1C6
3,243,576 UART: Caliptra RT
3,243,827 UART: [state] CFI Enabled
3,362,378 UART: [rt] RT listening for mailbox commands...
3,363,041 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,086 UART: [rt]cmd =0x46504c54, len=4
3,394,242 >>> mbox cmd response data (8 bytes)
3,394,401 UART: [rt] FIPS self test
3,394,729 UART: [kat] ++
3,394,881 UART: [kat] sha1
3,399,247 UART: [kat] SHA2-256
3,401,269 UART: [kat] SHA2-384
3,403,978 UART: [kat] SHA2-512-ACC
3,405,461 UART: Droping operation
3,405,922 UART: Fatal Error: 0x90050003
3,407,461 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,466 >>> mbox cmd response: failed
3,407,466 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,242 UART: [kat] ++
895,394 UART: [kat] sha1
899,464 UART: [kat] SHA2-256
901,404 UART: [kat] SHA2-384
904,017 UART: [kat] SHA2-512-ACC
905,918 UART: [kat] ECC-384
915,751 UART: [kat] HMAC-384Kdf
920,437 UART: [kat] LMS
1,168,749 UART: [kat] --
1,169,742 UART: [cold-reset] ++
1,170,216 UART: [fht] FHT @ 0x50003400
1,172,968 UART: [idev] ++
1,173,136 UART: [idev] CDI.KEYID = 6
1,173,497 UART: [idev] SUBJECT.KEYID = 7
1,173,922 UART: [idev] UDS.KEYID = 0
1,174,268 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,011 UART: [idev] Erasing UDS.KEYID = 0
1,199,137 UART: [idev] Sha1 KeyId Algorithm
1,208,147 UART: [idev] --
1,209,272 UART: [ldev] ++
1,209,440 UART: [ldev] CDI.KEYID = 6
1,209,804 UART: [ldev] SUBJECT.KEYID = 5
1,210,231 UART: [ldev] AUTHORITY.KEYID = 7
1,210,694 UART: [ldev] FE.KEYID = 1
1,215,930 UART: [ldev] Erasing FE.KEYID = 1
1,242,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,090 UART: [ldev] --
1,281,481 UART: [fwproc] Wait for Commands...
1,282,104 UART: [fwproc] Recv command 0x46574c44
1,282,837 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,607 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,782 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,335 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,814 ready_for_fw is high
1,059,814 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,050 >>> mbox cmd response: success
2,750,927 UART:
2,750,943 UART: Running Caliptra FMC ...
2,751,351 UART:
2,751,405 UART: [state] CFI Enabled
2,762,009 UART: [fht] FMC Alias Private Key: 7
2,881,251 UART: [art] Extend RT PCRs Done
2,881,679 UART: [art] Lock RT PCRs Done
2,883,667 UART: [art] Populate DV Done
2,891,678 UART: [fht] FMC Alias Private Key: 7
2,892,632 UART: [art] Derive CDI
2,892,912 UART: [art] Store in slot 0x4
2,978,513 UART: [art] Derive Key Pair
2,978,873 UART: [art] Store priv key in slot 0x5
2,991,703 UART: [art] Derive Key Pair - Done
3,006,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,955 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,720 UART: [art] PUB.X = CB54603DEE09CB2C895E677E65C82B58CC865E72D4DE890E4CA111B9DE033FD691007B0D05C2CB5BB319FDC84B5147BF
3,029,469 UART: [art] PUB.Y = D2D7303BAD234AE4C94187A024F90B71B07FE2B4516DB3696C9802DE718DC7F3E4124984484EC0D60C809E30B899957E
3,036,410 UART: [art] SIG.R = 7EDCE704B601FA15BE67B061C6FD85CBC6F694CB951BC6B81A86BBB4B693CA1F934AF99D1C7835BD4788AD69A9E287FC
3,043,196 UART: [art] SIG.S = 4E8DCCAECAAFD7AF61085DC6AAFF83A689BD7896526F6CE362FA71AC2679D564C3FB1C6135971C0037DAF12305B56903
3,067,463 UART: Caliptra RT
3,067,714 UART: [state] CFI Enabled
3,187,038 UART: [rt] RT listening for mailbox commands...
3,187,701 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,304 UART: [rt]cmd =0x46504c54, len=4
3,218,450 >>> mbox cmd response data (8 bytes)
3,218,757 UART: [rt] FIPS self test
3,219,085 UART: [kat] ++
3,219,237 UART: [kat] sha1
3,223,543 UART: [kat] SHA2-256
3,225,565 UART: [kat] SHA2-384
3,228,396 UART: [kat] SHA2-512-ACC
3,229,879 UART: Droping operation
3,230,488 UART: Fatal Error: 0x90050003
3,232,027 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,032 >>> mbox cmd response: failed
3,232,032 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,037 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,770 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,376 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,565 UART: [kat] ++
895,717 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
916,170 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,169,749 UART: [cold-reset] ++
1,170,317 UART: [fht] FHT @ 0x50003400
1,172,969 UART: [idev] ++
1,173,137 UART: [idev] CDI.KEYID = 6
1,173,498 UART: [idev] SUBJECT.KEYID = 7
1,173,923 UART: [idev] UDS.KEYID = 0
1,174,269 ready_for_fw is high
1,174,269 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,808 UART: [idev] Erasing UDS.KEYID = 0
1,198,856 UART: [idev] Sha1 KeyId Algorithm
1,207,750 UART: [idev] --
1,208,939 UART: [ldev] ++
1,209,107 UART: [ldev] CDI.KEYID = 6
1,209,471 UART: [ldev] SUBJECT.KEYID = 5
1,209,898 UART: [ldev] AUTHORITY.KEYID = 7
1,210,361 UART: [ldev] FE.KEYID = 1
1,215,591 UART: [ldev] Erasing FE.KEYID = 1
1,241,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,099 UART: [ldev] --
1,281,386 UART: [fwproc] Wait for Commands...
1,282,043 UART: [fwproc] Recv command 0x46574c44
1,282,776 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,980 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,155 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,860 >>> mbox cmd response: success
2,837,954 UART: [afmc] ++
2,838,122 UART: [afmc] CDI.KEYID = 6
2,838,485 UART: [afmc] SUBJECT.KEYID = 7
2,838,911 UART: [afmc] AUTHORITY.KEYID = 5
2,874,110 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,630 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,340 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,221 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,922 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,669 UART: [afmc] --
2,917,552 UART: [cold-reset] --
2,918,500 UART: [state] Locking Datavault
2,919,647 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,251 UART: [state] Locking ICCM
2,920,707 UART: [exit] Launching FMC @ 0x40000130
2,926,037 UART:
2,926,053 UART: Running Caliptra FMC ...
2,926,461 UART:
2,926,604 UART: [state] CFI Enabled
2,937,330 UART: [fht] FMC Alias Private Key: 7
3,056,652 UART: [art] Extend RT PCRs Done
3,057,080 UART: [art] Lock RT PCRs Done
3,058,562 UART: [art] Populate DV Done
3,067,053 UART: [fht] FMC Alias Private Key: 7
3,068,053 UART: [art] Derive CDI
3,068,333 UART: [art] Store in slot 0x4
3,154,318 UART: [art] Derive Key Pair
3,154,678 UART: [art] Store priv key in slot 0x5
3,168,280 UART: [art] Derive Key Pair - Done
3,182,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,208 UART: [art] PUB.X = A0ECB89DCDD353C8A97277AC94C87D8DC27BBCD492BB1EEE39CDE698B010718721155CE3711106D0539453A5432191F5
3,205,981 UART: [art] PUB.Y = D65836948A40B451D0D5E52F74EC43C3DB71F1E1FB3D011DF9FC71C6784D468E82641DBF1E90D91CE55BA8300AD3CE43
3,212,937 UART: [art] SIG.R = 84E4390737B28AA89F5E7B4D04F833AF23F30D19DB7A59D53A4D779E6DD54677B5BB02FE5E42F4724E048D7093CB13E3
3,219,698 UART: [art] SIG.S = 1AFA20A74B1589053B313E2029F443205DD6B27E309A5534D7E9BCF581C0B6A07ED7B80E0E37AC33D14F01CF40CEE2B1
3,243,366 UART: Caliptra RT
3,243,709 UART: [state] CFI Enabled
3,363,470 UART: [rt] RT listening for mailbox commands...
3,364,133 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,824 UART: [rt]cmd =0x46504c54, len=4
3,394,930 >>> mbox cmd response data (8 bytes)
3,395,199 UART: [rt] FIPS self test
3,395,527 UART: [kat] ++
3,395,679 UART: [kat] sha1
3,399,699 UART: [kat] SHA2-256
3,401,721 UART: [kat] SHA2-384
3,404,490 UART: [kat] SHA2-512-ACC
3,405,973 UART: Droping operation
3,406,462 UART: Fatal Error: 0x90050003
3,408,001 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,006 >>> mbox cmd response: failed
3,408,006 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,811 UART: [state] LifecycleState = Unprovisioned
85,466 UART: [state] DebugLocked = No
86,002 UART: [state] WD Timer not started. Device not locked for debugging
87,161 UART: [kat] SHA2-256
890,711 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,815 UART: [kat] ++
894,967 UART: [kat] sha1
899,233 UART: [kat] SHA2-256
901,173 UART: [kat] SHA2-384
903,868 UART: [kat] SHA2-512-ACC
905,769 UART: [kat] ECC-384
915,090 UART: [kat] HMAC-384Kdf
919,702 UART: [kat] LMS
1,168,014 UART: [kat] --
1,168,839 UART: [cold-reset] ++
1,169,365 UART: [fht] FHT @ 0x50003400
1,172,047 UART: [idev] ++
1,172,215 UART: [idev] CDI.KEYID = 6
1,172,576 UART: [idev] SUBJECT.KEYID = 7
1,173,001 UART: [idev] UDS.KEYID = 0
1,173,347 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,180,808 UART: [idev] Erasing UDS.KEYID = 0
1,198,070 UART: [idev] Sha1 KeyId Algorithm
1,206,774 UART: [idev] --
1,207,919 UART: [ldev] ++
1,208,087 UART: [ldev] CDI.KEYID = 6
1,208,451 UART: [ldev] SUBJECT.KEYID = 5
1,208,878 UART: [ldev] AUTHORITY.KEYID = 7
1,209,341 UART: [ldev] FE.KEYID = 1
1,214,489 UART: [ldev] Erasing FE.KEYID = 1
1,240,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,303 UART: [ldev] --
1,279,722 UART: [fwproc] Wait for Commands...
1,280,387 UART: [fwproc] Recv command 0x46574c44
1,281,120 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,720 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,895 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,474 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,645 ready_for_fw is high
1,059,645 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,073 >>> mbox cmd response: success
2,753,062 UART:
2,753,078 UART: Running Caliptra FMC ...
2,753,486 UART:
2,753,629 UART: [state] CFI Enabled
2,764,487 UART: [fht] FMC Alias Private Key: 7
2,883,757 UART: [art] Extend RT PCRs Done
2,884,185 UART: [art] Lock RT PCRs Done
2,885,177 UART: [art] Populate DV Done
2,893,142 UART: [fht] FMC Alias Private Key: 7
2,894,294 UART: [art] Derive CDI
2,894,574 UART: [art] Store in slot 0x4
2,980,329 UART: [art] Derive Key Pair
2,980,689 UART: [art] Store priv key in slot 0x5
2,993,357 UART: [art] Derive Key Pair - Done
3,008,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,995 UART: [art] PUB.X = 9AF3121A2D274BEB420A789496AF0059F14E267EA5DCF8F4928F015B544010E33995718A59B5407D473E96060993B9C6
3,030,723 UART: [art] PUB.Y = 19395876D61B403AD87D625B8131AD7D56E34314D01F284FCE52D672922FA48B12579DF16E5CBF237F83FF5FE64BB082
3,037,675 UART: [art] SIG.R = 65509BCCDA50D05A8BA5BC5E4EFB6547FBECD66275F5A8B287AA9E402241D0F2C4588D376782AD5A9284F854D1E13B06
3,044,454 UART: [art] SIG.S = 04FFDC093E3BF3A83D42DB57C0CFC1B466766D6E13277FF3A913916F78C932D8D3B3E019ACDBA061FC51FAA216C7E8F5
3,067,878 UART: Caliptra RT
3,068,221 UART: [state] CFI Enabled
3,187,857 UART: [rt] RT listening for mailbox commands...
3,188,520 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,501 UART: [rt]cmd =0x46504c54, len=4
3,219,525 >>> mbox cmd response data (8 bytes)
3,219,826 UART: [rt] FIPS self test
3,220,154 UART: [kat] ++
3,220,306 UART: [kat] sha1
3,224,482 UART: [kat] SHA2-256
3,226,504 UART: [kat] SHA2-384
3,229,343 UART: [kat] SHA2-512-ACC
3,230,826 UART: Droping operation
3,231,295 UART: Fatal Error: 0x90050003
3,232,834 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,839 >>> mbox cmd response: failed
3,232,839 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,844 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,209 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,215 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
893,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,397 UART: [kat] ++
897,549 UART: [kat] sha1
901,661 UART: [kat] SHA2-256
903,601 UART: [kat] SHA2-384
906,414 UART: [kat] SHA2-512-ACC
908,315 UART: [kat] ECC-384
918,292 UART: [kat] HMAC-384Kdf
922,848 UART: [kat] LMS
1,171,176 UART: [kat] --
1,171,957 UART: [cold-reset] ++
1,172,333 UART: [fht] FHT @ 0x50003400
1,175,028 UART: [idev] ++
1,175,196 UART: [idev] CDI.KEYID = 6
1,175,556 UART: [idev] SUBJECT.KEYID = 7
1,175,980 UART: [idev] UDS.KEYID = 0
1,176,325 ready_for_fw is high
1,176,325 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,072 UART: [idev] Erasing UDS.KEYID = 0
1,200,731 UART: [idev] Sha1 KeyId Algorithm
1,209,057 UART: [idev] --
1,210,069 UART: [ldev] ++
1,210,237 UART: [ldev] CDI.KEYID = 6
1,210,600 UART: [ldev] SUBJECT.KEYID = 5
1,211,026 UART: [ldev] AUTHORITY.KEYID = 7
1,211,489 UART: [ldev] FE.KEYID = 1
1,216,843 UART: [ldev] Erasing FE.KEYID = 1
1,243,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,057 UART: [ldev] --
1,282,572 UART: [fwproc] Wait for Commands...
1,283,326 UART: [fwproc] Recv command 0x46574c44
1,284,054 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,190 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,360 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,013 >>> mbox cmd response: success
2,839,129 UART: [afmc] ++
2,839,297 UART: [afmc] CDI.KEYID = 6
2,839,659 UART: [afmc] SUBJECT.KEYID = 7
2,840,084 UART: [afmc] AUTHORITY.KEYID = 5
2,875,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,564 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,273 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,156 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,857 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,625 UART: [afmc] --
2,918,703 UART: [cold-reset] --
2,919,613 UART: [state] Locking Datavault
2,920,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,534 UART: [state] Locking ICCM
2,922,068 UART: [exit] Launching FMC @ 0x40000130
2,927,398 UART:
2,927,414 UART: Running Caliptra FMC ...
2,927,822 UART:
2,927,876 UART: [state] CFI Enabled
2,938,204 UART: [fht] FMC Alias Private Key: 7
3,058,134 UART: [art] Extend RT PCRs Done
3,058,562 UART: [art] Lock RT PCRs Done
3,060,018 UART: [art] Populate DV Done
3,068,263 UART: [fht] FMC Alias Private Key: 7
3,069,195 UART: [art] Derive CDI
3,069,475 UART: [art] Store in slot 0x4
3,155,230 UART: [art] Derive Key Pair
3,155,590 UART: [art] Store priv key in slot 0x5
3,168,132 UART: [art] Derive Key Pair - Done
3,182,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,687 UART: [art] PUB.X = 2D01949679967CDF86FD0D2E442701981986DFEB005E5BBE08F001FF53446D988656C6F068C6D3D3FAE42B7F3DC7090A
3,205,418 UART: [art] PUB.Y = D94D19283793E18527DFA826D1AC7E587DA2A9D216842CF1A12B44F1386D3F14E918DB4D24D6346AC7BDDDB6AFABE766
3,212,382 UART: [art] SIG.R = 33D7212507DC937BE39EE3BA78E1E8511A0A4F05FD19F7CBCA913C4D5BF342EE3F4F49809A92DDA55E097A37BD1B799C
3,219,156 UART: [art] SIG.S = 818E19A218906DE005D61DF30CF1605E55FAE333C7272B25DB49EB1A2D950D5E04D074FF726B1E003C17E40C693BF2D9
3,242,675 UART: Caliptra RT
3,242,926 UART: [state] CFI Enabled
3,362,311 UART: [rt] RT listening for mailbox commands...
3,362,974 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,681 UART: [rt]cmd =0x46504c54, len=4
3,393,921 >>> mbox cmd response data (8 bytes)
3,394,136 UART: [rt] FIPS self test
3,394,464 UART: [kat] ++
3,394,616 UART: [kat] sha1
3,398,888 UART: [kat] SHA2-256
3,400,910 UART: [kat] SHA2-384
3,403,671 UART: [kat] SHA2-512-ACC
3,405,154 UART: Droping operation
3,405,651 UART: Fatal Error: 0x90050003
3,407,190 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,195 >>> mbox cmd response: failed
3,407,195 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,200 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
892,996 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,121 UART: [kat] ++
897,273 UART: [kat] sha1
901,451 UART: [kat] SHA2-256
903,391 UART: [kat] SHA2-384
906,136 UART: [kat] SHA2-512-ACC
908,037 UART: [kat] ECC-384
917,898 UART: [kat] HMAC-384Kdf
922,582 UART: [kat] LMS
1,170,910 UART: [kat] --
1,171,815 UART: [cold-reset] ++
1,172,159 UART: [fht] FHT @ 0x50003400
1,174,818 UART: [idev] ++
1,174,986 UART: [idev] CDI.KEYID = 6
1,175,346 UART: [idev] SUBJECT.KEYID = 7
1,175,770 UART: [idev] UDS.KEYID = 0
1,176,115 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,936 UART: [idev] Erasing UDS.KEYID = 0
1,200,579 UART: [idev] Sha1 KeyId Algorithm
1,208,979 UART: [idev] --
1,210,019 UART: [ldev] ++
1,210,187 UART: [ldev] CDI.KEYID = 6
1,210,550 UART: [ldev] SUBJECT.KEYID = 5
1,210,976 UART: [ldev] AUTHORITY.KEYID = 7
1,211,439 UART: [ldev] FE.KEYID = 1
1,216,661 UART: [ldev] Erasing FE.KEYID = 1
1,242,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,997 UART: [ldev] --
1,281,300 UART: [fwproc] Wait for Commands...
1,281,986 UART: [fwproc] Recv command 0x46574c44
1,282,714 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,308 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,478 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,001 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,183 ready_for_fw is high
1,060,183 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,974 >>> mbox cmd response: success
2,753,761 UART:
2,753,777 UART: Running Caliptra FMC ...
2,754,185 UART:
2,754,239 UART: [state] CFI Enabled
2,764,675 UART: [fht] FMC Alias Private Key: 7
2,884,319 UART: [art] Extend RT PCRs Done
2,884,747 UART: [art] Lock RT PCRs Done
2,886,223 UART: [art] Populate DV Done
2,894,488 UART: [fht] FMC Alias Private Key: 7
2,895,650 UART: [art] Derive CDI
2,895,930 UART: [art] Store in slot 0x4
2,981,497 UART: [art] Derive Key Pair
2,981,857 UART: [art] Store priv key in slot 0x5
2,994,759 UART: [art] Derive Key Pair - Done
3,009,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,741 UART: [art] PUB.X = A2B4EBC8A11CB0CC99AE813C1F08872CF4238D4825DEB829B8B50D420ACDC033EF0DF0BDD29D2EB2B2BEF87F0B2D8B8E
3,032,526 UART: [art] PUB.Y = AA239929403F43BAE7E9E590C639BCC9D3344CB2AD659C0F08EF02CE5C153885CE75BAA59EA520640A2FCC4DA89C0DC0
3,039,479 UART: [art] SIG.R = 32A6A2EDD54111F9EABCA8F584BA9C1DFA5710FE5770D50DED642529A22FEB4782F39A3C5D4432B32C116A7314B28DAC
3,046,262 UART: [art] SIG.S = 7DE35685A9A5593BF1F938AC1791A2F46F3EF46EBD52F76D53363D3B6CE4F6CD4689367074CE3E9273BB38F1C09725A5
3,069,704 UART: Caliptra RT
3,069,955 UART: [state] CFI Enabled
3,189,961 UART: [rt] RT listening for mailbox commands...
3,190,624 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,679 UART: [rt]cmd =0x46504c54, len=4
3,221,675 >>> mbox cmd response data (8 bytes)
3,222,030 UART: [rt] FIPS self test
3,222,358 UART: [kat] ++
3,222,510 UART: [kat] sha1
3,226,774 UART: [kat] SHA2-256
3,228,796 UART: [kat] SHA2-384
3,231,525 UART: [kat] SHA2-512-ACC
3,233,008 UART: Droping operation
3,233,519 UART: Fatal Error: 0x90050003
3,235,058 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,063 >>> mbox cmd response: failed
3,235,063 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,068 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,811 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,668 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,537 UART: [kat] SHA2-256
893,187 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,312 UART: [kat] ++
897,464 UART: [kat] sha1
901,892 UART: [kat] SHA2-256
903,832 UART: [kat] SHA2-384
906,687 UART: [kat] SHA2-512-ACC
908,588 UART: [kat] ECC-384
918,119 UART: [kat] HMAC-384Kdf
922,753 UART: [kat] LMS
1,171,081 UART: [kat] --
1,171,952 UART: [cold-reset] ++
1,172,382 UART: [fht] FHT @ 0x50003400
1,174,989 UART: [idev] ++
1,175,157 UART: [idev] CDI.KEYID = 6
1,175,517 UART: [idev] SUBJECT.KEYID = 7
1,175,941 UART: [idev] UDS.KEYID = 0
1,176,286 ready_for_fw is high
1,176,286 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,813 UART: [idev] Erasing UDS.KEYID = 0
1,200,902 UART: [idev] Sha1 KeyId Algorithm
1,209,522 UART: [idev] --
1,210,640 UART: [ldev] ++
1,210,808 UART: [ldev] CDI.KEYID = 6
1,211,171 UART: [ldev] SUBJECT.KEYID = 5
1,211,597 UART: [ldev] AUTHORITY.KEYID = 7
1,212,060 UART: [ldev] FE.KEYID = 1
1,217,152 UART: [ldev] Erasing FE.KEYID = 1
1,243,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,352 UART: [ldev] --
1,282,793 UART: [fwproc] Wait for Commands...
1,283,483 UART: [fwproc] Recv command 0x46574c44
1,284,211 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,547 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,717 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,226 >>> mbox cmd response: success
2,840,476 UART: [afmc] ++
2,840,644 UART: [afmc] CDI.KEYID = 6
2,841,006 UART: [afmc] SUBJECT.KEYID = 7
2,841,431 UART: [afmc] AUTHORITY.KEYID = 5
2,876,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,817 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,526 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,409 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,110 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,024 UART: [afmc] --
2,919,926 UART: [cold-reset] --
2,920,666 UART: [state] Locking Datavault
2,922,083 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,687 UART: [state] Locking ICCM
2,923,261 UART: [exit] Launching FMC @ 0x40000130
2,928,591 UART:
2,928,607 UART: Running Caliptra FMC ...
2,929,015 UART:
2,929,158 UART: [state] CFI Enabled
2,939,662 UART: [fht] FMC Alias Private Key: 7
3,058,640 UART: [art] Extend RT PCRs Done
3,059,068 UART: [art] Lock RT PCRs Done
3,060,712 UART: [art] Populate DV Done
3,069,125 UART: [fht] FMC Alias Private Key: 7
3,070,305 UART: [art] Derive CDI
3,070,585 UART: [art] Store in slot 0x4
3,156,686 UART: [art] Derive Key Pair
3,157,046 UART: [art] Store priv key in slot 0x5
3,169,936 UART: [art] Derive Key Pair - Done
3,184,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,982 UART: [art] PUB.X = 0B82EF91567DC9AC679D2C2AC10B5B346FF239378BD738B83446EDF403B20ED85D42E3176DEEE6ED4C0BA1BF09FD95A2
3,207,752 UART: [art] PUB.Y = A3B22DF39BA00C308500727066E32DB44015BC5C5F6DF2B212632DDE38006BEADE3AB74E63894EC8A405334CF0DEE7DB
3,214,666 UART: [art] SIG.R = 8874DF99957E59E5A8847EF897196930B8231BA8D350AAFC99314D90B8837C8F00E785649F229220970DB35268F18F11
3,221,399 UART: [art] SIG.S = 1E13A7E8D50812AA7AD562C3A9FE3F77D709F235BD61AB3AC50212500515D662599863F4F2B84CBD66148C8FB5465121
3,245,359 UART: Caliptra RT
3,245,702 UART: [state] CFI Enabled
3,365,417 UART: [rt] RT listening for mailbox commands...
3,366,080 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,023 UART: [rt]cmd =0x46504c54, len=4
3,397,281 >>> mbox cmd response data (8 bytes)
3,397,648 UART: [rt] FIPS self test
3,397,976 UART: [kat] ++
3,398,128 UART: [kat] sha1
3,402,478 UART: [kat] SHA2-256
3,404,500 UART: [kat] SHA2-384
3,407,225 UART: [kat] SHA2-512-ACC
3,408,708 UART: Droping operation
3,409,187 UART: Fatal Error: 0x90050003
3,410,726 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,731 >>> mbox cmd response: failed
3,410,731 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,736 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
893,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,540 UART: [kat] ++
897,692 UART: [kat] sha1
901,778 UART: [kat] SHA2-256
903,718 UART: [kat] SHA2-384
906,429 UART: [kat] SHA2-512-ACC
908,330 UART: [kat] ECC-384
918,219 UART: [kat] HMAC-384Kdf
923,023 UART: [kat] LMS
1,171,351 UART: [kat] --
1,172,236 UART: [cold-reset] ++
1,172,748 UART: [fht] FHT @ 0x50003400
1,175,411 UART: [idev] ++
1,175,579 UART: [idev] CDI.KEYID = 6
1,175,939 UART: [idev] SUBJECT.KEYID = 7
1,176,363 UART: [idev] UDS.KEYID = 0
1,176,708 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,689 UART: [idev] Erasing UDS.KEYID = 0
1,201,534 UART: [idev] Sha1 KeyId Algorithm
1,209,902 UART: [idev] --
1,211,056 UART: [ldev] ++
1,211,224 UART: [ldev] CDI.KEYID = 6
1,211,587 UART: [ldev] SUBJECT.KEYID = 5
1,212,013 UART: [ldev] AUTHORITY.KEYID = 7
1,212,476 UART: [ldev] FE.KEYID = 1
1,217,800 UART: [ldev] Erasing FE.KEYID = 1
1,244,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,062 UART: [ldev] --
1,284,329 UART: [fwproc] Wait for Commands...
1,284,951 UART: [fwproc] Recv command 0x46574c44
1,285,679 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,385 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,555 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,078 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,886 ready_for_fw is high
1,060,886 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,107 >>> mbox cmd response: success
2,753,514 UART:
2,753,530 UART: Running Caliptra FMC ...
2,753,938 UART:
2,754,081 UART: [state] CFI Enabled
2,764,429 UART: [fht] FMC Alias Private Key: 7
2,883,279 UART: [art] Extend RT PCRs Done
2,883,707 UART: [art] Lock RT PCRs Done
2,885,383 UART: [art] Populate DV Done
2,893,364 UART: [fht] FMC Alias Private Key: 7
2,894,520 UART: [art] Derive CDI
2,894,800 UART: [art] Store in slot 0x4
2,980,873 UART: [art] Derive Key Pair
2,981,233 UART: [art] Store priv key in slot 0x5
2,994,673 UART: [art] Derive Key Pair - Done
3,009,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,388 UART: [art] PUB.X = 33A32F33653F9B707B7684E858856552110B70A80D785EBE61EFF1E9C4C2D398CE13A74FBCBBCFFF03B4BB03F4E81D77
3,032,158 UART: [art] PUB.Y = 22339E1F7D3AF5C8ABD306ACE378A99EE68A78FADF2B65BEF96A7F15305AED58D848CB541877870C8AB78374EBF8C1FF
3,039,122 UART: [art] SIG.R = C13AF160D0B257768C2C52B2D2EB857DDB01B577DE7A102986533831AE4FF7373ECFFAAF8135C8E86375ABEBDDC9CDB9
3,045,909 UART: [art] SIG.S = 7A10B53BCB43B7F49FF107E8C552422F4ECD60A2238D69EFC63E6DE86A8DD1809C84A902DF34394E713DE3E14BDC8105
3,069,450 UART: Caliptra RT
3,069,793 UART: [state] CFI Enabled
3,190,400 UART: [rt] RT listening for mailbox commands...
3,191,063 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,932 UART: [rt]cmd =0x46504c54, len=4
3,221,914 >>> mbox cmd response data (8 bytes)
3,222,213 UART: [rt] FIPS self test
3,222,541 UART: [kat] ++
3,222,693 UART: [kat] sha1
3,227,031 UART: [kat] SHA2-256
3,229,053 UART: [kat] SHA2-384
3,232,048 UART: [kat] SHA2-512-ACC
3,233,531 UART: Droping operation
3,234,022 UART: Fatal Error: 0x90050003
3,235,561 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,566 >>> mbox cmd response: failed
3,235,566 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,420 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,297 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,703,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,853,751 >>> mbox cmd response: failed
2,854,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,003,202 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,425,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,234,480 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,699,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,849,571 >>> mbox cmd response: failed
2,850,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,999,030 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,437,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,263,422 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,050,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,200,262 >>> mbox cmd response: failed
3,200,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,349,711 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,176,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,888,812 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,051,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,201,759 >>> mbox cmd response: failed
3,202,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,351,070 >>> mbox cmd response: failed
Initializing fuses
1,154 writing to cptra_bootfsm_go
20,174,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,883,164 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
2,698,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,848,176 >>> mbox cmd response: failed
2,848,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,997,628 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,431,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,263,339 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
2,701,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,851,123 >>> mbox cmd response: failed
2,851,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,000,413 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
3,433,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,272,075 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,054,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,204,387 >>> mbox cmd response: failed
3,204,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,353,777 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
20,179,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,894,662 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
3,048,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,198,078 >>> mbox cmd response: failed
3,198,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,347,541 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,175,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,897,038 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,806 >>> mbox cmd response: failed
814,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,812 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,162 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,888 >>> mbox cmd response: failed
814,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,958 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,307 >>> mbox cmd response: failed
815,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,989 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,573 >>> mbox cmd response: failed
815,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,579 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,915 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,916 >>> mbox cmd response: failed
814,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,028 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,596 >>> mbox cmd response: failed
815,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,694 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,639 >>> mbox cmd response: failed
815,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,645 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,609 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,073 >>> mbox cmd response: failed
815,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,047 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,079 UART:
192,447 UART: Running Caliptra ROM ...
193,649 UART:
193,807 UART: [state] CFI Enabled
264,770 UART: [state] LifecycleState = Unprovisioned
266,754 UART: [state] DebugLocked = No
268,719 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,240 UART: [kat] SHA2-256
442,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,430 UART: [kat] ++
453,882 UART: [kat] sha1
465,539 UART: [kat] SHA2-256
468,199 UART: [kat] SHA2-384
475,544 UART: [kat] SHA2-512-ACC
477,925 UART: [kat] ECC-384
2,766,494 UART: [kat] HMAC-384Kdf
2,778,235 UART: [kat] LMS
3,968,538 UART: [kat] --
3,974,812 UART: [cold-reset] ++
3,976,118 UART: [fht] Storing FHT @ 0x50003400
3,987,532 UART: [idev] ++
3,988,101 UART: [idev] CDI.KEYID = 6
3,989,026 UART: [idev] SUBJECT.KEYID = 7
3,990,285 UART: [idev] UDS.KEYID = 0
3,991,359 ready_for_fw is high
3,991,593 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,141,871 UART: [idev] Erasing UDS.KEYID = 0
7,325,328 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,179 UART: [idev] --
7,352,243 UART: [ldev] ++
7,352,829 UART: [ldev] CDI.KEYID = 6
7,353,767 UART: [ldev] SUBJECT.KEYID = 5
7,354,995 UART: [ldev] AUTHORITY.KEYID = 7
7,356,235 UART: [ldev] FE.KEYID = 1
7,401,583 UART: [ldev] Erasing FE.KEYID = 1
10,731,962 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,940 UART: [ldev] --
13,092,482 UART: [fwproc] Waiting for Commands...
13,094,753 UART: [fwproc] Received command 0x46574c44
13,096,945 UART: [fwproc] Received Image of size 119428 bytes
17,216,223 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,293,046 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,366,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,698,138 >>> mbox cmd response: success
17,701,807 UART: [afmc] ++
17,702,432 UART: [afmc] CDI.KEYID = 6
17,703,349 UART: [afmc] SUBJECT.KEYID = 7
17,704,568 UART: [afmc] AUTHORITY.KEYID = 5
21,070,582 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,111 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,378 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,384,837 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,538 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,413,946 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,435,641 UART: [afmc] --
23,439,402 UART: [cold-reset] --
23,443,700 UART: [state] Locking Datavault
23,448,190 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,947 UART: [state] Locking ICCM
23,452,415 UART: [exit] Launching FMC @ 0x40000130
23,460,823 UART:
23,461,113 UART: Running Caliptra FMC ...
23,462,148 UART:
23,462,297 UART: [state] CFI Enabled
23,530,127 UART: [fht] FMC Alias Private Key: 7
25,870,245 UART: [art] Extend RT PCRs Done
25,871,495 UART: [art] Lock RT PCRs Done
25,872,912 UART: [art] Populate DV Done
25,878,280 UART: [fht] FMC Alias Private Key: 7
25,879,821 UART: [art] Derive CDI
25,880,641 UART: [art] Store in slot 0x4
25,938,824 UART: [art] Derive Key Pair
25,939,905 UART: [art] Store priv key in slot 0x5
29,232,672 UART: [art] Derive Key Pair - Done
29,245,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,501 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,021 UART: [art] PUB.X = 22A34CC12F684055B30246BA5BA12F366FB8968492BB0E7914F6227FE0360FFD09FAFE7E233394DDA4FF4CF3B1A73510
31,542,304 UART: [art] PUB.Y = EAC40DD4668985E5F34D579D98689BC7D6FADAF96D4CEDE0F9DA6EA843ACA9C4FC3FF90F5376580457BB9B3E3FD353FD
31,549,556 UART: [art] SIG.R = 35BE75F7EB4B1AD1FA850D801B73D5F310FD0D89412BAFAE8A0F44C67158E213EDEA892442F3E3CA600CC7A644BABAC8
31,556,968 UART: [art] SIG.S = 743C50241A4584DEA8B6E789D3071B560EC9BC954B2513CE17823A61ABDADD900570F8EED2D9696F5795579788A89424
32,862,518 UART: Caliptra RT
32,863,220 UART: [state] CFI Enabled
33,059,308 UART: [rt] RT listening for mailbox commands...
33,061,168 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,090,816 UART: [rt]cmd =0x46504c54, len=4
33,092,348 >>> mbox cmd response data (8 bytes)
33,093,547 UART: [rt] FIPS self test
33,094,496 UART: [kat] ++
33,094,955 UART: [kat] sha1
33,099,307 UART: [kat] SHA2-256
33,101,190 UART: [kat] SHA2-384
33,104,280 UART: [kat] SHA2-512-ACC
33,105,181 UART: Fatal Error: 0x90050001
33,140,510 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,290,331 >>> mbox cmd response: failed
33,290,957 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,440,851 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,091 UART:
190,410 UART: Running Caliptra ROM ...
191,439 UART:
191,584 UART: [state] CFI Enabled
269,667 UART: [state] LifecycleState = Unprovisioned
271,597 UART: [state] DebugLocked = No
274,544 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
279,168 UART: [kat] SHA2-256
448,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
459,372 UART: [kat] ++
459,959 UART: [kat] sha1
471,440 UART: [kat] SHA2-256
474,121 UART: [kat] SHA2-384
479,235 UART: [kat] SHA2-512-ACC
481,578 UART: [kat] ECC-384
2,771,372 UART: [kat] HMAC-384Kdf
2,803,504 UART: [kat] LMS
3,993,855 UART: [kat] --
3,998,511 UART: [cold-reset] ++
4,000,118 UART: [fht] Storing FHT @ 0x50003400
4,011,069 UART: [idev] ++
4,011,647 UART: [idev] CDI.KEYID = 6
4,012,618 UART: [idev] SUBJECT.KEYID = 7
4,013,838 UART: [idev] UDS.KEYID = 0
4,015,493 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,165,709 UART: [idev] Erasing UDS.KEYID = 0
7,353,238 UART: [idev] Using Sha1 for KeyId Algorithm
7,374,023 UART: [idev] --
7,377,967 UART: [ldev] ++
7,378,575 UART: [ldev] CDI.KEYID = 6
7,379,495 UART: [ldev] SUBJECT.KEYID = 5
7,380,714 UART: [ldev] AUTHORITY.KEYID = 7
7,381,958 UART: [ldev] FE.KEYID = 1
7,427,473 UART: [ldev] Erasing FE.KEYID = 1
10,757,740 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,056,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,070,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,085,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,100,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,118,464 UART: [ldev] --
13,123,262 UART: [fwproc] Waiting for Commands...
13,125,691 UART: [fwproc] Received command 0x46574c44
13,127,892 UART: [fwproc] Received Image of size 119428 bytes
17,242,341 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,778 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,391,925 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,723,071 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,808,217 ready_for_fw is high
3,808,680 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,992,068 >>> mbox cmd response: success
23,683,241 UART:
23,683,675 UART: Running Caliptra FMC ...
23,684,791 UART:
23,684,967 UART: [state] CFI Enabled
23,736,206 UART: [fht] FMC Alias Private Key: 7
26,077,062 UART: [art] Extend RT PCRs Done
26,078,295 UART: [art] Lock RT PCRs Done
26,080,225 UART: [art] Populate DV Done
26,085,661 UART: [fht] FMC Alias Private Key: 7
26,087,316 UART: [art] Derive CDI
26,088,143 UART: [art] Store in slot 0x4
26,145,303 UART: [art] Derive Key Pair
26,146,347 UART: [art] Store priv key in slot 0x5
29,439,297 UART: [art] Derive Key Pair - Done
29,452,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,010 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,527 UART: [art] PUB.X = 3D7993B3BFEC50F04C5F64C7ACCC17A69C9662B0B74F259A601D6D576DE62A583581CA16B36ABA19072F0C7AB7DC6F8D
31,750,790 UART: [art] PUB.Y = 0992F5F17FD4BF23D5CBE4293C4AE1DE8D6881B1AF481C931F18353C295BE9179548709682367DD92E16757108BB5C77
31,758,044 UART: [art] SIG.R = E8D44AD90C844B6F69FC2508064F1233715A9AACF77CE9A476B135D5DAD7377E40B1A9557D17CA6AB84DA0D6D704D680
31,765,476 UART: [art] SIG.S = AFA717853129921BDD61B7DB021C8F6A19156CF7C65472868270DF03ED3BE1F13C553F87B62BC6AB2E031964DAFA22D8
33,070,592 UART: Caliptra RT
33,071,296 UART: [state] CFI Enabled
33,249,416 UART: [rt] RT listening for mailbox commands...
33,251,274 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,280,923 UART: [rt]cmd =0x46504c54, len=4
33,282,447 >>> mbox cmd response data (8 bytes)
33,283,601 UART: [rt] FIPS self test
33,284,542 UART: [kat] ++
33,284,992 UART: [kat] sha1
33,289,556 UART: [kat] SHA2-256
33,291,436 UART: [kat] SHA2-384
33,294,560 UART: [kat] SHA2-512-ACC
33,295,446 UART: Fatal Error: 0x90050001
33,330,828 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,480,818 >>> mbox cmd response: failed
33,481,493 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,631,749 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,784,679 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,005,370 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,593 UART:
192,950 UART: Running Caliptra ROM ...
194,146 UART:
603,978 UART: [state] CFI Enabled
618,382 UART: [state] LifecycleState = Unprovisioned
620,295 UART: [state] DebugLocked = No
622,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,695 UART: [kat] SHA2-256
797,438 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,012 UART: [kat] ++
808,466 UART: [kat] sha1
820,851 UART: [kat] SHA2-256
823,593 UART: [kat] SHA2-384
827,886 UART: [kat] SHA2-512-ACC
830,260 UART: [kat] ECC-384
3,115,879 UART: [kat] HMAC-384Kdf
3,127,211 UART: [kat] LMS
4,317,324 UART: [kat] --
4,319,701 UART: [cold-reset] ++
4,322,057 UART: [fht] Storing FHT @ 0x50003400
4,334,339 UART: [idev] ++
4,334,910 UART: [idev] CDI.KEYID = 6
4,335,872 UART: [idev] SUBJECT.KEYID = 7
4,337,122 UART: [idev] UDS.KEYID = 0
4,338,089 ready_for_fw is high
4,338,313 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,488,704 UART: [idev] Erasing UDS.KEYID = 0
7,620,887 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,586 UART: [idev] --
7,647,644 UART: [ldev] ++
7,648,220 UART: [ldev] CDI.KEYID = 6
7,649,151 UART: [ldev] SUBJECT.KEYID = 5
7,650,376 UART: [ldev] AUTHORITY.KEYID = 7
7,651,612 UART: [ldev] FE.KEYID = 1
7,662,406 UART: [ldev] Erasing FE.KEYID = 1
10,951,331 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,592 UART: [ldev] --
13,311,539 UART: [fwproc] Waiting for Commands...
13,314,024 UART: [fwproc] Received command 0x46574c44
13,316,235 UART: [fwproc] Received Image of size 119428 bytes
17,434,250 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,512,071 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,585,220 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,916,930 >>> mbox cmd response: success
17,920,597 UART: [afmc] ++
17,921,189 UART: [afmc] CDI.KEYID = 6
17,922,103 UART: [afmc] SUBJECT.KEYID = 7
17,923,323 UART: [afmc] AUTHORITY.KEYID = 5
21,237,133 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,531,809 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,534,077 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,548,470 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,563,225 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,577,629 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,597,936 UART: [afmc] --
23,601,611 UART: [cold-reset] --
23,603,966 UART: [state] Locking Datavault
23,609,756 UART: [state] Locking PCR0, PCR1 and PCR31
23,611,513 UART: [state] Locking ICCM
23,613,992 UART: [exit] Launching FMC @ 0x40000130
23,622,389 UART:
23,622,643 UART: Running Caliptra FMC ...
23,623,750 UART:
23,623,922 UART: [state] CFI Enabled
23,631,653 UART: [fht] FMC Alias Private Key: 7
25,971,405 UART: [art] Extend RT PCRs Done
25,972,652 UART: [art] Lock RT PCRs Done
25,974,203 UART: [art] Populate DV Done
25,979,833 UART: [fht] FMC Alias Private Key: 7
25,981,469 UART: [art] Derive CDI
25,982,301 UART: [art] Store in slot 0x4
26,024,651 UART: [art] Derive Key Pair
26,025,664 UART: [art] Store priv key in slot 0x5
29,267,484 UART: [art] Derive Key Pair - Done
29,280,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,458 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,973 UART: [art] PUB.X = 5C7BD3CF83DA7E025B9A8638623901EF4C83F144AD70B5D42F8A1E284CCFBA210F43B10E2F8B1F8787C326B27E917555
31,569,238 UART: [art] PUB.Y = D7342AAC16DFE6E634A6F0BE5BCC9C279D7637D54A8F94429CD655E258C35ED0C705E90F10ED793A38EBDBAD59D9B694
31,576,664 UART: [art] SIG.R = 9DCE2B43FF855C3C692D2C3982C113DC20B5DF7675555DCE3C41C19C2CCF52052E3256EC34F87E3CF05206E81CB6996F
31,583,930 UART: [art] SIG.S = 77E14B0AFAF489E18B9441590BE23CC9DD9D8309DAA70A8DD1C9555155F567DCE0AE91A92869A984455EACFB3EB74B1D
32,889,146 UART: Caliptra RT
32,889,852 UART: [state] CFI Enabled
33,023,509 UART: [rt] RT listening for mailbox commands...
33,025,364 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,054,994 UART: [rt]cmd =0x46504c54, len=4
33,056,737 >>> mbox cmd response data (8 bytes)
33,057,669 UART: [rt] FIPS self test
33,058,641 UART: [kat] ++
33,059,105 UART: [kat] sha1
33,063,518 UART: [kat] SHA2-256
33,065,458 UART: [kat] SHA2-384
33,068,424 UART: [kat] SHA2-512-ACC
33,069,318 UART: Fatal Error: 0x90050001
33,104,642 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,254,477 >>> mbox cmd response: failed
33,255,070 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,405,011 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
190,168 UART:
190,482 UART: Running Caliptra ROM ...
191,512 UART:
7,134,029 UART: [state] CFI Enabled
7,152,220 UART: [state] LifecycleState = Unprovisioned
7,154,138 UART: [state] DebugLocked = No
7,156,511 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,161,260 UART: [kat] SHA2-256
7,330,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,341,532 UART: [kat] ++
7,342,005 UART: [kat] sha1
7,352,902 UART: [kat] SHA2-256
7,355,604 UART: [kat] SHA2-384
7,361,057 UART: [kat] SHA2-512-ACC
7,363,416 UART: [kat] ECC-384
9,648,000 UART: [kat] HMAC-384Kdf
9,660,352 UART: [kat] LMS
10,850,476 UART: [kat] --
10,855,359 UART: [cold-reset] ++
10,857,783 UART: [fht] Storing FHT @ 0x50003400
10,869,015 UART: [idev] ++
10,869,593 UART: [idev] CDI.KEYID = 6
10,870,474 UART: [idev] SUBJECT.KEYID = 7
10,871,743 UART: [idev] UDS.KEYID = 0
10,873,298 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,023,207 UART: [idev] Erasing UDS.KEYID = 0
14,161,675 UART: [idev] Using Sha1 for KeyId Algorithm
14,183,223 UART: [idev] --
14,186,061 UART: [ldev] ++
14,186,647 UART: [ldev] CDI.KEYID = 6
14,187,587 UART: [ldev] SUBJECT.KEYID = 5
14,188,722 UART: [ldev] AUTHORITY.KEYID = 7
14,190,060 UART: [ldev] FE.KEYID = 1
14,202,143 UART: [ldev] Erasing FE.KEYID = 1
17,488,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,783,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,797,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,812,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,827,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,847,232 UART: [ldev] --
19,852,063 UART: [fwproc] Waiting for Commands...
19,854,635 UART: [fwproc] Received command 0x46574c44
19,856,893 UART: [fwproc] Received Image of size 119428 bytes
23,975,460 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,049,958 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,123,142 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,454,552 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
4,124,538 ready_for_fw is high
4,125,197 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,171,464 >>> mbox cmd response: success
23,814,393 UART:
23,814,884 UART: Running Caliptra FMC ...
23,816,024 UART:
23,816,202 UART: [state] CFI Enabled
23,823,820 UART: [fht] FMC Alias Private Key: 7
26,162,999 UART: [art] Extend RT PCRs Done
26,164,238 UART: [art] Lock RT PCRs Done
26,165,525 UART: [art] Populate DV Done
26,170,954 UART: [fht] FMC Alias Private Key: 7
26,172,450 UART: [art] Derive CDI
26,173,221 UART: [art] Store in slot 0x4
26,215,500 UART: [art] Derive Key Pair
26,216,584 UART: [art] Store priv key in slot 0x5
29,458,382 UART: [art] Derive Key Pair - Done
29,471,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,752,023 UART: [art] Erasing AUTHORITY.KEYID = 7
31,753,550 UART: [art] PUB.X = 98CB65234764288A17FE0533E1A81B16C431E404C6A0B4D31D1758702A089E4F6B22B1EBFE69E968C1AF4F743C232787
31,760,841 UART: [art] PUB.Y = A3F1DEFA0A872C1CF426B78AAA1656FDFAA2D6355A3B162504897A822DE60DE377FAEFD115BB9DE501AFBDBBF61633E5
31,768,098 UART: [art] SIG.R = E504DF72402ACE16853A5C676A2FB98A334BE00EBC95AFC7289506F1D641B38C56E5DFE99222750F0CC203A169EC153A
31,775,508 UART: [art] SIG.S = 515C9157727C0501266DE4B295892233B1FF8F3092DFF234E8BD65E827371D614D4B23DF9EBF6F26B3953648387FEA60
33,079,719 UART: Caliptra RT
33,080,438 UART: [state] CFI Enabled
33,214,116 UART: [rt] RT listening for mailbox commands...
33,215,978 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,246,009 UART: [rt]cmd =0x46504c54, len=4
33,247,492 >>> mbox cmd response data (8 bytes)
33,248,387 UART: [rt] FIPS self test
33,249,275 UART: [kat] ++
33,249,764 UART: [kat] sha1
33,254,280 UART: [kat] SHA2-256
33,256,223 UART: [kat] SHA2-384
33,259,328 UART: [kat] SHA2-512-ACC
33,260,267 UART: Fatal Error: 0x90050001
33,295,583 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,445,571 >>> mbox cmd response: failed
33,446,231 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,596,128 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
10,467,723 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,509,830 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,270 UART:
192,638 UART: Running Caliptra ROM ...
193,865 UART:
194,049 UART: [state] CFI Enabled
268,668 UART: [state] LifecycleState = Unprovisioned
270,590 UART: [state] DebugLocked = No
273,128 UART: [state] WD Timer not started. Device not locked for debugging
277,049 UART: [kat] SHA2-256
456,565 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
467,341 UART: [kat] ++
467,799 UART: [kat] sha1
479,107 UART: [kat] SHA2-256
481,848 UART: [kat] SHA2-384
487,710 UART: [kat] SHA2-512-ACC
490,090 UART: [kat] ECC-384
2,949,257 UART: [kat] HMAC-384Kdf
2,976,344 UART: [kat] LMS
3,452,844 UART: [kat] --
3,455,587 UART: [cold-reset] ++
3,456,984 UART: [fht] FHT @ 0x50003400
3,468,395 UART: [idev] ++
3,468,966 UART: [idev] CDI.KEYID = 6
3,469,883 UART: [idev] SUBJECT.KEYID = 7
3,471,130 UART: [idev] UDS.KEYID = 0
3,472,060 ready_for_fw is high
3,472,295 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,622,592 UART: [idev] Erasing UDS.KEYID = 0
5,990,250 UART: [idev] Sha1 KeyId Algorithm
6,013,587 UART: [idev] --
6,019,324 UART: [ldev] ++
6,019,905 UART: [ldev] CDI.KEYID = 6
6,020,798 UART: [ldev] SUBJECT.KEYID = 5
6,022,018 UART: [ldev] AUTHORITY.KEYID = 7
6,023,318 UART: [ldev] FE.KEYID = 1
6,061,297 UART: [ldev] Erasing FE.KEYID = 1
8,572,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,320,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,336,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,352,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,374,170 UART: [ldev] --
10,380,207 UART: [fwproc] Wait for Commands...
10,383,129 UART: [fwproc] Recv command 0x46574c44
10,385,121 UART: [fwproc] Recv'd Img size: 119428 bytes
13,878,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,960,673 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,033,699 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,365,159 >>> mbox cmd response: success
14,368,512 UART: [afmc] ++
14,369,106 UART: [afmc] CDI.KEYID = 6
14,370,021 UART: [afmc] SUBJECT.KEYID = 7
14,371,264 UART: [afmc] AUTHORITY.KEYID = 5
16,898,066 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,622,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,624,948 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,640,775 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,656,841 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,672,377 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,696,145 UART: [afmc] --
18,699,537 UART: [cold-reset] --
18,703,997 UART: [state] Locking Datavault
18,709,689 UART: [state] Locking PCR0, PCR1 and PCR31
18,711,394 UART: [state] Locking ICCM
18,712,788 UART: [exit] Launching FMC @ 0x40000130
18,721,186 UART:
18,721,424 UART: Running Caliptra FMC ...
18,722,531 UART:
18,722,724 UART: [state] CFI Enabled
18,780,438 UART: [fht] FMC Alias Private Key: 7
20,546,523 UART: [art] Extend RT PCRs Done
20,547,753 UART: [art] Lock RT PCRs Done
20,549,655 UART: [art] Populate DV Done
20,555,229 UART: [fht] FMC Alias Private Key: 7
20,556,767 UART: [art] Derive CDI
20,557,588 UART: [art] Store in slot 0x4
20,613,338 UART: [art] Derive Key Pair
20,614,385 UART: [art] Store priv key in slot 0x5
23,077,105 UART: [art] Derive Key Pair - Done
23,089,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,803,249 UART: [art] Erasing AUTHORITY.KEYID = 7
24,804,752 UART: [art] PUB.X = 4D732C3C9C4BF3C8CE18B5726BF445C397DD7CC0359FC0C804C514DB25BCCDF36FA15E949DE8EEC852945E27D0340A8B
24,812,094 UART: [art] PUB.Y = FC11349E8CB161AA6E77AD72D6F5642E5458488A2D3D33691D03F8B2EBBCDAD7B84A37E210BCA3A53B0915B296BD95ED
24,819,358 UART: [art] SIG.R = E11A70B00FD6E452B8EC7E829F68D14A4A98791E665AA4D7B5D13DBFA5DFCC4863FC795B0B4A21F5E474D7CE539E2854
24,826,795 UART: [art] SIG.S = 56C07894DE9C5E01982765C04F4A5DA8902B457CDAF6990603ACCB24F6E083F39248AFEAF88DC48775EA112560594D4E
25,805,328 UART: Caliptra RT
25,806,030 UART: [state] CFI Enabled
25,986,645 UART: [rt] RT listening for mailbox commands...
25,988,498 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,018,067 UART: [rt]cmd =0x46504c54, len=4
26,019,495 >>> mbox cmd response data (8 bytes)
26,020,562 UART: [rt] FIPS self test
26,021,507 UART: [kat] ++
26,021,974 UART: [kat] sha1
26,026,370 UART: [kat] SHA2-256
26,028,308 UART: [kat] SHA2-384
26,031,221 UART: [kat] SHA2-512-ACC
26,032,274 UART: Fatal Error: 0x90050001
26,067,664 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,218,117 >>> mbox cmd response: failed
26,218,739 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,368,646 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
190,073 UART:
190,370 UART: Running Caliptra ROM ...
191,488 UART:
191,644 UART: [state] CFI Enabled
267,962 UART: [state] LifecycleState = Unprovisioned
269,875 UART: [state] DebugLocked = No
271,956 UART: [state] WD Timer not started. Device not locked for debugging
276,393 UART: [kat] SHA2-256
456,065 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,831 UART: [kat] ++
467,362 UART: [kat] sha1
478,455 UART: [kat] SHA2-256
481,179 UART: [kat] SHA2-384
486,139 UART: [kat] SHA2-512-ACC
488,484 UART: [kat] ECC-384
2,950,920 UART: [kat] HMAC-384Kdf
2,974,499 UART: [kat] LMS
3,450,984 UART: [kat] --
3,454,761 UART: [cold-reset] ++
3,455,994 UART: [fht] FHT @ 0x50003400
3,466,601 UART: [idev] ++
3,467,168 UART: [idev] CDI.KEYID = 6
3,468,110 UART: [idev] SUBJECT.KEYID = 7
3,469,383 UART: [idev] UDS.KEYID = 0
3,470,873 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,063 UART: [idev] Erasing UDS.KEYID = 0
5,988,755 UART: [idev] Sha1 KeyId Algorithm
6,011,076 UART: [idev] --
6,016,348 UART: [ldev] ++
6,016,928 UART: [ldev] CDI.KEYID = 6
6,017,874 UART: [ldev] SUBJECT.KEYID = 5
6,019,097 UART: [ldev] AUTHORITY.KEYID = 7
6,020,359 UART: [ldev] FE.KEYID = 1
6,060,716 UART: [ldev] Erasing FE.KEYID = 1
8,564,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,561 UART: [ldev] --
10,375,103 UART: [fwproc] Wait for Commands...
10,378,392 UART: [fwproc] Recv command 0x46574c44
10,380,385 UART: [fwproc] Recv'd Img size: 119428 bytes
13,876,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,539 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,542 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,355,743 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
3,461,893 ready_for_fw is high
3,462,317 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,262,279 >>> mbox cmd response: success
18,554,346 UART:
18,554,874 UART: Running Caliptra FMC ...
18,556,027 UART:
18,556,200 UART: [state] CFI Enabled
18,621,900 UART: [fht] FMC Alias Private Key: 7
20,388,658 UART: [art] Extend RT PCRs Done
20,389,893 UART: [art] Lock RT PCRs Done
20,391,480 UART: [art] Populate DV Done
20,396,816 UART: [fht] FMC Alias Private Key: 7
20,398,406 UART: [art] Derive CDI
20,399,243 UART: [art] Store in slot 0x4
20,454,076 UART: [art] Derive Key Pair
20,455,088 UART: [art] Store priv key in slot 0x5
22,918,121 UART: [art] Derive Key Pair - Done
22,930,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,643,172 UART: [art] Erasing AUTHORITY.KEYID = 7
24,644,687 UART: [art] PUB.X = 9BF43FB683D6F96141C6FB93C9E61C67C2ADA7BFD6D941053C860D251086E7374DEBD1EA64B86A663C425DE1AE1203C2
24,651,955 UART: [art] PUB.Y = D12AFB21078B66DF980AB0EE818F7498FF01DF1364A35C7A62F4B3B175814634BF172990B4E42199B8B0F27DCA202A93
24,659,202 UART: [art] SIG.R = 525DF8EC95B99C6322C8A71577CF050EEB9201D1384539088DBA0F3E89D9A6E8572574A1CB243654B7AF4A07E33C01D9
24,666,610 UART: [art] SIG.S = AC504D4BDEF606BE051CBC713B2ED3A1C8418E0102528A36C6DDDAD0875311209A5F08139A0292AA3C268A5EBE02E094
25,646,075 UART: Caliptra RT
25,646,787 UART: [state] CFI Enabled
25,827,786 UART: [rt] RT listening for mailbox commands...
25,829,639 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,859,342 UART: [rt]cmd =0x46504c54, len=4
25,861,122 >>> mbox cmd response data (8 bytes)
25,862,512 UART: [rt] FIPS self test
25,863,461 UART: [kat] ++
25,863,919 UART: [kat] sha1
25,868,141 UART: [kat] SHA2-256
25,870,026 UART: [kat] SHA2-384
25,873,172 UART: [kat] SHA2-512-ACC
25,874,077 UART: Fatal Error: 0x90050001
25,909,269 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,059,298 >>> mbox cmd response: failed
26,059,959 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,209,862 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,463,487 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,264,757 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
192,616 UART:
192,987 UART: Running Caliptra ROM ...
194,211 UART:
603,696 UART: [state] CFI Enabled
617,863 UART: [state] LifecycleState = Unprovisioned
619,819 UART: [state] DebugLocked = No
621,354 UART: [state] WD Timer not started. Device not locked for debugging
625,078 UART: [kat] SHA2-256
804,774 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,567 UART: [kat] ++
816,103 UART: [kat] sha1
826,632 UART: [kat] SHA2-256
829,363 UART: [kat] SHA2-384
834,314 UART: [kat] SHA2-512-ACC
836,727 UART: [kat] ECC-384
3,278,731 UART: [kat] HMAC-384Kdf
3,291,680 UART: [kat] LMS
3,768,217 UART: [kat] --
3,772,644 UART: [cold-reset] ++
3,775,075 UART: [fht] FHT @ 0x50003400
3,786,705 UART: [idev] ++
3,787,270 UART: [idev] CDI.KEYID = 6
3,788,230 UART: [idev] SUBJECT.KEYID = 7
3,789,500 UART: [idev] UDS.KEYID = 0
3,790,404 ready_for_fw is high
3,790,604 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,941,255 UART: [idev] Erasing UDS.KEYID = 0
6,266,791 UART: [idev] Sha1 KeyId Algorithm
6,291,159 UART: [idev] --
6,295,730 UART: [ldev] ++
6,296,318 UART: [ldev] CDI.KEYID = 6
6,297,398 UART: [ldev] SUBJECT.KEYID = 5
6,298,509 UART: [ldev] AUTHORITY.KEYID = 7
6,299,687 UART: [ldev] FE.KEYID = 1
6,311,798 UART: [ldev] Erasing FE.KEYID = 1
8,797,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,292 UART: [ldev] --
10,591,186 UART: [fwproc] Wait for Commands...
10,593,818 UART: [fwproc] Recv command 0x46574c44
10,595,816 UART: [fwproc] Recv'd Img size: 119428 bytes
14,100,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,551 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,257,624 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,588,535 >>> mbox cmd response: success
14,593,391 UART: [afmc] ++
14,594,011 UART: [afmc] CDI.KEYID = 6
14,594,907 UART: [afmc] SUBJECT.KEYID = 7
14,596,132 UART: [afmc] AUTHORITY.KEYID = 5
17,101,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,821,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,823,797 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,839,641 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,855,656 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,871,228 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,894,731 UART: [afmc] --
18,898,061 UART: [cold-reset] --
18,901,076 UART: [state] Locking Datavault
18,906,063 UART: [state] Locking PCR0, PCR1 and PCR31
18,907,825 UART: [state] Locking ICCM
18,910,356 UART: [exit] Launching FMC @ 0x40000130
18,918,800 UART:
18,919,061 UART: Running Caliptra FMC ...
18,920,170 UART:
18,920,335 UART: [state] CFI Enabled
18,927,952 UART: [fht] FMC Alias Private Key: 7
20,694,038 UART: [art] Extend RT PCRs Done
20,695,271 UART: [art] Lock RT PCRs Done
20,696,788 UART: [art] Populate DV Done
20,702,098 UART: [fht] FMC Alias Private Key: 7
20,703,767 UART: [art] Derive CDI
20,704,590 UART: [art] Store in slot 0x4
20,746,867 UART: [art] Derive Key Pair
20,747,875 UART: [art] Store priv key in slot 0x5
23,174,969 UART: [art] Derive Key Pair - Done
23,187,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,894,084 UART: [art] Erasing AUTHORITY.KEYID = 7
24,895,598 UART: [art] PUB.X = 489B831AA864313FEA7A2E730F9E0829B0BCA22199CEBBA6F55D05D4746664D22676BCBD71DEF962A498FB3D65F2DD0D
24,902,851 UART: [art] PUB.Y = ED38D2A3A82AF71533A6E3FBB04FEEAA64DD8703D2D7F460771D65C3658DF8180902885487487F878DC8E570750F92FD
24,910,146 UART: [art] SIG.R = E92373F7EB70FB2FC9D9A51B1B99D5975801E0C08116076FA6E4E13F3C969916621B0C5EBD9EBDEE8045F2B0DC3FAE2F
24,917,546 UART: [art] SIG.S = 6720E681610C95A0E37863481DF88590475A1453BDD256A3A862C31122228657E44975AB51E65565E8D47DBC059CA299
25,896,398 UART: Caliptra RT
25,897,091 UART: [state] CFI Enabled
26,028,571 UART: [rt] RT listening for mailbox commands...
26,030,444 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,060,034 UART: [rt]cmd =0x46504c54, len=4
26,061,817 >>> mbox cmd response data (8 bytes)
26,062,838 UART: [rt] FIPS self test
26,063,787 UART: [kat] ++
26,064,247 UART: [kat] sha1
26,068,710 UART: [kat] SHA2-256
26,070,650 UART: [kat] SHA2-384
26,073,564 UART: [kat] SHA2-512-ACC
26,074,460 UART: Fatal Error: 0x90050001
26,109,614 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,259,592 >>> mbox cmd response: failed
26,260,223 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,410,163 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
190,109 UART:
190,398 UART: Running Caliptra ROM ...
191,512 UART:
14,125,811 UART: [state] CFI Enabled
14,140,798 UART: [state] LifecycleState = Unprovisioned
14,142,719 UART: [state] DebugLocked = No
14,144,812 UART: [state] WD Timer not started. Device not locked for debugging
14,149,549 UART: [kat] SHA2-256
14,329,184 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,339,988 UART: [kat] ++
14,340,640 UART: [kat] sha1
14,351,207 UART: [kat] SHA2-256
14,353,910 UART: [kat] SHA2-384
14,360,389 UART: [kat] SHA2-512-ACC
14,362,753 UART: [kat] ECC-384
16,807,814 UART: [kat] HMAC-384Kdf
16,819,902 UART: [kat] LMS
17,296,442 UART: [kat] --
17,302,598 UART: [cold-reset] ++
17,304,458 UART: [fht] FHT @ 0x50003400
17,315,393 UART: [idev] ++
17,315,960 UART: [idev] CDI.KEYID = 6
17,316,904 UART: [idev] SUBJECT.KEYID = 7
17,318,120 UART: [idev] UDS.KEYID = 0
17,319,675 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,469,660 UART: [idev] Erasing UDS.KEYID = 0
19,792,410 UART: [idev] Sha1 KeyId Algorithm
19,815,526 UART: [idev] --
19,819,250 UART: [ldev] ++
19,819,818 UART: [ldev] CDI.KEYID = 6
19,820,701 UART: [ldev] SUBJECT.KEYID = 5
19,821,971 UART: [ldev] AUTHORITY.KEYID = 7
19,823,225 UART: [ldev] FE.KEYID = 1
19,834,603 UART: [ldev] Erasing FE.KEYID = 1
22,312,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,032,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,048,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,063,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,079,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,100,514 UART: [ldev] --
24,105,389 UART: [fwproc] Wait for Commands...
24,106,959 UART: [fwproc] Recv command 0x46574c44
24,109,014 UART: [fwproc] Recv'd Img size: 119428 bytes
27,602,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,680,467 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,753,481 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,085,414 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,472 writing to cptra_bootfsm_go
3,777,201 ready_for_fw is high
3,777,740 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,462,003 >>> mbox cmd response: success
18,710,850 UART:
18,711,221 UART: Running Caliptra FMC ...
18,712,434 UART:
18,712,606 UART: [state] CFI Enabled
18,720,263 UART: [fht] FMC Alias Private Key: 7
20,486,128 UART: [art] Extend RT PCRs Done
20,487,358 UART: [art] Lock RT PCRs Done
20,488,722 UART: [art] Populate DV Done
20,494,059 UART: [fht] FMC Alias Private Key: 7
20,495,556 UART: [art] Derive CDI
20,496,331 UART: [art] Store in slot 0x4
20,539,525 UART: [art] Derive Key Pair
20,540,531 UART: [art] Store priv key in slot 0x5
22,967,983 UART: [art] Derive Key Pair - Done
22,981,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,687,224 UART: [art] Erasing AUTHORITY.KEYID = 7
24,688,714 UART: [art] PUB.X = 4DF3B5040E96A4FEDA946EAE7088180F0F22E4AC53F2A736753CAFE47D39DDE475D3542B35438091C9973A5D82D04965
24,695,978 UART: [art] PUB.Y = 6D8CD46DA0EA139FEF9794D90BA840DCE988615E192154ED1753C0D2EE06450FFF588DD43FE72767D47061D7C77454D8
24,703,227 UART: [art] SIG.R = 8E8AF97B9C578555B87AFDC8397EDC94B873840164A1CAC94530DBA141642D96E7A9E5A0BEFF844AF1807AAB9F82438B
24,710,627 UART: [art] SIG.S = D2A82640D36EED1CECF3AE23786B513498BA1116F20E281085029BAE9DC7CABB354885CD8214409653D586F9ACE30089
25,689,372 UART: Caliptra RT
25,690,091 UART: [state] CFI Enabled
25,822,687 UART: [rt] RT listening for mailbox commands...
25,824,536 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,854,233 UART: [rt]cmd =0x46504c54, len=4
25,855,632 >>> mbox cmd response data (8 bytes)
25,856,967 UART: [rt] FIPS self test
25,857,922 UART: [kat] ++
25,858,377 UART: [kat] sha1
25,862,910 UART: [kat] SHA2-256
25,864,789 UART: [kat] SHA2-384
25,867,808 UART: [kat] SHA2-512-ACC
25,868,755 UART: Fatal Error: 0x90050001
25,903,993 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,053,957 >>> mbox cmd response: failed
26,054,590 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,204,467 >>> mbox cmd response: failed
Initializing fuses
927 writing to cptra_bootfsm_go
17,496,848 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,192,380 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
192,281 UART:
192,648 UART: Running Caliptra ROM ...
193,841 UART:
194,000 UART: [state] CFI Enabled
264,816 UART: [state] LifecycleState = Unprovisioned
267,252 UART: [state] DebugLocked = No
269,724 UART: [state] WD Timer not started. Device not locked for debugging
274,208 UART: [kat] SHA2-256
464,071 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,874 UART: [kat] ++
475,356 UART: [kat] sha1
487,871 UART: [kat] SHA2-256
490,892 UART: [kat] SHA2-384
497,133 UART: [kat] SHA2-512-ACC
499,763 UART: [kat] ECC-384
2,948,714 UART: [kat] HMAC-384Kdf
2,973,034 UART: [kat] LMS
3,504,809 UART: [kat] --
3,508,762 UART: [cold-reset] ++
3,510,916 UART: [fht] FHT @ 0x50003400
3,522,896 UART: [idev] ++
3,523,627 UART: [idev] CDI.KEYID = 6
3,524,518 UART: [idev] SUBJECT.KEYID = 7
3,525,772 UART: [idev] UDS.KEYID = 0
3,526,680 ready_for_fw is high
3,526,900 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,677,060 UART: [idev] Erasing UDS.KEYID = 0
6,033,559 UART: [idev] Sha1 KeyId Algorithm
6,055,717 UART: [idev] --
6,059,926 UART: [ldev] ++
6,060,623 UART: [ldev] CDI.KEYID = 6
6,061,547 UART: [ldev] SUBJECT.KEYID = 5
6,062,723 UART: [ldev] AUTHORITY.KEYID = 7
6,063,907 UART: [ldev] FE.KEYID = 1
6,102,021 UART: [ldev] Erasing FE.KEYID = 1
8,604,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,977 UART: [ldev] --
10,416,963 UART: [fwproc] Wait for Commands...
10,418,459 UART: [fwproc] Recv command 0x46574c44
10,420,462 UART: [fwproc] Recv'd Img size: 119428 bytes
13,936,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,018,869 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,142,448 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,708,605 >>> mbox cmd response: success
14,713,138 UART: [afmc] ++
14,713,845 UART: [afmc] CDI.KEYID = 6
14,715,009 UART: [afmc] SUBJECT.KEYID = 7
14,716,500 UART: [afmc] AUTHORITY.KEYID = 5
17,246,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,970,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,972,160 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,987,321 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,002,422 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,017,336 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,041,967 UART: [afmc] --
19,045,410 UART: [cold-reset] --
19,049,663 UART: [state] Locking Datavault
19,054,214 UART: [state] Locking PCR0, PCR1 and PCR31
19,056,440 UART: [state] Locking ICCM
19,059,364 UART: [exit] Launching FMC @ 0x40000130
19,068,044 UART:
19,068,300 UART: Running Caliptra FMC ...
19,069,411 UART:
19,069,578 UART: [state] CFI Enabled
19,127,400 UART: [fht] FMC Alias Private Key: 7
20,893,183 UART: [art] Extend RT PCRs Done
20,894,409 UART: [art] Lock RT PCRs Done
20,896,104 UART: [art] Populate DV Done
20,901,610 UART: [fht] FMC Alias Private Key: 7
20,903,270 UART: [art] Derive CDI
20,904,092 UART: [art] Store in slot 0x4
20,960,379 UART: [art] Derive Key Pair
20,961,388 UART: [art] Store priv key in slot 0x5
23,424,257 UART: [art] Derive Key Pair - Done
23,437,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,149,755 UART: [art] Erasing AUTHORITY.KEYID = 7
25,151,266 UART: [art] PUB.X = CA7500A05D9D3F9FDBF2FA3B9459E62C70ABDE994B1A375ADB51F53A0C1007851E4C0DC134C1F80A3207B739BB1F48E7
25,158,573 UART: [art] PUB.Y = F2618516F34042816CFED7718CE59FBFBE951DFF296BEB75A269C2B4FEA285C9FF30790709CB38D4F13D5EFD809AB4B7
25,165,818 UART: [art] SIG.R = BDAB7C710814E9C47FDB10F56C92AA096BCD638909C84D211D2CF87D649586D3D0FBA55B8CD8AA07B656B1C5D35AFE0E
25,173,230 UART: [art] SIG.S = 1180B1EA7ACC36AAB5D9B7F880613CA51564237FDC7DC3672552C95B204F777E209599EA2FEEF61FBBD6173DFFCB400E
26,152,593 UART: Caliptra RT
26,153,305 UART: [state] CFI Enabled
26,331,715 UART: [rt] RT listening for mailbox commands...
26,333,568 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,363,521 UART: [rt]cmd =0x46504c54, len=4
26,365,085 >>> mbox cmd response data (8 bytes)
26,366,488 UART: [rt] FIPS self test
26,367,434 UART: [kat] ++
26,367,892 UART: [kat] sha1
26,372,295 UART: [kat] SHA2-256
26,374,226 UART: [kat] SHA2-384
26,377,133 UART: [kat] SHA2-512-ACC
26,378,076 UART: Fatal Error: 0x90050001
26,413,284 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,563,758 >>> mbox cmd response: failed
26,564,376 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,714,335 >>> mbox cmd response: failed
Initializing fuses
996 writing to cptra_bootfsm_go
190,049 UART:
190,365 UART: Running Caliptra ROM ...
191,485 UART:
191,636 UART: [state] CFI Enabled
265,384 UART: [state] LifecycleState = Unprovisioned
267,421 UART: [state] DebugLocked = No
269,132 UART: [state] WD Timer not started. Device not locked for debugging
274,560 UART: [kat] SHA2-256
464,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,195 UART: [kat] ++
475,734 UART: [kat] sha1
487,432 UART: [kat] SHA2-256
490,447 UART: [kat] SHA2-384
496,861 UART: [kat] SHA2-512-ACC
499,444 UART: [kat] ECC-384
2,948,993 UART: [kat] HMAC-384Kdf
2,973,801 UART: [kat] LMS
3,505,557 UART: [kat] --
3,510,855 UART: [cold-reset] ++
3,512,902 UART: [fht] FHT @ 0x50003400
3,525,351 UART: [idev] ++
3,526,036 UART: [idev] CDI.KEYID = 6
3,527,066 UART: [idev] SUBJECT.KEYID = 7
3,528,243 UART: [idev] UDS.KEYID = 0
3,530,041 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,680,232 UART: [idev] Erasing UDS.KEYID = 0
6,053,174 UART: [idev] Sha1 KeyId Algorithm
6,076,253 UART: [idev] --
6,080,688 UART: [ldev] ++
6,081,379 UART: [ldev] CDI.KEYID = 6
6,082,318 UART: [ldev] SUBJECT.KEYID = 5
6,083,488 UART: [ldev] AUTHORITY.KEYID = 7
6,084,726 UART: [ldev] FE.KEYID = 1
6,122,180 UART: [ldev] Erasing FE.KEYID = 1
8,629,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,392,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,407,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,427,819 UART: [ldev] --
10,433,376 UART: [fwproc] Wait for Commands...
10,435,318 UART: [fwproc] Recv command 0x46574c44
10,437,637 UART: [fwproc] Recv'd Img size: 119428 bytes
13,949,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,025,080 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,148,718 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,714,501 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,440,104 ready_for_fw is high
3,440,566 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,841,765 >>> mbox cmd response: success
19,153,757 UART:
19,154,132 UART: Running Caliptra FMC ...
19,155,260 UART:
19,155,421 UART: [state] CFI Enabled
19,221,183 UART: [fht] FMC Alias Private Key: 7
20,988,017 UART: [art] Extend RT PCRs Done
20,989,260 UART: [art] Lock RT PCRs Done
20,991,064 UART: [art] Populate DV Done
20,996,548 UART: [fht] FMC Alias Private Key: 7
20,998,044 UART: [art] Derive CDI
20,998,820 UART: [art] Store in slot 0x4
21,054,249 UART: [art] Derive Key Pair
21,055,300 UART: [art] Store priv key in slot 0x5
23,517,549 UART: [art] Derive Key Pair - Done
23,530,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,244,095 UART: [art] Erasing AUTHORITY.KEYID = 7
25,245,616 UART: [art] PUB.X = E6BD06C0ED283531BD48181AF579812912931E29600156683FDC7C57C926C9F1E74946B0812787E698B21373879895AD
25,252,832 UART: [art] PUB.Y = 5E4AF193E30E246AB6B94ECF9DD1DBE271C180BC2FC07ABF0E4AB957031A60015FCC9966D3CE8DC468746C9EA3452696
25,260,134 UART: [art] SIG.R = 63D980956747EE38DF02766E9148BCAC5787805AB0DC234C238C8506015B4380B6990836576026B07ED775F05424D619
25,267,496 UART: [art] SIG.S = 69C70BA5555C0BA5E3FCB2DB16397E4AE529F7FE82F7C0AA5F0303D851BD226C62FF15E36A0E15D190A848AD839124B8
26,246,530 UART: Caliptra RT
26,247,227 UART: [state] CFI Enabled
26,428,506 UART: [rt] RT listening for mailbox commands...
26,430,359 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,460,031 UART: [rt]cmd =0x46504c54, len=4
26,461,613 >>> mbox cmd response data (8 bytes)
26,463,101 UART: [rt] FIPS self test
26,464,040 UART: [kat] ++
26,464,498 UART: [kat] sha1
26,468,793 UART: [kat] SHA2-256
26,470,725 UART: [kat] SHA2-384
26,473,742 UART: [kat] SHA2-512-ACC
26,474,628 UART: Fatal Error: 0x90050001
26,509,932 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,659,982 >>> mbox cmd response: failed
26,660,556 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,810,829 >>> mbox cmd response: failed
Initializing fuses
915 writing to cptra_bootfsm_go
3,418,115 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,830,498 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,430 UART:
192,838 UART: Running Caliptra ROM ...
193,943 UART:
603,538 UART: [state] CFI Enabled
620,682 UART: [state] LifecycleState = Unprovisioned
623,057 UART: [state] DebugLocked = No
625,156 UART: [state] WD Timer not started. Device not locked for debugging
630,624 UART: [kat] SHA2-256
820,500 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,294 UART: [kat] ++
831,822 UART: [kat] sha1
842,773 UART: [kat] SHA2-256
845,788 UART: [kat] SHA2-384
852,355 UART: [kat] SHA2-512-ACC
854,945 UART: [kat] ECC-384
3,295,166 UART: [kat] HMAC-384Kdf
3,308,775 UART: [kat] LMS
3,840,653 UART: [kat] --
3,844,151 UART: [cold-reset] ++
3,846,366 UART: [fht] FHT @ 0x50003400
3,857,673 UART: [idev] ++
3,858,403 UART: [idev] CDI.KEYID = 6
3,859,304 UART: [idev] SUBJECT.KEYID = 7
3,860,492 UART: [idev] UDS.KEYID = 0
3,861,403 ready_for_fw is high
3,861,642 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,011,534 UART: [idev] Erasing UDS.KEYID = 0
6,335,988 UART: [idev] Sha1 KeyId Algorithm
6,359,313 UART: [idev] --
6,363,155 UART: [ldev] ++
6,363,848 UART: [ldev] CDI.KEYID = 6
6,364,772 UART: [ldev] SUBJECT.KEYID = 5
6,365,934 UART: [ldev] AUTHORITY.KEYID = 7
6,367,135 UART: [ldev] FE.KEYID = 1
6,379,138 UART: [ldev] Erasing FE.KEYID = 1
8,857,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,059 UART: [ldev] --
10,650,686 UART: [fwproc] Wait for Commands...
10,652,257 UART: [fwproc] Recv command 0x46574c44
10,654,584 UART: [fwproc] Recv'd Img size: 119428 bytes
14,170,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,244,237 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,367,828 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,933,505 >>> mbox cmd response: success
14,937,609 UART: [afmc] ++
14,938,337 UART: [afmc] CDI.KEYID = 6
14,939,535 UART: [afmc] SUBJECT.KEYID = 7
14,940,987 UART: [afmc] AUTHORITY.KEYID = 5
17,441,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,163,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,165,024 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,180,092 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,195,268 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,210,160 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,234,670 UART: [afmc] --
19,238,674 UART: [cold-reset] --
19,240,822 UART: [state] Locking Datavault
19,246,514 UART: [state] Locking PCR0, PCR1 and PCR31
19,248,657 UART: [state] Locking ICCM
19,250,868 UART: [exit] Launching FMC @ 0x40000130
19,259,544 UART:
19,259,803 UART: Running Caliptra FMC ...
19,260,907 UART:
19,261,069 UART: [state] CFI Enabled
19,268,799 UART: [fht] FMC Alias Private Key: 7
21,035,396 UART: [art] Extend RT PCRs Done
21,036,616 UART: [art] Lock RT PCRs Done
21,038,111 UART: [art] Populate DV Done
21,043,425 UART: [fht] FMC Alias Private Key: 7
21,044,914 UART: [art] Derive CDI
21,045,653 UART: [art] Store in slot 0x4
21,088,719 UART: [art] Derive Key Pair
21,089,759 UART: [art] Store priv key in slot 0x5
23,516,875 UART: [art] Derive Key Pair - Done
23,529,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,236,596 UART: [art] Erasing AUTHORITY.KEYID = 7
25,238,107 UART: [art] PUB.X = 5D8D67D0644B00B46BCDE8E3B9224B485022D6F816F93DD3F1A84B2B55001ED67187AFAAF84D37859E861AE2CB2B32B5
25,245,369 UART: [art] PUB.Y = 6DDEA346AF85D3F2EF29794A453E3736486C04523879621D94E5655C9FA94B3E35F1B79E5C19B3E777028353895960E2
25,252,541 UART: [art] SIG.R = 4F8F0C92CE31E5BC46155A1794C4CFE09E253F50652A8A12ABF800F669343E58C4161A2EDA59DEF91D4113B0879F0280
25,259,926 UART: [art] SIG.S = 2102212ACC2CDC41BCCED7F83D71C311201DEA9D1C5C49FAC8B1B0FF7CD1E269AC619D3FE3EDDA28130C5452E287493C
26,238,922 UART: Caliptra RT
26,239,619 UART: [state] CFI Enabled
26,372,882 UART: [rt] RT listening for mailbox commands...
26,374,749 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,404,412 UART: [rt]cmd =0x46504c54, len=4
26,406,110 >>> mbox cmd response data (8 bytes)
26,407,093 UART: [rt] FIPS self test
26,408,050 UART: [kat] ++
26,408,555 UART: [kat] sha1
26,412,752 UART: [kat] SHA2-256
26,414,632 UART: [kat] SHA2-384
26,417,727 UART: [kat] SHA2-512-ACC
26,418,819 UART: Fatal Error: 0x90050001
26,454,006 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,604,020 >>> mbox cmd response: failed
26,604,681 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,754,534 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,114 UART:
190,403 UART: Running Caliptra ROM ...
191,511 UART:
13,754,862 UART: [state] CFI Enabled
13,769,166 UART: [state] LifecycleState = Unprovisioned
13,771,528 UART: [state] DebugLocked = No
13,774,272 UART: [state] WD Timer not started. Device not locked for debugging
13,778,144 UART: [kat] SHA2-256
13,968,028 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,978,828 UART: [kat] ++
13,979,391 UART: [kat] sha1
13,989,752 UART: [kat] SHA2-256
13,992,776 UART: [kat] SHA2-384
13,999,322 UART: [kat] SHA2-512-ACC
14,001,898 UART: [kat] ECC-384
16,444,870 UART: [kat] HMAC-384Kdf
16,456,778 UART: [kat] LMS
16,988,615 UART: [kat] --
16,991,900 UART: [cold-reset] ++
16,994,426 UART: [fht] FHT @ 0x50003400
17,005,678 UART: [idev] ++
17,006,359 UART: [idev] CDI.KEYID = 6
17,007,304 UART: [idev] SUBJECT.KEYID = 7
17,008,520 UART: [idev] UDS.KEYID = 0
17,010,047 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,160,440 UART: [idev] Erasing UDS.KEYID = 0
19,486,442 UART: [idev] Sha1 KeyId Algorithm
19,508,626 UART: [idev] --
19,513,085 UART: [ldev] ++
19,513,782 UART: [ldev] CDI.KEYID = 6
19,514,678 UART: [ldev] SUBJECT.KEYID = 5
19,515,895 UART: [ldev] AUTHORITY.KEYID = 7
19,517,070 UART: [ldev] FE.KEYID = 1
19,527,566 UART: [ldev] Erasing FE.KEYID = 1
22,002,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,720,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,735,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,750,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,765,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,786,692 UART: [ldev] --
23,791,856 UART: [fwproc] Wait for Commands...
23,793,693 UART: [fwproc] Recv command 0x46574c44
23,796,035 UART: [fwproc] Recv'd Img size: 119428 bytes
27,308,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,381,293 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,504,890 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,070,143 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
3,750,928 ready_for_fw is high
3,751,345 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,057,923 >>> mbox cmd response: success
19,304,586 UART:
19,305,021 UART: Running Caliptra FMC ...
19,306,153 UART:
19,306,318 UART: [state] CFI Enabled
19,314,276 UART: [fht] FMC Alias Private Key: 7
21,080,908 UART: [art] Extend RT PCRs Done
21,082,151 UART: [art] Lock RT PCRs Done
21,084,115 UART: [art] Populate DV Done
21,089,395 UART: [fht] FMC Alias Private Key: 7
21,091,007 UART: [art] Derive CDI
21,091,861 UART: [art] Store in slot 0x4
21,134,842 UART: [art] Derive Key Pair
21,136,060 UART: [art] Store priv key in slot 0x5
23,562,319 UART: [art] Derive Key Pair - Done
23,575,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,912 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,435 UART: [art] PUB.X = F057BF93739C37DB552E160146EE63FE64E7891248CD73077FB4F8A46E0381A516BAFB8E48A5F6EE863B665A21DA6ED0
25,289,672 UART: [art] PUB.Y = 5020846226CE2403F5785625F61C8223C844AED1391ECBFDFE05DFCFF5CA295E8FA66D608C2CC6C200D27F5699512B63
25,296,944 UART: [art] SIG.R = 63EE1F15C9B6BBAA706C2F3C9874F216C4B0A16CC0C9B557730D742BD042D414C651FBE3651E48F8AAA5E699EC7BAF25
25,304,347 UART: [art] SIG.S = ECE720F8986FB1811BB2CD1211190BB0A3CB82A7CD22296D8E568E2F5A19423D853972A675122B2730C594C3018E83F8
26,282,867 UART: Caliptra RT
26,283,582 UART: [state] CFI Enabled
26,416,865 UART: [rt] RT listening for mailbox commands...
26,418,730 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,448,557 UART: [rt]cmd =0x46504c54, len=4
26,450,201 >>> mbox cmd response data (8 bytes)
26,451,184 UART: [rt] FIPS self test
26,452,143 UART: [kat] ++
26,452,599 UART: [kat] sha1
26,456,844 UART: [kat] SHA2-256
26,458,725 UART: [kat] SHA2-384
26,461,804 UART: [kat] SHA2-512-ACC
26,462,749 UART: Fatal Error: 0x90050001
26,498,157 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,648,045 >>> mbox cmd response: failed
26,648,733 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,798,680 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
16,888,737 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,200,113 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,001 UART: [kat] SHA2-256
881,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,047 UART: [kat] ++
886,199 UART: [kat] sha1
890,549 UART: [kat] SHA2-256
892,487 UART: [kat] SHA2-384
895,254 UART: [kat] SHA2-512-ACC
897,155 UART: [kat] ECC-384
902,698 UART: [kat] HMAC-384Kdf
907,290 UART: [kat] LMS
1,475,486 UART: [kat] --
1,476,327 UART: [cold-reset] ++
1,476,779 UART: [fht] Storing FHT @ 0x50003400
1,479,448 UART: [idev] ++
1,479,616 UART: [idev] CDI.KEYID = 6
1,479,976 UART: [idev] SUBJECT.KEYID = 7
1,480,400 UART: [idev] UDS.KEYID = 0
1,480,745 ready_for_fw is high
1,480,745 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,108 UART: [idev] Erasing UDS.KEYID = 0
1,504,214 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,694 UART: [idev] --
1,513,695 UART: [ldev] ++
1,513,863 UART: [ldev] CDI.KEYID = 6
1,514,226 UART: [ldev] SUBJECT.KEYID = 5
1,514,652 UART: [ldev] AUTHORITY.KEYID = 7
1,515,115 UART: [ldev] FE.KEYID = 1
1,520,353 UART: [ldev] Erasing FE.KEYID = 1
1,545,692 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,484 UART: [ldev] --
1,584,827 UART: [fwproc] Waiting for Commands...
1,585,674 UART: [fwproc] Received command 0x46574c44
1,586,465 UART: [fwproc] Received Image of size 119428 bytes
2,942,385 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,523 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,741 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,276 >>> mbox cmd response: success
3,143,508 UART: [afmc] ++
3,143,676 UART: [afmc] CDI.KEYID = 6
3,144,038 UART: [afmc] SUBJECT.KEYID = 7
3,144,463 UART: [afmc] AUTHORITY.KEYID = 5
3,179,504 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,782 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,562 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,271 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,154 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,837 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,607 UART: [afmc] --
3,222,577 UART: [cold-reset] --
3,223,191 UART: [state] Locking Datavault
3,224,258 UART: [state] Locking PCR0, PCR1 and PCR31
3,224,862 UART: [state] Locking ICCM
3,225,376 UART: [exit] Launching FMC @ 0x40000130
3,230,706 UART:
3,230,722 UART: Running Caliptra FMC ...
3,231,130 UART:
3,231,184 UART: [state] CFI Enabled
3,241,390 UART: [fht] FMC Alias Private Key: 7
3,360,722 UART: [art] Extend RT PCRs Done
3,361,150 UART: [art] Lock RT PCRs Done
3,362,626 UART: [art] Populate DV Done
3,371,037 UART: [fht] FMC Alias Private Key: 7
3,372,213 UART: [art] Derive CDI
3,372,493 UART: [art] Store in slot 0x4
3,458,545 UART: [art] Derive Key Pair
3,458,905 UART: [art] Store priv key in slot 0x5
3,471,562 UART: [art] Derive Key Pair - Done
3,486,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,501,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,111 UART: [art] PUB.X = 883559D23EE1BFF631264F9DF24D19A5E03184FFBE20283BEDB1A445CD4F53ED5AAABEE3B31F1F59F1DB0F34DCCBE584
3,508,904 UART: [art] PUB.Y = 5258830CE32F583C78B61966BBFDA539E6C4E45D8A43353B7235CEEB384908E9E23C4FA5301A6E114F08B7EA3AB90C8D
3,515,850 UART: [art] SIG.R = 3D4547C4BCFC37B295E7670CB6101A044E3B1710F5BD419C6F871FC2AAA13CBCC82EE0666261AE5D8D41E0EF3A533B08
3,522,625 UART: [art] SIG.S = 7FA3B3EB91917BAF752DF0C81DF9967D5585017BB8698522E4A27A1F845305EAC437DB93C6A7978C4F8FC9CCAD0A99C6
3,546,874 UART: Caliptra RT
3,547,125 UART: [state] CFI Enabled
3,666,728 UART: [rt] RT listening for mailbox commands...
3,667,391 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,134 UART: [rt]cmd =0x46504c54, len=4
3,698,106 >>> mbox cmd response data (8 bytes)
3,698,415 UART: [rt] FIPS self test
3,698,743 UART: [kat] ++
3,698,895 UART: [kat] sha1
3,703,055 UART: [kat] SHA2-256
3,705,077 UART: [kat] SHA2-384
3,707,892 UART: [kat] SHA2-512-ACC
3,708,512 UART: Fatal Error: 0x90050001
3,710,051 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,710,056 >>> mbox cmd response: failed
3,710,056 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,710,061 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,283 UART: [kat] SHA2-256
882,214 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,329 UART: [kat] ++
886,481 UART: [kat] sha1
890,697 UART: [kat] SHA2-256
892,635 UART: [kat] SHA2-384
895,350 UART: [kat] SHA2-512-ACC
897,251 UART: [kat] ECC-384
902,918 UART: [kat] HMAC-384Kdf
907,560 UART: [kat] LMS
1,475,756 UART: [kat] --
1,476,691 UART: [cold-reset] ++
1,477,041 UART: [fht] Storing FHT @ 0x50003400
1,479,892 UART: [idev] ++
1,480,060 UART: [idev] CDI.KEYID = 6
1,480,420 UART: [idev] SUBJECT.KEYID = 7
1,480,844 UART: [idev] UDS.KEYID = 0
1,481,189 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,968 UART: [idev] Erasing UDS.KEYID = 0
1,505,610 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,012 UART: [idev] --
1,515,101 UART: [ldev] ++
1,515,269 UART: [ldev] CDI.KEYID = 6
1,515,632 UART: [ldev] SUBJECT.KEYID = 5
1,516,058 UART: [ldev] AUTHORITY.KEYID = 7
1,516,521 UART: [ldev] FE.KEYID = 1
1,521,969 UART: [ldev] Erasing FE.KEYID = 1
1,547,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,326 UART: [ldev] --
1,586,657 UART: [fwproc] Waiting for Commands...
1,587,366 UART: [fwproc] Received command 0x46574c44
1,588,157 UART: [fwproc] Received Image of size 119428 bytes
2,942,047 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,579 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,797 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,384 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,773 ready_for_fw is high
1,361,773 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,912 >>> mbox cmd response: success
3,053,263 UART:
3,053,279 UART: Running Caliptra FMC ...
3,053,687 UART:
3,053,741 UART: [state] CFI Enabled
3,064,283 UART: [fht] FMC Alias Private Key: 7
3,183,147 UART: [art] Extend RT PCRs Done
3,183,575 UART: [art] Lock RT PCRs Done
3,184,965 UART: [art] Populate DV Done
3,193,104 UART: [fht] FMC Alias Private Key: 7
3,194,070 UART: [art] Derive CDI
3,194,350 UART: [art] Store in slot 0x4
3,280,316 UART: [art] Derive Key Pair
3,280,676 UART: [art] Store priv key in slot 0x5
3,293,783 UART: [art] Derive Key Pair - Done
3,308,593 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,323,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,339 UART: [art] PUB.X = 41674BDBE77E3B47B0F8BE9AE63A62B2ADA244B510D757F2B066BC9498614DC48C9DE5E7E6E400F3274137CE23B92405
3,331,092 UART: [art] PUB.Y = 589C31BF2383C7BFFA182099DB5D225B55120A5B4B7B5277A0A9EBAB3F33BD72FF40B98B20B917F64AB29109667CCC53
3,338,046 UART: [art] SIG.R = 92F025BF1EAB46D62BBEA85AEBAA97E4F3FD94267480067B86025CC5AF1EA85B956B30A7B5412E0030DC53C88CDCF3E9
3,344,806 UART: [art] SIG.S = 62C32F9D9CB8EC3D03DD305A6789F643F5D683F43092B241637C8624A84BF321C334BB53A077DFC92CA41C0F9984C726
3,368,726 UART: Caliptra RT
3,368,977 UART: [state] CFI Enabled
3,489,009 UART: [rt] RT listening for mailbox commands...
3,489,672 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,167 UART: [rt]cmd =0x46504c54, len=4
3,520,267 >>> mbox cmd response data (8 bytes)
3,520,564 UART: [rt] FIPS self test
3,520,892 UART: [kat] ++
3,521,044 UART: [kat] sha1
3,525,332 UART: [kat] SHA2-256
3,527,354 UART: [kat] SHA2-384
3,530,099 UART: [kat] SHA2-512-ACC
3,530,595 UART: Fatal Error: 0x90050001
3,532,134 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,139 >>> mbox cmd response: failed
3,532,139 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,144 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,793 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,240 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,278 UART: [kat] SHA2-256
882,209 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,324 UART: [kat] ++
886,476 UART: [kat] sha1
890,928 UART: [kat] SHA2-256
892,866 UART: [kat] SHA2-384
895,403 UART: [kat] SHA2-512-ACC
897,304 UART: [kat] ECC-384
903,127 UART: [kat] HMAC-384Kdf
907,821 UART: [kat] LMS
1,476,017 UART: [kat] --
1,476,906 UART: [cold-reset] ++
1,477,480 UART: [fht] Storing FHT @ 0x50003400
1,480,231 UART: [idev] ++
1,480,399 UART: [idev] CDI.KEYID = 6
1,480,759 UART: [idev] SUBJECT.KEYID = 7
1,481,183 UART: [idev] UDS.KEYID = 0
1,481,528 ready_for_fw is high
1,481,528 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,471 UART: [idev] Erasing UDS.KEYID = 0
1,506,105 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,597 UART: [idev] --
1,515,644 UART: [ldev] ++
1,515,812 UART: [ldev] CDI.KEYID = 6
1,516,175 UART: [ldev] SUBJECT.KEYID = 5
1,516,601 UART: [ldev] AUTHORITY.KEYID = 7
1,517,064 UART: [ldev] FE.KEYID = 1
1,522,486 UART: [ldev] Erasing FE.KEYID = 1
1,548,419 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,553 UART: [ldev] --
1,587,954 UART: [fwproc] Waiting for Commands...
1,588,577 UART: [fwproc] Received command 0x46574c44
1,589,368 UART: [fwproc] Received Image of size 119428 bytes
2,944,582 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,742 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,960 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,687 >>> mbox cmd response: success
3,145,879 UART: [afmc] ++
3,146,047 UART: [afmc] CDI.KEYID = 6
3,146,409 UART: [afmc] SUBJECT.KEYID = 7
3,146,834 UART: [afmc] AUTHORITY.KEYID = 5
3,181,703 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,945 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,725 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,434 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,317 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,000 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,794 UART: [afmc] --
3,224,822 UART: [cold-reset] --
3,225,790 UART: [state] Locking Datavault
3,227,161 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,765 UART: [state] Locking ICCM
3,228,355 UART: [exit] Launching FMC @ 0x40000130
3,233,685 UART:
3,233,701 UART: Running Caliptra FMC ...
3,234,109 UART:
3,234,252 UART: [state] CFI Enabled
3,244,908 UART: [fht] FMC Alias Private Key: 7
3,363,290 UART: [art] Extend RT PCRs Done
3,363,718 UART: [art] Lock RT PCRs Done
3,365,330 UART: [art] Populate DV Done
3,373,687 UART: [fht] FMC Alias Private Key: 7
3,374,777 UART: [art] Derive CDI
3,375,057 UART: [art] Store in slot 0x4
3,460,947 UART: [art] Derive Key Pair
3,461,307 UART: [art] Store priv key in slot 0x5
3,474,910 UART: [art] Derive Key Pair - Done
3,489,173 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,947 UART: [art] PUB.X = B485C731EE768ACCBCA6E53AD32F916EF1934124DD0158127C22E7D6EE74FAD8DECD28F84E54404A12C1D69E25D1D891
3,511,728 UART: [art] PUB.Y = EC62B12F453DDF6EDA1274E7C0724B67256F8916304840666AC9B1A95D9BCD6D3A3320438E464BEA4C2AD23287CD59FB
3,518,686 UART: [art] SIG.R = 597EA4AEE34DD0C8217CCFAF70DABAE4768956FC377EB9DAC4EBA01033534C0650A0B0F60D03CBE98506A3137BE5CBD7
3,525,466 UART: [art] SIG.S = 26549651A4A0839D0E54CB5B35B4113F789DC59E279FF1ADBBA3CCA8D6CAFC5CDB95C0A728166D5CA13421CE740CB227
3,549,176 UART: Caliptra RT
3,549,519 UART: [state] CFI Enabled
3,670,266 UART: [rt] RT listening for mailbox commands...
3,670,929 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,714 UART: [rt]cmd =0x46504c54, len=4
3,701,902 >>> mbox cmd response data (8 bytes)
3,702,241 UART: [rt] FIPS self test
3,702,569 UART: [kat] ++
3,702,721 UART: [kat] sha1
3,706,909 UART: [kat] SHA2-256
3,708,931 UART: [kat] SHA2-384
3,711,772 UART: [kat] SHA2-512-ACC
3,712,272 UART: Fatal Error: 0x90050001
3,713,811 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,816 >>> mbox cmd response: failed
3,713,816 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,821 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,206 UART: [kat] SHA2-256
882,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,252 UART: [kat] ++
886,404 UART: [kat] sha1
890,844 UART: [kat] SHA2-256
892,782 UART: [kat] SHA2-384
895,523 UART: [kat] SHA2-512-ACC
897,424 UART: [kat] ECC-384
903,095 UART: [kat] HMAC-384Kdf
907,643 UART: [kat] LMS
1,475,839 UART: [kat] --
1,476,784 UART: [cold-reset] ++
1,477,246 UART: [fht] Storing FHT @ 0x50003400
1,480,051 UART: [idev] ++
1,480,219 UART: [idev] CDI.KEYID = 6
1,480,579 UART: [idev] SUBJECT.KEYID = 7
1,481,003 UART: [idev] UDS.KEYID = 0
1,481,348 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,033 UART: [idev] Erasing UDS.KEYID = 0
1,505,741 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,367 UART: [idev] --
1,515,544 UART: [ldev] ++
1,515,712 UART: [ldev] CDI.KEYID = 6
1,516,075 UART: [ldev] SUBJECT.KEYID = 5
1,516,501 UART: [ldev] AUTHORITY.KEYID = 7
1,516,964 UART: [ldev] FE.KEYID = 1
1,522,360 UART: [ldev] Erasing FE.KEYID = 1
1,547,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,883 UART: [ldev] --
1,586,284 UART: [fwproc] Waiting for Commands...
1,586,935 UART: [fwproc] Received command 0x46574c44
1,587,726 UART: [fwproc] Received Image of size 119428 bytes
2,943,274 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,352 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,570 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,309 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,462 ready_for_fw is high
1,362,462 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,151 >>> mbox cmd response: success
3,053,770 UART:
3,053,786 UART: Running Caliptra FMC ...
3,054,194 UART:
3,054,337 UART: [state] CFI Enabled
3,064,829 UART: [fht] FMC Alias Private Key: 7
3,183,853 UART: [art] Extend RT PCRs Done
3,184,281 UART: [art] Lock RT PCRs Done
3,185,853 UART: [art] Populate DV Done
3,194,082 UART: [fht] FMC Alias Private Key: 7
3,195,050 UART: [art] Derive CDI
3,195,330 UART: [art] Store in slot 0x4
3,281,092 UART: [art] Derive Key Pair
3,281,452 UART: [art] Store priv key in slot 0x5
3,294,071 UART: [art] Derive Key Pair - Done
3,309,364 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,912 UART: [art] PUB.X = 819B3DFD6B3E9D116470D9CC1CECDDC38E9D6A18632A2C5FE38D40DED82BA0AF5F8BF41EFF3FC747761DCAD21EE78B9A
3,332,714 UART: [art] PUB.Y = 048EFDD97A1941FB966CD813B656A9B310FF22F837CE78D1B2CA21E0D385A076FC8EAC89049F8389E6342FD13096F90A
3,339,663 UART: [art] SIG.R = C5EC2F6C3469B314605E5B815FAE20E8A6F638868AD019C19E625E648AA8F1E13110D8A0C19E75C9DE63D7F7AA3DAF09
3,346,442 UART: [art] SIG.S = 9FD9327C25ADA7ED2046A7B744EF3CE20EC26C4AC8957C36BAF161DC47E2F92BB16B4CEC92E4ECFF4C2671C604C034EA
3,370,108 UART: Caliptra RT
3,370,451 UART: [state] CFI Enabled
3,491,438 UART: [rt] RT listening for mailbox commands...
3,492,101 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,034 UART: [rt]cmd =0x46504c54, len=4
3,523,068 >>> mbox cmd response data (8 bytes)
3,523,435 UART: [rt] FIPS self test
3,523,763 UART: [kat] ++
3,523,915 UART: [kat] sha1
3,528,303 UART: [kat] SHA2-256
3,530,325 UART: [kat] SHA2-384
3,533,174 UART: [kat] SHA2-512-ACC
3,533,800 UART: Fatal Error: 0x90050001
3,535,339 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,535,344 >>> mbox cmd response: failed
3,535,344 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,535,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,802 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,481 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,844 UART: [kat] SHA2-256
901,784 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
915,843 UART: [kat] HMAC-384Kdf
920,527 UART: [kat] LMS
1,168,839 UART: [kat] --
1,169,742 UART: [cold-reset] ++
1,170,082 UART: [fht] FHT @ 0x50003400
1,172,746 UART: [idev] ++
1,172,914 UART: [idev] CDI.KEYID = 6
1,173,275 UART: [idev] SUBJECT.KEYID = 7
1,173,700 UART: [idev] UDS.KEYID = 0
1,174,046 ready_for_fw is high
1,174,046 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,837 UART: [idev] Erasing UDS.KEYID = 0
1,198,915 UART: [idev] Sha1 KeyId Algorithm
1,207,761 UART: [idev] --
1,208,822 UART: [ldev] ++
1,208,990 UART: [ldev] CDI.KEYID = 6
1,209,354 UART: [ldev] SUBJECT.KEYID = 5
1,209,781 UART: [ldev] AUTHORITY.KEYID = 7
1,210,244 UART: [ldev] FE.KEYID = 1
1,215,174 UART: [ldev] Erasing FE.KEYID = 1
1,241,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,424 UART: [ldev] --
1,280,753 UART: [fwproc] Wait for Commands...
1,281,524 UART: [fwproc] Recv command 0x46574c44
1,282,257 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,321 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,496 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,057 >>> mbox cmd response: success
2,838,245 UART: [afmc] ++
2,838,413 UART: [afmc] CDI.KEYID = 6
2,838,776 UART: [afmc] SUBJECT.KEYID = 7
2,839,202 UART: [afmc] AUTHORITY.KEYID = 5
2,874,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,960 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,709 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,419 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,300 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,001 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,952 UART: [afmc] --
2,917,945 UART: [cold-reset] --
2,918,641 UART: [state] Locking Datavault
2,919,676 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,280 UART: [state] Locking ICCM
2,920,934 UART: [exit] Launching FMC @ 0x40000130
2,926,264 UART:
2,926,280 UART: Running Caliptra FMC ...
2,926,688 UART:
2,926,742 UART: [state] CFI Enabled
2,937,094 UART: [fht] FMC Alias Private Key: 7
3,055,824 UART: [art] Extend RT PCRs Done
3,056,252 UART: [art] Lock RT PCRs Done
3,057,880 UART: [art] Populate DV Done
3,066,011 UART: [fht] FMC Alias Private Key: 7
3,066,973 UART: [art] Derive CDI
3,067,253 UART: [art] Store in slot 0x4
3,152,896 UART: [art] Derive Key Pair
3,153,256 UART: [art] Store priv key in slot 0x5
3,166,870 UART: [art] Derive Key Pair - Done
3,181,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,857 UART: [art] PUB.X = F1A7B75FDED206C4E7B04E8BD3754E3A7078AF603FC50B0AA93F563DD5F99AA8481995E3F00AFF86F122D625248FD4F7
3,204,629 UART: [art] PUB.Y = 5B292C7D0A88F7F08074BF62D3DEC2F64A4BFA28BEF3059CA5DCC7B7CDF51CA8BE6A684FDCD73ABD7D10E26AFB75B9DE
3,211,609 UART: [art] SIG.R = 570F6C05338B047BD7935035B17E6D1764753BFF75E2749B413C8D616563CA3AF63875F617711137BE73D6BBBCC6C4BE
3,218,370 UART: [art] SIG.S = A8DEFF1725ABAD9102F4DBE3714284E5F18E00052353E171730791678A5A11E9EE222A2A96D05B546211B193D14FDE29
3,242,451 UART: Caliptra RT
3,242,702 UART: [state] CFI Enabled
3,361,787 UART: [rt] RT listening for mailbox commands...
3,362,450 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,085 UART: [rt]cmd =0x46504c54, len=4
3,393,129 >>> mbox cmd response data (8 bytes)
3,393,258 UART: [rt] FIPS self test
3,393,586 UART: [kat] ++
3,393,738 UART: [kat] sha1
3,397,986 UART: [kat] SHA2-256
3,400,008 UART: [kat] SHA2-384
3,402,903 UART: [kat] SHA2-512-ACC
3,403,619 UART: Fatal Error: 0x90050001
3,405,158 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,163 >>> mbox cmd response: failed
3,405,163 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,168 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,300 UART: [kat] ++
895,452 UART: [kat] sha1
899,620 UART: [kat] SHA2-256
901,560 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
916,037 UART: [kat] HMAC-384Kdf
920,445 UART: [kat] LMS
1,168,757 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,314 UART: [fht] FHT @ 0x50003400
1,172,982 UART: [idev] ++
1,173,150 UART: [idev] CDI.KEYID = 6
1,173,511 UART: [idev] SUBJECT.KEYID = 7
1,173,936 UART: [idev] UDS.KEYID = 0
1,174,282 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,113 UART: [idev] Erasing UDS.KEYID = 0
1,198,795 UART: [idev] Sha1 KeyId Algorithm
1,207,639 UART: [idev] --
1,208,572 UART: [ldev] ++
1,208,740 UART: [ldev] CDI.KEYID = 6
1,209,104 UART: [ldev] SUBJECT.KEYID = 5
1,209,531 UART: [ldev] AUTHORITY.KEYID = 7
1,209,994 UART: [ldev] FE.KEYID = 1
1,215,074 UART: [ldev] Erasing FE.KEYID = 1
1,241,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,784 UART: [ldev] --
1,281,185 UART: [fwproc] Wait for Commands...
1,281,888 UART: [fwproc] Recv command 0x46574c44
1,282,621 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,435 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,610 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,227 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,530 ready_for_fw is high
1,059,530 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,812 >>> mbox cmd response: success
2,752,155 UART:
2,752,171 UART: Running Caliptra FMC ...
2,752,579 UART:
2,752,633 UART: [state] CFI Enabled
2,763,119 UART: [fht] FMC Alias Private Key: 7
2,882,203 UART: [art] Extend RT PCRs Done
2,882,631 UART: [art] Lock RT PCRs Done
2,884,261 UART: [art] Populate DV Done
2,892,690 UART: [fht] FMC Alias Private Key: 7
2,893,802 UART: [art] Derive CDI
2,894,082 UART: [art] Store in slot 0x4
2,980,167 UART: [art] Derive Key Pair
2,980,527 UART: [art] Store priv key in slot 0x5
2,993,863 UART: [art] Derive Key Pair - Done
3,008,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,721 UART: [art] PUB.X = 406343EFF0270CC83E6908D9A14E3C9199763209ED1F2D4B26D1B859E28F89CA8BE9487B86D7F3ADF63AD78037334F33
3,031,484 UART: [art] PUB.Y = EEBF9723B4A18922067776FA498CE8473D46C7B7789DC60054A473E1E13A650BF6EAC606BFA4A027E5014F561B847C2E
3,038,404 UART: [art] SIG.R = D59EB4A22648A4E48DF8FA2FF9D5879A2FDE5BFF498E3265F76D266869508CC3297DD730254E7C4919D6919099595A74
3,045,174 UART: [art] SIG.S = EA6105C0127C191557AE425CB3CD72FCECC463925F4A9BD2E08B265D882B25553DF528B881A937C10DB08D688143F3AB
3,068,814 UART: Caliptra RT
3,069,065 UART: [state] CFI Enabled
3,188,503 UART: [rt] RT listening for mailbox commands...
3,189,166 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,047 UART: [rt]cmd =0x46504c54, len=4
3,220,045 >>> mbox cmd response data (8 bytes)
3,220,212 UART: [rt] FIPS self test
3,220,540 UART: [kat] ++
3,220,692 UART: [kat] sha1
3,224,742 UART: [kat] SHA2-256
3,226,764 UART: [kat] SHA2-384
3,229,609 UART: [kat] SHA2-512-ACC
3,230,307 UART: Fatal Error: 0x90050001
3,231,846 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,851 >>> mbox cmd response: failed
3,231,851 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,094 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,878 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,252 UART: [state] WD Timer not started. Device not locked for debugging
87,401 UART: [kat] SHA2-256
890,951 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,055 UART: [kat] ++
895,207 UART: [kat] sha1
899,251 UART: [kat] SHA2-256
901,191 UART: [kat] SHA2-384
903,894 UART: [kat] SHA2-512-ACC
905,795 UART: [kat] ECC-384
915,880 UART: [kat] HMAC-384Kdf
920,682 UART: [kat] LMS
1,168,994 UART: [kat] --
1,169,711 UART: [cold-reset] ++
1,170,087 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,174,191 ready_for_fw is high
1,174,191 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,160 UART: [idev] Erasing UDS.KEYID = 0
1,199,150 UART: [idev] Sha1 KeyId Algorithm
1,208,042 UART: [idev] --
1,209,127 UART: [ldev] ++
1,209,295 UART: [ldev] CDI.KEYID = 6
1,209,659 UART: [ldev] SUBJECT.KEYID = 5
1,210,086 UART: [ldev] AUTHORITY.KEYID = 7
1,210,549 UART: [ldev] FE.KEYID = 1
1,215,945 UART: [ldev] Erasing FE.KEYID = 1
1,241,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,557 UART: [ldev] --
1,280,954 UART: [fwproc] Wait for Commands...
1,281,549 UART: [fwproc] Recv command 0x46574c44
1,282,282 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,662,936 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,111 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,604 >>> mbox cmd response: success
2,836,664 UART: [afmc] ++
2,836,832 UART: [afmc] CDI.KEYID = 6
2,837,195 UART: [afmc] SUBJECT.KEYID = 7
2,837,621 UART: [afmc] AUTHORITY.KEYID = 5
2,874,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,512 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,222 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,103 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,804 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,623 UART: [afmc] --
2,917,560 UART: [cold-reset] --
2,918,498 UART: [state] Locking Datavault
2,919,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,591 UART: [state] Locking ICCM
2,921,121 UART: [exit] Launching FMC @ 0x40000130
2,926,451 UART:
2,926,467 UART: Running Caliptra FMC ...
2,926,875 UART:
2,927,018 UART: [state] CFI Enabled
2,937,474 UART: [fht] FMC Alias Private Key: 7
3,056,826 UART: [art] Extend RT PCRs Done
3,057,254 UART: [art] Lock RT PCRs Done
3,058,672 UART: [art] Populate DV Done
3,066,897 UART: [fht] FMC Alias Private Key: 7
3,068,043 UART: [art] Derive CDI
3,068,323 UART: [art] Store in slot 0x4
3,153,944 UART: [art] Derive Key Pair
3,154,304 UART: [art] Store priv key in slot 0x5
3,168,200 UART: [art] Derive Key Pair - Done
3,182,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,517 UART: [art] PUB.X = 409B998DA7197E76009E2A4A37ABF519F78EF7804A4BD5978EED03536B14DE970778D864A3FFE10C7F45132680E45AB7
3,206,258 UART: [art] PUB.Y = 9556DB4E445B8B69F8151462DF2222F9B09FB1D7B5F6025FE2048021F0F3660491A93577A724D1CC6D69591EFFAF0325
3,213,194 UART: [art] SIG.R = F059BD7910EC07D07E4F36B10886226E11DE15AB313E945748CEE150CED54949C8025EE825D97352A5EC2714D0B92814
3,219,953 UART: [art] SIG.S = 5050C06713203D1E17C73E4D2D17067C89835D3F79E923C2CBB3797132F5126D3B2539290268F168EF652915DB2B1CB7
3,243,863 UART: Caliptra RT
3,244,206 UART: [state] CFI Enabled
3,363,203 UART: [rt] RT listening for mailbox commands...
3,363,866 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,653 UART: [rt]cmd =0x46504c54, len=4
3,394,885 >>> mbox cmd response data (8 bytes)
3,395,078 UART: [rt] FIPS self test
3,395,406 UART: [kat] ++
3,395,558 UART: [kat] sha1
3,399,548 UART: [kat] SHA2-256
3,401,570 UART: [kat] SHA2-384
3,404,297 UART: [kat] SHA2-512-ACC
3,404,785 UART: Fatal Error: 0x90050001
3,406,324 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,329 >>> mbox cmd response: failed
3,406,329 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
915,868 UART: [kat] HMAC-384Kdf
920,556 UART: [kat] LMS
1,168,868 UART: [kat] --
1,169,653 UART: [cold-reset] ++
1,169,981 UART: [fht] FHT @ 0x50003400
1,172,657 UART: [idev] ++
1,172,825 UART: [idev] CDI.KEYID = 6
1,173,186 UART: [idev] SUBJECT.KEYID = 7
1,173,611 UART: [idev] UDS.KEYID = 0
1,173,957 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,318 UART: [idev] Erasing UDS.KEYID = 0
1,198,468 UART: [idev] Sha1 KeyId Algorithm
1,207,478 UART: [idev] --
1,208,625 UART: [ldev] ++
1,208,793 UART: [ldev] CDI.KEYID = 6
1,209,157 UART: [ldev] SUBJECT.KEYID = 5
1,209,584 UART: [ldev] AUTHORITY.KEYID = 7
1,210,047 UART: [ldev] FE.KEYID = 1
1,215,207 UART: [ldev] Erasing FE.KEYID = 1
1,241,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,347 UART: [ldev] --
1,280,710 UART: [fwproc] Wait for Commands...
1,281,319 UART: [fwproc] Recv command 0x46574c44
1,282,052 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,774 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,949 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,544 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,259 ready_for_fw is high
1,059,259 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,619 >>> mbox cmd response: success
2,754,758 UART:
2,754,774 UART: Running Caliptra FMC ...
2,755,182 UART:
2,755,325 UART: [state] CFI Enabled
2,765,749 UART: [fht] FMC Alias Private Key: 7
2,884,483 UART: [art] Extend RT PCRs Done
2,884,911 UART: [art] Lock RT PCRs Done
2,886,367 UART: [art] Populate DV Done
2,894,546 UART: [fht] FMC Alias Private Key: 7
2,895,616 UART: [art] Derive CDI
2,895,896 UART: [art] Store in slot 0x4
2,981,877 UART: [art] Derive Key Pair
2,982,237 UART: [art] Store priv key in slot 0x5
2,995,613 UART: [art] Derive Key Pair - Done
3,010,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,704 UART: [art] PUB.X = 5B77E434D65FAFC078686CA687BDB386F6C3EDA2706F3A0943F28BF70667301FE2A43D738768BCB360A5F4B055E5486B
3,033,474 UART: [art] PUB.Y = 04D13CB3FCE56B69E6CD9F39EFC1174ED12D62EB5D3905CFFEC19084C2B9C7092C98E544F31F62ECA76DA7A5C0E761E5
3,040,435 UART: [art] SIG.R = 22B24D9109DCF17447C86FEBAE019891C40C480888FD0D531BAAD51042E533C6E0D9DE60CC7EC71979A38DC841CB46AB
3,047,202 UART: [art] SIG.S = 6AD4CA14845C51BC714D096A0048C9252E288EB3946ADDBBDBD43AB357F2C10970CE96B4B75E9FAFD85780A0B20422A3
3,071,009 UART: Caliptra RT
3,071,352 UART: [state] CFI Enabled
3,191,882 UART: [rt] RT listening for mailbox commands...
3,192,545 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,258 UART: [rt]cmd =0x46504c54, len=4
3,223,516 >>> mbox cmd response data (8 bytes)
3,223,839 UART: [rt] FIPS self test
3,224,167 UART: [kat] ++
3,224,319 UART: [kat] sha1
3,228,585 UART: [kat] SHA2-256
3,230,607 UART: [kat] SHA2-384
3,233,434 UART: [kat] SHA2-512-ACC
3,234,012 UART: Fatal Error: 0x90050001
3,235,551 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,556 >>> mbox cmd response: failed
3,235,556 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,603 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,457 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,848 UART: [kat] SHA2-256
893,498 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,623 UART: [kat] ++
897,775 UART: [kat] sha1
902,151 UART: [kat] SHA2-256
904,091 UART: [kat] SHA2-384
906,800 UART: [kat] SHA2-512-ACC
908,701 UART: [kat] ECC-384
918,544 UART: [kat] HMAC-384Kdf
923,360 UART: [kat] LMS
1,171,688 UART: [kat] --
1,172,559 UART: [cold-reset] ++
1,172,945 UART: [fht] FHT @ 0x50003400
1,175,546 UART: [idev] ++
1,175,714 UART: [idev] CDI.KEYID = 6
1,176,074 UART: [idev] SUBJECT.KEYID = 7
1,176,498 UART: [idev] UDS.KEYID = 0
1,176,843 ready_for_fw is high
1,176,843 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,594 UART: [idev] Erasing UDS.KEYID = 0
1,201,829 UART: [idev] Sha1 KeyId Algorithm
1,210,357 UART: [idev] --
1,211,561 UART: [ldev] ++
1,211,729 UART: [ldev] CDI.KEYID = 6
1,212,092 UART: [ldev] SUBJECT.KEYID = 5
1,212,518 UART: [ldev] AUTHORITY.KEYID = 7
1,212,981 UART: [ldev] FE.KEYID = 1
1,218,255 UART: [ldev] Erasing FE.KEYID = 1
1,244,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,071 UART: [ldev] --
1,283,388 UART: [fwproc] Wait for Commands...
1,284,130 UART: [fwproc] Recv command 0x46574c44
1,284,858 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,160 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,330 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,005 >>> mbox cmd response: success
2,841,121 UART: [afmc] ++
2,841,289 UART: [afmc] CDI.KEYID = 6
2,841,651 UART: [afmc] SUBJECT.KEYID = 7
2,842,076 UART: [afmc] AUTHORITY.KEYID = 5
2,877,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,468 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,177 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,060 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,761 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,611 UART: [afmc] --
2,920,577 UART: [cold-reset] --
2,921,345 UART: [state] Locking Datavault
2,922,398 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,002 UART: [state] Locking ICCM
2,923,430 UART: [exit] Launching FMC @ 0x40000130
2,928,760 UART:
2,928,776 UART: Running Caliptra FMC ...
2,929,184 UART:
2,929,238 UART: [state] CFI Enabled
2,939,878 UART: [fht] FMC Alias Private Key: 7
3,058,686 UART: [art] Extend RT PCRs Done
3,059,114 UART: [art] Lock RT PCRs Done
3,060,922 UART: [art] Populate DV Done
3,069,075 UART: [fht] FMC Alias Private Key: 7
3,070,181 UART: [art] Derive CDI
3,070,461 UART: [art] Store in slot 0x4
3,156,590 UART: [art] Derive Key Pair
3,156,950 UART: [art] Store priv key in slot 0x5
3,169,356 UART: [art] Derive Key Pair - Done
3,184,063 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,699 UART: [art] PUB.X = D2961614625A410123D5E0958AC1C7243F4C24FB90F86ADD8D42E2FEEF4F38BC077C8C031BF70BDDAC8543CA9F1981D1
3,207,469 UART: [art] PUB.Y = C0603D03E3ABA3C9FDCF4C5348E0E4277F5151B75475B472CD875FC6A2B1EF88DE50E5DA590690AD2A69936FC2AC8CB7
3,214,429 UART: [art] SIG.R = F4980B219994F294B62B45802ABA987750A6254ECC5604FBF65A8B40B397967649391923DE65F9C920736B784BBD00BC
3,221,165 UART: [art] SIG.S = 759B5475A4676C6D13CD8622D8964BA949DDF232AE70B84BC1FE4FDB4E19F43D2D28FD05C2106B86BA4E36ADFD030A0C
3,245,337 UART: Caliptra RT
3,245,588 UART: [state] CFI Enabled
3,364,681 UART: [rt] RT listening for mailbox commands...
3,365,344 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,353 UART: [rt]cmd =0x46504c54, len=4
3,396,587 >>> mbox cmd response data (8 bytes)
3,396,810 UART: [rt] FIPS self test
3,397,138 UART: [kat] ++
3,397,290 UART: [kat] sha1
3,401,592 UART: [kat] SHA2-256
3,403,614 UART: [kat] SHA2-384
3,406,519 UART: [kat] SHA2-512-ACC
3,407,131 UART: Fatal Error: 0x90050001
3,408,670 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,675 >>> mbox cmd response: failed
3,408,675 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,680 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
893,118 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,243 UART: [kat] ++
897,395 UART: [kat] sha1
901,615 UART: [kat] SHA2-256
903,555 UART: [kat] SHA2-384
906,288 UART: [kat] SHA2-512-ACC
908,189 UART: [kat] ECC-384
918,340 UART: [kat] HMAC-384Kdf
923,076 UART: [kat] LMS
1,171,404 UART: [kat] --
1,172,537 UART: [cold-reset] ++
1,172,961 UART: [fht] FHT @ 0x50003400
1,175,554 UART: [idev] ++
1,175,722 UART: [idev] CDI.KEYID = 6
1,176,082 UART: [idev] SUBJECT.KEYID = 7
1,176,506 UART: [idev] UDS.KEYID = 0
1,176,851 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,992 UART: [idev] Erasing UDS.KEYID = 0
1,201,149 UART: [idev] Sha1 KeyId Algorithm
1,209,707 UART: [idev] --
1,210,919 UART: [ldev] ++
1,211,087 UART: [ldev] CDI.KEYID = 6
1,211,450 UART: [ldev] SUBJECT.KEYID = 5
1,211,876 UART: [ldev] AUTHORITY.KEYID = 7
1,212,339 UART: [ldev] FE.KEYID = 1
1,217,471 UART: [ldev] Erasing FE.KEYID = 1
1,243,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,317 UART: [ldev] --
1,282,664 UART: [fwproc] Wait for Commands...
1,283,234 UART: [fwproc] Recv command 0x46574c44
1,283,962 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,426 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,596 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,221 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,285 ready_for_fw is high
1,060,285 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,176 >>> mbox cmd response: success
2,753,355 UART:
2,753,371 UART: Running Caliptra FMC ...
2,753,779 UART:
2,753,833 UART: [state] CFI Enabled
2,764,465 UART: [fht] FMC Alias Private Key: 7
2,883,355 UART: [art] Extend RT PCRs Done
2,883,783 UART: [art] Lock RT PCRs Done
2,885,109 UART: [art] Populate DV Done
2,893,456 UART: [fht] FMC Alias Private Key: 7
2,894,592 UART: [art] Derive CDI
2,894,872 UART: [art] Store in slot 0x4
2,980,387 UART: [art] Derive Key Pair
2,980,747 UART: [art] Store priv key in slot 0x5
2,993,741 UART: [art] Derive Key Pair - Done
3,008,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,164 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,929 UART: [art] PUB.X = 8143B144D1196731D8B34C6A5B1C768FEE1AA1B575B1BE446CD33A4314C7B2174A1D660952C0B7A5A5B18E0BE7900A86
3,031,694 UART: [art] PUB.Y = FA7E94E79D01D9C92A94BDA2C5EFB7D9A5CEE81FF46A796733E9591CFE903F5CBEC6360644510D8454A8BF518D2E578A
3,038,651 UART: [art] SIG.R = 0DC4461067B583683A85C083E37B5FAFBBB2EF87B23BB5F631E1EE47200DBB50962B07C173DA6F344526F7DD9A12DB1E
3,045,424 UART: [art] SIG.S = 9D6543DA988B9F542D39C560FECE28CF21FB998541E6D822B5F00B99033CC2FBBD4D368411CD413C4682486168C9BA01
3,069,057 UART: Caliptra RT
3,069,308 UART: [state] CFI Enabled
3,188,233 UART: [rt] RT listening for mailbox commands...
3,188,896 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,645 UART: [rt]cmd =0x46504c54, len=4
3,219,865 >>> mbox cmd response data (8 bytes)
3,219,998 UART: [rt] FIPS self test
3,220,326 UART: [kat] ++
3,220,478 UART: [kat] sha1
3,224,654 UART: [kat] SHA2-256
3,226,676 UART: [kat] SHA2-384
3,229,567 UART: [kat] SHA2-512-ACC
3,230,279 UART: Fatal Error: 0x90050001
3,231,818 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,823 >>> mbox cmd response: failed
3,231,823 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,828 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,187 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,128 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,430 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
893,273 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,398 UART: [kat] ++
897,550 UART: [kat] sha1
901,892 UART: [kat] SHA2-256
903,832 UART: [kat] SHA2-384
906,707 UART: [kat] SHA2-512-ACC
908,608 UART: [kat] ECC-384
918,489 UART: [kat] HMAC-384Kdf
923,207 UART: [kat] LMS
1,171,535 UART: [kat] --
1,172,328 UART: [cold-reset] ++
1,172,858 UART: [fht] FHT @ 0x50003400
1,175,591 UART: [idev] ++
1,175,759 UART: [idev] CDI.KEYID = 6
1,176,119 UART: [idev] SUBJECT.KEYID = 7
1,176,543 UART: [idev] UDS.KEYID = 0
1,176,888 ready_for_fw is high
1,176,888 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,389 UART: [idev] Erasing UDS.KEYID = 0
1,201,118 UART: [idev] Sha1 KeyId Algorithm
1,209,530 UART: [idev] --
1,210,638 UART: [ldev] ++
1,210,806 UART: [ldev] CDI.KEYID = 6
1,211,169 UART: [ldev] SUBJECT.KEYID = 5
1,211,595 UART: [ldev] AUTHORITY.KEYID = 7
1,212,058 UART: [ldev] FE.KEYID = 1
1,217,498 UART: [ldev] Erasing FE.KEYID = 1
1,244,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,018 UART: [ldev] --
1,283,411 UART: [fwproc] Wait for Commands...
1,284,077 UART: [fwproc] Recv command 0x46574c44
1,284,805 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,075 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,245 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,882 >>> mbox cmd response: success
2,840,974 UART: [afmc] ++
2,841,142 UART: [afmc] CDI.KEYID = 6
2,841,504 UART: [afmc] SUBJECT.KEYID = 7
2,841,929 UART: [afmc] AUTHORITY.KEYID = 5
2,876,670 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,431 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,179 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,888 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,771 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,472 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,176 UART: [afmc] --
2,920,230 UART: [cold-reset] --
2,921,068 UART: [state] Locking Datavault
2,922,349 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,953 UART: [state] Locking ICCM
2,923,387 UART: [exit] Launching FMC @ 0x40000130
2,928,717 UART:
2,928,733 UART: Running Caliptra FMC ...
2,929,141 UART:
2,929,284 UART: [state] CFI Enabled
2,940,138 UART: [fht] FMC Alias Private Key: 7
3,059,084 UART: [art] Extend RT PCRs Done
3,059,512 UART: [art] Lock RT PCRs Done
3,061,012 UART: [art] Populate DV Done
3,069,313 UART: [fht] FMC Alias Private Key: 7
3,070,265 UART: [art] Derive CDI
3,070,545 UART: [art] Store in slot 0x4
3,156,340 UART: [art] Derive Key Pair
3,156,700 UART: [art] Store priv key in slot 0x5
3,170,940 UART: [art] Derive Key Pair - Done
3,185,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,553 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,318 UART: [art] PUB.X = 2CB832812B711839C046CA9B1940AFDC70A0DE5C46175346EA4A86C820E43E127C3EC70E21413C758D14121ED2D66E63
3,209,085 UART: [art] PUB.Y = AD431791D6962ED7781EA9D627F74246A40E1C78182964D635AD266593C21DF625B67CEDF252B11414C2A904302EB6C7
3,216,025 UART: [art] SIG.R = AFA2AF329C555C96224C46FFB93CE354F740D8D59F79208861EAB92923CFD0CC2F79DA363C269704DFFFE9D325F805EC
3,222,803 UART: [art] SIG.S = 2AF68F3C836027CB799B906BB8D566B1923D378E0E312D2F2956AC519B5B718D8A4889A143EDBF2515C4B124269BCEB2
3,247,004 UART: Caliptra RT
3,247,347 UART: [state] CFI Enabled
3,368,260 UART: [rt] RT listening for mailbox commands...
3,368,923 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,794 UART: [rt]cmd =0x46504c54, len=4
3,399,922 >>> mbox cmd response data (8 bytes)
3,400,213 UART: [rt] FIPS self test
3,400,541 UART: [kat] ++
3,400,693 UART: [kat] sha1
3,405,035 UART: [kat] SHA2-256
3,407,057 UART: [kat] SHA2-384
3,410,050 UART: [kat] SHA2-512-ACC
3,410,546 UART: Fatal Error: 0x90050001
3,412,085 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,090 >>> mbox cmd response: failed
3,412,090 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,095 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
893,255 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,380 UART: [kat] ++
897,532 UART: [kat] sha1
901,670 UART: [kat] SHA2-256
903,610 UART: [kat] SHA2-384
906,369 UART: [kat] SHA2-512-ACC
908,270 UART: [kat] ECC-384
917,869 UART: [kat] HMAC-384Kdf
922,555 UART: [kat] LMS
1,170,883 UART: [kat] --
1,171,644 UART: [cold-reset] ++
1,172,174 UART: [fht] FHT @ 0x50003400
1,174,867 UART: [idev] ++
1,175,035 UART: [idev] CDI.KEYID = 6
1,175,395 UART: [idev] SUBJECT.KEYID = 7
1,175,819 UART: [idev] UDS.KEYID = 0
1,176,164 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,993 UART: [idev] Erasing UDS.KEYID = 0
1,201,278 UART: [idev] Sha1 KeyId Algorithm
1,209,776 UART: [idev] --
1,210,808 UART: [ldev] ++
1,210,976 UART: [ldev] CDI.KEYID = 6
1,211,339 UART: [ldev] SUBJECT.KEYID = 5
1,211,765 UART: [ldev] AUTHORITY.KEYID = 7
1,212,228 UART: [ldev] FE.KEYID = 1
1,217,500 UART: [ldev] Erasing FE.KEYID = 1
1,243,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,944 UART: [ldev] --
1,283,219 UART: [fwproc] Wait for Commands...
1,283,977 UART: [fwproc] Recv command 0x46574c44
1,284,705 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,837 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,007 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,618 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,728 ready_for_fw is high
1,060,728 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,921 >>> mbox cmd response: success
2,755,964 UART:
2,755,980 UART: Running Caliptra FMC ...
2,756,388 UART:
2,756,531 UART: [state] CFI Enabled
2,767,095 UART: [fht] FMC Alias Private Key: 7
2,886,121 UART: [art] Extend RT PCRs Done
2,886,549 UART: [art] Lock RT PCRs Done
2,888,115 UART: [art] Populate DV Done
2,896,352 UART: [fht] FMC Alias Private Key: 7
2,897,496 UART: [art] Derive CDI
2,897,776 UART: [art] Store in slot 0x4
2,983,647 UART: [art] Derive Key Pair
2,984,007 UART: [art] Store priv key in slot 0x5
2,997,491 UART: [art] Derive Key Pair - Done
3,012,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,708 UART: [art] PUB.X = F0C055D98AB528F6870C1DF4821FA2D75F629B5D3E55891F55C3E4BB9D889A1EF2C0CA1D43208D43B127A01904A28233
3,035,476 UART: [art] PUB.Y = A9BBAAEEA4CAC049AA393B3D60F517EFE69CB3A8D91C3D18252C34189875DBA30DC61112CCBBBCBAB8D8AA4C8F9B0F42
3,042,452 UART: [art] SIG.R = CAC0862F19EC8730162F7A839A2ACEE0A0A1D72A636F2B79001324EEE068945BCF0DA607E937B041E02769F117F70B3A
3,049,197 UART: [art] SIG.S = E7A5E55E4FB1BACF76DE273F7A82B764B221276D6DEF27AE0BD696FEDC4E1068DCE15E276EE43FA99CE27581631B5AD9
3,073,036 UART: Caliptra RT
3,073,379 UART: [state] CFI Enabled
3,192,931 UART: [rt] RT listening for mailbox commands...
3,193,594 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,363 UART: [rt]cmd =0x46504c54, len=4
3,224,529 >>> mbox cmd response data (8 bytes)
3,224,808 UART: [rt] FIPS self test
3,225,136 UART: [kat] ++
3,225,288 UART: [kat] sha1
3,229,528 UART: [kat] SHA2-256
3,231,550 UART: [kat] SHA2-384
3,234,479 UART: [kat] SHA2-512-ACC
3,235,039 UART: Fatal Error: 0x90050001
3,236,578 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,236,583 >>> mbox cmd response: failed
3,236,583 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,236,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,142 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,423 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
2,697,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,847,529 >>> mbox cmd response: failed
2,848,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,996,820 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,434,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,284,170 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
2,690,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,840,486 >>> mbox cmd response: failed
2,841,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,989,781 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,420,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,244,145 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
3,053,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,203,731 >>> mbox cmd response: failed
3,204,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,353,199 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
20,176,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,884,863 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,045,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,195,605 >>> mbox cmd response: failed
3,196,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,345,036 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,171,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,876,787 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
2,697,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,847,770 >>> mbox cmd response: failed
2,848,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,997,209 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,454,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,284,661 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
2,697,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,847,359 >>> mbox cmd response: failed
2,847,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,996,800 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,434,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,263,098 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,045,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,195,660 >>> mbox cmd response: failed
3,196,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,345,108 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,176,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,895,704 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,045,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,195,414 >>> mbox cmd response: failed
3,195,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,345,039 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
20,178,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,887,168 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,866 >>> mbox cmd response: failed
812,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,170 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,282 >>> mbox cmd response: failed
813,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,288 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,806 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,249 >>> mbox cmd response: failed
813,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,255 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,493 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,067 >>> mbox cmd response: failed
813,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,073 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,967 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,986 >>> mbox cmd response: failed
812,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,992 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,874 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,946 >>> mbox cmd response: failed
812,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,952 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,699,538 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,495 >>> mbox cmd response: failed
813,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,501 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,979 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,379 >>> mbox cmd response: failed
813,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,981 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,194 UART:
192,577 UART: Running Caliptra ROM ...
193,676 UART:
193,826 UART: [state] CFI Enabled
264,399 UART: [state] LifecycleState = Unprovisioned
266,324 UART: [state] DebugLocked = No
268,086 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,072 UART: [kat] SHA2-256
441,785 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,242 UART: [kat] ++
452,849 UART: [kat] sha1
464,225 UART: [kat] SHA2-256
466,956 UART: [kat] SHA2-384
473,232 UART: [kat] SHA2-512-ACC
475,607 UART: [kat] ECC-384
2,767,853 UART: [kat] HMAC-384Kdf
2,799,574 UART: [kat] LMS
3,989,879 UART: [kat] --
3,994,714 UART: [cold-reset] ++
3,995,622 UART: [fht] Storing FHT @ 0x50003400
4,007,260 UART: [idev] ++
4,007,845 UART: [idev] CDI.KEYID = 6
4,008,758 UART: [idev] SUBJECT.KEYID = 7
4,010,034 UART: [idev] UDS.KEYID = 0
4,011,086 ready_for_fw is high
4,011,321 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,994 UART: [idev] Erasing UDS.KEYID = 0
7,347,157 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,918 UART: [idev] --
7,373,887 UART: [ldev] ++
7,374,455 UART: [ldev] CDI.KEYID = 6
7,375,477 UART: [ldev] SUBJECT.KEYID = 5
7,376,703 UART: [ldev] AUTHORITY.KEYID = 7
7,377,900 UART: [ldev] FE.KEYID = 1
7,421,985 UART: [ldev] Erasing FE.KEYID = 1
10,756,585 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,148 UART: [ldev] --
13,135,777 UART: [fwproc] Waiting for Commands...
13,137,812 UART: [fwproc] Received command 0x46574c44
13,140,012 UART: [fwproc] Received Image of size 119428 bytes
17,259,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,338,432 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,411,624 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,742,978 >>> mbox cmd response: success
17,747,977 UART: [afmc] ++
17,748,569 UART: [afmc] CDI.KEYID = 6
17,749,480 UART: [afmc] SUBJECT.KEYID = 7
17,750,695 UART: [afmc] AUTHORITY.KEYID = 5
21,112,870 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,415,003 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,417,282 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,431,788 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,446,483 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,460,908 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,482,172 UART: [afmc] --
23,486,417 UART: [cold-reset] --
23,490,123 UART: [state] Locking Datavault
23,495,049 UART: [state] Locking PCR0, PCR1 and PCR31
23,496,812 UART: [state] Locking ICCM
23,498,963 UART: [exit] Launching FMC @ 0x40000130
23,507,364 UART:
23,507,599 UART: Running Caliptra FMC ...
23,508,705 UART:
23,508,868 UART: [state] CFI Enabled
23,574,684 UART: [fht] FMC Alias Private Key: 7
25,915,477 UART: [art] Extend RT PCRs Done
25,916,716 UART: [art] Lock RT PCRs Done
25,918,603 UART: [art] Populate DV Done
25,923,970 UART: [fht] FMC Alias Private Key: 7
25,925,453 UART: [art] Derive CDI
25,926,186 UART: [art] Store in slot 0x4
25,983,657 UART: [art] Derive Key Pair
25,984,699 UART: [art] Store priv key in slot 0x5
29,277,435 UART: [art] Derive Key Pair - Done
29,290,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,571,670 UART: [art] Erasing AUTHORITY.KEYID = 7
31,573,200 UART: [art] PUB.X = C7B70379193FB2484889D7C1F614D35893FFC71307964B63B43E9ADECA843C0122FABA8777A48F5201E62BE46577BEE2
31,580,410 UART: [art] PUB.Y = AEFE3DAE84F9378B80CCAB252D36BE279DD1F59EF2FC2830C45217DED78357537E1728542EE29E83A932C7A07FC5B49B
31,587,710 UART: [art] SIG.R = D51CCDD4E55CAF5156F7CDE607B35702FEF0C1BA16E705306D20676980F57B80CDE4F64E2E7A3722936DEA9867086ABA
31,595,107 UART: [art] SIG.S = 06DE61ED0376D3E83633EBAB8E3111CC0DA383BF9B569D6397A690D72DC5330934708F80DC05FAEFB68628C0F1143910
32,900,047 UART: Caliptra RT
32,900,759 UART: [state] CFI Enabled
33,076,720 UART: [rt] RT listening for mailbox commands...
33,078,594 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,108,496 UART: [rt]cmd =0x46504c54, len=4
33,109,853 >>> mbox cmd response data (8 bytes)
33,111,148 UART: [rt] FIPS self test
33,112,099 UART: [kat] ++
33,112,549 UART: [kat] sha1
33,116,790 UART: [kat] SHA2-256
33,118,720 UART: [kat] SHA2-384
33,119,626 UART: Fatal Error: 0x90020001
33,155,351 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,306,028 >>> mbox cmd response: failed
33,306,660 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,456,704 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,029 UART:
190,346 UART: Running Caliptra ROM ...
191,407 UART:
191,549 UART: [state] CFI Enabled
245,114 UART: [state] LifecycleState = Unprovisioned
247,086 UART: [state] DebugLocked = No
249,122 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
254,448 UART: [kat] SHA2-256
424,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
434,671 UART: [kat] ++
435,144 UART: [kat] sha1
445,371 UART: [kat] SHA2-256
448,052 UART: [kat] SHA2-384
454,468 UART: [kat] SHA2-512-ACC
456,872 UART: [kat] ECC-384
2,751,714 UART: [kat] HMAC-384Kdf
2,783,390 UART: [kat] LMS
3,973,714 UART: [kat] --
3,979,784 UART: [cold-reset] ++
3,981,836 UART: [fht] Storing FHT @ 0x50003400
3,993,101 UART: [idev] ++
3,993,667 UART: [idev] CDI.KEYID = 6
3,994,578 UART: [idev] SUBJECT.KEYID = 7
3,995,844 UART: [idev] UDS.KEYID = 0
3,997,469 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,147,571 UART: [idev] Erasing UDS.KEYID = 0
7,326,607 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,451 UART: [idev] --
7,352,992 UART: [ldev] ++
7,353,570 UART: [ldev] CDI.KEYID = 6
7,354,511 UART: [ldev] SUBJECT.KEYID = 5
7,355,784 UART: [ldev] AUTHORITY.KEYID = 7
7,356,933 UART: [ldev] FE.KEYID = 1
7,385,539 UART: [ldev] Erasing FE.KEYID = 1
10,718,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,032,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,062,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,076,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,524 UART: [ldev] --
13,099,549 UART: [fwproc] Waiting for Commands...
13,101,658 UART: [fwproc] Received command 0x46574c44
13,103,849 UART: [fwproc] Received Image of size 119428 bytes
17,219,126 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,293,659 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,366,853 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,699,241 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,785,955 ready_for_fw is high
3,786,450 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,979,010 >>> mbox cmd response: success
23,695,129 UART:
23,695,545 UART: Running Caliptra FMC ...
23,696,696 UART:
23,696,855 UART: [state] CFI Enabled
23,764,313 UART: [fht] FMC Alias Private Key: 7
26,104,900 UART: [art] Extend RT PCRs Done
26,106,131 UART: [art] Lock RT PCRs Done
26,107,490 UART: [art] Populate DV Done
26,112,872 UART: [fht] FMC Alias Private Key: 7
26,114,479 UART: [art] Derive CDI
26,115,301 UART: [art] Store in slot 0x4
26,171,856 UART: [art] Derive Key Pair
26,172,861 UART: [art] Store priv key in slot 0x5
29,465,593 UART: [art] Derive Key Pair - Done
29,478,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,767,403 UART: [art] Erasing AUTHORITY.KEYID = 7
31,768,914 UART: [art] PUB.X = D0B83FA5F944ECF450BF0C38BDFE3D9F98C07A02B81B519E57A3543B49B05FE5D7E41AE3F746697911A98A476015E236
31,776,187 UART: [art] PUB.Y = 963C39D648393C82A8F4E640542123E340051957BD585274F8FE271C3E55FC65207B0A28BEBB44B44C5BA72AD23433D1
31,783,433 UART: [art] SIG.R = B6AEDB8D5909977FF6E67F0A64231ABDF2EA34A0CD28F6ABEDF14367DBEDFF1C880AA74DF50E68C683D937041C65C920
31,790,849 UART: [art] SIG.S = CE4A2B470EB028E9433CDB14798B81863F843937DA977ABFEBC7B2626AF6037BE2053533AA6BEB60309E843EE6A6C751
33,096,000 UART: Caliptra RT
33,096,711 UART: [state] CFI Enabled
33,273,434 UART: [rt] RT listening for mailbox commands...
33,275,282 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,304,764 UART: [rt]cmd =0x46504c54, len=4
33,306,263 >>> mbox cmd response data (8 bytes)
33,307,588 UART: [rt] FIPS self test
33,308,527 UART: [kat] ++
33,308,977 UART: [kat] sha1
33,313,479 UART: [kat] SHA2-256
33,315,360 UART: [kat] SHA2-384
33,316,646 UART: Fatal Error: 0x90020001
33,351,852 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,501,846 >>> mbox cmd response: failed
33,502,504 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,652,398 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
3,770,509 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,968,255 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,564 UART:
192,925 UART: Running Caliptra ROM ...
194,024 UART:
603,629 UART: [state] CFI Enabled
616,936 UART: [state] LifecycleState = Unprovisioned
618,887 UART: [state] DebugLocked = No
621,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,523 UART: [kat] SHA2-256
796,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,814 UART: [kat] ++
807,268 UART: [kat] sha1
819,066 UART: [kat] SHA2-256
821,804 UART: [kat] SHA2-384
827,374 UART: [kat] SHA2-512-ACC
829,750 UART: [kat] ECC-384
3,112,727 UART: [kat] HMAC-384Kdf
3,124,303 UART: [kat] LMS
4,314,368 UART: [kat] --
4,319,646 UART: [cold-reset] ++
4,322,157 UART: [fht] Storing FHT @ 0x50003400
4,333,785 UART: [idev] ++
4,334,361 UART: [idev] CDI.KEYID = 6
4,335,423 UART: [idev] SUBJECT.KEYID = 7
4,336,538 UART: [idev] UDS.KEYID = 0
4,337,582 ready_for_fw is high
4,337,806 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,487,791 UART: [idev] Erasing UDS.KEYID = 0
7,624,428 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,433 UART: [idev] --
7,648,516 UART: [ldev] ++
7,649,150 UART: [ldev] CDI.KEYID = 6
7,650,069 UART: [ldev] SUBJECT.KEYID = 5
7,651,294 UART: [ldev] AUTHORITY.KEYID = 7
7,652,531 UART: [ldev] FE.KEYID = 1
7,661,724 UART: [ldev] Erasing FE.KEYID = 1
10,947,422 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,238 UART: [ldev] --
13,306,916 UART: [fwproc] Waiting for Commands...
13,310,211 UART: [fwproc] Received command 0x46574c44
13,312,404 UART: [fwproc] Received Image of size 119428 bytes
17,431,923 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,508,220 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,581,399 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,912,943 >>> mbox cmd response: success
17,916,710 UART: [afmc] ++
17,917,309 UART: [afmc] CDI.KEYID = 6
17,918,287 UART: [afmc] SUBJECT.KEYID = 7
17,919,508 UART: [afmc] AUTHORITY.KEYID = 5
21,238,794 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,533,335 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,535,622 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,550,065 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,564,763 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,579,192 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,601,571 UART: [afmc] --
23,604,647 UART: [cold-reset] --
23,608,035 UART: [state] Locking Datavault
23,613,509 UART: [state] Locking PCR0, PCR1 and PCR31
23,615,272 UART: [state] Locking ICCM
23,617,967 UART: [exit] Launching FMC @ 0x40000130
23,626,365 UART:
23,626,608 UART: Running Caliptra FMC ...
23,627,715 UART:
23,627,882 UART: [state] CFI Enabled
23,635,988 UART: [fht] FMC Alias Private Key: 7
25,975,337 UART: [art] Extend RT PCRs Done
25,976,581 UART: [art] Lock RT PCRs Done
25,978,052 UART: [art] Populate DV Done
25,983,582 UART: [fht] FMC Alias Private Key: 7
25,985,135 UART: [art] Derive CDI
25,985,901 UART: [art] Store in slot 0x4
26,028,499 UART: [art] Derive Key Pair
26,029,551 UART: [art] Store priv key in slot 0x5
29,271,793 UART: [art] Derive Key Pair - Done
29,284,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,565,017 UART: [art] Erasing AUTHORITY.KEYID = 7
31,566,535 UART: [art] PUB.X = 3633038E864D0A5777AB99A302BC76EB7332F0DF293929891641835C802DB35C27CAB89DBF4E7B05CB4C6F07602A5EB4
31,573,795 UART: [art] PUB.Y = CF4CE31836A04558C010542332125EEDB89B3780C42BBB9E7575DE0BCDD81D170DE8B83994975A5765D6C147EB5D76AF
31,581,044 UART: [art] SIG.R = 2A6E4C9A6EA7A8656AB3DC00C5402FAF02089F9879EF311D03C77D47819C58C13416796888866FF9FBEB1C44AA9DF2B6
31,588,391 UART: [art] SIG.S = 1FFDC7A0C889D7E427D53AED0ABBBEBCDE38F6E127E3535C8F449E5371BA9A59DD2B1920D9384275C6C4570536E426F0
32,893,524 UART: Caliptra RT
32,894,243 UART: [state] CFI Enabled
33,028,772 UART: [rt] RT listening for mailbox commands...
33,030,775 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,060,532 UART: [rt]cmd =0x46504c54, len=4
33,062,116 >>> mbox cmd response data (8 bytes)
33,063,102 UART: [rt] FIPS self test
33,064,052 UART: [kat] ++
33,064,515 UART: [kat] sha1
33,069,141 UART: [kat] SHA2-256
33,071,081 UART: [kat] SHA2-384
33,072,108 UART: Fatal Error: 0x90020001
33,107,324 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,257,264 >>> mbox cmd response: failed
33,257,930 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,407,857 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,138 UART:
190,436 UART: Running Caliptra ROM ...
191,468 UART:
7,127,220 UART: [state] CFI Enabled
7,139,512 UART: [state] LifecycleState = Unprovisioned
7,141,424 UART: [state] DebugLocked = No
7,143,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,148,409 UART: [kat] SHA2-256
7,318,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,328,701 UART: [kat] ++
7,329,165 UART: [kat] sha1
7,339,516 UART: [kat] SHA2-256
7,342,217 UART: [kat] SHA2-384
7,349,237 UART: [kat] SHA2-512-ACC
7,351,590 UART: [kat] ECC-384
9,634,700 UART: [kat] HMAC-384Kdf
9,646,300 UART: [kat] LMS
10,836,395 UART: [kat] --
10,840,664 UART: [cold-reset] ++
10,842,447 UART: [fht] Storing FHT @ 0x50003400
10,852,529 UART: [idev] ++
10,853,098 UART: [idev] CDI.KEYID = 6
10,854,120 UART: [idev] SUBJECT.KEYID = 7
10,855,288 UART: [idev] UDS.KEYID = 0
10,856,924 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,007,248 UART: [idev] Erasing UDS.KEYID = 0
14,141,618 UART: [idev] Using Sha1 for KeyId Algorithm
14,163,102 UART: [idev] --
14,166,878 UART: [ldev] ++
14,167,449 UART: [ldev] CDI.KEYID = 6
14,168,421 UART: [ldev] SUBJECT.KEYID = 5
14,169,586 UART: [ldev] AUTHORITY.KEYID = 7
14,170,903 UART: [ldev] FE.KEYID = 1
14,181,665 UART: [ldev] Erasing FE.KEYID = 1
17,468,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,758,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,773,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,788,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,802,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,821,097 UART: [ldev] --
19,826,692 UART: [fwproc] Waiting for Commands...
19,830,034 UART: [fwproc] Received command 0x46574c44
19,832,224 UART: [fwproc] Received Image of size 119428 bytes
23,945,915 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,022,751 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,095,893 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,427,223 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
4,129,841 ready_for_fw is high
4,130,523 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,179,488 >>> mbox cmd response: success
23,824,170 UART:
23,824,614 UART: Running Caliptra FMC ...
23,825,734 UART:
23,825,899 UART: [state] CFI Enabled
23,833,746 UART: [fht] FMC Alias Private Key: 7
26,173,902 UART: [art] Extend RT PCRs Done
26,175,154 UART: [art] Lock RT PCRs Done
26,176,866 UART: [art] Populate DV Done
26,182,188 UART: [fht] FMC Alias Private Key: 7
26,183,863 UART: [art] Derive CDI
26,184,691 UART: [art] Store in slot 0x4
26,227,400 UART: [art] Derive Key Pair
26,228,408 UART: [art] Store priv key in slot 0x5
29,470,529 UART: [art] Derive Key Pair - Done
29,483,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,763,906 UART: [art] Erasing AUTHORITY.KEYID = 7
31,765,646 UART: [art] PUB.X = E7283AF44BEE3AF877755D931F248B8EF6BDD9842D0749C66A3A3800CC05599A10A574693058F6E73658CB94F0FE6D86
31,772,735 UART: [art] PUB.Y = 69D3A0C6CA2198CD4A1369D6F780FFB5FE88521DC761D5F7736C1DC3F39A86B18F5688A16AC618B64081EDD0C859C26C
31,779,952 UART: [art] SIG.R = 5943182C564FE628829C60356473568E91542507F0CA5D0D079138A9A9335CA9A747E0AD3732AE3021990CFA814E507D
31,787,318 UART: [art] SIG.S = 6B3DC2B26E57E4A0B1603AC0DDB52E80485791644395705F552F2D05658A2E0746BA432E2B774C44306A119E300BC61A
33,092,406 UART: Caliptra RT
33,093,125 UART: [state] CFI Enabled
33,225,663 UART: [rt] RT listening for mailbox commands...
33,227,523 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,257,224 UART: [rt]cmd =0x46504c54, len=4
33,258,885 >>> mbox cmd response data (8 bytes)
33,259,670 UART: [rt] FIPS self test
33,260,622 UART: [kat] ++
33,261,079 UART: [kat] sha1
33,265,488 UART: [kat] SHA2-256
33,267,426 UART: [kat] SHA2-384
33,268,556 UART: Fatal Error: 0x90020001
33,303,890 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,454,234 >>> mbox cmd response: failed
33,454,918 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,604,722 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
10,439,089 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,482,722 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,131 UART:
192,487 UART: Running Caliptra ROM ...
193,714 UART:
193,870 UART: [state] CFI Enabled
264,131 UART: [state] LifecycleState = Unprovisioned
266,179 UART: [state] DebugLocked = No
268,276 UART: [state] WD Timer not started. Device not locked for debugging
272,712 UART: [kat] SHA2-256
452,347 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,129 UART: [kat] ++
463,618 UART: [kat] sha1
473,290 UART: [kat] SHA2-256
476,025 UART: [kat] SHA2-384
482,026 UART: [kat] SHA2-512-ACC
484,405 UART: [kat] ECC-384
2,948,445 UART: [kat] HMAC-384Kdf
2,973,279 UART: [kat] LMS
3,449,761 UART: [kat] --
3,454,251 UART: [cold-reset] ++
3,455,625 UART: [fht] FHT @ 0x50003400
3,467,107 UART: [idev] ++
3,467,748 UART: [idev] CDI.KEYID = 6
3,468,664 UART: [idev] SUBJECT.KEYID = 7
3,469,915 UART: [idev] UDS.KEYID = 0
3,470,849 ready_for_fw is high
3,471,086 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,353 UART: [idev] Erasing UDS.KEYID = 0
5,989,003 UART: [idev] Sha1 KeyId Algorithm
6,012,247 UART: [idev] --
6,016,139 UART: [ldev] ++
6,016,719 UART: [ldev] CDI.KEYID = 6
6,017,636 UART: [ldev] SUBJECT.KEYID = 5
6,018,824 UART: [ldev] AUTHORITY.KEYID = 7
6,020,064 UART: [ldev] FE.KEYID = 1
6,058,920 UART: [ldev] Erasing FE.KEYID = 1
8,564,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,672 UART: [ldev] --
10,377,965 UART: [fwproc] Wait for Commands...
10,379,854 UART: [fwproc] Recv command 0x46574c44
10,381,848 UART: [fwproc] Recv'd Img size: 119428 bytes
13,873,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,186 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,203 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,355,622 >>> mbox cmd response: success
14,359,731 UART: [afmc] ++
14,360,326 UART: [afmc] CDI.KEYID = 6
14,361,240 UART: [afmc] SUBJECT.KEYID = 7
14,362,463 UART: [afmc] AUTHORITY.KEYID = 5
16,894,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,347 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,176 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,253 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,789 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,500 UART: [afmc] --
18,697,923 UART: [cold-reset] --
18,702,605 UART: [state] Locking Datavault
18,709,428 UART: [state] Locking PCR0, PCR1 and PCR31
18,711,188 UART: [state] Locking ICCM
18,713,185 UART: [exit] Launching FMC @ 0x40000130
18,721,600 UART:
18,721,852 UART: Running Caliptra FMC ...
18,722,962 UART:
18,723,120 UART: [state] CFI Enabled
18,776,807 UART: [fht] FMC Alias Private Key: 7
20,542,570 UART: [art] Extend RT PCRs Done
20,543,796 UART: [art] Lock RT PCRs Done
20,545,285 UART: [art] Populate DV Done
20,550,862 UART: [fht] FMC Alias Private Key: 7
20,552,405 UART: [art] Derive CDI
20,553,142 UART: [art] Store in slot 0x4
20,610,605 UART: [art] Derive Key Pair
20,611,648 UART: [art] Store priv key in slot 0x5
23,074,513 UART: [art] Derive Key Pair - Done
23,087,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,625 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,157 UART: [art] PUB.X = 58788DB9195ABE764A409A14A57D43361AC0473E9B312CCAC8DDC17D51C963D6905FE6BE2C6AA5C58E386EC566559F5C
24,808,443 UART: [art] PUB.Y = 2846DB5CF7E99E92A1B46958CBB5BE864E93D22BC7E7B488DEC62B777DCC0A2AE6BF51E1DD9B03287DCD09411B818DA5
24,815,758 UART: [art] SIG.R = FD36CF94A438113CD65E24E193D3E7E3EAE20A647CE5C9A9B7FFCE47DA810B90C155A2462953E84335220909FE3896F6
24,823,133 UART: [art] SIG.S = E6D6CEE1533D513293B0E67DC5B27A8E3E65FB59118A693A0D8F9FF86EA2A43E65DCE25320D094F82BAF1373928AFC4F
25,802,421 UART: Caliptra RT
25,803,131 UART: [state] CFI Enabled
25,982,939 UART: [rt] RT listening for mailbox commands...
25,984,792 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,014,749 UART: [rt]cmd =0x46504c54, len=4
26,016,443 >>> mbox cmd response data (8 bytes)
26,017,302 UART: [rt] FIPS self test
26,018,253 UART: [kat] ++
26,018,714 UART: [kat] sha1
26,022,959 UART: [kat] SHA2-256
26,024,837 UART: [kat] SHA2-384
26,025,999 UART: Fatal Error: 0x90020001
26,061,394 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,211,391 >>> mbox cmd response: failed
26,212,034 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,361,924 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
189,998 UART:
190,289 UART: Running Caliptra ROM ...
191,320 UART:
191,462 UART: [state] CFI Enabled
250,072 UART: [state] LifecycleState = Unprovisioned
252,053 UART: [state] DebugLocked = No
253,893 UART: [state] WD Timer not started. Device not locked for debugging
257,083 UART: [kat] SHA2-256
436,719 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
447,532 UART: [kat] ++
448,001 UART: [kat] sha1
459,915 UART: [kat] SHA2-256
462,607 UART: [kat] SHA2-384
467,509 UART: [kat] SHA2-512-ACC
469,852 UART: [kat] ECC-384
2,931,267 UART: [kat] HMAC-384Kdf
2,954,405 UART: [kat] LMS
3,430,898 UART: [kat] --
3,435,185 UART: [cold-reset] ++
3,436,477 UART: [fht] FHT @ 0x50003400
3,448,108 UART: [idev] ++
3,448,721 UART: [idev] CDI.KEYID = 6
3,449,645 UART: [idev] SUBJECT.KEYID = 7
3,450,865 UART: [idev] UDS.KEYID = 0
3,452,434 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,602,513 UART: [idev] Erasing UDS.KEYID = 0
5,971,235 UART: [idev] Sha1 KeyId Algorithm
5,995,821 UART: [idev] --
6,000,894 UART: [ldev] ++
6,001,506 UART: [ldev] CDI.KEYID = 6
6,002,404 UART: [ldev] SUBJECT.KEYID = 5
6,003,630 UART: [ldev] AUTHORITY.KEYID = 7
6,004,877 UART: [ldev] FE.KEYID = 1
6,040,570 UART: [ldev] Erasing FE.KEYID = 1
8,546,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,849 UART: [ldev] --
10,355,068 UART: [fwproc] Wait for Commands...
10,357,817 UART: [fwproc] Recv command 0x46574c44
10,359,830 UART: [fwproc] Recv'd Img size: 119428 bytes
13,850,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,131 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,188 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,340,977 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,463,524 ready_for_fw is high
3,464,018 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,256,507 >>> mbox cmd response: success
18,537,329 UART:
18,537,784 UART: Running Caliptra FMC ...
18,538,915 UART:
18,539,085 UART: [state] CFI Enabled
18,606,528 UART: [fht] FMC Alias Private Key: 7
20,394,535 UART: [art] Extend RT PCRs Done
20,395,778 UART: [art] Lock RT PCRs Done
20,397,420 UART: [art] Populate DV Done
20,402,755 UART: [fht] FMC Alias Private Key: 7
20,404,425 UART: [art] Derive CDI
20,405,369 UART: [art] Store in slot 0x4
20,460,711 UART: [art] Derive Key Pair
20,461,759 UART: [art] Store priv key in slot 0x5
22,924,684 UART: [art] Derive Key Pair - Done
22,937,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,651,317 UART: [art] Erasing AUTHORITY.KEYID = 7
24,652,961 UART: [art] PUB.X = 1DE59C19877E98536346B0F26AFF986028260E23F85F34FAD8C625C15607F7250A17961E3F81FDF28D06E2C788BADE7E
24,660,072 UART: [art] PUB.Y = 6E3A7A6C9E50A91A10B058E0470487545BDA22449F4E4D4126135396E73C92B2112C474CF3DBFE3A86094A6D0EE8ACFC
24,667,333 UART: [art] SIG.R = B00CDF8D303944090B3B35D4F0CC74F3F7654A1D4B64B4631D1AF20A45163CE3705D356C99AA8597AF3F65977B16BBA5
24,674,766 UART: [art] SIG.S = 2C6EB684FF672D4F95E40D8AD52025905A62675D88A74C2FE32457411D2CFCF6E874FE458E716594C38D997C29FC15ED
25,652,782 UART: Caliptra RT
25,653,490 UART: [state] CFI Enabled
25,834,056 UART: [rt] RT listening for mailbox commands...
25,835,912 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,865,939 UART: [rt]cmd =0x46504c54, len=4
25,867,615 >>> mbox cmd response data (8 bytes)
25,868,788 UART: [rt] FIPS self test
25,869,737 UART: [kat] ++
25,870,200 UART: [kat] sha1
25,874,609 UART: [kat] SHA2-256
25,876,508 UART: [kat] SHA2-384
25,877,746 UART: Fatal Error: 0x90020001
25,912,963 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,063,282 >>> mbox cmd response: failed
26,063,935 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,213,846 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,445,158 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,218,223 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,379 UART:
192,782 UART: Running Caliptra ROM ...
193,985 UART:
603,477 UART: [state] CFI Enabled
617,261 UART: [state] LifecycleState = Unprovisioned
619,231 UART: [state] DebugLocked = No
621,465 UART: [state] WD Timer not started. Device not locked for debugging
625,384 UART: [kat] SHA2-256
805,003 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,801 UART: [kat] ++
816,256 UART: [kat] sha1
826,989 UART: [kat] SHA2-256
829,719 UART: [kat] SHA2-384
834,514 UART: [kat] SHA2-512-ACC
836,892 UART: [kat] ECC-384
3,279,133 UART: [kat] HMAC-384Kdf
3,291,177 UART: [kat] LMS
3,767,653 UART: [kat] --
3,772,529 UART: [cold-reset] ++
3,774,063 UART: [fht] FHT @ 0x50003400
3,786,156 UART: [idev] ++
3,786,737 UART: [idev] CDI.KEYID = 6
3,787,782 UART: [idev] SUBJECT.KEYID = 7
3,788,963 UART: [idev] UDS.KEYID = 0
3,789,893 ready_for_fw is high
3,790,120 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,940,145 UART: [idev] Erasing UDS.KEYID = 0
6,270,865 UART: [idev] Sha1 KeyId Algorithm
6,295,038 UART: [idev] --
6,299,962 UART: [ldev] ++
6,300,593 UART: [ldev] CDI.KEYID = 6
6,301,506 UART: [ldev] SUBJECT.KEYID = 5
6,302,672 UART: [ldev] AUTHORITY.KEYID = 7
6,303,963 UART: [ldev] FE.KEYID = 1
6,316,087 UART: [ldev] Erasing FE.KEYID = 1
8,792,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,044 UART: [ldev] --
10,586,190 UART: [fwproc] Wait for Commands...
10,588,293 UART: [fwproc] Recv command 0x46574c44
10,590,291 UART: [fwproc] Recv'd Img size: 119428 bytes
14,082,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,922 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,942 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,562,567 >>> mbox cmd response: success
14,566,969 UART: [afmc] ++
14,567,559 UART: [afmc] CDI.KEYID = 6
14,568,544 UART: [afmc] SUBJECT.KEYID = 7
14,569,708 UART: [afmc] AUTHORITY.KEYID = 5
17,071,642 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,794,870 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,797,043 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,812,881 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,828,939 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,844,520 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,869,245 UART: [afmc] --
18,873,861 UART: [cold-reset] --
18,877,566 UART: [state] Locking Datavault
18,884,651 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,348 UART: [state] Locking ICCM
18,887,558 UART: [exit] Launching FMC @ 0x40000130
18,895,958 UART:
18,896,243 UART: Running Caliptra FMC ...
18,897,301 UART:
18,897,457 UART: [state] CFI Enabled
18,905,895 UART: [fht] FMC Alias Private Key: 7
20,672,216 UART: [art] Extend RT PCRs Done
20,673,424 UART: [art] Lock RT PCRs Done
20,675,021 UART: [art] Populate DV Done
20,680,550 UART: [fht] FMC Alias Private Key: 7
20,682,150 UART: [art] Derive CDI
20,682,915 UART: [art] Store in slot 0x4
20,725,565 UART: [art] Derive Key Pair
20,726,566 UART: [art] Store priv key in slot 0x5
23,153,152 UART: [art] Derive Key Pair - Done
23,165,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,871,802 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,293 UART: [art] PUB.X = 75165A9949E1483F18AB729BD988301E3243073B633270AAB74A58127744755B0E1B11AC2A13E493CE23BE678D5B58DD
24,880,554 UART: [art] PUB.Y = F29E2C106EC599C0C0D7C950C6A41681D9564D362F32715E8B1B3B74DD205163D9E4304AC96F7B85E24A7B40F3727FF5
24,887,825 UART: [art] SIG.R = 7960DE574D3974DB03A2B7762C82FB37129DE9926FFE5E4D246121A041B52A851BB036AE853B722F2F1CF095044C3325
24,895,266 UART: [art] SIG.S = 58DCAA1CBC8EC91162BAADB53EB4840E7C9404CEC2F8601D874EF5B82B54D524CDBB3B464D02616E945E2FD7BC577E77
25,874,328 UART: Caliptra RT
25,875,045 UART: [state] CFI Enabled
26,006,965 UART: [rt] RT listening for mailbox commands...
26,008,817 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,038,419 UART: [rt]cmd =0x46504c54, len=4
26,039,924 >>> mbox cmd response data (8 bytes)
26,041,115 UART: [rt] FIPS self test
26,042,067 UART: [kat] ++
26,042,530 UART: [kat] sha1
26,046,884 UART: [kat] SHA2-256
26,048,772 UART: [kat] SHA2-384
26,050,171 UART: Fatal Error: 0x90020001
26,085,383 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,235,393 >>> mbox cmd response: failed
26,235,993 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,385,868 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
190,082 UART:
190,371 UART: Running Caliptra ROM ...
191,484 UART:
14,144,332 UART: [state] CFI Enabled
14,155,914 UART: [state] LifecycleState = Unprovisioned
14,157,832 UART: [state] DebugLocked = No
14,160,526 UART: [state] WD Timer not started. Device not locked for debugging
14,164,496 UART: [kat] SHA2-256
14,344,165 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,354,931 UART: [kat] ++
14,355,421 UART: [kat] sha1
14,366,366 UART: [kat] SHA2-256
14,369,086 UART: [kat] SHA2-384
14,374,974 UART: [kat] SHA2-512-ACC
14,377,329 UART: [kat] ECC-384
16,822,947 UART: [kat] HMAC-384Kdf
16,835,449 UART: [kat] LMS
17,311,949 UART: [kat] --
17,316,961 UART: [cold-reset] ++
17,318,196 UART: [fht] FHT @ 0x50003400
17,329,552 UART: [idev] ++
17,330,119 UART: [idev] CDI.KEYID = 6
17,331,087 UART: [idev] SUBJECT.KEYID = 7
17,332,304 UART: [idev] UDS.KEYID = 0
17,333,897 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,484,182 UART: [idev] Erasing UDS.KEYID = 0
19,811,306 UART: [idev] Sha1 KeyId Algorithm
19,835,830 UART: [idev] --
19,840,710 UART: [ldev] ++
19,841,281 UART: [ldev] CDI.KEYID = 6
19,842,174 UART: [ldev] SUBJECT.KEYID = 5
19,843,388 UART: [ldev] AUTHORITY.KEYID = 7
19,844,675 UART: [ldev] FE.KEYID = 1
19,857,189 UART: [ldev] Erasing FE.KEYID = 1
22,336,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,055,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,071,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,087,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,103,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,125,391 UART: [ldev] --
24,130,831 UART: [fwproc] Wait for Commands...
24,133,147 UART: [fwproc] Recv command 0x46574c44
24,135,150 UART: [fwproc] Recv'd Img size: 119428 bytes
27,624,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,707,124 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,780,177 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,112,196 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,779,440 ready_for_fw is high
3,779,983 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,454,428 >>> mbox cmd response: success
18,702,529 UART:
18,702,927 UART: Running Caliptra FMC ...
18,704,135 UART:
18,704,308 UART: [state] CFI Enabled
18,711,903 UART: [fht] FMC Alias Private Key: 7
20,477,864 UART: [art] Extend RT PCRs Done
20,479,112 UART: [art] Lock RT PCRs Done
20,480,744 UART: [art] Populate DV Done
20,486,401 UART: [fht] FMC Alias Private Key: 7
20,488,000 UART: [art] Derive CDI
20,488,835 UART: [art] Store in slot 0x4
20,531,660 UART: [art] Derive Key Pair
20,532,709 UART: [art] Store priv key in slot 0x5
22,959,937 UART: [art] Derive Key Pair - Done
22,972,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,260 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,770 UART: [art] PUB.X = 928F24B36A6F519CC81F2CFB42967F81E5434F2385D11F7C7940B5A61FD47FB6E0B889312267539E435DE8F082313391
24,688,026 UART: [art] PUB.Y = 32DC0FF02DE8466D7B8471420C87BC1BF0819DC0997844704DFA74311A2EDFD2A2CAC47B09E873D08E9ABC2107F905A2
24,695,313 UART: [art] SIG.R = 797DDF6AEDACBD83147D746189C1EB68666430DDBD1DA2D663A1C7C0469C16EF59ADC580BCE49789BB29F59A26374343
24,702,730 UART: [art] SIG.S = 475ED5F8866EA7CECB62329049E463562F29A1DB38CF94EEE72D8DD80AF8D5166E74136E391BAEE845FB08E17780AE83
25,681,653 UART: Caliptra RT
25,682,365 UART: [state] CFI Enabled
25,815,168 UART: [rt] RT listening for mailbox commands...
25,817,031 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,846,891 UART: [rt]cmd =0x46504c54, len=4
25,848,366 >>> mbox cmd response data (8 bytes)
25,849,520 UART: [rt] FIPS self test
25,850,464 UART: [kat] ++
25,850,918 UART: [kat] sha1
25,855,376 UART: [kat] SHA2-256
25,857,312 UART: [kat] SHA2-384
25,858,381 UART: Fatal Error: 0x90020001
25,893,766 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,043,643 >>> mbox cmd response: failed
26,044,261 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,194,189 >>> mbox cmd response: failed
Initializing fuses
931 writing to cptra_bootfsm_go
17,509,486 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,201,661 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
192,021 UART:
192,396 UART: Running Caliptra ROM ...
193,535 UART:
193,705 UART: [state] CFI Enabled
265,291 UART: [state] LifecycleState = Unprovisioned
267,703 UART: [state] DebugLocked = No
270,306 UART: [state] WD Timer not started. Device not locked for debugging
275,424 UART: [kat] SHA2-256
465,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,058 UART: [kat] ++
476,546 UART: [kat] sha1
488,498 UART: [kat] SHA2-256
491,512 UART: [kat] SHA2-384
496,942 UART: [kat] SHA2-512-ACC
499,466 UART: [kat] ECC-384
2,947,967 UART: [kat] HMAC-384Kdf
2,971,934 UART: [kat] LMS
3,503,706 UART: [kat] --
3,509,975 UART: [cold-reset] ++
3,511,863 UART: [fht] FHT @ 0x50003400
3,523,699 UART: [idev] ++
3,524,418 UART: [idev] CDI.KEYID = 6
3,525,458 UART: [idev] SUBJECT.KEYID = 7
3,526,514 UART: [idev] UDS.KEYID = 0
3,527,488 ready_for_fw is high
3,527,712 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,677,889 UART: [idev] Erasing UDS.KEYID = 0
6,047,698 UART: [idev] Sha1 KeyId Algorithm
6,068,819 UART: [idev] --
6,073,802 UART: [ldev] ++
6,074,491 UART: [ldev] CDI.KEYID = 6
6,075,406 UART: [ldev] SUBJECT.KEYID = 5
6,076,571 UART: [ldev] AUTHORITY.KEYID = 7
6,077,752 UART: [ldev] FE.KEYID = 1
6,121,033 UART: [ldev] Erasing FE.KEYID = 1
8,629,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,697 UART: [ldev] --
10,435,702 UART: [fwproc] Wait for Commands...
10,438,672 UART: [fwproc] Recv command 0x46574c44
10,440,934 UART: [fwproc] Recv'd Img size: 119428 bytes
13,948,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,021,631 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,145,213 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,710,879 >>> mbox cmd response: success
14,715,381 UART: [afmc] ++
14,716,091 UART: [afmc] CDI.KEYID = 6
14,717,286 UART: [afmc] SUBJECT.KEYID = 7
14,718,802 UART: [afmc] AUTHORITY.KEYID = 5
17,261,013 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,002,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,004,816 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,019,934 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,035,071 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,049,995 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,073,978 UART: [afmc] --
19,077,582 UART: [cold-reset] --
19,081,838 UART: [state] Locking Datavault
19,089,091 UART: [state] Locking PCR0, PCR1 and PCR31
19,091,331 UART: [state] Locking ICCM
19,092,584 UART: [exit] Launching FMC @ 0x40000130
19,101,206 UART:
19,101,454 UART: Running Caliptra FMC ...
19,102,563 UART:
19,102,745 UART: [state] CFI Enabled
19,160,673 UART: [fht] FMC Alias Private Key: 7
20,927,181 UART: [art] Extend RT PCRs Done
20,928,562 UART: [art] Lock RT PCRs Done
20,929,941 UART: [art] Populate DV Done
20,935,317 UART: [fht] FMC Alias Private Key: 7
20,936,862 UART: [art] Derive CDI
20,937,681 UART: [art] Store in slot 0x4
20,993,859 UART: [art] Derive Key Pair
20,994,863 UART: [art] Store priv key in slot 0x5
23,457,554 UART: [art] Derive Key Pair - Done
23,470,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,183,098 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,619 UART: [art] PUB.X = 6E4092315CA95DF02CF7352C94CBC416A1662E4188BC8326096A074A2517DEF6A8CE3C600E0B57D698CB5FD05257D888
25,191,876 UART: [art] PUB.Y = C790B3C59CC40AB09FE7E1DB470141B4394E0B36E8AE282EC15B12825B5CB260BA8FC863EC5029F086F3A87A953F9529
25,199,128 UART: [art] SIG.R = 52C74531F4C65C3912E8A074FC0FCA4A21F6A784CA0F2BD9783D5CF899E9B249E5EB68FFF882DA9DA9EA98EF82991C25
25,206,560 UART: [art] SIG.S = A7099482FE0650C646B3B84A1F214489C732761F47A2885BD50AE12F34643A9A94A48372E25DAE6B3494F2A73739B6CB
26,185,381 UART: Caliptra RT
26,186,096 UART: [state] CFI Enabled
26,367,968 UART: [rt] RT listening for mailbox commands...
26,369,961 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,399,815 UART: [rt]cmd =0x46504c54, len=4
26,401,451 >>> mbox cmd response data (8 bytes)
26,402,574 UART: [rt] FIPS self test
26,403,516 UART: [kat] ++
26,403,977 UART: [kat] sha1
26,408,320 UART: [kat] SHA2-256
26,410,255 UART: [kat] SHA2-384
26,411,162 UART: Fatal Error: 0x90020001
26,446,370 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,596,340 >>> mbox cmd response: failed
26,596,929 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,746,846 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
190,086 UART:
190,385 UART: Running Caliptra ROM ...
191,499 UART:
191,648 UART: [state] CFI Enabled
249,321 UART: [state] LifecycleState = Unprovisioned
251,643 UART: [state] DebugLocked = No
253,096 UART: [state] WD Timer not started. Device not locked for debugging
257,338 UART: [kat] SHA2-256
447,202 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
457,985 UART: [kat] ++
458,436 UART: [kat] sha1
468,830 UART: [kat] SHA2-256
471,900 UART: [kat] SHA2-384
478,392 UART: [kat] SHA2-512-ACC
480,960 UART: [kat] ECC-384
2,931,831 UART: [kat] HMAC-384Kdf
2,955,365 UART: [kat] LMS
3,487,101 UART: [kat] --
3,492,128 UART: [cold-reset] ++
3,494,012 UART: [fht] FHT @ 0x50003400
3,506,351 UART: [idev] ++
3,507,030 UART: [idev] CDI.KEYID = 6
3,507,975 UART: [idev] SUBJECT.KEYID = 7
3,509,189 UART: [idev] UDS.KEYID = 0
3,510,679 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,660,797 UART: [idev] Erasing UDS.KEYID = 0
6,012,192 UART: [idev] Sha1 KeyId Algorithm
6,033,475 UART: [idev] --
6,037,938 UART: [ldev] ++
6,038,599 UART: [ldev] CDI.KEYID = 6
6,039,494 UART: [ldev] SUBJECT.KEYID = 5
6,040,711 UART: [ldev] AUTHORITY.KEYID = 7
6,041,893 UART: [ldev] FE.KEYID = 1
6,072,581 UART: [ldev] Erasing FE.KEYID = 1
8,581,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,330,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,345,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,361,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,381,020 UART: [ldev] --
10,386,615 UART: [fwproc] Wait for Commands...
10,389,210 UART: [fwproc] Recv command 0x46574c44
10,391,475 UART: [fwproc] Recv'd Img size: 119428 bytes
13,906,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,983,781 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,107,388 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,673,658 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,435,173 ready_for_fw is high
3,435,719 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,838,958 >>> mbox cmd response: success
19,137,986 UART:
19,138,396 UART: Running Caliptra FMC ...
19,139,519 UART:
19,139,681 UART: [state] CFI Enabled
19,203,473 UART: [fht] FMC Alias Private Key: 7
20,969,866 UART: [art] Extend RT PCRs Done
20,971,079 UART: [art] Lock RT PCRs Done
20,972,277 UART: [art] Populate DV Done
20,977,806 UART: [fht] FMC Alias Private Key: 7
20,979,352 UART: [art] Derive CDI
20,980,179 UART: [art] Store in slot 0x4
21,036,098 UART: [art] Derive Key Pair
21,037,168 UART: [art] Store priv key in slot 0x5
23,500,051 UART: [art] Derive Key Pair - Done
23,513,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,111 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,641 UART: [art] PUB.X = 8BA5EBA815DB1B19E87A23145A9FD540DC673070278BC823AE010FE06C93F4574EB66EF02E942869FE2FB9E5CB57CF99
25,234,855 UART: [art] PUB.Y = 962FF962C26600D186B5FEC3E9B397CF96CE37221406411B8741237AA210963011279287A0A5915F562A9457FD3F7868
25,242,109 UART: [art] SIG.R = F328774ECEDFFD107C93EFA0C28755D8791D7DE3AA7A7E06B9CE8B16B8FDD90CBA6D19C5FBF8EFD85301639EEC4EDE55
25,249,523 UART: [art] SIG.S = 21B5124046D413C1C25715119FFC3FA9679624DE4509E1CF999CDD29771CCE66B24A9B56AD9B332A77DE944DB974F6A2
26,227,980 UART: Caliptra RT
26,228,695 UART: [state] CFI Enabled
26,410,042 UART: [rt] RT listening for mailbox commands...
26,411,905 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,441,818 UART: [rt]cmd =0x46504c54, len=4
26,443,559 >>> mbox cmd response data (8 bytes)
26,444,620 UART: [rt] FIPS self test
26,445,563 UART: [kat] ++
26,446,022 UART: [kat] sha1
26,450,586 UART: [kat] SHA2-256
26,452,464 UART: [kat] SHA2-384
26,453,372 UART: Fatal Error: 0x90020001
26,488,776 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,638,777 >>> mbox cmd response: failed
26,639,404 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,789,200 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
3,425,548 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,830,395 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,565 UART:
192,938 UART: Running Caliptra ROM ...
194,148 UART:
603,587 UART: [state] CFI Enabled
617,808 UART: [state] LifecycleState = Unprovisioned
620,174 UART: [state] DebugLocked = No
622,631 UART: [state] WD Timer not started. Device not locked for debugging
626,409 UART: [kat] SHA2-256
816,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,097 UART: [kat] ++
827,649 UART: [kat] sha1
838,962 UART: [kat] SHA2-256
841,981 UART: [kat] SHA2-384
846,703 UART: [kat] SHA2-512-ACC
849,290 UART: [kat] ECC-384
3,291,296 UART: [kat] HMAC-384Kdf
3,303,429 UART: [kat] LMS
3,835,215 UART: [kat] --
3,839,169 UART: [cold-reset] ++
3,840,118 UART: [fht] FHT @ 0x50003400
3,851,200 UART: [idev] ++
3,851,885 UART: [idev] CDI.KEYID = 6
3,852,783 UART: [idev] SUBJECT.KEYID = 7
3,854,043 UART: [idev] UDS.KEYID = 0
3,854,957 ready_for_fw is high
3,855,188 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,005,091 UART: [idev] Erasing UDS.KEYID = 0
6,328,190 UART: [idev] Sha1 KeyId Algorithm
6,350,810 UART: [idev] --
6,355,027 UART: [ldev] ++
6,355,718 UART: [ldev] CDI.KEYID = 6
6,356,635 UART: [ldev] SUBJECT.KEYID = 5
6,357,800 UART: [ldev] AUTHORITY.KEYID = 7
6,359,037 UART: [ldev] FE.KEYID = 1
6,369,128 UART: [ldev] Erasing FE.KEYID = 1
8,849,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,964 UART: [ldev] --
10,640,392 UART: [fwproc] Wait for Commands...
10,643,429 UART: [fwproc] Recv command 0x46574c44
10,645,700 UART: [fwproc] Recv'd Img size: 119428 bytes
14,153,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,237,797 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,384 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,927,127 >>> mbox cmd response: success
14,931,652 UART: [afmc] ++
14,932,356 UART: [afmc] CDI.KEYID = 6
14,933,599 UART: [afmc] SUBJECT.KEYID = 7
14,935,036 UART: [afmc] AUTHORITY.KEYID = 5
17,434,306 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,155,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,157,318 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,172,388 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,187,550 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,202,428 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,226,533 UART: [afmc] --
19,229,613 UART: [cold-reset] --
19,233,383 UART: [state] Locking Datavault
19,239,015 UART: [state] Locking PCR0, PCR1 and PCR31
19,241,159 UART: [state] Locking ICCM
19,244,216 UART: [exit] Launching FMC @ 0x40000130
19,252,882 UART:
19,253,118 UART: Running Caliptra FMC ...
19,254,146 UART:
19,254,294 UART: [state] CFI Enabled
19,262,291 UART: [fht] FMC Alias Private Key: 7
21,028,426 UART: [art] Extend RT PCRs Done
21,029,653 UART: [art] Lock RT PCRs Done
21,030,986 UART: [art] Populate DV Done
21,036,468 UART: [fht] FMC Alias Private Key: 7
21,038,065 UART: [art] Derive CDI
21,038,833 UART: [art] Store in slot 0x4
21,081,166 UART: [art] Derive Key Pair
21,082,213 UART: [art] Store priv key in slot 0x5
23,509,023 UART: [art] Derive Key Pair - Done
23,522,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,228,452 UART: [art] Erasing AUTHORITY.KEYID = 7
25,229,962 UART: [art] PUB.X = 60094DA0FA6B0D6AEC0E384AA12BE4F7E07FF3E9351E7174C89AE65DFFAA584DC2950E340C36E913FCCA6B4D0FBC850F
25,237,260 UART: [art] PUB.Y = 70349515A9320173B2C5FD840142C9B9FF6FE01C8EB23E0964E7253D85A73DFFF59269AB51519C88331B4C8DCDB48AC3
25,244,489 UART: [art] SIG.R = B48F897CACBA5B4D583377B5DE22D520A4F9C4F0A1AF79B24B9D9498BE68517A12EE5AC5C0E340C22E69A5CE4C416357
25,251,930 UART: [art] SIG.S = E32A37961631FA76D704B10E678A6E3E9307E59D106B5E9640D8DC40268AC7A6661892961F2D2A0112724DC567C85016
26,230,921 UART: Caliptra RT
26,231,616 UART: [state] CFI Enabled
26,363,867 UART: [rt] RT listening for mailbox commands...
26,365,727 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,395,715 UART: [rt]cmd =0x46504c54, len=4
26,397,135 >>> mbox cmd response data (8 bytes)
26,398,334 UART: [rt] FIPS self test
26,399,284 UART: [kat] ++
26,399,738 UART: [kat] sha1
26,404,359 UART: [kat] SHA2-256
26,406,289 UART: [kat] SHA2-384
26,407,212 UART: Fatal Error: 0x90020001
26,442,599 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,592,928 >>> mbox cmd response: failed
26,593,588 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,743,491 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
189,992 UART:
190,283 UART: Running Caliptra ROM ...
191,310 UART:
13,787,199 UART: [state] CFI Enabled
13,799,610 UART: [state] LifecycleState = Unprovisioned
13,801,967 UART: [state] DebugLocked = No
13,804,766 UART: [state] WD Timer not started. Device not locked for debugging
13,809,717 UART: [kat] SHA2-256
13,999,619 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,010,373 UART: [kat] ++
14,010,899 UART: [kat] sha1
14,023,095 UART: [kat] SHA2-256
14,026,127 UART: [kat] SHA2-384
14,032,286 UART: [kat] SHA2-512-ACC
14,034,860 UART: [kat] ECC-384
16,476,810 UART: [kat] HMAC-384Kdf
16,490,887 UART: [kat] LMS
17,022,700 UART: [kat] --
17,027,010 UART: [cold-reset] ++
17,028,000 UART: [fht] FHT @ 0x50003400
17,039,400 UART: [idev] ++
17,040,090 UART: [idev] CDI.KEYID = 6
17,041,012 UART: [idev] SUBJECT.KEYID = 7
17,042,236 UART: [idev] UDS.KEYID = 0
17,043,763 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,193,700 UART: [idev] Erasing UDS.KEYID = 0
19,520,535 UART: [idev] Sha1 KeyId Algorithm
19,542,585 UART: [idev] --
19,546,637 UART: [ldev] ++
19,547,375 UART: [ldev] CDI.KEYID = 6
19,548,287 UART: [ldev] SUBJECT.KEYID = 5
19,549,448 UART: [ldev] AUTHORITY.KEYID = 7
19,550,681 UART: [ldev] FE.KEYID = 1
19,563,541 UART: [ldev] Erasing FE.KEYID = 1
22,044,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,766,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,781,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,796,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,811,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,832,442 UART: [ldev] --
23,837,939 UART: [fwproc] Wait for Commands...
23,839,996 UART: [fwproc] Recv command 0x46574c44
23,842,265 UART: [fwproc] Recv'd Img size: 119428 bytes
27,351,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,431,237 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,554,811 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,120,967 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,755,028 ready_for_fw is high
3,755,610 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,056,569 >>> mbox cmd response: success
19,302,854 UART:
19,303,269 UART: Running Caliptra FMC ...
19,304,389 UART:
19,304,573 UART: [state] CFI Enabled
19,312,532 UART: [fht] FMC Alias Private Key: 7
21,078,021 UART: [art] Extend RT PCRs Done
21,079,241 UART: [art] Lock RT PCRs Done
21,080,873 UART: [art] Populate DV Done
21,086,361 UART: [fht] FMC Alias Private Key: 7
21,087,909 UART: [art] Derive CDI
21,088,674 UART: [art] Store in slot 0x4
21,131,113 UART: [art] Derive Key Pair
21,132,162 UART: [art] Store priv key in slot 0x5
23,559,104 UART: [art] Derive Key Pair - Done
23,572,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,041 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,582 UART: [art] PUB.X = 7AABC9FEA05130258345CD78DFCBC01F3E5081ACE643F5EB60B072800B9C77AF231DF91729A46CD5BF2E30A95B7D6A44
25,286,825 UART: [art] PUB.Y = D7FBA544C251DE6BBA1233B151A4BA75EFE3A8ED2637EFC4A77FCC79AAD3DAEB8E4218EB3643C07D58D5ED9D2F196104
25,294,090 UART: [art] SIG.R = AD6BEEEC69CEE7721C16527350F245CB17D7070A4A2A1ADEA65A10F1E29BAA428AD48B01F132465895DE342848906969
25,301,513 UART: [art] SIG.S = B0DEFBC3A0BE7CD619CE32DE5F486EC9F665C4E03FE86237D007DA29401C50E357C0B399AEBD5DF2A00CE8B502A464DA
26,280,136 UART: Caliptra RT
26,280,858 UART: [state] CFI Enabled
26,414,182 UART: [rt] RT listening for mailbox commands...
26,416,045 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,445,912 UART: [rt]cmd =0x46504c54, len=4
26,447,552 >>> mbox cmd response data (8 bytes)
26,448,495 UART: [rt] FIPS self test
26,449,440 UART: [kat] ++
26,449,895 UART: [kat] sha1
26,454,278 UART: [kat] SHA2-256
26,456,160 UART: [kat] SHA2-384
26,457,452 UART: Fatal Error: 0x90020001
26,492,849 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,642,736 >>> mbox cmd response: failed
26,643,393 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,793,346 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
16,893,718 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,196,994 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,587 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,141 UART: [kat] SHA2-256
882,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,187 UART: [kat] ++
886,339 UART: [kat] sha1
890,475 UART: [kat] SHA2-256
892,413 UART: [kat] SHA2-384
895,256 UART: [kat] SHA2-512-ACC
897,157 UART: [kat] ECC-384
902,640 UART: [kat] HMAC-384Kdf
907,280 UART: [kat] LMS
1,475,476 UART: [kat] --
1,476,553 UART: [cold-reset] ++
1,477,121 UART: [fht] Storing FHT @ 0x50003400
1,479,918 UART: [idev] ++
1,480,086 UART: [idev] CDI.KEYID = 6
1,480,446 UART: [idev] SUBJECT.KEYID = 7
1,480,870 UART: [idev] UDS.KEYID = 0
1,481,215 ready_for_fw is high
1,481,215 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,724 UART: [idev] Erasing UDS.KEYID = 0
1,505,564 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,130 UART: [idev] --
1,515,175 UART: [ldev] ++
1,515,343 UART: [ldev] CDI.KEYID = 6
1,515,706 UART: [ldev] SUBJECT.KEYID = 5
1,516,132 UART: [ldev] AUTHORITY.KEYID = 7
1,516,595 UART: [ldev] FE.KEYID = 1
1,521,825 UART: [ldev] Erasing FE.KEYID = 1
1,547,610 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,818 UART: [ldev] --
1,587,285 UART: [fwproc] Waiting for Commands...
1,587,942 UART: [fwproc] Received command 0x46574c44
1,588,733 UART: [fwproc] Received Image of size 119428 bytes
2,944,567 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,972,399 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,003,617 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,145,314 >>> mbox cmd response: success
3,146,558 UART: [afmc] ++
3,146,726 UART: [afmc] CDI.KEYID = 6
3,147,088 UART: [afmc] SUBJECT.KEYID = 7
3,147,513 UART: [afmc] AUTHORITY.KEYID = 5
3,183,164 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,199,510 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,200,290 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,205,999 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,211,882 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,217,565 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,225,543 UART: [afmc] --
3,226,593 UART: [cold-reset] --
3,227,623 UART: [state] Locking Datavault
3,228,588 UART: [state] Locking PCR0, PCR1 and PCR31
3,229,192 UART: [state] Locking ICCM
3,229,670 UART: [exit] Launching FMC @ 0x40000130
3,235,000 UART:
3,235,016 UART: Running Caliptra FMC ...
3,235,424 UART:
3,235,478 UART: [state] CFI Enabled
3,245,908 UART: [fht] FMC Alias Private Key: 7
3,365,142 UART: [art] Extend RT PCRs Done
3,365,570 UART: [art] Lock RT PCRs Done
3,367,098 UART: [art] Populate DV Done
3,375,401 UART: [fht] FMC Alias Private Key: 7
3,376,397 UART: [art] Derive CDI
3,376,677 UART: [art] Store in slot 0x4
3,462,681 UART: [art] Derive Key Pair
3,463,041 UART: [art] Store priv key in slot 0x5
3,476,000 UART: [art] Derive Key Pair - Done
3,490,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,506,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,507,521 UART: [art] PUB.X = F268AB7151E932C3785AE92C28AA3093693415331C38A3F59CB5498C764B9D02088D8E2AF8E384F6E89EBAD00505CDFB
3,514,283 UART: [art] PUB.Y = 03E355945EB53193210B56039B17402FA018F6F65E886129989A9EBEA0639FB390516ABE49ADE9076E25EFDB445D6B3D
3,521,221 UART: [art] SIG.R = 5D68C14631D08406C0DB69C5623D5DF474BDC4A756E3F7FCDB9C197A56CD98B00B3D05052C36DD7637EE93790CA504C2
3,527,981 UART: [art] SIG.S = 4891AD04FFAC52F4CB0B9B897F51D99E2B80D5137D6CFAF64807D55043793A43ACC285D4FD3BD073060444EA4F15363D
3,551,558 UART: Caliptra RT
3,551,809 UART: [state] CFI Enabled
3,672,796 UART: [rt] RT listening for mailbox commands...
3,673,459 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,703,244 UART: [rt]cmd =0x46504c54, len=4
3,704,282 >>> mbox cmd response data (8 bytes)
3,704,449 UART: [rt] FIPS self test
3,704,777 UART: [kat] ++
3,704,929 UART: [kat] sha1
3,709,123 UART: [kat] SHA2-256
3,711,145 UART: [kat] SHA2-384
3,712,059 UART: Fatal Error: 0x90020001
3,713,598 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,603 >>> mbox cmd response: failed
3,713,603 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,961 UART: [kat] SHA2-256
881,892 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,007 UART: [kat] ++
886,159 UART: [kat] sha1
890,421 UART: [kat] SHA2-256
892,359 UART: [kat] SHA2-384
895,104 UART: [kat] SHA2-512-ACC
897,005 UART: [kat] ECC-384
902,410 UART: [kat] HMAC-384Kdf
906,890 UART: [kat] LMS
1,475,086 UART: [kat] --
1,475,815 UART: [cold-reset] ++
1,476,207 UART: [fht] Storing FHT @ 0x50003400
1,478,994 UART: [idev] ++
1,479,162 UART: [idev] CDI.KEYID = 6
1,479,522 UART: [idev] SUBJECT.KEYID = 7
1,479,946 UART: [idev] UDS.KEYID = 0
1,480,291 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,560 UART: [idev] Erasing UDS.KEYID = 0
1,503,768 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,322 UART: [idev] --
1,513,435 UART: [ldev] ++
1,513,603 UART: [ldev] CDI.KEYID = 6
1,513,966 UART: [ldev] SUBJECT.KEYID = 5
1,514,392 UART: [ldev] AUTHORITY.KEYID = 7
1,514,855 UART: [ldev] FE.KEYID = 1
1,520,277 UART: [ldev] Erasing FE.KEYID = 1
1,545,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,484 UART: [ldev] --
1,584,921 UART: [fwproc] Waiting for Commands...
1,585,762 UART: [fwproc] Received command 0x46574c44
1,586,553 UART: [fwproc] Received Image of size 119428 bytes
2,941,363 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,869 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,087 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,684 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,205 ready_for_fw is high
1,362,205 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,998 >>> mbox cmd response: success
3,054,751 UART:
3,054,767 UART: Running Caliptra FMC ...
3,055,175 UART:
3,055,229 UART: [state] CFI Enabled
3,065,705 UART: [fht] FMC Alias Private Key: 7
3,184,357 UART: [art] Extend RT PCRs Done
3,184,785 UART: [art] Lock RT PCRs Done
3,186,239 UART: [art] Populate DV Done
3,194,532 UART: [fht] FMC Alias Private Key: 7
3,195,708 UART: [art] Derive CDI
3,195,988 UART: [art] Store in slot 0x4
3,281,954 UART: [art] Derive Key Pair
3,282,314 UART: [art] Store priv key in slot 0x5
3,296,097 UART: [art] Derive Key Pair - Done
3,310,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,420 UART: [art] PUB.X = B4954454E31C7102E30C8A2749616F0B3B4574E64E5F42927748D5531778B1523018BACF270DB7AE02430D98FA53F3CC
3,333,166 UART: [art] PUB.Y = E9E8F520B270666C7D514616F2C337C24712FC6B21295995AB1987CD4E540926C940DF64D77BA126E416BF112194C16C
3,340,107 UART: [art] SIG.R = D639A2EFE04772C9C4A0EA271B8744145659E262226E43BAA2AA7C5D00D9715E4B0EB2EA85686A322D85DE34C60328FC
3,346,855 UART: [art] SIG.S = BFD16A265E43EF18F67A96C75FCE7D49DFFE0090302C0A3541FA9069E57EB7D5B6F21E813C1DD31CDA14E4A6929EDDAC
3,370,778 UART: Caliptra RT
3,371,029 UART: [state] CFI Enabled
3,491,318 UART: [rt] RT listening for mailbox commands...
3,491,981 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,594 UART: [rt]cmd =0x46504c54, len=4
3,522,776 >>> mbox cmd response data (8 bytes)
3,522,971 UART: [rt] FIPS self test
3,523,299 UART: [kat] ++
3,523,451 UART: [kat] sha1
3,527,649 UART: [kat] SHA2-256
3,529,671 UART: [kat] SHA2-384
3,530,393 UART: Fatal Error: 0x90020001
3,531,932 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,531,937 >>> mbox cmd response: failed
3,531,937 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,531,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,403 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,654 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,188 UART: [kat] SHA2-256
882,119 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,234 UART: [kat] ++
886,386 UART: [kat] sha1
890,454 UART: [kat] SHA2-256
892,392 UART: [kat] SHA2-384
895,133 UART: [kat] SHA2-512-ACC
897,034 UART: [kat] ECC-384
902,471 UART: [kat] HMAC-384Kdf
907,011 UART: [kat] LMS
1,475,207 UART: [kat] --
1,475,858 UART: [cold-reset] ++
1,476,306 UART: [fht] Storing FHT @ 0x50003400
1,478,943 UART: [idev] ++
1,479,111 UART: [idev] CDI.KEYID = 6
1,479,471 UART: [idev] SUBJECT.KEYID = 7
1,479,895 UART: [idev] UDS.KEYID = 0
1,480,240 ready_for_fw is high
1,480,240 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,237 UART: [idev] Erasing UDS.KEYID = 0
1,505,063 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,813 UART: [idev] --
1,515,050 UART: [ldev] ++
1,515,218 UART: [ldev] CDI.KEYID = 6
1,515,581 UART: [ldev] SUBJECT.KEYID = 5
1,516,007 UART: [ldev] AUTHORITY.KEYID = 7
1,516,470 UART: [ldev] FE.KEYID = 1
1,521,802 UART: [ldev] Erasing FE.KEYID = 1
1,546,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,193 UART: [ldev] --
1,586,484 UART: [fwproc] Waiting for Commands...
1,587,173 UART: [fwproc] Received command 0x46574c44
1,587,964 UART: [fwproc] Received Image of size 119428 bytes
2,943,172 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,814 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,003,032 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,551 >>> mbox cmd response: success
3,145,715 UART: [afmc] ++
3,145,883 UART: [afmc] CDI.KEYID = 6
3,146,245 UART: [afmc] SUBJECT.KEYID = 7
3,146,670 UART: [afmc] AUTHORITY.KEYID = 5
3,182,509 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,199,037 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,199,817 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,205,526 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,211,409 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,217,092 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,840 UART: [afmc] --
3,225,768 UART: [cold-reset] --
3,226,592 UART: [state] Locking Datavault
3,227,583 UART: [state] Locking PCR0, PCR1 and PCR31
3,228,187 UART: [state] Locking ICCM
3,228,621 UART: [exit] Launching FMC @ 0x40000130
3,233,951 UART:
3,233,967 UART: Running Caliptra FMC ...
3,234,375 UART:
3,234,518 UART: [state] CFI Enabled
3,245,074 UART: [fht] FMC Alias Private Key: 7
3,364,246 UART: [art] Extend RT PCRs Done
3,364,674 UART: [art] Lock RT PCRs Done
3,366,122 UART: [art] Populate DV Done
3,374,225 UART: [fht] FMC Alias Private Key: 7
3,375,363 UART: [art] Derive CDI
3,375,643 UART: [art] Store in slot 0x4
3,461,065 UART: [art] Derive Key Pair
3,461,425 UART: [art] Store priv key in slot 0x5
3,474,304 UART: [art] Derive Key Pair - Done
3,489,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,505,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,506,054 UART: [art] PUB.X = CB2DD912247E80AE16933EA411A2AB492B3E6993703211E661F3E88691814E34718F170550F459A15D322269E002B056
3,512,804 UART: [art] PUB.Y = EEB753D7DA48C1154C5639865BB5FD988C9A791136357F51022F574652EE5DD549EB10DBF0770513196758C0A406334B
3,519,739 UART: [art] SIG.R = 48773C43CAC3F4878BADD99FBF185D632C48AFE219E1D4F1D0F127BAE3B75AF634C9D3325DAB03B189FF549B4D7C9A93
3,526,524 UART: [art] SIG.S = 19E0E9A39A2BA618FDC574E1A9B66CE950DAFD99DE38CCEC97112DE27A55F5AE671FEEA654BC23DEDFE0BC1731E6114C
3,550,534 UART: Caliptra RT
3,550,877 UART: [state] CFI Enabled
3,672,036 UART: [rt] RT listening for mailbox commands...
3,672,699 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,702,648 UART: [rt]cmd =0x46504c54, len=4
3,703,966 >>> mbox cmd response data (8 bytes)
3,704,149 UART: [rt] FIPS self test
3,704,477 UART: [kat] ++
3,704,629 UART: [kat] sha1
3,708,939 UART: [kat] SHA2-256
3,710,961 UART: [kat] SHA2-384
3,711,639 UART: Fatal Error: 0x90020001
3,713,178 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,183 >>> mbox cmd response: failed
3,713,183 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,188 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,338 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,816 UART: [kat] SHA2-256
881,747 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,862 UART: [kat] ++
886,014 UART: [kat] sha1
890,240 UART: [kat] SHA2-256
892,178 UART: [kat] SHA2-384
894,737 UART: [kat] SHA2-512-ACC
896,638 UART: [kat] ECC-384
902,317 UART: [kat] HMAC-384Kdf
906,743 UART: [kat] LMS
1,474,939 UART: [kat] --
1,475,758 UART: [cold-reset] ++
1,476,170 UART: [fht] Storing FHT @ 0x50003400
1,478,895 UART: [idev] ++
1,479,063 UART: [idev] CDI.KEYID = 6
1,479,423 UART: [idev] SUBJECT.KEYID = 7
1,479,847 UART: [idev] UDS.KEYID = 0
1,480,192 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,983 UART: [idev] Erasing UDS.KEYID = 0
1,504,913 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,495 UART: [idev] --
1,514,522 UART: [ldev] ++
1,514,690 UART: [ldev] CDI.KEYID = 6
1,515,053 UART: [ldev] SUBJECT.KEYID = 5
1,515,479 UART: [ldev] AUTHORITY.KEYID = 7
1,515,942 UART: [ldev] FE.KEYID = 1
1,521,010 UART: [ldev] Erasing FE.KEYID = 1
1,545,857 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,457 UART: [ldev] --
1,584,922 UART: [fwproc] Waiting for Commands...
1,585,651 UART: [fwproc] Received command 0x46574c44
1,586,442 UART: [fwproc] Received Image of size 119428 bytes
2,941,594 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,226 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,444 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,193 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,530 ready_for_fw is high
1,363,530 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,145 >>> mbox cmd response: success
3,055,230 UART:
3,055,246 UART: Running Caliptra FMC ...
3,055,654 UART:
3,055,797 UART: [state] CFI Enabled
3,066,439 UART: [fht] FMC Alias Private Key: 7
3,184,605 UART: [art] Extend RT PCRs Done
3,185,033 UART: [art] Lock RT PCRs Done
3,186,487 UART: [art] Populate DV Done
3,194,848 UART: [fht] FMC Alias Private Key: 7
3,195,992 UART: [art] Derive CDI
3,196,272 UART: [art] Store in slot 0x4
3,281,774 UART: [art] Derive Key Pair
3,282,134 UART: [art] Store priv key in slot 0x5
3,295,555 UART: [art] Derive Key Pair - Done
3,310,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,009 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,774 UART: [art] PUB.X = E6CEF3B6A170B2556CF8ADB03F06A43331FDD79349538B81181CDFF735D464C57A22F1B7D98ADFE06D574F8FD21CF40B
3,333,554 UART: [art] PUB.Y = D6BE0269D938BBA60EF14493E6B5B891575BB4B08F2990295FD5B2A1678E5D29DD79412DE7CECBCD008E59438C422FF4
3,340,486 UART: [art] SIG.R = 08F9B8B3229FF501FAC78E61EED17F82292B9925194F81236A90ADC0B9B4C786BB6A0C5EFFA7D6EF58D6B999557A0ACE
3,347,260 UART: [art] SIG.S = F70C7648D949CDA5B1E93771A5FAD29007DCE4C51CD03906A163E17A4B92C3ACEB737E03E39C7011F308284C9B463CE5
3,370,843 UART: Caliptra RT
3,371,186 UART: [state] CFI Enabled
3,491,798 UART: [rt] RT listening for mailbox commands...
3,492,461 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,230 UART: [rt]cmd =0x46504c54, len=4
3,523,368 >>> mbox cmd response data (8 bytes)
3,523,619 UART: [rt] FIPS self test
3,523,947 UART: [kat] ++
3,524,099 UART: [kat] sha1
3,528,309 UART: [kat] SHA2-256
3,530,331 UART: [kat] SHA2-384
3,531,047 UART: Fatal Error: 0x90020001
3,532,586 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,591 >>> mbox cmd response: failed
3,532,591 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,962 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,029 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,772 UART: [state] LifecycleState = Unprovisioned
85,427 UART: [state] DebugLocked = No
86,059 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,034 UART: [kat] ++
895,186 UART: [kat] sha1
899,456 UART: [kat] SHA2-256
901,396 UART: [kat] SHA2-384
904,295 UART: [kat] SHA2-512-ACC
906,196 UART: [kat] ECC-384
915,777 UART: [kat] HMAC-384Kdf
920,477 UART: [kat] LMS
1,168,789 UART: [kat] --
1,169,786 UART: [cold-reset] ++
1,170,186 UART: [fht] FHT @ 0x50003400
1,172,924 UART: [idev] ++
1,173,092 UART: [idev] CDI.KEYID = 6
1,173,453 UART: [idev] SUBJECT.KEYID = 7
1,173,878 UART: [idev] UDS.KEYID = 0
1,174,224 ready_for_fw is high
1,174,224 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,527 UART: [idev] Erasing UDS.KEYID = 0
1,197,891 UART: [idev] Sha1 KeyId Algorithm
1,206,945 UART: [idev] --
1,208,020 UART: [ldev] ++
1,208,188 UART: [ldev] CDI.KEYID = 6
1,208,552 UART: [ldev] SUBJECT.KEYID = 5
1,208,979 UART: [ldev] AUTHORITY.KEYID = 7
1,209,442 UART: [ldev] FE.KEYID = 1
1,214,496 UART: [ldev] Erasing FE.KEYID = 1
1,240,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,700 UART: [ldev] --
1,279,959 UART: [fwproc] Wait for Commands...
1,280,768 UART: [fwproc] Recv command 0x46574c44
1,281,501 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,662,753 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,693,928 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,479 >>> mbox cmd response: success
2,836,605 UART: [afmc] ++
2,836,773 UART: [afmc] CDI.KEYID = 6
2,837,136 UART: [afmc] SUBJECT.KEYID = 7
2,837,562 UART: [afmc] AUTHORITY.KEYID = 5
2,873,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,890,875 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,585 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,466 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,167 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,915,982 UART: [afmc] --
2,916,889 UART: [cold-reset] --
2,917,763 UART: [state] Locking Datavault
2,919,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,810 UART: [state] Locking ICCM
2,920,278 UART: [exit] Launching FMC @ 0x40000130
2,925,608 UART:
2,925,624 UART: Running Caliptra FMC ...
2,926,032 UART:
2,926,086 UART: [state] CFI Enabled
2,936,610 UART: [fht] FMC Alias Private Key: 7
3,055,634 UART: [art] Extend RT PCRs Done
3,056,062 UART: [art] Lock RT PCRs Done
3,057,728 UART: [art] Populate DV Done
3,066,121 UART: [fht] FMC Alias Private Key: 7
3,067,283 UART: [art] Derive CDI
3,067,563 UART: [art] Store in slot 0x4
3,154,064 UART: [art] Derive Key Pair
3,154,424 UART: [art] Store priv key in slot 0x5
3,167,474 UART: [art] Derive Key Pair - Done
3,182,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,451 UART: [art] PUB.X = 6C73B51547C29B196B7707D9B03FEAC365BA5CD289B49173944968A68A13326EC2C0C86F2FCEB3255BE1975037F0A393
3,205,218 UART: [art] PUB.Y = D1BC2AC016EE60D8542FBA1C185A5B9D7417A2839B780BFC2D80D049D19FFAE03EFD4CE72ACE7C76226F8D6BCE83DD0C
3,212,188 UART: [art] SIG.R = 0D78F4B499A147FEECB8AF6178A3CB4B149A7E3C7804FD18A713028A00E18A3CDB531A7AFE387B2CA8923C8BBE18D0CD
3,218,947 UART: [art] SIG.S = F78233B3AF7C5530A456201143403A2F7B949C58F3B2623ECF06645FDB7B38F8AC9FD3DE296C68D6451CFD095EE668E9
3,242,921 UART: Caliptra RT
3,243,172 UART: [state] CFI Enabled
3,362,841 UART: [rt] RT listening for mailbox commands...
3,363,504 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,345 UART: [rt]cmd =0x46504c54, len=4
3,394,693 >>> mbox cmd response data (8 bytes)
3,394,866 UART: [rt] FIPS self test
3,395,194 UART: [kat] ++
3,395,346 UART: [kat] sha1
3,399,420 UART: [kat] SHA2-256
3,401,442 UART: [kat] SHA2-384
3,402,204 UART: Fatal Error: 0x90020001
3,403,743 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,748 >>> mbox cmd response: failed
3,403,748 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,501 UART: [state] DebugLocked = No
86,005 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
890,890 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,994 UART: [kat] ++
895,146 UART: [kat] sha1
899,410 UART: [kat] SHA2-256
901,350 UART: [kat] SHA2-384
903,997 UART: [kat] SHA2-512-ACC
905,898 UART: [kat] ECC-384
915,661 UART: [kat] HMAC-384Kdf
920,097 UART: [kat] LMS
1,168,409 UART: [kat] --
1,169,336 UART: [cold-reset] ++
1,169,710 UART: [fht] FHT @ 0x50003400
1,172,408 UART: [idev] ++
1,172,576 UART: [idev] CDI.KEYID = 6
1,172,937 UART: [idev] SUBJECT.KEYID = 7
1,173,362 UART: [idev] UDS.KEYID = 0
1,173,708 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,387 UART: [idev] Erasing UDS.KEYID = 0
1,198,281 UART: [idev] Sha1 KeyId Algorithm
1,207,083 UART: [idev] --
1,208,236 UART: [ldev] ++
1,208,404 UART: [ldev] CDI.KEYID = 6
1,208,768 UART: [ldev] SUBJECT.KEYID = 5
1,209,195 UART: [ldev] AUTHORITY.KEYID = 7
1,209,658 UART: [ldev] FE.KEYID = 1
1,214,788 UART: [ldev] Erasing FE.KEYID = 1
1,240,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,218 UART: [ldev] --
1,279,517 UART: [fwproc] Wait for Commands...
1,280,126 UART: [fwproc] Recv command 0x46574c44
1,280,859 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,662,631 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,693,806 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,511 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,582 ready_for_fw is high
1,058,582 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,142 >>> mbox cmd response: success
2,751,249 UART:
2,751,265 UART: Running Caliptra FMC ...
2,751,673 UART:
2,751,727 UART: [state] CFI Enabled
2,762,253 UART: [fht] FMC Alias Private Key: 7
2,881,375 UART: [art] Extend RT PCRs Done
2,881,803 UART: [art] Lock RT PCRs Done
2,883,143 UART: [art] Populate DV Done
2,891,290 UART: [fht] FMC Alias Private Key: 7
2,892,372 UART: [art] Derive CDI
2,892,652 UART: [art] Store in slot 0x4
2,978,099 UART: [art] Derive Key Pair
2,978,459 UART: [art] Store priv key in slot 0x5
2,992,079 UART: [art] Derive Key Pair - Done
3,006,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,011 UART: [art] PUB.X = A47BD010C68E61B3F360F662852BA4DC3A8D4C0A8B5E1677CC9D8D53A99389281D205DED87830F8BD1C4CC9DA405F0B6
3,029,784 UART: [art] PUB.Y = 11D6D550BBDC9ABEE77909BFA621804648B8356F4CBD3A20CE69A1334724940F1C8EFD059A09FD9E21B6116A50CBDBCA
3,036,738 UART: [art] SIG.R = 7BA66D94F0D61BA93FC730D3CFB5DA2B313B1B98C790AABD144EDD3476E714E8BA026151E9441C3A2F062FC03A2AD6BE
3,043,522 UART: [art] SIG.S = 3AF8FB5EF0E5AB2CFB316622FACD4927A42312C03C30A4AF32D1B19F39353B1342A16BD8E511C45F320F05CA2225680B
3,067,161 UART: Caliptra RT
3,067,412 UART: [state] CFI Enabled
3,187,014 UART: [rt] RT listening for mailbox commands...
3,187,677 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,498 UART: [rt]cmd =0x46504c54, len=4
3,218,632 >>> mbox cmd response data (8 bytes)
3,218,857 UART: [rt] FIPS self test
3,219,185 UART: [kat] ++
3,219,337 UART: [kat] sha1
3,223,683 UART: [kat] SHA2-256
3,225,705 UART: [kat] SHA2-384
3,226,781 UART: Fatal Error: 0x90020001
3,228,320 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,228,325 >>> mbox cmd response: failed
3,228,325 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,228,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,408 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,960 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,416 UART: [kat] SHA2-512-ACC
906,317 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,492 UART: [kat] LMS
1,168,804 UART: [kat] --
1,169,727 UART: [cold-reset] ++
1,170,151 UART: [fht] FHT @ 0x50003400
1,172,699 UART: [idev] ++
1,172,867 UART: [idev] CDI.KEYID = 6
1,173,228 UART: [idev] SUBJECT.KEYID = 7
1,173,653 UART: [idev] UDS.KEYID = 0
1,173,999 ready_for_fw is high
1,173,999 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,958 UART: [idev] Erasing UDS.KEYID = 0
1,198,572 UART: [idev] Sha1 KeyId Algorithm
1,207,508 UART: [idev] --
1,208,673 UART: [ldev] ++
1,208,841 UART: [ldev] CDI.KEYID = 6
1,209,205 UART: [ldev] SUBJECT.KEYID = 5
1,209,632 UART: [ldev] AUTHORITY.KEYID = 7
1,210,095 UART: [ldev] FE.KEYID = 1
1,215,427 UART: [ldev] Erasing FE.KEYID = 1
1,241,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,073 UART: [ldev] --
1,281,428 UART: [fwproc] Wait for Commands...
1,282,171 UART: [fwproc] Recv command 0x46574c44
1,282,904 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,868 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,043 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,696 >>> mbox cmd response: success
2,837,918 UART: [afmc] ++
2,838,086 UART: [afmc] CDI.KEYID = 6
2,838,449 UART: [afmc] SUBJECT.KEYID = 7
2,838,875 UART: [afmc] AUTHORITY.KEYID = 5
2,874,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,273 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,022 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,732 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,613 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,314 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,093 UART: [afmc] --
2,918,108 UART: [cold-reset] --
2,919,092 UART: [state] Locking Datavault
2,920,249 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,853 UART: [state] Locking ICCM
2,921,433 UART: [exit] Launching FMC @ 0x40000130
2,926,763 UART:
2,926,779 UART: Running Caliptra FMC ...
2,927,187 UART:
2,927,330 UART: [state] CFI Enabled
2,937,752 UART: [fht] FMC Alias Private Key: 7
3,056,920 UART: [art] Extend RT PCRs Done
3,057,348 UART: [art] Lock RT PCRs Done
3,058,930 UART: [art] Populate DV Done
3,067,121 UART: [fht] FMC Alias Private Key: 7
3,068,069 UART: [art] Derive CDI
3,068,349 UART: [art] Store in slot 0x4
3,154,344 UART: [art] Derive Key Pair
3,154,704 UART: [art] Store priv key in slot 0x5
3,168,324 UART: [art] Derive Key Pair - Done
3,183,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,196 UART: [art] PUB.X = 79E69AC4401905108740E6141820AF8BF6A1F0BCD3E82F94BA5F0D5CB8725690C4D070E5B1B5E9D6157F83D2672FDB35
3,205,964 UART: [art] PUB.Y = A8898F30ED79A574F9EF0208D3E3D3D69691FB7E104B55A5224A56552EC979DC5806C3D0F22AAAFEBC222DA245E565AA
3,212,917 UART: [art] SIG.R = 52AD6ADA96525F8D7D1815149C4385A98F6833A920B9A6C1CD0929840A382E3B8A194B0340AC68AA5628C86FE97C6B77
3,219,678 UART: [art] SIG.S = 79327ACCD3A69ED1B7B4D81885B15418A4A5A0CD683CDB4CC44ED9772C9A5F67D2E17609D24CD5AC7FF98D0188B39D88
3,243,330 UART: Caliptra RT
3,243,673 UART: [state] CFI Enabled
3,364,077 UART: [rt] RT listening for mailbox commands...
3,364,740 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,557 UART: [rt]cmd =0x46504c54, len=4
3,395,811 >>> mbox cmd response data (8 bytes)
3,396,076 UART: [rt] FIPS self test
3,396,404 UART: [kat] ++
3,396,556 UART: [kat] sha1
3,400,660 UART: [kat] SHA2-256
3,402,682 UART: [kat] SHA2-384
3,403,668 UART: Fatal Error: 0x90020001
3,405,207 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,212 >>> mbox cmd response: failed
3,405,212 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
891,811 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,915 UART: [kat] ++
896,067 UART: [kat] sha1
900,211 UART: [kat] SHA2-256
902,151 UART: [kat] SHA2-384
904,856 UART: [kat] SHA2-512-ACC
906,757 UART: [kat] ECC-384
916,798 UART: [kat] HMAC-384Kdf
921,532 UART: [kat] LMS
1,169,844 UART: [kat] --
1,170,561 UART: [cold-reset] ++
1,171,019 UART: [fht] FHT @ 0x50003400
1,173,651 UART: [idev] ++
1,173,819 UART: [idev] CDI.KEYID = 6
1,174,180 UART: [idev] SUBJECT.KEYID = 7
1,174,605 UART: [idev] UDS.KEYID = 0
1,174,951 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,918 UART: [idev] Erasing UDS.KEYID = 0
1,200,148 UART: [idev] Sha1 KeyId Algorithm
1,208,844 UART: [idev] --
1,209,959 UART: [ldev] ++
1,210,127 UART: [ldev] CDI.KEYID = 6
1,210,491 UART: [ldev] SUBJECT.KEYID = 5
1,210,918 UART: [ldev] AUTHORITY.KEYID = 7
1,211,381 UART: [ldev] FE.KEYID = 1
1,216,643 UART: [ldev] Erasing FE.KEYID = 1
1,242,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,783 UART: [ldev] --
1,282,036 UART: [fwproc] Wait for Commands...
1,282,745 UART: [fwproc] Recv command 0x46574c44
1,283,478 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,624 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,799 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,420 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,797 ready_for_fw is high
1,059,797 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,267 >>> mbox cmd response: success
2,752,204 UART:
2,752,220 UART: Running Caliptra FMC ...
2,752,628 UART:
2,752,771 UART: [state] CFI Enabled
2,763,577 UART: [fht] FMC Alias Private Key: 7
2,882,443 UART: [art] Extend RT PCRs Done
2,882,871 UART: [art] Lock RT PCRs Done
2,884,531 UART: [art] Populate DV Done
2,892,692 UART: [fht] FMC Alias Private Key: 7
2,893,786 UART: [art] Derive CDI
2,894,066 UART: [art] Store in slot 0x4
2,979,793 UART: [art] Derive Key Pair
2,980,153 UART: [art] Store priv key in slot 0x5
2,993,865 UART: [art] Derive Key Pair - Done
3,008,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,813 UART: [art] PUB.X = 6B3239873D13AAA09049A917E136D87395D9089D0E9718FDE3404AE4651CECAF364D7115522F098BB3D0283A3F4007FA
3,031,569 UART: [art] PUB.Y = D30DEBF8E8F4B9610D6D0DBE04F76E8FAA3CBAC6C18D82EA69F2A70E39B37F39CB3A080A8E2CCDE335CBE871250E5516
3,038,521 UART: [art] SIG.R = A232EA723AF2A96EAF999CFBF8BD9403FACAAD9D5C3C7CAD51B70773F96D85E04D62216D3DD015E3D6013D0C5A8F902A
3,045,301 UART: [art] SIG.S = 8F1627A70D178F423CB301C3490B0F7CE92575FAD9691EBA3CC7087A76D592B3BD080C2297C77DB3BC1DEAB5E2FFAF24
3,069,202 UART: Caliptra RT
3,069,545 UART: [state] CFI Enabled
3,189,227 UART: [rt] RT listening for mailbox commands...
3,189,890 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,051 UART: [rt]cmd =0x46504c54, len=4
3,221,229 >>> mbox cmd response data (8 bytes)
3,221,548 UART: [rt] FIPS self test
3,221,876 UART: [kat] ++
3,222,028 UART: [kat] sha1
3,226,212 UART: [kat] SHA2-256
3,228,234 UART: [kat] SHA2-384
3,229,182 UART: Fatal Error: 0x90020001
3,230,721 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,726 >>> mbox cmd response: failed
3,230,726 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,961 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,111 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
893,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,427 UART: [kat] ++
897,579 UART: [kat] sha1
901,757 UART: [kat] SHA2-256
903,697 UART: [kat] SHA2-384
906,244 UART: [kat] SHA2-512-ACC
908,145 UART: [kat] ECC-384
917,772 UART: [kat] HMAC-384Kdf
922,344 UART: [kat] LMS
1,170,672 UART: [kat] --
1,171,573 UART: [cold-reset] ++
1,172,103 UART: [fht] FHT @ 0x50003400
1,174,800 UART: [idev] ++
1,174,968 UART: [idev] CDI.KEYID = 6
1,175,328 UART: [idev] SUBJECT.KEYID = 7
1,175,752 UART: [idev] UDS.KEYID = 0
1,176,097 ready_for_fw is high
1,176,097 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,394 UART: [idev] Erasing UDS.KEYID = 0
1,200,811 UART: [idev] Sha1 KeyId Algorithm
1,209,137 UART: [idev] --
1,210,125 UART: [ldev] ++
1,210,293 UART: [ldev] CDI.KEYID = 6
1,210,656 UART: [ldev] SUBJECT.KEYID = 5
1,211,082 UART: [ldev] AUTHORITY.KEYID = 7
1,211,545 UART: [ldev] FE.KEYID = 1
1,216,655 UART: [ldev] Erasing FE.KEYID = 1
1,243,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,615 UART: [ldev] --
1,282,892 UART: [fwproc] Wait for Commands...
1,283,486 UART: [fwproc] Recv command 0x46574c44
1,284,214 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,416 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,586 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,135 >>> mbox cmd response: success
2,840,299 UART: [afmc] ++
2,840,467 UART: [afmc] CDI.KEYID = 6
2,840,829 UART: [afmc] SUBJECT.KEYID = 7
2,841,254 UART: [afmc] AUTHORITY.KEYID = 5
2,877,013 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,452 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,200 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,909 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,792 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,493 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,415 UART: [afmc] --
2,920,409 UART: [cold-reset] --
2,920,933 UART: [state] Locking Datavault
2,922,034 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,638 UART: [state] Locking ICCM
2,923,068 UART: [exit] Launching FMC @ 0x40000130
2,928,398 UART:
2,928,414 UART: Running Caliptra FMC ...
2,928,822 UART:
2,928,876 UART: [state] CFI Enabled
2,939,456 UART: [fht] FMC Alias Private Key: 7
3,058,348 UART: [art] Extend RT PCRs Done
3,058,776 UART: [art] Lock RT PCRs Done
3,060,374 UART: [art] Populate DV Done
3,068,661 UART: [fht] FMC Alias Private Key: 7
3,069,639 UART: [art] Derive CDI
3,069,919 UART: [art] Store in slot 0x4
3,155,414 UART: [art] Derive Key Pair
3,155,774 UART: [art] Store priv key in slot 0x5
3,168,898 UART: [art] Derive Key Pair - Done
3,183,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,891 UART: [art] PUB.X = 2442C26DD47992162C281EA29B6E179CC678A4E7FBF50F9BFD310E71F0D3B493254DBECBBB3F27D321ACE38606A2CF45
3,206,666 UART: [art] PUB.Y = 6196BDB9244CC053EFFC2BA287A48D97A5C65394B5536CFDD1A422F85E3785AF2ABDCE9A973DBF9D5C9D48C2733D7DCD
3,213,638 UART: [art] SIG.R = 1FC0345225E7F4D4025AF09C92DEB8DA5350F66751FC7D838408A2BF2259C6AF3EF3D8E4EF387FEAF2CBF41807514301
3,220,406 UART: [art] SIG.S = BBCB4A698A254D44D40895B767AAA4704F209D3ECC0162F72A439A17EAE93547D664F628D9A0D9BBEE11AD0BCCDF7235
3,244,449 UART: Caliptra RT
3,244,700 UART: [state] CFI Enabled
3,363,987 UART: [rt] RT listening for mailbox commands...
3,364,650 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,371 UART: [rt]cmd =0x46504c54, len=4
3,395,429 >>> mbox cmd response data (8 bytes)
3,395,628 UART: [rt] FIPS self test
3,395,956 UART: [kat] ++
3,396,108 UART: [kat] sha1
3,400,134 UART: [kat] SHA2-256
3,402,156 UART: [kat] SHA2-384
3,402,990 UART: Fatal Error: 0x90020001
3,404,529 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,534 >>> mbox cmd response: failed
3,404,534 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,750 UART: [state] LifecycleState = Unprovisioned
86,405 UART: [state] DebugLocked = No
87,137 UART: [state] WD Timer not started. Device not locked for debugging
88,282 UART: [kat] SHA2-256
893,932 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,057 UART: [kat] ++
898,209 UART: [kat] sha1
902,479 UART: [kat] SHA2-256
904,419 UART: [kat] SHA2-384
907,164 UART: [kat] SHA2-512-ACC
909,065 UART: [kat] ECC-384
918,712 UART: [kat] HMAC-384Kdf
923,320 UART: [kat] LMS
1,171,648 UART: [kat] --
1,172,475 UART: [cold-reset] ++
1,172,829 UART: [fht] FHT @ 0x50003400
1,175,436 UART: [idev] ++
1,175,604 UART: [idev] CDI.KEYID = 6
1,175,964 UART: [idev] SUBJECT.KEYID = 7
1,176,388 UART: [idev] UDS.KEYID = 0
1,176,733 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,640 UART: [idev] Erasing UDS.KEYID = 0
1,201,263 UART: [idev] Sha1 KeyId Algorithm
1,209,709 UART: [idev] --
1,210,813 UART: [ldev] ++
1,210,981 UART: [ldev] CDI.KEYID = 6
1,211,344 UART: [ldev] SUBJECT.KEYID = 5
1,211,770 UART: [ldev] AUTHORITY.KEYID = 7
1,212,233 UART: [ldev] FE.KEYID = 1
1,217,371 UART: [ldev] Erasing FE.KEYID = 1
1,243,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,563 UART: [ldev] --
1,283,048 UART: [fwproc] Wait for Commands...
1,283,854 UART: [fwproc] Recv command 0x46574c44
1,284,582 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,014 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,184 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,735 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,791 ready_for_fw is high
1,059,791 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,376 >>> mbox cmd response: success
2,751,341 UART:
2,751,357 UART: Running Caliptra FMC ...
2,751,765 UART:
2,751,819 UART: [state] CFI Enabled
2,762,567 UART: [fht] FMC Alias Private Key: 7
2,881,479 UART: [art] Extend RT PCRs Done
2,881,907 UART: [art] Lock RT PCRs Done
2,883,491 UART: [art] Populate DV Done
2,891,938 UART: [fht] FMC Alias Private Key: 7
2,892,958 UART: [art] Derive CDI
2,893,238 UART: [art] Store in slot 0x4
2,979,229 UART: [art] Derive Key Pair
2,979,589 UART: [art] Store priv key in slot 0x5
2,993,189 UART: [art] Derive Key Pair - Done
3,007,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,943 UART: [art] PUB.X = 5E325654104A5D5CAB591EFC55DE1009A9768C5D373D86820C633982E73CE7D179B04C537F23925276E915C41CDEC924
3,030,703 UART: [art] PUB.Y = B8A15FA5DB1CB7B115F7A48746D01EB5F27D44138FEEA4B2C6BE8F5A4628EBF3E24E09918DBA2AEEDC81E08BFBF48E9D
3,037,680 UART: [art] SIG.R = 9277D2E524E3B93995432C764C2497147AFEB11EF4E4D74B2EB9532594238AAFE87636AB551871F7BB40E985C60162EC
3,044,445 UART: [art] SIG.S = 23586060CF648164EA119DFB0290FB0FBAF9100BAC1F560F884C7085CE9D3F1FA25343F21C5B759712FBCED32054A621
3,068,355 UART: Caliptra RT
3,068,606 UART: [state] CFI Enabled
3,187,975 UART: [rt] RT listening for mailbox commands...
3,188,638 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,483 UART: [rt]cmd =0x46504c54, len=4
3,219,617 >>> mbox cmd response data (8 bytes)
3,219,820 UART: [rt] FIPS self test
3,220,148 UART: [kat] ++
3,220,300 UART: [kat] sha1
3,224,426 UART: [kat] SHA2-256
3,226,448 UART: [kat] SHA2-384
3,227,566 UART: Fatal Error: 0x90020001
3,229,105 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,110 >>> mbox cmd response: failed
3,229,110 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,349 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,046 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
893,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,998 UART: [kat] ++
898,150 UART: [kat] sha1
902,468 UART: [kat] SHA2-256
904,408 UART: [kat] SHA2-384
907,223 UART: [kat] SHA2-512-ACC
909,124 UART: [kat] ECC-384
918,961 UART: [kat] HMAC-384Kdf
923,483 UART: [kat] LMS
1,171,811 UART: [kat] --
1,172,654 UART: [cold-reset] ++
1,173,006 UART: [fht] FHT @ 0x50003400
1,175,799 UART: [idev] ++
1,175,967 UART: [idev] CDI.KEYID = 6
1,176,327 UART: [idev] SUBJECT.KEYID = 7
1,176,751 UART: [idev] UDS.KEYID = 0
1,177,096 ready_for_fw is high
1,177,096 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,699 UART: [idev] Erasing UDS.KEYID = 0
1,201,278 UART: [idev] Sha1 KeyId Algorithm
1,209,790 UART: [idev] --
1,210,730 UART: [ldev] ++
1,210,898 UART: [ldev] CDI.KEYID = 6
1,211,261 UART: [ldev] SUBJECT.KEYID = 5
1,211,687 UART: [ldev] AUTHORITY.KEYID = 7
1,212,150 UART: [ldev] FE.KEYID = 1
1,217,440 UART: [ldev] Erasing FE.KEYID = 1
1,244,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,938 UART: [ldev] --
1,283,393 UART: [fwproc] Wait for Commands...
1,284,205 UART: [fwproc] Recv command 0x46574c44
1,284,933 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,089 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,259 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,928 >>> mbox cmd response: success
2,840,986 UART: [afmc] ++
2,841,154 UART: [afmc] CDI.KEYID = 6
2,841,516 UART: [afmc] SUBJECT.KEYID = 7
2,841,941 UART: [afmc] AUTHORITY.KEYID = 5
2,877,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,931 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,640 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,523 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,224 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,186 UART: [afmc] --
2,921,086 UART: [cold-reset] --
2,922,122 UART: [state] Locking Datavault
2,923,257 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,861 UART: [state] Locking ICCM
2,924,319 UART: [exit] Launching FMC @ 0x40000130
2,929,649 UART:
2,929,665 UART: Running Caliptra FMC ...
2,930,073 UART:
2,930,216 UART: [state] CFI Enabled
2,940,954 UART: [fht] FMC Alias Private Key: 7
3,060,216 UART: [art] Extend RT PCRs Done
3,060,644 UART: [art] Lock RT PCRs Done
3,061,898 UART: [art] Populate DV Done
3,070,157 UART: [fht] FMC Alias Private Key: 7
3,071,121 UART: [art] Derive CDI
3,071,401 UART: [art] Store in slot 0x4
3,156,804 UART: [art] Derive Key Pair
3,157,164 UART: [art] Store priv key in slot 0x5
3,170,178 UART: [art] Derive Key Pair - Done
3,185,058 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,168 UART: [art] PUB.X = 3BECDF210A8CD8B8468E9D30054CEE6DDF7EE89FC497BEBBDC805F71E1828848041EA7527B7C3775B9C1ECAB2409E28A
3,207,946 UART: [art] PUB.Y = 644A938245458AD90FF8917248755EB841692360D64C977249AA7882104C750A930545D52EA9470AE43723F2C49D94B6
3,214,866 UART: [art] SIG.R = 16663CE5B19836B95D6D09D1A5D1F82EDF11B60CFCEEA2403F66917E63FFCBF7E7E8949E1AE8BF41DF0DB3EA3A4BC756
3,221,651 UART: [art] SIG.S = 4ACA9AF5BF50C8013A6BF8D118C9E296E4005579474802807B543D3A249A287E47A56CE63A20F0E1C073CB12A7F46495
3,245,589 UART: Caliptra RT
3,245,932 UART: [state] CFI Enabled
3,366,206 UART: [rt] RT listening for mailbox commands...
3,366,869 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,634 UART: [rt]cmd =0x46504c54, len=4
3,397,964 >>> mbox cmd response data (8 bytes)
3,398,085 UART: [rt] FIPS self test
3,398,413 UART: [kat] ++
3,398,565 UART: [kat] sha1
3,402,747 UART: [kat] SHA2-256
3,404,769 UART: [kat] SHA2-384
3,405,435 UART: Fatal Error: 0x90020001
3,406,974 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,979 >>> mbox cmd response: failed
3,406,979 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,984 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
893,299 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,424 UART: [kat] ++
897,576 UART: [kat] sha1
901,798 UART: [kat] SHA2-256
903,738 UART: [kat] SHA2-384
906,525 UART: [kat] SHA2-512-ACC
908,426 UART: [kat] ECC-384
918,335 UART: [kat] HMAC-384Kdf
922,993 UART: [kat] LMS
1,171,321 UART: [kat] --
1,172,216 UART: [cold-reset] ++
1,172,560 UART: [fht] FHT @ 0x50003400
1,175,077 UART: [idev] ++
1,175,245 UART: [idev] CDI.KEYID = 6
1,175,605 UART: [idev] SUBJECT.KEYID = 7
1,176,029 UART: [idev] UDS.KEYID = 0
1,176,374 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,933 UART: [idev] Erasing UDS.KEYID = 0
1,201,220 UART: [idev] Sha1 KeyId Algorithm
1,209,668 UART: [idev] --
1,210,872 UART: [ldev] ++
1,211,040 UART: [ldev] CDI.KEYID = 6
1,211,403 UART: [ldev] SUBJECT.KEYID = 5
1,211,829 UART: [ldev] AUTHORITY.KEYID = 7
1,212,292 UART: [ldev] FE.KEYID = 1
1,217,758 UART: [ldev] Erasing FE.KEYID = 1
1,243,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,084 UART: [ldev] --
1,283,379 UART: [fwproc] Wait for Commands...
1,284,051 UART: [fwproc] Recv command 0x46574c44
1,284,779 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,597 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,767 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,470 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,810 ready_for_fw is high
1,060,810 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,789 >>> mbox cmd response: success
2,755,422 UART:
2,755,438 UART: Running Caliptra FMC ...
2,755,846 UART:
2,755,989 UART: [state] CFI Enabled
2,766,111 UART: [fht] FMC Alias Private Key: 7
2,885,101 UART: [art] Extend RT PCRs Done
2,885,529 UART: [art] Lock RT PCRs Done
2,887,155 UART: [art] Populate DV Done
2,895,182 UART: [fht] FMC Alias Private Key: 7
2,896,216 UART: [art] Derive CDI
2,896,496 UART: [art] Store in slot 0x4
2,982,309 UART: [art] Derive Key Pair
2,982,669 UART: [art] Store priv key in slot 0x5
2,995,299 UART: [art] Derive Key Pair - Done
3,009,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,993 UART: [art] PUB.X = D1A83B7A91A28AA1138B9B08AACA713789B6F59B136D0DA624F3E443161D2B2F28E07B38C6A5C588766701AE59CC2396
3,032,758 UART: [art] PUB.Y = 46A2BEF98433C9D12F065273860F9F70457EF079FB8D71D8C5701A03AF14FFCA3B4DD9988B6909585DA2E8F90B22C845
3,039,697 UART: [art] SIG.R = E2B67003E7CEEACC129FB82369C787A1EA63C5866CA781D1AC11C75A4C6AD8EA72B4ABD3F9DA31C44CFA5F96A5D300AF
3,046,468 UART: [art] SIG.S = A179DD8DF6D5D30C70DBA589A377E5219177E3FE9C1716FD574CB2F925F4F6FF5C232D008497F98642A3AC7D989BAA71
3,070,349 UART: Caliptra RT
3,070,692 UART: [state] CFI Enabled
3,190,412 UART: [rt] RT listening for mailbox commands...
3,191,075 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,930 UART: [rt]cmd =0x46504c54, len=4
3,222,006 >>> mbox cmd response data (8 bytes)
3,222,157 UART: [rt] FIPS self test
3,222,485 UART: [kat] ++
3,222,637 UART: [kat] sha1
3,227,071 UART: [kat] SHA2-256
3,229,093 UART: [kat] SHA2-384
3,229,949 UART: Fatal Error: 0x90020001
3,231,488 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,493 >>> mbox cmd response: failed
3,231,493 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,608 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,369 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,474 writing to cptra_bootfsm_go
2,699,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,849,269 >>> mbox cmd response: failed
2,849,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,998,737 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,430,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,335 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
2,698,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,848,445 >>> mbox cmd response: failed
2,849,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,997,936 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,430,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,265,577 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,051,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,200,914 >>> mbox cmd response: failed
3,201,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,350,379 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,171,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,878,453 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,471 writing to cptra_bootfsm_go
3,058,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,208,741 >>> mbox cmd response: failed
3,209,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,358,154 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
20,180,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,906,566 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
2,705,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,855,695 >>> mbox cmd response: failed
2,856,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,005,191 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,445,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,286,290 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,697,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,847,764 >>> mbox cmd response: failed
2,848,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,997,206 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,437,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,263,200 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,059,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,209,057 >>> mbox cmd response: failed
3,209,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,358,325 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
20,164,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,886,672 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,061,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,210,903 >>> mbox cmd response: failed
3,211,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,360,347 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,185,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,904,689 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,613 >>> mbox cmd response: failed
814,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,619 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,724 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,683 >>> mbox cmd response: failed
814,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,689 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,304 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,098 >>> mbox cmd response: failed
815,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,104 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,777 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,312 >>> mbox cmd response: failed
815,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,318 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,107 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,543 >>> mbox cmd response: failed
814,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,549 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,266 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,139 >>> mbox cmd response: failed
814,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,145 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,206 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,846 >>> mbox cmd response: failed
813,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,852 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,213 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,144 >>> mbox cmd response: failed
815,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,150 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,159 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,139 UART:
192,510 UART: Running Caliptra ROM ...
193,710 UART:
193,862 UART: [state] CFI Enabled
264,243 UART: [state] LifecycleState = Unprovisioned
266,159 UART: [state] DebugLocked = No
267,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,069 UART: [kat] SHA2-256
441,791 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,311 UART: [kat] ++
452,847 UART: [kat] sha1
464,082 UART: [kat] SHA2-256
466,809 UART: [kat] SHA2-384
472,944 UART: [kat] SHA2-512-ACC
475,324 UART: [kat] ECC-384
2,765,738 UART: [kat] HMAC-384Kdf
2,797,517 UART: [kat] LMS
3,987,828 UART: [kat] --
3,993,056 UART: [cold-reset] ++
3,994,640 UART: [fht] Storing FHT @ 0x50003400
4,006,415 UART: [idev] ++
4,007,005 UART: [idev] CDI.KEYID = 6
4,007,926 UART: [idev] SUBJECT.KEYID = 7
4,009,181 UART: [idev] UDS.KEYID = 0
4,010,236 ready_for_fw is high
4,010,461 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,160,667 UART: [idev] Erasing UDS.KEYID = 0
7,331,717 UART: [idev] Using Sha1 for KeyId Algorithm
7,354,369 UART: [idev] --
7,357,132 UART: [ldev] ++
7,357,707 UART: [ldev] CDI.KEYID = 6
7,358,676 UART: [ldev] SUBJECT.KEYID = 5
7,359,894 UART: [ldev] AUTHORITY.KEYID = 7
7,361,128 UART: [ldev] FE.KEYID = 1
7,409,433 UART: [ldev] Erasing FE.KEYID = 1
10,740,144 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,035,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,050,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,065,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,079,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,098,608 UART: [ldev] --
13,103,936 UART: [fwproc] Waiting for Commands...
13,107,335 UART: [fwproc] Received command 0x46574c44
13,109,523 UART: [fwproc] Received Image of size 119428 bytes
17,225,092 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,640 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,785 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,708,591 >>> mbox cmd response: success
17,712,275 UART: [afmc] ++
17,712,880 UART: [afmc] CDI.KEYID = 6
17,713,768 UART: [afmc] SUBJECT.KEYID = 7
17,715,042 UART: [afmc] AUTHORITY.KEYID = 5
21,077,252 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,377,010 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,379,276 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,393,687 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,408,466 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,422,869 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,444,295 UART: [afmc] --
23,448,860 UART: [cold-reset] --
23,452,832 UART: [state] Locking Datavault
23,459,066 UART: [state] Locking PCR0, PCR1 and PCR31
23,460,868 UART: [state] Locking ICCM
23,463,573 UART: [exit] Launching FMC @ 0x40000130
23,471,978 UART:
23,472,220 UART: Running Caliptra FMC ...
23,473,324 UART:
23,473,483 UART: [state] CFI Enabled
23,537,314 UART: [fht] FMC Alias Private Key: 7
25,877,522 UART: [art] Extend RT PCRs Done
25,878,759 UART: [art] Lock RT PCRs Done
25,880,412 UART: [art] Populate DV Done
25,885,827 UART: [fht] FMC Alias Private Key: 7
25,887,310 UART: [art] Derive CDI
25,888,047 UART: [art] Store in slot 0x4
25,946,063 UART: [art] Derive Key Pair
25,947,110 UART: [art] Store priv key in slot 0x5
29,239,528 UART: [art] Derive Key Pair - Done
29,252,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,541,119 UART: [art] Erasing AUTHORITY.KEYID = 7
31,542,625 UART: [art] PUB.X = 58ABD59FEDBD6DE458090E265F6052410AF30289CD37582695A2C714A59EA40C226756AABCC4D452E5F046CA11F256F1
31,549,931 UART: [art] PUB.Y = 1A91C66280B73B0F235C05F671D4CAF21AD2A352B5C509627FB0B2A4B90FDB1BB3B6313075507D5F03B2AC12C8A2B2CA
31,557,163 UART: [art] SIG.R = BA38ADEA70CBC44D7CB34E0923A57146B44F80F50B531BFD73DE0DE719766E7005AF0035F4BCC5325BBF902AF60191BB
31,564,560 UART: [art] SIG.S = B470BB60BC9C109D332B3C041A30B14DB838C8B2CBD9B7CFF8FE2EE785BD6C23C1FD345ABA57E268793AD6F37DD3E4F2
32,869,226 UART: Caliptra RT
32,869,961 UART: [state] CFI Enabled
33,046,847 UART: [rt] RT listening for mailbox commands...
33,048,704 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,078,398 UART: [rt]cmd =0x46504c54, len=4
33,080,223 >>> mbox cmd response data (8 bytes)
33,081,322 UART: [rt] FIPS self test
33,082,273 UART: [kat] ++
33,082,728 UART: [kat] sha1
33,087,242 UART: [kat] SHA2-256
33,089,120 UART: [kat] SHA2-384
33,091,492 UART: Fatal Error: 0x90020002
33,126,705 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,276,730 >>> mbox cmd response: failed
33,277,385 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,427,271 >>> mbox cmd response: failed
Initializing fuses
982 writing to cptra_bootfsm_go
190,139 UART:
190,422 UART: Running Caliptra ROM ...
191,448 UART:
191,586 UART: [state] CFI Enabled
247,756 UART: [state] LifecycleState = Unprovisioned
249,636 UART: [state] DebugLocked = No
252,603 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
258,191 UART: [kat] SHA2-256
427,927 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
438,441 UART: [kat] ++
438,888 UART: [kat] sha1
450,685 UART: [kat] SHA2-256
453,366 UART: [kat] SHA2-384
459,239 UART: [kat] SHA2-512-ACC
461,573 UART: [kat] ECC-384
2,749,621 UART: [kat] HMAC-384Kdf
2,761,911 UART: [kat] LMS
3,952,236 UART: [kat] --
3,956,309 UART: [cold-reset] ++
3,958,092 UART: [fht] Storing FHT @ 0x50003400
3,968,502 UART: [idev] ++
3,969,069 UART: [idev] CDI.KEYID = 6
3,970,094 UART: [idev] SUBJECT.KEYID = 7
3,971,256 UART: [idev] UDS.KEYID = 0
3,972,872 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,122,975 UART: [idev] Erasing UDS.KEYID = 0
7,305,650 UART: [idev] Using Sha1 for KeyId Algorithm
7,327,491 UART: [idev] --
7,332,246 UART: [ldev] ++
7,332,820 UART: [ldev] CDI.KEYID = 6
7,333,763 UART: [ldev] SUBJECT.KEYID = 5
7,334,999 UART: [ldev] AUTHORITY.KEYID = 7
7,336,239 UART: [ldev] FE.KEYID = 1
7,384,020 UART: [ldev] Erasing FE.KEYID = 1
10,712,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,011,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,026,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,040,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,055,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,073,922 UART: [ldev] --
13,078,870 UART: [fwproc] Waiting for Commands...
13,081,734 UART: [fwproc] Received command 0x46574c44
13,083,924 UART: [fwproc] Received Image of size 119428 bytes
17,206,025 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,279,531 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,352,720 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,683,952 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,801,643 ready_for_fw is high
3,802,133 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,005,849 >>> mbox cmd response: success
23,703,770 UART:
23,704,229 UART: Running Caliptra FMC ...
23,705,349 UART:
23,705,515 UART: [state] CFI Enabled
23,772,187 UART: [fht] FMC Alias Private Key: 7
26,112,398 UART: [art] Extend RT PCRs Done
26,113,751 UART: [art] Lock RT PCRs Done
26,115,191 UART: [art] Populate DV Done
26,120,458 UART: [fht] FMC Alias Private Key: 7
26,122,012 UART: [art] Derive CDI
26,122,785 UART: [art] Store in slot 0x4
26,180,777 UART: [art] Derive Key Pair
26,181,778 UART: [art] Store priv key in slot 0x5
29,474,341 UART: [art] Derive Key Pair - Done
29,487,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,775,797 UART: [art] Erasing AUTHORITY.KEYID = 7
31,777,311 UART: [art] PUB.X = F4B9BB4A1B93D950854FAEFA560F496AB8D11417AB504986317B8ED77C3B3C13903624B459AC0AE64A6D7BA441036B16
31,784,642 UART: [art] PUB.Y = 4B7C90D4C460C59828C2727E0A2DF564A5950EA1FABA4CA84645FBC99460E97AAC8C6C19B1F62D7C9EF6C83EEB27C6F0
31,791,847 UART: [art] SIG.R = C82681D9B30E963DECFBC4A0E6629925B136578C18C4394E11C87185A9C9F5C40C8E251ED1ED971A0AA6A81ED0A17CC6
31,799,292 UART: [art] SIG.S = 08229EB1A011226F3F592B6B6492BD4790E972BF1A152BBDC2289530FBBC85114C440196C96175E2A8605D6634E67FAA
33,104,916 UART: Caliptra RT
33,105,614 UART: [state] CFI Enabled
33,280,435 UART: [rt] RT listening for mailbox commands...
33,282,286 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,312,144 UART: [rt]cmd =0x46504c54, len=4
33,314,040 >>> mbox cmd response data (8 bytes)
33,315,058 UART: [rt] FIPS self test
33,315,960 UART: [kat] ++
33,316,409 UART: [kat] sha1
33,320,976 UART: [kat] SHA2-256
33,322,858 UART: [kat] SHA2-384
33,325,202 UART: Fatal Error: 0x90020002
33,360,410 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,510,459 >>> mbox cmd response: failed
33,511,112 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,660,992 >>> mbox cmd response: failed
Initializing fuses
935 writing to cptra_bootfsm_go
3,788,353 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,959,751 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,497 UART:
192,868 UART: Running Caliptra ROM ...
193,998 UART:
603,530 UART: [state] CFI Enabled
619,124 UART: [state] LifecycleState = Unprovisioned
621,020 UART: [state] DebugLocked = No
623,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,014 UART: [kat] SHA2-256
797,717 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,262 UART: [kat] ++
808,742 UART: [kat] sha1
820,072 UART: [kat] SHA2-256
822,741 UART: [kat] SHA2-384
827,887 UART: [kat] SHA2-512-ACC
830,193 UART: [kat] ECC-384
3,113,405 UART: [kat] HMAC-384Kdf
3,125,530 UART: [kat] LMS
4,315,661 UART: [kat] --
4,320,361 UART: [cold-reset] ++
4,321,875 UART: [fht] Storing FHT @ 0x50003400
4,334,010 UART: [idev] ++
4,334,590 UART: [idev] CDI.KEYID = 6
4,335,580 UART: [idev] SUBJECT.KEYID = 7
4,336,766 UART: [idev] UDS.KEYID = 0
4,337,845 ready_for_fw is high
4,338,104 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,488,658 UART: [idev] Erasing UDS.KEYID = 0
7,621,456 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,186 UART: [idev] --
7,646,882 UART: [ldev] ++
7,647,468 UART: [ldev] CDI.KEYID = 6
7,648,447 UART: [ldev] SUBJECT.KEYID = 5
7,649,614 UART: [ldev] AUTHORITY.KEYID = 7
7,650,906 UART: [ldev] FE.KEYID = 1
7,661,125 UART: [ldev] Erasing FE.KEYID = 1
10,951,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,698 UART: [ldev] --
13,313,702 UART: [fwproc] Waiting for Commands...
13,316,480 UART: [fwproc] Received command 0x46574c44
13,318,710 UART: [fwproc] Received Image of size 119428 bytes
17,428,933 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,507,701 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,865 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,912,001 >>> mbox cmd response: success
17,916,096 UART: [afmc] ++
17,916,689 UART: [afmc] CDI.KEYID = 6
17,917,665 UART: [afmc] SUBJECT.KEYID = 7
17,918,885 UART: [afmc] AUTHORITY.KEYID = 5
21,236,070 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,531,448 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,533,706 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,548,086 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,562,860 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,577,247 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,598,651 UART: [afmc] --
23,602,095 UART: [cold-reset] --
23,604,559 UART: [state] Locking Datavault
23,611,000 UART: [state] Locking PCR0, PCR1 and PCR31
23,612,705 UART: [state] Locking ICCM
23,614,053 UART: [exit] Launching FMC @ 0x40000130
23,622,459 UART:
23,622,709 UART: Running Caliptra FMC ...
23,623,818 UART:
23,623,983 UART: [state] CFI Enabled
23,631,817 UART: [fht] FMC Alias Private Key: 7
25,971,602 UART: [art] Extend RT PCRs Done
25,972,826 UART: [art] Lock RT PCRs Done
25,974,399 UART: [art] Populate DV Done
25,979,814 UART: [fht] FMC Alias Private Key: 7
25,981,517 UART: [art] Derive CDI
25,982,357 UART: [art] Store in slot 0x4
26,024,698 UART: [art] Derive Key Pair
26,025,709 UART: [art] Store priv key in slot 0x5
29,267,737 UART: [art] Derive Key Pair - Done
29,280,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,770 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,280 UART: [art] PUB.X = A0261BAC58DEF3A36AF6E761DDDA6AB6BFF8005BF148E65E503EABBB354F6A79E623CDFF7923ECDAEF8F7437AB862CBF
31,569,603 UART: [art] PUB.Y = CDA430EDE615F83BD80B21C3A61C3E493127D01EE2435C25A835BE4D58AF6B337309287E5DD09EFD878E1329C7C286AA
31,576,845 UART: [art] SIG.R = 93A2A60E313A66D7FD45ECCDBAC9B056BE4F8F6887257562FBF058E1675E65AE0E3C926F33C9901D201C3834E7A2ABBF
31,584,245 UART: [art] SIG.S = 4221FD3B62B4353D2767AC503F6B648455AE5E2115FAD3E5C57D245A38D32D9D33298274390A008D4CFDC152984E4B6D
32,889,100 UART: Caliptra RT
32,889,824 UART: [state] CFI Enabled
33,022,839 UART: [rt] RT listening for mailbox commands...
33,024,710 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,054,354 UART: [rt]cmd =0x46504c54, len=4
33,055,991 >>> mbox cmd response data (8 bytes)
33,057,153 UART: [rt] FIPS self test
33,058,106 UART: [kat] ++
33,058,566 UART: [kat] sha1
33,063,031 UART: [kat] SHA2-256
33,064,913 UART: [kat] SHA2-384
33,067,176 UART: Fatal Error: 0x90020002
33,102,554 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,252,594 >>> mbox cmd response: failed
33,253,253 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,403,194 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,048 UART:
190,348 UART: Running Caliptra ROM ...
191,463 UART:
7,131,016 UART: [state] CFI Enabled
7,144,990 UART: [state] LifecycleState = Unprovisioned
7,146,923 UART: [state] DebugLocked = No
7,149,455 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,154,786 UART: [kat] SHA2-256
7,324,522 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,335,095 UART: [kat] ++
7,335,642 UART: [kat] sha1
7,346,383 UART: [kat] SHA2-256
7,349,080 UART: [kat] SHA2-384
7,355,073 UART: [kat] SHA2-512-ACC
7,357,410 UART: [kat] ECC-384
9,641,338 UART: [kat] HMAC-384Kdf
9,653,148 UART: [kat] LMS
10,843,256 UART: [kat] --
10,846,924 UART: [cold-reset] ++
10,848,259 UART: [fht] Storing FHT @ 0x50003400
10,859,935 UART: [idev] ++
10,860,562 UART: [idev] CDI.KEYID = 6
10,861,449 UART: [idev] SUBJECT.KEYID = 7
10,862,717 UART: [idev] UDS.KEYID = 0
10,864,294 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,014,539 UART: [idev] Erasing UDS.KEYID = 0
14,149,793 UART: [idev] Using Sha1 for KeyId Algorithm
14,170,195 UART: [idev] --
14,173,954 UART: [ldev] ++
14,174,530 UART: [ldev] CDI.KEYID = 6
14,175,473 UART: [ldev] SUBJECT.KEYID = 5
14,176,690 UART: [ldev] AUTHORITY.KEYID = 7
14,177,980 UART: [ldev] FE.KEYID = 1
14,190,545 UART: [ldev] Erasing FE.KEYID = 1
17,482,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,775,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,790,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,805,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,819,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,837,451 UART: [ldev] --
19,841,761 UART: [fwproc] Waiting for Commands...
19,844,300 UART: [fwproc] Received command 0x46574c44
19,846,500 UART: [fwproc] Received Image of size 119428 bytes
23,961,177 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,033,859 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,106,989 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,438,921 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
4,126,634 ready_for_fw is high
4,127,275 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,169,694 >>> mbox cmd response: success
23,808,683 UART:
23,809,121 UART: Running Caliptra FMC ...
23,810,251 UART:
23,810,415 UART: [state] CFI Enabled
23,818,480 UART: [fht] FMC Alias Private Key: 7
26,159,222 UART: [art] Extend RT PCRs Done
26,160,460 UART: [art] Lock RT PCRs Done
26,161,904 UART: [art] Populate DV Done
26,167,127 UART: [fht] FMC Alias Private Key: 7
26,168,788 UART: [art] Derive CDI
26,169,622 UART: [art] Store in slot 0x4
26,212,618 UART: [art] Derive Key Pair
26,213,669 UART: [art] Store priv key in slot 0x5
29,456,101 UART: [art] Derive Key Pair - Done
29,469,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,601 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,120 UART: [art] PUB.X = D617B23966BA60397B417BA43352046EAE7A65AAD36E8CFB2842389919098EB9435BA9172BCF48437B878D4A825E2781
31,758,331 UART: [art] PUB.Y = 233D7DEEFA07BD1F0CC59928EE9C740F4B60801B08759B6F125BC71F1FD62BE95B7ED2AE8C229A3639965673863CBB7E
31,765,582 UART: [art] SIG.R = 229D0B9FCF22211735C0F10298D37FAFF333D234E58303C739A4D795193467CB0C37A43834B9FFB702BA41E31984A1B1
31,772,997 UART: [art] SIG.S = 8BB6D12A65EC56E5BC877CF897996DF55A4307EF55EA6680089808D2550E11BFDE7019456E6E0E5DDE1A5F655FEF3E70
33,078,337 UART: Caliptra RT
33,079,066 UART: [state] CFI Enabled
33,212,019 UART: [rt] RT listening for mailbox commands...
33,213,910 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,243,890 UART: [rt]cmd =0x46504c54, len=4
33,245,456 >>> mbox cmd response data (8 bytes)
33,246,638 UART: [rt] FIPS self test
33,247,595 UART: [kat] ++
33,248,051 UART: [kat] sha1
33,252,382 UART: [kat] SHA2-256
33,254,319 UART: [kat] SHA2-384
33,256,417 UART: Fatal Error: 0x90020002
33,291,625 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,441,652 >>> mbox cmd response: failed
33,442,305 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,592,204 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
10,457,346 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,512,133 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,126 UART:
192,524 UART: Running Caliptra ROM ...
193,756 UART:
193,923 UART: [state] CFI Enabled
262,703 UART: [state] LifecycleState = Unprovisioned
264,618 UART: [state] DebugLocked = No
267,017 UART: [state] WD Timer not started. Device not locked for debugging
271,657 UART: [kat] SHA2-256
451,344 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,084 UART: [kat] ++
462,583 UART: [kat] sha1
474,042 UART: [kat] SHA2-256
476,735 UART: [kat] SHA2-384
481,673 UART: [kat] SHA2-512-ACC
484,052 UART: [kat] ECC-384
2,948,211 UART: [kat] HMAC-384Kdf
2,971,706 UART: [kat] LMS
3,448,210 UART: [kat] --
3,453,630 UART: [cold-reset] ++
3,456,073 UART: [fht] FHT @ 0x50003400
3,467,774 UART: [idev] ++
3,468,424 UART: [idev] CDI.KEYID = 6
3,469,343 UART: [idev] SUBJECT.KEYID = 7
3,470,596 UART: [idev] UDS.KEYID = 0
3,471,548 ready_for_fw is high
3,471,779 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,622,001 UART: [idev] Erasing UDS.KEYID = 0
5,988,631 UART: [idev] Sha1 KeyId Algorithm
6,012,751 UART: [idev] --
6,017,375 UART: [ldev] ++
6,017,965 UART: [ldev] CDI.KEYID = 6
6,018,855 UART: [ldev] SUBJECT.KEYID = 5
6,020,078 UART: [ldev] AUTHORITY.KEYID = 7
6,021,270 UART: [ldev] FE.KEYID = 1
6,057,445 UART: [ldev] Erasing FE.KEYID = 1
8,564,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,168 UART: [ldev] --
10,373,821 UART: [fwproc] Wait for Commands...
10,375,330 UART: [fwproc] Recv command 0x46574c44
10,377,271 UART: [fwproc] Recv'd Img size: 119428 bytes
13,873,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,887 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,028,877 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,359,426 >>> mbox cmd response: success
14,362,745 UART: [afmc] ++
14,363,336 UART: [afmc] CDI.KEYID = 6
14,364,226 UART: [afmc] SUBJECT.KEYID = 7
14,365,499 UART: [afmc] AUTHORITY.KEYID = 5
16,895,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,666 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,429 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,544 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,089 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,921 UART: [afmc] --
18,695,795 UART: [cold-reset] --
18,700,600 UART: [state] Locking Datavault
18,706,941 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,697 UART: [state] Locking ICCM
18,710,662 UART: [exit] Launching FMC @ 0x40000130
18,719,068 UART:
18,719,313 UART: Running Caliptra FMC ...
18,720,422 UART:
18,720,582 UART: [state] CFI Enabled
18,776,290 UART: [fht] FMC Alias Private Key: 7
20,563,724 UART: [art] Extend RT PCRs Done
20,564,949 UART: [art] Lock RT PCRs Done
20,566,634 UART: [art] Populate DV Done
20,572,026 UART: [fht] FMC Alias Private Key: 7
20,573,572 UART: [art] Derive CDI
20,574,313 UART: [art] Store in slot 0x4
20,630,272 UART: [art] Derive Key Pair
20,631,294 UART: [art] Store priv key in slot 0x5
23,093,616 UART: [art] Derive Key Pair - Done
23,106,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,545 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,034 UART: [art] PUB.X = 06FE99BB484DBBD60E2676CE282BB5F5144DDF90E1CEB0E960C749D59ECA85AECD827324089A94177A4A92CEBF33788D
24,828,359 UART: [art] PUB.Y = 968086021EF54E0C0FB36DF3BA79CBCC9957C601F0476467EF889E0AE5DC096DB7B7E4794AAFDCC836C46C4909E6D6E0
24,835,630 UART: [art] SIG.R = 9C9901981F8AA27D1230CCEEBABD4A65E1BA4002DA66D62708EA16775809B1AB05B7E2763C7E16B58D9448E08867670B
24,843,001 UART: [art] SIG.S = 7CFDD4AE6A125D1B7CD2DD9C3EF996E7362D21E4D8DA56F452F54E95E229D67F5808C881EFE68B39BFF55B004B1FDCF4
25,821,501 UART: Caliptra RT
25,822,230 UART: [state] CFI Enabled
26,002,900 UART: [rt] RT listening for mailbox commands...
26,004,757 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,034,554 UART: [rt]cmd =0x46504c54, len=4
26,036,068 >>> mbox cmd response data (8 bytes)
26,037,248 UART: [rt] FIPS self test
26,038,203 UART: [kat] ++
26,038,687 UART: [kat] sha1
26,043,103 UART: [kat] SHA2-256
26,045,044 UART: [kat] SHA2-384
26,047,368 UART: Fatal Error: 0x90020002
26,082,580 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,232,576 >>> mbox cmd response: failed
26,233,161 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,383,125 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
190,109 UART:
190,402 UART: Running Caliptra ROM ...
191,521 UART:
191,671 UART: [state] CFI Enabled
268,176 UART: [state] LifecycleState = Unprovisioned
270,096 UART: [state] DebugLocked = No
271,612 UART: [state] WD Timer not started. Device not locked for debugging
275,621 UART: [kat] SHA2-256
455,288 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,049 UART: [kat] ++
466,529 UART: [kat] sha1
476,760 UART: [kat] SHA2-256
479,501 UART: [kat] SHA2-384
485,106 UART: [kat] SHA2-512-ACC
487,503 UART: [kat] ECC-384
2,951,681 UART: [kat] HMAC-384Kdf
2,973,708 UART: [kat] LMS
3,450,149 UART: [kat] --
3,454,790 UART: [cold-reset] ++
3,456,886 UART: [fht] FHT @ 0x50003400
3,468,509 UART: [idev] ++
3,469,130 UART: [idev] CDI.KEYID = 6
3,470,075 UART: [idev] SUBJECT.KEYID = 7
3,471,311 UART: [idev] UDS.KEYID = 0
3,472,835 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,623,554 UART: [idev] Erasing UDS.KEYID = 0
5,985,410 UART: [idev] Sha1 KeyId Algorithm
6,009,073 UART: [idev] --
6,013,241 UART: [ldev] ++
6,013,822 UART: [ldev] CDI.KEYID = 6
6,014,742 UART: [ldev] SUBJECT.KEYID = 5
6,015,967 UART: [ldev] AUTHORITY.KEYID = 7
6,017,208 UART: [ldev] FE.KEYID = 1
6,058,481 UART: [ldev] Erasing FE.KEYID = 1
8,566,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,869 UART: [ldev] --
10,375,765 UART: [fwproc] Wait for Commands...
10,377,451 UART: [fwproc] Recv command 0x46574c44
10,379,442 UART: [fwproc] Recv'd Img size: 119428 bytes
13,881,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,318 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,029,342 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,360,441 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,463,882 ready_for_fw is high
3,464,341 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,246,243 >>> mbox cmd response: success
18,526,222 UART:
18,526,623 UART: Running Caliptra FMC ...
18,527,952 UART:
18,528,125 UART: [state] CFI Enabled
18,596,798 UART: [fht] FMC Alias Private Key: 7
20,363,217 UART: [art] Extend RT PCRs Done
20,364,448 UART: [art] Lock RT PCRs Done
20,366,299 UART: [art] Populate DV Done
20,371,803 UART: [fht] FMC Alias Private Key: 7
20,373,281 UART: [art] Derive CDI
20,374,029 UART: [art] Store in slot 0x4
20,430,381 UART: [art] Derive Key Pair
20,431,429 UART: [art] Store priv key in slot 0x5
22,894,628 UART: [art] Derive Key Pair - Done
22,907,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,619,859 UART: [art] Erasing AUTHORITY.KEYID = 7
24,621,367 UART: [art] PUB.X = 587D707A341B14F7AC673319673B5E75D1954A3CF6D972B1D3CD5130CB8EB591EB6285B1C1B9F01E1DB6FB0D4B2BCA4F
24,628,692 UART: [art] PUB.Y = CFEE8E0A186BACDE23E53CB5A1FAB9B357BD107423F316613644DE1A62AC6FFD0A18DB03F769D738B57E6672D7AB902C
24,635,944 UART: [art] SIG.R = 535E23E1EC02ADA0317AC441F24E2CB20354A5DE208ACC4CA9873F205571CF835A66190514A85ADA4507287E97BB32DB
24,643,356 UART: [art] SIG.S = A5B5B8CE95056B0A9C7C2B342CDE7204922862F784BE102EC83C7A2F32C0238DB547A544563B83ABB570FE89C2F4AA15
25,622,755 UART: Caliptra RT
25,623,457 UART: [state] CFI Enabled
25,803,959 UART: [rt] RT listening for mailbox commands...
25,805,814 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,835,618 UART: [rt]cmd =0x46504c54, len=4
25,837,143 >>> mbox cmd response data (8 bytes)
25,838,361 UART: [rt] FIPS self test
25,839,319 UART: [kat] ++
25,839,773 UART: [kat] sha1
25,843,963 UART: [kat] SHA2-256
25,845,892 UART: [kat] SHA2-384
25,848,125 UART: Fatal Error: 0x90020002
25,883,448 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,033,490 >>> mbox cmd response: failed
26,034,132 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,183,933 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
3,443,827 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,199,030 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
192,654 UART:
193,030 UART: Running Caliptra ROM ...
194,190 UART:
603,977 UART: [state] CFI Enabled
619,512 UART: [state] LifecycleState = Unprovisioned
621,396 UART: [state] DebugLocked = No
622,934 UART: [state] WD Timer not started. Device not locked for debugging
627,079 UART: [kat] SHA2-256
806,695 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,490 UART: [kat] ++
817,943 UART: [kat] sha1
829,743 UART: [kat] SHA2-256
832,470 UART: [kat] SHA2-384
837,832 UART: [kat] SHA2-512-ACC
840,155 UART: [kat] ECC-384
3,283,902 UART: [kat] HMAC-384Kdf
3,296,718 UART: [kat] LMS
3,773,232 UART: [kat] --
3,780,578 UART: [cold-reset] ++
3,781,978 UART: [fht] FHT @ 0x50003400
3,793,747 UART: [idev] ++
3,794,331 UART: [idev] CDI.KEYID = 6
3,795,318 UART: [idev] SUBJECT.KEYID = 7
3,796,503 UART: [idev] UDS.KEYID = 0
3,797,563 ready_for_fw is high
3,797,791 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,947,739 UART: [idev] Erasing UDS.KEYID = 0
6,275,370 UART: [idev] Sha1 KeyId Algorithm
6,298,686 UART: [idev] --
6,303,931 UART: [ldev] ++
6,304,527 UART: [ldev] CDI.KEYID = 6
6,305,448 UART: [ldev] SUBJECT.KEYID = 5
6,306,673 UART: [ldev] AUTHORITY.KEYID = 7
6,307,910 UART: [ldev] FE.KEYID = 1
6,319,051 UART: [ldev] Erasing FE.KEYID = 1
8,795,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,293 UART: [ldev] --
10,593,337 UART: [fwproc] Wait for Commands...
10,595,331 UART: [fwproc] Recv command 0x46574c44
10,597,321 UART: [fwproc] Recv'd Img size: 119428 bytes
14,091,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,241,600 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,572,349 >>> mbox cmd response: success
14,577,076 UART: [afmc] ++
14,577,696 UART: [afmc] CDI.KEYID = 6
14,578,613 UART: [afmc] SUBJECT.KEYID = 7
14,579,830 UART: [afmc] AUTHORITY.KEYID = 5
17,083,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,804,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,806,442 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,822,256 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,838,324 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,853,891 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,877,695 UART: [afmc] --
18,881,559 UART: [cold-reset] --
18,885,905 UART: [state] Locking Datavault
18,891,051 UART: [state] Locking PCR0, PCR1 and PCR31
18,892,783 UART: [state] Locking ICCM
18,895,353 UART: [exit] Launching FMC @ 0x40000130
18,903,797 UART:
18,904,047 UART: Running Caliptra FMC ...
18,905,157 UART:
18,905,323 UART: [state] CFI Enabled
18,913,587 UART: [fht] FMC Alias Private Key: 7
20,680,680 UART: [art] Extend RT PCRs Done
20,681,906 UART: [art] Lock RT PCRs Done
20,683,616 UART: [art] Populate DV Done
20,689,194 UART: [fht] FMC Alias Private Key: 7
20,690,841 UART: [art] Derive CDI
20,691,659 UART: [art] Store in slot 0x4
20,734,796 UART: [art] Derive Key Pair
20,735,991 UART: [art] Store priv key in slot 0x5
23,162,779 UART: [art] Derive Key Pair - Done
23,175,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,882,257 UART: [art] Erasing AUTHORITY.KEYID = 7
24,883,757 UART: [art] PUB.X = C928DFC90276F636C360EB1509DA670C938B635DD06815D958CC983149698ABE4461708ADA6563E146541D3321723700
24,890,964 UART: [art] PUB.Y = AB40971227DAA0DE93F84F14440CF2BA76C82B6FBF1C0DD1C435007FC4176DCCD0421BB644ED565BACBBE5F7A62ED287
24,898,245 UART: [art] SIG.R = 8884429C87AE1E68AA570AC57F05C8CAAEB88DA2C4DEAE3CF1F72319FDBAC16BFD489E4118D2E38B0F12DD2B98E41996
24,905,662 UART: [art] SIG.S = 6A8ECD816D97909FD47EE8640606FF18D00A273F5CCDF1CC4731D27A4093377E1187A99F96C1AF26430724A62D03A230
25,885,084 UART: Caliptra RT
25,885,799 UART: [state] CFI Enabled
26,018,676 UART: [rt] RT listening for mailbox commands...
26,020,522 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,050,488 UART: [rt]cmd =0x46504c54, len=4
26,052,020 >>> mbox cmd response data (8 bytes)
26,052,983 UART: [rt] FIPS self test
26,053,933 UART: [kat] ++
26,054,387 UART: [kat] sha1
26,058,905 UART: [kat] SHA2-256
26,060,810 UART: [kat] SHA2-384
26,062,969 UART: Fatal Error: 0x90020002
26,098,344 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,248,228 >>> mbox cmd response: failed
26,248,866 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,398,801 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
190,066 UART:
190,356 UART: Running Caliptra ROM ...
191,415 UART:
14,136,650 UART: [state] CFI Enabled
14,150,032 UART: [state] LifecycleState = Unprovisioned
14,151,958 UART: [state] DebugLocked = No
14,154,754 UART: [state] WD Timer not started. Device not locked for debugging
14,159,428 UART: [kat] SHA2-256
14,339,072 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,349,876 UART: [kat] ++
14,350,364 UART: [kat] sha1
14,361,961 UART: [kat] SHA2-256
14,364,651 UART: [kat] SHA2-384
14,370,484 UART: [kat] SHA2-512-ACC
14,372,839 UART: [kat] ECC-384
16,814,639 UART: [kat] HMAC-384Kdf
16,826,692 UART: [kat] LMS
17,303,211 UART: [kat] --
17,306,178 UART: [cold-reset] ++
17,307,787 UART: [fht] FHT @ 0x50003400
17,318,875 UART: [idev] ++
17,319,440 UART: [idev] CDI.KEYID = 6
17,320,417 UART: [idev] SUBJECT.KEYID = 7
17,321,634 UART: [idev] UDS.KEYID = 0
17,323,307 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,473,260 UART: [idev] Erasing UDS.KEYID = 0
19,799,557 UART: [idev] Sha1 KeyId Algorithm
19,822,738 UART: [idev] --
19,827,919 UART: [ldev] ++
19,828,492 UART: [ldev] CDI.KEYID = 6
19,829,378 UART: [ldev] SUBJECT.KEYID = 5
19,830,596 UART: [ldev] AUTHORITY.KEYID = 7
19,831,812 UART: [ldev] FE.KEYID = 1
19,843,191 UART: [ldev] Erasing FE.KEYID = 1
22,321,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,040,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,055,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,071,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,087,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,109,057 UART: [ldev] --
24,114,153 UART: [fwproc] Wait for Commands...
24,117,175 UART: [fwproc] Recv command 0x46574c44
24,119,166 UART: [fwproc] Recv'd Img size: 119428 bytes
27,617,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,692,951 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,765,957 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,097,821 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
3,777,618 ready_for_fw is high
3,778,137 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,461,901 >>> mbox cmd response: success
18,714,187 UART:
18,714,588 UART: Running Caliptra FMC ...
18,715,736 UART:
18,715,901 UART: [state] CFI Enabled
18,724,351 UART: [fht] FMC Alias Private Key: 7
20,490,341 UART: [art] Extend RT PCRs Done
20,491,579 UART: [art] Lock RT PCRs Done
20,493,349 UART: [art] Populate DV Done
20,498,780 UART: [fht] FMC Alias Private Key: 7
20,500,443 UART: [art] Derive CDI
20,501,267 UART: [art] Store in slot 0x4
20,543,714 UART: [art] Derive Key Pair
20,544,767 UART: [art] Store priv key in slot 0x5
22,971,770 UART: [art] Derive Key Pair - Done
22,984,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,690,498 UART: [art] Erasing AUTHORITY.KEYID = 7
24,692,009 UART: [art] PUB.X = 203C477499747DE5B0E8EF504DF60138B490539D1E74D9629B985663B92790A27C3D0FE35E9CDA622B5AE5C2FA4F9C2B
24,699,278 UART: [art] PUB.Y = 69FFAF3440EDB9A33E1A7683B3CFB48C891768CD58B72A3E5F573989CC878560681A4F8B27A7742CA17988B89028083D
24,706,532 UART: [art] SIG.R = B5BBD242ACDE5F970BDED367689ABFAD68CD180D691CF5F8F99A30E2D643DF917604104BDCD4DEDA9F69DC1CA69E36AD
24,713,993 UART: [art] SIG.S = 73FF45408BCFD6F36A8471D427BF3076347E4DFED792F26911C4E4E9B288388C78AAF6F627415047E444522102BB79D6
25,692,956 UART: Caliptra RT
25,693,661 UART: [state] CFI Enabled
25,826,777 UART: [rt] RT listening for mailbox commands...
25,828,627 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,858,533 UART: [rt]cmd =0x46504c54, len=4
25,860,218 >>> mbox cmd response data (8 bytes)
25,861,275 UART: [rt] FIPS self test
25,862,222 UART: [kat] ++
25,862,669 UART: [kat] sha1
25,867,122 UART: [kat] SHA2-256
25,869,024 UART: [kat] SHA2-384
25,871,211 UART: Fatal Error: 0x90020002
25,906,585 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,056,905 >>> mbox cmd response: failed
26,057,549 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,207,457 >>> mbox cmd response: failed
Initializing fuses
923 writing to cptra_bootfsm_go
17,507,105 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,194,952 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,163 UART:
192,523 UART: Running Caliptra ROM ...
193,706 UART:
193,867 UART: [state] CFI Enabled
263,187 UART: [state] LifecycleState = Unprovisioned
265,630 UART: [state] DebugLocked = No
268,254 UART: [state] WD Timer not started. Device not locked for debugging
272,593 UART: [kat] SHA2-256
462,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,240 UART: [kat] ++
473,695 UART: [kat] sha1
486,209 UART: [kat] SHA2-256
489,295 UART: [kat] SHA2-384
496,503 UART: [kat] SHA2-512-ACC
499,043 UART: [kat] ECC-384
2,948,803 UART: [kat] HMAC-384Kdf
2,972,067 UART: [kat] LMS
3,503,875 UART: [kat] --
3,507,050 UART: [cold-reset] ++
3,508,007 UART: [fht] FHT @ 0x50003400
3,520,417 UART: [idev] ++
3,521,142 UART: [idev] CDI.KEYID = 6
3,522,060 UART: [idev] SUBJECT.KEYID = 7
3,523,247 UART: [idev] UDS.KEYID = 0
3,524,176 ready_for_fw is high
3,524,393 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,674,592 UART: [idev] Erasing UDS.KEYID = 0
6,027,112 UART: [idev] Sha1 KeyId Algorithm
6,048,329 UART: [idev] --
6,053,314 UART: [ldev] ++
6,054,067 UART: [ldev] CDI.KEYID = 6
6,055,009 UART: [ldev] SUBJECT.KEYID = 5
6,056,138 UART: [ldev] AUTHORITY.KEYID = 7
6,057,331 UART: [ldev] FE.KEYID = 1
6,100,336 UART: [ldev] Erasing FE.KEYID = 1
8,607,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,174 UART: [ldev] --
10,417,611 UART: [fwproc] Wait for Commands...
10,420,472 UART: [fwproc] Recv command 0x46574c44
10,422,746 UART: [fwproc] Recv'd Img size: 119428 bytes
13,932,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,016,724 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,140,336 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,705,905 >>> mbox cmd response: success
14,709,299 UART: [afmc] ++
14,710,012 UART: [afmc] CDI.KEYID = 6
14,711,203 UART: [afmc] SUBJECT.KEYID = 7
14,712,692 UART: [afmc] AUTHORITY.KEYID = 5
17,235,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,419 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,339 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,439 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,621 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,476 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,072 UART: [afmc] --
19,034,769 UART: [cold-reset] --
19,038,162 UART: [state] Locking Datavault
19,045,371 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,587 UART: [state] Locking ICCM
19,049,858 UART: [exit] Launching FMC @ 0x40000130
19,058,537 UART:
19,058,779 UART: Running Caliptra FMC ...
19,059,888 UART:
19,060,058 UART: [state] CFI Enabled
19,119,129 UART: [fht] FMC Alias Private Key: 7
20,885,945 UART: [art] Extend RT PCRs Done
20,887,171 UART: [art] Lock RT PCRs Done
20,888,863 UART: [art] Populate DV Done
20,894,178 UART: [fht] FMC Alias Private Key: 7
20,895,775 UART: [art] Derive CDI
20,896,598 UART: [art] Store in slot 0x4
20,952,792 UART: [art] Derive Key Pair
20,953,843 UART: [art] Store priv key in slot 0x5
23,416,241 UART: [art] Derive Key Pair - Done
23,429,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,929 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,443 UART: [art] PUB.X = 45AC58E403939514D0DC1179F89B36E89BEAFE6E27EAE91227441EB1B3FD5406916DD4B8DF5B6739F10C427810AC6F4F
25,150,709 UART: [art] PUB.Y = AAAA55BF5502B438E67203C5DA742089C2463BADA8850460D487E7090255C90C6B66E77A3DAB4A518CE1C6AB1ADB7BBA
25,157,957 UART: [art] SIG.R = F6CF90EB3A3C94C3865E4A06CB66B1A1B211CF6C2CFB201643F6A836936A5AB22EBBD25E72483AAEDA7FC88468F331A0
25,165,362 UART: [art] SIG.S = CC3ED98956160805BDA1951BF443A150DFC80D3AA10804B0A7BFE006D9039C4B627DE09C8787EB84C9BAFB00EED04A0D
26,144,227 UART: Caliptra RT
26,144,937 UART: [state] CFI Enabled
26,324,264 UART: [rt] RT listening for mailbox commands...
26,326,122 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,355,773 UART: [rt]cmd =0x46504c54, len=4
26,357,304 >>> mbox cmd response data (8 bytes)
26,358,275 UART: [rt] FIPS self test
26,359,222 UART: [kat] ++
26,359,677 UART: [kat] sha1
26,364,111 UART: [kat] SHA2-256
26,366,007 UART: [kat] SHA2-384
26,368,145 UART: Fatal Error: 0x90020002
26,403,522 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,553,580 >>> mbox cmd response: failed
26,554,215 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,704,133 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,001 UART:
190,301 UART: Running Caliptra ROM ...
191,365 UART:
191,512 UART: [state] CFI Enabled
244,943 UART: [state] LifecycleState = Unprovisioned
247,359 UART: [state] DebugLocked = No
249,336 UART: [state] WD Timer not started. Device not locked for debugging
253,740 UART: [kat] SHA2-256
443,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
454,366 UART: [kat] ++
454,901 UART: [kat] sha1
467,568 UART: [kat] SHA2-256
470,607 UART: [kat] SHA2-384
476,816 UART: [kat] SHA2-512-ACC
479,381 UART: [kat] ECC-384
2,931,873 UART: [kat] HMAC-384Kdf
2,954,518 UART: [kat] LMS
3,486,265 UART: [kat] --
3,489,243 UART: [cold-reset] ++
3,491,131 UART: [fht] FHT @ 0x50003400
3,502,775 UART: [idev] ++
3,503,513 UART: [idev] CDI.KEYID = 6
3,504,425 UART: [idev] SUBJECT.KEYID = 7
3,505,648 UART: [idev] UDS.KEYID = 0
3,507,196 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,657,657 UART: [idev] Erasing UDS.KEYID = 0
6,013,684 UART: [idev] Sha1 KeyId Algorithm
6,036,880 UART: [idev] --
6,041,750 UART: [ldev] ++
6,042,439 UART: [ldev] CDI.KEYID = 6
6,043,357 UART: [ldev] SUBJECT.KEYID = 5
6,044,579 UART: [ldev] AUTHORITY.KEYID = 7
6,045,765 UART: [ldev] FE.KEYID = 1
6,081,705 UART: [ldev] Erasing FE.KEYID = 1
8,588,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,846 UART: [ldev] --
10,394,394 UART: [fwproc] Wait for Commands...
10,396,195 UART: [fwproc] Recv command 0x46574c44
10,398,463 UART: [fwproc] Recv'd Img size: 119428 bytes
13,904,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,979,063 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,102,678 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,668,660 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,438,238 ready_for_fw is high
3,438,643 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,848,485 >>> mbox cmd response: success
19,155,539 UART:
19,155,934 UART: Running Caliptra FMC ...
19,157,107 UART:
19,157,274 UART: [state] CFI Enabled
19,222,697 UART: [fht] FMC Alias Private Key: 7
20,988,603 UART: [art] Extend RT PCRs Done
20,989,824 UART: [art] Lock RT PCRs Done
20,991,676 UART: [art] Populate DV Done
20,997,013 UART: [fht] FMC Alias Private Key: 7
20,998,617 UART: [art] Derive CDI
20,999,362 UART: [art] Store in slot 0x4
21,055,307 UART: [art] Derive Key Pair
21,056,355 UART: [art] Store priv key in slot 0x5
23,519,607 UART: [art] Derive Key Pair - Done
23,532,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,244,919 UART: [art] Erasing AUTHORITY.KEYID = 7
25,246,433 UART: [art] PUB.X = 9F6727D3A723F31AC0EE9A7C7ED43A6E790D69F1798F03CBC653242B18593C50268C829249BC76E7040FDBEE80502D02
25,253,691 UART: [art] PUB.Y = 7A469F5CA6465B2AD415A12F032925012D25E79D797B04E0E59678E521BB5B08D2CB9C1C72F8B7C9C393820BD0C01607
25,260,930 UART: [art] SIG.R = A0EC04FD7FF075D0E308A078B6A47432A03712C668B2A9FE2806A4323D6775AA310192DDE51274EA0768859CB33BC4B4
25,268,330 UART: [art] SIG.S = 737C3969FDF882D9957E0770E913CB63FA961FAE8321CBE124691A532025CE023E0843C6D3B7BC9CDF3BB8BFF2A2A162
26,247,031 UART: Caliptra RT
26,247,745 UART: [state] CFI Enabled
26,430,113 UART: [rt] RT listening for mailbox commands...
26,431,989 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,461,754 UART: [rt]cmd =0x46504c54, len=4
26,463,607 >>> mbox cmd response data (8 bytes)
26,464,677 UART: [rt] FIPS self test
26,465,622 UART: [kat] ++
26,466,076 UART: [kat] sha1
26,470,539 UART: [kat] SHA2-256
26,472,469 UART: [kat] SHA2-384
26,474,707 UART: Fatal Error: 0x90020002
26,510,111 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,660,177 >>> mbox cmd response: failed
26,660,854 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,810,803 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
3,419,915 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,820,553 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,509 UART:
192,879 UART: Running Caliptra ROM ...
194,013 UART:
603,848 UART: [state] CFI Enabled
617,950 UART: [state] LifecycleState = Unprovisioned
620,342 UART: [state] DebugLocked = No
622,581 UART: [state] WD Timer not started. Device not locked for debugging
626,344 UART: [kat] SHA2-256
816,247 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,041 UART: [kat] ++
827,533 UART: [kat] sha1
838,035 UART: [kat] SHA2-256
840,994 UART: [kat] SHA2-384
847,656 UART: [kat] SHA2-512-ACC
850,214 UART: [kat] ECC-384
3,290,841 UART: [kat] HMAC-384Kdf
3,303,105 UART: [kat] LMS
3,834,940 UART: [kat] --
3,838,728 UART: [cold-reset] ++
3,840,665 UART: [fht] FHT @ 0x50003400
3,852,932 UART: [idev] ++
3,853,573 UART: [idev] CDI.KEYID = 6
3,854,608 UART: [idev] SUBJECT.KEYID = 7
3,855,796 UART: [idev] UDS.KEYID = 0
3,856,733 ready_for_fw is high
3,856,960 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,006,998 UART: [idev] Erasing UDS.KEYID = 0
6,336,326 UART: [idev] Sha1 KeyId Algorithm
6,358,223 UART: [idev] --
6,362,168 UART: [ldev] ++
6,362,855 UART: [ldev] CDI.KEYID = 6
6,363,767 UART: [ldev] SUBJECT.KEYID = 5
6,365,092 UART: [ldev] AUTHORITY.KEYID = 7
6,366,311 UART: [ldev] FE.KEYID = 1
6,378,216 UART: [ldev] Erasing FE.KEYID = 1
8,857,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,101 UART: [ldev] --
10,651,480 UART: [fwproc] Wait for Commands...
10,654,129 UART: [fwproc] Recv command 0x46574c44
10,656,419 UART: [fwproc] Recv'd Img size: 119428 bytes
14,167,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,238,912 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,362,484 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,927,947 >>> mbox cmd response: success
14,932,525 UART: [afmc] ++
14,933,244 UART: [afmc] CDI.KEYID = 6
14,934,434 UART: [afmc] SUBJECT.KEYID = 7
14,935,871 UART: [afmc] AUTHORITY.KEYID = 5
17,439,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,162,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,164,202 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,179,350 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,194,474 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,209,367 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,233,360 UART: [afmc] --
19,237,089 UART: [cold-reset] --
19,239,615 UART: [state] Locking Datavault
19,244,335 UART: [state] Locking PCR0, PCR1 and PCR31
19,246,571 UART: [state] Locking ICCM
19,249,388 UART: [exit] Launching FMC @ 0x40000130
19,258,024 UART:
19,258,269 UART: Running Caliptra FMC ...
19,259,374 UART:
19,259,541 UART: [state] CFI Enabled
19,267,431 UART: [fht] FMC Alias Private Key: 7
21,034,367 UART: [art] Extend RT PCRs Done
21,035,592 UART: [art] Lock RT PCRs Done
21,037,416 UART: [art] Populate DV Done
21,042,739 UART: [fht] FMC Alias Private Key: 7
21,044,283 UART: [art] Derive CDI
21,045,108 UART: [art] Store in slot 0x4
21,088,246 UART: [art] Derive Key Pair
21,089,286 UART: [art] Store priv key in slot 0x5
23,515,686 UART: [art] Derive Key Pair - Done
23,528,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,235,272 UART: [art] Erasing AUTHORITY.KEYID = 7
25,236,785 UART: [art] PUB.X = A523C59E183607101D705132164FE21F7DE6546E8928BD0BE8B49375F0A50C8B0B7C1178524427337A107D6611487D39
25,244,024 UART: [art] PUB.Y = 2D9B1A5103EA08DC81C7F6C40F1F1897F38958A166BA0BD8ED56EC6E53CB2199870F5B53F7DCB0FE05EBE4462C38F074
25,251,277 UART: [art] SIG.R = 4FFFB6B71907069113E1700431C23B12C4983924BBA9F7110B3F25C0ACEBD652EA5AD341ACB3FD2D29B979EE3508359B
25,258,680 UART: [art] SIG.S = E252ED721BAC724B10AFD766FB1855FCF09C2C50688F451AB875E539464CE9AC15208C89D61113FCE12FEBEEAAC19DF2
26,237,483 UART: Caliptra RT
26,238,195 UART: [state] CFI Enabled
26,371,003 UART: [rt] RT listening for mailbox commands...
26,372,865 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,402,746 UART: [rt]cmd =0x46504c54, len=4
26,404,437 >>> mbox cmd response data (8 bytes)
26,405,513 UART: [rt] FIPS self test
26,406,481 UART: [kat] ++
26,406,937 UART: [kat] sha1
26,411,289 UART: [kat] SHA2-256
26,413,167 UART: [kat] SHA2-384
26,415,372 UART: Fatal Error: 0x90020002
26,450,700 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,600,592 >>> mbox cmd response: failed
26,601,209 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,751,152 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
190,029 UART:
190,327 UART: Running Caliptra ROM ...
191,446 UART:
13,766,935 UART: [state] CFI Enabled
13,782,624 UART: [state] LifecycleState = Unprovisioned
13,785,060 UART: [state] DebugLocked = No
13,786,358 UART: [state] WD Timer not started. Device not locked for debugging
13,791,264 UART: [kat] SHA2-256
13,981,126 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,991,927 UART: [kat] ++
13,992,470 UART: [kat] sha1
14,003,202 UART: [kat] SHA2-256
14,006,175 UART: [kat] SHA2-384
14,011,748 UART: [kat] SHA2-512-ACC
14,014,325 UART: [kat] ECC-384
16,458,186 UART: [kat] HMAC-384Kdf
16,472,037 UART: [kat] LMS
17,003,875 UART: [kat] --
17,010,406 UART: [cold-reset] ++
17,012,885 UART: [fht] FHT @ 0x50003400
17,024,202 UART: [idev] ++
17,024,905 UART: [idev] CDI.KEYID = 6
17,025,878 UART: [idev] SUBJECT.KEYID = 7
17,027,046 UART: [idev] UDS.KEYID = 0
17,028,584 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,178,510 UART: [idev] Erasing UDS.KEYID = 0
19,502,068 UART: [idev] Sha1 KeyId Algorithm
19,524,613 UART: [idev] --
19,529,801 UART: [ldev] ++
19,530,486 UART: [ldev] CDI.KEYID = 6
19,531,399 UART: [ldev] SUBJECT.KEYID = 5
19,532,618 UART: [ldev] AUTHORITY.KEYID = 7
19,534,002 UART: [ldev] FE.KEYID = 1
19,544,185 UART: [ldev] Erasing FE.KEYID = 1
22,020,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,742,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,757,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,772,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,787,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,808,075 UART: [ldev] --
23,813,837 UART: [fwproc] Wait for Commands...
23,816,050 UART: [fwproc] Recv command 0x46574c44
23,818,374 UART: [fwproc] Recv'd Img size: 119428 bytes
27,329,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,403,730 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,527,356 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,093,675 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,754,442 ready_for_fw is high
3,754,852 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,069,941 >>> mbox cmd response: success
19,323,639 UART:
19,324,024 UART: Running Caliptra FMC ...
19,325,233 UART:
19,325,411 UART: [state] CFI Enabled
19,333,478 UART: [fht] FMC Alias Private Key: 7
21,099,424 UART: [art] Extend RT PCRs Done
21,100,686 UART: [art] Lock RT PCRs Done
21,102,105 UART: [art] Populate DV Done
21,107,535 UART: [fht] FMC Alias Private Key: 7
21,109,135 UART: [art] Derive CDI
21,109,959 UART: [art] Store in slot 0x4
21,152,720 UART: [art] Derive Key Pair
21,153,728 UART: [art] Store priv key in slot 0x5
23,580,553 UART: [art] Derive Key Pair - Done
23,593,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,300,291 UART: [art] Erasing AUTHORITY.KEYID = 7
25,301,874 UART: [art] PUB.X = 5DB050C6537B424C57EDD6A865E44F075F6CBE1E6F29DF4A614E4F396257A9B4D2B4277BCEEB8D08F7E9048306706040
25,309,056 UART: [art] PUB.Y = 9A9B7195F52CF756D2C8C7E056AE433FA079621B3E9F9ECA5961D460997B707CBCFEAAC59ABC6D45A78BB10E5DA59BAE
25,316,318 UART: [art] SIG.R = 2D488B5CDF51763AFC2FBE3EF3561522F0A134DA849C4AC46C025702061053454BD06604BA5E09A84AF10AD909DD51FC
25,323,745 UART: [art] SIG.S = 787BC3BDF3F1ED71DE9B0F38EDFD06EECEB5CA55927A3B203C0C77FF5DFB444109A5BF0CDEE4D517F1B821CF4242640B
26,302,762 UART: Caliptra RT
26,303,460 UART: [state] CFI Enabled
26,436,096 UART: [rt] RT listening for mailbox commands...
26,437,962 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,467,795 UART: [rt]cmd =0x46504c54, len=4
26,469,199 >>> mbox cmd response data (8 bytes)
26,470,116 UART: [rt] FIPS self test
26,471,064 UART: [kat] ++
26,471,524 UART: [kat] sha1
26,475,878 UART: [kat] SHA2-256
26,477,810 UART: [kat] SHA2-384
26,479,745 UART: Fatal Error: 0x90020002
26,514,958 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,665,358 >>> mbox cmd response: failed
26,666,049 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,815,936 >>> mbox cmd response: failed
Initializing fuses
931 writing to cptra_bootfsm_go
16,872,174 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,171,984 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,717 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,247 UART: [kat] SHA2-256
882,178 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,293 UART: [kat] ++
886,445 UART: [kat] sha1
890,857 UART: [kat] SHA2-256
892,795 UART: [kat] SHA2-384
895,436 UART: [kat] SHA2-512-ACC
897,337 UART: [kat] ECC-384
902,864 UART: [kat] HMAC-384Kdf
907,480 UART: [kat] LMS
1,475,676 UART: [kat] --
1,476,573 UART: [cold-reset] ++
1,477,045 UART: [fht] Storing FHT @ 0x50003400
1,479,804 UART: [idev] ++
1,479,972 UART: [idev] CDI.KEYID = 6
1,480,332 UART: [idev] SUBJECT.KEYID = 7
1,480,756 UART: [idev] UDS.KEYID = 0
1,481,101 ready_for_fw is high
1,481,101 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,100 UART: [idev] Erasing UDS.KEYID = 0
1,505,702 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,316 UART: [idev] --
1,515,261 UART: [ldev] ++
1,515,429 UART: [ldev] CDI.KEYID = 6
1,515,792 UART: [ldev] SUBJECT.KEYID = 5
1,516,218 UART: [ldev] AUTHORITY.KEYID = 7
1,516,681 UART: [ldev] FE.KEYID = 1
1,522,075 UART: [ldev] Erasing FE.KEYID = 1
1,548,004 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,180 UART: [ldev] --
1,587,441 UART: [fwproc] Waiting for Commands...
1,588,070 UART: [fwproc] Received command 0x46574c44
1,588,861 UART: [fwproc] Received Image of size 119428 bytes
2,943,339 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,921 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,139 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,850 >>> mbox cmd response: success
3,143,940 UART: [afmc] ++
3,144,108 UART: [afmc] CDI.KEYID = 6
3,144,470 UART: [afmc] SUBJECT.KEYID = 7
3,144,895 UART: [afmc] AUTHORITY.KEYID = 5
3,180,402 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,646 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,426 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,135 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,018 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,701 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,489 UART: [afmc] --
3,223,577 UART: [cold-reset] --
3,224,283 UART: [state] Locking Datavault
3,225,674 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,278 UART: [state] Locking ICCM
3,226,742 UART: [exit] Launching FMC @ 0x40000130
3,232,072 UART:
3,232,088 UART: Running Caliptra FMC ...
3,232,496 UART:
3,232,550 UART: [state] CFI Enabled
3,243,080 UART: [fht] FMC Alias Private Key: 7
3,362,098 UART: [art] Extend RT PCRs Done
3,362,526 UART: [art] Lock RT PCRs Done
3,364,024 UART: [art] Populate DV Done
3,372,429 UART: [fht] FMC Alias Private Key: 7
3,373,609 UART: [art] Derive CDI
3,373,889 UART: [art] Store in slot 0x4
3,459,589 UART: [art] Derive Key Pair
3,459,949 UART: [art] Store priv key in slot 0x5
3,472,608 UART: [art] Derive Key Pair - Done
3,487,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,351 UART: [art] PUB.X = 8724E336FA0575DD774CF898A8A11353BB48A62E89567190DF177D4770C28E86EA8DDC1E1B733C393A73FEF98E7C3977
3,510,120 UART: [art] PUB.Y = ABE13F932B0224FB05473B5B12A3F88FA0B3398E8AD2EDF506CF2120FED3E7B2430CC328DE7F52CA28D4B41567DEF165
3,517,074 UART: [art] SIG.R = A44D3CD43D2065C52078567749B8996C16432E761380FDE9E4A8ABD6787312CC77777FFE4A64A5A67FB65A792F63F92B
3,523,844 UART: [art] SIG.S = 7434088A273DA90872037090548511255DB9B09622CF9D851801D483647D23D5B9D7BB7F61E9336F9413DC96B63D1E25
3,547,990 UART: Caliptra RT
3,548,241 UART: [state] CFI Enabled
3,669,589 UART: [rt] RT listening for mailbox commands...
3,670,252 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,137 UART: [rt]cmd =0x46504c54, len=4
3,701,217 >>> mbox cmd response data (8 bytes)
3,701,404 UART: [rt] FIPS self test
3,701,732 UART: [kat] ++
3,701,884 UART: [kat] sha1
3,706,122 UART: [kat] SHA2-256
3,708,144 UART: [kat] SHA2-384
3,710,951 UART: Fatal Error: 0x90020002
3,712,490 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,712,495 >>> mbox cmd response: failed
3,712,495 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,712,500 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,131 UART: [kat] SHA2-256
882,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,177 UART: [kat] ++
886,329 UART: [kat] sha1
890,655 UART: [kat] SHA2-256
892,593 UART: [kat] SHA2-384
895,192 UART: [kat] SHA2-512-ACC
897,093 UART: [kat] ECC-384
902,676 UART: [kat] HMAC-384Kdf
907,140 UART: [kat] LMS
1,475,336 UART: [kat] --
1,476,333 UART: [cold-reset] ++
1,476,723 UART: [fht] Storing FHT @ 0x50003400
1,479,326 UART: [idev] ++
1,479,494 UART: [idev] CDI.KEYID = 6
1,479,854 UART: [idev] SUBJECT.KEYID = 7
1,480,278 UART: [idev] UDS.KEYID = 0
1,480,623 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,412 UART: [idev] Erasing UDS.KEYID = 0
1,504,928 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,400 UART: [idev] --
1,514,477 UART: [ldev] ++
1,514,645 UART: [ldev] CDI.KEYID = 6
1,515,008 UART: [ldev] SUBJECT.KEYID = 5
1,515,434 UART: [ldev] AUTHORITY.KEYID = 7
1,515,897 UART: [ldev] FE.KEYID = 1
1,521,407 UART: [ldev] Erasing FE.KEYID = 1
1,546,142 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,184 UART: [ldev] --
1,585,689 UART: [fwproc] Waiting for Commands...
1,586,366 UART: [fwproc] Received command 0x46574c44
1,587,157 UART: [fwproc] Received Image of size 119428 bytes
2,940,879 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,967,687 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,998,905 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,140,548 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,179 ready_for_fw is high
1,362,179 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,582 >>> mbox cmd response: success
3,052,737 UART:
3,052,753 UART: Running Caliptra FMC ...
3,053,161 UART:
3,053,215 UART: [state] CFI Enabled
3,063,651 UART: [fht] FMC Alias Private Key: 7
3,182,427 UART: [art] Extend RT PCRs Done
3,182,855 UART: [art] Lock RT PCRs Done
3,184,139 UART: [art] Populate DV Done
3,192,410 UART: [fht] FMC Alias Private Key: 7
3,193,566 UART: [art] Derive CDI
3,193,846 UART: [art] Store in slot 0x4
3,279,674 UART: [art] Derive Key Pair
3,280,034 UART: [art] Store priv key in slot 0x5
3,293,155 UART: [art] Derive Key Pair - Done
3,307,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,322,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,323,705 UART: [art] PUB.X = 2008D5C26F1ABBA6D6C2BF1EF47E4CEDFA7F59F8D253876CC31588DEEC623096609217F9BB79CB30A8A4A8F9D286F239
3,330,488 UART: [art] PUB.Y = 77C124017E284589246475D25C3787A0FC2A2BFFDC72C2B1AA3917974DED2F739F44EC7ED02DF9F3534A576B3BE23112
3,337,439 UART: [art] SIG.R = 01F70E502A8E5A8B1F01C3955E7D49187ACE5BA312FD14FC6DE4515F425439FD6A5F86F847B50913A3570FCCCC219CE0
3,344,204 UART: [art] SIG.S = 0B5A7D737A1A95644D4CAA0E7083F918BB4B48F3ECCDC1D5BC55936FA7CA99CAF9FA8A535EC648F18FD3BAA31B10F7D9
3,368,006 UART: Caliptra RT
3,368,257 UART: [state] CFI Enabled
3,488,728 UART: [rt] RT listening for mailbox commands...
3,489,391 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,138 UART: [rt]cmd =0x46504c54, len=4
3,520,314 >>> mbox cmd response data (8 bytes)
3,520,607 UART: [rt] FIPS self test
3,520,935 UART: [kat] ++
3,521,087 UART: [kat] sha1
3,525,363 UART: [kat] SHA2-256
3,527,385 UART: [kat] SHA2-384
3,530,186 UART: Fatal Error: 0x90020002
3,531,725 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,531,730 >>> mbox cmd response: failed
3,531,730 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,531,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,549 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,302 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
87,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,686 UART: [kat] SHA2-256
882,617 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,732 UART: [kat] ++
886,884 UART: [kat] sha1
891,004 UART: [kat] SHA2-256
892,942 UART: [kat] SHA2-384
895,727 UART: [kat] SHA2-512-ACC
897,628 UART: [kat] ECC-384
903,133 UART: [kat] HMAC-384Kdf
907,725 UART: [kat] LMS
1,475,921 UART: [kat] --
1,476,932 UART: [cold-reset] ++
1,477,402 UART: [fht] Storing FHT @ 0x50003400
1,480,205 UART: [idev] ++
1,480,373 UART: [idev] CDI.KEYID = 6
1,480,733 UART: [idev] SUBJECT.KEYID = 7
1,481,157 UART: [idev] UDS.KEYID = 0
1,481,502 ready_for_fw is high
1,481,502 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,329 UART: [idev] Erasing UDS.KEYID = 0
1,506,591 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,313 UART: [idev] --
1,516,284 UART: [ldev] ++
1,516,452 UART: [ldev] CDI.KEYID = 6
1,516,815 UART: [ldev] SUBJECT.KEYID = 5
1,517,241 UART: [ldev] AUTHORITY.KEYID = 7
1,517,704 UART: [ldev] FE.KEYID = 1
1,522,922 UART: [ldev] Erasing FE.KEYID = 1
1,549,329 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,843 UART: [ldev] --
1,589,224 UART: [fwproc] Waiting for Commands...
1,589,961 UART: [fwproc] Received command 0x46574c44
1,590,752 UART: [fwproc] Received Image of size 119428 bytes
2,945,110 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,972,730 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,003,948 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,145,573 >>> mbox cmd response: success
3,146,661 UART: [afmc] ++
3,146,829 UART: [afmc] CDI.KEYID = 6
3,147,191 UART: [afmc] SUBJECT.KEYID = 7
3,147,616 UART: [afmc] AUTHORITY.KEYID = 5
3,182,573 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,199,065 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,199,845 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,205,554 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,211,437 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,217,120 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,980 UART: [afmc] --
3,225,970 UART: [cold-reset] --
3,226,838 UART: [state] Locking Datavault
3,228,169 UART: [state] Locking PCR0, PCR1 and PCR31
3,228,773 UART: [state] Locking ICCM
3,229,319 UART: [exit] Launching FMC @ 0x40000130
3,234,649 UART:
3,234,665 UART: Running Caliptra FMC ...
3,235,073 UART:
3,235,216 UART: [state] CFI Enabled
3,245,496 UART: [fht] FMC Alias Private Key: 7
3,364,570 UART: [art] Extend RT PCRs Done
3,364,998 UART: [art] Lock RT PCRs Done
3,366,640 UART: [art] Populate DV Done
3,374,919 UART: [fht] FMC Alias Private Key: 7
3,376,047 UART: [art] Derive CDI
3,376,327 UART: [art] Store in slot 0x4
3,462,465 UART: [art] Derive Key Pair
3,462,825 UART: [art] Store priv key in slot 0x5
3,476,324 UART: [art] Derive Key Pair - Done
3,490,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,506,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,507,143 UART: [art] PUB.X = 5FB8180571DEE2A225421222EF23A0384DBAFAC76BF430C70723D2EB70A0C19B990A90D2AFA13F8CD2CC4243B7AE1E34
3,513,918 UART: [art] PUB.Y = 22A69EFAC630466A2D97AA4C5696B418E165BDE893A65607FC99E08957D501812B320AE9428C409CA7D3087EAD343ED2
3,520,858 UART: [art] SIG.R = B2E704BC9BE5D83C8C558FF63DECA2F899427A2CA50CCBD68307CC454424777B755C79DA89FE1A5141ABE01CC776358C
3,527,633 UART: [art] SIG.S = A43BC7EF3E30B47A24DD54F83998145A7D51E0A0E5F8DBD6944B081F9D817538156AE693E03E036EEC24D2C8E25E7B93
3,551,777 UART: Caliptra RT
3,552,120 UART: [state] CFI Enabled
3,672,981 UART: [rt] RT listening for mailbox commands...
3,673,644 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,703,535 UART: [rt]cmd =0x46504c54, len=4
3,704,687 >>> mbox cmd response data (8 bytes)
3,705,024 UART: [rt] FIPS self test
3,705,352 UART: [kat] ++
3,705,504 UART: [kat] sha1
3,709,644 UART: [kat] SHA2-256
3,711,666 UART: [kat] SHA2-384
3,714,615 UART: Fatal Error: 0x90020002
3,716,154 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,159 >>> mbox cmd response: failed
3,716,159 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,164 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,240 UART: [kat] SHA2-256
882,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,286 UART: [kat] ++
886,438 UART: [kat] sha1
890,648 UART: [kat] SHA2-256
892,586 UART: [kat] SHA2-384
895,285 UART: [kat] SHA2-512-ACC
897,186 UART: [kat] ECC-384
902,683 UART: [kat] HMAC-384Kdf
907,175 UART: [kat] LMS
1,475,371 UART: [kat] --
1,476,032 UART: [cold-reset] ++
1,476,470 UART: [fht] Storing FHT @ 0x50003400
1,479,481 UART: [idev] ++
1,479,649 UART: [idev] CDI.KEYID = 6
1,480,009 UART: [idev] SUBJECT.KEYID = 7
1,480,433 UART: [idev] UDS.KEYID = 0
1,480,778 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,625 UART: [idev] Erasing UDS.KEYID = 0
1,505,057 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,521 UART: [idev] --
1,514,596 UART: [ldev] ++
1,514,764 UART: [ldev] CDI.KEYID = 6
1,515,127 UART: [ldev] SUBJECT.KEYID = 5
1,515,553 UART: [ldev] AUTHORITY.KEYID = 7
1,516,016 UART: [ldev] FE.KEYID = 1
1,521,158 UART: [ldev] Erasing FE.KEYID = 1
1,545,611 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,451 UART: [ldev] --
1,584,728 UART: [fwproc] Waiting for Commands...
1,585,573 UART: [fwproc] Received command 0x46574c44
1,586,364 UART: [fwproc] Received Image of size 119428 bytes
2,941,558 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,692 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,999,910 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,511 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,666 ready_for_fw is high
1,362,666 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,351 >>> mbox cmd response: success
3,053,908 UART:
3,053,924 UART: Running Caliptra FMC ...
3,054,332 UART:
3,054,475 UART: [state] CFI Enabled
3,065,031 UART: [fht] FMC Alias Private Key: 7
3,184,003 UART: [art] Extend RT PCRs Done
3,184,431 UART: [art] Lock RT PCRs Done
3,185,995 UART: [art] Populate DV Done
3,194,206 UART: [fht] FMC Alias Private Key: 7
3,195,226 UART: [art] Derive CDI
3,195,506 UART: [art] Store in slot 0x4
3,281,252 UART: [art] Derive Key Pair
3,281,612 UART: [art] Store priv key in slot 0x5
3,294,689 UART: [art] Derive Key Pair - Done
3,309,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,652 UART: [art] PUB.X = 4F781242B28D4483E6D392817C9BB369DE3E6D73CFB8458E90A39459D662C2C6E1E2062BB5D969170E1F226BE61F0BDB
3,332,417 UART: [art] PUB.Y = 935CE870C25EAC931CCE7EF5731F85E9AFE6CDDCB446DB6EDEF83FDEB40358ED4A3855A4DF5738292024B94476A122FA
3,339,384 UART: [art] SIG.R = 0D232DAC0910E987AFF71A0F06B088D282AC9F24EB9B8EA799ED5DDF5033273836DE0177791AD344A532C44596EA86DD
3,346,147 UART: [art] SIG.S = 344C5AFD763838C49991CC27AFAF14BC0611D8CB6612790637C3F849FE2D6B31A367D399833C976841997C2E54957686
3,370,219 UART: Caliptra RT
3,370,562 UART: [state] CFI Enabled
3,490,759 UART: [rt] RT listening for mailbox commands...
3,491,422 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,091 UART: [rt]cmd =0x46504c54, len=4
3,522,189 >>> mbox cmd response data (8 bytes)
3,522,482 UART: [rt] FIPS self test
3,522,810 UART: [kat] ++
3,522,962 UART: [kat] sha1
3,527,380 UART: [kat] SHA2-256
3,529,402 UART: [kat] SHA2-384
3,532,193 UART: Fatal Error: 0x90020002
3,533,732 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,533,737 >>> mbox cmd response: failed
3,533,737 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,533,742 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,510 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,495 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
891,072 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,176 UART: [kat] ++
895,328 UART: [kat] sha1
899,618 UART: [kat] SHA2-256
901,558 UART: [kat] SHA2-384
904,273 UART: [kat] SHA2-512-ACC
906,174 UART: [kat] ECC-384
915,807 UART: [kat] HMAC-384Kdf
920,329 UART: [kat] LMS
1,168,641 UART: [kat] --
1,169,708 UART: [cold-reset] ++
1,170,118 UART: [fht] FHT @ 0x50003400
1,172,614 UART: [idev] ++
1,172,782 UART: [idev] CDI.KEYID = 6
1,173,143 UART: [idev] SUBJECT.KEYID = 7
1,173,568 UART: [idev] UDS.KEYID = 0
1,173,914 ready_for_fw is high
1,173,914 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,711 UART: [idev] Erasing UDS.KEYID = 0
1,199,501 UART: [idev] Sha1 KeyId Algorithm
1,208,351 UART: [idev] --
1,209,378 UART: [ldev] ++
1,209,546 UART: [ldev] CDI.KEYID = 6
1,209,910 UART: [ldev] SUBJECT.KEYID = 5
1,210,337 UART: [ldev] AUTHORITY.KEYID = 7
1,210,800 UART: [ldev] FE.KEYID = 1
1,215,966 UART: [ldev] Erasing FE.KEYID = 1
1,242,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,072 UART: [ldev] --
1,281,331 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,705 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,285 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,460 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,961 >>> mbox cmd response: success
2,838,977 UART: [afmc] ++
2,839,145 UART: [afmc] CDI.KEYID = 6
2,839,508 UART: [afmc] SUBJECT.KEYID = 7
2,839,934 UART: [afmc] AUTHORITY.KEYID = 5
2,875,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,501 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,211 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,092 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,793 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,628 UART: [afmc] --
2,918,483 UART: [cold-reset] --
2,919,345 UART: [state] Locking Datavault
2,920,198 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,802 UART: [state] Locking ICCM
2,921,370 UART: [exit] Launching FMC @ 0x40000130
2,926,700 UART:
2,926,716 UART: Running Caliptra FMC ...
2,927,124 UART:
2,927,178 UART: [state] CFI Enabled
2,937,596 UART: [fht] FMC Alias Private Key: 7
3,056,216 UART: [art] Extend RT PCRs Done
3,056,644 UART: [art] Lock RT PCRs Done
3,057,992 UART: [art] Populate DV Done
3,066,351 UART: [fht] FMC Alias Private Key: 7
3,067,397 UART: [art] Derive CDI
3,067,677 UART: [art] Store in slot 0x4
3,153,310 UART: [art] Derive Key Pair
3,153,670 UART: [art] Store priv key in slot 0x5
3,167,080 UART: [art] Derive Key Pair - Done
3,181,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,196,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,580 UART: [art] PUB.X = 53940E13654C5097F7284648DBAB52DE3892075908CD69BF398751FDB4861C264E4C428621D767AD94F6F8CD605A5EF1
3,204,337 UART: [art] PUB.Y = AC84487D0566A3CDB68995B23CF7866628C2EB286318C85F28916F03692A06763263C4297D93A9499BC1B28FD4CAA9AB
3,211,276 UART: [art] SIG.R = 805A18E2B6C4B9225BCCF1A8EDCF5956A8475ACF4A6F2AAB87AA9E36563B92E49AACE060103185BDE2ED90D4844389CF
3,218,064 UART: [art] SIG.S = 99AD066591623922980BAA6DCC4B9EDCA1CC7A3FBF822AB0FE8D8299DF9090B17A9F7029C61E06AB467DE6AAECEBD970
3,241,267 UART: Caliptra RT
3,241,518 UART: [state] CFI Enabled
3,361,388 UART: [rt] RT listening for mailbox commands...
3,362,051 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,844 UART: [rt]cmd =0x46504c54, len=4
3,393,082 >>> mbox cmd response data (8 bytes)
3,393,329 UART: [rt] FIPS self test
3,393,657 UART: [kat] ++
3,393,809 UART: [kat] sha1
3,398,045 UART: [kat] SHA2-256
3,400,067 UART: [kat] SHA2-384
3,403,006 UART: Fatal Error: 0x90020002
3,404,545 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,550 >>> mbox cmd response: failed
3,404,550 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,404,555 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,507 UART: [kat] SHA2-512-ACC
906,408 UART: [kat] ECC-384
916,537 UART: [kat] HMAC-384Kdf
921,159 UART: [kat] LMS
1,169,471 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,838 UART: [fht] FHT @ 0x50003400
1,173,584 UART: [idev] ++
1,173,752 UART: [idev] CDI.KEYID = 6
1,174,113 UART: [idev] SUBJECT.KEYID = 7
1,174,538 UART: [idev] UDS.KEYID = 0
1,174,884 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,313 UART: [idev] Erasing UDS.KEYID = 0
1,199,269 UART: [idev] Sha1 KeyId Algorithm
1,208,187 UART: [idev] --
1,209,270 UART: [ldev] ++
1,209,438 UART: [ldev] CDI.KEYID = 6
1,209,802 UART: [ldev] SUBJECT.KEYID = 5
1,210,229 UART: [ldev] AUTHORITY.KEYID = 7
1,210,692 UART: [ldev] FE.KEYID = 1
1,215,810 UART: [ldev] Erasing FE.KEYID = 1
1,241,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,748 UART: [ldev] --
1,280,995 UART: [fwproc] Wait for Commands...
1,281,714 UART: [fwproc] Recv command 0x46574c44
1,282,447 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,511 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,686 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,381 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,976 ready_for_fw is high
1,058,976 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,524 >>> mbox cmd response: success
2,751,577 UART:
2,751,593 UART: Running Caliptra FMC ...
2,752,001 UART:
2,752,055 UART: [state] CFI Enabled
2,762,487 UART: [fht] FMC Alias Private Key: 7
2,881,365 UART: [art] Extend RT PCRs Done
2,881,793 UART: [art] Lock RT PCRs Done
2,883,121 UART: [art] Populate DV Done
2,891,650 UART: [fht] FMC Alias Private Key: 7
2,892,736 UART: [art] Derive CDI
2,893,016 UART: [art] Store in slot 0x4
2,978,767 UART: [art] Derive Key Pair
2,979,127 UART: [art] Store priv key in slot 0x5
2,992,087 UART: [art] Derive Key Pair - Done
3,006,929 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,281 UART: [art] PUB.X = 2B955B80D264A7BAF960B9FBBA32D111D68B008343DDF5C3F7FBAF5A046B62BDB49776DC3F047C2AA789D86ECF8569B1
3,030,041 UART: [art] PUB.Y = 5ED2176C52D3598B0AD007C2C715ADBAF9E9B09A930D9B0BD4993120BBED7F624D14B36CEFFBD74050A32955DFAF049E
3,036,994 UART: [art] SIG.R = 893EC2ABAE54E07E15FC8D8B3D3503EE050C0D19F2BF5DAD39C881ED01B707CB46849CF040995DEEBEBC6769132A0478
3,043,759 UART: [art] SIG.S = 87487000775D9D03C7A7B9C4F14FC6BB11E7281033B8E71DCCE936B1206422068CFA6638BEB237CFD8730E1E0B920E43
3,066,864 UART: Caliptra RT
3,067,115 UART: [state] CFI Enabled
3,186,103 UART: [rt] RT listening for mailbox commands...
3,186,766 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,216,741 UART: [rt]cmd =0x46504c54, len=4
3,218,063 >>> mbox cmd response data (8 bytes)
3,218,276 UART: [rt] FIPS self test
3,218,604 UART: [kat] ++
3,218,756 UART: [kat] sha1
3,222,986 UART: [kat] SHA2-256
3,225,008 UART: [kat] SHA2-384
3,227,795 UART: Fatal Error: 0x90020002
3,229,334 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,339 >>> mbox cmd response: failed
3,229,339 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,192 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,360 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,359 UART: [kat] ++
895,511 UART: [kat] sha1
899,739 UART: [kat] SHA2-256
901,679 UART: [kat] SHA2-384
904,586 UART: [kat] SHA2-512-ACC
906,487 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,722 UART: [kat] LMS
1,169,034 UART: [kat] --
1,170,043 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,172,957 UART: [idev] ++
1,173,125 UART: [idev] CDI.KEYID = 6
1,173,486 UART: [idev] SUBJECT.KEYID = 7
1,173,911 UART: [idev] UDS.KEYID = 0
1,174,257 ready_for_fw is high
1,174,257 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,806 UART: [idev] Erasing UDS.KEYID = 0
1,199,016 UART: [idev] Sha1 KeyId Algorithm
1,207,948 UART: [idev] --
1,208,967 UART: [ldev] ++
1,209,135 UART: [ldev] CDI.KEYID = 6
1,209,499 UART: [ldev] SUBJECT.KEYID = 5
1,209,926 UART: [ldev] AUTHORITY.KEYID = 7
1,210,389 UART: [ldev] FE.KEYID = 1
1,215,913 UART: [ldev] Erasing FE.KEYID = 1
1,242,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,761 UART: [ldev] --
1,282,136 UART: [fwproc] Wait for Commands...
1,282,821 UART: [fwproc] Recv command 0x46574c44
1,283,554 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,382 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,557 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,234 >>> mbox cmd response: success
2,839,298 UART: [afmc] ++
2,839,466 UART: [afmc] CDI.KEYID = 6
2,839,829 UART: [afmc] SUBJECT.KEYID = 7
2,840,255 UART: [afmc] AUTHORITY.KEYID = 5
2,875,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,978 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,688 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,569 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,270 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,001 UART: [afmc] --
2,919,044 UART: [cold-reset] --
2,919,892 UART: [state] Locking Datavault
2,920,927 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,531 UART: [state] Locking ICCM
2,922,123 UART: [exit] Launching FMC @ 0x40000130
2,927,453 UART:
2,927,469 UART: Running Caliptra FMC ...
2,927,877 UART:
2,928,020 UART: [state] CFI Enabled
2,938,678 UART: [fht] FMC Alias Private Key: 7
3,057,828 UART: [art] Extend RT PCRs Done
3,058,256 UART: [art] Lock RT PCRs Done
3,059,876 UART: [art] Populate DV Done
3,068,129 UART: [fht] FMC Alias Private Key: 7
3,069,263 UART: [art] Derive CDI
3,069,543 UART: [art] Store in slot 0x4
3,155,582 UART: [art] Derive Key Pair
3,155,942 UART: [art] Store priv key in slot 0x5
3,168,814 UART: [art] Derive Key Pair - Done
3,183,583 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,387 UART: [art] PUB.X = 72343D5A036CE03FB481ABE0A498F01EEFC4DE10C8D01103AA370AEEBA4F069F97F11D20B4E403D9F8AC87AF6FBEB35D
3,207,166 UART: [art] PUB.Y = BEA8699930194A46719B10831E20ABA880ED99CA224F569C60B5251782BA53B0F461ABF7E12FC34081F4E03AEDAB4AB4
3,214,124 UART: [art] SIG.R = F45CDA376EAA39DB6ABC88B3CC92027044818136371B63F45788E91E2BAECCCFB0026E8B81BE5F60B87546DB1E8B42DA
3,220,904 UART: [art] SIG.S = 80197242A87F15429D2A1696F763E4640D83C69A74E54BEAAB917542AD7AB919081D87745D1973B3E1D80DC11B8FE508
3,245,082 UART: Caliptra RT
3,245,425 UART: [state] CFI Enabled
3,366,057 UART: [rt] RT listening for mailbox commands...
3,366,720 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,767 UART: [rt]cmd =0x46504c54, len=4
3,398,023 >>> mbox cmd response data (8 bytes)
3,398,350 UART: [rt] FIPS self test
3,398,678 UART: [kat] ++
3,398,830 UART: [kat] sha1
3,403,132 UART: [kat] SHA2-256
3,405,154 UART: [kat] SHA2-384
3,407,825 UART: Fatal Error: 0x90020002
3,409,364 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,409,369 >>> mbox cmd response: failed
3,409,369 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,409,374 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,822 UART: [kat] SHA2-512-ACC
906,723 UART: [kat] ECC-384
916,378 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,170,427 UART: [cold-reset] ++
1,170,873 UART: [fht] FHT @ 0x50003400
1,173,539 UART: [idev] ++
1,173,707 UART: [idev] CDI.KEYID = 6
1,174,068 UART: [idev] SUBJECT.KEYID = 7
1,174,493 UART: [idev] UDS.KEYID = 0
1,174,839 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,656 UART: [idev] Erasing UDS.KEYID = 0
1,199,234 UART: [idev] Sha1 KeyId Algorithm
1,208,092 UART: [idev] --
1,209,215 UART: [ldev] ++
1,209,383 UART: [ldev] CDI.KEYID = 6
1,209,747 UART: [ldev] SUBJECT.KEYID = 5
1,210,174 UART: [ldev] AUTHORITY.KEYID = 7
1,210,637 UART: [ldev] FE.KEYID = 1
1,215,885 UART: [ldev] Erasing FE.KEYID = 1
1,241,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,887 UART: [ldev] --
1,281,270 UART: [fwproc] Wait for Commands...
1,281,897 UART: [fwproc] Recv command 0x46574c44
1,282,630 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,456 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,631 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,166 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,355 ready_for_fw is high
1,059,355 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,063 >>> mbox cmd response: success
2,754,166 UART:
2,754,182 UART: Running Caliptra FMC ...
2,754,590 UART:
2,754,733 UART: [state] CFI Enabled
2,765,191 UART: [fht] FMC Alias Private Key: 7
2,884,039 UART: [art] Extend RT PCRs Done
2,884,467 UART: [art] Lock RT PCRs Done
2,886,079 UART: [art] Populate DV Done
2,894,422 UART: [fht] FMC Alias Private Key: 7
2,895,594 UART: [art] Derive CDI
2,895,874 UART: [art] Store in slot 0x4
2,981,545 UART: [art] Derive Key Pair
2,981,905 UART: [art] Store priv key in slot 0x5
2,995,483 UART: [art] Derive Key Pair - Done
3,010,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,330 UART: [art] PUB.X = A05A921134033644A2424DCCFFDA9F65EEDBC072A5B3DD2E90BEBB2680430568B77132D971F5962BD3724C02C83912BB
3,033,097 UART: [art] PUB.Y = 88855804FF7089006A67AACB30AEA7F8165C2D5A1A483EDFA5974FDC04C2CAACB77E4566876C455EA6B92715D1CD4FA6
3,040,033 UART: [art] SIG.R = 77EB17911C188F0B785BAFBE31B7AB8148A82CC0844A025E6B2E4B50F2A3821B8BB43049BD4EBFD759C473641284FB83
3,046,805 UART: [art] SIG.S = 50C5084D574BA518C7377C7BA7EB2D836D7F179B9E85CA7720B0113097858E4BE5FCB093B47C937CF231487B449500F4
3,070,766 UART: Caliptra RT
3,071,109 UART: [state] CFI Enabled
3,191,251 UART: [rt] RT listening for mailbox commands...
3,191,914 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,031 UART: [rt]cmd =0x46504c54, len=4
3,223,213 >>> mbox cmd response data (8 bytes)
3,223,438 UART: [rt] FIPS self test
3,223,766 UART: [kat] ++
3,223,918 UART: [kat] sha1
3,228,188 UART: [kat] SHA2-256
3,230,210 UART: [kat] SHA2-384
3,233,019 UART: Fatal Error: 0x90020002
3,234,558 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,234,563 >>> mbox cmd response: failed
3,234,563 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,234,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,749 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,531 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
893,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,549 UART: [kat] ++
897,701 UART: [kat] sha1
902,011 UART: [kat] SHA2-256
903,951 UART: [kat] SHA2-384
906,794 UART: [kat] SHA2-512-ACC
908,695 UART: [kat] ECC-384
918,382 UART: [kat] HMAC-384Kdf
923,078 UART: [kat] LMS
1,171,406 UART: [kat] --
1,172,365 UART: [cold-reset] ++
1,172,943 UART: [fht] FHT @ 0x50003400
1,175,820 UART: [idev] ++
1,175,988 UART: [idev] CDI.KEYID = 6
1,176,348 UART: [idev] SUBJECT.KEYID = 7
1,176,772 UART: [idev] UDS.KEYID = 0
1,177,117 ready_for_fw is high
1,177,117 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,524 UART: [idev] Erasing UDS.KEYID = 0
1,201,681 UART: [idev] Sha1 KeyId Algorithm
1,210,055 UART: [idev] --
1,211,289 UART: [ldev] ++
1,211,457 UART: [ldev] CDI.KEYID = 6
1,211,820 UART: [ldev] SUBJECT.KEYID = 5
1,212,246 UART: [ldev] AUTHORITY.KEYID = 7
1,212,709 UART: [ldev] FE.KEYID = 1
1,217,925 UART: [ldev] Erasing FE.KEYID = 1
1,244,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,103 UART: [ldev] --
1,283,540 UART: [fwproc] Wait for Commands...
1,284,200 UART: [fwproc] Recv command 0x46574c44
1,284,928 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,480 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,650 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,285 >>> mbox cmd response: success
2,840,533 UART: [afmc] ++
2,840,701 UART: [afmc] CDI.KEYID = 6
2,841,063 UART: [afmc] SUBJECT.KEYID = 7
2,841,488 UART: [afmc] AUTHORITY.KEYID = 5
2,877,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,232 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,941 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,824 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,525 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,351 UART: [afmc] --
2,920,433 UART: [cold-reset] --
2,921,483 UART: [state] Locking Datavault
2,922,820 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,424 UART: [state] Locking ICCM
2,923,880 UART: [exit] Launching FMC @ 0x40000130
2,929,210 UART:
2,929,226 UART: Running Caliptra FMC ...
2,929,634 UART:
2,929,688 UART: [state] CFI Enabled
2,940,330 UART: [fht] FMC Alias Private Key: 7
3,059,612 UART: [art] Extend RT PCRs Done
3,060,040 UART: [art] Lock RT PCRs Done
3,061,566 UART: [art] Populate DV Done
3,069,895 UART: [fht] FMC Alias Private Key: 7
3,071,013 UART: [art] Derive CDI
3,071,293 UART: [art] Store in slot 0x4
3,157,440 UART: [art] Derive Key Pair
3,157,800 UART: [art] Store priv key in slot 0x5
3,170,946 UART: [art] Derive Key Pair - Done
3,185,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,000 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,765 UART: [art] PUB.X = 0E927521D84F2E7DCF48D24EF5B265E5397F4F05E621028E167FE3518C856C55FAD7338C78B4C73E4ADE37AD211B3E98
3,208,532 UART: [art] PUB.Y = 535DC84A2B06ACCF4208A6C6D6191D49F1F4AE5ADD6621DB7DDE624600F0C69714DCAFC2D1C69E2A17EDE2192342BB36
3,215,472 UART: [art] SIG.R = B18D5EDCF28A57F3A24283D91FDDB0F47C762696A60147EA4BDCCA2DDF1EFA07DD2B468A22150225EAACEB3C5A6AA0F7
3,222,261 UART: [art] SIG.S = B2E9475AE6C33CDE430F7B464FE7C3731D359826951E2384D132500B8A072F5730C8E6831F097DF456C3DE11A1704ED2
3,246,109 UART: Caliptra RT
3,246,360 UART: [state] CFI Enabled
3,366,414 UART: [rt] RT listening for mailbox commands...
3,367,077 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,210 UART: [rt]cmd =0x46504c54, len=4
3,398,304 >>> mbox cmd response data (8 bytes)
3,398,469 UART: [rt] FIPS self test
3,398,797 UART: [kat] ++
3,398,949 UART: [kat] sha1
3,402,987 UART: [kat] SHA2-256
3,405,009 UART: [kat] SHA2-384
3,407,912 UART: Fatal Error: 0x90020002
3,409,451 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,409,456 >>> mbox cmd response: failed
3,409,456 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,409,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
893,404 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,529 UART: [kat] ++
897,681 UART: [kat] sha1
901,925 UART: [kat] SHA2-256
903,865 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,480 UART: [kat] LMS
1,170,808 UART: [kat] --
1,171,547 UART: [cold-reset] ++
1,171,961 UART: [fht] FHT @ 0x50003400
1,174,710 UART: [idev] ++
1,174,878 UART: [idev] CDI.KEYID = 6
1,175,238 UART: [idev] SUBJECT.KEYID = 7
1,175,662 UART: [idev] UDS.KEYID = 0
1,176,007 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,710 UART: [idev] Erasing UDS.KEYID = 0
1,201,471 UART: [idev] Sha1 KeyId Algorithm
1,210,135 UART: [idev] --
1,211,041 UART: [ldev] ++
1,211,209 UART: [ldev] CDI.KEYID = 6
1,211,572 UART: [ldev] SUBJECT.KEYID = 5
1,211,998 UART: [ldev] AUTHORITY.KEYID = 7
1,212,461 UART: [ldev] FE.KEYID = 1
1,217,493 UART: [ldev] Erasing FE.KEYID = 1
1,244,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,491 UART: [ldev] --
1,283,800 UART: [fwproc] Wait for Commands...
1,284,434 UART: [fwproc] Recv command 0x46574c44
1,285,162 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,286 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,456 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,083 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,895 ready_for_fw is high
1,059,895 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,648 >>> mbox cmd response: success
2,752,219 UART:
2,752,235 UART: Running Caliptra FMC ...
2,752,643 UART:
2,752,697 UART: [state] CFI Enabled
2,763,089 UART: [fht] FMC Alias Private Key: 7
2,882,753 UART: [art] Extend RT PCRs Done
2,883,181 UART: [art] Lock RT PCRs Done
2,884,613 UART: [art] Populate DV Done
2,892,846 UART: [fht] FMC Alias Private Key: 7
2,893,806 UART: [art] Derive CDI
2,894,086 UART: [art] Store in slot 0x4
2,979,387 UART: [art] Derive Key Pair
2,979,747 UART: [art] Store priv key in slot 0x5
2,993,059 UART: [art] Derive Key Pair - Done
3,007,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,147 UART: [art] PUB.X = C393445B7A9CAA2C8AA07640F32AA343363AF3B903DE2A52BABB73391B5F5FC83B3C22DE40B613A4A5E7816395B4E50D
3,030,923 UART: [art] PUB.Y = 66EBB4B1E8F84F9D0B14584CE1B02996C583886E9344B636B25092C578F2356834AB14A682C6BE6DFA6E6AEF637CBE30
3,037,876 UART: [art] SIG.R = E6C4F181B8C537D91FB6D82335E31E4F51962E9B0331F514BBF8C33150B7809D470BEAA81C3337A1BAB6BDEB62EEF985
3,044,652 UART: [art] SIG.S = 6C8B366A28B4BE88944FB5692C629BB226341F593458370F95CB1EB9654074367E5E8052E0E446A7B52715E812BED061
3,068,905 UART: Caliptra RT
3,069,156 UART: [state] CFI Enabled
3,189,127 UART: [rt] RT listening for mailbox commands...
3,189,790 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,553 UART: [rt]cmd =0x46504c54, len=4
3,220,667 >>> mbox cmd response data (8 bytes)
3,220,854 UART: [rt] FIPS self test
3,221,182 UART: [kat] ++
3,221,334 UART: [kat] sha1
3,225,562 UART: [kat] SHA2-256
3,227,584 UART: [kat] SHA2-384
3,230,177 UART: Fatal Error: 0x90020002
3,231,716 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,721 >>> mbox cmd response: failed
3,231,721 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,705 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,592 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
893,559 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,684 UART: [kat] ++
897,836 UART: [kat] sha1
902,098 UART: [kat] SHA2-256
904,038 UART: [kat] SHA2-384
906,657 UART: [kat] SHA2-512-ACC
908,558 UART: [kat] ECC-384
918,159 UART: [kat] HMAC-384Kdf
922,705 UART: [kat] LMS
1,171,033 UART: [kat] --
1,172,172 UART: [cold-reset] ++
1,172,632 UART: [fht] FHT @ 0x50003400
1,175,093 UART: [idev] ++
1,175,261 UART: [idev] CDI.KEYID = 6
1,175,621 UART: [idev] SUBJECT.KEYID = 7
1,176,045 UART: [idev] UDS.KEYID = 0
1,176,390 ready_for_fw is high
1,176,390 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,845 UART: [idev] Erasing UDS.KEYID = 0
1,200,560 UART: [idev] Sha1 KeyId Algorithm
1,208,828 UART: [idev] --
1,209,854 UART: [ldev] ++
1,210,022 UART: [ldev] CDI.KEYID = 6
1,210,385 UART: [ldev] SUBJECT.KEYID = 5
1,210,811 UART: [ldev] AUTHORITY.KEYID = 7
1,211,274 UART: [ldev] FE.KEYID = 1
1,216,738 UART: [ldev] Erasing FE.KEYID = 1
1,243,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,854 UART: [ldev] --
1,283,207 UART: [fwproc] Wait for Commands...
1,283,779 UART: [fwproc] Recv command 0x46574c44
1,284,507 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,964 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,134 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,845 >>> mbox cmd response: success
2,840,017 UART: [afmc] ++
2,840,185 UART: [afmc] CDI.KEYID = 6
2,840,547 UART: [afmc] SUBJECT.KEYID = 7
2,840,972 UART: [afmc] AUTHORITY.KEYID = 5
2,876,497 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,182 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,891 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,774 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,475 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,289 UART: [afmc] --
2,919,357 UART: [cold-reset] --
2,920,025 UART: [state] Locking Datavault
2,921,150 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,754 UART: [state] Locking ICCM
2,922,352 UART: [exit] Launching FMC @ 0x40000130
2,927,682 UART:
2,927,698 UART: Running Caliptra FMC ...
2,928,106 UART:
2,928,249 UART: [state] CFI Enabled
2,938,943 UART: [fht] FMC Alias Private Key: 7
3,058,107 UART: [art] Extend RT PCRs Done
3,058,535 UART: [art] Lock RT PCRs Done
3,060,251 UART: [art] Populate DV Done
3,068,788 UART: [fht] FMC Alias Private Key: 7
3,069,914 UART: [art] Derive CDI
3,070,194 UART: [art] Store in slot 0x4
3,156,141 UART: [art] Derive Key Pair
3,156,501 UART: [art] Store priv key in slot 0x5
3,169,983 UART: [art] Derive Key Pair - Done
3,184,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,167 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,932 UART: [art] PUB.X = 825E1743EABED98B339AD7D3B6AD7030C604758DAFC570DA7FB1324B17ED6A50734E88E6F3ADBBA733315DCDDA8FC6BC
3,207,723 UART: [art] PUB.Y = A1F8B42D2FA81AAD355B5A71C8937062DFBED366B5A2E54CEADFDF78E09DDA5F714D62F8A4E88BF2031C99FF943B4F23
3,214,694 UART: [art] SIG.R = BF148C0C02EA65C2A53FB48304212107B95CAC3A23CA09639F05237C94DA4FA9F9C5805B74C46AA9064BBDF7E1DB1460
3,221,453 UART: [art] SIG.S = 4E6395F9554142CB42C94CDFD9FCA04A3E1A1523F803FF6BE4B9E7CAEAA03EEB5D867E8D2B0CBBA5F41C042AEF03F0C0
3,245,559 UART: Caliptra RT
3,245,902 UART: [state] CFI Enabled
3,365,953 UART: [rt] RT listening for mailbox commands...
3,366,616 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,649 UART: [rt]cmd =0x46504c54, len=4
3,397,631 >>> mbox cmd response data (8 bytes)
3,397,780 UART: [rt] FIPS self test
3,398,108 UART: [kat] ++
3,398,260 UART: [kat] sha1
3,402,652 UART: [kat] SHA2-256
3,404,674 UART: [kat] SHA2-384
3,407,595 UART: Fatal Error: 0x90020002
3,409,134 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,409,139 >>> mbox cmd response: failed
3,409,139 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,409,144 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
893,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,622 UART: [kat] ++
897,774 UART: [kat] sha1
901,968 UART: [kat] SHA2-256
903,908 UART: [kat] SHA2-384
906,633 UART: [kat] SHA2-512-ACC
908,534 UART: [kat] ECC-384
918,951 UART: [kat] HMAC-384Kdf
923,479 UART: [kat] LMS
1,171,807 UART: [kat] --
1,172,796 UART: [cold-reset] ++
1,173,272 UART: [fht] FHT @ 0x50003400
1,175,997 UART: [idev] ++
1,176,165 UART: [idev] CDI.KEYID = 6
1,176,525 UART: [idev] SUBJECT.KEYID = 7
1,176,949 UART: [idev] UDS.KEYID = 0
1,177,294 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,957 UART: [idev] Erasing UDS.KEYID = 0
1,202,200 UART: [idev] Sha1 KeyId Algorithm
1,210,596 UART: [idev] --
1,211,844 UART: [ldev] ++
1,212,012 UART: [ldev] CDI.KEYID = 6
1,212,375 UART: [ldev] SUBJECT.KEYID = 5
1,212,801 UART: [ldev] AUTHORITY.KEYID = 7
1,213,264 UART: [ldev] FE.KEYID = 1
1,218,220 UART: [ldev] Erasing FE.KEYID = 1
1,244,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,184 UART: [ldev] --
1,283,667 UART: [fwproc] Wait for Commands...
1,284,461 UART: [fwproc] Recv command 0x46574c44
1,285,189 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,386 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,556 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,213 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,851 >>> mbox cmd response: success
2,752,148 UART:
2,752,164 UART: Running Caliptra FMC ...
2,752,572 UART:
2,752,715 UART: [state] CFI Enabled
2,763,467 UART: [fht] FMC Alias Private Key: 7
2,882,159 UART: [art] Extend RT PCRs Done
2,882,587 UART: [art] Lock RT PCRs Done
2,884,087 UART: [art] Populate DV Done
2,892,228 UART: [fht] FMC Alias Private Key: 7
2,893,344 UART: [art] Derive CDI
2,893,624 UART: [art] Store in slot 0x4
2,979,141 UART: [art] Derive Key Pair
2,979,501 UART: [art] Store priv key in slot 0x5
2,992,659 UART: [art] Derive Key Pair - Done
3,007,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,941 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,706 UART: [art] PUB.X = BF1DCD851F2817362016CAFBDDCDA573FFADE41EC1B3D8F116B5E6BCAFF0C173313D6AFDE739F17985697E19872B1A08
3,030,495 UART: [art] PUB.Y = 62C3F173168E1D69924E92B919D423972D4881455B337F0BF2C07E29C06952205C73B9530C9035D47CFE9A492FE3AD43
3,037,431 UART: [art] SIG.R = 1665CE0BFD41D1DF9E5D9B901D368DCA767DB420414AC2DE2705E66EB89E12D0BEC45D7EB2605F850E65300C6B6CE4AD
3,044,207 UART: [art] SIG.S = 3743321F79C173ACA31D9FE2B848B22B08FFC67D53D13DD3D0292E923F2BAF22FC34E48BCE1EBF4941396D6B0729E3E0
3,068,081 UART: Caliptra RT
3,068,424 UART: [state] CFI Enabled
3,188,752 UART: [rt] RT listening for mailbox commands...
3,189,415 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,444 UART: [rt]cmd =0x46504c54, len=4
3,220,544 >>> mbox cmd response data (8 bytes)
3,220,815 UART: [rt] FIPS self test
3,221,143 UART: [kat] ++
3,221,295 UART: [kat] sha1
3,225,483 UART: [kat] SHA2-256
3,227,505 UART: [kat] SHA2-384
3,230,184 UART: Fatal Error: 0x90020002
3,231,723 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,728 >>> mbox cmd response: failed
3,231,728 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,733 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,852 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,561 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,065 UART:
192,435 UART: Running Caliptra ROM ...
193,555 UART:
193,701 UART: [state] CFI Enabled
258,921 UART: [state] LifecycleState = Unprovisioned
260,844 UART: [state] DebugLocked = No
263,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,399 UART: [kat] SHA2-256
439,093 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,575 UART: [kat] ++
450,170 UART: [kat] sha1
461,862 UART: [kat] SHA2-256
464,515 UART: [kat] SHA2-384
470,281 UART: [kat] SHA2-512-ACC
472,623 UART: [kat] ECC-384
2,764,573 UART: [kat] HMAC-384Kdf
2,796,634 UART: [kat] LMS
3,986,940 UART: [kat] --
3,990,755 UART: [cold-reset] ++
3,992,689 UART: [fht] Storing FHT @ 0x50003400
4,004,604 UART: [idev] ++
4,005,187 UART: [idev] CDI.KEYID = 6
4,006,135 UART: [idev] SUBJECT.KEYID = 7
4,007,355 UART: [idev] UDS.KEYID = 0
4,008,385 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,030,649 UART: [idev] Erasing UDS.KEYID = 0
7,341,830 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,278 UART: [idev] --
7,367,839 UART: [ldev] ++
7,368,417 UART: [ldev] CDI.KEYID = 6
7,369,397 UART: [ldev] SUBJECT.KEYID = 5
7,370,557 UART: [ldev] AUTHORITY.KEYID = 7
7,371,844 UART: [ldev] FE.KEYID = 1
7,399,790 UART: [ldev] Erasing FE.KEYID = 1
10,729,921 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,017 UART: [ldev] --
13,091,273 UART: [fwproc] Waiting for Commands...
13,093,274 UART: [fwproc] Received command 0x46505652
13,095,685 UART: [rt] FIPS Version
13,097,355 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
3,783,814 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,822,871 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,502 UART:
192,868 UART: Running Caliptra ROM ...
194,028 UART:
603,667 UART: [state] CFI Enabled
615,612 UART: [state] LifecycleState = Unprovisioned
617,532 UART: [state] DebugLocked = No
619,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,274 UART: [kat] SHA2-256
794,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,587 UART: [kat] ++
805,071 UART: [kat] sha1
817,034 UART: [kat] SHA2-256
819,731 UART: [kat] SHA2-384
826,738 UART: [kat] SHA2-512-ACC
829,090 UART: [kat] ECC-384
3,113,497 UART: [kat] HMAC-384Kdf
3,125,102 UART: [kat] LMS
4,315,200 UART: [kat] --
4,319,715 UART: [cold-reset] ++
4,320,907 UART: [fht] Storing FHT @ 0x50003400
4,333,261 UART: [idev] ++
4,333,845 UART: [idev] CDI.KEYID = 6
4,334,762 UART: [idev] SUBJECT.KEYID = 7
4,336,062 UART: [idev] UDS.KEYID = 0
4,337,151 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,351,680 UART: [idev] Erasing UDS.KEYID = 0
7,624,076 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,011 UART: [idev] --
7,650,399 UART: [ldev] ++
7,650,984 UART: [ldev] CDI.KEYID = 6
7,651,908 UART: [ldev] SUBJECT.KEYID = 5
7,653,131 UART: [ldev] AUTHORITY.KEYID = 7
7,654,368 UART: [ldev] FE.KEYID = 1
7,664,696 UART: [ldev] Erasing FE.KEYID = 1
10,951,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,376 UART: [ldev] --
13,312,606 UART: [fwproc] Waiting for Commands...
13,315,633 UART: [fwproc] Received command 0x46505652
13,318,036 UART: [rt] FIPS Version
13,319,711 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,127,948 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,042,696 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
192,198 UART:
192,599 UART: Running Caliptra ROM ...
193,803 UART:
193,962 UART: [state] CFI Enabled
262,243 UART: [state] LifecycleState = Unprovisioned
264,148 UART: [state] DebugLocked = No
267,103 UART: [state] WD Timer not started. Device not locked for debugging
271,622 UART: [kat] SHA2-256
451,278 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,068 UART: [kat] ++
462,552 UART: [kat] sha1
472,842 UART: [kat] SHA2-256
475,582 UART: [kat] SHA2-384
480,805 UART: [kat] SHA2-512-ACC
483,148 UART: [kat] ECC-384
2,945,237 UART: [kat] HMAC-384Kdf
2,969,918 UART: [kat] LMS
3,446,415 UART: [kat] --
3,451,140 UART: [cold-reset] ++
3,452,923 UART: [fht] FHT @ 0x50003400
3,463,636 UART: [idev] ++
3,464,268 UART: [idev] CDI.KEYID = 6
3,465,181 UART: [idev] SUBJECT.KEYID = 7
3,466,452 UART: [idev] UDS.KEYID = 0
3,467,454 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,500,682 UART: [idev] Erasing UDS.KEYID = 0
5,985,257 UART: [idev] Sha1 KeyId Algorithm
6,009,036 UART: [idev] --
6,015,154 UART: [ldev] ++
6,015,735 UART: [ldev] CDI.KEYID = 6
6,016,622 UART: [ldev] SUBJECT.KEYID = 5
6,017,842 UART: [ldev] AUTHORITY.KEYID = 7
6,019,085 UART: [ldev] FE.KEYID = 1
6,055,859 UART: [ldev] Erasing FE.KEYID = 1
8,561,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,387 UART: [ldev] --
10,372,951 UART: [fwproc] Wait for Commands...
10,375,003 UART: [fwproc] Recv command 0x46505652
10,377,220 UART: [rt] FIPS Version
10,378,731 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,395 writing to cptra_bootfsm_go
3,461,033 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,284,753 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,534 writing to cptra_bootfsm_go
192,684 UART:
193,055 UART: Running Caliptra ROM ...
194,239 UART:
603,859 UART: [state] CFI Enabled
616,172 UART: [state] LifecycleState = Unprovisioned
618,264 UART: [state] DebugLocked = No
619,548 UART: [state] WD Timer not started. Device not locked for debugging
624,117 UART: [kat] SHA2-256
803,782 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,537 UART: [kat] ++
815,048 UART: [kat] sha1
825,883 UART: [kat] SHA2-256
828,578 UART: [kat] SHA2-384
834,669 UART: [kat] SHA2-512-ACC
837,009 UART: [kat] ECC-384
3,275,315 UART: [kat] HMAC-384Kdf
3,286,333 UART: [kat] LMS
3,762,855 UART: [kat] --
3,766,520 UART: [cold-reset] ++
3,768,521 UART: [fht] FHT @ 0x50003400
3,779,935 UART: [idev] ++
3,780,531 UART: [idev] CDI.KEYID = 6
3,781,451 UART: [idev] SUBJECT.KEYID = 7
3,782,671 UART: [idev] UDS.KEYID = 0
3,783,730 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,799,532 UART: [idev] Erasing UDS.KEYID = 0
6,260,971 UART: [idev] Sha1 KeyId Algorithm
6,284,205 UART: [idev] --
6,288,309 UART: [ldev] ++
6,288,940 UART: [ldev] CDI.KEYID = 6
6,289,824 UART: [ldev] SUBJECT.KEYID = 5
6,291,040 UART: [ldev] AUTHORITY.KEYID = 7
6,292,287 UART: [ldev] FE.KEYID = 1
6,303,130 UART: [ldev] Erasing FE.KEYID = 1
8,779,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,499,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,514,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,530,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,546,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,088 UART: [ldev] --
10,573,767 UART: [fwproc] Wait for Commands...
10,575,920 UART: [fwproc] Recv command 0x46505652
10,578,181 UART: [rt] FIPS Version
10,579,719 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,706 writing to cptra_bootfsm_go
3,782,623 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,496,127 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,335 UART:
192,701 UART: Running Caliptra ROM ...
193,792 UART:
193,939 UART: [state] CFI Enabled
260,625 UART: [state] LifecycleState = Unprovisioned
263,027 UART: [state] DebugLocked = No
265,182 UART: [state] WD Timer not started. Device not locked for debugging
269,926 UART: [kat] SHA2-256
459,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,582 UART: [kat] ++
471,235 UART: [kat] sha1
482,396 UART: [kat] SHA2-256
485,407 UART: [kat] SHA2-384
491,510 UART: [kat] SHA2-512-ACC
494,077 UART: [kat] ECC-384
2,946,665 UART: [kat] HMAC-384Kdf
2,968,967 UART: [kat] LMS
3,500,702 UART: [kat] --
3,505,064 UART: [cold-reset] ++
3,507,143 UART: [fht] FHT @ 0x50003400
3,519,766 UART: [idev] ++
3,520,475 UART: [idev] CDI.KEYID = 6
3,521,504 UART: [idev] SUBJECT.KEYID = 7
3,522,623 UART: [idev] UDS.KEYID = 0
3,523,629 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,540,281 UART: [idev] Erasing UDS.KEYID = 0
6,024,856 UART: [idev] Sha1 KeyId Algorithm
6,046,170 UART: [idev] --
6,049,967 UART: [ldev] ++
6,050,657 UART: [ldev] CDI.KEYID = 6
6,051,551 UART: [ldev] SUBJECT.KEYID = 5
6,052,778 UART: [ldev] AUTHORITY.KEYID = 7
6,053,931 UART: [ldev] FE.KEYID = 1
6,096,646 UART: [ldev] Erasing FE.KEYID = 1
8,603,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,965 UART: [ldev] --
10,409,987 UART: [fwproc] Wait for Commands...
10,412,581 UART: [fwproc] Recv command 0x46505652
10,415,120 UART: [rt] FIPS Version
10,416,798 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,438,798 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,247,303 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
192,536 UART:
192,911 UART: Running Caliptra ROM ...
194,022 UART:
603,835 UART: [state] CFI Enabled
619,440 UART: [state] LifecycleState = Unprovisioned
621,820 UART: [state] DebugLocked = No
623,962 UART: [state] WD Timer not started. Device not locked for debugging
628,870 UART: [kat] SHA2-256
818,738 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,547 UART: [kat] ++
830,002 UART: [kat] sha1
842,348 UART: [kat] SHA2-256
845,367 UART: [kat] SHA2-384
851,302 UART: [kat] SHA2-512-ACC
853,920 UART: [kat] ECC-384
3,294,619 UART: [kat] HMAC-384Kdf
3,307,886 UART: [kat] LMS
3,839,703 UART: [kat] --
3,843,773 UART: [cold-reset] ++
3,845,070 UART: [fht] FHT @ 0x50003400
3,855,638 UART: [idev] ++
3,856,340 UART: [idev] CDI.KEYID = 6
3,857,228 UART: [idev] SUBJECT.KEYID = 7
3,858,444 UART: [idev] UDS.KEYID = 0
3,859,439 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,872,513 UART: [idev] Erasing UDS.KEYID = 0
6,329,841 UART: [idev] Sha1 KeyId Algorithm
6,352,555 UART: [idev] --
6,358,095 UART: [ldev] ++
6,358,792 UART: [ldev] CDI.KEYID = 6
6,359,715 UART: [ldev] SUBJECT.KEYID = 5
6,360,878 UART: [ldev] AUTHORITY.KEYID = 7
6,362,115 UART: [ldev] FE.KEYID = 1
6,374,013 UART: [ldev] Erasing FE.KEYID = 1
8,850,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,633 UART: [ldev] --
10,638,395 UART: [fwproc] Wait for Commands...
10,639,962 UART: [fwproc] Recv command 0x46505652
10,642,508 UART: [rt] FIPS Version
10,644,237 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
3,755,892 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,476,891 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,479 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,157 UART: [kat] SHA2-256
882,088 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,203 UART: [kat] ++
886,355 UART: [kat] sha1
890,535 UART: [kat] SHA2-256
892,473 UART: [kat] SHA2-384
895,126 UART: [kat] SHA2-512-ACC
897,027 UART: [kat] ECC-384
902,364 UART: [kat] HMAC-384Kdf
906,850 UART: [kat] LMS
1,475,046 UART: [kat] --
1,476,203 UART: [cold-reset] ++
1,476,711 UART: [fht] Storing FHT @ 0x50003400
1,479,546 UART: [idev] ++
1,479,714 UART: [idev] CDI.KEYID = 6
1,480,074 UART: [idev] SUBJECT.KEYID = 7
1,480,498 UART: [idev] UDS.KEYID = 0
1,480,843 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,460 UART: [idev] Erasing UDS.KEYID = 0
1,505,196 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,630 UART: [idev] --
1,514,545 UART: [ldev] ++
1,514,713 UART: [ldev] CDI.KEYID = 6
1,515,076 UART: [ldev] SUBJECT.KEYID = 5
1,515,502 UART: [ldev] AUTHORITY.KEYID = 7
1,515,965 UART: [ldev] FE.KEYID = 1
1,521,135 UART: [ldev] Erasing FE.KEYID = 1
1,546,242 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,094 UART: [ldev] --
1,585,419 UART: [fwproc] Waiting for Commands...
1,586,104 UART: [fwproc] Received command 0x46505652
1,586,986 UART: [rt] FIPS Version
1,587,539 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,061 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,776 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,314 UART: [kat] SHA2-256
882,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,360 UART: [kat] ++
886,512 UART: [kat] sha1
890,686 UART: [kat] SHA2-256
892,624 UART: [kat] SHA2-384
895,281 UART: [kat] SHA2-512-ACC
897,182 UART: [kat] ECC-384
902,473 UART: [kat] HMAC-384Kdf
907,105 UART: [kat] LMS
1,475,301 UART: [kat] --
1,476,410 UART: [cold-reset] ++
1,476,976 UART: [fht] Storing FHT @ 0x50003400
1,479,801 UART: [idev] ++
1,479,969 UART: [idev] CDI.KEYID = 6
1,480,329 UART: [idev] SUBJECT.KEYID = 7
1,480,753 UART: [idev] UDS.KEYID = 0
1,481,098 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,687 UART: [idev] Erasing UDS.KEYID = 0
1,505,459 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,131 UART: [idev] --
1,515,300 UART: [ldev] ++
1,515,468 UART: [ldev] CDI.KEYID = 6
1,515,831 UART: [ldev] SUBJECT.KEYID = 5
1,516,257 UART: [ldev] AUTHORITY.KEYID = 7
1,516,720 UART: [ldev] FE.KEYID = 1
1,522,024 UART: [ldev] Erasing FE.KEYID = 1
1,548,143 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,209 UART: [ldev] --
1,587,666 UART: [fwproc] Waiting for Commands...
1,588,353 UART: [fwproc] Received command 0x46505652
1,589,235 UART: [rt] FIPS Version
1,589,788 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,438 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,261 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,280 UART: [kat] ++
895,432 UART: [kat] sha1
899,468 UART: [kat] SHA2-256
901,408 UART: [kat] SHA2-384
904,315 UART: [kat] SHA2-512-ACC
906,216 UART: [kat] ECC-384
915,985 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,169,626 UART: [cold-reset] ++
1,170,000 UART: [fht] FHT @ 0x50003400
1,172,702 UART: [idev] ++
1,172,870 UART: [idev] CDI.KEYID = 6
1,173,231 UART: [idev] SUBJECT.KEYID = 7
1,173,656 UART: [idev] UDS.KEYID = 0
1,174,002 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,465 UART: [idev] Erasing UDS.KEYID = 0
1,198,041 UART: [idev] Sha1 KeyId Algorithm
1,206,787 UART: [idev] --
1,207,820 UART: [ldev] ++
1,207,988 UART: [ldev] CDI.KEYID = 6
1,208,352 UART: [ldev] SUBJECT.KEYID = 5
1,208,779 UART: [ldev] AUTHORITY.KEYID = 7
1,209,242 UART: [ldev] FE.KEYID = 1
1,214,568 UART: [ldev] Erasing FE.KEYID = 1
1,240,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,866 UART: [ldev] --
1,280,077 UART: [fwproc] Wait for Commands...
1,280,726 UART: [fwproc] Recv command 0x46505652
1,281,550 UART: [rt] FIPS Version
1,282,110 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,252 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,137 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,579 UART: [kat] ++
895,731 UART: [kat] sha1
900,073 UART: [kat] SHA2-256
902,013 UART: [kat] SHA2-384
904,764 UART: [kat] SHA2-512-ACC
906,665 UART: [kat] ECC-384
916,128 UART: [kat] HMAC-384Kdf
920,804 UART: [kat] LMS
1,169,116 UART: [kat] --
1,169,939 UART: [cold-reset] ++
1,170,331 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
1,174,215 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,140 UART: [idev] Erasing UDS.KEYID = 0
1,198,704 UART: [idev] Sha1 KeyId Algorithm
1,207,616 UART: [idev] --
1,208,557 UART: [ldev] ++
1,208,725 UART: [ldev] CDI.KEYID = 6
1,209,089 UART: [ldev] SUBJECT.KEYID = 5
1,209,516 UART: [ldev] AUTHORITY.KEYID = 7
1,209,979 UART: [ldev] FE.KEYID = 1
1,215,257 UART: [ldev] Erasing FE.KEYID = 1
1,241,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,811 UART: [ldev] --
1,281,112 UART: [fwproc] Wait for Commands...
1,281,859 UART: [fwproc] Recv command 0x46505652
1,282,683 UART: [rt] FIPS Version
1,283,243 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,455 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,994 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,715 UART: [state] WD Timer not started. Device not locked for debugging
88,028 UART: [kat] SHA2-256
893,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,803 UART: [kat] ++
897,955 UART: [kat] sha1
902,347 UART: [kat] SHA2-256
904,287 UART: [kat] SHA2-384
906,854 UART: [kat] SHA2-512-ACC
908,755 UART: [kat] ECC-384
918,284 UART: [kat] HMAC-384Kdf
922,900 UART: [kat] LMS
1,171,228 UART: [kat] --
1,172,127 UART: [cold-reset] ++
1,172,635 UART: [fht] FHT @ 0x50003400
1,175,076 UART: [idev] ++
1,175,244 UART: [idev] CDI.KEYID = 6
1,175,604 UART: [idev] SUBJECT.KEYID = 7
1,176,028 UART: [idev] UDS.KEYID = 0
1,176,373 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,308 UART: [idev] Erasing UDS.KEYID = 0
1,201,445 UART: [idev] Sha1 KeyId Algorithm
1,209,851 UART: [idev] --
1,210,745 UART: [ldev] ++
1,210,913 UART: [ldev] CDI.KEYID = 6
1,211,276 UART: [ldev] SUBJECT.KEYID = 5
1,211,702 UART: [ldev] AUTHORITY.KEYID = 7
1,212,165 UART: [ldev] FE.KEYID = 1
1,217,683 UART: [ldev] Erasing FE.KEYID = 1
1,243,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,611 UART: [ldev] --
1,282,900 UART: [fwproc] Wait for Commands...
1,283,502 UART: [fwproc] Recv command 0x46505652
1,284,323 UART: [rt] FIPS Version
1,284,877 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,003 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,303 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
893,241 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,366 UART: [kat] ++
897,518 UART: [kat] sha1
901,684 UART: [kat] SHA2-256
903,624 UART: [kat] SHA2-384
906,319 UART: [kat] SHA2-512-ACC
908,220 UART: [kat] ECC-384
918,587 UART: [kat] HMAC-384Kdf
923,181 UART: [kat] LMS
1,171,509 UART: [kat] --
1,172,260 UART: [cold-reset] ++
1,172,586 UART: [fht] FHT @ 0x50003400
1,175,357 UART: [idev] ++
1,175,525 UART: [idev] CDI.KEYID = 6
1,175,885 UART: [idev] SUBJECT.KEYID = 7
1,176,309 UART: [idev] UDS.KEYID = 0
1,176,654 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,391 UART: [idev] Erasing UDS.KEYID = 0
1,201,390 UART: [idev] Sha1 KeyId Algorithm
1,210,012 UART: [idev] --
1,211,056 UART: [ldev] ++
1,211,224 UART: [ldev] CDI.KEYID = 6
1,211,587 UART: [ldev] SUBJECT.KEYID = 5
1,212,013 UART: [ldev] AUTHORITY.KEYID = 7
1,212,476 UART: [ldev] FE.KEYID = 1
1,217,882 UART: [ldev] Erasing FE.KEYID = 1
1,244,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,494 UART: [ldev] --
1,283,887 UART: [fwproc] Wait for Commands...
1,284,519 UART: [fwproc] Recv command 0x46505652
1,285,340 UART: [rt] FIPS Version
1,285,894 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,318 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,142,198 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
192,151 UART:
192,523 UART: Running Caliptra ROM ...
193,712 UART:
193,866 UART: [state] CFI Enabled
262,131 UART: [state] LifecycleState = Unprovisioned
264,119 UART: [state] DebugLocked = No
266,721 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,228 UART: [kat] SHA2-256
441,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,423 UART: [kat] ++
453,030 UART: [kat] sha1
463,207 UART: [kat] SHA2-256
465,853 UART: [kat] SHA2-384
472,200 UART: [kat] SHA2-512-ACC
474,579 UART: [kat] ECC-384
2,769,557 UART: [kat] HMAC-384Kdf
2,800,297 UART: [kat] LMS
3,990,629 UART: [kat] --
3,996,418 UART: [cold-reset] ++
3,997,790 UART: [fht] Storing FHT @ 0x50003400
4,009,702 UART: [idev] ++
4,010,275 UART: [idev] CDI.KEYID = 6
4,011,187 UART: [idev] SUBJECT.KEYID = 7
4,012,440 UART: [idev] UDS.KEYID = 0
4,013,519 ready_for_fw is high
4,013,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,859 UART: [idev] Erasing UDS.KEYID = 0
7,349,394 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,795 UART: [idev] --
7,375,440 UART: [ldev] ++
7,376,009 UART: [ldev] CDI.KEYID = 6
7,376,956 UART: [ldev] SUBJECT.KEYID = 5
7,378,171 UART: [ldev] AUTHORITY.KEYID = 7
7,379,541 UART: [ldev] FE.KEYID = 1
7,425,061 UART: [ldev] Erasing FE.KEYID = 1
10,757,004 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,596 UART: [ldev] --
13,117,615 UART: [fwproc] Waiting for Commands...
13,119,871 UART: [fwproc] Received command 0x46574c44
13,122,060 UART: [fwproc] Received Image of size 118548 bytes
17,224,757 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,725 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,373,926 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,701,782 >>> mbox cmd response: success
17,702,364 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,706,267 UART: [afmc] ++
17,706,852 UART: [afmc] CDI.KEYID = 6
17,707,737 UART: [afmc] SUBJECT.KEYID = 7
17,709,008 UART: [afmc] AUTHORITY.KEYID = 5
21,072,320 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,375,125 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,377,442 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,391,850 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,406,588 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,420,995 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,443,072 UART: [afmc] --
23,446,827 UART: [cold-reset] --
23,449,661 UART: [state] Locking Datavault
23,454,758 UART: [state] Locking PCR0, PCR1 and PCR31
23,456,463 UART: [state] Locking ICCM
23,459,217 UART: [exit] Launching FMC @ 0x40000130
23,467,623 UART:
23,467,877 UART: Running Caliptra FMC ...
23,468,983 UART:
23,469,145 UART: [state] CFI Enabled
23,535,203 UART: [fht] FMC Alias Private Key: 7
25,875,267 UART: [art] Extend RT PCRs Done
25,876,493 UART: [art] Lock RT PCRs Done
25,878,225 UART: [art] Populate DV Done
25,883,691 UART: [fht] FMC Alias Private Key: 7
25,885,336 UART: [art] Derive CDI
25,886,150 UART: [art] Store in slot 0x4
25,943,851 UART: [art] Derive Key Pair
25,944,885 UART: [art] Store priv key in slot 0x5
29,237,927 UART: [art] Derive Key Pair - Done
29,251,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,868 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,395 UART: [art] PUB.X = A0DF27BF5054C68B7FA0761D9ED62DB36449ECEEAB558F9D7F4C015E63D06CEB11EB8EE935596F0CFD6811A0FD10EA2F
31,548,643 UART: [art] PUB.Y = 605E9D3ADC195B8E1B2450C5A2A2BD43BFEA41E072F1280CDB9AD3122F1E94D572CC11E632C145CFA9439D5B1832756B
31,555,938 UART: [art] SIG.R = 8C507B969AFABF8FAFB2EEA4009758974ABDDBE9432C0911AF616CC89AA6296934DA8347D35FF6B6A7E180902FD73BC5
31,563,330 UART: [art] SIG.S = D756C79E6D13B1F36563B51AB0251A97E65C43E111230F4C9939362EBFDAA85E56D6159A0251A09A1ADEDC6FEB93D4AD
32,868,608 UART: Caliptra RT
32,869,325 UART: [state] CFI Enabled
33,046,352 UART: [rt] RT listening for mailbox commands...
33,077,740 UART: [rt]cmd =0x46505652, len=4
33,079,030 UART: [rt] FIPS Version
33,080,152 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,784,291 ready_for_fw is high
3,784,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,943,288 >>> mbox cmd response: success
17,944,026 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,633,284 UART:
23,633,725 UART: Running Caliptra FMC ...
23,634,859 UART:
23,635,024 UART: [state] CFI Enabled
23,702,194 UART: [fht] FMC Alias Private Key: 7
26,042,175 UART: [art] Extend RT PCRs Done
26,043,413 UART: [art] Lock RT PCRs Done
26,045,103 UART: [art] Populate DV Done
26,050,493 UART: [fht] FMC Alias Private Key: 7
26,052,193 UART: [art] Derive CDI
26,053,029 UART: [art] Store in slot 0x4
26,110,008 UART: [art] Derive Key Pair
26,111,021 UART: [art] Store priv key in slot 0x5
29,404,013 UART: [art] Derive Key Pair - Done
29,416,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,148 UART: [art] Erasing AUTHORITY.KEYID = 7
31,706,666 UART: [art] PUB.X = 8AD1F0EB603C308E6BE7FAD1F762A2B60F751CCADBA10B6C8807EBE96D421D9705AF65BBD5149E34950B93B36B10C5CD
31,713,947 UART: [art] PUB.Y = 0E76959BA6013703140922140B6F5171C2DAF9FF8AE8C7FE811752D5840264695B5A69A530986F70D9D15B3AABF6C937
31,721,165 UART: [art] SIG.R = 26DCED2930DDD329EDCF8892B25C5D8CEF2CBBC6B566B2BBB913A0D4343BFA1F0DCD384F374BCA82DA119A325245D884
31,728,602 UART: [art] SIG.S = DA425373427D06B3DAA1DE587B303050C5851E9201BE84F55890596E7EE9D6A8826A2B803659E42AECFF91F83BC89FE8
33,033,545 UART: Caliptra RT
33,034,266 UART: [state] CFI Enabled
33,209,454 UART: [rt] RT listening for mailbox commands...
33,240,821 UART: [rt]cmd =0x46505652, len=4
33,242,074 UART: [rt] FIPS Version
33,243,293 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,436 UART:
192,836 UART: Running Caliptra ROM ...
193,984 UART:
603,633 UART: [state] CFI Enabled
617,168 UART: [state] LifecycleState = Unprovisioned
619,138 UART: [state] DebugLocked = No
621,987 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,046 UART: [kat] SHA2-256
796,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,311 UART: [kat] ++
807,791 UART: [kat] sha1
818,121 UART: [kat] SHA2-256
820,849 UART: [kat] SHA2-384
826,991 UART: [kat] SHA2-512-ACC
829,370 UART: [kat] ECC-384
3,115,016 UART: [kat] HMAC-384Kdf
3,127,412 UART: [kat] LMS
4,317,503 UART: [kat] --
4,321,883 UART: [cold-reset] ++
4,323,404 UART: [fht] Storing FHT @ 0x50003400
4,334,893 UART: [idev] ++
4,335,465 UART: [idev] CDI.KEYID = 6
4,336,419 UART: [idev] SUBJECT.KEYID = 7
4,337,670 UART: [idev] UDS.KEYID = 0
4,338,653 ready_for_fw is high
4,338,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,786 UART: [idev] Erasing UDS.KEYID = 0
7,626,840 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,273 UART: [idev] --
7,651,548 UART: [ldev] ++
7,652,176 UART: [ldev] CDI.KEYID = 6
7,653,065 UART: [ldev] SUBJECT.KEYID = 5
7,654,341 UART: [ldev] AUTHORITY.KEYID = 7
7,655,578 UART: [ldev] FE.KEYID = 1
7,666,744 UART: [ldev] Erasing FE.KEYID = 1
10,958,725 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,414 UART: [ldev] --
13,319,549 UART: [fwproc] Waiting for Commands...
13,322,630 UART: [fwproc] Received command 0x46574c44
13,324,843 UART: [fwproc] Received Image of size 118548 bytes
17,438,602 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,514,078 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,587,234 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,916,382 >>> mbox cmd response: success
17,916,927 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,919,885 UART: [afmc] ++
17,920,532 UART: [afmc] CDI.KEYID = 6
17,921,425 UART: [afmc] SUBJECT.KEYID = 7
17,922,703 UART: [afmc] AUTHORITY.KEYID = 5
21,242,365 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,537,462 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,539,724 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,554,172 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,568,884 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,583,355 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,604,994 UART: [afmc] --
23,608,278 UART: [cold-reset] --
23,613,226 UART: [state] Locking Datavault
23,619,668 UART: [state] Locking PCR0, PCR1 and PCR31
23,621,430 UART: [state] Locking ICCM
23,623,155 UART: [exit] Launching FMC @ 0x40000130
23,631,550 UART:
23,631,793 UART: Running Caliptra FMC ...
23,632,902 UART:
23,633,063 UART: [state] CFI Enabled
23,641,118 UART: [fht] FMC Alias Private Key: 7
25,981,052 UART: [art] Extend RT PCRs Done
25,982,438 UART: [art] Lock RT PCRs Done
25,983,908 UART: [art] Populate DV Done
25,989,502 UART: [fht] FMC Alias Private Key: 7
25,991,056 UART: [art] Derive CDI
25,991,901 UART: [art] Store in slot 0x4
26,034,451 UART: [art] Derive Key Pair
26,035,465 UART: [art] Store priv key in slot 0x5
29,277,518 UART: [art] Derive Key Pair - Done
29,290,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,570,474 UART: [art] Erasing AUTHORITY.KEYID = 7
31,571,998 UART: [art] PUB.X = 55F7A2BFB366C260925DA284DB3AED888D34993FB856BF220441E777643DD200443D4E34E11CEAABCC54657A0953E837
31,579,257 UART: [art] PUB.Y = D7EB85999A464991E76BD99217A34EC5ECD1E7278BA02B08ABD7B8180AF0DF76DEBE74BB540392AFBFFB94FCFB978F06
31,586,499 UART: [art] SIG.R = F356E933483A45D3B8C105D65D2A2C97EEE93525C99811DC44EC9E16E1F67EDF0A304DF6FC9CE80980F95819CCC664DB
31,593,912 UART: [art] SIG.S = 28BC62433488C5C0D34A352E07C162767B0D4B22206DC38E88BC7BF23A0FE8A0EE0C6645128FE469CE442E38ADE2FFD5
32,899,324 UART: Caliptra RT
32,900,053 UART: [state] CFI Enabled
33,032,997 UART: [rt] RT listening for mailbox commands...
33,064,589 UART: [rt]cmd =0x46505652, len=4
33,065,845 UART: [rt] FIPS Version
33,067,174 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
4,132,296 ready_for_fw is high
4,132,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,969 >>> mbox cmd response: success
18,156,693 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,796,188 UART:
23,796,639 UART: Running Caliptra FMC ...
23,797,786 UART:
23,797,955 UART: [state] CFI Enabled
23,805,670 UART: [fht] FMC Alias Private Key: 7
26,145,813 UART: [art] Extend RT PCRs Done
26,147,204 UART: [art] Lock RT PCRs Done
26,148,812 UART: [art] Populate DV Done
26,154,030 UART: [fht] FMC Alias Private Key: 7
26,155,586 UART: [art] Derive CDI
26,156,413 UART: [art] Store in slot 0x4
26,199,179 UART: [art] Derive Key Pair
26,200,211 UART: [art] Store priv key in slot 0x5
29,442,003 UART: [art] Derive Key Pair - Done
29,454,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,437 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,950 UART: [art] PUB.X = 52534BD2B78F7C79DB2E025B6C4511BB71545DC2D426A7FCB124A86C57D5B6F88409E381487286EE795506D9C0918068
31,744,198 UART: [art] PUB.Y = A53AA0580BFE8FD983AB5910559067262E310894006476ACD4C3D4F52134E3752A67151EE0BFDEB740708F9A6A23C784
31,751,437 UART: [art] SIG.R = 4522FAFEEFD00B11E0B56AF6A2139F37C18ADBEE23354E5E76467D5B905084B8C5B43E0BBEA9F0C501938078803A5ACA
31,758,845 UART: [art] SIG.S = 685E119ED891B9A18E8C43E110DCAC27C9899710C0940C6E1CF24E8F892701E5D024EB206BA09E2F2E0D60905CC06690
33,063,974 UART: Caliptra RT
33,064,697 UART: [state] CFI Enabled
33,197,284 UART: [rt] RT listening for mailbox commands...
33,228,820 UART: [rt]cmd =0x46505652, len=4
33,230,133 UART: [rt] FIPS Version
33,231,196 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,219 UART:
192,585 UART: Running Caliptra ROM ...
193,827 UART:
193,988 UART: [state] CFI Enabled
264,996 UART: [state] LifecycleState = Unprovisioned
266,920 UART: [state] DebugLocked = No
268,540 UART: [state] WD Timer not started. Device not locked for debugging
271,533 UART: [kat] SHA2-256
451,225 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,957 UART: [kat] ++
462,569 UART: [kat] sha1
472,700 UART: [kat] SHA2-256
475,402 UART: [kat] SHA2-384
481,836 UART: [kat] SHA2-512-ACC
484,153 UART: [kat] ECC-384
2,948,533 UART: [kat] HMAC-384Kdf
2,971,347 UART: [kat] LMS
3,447,847 UART: [kat] --
3,451,795 UART: [cold-reset] ++
3,453,806 UART: [fht] FHT @ 0x50003400
3,465,440 UART: [idev] ++
3,466,022 UART: [idev] CDI.KEYID = 6
3,466,940 UART: [idev] SUBJECT.KEYID = 7
3,468,192 UART: [idev] UDS.KEYID = 0
3,469,250 ready_for_fw is high
3,469,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,920 UART: [idev] Erasing UDS.KEYID = 0
5,990,049 UART: [idev] Sha1 KeyId Algorithm
6,013,125 UART: [idev] --
6,018,797 UART: [ldev] ++
6,019,381 UART: [ldev] CDI.KEYID = 6
6,020,315 UART: [ldev] SUBJECT.KEYID = 5
6,021,481 UART: [ldev] AUTHORITY.KEYID = 7
6,022,779 UART: [ldev] FE.KEYID = 1
6,058,511 UART: [ldev] Erasing FE.KEYID = 1
8,566,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,905 UART: [ldev] --
10,375,038 UART: [fwproc] Wait for Commands...
10,377,737 UART: [fwproc] Recv command 0x46574c44
10,379,789 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,914 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,916 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,336,776 >>> mbox cmd response: success
14,337,347 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,340,973 UART: [afmc] ++
14,341,579 UART: [afmc] CDI.KEYID = 6
14,342,477 UART: [afmc] SUBJECT.KEYID = 7
14,343,698 UART: [afmc] AUTHORITY.KEYID = 5
16,872,847 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,415 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,614,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,630,300 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,645,871 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,670,338 UART: [afmc] --
18,673,240 UART: [cold-reset] --
18,677,372 UART: [state] Locking Datavault
18,682,680 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,441 UART: [state] Locking ICCM
18,686,405 UART: [exit] Launching FMC @ 0x40000130
18,694,803 UART:
18,695,063 UART: Running Caliptra FMC ...
18,696,096 UART:
18,696,249 UART: [state] CFI Enabled
18,754,588 UART: [fht] FMC Alias Private Key: 7
20,541,771 UART: [art] Extend RT PCRs Done
20,542,995 UART: [art] Lock RT PCRs Done
20,544,652 UART: [art] Populate DV Done
20,550,118 UART: [fht] FMC Alias Private Key: 7
20,551,651 UART: [art] Derive CDI
20,552,401 UART: [art] Store in slot 0x4
20,608,445 UART: [art] Derive Key Pair
20,609,448 UART: [art] Store priv key in slot 0x5
23,072,424 UART: [art] Derive Key Pair - Done
23,084,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,804 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,321 UART: [art] PUB.X = 2B5E4402FF0B1F913390DF049450FB25CD85FB9B52B1B4B41D4F3929123B7973F629493A7C36D72022EA22BFC3645B7E
24,806,546 UART: [art] PUB.Y = 780A4DB1910226456D90237C5C9F9C0FB8679766EED221A3F2980205B83DE73B47C913716B5CA30BE547750BB790812A
24,813,787 UART: [art] SIG.R = 3BAFD1C6B26864522327AB49686C7791A263D5B49801F2F70449CC779E9891F8063A11441B3D507CA8E0149368EDB541
24,821,128 UART: [art] SIG.S = B0D7C0A072FD042ED8D1C40F0FE78EA108812DA74C8D2A59120FFD69B4CEA0E37D2D68DB7CCB4F17545FC312185C497D
25,799,646 UART: Caliptra RT
25,800,339 UART: [state] CFI Enabled
25,980,116 UART: [rt] RT listening for mailbox commands...
26,011,634 UART: [rt]cmd =0x46505652, len=4
26,012,917 UART: [rt] FIPS Version
26,014,084 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,463,488 ready_for_fw is high
3,464,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,228,531 >>> mbox cmd response: success
14,229,233 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,519,555 UART:
18,520,001 UART: Running Caliptra FMC ...
18,521,212 UART:
18,521,374 UART: [state] CFI Enabled
18,586,750 UART: [fht] FMC Alias Private Key: 7
20,353,755 UART: [art] Extend RT PCRs Done
20,354,970 UART: [art] Lock RT PCRs Done
20,356,597 UART: [art] Populate DV Done
20,362,180 UART: [fht] FMC Alias Private Key: 7
20,363,835 UART: [art] Derive CDI
20,364,661 UART: [art] Store in slot 0x4
20,419,420 UART: [art] Derive Key Pair
20,420,469 UART: [art] Store priv key in slot 0x5
22,883,514 UART: [art] Derive Key Pair - Done
22,896,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,609,595 UART: [art] Erasing AUTHORITY.KEYID = 7
24,611,102 UART: [art] PUB.X = BD95F8E3BCDEE2668BBAC959B038AC13B0706F00150A82ABBCEA3B93A2DD0B82685420A1AD17652885C86FB177D74BDD
24,618,378 UART: [art] PUB.Y = 83AE4313E95080455EB9573D5C42C3CDDE7A42D822FB0BC3CB8D7AE8ACC4C3FE3720070C197AC3D495411AD12FD43545
24,625,630 UART: [art] SIG.R = 7A13D1829C53AE3F02018AD548052EAF0A84434D5EC757830C29B2E4782A28598784B3F754F4C82CFA657A305B3EEE3E
24,633,103 UART: [art] SIG.S = 2284325F9AC47295C6D8E1F38096BA7ABAAA5D74B9660F90FAB153009ECDFF5ACA4C7E11BE3C2468F1ACF94AFEAADA93
25,611,268 UART: Caliptra RT
25,611,978 UART: [state] CFI Enabled
25,793,920 UART: [rt] RT listening for mailbox commands...
25,825,081 UART: [rt]cmd =0x46505652, len=4
25,826,342 UART: [rt] FIPS Version
25,827,511 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,395 UART:
192,782 UART: Running Caliptra ROM ...
194,017 UART:
603,682 UART: [state] CFI Enabled
617,216 UART: [state] LifecycleState = Unprovisioned
619,177 UART: [state] DebugLocked = No
620,490 UART: [state] WD Timer not started. Device not locked for debugging
624,397 UART: [kat] SHA2-256
804,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,863 UART: [kat] ++
815,315 UART: [kat] sha1
826,119 UART: [kat] SHA2-256
828,846 UART: [kat] SHA2-384
833,920 UART: [kat] SHA2-512-ACC
836,314 UART: [kat] ECC-384
3,277,641 UART: [kat] HMAC-384Kdf
3,289,193 UART: [kat] LMS
3,765,739 UART: [kat] --
3,770,522 UART: [cold-reset] ++
3,772,892 UART: [fht] FHT @ 0x50003400
3,785,525 UART: [idev] ++
3,786,100 UART: [idev] CDI.KEYID = 6
3,787,140 UART: [idev] SUBJECT.KEYID = 7
3,788,325 UART: [idev] UDS.KEYID = 0
3,789,270 ready_for_fw is high
3,789,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,362 UART: [idev] Erasing UDS.KEYID = 0
6,265,114 UART: [idev] Sha1 KeyId Algorithm
6,288,525 UART: [idev] --
6,293,146 UART: [ldev] ++
6,293,752 UART: [ldev] CDI.KEYID = 6
6,294,669 UART: [ldev] SUBJECT.KEYID = 5
6,295,833 UART: [ldev] AUTHORITY.KEYID = 7
6,297,073 UART: [ldev] FE.KEYID = 1
6,307,352 UART: [ldev] Erasing FE.KEYID = 1
8,786,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,519 UART: [ldev] --
10,580,466 UART: [fwproc] Wait for Commands...
10,581,971 UART: [fwproc] Recv command 0x46574c44
10,583,965 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,038 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,083 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,062 >>> mbox cmd response: success
14,552,606 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,556,808 UART: [afmc] ++
14,557,388 UART: [afmc] CDI.KEYID = 6
14,558,414 UART: [afmc] SUBJECT.KEYID = 7
14,559,576 UART: [afmc] AUTHORITY.KEYID = 5
17,068,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,539 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,775 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,563 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,673 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,240 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,176 UART: [afmc] --
18,867,323 UART: [cold-reset] --
18,871,246 UART: [state] Locking Datavault
18,876,838 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,595 UART: [state] Locking ICCM
18,880,266 UART: [exit] Launching FMC @ 0x40000130
18,888,660 UART:
18,888,900 UART: Running Caliptra FMC ...
18,890,008 UART:
18,890,179 UART: [state] CFI Enabled
18,898,075 UART: [fht] FMC Alias Private Key: 7
20,664,306 UART: [art] Extend RT PCRs Done
20,665,531 UART: [art] Lock RT PCRs Done
20,667,379 UART: [art] Populate DV Done
20,672,578 UART: [fht] FMC Alias Private Key: 7
20,674,334 UART: [art] Derive CDI
20,675,154 UART: [art] Store in slot 0x4
20,717,870 UART: [art] Derive Key Pair
20,718,915 UART: [art] Store priv key in slot 0x5
23,145,966 UART: [art] Derive Key Pair - Done
23,159,079 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,326 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,838 UART: [art] PUB.X = AE715F9F1798D0108839A9FEDC3BC8330A16AD7E333D141304724B5BBAE9A0EAE090BA50467D681D60F207EDD70523A4
24,874,160 UART: [art] PUB.Y = ECB4C80A2A98D26F7118AEA489D735EECDB6567DCB2A755E806C59644A7719FDC1052CE84511F9DCC864B7880C07EC2F
24,881,407 UART: [art] SIG.R = B3F999687A3391954FB566ADBA9DB8528C81DFDC214D104577B07DF80432555EAA21CF7291A012A042F3CA5D969AED2B
24,888,811 UART: [art] SIG.S = F07F52432507FCE6B77A694FBBEEBB197945F007B321C075DD49C5A22CC4DC4D0E83CC98140C6DA2C563E9825F7EB130
25,867,650 UART: Caliptra RT
25,868,361 UART: [state] CFI Enabled
26,001,311 UART: [rt] RT listening for mailbox commands...
26,032,627 UART: [rt]cmd =0x46505652, len=4
26,033,883 UART: [rt] FIPS Version
26,035,102 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,781,343 ready_for_fw is high
3,781,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,439,964 >>> mbox cmd response: success
14,440,617 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,693,167 UART:
18,693,600 UART: Running Caliptra FMC ...
18,694,761 UART:
18,694,918 UART: [state] CFI Enabled
18,702,780 UART: [fht] FMC Alias Private Key: 7
20,469,165 UART: [art] Extend RT PCRs Done
20,470,398 UART: [art] Lock RT PCRs Done
20,472,429 UART: [art] Populate DV Done
20,477,794 UART: [fht] FMC Alias Private Key: 7
20,479,388 UART: [art] Derive CDI
20,480,127 UART: [art] Store in slot 0x4
20,523,105 UART: [art] Derive Key Pair
20,524,151 UART: [art] Store priv key in slot 0x5
22,950,764 UART: [art] Derive Key Pair - Done
22,963,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,529 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,041 UART: [art] PUB.X = A385CF1EC1A2A31E832ED9669FF973459BBC2008E06986E0B0564919F375C3E3EBCB3772F01F320A78917249EC16A99F
24,678,318 UART: [art] PUB.Y = 6D492214C38E876EC17D5C715B5C6DDD38169C65946AA026C9BC98EC7E48E1468B384784A97928A39A7287931E781FD9
24,685,524 UART: [art] SIG.R = C6A0674B6F09BF7093B4AA22B61027D40589A0852F09E3A513495D3D5EDBBCF28D1DD185574229FCDF8A17F6B68AD587
24,692,934 UART: [art] SIG.S = F63344AECDA313C87EF1126A2F25F16AA13D6FD83C3E8D9FC427089627DB24934F8CAC39F862D382888F1124FD810D9B
25,671,627 UART: Caliptra RT
25,672,343 UART: [state] CFI Enabled
25,805,305 UART: [rt] RT listening for mailbox commands...
25,836,752 UART: [rt]cmd =0x46505652, len=4
25,838,010 UART: [rt] FIPS Version
25,839,233 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,406 UART:
192,773 UART: Running Caliptra ROM ...
193,967 UART:
194,120 UART: [state] CFI Enabled
261,387 UART: [state] LifecycleState = Unprovisioned
263,743 UART: [state] DebugLocked = No
266,632 UART: [state] WD Timer not started. Device not locked for debugging
271,668 UART: [kat] SHA2-256
461,523 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,314 UART: [kat] ++
472,807 UART: [kat] sha1
484,329 UART: [kat] SHA2-256
487,349 UART: [kat] SHA2-384
493,090 UART: [kat] SHA2-512-ACC
495,688 UART: [kat] ECC-384
2,949,378 UART: [kat] HMAC-384Kdf
2,971,882 UART: [kat] LMS
3,503,621 UART: [kat] --
3,510,065 UART: [cold-reset] ++
3,511,162 UART: [fht] FHT @ 0x50003400
3,523,716 UART: [idev] ++
3,524,437 UART: [idev] CDI.KEYID = 6
3,525,366 UART: [idev] SUBJECT.KEYID = 7
3,526,549 UART: [idev] UDS.KEYID = 0
3,527,482 ready_for_fw is high
3,527,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,904 UART: [idev] Erasing UDS.KEYID = 0
6,048,168 UART: [idev] Sha1 KeyId Algorithm
6,070,760 UART: [idev] --
6,076,138 UART: [ldev] ++
6,076,833 UART: [ldev] CDI.KEYID = 6
6,077,749 UART: [ldev] SUBJECT.KEYID = 5
6,078,916 UART: [ldev] AUTHORITY.KEYID = 7
6,080,156 UART: [ldev] FE.KEYID = 1
6,121,218 UART: [ldev] Erasing FE.KEYID = 1
8,629,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,427,856 UART: [ldev] --
10,433,190 UART: [fwproc] Wait for Commands...
10,435,560 UART: [fwproc] Recv command 0x46574c44
10,437,876 UART: [fwproc] Recv'd Img size: 118548 bytes
13,933,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,011,565 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,135,158 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,695,956 >>> mbox cmd response: success
14,696,491 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,699,888 UART: [afmc] ++
14,700,589 UART: [afmc] CDI.KEYID = 6
14,701,837 UART: [afmc] SUBJECT.KEYID = 7
14,703,277 UART: [afmc] AUTHORITY.KEYID = 5
17,237,565 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,978,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,980,827 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,995,901 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,011,069 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,025,963 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,049,380 UART: [afmc] --
19,052,284 UART: [cold-reset] --
19,058,067 UART: [state] Locking Datavault
19,064,711 UART: [state] Locking PCR0, PCR1 and PCR31
19,066,907 UART: [state] Locking ICCM
19,068,649 UART: [exit] Launching FMC @ 0x40000130
19,077,331 UART:
19,077,574 UART: Running Caliptra FMC ...
19,078,681 UART:
19,078,845 UART: [state] CFI Enabled
19,137,235 UART: [fht] FMC Alias Private Key: 7
20,903,404 UART: [art] Extend RT PCRs Done
20,904,626 UART: [art] Lock RT PCRs Done
20,906,259 UART: [art] Populate DV Done
20,911,674 UART: [fht] FMC Alias Private Key: 7
20,913,223 UART: [art] Derive CDI
20,914,040 UART: [art] Store in slot 0x4
20,969,761 UART: [art] Derive Key Pair
20,970,785 UART: [art] Store priv key in slot 0x5
23,434,106 UART: [art] Derive Key Pair - Done
23,447,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,522 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,030 UART: [art] PUB.X = EA34483C7E1D99C6B5E0416872104CF94843F2A19B17CBC5E58ACBF7830DA9DB63F42DE28A495A55AA0080CE58F711EC
25,168,321 UART: [art] PUB.Y = 64F21A4A5C96628EE2CF0364CDF797F78C08C1976E3199DB53245AAA5934516A513B3DE6E4FEDF3EDB994B867DB0A82F
25,175,581 UART: [art] SIG.R = B6CDAD49319A317B0A2659047CC1E30B462F18D4818D623422CB978504A8FE7B11F61276617397FD019057235E9D9BE1
25,182,952 UART: [art] SIG.S = 3CF9B750B945B5F4761D6F4BCAAE22DD7043DEE12C9D2E883CAE826D7A3567ECB9563F586DC4EE1345F466843B517D88
26,161,417 UART: Caliptra RT
26,162,111 UART: [state] CFI Enabled
26,341,209 UART: [rt] RT listening for mailbox commands...
26,372,593 UART: [rt]cmd =0x46505652, len=4
26,373,850 UART: [rt] FIPS Version
26,375,009 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,418,287 ready_for_fw is high
3,418,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,796,826 >>> mbox cmd response: success
14,797,458 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,087,414 UART:
19,087,800 UART: Running Caliptra FMC ...
19,088,991 UART:
19,089,156 UART: [state] CFI Enabled
19,158,357 UART: [fht] FMC Alias Private Key: 7
20,925,145 UART: [art] Extend RT PCRs Done
20,926,369 UART: [art] Lock RT PCRs Done
20,928,106 UART: [art] Populate DV Done
20,933,426 UART: [fht] FMC Alias Private Key: 7
20,935,011 UART: [art] Derive CDI
20,935,786 UART: [art] Store in slot 0x4
20,991,863 UART: [art] Derive Key Pair
20,992,874 UART: [art] Store priv key in slot 0x5
23,455,737 UART: [art] Derive Key Pair - Done
23,468,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,181,773 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,283 UART: [art] PUB.X = E3248E34AAF78C7194A93B451006BDCEE8EE662DF689839D37547F9A7E85634C0B40A039A57DB6808D94C1A3454AA723
25,190,518 UART: [art] PUB.Y = 2C2BEC748D5D25FBA820594BB2B766A46550E579B6016A528FE177DADC13F5A0C9688E739361DCAC41AE5B99A68A87FD
25,197,815 UART: [art] SIG.R = 93374AC469EFDA7DA96CC4A96B9C5D6E77D06E3403E6C1FA30A1C802EDBF6FF6E2B3E86F182F44153BAEA4B939EA8E0C
25,205,216 UART: [art] SIG.S = 6EBB27E21ADA1123C881D9A31CF4F97F8B9AD2A6086D92ECEB1CFBD5ADD7C383840C4537BE9E151211AA3B5EA721E7D5
26,183,681 UART: Caliptra RT
26,184,378 UART: [state] CFI Enabled
26,364,506 UART: [rt] RT listening for mailbox commands...
26,395,826 UART: [rt]cmd =0x46505652, len=4
26,397,116 UART: [rt] FIPS Version
26,398,287 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,530 UART:
192,896 UART: Running Caliptra ROM ...
194,094 UART:
603,744 UART: [state] CFI Enabled
616,856 UART: [state] LifecycleState = Unprovisioned
619,233 UART: [state] DebugLocked = No
620,840 UART: [state] WD Timer not started. Device not locked for debugging
624,969 UART: [kat] SHA2-256
814,889 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,682 UART: [kat] ++
826,293 UART: [kat] sha1
837,485 UART: [kat] SHA2-256
840,499 UART: [kat] SHA2-384
847,414 UART: [kat] SHA2-512-ACC
849,940 UART: [kat] ECC-384
3,293,359 UART: [kat] HMAC-384Kdf
3,306,432 UART: [kat] LMS
3,838,288 UART: [kat] --
3,842,855 UART: [cold-reset] ++
3,844,083 UART: [fht] FHT @ 0x50003400
3,856,090 UART: [idev] ++
3,856,735 UART: [idev] CDI.KEYID = 6
3,857,777 UART: [idev] SUBJECT.KEYID = 7
3,858,891 UART: [idev] UDS.KEYID = 0
3,859,822 ready_for_fw is high
3,860,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,051 UART: [idev] Erasing UDS.KEYID = 0
6,333,778 UART: [idev] Sha1 KeyId Algorithm
6,355,755 UART: [idev] --
6,361,213 UART: [ldev] ++
6,361,905 UART: [ldev] CDI.KEYID = 6
6,362,820 UART: [ldev] SUBJECT.KEYID = 5
6,363,990 UART: [ldev] AUTHORITY.KEYID = 7
6,365,227 UART: [ldev] FE.KEYID = 1
6,375,768 UART: [ldev] Erasing FE.KEYID = 1
8,855,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,658 UART: [ldev] --
10,646,331 UART: [fwproc] Wait for Commands...
10,648,006 UART: [fwproc] Recv command 0x46574c44
10,650,356 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,996 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,578 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,754 >>> mbox cmd response: success
14,910,320 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,914,647 UART: [afmc] ++
14,915,344 UART: [afmc] CDI.KEYID = 6
14,916,509 UART: [afmc] SUBJECT.KEYID = 7
14,918,053 UART: [afmc] AUTHORITY.KEYID = 5
17,426,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,592 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,720 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,836 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,785 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,323 UART: [afmc] --
19,221,615 UART: [cold-reset] --
19,224,518 UART: [state] Locking Datavault
19,230,808 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,011 UART: [state] Locking ICCM
19,234,313 UART: [exit] Launching FMC @ 0x40000130
19,242,999 UART:
19,243,240 UART: Running Caliptra FMC ...
19,244,345 UART:
19,244,507 UART: [state] CFI Enabled
19,252,556 UART: [fht] FMC Alias Private Key: 7
21,018,369 UART: [art] Extend RT PCRs Done
21,019,582 UART: [art] Lock RT PCRs Done
21,021,525 UART: [art] Populate DV Done
21,027,144 UART: [fht] FMC Alias Private Key: 7
21,028,752 UART: [art] Derive CDI
21,029,597 UART: [art] Store in slot 0x4
21,072,576 UART: [art] Derive Key Pair
21,073,578 UART: [art] Store priv key in slot 0x5
23,500,576 UART: [art] Derive Key Pair - Done
23,513,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,285 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,780 UART: [art] PUB.X = 5B8C01FAB689E17500F5FF805AEA015DDAD95E7AE83D26C5F0E6CCD25C035CCD81A12D189FC435150D78DDB21593B5DE
25,229,018 UART: [art] PUB.Y = 72A119354BFD0C7A1FDD9E35E75F6220CB975B26476ED82F2777761B3841D0B163BD16D51C8619F4493D0051CE94465E
25,236,258 UART: [art] SIG.R = 311A36F2DADEF4C0ADD19BD934EC471CD8E1A2EB73F329F0777DD8C6607CD3B8E6A6899BE6FCCF065B4DA35B355EAB2F
25,243,703 UART: [art] SIG.S = E590B8D24A61C80FEA9BBB76911DD4F244300C240515EF21A78D8576509EC07CAC20F36BC9E73C294DE9A707D7A091A4
26,222,475 UART: Caliptra RT
26,223,202 UART: [state] CFI Enabled
26,356,630 UART: [rt] RT listening for mailbox commands...
26,387,975 UART: [rt]cmd =0x46505652, len=4
26,389,254 UART: [rt] FIPS Version
26,390,638 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,754,392 ready_for_fw is high
3,754,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,051 >>> mbox cmd response: success
15,044,961 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,296,241 UART:
19,296,628 UART: Running Caliptra FMC ...
19,297,763 UART:
19,297,922 UART: [state] CFI Enabled
19,306,232 UART: [fht] FMC Alias Private Key: 7
21,071,513 UART: [art] Extend RT PCRs Done
21,072,745 UART: [art] Lock RT PCRs Done
21,074,349 UART: [art] Populate DV Done
21,079,834 UART: [fht] FMC Alias Private Key: 7
21,081,492 UART: [art] Derive CDI
21,082,319 UART: [art] Store in slot 0x4
21,124,814 UART: [art] Derive Key Pair
21,125,822 UART: [art] Store priv key in slot 0x5
23,552,864 UART: [art] Derive Key Pair - Done
23,566,058 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,538 UART: [art] Erasing AUTHORITY.KEYID = 7
25,274,056 UART: [art] PUB.X = 3A7EB8ADDB2FE5C1828D5DEE6219FD9E31DDC794A467FDA8C0EC44E40477C7A6A56FCDF9806BC16FC3E9E3EB16B874C8
25,281,368 UART: [art] PUB.Y = 4AAFA4D09FA17E1ECDAC6C3862CF366549AED79EF99A54F7817F0EDA5622B08DBDC91DFA1A275A470B11D6A1C3571378
25,288,624 UART: [art] SIG.R = D711A634D1AF7335187F682BC56F33657DDFA8E8AFEFD32734FA06E90AFC347E21800297E15646386DFB3BFC0BD9852A
25,296,064 UART: [art] SIG.S = 8F32D6B987ABAF80838D3F8D7718EE2009410F6FAB93154AE172E7DECED424C3F9A9DFCE8D8213402499505312E82BF6
26,274,980 UART: Caliptra RT
26,275,680 UART: [state] CFI Enabled
26,408,573 UART: [rt] RT listening for mailbox commands...
26,439,919 UART: [rt]cmd =0x46505652, len=4
26,441,189 UART: [rt] FIPS Version
26,442,519 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
85,997 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,711 UART: [kat] SHA2-256
881,642 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,757 UART: [kat] ++
885,909 UART: [kat] sha1
890,017 UART: [kat] SHA2-256
891,955 UART: [kat] SHA2-384
894,810 UART: [kat] SHA2-512-ACC
896,711 UART: [kat] ECC-384
902,104 UART: [kat] HMAC-384Kdf
906,502 UART: [kat] LMS
1,474,698 UART: [kat] --
1,475,727 UART: [cold-reset] ++
1,476,109 UART: [fht] Storing FHT @ 0x50003400
1,478,996 UART: [idev] ++
1,479,164 UART: [idev] CDI.KEYID = 6
1,479,524 UART: [idev] SUBJECT.KEYID = 7
1,479,948 UART: [idev] UDS.KEYID = 0
1,480,293 ready_for_fw is high
1,480,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,178 UART: [idev] Erasing UDS.KEYID = 0
1,504,820 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,300 UART: [idev] --
1,514,435 UART: [ldev] ++
1,514,603 UART: [ldev] CDI.KEYID = 6
1,514,966 UART: [ldev] SUBJECT.KEYID = 5
1,515,392 UART: [ldev] AUTHORITY.KEYID = 7
1,515,855 UART: [ldev] FE.KEYID = 1
1,521,041 UART: [ldev] Erasing FE.KEYID = 1
1,546,090 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,210 UART: [ldev] --
1,585,529 UART: [fwproc] Waiting for Commands...
1,586,380 UART: [fwproc] Received command 0x46574c44
1,587,171 UART: [fwproc] Received Image of size 118548 bytes
2,931,077 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,327 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,545 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,934 >>> mbox cmd response: success
3,129,934 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,131,020 UART: [afmc] ++
3,131,188 UART: [afmc] CDI.KEYID = 6
3,131,550 UART: [afmc] SUBJECT.KEYID = 7
3,131,975 UART: [afmc] AUTHORITY.KEYID = 5
3,166,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,058 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,838 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,547 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,430 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,113 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,031 UART: [afmc] --
3,209,929 UART: [cold-reset] --
3,210,723 UART: [state] Locking Datavault
3,211,588 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,192 UART: [state] Locking ICCM
3,212,866 UART: [exit] Launching FMC @ 0x40000130
3,218,196 UART:
3,218,212 UART: Running Caliptra FMC ...
3,218,620 UART:
3,218,674 UART: [state] CFI Enabled
3,229,034 UART: [fht] FMC Alias Private Key: 7
3,348,020 UART: [art] Extend RT PCRs Done
3,348,448 UART: [art] Lock RT PCRs Done
3,350,098 UART: [art] Populate DV Done
3,358,311 UART: [fht] FMC Alias Private Key: 7
3,359,327 UART: [art] Derive CDI
3,359,607 UART: [art] Store in slot 0x4
3,445,353 UART: [art] Derive Key Pair
3,445,713 UART: [art] Store priv key in slot 0x5
3,458,424 UART: [art] Derive Key Pair - Done
3,473,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,340 UART: [art] PUB.X = 18CB572AEB36E8176BFEE0111328AE4F46E964F6A19493030F139B714993770776C8CC56AED81259F3385B7E213FF299
3,496,097 UART: [art] PUB.Y = 0EB231B7B39FF377A67ED052F92866E1CA4F907F5E273C20C6C8BFED21ECBD750CA6E1D287735C87831951FE45949368
3,503,047 UART: [art] SIG.R = 3A6FF9CE9FFFCD8ED4CE190E96BD41DCE9D77378F6EB5CCB9F2A86A0035737714F8F17C98FA02F292ED0895F2B072F55
3,509,828 UART: [art] SIG.S = 49C8FDF833C4FF58D7847712EE6EECE8CB55B55CF68BFAA6922C5728EF30363757D8ECCEB15637E2AB2750A40FDE1376
3,533,913 UART: Caliptra RT
3,534,164 UART: [state] CFI Enabled
3,654,113 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,399 UART: [rt]cmd =0x46505652, len=4
3,685,059 UART: [rt] FIPS Version
3,686,156 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,129 ready_for_fw is high
1,363,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,420 >>> mbox cmd response: success
2,981,420 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,042,213 UART:
3,042,229 UART: Running Caliptra FMC ...
3,042,637 UART:
3,042,691 UART: [state] CFI Enabled
3,052,891 UART: [fht] FMC Alias Private Key: 7
3,171,989 UART: [art] Extend RT PCRs Done
3,172,417 UART: [art] Lock RT PCRs Done
3,174,207 UART: [art] Populate DV Done
3,182,274 UART: [fht] FMC Alias Private Key: 7
3,183,376 UART: [art] Derive CDI
3,183,656 UART: [art] Store in slot 0x4
3,269,770 UART: [art] Derive Key Pair
3,270,130 UART: [art] Store priv key in slot 0x5
3,283,691 UART: [art] Derive Key Pair - Done
3,298,210 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,627 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,392 UART: [art] PUB.X = 9D67209922EAB798FF6D05C8CE202A242C13B6A4D074F52B28A18AD6ECECE0D50E0FAEA23B22900A338A728E7A0AE7C3
3,321,163 UART: [art] PUB.Y = 78FE99DD2CC3C5255F3D07ECD48A5AA583EB0D4B6B6ADFD0FCD812C1C7ADCC6B59938753008284399AA14266A695D162
3,328,099 UART: [art] SIG.R = B01EF9951842938539ABDA50454442C290F670961DFB678F2478E144C03813C1A7299DC16E23F7A8242DFEB296AA4198
3,334,863 UART: [art] SIG.S = EB72E89D58DB5B1CCE967205B2BC9B767C7BCFEE6148112926B1970CAD9E9292988B8FF47574841D5D3568B72749E983
3,358,961 UART: Caliptra RT
3,359,212 UART: [state] CFI Enabled
3,478,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,501 UART: [rt]cmd =0x46505652, len=4
3,510,161 UART: [rt] FIPS Version
3,511,088 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,472 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,044 UART: [kat] SHA2-256
881,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,090 UART: [kat] ++
886,242 UART: [kat] sha1
890,308 UART: [kat] SHA2-256
892,246 UART: [kat] SHA2-384
895,007 UART: [kat] SHA2-512-ACC
896,908 UART: [kat] ECC-384
902,845 UART: [kat] HMAC-384Kdf
907,517 UART: [kat] LMS
1,475,713 UART: [kat] --
1,476,466 UART: [cold-reset] ++
1,476,944 UART: [fht] Storing FHT @ 0x50003400
1,479,617 UART: [idev] ++
1,479,785 UART: [idev] CDI.KEYID = 6
1,480,145 UART: [idev] SUBJECT.KEYID = 7
1,480,569 UART: [idev] UDS.KEYID = 0
1,480,914 ready_for_fw is high
1,480,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,689 UART: [idev] Erasing UDS.KEYID = 0
1,505,539 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,369 UART: [idev] --
1,515,492 UART: [ldev] ++
1,515,660 UART: [ldev] CDI.KEYID = 6
1,516,023 UART: [ldev] SUBJECT.KEYID = 5
1,516,449 UART: [ldev] AUTHORITY.KEYID = 7
1,516,912 UART: [ldev] FE.KEYID = 1
1,522,268 UART: [ldev] Erasing FE.KEYID = 1
1,547,745 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,579 UART: [ldev] --
1,586,932 UART: [fwproc] Waiting for Commands...
1,587,621 UART: [fwproc] Received command 0x46574c44
1,588,412 UART: [fwproc] Received Image of size 118548 bytes
2,932,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,602 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,077 >>> mbox cmd response: success
3,131,077 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,132,149 UART: [afmc] ++
3,132,317 UART: [afmc] CDI.KEYID = 6
3,132,679 UART: [afmc] SUBJECT.KEYID = 7
3,133,104 UART: [afmc] AUTHORITY.KEYID = 5
3,168,023 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,387 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,167 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,876 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,759 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,442 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,388 UART: [afmc] --
3,211,272 UART: [cold-reset] --
3,212,184 UART: [state] Locking Datavault
3,213,533 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,137 UART: [state] Locking ICCM
3,214,661 UART: [exit] Launching FMC @ 0x40000130
3,219,991 UART:
3,220,007 UART: Running Caliptra FMC ...
3,220,415 UART:
3,220,558 UART: [state] CFI Enabled
3,231,170 UART: [fht] FMC Alias Private Key: 7
3,350,098 UART: [art] Extend RT PCRs Done
3,350,526 UART: [art] Lock RT PCRs Done
3,352,386 UART: [art] Populate DV Done
3,360,721 UART: [fht] FMC Alias Private Key: 7
3,361,777 UART: [art] Derive CDI
3,362,057 UART: [art] Store in slot 0x4
3,447,609 UART: [art] Derive Key Pair
3,447,969 UART: [art] Store priv key in slot 0x5
3,461,076 UART: [art] Derive Key Pair - Done
3,475,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,237 UART: [art] PUB.X = CB8FD273BC5F4DD01D6D4CBEC546EE11180EDD1FE22A8A059EAC5E82549FA517DEA07C7A940CA50C498AEEC71F467EE3
3,499,023 UART: [art] PUB.Y = 21738043E75A772F62F7DAA45314F9D7CBB0A72508898BFD98E613C1437C302C32A1FA2D584DD48002510BFFED10935F
3,505,966 UART: [art] SIG.R = F58602DC5648C8C45B125604C8D557D527509F31766B537EBC6EFAA730FB7A538968630491D19DDE2B93D496366458D2
3,512,721 UART: [art] SIG.S = B8B1F7841AD81520BAA0F95E1984666A4EE088E4942094FC4568A69A5765A7E0C5E361797D375DADA2234888B7805670
3,536,129 UART: Caliptra RT
3,536,472 UART: [state] CFI Enabled
3,656,901 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,369 UART: [rt]cmd =0x46505652, len=4
3,688,029 UART: [rt] FIPS Version
3,688,950 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,064 ready_for_fw is high
1,363,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,917 >>> mbox cmd response: success
2,981,917 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,043,654 UART:
3,043,670 UART: Running Caliptra FMC ...
3,044,078 UART:
3,044,221 UART: [state] CFI Enabled
3,054,969 UART: [fht] FMC Alias Private Key: 7
3,174,145 UART: [art] Extend RT PCRs Done
3,174,573 UART: [art] Lock RT PCRs Done
3,175,871 UART: [art] Populate DV Done
3,184,056 UART: [fht] FMC Alias Private Key: 7
3,185,156 UART: [art] Derive CDI
3,185,436 UART: [art] Store in slot 0x4
3,271,262 UART: [art] Derive Key Pair
3,271,622 UART: [art] Store priv key in slot 0x5
3,284,959 UART: [art] Derive Key Pair - Done
3,299,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,955 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,720 UART: [art] PUB.X = 127DC8540382D7B033F9D399A8DE4AB3051B37325E7382BC510BC436CCCBDC6B0A220733970484F6111E022E7823764D
3,322,465 UART: [art] PUB.Y = 5D101E72F0B9ADFDE90E00FC49D77D102A672CAE371C955EFEDDE39A1BB45F8498313E0403106CD68D681F0424966F76
3,329,389 UART: [art] SIG.R = 70A221C6E374FF6597342CF1E4D0E87625FB8948E52B0136F2F837385FAF24D00A0EB74C4E475FC06755BB80293E6950
3,336,148 UART: [art] SIG.S = CADE0445080B792FEE977932E0C31097BB61ED6C325F314789C008628AE59277AD8CB18FAA2844487823E25748524A81
3,360,490 UART: Caliptra RT
3,360,833 UART: [state] CFI Enabled
3,481,861 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,533 UART: [rt]cmd =0x46505652, len=4
3,513,193 UART: [rt] FIPS Version
3,514,172 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,210 UART: [kat] ++
895,362 UART: [kat] sha1
899,702 UART: [kat] SHA2-256
901,642 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
916,051 UART: [kat] HMAC-384Kdf
920,761 UART: [kat] LMS
1,169,073 UART: [kat] --
1,169,830 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,874 UART: [idev] ++
1,173,042 UART: [idev] CDI.KEYID = 6
1,173,403 UART: [idev] SUBJECT.KEYID = 7
1,173,828 UART: [idev] UDS.KEYID = 0
1,174,174 ready_for_fw is high
1,174,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,247 UART: [idev] Erasing UDS.KEYID = 0
1,198,815 UART: [idev] Sha1 KeyId Algorithm
1,207,619 UART: [idev] --
1,208,580 UART: [ldev] ++
1,208,748 UART: [ldev] CDI.KEYID = 6
1,209,112 UART: [ldev] SUBJECT.KEYID = 5
1,209,539 UART: [ldev] AUTHORITY.KEYID = 7
1,210,002 UART: [ldev] FE.KEYID = 1
1,215,224 UART: [ldev] Erasing FE.KEYID = 1
1,241,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,038 UART: [ldev] --
1,280,259 UART: [fwproc] Wait for Commands...
1,280,958 UART: [fwproc] Recv command 0x46574c44
1,281,691 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,575 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,750 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,005 >>> mbox cmd response: success
2,824,005 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,825,211 UART: [afmc] ++
2,825,379 UART: [afmc] CDI.KEYID = 6
2,825,742 UART: [afmc] SUBJECT.KEYID = 7
2,826,168 UART: [afmc] AUTHORITY.KEYID = 5
2,861,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,707 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,417 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,298 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,999 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,698 UART: [afmc] --
2,904,623 UART: [cold-reset] --
2,905,429 UART: [state] Locking Datavault
2,906,596 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,200 UART: [state] Locking ICCM
2,907,654 UART: [exit] Launching FMC @ 0x40000130
2,912,984 UART:
2,913,000 UART: Running Caliptra FMC ...
2,913,408 UART:
2,913,462 UART: [state] CFI Enabled
2,924,132 UART: [fht] FMC Alias Private Key: 7
3,043,084 UART: [art] Extend RT PCRs Done
3,043,512 UART: [art] Lock RT PCRs Done
3,044,950 UART: [art] Populate DV Done
3,053,115 UART: [fht] FMC Alias Private Key: 7
3,054,237 UART: [art] Derive CDI
3,054,517 UART: [art] Store in slot 0x4
3,140,322 UART: [art] Derive Key Pair
3,140,682 UART: [art] Store priv key in slot 0x5
3,154,012 UART: [art] Derive Key Pair - Done
3,168,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,870 UART: [art] PUB.X = 5D4CEBE7F1CC001B95C99E4128458DBCE24BB50FE5AF3F5BB76CC328334C7DAA417C3AB9909239CB084F376BB7B09E56
3,191,630 UART: [art] PUB.Y = 43605E7BC88DBDA9ECC06550076D4CE72B9B224AB415D8D9F54AD8BC24C55471B2A4E0E1D8284EC47C6F58CB3DEA0286
3,198,590 UART: [art] SIG.R = 36FD07BD45A4DF0330304C16EF9849BCB329AF0F5BA00EA76A8F31D07DCC4AF91FD23955DF61F4FC28926E24E9C9616D
3,205,364 UART: [art] SIG.S = E888C0B73B36602694817E8F47F68ABD7915025AD4772899E15E273F9F31EE6CC5701B854C1EA0CC70A09C6AB1F8D362
3,229,033 UART: Caliptra RT
3,229,284 UART: [state] CFI Enabled
3,349,179 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,743 UART: [rt]cmd =0x46505652, len=4
3,380,403 UART: [rt] FIPS Version
3,381,446 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,412 ready_for_fw is high
1,059,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,280 >>> mbox cmd response: success
2,679,280 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,740,805 UART:
2,740,821 UART: Running Caliptra FMC ...
2,741,229 UART:
2,741,283 UART: [state] CFI Enabled
2,751,791 UART: [fht] FMC Alias Private Key: 7
2,870,619 UART: [art] Extend RT PCRs Done
2,871,047 UART: [art] Lock RT PCRs Done
2,872,435 UART: [art] Populate DV Done
2,880,840 UART: [fht] FMC Alias Private Key: 7
2,881,850 UART: [art] Derive CDI
2,882,130 UART: [art] Store in slot 0x4
2,967,809 UART: [art] Derive Key Pair
2,968,169 UART: [art] Store priv key in slot 0x5
2,981,979 UART: [art] Derive Key Pair - Done
2,996,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,890 UART: [art] PUB.X = F20BA2D4A8AE1AAD9A543CDC1E652599E8E3A5C84B130D2854A3B443CFEA6BD76D21146470BB4C45725C189C87D305B0
3,019,663 UART: [art] PUB.Y = B54D0D239F96C54266F3EA16937C90E76F9A44EC79EE94A8CFF67D37F41B24ABFD80CD31435D90E43F3CBB9707113264
3,026,615 UART: [art] SIG.R = 561CE16A4304FA64FA47825C6E61548BEAA25946B9FB98E7C20AD85BCC464090E27E62EDFE43F35D9157506E6013FE81
3,033,385 UART: [art] SIG.S = E46DEC8295A1F5ED0BD7696E611948E18458CEB45A9E42C3FD2DAD1DCF1215401B1E7CCBBC1CC14CC79C0EFF460E28D1
3,058,052 UART: Caliptra RT
3,058,303 UART: [state] CFI Enabled
3,177,024 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,522 UART: [rt]cmd =0x46505652, len=4
3,208,182 UART: [rt] FIPS Version
3,209,113 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
900,173 UART: [kat] SHA2-256
902,113 UART: [kat] SHA2-384
904,896 UART: [kat] SHA2-512-ACC
906,797 UART: [kat] ECC-384
916,566 UART: [kat] HMAC-384Kdf
921,062 UART: [kat] LMS
1,169,374 UART: [kat] --
1,170,319 UART: [cold-reset] ++
1,170,791 UART: [fht] FHT @ 0x50003400
1,173,575 UART: [idev] ++
1,173,743 UART: [idev] CDI.KEYID = 6
1,174,104 UART: [idev] SUBJECT.KEYID = 7
1,174,529 UART: [idev] UDS.KEYID = 0
1,174,875 ready_for_fw is high
1,174,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,804 UART: [idev] Erasing UDS.KEYID = 0
1,199,562 UART: [idev] Sha1 KeyId Algorithm
1,208,526 UART: [idev] --
1,209,365 UART: [ldev] ++
1,209,533 UART: [ldev] CDI.KEYID = 6
1,209,897 UART: [ldev] SUBJECT.KEYID = 5
1,210,324 UART: [ldev] AUTHORITY.KEYID = 7
1,210,787 UART: [ldev] FE.KEYID = 1
1,215,717 UART: [ldev] Erasing FE.KEYID = 1
1,242,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,833 UART: [ldev] --
1,282,048 UART: [fwproc] Wait for Commands...
1,282,847 UART: [fwproc] Recv command 0x46574c44
1,283,580 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,858 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,033 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,334 >>> mbox cmd response: success
2,826,334 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,827,418 UART: [afmc] ++
2,827,586 UART: [afmc] CDI.KEYID = 6
2,827,949 UART: [afmc] SUBJECT.KEYID = 7
2,828,375 UART: [afmc] AUTHORITY.KEYID = 5
2,864,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,218 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,928 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,809 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,510 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,085 UART: [afmc] --
2,908,052 UART: [cold-reset] --
2,908,798 UART: [state] Locking Datavault
2,909,679 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,283 UART: [state] Locking ICCM
2,910,791 UART: [exit] Launching FMC @ 0x40000130
2,916,121 UART:
2,916,137 UART: Running Caliptra FMC ...
2,916,545 UART:
2,916,688 UART: [state] CFI Enabled
2,927,650 UART: [fht] FMC Alias Private Key: 7
3,046,460 UART: [art] Extend RT PCRs Done
3,046,888 UART: [art] Lock RT PCRs Done
3,048,332 UART: [art] Populate DV Done
3,056,409 UART: [fht] FMC Alias Private Key: 7
3,057,403 UART: [art] Derive CDI
3,057,683 UART: [art] Store in slot 0x4
3,143,836 UART: [art] Derive Key Pair
3,144,196 UART: [art] Store priv key in slot 0x5
3,157,066 UART: [art] Derive Key Pair - Done
3,172,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,884 UART: [art] PUB.X = 9759056DDB56A2E51087CE8E82C738ECB50B61D127DD30167686E6BF3F50212CF4D2E4FA57A787924E6C1CD01B084496
3,194,647 UART: [art] PUB.Y = 64965B08797B7307E0BCE0DF031D2E37BCCFA6DC0D60DF9A5479E1EAEC29629AE31025A31406E2EFD0A47061F79D2C1B
3,201,596 UART: [art] SIG.R = 364DED0F27B79C7FE9E9675BA39B8980C4CCBAB4CF3BD4C4507A2C865D4F5CF0DBE4A3ED3D5D2D69EFC836DC7791A4DC
3,208,393 UART: [art] SIG.S = 313974A3F115AEEB68012256C84823A91A581B9DBD4F5165DFE8458CAFBB87F4D8332727EE6067DEE24477BC225435C7
3,231,874 UART: Caliptra RT
3,232,217 UART: [state] CFI Enabled
3,351,491 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,131 UART: [rt]cmd =0x46505652, len=4
3,382,791 UART: [rt] FIPS Version
3,383,800 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,743 ready_for_fw is high
1,058,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,479 >>> mbox cmd response: success
2,679,479 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,740,898 UART:
2,740,914 UART: Running Caliptra FMC ...
2,741,322 UART:
2,741,465 UART: [state] CFI Enabled
2,752,181 UART: [fht] FMC Alias Private Key: 7
2,871,541 UART: [art] Extend RT PCRs Done
2,871,969 UART: [art] Lock RT PCRs Done
2,873,515 UART: [art] Populate DV Done
2,881,788 UART: [fht] FMC Alias Private Key: 7
2,882,768 UART: [art] Derive CDI
2,883,048 UART: [art] Store in slot 0x4
2,969,011 UART: [art] Derive Key Pair
2,969,371 UART: [art] Store priv key in slot 0x5
2,983,255 UART: [art] Derive Key Pair - Done
2,998,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,596 UART: [art] PUB.X = AC8CA088BD98E3E7D467AB52C1E8AF8C1AC95FFC7998E495C74AAC2436DF27916E632028EADC16A44F5AD8551A039814
3,021,377 UART: [art] PUB.Y = FD1CC62D5ADD419754AA19C7AEBEEF9CE7F5EB7E773CBCB5822EC4A1DBAA6A71CA48CB89FE8EAEDFF29F2E642CCC3535
3,028,369 UART: [art] SIG.R = E8591431EBB04C65AF47D0E92A4EDB322566FF1A5EF98847AB5BE648FDA505DEC969FF0C1C706466EBE25F43B13F3C02
3,035,146 UART: [art] SIG.S = 6D8BF457E9E71933D69C70C1773A243B36569F41A60C91296322A8924F4EB77B20D323C45743810E6E717DE51BD13F15
3,058,206 UART: Caliptra RT
3,058,549 UART: [state] CFI Enabled
3,178,316 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,976 UART: [rt]cmd =0x46505652, len=4
3,209,636 UART: [rt] FIPS Version
3,210,473 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
893,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,361 UART: [kat] ++
897,513 UART: [kat] sha1
901,747 UART: [kat] SHA2-256
903,687 UART: [kat] SHA2-384
906,484 UART: [kat] SHA2-512-ACC
908,385 UART: [kat] ECC-384
917,984 UART: [kat] HMAC-384Kdf
922,646 UART: [kat] LMS
1,170,974 UART: [kat] --
1,172,035 UART: [cold-reset] ++
1,172,571 UART: [fht] FHT @ 0x50003400
1,175,402 UART: [idev] ++
1,175,570 UART: [idev] CDI.KEYID = 6
1,175,930 UART: [idev] SUBJECT.KEYID = 7
1,176,354 UART: [idev] UDS.KEYID = 0
1,176,699 ready_for_fw is high
1,176,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,456 UART: [idev] Erasing UDS.KEYID = 0
1,201,881 UART: [idev] Sha1 KeyId Algorithm
1,210,169 UART: [idev] --
1,211,275 UART: [ldev] ++
1,211,443 UART: [ldev] CDI.KEYID = 6
1,211,806 UART: [ldev] SUBJECT.KEYID = 5
1,212,232 UART: [ldev] AUTHORITY.KEYID = 7
1,212,695 UART: [ldev] FE.KEYID = 1
1,218,209 UART: [ldev] Erasing FE.KEYID = 1
1,244,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,837 UART: [ldev] --
1,283,220 UART: [fwproc] Wait for Commands...
1,283,900 UART: [fwproc] Recv command 0x46574c44
1,284,628 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,990 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,160 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,533 >>> mbox cmd response: success
2,828,533 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,829,615 UART: [afmc] ++
2,829,783 UART: [afmc] CDI.KEYID = 6
2,830,145 UART: [afmc] SUBJECT.KEYID = 7
2,830,570 UART: [afmc] AUTHORITY.KEYID = 5
2,865,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,162 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,871 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,754 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,455 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,289 UART: [afmc] --
2,909,267 UART: [cold-reset] --
2,910,305 UART: [state] Locking Datavault
2,911,332 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,936 UART: [state] Locking ICCM
2,912,362 UART: [exit] Launching FMC @ 0x40000130
2,917,692 UART:
2,917,708 UART: Running Caliptra FMC ...
2,918,116 UART:
2,918,170 UART: [state] CFI Enabled
2,928,998 UART: [fht] FMC Alias Private Key: 7
3,048,326 UART: [art] Extend RT PCRs Done
3,048,754 UART: [art] Lock RT PCRs Done
3,050,392 UART: [art] Populate DV Done
3,058,727 UART: [fht] FMC Alias Private Key: 7
3,059,833 UART: [art] Derive CDI
3,060,113 UART: [art] Store in slot 0x4
3,145,854 UART: [art] Derive Key Pair
3,146,214 UART: [art] Store priv key in slot 0x5
3,159,560 UART: [art] Derive Key Pair - Done
3,174,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,799 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,564 UART: [art] PUB.X = 81C31DF5DE5E0B5AC5E85AB7F04F28C8245A5EF812B374766593E9DAB2BBA599D4E08B30E8DA647010456C3D6908CE98
3,197,338 UART: [art] PUB.Y = 5161FE249FD0F22BD9C3E1FF75F5A510BE04724EAB54FBF7F15EFA6FE334105EE4A2BE280F4B2A4B2F0CE2E39F127F74
3,204,301 UART: [art] SIG.R = 3E69615EA38CBCB678CE4DB2FF93DB8284A78AA0D42C1D608A0B3636BF2849FE14326E3A59DB1B9AF790A717400476C8
3,211,075 UART: [art] SIG.S = A2224278F6F1512EA88F829E89D43997D458250240750A08144DD3727B2C357CC59D6791BDA979649CBB0A880847E2D8
3,234,802 UART: Caliptra RT
3,235,053 UART: [state] CFI Enabled
3,354,660 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,102 UART: [rt]cmd =0x46505652, len=4
3,385,762 UART: [rt] FIPS Version
3,386,773 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,281 ready_for_fw is high
1,060,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,382 >>> mbox cmd response: success
2,680,382 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,742,747 UART:
2,742,763 UART: Running Caliptra FMC ...
2,743,171 UART:
2,743,225 UART: [state] CFI Enabled
2,753,637 UART: [fht] FMC Alias Private Key: 7
2,872,677 UART: [art] Extend RT PCRs Done
2,873,105 UART: [art] Lock RT PCRs Done
2,874,747 UART: [art] Populate DV Done
2,883,036 UART: [fht] FMC Alias Private Key: 7
2,884,006 UART: [art] Derive CDI
2,884,286 UART: [art] Store in slot 0x4
2,970,105 UART: [art] Derive Key Pair
2,970,465 UART: [art] Store priv key in slot 0x5
2,983,667 UART: [art] Derive Key Pair - Done
2,998,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,572 UART: [art] PUB.X = A3A27BDDC275935F030E831A9090C80DFC21537C1013D8D5450030CFE84B0C2A957E2B14ABD2BAF74CEBF97D4A0AC7D7
3,021,321 UART: [art] PUB.Y = 220920885C06380900B48E2E96476CC2558E062A7ADF137B00C9842108D66408065475893F9B3FB2FA514CBF4C95B03E
3,028,196 UART: [art] SIG.R = 3A44A5AD3E1C086E5F6DCCB4E1CCF209815050F9EEF6C1B08A858E96AB7E000B8E47EB0F3E87A21180F33B249FEB632D
3,034,950 UART: [art] SIG.S = 474E7989BA61B34FA075A44D989944E0D270FEEB1735596800359089EF9CC391265664739E8FD9AA67344B90E6C2644A
3,058,886 UART: Caliptra RT
3,059,137 UART: [state] CFI Enabled
3,178,913 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,423 UART: [rt]cmd =0x46505652, len=4
3,210,083 UART: [rt] FIPS Version
3,211,264 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [kat] SHA2-256
893,771 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,896 UART: [kat] ++
898,048 UART: [kat] sha1
902,068 UART: [kat] SHA2-256
904,008 UART: [kat] SHA2-384
906,745 UART: [kat] SHA2-512-ACC
908,646 UART: [kat] ECC-384
918,427 UART: [kat] HMAC-384Kdf
923,043 UART: [kat] LMS
1,171,371 UART: [kat] --
1,172,506 UART: [cold-reset] ++
1,173,012 UART: [fht] FHT @ 0x50003400
1,175,787 UART: [idev] ++
1,175,955 UART: [idev] CDI.KEYID = 6
1,176,315 UART: [idev] SUBJECT.KEYID = 7
1,176,739 UART: [idev] UDS.KEYID = 0
1,177,084 ready_for_fw is high
1,177,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,559 UART: [idev] Erasing UDS.KEYID = 0
1,202,120 UART: [idev] Sha1 KeyId Algorithm
1,210,790 UART: [idev] --
1,212,008 UART: [ldev] ++
1,212,176 UART: [ldev] CDI.KEYID = 6
1,212,539 UART: [ldev] SUBJECT.KEYID = 5
1,212,965 UART: [ldev] AUTHORITY.KEYID = 7
1,213,428 UART: [ldev] FE.KEYID = 1
1,218,462 UART: [ldev] Erasing FE.KEYID = 1
1,244,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,388 UART: [ldev] --
1,283,827 UART: [fwproc] Wait for Commands...
1,284,413 UART: [fwproc] Recv command 0x46574c44
1,285,141 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,541 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,711 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,108 >>> mbox cmd response: success
2,829,108 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,830,366 UART: [afmc] ++
2,830,534 UART: [afmc] CDI.KEYID = 6
2,830,896 UART: [afmc] SUBJECT.KEYID = 7
2,831,321 UART: [afmc] AUTHORITY.KEYID = 5
2,866,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,973 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,682 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,565 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,266 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,100 UART: [afmc] --
2,910,092 UART: [cold-reset] --
2,910,756 UART: [state] Locking Datavault
2,911,787 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,391 UART: [state] Locking ICCM
2,913,045 UART: [exit] Launching FMC @ 0x40000130
2,918,375 UART:
2,918,391 UART: Running Caliptra FMC ...
2,918,799 UART:
2,918,942 UART: [state] CFI Enabled
2,929,604 UART: [fht] FMC Alias Private Key: 7
3,049,510 UART: [art] Extend RT PCRs Done
3,049,938 UART: [art] Lock RT PCRs Done
3,051,522 UART: [art] Populate DV Done
3,059,779 UART: [fht] FMC Alias Private Key: 7
3,060,901 UART: [art] Derive CDI
3,061,181 UART: [art] Store in slot 0x4
3,147,640 UART: [art] Derive Key Pair
3,148,000 UART: [art] Store priv key in slot 0x5
3,161,510 UART: [art] Derive Key Pair - Done
3,176,432 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,594 UART: [art] PUB.X = 1F06362A2E38D41B6BC989B7619516F286CE885F31CF90248F20B5A2FA65301B4CD0F08F7120E8EEFB1B307916999A11
3,199,361 UART: [art] PUB.Y = 2C80C54C85534B4DDD186E5C1D7B634E82580DF91351EA5D4FD0B8907C07EFE9D3094F788F2BD814C70A25A5B47A0DC8
3,206,306 UART: [art] SIG.R = AE11F12624E7746E46DF616ECECD7E8683C69CED0D1705B4F96DE3DA58A455D88E0494142371EE00BD015C055D373B46
3,213,045 UART: [art] SIG.S = F44E88E2760A3E97664A555D2197F0E87EF618A944ED14F124174C98BCE6F8754DA024E047527B36A6413DEBEFE9E7CE
3,236,820 UART: Caliptra RT
3,237,163 UART: [state] CFI Enabled
3,357,279 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,783 UART: [rt]cmd =0x46505652, len=4
3,388,443 UART: [rt] FIPS Version
3,389,606 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,318 ready_for_fw is high
1,060,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,247 >>> mbox cmd response: success
2,679,247 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,742,388 UART:
2,742,404 UART: Running Caliptra FMC ...
2,742,812 UART:
2,742,955 UART: [state] CFI Enabled
2,753,533 UART: [fht] FMC Alias Private Key: 7
2,872,797 UART: [art] Extend RT PCRs Done
2,873,225 UART: [art] Lock RT PCRs Done
2,874,595 UART: [art] Populate DV Done
2,882,716 UART: [fht] FMC Alias Private Key: 7
2,883,854 UART: [art] Derive CDI
2,884,134 UART: [art] Store in slot 0x4
2,969,917 UART: [art] Derive Key Pair
2,970,277 UART: [art] Store priv key in slot 0x5
2,983,885 UART: [art] Derive Key Pair - Done
2,998,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,220 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,985 UART: [art] PUB.X = E44F4B75DA712C68F5074D0C780E4F9E047ACC2151D6F585DF3759EA9368A9D08747DA5C53D65B52BD16077C58CF09AA
3,021,745 UART: [art] PUB.Y = 2890C4CD45CAB4DCCBD621A2DE8528C739F7C7A786A6F048C4EE0EC499F24526D83C760EC0B0F61DE34CB3415E76B51B
3,028,705 UART: [art] SIG.R = 0C97F5A3D930A36083BD2BAFFDB8CD347F0B84E8123F7FF323DCFBD9BF5E09C9E9A0F02D49C181E66D60BA14CCAF27A6
3,035,492 UART: [art] SIG.S = 75D80FF12A6474C88767E4DC8147A9BA7DF030A4600F77702CC5ABF1A9AEE9E0CBB4F72EE28B41C2CC4AED7C6560EE19
3,059,010 UART: Caliptra RT
3,059,353 UART: [state] CFI Enabled
3,179,041 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,613 UART: [rt]cmd =0x46505652, len=4
3,210,273 UART: [rt] FIPS Version
3,211,362 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,009 UART:
192,390 UART: Running Caliptra ROM ...
193,559 UART:
193,718 UART: [state] CFI Enabled
262,922 UART: [state] LifecycleState = Unprovisioned
264,869 UART: [state] DebugLocked = No
267,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,453 UART: [kat] SHA2-256
442,172 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,664 UART: [kat] ++
453,140 UART: [kat] sha1
465,261 UART: [kat] SHA2-256
467,943 UART: [kat] SHA2-384
472,373 UART: [kat] SHA2-512-ACC
474,725 UART: [kat] ECC-384
2,766,567 UART: [kat] HMAC-384Kdf
2,799,876 UART: [kat] LMS
3,990,148 UART: [kat] --
3,993,010 UART: [cold-reset] ++
3,994,947 UART: [fht] Storing FHT @ 0x50003400
4,007,947 UART: [idev] ++
4,008,520 UART: [idev] CDI.KEYID = 6
4,009,803 UART: [idev] SUBJECT.KEYID = 7
4,010,925 UART: [idev] UDS.KEYID = 0
4,097,563 UART: [idev] Erasing UDS.KEYID = 0
4,099,718 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,343,296 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,025 UART: [idev] --
7,371,423 UART: [ldev] ++
7,372,052 UART: [ldev] CDI.KEYID = 6
7,372,986 UART: [ldev] SUBJECT.KEYID = 5
7,374,210 UART: [ldev] AUTHORITY.KEYID = 7
7,375,469 UART: [ldev] FE.KEYID = 1
7,420,149 UART: [ldev] Erasing FE.KEYID = 1
10,753,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,710 UART: [ldev] --
13,134,836 UART: [fwproc] Waiting for Commands...
13,137,811 UART: [fwproc] Received command 0x46505652
13,140,220 UART: [rt] FIPS Version
13,141,822 >>> mbox cmd response data (36 bytes)
13,142,671 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,144,437 UART: [fwproc] Received command 0x46504c54
13,146,969 UART: [kat] SHA2-256
13,316,617 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,326,937 UART: [kat] ++
13,327,395 UART: [kat] sha1
13,337,901 UART: [kat] SHA2-256
13,340,594 UART: [kat] SHA2-384
13,347,014 UART: [kat] SHA2-512-ACC
13,349,428 UART: [kat] ECC-384
15,648,697 UART: [kat] HMAC-384Kdf
15,681,070 UART: [kat] LMS
16,870,557 UART: [kat] --
16,871,281 >>> mbox cmd response data (8 bytes)
16,871,645 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,872,459 UART: [fwproc] Received command 0x46504c67
16,875,108 >>> mbox cmd response data (8 bytes)
16,875,424 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,876,011 UART: [fwproc] Received command 0x43415053
16,879,050 >>> mbox cmd response data (24 bytes)
16,879,561 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,880,077 UART: [fwproc] Received command 0x4d454153
16,889,089 >>> mbox cmd response data (12 bytes)
16,889,553 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,890,205 UART: [fwproc] Received command 0x46505344
16,892,965 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,890,738 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,847,381 >>> mbox cmd response data (36 bytes)
12,848,677 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,375,504 >>> mbox cmd response data (8 bytes)
16,376,396 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,377,418 >>> mbox cmd response data (8 bytes)
16,377,723 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,379,681 >>> mbox cmd response data (24 bytes)
16,380,351 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,389,132 >>> mbox cmd response data (12 bytes)
16,389,567 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,390,541 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,512 UART:
192,863 UART: Running Caliptra ROM ...
194,015 UART:
603,615 UART: [state] CFI Enabled
617,808 UART: [state] LifecycleState = Unprovisioned
619,783 UART: [state] DebugLocked = No
622,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,507 UART: [kat] SHA2-256
796,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,799 UART: [kat] ++
807,343 UART: [kat] sha1
817,800 UART: [kat] SHA2-256
820,482 UART: [kat] SHA2-384
827,816 UART: [kat] SHA2-512-ACC
830,211 UART: [kat] ECC-384
3,113,516 UART: [kat] HMAC-384Kdf
3,126,240 UART: [kat] LMS
4,316,318 UART: [kat] --
4,321,458 UART: [cold-reset] ++
4,323,234 UART: [fht] Storing FHT @ 0x50003400
4,334,186 UART: [idev] ++
4,334,763 UART: [idev] CDI.KEYID = 6
4,335,731 UART: [idev] SUBJECT.KEYID = 7
4,336,953 UART: [idev] UDS.KEYID = 0
4,423,645 UART: [idev] Erasing UDS.KEYID = 0
4,425,874 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,619,142 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,406 UART: [idev] --
7,644,228 UART: [ldev] ++
7,644,820 UART: [ldev] CDI.KEYID = 6
7,645,812 UART: [ldev] SUBJECT.KEYID = 5
7,646,989 UART: [ldev] AUTHORITY.KEYID = 7
7,648,236 UART: [ldev] FE.KEYID = 1
7,660,678 UART: [ldev] Erasing FE.KEYID = 1
10,946,967 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,320 UART: [ldev] --
13,306,588 UART: [fwproc] Waiting for Commands...
13,309,625 UART: [fwproc] Received command 0x46505652
13,312,041 UART: [rt] FIPS Version
13,313,672 >>> mbox cmd response data (36 bytes)
13,314,466 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,315,423 UART: [fwproc] Received command 0x46504c54
13,317,906 UART: [kat] SHA2-256
13,487,585 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,497,939 UART: [kat] ++
13,498,431 UART: [kat] sha1
13,511,164 UART: [kat] SHA2-256
13,513,901 UART: [kat] SHA2-384
13,518,765 UART: [kat] SHA2-512-ACC
13,521,129 UART: [kat] ECC-384
15,804,417 UART: [kat] HMAC-384Kdf
15,816,330 UART: [kat] LMS
17,005,766 UART: [kat] --
17,006,476 >>> mbox cmd response data (8 bytes)
17,006,855 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,008,054 UART: [fwproc] Received command 0x46504c67
17,010,706 >>> mbox cmd response data (8 bytes)
17,011,035 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,011,522 UART: [fwproc] Received command 0x43415053
17,014,550 >>> mbox cmd response data (24 bytes)
17,015,068 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,016,567 UART: [fwproc] Received command 0x4d454153
17,025,551 >>> mbox cmd response data (12 bytes)
17,026,014 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,026,623 UART: [fwproc] Received command 0x46505344
17,029,428 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
4,214,293 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,041,500 >>> mbox cmd response data (36 bytes)
13,042,686 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,537,132 >>> mbox cmd response data (8 bytes)
16,537,666 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,538,939 >>> mbox cmd response data (8 bytes)
16,539,358 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,541,204 >>> mbox cmd response data (24 bytes)
16,541,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,550,636 >>> mbox cmd response data (12 bytes)
16,551,099 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,553,758 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,233 UART:
192,622 UART: Running Caliptra ROM ...
193,762 UART:
193,918 UART: [state] CFI Enabled
263,920 UART: [state] LifecycleState = Unprovisioned
265,873 UART: [state] DebugLocked = No
268,016 UART: [state] WD Timer not started. Device not locked for debugging
271,244 UART: [kat] SHA2-256
450,890 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,655 UART: [kat] ++
462,191 UART: [kat] sha1
474,206 UART: [kat] SHA2-256
476,895 UART: [kat] SHA2-384
482,121 UART: [kat] SHA2-512-ACC
484,515 UART: [kat] ECC-384
2,949,583 UART: [kat] HMAC-384Kdf
2,971,772 UART: [kat] LMS
3,448,280 UART: [kat] --
3,453,212 UART: [cold-reset] ++
3,454,188 UART: [fht] FHT @ 0x50003400
3,464,950 UART: [idev] ++
3,465,524 UART: [idev] CDI.KEYID = 6
3,466,548 UART: [idev] SUBJECT.KEYID = 7
3,467,716 UART: [idev] UDS.KEYID = 0
3,549,176 UART: [idev] Erasing UDS.KEYID = 0
3,551,384 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,988,999 UART: [idev] Sha1 KeyId Algorithm
6,012,825 UART: [idev] --
6,017,106 UART: [ldev] ++
6,017,684 UART: [ldev] CDI.KEYID = 6
6,018,580 UART: [ldev] SUBJECT.KEYID = 5
6,019,743 UART: [ldev] AUTHORITY.KEYID = 7
6,021,041 UART: [ldev] FE.KEYID = 1
6,056,740 UART: [ldev] Erasing FE.KEYID = 1
8,561,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,999 UART: [ldev] --
10,372,629 UART: [fwproc] Wait for Commands...
10,375,115 UART: [fwproc] Recv command 0x46505652
10,377,328 UART: [rt] FIPS Version
10,378,872 >>> mbox cmd response data (36 bytes)
10,379,636 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,381,782 UART: [fwproc] Recv command 0x46504c54
10,384,065 UART: [kat] SHA2-256
10,563,746 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,574,848 UART: [kat] ++
10,575,310 UART: [kat] sha1
10,586,469 UART: [kat] SHA2-256
10,589,186 UART: [kat] SHA2-384
10,594,911 UART: [kat] SHA2-512-ACC
10,597,286 UART: [kat] ECC-384
13,061,616 UART: [kat] HMAC-384Kdf
13,082,379 UART: [kat] LMS
13,558,882 UART: [kat] --
13,559,553 >>> mbox cmd response data (8 bytes)
13,559,921 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,561,334 UART: [fwproc] Recv command 0x46504c67
13,563,780 >>> mbox cmd response data (8 bytes)
13,564,103 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,565,336 UART: [fwproc] Recv command 0x43415053
13,568,037 >>> mbox cmd response data (24 bytes)
13,568,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,569,217 UART: [fwproc] Recv command 0x4d454153
13,578,460 >>> mbox cmd response data (12 bytes)
13,578,874 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,579,470 UART: [fwproc] Recv command 0x46505344
13,581,921 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,469 writing to cptra_bootfsm_go
3,542,463 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,285,721 >>> mbox cmd response data (36 bytes)
10,286,853 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,471,242 >>> mbox cmd response data (8 bytes)
13,471,764 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,472,974 >>> mbox cmd response data (8 bytes)
13,473,292 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,475,610 >>> mbox cmd response data (24 bytes)
13,476,165 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,483,539 >>> mbox cmd response data (12 bytes)
13,483,968 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,486,137 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
192,551 UART:
192,951 UART: Running Caliptra ROM ...
194,130 UART:
603,634 UART: [state] CFI Enabled
617,456 UART: [state] LifecycleState = Unprovisioned
619,374 UART: [state] DebugLocked = No
622,322 UART: [state] WD Timer not started. Device not locked for debugging
625,328 UART: [kat] SHA2-256
804,991 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,805 UART: [kat] ++
816,345 UART: [kat] sha1
827,395 UART: [kat] SHA2-256
830,076 UART: [kat] SHA2-384
836,607 UART: [kat] SHA2-512-ACC
838,950 UART: [kat] ECC-384
3,280,384 UART: [kat] HMAC-384Kdf
3,292,884 UART: [kat] LMS
3,769,350 UART: [kat] --
3,773,270 UART: [cold-reset] ++
3,774,243 UART: [fht] FHT @ 0x50003400
3,785,605 UART: [idev] ++
3,786,176 UART: [idev] CDI.KEYID = 6
3,787,143 UART: [idev] SUBJECT.KEYID = 7
3,788,366 UART: [idev] UDS.KEYID = 0
3,870,207 UART: [idev] Erasing UDS.KEYID = 0
3,872,423 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,271,318 UART: [idev] Sha1 KeyId Algorithm
6,295,300 UART: [idev] --
6,299,637 UART: [ldev] ++
6,300,215 UART: [ldev] CDI.KEYID = 6
6,301,107 UART: [ldev] SUBJECT.KEYID = 5
6,302,327 UART: [ldev] AUTHORITY.KEYID = 7
6,303,566 UART: [ldev] FE.KEYID = 1
6,315,093 UART: [ldev] Erasing FE.KEYID = 1
8,797,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,238 UART: [ldev] --
10,591,298 UART: [fwproc] Wait for Commands...
10,593,722 UART: [fwproc] Recv command 0x46505652
10,595,930 UART: [rt] FIPS Version
10,597,471 >>> mbox cmd response data (36 bytes)
10,598,232 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,599,556 UART: [fwproc] Recv command 0x46504c54
10,601,890 UART: [kat] SHA2-256
10,781,554 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,792,644 UART: [kat] ++
10,793,109 UART: [kat] sha1
10,804,266 UART: [kat] SHA2-256
10,806,980 UART: [kat] SHA2-384
10,813,410 UART: [kat] SHA2-512-ACC
10,815,719 UART: [kat] ECC-384
13,258,898 UART: [kat] HMAC-384Kdf
13,271,281 UART: [kat] LMS
13,747,825 UART: [kat] --
13,748,469 >>> mbox cmd response data (8 bytes)
13,748,825 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,749,256 UART: [fwproc] Recv command 0x46504c67
13,751,732 >>> mbox cmd response data (8 bytes)
13,752,059 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,752,654 UART: [fwproc] Recv command 0x43415053
13,755,307 >>> mbox cmd response data (24 bytes)
13,755,789 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,757,223 UART: [fwproc] Recv command 0x4d454153
13,766,415 >>> mbox cmd response data (12 bytes)
13,766,862 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,768,107 UART: [fwproc] Recv command 0x46505344
13,770,546 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,873 writing to cptra_bootfsm_go
3,857,128 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,491,395 >>> mbox cmd response data (36 bytes)
10,492,424 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,644,362 >>> mbox cmd response data (8 bytes)
13,644,866 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,646,562 >>> mbox cmd response data (8 bytes)
13,646,912 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,648,285 >>> mbox cmd response data (24 bytes)
13,648,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,656,360 >>> mbox cmd response data (12 bytes)
13,656,781 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,658,455 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,214 UART:
192,563 UART: Running Caliptra ROM ...
193,714 UART:
193,870 UART: [state] CFI Enabled
264,776 UART: [state] LifecycleState = Unprovisioned
267,158 UART: [state] DebugLocked = No
268,599 UART: [state] WD Timer not started. Device not locked for debugging
272,589 UART: [kat] SHA2-256
462,495 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,275 UART: [kat] ++
473,763 UART: [kat] sha1
484,377 UART: [kat] SHA2-256
487,389 UART: [kat] SHA2-384
492,132 UART: [kat] SHA2-512-ACC
494,761 UART: [kat] ECC-384
2,947,750 UART: [kat] HMAC-384Kdf
2,969,692 UART: [kat] LMS
3,501,466 UART: [kat] --
3,506,381 UART: [cold-reset] ++
3,507,298 UART: [fht] FHT @ 0x50003400
3,518,827 UART: [idev] ++
3,519,557 UART: [idev] CDI.KEYID = 6
3,520,476 UART: [idev] SUBJECT.KEYID = 7
3,521,646 UART: [idev] UDS.KEYID = 0
3,607,705 UART: [idev] Erasing UDS.KEYID = 0
3,609,904 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,025,208 UART: [idev] Sha1 KeyId Algorithm
6,048,276 UART: [idev] --
6,054,577 UART: [ldev] ++
6,055,272 UART: [ldev] CDI.KEYID = 6
6,056,199 UART: [ldev] SUBJECT.KEYID = 5
6,057,370 UART: [ldev] AUTHORITY.KEYID = 7
6,058,614 UART: [ldev] FE.KEYID = 1
6,095,956 UART: [ldev] Erasing FE.KEYID = 1
8,606,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,504 UART: [ldev] --
10,409,764 UART: [fwproc] Wait for Commands...
10,411,545 UART: [fwproc] Recv command 0x46505652
10,414,081 UART: [rt] FIPS Version
10,415,832 >>> mbox cmd response data (36 bytes)
10,416,637 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,417,919 UART: [fwproc] Recv command 0x46504c54
10,420,147 UART: [kat] SHA2-256
10,609,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,620,636 UART: [kat] ++
10,621,346 UART: [kat] sha1
10,633,323 UART: [kat] SHA2-256
10,636,388 UART: [kat] SHA2-384
10,641,796 UART: [kat] SHA2-512-ACC
10,644,378 UART: [kat] ECC-384
13,097,545 UART: [kat] HMAC-384Kdf
13,120,787 UART: [kat] LMS
13,652,643 UART: [kat] --
13,653,307 >>> mbox cmd response data (8 bytes)
13,653,678 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,655,216 UART: [fwproc] Recv command 0x46504c67
13,657,769 >>> mbox cmd response data (8 bytes)
13,658,081 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,658,566 UART: [fwproc] Recv command 0x43415053
13,661,548 >>> mbox cmd response data (24 bytes)
13,662,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,663,122 UART: [fwproc] Recv command 0x4d454153
13,672,816 >>> mbox cmd response data (12 bytes)
13,673,270 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,674,572 UART: [fwproc] Recv command 0x46505344
13,677,225 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,016 writing to cptra_bootfsm_go
3,525,437 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,245,582 >>> mbox cmd response data (36 bytes)
10,246,605 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,386,217 >>> mbox cmd response data (8 bytes)
13,386,723 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,388,475 >>> mbox cmd response data (8 bytes)
13,388,889 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,391,110 >>> mbox cmd response data (24 bytes)
13,391,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,400,080 >>> mbox cmd response data (12 bytes)
13,400,503 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,401,481 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
192,392 UART:
192,776 UART: Running Caliptra ROM ...
193,956 UART:
603,619 UART: [state] CFI Enabled
617,231 UART: [state] LifecycleState = Unprovisioned
619,591 UART: [state] DebugLocked = No
621,459 UART: [state] WD Timer not started. Device not locked for debugging
625,230 UART: [kat] SHA2-256
814,922 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,682 UART: [kat] ++
826,203 UART: [kat] sha1
838,143 UART: [kat] SHA2-256
841,118 UART: [kat] SHA2-384
847,323 UART: [kat] SHA2-512-ACC
849,945 UART: [kat] ECC-384
3,294,286 UART: [kat] HMAC-384Kdf
3,308,307 UART: [kat] LMS
3,840,176 UART: [kat] --
3,845,486 UART: [cold-reset] ++
3,846,561 UART: [fht] FHT @ 0x50003400
3,858,823 UART: [idev] ++
3,859,544 UART: [idev] CDI.KEYID = 6
3,860,439 UART: [idev] SUBJECT.KEYID = 7
3,861,658 UART: [idev] UDS.KEYID = 0
3,947,478 UART: [idev] Erasing UDS.KEYID = 0
3,949,676 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,340,496 UART: [idev] Sha1 KeyId Algorithm
6,361,874 UART: [idev] --
6,367,225 UART: [ldev] ++
6,367,912 UART: [ldev] CDI.KEYID = 6
6,368,849 UART: [ldev] SUBJECT.KEYID = 5
6,370,015 UART: [ldev] AUTHORITY.KEYID = 7
6,371,198 UART: [ldev] FE.KEYID = 1
6,381,908 UART: [ldev] Erasing FE.KEYID = 1
8,856,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,267 UART: [ldev] --
10,645,596 UART: [fwproc] Wait for Commands...
10,647,050 UART: [fwproc] Recv command 0x46505652
10,649,266 UART: [rt] FIPS Version
10,651,003 >>> mbox cmd response data (36 bytes)
10,651,769 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,652,235 UART: [fwproc] Recv command 0x46504c54
10,654,797 UART: [kat] SHA2-256
10,844,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,855,319 UART: [kat] ++
10,855,916 UART: [kat] sha1
10,865,840 UART: [kat] SHA2-256
10,868,864 UART: [kat] SHA2-384
10,875,899 UART: [kat] SHA2-512-ACC
10,878,473 UART: [kat] ECC-384
13,318,499 UART: [kat] HMAC-384Kdf
13,331,231 UART: [kat] LMS
13,863,154 UART: [kat] --
13,863,805 >>> mbox cmd response data (8 bytes)
13,864,153 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,864,753 UART: [fwproc] Recv command 0x46504c67
13,867,252 >>> mbox cmd response data (8 bytes)
13,867,571 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,868,491 UART: [fwproc] Recv command 0x43415053
13,871,474 >>> mbox cmd response data (24 bytes)
13,871,980 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,873,094 UART: [fwproc] Recv command 0x4d454153
13,882,784 >>> mbox cmd response data (12 bytes)
13,883,205 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,883,828 UART: [fwproc] Recv command 0x46505344
13,886,545 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,665 writing to cptra_bootfsm_go
3,843,820 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,476,554 >>> mbox cmd response data (36 bytes)
10,477,767 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,596,503 >>> mbox cmd response data (8 bytes)
13,597,072 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,599,000 >>> mbox cmd response data (8 bytes)
13,599,424 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,600,965 >>> mbox cmd response data (24 bytes)
13,601,568 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,609,760 >>> mbox cmd response data (12 bytes)
13,610,197 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,611,396 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,027 UART: [kat] SHA2-256
881,958 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,073 UART: [kat] ++
886,225 UART: [kat] sha1
890,607 UART: [kat] SHA2-256
892,545 UART: [kat] SHA2-384
895,352 UART: [kat] SHA2-512-ACC
897,253 UART: [kat] ECC-384
902,694 UART: [kat] HMAC-384Kdf
907,144 UART: [kat] LMS
1,475,340 UART: [kat] --
1,476,181 UART: [cold-reset] ++
1,476,611 UART: [fht] Storing FHT @ 0x50003400
1,479,500 UART: [idev] ++
1,479,668 UART: [idev] CDI.KEYID = 6
1,480,028 UART: [idev] SUBJECT.KEYID = 7
1,480,452 UART: [idev] UDS.KEYID = 0
1,480,797 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,610 UART: [idev] Erasing UDS.KEYID = 0
1,505,320 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,880 UART: [idev] --
1,514,889 UART: [ldev] ++
1,515,057 UART: [ldev] CDI.KEYID = 6
1,515,420 UART: [ldev] SUBJECT.KEYID = 5
1,515,846 UART: [ldev] AUTHORITY.KEYID = 7
1,516,309 UART: [ldev] FE.KEYID = 1
1,521,419 UART: [ldev] Erasing FE.KEYID = 1
1,546,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,376 UART: [ldev] --
1,586,877 UART: [fwproc] Waiting for Commands...
1,587,552 UART: [fwproc] Received command 0x46505652
1,588,434 UART: [rt] FIPS Version
1,588,987 >>> mbox cmd response data (36 bytes)
1,588,988 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,589,290 UART: [fwproc] Received command 0x46504c54
1,590,197 UART: [kat] SHA2-256
2,384,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,388,243 UART: [kat] ++
2,388,395 UART: [kat] sha1
2,392,583 UART: [kat] SHA2-256
2,394,521 UART: [kat] SHA2-384
2,397,170 UART: [kat] SHA2-512-ACC
2,399,070 UART: [kat] ECC-384
2,404,675 UART: [kat] HMAC-384Kdf
2,409,277 UART: [kat] LMS
2,977,473 UART: [kat] --
2,977,711 >>> mbox cmd response data (8 bytes)
2,977,712 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,977,814 UART: [fwproc] Received command 0x46504c67
2,978,768 >>> mbox cmd response data (8 bytes)
2,978,769 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,978,921 UART: [fwproc] Received command 0x43415053
2,979,969 >>> mbox cmd response data (24 bytes)
2,979,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,980,148 UART: [fwproc] Received command 0x4d454153
2,984,212 >>> mbox cmd response data (12 bytes)
2,984,213 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,984,443 UART: [fwproc] Received command 0x46505344
2,985,391 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,667 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,936 >>> mbox cmd response data (36 bytes)
1,441,937 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,898 >>> mbox cmd response data (8 bytes)
2,716,899 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,143 >>> mbox cmd response data (8 bytes)
2,717,144 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,717,520 >>> mbox cmd response data (24 bytes)
2,717,521 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,721,001 >>> mbox cmd response data (12 bytes)
2,721,002 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,721,369 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,542 UART: [kat] SHA2-256
882,473 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,588 UART: [kat] ++
886,740 UART: [kat] sha1
891,070 UART: [kat] SHA2-256
893,008 UART: [kat] SHA2-384
895,771 UART: [kat] SHA2-512-ACC
897,672 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,373 UART: [kat] LMS
1,476,569 UART: [kat] --
1,477,502 UART: [cold-reset] ++
1,477,838 UART: [fht] Storing FHT @ 0x50003400
1,480,581 UART: [idev] ++
1,480,749 UART: [idev] CDI.KEYID = 6
1,481,109 UART: [idev] SUBJECT.KEYID = 7
1,481,533 UART: [idev] UDS.KEYID = 0
1,481,878 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,490,089 UART: [idev] Erasing UDS.KEYID = 0
1,506,685 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,241 UART: [idev] --
1,516,192 UART: [ldev] ++
1,516,360 UART: [ldev] CDI.KEYID = 6
1,516,723 UART: [ldev] SUBJECT.KEYID = 5
1,517,149 UART: [ldev] AUTHORITY.KEYID = 7
1,517,612 UART: [ldev] FE.KEYID = 1
1,522,788 UART: [ldev] Erasing FE.KEYID = 1
1,548,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,149 UART: [ldev] --
1,588,506 UART: [fwproc] Waiting for Commands...
1,589,309 UART: [fwproc] Received command 0x46505652
1,590,191 UART: [rt] FIPS Version
1,590,744 >>> mbox cmd response data (36 bytes)
1,590,745 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,590,833 UART: [fwproc] Received command 0x46504c54
1,591,740 UART: [kat] SHA2-256
2,385,671 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,389,786 UART: [kat] ++
2,389,938 UART: [kat] sha1
2,394,108 UART: [kat] SHA2-256
2,396,046 UART: [kat] SHA2-384
2,398,693 UART: [kat] SHA2-512-ACC
2,400,593 UART: [kat] ECC-384
2,406,168 UART: [kat] HMAC-384Kdf
2,410,850 UART: [kat] LMS
2,979,046 UART: [kat] --
2,979,284 >>> mbox cmd response data (8 bytes)
2,979,285 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,979,375 UART: [fwproc] Received command 0x46504c67
2,980,329 >>> mbox cmd response data (8 bytes)
2,980,330 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,980,604 UART: [fwproc] Received command 0x43415053
2,981,652 >>> mbox cmd response data (24 bytes)
2,981,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,981,911 UART: [fwproc] Received command 0x4d454153
2,985,975 >>> mbox cmd response data (12 bytes)
2,985,976 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,986,118 UART: [fwproc] Received command 0x46505344
2,987,066 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,868 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,739 >>> mbox cmd response data (36 bytes)
1,442,740 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,717,395 >>> mbox cmd response data (8 bytes)
2,717,396 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,720 >>> mbox cmd response data (8 bytes)
2,717,721 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,718,215 >>> mbox cmd response data (24 bytes)
2,718,216 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,721,758 >>> mbox cmd response data (12 bytes)
2,721,759 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,722,056 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,833 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
891,528 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,170,138 UART: [cold-reset] ++
1,170,640 UART: [fht] FHT @ 0x50003400
1,173,316 UART: [idev] ++
1,173,484 UART: [idev] CDI.KEYID = 6
1,173,845 UART: [idev] SUBJECT.KEYID = 7
1,174,270 UART: [idev] UDS.KEYID = 0
1,174,616 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,351 UART: [idev] Erasing UDS.KEYID = 0
1,199,773 UART: [idev] Sha1 KeyId Algorithm
1,208,661 UART: [idev] --
1,209,580 UART: [ldev] ++
1,209,748 UART: [ldev] CDI.KEYID = 6
1,210,112 UART: [ldev] SUBJECT.KEYID = 5
1,210,539 UART: [ldev] AUTHORITY.KEYID = 7
1,211,002 UART: [ldev] FE.KEYID = 1
1,215,964 UART: [ldev] Erasing FE.KEYID = 1
1,242,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,984 UART: [ldev] --
1,281,409 UART: [fwproc] Wait for Commands...
1,282,110 UART: [fwproc] Recv command 0x46505652
1,282,934 UART: [rt] FIPS Version
1,283,494 >>> mbox cmd response data (36 bytes)
1,283,495 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,736 UART: [fwproc] Recv command 0x46504c54
1,284,587 UART: [kat] SHA2-256
2,088,137 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,092,241 UART: [kat] ++
2,092,393 UART: [kat] sha1
2,096,599 UART: [kat] SHA2-256
2,098,539 UART: [kat] SHA2-384
2,101,396 UART: [kat] SHA2-512-ACC
2,103,296 UART: [kat] ECC-384
2,112,731 UART: [kat] HMAC-384Kdf
2,117,321 UART: [kat] LMS
2,365,633 UART: [kat] --
2,365,874 >>> mbox cmd response data (8 bytes)
2,365,875 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,366,118 UART: [fwproc] Recv command 0x46504c67
2,367,019 >>> mbox cmd response data (8 bytes)
2,367,020 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,367,125 UART: [fwproc] Recv command 0x43415053
2,368,118 >>> mbox cmd response data (24 bytes)
2,368,119 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,368,404 UART: [fwproc] Recv command 0x4d454153
2,372,427 >>> mbox cmd response data (12 bytes)
2,372,428 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,372,691 UART: [fwproc] Recv command 0x46505344
2,373,591 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,210 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,899 >>> mbox cmd response data (36 bytes)
1,139,900 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,111,489 >>> mbox cmd response data (8 bytes)
2,111,490 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,111,946 >>> mbox cmd response data (8 bytes)
2,111,947 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,112,484 >>> mbox cmd response data (24 bytes)
2,112,485 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,116,035 >>> mbox cmd response data (12 bytes)
2,116,036 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,116,297 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,859 UART: [kat] ++
896,011 UART: [kat] sha1
900,207 UART: [kat] SHA2-256
902,147 UART: [kat] SHA2-384
904,872 UART: [kat] SHA2-512-ACC
906,773 UART: [kat] ECC-384
916,302 UART: [kat] HMAC-384Kdf
921,152 UART: [kat] LMS
1,169,464 UART: [kat] --
1,170,225 UART: [cold-reset] ++
1,170,771 UART: [fht] FHT @ 0x50003400
1,173,463 UART: [idev] ++
1,173,631 UART: [idev] CDI.KEYID = 6
1,173,992 UART: [idev] SUBJECT.KEYID = 7
1,174,417 UART: [idev] UDS.KEYID = 0
1,174,763 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,630 UART: [idev] Erasing UDS.KEYID = 0
1,199,624 UART: [idev] Sha1 KeyId Algorithm
1,208,604 UART: [idev] --
1,209,629 UART: [ldev] ++
1,209,797 UART: [ldev] CDI.KEYID = 6
1,210,161 UART: [ldev] SUBJECT.KEYID = 5
1,210,588 UART: [ldev] AUTHORITY.KEYID = 7
1,211,051 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,241,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,181 UART: [ldev] --
1,281,484 UART: [fwproc] Wait for Commands...
1,282,299 UART: [fwproc] Recv command 0x46505652
1,283,123 UART: [rt] FIPS Version
1,283,683 >>> mbox cmd response data (36 bytes)
1,283,684 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,769 UART: [fwproc] Recv command 0x46504c54
1,284,620 UART: [kat] SHA2-256
2,088,170 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,092,274 UART: [kat] ++
2,092,426 UART: [kat] sha1
2,096,694 UART: [kat] SHA2-256
2,098,634 UART: [kat] SHA2-384
2,101,381 UART: [kat] SHA2-512-ACC
2,103,281 UART: [kat] ECC-384
2,112,788 UART: [kat] HMAC-384Kdf
2,117,334 UART: [kat] LMS
2,365,646 UART: [kat] --
2,365,887 >>> mbox cmd response data (8 bytes)
2,365,888 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,366,003 UART: [fwproc] Recv command 0x46504c67
2,366,904 >>> mbox cmd response data (8 bytes)
2,366,905 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,367,204 UART: [fwproc] Recv command 0x43415053
2,368,197 >>> mbox cmd response data (24 bytes)
2,368,198 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,368,327 UART: [fwproc] Recv command 0x4d454153
2,372,350 >>> mbox cmd response data (12 bytes)
2,372,351 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,372,422 UART: [fwproc] Recv command 0x46505344
2,373,322 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,317 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,066 >>> mbox cmd response data (36 bytes)
1,141,067 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,113,128 >>> mbox cmd response data (8 bytes)
2,113,129 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,113,433 >>> mbox cmd response data (8 bytes)
2,113,434 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,113,947 >>> mbox cmd response data (24 bytes)
2,113,948 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,117,414 >>> mbox cmd response data (12 bytes)
2,117,415 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,117,834 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
893,314 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,439 UART: [kat] ++
897,591 UART: [kat] sha1
901,797 UART: [kat] SHA2-256
903,737 UART: [kat] SHA2-384
906,340 UART: [kat] SHA2-512-ACC
908,241 UART: [kat] ECC-384
917,956 UART: [kat] HMAC-384Kdf
922,684 UART: [kat] LMS
1,171,012 UART: [kat] --
1,171,877 UART: [cold-reset] ++
1,172,379 UART: [fht] FHT @ 0x50003400
1,175,026 UART: [idev] ++
1,175,194 UART: [idev] CDI.KEYID = 6
1,175,554 UART: [idev] SUBJECT.KEYID = 7
1,175,978 UART: [idev] UDS.KEYID = 0
1,176,323 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,260 UART: [idev] Erasing UDS.KEYID = 0
1,201,213 UART: [idev] Sha1 KeyId Algorithm
1,209,479 UART: [idev] --
1,210,561 UART: [ldev] ++
1,210,729 UART: [ldev] CDI.KEYID = 6
1,211,092 UART: [ldev] SUBJECT.KEYID = 5
1,211,518 UART: [ldev] AUTHORITY.KEYID = 7
1,211,981 UART: [ldev] FE.KEYID = 1
1,217,341 UART: [ldev] Erasing FE.KEYID = 1
1,243,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,223 UART: [ldev] --
1,282,618 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46505652
1,284,125 UART: [rt] FIPS Version
1,284,679 >>> mbox cmd response data (36 bytes)
1,284,680 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,284,780 UART: [fwproc] Recv command 0x46504c54
1,285,626 UART: [kat] SHA2-256
2,091,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,095,401 UART: [kat] ++
2,095,553 UART: [kat] sha1
2,099,727 UART: [kat] SHA2-256
2,101,667 UART: [kat] SHA2-384
2,104,504 UART: [kat] SHA2-512-ACC
2,106,404 UART: [kat] ECC-384
2,115,535 UART: [kat] HMAC-384Kdf
2,120,207 UART: [kat] LMS
2,368,535 UART: [kat] --
2,368,773 >>> mbox cmd response data (8 bytes)
2,368,774 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,368,977 UART: [fwproc] Recv command 0x46504c67
2,369,870 >>> mbox cmd response data (8 bytes)
2,369,871 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,370,182 UART: [fwproc] Recv command 0x43415053
2,371,165 >>> mbox cmd response data (24 bytes)
2,371,166 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,371,227 UART: [fwproc] Recv command 0x4d454153
2,375,236 >>> mbox cmd response data (12 bytes)
2,375,237 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,375,402 UART: [fwproc] Recv command 0x46505344
2,376,289 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,087 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,041 >>> mbox cmd response data (36 bytes)
1,140,042 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,632 >>> mbox cmd response data (8 bytes)
2,112,633 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,985 >>> mbox cmd response data (8 bytes)
2,112,986 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,113,514 >>> mbox cmd response data (24 bytes)
2,113,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,117,069 >>> mbox cmd response data (12 bytes)
2,117,070 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,117,464 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
893,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,958 UART: [kat] ++
898,110 UART: [kat] sha1
902,338 UART: [kat] SHA2-256
904,278 UART: [kat] SHA2-384
907,063 UART: [kat] SHA2-512-ACC
908,964 UART: [kat] ECC-384
918,853 UART: [kat] HMAC-384Kdf
923,543 UART: [kat] LMS
1,171,871 UART: [kat] --
1,172,822 UART: [cold-reset] ++
1,173,368 UART: [fht] FHT @ 0x50003400
1,175,933 UART: [idev] ++
1,176,101 UART: [idev] CDI.KEYID = 6
1,176,461 UART: [idev] SUBJECT.KEYID = 7
1,176,885 UART: [idev] UDS.KEYID = 0
1,177,230 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,185,137 UART: [idev] Erasing UDS.KEYID = 0
1,202,206 UART: [idev] Sha1 KeyId Algorithm
1,210,672 UART: [idev] --
1,211,884 UART: [ldev] ++
1,212,052 UART: [ldev] CDI.KEYID = 6
1,212,415 UART: [ldev] SUBJECT.KEYID = 5
1,212,841 UART: [ldev] AUTHORITY.KEYID = 7
1,213,304 UART: [ldev] FE.KEYID = 1
1,218,368 UART: [ldev] Erasing FE.KEYID = 1
1,244,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,978 UART: [ldev] --
1,283,263 UART: [fwproc] Wait for Commands...
1,284,041 UART: [fwproc] Recv command 0x46505652
1,284,862 UART: [rt] FIPS Version
1,285,416 >>> mbox cmd response data (36 bytes)
1,285,417 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,285,505 UART: [fwproc] Recv command 0x46504c54
1,286,351 UART: [kat] SHA2-256
2,092,001 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,096,126 UART: [kat] ++
2,096,278 UART: [kat] sha1
2,100,370 UART: [kat] SHA2-256
2,102,310 UART: [kat] SHA2-384
2,104,879 UART: [kat] SHA2-512-ACC
2,106,779 UART: [kat] ECC-384
2,116,322 UART: [kat] HMAC-384Kdf
2,120,954 UART: [kat] LMS
2,369,282 UART: [kat] --
2,369,520 >>> mbox cmd response data (8 bytes)
2,369,521 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,369,670 UART: [fwproc] Recv command 0x46504c67
2,370,563 >>> mbox cmd response data (8 bytes)
2,370,564 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,370,723 UART: [fwproc] Recv command 0x43415053
2,371,706 >>> mbox cmd response data (24 bytes)
2,371,707 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,371,800 UART: [fwproc] Recv command 0x4d454153
2,375,809 >>> mbox cmd response data (12 bytes)
2,375,810 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,375,873 UART: [fwproc] Recv command 0x46505344
2,376,760 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,692 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,816 >>> mbox cmd response data (36 bytes)
1,140,817 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,989 >>> mbox cmd response data (8 bytes)
2,112,990 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,113,272 >>> mbox cmd response data (8 bytes)
2,113,273 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,113,841 >>> mbox cmd response data (24 bytes)
2,113,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,117,396 >>> mbox cmd response data (12 bytes)
2,117,397 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,117,703 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,259 UART:
192,625 UART: Running Caliptra ROM ...
193,710 UART:
193,854 UART: [state] CFI Enabled
265,942 UART: [state] LifecycleState = Unprovisioned
267,873 UART: [state] DebugLocked = No
269,823 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,124 UART: [kat] SHA2-256
443,795 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,318 UART: [kat] ++
454,766 UART: [kat] sha1
467,202 UART: [kat] SHA2-256
469,865 UART: [kat] SHA2-384
475,435 UART: [kat] SHA2-512-ACC
477,806 UART: [kat] ECC-384
2,768,239 UART: [kat] HMAC-384Kdf
2,779,631 UART: [kat] LMS
3,969,946 UART: [kat] --
3,974,966 UART: [cold-reset] ++
3,977,268 UART: [fht] Storing FHT @ 0x50003400
3,989,182 UART: [idev] ++
3,989,757 UART: [idev] CDI.KEYID = 6
3,990,794 UART: [idev] SUBJECT.KEYID = 7
3,991,974 UART: [idev] UDS.KEYID = 0
3,993,038 ready_for_fw is high
3,993,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,353 UART: [idev] Erasing UDS.KEYID = 0
7,327,503 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,630 UART: [idev] --
7,352,816 UART: [ldev] ++
7,353,446 UART: [ldev] CDI.KEYID = 6
7,354,365 UART: [ldev] SUBJECT.KEYID = 5
7,355,581 UART: [ldev] AUTHORITY.KEYID = 7
7,356,875 UART: [ldev] FE.KEYID = 1
7,402,589 UART: [ldev] Erasing FE.KEYID = 1
10,737,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,363 UART: [ldev] --
13,096,876 UART: [fwproc] Waiting for Commands...
13,098,815 UART: [fwproc] Received command 0x46574c44
13,101,027 UART: [fwproc] Received Image of size 118548 bytes
17,212,755 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,285,187 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,358,379 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,686,939 >>> mbox cmd response: success
17,690,015 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,691,983 UART: [afmc] ++
17,692,577 UART: [afmc] CDI.KEYID = 6
17,693,491 UART: [afmc] SUBJECT.KEYID = 7
17,694,763 UART: [afmc] AUTHORITY.KEYID = 5
21,051,971 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,354,479 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,356,747 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,371,223 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,385,930 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,400,348 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,421,692 UART: [afmc] --
23,426,263 UART: [cold-reset] --
23,430,451 UART: [state] Locking Datavault
23,434,949 UART: [state] Locking PCR0, PCR1 and PCR31
23,436,707 UART: [state] Locking ICCM
23,439,127 UART: [exit] Launching FMC @ 0x40000130
23,447,530 UART:
23,447,763 UART: Running Caliptra FMC ...
23,448,863 UART:
23,449,028 UART: [state] CFI Enabled
23,513,773 UART: [fht] FMC Alias Private Key: 7
25,875,200 UART: [art] Extend RT PCRs Done
25,876,621 UART: [art] Lock RT PCRs Done
25,878,010 UART: [art] Populate DV Done
25,883,433 UART: [fht] FMC Alias Private Key: 7
25,885,099 UART: [art] Derive CDI
25,885,943 UART: [art] Store in slot 0x4
25,948,496 UART: [art] Derive Key Pair
25,949,538 UART: [art] Store priv key in slot 0x5
29,242,519 UART: [art] Derive Key Pair - Done
29,255,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,924 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,426 UART: [art] PUB.X = 6BDC5E4B65C1A0A21458E06D377D066A5B9124B1EFBEF4E61CEA7DCB9804880775641F8EDBCDD116E4C6E53B871013B8
31,552,737 UART: [art] PUB.Y = A9B9D53CE9CD79292A8B8D2538E5A857EE1546AD4D8337D9C62D037805AACC4E7F608FA9A3A8055C771D199BF957E107
31,559,965 UART: [art] SIG.R = 50A88043BAC12DEFFCA5BD7F320FD548F1E37DCE56F56A482A432F2CB7ADC1D8E53727725174EA17EFA046D28C4C65CB
31,567,416 UART: [art] SIG.S = 008DBBF8DC29D9D681D3F368605A46AEFC91178282DD73E99A1C37BD8811E3C7F8637EE03F82B9FE27C65D34F78BC925
32,872,594 UART: Caliptra RT
32,873,304 UART: [state] CFI Enabled
33,050,129 UART: [rt] RT listening for mailbox commands...
33,081,228 UART: [rt]cmd =0x46505652, len=4
33,082,513 UART: [rt] FIPS Version
33,083,519 >>> mbox cmd response data (36 bytes)
33,084,349 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,114,142 UART: [rt]cmd =0x46504c54, len=4
33,115,783 >>> mbox cmd response data (8 bytes)
33,116,132 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,146,549 UART: [rt]cmd =0x46504c67, len=4
33,147,932 >>> mbox cmd response: failed
33,148,904 UART: [rt] FIPS self test
33,149,776 UART: [kat] ++
33,150,221 UART: [kat] sha1
33,154,504 UART: [kat] SHA2-256
33,156,301 UART: [kat] SHA2-384
33,159,249 UART: [kat] SHA2-512-ACC
33,161,463 UART: [kat] ECC-384
36,434,084 UART: [kat] HMAC-384Kdf
36,441,402 UART: [kat] LMS
36,857,076 UART: [kat] --
40,886,097 UART: [rt] Verify complete
40,989,713 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,019,665 UART: [rt]cmd =0x46504c67, len=4
41,021,201 >>> mbox cmd response data (8 bytes)
41,021,583 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,051,122 UART: [rt]cmd =0x49444543, len=4
41,057,996 >>> mbox cmd response data (37 bytes)
41,058,586 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,088,148 UART: [rt]cmd =0x49444549, len=4
41,090,786 >>> mbox cmd response data (104 bytes)
41,091,585 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,121,377 UART: [rt]cmd =0x49444550, len=4
41,131,985 >>> mbox cmd response data (8 bytes)
41,132,397 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,162,088 UART: [rt]cmd =0x4c444556, len=4
41,172,965 >>> mbox cmd response data (687 bytes)
41,176,522 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,206,435 UART: [rt]cmd =0x43455246, len=4
41,219,480 >>> mbox cmd response data (920 bytes)
41,224,082 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,253,830 UART: [rt]cmd =0x43455252, len=4
41,265,184 >>> mbox cmd response data (782 bytes)
41,269,893 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,301,419 UART: [rt]cmd =0x53494756, len=196
42,592,796 >>> mbox cmd response data (8 bytes)
42,593,269 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,623,704 UART: [rt]cmd =0x4d454153, len=108
42,642,318 >>> mbox cmd response data (12 bytes)
42,642,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,672,570 UART: [rt]cmd =0x494e464f, len=4
42,676,886 >>> mbox cmd response data (312 bytes)
42,679,372 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,709,579 UART: [rt]cmd =0x54514754, len=24
42,712,232 >>> mbox cmd response data (8 bytes)
42,712,653 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,742,440 UART: [rt]cmd =0x47544744, len=8
42,745,463 >>> mbox cmd response data (104 bytes)
42,746,341 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,776,397 UART: [rt]cmd =0x50435252, len=8
42,778,351 >>> mbox cmd response data (8 bytes)
42,778,709 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,808,444 UART: [rt]cmd =0x50435251, len=36
43,966,145 >>> mbox cmd response data (1848 bytes)
43,975,153 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,005,424 UART: [rt]cmd =0x50435245, len=56
44,008,246 >>> mbox cmd response data (8 bytes)
44,008,705 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,038,464 UART: [rt]cmd =0x44504543, len=20
44,059,259 >>> mbox cmd response data (44 bytes)
44,059,973 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,089,877 UART: [rt]cmd =0x44504543, len=24
44,137,088 >>> mbox cmd response data (40 bytes)
44,137,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,168,439 UART: [rt]cmd =0x44504543, len=96
44,208,576 >>> mbox cmd response data (56 bytes)
44,209,361 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,239,666 UART: [rt]cmd =0x44504543, len=92
52,298,985 >>> mbox cmd response data (6284 bytes)
52,328,124 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,359,115 UART: [rt]cmd =0x44504543, len=136
57,992,707 >>> mbox cmd response data (136 bytes)
57,993,964 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,024,006 UART: [rt]cmd =0x44504543, len=40
58,064,663 >>> mbox cmd response data (40 bytes)
58,065,373 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,095,226 UART: [rt]cmd =0x44504543, len=28
58,137,811 >>> mbox cmd response data (2076 bytes)
58,147,756 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,177,829 UART: [rt]cmd =0x44504543, len=36
58,207,838 >>> mbox cmd response data (24 bytes)
58,208,421 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,238,022 UART: [rt]cmd =0x4453424c, len=4
61,557,278 >>> mbox cmd response data (8 bytes)
61,557,779 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,587,392 UART: [rt]cmd =0x46505344, len=4
61,697,039 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,786,654 ready_for_fw is high
3,787,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,936,567 >>> mbox cmd response: success
17,939,966 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,632,549 UART:
23,632,977 UART: Running Caliptra FMC ...
23,634,120 UART:
23,634,286 UART: [state] CFI Enabled
23,699,545 UART: [fht] FMC Alias Private Key: 7
26,040,178 UART: [art] Extend RT PCRs Done
26,041,413 UART: [art] Lock RT PCRs Done
26,043,331 UART: [art] Populate DV Done
26,048,595 UART: [fht] FMC Alias Private Key: 7
26,050,211 UART: [art] Derive CDI
26,051,035 UART: [art] Store in slot 0x4
26,107,955 UART: [art] Derive Key Pair
26,108,960 UART: [art] Store priv key in slot 0x5
29,400,963 UART: [art] Derive Key Pair - Done
29,414,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,703,566 UART: [art] Erasing AUTHORITY.KEYID = 7
31,705,088 UART: [art] PUB.X = CEE277380F293532D7123F45486A10BB1DC20A2CDE33894C5E652D2799A0185D4E421A5ED8E8F7BED5F6B4926765A030
31,712,351 UART: [art] PUB.Y = 3F1B7D5AA0ED782BDB1ABB64C24132CBD71757494345A9C7A4E1E0A2217AFB39C65B960186C075A558B548916B7353E8
31,719,578 UART: [art] SIG.R = E595E095A5C2C637779C4639A985ECBA3DA5E6D389AA587A41160D4D38CFF89F9510D2C422D27FB8FC237A9CDCB463A6
31,727,002 UART: [art] SIG.S = 2136DDA3004CEF2D180796D3F9775ACC3C5D0AA3E753D3EED20D771505393AEDEDA83AF365B049AFF5AC054D0E344DC6
33,032,136 UART: Caliptra RT
33,032,859 UART: [state] CFI Enabled
33,209,791 UART: [rt] RT listening for mailbox commands...
33,240,881 UART: [rt]cmd =0x46505652, len=4
33,242,160 UART: [rt] FIPS Version
33,243,454 >>> mbox cmd response data (36 bytes)
33,244,173 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,273,720 UART: [rt]cmd =0x46504c54, len=4
33,275,253 >>> mbox cmd response data (8 bytes)
33,275,586 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,305,716 UART: [rt]cmd =0x46504c67, len=4
33,307,008 >>> mbox cmd response: failed
33,307,809 UART: [rt] FIPS self test
33,308,742 UART: [kat] ++
33,309,239 UART: [kat] sha1
33,313,632 UART: [kat] SHA2-256
33,315,429 UART: [kat] SHA2-384
33,318,295 UART: [kat] SHA2-512-ACC
33,320,497 UART: [kat] ECC-384
36,594,762 UART: [kat] HMAC-384Kdf
36,601,078 UART: [kat] LMS
37,016,736 UART: [kat] --
41,026,406 UART: [rt] Verify complete
41,149,103 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,178,900 UART: [rt]cmd =0x46504c67, len=4
41,180,358 >>> mbox cmd response data (8 bytes)
41,180,726 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,210,533 UART: [rt]cmd =0x49444543, len=4
41,217,628 >>> mbox cmd response data (37 bytes)
41,218,217 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,248,102 UART: [rt]cmd =0x49444549, len=4
41,250,901 >>> mbox cmd response data (104 bytes)
41,251,697 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,281,342 UART: [rt]cmd =0x49444550, len=4
41,291,884 >>> mbox cmd response data (8 bytes)
41,292,291 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,322,060 UART: [rt]cmd =0x4c444556, len=4
41,333,205 >>> mbox cmd response data (687 bytes)
41,336,735 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,366,644 UART: [rt]cmd =0x43455246, len=4
41,379,514 >>> mbox cmd response data (920 bytes)
41,384,069 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,413,836 UART: [rt]cmd =0x43455252, len=4
41,425,168 >>> mbox cmd response data (783 bytes)
41,429,868 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,461,313 UART: [rt]cmd =0x53494756, len=196
42,753,213 >>> mbox cmd response data (8 bytes)
42,753,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,784,205 UART: [rt]cmd =0x4d454153, len=108
42,803,062 >>> mbox cmd response data (12 bytes)
42,803,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,833,273 UART: [rt]cmd =0x494e464f, len=4
42,838,025 >>> mbox cmd response data (312 bytes)
42,840,637 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,870,615 UART: [rt]cmd =0x54514754, len=24
42,873,322 >>> mbox cmd response data (8 bytes)
42,873,746 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,903,559 UART: [rt]cmd =0x47544744, len=8
42,906,432 >>> mbox cmd response data (104 bytes)
42,907,287 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,937,079 UART: [rt]cmd =0x50435252, len=8
42,939,241 >>> mbox cmd response data (8 bytes)
42,939,660 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,969,784 UART: [rt]cmd =0x50435251, len=36
44,143,125 >>> mbox cmd response data (1848 bytes)
44,152,028 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,182,341 UART: [rt]cmd =0x50435245, len=56
44,185,315 >>> mbox cmd response data (8 bytes)
44,185,760 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,215,688 UART: [rt]cmd =0x44504543, len=20
44,235,868 >>> mbox cmd response data (44 bytes)
44,236,582 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,266,532 UART: [rt]cmd =0x44504543, len=24
44,312,498 >>> mbox cmd response data (40 bytes)
44,313,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,343,850 UART: [rt]cmd =0x44504543, len=96
44,382,750 >>> mbox cmd response data (56 bytes)
44,383,531 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,413,897 UART: [rt]cmd =0x44504543, len=92
52,493,056 >>> mbox cmd response data (6284 bytes)
52,522,366 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,553,215 UART: [rt]cmd =0x44504543, len=136
58,186,983 >>> mbox cmd response data (136 bytes)
58,188,229 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,218,421 UART: [rt]cmd =0x44504543, len=40
58,258,558 >>> mbox cmd response data (40 bytes)
58,259,241 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,288,945 UART: [rt]cmd =0x44504543, len=28
58,332,247 >>> mbox cmd response data (2076 bytes)
58,342,146 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,372,241 UART: [rt]cmd =0x44504543, len=36
58,402,136 >>> mbox cmd response data (24 bytes)
58,402,709 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,432,472 UART: [rt]cmd =0x4453424c, len=4
61,751,014 >>> mbox cmd response data (8 bytes)
61,751,541 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,781,106 UART: [rt]cmd =0x46505344, len=4
61,891,079 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,631 UART:
193,030 UART: Running Caliptra ROM ...
194,357 UART:
603,881 UART: [state] CFI Enabled
617,042 UART: [state] LifecycleState = Unprovisioned
618,998 UART: [state] DebugLocked = No
621,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,121 UART: [kat] SHA2-256
796,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,412 UART: [kat] ++
807,884 UART: [kat] sha1
817,415 UART: [kat] SHA2-256
820,144 UART: [kat] SHA2-384
826,067 UART: [kat] SHA2-512-ACC
828,478 UART: [kat] ECC-384
3,112,318 UART: [kat] HMAC-384Kdf
3,124,836 UART: [kat] LMS
4,314,950 UART: [kat] --
4,319,798 UART: [cold-reset] ++
4,321,733 UART: [fht] Storing FHT @ 0x50003400
4,332,648 UART: [idev] ++
4,333,217 UART: [idev] CDI.KEYID = 6
4,334,207 UART: [idev] SUBJECT.KEYID = 7
4,335,387 UART: [idev] UDS.KEYID = 0
4,336,450 ready_for_fw is high
4,336,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,948 UART: [idev] Erasing UDS.KEYID = 0
7,627,613 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,961 UART: [idev] --
7,652,180 UART: [ldev] ++
7,652,763 UART: [ldev] CDI.KEYID = 6
7,653,736 UART: [ldev] SUBJECT.KEYID = 5
7,654,963 UART: [ldev] AUTHORITY.KEYID = 7
7,656,208 UART: [ldev] FE.KEYID = 1
7,667,510 UART: [ldev] Erasing FE.KEYID = 1
10,956,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,561 UART: [ldev] --
13,315,085 UART: [fwproc] Waiting for Commands...
13,317,816 UART: [fwproc] Received command 0x46574c44
13,320,010 UART: [fwproc] Received Image of size 118548 bytes
17,422,414 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,474 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,628 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,766 >>> mbox cmd response: success
17,898,812 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,899,923 UART: [afmc] ++
17,900,435 UART: [afmc] CDI.KEYID = 6
17,901,525 UART: [afmc] SUBJECT.KEYID = 7
17,902,609 UART: [afmc] AUTHORITY.KEYID = 5
21,217,842 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,563 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,512,822 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,266 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,541,984 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,458 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,838 UART: [afmc] --
23,580,876 UART: [cold-reset] --
23,584,856 UART: [state] Locking Datavault
23,591,785 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,489 UART: [state] Locking ICCM
23,595,263 UART: [exit] Launching FMC @ 0x40000130
23,603,609 UART:
23,603,859 UART: Running Caliptra FMC ...
23,604,969 UART:
23,605,132 UART: [state] CFI Enabled
23,613,239 UART: [fht] FMC Alias Private Key: 7
25,952,675 UART: [art] Extend RT PCRs Done
25,953,916 UART: [art] Lock RT PCRs Done
25,955,246 UART: [art] Populate DV Done
25,960,605 UART: [fht] FMC Alias Private Key: 7
25,962,221 UART: [art] Derive CDI
25,963,047 UART: [art] Store in slot 0x4
26,005,649 UART: [art] Derive Key Pair
26,006,664 UART: [art] Store priv key in slot 0x5
29,248,773 UART: [art] Derive Key Pair - Done
29,261,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,541,761 UART: [art] Erasing AUTHORITY.KEYID = 7
31,543,280 UART: [art] PUB.X = 1ED440ECA672897D4929B3D58FD5303A3F792B9931A805FEF3957BD4DC93CF231A05CC3A04C9C9847C3B17D8BF89F102
31,550,559 UART: [art] PUB.Y = B796AC3E1909E2A8D76A5387BF9A70651988602FDB02C6A464A066330377E069C564145021988BEEE49F267CEC711486
31,557,762 UART: [art] SIG.R = E61C1E64477407A3EA626BC68A736F7867645622D4C717DD7A4F013B16397BC537E19E0BE4E518E6D7BE7E7360A6B799
31,565,112 UART: [art] SIG.S = B4CE2FCE89F12D9ED44492E1C8C00E123C6428526304D2DD4E983C82576E1A0574989E5A3766A9682CF803AA4032356E
32,870,188 UART: Caliptra RT
32,870,899 UART: [state] CFI Enabled
33,002,986 UART: [rt] RT listening for mailbox commands...
33,034,570 UART: [rt]cmd =0x46505652, len=4
33,035,824 UART: [rt] FIPS Version
33,037,109 >>> mbox cmd response data (36 bytes)
33,037,829 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,067,612 UART: [rt]cmd =0x46504c54, len=4
33,068,909 >>> mbox cmd response data (8 bytes)
33,069,261 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,099,457 UART: [rt]cmd =0x46504c67, len=4
33,100,752 >>> mbox cmd response: failed
33,101,787 UART: [rt] FIPS self test
33,102,725 UART: [kat] ++
33,103,184 UART: [kat] sha1
33,107,613 UART: [kat] SHA2-256
33,109,451 UART: [kat] SHA2-384
33,112,413 UART: [kat] SHA2-512-ACC
33,114,631 UART: [kat] ECC-384
36,356,812 UART: [kat] HMAC-384Kdf
36,362,603 UART: [kat] LMS
36,778,249 UART: [kat] --
40,807,269 UART: [rt] Verify complete
40,944,733 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,974,857 UART: [rt]cmd =0x46504c67, len=4
40,976,614 >>> mbox cmd response data (8 bytes)
40,976,973 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,006,904 UART: [rt]cmd =0x49444543, len=4
41,013,874 >>> mbox cmd response data (37 bytes)
41,014,478 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,044,034 UART: [rt]cmd =0x49444549, len=4
41,046,973 >>> mbox cmd response data (104 bytes)
41,047,849 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,077,852 UART: [rt]cmd =0x49444550, len=4
41,088,488 >>> mbox cmd response data (8 bytes)
41,088,909 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,118,568 UART: [rt]cmd =0x4c444556, len=4
41,129,514 >>> mbox cmd response data (687 bytes)
41,133,029 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,162,734 UART: [rt]cmd =0x43455246, len=4
41,175,641 >>> mbox cmd response data (920 bytes)
41,180,201 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,210,161 UART: [rt]cmd =0x43455252, len=4
41,221,412 >>> mbox cmd response data (784 bytes)
41,226,111 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,257,524 UART: [rt]cmd =0x53494756, len=196
42,549,424 >>> mbox cmd response data (8 bytes)
42,549,925 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,580,583 UART: [rt]cmd =0x4d454153, len=108
42,599,208 >>> mbox cmd response data (12 bytes)
42,599,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,629,326 UART: [rt]cmd =0x494e464f, len=4
42,633,612 >>> mbox cmd response data (312 bytes)
42,636,116 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,666,089 UART: [rt]cmd =0x54514754, len=24
42,668,882 >>> mbox cmd response data (8 bytes)
42,669,345 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,699,013 UART: [rt]cmd =0x47544744, len=8
42,701,795 >>> mbox cmd response data (104 bytes)
42,702,657 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,732,155 UART: [rt]cmd =0x50435252, len=8
42,734,053 >>> mbox cmd response data (8 bytes)
42,734,416 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,764,330 UART: [rt]cmd =0x50435251, len=36
43,920,036 >>> mbox cmd response data (1848 bytes)
43,928,956 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
43,959,232 UART: [rt]cmd =0x50435245, len=56
43,962,444 >>> mbox cmd response data (8 bytes)
43,962,909 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
43,992,663 UART: [rt]cmd =0x44504543, len=20
44,013,082 >>> mbox cmd response data (44 bytes)
44,013,790 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,043,718 UART: [rt]cmd =0x44504543, len=24
44,071,244 >>> mbox cmd response data (40 bytes)
44,071,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,102,183 UART: [rt]cmd =0x44504543, len=96
44,141,182 >>> mbox cmd response data (56 bytes)
44,141,957 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,172,435 UART: [rt]cmd =0x44504543, len=92
52,154,980 >>> mbox cmd response data (6284 bytes)
52,184,094 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,215,156 UART: [rt]cmd =0x44504543, len=136
57,777,961 >>> mbox cmd response data (136 bytes)
57,779,269 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,809,279 UART: [rt]cmd =0x44504543, len=40
57,836,726 >>> mbox cmd response data (40 bytes)
57,837,409 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,867,658 UART: [rt]cmd =0x44504543, len=28
57,910,577 >>> mbox cmd response data (2076 bytes)
57,920,486 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
57,950,573 UART: [rt]cmd =0x44504543, len=36
57,980,364 >>> mbox cmd response data (24 bytes)
57,980,955 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,010,504 UART: [rt]cmd =0x4453424c, len=4
61,256,503 >>> mbox cmd response data (8 bytes)
61,256,995 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,286,663 UART: [rt]cmd =0x46505344, len=4
61,396,496 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,482 writing to cptra_bootfsm_go
4,126,231 ready_for_fw is high
4,126,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,151,314 >>> mbox cmd response: success
18,154,715 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,793,293 UART:
23,793,718 UART: Running Caliptra FMC ...
23,794,859 UART:
23,795,022 UART: [state] CFI Enabled
23,802,485 UART: [fht] FMC Alias Private Key: 7
26,142,514 UART: [art] Extend RT PCRs Done
26,143,752 UART: [art] Lock RT PCRs Done
26,145,411 UART: [art] Populate DV Done
26,150,786 UART: [fht] FMC Alias Private Key: 7
26,152,496 UART: [art] Derive CDI
26,153,243 UART: [art] Store in slot 0x4
26,195,366 UART: [art] Derive Key Pair
26,196,413 UART: [art] Store priv key in slot 0x5
29,438,174 UART: [art] Derive Key Pair - Done
29,450,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,974 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,485 UART: [art] PUB.X = D6F98DE2E1851C1AB05174E903910F29BFBB71B55A920CF852AE10CA0082930EF2B37C3E56DDC8B0CD57FD7AC6BFC365
31,739,745 UART: [art] PUB.Y = 9EAD4D453C65603FAE644A7FFC50286229425E035FC13EBF0295F40311E9A5807FE11D9FCF740AB44311307EFAB91EA9
31,747,013 UART: [art] SIG.R = 2A641597385636A6DCDC68E7F1535B7E83D0EDD1DB4D209D2FC55FB20299BB659C6DD3CCDBBD1A7766811FEDF4DA09D0
31,754,417 UART: [art] SIG.S = 71F6904FDC1AA144DAE5762FC6CE0154090DC9A06511F7202C825486E4BF52CD8BFB37D8810CDA86B3A3A3601C117C47
33,059,021 UART: Caliptra RT
33,059,770 UART: [state] CFI Enabled
33,192,568 UART: [rt] RT listening for mailbox commands...
33,223,518 UART: [rt]cmd =0x46505652, len=4
33,224,796 UART: [rt] FIPS Version
33,225,857 >>> mbox cmd response data (36 bytes)
33,226,575 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,256,402 UART: [rt]cmd =0x46504c54, len=4
33,257,936 >>> mbox cmd response data (8 bytes)
33,258,271 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,288,457 UART: [rt]cmd =0x46504c67, len=4
33,289,749 >>> mbox cmd response: failed
33,291,057 UART: [rt] FIPS self test
33,292,000 UART: [kat] ++
33,292,516 UART: [kat] sha1
33,296,785 UART: [kat] SHA2-256
33,298,605 UART: [kat] SHA2-384
33,301,361 UART: [kat] SHA2-512-ACC
33,303,554 UART: [kat] ECC-384
36,545,932 UART: [kat] HMAC-384Kdf
36,551,915 UART: [kat] LMS
36,967,552 UART: [kat] --
40,977,850 UART: [rt] Verify complete
41,136,293 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,166,081 UART: [rt]cmd =0x46504c67, len=4
41,167,466 >>> mbox cmd response data (8 bytes)
41,167,958 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,197,663 UART: [rt]cmd =0x49444543, len=4
41,204,646 >>> mbox cmd response data (37 bytes)
41,205,258 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,234,890 UART: [rt]cmd =0x49444549, len=4
41,237,480 >>> mbox cmd response data (104 bytes)
41,238,367 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,268,454 UART: [rt]cmd =0x49444550, len=4
41,278,948 >>> mbox cmd response data (8 bytes)
41,279,368 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,309,253 UART: [rt]cmd =0x4c444556, len=4
41,320,321 >>> mbox cmd response data (687 bytes)
41,323,850 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,353,485 UART: [rt]cmd =0x43455246, len=4
41,366,462 >>> mbox cmd response data (920 bytes)
41,371,021 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,400,674 UART: [rt]cmd =0x43455252, len=4
41,412,013 >>> mbox cmd response data (782 bytes)
41,416,754 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,448,374 UART: [rt]cmd =0x53494756, len=196
42,739,989 >>> mbox cmd response data (8 bytes)
42,740,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,771,043 UART: [rt]cmd =0x4d454153, len=108
42,790,665 >>> mbox cmd response data (12 bytes)
42,791,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,820,830 UART: [rt]cmd =0x494e464f, len=4
42,825,262 >>> mbox cmd response data (312 bytes)
42,827,703 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,857,851 UART: [rt]cmd =0x54514754, len=24
42,860,725 >>> mbox cmd response data (8 bytes)
42,861,150 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,890,864 UART: [rt]cmd =0x47544744, len=8
42,894,042 >>> mbox cmd response data (104 bytes)
42,894,962 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,924,895 UART: [rt]cmd =0x50435252, len=8
42,926,803 >>> mbox cmd response data (8 bytes)
42,927,158 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,957,229 UART: [rt]cmd =0x50435251, len=36
44,112,668 >>> mbox cmd response data (1848 bytes)
44,121,623 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,152,107 UART: [rt]cmd =0x50435245, len=56
44,155,621 >>> mbox cmd response data (8 bytes)
44,156,073 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,185,666 UART: [rt]cmd =0x44504543, len=20
44,206,060 >>> mbox cmd response data (44 bytes)
44,206,791 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,236,695 UART: [rt]cmd =0x44504543, len=24
44,264,424 >>> mbox cmd response data (40 bytes)
44,265,181 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,295,717 UART: [rt]cmd =0x44504543, len=96
44,334,024 >>> mbox cmd response data (56 bytes)
44,334,806 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,365,011 UART: [rt]cmd =0x44504543, len=92
52,348,309 >>> mbox cmd response data (6284 bytes)
52,377,483 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,408,601 UART: [rt]cmd =0x44504543, len=136
57,970,955 >>> mbox cmd response data (136 bytes)
57,972,231 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,002,420 UART: [rt]cmd =0x44504543, len=40
58,030,017 >>> mbox cmd response data (40 bytes)
58,030,730 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,060,755 UART: [rt]cmd =0x44504543, len=28
58,103,496 >>> mbox cmd response data (2076 bytes)
58,113,426 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,143,497 UART: [rt]cmd =0x44504543, len=36
58,173,522 >>> mbox cmd response data (24 bytes)
58,174,259 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,204,109 UART: [rt]cmd =0x4453424c, len=4
61,450,430 >>> mbox cmd response data (8 bytes)
61,450,937 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,480,572 UART: [rt]cmd =0x46505344, len=4
61,590,270 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
192,187 UART:
192,545 UART: Running Caliptra ROM ...
193,734 UART:
193,885 UART: [state] CFI Enabled
267,475 UART: [state] LifecycleState = Unprovisioned
269,400 UART: [state] DebugLocked = No
272,365 UART: [state] WD Timer not started. Device not locked for debugging
276,063 UART: [kat] SHA2-256
455,690 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,453 UART: [kat] ++
466,934 UART: [kat] sha1
479,519 UART: [kat] SHA2-256
482,254 UART: [kat] SHA2-384
488,536 UART: [kat] SHA2-512-ACC
490,913 UART: [kat] ECC-384
2,946,952 UART: [kat] HMAC-384Kdf
2,970,630 UART: [kat] LMS
3,447,179 UART: [kat] --
3,451,270 UART: [cold-reset] ++
3,452,720 UART: [fht] FHT @ 0x50003400
3,463,139 UART: [idev] ++
3,463,786 UART: [idev] CDI.KEYID = 6
3,464,700 UART: [idev] SUBJECT.KEYID = 7
3,465,957 UART: [idev] UDS.KEYID = 0
3,466,890 ready_for_fw is high
3,467,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,292 UART: [idev] Erasing UDS.KEYID = 0
5,983,927 UART: [idev] Sha1 KeyId Algorithm
6,006,793 UART: [idev] --
6,011,871 UART: [ldev] ++
6,012,445 UART: [ldev] CDI.KEYID = 6
6,013,360 UART: [ldev] SUBJECT.KEYID = 5
6,014,582 UART: [ldev] AUTHORITY.KEYID = 7
6,015,823 UART: [ldev] FE.KEYID = 1
6,056,152 UART: [ldev] Erasing FE.KEYID = 1
8,565,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,991 UART: [ldev] --
10,371,701 UART: [fwproc] Wait for Commands...
10,373,955 UART: [fwproc] Recv command 0x46574c44
10,376,009 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,046 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,072 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,685 >>> mbox cmd response: success
14,347,612 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,349,362 UART: [afmc] ++
14,349,979 UART: [afmc] CDI.KEYID = 6
14,350,896 UART: [afmc] SUBJECT.KEYID = 7
14,352,119 UART: [afmc] AUTHORITY.KEYID = 5
16,894,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,062 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,855 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,902 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,458 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,710,956 UART: [afmc] --
18,715,272 UART: [cold-reset] --
18,719,683 UART: [state] Locking Datavault
18,727,260 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,029 UART: [state] Locking ICCM
18,730,753 UART: [exit] Launching FMC @ 0x40000130
18,739,152 UART:
18,739,412 UART: Running Caliptra FMC ...
18,740,525 UART:
18,740,687 UART: [state] CFI Enabled
18,794,550 UART: [fht] FMC Alias Private Key: 7
20,561,922 UART: [art] Extend RT PCRs Done
20,563,148 UART: [art] Lock RT PCRs Done
20,564,884 UART: [art] Populate DV Done
20,570,194 UART: [fht] FMC Alias Private Key: 7
20,571,850 UART: [art] Derive CDI
20,572,678 UART: [art] Store in slot 0x4
20,627,441 UART: [art] Derive Key Pair
20,628,489 UART: [art] Store priv key in slot 0x5
23,091,437 UART: [art] Derive Key Pair - Done
23,104,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,147 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,653 UART: [art] PUB.X = A11A0C71FE80E11ACB6054A859915412E0C29CCBE7AC48FBCE1BA42495246F711EC0A6F65B2C55677E35B658732D9C96
24,825,987 UART: [art] PUB.Y = 9C26AF16F9B7E5F21F48F0F7CDD8BAFC74985DF986AA1A863F4A2DA93B2A9FE5E98389F572D827264424F6648F35D9FA
24,833,230 UART: [art] SIG.R = 2DB4E0FD81C5A58D752607687E63828E7D446EFF432D7D7B01E845254F41B7378B238F1587A48F71C6BBD4CC2F0B31DD
24,840,574 UART: [art] SIG.S = 9383C12CCEEF72878DAD722934D8454121F4E0E97458339E08724DBB1605DB17DC7A68C4E41E23A41C48DF36D89F1935
25,818,935 UART: Caliptra RT
25,819,652 UART: [state] CFI Enabled
25,999,120 UART: [rt] RT listening for mailbox commands...
26,030,702 UART: [rt]cmd =0x46505652, len=4
26,031,964 UART: [rt] FIPS Version
26,033,399 >>> mbox cmd response data (36 bytes)
26,034,065 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,064,097 UART: [rt]cmd =0x46504c54, len=4
26,065,502 >>> mbox cmd response data (8 bytes)
26,065,840 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,096,303 UART: [rt]cmd =0x46504c67, len=4
26,097,711 >>> mbox cmd response: failed
26,098,811 UART: [rt] FIPS self test
26,099,770 UART: [kat] ++
26,100,227 UART: [kat] sha1
26,104,589 UART: [kat] SHA2-256
26,106,422 UART: [kat] SHA2-384
26,109,129 UART: [kat] SHA2-512-ACC
26,111,335 UART: [kat] ECC-384
28,555,765 UART: [kat] HMAC-384Kdf
28,582,314 UART: [kat] LMS
28,791,437 UART: [kat] --
32,170,307 UART: [rt] Verify complete
32,236,947 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,266,681 UART: [rt]cmd =0x46504c67, len=4
32,268,108 >>> mbox cmd response data (8 bytes)
32,268,446 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,298,182 UART: [rt]cmd =0x49444543, len=4
32,305,152 >>> mbox cmd response data (37 bytes)
32,305,773 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,335,271 UART: [rt]cmd =0x49444549, len=4
32,338,255 >>> mbox cmd response data (104 bytes)
32,339,131 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,368,952 UART: [rt]cmd =0x49444550, len=4
32,379,675 >>> mbox cmd response data (8 bytes)
32,380,122 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,409,940 UART: [rt]cmd =0x4c444556, len=4
32,420,974 >>> mbox cmd response data (687 bytes)
32,424,494 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,454,145 UART: [rt]cmd =0x43455246, len=4
32,466,946 >>> mbox cmd response data (888 bytes)
32,471,367 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,501,064 UART: [rt]cmd =0x43455252, len=4
32,512,425 >>> mbox cmd response data (783 bytes)
32,517,118 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,548,489 UART: [rt]cmd =0x53494756, len=196
33,513,622 >>> mbox cmd response data (8 bytes)
33,514,092 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,544,588 UART: [rt]cmd =0x4d454153, len=108
33,564,114 >>> mbox cmd response data (12 bytes)
33,564,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,594,148 UART: [rt]cmd =0x494e464f, len=4
33,598,357 >>> mbox cmd response data (312 bytes)
33,600,836 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,631,018 UART: [rt]cmd =0x54514754, len=24
33,633,570 >>> mbox cmd response data (8 bytes)
33,633,993 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,663,834 UART: [rt]cmd =0x47544744, len=8
33,666,659 >>> mbox cmd response data (104 bytes)
33,667,536 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,697,389 UART: [rt]cmd =0x50435252, len=8
33,699,474 >>> mbox cmd response data (8 bytes)
33,699,889 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,729,744 UART: [rt]cmd =0x50435251, len=36
34,643,066 >>> mbox cmd response data (1848 bytes)
34,651,975 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,682,403 UART: [rt]cmd =0x50435245, len=56
34,685,644 >>> mbox cmd response data (8 bytes)
34,686,088 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,715,960 UART: [rt]cmd =0x44504543, len=20
34,736,789 >>> mbox cmd response data (44 bytes)
34,737,498 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,767,401 UART: [rt]cmd =0x44504543, len=24
34,804,235 >>> mbox cmd response data (40 bytes)
34,804,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,835,494 UART: [rt]cmd =0x44504543, len=96
34,874,938 >>> mbox cmd response data (56 bytes)
34,875,733 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,906,264 UART: [rt]cmd =0x44504543, len=92
41,005,121 >>> mbox cmd response data (6284 bytes)
41,034,375 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,065,369 UART: [rt]cmd =0x44504543, len=136
45,292,643 >>> mbox cmd response data (136 bytes)
45,293,863 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,324,160 UART: [rt]cmd =0x44504543, len=40
45,362,305 >>> mbox cmd response data (40 bytes)
45,363,009 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,392,820 UART: [rt]cmd =0x44504543, len=28
45,435,840 >>> mbox cmd response data (2076 bytes)
45,445,764 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,475,841 UART: [rt]cmd =0x44504543, len=36
45,505,501 >>> mbox cmd response data (24 bytes)
45,506,108 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,535,737 UART: [rt]cmd =0x4453424c, len=4
48,025,455 >>> mbox cmd response data (8 bytes)
48,025,947 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,055,512 UART: [rt]cmd =0x46505344, len=4
48,165,446 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
3,463,295 ready_for_fw is high
3,463,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,234,717 >>> mbox cmd response: success
14,237,729 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,513,988 UART:
18,514,369 UART: Running Caliptra FMC ...
18,515,533 UART:
18,515,693 UART: [state] CFI Enabled
18,580,618 UART: [fht] FMC Alias Private Key: 7
20,346,601 UART: [art] Extend RT PCRs Done
20,347,835 UART: [art] Lock RT PCRs Done
20,349,765 UART: [art] Populate DV Done
20,355,180 UART: [fht] FMC Alias Private Key: 7
20,356,783 UART: [art] Derive CDI
20,357,525 UART: [art] Store in slot 0x4
20,412,931 UART: [art] Derive Key Pair
20,413,981 UART: [art] Store priv key in slot 0x5
22,876,661 UART: [art] Derive Key Pair - Done
22,889,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,520 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,029 UART: [art] PUB.X = 2BD13DF50715E3BB9AC766FCA1A261B18E0A84F209DCDCFA776B7861650B097FDED694444C65AD78BD6AC71860EE20F6
24,611,336 UART: [art] PUB.Y = 733DAE8F0FFF1E60C6AB2BB4D1785E3A2F944C18D10A49BFC191D271BF9DCBBFC5781B61FFAB62A94B9C5D1D5EAF0470
24,618,648 UART: [art] SIG.R = 99AE7B81308401EFEA01EE611B2F07F7CE7A10401AE347DECB2217AE1A5BF00E1C339876409079EC1CC7604EB038B0B0
24,626,026 UART: [art] SIG.S = 09D50843CC3FF62B0CB0FC4709391C09E1C2E23732E169F8C5B8F603B01D1F11FCE5857D69AC927C038D10D93F8F2E90
25,604,687 UART: Caliptra RT
25,605,388 UART: [state] CFI Enabled
25,787,272 UART: [rt] RT listening for mailbox commands...
25,818,929 UART: [rt]cmd =0x46505652, len=4
25,820,185 UART: [rt] FIPS Version
25,821,241 >>> mbox cmd response data (36 bytes)
25,821,879 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,851,649 UART: [rt]cmd =0x46504c54, len=4
25,853,233 >>> mbox cmd response data (8 bytes)
25,853,604 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,883,907 UART: [rt]cmd =0x46504c67, len=4
25,885,197 >>> mbox cmd response: failed
25,886,200 UART: [rt] FIPS self test
25,887,183 UART: [kat] ++
25,887,703 UART: [kat] sha1
25,891,931 UART: [kat] SHA2-256
25,893,735 UART: [kat] SHA2-384
25,896,563 UART: [kat] SHA2-512-ACC
25,898,781 UART: [kat] ECC-384
28,342,161 UART: [kat] HMAC-384Kdf
28,362,737 UART: [kat] LMS
28,571,904 UART: [kat] --
31,929,907 UART: [rt] Verify complete
32,024,349 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,054,261 UART: [rt]cmd =0x46504c67, len=4
32,055,765 >>> mbox cmd response data (8 bytes)
32,056,131 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,085,890 UART: [rt]cmd =0x49444543, len=4
32,092,832 >>> mbox cmd response data (37 bytes)
32,093,463 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,123,179 UART: [rt]cmd =0x49444549, len=4
32,125,900 >>> mbox cmd response data (104 bytes)
32,126,701 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,156,487 UART: [rt]cmd =0x49444550, len=4
32,167,195 >>> mbox cmd response data (8 bytes)
32,167,594 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,197,368 UART: [rt]cmd =0x4c444556, len=4
32,208,436 >>> mbox cmd response data (687 bytes)
32,211,967 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,242,086 UART: [rt]cmd =0x43455246, len=4
32,254,534 >>> mbox cmd response data (888 bytes)
32,258,995 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,288,795 UART: [rt]cmd =0x43455252, len=4
32,300,210 >>> mbox cmd response data (783 bytes)
32,304,910 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,336,477 UART: [rt]cmd =0x53494756, len=196
33,301,536 >>> mbox cmd response data (8 bytes)
33,302,013 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,332,509 UART: [rt]cmd =0x4d454153, len=108
33,351,072 >>> mbox cmd response data (12 bytes)
33,351,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,381,316 UART: [rt]cmd =0x494e464f, len=4
33,385,897 >>> mbox cmd response data (312 bytes)
33,388,341 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,418,135 UART: [rt]cmd =0x54514754, len=24
33,420,787 >>> mbox cmd response data (8 bytes)
33,421,200 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,450,880 UART: [rt]cmd =0x47544744, len=8
33,454,048 >>> mbox cmd response data (104 bytes)
33,454,956 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,484,674 UART: [rt]cmd =0x50435252, len=8
33,486,480 >>> mbox cmd response data (8 bytes)
33,486,815 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,516,883 UART: [rt]cmd =0x50435251, len=36
34,445,020 >>> mbox cmd response data (1848 bytes)
34,453,950 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,484,270 UART: [rt]cmd =0x50435245, len=56
34,487,570 >>> mbox cmd response data (8 bytes)
34,488,023 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,517,567 UART: [rt]cmd =0x44504543, len=20
34,537,960 >>> mbox cmd response data (44 bytes)
34,538,670 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,568,788 UART: [rt]cmd =0x44504543, len=24
34,605,868 >>> mbox cmd response data (40 bytes)
34,606,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,636,948 UART: [rt]cmd =0x44504543, len=96
34,676,112 >>> mbox cmd response data (56 bytes)
34,676,889 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,707,479 UART: [rt]cmd =0x44504543, len=92
40,805,385 >>> mbox cmd response data (6284 bytes)
40,834,661 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,865,815 UART: [rt]cmd =0x44504543, len=136
45,093,247 >>> mbox cmd response data (136 bytes)
45,094,488 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,124,409 UART: [rt]cmd =0x44504543, len=40
45,162,080 >>> mbox cmd response data (40 bytes)
45,162,791 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,192,541 UART: [rt]cmd =0x44504543, len=28
45,235,276 >>> mbox cmd response data (2076 bytes)
45,245,226 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,275,354 UART: [rt]cmd =0x44504543, len=36
45,304,960 >>> mbox cmd response data (24 bytes)
45,305,563 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,335,281 UART: [rt]cmd =0x4453424c, len=4
47,824,692 >>> mbox cmd response data (8 bytes)
47,825,181 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,855,011 UART: [rt]cmd =0x46505344, len=4
47,965,011 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
192,543 UART:
192,908 UART: Running Caliptra ROM ...
194,112 UART:
603,867 UART: [state] CFI Enabled
621,741 UART: [state] LifecycleState = Unprovisioned
623,653 UART: [state] DebugLocked = No
625,676 UART: [state] WD Timer not started. Device not locked for debugging
630,213 UART: [kat] SHA2-256
809,842 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,641 UART: [kat] ++
821,093 UART: [kat] sha1
831,762 UART: [kat] SHA2-256
834,424 UART: [kat] SHA2-384
841,413 UART: [kat] SHA2-512-ACC
843,788 UART: [kat] ECC-384
3,287,904 UART: [kat] HMAC-384Kdf
3,301,161 UART: [kat] LMS
3,777,647 UART: [kat] --
3,781,155 UART: [cold-reset] ++
3,782,028 UART: [fht] FHT @ 0x50003400
3,793,013 UART: [idev] ++
3,793,597 UART: [idev] CDI.KEYID = 6
3,794,486 UART: [idev] SUBJECT.KEYID = 7
3,795,809 UART: [idev] UDS.KEYID = 0
3,796,761 ready_for_fw is high
3,796,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,864 UART: [idev] Erasing UDS.KEYID = 0
6,273,058 UART: [idev] Sha1 KeyId Algorithm
6,296,428 UART: [idev] --
6,300,403 UART: [ldev] ++
6,300,989 UART: [ldev] CDI.KEYID = 6
6,301,888 UART: [ldev] SUBJECT.KEYID = 5
6,303,108 UART: [ldev] AUTHORITY.KEYID = 7
6,304,295 UART: [ldev] FE.KEYID = 1
6,316,317 UART: [ldev] Erasing FE.KEYID = 1
8,795,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,850 UART: [ldev] --
10,589,643 UART: [fwproc] Wait for Commands...
10,591,798 UART: [fwproc] Recv command 0x46574c44
10,593,789 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,561 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,629 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,721 >>> mbox cmd response: success
14,553,718 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,554,288 UART: [afmc] ++
14,554,799 UART: [afmc] CDI.KEYID = 6
14,555,849 UART: [afmc] SUBJECT.KEYID = 7
14,557,073 UART: [afmc] AUTHORITY.KEYID = 5
17,063,254 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,810 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,620 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,668 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,232 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,859,690 UART: [afmc] --
18,863,112 UART: [cold-reset] --
18,866,499 UART: [state] Locking Datavault
18,871,973 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,724 UART: [state] Locking ICCM
18,874,770 UART: [exit] Launching FMC @ 0x40000130
18,883,163 UART:
18,883,400 UART: Running Caliptra FMC ...
18,884,427 UART:
18,884,576 UART: [state] CFI Enabled
18,892,787 UART: [fht] FMC Alias Private Key: 7
20,658,852 UART: [art] Extend RT PCRs Done
20,660,096 UART: [art] Lock RT PCRs Done
20,661,612 UART: [art] Populate DV Done
20,667,254 UART: [fht] FMC Alias Private Key: 7
20,668,850 UART: [art] Derive CDI
20,669,673 UART: [art] Store in slot 0x4
20,712,387 UART: [art] Derive Key Pair
20,713,436 UART: [art] Store priv key in slot 0x5
23,140,059 UART: [art] Derive Key Pair - Done
23,152,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,770 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,278 UART: [art] PUB.X = 3AB205051FC29C7CBC31AFFFA256505976E97D7181B77FEFC8F9F1671EA04EA03EBBD6AB68D3599662BE43F2CCB7BCD1
24,867,605 UART: [art] PUB.Y = 44955268D67EA53E828BBB81C77698E1B5C5B22C884195CDBC219069F9B79021FD6CC4C36A6FDA767DF6E00785216E1C
24,874,851 UART: [art] SIG.R = 047BB4386BC9A9B1F493E3E80EA263CE257C9DDACBB7C6A9FD341959F38B95F7C1DA3BAB93AD2526D9C4A8C607E033F0
24,882,255 UART: [art] SIG.S = 0CD663B551E1663B448C13BDC7289F6343BB8067117D59337B47DC39B54FF0A35B885EDC3E9D54A8A9050A474B125D50
25,860,484 UART: Caliptra RT
25,861,179 UART: [state] CFI Enabled
25,993,267 UART: [rt] RT listening for mailbox commands...
26,024,598 UART: [rt]cmd =0x46505652, len=4
26,025,856 UART: [rt] FIPS Version
26,027,130 >>> mbox cmd response data (36 bytes)
26,027,783 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,057,632 UART: [rt]cmd =0x46504c54, len=4
26,059,303 >>> mbox cmd response data (8 bytes)
26,059,647 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,090,322 UART: [rt]cmd =0x46504c67, len=4
26,091,724 >>> mbox cmd response: failed
26,092,894 UART: [rt] FIPS self test
26,093,829 UART: [kat] ++
26,094,285 UART: [kat] sha1
26,098,750 UART: [kat] SHA2-256
26,100,584 UART: [kat] SHA2-384
26,103,533 UART: [kat] SHA2-512-ACC
26,105,748 UART: [kat] ECC-384
28,533,167 UART: [kat] HMAC-384Kdf
28,539,012 UART: [kat] LMS
28,748,172 UART: [kat] --
32,126,540 UART: [rt] Verify complete
32,230,126 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,260,143 UART: [rt]cmd =0x46504c67, len=4
32,261,512 >>> mbox cmd response data (8 bytes)
32,261,839 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,291,555 UART: [rt]cmd =0x49444543, len=4
32,298,574 >>> mbox cmd response data (37 bytes)
32,299,169 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,328,717 UART: [rt]cmd =0x49444549, len=4
32,331,541 >>> mbox cmd response data (104 bytes)
32,332,328 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,361,845 UART: [rt]cmd =0x49444550, len=4
32,372,350 >>> mbox cmd response data (8 bytes)
32,372,823 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,402,477 UART: [rt]cmd =0x4c444556, len=4
32,413,733 >>> mbox cmd response data (687 bytes)
32,417,247 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,447,268 UART: [rt]cmd =0x43455246, len=4
32,459,833 >>> mbox cmd response data (888 bytes)
32,464,280 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,494,032 UART: [rt]cmd =0x43455252, len=4
32,505,445 >>> mbox cmd response data (782 bytes)
32,510,146 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,541,832 UART: [rt]cmd =0x53494756, len=196
33,507,195 >>> mbox cmd response data (8 bytes)
33,507,660 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,537,990 UART: [rt]cmd =0x4d454153, len=108
33,556,544 >>> mbox cmd response data (12 bytes)
33,556,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,586,651 UART: [rt]cmd =0x494e464f, len=4
33,591,013 >>> mbox cmd response data (312 bytes)
33,593,509 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,623,697 UART: [rt]cmd =0x54514754, len=24
33,626,463 >>> mbox cmd response data (8 bytes)
33,626,875 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,656,611 UART: [rt]cmd =0x47544744, len=8
33,659,685 >>> mbox cmd response data (104 bytes)
33,660,546 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,690,262 UART: [rt]cmd =0x50435252, len=8
33,692,083 >>> mbox cmd response data (8 bytes)
33,692,422 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,722,561 UART: [rt]cmd =0x50435251, len=36
34,630,188 >>> mbox cmd response data (1848 bytes)
34,639,105 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,669,261 UART: [rt]cmd =0x50435245, len=56
34,672,244 >>> mbox cmd response data (8 bytes)
34,672,688 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,702,700 UART: [rt]cmd =0x44504543, len=20
34,723,270 >>> mbox cmd response data (44 bytes)
34,724,001 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,753,853 UART: [rt]cmd =0x44504543, len=24
34,781,458 >>> mbox cmd response data (40 bytes)
34,782,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,812,808 UART: [rt]cmd =0x44504543, len=96
34,851,646 >>> mbox cmd response data (56 bytes)
34,852,428 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,883,175 UART: [rt]cmd =0x44504543, len=92
40,902,599 >>> mbox cmd response data (6284 bytes)
40,931,852 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,962,958 UART: [rt]cmd =0x44504543, len=136
45,135,778 >>> mbox cmd response data (136 bytes)
45,137,013 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,167,226 UART: [rt]cmd =0x44504543, len=40
45,194,701 >>> mbox cmd response data (40 bytes)
45,195,412 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,225,650 UART: [rt]cmd =0x44504543, len=28
45,268,229 >>> mbox cmd response data (2076 bytes)
45,278,153 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,308,177 UART: [rt]cmd =0x44504543, len=36
45,337,940 >>> mbox cmd response data (24 bytes)
45,338,548 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,368,266 UART: [rt]cmd =0x4453424c, len=4
47,799,302 >>> mbox cmd response data (8 bytes)
47,799,796 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,829,715 UART: [rt]cmd =0x46505344, len=4
47,939,865 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,773,841 ready_for_fw is high
3,774,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,933 >>> mbox cmd response: success
14,441,090 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,695,511 UART:
18,695,900 UART: Running Caliptra FMC ...
18,697,067 UART:
18,697,229 UART: [state] CFI Enabled
18,705,124 UART: [fht] FMC Alias Private Key: 7
20,471,342 UART: [art] Extend RT PCRs Done
20,472,579 UART: [art] Lock RT PCRs Done
20,474,349 UART: [art] Populate DV Done
20,479,795 UART: [fht] FMC Alias Private Key: 7
20,481,450 UART: [art] Derive CDI
20,482,272 UART: [art] Store in slot 0x4
20,525,033 UART: [art] Derive Key Pair
20,526,087 UART: [art] Store priv key in slot 0x5
22,953,097 UART: [art] Derive Key Pair - Done
22,966,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,138 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,641 UART: [art] PUB.X = 525A05A859A02BEAF27513AAAAA40D16AFAC418311813BACBD83706C6FA42E0CC18DA4530FE8BB7A7CF9CBBDB81B95D4
24,681,949 UART: [art] PUB.Y = D887BD5FF89831CB3D08038B4553C78CA08A724DA82C38BD3EC9D87C5531A322FB8D6C86CEA34765B379E95D5EA2A9C6
24,689,208 UART: [art] SIG.R = EE16DFCAADD5A8BFDF3CCE3C436E424905AC70A3CCBA3C1D334D273E96DD2B0868C11F0FD4E51706EDA99C0E5C26A2B0
24,696,665 UART: [art] SIG.S = E8D9097FDBDE2421C7F9A54CD9783A6BD9DD7536D0ECBF879A3512668CF7026D77FC5B1E7FF7E7EEF00562E9247E374F
25,674,878 UART: Caliptra RT
25,675,592 UART: [state] CFI Enabled
25,808,222 UART: [rt] RT listening for mailbox commands...
25,839,748 UART: [rt]cmd =0x46505652, len=4
25,841,026 UART: [rt] FIPS Version
25,842,143 >>> mbox cmd response data (36 bytes)
25,842,836 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,872,612 UART: [rt]cmd =0x46504c54, len=4
25,874,284 >>> mbox cmd response data (8 bytes)
25,874,625 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,904,437 UART: [rt]cmd =0x46504c67, len=4
25,905,790 >>> mbox cmd response: failed
25,906,959 UART: [rt] FIPS self test
25,907,888 UART: [kat] ++
25,908,438 UART: [kat] sha1
25,912,801 UART: [kat] SHA2-256
25,914,574 UART: [kat] SHA2-384
25,917,432 UART: [kat] SHA2-512-ACC
25,919,651 UART: [kat] ECC-384
28,346,760 UART: [kat] HMAC-384Kdf
28,352,733 UART: [kat] LMS
28,561,888 UART: [kat] --
31,919,367 UART: [rt] Verify complete
32,044,730 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,074,742 UART: [rt]cmd =0x46504c67, len=4
32,076,174 >>> mbox cmd response data (8 bytes)
32,076,511 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,106,229 UART: [rt]cmd =0x49444543, len=4
32,113,194 >>> mbox cmd response data (37 bytes)
32,113,795 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,143,506 UART: [rt]cmd =0x49444549, len=4
32,146,381 >>> mbox cmd response data (104 bytes)
32,147,171 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,176,776 UART: [rt]cmd =0x49444550, len=4
32,187,299 >>> mbox cmd response data (8 bytes)
32,187,709 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,217,596 UART: [rt]cmd =0x4c444556, len=4
32,228,471 >>> mbox cmd response data (687 bytes)
32,231,972 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,261,882 UART: [rt]cmd =0x43455246, len=4
32,274,617 >>> mbox cmd response data (888 bytes)
32,279,024 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,308,727 UART: [rt]cmd =0x43455252, len=4
32,319,810 >>> mbox cmd response data (784 bytes)
32,324,515 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,356,018 UART: [rt]cmd =0x53494756, len=196
33,321,449 >>> mbox cmd response data (8 bytes)
33,321,915 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,352,620 UART: [rt]cmd =0x4d454153, len=108
33,371,232 >>> mbox cmd response data (12 bytes)
33,371,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,401,378 UART: [rt]cmd =0x494e464f, len=4
33,405,688 >>> mbox cmd response data (312 bytes)
33,408,147 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,438,281 UART: [rt]cmd =0x54514754, len=24
33,441,067 >>> mbox cmd response data (8 bytes)
33,441,405 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,471,316 UART: [rt]cmd =0x47544744, len=8
33,474,299 >>> mbox cmd response data (104 bytes)
33,475,167 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,504,774 UART: [rt]cmd =0x50435252, len=8
33,506,777 >>> mbox cmd response data (8 bytes)
33,507,133 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,537,380 UART: [rt]cmd =0x50435251, len=36
34,445,216 >>> mbox cmd response data (1848 bytes)
34,454,106 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,484,418 UART: [rt]cmd =0x50435245, len=56
34,487,706 >>> mbox cmd response data (8 bytes)
34,488,172 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,518,051 UART: [rt]cmd =0x44504543, len=20
34,538,493 >>> mbox cmd response data (44 bytes)
34,539,191 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,569,040 UART: [rt]cmd =0x44504543, len=24
34,596,750 >>> mbox cmd response data (40 bytes)
34,597,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,627,918 UART: [rt]cmd =0x44504543, len=96
34,666,962 >>> mbox cmd response data (56 bytes)
34,667,735 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,698,317 UART: [rt]cmd =0x44504543, len=92
40,717,775 >>> mbox cmd response data (6284 bytes)
40,747,021 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,777,964 UART: [rt]cmd =0x44504543, len=136
44,950,409 >>> mbox cmd response data (136 bytes)
44,951,605 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
44,981,680 UART: [rt]cmd =0x44504543, len=40
45,008,771 >>> mbox cmd response data (40 bytes)
45,009,446 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,039,360 UART: [rt]cmd =0x44504543, len=28
45,082,046 >>> mbox cmd response data (2076 bytes)
45,091,980 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,122,167 UART: [rt]cmd =0x44504543, len=36
45,151,978 >>> mbox cmd response data (24 bytes)
45,152,567 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,182,413 UART: [rt]cmd =0x4453424c, len=4
47,613,064 >>> mbox cmd response data (8 bytes)
47,613,544 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,643,057 UART: [rt]cmd =0x46505344, len=4
47,752,987 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
192,097 UART:
192,490 UART: Running Caliptra ROM ...
193,591 UART:
193,737 UART: [state] CFI Enabled
263,928 UART: [state] LifecycleState = Unprovisioned
266,281 UART: [state] DebugLocked = No
268,026 UART: [state] WD Timer not started. Device not locked for debugging
273,002 UART: [kat] SHA2-256
462,910 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,643 UART: [kat] ++
474,096 UART: [kat] sha1
486,614 UART: [kat] SHA2-256
489,629 UART: [kat] SHA2-384
494,917 UART: [kat] SHA2-512-ACC
497,510 UART: [kat] ECC-384
2,946,134 UART: [kat] HMAC-384Kdf
2,972,602 UART: [kat] LMS
3,504,379 UART: [kat] --
3,510,163 UART: [cold-reset] ++
3,511,616 UART: [fht] FHT @ 0x50003400
3,523,236 UART: [idev] ++
3,523,963 UART: [idev] CDI.KEYID = 6
3,524,879 UART: [idev] SUBJECT.KEYID = 7
3,526,068 UART: [idev] UDS.KEYID = 0
3,527,009 ready_for_fw is high
3,527,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,347 UART: [idev] Erasing UDS.KEYID = 0
6,030,316 UART: [idev] Sha1 KeyId Algorithm
6,052,741 UART: [idev] --
6,057,660 UART: [ldev] ++
6,058,353 UART: [ldev] CDI.KEYID = 6
6,059,241 UART: [ldev] SUBJECT.KEYID = 5
6,060,463 UART: [ldev] AUTHORITY.KEYID = 7
6,061,725 UART: [ldev] FE.KEYID = 1
6,101,680 UART: [ldev] Erasing FE.KEYID = 1
8,610,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,958 UART: [ldev] --
10,418,268 UART: [fwproc] Wait for Commands...
10,420,808 UART: [fwproc] Recv command 0x46574c44
10,423,147 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,154 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,785 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,959 >>> mbox cmd response: success
14,684,839 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,686,548 UART: [afmc] ++
14,687,196 UART: [afmc] CDI.KEYID = 6
14,688,356 UART: [afmc] SUBJECT.KEYID = 7
14,689,911 UART: [afmc] AUTHORITY.KEYID = 5
17,217,962 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,940,960 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,878 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,957,997 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,973,161 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,988,076 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,874 UART: [afmc] --
19,015,098 UART: [cold-reset] --
19,020,165 UART: [state] Locking Datavault
19,023,748 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,942 UART: [state] Locking ICCM
19,028,135 UART: [exit] Launching FMC @ 0x40000130
19,036,829 UART:
19,037,076 UART: Running Caliptra FMC ...
19,038,109 UART:
19,038,262 UART: [state] CFI Enabled
19,099,184 UART: [fht] FMC Alias Private Key: 7
20,866,059 UART: [art] Extend RT PCRs Done
20,867,286 UART: [art] Lock RT PCRs Done
20,868,858 UART: [art] Populate DV Done
20,874,271 UART: [fht] FMC Alias Private Key: 7
20,875,814 UART: [art] Derive CDI
20,876,632 UART: [art] Store in slot 0x4
20,932,843 UART: [art] Derive Key Pair
20,933,884 UART: [art] Store priv key in slot 0x5
23,396,624 UART: [art] Derive Key Pair - Done
23,409,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,122,311 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,842 UART: [art] PUB.X = D6C5B5BB544E007C96FF1738D73B5A31FF1E15CF247AA08B7D9F25C100448F68150FA5669497C8FDABF0EAB12E651A9E
25,131,062 UART: [art] PUB.Y = 142391A1FC5BC40F6C95ECFE2EC221DCBB4B837F9506A0FA72AC5930BA7CF5B5CC0D312997FEA7EE685085337444C38A
25,138,336 UART: [art] SIG.R = 05E5D3C1D761F2A3265A45A116BAAD3B9858D6B28172146638848603F8C8FD245B37028DE6C0B77E7963E434D69A6181
25,145,743 UART: [art] SIG.S = C7D118CADBF535F9107833AD0E7622C535097BD45104A8DBEF8CFCF37469E8D2FF2062844ECBD182AC049A1C3ED1BC7F
26,124,655 UART: Caliptra RT
26,125,380 UART: [state] CFI Enabled
26,306,024 UART: [rt] RT listening for mailbox commands...
26,337,559 UART: [rt]cmd =0x46505652, len=4
26,338,812 UART: [rt] FIPS Version
26,340,029 >>> mbox cmd response data (36 bytes)
26,340,849 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,370,688 UART: [rt]cmd =0x46504c54, len=4
26,372,327 >>> mbox cmd response data (8 bytes)
26,372,669 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,402,481 UART: [rt]cmd =0x46504c67, len=4
26,403,878 >>> mbox cmd response: failed
26,404,996 UART: [rt] FIPS self test
26,405,928 UART: [kat] ++
26,406,381 UART: [kat] sha1
26,410,774 UART: [kat] SHA2-256
26,412,570 UART: [kat] SHA2-384
26,415,356 UART: [kat] SHA2-512-ACC
26,417,570 UART: [kat] ECC-384
28,861,599 UART: [kat] HMAC-384Kdf
28,867,510 UART: [kat] LMS
29,076,673 UART: [kat] --
32,455,263 UART: [rt] Verify complete
32,543,273 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,573,239 UART: [rt]cmd =0x46504c67, len=4
32,574,619 >>> mbox cmd response data (8 bytes)
32,574,968 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,604,899 UART: [rt]cmd =0x49444543, len=4
32,611,775 >>> mbox cmd response data (37 bytes)
32,612,377 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,642,093 UART: [rt]cmd =0x49444549, len=4
32,645,028 >>> mbox cmd response data (104 bytes)
32,645,904 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,675,943 UART: [rt]cmd =0x49444550, len=4
32,686,362 >>> mbox cmd response data (8 bytes)
32,686,777 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,716,213 UART: [rt]cmd =0x4c444556, len=4
32,727,189 >>> mbox cmd response data (687 bytes)
32,730,701 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,760,458 UART: [rt]cmd =0x43455246, len=4
32,773,202 >>> mbox cmd response data (888 bytes)
32,777,637 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,807,380 UART: [rt]cmd =0x43455252, len=4
32,818,902 >>> mbox cmd response data (783 bytes)
32,823,780 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,855,361 UART: [rt]cmd =0x53494756, len=196
33,820,396 >>> mbox cmd response data (8 bytes)
33,820,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,851,295 UART: [rt]cmd =0x4d454153, len=108
33,869,418 >>> mbox cmd response data (12 bytes)
33,869,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,899,695 UART: [rt]cmd =0x494e464f, len=4
33,904,140 >>> mbox cmd response data (312 bytes)
33,906,584 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,936,392 UART: [rt]cmd =0x54514754, len=24
33,939,209 >>> mbox cmd response data (8 bytes)
33,939,622 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,969,248 UART: [rt]cmd =0x47544744, len=8
33,972,433 >>> mbox cmd response data (104 bytes)
33,973,305 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,003,011 UART: [rt]cmd =0x50435252, len=8
34,004,774 >>> mbox cmd response data (8 bytes)
34,005,120 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,035,043 UART: [rt]cmd =0x50435251, len=36
34,950,883 >>> mbox cmd response data (1848 bytes)
34,959,808 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,990,137 UART: [rt]cmd =0x50435245, len=56
34,993,199 >>> mbox cmd response data (8 bytes)
34,993,652 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,023,546 UART: [rt]cmd =0x44504543, len=20
35,044,173 >>> mbox cmd response data (44 bytes)
35,044,862 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,074,841 UART: [rt]cmd =0x44504543, len=24
35,112,192 >>> mbox cmd response data (40 bytes)
35,112,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,143,186 UART: [rt]cmd =0x44504543, len=96
35,183,093 >>> mbox cmd response data (56 bytes)
35,183,882 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,214,201 UART: [rt]cmd =0x44504543, len=92
41,314,271 >>> mbox cmd response data (6284 bytes)
41,343,350 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,374,327 UART: [rt]cmd =0x44504543, len=136
45,602,818 >>> mbox cmd response data (136 bytes)
45,604,023 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,634,274 UART: [rt]cmd =0x44504543, len=40
45,672,551 >>> mbox cmd response data (40 bytes)
45,673,230 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,703,208 UART: [rt]cmd =0x44504543, len=28
45,746,132 >>> mbox cmd response data (2076 bytes)
45,756,022 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,786,160 UART: [rt]cmd =0x44504543, len=36
45,816,075 >>> mbox cmd response data (24 bytes)
45,816,688 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,846,246 UART: [rt]cmd =0x4453424c, len=4
48,336,093 >>> mbox cmd response data (8 bytes)
48,336,593 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,366,577 UART: [rt]cmd =0x46505344, len=4
48,476,943 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,438,913 ready_for_fw is high
3,439,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,519 >>> mbox cmd response: success
14,826,788 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,113,421 UART:
19,113,848 UART: Running Caliptra FMC ...
19,115,098 UART:
19,115,274 UART: [state] CFI Enabled
19,179,322 UART: [fht] FMC Alias Private Key: 7
20,945,243 UART: [art] Extend RT PCRs Done
20,946,472 UART: [art] Lock RT PCRs Done
20,947,726 UART: [art] Populate DV Done
20,953,051 UART: [fht] FMC Alias Private Key: 7
20,954,600 UART: [art] Derive CDI
20,955,428 UART: [art] Store in slot 0x4
21,011,803 UART: [art] Derive Key Pair
21,012,807 UART: [art] Store priv key in slot 0x5
23,475,580 UART: [art] Derive Key Pair - Done
23,488,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,809 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,307 UART: [art] PUB.X = 21BEEC96E4F7BD4B4AD1D72F263CBC0F498363139D03A8FCC644992A2E0AA46EB8CCE6B5A9D31836A94216773155874B
25,210,583 UART: [art] PUB.Y = 1A2900AEB47A2528FA2C08057E36BE4547B4A28A99B3A3B9BBDFD5D08B545DF08D040403D64E43AA4D1C415E1CB06EFC
25,217,801 UART: [art] SIG.R = E33F75AE3FF8AA32BDBB4137DCA9BCE91C94115C68DAAF0C29B612D92C6910C9E661475064DAACBA959AE95AC02A2A80
25,225,211 UART: [art] SIG.S = 591984B8B47D9E452FD1998C37C69401F90DB95025F9A2638423A7C0B2B192DE9182949E5AA290B448F63C1F2F177E8D
26,204,819 UART: Caliptra RT
26,205,540 UART: [state] CFI Enabled
26,383,603 UART: [rt] RT listening for mailbox commands...
26,414,867 UART: [rt]cmd =0x46505652, len=4
26,416,126 UART: [rt] FIPS Version
26,417,394 >>> mbox cmd response data (36 bytes)
26,418,099 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,447,670 UART: [rt]cmd =0x46504c54, len=4
26,449,092 >>> mbox cmd response data (8 bytes)
26,449,424 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,479,251 UART: [rt]cmd =0x46504c67, len=4
26,480,580 >>> mbox cmd response: failed
26,481,444 UART: [rt] FIPS self test
26,482,408 UART: [kat] ++
26,482,920 UART: [kat] sha1
26,487,181 UART: [kat] SHA2-256
26,488,994 UART: [kat] SHA2-384
26,491,903 UART: [kat] SHA2-512-ACC
26,494,128 UART: [kat] ECC-384
28,939,728 UART: [kat] HMAC-384Kdf
28,966,147 UART: [kat] LMS
29,175,331 UART: [kat] --
32,534,331 UART: [rt] Verify complete
32,619,563 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,649,286 UART: [rt]cmd =0x46504c67, len=4
32,650,772 >>> mbox cmd response data (8 bytes)
32,651,130 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,680,991 UART: [rt]cmd =0x49444543, len=4
32,687,981 >>> mbox cmd response data (37 bytes)
32,688,589 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,718,319 UART: [rt]cmd =0x49444549, len=4
32,721,339 >>> mbox cmd response data (104 bytes)
32,722,215 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,751,973 UART: [rt]cmd =0x49444550, len=4
32,762,466 >>> mbox cmd response data (8 bytes)
32,762,864 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,792,799 UART: [rt]cmd =0x4c444556, len=4
32,803,897 >>> mbox cmd response data (687 bytes)
32,807,423 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,837,289 UART: [rt]cmd =0x43455246, len=4
32,849,832 >>> mbox cmd response data (888 bytes)
32,854,246 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,884,162 UART: [rt]cmd =0x43455252, len=4
32,895,536 >>> mbox cmd response data (783 bytes)
32,900,249 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,931,826 UART: [rt]cmd =0x53494756, len=196
33,897,562 >>> mbox cmd response data (8 bytes)
33,898,052 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,928,722 UART: [rt]cmd =0x4d454153, len=108
33,946,884 >>> mbox cmd response data (12 bytes)
33,947,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,976,875 UART: [rt]cmd =0x494e464f, len=4
33,981,261 >>> mbox cmd response data (312 bytes)
33,983,701 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
34,013,699 UART: [rt]cmd =0x54514754, len=24
34,016,360 >>> mbox cmd response data (8 bytes)
34,016,706 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
34,046,573 UART: [rt]cmd =0x47544744, len=8
34,049,510 >>> mbox cmd response data (104 bytes)
34,050,364 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,080,423 UART: [rt]cmd =0x50435252, len=8
34,082,655 >>> mbox cmd response data (8 bytes)
34,083,088 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,113,111 UART: [rt]cmd =0x50435251, len=36
35,027,009 >>> mbox cmd response data (1848 bytes)
35,035,927 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,066,358 UART: [rt]cmd =0x50435245, len=56
35,069,277 >>> mbox cmd response data (8 bytes)
35,069,721 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,099,777 UART: [rt]cmd =0x44504543, len=20
35,120,419 >>> mbox cmd response data (44 bytes)
35,121,160 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,151,122 UART: [rt]cmd =0x44504543, len=24
35,188,565 >>> mbox cmd response data (40 bytes)
35,189,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,219,814 UART: [rt]cmd =0x44504543, len=96
35,258,647 >>> mbox cmd response data (56 bytes)
35,259,401 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,289,674 UART: [rt]cmd =0x44504543, len=92
41,387,950 >>> mbox cmd response data (6284 bytes)
41,417,034 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,448,409 UART: [rt]cmd =0x44504543, len=136
45,674,340 >>> mbox cmd response data (136 bytes)
45,675,547 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,705,629 UART: [rt]cmd =0x44504543, len=40
45,742,911 >>> mbox cmd response data (40 bytes)
45,743,769 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,773,870 UART: [rt]cmd =0x44504543, len=28
45,816,498 >>> mbox cmd response data (2076 bytes)
45,826,566 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,856,547 UART: [rt]cmd =0x44504543, len=36
45,886,248 >>> mbox cmd response data (24 bytes)
45,886,814 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,916,463 UART: [rt]cmd =0x4453424c, len=4
48,405,757 >>> mbox cmd response data (8 bytes)
48,406,263 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,436,149 UART: [rt]cmd =0x46505344, len=4
48,546,359 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
192,748 UART:
193,099 UART: Running Caliptra ROM ...
194,293 UART:
603,929 UART: [state] CFI Enabled
618,743 UART: [state] LifecycleState = Unprovisioned
621,155 UART: [state] DebugLocked = No
622,553 UART: [state] WD Timer not started. Device not locked for debugging
626,457 UART: [kat] SHA2-256
816,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,081 UART: [kat] ++
827,724 UART: [kat] sha1
839,111 UART: [kat] SHA2-256
842,193 UART: [kat] SHA2-384
848,684 UART: [kat] SHA2-512-ACC
851,276 UART: [kat] ECC-384
3,292,245 UART: [kat] HMAC-384Kdf
3,306,193 UART: [kat] LMS
3,837,972 UART: [kat] --
3,843,035 UART: [cold-reset] ++
3,844,977 UART: [fht] FHT @ 0x50003400
3,856,605 UART: [idev] ++
3,857,318 UART: [idev] CDI.KEYID = 6
3,858,235 UART: [idev] SUBJECT.KEYID = 7
3,859,483 UART: [idev] UDS.KEYID = 0
3,860,415 ready_for_fw is high
3,860,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,568 UART: [idev] Erasing UDS.KEYID = 0
6,343,842 UART: [idev] Sha1 KeyId Algorithm
6,364,822 UART: [idev] --
6,370,389 UART: [ldev] ++
6,371,076 UART: [ldev] CDI.KEYID = 6
6,371,993 UART: [ldev] SUBJECT.KEYID = 5
6,373,214 UART: [ldev] AUTHORITY.KEYID = 7
6,374,413 UART: [ldev] FE.KEYID = 1
6,386,590 UART: [ldev] Erasing FE.KEYID = 1
8,864,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,813 UART: [ldev] --
10,655,409 UART: [fwproc] Wait for Commands...
10,658,180 UART: [fwproc] Recv command 0x46574c44
10,660,450 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,965 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,593 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,693 >>> mbox cmd response: success
14,917,585 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,918,899 UART: [afmc] ++
14,919,520 UART: [afmc] CDI.KEYID = 6
14,920,819 UART: [afmc] SUBJECT.KEYID = 7
14,922,259 UART: [afmc] AUTHORITY.KEYID = 5
17,423,741 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,144,958 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,082 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,253 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,198 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,423 UART: [afmc] --
19,217,483 UART: [cold-reset] --
19,222,491 UART: [state] Locking Datavault
19,227,421 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,616 UART: [state] Locking ICCM
19,231,212 UART: [exit] Launching FMC @ 0x40000130
19,239,883 UART:
19,240,127 UART: Running Caliptra FMC ...
19,241,232 UART:
19,241,391 UART: [state] CFI Enabled
19,249,437 UART: [fht] FMC Alias Private Key: 7
21,015,091 UART: [art] Extend RT PCRs Done
21,016,333 UART: [art] Lock RT PCRs Done
21,018,022 UART: [art] Populate DV Done
21,023,592 UART: [fht] FMC Alias Private Key: 7
21,025,057 UART: [art] Derive CDI
21,025,803 UART: [art] Store in slot 0x4
21,068,945 UART: [art] Derive Key Pair
21,069,954 UART: [art] Store priv key in slot 0x5
23,496,965 UART: [art] Derive Key Pair - Done
23,509,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,336 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,849 UART: [art] PUB.X = D5492D7269FC755D0923C9C463D04BE58C83C6CABAFAC2ABDFDF078904BF2C90A88D1D3D495C78DC9A461B8F3E1E4C72
25,225,092 UART: [art] PUB.Y = 5AAEA1B054250BC96BE82888C6AB75CAD605D5F6B887EF1A3537B0D461A80DE9872B90A05159CE7F75F2BBCCD83D4CCA
25,232,383 UART: [art] SIG.R = 5A5ED75BDD216D6863743E8AF7AA1C958E1B23351051A3055F05C426EA77D3628CA06510272C237B79D1CA4418E3EFE2
25,239,782 UART: [art] SIG.S = ADED6564D5EEFD09A0FD043B42EA776849AC90B723D7F9CE93028AF2B1217117304EEB01A149CDDFA2EAAC82F3A40C5F
26,218,571 UART: Caliptra RT
26,219,280 UART: [state] CFI Enabled
26,351,622 UART: [rt] RT listening for mailbox commands...
26,383,190 UART: [rt]cmd =0x46505652, len=4
26,384,468 UART: [rt] FIPS Version
26,385,545 >>> mbox cmd response data (36 bytes)
26,386,227 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,415,987 UART: [rt]cmd =0x46504c54, len=4
26,417,523 >>> mbox cmd response data (8 bytes)
26,417,867 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,448,163 UART: [rt]cmd =0x46504c67, len=4
26,449,556 >>> mbox cmd response: failed
26,450,481 UART: [rt] FIPS self test
26,451,325 UART: [kat] ++
26,451,769 UART: [kat] sha1
26,456,226 UART: [kat] SHA2-256
26,458,069 UART: [kat] SHA2-384
26,460,880 UART: [kat] SHA2-512-ACC
26,463,077 UART: [kat] ECC-384
28,890,320 UART: [kat] HMAC-384Kdf
28,896,238 UART: [kat] LMS
29,105,376 UART: [kat] --
32,483,573 UART: [rt] Verify complete
32,588,519 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,618,167 UART: [rt]cmd =0x46504c67, len=4
32,619,675 >>> mbox cmd response data (8 bytes)
32,620,040 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,649,692 UART: [rt]cmd =0x49444543, len=4
32,656,888 >>> mbox cmd response data (37 bytes)
32,657,476 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,686,917 UART: [rt]cmd =0x49444549, len=4
32,689,574 >>> mbox cmd response data (104 bytes)
32,690,360 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,719,861 UART: [rt]cmd =0x49444550, len=4
32,730,340 >>> mbox cmd response data (8 bytes)
32,730,751 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,760,514 UART: [rt]cmd =0x4c444556, len=4
32,771,786 >>> mbox cmd response data (687 bytes)
32,775,300 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,805,170 UART: [rt]cmd =0x43455246, len=4
32,818,025 >>> mbox cmd response data (888 bytes)
32,822,445 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,852,461 UART: [rt]cmd =0x43455252, len=4
32,863,888 >>> mbox cmd response data (783 bytes)
32,868,647 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,900,368 UART: [rt]cmd =0x53494756, len=196
33,865,911 >>> mbox cmd response data (8 bytes)
33,866,380 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,896,822 UART: [rt]cmd =0x4d454153, len=108
33,915,741 >>> mbox cmd response data (12 bytes)
33,916,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,945,936 UART: [rt]cmd =0x494e464f, len=4
33,950,271 >>> mbox cmd response data (312 bytes)
33,952,754 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,982,824 UART: [rt]cmd =0x54514754, len=24
33,985,421 >>> mbox cmd response data (8 bytes)
33,985,855 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
34,015,629 UART: [rt]cmd =0x47544744, len=8
34,018,509 >>> mbox cmd response data (104 bytes)
34,019,367 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,049,234 UART: [rt]cmd =0x50435252, len=8
34,051,306 >>> mbox cmd response data (8 bytes)
34,051,727 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,081,608 UART: [rt]cmd =0x50435251, len=36
34,989,299 >>> mbox cmd response data (1848 bytes)
34,998,244 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,028,534 UART: [rt]cmd =0x50435245, len=56
35,031,646 >>> mbox cmd response data (8 bytes)
35,032,102 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,061,909 UART: [rt]cmd =0x44504543, len=20
35,082,326 >>> mbox cmd response data (44 bytes)
35,083,032 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,113,019 UART: [rt]cmd =0x44504543, len=24
35,141,028 >>> mbox cmd response data (40 bytes)
35,141,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,172,398 UART: [rt]cmd =0x44504543, len=96
35,211,024 >>> mbox cmd response data (56 bytes)
35,211,805 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,242,128 UART: [rt]cmd =0x44504543, len=92
41,261,446 >>> mbox cmd response data (6284 bytes)
41,290,541 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,321,579 UART: [rt]cmd =0x44504543, len=136
45,493,640 >>> mbox cmd response data (136 bytes)
45,494,872 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,525,130 UART: [rt]cmd =0x44504543, len=40
45,552,511 >>> mbox cmd response data (40 bytes)
45,553,191 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,583,062 UART: [rt]cmd =0x44504543, len=28
45,625,977 >>> mbox cmd response data (2076 bytes)
45,635,866 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,665,894 UART: [rt]cmd =0x44504543, len=36
45,695,562 >>> mbox cmd response data (24 bytes)
45,696,132 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,725,687 UART: [rt]cmd =0x4453424c, len=4
48,156,486 >>> mbox cmd response data (8 bytes)
48,156,975 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,186,699 UART: [rt]cmd =0x46505344, len=4
48,296,775 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
3,756,498 ready_for_fw is high
3,757,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,728 >>> mbox cmd response: success
15,040,864 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,293,081 UART:
19,293,517 UART: Running Caliptra FMC ...
19,294,660 UART:
19,295,003 UART: [state] CFI Enabled
19,302,626 UART: [fht] FMC Alias Private Key: 7
21,069,346 UART: [art] Extend RT PCRs Done
21,070,590 UART: [art] Lock RT PCRs Done
21,072,520 UART: [art] Populate DV Done
21,077,952 UART: [fht] FMC Alias Private Key: 7
21,079,551 UART: [art] Derive CDI
21,080,301 UART: [art] Store in slot 0x4
21,123,552 UART: [art] Derive Key Pair
21,124,557 UART: [art] Store priv key in slot 0x5
23,551,162 UART: [art] Derive Key Pair - Done
23,563,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,947 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,455 UART: [art] PUB.X = 57292135311244105F837B372CB0FC4072482B8D01D76E62D81E06BC63A4D4EEE76189812C634A258D0FCCF1181C0217
25,278,713 UART: [art] PUB.Y = 7397DFD0EDFF0278E291E4B7549C8A9656C4C115F8691DCD6117F9AD5A9C9838D7C78E4F97894AC8A466334C12307FBB
25,285,976 UART: [art] SIG.R = 129297D9E0175060B5698A0FC5DDD76B4D6B10BECD1B0D44E76742611BA44282E47E26F56E49C0AADEC6F2B4E11EE9B9
25,293,317 UART: [art] SIG.S = 79EE13FAEC3FCC519A48F7FBC618A575ED36DECF4538FB53480433068817A7846C6985C89E9E21F071F3A53A7DFCF22C
26,272,468 UART: Caliptra RT
26,273,174 UART: [state] CFI Enabled
26,405,473 UART: [rt] RT listening for mailbox commands...
26,436,987 UART: [rt]cmd =0x46505652, len=4
26,438,271 UART: [rt] FIPS Version
26,439,440 >>> mbox cmd response data (36 bytes)
26,440,151 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,469,773 UART: [rt]cmd =0x46504c54, len=4
26,471,200 >>> mbox cmd response data (8 bytes)
26,471,538 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,501,962 UART: [rt]cmd =0x46504c67, len=4
26,503,261 >>> mbox cmd response: failed
26,504,166 UART: [rt] FIPS self test
26,505,105 UART: [kat] ++
26,505,614 UART: [kat] sha1
26,509,939 UART: [kat] SHA2-256
26,511,775 UART: [kat] SHA2-384
26,514,636 UART: [kat] SHA2-512-ACC
26,516,853 UART: [kat] ECC-384
28,944,300 UART: [kat] HMAC-384Kdf
28,950,170 UART: [kat] LMS
29,159,333 UART: [kat] --
32,517,719 UART: [rt] Verify complete
32,641,683 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,671,430 UART: [rt]cmd =0x46504c67, len=4
32,673,048 >>> mbox cmd response data (8 bytes)
32,673,412 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,702,980 UART: [rt]cmd =0x49444543, len=4
32,709,913 >>> mbox cmd response data (37 bytes)
32,710,501 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,740,065 UART: [rt]cmd =0x49444549, len=4
32,742,868 >>> mbox cmd response data (104 bytes)
32,743,754 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,773,576 UART: [rt]cmd =0x49444550, len=4
32,784,067 >>> mbox cmd response data (8 bytes)
32,784,476 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,814,188 UART: [rt]cmd =0x4c444556, len=4
32,825,100 >>> mbox cmd response data (687 bytes)
32,828,626 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,858,479 UART: [rt]cmd =0x43455246, len=4
32,871,242 >>> mbox cmd response data (888 bytes)
32,875,647 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,905,514 UART: [rt]cmd =0x43455252, len=4
32,916,920 >>> mbox cmd response data (782 bytes)
32,921,637 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,953,142 UART: [rt]cmd =0x53494756, len=196
33,918,450 >>> mbox cmd response data (8 bytes)
33,918,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,949,658 UART: [rt]cmd =0x4d454153, len=108
33,967,975 >>> mbox cmd response data (12 bytes)
33,968,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,998,183 UART: [rt]cmd =0x494e464f, len=4
34,002,674 >>> mbox cmd response data (312 bytes)
34,005,169 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
34,035,327 UART: [rt]cmd =0x54514754, len=24
34,038,178 >>> mbox cmd response data (8 bytes)
34,038,607 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
34,068,216 UART: [rt]cmd =0x47544744, len=8
34,071,148 >>> mbox cmd response data (104 bytes)
34,072,023 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,101,909 UART: [rt]cmd =0x50435252, len=8
34,103,794 >>> mbox cmd response data (8 bytes)
34,104,138 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,134,263 UART: [rt]cmd =0x50435251, len=36
35,042,229 >>> mbox cmd response data (1848 bytes)
35,051,152 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,081,557 UART: [rt]cmd =0x50435245, len=56
35,084,836 >>> mbox cmd response data (8 bytes)
35,085,293 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,115,142 UART: [rt]cmd =0x44504543, len=20
35,135,560 >>> mbox cmd response data (44 bytes)
35,136,288 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,166,141 UART: [rt]cmd =0x44504543, len=24
35,194,062 >>> mbox cmd response data (40 bytes)
35,194,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,225,132 UART: [rt]cmd =0x44504543, len=96
35,263,183 >>> mbox cmd response data (56 bytes)
35,263,921 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,294,452 UART: [rt]cmd =0x44504543, len=92
41,313,643 >>> mbox cmd response data (6284 bytes)
41,342,744 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,374,069 UART: [rt]cmd =0x44504543, len=136
45,546,397 >>> mbox cmd response data (136 bytes)
45,547,600 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,577,688 UART: [rt]cmd =0x44504543, len=40
45,605,028 >>> mbox cmd response data (40 bytes)
45,605,688 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,635,615 UART: [rt]cmd =0x44504543, len=28
45,678,378 >>> mbox cmd response data (2076 bytes)
45,688,269 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,718,307 UART: [rt]cmd =0x44504543, len=36
45,748,165 >>> mbox cmd response data (24 bytes)
45,748,748 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,778,320 UART: [rt]cmd =0x4453424c, len=4
48,208,971 >>> mbox cmd response data (8 bytes)
48,209,454 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,239,066 UART: [rt]cmd =0x46505344, len=4
48,348,958 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,587 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,185 UART: [kat] SHA2-256
882,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,231 UART: [kat] ++
886,383 UART: [kat] sha1
890,653 UART: [kat] SHA2-256
892,591 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,990 UART: [kat] HMAC-384Kdf
907,594 UART: [kat] LMS
1,475,790 UART: [kat] --
1,476,653 UART: [cold-reset] ++
1,477,167 UART: [fht] Storing FHT @ 0x50003400
1,479,956 UART: [idev] ++
1,480,124 UART: [idev] CDI.KEYID = 6
1,480,484 UART: [idev] SUBJECT.KEYID = 7
1,480,908 UART: [idev] UDS.KEYID = 0
1,481,253 ready_for_fw is high
1,481,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,098 UART: [idev] Erasing UDS.KEYID = 0
1,505,426 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,162 UART: [idev] --
1,515,365 UART: [ldev] ++
1,515,533 UART: [ldev] CDI.KEYID = 6
1,515,896 UART: [ldev] SUBJECT.KEYID = 5
1,516,322 UART: [ldev] AUTHORITY.KEYID = 7
1,516,785 UART: [ldev] FE.KEYID = 1
1,522,061 UART: [ldev] Erasing FE.KEYID = 1
1,547,748 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,728 UART: [ldev] --
1,587,047 UART: [fwproc] Waiting for Commands...
1,587,916 UART: [fwproc] Received command 0x46574c44
1,588,707 UART: [fwproc] Received Image of size 118548 bytes
2,933,463 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,143 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,361 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,742 >>> mbox cmd response: success
3,132,742 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,133,904 UART: [afmc] ++
3,134,072 UART: [afmc] CDI.KEYID = 6
3,134,434 UART: [afmc] SUBJECT.KEYID = 7
3,134,859 UART: [afmc] AUTHORITY.KEYID = 5
3,169,802 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,984 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,764 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,473 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,356 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,039 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,969 UART: [afmc] --
3,212,907 UART: [cold-reset] --
3,213,739 UART: [state] Locking Datavault
3,214,742 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,346 UART: [state] Locking ICCM
3,215,848 UART: [exit] Launching FMC @ 0x40000130
3,221,178 UART:
3,221,194 UART: Running Caliptra FMC ...
3,221,602 UART:
3,221,656 UART: [state] CFI Enabled
3,232,510 UART: [fht] FMC Alias Private Key: 7
3,350,946 UART: [art] Extend RT PCRs Done
3,351,374 UART: [art] Lock RT PCRs Done
3,352,852 UART: [art] Populate DV Done
3,361,215 UART: [fht] FMC Alias Private Key: 7
3,362,393 UART: [art] Derive CDI
3,362,673 UART: [art] Store in slot 0x4
3,448,365 UART: [art] Derive Key Pair
3,448,725 UART: [art] Store priv key in slot 0x5
3,462,080 UART: [art] Derive Key Pair - Done
3,476,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,000 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,765 UART: [art] PUB.X = 937B1EEFB2BA0CD3851AC6FBA7665E52BCA9F644CE85E19672854D75AC6F93BDA9D81EFEF224D382B5F772069A6FEE9E
3,499,551 UART: [art] PUB.Y = C1552CE7FB50B19CF4BC49776CFE179CC8A6AFC17F2A6398B2535F0B83CBF3CC6620EB1FD03A6161C194A14906E56FFD
3,506,513 UART: [art] SIG.R = 41E98C190691DD7910CCD339EE8CC9059E27D83EF707D44806D0810728960FCF5705D7251610894ADDF815A93AC0BCCF
3,513,264 UART: [art] SIG.S = C40B2806DCA373CAA1473C7E194B2EAA874E1981E85BE8AE8459EF8A43AF6CCBA657E7F19C0223F5CF51281349A5CD65
3,536,887 UART: Caliptra RT
3,537,138 UART: [state] CFI Enabled
3,656,784 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,338 UART: [rt]cmd =0x46505652, len=4
3,687,998 UART: [rt] FIPS Version
3,689,109 >>> mbox cmd response data (36 bytes)
3,689,110 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,295 UART: [rt]cmd =0x46504c54, len=4
3,719,453 >>> mbox cmd response data (8 bytes)
3,719,454 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,748,943 UART: [rt]cmd =0x46504c67, len=4
3,749,845 >>> mbox cmd response: failed
3,750,115 UART: [rt] FIPS self test
3,750,446 UART: [kat] ++
3,750,598 UART: [kat] sha1
3,754,699 UART: [kat] SHA2-256
3,756,629 UART: [kat] SHA2-384
3,759,480 UART: [kat] SHA2-512-ACC
3,761,375 UART: [kat] ECC-384
3,771,014 UART: [kat] HMAC-384Kdf
3,775,574 UART: [kat] LMS
4,350,802 UART: [kat] --
6,622,949 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,629,557 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,658,935 UART: [rt]cmd =0x46504c67, len=4
6,660,208 >>> mbox cmd response data (8 bytes)
6,660,209 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,689,406 UART: [rt]cmd =0x49444543, len=4
6,695,679 >>> mbox cmd response data (37 bytes)
6,695,680 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,724,905 UART: [rt]cmd =0x49444549, len=4
6,727,152 >>> mbox cmd response data (104 bytes)
6,727,153 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,756,604 UART: [rt]cmd =0x49444550, len=4
6,766,643 >>> mbox cmd response data (8 bytes)
6,766,644 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,796,013 UART: [rt]cmd =0x4c444556, len=4
6,806,461 >>> mbox cmd response data (687 bytes)
6,806,462 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,835,737 UART: [rt]cmd =0x43455246, len=4
6,847,913 >>> mbox cmd response data (920 bytes)
6,847,914 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,877,287 UART: [rt]cmd =0x43455252, len=4
6,888,122 >>> mbox cmd response data (783 bytes)
6,888,123 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,918,718 UART: [rt]cmd =0x53494756, len=196
6,924,218 >>> mbox cmd response data (8 bytes)
6,924,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,954,494 UART: [rt]cmd =0x4d454153, len=108
6,975,170 >>> mbox cmd response data (12 bytes)
6,975,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,004,544 UART: [rt]cmd =0x494e464f, len=4
7,008,254 >>> mbox cmd response data (312 bytes)
7,008,255 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,037,832 UART: [rt]cmd =0x54514754, len=24
7,039,956 >>> mbox cmd response data (8 bytes)
7,039,957 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,069,418 UART: [rt]cmd =0x47544744, len=8
7,071,980 >>> mbox cmd response data (104 bytes)
7,071,981 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,101,408 UART: [rt]cmd =0x50435252, len=8
7,102,828 >>> mbox cmd response data (8 bytes)
7,102,829 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,132,150 UART: [rt]cmd =0x50435251, len=36
7,299,394 >>> mbox cmd response data (1848 bytes)
7,299,395 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,329,134 UART: [rt]cmd =0x50435245, len=56
7,332,471 >>> mbox cmd response data (8 bytes)
7,332,472 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,361,827 UART: [rt]cmd =0x44504543, len=20
7,382,659 >>> mbox cmd response data (44 bytes)
7,382,660 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,411,961 UART: [rt]cmd =0x44504543, len=24
7,439,334 >>> mbox cmd response data (40 bytes)
7,439,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,469,476 UART: [rt]cmd =0x44504543, len=96
7,507,357 >>> mbox cmd response data (56 bytes)
7,507,358 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,537,123 UART: [rt]cmd =0x44504543, len=92
7,767,200 >>> mbox cmd response data (6284 bytes)
7,767,201 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,797,272 UART: [rt]cmd =0x44504543, len=136
7,863,548 >>> mbox cmd response data (136 bytes)
7,863,549 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,892,994 UART: [rt]cmd =0x44504543, len=40
7,920,263 >>> mbox cmd response data (40 bytes)
7,920,264 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,949,879 UART: [rt]cmd =0x44504543, len=28
7,993,240 >>> mbox cmd response data (2076 bytes)
7,993,241 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,022,718 UART: [rt]cmd =0x44504543, len=36
8,052,777 >>> mbox cmd response data (24 bytes)
8,052,778 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,082,119 UART: [rt]cmd =0x4453424c, len=4
8,099,047 >>> mbox cmd response data (8 bytes)
8,099,048 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,128,581 UART: [rt]cmd =0x46505344, len=4
8,237,060 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,885 ready_for_fw is high
1,362,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,134 >>> mbox cmd response: success
2,981,134 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,042,237 UART:
3,042,253 UART: Running Caliptra FMC ...
3,042,661 UART:
3,042,715 UART: [state] CFI Enabled
3,053,421 UART: [fht] FMC Alias Private Key: 7
3,172,145 UART: [art] Extend RT PCRs Done
3,172,573 UART: [art] Lock RT PCRs Done
3,174,069 UART: [art] Populate DV Done
3,182,268 UART: [fht] FMC Alias Private Key: 7
3,183,214 UART: [art] Derive CDI
3,183,494 UART: [art] Store in slot 0x4
3,268,942 UART: [art] Derive Key Pair
3,269,302 UART: [art] Store priv key in slot 0x5
3,281,881 UART: [art] Derive Key Pair - Done
3,296,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,061 UART: [art] PUB.X = 29FE3F62C7C27052C162195810332D722FCC78CE44ACAE6512D18DBDA510DA728E7854E7CBDA7A14C785E4CB3F5DFB8D
3,319,847 UART: [art] PUB.Y = 83C079D2DE031BAACC51DE265EB3966F0CEB666B3644220418116A1DC0A202E290848ECA5E3CA19DE35DA0604FC1623B
3,326,795 UART: [art] SIG.R = 8FD01587EB5EB8C1074F13FA3DADA74B8E8FDD94B556EF92DB052FA7BB7A9CAD796E82792869F9C15214F823A2CE1EAB
3,333,581 UART: [art] SIG.S = 239BDDA1179825392D058AE549A83F45CFF89D44B15C19870D71C88FFFCA4EA4B34338FADE90892F05DBEFAD8240CEBD
3,357,360 UART: Caliptra RT
3,357,611 UART: [state] CFI Enabled
3,478,045 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,601 UART: [rt]cmd =0x46505652, len=4
3,509,261 UART: [rt] FIPS Version
3,510,280 >>> mbox cmd response data (36 bytes)
3,510,281 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,772 UART: [rt]cmd =0x46504c54, len=4
3,540,804 >>> mbox cmd response data (8 bytes)
3,540,805 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,570,298 UART: [rt]cmd =0x46504c67, len=4
3,571,194 >>> mbox cmd response: failed
3,571,340 UART: [rt] FIPS self test
3,571,671 UART: [kat] ++
3,571,823 UART: [kat] sha1
3,575,850 UART: [kat] SHA2-256
3,577,780 UART: [kat] SHA2-384
3,580,457 UART: [kat] SHA2-512-ACC
3,582,352 UART: [kat] ECC-384
3,592,131 UART: [kat] HMAC-384Kdf
3,596,725 UART: [kat] LMS
4,171,953 UART: [kat] --
6,336,222 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,340,917 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,370,343 UART: [rt]cmd =0x46504c67, len=4
6,371,410 >>> mbox cmd response data (8 bytes)
6,371,411 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,400,746 UART: [rt]cmd =0x49444543, len=4
6,406,987 >>> mbox cmd response data (37 bytes)
6,406,988 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,436,463 UART: [rt]cmd =0x49444549, len=4
6,438,850 >>> mbox cmd response data (104 bytes)
6,438,851 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,468,060 UART: [rt]cmd =0x49444550, len=4
6,478,175 >>> mbox cmd response data (8 bytes)
6,478,176 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,507,447 UART: [rt]cmd =0x4c444556, len=4
6,517,875 >>> mbox cmd response data (687 bytes)
6,517,876 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,547,159 UART: [rt]cmd =0x43455246, len=4
6,559,581 >>> mbox cmd response data (920 bytes)
6,559,582 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,588,957 UART: [rt]cmd =0x43455252, len=4
6,599,890 >>> mbox cmd response data (783 bytes)
6,599,891 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,630,646 UART: [rt]cmd =0x53494756, len=196
6,636,044 >>> mbox cmd response data (8 bytes)
6,636,045 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,666,174 UART: [rt]cmd =0x4d454153, len=108
6,686,724 >>> mbox cmd response data (12 bytes)
6,686,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,716,048 UART: [rt]cmd =0x494e464f, len=4
6,719,696 >>> mbox cmd response data (312 bytes)
6,719,697 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,749,126 UART: [rt]cmd =0x54514754, len=24
6,751,058 >>> mbox cmd response data (8 bytes)
6,751,059 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,780,618 UART: [rt]cmd =0x47544744, len=8
6,783,204 >>> mbox cmd response data (104 bytes)
6,783,205 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,812,746 UART: [rt]cmd =0x50435252, len=8
6,813,990 >>> mbox cmd response data (8 bytes)
6,813,991 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,843,624 UART: [rt]cmd =0x50435251, len=36
7,010,884 >>> mbox cmd response data (1848 bytes)
7,010,885 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,040,388 UART: [rt]cmd =0x50435245, len=56
7,044,125 >>> mbox cmd response data (8 bytes)
7,044,126 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,073,405 UART: [rt]cmd =0x44504543, len=20
7,094,321 >>> mbox cmd response data (44 bytes)
7,094,322 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,123,717 UART: [rt]cmd =0x44504543, len=24
7,151,240 >>> mbox cmd response data (40 bytes)
7,151,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,181,104 UART: [rt]cmd =0x44504543, len=96
7,219,597 >>> mbox cmd response data (56 bytes)
7,219,598 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,249,483 UART: [rt]cmd =0x44504543, len=92
7,478,284 >>> mbox cmd response data (6284 bytes)
7,478,285 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,508,712 UART: [rt]cmd =0x44504543, len=136
7,574,634 >>> mbox cmd response data (136 bytes)
7,574,635 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,604,090 UART: [rt]cmd =0x44504543, len=40
7,631,811 >>> mbox cmd response data (40 bytes)
7,631,812 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,661,009 UART: [rt]cmd =0x44504543, len=28
7,704,502 >>> mbox cmd response data (2076 bytes)
7,704,503 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,734,072 UART: [rt]cmd =0x44504543, len=36
7,764,301 >>> mbox cmd response data (24 bytes)
7,764,302 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,793,667 UART: [rt]cmd =0x4453424c, len=4
7,810,817 >>> mbox cmd response data (8 bytes)
7,810,818 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,840,149 UART: [rt]cmd =0x46505344, len=4
7,948,656 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,432 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,136 UART: [kat] SHA2-256
882,067 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,182 UART: [kat] ++
886,334 UART: [kat] sha1
890,582 UART: [kat] SHA2-256
892,520 UART: [kat] SHA2-384
895,249 UART: [kat] SHA2-512-ACC
897,150 UART: [kat] ECC-384
902,853 UART: [kat] HMAC-384Kdf
907,407 UART: [kat] LMS
1,475,603 UART: [kat] --
1,476,610 UART: [cold-reset] ++
1,477,090 UART: [fht] Storing FHT @ 0x50003400
1,479,885 UART: [idev] ++
1,480,053 UART: [idev] CDI.KEYID = 6
1,480,413 UART: [idev] SUBJECT.KEYID = 7
1,480,837 UART: [idev] UDS.KEYID = 0
1,481,182 ready_for_fw is high
1,481,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,741 UART: [idev] Erasing UDS.KEYID = 0
1,505,355 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,993 UART: [idev] --
1,515,036 UART: [ldev] ++
1,515,204 UART: [ldev] CDI.KEYID = 6
1,515,567 UART: [ldev] SUBJECT.KEYID = 5
1,515,993 UART: [ldev] AUTHORITY.KEYID = 7
1,516,456 UART: [ldev] FE.KEYID = 1
1,521,802 UART: [ldev] Erasing FE.KEYID = 1
1,547,803 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,165 UART: [ldev] --
1,587,446 UART: [fwproc] Waiting for Commands...
1,588,255 UART: [fwproc] Received command 0x46574c44
1,589,046 UART: [fwproc] Received Image of size 118548 bytes
2,933,802 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,638 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,856 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,231 >>> mbox cmd response: success
3,133,231 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,134,413 UART: [afmc] ++
3,134,581 UART: [afmc] CDI.KEYID = 6
3,134,943 UART: [afmc] SUBJECT.KEYID = 7
3,135,368 UART: [afmc] AUTHORITY.KEYID = 5
3,169,961 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,159 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,939 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,648 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,531 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,214 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,064 UART: [afmc] --
3,213,138 UART: [cold-reset] --
3,214,172 UART: [state] Locking Datavault
3,215,295 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,899 UART: [state] Locking ICCM
3,216,327 UART: [exit] Launching FMC @ 0x40000130
3,221,657 UART:
3,221,673 UART: Running Caliptra FMC ...
3,222,081 UART:
3,222,224 UART: [state] CFI Enabled
3,233,120 UART: [fht] FMC Alias Private Key: 7
3,352,362 UART: [art] Extend RT PCRs Done
3,352,790 UART: [art] Lock RT PCRs Done
3,354,484 UART: [art] Populate DV Done
3,362,815 UART: [fht] FMC Alias Private Key: 7
3,363,985 UART: [art] Derive CDI
3,364,265 UART: [art] Store in slot 0x4
3,450,221 UART: [art] Derive Key Pair
3,450,581 UART: [art] Store priv key in slot 0x5
3,464,304 UART: [art] Derive Key Pair - Done
3,479,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,664 UART: [art] PUB.X = C2DD2838C50E4A80D1F55A85E2B7BDD0720AA518265F95E2DF876E37086CCE6273AD17B510D967A7DEA94AA7F1196104
3,502,430 UART: [art] PUB.Y = 3126456EF3E4D3447438D06D88D5F0FB51913646AE85043727735DCBE06AA290A0AC142E16F4755203194ACD6F94754D
3,509,368 UART: [art] SIG.R = 14FA22D2AD78515C6D9DB41CD493AF351B2B52CEAE4F82354B4CE67F9CB7C85AA845583AADD12DB31C8C4C209DE2729D
3,516,158 UART: [art] SIG.S = BC312DA75C547F7A22975C3D060D79040C71C638AAE9102C941ED0DE8628036ECE4D4615389CDA9BEB21B6D8490FF94C
3,539,986 UART: Caliptra RT
3,540,329 UART: [state] CFI Enabled
3,659,953 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,193 UART: [rt]cmd =0x46505652, len=4
3,690,853 UART: [rt] FIPS Version
3,691,852 >>> mbox cmd response data (36 bytes)
3,691,853 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,136 UART: [rt]cmd =0x46504c54, len=4
3,722,272 >>> mbox cmd response data (8 bytes)
3,722,273 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,751,948 UART: [rt]cmd =0x46504c67, len=4
3,752,962 >>> mbox cmd response: failed
3,753,106 UART: [rt] FIPS self test
3,753,437 UART: [kat] ++
3,753,589 UART: [kat] sha1
3,757,976 UART: [kat] SHA2-256
3,759,906 UART: [kat] SHA2-384
3,762,759 UART: [kat] SHA2-512-ACC
3,764,654 UART: [kat] ECC-384
3,774,149 UART: [kat] HMAC-384Kdf
3,778,647 UART: [kat] LMS
4,353,875 UART: [kat] --
6,624,774 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,632,674 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,661,820 UART: [rt]cmd =0x46504c67, len=4
6,662,867 >>> mbox cmd response data (8 bytes)
6,662,868 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,692,305 UART: [rt]cmd =0x49444543, len=4
6,698,754 >>> mbox cmd response data (37 bytes)
6,698,755 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,727,978 UART: [rt]cmd =0x49444549, len=4
6,730,377 >>> mbox cmd response data (104 bytes)
6,730,378 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,759,545 UART: [rt]cmd =0x49444550, len=4
6,769,798 >>> mbox cmd response data (8 bytes)
6,769,799 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,799,242 UART: [rt]cmd =0x4c444556, len=4
6,809,606 >>> mbox cmd response data (687 bytes)
6,809,607 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,839,042 UART: [rt]cmd =0x43455246, len=4
6,851,402 >>> mbox cmd response data (920 bytes)
6,851,403 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,880,704 UART: [rt]cmd =0x43455252, len=4
6,891,485 >>> mbox cmd response data (783 bytes)
6,891,486 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,921,987 UART: [rt]cmd =0x53494756, len=196
6,927,659 >>> mbox cmd response data (8 bytes)
6,927,660 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,957,571 UART: [rt]cmd =0x4d454153, len=108
6,978,429 >>> mbox cmd response data (12 bytes)
6,978,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,007,737 UART: [rt]cmd =0x494e464f, len=4
7,011,529 >>> mbox cmd response data (312 bytes)
7,011,530 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,040,997 UART: [rt]cmd =0x54514754, len=24
7,043,101 >>> mbox cmd response data (8 bytes)
7,043,102 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,072,457 UART: [rt]cmd =0x47544744, len=8
7,074,867 >>> mbox cmd response data (104 bytes)
7,074,868 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,104,233 UART: [rt]cmd =0x50435252, len=8
7,105,885 >>> mbox cmd response data (8 bytes)
7,105,886 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,135,449 UART: [rt]cmd =0x50435251, len=36
7,303,025 >>> mbox cmd response data (1848 bytes)
7,303,026 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,332,851 UART: [rt]cmd =0x50435245, len=56
7,336,382 >>> mbox cmd response data (8 bytes)
7,336,383 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,365,632 UART: [rt]cmd =0x44504543, len=20
7,386,870 >>> mbox cmd response data (44 bytes)
7,386,871 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,416,466 UART: [rt]cmd =0x44504543, len=24
7,444,029 >>> mbox cmd response data (40 bytes)
7,444,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,473,987 UART: [rt]cmd =0x44504543, len=96
7,512,510 >>> mbox cmd response data (56 bytes)
7,512,511 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,542,132 UART: [rt]cmd =0x44504543, len=92
7,771,220 >>> mbox cmd response data (6284 bytes)
7,771,221 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,801,486 UART: [rt]cmd =0x44504543, len=136
7,867,974 >>> mbox cmd response data (136 bytes)
7,867,975 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,897,596 UART: [rt]cmd =0x44504543, len=40
7,925,349 >>> mbox cmd response data (40 bytes)
7,925,350 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,954,823 UART: [rt]cmd =0x44504543, len=28
7,997,908 >>> mbox cmd response data (2076 bytes)
7,997,909 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,027,606 UART: [rt]cmd =0x44504543, len=36
8,058,075 >>> mbox cmd response data (24 bytes)
8,058,076 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,087,375 UART: [rt]cmd =0x4453424c, len=4
8,104,393 >>> mbox cmd response data (8 bytes)
8,104,394 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,133,829 UART: [rt]cmd =0x46505344, len=4
8,242,164 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,512 ready_for_fw is high
1,362,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,571 >>> mbox cmd response: success
2,980,571 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,042,186 UART:
3,042,202 UART: Running Caliptra FMC ...
3,042,610 UART:
3,042,753 UART: [state] CFI Enabled
3,053,533 UART: [fht] FMC Alias Private Key: 7
3,171,991 UART: [art] Extend RT PCRs Done
3,172,419 UART: [art] Lock RT PCRs Done
3,174,159 UART: [art] Populate DV Done
3,182,644 UART: [fht] FMC Alias Private Key: 7
3,183,634 UART: [art] Derive CDI
3,183,914 UART: [art] Store in slot 0x4
3,269,476 UART: [art] Derive Key Pair
3,269,836 UART: [art] Store priv key in slot 0x5
3,283,257 UART: [art] Derive Key Pair - Done
3,297,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,602 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,367 UART: [art] PUB.X = EBCEAE2DF929A182F865AAF7A9C418F7F54AFD70C84E68A01328DE15143138D9FDCDB1E40EC5B836C2AB07F0DADB881C
3,321,157 UART: [art] PUB.Y = EFC394C7C71E2773C30F5F6651F6F8F04ADDEB007764FBCC998CA5C6EB71657DD6FF433C8AC28F563EE961FBA986E7C1
3,328,102 UART: [art] SIG.R = DF5AFC24A6633F73A1B59CA103F7548343B29E34D27084411D4763D639119CD04F37467033D7F0C374F7277279CFBDD8
3,334,865 UART: [art] SIG.S = 9F12A798DBA6B49378C84B92C0F24A87ECE863F9B8B227F6D0A8C140408E0C0862B5E950858B2BF9251F3B9BA74B0168
3,358,570 UART: Caliptra RT
3,358,913 UART: [state] CFI Enabled
3,479,844 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,280 UART: [rt]cmd =0x46505652, len=4
3,510,940 UART: [rt] FIPS Version
3,512,027 >>> mbox cmd response data (36 bytes)
3,512,028 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,383 UART: [rt]cmd =0x46504c54, len=4
3,542,543 >>> mbox cmd response data (8 bytes)
3,542,544 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,572,027 UART: [rt]cmd =0x46504c67, len=4
3,572,925 >>> mbox cmd response: failed
3,573,261 UART: [rt] FIPS self test
3,573,592 UART: [kat] ++
3,573,744 UART: [kat] sha1
3,577,979 UART: [kat] SHA2-256
3,579,909 UART: [kat] SHA2-384
3,582,854 UART: [kat] SHA2-512-ACC
3,584,749 UART: [kat] ECC-384
3,594,544 UART: [kat] HMAC-384Kdf
3,599,086 UART: [kat] LMS
4,174,314 UART: [kat] --
6,337,575 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,342,648 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,372,074 UART: [rt]cmd =0x46504c67, len=4
6,373,355 >>> mbox cmd response data (8 bytes)
6,373,356 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,402,675 UART: [rt]cmd =0x49444543, len=4
6,409,188 >>> mbox cmd response data (37 bytes)
6,409,189 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,438,590 UART: [rt]cmd =0x49444549, len=4
6,441,019 >>> mbox cmd response data (104 bytes)
6,441,020 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,470,343 UART: [rt]cmd =0x49444550, len=4
6,480,549 >>> mbox cmd response data (8 bytes)
6,480,550 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,510,037 UART: [rt]cmd =0x4c444556, len=4
6,520,339 >>> mbox cmd response data (687 bytes)
6,520,340 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,549,751 UART: [rt]cmd =0x43455246, len=4
6,561,965 >>> mbox cmd response data (920 bytes)
6,561,966 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,591,279 UART: [rt]cmd =0x43455252, len=4
6,601,967 >>> mbox cmd response data (784 bytes)
6,601,968 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,632,617 UART: [rt]cmd =0x53494756, len=196
6,637,847 >>> mbox cmd response data (8 bytes)
6,637,848 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,667,893 UART: [rt]cmd =0x4d454153, len=108
6,688,091 >>> mbox cmd response data (12 bytes)
6,688,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,717,627 UART: [rt]cmd =0x494e464f, len=4
6,721,187 >>> mbox cmd response data (312 bytes)
6,721,188 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,750,563 UART: [rt]cmd =0x54514754, len=24
6,752,635 >>> mbox cmd response data (8 bytes)
6,752,636 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,781,903 UART: [rt]cmd =0x47544744, len=8
6,784,141 >>> mbox cmd response data (104 bytes)
6,784,142 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,813,495 UART: [rt]cmd =0x50435252, len=8
6,814,855 >>> mbox cmd response data (8 bytes)
6,814,856 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,844,493 UART: [rt]cmd =0x50435251, len=36
7,012,003 >>> mbox cmd response data (1848 bytes)
7,012,004 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,041,865 UART: [rt]cmd =0x50435245, len=56
7,045,318 >>> mbox cmd response data (8 bytes)
7,045,319 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,074,846 UART: [rt]cmd =0x44504543, len=20
7,095,868 >>> mbox cmd response data (44 bytes)
7,095,869 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,125,322 UART: [rt]cmd =0x44504543, len=24
7,152,707 >>> mbox cmd response data (40 bytes)
7,152,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,182,599 UART: [rt]cmd =0x44504543, len=96
7,220,230 >>> mbox cmd response data (56 bytes)
7,220,231 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,249,986 UART: [rt]cmd =0x44504543, len=92
7,479,949 >>> mbox cmd response data (6284 bytes)
7,479,950 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,510,153 UART: [rt]cmd =0x44504543, len=136
7,576,331 >>> mbox cmd response data (136 bytes)
7,576,332 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,605,871 UART: [rt]cmd =0x44504543, len=40
7,632,872 >>> mbox cmd response data (40 bytes)
7,632,873 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,662,292 UART: [rt]cmd =0x44504543, len=28
7,705,569 >>> mbox cmd response data (2076 bytes)
7,705,570 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,734,999 UART: [rt]cmd =0x44504543, len=36
7,765,538 >>> mbox cmd response data (24 bytes)
7,765,539 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,794,644 UART: [rt]cmd =0x4453424c, len=4
7,812,756 >>> mbox cmd response data (8 bytes)
7,812,757 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,842,008 UART: [rt]cmd =0x46505344, len=4
7,950,597 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,018 UART: [kat] ++
895,170 UART: [kat] sha1
899,428 UART: [kat] SHA2-256
901,368 UART: [kat] SHA2-384
904,039 UART: [kat] SHA2-512-ACC
905,940 UART: [kat] ECC-384
915,449 UART: [kat] HMAC-384Kdf
919,911 UART: [kat] LMS
1,168,223 UART: [kat] --
1,168,986 UART: [cold-reset] ++
1,169,458 UART: [fht] FHT @ 0x50003400
1,172,128 UART: [idev] ++
1,172,296 UART: [idev] CDI.KEYID = 6
1,172,657 UART: [idev] SUBJECT.KEYID = 7
1,173,082 UART: [idev] UDS.KEYID = 0
1,173,428 ready_for_fw is high
1,173,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,871 UART: [idev] Erasing UDS.KEYID = 0
1,197,829 UART: [idev] Sha1 KeyId Algorithm
1,206,623 UART: [idev] --
1,207,658 UART: [ldev] ++
1,207,826 UART: [ldev] CDI.KEYID = 6
1,208,190 UART: [ldev] SUBJECT.KEYID = 5
1,208,617 UART: [ldev] AUTHORITY.KEYID = 7
1,209,080 UART: [ldev] FE.KEYID = 1
1,213,914 UART: [ldev] Erasing FE.KEYID = 1
1,239,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,962 UART: [ldev] --
1,279,199 UART: [fwproc] Wait for Commands...
1,279,902 UART: [fwproc] Recv command 0x46574c44
1,280,635 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,823 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,998 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,355 >>> mbox cmd response: success
2,823,355 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,824,587 UART: [afmc] ++
2,824,755 UART: [afmc] CDI.KEYID = 6
2,825,118 UART: [afmc] SUBJECT.KEYID = 7
2,825,544 UART: [afmc] AUTHORITY.KEYID = 5
2,860,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,611 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,321 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,202 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,894,903 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,676 UART: [afmc] --
2,903,589 UART: [cold-reset] --
2,904,379 UART: [state] Locking Datavault
2,905,536 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,140 UART: [state] Locking ICCM
2,906,568 UART: [exit] Launching FMC @ 0x40000130
2,911,898 UART:
2,911,914 UART: Running Caliptra FMC ...
2,912,322 UART:
2,912,376 UART: [state] CFI Enabled
2,922,942 UART: [fht] FMC Alias Private Key: 7
3,042,104 UART: [art] Extend RT PCRs Done
3,042,532 UART: [art] Lock RT PCRs Done
3,044,080 UART: [art] Populate DV Done
3,052,089 UART: [fht] FMC Alias Private Key: 7
3,053,091 UART: [art] Derive CDI
3,053,371 UART: [art] Store in slot 0x4
3,138,980 UART: [art] Derive Key Pair
3,139,340 UART: [art] Store priv key in slot 0x5
3,152,822 UART: [art] Derive Key Pair - Done
3,167,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,881 UART: [art] PUB.X = C0FF6BD6321C4452B998EF8E2EADFF03E65C19653434AA62866A5577FD2F76BDAC92F4D8EE36FEE65C3FA7D705908EC0
3,190,663 UART: [art] PUB.Y = 5F73CC62A571A4E5837402D27129C9300525B2E1F0C4C13F2F528F4B1665952EE59DD6E7BE9EAB4CA83D7909D7D5A9FA
3,197,612 UART: [art] SIG.R = 4B66846D6C0132D003AEBE71F0A44463D4671D102B298ACFBD2385603C6DD2939A20125AAD2E11D60EE2411BE5F07497
3,204,375 UART: [art] SIG.S = B3A510C856682E1385A48B42FA7624D75E8B2602A15E990D1B5343B3A8B692095E089A642B1E61C231C3162288DA3F8E
3,228,499 UART: Caliptra RT
3,228,750 UART: [state] CFI Enabled
3,348,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,837 UART: [rt]cmd =0x46505652, len=4
3,379,497 UART: [rt] FIPS Version
3,380,522 >>> mbox cmd response data (36 bytes)
3,380,523 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,014 UART: [rt]cmd =0x46504c54, len=4
3,411,224 >>> mbox cmd response data (8 bytes)
3,411,225 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,440,918 UART: [rt]cmd =0x46504c67, len=4
3,442,118 >>> mbox cmd response: failed
3,442,478 UART: [rt] FIPS self test
3,442,809 UART: [kat] ++
3,442,961 UART: [kat] sha1
3,447,038 UART: [kat] SHA2-256
3,448,968 UART: [kat] SHA2-384
3,451,675 UART: [kat] SHA2-512-ACC
3,453,570 UART: [kat] ECC-384
3,463,231 UART: [kat] HMAC-384Kdf
3,467,884 UART: [kat] LMS
3,727,644 UART: [kat] --
6,006,367 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,011,861 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,041,129 UART: [rt]cmd =0x46504c67, len=4
6,042,438 >>> mbox cmd response data (8 bytes)
6,042,439 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,071,654 UART: [rt]cmd =0x49444543, len=4
6,078,189 >>> mbox cmd response data (37 bytes)
6,078,190 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,107,381 UART: [rt]cmd =0x49444549, len=4
6,109,690 >>> mbox cmd response data (104 bytes)
6,109,691 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,139,072 UART: [rt]cmd =0x49444550, len=4
6,149,375 >>> mbox cmd response data (8 bytes)
6,149,376 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,178,805 UART: [rt]cmd =0x4c444556, len=4
6,189,213 >>> mbox cmd response data (687 bytes)
6,189,214 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,218,673 UART: [rt]cmd =0x43455246, len=4
6,230,620 >>> mbox cmd response data (888 bytes)
6,230,621 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,259,896 UART: [rt]cmd =0x43455252, len=4
6,270,847 >>> mbox cmd response data (783 bytes)
6,270,848 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,301,369 UART: [rt]cmd =0x53494756, len=196
6,307,285 >>> mbox cmd response data (8 bytes)
6,307,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,337,343 UART: [rt]cmd =0x4d454153, len=108
6,358,537 >>> mbox cmd response data (12 bytes)
6,358,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,387,971 UART: [rt]cmd =0x494e464f, len=4
6,391,805 >>> mbox cmd response data (312 bytes)
6,391,806 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,421,237 UART: [rt]cmd =0x54514754, len=24
6,423,557 >>> mbox cmd response data (8 bytes)
6,423,558 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,452,867 UART: [rt]cmd =0x47544744, len=8
6,454,971 >>> mbox cmd response data (104 bytes)
6,454,972 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,484,111 UART: [rt]cmd =0x50435252, len=8
6,485,623 >>> mbox cmd response data (8 bytes)
6,485,624 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,515,415 UART: [rt]cmd =0x50435251, len=36
6,682,819 >>> mbox cmd response data (1848 bytes)
6,682,820 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,712,483 UART: [rt]cmd =0x50435245, len=56
6,716,032 >>> mbox cmd response data (8 bytes)
6,716,033 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,745,460 UART: [rt]cmd =0x44504543, len=20
6,766,708 >>> mbox cmd response data (44 bytes)
6,766,709 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,796,352 UART: [rt]cmd =0x44504543, len=24
6,824,121 >>> mbox cmd response data (40 bytes)
6,824,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,854,295 UART: [rt]cmd =0x44504543, len=96
6,892,254 >>> mbox cmd response data (56 bytes)
6,892,255 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,922,106 UART: [rt]cmd =0x44504543, len=92
7,151,235 >>> mbox cmd response data (6284 bytes)
7,151,236 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,181,477 UART: [rt]cmd =0x44504543, len=136
7,247,451 >>> mbox cmd response data (136 bytes)
7,247,452 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,276,995 UART: [rt]cmd =0x44504543, len=40
7,304,458 >>> mbox cmd response data (40 bytes)
7,304,459 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,333,866 UART: [rt]cmd =0x44504543, len=28
7,377,199 >>> mbox cmd response data (2076 bytes)
7,377,200 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,406,789 UART: [rt]cmd =0x44504543, len=36
7,437,288 >>> mbox cmd response data (24 bytes)
7,437,289 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,466,702 UART: [rt]cmd =0x4453424c, len=4
7,484,434 >>> mbox cmd response data (8 bytes)
7,484,435 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,513,990 UART: [rt]cmd =0x46505344, len=4
7,622,325 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,412 ready_for_fw is high
1,059,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,544 >>> mbox cmd response: success
2,679,544 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,742,231 UART:
2,742,247 UART: Running Caliptra FMC ...
2,742,655 UART:
2,742,709 UART: [state] CFI Enabled
2,753,427 UART: [fht] FMC Alias Private Key: 7
2,872,351 UART: [art] Extend RT PCRs Done
2,872,779 UART: [art] Lock RT PCRs Done
2,874,203 UART: [art] Populate DV Done
2,882,250 UART: [fht] FMC Alias Private Key: 7
2,883,306 UART: [art] Derive CDI
2,883,586 UART: [art] Store in slot 0x4
2,969,433 UART: [art] Derive Key Pair
2,969,793 UART: [art] Store priv key in slot 0x5
2,983,323 UART: [art] Derive Key Pair - Done
2,997,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,160 UART: [art] PUB.X = 6D6EE9166820B38968DCEF90FB1C719B44DA7E75787982069660803632923041B9849F8D9DC8F99CD5C986952CB4EF3B
3,020,923 UART: [art] PUB.Y = B4D2C4B8F94115FE070C9018FD22B0DB4D20027DDAA2AB99B02A9F38F12ECD1C203BD353B011BC05FE008C5D2BBBB2EE
3,027,863 UART: [art] SIG.R = 79F4409EF0B33182C97C9CCEC424B3CC03FA4345D669801796B59A2DAFC83052AAC6C8200B14CC115645B8DB25526EE6
3,034,633 UART: [art] SIG.S = B6C59D392843C13DF1BF4AF160AD3D6A7D75E6BD0B2235038B664132F72C0801C9B38E0F386E53A552B690110FB131A0
3,058,763 UART: Caliptra RT
3,059,014 UART: [state] CFI Enabled
3,179,369 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,091 UART: [rt]cmd =0x46505652, len=4
3,210,751 UART: [rt] FIPS Version
3,211,824 >>> mbox cmd response data (36 bytes)
3,211,825 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,962 UART: [rt]cmd =0x46504c54, len=4
3,242,168 >>> mbox cmd response data (8 bytes)
3,242,169 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,271,944 UART: [rt]cmd =0x46504c67, len=4
3,272,812 >>> mbox cmd response: failed
3,272,990 UART: [rt] FIPS self test
3,273,321 UART: [kat] ++
3,273,473 UART: [kat] sha1
3,277,754 UART: [kat] SHA2-256
3,279,684 UART: [kat] SHA2-384
3,282,211 UART: [kat] SHA2-512-ACC
3,284,106 UART: [kat] ECC-384
3,293,931 UART: [kat] HMAC-384Kdf
3,298,614 UART: [kat] LMS
3,558,374 UART: [kat] --
5,732,195 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,742,565 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,771,939 UART: [rt]cmd =0x46504c67, len=4
5,773,252 >>> mbox cmd response data (8 bytes)
5,773,253 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,802,492 UART: [rt]cmd =0x49444543, len=4
5,808,857 >>> mbox cmd response data (37 bytes)
5,808,858 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,838,155 UART: [rt]cmd =0x49444549, len=4
5,840,480 >>> mbox cmd response data (104 bytes)
5,840,481 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,869,930 UART: [rt]cmd =0x49444550, len=4
5,880,151 >>> mbox cmd response data (8 bytes)
5,880,152 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,909,657 UART: [rt]cmd =0x4c444556, len=4
5,920,143 >>> mbox cmd response data (687 bytes)
5,920,144 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,949,361 UART: [rt]cmd =0x43455246, len=4
5,961,402 >>> mbox cmd response data (888 bytes)
5,961,403 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,990,764 UART: [rt]cmd =0x43455252, len=4
6,001,591 >>> mbox cmd response data (783 bytes)
6,001,592 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,032,075 UART: [rt]cmd =0x53494756, len=196
6,037,171 >>> mbox cmd response data (8 bytes)
6,037,172 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,066,987 UART: [rt]cmd =0x4d454153, len=108
6,088,129 >>> mbox cmd response data (12 bytes)
6,088,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,117,459 UART: [rt]cmd =0x494e464f, len=4
6,121,275 >>> mbox cmd response data (312 bytes)
6,121,276 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,150,821 UART: [rt]cmd =0x54514754, len=24
6,152,925 >>> mbox cmd response data (8 bytes)
6,152,926 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,182,271 UART: [rt]cmd =0x47544744, len=8
6,184,589 >>> mbox cmd response data (104 bytes)
6,184,590 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,214,283 UART: [rt]cmd =0x50435252, len=8
6,215,805 >>> mbox cmd response data (8 bytes)
6,215,806 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,245,141 UART: [rt]cmd =0x50435251, len=36
6,412,739 >>> mbox cmd response data (1848 bytes)
6,412,740 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,442,407 UART: [rt]cmd =0x50435245, len=56
6,446,044 >>> mbox cmd response data (8 bytes)
6,446,045 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,475,386 UART: [rt]cmd =0x44504543, len=20
6,496,048 >>> mbox cmd response data (44 bytes)
6,496,049 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,525,712 UART: [rt]cmd =0x44504543, len=24
6,553,455 >>> mbox cmd response data (40 bytes)
6,553,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,583,241 UART: [rt]cmd =0x44504543, len=96
6,621,344 >>> mbox cmd response data (56 bytes)
6,621,345 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,651,480 UART: [rt]cmd =0x44504543, len=92
6,881,283 >>> mbox cmd response data (6284 bytes)
6,881,284 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,911,553 UART: [rt]cmd =0x44504543, len=136
6,978,101 >>> mbox cmd response data (136 bytes)
6,978,102 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,007,733 UART: [rt]cmd =0x44504543, len=40
7,035,436 >>> mbox cmd response data (40 bytes)
7,035,437 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,064,970 UART: [rt]cmd =0x44504543, len=28
7,107,885 >>> mbox cmd response data (2076 bytes)
7,107,886 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,137,423 UART: [rt]cmd =0x44504543, len=36
7,167,342 >>> mbox cmd response data (24 bytes)
7,167,343 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,196,898 UART: [rt]cmd =0x4453424c, len=4
7,214,168 >>> mbox cmd response data (8 bytes)
7,214,169 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,243,516 UART: [rt]cmd =0x46505344, len=4
7,352,167 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
891,585 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,689 UART: [kat] ++
895,841 UART: [kat] sha1
899,875 UART: [kat] SHA2-256
901,815 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,750 UART: [kat] LMS
1,169,062 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,201 UART: [fht] FHT @ 0x50003400
1,172,971 UART: [idev] ++
1,173,139 UART: [idev] CDI.KEYID = 6
1,173,500 UART: [idev] SUBJECT.KEYID = 7
1,173,925 UART: [idev] UDS.KEYID = 0
1,174,271 ready_for_fw is high
1,174,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,824 UART: [idev] Erasing UDS.KEYID = 0
1,198,918 UART: [idev] Sha1 KeyId Algorithm
1,207,798 UART: [idev] --
1,208,959 UART: [ldev] ++
1,209,127 UART: [ldev] CDI.KEYID = 6
1,209,491 UART: [ldev] SUBJECT.KEYID = 5
1,209,918 UART: [ldev] AUTHORITY.KEYID = 7
1,210,381 UART: [ldev] FE.KEYID = 1
1,215,667 UART: [ldev] Erasing FE.KEYID = 1
1,242,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,513 UART: [ldev] --
1,281,780 UART: [fwproc] Wait for Commands...
1,282,525 UART: [fwproc] Recv command 0x46574c44
1,283,258 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,556 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,731 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,128 >>> mbox cmd response: success
2,826,128 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,827,256 UART: [afmc] ++
2,827,424 UART: [afmc] CDI.KEYID = 6
2,827,787 UART: [afmc] SUBJECT.KEYID = 7
2,828,213 UART: [afmc] AUTHORITY.KEYID = 5
2,863,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,946 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,656 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,537 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,238 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,009 UART: [afmc] --
2,907,030 UART: [cold-reset] --
2,908,010 UART: [state] Locking Datavault
2,909,099 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,703 UART: [state] Locking ICCM
2,910,249 UART: [exit] Launching FMC @ 0x40000130
2,915,579 UART:
2,915,595 UART: Running Caliptra FMC ...
2,916,003 UART:
2,916,146 UART: [state] CFI Enabled
2,926,700 UART: [fht] FMC Alias Private Key: 7
3,045,372 UART: [art] Extend RT PCRs Done
3,045,800 UART: [art] Lock RT PCRs Done
3,047,250 UART: [art] Populate DV Done
3,055,461 UART: [fht] FMC Alias Private Key: 7
3,056,535 UART: [art] Derive CDI
3,056,815 UART: [art] Store in slot 0x4
3,142,680 UART: [art] Derive Key Pair
3,143,040 UART: [art] Store priv key in slot 0x5
3,156,088 UART: [art] Derive Key Pair - Done
3,171,042 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,304 UART: [art] PUB.X = 2C2A73FEA5B26645F031F1765437AB024A7D551FE8A3C6EE2B8FDDA7EBB5945CDC5757B11CB928B5AAD54CE3EACFA475
3,194,095 UART: [art] PUB.Y = C12EAF98412B19DF89882901C7A6122070261F6DD8524D2BD97CD4C466E149DAB9C5D8C4FDB77C35EFB53103F307C0D9
3,201,044 UART: [art] SIG.R = C54F73DBB5E406D5C2B040A46ECF33E4F7504D03BC71C941FB9272E1BB752A1DFEB799DF81D31AA53F8EC79D4C84D49A
3,207,828 UART: [art] SIG.S = 26D161BB04082E054B049057116ED1839719E2D3D54EE454C9C620E45BDFA2AC33C5BD88BE4BDC2AE637C5B22148C1D5
3,231,260 UART: Caliptra RT
3,231,603 UART: [state] CFI Enabled
3,352,138 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,878 UART: [rt]cmd =0x46505652, len=4
3,383,538 UART: [rt] FIPS Version
3,384,509 >>> mbox cmd response data (36 bytes)
3,384,510 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,731 UART: [rt]cmd =0x46504c54, len=4
3,414,959 >>> mbox cmd response data (8 bytes)
3,414,960 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,444,585 UART: [rt]cmd =0x46504c67, len=4
3,445,565 >>> mbox cmd response: failed
3,445,681 UART: [rt] FIPS self test
3,446,012 UART: [kat] ++
3,446,164 UART: [kat] sha1
3,450,247 UART: [kat] SHA2-256
3,452,177 UART: [kat] SHA2-384
3,454,880 UART: [kat] SHA2-512-ACC
3,456,775 UART: [kat] ECC-384
3,466,696 UART: [kat] HMAC-384Kdf
3,471,439 UART: [kat] LMS
3,731,199 UART: [kat] --
6,010,926 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,015,308 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,044,590 UART: [rt]cmd =0x46504c67, len=4
6,045,663 >>> mbox cmd response data (8 bytes)
6,045,664 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,075,049 UART: [rt]cmd =0x49444543, len=4
6,081,420 >>> mbox cmd response data (37 bytes)
6,081,421 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,110,660 UART: [rt]cmd =0x49444549, len=4
6,113,103 >>> mbox cmd response data (104 bytes)
6,113,104 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,142,317 UART: [rt]cmd =0x49444550, len=4
6,152,548 >>> mbox cmd response data (8 bytes)
6,152,549 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,182,052 UART: [rt]cmd =0x4c444556, len=4
6,192,492 >>> mbox cmd response data (687 bytes)
6,192,493 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,221,910 UART: [rt]cmd =0x43455246, len=4
6,234,061 >>> mbox cmd response data (888 bytes)
6,234,062 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,263,515 UART: [rt]cmd =0x43455252, len=4
6,274,284 >>> mbox cmd response data (783 bytes)
6,274,285 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,305,220 UART: [rt]cmd =0x53494756, len=196
6,310,750 >>> mbox cmd response data (8 bytes)
6,310,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,340,476 UART: [rt]cmd =0x4d454153, len=108
6,361,312 >>> mbox cmd response data (12 bytes)
6,361,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,390,640 UART: [rt]cmd =0x494e464f, len=4
6,394,444 >>> mbox cmd response data (312 bytes)
6,394,445 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,423,840 UART: [rt]cmd =0x54514754, len=24
6,425,902 >>> mbox cmd response data (8 bytes)
6,425,903 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,455,222 UART: [rt]cmd =0x47544744, len=8
6,457,552 >>> mbox cmd response data (104 bytes)
6,457,553 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,486,778 UART: [rt]cmd =0x50435252, len=8
6,488,160 >>> mbox cmd response data (8 bytes)
6,488,161 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,517,644 UART: [rt]cmd =0x50435251, len=36
6,684,746 >>> mbox cmd response data (1848 bytes)
6,684,747 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,714,660 UART: [rt]cmd =0x50435245, len=56
6,718,361 >>> mbox cmd response data (8 bytes)
6,718,362 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,747,703 UART: [rt]cmd =0x44504543, len=20
6,768,571 >>> mbox cmd response data (44 bytes)
6,768,572 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,798,151 UART: [rt]cmd =0x44504543, len=24
6,825,374 >>> mbox cmd response data (40 bytes)
6,825,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,855,206 UART: [rt]cmd =0x44504543, len=96
6,893,633 >>> mbox cmd response data (56 bytes)
6,893,634 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,923,553 UART: [rt]cmd =0x44504543, len=92
7,153,009 >>> mbox cmd response data (6284 bytes)
7,153,010 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,183,215 UART: [rt]cmd =0x44504543, len=136
7,250,301 >>> mbox cmd response data (136 bytes)
7,250,302 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,279,979 UART: [rt]cmd =0x44504543, len=40
7,307,234 >>> mbox cmd response data (40 bytes)
7,307,235 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,336,734 UART: [rt]cmd =0x44504543, len=28
7,380,227 >>> mbox cmd response data (2076 bytes)
7,380,228 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,409,757 UART: [rt]cmd =0x44504543, len=36
7,439,682 >>> mbox cmd response data (24 bytes)
7,439,683 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,469,074 UART: [rt]cmd =0x4453424c, len=4
7,486,778 >>> mbox cmd response data (8 bytes)
7,486,779 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,516,154 UART: [rt]cmd =0x46505344, len=4
7,624,533 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,263 ready_for_fw is high
1,059,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,495 >>> mbox cmd response: success
2,678,495 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,742,124 UART:
2,742,140 UART: Running Caliptra FMC ...
2,742,548 UART:
2,742,691 UART: [state] CFI Enabled
2,753,219 UART: [fht] FMC Alias Private Key: 7
2,871,961 UART: [art] Extend RT PCRs Done
2,872,389 UART: [art] Lock RT PCRs Done
2,874,131 UART: [art] Populate DV Done
2,882,352 UART: [fht] FMC Alias Private Key: 7
2,883,440 UART: [art] Derive CDI
2,883,720 UART: [art] Store in slot 0x4
2,969,519 UART: [art] Derive Key Pair
2,969,879 UART: [art] Store priv key in slot 0x5
2,983,433 UART: [art] Derive Key Pair - Done
2,998,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,245 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,010 UART: [art] PUB.X = 84DE9788B18E360FEAFFB4F833866F3EEE2B6ECD9AE99FFF2F82F70AEC75153CC85C11F5F1CEC574B0D5352F5CC260E5
3,020,798 UART: [art] PUB.Y = 616E4861BDE0A4027AFDA9C966EB7F887BE24FBFD85B3DF080B62A801A16891983D407ED7DFE77FA409C001E2A39F6EE
3,027,736 UART: [art] SIG.R = D7AC837735CE9B2897D8104A61A644FA9E4D06535F25CB1B2D042348EBD4353A0599BAA42A873BB8D2566468E4C99734
3,034,497 UART: [art] SIG.S = 7B4A61CE5EF3BE4FDE5E31419978899C8DE260E0CDDE82A16CF643CB8FEADF41816B99A913D0E8E055538D00E5D69B35
3,058,059 UART: Caliptra RT
3,058,402 UART: [state] CFI Enabled
3,178,503 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,217 UART: [rt]cmd =0x46505652, len=4
3,209,877 UART: [rt] FIPS Version
3,210,976 >>> mbox cmd response data (36 bytes)
3,210,977 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,042 UART: [rt]cmd =0x46504c54, len=4
3,241,072 >>> mbox cmd response data (8 bytes)
3,241,073 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,270,976 UART: [rt]cmd =0x46504c67, len=4
3,271,874 >>> mbox cmd response: failed
3,272,200 UART: [rt] FIPS self test
3,272,531 UART: [kat] ++
3,272,683 UART: [kat] sha1
3,277,030 UART: [kat] SHA2-256
3,278,960 UART: [kat] SHA2-384
3,281,609 UART: [kat] SHA2-512-ACC
3,283,504 UART: [kat] ECC-384
3,293,433 UART: [kat] HMAC-384Kdf
3,297,962 UART: [kat] LMS
3,557,722 UART: [kat] --
5,732,931 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,741,627 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,770,981 UART: [rt]cmd =0x46504c67, len=4
5,772,290 >>> mbox cmd response data (8 bytes)
5,772,291 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,801,466 UART: [rt]cmd =0x49444543, len=4
5,807,935 >>> mbox cmd response data (37 bytes)
5,807,936 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,837,097 UART: [rt]cmd =0x49444549, len=4
5,839,334 >>> mbox cmd response data (104 bytes)
5,839,335 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,868,450 UART: [rt]cmd =0x49444550, len=4
5,878,619 >>> mbox cmd response data (8 bytes)
5,878,620 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,908,153 UART: [rt]cmd =0x4c444556, len=4
5,918,553 >>> mbox cmd response data (687 bytes)
5,918,554 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,947,801 UART: [rt]cmd =0x43455246, len=4
5,959,828 >>> mbox cmd response data (888 bytes)
5,959,829 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,989,056 UART: [rt]cmd =0x43455252, len=4
5,999,865 >>> mbox cmd response data (783 bytes)
5,999,866 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,030,601 UART: [rt]cmd =0x53494756, len=196
6,035,953 >>> mbox cmd response data (8 bytes)
6,035,954 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,065,767 UART: [rt]cmd =0x4d454153, len=108
6,086,993 >>> mbox cmd response data (12 bytes)
6,086,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,116,475 UART: [rt]cmd =0x494e464f, len=4
6,120,139 >>> mbox cmd response data (312 bytes)
6,120,140 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,149,737 UART: [rt]cmd =0x54514754, len=24
6,152,111 >>> mbox cmd response data (8 bytes)
6,152,112 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,181,457 UART: [rt]cmd =0x47544744, len=8
6,183,875 >>> mbox cmd response data (104 bytes)
6,183,876 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,213,429 UART: [rt]cmd =0x50435252, len=8
6,214,931 >>> mbox cmd response data (8 bytes)
6,214,932 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,244,543 UART: [rt]cmd =0x50435251, len=36
6,412,051 >>> mbox cmd response data (1848 bytes)
6,412,052 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,441,723 UART: [rt]cmd =0x50435245, len=56
6,445,384 >>> mbox cmd response data (8 bytes)
6,445,385 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,474,632 UART: [rt]cmd =0x44504543, len=20
6,495,740 >>> mbox cmd response data (44 bytes)
6,495,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,525,448 UART: [rt]cmd =0x44504543, len=24
6,552,511 >>> mbox cmd response data (40 bytes)
6,552,512 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,582,793 UART: [rt]cmd =0x44504543, len=96
6,620,918 >>> mbox cmd response data (56 bytes)
6,620,919 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,651,092 UART: [rt]cmd =0x44504543, len=92
6,880,941 >>> mbox cmd response data (6284 bytes)
6,880,942 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,911,247 UART: [rt]cmd =0x44504543, len=136
6,977,935 >>> mbox cmd response data (136 bytes)
6,977,936 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,007,593 UART: [rt]cmd =0x44504543, len=40
7,035,012 >>> mbox cmd response data (40 bytes)
7,035,013 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,064,448 UART: [rt]cmd =0x44504543, len=28
7,107,997 >>> mbox cmd response data (2076 bytes)
7,107,998 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,137,459 UART: [rt]cmd =0x44504543, len=36
7,167,838 >>> mbox cmd response data (24 bytes)
7,167,839 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,197,052 UART: [rt]cmd =0x4453424c, len=4
7,214,902 >>> mbox cmd response data (8 bytes)
7,214,903 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,244,340 UART: [rt]cmd =0x46505344, len=4
7,353,011 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
893,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,635 UART: [kat] ++
897,787 UART: [kat] sha1
901,951 UART: [kat] SHA2-256
903,891 UART: [kat] SHA2-384
906,398 UART: [kat] SHA2-512-ACC
908,299 UART: [kat] ECC-384
918,204 UART: [kat] HMAC-384Kdf
922,680 UART: [kat] LMS
1,171,008 UART: [kat] --
1,171,959 UART: [cold-reset] ++
1,172,291 UART: [fht] FHT @ 0x50003400
1,174,906 UART: [idev] ++
1,175,074 UART: [idev] CDI.KEYID = 6
1,175,434 UART: [idev] SUBJECT.KEYID = 7
1,175,858 UART: [idev] UDS.KEYID = 0
1,176,203 ready_for_fw is high
1,176,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,632 UART: [idev] Erasing UDS.KEYID = 0
1,200,467 UART: [idev] Sha1 KeyId Algorithm
1,208,903 UART: [idev] --
1,209,915 UART: [ldev] ++
1,210,083 UART: [ldev] CDI.KEYID = 6
1,210,446 UART: [ldev] SUBJECT.KEYID = 5
1,210,872 UART: [ldev] AUTHORITY.KEYID = 7
1,211,335 UART: [ldev] FE.KEYID = 1
1,216,523 UART: [ldev] Erasing FE.KEYID = 1
1,242,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,379 UART: [ldev] --
1,281,768 UART: [fwproc] Wait for Commands...
1,282,536 UART: [fwproc] Recv command 0x46574c44
1,283,264 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,798 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,968 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,179 >>> mbox cmd response: success
2,827,179 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,828,399 UART: [afmc] ++
2,828,567 UART: [afmc] CDI.KEYID = 6
2,828,929 UART: [afmc] SUBJECT.KEYID = 7
2,829,354 UART: [afmc] AUTHORITY.KEYID = 5
2,864,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,558 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,267 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,150 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,851 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,723 UART: [afmc] --
2,907,669 UART: [cold-reset] --
2,908,461 UART: [state] Locking Datavault
2,909,698 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,302 UART: [state] Locking ICCM
2,910,734 UART: [exit] Launching FMC @ 0x40000130
2,916,064 UART:
2,916,080 UART: Running Caliptra FMC ...
2,916,488 UART:
2,916,542 UART: [state] CFI Enabled
2,927,194 UART: [fht] FMC Alias Private Key: 7
3,046,580 UART: [art] Extend RT PCRs Done
3,047,008 UART: [art] Lock RT PCRs Done
3,048,254 UART: [art] Populate DV Done
3,056,609 UART: [fht] FMC Alias Private Key: 7
3,057,675 UART: [art] Derive CDI
3,057,955 UART: [art] Store in slot 0x4
3,143,874 UART: [art] Derive Key Pair
3,144,234 UART: [art] Store priv key in slot 0x5
3,157,930 UART: [art] Derive Key Pair - Done
3,172,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,357 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,122 UART: [art] PUB.X = 032CA8E8233945FC572660FAC7258FC36C3A4C343759B4336868A59F0D9BC6ACF32C6D6A982AB995F280FA7B3F16EFED
3,195,896 UART: [art] PUB.Y = 1B7442BBF86A8D10E3E4511FF8364CC2768697CB22E07B841B74E0460C37E6A3393C8A489B10AAC9188E24F7C9C51C4C
3,202,847 UART: [art] SIG.R = 8571C3CDE145A83A774A0837A2B0A906A8B011498C6EBF7C6A778157A4E3F23035B1F36C9FF0614F9C8528B9F1DBAFE5
3,209,619 UART: [art] SIG.S = 3494F0B56D9DE22673DC513CD69E82A56973D3B1350D968C7D2F71CC3DE17F2B867907110B7857B607C303E1B3F62215
3,233,538 UART: Caliptra RT
3,233,789 UART: [state] CFI Enabled
3,352,570 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,782 UART: [rt]cmd =0x46505652, len=4
3,383,442 UART: [rt] FIPS Version
3,384,583 >>> mbox cmd response data (36 bytes)
3,384,584 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,873 UART: [rt]cmd =0x46504c54, len=4
3,414,877 >>> mbox cmd response data (8 bytes)
3,414,878 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,444,499 UART: [rt]cmd =0x46504c67, len=4
3,445,471 >>> mbox cmd response: failed
3,445,743 UART: [rt] FIPS self test
3,446,074 UART: [kat] ++
3,446,226 UART: [kat] sha1
3,450,469 UART: [kat] SHA2-256
3,452,399 UART: [kat] SHA2-384
3,455,298 UART: [kat] SHA2-512-ACC
3,457,193 UART: [kat] ECC-384
3,467,012 UART: [kat] HMAC-384Kdf
3,471,671 UART: [kat] LMS
3,731,431 UART: [kat] --
6,011,658 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,015,214 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,044,540 UART: [rt]cmd =0x46504c67, len=4
6,045,613 >>> mbox cmd response data (8 bytes)
6,045,614 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,075,023 UART: [rt]cmd =0x49444543, len=4
6,081,350 >>> mbox cmd response data (37 bytes)
6,081,351 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,110,804 UART: [rt]cmd =0x49444549, len=4
6,112,993 >>> mbox cmd response data (104 bytes)
6,112,994 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,142,505 UART: [rt]cmd =0x49444550, len=4
6,152,526 >>> mbox cmd response data (8 bytes)
6,152,527 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,181,948 UART: [rt]cmd =0x4c444556, len=4
6,192,512 >>> mbox cmd response data (687 bytes)
6,192,513 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,221,820 UART: [rt]cmd =0x43455246, len=4
6,233,745 >>> mbox cmd response data (888 bytes)
6,233,746 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,263,173 UART: [rt]cmd =0x43455252, len=4
6,273,904 >>> mbox cmd response data (783 bytes)
6,273,905 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,304,566 UART: [rt]cmd =0x53494756, len=196
6,309,996 >>> mbox cmd response data (8 bytes)
6,309,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,340,122 UART: [rt]cmd =0x4d454153, len=108
6,360,890 >>> mbox cmd response data (12 bytes)
6,360,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,390,262 UART: [rt]cmd =0x494e464f, len=4
6,393,884 >>> mbox cmd response data (312 bytes)
6,393,885 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,423,456 UART: [rt]cmd =0x54514754, len=24
6,425,590 >>> mbox cmd response data (8 bytes)
6,425,591 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,455,140 UART: [rt]cmd =0x47544744, len=8
6,457,562 >>> mbox cmd response data (104 bytes)
6,457,563 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,486,966 UART: [rt]cmd =0x50435252, len=8
6,488,632 >>> mbox cmd response data (8 bytes)
6,488,633 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,518,408 UART: [rt]cmd =0x50435251, len=36
6,685,750 >>> mbox cmd response data (1848 bytes)
6,685,751 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,715,528 UART: [rt]cmd =0x50435245, len=56
6,719,225 >>> mbox cmd response data (8 bytes)
6,719,226 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,748,751 UART: [rt]cmd =0x44504543, len=20
6,769,147 >>> mbox cmd response data (44 bytes)
6,769,148 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,798,539 UART: [rt]cmd =0x44504543, len=24
6,825,874 >>> mbox cmd response data (40 bytes)
6,825,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,855,912 UART: [rt]cmd =0x44504543, len=96
6,894,557 >>> mbox cmd response data (56 bytes)
6,894,558 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,924,443 UART: [rt]cmd =0x44504543, len=92
7,153,417 >>> mbox cmd response data (6284 bytes)
7,153,418 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,183,689 UART: [rt]cmd =0x44504543, len=136
7,250,999 >>> mbox cmd response data (136 bytes)
7,251,000 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,280,567 UART: [rt]cmd =0x44504543, len=40
7,308,006 >>> mbox cmd response data (40 bytes)
7,308,007 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,337,524 UART: [rt]cmd =0x44504543, len=28
7,380,871 >>> mbox cmd response data (2076 bytes)
7,380,872 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,410,409 UART: [rt]cmd =0x44504543, len=36
7,440,656 >>> mbox cmd response data (24 bytes)
7,440,657 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,469,832 UART: [rt]cmd =0x4453424c, len=4
7,487,022 >>> mbox cmd response data (8 bytes)
7,487,023 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,516,420 UART: [rt]cmd =0x46505344, len=4
7,624,957 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,589 ready_for_fw is high
1,060,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,778 >>> mbox cmd response: success
2,677,778 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,740,315 UART:
2,740,331 UART: Running Caliptra FMC ...
2,740,739 UART:
2,740,793 UART: [state] CFI Enabled
2,751,007 UART: [fht] FMC Alias Private Key: 7
2,870,117 UART: [art] Extend RT PCRs Done
2,870,545 UART: [art] Lock RT PCRs Done
2,871,917 UART: [art] Populate DV Done
2,880,372 UART: [fht] FMC Alias Private Key: 7
2,881,526 UART: [art] Derive CDI
2,881,806 UART: [art] Store in slot 0x4
2,967,431 UART: [art] Derive Key Pair
2,967,791 UART: [art] Store priv key in slot 0x5
2,981,375 UART: [art] Derive Key Pair - Done
2,995,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,401 UART: [art] PUB.X = 0C0971450B6168BF4B86707E212C75147E9CE653A23AC8E89670B575A825B2D8963A1D0DB52D18EADD79A38180D4EFD2
3,019,161 UART: [art] PUB.Y = 493B028EA2ACC4882DEA3CFDA71CF33AEAFC3F895AD55DE196D3F1331B47E891A4651F691D788B4561FB52EC247A3953
3,026,122 UART: [art] SIG.R = 1860AE77D9E84D569DE47C74B1D6AE7B4B23B49BCB854F84ADEA0B315B67122B55ED65293DD6380F2786C7B55C5E959B
3,032,896 UART: [art] SIG.S = 630B592186A6C30F652FFFEDC658C79C20F04F88C21D0155469648ABF77DA731EAD594F2AEC7BD27E34C6680AA4663B4
3,057,373 UART: Caliptra RT
3,057,624 UART: [state] CFI Enabled
3,179,080 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,486 UART: [rt]cmd =0x46505652, len=4
3,210,146 UART: [rt] FIPS Version
3,211,265 >>> mbox cmd response data (36 bytes)
3,211,266 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,595 UART: [rt]cmd =0x46504c54, len=4
3,241,775 >>> mbox cmd response data (8 bytes)
3,241,776 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,271,323 UART: [rt]cmd =0x46504c67, len=4
3,272,121 >>> mbox cmd response: failed
3,272,329 UART: [rt] FIPS self test
3,272,660 UART: [kat] ++
3,272,812 UART: [kat] sha1
3,277,003 UART: [kat] SHA2-256
3,278,933 UART: [kat] SHA2-384
3,281,766 UART: [kat] SHA2-512-ACC
3,283,661 UART: [kat] ECC-384
3,293,802 UART: [kat] HMAC-384Kdf
3,298,381 UART: [kat] LMS
3,558,141 UART: [kat] --
5,733,614 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,741,874 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,771,176 UART: [rt]cmd =0x46504c67, len=4
5,772,409 >>> mbox cmd response data (8 bytes)
5,772,410 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,801,761 UART: [rt]cmd =0x49444543, len=4
5,808,272 >>> mbox cmd response data (37 bytes)
5,808,273 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,837,738 UART: [rt]cmd =0x49444549, len=4
5,840,119 >>> mbox cmd response data (104 bytes)
5,840,120 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,869,427 UART: [rt]cmd =0x49444550, len=4
5,879,591 >>> mbox cmd response data (8 bytes)
5,879,592 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,909,257 UART: [rt]cmd =0x4c444556, len=4
5,919,701 >>> mbox cmd response data (687 bytes)
5,919,702 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,949,007 UART: [rt]cmd =0x43455246, len=4
5,961,066 >>> mbox cmd response data (888 bytes)
5,961,067 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,990,242 UART: [rt]cmd =0x43455252, len=4
6,001,045 >>> mbox cmd response data (782 bytes)
6,001,046 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,031,689 UART: [rt]cmd =0x53494756, len=196
6,036,745 >>> mbox cmd response data (8 bytes)
6,036,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,066,909 UART: [rt]cmd =0x4d454153, len=108
6,088,221 >>> mbox cmd response data (12 bytes)
6,088,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,117,651 UART: [rt]cmd =0x494e464f, len=4
6,121,401 >>> mbox cmd response data (312 bytes)
6,121,402 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,151,021 UART: [rt]cmd =0x54514754, len=24
6,153,157 >>> mbox cmd response data (8 bytes)
6,153,158 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,182,493 UART: [rt]cmd =0x47544744, len=8
6,185,259 >>> mbox cmd response data (104 bytes)
6,185,260 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,214,681 UART: [rt]cmd =0x50435252, len=8
6,216,113 >>> mbox cmd response data (8 bytes)
6,216,114 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,245,479 UART: [rt]cmd =0x50435251, len=36
6,413,035 >>> mbox cmd response data (1848 bytes)
6,413,036 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,442,719 UART: [rt]cmd =0x50435245, len=56
6,446,024 >>> mbox cmd response data (8 bytes)
6,446,025 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,475,466 UART: [rt]cmd =0x44504543, len=20
6,496,410 >>> mbox cmd response data (44 bytes)
6,496,411 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,525,904 UART: [rt]cmd =0x44504543, len=24
6,553,679 >>> mbox cmd response data (40 bytes)
6,553,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,583,617 UART: [rt]cmd =0x44504543, len=96
6,621,680 >>> mbox cmd response data (56 bytes)
6,621,681 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,651,562 UART: [rt]cmd =0x44504543, len=92
6,881,320 >>> mbox cmd response data (6284 bytes)
6,881,321 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,911,380 UART: [rt]cmd =0x44504543, len=136
6,978,286 >>> mbox cmd response data (136 bytes)
6,978,287 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,007,776 UART: [rt]cmd =0x44504543, len=40
7,034,969 >>> mbox cmd response data (40 bytes)
7,034,970 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,064,413 UART: [rt]cmd =0x44504543, len=28
7,107,528 >>> mbox cmd response data (2076 bytes)
7,107,529 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,137,000 UART: [rt]cmd =0x44504543, len=36
7,167,401 >>> mbox cmd response data (24 bytes)
7,167,402 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,196,627 UART: [rt]cmd =0x4453424c, len=4
7,214,163 >>> mbox cmd response data (8 bytes)
7,214,164 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,243,609 UART: [rt]cmd =0x46505344, len=4
7,351,900 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
893,305 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,430 UART: [kat] ++
897,582 UART: [kat] sha1
901,814 UART: [kat] SHA2-256
903,754 UART: [kat] SHA2-384
906,641 UART: [kat] SHA2-512-ACC
908,542 UART: [kat] ECC-384
918,459 UART: [kat] HMAC-384Kdf
923,159 UART: [kat] LMS
1,171,487 UART: [kat] --
1,172,122 UART: [cold-reset] ++
1,172,550 UART: [fht] FHT @ 0x50003400
1,175,205 UART: [idev] ++
1,175,373 UART: [idev] CDI.KEYID = 6
1,175,733 UART: [idev] SUBJECT.KEYID = 7
1,176,157 UART: [idev] UDS.KEYID = 0
1,176,502 ready_for_fw is high
1,176,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,161 UART: [idev] Erasing UDS.KEYID = 0
1,201,162 UART: [idev] Sha1 KeyId Algorithm
1,209,600 UART: [idev] --
1,210,724 UART: [ldev] ++
1,210,892 UART: [ldev] CDI.KEYID = 6
1,211,255 UART: [ldev] SUBJECT.KEYID = 5
1,211,681 UART: [ldev] AUTHORITY.KEYID = 7
1,212,144 UART: [ldev] FE.KEYID = 1
1,217,592 UART: [ldev] Erasing FE.KEYID = 1
1,243,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,286 UART: [ldev] --
1,282,553 UART: [fwproc] Wait for Commands...
1,283,239 UART: [fwproc] Recv command 0x46574c44
1,283,967 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,935 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,105 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,400 >>> mbox cmd response: success
2,826,400 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,827,562 UART: [afmc] ++
2,827,730 UART: [afmc] CDI.KEYID = 6
2,828,092 UART: [afmc] SUBJECT.KEYID = 7
2,828,517 UART: [afmc] AUTHORITY.KEYID = 5
2,864,130 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,897 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,606 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,489 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,190 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,046 UART: [afmc] --
2,907,130 UART: [cold-reset] --
2,907,944 UART: [state] Locking Datavault
2,909,155 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,759 UART: [state] Locking ICCM
2,910,217 UART: [exit] Launching FMC @ 0x40000130
2,915,547 UART:
2,915,563 UART: Running Caliptra FMC ...
2,915,971 UART:
2,916,114 UART: [state] CFI Enabled
2,926,590 UART: [fht] FMC Alias Private Key: 7
3,045,848 UART: [art] Extend RT PCRs Done
3,046,276 UART: [art] Lock RT PCRs Done
3,048,050 UART: [art] Populate DV Done
3,056,209 UART: [fht] FMC Alias Private Key: 7
3,057,245 UART: [art] Derive CDI
3,057,525 UART: [art] Store in slot 0x4
3,142,790 UART: [art] Derive Key Pair
3,143,150 UART: [art] Store priv key in slot 0x5
3,156,736 UART: [art] Derive Key Pair - Done
3,171,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,208 UART: [art] PUB.X = 8C8F4DA12E6147504D4BB2477FD925E045CD26F1BCFF57E22DE8DA63DBB658CC07FB420011CFAE01F907331F2BFE5802
3,194,960 UART: [art] PUB.Y = 69B1B4C38E0ADE19D6B41D9376E6B17AFDC358033B5F5438BAF21B37F121E2AEE54811DA83DAF0C5AC8C03DE894B9A7A
3,201,921 UART: [art] SIG.R = 61047E060BFE6A90B0EA7749739AFEEB4B69BF6BA9AB90156E66B3732073D12DA216B44DD8F4586D87F8644A6E68576D
3,208,688 UART: [art] SIG.S = F81A11AB734FCF9F3BE7A292EC572190B72B4E52B1F0D32695851F4D2B57076C73C852B2A7E84E100233561EFBEDCE40
3,232,554 UART: Caliptra RT
3,232,897 UART: [state] CFI Enabled
3,352,440 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,932 UART: [rt]cmd =0x46505652, len=4
3,383,592 UART: [rt] FIPS Version
3,384,665 >>> mbox cmd response data (36 bytes)
3,384,666 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,111 UART: [rt]cmd =0x46504c54, len=4
3,415,283 >>> mbox cmd response data (8 bytes)
3,415,284 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,445,139 UART: [rt]cmd =0x46504c67, len=4
3,446,081 >>> mbox cmd response: failed
3,446,283 UART: [rt] FIPS self test
3,446,614 UART: [kat] ++
3,446,766 UART: [kat] sha1
3,450,923 UART: [kat] SHA2-256
3,452,853 UART: [kat] SHA2-384
3,455,636 UART: [kat] SHA2-512-ACC
3,457,531 UART: [kat] ECC-384
3,467,438 UART: [kat] HMAC-384Kdf
3,472,187 UART: [kat] LMS
3,731,947 UART: [kat] --
6,011,158 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,015,824 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,045,252 UART: [rt]cmd =0x46504c67, len=4
6,046,319 >>> mbox cmd response data (8 bytes)
6,046,320 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,075,435 UART: [rt]cmd =0x49444543, len=4
6,081,962 >>> mbox cmd response data (37 bytes)
6,081,963 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,111,376 UART: [rt]cmd =0x49444549, len=4
6,113,671 >>> mbox cmd response data (104 bytes)
6,113,672 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,143,161 UART: [rt]cmd =0x49444550, len=4
6,153,180 >>> mbox cmd response data (8 bytes)
6,153,181 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,182,690 UART: [rt]cmd =0x4c444556, len=4
6,193,120 >>> mbox cmd response data (687 bytes)
6,193,121 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,222,560 UART: [rt]cmd =0x43455246, len=4
6,234,503 >>> mbox cmd response data (888 bytes)
6,234,504 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,264,031 UART: [rt]cmd =0x43455252, len=4
6,274,904 >>> mbox cmd response data (783 bytes)
6,274,905 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,305,398 UART: [rt]cmd =0x53494756, len=196
6,310,576 >>> mbox cmd response data (8 bytes)
6,310,577 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,340,654 UART: [rt]cmd =0x4d454153, len=108
6,361,134 >>> mbox cmd response data (12 bytes)
6,361,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,390,530 UART: [rt]cmd =0x494e464f, len=4
6,394,216 >>> mbox cmd response data (312 bytes)
6,394,217 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,423,798 UART: [rt]cmd =0x54514754, len=24
6,425,912 >>> mbox cmd response data (8 bytes)
6,425,913 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,455,340 UART: [rt]cmd =0x47544744, len=8
6,457,808 >>> mbox cmd response data (104 bytes)
6,457,809 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,487,346 UART: [rt]cmd =0x50435252, len=8
6,488,760 >>> mbox cmd response data (8 bytes)
6,488,761 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,518,306 UART: [rt]cmd =0x50435251, len=36
6,685,704 >>> mbox cmd response data (1848 bytes)
6,685,705 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,715,522 UART: [rt]cmd =0x50435245, len=56
6,719,059 >>> mbox cmd response data (8 bytes)
6,719,060 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,748,429 UART: [rt]cmd =0x44504543, len=20
6,769,223 >>> mbox cmd response data (44 bytes)
6,769,224 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,798,687 UART: [rt]cmd =0x44504543, len=24
6,826,548 >>> mbox cmd response data (40 bytes)
6,826,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,856,750 UART: [rt]cmd =0x44504543, len=96
6,895,459 >>> mbox cmd response data (56 bytes)
6,895,460 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,925,399 UART: [rt]cmd =0x44504543, len=92
7,153,799 >>> mbox cmd response data (6284 bytes)
7,153,800 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,183,873 UART: [rt]cmd =0x44504543, len=136
7,250,947 >>> mbox cmd response data (136 bytes)
7,250,948 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,280,689 UART: [rt]cmd =0x44504543, len=40
7,307,984 >>> mbox cmd response data (40 bytes)
7,307,985 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,337,506 UART: [rt]cmd =0x44504543, len=28
7,380,627 >>> mbox cmd response data (2076 bytes)
7,380,628 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,410,165 UART: [rt]cmd =0x44504543, len=36
7,440,434 >>> mbox cmd response data (24 bytes)
7,440,435 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,469,748 UART: [rt]cmd =0x4453424c, len=4
7,486,656 >>> mbox cmd response data (8 bytes)
7,486,657 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,516,126 UART: [rt]cmd =0x46505344, len=4
7,624,525 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,762 ready_for_fw is high
1,060,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,991 >>> mbox cmd response: success
2,679,991 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,743,020 UART:
2,743,036 UART: Running Caliptra FMC ...
2,743,444 UART:
2,743,587 UART: [state] CFI Enabled
2,754,361 UART: [fht] FMC Alias Private Key: 7
2,872,533 UART: [art] Extend RT PCRs Done
2,872,961 UART: [art] Lock RT PCRs Done
2,874,779 UART: [art] Populate DV Done
2,882,992 UART: [fht] FMC Alias Private Key: 7
2,883,964 UART: [art] Derive CDI
2,884,244 UART: [art] Store in slot 0x4
2,970,243 UART: [art] Derive Key Pair
2,970,603 UART: [art] Store priv key in slot 0x5
2,984,087 UART: [art] Derive Key Pair - Done
2,999,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,288 UART: [art] PUB.X = D713A40CC262F8E7B03178F7F54C4C74D197F931DC279187503F84ED1C6F2FB2C5DFC47E02C372CF253C30401F81601A
3,022,056 UART: [art] PUB.Y = F147DBB4DED5DC36AA22CE9DA38F41EC0FD9399F1AD8A5E2FB0A72F800E23FF090D50714275985B86BD603059BAA4E58
3,028,987 UART: [art] SIG.R = 5215BD6F1EE2E2F596C8FA1460BC5ACEB95AFAF948A682EC53C7C26797FBE9FD0371AC204D50F8E3DB397A1CE7E4C207
3,035,773 UART: [art] SIG.S = 767030D9C1DB7485DE3BFDC9B4B9E701F4703A70F0AD150AB30F519C27E44ED1DB8B1A406E47A8FCBF0FAECCF2DE2256
3,059,221 UART: Caliptra RT
3,059,564 UART: [state] CFI Enabled
3,178,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,424 UART: [rt]cmd =0x46505652, len=4
3,210,084 UART: [rt] FIPS Version
3,211,117 >>> mbox cmd response data (36 bytes)
3,211,118 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,463 UART: [rt]cmd =0x46504c54, len=4
3,241,563 >>> mbox cmd response data (8 bytes)
3,241,564 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,270,969 UART: [rt]cmd =0x46504c67, len=4
3,271,805 >>> mbox cmd response: failed
3,271,991 UART: [rt] FIPS self test
3,272,322 UART: [kat] ++
3,272,474 UART: [kat] sha1
3,276,611 UART: [kat] SHA2-256
3,278,541 UART: [kat] SHA2-384
3,281,268 UART: [kat] SHA2-512-ACC
3,283,163 UART: [kat] ECC-384
3,292,804 UART: [kat] HMAC-384Kdf
3,297,389 UART: [kat] LMS
3,557,149 UART: [kat] --
5,732,348 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,741,558 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,771,072 UART: [rt]cmd =0x46504c67, len=4
5,772,261 >>> mbox cmd response data (8 bytes)
5,772,262 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,801,661 UART: [rt]cmd =0x49444543, len=4
5,808,114 >>> mbox cmd response data (37 bytes)
5,808,115 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,837,338 UART: [rt]cmd =0x49444549, len=4
5,839,447 >>> mbox cmd response data (104 bytes)
5,839,448 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,868,771 UART: [rt]cmd =0x49444550, len=4
5,878,715 >>> mbox cmd response data (8 bytes)
5,878,716 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,908,037 UART: [rt]cmd =0x4c444556, len=4
5,918,613 >>> mbox cmd response data (687 bytes)
5,918,614 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,947,961 UART: [rt]cmd =0x43455246, len=4
5,960,012 >>> mbox cmd response data (888 bytes)
5,960,013 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,989,328 UART: [rt]cmd =0x43455252, len=4
6,000,325 >>> mbox cmd response data (782 bytes)
6,000,326 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,030,915 UART: [rt]cmd =0x53494756, len=196
6,035,865 >>> mbox cmd response data (8 bytes)
6,035,866 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,065,945 UART: [rt]cmd =0x4d454153, len=108
6,087,123 >>> mbox cmd response data (12 bytes)
6,087,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,116,503 UART: [rt]cmd =0x494e464f, len=4
6,120,313 >>> mbox cmd response data (312 bytes)
6,120,314 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,149,781 UART: [rt]cmd =0x54514754, len=24
6,151,769 >>> mbox cmd response data (8 bytes)
6,151,770 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,181,045 UART: [rt]cmd =0x47544744, len=8
6,183,375 >>> mbox cmd response data (104 bytes)
6,183,376 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,212,665 UART: [rt]cmd =0x50435252, len=8
6,214,119 >>> mbox cmd response data (8 bytes)
6,214,120 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,243,455 UART: [rt]cmd =0x50435251, len=36
6,410,655 >>> mbox cmd response data (1848 bytes)
6,410,656 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,440,393 UART: [rt]cmd =0x50435245, len=56
6,444,032 >>> mbox cmd response data (8 bytes)
6,444,033 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,473,576 UART: [rt]cmd =0x44504543, len=20
6,494,412 >>> mbox cmd response data (44 bytes)
6,494,413 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,524,160 UART: [rt]cmd =0x44504543, len=24
6,551,647 >>> mbox cmd response data (40 bytes)
6,551,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,581,775 UART: [rt]cmd =0x44504543, len=96
6,620,622 >>> mbox cmd response data (56 bytes)
6,620,623 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,650,368 UART: [rt]cmd =0x44504543, len=92
6,879,793 >>> mbox cmd response data (6284 bytes)
6,879,794 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,909,881 UART: [rt]cmd =0x44504543, len=136
6,977,183 >>> mbox cmd response data (136 bytes)
6,977,184 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,006,929 UART: [rt]cmd =0x44504543, len=40
7,034,442 >>> mbox cmd response data (40 bytes)
7,034,443 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,064,028 UART: [rt]cmd =0x44504543, len=28
7,107,773 >>> mbox cmd response data (2076 bytes)
7,107,774 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,137,605 UART: [rt]cmd =0x44504543, len=36
7,168,008 >>> mbox cmd response data (24 bytes)
7,168,009 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,197,398 UART: [rt]cmd =0x4453424c, len=4
7,215,068 >>> mbox cmd response data (8 bytes)
7,215,069 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,244,600 UART: [rt]cmd =0x46505344, len=4
7,353,371 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,106 UART:
192,474 UART: Running Caliptra ROM ...
193,636 UART:
193,792 UART: [state] CFI Enabled
264,468 UART: [state] LifecycleState = Unprovisioned
266,412 UART: [state] DebugLocked = No
269,111 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,696 UART: [kat] SHA2-256
443,374 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,861 UART: [kat] ++
454,352 UART: [kat] sha1
465,282 UART: [kat] SHA2-256
467,971 UART: [kat] SHA2-384
473,030 UART: [kat] SHA2-512-ACC
475,379 UART: [kat] ECC-384
2,765,725 UART: [kat] HMAC-384Kdf
2,777,461 UART: [kat] LMS
3,967,737 UART: [kat] --
3,972,500 UART: [cold-reset] ++
3,974,547 UART: [fht] Storing FHT @ 0x50003400
3,986,415 UART: [idev] ++
3,986,989 UART: [idev] CDI.KEYID = 6
3,988,027 UART: [idev] SUBJECT.KEYID = 7
3,989,196 UART: [idev] UDS.KEYID = 0
3,990,292 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,011,104 UART: [idev] Erasing UDS.KEYID = 0
7,325,951 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,312 UART: [idev] --
7,350,092 UART: [ldev] ++
7,350,665 UART: [ldev] CDI.KEYID = 6
7,351,685 UART: [ldev] SUBJECT.KEYID = 5
7,352,850 UART: [ldev] AUTHORITY.KEYID = 7
7,354,140 UART: [ldev] FE.KEYID = 1
7,399,567 UART: [ldev] Erasing FE.KEYID = 1
10,732,230 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,794 UART: [ldev] --
13,092,477 UART: [fwproc] Waiting for Commands...
13,094,203 UART: [fwproc] Received command 0x46504c54
13,096,672 UART: [kat] SHA2-256
13,266,309 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,276,674 UART: [kat] ++
13,277,214 UART: [kat] sha1
13,287,726 UART: [kat] SHA2-256
13,290,465 UART: [kat] SHA2-384
13,296,289 UART: [kat] SHA2-512-ACC
13,298,691 UART: [kat] ECC-384
15,589,264 UART: [kat] HMAC-384Kdf
15,620,127 UART: [kat] LMS
16,809,609 UART: [kat] --
16,810,334 >>> mbox cmd response data (8 bytes)
16,810,813 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,811,596 UART: [fwproc] Received command 0x46504c67
16,814,251 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,803,796 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,347,241 >>> mbox cmd response data (8 bytes)
16,348,057 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,349,459 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,514 UART:
192,922 UART: Running Caliptra ROM ...
194,075 UART:
603,721 UART: [state] CFI Enabled
617,478 UART: [state] LifecycleState = Unprovisioned
619,390 UART: [state] DebugLocked = No
620,880 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,883 UART: [kat] SHA2-256
794,632 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,194 UART: [kat] ++
805,640 UART: [kat] sha1
816,815 UART: [kat] SHA2-256
819,511 UART: [kat] SHA2-384
826,099 UART: [kat] SHA2-512-ACC
828,450 UART: [kat] ECC-384
3,114,840 UART: [kat] HMAC-384Kdf
3,126,058 UART: [kat] LMS
4,316,203 UART: [kat] --
4,321,606 UART: [cold-reset] ++
4,323,808 UART: [fht] Storing FHT @ 0x50003400
4,334,692 UART: [idev] ++
4,335,303 UART: [idev] CDI.KEYID = 6
4,336,229 UART: [idev] SUBJECT.KEYID = 7
4,337,452 UART: [idev] UDS.KEYID = 0
4,338,467 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,352,709 UART: [idev] Erasing UDS.KEYID = 0
7,622,276 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,365 UART: [idev] --
7,648,848 UART: [ldev] ++
7,649,422 UART: [ldev] CDI.KEYID = 6
7,650,392 UART: [ldev] SUBJECT.KEYID = 5
7,651,611 UART: [ldev] AUTHORITY.KEYID = 7
7,652,869 UART: [ldev] FE.KEYID = 1
7,663,447 UART: [ldev] Erasing FE.KEYID = 1
10,952,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,651 UART: [ldev] --
13,312,102 UART: [fwproc] Waiting for Commands...
13,314,705 UART: [fwproc] Received command 0x46504c54
13,317,223 UART: [kat] SHA2-256
13,486,859 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,497,205 UART: [kat] ++
13,497,803 UART: [kat] sha1
13,509,295 UART: [kat] SHA2-256
13,511,992 UART: [kat] SHA2-384
13,516,219 UART: [kat] SHA2-512-ACC
13,518,628 UART: [kat] ECC-384
15,802,293 UART: [kat] HMAC-384Kdf
15,814,851 UART: [kat] LMS
17,004,312 UART: [kat] --
17,005,032 >>> mbox cmd response data (8 bytes)
17,005,487 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,006,492 UART: [fwproc] Received command 0x46504c67
17,009,144 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,126,329 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,544,225 >>> mbox cmd response data (8 bytes)
16,545,018 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,545,937 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,071 UART:
192,448 UART: Running Caliptra ROM ...
193,643 UART:
193,822 UART: [state] CFI Enabled
263,193 UART: [state] LifecycleState = Unprovisioned
265,120 UART: [state] DebugLocked = No
266,559 UART: [state] WD Timer not started. Device not locked for debugging
270,546 UART: [kat] SHA2-256
450,182 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,988 UART: [kat] ++
461,469 UART: [kat] sha1
473,151 UART: [kat] SHA2-256
475,837 UART: [kat] SHA2-384
481,602 UART: [kat] SHA2-512-ACC
483,998 UART: [kat] ECC-384
2,946,361 UART: [kat] HMAC-384Kdf
2,971,152 UART: [kat] LMS
3,447,647 UART: [kat] --
3,451,206 UART: [cold-reset] ++
3,452,411 UART: [fht] FHT @ 0x50003400
3,462,747 UART: [idev] ++
3,463,353 UART: [idev] CDI.KEYID = 6
3,464,277 UART: [idev] SUBJECT.KEYID = 7
3,465,523 UART: [idev] UDS.KEYID = 0
3,466,521 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,500,658 UART: [idev] Erasing UDS.KEYID = 0
5,986,411 UART: [idev] Sha1 KeyId Algorithm
6,011,274 UART: [idev] --
6,015,975 UART: [ldev] ++
6,016,565 UART: [ldev] CDI.KEYID = 6
6,017,490 UART: [ldev] SUBJECT.KEYID = 5
6,018,658 UART: [ldev] AUTHORITY.KEYID = 7
6,020,064 UART: [ldev] FE.KEYID = 1
6,056,337 UART: [ldev] Erasing FE.KEYID = 1
8,563,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,097 UART: [ldev] --
10,374,639 UART: [fwproc] Wait for Commands...
10,376,850 UART: [fwproc] Recv command 0x46504c54
10,379,168 UART: [kat] SHA2-256
10,558,849 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,569,842 UART: [kat] ++
10,570,382 UART: [kat] sha1
10,580,510 UART: [kat] SHA2-256
10,583,234 UART: [kat] SHA2-384
10,588,853 UART: [kat] SHA2-512-ACC
10,591,214 UART: [kat] ECC-384
13,038,019 UART: [kat] HMAC-384Kdf
13,058,870 UART: [kat] LMS
13,535,349 UART: [kat] --
13,536,053 >>> mbox cmd response data (8 bytes)
13,536,551 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,537,838 UART: [fwproc] Recv command 0x46504c67
13,540,321 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,129 writing to cptra_bootfsm_go
3,458,630 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,466,765 >>> mbox cmd response data (8 bytes)
13,467,420 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,468,894 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,624 UART:
192,998 UART: Running Caliptra ROM ...
194,170 UART:
603,802 UART: [state] CFI Enabled
616,565 UART: [state] LifecycleState = Unprovisioned
618,486 UART: [state] DebugLocked = No
620,352 UART: [state] WD Timer not started. Device not locked for debugging
623,464 UART: [kat] SHA2-256
803,117 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,908 UART: [kat] ++
814,393 UART: [kat] sha1
825,328 UART: [kat] SHA2-256
828,065 UART: [kat] SHA2-384
833,421 UART: [kat] SHA2-512-ACC
835,823 UART: [kat] ECC-384
3,279,263 UART: [kat] HMAC-384Kdf
3,291,981 UART: [kat] LMS
3,768,533 UART: [kat] --
3,773,576 UART: [cold-reset] ++
3,776,052 UART: [fht] FHT @ 0x50003400
3,788,228 UART: [idev] ++
3,788,806 UART: [idev] CDI.KEYID = 6
3,789,774 UART: [idev] SUBJECT.KEYID = 7
3,790,992 UART: [idev] UDS.KEYID = 0
3,792,099 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,811,841 UART: [idev] Erasing UDS.KEYID = 0
6,269,056 UART: [idev] Sha1 KeyId Algorithm
6,293,315 UART: [idev] --
6,298,610 UART: [ldev] ++
6,299,207 UART: [ldev] CDI.KEYID = 6
6,300,123 UART: [ldev] SUBJECT.KEYID = 5
6,301,285 UART: [ldev] AUTHORITY.KEYID = 7
6,302,586 UART: [ldev] FE.KEYID = 1
6,314,691 UART: [ldev] Erasing FE.KEYID = 1
8,792,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,304 UART: [ldev] --
10,587,234 UART: [fwproc] Wait for Commands...
10,589,387 UART: [fwproc] Recv command 0x46504c54
10,591,704 UART: [kat] SHA2-256
10,771,358 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,782,401 UART: [kat] ++
10,782,878 UART: [kat] sha1
10,792,580 UART: [kat] SHA2-256
10,795,332 UART: [kat] SHA2-384
10,800,887 UART: [kat] SHA2-512-ACC
10,803,241 UART: [kat] ECC-384
13,242,754 UART: [kat] HMAC-384Kdf
13,254,937 UART: [kat] LMS
13,731,414 UART: [kat] --
13,732,113 >>> mbox cmd response data (8 bytes)
13,732,579 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,733,030 UART: [fwproc] Recv command 0x46504c67
13,735,531 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,913 writing to cptra_bootfsm_go
3,783,371 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,639,351 >>> mbox cmd response data (8 bytes)
13,640,011 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,641,021 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,026 UART:
192,387 UART: Running Caliptra ROM ...
193,531 UART:
193,687 UART: [state] CFI Enabled
263,492 UART: [state] LifecycleState = Unprovisioned
265,880 UART: [state] DebugLocked = No
268,612 UART: [state] WD Timer not started. Device not locked for debugging
273,275 UART: [kat] SHA2-256
463,145 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,924 UART: [kat] ++
474,572 UART: [kat] sha1
486,651 UART: [kat] SHA2-256
489,666 UART: [kat] SHA2-384
494,623 UART: [kat] SHA2-512-ACC
497,185 UART: [kat] ECC-384
2,948,084 UART: [kat] HMAC-384Kdf
2,970,927 UART: [kat] LMS
3,502,723 UART: [kat] --
3,506,777 UART: [cold-reset] ++
3,507,791 UART: [fht] FHT @ 0x50003400
3,519,296 UART: [idev] ++
3,519,974 UART: [idev] CDI.KEYID = 6
3,520,918 UART: [idev] SUBJECT.KEYID = 7
3,522,152 UART: [idev] UDS.KEYID = 0
3,523,122 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,542,428 UART: [idev] Erasing UDS.KEYID = 0
6,025,348 UART: [idev] Sha1 KeyId Algorithm
6,048,169 UART: [idev] --
6,052,526 UART: [ldev] ++
6,053,224 UART: [ldev] CDI.KEYID = 6
6,054,144 UART: [ldev] SUBJECT.KEYID = 5
6,055,313 UART: [ldev] AUTHORITY.KEYID = 7
6,056,551 UART: [ldev] FE.KEYID = 1
6,096,744 UART: [ldev] Erasing FE.KEYID = 1
8,605,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,347 UART: [ldev] --
10,410,992 UART: [fwproc] Wait for Commands...
10,413,089 UART: [fwproc] Recv command 0x46504c54
10,415,736 UART: [kat] SHA2-256
10,605,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,616,225 UART: [kat] ++
10,616,749 UART: [kat] sha1
10,627,527 UART: [kat] SHA2-256
10,630,545 UART: [kat] SHA2-384
10,636,168 UART: [kat] SHA2-512-ACC
10,638,740 UART: [kat] ECC-384
13,091,310 UART: [kat] HMAC-384Kdf
13,112,155 UART: [kat] LMS
13,644,043 UART: [kat] --
13,644,743 >>> mbox cmd response data (8 bytes)
13,645,194 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,646,225 UART: [fwproc] Recv command 0x46504c67
13,648,736 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,437,821 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,382,608 >>> mbox cmd response data (8 bytes)
13,383,398 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,385,183 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,496 UART:
192,913 UART: Running Caliptra ROM ...
193,986 UART:
603,801 UART: [state] CFI Enabled
618,529 UART: [state] LifecycleState = Unprovisioned
620,885 UART: [state] DebugLocked = No
622,798 UART: [state] WD Timer not started. Device not locked for debugging
627,327 UART: [kat] SHA2-256
817,188 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,968 UART: [kat] ++
828,477 UART: [kat] sha1
840,060 UART: [kat] SHA2-256
843,080 UART: [kat] SHA2-384
850,431 UART: [kat] SHA2-512-ACC
852,996 UART: [kat] ECC-384
3,294,662 UART: [kat] HMAC-384Kdf
3,308,711 UART: [kat] LMS
3,840,499 UART: [kat] --
3,844,869 UART: [cold-reset] ++
3,847,128 UART: [fht] FHT @ 0x50003400
3,858,656 UART: [idev] ++
3,859,332 UART: [idev] CDI.KEYID = 6
3,860,423 UART: [idev] SUBJECT.KEYID = 7
3,861,552 UART: [idev] UDS.KEYID = 0
3,862,521 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,876,559 UART: [idev] Erasing UDS.KEYID = 0
6,337,049 UART: [idev] Sha1 KeyId Algorithm
6,360,626 UART: [idev] --
6,365,362 UART: [ldev] ++
6,366,056 UART: [ldev] CDI.KEYID = 6
6,366,946 UART: [ldev] SUBJECT.KEYID = 5
6,368,160 UART: [ldev] AUTHORITY.KEYID = 7
6,369,396 UART: [ldev] FE.KEYID = 1
6,380,994 UART: [ldev] Erasing FE.KEYID = 1
8,860,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,291 UART: [ldev] --
10,655,637 UART: [fwproc] Wait for Commands...
10,658,760 UART: [fwproc] Recv command 0x46504c54
10,661,398 UART: [kat] SHA2-256
10,851,153 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,861,946 UART: [kat] ++
10,862,408 UART: [kat] sha1
10,873,891 UART: [kat] SHA2-256
10,876,915 UART: [kat] SHA2-384
10,883,068 UART: [kat] SHA2-512-ACC
10,885,696 UART: [kat] ECC-384
13,325,510 UART: [kat] HMAC-384Kdf
13,339,915 UART: [kat] LMS
13,871,774 UART: [kat] --
13,872,478 >>> mbox cmd response data (8 bytes)
13,872,945 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,874,274 UART: [fwproc] Recv command 0x46504c67
13,876,786 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,756,846 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,590,870 >>> mbox cmd response data (8 bytes)
13,591,543 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,593,274 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,815 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,339 UART: [kat] SHA2-256
882,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,385 UART: [kat] ++
886,537 UART: [kat] sha1
890,727 UART: [kat] SHA2-256
892,665 UART: [kat] SHA2-384
895,444 UART: [kat] SHA2-512-ACC
897,345 UART: [kat] ECC-384
902,958 UART: [kat] HMAC-384Kdf
907,596 UART: [kat] LMS
1,475,792 UART: [kat] --
1,476,657 UART: [cold-reset] ++
1,477,217 UART: [fht] Storing FHT @ 0x50003400
1,479,978 UART: [idev] ++
1,480,146 UART: [idev] CDI.KEYID = 6
1,480,506 UART: [idev] SUBJECT.KEYID = 7
1,480,930 UART: [idev] UDS.KEYID = 0
1,481,275 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,974 UART: [idev] Erasing UDS.KEYID = 0
1,506,074 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,734 UART: [idev] --
1,515,903 UART: [ldev] ++
1,516,071 UART: [ldev] CDI.KEYID = 6
1,516,434 UART: [ldev] SUBJECT.KEYID = 5
1,516,860 UART: [ldev] AUTHORITY.KEYID = 7
1,517,323 UART: [ldev] FE.KEYID = 1
1,522,517 UART: [ldev] Erasing FE.KEYID = 1
1,548,012 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,742 UART: [ldev] --
1,587,165 UART: [fwproc] Waiting for Commands...
1,588,018 UART: [fwproc] Received command 0x46504c54
1,588,925 UART: [kat] SHA2-256
2,382,856 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,386,971 UART: [kat] ++
2,387,123 UART: [kat] sha1
2,391,119 UART: [kat] SHA2-256
2,393,057 UART: [kat] SHA2-384
2,395,688 UART: [kat] SHA2-512-ACC
2,397,588 UART: [kat] ECC-384
2,403,163 UART: [kat] HMAC-384Kdf
2,407,631 UART: [kat] LMS
2,975,827 UART: [kat] --
2,976,065 >>> mbox cmd response data (8 bytes)
2,976,066 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,976,166 UART: [fwproc] Received command 0x46504c67
2,977,120 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,749 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,723 >>> mbox cmd response data (8 bytes)
2,716,724 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,012 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,346 UART: [kat] SHA2-256
882,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,392 UART: [kat] ++
886,544 UART: [kat] sha1
890,586 UART: [kat] SHA2-256
892,524 UART: [kat] SHA2-384
895,245 UART: [kat] SHA2-512-ACC
897,146 UART: [kat] ECC-384
903,129 UART: [kat] HMAC-384Kdf
907,665 UART: [kat] LMS
1,475,861 UART: [kat] --
1,476,706 UART: [cold-reset] ++
1,477,244 UART: [fht] Storing FHT @ 0x50003400
1,479,963 UART: [idev] ++
1,480,131 UART: [idev] CDI.KEYID = 6
1,480,491 UART: [idev] SUBJECT.KEYID = 7
1,480,915 UART: [idev] UDS.KEYID = 0
1,481,260 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,709 UART: [idev] Erasing UDS.KEYID = 0
1,505,327 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,943 UART: [idev] --
1,514,994 UART: [ldev] ++
1,515,162 UART: [ldev] CDI.KEYID = 6
1,515,525 UART: [ldev] SUBJECT.KEYID = 5
1,515,951 UART: [ldev] AUTHORITY.KEYID = 7
1,516,414 UART: [ldev] FE.KEYID = 1
1,521,532 UART: [ldev] Erasing FE.KEYID = 1
1,546,771 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,109 UART: [ldev] --
1,586,590 UART: [fwproc] Waiting for Commands...
1,587,433 UART: [fwproc] Received command 0x46504c54
1,588,340 UART: [kat] SHA2-256
2,382,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,386,386 UART: [kat] ++
2,386,538 UART: [kat] sha1
2,390,874 UART: [kat] SHA2-256
2,392,812 UART: [kat] SHA2-384
2,395,541 UART: [kat] SHA2-512-ACC
2,397,441 UART: [kat] ECC-384
2,402,932 UART: [kat] HMAC-384Kdf
2,407,490 UART: [kat] LMS
2,975,686 UART: [kat] --
2,975,924 >>> mbox cmd response data (8 bytes)
2,975,925 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,976,213 UART: [fwproc] Received command 0x46504c67
2,977,167 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,852 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,717,686 >>> mbox cmd response data (8 bytes)
2,717,687 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,718,083 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,348 UART: [kat] ++
895,500 UART: [kat] sha1
899,744 UART: [kat] SHA2-256
901,684 UART: [kat] SHA2-384
904,477 UART: [kat] SHA2-512-ACC
906,378 UART: [kat] ECC-384
915,727 UART: [kat] HMAC-384Kdf
920,203 UART: [kat] LMS
1,168,515 UART: [kat] --
1,169,538 UART: [cold-reset] ++
1,169,864 UART: [fht] FHT @ 0x50003400
1,172,714 UART: [idev] ++
1,172,882 UART: [idev] CDI.KEYID = 6
1,173,243 UART: [idev] SUBJECT.KEYID = 7
1,173,668 UART: [idev] UDS.KEYID = 0
1,174,014 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,181,805 UART: [idev] Erasing UDS.KEYID = 0
1,198,411 UART: [idev] Sha1 KeyId Algorithm
1,207,199 UART: [idev] --
1,208,376 UART: [ldev] ++
1,208,544 UART: [ldev] CDI.KEYID = 6
1,208,908 UART: [ldev] SUBJECT.KEYID = 5
1,209,335 UART: [ldev] AUTHORITY.KEYID = 7
1,209,798 UART: [ldev] FE.KEYID = 1
1,214,954 UART: [ldev] Erasing FE.KEYID = 1
1,241,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,270 UART: [ldev] --
1,280,693 UART: [fwproc] Wait for Commands...
1,281,394 UART: [fwproc] Recv command 0x46504c54
1,282,245 UART: [kat] SHA2-256
2,085,795 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,089,899 UART: [kat] ++
2,090,051 UART: [kat] sha1
2,094,333 UART: [kat] SHA2-256
2,096,273 UART: [kat] SHA2-384
2,098,938 UART: [kat] SHA2-512-ACC
2,100,838 UART: [kat] ECC-384
2,110,407 UART: [kat] HMAC-384Kdf
2,115,015 UART: [kat] LMS
2,363,327 UART: [kat] --
2,363,568 >>> mbox cmd response data (8 bytes)
2,363,569 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,363,696 UART: [fwproc] Recv command 0x46504c67
2,364,597 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,326 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,109,809 >>> mbox cmd response data (8 bytes)
2,109,810 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,110,096 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
87,050 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
891,753 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,857 UART: [kat] ++
896,009 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,318 UART: [kat] SHA2-512-ACC
907,219 UART: [kat] ECC-384
917,406 UART: [kat] HMAC-384Kdf
921,964 UART: [kat] LMS
1,170,276 UART: [kat] --
1,171,097 UART: [cold-reset] ++
1,171,557 UART: [fht] FHT @ 0x50003400
1,174,397 UART: [idev] ++
1,174,565 UART: [idev] CDI.KEYID = 6
1,174,926 UART: [idev] SUBJECT.KEYID = 7
1,175,351 UART: [idev] UDS.KEYID = 0
1,175,697 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,183,416 UART: [idev] Erasing UDS.KEYID = 0
1,200,394 UART: [idev] Sha1 KeyId Algorithm
1,209,186 UART: [idev] --
1,210,331 UART: [ldev] ++
1,210,499 UART: [ldev] CDI.KEYID = 6
1,210,863 UART: [ldev] SUBJECT.KEYID = 5
1,211,290 UART: [ldev] AUTHORITY.KEYID = 7
1,211,753 UART: [ldev] FE.KEYID = 1
1,216,935 UART: [ldev] Erasing FE.KEYID = 1
1,243,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,829 UART: [ldev] --
1,283,170 UART: [fwproc] Wait for Commands...
1,283,869 UART: [fwproc] Recv command 0x46504c54
1,284,720 UART: [kat] SHA2-256
2,088,270 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,092,374 UART: [kat] ++
2,092,526 UART: [kat] sha1
2,096,604 UART: [kat] SHA2-256
2,098,544 UART: [kat] SHA2-384
2,101,297 UART: [kat] SHA2-512-ACC
2,103,197 UART: [kat] ECC-384
2,113,124 UART: [kat] HMAC-384Kdf
2,117,712 UART: [kat] LMS
2,366,024 UART: [kat] --
2,366,265 >>> mbox cmd response data (8 bytes)
2,366,266 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,366,559 UART: [fwproc] Recv command 0x46504c67
2,367,460 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,289 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,111,686 >>> mbox cmd response data (8 bytes)
2,111,687 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,111 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
893,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,497 UART: [kat] ++
897,649 UART: [kat] sha1
901,915 UART: [kat] SHA2-256
903,855 UART: [kat] SHA2-384
906,588 UART: [kat] SHA2-512-ACC
908,489 UART: [kat] ECC-384
917,830 UART: [kat] HMAC-384Kdf
922,382 UART: [kat] LMS
1,170,710 UART: [kat] --
1,171,211 UART: [cold-reset] ++
1,171,579 UART: [fht] FHT @ 0x50003400
1,174,338 UART: [idev] ++
1,174,506 UART: [idev] CDI.KEYID = 6
1,174,866 UART: [idev] SUBJECT.KEYID = 7
1,175,290 UART: [idev] UDS.KEYID = 0
1,175,635 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,183,024 UART: [idev] Erasing UDS.KEYID = 0
1,200,539 UART: [idev] Sha1 KeyId Algorithm
1,209,025 UART: [idev] --
1,209,933 UART: [ldev] ++
1,210,101 UART: [ldev] CDI.KEYID = 6
1,210,464 UART: [ldev] SUBJECT.KEYID = 5
1,210,890 UART: [ldev] AUTHORITY.KEYID = 7
1,211,353 UART: [ldev] FE.KEYID = 1
1,216,415 UART: [ldev] Erasing FE.KEYID = 1
1,242,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,943 UART: [ldev] --
1,282,402 UART: [fwproc] Wait for Commands...
1,282,988 UART: [fwproc] Recv command 0x46504c54
1,283,834 UART: [kat] SHA2-256
2,089,484 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,093,609 UART: [kat] ++
2,093,761 UART: [kat] sha1
2,098,003 UART: [kat] SHA2-256
2,099,943 UART: [kat] SHA2-384
2,102,852 UART: [kat] SHA2-512-ACC
2,104,752 UART: [kat] ECC-384
2,114,199 UART: [kat] HMAC-384Kdf
2,118,777 UART: [kat] LMS
2,367,105 UART: [kat] --
2,367,343 >>> mbox cmd response data (8 bytes)
2,367,344 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,367,489 UART: [fwproc] Recv command 0x46504c67
2,368,382 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,679 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,896 >>> mbox cmd response data (8 bytes)
2,112,897 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,113,199 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
86,982 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [kat] SHA2-256
893,953 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,078 UART: [kat] ++
898,230 UART: [kat] sha1
902,368 UART: [kat] SHA2-256
904,308 UART: [kat] SHA2-384
907,051 UART: [kat] SHA2-512-ACC
908,952 UART: [kat] ECC-384
918,923 UART: [kat] HMAC-384Kdf
923,629 UART: [kat] LMS
1,171,957 UART: [kat] --
1,172,860 UART: [cold-reset] ++
1,173,394 UART: [fht] FHT @ 0x50003400
1,176,039 UART: [idev] ++
1,176,207 UART: [idev] CDI.KEYID = 6
1,176,567 UART: [idev] SUBJECT.KEYID = 7
1,176,991 UART: [idev] UDS.KEYID = 0
1,177,336 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,184,561 UART: [idev] Erasing UDS.KEYID = 0
1,201,766 UART: [idev] Sha1 KeyId Algorithm
1,210,170 UART: [idev] --
1,211,336 UART: [ldev] ++
1,211,504 UART: [ldev] CDI.KEYID = 6
1,211,867 UART: [ldev] SUBJECT.KEYID = 5
1,212,293 UART: [ldev] AUTHORITY.KEYID = 7
1,212,756 UART: [ldev] FE.KEYID = 1
1,218,052 UART: [ldev] Erasing FE.KEYID = 1
1,243,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,852 UART: [ldev] --
1,283,125 UART: [fwproc] Wait for Commands...
1,283,827 UART: [fwproc] Recv command 0x46504c54
1,284,673 UART: [kat] SHA2-256
2,090,323 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,094,448 UART: [kat] ++
2,094,600 UART: [kat] sha1
2,098,854 UART: [kat] SHA2-256
2,100,794 UART: [kat] SHA2-384
2,103,603 UART: [kat] SHA2-512-ACC
2,105,503 UART: [kat] ECC-384
2,115,668 UART: [kat] HMAC-384Kdf
2,120,222 UART: [kat] LMS
2,368,550 UART: [kat] --
2,368,788 >>> mbox cmd response data (8 bytes)
2,368,789 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,369,054 UART: [fwproc] Recv command 0x46504c67
2,369,947 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,366 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,114,441 >>> mbox cmd response data (8 bytes)
2,114,442 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,114,720 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,152 UART:
192,514 UART: Running Caliptra ROM ...
193,646 UART:
193,792 UART: [state] CFI Enabled
266,208 UART: [state] LifecycleState = Unprovisioned
268,123 UART: [state] DebugLocked = No
270,073 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,840 UART: [kat] SHA2-256
444,547 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,050 UART: [kat] ++
455,506 UART: [kat] sha1
466,739 UART: [kat] SHA2-256
469,396 UART: [kat] SHA2-384
474,543 UART: [kat] SHA2-512-ACC
476,915 UART: [kat] ECC-384
2,769,228 UART: [kat] HMAC-384Kdf
2,800,944 UART: [kat] LMS
3,991,259 UART: [kat] --
3,994,956 UART: [cold-reset] ++
3,996,117 UART: [fht] Storing FHT @ 0x50003400
4,007,395 UART: [idev] ++
4,007,967 UART: [idev] CDI.KEYID = 6
4,008,852 UART: [idev] SUBJECT.KEYID = 7
4,010,131 UART: [idev] UDS.KEYID = 0
4,011,228 ready_for_fw is high
4,011,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,649 UART: [idev] Erasing UDS.KEYID = 0
7,347,416 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,618 UART: [idev] --
7,372,298 UART: [ldev] ++
7,372,873 UART: [ldev] CDI.KEYID = 6
7,373,815 UART: [ldev] SUBJECT.KEYID = 5
7,375,031 UART: [ldev] AUTHORITY.KEYID = 7
7,376,270 UART: [ldev] FE.KEYID = 1
7,424,845 UART: [ldev] Erasing FE.KEYID = 1
10,756,683 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,451 UART: [ldev] --
13,119,008 UART: [fwproc] Waiting for Commands...
13,121,825 UART: [fwproc] Received command 0x46574c44
13,124,076 UART: [fwproc] Received Image of size 118548 bytes
17,230,950 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,593 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,745 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,706,005 >>> mbox cmd response: success
17,706,472 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,709,644 UART: [afmc] ++
17,710,230 UART: [afmc] CDI.KEYID = 6
17,711,305 UART: [afmc] SUBJECT.KEYID = 7
17,712,362 UART: [afmc] AUTHORITY.KEYID = 5
21,075,236 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,374,806 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,377,105 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,391,543 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,406,248 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,420,673 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,555 UART: [afmc] --
23,444,367 UART: [cold-reset] --
23,448,012 UART: [state] Locking Datavault
23,453,695 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,457 UART: [state] Locking ICCM
23,457,932 UART: [exit] Launching FMC @ 0x40000130
23,466,334 UART:
23,466,570 UART: Running Caliptra FMC ...
23,467,674 UART:
23,467,836 UART: [state] CFI Enabled
23,535,250 UART: [fht] FMC Alias Private Key: 7
25,875,317 UART: [art] Extend RT PCRs Done
25,876,563 UART: [art] Lock RT PCRs Done
25,878,308 UART: [art] Populate DV Done
25,883,622 UART: [fht] FMC Alias Private Key: 7
25,885,313 UART: [art] Derive CDI
25,886,057 UART: [art] Store in slot 0x4
25,943,806 UART: [art] Derive Key Pair
25,944,813 UART: [art] Store priv key in slot 0x5
29,237,445 UART: [art] Derive Key Pair - Done
29,250,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,969 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,498 UART: [art] PUB.X = C46B1EBA721B980CC0A5BAEC2E32C08A2E80111DBF562A48E35EA6FD00FD2819D18F6840BB5FAA3F801D4AF1871D13C6
31,548,756 UART: [art] PUB.Y = FCFEDD7632A4019F514E64C5AC6073130CDF39AC8D595C4AD3243F634433DD24545F18F4CC16768B64DF2731911FDB7D
31,555,992 UART: [art] SIG.R = F5C85CB30D097A1540E45C36D39A8172BDB2BBCAA35569CAF4A597D39CE6A0D128C4B6374734BAD8D6F69742D3518C88
31,563,388 UART: [art] SIG.S = 8FB3CE38AEA670CBA5D5040233460A0C5EE238232CD420B1D34652DC9EE9033958A90B17C19AA233891B65FB52417B0A
32,869,074 UART: Caliptra RT
32,869,784 UART: [state] CFI Enabled
33,046,241 UART: [rt] RT listening for mailbox commands...
33,077,761 UART: [rt]cmd =0x46504c54, len=4
33,079,392 >>> mbox cmd response data (8 bytes)
33,079,823 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,109,983 UART: [rt]cmd =0x46504c67, len=4
33,111,361 >>> mbox cmd response: failed
33,112,433 UART: [rt] FIPS self test
33,113,364 UART: [kat] ++
33,113,854 UART: [kat] sha1
33,118,342 UART: [kat] SHA2-256
33,120,132 UART: [kat] SHA2-384
33,123,046 UART: [kat] SHA2-512-ACC
33,125,258 UART: [kat] ECC-384
36,388,294 UART: [kat] HMAC-384Kdf
36,396,142 UART: [kat] LMS
36,811,800 UART: [kat] --
40,842,373 UART: [rt] Verify complete
40,953,554 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,983,341 UART: [rt]cmd =0x46504c67, len=4
40,984,822 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
3,806,670 ready_for_fw is high
3,807,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,948,695 >>> mbox cmd response: success
17,949,396 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,642,802 UART:
23,643,216 UART: Running Caliptra FMC ...
23,644,373 UART:
23,644,529 UART: [state] CFI Enabled
23,712,901 UART: [fht] FMC Alias Private Key: 7
26,053,649 UART: [art] Extend RT PCRs Done
26,054,921 UART: [art] Lock RT PCRs Done
26,056,367 UART: [art] Populate DV Done
26,061,697 UART: [fht] FMC Alias Private Key: 7
26,063,352 UART: [art] Derive CDI
26,064,099 UART: [art] Store in slot 0x4
26,121,515 UART: [art] Derive Key Pair
26,122,584 UART: [art] Store priv key in slot 0x5
29,415,354 UART: [art] Derive Key Pair - Done
29,428,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,716,574 UART: [art] Erasing AUTHORITY.KEYID = 7
31,718,102 UART: [art] PUB.X = FC2F5EABB30B622AF7F6AD0A8C179DE0B1437B8BB826DA647ED4CB4D9D788C88B50C541171239A0145082C1AA811BD7F
31,725,363 UART: [art] PUB.Y = F14572EBCD6C95CD61229415D3410FE8303BE153B89A433D1C086C035DC048B3FED4ECAD9BBCFA177996258D78B7D492
31,732,631 UART: [art] SIG.R = 579FB3CC3E3F322E80B575CAD5A3BAC7B37A8C0E302E94B6C883BCA412DD4481E65ECE42C714CAC42E81E4A6EF90F885
31,740,100 UART: [art] SIG.S = 94F9597FCE9AFC218153FAA25404D0D65A747C503BFA6D3A8DAF0E329E53D63B38FC1F02E4956BE936E7751462B20BD4
33,044,808 UART: Caliptra RT
33,045,534 UART: [state] CFI Enabled
33,222,509 UART: [rt] RT listening for mailbox commands...
33,253,877 UART: [rt]cmd =0x46504c54, len=4
33,255,515 >>> mbox cmd response data (8 bytes)
33,255,948 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,285,878 UART: [rt]cmd =0x46504c67, len=4
33,287,367 >>> mbox cmd response: failed
33,288,206 UART: [rt] FIPS self test
33,289,143 UART: [kat] ++
33,289,602 UART: [kat] sha1
33,293,893 UART: [kat] SHA2-256
33,295,723 UART: [kat] SHA2-384
33,298,463 UART: [kat] SHA2-512-ACC
33,300,683 UART: [kat] ECC-384
36,564,715 UART: [kat] HMAC-384Kdf
36,572,861 UART: [kat] LMS
36,988,519 UART: [kat] --
40,997,252 UART: [rt] Verify complete
41,129,352 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,159,367 UART: [rt]cmd =0x46504c67, len=4
41,160,853 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
192,532 UART:
192,894 UART: Running Caliptra ROM ...
194,002 UART:
603,801 UART: [state] CFI Enabled
620,033 UART: [state] LifecycleState = Unprovisioned
621,999 UART: [state] DebugLocked = No
624,671 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,181 UART: [kat] SHA2-256
799,923 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,501 UART: [kat] ++
810,952 UART: [kat] sha1
822,990 UART: [kat] SHA2-256
825,693 UART: [kat] SHA2-384
831,558 UART: [kat] SHA2-512-ACC
833,940 UART: [kat] ECC-384
3,118,249 UART: [kat] HMAC-384Kdf
3,130,858 UART: [kat] LMS
4,320,977 UART: [kat] --
4,323,135 UART: [cold-reset] ++
4,324,931 UART: [fht] Storing FHT @ 0x50003400
4,337,148 UART: [idev] ++
4,337,756 UART: [idev] CDI.KEYID = 6
4,338,650 UART: [idev] SUBJECT.KEYID = 7
4,339,905 UART: [idev] UDS.KEYID = 0
4,340,978 ready_for_fw is high
4,341,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,931 UART: [idev] Erasing UDS.KEYID = 0
7,628,614 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,975 UART: [idev] --
7,653,322 UART: [ldev] ++
7,653,900 UART: [ldev] CDI.KEYID = 6
7,654,906 UART: [ldev] SUBJECT.KEYID = 5
7,656,088 UART: [ldev] AUTHORITY.KEYID = 7
7,657,280 UART: [ldev] FE.KEYID = 1
7,667,551 UART: [ldev] Erasing FE.KEYID = 1
10,956,850 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,709 UART: [ldev] --
13,315,240 UART: [fwproc] Waiting for Commands...
13,317,561 UART: [fwproc] Received command 0x46574c44
13,319,765 UART: [fwproc] Received Image of size 118548 bytes
17,426,353 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,799 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,958 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,232 >>> mbox cmd response: success
17,905,698 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,908,766 UART: [afmc] ++
17,909,351 UART: [afmc] CDI.KEYID = 6
17,910,292 UART: [afmc] SUBJECT.KEYID = 7
17,911,567 UART: [afmc] AUTHORITY.KEYID = 5
21,227,943 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,850 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,110 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,584 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,303 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,674 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,589,345 UART: [afmc] --
23,593,104 UART: [cold-reset] --
23,597,454 UART: [state] Locking Datavault
23,601,843 UART: [state] Locking PCR0, PCR1 and PCR31
23,603,620 UART: [state] Locking ICCM
23,605,291 UART: [exit] Launching FMC @ 0x40000130
23,613,688 UART:
23,613,973 UART: Running Caliptra FMC ...
23,615,009 UART:
23,615,166 UART: [state] CFI Enabled
23,623,275 UART: [fht] FMC Alias Private Key: 7
25,962,743 UART: [art] Extend RT PCRs Done
25,963,974 UART: [art] Lock RT PCRs Done
25,965,577 UART: [art] Populate DV Done
25,970,889 UART: [fht] FMC Alias Private Key: 7
25,972,488 UART: [art] Derive CDI
25,973,234 UART: [art] Store in slot 0x4
26,016,158 UART: [art] Derive Key Pair
26,017,208 UART: [art] Store priv key in slot 0x5
29,259,066 UART: [art] Derive Key Pair - Done
29,271,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,274 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,788 UART: [art] PUB.X = D8B117DA0DFA126FE24FBDEF82FE99A3BD40F316A47125690BC66B1CFF2D56A474B411515A50C957397CB3DBC5FB2A87
31,561,105 UART: [art] PUB.Y = 359FDC9F1259D42B977EE6589345C06EFB272C0CC3FB39EFDA9C418FA8E0B32A7DD7CD303D3A64329F489BC9A9C55434
31,568,360 UART: [art] SIG.R = 3AE925007D1BD81FC72C56D2499B88F6605AB1F136C20770E55A34104E0104934B00325A043BB471D223D913B35FF0BC
31,575,718 UART: [art] SIG.S = F09C54962747D3487B00035BD75DAA21CED54EDA1254E8CF7F066997F8D7DAE6DCE798B43982AC9D4D275EACE38637B6
32,880,543 UART: Caliptra RT
32,881,265 UART: [state] CFI Enabled
33,014,043 UART: [rt] RT listening for mailbox commands...
33,045,636 UART: [rt]cmd =0x46504c54, len=4
33,047,114 >>> mbox cmd response data (8 bytes)
33,047,547 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,077,867 UART: [rt]cmd =0x46504c67, len=4
33,079,198 >>> mbox cmd response: failed
33,080,379 UART: [rt] FIPS self test
33,081,323 UART: [kat] ++
33,081,806 UART: [kat] sha1
33,086,195 UART: [kat] SHA2-256
33,088,034 UART: [kat] SHA2-384
33,090,828 UART: [kat] SHA2-512-ACC
33,093,049 UART: [kat] ECC-384
36,335,401 UART: [kat] HMAC-384Kdf
36,341,182 UART: [kat] LMS
36,756,824 UART: [kat] --
40,786,089 UART: [rt] Verify complete
40,922,545 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,952,455 UART: [rt]cmd =0x46504c67, len=4
40,953,995 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,128,858 ready_for_fw is high
4,129,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,169,096 >>> mbox cmd response: success
18,169,872 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,811,371 UART:
23,811,813 UART: Running Caliptra FMC ...
23,812,975 UART:
23,813,147 UART: [state] CFI Enabled
23,820,876 UART: [fht] FMC Alias Private Key: 7
26,160,994 UART: [art] Extend RT PCRs Done
26,162,243 UART: [art] Lock RT PCRs Done
26,163,683 UART: [art] Populate DV Done
26,169,275 UART: [fht] FMC Alias Private Key: 7
26,170,935 UART: [art] Derive CDI
26,171,759 UART: [art] Store in slot 0x4
26,214,518 UART: [art] Derive Key Pair
26,215,594 UART: [art] Store priv key in slot 0x5
29,457,491 UART: [art] Derive Key Pair - Done
29,470,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,759 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,288 UART: [art] PUB.X = F1FEA95FC5A90A70D469D2ED2DE4F9DB7DC7EA37F64FBE22C230B2AFEAA314519AE65B9A32E95426F097DBE37397F553
31,759,540 UART: [art] PUB.Y = 378FD90FE124E5FCD0B5F259D17EC356696FC232B06ACA107361FFFCCA528F432EF0DB22F4987CA6F66E39AB3E774950
31,766,819 UART: [art] SIG.R = 38A3FC193E88F96B75154AB00812770F745804AFFADCCF9074555B9137003684D45DCC9F91E680A2B130F6AF709A8153
31,774,159 UART: [art] SIG.S = 7B6A09E163EB6E94A19A8B83AB829E41F044887901C0CCFEE71A032CA346E4989A331132C41D7D4BFBA057CBE069CCE1
33,079,110 UART: Caliptra RT
33,079,842 UART: [state] CFI Enabled
33,214,035 UART: [rt] RT listening for mailbox commands...
33,245,147 UART: [rt]cmd =0x46504c54, len=4
33,246,817 >>> mbox cmd response data (8 bytes)
33,247,278 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,277,753 UART: [rt]cmd =0x46504c67, len=4
33,279,107 >>> mbox cmd response: failed
33,280,178 UART: [rt] FIPS self test
33,281,116 UART: [kat] ++
33,281,572 UART: [kat] sha1
33,286,037 UART: [kat] SHA2-256
33,287,810 UART: [kat] SHA2-384
33,290,736 UART: [kat] SHA2-512-ACC
33,292,927 UART: [kat] ECC-384
36,535,464 UART: [kat] HMAC-384Kdf
36,541,302 UART: [kat] LMS
36,956,960 UART: [kat] --
40,965,776 UART: [rt] Verify complete
41,125,071 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,154,817 UART: [rt]cmd =0x46504c67, len=4
41,156,278 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,146 UART:
192,569 UART: Running Caliptra ROM ...
193,722 UART:
193,869 UART: [state] CFI Enabled
261,034 UART: [state] LifecycleState = Unprovisioned
262,962 UART: [state] DebugLocked = No
265,930 UART: [state] WD Timer not started. Device not locked for debugging
269,415 UART: [kat] SHA2-256
449,096 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,837 UART: [kat] ++
460,447 UART: [kat] sha1
470,909 UART: [kat] SHA2-256
473,639 UART: [kat] SHA2-384
480,273 UART: [kat] SHA2-512-ACC
482,655 UART: [kat] ECC-384
2,924,742 UART: [kat] HMAC-384Kdf
2,950,368 UART: [kat] LMS
3,426,871 UART: [kat] --
3,430,524 UART: [cold-reset] ++
3,433,035 UART: [fht] FHT @ 0x50003400
3,443,599 UART: [idev] ++
3,444,169 UART: [idev] CDI.KEYID = 6
3,445,056 UART: [idev] SUBJECT.KEYID = 7
3,446,382 UART: [idev] UDS.KEYID = 0
3,447,286 ready_for_fw is high
3,447,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,613 UART: [idev] Erasing UDS.KEYID = 0
5,969,434 UART: [idev] Sha1 KeyId Algorithm
5,993,223 UART: [idev] --
5,998,250 UART: [ldev] ++
5,998,828 UART: [ldev] CDI.KEYID = 6
5,999,785 UART: [ldev] SUBJECT.KEYID = 5
6,000,955 UART: [ldev] AUTHORITY.KEYID = 7
6,002,272 UART: [ldev] FE.KEYID = 1
6,037,623 UART: [ldev] Erasing FE.KEYID = 1
8,543,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,267,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,283,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,299,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,315,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,336,392 UART: [ldev] --
10,341,387 UART: [fwproc] Wait for Commands...
10,343,179 UART: [fwproc] Recv command 0x46574c44
10,345,227 UART: [fwproc] Recv'd Img size: 118548 bytes
13,828,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,910,730 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,983,746 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,311,487 >>> mbox cmd response: success
14,311,894 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,315,940 UART: [afmc] ++
14,316,527 UART: [afmc] CDI.KEYID = 6
14,317,473 UART: [afmc] SUBJECT.KEYID = 7
14,318,693 UART: [afmc] AUTHORITY.KEYID = 5
16,866,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,608,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,610,736 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,626,528 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,642,572 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,658,172 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,683,185 UART: [afmc] --
18,687,056 UART: [cold-reset] --
18,690,655 UART: [state] Locking Datavault
18,694,393 UART: [state] Locking PCR0, PCR1 and PCR31
18,696,111 UART: [state] Locking ICCM
18,697,457 UART: [exit] Launching FMC @ 0x40000130
18,705,878 UART:
18,706,129 UART: Running Caliptra FMC ...
18,707,236 UART:
18,707,398 UART: [state] CFI Enabled
18,764,279 UART: [fht] FMC Alias Private Key: 7
20,530,360 UART: [art] Extend RT PCRs Done
20,531,590 UART: [art] Lock RT PCRs Done
20,532,922 UART: [art] Populate DV Done
20,538,397 UART: [fht] FMC Alias Private Key: 7
20,540,154 UART: [art] Derive CDI
20,540,896 UART: [art] Store in slot 0x4
20,596,885 UART: [art] Derive Key Pair
20,597,935 UART: [art] Store priv key in slot 0x5
23,060,592 UART: [art] Derive Key Pair - Done
23,073,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,786,071 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,839 UART: [art] PUB.X = 7BC96BF8466AE41EC9D28C6C0DDE715D76C9C716B813382C5CCDFDC396DEC68A71404EA689A4B5841FAD5E33A67DAB4A
24,794,907 UART: [art] PUB.Y = 30EA72E6AC32BADD895A7F20DD2E3CDAB8437D82C3A793019CD7E27953EBDF64C32177D91833979D80C6E9F65A0EC61E
24,802,146 UART: [art] SIG.R = DA6AB2DEA86E82150515086A9FD89F7252CB93188A2EAC7FE92FA49A112C2572A46ABB6C2A4832D7FAB749F649FA1345
24,809,550 UART: [art] SIG.S = C5254BD18B9C51ED923CD8919505C28CB735E4DF393383E6B34C5C4DEA9B540119B8B715A8E8A96E18907D34AC56FE6B
25,787,676 UART: Caliptra RT
25,788,405 UART: [state] CFI Enabled
25,967,810 UART: [rt] RT listening for mailbox commands...
25,999,174 UART: [rt]cmd =0x46504c54, len=4
26,000,547 >>> mbox cmd response data (8 bytes)
26,001,044 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,031,231 UART: [rt]cmd =0x46504c67, len=4
26,032,568 >>> mbox cmd response: failed
26,033,508 UART: [rt] FIPS self test
26,034,359 UART: [kat] ++
26,034,806 UART: [kat] sha1
26,039,507 UART: [kat] SHA2-256
26,041,302 UART: [kat] SHA2-384
26,044,241 UART: [kat] SHA2-512-ACC
26,046,440 UART: [kat] ECC-384
28,481,691 UART: [kat] HMAC-384Kdf
28,508,147 UART: [kat] LMS
28,717,336 UART: [kat] --
32,097,083 UART: [rt] Verify complete
32,171,858 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,201,853 UART: [rt]cmd =0x46504c67, len=4
32,203,411 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
3,461,962 ready_for_fw is high
3,462,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,224,459 >>> mbox cmd response: success
14,225,239 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,513,092 UART:
18,513,507 UART: Running Caliptra FMC ...
18,514,672 UART:
18,514,829 UART: [state] CFI Enabled
18,582,455 UART: [fht] FMC Alias Private Key: 7
20,348,360 UART: [art] Extend RT PCRs Done
20,349,584 UART: [art] Lock RT PCRs Done
20,350,865 UART: [art] Populate DV Done
20,356,641 UART: [fht] FMC Alias Private Key: 7
20,358,354 UART: [art] Derive CDI
20,359,099 UART: [art] Store in slot 0x4
20,415,533 UART: [art] Derive Key Pair
20,416,540 UART: [art] Store priv key in slot 0x5
22,879,440 UART: [art] Derive Key Pair - Done
22,892,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,284 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,793 UART: [art] PUB.X = 26482BB701FE06C487E99F57453EFFC21FCA985DEEE928E6217BCD7F5C7B2B8C85451CC02C8D4FC408DE3725490ACF3B
24,614,105 UART: [art] PUB.Y = 121E868016F63835AE9BD802B645AA042F14785D583D8DF14BF13D5E368D0B147C1C0E18DA0D6224210F0321799ED68A
24,621,318 UART: [art] SIG.R = 31C2866FC056D3D90BBFDB1FABA433AD013135E4A4B403221C73E214D8F4FA442A529C24F6A1471A28A63C9D304FF420
24,628,725 UART: [art] SIG.S = 9B6D84143B54E058585A8E85BECF8812EBBE573A1B73E3871543BB8EF4C91974DF7201C2A6F338080A6AFCC0A6AD3F13
25,607,488 UART: Caliptra RT
25,608,207 UART: [state] CFI Enabled
25,787,880 UART: [rt] RT listening for mailbox commands...
25,819,030 UART: [rt]cmd =0x46504c54, len=4
25,820,424 >>> mbox cmd response data (8 bytes)
25,820,824 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,850,910 UART: [rt]cmd =0x46504c67, len=4
25,852,200 >>> mbox cmd response: failed
25,853,370 UART: [rt] FIPS self test
25,854,306 UART: [kat] ++
25,854,761 UART: [kat] sha1
25,859,154 UART: [kat] SHA2-256
25,860,953 UART: [kat] SHA2-384
25,863,852 UART: [kat] SHA2-512-ACC
25,866,052 UART: [kat] ECC-384
28,300,618 UART: [kat] HMAC-384Kdf
28,326,995 UART: [kat] LMS
28,536,135 UART: [kat] --
31,894,974 UART: [rt] Verify complete
31,990,839 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,020,911 UART: [rt]cmd =0x46504c67, len=4
32,022,530 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
192,619 UART:
192,986 UART: Running Caliptra ROM ...
194,101 UART:
603,889 UART: [state] CFI Enabled
621,165 UART: [state] LifecycleState = Unprovisioned
623,121 UART: [state] DebugLocked = No
625,073 UART: [state] WD Timer not started. Device not locked for debugging
629,142 UART: [kat] SHA2-256
808,791 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,586 UART: [kat] ++
820,056 UART: [kat] sha1
831,581 UART: [kat] SHA2-256
834,313 UART: [kat] SHA2-384
839,100 UART: [kat] SHA2-512-ACC
841,409 UART: [kat] ECC-384
3,284,124 UART: [kat] HMAC-384Kdf
3,296,165 UART: [kat] LMS
3,772,702 UART: [kat] --
3,778,044 UART: [cold-reset] ++
3,779,984 UART: [fht] FHT @ 0x50003400
3,790,468 UART: [idev] ++
3,791,034 UART: [idev] CDI.KEYID = 6
3,791,924 UART: [idev] SUBJECT.KEYID = 7
3,793,247 UART: [idev] UDS.KEYID = 0
3,794,153 ready_for_fw is high
3,794,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,411 UART: [idev] Erasing UDS.KEYID = 0
6,268,233 UART: [idev] Sha1 KeyId Algorithm
6,292,118 UART: [idev] --
6,298,054 UART: [ldev] ++
6,298,637 UART: [ldev] CDI.KEYID = 6
6,299,552 UART: [ldev] SUBJECT.KEYID = 5
6,300,719 UART: [ldev] AUTHORITY.KEYID = 7
6,302,014 UART: [ldev] FE.KEYID = 1
6,313,000 UART: [ldev] Erasing FE.KEYID = 1
8,789,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,648 UART: [ldev] --
10,586,676 UART: [fwproc] Wait for Commands...
10,589,016 UART: [fwproc] Recv command 0x46574c44
10,591,014 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,726 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,745 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,560,542 >>> mbox cmd response: success
14,560,980 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,565,120 UART: [afmc] ++
14,565,711 UART: [afmc] CDI.KEYID = 6
14,566,743 UART: [afmc] SUBJECT.KEYID = 7
14,567,854 UART: [afmc] AUTHORITY.KEYID = 5
17,072,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,489 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,318 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,375 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,976 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,867,501 UART: [afmc] --
18,870,401 UART: [cold-reset] --
18,875,141 UART: [state] Locking Datavault
18,880,935 UART: [state] Locking PCR0, PCR1 and PCR31
18,882,691 UART: [state] Locking ICCM
18,885,168 UART: [exit] Launching FMC @ 0x40000130
18,893,569 UART:
18,893,818 UART: Running Caliptra FMC ...
18,894,925 UART:
18,895,090 UART: [state] CFI Enabled
18,903,357 UART: [fht] FMC Alias Private Key: 7
20,668,990 UART: [art] Extend RT PCRs Done
20,670,215 UART: [art] Lock RT PCRs Done
20,671,953 UART: [art] Populate DV Done
20,677,480 UART: [fht] FMC Alias Private Key: 7
20,679,134 UART: [art] Derive CDI
20,679,882 UART: [art] Store in slot 0x4
20,722,752 UART: [art] Derive Key Pair
20,723,752 UART: [art] Store priv key in slot 0x5
23,150,591 UART: [art] Derive Key Pair - Done
23,163,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,779 UART: [art] Erasing AUTHORITY.KEYID = 7
24,871,266 UART: [art] PUB.X = 6C6182E0610889A3B052554FC96B8D13983846A75F65A38D19F6F1C13B154539BDD66FAA19E9A9039961E7D5DF23044E
24,878,517 UART: [art] PUB.Y = 85042DC53349B541E49296919E6A6E78E9CED0F4572456B7A73BE8062C97B95D17F06EE9324C9024E40049C351DD6A90
24,885,744 UART: [art] SIG.R = 33061C474885853EE6CD434E57FBD170B551B9BD42AF29944DB47387371C910101086CBF7C4ABF0449724A0B723BF735
24,893,083 UART: [art] SIG.S = D7C6266914272470EA7970B9B88CE49D32EB5D700E412CE4376CF37550ED2FC2D637EAFD273BF4E0DAAA879093118E5A
25,872,689 UART: Caliptra RT
25,873,407 UART: [state] CFI Enabled
26,006,608 UART: [rt] RT listening for mailbox commands...
26,037,976 UART: [rt]cmd =0x46504c54, len=4
26,039,483 >>> mbox cmd response data (8 bytes)
26,039,964 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,069,677 UART: [rt]cmd =0x46504c67, len=4
26,070,975 >>> mbox cmd response: failed
26,071,911 UART: [rt] FIPS self test
26,072,847 UART: [kat] ++
26,073,305 UART: [kat] sha1
26,077,664 UART: [kat] SHA2-256
26,079,462 UART: [kat] SHA2-384
26,082,184 UART: [kat] SHA2-512-ACC
26,084,377 UART: [kat] ECC-384
28,511,532 UART: [kat] HMAC-384Kdf
28,517,264 UART: [kat] LMS
28,726,439 UART: [kat] --
32,104,202 UART: [rt] Verify complete
32,209,925 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,239,550 UART: [rt]cmd =0x46504c67, len=4
32,240,940 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,635 writing to cptra_bootfsm_go
3,783,329 ready_for_fw is high
3,783,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,561 >>> mbox cmd response: success
14,451,165 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,712,380 UART:
18,712,775 UART: Running Caliptra FMC ...
18,714,033 UART:
18,714,208 UART: [state] CFI Enabled
18,722,279 UART: [fht] FMC Alias Private Key: 7
20,488,349 UART: [art] Extend RT PCRs Done
20,489,590 UART: [art] Lock RT PCRs Done
20,491,190 UART: [art] Populate DV Done
20,496,399 UART: [fht] FMC Alias Private Key: 7
20,498,001 UART: [art] Derive CDI
20,498,746 UART: [art] Store in slot 0x4
20,540,970 UART: [art] Derive Key Pair
20,542,018 UART: [art] Store priv key in slot 0x5
22,968,882 UART: [art] Derive Key Pair - Done
22,981,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,687,709 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,217 UART: [art] PUB.X = BD9AA707B2D679C9CF94E201ADC3F66CD880DD2D2B1CC6D591FE542B4DADAF6A9C9B6C253968064FCAEC7832A031CD33
24,696,553 UART: [art] PUB.Y = 5A67FF2CB33D0121BEA7BD0474795301DF820535C5150F44A150A35AFFFEA42BC63716A31C5726E87F391E6D88FA5A6A
24,703,768 UART: [art] SIG.R = 059C5B88C5D6A5CDDCF12B789212DCB10F9E5C57A2CACDE8150EE8ABD02F9CD00A7B33AA3A47D5A8382445A4C3E1C256
24,711,186 UART: [art] SIG.S = 15291A793DC8BF1589FF8879CBDD4EA3E16BF260E7CD3B8D7455FBE492879A8973A42031B122BEC7E928C4503AC5F57E
25,690,147 UART: Caliptra RT
25,690,860 UART: [state] CFI Enabled
25,823,996 UART: [rt] RT listening for mailbox commands...
25,855,572 UART: [rt]cmd =0x46504c54, len=4
25,857,241 >>> mbox cmd response data (8 bytes)
25,857,649 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,888,066 UART: [rt]cmd =0x46504c67, len=4
25,889,352 >>> mbox cmd response: failed
25,890,586 UART: [rt] FIPS self test
25,891,514 UART: [kat] ++
25,891,966 UART: [kat] sha1
25,896,472 UART: [kat] SHA2-256
25,898,271 UART: [kat] SHA2-384
25,900,983 UART: [kat] SHA2-512-ACC
25,903,215 UART: [kat] ECC-384
28,330,516 UART: [kat] HMAC-384Kdf
28,336,348 UART: [kat] LMS
28,545,513 UART: [kat] --
31,903,421 UART: [rt] Verify complete
32,027,910 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,057,588 UART: [rt]cmd =0x46504c67, len=4
32,059,173 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,240 UART:
192,606 UART: Running Caliptra ROM ...
193,695 UART:
193,861 UART: [state] CFI Enabled
264,220 UART: [state] LifecycleState = Unprovisioned
266,576 UART: [state] DebugLocked = No
268,957 UART: [state] WD Timer not started. Device not locked for debugging
273,220 UART: [kat] SHA2-256
463,073 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,822 UART: [kat] ++
474,279 UART: [kat] sha1
484,809 UART: [kat] SHA2-256
487,820 UART: [kat] SHA2-384
494,244 UART: [kat] SHA2-512-ACC
496,771 UART: [kat] ECC-384
2,948,115 UART: [kat] HMAC-384Kdf
2,973,747 UART: [kat] LMS
3,505,452 UART: [kat] --
3,507,565 UART: [cold-reset] ++
3,509,822 UART: [fht] FHT @ 0x50003400
3,521,735 UART: [idev] ++
3,522,387 UART: [idev] CDI.KEYID = 6
3,523,431 UART: [idev] SUBJECT.KEYID = 7
3,524,546 UART: [idev] UDS.KEYID = 0
3,525,490 ready_for_fw is high
3,525,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,873 UART: [idev] Erasing UDS.KEYID = 0
6,031,373 UART: [idev] Sha1 KeyId Algorithm
6,053,371 UART: [idev] --
6,057,296 UART: [ldev] ++
6,057,997 UART: [ldev] CDI.KEYID = 6
6,058,914 UART: [ldev] SUBJECT.KEYID = 5
6,060,084 UART: [ldev] AUTHORITY.KEYID = 7
6,061,275 UART: [ldev] FE.KEYID = 1
6,102,015 UART: [ldev] Erasing FE.KEYID = 1
8,606,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,783 UART: [ldev] --
10,414,889 UART: [fwproc] Wait for Commands...
10,416,833 UART: [fwproc] Recv command 0x46574c44
10,419,102 UART: [fwproc] Recv'd Img size: 118548 bytes
13,920,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,830 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,125,429 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,455 >>> mbox cmd response: success
14,686,895 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,690,130 UART: [afmc] ++
14,690,876 UART: [afmc] CDI.KEYID = 6
14,692,007 UART: [afmc] SUBJECT.KEYID = 7
14,693,565 UART: [afmc] AUTHORITY.KEYID = 5
17,236,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,495 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,615 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,775 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,683 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,644 UART: [afmc] --
19,036,680 UART: [cold-reset] --
19,040,235 UART: [state] Locking Datavault
19,046,139 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,288 UART: [state] Locking ICCM
19,049,907 UART: [exit] Launching FMC @ 0x40000130
19,058,584 UART:
19,058,834 UART: Running Caliptra FMC ...
19,059,964 UART:
19,060,124 UART: [state] CFI Enabled
19,118,941 UART: [fht] FMC Alias Private Key: 7
20,886,000 UART: [art] Extend RT PCRs Done
20,887,292 UART: [art] Lock RT PCRs Done
20,889,008 UART: [art] Populate DV Done
20,894,543 UART: [fht] FMC Alias Private Key: 7
20,896,308 UART: [art] Derive CDI
20,897,129 UART: [art] Store in slot 0x4
20,940,275 UART: [art] Derive Key Pair
20,941,316 UART: [art] Store priv key in slot 0x5
23,404,622 UART: [art] Derive Key Pair - Done
23,417,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,130,848 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,358 UART: [art] PUB.X = 1C62B03602DC09A9106D75913BE6FB80944F42311DCEE18D865E352AA34D294F876F816EDFB1E113785D9614904485E2
25,139,642 UART: [art] PUB.Y = BFBFB58D82B68BD8DFD9EB54CFCBD526347366E6B7B55404B143CA512D3A416ECBE42B0865BB78D3AB0ECD37CFDB21F4
25,146,877 UART: [art] SIG.R = B36CE635EBE8086EBDF9D054DAEC9C7BB6D09D3E486B577625292AD0E6AF735A29B042C557BE6961048991B3F1E98EE4
25,154,301 UART: [art] SIG.S = AFE2AF3BCBD297990EC00846FC18E9BB520CE509E7162BDAB8B7134B1816744D8564C91BB5D68AF574D582D1372BBEEF
26,133,178 UART: Caliptra RT
26,133,873 UART: [state] CFI Enabled
26,313,639 UART: [rt] RT listening for mailbox commands...
26,344,975 UART: [rt]cmd =0x46504c54, len=4
26,346,619 >>> mbox cmd response data (8 bytes)
26,347,059 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,377,125 UART: [rt]cmd =0x46504c67, len=4
26,378,460 >>> mbox cmd response: failed
26,379,401 UART: [rt] FIPS self test
26,380,341 UART: [kat] ++
26,380,795 UART: [kat] sha1
26,385,274 UART: [kat] SHA2-256
26,387,075 UART: [kat] SHA2-384
26,389,969 UART: [kat] SHA2-512-ACC
26,392,170 UART: [kat] ECC-384
28,826,711 UART: [kat] HMAC-384Kdf
28,852,727 UART: [kat] LMS
29,061,884 UART: [kat] --
32,441,001 UART: [rt] Verify complete
32,517,031 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,546,871 UART: [rt]cmd =0x46504c67, len=4
32,548,452 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,441,457 ready_for_fw is high
3,442,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,479 >>> mbox cmd response: success
14,820,028 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,134,678 UART:
19,135,058 UART: Running Caliptra FMC ...
19,136,292 UART:
19,136,462 UART: [state] CFI Enabled
19,203,206 UART: [fht] FMC Alias Private Key: 7
20,969,470 UART: [art] Extend RT PCRs Done
20,970,693 UART: [art] Lock RT PCRs Done
20,972,440 UART: [art] Populate DV Done
20,977,705 UART: [fht] FMC Alias Private Key: 7
20,979,411 UART: [art] Derive CDI
20,980,232 UART: [art] Store in slot 0x4
21,035,955 UART: [art] Derive Key Pair
21,036,999 UART: [art] Store priv key in slot 0x5
23,499,968 UART: [art] Derive Key Pair - Done
23,513,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,238 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,748 UART: [art] PUB.X = E7479D2EBD4281C14C82D5AEE6BC4321E1B0F7259D4E9BDAD5063577C715A3113689C97A663AE767EE2F5F660205F8A7
25,234,011 UART: [art] PUB.Y = 9C3EF377F3B5215D1628ED87E097B55DD52A9EEC2502A899ACE87D35686138104475544EB1D473C8FB1886EFC78FBF72
25,241,233 UART: [art] SIG.R = FAEBB11A2923677D159826CF09ABA118EC7379555513629057C480F5726F41A7254B645B863FE75C2314D3C548C74E82
25,248,633 UART: [art] SIG.S = DC8610ED533D894171553B87B8A3E4AC0D2739BCBEE052BF8A7FB85DA3DA53103A5331D47A7398982F9D3CE08892B91B
26,228,046 UART: Caliptra RT
26,228,761 UART: [state] CFI Enabled
26,409,204 UART: [rt] RT listening for mailbox commands...
26,440,843 UART: [rt]cmd =0x46504c54, len=4
26,442,378 >>> mbox cmd response data (8 bytes)
26,442,772 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,472,754 UART: [rt]cmd =0x46504c67, len=4
26,474,296 >>> mbox cmd response: failed
26,475,438 UART: [rt] FIPS self test
26,476,394 UART: [kat] ++
26,476,847 UART: [kat] sha1
26,481,064 UART: [kat] SHA2-256
26,482,870 UART: [kat] SHA2-384
26,485,697 UART: [kat] SHA2-512-ACC
26,487,889 UART: [kat] ECC-384
28,922,032 UART: [kat] HMAC-384Kdf
28,948,254 UART: [kat] LMS
29,157,407 UART: [kat] --
32,515,791 UART: [rt] Verify complete
32,613,823 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,643,933 UART: [rt]cmd =0x46504c67, len=4
32,645,304 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
192,456 UART:
192,834 UART: Running Caliptra ROM ...
193,928 UART:
603,539 UART: [state] CFI Enabled
621,241 UART: [state] LifecycleState = Unprovisioned
623,633 UART: [state] DebugLocked = No
625,603 UART: [state] WD Timer not started. Device not locked for debugging
630,436 UART: [kat] SHA2-256
820,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,133 UART: [kat] ++
831,751 UART: [kat] sha1
843,206 UART: [kat] SHA2-256
846,214 UART: [kat] SHA2-384
852,631 UART: [kat] SHA2-512-ACC
855,225 UART: [kat] ECC-384
3,298,532 UART: [kat] HMAC-384Kdf
3,311,064 UART: [kat] LMS
3,842,866 UART: [kat] --
3,846,860 UART: [cold-reset] ++
3,849,436 UART: [fht] FHT @ 0x50003400
3,860,492 UART: [idev] ++
3,861,204 UART: [idev] CDI.KEYID = 6
3,862,118 UART: [idev] SUBJECT.KEYID = 7
3,863,436 UART: [idev] UDS.KEYID = 0
3,864,376 ready_for_fw is high
3,864,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,442 UART: [idev] Erasing UDS.KEYID = 0
6,344,171 UART: [idev] Sha1 KeyId Algorithm
6,366,652 UART: [idev] --
6,372,379 UART: [ldev] ++
6,373,064 UART: [ldev] CDI.KEYID = 6
6,373,953 UART: [ldev] SUBJECT.KEYID = 5
6,375,186 UART: [ldev] AUTHORITY.KEYID = 7
6,376,375 UART: [ldev] FE.KEYID = 1
6,386,219 UART: [ldev] Erasing FE.KEYID = 1
8,863,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,702 UART: [ldev] --
10,655,975 UART: [fwproc] Wait for Commands...
10,657,700 UART: [fwproc] Recv command 0x46574c44
10,659,974 UART: [fwproc] Recv'd Img size: 118548 bytes
14,160,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,242,434 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,366,076 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,926,210 >>> mbox cmd response: success
14,926,672 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,930,274 UART: [afmc] ++
14,930,971 UART: [afmc] CDI.KEYID = 6
14,932,159 UART: [afmc] SUBJECT.KEYID = 7
14,933,652 UART: [afmc] AUTHORITY.KEYID = 5
17,434,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,154,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,156,750 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,171,872 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,187,019 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,201,888 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,226,786 UART: [afmc] --
19,229,947 UART: [cold-reset] --
19,234,369 UART: [state] Locking Datavault
19,241,246 UART: [state] Locking PCR0, PCR1 and PCR31
19,243,401 UART: [state] Locking ICCM
19,245,953 UART: [exit] Launching FMC @ 0x40000130
19,254,636 UART:
19,254,875 UART: Running Caliptra FMC ...
19,255,985 UART:
19,256,154 UART: [state] CFI Enabled
19,264,156 UART: [fht] FMC Alias Private Key: 7
21,030,879 UART: [art] Extend RT PCRs Done
21,032,106 UART: [art] Lock RT PCRs Done
21,033,655 UART: [art] Populate DV Done
21,039,175 UART: [fht] FMC Alias Private Key: 7
21,040,665 UART: [art] Derive CDI
21,041,405 UART: [art] Store in slot 0x4
21,084,163 UART: [art] Derive Key Pair
21,085,208 UART: [art] Store priv key in slot 0x5
23,511,851 UART: [art] Derive Key Pair - Done
23,524,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,230,435 UART: [art] Erasing AUTHORITY.KEYID = 7
25,231,946 UART: [art] PUB.X = 3E37BCBEF255B85EFD4F2130EB1B827507F8A5A7554EC551724811818700C5578A279BFE0382732A2514F96149CEF41C
25,239,207 UART: [art] PUB.Y = 90D56EA39F74F77682BEAC8004D93A99886FDFCDAC66EBBADC2E27B3504D9F8CBC6C0ECB9E87DF12DB8A6E3BF88D6D83
25,246,439 UART: [art] SIG.R = C1902DF017FDF821D3C110F0BF2887D8F4467794BAB9E8818237BF05134874692878573E2B73C1B9B956E41577D3CC50
25,253,845 UART: [art] SIG.S = 17B55A2986B6C3A5F8F47E63971E2075E79BCB07742712F554FFEF39B5447EC0FE3732356C67FB2AA3572C6D4729FB9A
26,232,886 UART: Caliptra RT
26,233,579 UART: [state] CFI Enabled
26,367,487 UART: [rt] RT listening for mailbox commands...
26,398,569 UART: [rt]cmd =0x46504c54, len=4
26,399,984 >>> mbox cmd response data (8 bytes)
26,400,414 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,430,679 UART: [rt]cmd =0x46504c67, len=4
26,432,000 >>> mbox cmd response: failed
26,433,009 UART: [rt] FIPS self test
26,433,890 UART: [kat] ++
26,434,341 UART: [kat] sha1
26,438,932 UART: [kat] SHA2-256
26,440,740 UART: [kat] SHA2-384
26,443,551 UART: [kat] SHA2-512-ACC
26,445,760 UART: [kat] ECC-384
28,872,763 UART: [kat] HMAC-384Kdf
28,878,801 UART: [kat] LMS
29,087,924 UART: [kat] --
32,465,913 UART: [rt] Verify complete
32,570,487 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,600,396 UART: [rt]cmd =0x46504c67, len=4
32,601,741 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
3,756,475 ready_for_fw is high
3,756,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,060,697 >>> mbox cmd response: success
15,061,470 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,315,163 UART:
19,315,582 UART: Running Caliptra FMC ...
19,316,819 UART:
19,317,006 UART: [state] CFI Enabled
19,325,002 UART: [fht] FMC Alias Private Key: 7
21,091,325 UART: [art] Extend RT PCRs Done
21,092,559 UART: [art] Lock RT PCRs Done
21,094,036 UART: [art] Populate DV Done
21,099,196 UART: [fht] FMC Alias Private Key: 7
21,100,800 UART: [art] Derive CDI
21,101,620 UART: [art] Store in slot 0x4
21,144,390 UART: [art] Derive Key Pair
21,145,426 UART: [art] Store priv key in slot 0x5
23,571,543 UART: [art] Derive Key Pair - Done
23,584,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,291,014 UART: [art] Erasing AUTHORITY.KEYID = 7
25,292,536 UART: [art] PUB.X = 8E75960F6065630ACE78B602BE3A38C0C22C156E94DA40D778FDB204EEAA05083E68BDBB226A01FF601B7C36E3A541A2
25,299,819 UART: [art] PUB.Y = 8A770F1326CF9230548FE655EA31B7289F81779BACD4A14FBA52A545CFA44FCC69676A6A64887C5806B6F170DE541D9F
25,307,028 UART: [art] SIG.R = 1A3AEC5536CE994191A895BB614A4321CD0BC22EFF60D478DA8487374055C885F0D6BCB5D9DF32308AA50EBE25136798
25,314,395 UART: [art] SIG.S = 9FC4B178F56EDD0B455C68BBFD86A2913BD0C6DB546F95B36A819DCC69BDAAE6131E4A9765E2D95E9C0F3BB747EE8521
26,292,629 UART: Caliptra RT
26,293,349 UART: [state] CFI Enabled
26,425,821 UART: [rt] RT listening for mailbox commands...
26,457,296 UART: [rt]cmd =0x46504c54, len=4
26,458,883 >>> mbox cmd response data (8 bytes)
26,459,296 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,489,616 UART: [rt]cmd =0x46504c67, len=4
26,490,943 >>> mbox cmd response: failed
26,491,907 UART: [rt] FIPS self test
26,492,787 UART: [kat] ++
26,493,234 UART: [kat] sha1
26,497,703 UART: [kat] SHA2-256
26,499,498 UART: [kat] SHA2-384
26,502,435 UART: [kat] SHA2-512-ACC
26,504,655 UART: [kat] ECC-384
28,931,905 UART: [kat] HMAC-384Kdf
28,937,957 UART: [kat] LMS
29,147,093 UART: [kat] --
32,505,269 UART: [rt] Verify complete
32,629,257 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,659,057 UART: [rt]cmd =0x46504c67, len=4
32,660,569 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,602 UART: [state] LifecycleState = Unprovisioned
86,257 UART: [state] DebugLocked = No
86,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,321 UART: [kat] SHA2-256
882,252 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,367 UART: [kat] ++
886,519 UART: [kat] sha1
890,819 UART: [kat] SHA2-256
892,757 UART: [kat] SHA2-384
895,472 UART: [kat] SHA2-512-ACC
897,373 UART: [kat] ECC-384
903,216 UART: [kat] HMAC-384Kdf
907,856 UART: [kat] LMS
1,476,052 UART: [kat] --
1,476,905 UART: [cold-reset] ++
1,477,325 UART: [fht] Storing FHT @ 0x50003400
1,479,906 UART: [idev] ++
1,480,074 UART: [idev] CDI.KEYID = 6
1,480,434 UART: [idev] SUBJECT.KEYID = 7
1,480,858 UART: [idev] UDS.KEYID = 0
1,481,203 ready_for_fw is high
1,481,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,734 UART: [idev] Erasing UDS.KEYID = 0
1,505,170 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,876 UART: [idev] --
1,514,887 UART: [ldev] ++
1,515,055 UART: [ldev] CDI.KEYID = 6
1,515,418 UART: [ldev] SUBJECT.KEYID = 5
1,515,844 UART: [ldev] AUTHORITY.KEYID = 7
1,516,307 UART: [ldev] FE.KEYID = 1
1,521,503 UART: [ldev] Erasing FE.KEYID = 1
1,547,702 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,784 UART: [ldev] --
1,587,207 UART: [fwproc] Waiting for Commands...
1,588,018 UART: [fwproc] Received command 0x46574c44
1,588,809 UART: [fwproc] Received Image of size 118548 bytes
2,932,851 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,197 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,415 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,622 >>> mbox cmd response: success
3,131,622 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,132,720 UART: [afmc] ++
3,132,888 UART: [afmc] CDI.KEYID = 6
3,133,250 UART: [afmc] SUBJECT.KEYID = 7
3,133,675 UART: [afmc] AUTHORITY.KEYID = 5
3,168,982 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,052 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,832 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,541 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,424 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,107 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,047 UART: [afmc] --
3,212,161 UART: [cold-reset] --
3,212,937 UART: [state] Locking Datavault
3,214,056 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,660 UART: [state] Locking ICCM
3,215,276 UART: [exit] Launching FMC @ 0x40000130
3,220,606 UART:
3,220,622 UART: Running Caliptra FMC ...
3,221,030 UART:
3,221,084 UART: [state] CFI Enabled
3,231,368 UART: [fht] FMC Alias Private Key: 7
3,349,954 UART: [art] Extend RT PCRs Done
3,350,382 UART: [art] Lock RT PCRs Done
3,352,022 UART: [art] Populate DV Done
3,360,199 UART: [fht] FMC Alias Private Key: 7
3,361,199 UART: [art] Derive CDI
3,361,479 UART: [art] Store in slot 0x4
3,447,275 UART: [art] Derive Key Pair
3,447,635 UART: [art] Store priv key in slot 0x5
3,459,994 UART: [art] Derive Key Pair - Done
3,474,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,017 UART: [art] PUB.X = 951347305713BA940FBFC822A328C2171BDC78A597C6446B9F5836C48021CCD3774EA19A090B6AE64056F70D1A8ED416
3,497,773 UART: [art] PUB.Y = D85F96E620B4886AC4F1EE77AA5A3357C498FBB1518D69A7BE41AAF9CC9B2C074916D4FB5C1DA977A286C66885825B5E
3,504,732 UART: [art] SIG.R = 6A6C08103AF019CF59EDD6162DD3679587EBC1FD783462826C595BB440ABBE568A630CBDCB972D57AB5ECA47E51F4D49
3,511,510 UART: [art] SIG.S = CC100BB5ABBADCC1649D3458D394F1844390F1E441D5378A37DE5CE452CF1D8414D0D1FF7E0BF2ED8FB48F97B02138CC
3,535,102 UART: Caliptra RT
3,535,353 UART: [state] CFI Enabled
3,656,299 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,723 UART: [rt]cmd =0x46504c54, len=4
3,687,873 >>> mbox cmd response data (8 bytes)
3,687,874 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,717,265 UART: [rt]cmd =0x46504c67, len=4
3,718,265 >>> mbox cmd response: failed
3,718,541 UART: [rt] FIPS self test
3,718,872 UART: [kat] ++
3,719,024 UART: [kat] sha1
3,723,405 UART: [kat] SHA2-256
3,725,335 UART: [kat] SHA2-384
3,728,070 UART: [kat] SHA2-512-ACC
3,729,965 UART: [kat] ECC-384
3,739,610 UART: [kat] HMAC-384Kdf
3,744,058 UART: [kat] LMS
4,319,286 UART: [kat] --
6,589,779 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,597,977 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,627,331 UART: [rt]cmd =0x46504c67, len=4
6,628,334 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,393 ready_for_fw is high
1,362,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,104 >>> mbox cmd response: success
2,982,104 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,042,755 UART:
3,042,771 UART: Running Caliptra FMC ...
3,043,179 UART:
3,043,233 UART: [state] CFI Enabled
3,053,557 UART: [fht] FMC Alias Private Key: 7
3,172,181 UART: [art] Extend RT PCRs Done
3,172,609 UART: [art] Lock RT PCRs Done
3,173,801 UART: [art] Populate DV Done
3,182,246 UART: [fht] FMC Alias Private Key: 7
3,183,324 UART: [art] Derive CDI
3,183,604 UART: [art] Store in slot 0x4
3,269,028 UART: [art] Derive Key Pair
3,269,388 UART: [art] Store priv key in slot 0x5
3,283,033 UART: [art] Derive Key Pair - Done
3,297,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,018 UART: [art] PUB.X = D4C897947D5987BD6733FA293FC479F7F48D5C4C9E08ECEE8D9690671F0D2BA4B741B67E5E3FE8240E6A6A2A1B1AEB75
3,320,793 UART: [art] PUB.Y = 7AD987064BDA0FC09695BF551FFD9B5506BF53E31A7A817F95B0CB6C9A497771E45AF7A8993D6CC366017583B0EB28FB
3,327,741 UART: [art] SIG.R = 11B561D3CA9B33A0E29A9107A186732A89765BCA10DB7E49675B2F6441560D751C03C547B1E1D374CBCB49A06A6B9323
3,334,502 UART: [art] SIG.S = A6CA0250C01E818399FDF6A4DD765D8BCF18B4219986B82485FC139F3792B938ABD3797A23EB614D2CE9EA30366C31B1
3,358,433 UART: Caliptra RT
3,358,684 UART: [state] CFI Enabled
3,479,028 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,440 UART: [rt]cmd =0x46504c54, len=4
3,510,658 >>> mbox cmd response data (8 bytes)
3,510,659 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,540,696 UART: [rt]cmd =0x46504c67, len=4
3,541,784 >>> mbox cmd response: failed
3,541,912 UART: [rt] FIPS self test
3,542,243 UART: [kat] ++
3,542,395 UART: [kat] sha1
3,546,550 UART: [kat] SHA2-256
3,548,480 UART: [kat] SHA2-384
3,551,223 UART: [kat] SHA2-512-ACC
3,553,118 UART: [kat] ECC-384
3,563,131 UART: [kat] HMAC-384Kdf
3,567,799 UART: [kat] LMS
4,143,027 UART: [kat] --
6,307,326 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,311,507 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,340,857 UART: [rt]cmd =0x46504c67, len=4
6,342,170 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,232 UART: [kat] SHA2-256
882,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,278 UART: [kat] ++
886,430 UART: [kat] sha1
890,500 UART: [kat] SHA2-256
892,438 UART: [kat] SHA2-384
895,225 UART: [kat] SHA2-512-ACC
897,126 UART: [kat] ECC-384
902,705 UART: [kat] HMAC-384Kdf
907,313 UART: [kat] LMS
1,475,509 UART: [kat] --
1,476,446 UART: [cold-reset] ++
1,476,858 UART: [fht] Storing FHT @ 0x50003400
1,479,767 UART: [idev] ++
1,479,935 UART: [idev] CDI.KEYID = 6
1,480,295 UART: [idev] SUBJECT.KEYID = 7
1,480,719 UART: [idev] UDS.KEYID = 0
1,481,064 ready_for_fw is high
1,481,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,641 UART: [idev] Erasing UDS.KEYID = 0
1,505,049 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,591 UART: [idev] --
1,514,560 UART: [ldev] ++
1,514,728 UART: [ldev] CDI.KEYID = 6
1,515,091 UART: [ldev] SUBJECT.KEYID = 5
1,515,517 UART: [ldev] AUTHORITY.KEYID = 7
1,515,980 UART: [ldev] FE.KEYID = 1
1,521,412 UART: [ldev] Erasing FE.KEYID = 1
1,547,103 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,107 UART: [ldev] --
1,586,560 UART: [fwproc] Waiting for Commands...
1,587,285 UART: [fwproc] Received command 0x46574c44
1,588,076 UART: [fwproc] Received Image of size 118548 bytes
2,933,044 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,938 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,156 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,355 >>> mbox cmd response: success
3,132,355 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,133,419 UART: [afmc] ++
3,133,587 UART: [afmc] CDI.KEYID = 6
3,133,949 UART: [afmc] SUBJECT.KEYID = 7
3,134,374 UART: [afmc] AUTHORITY.KEYID = 5
3,169,089 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,429 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,209 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,918 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,801 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,484 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,206 UART: [afmc] --
3,212,304 UART: [cold-reset] --
3,213,220 UART: [state] Locking Datavault
3,214,211 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,815 UART: [state] Locking ICCM
3,215,323 UART: [exit] Launching FMC @ 0x40000130
3,220,653 UART:
3,220,669 UART: Running Caliptra FMC ...
3,221,077 UART:
3,221,220 UART: [state] CFI Enabled
3,231,704 UART: [fht] FMC Alias Private Key: 7
3,351,164 UART: [art] Extend RT PCRs Done
3,351,592 UART: [art] Lock RT PCRs Done
3,353,036 UART: [art] Populate DV Done
3,361,333 UART: [fht] FMC Alias Private Key: 7
3,362,503 UART: [art] Derive CDI
3,362,783 UART: [art] Store in slot 0x4
3,447,993 UART: [art] Derive Key Pair
3,448,353 UART: [art] Store priv key in slot 0x5
3,462,128 UART: [art] Derive Key Pair - Done
3,477,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,274 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,039 UART: [art] PUB.X = 66AE634908C8AB0EFD85A06A5A1FB05289FF93C0AEDD5074A571B129CC3C4A15950F9EB7CAED808D0F7ED6E96A8E13B8
3,499,817 UART: [art] PUB.Y = C73B79FA81AECE547A018AC5DC7F05183C21A5A400B8015C777738806FDDDD0A91D8DDFE704D70D8B5F6D1E6AC090E41
3,506,743 UART: [art] SIG.R = 232EB4B8B0BF0C6D0960F06AB7B32A7FC208F9FA7D37C72CDC20A038EA062A89D8038EE75BCE011242B7CAB458D441F6
3,513,511 UART: [art] SIG.S = FB58A4A31A8A043DDB20F5E1BCD067BFB382DF33A881DD996A04C50FF4B33F5B81FF4EF45AD5C7D22EFFE8056260CDD8
3,537,801 UART: Caliptra RT
3,538,144 UART: [state] CFI Enabled
3,658,438 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,864 UART: [rt]cmd =0x46504c54, len=4
3,690,008 >>> mbox cmd response data (8 bytes)
3,690,009 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,719,838 UART: [rt]cmd =0x46504c67, len=4
3,720,766 >>> mbox cmd response: failed
3,721,012 UART: [rt] FIPS self test
3,721,343 UART: [kat] ++
3,721,495 UART: [kat] sha1
3,725,594 UART: [kat] SHA2-256
3,727,524 UART: [kat] SHA2-384
3,730,227 UART: [kat] SHA2-512-ACC
3,732,122 UART: [kat] ECC-384
3,741,897 UART: [kat] HMAC-384Kdf
3,746,439 UART: [kat] LMS
4,321,667 UART: [kat] --
6,592,336 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,600,478 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,629,894 UART: [rt]cmd =0x46504c67, len=4
6,630,991 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,042 ready_for_fw is high
1,363,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,361 >>> mbox cmd response: success
2,981,361 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,043,074 UART:
3,043,090 UART: Running Caliptra FMC ...
3,043,498 UART:
3,043,641 UART: [state] CFI Enabled
3,054,585 UART: [fht] FMC Alias Private Key: 7
3,173,755 UART: [art] Extend RT PCRs Done
3,174,183 UART: [art] Lock RT PCRs Done
3,175,861 UART: [art] Populate DV Done
3,184,064 UART: [fht] FMC Alias Private Key: 7
3,185,130 UART: [art] Derive CDI
3,185,410 UART: [art] Store in slot 0x4
3,271,222 UART: [art] Derive Key Pair
3,271,582 UART: [art] Store priv key in slot 0x5
3,285,067 UART: [art] Derive Key Pair - Done
3,299,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,831 UART: [art] PUB.X = 5405EDE0898F778B2C0763FDC6092BB6C1AEEF7613629910CC9EB0213EEE344AA0F87A6AE74432F2E3E259D255BB9782
3,322,600 UART: [art] PUB.Y = 5B237676567F560D154DFED3668FF2019E89B81D9B2B2DE5C151AC1B306BB51BB64E1AA53E834FD5994BE89D40386366
3,329,548 UART: [art] SIG.R = 118C365501964C11334994520621BF1B170CBC4C9F413391BE4045EDD7BA13C87E0E5EE07ADF86ADB111481822F2F107
3,336,301 UART: [art] SIG.S = 6A2A973AED404E1DEE3F0A08043F39521EC69C9E166020A1AACF72120EE10C8AB90FFB69F8739AD5265425C7847E8F10
3,360,035 UART: Caliptra RT
3,360,378 UART: [state] CFI Enabled
3,479,869 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,327 UART: [rt]cmd =0x46504c54, len=4
3,511,487 >>> mbox cmd response data (8 bytes)
3,511,488 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,541,099 UART: [rt]cmd =0x46504c67, len=4
3,542,075 >>> mbox cmd response: failed
3,542,363 UART: [rt] FIPS self test
3,542,694 UART: [kat] ++
3,542,846 UART: [kat] sha1
3,547,027 UART: [kat] SHA2-256
3,548,957 UART: [kat] SHA2-384
3,551,808 UART: [kat] SHA2-512-ACC
3,553,703 UART: [kat] ECC-384
3,563,526 UART: [kat] HMAC-384Kdf
3,568,024 UART: [kat] LMS
4,143,252 UART: [kat] --
6,306,881 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,311,798 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,341,276 UART: [rt]cmd =0x46504c67, len=4
6,342,627 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,626 UART: [kat] SHA2-256
901,566 UART: [kat] SHA2-384
904,189 UART: [kat] SHA2-512-ACC
906,090 UART: [kat] ECC-384
916,293 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,169,940 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,174,350 ready_for_fw is high
1,174,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,091 UART: [idev] Erasing UDS.KEYID = 0
1,198,989 UART: [idev] Sha1 KeyId Algorithm
1,207,669 UART: [idev] --
1,208,798 UART: [ldev] ++
1,208,966 UART: [ldev] CDI.KEYID = 6
1,209,330 UART: [ldev] SUBJECT.KEYID = 5
1,209,757 UART: [ldev] AUTHORITY.KEYID = 7
1,210,220 UART: [ldev] FE.KEYID = 1
1,215,350 UART: [ldev] Erasing FE.KEYID = 1
1,241,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,774 UART: [ldev] --
1,281,151 UART: [fwproc] Wait for Commands...
1,281,944 UART: [fwproc] Recv command 0x46574c44
1,282,677 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,756 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,931 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,312 >>> mbox cmd response: success
2,825,312 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,826,528 UART: [afmc] ++
2,826,696 UART: [afmc] CDI.KEYID = 6
2,827,059 UART: [afmc] SUBJECT.KEYID = 7
2,827,485 UART: [afmc] AUTHORITY.KEYID = 5
2,863,348 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,711 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,460 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,170 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,051 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,752 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,421 UART: [afmc] --
2,906,266 UART: [cold-reset] --
2,907,072 UART: [state] Locking Datavault
2,908,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,637 UART: [state] Locking ICCM
2,909,283 UART: [exit] Launching FMC @ 0x40000130
2,914,613 UART:
2,914,629 UART: Running Caliptra FMC ...
2,915,037 UART:
2,915,091 UART: [state] CFI Enabled
2,925,617 UART: [fht] FMC Alias Private Key: 7
3,044,125 UART: [art] Extend RT PCRs Done
3,044,553 UART: [art] Lock RT PCRs Done
3,045,855 UART: [art] Populate DV Done
3,054,182 UART: [fht] FMC Alias Private Key: 7
3,055,328 UART: [art] Derive CDI
3,055,608 UART: [art] Store in slot 0x4
3,140,821 UART: [art] Derive Key Pair
3,141,181 UART: [art] Store priv key in slot 0x5
3,154,455 UART: [art] Derive Key Pair - Done
3,169,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,504 UART: [art] PUB.X = 38D4574A1A3BDA71FCBB4D232E6B7B287F25E7B5197AC8614FC6AD6F4BBBBCB9FAFA7F55FDC1DC84B4E5B701651C5A8F
3,192,301 UART: [art] PUB.Y = 6672B9216EA391D54F81521828E0B6002DF521B0071C105A3F01AC914FB5F50BEBBCC7FF7E852B18C6F6C17D65697EC0
3,199,226 UART: [art] SIG.R = 46A77448B666085F7D27D86ADCE89B2DCCB4E3E43E779B2F2B458E3B25E29E64E322BBDAC71269F7FA395FBB960CDB7A
3,206,008 UART: [art] SIG.S = A0449E20208C5BD1602457C3B53568F1C4398168BD11E5A996EEB38DA476BABBB984B60BB33E63DC7210644C86F43C60
3,229,729 UART: Caliptra RT
3,229,980 UART: [state] CFI Enabled
3,348,923 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,481 UART: [rt]cmd =0x46504c54, len=4
3,380,689 >>> mbox cmd response data (8 bytes)
3,380,690 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,410,293 UART: [rt]cmd =0x46504c67, len=4
3,411,161 >>> mbox cmd response: failed
3,411,435 UART: [rt] FIPS self test
3,411,766 UART: [kat] ++
3,411,918 UART: [kat] sha1
3,416,077 UART: [kat] SHA2-256
3,418,007 UART: [kat] SHA2-384
3,420,860 UART: [kat] SHA2-512-ACC
3,422,755 UART: [kat] ECC-384
3,432,296 UART: [kat] HMAC-384Kdf
3,436,927 UART: [kat] LMS
3,696,687 UART: [kat] --
5,974,193 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,980,904 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,010,126 UART: [rt]cmd =0x46504c67, len=4
6,011,513 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,384 ready_for_fw is high
1,058,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,732 >>> mbox cmd response: success
2,678,732 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,741,115 UART:
2,741,131 UART: Running Caliptra FMC ...
2,741,539 UART:
2,741,593 UART: [state] CFI Enabled
2,751,737 UART: [fht] FMC Alias Private Key: 7
2,870,377 UART: [art] Extend RT PCRs Done
2,870,805 UART: [art] Lock RT PCRs Done
2,872,491 UART: [art] Populate DV Done
2,880,724 UART: [fht] FMC Alias Private Key: 7
2,881,770 UART: [art] Derive CDI
2,882,050 UART: [art] Store in slot 0x4
2,968,139 UART: [art] Derive Key Pair
2,968,499 UART: [art] Store priv key in slot 0x5
2,982,189 UART: [art] Derive Key Pair - Done
2,996,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,261 UART: [art] PUB.X = 925B00F6C8323F1EBA5A921C934A6EBA58B2AC6A6598B5997F7ACA2A84F30121FE816F4D1E84621549B4C013321D5694
3,020,008 UART: [art] PUB.Y = E5614476139A0BE701AA7899323C3A12575AF0B951EA6074A82B55C9B2AFAC35F0DCF5EB012758DF26BB1FB8E62563CC
3,026,959 UART: [art] SIG.R = 0F2E0EC3BEED3C7B19C32B4D8348AB9AB7A735A51FC9F3E7FD86FAEF8A47DE75E5A948A47A4C4F278EF8F8AFCCE76A9A
3,033,757 UART: [art] SIG.S = DF01662B8B7EBBAEB3B82CCE0965EAC050C06070F71F08C87392AFC196975D89ADE71E838AA2C299FE87E187D6FD6E6C
3,057,530 UART: Caliptra RT
3,057,781 UART: [state] CFI Enabled
3,177,446 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,944 UART: [rt]cmd =0x46504c54, len=4
3,209,026 >>> mbox cmd response data (8 bytes)
3,209,027 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,238,678 UART: [rt]cmd =0x46504c67, len=4
3,239,686 >>> mbox cmd response: failed
3,239,938 UART: [rt] FIPS self test
3,240,269 UART: [kat] ++
3,240,421 UART: [kat] sha1
3,244,584 UART: [kat] SHA2-256
3,246,514 UART: [kat] SHA2-384
3,249,287 UART: [kat] SHA2-512-ACC
3,251,182 UART: [kat] ECC-384
3,260,901 UART: [kat] HMAC-384Kdf
3,265,480 UART: [kat] LMS
3,525,240 UART: [kat] --
5,699,621 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,709,439 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,738,787 UART: [rt]cmd =0x46504c67, len=4
5,739,864 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,394 UART: [kat] SHA2-512-ACC
906,295 UART: [kat] ECC-384
916,284 UART: [kat] HMAC-384Kdf
920,918 UART: [kat] LMS
1,169,230 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,517 UART: [fht] FHT @ 0x50003400
1,173,085 UART: [idev] ++
1,173,253 UART: [idev] CDI.KEYID = 6
1,173,614 UART: [idev] SUBJECT.KEYID = 7
1,174,039 UART: [idev] UDS.KEYID = 0
1,174,385 ready_for_fw is high
1,174,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,982 UART: [idev] Erasing UDS.KEYID = 0
1,199,432 UART: [idev] Sha1 KeyId Algorithm
1,208,442 UART: [idev] --
1,209,461 UART: [ldev] ++
1,209,629 UART: [ldev] CDI.KEYID = 6
1,209,993 UART: [ldev] SUBJECT.KEYID = 5
1,210,420 UART: [ldev] AUTHORITY.KEYID = 7
1,210,883 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,243,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,551 UART: [ldev] --
1,282,972 UART: [fwproc] Wait for Commands...
1,283,563 UART: [fwproc] Recv command 0x46574c44
1,284,296 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,194 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,369 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,648 >>> mbox cmd response: success
2,828,648 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,829,682 UART: [afmc] ++
2,829,850 UART: [afmc] CDI.KEYID = 6
2,830,213 UART: [afmc] SUBJECT.KEYID = 7
2,830,639 UART: [afmc] AUTHORITY.KEYID = 5
2,866,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,994 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,704 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,585 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,286 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,065 UART: [afmc] --
2,910,112 UART: [cold-reset] --
2,910,914 UART: [state] Locking Datavault
2,912,115 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,719 UART: [state] Locking ICCM
2,913,201 UART: [exit] Launching FMC @ 0x40000130
2,918,531 UART:
2,918,547 UART: Running Caliptra FMC ...
2,918,955 UART:
2,919,098 UART: [state] CFI Enabled
2,929,610 UART: [fht] FMC Alias Private Key: 7
3,048,986 UART: [art] Extend RT PCRs Done
3,049,414 UART: [art] Lock RT PCRs Done
3,051,020 UART: [art] Populate DV Done
3,059,357 UART: [fht] FMC Alias Private Key: 7
3,060,525 UART: [art] Derive CDI
3,060,805 UART: [art] Store in slot 0x4
3,146,992 UART: [art] Derive Key Pair
3,147,352 UART: [art] Store priv key in slot 0x5
3,161,198 UART: [art] Derive Key Pair - Done
3,175,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,385 UART: [art] PUB.X = 146F878D4274D0EA173DD1EC696DECBB6A0396A9BACB0D42309DB360BB5F02DA260E9DFB443B13E6196B1A2E80151BA4
3,199,159 UART: [art] PUB.Y = 3E30525309AE02A8DE7FBAA85110FD081D0206A895EF0E481C9FD3B13FE0B779BC7160ACBAEC0538504F6A5CABF4FAD4
3,206,108 UART: [art] SIG.R = 8650954DD2E2AD9C3895E8BDBE62CC70BD7F999B49FAE3213AA843FC199C9BB92097F91B15492E1FEB69D58A2C983925
3,212,888 UART: [art] SIG.S = 27C6A258383959E234CA2763FEC7C20E4AA8A37CA094B58B1538E6365CAA30D507547F655A5B09A9671C5D7D0A725BB2
3,236,874 UART: Caliptra RT
3,237,217 UART: [state] CFI Enabled
3,356,714 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,954 UART: [rt]cmd =0x46504c54, len=4
3,388,090 >>> mbox cmd response data (8 bytes)
3,388,091 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,417,614 UART: [rt]cmd =0x46504c67, len=4
3,418,558 >>> mbox cmd response: failed
3,418,860 UART: [rt] FIPS self test
3,419,191 UART: [kat] ++
3,419,343 UART: [kat] sha1
3,423,514 UART: [kat] SHA2-256
3,425,444 UART: [kat] SHA2-384
3,428,305 UART: [kat] SHA2-512-ACC
3,430,200 UART: [kat] ECC-384
3,440,129 UART: [kat] HMAC-384Kdf
3,444,770 UART: [kat] LMS
3,704,530 UART: [kat] --
5,982,281 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,988,301 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,017,531 UART: [rt]cmd =0x46504c67, len=4
6,018,734 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,233 ready_for_fw is high
1,060,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,569 >>> mbox cmd response: success
2,680,569 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,742,360 UART:
2,742,376 UART: Running Caliptra FMC ...
2,742,784 UART:
2,742,927 UART: [state] CFI Enabled
2,753,493 UART: [fht] FMC Alias Private Key: 7
2,872,861 UART: [art] Extend RT PCRs Done
2,873,289 UART: [art] Lock RT PCRs Done
2,874,803 UART: [art] Populate DV Done
2,883,092 UART: [fht] FMC Alias Private Key: 7
2,884,124 UART: [art] Derive CDI
2,884,404 UART: [art] Store in slot 0x4
2,970,305 UART: [art] Derive Key Pair
2,970,665 UART: [art] Store priv key in slot 0x5
2,983,773 UART: [art] Derive Key Pair - Done
2,998,769 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,209 UART: [art] PUB.X = 29C4C95D8B6EA9A9183256729DD3F405D6827203491A06A7A16FDECAE9BCBEF1CCC4F9216081F0C3B00774E74BF97EDF
3,021,981 UART: [art] PUB.Y = C997EA28003E79C261D350D868ACAC3993C4416A858329D62466898304E3C0B47492FDC33F76D91A30205232ADA7D3F4
3,028,900 UART: [art] SIG.R = A3C9C85F802C72A734668641E983411FCB9C3D51BFA2B151F148756FDE823E1A6D4109FF0F1EF0600873A38A0C710BC1
3,035,659 UART: [art] SIG.S = 92C03C6B473AB0CCDB892273FEE53716C4637C0326EDC77B2CE992142C41D6166F0F3A246C145A83B87F9837AC9A6EF8
3,059,253 UART: Caliptra RT
3,059,596 UART: [state] CFI Enabled
3,178,938 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,518 UART: [rt]cmd =0x46504c54, len=4
3,210,572 >>> mbox cmd response data (8 bytes)
3,210,573 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,240,286 UART: [rt]cmd =0x46504c67, len=4
3,241,306 >>> mbox cmd response: failed
3,241,492 UART: [rt] FIPS self test
3,241,823 UART: [kat] ++
3,241,975 UART: [kat] sha1
3,246,200 UART: [kat] SHA2-256
3,248,130 UART: [kat] SHA2-384
3,250,761 UART: [kat] SHA2-512-ACC
3,252,656 UART: [kat] ECC-384
3,262,389 UART: [kat] HMAC-384Kdf
3,267,000 UART: [kat] LMS
3,526,760 UART: [kat] --
5,701,469 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,711,059 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,740,543 UART: [rt]cmd =0x46504c67, len=4
5,741,686 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
893,558 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,683 UART: [kat] ++
897,835 UART: [kat] sha1
901,911 UART: [kat] SHA2-256
903,851 UART: [kat] SHA2-384
906,526 UART: [kat] SHA2-512-ACC
908,427 UART: [kat] ECC-384
917,730 UART: [kat] HMAC-384Kdf
922,524 UART: [kat] LMS
1,170,852 UART: [kat] --
1,171,547 UART: [cold-reset] ++
1,171,893 UART: [fht] FHT @ 0x50003400
1,174,462 UART: [idev] ++
1,174,630 UART: [idev] CDI.KEYID = 6
1,174,990 UART: [idev] SUBJECT.KEYID = 7
1,175,414 UART: [idev] UDS.KEYID = 0
1,175,759 ready_for_fw is high
1,175,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,526 UART: [idev] Erasing UDS.KEYID = 0
1,200,141 UART: [idev] Sha1 KeyId Algorithm
1,208,491 UART: [idev] --
1,209,451 UART: [ldev] ++
1,209,619 UART: [ldev] CDI.KEYID = 6
1,209,982 UART: [ldev] SUBJECT.KEYID = 5
1,210,408 UART: [ldev] AUTHORITY.KEYID = 7
1,210,871 UART: [ldev] FE.KEYID = 1
1,215,887 UART: [ldev] Erasing FE.KEYID = 1
1,242,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,475 UART: [ldev] --
1,281,880 UART: [fwproc] Wait for Commands...
1,282,668 UART: [fwproc] Recv command 0x46574c44
1,283,396 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,972 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,142 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,375 >>> mbox cmd response: success
2,826,375 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,827,383 UART: [afmc] ++
2,827,551 UART: [afmc] CDI.KEYID = 6
2,827,913 UART: [afmc] SUBJECT.KEYID = 7
2,828,338 UART: [afmc] AUTHORITY.KEYID = 5
2,863,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,054 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,802 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,511 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,394 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,095 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,951 UART: [afmc] --
2,906,879 UART: [cold-reset] --
2,907,803 UART: [state] Locking Datavault
2,908,906 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,510 UART: [state] Locking ICCM
2,910,120 UART: [exit] Launching FMC @ 0x40000130
2,915,450 UART:
2,915,466 UART: Running Caliptra FMC ...
2,915,874 UART:
2,915,928 UART: [state] CFI Enabled
2,926,388 UART: [fht] FMC Alias Private Key: 7
3,045,400 UART: [art] Extend RT PCRs Done
3,045,828 UART: [art] Lock RT PCRs Done
3,047,428 UART: [art] Populate DV Done
3,055,587 UART: [fht] FMC Alias Private Key: 7
3,056,593 UART: [art] Derive CDI
3,056,873 UART: [art] Store in slot 0x4
3,142,962 UART: [art] Derive Key Pair
3,143,322 UART: [art] Store priv key in slot 0x5
3,156,166 UART: [art] Derive Key Pair - Done
3,171,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,892 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,657 UART: [art] PUB.X = 8037F495DB6FD2D5BB2376AEAB4E51A036A70F8B1E1265FEDB87B33563E7EC8B7061C452CA261E964FAE8F16D9034A00
3,194,411 UART: [art] PUB.Y = 3618E422F559A1449978D6920927F16F1DEA829FD9574C28892D9846B14DFD3FCB635B6606E8D62C893195E55B991C7C
3,201,349 UART: [art] SIG.R = 94235768ED982DDD3E324D28365B62FADC2557939CE35614CEDA52AA90EFDE5EE61184EA9979FE33D75AD46CD6944463
3,208,127 UART: [art] SIG.S = 739C791ADF6D2E09168738DAC65E31413B73256F00B577FB61E4B558BC5DBF926290780438FA241465167EF258DDB637
3,231,931 UART: Caliptra RT
3,232,182 UART: [state] CFI Enabled
3,350,683 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,315 UART: [rt]cmd =0x46504c54, len=4
3,382,449 >>> mbox cmd response data (8 bytes)
3,382,450 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,412,221 UART: [rt]cmd =0x46504c67, len=4
3,413,249 >>> mbox cmd response: failed
3,413,479 UART: [rt] FIPS self test
3,413,810 UART: [kat] ++
3,413,962 UART: [kat] sha1
3,418,193 UART: [kat] SHA2-256
3,420,123 UART: [kat] SHA2-384
3,422,966 UART: [kat] SHA2-512-ACC
3,424,861 UART: [kat] ECC-384
3,434,234 UART: [kat] HMAC-384Kdf
3,438,835 UART: [kat] LMS
3,698,595 UART: [kat] --
5,978,522 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,982,992 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,012,432 UART: [rt]cmd =0x46504c67, len=4
6,013,555 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,925 ready_for_fw is high
1,059,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,416 >>> mbox cmd response: success
2,680,416 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,742,361 UART:
2,742,377 UART: Running Caliptra FMC ...
2,742,785 UART:
2,742,839 UART: [state] CFI Enabled
2,753,617 UART: [fht] FMC Alias Private Key: 7
2,873,293 UART: [art] Extend RT PCRs Done
2,873,721 UART: [art] Lock RT PCRs Done
2,875,245 UART: [art] Populate DV Done
2,883,444 UART: [fht] FMC Alias Private Key: 7
2,884,594 UART: [art] Derive CDI
2,884,874 UART: [art] Store in slot 0x4
2,970,527 UART: [art] Derive Key Pair
2,970,887 UART: [art] Store priv key in slot 0x5
2,983,913 UART: [art] Derive Key Pair - Done
2,998,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,776 UART: [art] PUB.X = F5274D1BF68BDF32B20F556E4BAA022E2F0F317CEBD0234891228BEF565C37220ECB03D8D219DE3664F54A75C8B6D759
3,021,541 UART: [art] PUB.Y = 664DE291D8AFE80B092EFA4B3B02393DE3D7F0CE2598D7A2EAD3D61D9A2936E16FE0D2A927B6E63E3D32146FE50D62D0
3,028,495 UART: [art] SIG.R = C729361452C4EFDD62DFFC9871341EB236DE936E6198041301384ADF90FB09ED964DF1C7C1EBD31BD320F342EA1A8432
3,035,264 UART: [art] SIG.S = AA7D2E06E924A3D3A0013D52E41A9E2E7A25FA7E2267CA27C9F0D050446D34ED9D25A1249360F6C565648626535C0051
3,059,328 UART: Caliptra RT
3,059,579 UART: [state] CFI Enabled
3,178,747 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,055 UART: [rt]cmd =0x46504c54, len=4
3,210,349 >>> mbox cmd response data (8 bytes)
3,210,350 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,239,793 UART: [rt]cmd =0x46504c67, len=4
3,240,819 >>> mbox cmd response: failed
3,241,027 UART: [rt] FIPS self test
3,241,358 UART: [kat] ++
3,241,510 UART: [kat] sha1
3,245,653 UART: [kat] SHA2-256
3,247,583 UART: [kat] SHA2-384
3,250,514 UART: [kat] SHA2-512-ACC
3,252,409 UART: [kat] ECC-384
3,262,182 UART: [kat] HMAC-384Kdf
3,266,753 UART: [kat] LMS
3,526,513 UART: [kat] --
5,701,494 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,710,572 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,739,986 UART: [rt]cmd =0x46504c67, len=4
5,741,263 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
893,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,944 UART: [kat] ++
898,096 UART: [kat] sha1
902,278 UART: [kat] SHA2-256
904,218 UART: [kat] SHA2-384
906,755 UART: [kat] SHA2-512-ACC
908,656 UART: [kat] ECC-384
918,367 UART: [kat] HMAC-384Kdf
923,065 UART: [kat] LMS
1,171,393 UART: [kat] --
1,172,252 UART: [cold-reset] ++
1,172,796 UART: [fht] FHT @ 0x50003400
1,175,353 UART: [idev] ++
1,175,521 UART: [idev] CDI.KEYID = 6
1,175,881 UART: [idev] SUBJECT.KEYID = 7
1,176,305 UART: [idev] UDS.KEYID = 0
1,176,650 ready_for_fw is high
1,176,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,483 UART: [idev] Erasing UDS.KEYID = 0
1,201,518 UART: [idev] Sha1 KeyId Algorithm
1,209,828 UART: [idev] --
1,210,904 UART: [ldev] ++
1,211,072 UART: [ldev] CDI.KEYID = 6
1,211,435 UART: [ldev] SUBJECT.KEYID = 5
1,211,861 UART: [ldev] AUTHORITY.KEYID = 7
1,212,324 UART: [ldev] FE.KEYID = 1
1,217,736 UART: [ldev] Erasing FE.KEYID = 1
1,244,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,858 UART: [ldev] --
1,284,351 UART: [fwproc] Wait for Commands...
1,284,923 UART: [fwproc] Recv command 0x46574c44
1,285,651 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,353 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,523 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,676 >>> mbox cmd response: success
2,827,676 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,828,704 UART: [afmc] ++
2,828,872 UART: [afmc] CDI.KEYID = 6
2,829,234 UART: [afmc] SUBJECT.KEYID = 7
2,829,659 UART: [afmc] AUTHORITY.KEYID = 5
2,865,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,637 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,385 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,094 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,977 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,678 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,488 UART: [afmc] --
2,908,528 UART: [cold-reset] --
2,909,244 UART: [state] Locking Datavault
2,910,545 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,149 UART: [state] Locking ICCM
2,911,793 UART: [exit] Launching FMC @ 0x40000130
2,917,123 UART:
2,917,139 UART: Running Caliptra FMC ...
2,917,547 UART:
2,917,690 UART: [state] CFI Enabled
2,928,524 UART: [fht] FMC Alias Private Key: 7
3,047,710 UART: [art] Extend RT PCRs Done
3,048,138 UART: [art] Lock RT PCRs Done
3,049,722 UART: [art] Populate DV Done
3,057,957 UART: [fht] FMC Alias Private Key: 7
3,059,121 UART: [art] Derive CDI
3,059,401 UART: [art] Store in slot 0x4
3,145,160 UART: [art] Derive Key Pair
3,145,520 UART: [art] Store priv key in slot 0x5
3,159,114 UART: [art] Derive Key Pair - Done
3,173,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,360 UART: [art] PUB.X = 17D695231488876BE62626F079A08715CB8012E6BB44811D1001C78D298340CE1C1DFFB7889A3C94BE66E660A004C402
3,197,113 UART: [art] PUB.Y = 92E2B6EBAFAE9C29721BDB764930660DAF429B9392F755A411DE3BB635AC710F5920379343786D0E97F8447967F64CA1
3,204,054 UART: [art] SIG.R = B258DC07582EEAF33FD8134E29420F2EC51DC87FD8CD45B022D9C943CCAF0205EC5595B67259C6DCB47F8CBE2530BFED
3,210,832 UART: [art] SIG.S = 08B99DD1CC607F98F6C4AD9B8E44990AF1D249EEFB5FED1AF1025A70B50C1074F0F54CF293F93290BC1E70A4E53E0C61
3,234,845 UART: Caliptra RT
3,235,188 UART: [state] CFI Enabled
3,354,559 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,227 UART: [rt]cmd =0x46504c54, len=4
3,386,355 >>> mbox cmd response data (8 bytes)
3,386,356 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,415,815 UART: [rt]cmd =0x46504c67, len=4
3,416,573 >>> mbox cmd response: failed
3,416,873 UART: [rt] FIPS self test
3,417,204 UART: [kat] ++
3,417,356 UART: [kat] sha1
3,421,471 UART: [kat] SHA2-256
3,423,401 UART: [kat] SHA2-384
3,426,314 UART: [kat] SHA2-512-ACC
3,428,209 UART: [kat] ECC-384
3,438,290 UART: [kat] HMAC-384Kdf
3,442,993 UART: [kat] LMS
3,702,753 UART: [kat] --
5,982,580 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,986,316 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,015,656 UART: [rt]cmd =0x46504c67, len=4
6,016,755 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,102 ready_for_fw is high
1,061,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,055 >>> mbox cmd response: success
2,681,055 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,743,408 UART:
2,743,424 UART: Running Caliptra FMC ...
2,743,832 UART:
2,743,975 UART: [state] CFI Enabled
2,754,291 UART: [fht] FMC Alias Private Key: 7
2,872,787 UART: [art] Extend RT PCRs Done
2,873,215 UART: [art] Lock RT PCRs Done
2,874,631 UART: [art] Populate DV Done
2,882,568 UART: [fht] FMC Alias Private Key: 7
2,883,508 UART: [art] Derive CDI
2,883,788 UART: [art] Store in slot 0x4
2,969,781 UART: [art] Derive Key Pair
2,970,141 UART: [art] Store priv key in slot 0x5
2,983,403 UART: [art] Derive Key Pair - Done
2,997,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,146 UART: [art] PUB.X = 9234ED4F668E1F471D9D7B9D612B637ECFD73B6F4713079ED1EDA855664E9E4BCD86CFFDBD3A5663C8E60C879988B2E9
3,020,924 UART: [art] PUB.Y = FE0505EA0CFD1933B4B1C6C03059FDBED674CE3BB689D33ACF61B84C785C1A1914E8A4944EFDFCBD06158B0973999CD7
3,027,877 UART: [art] SIG.R = 5F473B0141E5CE328C9DB4CDA45CEF9E7D1D76DF220DDE9B540E28760714D4D56FE3A95F21F8D08206D23EF901F357FA
3,034,643 UART: [art] SIG.S = 25EFED869991D935949FF7909C16F14C5BC5FE1C6E86E0D02CEAD0CD3AA243DA97C1F429643A6D5C48CB4972374A548E
3,058,745 UART: Caliptra RT
3,059,088 UART: [state] CFI Enabled
3,178,476 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,116 UART: [rt]cmd =0x46504c54, len=4
3,210,286 >>> mbox cmd response data (8 bytes)
3,210,287 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,239,858 UART: [rt]cmd =0x46504c67, len=4
3,240,758 >>> mbox cmd response: failed
3,240,926 UART: [rt] FIPS self test
3,241,257 UART: [kat] ++
3,241,409 UART: [kat] sha1
3,245,612 UART: [kat] SHA2-256
3,247,542 UART: [kat] SHA2-384
3,250,115 UART: [kat] SHA2-512-ACC
3,252,010 UART: [kat] ECC-384
3,261,739 UART: [kat] HMAC-384Kdf
3,266,330 UART: [kat] LMS
3,526,090 UART: [kat] --
5,701,179 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,710,511 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,739,665 UART: [rt]cmd =0x46504c67, len=4
5,740,896 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,318 UART:
192,680 UART: Running Caliptra ROM ...
193,791 UART:
193,937 UART: [state] CFI Enabled
263,937 UART: [state] LifecycleState = Unprovisioned
265,880 UART: [state] DebugLocked = No
268,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,967 UART: [kat] SHA2-256
443,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,157 UART: [kat] ++
454,690 UART: [kat] sha1
464,817 UART: [kat] SHA2-256
467,527 UART: [kat] SHA2-384
472,917 UART: [kat] SHA2-512-ACC
475,258 UART: [kat] ECC-384
2,766,524 UART: [kat] HMAC-384Kdf
2,800,468 UART: [kat] LMS
3,990,750 UART: [kat] --
3,995,646 UART: [cold-reset] ++
3,997,044 UART: [fht] Storing FHT @ 0x50003400
4,009,301 UART: [idev] ++
4,009,878 UART: [idev] CDI.KEYID = 6
4,010,772 UART: [idev] SUBJECT.KEYID = 7
4,012,053 UART: [idev] UDS.KEYID = 0
4,013,201 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,033,584 UART: [idev] Erasing UDS.KEYID = 0
7,345,520 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,863 UART: [idev] --
7,372,334 UART: [ldev] ++
7,372,908 UART: [ldev] CDI.KEYID = 6
7,373,846 UART: [ldev] SUBJECT.KEYID = 5
7,375,005 UART: [ldev] AUTHORITY.KEYID = 7
7,376,359 UART: [ldev] FE.KEYID = 1
7,421,230 UART: [ldev] Erasing FE.KEYID = 1
10,752,901 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,441 UART: [ldev] --
13,137,006 UART: [fwproc] Waiting for Commands...
13,138,681 UART: [fwproc] Received command 0x46505652
13,141,090 UART: [rt] FIPS Version
13,142,711 >>> mbox cmd response data (36 bytes)
15,371,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,522,327 UART: [fwproc] Received command 0x46574c44
15,524,594 UART: [fwproc] Received Image of size 118548 bytes
19,633,950 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,710,165 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,783,324 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,111,334 >>> mbox cmd response: success
20,111,687 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,115,707 UART: [afmc] ++
20,116,286 UART: [afmc] CDI.KEYID = 6
20,117,258 UART: [afmc] SUBJECT.KEYID = 7
20,118,977 UART: [afmc] AUTHORITY.KEYID = 5
23,478,438 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,777,982 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,780,248 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
25,794,677 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
25,809,391 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
25,823,854 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
25,845,939 UART: [afmc] --
25,849,971 UART: [cold-reset] --
25,854,591 UART: [state] Locking Datavault
25,859,254 UART: [state] Locking PCR0, PCR1 and PCR31
25,860,958 UART: [state] Locking ICCM
25,863,756 UART: [exit] Launching FMC @ 0x40000130
25,872,105 UART:
25,872,340 UART: Running Caliptra FMC ...
25,873,444 UART:
25,873,617 UART: [state] CFI Enabled
25,938,408 UART: [fht] FMC Alias Private Key: 7
28,299,882 UART: [art] Extend RT PCRs Done
28,301,139 UART: [art] Lock RT PCRs Done
28,302,797 UART: [art] Populate DV Done
28,308,317 UART: [fht] FMC Alias Private Key: 7
28,309,863 UART: [art] Derive CDI
28,310,679 UART: [art] Store in slot 0x4
28,368,891 UART: [art] Derive Key Pair
28,369,925 UART: [art] Store priv key in slot 0x5
31,663,036 UART: [art] Derive Key Pair - Done
31,676,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,963,675 UART: [art] Erasing AUTHORITY.KEYID = 7
33,965,199 UART: [art] PUB.X = BEAE6929EF723C5BC2603B04A8B3168DB259C14735444E8EECAEDC60930B761D31D5F52D5FF5B6DAB53B39A6072F9B01
33,972,460 UART: [art] PUB.Y = E0436F52D5B71EE71B601C53C19EF166887DD4173B5C9F44EF583047F6A5EE4CC66FC67AEBDA58372B2DEE271C0B213B
33,979,694 UART: [art] SIG.R = 6D3A949634EFA2BC53DDAF05D2BCCEA1572126CFCD9EA2F3CCF7714462C68BA1E6A929CD05989FA0D62331E3A3E809B4
33,987,145 UART: [art] SIG.S = 43250FD4A43ED3EF3FCE9BCBA474E6ECA1C0987F1B13727540EE7C82D7C187391418C0E58788B26ED3426BB708EBB18C
35,292,372 UART: Caliptra RT
35,293,096 UART: [state] CFI Enabled
35,469,688 UART: [rt] RT listening for mailbox commands...
35,501,047 UART: [rt]cmd =0x46505652, len=4
35,502,332 UART: [rt] FIPS Version
35,503,505 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
3,805,222 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,860,859 >>> mbox cmd response data (36 bytes)
15,084,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,349,597 >>> mbox cmd response: success
20,350,138 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,039,700 UART:
26,040,116 UART: Running Caliptra FMC ...
26,041,233 UART:
26,041,394 UART: [state] CFI Enabled
26,108,258 UART: [fht] FMC Alias Private Key: 7
28,448,653 UART: [art] Extend RT PCRs Done
28,449,878 UART: [art] Lock RT PCRs Done
28,451,479 UART: [art] Populate DV Done
28,456,526 UART: [fht] FMC Alias Private Key: 7
28,458,234 UART: [art] Derive CDI
28,459,052 UART: [art] Store in slot 0x4
28,517,641 UART: [art] Derive Key Pair
28,518,685 UART: [art] Store priv key in slot 0x5
31,811,628 UART: [art] Derive Key Pair - Done
31,824,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,113,454 UART: [art] Erasing AUTHORITY.KEYID = 7
34,114,967 UART: [art] PUB.X = E7C1ADE9A566F31C1F2DA8B82D1F14EEB44772F9FE5A333884F2DE030D1B3DFC9EB1C58FB24E6D7DFE757C89E9C934F4
34,122,282 UART: [art] PUB.Y = 7E4DE7FC84205833111A1FD4A7105BF1363280F7E235AC85391894A39938312D865389FFE7B6E9F20DFF6EF76D74D5AE
34,129,516 UART: [art] SIG.R = A4864BEEF933860B69860AD5D8619531D328225353BB05480EE5113C24F3A05D7BBD9A4C00B06BCB63B27C33A7AE40B8
34,136,925 UART: [art] SIG.S = B0BF457E1EA18B088024074FB9C7D293E3A82E77EBC9A305E51F035BC2A331E7F65B03A6775A0B08AF3DBB0B639D8029
35,441,790 UART: Caliptra RT
35,442,494 UART: [state] CFI Enabled
35,619,854 UART: [rt] RT listening for mailbox commands...
35,651,240 UART: [rt]cmd =0x46505652, len=4
35,652,489 UART: [rt] FIPS Version
35,653,540 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,492 UART:
192,864 UART: Running Caliptra ROM ...
193,966 UART:
603,710 UART: [state] CFI Enabled
615,952 UART: [state] LifecycleState = Unprovisioned
617,871 UART: [state] DebugLocked = No
619,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,484 UART: [kat] SHA2-256
794,243 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,765 UART: [kat] ++
805,242 UART: [kat] sha1
817,470 UART: [kat] SHA2-256
820,209 UART: [kat] SHA2-384
826,357 UART: [kat] SHA2-512-ACC
828,763 UART: [kat] ECC-384
3,112,113 UART: [kat] HMAC-384Kdf
3,124,056 UART: [kat] LMS
4,314,149 UART: [kat] --
4,316,021 UART: [cold-reset] ++
4,317,337 UART: [fht] Storing FHT @ 0x50003400
4,329,107 UART: [idev] ++
4,329,694 UART: [idev] CDI.KEYID = 6
4,330,610 UART: [idev] SUBJECT.KEYID = 7
4,331,891 UART: [idev] UDS.KEYID = 0
4,333,110 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,349,127 UART: [idev] Erasing UDS.KEYID = 0
7,621,355 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,556 UART: [idev] --
7,648,179 UART: [ldev] ++
7,648,762 UART: [ldev] CDI.KEYID = 6
7,649,654 UART: [ldev] SUBJECT.KEYID = 5
7,650,925 UART: [ldev] AUTHORITY.KEYID = 7
7,652,171 UART: [ldev] FE.KEYID = 1
7,665,015 UART: [ldev] Erasing FE.KEYID = 1
10,949,651 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,006 UART: [ldev] --
13,309,522 UART: [fwproc] Waiting for Commands...
13,311,568 UART: [fwproc] Received command 0x46505652
13,313,979 UART: [rt] FIPS Version
13,315,573 >>> mbox cmd response data (36 bytes)
15,538,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,689,704 UART: [fwproc] Received command 0x46574c44
15,692,040 UART: [fwproc] Received Image of size 118548 bytes
19,793,188 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,865,523 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,938,666 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,267,165 >>> mbox cmd response: success
20,267,535 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,271,993 UART: [afmc] ++
20,272,572 UART: [afmc] CDI.KEYID = 6
20,273,515 UART: [afmc] SUBJECT.KEYID = 7
20,274,791 UART: [afmc] AUTHORITY.KEYID = 5
23,585,285 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,880,395 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,882,659 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
25,897,120 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
25,911,828 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
25,926,269 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
25,948,529 UART: [afmc] --
25,952,261 UART: [cold-reset] --
25,956,777 UART: [state] Locking Datavault
25,963,553 UART: [state] Locking PCR0, PCR1 and PCR31
25,965,304 UART: [state] Locking ICCM
25,968,015 UART: [exit] Launching FMC @ 0x40000130
25,976,434 UART:
25,976,681 UART: Running Caliptra FMC ...
25,977,791 UART:
25,977,956 UART: [state] CFI Enabled
25,986,116 UART: [fht] FMC Alias Private Key: 7
28,326,950 UART: [art] Extend RT PCRs Done
28,328,182 UART: [art] Lock RT PCRs Done
28,329,920 UART: [art] Populate DV Done
28,335,282 UART: [fht] FMC Alias Private Key: 7
28,336,987 UART: [art] Derive CDI
28,337,806 UART: [art] Store in slot 0x4
28,380,315 UART: [art] Derive Key Pair
28,381,364 UART: [art] Store priv key in slot 0x5
31,623,055 UART: [art] Derive Key Pair - Done
31,635,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,916,245 UART: [art] Erasing AUTHORITY.KEYID = 7
33,917,757 UART: [art] PUB.X = AE4B139EC85D0CC5CE79706A698C38DD59E7A85724E70AE50F4CB410358229696AF393EA7EACF2C7899F7B9547C07DD6
33,925,024 UART: [art] PUB.Y = D4DC14181C5E97388C25013BD758AA8AECE22B8A5CDC6B115C388718E5B49DFFF511229572A190A9A4BF1CE160C9B549
33,932,276 UART: [art] SIG.R = 38F7A34DDC0514C2B23BB6ADAA4AEE9D28AD8563EBD87472D83A1B877C9689A75332B8C792C07AFB68434E2DEFEAFA89
33,939,744 UART: [art] SIG.S = 199AF51502A0545E8ADAC0275253FF283E954E9F735C2B99B2EDB3A03CADD9C3555F2EC2B165D981FCF46ABC7FC2AB71
35,244,540 UART: Caliptra RT
35,245,259 UART: [state] CFI Enabled
35,378,479 UART: [rt] RT listening for mailbox commands...
35,409,617 UART: [rt]cmd =0x46505652, len=4
35,410,903 UART: [rt] FIPS Version
35,412,072 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
4,128,488 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,039,769 >>> mbox cmd response data (36 bytes)
15,269,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,536,258 >>> mbox cmd response: success
20,536,846 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,178,115 UART:
26,178,560 UART: Running Caliptra FMC ...
26,179,671 UART:
26,179,843 UART: [state] CFI Enabled
26,187,503 UART: [fht] FMC Alias Private Key: 7
28,527,088 UART: [art] Extend RT PCRs Done
28,528,354 UART: [art] Lock RT PCRs Done
28,529,803 UART: [art] Populate DV Done
28,535,242 UART: [fht] FMC Alias Private Key: 7
28,536,737 UART: [art] Derive CDI
28,537,512 UART: [art] Store in slot 0x4
28,580,190 UART: [art] Derive Key Pair
28,581,264 UART: [art] Store priv key in slot 0x5
31,822,980 UART: [art] Derive Key Pair - Done
31,836,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,116,495 UART: [art] Erasing AUTHORITY.KEYID = 7
34,118,000 UART: [art] PUB.X = C11252C7D54352EAB77EAF46D48FA22920A8A1C5FA8ADC1532EB658334B36DE30274EFC6A1173B3AE28C662C2378DA46
34,125,311 UART: [art] PUB.Y = D105AAEF08D83126DBD491572B48606852867709C791FD64299CA58E155DBF8E80AEA8179CA049C353568B011089D7A9
34,132,528 UART: [art] SIG.R = 957FC90A778FCCA60BF48CC3D65842C1EC8ECC342FA32B80AFC0CABC38E86E90ECFC5F102789B20FDDCC15E95703A005
34,139,923 UART: [art] SIG.S = 8013E39628F56D1BDE156E8ABB61DD2DC50161A946C793127C81A003579BB09B72C486889C20F1B24AD1E5C682630176
35,444,832 UART: Caliptra RT
35,445,552 UART: [state] CFI Enabled
35,578,994 UART: [rt] RT listening for mailbox commands...
35,610,105 UART: [rt]cmd =0x46505652, len=4
35,611,418 UART: [rt] FIPS Version
35,612,796 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,165 UART:
192,546 UART: Running Caliptra ROM ...
193,663 UART:
193,813 UART: [state] CFI Enabled
263,675 UART: [state] LifecycleState = Unprovisioned
265,637 UART: [state] DebugLocked = No
267,027 UART: [state] WD Timer not started. Device not locked for debugging
271,658 UART: [kat] SHA2-256
451,328 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,116 UART: [kat] ++
462,648 UART: [kat] sha1
473,695 UART: [kat] SHA2-256
476,439 UART: [kat] SHA2-384
483,335 UART: [kat] SHA2-512-ACC
485,685 UART: [kat] ECC-384
2,949,014 UART: [kat] HMAC-384Kdf
2,969,333 UART: [kat] LMS
3,445,798 UART: [kat] --
3,450,301 UART: [cold-reset] ++
3,452,135 UART: [fht] FHT @ 0x50003400
3,464,571 UART: [idev] ++
3,465,179 UART: [idev] CDI.KEYID = 6
3,466,122 UART: [idev] SUBJECT.KEYID = 7
3,467,345 UART: [idev] UDS.KEYID = 0
3,468,438 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,499,186 UART: [idev] Erasing UDS.KEYID = 0
5,983,681 UART: [idev] Sha1 KeyId Algorithm
6,006,354 UART: [idev] --
6,010,793 UART: [ldev] ++
6,011,372 UART: [ldev] CDI.KEYID = 6
6,012,259 UART: [ldev] SUBJECT.KEYID = 5
6,013,480 UART: [ldev] AUTHORITY.KEYID = 7
6,014,832 UART: [ldev] FE.KEYID = 1
6,055,664 UART: [ldev] Erasing FE.KEYID = 1
8,559,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,342,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,968 UART: [ldev] --
10,370,888 UART: [fwproc] Wait for Commands...
10,374,128 UART: [fwproc] Recv command 0x46505652
10,376,332 UART: [rt] FIPS Version
10,377,901 >>> mbox cmd response data (36 bytes)
12,602,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,752,598 UART: [fwproc] Recv command 0x46574c44
12,754,666 UART: [fwproc] Recv'd Img size: 118548 bytes
16,239,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,315,863 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,388,843 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,717,659 >>> mbox cmd response: success
16,718,008 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,721,985 UART: [afmc] ++
16,722,618 UART: [afmc] CDI.KEYID = 6
16,723,506 UART: [afmc] SUBJECT.KEYID = 7
16,724,780 UART: [afmc] AUTHORITY.KEYID = 5
19,257,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,981,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,983,920 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,999,772 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,015,821 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,031,380 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,055,275 UART: [afmc] --
21,058,418 UART: [cold-reset] --
21,063,972 UART: [state] Locking Datavault
21,070,078 UART: [state] Locking PCR0, PCR1 and PCR31
21,071,850 UART: [state] Locking ICCM
21,074,229 UART: [exit] Launching FMC @ 0x40000130
21,082,637 UART:
21,082,882 UART: Running Caliptra FMC ...
21,083,991 UART:
21,084,152 UART: [state] CFI Enabled
21,139,512 UART: [fht] FMC Alias Private Key: 7
22,927,281 UART: [art] Extend RT PCRs Done
22,928,510 UART: [art] Lock RT PCRs Done
22,929,871 UART: [art] Populate DV Done
22,935,237 UART: [fht] FMC Alias Private Key: 7
22,936,945 UART: [art] Derive CDI
22,937,767 UART: [art] Store in slot 0x4
22,993,522 UART: [art] Derive Key Pair
22,994,574 UART: [art] Store priv key in slot 0x5
25,456,977 UART: [art] Derive Key Pair - Done
25,469,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,183,651 UART: [art] Erasing AUTHORITY.KEYID = 7
27,185,161 UART: [art] PUB.X = D69EFDEBDAAE7AD024FEC41CFE5B694FF9F659F43AE5C06059526DD2BC9F2E72AB1899E94A7D86398015F5429B41ADC4
27,192,472 UART: [art] PUB.Y = 6E86F457AC02F58B32A07EF71E0B071866CD8257878FA414DCB767772994B6D04E562CFFFFB432397CB58BB0FEF55DD9
27,199,726 UART: [art] SIG.R = 35734DEE999DE198CB50A76320DD1A3EE7FF821275E27F707BA64E6BC37677EBD21FDAD7DEB3254579C4841C31308853
27,207,124 UART: [art] SIG.S = C07CCA0DDCEC515F57339A5E987ECE4481E0A7BA8018B77878529D83F2D15DC3961D6F0A0A4646F717DF616B06F38808
28,186,285 UART: Caliptra RT
28,187,003 UART: [state] CFI Enabled
28,368,488 UART: [rt] RT listening for mailbox commands...
28,399,856 UART: [rt]cmd =0x46505652, len=4
28,401,121 UART: [rt] FIPS Version
28,402,178 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,426 writing to cptra_bootfsm_go
3,458,260 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,262,964 >>> mbox cmd response data (36 bytes)
12,497,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,609,469 >>> mbox cmd response: success
16,609,927 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,890,921 UART:
20,891,308 UART: Running Caliptra FMC ...
20,892,394 UART:
20,892,549 UART: [state] CFI Enabled
20,959,349 UART: [fht] FMC Alias Private Key: 7
22,746,801 UART: [art] Extend RT PCRs Done
22,748,043 UART: [art] Lock RT PCRs Done
22,749,820 UART: [art] Populate DV Done
22,755,361 UART: [fht] FMC Alias Private Key: 7
22,757,023 UART: [art] Derive CDI
22,757,851 UART: [art] Store in slot 0x4
22,813,481 UART: [art] Derive Key Pair
22,814,531 UART: [art] Store priv key in slot 0x5
25,277,028 UART: [art] Derive Key Pair - Done
25,290,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,003,482 UART: [art] Erasing AUTHORITY.KEYID = 7
27,004,998 UART: [art] PUB.X = EF54A696693D436A44B8E8CF04A856C26F771DBF1CE59E924E75056989A94701D7450732A52D70852FF88187C4585732
27,012,211 UART: [art] PUB.Y = 02CE52D7898F1CB5592E370529585B3D5FC77184DA85A5FEE57E7D8C29658CE120001953CB80D9CE835D0F15D8FD661D
27,019,425 UART: [art] SIG.R = 92375B3E6F262F36EB7C22AB04FB3972CC61069FD5B126126E4C3173006EE9A43BAB3330FBE281559EEF73F09F5B5B3D
27,026,824 UART: [art] SIG.S = 169042887E0DDAD9875B683CECCB5F6B5B745FA2B0B12F309600FAC6F5E38706D6E67F13076776136B9B61959104EB44
28,005,919 UART: Caliptra RT
28,006,630 UART: [state] CFI Enabled
28,188,013 UART: [rt] RT listening for mailbox commands...
28,219,487 UART: [rt]cmd =0x46505652, len=4
28,220,953 UART: [rt] FIPS Version
28,221,965 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
192,552 UART:
192,935 UART: Running Caliptra ROM ...
194,118 UART:
603,845 UART: [state] CFI Enabled
618,328 UART: [state] LifecycleState = Unprovisioned
620,257 UART: [state] DebugLocked = No
623,151 UART: [state] WD Timer not started. Device not locked for debugging
626,859 UART: [kat] SHA2-256
806,538 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,316 UART: [kat] ++
817,802 UART: [kat] sha1
829,442 UART: [kat] SHA2-256
832,136 UART: [kat] SHA2-384
836,771 UART: [kat] SHA2-512-ACC
839,115 UART: [kat] ECC-384
3,281,463 UART: [kat] HMAC-384Kdf
3,294,938 UART: [kat] LMS
3,771,442 UART: [kat] --
3,775,727 UART: [cold-reset] ++
3,776,858 UART: [fht] FHT @ 0x50003400
3,788,117 UART: [idev] ++
3,788,698 UART: [idev] CDI.KEYID = 6
3,789,721 UART: [idev] SUBJECT.KEYID = 7
3,790,892 UART: [idev] UDS.KEYID = 0
3,792,014 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,807,319 UART: [idev] Erasing UDS.KEYID = 0
6,264,504 UART: [idev] Sha1 KeyId Algorithm
6,286,821 UART: [idev] --
6,290,817 UART: [ldev] ++
6,291,441 UART: [ldev] CDI.KEYID = 6
6,292,329 UART: [ldev] SUBJECT.KEYID = 5
6,293,543 UART: [ldev] AUTHORITY.KEYID = 7
6,294,833 UART: [ldev] FE.KEYID = 1
6,307,779 UART: [ldev] Erasing FE.KEYID = 1
8,788,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,292 UART: [ldev] --
10,582,035 UART: [fwproc] Wait for Commands...
10,583,680 UART: [fwproc] Recv command 0x46505652
10,585,899 UART: [rt] FIPS Version
10,587,411 >>> mbox cmd response data (36 bytes)
12,818,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,969,684 UART: [fwproc] Recv command 0x46574c44
12,972,030 UART: [fwproc] Recv'd Img size: 118548 bytes
16,457,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,529,450 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,602,475 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,930,072 >>> mbox cmd response: success
16,930,439 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,933,433 UART: [afmc] ++
16,934,011 UART: [afmc] CDI.KEYID = 6
16,935,000 UART: [afmc] SUBJECT.KEYID = 7
16,936,171 UART: [afmc] AUTHORITY.KEYID = 5
19,439,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,158,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,160,738 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
21,176,535 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,192,643 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,208,214 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,232,887 UART: [afmc] --
21,236,449 UART: [cold-reset] --
21,240,584 UART: [state] Locking Datavault
21,244,485 UART: [state] Locking PCR0, PCR1 and PCR31
21,246,187 UART: [state] Locking ICCM
21,247,589 UART: [exit] Launching FMC @ 0x40000130
21,255,995 UART:
21,256,235 UART: Running Caliptra FMC ...
21,257,342 UART:
21,257,510 UART: [state] CFI Enabled
21,265,794 UART: [fht] FMC Alias Private Key: 7
23,032,615 UART: [art] Extend RT PCRs Done
23,033,854 UART: [art] Lock RT PCRs Done
23,035,593 UART: [art] Populate DV Done
23,041,227 UART: [fht] FMC Alias Private Key: 7
23,042,829 UART: [art] Derive CDI
23,043,654 UART: [art] Store in slot 0x4
23,085,933 UART: [art] Derive Key Pair
23,086,978 UART: [art] Store priv key in slot 0x5
25,514,170 UART: [art] Derive Key Pair - Done
25,527,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,233,523 UART: [art] Erasing AUTHORITY.KEYID = 7
27,235,014 UART: [art] PUB.X = 67349C54D2AF3E6514656A1ECA92D6CB57CAF5427D6904395E1B714A968AA80A130CCF684204C4C84BC9502993451DC0
27,242,271 UART: [art] PUB.Y = 750462769A9892478B385EFC922DA169D05D7B43325FE230D07A4F4C0DA7AE7750FEA4309D57B748B0903C0A4FCBB5E0
27,249,525 UART: [art] SIG.R = AF42AF947D3DCEF20E520B63712785028C82CB65E4F55457B357F368AF9E8E618F09CD6E4DD002B292BC32CA3902063C
27,256,932 UART: [art] SIG.S = 9DF08E9DFF93951776CF9A97FB0F04AD706F2707E03CE3BC8B4AEB0C55904B741DF071589CB2EE263FD91B1F6896F2EF
28,236,683 UART: Caliptra RT
28,237,393 UART: [state] CFI Enabled
28,370,080 UART: [rt] RT listening for mailbox commands...
28,401,559 UART: [rt]cmd =0x46505652, len=4
28,402,848 UART: [rt] FIPS Version
28,404,016 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,068 writing to cptra_bootfsm_go
3,779,496 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,479,949 >>> mbox cmd response data (36 bytes)
12,702,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,814,607 >>> mbox cmd response: success
16,815,153 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,068,143 UART:
21,068,538 UART: Running Caliptra FMC ...
21,069,642 UART:
21,069,801 UART: [state] CFI Enabled
21,077,864 UART: [fht] FMC Alias Private Key: 7
22,843,990 UART: [art] Extend RT PCRs Done
22,845,220 UART: [art] Lock RT PCRs Done
22,846,984 UART: [art] Populate DV Done
22,852,235 UART: [fht] FMC Alias Private Key: 7
22,853,724 UART: [art] Derive CDI
22,854,547 UART: [art] Store in slot 0x4
22,897,627 UART: [art] Derive Key Pair
22,898,669 UART: [art] Store priv key in slot 0x5
25,325,383 UART: [art] Derive Key Pair - Done
25,338,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,044,782 UART: [art] Erasing AUTHORITY.KEYID = 7
27,046,292 UART: [art] PUB.X = EA0289FC1C511D66D33128C83A54D859DEBF041C32E1E66F7F2B4E28B7574FEDE0B917C63A3B0E70698C391E6441A194
27,053,547 UART: [art] PUB.Y = BBC3E16EDF96B029ED86E542E59A18AEE6A846203D761D8BAE378042518BF30709E00660C89C8296EBAC28CFB01C7849
27,060,820 UART: [art] SIG.R = E8EC573E0D2FBC974D00229618321BFFFE1B418223578C6E5A524C2C9021BA416AAD4064C83CA1D3E39974C493026159
27,068,224 UART: [art] SIG.S = 35A4910885EF8D4B3C666E9E18DF76FD55719082F08191D7B517B5DB0C89D93508F0366C59F6D776BBD301CD5DCF7A4B
28,047,033 UART: Caliptra RT
28,047,754 UART: [state] CFI Enabled
28,180,944 UART: [rt] RT listening for mailbox commands...
28,212,306 UART: [rt]cmd =0x46505652, len=4
28,213,557 UART: [rt] FIPS Version
28,214,933 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,370 writing to cptra_bootfsm_go
193,507 UART:
193,875 UART: Running Caliptra ROM ...
195,062 UART:
195,230 UART: [state] CFI Enabled
262,113 UART: [state] LifecycleState = Unprovisioned
264,561 UART: [state] DebugLocked = No
266,596 UART: [state] WD Timer not started. Device not locked for debugging
270,595 UART: [kat] SHA2-256
460,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,248 UART: [kat] ++
471,733 UART: [kat] sha1
483,801 UART: [kat] SHA2-256
486,812 UART: [kat] SHA2-384
492,487 UART: [kat] SHA2-512-ACC
495,059 UART: [kat] ECC-384
2,948,114 UART: [kat] HMAC-384Kdf
2,972,073 UART: [kat] LMS
3,503,883 UART: [kat] --
3,509,265 UART: [cold-reset] ++
3,511,213 UART: [fht] FHT @ 0x50003400
3,523,658 UART: [idev] ++
3,524,387 UART: [idev] CDI.KEYID = 6
3,525,280 UART: [idev] SUBJECT.KEYID = 7
3,526,505 UART: [idev] UDS.KEYID = 0
3,527,591 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,544,741 UART: [idev] Erasing UDS.KEYID = 0
6,026,834 UART: [idev] Sha1 KeyId Algorithm
6,049,539 UART: [idev] --
6,055,489 UART: [ldev] ++
6,056,184 UART: [ldev] CDI.KEYID = 6
6,057,070 UART: [ldev] SUBJECT.KEYID = 5
6,058,290 UART: [ldev] AUTHORITY.KEYID = 7
6,059,424 UART: [ldev] FE.KEYID = 1
6,100,591 UART: [ldev] Erasing FE.KEYID = 1
8,609,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,663 UART: [ldev] --
10,412,273 UART: [fwproc] Wait for Commands...
10,414,980 UART: [fwproc] Recv command 0x46505652
10,417,528 UART: [rt] FIPS Version
10,419,258 >>> mbox cmd response data (36 bytes)
12,649,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,798,891 UART: [fwproc] Recv command 0x46574c44
12,800,930 UART: [fwproc] Recv'd Img size: 118548 bytes
16,290,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,371,563 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,495,215 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
17,055,063 >>> mbox cmd response: success
17,055,445 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,059,252 UART: [afmc] ++
17,059,951 UART: [afmc] CDI.KEYID = 6
17,061,199 UART: [afmc] SUBJECT.KEYID = 7
17,062,646 UART: [afmc] AUTHORITY.KEYID = 5
19,607,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,331,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,333,709 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
21,348,807 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,363,943 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,378,836 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,402,569 UART: [afmc] --
21,406,069 UART: [cold-reset] --
21,409,684 UART: [state] Locking Datavault
21,414,726 UART: [state] Locking PCR0, PCR1 and PCR31
21,416,866 UART: [state] Locking ICCM
21,418,292 UART: [exit] Launching FMC @ 0x40000130
21,426,964 UART:
21,427,204 UART: Running Caliptra FMC ...
21,428,309 UART:
21,428,467 UART: [state] CFI Enabled
21,487,454 UART: [fht] FMC Alias Private Key: 7
23,253,941 UART: [art] Extend RT PCRs Done
23,255,215 UART: [art] Lock RT PCRs Done
23,256,712 UART: [art] Populate DV Done
23,262,030 UART: [fht] FMC Alias Private Key: 7
23,263,741 UART: [art] Derive CDI
23,264,504 UART: [art] Store in slot 0x4
23,319,882 UART: [art] Derive Key Pair
23,320,929 UART: [art] Store priv key in slot 0x5
25,783,522 UART: [art] Derive Key Pair - Done
25,796,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,509,107 UART: [art] Erasing AUTHORITY.KEYID = 7
27,510,642 UART: [art] PUB.X = EC1EC60CB191ED6D7DBE573205FEAD79E66921D1AC76DCD254E6CAFBB7F939BF204D78127326B8418F143B57AD89C6ED
27,517,875 UART: [art] PUB.Y = B79749245F80F37FED99CAAC37B1A2450ACCDD54FDCF7BA0E9D5ABE4B9DB6FEC760BCF3D2BB7980F19BE04175566F33A
27,525,174 UART: [art] SIG.R = F9CF590F95A455CF6A45F6F0527C7C8F75BD8D0F0ED87092295071F75E43C7968906D68EA83414E5C128B5804E3D5DF0
27,532,583 UART: [art] SIG.S = E9459788CA5C6B8B2F4D3A2B219F3BD1FB909DFC2D21B77DF8CBAB92B2FFDB9FE619E60158DB07CC0D9DDB86C751FAEA
28,511,746 UART: Caliptra RT
28,512,464 UART: [state] CFI Enabled
28,693,372 UART: [rt] RT listening for mailbox commands...
28,724,723 UART: [rt]cmd =0x46505652, len=4
28,726,011 UART: [rt] FIPS Version
28,727,030 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,437,462 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,240,316 >>> mbox cmd response data (36 bytes)
12,479,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,212,391 >>> mbox cmd response: success
17,212,875 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,498,930 UART:
21,499,328 UART: Running Caliptra FMC ...
21,500,477 UART:
21,500,646 UART: [state] CFI Enabled
21,564,831 UART: [fht] FMC Alias Private Key: 7
23,330,488 UART: [art] Extend RT PCRs Done
23,331,715 UART: [art] Lock RT PCRs Done
23,333,340 UART: [art] Populate DV Done
23,338,481 UART: [fht] FMC Alias Private Key: 7
23,340,081 UART: [art] Derive CDI
23,340,905 UART: [art] Store in slot 0x4
23,397,441 UART: [art] Derive Key Pair
23,398,501 UART: [art] Store priv key in slot 0x5
25,861,314 UART: [art] Derive Key Pair - Done
25,874,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,587,069 UART: [art] Erasing AUTHORITY.KEYID = 7
27,588,581 UART: [art] PUB.X = 535A48AC950E5154510D4125054E9765B10A2A888F3BE1C5DE6D51F87124A27EF58F5B36B66E740A55C7E92EEAF827B3
27,595,791 UART: [art] PUB.Y = 3DD54D3B1F1E280BB5D343B5F14190FAAA80289838B0B81A44F63E02438DE7B75F638A736DCBE3538A8C9B56DDC714E6
27,603,069 UART: [art] SIG.R = CD5557ECD49CECAA22AE5FA59A993925FCB81A2EAE7F7BDC29DC2087BDA31677E802F75A7614A61A0E0EB3593CD6B50B
27,610,480 UART: [art] SIG.S = 05D3360D415C08B874684084BC1C54DE2DC301B3B30530919559884DDF6407C1705427841418F07CB07E402EB092E365
28,589,250 UART: Caliptra RT
28,589,968 UART: [state] CFI Enabled
28,771,105 UART: [rt] RT listening for mailbox commands...
28,802,355 UART: [rt]cmd =0x46505652, len=4
28,803,634 UART: [rt] FIPS Version
28,804,909 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,533 UART:
192,902 UART: Running Caliptra ROM ...
193,986 UART:
603,808 UART: [state] CFI Enabled
614,973 UART: [state] LifecycleState = Unprovisioned
617,362 UART: [state] DebugLocked = No
619,390 UART: [state] WD Timer not started. Device not locked for debugging
624,403 UART: [kat] SHA2-256
814,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,060 UART: [kat] ++
825,603 UART: [kat] sha1
836,702 UART: [kat] SHA2-256
839,713 UART: [kat] SHA2-384
845,426 UART: [kat] SHA2-512-ACC
847,991 UART: [kat] ECC-384
3,290,097 UART: [kat] HMAC-384Kdf
3,304,061 UART: [kat] LMS
3,835,910 UART: [kat] --
3,840,692 UART: [cold-reset] ++
3,842,852 UART: [fht] FHT @ 0x50003400
3,854,801 UART: [idev] ++
3,855,512 UART: [idev] CDI.KEYID = 6
3,856,431 UART: [idev] SUBJECT.KEYID = 7
3,857,654 UART: [idev] UDS.KEYID = 0
3,858,748 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,874,126 UART: [idev] Erasing UDS.KEYID = 0
6,333,555 UART: [idev] Sha1 KeyId Algorithm
6,355,500 UART: [idev] --
6,359,828 UART: [ldev] ++
6,360,517 UART: [ldev] CDI.KEYID = 6
6,361,434 UART: [ldev] SUBJECT.KEYID = 5
6,362,596 UART: [ldev] AUTHORITY.KEYID = 7
6,363,829 UART: [ldev] FE.KEYID = 1
6,373,831 UART: [ldev] Erasing FE.KEYID = 1
8,851,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,090 UART: [ldev] --
10,645,766 UART: [fwproc] Wait for Commands...
10,648,230 UART: [fwproc] Recv command 0x46505652
10,650,783 UART: [rt] FIPS Version
10,652,517 >>> mbox cmd response data (36 bytes)
12,880,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,031,094 UART: [fwproc] Recv command 0x46574c44
13,033,124 UART: [fwproc] Recv'd Img size: 118548 bytes
16,534,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,616,413 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,740,031 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
17,300,131 >>> mbox cmd response: success
17,300,507 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,305,067 UART: [afmc] ++
17,305,765 UART: [afmc] CDI.KEYID = 6
17,307,016 UART: [afmc] SUBJECT.KEYID = 7
17,308,465 UART: [afmc] AUTHORITY.KEYID = 5
19,807,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,528,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,530,865 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
21,545,938 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,561,098 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,575,983 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,599,867 UART: [afmc] --
21,602,658 UART: [cold-reset] --
21,608,736 UART: [state] Locking Datavault
21,614,098 UART: [state] Locking PCR0, PCR1 and PCR31
21,616,251 UART: [state] Locking ICCM
21,617,705 UART: [exit] Launching FMC @ 0x40000130
21,626,381 UART:
21,626,618 UART: Running Caliptra FMC ...
21,627,718 UART:
21,627,880 UART: [state] CFI Enabled
21,635,604 UART: [fht] FMC Alias Private Key: 7
23,401,907 UART: [art] Extend RT PCRs Done
23,403,132 UART: [art] Lock RT PCRs Done
23,404,530 UART: [art] Populate DV Done
23,409,998 UART: [fht] FMC Alias Private Key: 7
23,411,647 UART: [art] Derive CDI
23,412,461 UART: [art] Store in slot 0x4
23,454,840 UART: [art] Derive Key Pair
23,455,882 UART: [art] Store priv key in slot 0x5
25,882,706 UART: [art] Derive Key Pair - Done
25,895,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,601,701 UART: [art] Erasing AUTHORITY.KEYID = 7
27,603,216 UART: [art] PUB.X = 4DB8C446E109B5C4D523270FF68568706F54FB11E2938FF295BF33C76A2A9BDC8E85506D9B5844E718B788809FB614C0
27,610,435 UART: [art] PUB.Y = 016A5BF82E659B7D9FC4EFC190B7A2CAEBA36029F06EDB9A67A54C841AF4E91954BE619C587162A3C6934E9BE500DD7C
27,617,726 UART: [art] SIG.R = B9E72FFE4B22F5A2D7BF89DB38DF863259F2600440AB9864A65D63D3E26E37CCE4856FCB4C1E878EF6608017968B4881
27,625,114 UART: [art] SIG.S = D1E5A1D10FF731DEACE36BA2D0826937F63C5903C175838BF08C770CE6715AD94D81948C41C57FFF113ECFE9DDDC9A57
28,604,085 UART: Caliptra RT
28,604,805 UART: [state] CFI Enabled
28,737,489 UART: [rt] RT listening for mailbox commands...
28,768,641 UART: [rt]cmd =0x46505652, len=4
28,769,897 UART: [rt] FIPS Version
28,771,118 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,752,372 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,453,959 >>> mbox cmd response data (36 bytes)
12,685,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,404,524 >>> mbox cmd response: success
17,405,219 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,656,116 UART:
21,656,545 UART: Running Caliptra FMC ...
21,657,671 UART:
21,657,836 UART: [state] CFI Enabled
21,665,576 UART: [fht] FMC Alias Private Key: 7
23,431,323 UART: [art] Extend RT PCRs Done
23,432,559 UART: [art] Lock RT PCRs Done
23,434,352 UART: [art] Populate DV Done
23,439,883 UART: [fht] FMC Alias Private Key: 7
23,441,537 UART: [art] Derive CDI
23,442,360 UART: [art] Store in slot 0x4
23,484,926 UART: [art] Derive Key Pair
23,485,932 UART: [art] Store priv key in slot 0x5
25,912,116 UART: [art] Derive Key Pair - Done
25,925,235 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,631,450 UART: [art] Erasing AUTHORITY.KEYID = 7
27,632,971 UART: [art] PUB.X = D56961785F6D13711638183443CBC762F45D0B774A0E8164D894228B139BE45D21F922B8D70D69F964B3E3CC48345D69
27,640,228 UART: [art] PUB.Y = 0385E045F1E88C25AABAF0A41FA16E4472573625CE8B722BBF2AAB9D5193CC413117DEE53A9588E7468BA7AE14737DBC
27,647,446 UART: [art] SIG.R = AFB0C2EA026B2873909105281F590345EA6A80DAA4A666E7CF2895482086F732D28EBAAD30B3155753019CE76F7C41E4
27,654,843 UART: [art] SIG.S = CB93D14F8FF28A1FBC46C157B2B76E5C2D8AC19055F060FF221C20DFCEBF29A91E5D985EDCF9092F21BC0B53DE41FC5E
28,634,430 UART: Caliptra RT
28,635,127 UART: [state] CFI Enabled
28,767,954 UART: [rt] RT listening for mailbox commands...
28,799,668 UART: [rt]cmd =0x46505652, len=4
28,800,950 UART: [rt] FIPS Version
28,802,279 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,598 UART: [state] LifecycleState = Unprovisioned
86,253 UART: [state] DebugLocked = No
86,927 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,617 UART: [kat] SHA2-256
882,548 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,663 UART: [kat] ++
886,815 UART: [kat] sha1
890,979 UART: [kat] SHA2-256
892,917 UART: [kat] SHA2-384
895,590 UART: [kat] SHA2-512-ACC
897,491 UART: [kat] ECC-384
903,274 UART: [kat] HMAC-384Kdf
907,726 UART: [kat] LMS
1,475,922 UART: [kat] --
1,476,699 UART: [cold-reset] ++
1,477,167 UART: [fht] Storing FHT @ 0x50003400
1,479,934 UART: [idev] ++
1,480,102 UART: [idev] CDI.KEYID = 6
1,480,462 UART: [idev] SUBJECT.KEYID = 7
1,480,886 UART: [idev] UDS.KEYID = 0
1,481,231 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,998 UART: [idev] Erasing UDS.KEYID = 0
1,505,694 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,222 UART: [idev] --
1,515,253 UART: [ldev] ++
1,515,421 UART: [ldev] CDI.KEYID = 6
1,515,784 UART: [ldev] SUBJECT.KEYID = 5
1,516,210 UART: [ldev] AUTHORITY.KEYID = 7
1,516,673 UART: [ldev] FE.KEYID = 1
1,521,669 UART: [ldev] Erasing FE.KEYID = 1
1,547,194 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,092 UART: [ldev] --
1,586,385 UART: [fwproc] Waiting for Commands...
1,587,252 UART: [fwproc] Received command 0x46505652
1,588,134 UART: [rt] FIPS Version
1,588,687 >>> mbox cmd response data (36 bytes)
1,588,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,588,938 UART: [fwproc] Received command 0x46574c44
1,589,729 UART: [fwproc] Received Image of size 118548 bytes
2,933,267 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,929 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,147 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,584 >>> mbox cmd response: success
3,132,584 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,133,748 UART: [afmc] ++
3,133,916 UART: [afmc] CDI.KEYID = 6
3,134,278 UART: [afmc] SUBJECT.KEYID = 7
3,134,703 UART: [afmc] AUTHORITY.KEYID = 5
3,170,476 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,090 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,870 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,579 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,462 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,145 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,851 UART: [afmc] --
3,213,799 UART: [cold-reset] --
3,214,459 UART: [state] Locking Datavault
3,215,774 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,378 UART: [state] Locking ICCM
3,217,010 UART: [exit] Launching FMC @ 0x40000130
3,222,340 UART:
3,222,356 UART: Running Caliptra FMC ...
3,222,764 UART:
3,222,818 UART: [state] CFI Enabled
3,233,512 UART: [fht] FMC Alias Private Key: 7
3,352,768 UART: [art] Extend RT PCRs Done
3,353,196 UART: [art] Lock RT PCRs Done
3,354,736 UART: [art] Populate DV Done
3,363,155 UART: [fht] FMC Alias Private Key: 7
3,364,239 UART: [art] Derive CDI
3,364,519 UART: [art] Store in slot 0x4
3,450,405 UART: [art] Derive Key Pair
3,450,765 UART: [art] Store priv key in slot 0x5
3,464,082 UART: [art] Derive Key Pair - Done
3,478,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,843 UART: [art] PUB.X = A161BF335AD8A5FA95998573DEEFE0B2A4CA2F3E52B7011FB926B847EB57F84611C18CC97C80E6A99066E3E9D3B52E2C
3,501,624 UART: [art] PUB.Y = 26FD231B7677C3B5B593D839B795BF90CCCB7EA8F10779A02D566E13A6CCF7A7ECD782286D894F91CF50FDBB101DFD20
3,508,587 UART: [art] SIG.R = D582B60A9D343D793AB0AEDEF8821370C4387FEBE18DBCFA938A4AFDE2A8E9064A286584C0C36017C4996282053E8402
3,515,351 UART: [art] SIG.S = CAB2BC104AB4786029C4EB1A8AAE048DE9255B14AA98E828647C1231EC6F88CE324B03687CA3453EB56535A96964D796
3,539,427 UART: Caliptra RT
3,539,678 UART: [state] CFI Enabled
3,659,211 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,047 UART: [rt]cmd =0x46505652, len=4
3,690,707 UART: [rt] FIPS Version
3,691,844 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,249 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,440,884 >>> mbox cmd response data (36 bytes)
1,440,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,865 >>> mbox cmd response: success
2,981,865 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,043,124 UART:
3,043,140 UART: Running Caliptra FMC ...
3,043,548 UART:
3,043,602 UART: [state] CFI Enabled
3,054,044 UART: [fht] FMC Alias Private Key: 7
3,173,922 UART: [art] Extend RT PCRs Done
3,174,350 UART: [art] Lock RT PCRs Done
3,176,138 UART: [art] Populate DV Done
3,184,715 UART: [fht] FMC Alias Private Key: 7
3,185,755 UART: [art] Derive CDI
3,186,035 UART: [art] Store in slot 0x4
3,271,399 UART: [art] Derive Key Pair
3,271,759 UART: [art] Store priv key in slot 0x5
3,285,280 UART: [art] Derive Key Pair - Done
3,299,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,500 UART: [art] PUB.X = 1D25B835D14C523500A7006D9430F5C12298DA3F9044D10C561C50C6F91B41BB3646649787DD1D9441A23A3DBBCC1039
3,322,219 UART: [art] PUB.Y = 4DCEC8457A2451E5D8754C79F34788706956BC1F33F3EDE3289E3CDD5E8E432B08569A40CEE60492C9E547CAF152D5FB
3,329,171 UART: [art] SIG.R = 3D6A5B40D9B6FECFFD4DABB38A329135EE3618FE44B9C7A50AD5F2EF4DFD27BA07EDEDF6183876627C55F4FFE37D6D8A
3,335,965 UART: [art] SIG.S = 549BAA945B2CD04F72DA0DF27A5897FB6B3860AFBAD862ED032A732A33207AF02C369E969003B952B8DAF483E738AF4B
3,359,928 UART: Caliptra RT
3,360,179 UART: [state] CFI Enabled
3,480,902 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,370 UART: [rt]cmd =0x46505652, len=4
3,512,030 UART: [rt] FIPS Version
3,513,069 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,352 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,848 UART: [kat] SHA2-256
881,779 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,894 UART: [kat] ++
886,046 UART: [kat] sha1
890,440 UART: [kat] SHA2-256
892,378 UART: [kat] SHA2-384
895,185 UART: [kat] SHA2-512-ACC
897,086 UART: [kat] ECC-384
902,405 UART: [kat] HMAC-384Kdf
907,027 UART: [kat] LMS
1,475,223 UART: [kat] --
1,475,952 UART: [cold-reset] ++
1,476,516 UART: [fht] Storing FHT @ 0x50003400
1,479,355 UART: [idev] ++
1,479,523 UART: [idev] CDI.KEYID = 6
1,479,883 UART: [idev] SUBJECT.KEYID = 7
1,480,307 UART: [idev] UDS.KEYID = 0
1,480,652 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,923 UART: [idev] Erasing UDS.KEYID = 0
1,505,725 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,503 UART: [idev] --
1,515,484 UART: [ldev] ++
1,515,652 UART: [ldev] CDI.KEYID = 6
1,516,015 UART: [ldev] SUBJECT.KEYID = 5
1,516,441 UART: [ldev] AUTHORITY.KEYID = 7
1,516,904 UART: [ldev] FE.KEYID = 1
1,522,118 UART: [ldev] Erasing FE.KEYID = 1
1,547,057 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,385 UART: [ldev] --
1,586,750 UART: [fwproc] Waiting for Commands...
1,587,411 UART: [fwproc] Received command 0x46505652
1,588,293 UART: [rt] FIPS Version
1,588,846 >>> mbox cmd response data (36 bytes)
1,588,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,589,043 UART: [fwproc] Received command 0x46574c44
1,589,834 UART: [fwproc] Received Image of size 118548 bytes
2,935,079 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,963,321 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,994,539 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,134,936 >>> mbox cmd response: success
3,134,936 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,136,168 UART: [afmc] ++
3,136,336 UART: [afmc] CDI.KEYID = 6
3,136,698 UART: [afmc] SUBJECT.KEYID = 7
3,137,123 UART: [afmc] AUTHORITY.KEYID = 5
3,172,514 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,188,696 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,189,476 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,195,185 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,201,068 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,206,751 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,214,593 UART: [afmc] --
3,215,517 UART: [cold-reset] --
3,216,519 UART: [state] Locking Datavault
3,217,868 UART: [state] Locking PCR0, PCR1 and PCR31
3,218,472 UART: [state] Locking ICCM
3,219,080 UART: [exit] Launching FMC @ 0x40000130
3,224,410 UART:
3,224,426 UART: Running Caliptra FMC ...
3,224,834 UART:
3,224,977 UART: [state] CFI Enabled
3,235,615 UART: [fht] FMC Alias Private Key: 7
3,354,301 UART: [art] Extend RT PCRs Done
3,354,729 UART: [art] Lock RT PCRs Done
3,356,333 UART: [art] Populate DV Done
3,364,622 UART: [fht] FMC Alias Private Key: 7
3,365,672 UART: [art] Derive CDI
3,365,952 UART: [art] Store in slot 0x4
3,451,936 UART: [art] Derive Key Pair
3,452,296 UART: [art] Store priv key in slot 0x5
3,465,583 UART: [art] Derive Key Pair - Done
3,480,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,495,792 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,557 UART: [art] PUB.X = 2996A5525ADCB3494E4C20FD8E8D8218D3134A69E3C389D5141C19ED479A76BFEB525A01A2B6D8BA1B4F85191F718488
3,503,328 UART: [art] PUB.Y = D1C9822C507CCFAC0B3E555DEAA36CB950596876500557A5CA6797FF670774C4FC8525D6C85135B228196325FB4F21BA
3,510,271 UART: [art] SIG.R = 572B8BEDB03F8A51500205F4E0276CC9CC045FC01804EC015AAF6D759BBA3EA66B8DEF0C19B2277BF396C399C21EC661
3,517,037 UART: [art] SIG.S = AA562640D0F1D4D39CA2714F989D44D2F87207184DAA2F48FC98490EC305BBAC34E0F783E86EBFD34F723FF18173231D
3,540,392 UART: Caliptra RT
3,540,735 UART: [state] CFI Enabled
3,661,487 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,692,015 UART: [rt]cmd =0x46505652, len=4
3,692,675 UART: [rt] FIPS Version
3,693,738 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,350 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,913 >>> mbox cmd response data (36 bytes)
1,442,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,660 >>> mbox cmd response: success
2,982,660 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,044,719 UART:
3,044,735 UART: Running Caliptra FMC ...
3,045,143 UART:
3,045,286 UART: [state] CFI Enabled
3,055,638 UART: [fht] FMC Alias Private Key: 7
3,173,802 UART: [art] Extend RT PCRs Done
3,174,230 UART: [art] Lock RT PCRs Done
3,175,960 UART: [art] Populate DV Done
3,184,099 UART: [fht] FMC Alias Private Key: 7
3,185,219 UART: [art] Derive CDI
3,185,499 UART: [art] Store in slot 0x4
3,271,371 UART: [art] Derive Key Pair
3,271,731 UART: [art] Store priv key in slot 0x5
3,284,984 UART: [art] Derive Key Pair - Done
3,299,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,732 UART: [art] PUB.X = A56B597ADE84EA5515ADA11DE41CA84B7D00122CBED2E1035D3AFB1F1947807FD7683E26F09DBF57B7A97C21BCF15FC4
3,322,497 UART: [art] PUB.Y = EBFA4CFADA963C7C256CB5D9AEA6BCC696F6F425F0328EEF3B762475CAAEE173B9212916A1B96E8135EABF08F8B99D06
3,329,465 UART: [art] SIG.R = 6E04C7959051DE788FDAF213703D152E47146E170A6B0258507D8D506E65BA386631CCE0708C38014EAD7402A4749A46
3,336,212 UART: [art] SIG.S = 7E459132D600CEEF093027151ECB6E28FDA850EFE0A6EC9F8AA1A340C49B53FC9BB9C549F26AC81B67FAB22B890AA39F
3,360,066 UART: Caliptra RT
3,360,409 UART: [state] CFI Enabled
3,480,230 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,696 UART: [rt]cmd =0x46505652, len=4
3,511,356 UART: [rt] FIPS Version
3,512,375 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,430 UART: [kat] ++
895,582 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,787 UART: [kat] SHA2-512-ACC
906,688 UART: [kat] ECC-384
916,215 UART: [kat] HMAC-384Kdf
920,663 UART: [kat] LMS
1,168,975 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,528 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,174,686 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,521 UART: [idev] Erasing UDS.KEYID = 0
1,200,115 UART: [idev] Sha1 KeyId Algorithm
1,209,171 UART: [idev] --
1,210,052 UART: [ldev] ++
1,210,220 UART: [ldev] CDI.KEYID = 6
1,210,584 UART: [ldev] SUBJECT.KEYID = 5
1,211,011 UART: [ldev] AUTHORITY.KEYID = 7
1,211,474 UART: [ldev] FE.KEYID = 1
1,216,398 UART: [ldev] Erasing FE.KEYID = 1
1,242,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,440 UART: [ldev] --
1,281,799 UART: [fwproc] Wait for Commands...
1,282,492 UART: [fwproc] Recv command 0x46505652
1,283,316 UART: [rt] FIPS Version
1,283,876 >>> mbox cmd response data (36 bytes)
1,283,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,118 UART: [fwproc] Recv command 0x46574c44
1,284,851 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,667 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,842 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,141 >>> mbox cmd response: success
2,828,141 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,829,349 UART: [afmc] ++
2,829,517 UART: [afmc] CDI.KEYID = 6
2,829,880 UART: [afmc] SUBJECT.KEYID = 7
2,830,306 UART: [afmc] AUTHORITY.KEYID = 5
2,865,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,247 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,957 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,838 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,539 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,180 UART: [afmc] --
2,909,139 UART: [cold-reset] --
2,910,071 UART: [state] Locking Datavault
2,911,370 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,974 UART: [state] Locking ICCM
2,912,506 UART: [exit] Launching FMC @ 0x40000130
2,917,836 UART:
2,917,852 UART: Running Caliptra FMC ...
2,918,260 UART:
2,918,314 UART: [state] CFI Enabled
2,928,864 UART: [fht] FMC Alias Private Key: 7
3,047,148 UART: [art] Extend RT PCRs Done
3,047,576 UART: [art] Lock RT PCRs Done
3,049,384 UART: [art] Populate DV Done
3,057,723 UART: [fht] FMC Alias Private Key: 7
3,058,891 UART: [art] Derive CDI
3,059,171 UART: [art] Store in slot 0x4
3,144,784 UART: [art] Derive Key Pair
3,145,144 UART: [art] Store priv key in slot 0x5
3,158,718 UART: [art] Derive Key Pair - Done
3,173,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,566 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,331 UART: [art] PUB.X = 22A921FC264557E8879785FDA842E50F6F20D968099F8344EC0BDF8D8D85416ACE7566F4BEF56BCCF2550C753382AC27
3,197,093 UART: [art] PUB.Y = 20DBE1CA87B097119798C46702D86BFE2FEDF2697DBE2603868CEC9B49F22568A754708A147285A79EF667C2E2BE8CE4
3,204,043 UART: [art] SIG.R = 53F046F492A53707350754CF8F75E69B26344B2BCA2A54DA91DBFD9890B45572358FCFDAAA461AAF5F26CB2CECF9F80B
3,210,820 UART: [art] SIG.S = 51764C11A02003AEA5D04EF51AB9152AE21C555C59D9268A9B9BADA2377E374A4D74B7E511344E8BBA0E0F7C1804B235
3,234,668 UART: Caliptra RT
3,234,919 UART: [state] CFI Enabled
3,354,715 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,465 UART: [rt]cmd =0x46505652, len=4
3,386,125 UART: [rt] FIPS Version
3,387,310 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,208 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,887 >>> mbox cmd response data (36 bytes)
1,139,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,982 >>> mbox cmd response: success
2,679,982 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,873 UART:
2,741,889 UART: Running Caliptra FMC ...
2,742,297 UART:
2,742,351 UART: [state] CFI Enabled
2,752,881 UART: [fht] FMC Alias Private Key: 7
2,872,205 UART: [art] Extend RT PCRs Done
2,872,633 UART: [art] Lock RT PCRs Done
2,873,877 UART: [art] Populate DV Done
2,881,962 UART: [fht] FMC Alias Private Key: 7
2,883,094 UART: [art] Derive CDI
2,883,374 UART: [art] Store in slot 0x4
2,969,423 UART: [art] Derive Key Pair
2,969,783 UART: [art] Store priv key in slot 0x5
2,983,079 UART: [art] Derive Key Pair - Done
2,997,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,606 UART: [art] PUB.X = 30B4B33C43F0D249194E4A55CAFE9F2B8089527C97FB708F07CFA7044E9EFC3D337371131FE8D87F0EB55B37D2CD2268
3,020,375 UART: [art] PUB.Y = B8AE4C63C236B1F934D5D9F18C73F50FE08798EE8468581C06616916B04839F1707EA72D02C93E2DF36F3B46BDC513D5
3,027,318 UART: [art] SIG.R = 9582874F23CB841B098CBEB22F5058623E03E0A8957C7180362EED2DB69329F5CF84B19CD8A2508EC49A4AEE64DE2687
3,034,086 UART: [art] SIG.S = 8B82318986DDC910B32C88D31715021D18C19F5831A8116CF4F56A65FB51AD04522CD1181D4CD7BCA6E5CE27FF09AAC2
3,057,889 UART: Caliptra RT
3,058,140 UART: [state] CFI Enabled
3,177,566 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,908 UART: [rt]cmd =0x46505652, len=4
3,208,568 UART: [rt] FIPS Version
3,209,723 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,887 UART: [state] LifecycleState = Unprovisioned
85,542 UART: [state] DebugLocked = No
86,076 UART: [state] WD Timer not started. Device not locked for debugging
87,325 UART: [kat] SHA2-256
890,875 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,979 UART: [kat] ++
895,131 UART: [kat] sha1
899,229 UART: [kat] SHA2-256
901,169 UART: [kat] SHA2-384
903,910 UART: [kat] SHA2-512-ACC
905,811 UART: [kat] ECC-384
915,728 UART: [kat] HMAC-384Kdf
920,612 UART: [kat] LMS
1,168,924 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,174,213 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,492 UART: [idev] Erasing UDS.KEYID = 0
1,199,002 UART: [idev] Sha1 KeyId Algorithm
1,207,664 UART: [idev] --
1,208,759 UART: [ldev] ++
1,208,927 UART: [ldev] CDI.KEYID = 6
1,209,291 UART: [ldev] SUBJECT.KEYID = 5
1,209,718 UART: [ldev] AUTHORITY.KEYID = 7
1,210,181 UART: [ldev] FE.KEYID = 1
1,215,085 UART: [ldev] Erasing FE.KEYID = 1
1,241,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,405 UART: [ldev] --
1,280,850 UART: [fwproc] Wait for Commands...
1,281,537 UART: [fwproc] Recv command 0x46505652
1,282,361 UART: [rt] FIPS Version
1,282,921 >>> mbox cmd response data (36 bytes)
1,282,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,283,181 UART: [fwproc] Recv command 0x46574c44
1,283,914 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,010 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,185 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,428 >>> mbox cmd response: success
2,827,428 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,828,564 UART: [afmc] ++
2,828,732 UART: [afmc] CDI.KEYID = 6
2,829,095 UART: [afmc] SUBJECT.KEYID = 7
2,829,521 UART: [afmc] AUTHORITY.KEYID = 5
2,865,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,264 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,974 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,855 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,556 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,203 UART: [afmc] --
2,908,032 UART: [cold-reset] --
2,908,914 UART: [state] Locking Datavault
2,910,275 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,879 UART: [state] Locking ICCM
2,911,393 UART: [exit] Launching FMC @ 0x40000130
2,916,723 UART:
2,916,739 UART: Running Caliptra FMC ...
2,917,147 UART:
2,917,290 UART: [state] CFI Enabled
2,927,832 UART: [fht] FMC Alias Private Key: 7
3,046,944 UART: [art] Extend RT PCRs Done
3,047,372 UART: [art] Lock RT PCRs Done
3,048,784 UART: [art] Populate DV Done
3,057,141 UART: [fht] FMC Alias Private Key: 7
3,058,101 UART: [art] Derive CDI
3,058,381 UART: [art] Store in slot 0x4
3,144,204 UART: [art] Derive Key Pair
3,144,564 UART: [art] Store priv key in slot 0x5
3,158,318 UART: [art] Derive Key Pair - Done
3,173,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,447 UART: [art] PUB.X = 848A740ECDCA83A2E56487FF41931845CCFA8FF4799CAA5BE533EFDAB523A127114D6EE32A858B2D156B8F51A36BE2ED
3,196,232 UART: [art] PUB.Y = F3E71FE6E3C12C870DBF53D0E717F30EAF832B02D485CA7F49894C2992A61D6F5BB1F41F3444C94FBBC31EF8FE732769
3,203,187 UART: [art] SIG.R = 8E39F6E0D97F1510BF2F44D17FA9A55E815C757254840647058AAF1D46845D49048D2F959EACEC45BB99790A37D6A0E9
3,209,947 UART: [art] SIG.S = 27061A19F9AF6FA9E402BF6FDE7136512832821EC09E3B62B3EA0B938EC8C4DDBC6ED6C2AE9A5C4E41BF938A10C6AC42
3,233,668 UART: Caliptra RT
3,234,011 UART: [state] CFI Enabled
3,354,352 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,026 UART: [rt]cmd =0x46505652, len=4
3,385,686 UART: [rt] FIPS Version
3,386,687 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,279 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,558 >>> mbox cmd response data (36 bytes)
1,140,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,643 >>> mbox cmd response: success
2,679,643 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,706 UART:
2,741,722 UART: Running Caliptra FMC ...
2,742,130 UART:
2,742,273 UART: [state] CFI Enabled
2,752,863 UART: [fht] FMC Alias Private Key: 7
2,872,445 UART: [art] Extend RT PCRs Done
2,872,873 UART: [art] Lock RT PCRs Done
2,874,517 UART: [art] Populate DV Done
2,882,934 UART: [fht] FMC Alias Private Key: 7
2,884,094 UART: [art] Derive CDI
2,884,374 UART: [art] Store in slot 0x4
2,970,179 UART: [art] Derive Key Pair
2,970,539 UART: [art] Store priv key in slot 0x5
2,984,491 UART: [art] Derive Key Pair - Done
2,998,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,137 UART: [art] PUB.X = B6A41670525FDAF816518FABA491AAFB4C70A4A4B33EF732B637F92F820FA801F75689D1BFC6EF10BDAAA88DEF480C7C
3,021,920 UART: [art] PUB.Y = BCB89659A53AA5A9BA42969A59DD6A30A31B1412889C66FFDD0F2E9DF835A15EF38AC3D750BD3A53A925EF3176B5B503
3,028,878 UART: [art] SIG.R = 0FF33D398AD86F4067383A76B8D7D6604D206EE9643ED48920C5D0036B9DC9246B1784203DFFC7D0F0BB95DEF507B6F1
3,035,645 UART: [art] SIG.S = 678D56EB9BF4AE672E0123551C462F020FFE0B88350DD2B59617DBB2A43084FA89DC0EE9F2CD360F78B19EED7751A605
3,059,539 UART: Caliptra RT
3,059,882 UART: [state] CFI Enabled
3,179,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,624 UART: [rt]cmd =0x46505652, len=4
3,210,284 UART: [rt] FIPS Version
3,211,313 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,171 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
893,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,307 UART: [kat] ++
897,459 UART: [kat] sha1
901,643 UART: [kat] SHA2-256
903,583 UART: [kat] SHA2-384
906,256 UART: [kat] SHA2-512-ACC
908,157 UART: [kat] ECC-384
917,804 UART: [kat] HMAC-384Kdf
922,464 UART: [kat] LMS
1,170,792 UART: [kat] --
1,171,521 UART: [cold-reset] ++
1,171,955 UART: [fht] FHT @ 0x50003400
1,174,508 UART: [idev] ++
1,174,676 UART: [idev] CDI.KEYID = 6
1,175,036 UART: [idev] SUBJECT.KEYID = 7
1,175,460 UART: [idev] UDS.KEYID = 0
1,175,805 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,660 UART: [idev] Erasing UDS.KEYID = 0
1,201,239 UART: [idev] Sha1 KeyId Algorithm
1,209,925 UART: [idev] --
1,211,139 UART: [ldev] ++
1,211,307 UART: [ldev] CDI.KEYID = 6
1,211,670 UART: [ldev] SUBJECT.KEYID = 5
1,212,096 UART: [ldev] AUTHORITY.KEYID = 7
1,212,559 UART: [ldev] FE.KEYID = 1
1,217,503 UART: [ldev] Erasing FE.KEYID = 1
1,244,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,801 UART: [ldev] --
1,283,202 UART: [fwproc] Wait for Commands...
1,283,886 UART: [fwproc] Recv command 0x46505652
1,284,707 UART: [rt] FIPS Version
1,285,261 >>> mbox cmd response data (36 bytes)
1,285,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,285,396 UART: [fwproc] Recv command 0x46574c44
1,286,124 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,902 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,072 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,299 >>> mbox cmd response: success
2,829,299 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,830,447 UART: [afmc] ++
2,830,615 UART: [afmc] CDI.KEYID = 6
2,830,977 UART: [afmc] SUBJECT.KEYID = 7
2,831,402 UART: [afmc] AUTHORITY.KEYID = 5
2,866,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,898 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,607 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,490 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,191 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,121 UART: [afmc] --
2,910,075 UART: [cold-reset] --
2,910,899 UART: [state] Locking Datavault
2,911,816 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,420 UART: [state] Locking ICCM
2,912,892 UART: [exit] Launching FMC @ 0x40000130
2,918,222 UART:
2,918,238 UART: Running Caliptra FMC ...
2,918,646 UART:
2,918,700 UART: [state] CFI Enabled
2,929,384 UART: [fht] FMC Alias Private Key: 7
3,047,978 UART: [art] Extend RT PCRs Done
3,048,406 UART: [art] Lock RT PCRs Done
3,049,858 UART: [art] Populate DV Done
3,057,771 UART: [fht] FMC Alias Private Key: 7
3,058,937 UART: [art] Derive CDI
3,059,217 UART: [art] Store in slot 0x4
3,144,618 UART: [art] Derive Key Pair
3,144,978 UART: [art] Store priv key in slot 0x5
3,157,990 UART: [art] Derive Key Pair - Done
3,172,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,387 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,152 UART: [art] PUB.X = 75B3C38CB1BD2A2049026C327F9B4EB87B0DACC6F90479373C06DAFDF088B4797E83C65B946C3A5C1EA079FD8A8F19CC
3,195,926 UART: [art] PUB.Y = 0D9D1097944854F164DD8BFA213DDF5ACE3482F00DD70EFB5D386E742F681520A7C3B7064465C391C703BB200BE6D1B9
3,202,864 UART: [art] SIG.R = 5B6200E1C089AF338D195AE073585B8BA4FF90266EF98C484B30FE0DFE18C909EC7323EAD7601F45A51FC1AE521D2ABD
3,209,620 UART: [art] SIG.S = D07167AB1264CA70FA19C51EC3E14B539E92AC5458CB75AF0DDA72A621E4BC56716C15EDA9AAED8607867E1E97F49AD2
3,233,274 UART: Caliptra RT
3,233,525 UART: [state] CFI Enabled
3,353,882 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,420 UART: [rt]cmd =0x46505652, len=4
3,385,080 UART: [rt] FIPS Version
3,386,281 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,991 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,529 >>> mbox cmd response data (36 bytes)
1,139,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,648 >>> mbox cmd response: success
2,677,648 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,739,055 UART:
2,739,071 UART: Running Caliptra FMC ...
2,739,479 UART:
2,739,533 UART: [state] CFI Enabled
2,750,167 UART: [fht] FMC Alias Private Key: 7
2,868,961 UART: [art] Extend RT PCRs Done
2,869,389 UART: [art] Lock RT PCRs Done
2,871,051 UART: [art] Populate DV Done
2,879,426 UART: [fht] FMC Alias Private Key: 7
2,880,392 UART: [art] Derive CDI
2,880,672 UART: [art] Store in slot 0x4
2,966,211 UART: [art] Derive Key Pair
2,966,571 UART: [art] Store priv key in slot 0x5
2,980,011 UART: [art] Derive Key Pair - Done
2,994,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,648 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,413 UART: [art] PUB.X = 8F677BE277C7E92FE74D166081372A17E43EEA9147929941D48FFD246FC6EAB1493870593292B5FC3AF1AD1A45366BE6
3,018,185 UART: [art] PUB.Y = 01EC6CBC89BF4DEB7C7DD817335873D888718B12201D7F1BE0A5F32A15E36E0DFE2D7504F7B191B531FE1D14476B9A50
3,025,136 UART: [art] SIG.R = D303DB22D76D4B7427844344824E7F25AA6366C20288B27B6F37BC6F37383062256ED0DA5D2B03F30864F21B20683373
3,031,884 UART: [art] SIG.S = 763DE10CF74D8F24ACFD6E5B2010B53213FFC6880DE3C1A43E724F71F6FF64C0DCB8B35F0EB9ED952BDDF28D683934CA
3,055,873 UART: Caliptra RT
3,056,124 UART: [state] CFI Enabled
3,175,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,653 UART: [rt]cmd =0x46505652, len=4
3,207,313 UART: [rt] FIPS Version
3,208,266 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
893,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,592 UART: [kat] ++
897,744 UART: [kat] sha1
901,950 UART: [kat] SHA2-256
903,890 UART: [kat] SHA2-384
906,761 UART: [kat] SHA2-512-ACC
908,662 UART: [kat] ECC-384
918,685 UART: [kat] HMAC-384Kdf
923,259 UART: [kat] LMS
1,171,587 UART: [kat] --
1,172,540 UART: [cold-reset] ++
1,173,022 UART: [fht] FHT @ 0x50003400
1,175,495 UART: [idev] ++
1,175,663 UART: [idev] CDI.KEYID = 6
1,176,023 UART: [idev] SUBJECT.KEYID = 7
1,176,447 UART: [idev] UDS.KEYID = 0
1,176,792 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,445 UART: [idev] Erasing UDS.KEYID = 0
1,201,642 UART: [idev] Sha1 KeyId Algorithm
1,210,074 UART: [idev] --
1,211,172 UART: [ldev] ++
1,211,340 UART: [ldev] CDI.KEYID = 6
1,211,703 UART: [ldev] SUBJECT.KEYID = 5
1,212,129 UART: [ldev] AUTHORITY.KEYID = 7
1,212,592 UART: [ldev] FE.KEYID = 1
1,217,860 UART: [ldev] Erasing FE.KEYID = 1
1,245,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,960 UART: [ldev] --
1,284,247 UART: [fwproc] Wait for Commands...
1,284,865 UART: [fwproc] Recv command 0x46505652
1,285,686 UART: [rt] FIPS Version
1,286,240 >>> mbox cmd response data (36 bytes)
1,286,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,286,419 UART: [fwproc] Recv command 0x46574c44
1,287,147 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,141 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,311 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,562 >>> mbox cmd response: success
2,829,562 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,830,824 UART: [afmc] ++
2,830,992 UART: [afmc] CDI.KEYID = 6
2,831,354 UART: [afmc] SUBJECT.KEYID = 7
2,831,779 UART: [afmc] AUTHORITY.KEYID = 5
2,867,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,731 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,479 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,188 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,071 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,772 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,708 UART: [afmc] --
2,910,620 UART: [cold-reset] --
2,911,388 UART: [state] Locking Datavault
2,912,667 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,271 UART: [state] Locking ICCM
2,913,937 UART: [exit] Launching FMC @ 0x40000130
2,919,267 UART:
2,919,283 UART: Running Caliptra FMC ...
2,919,691 UART:
2,919,834 UART: [state] CFI Enabled
2,930,260 UART: [fht] FMC Alias Private Key: 7
3,049,032 UART: [art] Extend RT PCRs Done
3,049,460 UART: [art] Lock RT PCRs Done
3,050,640 UART: [art] Populate DV Done
3,059,015 UART: [fht] FMC Alias Private Key: 7
3,060,179 UART: [art] Derive CDI
3,060,459 UART: [art] Store in slot 0x4
3,146,216 UART: [art] Derive Key Pair
3,146,576 UART: [art] Store priv key in slot 0x5
3,160,176 UART: [art] Derive Key Pair - Done
3,175,185 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,217 UART: [art] PUB.X = 14D1AA695803DF5B0966990A1E4E7F8B6DA83695F0659334C0B0BC4A22CA4925922E199B8C4D2470FA4CF7750ACA6D51
3,197,979 UART: [art] PUB.Y = 7292BD824CA9B6FE459B5A63F429E13A9FF645B6FFC133D220C686DC0B17C20D615F4025E9502ED88B3435D05938DAF1
3,204,929 UART: [art] SIG.R = DC9452335C9D85E439C3A2C5D51C184017BBCB8620C65B5F3FC13AE657DA8B7C569F6D1C24C5B9ECDC9C79E549BED333
3,211,715 UART: [art] SIG.S = 5688344441C3F197C8839B9438C977393C47A83916510F41DE6BAF0171995D26A8826A4F309BCB775723435BBAB46024
3,235,117 UART: Caliptra RT
3,235,460 UART: [state] CFI Enabled
3,355,651 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,047 UART: [rt]cmd =0x46505652, len=4
3,386,707 UART: [rt] FIPS Version
3,387,750 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,576 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,534 >>> mbox cmd response data (36 bytes)
1,140,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,997 >>> mbox cmd response: success
2,680,997 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,743,556 UART:
2,743,572 UART: Running Caliptra FMC ...
2,743,980 UART:
2,744,123 UART: [state] CFI Enabled
2,754,821 UART: [fht] FMC Alias Private Key: 7
2,873,803 UART: [art] Extend RT PCRs Done
2,874,231 UART: [art] Lock RT PCRs Done
2,875,703 UART: [art] Populate DV Done
2,884,006 UART: [fht] FMC Alias Private Key: 7
2,885,094 UART: [art] Derive CDI
2,885,374 UART: [art] Store in slot 0x4
2,971,209 UART: [art] Derive Key Pair
2,971,569 UART: [art] Store priv key in slot 0x5
2,985,253 UART: [art] Derive Key Pair - Done
3,000,018 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,358 UART: [art] PUB.X = DD738D2933660535EEF37B3342B3638D452CEC7946C1082992493A056A42B94CB2EAB977EE173F50EC1D9A22CB4B5DCC
3,023,125 UART: [art] PUB.Y = 4C72B4F118E57D0E3445D992F6E623CFD7B6F8CC26B14A81B095AF6E4280C8DC47049BC64158EFFF93DAC8206E0A7450
3,030,076 UART: [art] SIG.R = E2061787A2BCA177314955AA42DFAAD7C6CD15752CC16B91ACFDB1A9BD14EDC28D6F06CB14B4FEE396967A1356B45A05
3,036,855 UART: [art] SIG.S = B16533AC99C3F7938398BF0E3F6FF973B80F8FB8D349A14ADBE99D509E26BC333903E47DBC63051E85E8F2A6B54AE7A9
3,060,967 UART: Caliptra RT
3,061,310 UART: [state] CFI Enabled
3,181,312 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,582 UART: [rt]cmd =0x46505652, len=4
3,212,242 UART: [rt] FIPS Version
3,213,405 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,165 UART:
192,534 UART: Running Caliptra ROM ...
193,657 UART:
193,803 UART: [state] CFI Enabled
265,552 UART: [state] LifecycleState = Unprovisioned
267,469 UART: [state] DebugLocked = No
269,937 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,230 UART: [kat] SHA2-256
443,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,418 UART: [kat] ++
454,954 UART: [kat] sha1
465,909 UART: [kat] SHA2-256
468,571 UART: [kat] SHA2-384
473,359 UART: [kat] SHA2-512-ACC
475,730 UART: [kat] ECC-384
2,768,644 UART: [kat] HMAC-384Kdf
2,800,563 UART: [kat] LMS
3,990,867 UART: [kat] --
3,994,686 UART: [cold-reset] ++
3,995,779 UART: [fht] Storing FHT @ 0x50003400
4,007,550 UART: [idev] ++
4,008,126 UART: [idev] CDI.KEYID = 6
4,009,050 UART: [idev] SUBJECT.KEYID = 7
4,010,308 UART: [idev] UDS.KEYID = 0
4,011,293 ready_for_fw is high
4,011,564 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,842 UART: [idev] Erasing UDS.KEYID = 0
7,347,364 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,854 UART: [idev] --
7,371,749 UART: [ldev] ++
7,372,322 UART: [ldev] CDI.KEYID = 6
7,373,262 UART: [ldev] SUBJECT.KEYID = 5
7,374,477 UART: [ldev] AUTHORITY.KEYID = 7
7,375,713 UART: [ldev] FE.KEYID = 1
7,413,433 UART: [ldev] Erasing FE.KEYID = 1
10,745,515 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,038,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,053,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,082,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,101,355 UART: [ldev] --
13,105,621 UART: [fwproc] Waiting for Commands...
13,107,618 UART: [fwproc] Received command 0x46574c44
13,109,815 UART: [fwproc] Received Image of size 119428 bytes
17,226,801 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,302,785 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,375,921 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,707,049 >>> mbox cmd response: success
17,707,469 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,711,140 UART: [afmc] ++
17,711,726 UART: [afmc] CDI.KEYID = 6
17,712,673 UART: [afmc] SUBJECT.KEYID = 7
17,713,924 UART: [afmc] AUTHORITY.KEYID = 5
21,084,050 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,383,558 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,385,834 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,400,269 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,414,999 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,429,425 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,450,414 UART: [afmc] --
23,454,190 UART: [cold-reset] --
23,457,644 UART: [state] Locking Datavault
23,462,875 UART: [state] Locking PCR0, PCR1 and PCR31
23,464,626 UART: [state] Locking ICCM
23,467,137 UART: [exit] Launching FMC @ 0x40000130
23,475,552 UART:
23,475,795 UART: Running Caliptra FMC ...
23,476,902 UART:
23,477,062 UART: [state] CFI Enabled
23,544,951 UART: [fht] FMC Alias Private Key: 7
25,906,486 UART: [art] Extend RT PCRs Done
25,907,714 UART: [art] Lock RT PCRs Done
25,909,163 UART: [art] Populate DV Done
25,914,676 UART: [fht] FMC Alias Private Key: 7
25,916,346 UART: [art] Derive CDI
25,917,167 UART: [art] Store in slot 0x4
25,975,430 UART: [art] Derive Key Pair
25,976,503 UART: [art] Store priv key in slot 0x5
29,268,704 UART: [art] Derive Key Pair - Done
29,282,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,570,853 UART: [art] Erasing AUTHORITY.KEYID = 7
31,572,363 UART: [art] PUB.X = A174ACA267BEDB6805A25FCDA137B668469DEB8A13930239AAA0016B62C346CB7491300DD8FFEA1516320E6AD8B29B72
31,579,660 UART: [art] PUB.Y = CC1D9B471E3C08055418C3774B89E3C5C2582F3EE6FCF482463784C4B4DB5C88BD6D5CC9BD9EBF0D8D9B9D309DBCBDBB
31,586,912 UART: [art] SIG.R = 6D260D09BFEFA0ABB5F839D908A9C78AD051C2DB28A9D89A9306210BB303C22754CCDE151BC95BCE9D93AE48FB08E126
31,594,319 UART: [art] SIG.S = 1C2A5B22F1E1EA93D48D9E91397AA9D6F56082114E6110258EE15B59C6D324CC3BE5736D575FC6CA87728C0B15CB8D6B
32,898,976 UART: Caliptra RT
32,899,699 UART: [state] CFI Enabled
33,076,806 UART: [rt] RT listening for mailbox commands...
33,107,943 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,805,086 ready_for_fw is high
3,805,539 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,989,821 >>> mbox cmd response: success
17,990,656 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,675,734 UART:
23,676,181 UART: Running Caliptra FMC ...
23,677,323 UART:
23,677,488 UART: [state] CFI Enabled
23,743,179 UART: [fht] FMC Alias Private Key: 7
26,083,666 UART: [art] Extend RT PCRs Done
26,084,895 UART: [art] Lock RT PCRs Done
26,086,395 UART: [art] Populate DV Done
26,091,729 UART: [fht] FMC Alias Private Key: 7
26,093,230 UART: [art] Derive CDI
26,093,968 UART: [art] Store in slot 0x4
26,151,467 UART: [art] Derive Key Pair
26,152,509 UART: [art] Store priv key in slot 0x5
29,445,465 UART: [art] Derive Key Pair - Done
29,458,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,229 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,760 UART: [art] PUB.X = D207C1BF3B781427014D274AAA623295812E1F7C022F575BA4852FCAEA9F7B4C9E28FEED11248434C8FCF65971B25728
31,755,022 UART: [art] PUB.Y = D49497FBA1BCFA380CFB49F7603ECFE6C48DAFB899684A71F305EC5817854C682DBA99EB645D46332F9A380D72BD2A17
31,762,295 UART: [art] SIG.R = CEB6FC626D81D92CF1A7F56682803A17A4D6B6E2B4AECC69A2017800D67A58899FC541E4E14C19EDEDAEF7E985520C5A
31,769,660 UART: [art] SIG.S = 1C55B47A439AD540B73C8F6028A487510A98C37BF9D5B48C4B7A7FD3AA41B1FC586D7A2FF2F4119D2E27AED707335FC2
33,075,012 UART: Caliptra RT
33,075,735 UART: [state] CFI Enabled
33,252,376 UART: [rt] RT listening for mailbox commands...
33,283,641 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,372 UART:
192,749 UART: Running Caliptra ROM ...
193,887 UART:
603,607 UART: [state] CFI Enabled
617,837 UART: [state] LifecycleState = Unprovisioned
619,788 UART: [state] DebugLocked = No
622,392 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,405 UART: [kat] SHA2-256
796,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,689 UART: [kat] ++
807,189 UART: [kat] sha1
818,713 UART: [kat] SHA2-256
821,382 UART: [kat] SHA2-384
826,250 UART: [kat] SHA2-512-ACC
828,626 UART: [kat] ECC-384
3,114,109 UART: [kat] HMAC-384Kdf
3,124,854 UART: [kat] LMS
4,314,995 UART: [kat] --
4,319,727 UART: [cold-reset] ++
4,322,241 UART: [fht] Storing FHT @ 0x50003400
4,332,945 UART: [idev] ++
4,333,516 UART: [idev] CDI.KEYID = 6
4,334,478 UART: [idev] SUBJECT.KEYID = 7
4,335,731 UART: [idev] UDS.KEYID = 0
4,336,678 ready_for_fw is high
4,336,897 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,486,882 UART: [idev] Erasing UDS.KEYID = 0
7,620,116 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,534 UART: [idev] --
7,646,358 UART: [ldev] ++
7,646,937 UART: [ldev] CDI.KEYID = 6
7,647,869 UART: [ldev] SUBJECT.KEYID = 5
7,649,033 UART: [ldev] AUTHORITY.KEYID = 7
7,650,326 UART: [ldev] FE.KEYID = 1
7,660,875 UART: [ldev] Erasing FE.KEYID = 1
10,948,599 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,317 UART: [ldev] --
13,307,829 UART: [fwproc] Waiting for Commands...
13,309,842 UART: [fwproc] Received command 0x46574c44
13,312,051 UART: [fwproc] Received Image of size 119428 bytes
17,430,428 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,777 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,944 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,909,898 >>> mbox cmd response: success
17,910,320 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,913,624 UART: [afmc] ++
17,914,237 UART: [afmc] CDI.KEYID = 6
17,915,122 UART: [afmc] SUBJECT.KEYID = 7
17,916,401 UART: [afmc] AUTHORITY.KEYID = 5
21,229,981 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,526,326 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,528,598 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,543,013 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,557,763 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,572,170 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,593,170 UART: [afmc] --
23,596,900 UART: [cold-reset] --
23,601,356 UART: [state] Locking Datavault
23,605,115 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,859 UART: [state] Locking ICCM
23,609,104 UART: [exit] Launching FMC @ 0x40000130
23,617,500 UART:
23,617,741 UART: Running Caliptra FMC ...
23,618,848 UART:
23,619,011 UART: [state] CFI Enabled
23,627,229 UART: [fht] FMC Alias Private Key: 7
25,967,877 UART: [art] Extend RT PCRs Done
25,969,107 UART: [art] Lock RT PCRs Done
25,970,725 UART: [art] Populate DV Done
25,976,154 UART: [fht] FMC Alias Private Key: 7
25,977,850 UART: [art] Derive CDI
25,978,676 UART: [art] Store in slot 0x4
26,021,361 UART: [art] Derive Key Pair
26,022,369 UART: [art] Store priv key in slot 0x5
29,264,746 UART: [art] Derive Key Pair - Done
29,277,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,532 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,045 UART: [art] PUB.X = 81ACA2F410A81C50E61BED8F66801D8AE667E21D8DC28D6683201E6555E9A2C2D6D4202A805C0DCEE82FE494D059E81F
31,566,333 UART: [art] PUB.Y = 269023F335B3E75B07CF8139541C7496227F5F5F2962F135C45417CB1C0A5A8435885B2D7C90887CE3E266004874422E
31,573,533 UART: [art] SIG.R = 2212CDBDD70621F2D0929C5AA488FC246B6367D5E8AD7EAA0694B2F86357ECD1B82D59D71CC3F2EDDDE9C492F9A548AE
31,580,971 UART: [art] SIG.S = 55311F58DECE324A8FB483512BC1EC6ABCED26B5939AF5832ABC507CA5F2E0255AAC3C25E32C2CFBBF702966CF890027
32,886,409 UART: Caliptra RT
32,887,112 UART: [state] CFI Enabled
33,020,911 UART: [rt] RT listening for mailbox commands...
33,051,942 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
4,130,939 ready_for_fw is high
4,131,477 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,177,638 >>> mbox cmd response: success
18,178,433 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,817,953 UART:
23,818,410 UART: Running Caliptra FMC ...
23,819,567 UART:
23,819,726 UART: [state] CFI Enabled
23,827,740 UART: [fht] FMC Alias Private Key: 7
26,167,241 UART: [art] Extend RT PCRs Done
26,168,468 UART: [art] Lock RT PCRs Done
26,170,085 UART: [art] Populate DV Done
26,175,704 UART: [fht] FMC Alias Private Key: 7
26,177,209 UART: [art] Derive CDI
26,177,980 UART: [art] Store in slot 0x4
26,220,356 UART: [art] Derive Key Pair
26,221,424 UART: [art] Store priv key in slot 0x5
29,463,318 UART: [art] Derive Key Pair - Done
29,476,526 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,756,669 UART: [art] Erasing AUTHORITY.KEYID = 7
31,758,207 UART: [art] PUB.X = 0872CE2AC76E02A7C36C49A8138C9325CA37CEF3F8EF40169628EC5FE1CB01D38E78BF625B648FF9EDC5C59272DA6777
31,765,480 UART: [art] PUB.Y = 755FBE3049BD100AFB832DAA5EC144511593D48351D7B6CE939D1DD7800224ACEC1C22B4851F0164A6FC4E06E058CDBA
31,772,735 UART: [art] SIG.R = BED6639356CA8BC80A9F0AAE06E56A163CA3B03AD7028B1E1D9765582CF8B249C10310B4885192B1ACF589949CD17949
31,780,107 UART: [art] SIG.S = 649DBD907C0FB70707F06CA84F3CB6D2B3022AC971CAF29BC00470347701CCFFA40026EEEC89F197890D424533F60F92
33,085,736 UART: Caliptra RT
33,086,469 UART: [state] CFI Enabled
33,219,494 UART: [rt] RT listening for mailbox commands...
33,250,609 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,099 UART:
192,491 UART: Running Caliptra ROM ...
193,650 UART:
193,802 UART: [state] CFI Enabled
265,465 UART: [state] LifecycleState = Unprovisioned
267,456 UART: [state] DebugLocked = No
269,341 UART: [state] WD Timer not started. Device not locked for debugging
273,310 UART: [kat] SHA2-256
452,959 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,720 UART: [kat] ++
464,173 UART: [kat] sha1
476,477 UART: [kat] SHA2-256
479,154 UART: [kat] SHA2-384
485,158 UART: [kat] SHA2-512-ACC
487,542 UART: [kat] ECC-384
2,947,664 UART: [kat] HMAC-384Kdf
2,971,908 UART: [kat] LMS
3,448,385 UART: [kat] --
3,453,149 UART: [cold-reset] ++
3,455,101 UART: [fht] FHT @ 0x50003400
3,465,975 UART: [idev] ++
3,466,582 UART: [idev] CDI.KEYID = 6
3,467,637 UART: [idev] SUBJECT.KEYID = 7
3,468,752 UART: [idev] UDS.KEYID = 0
3,469,761 ready_for_fw is high
3,469,983 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,620,173 UART: [idev] Erasing UDS.KEYID = 0
5,989,181 UART: [idev] Sha1 KeyId Algorithm
6,014,052 UART: [idev] --
6,018,658 UART: [ldev] ++
6,019,275 UART: [ldev] CDI.KEYID = 6
6,020,200 UART: [ldev] SUBJECT.KEYID = 5
6,021,373 UART: [ldev] AUTHORITY.KEYID = 7
6,022,677 UART: [ldev] FE.KEYID = 1
6,058,630 UART: [ldev] Erasing FE.KEYID = 1
8,564,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,058 UART: [ldev] --
10,376,417 UART: [fwproc] Wait for Commands...
10,378,932 UART: [fwproc] Recv command 0x46574c44
10,380,936 UART: [fwproc] Recv'd Img size: 119428 bytes
13,870,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,603 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,621 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,356,026 >>> mbox cmd response: success
14,356,460 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,360,787 UART: [afmc] ++
14,361,397 UART: [afmc] CDI.KEYID = 6
14,362,353 UART: [afmc] SUBJECT.KEYID = 7
14,363,536 UART: [afmc] AUTHORITY.KEYID = 5
16,893,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,177 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,969 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,019 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,610 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,710,701 UART: [afmc] --
18,714,168 UART: [cold-reset] --
18,717,537 UART: [state] Locking Datavault
18,722,895 UART: [state] Locking PCR0, PCR1 and PCR31
18,724,637 UART: [state] Locking ICCM
18,726,091 UART: [exit] Launching FMC @ 0x40000130
18,734,497 UART:
18,734,757 UART: Running Caliptra FMC ...
18,735,865 UART:
18,736,031 UART: [state] CFI Enabled
18,792,732 UART: [fht] FMC Alias Private Key: 7
20,559,779 UART: [art] Extend RT PCRs Done
20,561,005 UART: [art] Lock RT PCRs Done
20,562,892 UART: [art] Populate DV Done
20,568,422 UART: [fht] FMC Alias Private Key: 7
20,569,985 UART: [art] Derive CDI
20,570,724 UART: [art] Store in slot 0x4
20,626,050 UART: [art] Derive Key Pair
20,627,097 UART: [art] Store priv key in slot 0x5
23,089,749 UART: [art] Derive Key Pair - Done
23,102,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,815,498 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,007 UART: [art] PUB.X = A25BB6332E5291AA48BA922B710DD6B0902C53CF9D5B30522B40909F562D35FF29A9C300676DDF0F4557E974C0C8015A
24,824,304 UART: [art] PUB.Y = 801F959EEEF730B2818FD52251596217E00E51FD9DCEAF8EEA53FBD8985A7E7481CF613B43B52EC9FB1577011F3B4F8A
24,831,520 UART: [art] SIG.R = D065D5330D2670140363788A4239A008EB94F08ABE2857194DFC5034902B69828C4545B14C959EEA6EC9035C7D201BB1
24,838,878 UART: [art] SIG.S = 14FE6C891F5C3F43973CD449BF11800750B609CA77577E3EE18B59C7E2445EB916FEC9E5E1BD06C76E708EDB0D958DB8
25,818,299 UART: Caliptra RT
25,819,005 UART: [state] CFI Enabled
25,998,006 UART: [rt] RT listening for mailbox commands...
26,029,357 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,464,899 ready_for_fw is high
3,465,548 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,281,878 >>> mbox cmd response: success
14,282,505 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,580,430 UART:
18,580,833 UART: Running Caliptra FMC ...
18,582,001 UART:
18,582,170 UART: [state] CFI Enabled
18,648,064 UART: [fht] FMC Alias Private Key: 7
20,414,174 UART: [art] Extend RT PCRs Done
20,415,402 UART: [art] Lock RT PCRs Done
20,417,021 UART: [art] Populate DV Done
20,422,385 UART: [fht] FMC Alias Private Key: 7
20,423,887 UART: [art] Derive CDI
20,424,709 UART: [art] Store in slot 0x4
20,481,153 UART: [art] Derive Key Pair
20,482,158 UART: [art] Store priv key in slot 0x5
22,945,206 UART: [art] Derive Key Pair - Done
22,958,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,929 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,436 UART: [art] PUB.X = 87DC896AB5E2BFA2F27EA7669FD85FE1490AEE50E34A4859AB15025AE60657DB20F3E3C039E96A97A0A8E93A31671011
24,680,702 UART: [art] PUB.Y = B3DFD04FC01B1A812AB1699825666BBB068EA049B64755D5F7C3C229CFC0C147D814B25AAEB3B4BB155FA8EA8D547F68
24,688,000 UART: [art] SIG.R = CAD5F5154167ABACC478982662538C5CFE0D0877BCAF8CFB7C076C56D42AE0B51968E5DB80573D10E2CAC9EF91441FE2
24,695,383 UART: [art] SIG.S = 63B4C846E1F5DE23D19789D5CEBC48C1E843A270BCC4F2CAE2CE0CEBDA08D41E0237716E54E1C9FA049F19D0BB9ABFB1
25,674,761 UART: Caliptra RT
25,675,462 UART: [state] CFI Enabled
25,854,336 UART: [rt] RT listening for mailbox commands...
25,885,330 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,479 writing to cptra_bootfsm_go
192,751 UART:
193,112 UART: Running Caliptra ROM ...
194,340 UART:
603,989 UART: [state] CFI Enabled
620,448 UART: [state] LifecycleState = Unprovisioned
622,329 UART: [state] DebugLocked = No
624,930 UART: [state] WD Timer not started. Device not locked for debugging
629,033 UART: [kat] SHA2-256
808,712 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,483 UART: [kat] ++
819,978 UART: [kat] sha1
829,863 UART: [kat] SHA2-256
832,600 UART: [kat] SHA2-384
838,170 UART: [kat] SHA2-512-ACC
840,544 UART: [kat] ECC-384
3,282,875 UART: [kat] HMAC-384Kdf
3,294,501 UART: [kat] LMS
3,770,977 UART: [kat] --
3,775,973 UART: [cold-reset] ++
3,778,055 UART: [fht] FHT @ 0x50003400
3,789,468 UART: [idev] ++
3,790,036 UART: [idev] CDI.KEYID = 6
3,790,997 UART: [idev] SUBJECT.KEYID = 7
3,792,245 UART: [idev] UDS.KEYID = 0
3,793,151 ready_for_fw is high
3,793,358 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,943,303 UART: [idev] Erasing UDS.KEYID = 0
6,268,256 UART: [idev] Sha1 KeyId Algorithm
6,291,060 UART: [idev] --
6,295,550 UART: [ldev] ++
6,296,133 UART: [ldev] CDI.KEYID = 6
6,297,044 UART: [ldev] SUBJECT.KEYID = 5
6,298,283 UART: [ldev] AUTHORITY.KEYID = 7
6,299,521 UART: [ldev] FE.KEYID = 1
6,311,630 UART: [ldev] Erasing FE.KEYID = 1
8,787,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,230 UART: [ldev] --
10,578,937 UART: [fwproc] Wait for Commands...
10,581,420 UART: [fwproc] Recv command 0x46574c44
10,583,413 UART: [fwproc] Recv'd Img size: 119428 bytes
14,076,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,161 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,190 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,560,862 >>> mbox cmd response: success
14,561,281 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,565,749 UART: [afmc] ++
14,566,330 UART: [afmc] CDI.KEYID = 6
14,567,256 UART: [afmc] SUBJECT.KEYID = 7
14,568,499 UART: [afmc] AUTHORITY.KEYID = 5
17,068,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,977 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,804 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,859 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,843,419 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,867,835 UART: [afmc] --
18,870,814 UART: [cold-reset] --
18,875,280 UART: [state] Locking Datavault
18,882,602 UART: [state] Locking PCR0, PCR1 and PCR31
18,884,342 UART: [state] Locking ICCM
18,886,977 UART: [exit] Launching FMC @ 0x40000130
18,895,375 UART:
18,895,611 UART: Running Caliptra FMC ...
18,896,638 UART:
18,896,788 UART: [state] CFI Enabled
18,904,781 UART: [fht] FMC Alias Private Key: 7
20,670,944 UART: [art] Extend RT PCRs Done
20,672,165 UART: [art] Lock RT PCRs Done
20,673,608 UART: [art] Populate DV Done
20,679,069 UART: [fht] FMC Alias Private Key: 7
20,680,631 UART: [art] Derive CDI
20,681,368 UART: [art] Store in slot 0x4
20,724,109 UART: [art] Derive Key Pair
20,725,145 UART: [art] Store priv key in slot 0x5
23,152,066 UART: [art] Derive Key Pair - Done
23,164,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,871,484 UART: [art] Erasing AUTHORITY.KEYID = 7
24,872,985 UART: [art] PUB.X = 54BB15B1A98E559BCD33BB60F56D68D8E1AAFF54EE5B85B9711A52B4D7E51EA9CFBE7F794D9F7B8E28CD6742322BF332
24,880,310 UART: [art] PUB.Y = 5B247DC4A5ABA4E21E0E8F5288A5B5A2345B8E13917A37648015FAE94BB5938AE089CBD450E1EA9B04CEA2E4AAB77725
24,887,584 UART: [art] SIG.R = 50580887E0F6350EB2F20B7E852C98C4E6C3B5A058CFDC27AD1A8DA7625031FC6B58FA6CDF26B4A079FF5426AE887B1F
24,894,987 UART: [art] SIG.S = B0E9F36069CE6662FF72681779A1DEAAE374479EDF8CF179C60F8D90169628ADCEB00FAE7C3BA61D3D3BDE5DC04D0422
25,873,455 UART: Caliptra RT
25,874,174 UART: [state] CFI Enabled
26,007,207 UART: [rt] RT listening for mailbox commands...
26,038,216 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
3,780,713 ready_for_fw is high
3,781,250 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,470,333 >>> mbox cmd response: success
14,470,853 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,722,747 UART:
18,723,139 UART: Running Caliptra FMC ...
18,724,335 UART:
18,724,516 UART: [state] CFI Enabled
18,732,271 UART: [fht] FMC Alias Private Key: 7
20,499,185 UART: [art] Extend RT PCRs Done
20,500,427 UART: [art] Lock RT PCRs Done
20,501,743 UART: [art] Populate DV Done
20,507,243 UART: [fht] FMC Alias Private Key: 7
20,508,829 UART: [art] Derive CDI
20,509,573 UART: [art] Store in slot 0x4
20,552,009 UART: [art] Derive Key Pair
20,553,032 UART: [art] Store priv key in slot 0x5
22,979,157 UART: [art] Derive Key Pair - Done
22,991,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,698,052 UART: [art] Erasing AUTHORITY.KEYID = 7
24,699,573 UART: [art] PUB.X = 82FCBADBFD770A0BF05B4A236696B7933797D2D9A35B38B298538A5FFEB43376B7E7690769D0AB220F5A63E614CAB270
24,706,860 UART: [art] PUB.Y = 677922A644034546652E60379E6BD612881B08B61AE66BA08B079CC4F9AD4500C229224FC0385B3247A0185C3185D430
24,714,034 UART: [art] SIG.R = 9B1DB605877783BC8D833B3AC5F2499BA7F6D91388DFA7C686EB8BA34D33249614581466368A80A660456A449386F7A2
24,721,454 UART: [art] SIG.S = 1B8EEE6E98764A554A389ABD1CF5066141D4D135AE30E668CCF517411B7956706DB571702541DB73F132263877A61D88
25,700,549 UART: Caliptra RT
25,701,283 UART: [state] CFI Enabled
25,833,660 UART: [rt] RT listening for mailbox commands...
25,865,090 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
192,213 UART:
192,570 UART: Running Caliptra ROM ...
193,713 UART:
193,866 UART: [state] CFI Enabled
266,571 UART: [state] LifecycleState = Unprovisioned
268,942 UART: [state] DebugLocked = No
270,430 UART: [state] WD Timer not started. Device not locked for debugging
275,468 UART: [kat] SHA2-256
465,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,129 UART: [kat] ++
476,610 UART: [kat] sha1
488,630 UART: [kat] SHA2-256
491,647 UART: [kat] SHA2-384
498,358 UART: [kat] SHA2-512-ACC
500,885 UART: [kat] ECC-384
2,946,987 UART: [kat] HMAC-384Kdf
2,971,911 UART: [kat] LMS
3,503,694 UART: [kat] --
3,509,541 UART: [cold-reset] ++
3,511,479 UART: [fht] FHT @ 0x50003400
3,522,329 UART: [idev] ++
3,523,049 UART: [idev] CDI.KEYID = 6
3,524,124 UART: [idev] SUBJECT.KEYID = 7
3,525,233 UART: [idev] UDS.KEYID = 0
3,526,170 ready_for_fw is high
3,526,389 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,564 UART: [idev] Erasing UDS.KEYID = 0
6,030,462 UART: [idev] Sha1 KeyId Algorithm
6,053,127 UART: [idev] --
6,057,449 UART: [ldev] ++
6,058,146 UART: [ldev] CDI.KEYID = 6
6,059,061 UART: [ldev] SUBJECT.KEYID = 5
6,060,250 UART: [ldev] AUTHORITY.KEYID = 7
6,061,466 UART: [ldev] FE.KEYID = 1
6,101,470 UART: [ldev] Erasing FE.KEYID = 1
8,609,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,446 UART: [ldev] --
10,416,690 UART: [fwproc] Wait for Commands...
10,418,633 UART: [fwproc] Recv command 0x46574c44
10,420,897 UART: [fwproc] Recv'd Img size: 119428 bytes
13,930,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,010,836 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,134,459 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,699,874 >>> mbox cmd response: success
14,700,280 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,703,609 UART: [afmc] ++
14,704,294 UART: [afmc] CDI.KEYID = 6
14,705,540 UART: [afmc] SUBJECT.KEYID = 7
14,706,999 UART: [afmc] AUTHORITY.KEYID = 5
17,237,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,774 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,877 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,994,033 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,938 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,639 UART: [afmc] --
19,036,714 UART: [cold-reset] --
19,040,160 UART: [state] Locking Datavault
19,045,323 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,513 UART: [state] Locking ICCM
19,049,011 UART: [exit] Launching FMC @ 0x40000130
19,057,678 UART:
19,057,929 UART: Running Caliptra FMC ...
19,059,038 UART:
19,059,204 UART: [state] CFI Enabled
19,117,944 UART: [fht] FMC Alias Private Key: 7
20,883,823 UART: [art] Extend RT PCRs Done
20,885,044 UART: [art] Lock RT PCRs Done
20,886,564 UART: [art] Populate DV Done
20,891,853 UART: [fht] FMC Alias Private Key: 7
20,893,485 UART: [art] Derive CDI
20,894,302 UART: [art] Store in slot 0x4
20,949,907 UART: [art] Derive Key Pair
20,950,948 UART: [art] Store priv key in slot 0x5
23,413,967 UART: [art] Derive Key Pair - Done
23,426,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,071 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,569 UART: [art] PUB.X = D24A3B87ED963F29D8B12A989F7479A3F43590D7DBDABC197A4F425B42C9878230CDF6A10FA3CD36BEC25B45E3EE8E47
25,147,850 UART: [art] PUB.Y = 89CFAF31FB3F1C35D8F782FA51D7D3A068DA5DE4DE5E408E35F891DA42902B6F09014CEDE8CA804C0910AC7443C1341E
25,155,143 UART: [art] SIG.R = 61CAE3E8C04B2B4905966CCC1676D0F1FDB13884CB22EDE0FD256E78BE8721B59FFEE20ECF60DCA74A32AC97F206B028
25,162,598 UART: [art] SIG.S = 3BA4C2F8AFBB9837A09F59A34B24127AC95509E105167C01605EC766E8F7FF96C88F43C9CC265197D2A00A4D1085488A
26,141,869 UART: Caliptra RT
26,142,588 UART: [state] CFI Enabled
26,321,625 UART: [rt] RT listening for mailbox commands...
26,352,668 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,440,083 ready_for_fw is high
3,440,548 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,842,222 >>> mbox cmd response: success
14,842,874 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,138,332 UART:
19,138,716 UART: Running Caliptra FMC ...
19,140,055 UART:
19,140,232 UART: [state] CFI Enabled
19,205,244 UART: [fht] FMC Alias Private Key: 7
20,971,825 UART: [art] Extend RT PCRs Done
20,973,055 UART: [art] Lock RT PCRs Done
20,974,400 UART: [art] Populate DV Done
20,979,791 UART: [fht] FMC Alias Private Key: 7
20,981,328 UART: [art] Derive CDI
20,982,103 UART: [art] Store in slot 0x4
21,037,973 UART: [art] Derive Key Pair
21,038,984 UART: [art] Store priv key in slot 0x5
23,502,044 UART: [art] Derive Key Pair - Done
23,515,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,985 UART: [art] Erasing AUTHORITY.KEYID = 7
25,229,524 UART: [art] PUB.X = 0A5983EFED3EA940540BDDC2F3D306E732C99746570940B438012BDD6ADB30EB558E827FC789E9DEE8890DE570C65A69
25,236,746 UART: [art] PUB.Y = 03C00945CBEAA4E8E81108E1C330B937E59FB43B35D9DB1DE1C62DB77CEB3AF0470EE756BBB166F2B69BBFB16E817766
25,244,021 UART: [art] SIG.R = 647DDDE5B226A40D08A869D09C92A9C466DA25BFEABEFF32BED543198E7BC0D7FBB8574516321099509F74B3752F7488
25,251,432 UART: [art] SIG.S = 1223F490677A7E67CE71E7B18D4074BB98C30C24475B5726803BC73095F9275D60ECDB8AD913A81B0C88E6F5CD8824B3
26,229,616 UART: Caliptra RT
26,230,310 UART: [state] CFI Enabled
26,411,272 UART: [rt] RT listening for mailbox commands...
26,442,476 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
192,468 UART:
192,832 UART: Running Caliptra ROM ...
194,037 UART:
603,703 UART: [state] CFI Enabled
617,526 UART: [state] LifecycleState = Unprovisioned
619,965 UART: [state] DebugLocked = No
621,804 UART: [state] WD Timer not started. Device not locked for debugging
626,335 UART: [kat] SHA2-256
816,217 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,034 UART: [kat] ++
827,577 UART: [kat] sha1
837,754 UART: [kat] SHA2-256
840,764 UART: [kat] SHA2-384
846,901 UART: [kat] SHA2-512-ACC
849,425 UART: [kat] ECC-384
3,293,078 UART: [kat] HMAC-384Kdf
3,306,809 UART: [kat] LMS
3,838,663 UART: [kat] --
3,843,758 UART: [cold-reset] ++
3,845,422 UART: [fht] FHT @ 0x50003400
3,856,128 UART: [idev] ++
3,856,869 UART: [idev] CDI.KEYID = 6
3,857,788 UART: [idev] SUBJECT.KEYID = 7
3,859,044 UART: [idev] UDS.KEYID = 0
3,859,977 ready_for_fw is high
3,860,184 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,010,131 UART: [idev] Erasing UDS.KEYID = 0
6,334,616 UART: [idev] Sha1 KeyId Algorithm
6,358,401 UART: [idev] --
6,363,155 UART: [ldev] ++
6,363,844 UART: [ldev] CDI.KEYID = 6
6,364,763 UART: [ldev] SUBJECT.KEYID = 5
6,365,932 UART: [ldev] AUTHORITY.KEYID = 7
6,367,167 UART: [ldev] FE.KEYID = 1
6,379,043 UART: [ldev] Erasing FE.KEYID = 1
8,861,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,141 UART: [ldev] --
10,649,898 UART: [fwproc] Wait for Commands...
10,651,675 UART: [fwproc] Recv command 0x46574c44
10,653,995 UART: [fwproc] Recv'd Img size: 119428 bytes
14,170,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,248,755 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,372,328 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,937,710 >>> mbox cmd response: success
14,938,176 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,941,417 UART: [afmc] ++
14,942,104 UART: [afmc] CDI.KEYID = 6
14,943,267 UART: [afmc] SUBJECT.KEYID = 7
14,944,782 UART: [afmc] AUTHORITY.KEYID = 5
17,452,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,172,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,174,902 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,190,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,205,179 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,220,063 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,243,542 UART: [afmc] --
19,247,210 UART: [cold-reset] --
19,250,409 UART: [state] Locking Datavault
19,257,871 UART: [state] Locking PCR0, PCR1 and PCR31
19,260,066 UART: [state] Locking ICCM
19,262,473 UART: [exit] Launching FMC @ 0x40000130
19,271,147 UART:
19,271,382 UART: Running Caliptra FMC ...
19,272,487 UART:
19,272,650 UART: [state] CFI Enabled
19,280,392 UART: [fht] FMC Alias Private Key: 7
21,046,898 UART: [art] Extend RT PCRs Done
21,048,123 UART: [art] Lock RT PCRs Done
21,049,682 UART: [art] Populate DV Done
21,055,380 UART: [fht] FMC Alias Private Key: 7
21,057,043 UART: [art] Derive CDI
21,057,786 UART: [art] Store in slot 0x4
21,100,450 UART: [art] Derive Key Pair
21,101,494 UART: [art] Store priv key in slot 0x5
23,528,310 UART: [art] Derive Key Pair - Done
23,541,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,247,208 UART: [art] Erasing AUTHORITY.KEYID = 7
25,248,720 UART: [art] PUB.X = D4F322ECC18B5659DF992727A2BC8395577AE6058B910F09AF2ED57587C08185B613CB7FEC83D08AD1F94E645CCD3B5D
25,256,019 UART: [art] PUB.Y = DF54184982863E2401D2528BAB7B6DD9D811917E16A3823BE392F83E055563E61434426A9350B5831E2D12B453FFA306
25,263,198 UART: [art] SIG.R = B81D3491FFB1E2CE3CED2FDA87EF91CA2C1E4945848B5D581F05161C16A54B52A3D15385998C779BA3E97780BE53BD9D
25,270,599 UART: [art] SIG.S = A10EBFBED3460055B6FDF290DE2CFF134DF98B1A8E6A2D3E6E985881CBAB46875FDFA6EAEDDBEA66945A2F34CC91F107
26,249,660 UART: Caliptra RT
26,250,355 UART: [state] CFI Enabled
26,383,215 UART: [rt] RT listening for mailbox commands...
26,414,611 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,755,530 ready_for_fw is high
3,756,167 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,056,852 >>> mbox cmd response: success
15,057,419 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,305,678 UART:
19,306,074 UART: Running Caliptra FMC ...
19,307,218 UART:
19,307,375 UART: [state] CFI Enabled
19,315,388 UART: [fht] FMC Alias Private Key: 7
21,081,749 UART: [art] Extend RT PCRs Done
21,083,068 UART: [art] Lock RT PCRs Done
21,085,142 UART: [art] Populate DV Done
21,090,896 UART: [fht] FMC Alias Private Key: 7
21,092,603 UART: [art] Derive CDI
21,093,426 UART: [art] Store in slot 0x4
21,136,467 UART: [art] Derive Key Pair
21,137,468 UART: [art] Store priv key in slot 0x5
23,564,156 UART: [art] Derive Key Pair - Done
23,576,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,282,553 UART: [art] Erasing AUTHORITY.KEYID = 7
25,284,063 UART: [art] PUB.X = DCC7931B91FE21BAE4A67DE853015103BE8418DE6FDF0CD12935B5F67DF7FA6A7BE502486082EA19118A7C3AA5CE3B77
25,291,353 UART: [art] PUB.Y = D561931578FD720960BBBE0A9673A8195D087224BF288C95261FA268FD85DDBF26545BBA735E0C28CBF9693FD9B38165
25,298,602 UART: [art] SIG.R = BDF366131BF0DEAA09DE6D730787C2FD906534580D5A860793BFFF9649E1AA3D7C0C3171DFD0B3C06CEAC8D70E6B26E2
25,306,022 UART: [art] SIG.S = DF04B773D7E492C35F28D4110E161E6B3D15BCAC548995E39217E305785168A30069605E33F4F1D88C7EDB166AA447EB
26,284,925 UART: Caliptra RT
26,285,639 UART: [state] CFI Enabled
26,418,924 UART: [rt] RT listening for mailbox commands...
26,450,437 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,686 UART: [state] LifecycleState = Unprovisioned
86,341 UART: [state] DebugLocked = No
87,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,741 UART: [kat] SHA2-256
882,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,787 UART: [kat] ++
886,939 UART: [kat] sha1
891,393 UART: [kat] SHA2-256
893,331 UART: [kat] SHA2-384
896,072 UART: [kat] SHA2-512-ACC
897,973 UART: [kat] ECC-384
903,944 UART: [kat] HMAC-384Kdf
908,334 UART: [kat] LMS
1,476,530 UART: [kat] --
1,477,131 UART: [cold-reset] ++
1,477,487 UART: [fht] Storing FHT @ 0x50003400
1,480,310 UART: [idev] ++
1,480,478 UART: [idev] CDI.KEYID = 6
1,480,838 UART: [idev] SUBJECT.KEYID = 7
1,481,262 UART: [idev] UDS.KEYID = 0
1,481,607 ready_for_fw is high
1,481,607 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,054 UART: [idev] Erasing UDS.KEYID = 0
1,505,718 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,342 UART: [idev] --
1,515,471 UART: [ldev] ++
1,515,639 UART: [ldev] CDI.KEYID = 6
1,516,002 UART: [ldev] SUBJECT.KEYID = 5
1,516,428 UART: [ldev] AUTHORITY.KEYID = 7
1,516,891 UART: [ldev] FE.KEYID = 1
1,522,027 UART: [ldev] Erasing FE.KEYID = 1
1,547,050 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,692 UART: [ldev] --
1,586,205 UART: [fwproc] Waiting for Commands...
1,587,024 UART: [fwproc] Received command 0x46574c44
1,587,815 UART: [fwproc] Received Image of size 119428 bytes
2,943,701 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,753 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,971 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,590 >>> mbox cmd response: success
3,143,590 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,144,636 UART: [afmc] ++
3,144,804 UART: [afmc] CDI.KEYID = 6
3,145,166 UART: [afmc] SUBJECT.KEYID = 7
3,145,591 UART: [afmc] AUTHORITY.KEYID = 5
3,180,524 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,368 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,148 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,857 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,740 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,423 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,099 UART: [afmc] --
3,223,101 UART: [cold-reset] --
3,223,855 UART: [state] Locking Datavault
3,225,170 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,774 UART: [state] Locking ICCM
3,226,212 UART: [exit] Launching FMC @ 0x40000130
3,231,542 UART:
3,231,558 UART: Running Caliptra FMC ...
3,231,966 UART:
3,232,020 UART: [state] CFI Enabled
3,242,506 UART: [fht] FMC Alias Private Key: 7
3,361,326 UART: [art] Extend RT PCRs Done
3,361,754 UART: [art] Lock RT PCRs Done
3,362,968 UART: [art] Populate DV Done
3,371,417 UART: [fht] FMC Alias Private Key: 7
3,372,427 UART: [art] Derive CDI
3,372,707 UART: [art] Store in slot 0x4
3,458,639 UART: [art] Derive Key Pair
3,458,999 UART: [art] Store priv key in slot 0x5
3,472,378 UART: [art] Derive Key Pair - Done
3,486,851 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,112 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,877 UART: [art] PUB.X = 7210EB156243DFE2FF0534D6694FAD3F1E77D208299357D67BC90CF102E12DC84A72C119F787187A29F6D0774783699B
3,509,631 UART: [art] PUB.Y = 15D75BBDEED66499F7AFCFD61742C3077D556C23AB3657F5ACB95BF56D387E0F3D6F2F03801CF650782BFEB6787D5C0B
3,516,585 UART: [art] SIG.R = 3C7EC462EF2CDC0B0D55278AAB4F0F4E29F0D7444C1EEC8C2F8EA3DFC50A02B6C1EBFA7C5212231DBEDFCDA789E8661D
3,523,372 UART: [art] SIG.S = 5FAE621592C1D21C4C29ECFF41C6CE9655EB4E6194410B143CB1ACBD65BE9A4D5310D51D40533DC69A38B2CD90894EDA
3,547,443 UART: Caliptra RT
3,547,694 UART: [state] CFI Enabled
3,667,409 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,059 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,705 ready_for_fw is high
1,362,705 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,576 >>> mbox cmd response: success
2,992,576 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,053,815 UART:
3,053,831 UART: Running Caliptra FMC ...
3,054,239 UART:
3,054,293 UART: [state] CFI Enabled
3,064,849 UART: [fht] FMC Alias Private Key: 7
3,183,905 UART: [art] Extend RT PCRs Done
3,184,333 UART: [art] Lock RT PCRs Done
3,185,897 UART: [art] Populate DV Done
3,194,140 UART: [fht] FMC Alias Private Key: 7
3,195,218 UART: [art] Derive CDI
3,195,498 UART: [art] Store in slot 0x4
3,281,220 UART: [art] Derive Key Pair
3,281,580 UART: [art] Store priv key in slot 0x5
3,295,103 UART: [art] Derive Key Pair - Done
3,309,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,914 UART: [art] PUB.X = 8D8C22A144CEF003EEBB6892174D5776A1D7F1DA4C57AEB703B034A3F32506F9B9C1EE204AC806EF7C702B9ED0E255AF
3,332,688 UART: [art] PUB.Y = B8DA57F7B81CF63CAE14A786EDD10FEF282D83A5044237AC8CB85FE434C20234BB35D461B8A578548214667B45FB34E1
3,339,637 UART: [art] SIG.R = AC71BF840006B43EC9BC0133EA1A5942855E4207A1E29FDC2775D9E3799486660B2B4F9E2FB0F4838AFCFAFB7D621A9A
3,346,385 UART: [art] SIG.S = ADE15F7D53D405BCFE3708ED12284BE42B18A69C88FFC7F815ED79DDA0D2AB8B8861E7A55507F4CE9A44907F396DC382
3,370,914 UART: Caliptra RT
3,371,165 UART: [state] CFI Enabled
3,491,760 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,144 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,955 UART: [state] LifecycleState = Unprovisioned
85,610 UART: [state] DebugLocked = No
86,094 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,680 UART: [kat] SHA2-256
881,611 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,726 UART: [kat] ++
885,878 UART: [kat] sha1
890,094 UART: [kat] SHA2-256
892,032 UART: [kat] SHA2-384
894,777 UART: [kat] SHA2-512-ACC
896,678 UART: [kat] ECC-384
902,563 UART: [kat] HMAC-384Kdf
907,297 UART: [kat] LMS
1,475,493 UART: [kat] --
1,476,358 UART: [cold-reset] ++
1,476,842 UART: [fht] Storing FHT @ 0x50003400
1,479,721 UART: [idev] ++
1,479,889 UART: [idev] CDI.KEYID = 6
1,480,249 UART: [idev] SUBJECT.KEYID = 7
1,480,673 UART: [idev] UDS.KEYID = 0
1,481,018 ready_for_fw is high
1,481,018 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,001 UART: [idev] Erasing UDS.KEYID = 0
1,505,785 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,395 UART: [idev] --
1,515,584 UART: [ldev] ++
1,515,752 UART: [ldev] CDI.KEYID = 6
1,516,115 UART: [ldev] SUBJECT.KEYID = 5
1,516,541 UART: [ldev] AUTHORITY.KEYID = 7
1,517,004 UART: [ldev] FE.KEYID = 1
1,522,338 UART: [ldev] Erasing FE.KEYID = 1
1,547,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,773 UART: [ldev] --
1,587,174 UART: [fwproc] Waiting for Commands...
1,587,921 UART: [fwproc] Received command 0x46574c44
1,588,712 UART: [fwproc] Received Image of size 119428 bytes
2,944,416 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,210 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,428 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,183 >>> mbox cmd response: success
3,144,183 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,145,209 UART: [afmc] ++
3,145,377 UART: [afmc] CDI.KEYID = 6
3,145,739 UART: [afmc] SUBJECT.KEYID = 7
3,146,164 UART: [afmc] AUTHORITY.KEYID = 5
3,181,443 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,821 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,601 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,310 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,193 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,876 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,922 UART: [afmc] --
3,225,054 UART: [cold-reset] --
3,225,850 UART: [state] Locking Datavault
3,226,985 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,589 UART: [state] Locking ICCM
3,228,157 UART: [exit] Launching FMC @ 0x40000130
3,233,487 UART:
3,233,503 UART: Running Caliptra FMC ...
3,233,911 UART:
3,234,054 UART: [state] CFI Enabled
3,244,814 UART: [fht] FMC Alias Private Key: 7
3,364,116 UART: [art] Extend RT PCRs Done
3,364,544 UART: [art] Lock RT PCRs Done
3,366,136 UART: [art] Populate DV Done
3,374,351 UART: [fht] FMC Alias Private Key: 7
3,375,327 UART: [art] Derive CDI
3,375,607 UART: [art] Store in slot 0x4
3,461,307 UART: [art] Derive Key Pair
3,461,667 UART: [art] Store priv key in slot 0x5
3,475,114 UART: [art] Derive Key Pair - Done
3,489,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,620 UART: [art] PUB.X = 13B0A37B4332401139F1D6AF91CF1A45F13161F38C30FE315981023CE0FD049061932C08B2E1783D5C73AFFD572ACD3A
3,512,383 UART: [art] PUB.Y = B4EEE839CC828CB2CF4539CAC7144A3AF7BBEA38753FF8B6FDFF35F4CC94A765D73CDD1B605B77CFA8BD9BA5B4599AB4
3,519,365 UART: [art] SIG.R = 7E8F2285A334C3140026A197F04F59BEBAA7603006D685FD12FC9EE78162C1E5D93FE23FCAAB224B16DB1C82F322FCB7
3,526,122 UART: [art] SIG.S = 6E6591EA0FBF6BD2994142F4475F578FB7BDFB9CFAC855E414B5770272D2AC9264023FF5C6760E15F2397A389C23E838
3,550,254 UART: Caliptra RT
3,550,597 UART: [state] CFI Enabled
3,671,246 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,864 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,526 ready_for_fw is high
1,362,526 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,291 >>> mbox cmd response: success
2,993,291 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,054,394 UART:
3,054,410 UART: Running Caliptra FMC ...
3,054,818 UART:
3,054,961 UART: [state] CFI Enabled
3,065,187 UART: [fht] FMC Alias Private Key: 7
3,183,839 UART: [art] Extend RT PCRs Done
3,184,267 UART: [art] Lock RT PCRs Done
3,185,487 UART: [art] Populate DV Done
3,193,598 UART: [fht] FMC Alias Private Key: 7
3,194,620 UART: [art] Derive CDI
3,194,900 UART: [art] Store in slot 0x4
3,280,654 UART: [art] Derive Key Pair
3,281,014 UART: [art] Store priv key in slot 0x5
3,294,033 UART: [art] Derive Key Pair - Done
3,308,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,362 UART: [art] PUB.X = 3AE70F6D71526F991F50E5B394BA963AABD47494F7D723B3970B195417403D6601893C2F93059BD2B55F2DD58DF7B03F
3,332,120 UART: [art] PUB.Y = 0692BA2EF52C13A0FE4AA31949EFBECCCBCF734B5FF1C13844C77182A0C063887C5AAE171B267929602E9719EAD52E9B
3,339,081 UART: [art] SIG.R = C210052BE12A72CB8FC8942E0E820A1A83D41BEBF05DC3A13996F0A50C3DF8C96B7EF0A5DBA1B24B37F7B02490494C3D
3,345,855 UART: [art] SIG.S = 742F9E867E77019DE330911BF1E95D367F68EFA18F05A0F6DE9240B967AACF71E99BF917FCB58535634E899953CB6E7E
3,369,833 UART: Caliptra RT
3,370,176 UART: [state] CFI Enabled
3,490,978 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,520 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,732 UART: [state] LifecycleState = Unprovisioned
85,387 UART: [state] DebugLocked = No
85,939 UART: [state] WD Timer not started. Device not locked for debugging
87,232 UART: [kat] SHA2-256
890,782 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,886 UART: [kat] ++
895,038 UART: [kat] sha1
899,128 UART: [kat] SHA2-256
901,068 UART: [kat] SHA2-384
903,859 UART: [kat] SHA2-512-ACC
905,760 UART: [kat] ECC-384
915,595 UART: [kat] HMAC-384Kdf
920,105 UART: [kat] LMS
1,168,417 UART: [kat] --
1,169,370 UART: [cold-reset] ++
1,169,712 UART: [fht] FHT @ 0x50003400
1,172,268 UART: [idev] ++
1,172,436 UART: [idev] CDI.KEYID = 6
1,172,797 UART: [idev] SUBJECT.KEYID = 7
1,173,222 UART: [idev] UDS.KEYID = 0
1,173,568 ready_for_fw is high
1,173,568 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,345 UART: [idev] Erasing UDS.KEYID = 0
1,198,593 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,682 UART: [ldev] ++
1,208,850 UART: [ldev] CDI.KEYID = 6
1,209,214 UART: [ldev] SUBJECT.KEYID = 5
1,209,641 UART: [ldev] AUTHORITY.KEYID = 7
1,210,104 UART: [ldev] FE.KEYID = 1
1,215,374 UART: [ldev] Erasing FE.KEYID = 1
1,241,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,222 UART: [ldev] --
1,280,559 UART: [fwproc] Wait for Commands...
1,281,354 UART: [fwproc] Recv command 0x46574c44
1,282,087 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,167 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,342 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,925 >>> mbox cmd response: success
2,836,925 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,838,013 UART: [afmc] ++
2,838,181 UART: [afmc] CDI.KEYID = 6
2,838,544 UART: [afmc] SUBJECT.KEYID = 7
2,838,970 UART: [afmc] AUTHORITY.KEYID = 5
2,874,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,920 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,669 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,379 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,260 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,961 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,618 UART: [afmc] --
2,917,499 UART: [cold-reset] --
2,918,449 UART: [state] Locking Datavault
2,919,896 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,500 UART: [state] Locking ICCM
2,920,980 UART: [exit] Launching FMC @ 0x40000130
2,926,310 UART:
2,926,326 UART: Running Caliptra FMC ...
2,926,734 UART:
2,926,788 UART: [state] CFI Enabled
2,937,592 UART: [fht] FMC Alias Private Key: 7
3,056,282 UART: [art] Extend RT PCRs Done
3,056,710 UART: [art] Lock RT PCRs Done
3,058,164 UART: [art] Populate DV Done
3,066,323 UART: [fht] FMC Alias Private Key: 7
3,067,341 UART: [art] Derive CDI
3,067,621 UART: [art] Store in slot 0x4
3,153,690 UART: [art] Derive Key Pair
3,154,050 UART: [art] Store priv key in slot 0x5
3,167,706 UART: [art] Derive Key Pair - Done
3,182,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,889 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,654 UART: [art] PUB.X = 72BD4606C701CB16B66A3B171D0CAC352E51D78EE8A83425E531BA6834819FF622893E3E6BC3F976B318D66995273578
3,205,411 UART: [art] PUB.Y = FB805E2EF4EAEDC45FA3CA7C26B07CDDF74C70873865D3B04B11D3F7392F14E5B796F73F3F6F813C1570B93FDE6063DC
3,212,379 UART: [art] SIG.R = 38B3AF70F072286728A58B44E8096BF79167F166E5D848F36CD1B581B86CD76CE9F859D84D84F30F5F78387C8FB2141F
3,219,143 UART: [art] SIG.S = 15D1FBB1F9FBDC8384FDDD7425FE7EA5C8E51BF4A885FF523500FF4596112B975E3BD03AE6C7E55996E167399EF15E5D
3,242,781 UART: Caliptra RT
3,243,032 UART: [state] CFI Enabled
3,362,554 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,890 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,046 ready_for_fw is high
1,059,046 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,046 >>> mbox cmd response: success
2,690,046 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,751,387 UART:
2,751,403 UART: Running Caliptra FMC ...
2,751,811 UART:
2,751,865 UART: [state] CFI Enabled
2,762,009 UART: [fht] FMC Alias Private Key: 7
2,880,953 UART: [art] Extend RT PCRs Done
2,881,381 UART: [art] Lock RT PCRs Done
2,882,809 UART: [art] Populate DV Done
2,891,278 UART: [fht] FMC Alias Private Key: 7
2,892,416 UART: [art] Derive CDI
2,892,696 UART: [art] Store in slot 0x4
2,978,561 UART: [art] Derive Key Pair
2,978,921 UART: [art] Store priv key in slot 0x5
2,992,331 UART: [art] Derive Key Pair - Done
3,007,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,427 UART: [art] PUB.X = D650597D63D735983BD0FBD3BF29A837C93D1BF00A355266E8CF6C85FA43DBDC70AABB982396B7E9C7A69AD93EC4CA3A
3,030,214 UART: [art] PUB.Y = B933D319F26DDD1035B64F32583EDFCC47897C4B439B39BDF62A6081268BABC88425ED2F7003DB357D8399A5DC48C46E
3,037,169 UART: [art] SIG.R = 6F752F358B0E1C8B02434F60EDA86E35EE4FB7CBBAF8EB1DC96BF3F408D815BBC42CDACADAC21F20CB269388BBFA3A6A
3,043,964 UART: [art] SIG.S = 9662BC3372A3B1917D686D65C737C98C941BEFF352BFBCAD439F9521E0C0E915D7B35FBB1582487F479701D6200E6686
3,068,014 UART: Caliptra RT
3,068,265 UART: [state] CFI Enabled
3,187,912 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,216 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,841 UART: [state] LifecycleState = Unprovisioned
86,496 UART: [state] DebugLocked = No
87,158 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [kat] SHA2-256
891,857 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,961 UART: [kat] ++
896,113 UART: [kat] sha1
900,341 UART: [kat] SHA2-256
902,281 UART: [kat] SHA2-384
905,106 UART: [kat] SHA2-512-ACC
907,007 UART: [kat] ECC-384
917,356 UART: [kat] HMAC-384Kdf
922,028 UART: [kat] LMS
1,170,340 UART: [kat] --
1,171,245 UART: [cold-reset] ++
1,171,767 UART: [fht] FHT @ 0x50003400
1,174,371 UART: [idev] ++
1,174,539 UART: [idev] CDI.KEYID = 6
1,174,900 UART: [idev] SUBJECT.KEYID = 7
1,175,325 UART: [idev] UDS.KEYID = 0
1,175,671 ready_for_fw is high
1,175,671 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,618 UART: [idev] Erasing UDS.KEYID = 0
1,200,800 UART: [idev] Sha1 KeyId Algorithm
1,209,692 UART: [idev] --
1,210,767 UART: [ldev] ++
1,210,935 UART: [ldev] CDI.KEYID = 6
1,211,299 UART: [ldev] SUBJECT.KEYID = 5
1,211,726 UART: [ldev] AUTHORITY.KEYID = 7
1,212,189 UART: [ldev] FE.KEYID = 1
1,217,461 UART: [ldev] Erasing FE.KEYID = 1
1,243,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,099 UART: [ldev] --
1,282,346 UART: [fwproc] Wait for Commands...
1,283,025 UART: [fwproc] Recv command 0x46574c44
1,283,758 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,830 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,005 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,726 >>> mbox cmd response: success
2,838,726 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,839,948 UART: [afmc] ++
2,840,116 UART: [afmc] CDI.KEYID = 6
2,840,479 UART: [afmc] SUBJECT.KEYID = 7
2,840,905 UART: [afmc] AUTHORITY.KEYID = 5
2,875,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,146 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,856 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,737 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,438 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,151 UART: [afmc] --
2,919,206 UART: [cold-reset] --
2,920,234 UART: [state] Locking Datavault
2,921,597 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,201 UART: [state] Locking ICCM
2,922,753 UART: [exit] Launching FMC @ 0x40000130
2,928,083 UART:
2,928,099 UART: Running Caliptra FMC ...
2,928,507 UART:
2,928,650 UART: [state] CFI Enabled
2,939,212 UART: [fht] FMC Alias Private Key: 7
3,059,000 UART: [art] Extend RT PCRs Done
3,059,428 UART: [art] Lock RT PCRs Done
3,061,282 UART: [art] Populate DV Done
3,069,621 UART: [fht] FMC Alias Private Key: 7
3,070,601 UART: [art] Derive CDI
3,070,881 UART: [art] Store in slot 0x4
3,156,928 UART: [art] Derive Key Pair
3,157,288 UART: [art] Store priv key in slot 0x5
3,170,906 UART: [art] Derive Key Pair - Done
3,185,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,176 UART: [art] PUB.X = 51F43CAD518ACA68B5B696126ADB6BD108C59B1AF612F40A2869B0ABB5BC7A18EECB6D859CBD4759F7B61EBBA4B5394A
3,208,964 UART: [art] PUB.Y = 5F8344B38BCA9F7E339EDF89661F40DC4BBAAAF7122BE4A6BFB8B02B6D53A078F836E2B3DBC21B9C64A5E03AADEB84D4
3,215,942 UART: [art] SIG.R = 7B7059E955D67FB16B128648E56EA01974C8D53C953DCA813B32B4C71C53F26A8CC94713AFF849772BF9471A25DE75A2
3,222,714 UART: [art] SIG.S = CE8F347758DD159D989E4227E34B6FC4F1299B48C7D7C3E254B09009A7FDCF6FF606EF3BBC2CC6B6AF8D5A36F82D2C39
3,246,390 UART: Caliptra RT
3,246,733 UART: [state] CFI Enabled
3,366,542 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,826 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,507 ready_for_fw is high
1,059,507 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,483 >>> mbox cmd response: success
2,690,483 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,752,852 UART:
2,752,868 UART: Running Caliptra FMC ...
2,753,276 UART:
2,753,419 UART: [state] CFI Enabled
2,764,135 UART: [fht] FMC Alias Private Key: 7
2,882,251 UART: [art] Extend RT PCRs Done
2,882,679 UART: [art] Lock RT PCRs Done
2,884,473 UART: [art] Populate DV Done
2,892,824 UART: [fht] FMC Alias Private Key: 7
2,893,984 UART: [art] Derive CDI
2,894,264 UART: [art] Store in slot 0x4
2,980,323 UART: [art] Derive Key Pair
2,980,683 UART: [art] Store priv key in slot 0x5
2,994,431 UART: [art] Derive Key Pair - Done
3,009,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,663 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,428 UART: [art] PUB.X = 30B8AB3407D64C859B4B3356BC3AD0D0F409C4553E208AB61CD7BFF6AAC858450C8DF03605D74290435BB2A3F25DB034
3,032,194 UART: [art] PUB.Y = 49C99093E3E9E1864DB953E3E6099F5438537566147C8796B15A0041129268A1AAE67DAFC9108DE90333FE8985C62C40
3,039,106 UART: [art] SIG.R = 8107642C9BC656B867866B06E2479AFAB43CCBD460EFF11677532314A68ED2FA9975E1C59B85DF74B636A74E0AEF0F1B
3,045,872 UART: [art] SIG.S = A41A4043F671FBFD3D313DF7B42E50AD4DE60BDE36A6C06B24DFAF15192505648FB4F734E6E4B8116C9F421E4A519F8A
3,069,620 UART: Caliptra RT
3,069,963 UART: [state] CFI Enabled
3,190,355 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,165 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
893,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,355 UART: [kat] ++
897,507 UART: [kat] sha1
901,849 UART: [kat] SHA2-256
903,789 UART: [kat] SHA2-384
906,334 UART: [kat] SHA2-512-ACC
908,235 UART: [kat] ECC-384
918,330 UART: [kat] HMAC-384Kdf
923,164 UART: [kat] LMS
1,171,492 UART: [kat] --
1,172,095 UART: [cold-reset] ++
1,172,579 UART: [fht] FHT @ 0x50003400
1,175,124 UART: [idev] ++
1,175,292 UART: [idev] CDI.KEYID = 6
1,175,652 UART: [idev] SUBJECT.KEYID = 7
1,176,076 UART: [idev] UDS.KEYID = 0
1,176,421 ready_for_fw is high
1,176,421 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,018 UART: [idev] Erasing UDS.KEYID = 0
1,201,589 UART: [idev] Sha1 KeyId Algorithm
1,209,867 UART: [idev] --
1,210,887 UART: [ldev] ++
1,211,055 UART: [ldev] CDI.KEYID = 6
1,211,418 UART: [ldev] SUBJECT.KEYID = 5
1,211,844 UART: [ldev] AUTHORITY.KEYID = 7
1,212,307 UART: [ldev] FE.KEYID = 1
1,217,307 UART: [ldev] Erasing FE.KEYID = 1
1,243,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,597 UART: [ldev] --
1,282,996 UART: [fwproc] Wait for Commands...
1,283,682 UART: [fwproc] Recv command 0x46574c44
1,284,410 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,668 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,838 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,333 >>> mbox cmd response: success
2,839,333 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,840,435 UART: [afmc] ++
2,840,603 UART: [afmc] CDI.KEYID = 6
2,840,965 UART: [afmc] SUBJECT.KEYID = 7
2,841,390 UART: [afmc] AUTHORITY.KEYID = 5
2,876,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,658 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,367 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,250 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,951 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,795 UART: [afmc] --
2,919,877 UART: [cold-reset] --
2,920,763 UART: [state] Locking Datavault
2,922,032 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,636 UART: [state] Locking ICCM
2,923,278 UART: [exit] Launching FMC @ 0x40000130
2,928,608 UART:
2,928,624 UART: Running Caliptra FMC ...
2,929,032 UART:
2,929,086 UART: [state] CFI Enabled
2,939,982 UART: [fht] FMC Alias Private Key: 7
3,059,466 UART: [art] Extend RT PCRs Done
3,059,894 UART: [art] Lock RT PCRs Done
3,061,432 UART: [art] Populate DV Done
3,069,743 UART: [fht] FMC Alias Private Key: 7
3,070,753 UART: [art] Derive CDI
3,071,033 UART: [art] Store in slot 0x4
3,156,906 UART: [art] Derive Key Pair
3,157,266 UART: [art] Store priv key in slot 0x5
3,170,458 UART: [art] Derive Key Pair - Done
3,184,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,459 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,224 UART: [art] PUB.X = 4667DF77F7927D41F348489783AA7BF36238B129229FCE758EFC392EBBED62BECFE8DDB2D8DDD4016D743ED606E00B21
3,207,999 UART: [art] PUB.Y = D213C9859C0DECBD4C82AED61FEDCCB34AE540F52FD171D855225FF3C794B01D834C069EB4927CF65C554325C5B683DE
3,214,959 UART: [art] SIG.R = 1BBDA783C65C2447B002517C5C65F97E3B462EAA56F994A903527D9925C75A2E1E5B3FD844882BBF1A177979CB27E910
3,221,725 UART: [art] SIG.S = 6F44E67C38C7EDCFBD88BFA002CB3C41B5EFD78CC0AE481E13234F0B88F50973BDAC810E4342D832218511D22FD29348
3,245,155 UART: Caliptra RT
3,245,406 UART: [state] CFI Enabled
3,364,694 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,300 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,805 ready_for_fw is high
1,060,805 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,054 >>> mbox cmd response: success
2,692,054 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,753,699 UART:
2,753,715 UART: Running Caliptra FMC ...
2,754,123 UART:
2,754,177 UART: [state] CFI Enabled
2,764,555 UART: [fht] FMC Alias Private Key: 7
2,884,161 UART: [art] Extend RT PCRs Done
2,884,589 UART: [art] Lock RT PCRs Done
2,886,123 UART: [art] Populate DV Done
2,894,396 UART: [fht] FMC Alias Private Key: 7
2,895,446 UART: [art] Derive CDI
2,895,726 UART: [art] Store in slot 0x4
2,981,611 UART: [art] Derive Key Pair
2,981,971 UART: [art] Store priv key in slot 0x5
2,996,131 UART: [art] Derive Key Pair - Done
3,011,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,142 UART: [art] PUB.X = 0D9C53A61E0D2AE55AF73FCB4E3E6073B8052AB77B5242F2B1278DA9CD469AD6A954D362CE9461F9FB37531E0B71B6EA
3,033,914 UART: [art] PUB.Y = 53191185704EA8DA0FDCEC35E1FAB48CB475843268CD4C272B1EEC0227B7671327A0B96C0916100C006D4C5323E5ECF7
3,040,834 UART: [art] SIG.R = C17C6DD03460A3308FB709FCCE553954B8B4614339C4275B0AB8BB9C55963E9D10759957D80DAAA214169CFF9EC2EA66
3,047,601 UART: [art] SIG.S = 3397059CAD87922624DC51D1E23B01D3BE079CE55E7C8168CC53F68616088EB14386FADD70C48DBFEC6542E395D6F5B0
3,071,621 UART: Caliptra RT
3,071,872 UART: [state] CFI Enabled
3,191,719 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,201 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,891 UART: [state] LifecycleState = Unprovisioned
85,546 UART: [state] DebugLocked = No
86,208 UART: [state] WD Timer not started. Device not locked for debugging
87,477 UART: [kat] SHA2-256
893,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,252 UART: [kat] ++
897,404 UART: [kat] sha1
901,552 UART: [kat] SHA2-256
903,492 UART: [kat] SHA2-384
906,039 UART: [kat] SHA2-512-ACC
907,940 UART: [kat] ECC-384
917,473 UART: [kat] HMAC-384Kdf
922,097 UART: [kat] LMS
1,170,425 UART: [kat] --
1,171,302 UART: [cold-reset] ++
1,171,828 UART: [fht] FHT @ 0x50003400
1,174,403 UART: [idev] ++
1,174,571 UART: [idev] CDI.KEYID = 6
1,174,931 UART: [idev] SUBJECT.KEYID = 7
1,175,355 UART: [idev] UDS.KEYID = 0
1,175,700 ready_for_fw is high
1,175,700 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,365 UART: [idev] Erasing UDS.KEYID = 0
1,200,318 UART: [idev] Sha1 KeyId Algorithm
1,208,944 UART: [idev] --
1,210,042 UART: [ldev] ++
1,210,210 UART: [ldev] CDI.KEYID = 6
1,210,573 UART: [ldev] SUBJECT.KEYID = 5
1,210,999 UART: [ldev] AUTHORITY.KEYID = 7
1,211,462 UART: [ldev] FE.KEYID = 1
1,216,774 UART: [ldev] Erasing FE.KEYID = 1
1,243,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,626 UART: [ldev] --
1,281,991 UART: [fwproc] Wait for Commands...
1,282,649 UART: [fwproc] Recv command 0x46574c44
1,283,377 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,329 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,499 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,976 >>> mbox cmd response: success
2,838,976 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,839,992 UART: [afmc] ++
2,840,160 UART: [afmc] CDI.KEYID = 6
2,840,522 UART: [afmc] SUBJECT.KEYID = 7
2,840,947 UART: [afmc] AUTHORITY.KEYID = 5
2,876,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,815 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,524 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,407 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,108 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,870 UART: [afmc] --
2,919,782 UART: [cold-reset] --
2,920,754 UART: [state] Locking Datavault
2,921,911 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,515 UART: [state] Locking ICCM
2,922,959 UART: [exit] Launching FMC @ 0x40000130
2,928,289 UART:
2,928,305 UART: Running Caliptra FMC ...
2,928,713 UART:
2,928,856 UART: [state] CFI Enabled
2,939,568 UART: [fht] FMC Alias Private Key: 7
3,059,096 UART: [art] Extend RT PCRs Done
3,059,524 UART: [art] Lock RT PCRs Done
3,061,572 UART: [art] Populate DV Done
3,069,663 UART: [fht] FMC Alias Private Key: 7
3,070,805 UART: [art] Derive CDI
3,071,085 UART: [art] Store in slot 0x4
3,156,784 UART: [art] Derive Key Pair
3,157,144 UART: [art] Store priv key in slot 0x5
3,170,428 UART: [art] Derive Key Pair - Done
3,185,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,528 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,293 UART: [art] PUB.X = 90FDB826A589054DCDEE4B416E911FF646B2727AA44C8BB864515E4BDD43654CC8A677677F38840B3EC58E5D309FCEED
3,208,069 UART: [art] PUB.Y = A9FF0DFD20095AFE3460B40EEE23099707A6FDA89C691CC9F2217758973619D82F47A554AB557DD43CBA2EAD1D7759B7
3,215,014 UART: [art] SIG.R = 23BC142D8131D5A0005E4DB916D90A2F41BE3C8B8EFE7467B6D094E92661DCDD6306F8960C5471F4CA28979EFACD8773
3,221,761 UART: [art] SIG.S = 6F60E012CDDCCE6AC655D421443BCB37A59571CCEA096DC710B4F854AEB8196A9F31A0EB0BD9A10287C8DA3C9009E79A
3,245,045 UART: Caliptra RT
3,245,388 UART: [state] CFI Enabled
3,364,586 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,146 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,616 ready_for_fw is high
1,060,616 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,137 >>> mbox cmd response: success
2,690,137 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,752,456 UART:
2,752,472 UART: Running Caliptra FMC ...
2,752,880 UART:
2,753,023 UART: [state] CFI Enabled
2,763,659 UART: [fht] FMC Alias Private Key: 7
2,882,911 UART: [art] Extend RT PCRs Done
2,883,339 UART: [art] Lock RT PCRs Done
2,884,939 UART: [art] Populate DV Done
2,893,236 UART: [fht] FMC Alias Private Key: 7
2,894,218 UART: [art] Derive CDI
2,894,498 UART: [art] Store in slot 0x4
2,980,185 UART: [art] Derive Key Pair
2,980,545 UART: [art] Store priv key in slot 0x5
2,993,835 UART: [art] Derive Key Pair - Done
3,008,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,008 UART: [art] PUB.X = 3C949F1F48ECEC991D88D7A93DA1F17205454A1B80E4DDEC52D6C3A5EA11F00350BD8953AB3D86E469A09D3C418730DC
3,031,784 UART: [art] PUB.Y = 94A3C81084527E72144F294A4DC404E847D0D5F367B673A24D12C92D6F7851B9B499EF307AFD37011F15A0E38FEED87D
3,038,730 UART: [art] SIG.R = 87B33023CF695D21E4E3F6ED0773F6341FA127C3BDC862B48937C30C8983BCFDAB6BE8D7A734909B98F1D5E1593D2E28
3,045,502 UART: [art] SIG.S = 36F3B2DA6DC6A931C7488C83382A7357C0B894406ED2B691EB5227A43B0FFED1379C0F1F23A9D74C61284783000FCF0C
3,069,302 UART: Caliptra RT
3,069,645 UART: [state] CFI Enabled
3,189,966 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,816 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.28s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
191,999 UART:
192,353 UART: Running Caliptra ROM ...
193,559 UART:
193,719 UART: [state] CFI Enabled
265,389 UART: [state] LifecycleState = Unprovisioned
267,282 UART: [state] DebugLocked = No
270,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,997 UART: [kat] SHA2-256
444,694 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,183 UART: [kat] ++
455,662 UART: [kat] sha1
467,601 UART: [kat] SHA2-256
470,253 UART: [kat] SHA2-384
474,822 UART: [kat] SHA2-512-ACC
477,186 UART: [kat] ECC-384
2,765,632 UART: [kat] HMAC-384Kdf
2,779,241 UART: [kat] LMS
3,969,593 UART: [kat] --
3,972,857 UART: [cold-reset] ++
3,974,110 UART: [fht] Storing FHT @ 0x50003400
3,986,729 UART: [idev] ++
3,987,291 UART: [idev] CDI.KEYID = 6
3,988,323 UART: [idev] SUBJECT.KEYID = 7
3,989,493 UART: [idev] UDS.KEYID = 0
3,990,574 ready_for_fw is high
3,990,781 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
4,013,566 UART: [idev] Erasing UDS.KEYID = 0
7,324,231 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,480 UART: [idev] --
7,349,837 UART: [ldev] ++
7,350,420 UART: [ldev] CDI.KEYID = 6
7,351,383 UART: [ldev] SUBJECT.KEYID = 5
7,352,596 UART: [ldev] AUTHORITY.KEYID = 7
7,353,825 UART: [ldev] FE.KEYID = 1
7,400,133 UART: [ldev] Erasing FE.KEYID = 1
10,735,047 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,984 UART: [ldev] --
13,114,526 UART: [fwproc] Waiting for Commands...
13,117,809 UART: [fwproc] Received command 0x46574c44
13,120,041 UART: [fwproc] Received Image of size 9084 bytes
15,889,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
15,961,207 UART: [fwproc] Loading FMC at address 0x40000000 len 64
15,964,334 UART: [fwproc] Loading Runtime at address 0x40005000 len 3136
15,979,726 >>> mbox cmd response: success
15,983,689 UART: [afmc] ++
15,984,277 UART: [afmc] CDI.KEYID = 6
15,985,208 UART: [afmc] SUBJECT.KEYID = 7
15,986,428 UART: [afmc] AUTHORITY.KEYID = 5
19,347,967 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,644,729 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,646,982 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,661,512 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,676,306 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,690,710 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,711,264 UART: [afmc] --
21,715,717 UART: [cold-reset] --
21,720,387 UART: [state] Locking Datavault
21,726,226 UART: [state] Locking PCR0, PCR1 and PCR31
21,727,922 UART: [state] Locking ICCM
21,730,612 UART: [exit] Launching FMC @ 0x40000000
21,739,008 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,744,255 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,788,054 ready_for_fw is high
3,788,520 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
15,740,832 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,548 writing to cptra_bootfsm_go
192,649 UART:
193,011 UART: Running Caliptra ROM ...
194,200 UART:
603,856 UART: [state] CFI Enabled
617,804 UART: [state] LifecycleState = Unprovisioned
619,801 UART: [state] DebugLocked = No
621,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,517 UART: [kat] SHA2-256
796,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,781 UART: [kat] ++
807,335 UART: [kat] sha1
818,498 UART: [kat] SHA2-256
821,199 UART: [kat] SHA2-384
826,236 UART: [kat] SHA2-512-ACC
828,611 UART: [kat] ECC-384
3,111,949 UART: [kat] HMAC-384Kdf
3,122,616 UART: [kat] LMS
4,312,770 UART: [kat] --
4,319,315 UART: [cold-reset] ++
4,320,397 UART: [fht] Storing FHT @ 0x50003400
4,332,158 UART: [idev] ++
4,332,721 UART: [idev] CDI.KEYID = 6
4,333,695 UART: [idev] SUBJECT.KEYID = 7
4,334,935 UART: [idev] UDS.KEYID = 0
4,335,993 ready_for_fw is high
4,336,215 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
4,351,376 UART: [idev] Erasing UDS.KEYID = 0
7,623,618 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,882 UART: [idev] --
7,650,680 UART: [ldev] ++
7,651,305 UART: [ldev] CDI.KEYID = 6
7,652,213 UART: [ldev] SUBJECT.KEYID = 5
7,653,425 UART: [ldev] AUTHORITY.KEYID = 7
7,654,707 UART: [ldev] FE.KEYID = 1
7,663,406 UART: [ldev] Erasing FE.KEYID = 1
10,952,411 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,521 UART: [ldev] --
13,313,196 UART: [fwproc] Waiting for Commands...
13,316,260 UART: [fwproc] Received command 0x46574c44
13,318,441 UART: [fwproc] Received Image of size 9084 bytes
16,099,289 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,175,850 UART: [fwproc] Loading FMC at address 0x40000000 len 64
16,178,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 3136
16,194,646 >>> mbox cmd response: success
16,199,612 UART: [afmc] ++
16,200,189 UART: [afmc] CDI.KEYID = 6
16,201,201 UART: [afmc] SUBJECT.KEYID = 7
16,202,355 UART: [afmc] AUTHORITY.KEYID = 5
19,519,743 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,813,695 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,815,961 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,830,401 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,845,257 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,859,626 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,880,907 UART: [afmc] --
21,884,619 UART: [cold-reset] --
21,888,550 UART: [state] Locking Datavault
21,894,442 UART: [state] Locking PCR0, PCR1 and PCR31
21,896,197 UART: [state] Locking ICCM
21,898,049 UART: [exit] Launching FMC @ 0x40000000
21,906,442 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,911,805 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
4,124,403 ready_for_fw is high
4,124,921 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
15,932,252 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,091 UART:
192,462 UART: Running Caliptra ROM ...
193,654 UART:
193,808 UART: [state] CFI Enabled
267,172 UART: [state] LifecycleState = Unprovisioned
269,174 UART: [state] DebugLocked = No
271,492 UART: [state] WD Timer not started. Device not locked for debugging
275,884 UART: [kat] SHA2-256
455,588 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,326 UART: [kat] ++
466,807 UART: [kat] sha1
476,552 UART: [kat] SHA2-256
479,279 UART: [kat] SHA2-384
484,653 UART: [kat] SHA2-512-ACC
487,025 UART: [kat] ECC-384
2,952,918 UART: [kat] HMAC-384Kdf
2,973,606 UART: [kat] LMS
3,450,071 UART: [kat] --
3,455,065 UART: [cold-reset] ++
3,456,645 UART: [fht] FHT @ 0x50003400
3,468,337 UART: [idev] ++
3,468,902 UART: [idev] CDI.KEYID = 6
3,469,857 UART: [idev] SUBJECT.KEYID = 7
3,471,103 UART: [idev] UDS.KEYID = 0
3,472,001 ready_for_fw is high
3,472,207 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
3,504,295 UART: [idev] Erasing UDS.KEYID = 0
5,993,166 UART: [idev] Sha1 KeyId Algorithm
6,017,200 UART: [idev] --
6,022,574 UART: [ldev] ++
6,023,150 UART: [ldev] CDI.KEYID = 6
6,024,037 UART: [ldev] SUBJECT.KEYID = 5
6,025,314 UART: [ldev] AUTHORITY.KEYID = 7
6,026,553 UART: [ldev] FE.KEYID = 1
6,060,499 UART: [ldev] Erasing FE.KEYID = 1
8,564,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,586 UART: [ldev] --
10,377,643 UART: [fwproc] Wait for Commands...
10,380,080 UART: [fwproc] Recv command 0x46574c44
10,382,072 UART: [fwproc] Recv'd Img size: 9084 bytes
12,518,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,601,608 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,604,526 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
12,618,903 >>> mbox cmd response: success
12,623,153 UART: [afmc] ++
12,623,751 UART: [afmc] CDI.KEYID = 6
12,624,724 UART: [afmc] SUBJECT.KEYID = 7
12,625,890 UART: [afmc] AUTHORITY.KEYID = 5
15,167,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,890,165 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,892,351 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,908,165 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,924,187 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
16,939,743 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
16,963,522 UART: [afmc] --
16,966,420 UART: [cold-reset] --
16,969,798 UART: [state] Locking Datavault
16,977,225 UART: [state] Locking PCR0, PCR1 and PCR31
16,978,928 UART: [state] Locking ICCM
16,979,996 UART: [exit] Launching FMC @ 0x40000000
16,988,395 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
16,993,563 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,461,705 ready_for_fw is high
3,462,249 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
12,441,615 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,383 UART:
192,737 UART: Running Caliptra ROM ...
193,934 UART:
603,756 UART: [state] CFI Enabled
617,111 UART: [state] LifecycleState = Unprovisioned
619,129 UART: [state] DebugLocked = No
621,684 UART: [state] WD Timer not started. Device not locked for debugging
625,801 UART: [kat] SHA2-256
805,420 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,218 UART: [kat] ++
816,698 UART: [kat] sha1
828,571 UART: [kat] SHA2-256
831,248 UART: [kat] SHA2-384
836,252 UART: [kat] SHA2-512-ACC
838,623 UART: [kat] ECC-384
3,281,619 UART: [kat] HMAC-384Kdf
3,292,497 UART: [kat] LMS
3,769,028 UART: [kat] --
3,773,521 UART: [cold-reset] ++
3,774,600 UART: [fht] FHT @ 0x50003400
3,785,723 UART: [idev] ++
3,786,289 UART: [idev] CDI.KEYID = 6
3,787,324 UART: [idev] SUBJECT.KEYID = 7
3,788,502 UART: [idev] UDS.KEYID = 0
3,789,427 ready_for_fw is high
3,789,635 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
3,806,435 UART: [idev] Erasing UDS.KEYID = 0
6,268,466 UART: [idev] Sha1 KeyId Algorithm
6,292,589 UART: [idev] --
6,296,823 UART: [ldev] ++
6,297,402 UART: [ldev] CDI.KEYID = 6
6,298,368 UART: [ldev] SUBJECT.KEYID = 5
6,299,533 UART: [ldev] AUTHORITY.KEYID = 7
6,300,823 UART: [ldev] FE.KEYID = 1
6,312,819 UART: [ldev] Erasing FE.KEYID = 1
8,794,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,391 UART: [ldev] --
10,588,006 UART: [fwproc] Wait for Commands...
10,591,185 UART: [fwproc] Recv command 0x46574c44
10,593,181 UART: [fwproc] Recv'd Img size: 9084 bytes
12,730,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,803,991 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,806,915 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
12,822,264 >>> mbox cmd response: success
12,825,993 UART: [afmc] ++
12,826,569 UART: [afmc] CDI.KEYID = 6
12,827,536 UART: [afmc] SUBJECT.KEYID = 7
12,828,757 UART: [afmc] AUTHORITY.KEYID = 5
15,336,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,059,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,062,048 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,077,818 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,093,863 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,109,411 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,134,333 UART: [afmc] --
17,138,579 UART: [cold-reset] --
17,142,839 UART: [state] Locking Datavault
17,148,789 UART: [state] Locking PCR0, PCR1 and PCR31
17,150,544 UART: [state] Locking ICCM
17,152,457 UART: [exit] Launching FMC @ 0x40000000
17,160,858 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,166,019 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,782,663 ready_for_fw is high
3,783,164 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
12,697,766 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,133 UART:
192,485 UART: Running Caliptra ROM ...
193,583 UART:
193,729 UART: [state] CFI Enabled
264,934 UART: [state] LifecycleState = Unprovisioned
267,342 UART: [state] DebugLocked = No
269,932 UART: [state] WD Timer not started. Device not locked for debugging
273,969 UART: [kat] SHA2-256
463,882 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,688 UART: [kat] ++
475,135 UART: [kat] sha1
486,434 UART: [kat] SHA2-256
489,444 UART: [kat] SHA2-384
495,360 UART: [kat] SHA2-512-ACC
497,958 UART: [kat] ECC-384
2,947,436 UART: [kat] HMAC-384Kdf
2,971,089 UART: [kat] LMS
3,502,863 UART: [kat] --
3,507,728 UART: [cold-reset] ++
3,510,301 UART: [fht] FHT @ 0x50003400
3,521,279 UART: [idev] ++
3,521,922 UART: [idev] CDI.KEYID = 6
3,522,915 UART: [idev] SUBJECT.KEYID = 7
3,524,028 UART: [idev] UDS.KEYID = 0
3,525,019 ready_for_fw is high
3,525,223 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
3,542,888 UART: [idev] Erasing UDS.KEYID = 0
6,025,831 UART: [idev] Sha1 KeyId Algorithm
6,049,323 UART: [idev] --
6,053,834 UART: [ldev] ++
6,054,546 UART: [ldev] CDI.KEYID = 6
6,055,459 UART: [ldev] SUBJECT.KEYID = 5
6,056,624 UART: [ldev] AUTHORITY.KEYID = 7
6,057,804 UART: [ldev] FE.KEYID = 1
6,098,269 UART: [ldev] Erasing FE.KEYID = 1
8,608,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,391 UART: [ldev] --
10,413,761 UART: [fwproc] Wait for Commands...
10,416,714 UART: [fwproc] Recv command 0x46574c44
10,419,028 UART: [fwproc] Recv'd Img size: 9084 bytes
12,574,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,649,935 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,653,461 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
12,676,365 >>> mbox cmd response: success
12,680,715 UART: [afmc] ++
12,681,346 UART: [afmc] CDI.KEYID = 6
12,682,590 UART: [afmc] SUBJECT.KEYID = 7
12,684,029 UART: [afmc] AUTHORITY.KEYID = 5
15,231,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,951,843 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,953,755 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,968,818 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,983,988 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
16,999,035 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,024,341 UART: [afmc] --
17,027,153 UART: [cold-reset] --
17,032,598 UART: [state] Locking Datavault
17,037,967 UART: [state] Locking PCR0, PCR1 and PCR31
17,040,186 UART: [state] Locking ICCM
17,041,479 UART: [exit] Launching FMC @ 0x40000000
17,050,217 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,056,249 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,439,538 ready_for_fw is high
3,439,925 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
12,476,719 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
192,307 UART:
192,670 UART: Running Caliptra ROM ...
193,762 UART:
603,594 UART: [state] CFI Enabled
617,690 UART: [state] LifecycleState = Unprovisioned
620,073 UART: [state] DebugLocked = No
622,463 UART: [state] WD Timer not started. Device not locked for debugging
627,724 UART: [kat] SHA2-256
817,558 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,366 UART: [kat] ++
828,971 UART: [kat] sha1
841,528 UART: [kat] SHA2-256
844,583 UART: [kat] SHA2-384
851,009 UART: [kat] SHA2-512-ACC
853,603 UART: [kat] ECC-384
3,297,985 UART: [kat] HMAC-384Kdf
3,311,210 UART: [kat] LMS
3,843,042 UART: [kat] --
3,849,096 UART: [cold-reset] ++
3,850,824 UART: [fht] FHT @ 0x50003400
3,861,875 UART: [idev] ++
3,862,593 UART: [idev] CDI.KEYID = 6
3,863,589 UART: [idev] SUBJECT.KEYID = 7
3,864,773 UART: [idev] UDS.KEYID = 0
3,865,701 ready_for_fw is high
3,865,901 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
3,880,748 UART: [idev] Erasing UDS.KEYID = 0
6,341,666 UART: [idev] Sha1 KeyId Algorithm
6,363,924 UART: [idev] --
6,369,085 UART: [ldev] ++
6,369,776 UART: [ldev] CDI.KEYID = 6
6,370,689 UART: [ldev] SUBJECT.KEYID = 5
6,371,854 UART: [ldev] AUTHORITY.KEYID = 7
6,373,091 UART: [ldev] FE.KEYID = 1
6,385,797 UART: [ldev] Erasing FE.KEYID = 1
8,866,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,801 UART: [ldev] --
10,657,474 UART: [fwproc] Wait for Commands...
10,659,837 UART: [fwproc] Recv command 0x46574c44
10,662,114 UART: [fwproc] Recv'd Img size: 9084 bytes
12,816,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,895,843 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,899,411 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
12,921,946 >>> mbox cmd response: success
12,926,300 UART: [afmc] ++
12,926,938 UART: [afmc] CDI.KEYID = 6
12,928,186 UART: [afmc] SUBJECT.KEYID = 7
12,929,631 UART: [afmc] AUTHORITY.KEYID = 5
15,433,554 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,156,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,158,486 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,173,392 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,188,533 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,203,617 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,227,868 UART: [afmc] --
17,231,809 UART: [cold-reset] --
17,237,140 UART: [state] Locking Datavault
17,241,200 UART: [state] Locking PCR0, PCR1 and PCR31
17,243,420 UART: [state] Locking ICCM
17,246,114 UART: [exit] Launching FMC @ 0x40000000
17,254,800 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,260,845 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,755,224 ready_for_fw is high
3,755,620 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
12,693,766 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,367 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,975 UART: [kat] SHA2-256
881,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,021 UART: [kat] ++
886,173 UART: [kat] sha1
890,253 UART: [kat] SHA2-256
892,191 UART: [kat] SHA2-384
894,992 UART: [kat] SHA2-512-ACC
896,893 UART: [kat] ECC-384
902,464 UART: [kat] HMAC-384Kdf
907,298 UART: [kat] LMS
1,475,494 UART: [kat] --
1,476,419 UART: [cold-reset] ++
1,476,761 UART: [fht] Storing FHT @ 0x50003400
1,479,566 UART: [idev] ++
1,479,734 UART: [idev] CDI.KEYID = 6
1,480,094 UART: [idev] SUBJECT.KEYID = 7
1,480,518 UART: [idev] UDS.KEYID = 0
1,480,863 ready_for_fw is high
1,480,863 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,488,310 UART: [idev] Erasing UDS.KEYID = 0
1,504,668 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,236 UART: [idev] --
1,514,485 UART: [ldev] ++
1,514,653 UART: [ldev] CDI.KEYID = 6
1,515,016 UART: [ldev] SUBJECT.KEYID = 5
1,515,442 UART: [ldev] AUTHORITY.KEYID = 7
1,515,905 UART: [ldev] FE.KEYID = 1
1,521,135 UART: [ldev] Erasing FE.KEYID = 1
1,546,348 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,242 UART: [ldev] --
1,585,537 UART: [fwproc] Waiting for Commands...
1,586,260 UART: [fwproc] Received command 0x46574c44
1,587,051 UART: [fwproc] Received Image of size 9084 bytes
1,677,050 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,704,000 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,705,164 UART: [fwproc] Loading Runtime at address 0x40005000 len 3136
1,711,203 >>> mbox cmd response: success
1,712,399 UART: [afmc] ++
1,712,567 UART: [afmc] CDI.KEYID = 6
1,712,929 UART: [afmc] SUBJECT.KEYID = 7
1,713,354 UART: [afmc] AUTHORITY.KEYID = 5
1,748,886 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,765,250 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,766,030 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,771,751 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,777,646 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,783,358 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,791,241 UART: [afmc] --
1,792,337 UART: [cold-reset] --
1,793,147 UART: [state] Locking Datavault
1,794,310 UART: [state] Locking PCR0, PCR1 and PCR31
1,794,914 UART: [state] Locking ICCM
1,795,508 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,800,803 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,802,686 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,139 ready_for_fw is high
1,362,139 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,563,575 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,108 UART: [kat] SHA2-256
882,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,154 UART: [kat] ++
886,306 UART: [kat] sha1
890,400 UART: [kat] SHA2-256
892,338 UART: [kat] SHA2-384
895,179 UART: [kat] SHA2-512-ACC
897,080 UART: [kat] ECC-384
903,091 UART: [kat] HMAC-384Kdf
907,547 UART: [kat] LMS
1,475,743 UART: [kat] --
1,476,590 UART: [cold-reset] ++
1,476,998 UART: [fht] Storing FHT @ 0x50003400
1,479,629 UART: [idev] ++
1,479,797 UART: [idev] CDI.KEYID = 6
1,480,157 UART: [idev] SUBJECT.KEYID = 7
1,480,581 UART: [idev] UDS.KEYID = 0
1,480,926 ready_for_fw is high
1,480,926 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,488,419 UART: [idev] Erasing UDS.KEYID = 0
1,505,463 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,099 UART: [idev] --
1,515,298 UART: [ldev] ++
1,515,466 UART: [ldev] CDI.KEYID = 6
1,515,829 UART: [ldev] SUBJECT.KEYID = 5
1,516,255 UART: [ldev] AUTHORITY.KEYID = 7
1,516,718 UART: [ldev] FE.KEYID = 1
1,521,944 UART: [ldev] Erasing FE.KEYID = 1
1,547,393 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,293 UART: [ldev] --
1,586,598 UART: [fwproc] Waiting for Commands...
1,587,345 UART: [fwproc] Received command 0x46574c44
1,588,136 UART: [fwproc] Received Image of size 9084 bytes
1,679,561 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,706,165 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,707,329 UART: [fwproc] Loading Runtime at address 0x40005000 len 3136
1,713,478 >>> mbox cmd response: success
1,714,648 UART: [afmc] ++
1,714,816 UART: [afmc] CDI.KEYID = 6
1,715,178 UART: [afmc] SUBJECT.KEYID = 7
1,715,603 UART: [afmc] AUTHORITY.KEYID = 5
1,750,841 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,767,217 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,767,997 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,773,718 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,779,613 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,785,325 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,793,172 UART: [afmc] --
1,794,258 UART: [cold-reset] --
1,795,414 UART: [state] Locking Datavault
1,796,387 UART: [state] Locking PCR0, PCR1 and PCR31
1,796,991 UART: [state] Locking ICCM
1,797,601 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,802,896 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,804,779 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,550 ready_for_fw is high
1,362,550 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,565,078 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
891,218 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,656 UART: [kat] SHA2-256
901,596 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
915,751 UART: [kat] HMAC-384Kdf
920,189 UART: [kat] LMS
1,168,501 UART: [kat] --
1,169,314 UART: [cold-reset] ++
1,169,662 UART: [fht] FHT @ 0x50003400
1,172,338 UART: [idev] ++
1,172,506 UART: [idev] CDI.KEYID = 6
1,172,867 UART: [idev] SUBJECT.KEYID = 7
1,173,292 UART: [idev] UDS.KEYID = 0
1,173,638 ready_for_fw is high
1,173,638 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,181,179 UART: [idev] Erasing UDS.KEYID = 0
1,197,719 UART: [idev] Sha1 KeyId Algorithm
1,206,719 UART: [idev] --
1,208,018 UART: [ldev] ++
1,208,186 UART: [ldev] CDI.KEYID = 6
1,208,550 UART: [ldev] SUBJECT.KEYID = 5
1,208,977 UART: [ldev] AUTHORITY.KEYID = 7
1,209,440 UART: [ldev] FE.KEYID = 1
1,214,722 UART: [ldev] Erasing FE.KEYID = 1
1,240,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,466 UART: [ldev] --
1,279,671 UART: [fwproc] Wait for Commands...
1,280,462 UART: [fwproc] Recv command 0x46574c44
1,281,195 UART: [fwproc] Recv'd Img size: 9084 bytes
1,372,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,399,964 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,401,085 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
1,407,216 >>> mbox cmd response: success
1,408,340 UART: [afmc] ++
1,408,508 UART: [afmc] CDI.KEYID = 6
1,408,871 UART: [afmc] SUBJECT.KEYID = 7
1,409,297 UART: [afmc] AUTHORITY.KEYID = 5
1,444,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,461,600 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,462,349 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,468,071 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,473,964 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,479,656 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,487,617 UART: [afmc] --
1,488,558 UART: [cold-reset] --
1,489,518 UART: [state] Locking Datavault
1,490,751 UART: [state] Locking PCR0, PCR1 and PCR31
1,491,355 UART: [state] Locking ICCM
1,491,869 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,497,164 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,499,047 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,042 ready_for_fw is high
1,059,042 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,261,165 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
891,663 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,767 UART: [kat] ++
895,919 UART: [kat] sha1
900,175 UART: [kat] SHA2-256
902,115 UART: [kat] SHA2-384
904,924 UART: [kat] SHA2-512-ACC
906,825 UART: [kat] ECC-384
916,592 UART: [kat] HMAC-384Kdf
921,084 UART: [kat] LMS
1,169,396 UART: [kat] --
1,170,271 UART: [cold-reset] ++
1,170,677 UART: [fht] FHT @ 0x50003400
1,173,513 UART: [idev] ++
1,173,681 UART: [idev] CDI.KEYID = 6
1,174,042 UART: [idev] SUBJECT.KEYID = 7
1,174,467 UART: [idev] UDS.KEYID = 0
1,174,813 ready_for_fw is high
1,174,813 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,182,340 UART: [idev] Erasing UDS.KEYID = 0
1,199,756 UART: [idev] Sha1 KeyId Algorithm
1,208,818 UART: [idev] --
1,209,861 UART: [ldev] ++
1,210,029 UART: [ldev] CDI.KEYID = 6
1,210,393 UART: [ldev] SUBJECT.KEYID = 5
1,210,820 UART: [ldev] AUTHORITY.KEYID = 7
1,211,283 UART: [ldev] FE.KEYID = 1
1,216,939 UART: [ldev] Erasing FE.KEYID = 1
1,243,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,623 UART: [ldev] --
1,282,886 UART: [fwproc] Wait for Commands...
1,283,685 UART: [fwproc] Recv command 0x46574c44
1,284,418 UART: [fwproc] Recv'd Img size: 9084 bytes
1,374,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,401,537 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,402,658 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
1,408,569 >>> mbox cmd response: success
1,409,625 UART: [afmc] ++
1,409,793 UART: [afmc] CDI.KEYID = 6
1,410,156 UART: [afmc] SUBJECT.KEYID = 7
1,410,582 UART: [afmc] AUTHORITY.KEYID = 5
1,447,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,463,315 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,464,064 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,469,786 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,475,679 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,481,371 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,488,974 UART: [afmc] --
1,489,999 UART: [cold-reset] --
1,490,871 UART: [state] Locking Datavault
1,492,102 UART: [state] Locking PCR0, PCR1 and PCR31
1,492,706 UART: [state] Locking ICCM
1,493,320 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,498,615 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,500,498 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,799 ready_for_fw is high
1,059,799 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,261,786 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
893,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,385 UART: [kat] ++
897,537 UART: [kat] sha1
901,689 UART: [kat] SHA2-256
903,629 UART: [kat] SHA2-384
906,338 UART: [kat] SHA2-512-ACC
908,239 UART: [kat] ECC-384
917,604 UART: [kat] HMAC-384Kdf
922,388 UART: [kat] LMS
1,170,716 UART: [kat] --
1,171,649 UART: [cold-reset] ++
1,172,175 UART: [fht] FHT @ 0x50003400
1,174,848 UART: [idev] ++
1,175,016 UART: [idev] CDI.KEYID = 6
1,175,376 UART: [idev] SUBJECT.KEYID = 7
1,175,800 UART: [idev] UDS.KEYID = 0
1,176,145 ready_for_fw is high
1,176,145 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,184,220 UART: [idev] Erasing UDS.KEYID = 0
1,201,369 UART: [idev] Sha1 KeyId Algorithm
1,209,731 UART: [idev] --
1,210,701 UART: [ldev] ++
1,210,869 UART: [ldev] CDI.KEYID = 6
1,211,232 UART: [ldev] SUBJECT.KEYID = 5
1,211,658 UART: [ldev] AUTHORITY.KEYID = 7
1,212,121 UART: [ldev] FE.KEYID = 1
1,217,197 UART: [ldev] Erasing FE.KEYID = 1
1,243,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,321 UART: [ldev] --
1,282,646 UART: [fwproc] Wait for Commands...
1,283,422 UART: [fwproc] Recv command 0x46574c44
1,284,150 UART: [fwproc] Recv'd Img size: 9084 bytes
1,375,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,402,371 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,403,487 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
1,409,476 >>> mbox cmd response: success
1,410,636 UART: [afmc] ++
1,410,804 UART: [afmc] CDI.KEYID = 6
1,411,166 UART: [afmc] SUBJECT.KEYID = 7
1,411,591 UART: [afmc] AUTHORITY.KEYID = 5
1,446,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,463,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,464,340 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,470,061 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,475,956 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,481,648 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,489,470 UART: [afmc] --
1,490,486 UART: [cold-reset] --
1,491,306 UART: [state] Locking Datavault
1,492,621 UART: [state] Locking PCR0, PCR1 and PCR31
1,493,225 UART: [state] Locking ICCM
1,493,809 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,499,104 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,500,987 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,027 ready_for_fw is high
1,059,027 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,260,215 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
893,395 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,520 UART: [kat] ++
897,672 UART: [kat] sha1
901,908 UART: [kat] SHA2-256
903,848 UART: [kat] SHA2-384
906,563 UART: [kat] SHA2-512-ACC
908,464 UART: [kat] ECC-384
918,377 UART: [kat] HMAC-384Kdf
923,045 UART: [kat] LMS
1,171,373 UART: [kat] --
1,172,298 UART: [cold-reset] ++
1,172,674 UART: [fht] FHT @ 0x50003400
1,175,141 UART: [idev] ++
1,175,309 UART: [idev] CDI.KEYID = 6
1,175,669 UART: [idev] SUBJECT.KEYID = 7
1,176,093 UART: [idev] UDS.KEYID = 0
1,176,438 ready_for_fw is high
1,176,438 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,184,421 UART: [idev] Erasing UDS.KEYID = 0
1,201,260 UART: [idev] Sha1 KeyId Algorithm
1,209,740 UART: [idev] --
1,210,804 UART: [ldev] ++
1,210,972 UART: [ldev] CDI.KEYID = 6
1,211,335 UART: [ldev] SUBJECT.KEYID = 5
1,211,761 UART: [ldev] AUTHORITY.KEYID = 7
1,212,224 UART: [ldev] FE.KEYID = 1
1,217,670 UART: [ldev] Erasing FE.KEYID = 1
1,244,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,386 UART: [ldev] --
1,283,871 UART: [fwproc] Wait for Commands...
1,284,541 UART: [fwproc] Recv command 0x46574c44
1,285,269 UART: [fwproc] Recv'd Img size: 9084 bytes
1,376,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,403,222 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,404,338 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
1,410,359 >>> mbox cmd response: success
1,411,551 UART: [afmc] ++
1,411,719 UART: [afmc] CDI.KEYID = 6
1,412,081 UART: [afmc] SUBJECT.KEYID = 7
1,412,506 UART: [afmc] AUTHORITY.KEYID = 5
1,448,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,465,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,465,755 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,471,476 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,477,371 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,483,063 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,490,875 UART: [afmc] --
1,491,979 UART: [cold-reset] --
1,492,815 UART: [state] Locking Datavault
1,493,994 UART: [state] Locking PCR0, PCR1 and PCR31
1,494,598 UART: [state] Locking ICCM
1,495,212 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,500,507 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,502,390 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,552 ready_for_fw is high
1,060,552 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,260,774 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s